blob: a50c50a30fe21bb5d1294c1db5bb907c1a3683bb [file] [log] [blame]
Alex Deymoaea4c1c2015-08-19 20:24:43 -07001//
2// Copyright (C) 2012 The Android Open Source Project
3//
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at
7//
8// http://www.apache.org/licenses/LICENSE-2.0
9//
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15//
Darin Petkovf42cc1c2010-09-01 09:03:02 -070016
Alex Deymo2c0db7b2014-11-04 12:23:39 -080017#include "update_engine/update_attempter.h"
18
Ben Chan9abb7632014-08-07 00:10:53 -070019#include <stdint.h>
20
Ben Chan02f7c1d2014-10-18 15:18:02 -070021#include <memory>
22
Ben Chan06c76a42014-09-05 08:21:06 -070023#include <base/files/file_util.h>
Alex Deymo0b3db6b2015-08-10 15:19:37 -070024#include <base/message_loop/message_loop.h>
Alex Deymo60ca1a72015-06-18 18:19:15 -070025#include <chromeos/bind_lambda.h>
David Pursell02c18642014-11-06 11:26:11 -080026#include <chromeos/dbus/service_constants.h>
Alex Deymo30534502015-07-20 15:06:33 -070027#include <chromeos/make_unique_ptr.h>
Alex Deymo0b3db6b2015-08-10 15:19:37 -070028#include <chromeos/message_loops/base_message_loop.h>
Alex Deymo60ca1a72015-06-18 18:19:15 -070029#include <chromeos/message_loops/message_loop.h>
30#include <chromeos/message_loops/message_loop_utils.h>
Darin Petkovf42cc1c2010-09-01 09:03:02 -070031#include <gtest/gtest.h>
Patrick Dubroy7fbbe8a2011-08-01 17:28:22 +020032#include <policy/libpolicy.h>
33#include <policy/mock_device_policy.h>
Darin Petkovf42cc1c2010-09-01 09:03:02 -070034
Alex Deymob8803bb2015-08-19 23:14:49 -070035#include "debugd/dbus-proxies.h"
36#include "debugd/dbus-proxy-mocks.h"
37#include "libcros/dbus-proxies.h"
38#include "libcros/dbus-proxy-mocks.h"
David Zeuthen985b1122013-10-09 12:13:15 -070039#include "update_engine/fake_clock.h"
Alex Deymo2c0db7b2014-11-04 12:23:39 -080040#include "update_engine/fake_prefs.h"
Gilad Arnold5bb4c902014-04-10 12:32:13 -070041#include "update_engine/fake_system_state.h"
Allie Woodeb9e6d82015-04-17 13:55:30 -070042#include "update_engine/filesystem_verifier_action.h"
Chris Sosa76a29ae2013-07-11 17:59:24 -070043#include "update_engine/install_plan.h"
Alex Deymo8427b4a2014-11-05 14:00:32 -080044#include "update_engine/mock_action.h"
45#include "update_engine/mock_action_processor.h"
Darin Petkov1b003102010-11-30 10:18:36 -080046#include "update_engine/mock_http_fetcher.h"
David Zeuthen8f191b22013-08-06 12:27:50 -070047#include "update_engine/mock_p2p_manager.h"
Jay Srinivasan6f6ea002012-12-14 11:26:28 -080048#include "update_engine/mock_payload_state.h"
Alex Deymo8427b4a2014-11-05 14:00:32 -080049#include "update_engine/mock_prefs.h"
Darin Petkovf42cc1c2010-09-01 09:03:02 -070050#include "update_engine/postinstall_runner_action.h"
Jay Srinivasan480ddfa2012-06-01 19:15:26 -070051#include "update_engine/prefs.h"
Darin Petkov1b003102010-11-30 10:18:36 -080052#include "update_engine/test_utils.h"
Gilad Arnoldeff87cc2013-07-22 18:32:09 -070053#include "update_engine/utils.h"
Darin Petkovf42cc1c2010-09-01 09:03:02 -070054
David Zeuthen985b1122013-10-09 12:13:15 -070055using base::Time;
56using base::TimeDelta;
Alex Deymo60ca1a72015-06-18 18:19:15 -070057using chromeos::MessageLoop;
Alex Deymo30534502015-07-20 15:06:33 -070058using org::chromium::LibCrosServiceInterfaceProxyMock;
59using org::chromium::UpdateEngineLibcrosProxyResolvedInterfaceProxyMock;
Darin Petkovf42cc1c2010-09-01 09:03:02 -070060using std::string;
Ben Chan02f7c1d2014-10-18 15:18:02 -070061using std::unique_ptr;
Darin Petkov36275772010-10-01 11:40:57 -070062using testing::DoAll;
Darin Petkovf42cc1c2010-09-01 09:03:02 -070063using testing::InSequence;
Darin Petkov2dd01092010-10-08 15:43:05 -070064using testing::Ne;
Darin Petkov9c096d62010-11-17 14:49:04 -080065using testing::NiceMock;
Darin Petkovf42cc1c2010-09-01 09:03:02 -070066using testing::Property;
67using testing::Return;
Gilad Arnold74b5f552014-10-07 08:17:16 -070068using testing::ReturnPointee;
Alex Deymo2c0db7b2014-11-04 12:23:39 -080069using testing::SaveArg;
Darin Petkov36275772010-10-01 11:40:57 -070070using testing::SetArgumentPointee;
Alex Deymof329b932014-10-30 01:37:48 -070071using testing::_;
Darin Petkovf42cc1c2010-09-01 09:03:02 -070072
73namespace chromeos_update_engine {
74
75// Test a subclass rather than the main class directly so that we can mock out
Darin Petkovcd1666f2010-09-23 09:53:44 -070076// methods within the class. There're explicit unit tests for the mocked out
Darin Petkovf42cc1c2010-09-01 09:03:02 -070077// methods.
78class UpdateAttempterUnderTest : public UpdateAttempter {
79 public:
Gilad Arnold1f847232014-04-07 12:07:49 -070080 UpdateAttempterUnderTest(SystemState* system_state,
Alex Deymo30534502015-07-20 15:06:33 -070081 LibCrosProxy* libcros_proxy,
82 org::chromium::debugdProxyInterface* debugd_proxy,
Alex Deymof329b932014-10-30 01:37:48 -070083 const string& update_completed_marker)
Alex Deymo30534502015-07-20 15:06:33 -070084 : UpdateAttempter(system_state, libcros_proxy, debugd_proxy,
85 update_completed_marker) {}
Gilad Arnoldec7f9162014-07-15 13:24:46 -070086
87 // Wrap the update scheduling method, allowing us to opt out of scheduled
88 // updates for testing purposes.
89 void ScheduleUpdates() override {
90 schedule_updates_called_ = true;
91 if (do_schedule_updates_) {
92 UpdateAttempter::ScheduleUpdates();
93 } else {
94 LOG(INFO) << "[TEST] Update scheduling disabled.";
95 }
96 }
97 void EnableScheduleUpdates() { do_schedule_updates_ = true; }
98 void DisableScheduleUpdates() { do_schedule_updates_ = false; }
99
100 // Indicates whether ScheduleUpdates() was called.
101 bool schedule_updates_called() const { return schedule_updates_called_; }
102
David Pursell02c18642014-11-06 11:26:11 -0800103 // Need to expose forced_omaha_url_ so we can test it.
Alex Deymo60ca1a72015-06-18 18:19:15 -0700104 const string& forced_omaha_url() const { return forced_omaha_url_; }
David Pursell02c18642014-11-06 11:26:11 -0800105
Gilad Arnoldec7f9162014-07-15 13:24:46 -0700106 private:
107 bool schedule_updates_called_ = false;
108 bool do_schedule_updates_ = true;
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700109};
110
111class UpdateAttempterTest : public ::testing::Test {
112 protected:
Jay Srinivasan43488792012-06-19 00:25:31 -0700113 UpdateAttempterTest()
Alex Deymo30534502015-07-20 15:06:33 -0700114 : service_interface_mock_(new LibCrosServiceInterfaceProxyMock()),
115 ue_proxy_resolved_interface_mock_(
116 new NiceMock<UpdateEngineLibcrosProxyResolvedInterfaceProxyMock>()),
117 libcros_proxy_(
118 chromeos::make_unique_ptr(service_interface_mock_),
119 chromeos::make_unique_ptr(ue_proxy_resolved_interface_mock_)) {
Gilad Arnold1f847232014-04-07 12:07:49 -0700120 // Override system state members.
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700121 fake_system_state_.set_connection_manager(&mock_connection_manager);
122 fake_system_state_.set_update_attempter(&attempter_);
Alex Deymo60ca1a72015-06-18 18:19:15 -0700123 loop_.SetAsCurrent();
Gilad Arnold1f847232014-04-07 12:07:49 -0700124
125 // Finish initializing the attempter.
126 attempter_.Init();
Alex Deymo461b2592015-07-24 20:10:52 -0700127 // Don't run setgoodkernel command.
128 attempter_.skip_set_good_kernel_ = true;
Jay Srinivasan43488792012-06-19 00:25:31 -0700129 }
Gilad Arnoldeff87cc2013-07-22 18:32:09 -0700130
Alex Deymo610277e2014-11-11 21:18:11 -0800131 void SetUp() override {
Gilad Arnoldeff87cc2013-07-22 18:32:09 -0700132 CHECK(utils::MakeTempDirectory("UpdateAttempterTest-XXXXXX", &test_dir_));
133
Alex Deymob7ca0962014-10-01 17:58:07 -0700134 EXPECT_EQ(nullptr, attempter_.dbus_adaptor_);
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700135 EXPECT_NE(nullptr, attempter_.system_state_);
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700136 EXPECT_EQ(0, attempter_.http_response_code_);
Chris Sosa4f8ee272012-11-30 13:01:54 -0800137 EXPECT_EQ(utils::kCpuSharesNormal, attempter_.shares_);
Alex Deymo60ca1a72015-06-18 18:19:15 -0700138 EXPECT_EQ(MessageLoop::kTaskIdNull, attempter_.manage_shares_id_);
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700139 EXPECT_FALSE(attempter_.download_active_);
140 EXPECT_EQ(UPDATE_STATUS_IDLE, attempter_.status_);
141 EXPECT_EQ(0.0, attempter_.download_progress_);
142 EXPECT_EQ(0, attempter_.last_checked_time_);
143 EXPECT_EQ("0.0.0.0", attempter_.new_version_);
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700144 EXPECT_EQ(0, attempter_.new_payload_size_);
Alex Deymo8427b4a2014-11-05 14:00:32 -0800145 processor_ = new NiceMock<MockActionProcessor>();
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700146 attempter_.processor_.reset(processor_); // Transfers ownership.
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700147 prefs_ = fake_system_state_.mock_prefs();
Gilad Arnold74b5f552014-10-07 08:17:16 -0700148
149 // Set up store/load semantics of P2P properties via the mock PayloadState.
150 actual_using_p2p_for_downloading_ = false;
151 EXPECT_CALL(*fake_system_state_.mock_payload_state(),
152 SetUsingP2PForDownloading(_))
153 .WillRepeatedly(SaveArg<0>(&actual_using_p2p_for_downloading_));
154 EXPECT_CALL(*fake_system_state_.mock_payload_state(),
155 GetUsingP2PForDownloading())
156 .WillRepeatedly(ReturnPointee(&actual_using_p2p_for_downloading_));
157 actual_using_p2p_for_sharing_ = false;
158 EXPECT_CALL(*fake_system_state_.mock_payload_state(),
159 SetUsingP2PForSharing(_))
160 .WillRepeatedly(SaveArg<0>(&actual_using_p2p_for_sharing_));
161 EXPECT_CALL(*fake_system_state_.mock_payload_state(),
162 GetUsingP2PForDownloading())
163 .WillRepeatedly(ReturnPointee(&actual_using_p2p_for_sharing_));
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700164 }
165
Alex Deymo610277e2014-11-11 21:18:11 -0800166 void TearDown() override {
Alex Deymo10875d92014-11-10 21:52:57 -0800167 test_utils::RecursiveUnlinkDir(test_dir_);
Gilad Arnoldeff87cc2013-07-22 18:32:09 -0700168 }
169
Alex Deymo60ca1a72015-06-18 18:19:15 -0700170 public:
171 void ScheduleQuitMainLoop();
Patrick Dubroy7fbbe8a2011-08-01 17:28:22 +0200172
Alex Deymo60ca1a72015-06-18 18:19:15 -0700173 // Callbacks to run the different tests from the main loop.
Darin Petkove6ef2f82011-03-07 17:31:11 -0800174 void UpdateTestStart();
175 void UpdateTestVerify();
Alex Deymo60ca1a72015-06-18 18:19:15 -0700176 void RollbackTestStart(bool enterprise_rollback, bool valid_slot);
Chris Sosa76a29ae2013-07-11 17:59:24 -0700177 void RollbackTestVerify();
Thieu Le116fda32011-04-19 11:01:54 -0700178 void PingOmahaTestStart();
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700179 void ReadScatterFactorFromPolicyTestStart();
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700180 void DecrementUpdateCheckCountTestStart();
Jay Srinivasan08fce042012-06-07 16:31:01 -0700181 void NoScatteringDoneDuringManualUpdateTestStart();
David Zeuthen8f191b22013-08-06 12:27:50 -0700182 void P2PNotEnabledStart();
David Zeuthen8f191b22013-08-06 12:27:50 -0700183 void P2PEnabledStart();
David Zeuthen8f191b22013-08-06 12:27:50 -0700184 void P2PEnabledInteractiveStart();
David Zeuthen8f191b22013-08-06 12:27:50 -0700185 void P2PEnabledStartingFailsStart();
David Zeuthen8f191b22013-08-06 12:27:50 -0700186 void P2PEnabledHousekeepingFailsStart();
David Zeuthen8f191b22013-08-06 12:27:50 -0700187
Gilad Arnold74b5f552014-10-07 08:17:16 -0700188 bool actual_using_p2p_for_downloading() {
189 return actual_using_p2p_for_downloading_;
190 }
191 bool actual_using_p2p_for_sharing() {
192 return actual_using_p2p_for_sharing_;
193 }
194
Alex Deymo0b3db6b2015-08-10 15:19:37 -0700195 base::MessageLoopForIO base_loop_;
196 chromeos::BaseMessageLoop loop_{&base_loop_};
Alex Deymo60ca1a72015-06-18 18:19:15 -0700197
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700198 FakeSystemState fake_system_state_;
Alex Deymo30534502015-07-20 15:06:33 -0700199 org::chromium::debugdProxyMock debugd_proxy_mock_;
200 LibCrosServiceInterfaceProxyMock* service_interface_mock_;
201 UpdateEngineLibcrosProxyResolvedInterfaceProxyMock*
202 ue_proxy_resolved_interface_mock_;
203 LibCrosProxy libcros_proxy_;
204 UpdateAttempterUnderTest attempter_{&fake_system_state_,
205 &libcros_proxy_,
206 &debugd_proxy_mock_,
207 ""};
208
Alex Deymo8427b4a2014-11-05 14:00:32 -0800209 NiceMock<MockActionProcessor>* processor_;
210 NiceMock<MockPrefs>* prefs_; // Shortcut to fake_system_state_->mock_prefs().
Jay Srinivasan55f50c22013-01-10 19:24:35 -0800211 NiceMock<MockConnectionManager> mock_connection_manager;
Gilad Arnoldeff87cc2013-07-22 18:32:09 -0700212
213 string test_dir_;
Gilad Arnold74b5f552014-10-07 08:17:16 -0700214
215 bool actual_using_p2p_for_downloading_;
216 bool actual_using_p2p_for_sharing_;
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700217};
218
Alex Deymo60ca1a72015-06-18 18:19:15 -0700219void UpdateAttempterTest::ScheduleQuitMainLoop() {
220 loop_.PostTask(FROM_HERE, base::Bind([this] { this->loop_.BreakLoop(); }));
221}
222
Darin Petkov1b003102010-11-30 10:18:36 -0800223TEST_F(UpdateAttempterTest, ActionCompletedDownloadTest) {
Ben Chan02f7c1d2014-10-18 15:18:02 -0700224 unique_ptr<MockHttpFetcher> fetcher(new MockHttpFetcher("", 0, nullptr));
Darin Petkov1b003102010-11-30 10:18:36 -0800225 fetcher->FailTransfer(503); // Sets the HTTP response code.
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700226 DownloadAction action(prefs_, nullptr, fetcher.release());
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800227 EXPECT_CALL(*prefs_, GetInt64(kPrefsDeltaUpdateFailures, _)).Times(0);
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700228 attempter_.ActionCompleted(nullptr, &action, ErrorCode::kSuccess);
Darin Petkov1b003102010-11-30 10:18:36 -0800229 EXPECT_EQ(503, attempter_.http_response_code());
230 EXPECT_EQ(UPDATE_STATUS_FINALIZING, attempter_.status());
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700231 ASSERT_EQ(nullptr, attempter_.error_event_.get());
Darin Petkov1b003102010-11-30 10:18:36 -0800232}
233
234TEST_F(UpdateAttempterTest, ActionCompletedErrorTest) {
Alex Deymo8427b4a2014-11-05 14:00:32 -0800235 MockAction action;
236 EXPECT_CALL(action, Type()).WillRepeatedly(Return("MockAction"));
Darin Petkov1b003102010-11-30 10:18:36 -0800237 attempter_.status_ = UPDATE_STATUS_DOWNLOADING;
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800238 EXPECT_CALL(*prefs_, GetInt64(kPrefsDeltaUpdateFailures, _))
Darin Petkov1b003102010-11-30 10:18:36 -0800239 .WillOnce(Return(false));
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700240 attempter_.ActionCompleted(nullptr, &action, ErrorCode::kError);
241 ASSERT_NE(nullptr, attempter_.error_event_.get());
Darin Petkov1b003102010-11-30 10:18:36 -0800242}
243
244TEST_F(UpdateAttempterTest, ActionCompletedOmahaRequestTest) {
Ben Chan02f7c1d2014-10-18 15:18:02 -0700245 unique_ptr<MockHttpFetcher> fetcher(new MockHttpFetcher("", 0, nullptr));
Darin Petkov1b003102010-11-30 10:18:36 -0800246 fetcher->FailTransfer(500); // Sets the HTTP response code.
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700247 OmahaRequestAction action(&fake_system_state_, nullptr,
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800248 fetcher.release(), false);
Darin Petkov1b003102010-11-30 10:18:36 -0800249 ObjectCollectorAction<OmahaResponse> collector_action;
250 BondActions(&action, &collector_action);
251 OmahaResponse response;
252 response.poll_interval = 234;
253 action.SetOutputObject(response);
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800254 EXPECT_CALL(*prefs_, GetInt64(kPrefsDeltaUpdateFailures, _)).Times(0);
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700255 attempter_.ActionCompleted(nullptr, &action, ErrorCode::kSuccess);
Darin Petkov1b003102010-11-30 10:18:36 -0800256 EXPECT_EQ(500, attempter_.http_response_code());
257 EXPECT_EQ(UPDATE_STATUS_IDLE, attempter_.status());
Gilad Arnoldec7f9162014-07-15 13:24:46 -0700258 EXPECT_EQ(234, attempter_.server_dictated_poll_interval_);
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700259 ASSERT_TRUE(attempter_.error_event_.get() == nullptr);
Darin Petkov1b003102010-11-30 10:18:36 -0800260}
261
Alex Deymo30534502015-07-20 15:06:33 -0700262TEST_F(UpdateAttempterTest, ConstructWithUpdatedMarkerTest) {
Gilad Arnold70e476e2013-07-30 16:01:13 -0700263 string test_update_completed_marker;
264 CHECK(utils::MakeTempFile(
Alex Deymo30534502015-07-20 15:06:33 -0700265 "update_attempter_unittest-update_completed_marker-XXXXXX",
266 &test_update_completed_marker,
267 nullptr));
Gilad Arnold70e476e2013-07-30 16:01:13 -0700268 ScopedPathUnlinker completed_marker_unlinker(test_update_completed_marker);
Alex Vakulenko75039d72014-03-25 12:36:28 -0700269 const base::FilePath marker(test_update_completed_marker);
Ben Chan736fcb52014-05-21 18:28:22 -0700270 EXPECT_EQ(0, base::WriteFile(marker, "", 0));
Alex Deymo30534502015-07-20 15:06:33 -0700271 UpdateAttempterUnderTest attempter(&fake_system_state_,
272 nullptr,
273 &debugd_proxy_mock_,
Gilad Arnold70e476e2013-07-30 16:01:13 -0700274 test_update_completed_marker);
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700275 EXPECT_EQ(UPDATE_STATUS_UPDATED_NEED_REBOOT, attempter.status());
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700276}
277
278TEST_F(UpdateAttempterTest, GetErrorCodeForActionTest) {
David Zeuthena99981f2013-04-29 13:42:47 -0700279 extern ErrorCode GetErrorCodeForAction(AbstractAction* action,
280 ErrorCode code);
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700281 EXPECT_EQ(ErrorCode::kSuccess,
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700282 GetErrorCodeForAction(nullptr, ErrorCode::kSuccess));
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700283
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700284 FakeSystemState fake_system_state;
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700285 OmahaRequestAction omaha_request_action(&fake_system_state, nullptr,
286 nullptr, false);
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700287 EXPECT_EQ(ErrorCode::kOmahaRequestError,
288 GetErrorCodeForAction(&omaha_request_action, ErrorCode::kError));
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700289 OmahaResponseHandlerAction omaha_response_handler_action(&fake_system_state_);
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700290 EXPECT_EQ(ErrorCode::kOmahaResponseHandlerError,
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700291 GetErrorCodeForAction(&omaha_response_handler_action,
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700292 ErrorCode::kError));
Allie Woodeb9e6d82015-04-17 13:55:30 -0700293 FilesystemVerifierAction filesystem_verifier_action(
294 &fake_system_state_, PartitionType::kRootfs);
295 EXPECT_EQ(ErrorCode::kFilesystemVerifierError,
296 GetErrorCodeForAction(&filesystem_verifier_action,
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700297 ErrorCode::kError));
Darin Petkov6d5dbf62010-11-08 16:09:55 -0800298 PostinstallRunnerAction postinstall_runner_action;
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700299 EXPECT_EQ(ErrorCode::kPostinstallRunnerError,
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700300 GetErrorCodeForAction(&postinstall_runner_action,
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700301 ErrorCode::kError));
Alex Deymo8427b4a2014-11-05 14:00:32 -0800302 MockAction action_mock;
303 EXPECT_CALL(action_mock, Type()).WillOnce(Return("MockAction"));
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700304 EXPECT_EQ(ErrorCode::kError,
305 GetErrorCodeForAction(&action_mock, ErrorCode::kError));
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700306}
307
Darin Petkov36275772010-10-01 11:40:57 -0700308TEST_F(UpdateAttempterTest, DisableDeltaUpdateIfNeededTest) {
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700309 attempter_.omaha_request_params_->set_delta_okay(true);
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800310 EXPECT_CALL(*prefs_, GetInt64(kPrefsDeltaUpdateFailures, _))
Darin Petkov36275772010-10-01 11:40:57 -0700311 .WillOnce(Return(false));
312 attempter_.DisableDeltaUpdateIfNeeded();
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700313 EXPECT_TRUE(attempter_.omaha_request_params_->delta_okay());
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800314 EXPECT_CALL(*prefs_, GetInt64(kPrefsDeltaUpdateFailures, _))
Darin Petkov36275772010-10-01 11:40:57 -0700315 .WillOnce(DoAll(
316 SetArgumentPointee<1>(UpdateAttempter::kMaxDeltaUpdateFailures - 1),
317 Return(true)));
318 attempter_.DisableDeltaUpdateIfNeeded();
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700319 EXPECT_TRUE(attempter_.omaha_request_params_->delta_okay());
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800320 EXPECT_CALL(*prefs_, GetInt64(kPrefsDeltaUpdateFailures, _))
Darin Petkov36275772010-10-01 11:40:57 -0700321 .WillOnce(DoAll(
322 SetArgumentPointee<1>(UpdateAttempter::kMaxDeltaUpdateFailures),
323 Return(true)));
324 attempter_.DisableDeltaUpdateIfNeeded();
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700325 EXPECT_FALSE(attempter_.omaha_request_params_->delta_okay());
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800326 EXPECT_CALL(*prefs_, GetInt64(_, _)).Times(0);
Darin Petkov36275772010-10-01 11:40:57 -0700327 attempter_.DisableDeltaUpdateIfNeeded();
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700328 EXPECT_FALSE(attempter_.omaha_request_params_->delta_okay());
Darin Petkov36275772010-10-01 11:40:57 -0700329}
330
331TEST_F(UpdateAttempterTest, MarkDeltaUpdateFailureTest) {
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800332 EXPECT_CALL(*prefs_, GetInt64(kPrefsDeltaUpdateFailures, _))
Darin Petkov36275772010-10-01 11:40:57 -0700333 .WillOnce(Return(false))
334 .WillOnce(DoAll(SetArgumentPointee<1>(-1), Return(true)))
335 .WillOnce(DoAll(SetArgumentPointee<1>(1), Return(true)))
336 .WillOnce(DoAll(
337 SetArgumentPointee<1>(UpdateAttempter::kMaxDeltaUpdateFailures),
338 Return(true)));
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800339 EXPECT_CALL(*prefs_, SetInt64(Ne(kPrefsDeltaUpdateFailures), _))
Darin Petkov2dd01092010-10-08 15:43:05 -0700340 .WillRepeatedly(Return(true));
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800341 EXPECT_CALL(*prefs_, SetInt64(kPrefsDeltaUpdateFailures, 1)).Times(2);
Gilad Arnold74b5f552014-10-07 08:17:16 -0700342 EXPECT_CALL(*prefs_, SetInt64(kPrefsDeltaUpdateFailures, 2));
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800343 EXPECT_CALL(*prefs_, SetInt64(kPrefsDeltaUpdateFailures,
Gilad Arnold74b5f552014-10-07 08:17:16 -0700344 UpdateAttempter::kMaxDeltaUpdateFailures + 1));
Darin Petkov36275772010-10-01 11:40:57 -0700345 for (int i = 0; i < 4; i ++)
346 attempter_.MarkDeltaUpdateFailure();
347}
348
Darin Petkov1b003102010-11-30 10:18:36 -0800349TEST_F(UpdateAttempterTest, ScheduleErrorEventActionNoEventTest) {
350 EXPECT_CALL(*processor_, EnqueueAction(_)).Times(0);
351 EXPECT_CALL(*processor_, StartProcessing()).Times(0);
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700352 EXPECT_CALL(*fake_system_state_.mock_payload_state(), UpdateFailed(_))
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800353 .Times(0);
354 OmahaResponse response;
Jay Srinivasan53173b92013-05-17 17:13:01 -0700355 string url1 = "http://url1";
356 response.payload_urls.push_back(url1);
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800357 response.payload_urls.push_back("https://url");
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700358 EXPECT_CALL(*(fake_system_state_.mock_payload_state()), GetCurrentUrl())
Jay Srinivasan53173b92013-05-17 17:13:01 -0700359 .WillRepeatedly(Return(url1));
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700360 fake_system_state_.mock_payload_state()->SetResponse(response);
Darin Petkov1b003102010-11-30 10:18:36 -0800361 attempter_.ScheduleErrorEventAction();
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700362 EXPECT_EQ(url1, fake_system_state_.mock_payload_state()->GetCurrentUrl());
Darin Petkov1b003102010-11-30 10:18:36 -0800363}
364
365TEST_F(UpdateAttempterTest, ScheduleErrorEventActionTest) {
366 EXPECT_CALL(*processor_,
367 EnqueueAction(Property(&AbstractAction::Type,
Gilad Arnold74b5f552014-10-07 08:17:16 -0700368 OmahaRequestAction::StaticType())));
369 EXPECT_CALL(*processor_, StartProcessing());
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700370 ErrorCode err = ErrorCode::kError;
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700371 EXPECT_CALL(*fake_system_state_.mock_payload_state(), UpdateFailed(err));
Darin Petkov1b003102010-11-30 10:18:36 -0800372 attempter_.error_event_.reset(new OmahaEvent(OmahaEvent::kTypeUpdateComplete,
373 OmahaEvent::kResultError,
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800374 err));
Darin Petkov1b003102010-11-30 10:18:36 -0800375 attempter_.ScheduleErrorEventAction();
376 EXPECT_EQ(UPDATE_STATUS_REPORTING_ERROR_EVENT, attempter_.status());
377}
378
Darin Petkove6ef2f82011-03-07 17:31:11 -0800379namespace {
Chris Sosa76a29ae2013-07-11 17:59:24 -0700380// Actions that will be built as part of an update check.
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700381const string kUpdateActionTypes[] = { // NOLINT(runtime/string)
Darin Petkove6ef2f82011-03-07 17:31:11 -0800382 OmahaRequestAction::StaticType(),
383 OmahaResponseHandlerAction::StaticType(),
Allie Woodeb9e6d82015-04-17 13:55:30 -0700384 FilesystemVerifierAction::StaticType(),
385 FilesystemVerifierAction::StaticType(),
Darin Petkove6ef2f82011-03-07 17:31:11 -0800386 OmahaRequestAction::StaticType(),
387 DownloadAction::StaticType(),
388 OmahaRequestAction::StaticType(),
Allie Woodeb9e6d82015-04-17 13:55:30 -0700389 FilesystemVerifierAction::StaticType(),
390 FilesystemVerifierAction::StaticType(),
Darin Petkove6ef2f82011-03-07 17:31:11 -0800391 PostinstallRunnerAction::StaticType(),
392 OmahaRequestAction::StaticType()
393};
Chris Sosa76a29ae2013-07-11 17:59:24 -0700394
395// Actions that will be built as part of a user-initiated rollback.
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700396const string kRollbackActionTypes[] = { // NOLINT(runtime/string)
Chris Sosa76a29ae2013-07-11 17:59:24 -0700397 InstallPlanAction::StaticType(),
398 PostinstallRunnerAction::StaticType(),
399};
400
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700401} // namespace
Darin Petkove6ef2f82011-03-07 17:31:11 -0800402
403void UpdateAttempterTest::UpdateTestStart() {
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700404 attempter_.set_http_response_code(200);
Alex Deymo749ecf12014-10-21 20:06:57 -0700405
406 // Expect that the device policy is loaded by the UpdateAttempter at some
407 // point by calling RefreshDevicePolicy.
408 policy::MockDevicePolicy* device_policy = new policy::MockDevicePolicy();
409 attempter_.policy_provider_.reset(new policy::PolicyProvider(device_policy));
410 EXPECT_CALL(*device_policy, LoadPolicy())
411 .Times(testing::AtLeast(1)).WillRepeatedly(Return(true));
412
413 {
414 InSequence s;
415 for (size_t i = 0; i < arraysize(kUpdateActionTypes); ++i) {
416 EXPECT_CALL(*processor_,
417 EnqueueAction(Property(&AbstractAction::Type,
Gilad Arnold74b5f552014-10-07 08:17:16 -0700418 kUpdateActionTypes[i])));
Alex Deymo749ecf12014-10-21 20:06:57 -0700419 }
Gilad Arnold74b5f552014-10-07 08:17:16 -0700420 EXPECT_CALL(*processor_, StartProcessing());
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700421 }
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700422
Gilad Arnoldec7f9162014-07-15 13:24:46 -0700423 attempter_.Update("", "", "", "", false, false);
Alex Deymo60ca1a72015-06-18 18:19:15 -0700424 loop_.PostTask(FROM_HERE,
425 base::Bind(&UpdateAttempterTest::UpdateTestVerify,
426 base::Unretained(this)));
Darin Petkove6ef2f82011-03-07 17:31:11 -0800427}
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700428
Darin Petkove6ef2f82011-03-07 17:31:11 -0800429void UpdateAttempterTest::UpdateTestVerify() {
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700430 EXPECT_EQ(0, attempter_.http_response_code());
431 EXPECT_EQ(&attempter_, processor_->delegate());
Chris Sosa76a29ae2013-07-11 17:59:24 -0700432 EXPECT_EQ(arraysize(kUpdateActionTypes), attempter_.actions_.size());
433 for (size_t i = 0; i < arraysize(kUpdateActionTypes); ++i) {
434 EXPECT_EQ(kUpdateActionTypes[i], attempter_.actions_[i]->Type());
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700435 }
436 EXPECT_EQ(attempter_.response_handler_action_.get(),
437 attempter_.actions_[1].get());
438 DownloadAction* download_action =
439 dynamic_cast<DownloadAction*>(attempter_.actions_[5].get());
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700440 ASSERT_NE(nullptr, download_action);
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700441 EXPECT_EQ(&attempter_, download_action->delegate());
442 EXPECT_EQ(UPDATE_STATUS_CHECKING_FOR_UPDATE, attempter_.status());
Alex Deymo60ca1a72015-06-18 18:19:15 -0700443 loop_.BreakLoop();
Darin Petkove6ef2f82011-03-07 17:31:11 -0800444}
445
Chris Sosa28e479c2013-07-12 11:39:53 -0700446void UpdateAttempterTest::RollbackTestStart(
Chris Sosa44b9b7e2014-04-02 13:53:46 -0700447 bool enterprise_rollback, bool valid_slot) {
Chris Sosa76a29ae2013-07-11 17:59:24 -0700448 // Create a device policy so that we can change settings.
449 policy::MockDevicePolicy* device_policy = new policy::MockDevicePolicy();
450 attempter_.policy_provider_.reset(new policy::PolicyProvider(device_policy));
451
452 EXPECT_CALL(*device_policy, LoadPolicy()).WillRepeatedly(Return(true));
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700453 fake_system_state_.set_device_policy(device_policy);
Chris Sosa76a29ae2013-07-11 17:59:24 -0700454
Don Garrett6646b442013-11-13 15:29:11 -0800455 if (!valid_slot) {
Chris Sosa44b9b7e2014-04-02 13:53:46 -0700456 // References bootable kernels in fake_hardware.h
457 string rollback_kernel = "/dev/sdz2";
Don Garrett6646b442013-11-13 15:29:11 -0800458 LOG(INFO) << "Test Mark Unbootable: " << rollback_kernel;
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700459 fake_system_state_.fake_hardware()->MarkKernelUnbootable(
Don Garrett6646b442013-11-13 15:29:11 -0800460 rollback_kernel);
461 }
462
Chris Sosa28e479c2013-07-12 11:39:53 -0700463 bool is_rollback_allowed = false;
Chris Sosa76a29ae2013-07-11 17:59:24 -0700464
Chris Sosad38b1132014-03-25 10:43:59 -0700465 // We only allow rollback on devices that are not enterprise enrolled and
466 // which have a valid slot to rollback to.
467 if (!enterprise_rollback && valid_slot) {
Chris Sosa28e479c2013-07-12 11:39:53 -0700468 is_rollback_allowed = true;
469 }
470
Don Garrett6646b442013-11-13 15:29:11 -0800471 if (enterprise_rollback) {
Chris Sosa28e479c2013-07-12 11:39:53 -0700472 // We return an empty owner as this is an enterprise.
Don Garrett6646b442013-11-13 15:29:11 -0800473 EXPECT_CALL(*device_policy, GetOwner(_)).WillRepeatedly(
Alex Deymof329b932014-10-30 01:37:48 -0700474 DoAll(SetArgumentPointee<0>(string("")),
Chris Sosa28e479c2013-07-12 11:39:53 -0700475 Return(true)));
476 } else {
477 // We return a fake owner as this is an owned consumer device.
Don Garrett6646b442013-11-13 15:29:11 -0800478 EXPECT_CALL(*device_policy, GetOwner(_)).WillRepeatedly(
Alex Deymof329b932014-10-30 01:37:48 -0700479 DoAll(SetArgumentPointee<0>(string("fake.mail@fake.com")),
Chris Sosa76a29ae2013-07-11 17:59:24 -0700480 Return(true)));
Chris Sosa28e479c2013-07-12 11:39:53 -0700481 }
Chris Sosa76a29ae2013-07-11 17:59:24 -0700482
Chris Sosa28e479c2013-07-12 11:39:53 -0700483 if (is_rollback_allowed) {
Chris Sosa76a29ae2013-07-11 17:59:24 -0700484 InSequence s;
485 for (size_t i = 0; i < arraysize(kRollbackActionTypes); ++i) {
486 EXPECT_CALL(*processor_,
487 EnqueueAction(Property(&AbstractAction::Type,
Gilad Arnold74b5f552014-10-07 08:17:16 -0700488 kRollbackActionTypes[i])));
Chris Sosa76a29ae2013-07-11 17:59:24 -0700489 }
Gilad Arnold74b5f552014-10-07 08:17:16 -0700490 EXPECT_CALL(*processor_, StartProcessing());
Chris Sosa76a29ae2013-07-11 17:59:24 -0700491
Chris Sosa44b9b7e2014-04-02 13:53:46 -0700492 EXPECT_TRUE(attempter_.Rollback(true));
Alex Deymo60ca1a72015-06-18 18:19:15 -0700493 loop_.PostTask(FROM_HERE,
494 base::Bind(&UpdateAttempterTest::RollbackTestVerify,
495 base::Unretained(this)));
Chris Sosa76a29ae2013-07-11 17:59:24 -0700496 } else {
Chris Sosa44b9b7e2014-04-02 13:53:46 -0700497 EXPECT_FALSE(attempter_.Rollback(true));
Alex Deymo60ca1a72015-06-18 18:19:15 -0700498 loop_.BreakLoop();
Chris Sosa76a29ae2013-07-11 17:59:24 -0700499 }
500}
501
502void UpdateAttempterTest::RollbackTestVerify() {
503 // Verifies the actions that were enqueued.
504 EXPECT_EQ(&attempter_, processor_->delegate());
505 EXPECT_EQ(arraysize(kRollbackActionTypes), attempter_.actions_.size());
506 for (size_t i = 0; i < arraysize(kRollbackActionTypes); ++i) {
507 EXPECT_EQ(kRollbackActionTypes[i], attempter_.actions_[i]->Type());
508 }
509 EXPECT_EQ(UPDATE_STATUS_ATTEMPTING_ROLLBACK, attempter_.status());
510 InstallPlanAction* install_plan_action =
511 dynamic_cast<InstallPlanAction*>(attempter_.actions_[0].get());
512 InstallPlan* install_plan = install_plan_action->install_plan();
Chris Sosa44b9b7e2014-04-02 13:53:46 -0700513 // Matches fake_hardware.h -> rollback should move from kernel/boot device
514 // pair to other pair.
515 EXPECT_EQ(install_plan->install_path, string("/dev/sdz3"));
516 EXPECT_EQ(install_plan->kernel_install_path, string("/dev/sdz2"));
Chris Sosa76a29ae2013-07-11 17:59:24 -0700517 EXPECT_EQ(install_plan->powerwash_required, true);
Alex Deymo60ca1a72015-06-18 18:19:15 -0700518 loop_.BreakLoop();
Chris Sosa76a29ae2013-07-11 17:59:24 -0700519}
520
Darin Petkove6ef2f82011-03-07 17:31:11 -0800521TEST_F(UpdateAttempterTest, UpdateTest) {
Alex Deymo461b2592015-07-24 20:10:52 -0700522 UpdateTestStart();
Alex Deymo60ca1a72015-06-18 18:19:15 -0700523 loop_.Run();
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700524}
525
Chris Sosa76a29ae2013-07-11 17:59:24 -0700526TEST_F(UpdateAttempterTest, RollbackTest) {
Alex Deymo60ca1a72015-06-18 18:19:15 -0700527 loop_.PostTask(FROM_HERE,
528 base::Bind(&UpdateAttempterTest::RollbackTestStart,
529 base::Unretained(this),
530 false, true));
531 loop_.Run();
Chris Sosa76a29ae2013-07-11 17:59:24 -0700532}
533
Don Garrett6646b442013-11-13 15:29:11 -0800534TEST_F(UpdateAttempterTest, InvalidSlotRollbackTest) {
Alex Deymo60ca1a72015-06-18 18:19:15 -0700535 loop_.PostTask(FROM_HERE,
536 base::Bind(&UpdateAttempterTest::RollbackTestStart,
537 base::Unretained(this),
538 false, false));
539 loop_.Run();
Don Garrett6646b442013-11-13 15:29:11 -0800540}
541
Chris Sosa76a29ae2013-07-11 17:59:24 -0700542TEST_F(UpdateAttempterTest, EnterpriseRollbackTest) {
Alex Deymo60ca1a72015-06-18 18:19:15 -0700543 loop_.PostTask(FROM_HERE,
544 base::Bind(&UpdateAttempterTest::RollbackTestStart,
545 base::Unretained(this),
546 true, true));
547 loop_.Run();
Chris Sosa76a29ae2013-07-11 17:59:24 -0700548}
549
Thieu Le116fda32011-04-19 11:01:54 -0700550void UpdateAttempterTest::PingOmahaTestStart() {
551 EXPECT_CALL(*processor_,
552 EnqueueAction(Property(&AbstractAction::Type,
Gilad Arnold74b5f552014-10-07 08:17:16 -0700553 OmahaRequestAction::StaticType())));
554 EXPECT_CALL(*processor_, StartProcessing());
Thieu Le116fda32011-04-19 11:01:54 -0700555 attempter_.PingOmaha();
Alex Deymo60ca1a72015-06-18 18:19:15 -0700556 ScheduleQuitMainLoop();
Thieu Le116fda32011-04-19 11:01:54 -0700557}
558
559TEST_F(UpdateAttempterTest, PingOmahaTest) {
Gilad Arnoldec7f9162014-07-15 13:24:46 -0700560 EXPECT_FALSE(attempter_.waiting_for_scheduled_check_);
561 EXPECT_FALSE(attempter_.schedule_updates_called());
562 // Disable scheduling of subsequnet checks; we're using the DefaultPolicy in
563 // testing, which is more permissive than we want to handle here.
564 attempter_.DisableScheduleUpdates();
Alex Deymo60ca1a72015-06-18 18:19:15 -0700565 loop_.PostTask(FROM_HERE,
566 base::Bind(&UpdateAttempterTest::PingOmahaTestStart,
567 base::Unretained(this)));
568 chromeos::MessageLoopRunMaxIterations(&loop_, 100);
Thieu Le116fda32011-04-19 11:01:54 -0700569 EXPECT_EQ(UPDATE_STATUS_UPDATED_NEED_REBOOT, attempter_.status());
Gilad Arnoldec7f9162014-07-15 13:24:46 -0700570 EXPECT_TRUE(attempter_.schedule_updates_called());
Thieu Le116fda32011-04-19 11:01:54 -0700571}
572
Darin Petkov18c7bce2011-06-16 14:07:00 -0700573TEST_F(UpdateAttempterTest, CreatePendingErrorEventTest) {
Alex Deymo8427b4a2014-11-05 14:00:32 -0800574 MockAction action;
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700575 const ErrorCode kCode = ErrorCode::kDownloadTransferError;
Darin Petkov18c7bce2011-06-16 14:07:00 -0700576 attempter_.CreatePendingErrorEvent(&action, kCode);
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700577 ASSERT_NE(nullptr, attempter_.error_event_.get());
Darin Petkov18c7bce2011-06-16 14:07:00 -0700578 EXPECT_EQ(OmahaEvent::kTypeUpdateComplete, attempter_.error_event_->type);
579 EXPECT_EQ(OmahaEvent::kResultError, attempter_.error_event_->result);
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700580 EXPECT_EQ(
581 static_cast<ErrorCode>(static_cast<int>(kCode) |
582 static_cast<int>(ErrorCode::kTestOmahaUrlFlag)),
583 attempter_.error_event_->error_code);
Darin Petkov18c7bce2011-06-16 14:07:00 -0700584}
585
586TEST_F(UpdateAttempterTest, CreatePendingErrorEventResumedTest) {
587 OmahaResponseHandlerAction *response_action =
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700588 new OmahaResponseHandlerAction(&fake_system_state_);
Darin Petkov18c7bce2011-06-16 14:07:00 -0700589 response_action->install_plan_.is_resume = true;
590 attempter_.response_handler_action_.reset(response_action);
Alex Deymo8427b4a2014-11-05 14:00:32 -0800591 MockAction action;
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700592 const ErrorCode kCode = ErrorCode::kInstallDeviceOpenError;
Darin Petkov18c7bce2011-06-16 14:07:00 -0700593 attempter_.CreatePendingErrorEvent(&action, kCode);
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700594 ASSERT_NE(nullptr, attempter_.error_event_.get());
Darin Petkov18c7bce2011-06-16 14:07:00 -0700595 EXPECT_EQ(OmahaEvent::kTypeUpdateComplete, attempter_.error_event_->type);
596 EXPECT_EQ(OmahaEvent::kResultError, attempter_.error_event_->result);
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700597 EXPECT_EQ(
598 static_cast<ErrorCode>(
599 static_cast<int>(kCode) |
600 static_cast<int>(ErrorCode::kResumedFlag) |
601 static_cast<int>(ErrorCode::kTestOmahaUrlFlag)),
602 attempter_.error_event_->error_code);
Darin Petkov18c7bce2011-06-16 14:07:00 -0700603}
604
David Zeuthen8f191b22013-08-06 12:27:50 -0700605TEST_F(UpdateAttempterTest, P2PNotStartedAtStartupWhenNotEnabled) {
606 MockP2PManager mock_p2p_manager;
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700607 fake_system_state_.set_p2p_manager(&mock_p2p_manager);
David Zeuthen8f191b22013-08-06 12:27:50 -0700608 mock_p2p_manager.fake().SetP2PEnabled(false);
609 EXPECT_CALL(mock_p2p_manager, EnsureP2PRunning()).Times(0);
610 attempter_.UpdateEngineStarted();
611}
612
613TEST_F(UpdateAttempterTest, P2PNotStartedAtStartupWhenEnabledButNotSharing) {
614 MockP2PManager mock_p2p_manager;
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700615 fake_system_state_.set_p2p_manager(&mock_p2p_manager);
David Zeuthen8f191b22013-08-06 12:27:50 -0700616 mock_p2p_manager.fake().SetP2PEnabled(true);
617 EXPECT_CALL(mock_p2p_manager, EnsureP2PRunning()).Times(0);
618 attempter_.UpdateEngineStarted();
619}
620
621TEST_F(UpdateAttempterTest, P2PStartedAtStartupWhenEnabledAndSharing) {
622 MockP2PManager mock_p2p_manager;
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700623 fake_system_state_.set_p2p_manager(&mock_p2p_manager);
David Zeuthen8f191b22013-08-06 12:27:50 -0700624 mock_p2p_manager.fake().SetP2PEnabled(true);
625 mock_p2p_manager.fake().SetCountSharedFilesResult(1);
Gilad Arnold74b5f552014-10-07 08:17:16 -0700626 EXPECT_CALL(mock_p2p_manager, EnsureP2PRunning());
David Zeuthen8f191b22013-08-06 12:27:50 -0700627 attempter_.UpdateEngineStarted();
628}
629
630TEST_F(UpdateAttempterTest, P2PNotEnabled) {
Alex Deymo60ca1a72015-06-18 18:19:15 -0700631 loop_.PostTask(FROM_HERE,
632 base::Bind(&UpdateAttempterTest::P2PNotEnabledStart,
633 base::Unretained(this)));
634 loop_.Run();
David Zeuthen8f191b22013-08-06 12:27:50 -0700635}
Alex Deymo60ca1a72015-06-18 18:19:15 -0700636
David Zeuthen8f191b22013-08-06 12:27:50 -0700637void UpdateAttempterTest::P2PNotEnabledStart() {
638 // If P2P is not enabled, check that we do not attempt housekeeping
639 // and do not convey that p2p is to be used.
640 MockP2PManager mock_p2p_manager;
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700641 fake_system_state_.set_p2p_manager(&mock_p2p_manager);
David Zeuthen8f191b22013-08-06 12:27:50 -0700642 mock_p2p_manager.fake().SetP2PEnabled(false);
643 EXPECT_CALL(mock_p2p_manager, PerformHousekeeping()).Times(0);
Gilad Arnoldec7f9162014-07-15 13:24:46 -0700644 attempter_.Update("", "", "", "", false, false);
Alex Deymo60ca1a72015-06-18 18:19:15 -0700645 EXPECT_FALSE(actual_using_p2p_for_downloading_);
Gilad Arnold74b5f552014-10-07 08:17:16 -0700646 EXPECT_FALSE(actual_using_p2p_for_sharing());
Alex Deymo60ca1a72015-06-18 18:19:15 -0700647 ScheduleQuitMainLoop();
David Zeuthen8f191b22013-08-06 12:27:50 -0700648}
649
650TEST_F(UpdateAttempterTest, P2PEnabledStartingFails) {
Alex Deymo60ca1a72015-06-18 18:19:15 -0700651 loop_.PostTask(FROM_HERE,
652 base::Bind(&UpdateAttempterTest::P2PEnabledStartingFailsStart,
653 base::Unretained(this)));
654 loop_.Run();
David Zeuthen8f191b22013-08-06 12:27:50 -0700655}
Alex Deymo60ca1a72015-06-18 18:19:15 -0700656
David Zeuthen8f191b22013-08-06 12:27:50 -0700657void UpdateAttempterTest::P2PEnabledStartingFailsStart() {
658 // If p2p is enabled, but starting it fails ensure we don't do
659 // any housekeeping and do not convey that p2p should be used.
660 MockP2PManager mock_p2p_manager;
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700661 fake_system_state_.set_p2p_manager(&mock_p2p_manager);
David Zeuthen8f191b22013-08-06 12:27:50 -0700662 mock_p2p_manager.fake().SetP2PEnabled(true);
663 mock_p2p_manager.fake().SetEnsureP2PRunningResult(false);
664 mock_p2p_manager.fake().SetPerformHousekeepingResult(false);
665 EXPECT_CALL(mock_p2p_manager, PerformHousekeeping()).Times(0);
Gilad Arnoldec7f9162014-07-15 13:24:46 -0700666 attempter_.Update("", "", "", "", false, false);
Gilad Arnold74b5f552014-10-07 08:17:16 -0700667 EXPECT_FALSE(actual_using_p2p_for_downloading());
668 EXPECT_FALSE(actual_using_p2p_for_sharing());
Alex Deymo60ca1a72015-06-18 18:19:15 -0700669 ScheduleQuitMainLoop();
David Zeuthen8f191b22013-08-06 12:27:50 -0700670}
671
672TEST_F(UpdateAttempterTest, P2PEnabledHousekeepingFails) {
Alex Deymo60ca1a72015-06-18 18:19:15 -0700673 loop_.PostTask(
674 FROM_HERE,
675 base::Bind(&UpdateAttempterTest::P2PEnabledHousekeepingFailsStart,
676 base::Unretained(this)));
677 loop_.Run();
David Zeuthen8f191b22013-08-06 12:27:50 -0700678}
Alex Deymo60ca1a72015-06-18 18:19:15 -0700679
David Zeuthen8f191b22013-08-06 12:27:50 -0700680void UpdateAttempterTest::P2PEnabledHousekeepingFailsStart() {
681 // If p2p is enabled, starting it works but housekeeping fails, ensure
682 // we do not convey p2p is to be used.
683 MockP2PManager mock_p2p_manager;
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700684 fake_system_state_.set_p2p_manager(&mock_p2p_manager);
David Zeuthen8f191b22013-08-06 12:27:50 -0700685 mock_p2p_manager.fake().SetP2PEnabled(true);
686 mock_p2p_manager.fake().SetEnsureP2PRunningResult(true);
687 mock_p2p_manager.fake().SetPerformHousekeepingResult(false);
Gilad Arnold74b5f552014-10-07 08:17:16 -0700688 EXPECT_CALL(mock_p2p_manager, PerformHousekeeping());
Gilad Arnoldec7f9162014-07-15 13:24:46 -0700689 attempter_.Update("", "", "", "", false, false);
Gilad Arnold74b5f552014-10-07 08:17:16 -0700690 EXPECT_FALSE(actual_using_p2p_for_downloading());
691 EXPECT_FALSE(actual_using_p2p_for_sharing());
Alex Deymo60ca1a72015-06-18 18:19:15 -0700692 ScheduleQuitMainLoop();
David Zeuthen8f191b22013-08-06 12:27:50 -0700693}
694
695TEST_F(UpdateAttempterTest, P2PEnabled) {
Alex Deymo60ca1a72015-06-18 18:19:15 -0700696 loop_.PostTask(FROM_HERE,
697 base::Bind(&UpdateAttempterTest::P2PEnabledStart,
698 base::Unretained(this)));
699 loop_.Run();
David Zeuthen8f191b22013-08-06 12:27:50 -0700700}
Alex Deymo60ca1a72015-06-18 18:19:15 -0700701
David Zeuthen8f191b22013-08-06 12:27:50 -0700702void UpdateAttempterTest::P2PEnabledStart() {
703 MockP2PManager mock_p2p_manager;
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700704 fake_system_state_.set_p2p_manager(&mock_p2p_manager);
David Zeuthen8f191b22013-08-06 12:27:50 -0700705 // If P2P is enabled and starting it works, check that we performed
706 // housekeeping and that we convey p2p should be used.
707 mock_p2p_manager.fake().SetP2PEnabled(true);
708 mock_p2p_manager.fake().SetEnsureP2PRunningResult(true);
709 mock_p2p_manager.fake().SetPerformHousekeepingResult(true);
Gilad Arnold74b5f552014-10-07 08:17:16 -0700710 EXPECT_CALL(mock_p2p_manager, PerformHousekeeping());
Gilad Arnoldec7f9162014-07-15 13:24:46 -0700711 attempter_.Update("", "", "", "", false, false);
Gilad Arnold74b5f552014-10-07 08:17:16 -0700712 EXPECT_TRUE(actual_using_p2p_for_downloading());
713 EXPECT_TRUE(actual_using_p2p_for_sharing());
Alex Deymo60ca1a72015-06-18 18:19:15 -0700714 ScheduleQuitMainLoop();
David Zeuthen8f191b22013-08-06 12:27:50 -0700715}
716
717TEST_F(UpdateAttempterTest, P2PEnabledInteractive) {
Alex Deymo60ca1a72015-06-18 18:19:15 -0700718 loop_.PostTask(FROM_HERE,
719 base::Bind(&UpdateAttempterTest::P2PEnabledInteractiveStart,
720 base::Unretained(this)));
721 loop_.Run();
David Zeuthen8f191b22013-08-06 12:27:50 -0700722}
Alex Deymo60ca1a72015-06-18 18:19:15 -0700723
David Zeuthen8f191b22013-08-06 12:27:50 -0700724void UpdateAttempterTest::P2PEnabledInteractiveStart() {
725 MockP2PManager mock_p2p_manager;
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700726 fake_system_state_.set_p2p_manager(&mock_p2p_manager);
David Zeuthen8f191b22013-08-06 12:27:50 -0700727 // For an interactive check, if P2P is enabled and starting it
728 // works, check that we performed housekeeping and that we convey
729 // p2p should be used for sharing but NOT for downloading.
730 mock_p2p_manager.fake().SetP2PEnabled(true);
731 mock_p2p_manager.fake().SetEnsureP2PRunningResult(true);
732 mock_p2p_manager.fake().SetPerformHousekeepingResult(true);
Gilad Arnold74b5f552014-10-07 08:17:16 -0700733 EXPECT_CALL(mock_p2p_manager, PerformHousekeeping());
Gilad Arnoldec7f9162014-07-15 13:24:46 -0700734 attempter_.Update("", "", "", "", false, true /* interactive */);
Gilad Arnold74b5f552014-10-07 08:17:16 -0700735 EXPECT_FALSE(actual_using_p2p_for_downloading());
736 EXPECT_TRUE(actual_using_p2p_for_sharing());
Alex Deymo60ca1a72015-06-18 18:19:15 -0700737 ScheduleQuitMainLoop();
David Zeuthen8f191b22013-08-06 12:27:50 -0700738}
739
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700740TEST_F(UpdateAttempterTest, ReadScatterFactorFromPolicy) {
Alex Deymo60ca1a72015-06-18 18:19:15 -0700741 loop_.PostTask(
742 FROM_HERE,
743 base::Bind(&UpdateAttempterTest::ReadScatterFactorFromPolicyTestStart,
744 base::Unretained(this)));
745 loop_.Run();
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700746}
747
748// Tests that the scatter_factor_in_seconds value is properly fetched
749// from the device policy.
750void UpdateAttempterTest::ReadScatterFactorFromPolicyTestStart() {
Ben Chan9abb7632014-08-07 00:10:53 -0700751 int64_t scatter_factor_in_seconds = 36000;
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700752
753 policy::MockDevicePolicy* device_policy = new policy::MockDevicePolicy();
754 attempter_.policy_provider_.reset(new policy::PolicyProvider(device_policy));
755
756 EXPECT_CALL(*device_policy, LoadPolicy()).WillRepeatedly(Return(true));
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700757 fake_system_state_.set_device_policy(device_policy);
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700758
759 EXPECT_CALL(*device_policy, GetScatterFactorInSeconds(_))
760 .WillRepeatedly(DoAll(
761 SetArgumentPointee<0>(scatter_factor_in_seconds),
762 Return(true)));
763
Gilad Arnoldec7f9162014-07-15 13:24:46 -0700764 attempter_.Update("", "", "", "", false, false);
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700765 EXPECT_EQ(scatter_factor_in_seconds, attempter_.scatter_factor_.InSeconds());
766
Alex Deymo60ca1a72015-06-18 18:19:15 -0700767 ScheduleQuitMainLoop();
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700768}
769
770TEST_F(UpdateAttempterTest, DecrementUpdateCheckCountTest) {
Alex Deymo60ca1a72015-06-18 18:19:15 -0700771 loop_.PostTask(
772 FROM_HERE,
773 base::Bind(&UpdateAttempterTest::DecrementUpdateCheckCountTestStart,
774 base::Unretained(this)));
775 loop_.Run();
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700776}
777
778void UpdateAttempterTest::DecrementUpdateCheckCountTestStart() {
779 // Tests that the scatter_factor_in_seconds value is properly fetched
780 // from the device policy and is decremented if value > 0.
Ben Chan9abb7632014-08-07 00:10:53 -0700781 int64_t initial_value = 5;
Alex Deymo2c0db7b2014-11-04 12:23:39 -0800782 FakePrefs fake_prefs;
783 attempter_.prefs_ = &fake_prefs;
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700784
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700785 fake_system_state_.fake_hardware()->SetIsOOBEComplete(Time::UnixEpoch());
Jay Srinivasan08fce042012-06-07 16:31:01 -0700786
Alex Deymo2c0db7b2014-11-04 12:23:39 -0800787 EXPECT_TRUE(fake_prefs.SetInt64(kPrefsUpdateCheckCount, initial_value));
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700788
Ben Chan9abb7632014-08-07 00:10:53 -0700789 int64_t scatter_factor_in_seconds = 10;
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700790
791 policy::MockDevicePolicy* device_policy = new policy::MockDevicePolicy();
792 attempter_.policy_provider_.reset(new policy::PolicyProvider(device_policy));
793
794 EXPECT_CALL(*device_policy, LoadPolicy()).WillRepeatedly(Return(true));
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700795 fake_system_state_.set_device_policy(device_policy);
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700796
797 EXPECT_CALL(*device_policy, GetScatterFactorInSeconds(_))
798 .WillRepeatedly(DoAll(
799 SetArgumentPointee<0>(scatter_factor_in_seconds),
800 Return(true)));
801
Gilad Arnoldec7f9162014-07-15 13:24:46 -0700802 attempter_.Update("", "", "", "", false, false);
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700803 EXPECT_EQ(scatter_factor_in_seconds, attempter_.scatter_factor_.InSeconds());
804
805 // Make sure the file still exists.
Alex Deymo2c0db7b2014-11-04 12:23:39 -0800806 EXPECT_TRUE(fake_prefs.Exists(kPrefsUpdateCheckCount));
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700807
Ben Chan9abb7632014-08-07 00:10:53 -0700808 int64_t new_value;
Alex Deymo2c0db7b2014-11-04 12:23:39 -0800809 EXPECT_TRUE(fake_prefs.GetInt64(kPrefsUpdateCheckCount, &new_value));
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700810 EXPECT_EQ(initial_value - 1, new_value);
811
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700812 EXPECT_TRUE(
813 attempter_.omaha_request_params_->update_check_count_wait_enabled());
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700814
815 // However, if the count is already 0, it's not decremented. Test that.
816 initial_value = 0;
Alex Deymo2c0db7b2014-11-04 12:23:39 -0800817 EXPECT_TRUE(fake_prefs.SetInt64(kPrefsUpdateCheckCount, initial_value));
Gilad Arnoldec7f9162014-07-15 13:24:46 -0700818 attempter_.Update("", "", "", "", false, false);
Alex Deymo2c0db7b2014-11-04 12:23:39 -0800819 EXPECT_TRUE(fake_prefs.Exists(kPrefsUpdateCheckCount));
820 EXPECT_TRUE(fake_prefs.GetInt64(kPrefsUpdateCheckCount, &new_value));
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700821 EXPECT_EQ(initial_value, new_value);
822
Alex Deymo60ca1a72015-06-18 18:19:15 -0700823 ScheduleQuitMainLoop();
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700824}
825
Jay Srinivasan08fce042012-06-07 16:31:01 -0700826TEST_F(UpdateAttempterTest, NoScatteringDoneDuringManualUpdateTestStart) {
Alex Deymo60ca1a72015-06-18 18:19:15 -0700827 loop_.PostTask(FROM_HERE, base::Bind(
828 &UpdateAttempterTest::NoScatteringDoneDuringManualUpdateTestStart,
829 base::Unretained(this)));
830 loop_.Run();
Jay Srinivasan08fce042012-06-07 16:31:01 -0700831}
832
833void UpdateAttempterTest::NoScatteringDoneDuringManualUpdateTestStart() {
834 // Tests that no scattering logic is enabled if the update check
835 // is manually done (as opposed to a scheduled update check)
Ben Chan9abb7632014-08-07 00:10:53 -0700836 int64_t initial_value = 8;
Alex Deymo2c0db7b2014-11-04 12:23:39 -0800837 FakePrefs fake_prefs;
838 attempter_.prefs_ = &fake_prefs;
Jay Srinivasan08fce042012-06-07 16:31:01 -0700839
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700840 fake_system_state_.fake_hardware()->SetIsOOBEComplete(Time::UnixEpoch());
Alex Deymo2c0db7b2014-11-04 12:23:39 -0800841 fake_system_state_.set_prefs(&fake_prefs);
Jay Srinivasan08fce042012-06-07 16:31:01 -0700842
Alex Deymo2c0db7b2014-11-04 12:23:39 -0800843 EXPECT_TRUE(fake_prefs.SetInt64(kPrefsWallClockWaitPeriod, initial_value));
844 EXPECT_TRUE(fake_prefs.SetInt64(kPrefsUpdateCheckCount, initial_value));
Jay Srinivasan08fce042012-06-07 16:31:01 -0700845
846 // make sure scatter_factor is non-zero as scattering is disabled
847 // otherwise.
Ben Chan9abb7632014-08-07 00:10:53 -0700848 int64_t scatter_factor_in_seconds = 50;
Jay Srinivasan08fce042012-06-07 16:31:01 -0700849
850 policy::MockDevicePolicy* device_policy = new policy::MockDevicePolicy();
851 attempter_.policy_provider_.reset(new policy::PolicyProvider(device_policy));
852
853 EXPECT_CALL(*device_policy, LoadPolicy()).WillRepeatedly(Return(true));
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700854 fake_system_state_.set_device_policy(device_policy);
Jay Srinivasan08fce042012-06-07 16:31:01 -0700855
856 EXPECT_CALL(*device_policy, GetScatterFactorInSeconds(_))
857 .WillRepeatedly(DoAll(
858 SetArgumentPointee<0>(scatter_factor_in_seconds),
859 Return(true)));
860
Gilad Arnoldb92f0df2013-01-10 16:32:45 -0800861 // Trigger an interactive check so we can test that scattering is disabled.
Gilad Arnoldec7f9162014-07-15 13:24:46 -0700862 attempter_.Update("", "", "", "", false, true);
Jay Srinivasan08fce042012-06-07 16:31:01 -0700863 EXPECT_EQ(scatter_factor_in_seconds, attempter_.scatter_factor_.InSeconds());
864
865 // Make sure scattering is disabled for manual (i.e. user initiated) update
Jay Srinivasan21be0752012-07-25 15:44:56 -0700866 // checks and all artifacts are removed.
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700867 EXPECT_FALSE(
868 attempter_.omaha_request_params_->wall_clock_based_wait_enabled());
Alex Deymo2c0db7b2014-11-04 12:23:39 -0800869 EXPECT_FALSE(fake_prefs.Exists(kPrefsWallClockWaitPeriod));
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700870 EXPECT_EQ(0, attempter_.omaha_request_params_->waiting_period().InSeconds());
871 EXPECT_FALSE(
872 attempter_.omaha_request_params_->update_check_count_wait_enabled());
Alex Deymo2c0db7b2014-11-04 12:23:39 -0800873 EXPECT_FALSE(fake_prefs.Exists(kPrefsUpdateCheckCount));
Jay Srinivasan08fce042012-06-07 16:31:01 -0700874
Alex Deymo60ca1a72015-06-18 18:19:15 -0700875 ScheduleQuitMainLoop();
Jay Srinivasan08fce042012-06-07 16:31:01 -0700876}
877
David Zeuthen985b1122013-10-09 12:13:15 -0700878// Checks that we only report daily metrics at most every 24 hours.
879TEST_F(UpdateAttempterTest, ReportDailyMetrics) {
880 FakeClock fake_clock;
Alex Deymo2c0db7b2014-11-04 12:23:39 -0800881 FakePrefs fake_prefs;
David Zeuthen985b1122013-10-09 12:13:15 -0700882
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700883 fake_system_state_.set_clock(&fake_clock);
Alex Deymo2c0db7b2014-11-04 12:23:39 -0800884 fake_system_state_.set_prefs(&fake_prefs);
David Zeuthen985b1122013-10-09 12:13:15 -0700885
886 Time epoch = Time::FromInternalValue(0);
887 fake_clock.SetWallclockTime(epoch);
888
889 // If there is no kPrefsDailyMetricsLastReportedAt state variable,
890 // we should report.
891 EXPECT_TRUE(attempter_.CheckAndReportDailyMetrics());
892 // We should not report again if no time has passed.
893 EXPECT_FALSE(attempter_.CheckAndReportDailyMetrics());
894
895 // We should not report if only 10 hours has passed.
896 fake_clock.SetWallclockTime(epoch + TimeDelta::FromHours(10));
897 EXPECT_FALSE(attempter_.CheckAndReportDailyMetrics());
898
899 // We should not report if only 24 hours - 1 sec has passed.
900 fake_clock.SetWallclockTime(epoch + TimeDelta::FromHours(24) -
901 TimeDelta::FromSeconds(1));
902 EXPECT_FALSE(attempter_.CheckAndReportDailyMetrics());
903
904 // We should report if 24 hours has passed.
905 fake_clock.SetWallclockTime(epoch + TimeDelta::FromHours(24));
906 EXPECT_TRUE(attempter_.CheckAndReportDailyMetrics());
907
908 // But then we should not report again..
909 EXPECT_FALSE(attempter_.CheckAndReportDailyMetrics());
910
911 // .. until another 24 hours has passed
912 fake_clock.SetWallclockTime(epoch + TimeDelta::FromHours(47));
913 EXPECT_FALSE(attempter_.CheckAndReportDailyMetrics());
914 fake_clock.SetWallclockTime(epoch + TimeDelta::FromHours(48));
915 EXPECT_TRUE(attempter_.CheckAndReportDailyMetrics());
916 EXPECT_FALSE(attempter_.CheckAndReportDailyMetrics());
917
918 // .. and another 24 hours
919 fake_clock.SetWallclockTime(epoch + TimeDelta::FromHours(71));
920 EXPECT_FALSE(attempter_.CheckAndReportDailyMetrics());
921 fake_clock.SetWallclockTime(epoch + TimeDelta::FromHours(72));
922 EXPECT_TRUE(attempter_.CheckAndReportDailyMetrics());
923 EXPECT_FALSE(attempter_.CheckAndReportDailyMetrics());
924
925 // If the span between time of reporting and present time is
926 // negative, we report. This is in order to reset the timestamp and
927 // avoid an edge condition whereby a distant point in the future is
928 // in the state variable resulting in us never ever reporting again.
929 fake_clock.SetWallclockTime(epoch + TimeDelta::FromHours(71));
930 EXPECT_TRUE(attempter_.CheckAndReportDailyMetrics());
931 EXPECT_FALSE(attempter_.CheckAndReportDailyMetrics());
932
933 // In this case we should not update until the clock reads 71 + 24 = 95.
934 // Check that.
935 fake_clock.SetWallclockTime(epoch + TimeDelta::FromHours(94));
936 EXPECT_FALSE(attempter_.CheckAndReportDailyMetrics());
937 fake_clock.SetWallclockTime(epoch + TimeDelta::FromHours(95));
938 EXPECT_TRUE(attempter_.CheckAndReportDailyMetrics());
939 EXPECT_FALSE(attempter_.CheckAndReportDailyMetrics());
David Zeuthen985b1122013-10-09 12:13:15 -0700940}
941
David Zeuthen3c55abd2013-10-14 12:48:03 -0700942TEST_F(UpdateAttempterTest, BootTimeInUpdateMarkerFile) {
943 const string update_completed_marker = test_dir_ + "/update-completed-marker";
Alex Deymo30534502015-07-20 15:06:33 -0700944 UpdateAttempterUnderTest attempter{&fake_system_state_,
945 nullptr, // libcros_proxy
946 &debugd_proxy_mock_,
947 update_completed_marker};
David Zeuthen3c55abd2013-10-14 12:48:03 -0700948
949 FakeClock fake_clock;
950 fake_clock.SetBootTime(Time::FromTimeT(42));
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700951 fake_system_state_.set_clock(&fake_clock);
David Zeuthen3c55abd2013-10-14 12:48:03 -0700952
953 Time boot_time;
954 EXPECT_FALSE(attempter.GetBootTimeAtUpdate(&boot_time));
955
956 attempter.WriteUpdateCompletedMarker();
957
958 EXPECT_TRUE(attempter.GetBootTimeAtUpdate(&boot_time));
959 EXPECT_EQ(boot_time.ToTimeT(), 42);
960}
961
David Pursell02c18642014-11-06 11:26:11 -0800962TEST_F(UpdateAttempterTest, AnyUpdateSourceAllowedUnofficial) {
963 fake_system_state_.fake_hardware()->SetIsOfficialBuild(false);
964 EXPECT_TRUE(attempter_.IsAnyUpdateSourceAllowed());
965}
966
967TEST_F(UpdateAttempterTest, AnyUpdateSourceAllowedOfficialDevmode) {
968 fake_system_state_.fake_hardware()->SetIsOfficialBuild(true);
969 fake_system_state_.fake_hardware()->SetIsNormalBootMode(false);
Alex Deymo30534502015-07-20 15:06:33 -0700970 EXPECT_CALL(debugd_proxy_mock_, QueryDevFeatures(_, _, _))
971 .WillRepeatedly(DoAll(SetArgumentPointee<0>(0), Return(true)));
David Pursell02c18642014-11-06 11:26:11 -0800972 EXPECT_TRUE(attempter_.IsAnyUpdateSourceAllowed());
973}
974
975TEST_F(UpdateAttempterTest, AnyUpdateSourceDisallowedOfficialNormal) {
976 fake_system_state_.fake_hardware()->SetIsOfficialBuild(true);
977 fake_system_state_.fake_hardware()->SetIsNormalBootMode(true);
978 // debugd should not be queried in this case.
Alex Deymo30534502015-07-20 15:06:33 -0700979 EXPECT_CALL(debugd_proxy_mock_, QueryDevFeatures(_, _, _)).Times(0);
David Pursell02c18642014-11-06 11:26:11 -0800980 EXPECT_FALSE(attempter_.IsAnyUpdateSourceAllowed());
981}
982
983TEST_F(UpdateAttempterTest, AnyUpdateSourceDisallowedDebugdDisabled) {
984 using debugd::DEV_FEATURES_DISABLED;
985 fake_system_state_.fake_hardware()->SetIsOfficialBuild(true);
986 fake_system_state_.fake_hardware()->SetIsNormalBootMode(false);
Alex Deymo30534502015-07-20 15:06:33 -0700987 EXPECT_CALL(debugd_proxy_mock_, QueryDevFeatures(_, _, _))
988 .WillRepeatedly(
989 DoAll(SetArgumentPointee<0>(DEV_FEATURES_DISABLED), Return(true)));
David Pursell02c18642014-11-06 11:26:11 -0800990 EXPECT_FALSE(attempter_.IsAnyUpdateSourceAllowed());
991}
992
993TEST_F(UpdateAttempterTest, AnyUpdateSourceDisallowedDebugdFailure) {
994 fake_system_state_.fake_hardware()->SetIsOfficialBuild(true);
995 fake_system_state_.fake_hardware()->SetIsNormalBootMode(false);
Alex Deymo30534502015-07-20 15:06:33 -0700996 EXPECT_CALL(debugd_proxy_mock_, QueryDevFeatures(_, _, _))
David Pursell02c18642014-11-06 11:26:11 -0800997 .WillRepeatedly(Return(false));
998 EXPECT_FALSE(attempter_.IsAnyUpdateSourceAllowed());
999}
1000
1001TEST_F(UpdateAttempterTest, CheckForUpdateAUTest) {
1002 fake_system_state_.fake_hardware()->SetIsOfficialBuild(true);
1003 fake_system_state_.fake_hardware()->SetIsNormalBootMode(true);
1004 attempter_.CheckForUpdate("", "autest", true);
1005 EXPECT_EQ(chromeos_update_engine::kAUTestOmahaUrl,
1006 attempter_.forced_omaha_url());
1007}
1008
1009TEST_F(UpdateAttempterTest, CheckForUpdateScheduledAUTest) {
1010 fake_system_state_.fake_hardware()->SetIsOfficialBuild(true);
1011 fake_system_state_.fake_hardware()->SetIsNormalBootMode(true);
1012 attempter_.CheckForUpdate("", "autest-scheduled", true);
1013 EXPECT_EQ(chromeos_update_engine::kAUTestOmahaUrl,
1014 attempter_.forced_omaha_url());
1015}
1016
Darin Petkovf42cc1c2010-09-01 09:03:02 -07001017} // namespace chromeos_update_engine