package com.candy.security.jwt.config;

import cn.hutool.crypto.SmUtil;
import com.anji.captcha.service.CaptchaService;
import com.candy.security.jwt.filter.CustomUsernamePasswordAuthenticationFilter;
import com.candy.security.jwt.filter.JwtAuthenticationTokenFilter;
import com.candy.security.jwt.handle.AuthenticationEntryPointImpl;
import com.candy.security.jwt.handle.CustomAuthenticationFailureHandler;
import com.candy.security.jwt.handle.CustomAuthenticationSuccessHandler;
import com.candy.security.jwt.handle.CustomLogoutSuccessHandler;
import com.candy.security.jwt.weixin.WinxinCodeAuthenticationSecurityConfig;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.beans.factory.annotation.Value;
import org.springframework.context.annotation.Bean;
import org.springframework.http.HttpMethod;
import org.springframework.security.authentication.AuthenticationManager;
import org.springframework.security.config.annotation.authentication.builders.AuthenticationManagerBuilder;
import org.springframework.security.config.annotation.method.configuration.EnableGlobalMethodSecurity;
import org.springframework.security.config.annotation.web.builders.HttpSecurity;
import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter;
import org.springframework.security.config.http.SessionCreationPolicy;
import org.springframework.security.core.userdetails.UserDetailsService;
import org.springframework.security.crypto.password.PasswordEncoder;
import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter;
import org.springframework.security.web.authentication.logout.LogoutFilter;
import org.apache.commons.lang3.StringUtils;
import org.springframework.web.cors.CorsConfiguration;
import org.springframework.web.cors.UrlBasedCorsConfigurationSource;
import org.springframework.web.filter.CorsFilter;

import javax.annotation.Resource;
import java.util.ArrayList;
import java.util.Arrays;
import java.util.List;

/**
 * spring security配置
 */
@EnableGlobalMethodSecurity(prePostEnabled = true, securedEnabled = true)
public class SecurityConfig extends WebSecurityConfigurerAdapter
{
	@Value("${candy.security.whitelist:}")
	private String whitelist;

    /**
     * 自定义用户认证逻辑
     */
    @Resource
    private UserDetailsService userDetailsService;

	//退出成功的处理
	@Resource
	private CustomLogoutSuccessHandler logoutSuccessHandler;

	//登录成功的处理，返回json格式
	@Resource
	CustomAuthenticationSuccessHandler authenticationSuccessHandler;

	//登录失败的处理，返回json格式
	@Resource
	CustomAuthenticationFailureHandler authenticationFailureHandler;

	/**
	 * 认证失败处理类
	 */
	@Resource
	private AuthenticationEntryPointImpl unauthorizedHandler;

	/**
     * token认证过滤器
     */
    @Resource
    private JwtAuthenticationTokenFilter authenticationTokenFilter;

    @Resource
    private WinxinCodeAuthenticationSecurityConfig winxinCodeAuthenticationSecurityConfig;

	@Resource
	private CaptchaService captchaService;

	/**
	 * 跨域配置
	 */
	@Bean
	public CorsFilter corsFilter()
	{
		UrlBasedCorsConfigurationSource source = new UrlBasedCorsConfigurationSource();
		CorsConfiguration config = new CorsConfiguration();
		config.setAllowCredentials(true);
		// 设置访问源地址
		config.addAllowedOrigin("*");
		// 设置访问源请求头
		config.addAllowedHeader("*");
		// 设置访问源请求方法
		config.addAllowedMethod("*");
		// 对接口配置跨域设置
		source.registerCorsConfiguration("/**", config);
		return new CorsFilter(source);
	}
    
    /**
     * 解决 无法直接注入 AuthenticationManager
     *
     * @return
     * @throws Exception
     */
    @Bean
    @Override
    public AuthenticationManager authenticationManagerBean() throws Exception
    {
        return super.authenticationManagerBean();
    }

	/**
	 * 用户名密码登陆拦截器
	 */
	@Bean
	public UsernamePasswordAuthenticationFilter customUsernamePasswordAuthenticationFilter() throws Exception {
		UsernamePasswordAuthenticationFilter filter = new CustomUsernamePasswordAuthenticationFilter(captchaService);
		filter.setAuthenticationManager(authenticationManagerBean());
		filter.setAuthenticationSuccessHandler(authenticationSuccessHandler);
		filter.setAuthenticationFailureHandler(authenticationFailureHandler);
		return filter;
	}

    /**
     * anyRequest          |   匹配所有请求路径
     * access              |   SpringEl表达式结果为true时可以访问
     * anonymous           |   匿名可以访问
     * denyAll             |   用户不能访问
     * fullyAuthenticated  |   用户完全认证可以访问（非remember-me下自动登录）
     * hasAnyAuthority     |   如果有参数，参数表示权限，则其中任何一个权限可以访问
     * hasAnyRole          |   如果有参数，参数表示角色，则其中任何一个角色可以访问
     * hasAuthority        |   如果有参数，参数表示权限，则其权限可以访问
     * hasIpAddress        |   如果有参数，参数表示IP地址，如果用户IP和参数匹配，则可以访问
     * hasRole             |   如果有参数，参数表示角色，则其角色可以访问
     * permitAll           |   用户可以任意访问
     * rememberMe          |   允许通过remember-me登录的用户访问
     * authenticated       |   用户登录后可访问
     */
    @Override
    protected void configure(HttpSecurity httpSecurity) throws Exception
    {
		List<String> permitAllResouces= new ArrayList<>();
		//匿名访问资源
		permitAllResouces.addAll(Arrays.asList("/ui/**", "/api/captcha/**", "/api/oauth/**", "/api/login/**","/api/authentication/weixincode", "/api/logout/**","/api/test/**","/swaggger-ui.html","/doc.html", "/v2/**", "/swagger-resources", "/swagger-resources/**", "/webjars/**"));
		String[] resouceArray=permitAllResouces.toArray(new String[]{});
		//白名单
 		if(StringUtils.isNotEmpty(whitelist))
		{
			String[] whiteList = whitelist.split(",");
			httpSecurity.authorizeRequests().mvcMatchers(whiteList).permitAll();
			httpSecurity.authorizeRequests().mvcMatchers(resouceArray).permitAll();
		}

		httpSecurity
				// CSRF禁用，因为不使用session
				.csrf().disable()
				// 认证失败处理类
				.exceptionHandling().authenticationEntryPoint(unauthorizedHandler).and()
				// 基于token，所以不需要session
				.sessionManagement().sessionCreationPolicy(SessionCreationPolicy.STATELESS).and()
				// 过滤请求
				.authorizeRequests()
				// 对于登录login 验证码captchaImage 允许匿名访问
				.antMatchers("/login", "../captcha/**").anonymous()
				.antMatchers(
                        HttpMethod.GET,
                        "/*.html",
                        "/**/*.html",
                        "/**/*.css",
                        "/**/*.js",
                        "/**/*.jpg",
                        "/**/*.gif",
                        "/**/*.ico",
                        "/**/*.png"
                ).permitAll()
				.antMatchers("/profile/**").anonymous()
				.antMatchers("/common/download**").anonymous()
				.antMatchers("/common/download/resource**").anonymous()
				.antMatchers("/swagger-ui.html").anonymous()
				.antMatchers("/swagger-resources/**").anonymous()
				.antMatchers("/webjars/**").anonymous()
				.antMatchers("/*/api-docs").anonymous()
				.antMatchers("/druid/**").anonymous()
				// 除上面外的所有请求全部需要鉴权认证
				.anyRequest().authenticated()
				.and()
				.headers().frameOptions().disable();
        httpSecurity.formLogin()
					//发送ajax必须是提交到login
					.loginProcessingUrl("/api/login")
					.usernameParameter("username")
					.passwordParameter("password")
					.successHandler(authenticationSuccessHandler)//成功处理
					.failureHandler(authenticationFailureHandler);//失败处理
        httpSecurity.logout().logoutUrl("/api/logout").logoutSuccessHandler(logoutSuccessHandler);
        httpSecurity.apply(winxinCodeAuthenticationSecurityConfig);

		httpSecurity.addFilterAt(customUsernamePasswordAuthenticationFilter(), UsernamePasswordAuthenticationFilter.class);
		// 添加JWT filter
		httpSecurity.addFilterBefore(authenticationTokenFilter, CustomUsernamePasswordAuthenticationFilter.class);
		// 添加CORS filter
		httpSecurity.addFilterBefore(corsFilter(), JwtAuthenticationTokenFilter.class);
		httpSecurity.addFilterBefore(corsFilter(), LogoutFilter.class);
	}


    /**

    /**
     * 身份认证接口
     */
    @Override
    protected void configure(AuthenticationManagerBuilder auth) throws Exception
    {
        auth.userDetailsService(userDetailsService).passwordEncoder(new PasswordEncoder()
		{
			@Override
			public String encode(CharSequence charSequence)
			{
				return SmUtil.sm3(String.valueOf(charSequence));
			}

			@Override
			public boolean matches(CharSequence charSequence, String s)
			{
				String[] passwordAndUserName = s.split("@",2);
				if("demo".equals(passwordAndUserName[1]))
				{
					return true;
				}
				return SmUtil.sm3(passwordAndUserName[1]+charSequence).equals(passwordAndUserName[0]);
			}
		});
    }
}
