forked from Apicurio/apicurio-registry
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathAuthConfig.java
152 lines (120 loc) · 7.16 KB
/
AuthConfig.java
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
package io.apicurio.registry.auth;
import java.util.function.Supplier;
import jakarta.inject.Inject;
import jakarta.inject.Singleton;
import jakarta.annotation.PostConstruct;
import org.eclipse.microprofile.config.inject.ConfigProperty;
import org.slf4j.Logger;
import io.apicurio.common.apps.config.Dynamic;
import io.apicurio.common.apps.config.Info;
@Singleton
public class AuthConfig {
@Inject
Logger log;
@ConfigProperty(name = "quarkus.oidc.tenant-enabled", defaultValue = "false")
boolean authenticationEnabled;
@ConfigProperty(name = "apicurio.auth.role-based-authorization", defaultValue = "false")
@Info(category = "auth", description = "Enable role based authorization", availableSince = "2.1.0.Final")
boolean roleBasedAuthorizationEnabled;
@Dynamic(label = "Artifact owner-only authorization", description = "When selected, Service Registry allows only the artifact owner (creator) to modify an artifact.", requires = "apicurio.auth.enabled=true")
@ConfigProperty(name = "apicurio.auth.owner-only-authorization", defaultValue = "false")
@Info(category = "auth", description = "Artifact owner-only authorization", availableSince = "2.0.0.Final")
Supplier<Boolean> ownerOnlyAuthorizationEnabled;
@Dynamic(label = "Artifact group owner-only authorization", description = "When selected, Service Registry allows only the artifact group owner (creator) to modify an artifact group.", requires = {
"apicurio.auth.enabled=true",
"apicurio.auth.owner-only-authorization=true"
})
@ConfigProperty(name = "apicurio.auth.owner-only-authorization.limit-group-access", defaultValue = "false")
@Info(category = "auth", description = "Artifact group owner-only authorization", availableSince = "2.1.0.Final")
Supplier<Boolean> ownerOnlyAuthorizationLimitGroupAccess;
@Dynamic(label = "Anonymous read access", description = "When selected, requests from anonymous users (requests without any credentials) are granted read-only access.", requires = "apicurio.auth.enabled=true")
@ConfigProperty(name = "apicurio.auth.anonymous-read-access.enabled", defaultValue = "false")
@Info(category = "auth", description = "Anonymous read access", availableSince = "2.1.0.Final")
Supplier<Boolean> anonymousReadAccessEnabled;
@Dynamic(label = "Authenticated read access", description = "When selected, requests from any authenticated user are granted at least read-only access.", requires = {
"apicurio.auth.enabled=true",
"apicurio.auth.role-based-authorization=true"
})
@ConfigProperty(name = "apicurio.auth.authenticated-read-access.enabled", defaultValue = "false")
@Info(category = "auth", description = "Authenticated read access", availableSince = "2.1.4.Final")
Supplier<Boolean> authenticatedReadAccessEnabled;
@ConfigProperty(name = "apicurio.auth.roles.readonly", defaultValue = "sr-readonly")
@Info(category = "auth", description = "Auth roles readonly", availableSince = "2.1.0.Final")
String readOnlyRole;
@ConfigProperty(name = "apicurio.auth.roles.developer", defaultValue = "sr-developer")
@Info(category = "auth", description = "Auth roles developer", availableSince = "2.1.0.Final")
String developerRole;
@ConfigProperty(name = "apicurio.auth.roles.admin", defaultValue = "sr-admin")
@Info(category = "auth", description = "Auth roles admin", availableSince = "2.0.0.Final")
String adminRole;
@ConfigProperty(name = "apicurio.auth.role-source", defaultValue = "token")
@Info(category = "auth", description = "Auth roles source", availableSince = "2.1.0.Final")
String roleSource;
@ConfigProperty(name = "apicurio.auth.admin-override.enabled", defaultValue = "false")
@Info(category = "auth", description = "Auth admin override enabled", availableSince = "2.1.0.Final")
boolean adminOverrideEnabled;
@ConfigProperty(name = "apicurio.auth.admin-override.from", defaultValue = "token")
@Info(category = "auth", description = "Auth admin override from", availableSince = "2.1.0.Final")
String adminOverrideFrom;
@ConfigProperty(name = "apicurio.auth.admin-override.type", defaultValue = "role")
@Info(category = "auth", description = "Auth admin override type", availableSince = "2.1.0.Final")
String adminOverrideType;
@ConfigProperty(name = "apicurio.auth.admin-override.role", defaultValue = "sr-admin")
@Info(category = "auth", description = "Auth admin override role", availableSince = "2.1.0.Final")
String adminOverrideRole;
@ConfigProperty(name = "apicurio.auth.admin-override.claim", defaultValue = "org-admin")
@Info(category = "auth", description = "Auth admin override claim", availableSince = "2.1.0.Final")
String adminOverrideClaim;
@ConfigProperty(name = "apicurio.auth.admin-override.claim-value", defaultValue = "true")
@Info(category = "auth", description = "Auth admin override claim value", availableSince = "2.1.0.Final")
String adminOverrideClaimValue;
@ConfigProperty(name = "apicurio.auth.admin-override.user", defaultValue = "admin")
@Info(category = "auth", description = "Auth admin override user name", availableSince = "3.0.0.Final")
String adminOverrideUser;
@PostConstruct
void onConstruct() {
log.debug("===============================");
log.debug("Auth Enabled: " + authenticationEnabled);
log.debug("Anonymous Read Access Enabled: " + anonymousReadAccessEnabled);
log.debug("Authenticated Read Access Enabled: " + authenticatedReadAccessEnabled);
log.debug("RBAC Enabled: " + roleBasedAuthorizationEnabled);
if (roleBasedAuthorizationEnabled) {
log.debug(" RBAC Roles: " + readOnlyRole + ", " + developerRole + ", " + adminRole);
log.debug(" Role Source: " + roleSource);
}
log.debug("OBAC Enabled: " + ownerOnlyAuthorizationEnabled);
log.debug("Admin Override Enabled: " + adminOverrideEnabled);
if (adminOverrideEnabled) {
log.debug(" Admin Override from: " + adminOverrideFrom);
log.debug(" Admin Override type: " + adminOverrideType);
log.debug(" Admin Override role: " + adminOverrideRole);
log.debug(" Admin Override claim: " + adminOverrideClaim);
log.debug(" Admin Override claim-value: " + adminOverrideClaimValue);
}
log.debug("===============================");
}
public boolean isAuthEnabled() {
return this.authenticationEnabled;
}
public boolean isRbacEnabled() {
return this.roleBasedAuthorizationEnabled;
}
public boolean isObacEnabled() {
return this.ownerOnlyAuthorizationEnabled.get();
}
public boolean isAdminOverrideEnabled() {
return this.adminOverrideEnabled;
}
public String getRoleSource() {
return this.roleSource;
}
public boolean isApplicationRbacEnabled() {
return this.roleBasedAuthorizationEnabled && "application".equals(getRoleSource());
}
public boolean isAnonymousReadsEnabled() {
return anonymousReadAccessEnabled.get();
}
public boolean isAuthenticatedReadsEnabled() {
return authenticatedReadAccessEnabled.get();
}
}