2 * ========================LICENSE_START=================================
5 * Copyright (C) 2019 AT&T Intellectual Property
6 * Modifications Copyright (C) 2020 Nordix Foundation
8 * Licensed under the Apache License, Version 2.0 (the "License");
9 * you may not use this file except in compliance with the License.
10 * You may obtain a copy of the License at
12 * http://www.apache.org/licenses/LICENSE-2.0
14 * Unless required by applicable law or agreed to in writing, software
15 * distributed under the License is distributed on an "AS IS" BASIS,
16 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17 * See the License for the specific language governing permissions and
18 * limitations under the License.
19 * ========================LICENSE_END===================================
21 package org.oransc.portal.nonrtric.controlpanel.mock;
23 import java.lang.invoke.MethodHandles;
25 import org.oransc.portal.nonrtric.controlpanel.ControlPanelConstants;
26 import org.oransc.portal.nonrtric.controlpanel.config.WebSecurityConfiguration;
27 import org.slf4j.Logger;
28 import org.slf4j.LoggerFactory;
29 import org.springframework.beans.factory.annotation.Value;
30 import org.springframework.context.annotation.Configuration;
31 import org.springframework.context.annotation.Profile;
32 import org.springframework.security.config.annotation.authentication.builders.AuthenticationManagerBuilder;
33 import org.springframework.security.config.annotation.method.configuration.EnableGlobalMethodSecurity;
34 import org.springframework.security.config.annotation.web.builders.HttpSecurity;
35 import org.springframework.security.config.annotation.web.builders.WebSecurity;
36 import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;
37 import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter;
38 import org.springframework.security.crypto.factory.PasswordEncoderFactories;
39 import org.springframework.security.crypto.password.PasswordEncoder;
43 @EnableGlobalMethodSecurity(securedEnabled = true)
45 public class WebSecurityMockConfiguration extends WebSecurityConfigurerAdapter {
47 public static final String TEST_CRED_ADMIN = "admin";
48 public static final String TEST_CRED_STANDARD = "standard";
50 private static final Logger logger = LoggerFactory.getLogger(MethodHandles.lookup().lookupClass());
52 public WebSecurityMockConfiguration(@Value("${userfile}") final String userFilePath) {
53 logger.debug("ctor: user file path {}", userFilePath);
57 protected void configure(AuthenticationManagerBuilder auth) throws Exception {
58 PasswordEncoder encoder = PasswordEncoderFactories.createDelegatingPasswordEncoder();
59 auth.inMemoryAuthentication() //
60 .passwordEncoder(encoder) //
61 // The admin user has the admin AND standard roles
62 .withUser(TEST_CRED_ADMIN) //
63 .password(encoder.encode(TEST_CRED_ADMIN))
64 .roles(ControlPanelConstants.ROLE_NAME_ADMIN, ControlPanelConstants.ROLE_NAME_STANDARD)//
66 // The standard user has only the standard role
67 .withUser(TEST_CRED_STANDARD) //
68 .password(encoder.encode(TEST_CRED_STANDARD)) //
69 .roles(ControlPanelConstants.ROLE_NAME_STANDARD);
73 protected void configure(HttpSecurity http) throws Exception {
74 http.authorizeRequests().anyRequest().authenticated()//
76 .and().csrf().disable();
80 public void configure(WebSecurity web) throws Exception {
81 // This disables Spring security, but not the app's filter.
82 web.ignoring().antMatchers(WebSecurityConfiguration.OPEN_PATHS);
83 web.ignoring().antMatchers("/", "/csrf"); // allow swagger-ui to load