afa9711767211e317aa658d5a3cf5dd08f57e5d1
[portal/ric-dashboard.git] / dashboard / webapp-backend / src / test / java / org / oransc / ric / portal / dashboard / config / WebSecurityMockConfiguration.java
1 /*-
2  * ========================LICENSE_START=================================
3  * O-RAN-SC
4  * %%
5  * Copyright (C) 2019 AT&T Intellectual Property
6  * %%
7  * Licensed under the Apache License, Version 2.0 (the "License");
8  * you may not use this file except in compliance with the License.
9  * You may obtain a copy of the License at
10  * 
11  *      http://www.apache.org/licenses/LICENSE-2.0
12  * 
13  * Unless required by applicable law or agreed to in writing, software
14  * distributed under the License is distributed on an "AS IS" BASIS,
15  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16  * See the License for the specific language governing permissions and
17  * limitations under the License.
18  * ========================LICENSE_END===================================
19  */
20 package org.oransc.ric.portal.dashboard.config;
21
22 import java.lang.invoke.MethodHandles;
23
24 import org.oransc.ric.portal.dashboard.DashboardConstants;
25 import org.oransc.ric.portal.dashboard.portalapi.PortalAuthManager;
26 import org.slf4j.Logger;
27 import org.slf4j.LoggerFactory;
28 import org.springframework.beans.factory.annotation.Value;
29 import org.springframework.context.annotation.Bean;
30 import org.springframework.context.annotation.Configuration;
31 import org.springframework.context.annotation.Profile;
32 import org.springframework.security.config.annotation.authentication.builders.AuthenticationManagerBuilder;
33 import org.springframework.security.config.annotation.method.configuration.EnableGlobalMethodSecurity;
34 import org.springframework.security.config.annotation.web.builders.HttpSecurity;
35 import org.springframework.security.config.annotation.web.builders.WebSecurity;
36 import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;
37 import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter;
38 import org.springframework.security.crypto.factory.PasswordEncoderFactories;
39 import org.springframework.security.crypto.password.PasswordEncoder;
40
41 @Configuration
42 @EnableWebSecurity
43 @EnableGlobalMethodSecurity(securedEnabled = true)
44 @Profile("test")
45 public class WebSecurityMockConfiguration extends WebSecurityConfigurerAdapter {
46
47         public static final String TEST_CRED_ADMIN = "admin";
48         public static final String TEST_CRED_STANDARD = "standard";
49
50         private static final Logger logger = LoggerFactory.getLogger(MethodHandles.lookup().lookupClass());
51
52         // Although constructor arguments are recommended over field injection,
53         // this results in fewer lines of code.
54         @Value("${portalapi.security}")
55         private Boolean portalapiSecurity;
56         @Value("${portalapi.appname}")
57         private String appName;
58         @Value("${portalapi.username}")
59         private String portalApiUsername;
60         @Value("${portalapi.password}")
61         private String portalApiPassword;
62         @Value("${portalapi.decryptor}")
63         private String decryptor;
64         @Value("${portalapi.usercookie}")
65         private String userCookie;
66
67         @Override
68         protected void configure(AuthenticationManagerBuilder auth) throws Exception {
69                 logger.debug("configure");
70                 PasswordEncoder encoder = PasswordEncoderFactories.createDelegatingPasswordEncoder();
71                 auth.inMemoryAuthentication() //
72                                 .passwordEncoder(encoder) //
73                                 // The admin user has the admin AND standard roles
74                                 .withUser(TEST_CRED_ADMIN) //
75                                 .password(encoder.encode(TEST_CRED_ADMIN))
76                                 .roles(DashboardConstants.ROLE_NAME_ADMIN, DashboardConstants.ROLE_NAME_STANDARD)//
77                                 .and()//
78                                 // The standard user has only the standard role
79                                 .withUser(TEST_CRED_STANDARD) //
80                                 .password(encoder.encode(TEST_CRED_STANDARD)) //
81                                 .roles(DashboardConstants.ROLE_NAME_STANDARD);
82         }
83
84         @Override
85         protected void configure(HttpSecurity http) throws Exception {
86                 http.authorizeRequests().anyRequest().authenticated()//
87                                 .and().httpBasic() //
88                                 .and().csrf().disable();
89         }
90
91         @Override
92         public void configure(WebSecurity web) throws Exception {
93                 // This disables Spring security, but not the app's filter.
94                 web.ignoring().antMatchers(WebSecurityConfiguration.OPEN_PATHS);
95                 web.ignoring().antMatchers("/", "/csrf"); // allow swagger-ui to load
96         }
97
98         @Bean
99         public PortalAuthManager portalAuthManagerBean() throws Exception {
100                 logger.debug("portalAuthManagerBean: app {}", appName);
101                 return new PortalAuthManager(appName, portalApiUsername, portalApiPassword, decryptor, userCookie);
102         }
103
104 }