--- /dev/null
+/*******************************************************************************\r
+ * ============LICENSE_START====================================================\r
+ * * org.onap.aaf\r
+ * * ===========================================================================\r
+ * * Copyright © 2017 AT&T Intellectual Property. All rights reserved.\r
+ * * ===========================================================================\r
+ * * Licensed under the Apache License, Version 2.0 (the "License");\r
+ * * you may not use this file except in compliance with the License.\r
+ * * You may obtain a copy of the License at\r
+ * * \r
+ * * http://www.apache.org/licenses/LICENSE-2.0\r
+ * * \r
+ * * Unless required by applicable law or agreed to in writing, software\r
+ * * distributed under the License is distributed on an "AS IS" BASIS,\r
+ * * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\r
+ * * See the License for the specific language governing permissions and\r
+ * * limitations under the License.\r
+ * * ============LICENSE_END====================================================\r
+ * *\r
+ * * ECOMP is a trademark and service mark of AT&T Intellectual Property.\r
+ * *\r
+ ******************************************************************************/\r
+package org.onap.aaf.authz.gw.api;\r
+\r
+import java.io.IOException;\r
+import java.net.ConnectException;\r
+import java.net.MalformedURLException;\r
+import java.net.URI;\r
+import java.security.Principal;\r
+\r
+import javax.servlet.ServletOutputStream;\r
+import javax.servlet.http.HttpServletRequest;\r
+import javax.servlet.http.HttpServletResponse;\r
+\r
+import org.onap.aaf.authz.env.AuthzTrans;\r
+import org.onap.aaf.authz.gw.GwAPI;\r
+import org.onap.aaf.authz.gw.GwCode;\r
+import org.onap.aaf.authz.gw.facade.GwFacade;\r
+import org.onap.aaf.authz.gw.mapper.Mapper.API;\r
+import org.onap.aaf.authz.layer.Result;\r
+import org.onap.aaf.cache.Cache.Dated;\r
+import org.onap.aaf.cssa.rserv.HttpMethods;\r
+\r
+import com.att.aft.dme2.internal.jetty.http.HttpStatus;\r
+import org.onap.aaf.cadi.CadiException;\r
+import org.onap.aaf.cadi.Locator;\r
+import org.onap.aaf.cadi.Locator.Item;\r
+import org.onap.aaf.cadi.LocatorException;\r
+import org.onap.aaf.cadi.aaf.AAFPermission;\r
+import org.onap.aaf.cadi.client.Future;\r
+import org.onap.aaf.cadi.client.Rcli;\r
+import org.onap.aaf.cadi.client.Retryable;\r
+import org.onap.aaf.cadi.dme2.DME2Locator;\r
+import org.onap.aaf.cadi.principal.BasicPrincipal;\r
+import org.onap.aaf.inno.env.APIException;\r
+import org.onap.aaf.inno.env.Env;\r
+import org.onap.aaf.inno.env.TimeTaken;\r
+\r
+public class API_AAFAccess {\r
+ private static final String AUTHZ_DME2_GUI = "com.att.authz.authz-gui";\r
+ static final String AFT_ENVIRONMENT="AFT_ENVIRONMENT";\r
+ static final String AFT_ENV_CONTEXT="AFT_ENV_CONTEXT";\r
+ static final String AFTUAT="AFTUAT";\r
+ \r
+ private static final String PROD = "PROD";\r
+ private static final String IST = "IST"; // main NONPROD system\r
+ private static final String PERF = "PERF";\r
+ private static final String TEST = "TEST";\r
+ private static final String DEV = "DEV";\r
+ \r
+// private static String service, version, envContext; \r
+ private static String routeOffer;\r
+\r
+ private static final String GET_PERMS_BY_USER = "Get Perms by User";\r
+ private static final String USER_HAS_PERM ="User Has Perm";\r
+// private static final String USER_IN_ROLE ="User Has Role";\r
+ private static final String BASIC_AUTH ="AAF Basic Auth";\r
+ \r
+ /**\r
+ * Normal Init level APIs\r
+ * \r
+ * @param gwAPI\r
+ * @param facade\r
+ * @throws Exception\r
+ */\r
+ public static void init(final GwAPI gwAPI, GwFacade facade) throws Exception {\r
+ String aftenv = gwAPI.env.getProperty(AFT_ENVIRONMENT);\r
+ if(aftenv==null) throw new Exception(AFT_ENVIRONMENT + " must be set");\r
+ \r
+ int equals, count=0;\r
+ for(int slash = gwAPI.aafurl.indexOf('/');slash>0;++count) {\r
+ equals = gwAPI.aafurl.indexOf('=',slash)+1;\r
+ slash = gwAPI.aafurl.indexOf('/',slash+1);\r
+ switch(count) {\r
+ case 2:\r
+// service = gwAPI.aafurl.substring(equals, slash);\r
+ break;\r
+ case 3:\r
+// version = gwAPI.aafurl.substring(equals, slash);\r
+ break;\r
+ case 4:\r
+// envContext = gwAPI.aafurl.substring(equals, slash);\r
+ break;\r
+ case 5:\r
+ routeOffer = gwAPI.aafurl.substring(equals);\r
+ break;\r
+ }\r
+ }\r
+ if(count<6) throw new MalformedURLException(gwAPI.aafurl);\r
+ \r
+ gwAPI.route(HttpMethods.GET,"/authz/perms/user/:user",API.VOID,new GwCode(facade,GET_PERMS_BY_USER, true) {\r
+ @Override\r
+ public void handle(final AuthzTrans trans, final HttpServletRequest req, final HttpServletResponse resp) throws Exception {\r
+ TimeTaken tt = trans.start(GET_PERMS_BY_USER, Env.SUB);\r
+ try {\r
+ final String accept = req.getHeader("ACCEPT");\r
+ final String user = pathParam(req,":user");\r
+ if(!user.contains("@")) {\r
+ context.error(trans,resp,Result.ERR_BadData,"User [%s] must be fully qualified with domain",user);\r
+ return;\r
+ }\r
+ String key = trans.user() + user + (accept!=null&&accept.contains("xml")?"-xml":"-json");\r
+ TimeTaken tt2 = trans.start("Cache Lookup",Env.SUB);\r
+ Dated d;\r
+ try {\r
+ d = gwAPI.cacheUser.get(key);\r
+ } finally {\r
+ tt2.done();\r
+ }\r
+ \r
+ if(d==null || d.data.isEmpty()) {\r
+ tt2 = trans.start("AAF Service Call",Env.REMOTE);\r
+ try {\r
+ gwAPI.clientAsUser(trans.getUserPrincipal(), new Retryable<Void>() {\r
+ @Override\r
+ public Void code(Rcli<?> client) throws CadiException, ConnectException, APIException {\r
+ Future<String> fp = client.read("/authz/perms/user/"+user,accept);\r
+ if(fp.get(5000)) {\r
+ gwAPI.cacheUser.put(key, new Dated(new User(fp.code(),fp.body())));\r
+ resp.setStatus(HttpStatus.OK_200);\r
+ ServletOutputStream sos;\r
+ try {\r
+ sos = resp.getOutputStream();\r
+ sos.print(fp.value);\r
+ } catch (IOException e) {\r
+ throw new CadiException(e);\r
+ }\r
+ } else {\r
+ gwAPI.cacheUser.put(key, new Dated(new User(fp.code(),fp.body())));\r
+ context.error(trans,resp,fp.code(),fp.body());\r
+ }\r
+ return null;\r
+ }\r
+ });\r
+ } finally {\r
+ tt2.done();\r
+ }\r
+ } else {\r
+ User u = (User)d.data.get(0);\r
+ resp.setStatus(u.code);\r
+ ServletOutputStream sos = resp.getOutputStream();\r
+ sos.print(u.resp);\r
+ }\r
+ } finally {\r
+ tt.done();\r
+ }\r
+ }\r
+ });\r
+\r
+ gwAPI.route(gwAPI.env,HttpMethods.GET,"/authn/basicAuth",new GwCode(facade,BASIC_AUTH, true) {\r
+ @Override\r
+ public void handle(final AuthzTrans trans, final HttpServletRequest req, HttpServletResponse resp) throws Exception {\r
+ Principal p = trans.getUserPrincipal();\r
+ if(p == null) {\r
+ trans.error().log("Transaction not Authenticated... no Principal");\r
+ resp.setStatus(HttpStatus.FORBIDDEN_403);\r
+ } else if (p instanceof BasicPrincipal) {\r
+ // the idea is that if call is made with this credential, and it's a BasicPrincipal, it's ok\r
+ // otherwise, it wouldn't have gotten here.\r
+ resp.setStatus(HttpStatus.OK_200);\r
+ } else {\r
+ trans.checkpoint("Basic Auth Check Failed: This wasn't a Basic Auth Trans");\r
+ // For Auth Security questions, we don't give any info to client on why failed\r
+ resp.setStatus(HttpStatus.FORBIDDEN_403);\r
+ }\r
+ }\r
+ },"text/plain","*/*","*");\r
+\r
+ /**\r
+ * Query User Has Perm\r
+ */\r
+ gwAPI.route(HttpMethods.GET,"/ask/:user/has/:type/:instance/:action",API.VOID,new GwCode(facade,USER_HAS_PERM, true) {\r
+ @Override\r
+ public void handle(final AuthzTrans trans, final HttpServletRequest req, HttpServletResponse resp) throws Exception {\r
+ try {\r
+ resp.getOutputStream().print(\r
+ gwAPI.aafLurPerm.fish(pathParam(req,":user"), new AAFPermission(\r
+ pathParam(req,":type"),\r
+ pathParam(req,":instance"),\r
+ pathParam(req,":action"))));\r
+ resp.setStatus(HttpStatus.OK_200);\r
+ } catch(Exception e) {\r
+ context.error(trans, resp, Result.ERR_General, e.getMessage());\r
+ }\r
+ }\r
+ });\r
+\r
+ if(AFTUAT.equals(aftenv)) {\r
+ gwAPI.route(HttpMethods.GET,"/ist/aaf/:version/:path*",API.VOID ,new GwCode(facade,"Access UAT GUI for AAF", true) {\r
+ @Override\r
+ public void handle(AuthzTrans trans, HttpServletRequest req, HttpServletResponse resp) throws Exception {\r
+ try{\r
+ redirect(trans, req, resp, context, \r
+ new DME2Locator(gwAPI.env, gwAPI.dme2Man, AUTHZ_DME2_GUI, pathParam(req,":version"), IST, routeOffer), \r
+ pathParam(req,":path"));\r
+ } catch (LocatorException e) {\r
+ context.error(trans, resp, Result.ERR_BadData, e.getMessage());\r
+ } catch (Exception e) {\r
+ context.error(trans, resp, Result.ERR_General, e.getMessage());\r
+ }\r
+ }\r
+ });\r
+\r
+ gwAPI.route(HttpMethods.GET,"/test/aaf/:version/:path*",API.VOID ,new GwCode(facade,"Access TEST GUI for AAF", true) {\r
+ @Override\r
+ public void handle(AuthzTrans trans, HttpServletRequest req, HttpServletResponse resp) throws Exception {\r
+ try{\r
+ redirect(trans, req, resp, context, \r
+ new DME2Locator(gwAPI.env, gwAPI.dme2Man, AUTHZ_DME2_GUI, pathParam(req,":version"), TEST, routeOffer), \r
+ pathParam(req,":path"));\r
+ } catch (LocatorException e) {\r
+ context.error(trans, resp, Result.ERR_BadData, e.getMessage());\r
+ } catch (Exception e) {\r
+ context.error(trans, resp, Result.ERR_General, e.getMessage());\r
+ }\r
+ }\r
+ });\r
+\r
+ gwAPI.route(HttpMethods.GET,"/perf/aaf/:version/:path*",API.VOID ,new GwCode(facade,"Access PERF GUI for AAF", true) {\r
+ @Override\r
+ public void handle(AuthzTrans trans, HttpServletRequest req, HttpServletResponse resp) throws Exception {\r
+ try{\r
+ redirect(trans, req, resp, context, \r
+ new DME2Locator(gwAPI.env, gwAPI.dme2Man, AUTHZ_DME2_GUI, pathParam(req,":version"), PERF, routeOffer), \r
+ pathParam(req,":path"));\r
+ } catch (LocatorException e) {\r
+ context.error(trans, resp, Result.ERR_BadData, e.getMessage());\r
+ } catch (Exception e) {\r
+ context.error(trans, resp, Result.ERR_General, e.getMessage());\r
+ }\r
+ }\r
+ });\r
+\r
+ gwAPI.route(HttpMethods.GET,"/dev/aaf/:version/:path*",API.VOID,new GwCode(facade,"Access DEV GUI for AAF", true) {\r
+ @Override\r
+ public void handle(AuthzTrans trans, HttpServletRequest req, HttpServletResponse resp) throws Exception {\r
+ try {\r
+ redirect(trans, req, resp, context, \r
+ new DME2Locator(gwAPI.env, gwAPI.dme2Man, AUTHZ_DME2_GUI, pathParam(req,":version"), DEV, routeOffer), \r
+ pathParam(req,":path"));\r
+ } catch (LocatorException e) {\r
+ context.error(trans, resp, Result.ERR_BadData, e.getMessage());\r
+ } catch (Exception e) {\r
+ context.error(trans, resp, Result.ERR_General, e.getMessage());\r
+ }\r
+ }\r
+ });\r
+ } else {\r
+ gwAPI.route(HttpMethods.GET,"/aaf/:version/:path*",API.VOID,new GwCode(facade,"Access PROD GUI for AAF", true) {\r
+ @Override\r
+ public void handle(AuthzTrans trans, HttpServletRequest req, HttpServletResponse resp) throws Exception {\r
+ try {\r
+ redirect(trans, req, resp, context, \r
+ new DME2Locator(gwAPI.env, gwAPI.dme2Man, AUTHZ_DME2_GUI, pathParam(req,":version"), PROD, routeOffer), \r
+ pathParam(req,":path"));\r
+ } catch (LocatorException e) {\r
+ context.error(trans, resp, Result.ERR_BadData, e.getMessage());\r
+ } catch (Exception e) {\r
+ context.error(trans, resp, Result.ERR_General, e.getMessage());\r
+ }\r
+ }\r
+ });\r
+ }\r
+ \r
+ }\r
+ \r
+ public static void initDefault(final GwAPI gwAPI, GwFacade facade) throws Exception {\r
+ String aftenv = gwAPI.env.getProperty(AFT_ENVIRONMENT);\r
+ if(aftenv==null) throw new Exception(AFT_ENVIRONMENT + " must be set");\r
+ \r
+ String aftctx = gwAPI.env.getProperty(AFT_ENV_CONTEXT);\r
+ if(aftctx==null) throw new Exception(AFT_ENV_CONTEXT + " must be set");\r
+\r
+ /**\r
+ * "login" url\r
+ */\r
+ gwAPI.route(HttpMethods.GET,"/login",API.VOID,new GwCode(facade,"Access " + aftctx + " GUI for AAF", true) {\r
+ @Override\r
+ public void handle(AuthzTrans trans, HttpServletRequest req, HttpServletResponse resp) throws Exception {\r
+ try {\r
+ redirect(trans, req, resp, context, \r
+ new DME2Locator(gwAPI.env, gwAPI.dme2Man, AUTHZ_DME2_GUI, "2.0", aftctx, routeOffer), \r
+ "login");\r
+ } catch (LocatorException e) {\r
+ context.error(trans, resp, Result.ERR_BadData, e.getMessage());\r
+ } catch (Exception e) {\r
+ context.error(trans, resp, Result.ERR_General, e.getMessage());\r
+ }\r
+ }\r
+ });\r
+\r
+ /**\r
+ * Default URL\r
+ */\r
+ gwAPI.route(HttpMethods.GET,"/",API.VOID,new GwCode(facade,"Access " + aftctx + " GUI for AAF", true) {\r
+ @Override\r
+ public void handle(AuthzTrans trans, HttpServletRequest req, HttpServletResponse resp) throws Exception {\r
+ try {\r
+ redirect(trans, req, resp, context, \r
+ new DME2Locator(gwAPI.env, gwAPI.dme2Man, AUTHZ_DME2_GUI, "2.0", aftctx, routeOffer), \r
+ "gui/home");\r
+ } catch (LocatorException e) {\r
+ context.error(trans, resp, Result.ERR_BadData, e.getMessage());\r
+ } catch (Exception e) {\r
+ context.error(trans, resp, Result.ERR_General, e.getMessage());\r
+ }\r
+ }\r
+ });\r
+ }\r
+\r
+ private static void redirect(AuthzTrans trans, HttpServletRequest req, HttpServletResponse resp, GwFacade context, Locator loc, String path) throws IOException {\r
+ try {\r
+ if(loc.hasItems()) {\r
+ Item item = loc.best();\r
+ URI uri = (URI) loc.get(item);\r
+ StringBuilder redirectURL = new StringBuilder(uri.toString()); \r
+ redirectURL.append('/');\r
+ redirectURL.append(path);\r
+ String str = req.getQueryString();\r
+ if(str!=null) {\r
+ redirectURL.append('?');\r
+ redirectURL.append(str);\r
+ }\r
+ trans.info().log("Redirect to",redirectURL);\r
+ resp.sendRedirect(redirectURL.toString());\r
+ } else {\r
+ context.error(trans, resp, Result.err(Result.ERR_NotFound,"%s is not valid",req.getPathInfo()));\r
+ }\r
+ } catch (LocatorException e) {\r
+ context.error(trans, resp, Result.err(Result.ERR_NotFound,"No DME2 Endpoints found for %s",req.getPathInfo()));\r
+ }\r
+ }\r
+\r
+ private static class User {\r
+ public final int code;\r
+ public final String resp;\r
+ \r
+ public User(int code, String resp) {\r
+ this.code = code;\r
+ this.resp = resp;\r
+ }\r
+ }\r
+}\r