package svc

import (
	"errors"
	"fmt"
	"fusenapi/server/auth/internal/config"
	"fusenapi/shared"
	"fusenapi/utils/auth"
	"net/http"

	"fusenapi/initalize"
	"fusenapi/model/gmodel"

	"github.com/golang-jwt/jwt"
	"gorm.io/gorm"
)

type ServiceContext struct {
	Config      config.Config
	SharedState *shared.SharedState

	MysqlConn *gorm.DB
	AllModels *gmodel.AllModelsGen

	RegisterTokenManger *auth.ConfirmationLink[auth.RegisterToken]
	ResetTokenManger    *auth.ConfirmationLink[auth.ResetToken]
}

func NewServiceContext(c config.Config) *ServiceContext {
	conn := initalize.InitMysql(c.SourceMysql)
	// StateServer := shared.StartNode(c.ReplicaId, autoconfig.AutoGetAllServerConfig(), conn)

	return &ServiceContext{
		Config:              c,
		MysqlConn:           conn,
		SharedState:         nil,
		AllModels:           gmodel.NewAllModels(initalize.InitMysql(c.SourceMysql)),
		RegisterTokenManger: auth.NewConfirmationLink[auth.RegisterToken](c.Auth.AccessSecret, "http://localhost:9900/api/auth/oauth2/register"),
		ResetTokenManger:    auth.NewConfirmationLink[auth.ResetToken](c.Auth.AccessSecret, "http://localhost:9900/api/auth/oauth2/register"),
	}
}

func (svcCtx *ServiceContext) ParseJwtToken(r *http.Request) (jwt.MapClaims, error) {
	AuthKey := r.Header.Get("Authorization")
	if AuthKey == "" {
		return nil, nil
	}
	AuthKey = AuthKey[7:]

	if len(AuthKey) <= 50 {
		return nil, errors.New(fmt.Sprint("Error parsing token, len:", len(AuthKey)))
	}

	token, err := jwt.Parse(AuthKey, func(token *jwt.Token) (interface{}, error) {
		// 检查签名方法是否为 HS256
		if _, ok := token.Method.(*jwt.SigningMethodHMAC); !ok {
			return nil, fmt.Errorf("unexpected signing method: %v", token.Header["alg"])
		}
		// 返回用于验证签名的密钥
		return []byte(svcCtx.Config.Auth.AccessSecret), nil
	})
	if err != nil {
		return nil, errors.New(fmt.Sprint("Error parsing token:", err))
	}

	// 验证成功返回
	if claims, ok := token.Claims.(jwt.MapClaims); ok && token.Valid {
		return claims, nil
	}

	return nil, errors.New(fmt.Sprint("Invalid token", err))
}