package com.gzkemays.demo.config;

import com.gzkemays.demo.config.filter.ResourceInterceptor;
import org.springframework.context.annotation.Bean;
import org.springframework.context.annotation.Configuration;
import org.springframework.security.config.annotation.web.builders.HttpSecurity;
import org.springframework.security.oauth2.config.annotation.web.configuration.EnableResourceServer;
import org.springframework.security.oauth2.config.annotation.web.configuration.ResourceServerConfigurerAdapter;
import org.springframework.security.oauth2.config.annotation.web.configurers.ResourceServerSecurityConfigurer;
import org.springframework.security.oauth2.provider.token.RemoteTokenServices;
import org.springframework.security.web.access.intercept.FilterSecurityInterceptor;

/**
 * @author gzkemays
 * @date 2021/3/18 14:47
 */
@Configuration
@EnableResourceServer
public class ResourceServerConfig extends ResourceServerConfigurerAdapter {
  @Bean
  RemoteTokenServices tokenServices() {
    RemoteTokenServices services = new RemoteTokenServices();
    services.setCheckTokenEndpointUrl("http://localhost:5000/oauth/check_token");
    services.setClientId("gzkemays");
    services.setClientSecret("gzkemays");
    return services;
  }

  @Override
  public void configure(ResourceServerSecurityConfigurer resources) {
    resources.resourceId("res1").tokenServices(tokenServices());
  }

  @Override
  public void configure(HttpSecurity http) throws Exception {
    http.addFilterBefore(new ResourceInterceptor(), FilterSecurityInterceptor.class);
    http.authorizeRequests().antMatchers("/admin/**").hasRole("admin").anyRequest().authenticated();
  }
}
