# Copyright 2015 Hewlett-Packard Development Company, L.P.
# All Rights Reserved.
#
#    Licensed under the Apache License, Version 2.0 (the "License"); you may
#    not use this file except in compliance with the License. You may obtain
#    a copy of the License at
#
#         http://www.apache.org/licenses/LICENSE-2.0
#
#    Unless required by applicable law or agreed to in writing, software
#    distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
#    WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
#    License for the specific language governing permissions and limitations
#    under the License.
import testtools

import netaddr
from oslo_utils import uuidutils
from tempest.common import utils
from tempest.lib.common.utils import data_utils
from tempest.lib import decorators
from tempest.lib import exceptions as lib_exc

from neutron_tempest_plugin.api import test_subnetpools


SUBNETPOOL_NAME = 'smoke-subnetpool'


class SubnetPoolsNegativeTestJSON(test_subnetpools.SubnetPoolsTestBase):

    smaller_prefix = u'10.11.12.0/26'

    @decorators.attr(type='negative')
    @decorators.idempotent_id('0212a042-603a-4f46-99e0-e37de9374d30')
    def test_get_non_existent_subnetpool(self):
        non_exist_id = data_utils.rand_name('subnetpool')
        self.assertRaises(lib_exc.NotFound, self.client.show_subnetpool,
                          non_exist_id)

    @decorators.attr(type='negative')
    @decorators.idempotent_id('dc9336e5-f28f-4658-a0b0-cc79e607007d')
    def test_tenant_get_not_shared_admin_subnetpool(self):
        created_subnetpool = self._create_subnetpool(is_admin=True)
        # None-shared admin subnetpool cannot be retrieved by tenant user.
        self.assertRaises(lib_exc.NotFound, self.client.show_subnetpool,
                          created_subnetpool['id'])

    @decorators.attr(type='negative')
    @decorators.idempotent_id('5e1f2f86-d81a-498c-82ed-32a49f4dc4d3')
    def test_delete_non_existent_subnetpool(self):
        non_exist_id = data_utils.rand_name('subnetpool')
        self.assertRaises(lib_exc.NotFound, self.client.delete_subnetpool,
                          non_exist_id)

    @decorators.attr(type='negative')
    @decorators.idempotent_id('d1143fe2-212b-4e23-a308-d18f7d8d78d6')
    def test_tenant_create_shared_subnetpool(self):
        # 'shared' subnetpool can only be created by admin.
        self.assertRaises(lib_exc.Forbidden, self._create_subnetpool,
                          is_admin=False, shared=True)

    @decorators.attr(type='negative')
    @decorators.idempotent_id('6ae09d8f-95be-40ed-b1cf-8b850d45bab5')
    @utils.requires_ext(extension='default-subnetpools', service='network')
    def test_tenant_create_default_subnetpool(self):
        # 'default' subnetpool can only be created by admin.
        self.assertRaises(lib_exc.Forbidden, self._create_subnetpool,
                          is_admin=False, is_default=True)

    @decorators.attr(type='negative')
    @decorators.idempotent_id('4be84d30-60ca-4bd3-8512-db5b36ce1378')
    def test_update_non_existent_subnetpool(self):
        non_exist_id = data_utils.rand_name('subnetpool')
        self.assertRaises(lib_exc.NotFound, self.client.update_subnetpool,
                          non_exist_id, name='foo-name')

    @decorators.attr(type='negative')
    @decorators.idempotent_id('e6cd6d87-6173-45dd-bf04-c18ea7ec7537')
    def test_update_subnetpool_not_modifiable_shared(self):
        # 'shared' attributes can be specified during creation.
        # But this attribute is not modifiable after creation.
        created_subnetpool = self._create_subnetpool(is_admin=True)
        pool_id = created_subnetpool['id']
        self.assertRaises(lib_exc.BadRequest, self.client.update_subnetpool,
                          pool_id, shared=True)

    @decorators.attr(type='negative')
    @decorators.idempotent_id('62f7c43b-bff1-4def-8bb7-4754b840aaad')
    def test_update_subnetpool_prefixes_shrink(self):
        # Shrink current subnetpool prefixes is not supported
        created_subnetpool = self._create_subnetpool()
        self.assertRaises(lib_exc.BadRequest,
                          self.client.update_subnetpool,
                          created_subnetpool['id'],
                          prefixes=[self.smaller_prefix])

    @decorators.attr(type='negative')
    @decorators.idempotent_id('fc011824-153e-4469-97ad-9808eb88cae1')
    def test_create_subnet_different_pools_same_network(self):
        network = self.create_network(network_name='smoke-network')
        created_subnetpool = self._create_subnetpool(
            is_admin=True, prefixes=['192.168.0.0/16'])
        subnet = self.create_subnet(
            network, cidr=netaddr.IPNetwork('10.10.10.0/24'), ip_version=4,
            gateway=None, client=self.admin_client)
        # add the subnet created by admin to the cleanUp because
        # the base.py doesn't delete it using the admin client
        self.addCleanup(self.admin_client.delete_subnet, subnet['id'])
        self.assertRaises(lib_exc.BadRequest, self.create_subnet, network,
                          ip_version=4,
                          subnetpool_id=created_subnetpool['id'],
                          client=self.admin_client)

    @decorators.attr(type='negative')
    @decorators.idempotent_id('9589e332-638e-476e-81bd-013d964aa3cb')
    @utils.requires_ext(extension='address-scope', service='network')
    def test_create_subnetpool_associate_invalid_address_scope(self):
        self.assertRaises(lib_exc.BadRequest, self._create_subnetpool,
                          address_scope_id='foo-addr-scope')

    @decorators.attr(type='negative')
    @decorators.idempotent_id('3b6c5942-485d-4964-a560-55608af020b5')
    @utils.requires_ext(extension='address-scope', service='network')
    def test_create_subnetpool_associate_non_exist_address_scope(self):
        self.assertRaises(lib_exc.NotFound, self._create_subnetpool,
                          address_scope_id=uuidutils.generate_uuid())

    @decorators.attr(type='negative')
    @decorators.idempotent_id('2dfb4269-8657-485a-a053-b022e911456e')
    @utils.requires_ext(extension='address-scope', service='network')
    def test_create_subnetpool_associate_address_scope_prefix_intersect(self):
        address_scope = self.create_address_scope(
            name=data_utils.rand_name('smoke-address-scope'),
            ip_version=4)
        addr_scope_id = address_scope['id']
        self._create_subnetpool(address_scope_id=addr_scope_id)
        subnetpool_data = {'name': 'foo-subnetpool',
                           'prefixes': [u'10.11.12.13/24'],
                           'min_prefixlen': '29',
                           'address_scope_id': addr_scope_id}
        self.assertRaises(lib_exc.Conflict, self._create_subnetpool,
                          **subnetpool_data)

    @decorators.attr(type='negative')
    @decorators.idempotent_id('83a19a13-5384-42e2-b579-43fc69c80914')
    @utils.requires_ext(extension='address-scope', service='network')
    def test_create_sp_associate_address_scope_multiple_prefix_intersect(self):
        address_scope = self.create_address_scope(
            name=data_utils.rand_name('smoke-address-scope'),
            ip_version=4)
        addr_scope_id = address_scope['id']
        self._create_subnetpool(prefixes=[u'20.0.0.0/18', u'30.0.0.0/18'],
                                address_scope_id=addr_scope_id)
        prefixes = [u'40.0.0.0/18', u'50.0.0.0/18', u'30.0.0.0/12']
        subnetpool_data = {'name': 'foo-subnetpool',
                           'prefixes': prefixes,
                           'min_prefixlen': '29',
                           'address_scope_id': addr_scope_id}
        self.assertRaises(lib_exc.Conflict, self._create_subnetpool,
                          **subnetpool_data)

    @decorators.attr(type='negative')
    @decorators.idempotent_id('f06d8e7b-908b-4e94-b570-8156be6a4bf1')
    @utils.requires_ext(extension='address-scope', service='network')
    def test_create_subnetpool_associate_address_scope_of_other_owner(self):
        address_scope = self.create_address_scope(
            name=data_utils.rand_name('smoke-address-scope'), is_admin=True,
            ip_version=4)
        self.assertRaises(lib_exc.NotFound, self._create_subnetpool,
                          address_scope_id=address_scope['id'])

    @decorators.attr(type='negative')
    @decorators.idempotent_id('3396ec6c-cb80-4ebe-b897-84e904580bdf')
    @testtools.skipIf(
        utils.is_extension_enabled('rbac-address-scope', 'network'),
        reason="Test is outdated starting from Ussuri release."
    )
    @utils.requires_ext(extension='address-scope', service='network')
    def test_tenant_create_subnetpool_associate_shared_address_scope(self):
        address_scope = self.create_address_scope(
            name=data_utils.rand_name('smoke-address-scope'), is_admin=True,
            shared=True, ip_version=4)
        self.assertRaises(lib_exc.BadRequest, self._create_subnetpool,
                          address_scope_id=address_scope['id'])

    @decorators.attr(type='negative')
    @decorators.idempotent_id('6d3d9ad5-32d4-4d63-aa00-8c62f73e2881')
    @utils.requires_ext(extension='address-scope', service='network')
    def test_update_subnetpool_associate_address_scope_of_other_owner(self):
        address_scope = self.create_address_scope(
            name=data_utils.rand_name('smoke-address-scope'), is_admin=True,
            ip_version=4)
        address_scope_id = address_scope['id']
        created_subnetpool = self._create_subnetpool(self.client)
        self.assertRaises(lib_exc.NotFound, self.client.update_subnetpool,
                          created_subnetpool['id'],
                          address_scope_id=address_scope_id)

    def _test_update_subnetpool_prefix_intersect_helper(
            self, pool_1_prefixes, pool_2_prefixes, pool_1_updated_prefixes):
        # create two subnet pools associating  to an address scope.
        # Updating the first subnet pool with the prefix intersecting
        # with the second one should be a failure
        address_scope = self.create_address_scope(
            name=data_utils.rand_name('smoke-address-scope'), ip_version=4)
        addr_scope_id = address_scope['id']
        pool_values = {'address_scope_id': addr_scope_id,
                       'prefixes': pool_1_prefixes}
        created_subnetpool_1 = self._create_subnetpool(**pool_values)
        pool_id_1 = created_subnetpool_1['id']
        pool_values = {'address_scope_id': addr_scope_id,
                       'prefixes': pool_2_prefixes}
        self._create_subnetpool(**pool_values)
        # now update the pool_id_1 with the prefix intersecting with
        # pool_id_2
        self.assertRaises(lib_exc.Conflict, self.client.update_subnetpool,
                          pool_id_1, prefixes=pool_1_updated_prefixes)

    @decorators.attr(type='negative')
    @decorators.idempotent_id('96006292-7214-40e0-a471-153fb76e6b31')
    @utils.requires_ext(extension='address-scope', service='network')
    def test_update_subnetpool_prefix_intersect(self):
        pool_1_prefix = [u'20.0.0.0/18']
        pool_2_prefix = [u'20.10.0.0/24']
        pool_1_updated_prefix = [u'20.0.0.0/12']
        self._test_update_subnetpool_prefix_intersect_helper(
            pool_1_prefix, pool_2_prefix, pool_1_updated_prefix)

    @decorators.attr(type='negative')
    @decorators.idempotent_id('4d3f8a79-c530-4e59-9acf-6c05968adbfe')
    @utils.requires_ext(extension='address-scope', service='network')
    def test_update_subnetpool_multiple_prefix_intersect(self):
        pool_1_prefixes = [u'20.0.0.0/18', u'30.0.0.0/18']
        pool_2_prefixes = [u'20.10.0.0/24', u'40.0.0.0/18', '50.0.0.0/18']
        pool_1_updated_prefixes = [u'20.0.0.0/18', u'30.0.0.0/18',
                                   u'50.0.0.0/12']
        self._test_update_subnetpool_prefix_intersect_helper(
            pool_1_prefixes, pool_2_prefixes, pool_1_updated_prefixes)

    @decorators.attr(type='negative')
    @decorators.idempotent_id('7438e49e-1351-45d8-937b-892059fb97f5')
    @utils.requires_ext(extension='address-scope', service='network')
    def test_tenant_update_sp_prefix_associated_with_shared_addr_scope(self):
        address_scope = self.create_address_scope(
            name=data_utils.rand_name('smoke-address-scope'), is_admin=True,
            shared=True, ip_version=4)
        addr_scope_id = address_scope['id']
        pool_values = {'prefixes': [u'20.0.0.0/18', u'30.0.0.0/18']}

        created_subnetpool = self._create_subnetpool(**pool_values)
        pool_id = created_subnetpool['id']
        # associate the subnetpool to the address scope as an admin
        self.admin_client.update_subnetpool(pool_id,
                                            address_scope_id=addr_scope_id)
        body = self.admin_client.show_subnetpool(pool_id)
        self.assertEqual(addr_scope_id,
                         body['subnetpool']['address_scope_id'])

        # updating the subnetpool prefix by the tenant user should fail
        # since the tenant is not the owner of address scope
        update_prefixes = [u'20.0.0.0/18', u'30.0.0.0/18', u'40.0.0.0/18']
        self.assertRaises(lib_exc.BadRequest, self.client.update_subnetpool,
                          pool_id, prefixes=update_prefixes)

        # admin can update the prefixes
        self.admin_client.update_subnetpool(pool_id, prefixes=update_prefixes)
        body = self.admin_client.show_subnetpool(pool_id)
        self.assertEqual(update_prefixes,
                         body['subnetpool']['prefixes'])

    @decorators.attr(type='negative')
    @decorators.idempotent_id('648fee7d-a909-4ced-bad3-3a169444c0a8')
    @utils.requires_ext(extension='address-scope', service='network')
    def test_update_subnetpool_associate_address_scope_wrong_ip_version(self):
        address_scope = self.create_address_scope(
            name=data_utils.rand_name('smoke-address-scope'),
            ip_version=6)
        created_subnetpool = self._create_subnetpool()
        self.assertRaises(lib_exc.BadRequest, self.client.update_subnetpool,
                          created_subnetpool['id'],
                          address_scope_id=address_scope['id'])

    @decorators.attr(type='negative')
    @decorators.idempotent_id('2f66dc2f-cc32-4caa-91ec-0c0cd7c46d70')
    def test_update_subnetpool_tenant_id(self):
        subnetpool = self._create_subnetpool()
        self.assertRaises(
            lib_exc.BadRequest,
            self.admin_client.update_subnetpool,
            subnetpool['id'],
            tenant_id=self.admin_client.project_id,
        )