Upversion artifacts to 1.8.0-SNAPSHOT
[aai/data-router.git] / src / main / java / org / onap / aai / datarouter / Application.java
1 /**
2  * ============LICENSE_START=======================================================
3  * org.onap.aai
4  * ================================================================================
5  * Copyright © 2017-2018 AT&T Intellectual Property. All rights reserved.
6  * Copyright © 2017-2018 Amdocs
7  * ================================================================================
8  * Licensed under the Apache License, Version 2.0 (the "License");
9  * you may not use this file except in compliance with the License.
10  * You may obtain a copy of the License at
11  *
12  *       http://www.apache.org/licenses/LICENSE-2.0
13  *
14  * Unless required by applicable law or agreed to in writing, software
15  * distributed under the License is distributed on an "AS IS" BASIS,
16  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17  * See the License for the specific language governing permissions and
18  * limitations under the License.
19  * ============LICENSE_END=========================================================
20  */
21 package org.onap.aai.datarouter;
22
23 import java.util.HashMap;
24 import javax.annotation.PostConstruct;
25 import org.apache.camel.component.servlet.CamelHttpTransportServlet;
26 import org.eclipse.jetty.util.security.Password;
27 import org.onap.aai.config.EdgesConfiguration;
28 import org.springframework.beans.factory.annotation.Autowired;
29 import org.springframework.boot.autoconfigure.SpringBootApplication;
30 import org.springframework.boot.builder.SpringApplicationBuilder;
31 import org.springframework.boot.web.servlet.ServletRegistrationBean;
32 import org.springframework.boot.web.servlet.support.SpringBootServletInitializer;
33 import org.springframework.context.annotation.Bean;
34 import org.springframework.context.annotation.ComponentScan;
35 import org.springframework.context.annotation.PropertySource;
36 import org.springframework.core.env.Environment;
37 import org.springframework.context.annotation.FilterType;
38
39
40 @SpringBootApplication
41 @ComponentScan(basePackages = {"org.onap.aai.config", "org.onap.aai.setup", "org.onap.aai.datarouter"}, excludeFilters = {
42 @ComponentScan.Filter(type = FilterType.ASSIGNABLE_TYPE,
43 value = EdgesConfiguration.class)})
44 @PropertySource(value = "file:${CONFIG_HOME}/schemaIngest.properties")
45 public class Application extends SpringBootServletInitializer{
46
47     private static final String CAMEL_URL_MAPPING = "/*";
48     private static final String CAMEL_SERVLET_NAME = "CamelServlet";
49     private static final String JETTY_OBFUSCATION_PATTERN = "OBF:";
50
51     @Autowired
52     private Environment env;
53
54     public static void main(String[] args) {
55       String keyStorePassword = System.getenv("KEY_STORE_PASSWORD");
56       if(keyStorePassword==null || keyStorePassword.isEmpty()){
57         throw new RuntimeException("Env property KEY_STORE_PASSWORD not set");
58       }
59       
60       HashMap<String, Object> props = new HashMap<>();
61       String deobfuscatedKeyStorePassword = keyStorePassword.startsWith(JETTY_OBFUSCATION_PATTERN)?Password.deobfuscate(keyStorePassword):keyStorePassword;
62       props.put("server.ssl.key-store-password", deobfuscatedKeyStorePassword);
63       
64       String trustStoreLocation = System.getenv("TRUST_STORE_LOCATION");
65       String trustStorePassword = System.getenv("TRUST_STORE_PASSWORD");
66       if(trustStoreLocation!=null && trustStorePassword !=null){
67           trustStorePassword = trustStorePassword.startsWith(JETTY_OBFUSCATION_PATTERN)?Password.deobfuscate(trustStorePassword):trustStorePassword;
68           props.put("server.ssl.trust-store", trustStoreLocation);
69           props.put("server.ssl.trust-store-password", trustStorePassword);
70       }
71
72       String requireClientAuth = System.getenv("REQUIRE_CLIENT_AUTH");
73       props.put("server.ssl.client-auth",
74           Boolean.FALSE.toString().equalsIgnoreCase(requireClientAuth) ? "want" : "need");
75
76       new Application().configure(new SpringApplicationBuilder(Application.class).properties(props)).run(args);
77     }
78
79     @Bean
80     public ServletRegistrationBean getServletRegistrationBean() {
81         ServletRegistrationBean registration = new ServletRegistrationBean(new CamelHttpTransportServlet(), CAMEL_URL_MAPPING);
82         registration.setName(CAMEL_SERVLET_NAME);
83         return registration;
84     }
85
86     /**
87       * Set required system properties using values from application.properties and schemaIngest.properties
88      */
89     @PostConstruct
90     public void setSystemProperties() {
91         String trustStorePath = env.getProperty("server.ssl.key-store");
92         if (trustStorePath != null) {
93             String trustStorePassword = env.getProperty("server.ssl.key-store-password");
94
95             if (trustStorePassword != null) {
96                 System.setProperty("javax.net.ssl.trustStore", trustStorePath);
97                 System.setProperty("javax.net.ssl.trustStorePassword", trustStorePassword);
98             } else {
99                 throw new IllegalArgumentException("Env property server.ssl.key-store-password not set");
100             }
101         }
102
103         String schemaServiceKeyStorePassword = env.getProperty("schema.service.ssl.key-store-password");
104         if( (schemaServiceKeyStorePassword != null) && (schemaServiceKeyStorePassword.startsWith(JETTY_OBFUSCATION_PATTERN))){
105           System.setProperty("schema.service.ssl.key-store-password", Password.deobfuscate(schemaServiceKeyStorePassword));
106         }
107
108         String schemaServiceTrustStorePassword = env.getProperty("schema.service.ssl.trust-store-password");
109         if ( (schemaServiceTrustStorePassword != null) && (schemaServiceTrustStorePassword.startsWith(JETTY_OBFUSCATION_PATTERN)) ){
110           System.setProperty("schema.service.ssl.trust-store-password", Password.deobfuscate(schemaServiceTrustStorePassword));
111         }
112
113     }
114
115
116 }