set server truststore params as optional
[aai/data-router.git] / src / main / java / org / onap / aai / datarouter / Application.java
index dfd8144..1a2a5e7 100644 (file)
  */
 package org.onap.aai.datarouter;
 
-import org.springframework.boot.SpringApplication;
+import java.util.HashMap;
+import javax.annotation.PostConstruct;
+import org.apache.camel.component.servlet.CamelHttpTransportServlet;
+import org.eclipse.jetty.util.security.Password;
+import org.onap.aai.config.EdgesConfiguration;
+import org.springframework.beans.factory.annotation.Autowired;
 import org.springframework.boot.autoconfigure.SpringBootApplication;
+import org.springframework.boot.builder.SpringApplicationBuilder;
+import org.springframework.boot.web.servlet.ServletRegistrationBean;
+import org.springframework.boot.web.support.SpringBootServletInitializer;
+import org.springframework.context.annotation.Bean;
+import org.springframework.context.annotation.ComponentScan;
+import org.springframework.context.annotation.PropertySource;
+import org.springframework.core.env.Environment;
+import org.springframework.context.annotation.FilterType;
 
 
 @SpringBootApplication
-public class Application {
+@ComponentScan(basePackages = {"org.onap.aai.config", "org.onap.aai.setup", "org.onap.aai.datarouter"}, excludeFilters = {
+@ComponentScan.Filter(type = FilterType.ASSIGNABLE_TYPE,
+value = EdgesConfiguration.class)})
+@PropertySource(value = "file:${CONFIG_HOME}/schemaIngest.properties")
+public class Application extends SpringBootServletInitializer{
+
+    private static final String CAMEL_URL_MAPPING = "/*";
+    private static final String CAMEL_SERVLET_NAME = "CamelServlet";
+    private static final String JETTY_OBFUSCATION_PATTERN = "OBF:";
+
+    @Autowired
+    private Environment env;
 
     public static void main(String[] args) {
-        SpringApplication.run(Application.class, args);
+      String keyStorePassword = System.getenv("KEY_STORE_PASSWORD");
+      if(keyStorePassword==null || keyStorePassword.isEmpty()){
+        throw new RuntimeException("Env property KEY_STORE_PASSWORD not set");
+      }
+      
+      HashMap<String, Object> props = new HashMap<>();
+      String deobfuscatedKeyStorePassword = keyStorePassword.startsWith(JETTY_OBFUSCATION_PATTERN)?Password.deobfuscate(keyStorePassword):keyStorePassword;
+      props.put("server.ssl.key-store-password", deobfuscatedKeyStorePassword);
+      
+      String trustStoreLocation = System.getenv("TRUST_STORE_LOCATION");
+      String trustStorePassword = System.getenv("TRUST_STORE_PASSWORD");
+      if(trustStoreLocation!=null && trustStorePassword !=null){
+          trustStorePassword = trustStorePassword.startsWith(JETTY_OBFUSCATION_PATTERN)?Password.deobfuscate(trustStorePassword):trustStorePassword;
+          props.put("server.ssl.trust-store", trustStoreLocation);
+          props.put("server.ssl.trust-store-password", trustStorePassword);
+      } 
+      
+
+      new Application().configure(new SpringApplicationBuilder(Application.class).properties(props)).run(args);
+    }
+
+    @Bean
+    public ServletRegistrationBean getServletRegistrationBean() {
+        ServletRegistrationBean registration = new ServletRegistrationBean(new CamelHttpTransportServlet(), CAMEL_URL_MAPPING);
+        registration.setName(CAMEL_SERVLET_NAME);
+        return registration;
+    }
+
+    /**
+      * Set required system properties using values from application.properties and schemaIngest.properties
+     */
+    @PostConstruct
+    public void setSystemProperties() {
+        String trustStorePath = env.getProperty("server.ssl.key-store");
+        if (trustStorePath != null) {
+            String trustStorePassword = env.getProperty("server.ssl.key-store-password");
+
+            if (trustStorePassword != null) {
+                System.setProperty("javax.net.ssl.trustStore", trustStorePath);
+                System.setProperty("javax.net.ssl.trustStorePassword", trustStorePassword);
+            } else {
+                throw new IllegalArgumentException("Env property server.ssl.key-store-password not set");
+            }
+        }
+
+        String schemaServiceKeyStorePassword = env.getProperty("schema.service.ssl.key-store-password");
+        if( (schemaServiceKeyStorePassword != null) && (schemaServiceKeyStorePassword.startsWith(JETTY_OBFUSCATION_PATTERN))){
+          System.setProperty("schema.service.ssl.key-store-password", Password.deobfuscate(schemaServiceKeyStorePassword));
+        }
+
+        String schemaServiceTrustStorePassword = env.getProperty("schema.service.ssl.trust-store-password");
+        if ( (schemaServiceTrustStorePassword != null) && (schemaServiceTrustStorePassword.startsWith(JETTY_OBFUSCATION_PATTERN)) ){
+          System.setProperty("schema.service.ssl.trust-store-password", Password.deobfuscate(schemaServiceTrustStorePassword));
+        }
+
     }
 
+
 }
\ No newline at end of file