diff --git a/setup.sh b/setup.sh new file mode 100644 index 0000000..81d879f --- /dev/null +++ b/setup.sh @@ -0,0 +1,593 @@ +#!/bin/bash + +# Colors for output +RED='\033[0;31m' +GREEN='\033[0;32m' +YELLOW='\033[1;33m' +BLUE='\033[0;34m' +NC='\033[0m' # No Color + +echo -e "${BLUE}========================================${NC}" +echo -e "${BLUE}Beckn-ONIX Complete Setup${NC}" +echo -e "${BLUE}========================================${NC}" + +# Check if Docker is running +if ! docker info > /dev/null 2>&1; then + echo -e "${RED}Error: Docker is not running. Please start Docker first.${NC}" + exit 1 +fi + +# Step 1: Run the Beckn network installer +echo -e "${YELLOW}Step 1: Setting up Beckn network services...${NC}" + +# Check if install directory exists +#if [ ! -d "./install" ]; then +# echo -e "${RED}Error: install directory not found.${NC}" +# exit 1 +#fi + +# Make the installer executable +chmod +x ./install/beckn-onix.sh + +# Navigate to install directory and run setup +cd install + +# Auto-select option 3 (local setup) for the installer +#echo -e "${GREEN}Running local network setup...${NC}" +#echo "3" | ./beckn-onix.sh + +cd .. + +# Wait for services to stabilize +echo -e "${YELLOW}Waiting for services to be ready...${NC}" +sleep 15 + +# Step 2: Configure Vault for key management +echo -e "${YELLOW}Step 2: Setting up Vault for key management...${NC}" + +# Check if Vault is running, if not start it +if ! docker ps | grep -q "vault"; then + echo -e "${BLUE}Starting Vault container...${NC}" + docker run -d \ + --name vault \ + --cap-add=IPC_LOCK \ + -e VAULT_DEV_ROOT_TOKEN_ID=root \ + -e VAULT_DEV_LISTEN_ADDRESS=0.0.0.0:8200 \ + -p 8200:8200 \ + hashicorp/vault:latest > /dev/null 2>&1 + + # Wait for Vault to be ready + echo -e "${BLUE}Waiting for Vault to start...${NC}" + for i in {1..30}; do + if docker exec -e VAULT_ADDR=http://127.0.0.1:8200 vault vault status > /dev/null 2>&1; then + echo -e "${GREEN}✓ Vault is ready${NC}" + break + fi + if [ $i -eq 30 ]; then + echo -e "${RED}Error: Vault failed to start${NC}" + exit 1 + fi + sleep 1 + done +fi + +# Configure Vault with error handling +echo -e "${BLUE}Configuring Vault policies...${NC}" + +# Enable AppRole auth +if ! docker exec -e VAULT_ADDR=http://127.0.0.1:8200 -e VAULT_TOKEN=root vault \ + vault auth list 2>/dev/null | grep -q "approle"; then + docker exec -e VAULT_ADDR=http://127.0.0.1:8200 -e VAULT_TOKEN=root vault \ + vault auth enable approle 2>/dev/null || { + echo -e "${YELLOW}AppRole already enabled or error occurred${NC}" + } +fi + +# Create policy +echo 'path "beckn/*" { capabilities = ["create", "read", "update", "delete", "list"] }' | \ + docker exec -i -e VAULT_ADDR=http://127.0.0.1:8200 -e VAULT_TOKEN=root vault \ + vault policy write beckn-policy - > /dev/null 2>&1 || { + echo -e "${YELLOW}Policy already exists or updated${NC}" + } + +# Create role +docker exec -e VAULT_ADDR=http://127.0.0.1:8200 -e VAULT_TOKEN=root vault \ + vault write auth/approle/role/beckn-role \ + token_policies="beckn-policy" \ + token_ttl=24h \ + token_max_ttl=48h > /dev/null 2>&1 || { + echo -e "${YELLOW}Role already exists or updated${NC}" + } + +# Get Vault credentials with error handling +echo -e "${BLUE}Getting Vault credentials...${NC}" +ROLE_ID=$(docker exec -e VAULT_ADDR=http://127.0.0.1:8200 -e VAULT_TOKEN=root vault \ + vault read -field=role_id auth/approle/role/beckn-role/role-id 2>/dev/null) + +if [ -z "$ROLE_ID" ]; then + echo -e "${RED}Error: Failed to get ROLE_ID from Vault${NC}" + exit 1 +fi + +SECRET_ID=$(docker exec -e VAULT_ADDR=http://127.0.0.1:8200 -e VAULT_TOKEN=root vault \ + vault write -field=secret_id -f auth/approle/role/beckn-role/secret-id 2>/dev/null) + +if [ -z "$SECRET_ID" ]; then + echo -e "${RED}Error: Failed to get SECRET_ID from Vault${NC}" + exit 1 +fi + +echo -e "${GREEN}✓ Got Vault credentials:${NC}" +echo -e " ROLE_ID: ${ROLE_ID:0:20}..." +echo -e " SECRET_ID: ${SECRET_ID:0:20}..." + +# Enable KV v2 secrets engine +docker exec -e VAULT_ADDR=http://127.0.0.1:8200 -e VAULT_TOKEN=root vault \ + vault secrets enable -path=beckn kv-v2 > /dev/null 2>&1 || { + echo -e "${YELLOW}Secrets engine already enabled${NC}" + } + +echo -e "${GREEN}✓ Vault configured successfully${NC}" + +# Seed the keys for BAP network +echo -e "${BLUE}Seeding keys for BAP network...${NC}" +docker exec -e VAULT_ADDR=http://127.0.0.1:8200 -e VAULT_TOKEN=root vault \ + vault kv put secret/keys/bap-network \ + signingPublicKey='1ct6/Xg6gHhT9QolufThbY4mWHYkIpXzh7YxMFM8MQE=' \ + signingPrivateKey='C2hPMyeN+1Vzn8+7F/MUHmR5jKFuSb7s6tf/U5qni8vVy3r9eDqAeFP1CiW59OFtjiZYdiQilfOHtjEwUzwxAQ==' > /dev/null 2>&1 + +if [ $? -eq 0 ]; then + echo -e "${GREEN}✓ BAP network keys seeded successfully${NC}" +else + echo -e "${YELLOW}Warning: Failed to seed BAP network keys or keys already exist${NC}" +fi + +# Step 3: Check services status +echo -e "${YELLOW}Step 3: Checking services status...${NC}" + +# Check if services are running +if docker ps | grep -q "registry"; then + echo -e "${GREEN}✓ Registry is running${NC}" +fi +if docker ps | grep -q "gateway"; then + echo -e "${GREEN}✓ Gateway is running${NC}" +fi +if docker ps | grep -q "bap-client"; then + echo -e "${GREEN}✓ BAP services are running${NC}" +fi +if docker ps | grep -q "bpp-client"; then + echo -e "${GREEN}✓ BPP services are running${NC}" +fi +if docker ps | grep -q "vault"; then + echo -e "${GREEN}✓ Vault is running${NC}" +fi + +# Step 4: Create required directories +echo -e "${YELLOW}Step 4: Creating required directories...${NC}" + +# Create schemas directory for validation +if [ ! -d "schemas" ]; then + mkdir -p schemas + echo -e "${GREEN}✓ Created schemas directory${NC}" +else + echo -e "${YELLOW}schemas directory already exists${NC}" +fi + +# Create logs directory +if [ ! -d "logs" ]; then + mkdir -p logs + echo -e "${GREEN}✓ Created logs directory${NC}" +else + echo -e "${YELLOW}logs directory already exists${NC}" +fi + +# Create plugins directory if not exists +if [ ! -d "plugins" ]; then + mkdir -p plugins + echo -e "${GREEN}✓ Created plugins directory${NC}" +else + echo -e "${YELLOW}plugins directory already exists${NC}" +fi + +# Step 5: Build adapter plugins +echo -e "${YELLOW}Step 5: Building adapter plugins...${NC}" + +if [ -f "./install/build-plugins.sh" ]; then + chmod +x ./install/build-plugins.sh + ./install/build-plugins.sh + if [ $? -eq 0 ]; then + echo -e "${GREEN}✓ Plugins built successfully${NC}" + else + echo -e "${RED}Error: Plugin build failed${NC}" + exit 1 + fi +else + echo -e "${RED}Error: install/build-plugins.sh not found${NC}" + exit 1 +fi + +# Step 6: Build the adapter server +echo -e "${YELLOW}Step 6: Building Beckn-ONIX adapter server...${NC}" + +if [ -f "go.mod" ]; then + go build -o beckn-adapter cmd/adapter/main.go + if [ $? -eq 0 ]; then + echo -e "${GREEN}✓ Adapter server built successfully${NC}" + else + echo -e "${RED}Error: Failed to build adapter server${NC}" + echo -e "${YELLOW}Please check Go installation and dependencies${NC}" + exit 1 + fi +else + echo -e "${RED}Error: go.mod not found${NC}" + exit 1 +fi + +# Step 7: Create environment file +echo -e "${YELLOW}Step 7: Creating environment configuration...${NC}" + +# Check if we have Vault credentials +if [ -z "$ROLE_ID" ] || [ -z "$SECRET_ID" ]; then + echo -e "${RED}Error: Vault credentials not available${NC}" + echo -e "${YELLOW}Please check Vault configuration and try again${NC}" + exit 1 +fi + +cat > .env < /dev/null 2>&1; then + echo -e "${RED}Error: Docker is not running. Please start Docker first.${NC}" + exit 1 +fi + +# Step 1: Run the Beckn network installer +echo -e "${YELLOW}Step 1: Setting up Beckn network services...${NC}" + +# Check if install directory exists +#if [ ! -d "./install" ]; then +# echo -e "${RED}Error: install directory not found.${NC}" +# exit 1 +#fi + +# Make the installer executable +chmod +x ./install/beckn-onix.sh + +# Navigate to install directory and run setup +cd install + +# Auto-select option 3 (local setup) for the installer +#echo -e "${GREEN}Running local network setup...${NC}" +#echo "3" | ./beckn-onix.sh + +cd .. + +# Wait for services to stabilize +echo -e "${YELLOW}Waiting for services to be ready...${NC}" +sleep 15 + +# Step 2: Configure Vault for key management +echo -e "${YELLOW}Step 2: Setting up Vault for key management...${NC}" + +# Check if Vault is running, if not start it +if ! docker ps | grep -q "vault"; then + echo -e "${BLUE}Starting Vault container...${NC}" + docker run -d \ + --name vault \ + --cap-add=IPC_LOCK \ + -e VAULT_DEV_ROOT_TOKEN_ID=root \ + -e VAULT_DEV_LISTEN_ADDRESS=0.0.0.0:8200 \ + -p 8200:8200 \ + hashicorp/vault:latest > /dev/null 2>&1 + + # Wait for Vault to be ready + echo -e "${BLUE}Waiting for Vault to start...${NC}" + for i in {1..30}; do + if docker exec -e VAULT_ADDR=http://127.0.0.1:8200 vault vault status > /dev/null 2>&1; then + echo -e "${GREEN}✓ Vault is ready${NC}" + break + fi + if [ $i -eq 30 ]; then + echo -e "${RED}Error: Vault failed to start${NC}" + exit 1 + fi + sleep 1 + done +fi + +# Configure Vault with error handling +echo -e "${BLUE}Configuring Vault policies...${NC}" + +# Enable AppRole auth +if ! docker exec -e VAULT_ADDR=http://127.0.0.1:8200 -e VAULT_TOKEN=root vault \ + vault auth list 2>/dev/null | grep -q "approle"; then + docker exec -e VAULT_ADDR=http://127.0.0.1:8200 -e VAULT_TOKEN=root vault \ + vault auth enable approle 2>/dev/null || { + echo -e "${YELLOW}AppRole already enabled or error occurred${NC}" + } +fi + +# Create policy +echo 'path "beckn/*" { capabilities = ["create", "read", "update", "delete", "list"] }' | \ + docker exec -i -e VAULT_ADDR=http://127.0.0.1:8200 -e VAULT_TOKEN=root vault \ + vault policy write beckn-policy - > /dev/null 2>&1 || { + echo -e "${YELLOW}Policy already exists or updated${NC}" + } + +# Create role +docker exec -e VAULT_ADDR=http://127.0.0.1:8200 -e VAULT_TOKEN=root vault \ + vault write auth/approle/role/beckn-role \ + token_policies="beckn-policy" \ + token_ttl=24h \ + token_max_ttl=48h > /dev/null 2>&1 || { + echo -e "${YELLOW}Role already exists or updated${NC}" + } + +# Get Vault credentials with error handling +echo -e "${BLUE}Getting Vault credentials...${NC}" +ROLE_ID=$(docker exec -e VAULT_ADDR=http://127.0.0.1:8200 -e VAULT_TOKEN=root vault \ + vault read -field=role_id auth/approle/role/beckn-role/role-id 2>/dev/null) + +if [ -z "$ROLE_ID" ]; then + echo -e "${RED}Error: Failed to get ROLE_ID from Vault${NC}" + exit 1 +fi + +SECRET_ID=$(docker exec -e VAULT_ADDR=http://127.0.0.1:8200 -e VAULT_TOKEN=root vault \ + vault write -field=secret_id -f auth/approle/role/beckn-role/secret-id 2>/dev/null) + +if [ -z "$SECRET_ID" ]; then + echo -e "${RED}Error: Failed to get SECRET_ID from Vault${NC}" + exit 1 +fi + +echo -e "${GREEN}✓ Got Vault credentials:${NC}" +echo -e " ROLE_ID: ${ROLE_ID:0:20}..." +echo -e " SECRET_ID: ${SECRET_ID:0:20}..." + +# Enable KV v2 secrets engine +docker exec -e VAULT_ADDR=http://127.0.0.1:8200 -e VAULT_TOKEN=root vault \ + vault secrets enable -path=beckn kv-v2 > /dev/null 2>&1 || { + echo -e "${YELLOW}Secrets engine already enabled${NC}" + } + +echo -e "${GREEN}✓ Vault configured successfully${NC}" + +# Seed the keys for BAP network +echo -e "${BLUE}Seeding keys for BAP network...${NC}" +docker exec -e VAULT_ADDR=http://127.0.0.1:8200 -e VAULT_TOKEN=root vault \ + vault kv put secret/keys/bap-network \ + signingPublicKey='1ct6/Xg6gHhT9QolufThbY4mWHYkIpXzh7YxMFM8MQE=' \ + signingPrivateKey='C2hPMyeN+1Vzn8+7F/MUHmR5jKFuSb7s6tf/U5qni8vVy3r9eDqAeFP1CiW59OFtjiZYdiQilfOHtjEwUzwxAQ==' > /dev/null 2>&1 + +if [ $? -eq 0 ]; then + echo -e "${GREEN}✓ BAP network keys seeded successfully${NC}" +else + echo -e "${YELLOW}Warning: Failed to seed BAP network keys or keys already exist${NC}" +fi + +# Step 3: Check services status +echo -e "${YELLOW}Step 3: Checking services status...${NC}" + +# Check if services are running +if docker ps | grep -q "registry"; then + echo -e "${GREEN}✓ Registry is running${NC}" +fi +if docker ps | grep -q "gateway"; then + echo -e "${GREEN}✓ Gateway is running${NC}" +fi +if docker ps | grep -q "bap-client"; then + echo -e "${GREEN}✓ BAP services are running${NC}" +fi +if docker ps | grep -q "bpp-client"; then + echo -e "${GREEN}✓ BPP services are running${NC}" +fi +if docker ps | grep -q "vault"; then + echo -e "${GREEN}✓ Vault is running${NC}" +fi + +# Step 4: Create required directories +echo -e "${YELLOW}Step 4: Creating required directories...${NC}" + +# Create schemas directory for validation +if [ ! -d "schemas" ]; then + mkdir -p schemas + echo -e "${GREEN}✓ Created schemas directory${NC}" +else + echo -e "${YELLOW}schemas directory already exists${NC}" +fi + +# Create logs directory +if [ ! -d "logs" ]; then + mkdir -p logs + echo -e "${GREEN}✓ Created logs directory${NC}" +else + echo -e "${YELLOW}logs directory already exists${NC}" +fi + +# Create plugins directory if not exists +if [ ! -d "plugins" ]; then + mkdir -p plugins + echo -e "${GREEN}✓ Created plugins directory${NC}" +else + echo -e "${YELLOW}plugins directory already exists${NC}" +fi + +# Step 5: Build adapter plugins +echo -e "${YELLOW}Step 5: Building adapter plugins...${NC}" + +if [ -f "./install/build-plugins.sh" ]; then + chmod +x ./install/build-plugins.sh + ./install/build-plugins.sh + if [ $? -eq 0 ]; then + echo -e "${GREEN}✓ Plugins built successfully${NC}" + else + echo -e "${RED}Error: Plugin build failed${NC}" + exit 1 + fi +else + echo -e "${RED}Error: install/build-plugins.sh not found${NC}" + exit 1 +fi + +# Step 6: Build the adapter server +echo -e "${YELLOW}Step 6: Building Beckn-ONIX adapter server...${NC}" + +if [ -f "go.mod" ]; then + go build -o beckn-adapter cmd/adapter/main.go + if [ $? -eq 0 ]; then + echo -e "${GREEN}✓ Adapter server built successfully${NC}" + else + echo -e "${RED}Error: Failed to build adapter server${NC}" + echo -e "${YELLOW}Please check Go installation and dependencies${NC}" + exit 1 + fi +else + echo -e "${RED}Error: go.mod not found${NC}" + exit 1 +fi + +# Step 7: Create environment file +echo -e "${YELLOW}Step 7: Creating environment configuration...${NC}" + +# Check if we have Vault credentials +if [ -z "$ROLE_ID" ] || [ -z "$SECRET_ID" ]; then + echo -e "${RED}Error: Vault credentials not available${NC}" + echo -e "${YELLOW}Please check Vault configuration and try again${NC}" + exit 1 +fi + +cat > .env <