blob: 52da3751839b51fcae6f5bfc7a7a63a207fb49f5 [file] [log] [blame]
Alex Deymoaea4c1c2015-08-19 20:24:43 -07001//
2// Copyright (C) 2011 The Android Open Source Project
3//
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at
7//
8// http://www.apache.org/licenses/LICENSE-2.0
9//
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15//
adlr@google.com3defe6a2009-12-04 20:57:17 +000016
Alex Deymoaab50e32014-11-10 19:55:35 -080017#include "update_engine/omaha_response_handler_action.h"
18
adlr@google.com3defe6a2009-12-04 20:57:17 +000019#include <string>
Darin Petkov73058b42010-10-06 16:32:19 -070020
adlr@google.com3defe6a2009-12-04 20:57:17 +000021#include <gtest/gtest.h>
Darin Petkov73058b42010-10-06 16:32:19 -070022
Jay Srinivasand29695d2013-04-08 15:08:05 -070023#include "update_engine/constants.h"
Gilad Arnold5bb4c902014-04-10 12:32:13 -070024#include "update_engine/fake_system_state.h"
Gilad Arnold74b5f552014-10-07 08:17:16 -070025#include "update_engine/mock_payload_state.h"
Sen Jiang70a6ab02015-08-28 13:23:27 -070026#include "update_engine/payload_constants.h"
Alex Deymoac41a822015-09-15 20:52:53 -070027#include "update_engine/platform_constants.h"
adlr@google.com3defe6a2009-12-04 20:57:17 +000028#include "update_engine/test_utils.h"
29#include "update_engine/utils.h"
30
Alex Deymo10875d92014-11-10 21:52:57 -080031using chromeos_update_engine::test_utils::System;
32using chromeos_update_engine::test_utils::WriteFileString;
adlr@google.com3defe6a2009-12-04 20:57:17 +000033using std::string;
Darin Petkov73058b42010-10-06 16:32:19 -070034using testing::Return;
adlr@google.com3defe6a2009-12-04 20:57:17 +000035
36namespace chromeos_update_engine {
37
38class OmahaResponseHandlerActionTest : public ::testing::Test {
Alex Deymo763e7db2015-08-27 21:08:08 -070039 protected:
40 void SetUp() override {
41 FakeBootControl* fake_boot_control = fake_system_state_.fake_boot_control();
42 fake_boot_control->SetPartitionDevice(
43 kLegacyPartitionNameKernel, 0, "/dev/sdz2");
44 fake_boot_control->SetPartitionDevice(
45 kLegacyPartitionNameRoot, 0, "/dev/sdz3");
46 fake_boot_control->SetPartitionDevice(
47 kLegacyPartitionNameKernel, 1, "/dev/sdz4");
48 fake_boot_control->SetPartitionDevice(
49 kLegacyPartitionNameRoot, 1, "/dev/sdz5");
50 }
51
adlr@google.com3defe6a2009-12-04 20:57:17 +000052 // Return true iff the OmahaResponseHandlerAction succeeded.
Alex Vakulenko88b591f2014-08-28 16:48:57 -070053 // If out is non-null, it's set w/ the response from the action.
Darin Petkov6a5b3222010-07-13 14:55:28 -070054 bool DoTest(const OmahaResponse& in,
Gilad Arnold4dbd47e2013-07-22 05:39:26 -070055 const string& deadline_file,
adlr@google.com3defe6a2009-12-04 20:57:17 +000056 InstallPlan* out);
Alex Deymo763e7db2015-08-27 21:08:08 -070057
58 FakeSystemState fake_system_state_;
adlr@google.com3defe6a2009-12-04 20:57:17 +000059};
60
61class OmahaResponseHandlerActionProcessorDelegate
62 : public ActionProcessorDelegate {
63 public:
64 OmahaResponseHandlerActionProcessorDelegate()
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -070065 : code_(ErrorCode::kError),
Darin Petkovc1a8b422010-07-19 11:34:49 -070066 code_set_(false) {}
adlr@google.com3defe6a2009-12-04 20:57:17 +000067 void ActionCompleted(ActionProcessor* processor,
68 AbstractAction* action,
David Zeuthena99981f2013-04-29 13:42:47 -070069 ErrorCode code) {
adlr@google.com3defe6a2009-12-04 20:57:17 +000070 if (action->Type() == OmahaResponseHandlerAction::StaticType()) {
Darin Petkovc1a8b422010-07-19 11:34:49 -070071 code_ = code;
72 code_set_ = true;
adlr@google.com3defe6a2009-12-04 20:57:17 +000073 }
74 }
David Zeuthena99981f2013-04-29 13:42:47 -070075 ErrorCode code_;
Darin Petkovc1a8b422010-07-19 11:34:49 -070076 bool code_set_;
adlr@google.com3defe6a2009-12-04 20:57:17 +000077};
78
79namespace {
Alex Vakulenkod2779df2014-06-16 13:19:00 -070080const char* const kLongName =
adlr@google.com3defe6a2009-12-04 20:57:17 +000081 "very_long_name_and_no_slashes-very_long_name_and_no_slashes"
82 "very_long_name_and_no_slashes-very_long_name_and_no_slashes"
83 "very_long_name_and_no_slashes-very_long_name_and_no_slashes"
84 "very_long_name_and_no_slashes-very_long_name_and_no_slashes"
85 "very_long_name_and_no_slashes-very_long_name_and_no_slashes"
86 "very_long_name_and_no_slashes-very_long_name_and_no_slashes"
87 "very_long_name_and_no_slashes-very_long_name_and_no_slashes"
88 "-the_update_a.b.c.d_DELTA_.tgz";
Alex Vakulenkod2779df2014-06-16 13:19:00 -070089const char* const kBadVersion = "don't update me";
90} // namespace
adlr@google.com3defe6a2009-12-04 20:57:17 +000091
Alex Deymo763e7db2015-08-27 21:08:08 -070092bool OmahaResponseHandlerActionTest::DoTest(
Jay Srinivasanae4697c2013-03-18 17:08:08 -070093 const OmahaResponse& in,
Gilad Arnold4dbd47e2013-07-22 05:39:26 -070094 const string& test_deadline_file,
Jay Srinivasanae4697c2013-03-18 17:08:08 -070095 InstallPlan* out) {
adlr@google.com3defe6a2009-12-04 20:57:17 +000096 ActionProcessor processor;
97 OmahaResponseHandlerActionProcessorDelegate delegate;
98 processor.set_delegate(&delegate);
99
Darin Petkov6a5b3222010-07-13 14:55:28 -0700100 ObjectFeederAction<OmahaResponse> feeder_action;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000101 feeder_action.set_obj(in);
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700102 if (in.update_exists && in.version != kBadVersion) {
Alex Deymo763e7db2015-08-27 21:08:08 -0700103 EXPECT_CALL(*(fake_system_state_.mock_prefs()),
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800104 SetString(kPrefsUpdateCheckResponseHash, in.hash))
Darin Petkov73058b42010-10-06 16:32:19 -0700105 .WillOnce(Return(true));
Alex Deymo85616652015-10-15 18:48:31 -0700106
107 int slot = 1 - fake_system_state_.fake_boot_control()->GetCurrentSlot();
108 string key = kPrefsChannelOnSlotPrefix + std::to_string(slot);
109 EXPECT_CALL(*(fake_system_state_.mock_prefs()), SetString(key, testing::_))
110 .WillOnce(Return(true));
Darin Petkov73058b42010-10-06 16:32:19 -0700111 }
Jay Srinivasan53173b92013-05-17 17:13:01 -0700112
113 string current_url = in.payload_urls.size() ? in.payload_urls[0] : "";
Alex Deymo763e7db2015-08-27 21:08:08 -0700114 EXPECT_CALL(*(fake_system_state_.mock_payload_state()), GetCurrentUrl())
Jay Srinivasan53173b92013-05-17 17:13:01 -0700115 .WillRepeatedly(Return(current_url));
116
Gilad Arnold4dbd47e2013-07-22 05:39:26 -0700117 OmahaResponseHandlerAction response_handler_action(
Alex Deymo763e7db2015-08-27 21:08:08 -0700118 &fake_system_state_,
Gilad Arnold4dbd47e2013-07-22 05:39:26 -0700119 (test_deadline_file.empty() ?
Alex Deymo6dd160a2015-10-09 18:45:14 -0700120 constants::kOmahaResponseDeadlineFile : test_deadline_file));
adlr@google.com3defe6a2009-12-04 20:57:17 +0000121 BondActions(&feeder_action, &response_handler_action);
122 ObjectCollectorAction<InstallPlan> collector_action;
123 BondActions(&response_handler_action, &collector_action);
124 processor.EnqueueAction(&feeder_action);
125 processor.EnqueueAction(&response_handler_action);
126 processor.EnqueueAction(&collector_action);
127 processor.StartProcessing();
128 EXPECT_TRUE(!processor.IsRunning())
Alex Vakulenko072359c2014-07-18 11:41:07 -0700129 << "Update test to handle non-async actions";
adlr@google.com3defe6a2009-12-04 20:57:17 +0000130 if (out)
131 *out = collector_action.object();
Darin Petkovc1a8b422010-07-19 11:34:49 -0700132 EXPECT_TRUE(delegate.code_set_);
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700133 return delegate.code_ == ErrorCode::kSuccess;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000134}
135
136TEST_F(OmahaResponseHandlerActionTest, SimpleTest) {
Gilad Arnold4dbd47e2013-07-22 05:39:26 -0700137 string test_deadline_file;
138 CHECK(utils::MakeTempFile(
Gilad Arnolda6742b32014-01-11 00:18:34 -0800139 "omaha_response_handler_action_unittest-XXXXXX",
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700140 &test_deadline_file, nullptr));
Gilad Arnold4dbd47e2013-07-22 05:39:26 -0700141 ScopedPathUnlinker deadline_unlinker(test_deadline_file);
adlr@google.com3defe6a2009-12-04 20:57:17 +0000142 {
Darin Petkov6a5b3222010-07-13 14:55:28 -0700143 OmahaResponse in;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000144 in.update_exists = true;
Chris Sosa3b748432013-06-20 16:42:59 -0700145 in.version = "a.b.c.d";
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800146 in.payload_urls.push_back("http://foo/the_update_a.b.c.d.tgz");
adlr@google.com3defe6a2009-12-04 20:57:17 +0000147 in.more_info_url = "http://more/info";
148 in.hash = "HASH+";
149 in.size = 12;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000150 in.prompt = false;
Darin Petkov6c118642010-10-21 12:06:30 -0700151 in.deadline = "20101020";
adlr@google.com3defe6a2009-12-04 20:57:17 +0000152 InstallPlan install_plan;
Alex Deymo763e7db2015-08-27 21:08:08 -0700153 EXPECT_TRUE(DoTest(in, test_deadline_file, &install_plan));
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800154 EXPECT_EQ(in.payload_urls[0], install_plan.download_url);
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700155 EXPECT_EQ(in.hash, install_plan.payload_hash);
Alex Deymo763e7db2015-08-27 21:08:08 -0700156 EXPECT_EQ(1, install_plan.target_slot);
Darin Petkov6c118642010-10-21 12:06:30 -0700157 string deadline;
Gilad Arnold4dbd47e2013-07-22 05:39:26 -0700158 EXPECT_TRUE(utils::ReadFile(test_deadline_file, &deadline));
Darin Petkov6c118642010-10-21 12:06:30 -0700159 EXPECT_EQ("20101020", deadline);
160 struct stat deadline_stat;
Gilad Arnold4dbd47e2013-07-22 05:39:26 -0700161 EXPECT_EQ(0, stat(test_deadline_file.c_str(), &deadline_stat));
Darin Petkov6c118642010-10-21 12:06:30 -0700162 EXPECT_EQ(S_IFREG | S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH,
163 deadline_stat.st_mode);
Chris Sosafb1020e2013-07-29 17:27:33 -0700164 EXPECT_EQ(in.version, install_plan.version);
adlr@google.com3defe6a2009-12-04 20:57:17 +0000165 }
166 {
Darin Petkov6a5b3222010-07-13 14:55:28 -0700167 OmahaResponse in;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000168 in.update_exists = true;
Chris Sosa3b748432013-06-20 16:42:59 -0700169 in.version = "a.b.c.d";
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800170 in.payload_urls.push_back("http://foo/the_update_a.b.c.d.tgz");
adlr@google.com3defe6a2009-12-04 20:57:17 +0000171 in.more_info_url = "http://more/info";
172 in.hash = "HASHj+";
173 in.size = 12;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000174 in.prompt = true;
175 InstallPlan install_plan;
Alex Deymo763e7db2015-08-27 21:08:08 -0700176 // Set the other slot as current.
177 fake_system_state_.fake_boot_control()->SetCurrentSlot(1);
178 EXPECT_TRUE(DoTest(in, test_deadline_file, &install_plan));
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800179 EXPECT_EQ(in.payload_urls[0], install_plan.download_url);
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700180 EXPECT_EQ(in.hash, install_plan.payload_hash);
Alex Deymo763e7db2015-08-27 21:08:08 -0700181 EXPECT_EQ(0, install_plan.target_slot);
Darin Petkov6c118642010-10-21 12:06:30 -0700182 string deadline;
Gilad Arnold4dbd47e2013-07-22 05:39:26 -0700183 EXPECT_TRUE(utils::ReadFile(test_deadline_file, &deadline) &&
184 deadline.empty());
Chris Sosafb1020e2013-07-29 17:27:33 -0700185 EXPECT_EQ(in.version, install_plan.version);
adlr@google.com3defe6a2009-12-04 20:57:17 +0000186 }
187 {
Darin Petkov6a5b3222010-07-13 14:55:28 -0700188 OmahaResponse in;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000189 in.update_exists = true;
Chris Sosa3b748432013-06-20 16:42:59 -0700190 in.version = "a.b.c.d";
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800191 in.payload_urls.push_back(kLongName);
adlr@google.com3defe6a2009-12-04 20:57:17 +0000192 in.more_info_url = "http://more/info";
193 in.hash = "HASHj+";
194 in.size = 12;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000195 in.prompt = true;
Darin Petkov6c118642010-10-21 12:06:30 -0700196 in.deadline = "some-deadline";
adlr@google.com3defe6a2009-12-04 20:57:17 +0000197 InstallPlan install_plan;
Alex Deymo763e7db2015-08-27 21:08:08 -0700198 fake_system_state_.fake_boot_control()->SetCurrentSlot(0);
199 EXPECT_TRUE(DoTest(in, test_deadline_file, &install_plan));
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800200 EXPECT_EQ(in.payload_urls[0], install_plan.download_url);
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700201 EXPECT_EQ(in.hash, install_plan.payload_hash);
Alex Deymo763e7db2015-08-27 21:08:08 -0700202 EXPECT_EQ(1, install_plan.target_slot);
Darin Petkov6c118642010-10-21 12:06:30 -0700203 string deadline;
Gilad Arnold4dbd47e2013-07-22 05:39:26 -0700204 EXPECT_TRUE(utils::ReadFile(test_deadline_file, &deadline));
Darin Petkov6c118642010-10-21 12:06:30 -0700205 EXPECT_EQ("some-deadline", deadline);
Chris Sosafb1020e2013-07-29 17:27:33 -0700206 EXPECT_EQ(in.version, install_plan.version);
adlr@google.com3defe6a2009-12-04 20:57:17 +0000207 }
208}
209
210TEST_F(OmahaResponseHandlerActionTest, NoUpdatesTest) {
Darin Petkov6a5b3222010-07-13 14:55:28 -0700211 OmahaResponse in;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000212 in.update_exists = false;
213 InstallPlan install_plan;
Alex Deymo763e7db2015-08-27 21:08:08 -0700214 EXPECT_FALSE(DoTest(in, "", &install_plan));
Alex Deymoe5e5fe92015-10-05 09:28:19 -0700215 EXPECT_TRUE(install_plan.partitions.empty());
adlr@google.com3defe6a2009-12-04 20:57:17 +0000216}
217
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800218TEST_F(OmahaResponseHandlerActionTest, HashChecksForHttpTest) {
219 OmahaResponse in;
220 in.update_exists = true;
Chris Sosa3b748432013-06-20 16:42:59 -0700221 in.version = "a.b.c.d";
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800222 in.payload_urls.push_back("http://test.should/need/hash.checks.signed");
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800223 in.more_info_url = "http://more/info";
224 in.hash = "HASHj+";
225 in.size = 12;
David Pursell02c18642014-11-06 11:26:11 -0800226 // Hash checks are always skipped for non-official update URLs.
Alex Deymo763e7db2015-08-27 21:08:08 -0700227 EXPECT_CALL(*(fake_system_state_.mock_request_params()),
David Pursell02c18642014-11-06 11:26:11 -0800228 IsUpdateUrlOfficial())
229 .WillRepeatedly(Return(true));
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800230 InstallPlan install_plan;
Alex Deymo763e7db2015-08-27 21:08:08 -0700231 EXPECT_TRUE(DoTest(in, "", &install_plan));
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800232 EXPECT_EQ(in.payload_urls[0], install_plan.download_url);
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800233 EXPECT_EQ(in.hash, install_plan.payload_hash);
234 EXPECT_TRUE(install_plan.hash_checks_mandatory);
Chris Sosafb1020e2013-07-29 17:27:33 -0700235 EXPECT_EQ(in.version, install_plan.version);
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800236}
237
David Pursell02c18642014-11-06 11:26:11 -0800238TEST_F(OmahaResponseHandlerActionTest, HashChecksForUnofficialUpdateUrl) {
239 OmahaResponse in;
240 in.update_exists = true;
241 in.version = "a.b.c.d";
242 in.payload_urls.push_back("http://url.normally/needs/hash.checks.signed");
243 in.more_info_url = "http://more/info";
244 in.hash = "HASHj+";
245 in.size = 12;
Alex Deymo763e7db2015-08-27 21:08:08 -0700246 EXPECT_CALL(*(fake_system_state_.mock_request_params()),
David Pursell02c18642014-11-06 11:26:11 -0800247 IsUpdateUrlOfficial())
248 .WillRepeatedly(Return(false));
249 InstallPlan install_plan;
Alex Deymo763e7db2015-08-27 21:08:08 -0700250 EXPECT_TRUE(DoTest(in, "", &install_plan));
David Pursell02c18642014-11-06 11:26:11 -0800251 EXPECT_EQ(in.payload_urls[0], install_plan.download_url);
252 EXPECT_EQ(in.hash, install_plan.payload_hash);
253 EXPECT_FALSE(install_plan.hash_checks_mandatory);
254 EXPECT_EQ(in.version, install_plan.version);
255}
256
David Pursell907b4fa2015-01-27 10:27:38 -0800257TEST_F(OmahaResponseHandlerActionTest,
258 HashChecksForOfficialUrlUnofficialBuildTest) {
259 // Official URLs for unofficial builds (dev/test images) don't require hash.
260 OmahaResponse in;
261 in.update_exists = true;
262 in.version = "a.b.c.d";
263 in.payload_urls.push_back("http://url.normally/needs/hash.checks.signed");
264 in.more_info_url = "http://more/info";
265 in.hash = "HASHj+";
266 in.size = 12;
Alex Deymo763e7db2015-08-27 21:08:08 -0700267 EXPECT_CALL(*(fake_system_state_.mock_request_params()),
David Pursell907b4fa2015-01-27 10:27:38 -0800268 IsUpdateUrlOfficial())
269 .WillRepeatedly(Return(true));
Alex Deymo763e7db2015-08-27 21:08:08 -0700270 fake_system_state_.fake_hardware()->SetIsOfficialBuild(false);
David Pursell907b4fa2015-01-27 10:27:38 -0800271 InstallPlan install_plan;
Alex Deymo763e7db2015-08-27 21:08:08 -0700272 EXPECT_TRUE(DoTest(in, "", &install_plan));
David Pursell907b4fa2015-01-27 10:27:38 -0800273 EXPECT_EQ(in.payload_urls[0], install_plan.download_url);
274 EXPECT_EQ(in.hash, install_plan.payload_hash);
275 EXPECT_FALSE(install_plan.hash_checks_mandatory);
276 EXPECT_EQ(in.version, install_plan.version);
277}
278
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800279TEST_F(OmahaResponseHandlerActionTest, HashChecksForHttpsTest) {
280 OmahaResponse in;
281 in.update_exists = true;
Chris Sosa3b748432013-06-20 16:42:59 -0700282 in.version = "a.b.c.d";
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800283 in.payload_urls.push_back("https://test.should.not/need/hash.checks.signed");
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800284 in.more_info_url = "http://more/info";
285 in.hash = "HASHj+";
286 in.size = 12;
Alex Deymo763e7db2015-08-27 21:08:08 -0700287 EXPECT_CALL(*(fake_system_state_.mock_request_params()),
David Pursell02c18642014-11-06 11:26:11 -0800288 IsUpdateUrlOfficial())
289 .WillRepeatedly(Return(true));
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800290 InstallPlan install_plan;
Alex Deymo763e7db2015-08-27 21:08:08 -0700291 EXPECT_TRUE(DoTest(in, "", &install_plan));
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800292 EXPECT_EQ(in.payload_urls[0], install_plan.download_url);
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800293 EXPECT_EQ(in.hash, install_plan.payload_hash);
294 EXPECT_FALSE(install_plan.hash_checks_mandatory);
Chris Sosafb1020e2013-07-29 17:27:33 -0700295 EXPECT_EQ(in.version, install_plan.version);
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800296}
297
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800298TEST_F(OmahaResponseHandlerActionTest, HashChecksForBothHttpAndHttpsTest) {
299 OmahaResponse in;
300 in.update_exists = true;
Chris Sosa3b748432013-06-20 16:42:59 -0700301 in.version = "a.b.c.d";
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800302 in.payload_urls.push_back("http://test.should.still/need/hash.checks");
303 in.payload_urls.push_back("https://test.should.still/need/hash.checks");
304 in.more_info_url = "http://more/info";
305 in.hash = "HASHj+";
306 in.size = 12;
Alex Deymo763e7db2015-08-27 21:08:08 -0700307 EXPECT_CALL(*(fake_system_state_.mock_request_params()),
David Pursell02c18642014-11-06 11:26:11 -0800308 IsUpdateUrlOfficial())
309 .WillRepeatedly(Return(true));
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800310 InstallPlan install_plan;
Alex Deymo763e7db2015-08-27 21:08:08 -0700311 EXPECT_TRUE(DoTest(in, "", &install_plan));
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800312 EXPECT_EQ(in.payload_urls[0], install_plan.download_url);
313 EXPECT_EQ(in.hash, install_plan.payload_hash);
314 EXPECT_TRUE(install_plan.hash_checks_mandatory);
Chris Sosafb1020e2013-07-29 17:27:33 -0700315 EXPECT_EQ(in.version, install_plan.version);
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800316}
317
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700318TEST_F(OmahaResponseHandlerActionTest, ChangeToMoreStableChannelTest) {
319 OmahaResponse in;
320 in.update_exists = true;
Chris Sosa3b748432013-06-20 16:42:59 -0700321 in.version = "a.b.c.d";
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700322 in.payload_urls.push_back("https://MoreStableChannelTest");
323 in.more_info_url = "http://more/info";
324 in.hash = "HASHjk";
325 in.size = 15;
326
Gilad Arnoldeff87cc2013-07-22 18:32:09 -0700327 // Create a uniquely named test directory.
328 string test_dir;
329 ASSERT_TRUE(utils::MakeTempDirectory(
330 "omaha_response_handler_action-test-XXXXXX", &test_dir));
331
332 ASSERT_EQ(0, System(string("mkdir -p ") + test_dir + "/etc"));
333 ASSERT_EQ(0, System(string("mkdir -p ") + test_dir +
Chris Sosabe45bef2013-04-09 18:25:12 -0700334 kStatefulPartition + "/etc"));
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700335 ASSERT_TRUE(WriteFileString(
Gilad Arnoldeff87cc2013-07-22 18:32:09 -0700336 test_dir + "/etc/lsb-release",
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700337 "CHROMEOS_RELEASE_TRACK=canary-channel\n"));
338 ASSERT_TRUE(WriteFileString(
Gilad Arnoldeff87cc2013-07-22 18:32:09 -0700339 test_dir + kStatefulPartition + "/etc/lsb-release",
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700340 "CHROMEOS_IS_POWERWASH_ALLOWED=true\n"
341 "CHROMEOS_RELEASE_TRACK=stable-channel\n"));
342
Alex Deymo763e7db2015-08-27 21:08:08 -0700343 OmahaRequestParams params(&fake_system_state_);
Alex Deymo85616652015-10-15 18:48:31 -0700344 fake_system_state_.fake_hardware()->SetIsOfficialBuild(false);
Gilad Arnoldd04f8e22014-01-09 13:13:40 -0800345 params.set_root(test_dir);
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700346 params.Init("1.2.3.4", "", 0);
347 EXPECT_EQ("canary-channel", params.current_channel());
348 EXPECT_EQ("stable-channel", params.target_channel());
349 EXPECT_TRUE(params.to_more_stable_channel());
350 EXPECT_TRUE(params.is_powerwash_allowed());
351
Alex Deymo763e7db2015-08-27 21:08:08 -0700352 fake_system_state_.set_request_params(&params);
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700353 InstallPlan install_plan;
Alex Deymo763e7db2015-08-27 21:08:08 -0700354 EXPECT_TRUE(DoTest(in, "", &install_plan));
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700355 EXPECT_TRUE(install_plan.powerwash_required);
Gilad Arnoldeff87cc2013-07-22 18:32:09 -0700356
Alex Deymo10875d92014-11-10 21:52:57 -0800357 ASSERT_TRUE(test_utils::RecursiveUnlinkDir(test_dir));
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700358}
359
360TEST_F(OmahaResponseHandlerActionTest, ChangeToLessStableChannelTest) {
361 OmahaResponse in;
362 in.update_exists = true;
Chris Sosa3b748432013-06-20 16:42:59 -0700363 in.version = "a.b.c.d";
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700364 in.payload_urls.push_back("https://LessStableChannelTest");
365 in.more_info_url = "http://more/info";
366 in.hash = "HASHjk";
367 in.size = 15;
368
Gilad Arnoldeff87cc2013-07-22 18:32:09 -0700369 // Create a uniquely named test directory.
370 string test_dir;
371 ASSERT_TRUE(utils::MakeTempDirectory(
372 "omaha_response_handler_action-test-XXXXXX", &test_dir));
373
374 ASSERT_EQ(0, System(string("mkdir -p ") + test_dir + "/etc"));
375 ASSERT_EQ(0, System(string("mkdir -p ") + test_dir +
Chris Sosabe45bef2013-04-09 18:25:12 -0700376 kStatefulPartition + "/etc"));
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700377 ASSERT_TRUE(WriteFileString(
Gilad Arnoldeff87cc2013-07-22 18:32:09 -0700378 test_dir + "/etc/lsb-release",
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700379 "CHROMEOS_RELEASE_TRACK=stable-channel\n"));
380 ASSERT_TRUE(WriteFileString(
Gilad Arnoldeff87cc2013-07-22 18:32:09 -0700381 test_dir + kStatefulPartition + "/etc/lsb-release",
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700382 "CHROMEOS_RELEASE_TRACK=canary-channel\n"));
383
Alex Deymo763e7db2015-08-27 21:08:08 -0700384 OmahaRequestParams params(&fake_system_state_);
Alex Deymo85616652015-10-15 18:48:31 -0700385 fake_system_state_.fake_hardware()->SetIsOfficialBuild(false);
Gilad Arnoldd04f8e22014-01-09 13:13:40 -0800386 params.set_root(test_dir);
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700387 params.Init("5.6.7.8", "", 0);
388 EXPECT_EQ("stable-channel", params.current_channel());
389 params.SetTargetChannel("canary-channel", false);
390 EXPECT_EQ("canary-channel", params.target_channel());
391 EXPECT_FALSE(params.to_more_stable_channel());
392 EXPECT_FALSE(params.is_powerwash_allowed());
393
Alex Deymo763e7db2015-08-27 21:08:08 -0700394 fake_system_state_.set_request_params(&params);
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700395 InstallPlan install_plan;
Alex Deymo763e7db2015-08-27 21:08:08 -0700396 EXPECT_TRUE(DoTest(in, "", &install_plan));
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700397 EXPECT_FALSE(install_plan.powerwash_required);
Gilad Arnoldeff87cc2013-07-22 18:32:09 -0700398
Alex Deymo10875d92014-11-10 21:52:57 -0800399 ASSERT_TRUE(test_utils::RecursiveUnlinkDir(test_dir));
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700400}
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800401
David Zeuthen8f191b22013-08-06 12:27:50 -0700402TEST_F(OmahaResponseHandlerActionTest, P2PUrlIsUsedAndHashChecksMandatory) {
403 OmahaResponse in;
404 in.update_exists = true;
405 in.version = "a.b.c.d";
406 in.payload_urls.push_back("https://would.not/cause/hash/checks");
407 in.more_info_url = "http://more/info";
408 in.hash = "HASHj+";
409 in.size = 12;
410
Alex Deymo763e7db2015-08-27 21:08:08 -0700411 OmahaRequestParams params(&fake_system_state_);
David Pursell02c18642014-11-06 11:26:11 -0800412 // We're using a real OmahaRequestParams object here so we can't mock
413 // IsUpdateUrlOfficial(), but setting the update URL to the AutoUpdate test
414 // server will cause IsUpdateUrlOfficial() to return true.
Alex Deymoac41a822015-09-15 20:52:53 -0700415 params.set_update_url(constants::kOmahaDefaultAUTestURL);
Alex Deymo763e7db2015-08-27 21:08:08 -0700416 fake_system_state_.set_request_params(&params);
David Zeuthen8f191b22013-08-06 12:27:50 -0700417
Alex Deymo763e7db2015-08-27 21:08:08 -0700418 EXPECT_CALL(*fake_system_state_.mock_payload_state(),
David Zeuthenbb8bdc72013-09-03 13:43:48 -0700419 SetUsingP2PForDownloading(true));
420
David Zeuthen8f191b22013-08-06 12:27:50 -0700421 string p2p_url = "http://9.8.7.6/p2p";
Alex Deymo763e7db2015-08-27 21:08:08 -0700422 EXPECT_CALL(*fake_system_state_.mock_payload_state(), GetP2PUrl())
Gilad Arnold74b5f552014-10-07 08:17:16 -0700423 .WillRepeatedly(Return(p2p_url));
Alex Deymo763e7db2015-08-27 21:08:08 -0700424 EXPECT_CALL(*fake_system_state_.mock_payload_state(),
Gilad Arnold74b5f552014-10-07 08:17:16 -0700425 GetUsingP2PForDownloading()).WillRepeatedly(Return(true));
David Zeuthen8f191b22013-08-06 12:27:50 -0700426
427 InstallPlan install_plan;
Alex Deymo763e7db2015-08-27 21:08:08 -0700428 EXPECT_TRUE(DoTest(in, "", &install_plan));
David Zeuthen8f191b22013-08-06 12:27:50 -0700429 EXPECT_EQ(in.hash, install_plan.payload_hash);
430 EXPECT_EQ(install_plan.download_url, p2p_url);
431 EXPECT_TRUE(install_plan.hash_checks_mandatory);
432}
433
adlr@google.com3defe6a2009-12-04 20:57:17 +0000434} // namespace chromeos_update_engine