package templaterouter

import (
	"reflect"
	"testing"

	routeapi "github.com/openshift/origin/pkg/route/api"
)

func TestCertManager(t *testing.T) {
	cfg := newFakeCertificateManagerConfig()
	fakeCertWriter := &fakeCertWriter{}
	certManager, _ := newSimpleCertificateManager(cfg, fakeCertWriter)

	testCases := map[string]struct {
		cfg             *ServiceAliasConfig
		expectedAdds    []string
		expectedDeletes []string
	}{
		"add cert nil config": {
			expectedAdds:    []string{},
			expectedDeletes: []string{},
		},
		"add cert edge": {
			//expect that the ca cert will be concatenated to the regular cert so we only come out with a single add/delete
			cfg: &ServiceAliasConfig{
				Host:           "www.example.com",
				TLSTermination: routeapi.TLSTerminationEdge,
				Certificates: map[string]Certificate{
					"www.example.com": {
						ID: "testCert",
					},
					"www.example.com" + caCertPostfix: {
						ID: "testCert",
					},
				},
			},
			expectedAdds:    []string{cfg.certDir + "testCert"},
			expectedDeletes: []string{cfg.certDir + "testCert"},
		},
		"add cert passthrough": {
			//passthrough should not define certs (enforced by the api) Certmanager shouldn't attempt to write anything for it
			//even if it has certs since it is unsupported
			cfg: &ServiceAliasConfig{
				Host:           "www.example.com",
				TLSTermination: routeapi.TLSTerminationPassthrough,
				Certificates: map[string]Certificate{
					"www.example.com": {
						ID: "testCert",
					},
					"www.example.com" + caCertPostfix: {
						ID: "testCert",
					},
				},
			},
			expectedAdds:    []string{},
			expectedDeletes: []string{},
		},
		"add cert reencrypt": {
			//expect that we have 2 adds/deletes.  1 for the regular cert/ca and 1 for the destination cert
			cfg: &ServiceAliasConfig{
				Host:           "www.example.com",
				TLSTermination: routeapi.TLSTerminationReencrypt,
				Certificates: map[string]Certificate{
					"www.example.com": {
						ID: "testCert",
					},
					"www.example.com" + caCertPostfix: {
						ID: "testCert",
					},
					"www.example.com" + destCertPostfix: {
						ID: "testCert",
					},
				},
			},
			expectedAdds:    []string{cfg.certDir + "testCert", cfg.caCertDir + "testCert"},
			expectedDeletes: []string{cfg.certDir + "testCert", cfg.caCertDir + "testCert"},
		},
		"add cert no certs": {
			cfg: &ServiceAliasConfig{
				Host:           "www.example.com",
				TLSTermination: routeapi.TLSTerminationEdge,
				Certificates:   map[string]Certificate{},
			},
			expectedAdds:    []string{},
			expectedDeletes: []string{},
		},
		"add cert no tls termination type": {
			cfg: &ServiceAliasConfig{
				Host: "www.example.com",
				Certificates: map[string]Certificate{
					"www.example.com": {
						ID: "testCert",
					},
					"www.example.com" + caCertPostfix: {
						ID: "testCert",
					},
				},
			},
			expectedAdds:    []string{},
			expectedDeletes: []string{},
		},
		"add cert invalid tls termination type": {
			cfg: &ServiceAliasConfig{
				Host:           "www.example.com",
				TLSTermination: "invalid",
				Certificates: map[string]Certificate{
					"www.example.com": {
						ID: "testCert",
					},
					"www.example.com" + caCertPostfix: {
						ID: "testCert",
					},
				},
			},
			expectedAdds:    []string{},
			expectedDeletes: []string{},
		},
	}

	for k, tc := range testCases {
		fakeCertWriter.clear()
		err := certManager.WriteCertificatesForConfig(tc.cfg)
		if err != nil {
			t.Fatalf("Unexpected error writing certs for service alias config for %s.  Config: %v, err: %v", k, tc.cfg, err)
		}
		err = certManager.DeleteCertificatesForConfig(tc.cfg)
		if err != nil {
			t.Fatalf("Unexpected error deleting certs for service alias config for %s.  Config: %v, err: %v", k, tc.cfg, err)
		}

		if len(tc.expectedAdds) != len(fakeCertWriter.addedCerts) {
			t.Errorf("Unexpected number of adds for %s occurred. Expected: %d Got: %d", k, len(tc.expectedAdds), len(fakeCertWriter.addedCerts))
		}

		if len(tc.expectedDeletes) != len(fakeCertWriter.deletedCerts) {
			t.Errorf("Unexpected number of deletes for %s occurred. Expected: %d Got: %d", k, len(tc.expectedDeletes), len(fakeCertWriter.deletedCerts))
		}

		if !reflect.DeepEqual(tc.expectedAdds, fakeCertWriter.addedCerts) {
			t.Errorf("Unexpected adds for %s, wanted: %v, got %v", k, tc.expectedAdds, fakeCertWriter.addedCerts)
		}

		if !reflect.DeepEqual(tc.expectedDeletes, fakeCertWriter.deletedCerts) {
			t.Errorf("Unexpected deletes for %s, wanted: %v, got %v", k, tc.expectedDeletes, fakeCertWriter.deletedCerts)
		}
	}
}

func TestCertManagerSkipsWrittenConfigs(t *testing.T) {
	fakeCertWriter := &fakeCertWriter{}
	certManager, _ := newSimpleCertificateManager(newFakeCertificateManagerConfig(), fakeCertWriter)
	cfg := &ServiceAliasConfig{
		Host:           "www.example.com",
		TLSTermination: routeapi.TLSTerminationEdge,
		Certificates: map[string]Certificate{
			"www.example.com": {
				ID: "testCert",
			},
			"www.example.com" + caCertPostfix: {
				ID: "testCert",
			},
		},
	}
	certManager.WriteCertificatesForConfig(cfg)
	if len(fakeCertWriter.addedCerts) != 1 {
		t.Errorf("expected 1 add for initial certificate write but got %d", len(fakeCertWriter.addedCerts))
	}
	cfg.Status = ServiceAliasConfigStatusSaved
	certManager.WriteCertificatesForConfig(cfg)
	if len(fakeCertWriter.addedCerts) != 1 {
		t.Errorf("expected 1 add for initial certificate write but got %d", len(fakeCertWriter.addedCerts))
	}
	// clear status and ensure it is written
	cfg.Status = ""
	certManager.WriteCertificatesForConfig(cfg)
	if len(fakeCertWriter.addedCerts) != 2 {
		t.Errorf("expected 2 adds for initial certificate write but got %d", len(fakeCertWriter.addedCerts))
	}
}

func TestCertManagerConfig(t *testing.T) {
	validCfg := newFakeCertificateManagerConfig()

	missingCertKeyCfg := newFakeCertificateManagerConfig()
	missingCertKeyCfg.certKeyFunc = nil

	missingCACertKeyCfg := newFakeCertificateManagerConfig()
	missingCACertKeyCfg.caCertKeyFunc = nil

	missingDestCertKeyCfg := newFakeCertificateManagerConfig()
	missingDestCertKeyCfg.destCertKeyFunc = nil

	missingCertDirCfg := newFakeCertificateManagerConfig()
	missingCertDirCfg.certDir = ""

	missingCACertDirCfg := newFakeCertificateManagerConfig()
	missingCACertDirCfg.caCertDir = ""

	matchingCertDirCfg := newFakeCertificateManagerConfig()
	matchingCertDirCfg.caCertDir = matchingCertDirCfg.certDir

	testCases := map[string]struct {
		config     *certificateManagerConfig
		shouldPass bool
	}{
		"valid": {shouldPass: true, config: validCfg},
		"missing certificateKeyFunc":     {shouldPass: false, config: missingCertKeyCfg},
		"missing caCertificateKeyFunc":   {shouldPass: false, config: missingCACertKeyCfg},
		"missing destCertificateKeyFunc": {shouldPass: false, config: missingDestCertKeyCfg},
		"missing 	certificateDir": {shouldPass: false, config: missingCertDirCfg},
		"missing caCertificateDir":                 {shouldPass: false, config: missingCACertDirCfg},
		"matching certificateDir/caCertificateDir": {shouldPass: false, config: matchingCertDirCfg},
	}

	fakeCertWriter := &fakeCertWriter{}
	for k, tc := range testCases {
		_, err := newSimpleCertificateManager(tc.config, fakeCertWriter)
		if tc.shouldPass && err != nil {
			t.Errorf("%s expected config to pass validation but failed with err: %v", k, err)
		}
		if !tc.shouldPass && err == nil {
			t.Errorf("%s expected config to fail validation but passed", k)
		}
	}
}