package com.example.pma.security;

import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.context.annotation.Bean;
import org.springframework.context.annotation.Configuration;
import org.springframework.security.config.annotation.authentication.builders.AuthenticationManagerBuilder;
import org.springframework.security.config.annotation.web.builders.HttpSecurity;
import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;
import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter;
import org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder;
import org.springframework.security.crypto.password.NoOpPasswordEncoder;
import org.springframework.security.crypto.password.PasswordEncoder;

import javax.sql.DataSource;

@Configuration
@EnableWebSecurity
public class SecurityConfiguration extends WebSecurityConfigurerAdapter {

    @Autowired
    DataSource dataSource;

    @Autowired
    BCryptPasswordEncoder bCryptPasswordEncoder;

    @Override
    protected void configure(AuthenticationManagerBuilder auth) throws Exception {
        auth.jdbcAuthentication()
                .dataSource(dataSource)
                .usersByUsernameQuery("SELECT username,password,enabled " + "FROM user_accounts WHERE username = ?")
                .authoritiesByUsernameQuery("SELECT username,role " + "FROM user_accounts WHERE username = ?")
                .passwordEncoder( new BCryptPasswordEncoder());
//                .withDefaultSchema()
//                .withUser("myuser")
//                .password("pass")
//                .roles("USER")
//                .and()
//                .withUser("hings")
//                .password("123")
//                .roles("USER")
//                .and()
//                .withUser("managerUser")
//                .password("123")
//                .roles("ADMIN");
    }

//    @Bean
//    public PasswordEncoder getPasswordEncoder(){
//        return NoOpPasswordEncoder.getInstance();
//    }

    @Override
    protected void configure(HttpSecurity http) throws Exception {
        http.authorizeRequests()
                .antMatchers("/positions/new").hasRole("ADMIN")
                .antMatchers("/positions/save").hasRole("ADMIN")
                .antMatchers("/companies/new").hasRole("ADMIN")
                .antMatchers("/companies/save").hasRole("ADMIN")
                .antMatchers("/","/**").permitAll()
                .and()
//                .formLogin().loginPage("/login-page");
                 .formLogin();


    }
}
