Merge "Add identities for DMaap"
authorvarun gudisena <varuneshwar.gudisena@att.com>
Sat, 10 Nov 2018 13:59:31 +0000 (13:59 +0000)
committerGerrit Code Review <gerrit@onap.org>
Sat, 10 Nov 2018 13:59:31 +0000 (13:59 +0000)
37 files changed:
auth-client/pom.xml
auth/auth-batch/pom.xml
auth/auth-cass/pom.xml
auth/auth-certman/pom.xml
auth/auth-cmd/pom.xml
auth/auth-core/pom.xml
auth/auth-core/src/main/java/org/onap/aaf/auth/validation/Validator.java
auth/auth-deforg/pom.xml
auth/auth-fs/pom.xml
auth/auth-gui/pom.xml
auth/auth-hello/pom.xml
auth/auth-locate/pom.xml
auth/auth-oauth/pom.xml
auth/auth-service/pom.xml
auth/docker/agent.sh
auth/docker/d.props.init
auth/pom.xml
cadi/aaf/pom.xml
cadi/aaf/src/main/java/org/onap/aaf/cadi/aaf/PermEval.java
cadi/aaf/src/main/java/org/onap/aaf/cadi/aaf/v2_0/AAFTaf.java
cadi/aaf/src/test/java/org/onap/aaf/cadi/aaf/test/JU_PermEval.java
cadi/client/pom.xml
cadi/core/pom.xml
cadi/core/src/main/java/org/onap/aaf/cadi/config/Config.java
cadi/core/src/main/java/org/onap/aaf/cadi/filter/CadiApiEnforcementFilter.java [new file with mode: 0644]
cadi/core/src/main/java/org/onap/aaf/cadi/filter/CadiFilter.java
cadi/core/src/main/java/org/onap/aaf/cadi/filter/SideChain.java [new file with mode: 0644]
cadi/oauth-enduser/pom.xml
cadi/pom.xml
cadi/servlet-sample/pom.xml
misc/env/pom.xml
misc/log4j/pom.xml
misc/pom.xml
misc/rosetta/pom.xml
misc/xgen/pom.xml
pom.xml
version.properties

index 32d8e7b..8e63275 100644 (file)
@@ -25,7 +25,7 @@
     <parent>
         <groupId>org.onap.aaf.authz</groupId>
         <artifactId>parent</artifactId>
-        <version>2.1.7-SNAPSHOT</version>
+        <version>2.1.8-SNAPSHOT</version>
     </parent>
        
        <artifactId>aaf-auth-client</artifactId>
index 6bebd2c..c012520 100644 (file)
@@ -25,7 +25,7 @@
        <parent>
                <groupId>org.onap.aaf.authz</groupId>
                <artifactId>authparent</artifactId>
-               <version>2.1.7-SNAPSHOT</version>
+               <version>2.1.8-SNAPSHOT</version>
                <relativePath>../pom.xml</relativePath>
        </parent>
 
index c7c0e48..eae84c9 100644 (file)
@@ -17,7 +17,7 @@
        <parent>
                <groupId>org.onap.aaf.authz</groupId>
                <artifactId>authparent</artifactId>
-               <version>2.1.7-SNAPSHOT</version>
+               <version>2.1.8-SNAPSHOT</version>
                <relativePath>../pom.xml</relativePath>
        </parent>
 
index 20c875e..1930f34 100644 (file)
@@ -20,7 +20,7 @@
        <parent>
                <groupId>org.onap.aaf.authz</groupId>
                <artifactId>authparent</artifactId>
-               <version>2.1.7-SNAPSHOT</version>
+               <version>2.1.8-SNAPSHOT</version>
                <relativePath>../pom.xml</relativePath>
        </parent>
 
index 369b53b..5c62311 100644 (file)
@@ -18,7 +18,7 @@
        <parent>
                <groupId>org.onap.aaf.authz</groupId>
                <artifactId>authparent</artifactId>
-               <version>2.1.7-SNAPSHOT</version>
+               <version>2.1.8-SNAPSHOT</version>
                <relativePath>../pom.xml</relativePath>
        </parent>
 
index 9e8f30d..d484bd4 100644 (file)
@@ -25,7 +25,7 @@
        <parent>
                <groupId>org.onap.aaf.authz</groupId>
                <artifactId>authparent</artifactId>
-               <version>2.1.7-SNAPSHOT</version>
+               <version>2.1.8-SNAPSHOT</version>
                <relativePath>../pom.xml</relativePath>
        </parent>
 
index 1c9f412..7e861ed 100644 (file)
@@ -155,7 +155,7 @@ public class Validator {
     }
 
     public final Validator permInstance(String instance) {
-        if (nob(instance,instChars)) {
+       if(!"/".equals(instance) && nob(instance,instChars)) {
             msg("Perm Instance [" + instance + "] is invalid.");
         }
         return this;
index ed1fe92..ac519f9 100644 (file)
@@ -26,7 +26,7 @@
                <artifactId>authparent</artifactId>
                <relativePath>../pom.xml</relativePath>
                <groupId>org.onap.aaf.authz</groupId>
-               <version>2.1.7-SNAPSHOT</version>
+               <version>2.1.8-SNAPSHOT</version>
        </parent>
 
        <artifactId>aaf-auth-deforg</artifactId>
index 671d4a2..92b3f11 100644 (file)
@@ -17,7 +17,7 @@
        <parent>
                <groupId>org.onap.aaf.authz</groupId>
                <artifactId>authparent</artifactId>
-               <version>2.1.7-SNAPSHOT</version>
+               <version>2.1.8-SNAPSHOT</version>
                <relativePath>../pom.xml</relativePath>
        </parent>
 
index d5b1c6f..5442309 100644 (file)
@@ -17,7 +17,7 @@
        <parent>
                <groupId>org.onap.aaf.authz</groupId>
                <artifactId>authparent</artifactId>
-               <version>2.1.7-SNAPSHOT</version>
+               <version>2.1.8-SNAPSHOT</version>
                <relativePath>../pom.xml</relativePath>
        </parent>
 
index 527a9ef..3366ae0 100644 (file)
@@ -17,7 +17,7 @@
        <parent>
                <groupId>org.onap.aaf.authz</groupId>
                <artifactId>authparent</artifactId>
-               <version>2.1.7-SNAPSHOT</version>
+               <version>2.1.8-SNAPSHOT</version>
                <relativePath>../pom.xml</relativePath>
        </parent>
 
index 8291ff4..b482b03 100644 (file)
@@ -17,7 +17,7 @@
        <parent>
                <groupId>org.onap.aaf.authz</groupId>
                <artifactId>authparent</artifactId>
-               <version>2.1.7-SNAPSHOT</version>
+               <version>2.1.8-SNAPSHOT</version>
                <relativePath>../pom.xml</relativePath>
        </parent>
 
index 61a8881..03e699a 100644 (file)
@@ -17,7 +17,7 @@
        <parent>
                <groupId>org.onap.aaf.authz</groupId>
                <artifactId>authparent</artifactId>
-               <version>2.1.7-SNAPSHOT</version>
+               <version>2.1.8-SNAPSHOT</version>
                <relativePath>../pom.xml</relativePath>
        </parent>
 
index 5b74704..c725192 100644 (file)
@@ -17,7 +17,7 @@
        <parent>
                <groupId>org.onap.aaf.authz</groupId>
                <artifactId>authparent</artifactId>
-               <version>2.1.7-SNAPSHOT</version>
+               <version>2.1.8-SNAPSHOT</version>
                <relativePath>../pom.xml</relativePath>
        </parent>
 
index 820b1fa..0c66fe1 100644 (file)
@@ -28,7 +28,7 @@ fi
 . ./aaf.props
 
 DOCKER=${DOCKER:=docker}
-CADI_VERSION=${CADI_VERSION:=2.1.7-SNAPSHOT}
+CADI_VERSION=${CADI_VERSION:=2.1.8-SNAPSHOT}
 
 for V in VERSION DOCKER_REPOSITORY AAF_FQDN AAF_FQDN_IP DEPLOY_FQI APP_FQDN APP_FQI VOLUME DRIVER LATITUDE LONGITUDE; do
    if [ "$(grep $V ./aaf.props)" = "" ]; then
index c01089c..6370cef 100644 (file)
@@ -21,7 +21,7 @@
 ORG=onap
 PROJECT=aaf
 DOCKER_REPOSITORY=nexus3.onap.org:10003
-VERSION=2.1.7-SNAPSHOT
+VERSION=2.1.8-SNAPSHOT
 CONF_ROOT_DIR=/opt/app/osaaf
 # For local builds, set PREFIX=   
 PREFIX="$DOCKER_REPOSITORY/"
index 61ad1c4..4cd81ab 100644 (file)
@@ -26,7 +26,7 @@
        <parent>
         <groupId>org.onap.aaf.authz</groupId>
         <artifactId>parent</artifactId>
-        <version>2.1.7-SNAPSHOT</version>
+        <version>2.1.8-SNAPSHOT</version>
     </parent>
        <artifactId>authparent</artifactId>
        <name>AAF Auth Parent</name>
index 10731cf..30bf5b9 100644 (file)
@@ -24,7 +24,7 @@
        <parent>
                <groupId>org.onap.aaf.authz</groupId>
                <artifactId>cadiparent</artifactId>
-               <version>2.1.7-SNAPSHOT</version>
+               <version>2.1.8-SNAPSHOT</version>
                <relativePath>..</relativePath>
        </parent>
 
index c12b2e6..2c7aa12 100644 (file)
@@ -77,7 +77,7 @@ public class PermEval {
                                 if (pass=sItem.length()==0) {
                                     break;                                  // Both Empty, keep checking
                                 }
-                            } else if (sItem.charAt(0)==START_REGEX_CHAR) { // Check Server side when wildcarding like *
+                            } else if (sItem.length()>0 && sItem.charAt(0)==START_REGEX_CHAR) { // Check Server side when wildcarding like *
                                 if (pass=pkeys[i].matches(sItem.substring(1))) {
                                     break;                                  // Matches, keep checking
                                 }
index c27dd12..ea40440 100644 (file)
@@ -93,8 +93,9 @@ public class AAFTaf<CLIENT> extends AbsUserCache<AAFPermission> implements HttpT
         } else {
                try {
                                mapIds = new MapBathConverter(access, new CSV(csvFile));
+                               access.log(Level.INIT,"Basic Auth Conversion using",csvFile,"enabled" );
                        } catch (IOException | CadiException e) {
-                               access.log(e,"Bath Map Conversion is not initialzed (non fatal)");
+                               access.log(e,"Bath Map Conversion is not initialized (non fatal)");
                        }
         }
 
index a6c0f91..3e137c2 100644 (file)
@@ -74,6 +74,8 @@ public class JU_PermEval {
 
         // Accept matching empty keys
         assertThat(PermEval.evalInstance(":", ":"), is(true));
+        assertThat(PermEval.evalInstance("/", "/"), is(true));
+        assertThat(PermEval.evalInstance("/something/", "/something/"), is(true));
 
         // Reject non-matching empty keys
         assertThat(PermEval.evalInstance(":fred", ":"), is(false));
index 63920a2..60168f9 100644 (file)
@@ -22,7 +22,7 @@
        <parent>
                <groupId>org.onap.aaf.authz</groupId>
                <artifactId>cadiparent</artifactId>
-               <version>2.1.7-SNAPSHOT</version>
+               <version>2.1.8-SNAPSHOT</version>
                <relativePath>..</relativePath>
        </parent>
 
index 34886d2..ec541d9 100644 (file)
@@ -16,7 +16,7 @@
                <groupId>org.onap.aaf.authz</groupId>
                <artifactId>cadiparent</artifactId>
                <relativePath>..</relativePath>
-               <version>2.1.7-SNAPSHOT</version>
+               <version>2.1.8-SNAPSHOT</version>
        </parent>
 
        <modelVersion>4.0.0</modelVersion>
index 3d668c4..0e4f72b 100644 (file)
@@ -103,7 +103,10 @@ public class Config {
     public static final String CADI_PROTOCOLS = "cadi_protocols";
     public static final String CADI_NOAUTHN = "cadi_noauthn";
     public static final String CADI_LOC_LIST = "cadi_loc_list";
+    
+    // Special Behaviors
     public static final String CADI_BATH_CONVERT = "cadi_bath_convert";
+    public static final String CADI_API_ENFORCEMENT = "cadi_api_enforcement";
     
     public static final String CADI_USER_CHAIN_TAG = "cadi_user_chain";
     public static final String CADI_USER_CHAIN = "USER_CHAIN";
@@ -410,7 +413,7 @@ public class Config {
                     oadtClss = Class.forName(OAUTH_DIRECT_TAF);
                 } catch (ClassNotFoundException e1) {
                     oadtClss = null;
-                    access.log(Level.INIT, e1);
+                    access.log(Level.DEBUG, e1);
                 }
                 if (additionalTafLurs!=null && additionalTafLurs.length>0 && (oadtClss!=null && additionalTafLurs[0].getClass().isAssignableFrom(oadtClss))) {
                     htlist.add((HttpTaf)additionalTafLurs[0]);
diff --git a/cadi/core/src/main/java/org/onap/aaf/cadi/filter/CadiApiEnforcementFilter.java b/cadi/core/src/main/java/org/onap/aaf/cadi/filter/CadiApiEnforcementFilter.java
new file mode 100644 (file)
index 0000000..495131b
--- /dev/null
@@ -0,0 +1,132 @@
+/**
+ * ============LICENSE_START====================================================
+ * org.onap.aaf
+ * ===========================================================================
+ * Copyright (c) 2018 AT&T Intellectual Property. All rights reserved.
+ * ===========================================================================
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ * 
+ *      http://www.apache.org/licenses/LICENSE-2.0
+ * 
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ * ============LICENSE_END====================================================
+ */
+package org.onap.aaf.cadi.filter;
+
+import java.io.IOException;
+import java.util.ArrayList;
+import java.util.List;
+import java.util.Map;
+import java.util.TreeMap;
+
+import javax.servlet.Filter;
+import javax.servlet.FilterChain;
+import javax.servlet.FilterConfig;
+import javax.servlet.ServletException;
+import javax.servlet.ServletRequest;
+import javax.servlet.ServletResponse;
+import javax.servlet.http.HttpServletRequest;
+
+import org.onap.aaf.cadi.Access;
+import org.onap.aaf.cadi.Access.Level;
+import org.onap.aaf.cadi.ServletContextAccess;
+import org.onap.aaf.cadi.config.Config;
+import org.onap.aaf.cadi.util.Split;
+
+/**
+ * This filter allows one to protect the APIs from data stored in AAF
+ * 
+ * @author Instrumental(Jonathan)
+ */
+public class CadiApiEnforcementFilter implements Filter {
+       private String type;
+       private Map<String,List<String>> publicPaths;
+       private Access access;
+                       
+       
+       public CadiApiEnforcementFilter(Access access, String enforce) throws ServletException {
+               this.access = access;
+               init(enforce);
+       }
+
+
+       @Override
+       public void init(FilterConfig fc) throws ServletException {
+               init(fc.getInitParameter(Config.CADI_API_ENFORCEMENT));
+        // need the Context for Logging, instantiating ClassLoader, etc
+        ServletContextAccess sca=new ServletContextAccess(fc); 
+        if (access==null) {
+            access = sca;
+        }
+       }
+       
+       private void init(final String ptypes) throws ServletException {
+               if(ptypes==null) {
+                       throw new ServletException("CadiApiEnforcement requires " + Config.CADI_API_ENFORCEMENT + " property");
+               }
+               String[] full = Split.splitTrim(';', ptypes);
+               if(full.length==0) {
+                       throw new ServletException(Config.CADI_API_ENFORCEMENT + " property is empty");
+               }
+               if(full.length>0) {
+                       type=full[0];
+               }
+               publicPaths = new TreeMap<String,List<String>>();
+               if(full.length>1) {
+                       for(int i=1;i<full.length;++i) {
+                               String pubArray[] = Split.split(':', full[i]);
+                               if(pubArray.length==2) {
+                                       List<String> ls = publicPaths.get(pubArray[0]);
+                                       if(ls==null) {
+                                               ls = new ArrayList<String>();
+                                               publicPaths.put(pubArray[0], ls);
+                                       }
+                                       ls.add(pubArray[1]);
+                               }
+                       }
+               }
+       }
+
+
+       @Override
+       public void doFilter(ServletRequest req, ServletResponse resp, FilterChain fc) throws IOException, ServletException {
+               HttpServletRequest hreq = (HttpServletRequest)req;
+               final String meth = hreq.getMethod();
+               final String path = hreq.getContextPath()+hreq.getPathInfo();
+               List<String> list = publicPaths.get(meth);
+               if(list!=null) {
+                       for( String p : publicPaths.get(meth)) {
+                               if(path.startsWith(p)) {
+                                       access.printf(Level.INFO, "%s accessed public API %s %s\n",
+                                                       hreq.getUserPrincipal().getName(),
+                                                       meth,
+                                                       path);
+                                               fc.doFilter(req, resp);
+                                               return;
+                               }
+                       }
+               }
+               if(hreq.isUserInRole(type + '|'+path+'|'+meth)) {
+                       access.printf(Level.INFO, "%s is allowed access to %s %s\n",
+                               hreq.getUserPrincipal().getName(),
+                               meth,
+                               path);
+                       fc.doFilter(req, resp);
+               } else {
+                       access.printf(Level.AUDIT, "%s is denied access to %s %s\n",
+                                       hreq.getUserPrincipal().getName(),
+                                       meth,
+                                       path);
+               }
+       }
+
+       @Override
+       public void destroy() {
+       }
+}
index cd48556..2305eac 100644 (file)
@@ -71,7 +71,7 @@ public class CadiFilter implements Filter {
     private static List<Pair> mapPairs;
     private Access access;
     private Object[] additionalTafLurs;
-    private Filter oauthFilter;
+    private SideChain sideChain;
     private static int count=0;
     
     public Lur getLur() {
@@ -140,6 +140,7 @@ public class CadiFilter implements Filter {
 
     @SuppressWarnings("unchecked")
     private void init(Get getter) throws ServletException {
+       sideChain = new SideChain();
         // Start with the assumption of "Don't trust anyone".
        TrustChecker tc = TrustChecker.NOTRUST; // default position
        try {
@@ -158,22 +159,9 @@ public class CadiFilter implements Filter {
            Class<Filter> cf=null;
            try {
                cf= (Class<Filter>) Class.forName("org.onap.aaf.cadi.oauth.OAuthFilter");
-               oauthFilter = cf.newInstance();
+               sideChain.add(cf.newInstance());
            } catch (ClassNotFoundException e) {
-               oauthFilter = new Filter() { // Null Filter
-                    @Override
-                    public void destroy() {
-                    }
-    
-                    @Override
-                    public void doFilter(ServletRequest req, ServletResponse resp, FilterChain chain)throws IOException, ServletException {
-                        chain.doFilter(req, resp);
-                    }
-    
-                    @Override
-                    public void init(FilterConfig arg0) throws ServletException {
-                    }
-               };
+                  access.log(Level.DEBUG, "OAuthFilter not enabled");
            }
        } catch (Exception e) {
            access.log(Level.INIT, "AAFTrustChecker cannot be loaded",e.getMessage());
@@ -238,6 +226,11 @@ public class CadiFilter implements Filter {
             }
         }
 
+        // Add API Enforcement Point
+        String enforce = getter.get(Config.CADI_API_ENFORCEMENT, null, true); 
+        if(enforce!=null && enforce.length()>0) {
+               sideChain.add(new CadiApiEnforcementFilter(access,enforce));
+        }
         // Remove Getter
         getter = Get.NULL;
     }
@@ -287,7 +280,7 @@ public class CadiFilter implements Filter {
                     CadiWrap cw = new CadiWrap(hreq, tresp, httpChecker.getLur(),getConverter(hreq));
                     if (httpChecker.notCadi(cw, hresp)) {
                         startCode=System.nanoTime();
-                        oauthFilter.doFilter(cw,response,chain);
+                        sideChain.doFilter(cw,response,chain);
                         code = Timing.millis(startCode);
                     }
                 }
diff --git a/cadi/core/src/main/java/org/onap/aaf/cadi/filter/SideChain.java b/cadi/core/src/main/java/org/onap/aaf/cadi/filter/SideChain.java
new file mode 100644 (file)
index 0000000..8283b4d
--- /dev/null
@@ -0,0 +1,73 @@
+/**
+ * ============LICENSE_START====================================================
+ * org.onap.aaf
+ * ===========================================================================
+ * Copyright (c) 2018 AT&T Intellectual Property. All rights reserved.
+ * ===========================================================================
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ * 
+ *      http://www.apache.org/licenses/LICENSE-2.0
+ * 
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ * ============LICENSE_END====================================================
+ */
+
+package org.onap.aaf.cadi.filter;
+
+import java.io.IOException;
+import java.util.ArrayList;
+import java.util.List;
+
+import javax.servlet.Filter;
+import javax.servlet.FilterChain;
+import javax.servlet.ServletException;
+import javax.servlet.ServletRequest;
+import javax.servlet.ServletResponse;
+import javax.xml.ws.Holder;
+
+/**
+ * Add various Filters by CADI Property not in the official Chain
+ * 
+ * @author Instrumental(Jonathan)
+ *
+ */
+public class SideChain {
+       private List<Filter> sideChain;
+       
+       public SideChain() {
+               sideChain = new ArrayList<Filter>();
+       }
+       
+       public void add(Filter f) {
+               sideChain.add(f);
+       }
+       
+    public void doFilter(ServletRequest request, ServletResponse response, FilterChain chain)throws IOException, ServletException {
+       final Holder<Boolean> hbool = new Holder<Boolean>(Boolean.TRUE);
+       FilterChain truth = new FilterChain() {
+                       @Override
+                       public void doFilter(ServletRequest request, ServletResponse response) throws IOException, ServletException {
+                          hbool.value=Boolean.TRUE;
+                       }
+                       public String toString() {
+                               return hbool.value.toString();
+                       }
+       };
+       for(Filter f : sideChain) {
+                       hbool.value=Boolean.FALSE;
+               f.doFilter(request, response, truth);
+               if(!hbool.value) {
+                       return;
+               }
+       }
+       if(hbool.value) {
+               chain.doFilter(request, response);
+       }
+    }
+}
index edbd2b0..6364300 100644 (file)
@@ -25,7 +25,7 @@
        <parent>
                <groupId>org.onap.aaf.authz</groupId>
                <artifactId>cadiparent</artifactId>
-               <version>2.1.7-SNAPSHOT</version>
+               <version>2.1.8-SNAPSHOT</version>
                <relativePath>..</relativePath>
        </parent>
        
index 3e3a8c5..46c0b6b 100644 (file)
@@ -24,7 +24,7 @@
        <parent>
            <groupId>org.onap.aaf.authz</groupId>
            <artifactId>parent</artifactId>
-           <version>2.1.7-SNAPSHOT</version>
+           <version>2.1.8-SNAPSHOT</version>
     </parent>
        <artifactId>cadiparent</artifactId>
        <name>AAF CADI Parent (Code, Access, Data, Identity)</name>
index 4953714..2080787 100644 (file)
@@ -4,7 +4,7 @@
                <groupId>org.onap.aaf.authz</groupId>
                <artifactId>cadiparent</artifactId>
                <relativePath>..</relativePath>
-               <version>2.1.7-SNAPSHOT</version>
+               <version>2.1.8-SNAPSHOT</version>
        </parent>
        <modelVersion>4.0.0</modelVersion>
        <name>CADI Servlet Sample (Test Only)</name>
index 9b63e34..0aa076c 100644 (file)
@@ -24,7 +24,7 @@
        <parent>
                <groupId>org.onap.aaf.authz</groupId>
                <artifactId>miscparent</artifactId>
-               <version>2.1.7-SNAPSHOT</version>
+               <version>2.1.8-SNAPSHOT</version>
                <relativePath>..</relativePath>
        </parent>
 
index c72f5b8..53d5436 100644 (file)
@@ -24,7 +24,7 @@
        <parent>
                <groupId>org.onap.aaf.authz</groupId>
                <artifactId>miscparent</artifactId>
-               <version>2.1.7-SNAPSHOT</version>
+               <version>2.1.8-SNAPSHOT</version>
                <relativePath>..</relativePath>
        </parent>
 
index b4ef0ce..168aa12 100644 (file)
@@ -25,7 +25,7 @@
        <parent>
        <groupId>org.onap.aaf.authz</groupId>
        <artifactId>parent</artifactId>
-       <version>2.1.7-SNAPSHOT</version>
+       <version>2.1.8-SNAPSHOT</version>
     </parent>
        <artifactId>miscparent</artifactId>
        <name>AAF Misc Parent</name>
index 383c896..28976b9 100644 (file)
@@ -24,7 +24,7 @@
        <parent>
                <groupId>org.onap.aaf.authz</groupId>
                <artifactId>miscparent</artifactId>
-               <version>2.1.7-SNAPSHOT</version>
+               <version>2.1.8-SNAPSHOT</version>
                <relativePath>..</relativePath>
        </parent>
 
index 7fc3fe3..abd7939 100644 (file)
@@ -24,7 +24,7 @@
        <parent>
                <groupId>org.onap.aaf.authz</groupId>
                <artifactId>miscparent</artifactId>
-               <version>2.1.7-SNAPSHOT</version>
+               <version>2.1.8-SNAPSHOT</version>
                <relativePath>..</relativePath>
        </parent>
 
diff --git a/pom.xml b/pom.xml
index 7883438..92d2260 100644 (file)
--- a/pom.xml
+++ b/pom.xml
@@ -22,7 +22,7 @@
     <modelVersion>4.0.0</modelVersion>
     <groupId>org.onap.aaf.authz</groupId>
     <artifactId>parent</artifactId>
-    <version>2.1.7-SNAPSHOT</version>
+    <version>2.1.8-SNAPSHOT</version>
     <name>aaf-authz</name>
     <packaging>pom</packaging>
 
index 306bccf..26d6bcf 100644 (file)
@@ -25,7 +25,7 @@
 
 major=2
 minor=1
-patch=7
+patch=8
 
 base_version=${major}.${minor}.${patch}