'use strict';

const fs = require('fs');
const log = require('winston');
const openpgp = require('openpgp');
const PGP = require('../../src/service/pgp');

describe('PGP Unit Tests', () => {
  const sandbox = sinon.createSandbox();
  let pgp;
  let key1Armored;
  let key2Armored;
  let key3Armored;
  let key5Armored;

  before(() => {
    key1Armored = fs.readFileSync(`${__dirname}/../fixtures/key1.asc`, 'utf8');
    key2Armored = fs.readFileSync(`${__dirname}/../fixtures/key2.asc`, 'utf8');
    key3Armored = fs.readFileSync(`${__dirname}/../fixtures/key3.asc`, 'utf8');
    key5Armored = fs.readFileSync(`${__dirname}/../fixtures/key5.asc`, 'utf8');
  });

  beforeEach(() => {
    sandbox.stub(log);
    pgp = new PGP();
  });

  afterEach(() => {
    sandbox.restore();
  });

  describe('parseKey', () => {
    it('should should throw error on key parsing', async () => {
      sandbox.stub(openpgp.key, 'readArmored').returns({err: [new Error()]});
      await expect(pgp.parseKey(key3Armored)).to.eventually.be.rejectedWith(/Failed to parse/);
      expect(log.error.calledOnce).to.be.true;
    });

    it('should should throw error when more than one key', () => {
      sandbox.stub(openpgp.key, 'readArmored').returns({keys: [{}, {}]});
      return expect(pgp.parseKey(key3Armored)).to.eventually.be.rejectedWith(/only one key/);
    });

    it('should should throw error when primaryKey not verfied', () => {
      sandbox.stub(openpgp.key, 'readArmored').returns({
        keys: [{
          primaryKey: {},
          verifyPrimaryKey() { return false; }
        }]
      });
      return expect(pgp.parseKey(key3Armored)).to.eventually.be.rejectedWith(/primary key verification/);
    });

    it('should only accept 16 char key id', () => {
      sandbox.stub(openpgp.key, 'readArmored').returns({
        keys: [{
          primaryKey: {
            getFingerprint() {
              return '4277257930867231ce393fb8dbc0b3d92b1b86e9';
            },
            getKeyId() {
              return {
                toHex() { return 'asdf'; }
              };
            }
          },
          verifyPrimaryKey() { return openpgp.enums.keyStatus.valid; }
        }]
      });
      return expect(pgp.parseKey(key3Armored)).to.eventually.be.rejectedWith(/only v4 keys/);
    });

    it('should only accept version 4 fingerprint', () => {
      sandbox.stub(openpgp.key, 'readArmored').returns({
        keys: [{
          primaryKey: {
            getFingerprint() {
              return '4277257930867231ce393fb8dbc0b3d92b1b86e';
            },
            getKeyId() {
              return {
                toHex() { return 'dbc0b3d92b1b86e9'; }
              };
            }
          },
          verifyPrimaryKey() { return openpgp.enums.keyStatus.valid; }
        }]
      });
      return expect(pgp.parseKey(key3Armored)).to.eventually.be.rejectedWith(/only v4 keys/);
    });

    it('should only accept valid user ids', () => {
      sandbox.stub(pgp, 'parseUserIds').returns([]);
      return expect(pgp.parseKey(key3Armored)).to.eventually.be.rejectedWith(/invalid user IDs/);
    });

    it('should be able to parse RSA key', async () => {
      const params = await pgp.parseKey(key1Armored);
      expect(params.keyId).to.equal('dbc0b3d92b1b86e9');
      expect(params.fingerprint).to.equal('4277257930867231ce393fb8dbc0b3d92b1b86e9');
      expect(params.userIds[0].name).to.equal('safewithme testuser');
      expect(params.userIds[0].email).to.equal('safewithme.testuser@gmail.com');
      expect(params.created.getTime()).to.exist;
      expect(params.uploaded.getTime()).to.exist;
      expect(params.algorithm).to.equal('rsa_encrypt_sign');
      expect(params.keySize).to.equal(2048);
      expect(params.publicKeyArmored).to.equal(key1Armored);
    });

    /* test key2 has expired */
    it.skip('should be able to parse RSA/ECC key', async () => {
      const params = await pgp.parseKey(key2Armored);
      expect(params.keyId).to.equal('b8e4105cc9dedc77');
      expect(params.fingerprint).to.equal('e3317db04d3958fd5f662c37b8e4105cc9dedc77');
      expect(params.userIds.length).to.equal(1);
      expect(params.created.getTime()).to.exist;
      expect(params.uploaded.getTime()).to.exist;
      expect(params.algorithm).to.equal('rsa_encrypt_sign');
      expect(params.keySize).to.equal(4096);
      expect(params.publicKeyArmored).to.equal(pgp.trimKey(key2Armored));
    });

    it('should be able to parse komplex key', async () => {
      const params = await pgp.parseKey(key3Armored);
      expect(params.keyId).to.equal('4001a127a90de8e1');
      expect(params.fingerprint).to.equal('04062c70b446e33016e219a74001a127a90de8e1');
      expect(params.userIds.length).to.equal(4);
      expect(params.created.getTime()).to.exist;
      expect(params.uploaded.getTime()).to.exist;
      expect(params.algorithm).to.equal('rsa_encrypt_sign');
      expect(params.keySize).to.equal(4096);
      expect(params.publicKeyArmored).to.equal(pgp.trimKey(key3Armored));
    });
  });

  describe('trimKey', () => {
    it('should be the same as key1', () => {
      const trimmed = pgp.trimKey(key1Armored);
      expect(trimmed).to.equal(key1Armored);
    });

    it('should not be the same as key2', () => {
      const trimmed = pgp.trimKey(key2Armored);
      expect(trimmed).to.not.equal(key2Armored);
    });
  });

  describe('validateKeyBlock', () => {
    const KEY_BEGIN = '-----BEGIN PGP PUBLIC KEY BLOCK-----';
    const KEY_END = '-----END PGP PUBLIC KEY BLOCK-----';

    it('should return true for valid key block', () => {
      const input = KEY_BEGIN + KEY_END;
      expect(pgp.validateKeyBlock(input)).to.be.true;
    });

    it('should return false for invalid key block', () => {
      const input = KEY_END + KEY_BEGIN;
      expect(pgp.validateKeyBlock(input)).to.be.false;
    });

    it('should return false for invalid key block', () => {
      const input = KEY_END;
      expect(pgp.validateKeyBlock(input)).to.be.false;
    });

    it('should return false for invalid key block', () => {
      const input = KEY_BEGIN;
      expect(pgp.validateKeyBlock(input)).to.be.false;
    });
  });

  describe('parseUserIds', () => {
    let key;

    beforeEach(async () => {
      key = (await openpgp.key.readArmored(key1Armored)).keys[0];
    });

    it('should parse a valid user id', async () => {
      const parsed = await pgp.parseUserIds(key.users, key.primaryKey);
      expect(parsed[0].name).to.equal('safewithme testuser');
      expect(parsed[0].email).to.equal('safewithme.testuser@gmail.com');
    });

    it('should throw for an empty user ids array', () =>
      expect(pgp.parseUserIds([], key.primaryKey)).to.eventually.be.rejectedWith(/no user ID/)
    );

    it('should return no user id for an invalid signature', async () => {
      key.users[0].userId.userid = 'fake@example.com';
      const parsed = await pgp.parseUserIds(key.users, key.primaryKey);
      expect(parsed.length).to.equal(0);
    });

    it('should throw for an invalid email address', async () => {
      key.users[0].userId.userid = 'safewithme testuser <safewithme.testusergmail.com>';
      const parsed = await pgp.parseUserIds(key.users, key.primaryKey);
      expect(parsed.length).to.equal(0);
    });
  });

  describe('filterKeyByUserIds', () => {
    it('should filter user IDs', async () => {
      const email = 'test1@example.com';
      const {keys: [key]} = await openpgp.key.readArmored(key3Armored);
      expect(key.users.length).to.equal(4);
      const filtered = await pgp.filterKeyByUserIds([{email}], key3Armored);
      const {keys: [filteredKey]} = await openpgp.key.readArmored(filtered);
      expect(filteredKey.users.length).to.equal(1);
      expect(filteredKey.users[0].userId.email).to.equal(email);
    });

    it('should not filter user attributes', async () => {
      const email = 'test@example.com';
      const {keys: [key]} = await openpgp.key.readArmored(key5Armored);
      expect(key.users.length).to.equal(2);
      const filtered = await pgp.filterKeyByUserIds([{email}], key5Armored);
      const {keys: [filteredKey]} = await openpgp.key.readArmored(filtered);
      expect(filteredKey.users.length).to.equal(2);
      expect(filteredKey.users[0].userId).to.exist;
      expect(filteredKey.users[1].userAttribute).to.exist;
    });
  });

  describe('removeUserId', () => {
    it('should remove user IDs', async () => {
      const email = 'test1@example.com';
      const {keys: [key]} = await openpgp.key.readArmored(key3Armored);
      expect(key.users.length).to.equal(4);
      const reduced = await pgp.removeUserId(email, key3Armored);
      const {keys: [reducedKey]} = await openpgp.key.readArmored(reduced);
      expect(reducedKey.users.length).to.equal(3);
      expect(reducedKey.users.includes(({userId}) => userId.email === email)).to.be.false;
    });

    it('should not remove user attributes', async () => {
      const email = 'test@example.com';
      const {keys: [key]} = await openpgp.key.readArmored(key5Armored);
      expect(key.users.length).to.equal(2);
      const reduced = await pgp.removeUserId(email, key5Armored);
      const {keys: [reducedKey]} = await openpgp.key.readArmored(reduced);
      expect(reducedKey.users.length).to.equal(1);
      expect(reducedKey.users[0].userAttribute).to.exist;
    });
  });
});