blob: 726972dd75536e86384b6e661d6e66402be23c56 [file] [log] [blame]
Alex Deymoaea4c1c2015-08-19 20:24:43 -07001//
2// Copyright (C) 2011 The Android Open Source Project
3//
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at
7//
8// http://www.apache.org/licenses/LICENSE-2.0
9//
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15//
rspangler@google.com49fdf182009-10-10 00:57:34 +000016
Alex Deymo39910dc2015-11-09 17:04:30 -080017#include "update_engine/payload_consumer/download_action.h"
Alex Deymo8427b4a2014-11-05 14:00:32 -080018
Darin Petkov9d911fa2010-08-19 09:36:08 -070019#include <gmock/gmock.h>
rspangler@google.com49fdf182009-10-10 00:57:34 +000020#include <gtest/gtest.h>
Darin Petkov73058b42010-10-06 16:32:19 -070021
Ben Chan02f7c1d2014-10-18 15:18:02 -070022#include <memory>
David Zeuthen8f191b22013-08-06 12:27:50 -070023#include <string>
24#include <utility>
Sen Jiangba2213a2018-02-27 16:28:20 -080025#include <vector>
David Zeuthen8f191b22013-08-06 12:27:50 -070026
Alex Deymo60ca1a72015-06-18 18:19:15 -070027#include <base/bind.h>
Alex Vakulenko75039d72014-03-25 12:36:28 -070028#include <base/files/file_path.h>
Ben Chan06c76a42014-09-05 08:21:06 -070029#include <base/files/file_util.h>
Alex Deymo60ca1a72015-06-18 18:19:15 -070030#include <base/location.h>
Alex Vakulenko75039d72014-03-25 12:36:28 -070031#include <base/strings/stringprintf.h>
Amin Hassani71818c82018-03-06 13:25:40 -080032#include <brillo/bind_lambda.h>
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -070033#include <brillo/message_loops/fake_message_loop.h>
34#include <brillo/message_loops/message_loop.h>
David Zeuthen8f191b22013-08-06 12:27:50 -070035
Alex Deymo39910dc2015-11-09 17:04:30 -080036#include "update_engine/common/action_pipe.h"
37#include "update_engine/common/hash_calculator.h"
38#include "update_engine/common/mock_http_fetcher.h"
39#include "update_engine/common/mock_prefs.h"
40#include "update_engine/common/test_utils.h"
41#include "update_engine/common/utils.h"
David Zeuthen8f191b22013-08-06 12:27:50 -070042#include "update_engine/fake_p2p_manager_configuration.h"
Gilad Arnold5bb4c902014-04-10 12:32:13 -070043#include "update_engine/fake_system_state.h"
Aaron Wood9321f502017-09-07 11:18:54 -070044#include "update_engine/mock_file_writer.h"
Alex Deymo542c19b2015-12-03 07:43:31 -030045#include "update_engine/payload_consumer/mock_download_action.h"
Gilad Arnold4a0321b2014-10-28 15:57:30 -070046#include "update_engine/update_manager/fake_update_manager.h"
rspangler@google.com49fdf182009-10-10 00:57:34 +000047
48namespace chromeos_update_engine {
49
Alex Deymof329b932014-10-30 01:37:48 -070050using base::FilePath;
51using base::ReadFileToString;
52using base::WriteFile;
rspangler@google.com49fdf182009-10-10 00:57:34 +000053using std::string;
Ben Chan02f7c1d2014-10-18 15:18:02 -070054using std::unique_ptr;
Alex Deymoe5e5fe92015-10-05 09:28:19 -070055using test_utils::ScopedTempFile;
Darin Petkov9d911fa2010-08-19 09:36:08 -070056using testing::AtLeast;
57using testing::InSequence;
Gilad Arnold74b5f552014-10-07 08:17:16 -070058using testing::Return;
Aaron Wood9321f502017-09-07 11:18:54 -070059using testing::SetArgPointee;
Alex Deymof329b932014-10-30 01:37:48 -070060using testing::_;
rspangler@google.com49fdf182009-10-10 00:57:34 +000061
62class DownloadActionTest : public ::testing::Test { };
63
64namespace {
Darin Petkov9d911fa2010-08-19 09:36:08 -070065
rspangler@google.com49fdf182009-10-10 00:57:34 +000066class DownloadActionTestProcessorDelegate : public ActionProcessorDelegate {
67 public:
David Zeuthena99981f2013-04-29 13:42:47 -070068 explicit DownloadActionTestProcessorDelegate(ErrorCode expected_code)
Alex Deymo60ca1a72015-06-18 18:19:15 -070069 : processing_done_called_(false),
Darin Petkovc97435c2010-07-20 12:37:43 -070070 expected_code_(expected_code) {}
Alex Deymo610277e2014-11-11 21:18:11 -080071 ~DownloadActionTestProcessorDelegate() override {
rspangler@google.com49fdf182009-10-10 00:57:34 +000072 EXPECT_TRUE(processing_done_called_);
73 }
Yunlian Jiang35866ed2015-01-29 13:09:20 -080074 void ProcessingDone(const ActionProcessor* processor,
75 ErrorCode code) override {
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -070076 brillo::MessageLoop::current()->BreakLoop();
77 brillo::Blob found_data;
adlr@google.comc98a7ed2009-12-04 18:54:03 +000078 ASSERT_TRUE(utils::ReadFile(path_, &found_data));
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -070079 if (expected_code_ != ErrorCode::kDownloadWriteError) {
Darin Petkov9ce452b2010-11-17 14:33:28 -080080 ASSERT_EQ(expected_data_.size(), found_data.size());
81 for (unsigned i = 0; i < expected_data_.size(); i++) {
82 EXPECT_EQ(expected_data_[i], found_data[i]);
83 }
rspangler@google.com49fdf182009-10-10 00:57:34 +000084 }
85 processing_done_called_ = true;
86 }
87
Yunlian Jiang35866ed2015-01-29 13:09:20 -080088 void ActionCompleted(ActionProcessor* processor,
89 AbstractAction* action,
90 ErrorCode code) override {
Darin Petkovc97435c2010-07-20 12:37:43 -070091 const string type = action->Type();
92 if (type == DownloadAction::StaticType()) {
93 EXPECT_EQ(expected_code_, code);
94 } else {
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -070095 EXPECT_EQ(ErrorCode::kSuccess, code);
Darin Petkovc97435c2010-07-20 12:37:43 -070096 }
rspangler@google.com49fdf182009-10-10 00:57:34 +000097 }
98
rspangler@google.com49fdf182009-10-10 00:57:34 +000099 string path_;
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700100 brillo::Blob expected_data_;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000101 bool processing_done_called_;
David Zeuthena99981f2013-04-29 13:42:47 -0700102 ErrorCode expected_code_;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000103};
104
Darin Petkov9ce452b2010-11-17 14:33:28 -0800105class TestDirectFileWriter : public DirectFileWriter {
106 public:
107 TestDirectFileWriter() : fail_write_(0), current_write_(0) {}
108 void set_fail_write(int fail_write) { fail_write_ = fail_write; }
109
Don Garrette410e0f2011-11-10 15:39:01 -0800110 virtual bool Write(const void* bytes, size_t count) {
Darin Petkov9ce452b2010-11-17 14:33:28 -0800111 if (++current_write_ == fail_write_) {
Don Garrette410e0f2011-11-10 15:39:01 -0800112 return false;
Darin Petkov9ce452b2010-11-17 14:33:28 -0800113 }
114 return DirectFileWriter::Write(bytes, count);
115 }
116
117 private:
118 // If positive, fail on the |fail_write_| call to Write.
119 int fail_write_;
120 int current_write_;
121};
122
Alex Deymo60ca1a72015-06-18 18:19:15 -0700123void StartProcessorInRunLoop(ActionProcessor* processor,
124 MockHttpFetcher* http_fetcher) {
rspangler@google.com49fdf182009-10-10 00:57:34 +0000125 processor->StartProcessing();
Andrew de los Reyes34e41a12010-10-26 20:07:58 -0700126 http_fetcher->SetOffset(1);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000127}
128
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700129void TestWithData(const brillo::Blob& data,
Darin Petkov9ce452b2010-11-17 14:33:28 -0800130 int fail_write,
Darin Petkov9d911fa2010-08-19 09:36:08 -0700131 bool use_download_delegate) {
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700132 brillo::FakeMessageLoop loop(nullptr);
Alex Deymo60ca1a72015-06-18 18:19:15 -0700133 loop.SetAsCurrent();
Alex Deymo5ed695e2015-10-05 16:59:23 -0700134 FakeSystemState fake_system_state;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000135
136 // TODO(adlr): see if we need a different file for build bots
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700137 ScopedTempFile output_temp_file;
Darin Petkov9ce452b2010-11-17 14:33:28 -0800138 TestDirectFileWriter writer;
Alex Deymobffa0602016-02-12 17:16:29 -0800139 EXPECT_EQ(
140 0, writer.Open(output_temp_file.path().c_str(), O_WRONLY | O_CREAT, 0));
Darin Petkov9ce452b2010-11-17 14:33:28 -0800141 writer.set_fail_write(fail_write);
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700142
Sen Jiang5ae865b2017-04-18 14:24:40 -0700143 uint64_t size = data.size() - 1;
Alex Deymo64d98782016-02-05 18:03:48 -0800144 InstallPlan install_plan;
Sen Jiangcdd52062017-05-18 15:33:10 -0700145 install_plan.payloads.push_back(
146 {.size = size, .type = InstallPayloadType::kDelta});
Sen Jiang2703ef42017-03-16 13:36:21 -0700147 // We pull off the first byte from data and seek past it.
148 EXPECT_TRUE(HashCalculator::RawHashOfBytes(
Sen Jiang0affc2c2017-02-10 15:55:05 -0800149 &data[1], data.size() - 1, &install_plan.payloads[0].hash));
Alex Deymo5ed695e2015-10-05 16:59:23 -0700150 install_plan.source_slot = 0;
151 install_plan.target_slot = 1;
152 // We mark both slots as bootable. Only the target slot should be unbootable
153 // after the download starts.
154 fake_system_state.fake_boot_control()->SetSlotBootable(
155 install_plan.source_slot, true);
156 fake_system_state.fake_boot_control()->SetSlotBootable(
157 install_plan.target_slot, true);
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000158 ObjectFeederAction<InstallPlan> feeder_action;
159 feeder_action.set_obj(install_plan);
Alex Deymo8427b4a2014-11-05 14:00:32 -0800160 MockPrefs prefs;
Alex Vakulenkof68bbbc2015-02-09 12:53:18 -0800161 MockHttpFetcher* http_fetcher = new MockHttpFetcher(data.data(),
Andrew de los Reyes45168102010-11-22 11:13:50 -0800162 data.size(),
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700163 nullptr);
Andrew de los Reyes34e41a12010-10-26 20:07:58 -0700164 // takes ownership of passed in HttpFetcher
Alex Deymo1b3556c2016-02-03 09:54:02 -0800165 DownloadAction download_action(&prefs,
166 fake_system_state.boot_control(),
167 fake_system_state.hardware(),
168 &fake_system_state,
Amin Hassani7ecda262017-07-11 17:10:50 -0700169 http_fetcher,
170 false /* is_interactive */);
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700171 download_action.SetTestFileWriter(&writer);
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000172 BondActions(&feeder_action, &download_action);
Alex Deymo542c19b2015-12-03 07:43:31 -0300173 MockDownloadActionDelegate download_delegate;
Darin Petkov9d911fa2010-08-19 09:36:08 -0700174 if (use_download_delegate) {
175 InSequence s;
176 download_action.set_delegate(&download_delegate);
Andrew de los Reyes34e41a12010-10-26 20:07:58 -0700177 if (data.size() > kMockHttpFetcherChunkSize)
178 EXPECT_CALL(download_delegate,
Sen Jiang5ae865b2017-04-18 14:24:40 -0700179 BytesReceived(_, kMockHttpFetcherChunkSize, _));
Alex Deymo542c19b2015-12-03 07:43:31 -0300180 EXPECT_CALL(download_delegate, BytesReceived(_, _, _)).Times(AtLeast(1));
Darin Petkov9d911fa2010-08-19 09:36:08 -0700181 }
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700182 ErrorCode expected_code = ErrorCode::kSuccess;
Darin Petkov7ed561b2011-10-04 02:59:03 -0700183 if (fail_write > 0)
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700184 expected_code = ErrorCode::kDownloadWriteError;
Darin Petkov50332f12010-09-24 11:44:47 -0700185 DownloadActionTestProcessorDelegate delegate(expected_code);
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700186 delegate.expected_data_ = brillo::Blob(data.begin() + 1, data.end());
Alex Deymobffa0602016-02-12 17:16:29 -0800187 delegate.path_ = output_temp_file.path();
rspangler@google.com49fdf182009-10-10 00:57:34 +0000188 ActionProcessor processor;
189 processor.set_delegate(&delegate);
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000190 processor.EnqueueAction(&feeder_action);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000191 processor.EnqueueAction(&download_action);
192
Alex Deymo60ca1a72015-06-18 18:19:15 -0700193 loop.PostTask(FROM_HERE,
194 base::Bind(&StartProcessorInRunLoop, &processor, http_fetcher));
195 loop.Run();
196 EXPECT_FALSE(loop.PendingTasks());
Alex Deymo5ed695e2015-10-05 16:59:23 -0700197
198 EXPECT_TRUE(fake_system_state.fake_boot_control()->IsSlotBootable(
199 install_plan.source_slot));
200 EXPECT_FALSE(fake_system_state.fake_boot_control()->IsSlotBootable(
201 install_plan.target_slot));
rspangler@google.com49fdf182009-10-10 00:57:34 +0000202}
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700203} // namespace
rspangler@google.com49fdf182009-10-10 00:57:34 +0000204
205TEST(DownloadActionTest, SimpleTest) {
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700206 brillo::Blob small;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000207 const char* foo = "foo";
208 small.insert(small.end(), foo, foo + strlen(foo));
Darin Petkov50332f12010-09-24 11:44:47 -0700209 TestWithData(small,
Darin Petkov9ce452b2010-11-17 14:33:28 -0800210 0, // fail_write
Darin Petkov50332f12010-09-24 11:44:47 -0700211 true); // use_download_delegate
rspangler@google.com49fdf182009-10-10 00:57:34 +0000212}
213
214TEST(DownloadActionTest, LargeTest) {
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700215 brillo::Blob big(5 * kMockHttpFetcherChunkSize);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000216 char c = '0';
217 for (unsigned int i = 0; i < big.size(); i++) {
218 big[i] = c;
Darin Petkov9ce452b2010-11-17 14:33:28 -0800219 c = ('9' == c) ? '0' : c + 1;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000220 }
Darin Petkov50332f12010-09-24 11:44:47 -0700221 TestWithData(big,
Darin Petkov9ce452b2010-11-17 14:33:28 -0800222 0, // fail_write
223 true); // use_download_delegate
224}
225
226TEST(DownloadActionTest, FailWriteTest) {
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700227 brillo::Blob big(5 * kMockHttpFetcherChunkSize);
Darin Petkov9ce452b2010-11-17 14:33:28 -0800228 char c = '0';
229 for (unsigned int i = 0; i < big.size(); i++) {
230 big[i] = c;
231 c = ('9' == c) ? '0' : c + 1;
232 }
233 TestWithData(big,
Darin Petkov9ce452b2010-11-17 14:33:28 -0800234 2, // fail_write
Darin Petkov50332f12010-09-24 11:44:47 -0700235 true); // use_download_delegate
Darin Petkovc97435c2010-07-20 12:37:43 -0700236}
237
Darin Petkov9d911fa2010-08-19 09:36:08 -0700238TEST(DownloadActionTest, NoDownloadDelegateTest) {
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700239 brillo::Blob small;
Darin Petkov9d911fa2010-08-19 09:36:08 -0700240 const char* foo = "foofoo";
241 small.insert(small.end(), foo, foo + strlen(foo));
Darin Petkov50332f12010-09-24 11:44:47 -0700242 TestWithData(small,
Darin Petkov9ce452b2010-11-17 14:33:28 -0800243 0, // fail_write
Darin Petkov50332f12010-09-24 11:44:47 -0700244 false); // use_download_delegate
rspangler@google.com49fdf182009-10-10 00:57:34 +0000245}
246
Aaron Wood9321f502017-09-07 11:18:54 -0700247TEST(DownloadActionTest, MultiPayloadProgressTest) {
248 std::vector<brillo::Blob> payload_datas;
249 // the first payload must be the largest, as it's the actual payload used by
250 // the MockHttpFetcher for all downloaded data.
251 payload_datas.emplace_back(4 * kMockHttpFetcherChunkSize + 256);
252 payload_datas.emplace_back(2 * kMockHttpFetcherChunkSize);
253 brillo::FakeMessageLoop loop(nullptr);
254 loop.SetAsCurrent();
255 FakeSystemState fake_system_state;
256 EXPECT_CALL(*fake_system_state.mock_payload_state(), NextPayload())
257 .WillOnce(Return(true));
258
259 MockFileWriter mock_file_writer;
260 EXPECT_CALL(mock_file_writer, Close()).WillRepeatedly(Return(0));
261 EXPECT_CALL(mock_file_writer, Write(_, _, _))
262 .WillRepeatedly(
263 DoAll(SetArgPointee<2>(ErrorCode::kSuccess), Return(true)));
264
265 InstallPlan install_plan;
266 uint64_t total_expected_download_size{0};
267 for (const auto& data : payload_datas) {
268 uint64_t size = data.size();
269 install_plan.payloads.push_back(
270 {.size = size, .type = InstallPayloadType::kFull});
271 total_expected_download_size += size;
272 }
273 ObjectFeederAction<InstallPlan> feeder_action;
274 feeder_action.set_obj(install_plan);
275 MockPrefs prefs;
276 MockHttpFetcher* http_fetcher = new MockHttpFetcher(
277 payload_datas[0].data(), payload_datas[0].size(), nullptr);
278 // takes ownership of passed in HttpFetcher
279 DownloadAction download_action(&prefs,
280 fake_system_state.boot_control(),
281 fake_system_state.hardware(),
282 &fake_system_state,
Sen Jiang18414082018-01-11 14:50:36 -0800283 http_fetcher,
284 false /* is_interactive */);
Aaron Wood9321f502017-09-07 11:18:54 -0700285 download_action.SetTestFileWriter(&mock_file_writer);
286 BondActions(&feeder_action, &download_action);
287 MockDownloadActionDelegate download_delegate;
288 {
289 InSequence s;
290 download_action.set_delegate(&download_delegate);
291 // these are hand-computed based on the payloads specified above
292 EXPECT_CALL(download_delegate,
293 BytesReceived(kMockHttpFetcherChunkSize,
294 kMockHttpFetcherChunkSize,
295 total_expected_download_size));
296 EXPECT_CALL(download_delegate,
297 BytesReceived(kMockHttpFetcherChunkSize,
298 kMockHttpFetcherChunkSize * 2,
299 total_expected_download_size));
300 EXPECT_CALL(download_delegate,
301 BytesReceived(kMockHttpFetcherChunkSize,
302 kMockHttpFetcherChunkSize * 3,
303 total_expected_download_size));
304 EXPECT_CALL(download_delegate,
305 BytesReceived(kMockHttpFetcherChunkSize,
306 kMockHttpFetcherChunkSize * 4,
307 total_expected_download_size));
308 EXPECT_CALL(download_delegate,
309 BytesReceived(256,
310 kMockHttpFetcherChunkSize * 4 + 256,
311 total_expected_download_size));
312 EXPECT_CALL(download_delegate,
313 BytesReceived(kMockHttpFetcherChunkSize,
314 kMockHttpFetcherChunkSize * 5 + 256,
315 total_expected_download_size));
316 EXPECT_CALL(download_delegate,
317 BytesReceived(kMockHttpFetcherChunkSize,
318 total_expected_download_size,
319 total_expected_download_size));
320 }
321 ActionProcessor processor;
322 processor.EnqueueAction(&feeder_action);
323 processor.EnqueueAction(&download_action);
324
325 loop.PostTask(
326 FROM_HERE,
327 base::Bind(
328 [](ActionProcessor* processor) { processor->StartProcessing(); },
329 base::Unretained(&processor)));
330 loop.Run();
331 EXPECT_FALSE(loop.PendingTasks());
332}
333
rspangler@google.com49fdf182009-10-10 00:57:34 +0000334namespace {
335class TerminateEarlyTestProcessorDelegate : public ActionProcessorDelegate {
336 public:
337 void ProcessingStopped(const ActionProcessor* processor) {
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700338 brillo::MessageLoop::current()->BreakLoop();
rspangler@google.com49fdf182009-10-10 00:57:34 +0000339 }
rspangler@google.com49fdf182009-10-10 00:57:34 +0000340};
341
Alex Deymo60ca1a72015-06-18 18:19:15 -0700342void TerminateEarlyTestStarter(ActionProcessor* processor) {
rspangler@google.com49fdf182009-10-10 00:57:34 +0000343 processor->StartProcessing();
344 CHECK(processor->IsRunning());
345 processor->StopProcessing();
rspangler@google.com49fdf182009-10-10 00:57:34 +0000346}
347
Darin Petkov9d911fa2010-08-19 09:36:08 -0700348void TestTerminateEarly(bool use_download_delegate) {
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700349 brillo::FakeMessageLoop loop(nullptr);
Alex Deymo60ca1a72015-06-18 18:19:15 -0700350 loop.SetAsCurrent();
rspangler@google.com49fdf182009-10-10 00:57:34 +0000351
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700352 brillo::Blob data(kMockHttpFetcherChunkSize +
Alex Vakulenkof68bbbc2015-02-09 12:53:18 -0800353 kMockHttpFetcherChunkSize / 2);
354 memset(data.data(), 0, data.size());
rspangler@google.com49fdf182009-10-10 00:57:34 +0000355
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700356 ScopedTempFile temp_file;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000357 {
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700358 DirectFileWriter writer;
Alex Deymobffa0602016-02-12 17:16:29 -0800359 EXPECT_EQ(0, writer.Open(temp_file.path().c_str(), O_WRONLY | O_CREAT, 0));
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700360
rspangler@google.com49fdf182009-10-10 00:57:34 +0000361 // takes ownership of passed in HttpFetcher
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000362 ObjectFeederAction<InstallPlan> feeder_action;
Alex Deymo64d98782016-02-05 18:03:48 -0800363 InstallPlan install_plan;
Sen Jiang0affc2c2017-02-10 15:55:05 -0800364 install_plan.payloads.resize(1);
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000365 feeder_action.set_obj(install_plan);
Alex Deymo5ed695e2015-10-05 16:59:23 -0700366 FakeSystemState fake_system_state_;
Alex Deymo8427b4a2014-11-05 14:00:32 -0800367 MockPrefs prefs;
Alex Deymo1b3556c2016-02-03 09:54:02 -0800368 DownloadAction download_action(
369 &prefs,
370 fake_system_state_.boot_control(),
371 fake_system_state_.hardware(),
372 &fake_system_state_,
Amin Hassani7ecda262017-07-11 17:10:50 -0700373 new MockHttpFetcher(data.data(), data.size(), nullptr),
374 false /* is_interactive */);
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700375 download_action.SetTestFileWriter(&writer);
Alex Deymo542c19b2015-12-03 07:43:31 -0300376 MockDownloadActionDelegate download_delegate;
Darin Petkov9d911fa2010-08-19 09:36:08 -0700377 if (use_download_delegate) {
Darin Petkov9d911fa2010-08-19 09:36:08 -0700378 download_action.set_delegate(&download_delegate);
Alex Deymo542c19b2015-12-03 07:43:31 -0300379 EXPECT_CALL(download_delegate, BytesReceived(_, _, _)).Times(0);
Darin Petkov9d911fa2010-08-19 09:36:08 -0700380 }
rspangler@google.com49fdf182009-10-10 00:57:34 +0000381 TerminateEarlyTestProcessorDelegate delegate;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000382 ActionProcessor processor;
383 processor.set_delegate(&delegate);
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000384 processor.EnqueueAction(&feeder_action);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000385 processor.EnqueueAction(&download_action);
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000386 BondActions(&feeder_action, &download_action);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000387
Alex Deymo60ca1a72015-06-18 18:19:15 -0700388 loop.PostTask(FROM_HERE,
389 base::Bind(&TerminateEarlyTestStarter, &processor));
390 loop.Run();
391 EXPECT_FALSE(loop.PendingTasks());
rspangler@google.com49fdf182009-10-10 00:57:34 +0000392 }
393
394 // 1 or 0 chunks should have come through
Alex Deymobffa0602016-02-12 17:16:29 -0800395 const off_t resulting_file_size(utils::FileSize(temp_file.path()));
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700396 EXPECT_GE(resulting_file_size, 0);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000397 if (resulting_file_size != 0)
Alex Deymo5fe0c4e2016-02-16 18:46:24 -0800398 EXPECT_EQ(kMockHttpFetcherChunkSize,
399 static_cast<size_t>(resulting_file_size));
rspangler@google.com49fdf182009-10-10 00:57:34 +0000400}
401
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700402} // namespace
Darin Petkov9d911fa2010-08-19 09:36:08 -0700403
404TEST(DownloadActionTest, TerminateEarlyTest) {
405 TestTerminateEarly(true);
406}
407
408TEST(DownloadActionTest, TerminateEarlyNoDownloadDelegateTest) {
409 TestTerminateEarly(false);
410}
411
rspangler@google.com49fdf182009-10-10 00:57:34 +0000412class DownloadActionTestAction;
413
414template<>
415class ActionTraits<DownloadActionTestAction> {
416 public:
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000417 typedef InstallPlan OutputObjectType;
418 typedef InstallPlan InputObjectType;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000419};
420
421// This is a simple Action class for testing.
Yunlian Jiang2dac5762013-04-12 09:53:09 -0700422class DownloadActionTestAction : public Action<DownloadActionTestAction> {
423 public:
rspangler@google.com49fdf182009-10-10 00:57:34 +0000424 DownloadActionTestAction() : did_run_(false) {}
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000425 typedef InstallPlan InputObjectType;
426 typedef InstallPlan OutputObjectType;
427 ActionPipe<InstallPlan>* in_pipe() { return in_pipe_.get(); }
428 ActionPipe<InstallPlan>* out_pipe() { return out_pipe_.get(); }
rspangler@google.com49fdf182009-10-10 00:57:34 +0000429 ActionProcessor* processor() { return processor_; }
430 void PerformAction() {
431 did_run_ = true;
432 ASSERT_TRUE(HasInputObject());
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000433 EXPECT_TRUE(expected_input_object_ == GetInputObject());
rspangler@google.com49fdf182009-10-10 00:57:34 +0000434 ASSERT_TRUE(processor());
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700435 processor()->ActionComplete(this, ErrorCode::kSuccess);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000436 }
437 string Type() const { return "DownloadActionTestAction"; }
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000438 InstallPlan expected_input_object_;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000439 bool did_run_;
440};
441
442namespace {
443// This class is an ActionProcessorDelegate that simply terminates the
444// run loop when the ActionProcessor has completed processing. It's used
445// only by the test PassObjectOutTest.
446class PassObjectOutTestProcessorDelegate : public ActionProcessorDelegate {
447 public:
David Zeuthena99981f2013-04-29 13:42:47 -0700448 void ProcessingDone(const ActionProcessor* processor, ErrorCode code) {
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700449 brillo::MessageLoop::current()->BreakLoop();
rspangler@google.com49fdf182009-10-10 00:57:34 +0000450 }
rspangler@google.com49fdf182009-10-10 00:57:34 +0000451};
452
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700453} // namespace
rspangler@google.com49fdf182009-10-10 00:57:34 +0000454
455TEST(DownloadActionTest, PassObjectOutTest) {
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700456 brillo::FakeMessageLoop loop(nullptr);
Alex Deymo60ca1a72015-06-18 18:19:15 -0700457 loop.SetAsCurrent();
rspangler@google.com49fdf182009-10-10 00:57:34 +0000458
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700459 DirectFileWriter writer;
Alex Deymoe5e5fe92015-10-05 09:28:19 -0700460 EXPECT_EQ(0, writer.Open("/dev/null", O_WRONLY | O_CREAT, 0));
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700461
rspangler@google.com49fdf182009-10-10 00:57:34 +0000462 // takes ownership of passed in HttpFetcher
Alex Deymo64d98782016-02-05 18:03:48 -0800463 InstallPlan install_plan;
Sen Jiang0affc2c2017-02-10 15:55:05 -0800464 install_plan.payloads.push_back({.size = 1});
465 EXPECT_TRUE(
466 HashCalculator::RawHashOfData({'x'}, &install_plan.payloads[0].hash));
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000467 ObjectFeederAction<InstallPlan> feeder_action;
468 feeder_action.set_obj(install_plan);
Alex Deymo8427b4a2014-11-05 14:00:32 -0800469 MockPrefs prefs;
Alex Deymo5ed695e2015-10-05 16:59:23 -0700470 FakeSystemState fake_system_state_;
Alex Deymo1b3556c2016-02-03 09:54:02 -0800471 DownloadAction download_action(&prefs,
472 fake_system_state_.boot_control(),
473 fake_system_state_.hardware(),
474 &fake_system_state_,
Amin Hassani7ecda262017-07-11 17:10:50 -0700475 new MockHttpFetcher("x", 1, nullptr),
476 false /* is_interactive */);
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700477 download_action.SetTestFileWriter(&writer);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000478
479 DownloadActionTestAction test_action;
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000480 test_action.expected_input_object_ = install_plan;
481 BondActions(&feeder_action, &download_action);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000482 BondActions(&download_action, &test_action);
483
484 ActionProcessor processor;
485 PassObjectOutTestProcessorDelegate delegate;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000486 processor.set_delegate(&delegate);
adlr@google.comc98a7ed2009-12-04 18:54:03 +0000487 processor.EnqueueAction(&feeder_action);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000488 processor.EnqueueAction(&download_action);
489 processor.EnqueueAction(&test_action);
490
Luis Hector Chavezf1cf3482016-07-19 14:29:19 -0700491 loop.PostTask(
492 FROM_HERE,
493 base::Bind(
494 [](ActionProcessor* processor) { processor->StartProcessing(); },
495 base::Unretained(&processor)));
Alex Deymo60ca1a72015-06-18 18:19:15 -0700496 loop.Run();
497 EXPECT_FALSE(loop.PendingTasks());
rspangler@google.com49fdf182009-10-10 00:57:34 +0000498
499 EXPECT_EQ(true, test_action.did_run_);
500}
501
David Zeuthen8f191b22013-08-06 12:27:50 -0700502// Test fixture for P2P tests.
503class P2PDownloadActionTest : public testing::Test {
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700504 protected:
David Zeuthen8f191b22013-08-06 12:27:50 -0700505 P2PDownloadActionTest()
Alex Deymo60ca1a72015-06-18 18:19:15 -0700506 : start_at_offset_(0),
Gilad Arnold4a0321b2014-10-28 15:57:30 -0700507 fake_um_(fake_system_state_.fake_clock()) {}
David Zeuthen8f191b22013-08-06 12:27:50 -0700508
Alex Deymo610277e2014-11-11 21:18:11 -0800509 ~P2PDownloadActionTest() override {}
David Zeuthen8f191b22013-08-06 12:27:50 -0700510
511 // Derived from testing::Test.
Alex Deymo610277e2014-11-11 21:18:11 -0800512 void SetUp() override {
Alex Deymo60ca1a72015-06-18 18:19:15 -0700513 loop_.SetAsCurrent();
David Zeuthen8f191b22013-08-06 12:27:50 -0700514 }
515
516 // Derived from testing::Test.
Alex Deymo610277e2014-11-11 21:18:11 -0800517 void TearDown() override {
Alex Deymo60ca1a72015-06-18 18:19:15 -0700518 EXPECT_FALSE(loop_.PendingTasks());
David Zeuthen8f191b22013-08-06 12:27:50 -0700519 }
520
521 // To be called by tests to setup the download. The
522 // |starting_offset| parameter is for where to resume.
523 void SetupDownload(off_t starting_offset) {
524 start_at_offset_ = starting_offset;
525 // Prepare data 10 kB of data.
526 data_.clear();
527 for (unsigned int i = 0; i < 10 * 1000; i++)
528 data_ += 'a' + (i % 25);
529
530 // Setup p2p.
531 FakeP2PManagerConfiguration *test_conf = new FakeP2PManagerConfiguration();
David Zeuthen41f2cf52014-11-05 12:29:45 -0500532 p2p_manager_.reset(P2PManager::Construct(
Gilad Arnold4a0321b2014-10-28 15:57:30 -0700533 test_conf, nullptr, &fake_um_, "cros_au", 3,
David Zeuthen41f2cf52014-11-05 12:29:45 -0500534 base::TimeDelta::FromDays(5)));
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700535 fake_system_state_.set_p2p_manager(p2p_manager_.get());
David Zeuthen8f191b22013-08-06 12:27:50 -0700536 }
537
538 // To be called by tests to perform the download. The
539 // |use_p2p_to_share| parameter is used to indicate whether the
540 // payload should be shared via p2p.
541 void StartDownload(bool use_p2p_to_share) {
Gilad Arnold74b5f552014-10-07 08:17:16 -0700542 EXPECT_CALL(*fake_system_state_.mock_payload_state(),
543 GetUsingP2PForSharing())
544 .WillRepeatedly(Return(use_p2p_to_share));
David Zeuthen8f191b22013-08-06 12:27:50 -0700545
546 ScopedTempFile output_temp_file;
547 TestDirectFileWriter writer;
Alex Deymobffa0602016-02-12 17:16:29 -0800548 EXPECT_EQ(
549 0, writer.Open(output_temp_file.path().c_str(), O_WRONLY | O_CREAT, 0));
Alex Deymo64d98782016-02-05 18:03:48 -0800550 InstallPlan install_plan;
Sen Jiang0affc2c2017-02-10 15:55:05 -0800551 install_plan.payloads.push_back(
552 {.size = data_.length(),
553 .hash = {'1', '2', '3', '4', 'h', 'a', 's', 'h'}});
David Zeuthen8f191b22013-08-06 12:27:50 -0700554 ObjectFeederAction<InstallPlan> feeder_action;
555 feeder_action.set_obj(install_plan);
Alex Deymo8427b4a2014-11-05 14:00:32 -0800556 MockPrefs prefs;
David Zeuthen8f191b22013-08-06 12:27:50 -0700557 http_fetcher_ = new MockHttpFetcher(data_.c_str(),
558 data_.length(),
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700559 nullptr);
David Zeuthen8f191b22013-08-06 12:27:50 -0700560 // Note that DownloadAction takes ownership of the passed in HttpFetcher.
Alex Deymo1b3556c2016-02-03 09:54:02 -0800561 download_action_.reset(new DownloadAction(&prefs,
562 fake_system_state_.boot_control(),
563 fake_system_state_.hardware(),
564 &fake_system_state_,
Amin Hassani7ecda262017-07-11 17:10:50 -0700565 http_fetcher_,
566 false /* is_interactive */));
David Zeuthen8f191b22013-08-06 12:27:50 -0700567 download_action_->SetTestFileWriter(&writer);
568 BondActions(&feeder_action, download_action_.get());
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700569 DownloadActionTestProcessorDelegate delegate(ErrorCode::kSuccess);
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700570 delegate.expected_data_ = brillo::Blob(data_.begin() + start_at_offset_,
571 data_.end());
Alex Deymobffa0602016-02-12 17:16:29 -0800572 delegate.path_ = output_temp_file.path();
David Zeuthen8f191b22013-08-06 12:27:50 -0700573 processor_.set_delegate(&delegate);
574 processor_.EnqueueAction(&feeder_action);
575 processor_.EnqueueAction(download_action_.get());
576
Alex Deymo60ca1a72015-06-18 18:19:15 -0700577 loop_.PostTask(FROM_HERE, base::Bind(
578 &P2PDownloadActionTest::StartProcessorInRunLoopForP2P,
579 base::Unretained(this)));
580 loop_.Run();
David Zeuthen8f191b22013-08-06 12:27:50 -0700581 }
582
Alex Deymo60ca1a72015-06-18 18:19:15 -0700583 // Mainloop used to make StartDownload() synchronous.
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700584 brillo::FakeMessageLoop loop_{nullptr};
Alex Deymo60ca1a72015-06-18 18:19:15 -0700585
David Zeuthen8f191b22013-08-06 12:27:50 -0700586 // The DownloadAction instance under test.
Ben Chan02f7c1d2014-10-18 15:18:02 -0700587 unique_ptr<DownloadAction> download_action_;
David Zeuthen8f191b22013-08-06 12:27:50 -0700588
589 // The HttpFetcher used in the test.
590 MockHttpFetcher* http_fetcher_;
591
592 // The P2PManager used in the test.
Ben Chan02f7c1d2014-10-18 15:18:02 -0700593 unique_ptr<P2PManager> p2p_manager_;
David Zeuthen8f191b22013-08-06 12:27:50 -0700594
595 // The ActionProcessor used for running the actions.
596 ActionProcessor processor_;
597
598 // A fake system state.
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700599 FakeSystemState fake_system_state_;
David Zeuthen8f191b22013-08-06 12:27:50 -0700600
601 // The data being downloaded.
602 string data_;
603
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700604 private:
David Zeuthen8f191b22013-08-06 12:27:50 -0700605 // Callback used in StartDownload() method.
Alex Deymo60ca1a72015-06-18 18:19:15 -0700606 void StartProcessorInRunLoopForP2P() {
607 processor_.StartProcessing();
Sen Jiangba2213a2018-02-27 16:28:20 -0800608 download_action_->http_fetcher()->SetOffset(start_at_offset_);
David Zeuthen8f191b22013-08-06 12:27:50 -0700609 }
610
David Zeuthen8f191b22013-08-06 12:27:50 -0700611 // The requested starting offset passed to SetupDownload().
612 off_t start_at_offset_;
Gilad Arnold4a0321b2014-10-28 15:57:30 -0700613
614 chromeos_update_manager::FakeUpdateManager fake_um_;
David Zeuthen8f191b22013-08-06 12:27:50 -0700615};
616
617TEST_F(P2PDownloadActionTest, IsWrittenTo) {
Alex Deymo10875d92014-11-10 21:52:57 -0800618 if (!test_utils::IsXAttrSupported(FilePath("/tmp"))) {
David Zeuthen910ec5b2013-09-26 12:10:58 -0700619 LOG(WARNING) << "Skipping test because /tmp does not support xattr. "
620 << "Please update your system to support this feature.";
621 return;
622 }
623
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700624 SetupDownload(0); // starting_offset
625 StartDownload(true); // use_p2p_to_share
David Zeuthen8f191b22013-08-06 12:27:50 -0700626
627 // Check the p2p file and its content matches what was sent.
628 string file_id = download_action_->p2p_file_id();
Gilad Arnold74b5f552014-10-07 08:17:16 -0700629 EXPECT_NE("", file_id);
Alex Deymo80f70ff2016-02-10 16:08:11 -0800630 EXPECT_EQ(static_cast<int>(data_.length()),
631 p2p_manager_->FileGetSize(file_id));
632 EXPECT_EQ(static_cast<int>(data_.length()),
633 p2p_manager_->FileGetExpectedSize(file_id));
David Zeuthen8f191b22013-08-06 12:27:50 -0700634 string p2p_file_contents;
635 EXPECT_TRUE(ReadFileToString(p2p_manager_->FileGetPath(file_id),
636 &p2p_file_contents));
637 EXPECT_EQ(data_, p2p_file_contents);
638}
639
640TEST_F(P2PDownloadActionTest, DeleteIfHoleExists) {
Alex Deymo10875d92014-11-10 21:52:57 -0800641 if (!test_utils::IsXAttrSupported(FilePath("/tmp"))) {
David Zeuthen910ec5b2013-09-26 12:10:58 -0700642 LOG(WARNING) << "Skipping test because /tmp does not support xattr. "
643 << "Please update your system to support this feature.";
644 return;
645 }
646
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700647 SetupDownload(1000); // starting_offset
648 StartDownload(true); // use_p2p_to_share
David Zeuthen8f191b22013-08-06 12:27:50 -0700649
650 // DownloadAction should convey that the file is not being shared.
651 // and that we don't have any p2p files.
652 EXPECT_EQ(download_action_->p2p_file_id(), "");
653 EXPECT_EQ(p2p_manager_->CountSharedFiles(), 0);
654}
655
656TEST_F(P2PDownloadActionTest, CanAppend) {
Alex Deymo10875d92014-11-10 21:52:57 -0800657 if (!test_utils::IsXAttrSupported(FilePath("/tmp"))) {
David Zeuthen910ec5b2013-09-26 12:10:58 -0700658 LOG(WARNING) << "Skipping test because /tmp does not support xattr. "
659 << "Please update your system to support this feature.";
660 return;
661 }
662
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700663 SetupDownload(1000); // starting_offset
David Zeuthen8f191b22013-08-06 12:27:50 -0700664
665 // Prepare the file with existing data before starting to write to
666 // it via DownloadAction.
Sen Jiang2703ef42017-03-16 13:36:21 -0700667 string file_id = utils::CalculateP2PFileId(
668 {'1', '2', '3', '4', 'h', 'a', 's', 'h'}, data_.length());
David Zeuthen8f191b22013-08-06 12:27:50 -0700669 ASSERT_TRUE(p2p_manager_->FileShare(file_id, data_.length()));
670 string existing_data;
671 for (unsigned int i = 0; i < 1000; i++)
672 existing_data += '0' + (i % 10);
673 ASSERT_EQ(WriteFile(p2p_manager_->FileGetPath(file_id), existing_data.c_str(),
674 1000), 1000);
675
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700676 StartDownload(true); // use_p2p_to_share
David Zeuthen8f191b22013-08-06 12:27:50 -0700677
678 // DownloadAction should convey the same file_id and the file should
679 // have the expected size.
680 EXPECT_EQ(download_action_->p2p_file_id(), file_id);
Alex Deymo80f70ff2016-02-10 16:08:11 -0800681 EXPECT_EQ(static_cast<ssize_t>(data_.length()),
682 p2p_manager_->FileGetSize(file_id));
683 EXPECT_EQ(static_cast<ssize_t>(data_.length()),
684 p2p_manager_->FileGetExpectedSize(file_id));
David Zeuthen8f191b22013-08-06 12:27:50 -0700685 string p2p_file_contents;
686 // Check that the first 1000 bytes wasn't touched and that we
687 // appended the remaining as appropriate.
688 EXPECT_TRUE(ReadFileToString(p2p_manager_->FileGetPath(file_id),
689 &p2p_file_contents));
690 EXPECT_EQ(existing_data, p2p_file_contents.substr(0, 1000));
691 EXPECT_EQ(data_.substr(1000), p2p_file_contents.substr(1000));
692}
693
David Zeuthen8f191b22013-08-06 12:27:50 -0700694TEST_F(P2PDownloadActionTest, DeletePartialP2PFileIfResumingWithoutP2P) {
Alex Deymo10875d92014-11-10 21:52:57 -0800695 if (!test_utils::IsXAttrSupported(FilePath("/tmp"))) {
David Zeuthen910ec5b2013-09-26 12:10:58 -0700696 LOG(WARNING) << "Skipping test because /tmp does not support xattr. "
697 << "Please update your system to support this feature.";
698 return;
699 }
700
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700701 SetupDownload(1000); // starting_offset
David Zeuthen8f191b22013-08-06 12:27:50 -0700702
703 // Prepare the file with all existing data before starting to write
704 // to it via DownloadAction.
Sen Jiang2703ef42017-03-16 13:36:21 -0700705 string file_id = utils::CalculateP2PFileId(
706 {'1', '2', '3', '4', 'h', 'a', 's', 'h'}, data_.length());
David Zeuthen8f191b22013-08-06 12:27:50 -0700707 ASSERT_TRUE(p2p_manager_->FileShare(file_id, data_.length()));
708 string existing_data;
709 for (unsigned int i = 0; i < 1000; i++)
710 existing_data += '0' + (i % 10);
711 ASSERT_EQ(WriteFile(p2p_manager_->FileGetPath(file_id), existing_data.c_str(),
712 1000), 1000);
713
714 // Check that the file is there.
Alex Deymo80f70ff2016-02-10 16:08:11 -0800715 EXPECT_EQ(1000, p2p_manager_->FileGetSize(file_id));
716 EXPECT_EQ(1, p2p_manager_->CountSharedFiles());
David Zeuthen8f191b22013-08-06 12:27:50 -0700717
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700718 StartDownload(false); // use_p2p_to_share
David Zeuthen8f191b22013-08-06 12:27:50 -0700719
720 // DownloadAction should have deleted the p2p file. Check that it's gone.
Alex Deymo80f70ff2016-02-10 16:08:11 -0800721 EXPECT_EQ(-1, p2p_manager_->FileGetSize(file_id));
722 EXPECT_EQ(0, p2p_manager_->CountSharedFiles());
David Zeuthen8f191b22013-08-06 12:27:50 -0700723}
724
rspangler@google.com49fdf182009-10-10 00:57:34 +0000725} // namespace chromeos_update_engine