# frozen_string_literal: true

class DiscourseConnectBase
  class ParseError < RuntimeError
  end

  ACCESSORS = %i[
    add_groups
    admin
    avatar_force_update
    avatar_url
    bio
    card_background_url
    confirmed_2fa
    email
    external_id
    failed
    groups
    locale
    locale_force_update
    location
    logout
    moderator
    name
    no_2fa_methods
    nonce
    prompt
    profile_background_url
    remove_groups
    require_2fa
    require_activation
    return_sso_url
    suppress_welcome_message
    title
    username
    website
  ]

  FIXNUMS = []

  BOOLS = %i[
    admin
    avatar_force_update
    confirmed_2fa
    failed
    locale_force_update
    logout
    moderator
    no_2fa_methods
    require_2fa
    require_activation
    suppress_welcome_message
  ]

  def self.nonce_expiry_time
    @nonce_expiry_time ||= 10.minutes
  end

  def self.nonce_expiry_time=(v)
    @nonce_expiry_time = v
  end

  def self.used_nonce_expiry_time
    24.hours
  end

  attr_accessor(*ACCESSORS)
  attr_writer :sso_secret, :sso_url

  def self.sso_secret
    raise RuntimeError, "sso_secret not implemented on class, be sure to set it on instance"
  end

  def self.sso_url
    raise RuntimeError, "sso_url not implemented on class, be sure to set it on instance"
  end

  def self.parse(payload, sso_secret = nil, **init_kwargs)
    sso = new(**init_kwargs)
    sso.sso_secret = sso_secret if sso_secret

    parsed = Rack::Utils.parse_query(payload)
    decoded = Base64.decode64(parsed["sso"])
    decoded_hash = Rack::Utils.parse_query(decoded)

    if sso.sign(parsed["sso"]) != parsed["sig"]
      diags =
        "\n\nsso: #{parsed["sso"]}\n\nsig: #{parsed["sig"]}\n\nexpected sig: #{sso.sign(parsed["sso"])}"
      if parsed["sso"] =~ %r{[^a-zA-Z0-9=\r\n/+]}m
        raise ParseError,
              "The SSO field should be Base64 encoded, using only A-Z, a-z, 0-9, +, /, and = characters. Your input contains characters we don't understand as Base64, see http://en.wikipedia.org/wiki/Base64 #{diags}"
      else
        raise ParseError, "Bad signature for payload #{diags}"
      end
    end

    ACCESSORS.each do |k|
      val = decoded_hash[k.to_s]
      val = val.to_i if FIXNUMS.include? k
      val = %w[true false].include?(val) ? val == "true" : nil if BOOLS.include? k
      sso.public_send("#{k}=", val)
    end

    decoded_hash.each do |k, v|
      if field = k[/\Acustom\.(.+)\z/, 1]
        sso.custom_fields[field] = v
      end
    end

    sso
  end

  def diagnostics
    DiscourseConnectBase::ACCESSORS.map { |a| "#{a}: #{public_send(a)}" }.join("\n")
  end

  def sso_secret
    @sso_secret || self.class.sso_secret
  end

  def sso_url
    @sso_url || self.class.sso_url
  end

  def custom_fields
    @custom_fields ||= {}
  end

  def self.sign(payload, secret)
    OpenSSL::HMAC.hexdigest("sha256", secret, payload)
  end

  def sign(payload, secret = nil)
    secret = secret || sso_secret
    self.class.sign(payload, secret)
  end

  def to_json
    self.to_h.to_json
  end

  def to_url(base_url = nil)
    base = "#{base_url || sso_url}"
    "#{base}#{base.include?("?") ? "&" : "?"}#{payload}"
  end

  def payload(secret = nil)
    payload = Base64.strict_encode64(unsigned_payload)
    "sso=#{CGI.escape(payload)}&sig=#{sign(payload, secret)}"
  end

  def unsigned_payload
    Rack::Utils.build_query(self.to_h)
  end

  def to_h
    payload = {}

    ACCESSORS.each do |k|
      next if (val = public_send(k)) == nil
      payload[k] = val
    end

    @custom_fields&.each { |k, v| payload["custom.#{k}"] = v.to_s }

    payload
  end
end