aboutsummaryrefslogtreecommitdiffstats
path: root/aai-traversal/src/main/java/org/onap/aai/config/aaf/AafAuthorizationFilter.java
blob: 93829462b05a88f7014af2b0429d241f8946c0ad (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
/**
 * ============LICENSE_START=======================================================
 * org.onap.aai
 * ================================================================================
 * Copyright © 2017-2018 AT&T Intellectual Property. All rights reserved.
 * ================================================================================
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *    http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 * ============LICENSE_END=========================================================
 */
package org.onap.aai.config.aaf;

import com.att.eelf.configuration.EELFLogger;
import com.att.eelf.configuration.EELFManager;
import org.apache.commons.io.IOUtils;
import org.onap.aai.Profiles;
import org.springframework.beans.factory.annotation.Value;
import org.springframework.boot.web.filter.OrderedRequestContextFilter;
import org.springframework.context.annotation.Profile;
import org.springframework.context.annotation.PropertySource;
import org.springframework.stereotype.Component;

import javax.servlet.FilterChain;
import javax.servlet.ServletException;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import java.io.IOException;
import java.nio.charset.StandardCharsets;

/**
 * AAF authorization filter
 */

@Component
@Profile(Profiles.AAF_AUTHENTICATION)
@PropertySource("file:${server.local.startpath}/aaf/permissions.properties")
public class AafAuthorizationFilter extends OrderedRequestContextFilter {

    private static final EELFLogger logger = EELFManager.getInstance().getLogger(AafAuthorizationFilter.class.getName());

    private static final String ADVANCED = "advanced";
    private static final String BASIC = "basic";
    private static final String ECHO_ENDPOINT = "^.*/util/echo$";

    @Value("${permission.type}")
    String type;

    @Value("${permission.instance}")
    String instance;

    public AafAuthorizationFilter() {
        this.setOrder(FilterPriority.AAF_AUTHORIZATION.getPriority());
    }

    @Override
    protected void doFilterInternal(HttpServletRequest req, HttpServletResponse response, FilterChain filterChain) throws IOException, ServletException {

        PayloadBufferingRequestWrapper request = new PayloadBufferingRequestWrapper(req);

        if(request.getRequestURI().matches(ECHO_ENDPOINT)){
            filterChain.doFilter(request, response);
        }

        String payload = IOUtils.toString(request.getInputStream(), StandardCharsets.UTF_8.name());
        boolean containsWordGremlin = payload.contains("\"gremlin\"");

        //if the request contains the word "gremlin" it's an "advanced" query needing an "advanced" role
        String permissionBasic = String.format("%s|%s|%s", type, instance, ADVANCED);
        String permissionAdvanced = String.format("%s|%s|%s", type, instance, BASIC);

        boolean isAuthorized;

        if(containsWordGremlin){
            isAuthorized = request.isUserInRole(permissionAdvanced);
        }else{
            isAuthorized = request.isUserInRole(permissionAdvanced) || request.isUserInRole(permissionBasic);
        }

        if(!isAuthorized){
            String name = request.getUserPrincipal() != null ? request.getUserPrincipal().getName() : "unknown";
            logger.info("User " + name + " does not have a role for " + (containsWordGremlin ? "gremlin" : "non-gremlin") + " query" );
            response.setStatus(403);
        }else{
            filterChain.doFilter(request,response);
        }
    }
}