Mass removal of all Tabs (Style Warnings)
[aaf/authz.git] / cadi / core / src / main / java / org / onap / aaf / cadi / filter / CadiHTTPManip.java
index 9d1653f..3c0f139 100644 (file)
@@ -55,159 +55,159 @@ import org.onap.aaf.cadi.util.UserChainManip;
  *
  */
 public class CadiHTTPManip {
-       private static final String ACCESS_CADI_CONTROL = ".access|cadi|control";
-       private static final String METH = "OPTIONS";
-       private static final String CADI = "/cadi/";
-       private static final String CADI_CACHE_PRINT = "/cadi/cache/print";
-       private static final String CADI_CACHE_CLEAR = "/cadi/cache/clear";
-       private static final String CADI_LOG_SET = "/cadi/log/set/";
-       private static final Object LOCK = new Object();
-       private Access access;
-       private HttpTaf taf;
-       private CredVal up;
-       private Lur lur;
-       private String thisPerm,companyPerm,aaf_id;
-       
-       public static final Object[] noAdditional = new Object[0]; // CadiFilter can be created each call in some systems
+    private static final String ACCESS_CADI_CONTROL = ".access|cadi|control";
+    private static final String METH = "OPTIONS";
+    private static final String CADI = "/cadi/";
+    private static final String CADI_CACHE_PRINT = "/cadi/cache/print";
+    private static final String CADI_CACHE_CLEAR = "/cadi/cache/clear";
+    private static final String CADI_LOG_SET = "/cadi/log/set/";
+    private static final Object LOCK = new Object();
+    private Access access;
+    private HttpTaf taf;
+    private CredVal up;
+    private Lur lur;
+    private String thisPerm,companyPerm,aaf_id;
+    
+    public static final Object[] noAdditional = new Object[0]; // CadiFilter can be created each call in some systems
 
 
-       public CadiHTTPManip(Access access, Connector con, TrustChecker tc, Object ... additionalTafLurs) throws CadiException, LocatorException {
-               synchronized(LOCK) {
-                       this.access = access;
-//                     Get getter = new AccessGetter(access);
-                       Config.setDefaultRealm(access);
-       
-                       aaf_id = access.getProperty(Config.CADI_ALIAS,access.getProperty(Config.AAF_APPID, null));
-                       if(aaf_id==null) {
-                               access.printf(Level.INIT, "%s is not set. %s can be used instead",Config.AAF_APPID,Config.CADI_ALIAS);
-                       } else {
-                               access.printf(Level.INIT, "%s is set to %s",Config.AAF_APPID,aaf_id);
-                       }
-                       String ns = aaf_id==null?null:UserChainManip.idToNS(aaf_id);
-                       if(ns!=null) {
-                               thisPerm = ns+ACCESS_CADI_CONTROL;
-                               int dot = ns.indexOf('.');
-                               if(dot>=0) {
-                                       int dot2=ns.indexOf('.',dot+1);
-                                       if(dot2<0) {
-                                               dot2=dot;
-                                       }
-                                       companyPerm = ns.substring(0, dot2)+ACCESS_CADI_CONTROL;
-                               } else {
-                                       companyPerm = "com"+ACCESS_CADI_CONTROL;
-                               }
-                       } else {
-                               thisPerm = companyPerm = "com"+ACCESS_CADI_CONTROL;
-                       }
-                       SecurityInfoC<HttpURLConnection> si;
-                       si = SecurityInfoC.instance(access, HttpURLConnection.class);
-                       
-                       lur = Config.configLur(si, con, additionalTafLurs);
-                       
-                       tc.setLur(lur);
-                       if(lur instanceof EpiLur) {
-                               up = ((EpiLur)lur).getUserPassImpl();
-                       } else if(lur instanceof CredVal) {
-                               up = (CredVal)lur;
-                       } else {
-                               up = null;
-                       }
-                       taf = Config.configHttpTaf(con,si, tc, up, lur, additionalTafLurs);
-               }
-       }
+    public CadiHTTPManip(Access access, Connector con, TrustChecker tc, Object ... additionalTafLurs) throws CadiException, LocatorException {
+        synchronized(LOCK) {
+            this.access = access;
+//            Get getter = new AccessGetter(access);
+            Config.setDefaultRealm(access);
+    
+            aaf_id = access.getProperty(Config.CADI_ALIAS,access.getProperty(Config.AAF_APPID, null));
+            if(aaf_id==null) {
+                access.printf(Level.INIT, "%s is not set. %s can be used instead",Config.AAF_APPID,Config.CADI_ALIAS);
+            } else {
+                access.printf(Level.INIT, "%s is set to %s",Config.AAF_APPID,aaf_id);
+            }
+            String ns = aaf_id==null?null:UserChainManip.idToNS(aaf_id);
+            if(ns!=null) {
+                thisPerm = ns+ACCESS_CADI_CONTROL;
+                int dot = ns.indexOf('.');
+                if(dot>=0) {
+                    int dot2=ns.indexOf('.',dot+1);
+                    if(dot2<0) {
+                        dot2=dot;
+                    }
+                    companyPerm = ns.substring(0, dot2)+ACCESS_CADI_CONTROL;
+                } else {
+                    companyPerm = "com"+ACCESS_CADI_CONTROL;
+                }
+            } else {
+                thisPerm = companyPerm = "com"+ACCESS_CADI_CONTROL;
+            }
+            SecurityInfoC<HttpURLConnection> si;
+            si = SecurityInfoC.instance(access, HttpURLConnection.class);
+            
+            lur = Config.configLur(si, con, additionalTafLurs);
+            
+            tc.setLur(lur);
+            if(lur instanceof EpiLur) {
+                up = ((EpiLur)lur).getUserPassImpl();
+            } else if(lur instanceof CredVal) {
+                up = (CredVal)lur;
+            } else {
+                up = null;
+            }
+            taf = Config.configHttpTaf(con,si, tc, up, lur, additionalTafLurs);
+        }
+    }
 
-       public TafResp validate(HttpServletRequest hreq, HttpServletResponse hresp, Object state) throws IOException {
-               TafResp tresp = taf.validate(Taf.LifeForm.LFN, hreq, hresp);
-               switch(tresp.isAuthenticated()) {
-                       case IS_AUTHENTICATED:
-                               access.printf(Level.INFO,"Authenticated: %s from %s:%d", 
-                                               tresp.desc(), hreq.getRemoteAddr(), hreq.getRemotePort());
-                               break;
-                       case TRY_AUTHENTICATING:
-                               switch (tresp.authenticate()) {
-                                       case IS_AUTHENTICATED:
-                                               access.printf(Level.INFO,"Authenticated: %s from %s:%d", 
-                                                               tresp.desc(), hreq.getRemoteAddr(), hreq.getRemotePort());
-                                               break;
-                                       case HTTP_REDIRECT_INVOKED:
-                                               access.log(Level.INFO,"Authenticating via redirection: ", tresp.desc());
-                                               break;
-                                       case NO_FURTHER_PROCESSING:
-                                               access.printf(Level.AUDIT,"Authentication Failure: %s from %s:%d"
-                                                               , tresp.desc(), hreq.getRemoteAddr(), hreq.getRemotePort());
-                                               hresp.sendError(403, tresp.desc()); // Forbidden
-                                               break;
+    public TafResp validate(HttpServletRequest hreq, HttpServletResponse hresp, Object state) throws IOException {
+        TafResp tresp = taf.validate(Taf.LifeForm.LFN, hreq, hresp);
+        switch(tresp.isAuthenticated()) {
+            case IS_AUTHENTICATED:
+                access.printf(Level.INFO,"Authenticated: %s from %s:%d", 
+                        tresp.desc(), hreq.getRemoteAddr(), hreq.getRemotePort());
+                break;
+            case TRY_AUTHENTICATING:
+                switch (tresp.authenticate()) {
+                    case IS_AUTHENTICATED:
+                        access.printf(Level.INFO,"Authenticated: %s from %s:%d", 
+                                tresp.desc(), hreq.getRemoteAddr(), hreq.getRemotePort());
+                        break;
+                    case HTTP_REDIRECT_INVOKED:
+                        access.log(Level.INFO,"Authenticating via redirection: ", tresp.desc());
+                        break;
+                    case NO_FURTHER_PROCESSING:
+                        access.printf(Level.AUDIT,"Authentication Failure: %s from %s:%d"
+                                , tresp.desc(), hreq.getRemoteAddr(), hreq.getRemotePort());
+                        hresp.sendError(403, tresp.desc()); // Forbidden
+                        break;
 
-                                       default:
-                                               access.printf(Level.AUDIT,"No TAF will authorize for request from %s:%d"
-                                                               , hreq.getRemoteAddr(), hreq.getRemotePort());
-                                               hresp.sendError(403, tresp.desc()); // Forbidden
-                               }
-                               break;
-                       case NO_FURTHER_PROCESSING:
-                               access.printf(Level.AUDIT,"Authentication Failure: %s from %s:%d", 
-                                               tresp.desc(), hreq.getRemoteAddr(), hreq.getRemotePort());
-                               hresp.sendError(403, "Access Denied"); // FORBIDDEN
-                               break;
-                       default:
-                               access.printf(Level.AUDIT,"No TAF will authorize for request from %s:%d"
-                                               , hreq.getRemoteAddr(), hreq.getRemotePort());
-                               hresp.sendError(403, "Access Denied"); // FORBIDDEN
-               }
-               return tresp;
-       }
-       
-       public boolean notCadi(CadiWrap req, HttpServletResponse resp) {
-               
-               String pathInfo = req.getPathInfo();
-               if(METH.equalsIgnoreCase(req.getMethod()) && pathInfo!=null && pathInfo.contains(CADI)) {
-                       if(req.getUser().equals(aaf_id) || req.isUserInRole(thisPerm) || req.isUserInRole(companyPerm)) {
-                               try {
-                                       if(pathInfo.contains(CADI_CACHE_PRINT)) {
-                                               resp.getOutputStream().println(lur.toString());
-                                               resp.setStatus(200);
-                                               return false;
-                                       } else if(pathInfo.contains(CADI_CACHE_CLEAR)) {
-                                               StringBuilder report = new StringBuilder();
-                                               lur.clear(req.getUserPrincipal(), report);
-                                               resp.getOutputStream().println(report.toString());
-                                               resp.setStatus(200);
-                                               return false;
-                                       } else if(pathInfo.contains(CADI_LOG_SET))  {
-                                               Level l;
-                                               int slash = pathInfo.lastIndexOf('/');
-                                               String level = pathInfo.substring(slash+1);
-                                               try {
-                                                       l = Level.valueOf(level);
-                                                       access.printf(Level.AUDIT, "%s has set CADI Log Level to '%s'",req.getUser(),l.name());
-                                                       access.setLogLevel(l);
-                                               } catch (IllegalArgumentException e) {
-                                                       access.printf(Level.AUDIT, "'%s' is not a valid CADI Log Level",level);
-                                               }
-                                               return false;
-                                       }
-                               } catch (IOException e) {
-                                       access.log(e);
-                               }
-                       }
-               }
-               return true;
-       }
+                    default:
+                        access.printf(Level.AUDIT,"No TAF will authorize for request from %s:%d"
+                                , hreq.getRemoteAddr(), hreq.getRemotePort());
+                        hresp.sendError(403, tresp.desc()); // Forbidden
+                }
+                break;
+            case NO_FURTHER_PROCESSING:
+                access.printf(Level.AUDIT,"Authentication Failure: %s from %s:%d", 
+                        tresp.desc(), hreq.getRemoteAddr(), hreq.getRemotePort());
+                hresp.sendError(403, "Access Denied"); // FORBIDDEN
+                break;
+            default:
+                access.printf(Level.AUDIT,"No TAF will authorize for request from %s:%d"
+                        , hreq.getRemoteAddr(), hreq.getRemotePort());
+                hresp.sendError(403, "Access Denied"); // FORBIDDEN
+        }
+        return tresp;
+    }
+    
+    public boolean notCadi(CadiWrap req, HttpServletResponse resp) {
+        
+        String pathInfo = req.getPathInfo();
+        if(METH.equalsIgnoreCase(req.getMethod()) && pathInfo!=null && pathInfo.contains(CADI)) {
+            if(req.getUser().equals(aaf_id) || req.isUserInRole(thisPerm) || req.isUserInRole(companyPerm)) {
+                try {
+                    if(pathInfo.contains(CADI_CACHE_PRINT)) {
+                        resp.getOutputStream().println(lur.toString());
+                        resp.setStatus(200);
+                        return false;
+                    } else if(pathInfo.contains(CADI_CACHE_CLEAR)) {
+                        StringBuilder report = new StringBuilder();
+                        lur.clear(req.getUserPrincipal(), report);
+                        resp.getOutputStream().println(report.toString());
+                        resp.setStatus(200);
+                        return false;
+                    } else if(pathInfo.contains(CADI_LOG_SET))  {
+                        Level l;
+                        int slash = pathInfo.lastIndexOf('/');
+                        String level = pathInfo.substring(slash+1);
+                        try {
+                            l = Level.valueOf(level);
+                            access.printf(Level.AUDIT, "%s has set CADI Log Level to '%s'",req.getUser(),l.name());
+                            access.setLogLevel(l);
+                        } catch (IllegalArgumentException e) {
+                            access.printf(Level.AUDIT, "'%s' is not a valid CADI Log Level",level);
+                        }
+                        return false;
+                    }
+                } catch (IOException e) {
+                    access.log(e);
+                }
+            }
+        }
+        return true;
+    }
 
-       public Lur getLur() {
-               return lur;
-       }
-       
-       public void destroy() {
-               access.log(Level.INFO,"CadiHttpChecker destroyed.");
-               if(lur!=null) {
-                       lur.destroy();
-                       lur=null;
-               }
-       }
+    public Lur getLur() {
+        return lur;
+    }
+    
+    public void destroy() {
+        access.log(Level.INFO,"CadiHttpChecker destroyed.");
+        if(lur!=null) {
+            lur.destroy();
+            lur=null;
+        }
+    }
 
-       public Access getAccess() {
-               return access;
-       }
+    public Access getAccess() {
+        return access;
+    }
 
 }