2 * ============LICENSE_START=======================================================
4 * ================================================================================
5 * Copyright (C) 2018 AT&T Intellectual Property. All rights
7 * ================================================================================
8 * Modifications Copyright (c) 2019 Samsung
9 * ================================================================================
10 * Licensed under the Apache License, Version 2.0 (the "License");
11 * you may not use this file except in compliance with the License.
12 * You may obtain a copy of the License at
14 * http://www.apache.org/licenses/LICENSE-2.0
16 * Unless required by applicable law or agreed to in writing, software
17 * distributed under the License is distributed on an "AS IS" BASIS,
18 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
19 * See the License for the specific language governing permissions and
20 * limitations under the License.
21 * ============LICENSE_END============================================
22 * ===================================================================
26 package org.onap.clamp.clds;
28 import com.att.eelf.configuration.EELFLogger;
29 import com.att.eelf.configuration.EELFManager;
32 import java.io.IOException;
33 import java.security.Principal;
34 import java.util.ArrayList;
35 import java.util.Arrays;
36 import java.util.List;
38 import javax.servlet.ServletException;
39 import javax.servlet.http.HttpServletRequest;
40 import javax.servlet.http.HttpServletResponse;
42 import org.apache.camel.component.servlet.CamelHttpTransportServlet;
43 import org.onap.clamp.authorization.SecureServicePermission;
44 import org.springframework.context.ApplicationContext;
45 import org.springframework.http.HttpStatus;
46 import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
47 import org.springframework.security.core.Authentication;
48 import org.springframework.security.core.GrantedAuthority;
49 import org.springframework.security.core.authority.SimpleGrantedAuthority;
50 import org.springframework.security.core.context.SecurityContextHolder;
51 import org.springframework.security.core.userdetails.User;
52 import org.springframework.web.context.support.WebApplicationContextUtils;
54 public class ClampServlet extends CamelHttpTransportServlet {
57 * The serial version ID.
59 private static final long serialVersionUID = -4198841134910211542L;
61 private static final EELFLogger logger = EELFManager.getInstance().getLogger(ClampServlet.class);
62 private static final String PERM_INSTANCE = "clamp.config.security.permission.instance";
63 private static final String PERM_CL = "clamp.config.security.permission.type.cl";
64 private static final String PERM_TEMPLATE = "clamp.config.security.permission.type.template";
65 private static final String PERM_VF = "clamp.config.security.permission.type.filter.vf";
66 private static final String PERM_MANAGE = "clamp.config.security.permission.type.cl.manage";
67 private static final String PERM_TOSCA = "clamp.config.security.permission.type.tosca";
68 private static final String AUTHENTICATION_CLASS = "clamp.config.security.authentication.class";
69 private static final String READ = "read";
70 private static final String UPDATE = "update";
72 private static List<SecureServicePermission> permissionList;
74 private synchronized String[] loadDynamicAuthenticationClasses() {
75 String[] authenticationObjects = WebApplicationContextUtils.getWebApplicationContext(getServletContext())
76 .getEnvironment().getProperty(AUTHENTICATION_CLASS).split(",");
77 Arrays.stream(authenticationObjects).forEach(className -> className.trim());
78 return authenticationObjects;
81 private synchronized List<SecureServicePermission> getPermissionList() {
82 if (permissionList == null) {
83 permissionList = new ArrayList<>();
84 ApplicationContext applicationContext = WebApplicationContextUtils
85 .getWebApplicationContext(getServletContext());
86 String cldsPermissionInstance = applicationContext.getEnvironment().getProperty(PERM_INSTANCE);
87 permissionList.add(SecureServicePermission.create(applicationContext.getEnvironment().getProperty(PERM_CL),
88 cldsPermissionInstance, READ));
89 permissionList.add(SecureServicePermission.create(applicationContext.getEnvironment().getProperty(PERM_CL),
90 cldsPermissionInstance, UPDATE));
91 permissionList.add(SecureServicePermission.create(
92 applicationContext.getEnvironment().getProperty(PERM_TEMPLATE), cldsPermissionInstance, READ));
93 permissionList.add(SecureServicePermission.create(
94 applicationContext.getEnvironment().getProperty(PERM_TEMPLATE), cldsPermissionInstance, UPDATE));
95 permissionList.add(SecureServicePermission.create(applicationContext.getEnvironment().getProperty(PERM_VF),
96 cldsPermissionInstance, "*"));
97 permissionList.add(SecureServicePermission
98 .create(applicationContext.getEnvironment().getProperty(PERM_MANAGE), cldsPermissionInstance, "*"));
99 permissionList.add(SecureServicePermission
100 .create(applicationContext.getEnvironment().getProperty(PERM_TOSCA), cldsPermissionInstance, READ));
101 permissionList.add(SecureServicePermission
102 .create(applicationContext.getEnvironment().getProperty(PERM_TOSCA),
103 cldsPermissionInstance, UPDATE));
105 return permissionList;
109 * When AAF is enabled, request object will contain a cadi Wrapper, so queries
110 * to isUserInRole will invoke a http call to AAF server.
113 protected void doService(HttpServletRequest request, HttpServletResponse response) {
114 Principal principal = request.getUserPrincipal();
115 if (principal != null && Arrays.stream(loadDynamicAuthenticationClasses())
116 .anyMatch(className -> className.equals(principal.getName()))) {
117 // When AAF is enabled, there is a need to provision the permissions to Spring
119 List<GrantedAuthority> grantedAuths = new ArrayList<>();
120 for (SecureServicePermission perm : getPermissionList()) {
121 String permString = perm.toString();
122 if (request.isUserInRole(permString)) {
123 grantedAuths.add(new SimpleGrantedAuthority(permString));
126 Authentication auth = new UsernamePasswordAuthenticationToken(new User(principal.getName(), "",
127 grantedAuths), "", grantedAuths);
128 SecurityContextHolder.getContext().setAuthentication(auth);
131 super.doService(request, response);
132 } catch (ServletException | IOException ioe) {
133 logger.error("Exception caught when executing doService in servlet", ioe);
135 response.sendError(HttpStatus.INTERNAL_SERVER_ERROR.value());
136 } catch (IOException e) {
137 logger.error("Exception caught when executing HTTP sendError in servlet", e);