Automate the process of policy model uploading
[optf/osdf.git] / osdf / webapp / appcontroller.py
1 # -------------------------------------------------------------------------
2 #   Copyright (c) 2015-2017 AT&T Intellectual Property
3 #
4 #   Licensed under the Apache License, Version 2.0 (the "License");
5 #   you may not use this file except in compliance with the License.
6 #   You may obtain a copy of the License at
7 #
8 #       http://www.apache.org/licenses/LICENSE-2.0
9 #
10 #   Unless required by applicable law or agreed to in writing, software
11 #   distributed under the License is distributed on an "AS IS" BASIS,
12 #   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 #   See the License for the specific language governing permissions and
14 #   limitations under the License.
15 #
16 # -------------------------------------------------------------------------
17 #
18
19 from flask import request
20 from flask_httpauth import HTTPBasicAuth
21 from flask import Response
22 import json
23 import osdf
24 import osdf.config.base as cfg_base
25 from osdf.config.base import osdf_config
26 from osdf.adapters.aaf import aaf_authentication as aaf_auth
27
28 auth_basic = HTTPBasicAuth()
29
30 error_body = {
31     "serviceException": {
32         "text": "Unauthorized, check username and password"
33     }
34 }
35
36 unauthorized_message = json.dumps(error_body)
37
38 @auth_basic.get_password
39 def get_pw(username):
40     end_point = request.url.split('/')[-1]
41     auth_group = osdf.end_point_auth_mapping.get(end_point)
42     return cfg_base.http_basic_auth_credentials[auth_group].get(
43         username) if auth_group else None
44
45 @auth_basic.error_handler
46 def auth_error():
47     response = Response(unauthorized_message, content_type='application/json; charset=utf-8')
48     response.headers.add('content-length', len(unauthorized_message))
49     response.status_code = 401
50     return response
51
52
53 @auth_basic.verify_password
54 def verify_pw(username, password):
55     is_aaf_enabled = osdf_config.deployment.get('is_aaf_enabled', False)
56     if is_aaf_enabled:
57         return aaf_auth.authenticate(username, password)
58     else:
59         pw = get_pw(username)
60         return pw == password
61     return False