summaryrefslogtreecommitdiffstats
path: root/aaf/src/test/java/org/onap/aaf/cadi/lur/aaf/test/MultiThreadPermHit.java
blob: ef9dc369fc3be09535b111864ad5b13ec735c122 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
/*******************************************************************************
 * ============LICENSE_START====================================================
 * * org.onap.aaf
 * * ===========================================================================
 * * Copyright © 2017 AT&T Intellectual Property. All rights reserved.
 * * ===========================================================================
 * * Licensed under the Apache License, Version 2.0 (the "License");
 * * you may not use this file except in compliance with the License.
 * * You may obtain a copy of the License at
 * * 
 *  *      http://www.apache.org/licenses/LICENSE-2.0
 * * 
 *  * Unless required by applicable law or agreed to in writing, software
 * * distributed under the License is distributed on an "AS IS" BASIS,
 * * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * * See the License for the specific language governing permissions and
 * * limitations under the License.
 * * ============LICENSE_END====================================================
 * *
 * * ECOMP is a trademark and service mark of AT&T Intellectual Property.
 * *
 ******************************************************************************/
package org.onap.aaf.cadi.lur.aaf.test;

import java.security.Principal;
import java.util.ArrayList;
import java.util.List;

import org.onap.aaf.cadi.Access;
import org.onap.aaf.cadi.Permission;
import org.onap.aaf.cadi.PropAccess;
import org.onap.aaf.cadi.aaf.AAFPermission;
import org.onap.aaf.cadi.aaf.v2_0.AAFAuthn;
import org.onap.aaf.cadi.aaf.v2_0.AAFConHttp;
import org.onap.aaf.cadi.aaf.v2_0.AAFLurPerm;
import org.onap.aaf.cadi.config.Config;
import org.onap.aaf.cadi.locator.PropertyLocator;

public class MultiThreadPermHit {
	public static void main(String args[]) {
		// Link or reuse to your Logging mechanism
		PropAccess myAccess = new PropAccess(); // 
		
		// 
		try {
			AAFConHttp con = new AAFConHttp(myAccess,new PropertyLocator("https://mithrilcsp.sbc.com:8100"));
			
			// AAFLur has pool of DME clients as needed, and Caches Client lookups
			final AAFLurPerm aafLur = con.newLur();
			aafLur.setDebug("m12345@aaf.att.com");

			// Note: If you need both Authn and Authz construct the following:
			AAFAuthn<?> aafAuthn = con.newAuthn(aafLur);
			
			// Do not set Mech ID until after you construct AAFAuthn,
			// because we initiate  "401" info to determine the Realm of 
			// of the service we're after.
			final String id = myAccess.getProperty(Config.AAF_MECHID,null);
			final String pass = myAccess.decrypt(myAccess.getProperty(Config.AAF_MECHPASS,null),false);
			if(id!=null && pass!=null) {
				try {
					
					// Normally, you obtain Principal from Authentication System.
	//				// For J2EE, you can ask the HttpServletRequest for getUserPrincipal()
	//				// If you use CADI as Authenticator, it will get you these Principals from
	//				// CSP or BasicAuth mechanisms.
	//				String id = "cluster_admin@gridcore.att.com";
	//
	//				// If Validate succeeds, you will get a Null, otherwise, you will a String for the reason.
					String ok;
					ok = aafAuthn.validate(id, pass);
					if(ok!=null) {
						System.out.println(ok);
					}

					List<Permission> pond = new ArrayList<Permission>();
					for(int i=0;i<20;++i) {
						pond.clear();
						aafLur.fishAll(i+id, pond);
						if(ok!=null && i%1000==0) {
							System.out.println(i + " " + ok);
						}
					}

					for(int i=0;i<1000000;++i) {
						ok = aafAuthn.validate( i+ id, "wrongPass");
						if(ok!=null && i%1000==0) {
							System.out.println(i + " " + ok);
						}
					}
	
					final AAFPermission perm = new AAFPermission("com.att.aaf.access","*","*");
					
					// Now you can ask the LUR (Local Representative of the User Repository about Authorization
					// With CADI, in J2EE, you can call isUserInRole("com.att.mygroup|mytype|write") on the Request Object 
					// instead of creating your own LUR
					for(int i=0;i<4;++i) {
						if(aafLur.fish(id, perm)) {
							System.out.println("Yes, " + id + " has permission for " + perm.getKey());
						} else {
							System.out.println("No, " + id + " does not have permission for " + perm.getKey());
						}
					}
	
	
					// Or you can all for all the Permissions available
					List<Permission> perms = new ArrayList<Permission>();
	
					
					aafLur.fishAll(id,perms);
					System.out.println("Perms for " + id);
					for(Permission prm : perms) {
						System.out.println(prm.getKey());
					}
					
					System.out.println("Press any key to continue");
					System.in.read();
					
					for(int j=0;j<5;++j) {
						new Thread(new Runnable() {
							@Override
							public void run() {
								for(int i=0;i<20;++i) {
									if(aafLur.fish(id, perm)) {
										System.out.println("Yes, " + id + " has permission for " + perm.getKey());
									} else {
										System.out.println("No, " + id + " does not have permission for " + perm.getKey());
									}
								}
							}
						}).start();
					}
	
					
				} finally {
					aafLur.destroy();
				}
			} else { // checked on IDs
				System.err.println(Config.AAF_MECHID + " and/or " + Config.AAF_MECHPASS + " are not set.");
			}
		} catch (Exception e) {
			e.printStackTrace();
		}
	}
}