# -*- coding: utf-8 -*-
from __future__ import unicode_literals

import base64
import os
import os.path
import shutil
import sys
import unittest

import flask
from bs4 import BeautifulSoup as BS
from freezegun import freeze_time
from lxml import etree as ET
from six.moves.urllib.parse import parse_qs, quote, urlparse

from testenv import config, spmetadata
from testenv.crypto import decode_base64_and_inflate, deflate_and_base64_encode, sign_http_redirect
from testenv.parser import SAMLTree
from testenv.settings import (
    BINDING_HTTP_POST, BINDING_HTTP_REDIRECT, NAMEID_FORMAT_ENTITY, NAMEID_FORMAT_TRANSIENT, SIG_RSA_SHA1,
    SIG_RSA_SHA256,
)

from .utils import generate_certificate

sys.path.insert(0, '../')
spid_testenv = __import__("spid-testenv")

try:
    from unittest.mock import patch
except ImportError:
    from mock import patch


DATA_DIR = 'testenv/tests/data/'


def _sp_single_logout_service(server, issuer_name, binding):
    _slo = server._registry.get(issuer_name).single_logout_service(
        binding=binding
    )
    return _slo[0]


def generate_authn_request(data={}, acs_level=0, sign=False):
    _id = data.get('id', 'test_123456')
    version = data.get('version', '2.0')
    issue_instant = data.get('issue_instant', '2018-07-16T09:38:29Z')
    destination = data.get('destination', 'http://spid-testenv:8088')
    protocol_binding = data.get('protocol_binding', BINDING_HTTP_POST)
    acsi = data.get('assertion_consumer_service_index', '1')
    acsu = data.get('assertion_consumer_service_url',
                    'http://127.0.0.1:8000/acs-test')
    issuer__format = data.get('issuer__format', NAMEID_FORMAT_ENTITY)
    issuer_url = data.get('issuer__url', 'https://spid.test:8000')
    issuer__namequalifier = data.get('issuer__namequalifier', issuer_url)
    name_id_policy__format = data.get(
        'name_id_policy__format', NAMEID_FORMAT_TRANSIENT)
    requested_authn_context__comparison = data.get(
        'requested_authn_context__comparison', 'exact')
    requested_authn_context__authn_context_class_ref = data.get(
        'requested_authn_context__authn_context_class_ref',
        'https://www.spid.gov.it/SpidL1')
    attribute_consuming_service_index = data.get(
        'attribute_consuming_service_index', '')

    if acs_level == 0:
        _acs = '''
            ProtocolBinding="%s"
            AssertionConsumerServiceURL="%s"
        ''' % (protocol_binding, acsu)
    elif acs_level == 1:
        _acs = '''
            AssertionConsumerServiceIndex="%s"
        ''' % (acsi)
    elif acs_level == 2:
        _acs = '''
            ProtocolBinding="%s"
            AssertionConsumerServiceURL="%s"
            AssertionConsumerServiceIndex="%s"
        ''' % (protocol_binding, acsu, acsi)
    else:
        _acs = ''

    if attribute_consuming_service_index:
        _atcs = '''
        AttributeConsumingServiceIndex="%s"
        ''' % attribute_consuming_service_index
    else:
        _atcs = ''

    if sign:
        signature = '''<ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
            <ds:SignedInfo>
            <ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
            <ds:SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/>
            <ds:Reference URI="#pfx41d8ef22-e612-8c50-9960-1b16f15741b3">
                <ds:Transforms>
                <ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/>
                <ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
                </ds:Transforms>
                <ds:DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/>
                <ds:DigestValue>yJN6cXUwQxTmMEsPesBP2NkqYFI=</ds:DigestValue>
            </ds:Reference>
            </ds:SignedInfo>
            <ds:SignatureValue>g5eM9yPnKsmmE/Kh2qS7nfK8HoF6yHrAdNQxh70kh8pRI4KaNbYNOL9sF8F57Yd+jO6iNga8nnbwhbATKGXIZOJJSugXGAMRyZsj/rqngwTJk5KmujbqouR1SLFsbo7Iuwze933EgefBbAE4JRI7V2aD9YgmB3socPqAi2Qf97E=</ds:SignatureValue>
            <ds:KeyInfo>
            <ds:X509Data>
                <ds:X509Certificate>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</ds:X509Certificate>
            </ds:X509Data>
            </ds:KeyInfo>
        </ds:Signature>
        '''
    else:
        signature = ''

    xmlstr = '''<samlp:AuthnRequest xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"
                    xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion"
                    ID="%s"
                    Version="%s"
                    IssueInstant="%s"
                    Destination="%s"
                    %s %s>
        <saml:Issuer Format="%s"
                    NameQualifier="%s">%s</saml:Issuer>
        %s
        <samlp:NameIDPolicy Format="%s" />
        <samlp:RequestedAuthnContext Comparison="%s">
            <saml:AuthnContextClassRef>%s</saml:AuthnContextClassRef>
        </samlp:RequestedAuthnContext>
        </samlp:AuthnRequest>
    ''' % (
        _id,
        version,
        issue_instant,
        destination,
        _acs,
        _atcs,
        issuer__format,
        issuer__namequalifier,
        issuer_url,
        signature,
        name_id_policy__format,
        requested_authn_context__comparison,
        requested_authn_context__authn_context_class_ref
    )
    return bytes(xmlstr.encode('utf-8'))


def generate_logout_request(data={}):
    _id = data.get('id') if data.get('id') else 'test_123456'
    version = data.get('version') if data.get('version') else '2.0'
    issue_instant = data.get('issue_instant') if data.get(
        'issue_instant') else '2018-07-16T09:38:29Z'
    destination = data.get('destination') if data.get(
        'destination') else 'http://spid-testenv:8088'
    issuer__format = data.get('issuer__format') if data.get(
        'issuer__format') else NAMEID_FORMAT_ENTITY
    issuer_url = data.get('issuer__url') if data.get(
        'issuer__url') else 'https://spid.test:8000'
    issuer__namequalifier = data.get('issuer__namequalifier') if data.get(
        'issuer__namequalifier') else issuer_url
    name_id__format = data.get('name_id__format') if data.get(
        'name_id__format') else NAMEID_FORMAT_TRANSIENT
    name_id__namequalifier = data.get('name_id__namequalifier') if data.get(
        'name_id__namequalifier') else 'https://spid.test:8000'
    name_id__value = data.get('name_id__value') if data.get(
        'name_id__value') else 'name_id'
    session_index__value = data.get('session_index__value') if data.get(
        'session_index__value') else 'session_idx_123'

    xmlstr = '''<samlp:LogoutRequest xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"
                xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion"
                ID="%s"
                Version="%s"
                IssueInstant="%s"
                Destination="%s">
        <saml:Issuer Format="%s" NameQualifier="%s">%s</saml:Issuer>
        <saml:NameID Format="%s" NameQualifier="%s">%s</saml:NameID>
        <samlp:SessionIndex>%s</samlp:SessionIndex>
        </samlp:LogoutRequest>
    ''' % (
        _id,
        version,
        issue_instant,
        destination,
        issuer__format,
        issuer__namequalifier,
        issuer_url,
        name_id__format,
        name_id__namequalifier,
        name_id__value,
        session_index__value
    )
    return bytes(xmlstr.encode('utf-8'))


class SpidTestenvTest(unittest.TestCase):

    maxDiff = None

    @classmethod
    def setUpClass(cls):
        generate_certificate(fname='idp', path=DATA_DIR)
        generate_certificate(fname='sp', path=DATA_DIR)
        example_metadata = os.path.join(DATA_DIR, 'sp-metadata.xml.example')
        sp_cert = os.path.join(DATA_DIR, 'sp.crt')
        tmp_metadata = os.path.join(DATA_DIR, 'sp-metadata.xml')
        shutil.copyfile(
            example_metadata,
            tmp_metadata
        )
        xml = ET.parse(tmp_metadata)
        with open(sp_cert, 'r') as f:
            cert_value = ''.join(f.readlines()[1:-1])
            for cert in xml.findall(
                    '//{http://www.w3.org/2000/09/xmldsig#}X509Certificate'):
                cert.text = cert_value
        xml.write(tmp_metadata)
        app = flask.Flask(spid_testenv.__name__, static_url_path='/static')
        config.load('testenv/tests/data/config.yaml')
        with freeze_time('2018-07-16T09:38:29Z'):
            spmetadata.build_metadata_registry()
        cls.idp_server = spid_testenv.IdpServer(app=app)
        cls.idp_server.app.testing = True
        cls.test_client = cls.idp_server.app.test_client()

    @classmethod
    def tearDownClass(cls):
        to_remove = ['users.json', 'idp.crt', 'idp.key',
                     'sp.crt', 'sp.key', 'sp-metadata.xml']
        for f in to_remove:
            os.remove(os.path.join(DATA_DIR, f))

    def setUp(self):
        pass

    def tearDown(self):
        self.idp_server.ticket = {}
        self.idp_server.responses = {}
        self.idp_server.challenges = {}

    def test_permissions(self):
        response = self.test_client.get('/login')
        self.assertEqual(response.status_code, 403)
        response = self.test_client.post('/continue-response')
        self.assertEqual(response.status_code, 400)
        response = self.test_client.post(
            '/continue-response', data={'request_key': 'somevalue'})
        self.assertEqual(response.status_code, 403)
        response = self.test_client.get('/users')
        self.assertEqual(response.status_code, 200)
        response = self.test_client.post('/users', data={})
        self.assertEqual(response.status_code, 400)
        response = self.test_client.get('/metadata')
        self.assertEqual(response.status_code, 200)

    def test_authnrequest_no_SAML_parameter(self):
        response = self.test_client.get('/sso-test')
        self.assertEqual(response.status_code, 200)
        self.assertIn(
            b'Dato mancante nella request: &#39;SAMLRequest&#39;',
            response.get_data())

    @freeze_time("2018-07-16T10:38:29Z")
    @patch('testenv.parser.HTTPRedirectRequestParser._decode_saml_request',
           return_value=generate_authn_request())
    @patch(
        'testenv.crypto.HTTPRedirectSignatureVerifier.verify',
        return_value=True)
    def test_issue_instant_out_of_range(self, unravel, verified):
        response = self.test_client.get(
            '/sso-test?SAMLRequest=b64encodedrequest&SigAlg={}&Signature=sign'.format(
                quote(SIG_RSA_SHA256)), follow_redirects=True)
        self.assertEqual(response.status_code, 200)
        response_text = response.get_data(as_text=True)
        self.assertIn(
            'Il valore non è compreso tra 2018-07-16 10:36:29 e 2018-07-16 10:40:29',
            response_text)
        self.assertNotIn(
            'la data non è in formato UTC',
            response_text
        )

    @freeze_time("2018-07-16T09:38:29Z")
    @patch('testenv.parser.HTTPRedirectRequestParser._decode_saml_request',
           return_value=generate_authn_request())
    @patch(
        'testenv.crypto.HTTPRedirectSignatureVerifier.verify',
        return_value=True)
    def test_issue_instant_ok(self, unravel, verified):
        response = self.test_client.get(
            '/sso-test?SAMLRequest=b64encodedrequest&SigAlg={}&Signature=sign'.format(
                quote(SIG_RSA_SHA256)), follow_redirects=True)
        self.assertEqual(response.status_code, 200)
        response_text = response.get_data(as_text=True)
        self.assertNotIn(
            'Il valore non è compreso tra 2018-07-16 09:36:29 e 2018-07-16 09:40:29',
            response_text)
        self.assertNotIn(
            'la data non è in formato UTC',
            response_text
        )

    @freeze_time("2018-07-11T07:28:29Z")
    @patch('testenv.parser.HTTPRedirectRequestParser._decode_saml_request',
           return_value=generate_authn_request({'issue_instant': '2018-07-11T07:28:57.935Z'}))
    @patch(
        'testenv.crypto.HTTPRedirectSignatureVerifier.verify',
        return_value=True)
    def test_issue_instant_ms(self, unravel, verified):
        response = self.test_client.get(
            '/sso-test?SAMLRequest=b64encodedrequest&SigAlg={}&Signature=sign'.format(
                quote(SIG_RSA_SHA256)), follow_redirects=True)
        self.assertEqual(response.status_code, 200)
        response_text = response.get_data(as_text=True)
        self.assertNotIn(
            'Il valore non è compreso tra 2018-07-16 09:36:29 e 2018-07-16 09:40:29',
            response_text)
        self.assertNotIn(
            'la data non è in formato UTC',
            response_text
        )

    @freeze_time("2018-07-16T09:38:29Z")
    @patch('testenv.parser.HTTPRedirectRequestParser._decode_saml_request',
           return_value=generate_authn_request({'protocol_binding': BINDING_HTTP_REDIRECT}))
    @patch(
        'testenv.crypto.HTTPRedirectSignatureVerifier.verify',
        return_value=True)
    def test_wrong_protocol_binding(self, unravel, verified):
        response = self.test_client.get(
            '/sso-test?SAMLRequest=b64encodedrequest&SigAlg={}&Signature=sign'.format(
                quote(SIG_RSA_SHA256)), follow_redirects=True)
        self.assertEqual(response.status_code, 200)
        response_text = response.get_data(as_text=True)
        self.assertIn(
            'è diverso dal valore atteso ({})'.format(BINDING_HTTP_POST),
            response_text
        )

    @freeze_time("2018-07-16T09:38:29Z")
    @patch('testenv.parser.HTTPRedirectRequestParser._decode_saml_request',
           return_value=generate_authn_request({'protocol_binding': BINDING_HTTP_POST}))
    @patch(
        'testenv.crypto.HTTPRedirectSignatureVerifier.verify',
        return_value=True)
    def test_right_protocol_binding(self, unravel, verified):
        response = self.test_client.get(
            '/sso-test?SAMLRequest=b64encodedrequest&SigAlg={}&Signature=sign'.format(
                quote(SIG_RSA_SHA256)), follow_redirects=True)
        self.assertEqual(response.status_code, 200)
        response_text = response.get_data(as_text=True)
        self.assertNotIn(
            '{} è diverso dal valore atteso ({})'.format(
                BINDING_HTTP_REDIRECT, BINDING_HTTP_POST),
            response_text
        )

    @freeze_time("2018-07-16T09:38:29Z")
    @patch('testenv.parser.HTTPRedirectRequestParser._decode_saml_request',
           return_value=generate_authn_request())
    @patch(
        'testenv.crypto.HTTPRedirectSignatureVerifier.verify',
        return_value=True)
    def test_no_assertion_consumer_service_index(self, unravel, verified):
        response = self.test_client.get(
            '/sso-test?SAMLRequest=b64encodedrequest&SigAlg={}&Signature=sign'.format(
                quote(SIG_RSA_SHA256)), follow_redirects=True)
        self.assertEqual(response.status_code, 200)
        response_text = response.get_data(as_text=True)
        self.assertNotIn(
            'Uno e uno solo uno tra gli attributi o gruppi di attributi devono essere presenti: [AssertionConsumerServiceIndex, [AssertionConsumerServiceUrl, ProtocolBinding]]',
            response_text)

    @freeze_time("2018-07-16T09:38:29Z")
    @patch('testenv.parser.HTTPRedirectRequestParser._decode_saml_request',
           return_value=generate_authn_request(acs_level=1))
    @patch(
        'testenv.crypto.HTTPRedirectSignatureVerifier.verify',
        return_value=True)
    def test_no_assertion_consumer_service_url_and_protocol_binding(
            self, unravel, verified):
        response = self.test_client.get(
            '/sso-test?SAMLRequest=b64encodedrequest&SigAlg={}&Signature=sign'.format(
                quote(SIG_RSA_SHA256)), follow_redirects=True)
        self.assertEqual(response.status_code, 200)
        response_text = response.get_data(as_text=True)
        self.assertNotIn(
            'Uno e uno solo uno tra gli attributi o gruppi di attributi devono essere presenti: [AssertionConsumerServiceIndex, [AssertionConsumerServiceUrl, ProtocolBinding]]',
            response_text
        )

    @freeze_time("2018-07-16T09:38:29Z")
    @patch('testenv.parser.HTTPRedirectRequestParser._decode_saml_request',
           return_value=generate_authn_request(acs_level=2))
    @patch(
        'testenv.crypto.HTTPRedirectSignatureVerifier.verify',
        return_value=True)
    def test_all_assertion_consumer_service_attributes(
            self, unravel, verified):
        response = self.test_client.get(
            '/sso-test?SAMLRequest=b64encodedrequest&SigAlg={}&Signature=sign'.format(
                quote(SIG_RSA_SHA256)), follow_redirects=True)
        self.assertEqual(response.status_code, 200)
        response_text = response.get_data(as_text=True)
        self.assertIn(
            'Uno e uno solo uno tra gli attributi o gruppi di attributi devono essere presenti: [AssertionConsumerServiceIndex, [AssertionConsumerServiceUrl, ProtocolBinding]]',
            response_text
        )

    @freeze_time("2018-07-16T09:38:29Z")
    @patch('testenv.parser.HTTPRedirectRequestParser._decode_saml_request',
           return_value=generate_authn_request(acs_level=3))
    @patch(
        'testenv.crypto.HTTPRedirectSignatureVerifier.verify',
        return_value=True)
    def test_no_assertion_consumer_service_attributes(self, unravel, verified):
        response = self.test_client.get(
            '/sso-test?SAMLRequest=b64encodedrequest&SigAlg={}&Signature=sign'.format(
                quote(SIG_RSA_SHA256)), follow_redirects=True)
        self.assertEqual(response.status_code, 200)
        response_text = response.get_data(as_text=True)
        self.assertIn(
            'Uno e uno solo uno tra gli attributi o gruppi di attributi devono essere presenti: [AssertionConsumerServiceIndex, [AssertionConsumerServiceUrl, ProtocolBinding]]',
            response_text
        )

    @freeze_time("2018-07-16T09:38:29Z")
    @patch('testenv.parser.HTTPRedirectRequestParser._decode_saml_request',
           return_value=generate_authn_request())
    def test_wrong_signature_algorithm(self, unravel):
        response = self.test_client.get(
            '/sso-test?SAMLRequest=b64encodedrequest&SigAlg={}&Signature=sign'.format(
                quote(SIG_RSA_SHA1)), follow_redirects=True)
        self.assertEqual(response.status_code, 200)
        response_text = response.get_data(as_text=True)
        self.assertIn(
            "L&#39;algoritmo &#39;{}&#39; è considerato deprecato.".format(
                SIG_RSA_SHA1),
            response_text
        )

    @freeze_time("2018-07-16T09:38:29Z")
    @patch('testenv.parser.HTTPRedirectRequestParser._decode_saml_request',
           return_value=generate_authn_request())
    @patch(
        'testenv.crypto.HTTPRedirectSignatureVerifier.verify',
        return_value=True)
    def test_right_signature_algorithm(self, unravel, verified):
        response = self.test_client.get(
            '/sso-test?SAMLRequest=b64encodedrequest&SigAlg={}&Signature=sign'.format(
                quote(SIG_RSA_SHA256)), follow_redirects=True)
        self.assertEqual(response.status_code, 200)
        response_text = response.get_data(as_text=True)
        self.assertNotIn(
            '{} non è supportato.'.format(SIG_RSA_SHA256),
            response_text
        )

    @freeze_time("2018-07-16T09:38:29Z")
    @patch('testenv.parser.HTTPRedirectRequestParser._decode_saml_request',
           return_value=generate_authn_request())
    @patch(
        'testenv.crypto.HTTPRedirectSignatureVerifier.verify',
        return_value=True)
    def test_in_response_to(self, unravel, verified):
        self.assertEqual(len(self.idp_server.ticket), 0)
        self.assertEqual(len(self.idp_server.responses), 0)
        response = self.test_client.get(
            '/sso-test?SAMLRequest=b64encodedrequest&SigAlg={}&Signature=sign'.format(
                quote(SIG_RSA_SHA256)), follow_redirects=True)
        self.assertEqual(response.status_code, 200)
        response = self.test_client.post(
            '/login',
            data={
                'confirm': 1,
                'username': 'test',
                'password': 'test'
            },
            follow_redirects=True
        )
        self.assertEqual(response.status_code, 200)
        response_text = response.get_data(as_text=True)
        self.assertEqual(len(self.idp_server.ticket), 1)
        key = list(self.idp_server.ticket.keys())[0]
        authn_request = self.idp_server.ticket[key]
        old_in_response_to = authn_request.id
        self.assertIn(
            'InResponseTo=&#34;{}&#34;'.format(old_in_response_to),
            response_text
        )
        response = self.test_client.post(
            '/continue-response',
            data={
                'confirm': 1,
                'request_key': key
            },
            follow_redirects=True
        )
        self.assertEqual(response.status_code, 200)
        self.assertEqual(len(self.idp_server.ticket), 0)
        self.assertEqual(len(self.idp_server.responses), 0)
        with patch('testenv.parser.HTTPRedirectRequestParser._decode_saml_request', return_value=generate_authn_request({'id': 'test_9999'})) as mocked:  # noqa: F841
            response = self.test_client.get(
                '/sso-test?SAMLRequest=b64encodedrequest&SigAlg={}&Signature=sign'.format(
                    quote(SIG_RSA_SHA256)), follow_redirects=True)
            self.assertEqual(response.status_code, 200)
            response = self.test_client.post(
                '/login',
                data={
                    'confirm': 1,
                    'username': 'test',
                    'password': 'test'
                },
                follow_redirects=True
            )
            self.assertEqual(response.status_code, 200)
            response_text = response.get_data(as_text=True)
            self.assertEqual(len(self.idp_server.ticket), 1)
            key = list(self.idp_server.ticket.keys())[0]
            authn_request = self.idp_server.ticket[key]
            in_response_to = authn_request.id
            self.assertNotEqual(old_in_response_to, in_response_to)
            self.assertIn(
                'InResponseTo=&#34;{}&#34;'.format(in_response_to),
                response_text
            )
            self.assertNotIn(
                'InResponseTo=&#34;{}&#34;'.format(old_in_response_to),
                response_text
            )

    @freeze_time("2018-07-16T09:38:29Z")
    @patch(
        'testenv.parser.HTTPRedirectRequestParser._decode_saml_request',
        return_value=generate_authn_request(
            data={
                'assertion_consumer_service_index': '12345'},
            acs_level=1))
    @patch(
        'testenv.crypto.HTTPRedirectSignatureVerifier.verify',
        return_value=True)
    def test_wrong_assertion_consumer_service_index(self, unravel, verified):
        response = self.test_client.get(
            '/sso-test?SAMLRequest=b64encodedrequest&SigAlg={}&Signature=sign'.format(
                quote(SIG_RSA_SHA256)), follow_redirects=True)
        self.assertEqual(response.status_code, 200)
        response_text = response.get_data(as_text=True)
        self.assertIn(
            "Il valore dell&#39;elemento non corrisponde a nessuno dei valori attesi (0):",
            response_text)

    @freeze_time("2018-07-16T09:38:29Z")
    @patch(
        'testenv.parser.HTTPRedirectRequestParser._decode_saml_request',
        return_value=generate_authn_request(
            data={
                'assertion_consumer_service_index': '0'},
            acs_level=1))
    @patch(
        'testenv.crypto.HTTPRedirectSignatureVerifier.verify',
        return_value=True)
    def test_right_assertion_consumer_service_index(self, unravel, verified):
        response = self.test_client.get(
            '/sso-test?SAMLRequest=b64encodedrequest&SigAlg={}&Signature=sign'.format(
                quote(SIG_RSA_SHA256)), follow_redirects=True)
        self.assertEqual(response.status_code, 200)
        response_text = response.get_data(as_text=True)
        self.assertNotIn(
            "non corrisponde a nessuno dei valori attesi",
            response_text
        )

    @freeze_time("2018-07-16T09:38:29Z")
    @patch(
        'testenv.parser.HTTPRedirectRequestParser._decode_saml_request',
        return_value=generate_authn_request(
            data={
                'assertion_consumer_service_index': '0'},
            acs_level=1))
    @patch(
        'testenv.crypto.HTTPRedirectSignatureVerifier.verify',
        return_value=True)
    def test_ensure_correct_redirect_url(self, unravel, verified):
        response = self.test_client.get(
            '/sso-test?SAMLRequest=b64encodedrequest&SigAlg={}&Signature=sign'.format(
                quote(SIG_RSA_SHA256)), follow_redirects=False)
        self.assertEqual(response.status_code, 302)
        self.assertEqual(response.headers[
                         'Location'], 'http://localhost/login')
        response = self.test_client.post(
            '/login',
            data={
                'confirm': 1,
                'username': 'test',
                'password': 'test'
            },
            follow_redirects=False
        )
        response_text = response.get_data(as_text=True)
        self.assertEqual(response.status_code, 200)
        key = list(self.idp_server.ticket.keys())[0]
        response = self.test_client.post(
            '/continue-response',
            data={
                'confirm': 1,
                'request_key': key
            },
            follow_redirects=False
        )
        self.assertEqual(response.status_code, 200)
        response_text = response.get_data(as_text=True)
        self.assertIn(
            '<form action="http://127.0.0.1:8000/acs-test" method="post">',
            response_text
        )

    @freeze_time("2018-07-16T09:38:29Z")
    @patch('testenv.parser.HTTPRedirectRequestParser._decode_saml_request',
           return_value=generate_authn_request())
    @patch(
        'testenv.crypto.HTTPRedirectSignatureVerifier.verify',
        return_value=True)
    def test_missing_samlrequest_parameter(self, unravel, verified):
        self.assertEqual(len(self.idp_server.ticket), 0)
        self.assertEqual(len(self.idp_server.responses), 0)
        response = self.test_client.get(
            '/sso-test?SigAlg={}&Signature=sign'.format(quote(SIG_RSA_SHA256)),
            follow_redirects=False
        )
        self.assertEqual(response.status_code, 200)
        response_text = response.get_data(as_text=True)
        self.assertIn(
            'Dato mancante nella request: &#39;SAMLRequest&#39;',
            response_text
        )
        self.assertEqual(len(self.idp_server.ticket), 0)
        self.assertEqual(len(self.idp_server.responses), 0)

    @freeze_time("2018-07-16T09:38:29Z")
    def test_authn_request_http_redirect_bad_signature(self):
        xml_message = generate_authn_request()
        encoded_message = deflate_and_base64_encode(xml_message)
        self.assertEqual(len(self.idp_server.ticket), 0)
        self.assertEqual(len(self.idp_server.responses), 0)
        response = self.test_client.get(
            '/sso-test?SAMLRequest={}&SigAlg={}&Signature=sign'.format(
                quote(encoded_message), quote(SIG_RSA_SHA256)),
            follow_redirects=True
        )
        self.assertEqual(response.status_code, 200)
        response_text = response.get_data(as_text=True)
        self.assertIn(
            'Verifica della firma fallita.',
            response_text
        )
        self.assertEqual(len(self.idp_server.ticket), 0)
        self.assertEqual(len(self.idp_server.responses), 0)

    @freeze_time("2018-07-16T09:38:29Z")
    def test_authn_request_http_redirect_missing_signature_parameter(self):
        # See: https://github.com/italia/spid-testenv2/issues/36
        xml_message = generate_authn_request()
        encoded_message = deflate_and_base64_encode(xml_message)
        self.assertEqual(len(self.idp_server.ticket), 0)
        self.assertEqual(len(self.idp_server.responses), 0)
        response = self.test_client.get(
            '/sso-test?SAMLRequest={}&SigAlg={}'.format(
                quote(encoded_message), quote(SIG_RSA_SHA256)),
            follow_redirects=True
        )
        self.assertEqual(response.status_code, 200)
        response_text = response.get_data(as_text=True)
        self.assertIn(
            'Dato mancante nella request: &#39;Signature&#39;',
            response_text
        )
        self.assertEqual(len(self.idp_server.ticket), 0)
        self.assertEqual(len(self.idp_server.responses), 0)

    @freeze_time("2018-07-16T09:38:29Z")
    def test_authn_request_http_redirect_missing_sigalg_parameter(self):
        # See: https://github.com/italia/spid-testenv2/issues/36
        xml_message = generate_authn_request()
        encoded_message = deflate_and_base64_encode(xml_message)
        self.assertEqual(len(self.idp_server.ticket), 0)
        self.assertEqual(len(self.idp_server.responses), 0)
        response = self.test_client.get(
            '/sso-test?SAMLRequest={}&Signature={}'.format(
                quote(encoded_message), quote(SIG_RSA_SHA256)),
            follow_redirects=True
        )
        self.assertEqual(response.status_code, 200)
        response_text = response.get_data(as_text=True)
        self.assertIn(
            'Dato mancante nella request: &#39;SigAlg&#39;',
            response_text
        )
        self.assertEqual(len(self.idp_server.ticket), 0)
        self.assertEqual(len(self.idp_server.responses), 0)

    @freeze_time("2018-07-16T09:38:29Z")
    def test_authn_request_http_redirect_missing_sigalg_and_signature_parameter(
            self):
        # See: https://github.com/italia/spid-testenv2/issues/36
        xml_message = generate_authn_request()
        encoded_message = deflate_and_base64_encode(xml_message)
        self.assertEqual(len(self.idp_server.ticket), 0)
        self.assertEqual(len(self.idp_server.responses), 0)
        response = self.test_client.get(
            '/sso-test?SAMLRequest={}'.format(quote(encoded_message),
                                              quote(SIG_RSA_SHA256)),
            follow_redirects=True
        )
        self.assertEqual(response.status_code, 200)
        response_text = response.get_data(as_text=True)
        self.assertIn(
            'Dato mancante nella request: &#39;SigAlg&#39;',
            response_text
        )
        self.assertEqual(len(self.idp_server.ticket), 0)
        self.assertEqual(len(self.idp_server.responses), 0)

    @freeze_time("2018-07-16T09:38:29Z")
    def test_authn_request_http_redirect_right_signature(self):
        xml_message = generate_authn_request()
        pkey = open(os.path.join(DATA_DIR, 'sp.key'), 'rb').read()
        query_string = sign_http_redirect(
            xml_message, pkey, req_type='SAMLRequest')
        self.assertEqual(len(self.idp_server.ticket), 0)
        self.assertEqual(len(self.idp_server.responses), 0)
        response = self.test_client.get(
            '/sso-test?{}'.format(query_string),
            follow_redirects=True
        )
        self.assertEqual(response.status_code, 200)
        response_text = response.get_data(as_text=True)
        self.assertIn(
            '<form class="Form Form--spaced u-margin-bottom-l " name="login" method="post" action="/login">',
            response_text)
        self.assertEqual(len(self.idp_server.ticket), 1)
        self.assertEqual(len(self.idp_server.responses), 0)
        key = list(self.idp_server.ticket.keys())[0]
        xmlstr = SAMLTree(self.idp_server.ticket[key]._xml_doc)
        xml_message = ET.fromstring(xml_message)
        xml_message = SAMLTree(xml_message)
        self.assertEqual(xml_message.id, xmlstr.id)

    @freeze_time("2018-07-16T09:38:29Z")
    @patch(
        'testenv.parser.HTTPRedirectRequestParser._decode_saml_request',
        return_value=generate_authn_request(
            data={
                'issuer__url': 'https://something.spid.test'},
            acs_level=1))
    @patch(
        'testenv.crypto.HTTPRedirectSignatureVerifier.verify',
        return_value=True)
    def test_wrong_issuer(self, unravel, verified):
        # See: https://github.com/italia/spid-testenv2/issues/42
        response = self.test_client.get(
            '/sso-test?SAMLRequest=b64encodedrequest&SigAlg={}&Signature=sign'.format(
                quote(SIG_RSA_SHA256)), follow_redirects=True)
        self.assertEqual(response.status_code, 200)
        self.assertEqual(len(self.idp_server.ticket), 0)
        self.assertEqual(len(self.idp_server.responses), 0)
        response_text = response.get_data(as_text=True)
        self.assertIn(
            'non corrisponde a nessun Service Provider',
            response_text
        )

    @freeze_time("2018-07-16T09:38:29Z")
    @patch(
        'testenv.parser.HTTPRedirectRequestParser._decode_saml_request',
        return_value=generate_authn_request(
            data={
                'issuer__url': '    https://spid.test:8000  '},
            acs_level=1))
    @patch(
        'testenv.crypto.HTTPRedirectSignatureVerifier.verify',
        return_value=True)
    def test_issuer_with_whitespace(self, unravel, verified):
        # See: https://github.com/italia/spid-testenv2/issues/204
        response = self.test_client.get(
            '/sso-test?SAMLRequest=b64encodedrequest&SigAlg={}&Signature=sign'.format(
                quote(SIG_RSA_SHA256)), follow_redirects=True)
        self.assertEqual(response.status_code, 200)
        response_text = response.get_data(as_text=True)
        self.assertNotIn(
            'non corrisponde a nessun Service Provider',
            response_text
        )

    @freeze_time("2018-07-16T09:38:29Z")
    @patch('testenv.parser.HTTPRedirectRequestParser._decode_saml_request',
           return_value=generate_logout_request())
    @patch(
        'testenv.crypto.HTTPRedirectSignatureVerifier.verify',
        return_value=True)
    def test_logout_response_http_redirect(self, unravel, verified):
        # See: https://github.com/italia/spid-testenv2/issues/88
        with patch('testenv.server.IdpServer._sp_single_logout_service', return_value=_sp_single_logout_service(self.idp_server, 'https://spid.test:8000', BINDING_HTTP_REDIRECT)) as mocked:  # noqa: F841
            response = self.test_client.get(
                '/slo-test?SAMLRequest=b64encodedrequest&SigAlg={}&Signature=sign'.format(
                    quote(SIG_RSA_SHA256)), follow_redirects=False)
            self.assertEqual(response.status_code, 302)
            response_location = response.headers.get('Location')
            url = urlparse(response_location)
            query = parse_qs(url.query)
            self.assertIn(
                'Signature',
                query
            )
            saml_response = query.get('SAMLResponse')[0]
            response = decode_base64_and_inflate(saml_response)
            xml = ET.fromstring(response)
            signatures = xml.findall(
                './/{http://www.w3.org/2000/09/xmldsig#}Signature')
            self.assertEqual(0, len(signatures))
            self.assertEqual(len(self.idp_server.ticket), 0)
            self.assertEqual(len(self.idp_server.responses), 0)

    @freeze_time("2018-07-16T09:38:29Z")
    @patch('testenv.parser.HTTPRedirectRequestParser._decode_saml_request',
           return_value=generate_logout_request())
    @patch(
        'testenv.crypto.HTTPRedirectSignatureVerifier.verify',
        return_value=True)
    def test_logout_response_http_post(self, unravel, verified):
        # See: https://github.com/italia/spid-testenv2/issues/88
        with patch('testenv.server.IdpServer._sp_single_logout_service', return_value=_sp_single_logout_service(self.idp_server, 'https://spid.test:8000', BINDING_HTTP_POST)) as mocked:  # noqa: F841
            response = self.test_client.get(
                '/slo-test?SAMLRequest=b64encodedrequest&SigAlg={}&Signature=sign'.format(
                    quote(SIG_RSA_SHA256)), follow_redirects=False)
            self.assertEqual(response.status_code, 200)
            response_text = response.get_data(as_text=True)
            soup = BS(response_text)
            saml_response = soup.find(
                'input', {'name': 'SAMLResponse'}).get('value')
            response = base64.b64decode(saml_response)
            xml = ET.fromstring(response)
            signatures = xml.findall(
                './/{http://www.w3.org/2000/09/xmldsig#}Signature')
            self.assertEqual(1, len(signatures))
            self.assertEqual(len(self.idp_server.ticket), 0)
            self.assertEqual(len(self.idp_server.responses), 0)

    @freeze_time("2018-07-16T09:38:29Z")
    @patch('testenv.parser.HTTPPostRequestParser._decode_saml_request',
           return_value=generate_authn_request(sign=True))
    @patch('testenv.crypto.HTTPPostSignatureVerifier.verify', return_value=True)
    def test_relaystate_in_post_request_to_sp(self, verified, unravel):
        # https://github.com/italia/spid-testenv2/issues/135
        response = self.test_client.post(
            '/sso-test',
            data={
                'SAMLRequest': 'whatever',
                'RelayState': 'sp_relay_state_value',
            },
            follow_redirects=True,
        )
        response = self.test_client.post(
            '/login',
            data={
                'confirm': 1,
                'username': 'test',
                'password': 'test'
            },
            follow_redirects=True
        )
        key = list(self.idp_server.ticket.keys())[0]
        response = self.test_client.post(
            '/continue-response',
            data={
                'confirm': 1,
                'request_key': key
            },
            follow_redirects=False
        )
        response_text = response.get_data(as_text=True)
        self.assertIn('sp_relay_state_value', response_text)

    def test_fiscal_number_prefix(self):
        # https://github.com/italia/spid-testenv2/issues/150
        self.test_client.post(
            '/users',
            data={
                'username': 'testusr',
                'password': 'testpwd',
                'service_provider': 'sptest',
                'fiscalNumber': 'abc123'
            },
            follow_redirects=True,
        )
        users = self.idp_server.user_manager.all()
        self.assertIn('testusr', users)
        fiscal_number = users['testusr'].get(
            'attrs', {}).get('fiscalNumber', {})
        self.assertTrue(fiscal_number.startswith('TINIT-'))
        self.assertEqual(fiscal_number, 'TINIT-abc123')

    @freeze_time("2018-07-16T09:38:29Z")
    @patch(
        'testenv.parser.HTTPRedirectRequestParser._decode_saml_request',
        return_value=generate_authn_request(
            data={
                'assertion_consumer_service_url': 'someacs'}))
    @patch(
        'testenv.crypto.HTTPRedirectSignatureVerifier.verify',
        return_value=True)
    def test_wrong_assertion_consumer_service_url(self, unravel, verified):
        # See: https://github.com/italia/spid-testenv2/issues/122
        response = self.test_client.get(
            '/sso-test?SAMLRequest=b64encodedrequest&SigAlg={}&Signature=sign'.format(
                quote(SIG_RSA_SHA256)), follow_redirects=True)
        self.assertEqual(response.status_code, 200)
        self.assertEqual(len(self.idp_server.ticket), 0)
        self.assertEqual(len(self.idp_server.responses), 0)
        response_text = response.get_data(as_text=True)
        self.assertIn(
            'Il valore dell&#39;elemento è diverso dal valore atteso ([&#39;http://127.0.0.1:8000/acs-test&#39;]):',
            response_text)

    @freeze_time("2018-07-16T09:38:29Z")
    @patch(
        'testenv.parser.HTTPRedirectRequestParser._decode_saml_request',
        return_value=generate_authn_request(
            data={
                'attribute_consuming_service_index': 1}))
    @patch(
        'testenv.crypto.HTTPRedirectSignatureVerifier.verify',
        return_value=True)
    def test_user_without_some_requested_attribute(self, verified, unravel):
        # https://github.com/italia/spid-testenv2/issues/164
        # https://github.com/italia/spid-testenv2/issues/144
        self.idp_server.user_manager.add(
            'noattr', 'noattr', None, {
                'lastname': 'abc'
            }
        )
        response = self.test_client.get(
            '/sso-test?SAMLRequest=b64encodedrequest&SigAlg={}&Signature=sign'.format(
                quote(SIG_RSA_SHA256)), follow_redirects=True)
        response = self.test_client.post(
            '/login',
            data={
                'confirm': 1,
                'username': 'test',
                'password': 'test'
            },
            follow_redirects=True
        )
        response_text = response.get_data(as_text=True)
        self.assertIn('spidCode', response_text)
        key = list(self.idp_server.ticket.keys())[0]
        response = self.test_client.post(
            '/continue-response',
            data={
                'confirm': 1,
                'request_key': key
            },
            follow_redirects=False
        )

    @freeze_time("2018-07-16T09:38:29Z")
    @patch(
        'testenv.parser.HTTPRedirectRequestParser._decode_saml_request',
        return_value=generate_authn_request(
            data={
                'attribute_consuming_service_index': 1}))
    @patch(
        'testenv.crypto.HTTPRedirectSignatureVerifier.verify',
        return_value=True)
    def test_default_date_attribute_value(self, verified, unravel):
        self.idp_server.user_manager.add(
            'noattr', 'noattr', None, {
                'familyName': 'abc'
            }
        )
        response = self.test_client.get(
            '/sso-test?SAMLRequest=b64encodedrequest&SigAlg={}&Signature=sign'.format(
                quote(SIG_RSA_SHA256)), follow_redirects=True)
        response = self.test_client.post(
            '/login',
            data={
                'confirm': 1,
                'username': 'noattr',
                'password': 'noattr'
            },
            follow_redirects=True
        )
        response_text = response.get_data(as_text=True)
        self.assertIn('1970-01-01', response_text)

    @freeze_time("2018-07-16T09:38:29Z")
    @patch(
        'testenv.parser.HTTPRedirectRequestParser._decode_saml_request',
        return_value=generate_authn_request(
            data={
                'attribute_consuming_service_index': 1}))
    @patch(
        'testenv.crypto.HTTPRedirectSignatureVerifier.verify',
        return_value=True)
    def test_date_with_attribute_value(self, verified, unravel):
        self.idp_server.user_manager.add(
            'testtest', 'testtest', None, {
                'familyName': 'abc',
                'dateOfBirth': '1980-01-01',
                'expirationDate': '2020-01-01'
            }
        )
        response = self.test_client.get(
            '/sso-test?SAMLRequest=b64encodedrequest&SigAlg={}&Signature=sign'.format(
                quote(SIG_RSA_SHA256)), follow_redirects=True)
        response = self.test_client.post(
            '/login',
            data={
                'confirm': 1,
                'username': 'testtest',
                'password': 'testtest'
            },
            follow_redirects=True
        )
        response_text = response.get_data(as_text=True)
        self.assertIn('1980-01-01', response_text)
        self.assertIn('2020-01-01', response_text)
        self.assertNotIn('1970-01-01', response_text)


if __name__ == '__main__':
    unittest.main()