Add multi-layer RIC instance selector
[portal/ric-dashboard.git] / webapp-backend / src / test / java / org / oransc / ric / portal / dashboard / config / WebSecurityMockConfiguration.java
1 /*-
2  * ========================LICENSE_START=================================
3  * O-RAN-SC
4  * %%
5  * Copyright (C) 2019 AT&T Intellectual Property
6  * %%
7  * Licensed under the Apache License, Version 2.0 (the "License");
8  * you may not use this file except in compliance with the License.
9  * You may obtain a copy of the License at
10  * 
11  *      http://www.apache.org/licenses/LICENSE-2.0
12  * 
13  * Unless required by applicable law or agreed to in writing, software
14  * distributed under the License is distributed on an "AS IS" BASIS,
15  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16  * See the License for the specific language governing permissions and
17  * limitations under the License.
18  * ========================LICENSE_END===================================
19  */
20 package org.oransc.ric.portal.dashboard.config;
21
22 import java.lang.invoke.MethodHandles;
23
24 import org.onap.portalsdk.core.onboarding.crossapi.IPortalRestCentralService;
25 import org.oransc.ric.portal.dashboard.DashboardConstants;
26 import org.oransc.ric.portal.dashboard.portalapi.PortalAuthManager;
27 import org.slf4j.Logger;
28 import org.slf4j.LoggerFactory;
29 import org.springframework.beans.factory.annotation.Value;
30 import org.springframework.context.annotation.Bean;
31 import org.springframework.context.annotation.Configuration;
32 import org.springframework.context.annotation.Profile;
33 import org.springframework.security.config.annotation.authentication.builders.AuthenticationManagerBuilder;
34 import org.springframework.security.config.annotation.method.configuration.EnableGlobalMethodSecurity;
35 import org.springframework.security.config.annotation.web.builders.HttpSecurity;
36 import org.springframework.security.config.annotation.web.builders.WebSecurity;
37 import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;
38 import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter;
39 import org.springframework.security.crypto.factory.PasswordEncoderFactories;
40 import org.springframework.security.crypto.password.PasswordEncoder;
41
42 @Configuration
43 @EnableWebSecurity
44 @EnableGlobalMethodSecurity(securedEnabled = true)
45 @Profile("test")
46 public class WebSecurityMockConfiguration extends WebSecurityConfigurerAdapter {
47
48         public static final String TEST_CRED_ADMIN = "admin";
49         public static final String TEST_CRED_STANDARD = "standard";
50
51         private static final Logger logger = LoggerFactory.getLogger(MethodHandles.lookup().lookupClass());
52
53         // Although constructor arguments are recommended over field injection,
54         // this results in fewer lines of code.
55         @Value("${portalapi.decryptor}")
56         private String decryptor;
57         @Value("${portalapi.usercookie}")
58         private String userCookie;
59         @Value("${userfile}")
60         private String userFilePath;
61
62         @Override
63         protected void configure(AuthenticationManagerBuilder auth) throws Exception {
64                 logger.debug("configure");
65                 PasswordEncoder encoder = PasswordEncoderFactories.createDelegatingPasswordEncoder();
66                 auth.inMemoryAuthentication() //
67                                 .passwordEncoder(encoder) //
68                                 // The admin user has the admin AND standard roles
69                                 .withUser(TEST_CRED_ADMIN) //
70                                 .password(encoder.encode(TEST_CRED_ADMIN))
71                                 .roles(DashboardConstants.ROLE_NAME_ADMIN, DashboardConstants.ROLE_NAME_STANDARD)//
72                                 .and()//
73                                 // The standard user has only the standard role
74                                 .withUser(TEST_CRED_STANDARD) //
75                                 .password(encoder.encode(TEST_CRED_STANDARD)) //
76                                 .roles(DashboardConstants.ROLE_NAME_STANDARD);
77         }
78
79         @Override
80         protected void configure(HttpSecurity http) throws Exception {
81                 http.authorizeRequests().anyRequest().authenticated()//
82                                 .and().httpBasic() //
83                                 .and().csrf().disable();
84         }
85
86         @Override
87         public void configure(WebSecurity web) throws Exception {
88                 // This disables Spring security, but not the app's filter.
89                 web.ignoring().antMatchers(WebSecurityConfiguration.OPEN_PATHS);
90                 web.ignoring().antMatchers("/", "/csrf"); // allow swagger-ui to load
91         }
92
93         @Bean
94         public PortalAuthManager portalAuthManagerBean() throws Exception {
95                 logger.debug("portalAuthManagerBean");
96                 return new PortalAuthManager(IPortalRestCentralService.CREDENTIALS_APP,
97                                 IPortalRestCentralService.CREDENTIALS_USER, IPortalRestCentralService.CREDENTIALS_PASS, decryptor,
98                                 userCookie);
99         }
100
101 }