<?php
/*
** Copyright (C) 2001-2025 Zabbix SIA
**
** This program is free software: you can redistribute it and/or modify it under the terms of
** the GNU Affero General Public License as published by the Free Software Foundation, version 3.
**
** This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY;
** without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
** See the GNU Affero General Public License for more details.
**
** You should have received a copy of the GNU Affero General Public License along with this program.
** If not, see <https://www.gnu.org/licenses/>.
**/


require_once dirname(__FILE__).'/../include/CAPITest.php';

/**
 * @onBefore prepareUsersData
 *
 * @backup users, usrgrp, role, token, mfa, mfa_totp_secret, config
 */
class testUsers extends CAPITest {

	private static $data = [
		'userdirectoryid' => [
			'Provision userdirectory' => null
		],
		'userdirectory_mediaid' => [
			'Provision media mapping email' => null,
			'Provision media mapping sms' => null
		],
		'userids' => [
			'user_with_not_authorized_session' => null,
			'user_with_expired_session' => null,
			'user_with_passive_session' => null,
			'user_with_disabled_usergroup' => null,
			'user_for_token_tests' => null,
			'user_with_valid_session' => null,
			'user_for_extend_parameter_tests' => null,
			'user_with_mfa_default' => null,
			'user_with_mfa_duo' => null
		],
		'userid' => [
			'Provisioned user' => null
		],
		'mediaid' => [
			'Provision media mapping email' => null,
			'Provision media mapping sms' => null
		],
		'mediatypeid' => [
			'Email media type' => 1,
			'SMS media type' => 3
		],
		'roleid' => [
			'Provision user role' => null
		],
		'usrgrpid' => [
			'Provision user group' => null
		],
		'userid' => [
			'Provisioned user' => null
		],
		'mediaid' => [
			'Provision media mapping email' => null,
			'Provision media mapping sms' => null
		],
		'mediatypeid' => [
			'Email media type' => 1,
			'SMS media type' => 3
		],
		'roleid' => [
			'Provision user role' => null
		],
		'usrgrpid' => [
			'Provision user group' => null
		],
		'sessionids' => [
			'not_authorized_session' => null,
			'expired_session' => null,
			'passive_session' => null,
			'valid_for_user_with_disabled_usergroup' => null,
			'valid' => null,
			'for_extend_parameter_tests' => null
		],
		'tokens' => [
			'not_authorized' => null,
			'expired' => null,
			'disabled' => null,
			'valid' => null,
			'valid_for_user_with_disabled_usergroup' => null
		],
		'mfaids' => [
			'mfa_totp_1' => null,
			'mfa_duo_1' => null
		]
	];

	/**
	 * Replace name by value for property names in self::$data.
	 *
	 * @param array $rows
	 */
	public static function resolveIds(array $rows): array {
		$result = [];

		foreach ($rows as $row) {
			foreach (array_intersect_key(self::$data, $row) as $key => $ids) {
				if (array_key_exists($row[$key], $ids)) {
					$row[$key] = $ids[$row[$key]];
				}
			}

			$result[] = $row;
		}

		return $result;
	}

	/**
	 * Prepare data for user.checkAuthentication tests.
	 */
	public function prepareUsersData() {
		$usergroup_data = [
			[
				'name' => 'API test users status enabled',
				'users_status' => GROUP_STATUS_ENABLED,
				'gui_access' => GROUP_GUI_ACCESS_INTERNAL
			],
			[
				'name' => 'API test users status disabled',
				'users_status' => GROUP_STATUS_DISABLED,
				'gui_access' => GROUP_GUI_ACCESS_INTERNAL
			]
		];

		$usergroups = CDataHelper::call('usergroup.create', $usergroup_data);
		$this->assertArrayHasKey('usrgrpids', $usergroups, 'prepareUsersData() failed: Could not create user groups.');

		$usergroupids['users_status_enabled'] = $usergroups['usrgrpids'][0];
		$usergroupids['users_status_disabled'] = $usergroups['usrgrpids'][1];

		$roleids = CDataHelper::call('role.create', [
			[
				'name' => 'test',
				'type' => USER_TYPE_ZABBIX_ADMIN
			]
		]);
		$this->assertArrayHasKey('roleids', $roleids, 'prepareUsersData() failed: Could not create user role.');
		$admin_roleid = $roleids['roleids'][0];

		$users_data = [
			[
				'username' => 'API test user with expired session',
				'roleid' => $admin_roleid,
				'passwd' => 'zabbix123456',
				'usrgrps' => [
					['usrgrpid' => $usergroupids['users_status_enabled']]
				]
			],
			[
				'username' => 'API test user with passive session',
				'roleid' => $admin_roleid,
				'passwd' => 'zabbix123456',
				'usrgrps' => [
					['usrgrpid' => $usergroupids['users_status_enabled']]
				]
			],
			[
				'username' => 'API test user with disabled group',
				'roleid' => $admin_roleid,
				'passwd' => 'zabbix123456',
				'usrgrps' => [
					['usrgrpid' => $usergroupids['users_status_enabled']]
				]
			],
			[
				'username' => 'API test user with valid session',
				'roleid' => $admin_roleid,
				'passwd' => 'zabbix123456',
				'usrgrps' => [
					['usrgrpid' => $usergroupids['users_status_enabled']]
				]
			],
			[
				'username' => 'API test user for extend parameter tests',
				'roleid' => $admin_roleid,
				'passwd' => 'zabbix123456',
				'usrgrps' => [
					['usrgrpid' => $usergroupids['users_status_enabled']]
				]
			]
		];

		$users = CDataHelper::call('user.create', $users_data);
		$this->assertArrayHasKey('userids', $users, 'prepareUsersData() failed: Could not create users.');

		self::$data['userids']['user_with_expired_session'] = $users['userids'][0];
		self::$data['userids']['user_with_passive_session'] = $users['userids'][1];
		self::$data['userids']['user_with_disabled_usergroup'] = $users['userids'][2];
		self::$data['userids']['user_with_valid_session'] = $users['userids'][3];
		self::$data['userids']['user_for_extend_parameter_tests'] = $users['userids'][4];
		self::$data['userids']['user_for_token_tests'] = $users['userids'][0];

		$login_data = [
			[
				'jsonrpc' => '2.0',
				'method' => 'user.login',
				'params' => [
					'username' => 'API test user with expired session',
					'password' => 'zabbix123456'
				],
				'id' => self::$data['userids']['user_with_expired_session']
			],
			[
				'jsonrpc' => '2.0',
				'method' => 'user.login',
				'params' => [
					'username' => 'API test user with passive session',
					'password' => 'zabbix123456'
				],
				'id' => self::$data['userids']['user_with_passive_session']
			],
			[
				'jsonrpc' => '2.0',
				'method' => 'user.login',
				'params' => [
					'username' => 'API test user with disabled group',
					'password' => 'zabbix123456'
				],
				'id' => self::$data['userids']['user_with_disabled_usergroup']
			],
			[
				'jsonrpc' => '2.0',
				'method' => 'user.login',
				'params' => [
					'username' => 'API test user with valid session',
					'password' => 'zabbix123456'
				],
				'id' => self::$data['userids']['user_with_valid_session']
			],
			[
				'jsonrpc' => '2.0',
				'method' => 'user.login',
				'params' => [
					'username' => 'API test user for extend parameter tests',
					'password' => 'zabbix123456'
				],
				'id' => self::$data['userids']['user_for_extend_parameter_tests']
			]
		];

		$login = CDataHelper::callRaw($login_data);
		$this->assertArrayHasKey(0, $login, 'prepareUsersData() failed: Could not login users.');

		self::$data['sessionids']['not_authorized_session'] = 'InvalidSessionID';
		self::$data['sessionids']['expired_session'] = $login[0]['result'];
		self::$data['sessionids']['passive_session'] = $login[1]['result'];
		self::$data['sessionids']['valid_for_user_with_disabled_usergroup'] = $login[2]['result'];
		self::$data['sessionids']['valid'] = $login[3]['result'];
		self::$data['sessionids']['for_extend_parameter_tests'] = $login[4]['result'];

		// Add disabled user group to authenticated user.
		CDataHelper::call('user.update', [
			'userid' => self::$data['userids']['user_with_disabled_usergroup'],
			'usrgrps' => [
				['usrgrpid' => $usergroupids['users_status_disabled']]
			]
		]);

		$now = time();
		self::$data['lastacess_time_for_sessionid_with_extend_tests'] = $now - 1;

		// Data for updating sessions to have different states.
		$session_data = [
			[
				// Update session lastaccess time to expire sessions default active time - 15minutes (900 seconds).
				'values' => ['lastaccess' => $now - 901],
				'where' => ['sessionid' => self::$data['sessionids']['expired_session']]
			],
			[
				// Update session status to passive state.
				'values' => ['status' => ZBX_SESSION_PASSIVE],
				'where' => ['sessionid' => self::$data['sessionids']['passive_session']]
			],
			[
				// Update sessions lastaccess time for test case when user.checkAuthentication extends session time.
				'values' => ['lastaccess' => self::$data['lastacess_time_for_sessionid_with_extend_tests']],
				'where' => ['sessionid' => self::$data['sessionids']['for_extend_parameter_tests']]
			]
		];

		DB::update('sessions', $session_data);

		$token_data = [
			[
				'name' => 'API test expired token',
				'userid' => self::$data['userids']['user_for_token_tests'],
				'status' => ZBX_AUTH_TOKEN_ENABLED,
				'expires_at' => $now - 100
			],
			[
				'name' => 'API test disabled token',
				'userid' => self::$data['userids']['user_for_token_tests'],
				'status' => ZBX_AUTH_TOKEN_DISABLED,
				'expires_at' => $now + 100
			],
			[
				'name' => 'API test valid token',
				'userid' => self::$data['userids']['user_with_valid_session'],
				'status' => ZBX_AUTH_TOKEN_ENABLED,
				'expires_at' => $now + 100
			],
			[
				'name' => 'API test valid token for user with disabled user group',
				'userid' => self::$data['userids']['user_with_disabled_usergroup'],
				'status' => ZBX_AUTH_TOKEN_ENABLED,
				'expires_at' => $now + 100
			]
		];

		$tokenids = CDataHelper::call('token.create', $token_data);
		$this->assertArrayHasKey('tokenids', $tokenids, 'prepareUsersData() failed: Could not create tokens.');

		$tokens = CDataHelper::call('token.generate', $tokenids['tokenids']);
		$this->assertArrayHasKey(0, $tokens, 'prepareUsersData() failed: Could not generate tokens.');

		self::$data['tokens']['not_authorized'] = 'NotAuthorizedTokenString';
		self::$data['tokens']['expired'] = $tokens[0]['token'];
		self::$data['tokens']['disabled'] = $tokens[1]['token'];
		self::$data['tokens']['valid'] = $tokens[2]['token'];
		self::$data['tokens']['valid_for_user_with_disabled_usergroup'] = $tokens[3]['token'];

		$mfaids = CDataHelper::call('mfa.create', [
			[
				'type' => MFA_TYPE_TOTP,
				'name' => 'TOTP test case 1',
				'hash_function' => TOTP_HASH_SHA1,
				'code_length' => TOTP_CODE_LENGTH_8
			],
			[
				'type' => MFA_TYPE_DUO,
				'name' => 'DUO test case 1',
				'api_hostname' => 'api-999a9a99.duosecurity.com',
				'clientid' => 'AAA58NOODEGUA6ST7AAA',
				'client_secret' => '1AaAaAaaAaA7OoB4AaQfV547ARiqOqRNxP32Cult'
			]
		]);
		$this->assertArrayHasKey('mfaids', $mfaids, 'prepareUsersData() failed: Could not create MFA method.');

		self::$data['mfaids']['mfa_totp_1'] = $mfaids['mfaids'][0];
		self::$data['mfaids']['mfa_duo_1'] = $mfaids['mfaids'][1];

		$usergroupids_mfa = CDataHelper::call('usergroup.create', [
			[
				'name' => 'API test users MFA Default',
				'mfaid' => 0,
				'mfa_status' => GROUP_MFA_ENABLED
			],
			[
				'name' => 'API test users MFA Duo',
				'mfaid' => self::$data['mfaids']['mfa_duo_1'],
				'mfa_status' => GROUP_MFA_ENABLED
			]
		]);

		$usergroupids['mfa_default'] = $usergroupids_mfa['usrgrpids'][0];
		$usergroupids['mfa_duo'] = $usergroupids_mfa['usrgrpids'][1];

		CDataHelper::call('authentication.update', [
			'mfa_status' => MFA_ENABLED,
			'mfaid' => self::$data['mfaids']['mfa_totp_1']
		]);

		$userids_mfa = CDataHelper::call('user.create', [
			[
				'username' => 'User with mfa default',
				'roleid' => $admin_roleid,
				'passwd' => 'zabbix123456',
				'usrgrps' => [
					['usrgrpid' => $usergroupids['mfa_default']]
				]
			],
			[
				'username' => 'User with mfa duo',
				'roleid' => $admin_roleid,
				'passwd' => 'zabbix123456',
				'usrgrps' => [
					['usrgrpid' => $usergroupids['mfa_duo']]
				]
			]
		]);

		self::$data['userids']['user_with_mfa_default'] = $userids_mfa['userids'][0];
		self::$data['userids']['user_with_mfa_duo'] = $userids_mfa['userids'][1];

		self::prepareProvisionUsers();
	}

	public static function prepareProvisionUsers() {
		// Role 'Provision user role'.
		self::$data['roleid']['Provision user role'] = CDataHelper::call('role.create', [
			'type' => USER_TYPE_ZABBIX_ADMIN, 'name' => 'Provision user role'
		])['roleids'][0];

		// Group 'Provision user group'.
		self::$data['usrgrpid']['Provision user group'] = CDataHelper::call('usergroup.create', [
			'name' => 'Provision user group'
		])['usrgrpids'][0];

		// Userdirectories 'Provision userdirectory'.
		$data = [
			[
				'idp_type' => IDP_TYPE_LDAP,
				'name' => 'Provision userdirectory',
				'host' => 'ldap://local.ldap',
				'port' => '389',
				'base_dn' => 'test',
				'search_attribute' => 'test',
				'provision_status' => JIT_PROVISIONING_ENABLED,
				'provision_media' => self::resolveIds([
					['name' => 'Provision media mapping email', 'mediatypeid' => 'Email media type', 'attribute' => 'attr1'],
					['name' => 'Provision media mapping sms', 'mediatypeid' => 'SMS media type', 'attribute' => 'attr2']
				]),
				'provision_groups' => self::resolveIds([
					[
						'name' => '#1',
						'roleid' => 'Provision user role',
						'user_groups' => self::resolveIds([['usrgrpid' => 'Provision user group']])
					]
				])
			]
		];
		$result = CDataHelper::call('userdirectory.create', $data);
		self::$data['userdirectoryid'] = array_merge(
			self::$data['userdirectoryid'],
			array_combine(array_column($data, 'name'), $result['userdirectoryids'])
		);
		$userdirectories = CDataHelper::call('userdirectory.get', [
			'output' => [],
			'selectProvisionMedia' => ['userdirectory_mediaid', 'name'],
			'userdirectoryids' => [self::$data['userdirectoryid']['Provision userdirectory']]
		]);

		foreach ($userdirectories as $userdirectory) {
			self::$data['userdirectory_mediaid'] = array_merge(
				self::$data['userdirectory_mediaid'],
				array_column($userdirectory['provision_media'], 'userdirectory_mediaid', 'name')
			);
		}

		// Create provisioned user.
		$provisioned_user = self::resolveIds([[
			'username' => 'Provisioned user',
			'passwd' => 'Z@bbIxPa$$',
			'roleid' => 'Provision user role',
			'usrgrps' => self::resolveIds([['usrgrpid' => 'Provision user group']]),
			'medias' => self::resolveIds([
				['mediatypeid' => 'Email media type', 'sendto' => 'provision@user.local'],
				['mediatypeid' => 'SMS media type', 'sendto' => 'provision-user']
			])
		]])[0];
		$email_userdirectory_mediaid = self::$data['userdirectory_mediaid']['Provision media mapping email'];
		$sms_userdirectory_mediaid = self::$data['userdirectory_mediaid']['Provision media mapping sms'];
		$result = CDataHelper::call('user.create', $provisioned_user);
		self::$data['userid'][$provisioned_user['username']] = $result['userids'][0];
		DB::update('users', [
			'values' => [
				'userdirectoryid' => self::$data['userdirectoryid']['Provision userdirectory']
			],
			'where' => ['userid' => self::$data['userid'][$provisioned_user['username']]]
		]);
		DB::update('media', [
			'values' => ['userdirectory_mediaid' => $email_userdirectory_mediaid],
			'where' => [
				'userid' => self::$data['userid'][$provisioned_user['username']],
				'mediatypeid' => self::$data['mediatypeid']['Email media type']
			]
		]);
		DB::update('media', [
			'values' => ['userdirectory_mediaid' => $sms_userdirectory_mediaid],
			'where' => [
				'userid' => self::$data['userid'][$provisioned_user['username']],
				'mediatypeid' => self::$data['mediatypeid']['SMS media type']
			]
		]);
		$db_user = CDataHelper::call('user.get', [
			'output' => [],
			'selectMedias' => ['mediaid', 'userdirectory_mediaid'],
			'userids' => [self::$data['userid'][$provisioned_user['username']]]
		])[0];
		$user_medias = array_column($db_user['medias'], null, 'userdirectory_mediaid');
		self::$data['mediaid']['Provision media mapping email'] = $user_medias[$email_userdirectory_mediaid]['mediaid'];
		self::$data['mediaid']['Provision media mapping sms'] = $user_medias[$sms_userdirectory_mediaid]['mediaid'];
	}

	public static function dataProviderUserMediaUpdate() {
		return [
			'Property userdirectory_mediaid is not supported in medias for user.update.' => [
				'users' => [[
					'userid' => 'Provisioned user',
					'medias' => [
						[
							'mediaid' => 'Provision media mapping email',
							'userdirectory_mediaid' => 'Provision media mapping email',
							'mediatypeid' => 'Email media type',
							'sendto' => ['provision@user.local']
						],
						[
							'mediaid' => 'Provision media mapping sms',
							'userdirectory_mediaid' => 'Provision media mapping sms',
							'mediatypeid' => 'SMS media type',
							'sendto' => 'provision-user'
						]
					]
				]],
				'expected_error' => 'Invalid parameter "/1/medias/1": unexpected parameter "userdirectory_mediaid".'
			],
			'Duplicate value of mediaid is not allowed.' => [
				'users' => [[
					'userid' => 'Provisioned user',
					'medias' => [
						[
							'mediaid' => 'Provision media mapping email',
							'mediatypeid' => 'Email media type',
							'sendto' => ['provision@user.local']
						],
						[
							'mediaid' => 'Provision media mapping email',
							'mediatypeid' => 'SMS media type',
							'sendto' => 'provision-user'
						]
					]
				]],
				'expected_error' => 'Invalid parameter "/1/medias/2": value (mediaid)=(%d) already exists.'
			],
			'Property mediatypeid cannot be changed for existing provisioned medias.' => [
				'users' => [[
					'userid' => 'Provisioned user',
					'medias' => [
						[
							'mediaid' => 'Provision media mapping email',
							'mediatypeid' => 'SMS media type',
							'sendto' => 'provision-user2'
						],
						[
							'mediaid' => 'Provision media mapping sms',
							'mediatypeid' => 'SMS media type',
							'sendto' => 'provision-user2'
						]
					]
				]],
				'expected_error' => 'Invalid parameter "/1/medias/1": cannot update readonly parameter "mediatypeid" of provisioned user.'
			],
			'Provisioned media cannot be deleted, but without error.' => [
				'users' => [[
					'userid' => 'Provisioned user',
					'medias' => []
				]],
				'expected_error' => null
			],
			'Successfully update provisioned media.' => [
				'users' => [[
					'userid' => 'Provisioned user',
					'medias' => [
						[
							'mediaid' => 'Provision media mapping email',
							'mediatypeid' => 'Email media type',
							'sendto' => ['provision@user.local'],
							'active' => MEDIA_STATUS_DISABLED
						],
						[
							'mediaid' => 'Provision media mapping sms',
							'mediatypeid' => 'SMS media type',
							'sendto' => 'provision-user'
						]
					]
				]],
				'expected_error' => null
			],
			'Successfully add custom media to provisioned media list.' => [
				'users' => [[
					'userid' => 'Provisioned user',
					'medias' => [
						[
							'mediaid' => 'Provision media mapping email',
							'mediatypeid' => 'Email media type',
							'sendto' => ['provision@user.local'],
							'active' => MEDIA_STATUS_DISABLED
						],
						[
							'mediaid' => 'Provision media mapping sms',
							'mediatypeid' => 'SMS media type',
							'sendto' => 'provision-user'
						],
						[
							'mediatypeid' => 'SMS media type',
							'sendto' => 'custom-sendto',
							'active' => MEDIA_STATUS_ACTIVE,
							'severity' => 1,
							'period' => '1-5,9:00-20:00'
						]
					]
				]],
				'expected_error' => null
			],
			'Successfully replace custom media without specifying provisioned media.' => [
				'users' => [[
					'userid' => 'Provisioned user',
					'medias' => [
						[
							'mediaid' => 'Provision media mapping email',
							'mediatypeid' => 'Email media type',
							'sendto' => ['provision@user.local'],
							'active' => MEDIA_STATUS_DISABLED
						],
						[
							'mediaid' => 'Provision media mapping sms',
							'mediatypeid' => 'SMS media type',
							'sendto' => 'provision-user'
						],
						[
							'mediatypeid' => 'SMS media type',
							'sendto' => 'custom-sendto2',
							'active' => MEDIA_STATUS_ACTIVE,
							'severity' => 1,
							'period' => '1-5,9:00-20:00'
						]
					]
				]],
				'expected_error' => null
			]
		];
	}

	/**
	 * Test provisioned media for user update action.
	 *
	 * @dataProvider dataProviderUserMediaUpdate
	 */
	public function testUserMediaUpdate(array $users, ?string $expected_error) {
		$users = self::resolveIds($users);

		foreach($users as &$user) {
			if (array_key_exists('medias', $user)) {
				$user['medias'] = self::resolveIds($user['medias']);
			}
		}
		unset($user);

		if ($expected_error === null || strpos($expected_error, '%') === false) {
			$this->call('user.update', $users, $expected_error);
		}
		else {
			if (CAPIHelper::getSessionId() === null) {
				$this->authorize(PHPUNIT_LOGIN_NAME, PHPUNIT_LOGIN_PWD);
			}

			$response = CAPIHelper::call('user.update', $users);
			$this->assertArrayNotHasKey('result', $response);
			$this->assertArrayHasKey('error', $response);
			$replaceable = sscanf($response['error']['data'], $expected_error);

			if ($replaceable) {
				$expected_error = vsprintf($expected_error, $replaceable);
			}

			$this->assertSame($expected_error, $response['error']['data']);
		}
	}

	public static function getUserData(): array {
		return [
			'Test user.get: "selectRole" (null)' => [
				'request' => [
					'output' => [],
					'selectRole' => null,
					'userids' => ['1']
				],
				'expected_result' => [[
					'userid' => '1'
				]],
				'expected_error' => null
			],
			'Test user.get: "selectRole" (empty string)' => [
				'request' => [
					'output' => [],
					'selectRole' => '',
					'userids' => ['1']
				],
				'expected_result' => [],
				'expected_error' => 'Invalid parameter "/output": value must be "extend".'
			],
			'Test user.get: "selectRole" (invalid parameter "abc")' => [
				'request' => [
					'output' => [],
					'selectRole' => 'abc',
					'userids' => ['1']
				],
				'expected_result' => [],
				'expected_error' => 'Invalid parameter "/output": value must be "extend".'
			],
			'Test user.get: "selectRole" (unsupported parameter "count")' => [
				'request' => [
					'output' => [],
					'selectRole' => 'count',
					'userids' => ['1']
				],
				'expected_result' => [],
				'expected_error' => 'Invalid parameter "/output": value must be "extend".'
			],
			'Test user.get: "selectRole" with extended output' => [
				'request' => [
					'output' => [],
					'selectRole' => 'extend',
					'userids' => ['1']
				],
				'expected_result' => [[
					'userid' => '1',
					'role' => [
						'roleid' => '3',
						'name' => 'Super admin role',
						'type' => '3', // USER_TYPE_SUPER_ADMIN
						'readonly' => '1'
					]
				]],
				'expected_error' => null
			],
			'Test user.get: "selectRole" (empty array)' => [
				'request' => [
					'output' => [],
					'selectRole' => [],
					'userids' => ['1']
				],
				'expected_result' => [[
					'userid' => '1',
					'role' => []
				]],
				'expected_error' => null
			],
			'Test user.get: "selectRole" (invalid array parameter "abc")' => [
				'request' => [
					'output' => [],
					'selectRole' => ['abc'],
					'userids' => ['1']
				],
				'expected_result' => [],
				'expected_error' => 'Invalid parameter "/output/1": value must be one of "roleid", "name", "type", "readonly".'
			],

			'Test user.get: "selectRole" with "roleid"' => [
				'request' => [
					'output' => [],
					'selectRole' => ['roleid'],
					'userids' => ['1']
				],
				'expected_result' => [[
					'userid' => '1',
					'role' => [
						'roleid' => '3'
					]
				]],
				'expected_error' => null
			]
		];
	}

	/**
	 * @dataProvider getUserData
	 */
	public function testUsers_Get(array $request, array $expected_result, ?string $expected_error): void {
		$result = $this->call('user.get', $request, $expected_error);

		if ($expected_error === null) {
			$this->assertSame($expected_result, $result['result']);
		}
	}

	public static function user_create() {
		return [
			// Check user password.
			[
				'user' => [
					'username' => 'API user create without password',
					'roleid' => 1,
					'usrgrps' => [
						['usrgrpid' => 7]
					]
				],
				'User "API user create without password" must have a password, because internal authentication is in effect.'
			],
			// Check user username.
			[
				'user' => [
					'passwd' => 'zabbix',
					'roleid' => 1,
					'usrgrps' => [
						['usrgrpid' => 7]
					]
				],
				'expected_error' => 'Invalid parameter "/1": the parameter "username" is missing.'
			],
			[
				'user' => [
					'username' => '',
					'roleid' => 1,
					'passwd' => 'zabbix',
					'usrgrps' => [
						['usrgrpid' => 7]
					]
				],
				'expected_error' => 'Invalid parameter "/1/username": cannot be empty.'
			],
			[
				'user' => [
					'username' => 'Admin',
					'roleid' => 1,
					'passwd' => 'zabbix',
					'usrgrps' => [
						['usrgrpid' => 7]
					]
				],
				'expected_error' => 'Incorrect value for field "/1/passwd": must be at least 8 characters long.'
			],
			[
				'user' => [
					[
						'username' => 'API create users with the same names',
						'roleid' => 1,
						'passwd' => 'zabbix',
						'usrgrps' => [
							['usrgrpid' => 7]
						]
					],
					[
						'username' => 'API create users with the same names',
						'roleid' => 1,
						'passwd' => 'zabbix',
						'usrgrps' => [
							['usrgrpid' => 7]
						]
					]
				],
				'expected_error' => 'Invalid parameter "/2": value (username)=(API create users with the same names)'.
					' already exists.'
			],
			[
				'user' => [
					'username' => 'qwertyuioplkjhgfdsazxcvbnmqwertyuioplkjhgfdsazxcvbnmqwertyuioplkjhgfdsazxcvbnmqwert'.
						'yuioplkjhgfdsazxcvbnm',
					'roleid' => 1,
					'passwd' => 'zabbix',
					'usrgrps' => [
						'usrgrpid' => 7
					]
				],
				'expected_error' => 'Invalid parameter "/1/username": value is too long.'
			],
			// Check user group.
			[
				'user' => [
					'username' => 'Group unexpected parameter',
					'roleid' => 1,
					'passwd' => 'zabbix',
					'usrgrps' => [
						['userid' => '1']
					]
				],
				'expected_error' => 'Invalid parameter "/1/usrgrps/1": unexpected parameter "userid".'
			],
			[
				'user' => [
					'username' => 'User with empty group id',
					'roleid' => 1,
					'passwd' => 'zabbix',
					'usrgrps' => [
						['usrgrpid' => '']
					]
				],
				'expected_error' => 'Invalid parameter "/1/usrgrps/1/usrgrpid": a number is expected.'
			],
			[
				'user' => [
					'username' => 'User group id not number',
					'roleid' => 1,
					'passwd' => 'zabbix',
					'usrgrps' => [
						['usrgrpid' => 'abc']
					]
				],
				'expected_error' => 'Invalid parameter "/1/usrgrps/1/usrgrpid": a number is expected.'
			],
			[
				'user' => [
					'username' => 'User group id not valid',
					'roleid' => 1,
					'passwd' => 'zabbix',
					'usrgrps' => [
						['usrgrpid' => '1.1']
					]
				],
				'expected_error' => 'Invalid parameter "/1/usrgrps/1/usrgrpid": a number is expected.'
			],
			[
				'user' => [
					'username' => 'User with nonexistent group id',
					'roleid' => 1,
					'passwd' => 'Z@bb1x1234',
					'usrgrps' => [
						['usrgrpid' => '123456']
					]
				],
				'expected_error' => 'Invalid parameter "/1/usrgrps/1": object does not exist.'
			],
			[
				'user' => [
					'username' => 'User with two identical user group id',
					'roleid' => 1,
					'passwd' => 'zabbix',
					'usrgrps' => [
						['usrgrpid' => '7'],
						['usrgrpid' => '7']
					]
				],
				'expected_error' => 'Invalid parameter "/1/usrgrps/2": value (usrgrpid)=(7) already exists.'
			],
			'Can create user without user groups' => [
				'user' => [[
					'username' => 'Can create user without user groups',
					'roleid' => 1,
					'passwd' => 'zabbix123456',
					'usrgrps' => []
				]],
				'expected_error' => null
			],
			// Roleid is as a string.
			[
				'user' => [
					[
						'username' => 'API user create 1',
						'roleid' => 'twenty_five',
						'passwd' => 'zabbix',
						'usrgrps' => [
							['usrgrpid' => 7]
						]
					]
				],
				'expected_error' => 'Invalid parameter "/1/roleid": a number is expected.'
			],
			'Can create user without role' => [
				'user' => [[
					'username' => 'Can create user without role',
					'passwd' => 'zabbix123456',
					'usrgrps' => [['usrgrpid' => 7]],
					'roleid' => 0
				]],
				'expected_error' => null
			],
			// Check successfully creation of user.
			[
				'user' => [
					[
						'username' => 'API user create 1',
						'roleid' => 1,
						'passwd' => 'Z@bb1x1234',
						'usrgrps' => [
							['usrgrpid' => 7]
						]
					]
				],
				'expected_error' => null
			],
			[
				'user' => [
					[
						'username' => '☺',
						'roleid' => 1,
						'passwd' => 'O0o@O0o@',
						'usrgrps' => [
							['usrgrpid' => 7]
						]
					]
				],
				'expected_error' => null
			],
			[
				'user' => [
					[
						'username' => 'УТФ Юзер',
						'roleid' => 1,
						'passwd' => 'Z@bb1x1234',
						'usrgrps' => [
							['usrgrpid' => 7]
						]
					]
				],
				'expected_error' => null
			],
			[
				'user' => [
					[
						'username' => 'API user create with media',
						'roleid' => 1,
						'passwd' => 'Z@bb1x1234',
						'usrgrps' => [
							['usrgrpid' => 7]
						],
						'medias' => [
							[
								'mediatypeid' => '1',
								'sendto' => 'api@zabbix.com'
							]
						]
					]
				],
				'expected_error' => null
			],
			[
				'user' => [
					[
						'username' => 'API user create provisioned user',
						'userdirectoryid' => 1234
					]
				],
				'expected_error' => 'Invalid parameter "/1": unexpected parameter "userdirectoryid".'
			]
		];
	}

	/**
	 * @dataProvider user_create
	 */
	public function testUsers_Create($user, $expected_error) {
		$result = $this->call('user.create', $user, $expected_error);

		if ($expected_error === null) {
			$this->assertArrayHasKey('userids', $result['result']);

			foreach ($result['result']['userids'] as $key => $id) {
				$dbResultUser = DBSelect('select * from users where userid='.zbx_dbstr($id));
				$dbRowUser = DBFetch($dbResultUser);
				$this->assertEquals($dbRowUser['username'], $user[$key]['username']);
				$this->assertEquals($dbRowUser['name'], '');
				$this->assertEquals($dbRowUser['surname'], '');
				$this->assertEquals($dbRowUser['autologin'], 0);
				$this->assertEquals($dbRowUser['autologout'], '15m');
				$this->assertEquals($dbRowUser['lang'], 'default');
				$this->assertEquals($dbRowUser['refresh'], '30s');
				$this->assertEquals($dbRowUser['rows_per_page'], 50);
				$this->assertEquals($dbRowUser['theme'], 'default');
				$this->assertEquals($dbRowUser['url'], '');

				if (array_key_exists('usrgrps', $user[$key]) && $user[$key]['usrgrps']) {
					$this->assertEquals(1, CDBHelper::getCount(
						'select * from users_groups where userid='.zbx_dbstr($id).
							' and usrgrpid='.zbx_dbstr($user[$key]['usrgrps'][0]['usrgrpid']))
					);
				}

				if (array_key_exists('medias', $user[$key])) {
					$dbResultMedia = DBSelect('select * from media where userid='.$id);
					$dbRowMedia = DBFetch($dbResultMedia);
					$this->assertEquals($dbRowMedia['mediatypeid'], $user[$key]['medias'][0]['mediatypeid']);
					$this->assertEquals($dbRowMedia['sendto'], $user[$key]['medias'][0]['sendto']);
					$this->assertEquals($dbRowMedia['active'], 0);
					$this->assertEquals($dbRowMedia['severity'], 63);
					$this->assertEquals($dbRowMedia['period'], '1-7,00:00-24:00');
				}
				else {
					$dbResultGroup = 'select * from media where userid='.$id;
					$this->assertEquals(0, CDBHelper::getCount($dbResultGroup));
				}
			}
		}
	}

	/**
	 * Create user with multiple email address
	 */
	public function testUsers_CreateUserWithMultipleEmails() {
		$user = [
			'username' => 'API user create with multiple emails',
			'roleid' => 1,
			'passwd' => 'Z@bb1x1234',
			'usrgrps' => [
				['usrgrpid' => 7]
			],
			'medias' => [
				[
					'mediatypeid' => '1',
					'sendto' => ["api1@zabbix.com","Api test <api2@zabbix.com>","АПИ test ☺æų <api2@zabbix.com>"]
				]
			]
		];

		$result = $this->call('user.create', $user);
		$id = $result['result']['userids'][0];
		$this->assertEquals(1, CDBHelper::getCount('select * from users where userid='.zbx_dbstr($id)));

		$dbResultMedia = DBSelect('select * from media where userid='.zbx_dbstr($id));
		$dbRowMedia = DBFetch($dbResultMedia);
		$diff = array_diff($user['medias'][0]['sendto'], explode("\n", $dbRowMedia['sendto']));
		$this->assertEquals(0, count($diff));
	}

	public static function user_update() {
		return [
			// Check user id.
			[
				'user' => [[
					'username' => 'API user update without userid'
				]],
				'expected_error' => 'Invalid parameter "/1": the parameter "userid" is missing.'
			],
			[
				'user' => [[
					'username' => 'API user update with empty userid',
					'userid' => ''
				]],
				'expected_error' => 'Invalid parameter "/1/userid": a number is expected.'
			],
			[
				'user' => [[
					'username' => 'API user update with nonexistent userid',
					'userid' => '1.1'
				]],
				'expected_error' => 'Invalid parameter "/1/userid": a number is expected.'
			],
			[
				'user' => [[
					'username' => 'API user update with nonexistent userid',
					'userid' => 'abc'
				]],
				'expected_error' => 'Invalid parameter "/1/userid": a number is expected.'
			],
			[
				'user' => [[
					'username' => 'API user update with nonexistent userid',
					'userid' => '123456'
				]],
				'expected_error' => 'No permissions to referred object or it does not exist!'
			],
			[
				'user' => [
					[
						'userid' => '9',
						'username' => 'API update users with the same id1'
					],
					[
						'userid' => '9',
						'username' => 'API update users with the same id2'
					]
				],
				'expected_error' => 'Invalid parameter "/2": value (userid)=(9) already exists.'
			],
			// Check user password.
			[
				'user' => [[
					'userid' => '2',
					'passwd' => 'Z@bb1x1234'
				]],
				'expected_error' => 'Not allowed to set password for user "guest".'
			],
			// Check super admin type user password change for oneself.
			[
				'user' => [[
					'userid' => '1',
					'passwd' => 'Z@bb1x1234'
				]],
				'expected_error' => 'Current password is mandatory.'
			],
			[
				'user' => [[
					'userid' => '1',
					'current_passwd' => 'test1234',
					'passwd' => 'test1234'
				]],
				'expected_error' => 'Incorrect current password.'
			],
			// Check user username.
			[
				'user' => [[
					'userid' => '9',
					'username' => ''
				]],
				'expected_error' => 'Invalid parameter "/1/username": cannot be empty.'
			],
			[
				'user' => [[
					'userid' => '2',
					'username' => 'Try to rename guest'
				]],
				'expected_error' => 'Cannot rename guest user.'
			],
			[
				'user' => [[
					'userid' => '9',
					'username' => 'Admin'
				]],
				'expected_error' => 'User with username "Admin" already exists.'
			],
			[
				'user' => [
					[
						'userid' => '9',
						'username' => 'API update users with the same username'
					],
					[
						'userid' => '10',
						'username' => 'API update users with the same username'
					]
				],
				'expected_error' => 'Invalid parameter "/2": value'.
					' (username)=(API update users with the same username) already exists.'
			],
			[
				'user' => [[
					'userid' => '9',
					'username' => 'qwertyuioplkjhgfdsazxcvbnmqwertyuioplkjhgfdsazxcvbnmqwertyuioplkjhgfdsazxcvbnmqwert'.
						'yuioplkjhgfdsazxcvbnm'
				]],
				'expected_error' => 'Invalid parameter "/1/username": value is too long.'
			],
			// Check user group.
			[
				'user' => [[
					'userid' => '9',
					'username' => 'Group unexpected parameter',
					'usrgrps' => [
						['userid' => '1']
					]
				]],
				'expected_error' => 'Invalid parameter "/1/usrgrps/1": unexpected parameter "userid".'
			],
			[
				'user' => [[
					'userid' => '9',
					'username' => 'User with empty group id',
					'usrgrps' => [
						['usrgrpid' => '']
					]
				]],
				'expected_error' => 'Invalid parameter "/1/usrgrps/1/usrgrpid": a number is expected.'
			],
			[
				'user' => [[
					'userid' => '9',
					'username' => 'User group id not number',
					'usrgrps' => [
						['usrgrpid' => 'abc']
					]
				]],
				'expected_error' => 'Invalid parameter "/1/usrgrps/1/usrgrpid": a number is expected.'
			],
			[
				'user' => [[
					'userid' => '9',
					'username' => 'User group id not valid',
					'usrgrps' => [
						['usrgrpid' => '1.1']
					]
				]],
				'expected_error' => 'Invalid parameter "/1/usrgrps/1/usrgrpid": a number is expected.'
			],
			[
				'user' => [[
					'userid' => '9',
					'username' => 'User with nonexistent group id',
					'usrgrps' => [
						['usrgrpid' => '123456']
					]
				]],
				'expected_error' => 'Invalid parameter "/1/usrgrps/1": object does not exist.'
			],
			[
				'user' => [[
					'userid' => '9',
					'username' => 'User with two identical user group id',
					'usrgrps' => [
						['usrgrpid' => '7'],
						['usrgrpid' => '7']
					]
				]],
				'expected_error' => 'Invalid parameter "/1/usrgrps/2": value (usrgrpid)=(7) already exists.'
			],
			'Groups can be removed when updating user' => [
				'user' => [[
					'userid' => '9',
					'username' => 'User without user groups',
					'usrgrps' => []
				]],
				'expected_error' => null
			],
			// Check user group, admin can't add oneself to a disabled group or a group with disabled GUI access.
			[
				'user' => [[
					'userid' => '1',
					'username' => 'Try to add user to group with disabled GUI access',
					'usrgrps' => [
						['usrgrpid' => '12']
					]
				]],
				'expected_error' => 'User cannot add oneself to a disabled group or a group with disabled GUI access.'
			],
			[
				'user' => [[
					'userid' => '1',
					'username' => 'Try to add user to a disabled group',
					'usrgrps' => [
						['usrgrpid' => '9']
					]
				]],
				'expected_error' => 'User cannot add oneself to a disabled group or a group with disabled GUI access.'
			],
			// Check user properties, super-admin user type.
			[
				'user' => [[
					'userid' => '1',
					'username' => 'Try to change super-admin user type',
					'roleid' => '2'
				]],
				'expected_error' => 'At least one active user must exist with role "Super admin role".'
			],
			// Successfully user update.
			[
				'user' => [
					[
						'userid' => '9',
						'username' => 'API user updated',
						'passwd' => 'Z@bb1x1234',
						'usrgrps' => [
							['usrgrpid' => 7]
						]
					]
				],
				'expected_error' => null
			],
			[
				'user' => [
					[
						'userid' => '9',
						'username' => 'УТФ Юзер обновлённ',
						'passwd' => 'Z@bb1x1234',
						'usrgrps' => [
							['usrgrpid' => 7]
						]
					]
				],
				'expected_error' => null
			],
			[
				'user' => [
					[
						'userid' => '9',
						'username' => 'API user update with media',
						'passwd' => 'Z@bb1x1234',
						'usrgrps' => [
							['usrgrpid' => 7]
						],
						'medias' => [
							[
								'mediatypeid' => '1',
								'sendto' => 'api@zabbix.com'
							]
						]
					]
				],
				'expected_error' => null
			],
			// Check super admin type user password change for another super admin type user.
			[
				'user' => [
					[
						'userid' => '16',
						'username' => 'api-user-for-password-super-admin',
						'passwd' => 'GreatNewP',
						'usrgrps' => [
							['usrgrpid' => 7]
						]
					]
				],
				'expected_error' => null
			],
			'Cannot update provisioned user readonly field username.' => [
				'users' => [[
					'userid' => 'Provisioned user',
					'username' => 'other-username-value'
				]],
				'expected_error' => 'Invalid parameter "/1": cannot update readonly parameter "username" of provisioned user.'
			],
			'Cannot update provisioned user readonly field password.' => [
				'users' => [[
					'userid' => 'Provisioned user',
					'passwd' => 'Z@BB1X@dmln'
				]],
				'expected_error' => 'Invalid parameter "/1": cannot update readonly parameter "passwd" of provisioned user.'
			],
			'Cannot update user userdirectoryid to make provisioned user not provisioned.' => [
				'users' => [[
					'userid' => 'Provisioned user',
					'userdirectoryid' => 0
				]],
				'expected_error' => 'Invalid parameter "/1": unexpected parameter "userdirectoryid".'
			],
			'Cannot update user userdirectoryid to make user provisioned.' => [
				'user' => [
					[
						'userid' => 'API test user with disabled group',
						'userdirectoryid' => 'Provision userdirectory'
					]
				],
				'expected_error' => 'Invalid parameter "/1": unexpected parameter "userdirectoryid".'
			],
			'Role roleid can be removed when updating user' => [
				'user' => [[
					'userid' => '9',
					'username' => 'Role roleid can be removed when updating user',
					'medias' => [['mediatypeid' => '1', 'sendto' => 'api@zabbix.com']],
					'roleid' => 0
				]],
				'expected_error' => null
			]
		];
	}

	/**
	 * @dataProvider user_update
	 */
	public function testUsers_Update($users, $expected_error) {
		$users = self::resolveIds($users);

		foreach ($users as $user) {
			if (array_key_exists('userid', $user) && filter_var($user['userid'], FILTER_VALIDATE_INT)
					&& $expected_error !== null) {
				$sqlUser = "select * from users where userid=".zbx_dbstr($user['userid']);
				$oldHashUser = CDBHelper::getHash($sqlUser);
			}
		}

		$result = $this->call('user.update', $users, $expected_error);

		if ($expected_error === null) {
			$this->assertArrayHasKey('userids', $result['result']);

			foreach ($result['result']['userids'] as $key => $id) {
				$dbResultUser = DBSelect('select * from users where userid='.zbx_dbstr($id));
				$dbRowUser = DBFetch($dbResultUser);
				$this->assertEquals($dbRowUser['username'], $users[$key]['username']);
				$this->assertEquals($dbRowUser['name'], '');
				$this->assertEquals($dbRowUser['surname'], '');
				$this->assertEquals($dbRowUser['autologin'], 0);
				$this->assertEquals($dbRowUser['autologout'], '15m');
				$this->assertEquals($dbRowUser['lang'], 'en_US');
				$this->assertEquals($dbRowUser['refresh'], '30s');
				$this->assertEquals($dbRowUser['rows_per_page'], 50);
				$this->assertEquals($dbRowUser['theme'], 'default');
				$this->assertEquals($dbRowUser['url'], '');

				if ($id == '16') {
					$this->assertEquals(1, password_verify('GreatNewP', $dbRowUser['passwd']));
				}

				if (array_key_exists('usrgrps', $users[$key]) && $users[$key]['usrgrps']) {
					$this->assertEquals(1, CDBHelper::getCount(
						'select * from users_groups where userid='.zbx_dbstr($id).
							' and usrgrpid='.zbx_dbstr($users[$key]['usrgrps'][0]['usrgrpid']))
					);
				}

				if (array_key_exists('medias', $users[$key])) {
					$dbResultMedia = DBSelect('select * from media where userid='.zbx_dbstr($id));
					$dbRowMedia = DBFetch($dbResultMedia);
					$this->assertEquals($dbRowMedia['mediatypeid'], $users[$key]['medias'][0]['mediatypeid']);
					$this->assertEquals($dbRowMedia['sendto'], $users[$key]['medias'][0]['sendto']);
					$this->assertEquals($dbRowMedia['active'], 0);
					$this->assertEquals($dbRowMedia['severity'], 63);
					$this->assertEquals($dbRowMedia['period'], '1-7,00:00-24:00');
				}
				else {
					$dbResultGroup = 'select * from media where userid='.zbx_dbstr($id);
					$this->assertEquals(0, CDBHelper::getCount($dbResultGroup));
				}
			}
		}
		else {
			if (isset($oldHashUser)) {
				$this->assertEquals($oldHashUser, CDBHelper::getHash($sqlUser));
			}
		}
	}

	public static function user_password() {
		return [
			[
				'method' => 'user.update',
				'login' => ['user' => 'api-user-for-password-user', 'password' => 'test1234u'],
				'user' => [
					'userid' => '17',
					'passwd' => 'trytochangep',
					'username' => 'api-user-for-password-user'
				],
				'expected_error' => 'Current password is mandatory.'
			],
			[
				'method' => 'user.update',
				'login' => ['user' => 'api-user-for-password-user', 'password' => 'test1234u'],
				'user' => [
					'userid' => '17',
					'passwd' => 'TryToChangeP',
					'current_passwd' => 'IncorrectCurrentP',
					'username' => 'api-user-for-password-user'
				],
				'expected_error' => 'Incorrect current password.'
			],
			// Successfully user update.
			[
				'method' => 'user.update',
				'login' => ['user' => 'api-user-for-password-user', 'password' => 'test1234u'],
				'user' => [
					'userid' => '17',
					'passwd' => 'AcceptableNewP',
					'current_passwd' => 'test1234u',
					'username' => 'api-user-for-password-user'
				],
				'expected_error' => null
			]
		];
	}

	/**
	* @dataProvider user_password
	*/
	public function testUser_UpdatePassword($method, $login, $user, $expected_error) {
		$this->authorize($login['user'], $login['password']);
		$this->call($method, $user, $expected_error);
	}

	public static function user_properties() {
		return [
			// Check readonly parameter.
			[
				'user' => [
					'username' => 'Unexpected parameter attempt_clock',
					'passwd' => 'zabbix',
					'attempt_clock' => '0',
					'usrgrps' => [
						['usrgrpid' => 7]
					]
				],
				'expected_error' => 'Invalid parameter "/1": unexpected parameter "attempt_clock".'
			],
			[
				'user' => [
					'username' => 'Unexpected parameter attempt_failed',
					'passwd' => 'zabbix',
					'attempt_failed' => '3',
					'usrgrps' => [
						['usrgrpid' => 7]
					]
				],
				'expected_error' => 'Invalid parameter "/1": unexpected parameter "attempt_failed".'
			],
			[
				'user' => [
					'username' => 'Unexpected parameter attempt_ip',
					'passwd' => 'zabbix',
					'attempt_ip' => '127.0.0.1',
					'usrgrps' => [
						['usrgrpid' => 7]
					]
				],
				'expected_error' => 'Invalid parameter "/1": unexpected parameter "attempt_ip".'
			],
			// Check user properties, name and surname.
			[
				'user' => [
					'username' => 'User with long name',
					'passwd' => 'zabbix',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'name' => 'qwertyuioplkjhgfdsazxcvbnmqwertyuioplkjhgfdsazxcvbnmqwertyuioplkjhgfdsazxcvbnmqwertyuioplkjhgfdsazxcvbnm'
				],
				'expected_error' => 'Invalid parameter "/1/name": value is too long.'
			],
			[
				'user' => [
					'username' => 'User with long surname',
					'passwd' => 'zabbix',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'surname' => 'qwertyuioplkjhgfdsazxcvbnmqwertyuioplkjhgfdsazxcvbnmqwertyuioplkjhgfdsazxcvbnmqwertyuioplkjhgfdsazxcvbnm'
				],
				'expected_error' => 'Invalid parameter "/1/surname": value is too long.'
			],
			// Check user properties, autologin.
			[
				'user' => [
					'username' => 'User with invalid autologin',
					'passwd' => 'zabbix',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'autologin' => ''
				],
				'expected_error' => 'Invalid parameter "/1/autologin": an integer is expected.'
			],
			[
				'user' => [
					'username' => 'User with invalid autologin',
					'passwd' => 'zabbix',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'autologin' => '2'
				],
				'expected_error' => 'Invalid parameter "/1/autologin": value must be one of 0, 1.'
			],
			[
				'user' => [
					'username' => 'User with invalid autologin',
					'passwd' => 'zabbix',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'autologin' => '-1'
				],
				'expected_error' => 'Invalid parameter "/1/autologin": value must be one of 0, 1.'
			],
			// Check user properties, autologout.
			[
				'user' => [
					'username' => 'User with invalid autologout',
					'passwd' => 'zabbix',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'autologout' => ''
				],
				'expected_error' => 'Invalid parameter "/1/autologout": cannot be empty.'
			],
			[
				'user' => [
					'username' => 'User with invalid autologout',
					'passwd' => 'zabbix',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'autologout' => '86401'
				],
				'expected_error' => 'Invalid parameter "/1/autologout": value must be one of 0, 90-86400.'
			],
			[
				'user' => [
					'username' => 'User with invalid autologout',
					'passwd' => 'zabbix',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'autologout' => '1'
				],
				'expected_error' => 'Invalid parameter "/1/autologout": value must be one of 0, 90-86400.'
			],
			[
				'user' => [
					'username' => 'User with invalid autologout',
					'passwd' => 'zabbix',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'autologout' => '89'
				],
				'expected_error' => 'Invalid parameter "/1/autologout": value must be one of 0, 90-86400.'
			],
			[
				'user' => [
					'username' => 'User with autologout and autologin together',
					'roleid' => 1,
					'passwd' => 'zabbix',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'autologout' => '90',
					'autologin' => '1'
				],
				'expected_error' => 'Auto-login and auto-logout options cannot be enabled together.'
			],
			// Check user properties, lang.
			[
				'user' => [
					'username' => 'User with empty lang',
					'passwd' => 'zabbix',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'lang' => ''
				],
				'expected_error' => 'Invalid parameter "/1/lang": cannot be empty.'
			],
			[
				'user' => [
					'username' => 'User with invalid lang',
					'passwd' => 'zabbix',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'lang' => '123456'
				],
				'expected_error' => 'Invalid parameter "/1/lang": value must be one of "default", "en_GB", "en_US", "bg_BG", "ca_ES", "zh_CN", "zh_TW", "cs_CZ", "da_DK", "nl_NL", "fi_FI", "fr_FR", "ka_GE", "de_DE", "el_GR", "he_IL", "hu_HU", "id_ID", "it_IT", "ko_KR", "ja_JP", "lv_LV", "lt_LT", "nb_NO", "fa_IR", "pl_PL", "pt_BR", "pt_PT", "ro_RO", "ru_RU", "sk_SK", "es_ES", "sv_SE", "tr_TR", "uk_UA", "vi_VN".'
			],
			// Check user properties, theme.
			[
				'user' => [
					'username' => 'User with empty theme',
					'passwd' => 'zabbix',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'theme' => ''
				],
				'expected_error' => 'Invalid parameter "/1/theme": value must be one of "default", "blue-theme", "dark-theme", "hc-light", "hc-dark".'
			],
			[
				'user' => [
					'username' => 'User with invalid theme',
					'passwd' => 'zabbix',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'theme' => 'classic'
				],
				'expected_error' => 'Invalid parameter "/1/theme": value must be one of "default", "blue-theme", "dark-theme", "hc-light", "hc-dark".'
			],
			[
				'user' => [
					'username' => 'User with invalid theme',
					'passwd' => 'zabbix',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'theme' => 'originalblue'
				],
				'expected_error' => 'Invalid parameter "/1/theme": value must be one of "default", "blue-theme", "dark-theme", "hc-light", "hc-dark".'
			],
			// Check user properties, type.
			[
				'user' => [
					'username' => 'User with empty roleid',
					'roleid' => '',
					'passwd' => 'zabbix',
					'usrgrps' => [
						['usrgrpid' => '7']
					]
				],
				'expected_error' => 'Invalid parameter "/1/roleid": a number is expected.'
			],
			[
				'user' => [
					'username' => 'User with invalid roleid',
					'roleid' => '1.1',
					'passwd' => 'zabbix',
					'usrgrps' => [
						['usrgrpid' => '7']
					]
				],
				'expected_error' => 'Invalid parameter "/1/roleid": a number is expected.'
			],
			// Check user properties, refresh.
			[
				'user' => [
					'username' => 'User with empty refresh',
					'passwd' => 'zabbix',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'refresh' => ''
				],
				'expected_error' => 'Invalid parameter "/1/refresh": cannot be empty.'
			],
			[
				'user' => [
					'username' => 'User with invalid refresh',
					'passwd' => 'zabbix',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'refresh' => '3601'
				],
				'expected_error' => 'Invalid parameter "/1/refresh": value must be one of 0-3600.'
			],
			[
				'user' => [
					'username' => 'User with invalid refresh',
					'passwd' => 'zabbix',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'refresh' => '1.1'
				],
				'expected_error' => 'Invalid parameter "/1/refresh": a time unit is expected.'
			],
			// Check user properties, rows_per_page.
			[
				'user' => [
					'username' => 'User with empty rows_per_page',
					'passwd' => 'zabbix',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'rows_per_page' => ''
				],
				'expected_error' => 'Invalid parameter "/1/rows_per_page": an integer is expected.'
			],
			[
				'user' => [
					'username' => 'User with invalid rows_per_page',
					'passwd' => 'zabbix',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'rows_per_page' => '0'
				],
				'expected_error' => 'Invalid parameter "/1/rows_per_page": value must be one of 1-999999.'
			],
			[
				'user' => [
					'username' => 'User with invalid rows_per_page',
					'passwd' => 'zabbix',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'rows_per_page' => '1000000'
				],
				'expected_error' => 'Invalid parameter "/1/rows_per_page": value must be one of 1-999999.'
			],
			// Check user media, mediatypeid.
			[
				'user' => [
					'username' => 'User without medias properties',
					'roleid' => 1,
					'passwd' => 'zabbix123456',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'medias' => [[ ]]
				],
				'expected_error' => 'Invalid parameter "/1/medias/1": the parameter "mediatypeid" is missing.'
			],
			[
				'user' => [
					'username' => 'User with empty mediatypeid',
					'roleid' => 1,
					'passwd' => 'zabbix123456',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'medias' => [
						[
							'mediatypeid' => ''
						]
					]
				],
				'expected_error' => 'Invalid parameter "/1/medias/1/mediatypeid": a number is expected.'
			],
			[
				'user' => [
					'username' => 'User with invalid mediatypeid',
					'roleid' => 1,
					'passwd' => 'zabbix123456',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'medias' => [
						[
							'mediatypeid' => '1.1'
						]
					]
				],
				'expected_error' => 'Invalid parameter "/1/medias/1/mediatypeid": a number is expected.'
			],
			[
				'user' => [
					'username' => 'User with nonexistent media type id',
					'roleid' => 1,
					'passwd' => 'Z@bb1x1234',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'medias' => [
						[
							'mediatypeid' => '1234',
							'sendto' => 'api@zabbix.com'
						]
					]
				],
				'expected_error' => 'Invalid parameter "/1/medias/1/mediatypeid": object does not exist.'
			],
			// Check user media, sendto.
			[
				'user' => [
					'username' => 'User without sendto',
					'roleid' => 1,
					'passwd' => 'zabbix123456',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'medias' => [
						[
							'mediatypeid' => '1'
						]
					]
				],
				'expected_error' => 'Invalid parameter "/1/medias/1": the parameter "sendto" is missing.'
			],
			[
				'user' => [
					'username' => 'User with empty sendto',
					'roleid' => 1,
					'passwd' => 'Z@bb1x1234',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'medias' => [
						[
							'mediatypeid' => '1',
							'sendto' => ''
						]
					]
				],
				'expected_error' => 'Invalid parameter "/1/medias/1/sendto/1": cannot be empty.'
			],
			[
				'user' => [
					'username' => 'User with empty sendto',
					'roleid' => 1,
					'passwd' => 'zabbix123456',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'medias' => [
						[
							'mediatypeid' => '1',
							'sendto' => [[]]
						]
					]
				],
				'expected_error' => 'Invalid parameter "/1/medias/1/sendto/1": a character string is expected.'
			],
			[
				'user' => [
					'username' => 'User with empty sendto',
					'roleid' => 1,
					'passwd' => 'zabbix123456',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'medias' => [
						[
							'mediatypeid' => '1',
							'sendto' => []
						]
					]
				],
				'expected_error' => 'Invalid parameter "/1/medias/1/sendto": cannot be empty.'
			],
			[
				'user' => [
					'username' => 'User with empty sendto',
					'roleid' => 1,
					'passwd' => 'Z@bb1x1234',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'medias' => [
						[
							'mediatypeid' => '1',
							'sendto' => [""]
						]
					]
				],
				'expected_error' => 'Invalid parameter "/1/medias/1/sendto/1": cannot be empty.'
			],
			[
				'user' => [
					'username' => 'User with empty second email',
					'roleid' => 1,
					'passwd' => 'Z@bb1x1234',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'medias' => [
						[
							'mediatypeid' => '1',
							'sendto' => ["test1@zabbix.com",""]
						]
					]
				],
				'expected_error' => 'Invalid parameter "/1/medias/1/sendto/2": cannot be empty.'
			],
			[
				'user' => [
					'username' => 'User with invalid email',
					'roleid' => 1,
					'passwd' => 'Z@bb1x1234',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'medias' => [
						[
							'mediatypeid' => '1',
							'sendto' => ["test1zabbix.com"]
						]
					]
				],
				'expected_error' => 'Invalid parameter "/1/medias/1/sendto/1": an email address is expected.'
			],
			[
				'user' => [
					'username' => 'User with invalid email',
					'roleid' => 1,
					'passwd' => 'Z@bb1x1234',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'medias' => [
						[
							'mediatypeid' => '1',
							'sendto' => ["test1@zabbixcom"]
						]
					]
				],
				'expected_error' => 'Invalid parameter "/1/medias/1/sendto/1": an email address is expected.'
			],
			[
				'user' => [
					'username' => 'User with invalid email',
					'roleid' => 1,
					'passwd' => 'Z@bb1x1234',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'medias' => [
						[
							'mediatypeid' => '1',
							'sendto' => ["test1@@zabbix.com"]
						]
					]
				],
				'expected_error' => 'Invalid parameter "/1/medias/1/sendto/1": an email address is expected.'
			],
			[
				'user' => [
					'username' => 'User with invalid email',
					'roleid' => 1,
					'passwd' => 'Z@bb1x1234',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'medias' => [
						[
							'mediatypeid' => '1',
							'sendto' => ["test1 test2@zabbix.com"]
						]
					]
				],
				'expected_error' => 'Invalid parameter "/1/medias/1/sendto/1": an email address is expected.'
			],
			[
				'user' => [
					'username' => 'User with invalid email',
					'roleid' => 1,
					'passwd' => 'Z@bb1x1234',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'medias' => [
						[
							'mediatypeid' => '1',
							'sendto' => ["<test1@zabbix.com> test2"]
						]
					]
				],
				'expected_error' => 'Invalid parameter "/1/medias/1/sendto/1": an email address is expected.'
			],
			[
				'user' => [
					'username' => 'User with invalid email',
					'roleid' => 1,
					'passwd' => 'Z@bb1x1234',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'medias' => [
						[
							'mediatypeid' => '1',
							'sendto' => ["test1@zabbix.com, a,b"]
						]
					]
				],
				'expected_error' => 'Invalid parameter "/1/medias/1/sendto/1": an email address is expected.'
			],
			[
				'user' => [
					'username' => 'User with invalid email',
					'roleid' => 1,
					'passwd' => 'Z@bb1x1234',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'medias' => [
						[
							'mediatypeid' => '1',
							'sendto' => ["test1@zabbix.com,test2@zabbix.com"]
						]
					]
				],
				'expected_error' => 'Invalid parameter "/1/medias/1/sendto/1": an email address is expected.'
			],
			// Check user media, active.
			[
				'user' => [
					'username' => 'User with empty active',
					'roleid' => 1,
					'passwd' => 'zabbix123456',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'medias' => [
						[
							'mediatypeid' => '1',
							'sendto' => 'api@zabbix.com',
							'active' => ''
						]
					]
				],
				'expected_error' => 'Invalid parameter "/1/medias/1/active": an integer is expected.'
			],
			[
				'user' => [
					'username' => 'User with invalid active',
					'roleid' => 1,
					'passwd' => 'zabbix123456',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'medias' => [
						[
						'mediatypeid' => '1',
						'sendto' => 'api@zabbix.com',
						'active' => '1.1'
						]
					]
				],
				'expected_error' => 'Invalid parameter "/1/medias/1/active": an integer is expected.'
			],
			[
				'user' => [
					'username' => 'User with invalid active',
					'roleid' => 1,
					'passwd' => 'zabbix123456',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'medias' => [
						[
						'mediatypeid' => '1',
						'sendto' => 'api@zabbix.com',
						'active' => '2'
						]
					]
				],
				'expected_error' => 'Invalid parameter "/1/medias/1/active": value must be one of 0, 1.'
			],
			// Check user media, severity.
			[
				'user' => [
					'username' => 'User with empty severity',
					'roleid' => 1,
					'passwd' => 'zabbix123456',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'medias' => [
						[
						'mediatypeid' => '1',
						'sendto' => 'api@zabbix.com',
						'severity' => ''
						]
					]
				],
				'expected_error' => 'Invalid parameter "/1/medias/1/severity": an integer is expected.'
			],
			[
				'user' => [
					'username' => 'User with invalid severity',
					'roleid' => 1,
					'passwd' => 'zabbix123456',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'medias' => [
						[
						'mediatypeid' => '1',
						'sendto' => 'api@zabbix.com',
						'severity' => '64'
						]
					]
				],
				'expected_error' => 'Invalid parameter "/1/medias/1/severity": value must be one of 0-63.'
			],
			// Check user media, period.
			[
				'user' => [
					'username' => 'User with empty period',
					'roleid' => 1,
					'passwd' => 'zabbix123456',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'medias' => [
						[
						'mediatypeid' => '1',
						'sendto' => 'api@zabbix.com',
						'period' => ''
						]
					]
				],
				'expected_error' => 'Invalid parameter "/1/medias/1/period": cannot be empty.'
			],
			[
				'user' => [
					'username' => 'User with string period',
					'roleid' => 1,
					'passwd' => 'zabbix123456',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'medias' => [
						[
						'mediatypeid' => '1',
						'sendto' => 'api@zabbix.com',
						'period' => 'test'
						]
					]
				],
				'expected_error' => 'Invalid parameter "/1/medias/1/period": a time period is expected.'
			],
			[
				'user' => [
					'username' => 'User with invalid period, without comma',
					'roleid' => 1,
					'passwd' => 'zabbix123456',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'medias' => [
						[
						'mediatypeid' => '1',
						'sendto' => 'api@zabbix.com',
						'period' => '1-7 00:00-24:00'
						]
					]
				],
				'expected_error' => 'Invalid parameter "/1/medias/1/period": a time period is expected.'
			],
			[
				'user' => [
					'username' => 'User with invalid period, with two comma',
					'roleid' => 1,
					'passwd' => 'zabbix123456',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'medias' => [
						[
						'mediatypeid' => '1',
						'sendto' => 'api@zabbix.com',
						'period' => '1-5,09:00-18:00,6-7,10:00-16:00'
						]
					]
				],
				'expected_error' => 'Invalid parameter "/1/medias/1/period": a time period is expected.'
			],
			[
				'user' => [
					'username' => 'User with invalid period, 8 week days',
					'roleid' => 1,
					'passwd' => 'zabbix123456',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'medias' => [
						[
						'mediatypeid' => '1',
						'sendto' => 'api@zabbix.com',
						'period' => '1-8,00:00-24:00'
						]
					]
				],
				'expected_error' => 'Invalid parameter "/1/medias/1/period": a time period is expected.'
			],
			[
				'user' => [
					'username' => 'User with invalid period, zero week day',
					'roleid' => 1,
					'passwd' => 'zabbix123456',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'medias' => [
						[
						'mediatypeid' => '1',
						'sendto' => 'api@zabbix.com',
						'period' => '0-7,00:00-24:00'
						]
					]
				],
				'expected_error' => 'Invalid parameter "/1/medias/1/period": a time period is expected.'
			],
			[
				'user' => [
					'username' => 'User with invalid time',
					'roleid' => 1,
					'passwd' => 'zabbix123456',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'medias' => [
						[
						'mediatypeid' => '1',
						'sendto' => 'api@zabbix.com',
						'period' => '1-7,24:00-00:00'
						]
					]
				],
				'expected_error' => 'Invalid parameter "/1/medias/1/period": a time period is expected.'
			],
			[
				'user' => [
					'username' => 'User with invalid time',
					'roleid' => 1,
					'passwd' => 'zabbix123456',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'medias' => [
						[
						'mediatypeid' => '1',
						'sendto' => 'api@zabbix.com',
						'period' => '1-7,14:00-13:00'
						]
					]
				],
				'expected_error' => 'Invalid parameter "/1/medias/1/period": a time period is expected.'
			],
			[
				'user' => [
					'username' => 'User with invalid time',
					'roleid' => 1,
					'passwd' => 'zabbix123456',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'medias' => [
						[
						'mediatypeid' => '1',
						'sendto' => 'api@zabbix.com',
						'period' => '1-7,25:00-26:00'
						]
					]
				],
				'expected_error' => 'Invalid parameter "/1/medias/1/period": a time period is expected.'
			],
			[
				'user' => [
					'username' => 'User with invalid time',
					'roleid' => 1,
					'passwd' => 'zabbix123456',
					'usrgrps' => [
						['usrgrpid' => '7']
					],
					'medias' => [
						[
						'mediatypeid' => '1',
						'sendto' => 'api@zabbix.com',
						'period' => '1-7,13:60-14:00'
						]
					]
				],
				'expected_error' => 'Invalid parameter "/1/medias/1/period": a time period is expected.'
			],
			// Successfully user update and create with all parameters.
			[
				'user' => [
					'username' => 'all-parameters',
					'roleid' => 3,
					'passwd' => 'Z@bb1x1234',
					'usrgrps' => [['usrgrpid' => 7]],
					'medias' => [
							[
								'mediatypeid' => '1',
								'sendto' => 'apicreate@zabbix.com',
								'active' => '1',
								'severity' => '60',
								'period' => '1-5,09:00-18:00;5-7,12:00-16:00'
							]
					],
					'name' => 'User with all parameters',
					'surname' => 'User Surname',
					'autologin' => 1,
					'autologout' => 0,
					'lang' => 'en_US',
					'refresh' => 90,
					'theme' => 'dark-theme',
					'rows_per_page' => 25,
					'url' => 'zabbix.php?action=userprofile.edit'
				],
				'expected_error' => null
			]
		];
	}

	/**
	 * @dataProvider user_properties
	 */
	public function testUser_NotRequiredPropertiesAndMedias($user, $expected_error) {
		$methods = ['user.create', 'user.update'];

		foreach ($methods as $method) {
			if ($method == 'user.update') {
				$user['userid'] = '9';
				$user['username'] = 'updated-'.$user['username'];
			}
			$result = $this->call($method, $user, $expected_error);

			if ($expected_error === null) {
				$dbResultUser = DBSelect('select * from users where userid='.zbx_dbstr($result['result']['userids'][0]));
				$dbRowUser = DBFetch($dbResultUser);
				$this->assertEquals($dbRowUser['username'], $user['username']);
				$this->assertEquals($dbRowUser['name'], $user['name']);
				$this->assertEquals($dbRowUser['surname'], $user['surname']);
				$this->assertEquals($dbRowUser['autologin'], $user['autologin']);
				$this->assertEquals($dbRowUser['autologout'], $user['autologout']);
				$this->assertEquals($dbRowUser['lang'], $user['lang']);
				$this->assertEquals($dbRowUser['refresh'], $user['refresh']);
				$this->assertEquals($dbRowUser['rows_per_page'], $user['rows_per_page']);
				$this->assertEquals($dbRowUser['theme'], $user['theme']);
				$this->assertEquals($dbRowUser['url'], $user['url']);

				$this->assertEquals(1, CDBHelper::getCount('select * from users_groups where userid='.
						zbx_dbstr($result['result']['userids'][0]).' and usrgrpid='.
						zbx_dbstr($user['usrgrps'][0]['usrgrpid']))
				);

				$dbResultMedia = DBSelect('select * from media where userid='.
						zbx_dbstr($result['result']['userids'][0])
				);

				$dbRowMedia = DBFetch($dbResultMedia);
				$this->assertEquals($dbRowMedia['mediatypeid'], $user['medias'][0]['mediatypeid']);
				$this->assertEquals($dbRowMedia['sendto'], $user['medias'][0]['sendto']);
				$this->assertEquals($dbRowMedia['active'], $user['medias'][0]['active']);
				$this->assertEquals($dbRowMedia['severity'], $user['medias'][0]['severity']);
				$this->assertEquals($dbRowMedia['period'], $user['medias'][0]['period']);
			}
			else {
				$this->assertEquals(0, CDBHelper::getCount('select * from users where username='.
					zbx_dbstr($user['username'])
				));
			}
		}
	}

	public static function user_delete() {
		return [
			// Check user id.
			[
				'user' => [''],
				'expected_error' => 'Invalid parameter "/1": a number is expected.'
			],
			[
				'user' => ['abc'],
				'expected_error' => 'Invalid parameter "/1": a number is expected.'
			],
			[
				'user' => ['1.1'],
				'expected_error' => 'Invalid parameter "/1": a number is expected.'
			],
			[
				'user' => ['123456'],
				'expected_error' => 'No permissions to referred object or it does not exist!'
			],
			[
				'user' => ['9', '9'],
				'expected_error' => 'Invalid parameter "/2": value (9) already exists.'
			],
			// Try delete oneself.
			[
				'user' => ['1'],
				'expected_error' => 'User is not allowed to delete oneself.'
			],
			// Try delete internal user.
			[
				'user' => ['2'],
				'expected_error' => 'Cannot delete Zabbix internal user "guest", try disabling that user.'
			],
			// Check if deleted users used in actions.
			[
				'user' => ['13'],
				'expected_error' => 'User "api-user-action" is used in "API action with user" action.'
			],
			// Check if deleted users have a map.
			[
				'user' => ['14'],
				'expected_error' => 'User "api-user-map" is map "API map" owner.'
			],
			// Check successfully delete of user.
			[
				'user' => ['10'],
				'expected_error' => null
			],
			[
				'user' => ['11', '12'],
				'expected_error' => null
			]
		];
	}

	/**
	 * @dataProvider user_delete
	 */
	public function testUsers_Delete($user, $expected_error) {
		$result = $this->call('user.delete', $user, $expected_error);

		if ($expected_error === null) {
			foreach ($result['result']['userids'] as $id) {
				$this->assertEquals(0, CDBHelper::getCount('select * from users where userid='.zbx_dbstr($id)));
			}
		}
	}

	public static function user_unblock_data_invalid(): array {
		return [
			[
				'user' => [],
				'expected_error' => 'Invalid parameter "/": cannot be empty.'
			],
			[
				'user' => [null],
				'expected_error' => 'Invalid parameter "/1": a number is expected.'
			],
			[
				'user' => [true],
				'expected_error' => 'Invalid parameter "/1": a number is expected.'
			],
			[
				'user' => [[]],
				'expected_error' => 'Invalid parameter "/1": a number is expected.'
			],
			[
				'user' => [''],
				'expected_error' => 'Invalid parameter "/1": a number is expected.'
			],
			[
				'user' => ['1.0'],
				'expected_error' => 'Invalid parameter "/1": a number is expected.'
			],
			[
				'user' => [-1],
				'expected_error' => 'Invalid parameter "/1": a number is expected.'
			],
			[
				'user' => ['123456'], // Non-existing user.
				'expected_error' => 'No permissions to referred object or it does not exist!'
			],
			[
				'user' => ['15', '15'],
				'expected_error' => 'Invalid parameter "/2": value (15) already exists.'
			]
		];
	}

	public static function user_unblock_data_valid(): array {
		return [
			[
				'user' => ['15'],
				'expected_error' => null
			],
			[
				'user' => ['14', '15'],
				'expected_error' => null
			]
		];
	}

	/**
	 * @dataProvider user_unblock_data_invalid
	 * @dataProvider user_unblock_data_valid
	 */
	public function testUsers_Unblock($users, ?string $expected_error): void {
		$response = $this->call('user.unblock', $users, $expected_error);

		if ($expected_error !== null) {
			return;
		}

		$db_users = CDBHelper::getAll(
			'SELECT u.attempt_failed'.
			' FROM users u'.
			' WHERE '.dbConditionId('u.userid', $response['result']['userids']).
			' ORDER BY u.userid ASC'
		);

		foreach ($db_users as $db_user) {
			$this->assertEquals(0, $db_user['attempt_failed']);
		}
	}

	public static function user_permissions() {
		return [
			[
				'method' => 'user.create',
				'login' => ['user' => 'zabbix-admin', 'password' => 'zabbix'],
				'user' => [
					'username' => 'API user create as zabbix admin',
					'passwd' => 'zabbix',
					'usrgrps' => [
						['usrgrpid' => 7]
					]
				],
				'expected_error' => 'No permissions to call "user.create".'
			],
			[
				'method' => 'user.update',
				'login' => ['user' => 'zabbix-admin', 'password' => 'zabbix'],
				'user' => [
					'userid' => '9',
					'username' => 'API user update as zabbix admin without permissions'
				],
				'expected_error' => 'No permissions to referred object or it does not exist!'
			],
			[
				'method' => 'user.delete',
				'login' => ['user' => 'zabbix-admin', 'password' => 'zabbix'],
				'user' => ['9'],
				'expected_error' => 'No permissions to call "user.delete".'
			],
			[
				'method' => 'user.create',
				'login' => ['user' => 'zabbix-user', 'password' => 'zabbix'],
				'user' => [
					'username' => 'API user create as zabbix user',
					'passwd' => 'zabbix',
					'usrgrps' => [
						['usrgrpid' => 7]
					]
				],
				'expected_error' => 'No permissions to call "user.create".'
			],
			[
				'method' => 'user.update',
				'login' => ['user' => 'zabbix-user', 'password' => 'zabbix'],
				'user' => [
					'userid' => '9',
					'username' => 'API user update as zabbix user without permissions'
				],
				'expected_error' => 'No permissions to referred object or it does not exist!'
			],
			[
				'method' => 'user.delete',
				'login' => ['user' => 'zabbix-user', 'password' => 'zabbix'],
				'user' => ['9'],
				'expected_error' => 'No permissions to call "user.delete".'
			],
			[
				'method' => 'user.unblock',
				'login' => ['user' => 'zabbix-user', 'password' => 'zabbix'],
				'user' => ['15'],
				'expected_error' => 'No permissions to call "user.unblock".'
			],
			[
				'method' => 'user.unblock',
				'login' => ['user' => 'zabbix-admin', 'password' => 'zabbix'],
				'user' => ['15'],
				'expected_error' => 'No permissions to call "user.unblock".'
			]
		];
	}

	/**
	 * @dataProvider user_permissions
	 */
	public function testUsers_UserPermissions($method, $login, $user, $expected_error) {
		$this->authorize($login['user'], $login['password']);
		$this->call($method, $user, $expected_error);
	}

	public static function auth_data() {
		return [
			[[
				'jsonrpc' => '2.0',
				'method' => 'user.update',
				'params' =>
					[
						'userid' => '9',
						'username' => 'check authentication'
					],
				'id' => '1'
			]],
			[[
				'jsonrpc' => '2.0',
				'method' => 'user.logout',
				'params' => [],
				'id' => '1'
			]]
		];
	}

	/**
	 * @dataProvider auth_data
	 */
	public function testUsers_Session($data) {
		$this->checkResult($this->callRaw($data, '12345'), 'Session terminated, re-login, please.');
	}

	public function testUsers_Logout() {
		$this->authorize('Admin', 'zabbix');

		$this->checkResult($this->call('user.logout', []));

		$data = [
			'jsonrpc' => '2.0',
			'method' => 'user.update',
			'params' => [
				'userid' => '9',
				'username' => 'check authentication'
			],
			'id' => '1'
		];
		$this->checkResult($this->callRaw($data, CAPIHelper::getSessionId()), 'Session terminated, re-login, please.');
	}

	public static function login_data() {
		return [
			[
				'login' => [
					'username' => 'Admin',
					'password' => 'zabbix',
					'sessionid' => '123456'
				],
				'expected_error' => 'Invalid parameter "/": unexpected parameter "sessionid".'
			],
			// Check login
			[
				'login' => [
					'password' => 'zabbix'
				],
				'expected_error' => 'Invalid parameter "/": the parameter "username" is missing.'
			],
			[
				'login' => [
					'username' => '',
					'password' => 'zabbix'
				],
				'expected_error' => 'Incorrect user name or password or account is temporarily blocked.'
			],
			[
				'login' => [
					'username' => 'Unknown user',
					'password' => 'zabbix'
				],
				'expected_error' => 'Incorrect user name or password or account is temporarily blocked.'
			],
			[
				'login' => [
					'username' => '!@#$%^&\\\'\"""\;:',
					'password' => 'zabbix'
				],
				'expected_error' => 'Incorrect user name or password or account is temporarily blocked.'
			],
			// Check password
			[
				'login' => [
					'username' => 'Admin'
				],
				'expected_error' => 'Invalid parameter "/": the parameter "password" is missing.'
			],
			[
				'login' => [
					'username' => 'Admin',
					'password' => ''
				],
				'expected_error' => 'Incorrect user name or password or account is temporarily blocked.'
			],
			[
				'login' => [
					'username' => 'Admin',
					'password' => 'wrong password'
				],
				'expected_error' => 'Incorrect user name or password or account is temporarily blocked.'
			],
			[
				'login' => [
					'username' => 'Admin',
					'password' => '!@#$%^&\\\'\"""\;:'
				],
				'expected_error' => 'Incorrect user name or password or account is temporarily blocked.'
			],
			// Check disabled user.
			[
				'login' => [
					'username' => 'api-user-action',
					'password' => 'zabbix'
				],
				'expected_error' => 'No permissions for system access.'
			],
			// Check user with MFA cannot login to API
			[
				'login' => [
					'username' => 'user_with_mfa_default',
					'password' => 'zabbix123456'
				],
				'expected_error' => 'Incorrect user name or password or account is temporarily blocked.'
			],
			[
				'login' => [
					'username' => 'user_with_mfa_duo',
					'password' => 'zabbix123456'
				],
				'expected_error' => 'Incorrect user name or password or account is temporarily blocked.'
			],
			// Successfully login.
			[
				'login' => [
					'username' => 'Admin',
					'password' => 'zabbix'
				],
				'expected_error' => null
			],
			[
				'login' => [
					'username' => 'Admin',
					'password' => 'zabbix',
					'userData' => true
				],
				'expected_error' => null
			],
			[
				'login' => [
					'username' => 'guest',
					'password' => ''
				],
				'expected_error' => null
			]
		];
	}

	/**
	 * @onBefore removeGuestFromDisabledGroup
	 * @onAfter addGuestToDisabledGroup
	 *
	 * @dataProvider login_data
	 */
	public function testUsers_Login($user, $expected_error) {
		$this->disableAuthorization();
		$this->call('user.login', $user, $expected_error);
	}

	public function testUsers_AuthTokenIncorrect() {
		$res = $this->callRaw([
			'jsonrpc' => '2.0',
			'method' => 'host.get',
			'params' => [
				'output' => [],
				'limit' => 1
			],
			'id' => '1'
		], bin2hex(random_bytes(32)));

		$this->assertTrue(array_key_exists('error', $res));

		['error' => ['data' => $error]] = $res;
		$this->assertEquals($error, 'Not authorized.');
	}

	public function testUsers_AuthTokenDisabled() {
		$token = bin2hex(random_bytes(32));

		DB::insert('token', [[
			'status' => ZBX_AUTH_TOKEN_DISABLED,
			'userid' => 1,
			'name' => 'disabled',
			'token' => hash('sha512', $token)
		]]);

		$res = $this->callRaw([
			'jsonrpc' => '2.0',
			'method' => 'host.get',
			'params' => [
				'output' => [],
				'limit' => 1
			],
			'id' => '1'
		], $token);

		$this->assertTrue(array_key_exists('error', $res));

		['error' => ['data' => $error]] = $res;
		$this->assertEquals($error, 'Not authorized.');
	}

	public function testUsers_AuthTokenExpired() {
		$now = time();
		$token = bin2hex(random_bytes(32));

		DB::insert('token', [[
			'status' => ZBX_AUTH_TOKEN_ENABLED,
			'userid' => 1,
			'name' => 'expired',
			'expires_at' => $now - 1,
			'token' => hash('sha512', $token)
		]]);

		$res = $this->callRaw([
			'jsonrpc' => '2.0',
			'method' => 'host.get',
			'params' => [
				'output' => [],
				'limit' => 1
			],
			'id' => '1'
		], $token);

		$this->assertTrue(array_key_exists('error', $res));

		['error' => ['data' => $error]] = $res;
		$this->assertEquals($error, 'API token expired.');
	}

	public function testUsers_AuthTokenNotExpired() {
		$now = time();
		$token = bin2hex(random_bytes(32));

		DB::insert('token', [[
			'status' => ZBX_AUTH_TOKEN_ENABLED,
			'userid' => 1,
			'name' => 'correct',
			'expires_at'  => $now + 10,
			'token' => hash('sha512', $token)
		]]);

		$res = $this->callRaw([
			'jsonrpc' => '2.0',
			'method' => 'host.get',
			'params' => [
				'output' => [],
				'limit' => 1
			],
			'id' => '1'
		], $token);

		$this->assertTrue(array_key_exists('result', $res));
	}

	public function testUsers_AuthTokenDebugModeEnabled() {
		$token = bin2hex(random_bytes(32));

		DB::insert('token', [[
			'status' => ZBX_AUTH_TOKEN_ENABLED,
			'userid' => 1,
			'name' => 'debug mode',
			'token' => hash('sha512', $token)
		]]);

		DB::update('usrgrp', [
			'values' => ['debug_mode' => GROUP_DEBUG_MODE_ENABLED],
			'where' => ['usrgrpid' => 7]
		]);

		$res = $this->callRaw([
			'jsonrpc' => '2.0',
			'method' => 'host.get',
			'params' => [
				'output' => [],
				'inheritedTags' => 'incorrect value',
				'limit' => 1
			],
			'id' => '1'
		], $token);

		DB::update('usrgrp', [
			'values' => ['debug_mode' => GROUP_DEBUG_MODE_DISABLED],
			'where' => ['usrgrpid' => 7]
		]);

		$this->assertTrue(array_key_exists('error', $res), 'Expected error to occur.');
		$this->assertTrue(array_key_exists('debug', $res['error']), 'Expected debug trace in error.');
	}

	public function testUsers_AuthTokenDebugModeDisabled() {
		$token = bin2hex(random_bytes(32));

		DB::insert('token', [[
			'status' => ZBX_AUTH_TOKEN_ENABLED,
			'userid' => 1,
			'name' => 'debug mode disabled',
			'token' => hash('sha512', $token)
		]]);

		$res = $this->callRaw([
			'jsonrpc' => '2.0',
			'method' => 'host.get',
			'params' => [
				'output' => [],
				'inheritedTags' => 'incorrect value',
				'limit' => 1
			],
			'id' => '1'
		], $token);

		$this->assertTrue(array_key_exists('error', $res), 'Expected error to occur.');
		$this->assertTrue(!array_key_exists('debug', $res['error']), 'Not expected debug trace in error.');
	}

	public function testUsers_AuthTokenLastaccessIsUpdated() {
		$token = bin2hex(random_bytes(32));
		$formeraccess = time() - 1;

		$tokenids = DB::insert('token', [[
			'status' => ZBX_AUTH_TOKEN_ENABLED,
			'userid' => 1,
			'lastaccess' => $formeraccess,
			'name' => 'lastaccess updated',
			'token' => hash('sha512', $token)
		]]);

		$this->callRaw([
			'jsonrpc' => '2.0',
			'method' => 'host.get',
			'params' => [
				'output' => [],
				'limit' => 1
			],
			'id' => '1'
		], $token);

		[['lastaccess' => $lastaccess]] = DB::select('token', [
			'output' => ['lastaccess'],
			'tokenids' => $tokenids
		]);

		$this->assertTrue($lastaccess > $formeraccess);
	}

	public function testUsers_AuthTokenUserDisabled() {
		$token = bin2hex(random_bytes(32));

		DB::insert('token', [[
			'status' => ZBX_AUTH_TOKEN_ENABLED,
			'userid' => 13,
			'name' => 'user with status "Disabled"',
			'token' => hash('sha512', $token)
		]]);

		$res = $this->callRaw([
			'jsonrpc' => '2.0',
			'method' => 'host.get',
			'params' => [
				'output' => [],
				'limit' => 1
			],
			'id' => '1'
		], $token);

		$this->assertTrue(array_key_exists('error', $res), 'Expected error to occur.');
		$this->assertEquals($res['error']['data'], 'Not authorized.');
	}

	public function testUsers_LoginBlocked() {
		$this->disableAuthorization();
		for ($i = 1; $i <= 6; $i++) {
			$result = $this->call('user.login', ['username' => 'Admin', 'password' => 'attempt '.$i], true);
		}

		$this->assertEquals('Incorrect user name or password or account is temporarily blocked.',
			$result['error']['data']
		);
	}

	/**
	 * Data provider for user.checkAuthentication testing. Array contains common invalid parameter data.
	 *
	 * @return array
	 */
	public static function getUsersCheckAuthenticationDataInvalidParameters(): array {
		return [
			'Test user.checkAuthentication invalid case when missing "sessionid" or "token" parameter' => [
				'params' => [],
				'expected_error' => 'Session ID or token is expected.'
			],
			'Test user.checkAuthentication invalid case when "sessionid" and "token" parameters given' => [
				'params' => [
					'token' => 'string',
					'sessionid' => 'string'
				],
				'expected_error' => 'Session ID or token is expected.'
			],
			'Test user.checkAuthentication invalid case when "token" and "extend" parameters given' => [
				'params' => [
					'token' => 'string',
					'extend' => true
				],
				'expected_error' => 'Invalid parameter "/": unexpected parameter "extend".'
			],
			'Test user.checkAuthentication invalid "sessionid" parameter (integer)' => [
				'params' => [
					'sessionid' => 123456
				],
				'expected_error' => 'Invalid parameter "/sessionid": a character string is expected.'
			],
			'Test user.checkAuthentication invalid "sessionid" parameter (boolean)' => [
				'params' => [
					'sessionid' => true
				],
				'expected_error' => 'Invalid parameter "/sessionid": a character string is expected.'
			],
			'Test user.checkAuthentication invalid "extend" parameter (string)' => [
				'params' => [
					'extend' => 'Boolean expected'
				],
				'expected_error' => 'Invalid parameter "/extend": a boolean is expected.'
			],
			'Test user.checkAuthentication invalid "extend" parameter (integer)' => [
				'params' => [
					'extend' => 123456
				],
				'expected_error' => 'Invalid parameter "/extend": a boolean is expected.'
			],
			'Test user.checkAuthentication invalid "token" parameter (integer)' => [
				'params' => [
					'token' => 123456
				],
				'expected_error' => 'Invalid parameter "/token": a character string is expected.'
			],
			'Test user.checkAuthentication invalid "token" parameter (boolean)' => [
				'params' => [
					'token' => true
				],
				'expected_error' => 'Invalid parameter "/token": a character string is expected.'
			],
			'Test user.checkAuthentication invalid case when unexpected parameter given' => [
				'params' => [
					'unexpected_parameter' => 'expect error'
				],
				'expected_error' => 'Invalid parameter "/": unexpected parameter "unexpected_parameter".'
			]
		];
	}

	/**
	 * Test user.checkAuthentication with invalid parameter data.
	 *
	 * @dataProvider getUsersCheckAuthenticationDataInvalidParameters
	 */
	public function testUser_checkAuthentication_InvalidParameters(array $params, string $expected_error) {
		$res = $this->callRaw([
			'jsonrpc' => '2.0',
			'method' => 'user.checkAuthentication',
			'params' => $params,
			'id' => 1
		]);

		$this->checkResult($res, $expected_error);
	}

	/**
	 * Data provider for user.checkAuthentication. Array contains paths to data for invalid users authentication cases.
	 *
	 * @return array
	 */
	public static function getUsersCheckAuthenticationDataInvalidAuthorization(): array {
		return [
			'Test user.checkAuthentication not authorized session ID' => [
				'data' => ['sessionids' => 'not_authorized_session'],
				'expected_error' => 'Session terminated, re-login, please.'
			],
			'Test user.checkAuthentication expired active session ID' => [
				'data' => ['sessionids' => 'expired_session'],
				'expected_error' => 'Session terminated, re-login, please.'
			],
			'Test user.checkAuthentication passive session ID' => [
				'data' => ['sessionids' => 'passive_session'],
				'expected_error' => 'Session terminated, re-login, please.'
			],
			'Test user.checkAuthentication not authorized token' => [
				'data' => ['tokens' => 'not_authorized'],
				'expected_error' => 'Not authorized.'
			],
			'Test user.checkAuthentication expired token' => [
				'data' => ['tokens' => 'expired'],
				'expected_error' => 'API token expired.'
			],
			'Test user.checkAuthentication disabled token' => [
				'data' => ['tokens' => 'disabled'],
				'expected_error' => 'Not authorized.'
			],
			'Test user.checkAuthentication user with active session ID and disabled user group' => [
				'data' => ['sessionids' => 'valid_for_user_with_disabled_usergroup'],
				'expected_error' => 'Session terminated, re-login, please.'
			],
			'Test user.checkAuthentication user with active token and disabled user group' => [
				'data' => ['tokens' => 'valid_for_user_with_disabled_usergroup'],
				'expected_error' => 'Not authorized.'
			]
		];
	}

	/**
	 * Data provider for user.checkAuthentication testing. Array contains authorized users data.
	 *
	 * @return array
	 */
	public static function getUsersCheckAuthenticationDataValidAuthorization(): array	{
		return [
			'Test user.checkAuthentication user with valid session ID' => [
				'data' => ['sessionids' => 'valid'],
				'expected_error' => null
			],
			'Test user.checkAuthentication user with valid token' => [
				'data' => ['tokens' => 'valid'],
				'expected_error' => null
			]
		];
	}

	/**
	 * Test user.checkAuthentication with various valid and invalid user authorization cases.
	 *
	 * @dataProvider getUsersCheckAuthenticationDataInvalidAuthorization
	 * @dataProvider getUsersCheckAuthenticationDataValidAuthorization
	 */
	public function testUser_checkAuthentication_Authorization(array $data, ?string $expected_error) {
		foreach ($data as $parameter => $name) {
			$parameter_key = $parameter === 'sessionids' ? 'sessionid' : 'token';

			$res = $this->callRaw([
				'jsonrpc' => '2.0',
				'method' => 'user.checkAuthentication',
				'params' => [
					$parameter_key => self::$data[$parameter][$name]
				],
				'id' => 1
			]);

			$this->checkResult($res, $expected_error);
		}
	}

	/**
	 * Data provider for user.checkAuthentication testing. Array contains various valid extend parameter options.
	 *
	 * @return array
	 */
	public static function getUsersCheckAuthenticationDataValidSessionIDWithExtend(): array {
		return [
			'Test user.checkAuthentication user does not extend session' => [
				'extend' => false
			],
			'Test user.checkAuthentication user extends session' => [
				'extend' => true
			]
		];
	}

	/**
	 * Test user.checkAuthentication parameter extend effect for user with active session ID.
	 *
	 * @dataProvider getUsersCheckAuthenticationDataValidSessionIDWithExtend
	 */
	public function testUser_checkAuthentication_SessionIDWithExtend(bool $extend) {
		$res = $this->callRaw([
			'jsonrpc' => '2.0',
			'method' => 'user.checkAuthentication',
			'params' => [
				'sessionid' => self::$data['sessionids']['for_extend_parameter_tests'],
				'extend' => $extend
			],
			'id' => 1
		]);

		$this->checkResult($res);

		$lastaccess = CDBHelper::getValue(
			'SELECT lastaccess'.
			' FROM sessions'.
			' WHERE sessionid='.zbx_dbstr(self::$data['sessionids']['for_extend_parameter_tests'])
		);

		$extend
			? $this->assertGreaterThan(self::$data['lastacess_time_for_sessionid_with_extend_tests'], $lastaccess)
			: $this->assertEquals(self::$data['lastacess_time_for_sessionid_with_extend_tests'], $lastaccess);
	}

	/**
	 * Guest user needs to be out of "Disabled" group to have access to frontend.
	 */
	public static function removeGuestFromDisabledGroup() {
		DBexecute('DELETE FROM users_groups WHERE userid=2 AND usrgrpid=9');
	}

	public function addGuestToDisabledGroup() {
		DBexecute('INSERT INTO users_groups (id, usrgrpid, userid) VALUES (150, 9, 2)');
	}
}