Mass removal of all Tabs (Style Warnings)
[aaf/authz.git] / auth / auth-cass / src / main / java / org / onap / aaf / auth / direct / DirectAAFLur.java
index eb44e14..75f6c7a 100644 (file)
@@ -42,158 +42,158 @@ import org.onap.aaf.cadi.lur.LocalPermission;
 import org.onap.aaf.misc.env.util.Split;
 
 public class DirectAAFLur implements Lur {
-       private final AuthzEnv env;
-       private final Question question;
-       
-       public DirectAAFLur(AuthzEnv env, Question question/*, TokenMgr tm*/) {
-               this.env = env;
-               this.question = question;
-//             oauth = new OAuth2Lur(null);
-       }
+    private final AuthzEnv env;
+    private final Question question;
+    
+    public DirectAAFLur(AuthzEnv env, Question question/*, TokenMgr tm*/) {
+        this.env = env;
+        this.question = question;
+//        oauth = new OAuth2Lur(null);
+    }
 
-       @Override
-       public boolean fish(Principal bait, Permission ... pond) {
-               return fish(env.newTransNoAvg(),bait,pond);
-       }
-       
-       public boolean fish(AuthzTrans trans, Principal bait, Permission ... pond) {
-               boolean rv = false;
-               Result<List<Data>> pdr = question.getPermsByUser(trans, bait.getName(),false);
-               switch(pdr.status) {
-                       case OK:
-                               for(PermDAO.Data d : pdr.value) {
-                                       if(!rv) {
-                                               for (Permission p : pond) {
-                                                       if(new PermPermission(d).match(p)) {
-                                                               rv=true;
-                                                               break;
-                                                       }
-                                               }
-                                       }
-                               }
-                               break;
-                       case Status.ERR_UserRoleNotFound:
-                       case Status.ERR_BadData:
-                               return false;
-                       default:
-                               trans.error().log("Can't access Cassandra to fulfill Permission Query: ",pdr.status,"-",pdr.details);
-               }
-               return rv;
-       }
+    @Override
+    public boolean fish(Principal bait, Permission ... pond) {
+        return fish(env.newTransNoAvg(),bait,pond);
+    }
+    
+    public boolean fish(AuthzTrans trans, Principal bait, Permission ... pond) {
+        boolean rv = false;
+        Result<List<Data>> pdr = question.getPermsByUser(trans, bait.getName(),false);
+        switch(pdr.status) {
+            case OK:
+                for(PermDAO.Data d : pdr.value) {
+                    if(!rv) {
+                        for (Permission p : pond) {
+                            if(new PermPermission(d).match(p)) {
+                                rv=true;
+                                break;
+                            }
+                        }
+                    }
+                }
+                break;
+            case Status.ERR_UserRoleNotFound:
+            case Status.ERR_BadData:
+                return false;
+            default:
+                trans.error().log("Can't access Cassandra to fulfill Permission Query: ",pdr.status,"-",pdr.details);
+        }
+        return rv;
+    }
 
-       @Override
-       public void fishAll(Principal bait, List<Permission> permissions) {
-               Result<List<Data>> pdr = question.getPermsByUser(env.newTrans(), bait.getName(),false);
-               switch(pdr.status) {
-                       case OK:
-                               for(PermDAO.Data d : pdr.value) {
-                                       permissions.add(new PermPermission(d));
-                               }
-                               break;
-                       default:
-                               env.error().log("Can't access Cassandra to fulfill Permission Query: ",pdr.status,"-", pdr.details);
-               }
-       }
-       
-       @Override
-       public void destroy() {
-       }
+    @Override
+    public void fishAll(Principal bait, List<Permission> permissions) {
+        Result<List<Data>> pdr = question.getPermsByUser(env.newTrans(), bait.getName(),false);
+        switch(pdr.status) {
+            case OK:
+                for(PermDAO.Data d : pdr.value) {
+                    permissions.add(new PermPermission(d));
+                }
+                break;
+            default:
+                env.error().log("Can't access Cassandra to fulfill Permission Query: ",pdr.status,"-", pdr.details);
+        }
+    }
+    
+    @Override
+    public void destroy() {
+    }
 
-       @Override
-       public boolean handlesExclusively(Permission ... pond) {
-               return false;
-       }
-       
-       /**
-        * Small Class implementing CADI's Permission with Cassandra Data
-        * @author Jonathan
-        *
-        */
-       public static class PermPermission implements Permission {
-               private PermDAO.Data data;
-               
-               public PermPermission(PermDAO.Data d) {
-                       data = d;
-               }
-               
-               public PermPermission(AuthzTrans trans, Question q, String p) {
-                       data = PermDAO.Data.create(trans, q, p);
-               }
-               
-               public PermPermission(String ns, String type, String instance, String action) {
-                       data = new PermDAO.Data();
-                       data.ns = ns;
-                       data.type = type;
-                       data.instance = instance;
-                       data.action = action;
-               }
+    @Override
+    public boolean handlesExclusively(Permission ... pond) {
+        return false;
+    }
+    
+    /**
+     * Small Class implementing CADI's Permission with Cassandra Data
+     * @author Jonathan
+     *
+     */
+    public static class PermPermission implements Permission {
+        private PermDAO.Data data;
+        
+        public PermPermission(PermDAO.Data d) {
+            data = d;
+        }
+        
+        public PermPermission(AuthzTrans trans, Question q, String p) {
+            data = PermDAO.Data.create(trans, q, p);
+        }
+        
+        public PermPermission(String ns, String type, String instance, String action) {
+            data = new PermDAO.Data();
+            data.ns = ns;
+            data.type = type;
+            data.instance = instance;
+            data.action = action;
+        }
 
-               @Override
-               public String getKey() {
-                       return data.type;
-               }
+        @Override
+        public String getKey() {
+            return data.type;
+        }
 
-               @Override
-               public boolean match(Permission p) {
-                       if(p==null) {
-                               return false;
-                       }
-                       PermDAO.Data pd;
-                       if(p instanceof DirectAAFLur.PermPermission) {
-                               pd = ((DirectAAFLur.PermPermission)p).data;
-                               if(data.ns.equals(pd.ns))
-                                       if(data.type.equals(pd.type))
-                                               if(data.instance!=null && (data.instance.equals(pd.instance) || "*".equals(data.instance)))
-                                                       if(data.action!=null && (data.action.equals(pd.action) || "*".equals(data.action)))
-                                                               return true;
-                       } else{
-                               String[] lp = p.getKey().split("\\|");
-                               if(lp.length<3)return false;
-                               if(data.fullType().equals(lp[0]))
-                                       if(data.instance!=null && (data.instance.equals(lp[1]) || "*".equals(data.instance)))
-                                               if(data.action!=null && (data.action.equals(lp[2]) || "*".equals(data.action)))
-                                                       return true;
-                       }
-                       return false;
-               }
+        @Override
+        public boolean match(Permission p) {
+            if(p==null) {
+                return false;
+            }
+            PermDAO.Data pd;
+            if(p instanceof DirectAAFLur.PermPermission) {
+                pd = ((DirectAAFLur.PermPermission)p).data;
+                if(data.ns.equals(pd.ns))
+                    if(data.type.equals(pd.type))
+                        if(data.instance!=null && (data.instance.equals(pd.instance) || "*".equals(data.instance)))
+                            if(data.action!=null && (data.action.equals(pd.action) || "*".equals(data.action)))
+                                return true;
+            } else{
+                String[] lp = p.getKey().split("\\|");
+                if(lp.length<3)return false;
+                if(data.fullType().equals(lp[0]))
+                    if(data.instance!=null && (data.instance.equals(lp[1]) || "*".equals(data.instance)))
+                        if(data.action!=null && (data.action.equals(lp[2]) || "*".equals(data.action)))
+                            return true;
+            }
+            return false;
+        }
 
-               @Override
-               public String permType() {
-                       return "AAFLUR";
-               }
-               
-       }
-       
-       public String toString() {
-               return "DirectAAFLur is enabled";
-               
-       }
+        @Override
+        public String permType() {
+            return "AAFLUR";
+        }
+        
+    }
+    
+    public String toString() {
+        return "DirectAAFLur is enabled";
+        
+    }
 
-       /* (non-Javadoc)
-        * @see org.onap.aaf.cadi.Lur#handles(java.security.Principal)
-        */
-       @Override
-       public boolean handles(Principal principal) {
-               return true;
-       }
+    /* (non-Javadoc)
+     * @see org.onap.aaf.cadi.Lur#handles(java.security.Principal)
+     */
+    @Override
+    public boolean handles(Principal principal) {
+        return true;
+    }
 
-       @Override
-       public Permission createPerm(String p) {
-               String[] params = Split.split('|', p);
-               if(params.length==3) {
-                       Result<NsSplit> nss = question.deriveNsSplit(NullTrans.singleton(), params[0]);
-                       if(nss.isOK()) {
-                               return new PermPermission(nss.value.ns,nss.value.name,params[1],params[2]);
-                       }
-               }
-               return new LocalPermission(p);
-       }
+    @Override
+    public Permission createPerm(String p) {
+        String[] params = Split.split('|', p);
+        if(params.length==3) {
+            Result<NsSplit> nss = question.deriveNsSplit(NullTrans.singleton(), params[0]);
+            if(nss.isOK()) {
+                return new PermPermission(nss.value.ns,nss.value.name,params[1],params[2]);
+            }
+        }
+        return new LocalPermission(p);
+    }
 
-       @Override
-       public void clear(Principal p, StringBuilder sb) {
-               AuthzTrans trans = env.newTrans();
-               question.clearCache(trans,"all");
-               env.log(Level.AUDIT, p.getName(), "has cleared Cache for",getClass().getSimpleName());
-               trans.auditTrail(0, sb);
-       }
+    @Override
+    public void clear(Principal p, StringBuilder sb) {
+        AuthzTrans trans = env.newTrans();
+        question.clearCache(trans,"all");
+        env.log(Level.AUDIT, p.getName(), "has cleared Cache for",getClass().getSimpleName());
+        trans.auditTrail(0, sb);
+    }
 }