Project

General

Profile

1
package eu.dnetlib.organizations;
2

    
3
import javax.sql.DataSource;
4

    
5
import org.springframework.beans.factory.annotation.Autowired;
6
import org.springframework.context.annotation.Bean;
7
import org.springframework.context.annotation.Configuration;
8
import org.springframework.security.config.annotation.authentication.builders.AuthenticationManagerBuilder;
9
import org.springframework.security.config.annotation.web.builders.HttpSecurity;
10
import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;
11
import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter;
12
import org.springframework.security.crypto.factory.PasswordEncoderFactories;
13
import org.springframework.security.crypto.password.PasswordEncoder;
14
import org.springframework.security.web.access.AccessDeniedHandler;
15

    
16
import eu.dnetlib.organizations.utils.OpenOrgsConstants;
17

    
18
@Configuration
19
@EnableWebSecurity
20
public class WebSecurityConfig extends WebSecurityConfigurerAdapter {
21

    
22
	@Autowired
23
	private DataSource dataSource;
24

    
25
	@Autowired
26
	private AccessDeniedHandler accessDeniedHandler;
27

    
28
	@Override
29
	protected void configure(final HttpSecurity http) throws Exception {
30

    
31
		http.csrf()
32
				.disable()
33
				.authorizeRequests()
34
				.antMatchers("/", "/api/**")
35
				.hasAnyRole(OpenOrgsConstants.userRole, OpenOrgsConstants.superUserRole)
36
				.antMatchers("/resources/**", "/webjars/**", "/public_api/**")
37
				.permitAll()
38
				.anyRequest()
39
				.authenticated()
40
				.and()
41
				.formLogin()
42
				.loginPage("/login")
43
				.permitAll()
44
				.and()
45
				.logout()
46
				.permitAll()
47
				.and()
48
				.exceptionHandling()
49
				.accessDeniedHandler(accessDeniedHandler);
50
	}
51

    
52
	@Autowired
53
	public void configureGlobal(final AuthenticationManagerBuilder auth) throws Exception {
54
		auth.jdbcAuthentication()
55
				.dataSource(dataSource)
56
				.usersByUsernameQuery("select ?, '{MD5}60c4a0eb167dd41e915a885f582414df', true")  // TODO: this is a MOCK, the user should
57
																								  // be authenticated using the openaire
58
																								  // credentials
59
				.authoritiesByUsernameQuery("with const as (SELECT ? as email) select c.email, coalesce(u.role, 'UNAUTHORIZED') from const c left outer join users u on (u.email = c.email)");
60
	}
61

    
62
	@Bean
63
	public PasswordEncoder passwordEncoder() {
64
		return PasswordEncoderFactories.createDelegatingPasswordEncoder();
65
	}
66

    
67
}
(3-3/3)