/*
 * Minio Cloud Storage, (C) 2016 Minio, Inc.
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

package main

import (
	"bytes"
	"strings"
	"time"

	jwtgo "github.com/dgrijalva/jwt-go"
	"github.com/minio/minio-xl/pkg/probe"
	"golang.org/x/crypto/bcrypt"
)

// JWT - jwt auth backend
type JWT struct {
	accessKeyID     []byte
	secretAccessKey []byte
}

// Default - each token expires in 10hrs.
const (
	tokenExpires time.Duration = 10
)

// InitJWT - initialize.
func InitJWT() *JWT {
	jwt := &JWT{}
	// Load credentials.
	config, err := loadConfigV2()
	fatalIf(err.Trace("JWT"), "Unable to load configuration file.", nil)

	// Save access, secret keys.
	jwt.accessKeyID = []byte(config.Credentials.AccessKeyID)
	jwt.secretAccessKey = []byte(config.Credentials.SecretAccessKey)
	return jwt
}

// GenerateToken - generates a new Json Web Token based on the incoming user id.
func (jwt *JWT) GenerateToken(userName string) (string, *probe.Error) {
	token := jwtgo.New(jwtgo.SigningMethodHS512)
	// Token expires in 10hrs.
	token.Claims["exp"] = time.Now().Add(time.Hour * tokenExpires).Unix()
	token.Claims["iat"] = time.Now().Unix()
	token.Claims["sub"] = userName
	tokenString, e := token.SignedString(jwt.secretAccessKey)
	if e != nil {
		return "", probe.NewError(e)
	}
	return tokenString, nil
}

// Authenticate - authenticates incoming username and password.
func (jwt *JWT) Authenticate(userName, password string) bool {
	userName = strings.TrimSpace(userName)
	password = strings.TrimSpace(password)
	if !bytes.Equal([]byte(userName), jwt.accessKeyID) {
		return false
	}
	hashedPassword, _ := bcrypt.GenerateFromPassword(jwt.secretAccessKey, bcrypt.DefaultCost)
	return bcrypt.CompareHashAndPassword(hashedPassword, []byte(password)) == nil
}