1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
|
/*
* ============LICENSE_START===================================================
* Copyright (c) 2018 Amdocs
* ============================================================================
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
* ============LICENSE_END=====================================================
*/
package org.onap.aai.auth;
import java.security.cert.X509Certificate;
import javax.inject.Inject;
import javax.security.auth.x500.X500Principal;
import javax.servlet.http.HttpServletRequest;
import javax.ws.rs.core.Cookie;
import org.onap.aai.validation.config.ValidationServiceAuthConfig;
import org.onap.aai.validation.logging.LogHelper;
public class AAIMicroServiceAuth {
private static LogHelper applicationLogger = LogHelper.INSTANCE;
private ValidationServiceAuthConfig validationServiceAuthConfig;
@Inject
public AAIMicroServiceAuth(final ValidationServiceAuthConfig validationServiceAuthConfig) throws AAIAuthException {
this.validationServiceAuthConfig = validationServiceAuthConfig;
if (!validationServiceAuthConfig.isAuthenticationDisable()) {
AAIMicroServiceAuthCore.init(validationServiceAuthConfig.getAuthPolicyFile());
}
}
public boolean authBasic(String username, String authFunction) throws AAIAuthException {
return AAIMicroServiceAuthCore.authorize(username, authFunction);
}
public String authUser(String authUser, String authFunction) throws AAIAuthException {
StringBuilder username = new StringBuilder();
username.append(authUser);
if (!authBasic(username.toString(), authFunction)) {
return "AAI_9101";
}
return "OK";
}
public boolean authCookie(Cookie cookie, String authFunction, StringBuilder username) throws AAIAuthException {
if (cookie == null) {
return false;
}
applicationLogger.debug("Got one:" + cookie);
return AAIMicroServiceAuthCore.authorize(username.toString(), authFunction);
}
public boolean validateRequest(HttpServletRequest req, String action, String apiPath) throws AAIAuthException {
applicationLogger.debug("validateRequest: " + apiPath);
applicationLogger.debug("validationServiceConfig.isAuthenticationDisable(): "
+ validationServiceAuthConfig.isAuthenticationDisable());
if (validationServiceAuthConfig.isAuthenticationDisable()) {
return true;
}
String[] ps = apiPath.split("/");
String authPolicyFunctionName = ps[0];
if (ps.length > 1) {
if (ps[0].matches("v\\d+")) {
authPolicyFunctionName = ps[1];
} else {
authPolicyFunctionName = ps[0];
}
}
String cipherSuite = (String) req.getAttribute("javax.servlet.request.cipher_suite");
String authUser = null;
if (cipherSuite != null) {
X509Certificate[] certChain = (X509Certificate[]) req.getAttribute("javax.servlet.request.X509Certificate");
if (certChain != null) {
X509Certificate clientCert = certChain[0];
X500Principal subjectDN = clientCert.getSubjectX500Principal();
authUser = subjectDN.toString();
}
}
if (authUser == null) {
return false;
}
String status = authUser(authUser.toLowerCase(), action + ":" + authPolicyFunctionName);
return "OK".equals(status);
}
}
|