Merge changes I3349bcdd,I552b5e17
[nonrtric/plt/sme.git] / capifcore / main.go
1 // -
2 //   ========================LICENSE_START=================================
3 //   O-RAN-SC
4 //   %%
5 //   Copyright (C) 2022: Nordix Foundation
6 //   %%
7 //   Licensed under the Apache License, Version 2.0 (the "License");
8 //   you may not use this file except in compliance with the License.
9 //   You may obtain a copy of the License at
10 //
11 //        http://www.apache.org/licenses/LICENSE-2.0
12 //
13 //   Unless required by applicable law or agreed to in writing, software
14 //   distributed under the License is distributed on an "AS IS" BASIS,
15 //   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 //   See the License for the specific language governing permissions and
17 //   limitations under the License.
18 //   ========================LICENSE_END===================================
19 //
20
21 package main
22
23 import (
24         "flag"
25         "fmt"
26         "net/http"
27
28         "github.com/getkin/kin-openapi/openapi3"
29         "github.com/labstack/echo/v4"
30         "helm.sh/helm/v3/pkg/cli"
31         "oransc.org/nonrtric/capifcore/internal/common29122"
32         "oransc.org/nonrtric/capifcore/internal/discoverserviceapi"
33         "oransc.org/nonrtric/capifcore/internal/invokermanagementapi"
34         "oransc.org/nonrtric/capifcore/internal/providermanagementapi"
35         "oransc.org/nonrtric/capifcore/internal/securityapi"
36
37         "github.com/deepmap/oapi-codegen/pkg/middleware"
38         echomiddleware "github.com/labstack/echo/v4/middleware"
39         log "github.com/sirupsen/logrus"
40         "oransc.org/nonrtric/capifcore/internal/discoverservice"
41         "oransc.org/nonrtric/capifcore/internal/helmmanagement"
42         "oransc.org/nonrtric/capifcore/internal/invokermanagement"
43         "oransc.org/nonrtric/capifcore/internal/providermanagement"
44         "oransc.org/nonrtric/capifcore/internal/publishservice"
45         "oransc.org/nonrtric/capifcore/internal/publishserviceapi"
46         security "oransc.org/nonrtric/capifcore/internal/securityservice"
47 )
48
49 var url string
50 var helmManager helmmanagement.HelmManager
51 var repoName string
52
53 func main() {
54         var port = flag.Int("port", 8090, "Port for CAPIF Core Function HTTP server")
55         flag.StringVar(&url, "chartMuseumUrl", "", "ChartMuseum URL")
56         flag.StringVar(&repoName, "repoName", "capifcore", "Repository name")
57         var logLevelStr = flag.String("loglevel", "Info", "Log level")
58         flag.Parse()
59
60         if loglevel, err := log.ParseLevel(*logLevelStr); err == nil {
61                 log.SetLevel(loglevel)
62         }
63
64         // Add repo
65         helmManager = helmmanagement.NewHelmManager(cli.New())
66         err := helmManager.SetUpRepo(repoName, url)
67         if err != nil {
68                 log.Warnf("No Helm repo added due to: %s", err.Error())
69         }
70
71         go startWebServer(getEcho(), *port)
72
73         log.Info("Server started and listening on port: ", *port)
74
75         keepServerAlive()
76 }
77
78 func getEcho() *echo.Echo {
79         // This is how you set up a basic Echo router
80         e := echo.New()
81         // Log all requests
82         e.Use(echomiddleware.Logger())
83
84         var group *echo.Group
85         // Register ProviderManagement
86         providerManagerSwagger, err := providermanagementapi.GetSwagger()
87         if err != nil {
88                 log.Fatalf("Error loading ProviderManagement swagger spec\n: %s", err)
89         }
90         providerManagerSwagger.Servers = nil
91         providerManager := providermanagement.NewProviderManager()
92         group = e.Group("/api-provider-management/v1")
93         group.Use(middleware.OapiRequestValidator(providerManagerSwagger))
94         providermanagementapi.RegisterHandlersWithBaseURL(e, providerManager, "/api-provider-management/v1")
95
96         // Register PublishService
97         publishServiceSwagger, err := publishserviceapi.GetSwagger()
98         if err != nil {
99                 log.Fatalf("Error loading PublishService swagger spec\n: %s", err)
100         }
101         publishServiceSwagger.Servers = nil
102         publishService := publishservice.NewPublishService(providerManager, helmManager)
103         group = e.Group("/published-apis/v1")
104         group.Use(middleware.OapiRequestValidator(publishServiceSwagger))
105         publishserviceapi.RegisterHandlersWithBaseURL(e, publishService, "/published-apis/v1")
106
107         // Register InvokerManagement
108         invokerManagerSwagger, err := invokermanagementapi.GetSwagger()
109         if err != nil {
110                 log.Fatalf("Error loading InvokerManagement swagger spec\n: %s", err)
111         }
112         invokerManagerSwagger.Servers = nil
113         invokerManager := invokermanagement.NewInvokerManager(publishService)
114         group = e.Group("/api-invoker-management/v1")
115         group.Use(middleware.OapiRequestValidator(invokerManagerSwagger))
116         invokermanagementapi.RegisterHandlersWithBaseURL(e, invokerManager, "/api-invoker-management/v1")
117
118         // Register DiscoverService
119         discoverServiceSwagger, err := discoverserviceapi.GetSwagger()
120         if err != nil {
121                 log.Fatalf("Error loading DiscoverService swagger spec\n: %s", err)
122         }
123         discoverServiceSwagger.Servers = nil
124         discoverService := discoverservice.NewDiscoverService(invokerManager)
125         group = e.Group("/service-apis/v1")
126         group.Use(middleware.OapiRequestValidator(discoverServiceSwagger))
127         discoverserviceapi.RegisterHandlersWithBaseURL(e, discoverService, "/service-apis/v1")
128
129         // Register Security
130         securitySwagger, err := securityapi.GetSwagger()
131         if err != nil {
132                 log.Fatalf("Error loading Security swagger spec\n: %s", err)
133         }
134         securitySwagger.Servers = nil
135         securityService := security.NewSecurity(providerManager, publishService, invokerManager)
136         group = e.Group("/capif-security/v1")
137         group.Use(middleware.OapiRequestValidator(securitySwagger))
138         securityapi.RegisterHandlersWithBaseURL(e, securityService, "/capif-security/v1")
139
140         e.GET("/", hello)
141
142         e.GET("/swagger/:apiName", getSwagger)
143
144         return e
145 }
146
147 func startWebServer(e *echo.Echo, port int) {
148         e.Logger.Fatal(e.Start(fmt.Sprintf("0.0.0.0:%d", port)))
149 }
150
151 func keepServerAlive() {
152         forever := make(chan int)
153         <-forever
154 }
155
156 func hello(c echo.Context) error {
157         return c.String(http.StatusOK, "Hello, World!\n")
158 }
159
160 func getSwagger(c echo.Context) error {
161         var swagger *openapi3.T
162         var err error
163         switch api := c.Param("apiName"); api {
164         case "provider":
165                 swagger, err = providermanagementapi.GetSwagger()
166         case "publish":
167                 swagger, err = publishserviceapi.GetSwagger()
168         case "invoker":
169                 swagger, err = invokermanagementapi.GetSwagger()
170         case "discover":
171                 swagger, err = discoverserviceapi.GetSwagger()
172         case "security":
173                 swagger, err = securityapi.GetSwagger()
174         default:
175                 return c.JSON(http.StatusBadRequest, getProblemDetails("Invalid API name "+api, http.StatusBadRequest))
176         }
177         if err != nil {
178                 return c.JSON(http.StatusInternalServerError, getProblemDetails("Unable to get swagger for API", http.StatusInternalServerError))
179         }
180         return c.JSON(http.StatusOK, swagger)
181 }
182
183 func getProblemDetails(cause string, status int) common29122.ProblemDetails {
184         return common29122.ProblemDetails{
185                 Cause:  &cause,
186                 Status: &status,
187         }
188 }