2 // ========================LICENSE_START=================================
5 // Copyright (C) 2022: Nordix Foundation. All rights reserved.
6 // Copyright (C) 2023 OpenInfra Foundation Europe. All rights reserved.
8 // Licensed under the Apache License, Version 2.0 (the "License");
9 // you may not use this file except in compliance with the License.
10 // You may obtain a copy of the License at
12 // http://www.apache.org/licenses/LICENSE-2.0
14 // Unless required by applicable law or agreed to in writing, software
15 // distributed under the License is distributed on an "AS IS" BASIS,
16 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17 // See the License for the specific language governing permissions and
18 // limitations under the License.
19 // ========================LICENSE_END===================================
29 "github.com/getkin/kin-openapi/openapi3"
30 "github.com/labstack/echo/v4"
31 "helm.sh/helm/v3/pkg/cli"
32 "oransc.org/nonrtric/capifcore/internal/common29122"
33 "oransc.org/nonrtric/capifcore/internal/discoverserviceapi"
34 "oransc.org/nonrtric/capifcore/internal/eventsapi"
35 "oransc.org/nonrtric/capifcore/internal/invokermanagementapi"
36 "oransc.org/nonrtric/capifcore/internal/keycloak"
37 "oransc.org/nonrtric/capifcore/internal/providermanagementapi"
38 "oransc.org/nonrtric/capifcore/internal/securityapi"
40 "github.com/deepmap/oapi-codegen/pkg/middleware"
41 echomiddleware "github.com/labstack/echo/v4/middleware"
42 log "github.com/sirupsen/logrus"
43 config "oransc.org/nonrtric/capifcore/internal/config"
44 "oransc.org/nonrtric/capifcore/internal/discoverservice"
45 "oransc.org/nonrtric/capifcore/internal/eventservice"
46 "oransc.org/nonrtric/capifcore/internal/helmmanagement"
47 "oransc.org/nonrtric/capifcore/internal/invokermanagement"
48 "oransc.org/nonrtric/capifcore/internal/providermanagement"
49 "oransc.org/nonrtric/capifcore/internal/publishservice"
50 "oransc.org/nonrtric/capifcore/internal/publishserviceapi"
51 security "oransc.org/nonrtric/capifcore/internal/securityservice"
55 var helmManager helmmanagement.HelmManager
59 var port = flag.Int("port", 8090, "Port for CAPIF Core Function HTTP server")
60 var secPort = flag.Int("secPort", 4433, "Port for CAPIF Core Function HTTPS server")
61 flag.StringVar(&url, "chartMuseumUrl", "", "ChartMuseum URL")
62 flag.StringVar(&repoName, "repoName", "capifcore", "Repository name")
63 var logLevelStr = flag.String("loglevel", "Info", "Log level")
64 var certPath = flag.String("certPath", "certs/cert.pem", "Path for server certificate")
65 var keyPath = flag.String("keyPath", "certs/key.pem", "Path for server private key")
69 if loglevel, err := log.ParseLevel(*logLevelStr); err == nil {
70 log.SetLevel(loglevel)
74 helmManager = helmmanagement.NewHelmManager(cli.New())
75 err := helmManager.SetUpRepo(repoName, url)
77 log.Warnf("No Helm repo added due to: %s", err.Error())
80 go startWebServer(getEcho(), *port)
81 go startHttpsWebServer(getEcho(), *secPort, *certPath, *keyPath)
83 log.Info("Server started and listening on port: ", *port)
88 func getEcho() *echo.Echo {
91 e.Use(echomiddleware.Logger())
93 // Read configuration file
94 cfg, err := config.ReadKeycloakConfigFile("configs")
96 log.Fatalf("Error loading configuration file\n: %s", err)
98 km := keycloak.NewKeycloakManager(cfg, &http.Client{})
100 var group *echo.Group
101 // Register ProviderManagement
102 providerManagerSwagger, err := providermanagementapi.GetSwagger()
104 log.Fatalf("Error loading ProviderManagement swagger spec\n: %s", err)
106 providerManagerSwagger.Servers = nil
107 providerManager := providermanagement.NewProviderManager()
108 group = e.Group("/api-provider-management/v1")
109 group.Use(middleware.OapiRequestValidator(providerManagerSwagger))
110 providermanagementapi.RegisterHandlersWithBaseURL(e, providerManager, "/api-provider-management/v1")
112 // Register EventService
113 eventServiceSwagger, err := eventsapi.GetSwagger()
115 log.Fatalf("Error loading EventService swagger spec\n: %s", err)
117 eventServiceSwagger.Servers = nil
118 eventService := eventservice.NewEventService(&http.Client{})
119 group = e.Group("/capif-events/v1")
120 group.Use(middleware.OapiRequestValidator(eventServiceSwagger))
121 eventsapi.RegisterHandlersWithBaseURL(e, eventService, "/capif-events/v1")
122 eventChannel := eventService.GetNotificationChannel()
124 // Register PublishService
125 publishServiceSwagger, err := publishserviceapi.GetSwagger()
127 log.Fatalf("Error loading PublishService swagger spec\n: %s", err)
129 publishServiceSwagger.Servers = nil
130 publishService := publishservice.NewPublishService(providerManager, helmManager, eventChannel)
131 group = e.Group("/published-apis/v1")
132 group.Use(middleware.OapiRequestValidator(publishServiceSwagger))
133 publishserviceapi.RegisterHandlersWithBaseURL(e, publishService, "/published-apis/v1")
135 // Register InvokerManagement
136 invokerManagerSwagger, err := invokermanagementapi.GetSwagger()
138 log.Fatalf("Error loading InvokerManagement swagger spec\n: %s", err)
140 invokerManagerSwagger.Servers = nil
141 invokerManager := invokermanagement.NewInvokerManager(publishService, km, eventChannel)
142 group = e.Group("/api-invoker-management/v1")
143 group.Use(middleware.OapiRequestValidator(invokerManagerSwagger))
144 invokermanagementapi.RegisterHandlersWithBaseURL(e, invokerManager, "/api-invoker-management/v1")
146 // Register DiscoverService
147 discoverServiceSwagger, err := discoverserviceapi.GetSwagger()
149 log.Fatalf("Error loading DiscoverService swagger spec\n: %s", err)
151 discoverServiceSwagger.Servers = nil
152 discoverService := discoverservice.NewDiscoverService(invokerManager)
153 group = e.Group("/service-apis/v1")
154 group.Use(middleware.OapiRequestValidator(discoverServiceSwagger))
155 discoverserviceapi.RegisterHandlersWithBaseURL(e, discoverService, "/service-apis/v1")
158 securitySwagger, err := securityapi.GetSwagger()
160 log.Fatalf("Error loading Security swagger spec\n: %s", err)
162 securitySwagger.Servers = nil
163 securityService := security.NewSecurity(providerManager, publishService, invokerManager, km)
164 group = e.Group("/capif-security/v1")
165 group.Use(middleware.OapiRequestValidator(securitySwagger))
166 securityapi.RegisterHandlersWithBaseURL(e, securityService, "/capif-security/v1")
170 e.GET("/swagger/:apiName", getSwagger)
175 func startWebServer(e *echo.Echo, port int) {
176 e.Logger.Fatal(e.Start(fmt.Sprintf("0.0.0.0:%d", port)))
179 func startHttpsWebServer(e *echo.Echo, port int, certPath string, keyPath string) {
180 e.Logger.Fatal(e.StartTLS(fmt.Sprintf("0.0.0.0:%d", port), certPath, keyPath))
183 func keepServerAlive() {
184 forever := make(chan int)
188 func hello(c echo.Context) error {
189 return c.String(http.StatusOK, "Hello, World!")
192 func getSwagger(c echo.Context) error {
193 var swagger *openapi3.T
195 switch api := c.Param("apiName"); api {
197 swagger, err = providermanagementapi.GetSwagger()
199 swagger, err = publishserviceapi.GetSwagger()
201 swagger, err = invokermanagementapi.GetSwagger()
203 swagger, err = discoverserviceapi.GetSwagger()
205 swagger, err = eventsapi.GetSwagger()
207 swagger, err = securityapi.GetSwagger()
209 return c.JSON(http.StatusBadRequest, getProblemDetails("Invalid API name "+api, http.StatusBadRequest))
212 return c.JSON(http.StatusInternalServerError, getProblemDetails("Unable to get swagger for API", http.StatusInternalServerError))
214 return c.JSON(http.StatusOK, swagger)
217 func getProblemDetails(cause string, status int) common29122.ProblemDetails {
218 return common29122.ProblemDetails{