blob: c2b57e22083863f1e2f2cc9dca4df932f6395de2 [file] [log] [blame]
Mike Frysinger8155d082012-04-06 15:23:18 -04001// Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
Andrew de los Reyes09e56d62010-04-23 13:45:53 -07002// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include <sys/mount.h>
6#include <inttypes.h>
7
8#include <algorithm>
9#include <string>
10#include <vector>
11
Darin Petkov9fa7ec52010-10-18 11:45:23 -070012#include <base/file_util.h>
Chris Masoned903c3b2011-05-12 15:35:46 -070013#include <base/memory/scoped_ptr.h>
Darin Petkov73058b42010-10-06 16:32:19 -070014#include <base/string_util.h>
Mike Frysinger8155d082012-04-06 15:23:18 -040015#include <base/stringprintf.h>
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070016#include <google/protobuf/repeated_field.h>
17#include <gtest/gtest.h>
18
Jay Srinivasand29695d2013-04-08 15:08:05 -070019#include "update_engine/constants.h"
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070020#include "update_engine/delta_diff_generator.h"
21#include "update_engine/delta_performer.h"
Andrew de los Reyes353777c2010-10-08 10:34:30 -070022#include "update_engine/extent_ranges.h"
Darin Petkov7a22d792010-11-08 14:10:00 -080023#include "update_engine/full_update_generator.h"
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070024#include "update_engine/graph_types.h"
Jay Srinivasanf0572052012-10-23 18:12:56 -070025#include "update_engine/mock_system_state.h"
Andrew de los Reyes932bc4c2010-08-23 18:14:09 -070026#include "update_engine/payload_signer.h"
Darin Petkov73058b42010-10-06 16:32:19 -070027#include "update_engine/prefs_mock.h"
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070028#include "update_engine/test_utils.h"
29#include "update_engine/update_metadata.pb.h"
30#include "update_engine/utils.h"
31
32namespace chromeos_update_engine {
33
34using std::min;
35using std::string;
36using std::vector;
Darin Petkov73058b42010-10-06 16:32:19 -070037using testing::_;
38using testing::Return;
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070039
Andrew de los Reyes932bc4c2010-08-23 18:14:09 -070040extern const char* kUnittestPrivateKeyPath;
Darin Petkovd7061ab2010-10-06 14:37:09 -070041extern const char* kUnittestPublicKeyPath;
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -070042extern const char* kUnittestPrivateKey2Path;
43extern const char* kUnittestPublicKey2Path;
Andrew de los Reyes932bc4c2010-08-23 18:14:09 -070044
Jay Srinivasan738fdf32012-12-07 17:40:54 -080045static const size_t kBlockSize = 4096;
46static const char* kBogusMetadataSignature1 = "awSFIUdUZz2VWFiR+ku0Pj00V7bPQPQFYQSXjEXr3vaw3TE4xHV5CraY3/YrZpBvJ5z4dSBskoeuaO1TNC/S6E05t+yt36tE4Fh79tMnJ/z9fogBDXWgXLEUyG78IEQrYH6/eBsQGT2RJtBgXIXbZ9W+5G9KmGDoPOoiaeNsDuqHiBc/58OFsrxskH8E6vMSBmMGGk82mvgzic7ApcoURbCGey1b3Mwne/hPZ/bb9CIyky8Og9IfFMdL2uAweOIRfjoTeLYZpt+WN65Vu7jJ0cQN8e1y+2yka5112wpRf/LLtPgiAjEZnsoYpLUd7CoVpLRtClp97kN2+tXGNBQqkA==";
47
48static const int kDefaultKernelSize = 4096; // Something small for a test
49static const char* kNewDataString = "This is new data.";
50
Andrew de los Reyes27f7d372010-10-07 11:26:07 -070051namespace {
Jay Srinivasan738fdf32012-12-07 17:40:54 -080052struct DeltaState {
53 string a_img;
54 string b_img;
55 int image_size;
Andrew de los Reyes27f7d372010-10-07 11:26:07 -070056
Jay Srinivasan738fdf32012-12-07 17:40:54 -080057 string delta_path;
58 uint64_t metadata_size;
Andrew de los Reyes27f7d372010-10-07 11:26:07 -070059
Jay Srinivasan738fdf32012-12-07 17:40:54 -080060 string old_kernel;
61 vector<char> old_kernel_data;
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070062
Jay Srinivasan738fdf32012-12-07 17:40:54 -080063 string new_kernel;
64 vector<char> new_kernel_data;
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070065
Jay Srinivasan738fdf32012-12-07 17:40:54 -080066 // The in-memory copy of delta file.
67 vector<char> delta;
Jay Srinivasan2b5a0f02012-12-19 17:25:56 -080068
69 // The mock system state object with which we initialize the
70 // delta performer.
71 MockSystemState mock_system_state;
Jay Srinivasan738fdf32012-12-07 17:40:54 -080072};
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070073
Jay Srinivasan738fdf32012-12-07 17:40:54 -080074enum SignatureTest {
75 kSignatureNone, // No payload signing.
76 kSignatureGenerator, // Sign the payload at generation time.
77 kSignatureGenerated, // Sign the payload after it's generated.
78 kSignatureGeneratedShell, // Sign the generated payload through shell cmds.
79 kSignatureGeneratedShellBadKey, // Sign with a bad key through shell cmds.
80 kSignatureGeneratedShellRotateCl1, // Rotate key, test client v1
81 kSignatureGeneratedShellRotateCl2, // Rotate key, test client v2
82};
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070083
Jay Srinivasan738fdf32012-12-07 17:40:54 -080084// Different options that determine what we should fill into the
85// install_plan.metadata_signature to simulate the contents received in the
86// Omaha response.
87enum MetadataSignatureTest {
88 kEmptyMetadataSignature,
89 kInvalidMetadataSignature,
90 kValidMetadataSignature,
91};
92
93enum OperationHashTest {
94 kInvalidOperationData,
95 kValidOperationData,
96};
97
98} // namespace {}
99
100static void CompareFilesByBlock(const string& a_file, const string& b_file) {
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700101 vector<char> a_data, b_data;
Andrew de los Reyes3270f742010-07-15 22:28:14 -0700102 EXPECT_TRUE(utils::ReadFile(a_file, &a_data)) << "file failed: " << a_file;
103 EXPECT_TRUE(utils::ReadFile(b_file, &b_data)) << "file failed: " << b_file;
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700104
105 EXPECT_EQ(a_data.size(), b_data.size());
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700106 EXPECT_EQ(0, a_data.size() % kBlockSize);
107 for (size_t i = 0; i < a_data.size(); i += kBlockSize) {
108 EXPECT_EQ(0, i % kBlockSize);
109 vector<char> a_sub(&a_data[i], &a_data[i + kBlockSize]);
110 vector<char> b_sub(&b_data[i], &b_data[i + kBlockSize]);
111 EXPECT_TRUE(a_sub == b_sub) << "Block " << (i/kBlockSize) << " differs";
112 }
113}
114
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800115static bool WriteSparseFile(const string& path, off_t size) {
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700116 int fd = open(path.c_str(), O_CREAT | O_TRUNC | O_WRONLY, 0644);
117 TEST_AND_RETURN_FALSE_ERRNO(fd >= 0);
118 ScopedFdCloser fd_closer(&fd);
119 off_t rc = lseek(fd, size + 1, SEEK_SET);
120 TEST_AND_RETURN_FALSE_ERRNO(rc != static_cast<off_t>(-1));
121 int return_code = ftruncate(fd, size);
122 TEST_AND_RETURN_FALSE_ERRNO(return_code == 0);
123 return true;
124}
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700125
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800126static size_t GetSignatureSize(const string& private_key_path) {
Darin Petkovcbfb0172011-01-14 15:24:45 -0800127 const vector<char> data(1, 'x');
128 vector<char> hash;
129 EXPECT_TRUE(OmahaHashCalculator::RawHashOfData(data, &hash));
130 vector<char> signature;
131 EXPECT_TRUE(PayloadSigner::SignHash(hash,
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800132 private_key_path,
Darin Petkovcbfb0172011-01-14 15:24:45 -0800133 &signature));
134 return signature.size();
135}
136
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800137static void SignGeneratedPayload(const string& payload_path,
138 uint64_t* out_metadata_size) {
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800139 int signature_size = GetSignatureSize(kUnittestPrivateKeyPath);
Darin Petkovcbfb0172011-01-14 15:24:45 -0800140 vector<char> hash;
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -0700141 ASSERT_TRUE(PayloadSigner::HashPayloadForSigning(
142 payload_path,
143 vector<int>(1, signature_size),
144 &hash));
Darin Petkovcbfb0172011-01-14 15:24:45 -0800145 vector<char> signature;
146 ASSERT_TRUE(PayloadSigner::SignHash(hash,
147 kUnittestPrivateKeyPath,
148 &signature));
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -0700149 ASSERT_TRUE(PayloadSigner::AddSignatureToPayload(
150 payload_path,
151 vector<vector<char> >(1, signature),
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800152 payload_path,
153 out_metadata_size));
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -0700154 EXPECT_TRUE(PayloadSigner::VerifySignedPayload(
155 payload_path,
156 kUnittestPublicKeyPath,
157 kSignatureMessageOriginalVersion));
Darin Petkovcbfb0172011-01-14 15:24:45 -0800158}
159
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800160static void SignGeneratedShellPayload(SignatureTest signature_test,
161 const string& payload_path) {
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800162 string private_key_path = kUnittestPrivateKeyPath;
163 if (signature_test == kSignatureGeneratedShellBadKey) {
164 ASSERT_TRUE(utils::MakeTempFile("/tmp/key.XXXXXX",
165 &private_key_path,
166 NULL));
167 } else {
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -0700168 ASSERT_TRUE(signature_test == kSignatureGeneratedShell ||
169 signature_test == kSignatureGeneratedShellRotateCl1 ||
170 signature_test == kSignatureGeneratedShellRotateCl2);
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800171 }
172 ScopedPathUnlinker key_unlinker(private_key_path);
173 key_unlinker.set_should_remove(signature_test ==
174 kSignatureGeneratedShellBadKey);
175 // Generates a new private key that will not match the public key.
176 if (signature_test == kSignatureGeneratedShellBadKey) {
177 LOG(INFO) << "Generating a mismatched private key.";
178 ASSERT_EQ(0,
179 System(StringPrintf(
Mike Frysinger2149be42012-03-12 19:23:47 -0400180 "openssl genrsa -out %s 2048",
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800181 private_key_path.c_str())));
182 }
183 int signature_size = GetSignatureSize(private_key_path);
Darin Petkovcbfb0172011-01-14 15:24:45 -0800184 string hash_file;
185 ASSERT_TRUE(utils::MakeTempFile("/tmp/hash.XXXXXX", &hash_file, NULL));
186 ScopedPathUnlinker hash_unlinker(hash_file);
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -0700187 string signature_size_string;
188 if (signature_test == kSignatureGeneratedShellRotateCl1 ||
189 signature_test == kSignatureGeneratedShellRotateCl2)
190 signature_size_string = StringPrintf("%d:%d",
191 signature_size, signature_size);
192 else
193 signature_size_string = StringPrintf("%d", signature_size);
Darin Petkovcbfb0172011-01-14 15:24:45 -0800194 ASSERT_EQ(0,
195 System(StringPrintf(
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -0700196 "./delta_generator -in_file %s -signature_size %s "
Darin Petkovcbfb0172011-01-14 15:24:45 -0800197 "-out_hash_file %s",
198 payload_path.c_str(),
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -0700199 signature_size_string.c_str(),
Darin Petkovcbfb0172011-01-14 15:24:45 -0800200 hash_file.c_str())));
201
Andrew de los Reyesbdfaaf02011-03-30 10:35:12 -0700202 // Pad the hash
203 vector<char> hash;
204 ASSERT_TRUE(utils::ReadFile(hash_file, &hash));
205 ASSERT_TRUE(PayloadSigner::PadRSA2048SHA256Hash(&hash));
206 ASSERT_TRUE(WriteFileVector(hash_file, hash));
207
Darin Petkovcbfb0172011-01-14 15:24:45 -0800208 string sig_file;
209 ASSERT_TRUE(utils::MakeTempFile("/tmp/signature.XXXXXX", &sig_file, NULL));
210 ScopedPathUnlinker sig_unlinker(sig_file);
211 ASSERT_EQ(0,
212 System(StringPrintf(
Mike Frysinger2149be42012-03-12 19:23:47 -0400213 "openssl rsautl -raw -sign -inkey %s -in %s -out %s",
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800214 private_key_path.c_str(),
Darin Petkovcbfb0172011-01-14 15:24:45 -0800215 hash_file.c_str(),
216 sig_file.c_str())));
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -0700217 string sig_file2;
218 ASSERT_TRUE(utils::MakeTempFile("/tmp/signature.XXXXXX", &sig_file2, NULL));
219 ScopedPathUnlinker sig2_unlinker(sig_file2);
220 if (signature_test == kSignatureGeneratedShellRotateCl1 ||
221 signature_test == kSignatureGeneratedShellRotateCl2) {
222 ASSERT_EQ(0,
223 System(StringPrintf(
Mike Frysinger2149be42012-03-12 19:23:47 -0400224 "openssl rsautl -raw -sign -inkey %s -in %s -out %s",
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -0700225 kUnittestPrivateKey2Path,
226 hash_file.c_str(),
227 sig_file2.c_str())));
228 // Append second sig file to first path
229 sig_file += ":" + sig_file2;
230 }
231
Darin Petkovcbfb0172011-01-14 15:24:45 -0800232 ASSERT_EQ(0,
233 System(StringPrintf(
234 "./delta_generator -in_file %s -signature_file %s "
235 "-out_file %s",
236 payload_path.c_str(),
237 sig_file.c_str(),
238 payload_path.c_str())));
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800239 int verify_result =
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -0700240 System(StringPrintf(
241 "./delta_generator -in_file %s -public_key %s -public_key_version %d",
242 payload_path.c_str(),
243 signature_test == kSignatureGeneratedShellRotateCl2 ?
244 kUnittestPublicKey2Path : kUnittestPublicKeyPath,
245 signature_test == kSignatureGeneratedShellRotateCl2 ? 2 : 1));
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800246 if (signature_test == kSignatureGeneratedShellBadKey) {
247 ASSERT_NE(0, verify_result);
248 } else {
249 ASSERT_EQ(0, verify_result);
250 }
Darin Petkovcbfb0172011-01-14 15:24:45 -0800251}
252
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800253static void GenerateDeltaFile(bool full_kernel,
254 bool full_rootfs,
255 bool noop,
Darin Petkov8e447e02013-04-16 16:23:50 +0200256 off_t chunk_size,
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800257 SignatureTest signature_test,
258 DeltaState *state) {
259 EXPECT_TRUE(utils::MakeTempFile("/tmp/a_img.XXXXXX", &state->a_img, NULL));
260 EXPECT_TRUE(utils::MakeTempFile("/tmp/b_img.XXXXXX", &state->b_img, NULL));
261 CreateExtImageAtPath(state->a_img, NULL);
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700262
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800263 state->image_size = static_cast<int>(utils::FileSize(state->a_img));
Darin Petkov7ea32332010-10-13 10:46:11 -0700264
265 // Extend the "partitions" holding the file system a bit.
266 EXPECT_EQ(0, System(base::StringPrintf(
267 "dd if=/dev/zero of=%s seek=%d bs=1 count=1",
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800268 state->a_img.c_str(),
269 state->image_size + 1024 * 1024 - 1)));
270 EXPECT_EQ(state->image_size + 1024 * 1024, utils::FileSize(state->a_img));
Darin Petkov7ea32332010-10-13 10:46:11 -0700271
Don Garrett0dd39852013-04-03 16:55:42 -0700272 // Create ImageInfo A & B
273 ImageInfo old_image_info;
274 ImageInfo new_image_info;
275
276 if (!full_rootfs) {
277 old_image_info.set_channel("src-channel");
278 old_image_info.set_board("src-board");
279 old_image_info.set_version("src-version");
280 old_image_info.set_key("src-key");
281 old_image_info.set_build_channel("src-build-channel");
282 old_image_info.set_build_version("src-build-version");
283 }
284
285 new_image_info.set_channel("test-channel");
286 new_image_info.set_board("test-board");
287 new_image_info.set_version("test-version");
288 new_image_info.set_key("test-key");
289 new_image_info.set_build_channel("test-build-channel");
290 new_image_info.set_build_version("test-build-version");
291
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700292 // Make some changes to the A image.
293 {
294 string a_mnt;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800295 ScopedLoopMounter b_mounter(state->a_img, &a_mnt, 0);
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700296
Darin Petkov8e447e02013-04-16 16:23:50 +0200297 vector<char> hardtocompress;
298 while (hardtocompress.size() < 3 * kBlockSize) {
299 hardtocompress.insert(hardtocompress.end(),
300 kRandomString,
301 kRandomString + sizeof(kRandomString) - 1);
302 }
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700303 EXPECT_TRUE(utils::WriteFile(StringPrintf("%s/hardtocompress",
304 a_mnt.c_str()).c_str(),
Darin Petkov8e447e02013-04-16 16:23:50 +0200305 &hardtocompress[0],
306 hardtocompress.size()));
307
Darin Petkov8a075a72013-04-25 14:46:09 +0200308 vector<char> zeros(16 * 1024, 0);
309 EXPECT_EQ(zeros.size(),
310 file_util::WriteFile(
311 FilePath(StringPrintf("%s/move-to-sparse", a_mnt.c_str())),
312 &zeros[0], zeros.size()));
313
314 EXPECT_TRUE(
315 WriteSparseFile(StringPrintf("%s/move-from-sparse", a_mnt.c_str()),
316 16 * 1024));
317
318 EXPECT_EQ(0, system(StringPrintf("dd if=/dev/zero of=%s/move-semi-sparse "
319 "bs=1 seek=4096 count=1",
320 a_mnt.c_str()).c_str()));
321
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700322 // Write 1 MiB of 0xff to try to catch the case where writing a bsdiff
323 // patch fails to zero out the final block.
324 vector<char> ones(1024 * 1024, 0xff);
325 EXPECT_TRUE(utils::WriteFile(StringPrintf("%s/ones",
326 a_mnt.c_str()).c_str(),
327 &ones[0],
328 ones.size()));
329 }
330
Darin Petkov9fa7ec52010-10-18 11:45:23 -0700331 if (noop) {
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800332 EXPECT_TRUE(file_util::CopyFile(FilePath(state->a_img),
333 FilePath(state->b_img)));
Don Garrett0dd39852013-04-03 16:55:42 -0700334 old_image_info = new_image_info;
Darin Petkov9fa7ec52010-10-18 11:45:23 -0700335 } else {
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800336 CreateExtImageAtPath(state->b_img, NULL);
Darin Petkov9fa7ec52010-10-18 11:45:23 -0700337 EXPECT_EQ(0, System(base::StringPrintf(
338 "dd if=/dev/zero of=%s seek=%d bs=1 count=1",
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800339 state->b_img.c_str(),
340 state->image_size + 1024 * 1024 - 1)));
341 EXPECT_EQ(state->image_size + 1024 * 1024, utils::FileSize(state->b_img));
Darin Petkov9fa7ec52010-10-18 11:45:23 -0700342
343 // Make some changes to the B image.
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700344 string b_mnt;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800345 ScopedLoopMounter b_mounter(state->b_img, &b_mnt, 0);
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700346
347 EXPECT_EQ(0, system(StringPrintf("cp %s/hello %s/hello2", b_mnt.c_str(),
348 b_mnt.c_str()).c_str()));
349 EXPECT_EQ(0, system(StringPrintf("rm %s/hello", b_mnt.c_str()).c_str()));
350 EXPECT_EQ(0, system(StringPrintf("mv %s/hello2 %s/hello", b_mnt.c_str(),
351 b_mnt.c_str()).c_str()));
352 EXPECT_EQ(0, system(StringPrintf("echo foo > %s/foo",
353 b_mnt.c_str()).c_str()));
354 EXPECT_EQ(0, system(StringPrintf("touch %s/emptyfile",
355 b_mnt.c_str()).c_str()));
356 EXPECT_TRUE(WriteSparseFile(StringPrintf("%s/fullsparse", b_mnt.c_str()),
357 1024 * 1024));
Darin Petkov8a075a72013-04-25 14:46:09 +0200358
359 EXPECT_TRUE(
360 WriteSparseFile(StringPrintf("%s/move-to-sparse", b_mnt.c_str()),
361 16 * 1024));
362
363 vector<char> zeros(16 * 1024, 0);
364 EXPECT_EQ(zeros.size(),
365 file_util::WriteFile(
366 FilePath(StringPrintf("%s/move-from-sparse", b_mnt.c_str())),
367 &zeros[0], zeros.size()));
368
369 EXPECT_EQ(0, system(StringPrintf("dd if=/dev/zero of=%s/move-semi-sparse "
370 "bs=1 seek=4096 count=1",
371 b_mnt.c_str()).c_str()));
372
373 EXPECT_EQ(0, system(StringPrintf("dd if=/dev/zero of=%s/partsparse bs=1 "
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700374 "seek=4096 count=1",
375 b_mnt.c_str()).c_str()));
Andrew de los Reyes29da8aa2011-02-15 13:34:57 -0800376 EXPECT_EQ(0, system(StringPrintf("cp %s/srchardlink0 %s/tmp && "
377 "mv %s/tmp %s/srchardlink1",
378 b_mnt.c_str(), b_mnt.c_str(),
379 b_mnt.c_str(), b_mnt.c_str()).c_str()));
Andrew de los Reyes48a0a482011-02-22 15:32:11 -0800380 EXPECT_EQ(0, system(StringPrintf("rm %s/boguslink && "
381 "echo foobar > %s/boguslink",
382 b_mnt.c_str(), b_mnt.c_str()).c_str()));
Darin Petkov8e447e02013-04-16 16:23:50 +0200383
384 vector<char> hardtocompress;
385 while (hardtocompress.size() < 3 * kBlockSize) {
386 hardtocompress.insert(hardtocompress.end(),
387 kRandomString,
388 kRandomString + sizeof(kRandomString));
389 }
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700390 EXPECT_TRUE(utils::WriteFile(StringPrintf("%s/hardtocompress",
391 b_mnt.c_str()).c_str(),
Darin Petkov8e447e02013-04-16 16:23:50 +0200392 &hardtocompress[0],
393 hardtocompress.size()));
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700394 }
395
Andrew de los Reyesf4c7ef12010-04-30 10:37:00 -0700396 string old_kernel;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800397 EXPECT_TRUE(utils::MakeTempFile("/tmp/old_kernel.XXXXXX",
398 &state->old_kernel,
399 NULL));
Andrew de los Reyesf4c7ef12010-04-30 10:37:00 -0700400
401 string new_kernel;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800402 EXPECT_TRUE(utils::MakeTempFile("/tmp/new_kernel.XXXXXX",
403 &state->new_kernel,
404 NULL));
Andrew de los Reyesf4c7ef12010-04-30 10:37:00 -0700405
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800406 state->old_kernel_data.resize(kDefaultKernelSize);
407 state->new_kernel_data.resize(state->old_kernel_data.size());
408 FillWithData(&state->old_kernel_data);
409 FillWithData(&state->new_kernel_data);
Andrew de los Reyes932bc4c2010-08-23 18:14:09 -0700410
Andrew de los Reyesf4c7ef12010-04-30 10:37:00 -0700411 // change the new kernel data
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800412 strcpy(&state->new_kernel_data[0], kNewDataString);
Andrew de los Reyesf4c7ef12010-04-30 10:37:00 -0700413
Darin Petkov9fa7ec52010-10-18 11:45:23 -0700414 if (noop) {
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800415 state->old_kernel_data = state->new_kernel_data;
Darin Petkov9fa7ec52010-10-18 11:45:23 -0700416 }
417
Andrew de los Reyesf4c7ef12010-04-30 10:37:00 -0700418 // Write kernels to disk
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800419 EXPECT_TRUE(utils::WriteFile(state->old_kernel.c_str(),
420 &state->old_kernel_data[0],
421 state->old_kernel_data.size()));
422 EXPECT_TRUE(utils::WriteFile(state->new_kernel.c_str(),
423 &state->new_kernel_data[0],
424 state->new_kernel_data.size()));
Andrew de los Reyesf4c7ef12010-04-30 10:37:00 -0700425
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800426 EXPECT_TRUE(utils::MakeTempFile("/tmp/delta.XXXXXX",
427 &state->delta_path,
428 NULL));
429 LOG(INFO) << "delta path: " << state->delta_path;
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700430 {
431 string a_mnt, b_mnt;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800432 ScopedLoopMounter a_mounter(state->a_img, &a_mnt, MS_RDONLY);
433 ScopedLoopMounter b_mounter(state->b_img, &b_mnt, MS_RDONLY);
Darin Petkovcbfb0172011-01-14 15:24:45 -0800434 const string private_key =
435 signature_test == kSignatureGenerator ? kUnittestPrivateKeyPath : "";
Andrew de los Reyes932bc4c2010-08-23 18:14:09 -0700436 EXPECT_TRUE(
Darin Petkov68c10d12010-10-14 09:24:37 -0700437 DeltaDiffGenerator::GenerateDeltaUpdateFile(
Darin Petkov7a22d792010-11-08 14:10:00 -0800438 full_rootfs ? "" : a_mnt,
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800439 full_rootfs ? "" : state->a_img,
Darin Petkov68c10d12010-10-14 09:24:37 -0700440 b_mnt,
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800441 state->b_img,
442 full_kernel ? "" : state->old_kernel,
443 state->new_kernel,
444 state->delta_path,
445 private_key,
Darin Petkov8e447e02013-04-16 16:23:50 +0200446 chunk_size,
Chris Sosad5ae1562013-04-23 13:20:18 -0700447 kRootFSPartitionSize,
Don Garrett0dd39852013-04-03 16:55:42 -0700448 full_rootfs ? NULL : &old_image_info,
449 &new_image_info,
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800450 &state->metadata_size));
Darin Petkov9574f7e2011-01-13 10:48:12 -0800451 }
452
Darin Petkovcbfb0172011-01-14 15:24:45 -0800453 if (signature_test == kSignatureGenerated) {
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800454 // Generate the signed payload and update the metadata size in state to
455 // reflect the new size after adding the signature operation to the
456 // manifest.
457 SignGeneratedPayload(state->delta_path, &state->metadata_size);
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800458 } else if (signature_test == kSignatureGeneratedShell ||
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -0700459 signature_test == kSignatureGeneratedShellBadKey ||
460 signature_test == kSignatureGeneratedShellRotateCl1 ||
461 signature_test == kSignatureGeneratedShellRotateCl2) {
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800462 SignGeneratedShellPayload(signature_test, state->delta_path);
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700463 }
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800464}
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700465
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800466static void ApplyDeltaFile(bool full_kernel, bool full_rootfs, bool noop,
467 SignatureTest signature_test, DeltaState* state,
468 bool hash_checks_mandatory,
469 OperationHashTest op_hash_test,
470 DeltaPerformer** performer) {
Darin Petkov36a58222010-10-07 22:00:09 -0700471 // Check the metadata.
Andrew de los Reyes932bc4c2010-08-23 18:14:09 -0700472 {
Andrew de los Reyes932bc4c2010-08-23 18:14:09 -0700473 DeltaArchiveManifest manifest;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800474 EXPECT_TRUE(PayloadSigner::LoadPayload(state->delta_path,
475 &state->delta,
476 &manifest,
477 &state->metadata_size));
478 LOG(INFO) << "Metadata size: " << state->metadata_size;
Andrew de los Reyes932bc4c2010-08-23 18:14:09 -0700479
Don Garrett0dd39852013-04-03 16:55:42 -0700480
481
Darin Petkovcbfb0172011-01-14 15:24:45 -0800482 if (signature_test == kSignatureNone) {
483 EXPECT_FALSE(manifest.has_signatures_offset());
484 EXPECT_FALSE(manifest.has_signatures_size());
485 } else {
486 EXPECT_TRUE(manifest.has_signatures_offset());
487 EXPECT_TRUE(manifest.has_signatures_size());
488 Signatures sigs_message;
489 EXPECT_TRUE(sigs_message.ParseFromArray(
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800490 &state->delta[state->metadata_size + manifest.signatures_offset()],
Darin Petkovcbfb0172011-01-14 15:24:45 -0800491 manifest.signatures_size()));
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -0700492 if (signature_test == kSignatureGeneratedShellRotateCl1 ||
493 signature_test == kSignatureGeneratedShellRotateCl2)
494 EXPECT_EQ(2, sigs_message.signatures_size());
495 else
496 EXPECT_EQ(1, sigs_message.signatures_size());
Darin Petkovcbfb0172011-01-14 15:24:45 -0800497 const Signatures_Signature& signature = sigs_message.signatures(0);
498 EXPECT_EQ(1, signature.version());
Andrew de los Reyes932bc4c2010-08-23 18:14:09 -0700499
Darin Petkovcbfb0172011-01-14 15:24:45 -0800500 uint64_t expected_sig_data_length = 0;
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -0700501 vector<string> key_paths (1, kUnittestPrivateKeyPath);
502 if (signature_test == kSignatureGeneratedShellRotateCl1 ||
503 signature_test == kSignatureGeneratedShellRotateCl2) {
504 key_paths.push_back(kUnittestPrivateKey2Path);
505 }
Darin Petkovcbfb0172011-01-14 15:24:45 -0800506 EXPECT_TRUE(PayloadSigner::SignatureBlobLength(
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -0700507 key_paths,
508 &expected_sig_data_length));
Darin Petkovcbfb0172011-01-14 15:24:45 -0800509 EXPECT_EQ(expected_sig_data_length, manifest.signatures_size());
510 EXPECT_FALSE(signature.data().empty());
511 }
Darin Petkov36a58222010-10-07 22:00:09 -0700512
Darin Petkov9fa7ec52010-10-18 11:45:23 -0700513 if (noop) {
514 EXPECT_EQ(1, manifest.install_operations_size());
515 EXPECT_EQ(1, manifest.kernel_install_operations_size());
516 }
517
Darin Petkovd43d6902010-10-14 11:17:50 -0700518 if (full_kernel) {
519 EXPECT_FALSE(manifest.has_old_kernel_info());
520 } else {
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800521 EXPECT_EQ(state->old_kernel_data.size(),
522 manifest.old_kernel_info().size());
Darin Petkovd43d6902010-10-14 11:17:50 -0700523 EXPECT_FALSE(manifest.old_kernel_info().hash().empty());
524 }
Darin Petkov698d0412010-10-13 10:59:44 -0700525
Don Garrett0dd39852013-04-03 16:55:42 -0700526 EXPECT_EQ(manifest.new_image_info().channel(), "test-channel");
527 EXPECT_EQ(manifest.new_image_info().board(), "test-board");
528 EXPECT_EQ(manifest.new_image_info().version(), "test-version");
529 EXPECT_EQ(manifest.new_image_info().key(), "test-key");
530 EXPECT_EQ(manifest.new_image_info().build_channel(), "test-build-channel");
531 EXPECT_EQ(manifest.new_image_info().build_version(), "test-build-version");
532
533 if (!full_rootfs) {
534
535 if (noop) {
536 EXPECT_EQ(manifest.old_image_info().channel(), "test-channel");
537 EXPECT_EQ(manifest.old_image_info().board(), "test-board");
538 EXPECT_EQ(manifest.old_image_info().version(), "test-version");
539 EXPECT_EQ(manifest.old_image_info().key(), "test-key");
540 EXPECT_EQ(manifest.old_image_info().build_channel(),
541 "test-build-channel");
542 EXPECT_EQ(manifest.old_image_info().build_version(),
543 "test-build-version");
544 } else {
545 EXPECT_EQ(manifest.old_image_info().channel(), "src-channel");
546 EXPECT_EQ(manifest.old_image_info().board(), "src-board");
547 EXPECT_EQ(manifest.old_image_info().version(), "src-version");
548 EXPECT_EQ(manifest.old_image_info().key(), "src-key");
549 EXPECT_EQ(manifest.old_image_info().build_channel(),
550 "src-build-channel");
551 EXPECT_EQ(manifest.old_image_info().build_version(),
552 "src-build-version");
553 }
554 }
555
556
Darin Petkov7a22d792010-11-08 14:10:00 -0800557 if (full_rootfs) {
558 EXPECT_FALSE(manifest.has_old_rootfs_info());
Don Garrett0dd39852013-04-03 16:55:42 -0700559 EXPECT_FALSE(manifest.has_old_image_info());
560 EXPECT_TRUE(manifest.has_new_image_info());
Darin Petkov7a22d792010-11-08 14:10:00 -0800561 } else {
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800562 EXPECT_EQ(state->image_size, manifest.old_rootfs_info().size());
Darin Petkov7a22d792010-11-08 14:10:00 -0800563 EXPECT_FALSE(manifest.old_rootfs_info().hash().empty());
564 }
565
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800566 EXPECT_EQ(state->new_kernel_data.size(), manifest.new_kernel_info().size());
567 EXPECT_EQ(state->image_size, manifest.new_rootfs_info().size());
Darin Petkov36a58222010-10-07 22:00:09 -0700568
Darin Petkov36a58222010-10-07 22:00:09 -0700569 EXPECT_FALSE(manifest.new_kernel_info().hash().empty());
Darin Petkov36a58222010-10-07 22:00:09 -0700570 EXPECT_FALSE(manifest.new_rootfs_info().hash().empty());
Andrew de los Reyes932bc4c2010-08-23 18:14:09 -0700571 }
572
Darin Petkov73058b42010-10-06 16:32:19 -0700573 PrefsMock prefs;
574 EXPECT_CALL(prefs, SetInt64(kPrefsManifestMetadataSize,
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800575 state->metadata_size)).WillOnce(Return(true));
Darin Petkov73058b42010-10-06 16:32:19 -0700576 EXPECT_CALL(prefs, SetInt64(kPrefsUpdateStateNextOperation, _))
577 .WillRepeatedly(Return(true));
Darin Petkov9b230572010-10-08 10:20:09 -0700578 EXPECT_CALL(prefs, GetInt64(kPrefsUpdateStateNextOperation, _))
579 .WillOnce(Return(false));
Darin Petkov73058b42010-10-06 16:32:19 -0700580 EXPECT_CALL(prefs, SetInt64(kPrefsUpdateStateNextDataOffset, _))
581 .WillRepeatedly(Return(true));
David Zeuthen41996ad2013-09-24 15:43:24 -0700582 EXPECT_CALL(prefs, SetInt64(kPrefsUpdateStateNextDataLength, _))
583 .WillRepeatedly(Return(true));
Darin Petkov437adc42010-10-07 13:12:24 -0700584 EXPECT_CALL(prefs, SetString(kPrefsUpdateStateSHA256Context, _))
Darin Petkov73058b42010-10-06 16:32:19 -0700585 .WillRepeatedly(Return(true));
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800586 if (op_hash_test == kValidOperationData && signature_test != kSignatureNone) {
Darin Petkovcbfb0172011-01-14 15:24:45 -0800587 EXPECT_CALL(prefs, SetString(kPrefsUpdateStateSignedSHA256Context, _))
588 .WillOnce(Return(true));
Darin Petkov4f0a07b2011-05-25 16:47:20 -0700589 EXPECT_CALL(prefs, SetString(kPrefsUpdateStateSignatureBlob, _))
590 .WillOnce(Return(true));
Darin Petkovcbfb0172011-01-14 15:24:45 -0800591 }
Darin Petkov73058b42010-10-06 16:32:19 -0700592
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700593 // Update the A image in place.
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700594 InstallPlan install_plan;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800595 install_plan.hash_checks_mandatory = hash_checks_mandatory;
596 install_plan.metadata_size = state->metadata_size;
597 LOG(INFO) << "Setting payload metadata size in Omaha = "
598 << state->metadata_size;
Jay Srinivasanf4318702012-09-24 11:56:24 -0700599 ASSERT_TRUE(PayloadSigner::GetMetadataSignature(
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800600 &state->delta[0],
601 state->metadata_size,
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700602 kUnittestPrivateKeyPath,
Jay Srinivasanf4318702012-09-24 11:56:24 -0700603 &install_plan.metadata_signature));
604 EXPECT_FALSE(install_plan.metadata_signature.empty());
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700605
Jay Srinivasan2b5a0f02012-12-19 17:25:56 -0800606 *performer = new DeltaPerformer(&prefs,
607 &state->mock_system_state,
608 &install_plan);
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700609 EXPECT_TRUE(utils::FileExists(kUnittestPublicKeyPath));
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800610 (*performer)->set_public_key_path(kUnittestPublicKeyPath);
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700611
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800612 EXPECT_EQ(state->image_size,
613 OmahaHashCalculator::RawHashOfFile(state->a_img,
614 state->image_size,
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700615 &install_plan.rootfs_hash));
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800616 EXPECT_TRUE(OmahaHashCalculator::RawHashOfData(state->old_kernel_data,
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700617 &install_plan.kernel_hash));
618
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800619 EXPECT_EQ(0, (*performer)->Open(state->a_img.c_str(), 0, 0));
620 EXPECT_TRUE((*performer)->OpenKernel(state->old_kernel.c_str()));
621
David Zeuthena99981f2013-04-29 13:42:47 -0700622 ErrorCode expected_error, actual_error;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800623 bool continue_writing;
624 switch(op_hash_test) {
625 case kInvalidOperationData: {
626 // Muck with some random offset post the metadata size so that
627 // some operation hash will result in a mismatch.
628 int some_offset = state->metadata_size + 300;
629 LOG(INFO) << "Tampered value at offset: " << some_offset;
630 state->delta[some_offset]++;
David Zeuthena99981f2013-04-29 13:42:47 -0700631 expected_error = kErrorCodeDownloadOperationHashMismatch;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800632 continue_writing = false;
633 break;
634 }
635
636 case kValidOperationData:
637 default:
638 // no change.
David Zeuthena99981f2013-04-29 13:42:47 -0700639 expected_error = kErrorCodeSuccess;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800640 continue_writing = true;
641 break;
642 }
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700643
644 // Write at some number of bytes per operation. Arbitrarily chose 5.
645 const size_t kBytesPerWrite = 5;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800646 for (size_t i = 0; i < state->delta.size(); i += kBytesPerWrite) {
647 size_t count = min(state->delta.size() - i, kBytesPerWrite);
648 bool write_succeeded = ((*performer)->Write(&state->delta[i],
649 count,
650 &actual_error));
651 // Normally write_succeeded should be true every time and
David Zeuthena99981f2013-04-29 13:42:47 -0700652 // actual_error should be kErrorCodeSuccess. If so, continue the loop.
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800653 // But if we seeded an operation hash error above, then write_succeeded
654 // will be false. The failure may happen at any operation n. So, all
655 // Writes until n-1 should succeed and the nth operation will fail with
656 // actual_error. In this case, we should bail out of the loop because
657 // we cannot proceed applying the delta.
658 if (!write_succeeded) {
659 LOG(INFO) << "Write failed. Checking if it failed with expected error";
660 EXPECT_EQ(expected_error, actual_error);
661 if (!continue_writing) {
662 LOG(INFO) << "Cannot continue writing. Bailing out.";
663 break;
664 }
665 }
666
David Zeuthena99981f2013-04-29 13:42:47 -0700667 EXPECT_EQ(kErrorCodeSuccess, actual_error);
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700668 }
669
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800670 // If we had continued all the way through, Close should succeed.
671 // Otherwise, it should fail. Check appropriately.
672 bool close_result = (*performer)->Close();
673 if (continue_writing)
674 EXPECT_EQ(0, close_result);
675 else
676 EXPECT_LE(0, close_result);
677}
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700678
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800679void VerifyPayloadResult(DeltaPerformer* performer,
680 DeltaState* state,
David Zeuthena99981f2013-04-29 13:42:47 -0700681 ErrorCode expected_result) {
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800682 if (!performer) {
683 EXPECT_TRUE(!"Skipping payload verification since performer is NULL.");
684 return;
685 }
686
David Zeuthena99981f2013-04-29 13:42:47 -0700687 int expected_times = (expected_result == kErrorCodeSuccess) ? 1 : 0;
Jay Srinivasan2b5a0f02012-12-19 17:25:56 -0800688 EXPECT_CALL(*(state->mock_system_state.mock_payload_state()),
689 DownloadComplete()).Times(expected_times);
690
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800691 LOG(INFO) << "Verifying payload for expected result "
692 << expected_result;
693 EXPECT_EQ(expected_result, performer->VerifyPayload(
694 OmahaHashCalculator::OmahaHashOfData(state->delta),
695 state->delta.size()));
696 LOG(INFO) << "Verified payload.";
697
David Zeuthena99981f2013-04-29 13:42:47 -0700698 if (expected_result != kErrorCodeSuccess) {
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800699 // no need to verify new partition if VerifyPayload failed.
700 return;
701 }
702
703 CompareFilesByBlock(state->old_kernel, state->new_kernel);
704 CompareFilesByBlock(state->a_img, state->b_img);
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700705
706 vector<char> updated_kernel_partition;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800707 EXPECT_TRUE(utils::ReadFile(state->old_kernel, &updated_kernel_partition));
708 EXPECT_EQ(0, strncmp(&updated_kernel_partition[0], kNewDataString,
709 strlen(kNewDataString)));
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700710
711 uint64_t new_kernel_size;
712 vector<char> new_kernel_hash;
713 uint64_t new_rootfs_size;
714 vector<char> new_rootfs_hash;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800715 EXPECT_TRUE(performer->GetNewPartitionInfo(&new_kernel_size,
Don Garrett0dd39852013-04-03 16:55:42 -0700716 &new_kernel_hash,
717 &new_rootfs_size,
718 &new_rootfs_hash));
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800719 EXPECT_EQ(kDefaultKernelSize, new_kernel_size);
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700720 vector<char> expected_new_kernel_hash;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800721 EXPECT_TRUE(OmahaHashCalculator::RawHashOfData(state->new_kernel_data,
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700722 &expected_new_kernel_hash));
723 EXPECT_TRUE(expected_new_kernel_hash == new_kernel_hash);
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800724 EXPECT_EQ(state->image_size, new_rootfs_size);
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700725 vector<char> expected_new_rootfs_hash;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800726 EXPECT_EQ(state->image_size,
727 OmahaHashCalculator::RawHashOfFile(state->b_img,
728 state->image_size,
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700729 &expected_new_rootfs_hash));
730 EXPECT_TRUE(expected_new_rootfs_hash == new_rootfs_hash);
731}
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800732
733void VerifyPayload(DeltaPerformer* performer,
734 DeltaState* state,
735 SignatureTest signature_test) {
David Zeuthena99981f2013-04-29 13:42:47 -0700736 ErrorCode expected_result = kErrorCodeSuccess;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800737 switch (signature_test) {
738 case kSignatureNone:
David Zeuthena99981f2013-04-29 13:42:47 -0700739 expected_result = kErrorCodeSignedDeltaPayloadExpectedError;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800740 break;
741 case kSignatureGeneratedShellBadKey:
David Zeuthena99981f2013-04-29 13:42:47 -0700742 expected_result = kErrorCodeDownloadPayloadPubKeyVerificationError;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800743 break;
744 default: break; // appease gcc
745 }
746
747 VerifyPayloadResult(performer, state, expected_result);
748}
749
750void DoSmallImageTest(bool full_kernel, bool full_rootfs, bool noop,
Darin Petkov8e447e02013-04-16 16:23:50 +0200751 off_t chunk_size,
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800752 SignatureTest signature_test,
753 bool hash_checks_mandatory) {
754 DeltaState state;
755 DeltaPerformer *performer;
Darin Petkov8e447e02013-04-16 16:23:50 +0200756 GenerateDeltaFile(full_kernel, full_rootfs, noop, chunk_size,
757 signature_test, &state);
Don Garrett0dd39852013-04-03 16:55:42 -0700758
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800759 ScopedPathUnlinker a_img_unlinker(state.a_img);
760 ScopedPathUnlinker b_img_unlinker(state.b_img);
761 ScopedPathUnlinker delta_unlinker(state.delta_path);
762 ScopedPathUnlinker old_kernel_unlinker(state.old_kernel);
763 ScopedPathUnlinker new_kernel_unlinker(state.new_kernel);
764 ApplyDeltaFile(full_kernel, full_rootfs, noop, signature_test,
765 &state, hash_checks_mandatory, kValidOperationData,
766 &performer);
767 VerifyPayload(performer, &state, signature_test);
768}
769
770// Calls delta performer's Write method by pretending to pass in bytes from a
771// delta file whose metadata size is actual_metadata_size and tests if all
772// checks are correctly performed if the install plan contains
773// expected_metadata_size and that the result of the parsing are as per
774// hash_checks_mandatory flag.
775void DoMetadataSizeTest(uint64_t expected_metadata_size,
776 uint64_t actual_metadata_size,
777 bool hash_checks_mandatory) {
778 PrefsMock prefs;
779 InstallPlan install_plan;
780 install_plan.hash_checks_mandatory = hash_checks_mandatory;
781 MockSystemState mock_system_state;
782 DeltaPerformer performer(&prefs, &mock_system_state, &install_plan);
783 EXPECT_EQ(0, performer.Open("/dev/null", 0, 0));
784 EXPECT_TRUE(performer.OpenKernel("/dev/null"));
785
786 // Set a valid magic string and version number 1.
787 EXPECT_TRUE(performer.Write("CrAU", 4));
788 uint64_t version = htobe64(1);
789 EXPECT_TRUE(performer.Write(&version, 8));
790
791 install_plan.metadata_size = expected_metadata_size;
David Zeuthena99981f2013-04-29 13:42:47 -0700792 ErrorCode error_code;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800793 // When filling in size in manifest, exclude the size of the 20-byte header.
794 uint64_t size_in_manifest = htobe64(actual_metadata_size - 20);
795 bool result = performer.Write(&size_in_manifest, 8, &error_code);
796 if (expected_metadata_size == actual_metadata_size ||
797 !hash_checks_mandatory) {
798 EXPECT_TRUE(result);
799 } else {
800 EXPECT_FALSE(result);
David Zeuthena99981f2013-04-29 13:42:47 -0700801 EXPECT_EQ(kErrorCodeDownloadInvalidMetadataSize, error_code);
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800802 }
803
804 EXPECT_LT(performer.Close(), 0);
805}
806
807// Generates a valid delta file but tests the delta performer by suppling
808// different metadata signatures as per omaha_metadata_signature flag and
809// sees if the result of the parsing are as per hash_checks_mandatory flag.
810void DoMetadataSignatureTest(MetadataSignatureTest metadata_signature_test,
811 SignatureTest signature_test,
812 bool hash_checks_mandatory) {
813 DeltaState state;
814
815 // Using kSignatureNone since it doesn't affect the results of our test.
816 // If we've to use other signature options, then we'd have to get the
817 // metadata size again after adding the signing operation to the manifest.
Darin Petkov8e447e02013-04-16 16:23:50 +0200818 GenerateDeltaFile(true, true, false, -1, signature_test, &state);
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800819
820 ScopedPathUnlinker a_img_unlinker(state.a_img);
821 ScopedPathUnlinker b_img_unlinker(state.b_img);
822 ScopedPathUnlinker delta_unlinker(state.delta_path);
823 ScopedPathUnlinker old_kernel_unlinker(state.old_kernel);
824 ScopedPathUnlinker new_kernel_unlinker(state.new_kernel);
825
826 // Loads the payload and parses the manifest.
827 vector<char> payload;
828 EXPECT_TRUE(utils::ReadFile(state.delta_path, &payload));
829 LOG(INFO) << "Payload size: " << payload.size();
830
831 InstallPlan install_plan;
832 install_plan.hash_checks_mandatory = hash_checks_mandatory;
833 install_plan.metadata_size = state.metadata_size;
834
835 DeltaPerformer::MetadataParseResult expected_result, actual_result;
David Zeuthena99981f2013-04-29 13:42:47 -0700836 ErrorCode expected_error, actual_error;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800837
838 // Fill up the metadata signature in install plan according to the test.
839 switch (metadata_signature_test) {
840 case kEmptyMetadataSignature:
841 install_plan.metadata_signature.clear();
842 expected_result = DeltaPerformer::kMetadataParseError;
David Zeuthena99981f2013-04-29 13:42:47 -0700843 expected_error = kErrorCodeDownloadMetadataSignatureMissingError;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800844 break;
845
846 case kInvalidMetadataSignature:
847 install_plan.metadata_signature = kBogusMetadataSignature1;
848 expected_result = DeltaPerformer::kMetadataParseError;
David Zeuthena99981f2013-04-29 13:42:47 -0700849 expected_error = kErrorCodeDownloadMetadataSignatureMismatch;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800850 break;
851
852 case kValidMetadataSignature:
853 default:
854 // Set the install plan's metadata size to be the same as the one
855 // in the manifest so that we pass the metadata size checks. Only
856 // then we can get to manifest signature checks.
857 ASSERT_TRUE(PayloadSigner::GetMetadataSignature(
858 &payload[0],
859 state.metadata_size,
860 kUnittestPrivateKeyPath,
861 &install_plan.metadata_signature));
862 EXPECT_FALSE(install_plan.metadata_signature.empty());
863 expected_result = DeltaPerformer::kMetadataParseSuccess;
David Zeuthena99981f2013-04-29 13:42:47 -0700864 expected_error = kErrorCodeSuccess;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800865 break;
866 }
867
868 // Ignore the expected result/error if hash checks are not mandatory.
869 if (!hash_checks_mandatory) {
870 expected_result = DeltaPerformer::kMetadataParseSuccess;
David Zeuthena99981f2013-04-29 13:42:47 -0700871 expected_error = kErrorCodeSuccess;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800872 }
873
874 // Create the delta performer object.
875 PrefsMock prefs;
Jay Srinivasan2b5a0f02012-12-19 17:25:56 -0800876 DeltaPerformer delta_performer(&prefs,
877 &state.mock_system_state,
878 &install_plan);
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800879
880 // Use the public key corresponding to the private key used above to
881 // sign the metadata.
882 EXPECT_TRUE(utils::FileExists(kUnittestPublicKeyPath));
883 delta_performer.set_public_key_path(kUnittestPublicKeyPath);
884
885 // Parse the delta payload we created.
886 DeltaArchiveManifest manifest;
887 uint64_t parsed_metadata_size;
888
889 // Init actual_error with an invalid value so that we make sure
890 // ParsePayloadMetadata properly populates it in all cases.
David Zeuthena99981f2013-04-29 13:42:47 -0700891 actual_error = kErrorCodeUmaReportedMax;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800892 actual_result = delta_performer.ParsePayloadMetadata(payload, &manifest,
893 &parsed_metadata_size, &actual_error);
894
895 EXPECT_EQ(expected_result, actual_result);
896 EXPECT_EQ(expected_error, actual_error);
897
898 // Check that the parsed metadata size is what's expected. This test
899 // implicitly confirms that the metadata signature is valid, if required.
900 EXPECT_EQ(state.metadata_size, parsed_metadata_size);
901}
902
903void DoOperationHashMismatchTest(OperationHashTest op_hash_test,
904 bool hash_checks_mandatory) {
905 DeltaState state;
Darin Petkov8e447e02013-04-16 16:23:50 +0200906 GenerateDeltaFile(true, true, false, -1, kSignatureGenerated, &state);
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800907 ScopedPathUnlinker a_img_unlinker(state.a_img);
908 ScopedPathUnlinker b_img_unlinker(state.b_img);
909 ScopedPathUnlinker delta_unlinker(state.delta_path);
910 ScopedPathUnlinker old_kernel_unlinker(state.old_kernel);
911 ScopedPathUnlinker new_kernel_unlinker(state.new_kernel);
912 DeltaPerformer *performer;
913 ApplyDeltaFile(true, true, false, kSignatureGenerated,
914 &state, hash_checks_mandatory, op_hash_test, &performer);
915}
916
917class DeltaPerformerTest : public ::testing::Test { };
918
919TEST(DeltaPerformerTest, ExtentsToByteStringTest) {
920 uint64_t test[] = {1, 1, 4, 2, kSparseHole, 1, 0, 1};
921 COMPILE_ASSERT(arraysize(test) % 2 == 0, array_size_uneven);
922 const uint64_t block_size = 4096;
923 const uint64_t file_length = 5 * block_size - 13;
924
925 google::protobuf::RepeatedPtrField<Extent> extents;
926 for (size_t i = 0; i < arraysize(test); i += 2) {
927 Extent* extent = extents.Add();
928 extent->set_start_block(test[i]);
929 extent->set_num_blocks(test[i + 1]);
930 }
931
932 string expected_output = "4096:4096,16384:8192,-1:4096,0:4083";
933 string actual_output;
934 EXPECT_TRUE(DeltaPerformer::ExtentsToBsdiffPositionsString(extents,
935 block_size,
936 file_length,
937 &actual_output));
938 EXPECT_EQ(expected_output, actual_output);
939}
Darin Petkov68c10d12010-10-14 09:24:37 -0700940
941TEST(DeltaPerformerTest, RunAsRootSmallImageTest) {
Darin Petkov8e447e02013-04-16 16:23:50 +0200942 DoSmallImageTest(false, false, false, -1, kSignatureGenerator,
Gilad Arnold434eb0c2013-07-22 06:47:52 -0700943 false);
Darin Petkov8e447e02013-04-16 16:23:50 +0200944}
945
946TEST(DeltaPerformerTest, RunAsRootSmallImageChunksTest) {
Darin Petkov8e447e02013-04-16 16:23:50 +0200947 DoSmallImageTest(false, false, false, kBlockSize, kSignatureGenerator,
Gilad Arnold434eb0c2013-07-22 06:47:52 -0700948 false);
Darin Petkov68c10d12010-10-14 09:24:37 -0700949}
950
951TEST(DeltaPerformerTest, RunAsRootFullKernelSmallImageTest) {
Darin Petkov8e447e02013-04-16 16:23:50 +0200952 DoSmallImageTest(true, false, false, -1, kSignatureGenerator,
Gilad Arnold434eb0c2013-07-22 06:47:52 -0700953 false);
Darin Petkov7a22d792010-11-08 14:10:00 -0800954}
955
956TEST(DeltaPerformerTest, RunAsRootFullSmallImageTest) {
Darin Petkov8e447e02013-04-16 16:23:50 +0200957 DoSmallImageTest(true, true, false, -1, kSignatureGenerator,
Gilad Arnold434eb0c2013-07-22 06:47:52 -0700958 true);
Darin Petkov9fa7ec52010-10-18 11:45:23 -0700959}
960
961TEST(DeltaPerformerTest, RunAsRootNoopSmallImageTest) {
Darin Petkov8e447e02013-04-16 16:23:50 +0200962 DoSmallImageTest(false, false, true, -1, kSignatureGenerator,
Gilad Arnold434eb0c2013-07-22 06:47:52 -0700963 false);
Darin Petkov9574f7e2011-01-13 10:48:12 -0800964}
965
Darin Petkovcbfb0172011-01-14 15:24:45 -0800966TEST(DeltaPerformerTest, RunAsRootSmallImageSignNoneTest) {
Darin Petkov8e447e02013-04-16 16:23:50 +0200967 DoSmallImageTest(false, false, false, -1, kSignatureNone,
Gilad Arnold434eb0c2013-07-22 06:47:52 -0700968 false);
Darin Petkovcbfb0172011-01-14 15:24:45 -0800969}
970
971TEST(DeltaPerformerTest, RunAsRootSmallImageSignGeneratedTest) {
Darin Petkov8e447e02013-04-16 16:23:50 +0200972 DoSmallImageTest(false, false, false, -1, kSignatureGenerated,
Gilad Arnold434eb0c2013-07-22 06:47:52 -0700973 true);
Darin Petkovcbfb0172011-01-14 15:24:45 -0800974}
975
976TEST(DeltaPerformerTest, RunAsRootSmallImageSignGeneratedShellTest) {
Darin Petkov8e447e02013-04-16 16:23:50 +0200977 DoSmallImageTest(false, false, false, -1, kSignatureGeneratedShell,
Gilad Arnold434eb0c2013-07-22 06:47:52 -0700978 false);
Andrew de los Reyes27f7d372010-10-07 11:26:07 -0700979}
980
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800981TEST(DeltaPerformerTest, RunAsRootSmallImageSignGeneratedShellBadKeyTest) {
Darin Petkov8e447e02013-04-16 16:23:50 +0200982 DoSmallImageTest(false, false, false, -1, kSignatureGeneratedShellBadKey,
Gilad Arnold434eb0c2013-07-22 06:47:52 -0700983 false);
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800984}
985
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -0700986TEST(DeltaPerformerTest, RunAsRootSmallImageSignGeneratedShellRotateCl1Test) {
Darin Petkov8e447e02013-04-16 16:23:50 +0200987 DoSmallImageTest(false, false, false, -1, kSignatureGeneratedShellRotateCl1,
Gilad Arnold434eb0c2013-07-22 06:47:52 -0700988 false);
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -0700989}
990
991TEST(DeltaPerformerTest, RunAsRootSmallImageSignGeneratedShellRotateCl2Test) {
Darin Petkov8e447e02013-04-16 16:23:50 +0200992 DoSmallImageTest(false, false, false, -1, kSignatureGeneratedShellRotateCl2,
Gilad Arnold434eb0c2013-07-22 06:47:52 -0700993 false);
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -0700994}
995
Darin Petkov934bb412010-11-18 11:21:35 -0800996TEST(DeltaPerformerTest, BadDeltaMagicTest) {
997 PrefsMock prefs;
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700998 InstallPlan install_plan;
Jay Srinivasanf0572052012-10-23 18:12:56 -0700999 MockSystemState mock_system_state;
1000 DeltaPerformer performer(&prefs, &mock_system_state, &install_plan);
Darin Petkov934bb412010-11-18 11:21:35 -08001001 EXPECT_EQ(0, performer.Open("/dev/null", 0, 0));
1002 EXPECT_TRUE(performer.OpenKernel("/dev/null"));
Don Garrette410e0f2011-11-10 15:39:01 -08001003 EXPECT_TRUE(performer.Write("junk", 4));
1004 EXPECT_TRUE(performer.Write("morejunk", 8));
1005 EXPECT_FALSE(performer.Write("morejunk", 8));
Darin Petkov934bb412010-11-18 11:21:35 -08001006 EXPECT_LT(performer.Close(), 0);
1007}
1008
Andrew de los Reyes353777c2010-10-08 10:34:30 -07001009TEST(DeltaPerformerTest, IsIdempotentOperationTest) {
1010 DeltaArchiveManifest_InstallOperation op;
1011 EXPECT_TRUE(DeltaPerformer::IsIdempotentOperation(op));
1012 *(op.add_dst_extents()) = ExtentForRange(0, 5);
1013 EXPECT_TRUE(DeltaPerformer::IsIdempotentOperation(op));
1014 *(op.add_src_extents()) = ExtentForRange(4, 1);
1015 EXPECT_FALSE(DeltaPerformer::IsIdempotentOperation(op));
1016 op.clear_src_extents();
1017 *(op.add_src_extents()) = ExtentForRange(5, 3);
1018 EXPECT_TRUE(DeltaPerformer::IsIdempotentOperation(op));
1019 *(op.add_dst_extents()) = ExtentForRange(20, 6);
1020 EXPECT_TRUE(DeltaPerformer::IsIdempotentOperation(op));
1021 *(op.add_src_extents()) = ExtentForRange(19, 2);
1022 EXPECT_FALSE(DeltaPerformer::IsIdempotentOperation(op));
1023}
1024
Jay Srinivasan2b5a0f02012-12-19 17:25:56 -08001025TEST(DeltaPerformerTest, WriteUpdatesPayloadState) {
1026 PrefsMock prefs;
1027 InstallPlan install_plan;
1028 MockSystemState mock_system_state;
1029 DeltaPerformer performer(&prefs, &mock_system_state, &install_plan);
1030 EXPECT_EQ(0, performer.Open("/dev/null", 0, 0));
1031 EXPECT_TRUE(performer.OpenKernel("/dev/null"));
1032
1033 EXPECT_CALL(*(mock_system_state.mock_payload_state()),
1034 DownloadProgress(4)).Times(1);
1035 EXPECT_CALL(*(mock_system_state.mock_payload_state()),
1036 DownloadProgress(8)).Times(2);
1037
1038 EXPECT_TRUE(performer.Write("junk", 4));
1039 EXPECT_TRUE(performer.Write("morejunk", 8));
1040 EXPECT_FALSE(performer.Write("morejunk", 8));
1041 EXPECT_LT(performer.Close(), 0);
1042}
1043
Jay Srinivasan738fdf32012-12-07 17:40:54 -08001044TEST(DeltaPerformerTest, MissingMandatoryMetadataSizeTest) {
1045 DoMetadataSizeTest(0, 75456, true);
Jay Srinivasan51dcf262012-09-13 17:24:32 -07001046}
1047
Jay Srinivasan738fdf32012-12-07 17:40:54 -08001048TEST(DeltaPerformerTest, MissingNonMandatoryMetadataSizeTest) {
1049 DoMetadataSizeTest(0, 123456, false);
1050}
1051
1052TEST(DeltaPerformerTest, InvalidMandatoryMetadataSizeTest) {
1053 DoMetadataSizeTest(13000, 140000, true);
1054}
1055
1056TEST(DeltaPerformerTest, InvalidNonMandatoryMetadataSizeTest) {
1057 DoMetadataSizeTest(40000, 50000, false);
1058}
1059
1060TEST(DeltaPerformerTest, ValidMandatoryMetadataSizeTest) {
1061 DoMetadataSizeTest(85376, 85376, true);
1062}
1063
1064TEST(DeltaPerformerTest, RunAsRootMandatoryEmptyMetadataSignatureTest) {
1065 DoMetadataSignatureTest(kEmptyMetadataSignature, kSignatureGenerated, true);
1066}
1067
1068TEST(DeltaPerformerTest, RunAsRootNonMandatoryEmptyMetadataSignatureTest) {
1069 DoMetadataSignatureTest(kEmptyMetadataSignature, kSignatureGenerated, false);
1070}
1071
1072TEST(DeltaPerformerTest, RunAsRootMandatoryInvalidMetadataSignatureTest) {
1073 DoMetadataSignatureTest(kInvalidMetadataSignature, kSignatureGenerated, true);
1074}
1075
1076TEST(DeltaPerformerTest, RunAsRootNonMandatoryInvalidMetadataSignatureTest) {
1077 DoMetadataSignatureTest(kInvalidMetadataSignature, kSignatureGenerated,
1078 false);
1079}
1080
1081TEST(DeltaPerformerTest, RunAsRootMandatoryValidMetadataSignature1Test) {
1082 DoMetadataSignatureTest(kValidMetadataSignature, kSignatureNone, true);
1083}
1084
1085TEST(DeltaPerformerTest, RunAsRootMandatoryValidMetadataSignature2Test) {
1086 DoMetadataSignatureTest(kValidMetadataSignature, kSignatureGenerated, true);
1087}
1088
1089TEST(DeltaPerformerTest, RunAsRootNonMandatoryValidMetadataSignatureTest) {
1090 DoMetadataSignatureTest(kValidMetadataSignature, kSignatureGenerated, false);
1091}
1092
1093TEST(DeltaPerformerTest, RunAsRootMandatoryOperationHashMismatchTest) {
1094 DoOperationHashMismatchTest(kInvalidOperationData, true);
1095}
Jay Srinivasan51dcf262012-09-13 17:24:32 -07001096
Andrew de los Reyes09e56d62010-04-23 13:45:53 -07001097} // namespace chromeos_update_engine