blob: d1f4bc9ea09bbd67799cb76ce2b9601775a372e1 [file] [log] [blame]
Alex Deymoaea4c1c2015-08-19 20:24:43 -07001//
2// Copyright (C) 2011 The Android Open Source Project
3//
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at
7//
8// http://www.apache.org/licenses/LICENSE-2.0
9//
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15//
rspangler@google.com49fdf182009-10-10 00:57:34 +000016
Alex Deymo8427b4a2014-11-05 14:00:32 -080017#include "update_engine/download_action.h"
18
Darin Petkov9d911fa2010-08-19 09:36:08 -070019#include <gmock/gmock.h>
rspangler@google.com49fdf182009-10-10 00:57:34 +000020#include <gtest/gtest.h>
Darin Petkov73058b42010-10-06 16:32:19 -070021
Ben Chan02f7c1d2014-10-18 15:18:02 -070022#include <memory>
David Zeuthen8f191b22013-08-06 12:27:50 -070023#include <string>
24#include <utility>
25#include <vector>
26
Alex Deymo60ca1a72015-06-18 18:19:15 -070027#include <base/bind.h>
Alex Vakulenko75039d72014-03-25 12:36:28 -070028#include <base/files/file_path.h>
Ben Chan06c76a42014-09-05 08:21:06 -070029#include <base/files/file_util.h>
Alex Deymo60ca1a72015-06-18 18:19:15 -070030#include <base/location.h>
Alex Vakulenko75039d72014-03-25 12:36:28 -070031#include <base/strings/stringprintf.h>
Alex Deymo60ca1a72015-06-18 18:19:15 -070032#include <chromeos/bind_lambda.h>
33#include <chromeos/message_loops/fake_message_loop.h>
34#include <chromeos/message_loops/message_loop.h>
David Zeuthen8f191b22013-08-06 12:27:50 -070035
rspangler@google.com49fdf182009-10-10 00:57:34 +000036#include "update_engine/action_pipe.h"
David Zeuthen8f191b22013-08-06 12:27:50 -070037#include "update_engine/fake_p2p_manager_configuration.h"
Gilad Arnold5bb4c902014-04-10 12:32:13 -070038#include "update_engine/fake_system_state.h"
39#include "update_engine/mock_http_fetcher.h"
Alex Deymo8427b4a2014-11-05 14:00:32 -080040#include "update_engine/mock_prefs.h"
Gilad Arnold5bb4c902014-04-10 12:32:13 -070041#include "update_engine/omaha_hash_calculator.h"
rspangler@google.com49fdf182009-10-10 00:57:34 +000042#include "update_engine/test_utils.h"
Gilad Arnold4a0321b2014-10-28 15:57:30 -070043#include "update_engine/update_manager/fake_update_manager.h"
adlr@google.comc98a7ed2009-12-04 18:54:03 +000044#include "update_engine/utils.h"
rspangler@google.com49fdf182009-10-10 00:57:34 +000045
46namespace chromeos_update_engine {
47
Alex Deymof329b932014-10-30 01:37:48 -070048using base::FilePath;
49using base::ReadFileToString;
50using base::WriteFile;
rspangler@google.com49fdf182009-10-10 00:57:34 +000051using std::string;
Ben Chan02f7c1d2014-10-18 15:18:02 -070052using std::unique_ptr;
rspangler@google.com49fdf182009-10-10 00:57:34 +000053using std::vector;
Darin Petkov9d911fa2010-08-19 09:36:08 -070054using testing::AtLeast;
55using testing::InSequence;
Gilad Arnold74b5f552014-10-07 08:17:16 -070056using testing::Return;
Alex Deymof329b932014-10-30 01:37:48 -070057using testing::_;
Alex Deymo10875d92014-11-10 21:52:57 -080058using test_utils::ScopedTempFile;
rspangler@google.com49fdf182009-10-10 00:57:34 +000059
60class DownloadActionTest : public ::testing::Test { };
61
62namespace {
Darin Petkov9d911fa2010-08-19 09:36:08 -070063class DownloadActionDelegateMock : public DownloadActionDelegate {
64 public:
65 MOCK_METHOD1(SetDownloadStatus, void(bool active));
66 MOCK_METHOD2(BytesReceived, void(uint64_t bytes_received, uint64_t total));
67};
68
rspangler@google.com49fdf182009-10-10 00:57:34 +000069class DownloadActionTestProcessorDelegate : public ActionProcessorDelegate {
70 public:
David Zeuthena99981f2013-04-29 13:42:47 -070071 explicit DownloadActionTestProcessorDelegate(ErrorCode expected_code)
Alex Deymo60ca1a72015-06-18 18:19:15 -070072 : processing_done_called_(false),
Darin Petkovc97435c2010-07-20 12:37:43 -070073 expected_code_(expected_code) {}
Alex Deymo610277e2014-11-11 21:18:11 -080074 ~DownloadActionTestProcessorDelegate() override {
rspangler@google.com49fdf182009-10-10 00:57:34 +000075 EXPECT_TRUE(processing_done_called_);
76 }
Yunlian Jiang35866ed2015-01-29 13:09:20 -080077 void ProcessingDone(const ActionProcessor* processor,
78 ErrorCode code) override {
Alex Deymo60ca1a72015-06-18 18:19:15 -070079 chromeos::MessageLoop::current()->BreakLoop();
Alex Vakulenkof68bbbc2015-02-09 12:53:18 -080080 chromeos::Blob found_data;
adlr@google.comc98a7ed2009-12-04 18:54:03 +000081 ASSERT_TRUE(utils::ReadFile(path_, &found_data));
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -070082 if (expected_code_ != ErrorCode::kDownloadWriteError) {
Darin Petkov9ce452b2010-11-17 14:33:28 -080083 ASSERT_EQ(expected_data_.size(), found_data.size());
84 for (unsigned i = 0; i < expected_data_.size(); i++) {
85 EXPECT_EQ(expected_data_[i], found_data[i]);
86 }
rspangler@google.com49fdf182009-10-10 00:57:34 +000087 }
88 processing_done_called_ = true;
89 }
90
Yunlian Jiang35866ed2015-01-29 13:09:20 -080091 void ActionCompleted(ActionProcessor* processor,
92 AbstractAction* action,
93 ErrorCode code) override {
Darin Petkovc97435c2010-07-20 12:37:43 -070094 const string type = action->Type();
95 if (type == DownloadAction::StaticType()) {
96 EXPECT_EQ(expected_code_, code);
97 } else {
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -070098 EXPECT_EQ(ErrorCode::kSuccess, code);
Darin Petkovc97435c2010-07-20 12:37:43 -070099 }
rspangler@google.com49fdf182009-10-10 00:57:34 +0000100 }
101
rspangler@google.com49fdf182009-10-10 00:57:34 +0000102 string path_;
Alex Vakulenkof68bbbc2015-02-09 12:53:18 -0800103 chromeos::Blob expected_data_;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000104 bool processing_done_called_;
David Zeuthena99981f2013-04-29 13:42:47 -0700105 ErrorCode expected_code_;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000106};
107
Darin Petkov9ce452b2010-11-17 14:33:28 -0800108class TestDirectFileWriter : public DirectFileWriter {
109 public:
110 TestDirectFileWriter() : fail_write_(0), current_write_(0) {}
111 void set_fail_write(int fail_write) { fail_write_ = fail_write; }
112
Don Garrette410e0f2011-11-10 15:39:01 -0800113 virtual bool Write(const void* bytes, size_t count) {
Darin Petkov9ce452b2010-11-17 14:33:28 -0800114 if (++current_write_ == fail_write_) {
Don Garrette410e0f2011-11-10 15:39:01 -0800115 return false;
Darin Petkov9ce452b2010-11-17 14:33:28 -0800116 }
117 return DirectFileWriter::Write(bytes, count);
118 }
119
120 private:
121 // If positive, fail on the |fail_write_| call to Write.
122 int fail_write_;
123 int current_write_;
124};
125
Alex Deymo60ca1a72015-06-18 18:19:15 -0700126void StartProcessorInRunLoop(ActionProcessor* processor,
127 MockHttpFetcher* http_fetcher) {
rspangler@google.com49fdf182009-10-10 00:57:34 +0000128 processor->StartProcessing();
Andrew de los Reyes34e41a12010-10-26 20:07:58 -0700129 http_fetcher->SetOffset(1);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000130}
131
Alex Vakulenkof68bbbc2015-02-09 12:53:18 -0800132void TestWithData(const chromeos::Blob& data,
Darin Petkov9ce452b2010-11-17 14:33:28 -0800133 int fail_write,
Darin Petkov9d911fa2010-08-19 09:36:08 -0700134 bool use_download_delegate) {
Alex Deymo60ca1a72015-06-18 18:19:15 -0700135 chromeos::FakeMessageLoop loop(nullptr);
136 loop.SetAsCurrent();
Alex Deymo5ed695e2015-10-05 16:59:23 -0700137 FakeSystemState fake_system_state;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000138
139 // TODO(adlr): see if we need a different file for build bots
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700140 ScopedTempFile output_temp_file;
Darin Petkov9ce452b2010-11-17 14:33:28 -0800141 TestDirectFileWriter writer;
142 writer.set_fail_write(fail_write);
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700143
Andrew de los Reyes34e41a12010-10-26 20:07:58 -0700144 // We pull off the first byte from data and seek past it.
145
Darin Petkov7ed561b2011-10-04 02:59:03 -0700146 string hash =
Andrew de los Reyes34e41a12010-10-26 20:07:58 -0700147 OmahaHashCalculator::OmahaHashOfBytes(&data[1], data.size() - 1);
Darin Petkov7ed561b2011-10-04 02:59:03 -0700148 uint64_t size = data.size();
149 InstallPlan install_plan(false,
Gilad Arnold21504f02013-05-24 08:51:22 -0700150 false,
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700151 "",
Darin Petkov50332f12010-09-24 11:44:47 -0700152 size,
Darin Petkovc97435c2010-07-20 12:37:43 -0700153 hash,
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700154 0,
155 "",
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700156 output_temp_file.GetPath(),
David Zeuthene7f89172013-10-31 10:21:04 -0700157 "",
Allie Woodfdf00512015-03-02 13:34:55 -0800158 "",
159 "",
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700160 "");
Alex Deymo5ed695e2015-10-05 16:59:23 -0700161 install_plan.source_slot = 0;
162 install_plan.target_slot = 1;
163 // We mark both slots as bootable. Only the target slot should be unbootable
164 // after the download starts.
165 fake_system_state.fake_boot_control()->SetSlotBootable(
166 install_plan.source_slot, true);
167 fake_system_state.fake_boot_control()->SetSlotBootable(
168 install_plan.target_slot, true);
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000169 ObjectFeederAction<InstallPlan> feeder_action;
170 feeder_action.set_obj(install_plan);
Alex Deymo8427b4a2014-11-05 14:00:32 -0800171 MockPrefs prefs;
Alex Vakulenkof68bbbc2015-02-09 12:53:18 -0800172 MockHttpFetcher* http_fetcher = new MockHttpFetcher(data.data(),
Andrew de los Reyes45168102010-11-22 11:13:50 -0800173 data.size(),
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700174 nullptr);
Andrew de los Reyes34e41a12010-10-26 20:07:58 -0700175 // takes ownership of passed in HttpFetcher
Alex Deymo5ed695e2015-10-05 16:59:23 -0700176 DownloadAction download_action(&prefs, &fake_system_state, http_fetcher);
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700177 download_action.SetTestFileWriter(&writer);
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000178 BondActions(&feeder_action, &download_action);
Darin Petkov9d911fa2010-08-19 09:36:08 -0700179 DownloadActionDelegateMock download_delegate;
180 if (use_download_delegate) {
181 InSequence s;
182 download_action.set_delegate(&download_delegate);
183 EXPECT_CALL(download_delegate, SetDownloadStatus(true)).Times(1);
Andrew de los Reyes34e41a12010-10-26 20:07:58 -0700184 if (data.size() > kMockHttpFetcherChunkSize)
185 EXPECT_CALL(download_delegate,
186 BytesReceived(1 + kMockHttpFetcherChunkSize, _));
Darin Petkov9ce452b2010-11-17 14:33:28 -0800187 EXPECT_CALL(download_delegate, BytesReceived(_, _)).Times(AtLeast(1));
Darin Petkov9d911fa2010-08-19 09:36:08 -0700188 EXPECT_CALL(download_delegate, SetDownloadStatus(false)).Times(1);
189 }
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700190 ErrorCode expected_code = ErrorCode::kSuccess;
Darin Petkov7ed561b2011-10-04 02:59:03 -0700191 if (fail_write > 0)
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700192 expected_code = ErrorCode::kDownloadWriteError;
Darin Petkov50332f12010-09-24 11:44:47 -0700193 DownloadActionTestProcessorDelegate delegate(expected_code);
Alex Vakulenkof68bbbc2015-02-09 12:53:18 -0800194 delegate.expected_data_ = chromeos::Blob(data.begin() + 1, data.end());
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700195 delegate.path_ = output_temp_file.GetPath();
rspangler@google.com49fdf182009-10-10 00:57:34 +0000196 ActionProcessor processor;
197 processor.set_delegate(&delegate);
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000198 processor.EnqueueAction(&feeder_action);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000199 processor.EnqueueAction(&download_action);
200
Alex Deymo60ca1a72015-06-18 18:19:15 -0700201 loop.PostTask(FROM_HERE,
202 base::Bind(&StartProcessorInRunLoop, &processor, http_fetcher));
203 loop.Run();
204 EXPECT_FALSE(loop.PendingTasks());
Alex Deymo5ed695e2015-10-05 16:59:23 -0700205
206 EXPECT_TRUE(fake_system_state.fake_boot_control()->IsSlotBootable(
207 install_plan.source_slot));
208 EXPECT_FALSE(fake_system_state.fake_boot_control()->IsSlotBootable(
209 install_plan.target_slot));
rspangler@google.com49fdf182009-10-10 00:57:34 +0000210}
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700211} // namespace
rspangler@google.com49fdf182009-10-10 00:57:34 +0000212
213TEST(DownloadActionTest, SimpleTest) {
Alex Vakulenkof68bbbc2015-02-09 12:53:18 -0800214 chromeos::Blob small;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000215 const char* foo = "foo";
216 small.insert(small.end(), foo, foo + strlen(foo));
Darin Petkov50332f12010-09-24 11:44:47 -0700217 TestWithData(small,
Darin Petkov9ce452b2010-11-17 14:33:28 -0800218 0, // fail_write
Darin Petkov50332f12010-09-24 11:44:47 -0700219 true); // use_download_delegate
rspangler@google.com49fdf182009-10-10 00:57:34 +0000220}
221
222TEST(DownloadActionTest, LargeTest) {
Alex Vakulenkof68bbbc2015-02-09 12:53:18 -0800223 chromeos::Blob big(5 * kMockHttpFetcherChunkSize);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000224 char c = '0';
225 for (unsigned int i = 0; i < big.size(); i++) {
226 big[i] = c;
Darin Petkov9ce452b2010-11-17 14:33:28 -0800227 c = ('9' == c) ? '0' : c + 1;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000228 }
Darin Petkov50332f12010-09-24 11:44:47 -0700229 TestWithData(big,
Darin Petkov9ce452b2010-11-17 14:33:28 -0800230 0, // fail_write
231 true); // use_download_delegate
232}
233
234TEST(DownloadActionTest, FailWriteTest) {
Alex Vakulenkof68bbbc2015-02-09 12:53:18 -0800235 chromeos::Blob big(5 * kMockHttpFetcherChunkSize);
Darin Petkov9ce452b2010-11-17 14:33:28 -0800236 char c = '0';
237 for (unsigned int i = 0; i < big.size(); i++) {
238 big[i] = c;
239 c = ('9' == c) ? '0' : c + 1;
240 }
241 TestWithData(big,
Darin Petkov9ce452b2010-11-17 14:33:28 -0800242 2, // fail_write
Darin Petkov50332f12010-09-24 11:44:47 -0700243 true); // use_download_delegate
Darin Petkovc97435c2010-07-20 12:37:43 -0700244}
245
Darin Petkov9d911fa2010-08-19 09:36:08 -0700246TEST(DownloadActionTest, NoDownloadDelegateTest) {
Alex Vakulenkof68bbbc2015-02-09 12:53:18 -0800247 chromeos::Blob small;
Darin Petkov9d911fa2010-08-19 09:36:08 -0700248 const char* foo = "foofoo";
249 small.insert(small.end(), foo, foo + strlen(foo));
Darin Petkov50332f12010-09-24 11:44:47 -0700250 TestWithData(small,
Darin Petkov9ce452b2010-11-17 14:33:28 -0800251 0, // fail_write
Darin Petkov50332f12010-09-24 11:44:47 -0700252 false); // use_download_delegate
rspangler@google.com49fdf182009-10-10 00:57:34 +0000253}
254
255namespace {
256class TerminateEarlyTestProcessorDelegate : public ActionProcessorDelegate {
257 public:
258 void ProcessingStopped(const ActionProcessor* processor) {
Alex Deymo60ca1a72015-06-18 18:19:15 -0700259 chromeos::MessageLoop::current()->BreakLoop();
rspangler@google.com49fdf182009-10-10 00:57:34 +0000260 }
rspangler@google.com49fdf182009-10-10 00:57:34 +0000261};
262
Alex Deymo60ca1a72015-06-18 18:19:15 -0700263void TerminateEarlyTestStarter(ActionProcessor* processor) {
rspangler@google.com49fdf182009-10-10 00:57:34 +0000264 processor->StartProcessing();
265 CHECK(processor->IsRunning());
266 processor->StopProcessing();
rspangler@google.com49fdf182009-10-10 00:57:34 +0000267}
268
Darin Petkov9d911fa2010-08-19 09:36:08 -0700269void TestTerminateEarly(bool use_download_delegate) {
Alex Deymo60ca1a72015-06-18 18:19:15 -0700270 chromeos::FakeMessageLoop loop(nullptr);
271 loop.SetAsCurrent();
rspangler@google.com49fdf182009-10-10 00:57:34 +0000272
Alex Vakulenkof68bbbc2015-02-09 12:53:18 -0800273 chromeos::Blob data(kMockHttpFetcherChunkSize +
274 kMockHttpFetcherChunkSize / 2);
275 memset(data.data(), 0, data.size());
rspangler@google.com49fdf182009-10-10 00:57:34 +0000276
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700277 ScopedTempFile temp_file;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000278 {
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700279 DirectFileWriter writer;
280
rspangler@google.com49fdf182009-10-10 00:57:34 +0000281 // takes ownership of passed in HttpFetcher
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000282 ObjectFeederAction<InstallPlan> feeder_action;
Gilad Arnold21504f02013-05-24 08:51:22 -0700283 InstallPlan install_plan(false, false, "", 0, "", 0, "",
Allie Woodfdf00512015-03-02 13:34:55 -0800284 temp_file.GetPath(), "", "", "", "");
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000285 feeder_action.set_obj(install_plan);
Alex Deymo5ed695e2015-10-05 16:59:23 -0700286 FakeSystemState fake_system_state_;
Alex Deymo8427b4a2014-11-05 14:00:32 -0800287 MockPrefs prefs;
Alex Deymo5ed695e2015-10-05 16:59:23 -0700288 DownloadAction download_action(&prefs, &fake_system_state_,
Alex Vakulenkof68bbbc2015-02-09 12:53:18 -0800289 new MockHttpFetcher(data.data(),
Andrew de los Reyes45168102010-11-22 11:13:50 -0800290 data.size(),
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700291 nullptr));
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700292 download_action.SetTestFileWriter(&writer);
Darin Petkov9d911fa2010-08-19 09:36:08 -0700293 DownloadActionDelegateMock download_delegate;
294 if (use_download_delegate) {
295 InSequence s;
296 download_action.set_delegate(&download_delegate);
297 EXPECT_CALL(download_delegate, SetDownloadStatus(true)).Times(1);
298 EXPECT_CALL(download_delegate, SetDownloadStatus(false)).Times(1);
299 }
rspangler@google.com49fdf182009-10-10 00:57:34 +0000300 TerminateEarlyTestProcessorDelegate delegate;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000301 ActionProcessor processor;
302 processor.set_delegate(&delegate);
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000303 processor.EnqueueAction(&feeder_action);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000304 processor.EnqueueAction(&download_action);
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000305 BondActions(&feeder_action, &download_action);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000306
Alex Deymo60ca1a72015-06-18 18:19:15 -0700307 loop.PostTask(FROM_HERE,
308 base::Bind(&TerminateEarlyTestStarter, &processor));
309 loop.Run();
310 EXPECT_FALSE(loop.PendingTasks());
rspangler@google.com49fdf182009-10-10 00:57:34 +0000311 }
312
313 // 1 or 0 chunks should have come through
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700314 const off_t resulting_file_size(utils::FileSize(temp_file.GetPath()));
315 EXPECT_GE(resulting_file_size, 0);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000316 if (resulting_file_size != 0)
317 EXPECT_EQ(kMockHttpFetcherChunkSize, resulting_file_size);
318}
319
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700320} // namespace
Darin Petkov9d911fa2010-08-19 09:36:08 -0700321
322TEST(DownloadActionTest, TerminateEarlyTest) {
323 TestTerminateEarly(true);
324}
325
326TEST(DownloadActionTest, TerminateEarlyNoDownloadDelegateTest) {
327 TestTerminateEarly(false);
328}
329
rspangler@google.com49fdf182009-10-10 00:57:34 +0000330class DownloadActionTestAction;
331
332template<>
333class ActionTraits<DownloadActionTestAction> {
334 public:
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000335 typedef InstallPlan OutputObjectType;
336 typedef InstallPlan InputObjectType;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000337};
338
339// This is a simple Action class for testing.
Yunlian Jiang2dac5762013-04-12 09:53:09 -0700340class DownloadActionTestAction : public Action<DownloadActionTestAction> {
341 public:
rspangler@google.com49fdf182009-10-10 00:57:34 +0000342 DownloadActionTestAction() : did_run_(false) {}
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000343 typedef InstallPlan InputObjectType;
344 typedef InstallPlan OutputObjectType;
345 ActionPipe<InstallPlan>* in_pipe() { return in_pipe_.get(); }
346 ActionPipe<InstallPlan>* out_pipe() { return out_pipe_.get(); }
rspangler@google.com49fdf182009-10-10 00:57:34 +0000347 ActionProcessor* processor() { return processor_; }
348 void PerformAction() {
349 did_run_ = true;
350 ASSERT_TRUE(HasInputObject());
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000351 EXPECT_TRUE(expected_input_object_ == GetInputObject());
rspangler@google.com49fdf182009-10-10 00:57:34 +0000352 ASSERT_TRUE(processor());
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700353 processor()->ActionComplete(this, ErrorCode::kSuccess);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000354 }
355 string Type() const { return "DownloadActionTestAction"; }
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000356 InstallPlan expected_input_object_;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000357 bool did_run_;
358};
359
360namespace {
361// This class is an ActionProcessorDelegate that simply terminates the
362// run loop when the ActionProcessor has completed processing. It's used
363// only by the test PassObjectOutTest.
364class PassObjectOutTestProcessorDelegate : public ActionProcessorDelegate {
365 public:
David Zeuthena99981f2013-04-29 13:42:47 -0700366 void ProcessingDone(const ActionProcessor* processor, ErrorCode code) {
Alex Deymo60ca1a72015-06-18 18:19:15 -0700367 chromeos::MessageLoop::current()->BreakLoop();
rspangler@google.com49fdf182009-10-10 00:57:34 +0000368 }
rspangler@google.com49fdf182009-10-10 00:57:34 +0000369};
370
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700371} // namespace
rspangler@google.com49fdf182009-10-10 00:57:34 +0000372
373TEST(DownloadActionTest, PassObjectOutTest) {
Alex Deymo60ca1a72015-06-18 18:19:15 -0700374 chromeos::FakeMessageLoop loop(nullptr);
375 loop.SetAsCurrent();
rspangler@google.com49fdf182009-10-10 00:57:34 +0000376
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700377 DirectFileWriter writer;
378
rspangler@google.com49fdf182009-10-10 00:57:34 +0000379 // takes ownership of passed in HttpFetcher
Darin Petkov7ed561b2011-10-04 02:59:03 -0700380 InstallPlan install_plan(false,
Gilad Arnold21504f02013-05-24 08:51:22 -0700381 false,
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700382 "",
Darin Petkov50332f12010-09-24 11:44:47 -0700383 1,
Andrew de los Reyes1e338b82010-01-22 14:57:27 -0800384 OmahaHashCalculator::OmahaHashOfString("x"),
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700385 0,
386 "",
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700387 "/dev/null",
David Zeuthene7f89172013-10-31 10:21:04 -0700388 "/dev/null",
Allie Woodfdf00512015-03-02 13:34:55 -0800389 "/dev/null",
390 "/dev/null",
David Zeuthene7f89172013-10-31 10:21:04 -0700391 "");
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000392 ObjectFeederAction<InstallPlan> feeder_action;
393 feeder_action.set_obj(install_plan);
Alex Deymo8427b4a2014-11-05 14:00:32 -0800394 MockPrefs prefs;
Alex Deymo5ed695e2015-10-05 16:59:23 -0700395 FakeSystemState fake_system_state_;
396 DownloadAction download_action(&prefs, &fake_system_state_,
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700397 new MockHttpFetcher("x", 1, nullptr));
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700398 download_action.SetTestFileWriter(&writer);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000399
400 DownloadActionTestAction test_action;
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000401 test_action.expected_input_object_ = install_plan;
402 BondActions(&feeder_action, &download_action);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000403 BondActions(&download_action, &test_action);
404
405 ActionProcessor processor;
406 PassObjectOutTestProcessorDelegate delegate;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000407 processor.set_delegate(&delegate);
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000408 processor.EnqueueAction(&feeder_action);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000409 processor.EnqueueAction(&download_action);
410 processor.EnqueueAction(&test_action);
411
Alex Deymo60ca1a72015-06-18 18:19:15 -0700412 loop.PostTask(FROM_HERE,
413 base::Bind([&processor] { processor.StartProcessing(); }));
414 loop.Run();
415 EXPECT_FALSE(loop.PendingTasks());
rspangler@google.com49fdf182009-10-10 00:57:34 +0000416
417 EXPECT_EQ(true, test_action.did_run_);
418}
419
420TEST(DownloadActionTest, BadOutFileTest) {
Alex Deymo60ca1a72015-06-18 18:19:15 -0700421 chromeos::FakeMessageLoop loop(nullptr);
422 loop.SetAsCurrent();
rspangler@google.com49fdf182009-10-10 00:57:34 +0000423
424 const string path("/fake/path/that/cant/be/created/because/of/missing/dirs");
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700425 DirectFileWriter writer;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000426
427 // takes ownership of passed in HttpFetcher
Allie Woodfdf00512015-03-02 13:34:55 -0800428 InstallPlan install_plan(
429 false, false, "", 0, "", 0, "", path, "", "", "", "");
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000430 ObjectFeederAction<InstallPlan> feeder_action;
431 feeder_action.set_obj(install_plan);
Alex Deymo8427b4a2014-11-05 14:00:32 -0800432 MockPrefs prefs;
Alex Deymo5ed695e2015-10-05 16:59:23 -0700433 FakeSystemState fake_system_state_;
434 DownloadAction download_action(&prefs, &fake_system_state_,
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700435 new MockHttpFetcher("x", 1, nullptr));
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700436 download_action.SetTestFileWriter(&writer);
Darin Petkovc1a8b422010-07-19 11:34:49 -0700437
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000438 BondActions(&feeder_action, &download_action);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000439
440 ActionProcessor processor;
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000441 processor.EnqueueAction(&feeder_action);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000442 processor.EnqueueAction(&download_action);
443 processor.StartProcessing();
444 ASSERT_FALSE(processor.IsRunning());
445
Alex Deymo60ca1a72015-06-18 18:19:15 -0700446 loop.Run();
447 EXPECT_FALSE(loop.PendingTasks());
David Zeuthen8f191b22013-08-06 12:27:50 -0700448}
449
450// Test fixture for P2P tests.
451class P2PDownloadActionTest : public testing::Test {
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700452 protected:
David Zeuthen8f191b22013-08-06 12:27:50 -0700453 P2PDownloadActionTest()
Alex Deymo60ca1a72015-06-18 18:19:15 -0700454 : start_at_offset_(0),
Gilad Arnold4a0321b2014-10-28 15:57:30 -0700455 fake_um_(fake_system_state_.fake_clock()) {}
David Zeuthen8f191b22013-08-06 12:27:50 -0700456
Alex Deymo610277e2014-11-11 21:18:11 -0800457 ~P2PDownloadActionTest() override {}
David Zeuthen8f191b22013-08-06 12:27:50 -0700458
459 // Derived from testing::Test.
Alex Deymo610277e2014-11-11 21:18:11 -0800460 void SetUp() override {
Alex Deymo60ca1a72015-06-18 18:19:15 -0700461 loop_.SetAsCurrent();
David Zeuthen8f191b22013-08-06 12:27:50 -0700462 }
463
464 // Derived from testing::Test.
Alex Deymo610277e2014-11-11 21:18:11 -0800465 void TearDown() override {
Alex Deymo60ca1a72015-06-18 18:19:15 -0700466 EXPECT_FALSE(loop_.PendingTasks());
David Zeuthen8f191b22013-08-06 12:27:50 -0700467 }
468
469 // To be called by tests to setup the download. The
470 // |starting_offset| parameter is for where to resume.
471 void SetupDownload(off_t starting_offset) {
472 start_at_offset_ = starting_offset;
473 // Prepare data 10 kB of data.
474 data_.clear();
475 for (unsigned int i = 0; i < 10 * 1000; i++)
476 data_ += 'a' + (i % 25);
477
478 // Setup p2p.
479 FakeP2PManagerConfiguration *test_conf = new FakeP2PManagerConfiguration();
David Zeuthen41f2cf52014-11-05 12:29:45 -0500480 p2p_manager_.reset(P2PManager::Construct(
Gilad Arnold4a0321b2014-10-28 15:57:30 -0700481 test_conf, nullptr, &fake_um_, "cros_au", 3,
David Zeuthen41f2cf52014-11-05 12:29:45 -0500482 base::TimeDelta::FromDays(5)));
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700483 fake_system_state_.set_p2p_manager(p2p_manager_.get());
David Zeuthen8f191b22013-08-06 12:27:50 -0700484 }
485
486 // To be called by tests to perform the download. The
487 // |use_p2p_to_share| parameter is used to indicate whether the
488 // payload should be shared via p2p.
489 void StartDownload(bool use_p2p_to_share) {
Gilad Arnold74b5f552014-10-07 08:17:16 -0700490 EXPECT_CALL(*fake_system_state_.mock_payload_state(),
491 GetUsingP2PForSharing())
492 .WillRepeatedly(Return(use_p2p_to_share));
David Zeuthen8f191b22013-08-06 12:27:50 -0700493
494 ScopedTempFile output_temp_file;
495 TestDirectFileWriter writer;
496 InstallPlan install_plan(false,
497 false,
498 "",
499 data_.length(),
500 "1234hash",
501 0,
502 "",
503 output_temp_file.GetPath(),
David Zeuthene7f89172013-10-31 10:21:04 -0700504 "",
Allie Woodfdf00512015-03-02 13:34:55 -0800505 "",
506 "",
David Zeuthen8f191b22013-08-06 12:27:50 -0700507 "");
508 ObjectFeederAction<InstallPlan> feeder_action;
509 feeder_action.set_obj(install_plan);
Alex Deymo8427b4a2014-11-05 14:00:32 -0800510 MockPrefs prefs;
David Zeuthen8f191b22013-08-06 12:27:50 -0700511 http_fetcher_ = new MockHttpFetcher(data_.c_str(),
512 data_.length(),
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700513 nullptr);
David Zeuthen8f191b22013-08-06 12:27:50 -0700514 // Note that DownloadAction takes ownership of the passed in HttpFetcher.
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700515 download_action_.reset(new DownloadAction(&prefs, &fake_system_state_,
David Zeuthen8f191b22013-08-06 12:27:50 -0700516 http_fetcher_));
517 download_action_->SetTestFileWriter(&writer);
518 BondActions(&feeder_action, download_action_.get());
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700519 DownloadActionTestProcessorDelegate delegate(ErrorCode::kSuccess);
Alex Vakulenkof68bbbc2015-02-09 12:53:18 -0800520 delegate.expected_data_ = chromeos::Blob(data_.begin() + start_at_offset_,
521 data_.end());
David Zeuthen8f191b22013-08-06 12:27:50 -0700522 delegate.path_ = output_temp_file.GetPath();
523 processor_.set_delegate(&delegate);
524 processor_.EnqueueAction(&feeder_action);
525 processor_.EnqueueAction(download_action_.get());
526
Alex Deymo60ca1a72015-06-18 18:19:15 -0700527 loop_.PostTask(FROM_HERE, base::Bind(
528 &P2PDownloadActionTest::StartProcessorInRunLoopForP2P,
529 base::Unretained(this)));
530 loop_.Run();
David Zeuthen8f191b22013-08-06 12:27:50 -0700531 }
532
Alex Deymo60ca1a72015-06-18 18:19:15 -0700533 // Mainloop used to make StartDownload() synchronous.
534 chromeos::FakeMessageLoop loop_{nullptr};
535
David Zeuthen8f191b22013-08-06 12:27:50 -0700536 // The DownloadAction instance under test.
Ben Chan02f7c1d2014-10-18 15:18:02 -0700537 unique_ptr<DownloadAction> download_action_;
David Zeuthen8f191b22013-08-06 12:27:50 -0700538
539 // The HttpFetcher used in the test.
540 MockHttpFetcher* http_fetcher_;
541
542 // The P2PManager used in the test.
Ben Chan02f7c1d2014-10-18 15:18:02 -0700543 unique_ptr<P2PManager> p2p_manager_;
David Zeuthen8f191b22013-08-06 12:27:50 -0700544
545 // The ActionProcessor used for running the actions.
546 ActionProcessor processor_;
547
548 // A fake system state.
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700549 FakeSystemState fake_system_state_;
David Zeuthen8f191b22013-08-06 12:27:50 -0700550
551 // The data being downloaded.
552 string data_;
553
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700554 private:
David Zeuthen8f191b22013-08-06 12:27:50 -0700555 // Callback used in StartDownload() method.
Alex Deymo60ca1a72015-06-18 18:19:15 -0700556 void StartProcessorInRunLoopForP2P() {
557 processor_.StartProcessing();
558 http_fetcher_->SetOffset(start_at_offset_);
David Zeuthen8f191b22013-08-06 12:27:50 -0700559 }
560
David Zeuthen8f191b22013-08-06 12:27:50 -0700561 // The requested starting offset passed to SetupDownload().
562 off_t start_at_offset_;
Gilad Arnold4a0321b2014-10-28 15:57:30 -0700563
564 chromeos_update_manager::FakeUpdateManager fake_um_;
David Zeuthen8f191b22013-08-06 12:27:50 -0700565};
566
567TEST_F(P2PDownloadActionTest, IsWrittenTo) {
Alex Deymo10875d92014-11-10 21:52:57 -0800568 if (!test_utils::IsXAttrSupported(FilePath("/tmp"))) {
David Zeuthen910ec5b2013-09-26 12:10:58 -0700569 LOG(WARNING) << "Skipping test because /tmp does not support xattr. "
570 << "Please update your system to support this feature.";
571 return;
572 }
573
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700574 SetupDownload(0); // starting_offset
575 StartDownload(true); // use_p2p_to_share
David Zeuthen8f191b22013-08-06 12:27:50 -0700576
577 // Check the p2p file and its content matches what was sent.
578 string file_id = download_action_->p2p_file_id();
Gilad Arnold74b5f552014-10-07 08:17:16 -0700579 EXPECT_NE("", file_id);
580 EXPECT_EQ(data_.length(), p2p_manager_->FileGetSize(file_id));
581 EXPECT_EQ(data_.length(), p2p_manager_->FileGetExpectedSize(file_id));
David Zeuthen8f191b22013-08-06 12:27:50 -0700582 string p2p_file_contents;
583 EXPECT_TRUE(ReadFileToString(p2p_manager_->FileGetPath(file_id),
584 &p2p_file_contents));
585 EXPECT_EQ(data_, p2p_file_contents);
586}
587
588TEST_F(P2PDownloadActionTest, DeleteIfHoleExists) {
Alex Deymo10875d92014-11-10 21:52:57 -0800589 if (!test_utils::IsXAttrSupported(FilePath("/tmp"))) {
David Zeuthen910ec5b2013-09-26 12:10:58 -0700590 LOG(WARNING) << "Skipping test because /tmp does not support xattr. "
591 << "Please update your system to support this feature.";
592 return;
593 }
594
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700595 SetupDownload(1000); // starting_offset
596 StartDownload(true); // use_p2p_to_share
David Zeuthen8f191b22013-08-06 12:27:50 -0700597
598 // DownloadAction should convey that the file is not being shared.
599 // and that we don't have any p2p files.
600 EXPECT_EQ(download_action_->p2p_file_id(), "");
601 EXPECT_EQ(p2p_manager_->CountSharedFiles(), 0);
602}
603
604TEST_F(P2PDownloadActionTest, CanAppend) {
Alex Deymo10875d92014-11-10 21:52:57 -0800605 if (!test_utils::IsXAttrSupported(FilePath("/tmp"))) {
David Zeuthen910ec5b2013-09-26 12:10:58 -0700606 LOG(WARNING) << "Skipping test because /tmp does not support xattr. "
607 << "Please update your system to support this feature.";
608 return;
609 }
610
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700611 SetupDownload(1000); // starting_offset
David Zeuthen8f191b22013-08-06 12:27:50 -0700612
613 // Prepare the file with existing data before starting to write to
614 // it via DownloadAction.
615 string file_id = utils::CalculateP2PFileId("1234hash", data_.length());
616 ASSERT_TRUE(p2p_manager_->FileShare(file_id, data_.length()));
617 string existing_data;
618 for (unsigned int i = 0; i < 1000; i++)
619 existing_data += '0' + (i % 10);
620 ASSERT_EQ(WriteFile(p2p_manager_->FileGetPath(file_id), existing_data.c_str(),
621 1000), 1000);
622
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700623 StartDownload(true); // use_p2p_to_share
David Zeuthen8f191b22013-08-06 12:27:50 -0700624
625 // DownloadAction should convey the same file_id and the file should
626 // have the expected size.
627 EXPECT_EQ(download_action_->p2p_file_id(), file_id);
628 EXPECT_EQ(p2p_manager_->FileGetSize(file_id), data_.length());
629 EXPECT_EQ(p2p_manager_->FileGetExpectedSize(file_id), data_.length());
630 string p2p_file_contents;
631 // Check that the first 1000 bytes wasn't touched and that we
632 // appended the remaining as appropriate.
633 EXPECT_TRUE(ReadFileToString(p2p_manager_->FileGetPath(file_id),
634 &p2p_file_contents));
635 EXPECT_EQ(existing_data, p2p_file_contents.substr(0, 1000));
636 EXPECT_EQ(data_.substr(1000), p2p_file_contents.substr(1000));
637}
638
David Zeuthen8f191b22013-08-06 12:27:50 -0700639TEST_F(P2PDownloadActionTest, DeletePartialP2PFileIfResumingWithoutP2P) {
Alex Deymo10875d92014-11-10 21:52:57 -0800640 if (!test_utils::IsXAttrSupported(FilePath("/tmp"))) {
David Zeuthen910ec5b2013-09-26 12:10:58 -0700641 LOG(WARNING) << "Skipping test because /tmp does not support xattr. "
642 << "Please update your system to support this feature.";
643 return;
644 }
645
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700646 SetupDownload(1000); // starting_offset
David Zeuthen8f191b22013-08-06 12:27:50 -0700647
648 // Prepare the file with all existing data before starting to write
649 // to it via DownloadAction.
650 string file_id = utils::CalculateP2PFileId("1234hash", data_.length());
651 ASSERT_TRUE(p2p_manager_->FileShare(file_id, data_.length()));
652 string existing_data;
653 for (unsigned int i = 0; i < 1000; i++)
654 existing_data += '0' + (i % 10);
655 ASSERT_EQ(WriteFile(p2p_manager_->FileGetPath(file_id), existing_data.c_str(),
656 1000), 1000);
657
658 // Check that the file is there.
659 EXPECT_EQ(p2p_manager_->FileGetSize(file_id), 1000);
660 EXPECT_EQ(p2p_manager_->CountSharedFiles(), 1);
661
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700662 StartDownload(false); // use_p2p_to_share
David Zeuthen8f191b22013-08-06 12:27:50 -0700663
664 // DownloadAction should have deleted the p2p file. Check that it's gone.
665 EXPECT_EQ(p2p_manager_->FileGetSize(file_id), -1);
666 EXPECT_EQ(p2p_manager_->CountSharedFiles(), 0);
667}
668
rspangler@google.com49fdf182009-10-10 00:57:34 +0000669} // namespace chromeos_update_engine