"""
Copyright (c) 2022 Huawei Technologies Co.,Ltd.

openGauss is licensed under Mulan PSL v2.
You can use this software according to the terms and conditions of the Mulan PSL v2.
You may obtain a copy of Mulan PSL v2 at:

          http://license.coscl.org.cn/MulanPSL2

THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
See the Mulan PSL v2 for more details.
"""
"""
Case Type   : 防篡改
Case Name   : 验证用户被锁定和解锁之后与系统表信息一致
Create At   : 2022-03-10
@zou_jialiang0501080719
Description :
    1.设置参数并重启数据库enableSeparationOfDuty=on
    2.创建不同权限用户
    3.初始用户锁定用户
    4.查看系统表信息
    5.解锁用户
    6.查看系统表信息
    7.清理环境
Expect      :
    1.成功
    2.成功
    3.锁定失败
    4.rolstatus为2呈锁定状态
    5.成功
    6.rolstatus为0呈正常状态
    7.成功
History     : 
"""


import os
import unittest
from yat.test import macro
from testcase.utils.Constant import Constant
from testcase.utils.CommonSH import CommonSH
from testcase.utils.Common import Common
from testcase.utils.Logger import Logger


class ModifyCase(unittest.TestCase):
    def setUp(self):
        self.log = Logger()
        self.log.info(f'-----{os.path.basename(__file__)} start-----')
        self.primary_sh = CommonSH('PrimaryDbUser')
        self.constant = Constant()
        self.common = Common()
        self.user_name = 'u_security_userlockprivilege_6'
        self.user_privileges = {f'{self.user_name}_sys': 'sysadmin',
                                f'{self.user_name}_audit': 'auditadmin',
                                f'{self.user_name}_create': 'createrole',
                                f'{self.user_name}_noruser': ''}
        self.default_value = self.common.show_param('enableSeparationOfDuty')

    def test_security(self):
        text = '-----step1：设置参数并重启数据库enableSeparationOfDuty=on; ' \
               'expect:成功-----'
        self.log.info(text)
        mod_msg = \
            self.primary_sh.execute_gsguc('set',
                                          self.constant.GSGUC_SUCCESS_MSG,
                                          'enableSeparationOfDuty=on')
        self.log.info(mod_msg)
        self.assertTrue(mod_msg, '执行失败:' + text)
        restart_msg = self.primary_sh.restart_db_cluster()
        self.log.info(restart_msg)
        status = self.primary_sh.get_db_cluster_status()
        self.assertTrue("Degraded" in status or "Normal" in status,
                        '执行失败:' + text)

        text = '-----step2：创建不同权限用户 expect:成功-----'
        self.log.info(text)
        for user, privilege in self.user_privileges.items():
            create_cmd = f"drop user if exists {user} cascade; " \
                f"create user {user} {privilege} " \
                f"password '{macro.PASSWD_REPLACE}' ; "
            msg = self.primary_sh.execut_db_sql(create_cmd)
            self.log.info(msg)
            self.assertIn(self.constant.CREATE_ROLE_SUCCESS_MSG, msg,
                          '执行失败:' + text)

        text = '-----step3：初始用户锁定用户 expect:成功-----'
        self.log.info(text)
        for user in self.user_privileges.keys():
            create_cmd = f'''alter user {user} account lock;'''
            msg = self.primary_sh.execut_db_sql(create_cmd)
            self.log.info(msg)
            self.assertIn(self.constant.ALTER_ROLE_SUCCESS_MSG, msg,
                          '执行失败:' + text)

        text = '----step4:查看系统表信息 expect: rolstatus为2呈锁定状态----'
        self.log.info(text)
        sql_cmd = self.primary_sh.execut_db_sql(f'''select a.rolname,
                            b.rolstatus from pg_authid a,pg_user_status b 
                            where a.rolname like '%{self.user_name}%' 
                            and a.oid=b.roloid order by rolname;''')
        self.log.info(sql_cmd)
        self.assertTrue(sql_cmd.count('2') == 4, "执行失败:" + text)

        text = '-----step5：初始用户解锁用户 expect:成功-----'
        self.log.info(text)
        for user in self.user_privileges.keys():
            create_cmd = f'''alter user {user} account unlock;'''
            msg = self.primary_sh.execut_db_sql(create_cmd)
            self.log.info(msg)
            self.assertIn(self.constant.ALTER_ROLE_SUCCESS_MSG, msg,
                          '执行失败:' + text)

        text = '----step6:查看系统表信息 expect:成功----'
        self.log.info(text)
        sql_cmd = self.primary_sh.execut_db_sql(f'''select a.rolname,
                            b.rolstatus from pg_authid a,pg_user_status b 
                            where a.rolname like '%{self.user_name}%' 
                            and a.oid=b.roloid order by rolname;''')
        self.log.info(sql_cmd)
        self.assertTrue(sql_cmd.count('0') == 4, "执行失败:" + text)

    def tearDown(self):
        text = '----step7:清理环境 expect:成功----'
        self.log.info(text)
        self.log.info('删除用户')
        drop_msg = []
        for user in self.user_privileges.keys():
            drop_cmd = f"drop user {user} cascade; "
            msg = self.primary_sh.execut_db_sql(drop_cmd)
            self.log.info(msg)
            drop_msg.append(msg)
        self.log.info('恢复参数默认值')
        mod_msg1 = \
            self.primary_sh.execute_gsguc('set',
                                          self.constant.GSGUC_SUCCESS_MSG,
                                          f'enableSeparationOfDuty='
                                          f'{self.default_value}')
        self.log.info(mod_msg1)
        restart_msg = self.primary_sh.restart_db_cluster()
        self.log.info(restart_msg)
        status = self.primary_sh.get_db_cluster_status()
        self.assertEqual(4,
                         drop_msg.count(self.constant.DROP_ROLE_SUCCESS_MSG),
                         '执行失败:' + text)
        self.assertTrue("Degraded" in status or "Normal" in status,
                        '执行失败:' + text)
        self.assertTrue(mod_msg1, '执行失败:' + text)
        self.log.info(f'-----{os.path.basename(__file__)} end-----')
