<?php

declare(strict_types=1);

/*
 * This file is part of Part-DB (https://github.com/Part-DB/Part-DB-symfony).
 *
 *  Copyright (C) 2019 - 2023 Jan Böhmer (https://github.com/jbtronics)
 *
 *  This program is free software: you can redistribute it and/or modify
 *  it under the terms of the GNU Affero General Public License as published
 *  by the Free Software Foundation, either version 3 of the License, or
 *  (at your option) any later version.
 *
 *  This program is distributed in the hope that it will be useful,
 *  but WITHOUT ANY WARRANTY; without even the implied warranty of
 *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 *  GNU Affero General Public License for more details.
 *
 *  You should have received a copy of the GNU Affero General Public License
 *  along with this program.  If not, see <https://www.gnu.org/licenses/>.
 */
namespace App\Tests\Security;

use App\Entity\UserSystem\User;
use App\Security\SamlUserFactory;
use Symfony\Bundle\FrameworkBundle\Test\WebTestCase;

class SamlUserFactoryTest extends WebTestCase
{

    /** @var SamlUserFactory */
    protected $service;

    protected function setUp(): void
    {
        self::bootKernel();
        $this->service = self::getContainer()->get(SamlUserFactory::class);
    }

    public function testCreateUser(): void
    {
        $user = $this->service->createUser('sso_user', [
            'email' => ['j.doe@invalid.invalid'],
            'urn:oid:2.5.4.42' => ['John'],
            'urn:oid:2.5.4.4' => ['Doe'],
            'department' => ['IT']
        ]);

        $this->assertInstanceOf(User::class, $user);

        $this->assertSame('sso_user', $user->getUserIdentifier());
        //User must not change his password
        $this->assertFalse($user->isNeedPwChange());
        //And must not be disabled
        $this->assertFalse($user->isDisabled());
        //Password should not be set
        $this->assertSame('!!SAML!!', $user->getPassword());

        //Info should be set
        $this->assertSame('John', $user->getFirstName());
        $this->assertSame('Doe', $user->getLastName());
        $this->assertSame('IT', $user->getDepartment());
        $this->assertSame('j.doe@invalid.invalid', $user->getEmail());
    }

    public function testMapSAMLRolesToLocalGroupID(): void
    {
        $mapping = [
            'admin' => 2, //This comes first, as this should have higher priority
            'employee' => 1,
            'manager' => 3,
            'administrator' => 2,
            '*' => 4,
        ];

        //Test if mapping works
        $this->assertSame(1, $this->service->mapSAMLRolesToLocalGroupID(['employee'], $mapping));
        //Only the first valid mapping should be used
        $this->assertSame(2, $this->service->mapSAMLRolesToLocalGroupID(['employee', 'admin'], $mapping));
        $this->assertSame(2, $this->service->mapSAMLRolesToLocalGroupID(['does_not_matter', 'admin', 'employee'], $mapping));
        $this->assertSame(1, $this->service->mapSAMLRolesToLocalGroupID(['employee', 'does_not_matter', 'manager'], $mapping));
        $this->assertSame(3, $this->service->mapSAMLRolesToLocalGroupID(['administrator', 'does_not_matter', 'manager'], $mapping));
        //Test if mapping is case-sensitive
        $this->assertSame(4, $this->service->mapSAMLRolesToLocalGroupID(['ADMIN'], $mapping));

        //Test that wildcard mapping works
        $this->assertSame(4, $this->service->mapSAMLRolesToLocalGroupID(['entry1', 'entry2'], $mapping));
        $this->assertSame(4, $this->service->mapSAMLRolesToLocalGroupID([], $mapping));
    }
}