243b3a6a7075e8fd1b775a164f07a7d5a433c88a
[aaf/authz.git] / cadi / aaf / src / main / java / org / onap / aaf / cadi / aaf / TestConnectivity.java
1 /**
2  * ============LICENSE_START====================================================
3  * org.onap.aaf
4  * ===========================================================================
5  * Copyright (c) 2018 AT&T Intellectual Property. All rights reserved.
6  * ===========================================================================
7  * Licensed under the Apache License, Version 2.0 (the "License");
8  * you may not use this file except in compliance with the License.
9  * You may obtain a copy of the License at
10  * 
11  *      http://www.apache.org/licenses/LICENSE-2.0
12  * 
13  * Unless required by applicable law or agreed to in writing, software
14  * distributed under the License is distributed on an "AS IS" BASIS,
15  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16  * See the License for the specific language governing permissions and
17  * limitations under the License.
18  * ============LICENSE_END====================================================
19  *
20  */
21
22 package org.onap.aaf.cadi.aaf;
23
24 import java.io.IOException;
25 import java.io.PrintStream;
26 import java.net.HttpURLConnection;
27 import java.net.InetSocketAddress;
28 import java.net.Socket;
29 import java.net.URI;
30 import java.util.ArrayList;
31 import java.util.Date;
32 import java.util.List;
33
34 import org.onap.aaf.cadi.CadiException;
35 import org.onap.aaf.cadi.Locator;
36 import org.onap.aaf.cadi.LocatorException;
37 import org.onap.aaf.cadi.PropAccess;
38 import org.onap.aaf.cadi.SecuritySetter;
39 import org.onap.aaf.cadi.Access.Level;
40 import org.onap.aaf.cadi.Locator.Item;
41 import org.onap.aaf.cadi.aaf.v2_0.AAFLocator;
42 import org.onap.aaf.cadi.client.Future;
43 import org.onap.aaf.cadi.config.Config;
44 import org.onap.aaf.cadi.config.SecurityInfoC;
45 import org.onap.aaf.cadi.http.HBasicAuthSS;
46 import org.onap.aaf.cadi.http.HClient;
47 import org.onap.aaf.cadi.http.HX509SS;
48 import org.onap.aaf.cadi.oauth.HRenewingTokenSS;
49 import org.onap.aaf.misc.env.APIException;
50
51 public class TestConnectivity {
52         
53         public static void main(String[] args) {
54                 if(args.length<1) {
55                         System.out.println("Usage: ConnectivityTester <cadi_prop_files> [<AAF FQDN (i.e. aaf.dev.att.com)>]");
56                 } else {
57                         print(true,"START OF CONNECTIVITY TESTS",new Date().toString(),System.getProperty("user.name"),
58                                         "Note: All API Calls are /authz/perms/user/<MechID/Alias of the caller>");
59
60                         if(!args[0].contains(Config.CADI_PROP_FILES+'=')) {
61                                 args[0]=Config.CADI_PROP_FILES+'='+args[0];
62                         }
63
64                         PropAccess access = new PropAccess(args);
65                         String aaflocate;
66                         if(args.length>1) {
67                                 aaflocate = "https://" + args[1] + "/locate";
68                                 access.setProperty(Config.AAF_LOCATE_URL, "https://" + args[1]);
69                         } else {
70                                 aaflocate = access.getProperty(Config.AAF_LOCATE_URL);
71                                 if(aaflocate==null) {
72                                         print(true,"Properties must contain ",Config.AAF_LOCATE_URL);
73                                 } else if (!aaflocate.endsWith("/locate")) {
74                                         aaflocate += "/locate";
75                                 }
76                         }
77                         
78                         try {
79                                 SecurityInfoC<HttpURLConnection> si = SecurityInfoC.instance(access, HttpURLConnection.class);
80                                 
81                                 List<SecuritySetter<HttpURLConnection>> lss = loadSetters(access,si);
82                                 /////////
83                                 print(true,"Test Connections driven by AAFLocator");
84                                 URI serviceURI = new URI(aaflocate+"/AAF_NS.service/2.0");
85
86                                 for(URI uri : new URI[] {
87                                                 serviceURI,
88                                                 new URI(aaflocate+"/AAF_NS.service:2.0"),
89                                                 new URI(aaflocate+"/AAF_NS.service"),
90                                                 new URI(aaflocate+"/AAF_NS.gw:2.0"),
91                                                 new URI(aaflocate+"/AAF_NS.token:2.0"),
92                                                 new URI(aaflocate+"/AAF_NS.certman:2.0"),
93                                                 new URI(aaflocate+"/AAF_NS.hello")
94                                 }) {
95                                         Locator<URI> locator = new AAFLocator(si, uri);
96                                         try {
97                                                 connectTest(locator, uri);
98                                         } catch (Exception e) {
99                                                 e.printStackTrace();
100                                                 System.err.flush();
101                                         }
102                                 }
103
104                                 /////////
105                                 print(true,"Test Service driven by AAFLocator");
106                                 Locator<URI> locator = new AAFLocator(si,new URI(aaflocate+"/AAF_NS.service:2.0"));
107                                 for(SecuritySetter<HttpURLConnection> ss : lss) {
108                                         permTest(locator,ss);
109                                 }
110
111                                 /////////
112                                 // Removed for ONAP
113 //                              print(true,"Test Proxy Access driven by AAFLocator");
114 //                              locator = new AAFLocator(si, new URI(aaflocate+"/AAF_NS.gw:2.0/proxy"));
115 //                              for(SecuritySetter<HttpURLConnection> ss : lss) {
116 //                                      permTest(locator,ss);
117 //                              }
118
119                                 //////////
120                                 print(true,"Test essential BasicAuth Service call, driven by AAFLocator");
121                                 for(SecuritySetter<HttpURLConnection> ss : lss) {
122                                         if(ss instanceof HBasicAuthSS) {
123                                                 basicAuthTest(new AAFLocator(si, new URI(aaflocate+"/AAF_NS.service:2.0")),ss);
124                                         }
125                                 }
126                                 
127                         } catch(Exception e) {
128                                 e.printStackTrace(System.err);
129                         } finally {
130                                 print(true,"END OF TESTS");
131                         }
132                 }
133         }
134         
135         private static List<SecuritySetter<HttpURLConnection>> loadSetters(PropAccess access, SecurityInfoC<HttpURLConnection> si)  {
136                 print(true,"Load Security Setters from Configuration Information");
137                 String user = access.getProperty(Config.AAF_APPID);
138
139                 ArrayList<SecuritySetter<HttpURLConnection>> lss = new ArrayList<SecuritySetter<HttpURLConnection>>();
140                 
141
142                 try {
143                         HBasicAuthSS hbass = new HBasicAuthSS(si,true);
144                         if(hbass==null || hbass.getID()==null) {
145                                 access.log(Level.INFO, "BasicAuth Information is not available in configuration, BasicAuth tests will not be conducted... Continuing");
146                         } else {
147                                 access.log(Level.INFO, "BasicAuth Information found with ID",hbass.getID(),".  BasicAuth tests will be performed.");
148                                 lss.add(hbass);
149                         }
150                 } catch (Exception e) {
151                         access.log(Level.INFO, "BasicAuth Security Setter constructor threw exception: \"",e.getMessage(),"\". BasicAuth tests will not be performed");
152                 }
153
154                 try {
155                         HX509SS hxss = new HX509SS(user,si);
156                         if(hxss==null || hxss.getID()==null) {
157                                 access.log(Level.INFO, "X509 (Client certificate) Information is not available in configuration, X509 tests will not be conducted... Continuing");
158                         } else {
159                                 access.log(Level.INFO, "X509 (Client certificate) Information found with ID",hxss.getID(),".  X509 tests will be performed.");
160                                 lss.add(hxss);
161                         }
162                 } catch (Exception e) {
163                         access.log(Level.INFO, "X509 (Client certificate) Security Setter constructor threw exception: \"",e.getMessage(),"\". X509 tests will not be performed");
164                 }
165
166                 String tokenURL = access.getProperty(Config.AAF_OAUTH2_TOKEN_URL);
167                 String locateURL=access.getProperty(Config.AAF_LOCATE_URL);
168                 if(tokenURL==null || (tokenURL.contains("/locate/") && locateURL!=null)) {
169                         tokenURL=locateURL+"/locate/AAF_NS.token:2.0/token";
170                 }
171
172                 try {
173                         HRenewingTokenSS hrtss = new HRenewingTokenSS(access, tokenURL);
174                         access.log(Level.INFO, "AAF OAUTH2 Information found with ID",hrtss.getID(),".  AAF OAUTH2 tests will be performed.");
175                         lss.add(hrtss);
176                 } catch (Exception e) {
177                         access.log(Level.INFO, "AAF OAUTH2 Security Setter constructor threw exception: \"",e.getMessage(),"\". AAF OAUTH2 tests will not be conducted... Continuing");
178                 }
179                 
180                 tokenURL = access.getProperty(Config.AAF_ALT_OAUTH2_TOKEN_URL);
181                 if(tokenURL==null) {
182                         access.log(Level.INFO, "AAF Alternative OAUTH2 requires",Config.AAF_ALT_OAUTH2_TOKEN_URL, "OAuth2 tests to", tokenURL, "will not be conducted... Continuing");
183                 } else {
184                         try {
185                                 HRenewingTokenSS hrtss = new HRenewingTokenSS(access, tokenURL);
186                                 access.log(Level.INFO, "ALT OAUTH2 Information found with ID",hrtss.getID(),".  ALT OAUTH2 tests will be performed.");
187                                 lss.add(hrtss);
188                         } catch (Exception e) {
189                                 access.log(Level.INFO, "ALT OAUTH2 Security Setter constructor threw exception: \"",e.getMessage(),"\". ALT OAuth2 tests to", tokenURL, " will not be conducted... Continuing");
190                         }
191                 }
192                 
193                 return lss;
194         }
195
196         private static void print(Boolean strong, String ... args) {
197                 PrintStream out = System.out;
198                 out.println();
199                 if(strong) {
200                         for(int i=0;i<70;++i) {
201                                 out.print('=');
202                         }
203                         out.println();
204                 }
205                 for(String s : args) {
206                         out.print(strong?"==  ":"------ ");
207                         out.print(s);
208                         if(!strong) {
209                                 out.print("  ------");
210                         }
211                         out.println();
212                 }
213                 if(strong) {
214                         for(int i=0;i<70;++i) {
215                                 out.print('=');
216                         }
217                 }
218                 out.println();
219         }
220
221         private static void connectTest(Locator<URI> dl, URI locatorURI) throws LocatorException {
222                 URI uri;
223                 Socket socket;
224                 print(false,"TCP/IP Connect test to all Located Services for "  + locatorURI.toString() );
225                 for(Item li = dl.first();li!=null;li=dl.next(li)) {
226                         if((uri = dl.get(li)) == null) {
227                                 System.out.println("Locator Item empty");
228                         } else {
229                                 socket = new Socket();
230                                 try {
231                                         try {
232                                                 socket.connect(new InetSocketAddress(uri.getHost(),  uri.getPort()),3000);
233                                                 System.out.printf("Can Connect a Socket to %s %d\n",uri.getHost(),uri.getPort());
234                                         } catch (IOException e) {
235                                                 System.out.printf("Cannot Connect a Socket to  %s %d: %s\n",uri.getHost(),uri.getPort(),e.getMessage());
236                                         }
237                                 } finally {
238                                         try {
239                                                 socket.close();
240                                         } catch (IOException e1) {
241                                                 System.out.printf("Could not close Socket Connection: %s\n",e1.getMessage());
242                                         }
243                                 }
244                         }
245                 }
246         }
247
248         private static void permTest(Locator<URI> dl, SecuritySetter<HttpURLConnection> ss)  {
249                 try {
250                         URI uri = dl.get(dl.best());
251                         if(uri==null) {
252                                 System.out.print("No URI available using " + ss.getClass().getSimpleName());
253                                 System.out.println();
254                                 return;
255                         } else {
256                                 System.out.print("Resolved to: " + uri + " using " + ss.getClass().getSimpleName());
257                         }
258                         if(ss instanceof HRenewingTokenSS) {
259                                 System.out.println(" " + ((HRenewingTokenSS)ss).tokenURL());
260                         } else {
261                                 System.out.println();
262                         }
263                         HClient client = new HClient(ss, uri, 3000);
264                         client.setMethod("GET");
265                         String user = ss.getID();
266                         if(user.indexOf('@')<0) {
267                                 user+="@isam.att.com";
268                         }
269                         client.setPathInfo("/authz/perms/user/"+user);
270                         client.send();
271                         Future<String> future = client.futureReadString();
272                         if(future.get(7000)) {
273                                 System.out.println(future.body());      
274                         } else {
275                                 if(future.code()==401 && ss instanceof HX509SS) {
276                                         System.out.println("  Authentication denied with 401 for Certificate.\n\t"
277                                                         + "This means Certificate isn't valid for this environment, and has attempted another method of Authentication");
278                                 } else {
279                                         System.out.println(future.code() + ":" + future.body());
280                                 }
281                         }
282                 } catch (CadiException | LocatorException | APIException e) {
283                         e.printStackTrace();
284                 }
285         }
286
287
288         private static void basicAuthTest(Locator<URI> dl, SecuritySetter<HttpURLConnection> ss) {
289                 try {
290                         URI uri = dl.get(dl.best());
291                         System.out.println("Resolved to: " + uri);
292                         HClient client = new HClient(ss, uri, 3000);
293                         client.setMethod("GET");
294                         client.setPathInfo("/authn/basicAuth");
295                         client.addHeader("Accept", "text/plain");
296                         client.send();
297         
298                 
299                         Future<String> future = client.futureReadString();
300                         if(future.get(7000)) {
301                                 System.out.println("BasicAuth Validated");      
302                         } else {
303                                 System.out.println("Failure " + future.code() + ":" + future.body());
304                         }
305                 } catch (CadiException | LocatorException | APIException e) {
306                         e.printStackTrace();
307                 }
308         }
309 }