from mock import patch

from seahub.test_utils import BaseTestCase
from seahub.api2.serializers import AuthTokenSerializer
from seahub.profile.models import Profile


class AuthTokenSerializerTest(BaseTestCase):

    def setUp(self):
        self.inactive_user = self.create_user('inactive@test.com', is_active=False)
        Profile.objects.add_or_update(self.user.username,
                                      login_id='user_login_id',
                                      contact_email='contact@test.com')

    def assertSuccess(self, s):
        assert s.is_valid() is True
        assert s.errors == {}

    def assertFailed(self, s):
        assert s.is_valid() is False
        assert 'Unable to login with provided credentials.' in s.errors['non_field_errors']

    def test_validate(self):
        d = {
            'username': self.user.username,
            'password': self.user_password,
            'platform': 'linux',
            'device_id': '701143c1238e6736b61c20e73de82fc95989c413',
            'device_name': 'test',
        }

        assert AuthTokenSerializer(
            data=d, context={'request': self.fake_request}).is_valid() is True

        Profile.objects.add_or_update(username=self.user.username, login_id='aaa')
        d1 = d.copy()
        d1.update({'username': 'aaa'})
        assert AuthTokenSerializer(
            data=d, context={'request': self.fake_request}).is_valid() is True
        assert AuthTokenSerializer(
            data=d1, context={'request': self.fake_request}).is_valid() is True

        Profile.objects.add_or_update(username=self.user.username,
                                      contact_email='a+1@a.com')
        d1 = d.copy()
        d1.update({'username': 'a+1@a.com'})
        assert AuthTokenSerializer(
            data=d, context={'request': self.fake_request}).is_valid() is True
        assert AuthTokenSerializer(
            data=d1, context={'request': self.fake_request}).is_valid() is True

    @patch('seahub.api2.serializers.has_two_factor_auth')
    def test_two_factor_auth(self, mock_has_two_factor_auth):
        mock_has_two_factor_auth.return_value = True

        s = AuthTokenSerializer(data={
            'username': self.user.username,
            'password': self.user_password,
            'platform': 'linux',
            'device_id': '701143c1238e6736b61c20e73de82fc95989c413',
            'device_name': 'test',
        }, context={'request': self.fake_request})
        assert s.is_valid() is True

    def test_invalid_user(self):
        d = {
            'username': 'test_does_not_exist',
            'password': '123',
        }

        s = AuthTokenSerializer(data=d, context={'request': self.fake_request})
        self.assertFailed(s)

    def test_inactive_user(self):
        d = {
            'username': self.inactive_user.username,
            'password': 'secret',
        }

        s = AuthTokenSerializer(data=d, context={'request': self.fake_request})
        assert s.is_valid() is False
        assert 'User account is disabled.' in s.errors['non_field_errors']

    def test_inactive_user_incorrect_password(self):
        """An invalid login doesn't leak the inactive status of a user."""
        d = {
            'username': self.inactive_user.username,
            'password': 'incorrect'
        }

        s = AuthTokenSerializer(data=d, context={'request': self.fake_request})
        assert s.is_valid() is False
        assert 'User account is disabled.' in s.errors['non_field_errors']

    def test_login_failed(self):
        d = {
            'username': self.user.username,
            'password': 'incorrect',
        }

        s = AuthTokenSerializer(data=d, context={'request': self.fake_request})
        self.assertFailed(s)

    def test_login_success(self):
        d = {
            'username': self.user.username,
            'password': self.user_password,
        }

        s = AuthTokenSerializer(data=d, context={'request': self.fake_request})
        self.assertSuccess(s)

    def test_login_id(self):
        d = {
            'username': 'user_login_id',
            'password': self.user_password,
        }

        s = AuthTokenSerializer(data=d, context={'request': self.fake_request})
        self.assertSuccess(s)

    def test_contact_email(self):
        d = {
            'username': 'contact@test.com',
            'password': self.user_password,
        }

        s = AuthTokenSerializer(data=d, context={'request': self.fake_request})
        self.assertSuccess(s)
