2 * ============LICENSE_START=======================================================
4 * ================================================================================
5 * Copyright (C) 2017-2018 AT&T Intellectual Property. All rights
7 * ================================================================================
8 * Licensed under the Apache License, Version 2.0 (the "License");
9 * you may not use this file except in compliance with the License.
10 * You may obtain a copy of the License at
12 * http://www.apache.org/licenses/LICENSE-2.0
14 * Unless required by applicable law or agreed to in writing, software
15 * distributed under the License is distributed on an "AS IS" BASIS,
16 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17 * See the License for the specific language governing permissions and
18 * limitations under the License.
19 * ============LICENSE_END============================================
20 * ===================================================================
24 package org.onap.clamp.clds.config;
26 import com.att.eelf.configuration.EELFLogger;
27 import com.att.eelf.configuration.EELFManager;
29 import java.io.IOException;
31 import org.onap.clamp.clds.exception.CldsConfigException;
32 import org.onap.clamp.clds.exception.CldsUsersException;
33 import org.onap.clamp.clds.service.CldsUser;
34 import org.springframework.beans.factory.annotation.Autowired;
35 import org.springframework.beans.factory.annotation.Value;
36 import org.springframework.context.annotation.Configuration;
37 import org.springframework.context.annotation.Profile;
38 import org.springframework.security.config.annotation.authentication.builders.AuthenticationManagerBuilder;
39 import org.springframework.security.config.annotation.web.builders.HttpSecurity;
40 import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;
41 import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter;
42 import org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder;
43 import org.springframework.security.crypto.password.PasswordEncoder;
46 * This class is used to enable the HTTP authentication to login. It requires a
47 * specific JSON file containing the user definition
48 * (classpath:clds/clds-users.json).
52 @Profile("clamp-default-user")
53 public class DefaultUserConfiguration extends WebSecurityConfigurerAdapter {
55 protected static final EELFLogger logger = EELFManager.getInstance().getLogger(DefaultUserConfiguration.class);
56 protected static final EELFLogger metricsLogger = EELFManager.getInstance().getMetricsLogger();
58 private ClampProperties refProp;
59 @Value("${clamp.config.security.permission.type.cl:permission-type-cl}")
60 private String cldsPersmissionTypeCl;
61 @Value("${CLDS_PERMISSION_INSTANCE:dev}")
62 private String cldsPermissionInstance;
63 @Value("${clamp.config.security.encoder:bcrypt}")
64 private String cldsEncoderMethod;
65 @Value("${clamp.config.security.encoder.bcrypt.strength:10}")
66 private Integer cldsBcryptEncoderStrength;
69 * This method configures on which URL the authorization will be enabled.
72 protected void configure(HttpSecurity http) {
74 http.csrf().disable().httpBasic().and().authorizeRequests().antMatchers("/restservices/clds/v1/user/**")
75 .authenticated().anyRequest().permitAll().and().logout().and().sessionManagement().maximumSessions(1)
76 .and().invalidSessionUrl("/designer/timeout.html");
78 } catch (Exception e) {
79 logger.error("Exception occurred during the setup of the Web users in memory", e);
80 throw new CldsUsersException("Exception occurred during the setup of the Web users in memory", e);
85 * This method is called by the framework and is used to load all the users
86 * defined in cldsUsersFile variable (this file path can be configured in the
87 * application.properties).
92 public void configureGlobal(AuthenticationManagerBuilder auth) {
93 // configure algorithm used for password hashing
94 final PasswordEncoder passwordEncoder = getPasswordEncoder();
97 CldsUser[] usersList = loadUsers();
99 if (null == usersList) {
100 logger.warn("No users defined. Users should be defined under clds-users.json");
103 for (CldsUser user : usersList) {
104 auth.inMemoryAuthentication().withUser(user.getUser()).password(user.getPassword())
105 .authorities(user.getPermissionsString()).and().passwordEncoder(passwordEncoder);
107 } catch (Exception e) {
108 logger.error("Exception occurred during the setup of the Web users in memory", e);
109 throw new CldsUsersException("Exception occurred during the setup of the Web users in memory", e);
114 * This method loads physically the JSON file and convert it to an Array of
117 * @return The array of CldsUser
118 * @throws IOException
119 * In case of the file is not found
121 private CldsUser[] loadUsers() throws IOException {
122 logger.info("Load from clds-users.properties");
123 return CldsUserJsonDecoder.decodeJson(refProp.getFileContent("files.cldsUsers"));
127 * This methods returns the chosen encoder for password hashing.
129 private PasswordEncoder getPasswordEncoder() {
130 if ("bcrypt".equals(cldsEncoderMethod)) {
131 return new BCryptPasswordEncoder(cldsBcryptEncoderStrength);
133 throw new CldsConfigException(
134 "Invalid clamp.config.security.encoder value. 'bcrypt' is the only option at this time.");