2 * ============LICENSE_START=======================================================
4 * ================================================================================
5 * Copyright (C) 2017 AT&T Intellectual Property. All rights reserved.
6 * ================================================================================
7 * Licensed under the Apache License, Version 2.0 (the "License");
8 * you may not use this file except in compliance with the License.
9 * You may obtain a copy of the License at
11 * http://www.apache.org/licenses/LICENSE-2.0
13 * Unless required by applicable law or agreed to in writing, software
14 * distributed under the License is distributed on an "AS IS" BASIS,
15 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 * See the License for the specific language governing permissions and
17 * limitations under the License.
18 * ============LICENSE_END=========================================================
21 package org.openecomp.policy.pypdp.controller;
23 import io.swagger.annotations.Api;
24 import io.swagger.annotations.ApiImplicitParam;
25 import io.swagger.annotations.ApiImplicitParams;
26 import io.swagger.annotations.ApiOperation;
28 import java.util.Base64;
29 import java.util.Collection;
30 import java.util.List;
31 import java.util.StringTokenizer;
32 import java.util.concurrent.atomic.AtomicLong;
34 import org.openecomp.policy.api.ConfigRequestParameters;
35 import org.openecomp.policy.api.DeletePolicyParameters;
36 import org.openecomp.policy.api.EventRequestParameters;
37 import org.openecomp.policy.api.NotificationScheme;
38 import org.openecomp.policy.api.PolicyParameters;
39 import org.openecomp.policy.api.PolicyResponse;
40 import org.openecomp.policy.pypdp.ConfigFirewallPolicyRequest;
41 import org.openecomp.policy.pypdp.ConfigRequest;
42 import org.openecomp.policy.pypdp.DeletePolicyRequest;
43 import org.openecomp.policy.pypdp.EventRequest;
44 import org.openecomp.policy.pypdp.ListConfigRequest;
45 import org.openecomp.policy.pypdp.PolicyCreateUpdateRequest;
46 import org.openecomp.policy.pypdp.PushPolicyRequest;
47 import org.openecomp.policy.pypdp.authorization.AuthenticationService;
48 import org.openecomp.policy.pypdp.authorization.Config;
49 import org.openecomp.policy.pypdp.jmx.PyPdpMonitor;
50 import org.openecomp.policy.pypdp.model_pojo.PepConfigFirewallPolicyRequest;
51 import org.openecomp.policy.pypdp.model_pojo.PepConfigPolicyNameRequest;
52 import org.openecomp.policy.pypdp.model_pojo.PepConfigPolicyRequest;
53 import org.openecomp.policy.pypdp.model_pojo.PepPushPolicyRequest;
54 import org.openecomp.policy.pypdp.model_pojo.PyPolicyConfig;
55 import org.openecomp.policy.pypdp.notifications.NotificationController;
56 import org.openecomp.policy.std.StdPolicyEngine;
57 import org.openecomp.policy.utils.PolicyUtils;
58 import org.springframework.http.HttpStatus;
59 import org.springframework.http.ResponseEntity;
60 import org.springframework.web.bind.annotation.RequestBody;
61 import org.springframework.web.bind.annotation.RequestHeader;
62 import org.springframework.web.bind.annotation.RequestMapping;
63 import org.springframework.web.bind.annotation.RequestMethod;
64 import org.springframework.web.bind.annotation.ResponseBody;
65 import org.springframework.web.bind.annotation.RestController;
67 import springfox.documentation.annotations.ApiIgnore;
69 import org.openecomp.policy.common.logging.eelf.PolicyLogger;
70 import org.openecomp.policy.common.im.AdministrativeStateException;
71 import org.openecomp.policy.common.im.StandbyStatusException;
74 @Api(value="Policy Engine Services")
75 public class PolicyEngineServices {
76 private final NotificationScheme scheme = NotificationScheme.AUTO_ALL_NOTIFICATIONS;
77 private final NotificationController handler = new NotificationController();
78 private final AtomicLong configCounter = PyPdpMonitor.singleton.getAtomicConfigCounter();
79 private final AtomicLong eventCounter = PyPdpMonitor.singleton.getAtomicEventCounter();
80 private final AtomicLong configPolicyNameCounter = PyPdpMonitor.singleton.getAtomicConfigPolicyNameCounter();
81 private final StdPolicyEngine policyEngine = new StdPolicyEngine(Config.getPDPs(), Config.getPAPs(), Config.getEncodingPAP(), Config.getEncoding(), scheme, handler, Config.getEnvironment(), Config.getClientFile(), Config.isTest());
84 @ApiImplicitParam(name ="Authorization", required = true, paramType = "Header"),
85 @ApiImplicitParam(name ="Environment", required = true, paramType = "Header")
87 @ApiOperation(value= "Gets the configuration from the PolicyDecisionPoint(PDP)")
88 @RequestMapping(value = "/getConfig", method = RequestMethod.POST)
89 public @ResponseBody ResponseEntity<Collection<PyPolicyConfig>> createConfigRequest(@RequestBody ConfigRequestParameters pep,@RequestHeader(value="ClientAuth", required=true)String clientEncoding, @RequestHeader(value="X-ECOMP-RequestID", required=false)String requestID) {
90 Collection<PyPolicyConfig> policyConfig = null;
91 String[] userNamePass = null;
93 userNamePass = decodeEncoding(clientEncoding, "CONFIG");
94 } catch (Exception e1) {
95 return new ResponseEntity<Collection<PyPolicyConfig>>(policyConfig, HttpStatus.UNAUTHORIZED);
97 ConfigRequest configRequest = new ConfigRequest(policyEngine);
99 Config.getIntegrityMonitor().startTransaction();
100 } catch (AdministrativeStateException e) {
101 PolicyLogger.error("Error while starting Transaction " + e);
102 } catch (Exception e) {
103 PolicyLogger.error("Error while starting Transaction " + e);
105 policyConfig = configRequest.run(pep, requestID, userNamePass[0], userNamePass[1]);
106 configCounter.incrementAndGet();
107 Config.getIntegrityMonitor().endTransaction();
108 for(PyPolicyConfig pythonConfig: policyConfig){
109 if(pythonConfig.getPolicyConfigMessage()!=null && pythonConfig.getPolicyConfigMessage().contains("PE300")){
110 return new ResponseEntity<Collection<PyPolicyConfig>>(policyConfig, HttpStatus.BAD_REQUEST);
113 return new ResponseEntity<Collection<PyPolicyConfig>>(policyConfig, HttpStatus.OK);
117 @ApiImplicitParam(name ="Authorization", required = true, paramType = "Header"),
118 @ApiImplicitParam(name ="Environment", required = true, paramType = "Header")
120 @ApiOperation(value= "Gets the configuration from the PDP")
121 @RequestMapping(value = "/listConfig", method = RequestMethod.POST)
122 public @ResponseBody ResponseEntity<Collection<String>> createListConfigRequest(@RequestBody ConfigRequestParameters pep,@RequestHeader(value="ClientAuth", required=true)String clientEncoding, @RequestHeader(value="X-ECOMP-RequestID", required=false)String requestID) {
123 Collection<String> policyList = null;
124 String[] userNamePass = null;
126 userNamePass = decodeEncoding(clientEncoding, "CONFIG");
127 } catch (Exception e1) {
128 return new ResponseEntity<Collection<String>>(policyList, HttpStatus.UNAUTHORIZED);
130 ListConfigRequest listConfigRequest = new ListConfigRequest(policyEngine);
132 Config.getIntegrityMonitor().startTransaction();
133 } catch (AdministrativeStateException e) {
134 PolicyLogger.error("Error while starting Transaction " + e);
135 } catch (StandbyStatusException e) {
136 PolicyLogger.error("Error while starting Transaction " + e);
138 policyList = listConfigRequest.run(pep, requestID, userNamePass[0], userNamePass[1]);
140 configCounter.incrementAndGet();
141 Config.getIntegrityMonitor().endTransaction();
143 for(String response : policyList){
144 if(response!=null && response.contains("PE300")){
145 return new ResponseEntity<Collection<String>>(policyList, HttpStatus.BAD_REQUEST);
148 return new ResponseEntity<Collection<String>>(policyList, HttpStatus.OK);
152 @ApiImplicitParam(name ="Authorization", required = true, paramType = "Header"),
153 @ApiImplicitParam(name ="Environment", required = true, paramType = "Header")
155 @ApiOperation(value= "Sends the Events specified to the Policy Engine")
156 @RequestMapping(value = "/sendEvent", method = RequestMethod.POST)
157 public @ResponseBody ResponseEntity<Collection<PolicyResponse>> createEventParameterRequest(@RequestBody EventRequestParameters pep,@RequestHeader(value="ClientAuth", required=true)String clientEncoding, @RequestHeader(value="X-ECOMP-RequestID", required=false) String requestID) {
158 Collection<PolicyResponse> policyResponse = null;
159 String[] userNamePass = null;
161 userNamePass = decodeEncoding(clientEncoding, "ACTION");
162 } catch (Exception e1) {
163 return new ResponseEntity<Collection<PolicyResponse>>(policyResponse, HttpStatus.UNAUTHORIZED);
165 EventRequest eventRequest = new EventRequest(policyEngine);
167 Config.getIntegrityMonitor().startTransaction();
168 } catch (AdministrativeStateException e) {
169 PolicyLogger.error("Error while starting Transaction " + e);
170 } catch (Exception e) {
171 PolicyLogger.error("Error while starting Transaction " + e);
173 policyResponse = eventRequest.run(pep, requestID, userNamePass[0], userNamePass[1]);
174 eventCounter.incrementAndGet();
175 Config.getIntegrityMonitor().endTransaction();
176 for(PolicyResponse response: policyResponse ){
177 if(response.getPolicyResponseMessage()!=null && response.getPolicyResponseMessage().contains("PE300")){
178 return new ResponseEntity<Collection<PolicyResponse>>(policyResponse,HttpStatus.BAD_REQUEST);
181 return new ResponseEntity<Collection<PolicyResponse>>(policyResponse,HttpStatus.OK);
185 @ApiImplicitParam(name ="Authorization", required = true, paramType = "Header"),
186 @ApiImplicitParam(name ="Environment", required = true, paramType = "Header")
188 @ApiOperation(value= "Gets the configuration from the PolicyDecisionPoint(PDP)")
189 @RequestMapping(value = "/getConfigByPolicyName", method = RequestMethod.POST)
191 public @ResponseBody ResponseEntity<Collection<PyPolicyConfig>> createConfigRequest(@RequestBody PepConfigPolicyNameRequest pep,@RequestHeader(value="ClientAuth", required=true)String clientEncoding, @RequestHeader(value="X-ECOMP-RequestID", required=false) String requestID) {
192 Collection<PyPolicyConfig> policyConfig = null;
193 String[] userNamePass = null;
195 userNamePass = decodeEncoding(clientEncoding, "CONFIG");
196 } catch (Exception e1) {
197 return new ResponseEntity<Collection<PyPolicyConfig>>(policyConfig, HttpStatus.UNAUTHORIZED);
199 ConfigRequest configRequest = new ConfigRequest(policyEngine);
201 Config.getIntegrityMonitor().startTransaction();
202 } catch (AdministrativeStateException e) {
203 PolicyLogger.error("Error while starting Transaction " + e);
204 } catch (Exception e) {
205 PolicyLogger.error("Error while starting Transaction " + e);
207 policyConfig = configRequest.run(pep, requestID, userNamePass[0], userNamePass[1]);
208 configPolicyNameCounter.incrementAndGet();
209 Config.getIntegrityMonitor().endTransaction();
210 return new ResponseEntity<Collection<PyPolicyConfig>>(policyConfig, HttpStatus.OK);
214 @ApiImplicitParam(name ="Authorization", required = true, paramType = "Header"),
215 @ApiImplicitParam(name ="Environment", required = true, paramType = "Header")
217 @ApiOperation(value="Pushes the specified policy to the PDP Group.")
218 @RequestMapping(value = "/pushPolicy", method = RequestMethod.PUT)
219 public @ResponseBody ResponseEntity<String> pushPolicyRequest(@RequestBody PepPushPolicyRequest pep,@RequestHeader(value="ClientAuth", required=true)String clientEncoding,
220 @RequestHeader(value="X-ECOMP-RequestID", required=false) String requestID) {
221 String response = null;
222 String[] userNamePass = null;
224 userNamePass = decodeEncoding(clientEncoding, "CREATEPOLICY");
225 } catch (Exception e1) {
226 return new ResponseEntity<String>(response, HttpStatus.UNAUTHORIZED);
228 PushPolicyRequest pushPolicy = new PushPolicyRequest(policyEngine);
230 Config.getIntegrityMonitor().startTransaction();
231 } catch (AdministrativeStateException e) {
232 PolicyLogger.error("Error while starting Transaction " + e);
233 } catch (Exception e) {
234 PolicyLogger.error("Error while starting Transaction " + e);
236 response = pushPolicy.run(pep, requestID, userNamePass[0], userNamePass[1]);
238 Config.getIntegrityMonitor().endTransaction();
239 if (response.contains("BAD REQUEST")||response.contains("PE300")) {
240 return new ResponseEntity<String>(response, HttpStatus.BAD_REQUEST);
242 return new ResponseEntity<String>(response, HttpStatus.OK);
247 @ApiImplicitParam(name ="Authorization", required = true, paramType = "Header"),
248 @ApiImplicitParam(name ="Environment", required = true, paramType = "Header")
250 @ApiOperation(value="Deletes the specified policy from the PDP Group or PAP.")
251 @RequestMapping(value = "/deletePolicy", method = RequestMethod.DELETE)
252 public @ResponseBody ResponseEntity<String> deletePolicyRequest(@RequestBody DeletePolicyParameters pep,@RequestHeader(value="ClientAuth", required=true)String clientEncoding,
253 @RequestHeader(value="X-ECOMP-RequestID", required=false) String requestID) {
254 String response = null;
255 String[] userNamePass = null;
257 userNamePass = decodeEncoding(clientEncoding, "DELETEPOLICY");
258 } catch (Exception e1) {
259 return new ResponseEntity<String>(response, HttpStatus.UNAUTHORIZED);
261 DeletePolicyRequest deletePolicy = new DeletePolicyRequest(policyEngine);
263 Config.getIntegrityMonitor().startTransaction();
264 } catch (AdministrativeStateException e) {
265 PolicyLogger.error("Error while starting Transaction " + e);
266 } catch (Exception e) {
267 PolicyLogger.error("Error while starting Transaction " + e);
269 response = deletePolicy.run(pep, requestID, userNamePass[0], userNamePass[1]);
271 Config.getIntegrityMonitor().endTransaction();
272 if (response.contains("BAD REQUEST")||response.contains("PE300")||response.contains("not exist")||response.contains("Invalid policyName")) {
273 return new ResponseEntity<String>(response, HttpStatus.BAD_REQUEST);
274 } else if (response.contains("locked down")){
275 return new ResponseEntity<String>(response, HttpStatus.ACCEPTED);
276 } else if (response.contains("not Authorized")) {
277 return new ResponseEntity<String>(response, HttpStatus.FORBIDDEN);
278 } else if (response.contains("groupId")) {
279 return new ResponseEntity<String>(response, HttpStatus.NOT_FOUND);
280 } else if (response.contains("JPAUtils")||response.contains("database")||response.contains("policy file")||
281 response.contains("unknown")||response.contains("configuration")) {
282 return new ResponseEntity<String>(response, HttpStatus.INTERNAL_SERVER_ERROR);
284 return new ResponseEntity<String>(response, HttpStatus.OK);
289 @ApiImplicitParam(name ="Authorization", required = true, paramType = "Header"),
290 @ApiImplicitParam(name ="Environment", required = true, paramType = "Header")
292 @ApiOperation(value= "Creates a Policy based on given Policy Parameters.")
293 @RequestMapping(value = "/createPolicy", method = RequestMethod.PUT)
294 public @ResponseBody ResponseEntity<String> createRequest(@RequestBody PolicyParameters pep,@RequestHeader(value="ClientAuth", required=true)String clientEncoding,
295 @RequestHeader(value="X-ECOMP-RequestID", required=false)String requestID) {
296 String response = null;
297 String[] userNamePass = null;
299 userNamePass = decodeEncoding(clientEncoding, "CREATEPOLICY");
300 } catch (Exception e1) {
301 return new ResponseEntity<String>(response, HttpStatus.UNAUTHORIZED);
303 PolicyCreateUpdateRequest policyCreateUpdateRequest = new PolicyCreateUpdateRequest(policyEngine);
305 Config.getIntegrityMonitor().startTransaction();
306 } catch (AdministrativeStateException e) {
307 PolicyLogger.error("Error while starting Transaction " + e);
308 } catch (Exception e) {
309 PolicyLogger.error("Error while starting Transaction " + e);
311 response = policyCreateUpdateRequest.run(pep, requestID, "create", userNamePass[0], userNamePass[1]);
313 Config.getIntegrityMonitor().endTransaction();
314 if(response== null || response.contains("BAD REQUEST")||response.contains("PE300")){
315 return new ResponseEntity<String>(response, HttpStatus.BAD_REQUEST);
317 else if (response.contains("Policy Exist Error")) {
318 return new ResponseEntity<String>(response, HttpStatus.CONFLICT);
319 } else if (response.contains("PE200")){
320 return new ResponseEntity<String>(response, HttpStatus.INTERNAL_SERVER_ERROR);
322 return new ResponseEntity<String>(response, HttpStatus.OK);
328 @ApiImplicitParam(name ="Authorization", required = true, paramType = "Header"),
329 @ApiImplicitParam(name ="Environment", required = true, paramType = "Header")
331 @ApiOperation(value= "Updates a Policy based on given Policy Parameters.")
332 @RequestMapping(value = "/updatePolicy", method = RequestMethod.PUT)
333 public @ResponseBody ResponseEntity<String> updateRequest(@RequestBody PolicyParameters pep,@RequestHeader(value="ClientAuth", required=true)String clientEncoding,
334 @RequestHeader(value="X-ECOMP-RequestID", required=false) String requestID) {
335 String response = null;
336 String[] userNamePass = null;
338 userNamePass = decodeEncoding(clientEncoding, "CREATEPOLICY");
339 } catch (Exception e1) {
340 return new ResponseEntity<String>(response, HttpStatus.UNAUTHORIZED);
342 PolicyCreateUpdateRequest policyCreateUpdateRequest = new PolicyCreateUpdateRequest(policyEngine);
344 Config.getIntegrityMonitor().startTransaction();
345 } catch (AdministrativeStateException e) {
346 PolicyLogger.error("Error while starting Transaction " + e);
347 } catch (Exception e) {
348 PolicyLogger.error("Error while starting Transaction " + e);
350 response = policyCreateUpdateRequest.run(pep, requestID, "update", userNamePass[0], userNamePass[1]);
352 Config.getIntegrityMonitor().endTransaction();
353 if (response==null|| response.contains("BAD REQUEST")||response.contains("PE300")){
354 return new ResponseEntity<String>(response, HttpStatus.BAD_REQUEST);
355 } else if (response.contains("PE200")){
356 return new ResponseEntity<String>(response, HttpStatus.INTERNAL_SERVER_ERROR);
358 return new ResponseEntity<String>(response, HttpStatus.OK);
364 @ApiImplicitParam(name ="Authorization", required = true, paramType = "Header"),
365 @ApiImplicitParam(name ="Environment", required = true, paramType = "Header")
367 @ApiOperation(value= "Creates a Config Policy based on given Policy Parameters.")
368 @RequestMapping(value = "/createConfig", method = RequestMethod.PUT)
370 public @ResponseBody ResponseEntity<String> createConfigRequest(@RequestBody PepConfigPolicyRequest pep, @RequestHeader(value="ClientAuth", required=true)String clientEncoding,
371 @RequestHeader(value="X-ECOMP-RequestID", required=false) String requestID) {
372 String response = null;
373 String[] userNamePass = null;
375 userNamePass = decodeEncoding(clientEncoding, "CREATEPOLICY");
376 } catch (Exception e1) {
377 return new ResponseEntity<String>(response, HttpStatus.UNAUTHORIZED);
379 PolicyCreateUpdateRequest policyCreateUpdateRequest = new PolicyCreateUpdateRequest(policyEngine);
381 Config.getIntegrityMonitor().startTransaction();
382 } catch (AdministrativeStateException e) {
383 PolicyLogger.error("Error while starting Transaction " + e);
384 } catch (Exception e) {
385 PolicyLogger.error("Error while starting Transaction " + e);
387 response = policyCreateUpdateRequest.run(pep, requestID, "create", userNamePass[0], userNamePass[1]);
389 Config.getIntegrityMonitor().endTransaction();
390 if (response!=null && !response.contains("BAD REQUEST")) {
391 return new ResponseEntity<String>(response, HttpStatus.OK);
393 return new ResponseEntity<String>(response, HttpStatus.BAD_REQUEST);
399 @ApiImplicitParam(name ="Authorization", required = true, paramType = "Header"),
400 @ApiImplicitParam(name ="Environment", required = true, paramType = "Header")
402 @ApiOperation(value= "Updates a Config Policy based on given Policy Parameters.")
403 @RequestMapping(value = "/updateConfig", method = RequestMethod.PUT)
405 public @ResponseBody ResponseEntity<String> updateConfigRequest(@RequestBody PepConfigPolicyRequest pep, @RequestHeader(value="ClientAuth", required=true)String clientEncoding,
406 @RequestHeader(value="X-ECOMP-RequestID", required=false) String requestID) {
407 String response = null;
408 String[] userNamePass = null;
410 userNamePass = decodeEncoding(clientEncoding, "CREATEPOLICY");
411 } catch (Exception e1) {
412 return new ResponseEntity<String>(response, HttpStatus.UNAUTHORIZED);
414 PolicyCreateUpdateRequest policyCreateUpdateRequest = new PolicyCreateUpdateRequest(policyEngine);
416 Config.getIntegrityMonitor().startTransaction();
417 } catch (AdministrativeStateException e) {
418 PolicyLogger.error("Error while starting Transaction " + e);
419 } catch (Exception e) {
420 PolicyLogger.error("Error while starting Transaction " + e);
422 response = policyCreateUpdateRequest.run(pep, requestID, "update", userNamePass[0], userNamePass[1]);
424 Config.getIntegrityMonitor().endTransaction();
425 if (response!=null && !response.contains("BAD REQUEST")) {
426 return new ResponseEntity<String>(response, HttpStatus.OK);
428 return new ResponseEntity<String>(response, HttpStatus.BAD_REQUEST);
434 @ApiImplicitParam(name ="Authorization", required = true, paramType = "Header"),
435 @ApiImplicitParam(name ="Environment", required = true, paramType = "Header")
437 @ApiOperation(value = "Creates a Config Firewall Policy")
438 @RequestMapping(value = "/createFirewallConfig", method = RequestMethod.PUT)
440 public @ResponseBody ResponseEntity<String> createFirewallConfigRequest(@RequestBody PepConfigFirewallPolicyRequest pep, @RequestHeader(value="ClientAuth", required=true)String clientEncoding,
441 @RequestHeader(value="X-ECOMP-RequestID", required=false) String requestID) {
442 String response = null;
443 String[] userNamePass = null;
445 userNamePass = decodeEncoding(clientEncoding, "CREATEPOLICY");
446 } catch (Exception e1) {
447 return new ResponseEntity<String>(response, HttpStatus.UNAUTHORIZED);
449 ConfigFirewallPolicyRequest firewallPolicyRequest = new ConfigFirewallPolicyRequest(policyEngine);
451 Config.getIntegrityMonitor().startTransaction();
452 } catch (AdministrativeStateException e) {
453 PolicyLogger.error("Error while starting Transaction " + e);
454 } catch (Exception e) {
455 PolicyLogger.error("Error while starting Transaction " + e);
457 response = firewallPolicyRequest.run(pep, requestID, "create", userNamePass[0], userNamePass[1]);
459 Config.getIntegrityMonitor().endTransaction();
460 if (response!=null && !response.contains("BAD REQUEST")) {
461 return new ResponseEntity<String>(response, HttpStatus.OK);
463 return new ResponseEntity<String>(response, HttpStatus.BAD_REQUEST);
469 @ApiImplicitParam(name ="Authorization", required = true, paramType = "Header"),
470 @ApiImplicitParam(name ="Environment", required = true, paramType = "Header")
472 @ApiOperation(value = "Updates a Config Firewall Policy")
473 @RequestMapping(value = "/updateFirewallConfig", method = RequestMethod.PUT)
475 public @ResponseBody ResponseEntity<String> updateFirewallConfigRequest(@RequestBody PepConfigFirewallPolicyRequest pep, @RequestHeader(value="ClientAuth", required=true)String clientEncoding,
476 @RequestHeader(value="X-ECOMP-RequestID", required=false) String requestID) {
477 String response = null;
478 String[] userNamePass = null;
480 userNamePass = decodeEncoding(clientEncoding, "CREATEPOLICY");
481 } catch (Exception e1) {
482 return new ResponseEntity<String>(response, HttpStatus.UNAUTHORIZED);
484 ConfigFirewallPolicyRequest firewallPolicyRequest = new ConfigFirewallPolicyRequest(policyEngine);
486 Config.getIntegrityMonitor().startTransaction();
487 } catch (AdministrativeStateException e) {
488 PolicyLogger.error("Error while starting Transaction " + e);
489 } catch (Exception e) {
490 PolicyLogger.error("Error while starting Transaction " + e);
492 response = firewallPolicyRequest.run(pep, requestID, "update", userNamePass[0], userNamePass[1]);
494 Config.getIntegrityMonitor().endTransaction();
495 if (response!=null && !response.contains("BAD REQUEST")) {
496 return new ResponseEntity<String>(response, HttpStatus.OK);
498 return new ResponseEntity<String>(response, HttpStatus.BAD_REQUEST);
504 @ApiImplicitParam(name ="Authorization", required = true, paramType = "Header")
506 @ApiOperation(value= "Gets the API Services usage Information")
508 @RequestMapping(value = "/count", method = RequestMethod.GET)
509 public String getCount() {
510 return "Total Config Calls : " + configCounter + "\n"
511 +"Total Config calls made using Policy File Name: " + configPolicyNameCounter + "\n"
512 + "Total Event Calls : " + eventCounter;
516 @ApiImplicitParam(name ="Authorization", required = true, paramType = "Header")
518 @ApiOperation(value = "Gets the PDPs that are listed to provide service.")
519 @RequestMapping(value = "/pdps", method = RequestMethod.GET)
520 public List<String> listPDPs() {
521 return Config.getPDPs();
525 @ApiImplicitParam(name ="Authorization", required = true, paramType = "Header")
527 @ApiOperation(value = "Gets the PAPs that are listed to provide service.")
528 @RequestMapping(value = "/paps", method = RequestMethod.GET)
529 public List<String> listPAPs() {
530 return Config.getPAPs();
534 * Internal Decoding System. to support old and new Calls.
536 private String[] decodeEncoding(String clientEncoding, String scope) throws Exception{
537 String[] userNamePass = PolicyUtils.decodeBasicEncoding(clientEncoding);
538 if(userNamePass==null){
539 if(AuthenticationService.clientAuth(clientEncoding)){
540 if(AuthenticationService.checkClientScope(clientEncoding, scope)){
541 String usernameAndPassword = null;
542 byte[] decodedBytes = Base64.getDecoder().decode(clientEncoding);
543 usernameAndPassword = new String(decodedBytes, "UTF-8");
544 StringTokenizer tokenizer = new StringTokenizer(usernameAndPassword, ":");
545 String username = tokenizer.nextToken();
546 String password = tokenizer.nextToken();
547 userNamePass= new String[]{username, password};
551 if(userNamePass==null){
552 throw new Exception("Client is Not authrorized to make this call. Please contact PyPDP Admin.");