2 // ========================LICENSE_START=================================
5 // Copyright (C) 2022: Nordix Foundation
7 // Licensed under the Apache License, Version 2.0 (the "License");
8 // you may not use this file except in compliance with the License.
9 // You may obtain a copy of the License at
11 // http://www.apache.org/licenses/LICENSE-2.0
13 // Unless required by applicable law or agreed to in writing, software
14 // distributed under the License is distributed on an "AS IS" BASIS,
15 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 // See the License for the specific language governing permissions and
17 // limitations under the License.
18 // ========================LICENSE_END===================================
28 "github.com/getkin/kin-openapi/openapi3"
29 "github.com/labstack/echo/v4"
30 "helm.sh/helm/v3/pkg/cli"
31 "oransc.org/nonrtric/capifcore/internal/common29122"
32 "oransc.org/nonrtric/capifcore/internal/discoverserviceapi"
33 "oransc.org/nonrtric/capifcore/internal/eventsapi"
34 "oransc.org/nonrtric/capifcore/internal/invokermanagementapi"
35 "oransc.org/nonrtric/capifcore/internal/keycloak"
36 "oransc.org/nonrtric/capifcore/internal/providermanagementapi"
37 "oransc.org/nonrtric/capifcore/internal/securityapi"
39 "github.com/deepmap/oapi-codegen/pkg/middleware"
40 echomiddleware "github.com/labstack/echo/v4/middleware"
41 log "github.com/sirupsen/logrus"
42 config "oransc.org/nonrtric/capifcore/internal/config"
43 "oransc.org/nonrtric/capifcore/internal/discoverservice"
44 "oransc.org/nonrtric/capifcore/internal/eventservice"
45 "oransc.org/nonrtric/capifcore/internal/helmmanagement"
46 "oransc.org/nonrtric/capifcore/internal/invokermanagement"
47 "oransc.org/nonrtric/capifcore/internal/providermanagement"
48 "oransc.org/nonrtric/capifcore/internal/publishservice"
49 "oransc.org/nonrtric/capifcore/internal/publishserviceapi"
50 security "oransc.org/nonrtric/capifcore/internal/securityservice"
54 var helmManager helmmanagement.HelmManager
58 var port = flag.Int("port", 8090, "Port for CAPIF Core Function HTTP server")
59 var secPort = flag.Int("secPort", 4433, "Port for CAPIF Core Function HTTPS server")
60 flag.StringVar(&url, "chartMuseumUrl", "", "ChartMuseum URL")
61 flag.StringVar(&repoName, "repoName", "capifcore", "Repository name")
62 var logLevelStr = flag.String("loglevel", "Info", "Log level")
63 var certPath = flag.String("certPath", "certs/cert.pem", "Path for server certificate")
64 var keyPath = flag.String("keyPath", "certs/key.pem", "Path for server private key")
68 if loglevel, err := log.ParseLevel(*logLevelStr); err == nil {
69 log.SetLevel(loglevel)
73 helmManager = helmmanagement.NewHelmManager(cli.New())
74 err := helmManager.SetUpRepo(repoName, url)
76 log.Warnf("No Helm repo added due to: %s", err.Error())
79 go startWebServer(getEcho(), *port)
80 go startHttpsWebServer(getEcho(), *secPort, *certPath, *keyPath)
82 log.Info("Server started and listening on port: ", *port)
87 func getEcho() *echo.Echo {
90 e.Use(echomiddleware.Logger())
92 // Read configuration file
93 cfg, err := config.ReadKeycloakConfigFile("configs")
95 log.Fatalf("Error loading configuration file\n: %s", err)
97 km := keycloak.NewKeycloakManager(cfg, &http.Client{})
100 // Register ProviderManagement
101 providerManagerSwagger, err := providermanagementapi.GetSwagger()
103 log.Fatalf("Error loading ProviderManagement swagger spec\n: %s", err)
105 providerManagerSwagger.Servers = nil
106 providerManager := providermanagement.NewProviderManager()
107 group = e.Group("/api-provider-management/v1")
108 group.Use(middleware.OapiRequestValidator(providerManagerSwagger))
109 providermanagementapi.RegisterHandlersWithBaseURL(e, providerManager, "/api-provider-management/v1")
111 // Register EventService
112 eventServiceSwagger, err := eventsapi.GetSwagger()
114 log.Fatalf("Error loading EventService swagger spec\n: %s", err)
116 eventServiceSwagger.Servers = nil
117 eventService := eventservice.NewEventService(&http.Client{})
118 group = e.Group("/capif-events/v1")
119 group.Use(middleware.OapiRequestValidator(eventServiceSwagger))
120 eventsapi.RegisterHandlersWithBaseURL(e, eventService, "/capif-events/v1")
121 eventChannel := eventService.GetNotificationChannel()
123 // Register PublishService
124 publishServiceSwagger, err := publishserviceapi.GetSwagger()
126 log.Fatalf("Error loading PublishService swagger spec\n: %s", err)
128 publishServiceSwagger.Servers = nil
129 publishService := publishservice.NewPublishService(providerManager, helmManager, eventChannel)
130 group = e.Group("/published-apis/v1")
131 group.Use(middleware.OapiRequestValidator(publishServiceSwagger))
132 publishserviceapi.RegisterHandlersWithBaseURL(e, publishService, "/published-apis/v1")
134 // Register InvokerManagement
135 invokerManagerSwagger, err := invokermanagementapi.GetSwagger()
137 log.Fatalf("Error loading InvokerManagement swagger spec\n: %s", err)
139 invokerManagerSwagger.Servers = nil
140 invokerManager := invokermanagement.NewInvokerManager(publishService, eventChannel)
141 group = e.Group("/api-invoker-management/v1")
142 group.Use(middleware.OapiRequestValidator(invokerManagerSwagger))
143 invokermanagementapi.RegisterHandlersWithBaseURL(e, invokerManager, "/api-invoker-management/v1")
145 // Register DiscoverService
146 discoverServiceSwagger, err := discoverserviceapi.GetSwagger()
148 log.Fatalf("Error loading DiscoverService swagger spec\n: %s", err)
150 discoverServiceSwagger.Servers = nil
151 discoverService := discoverservice.NewDiscoverService(invokerManager)
152 group = e.Group("/service-apis/v1")
153 group.Use(middleware.OapiRequestValidator(discoverServiceSwagger))
154 discoverserviceapi.RegisterHandlersWithBaseURL(e, discoverService, "/service-apis/v1")
157 securitySwagger, err := securityapi.GetSwagger()
159 log.Fatalf("Error loading Security swagger spec\n: %s", err)
161 securitySwagger.Servers = nil
162 securityService := security.NewSecurity(providerManager, publishService, invokerManager, km)
163 group = e.Group("/capif-security/v1")
164 group.Use(middleware.OapiRequestValidator(securitySwagger))
165 securityapi.RegisterHandlersWithBaseURL(e, securityService, "/capif-security/v1")
169 e.GET("/swagger/:apiName", getSwagger)
174 func startWebServer(e *echo.Echo, port int) {
175 e.Logger.Fatal(e.Start(fmt.Sprintf("0.0.0.0:%d", port)))
178 func startHttpsWebServer(e *echo.Echo, port int, certPath string, keyPath string) {
179 e.Logger.Fatal(e.StartTLS(fmt.Sprintf("0.0.0.0:%d", port), certPath, keyPath))
182 func keepServerAlive() {
183 forever := make(chan int)
187 func hello(c echo.Context) error {
188 return c.String(http.StatusOK, "Hello, World!")
191 func getSwagger(c echo.Context) error {
192 var swagger *openapi3.T
194 switch api := c.Param("apiName"); api {
196 swagger, err = providermanagementapi.GetSwagger()
198 swagger, err = publishserviceapi.GetSwagger()
200 swagger, err = invokermanagementapi.GetSwagger()
202 swagger, err = discoverserviceapi.GetSwagger()
204 swagger, err = eventsapi.GetSwagger()
206 swagger, err = securityapi.GetSwagger()
208 return c.JSON(http.StatusBadRequest, getProblemDetails("Invalid API name "+api, http.StatusBadRequest))
211 return c.JSON(http.StatusInternalServerError, getProblemDetails("Unable to get swagger for API", http.StatusInternalServerError))
213 return c.JSON(http.StatusOK, swagger)
216 func getProblemDetails(cause string, status int) common29122.ProblemDetails {
217 return common29122.ProblemDetails{