/** * ============LICENSE_START==================================================== * org.onap.aaf * =========================================================================== * Copyright (c) 2018 AT&T Intellectual Property. All rights reserved. * =========================================================================== * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * ============LICENSE_END==================================================== * */ package org.onap.aaf.cadi.lur.aaf.test1; import java.security.Principal; import java.util.ArrayList; import java.util.List; import org.onap.aaf.cadi.Permission; import org.onap.aaf.cadi.PropAccess; import org.onap.aaf.cadi.aaf.AAFPermission; import org.onap.aaf.cadi.aaf.v2_0.AAFAuthn; import org.onap.aaf.cadi.aaf.v2_0.AAFConHttp; import org.onap.aaf.cadi.aaf.v2_0.AAFLurPerm; import org.onap.aaf.cadi.config.Config; import org.onap.aaf.cadi.locator.PropertyLocator; import org.onap.aaf.stillNeed.TestPrincipal; public class MultiThreadPermHit { public static void main(String args[]) { // Link or reuse to your Logging mechanism PropAccess myAccess = new PropAccess(); // // try { AAFConHttp con = new AAFConHttp(myAccess,new PropertyLocator("https://mithrilcsp.sbc.com:8100")); // AAFLur has pool of DME clients as needed, and Caches Client lookups final AAFLurPerm aafLur = con.newLur(); aafLur.setDebug("m12345@aaf.att.com"); // Note: If you need both Authn and Authz construct the following: AAFAuthn aafAuthn = con.newAuthn(aafLur); // Do not set Mech ID until after you construct AAFAuthn, // because we initiate "401" info to determine the Realm of // of the service we're after. final String id = myAccess.getProperty(Config.AAF_APPID,null); final String pass = myAccess.decrypt(myAccess.getProperty(Config.AAF_APPPASS,null),false); if(id!=null && pass!=null) { try { // Normally, you obtain Principal from Authentication System. // // For J2EE, you can ask the HttpServletRequest for getUserPrincipal() // // If you use CADI as Authenticator, it will get you these Principals from // // CSP or BasicAuth mechanisms. // String id = "cluster_admin@gridcore.att.com"; // // // If Validate succeeds, you will get a Null, otherwise, you will a String for the reason. String ok; ok = aafAuthn.validate(id, pass,null /* use AuthzTrans or HttpServlet, if you have it */); if(ok!=null) { System.out.println(ok); } List pond = new ArrayList(); for(int i=0;i<20;++i) { pond.clear(); aafLur.fishAll(new TestPrincipal(i+id), pond); if(ok!=null && i%1000==0) { System.out.println(i + " " + ok); } } for(int i=0;i<1000000;++i) { ok = aafAuthn.validate( i+ id, "wrongPass",null /* use AuthzTrans or HttpServlet, if you have it */); if(ok!=null && i%1000==0) { System.out.println(i + " " + ok); } } final AAFPermission perm = new AAFPermission("org.osaaf.aaf.access","*","*"); // Now you can ask the LUR (Local Representative of the User Repository about Authorization // With CADI, in J2EE, you can call isUserInRole("org.osaaf.mygroup|mytype|write") on the Request Object // instead of creating your own LUR final Principal p = new TestPrincipal(id); for(int i=0;i<4;++i) { if(aafLur.fish(p, perm)) { System.out.println("Yes, " + id + " has permission for " + perm.getKey()); } else { System.out.println("No, " + id + " does not have permission for " + perm.getKey()); } } // Or you can all for all the Permissions available List perms = new ArrayList(); aafLur.fishAll(p,perms); System.out.println("Perms for " + id); for(Permission prm : perms) { System.out.println(prm.getKey()); } System.out.println("Press any key to continue"); System.in.read(); for(int j=0;j<5;++j) { new Thread(new Runnable() { @Override public void run() { for(int i=0;i<20;++i) { if(aafLur.fish(p, perm)) { System.out.println("Yes, " + id + " has permission for " + perm.getKey()); } else { System.out.println("No, " + id + " does not have permission for " + perm.getKey()); } } } }).start(); } } finally { aafLur.destroy(); } } else { // checked on IDs System.err.println(Config.AAF_APPID + " and/or " + Config.AAF_APPPASS + " are not set."); } } catch (Exception e) { e.printStackTrace(); } } }