e72fd1ca67065a822b542f6aa51cbcd4e28fb3c3
[portal/nonrtric-controlpanel.git] / webapp-backend / src / test / java / org / oransc / portal / nonrtric / controlpanel / config / WebSecurityMockConfiguration.java
1 /*-
2  * ========================LICENSE_START=================================
3  * O-RAN-SC
4  * %%
5  * Copyright (C) 2019 AT&T Intellectual Property
6  * Modifications Copyright (C) 2020 Nordix Foundation
7  * %%
8  * Licensed under the Apache License, Version 2.0 (the "License");
9  * you may not use this file except in compliance with the License.
10  * You may obtain a copy of the License at
11  *
12  *      http://www.apache.org/licenses/LICENSE-2.0
13  *
14  * Unless required by applicable law or agreed to in writing, software
15  * distributed under the License is distributed on an "AS IS" BASIS,
16  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17  * See the License for the specific language governing permissions and
18  * limitations under the License.
19  * ========================LICENSE_END===================================
20  */
21 package org.oransc.portal.nonrtric.controlpanel.config;
22
23 import java.lang.invoke.MethodHandles;
24 import org.oransc.portal.nonrtric.controlpanel.ControlpanelConstants;
25 import org.oransc.portal.nonrtric.controlpanel.config.WebSecurityConfiguration;
26 import org.slf4j.Logger;
27 import org.slf4j.LoggerFactory;
28 import org.springframework.beans.factory.annotation.Value;
29 import org.springframework.context.annotation.Configuration;
30 import org.springframework.context.annotation.Profile;
31 import org.springframework.security.config.annotation.authentication.builders.AuthenticationManagerBuilder;
32 import org.springframework.security.config.annotation.method.configuration.EnableGlobalMethodSecurity;
33 import org.springframework.security.config.annotation.web.builders.HttpSecurity;
34 import org.springframework.security.config.annotation.web.builders.WebSecurity;
35 import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;
36 import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter;
37 import org.springframework.security.crypto.factory.PasswordEncoderFactories;
38 import org.springframework.security.crypto.password.PasswordEncoder;
39
40 @Configuration
41 @EnableWebSecurity
42 @EnableGlobalMethodSecurity(securedEnabled = true)
43 @Profile("test")
44 public class WebSecurityMockConfiguration extends WebSecurityConfigurerAdapter {
45
46     public static final String TEST_CRED_ADMIN = "admin";
47     public static final String TEST_CRED_STANDARD = "standard";
48
49     private static final Logger logger = LoggerFactory.getLogger(MethodHandles.lookup().lookupClass());
50
51     public WebSecurityMockConfiguration(@Value("${userfile}") final String userFilePath) {
52         logger.debug("ctor: user file path {}", userFilePath);
53     }
54
55     @Override
56     protected void configure(AuthenticationManagerBuilder auth) throws Exception {
57         PasswordEncoder encoder = PasswordEncoderFactories.createDelegatingPasswordEncoder();
58         auth.inMemoryAuthentication() //
59             .passwordEncoder(encoder) //
60             // The admin user has the admin AND standard roles
61             .withUser(TEST_CRED_ADMIN) //
62             .password(encoder.encode(TEST_CRED_ADMIN))
63             .roles(ControlpanelConstants.ROLE_NAME_ADMIN, ControlpanelConstants.ROLE_NAME_STANDARD)//
64             .and()//
65             // The standard user has only the standard role
66             .withUser(TEST_CRED_STANDARD) //
67             .password(encoder.encode(TEST_CRED_STANDARD)) //
68             .roles(ControlpanelConstants.ROLE_NAME_STANDARD);
69     }
70
71     @Override
72     protected void configure(HttpSecurity http) throws Exception {
73         http.authorizeRequests().anyRequest().authenticated()//
74             .and().httpBasic() //
75             .and().csrf().disable();
76     }
77
78     @Override
79     public void configure(WebSecurity web) throws Exception {
80         // This disables Spring security, but not the app's filter.
81         web.ignoring().antMatchers(WebSecurityConfiguration.OPEN_PATHS);
82         web.ignoring().antMatchers("/", "/csrf"); // allow swagger-ui to load
83     }
84
85 }