// Copyright 2016 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#include <memory>
#include <stdint.h>
#include <utility>

#include "base/bind.h"
#include "base/macros.h"
#include "base/run_loop.h"
#include "content/browser/utility_process_host_impl.h"
#include "content/public/browser/browser_thread.h"
#include "content/public/browser/utility_process_host_client.h"
#include "content/public/test/content_browser_test.h"
#include "content/public/test/test_service.mojom.h"
#include "services/service_manager/public/cpp/interface_provider.h"

namespace content {
namespace {

    const std::string kTestMessage = "My hovercraft is full of eels!";

    class MojoSandboxTest : public ContentBrowserTest {
    public:
        MojoSandboxTest() { }

        void SetUpOnMainThread() override
        {
            base::RunLoop run_loop;
            BrowserThread::PostTaskAndReply(
                BrowserThread::IO, FROM_HERE,
                base::Bind(&MojoSandboxTest::StartUtilityProcessOnIoThread,
                    base::Unretained(this)),
                run_loop.QuitClosure());
            run_loop.Run();
        }

        void TearDownOnMainThread() override
        {
            base::RunLoop run_loop;
            BrowserThread::PostTaskAndReply(
                BrowserThread::IO, FROM_HERE,
                base::Bind(&MojoSandboxTest::StopUtilityProcessOnIoThread,
                    base::Unretained(this)),
                run_loop.QuitClosure());
            run_loop.Run();
        }

    protected:
        std::unique_ptr<UtilityProcessHostImpl> host_;

    private:
        void StartUtilityProcessOnIoThread()
        {
            host_.reset(new UtilityProcessHostImpl(nullptr, nullptr));
            ASSERT_TRUE(host_->Start());
        }

        void StopUtilityProcessOnIoThread() { host_.reset(); }

        DISALLOW_COPY_AND_ASSIGN(MojoSandboxTest);
    };

    IN_PROC_BROWSER_TEST_F(MojoSandboxTest, SubprocessSharedBuffer)
    {
        // Ensures that a shared buffer can be created within a sandboxed process.

        mojom::TestServicePtr test_service;
        host_->GetRemoteInterfaces()->GetInterface(&test_service);

        bool got_response = false;
        base::RunLoop run_loop;
        test_service.set_connection_error_handler(run_loop.QuitClosure());
        test_service->CreateSharedBuffer(
            kTestMessage,
            base::Bind(
                [](const base::Closure& quit_closure, bool* got_response,
                    mojo::ScopedSharedBufferHandle buffer) {
                    ASSERT_TRUE(buffer.is_valid());
                    mojo::ScopedSharedBufferMapping mapping = buffer->Map(kTestMessage.size());
                    ASSERT_TRUE(mapping);
                    std::string contents(static_cast<const char*>(mapping.get()),
                        kTestMessage.size());
                    EXPECT_EQ(kTestMessage, contents);
                    *got_response = true;
                    quit_closure.Run();
                },
                run_loop.QuitClosure(), &got_response));
        run_loop.Run();
        EXPECT_TRUE(got_response);
    }

} //  namespace
} //  namespace content
