2 * ============LICENSE_START====================================================
4 * ===========================================================================
5 * Copyright (c) 2018 AT&T Intellectual Property. All rights reserved.
6 * ===========================================================================
7 * Licensed under the Apache License, Version 2.0 (the "License");
8 * you may not use this file except in compliance with the License.
9 * You may obtain a copy of the License at
11 * http://www.apache.org/licenses/LICENSE-2.0
13 * Unless required by applicable law or agreed to in writing, software
14 * distributed under the License is distributed on an "AS IS" BASIS,
15 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 * See the License for the specific language governing permissions and
17 * limitations under the License.
18 * ============LICENSE_END====================================================
22 package org.onap.aaf.cadi.aaf;
24 import java.io.IOException;
25 import java.io.PrintStream;
26 import java.net.HttpURLConnection;
27 import java.net.InetSocketAddress;
28 import java.net.Socket;
30 import java.util.ArrayList;
31 import java.util.Date;
32 import java.util.List;
34 import org.onap.aaf.cadi.CadiException;
35 import org.onap.aaf.cadi.Locator;
36 import org.onap.aaf.cadi.LocatorException;
37 import org.onap.aaf.cadi.PropAccess;
38 import org.onap.aaf.cadi.SecuritySetter;
39 import org.onap.aaf.cadi.Access.Level;
40 import org.onap.aaf.cadi.Locator.Item;
41 import org.onap.aaf.cadi.aaf.v2_0.AAFLocator;
42 import org.onap.aaf.cadi.client.Future;
43 import org.onap.aaf.cadi.config.Config;
44 import org.onap.aaf.cadi.config.SecurityInfoC;
45 import org.onap.aaf.cadi.http.HBasicAuthSS;
46 import org.onap.aaf.cadi.http.HClient;
47 import org.onap.aaf.cadi.http.HX509SS;
48 import org.onap.aaf.cadi.oauth.HRenewingTokenSS;
49 import org.onap.aaf.misc.env.APIException;
51 public class TestConnectivity {
53 public static void main(String[] args) {
55 System.out.println("Usage: ConnectivityTester <cadi_prop_files> [<AAF FQDN (i.e. aaf.dev.att.com)>]");
57 print(true,"START OF CONNECTIVITY TESTS",new Date().toString(),System.getProperty("user.name"),
58 "Note: All API Calls are /authz/perms/user/<MechID/Alias of the caller>");
60 if(!args[0].contains(Config.CADI_PROP_FILES+'=')) {
61 args[0]=Config.CADI_PROP_FILES+'='+args[0];
64 PropAccess access = new PropAccess(args);
67 aaflocate = "https://" + args[1] + "/locate";
68 access.setProperty(Config.AAF_LOCATE_URL, "https://" + args[1]);
70 aaflocate = access.getProperty(Config.AAF_LOCATE_URL);
72 print(true,"Properties must contain ",Config.AAF_LOCATE_URL);
73 } else if (!aaflocate.endsWith("/locate")) {
74 aaflocate += "/locate";
79 SecurityInfoC<HttpURLConnection> si = SecurityInfoC.instance(access, HttpURLConnection.class);
81 List<SecuritySetter<HttpURLConnection>> lss = loadSetters(access,si);
83 print(true,"Test Connections driven by AAFLocator");
84 URI serviceURI = new URI(aaflocate+"/AAF_NS.service/2.0");
86 for(URI uri : new URI[] {
88 new URI(aaflocate+"/AAF_NS.service:2.0"),
89 new URI(aaflocate+"/AAF_NS.service"),
90 new URI(aaflocate+"/AAF_NS.gw:2.0"),
91 new URI(aaflocate+"/AAF_NS.token:2.0"),
92 new URI(aaflocate+"/AAF_NS.certman:2.0"),
93 new URI(aaflocate+"/AAF_NS.hello")
95 Locator<URI> locator = new AAFLocator(si, uri);
97 connectTest(locator, uri);
98 } catch (Exception e) {
105 print(true,"Test Service driven by AAFLocator");
106 Locator<URI> locator = new AAFLocator(si,new URI(aaflocate+"/AAF_NS.service:2.0"));
107 for(SecuritySetter<HttpURLConnection> ss : lss) {
108 permTest(locator,ss);
113 // print(true,"Test Proxy Access driven by AAFLocator");
114 // locator = new AAFLocator(si, new URI(aaflocate+"/AAF_NS.gw:2.0/proxy"));
115 // for(SecuritySetter<HttpURLConnection> ss : lss) {
116 // permTest(locator,ss);
120 print(true,"Test essential BasicAuth Service call, driven by AAFLocator");
121 for(SecuritySetter<HttpURLConnection> ss : lss) {
122 if(ss instanceof HBasicAuthSS) {
123 basicAuthTest(new AAFLocator(si, new URI(aaflocate+"/AAF_NS.service:2.0")),ss);
127 } catch(Exception e) {
128 e.printStackTrace(System.err);
130 print(true,"END OF TESTS");
135 private static List<SecuritySetter<HttpURLConnection>> loadSetters(PropAccess access, SecurityInfoC<HttpURLConnection> si) {
136 print(true,"Load Security Setters from Configuration Information");
137 String user = access.getProperty(Config.AAF_APPID);
139 ArrayList<SecuritySetter<HttpURLConnection>> lss = new ArrayList<SecuritySetter<HttpURLConnection>>();
143 HBasicAuthSS hbass = new HBasicAuthSS(si,true);
144 if(hbass==null || hbass.getID()==null) {
145 access.log(Level.INFO, "BasicAuth Information is not available in configuration, BasicAuth tests will not be conducted... Continuing");
147 access.log(Level.INFO, "BasicAuth Information found with ID",hbass.getID(),". BasicAuth tests will be performed.");
150 } catch (Exception e) {
151 access.log(Level.INFO, "BasicAuth Security Setter constructor threw exception: \"",e.getMessage(),"\". BasicAuth tests will not be performed");
155 HX509SS hxss = new HX509SS(user,si);
156 if(hxss==null || hxss.getID()==null) {
157 access.log(Level.INFO, "X509 (Client certificate) Information is not available in configuration, X509 tests will not be conducted... Continuing");
159 access.log(Level.INFO, "X509 (Client certificate) Information found with ID",hxss.getID(),". X509 tests will be performed.");
162 } catch (Exception e) {
163 access.log(Level.INFO, "X509 (Client certificate) Security Setter constructor threw exception: \"",e.getMessage(),"\". X509 tests will not be performed");
166 String tokenURL = access.getProperty(Config.AAF_OAUTH2_TOKEN_URL);
167 String locateURL=access.getProperty(Config.AAF_LOCATE_URL);
168 if(tokenURL==null || (tokenURL.contains("/locate/") && locateURL!=null)) {
169 tokenURL=locateURL+"/locate/AAF_NS.token:2.0/token";
173 HRenewingTokenSS hrtss = new HRenewingTokenSS(access, tokenURL);
174 access.log(Level.INFO, "AAF OAUTH2 Information found with ID",hrtss.getID(),". AAF OAUTH2 tests will be performed.");
176 } catch (Exception e) {
177 access.log(Level.INFO, "AAF OAUTH2 Security Setter constructor threw exception: \"",e.getMessage(),"\". AAF OAUTH2 tests will not be conducted... Continuing");
180 tokenURL = access.getProperty(Config.AAF_ALT_OAUTH2_TOKEN_URL);
182 access.log(Level.INFO, "AAF Alternative OAUTH2 requires",Config.AAF_ALT_OAUTH2_TOKEN_URL, "OAuth2 tests to", tokenURL, "will not be conducted... Continuing");
185 HRenewingTokenSS hrtss = new HRenewingTokenSS(access, tokenURL);
186 access.log(Level.INFO, "ALT OAUTH2 Information found with ID",hrtss.getID(),". ALT OAUTH2 tests will be performed.");
188 } catch (Exception e) {
189 access.log(Level.INFO, "ALT OAUTH2 Security Setter constructor threw exception: \"",e.getMessage(),"\". ALT OAuth2 tests to", tokenURL, " will not be conducted... Continuing");
196 private static void print(Boolean strong, String ... args) {
197 PrintStream out = System.out;
200 for(int i=0;i<70;++i) {
205 for(String s : args) {
206 out.print(strong?"== ":"------ ");
209 out.print(" ------");
214 for(int i=0;i<70;++i) {
221 private static void connectTest(Locator<URI> dl, URI locatorURI) throws LocatorException {
224 print(false,"TCP/IP Connect test to all Located Services for " + locatorURI.toString() );
225 for(Item li = dl.first();li!=null;li=dl.next(li)) {
226 if((uri = dl.get(li)) == null) {
227 System.out.println("Locator Item empty");
229 socket = new Socket();
232 socket.connect(new InetSocketAddress(uri.getHost(), uri.getPort()),3000);
233 System.out.printf("Can Connect a Socket to %s %d\n",uri.getHost(),uri.getPort());
234 } catch (IOException e) {
235 System.out.printf("Cannot Connect a Socket to %s %d: %s\n",uri.getHost(),uri.getPort(),e.getMessage());
240 } catch (IOException e1) {
241 System.out.printf("Could not close Socket Connection: %s\n",e1.getMessage());
248 private static void permTest(Locator<URI> dl, SecuritySetter<HttpURLConnection> ss) {
250 URI uri = dl.get(dl.best());
252 System.out.print("No URI available using " + ss.getClass().getSimpleName());
253 System.out.println();
256 System.out.print("Resolved to: " + uri + " using " + ss.getClass().getSimpleName());
258 if(ss instanceof HRenewingTokenSS) {
259 System.out.println(" " + ((HRenewingTokenSS)ss).tokenURL());
261 System.out.println();
263 HClient client = new HClient(ss, uri, 3000);
264 client.setMethod("GET");
265 String user = ss.getID();
266 if(user.indexOf('@')<0) {
267 user+="@isam.att.com";
269 client.setPathInfo("/authz/perms/user/"+user);
271 Future<String> future = client.futureReadString();
272 if(future.get(7000)) {
273 System.out.println(future.body());
275 if(future.code()==401 && ss instanceof HX509SS) {
276 System.out.println(" Authentication denied with 401 for Certificate.\n\t"
277 + "This means Certificate isn't valid for this environment, and has attempted another method of Authentication");
279 System.out.println(future.code() + ":" + future.body());
282 } catch (CadiException | LocatorException | APIException e) {
288 private static void basicAuthTest(Locator<URI> dl, SecuritySetter<HttpURLConnection> ss) {
290 URI uri = dl.get(dl.best());
291 System.out.println("Resolved to: " + uri);
292 HClient client = new HClient(ss, uri, 3000);
293 client.setMethod("GET");
294 client.setPathInfo("/authn/basicAuth");
295 client.addHeader("Accept", "text/plain");
299 Future<String> future = client.futureReadString();
300 if(future.get(7000)) {
301 System.out.println("BasicAuth Validated");
303 System.out.println("Failure " + future.code() + ":" + future.body());
305 } catch (CadiException | LocatorException | APIException e) {