Improve doc for Portal API configuration
[portal/ric-dashboard.git] / webapp-backend / src / test / java / org / oransc / ric / portal / dashboard / config / WebSecurityMockConfiguration.java
1 /*-
2  * ========================LICENSE_START=================================
3  * O-RAN-SC
4  * %%
5  * Copyright (C) 2019 AT&T Intellectual Property and Nokia
6  * %%
7  * Licensed under the Apache License, Version 2.0 (the "License");
8  * you may not use this file except in compliance with the License.
9  * You may obtain a copy of the License at
10  * 
11  *      http://www.apache.org/licenses/LICENSE-2.0
12  * 
13  * Unless required by applicable law or agreed to in writing, software
14  * distributed under the License is distributed on an "AS IS" BASIS,
15  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16  * See the License for the specific language governing permissions and
17  * limitations under the License.
18  * ========================LICENSE_END===================================
19  */
20 package org.oransc.ric.portal.dashboard.config;
21
22 import java.io.File;
23 import java.io.IOException;
24 import java.lang.invoke.MethodHandles;
25 import java.util.HashSet;
26 import java.util.Set;
27
28 import org.onap.portalsdk.core.onboarding.exception.PortalAPIException;
29 import org.onap.portalsdk.core.restful.domain.EcompRole;
30 import org.onap.portalsdk.core.restful.domain.EcompUser;
31 import org.oransc.ric.portal.dashboard.DashboardConstants;
32 import org.oransc.ric.portal.dashboard.LoginServlet;
33 import org.oransc.ric.portal.dashboard.portalapi.DashboardUserManager;
34 import org.slf4j.Logger;
35 import org.slf4j.LoggerFactory;
36 import org.springframework.beans.factory.annotation.Value;
37 import org.springframework.boot.web.servlet.ServletRegistrationBean;
38 import org.springframework.context.annotation.Bean;
39 import org.springframework.context.annotation.Configuration;
40 import org.springframework.context.annotation.Profile;
41 import org.springframework.security.config.annotation.authentication.builders.AuthenticationManagerBuilder;
42 import org.springframework.security.config.annotation.method.configuration.EnableGlobalMethodSecurity;
43 import org.springframework.security.config.annotation.web.builders.HttpSecurity;
44 import org.springframework.security.config.annotation.web.builders.WebSecurity;
45 import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;
46 import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter;
47 import org.springframework.security.crypto.factory.PasswordEncoderFactories;
48 import org.springframework.security.crypto.password.PasswordEncoder;
49
50 @Configuration
51 @EnableWebSecurity
52 @EnableGlobalMethodSecurity(securedEnabled = true)
53 @Profile("test")
54 public class WebSecurityMockConfiguration extends WebSecurityConfigurerAdapter {
55
56         public static final String TEST_CRED_ADMIN = "admin";
57         public static final String TEST_CRED_STANDARD = "standard";
58
59         private static final Logger logger = LoggerFactory.getLogger(MethodHandles.lookup().lookupClass());
60
61         public WebSecurityMockConfiguration(@Value("${userfile}") final String userFilePath) {
62                 logger.debug("ctor: user file path {}", userFilePath);
63         }
64
65         @Override
66         protected void configure(AuthenticationManagerBuilder auth) throws Exception {
67                 PasswordEncoder encoder = PasswordEncoderFactories.createDelegatingPasswordEncoder();
68                 auth.inMemoryAuthentication() //
69                                 .passwordEncoder(encoder) //
70                                 // The admin user has the admin AND standard roles
71                                 .withUser(TEST_CRED_ADMIN) //
72                                 .password(encoder.encode(TEST_CRED_ADMIN))
73                                 .roles(DashboardConstants.ROLE_NAME_ADMIN, DashboardConstants.ROLE_NAME_STANDARD)//
74                                 .and()//
75                                 // The standard user has only the standard role
76                                 .withUser(TEST_CRED_STANDARD) //
77                                 .password(encoder.encode(TEST_CRED_STANDARD)) //
78                                 .roles(DashboardConstants.ROLE_NAME_STANDARD);
79         }
80
81         @Override
82         protected void configure(HttpSecurity http) throws Exception {
83                 http.authorizeRequests().anyRequest().authenticated()//
84                                 .and().httpBasic() //
85                                 .and().csrf().disable();
86         }
87
88         @Override
89         public void configure(WebSecurity web) throws Exception {
90                 // This disables Spring security, but not the app's filter.
91                 web.ignoring().antMatchers(WebSecurityConfiguration.OPEN_PATHS);
92                 web.ignoring().antMatchers("/", "/csrf"); // allow swagger-ui to load
93         }
94
95         @Bean
96         public ServletRegistrationBean<LoginServlet> loginServlet() {
97                 LoginServlet servlet = new LoginServlet();
98                 final ServletRegistrationBean<LoginServlet> servletBean = new ServletRegistrationBean<>(servlet,
99                                 DashboardConstants.LOGIN_PAGE);
100                 servletBean.setName("LoginServlet");
101                 return servletBean;
102         }
103
104         // This implementation is so light it can be used during tests.
105         @Bean
106         public DashboardUserManager dashboardUserManager() throws IOException, PortalAPIException {
107                 File f = new File("/tmp/users.json");
108                 if (f.exists())
109                         f.delete();
110                 DashboardUserManager um = new DashboardUserManager(f.getAbsolutePath());
111                 // Mock user for convenience in testing
112                 EcompUser demo = new EcompUser();
113                 demo.setLoginId("demo");
114                 demo.setFirstName("Demo");
115                 demo.setLastName("User");
116                 demo.setActive(true);
117                 EcompRole role = new EcompRole();
118                 role.setName("view");
119                 Set<EcompRole> roles = new HashSet<>();
120                 roles.add(role);
121                 demo.setRoles(roles);
122                 um.createUser(demo);
123                 return um;
124         }
125
126 }