// Copyright 2020 The gVisor Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
//     http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.

package devtmpfs

import (
	"path"
	"testing"

	"gvisor.dev/gvisor/pkg/abi/linux"
	"gvisor.dev/gvisor/pkg/context"
	"gvisor.dev/gvisor/pkg/fspath"
	"gvisor.dev/gvisor/pkg/sentry/contexttest"
	"gvisor.dev/gvisor/pkg/sentry/fsimpl/tmpfs"
	"gvisor.dev/gvisor/pkg/sentry/kernel/auth"
	"gvisor.dev/gvisor/pkg/sentry/vfs"
)

const devPath = "/dev"

func setupDevtmpfs(t *testing.T) (context.Context, *auth.Credentials, *vfs.VirtualFilesystem, vfs.VirtualDentry, func()) {
	t.Helper()

	ctx := contexttest.Context(t)
	creds := auth.CredentialsFromContext(ctx)
	vfsObj := &vfs.VirtualFilesystem{}
	if err := vfsObj.Init(ctx); err != nil {
		t.Fatalf("VFS init: %v", err)
	}
	// Register tmpfs just so that we can have a root filesystem that isn't
	// devtmpfs.
	vfsObj.MustRegisterFilesystemType("tmpfs", tmpfs.FilesystemType{}, &vfs.RegisterFilesystemTypeOptions{
		AllowUserMount: true,
	})
	vfsObj.MustRegisterFilesystemType("devtmpfs", &FilesystemType{}, &vfs.RegisterFilesystemTypeOptions{
		AllowUserMount: true,
	})

	// Create a test mount namespace with devtmpfs mounted at "/dev".
	mntns, err := vfsObj.NewMountNamespace(ctx, creds, "tmpfs" /* source */, "tmpfs" /* fsTypeName */, &vfs.GetFilesystemOptions{})
	if err != nil {
		t.Fatalf("failed to create tmpfs root mount: %v", err)
	}
	root := mntns.Root()
	devpop := vfs.PathOperation{
		Root:  root,
		Start: root,
		Path:  fspath.Parse(devPath),
	}
	if err := vfsObj.MkdirAt(ctx, creds, &devpop, &vfs.MkdirOptions{
		Mode: 0755,
	}); err != nil {
		t.Fatalf("failed to create mount point: %v", err)
	}
	if _, err := vfsObj.MountAt(ctx, creds, "devtmpfs" /* source */, &devpop, "devtmpfs" /* fsTypeName */, &vfs.MountOptions{}); err != nil {
		t.Fatalf("failed to mount devtmpfs: %v", err)
	}

	return ctx, creds, vfsObj, root, func() {
		root.DecRef(ctx)
		mntns.DecRef(ctx)
	}
}

func TestUserspaceInit(t *testing.T) {
	ctx, creds, vfsObj, root, cleanup := setupDevtmpfs(t)
	defer cleanup()

	a, err := NewAccessor(ctx, vfsObj, creds, "devtmpfs")
	if err != nil {
		t.Fatalf("failed to create devtmpfs.Accessor: %v", err)
	}
	defer a.Release(ctx)

	// Create "userspace-initialized" files using a devtmpfs.Accessor.
	if err := a.UserspaceInit(ctx); err != nil {
		t.Fatalf("failed to userspace-initialize devtmpfs: %v", err)
	}

	// Created files should be visible in the test mount namespace.
	links := []struct {
		source string
		target string
	}{
		{
			source: "fd",
			target: "/proc/self/fd",
		},
		{
			source: "stdin",
			target: "/proc/self/fd/0",
		},
		{
			source: "stdout",
			target: "/proc/self/fd/1",
		},
		{
			source: "stderr",
			target: "/proc/self/fd/2",
		},
		{
			source: "ptmx",
			target: "pts/ptmx",
		},
	}

	for _, link := range links {
		abspath := path.Join(devPath, link.source)
		if gotTarget, err := vfsObj.ReadlinkAt(ctx, creds, &vfs.PathOperation{
			Root:  root,
			Start: root,
			Path:  fspath.Parse(abspath),
		}); err != nil || gotTarget != link.target {
			t.Errorf("readlink(%q): got (%q, %v), wanted (%q, nil)", abspath, gotTarget, err, link.target)
		}
	}

	dirs := []string{"shm", "pts"}
	for _, dir := range dirs {
		abspath := path.Join(devPath, dir)
		statx, err := vfsObj.StatAt(ctx, creds, &vfs.PathOperation{
			Root:  root,
			Start: root,
			Path:  fspath.Parse(abspath),
		}, &vfs.StatOptions{
			Mask: linux.STATX_MODE,
		})
		if err != nil {
			t.Errorf("stat(%q): got error %v ", abspath, err)
			continue
		}
		if want := uint16(0755) | linux.S_IFDIR; statx.Mode != want {
			t.Errorf("stat(%q): got mode %x, want %x", abspath, statx.Mode, want)
		}
	}
}

func TestCreateDeviceFile(t *testing.T) {
	ctx, creds, vfsObj, root, cleanup := setupDevtmpfs(t)
	defer cleanup()

	a, err := NewAccessor(ctx, vfsObj, creds, "devtmpfs")
	if err != nil {
		t.Fatalf("failed to create devtmpfs.Accessor: %v", err)
	}
	defer a.Release(ctx)

	devFiles := []struct {
		path  string
		kind  vfs.DeviceKind
		major uint32
		minor uint32
		perms uint16
	}{
		{
			path:  "dummy",
			kind:  vfs.CharDevice,
			major: 12,
			minor: 34,
			perms: 0600,
		},
		{
			path:  "foo/bar",
			kind:  vfs.BlockDevice,
			major: 13,
			minor: 35,
			perms: 0660,
		},
		{
			path:  "foo/baz",
			kind:  vfs.CharDevice,
			major: 12,
			minor: 40,
			perms: 0666,
		},
		{
			path:  "a/b/c/d/e",
			kind:  vfs.BlockDevice,
			major: 12,
			minor: 34,
			perms: 0600,
		},
	}

	for _, f := range devFiles {
		if err := a.CreateDeviceFile(ctx, f.path, f.kind, f.major, f.minor, f.perms); err != nil {
			t.Fatalf("failed to create device file: %v", err)
		}
		// The device special file should be visible in the test mount namespace.
		abspath := path.Join(devPath, f.path)
		stat, err := vfsObj.StatAt(ctx, creds, &vfs.PathOperation{
			Root:  root,
			Start: root,
			Path:  fspath.Parse(abspath),
		}, &vfs.StatOptions{
			Mask: linux.STATX_TYPE | linux.STATX_MODE,
		})
		if err != nil {
			t.Fatalf("failed to stat device file at %q: %v", abspath, err)
		}
		if stat.RdevMajor != f.major {
			t.Errorf("major device number: got %v, wanted %v", stat.RdevMajor, f.major)
		}
		if stat.RdevMinor != f.minor {
			t.Errorf("minor device number: got %v, wanted %v", stat.RdevMinor, f.minor)
		}
		wantMode := f.perms
		switch f.kind {
		case vfs.CharDevice:
			wantMode |= linux.S_IFCHR
		case vfs.BlockDevice:
			wantMode |= linux.S_IFBLK
		}
		if stat.Mode != wantMode {
			t.Errorf("device file mode: got %v, wanted %v", stat.Mode, wantMode)
		}
	}
}