package com.baor.config;

import com.baor.filter.JwtAuthenticationFilter;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.context.annotation.Bean;
import org.springframework.context.annotation.Configuration;
import org.springframework.security.authentication.AuthenticationManager;
import org.springframework.security.config.annotation.web.builders.HttpSecurity;
import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter;
import org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder;
import org.springframework.security.crypto.password.PasswordEncoder;
import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter;

@Configuration
public class SecurityConfig extends WebSecurityConfigurerAdapter {

    @Autowired
    private JwtAuthenticationFilter filter;

    @Bean
    @Override
    public AuthenticationManager authenticationManagerBean() throws Exception {
        return super.authenticationManagerBean();
    }

    @Bean
    public PasswordEncoder passwordEncoder() {
        return new BCryptPasswordEncoder();
    }

    @Override
    protected void configure(HttpSecurity http) throws Exception {
        http.csrf().disable()
                .authorizeRequests()
                .antMatchers("/api").permitAll()
                .antMatchers("/user/login").permitAll() // allow anonymous access to login page
                .antMatchers("/user/*","/menu/*","/adjust/*").hasAnyRole("1","2")
                .antMatchers("/approval/*").hasAnyRole("1","2")
                .antMatchers("/change/*").hasAnyRole("1","2")
                .antMatchers("/clazz/*").hasAnyRole("1","2")
                .antMatchers("/Leave/*").hasAnyRole("1","2")
                .antMatchers("/role/*").hasAnyRole("1","2")
                .antMatchers("/schedule/*").hasAnyRole("1","2")
                .antMatchers("/student/*").hasAnyRole("1","2")
                .antMatchers("/subject/*").hasAnyRole("1","2")
                .antMatchers("/teacher/*").hasAnyRole("1","2")
                .antMatchers("/LeaveType/*").hasAnyRole("1","2")
                .antMatchers("/file/*").permitAll()
                .anyRequest().authenticated();
        http.addFilterBefore(filter, UsernamePasswordAuthenticationFilter.class);
    }

}
