2 * ============LICENSE_START=======================================================
4 * ================================================================================
5 * Copyright (C) 2018 AT&T Intellectual Property. All rights
7 * ================================================================================
8 * Licensed under the Apache License, Version 2.0 (the "License");
9 * you may not use this file except in compliance with the License.
10 * You may obtain a copy of the License at
12 * http://www.apache.org/licenses/LICENSE-2.0
14 * Unless required by applicable law or agreed to in writing, software
15 * distributed under the License is distributed on an "AS IS" BASIS,
16 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17 * See the License for the specific language governing permissions and
18 * limitations under the License.
19 * ============LICENSE_END============================================
20 * ===================================================================
24 package org.onap.clamp.clds;
26 import com.att.eelf.configuration.EELFLogger;
27 import com.att.eelf.configuration.EELFManager;
29 import java.io.IOException;
30 import java.security.Principal;
31 import java.util.ArrayList;
32 import java.util.List;
34 import javax.servlet.ServletException;
35 import javax.servlet.http.HttpServletRequest;
36 import javax.servlet.http.HttpServletResponse;
38 import org.apache.camel.component.servlet.CamelHttpTransportServlet;
39 import org.onap.clamp.clds.service.SecureServicePermission;
40 import org.springframework.context.ApplicationContext;
41 import org.springframework.http.HttpStatus;
42 import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
43 import org.springframework.security.core.Authentication;
44 import org.springframework.security.core.GrantedAuthority;
45 import org.springframework.security.core.authority.SimpleGrantedAuthority;
46 import org.springframework.security.core.context.SecurityContextHolder;
47 import org.springframework.security.core.userdetails.User;
48 import org.springframework.web.context.support.WebApplicationContextUtils;
50 public class ClampServlet extends CamelHttpTransportServlet {
55 private static final long serialVersionUID = -4198841134910211542L;
57 protected static final EELFLogger logger = EELFManager.getInstance().getLogger(ClampServlet.class);
58 public static final String PERM_INSTANCE = "clamp.config.security.permission.instance";
59 public static final String PERM_CL = "clamp.config.security.permission.type.cl";
60 public static final String PERM_TEMPLATE = "clamp.config.security.permission.type.template";
61 public static final String PERM_VF = "clamp.config.security.permission.type.filter.vf";
62 public static final String PERM_MANAGE = "clamp.config.security.permission.type.cl.manage";
63 public static final String PERM_TOSCA = "clamp.config.security.permission.type.tosca";
66 * When AAF is enabled, request object will contain a cadi Wrapper, so queries
67 * to isUserInRole will invoke a http call to AAF server.
70 protected void doService(HttpServletRequest request, HttpServletResponse response)
71 throws ServletException, IOException {
72 List<SecureServicePermission> permissionList = new ArrayList<>();
74 ApplicationContext applicationContext = WebApplicationContextUtils
75 .getWebApplicationContext(this.getServletContext());
77 String cldsPersmissionTypeCl = applicationContext.getEnvironment().getProperty(PERM_CL);
78 String cldsPermissionTypeTemplate = applicationContext.getEnvironment().getProperty(PERM_TEMPLATE);
79 String cldsPermissionInstance = applicationContext.getEnvironment().getProperty(PERM_INSTANCE);
80 String cldsPermissionTypeFilterVf = applicationContext.getEnvironment().getProperty(PERM_VF);
81 String cldsPermissionTypeClManage = applicationContext.getEnvironment().getProperty(PERM_MANAGE);
82 String cldsPermissionTypeTosca = applicationContext.getEnvironment().getProperty(PERM_TOSCA);
84 // set the stragety to Mode_Global, so that all thread is able to
85 // see the authentication
86 SecurityContextHolder.setStrategyName(SecurityContextHolder.MODE_GLOBAL);
87 Principal p = request.getUserPrincipal();
89 permissionList.add(SecureServicePermission.create(cldsPersmissionTypeCl, cldsPermissionInstance, "read"));
90 permissionList.add(SecureServicePermission.create(cldsPersmissionTypeCl, cldsPermissionInstance, "update"));
92 .add(SecureServicePermission.create(cldsPermissionTypeTemplate, cldsPermissionInstance, "read"));
94 .add(SecureServicePermission.create(cldsPermissionTypeTemplate, cldsPermissionInstance, "update"));
95 permissionList.add(SecureServicePermission.create(cldsPermissionTypeFilterVf, cldsPermissionInstance, "*"));
96 permissionList.add(SecureServicePermission.create(cldsPermissionTypeClManage, cldsPermissionInstance, "*"));
97 permissionList.add(SecureServicePermission.create(cldsPermissionTypeTosca, cldsPermissionInstance, "read"));
99 .add(SecureServicePermission.create(cldsPermissionTypeTosca, cldsPermissionInstance, "update"));
101 List<GrantedAuthority> grantedAuths = new ArrayList<>();
102 for (SecureServicePermission perm : permissionList) {
103 String permString = perm.toString();
104 if (request.isUserInRole(permString)) {
105 grantedAuths.add(new SimpleGrantedAuthority(permString));
109 Authentication auth = new UsernamePasswordAuthenticationToken(new User(p.getName(), "", grantedAuths), "",
111 SecurityContextHolder.getContext().setAuthentication(auth);
114 super.doService(request, response);
115 } catch (ServletException | IOException ioe) {
116 logger.error("Exception caught when executing doService in servlet", ioe);
118 response.sendError(HttpStatus.INTERNAL_SERVER_ERROR.value());
119 } catch (IOException e) {
120 logger.error("Exception caught when executing HTTP sendError in servlet", e);