aboutsummaryrefslogtreecommitdiffstats
path: root/aai-aaf-auth/src/main/java/org/onap/aai/aaf/auth/AafRequestFilter.java
blob: cfaa61bedb99081e5dfc494deb101a25c83a2923 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
/**
 * ============LICENSE_START=======================================================
 * org.onap.aai
 * ================================================================================
 * Copyright © 2017-2018 AT&T Intellectual Property. All rights reserved.
 * ================================================================================
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *    http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 * ============LICENSE_END=========================================================
 */

package org.onap.aai.aaf.auth;

import static org.onap.aai.aaf.auth.ResponseFormatter.errorResponse;

import java.io.IOException;
import java.util.Enumeration;
import java.util.List;
import java.util.Properties;

import javax.servlet.FilterChain;
import javax.servlet.ServletException;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;

import org.onap.aaf.cadi.filter.CadiFilter;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;

/**
 * The Class AafRequestFilter provides common auth filter methods
 */
public class AafRequestFilter {

    private static final Logger LOGGER = LoggerFactory.getLogger(AafRequestFilter.class);

    public static void authenticationFilter(HttpServletRequest request, HttpServletResponse response,
            FilterChain filterChain, CadiFilter cadiFilter, Properties props, String userChainPattern)
            throws IOException, ServletException {
        if (!request.getRequestURI().matches("^.*/util/echo$")) {

            List<String> cadiConfiguredIssuers = CertUtil.getCadiCertIssuers(props);
            String issuer = CertUtil.getCertIssuer(request);
            if (issuer == null || issuer.isEmpty()) {
                errorResponse(request, response);
                return;
            }
            issuer = issuer.replaceAll("\\s+", "").toUpperCase();

            if (cadiConfiguredIssuers.contains(issuer)) {
                LOGGER.debug("authenticationFilter CADI issuer " + issuer);
                if (CertUtil.isHaProxy(request)) {
                    // get the end user/client mechid and use it in the user chain header value
                    String user = CertUtil.getMechId(request);
                    LOGGER.debug("authenticationFilter haProxy sent end user/mechid " + user);
                    if (user == null || user.isEmpty()) {
                        errorResponse(request, response);
                        return;
                    }
                    AafRequestWrapper reqWrapper = new AafRequestWrapper(request);
                    String userChainHdr = CertUtil.buildUserChainHeader(user, userChainPattern);
                    LOGGER.debug("User chain header value: " + userChainHdr);
                    reqWrapper.putHeader(CertUtil.AAF_USER_CHAIN_HDR, userChainHdr);
                    cadiFilter.doFilter(reqWrapper, response, filterChain);
                } else {
                    cadiFilter.doFilter(request, response, filterChain);
                }
                if (response.getStatus() == 401 || response.getStatus() == 403) {
                    LOGGER.debug("authenticationFilter failed CADI authentication");
                    errorResponse(request, response);
                    return;
                }
            } else {
                filterChain.doFilter(request, response);
            }
        } else {
            filterChain.doFilter(request, response);
        }
    }

    public static void authorizationFilter(HttpServletRequest request, HttpServletResponse response,
            FilterChain filterChain, String permission, Properties props) throws IOException, ServletException {
        if (request.getRequestURI().matches("^.*/util/echo$")) {
            filterChain.doFilter(request, response);
        }
        List<String> cadiConfiguredIssuers = CertUtil.getCadiCertIssuers(props);
        String issuer = CertUtil.getCertIssuer(request);
        if (issuer == null || issuer.isEmpty()) {
            errorResponse(request, response);
            return;
        }
        issuer = issuer.replaceAll("\\s+", "").toUpperCase();
        Enumeration hdrs = request.getHeaders(CertUtil.AAF_USER_CHAIN_HDR);
        while (hdrs.hasMoreElements()) {
            String headerValue = (String) hdrs.nextElement();
            LOGGER.debug("authorizationFilter user chain headerValue=" + headerValue);
        }
        if ((cadiConfiguredIssuers.contains(issuer)) && (!request.isUserInRole(permission))) {
            LOGGER.debug(
                    "authorizationFilter failed CADI authorization issuer=" + issuer + " permission=" + permission);
            errorResponse(request, response);
        } else {
            filterChain.doFilter(request, response);
        }
    }
}