summaryrefslogtreecommitdiffstats
path: root/aaf/src/test/java/org/onap/aaf/example/X509Test.java
blob: ad5d4b2d035668725f9be58f04bb04e2daa49815 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
/*******************************************************************************
 * ============LICENSE_START====================================================
 * * org.onap.aaf
 * * ===========================================================================
 * * Copyright © 2017 AT&T Intellectual Property. All rights reserved.
 * * ===========================================================================
 * * Licensed under the Apache License, Version 2.0 (the "License");
 * * you may not use this file except in compliance with the License.
 * * You may obtain a copy of the License at
 * * 
 *  *      http://www.apache.org/licenses/LICENSE-2.0
 * * 
 *  * Unless required by applicable law or agreed to in writing, software
 * * distributed under the License is distributed on an "AS IS" BASIS,
 * * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * * See the License for the specific language governing permissions and
 * * limitations under the License.
 * * ============LICENSE_END====================================================
 * *
 * * ECOMP is a trademark and service mark of AT&T Intellectual Property.
 * *
 ******************************************************************************/
package org.onap.aaf.example;

import java.security.Principal;

import org.onap.aaf.cadi.PropAccess;
import org.onap.aaf.cadi.aaf.v2_0.AAFConHttp;
import org.onap.aaf.cadi.aaf.v2_0.AAFLurPerm;
import org.onap.aaf.cadi.client.Future;
import org.onap.aaf.cadi.locator.DNSLocator;
import org.onap.aaf.cadi.lur.LocalPermission;

public class X509Test {
	public static void main(String args[]) {
		// Link or reuse to your Logging mechanism
		
		PropAccess myAccess = new PropAccess();
		
		// 
		try {
			AAFConHttp con = new AAFConHttp(myAccess, 
					new DNSLocator(myAccess,"https","mithrilcsp.sbc.com","8100"));
			
			// AAFLur has pool of DME clients as needed, and Caches Client lookups
			AAFLurPerm aafLur = con.newLur();
			
			// Note: If you need both Authn and Authz construct the following:
//			AAFAuthn<?> aafAuthn = con.newAuthn(aafLur);
			
			// con.x509Alias("aaf.att"); // alias in keystore

			try {
				
				// Normally, you obtain Principal from Authentication System.
//				// For J2EE, you can ask the HttpServletRequest for getUserPrincipal()
//				// If you use CADI as Authenticator, it will get you these Principals from
//				// CSP or BasicAuth mechanisms.
//				String id = "cluster_admin@gridcore.att.com";
//
//				// If Validate succeeds, you will get a Null, otherwise, you will a String for the reason.
				Future<String> fs = 
						con.client("2.0").read("/authz/perms/com.att.aaf.ca","application/Perms+json");
				if(fs.get(3000)) {
					System.out.println(fs.value);
				} else {
					System.out.println("Error: "  + fs.code() + ':' + fs.body());
				}
				
				// Check on Perms with LUR
				if(aafLur.fish(new Principal() {
					@Override
					public String getName() {
						return "m12345@aaf.att.com";
					}
				}, new LocalPermission("com.att.aaf.ca|aaf|request"))) {
					System.out.println("Has Perm");
				} else {
					System.out.println("Does NOT Have Perm");
				}
			} finally {
				aafLur.destroy();
			}
		} catch (Exception e) {
			e.printStackTrace();
		}

	}
}