f348ecb2d92cf579468ffa2e983f1b3d2677e5a3
[portal/ric-dashboard.git] / dashboard / webapp-backend / src / test / java / org / oransc / ric / portal / dashboard / config / WebSecurityMockConfiguration.java
1 /*-
2  * ========================LICENSE_START=================================
3  * O-RAN-SC
4  * %%
5  * Copyright (C) 2019 AT&T Intellectual Property
6  * %%
7  * Licensed under the Apache License, Version 2.0 (the "License");
8  * you may not use this file except in compliance with the License.
9  * You may obtain a copy of the License at
10  * 
11  *      http://www.apache.org/licenses/LICENSE-2.0
12  * 
13  * Unless required by applicable law or agreed to in writing, software
14  * distributed under the License is distributed on an "AS IS" BASIS,
15  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16  * See the License for the specific language governing permissions and
17  * limitations under the License.
18  * ========================LICENSE_END===================================
19  */
20 package org.oransc.ric.portal.dashboard.config;
21
22 import java.lang.invoke.MethodHandles;
23
24 import org.onap.portalsdk.core.onboarding.crossapi.IPortalRestCentralService;
25 import org.oransc.ric.portal.dashboard.DashboardConstants;
26 import org.oransc.ric.portal.dashboard.portalapi.PortalAuthManager;
27 import org.slf4j.Logger;
28 import org.slf4j.LoggerFactory;
29 import org.springframework.beans.factory.annotation.Value;
30 import org.springframework.context.annotation.Bean;
31 import org.springframework.context.annotation.Configuration;
32 import org.springframework.context.annotation.Profile;
33 import org.springframework.security.config.annotation.authentication.builders.AuthenticationManagerBuilder;
34 import org.springframework.security.config.annotation.method.configuration.EnableGlobalMethodSecurity;
35 import org.springframework.security.config.annotation.web.builders.HttpSecurity;
36 import org.springframework.security.config.annotation.web.builders.WebSecurity;
37 import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;
38 import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter;
39 import org.springframework.security.crypto.factory.PasswordEncoderFactories;
40 import org.springframework.security.crypto.password.PasswordEncoder;
41
42 @Configuration
43 @EnableWebSecurity
44 @EnableGlobalMethodSecurity(securedEnabled = true)
45 @Profile("test")
46 public class WebSecurityMockConfiguration extends WebSecurityConfigurerAdapter {
47
48         public static final String TEST_CRED_ADMIN = "admin";
49         public static final String TEST_CRED_STANDARD = "standard";
50
51         private static final Logger logger = LoggerFactory.getLogger(MethodHandles.lookup().lookupClass());
52
53         // Although constructor arguments are recommended over field injection,
54         // this results in fewer lines of code.
55         @Value("${portalapi.security}")
56         private Boolean portalapiSecurity;
57         @Value("${portalapi.appname}")
58         private String appName;
59         @Value("${portalapi.username}")
60         private String userName;
61         @Value("${portalapi.password}")
62         private String password;
63         @Value("${portalapi.decryptor}")
64         private String decryptor;
65         @Value("${portalapi.usercookie}")
66         private String userCookie;
67
68         @Override
69         protected void configure(AuthenticationManagerBuilder auth) throws Exception {
70                 logger.debug("configure");
71                 PasswordEncoder encoder = PasswordEncoderFactories.createDelegatingPasswordEncoder();
72                 auth.inMemoryAuthentication() //
73                                 .passwordEncoder(encoder) //
74                                 // The admin user has the admin AND standard roles
75                                 .withUser(TEST_CRED_ADMIN) //
76                                 .password(encoder.encode(TEST_CRED_ADMIN))
77                                 .roles(DashboardConstants.ROLE_NAME_ADMIN, DashboardConstants.ROLE_NAME_STANDARD)//
78                                 .and()//
79                                 // The standard user has only the standard role
80                                 .withUser(TEST_CRED_STANDARD) //
81                                 .password(encoder.encode(TEST_CRED_STANDARD)) //
82                                 .roles(DashboardConstants.ROLE_NAME_STANDARD);
83         }
84
85         @Override
86         protected void configure(HttpSecurity http) throws Exception {
87                 http.authorizeRequests().anyRequest().authenticated()//
88                                 .and().httpBasic() //
89                                 .and().csrf().disable();
90         }
91
92         @Override
93         public void configure(WebSecurity web) throws Exception {
94                 // This disables Spring security, but not the app's filter.
95                 web.ignoring().antMatchers(WebSecurityConfiguration.OPEN_PATHS);
96                 web.ignoring().antMatchers("/", "/csrf"); // allow swagger-ui to load
97         }
98
99         @Bean
100         public PortalAuthManager portalAuthManagerBean() throws Exception {
101                 logger.debug("portalAuthManagerBean");
102                 return new PortalAuthManager(IPortalRestCentralService.CREDENTIALS_APP,
103                                 IPortalRestCentralService.CREDENTIALS_USER, IPortalRestCentralService.CREDENTIALS_PASS, decryptor,
104                                 userCookie);
105         }
106
107 }