#include <boost/asio.hpp>
#include <boost/asio/ssl.hpp>
#include <boost/beast.hpp>
#include <iostream>
#include <string>
#include <codecvt>
#include <nlohmann/json.hpp>
#include "commonFunction.h"

namespace beast = boost::beast;
namespace asio = boost::asio;
namespace ssl = boost::asio::ssl;
using tcp = boost::asio::ip::tcp;



class HTTPSClient {
public:
	HTTPSClient(asio::io_context& io_context);

	std::string base64_encode(const std::string& input);

	void request( const std::string& host, const std::string& target,
		const std::string& username, const std::string& password, bool post);


private:
	ssl::context ctx_{ ssl::context::tlsv12_client };
	tcp::resolver resolver_;
	ssl::stream<tcp::socket> stream_;
};

//#include "root_certificates.hpp"
//
//#include <boost/beast/core.hpp>
//#include <boost/beast/http.hpp>
//#include <boost/beast/version.hpp>
//#include <boost/asio/ssl.hpp>
//#include <boost/asio/strand.hpp>
//#include <cstdlib>
//#include <iostream>
//#include <memory>
//
//namespace beast = boost::beast;         // from <boost/beast.hpp>
//namespace http = beast::http;           // from <boost/beast/http.hpp>
//namespace net = boost::asio;            // from <boost/asio.hpp>
//namespace ssl = boost::asio::ssl;       // from <boost/asio/ssl.hpp>
//using tcp = boost::asio::ip::tcp;       // from <boost/asio/ip/tcp.hpp>
//
////------------------------------------------------------------------------------
//
//// Report a failure
//void
//fail(beast::error_code ec, char const* what)
//{
//	std::cerr << what << ": " << ec.message() << "\n";
//}
//
//// Performs an HTTP GET and prints the response
//class session : public std::enable_shared_from_this<session>
//{
//	tcp::resolver resolver_;
//	ssl::stream<beast::tcp_stream> stream_;
//	beast::flat_buffer buffer_; // (Must persist between reads)
//	http::request<http::empty_body> req_;
//	http::response<http::string_body> res_;
//
//public:
//	explicit
//		session(
//			net::any_io_executor ex,
//			ssl::context& ctx)
//		: resolver_(ex)
//		, stream_(ex, ctx)
//	{
//	}
//
//	// Start the asynchronous operation
//	void
//		run(
//			char const* host,
//			char const* port,
//			char const* target,
//			int version)
//	{
//		// Set SNI Hostname (many hosts need this to handshake successfully)
//		if (!SSL_set_tlsext_host_name(stream_.native_handle(), host))
//		{
//			beast::error_code ec{ static_cast<int>(::ERR_get_error()), net::error::get_ssl_category() };
//			std::cerr << ec.message() << "\n";
//			return;
//		}
//
//		// Set up an HTTP GET request message
//		req_.version(version);
//		req_.method(http::verb::get);
//		req_.target(target);
//		req_.set(http::field::host, host);
//		req_.set(http::field::user_agent, BOOST_BEAST_VERSION_STRING);
//
//		// Look up the domain name
//		resolver_.async_resolve(
//			host,
//			port,
//			beast::bind_front_handler(
//				&session::on_resolve,
//				shared_from_this()));
//	}
//
//	void
//		on_resolve(
//			beast::error_code ec,
//			tcp::resolver::results_type results)
//	{
//		if (ec)
//			return fail(ec, "resolve");
//
//		// Set a timeout on the operation
//		beast::get_lowest_layer(stream_).expires_after(std::chrono::seconds(30));
//
//		// Make the connection on the IP address we get from a lookup
//		beast::get_lowest_layer(stream_).async_connect(
//			results,
//			beast::bind_front_handler(
//				&session::on_connect,
//				shared_from_this()));
//	}
//
//	void
//		on_connect(beast::error_code ec, tcp::resolver::results_type::endpoint_type)
//	{
//		if (ec)
//			return fail(ec, "connect");
//
//		// Perform the SSL handshake
//		stream_.async_handshake(
//			ssl::stream_base::client,
//			beast::bind_front_handler(
//				&session::on_handshake,
//				shared_from_this()));
//	}
//
//	void
//		on_handshake(beast::error_code ec)
//	{
//		if (ec)
//			return fail(ec, "handshake");
//
//		// Set a timeout on the operation
//		beast::get_lowest_layer(stream_).expires_after(std::chrono::seconds(30));
//
//		// Send the HTTP request to the remote host
//		http::async_write(stream_, req_,
//			beast::bind_front_handler(
//				&session::on_write,
//				shared_from_this()));
//	}
//
//	void
//		on_write(
//			beast::error_code ec,
//			std::size_t bytes_transferred)
//	{
//		boost::ignore_unused(bytes_transferred);
//
//		if (ec)
//			return fail(ec, "write");
//
//		// Receive the HTTP response
//		http::async_read(stream_, buffer_, res_,
//			beast::bind_front_handler(
//				&session::on_read,
//				shared_from_this()));
//	}
//
//	void
//		on_read(
//			beast::error_code ec,
//			std::size_t bytes_transferred)
//	{
//		boost::ignore_unused(bytes_transferred);
//
//		if (ec)
//			return fail(ec, "read");
//
//		// Write the message to standard out
//		std::cout << res_ << std::endl;
//
//		// Set a timeout on the operation
//		beast::get_lowest_layer(stream_).expires_after(std::chrono::seconds(30));
//
//		// Gracefully close the stream
//		stream_.async_shutdown(
//			beast::bind_front_handler(
//				&session::on_shutdown,
//				shared_from_this()));
//	}
//
//	void
//		on_shutdown(beast::error_code ec)
//	{
//		// ssl::error::stream_truncated, also known as an SSL "short read",
//		// indicates the peer closed the connection without performing the
//		// required closing handshake (for example, Google does this to
//		// improve performance). Generally this can be a security issue,
//		// but if your communication protocol is self-terminated (as
//		// it is with both HTTP and WebSocket) then you may simply
//		// ignore the lack of close_notify.
//		//
//		// https://github.com/boostorg/beast/issues/38
//		//
//		// https://security.stackexchange.com/questions/91435/how-to-handle-a-malicious-ssl-tls-shutdown
//		//
//		// When a short read would cut off the end of an HTTP message,
//		// Beast returns the error beast::http::error::partial_message.
//		// Therefore, if we see a short read here, it has occurred
//		// after the message has been completed, so it is safe to ignore it.
//
//		if (ec != net::ssl::error::stream_truncated)
//			return fail(ec, "shutdown");
//	}
//};

//------------------------------------------------------------------------------

//int main(int argc, char** argv)
//{
//	// Check command line arguments.
//	if (argc != 4 && argc != 5)
//	{
//		std::cerr <<
//			"Usage: http-client-async-ssl <host> <port> <target> [<HTTP version: 1.0 or 1.1(default)>]\n" <<
//			"Example:\n" <<
//			"    http-client-async-ssl www.example.com 443 /\n" <<
//			"    http-client-async-ssl www.example.com 443 / 1.0\n";
//		return EXIT_FAILURE;
//	}
//	auto const host = argv[1];
//	auto const port = argv[2];
//	auto const target = argv[3];
//	int version = argc == 5 && !std::strcmp("1.0", argv[4]) ? 10 : 11;
//
//	// The io_context is required for all I/O
//	net::io_context ioc;
//
//	// The SSL context is required, and holds certificates
//	ssl::context ctx{ ssl::context::tlsv12_client };
//
//	// This holds the root certificate used for verification
//	load_root_certificates(ctx);
//
//	// Verify the remote server's certificate
//	ctx.set_verify_mode(ssl::verify_peer);
//
//	// Launch the asynchronous operation
//	// The session is constructed with a strand to
//	// ensure that handlers do not execute concurrently.
//	std::make_shared<session>(
//		net::make_strand(ioc),
//		ctx
//		)->run(host, port, target, version);
//
//	// Run the I/O service. The call will return when
//	// the get operation is complete.
//	ioc.run();
//
//	return EXIT_SUCCESS;
//}