Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

CAPIF stands for common API framework and it was developed by 3GPP to enable a unified Northbound API framework across 3GPP network functions, and to ensure that there is a single and harmonized approach for API development.

Among its key features  are:

  • Onboarding/offboarding API invoker
  • Discovery APIs
  • Register/deregister APIs
  • CAPIF events subscription/notification
  • Entity authentication/authorization
  • Support for 3rd party domains i.e., allow 3rd party API providers to leverage the CAPIF framework
  • Support interconnection between two CAPIF providers

Functional entities

CAPIF Functional Model

CAPIF core function

The CAPIF core function consists of the following capabilities:

-  Authenticating the API invoker based on the identity and other information required for authentication of the API invoker;

-  Supporting mutual authentication with the API invoker;

-  Providing authorization for the API invoker prior to accessing the service API;

-  Publishing, storing and supporting the discovery of service APIs information;

-  Monitoring the service API invocations;

-  Onboarding a new API invoker and offboarding an API invoker;

-  Supports publishing, discovery of service APIs information with another CAPIF core function in CAPIF interconnection.

API invoker

The API invoker is the entity which invokes the CAPIF or service APIs, typically provided by a 3rd party application provider who has service agreement with PLMN operator.

The API invoker supports the following capabilities:

-  Triggering API invoker onboarding/offboarding;

-  Supporting the authentication by providing the API invoker identity and other information required for authentication of the API invoker;

-  Supporting mutual authentication with CAPIF;

-  Obtaining the authorization prior to accessing the service API;

-  Discovering service APIs information; and

-  Invoking the service APIs.

API provider domain

API exposing function  

The entity which provides the service communication entry point for the service APIs. Provides access control, logging, charging, provides authentication and authorization support.

API publishing function

The entity that enables the API provider to publish the Service APIs information in order to enable the discovery of APIs by the API invoker.

API management function

The entity which registers and maintains registration information of the API provider domain functions on the CAPIF core function

CAPIF core function APIs

The table below lists the CAPIF Core Function APIs that are currently implemented:


Service Name

Service Operations

Operation Semantics

Consumer(s)

CAPIF_Discover_Service_API

Discover_Service_API

GET /allServiceAPIs

API Invoker, CAPIF core function

CAPIF_Publish_Service_API

Publish_Service_API

POST /{apfId}//service-apis

API Publishing Function, CAPIF core function

Unpublish_Service_API

DELETE /{apfId/service-apis/{serviceApiId}

API Publishing Function, CAPIF core function

Update_Service_API

PUT /{apfId/service-apis/{serviceApiId}

API Publishing Function, CAPIF core function

Get_Service_API

GET /{apfId}/service-apis

API Publishing Function, CAPIF core function

CAPIF_API_Invoker_Management_API

Onboard_API_Invoker

POST /onboardedInvokers

API Invoker

Offboard_API_Invoker

DELETE /onboardedInvokers/{onboardingId}

API Invoker

Notify_Onboarding_Completion

Subscribe/Notify

API Invoker

Update_API_Invoker_Details

PUT /onboardedInvokers/{onboardingId}

API Invoker

Notify_Update_Completion

Subscribe/Notify

API Invoker

CAPIF_Security_API

Obtain_Security_Method

PUT /trustedInvokers/{apiInvokerId}

API Invoker

Obtain_Authorization

POST /securities/{securityId}/token

API Invoker

Obtain_API_Invoker_Info

GET /trustedInvokers/{apiInvokerId}

API exposing function

Revoke_Authorization

DELETE /trustedInvokers/{apiInvokerId}

API exposing function

CAPIF_API_Provider_Management_API

Register_API_Provider

POST /registrations

API Management Function

Update_API_Provider

PUT /registrations/{registrationId}

API Management Function

Deregister_API_Provider

DELETE /registrations/{registrationId}

API Management Function

Examples to use CAPIF core function APIs

Register provider domain 

POST http://<CAPIF core URL>/api-provider-management/v1/registrations

Request body: APIProviderEnrolmentDetails


APIProviderEnrolmentDetails example
{
    "apiProvDomInfo": "Provider domain",
    "apiProvFuncs": [
        {
            "apiProvFuncInfo": "rApp as APF",
            "apiProvFuncRole": "APF",
            "regInfo": {
                "apiProvPubKey": "APF-PublicKey"
            }
        },
        {
            "apiProvFuncInfo": "rApp as AEF",
            "apiProvFuncRole": "AEF",
            "regInfo": {
                "apiProvPubKey": "AEF-PublicKey"
            }
        },
        {
            "apiProvFuncInfo": "rApp as AMF",
            "apiProvFuncRole": "AMF",
            "regInfo": {
                "apiProvPubKey": "AMF-PublicKey"
            }
        },
        {
            "apiProvFuncInfo": "Gateway as entrypoint AEF",
            "apiProvFuncRole": "AEF",
            "regInfo": {
                "apiProvPubKey": "AEF-Gateway-PublicKey"
            }
        }
    ],
    "regSec": "PSK"
}

Publish a new API

POST http://<CAPIF core URL>/published-apis/v1/APF_id_rApp_as_APF/service-apis

Request body: ServiceAPIDescription

ServiceAPIDescription - example
{
    "apiName": "example A",
    "description": "Example A API of rApp",
    "aefProfiles": [
        {
            "aefId": "AEF_id_rApp_as_AEF",
            "description": "Example A rApp as AEF",
            "versions": [
                {
                    "apiVersion": "v1",
                    "resources": [
                        {
                            "resourceName": "exampleA",
                            "commType": "REQUEST_RESPONSE",
                            "uri": "/exampleA/subscription/subscription_id_1",
                            "operations": [
                                "GET"
                            ]
                        }
                    ]
                }
            ],
            "protocol": "HTTP_1_1",
			"securityMethods": ["PSK"],
			"interfaceDescriptions": [
				{
				  "ipv4Addr": "string",
				  "port": 65535,
				  "securityMethods": ["PKI"]
				},
				{
				  "ipv4Addr": "string",
				  "port": 65535,
				  "securityMethods": ["PKI"]
				}
			  ]
        }
    ]
}


Onboard API invoker

POST http://<CAPIF core URL>/api-invoker-management/v1/onboardedInvokers

Request body: APIInvokerEnrolmentDetails


APIInvokerEnrolmentDetails - example
{
    "apiInvokerInformation": "rApp as invoker 1",
	 "apiList": [
		{}
	],
    "NotificationDestination": "http://invoker-app:8086/callback",
    "onboardingInformation": {
		"apiInvokerPublicKey": "{PUBLIC_KEY_INVOKER_1}",
		"apiInvokerCertificate": "apiInvokerCertificate"
  },
  "requestTestNotification": true
}


More examples can be found in the postman collection below:

Postman collection

Build CAPIF core

Download the following repos:

git clone "https://gerrit.o-ran-sc.org/r/nonrtric/plt/sme" 

To build the application, go into the repo and run the following command:

cd sme/capifcore
go build

    
To run the unit tests for the application, run the following command:

go test ./...



The application can also be built as a Docker image, by using the following command. Use the version found in the file container-tag.yaml.

docker build -t o-ran-sc/nonrtric-plt-capifcore:<image-version> .

Run CAPIF core


The CAPIF core needs one configuration file for keycloak including information about keycloak host (url, port and authentication for admin user) and realms. Before using CAPIF API invoker management, an invoker realm must be created in keycloak. Make sure it is created before running CAPIF core. After creating the realm in keycloak, set the name in the keycloak.yaml configuration file.

keycloak.yaml
# Keycloak configurations
authorizationServer:
  host: "keycloak"
  port: "8080"
  admin:
    user: "admin"
    password: "secret"
  realms:
   master: "master"
   invokerrealm: "invokerrealm"


There are a number of environment variables that could be set when starting the application, however they have values by default so there is no need to set them unless specific values are needed.

  • -port <port (default 8090)>
  • -secPort <Secure port (default 4433)>
  • -chartMuseumUrl <URL to ChartMuseum>
  • -repoName <Helm repo name (default capifcore)>
  • -loglevel <log level (default Info)>
  • -certPath <Path to certificate>
  • -keyPath <Path to private key>


To run the Core Function from the command line, run the following commands from this folder. For the parameter `chartMuseumUrl`, if it is not provided CAPIF Core will not do any Helm integration, i.e. try to start any Halm chart when publishing a service.

 ./capifcore [-port <port (default 8090)>] [-secPort <Secure port (default 4433)>] [-chartMuseumUrl <URL to ChartMuseum>] [-repoName <Helm repo name (default capifcore)>] [-loglevel <log level (default Info)>] [-certPath <Path to certificate>] [-keyPath <Path to private key>] 


There is a docker compose file available that can be use to start CAPIF core together with Keycloak:

docker-compose up


NOTE! In the configuration file in configs/keycloak.yaml when running locally the host value must be set to localhost (Eg. host: "localhost") and when using docker-compose set value to keycloak (Eg. host:"keycloak")

  • No labels