b0fa1dc2f010772ef34f605af02b9b64208e430e
[nonrtric/plt/sme.git] / capifcore / main.go
1 // -
2 //   ========================LICENSE_START=================================
3 //   O-RAN-SC
4 //   %%
5 //   Copyright (C) 2022: Nordix Foundation. All rights reserved.
6 //   Copyright (C) 2023 OpenInfra Foundation Europe. All rights reserved.
7 //   %%
8 //   Licensed under the Apache License, Version 2.0 (the "License");
9 //   you may not use this file except in compliance with the License.
10 //   You may obtain a copy of the License at
11 //
12 //        http://www.apache.org/licenses/LICENSE-2.0
13 //
14 //   Unless required by applicable law or agreed to in writing, software
15 //   distributed under the License is distributed on an "AS IS" BASIS,
16 //   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17 //   See the License for the specific language governing permissions and
18 //   limitations under the License.
19 //   ========================LICENSE_END===================================
20 //
21
22 package main
23
24 import (
25         "flag"
26         "fmt"
27         "net/http"
28
29         "github.com/getkin/kin-openapi/openapi3"
30         "github.com/labstack/echo/v4"
31         "helm.sh/helm/v3/pkg/cli"
32         "oransc.org/nonrtric/capifcore/internal/common29122"
33         "oransc.org/nonrtric/capifcore/internal/discoverserviceapi"
34         "oransc.org/nonrtric/capifcore/internal/eventsapi"
35         "oransc.org/nonrtric/capifcore/internal/invokermanagementapi"
36         "oransc.org/nonrtric/capifcore/internal/keycloak"
37         "oransc.org/nonrtric/capifcore/internal/providermanagementapi"
38         "oransc.org/nonrtric/capifcore/internal/securityapi"
39
40         "github.com/deepmap/oapi-codegen/pkg/middleware"
41         echomiddleware "github.com/labstack/echo/v4/middleware"
42         log "github.com/sirupsen/logrus"
43         config "oransc.org/nonrtric/capifcore/internal/config"
44         "oransc.org/nonrtric/capifcore/internal/discoverservice"
45         "oransc.org/nonrtric/capifcore/internal/eventservice"
46         "oransc.org/nonrtric/capifcore/internal/helmmanagement"
47         "oransc.org/nonrtric/capifcore/internal/invokermanagement"
48         "oransc.org/nonrtric/capifcore/internal/providermanagement"
49         "oransc.org/nonrtric/capifcore/internal/publishservice"
50         "oransc.org/nonrtric/capifcore/internal/publishserviceapi"
51         security "oransc.org/nonrtric/capifcore/internal/securityservice"
52 )
53
54 var url string
55 var helmManager helmmanagement.HelmManager
56 var repoName string
57
58 func main() {
59         var port = flag.Int("port", 8090, "Port for CAPIF Core Function HTTP server")
60         var secPort = flag.Int("secPort", 4433, "Port for CAPIF Core Function HTTPS server")
61         flag.StringVar(&url, "chartMuseumUrl", "", "ChartMuseum URL")
62         flag.StringVar(&repoName, "repoName", "capifcore", "Repository name")
63         var logLevelStr = flag.String("loglevel", "Info", "Log level")
64         var certPath = flag.String("certPath", "certs/cert.pem", "Path for server certificate")
65         var keyPath = flag.String("keyPath", "certs/key.pem", "Path for server private key")
66
67         flag.Parse()
68
69         if loglevel, err := log.ParseLevel(*logLevelStr); err == nil {
70                 log.SetLevel(loglevel)
71         }
72
73         // Add repo
74         helmManager = helmmanagement.NewHelmManager(cli.New())
75         err := helmManager.SetUpRepo(repoName, url)
76         if err != nil {
77                 log.Warnf("No Helm repo added due to: %s", err.Error())
78         }
79
80         go startWebServer(getEcho(), *port)
81         go startHttpsWebServer(getEcho(), *secPort, *certPath, *keyPath)
82
83         log.Info("Server started and listening on port: ", *port)
84
85         keepServerAlive()
86 }
87
88 func getEcho() *echo.Echo {
89         e := echo.New()
90         // Log all requests
91         e.Use(echomiddleware.Logger())
92
93         // Read configuration file
94         cfg, err := config.ReadKeycloakConfigFile("configs")
95         if err != nil {
96                 log.Fatalf("Error loading configuration file\n: %s", err)
97         }
98         km := keycloak.NewKeycloakManager(cfg, &http.Client{})
99
100         var group *echo.Group
101         // Register ProviderManagement
102         providerManagerSwagger, err := providermanagementapi.GetSwagger()
103         if err != nil {
104                 log.Fatalf("Error loading ProviderManagement swagger spec\n: %s", err)
105         }
106         providerManagerSwagger.Servers = nil
107         providerManager := providermanagement.NewProviderManager()
108         group = e.Group("/api-provider-management/v1")
109         group.Use(middleware.OapiRequestValidator(providerManagerSwagger))
110         providermanagementapi.RegisterHandlersWithBaseURL(e, providerManager, "/api-provider-management/v1")
111
112         // Register EventService
113         eventServiceSwagger, err := eventsapi.GetSwagger()
114         if err != nil {
115                 log.Fatalf("Error loading EventService swagger spec\n: %s", err)
116         }
117         eventServiceSwagger.Servers = nil
118         eventService := eventservice.NewEventService(&http.Client{})
119         group = e.Group("/capif-events/v1")
120         group.Use(middleware.OapiRequestValidator(eventServiceSwagger))
121         eventsapi.RegisterHandlersWithBaseURL(e, eventService, "/capif-events/v1")
122         eventChannel := eventService.GetNotificationChannel()
123
124         // Register PublishService
125         publishServiceSwagger, err := publishserviceapi.GetSwagger()
126         if err != nil {
127                 log.Fatalf("Error loading PublishService swagger spec\n: %s", err)
128         }
129         publishServiceSwagger.Servers = nil
130         publishService := publishservice.NewPublishService(providerManager, helmManager, eventChannel)
131         group = e.Group("/published-apis/v1")
132         group.Use(middleware.OapiRequestValidator(publishServiceSwagger))
133         publishserviceapi.RegisterHandlersWithBaseURL(e, publishService, "/published-apis/v1")
134
135         // Register InvokerManagement
136         invokerManagerSwagger, err := invokermanagementapi.GetSwagger()
137         if err != nil {
138                 log.Fatalf("Error loading InvokerManagement swagger spec\n: %s", err)
139         }
140         invokerManagerSwagger.Servers = nil
141         invokerManager := invokermanagement.NewInvokerManager(publishService, km, eventChannel)
142         group = e.Group("/api-invoker-management/v1")
143         group.Use(middleware.OapiRequestValidator(invokerManagerSwagger))
144         invokermanagementapi.RegisterHandlersWithBaseURL(e, invokerManager, "/api-invoker-management/v1")
145
146         // Register DiscoverService
147         discoverServiceSwagger, err := discoverserviceapi.GetSwagger()
148         if err != nil {
149                 log.Fatalf("Error loading DiscoverService swagger spec\n: %s", err)
150         }
151         discoverServiceSwagger.Servers = nil
152         discoverService := discoverservice.NewDiscoverService(invokerManager)
153         group = e.Group("/service-apis/v1")
154         group.Use(middleware.OapiRequestValidator(discoverServiceSwagger))
155         discoverserviceapi.RegisterHandlersWithBaseURL(e, discoverService, "/service-apis/v1")
156
157         // Register Security
158         securitySwagger, err := securityapi.GetSwagger()
159         if err != nil {
160                 log.Fatalf("Error loading Security swagger spec\n: %s", err)
161         }
162         securitySwagger.Servers = nil
163         securityService := security.NewSecurity(providerManager, publishService, invokerManager, km)
164         group = e.Group("/capif-security/v1")
165         group.Use(middleware.OapiRequestValidator(securitySwagger))
166         securityapi.RegisterHandlersWithBaseURL(e, securityService, "/capif-security/v1")
167
168         e.GET("/", hello)
169
170         e.GET("/swagger/:apiName", getSwagger)
171
172         return e
173 }
174
175 func startWebServer(e *echo.Echo, port int) {
176         e.Logger.Fatal(e.Start(fmt.Sprintf("0.0.0.0:%d", port)))
177 }
178
179 func startHttpsWebServer(e *echo.Echo, port int, certPath string, keyPath string) {
180         e.Logger.Fatal(e.StartTLS(fmt.Sprintf("0.0.0.0:%d", port), certPath, keyPath))
181 }
182
183 func keepServerAlive() {
184         forever := make(chan int)
185         <-forever
186 }
187
188 func hello(c echo.Context) error {
189         return c.String(http.StatusOK, "Hello, World!")
190 }
191
192 func getSwagger(c echo.Context) error {
193         var swagger *openapi3.T
194         var err error
195         switch api := c.Param("apiName"); api {
196         case "provider":
197                 swagger, err = providermanagementapi.GetSwagger()
198         case "publish":
199                 swagger, err = publishserviceapi.GetSwagger()
200         case "invoker":
201                 swagger, err = invokermanagementapi.GetSwagger()
202         case "discover":
203                 swagger, err = discoverserviceapi.GetSwagger()
204         case "events":
205                 swagger, err = eventsapi.GetSwagger()
206         case "security":
207                 swagger, err = securityapi.GetSwagger()
208         default:
209                 return c.JSON(http.StatusBadRequest, getProblemDetails("Invalid API name "+api, http.StatusBadRequest))
210         }
211         if err != nil {
212                 return c.JSON(http.StatusInternalServerError, getProblemDetails("Unable to get swagger for API", http.StatusInternalServerError))
213         }
214         return c.JSON(http.StatusOK, swagger)
215 }
216
217 func getProblemDetails(cause string, status int) common29122.ProblemDetails {
218         return common29122.ProblemDetails{
219                 Cause:  &cause,
220                 Status: &status,
221         }
222 }