package com.sojson.util.security.springsecurity;

import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.context.annotation.Bean;
import org.springframework.http.HttpMethod;
import org.springframework.security.authentication.AuthenticationManager;
import org.springframework.security.config.annotation.method.configuration.EnableGlobalMethodSecurity;
import org.springframework.security.config.annotation.web.builders.HttpSecurity;
import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter;
import org.springframework.security.config.annotation.web.configurers.ExpressionUrlAuthorizationConfigurer;
import org.springframework.security.config.http.SessionCreationPolicy;
import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter;

import com.sojson.util.RoleUtil;
import com.sojson.util.security.springsecurity.service.impl.AuthenticationErrService;
import com.sojson.util.token.interfaces.TokenFilterInterface;

/**
 * SpringSecurity配置
 *
 * @author liu
 * @date 2021-12-01
 */
@EnableGlobalMethodSecurity(prePostEnabled = true, securedEnabled = true)
public class SecurityConfig extends WebSecurityConfigurerAdapter {

    /** 认证失败处理类(同ShiroRealm抛出异常后的catch块) */
    @Autowired
    private AuthenticationErrService authenticationErrService;
    /** Token过滤器 */
    @Autowired
    private TokenFilterInterface tokenFilter;

    /**
     * 解决 无法直接注入 AuthenticationManager
     *
     * @return
     * @throws Exception
     */
    @Bean
    @Override
    public AuthenticationManager authenticationManagerBean() throws Exception {
        return super.authenticationManagerBean();
    }

    /**
     * anyRequest          |   匹配所有请求路径
     * access              |   SpringEl表达式结果为true时可以访问
     * anonymous           |   匿名可以访问
     * denyAll             |   用户不能访问
     * fullyAuthenticated  |   用户完全认证可以访问（非remember-me下自动登录）
     * hasAnyAuthority     |   如果有参数，参数表示权限，则其中任何一个权限可以访问
     * hasAnyRole          |   如果有参数，参数表示角色，则其中任何一个角色可以访问
     * hasAuthority        |   如果有参数，参数表示权限，则其权限可以访问
     * hasIpAddress        |   如果有参数，参数表示IP地址，如果用户IP和参数匹配，则可以访问
     * hasRole             |   如果有参数，参数表示角色，则其角色可以访问
     * permitAll           |   用户可以任意访问
     * rememberMe          |   允许通过remember-me登录的用户访问
     * authenticated       |   用户登录后可访问
     */
    @Override
    protected void configure(HttpSecurity httpSecurity) throws Exception {
        ExpressionUrlAuthorizationConfigurer<HttpSecurity>.ExpressionInterceptUrlRegistry request = httpSecurity
            // 允许使用iframe
            .headers().frameOptions().disable()
            // CSRF禁用，因为不使用session
            .and().csrf().disable()
            // 认证失败处理类
            .exceptionHandling().authenticationEntryPoint(authenticationErrService).and()
            // 基于token，所以不需要session
            .sessionManagement().sessionCreationPolicy(SessionCreationPolicy.STATELESS).and()
            // 过滤请求
            .authorizeRequests();
        // 对于登录login 验证码captchaImage 允许匿名访问
        request.antMatchers("/verifyCode/**", "/authc/**").permitAll();
        request.antMatchers(HttpMethod.GET, "/*.html", "/**/*.html", "/**/*.css", "/**/*.js").permitAll();
        request.antMatchers("/profile/**").permitAll();
        request.antMatchers("/common/upload**").permitAll();
        request.antMatchers("/common/download**").permitAll();
        request.antMatchers("/common/download/resource**").permitAll();
        request.antMatchers("/swagger-ui.html").permitAll();
        request.antMatchers("/swagger-resources/**").permitAll();
        request.antMatchers("/webjars/**").permitAll();
        request.antMatchers("/*/api-docs").permitAll();
        request.antMatchers("/druid/**").permitAll();
        // 除上面外的所有请求全部需要鉴权认证
        // request.anyRequest().authenticated().and().headers().frameOptions().disable();

        // 添加JWT filter
        httpSecurity.addFilterBefore(tokenFilter, UsernamePasswordAuthenticationFilter.class);

        // 刷新角色权限
        RoleUtil.refreshPerms();
    }

}