+/*******************************************************************************\r
+ * ============LICENSE_START==================================================\r
+ * * org.onap.dmaap\r
+ * * ===========================================================================\r
+ * * Copyright © 2017 AT&T Intellectual Property. All rights reserved.\r
+ * * ===========================================================================\r
+ * * Licensed under the Apache License, Version 2.0 (the "License");\r
+ * * you may not use this file except in compliance with the License.\r
+ * * You may obtain a copy of the License at\r
+ * * \r
+ * * http://www.apache.org/licenses/LICENSE-2.0\r
+ * * \r
+ * * Unless required by applicable law or agreed to in writing, software\r
+ * * distributed under the License is distributed on an "AS IS" BASIS,\r
+ * * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\r
+ * * See the License for the specific language governing permissions and\r
+ * * limitations under the License.\r
+ * * ============LICENSE_END====================================================\r
+ * *\r
+ * * ECOMP is a trademark and service mark of AT&T Intellectual Property.\r
+ * *\r
+ ******************************************************************************/\r
+\r
+\r
+package org.onap.dmaap.datarouter.provisioning;\r
+\r
+import java.io.IOException;\r
+import java.io.InvalidObjectException;\r
+import java.util.Collection;\r
+\r
+import javax.servlet.http.HttpServletRequest;\r
+import javax.servlet.http.HttpServletResponse;\r
+\r
+import org.json.JSONObject;\r
+import org.onap.dmaap.datarouter.authz.AuthorizationResponse;\r
+import org.onap.dmaap.datarouter.provisioning.BaseServlet.ContentHeader;\r
+import org.onap.dmaap.datarouter.provisioning.beans.EventLogRecord;\r
+import org.onap.dmaap.datarouter.provisioning.beans.Group;\r
+import org.onap.dmaap.datarouter.provisioning.beans.Subscription;\r
+import org.onap.dmaap.datarouter.provisioning.utils.JSONUtilities;\r
+\r
+/**\r
+ * This servlet handles provisioning for the <groups> which is generated by the provisioning\r
+ * server to handle the creation and inspection of groups for FEEDS and SUBSCRIPTIONS.\r
+ *\r
+ * @author Vikram Singh\r
+ * @version $Id$\r
+ * @version $Id: Group.java,v 1.0 2016/07/19\r
+ */\r
+@SuppressWarnings("serial")\r
+public class GroupServlet extends ProxyServlet {\r
+ /**\r
+ * DELETE on the <GRUPS> -- not supported.\r
+ */\r
+ @Override\r
+ public void doDelete(HttpServletRequest req, HttpServletResponse resp) throws IOException {\r
+ String message = "DELETE not allowed for the GROUPS.";\r
+ EventLogRecord elr = new EventLogRecord(req);\r
+ elr.setMessage(message);\r
+ elr.setResult(HttpServletResponse.SC_METHOD_NOT_ALLOWED);\r
+ eventlogger.info(elr);\r
+ resp.sendError(HttpServletResponse.SC_METHOD_NOT_ALLOWED, message);\r
+ }\r
+ /**\r
+ * GET on the the list of groups to a feed/sub.\r
+ * See the <i>Groups Collection Query</i> section in the <b>Provisioning API</b>\r
+ * document for details on how this method should be invoked.\r
+ */\r
+ @Override\r
+ public void doGet(HttpServletRequest req, HttpServletResponse resp) throws IOException {\r
+ EventLogRecord elr = new EventLogRecord(req);\r
+ String message = isAuthorizedForProvisioning(req);\r
+ if (message != null) {\r
+ elr.setMessage(message);\r
+ elr.setResult(HttpServletResponse.SC_FORBIDDEN);\r
+ eventlogger.info(elr);\r
+ resp.sendError(HttpServletResponse.SC_FORBIDDEN, message);\r
+ return;\r
+ }\r
+ if (isProxyServer()) {\r
+ super.doGet(req, resp);\r
+ return;\r
+ }\r
+ String bhdr = req.getHeader(BEHALF_HEADER);\r
+ if (bhdr == null) {\r
+ message = "Missing "+BEHALF_HEADER+" header.";\r
+ elr.setMessage(message);\r
+ elr.setResult(HttpServletResponse.SC_BAD_REQUEST);\r
+ eventlogger.info(elr);\r
+ resp.sendError(HttpServletResponse.SC_BAD_REQUEST, message);\r
+ return;\r
+ }\r
+ \r
+ // Check with the Authorizer\r
+ /*AuthorizationResponse aresp = authz.decide(req);\r
+ if (! aresp.isAuthorized()) {\r
+ message = "Policy Engine disallows access.";\r
+ elr.setMessage(message);\r
+ elr.setResult(HttpServletResponse.SC_FORBIDDEN);\r
+ eventlogger.info(elr);\r
+ resp.sendError(HttpServletResponse.SC_FORBIDDEN, message);\r
+ return;\r
+ }*/\r
+ \r
+ \r
+ /*ContentHeader ch = getContentHeader(req);\r
+ String ver = ch.getAttribute("version");\r
+ if (!ch.getType().equals(GROUPLIST_CONTENT_TYPE) || !(ver.equals("1.0") || ver.equals("2.0"))) {\r
+ intlogger.debug("Content-type is: "+req.getHeader("Content-Type"));\r
+ message = "Incorrect content-type";\r
+ elr.setMessage(message);\r
+ elr.setResult(HttpServletResponse.SC_UNSUPPORTED_MEDIA_TYPE);\r
+ eventlogger.info(elr);\r
+ resp.sendError(HttpServletResponse.SC_UNSUPPORTED_MEDIA_TYPE, message);\r
+ return;\r
+ }*/\r
+ \r
+ \r
+ int groupid = getIdFromPath(req);\r
+ if (groupid < 0) {\r
+ message = "Missing or bad group number.";\r
+ elr.setMessage(message);\r
+ elr.setResult(HttpServletResponse.SC_BAD_REQUEST);\r
+ eventlogger.info(elr);\r
+ resp.sendError(HttpServletResponse.SC_BAD_REQUEST, message);\r
+ return;\r
+ }\r
+ \r
+ Group gup = Group.getGroupById(groupid);\r
+ // send response\r
+ elr.setResult(HttpServletResponse.SC_OK);\r
+ eventlogger.info(elr);\r
+ resp.setStatus(HttpServletResponse.SC_OK);\r
+ resp.setContentType(GROUPFULL_CONTENT_TYPE);\r
+ resp.getOutputStream().print(gup.asJSONObject().toString());\r
+\r
+ // Display a list of Groups\r
+ /*Collection<Group> list = Group.getGroupById(groupid);\r
+ String t = JSONUtilities.createJSONArray(list);\r
+\r
+ // send response\r
+ elr.setResult(HttpServletResponse.SC_OK);\r
+ eventlogger.info(elr);\r
+ resp.setStatus(HttpServletResponse.SC_OK);\r
+ resp.setContentType(GROUPLIST_CONTENT_TYPE);\r
+ resp.getOutputStream().print(t);*/\r
+ }\r
+ /**\r
+ * PUT on the <GROUPS> -- not supported.\r
+ */\r
+ @Override\r
+ public void doPut(HttpServletRequest req, HttpServletResponse resp) throws IOException {\r
+ EventLogRecord elr = new EventLogRecord(req);\r
+ String message = isAuthorizedForProvisioning(req);\r
+ if (message != null) {\r
+ elr.setMessage(message);\r
+ elr.setResult(HttpServletResponse.SC_FORBIDDEN);\r
+ eventlogger.info(elr);\r
+ resp.sendError(HttpServletResponse.SC_FORBIDDEN, message);\r
+ return;\r
+ }\r
+ if (isProxyServer()) {\r
+ super.doPut(req, resp);\r
+ return;\r
+ }\r
+ String bhdr = req.getHeader(BEHALF_HEADER);\r
+ if (bhdr == null) {\r
+ message = "Missing "+BEHALF_HEADER+" header.";\r
+ elr.setMessage(message);\r
+ elr.setResult(HttpServletResponse.SC_BAD_REQUEST);\r
+ eventlogger.info(elr);\r
+ resp.sendError(HttpServletResponse.SC_BAD_REQUEST, message);\r
+ return;\r
+ }\r
+ int groupid = getIdFromPath(req);\r
+ if (groupid < 0) {\r
+ message = "Missing or bad groupid.";\r
+ elr.setMessage(message);\r
+ elr.setResult(HttpServletResponse.SC_BAD_REQUEST);\r
+ eventlogger.info(elr);\r
+ resp.sendError(HttpServletResponse.SC_BAD_REQUEST, message);\r
+ return;\r
+ }\r
+ Group oldgup = Group.getGroupById(groupid);\r
+ if (oldgup == null) {\r
+ message = "Missing or bad group number.";\r
+ elr.setMessage(message);\r
+ elr.setResult(HttpServletResponse.SC_NOT_FOUND);\r
+ eventlogger.info(elr);\r
+ resp.sendError(HttpServletResponse.SC_NOT_FOUND, message);\r
+ return;\r
+ }\r
+ // Check with the Authorizer\r
+ /*AuthorizationResponse aresp = authz.decide(req);\r
+ if (! aresp.isAuthorized()) {\r
+ message = "Policy Engine disallows access.";\r
+ elr.setMessage(message);\r
+ elr.setResult(HttpServletResponse.SC_FORBIDDEN);\r
+ eventlogger.info(elr);\r
+ resp.sendError(HttpServletResponse.SC_FORBIDDEN, message);\r
+ return;\r
+ }*/\r
+ // check content type is SUB_CONTENT_TYPE, version 1.0\r
+ ContentHeader ch = getContentHeader(req);\r
+ String ver = ch.getAttribute("version");\r
+ if (!ch.getType().equals(GROUP_BASECONTENT_TYPE) || !(ver.equals("1.0") || ver.equals("2.0"))) {\r
+ message = "Incorrect content-type";\r
+ elr.setMessage(message);\r
+ elr.setResult(HttpServletResponse.SC_UNSUPPORTED_MEDIA_TYPE);\r
+ eventlogger.info(elr);\r
+ resp.sendError(HttpServletResponse.SC_UNSUPPORTED_MEDIA_TYPE, message);\r
+ return;\r
+ }\r
+ JSONObject jo = getJSONfromInput(req);\r
+ if (jo == null) {\r
+ message = "Badly formed JSON";\r
+ elr.setMessage(message);\r
+ elr.setResult(HttpServletResponse.SC_BAD_REQUEST);\r
+ eventlogger.info(elr);\r
+ resp.sendError(HttpServletResponse.SC_BAD_REQUEST, message);\r
+ return;\r
+ }\r
+ if (intlogger.isDebugEnabled())\r
+ intlogger.debug(jo.toString());\r
+ Group gup = null;\r
+ try {\r
+ gup = new Group(jo);\r
+ } catch (InvalidObjectException e) {\r
+ message = e.getMessage();\r
+ elr.setMessage(message);\r
+ elr.setResult(HttpServletResponse.SC_BAD_REQUEST);\r
+ eventlogger.info(elr);\r
+ resp.sendError(HttpServletResponse.SC_BAD_REQUEST, message);\r
+ return;\r
+ }\r
+ gup.setGroupid(oldgup.getGroupid());\r
+ \r
+ \r
+ Group gb2 = Group.getGroupMatching(gup, oldgup.getGroupid());\r
+ if (gb2 != null) {\r
+ eventlogger.warn("PROV0011 Creating a duplicate Group: "+gup.getName());\r
+ elr.setResult(HttpServletResponse.SC_BAD_REQUEST);\r
+ resp.sendError(HttpServletResponse.SC_BAD_REQUEST, "Duplicate Group:"+gup.getName());\r
+ return;\r
+ }\r
+ \r
+ // Update Groups table entries\r
+ if (doUpdate(gup)) {\r
+ // send response\r
+ elr.setResult(HttpServletResponse.SC_OK);\r
+ eventlogger.info(elr);\r
+ resp.setStatus(HttpServletResponse.SC_OK);\r
+ resp.setContentType(GROUPFULL_CONTENT_TYPE);\r
+ resp.getOutputStream().print(gup.asJSONObject().toString());\r
+ provisioningDataChanged();\r
+ } else {\r
+ // Something went wrong with the UPDATE\r
+ elr.setResult(HttpServletResponse.SC_INTERNAL_SERVER_ERROR);\r
+ eventlogger.info(elr);\r
+ resp.sendError(HttpServletResponse.SC_INTERNAL_SERVER_ERROR, DB_PROBLEM_MSG);\r
+ }\r
+ }\r
+ /**\r
+ * POST on the <groups> -- create a new GROUPS to a feed.\r
+ * See the <i>Creating a GROUPS</i> section in the <b>Provisioning API</b>\r
+ * document for details on how this method should be invoked.\r
+ */\r
+ @Override\r
+ public void doPost(HttpServletRequest req, HttpServletResponse resp) throws IOException {\r
+ EventLogRecord elr = new EventLogRecord(req);\r
+ String message = isAuthorizedForProvisioning(req);\r
+ if (message != null) {\r
+ elr.setMessage(message);\r
+ elr.setResult(HttpServletResponse.SC_FORBIDDEN);\r
+ eventlogger.info(elr);\r
+ resp.sendError(HttpServletResponse.SC_FORBIDDEN, message);\r
+ return;\r
+ }\r
+ if (isProxyServer()) {\r
+ super.doPost(req, resp);\r
+ return;\r
+ }\r
+ String bhdr = req.getHeader(BEHALF_HEADER);\r
+ if (bhdr == null) {\r
+ message = "Missing "+BEHALF_HEADER+" header.";\r
+ elr.setMessage(message);\r
+ elr.setResult(HttpServletResponse.SC_BAD_REQUEST);\r
+ eventlogger.info(elr);\r
+ resp.sendError(HttpServletResponse.SC_BAD_REQUEST, message);\r
+ return;\r
+ }\r
+ /*int feedid = getIdFromPath(req);\r
+ if (feedid < 0) {\r
+ message = "Missing or bad feed number.";\r
+ elr.setMessage(message);\r
+ elr.setResult(HttpServletResponse.SC_BAD_REQUEST);\r
+ eventlogger.info(elr);\r
+ resp.sendError(HttpServletResponse.SC_BAD_REQUEST, message);\r
+ return;\r
+ }\r
+ Feed feed = Feed.getFeedById(feedid);\r
+ if (feed == null || feed.isDeleted()) {\r
+ message = "Missing or bad feed number.";\r
+ elr.setMessage(message);\r
+ elr.setResult(HttpServletResponse.SC_NOT_FOUND);\r
+ eventlogger.info(elr);\r
+ resp.sendError(HttpServletResponse.SC_NOT_FOUND, message);\r
+ return;\r
+ }*/\r
+ // Check with the Authorizer\r
+ /*AuthorizationResponse aresp = authz.decide(req);\r
+ if (! aresp.isAuthorized()) {\r
+ message = "Policy Engine disallows access.";\r
+ elr.setMessage(message);\r
+ elr.setResult(HttpServletResponse.SC_FORBIDDEN);\r
+ eventlogger.info(elr);\r
+ resp.sendError(HttpServletResponse.SC_FORBIDDEN, message);\r
+ return;\r
+ }*/\r
+\r
+ // check content type is SUB_CONTENT_TYPE, version 1.0\r
+ ContentHeader ch = getContentHeader(req);\r
+ String ver = ch.getAttribute("version");\r
+ if (!ch.getType().equals(GROUP_BASECONTENT_TYPE) || !(ver.equals("1.0") || ver.equals("2.0"))) {\r
+ intlogger.debug("Content-type is: "+req.getHeader("Content-Type"));\r
+ message = "Incorrect content-type";\r
+ elr.setMessage(message);\r
+ elr.setResult(HttpServletResponse.SC_UNSUPPORTED_MEDIA_TYPE);\r
+ eventlogger.info(elr);\r
+ resp.sendError(HttpServletResponse.SC_UNSUPPORTED_MEDIA_TYPE, message);\r
+ return;\r
+ }\r
+ JSONObject jo = getJSONfromInput(req);\r
+ if (jo == null) {\r
+ message = "Badly formed JSON";\r
+ elr.setMessage(message);\r
+ elr.setResult(HttpServletResponse.SC_BAD_REQUEST);\r
+ eventlogger.info(elr);\r
+ resp.sendError(HttpServletResponse.SC_BAD_REQUEST, message);\r
+ return;\r
+ }\r
+ if (intlogger.isDebugEnabled())\r
+ intlogger.debug(jo.toString());\r
+ \r
+ Group gup = null;\r
+ try {\r
+ gup = new Group(jo);\r
+ } catch (InvalidObjectException e) {\r
+ message = e.getMessage();\r
+ elr.setMessage(message);\r
+ elr.setResult(HttpServletResponse.SC_BAD_REQUEST);\r
+ eventlogger.info(elr);\r
+ resp.sendError(HttpServletResponse.SC_BAD_REQUEST, message);\r
+ return;\r
+ }\r
+ //gup.setFeedid(feedid);\r
+ //sub.setSubscriber(bhdr); // set from X-ATT-DR-ON-BEHALF-OF header\r
+\r
+ // Check if this group already exists; not an error (yet), just warn\r
+ Group gb2 = Group.getGroupMatching(gup);\r
+ if (gb2 != null) {\r
+ eventlogger.warn("PROV0011 Creating a duplicate Group: "+gup.getName());\r
+ elr.setResult(HttpServletResponse.SC_BAD_REQUEST);\r
+ resp.sendError(HttpServletResponse.SC_BAD_REQUEST, "Duplicate Group:"+gup.getName());\r
+ return;\r
+ }\r
+ \r
+ \r
+ // Create GROUPS table entries\r
+ if (doInsert(gup)) {\r
+ // send response\r
+ elr.setResult(HttpServletResponse.SC_CREATED);\r
+ eventlogger.info(elr);\r
+ resp.setStatus(HttpServletResponse.SC_CREATED);\r
+ resp.setContentType(GROUPFULL_CONTENT_TYPE);\r
+ resp.getOutputStream().print(gup.asJSONObject().toString());\r
+ provisioningDataChanged();\r
+ } else {\r
+ // Something went wrong with the INSERT\r
+ elr.setResult(HttpServletResponse.SC_INTERNAL_SERVER_ERROR);\r
+ eventlogger.info(elr);\r
+ resp.sendError(HttpServletResponse.SC_INTERNAL_SERVER_ERROR, DB_PROBLEM_MSG);\r
+ }\r
+ }\r
+}\r