package cn.elead.chaos.security.configuration;

import java.util.List;

import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.context.annotation.Bean;
import org.springframework.security.authentication.AuthenticationManager;
import org.springframework.security.config.annotation.method.configuration.EnableGlobalMethodSecurity;
import org.springframework.security.config.annotation.web.builders.HttpSecurity;
import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter;
import org.springframework.security.config.annotation.web.configurers.ExpressionUrlAuthorizationConfigurer;
import org.springframework.security.config.http.SessionCreationPolicy;
import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter;

import cn.elead.chaos.framework.properties.ChaosProperties;
import cn.elead.chaos.framework.properties.PathDefinition;
import cn.elead.chaos.security.filter.JwtAuthenticationTokenFilter;
import cn.elead.chaos.security.handle.AuthenticationEntryPointImpl;
import cn.elead.chaos.security.handle.LogoutSuccessHandlerImpl;
import cn.hutool.core.collection.CollectionUtil;
import cn.hutool.core.util.ObjectUtil;

/**
 * spring security配置
 * 
 * @author ruoyi
 */
@EnableGlobalMethodSecurity(prePostEnabled = true, securedEnabled = true)
public class SecurityAuoConfiguration extends WebSecurityConfigurerAdapter {

	@Autowired
	private ChaosProperties properties;

	/**
	 * 认证失败处理类
	 */
	@Autowired
	private AuthenticationEntryPointImpl unauthorizedHandler;

	/**
	 * 退出处理类
	 */
	@Autowired
	private LogoutSuccessHandlerImpl logoutSuccessHandler;

	/**
	 * token认证过滤器
	 */
	@Autowired
	private JwtAuthenticationTokenFilter authenticationTokenFilter;

	/**
	 * 解决 无法直接注入 AuthenticationManager
	 *
	 * @return
	 * @throws Exception
	 */
	@Bean
	@Override
	public AuthenticationManager authenticationManagerBean() throws Exception {
		return super.authenticationManagerBean();
	}


    /**
     * anyRequest          |   匹配所有请求路径
     * access              |   SpringEl表达式结果为true时可以访问
     * anonymous           |   匿名可以访问
     * denyAll             |   用户不能访问
     * fullyAuthenticated  |   用户完全认证可以访问（非remember-me下自动登录）
     * hasAnyAuthority     |   如果有参数，参数表示权限，则其中任何一个权限可以访问
     * hasAnyRole          |   如果有参数，参数表示角色，则其中任何一个角色可以访问
     * hasAuthority        |   如果有参数，参数表示权限，则其权限可以访问
     * hasIpAddress        |   如果有参数，参数表示IP地址，如果用户IP和参数匹配，则可以访问
     * hasRole             |   如果有参数，参数表示角色，则其角色可以访问
     * permitAll           |   用户可以任意访问
     * rememberMe          |   允许通过remember-me登录的用户访问
     * authenticated       |   用户登录后可访问
     */
	@Override
	protected void configure(HttpSecurity httpSecurity) throws Exception {
		ExpressionUrlAuthorizationConfigurer<HttpSecurity>.ExpressionInterceptUrlRegistry authorizeRequests = httpSecurity
				// CRSF禁用，因为不使用session
				.csrf().disable() //
				// 认证失败处理类
				.exceptionHandling().authenticationEntryPoint(unauthorizedHandler).and() //
				// 基于token，所以不需要session
				.sessionManagement().sessionCreationPolicy(SessionCreationPolicy.STATELESS).and() //
				// 过滤请求
				.authorizeRequests();
		
		// 对静态资源设置匿名访问
		authorizeRequests.antMatchers("/favicon.ico**").permitAll();
		authorizeRequests.antMatchers("/*.html").permitAll();
		authorizeRequests.antMatchers("/**/*.html").permitAll();
		authorizeRequests.antMatchers("/**/*.css").permitAll();
		authorizeRequests.antMatchers("/**/*.js").permitAll();
		authorizeRequests.antMatchers("/css/**").permitAll();
		authorizeRequests.antMatchers("/docs/**").permitAll();
		authorizeRequests.antMatchers("/fonts/**").permitAll();
		authorizeRequests.antMatchers("/img/**").permitAll();
		authorizeRequests.antMatchers("/ajax/**").permitAll();
		authorizeRequests.antMatchers("/js/**").permitAll();
		authorizeRequests.antMatchers("/web/**").permitAll();
		//swagger接口权限 开放
		authorizeRequests.antMatchers("/swagger-ui.html").permitAll();
		authorizeRequests.antMatchers("/swagger-resources/**").permitAll();
		authorizeRequests.antMatchers("/webjars/**").permitAll();
		authorizeRequests.antMatchers("/*/api-docs").permitAll();
		authorizeRequests.antMatchers("/druid/**").permitAll();
		// 其他
		authorizeRequests.antMatchers("/profile/**").permitAll();
		authorizeRequests.antMatchers("/common/download**").permitAll();
		
		// 扩展匿名访问
		if(ObjectUtil.isNotEmpty(properties) && ObjectUtil.isNotEmpty(properties.getSecurity())) {
			List<PathDefinition> antPaths = properties.getSecurity().getAnonPaths();
			if(CollectionUtil.isNotEmpty(antPaths)) {
				for (PathDefinition antPath : antPaths) {
					authorizeRequests.antMatchers(antPath.getAntPath()).permitAll();
				}
			}
		}
		
		// 除上面外的所有请求全部需要鉴权认证
		ExpressionUrlAuthorizationConfigurer<HttpSecurity>.ExpressionInterceptUrlRegistry authenticated = null;
		if(ObjectUtil.isNotEmpty(properties) && ObjectUtil.isNotEmpty(properties.getSecurity())) {
			List<PathDefinition> authPaths = properties.getSecurity().getAuthPaths();
			if(CollectionUtil.isNotEmpty(authPaths)) {
				for (PathDefinition authPath : authPaths) {
					String path = authPath.getAntPath();
					//String definition = StringUtils.defaultValue(authPath.getDefinition(), "noSessionCreation, authcToken");
					authenticated = authorizeRequests.antMatchers(path).authenticated();
				}
			}
		}else {
			authenticated = authorizeRequests.anyRequest().authenticated();
		}
		
		// iframe引用页面
		//https://blog.csdn.net/u014643282/article/details/81131092
		//https://blog.csdn.net/qq_38765404/article/details/102562496
		authenticated.and().headers().frameOptions().disable();
				
		httpSecurity.logout().logoutUrl("/logout").logoutSuccessHandler(logoutSuccessHandler);//
		// 添加JWT filter
		httpSecurity.addFilterBefore(authenticationTokenFilter, UsernamePasswordAuthenticationFilter.class);
	}
	

}
