/*
 * Licensed to the Apache Software Foundation (ASF) under one
 * or more contributor license agreements.  See the NOTICE file
 * distributed with this work for additional information
 * regarding copyright ownership.  The ASF licenses this file
 * to you under the Apache License, Version 2.0 (the
 * "License"); you may not use this file except in compliance
 * with the License.  You may obtain a copy of the License at
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing,
 * software distributed under the License is distributed on an
 * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
 * KIND, either express or implied.  See the License for the
 * specific language governing permissions and limitations
 * under the License.
 */
package com.tln.sys.user.security;

import java.util.Collection;
import java.util.HashSet;
import java.util.LinkedHashMap;
import java.util.Map;
import java.util.Set;

import org.apache.shiro.SecurityUtils;
import org.apache.shiro.authc.*;
import org.apache.shiro.authc.credential.Sha256CredentialsMatcher;
import org.apache.shiro.authz.AuthorizationInfo;
import org.apache.shiro.authz.Permission;
import org.apache.shiro.authz.SimpleAuthorizationInfo;
import org.apache.shiro.authz.permission.WildcardPermission;
import org.apache.shiro.realm.AuthorizingRealm;
import org.apache.shiro.subject.PrincipalCollection;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.stereotype.Component;

import com.tln.sys.role.model.Role;
import com.tln.sys.user.dao.UserDao;
import com.tln.sys.user.model.User;

/**
 * The Spring/Hibernate sample application's one and only configured Apache Shiro Realm.
 *
 * <p>Because a Realm is really just a security-specific DAO, we could have just made Hibernate calls directly
 * in the implementation and named it a 'HibernateRealm' or something similar.</p>
 *
 * <p>But we've decided to make the calls to the database using a UserDAO, since a DAO would be used in other areas
 * of a 'real' application in addition to here. We felt it better to use that same DAO to show code re-use.</p>
 */
@Component
public class SampleRealm extends AuthorizingRealm {

	private static final Logger logger = LoggerFactory.getLogger(SampleRealm.class);
	
    protected UserDao userDao;
   /* private org.apache.shiro.spring.web.NewMyShiroFilterFactoryBean shiroFilter;

    @Autowired
    public void setShiroFilter(
			org.apache.shiro.spring.web.NewMyShiroFilterFactoryBean shiroFilter) {
		this.shiroFilter = shiroFilter;
	}*/
    
    @Autowired 
	public void setUserDao(UserDao userDao) {
		this.userDao = userDao;
	}



	public SampleRealm() {
    	logger.info("**********SampleRealm*********");
    	logger.info("userDao :  "+userDao);
        setName("SampleRealm"); //This name must match the name in the User class's getPrincipals() method
        logger.info("new Sha256CredentialsMatcher()=== "+new Sha256CredentialsMatcher());
        //  Sha256Hash   Sha256CredentialsMatcher
        setCredentialsMatcher(new Sha256CredentialsMatcher());
    }

    

    protected AuthenticationInfo doGetAuthenticationInfo(AuthenticationToken authcToken) throws AuthenticationException {
    	logger.info("********1**doGetAuthenticationInfo*********");
    	///logger.info("**********动态加载***********"+shiroFilter);
    	//logger.info("动态改变： "+shiroFilter.createFilterChainManager());
    	Map<String, String> map = new LinkedHashMap<String, String>();
    	map.put("/signup", "authc");
    	map.put("/sys/user", "perms[user:manage]");
    	map.put("/**", "authc");
    	//shiroFilter.postProcessAfterInitialization(bean, beanName);
    	//shiroFilter.postProcessBeforeInitialization(bean, shiroFilter);
    	//shiroFilter.postProcessAfterInitialization(shiroFilter, beanName)
    	//shiroFilter.
    	/*try {
			Class cls = Class.forName("org.apache.shiro.spring.web.MyShiroFilterFactoryBean");
			try {
				Object obj = cls.newInstance();
			} catch (InstantiationException e) {
				// TODO Auto-generated catch block
				e.printStackTrace();
			} catch (IllegalAccessException e) {
				// TODO Auto-generated catch block
				e.printStackTrace();
			}
			
		} catch (ClassNotFoundException e) {
			// TODO Auto-generated catch block
			e.printStackTrace();
		}*/
    	
    	UsernamePasswordToken token = (UsernamePasswordToken) authcToken;
    	logger.info("username :  "+token.getUsername());
        User user = userDao.findUser(token.getUsername());
        logger.info("user :  "+user);
        if( user != null ) {
        	logger.info("user Id :  "+user.getId());
        	logger.info("user password :  "+user.getPassword());
        	logger.info("user name :  "+user.getUsername());
        	logger.info("SimpleAuthenticationInfo:  "+new SimpleAuthenticationInfo(user.getId(), user.getPassword(), getName()));
            return new SimpleAuthenticationInfo(user.getId(), user.getPassword(), getName());
        } else {
            return null;
        }
    }


    protected AuthorizationInfo doGetAuthorizationInfo(PrincipalCollection principals) {
    	logger.info("*****22222*2****doGetAuthorizationInfo*********");
    	Set<String>	roles = new HashSet<String>();
    	Set<Permission> permissions	= new HashSet<Permission>();
    	Collection<User> principalsList	= principals.byType(User.class);
    	
    	logger.info("principals--- "+principals);
        Long userId = (Long) principals.fromRealm(getName()).iterator().next();
        logger.info("userId--- "+userId);
        User user = userDao.getUser(userId);
        logger.info("user--- "+user);
        if( user != null ) {
            SimpleAuthorizationInfo info = new SimpleAuthorizationInfo();
            logger.info("roles set --------"+user.getRoles());
            for( Role role : user.getRoles() ) {
            	logger.info("**********************role.getName()***********************"+role.getName());
                info.addRole(role.getName());
                logger.info("**********role.getPermissions()**************"+role.getPermissions());
                //Set<WildcardPermission> userPermissions	= role.getPermissions();
                info.addStringPermissions( role.getPermissions() );
            }
            return info;
        } else {
            return null;
        }
    }

}

