2 * ========================LICENSE_START=================================
5 * Copyright (C) 2019 AT&T Intellectual Property
7 * Licensed under the Apache License, Version 2.0 (the "License");
8 * you may not use this file except in compliance with the License.
9 * You may obtain a copy of the License at
11 * http://www.apache.org/licenses/LICENSE-2.0
13 * Unless required by applicable law or agreed to in writing, software
14 * distributed under the License is distributed on an "AS IS" BASIS,
15 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 * See the License for the specific language governing permissions and
17 * limitations under the License.
18 * ========================LICENSE_END===================================
20 package org.oransc.ric.portal.dashboard.config;
22 import java.io.IOException;
23 import java.lang.invoke.MethodHandles;
24 import java.util.HashSet;
27 import org.onap.portalsdk.core.onboarding.exception.PortalAPIException;
28 import org.onap.portalsdk.core.restful.domain.EcompRole;
29 import org.onap.portalsdk.core.restful.domain.EcompUser;
30 import org.oransc.ric.portal.dashboard.DashboardConstants;
31 import org.oransc.ric.portal.dashboard.portalapi.DashboardUserManager;
32 import org.slf4j.Logger;
33 import org.slf4j.LoggerFactory;
34 import org.springframework.beans.factory.annotation.Value;
35 import org.springframework.context.annotation.Bean;
36 import org.springframework.context.annotation.Configuration;
37 import org.springframework.context.annotation.Profile;
38 import org.springframework.security.config.annotation.authentication.builders.AuthenticationManagerBuilder;
39 import org.springframework.security.config.annotation.method.configuration.EnableGlobalMethodSecurity;
40 import org.springframework.security.config.annotation.web.builders.HttpSecurity;
41 import org.springframework.security.config.annotation.web.builders.WebSecurity;
42 import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;
43 import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter;
44 import org.springframework.security.crypto.factory.PasswordEncoderFactories;
45 import org.springframework.security.crypto.password.PasswordEncoder;
49 @EnableGlobalMethodSecurity(securedEnabled = true)
51 public class WebSecurityMockConfiguration extends WebSecurityConfigurerAdapter {
53 public static final String TEST_CRED_ADMIN = "admin";
54 public static final String TEST_CRED_STANDARD = "standard";
56 private static final Logger logger = LoggerFactory.getLogger(MethodHandles.lookup().lookupClass());
58 public WebSecurityMockConfiguration(@Value("${userfile}") final String userFilePath) {
59 logger.debug("ctor: user file path {}", userFilePath);
63 protected void configure(AuthenticationManagerBuilder auth) throws Exception {
64 PasswordEncoder encoder = PasswordEncoderFactories.createDelegatingPasswordEncoder();
65 auth.inMemoryAuthentication() //
66 .passwordEncoder(encoder) //
67 // The admin user has the admin AND standard roles
68 .withUser(TEST_CRED_ADMIN) //
69 .password(encoder.encode(TEST_CRED_ADMIN))
70 .roles(DashboardConstants.ROLE_NAME_ADMIN, DashboardConstants.ROLE_NAME_STANDARD)//
72 // The standard user has only the standard role
73 .withUser(TEST_CRED_STANDARD) //
74 .password(encoder.encode(TEST_CRED_STANDARD)) //
75 .roles(DashboardConstants.ROLE_NAME_STANDARD);
79 protected void configure(HttpSecurity http) throws Exception {
80 http.authorizeRequests().anyRequest().authenticated()//
82 .and().csrf().disable();
86 public void configure(WebSecurity web) throws Exception {
87 // This disables Spring security, but not the app's filter.
88 web.ignoring().antMatchers(WebSecurityConfiguration.OPEN_PATHS);
89 web.ignoring().antMatchers("/", "/csrf"); // allow swagger-ui to load
92 // This implementation is so light it can be used during tests.
94 public DashboardUserManager dashboardUserManager() throws IOException, PortalAPIException {
95 DashboardUserManager dum = new DashboardUserManager(true);
96 // Mock user for convenience in testing
97 EcompUser demo = new EcompUser();
98 demo.setLoginId("demo");
99 demo.setFirstName("Demo");
100 demo.setLastName("User");
101 demo.setActive(true);
102 EcompRole role = new EcompRole();
103 role.setName("view");
104 Set<EcompRole> roles = new HashSet<>();
106 demo.setRoles(roles);
107 dum.createUser(demo);