summaryrefslogtreecommitdiffstats
path: root/src/main/java/com/att/nsa/cambria/security/DMaaPAuthenticatorImpl.java
blob: 709d0358578249a3ee19b5fdf4ad01127ee9fc2b (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
/*******************************************************************************
 *  ============LICENSE_START=======================================================
 *  org.onap.dmaap
 *  ================================================================================
 *  Copyright © 2017 AT&T Intellectual Property. All rights reserved.
 *  ================================================================================
 *  Licensed under the Apache License, Version 2.0 (the "License");
 *  you may not use this file except in compliance with the License.
 *  You may obtain a copy of the License at
 *        http://www.apache.org/licenses/LICENSE-2.0
 *  
 *  Unless required by applicable law or agreed to in writing, software
 *  distributed under the License is distributed on an "AS IS" BASIS,
 *  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 *  See the License for the specific language governing permissions and
 *  limitations under the License.
 *  ============LICENSE_END=========================================================
 *
 *  ECOMP is a trademark and service mark of AT&T Intellectual Property.
 *  
 *******************************************************************************/
package com.att.nsa.cambria.security;

import java.util.LinkedList;

import javax.servlet.http.HttpServletRequest;

import com.att.nsa.cambria.beans.DMaaPContext;
import com.att.nsa.cambria.security.impl.DMaaPOriginalUebAuthenticator;
import com.att.nsa.security.NsaApiKey;
import com.att.nsa.security.NsaAuthenticator;
import com.att.nsa.security.authenticators.OriginalUebAuthenticator;
import com.att.nsa.security.db.NsaApiDb;
import com.att.nsa.security.db.simple.NsaSimpleApiKey;

/**
 * 
 * @author author
 *
 * @param <K>
 */
public class DMaaPAuthenticatorImpl<K extends NsaApiKey> implements DMaaPAuthenticator<K> {

	private final LinkedList<DMaaPAuthenticator<K>> fAuthenticators;
	


	// Setting timeout to a large value for testing purpose.
	// private static final long kDefaultRequestTimeWindow = 1000 * 60 * 10; //
	// 10 minutes
	private static final long kDefaultRequestTimeWindow = 1000 * 60 * 10 * 10 * 10 * 10 * 10;

	/**
	 * Construct the security manager against an API key database
	 * 
	 * @param db
	 *            the API key db
	 */
	public DMaaPAuthenticatorImpl(NsaApiDb<K> db) {
		this(db, kDefaultRequestTimeWindow);
	}

	
	
	
	/**
	 * Construct the security manager against an API key database with a
	 * specific request time window size
	 * 
	 * @param db
	 *            the API key db
	 * @param authTimeWindowMs
	 *            the size of the time window for request authentication
	 */
	public DMaaPAuthenticatorImpl(NsaApiDb<K> db, long authTimeWindowMs) {
		fAuthenticators = new LinkedList<DMaaPAuthenticator<K>>();

		fAuthenticators.add(new DMaaPOriginalUebAuthenticator<K>(db, authTimeWindowMs));
	}

	/**
	 * Authenticate a user's request. This method returns the API key if the
	 * user is authentic, null otherwise.
	 * 
	 * @param ctx
	 * @return an api key record, or null
	 */
	public K authenticate(DMaaPContext ctx) {
		final HttpServletRequest req = ctx.getRequest();
		for (DMaaPAuthenticator<K> a : fAuthenticators) {
			if (a.qualify(req)) {
				final K k = a.isAuthentic(req);
				if (k != null)
					return k;
			}
			// else: this request doesn't look right to the authenticator
		}
		return null;
	}

	/**
	 * Get the user associated with the incoming request, or null if the user is
	 * not authenticated.
	 * 
	 * @param ctx
	 * @return
	 */
	public static NsaSimpleApiKey getAuthenticatedUser(DMaaPContext ctx) {
		final DMaaPAuthenticator<NsaSimpleApiKey> m = ctx.getConfigReader().getfSecurityManager();
		return m.authenticate(ctx);
	}

	/**
	 * method by default returning false
	 * @param req
	 * @return false
	 */
	public boolean qualify(HttpServletRequest req) {
		return false;
	}
/**
 * method by default returning null
 * @param req
 * @return null
 */
	public K isAuthentic(HttpServletRequest req) {
		return null;
	}
	
	public void addAuthenticator ( DMaaPAuthenticator<K> a )
	{
		this.fAuthenticators.add(a);
	}
	

}