// Copyright (c) 2020 The Bitcoin Core developers
// Distributed under the MIT software license, see the accompanying
// file COPYING or http://www.opensource.org/licenses/mit-license.php.

#include <chainparams.h>
#include <chainparamsbase.h>
#include <net.h>
#include <net_permissions.h>
#include <netaddress.h>
#include <optional.h>
#include <protocol.h>
#include <random.h>
#include <test/fuzz/FuzzedDataProvider.h>
#include <test/fuzz/fuzz.h>
#include <test/fuzz/util.h>
#include <test/util/setup_common.h>

#include <cstdint>
#include <string>
#include <vector>

void initialize()
{
    static const BasicTestingSetup basic_testing_setup;
}

void test_one_input(const std::vector<uint8_t>& buffer)
{
    FuzzedDataProvider fuzzed_data_provider(buffer.data(), buffer.size());

    const std::optional<CAddress> address = ConsumeDeserializable<CAddress>(fuzzed_data_provider);
    if (!address) {
        return;
    }
    const std::optional<CAddress> address_bind = ConsumeDeserializable<CAddress>(fuzzed_data_provider);
    if (!address_bind) {
        return;
    }

    CNode node{fuzzed_data_provider.ConsumeIntegral<NodeId>(),
               static_cast<ServiceFlags>(fuzzed_data_provider.ConsumeIntegral<uint64_t>()),
               fuzzed_data_provider.ConsumeIntegral<int>(),
               INVALID_SOCKET,
               *address,
               fuzzed_data_provider.ConsumeIntegral<uint64_t>(),
               fuzzed_data_provider.ConsumeIntegral<uint64_t>(),
               *address_bind,
               fuzzed_data_provider.ConsumeRandomLengthString(32),
               fuzzed_data_provider.PickValueInArray({ConnectionType::INBOUND, ConnectionType::OUTBOUND_FULL_RELAY, ConnectionType::MANUAL, ConnectionType::FEELER, ConnectionType::BLOCK_RELAY, ConnectionType::ADDR_FETCH})};
    while (fuzzed_data_provider.ConsumeBool()) {
        switch (fuzzed_data_provider.ConsumeIntegralInRange<int>(0, 12)) {
        case 0: {
            node.CloseSocketDisconnect();
            break;
        }
        case 1: {
            node.MaybeSetAddrName(fuzzed_data_provider.ConsumeRandomLengthString(32));
            break;
        }
        case 2: {
            node.SetSendVersion(fuzzed_data_provider.ConsumeIntegral<int>());
            break;
        }
        case 3: {
            const std::vector<bool> asmap = ConsumeRandomLengthIntegralVector<bool>(fuzzed_data_provider, 128);
            if (!SanityCheckASMap(asmap)) {
                break;
            }
            CNodeStats stats;
            node.copyStats(stats, asmap);
            break;
        }
        case 4: {
            node.SetRecvVersion(fuzzed_data_provider.ConsumeIntegral<int>());
            break;
        }
        case 5: {
            const CNode* add_ref_node = node.AddRef();
            assert(add_ref_node == &node);
            break;
        }
        case 6: {
            if (node.GetRefCount() > 0) {
                node.Release();
            }
            break;
        }
        case 7: {
            if (node.m_addr_known == nullptr) {
                break;
            }
            const std::optional<CAddress> addr_opt = ConsumeDeserializable<CAddress>(fuzzed_data_provider);
            if (!addr_opt) {
                break;
            }
            node.AddAddressKnown(*addr_opt);
            break;
        }
        case 8: {
            if (node.m_addr_known == nullptr) {
                break;
            }
            const std::optional<CAddress> addr_opt = ConsumeDeserializable<CAddress>(fuzzed_data_provider);
            if (!addr_opt) {
                break;
            }
            FastRandomContext fast_random_context{ConsumeUInt256(fuzzed_data_provider)};
            node.PushAddress(*addr_opt, fast_random_context);
            break;
        }
        case 9: {
            const std::optional<CInv> inv_opt = ConsumeDeserializable<CInv>(fuzzed_data_provider);
            if (!inv_opt) {
                break;
            }
            node.AddKnownTx(inv_opt->hash);
            break;
        }
        case 10: {
            node.PushTxInventory(ConsumeUInt256(fuzzed_data_provider));
            break;
        }
        case 11: {
            const std::optional<CService> service_opt = ConsumeDeserializable<CService>(fuzzed_data_provider);
            if (!service_opt) {
                break;
            }
            node.SetAddrLocal(*service_opt);
            break;
        }
        case 12: {
            const std::vector<uint8_t> b = ConsumeRandomLengthByteVector(fuzzed_data_provider);
            bool complete;
            node.ReceiveMsgBytes((const char*)b.data(), b.size(), complete);
            break;
        }
        }
    }

    (void)node.GetAddrLocal();
    (void)node.GetAddrName();
    (void)node.GetId();
    (void)node.GetLocalNonce();
    (void)node.GetLocalServices();
    (void)node.GetMyStartingHeight();
    (void)node.GetRecvVersion();
    const int ref_count = node.GetRefCount();
    assert(ref_count >= 0);
    (void)node.GetSendVersion();
    (void)node.IsAddrRelayPeer();

    const NetPermissionFlags net_permission_flags = fuzzed_data_provider.ConsumeBool() ?
                                                        fuzzed_data_provider.PickValueInArray<NetPermissionFlags>({NetPermissionFlags::PF_NONE, NetPermissionFlags::PF_BLOOMFILTER, NetPermissionFlags::PF_RELAY, NetPermissionFlags::PF_FORCERELAY, NetPermissionFlags::PF_NOBAN, NetPermissionFlags::PF_MEMPOOL, NetPermissionFlags::PF_ISIMPLICIT, NetPermissionFlags::PF_ALL}) :
                                                        static_cast<NetPermissionFlags>(fuzzed_data_provider.ConsumeIntegral<uint32_t>());
    (void)node.HasPermission(net_permission_flags);
}