# frozen_string_literal: true

require 'test_helper'
require 'helpers/auth_provider_helper'

class OpenIdConnectTest < ActionDispatch::IntegrationTest
  include AuthProviderHelper

  setup do
    @admin = User.find_by(username: 'admin')
    login_as(@admin, scope: :user)
    FabManager::Application.load_tasks if Rake::Task.tasks.empty?
  end

  test 'create and activate an OIDC provider' do
    # clean any existing auth provider config
    FileUtils.rm('config/auth_provider.yml', force: true)

    name = 'Sleede'
    post '/api/auth_providers',
         params: {
           auth_provider: keycloak_provider_params(name)
         }.to_json,
         headers: default_headers

    # Check response format & status
    assert_equal 201, response.status, response.body
    assert_match Mime[:json].to_s, response.content_type

    # Check the provider was correctly created
    db_provider = OpenIdConnectProvider.includes(:auth_provider).where('auth_providers.name': name).first&.auth_provider
    assert_not_nil db_provider

    provider = json_response(response.body)
    assert_equal name, provider[:name]
    assert_equal db_provider&.id, provider[:id]
    assert_equal 'pending', provider[:status]
    assert_equal 4, provider[:auth_provider_mappings_attributes].length

    # now let's activate this new provider
    Rake::Task['fablab:auth:switch_provider'].execute(Rake::TaskArguments.new([:provider], [name]))

    # Check it is correctly activated
    db_provider&.reload
    assert_equal 'active', db_provider&.status
    assert_equal AuthProvider.active.id, db_provider&.id

    # Check the configuration file
    assert File.exist?('config/auth_provider.yml')
    config = ProviderConfig.new
    assert_equal 'OpenIdConnectProvider', config.providable_type
    assert_equal name, config.name

    # clean test provider config
    FileUtils.rm('config/auth_provider.yml', force: true)
  end
end