aboutsummaryrefslogtreecommitdiffstats
path: root/aai-aaf-auth/src/main/java/org/onap/aai/aaf/filters/AafCertAuthorizationFilter.java
blob: 56799f1c047beb2c5e6efc7a8944eb6299dc0b5d (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
/**
 * ============LICENSE_START=======================================================
 * org.onap.aai
 * ================================================================================
 * Copyright © 2017-2018 AT&T Intellectual Property. All rights reserved.
 * ================================================================================
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 * <p>
 * http://www.apache.org/licenses/LICENSE-2.0
 * <p>
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 * ============LICENSE_END=========================================================
 */

package org.onap.aai.aaf.filters;

import java.io.IOException;
import java.util.ArrayList;
import java.util.Arrays;
import java.util.List;
import java.util.stream.Collectors;

import javax.servlet.FilterChain;
import javax.servlet.ServletException;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;

import org.onap.aai.aaf.auth.AafRequestFilter;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.beans.factory.annotation.Value;
import org.springframework.boot.web.servlet.filter.OrderedRequestContextFilter;
import org.springframework.context.annotation.Profile;
import org.springframework.context.annotation.PropertySource;
import org.springframework.stereotype.Component;

/**
 * AAF with client cert authorization filter
 */

@Component
@Profile(AafProfiles.AAF_CERT_AUTHENTICATION)
@PropertySource(value = "file:${CONFIG_HOME}/aaf/permissions.properties", ignoreResourceNotFound = true)
@PropertySource(value = "file:${server.local.startpath}/aaf/permissions.properties", ignoreResourceNotFound = true)
public class AafCertAuthorizationFilter extends OrderedRequestContextFilter {

    private static final String ADVANCED = "advanced";
    private static final String BASIC = "basic";

    String type;

    String instance;

    private CadiProps cadiProps;

    private List<String> advancedKeywordsList;

    @Autowired
    public AafCertAuthorizationFilter(@Value("${permission.type}") String type,
            @Value("${permission.instance}") String instance, @Value("${advanced.keywords.list:}") String advancedKeys,
            CadiProps cadiProps) {
        this.type = type;
        this.instance = instance;
        this.cadiProps = cadiProps;
        if (advancedKeys == null || advancedKeys.isEmpty()) {
            this.advancedKeywordsList = new ArrayList<>();
        } else {
            this.advancedKeywordsList = Arrays.stream(advancedKeys.split(",")).collect(Collectors.toList());
        }
        this.setOrder(FilterPriority.AAF_CERT_AUTHORIZATION.getPriority());
    }

    @Override
    protected void doFilterInternal(HttpServletRequest request, HttpServletResponse response, FilterChain filterChain)
            throws IOException, ServletException {
        if (advancedKeywordsList == null || advancedKeywordsList.size() == 0) {
            String permission = String.format("%s|%s|%s", type, instance, request.getMethod().toLowerCase());
            AafRequestFilter.authorizationFilter(request, response, filterChain, permission,
                    cadiProps.getCadiProperties());
        } else {
            boolean isAdvanced = this.containsAdvancedKeywords(request);

            // if the URI contains advanced.keywords it's an advanced query
            String queryType = isAdvanced ? ADVANCED : BASIC;
            String permission = String.format("%s|%s|%s", type, instance, queryType);
            AafRequestFilter.authorizationFilter(request, response, filterChain, permission,
                    cadiProps.getCadiProperties());
        }
    }

    private boolean containsAdvancedKeywords(HttpServletRequest request) {
        String uri = request.getRequestURI();
        for (String keyword : advancedKeywordsList) {
            if (uri.contains(keyword)) {
                return true;
            }
        }
        return false;
    }
}