// Copyright 2019 The gVisor Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
//     http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.

package kernfs_test

import (
	"bytes"
	"fmt"
	"io"
	"runtime"
	"sync"
	"testing"

	"github.com/google/go-cmp/cmp"
	"gvisor.dev/gvisor/pkg/abi/linux"
	"gvisor.dev/gvisor/pkg/sentry/context"
	"gvisor.dev/gvisor/pkg/sentry/context/contexttest"
	"gvisor.dev/gvisor/pkg/sentry/fsimpl/kernfs"
	"gvisor.dev/gvisor/pkg/sentry/kernel/auth"
	"gvisor.dev/gvisor/pkg/sentry/usermem"
	"gvisor.dev/gvisor/pkg/sentry/vfs"
	"gvisor.dev/gvisor/pkg/syserror"
)

const defaultMode linux.FileMode = 01777
const staticFileContent = "This is sample content for a static test file."

// RootDentryFn is a generator function for creating the root dentry of a test
// filesystem. See newTestSystem.
type RootDentryFn func(*auth.Credentials, *filesystem) *kernfs.Dentry

// TestSystem represents the context for a single test.
type TestSystem struct {
	t     *testing.T
	ctx   context.Context
	creds *auth.Credentials
	vfs   *vfs.VirtualFilesystem
	mns   *vfs.MountNamespace
	root  vfs.VirtualDentry
}

// newTestSystem sets up a minimal environment for running a test, including an
// instance of a test filesystem. Tests can control the contents of the
// filesystem by providing an appropriate rootFn, which should return a
// pre-populated root dentry.
func newTestSystem(t *testing.T, rootFn RootDentryFn) *TestSystem {
	ctx := contexttest.Context(t)
	creds := auth.CredentialsFromContext(ctx)
	v := vfs.New()
	v.MustRegisterFilesystemType("testfs", &fsType{rootFn: rootFn})
	mns, err := v.NewMountNamespace(ctx, creds, "", "testfs", &vfs.GetFilesystemOptions{})
	if err != nil {
		t.Fatalf("Failed to create testfs root mount: %v", err)
	}

	s := &TestSystem{
		t:     t,
		ctx:   ctx,
		creds: creds,
		vfs:   v,
		mns:   mns,
		root:  mns.Root(),
	}
	runtime.SetFinalizer(s, func(s *TestSystem) { s.root.DecRef() })
	return s
}

// PathOpAtRoot constructs a vfs.PathOperation for a path from the
// root of the test filesystem.
//
// Precondition: path should be relative path.
func (s *TestSystem) PathOpAtRoot(path string) vfs.PathOperation {
	return vfs.PathOperation{
		Root:     s.root,
		Start:    s.root,
		Pathname: path,
	}
}

// GetDentryOrDie attempts to resolve a dentry referred to by the
// provided path operation. If unsuccessful, the test fails.
func (s *TestSystem) GetDentryOrDie(pop vfs.PathOperation) vfs.VirtualDentry {
	vd, err := s.vfs.GetDentryAt(s.ctx, s.creds, &pop, &vfs.GetDentryOptions{})
	if err != nil {
		s.t.Fatalf("GetDentryAt(pop:%+v) failed: %v", pop, err)
	}
	return vd
}

func (s *TestSystem) ReadToEnd(fd *vfs.FileDescription) (string, error) {
	buf := make([]byte, usermem.PageSize)
	bufIOSeq := usermem.BytesIOSequence(buf)
	opts := vfs.ReadOptions{}

	var content bytes.Buffer
	for {
		n, err := fd.Impl().Read(s.ctx, bufIOSeq, opts)
		if n == 0 || err != nil {
			if err == io.EOF {
				err = nil
			}
			return content.String(), err
		}
		content.Write(buf[:n])
	}
}

type fsType struct {
	rootFn RootDentryFn
}

type filesystem struct {
	kernfs.Filesystem
}

type file struct {
	kernfs.DynamicBytesFile
	content string
}

func (fs *filesystem) newFile(creds *auth.Credentials, content string) *kernfs.Dentry {
	f := &file{}
	f.content = content
	f.DynamicBytesFile.Init(creds, fs.NextIno(), f)

	d := &kernfs.Dentry{}
	d.Init(f)
	return d
}

func (f *file) Generate(ctx context.Context, buf *bytes.Buffer) error {
	fmt.Fprintf(buf, "%s", f.content)
	return nil
}

type attrs struct {
	kernfs.InodeAttrs
}

func (a *attrs) SetStat(fs *vfs.Filesystem, opt vfs.SetStatOptions) error {
	return syserror.EPERM
}

type readonlyDir struct {
	attrs
	kernfs.InodeNotSymlink
	kernfs.InodeNoDynamicLookup
	kernfs.InodeDirectoryNoNewChildren

	kernfs.OrderedChildren
	dentry kernfs.Dentry
}

func (fs *filesystem) newReadonlyDir(creds *auth.Credentials, mode linux.FileMode, contents map[string]*kernfs.Dentry) *kernfs.Dentry {
	dir := &readonlyDir{}
	dir.attrs.Init(creds, fs.NextIno(), linux.ModeDirectory|mode)
	dir.OrderedChildren.Init(kernfs.OrderedChildrenOptions{})
	dir.dentry.Init(dir)

	dir.IncLinks(dir.OrderedChildren.Populate(&dir.dentry, contents))

	return &dir.dentry
}

func (d *readonlyDir) Open(rp *vfs.ResolvingPath, vfsd *vfs.Dentry, flags uint32) (*vfs.FileDescription, error) {
	fd := &kernfs.GenericDirectoryFD{}
	fd.Init(rp.Mount(), vfsd, &d.OrderedChildren, flags)
	return fd.VFSFileDescription(), nil
}

type dir struct {
	attrs
	kernfs.InodeNotSymlink
	kernfs.InodeNoDynamicLookup

	fs     *filesystem
	dentry kernfs.Dentry
	kernfs.OrderedChildren
}

func (fs *filesystem) newDir(creds *auth.Credentials, mode linux.FileMode, contents map[string]*kernfs.Dentry) *kernfs.Dentry {
	dir := &dir{}
	dir.fs = fs
	dir.attrs.Init(creds, fs.NextIno(), linux.ModeDirectory|mode)
	dir.OrderedChildren.Init(kernfs.OrderedChildrenOptions{Writable: true})
	dir.dentry.Init(dir)

	dir.IncLinks(dir.OrderedChildren.Populate(&dir.dentry, contents))

	return &dir.dentry
}

func (d *dir) Open(rp *vfs.ResolvingPath, vfsd *vfs.Dentry, flags uint32) (*vfs.FileDescription, error) {
	fd := &kernfs.GenericDirectoryFD{}
	fd.Init(rp.Mount(), vfsd, &d.OrderedChildren, flags)
	return fd.VFSFileDescription(), nil
}

func (d *dir) NewDir(ctx context.Context, name string, opts vfs.MkdirOptions) (*vfs.Dentry, error) {
	creds := auth.CredentialsFromContext(ctx)
	dir := d.fs.newDir(creds, opts.Mode, nil)
	dirVFSD := dir.VFSDentry()
	if err := d.OrderedChildren.Insert(name, dirVFSD); err != nil {
		dir.DecRef()
		return nil, err
	}
	d.IncLinks(1)
	return dirVFSD, nil
}

func (d *dir) NewFile(ctx context.Context, name string, opts vfs.OpenOptions) (*vfs.Dentry, error) {
	creds := auth.CredentialsFromContext(ctx)
	f := d.fs.newFile(creds, "")
	fVFSD := f.VFSDentry()
	if err := d.OrderedChildren.Insert(name, fVFSD); err != nil {
		f.DecRef()
		return nil, err
	}
	return fVFSD, nil
}

func (*dir) NewLink(context.Context, string, kernfs.Inode) (*vfs.Dentry, error) {
	return nil, syserror.EPERM
}

func (*dir) NewSymlink(context.Context, string, string) (*vfs.Dentry, error) {
	return nil, syserror.EPERM
}

func (*dir) NewNode(context.Context, string, vfs.MknodOptions) (*vfs.Dentry, error) {
	return nil, syserror.EPERM
}

func (fst *fsType) GetFilesystem(ctx context.Context, vfsObj *vfs.VirtualFilesystem, creds *auth.Credentials, source string, opt vfs.GetFilesystemOptions) (*vfs.Filesystem, *vfs.Dentry, error) {
	fs := &filesystem{}
	fs.Init(vfsObj)
	root := fst.rootFn(creds, fs)
	return fs.VFSFilesystem(), root.VFSDentry(), nil
}

// -------------------- Remainder of the file are test cases --------------------

func TestBasic(t *testing.T) {
	sys := newTestSystem(t, func(creds *auth.Credentials, fs *filesystem) *kernfs.Dentry {
		return fs.newReadonlyDir(creds, 0755, map[string]*kernfs.Dentry{
			"file1": fs.newFile(creds, staticFileContent),
		})
	})
	sys.GetDentryOrDie(sys.PathOpAtRoot("file1")).DecRef()
}

func TestMkdirGetDentry(t *testing.T) {
	sys := newTestSystem(t, func(creds *auth.Credentials, fs *filesystem) *kernfs.Dentry {
		return fs.newReadonlyDir(creds, 0755, map[string]*kernfs.Dentry{
			"dir1": fs.newDir(creds, 0755, nil),
		})
	})

	pop := sys.PathOpAtRoot("dir1/a new directory")
	if err := sys.vfs.MkdirAt(sys.ctx, sys.creds, &pop, &vfs.MkdirOptions{Mode: 0755}); err != nil {
		t.Fatalf("MkdirAt for PathOperation %+v failed: %v", pop, err)
	}
	sys.GetDentryOrDie(pop).DecRef()
}

func TestReadStaticFile(t *testing.T) {
	sys := newTestSystem(t, func(creds *auth.Credentials, fs *filesystem) *kernfs.Dentry {
		return fs.newReadonlyDir(creds, 0755, map[string]*kernfs.Dentry{
			"file1": fs.newFile(creds, staticFileContent),
		})
	})

	pop := sys.PathOpAtRoot("file1")
	fd, err := sys.vfs.OpenAt(sys.ctx, sys.creds, &pop, &vfs.OpenOptions{})
	if err != nil {
		sys.t.Fatalf("OpenAt for PathOperation %+v failed: %v", pop, err)
	}
	defer fd.DecRef()

	content, err := sys.ReadToEnd(fd)
	if err != nil {
		sys.t.Fatalf("Read failed: %v", err)
	}
	if diff := cmp.Diff(staticFileContent, content); diff != "" {
		sys.t.Fatalf("Read returned unexpected data:\n--- want\n+++ got\n%v", diff)
	}
}

func TestCreateNewFileInStaticDir(t *testing.T) {
	sys := newTestSystem(t, func(creds *auth.Credentials, fs *filesystem) *kernfs.Dentry {
		return fs.newReadonlyDir(creds, 0755, map[string]*kernfs.Dentry{
			"dir1": fs.newDir(creds, 0755, nil),
		})
	})

	pop := sys.PathOpAtRoot("dir1/newfile")
	opts := &vfs.OpenOptions{Flags: linux.O_CREAT | linux.O_EXCL, Mode: defaultMode}
	fd, err := sys.vfs.OpenAt(sys.ctx, sys.creds, &pop, opts)
	if err != nil {
		sys.t.Fatalf("OpenAt(pop:%+v, opts:%+v) failed: %v", pop, opts, err)
	}

	// Close the file. The file should persist.
	fd.DecRef()

	fd, err = sys.vfs.OpenAt(sys.ctx, sys.creds, &pop, &vfs.OpenOptions{})
	if err != nil {
		sys.t.Fatalf("OpenAt(pop:%+v) = %+v failed: %v", pop, fd, err)
	}
	fd.DecRef()
}

// direntCollector provides an implementation for vfs.IterDirentsCallback for
// testing. It simply iterates to the end of a given directory FD and collects
// all dirents emitted by the callback.
type direntCollector struct {
	mu      sync.Mutex
	dirents map[string]vfs.Dirent
}

// Handle implements vfs.IterDirentsCallback.Handle.
func (d *direntCollector) Handle(dirent vfs.Dirent) bool {
	d.mu.Lock()
	if d.dirents == nil {
		d.dirents = make(map[string]vfs.Dirent)
	}
	d.dirents[dirent.Name] = dirent
	d.mu.Unlock()
	return true
}

// count returns the number of dirents currently in the collector.
func (d *direntCollector) count() int {
	d.mu.Lock()
	defer d.mu.Unlock()
	return len(d.dirents)
}

// contains checks whether the collector has a dirent with the given name and
// type.
func (d *direntCollector) contains(name string, typ uint8) error {
	d.mu.Lock()
	defer d.mu.Unlock()
	dirent, ok := d.dirents[name]
	if !ok {
		return fmt.Errorf("No dirent named %q found", name)
	}
	if dirent.Type != typ {
		return fmt.Errorf("Dirent named %q found, but was expecting type %d, got: %+v", name, typ, dirent)
	}
	return nil
}

func TestDirFDReadWrite(t *testing.T) {
	sys := newTestSystem(t, func(creds *auth.Credentials, fs *filesystem) *kernfs.Dentry {
		return fs.newReadonlyDir(creds, 0755, nil)
	})

	pop := sys.PathOpAtRoot("/")
	fd, err := sys.vfs.OpenAt(sys.ctx, sys.creds, &pop, &vfs.OpenOptions{})
	if err != nil {
		sys.t.Fatalf("OpenAt for PathOperation %+v failed: %v", pop, err)
	}
	defer fd.DecRef()

	// Read/Write should fail for directory FDs.
	if _, err := fd.Read(sys.ctx, usermem.BytesIOSequence([]byte{}), vfs.ReadOptions{}); err != syserror.EISDIR {
		sys.t.Fatalf("Read for directory FD failed with unexpected error: %v", err)
	}
	if _, err := fd.Write(sys.ctx, usermem.BytesIOSequence([]byte{}), vfs.WriteOptions{}); err != syserror.EISDIR {
		sys.t.Fatalf("Wrire for directory FD failed with unexpected error: %v", err)
	}
}

func TestDirFDIterDirents(t *testing.T) {
	sys := newTestSystem(t, func(creds *auth.Credentials, fs *filesystem) *kernfs.Dentry {
		return fs.newReadonlyDir(creds, 0755, map[string]*kernfs.Dentry{
			// Fill root with nodes backed by various inode implementations.
			"dir1": fs.newReadonlyDir(creds, 0755, nil),
			"dir2": fs.newDir(creds, 0755, map[string]*kernfs.Dentry{
				"dir3": fs.newDir(creds, 0755, nil),
			}),
			"file1": fs.newFile(creds, staticFileContent),
		})
	})

	pop := sys.PathOpAtRoot("/")
	fd, err := sys.vfs.OpenAt(sys.ctx, sys.creds, &pop, &vfs.OpenOptions{})
	if err != nil {
		sys.t.Fatalf("OpenAt for PathOperation %+v failed: %v", pop, err)
	}
	defer fd.DecRef()

	collector := &direntCollector{}
	if err := fd.IterDirents(sys.ctx, collector); err != nil {
		sys.t.Fatalf("IterDirent failed: %v", err)
	}

	// Root directory should contain ".", ".." and 3 children:
	if collector.count() != 5 {
		sys.t.Fatalf("IterDirent returned too many dirents")
	}
	for _, dirName := range []string{".", "..", "dir1", "dir2"} {
		if err := collector.contains(dirName, linux.DT_DIR); err != nil {
			sys.t.Fatalf("IterDirent had unexpected results: %v", err)
		}
	}
	if err := collector.contains("file1", linux.DT_REG); err != nil {
		sys.t.Fatalf("IterDirent had unexpected results: %v", err)
	}

}