Newer
Older
for filename in os.listdir(directory):
path = os.path.join(directory, filename)
if filename.startswith("CAPIF-") and id in filename:
os.remove(path)
break
output_path = os.path.join(
self.provider_folder, f"capif_{file_name}_{id}_api.json")
with open(output_path, "w") as outfile:
outfile.write(capif_response_text)
self.logger.info(f"CAPIF response saved to {output_path}")
output_path = os.path.join(
self.provider_folder, "provider_service_ids.json")
if os.path.exists(output_path):
with open(output_path, "r") as outfile:
provider_service_ids = json.load(outfile)
value in provider_service_ids.items() if value == id]
provider_service_ids[file_name] = id
self.provider_service_ids = provider_service_ids
json.dump(provider_service_ids, outfile, indent=4)
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
self.logger.info(
f"API '{file_name}' with ID '{id}' added to Published Apis.")
return json.loads(capif_response_text)
except requests.RequestException as e:
self.logger.error(
f"Request to CAPIF failed: {e} - Response: {response.text}")
raise
except Exception as e:
self.logger.error(
f"Unexpected error during service publication: {e} - Response: {response.text}")
raise
def offboard_provider(self) -> None:
"""
Offboards and deregisters the NEF (Network Exposure Function).
"""
try:
self.offboard_nef()
self.__remove_files()
self.logger.info(
"Provider offboarded and deregistered successfully.")
except Exception as e:
self.logger.error(
f"Failed to offboard and deregister Provider: {e}")
raise
def offboard_nef(self) -> None:
"""
Offboards the NEF (Network Exposure Function) from CAPIF.
"""
try:
self.logger.info("Offboarding the provider")
# Load CAPIF API details
capif_api_details = self.__load_provider_api_details()
url = f"{self.capif_https_url}api-provider-management/v1/registrations/{capif_api_details['capif_registration_id']}"
# Define certificate paths
cert_paths = (
os.path.join(self.provider_folder, "amf.crt"),
os.path.join(self.provider_folder, "AMF_private_key.key")
)
# Send DELETE request to offboard the provider
response = requests.delete(
url,
cert=cert_paths,
verify=os.path.join(self.provider_folder, "ca.crt")
)
response.raise_for_status()
self.logger.info("Offboarding performed successfully")
except requests.exceptions.RequestException as e:
self.logger.error(
f"Error offboarding Provider: {e} - Response: {response.text}")
raise
except Exception as e:
self.logger.error(
f"Unexpected error: {e} - Response: {response.text}")
raise
def __remove_files(self):
self.logger.info("Removing files generated")
try:
folder_path = self.provider_folder
if os.path.exists(folder_path):
# Deletes all content within the folder, including files and subfolders
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
for root, dirs, files in os.walk(folder_path):
for file in files:
os.remove(os.path.join(root, file))
for dir in dirs:
shutil.rmtree(os.path.join(root, dir))
os.rmdir(folder_path)
self.logger.info(
f"All contents in {folder_path} removed successfully.")
else:
self.logger.warning(f"Folder {folder_path} does not exist.")
except Exception as e:
self.logger.error(f"Error during removing folder contents: {e}")
raise
def __load_provider_api_details(self) -> dict:
"""
Loads NEF API details from the CAPIF provider details JSON file.
:return: A dictionary containing NEF API details.
:raises FileNotFoundError: If the CAPIF provider details file is not found.
:raises json.JSONDecodeError: If there is an error decoding the JSON file.
"""
file_path = os.path.join(self.provider_folder,
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
try:
with open(file_path, "r") as file:
return json.load(file)
except FileNotFoundError:
self.logger.error(f"File not found: {file_path}")
raise
except json.JSONDecodeError as e:
self.logger.error(
f"Error decoding JSON from file {file_path}: {e}")
raise
except Exception as e:
self.logger.error(
f"Unexpected error while loading NEF API details: {e}")
raise
def update_provider(self):
self.certs_modifications()
capif_postauth_info = self.__save_capif_ca_root_file_and_get_auth_token()
capif_onboarding_url = capif_postauth_info["ccf_api_onboarding_url"]
access_token = capif_postauth_info["access_token"]
ccf_publish_url = capif_postauth_info["ccf_publish_url"]
onboarding_response = self.update_onboard(
capif_onboarding_url, access_token)
capif_registration_id = onboarding_response["apiProvDomId"]
self.__write_to_file(
onboarding_response, capif_registration_id, ccf_publish_url
)
def certs_modifications(self):
api_details = self.__load_provider_api_details()
apf_count = 0
aef_count = 0
# Iterate over the dictionary keys (the fields of the JSON)
for key in api_details.keys():
if key.startswith("APF"):
apf_count += 1
elif key.startswith("AEF"):
aef_count += 1
# Log the results (or return them, depending on what you need)
self.logger.info(f"Total APFs: {apf_count}, Total AEFs: {aef_count}")
APFscertstoremove = 0
APFscertstoadd = 0
AEFscertstoremove = 0
AEFscertstoadd = 0
if apf_count != self.apfs:
diff = apf_count - self.apfs
if diff < 0:
self.APFscertstoadd = abs(diff)
else:
APFscertstoremove = diff
else:
APFscertstoremove = 0
APFscertstoadd = 0
if aef_count != self.aefs:
diff = aef_count - self.aefs
if diff < 0:
self.AEFscertstoadd = abs(diff)
else:
AEFscertstoremove = diff
else:
AEFscertstoremove = 0
AEFscertstoadd = 0
# Remove APF files in descending order if there are more APFs than there should be
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
if APFscertstoremove:
while apf_count > self.apfs:
# List files starting with "APF-" or "apf-" in the directory
file_path = os.path.join(
self.provider_folder, f"APF-{apf_count}_private_key.key")
os.remove(file_path)
self.logger.info(
f"Removed APF file: APF-{apf_count}_private_key.key")
file_path = os.path.join(
self.provider_folder, f"APF-{apf_count}_public.csr")
os.remove(file_path)
self.logger.info(
f"Removed APF file: APF-{apf_count}_public.csr")
file_path = os.path.join(
self.provider_folder, f"apf-{apf_count}.crt")
os.remove(file_path)
self.logger.info(f"Removed APF file: apf-{apf_count}.crt")
# Decrease the APF count
apf_count -= 1
# Remove AEF files in descending order if there are more AEFs than there should be
if AEFscertstoremove:
while aef_count > self.aefs:
# List files starting with "AEF-" or "aef-" in the directory
file_path = os.path.join(
self.provider_folder, f"AEF-{aef_count}_private_key.key")
os.remove(file_path)
self.logger.info(
f"Removed AEF file: AEF-{aef_count}_private_key.key")
file_path = os.path.join(
self.provider_folder, f"AEF-{aef_count}_public.csr")
os.remove(file_path)
self.logger.info(
f"Removed AEF file: AEF-{aef_count}_public.csr")
file_path = os.path.join(
self.provider_folder, f"aef-{aef_count}.crt")
os.remove(file_path)
self.logger.info(f"Removed AEF file: aef-{aef_count}.crt")
# Decrease the APF count
aef_count -= 1
def update_onboard(self, capif_onboarding_url, access_token):
self.logger.info(
"Onboarding Provider to CAPIF and waiting signed certificate by giving our public keys to CAPIF")
api_details = self.__load_provider_api_details()
capif_id = "/" + api_details["capif_registration_id"]
url = f"{self.capif_https_url}{capif_onboarding_url}{capif_id}"
headers = {
"Authorization": f"Bearer {access_token}",
"Content-Type": "application/json",
}
roles = ["AMF"]
for n in range(1, self.aefs + 1):
roles.append("AEF")
for n in range(1, self.apfs + 1):
roles.append("APF")
{"regInfo": {"apiProvPubKey": ""}, "apiProvFuncRole": role,
"apiProvFuncInfo": f"{role.lower()}"}
for role in roles
],
"apiProvDomInfo": "This is provider",
"failReason": "string",
"regSec": access_token,
}
# Generate the indexed roles for certificate creation
indexed_roles = ["AMF"] + [f"AEF-{n}" for n in range(1, self.aefs + 1)] + [
f"APF-{n}" for n in range(1, self.apfs + 1)]
for i, api_func in enumerate(payload["apiProvFuncs"]):
found_key = False # Variable to control if a public key has already been found
for root, dirs, files in os.walk(folder_path):
for file_name in files:
if file_name.endswith(".csr"):
# Check if the file starts with the expected role
role_prefix = indexed_roles[i]
if any(file_name.startswith(prefix) and role_prefix == prefix for prefix in [f"APF-{i+1}", f"AEF-{i+1}", "AMF"]):
file_path = os.path.join(root, file_name)
with open(file_path, "r") as csr_file:
api_func["regInfo"]["apiProvPubKey"] = csr_file.read(
)
found_key = True
break
if found_key:
break
# If a file with the public key is not found, generate a new key
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
if not found_key:
public_key = self.__create_private_and_public_keys(
indexed_roles[i])
api_func["regInfo"]["apiProvPubKey"] = public_key.decode(
"utf-8")
cert = (
os.path.join(self.provider_folder, "amf.crt"),
os.path.join(self.provider_folder, "AMF_private_key.key"),
)
try:
response = requests.put(
url,
headers=headers,
data=json.dumps(payload),
cert=cert,
verify=os.path.join(self.provider_folder, "ca.crt"),
)
response.raise_for_status()
self.logger.info(
"Provider onboarded and signed certificate obtained successfully")
return response.json()
except requests.exceptions.RequestException as e:
self.logger.error(
f"Onboarding failed: {e} - Response: {response.text}")
raise