blob: 9d741166bf21690996900a511383aeed887a4475 [file] [log] [blame]
Alex Deymoaea4c1c2015-08-19 20:24:43 -07001//
2// Copyright (C) 2011 The Android Open Source Project
3//
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at
7//
8// http://www.apache.org/licenses/LICENSE-2.0
9//
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15//
rspangler@google.com49fdf182009-10-10 00:57:34 +000016
Alex Deymo39910dc2015-11-09 17:04:30 -080017#include "update_engine/payload_consumer/download_action.h"
Alex Deymo8427b4a2014-11-05 14:00:32 -080018
Darin Petkov9d911fa2010-08-19 09:36:08 -070019#include <gmock/gmock.h>
rspangler@google.com49fdf182009-10-10 00:57:34 +000020#include <gtest/gtest.h>
Darin Petkov73058b42010-10-06 16:32:19 -070021
Ben Chan02f7c1d2014-10-18 15:18:02 -070022#include <memory>
David Zeuthen8f191b22013-08-06 12:27:50 -070023#include <string>
24#include <utility>
David Zeuthen8f191b22013-08-06 12:27:50 -070025
Alex Deymo60ca1a72015-06-18 18:19:15 -070026#include <base/bind.h>
Alex Vakulenko75039d72014-03-25 12:36:28 -070027#include <base/files/file_path.h>
Ben Chan06c76a42014-09-05 08:21:06 -070028#include <base/files/file_util.h>
Alex Deymo60ca1a72015-06-18 18:19:15 -070029#include <base/location.h>
Alex Vakulenko75039d72014-03-25 12:36:28 -070030#include <base/strings/stringprintf.h>
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -070031#include <brillo/bind_lambda.h>
32#include <brillo/message_loops/fake_message_loop.h>
33#include <brillo/message_loops/message_loop.h>
David Zeuthen8f191b22013-08-06 12:27:50 -070034
Alex Deymo39910dc2015-11-09 17:04:30 -080035#include "update_engine/common/action_pipe.h"
36#include "update_engine/common/hash_calculator.h"
37#include "update_engine/common/mock_http_fetcher.h"
38#include "update_engine/common/mock_prefs.h"
39#include "update_engine/common/test_utils.h"
40#include "update_engine/common/utils.h"
David Zeuthen8f191b22013-08-06 12:27:50 -070041#include "update_engine/fake_p2p_manager_configuration.h"
Gilad Arnold5bb4c902014-04-10 12:32:13 -070042#include "update_engine/fake_system_state.h"
Alex Deymo542c19b2015-12-03 07:43:31 -030043#include "update_engine/payload_consumer/mock_download_action.h"
Gilad Arnold4a0321b2014-10-28 15:57:30 -070044#include "update_engine/update_manager/fake_update_manager.h"
rspangler@google.com49fdf182009-10-10 00:57:34 +000045
46namespace chromeos_update_engine {
47
Alex Deymof329b932014-10-30 01:37:48 -070048using base::FilePath;
49using base::ReadFileToString;
50using base::WriteFile;
rspangler@google.com49fdf182009-10-10 00:57:34 +000051using std::string;
Ben Chan02f7c1d2014-10-18 15:18:02 -070052using std::unique_ptr;
Alex Deymoe5e5fe92015-10-05 09:28:19 -070053using test_utils::ScopedTempFile;
Darin Petkov9d911fa2010-08-19 09:36:08 -070054using testing::AtLeast;
55using testing::InSequence;
Gilad Arnold74b5f552014-10-07 08:17:16 -070056using testing::Return;
Alex Deymof329b932014-10-30 01:37:48 -070057using testing::_;
rspangler@google.com49fdf182009-10-10 00:57:34 +000058
59class DownloadActionTest : public ::testing::Test { };
60
61namespace {
Darin Petkov9d911fa2010-08-19 09:36:08 -070062
rspangler@google.com49fdf182009-10-10 00:57:34 +000063class DownloadActionTestProcessorDelegate : public ActionProcessorDelegate {
64 public:
David Zeuthena99981f2013-04-29 13:42:47 -070065 explicit DownloadActionTestProcessorDelegate(ErrorCode expected_code)
Alex Deymo60ca1a72015-06-18 18:19:15 -070066 : processing_done_called_(false),
Darin Petkovc97435c2010-07-20 12:37:43 -070067 expected_code_(expected_code) {}
Alex Deymo610277e2014-11-11 21:18:11 -080068 ~DownloadActionTestProcessorDelegate() override {
rspangler@google.com49fdf182009-10-10 00:57:34 +000069 EXPECT_TRUE(processing_done_called_);
70 }
Yunlian Jiang35866ed2015-01-29 13:09:20 -080071 void ProcessingDone(const ActionProcessor* processor,
72 ErrorCode code) override {
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -070073 brillo::MessageLoop::current()->BreakLoop();
74 brillo::Blob found_data;
adlr@google.comc98a7ed2009-12-04 18:54:03 +000075 ASSERT_TRUE(utils::ReadFile(path_, &found_data));
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -070076 if (expected_code_ != ErrorCode::kDownloadWriteError) {
Darin Petkov9ce452b2010-11-17 14:33:28 -080077 ASSERT_EQ(expected_data_.size(), found_data.size());
78 for (unsigned i = 0; i < expected_data_.size(); i++) {
79 EXPECT_EQ(expected_data_[i], found_data[i]);
80 }
rspangler@google.com49fdf182009-10-10 00:57:34 +000081 }
82 processing_done_called_ = true;
83 }
84
Yunlian Jiang35866ed2015-01-29 13:09:20 -080085 void ActionCompleted(ActionProcessor* processor,
86 AbstractAction* action,
87 ErrorCode code) override {
Darin Petkovc97435c2010-07-20 12:37:43 -070088 const string type = action->Type();
89 if (type == DownloadAction::StaticType()) {
90 EXPECT_EQ(expected_code_, code);
91 } else {
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -070092 EXPECT_EQ(ErrorCode::kSuccess, code);
Darin Petkovc97435c2010-07-20 12:37:43 -070093 }
rspangler@google.com49fdf182009-10-10 00:57:34 +000094 }
95
rspangler@google.com49fdf182009-10-10 00:57:34 +000096 string path_;
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -070097 brillo::Blob expected_data_;
rspangler@google.com49fdf182009-10-10 00:57:34 +000098 bool processing_done_called_;
David Zeuthena99981f2013-04-29 13:42:47 -070099 ErrorCode expected_code_;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000100};
101
Darin Petkov9ce452b2010-11-17 14:33:28 -0800102class TestDirectFileWriter : public DirectFileWriter {
103 public:
104 TestDirectFileWriter() : fail_write_(0), current_write_(0) {}
105 void set_fail_write(int fail_write) { fail_write_ = fail_write; }
106
Don Garrette410e0f2011-11-10 15:39:01 -0800107 virtual bool Write(const void* bytes, size_t count) {
Darin Petkov9ce452b2010-11-17 14:33:28 -0800108 if (++current_write_ == fail_write_) {
Don Garrette410e0f2011-11-10 15:39:01 -0800109 return false;
Darin Petkov9ce452b2010-11-17 14:33:28 -0800110 }
111 return DirectFileWriter::Write(bytes, count);
112 }
113
114 private:
115 // If positive, fail on the |fail_write_| call to Write.
116 int fail_write_;
117 int current_write_;
118};
119
Alex Deymo60ca1a72015-06-18 18:19:15 -0700120void StartProcessorInRunLoop(ActionProcessor* processor,
121 MockHttpFetcher* http_fetcher) {
rspangler@google.com49fdf182009-10-10 00:57:34 +0000122 processor->StartProcessing();
Andrew de los Reyes34e41a12010-10-26 20:07:58 -0700123 http_fetcher->SetOffset(1);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000124}
125
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700126void TestWithData(const brillo::Blob& data,
Darin Petkov9ce452b2010-11-17 14:33:28 -0800127 int fail_write,
Darin Petkov9d911fa2010-08-19 09:36:08 -0700128 bool use_download_delegate) {
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700129 brillo::FakeMessageLoop loop(nullptr);
Alex Deymo60ca1a72015-06-18 18:19:15 -0700130 loop.SetAsCurrent();
Alex Deymo5ed695e2015-10-05 16:59:23 -0700131 FakeSystemState fake_system_state;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000132
133 // TODO(adlr): see if we need a different file for build bots
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700134 ScopedTempFile output_temp_file;
Darin Petkov9ce452b2010-11-17 14:33:28 -0800135 TestDirectFileWriter writer;
Alex Deymobffa0602016-02-12 17:16:29 -0800136 EXPECT_EQ(
137 0, writer.Open(output_temp_file.path().c_str(), O_WRONLY | O_CREAT, 0));
Darin Petkov9ce452b2010-11-17 14:33:28 -0800138 writer.set_fail_write(fail_write);
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700139
Andrew de los Reyes34e41a12010-10-26 20:07:58 -0700140 // We pull off the first byte from data and seek past it.
Alex Deymo39910dc2015-11-09 17:04:30 -0800141 string hash = HashCalculator::HashOfBytes(&data[1], data.size() - 1);
Darin Petkov7ed561b2011-10-04 02:59:03 -0700142 uint64_t size = data.size();
Alex Deymo64d98782016-02-05 18:03:48 -0800143 InstallPlan install_plan;
144 install_plan.payload_type = InstallPayloadType::kDelta;
145 install_plan.payload_size = size;
146 install_plan.payload_hash = hash;
Alex Deymo5ed695e2015-10-05 16:59:23 -0700147 install_plan.source_slot = 0;
148 install_plan.target_slot = 1;
149 // We mark both slots as bootable. Only the target slot should be unbootable
150 // after the download starts.
151 fake_system_state.fake_boot_control()->SetSlotBootable(
152 install_plan.source_slot, true);
153 fake_system_state.fake_boot_control()->SetSlotBootable(
154 install_plan.target_slot, true);
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000155 ObjectFeederAction<InstallPlan> feeder_action;
156 feeder_action.set_obj(install_plan);
Alex Deymo8427b4a2014-11-05 14:00:32 -0800157 MockPrefs prefs;
Alex Vakulenkof68bbbc2015-02-09 12:53:18 -0800158 MockHttpFetcher* http_fetcher = new MockHttpFetcher(data.data(),
Andrew de los Reyes45168102010-11-22 11:13:50 -0800159 data.size(),
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700160 nullptr);
Andrew de los Reyes34e41a12010-10-26 20:07:58 -0700161 // takes ownership of passed in HttpFetcher
Alex Deymo1b3556c2016-02-03 09:54:02 -0800162 DownloadAction download_action(&prefs,
163 fake_system_state.boot_control(),
164 fake_system_state.hardware(),
165 &fake_system_state,
Amin Hassani7ecda262017-07-11 17:10:50 -0700166 http_fetcher,
167 false /* is_interactive */);
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700168 download_action.SetTestFileWriter(&writer);
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000169 BondActions(&feeder_action, &download_action);
Alex Deymo542c19b2015-12-03 07:43:31 -0300170 MockDownloadActionDelegate download_delegate;
Darin Petkov9d911fa2010-08-19 09:36:08 -0700171 if (use_download_delegate) {
172 InSequence s;
173 download_action.set_delegate(&download_delegate);
Andrew de los Reyes34e41a12010-10-26 20:07:58 -0700174 if (data.size() > kMockHttpFetcherChunkSize)
175 EXPECT_CALL(download_delegate,
Alex Deymo542c19b2015-12-03 07:43:31 -0300176 BytesReceived(_, 1 + kMockHttpFetcherChunkSize, _));
177 EXPECT_CALL(download_delegate, BytesReceived(_, _, _)).Times(AtLeast(1));
Darin Petkov9d911fa2010-08-19 09:36:08 -0700178 }
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700179 ErrorCode expected_code = ErrorCode::kSuccess;
Darin Petkov7ed561b2011-10-04 02:59:03 -0700180 if (fail_write > 0)
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700181 expected_code = ErrorCode::kDownloadWriteError;
Darin Petkov50332f12010-09-24 11:44:47 -0700182 DownloadActionTestProcessorDelegate delegate(expected_code);
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700183 delegate.expected_data_ = brillo::Blob(data.begin() + 1, data.end());
Alex Deymobffa0602016-02-12 17:16:29 -0800184 delegate.path_ = output_temp_file.path();
rspangler@google.com49fdf182009-10-10 00:57:34 +0000185 ActionProcessor processor;
186 processor.set_delegate(&delegate);
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000187 processor.EnqueueAction(&feeder_action);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000188 processor.EnqueueAction(&download_action);
189
Alex Deymo60ca1a72015-06-18 18:19:15 -0700190 loop.PostTask(FROM_HERE,
191 base::Bind(&StartProcessorInRunLoop, &processor, http_fetcher));
192 loop.Run();
193 EXPECT_FALSE(loop.PendingTasks());
Alex Deymo5ed695e2015-10-05 16:59:23 -0700194
195 EXPECT_TRUE(fake_system_state.fake_boot_control()->IsSlotBootable(
196 install_plan.source_slot));
197 EXPECT_FALSE(fake_system_state.fake_boot_control()->IsSlotBootable(
198 install_plan.target_slot));
rspangler@google.com49fdf182009-10-10 00:57:34 +0000199}
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700200} // namespace
rspangler@google.com49fdf182009-10-10 00:57:34 +0000201
202TEST(DownloadActionTest, SimpleTest) {
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700203 brillo::Blob small;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000204 const char* foo = "foo";
205 small.insert(small.end(), foo, foo + strlen(foo));
Darin Petkov50332f12010-09-24 11:44:47 -0700206 TestWithData(small,
Darin Petkov9ce452b2010-11-17 14:33:28 -0800207 0, // fail_write
Darin Petkov50332f12010-09-24 11:44:47 -0700208 true); // use_download_delegate
rspangler@google.com49fdf182009-10-10 00:57:34 +0000209}
210
211TEST(DownloadActionTest, LargeTest) {
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700212 brillo::Blob big(5 * kMockHttpFetcherChunkSize);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000213 char c = '0';
214 for (unsigned int i = 0; i < big.size(); i++) {
215 big[i] = c;
Darin Petkov9ce452b2010-11-17 14:33:28 -0800216 c = ('9' == c) ? '0' : c + 1;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000217 }
Darin Petkov50332f12010-09-24 11:44:47 -0700218 TestWithData(big,
Darin Petkov9ce452b2010-11-17 14:33:28 -0800219 0, // fail_write
220 true); // use_download_delegate
221}
222
223TEST(DownloadActionTest, FailWriteTest) {
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700224 brillo::Blob big(5 * kMockHttpFetcherChunkSize);
Darin Petkov9ce452b2010-11-17 14:33:28 -0800225 char c = '0';
226 for (unsigned int i = 0; i < big.size(); i++) {
227 big[i] = c;
228 c = ('9' == c) ? '0' : c + 1;
229 }
230 TestWithData(big,
Darin Petkov9ce452b2010-11-17 14:33:28 -0800231 2, // fail_write
Darin Petkov50332f12010-09-24 11:44:47 -0700232 true); // use_download_delegate
Darin Petkovc97435c2010-07-20 12:37:43 -0700233}
234
Darin Petkov9d911fa2010-08-19 09:36:08 -0700235TEST(DownloadActionTest, NoDownloadDelegateTest) {
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700236 brillo::Blob small;
Darin Petkov9d911fa2010-08-19 09:36:08 -0700237 const char* foo = "foofoo";
238 small.insert(small.end(), foo, foo + strlen(foo));
Darin Petkov50332f12010-09-24 11:44:47 -0700239 TestWithData(small,
Darin Petkov9ce452b2010-11-17 14:33:28 -0800240 0, // fail_write
Darin Petkov50332f12010-09-24 11:44:47 -0700241 false); // use_download_delegate
rspangler@google.com49fdf182009-10-10 00:57:34 +0000242}
243
244namespace {
245class TerminateEarlyTestProcessorDelegate : public ActionProcessorDelegate {
246 public:
247 void ProcessingStopped(const ActionProcessor* processor) {
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700248 brillo::MessageLoop::current()->BreakLoop();
rspangler@google.com49fdf182009-10-10 00:57:34 +0000249 }
rspangler@google.com49fdf182009-10-10 00:57:34 +0000250};
251
Alex Deymo60ca1a72015-06-18 18:19:15 -0700252void TerminateEarlyTestStarter(ActionProcessor* processor) {
rspangler@google.com49fdf182009-10-10 00:57:34 +0000253 processor->StartProcessing();
254 CHECK(processor->IsRunning());
255 processor->StopProcessing();
rspangler@google.com49fdf182009-10-10 00:57:34 +0000256}
257
Darin Petkov9d911fa2010-08-19 09:36:08 -0700258void TestTerminateEarly(bool use_download_delegate) {
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700259 brillo::FakeMessageLoop loop(nullptr);
Alex Deymo60ca1a72015-06-18 18:19:15 -0700260 loop.SetAsCurrent();
rspangler@google.com49fdf182009-10-10 00:57:34 +0000261
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700262 brillo::Blob data(kMockHttpFetcherChunkSize +
Alex Vakulenkof68bbbc2015-02-09 12:53:18 -0800263 kMockHttpFetcherChunkSize / 2);
264 memset(data.data(), 0, data.size());
rspangler@google.com49fdf182009-10-10 00:57:34 +0000265
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700266 ScopedTempFile temp_file;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000267 {
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700268 DirectFileWriter writer;
Alex Deymobffa0602016-02-12 17:16:29 -0800269 EXPECT_EQ(0, writer.Open(temp_file.path().c_str(), O_WRONLY | O_CREAT, 0));
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700270
rspangler@google.com49fdf182009-10-10 00:57:34 +0000271 // takes ownership of passed in HttpFetcher
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000272 ObjectFeederAction<InstallPlan> feeder_action;
Alex Deymo64d98782016-02-05 18:03:48 -0800273 InstallPlan install_plan;
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000274 feeder_action.set_obj(install_plan);
Alex Deymo5ed695e2015-10-05 16:59:23 -0700275 FakeSystemState fake_system_state_;
Alex Deymo8427b4a2014-11-05 14:00:32 -0800276 MockPrefs prefs;
Alex Deymo1b3556c2016-02-03 09:54:02 -0800277 DownloadAction download_action(
278 &prefs,
279 fake_system_state_.boot_control(),
280 fake_system_state_.hardware(),
281 &fake_system_state_,
Amin Hassani7ecda262017-07-11 17:10:50 -0700282 new MockHttpFetcher(data.data(), data.size(), nullptr),
283 false /* is_interactive */);
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700284 download_action.SetTestFileWriter(&writer);
Alex Deymo542c19b2015-12-03 07:43:31 -0300285 MockDownloadActionDelegate download_delegate;
Darin Petkov9d911fa2010-08-19 09:36:08 -0700286 if (use_download_delegate) {
Darin Petkov9d911fa2010-08-19 09:36:08 -0700287 download_action.set_delegate(&download_delegate);
Alex Deymo542c19b2015-12-03 07:43:31 -0300288 EXPECT_CALL(download_delegate, BytesReceived(_, _, _)).Times(0);
Darin Petkov9d911fa2010-08-19 09:36:08 -0700289 }
rspangler@google.com49fdf182009-10-10 00:57:34 +0000290 TerminateEarlyTestProcessorDelegate delegate;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000291 ActionProcessor processor;
292 processor.set_delegate(&delegate);
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000293 processor.EnqueueAction(&feeder_action);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000294 processor.EnqueueAction(&download_action);
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000295 BondActions(&feeder_action, &download_action);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000296
Alex Deymo60ca1a72015-06-18 18:19:15 -0700297 loop.PostTask(FROM_HERE,
298 base::Bind(&TerminateEarlyTestStarter, &processor));
299 loop.Run();
300 EXPECT_FALSE(loop.PendingTasks());
rspangler@google.com49fdf182009-10-10 00:57:34 +0000301 }
302
303 // 1 or 0 chunks should have come through
Alex Deymobffa0602016-02-12 17:16:29 -0800304 const off_t resulting_file_size(utils::FileSize(temp_file.path()));
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700305 EXPECT_GE(resulting_file_size, 0);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000306 if (resulting_file_size != 0)
Alex Deymo5fe0c4e2016-02-16 18:46:24 -0800307 EXPECT_EQ(kMockHttpFetcherChunkSize,
308 static_cast<size_t>(resulting_file_size));
rspangler@google.com49fdf182009-10-10 00:57:34 +0000309}
310
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700311} // namespace
Darin Petkov9d911fa2010-08-19 09:36:08 -0700312
313TEST(DownloadActionTest, TerminateEarlyTest) {
314 TestTerminateEarly(true);
315}
316
317TEST(DownloadActionTest, TerminateEarlyNoDownloadDelegateTest) {
318 TestTerminateEarly(false);
319}
320
rspangler@google.com49fdf182009-10-10 00:57:34 +0000321class DownloadActionTestAction;
322
323template<>
324class ActionTraits<DownloadActionTestAction> {
325 public:
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000326 typedef InstallPlan OutputObjectType;
327 typedef InstallPlan InputObjectType;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000328};
329
330// This is a simple Action class for testing.
Yunlian Jiang2dac5762013-04-12 09:53:09 -0700331class DownloadActionTestAction : public Action<DownloadActionTestAction> {
332 public:
rspangler@google.com49fdf182009-10-10 00:57:34 +0000333 DownloadActionTestAction() : did_run_(false) {}
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000334 typedef InstallPlan InputObjectType;
335 typedef InstallPlan OutputObjectType;
336 ActionPipe<InstallPlan>* in_pipe() { return in_pipe_.get(); }
337 ActionPipe<InstallPlan>* out_pipe() { return out_pipe_.get(); }
rspangler@google.com49fdf182009-10-10 00:57:34 +0000338 ActionProcessor* processor() { return processor_; }
339 void PerformAction() {
340 did_run_ = true;
341 ASSERT_TRUE(HasInputObject());
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000342 EXPECT_TRUE(expected_input_object_ == GetInputObject());
rspangler@google.com49fdf182009-10-10 00:57:34 +0000343 ASSERT_TRUE(processor());
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700344 processor()->ActionComplete(this, ErrorCode::kSuccess);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000345 }
346 string Type() const { return "DownloadActionTestAction"; }
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000347 InstallPlan expected_input_object_;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000348 bool did_run_;
349};
350
351namespace {
352// This class is an ActionProcessorDelegate that simply terminates the
353// run loop when the ActionProcessor has completed processing. It's used
354// only by the test PassObjectOutTest.
355class PassObjectOutTestProcessorDelegate : public ActionProcessorDelegate {
356 public:
David Zeuthena99981f2013-04-29 13:42:47 -0700357 void ProcessingDone(const ActionProcessor* processor, ErrorCode code) {
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700358 brillo::MessageLoop::current()->BreakLoop();
rspangler@google.com49fdf182009-10-10 00:57:34 +0000359 }
rspangler@google.com49fdf182009-10-10 00:57:34 +0000360};
361
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700362} // namespace
rspangler@google.com49fdf182009-10-10 00:57:34 +0000363
364TEST(DownloadActionTest, PassObjectOutTest) {
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700365 brillo::FakeMessageLoop loop(nullptr);
Alex Deymo60ca1a72015-06-18 18:19:15 -0700366 loop.SetAsCurrent();
rspangler@google.com49fdf182009-10-10 00:57:34 +0000367
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700368 DirectFileWriter writer;
Alex Deymoe5e5fe92015-10-05 09:28:19 -0700369 EXPECT_EQ(0, writer.Open("/dev/null", O_WRONLY | O_CREAT, 0));
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700370
rspangler@google.com49fdf182009-10-10 00:57:34 +0000371 // takes ownership of passed in HttpFetcher
Alex Deymo64d98782016-02-05 18:03:48 -0800372 InstallPlan install_plan;
373 install_plan.payload_size = 1;
374 install_plan.payload_hash = HashCalculator::HashOfString("x");
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000375 ObjectFeederAction<InstallPlan> feeder_action;
376 feeder_action.set_obj(install_plan);
Alex Deymo8427b4a2014-11-05 14:00:32 -0800377 MockPrefs prefs;
Alex Deymo5ed695e2015-10-05 16:59:23 -0700378 FakeSystemState fake_system_state_;
Alex Deymo1b3556c2016-02-03 09:54:02 -0800379 DownloadAction download_action(&prefs,
380 fake_system_state_.boot_control(),
381 fake_system_state_.hardware(),
382 &fake_system_state_,
Amin Hassani7ecda262017-07-11 17:10:50 -0700383 new MockHttpFetcher("x", 1, nullptr),
384 false /* is_interactive */);
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700385 download_action.SetTestFileWriter(&writer);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000386
387 DownloadActionTestAction test_action;
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000388 test_action.expected_input_object_ = install_plan;
389 BondActions(&feeder_action, &download_action);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000390 BondActions(&download_action, &test_action);
391
392 ActionProcessor processor;
393 PassObjectOutTestProcessorDelegate delegate;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000394 processor.set_delegate(&delegate);
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000395 processor.EnqueueAction(&feeder_action);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000396 processor.EnqueueAction(&download_action);
397 processor.EnqueueAction(&test_action);
398
Luis Hector Chavezf1cf3482016-07-19 14:29:19 -0700399 loop.PostTask(
400 FROM_HERE,
401 base::Bind(
402 [](ActionProcessor* processor) { processor->StartProcessing(); },
403 base::Unretained(&processor)));
Alex Deymo60ca1a72015-06-18 18:19:15 -0700404 loop.Run();
405 EXPECT_FALSE(loop.PendingTasks());
rspangler@google.com49fdf182009-10-10 00:57:34 +0000406
407 EXPECT_EQ(true, test_action.did_run_);
408}
409
David Zeuthen8f191b22013-08-06 12:27:50 -0700410// Test fixture for P2P tests.
411class P2PDownloadActionTest : public testing::Test {
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700412 protected:
David Zeuthen8f191b22013-08-06 12:27:50 -0700413 P2PDownloadActionTest()
Alex Deymo60ca1a72015-06-18 18:19:15 -0700414 : start_at_offset_(0),
Gilad Arnold4a0321b2014-10-28 15:57:30 -0700415 fake_um_(fake_system_state_.fake_clock()) {}
David Zeuthen8f191b22013-08-06 12:27:50 -0700416
Alex Deymo610277e2014-11-11 21:18:11 -0800417 ~P2PDownloadActionTest() override {}
David Zeuthen8f191b22013-08-06 12:27:50 -0700418
419 // Derived from testing::Test.
Alex Deymo610277e2014-11-11 21:18:11 -0800420 void SetUp() override {
Alex Deymo60ca1a72015-06-18 18:19:15 -0700421 loop_.SetAsCurrent();
David Zeuthen8f191b22013-08-06 12:27:50 -0700422 }
423
424 // Derived from testing::Test.
Alex Deymo610277e2014-11-11 21:18:11 -0800425 void TearDown() override {
Alex Deymo60ca1a72015-06-18 18:19:15 -0700426 EXPECT_FALSE(loop_.PendingTasks());
David Zeuthen8f191b22013-08-06 12:27:50 -0700427 }
428
429 // To be called by tests to setup the download. The
430 // |starting_offset| parameter is for where to resume.
431 void SetupDownload(off_t starting_offset) {
432 start_at_offset_ = starting_offset;
433 // Prepare data 10 kB of data.
434 data_.clear();
435 for (unsigned int i = 0; i < 10 * 1000; i++)
436 data_ += 'a' + (i % 25);
437
438 // Setup p2p.
439 FakeP2PManagerConfiguration *test_conf = new FakeP2PManagerConfiguration();
David Zeuthen41f2cf52014-11-05 12:29:45 -0500440 p2p_manager_.reset(P2PManager::Construct(
Gilad Arnold4a0321b2014-10-28 15:57:30 -0700441 test_conf, nullptr, &fake_um_, "cros_au", 3,
David Zeuthen41f2cf52014-11-05 12:29:45 -0500442 base::TimeDelta::FromDays(5)));
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700443 fake_system_state_.set_p2p_manager(p2p_manager_.get());
David Zeuthen8f191b22013-08-06 12:27:50 -0700444 }
445
446 // To be called by tests to perform the download. The
447 // |use_p2p_to_share| parameter is used to indicate whether the
448 // payload should be shared via p2p.
449 void StartDownload(bool use_p2p_to_share) {
Gilad Arnold74b5f552014-10-07 08:17:16 -0700450 EXPECT_CALL(*fake_system_state_.mock_payload_state(),
451 GetUsingP2PForSharing())
452 .WillRepeatedly(Return(use_p2p_to_share));
David Zeuthen8f191b22013-08-06 12:27:50 -0700453
454 ScopedTempFile output_temp_file;
455 TestDirectFileWriter writer;
Alex Deymobffa0602016-02-12 17:16:29 -0800456 EXPECT_EQ(
457 0, writer.Open(output_temp_file.path().c_str(), O_WRONLY | O_CREAT, 0));
Alex Deymo64d98782016-02-05 18:03:48 -0800458 InstallPlan install_plan;
459 install_plan.payload_size = data_.length();
460 install_plan.payload_hash = "1234hash";
David Zeuthen8f191b22013-08-06 12:27:50 -0700461 ObjectFeederAction<InstallPlan> feeder_action;
462 feeder_action.set_obj(install_plan);
Alex Deymo8427b4a2014-11-05 14:00:32 -0800463 MockPrefs prefs;
David Zeuthen8f191b22013-08-06 12:27:50 -0700464 http_fetcher_ = new MockHttpFetcher(data_.c_str(),
465 data_.length(),
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700466 nullptr);
David Zeuthen8f191b22013-08-06 12:27:50 -0700467 // Note that DownloadAction takes ownership of the passed in HttpFetcher.
Alex Deymo1b3556c2016-02-03 09:54:02 -0800468 download_action_.reset(new DownloadAction(&prefs,
469 fake_system_state_.boot_control(),
470 fake_system_state_.hardware(),
471 &fake_system_state_,
Amin Hassani7ecda262017-07-11 17:10:50 -0700472 http_fetcher_,
473 false /* is_interactive */));
David Zeuthen8f191b22013-08-06 12:27:50 -0700474 download_action_->SetTestFileWriter(&writer);
475 BondActions(&feeder_action, download_action_.get());
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700476 DownloadActionTestProcessorDelegate delegate(ErrorCode::kSuccess);
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700477 delegate.expected_data_ = brillo::Blob(data_.begin() + start_at_offset_,
478 data_.end());
Alex Deymobffa0602016-02-12 17:16:29 -0800479 delegate.path_ = output_temp_file.path();
David Zeuthen8f191b22013-08-06 12:27:50 -0700480 processor_.set_delegate(&delegate);
481 processor_.EnqueueAction(&feeder_action);
482 processor_.EnqueueAction(download_action_.get());
483
Alex Deymo60ca1a72015-06-18 18:19:15 -0700484 loop_.PostTask(FROM_HERE, base::Bind(
485 &P2PDownloadActionTest::StartProcessorInRunLoopForP2P,
486 base::Unretained(this)));
487 loop_.Run();
David Zeuthen8f191b22013-08-06 12:27:50 -0700488 }
489
Alex Deymo60ca1a72015-06-18 18:19:15 -0700490 // Mainloop used to make StartDownload() synchronous.
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700491 brillo::FakeMessageLoop loop_{nullptr};
Alex Deymo60ca1a72015-06-18 18:19:15 -0700492
David Zeuthen8f191b22013-08-06 12:27:50 -0700493 // The DownloadAction instance under test.
Ben Chan02f7c1d2014-10-18 15:18:02 -0700494 unique_ptr<DownloadAction> download_action_;
David Zeuthen8f191b22013-08-06 12:27:50 -0700495
496 // The HttpFetcher used in the test.
497 MockHttpFetcher* http_fetcher_;
498
499 // The P2PManager used in the test.
Ben Chan02f7c1d2014-10-18 15:18:02 -0700500 unique_ptr<P2PManager> p2p_manager_;
David Zeuthen8f191b22013-08-06 12:27:50 -0700501
502 // The ActionProcessor used for running the actions.
503 ActionProcessor processor_;
504
505 // A fake system state.
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700506 FakeSystemState fake_system_state_;
David Zeuthen8f191b22013-08-06 12:27:50 -0700507
508 // The data being downloaded.
509 string data_;
510
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700511 private:
David Zeuthen8f191b22013-08-06 12:27:50 -0700512 // Callback used in StartDownload() method.
Alex Deymo60ca1a72015-06-18 18:19:15 -0700513 void StartProcessorInRunLoopForP2P() {
514 processor_.StartProcessing();
515 http_fetcher_->SetOffset(start_at_offset_);
David Zeuthen8f191b22013-08-06 12:27:50 -0700516 }
517
David Zeuthen8f191b22013-08-06 12:27:50 -0700518 // The requested starting offset passed to SetupDownload().
519 off_t start_at_offset_;
Gilad Arnold4a0321b2014-10-28 15:57:30 -0700520
521 chromeos_update_manager::FakeUpdateManager fake_um_;
David Zeuthen8f191b22013-08-06 12:27:50 -0700522};
523
524TEST_F(P2PDownloadActionTest, IsWrittenTo) {
Alex Deymo10875d92014-11-10 21:52:57 -0800525 if (!test_utils::IsXAttrSupported(FilePath("/tmp"))) {
David Zeuthen910ec5b2013-09-26 12:10:58 -0700526 LOG(WARNING) << "Skipping test because /tmp does not support xattr. "
527 << "Please update your system to support this feature.";
528 return;
529 }
530
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700531 SetupDownload(0); // starting_offset
532 StartDownload(true); // use_p2p_to_share
David Zeuthen8f191b22013-08-06 12:27:50 -0700533
534 // Check the p2p file and its content matches what was sent.
535 string file_id = download_action_->p2p_file_id();
Gilad Arnold74b5f552014-10-07 08:17:16 -0700536 EXPECT_NE("", file_id);
Alex Deymo80f70ff2016-02-10 16:08:11 -0800537 EXPECT_EQ(static_cast<int>(data_.length()),
538 p2p_manager_->FileGetSize(file_id));
539 EXPECT_EQ(static_cast<int>(data_.length()),
540 p2p_manager_->FileGetExpectedSize(file_id));
David Zeuthen8f191b22013-08-06 12:27:50 -0700541 string p2p_file_contents;
542 EXPECT_TRUE(ReadFileToString(p2p_manager_->FileGetPath(file_id),
543 &p2p_file_contents));
544 EXPECT_EQ(data_, p2p_file_contents);
545}
546
547TEST_F(P2PDownloadActionTest, DeleteIfHoleExists) {
Alex Deymo10875d92014-11-10 21:52:57 -0800548 if (!test_utils::IsXAttrSupported(FilePath("/tmp"))) {
David Zeuthen910ec5b2013-09-26 12:10:58 -0700549 LOG(WARNING) << "Skipping test because /tmp does not support xattr. "
550 << "Please update your system to support this feature.";
551 return;
552 }
553
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700554 SetupDownload(1000); // starting_offset
555 StartDownload(true); // use_p2p_to_share
David Zeuthen8f191b22013-08-06 12:27:50 -0700556
557 // DownloadAction should convey that the file is not being shared.
558 // and that we don't have any p2p files.
559 EXPECT_EQ(download_action_->p2p_file_id(), "");
560 EXPECT_EQ(p2p_manager_->CountSharedFiles(), 0);
561}
562
563TEST_F(P2PDownloadActionTest, CanAppend) {
Alex Deymo10875d92014-11-10 21:52:57 -0800564 if (!test_utils::IsXAttrSupported(FilePath("/tmp"))) {
David Zeuthen910ec5b2013-09-26 12:10:58 -0700565 LOG(WARNING) << "Skipping test because /tmp does not support xattr. "
566 << "Please update your system to support this feature.";
567 return;
568 }
569
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700570 SetupDownload(1000); // starting_offset
David Zeuthen8f191b22013-08-06 12:27:50 -0700571
572 // Prepare the file with existing data before starting to write to
573 // it via DownloadAction.
574 string file_id = utils::CalculateP2PFileId("1234hash", data_.length());
575 ASSERT_TRUE(p2p_manager_->FileShare(file_id, data_.length()));
576 string existing_data;
577 for (unsigned int i = 0; i < 1000; i++)
578 existing_data += '0' + (i % 10);
579 ASSERT_EQ(WriteFile(p2p_manager_->FileGetPath(file_id), existing_data.c_str(),
580 1000), 1000);
581
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700582 StartDownload(true); // use_p2p_to_share
David Zeuthen8f191b22013-08-06 12:27:50 -0700583
584 // DownloadAction should convey the same file_id and the file should
585 // have the expected size.
586 EXPECT_EQ(download_action_->p2p_file_id(), file_id);
Alex Deymo80f70ff2016-02-10 16:08:11 -0800587 EXPECT_EQ(static_cast<ssize_t>(data_.length()),
588 p2p_manager_->FileGetSize(file_id));
589 EXPECT_EQ(static_cast<ssize_t>(data_.length()),
590 p2p_manager_->FileGetExpectedSize(file_id));
David Zeuthen8f191b22013-08-06 12:27:50 -0700591 string p2p_file_contents;
592 // Check that the first 1000 bytes wasn't touched and that we
593 // appended the remaining as appropriate.
594 EXPECT_TRUE(ReadFileToString(p2p_manager_->FileGetPath(file_id),
595 &p2p_file_contents));
596 EXPECT_EQ(existing_data, p2p_file_contents.substr(0, 1000));
597 EXPECT_EQ(data_.substr(1000), p2p_file_contents.substr(1000));
598}
599
David Zeuthen8f191b22013-08-06 12:27:50 -0700600TEST_F(P2PDownloadActionTest, DeletePartialP2PFileIfResumingWithoutP2P) {
Alex Deymo10875d92014-11-10 21:52:57 -0800601 if (!test_utils::IsXAttrSupported(FilePath("/tmp"))) {
David Zeuthen910ec5b2013-09-26 12:10:58 -0700602 LOG(WARNING) << "Skipping test because /tmp does not support xattr. "
603 << "Please update your system to support this feature.";
604 return;
605 }
606
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700607 SetupDownload(1000); // starting_offset
David Zeuthen8f191b22013-08-06 12:27:50 -0700608
609 // Prepare the file with all existing data before starting to write
610 // to it via DownloadAction.
611 string file_id = utils::CalculateP2PFileId("1234hash", data_.length());
612 ASSERT_TRUE(p2p_manager_->FileShare(file_id, data_.length()));
613 string existing_data;
614 for (unsigned int i = 0; i < 1000; i++)
615 existing_data += '0' + (i % 10);
616 ASSERT_EQ(WriteFile(p2p_manager_->FileGetPath(file_id), existing_data.c_str(),
617 1000), 1000);
618
619 // Check that the file is there.
Alex Deymo80f70ff2016-02-10 16:08:11 -0800620 EXPECT_EQ(1000, p2p_manager_->FileGetSize(file_id));
621 EXPECT_EQ(1, p2p_manager_->CountSharedFiles());
David Zeuthen8f191b22013-08-06 12:27:50 -0700622
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700623 StartDownload(false); // use_p2p_to_share
David Zeuthen8f191b22013-08-06 12:27:50 -0700624
625 // DownloadAction should have deleted the p2p file. Check that it's gone.
Alex Deymo80f70ff2016-02-10 16:08:11 -0800626 EXPECT_EQ(-1, p2p_manager_->FileGetSize(file_id));
627 EXPECT_EQ(0, p2p_manager_->CountSharedFiles());
David Zeuthen8f191b22013-08-06 12:27:50 -0700628}
629
rspangler@google.com49fdf182009-10-10 00:57:34 +0000630} // namespace chromeos_update_engine