Integration with keycloak, add client
[nonrtric/plt/sme.git] / capifcore / main.go
1 // -
2 //   ========================LICENSE_START=================================
3 //   O-RAN-SC
4 //   %%
5 //   Copyright (C) 2022: Nordix Foundation
6 //   %%
7 //   Licensed under the Apache License, Version 2.0 (the "License");
8 //   you may not use this file except in compliance with the License.
9 //   You may obtain a copy of the License at
10 //
11 //        http://www.apache.org/licenses/LICENSE-2.0
12 //
13 //   Unless required by applicable law or agreed to in writing, software
14 //   distributed under the License is distributed on an "AS IS" BASIS,
15 //   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 //   See the License for the specific language governing permissions and
17 //   limitations under the License.
18 //   ========================LICENSE_END===================================
19 //
20
21 package main
22
23 import (
24         "flag"
25         "fmt"
26         "net/http"
27
28         "github.com/getkin/kin-openapi/openapi3"
29         "github.com/labstack/echo/v4"
30         "helm.sh/helm/v3/pkg/cli"
31         "oransc.org/nonrtric/capifcore/internal/common29122"
32         "oransc.org/nonrtric/capifcore/internal/discoverserviceapi"
33         "oransc.org/nonrtric/capifcore/internal/eventsapi"
34         "oransc.org/nonrtric/capifcore/internal/invokermanagementapi"
35         "oransc.org/nonrtric/capifcore/internal/keycloak"
36         "oransc.org/nonrtric/capifcore/internal/providermanagementapi"
37         "oransc.org/nonrtric/capifcore/internal/securityapi"
38
39         "github.com/deepmap/oapi-codegen/pkg/middleware"
40         echomiddleware "github.com/labstack/echo/v4/middleware"
41         log "github.com/sirupsen/logrus"
42         config "oransc.org/nonrtric/capifcore/internal/config"
43         "oransc.org/nonrtric/capifcore/internal/discoverservice"
44         "oransc.org/nonrtric/capifcore/internal/eventservice"
45         "oransc.org/nonrtric/capifcore/internal/helmmanagement"
46         "oransc.org/nonrtric/capifcore/internal/invokermanagement"
47         "oransc.org/nonrtric/capifcore/internal/providermanagement"
48         "oransc.org/nonrtric/capifcore/internal/publishservice"
49         "oransc.org/nonrtric/capifcore/internal/publishserviceapi"
50         security "oransc.org/nonrtric/capifcore/internal/securityservice"
51 )
52
53 var url string
54 var helmManager helmmanagement.HelmManager
55 var repoName string
56
57 func main() {
58         var port = flag.Int("port", 8090, "Port for CAPIF Core Function HTTP server")
59         var secPort = flag.Int("secPort", 4433, "Port for CAPIF Core Function HTTPS server")
60         flag.StringVar(&url, "chartMuseumUrl", "", "ChartMuseum URL")
61         flag.StringVar(&repoName, "repoName", "capifcore", "Repository name")
62         var logLevelStr = flag.String("loglevel", "Info", "Log level")
63         var certPath = flag.String("certPath", "certs/cert.pem", "Path for server certificate")
64         var keyPath = flag.String("keyPath", "certs/key.pem", "Path for server private key")
65
66         flag.Parse()
67
68         if loglevel, err := log.ParseLevel(*logLevelStr); err == nil {
69                 log.SetLevel(loglevel)
70         }
71
72         // Add repo
73         helmManager = helmmanagement.NewHelmManager(cli.New())
74         err := helmManager.SetUpRepo(repoName, url)
75         if err != nil {
76                 log.Warnf("No Helm repo added due to: %s", err.Error())
77         }
78
79         go startWebServer(getEcho(), *port)
80         go startHttpsWebServer(getEcho(), *secPort, *certPath, *keyPath)
81
82         log.Info("Server started and listening on port: ", *port)
83
84         keepServerAlive()
85 }
86
87 func getEcho() *echo.Echo {
88         e := echo.New()
89         // Log all requests
90         e.Use(echomiddleware.Logger())
91
92         // Read configuration file
93         cfg, err := config.ReadKeycloakConfigFile("configs")
94         if err != nil {
95                 log.Fatalf("Error loading configuration file\n: %s", err)
96         }
97         km := keycloak.NewKeycloakManager(cfg, &http.Client{})
98
99         var group *echo.Group
100         // Register ProviderManagement
101         providerManagerSwagger, err := providermanagementapi.GetSwagger()
102         if err != nil {
103                 log.Fatalf("Error loading ProviderManagement swagger spec\n: %s", err)
104         }
105         providerManagerSwagger.Servers = nil
106         providerManager := providermanagement.NewProviderManager()
107         group = e.Group("/api-provider-management/v1")
108         group.Use(middleware.OapiRequestValidator(providerManagerSwagger))
109         providermanagementapi.RegisterHandlersWithBaseURL(e, providerManager, "/api-provider-management/v1")
110
111         // Register EventService
112         eventServiceSwagger, err := eventsapi.GetSwagger()
113         if err != nil {
114                 log.Fatalf("Error loading EventService swagger spec\n: %s", err)
115         }
116         eventServiceSwagger.Servers = nil
117         eventService := eventservice.NewEventService(&http.Client{})
118         group = e.Group("/capif-events/v1")
119         group.Use(middleware.OapiRequestValidator(eventServiceSwagger))
120         eventsapi.RegisterHandlersWithBaseURL(e, eventService, "/capif-events/v1")
121         eventChannel := eventService.GetNotificationChannel()
122
123         // Register PublishService
124         publishServiceSwagger, err := publishserviceapi.GetSwagger()
125         if err != nil {
126                 log.Fatalf("Error loading PublishService swagger spec\n: %s", err)
127         }
128         publishServiceSwagger.Servers = nil
129         publishService := publishservice.NewPublishService(providerManager, helmManager, eventChannel)
130         group = e.Group("/published-apis/v1")
131         group.Use(middleware.OapiRequestValidator(publishServiceSwagger))
132         publishserviceapi.RegisterHandlersWithBaseURL(e, publishService, "/published-apis/v1")
133
134         // Register InvokerManagement
135         invokerManagerSwagger, err := invokermanagementapi.GetSwagger()
136         if err != nil {
137                 log.Fatalf("Error loading InvokerManagement swagger spec\n: %s", err)
138         }
139         invokerManagerSwagger.Servers = nil
140         invokerManager := invokermanagement.NewInvokerManager(publishService, eventChannel)
141         group = e.Group("/api-invoker-management/v1")
142         group.Use(middleware.OapiRequestValidator(invokerManagerSwagger))
143         invokermanagementapi.RegisterHandlersWithBaseURL(e, invokerManager, "/api-invoker-management/v1")
144
145         // Register DiscoverService
146         discoverServiceSwagger, err := discoverserviceapi.GetSwagger()
147         if err != nil {
148                 log.Fatalf("Error loading DiscoverService swagger spec\n: %s", err)
149         }
150         discoverServiceSwagger.Servers = nil
151         discoverService := discoverservice.NewDiscoverService(invokerManager)
152         group = e.Group("/service-apis/v1")
153         group.Use(middleware.OapiRequestValidator(discoverServiceSwagger))
154         discoverserviceapi.RegisterHandlersWithBaseURL(e, discoverService, "/service-apis/v1")
155
156         // Register Security
157         securitySwagger, err := securityapi.GetSwagger()
158         if err != nil {
159                 log.Fatalf("Error loading Security swagger spec\n: %s", err)
160         }
161         securitySwagger.Servers = nil
162         securityService := security.NewSecurity(providerManager, publishService, invokerManager, km)
163         group = e.Group("/capif-security/v1")
164         group.Use(middleware.OapiRequestValidator(securitySwagger))
165         securityapi.RegisterHandlersWithBaseURL(e, securityService, "/capif-security/v1")
166
167         e.GET("/", hello)
168
169         e.GET("/swagger/:apiName", getSwagger)
170
171         return e
172 }
173
174 func startWebServer(e *echo.Echo, port int) {
175         e.Logger.Fatal(e.Start(fmt.Sprintf("0.0.0.0:%d", port)))
176 }
177
178 func startHttpsWebServer(e *echo.Echo, port int, certPath string, keyPath string) {
179         e.Logger.Fatal(e.StartTLS(fmt.Sprintf("0.0.0.0:%d", port), certPath, keyPath))
180 }
181
182 func keepServerAlive() {
183         forever := make(chan int)
184         <-forever
185 }
186
187 func hello(c echo.Context) error {
188         return c.String(http.StatusOK, "Hello, World!")
189 }
190
191 func getSwagger(c echo.Context) error {
192         var swagger *openapi3.T
193         var err error
194         switch api := c.Param("apiName"); api {
195         case "provider":
196                 swagger, err = providermanagementapi.GetSwagger()
197         case "publish":
198                 swagger, err = publishserviceapi.GetSwagger()
199         case "invoker":
200                 swagger, err = invokermanagementapi.GetSwagger()
201         case "discover":
202                 swagger, err = discoverserviceapi.GetSwagger()
203         case "events":
204                 swagger, err = eventsapi.GetSwagger()
205         case "security":
206                 swagger, err = securityapi.GetSwagger()
207         default:
208                 return c.JSON(http.StatusBadRequest, getProblemDetails("Invalid API name "+api, http.StatusBadRequest))
209         }
210         if err != nil {
211                 return c.JSON(http.StatusInternalServerError, getProblemDetails("Unable to get swagger for API", http.StatusInternalServerError))
212         }
213         return c.JSON(http.StatusOK, swagger)
214 }
215
216 func getProblemDetails(cause string, status int) common29122.ProblemDetails {
217         return common29122.ProblemDetails{
218                 Cause:  &cause,
219                 Status: &status,
220         }
221 }