blob: fb9f7bc9b77f0e3c85483c28769c291b04375218 [file] [log] [blame]
Alex Deymoaea4c1c2015-08-19 20:24:43 -07001//
2// Copyright (C) 2012 The Android Open Source Project
3//
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at
7//
8// http://www.apache.org/licenses/LICENSE-2.0
9//
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15//
Darin Petkovf42cc1c2010-09-01 09:03:02 -070016
Alex Deymo2c0db7b2014-11-04 12:23:39 -080017#include "update_engine/update_attempter.h"
18
Ben Chan9abb7632014-08-07 00:10:53 -070019#include <stdint.h>
20
Ben Chan02f7c1d2014-10-18 15:18:02 -070021#include <memory>
22
Ben Chan06c76a42014-09-05 08:21:06 -070023#include <base/files/file_util.h>
Alex Deymo0b3db6b2015-08-10 15:19:37 -070024#include <base/message_loop/message_loop.h>
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -070025#include <brillo/message_loops/base_message_loop.h>
26#include <brillo/message_loops/message_loop.h>
27#include <brillo/message_loops/message_loop_utils.h>
Darin Petkovf42cc1c2010-09-01 09:03:02 -070028#include <gtest/gtest.h>
Patrick Dubroy7fbbe8a2011-08-01 17:28:22 +020029#include <policy/libpolicy.h>
30#include <policy/mock_device_policy.h>
Marton Hunyadye58bddb2018-04-10 20:27:26 +020031#include <policy/mock_libpolicy.h>
Darin Petkovf42cc1c2010-09-01 09:03:02 -070032
Alex Deymo39910dc2015-11-09 17:04:30 -080033#include "update_engine/common/fake_clock.h"
34#include "update_engine/common/fake_prefs.h"
Alex Deymo14fd1ec2016-02-24 22:03:57 -080035#include "update_engine/common/mock_action.h"
36#include "update_engine/common/mock_action_processor.h"
Alex Deymo39910dc2015-11-09 17:04:30 -080037#include "update_engine/common/mock_http_fetcher.h"
38#include "update_engine/common/mock_prefs.h"
39#include "update_engine/common/platform_constants.h"
40#include "update_engine/common/prefs.h"
41#include "update_engine/common/test_utils.h"
42#include "update_engine/common/utils.h"
Gilad Arnold5bb4c902014-04-10 12:32:13 -070043#include "update_engine/fake_system_state.h"
David Zeuthen8f191b22013-08-06 12:27:50 -070044#include "update_engine/mock_p2p_manager.h"
Jay Srinivasan6f6ea002012-12-14 11:26:28 -080045#include "update_engine/mock_payload_state.h"
Aaron Wood9321f502017-09-07 11:18:54 -070046#include "update_engine/mock_service_observer.h"
Alex Deymo39910dc2015-11-09 17:04:30 -080047#include "update_engine/payload_consumer/filesystem_verifier_action.h"
48#include "update_engine/payload_consumer/install_plan.h"
49#include "update_engine/payload_consumer/payload_constants.h"
50#include "update_engine/payload_consumer/postinstall_runner_action.h"
Amin Hassani0882a512018-04-05 16:25:44 -070051#include "update_engine/update_boot_flags_action.h"
Darin Petkovf42cc1c2010-09-01 09:03:02 -070052
David Zeuthen985b1122013-10-09 12:13:15 -070053using base::Time;
54using base::TimeDelta;
Aaron Woodbf5a2522017-10-04 10:58:36 -070055using chromeos_update_manager::EvalStatus;
Adolfo Victoria497044c2018-07-18 07:51:42 -070056using chromeos_update_manager::StagingSchedule;
Aaron Woodbf5a2522017-10-04 10:58:36 -070057using chromeos_update_manager::UpdateCheckParams;
Adolfo Victoria497044c2018-07-18 07:51:42 -070058using policy::DevicePolicy;
Darin Petkovf42cc1c2010-09-01 09:03:02 -070059using std::string;
Ben Chan02f7c1d2014-10-18 15:18:02 -070060using std::unique_ptr;
Aaron Woodbf5a2522017-10-04 10:58:36 -070061using testing::_;
Darin Petkov36275772010-10-01 11:40:57 -070062using testing::DoAll;
Aaron Wood7f92e2b2017-08-28 14:51:21 -070063using testing::Field;
Darin Petkovf42cc1c2010-09-01 09:03:02 -070064using testing::InSequence;
Darin Petkov2dd01092010-10-08 15:43:05 -070065using testing::Ne;
Darin Petkov9c096d62010-11-17 14:49:04 -080066using testing::NiceMock;
Amin Hassanid3f4bea2018-04-30 14:52:40 -070067using testing::Pointee;
Darin Petkovf42cc1c2010-09-01 09:03:02 -070068using testing::Property;
69using testing::Return;
Gilad Arnold74b5f552014-10-07 08:17:16 -070070using testing::ReturnPointee;
Marton Hunyadye58bddb2018-04-10 20:27:26 +020071using testing::ReturnRef;
Alex Deymo2c0db7b2014-11-04 12:23:39 -080072using testing::SaveArg;
Ben Chan672c1f52017-10-23 15:41:39 -070073using testing::SetArgPointee;
Aaron Woodbf5a2522017-10-04 10:58:36 -070074using update_engine::UpdateAttemptFlags;
Aaron Wood7f92e2b2017-08-28 14:51:21 -070075using update_engine::UpdateEngineStatus;
Christopher Wiley6b6cc1b2015-10-05 17:50:07 -070076using update_engine::UpdateStatus;
Darin Petkovf42cc1c2010-09-01 09:03:02 -070077
78namespace chromeos_update_engine {
79
Marton Hunyadya0302682018-05-16 18:52:13 +020080const char kRollbackVersion[] = "10575.39.2";
81
Darin Petkovf42cc1c2010-09-01 09:03:02 -070082// Test a subclass rather than the main class directly so that we can mock out
Darin Petkovcd1666f2010-09-23 09:53:44 -070083// methods within the class. There're explicit unit tests for the mocked out
Darin Petkovf42cc1c2010-09-01 09:03:02 -070084// methods.
85class UpdateAttempterUnderTest : public UpdateAttempter {
86 public:
Jeffrey Kardatzkecf5f1f12017-10-02 16:08:44 -070087 explicit UpdateAttempterUnderTest(SystemState* system_state)
88 : UpdateAttempter(system_state, nullptr) {}
Gilad Arnoldec7f9162014-07-15 13:24:46 -070089
90 // Wrap the update scheduling method, allowing us to opt out of scheduled
91 // updates for testing purposes.
92 void ScheduleUpdates() override {
93 schedule_updates_called_ = true;
94 if (do_schedule_updates_) {
95 UpdateAttempter::ScheduleUpdates();
96 } else {
97 LOG(INFO) << "[TEST] Update scheduling disabled.";
98 }
99 }
100 void EnableScheduleUpdates() { do_schedule_updates_ = true; }
101 void DisableScheduleUpdates() { do_schedule_updates_ = false; }
102
103 // Indicates whether ScheduleUpdates() was called.
104 bool schedule_updates_called() const { return schedule_updates_called_; }
105
David Pursell02c18642014-11-06 11:26:11 -0800106 // Need to expose forced_omaha_url_ so we can test it.
Alex Deymo60ca1a72015-06-18 18:19:15 -0700107 const string& forced_omaha_url() const { return forced_omaha_url_; }
David Pursell02c18642014-11-06 11:26:11 -0800108
Gilad Arnoldec7f9162014-07-15 13:24:46 -0700109 private:
110 bool schedule_updates_called_ = false;
111 bool do_schedule_updates_ = true;
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700112};
113
114class UpdateAttempterTest : public ::testing::Test {
115 protected:
Jay Srinivasan43488792012-06-19 00:25:31 -0700116 UpdateAttempterTest()
Daniel Erate5f6f252017-04-20 12:09:58 -0600117 : certificate_checker_(fake_system_state_.mock_prefs(),
Alex Deymo33e91e72015-12-01 18:26:08 -0300118 &openssl_wrapper_) {
Gilad Arnold1f847232014-04-07 12:07:49 -0700119 // Override system state members.
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700120 fake_system_state_.set_connection_manager(&mock_connection_manager);
121 fake_system_state_.set_update_attempter(&attempter_);
Alex Deymo60ca1a72015-06-18 18:19:15 -0700122 loop_.SetAsCurrent();
Gilad Arnold1f847232014-04-07 12:07:49 -0700123
Alex Deymo33e91e72015-12-01 18:26:08 -0300124 certificate_checker_.Init();
125
Sen Jiange67bb5b2016-06-20 15:53:56 -0700126 // Finish initializing the attempter.
Gilad Arnold1f847232014-04-07 12:07:49 -0700127 attempter_.Init();
Jay Srinivasan43488792012-06-19 00:25:31 -0700128 }
Gilad Arnoldeff87cc2013-07-22 18:32:09 -0700129
Alex Deymo610277e2014-11-11 21:18:11 -0800130 void SetUp() override {
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700131 EXPECT_NE(nullptr, attempter_.system_state_);
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700132 EXPECT_EQ(0, attempter_.http_response_code_);
Christopher Wiley6b6cc1b2015-10-05 17:50:07 -0700133 EXPECT_EQ(UpdateStatus::IDLE, attempter_.status_);
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700134 EXPECT_EQ(0.0, attempter_.download_progress_);
135 EXPECT_EQ(0, attempter_.last_checked_time_);
136 EXPECT_EQ("0.0.0.0", attempter_.new_version_);
Aaron Wood7f92e2b2017-08-28 14:51:21 -0700137 EXPECT_EQ(0ULL, attempter_.new_payload_size_);
Alex Deymo8427b4a2014-11-05 14:00:32 -0800138 processor_ = new NiceMock<MockActionProcessor>();
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700139 attempter_.processor_.reset(processor_); // Transfers ownership.
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700140 prefs_ = fake_system_state_.mock_prefs();
Gilad Arnold74b5f552014-10-07 08:17:16 -0700141
142 // Set up store/load semantics of P2P properties via the mock PayloadState.
143 actual_using_p2p_for_downloading_ = false;
144 EXPECT_CALL(*fake_system_state_.mock_payload_state(),
145 SetUsingP2PForDownloading(_))
146 .WillRepeatedly(SaveArg<0>(&actual_using_p2p_for_downloading_));
147 EXPECT_CALL(*fake_system_state_.mock_payload_state(),
148 GetUsingP2PForDownloading())
149 .WillRepeatedly(ReturnPointee(&actual_using_p2p_for_downloading_));
150 actual_using_p2p_for_sharing_ = false;
151 EXPECT_CALL(*fake_system_state_.mock_payload_state(),
152 SetUsingP2PForSharing(_))
153 .WillRepeatedly(SaveArg<0>(&actual_using_p2p_for_sharing_));
154 EXPECT_CALL(*fake_system_state_.mock_payload_state(),
155 GetUsingP2PForDownloading())
156 .WillRepeatedly(ReturnPointee(&actual_using_p2p_for_sharing_));
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700157 }
158
Alex Deymo60ca1a72015-06-18 18:19:15 -0700159 public:
160 void ScheduleQuitMainLoop();
Patrick Dubroy7fbbe8a2011-08-01 17:28:22 +0200161
Alex Deymo60ca1a72015-06-18 18:19:15 -0700162 // Callbacks to run the different tests from the main loop.
Darin Petkove6ef2f82011-03-07 17:31:11 -0800163 void UpdateTestStart();
164 void UpdateTestVerify();
Alex Deymo60ca1a72015-06-18 18:19:15 -0700165 void RollbackTestStart(bool enterprise_rollback, bool valid_slot);
Chris Sosa76a29ae2013-07-11 17:59:24 -0700166 void RollbackTestVerify();
Thieu Le116fda32011-04-19 11:01:54 -0700167 void PingOmahaTestStart();
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700168 void ReadScatterFactorFromPolicyTestStart();
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700169 void DecrementUpdateCheckCountTestStart();
Jay Srinivasan08fce042012-06-07 16:31:01 -0700170 void NoScatteringDoneDuringManualUpdateTestStart();
David Zeuthen8f191b22013-08-06 12:27:50 -0700171 void P2PNotEnabledStart();
David Zeuthen8f191b22013-08-06 12:27:50 -0700172 void P2PEnabledStart();
David Zeuthen8f191b22013-08-06 12:27:50 -0700173 void P2PEnabledInteractiveStart();
David Zeuthen8f191b22013-08-06 12:27:50 -0700174 void P2PEnabledStartingFailsStart();
David Zeuthen8f191b22013-08-06 12:27:50 -0700175 void P2PEnabledHousekeepingFailsStart();
Marton Hunyadye58bddb2018-04-10 20:27:26 +0200176 void ResetRollbackHappenedStart(bool is_consumer,
177 bool is_policy_available,
178 bool expected_reset);
Adolfo Victoria497044c2018-07-18 07:51:42 -0700179 // Staging related callbacks.
180 void SetUpStagingTest(const StagingSchedule& schedule, FakePrefs* prefs);
181 void CheckStagingOff();
182 void StagingSetsPrefsAndTurnsOffScatteringStart();
183 void StagingOffIfInteractiveStart();
184 void StagingOffIfOobeStart();
David Zeuthen8f191b22013-08-06 12:27:50 -0700185
Gilad Arnold74b5f552014-10-07 08:17:16 -0700186 bool actual_using_p2p_for_downloading() {
187 return actual_using_p2p_for_downloading_;
188 }
189 bool actual_using_p2p_for_sharing() {
190 return actual_using_p2p_for_sharing_;
191 }
192
Alex Deymo0b3db6b2015-08-10 15:19:37 -0700193 base::MessageLoopForIO base_loop_;
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700194 brillo::BaseMessageLoop loop_{&base_loop_};
Alex Deymo60ca1a72015-06-18 18:19:15 -0700195
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700196 FakeSystemState fake_system_state_;
Jeffrey Kardatzkecf5f1f12017-10-02 16:08:44 -0700197 UpdateAttempterUnderTest attempter_{&fake_system_state_};
Alex Deymo33e91e72015-12-01 18:26:08 -0300198 OpenSSLWrapper openssl_wrapper_;
199 CertificateChecker certificate_checker_;
Alex Deymo30534502015-07-20 15:06:33 -0700200
Alex Deymo8427b4a2014-11-05 14:00:32 -0800201 NiceMock<MockActionProcessor>* processor_;
202 NiceMock<MockPrefs>* prefs_; // Shortcut to fake_system_state_->mock_prefs().
Jay Srinivasan55f50c22013-01-10 19:24:35 -0800203 NiceMock<MockConnectionManager> mock_connection_manager;
Gilad Arnoldeff87cc2013-07-22 18:32:09 -0700204
Gilad Arnold74b5f552014-10-07 08:17:16 -0700205 bool actual_using_p2p_for_downloading_;
206 bool actual_using_p2p_for_sharing_;
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700207};
208
Alex Deymo60ca1a72015-06-18 18:19:15 -0700209void UpdateAttempterTest::ScheduleQuitMainLoop() {
Luis Hector Chavezf1cf3482016-07-19 14:29:19 -0700210 loop_.PostTask(
211 FROM_HERE,
212 base::Bind([](brillo::BaseMessageLoop* loop) { loop->BreakLoop(); },
213 base::Unretained(&loop_)));
Alex Deymo60ca1a72015-06-18 18:19:15 -0700214}
215
Darin Petkov1b003102010-11-30 10:18:36 -0800216TEST_F(UpdateAttempterTest, ActionCompletedDownloadTest) {
Ben Chan02f7c1d2014-10-18 15:18:02 -0700217 unique_ptr<MockHttpFetcher> fetcher(new MockHttpFetcher("", 0, nullptr));
Darin Petkov1b003102010-11-30 10:18:36 -0800218 fetcher->FailTransfer(503); // Sets the HTTP response code.
Amin Hassani7ecda262017-07-11 17:10:50 -0700219 DownloadAction action(prefs_,
220 nullptr,
221 nullptr,
222 nullptr,
223 fetcher.release(),
Amin Hassanied37d682018-04-06 13:22:00 -0700224 false /* interactive */);
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800225 EXPECT_CALL(*prefs_, GetInt64(kPrefsDeltaUpdateFailures, _)).Times(0);
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700226 attempter_.ActionCompleted(nullptr, &action, ErrorCode::kSuccess);
Christopher Wiley6b6cc1b2015-10-05 17:50:07 -0700227 EXPECT_EQ(UpdateStatus::FINALIZING, attempter_.status());
Aaron Wood9321f502017-09-07 11:18:54 -0700228 EXPECT_EQ(0.0, attempter_.download_progress_);
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700229 ASSERT_EQ(nullptr, attempter_.error_event_.get());
Darin Petkov1b003102010-11-30 10:18:36 -0800230}
231
232TEST_F(UpdateAttempterTest, ActionCompletedErrorTest) {
Alex Deymo8427b4a2014-11-05 14:00:32 -0800233 MockAction action;
234 EXPECT_CALL(action, Type()).WillRepeatedly(Return("MockAction"));
Christopher Wiley6b6cc1b2015-10-05 17:50:07 -0700235 attempter_.status_ = UpdateStatus::DOWNLOADING;
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800236 EXPECT_CALL(*prefs_, GetInt64(kPrefsDeltaUpdateFailures, _))
Darin Petkov1b003102010-11-30 10:18:36 -0800237 .WillOnce(Return(false));
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700238 attempter_.ActionCompleted(nullptr, &action, ErrorCode::kError);
239 ASSERT_NE(nullptr, attempter_.error_event_.get());
Darin Petkov1b003102010-11-30 10:18:36 -0800240}
241
Aaron Wood9321f502017-09-07 11:18:54 -0700242TEST_F(UpdateAttempterTest, DownloadProgressAccumulationTest) {
243 // Simple test case, where all the values match (nothing was skipped)
244 uint64_t bytes_progressed_1 = 1024 * 1024; // 1MB
245 uint64_t bytes_progressed_2 = 1024 * 1024; // 1MB
246 uint64_t bytes_received_1 = bytes_progressed_1;
247 uint64_t bytes_received_2 = bytes_received_1 + bytes_progressed_2;
248 uint64_t bytes_total = 20 * 1024 * 1024; // 20MB
249
250 double progress_1 =
251 static_cast<double>(bytes_received_1) / static_cast<double>(bytes_total);
252 double progress_2 =
253 static_cast<double>(bytes_received_2) / static_cast<double>(bytes_total);
254
255 EXPECT_EQ(0.0, attempter_.download_progress_);
256 // This is set via inspecting the InstallPlan payloads when the
257 // OmahaResponseAction is completed
258 attempter_.new_payload_size_ = bytes_total;
259 NiceMock<MockServiceObserver> observer;
260 EXPECT_CALL(observer,
Aaron Wood7f92e2b2017-08-28 14:51:21 -0700261 SendStatusUpdate(AllOf(
262 Field(&UpdateEngineStatus::progress, progress_1),
263 Field(&UpdateEngineStatus::status, UpdateStatus::DOWNLOADING),
264 Field(&UpdateEngineStatus::new_size_bytes, bytes_total))));
Aaron Wood9321f502017-09-07 11:18:54 -0700265 EXPECT_CALL(observer,
Aaron Wood7f92e2b2017-08-28 14:51:21 -0700266 SendStatusUpdate(AllOf(
267 Field(&UpdateEngineStatus::progress, progress_2),
268 Field(&UpdateEngineStatus::status, UpdateStatus::DOWNLOADING),
269 Field(&UpdateEngineStatus::new_size_bytes, bytes_total))));
Aaron Wood9321f502017-09-07 11:18:54 -0700270 attempter_.AddObserver(&observer);
271 attempter_.BytesReceived(bytes_progressed_1, bytes_received_1, bytes_total);
272 EXPECT_EQ(progress_1, attempter_.download_progress_);
273 // This iteration validates that a later set of updates to the variables are
274 // properly handled (so that |getStatus()| will return the same progress info
275 // as the callback is receiving.
276 attempter_.BytesReceived(bytes_progressed_2, bytes_received_2, bytes_total);
277 EXPECT_EQ(progress_2, attempter_.download_progress_);
278}
279
280TEST_F(UpdateAttempterTest, ChangeToDownloadingOnReceivedBytesTest) {
281 // The transition into UpdateStatus::DOWNLOADING happens when the
282 // first bytes are received.
283 uint64_t bytes_progressed = 1024 * 1024; // 1MB
284 uint64_t bytes_received = 2 * 1024 * 1024; // 2MB
285 uint64_t bytes_total = 20 * 1024 * 1024; // 300MB
286 attempter_.status_ = UpdateStatus::CHECKING_FOR_UPDATE;
287 // This is set via inspecting the InstallPlan payloads when the
288 // OmahaResponseAction is completed
289 attempter_.new_payload_size_ = bytes_total;
290 EXPECT_EQ(0.0, attempter_.download_progress_);
291 NiceMock<MockServiceObserver> observer;
Aaron Wood7f92e2b2017-08-28 14:51:21 -0700292 EXPECT_CALL(observer,
293 SendStatusUpdate(AllOf(
294 Field(&UpdateEngineStatus::status, UpdateStatus::DOWNLOADING),
295 Field(&UpdateEngineStatus::new_size_bytes, bytes_total))));
Aaron Wood9321f502017-09-07 11:18:54 -0700296 attempter_.AddObserver(&observer);
297 attempter_.BytesReceived(bytes_progressed, bytes_received, bytes_total);
298 EXPECT_EQ(UpdateStatus::DOWNLOADING, attempter_.status_);
299}
300
301TEST_F(UpdateAttempterTest, BroadcastCompleteDownloadTest) {
302 // There is a special case to ensure that at 100% downloaded,
303 // download_progress_ is updated and that value broadcast. This test confirms
304 // that.
305 uint64_t bytes_progressed = 0; // ignored
306 uint64_t bytes_received = 5 * 1024 * 1024; // ignored
307 uint64_t bytes_total = 5 * 1024 * 1024; // 300MB
308 attempter_.status_ = UpdateStatus::DOWNLOADING;
309 attempter_.new_payload_size_ = bytes_total;
310 EXPECT_EQ(0.0, attempter_.download_progress_);
311 NiceMock<MockServiceObserver> observer;
Aaron Wood7f92e2b2017-08-28 14:51:21 -0700312 EXPECT_CALL(observer,
313 SendStatusUpdate(AllOf(
314 Field(&UpdateEngineStatus::progress, 1.0),
315 Field(&UpdateEngineStatus::status, UpdateStatus::DOWNLOADING),
316 Field(&UpdateEngineStatus::new_size_bytes, bytes_total))));
Aaron Wood9321f502017-09-07 11:18:54 -0700317 attempter_.AddObserver(&observer);
318 attempter_.BytesReceived(bytes_progressed, bytes_received, bytes_total);
319 EXPECT_EQ(1.0, attempter_.download_progress_);
320}
321
Darin Petkov1b003102010-11-30 10:18:36 -0800322TEST_F(UpdateAttempterTest, ActionCompletedOmahaRequestTest) {
Ben Chan02f7c1d2014-10-18 15:18:02 -0700323 unique_ptr<MockHttpFetcher> fetcher(new MockHttpFetcher("", 0, nullptr));
Darin Petkov1b003102010-11-30 10:18:36 -0800324 fetcher->FailTransfer(500); // Sets the HTTP response code.
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700325 OmahaRequestAction action(&fake_system_state_, nullptr,
Alex Deymoc1c17b42015-11-23 03:53:15 -0300326 std::move(fetcher), false);
Darin Petkov1b003102010-11-30 10:18:36 -0800327 ObjectCollectorAction<OmahaResponse> collector_action;
328 BondActions(&action, &collector_action);
329 OmahaResponse response;
330 response.poll_interval = 234;
331 action.SetOutputObject(response);
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800332 EXPECT_CALL(*prefs_, GetInt64(kPrefsDeltaUpdateFailures, _)).Times(0);
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700333 attempter_.ActionCompleted(nullptr, &action, ErrorCode::kSuccess);
Darin Petkov1b003102010-11-30 10:18:36 -0800334 EXPECT_EQ(500, attempter_.http_response_code());
Christopher Wiley6b6cc1b2015-10-05 17:50:07 -0700335 EXPECT_EQ(UpdateStatus::IDLE, attempter_.status());
Alex Deymo80f70ff2016-02-10 16:08:11 -0800336 EXPECT_EQ(234U, attempter_.server_dictated_poll_interval_);
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700337 ASSERT_TRUE(attempter_.error_event_.get() == nullptr);
Darin Petkov1b003102010-11-30 10:18:36 -0800338}
339
Alex Deymo30534502015-07-20 15:06:33 -0700340TEST_F(UpdateAttempterTest, ConstructWithUpdatedMarkerTest) {
Alex Deymo906191f2015-10-12 12:22:44 -0700341 FakePrefs fake_prefs;
342 string boot_id;
343 EXPECT_TRUE(utils::GetBootId(&boot_id));
344 fake_prefs.SetString(kPrefsUpdateCompletedOnBootId, boot_id);
345 fake_system_state_.set_prefs(&fake_prefs);
Sen Jiangaeeb2e02016-06-09 15:00:16 -0700346 attempter_.Init();
347 EXPECT_EQ(UpdateStatus::UPDATED_NEED_REBOOT, attempter_.status());
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700348}
349
350TEST_F(UpdateAttempterTest, GetErrorCodeForActionTest) {
David Zeuthena99981f2013-04-29 13:42:47 -0700351 extern ErrorCode GetErrorCodeForAction(AbstractAction* action,
352 ErrorCode code);
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700353 EXPECT_EQ(ErrorCode::kSuccess,
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700354 GetErrorCodeForAction(nullptr, ErrorCode::kSuccess));
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700355
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700356 FakeSystemState fake_system_state;
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700357 OmahaRequestAction omaha_request_action(&fake_system_state, nullptr,
358 nullptr, false);
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700359 EXPECT_EQ(ErrorCode::kOmahaRequestError,
360 GetErrorCodeForAction(&omaha_request_action, ErrorCode::kError));
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700361 OmahaResponseHandlerAction omaha_response_handler_action(&fake_system_state_);
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700362 EXPECT_EQ(ErrorCode::kOmahaResponseHandlerError,
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700363 GetErrorCodeForAction(&omaha_response_handler_action,
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700364 ErrorCode::kError));
Sen Jiange6e4bb92016-04-05 14:59:12 -0700365 FilesystemVerifierAction filesystem_verifier_action;
Allie Woodeb9e6d82015-04-17 13:55:30 -0700366 EXPECT_EQ(ErrorCode::kFilesystemVerifierError,
367 GetErrorCodeForAction(&filesystem_verifier_action,
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700368 ErrorCode::kError));
Alex Deymob15a0b82015-11-25 20:30:40 -0300369 PostinstallRunnerAction postinstall_runner_action(
Alex Deymofb905d92016-06-03 19:26:58 -0700370 fake_system_state.fake_boot_control(), fake_system_state.fake_hardware());
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700371 EXPECT_EQ(ErrorCode::kPostinstallRunnerError,
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700372 GetErrorCodeForAction(&postinstall_runner_action,
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700373 ErrorCode::kError));
Alex Deymo8427b4a2014-11-05 14:00:32 -0800374 MockAction action_mock;
375 EXPECT_CALL(action_mock, Type()).WillOnce(Return("MockAction"));
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700376 EXPECT_EQ(ErrorCode::kError,
377 GetErrorCodeForAction(&action_mock, ErrorCode::kError));
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700378}
379
Darin Petkov36275772010-10-01 11:40:57 -0700380TEST_F(UpdateAttempterTest, DisableDeltaUpdateIfNeededTest) {
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700381 attempter_.omaha_request_params_->set_delta_okay(true);
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800382 EXPECT_CALL(*prefs_, GetInt64(kPrefsDeltaUpdateFailures, _))
Darin Petkov36275772010-10-01 11:40:57 -0700383 .WillOnce(Return(false));
384 attempter_.DisableDeltaUpdateIfNeeded();
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700385 EXPECT_TRUE(attempter_.omaha_request_params_->delta_okay());
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800386 EXPECT_CALL(*prefs_, GetInt64(kPrefsDeltaUpdateFailures, _))
Darin Petkov36275772010-10-01 11:40:57 -0700387 .WillOnce(DoAll(
Ben Chan672c1f52017-10-23 15:41:39 -0700388 SetArgPointee<1>(UpdateAttempter::kMaxDeltaUpdateFailures - 1),
Darin Petkov36275772010-10-01 11:40:57 -0700389 Return(true)));
390 attempter_.DisableDeltaUpdateIfNeeded();
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700391 EXPECT_TRUE(attempter_.omaha_request_params_->delta_okay());
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800392 EXPECT_CALL(*prefs_, GetInt64(kPrefsDeltaUpdateFailures, _))
Darin Petkov36275772010-10-01 11:40:57 -0700393 .WillOnce(DoAll(
Ben Chan672c1f52017-10-23 15:41:39 -0700394 SetArgPointee<1>(UpdateAttempter::kMaxDeltaUpdateFailures),
Darin Petkov36275772010-10-01 11:40:57 -0700395 Return(true)));
396 attempter_.DisableDeltaUpdateIfNeeded();
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700397 EXPECT_FALSE(attempter_.omaha_request_params_->delta_okay());
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800398 EXPECT_CALL(*prefs_, GetInt64(_, _)).Times(0);
Darin Petkov36275772010-10-01 11:40:57 -0700399 attempter_.DisableDeltaUpdateIfNeeded();
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700400 EXPECT_FALSE(attempter_.omaha_request_params_->delta_okay());
Darin Petkov36275772010-10-01 11:40:57 -0700401}
402
403TEST_F(UpdateAttempterTest, MarkDeltaUpdateFailureTest) {
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800404 EXPECT_CALL(*prefs_, GetInt64(kPrefsDeltaUpdateFailures, _))
Darin Petkov36275772010-10-01 11:40:57 -0700405 .WillOnce(Return(false))
Ben Chan672c1f52017-10-23 15:41:39 -0700406 .WillOnce(DoAll(SetArgPointee<1>(-1), Return(true)))
407 .WillOnce(DoAll(SetArgPointee<1>(1), Return(true)))
Darin Petkov36275772010-10-01 11:40:57 -0700408 .WillOnce(DoAll(
Ben Chan672c1f52017-10-23 15:41:39 -0700409 SetArgPointee<1>(UpdateAttempter::kMaxDeltaUpdateFailures),
Darin Petkov36275772010-10-01 11:40:57 -0700410 Return(true)));
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800411 EXPECT_CALL(*prefs_, SetInt64(Ne(kPrefsDeltaUpdateFailures), _))
Darin Petkov2dd01092010-10-08 15:43:05 -0700412 .WillRepeatedly(Return(true));
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800413 EXPECT_CALL(*prefs_, SetInt64(kPrefsDeltaUpdateFailures, 1)).Times(2);
Gilad Arnold74b5f552014-10-07 08:17:16 -0700414 EXPECT_CALL(*prefs_, SetInt64(kPrefsDeltaUpdateFailures, 2));
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800415 EXPECT_CALL(*prefs_, SetInt64(kPrefsDeltaUpdateFailures,
Gilad Arnold74b5f552014-10-07 08:17:16 -0700416 UpdateAttempter::kMaxDeltaUpdateFailures + 1));
Darin Petkov36275772010-10-01 11:40:57 -0700417 for (int i = 0; i < 4; i ++)
418 attempter_.MarkDeltaUpdateFailure();
419}
420
Darin Petkov1b003102010-11-30 10:18:36 -0800421TEST_F(UpdateAttempterTest, ScheduleErrorEventActionNoEventTest) {
422 EXPECT_CALL(*processor_, EnqueueAction(_)).Times(0);
423 EXPECT_CALL(*processor_, StartProcessing()).Times(0);
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700424 EXPECT_CALL(*fake_system_state_.mock_payload_state(), UpdateFailed(_))
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800425 .Times(0);
426 OmahaResponse response;
Jay Srinivasan53173b92013-05-17 17:13:01 -0700427 string url1 = "http://url1";
Sen Jiang0affc2c2017-02-10 15:55:05 -0800428 response.packages.push_back({.payload_urls = {url1, "https://url"}});
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700429 EXPECT_CALL(*(fake_system_state_.mock_payload_state()), GetCurrentUrl())
Jay Srinivasan53173b92013-05-17 17:13:01 -0700430 .WillRepeatedly(Return(url1));
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700431 fake_system_state_.mock_payload_state()->SetResponse(response);
Darin Petkov1b003102010-11-30 10:18:36 -0800432 attempter_.ScheduleErrorEventAction();
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700433 EXPECT_EQ(url1, fake_system_state_.mock_payload_state()->GetCurrentUrl());
Darin Petkov1b003102010-11-30 10:18:36 -0800434}
435
436TEST_F(UpdateAttempterTest, ScheduleErrorEventActionTest) {
437 EXPECT_CALL(*processor_,
Amin Hassanid3f4bea2018-04-30 14:52:40 -0700438 EnqueueAction(Pointee(Property(
439 &AbstractAction::Type, OmahaRequestAction::StaticType()))));
Gilad Arnold74b5f552014-10-07 08:17:16 -0700440 EXPECT_CALL(*processor_, StartProcessing());
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700441 ErrorCode err = ErrorCode::kError;
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700442 EXPECT_CALL(*fake_system_state_.mock_payload_state(), UpdateFailed(err));
Darin Petkov1b003102010-11-30 10:18:36 -0800443 attempter_.error_event_.reset(new OmahaEvent(OmahaEvent::kTypeUpdateComplete,
444 OmahaEvent::kResultError,
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800445 err));
Darin Petkov1b003102010-11-30 10:18:36 -0800446 attempter_.ScheduleErrorEventAction();
Christopher Wiley6b6cc1b2015-10-05 17:50:07 -0700447 EXPECT_EQ(UpdateStatus::REPORTING_ERROR_EVENT, attempter_.status());
Darin Petkov1b003102010-11-30 10:18:36 -0800448}
449
Darin Petkove6ef2f82011-03-07 17:31:11 -0800450namespace {
Chris Sosa76a29ae2013-07-11 17:59:24 -0700451// Actions that will be built as part of an update check.
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700452const string kUpdateActionTypes[] = { // NOLINT(runtime/string)
Amin Hassani0882a512018-04-05 16:25:44 -0700453 OmahaRequestAction::StaticType(),
454 OmahaResponseHandlerAction::StaticType(),
455 UpdateBootFlagsAction::StaticType(),
456 OmahaRequestAction::StaticType(),
457 DownloadAction::StaticType(),
458 OmahaRequestAction::StaticType(),
459 FilesystemVerifierAction::StaticType(),
460 PostinstallRunnerAction::StaticType(),
461 OmahaRequestAction::StaticType()};
Chris Sosa76a29ae2013-07-11 17:59:24 -0700462
463// Actions that will be built as part of a user-initiated rollback.
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700464const string kRollbackActionTypes[] = { // NOLINT(runtime/string)
Chris Sosa76a29ae2013-07-11 17:59:24 -0700465 InstallPlanAction::StaticType(),
466 PostinstallRunnerAction::StaticType(),
467};
468
Adolfo Victoria497044c2018-07-18 07:51:42 -0700469const StagingSchedule kValidStagingSchedule = {
470 {4, 10}, {10, 40}, {19, 70}, {26, 100}};
471
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700472} // namespace
Darin Petkove6ef2f82011-03-07 17:31:11 -0800473
474void UpdateAttempterTest::UpdateTestStart() {
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700475 attempter_.set_http_response_code(200);
Alex Deymo749ecf12014-10-21 20:06:57 -0700476
477 // Expect that the device policy is loaded by the UpdateAttempter at some
478 // point by calling RefreshDevicePolicy.
Igor9fd76b62017-12-11 15:24:18 +0100479 auto device_policy = std::make_unique<policy::MockDevicePolicy>();
Alex Deymo749ecf12014-10-21 20:06:57 -0700480 EXPECT_CALL(*device_policy, LoadPolicy())
481 .Times(testing::AtLeast(1)).WillRepeatedly(Return(true));
Igor9fd76b62017-12-11 15:24:18 +0100482 attempter_.policy_provider_.reset(
483 new policy::PolicyProvider(std::move(device_policy)));
Alex Deymo749ecf12014-10-21 20:06:57 -0700484
485 {
486 InSequence s;
487 for (size_t i = 0; i < arraysize(kUpdateActionTypes); ++i) {
488 EXPECT_CALL(*processor_,
Amin Hassanid3f4bea2018-04-30 14:52:40 -0700489 EnqueueAction(Pointee(
490 Property(&AbstractAction::Type, kUpdateActionTypes[i]))));
Alex Deymo749ecf12014-10-21 20:06:57 -0700491 }
Gilad Arnold74b5f552014-10-07 08:17:16 -0700492 EXPECT_CALL(*processor_, StartProcessing());
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700493 }
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700494
Marton Hunyadyba51c3f2018-04-25 15:18:10 +0200495 attempter_.Update("", "", "", "", false, false, false);
Alex Deymo60ca1a72015-06-18 18:19:15 -0700496 loop_.PostTask(FROM_HERE,
497 base::Bind(&UpdateAttempterTest::UpdateTestVerify,
498 base::Unretained(this)));
Darin Petkove6ef2f82011-03-07 17:31:11 -0800499}
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700500
Darin Petkove6ef2f82011-03-07 17:31:11 -0800501void UpdateAttempterTest::UpdateTestVerify() {
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700502 EXPECT_EQ(0, attempter_.http_response_code());
503 EXPECT_EQ(&attempter_, processor_->delegate());
Christopher Wiley6b6cc1b2015-10-05 17:50:07 -0700504 EXPECT_EQ(UpdateStatus::CHECKING_FOR_UPDATE, attempter_.status());
Alex Deymo60ca1a72015-06-18 18:19:15 -0700505 loop_.BreakLoop();
Darin Petkove6ef2f82011-03-07 17:31:11 -0800506}
507
Chris Sosa28e479c2013-07-12 11:39:53 -0700508void UpdateAttempterTest::RollbackTestStart(
Chris Sosa44b9b7e2014-04-02 13:53:46 -0700509 bool enterprise_rollback, bool valid_slot) {
Chris Sosa76a29ae2013-07-11 17:59:24 -0700510 // Create a device policy so that we can change settings.
Igor9fd76b62017-12-11 15:24:18 +0100511 auto device_policy = std::make_unique<policy::MockDevicePolicy>();
Chris Sosa76a29ae2013-07-11 17:59:24 -0700512 EXPECT_CALL(*device_policy, LoadPolicy()).WillRepeatedly(Return(true));
Igor9fd76b62017-12-11 15:24:18 +0100513 fake_system_state_.set_device_policy(device_policy.get());
514 if (enterprise_rollback) {
515 // We return an empty owner as this is an enterprise.
516 EXPECT_CALL(*device_policy, GetOwner(_)).WillRepeatedly(
517 DoAll(SetArgPointee<0>(string("")),
518 Return(true)));
519 } else {
520 // We return a fake owner as this is an owned consumer device.
521 EXPECT_CALL(*device_policy, GetOwner(_)).WillRepeatedly(
522 DoAll(SetArgPointee<0>(string("fake.mail@fake.com")),
523 Return(true)));
524 }
525
526 attempter_.policy_provider_.reset(
527 new policy::PolicyProvider(std::move(device_policy)));
Chris Sosa76a29ae2013-07-11 17:59:24 -0700528
Alex Deymo763e7db2015-08-27 21:08:08 -0700529 if (valid_slot) {
530 BootControlInterface::Slot rollback_slot = 1;
531 LOG(INFO) << "Test Mark Bootable: "
532 << BootControlInterface::SlotName(rollback_slot);
Alex Deymoe5e5fe92015-10-05 09:28:19 -0700533 fake_system_state_.fake_boot_control()->SetSlotBootable(rollback_slot,
534 true);
Don Garrett6646b442013-11-13 15:29:11 -0800535 }
536
Chris Sosa28e479c2013-07-12 11:39:53 -0700537 bool is_rollback_allowed = false;
Chris Sosa76a29ae2013-07-11 17:59:24 -0700538
Chris Sosad38b1132014-03-25 10:43:59 -0700539 // We only allow rollback on devices that are not enterprise enrolled and
540 // which have a valid slot to rollback to.
541 if (!enterprise_rollback && valid_slot) {
Chris Sosa28e479c2013-07-12 11:39:53 -0700542 is_rollback_allowed = true;
543 }
544
Chris Sosa28e479c2013-07-12 11:39:53 -0700545 if (is_rollback_allowed) {
Chris Sosa76a29ae2013-07-11 17:59:24 -0700546 InSequence s;
547 for (size_t i = 0; i < arraysize(kRollbackActionTypes); ++i) {
548 EXPECT_CALL(*processor_,
Amin Hassanid3f4bea2018-04-30 14:52:40 -0700549 EnqueueAction(Pointee(Property(&AbstractAction::Type,
550 kRollbackActionTypes[i]))));
Chris Sosa76a29ae2013-07-11 17:59:24 -0700551 }
Gilad Arnold74b5f552014-10-07 08:17:16 -0700552 EXPECT_CALL(*processor_, StartProcessing());
Chris Sosa76a29ae2013-07-11 17:59:24 -0700553
Chris Sosa44b9b7e2014-04-02 13:53:46 -0700554 EXPECT_TRUE(attempter_.Rollback(true));
Alex Deymo60ca1a72015-06-18 18:19:15 -0700555 loop_.PostTask(FROM_HERE,
556 base::Bind(&UpdateAttempterTest::RollbackTestVerify,
557 base::Unretained(this)));
Chris Sosa76a29ae2013-07-11 17:59:24 -0700558 } else {
Chris Sosa44b9b7e2014-04-02 13:53:46 -0700559 EXPECT_FALSE(attempter_.Rollback(true));
Alex Deymo60ca1a72015-06-18 18:19:15 -0700560 loop_.BreakLoop();
Chris Sosa76a29ae2013-07-11 17:59:24 -0700561 }
562}
563
564void UpdateAttempterTest::RollbackTestVerify() {
565 // Verifies the actions that were enqueued.
566 EXPECT_EQ(&attempter_, processor_->delegate());
Christopher Wiley6b6cc1b2015-10-05 17:50:07 -0700567 EXPECT_EQ(UpdateStatus::ATTEMPTING_ROLLBACK, attempter_.status());
Amin Hassanid3f4bea2018-04-30 14:52:40 -0700568 EXPECT_EQ(0U, attempter_.install_plan_->partitions.size());
569 EXPECT_EQ(attempter_.install_plan_->powerwash_required, true);
Alex Deymo60ca1a72015-06-18 18:19:15 -0700570 loop_.BreakLoop();
Chris Sosa76a29ae2013-07-11 17:59:24 -0700571}
572
Darin Petkove6ef2f82011-03-07 17:31:11 -0800573TEST_F(UpdateAttempterTest, UpdateTest) {
Alex Deymo461b2592015-07-24 20:10:52 -0700574 UpdateTestStart();
Alex Deymo60ca1a72015-06-18 18:19:15 -0700575 loop_.Run();
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700576}
577
Chris Sosa76a29ae2013-07-11 17:59:24 -0700578TEST_F(UpdateAttempterTest, RollbackTest) {
Alex Deymo60ca1a72015-06-18 18:19:15 -0700579 loop_.PostTask(FROM_HERE,
580 base::Bind(&UpdateAttempterTest::RollbackTestStart,
581 base::Unretained(this),
582 false, true));
583 loop_.Run();
Chris Sosa76a29ae2013-07-11 17:59:24 -0700584}
585
Don Garrett6646b442013-11-13 15:29:11 -0800586TEST_F(UpdateAttempterTest, InvalidSlotRollbackTest) {
Alex Deymo60ca1a72015-06-18 18:19:15 -0700587 loop_.PostTask(FROM_HERE,
588 base::Bind(&UpdateAttempterTest::RollbackTestStart,
589 base::Unretained(this),
590 false, false));
591 loop_.Run();
Don Garrett6646b442013-11-13 15:29:11 -0800592}
593
Chris Sosa76a29ae2013-07-11 17:59:24 -0700594TEST_F(UpdateAttempterTest, EnterpriseRollbackTest) {
Alex Deymo60ca1a72015-06-18 18:19:15 -0700595 loop_.PostTask(FROM_HERE,
596 base::Bind(&UpdateAttempterTest::RollbackTestStart,
597 base::Unretained(this),
598 true, true));
599 loop_.Run();
Chris Sosa76a29ae2013-07-11 17:59:24 -0700600}
601
Thieu Le116fda32011-04-19 11:01:54 -0700602void UpdateAttempterTest::PingOmahaTestStart() {
603 EXPECT_CALL(*processor_,
Amin Hassanid3f4bea2018-04-30 14:52:40 -0700604 EnqueueAction(Pointee(Property(
605 &AbstractAction::Type, OmahaRequestAction::StaticType()))));
Gilad Arnold74b5f552014-10-07 08:17:16 -0700606 EXPECT_CALL(*processor_, StartProcessing());
Thieu Le116fda32011-04-19 11:01:54 -0700607 attempter_.PingOmaha();
Alex Deymo60ca1a72015-06-18 18:19:15 -0700608 ScheduleQuitMainLoop();
Thieu Le116fda32011-04-19 11:01:54 -0700609}
610
611TEST_F(UpdateAttempterTest, PingOmahaTest) {
Gilad Arnoldec7f9162014-07-15 13:24:46 -0700612 EXPECT_FALSE(attempter_.waiting_for_scheduled_check_);
613 EXPECT_FALSE(attempter_.schedule_updates_called());
614 // Disable scheduling of subsequnet checks; we're using the DefaultPolicy in
615 // testing, which is more permissive than we want to handle here.
616 attempter_.DisableScheduleUpdates();
Alex Deymo60ca1a72015-06-18 18:19:15 -0700617 loop_.PostTask(FROM_HERE,
618 base::Bind(&UpdateAttempterTest::PingOmahaTestStart,
619 base::Unretained(this)));
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700620 brillo::MessageLoopRunMaxIterations(&loop_, 100);
Christopher Wiley6b6cc1b2015-10-05 17:50:07 -0700621 EXPECT_EQ(UpdateStatus::UPDATED_NEED_REBOOT, attempter_.status());
Gilad Arnoldec7f9162014-07-15 13:24:46 -0700622 EXPECT_TRUE(attempter_.schedule_updates_called());
Thieu Le116fda32011-04-19 11:01:54 -0700623}
624
Darin Petkov18c7bce2011-06-16 14:07:00 -0700625TEST_F(UpdateAttempterTest, CreatePendingErrorEventTest) {
Alex Deymo8427b4a2014-11-05 14:00:32 -0800626 MockAction action;
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700627 const ErrorCode kCode = ErrorCode::kDownloadTransferError;
Darin Petkov18c7bce2011-06-16 14:07:00 -0700628 attempter_.CreatePendingErrorEvent(&action, kCode);
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700629 ASSERT_NE(nullptr, attempter_.error_event_.get());
Darin Petkov18c7bce2011-06-16 14:07:00 -0700630 EXPECT_EQ(OmahaEvent::kTypeUpdateComplete, attempter_.error_event_->type);
631 EXPECT_EQ(OmahaEvent::kResultError, attempter_.error_event_->result);
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700632 EXPECT_EQ(
633 static_cast<ErrorCode>(static_cast<int>(kCode) |
634 static_cast<int>(ErrorCode::kTestOmahaUrlFlag)),
635 attempter_.error_event_->error_code);
Darin Petkov18c7bce2011-06-16 14:07:00 -0700636}
637
638TEST_F(UpdateAttempterTest, CreatePendingErrorEventResumedTest) {
Amin Hassanid3f4bea2018-04-30 14:52:40 -0700639 attempter_.install_plan_.reset(new InstallPlan);
640 attempter_.install_plan_->is_resume = true;
Alex Deymo8427b4a2014-11-05 14:00:32 -0800641 MockAction action;
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700642 const ErrorCode kCode = ErrorCode::kInstallDeviceOpenError;
Darin Petkov18c7bce2011-06-16 14:07:00 -0700643 attempter_.CreatePendingErrorEvent(&action, kCode);
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700644 ASSERT_NE(nullptr, attempter_.error_event_.get());
Darin Petkov18c7bce2011-06-16 14:07:00 -0700645 EXPECT_EQ(OmahaEvent::kTypeUpdateComplete, attempter_.error_event_->type);
646 EXPECT_EQ(OmahaEvent::kResultError, attempter_.error_event_->result);
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700647 EXPECT_EQ(
648 static_cast<ErrorCode>(
649 static_cast<int>(kCode) |
650 static_cast<int>(ErrorCode::kResumedFlag) |
651 static_cast<int>(ErrorCode::kTestOmahaUrlFlag)),
652 attempter_.error_event_->error_code);
Darin Petkov18c7bce2011-06-16 14:07:00 -0700653}
654
David Zeuthen8f191b22013-08-06 12:27:50 -0700655TEST_F(UpdateAttempterTest, P2PNotStartedAtStartupWhenNotEnabled) {
656 MockP2PManager mock_p2p_manager;
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700657 fake_system_state_.set_p2p_manager(&mock_p2p_manager);
David Zeuthen8f191b22013-08-06 12:27:50 -0700658 mock_p2p_manager.fake().SetP2PEnabled(false);
659 EXPECT_CALL(mock_p2p_manager, EnsureP2PRunning()).Times(0);
660 attempter_.UpdateEngineStarted();
661}
662
663TEST_F(UpdateAttempterTest, P2PNotStartedAtStartupWhenEnabledButNotSharing) {
664 MockP2PManager mock_p2p_manager;
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700665 fake_system_state_.set_p2p_manager(&mock_p2p_manager);
David Zeuthen8f191b22013-08-06 12:27:50 -0700666 mock_p2p_manager.fake().SetP2PEnabled(true);
667 EXPECT_CALL(mock_p2p_manager, EnsureP2PRunning()).Times(0);
668 attempter_.UpdateEngineStarted();
669}
670
671TEST_F(UpdateAttempterTest, P2PStartedAtStartupWhenEnabledAndSharing) {
672 MockP2PManager mock_p2p_manager;
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700673 fake_system_state_.set_p2p_manager(&mock_p2p_manager);
David Zeuthen8f191b22013-08-06 12:27:50 -0700674 mock_p2p_manager.fake().SetP2PEnabled(true);
675 mock_p2p_manager.fake().SetCountSharedFilesResult(1);
Gilad Arnold74b5f552014-10-07 08:17:16 -0700676 EXPECT_CALL(mock_p2p_manager, EnsureP2PRunning());
David Zeuthen8f191b22013-08-06 12:27:50 -0700677 attempter_.UpdateEngineStarted();
678}
679
680TEST_F(UpdateAttempterTest, P2PNotEnabled) {
Alex Deymo60ca1a72015-06-18 18:19:15 -0700681 loop_.PostTask(FROM_HERE,
682 base::Bind(&UpdateAttempterTest::P2PNotEnabledStart,
683 base::Unretained(this)));
684 loop_.Run();
David Zeuthen8f191b22013-08-06 12:27:50 -0700685}
Alex Deymo60ca1a72015-06-18 18:19:15 -0700686
David Zeuthen8f191b22013-08-06 12:27:50 -0700687void UpdateAttempterTest::P2PNotEnabledStart() {
688 // If P2P is not enabled, check that we do not attempt housekeeping
689 // and do not convey that p2p is to be used.
690 MockP2PManager mock_p2p_manager;
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700691 fake_system_state_.set_p2p_manager(&mock_p2p_manager);
David Zeuthen8f191b22013-08-06 12:27:50 -0700692 mock_p2p_manager.fake().SetP2PEnabled(false);
693 EXPECT_CALL(mock_p2p_manager, PerformHousekeeping()).Times(0);
Marton Hunyadyba51c3f2018-04-25 15:18:10 +0200694 attempter_.Update("", "", "", "", false, false, false);
Alex Deymo60ca1a72015-06-18 18:19:15 -0700695 EXPECT_FALSE(actual_using_p2p_for_downloading_);
Gilad Arnold74b5f552014-10-07 08:17:16 -0700696 EXPECT_FALSE(actual_using_p2p_for_sharing());
Alex Deymo60ca1a72015-06-18 18:19:15 -0700697 ScheduleQuitMainLoop();
David Zeuthen8f191b22013-08-06 12:27:50 -0700698}
699
700TEST_F(UpdateAttempterTest, P2PEnabledStartingFails) {
Alex Deymo60ca1a72015-06-18 18:19:15 -0700701 loop_.PostTask(FROM_HERE,
702 base::Bind(&UpdateAttempterTest::P2PEnabledStartingFailsStart,
703 base::Unretained(this)));
704 loop_.Run();
David Zeuthen8f191b22013-08-06 12:27:50 -0700705}
Alex Deymo60ca1a72015-06-18 18:19:15 -0700706
David Zeuthen8f191b22013-08-06 12:27:50 -0700707void UpdateAttempterTest::P2PEnabledStartingFailsStart() {
708 // If p2p is enabled, but starting it fails ensure we don't do
709 // any housekeeping and do not convey that p2p should be used.
710 MockP2PManager mock_p2p_manager;
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700711 fake_system_state_.set_p2p_manager(&mock_p2p_manager);
David Zeuthen8f191b22013-08-06 12:27:50 -0700712 mock_p2p_manager.fake().SetP2PEnabled(true);
713 mock_p2p_manager.fake().SetEnsureP2PRunningResult(false);
714 mock_p2p_manager.fake().SetPerformHousekeepingResult(false);
715 EXPECT_CALL(mock_p2p_manager, PerformHousekeeping()).Times(0);
Marton Hunyadyba51c3f2018-04-25 15:18:10 +0200716 attempter_.Update("", "", "", "", false, false, false);
Gilad Arnold74b5f552014-10-07 08:17:16 -0700717 EXPECT_FALSE(actual_using_p2p_for_downloading());
718 EXPECT_FALSE(actual_using_p2p_for_sharing());
Alex Deymo60ca1a72015-06-18 18:19:15 -0700719 ScheduleQuitMainLoop();
David Zeuthen8f191b22013-08-06 12:27:50 -0700720}
721
722TEST_F(UpdateAttempterTest, P2PEnabledHousekeepingFails) {
Alex Deymo60ca1a72015-06-18 18:19:15 -0700723 loop_.PostTask(
724 FROM_HERE,
725 base::Bind(&UpdateAttempterTest::P2PEnabledHousekeepingFailsStart,
726 base::Unretained(this)));
727 loop_.Run();
David Zeuthen8f191b22013-08-06 12:27:50 -0700728}
Alex Deymo60ca1a72015-06-18 18:19:15 -0700729
David Zeuthen8f191b22013-08-06 12:27:50 -0700730void UpdateAttempterTest::P2PEnabledHousekeepingFailsStart() {
731 // If p2p is enabled, starting it works but housekeeping fails, ensure
732 // we do not convey p2p is to be used.
733 MockP2PManager mock_p2p_manager;
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700734 fake_system_state_.set_p2p_manager(&mock_p2p_manager);
David Zeuthen8f191b22013-08-06 12:27:50 -0700735 mock_p2p_manager.fake().SetP2PEnabled(true);
736 mock_p2p_manager.fake().SetEnsureP2PRunningResult(true);
737 mock_p2p_manager.fake().SetPerformHousekeepingResult(false);
Gilad Arnold74b5f552014-10-07 08:17:16 -0700738 EXPECT_CALL(mock_p2p_manager, PerformHousekeeping());
Marton Hunyadyba51c3f2018-04-25 15:18:10 +0200739 attempter_.Update("", "", "", "", false, false, false);
Gilad Arnold74b5f552014-10-07 08:17:16 -0700740 EXPECT_FALSE(actual_using_p2p_for_downloading());
741 EXPECT_FALSE(actual_using_p2p_for_sharing());
Alex Deymo60ca1a72015-06-18 18:19:15 -0700742 ScheduleQuitMainLoop();
David Zeuthen8f191b22013-08-06 12:27:50 -0700743}
744
745TEST_F(UpdateAttempterTest, P2PEnabled) {
Alex Deymo60ca1a72015-06-18 18:19:15 -0700746 loop_.PostTask(FROM_HERE,
747 base::Bind(&UpdateAttempterTest::P2PEnabledStart,
748 base::Unretained(this)));
749 loop_.Run();
David Zeuthen8f191b22013-08-06 12:27:50 -0700750}
Alex Deymo60ca1a72015-06-18 18:19:15 -0700751
David Zeuthen8f191b22013-08-06 12:27:50 -0700752void UpdateAttempterTest::P2PEnabledStart() {
753 MockP2PManager mock_p2p_manager;
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700754 fake_system_state_.set_p2p_manager(&mock_p2p_manager);
David Zeuthen8f191b22013-08-06 12:27:50 -0700755 // If P2P is enabled and starting it works, check that we performed
756 // housekeeping and that we convey p2p should be used.
757 mock_p2p_manager.fake().SetP2PEnabled(true);
758 mock_p2p_manager.fake().SetEnsureP2PRunningResult(true);
759 mock_p2p_manager.fake().SetPerformHousekeepingResult(true);
Gilad Arnold74b5f552014-10-07 08:17:16 -0700760 EXPECT_CALL(mock_p2p_manager, PerformHousekeeping());
Marton Hunyadyba51c3f2018-04-25 15:18:10 +0200761 attempter_.Update("", "", "", "", false, false, false);
Gilad Arnold74b5f552014-10-07 08:17:16 -0700762 EXPECT_TRUE(actual_using_p2p_for_downloading());
763 EXPECT_TRUE(actual_using_p2p_for_sharing());
Alex Deymo60ca1a72015-06-18 18:19:15 -0700764 ScheduleQuitMainLoop();
David Zeuthen8f191b22013-08-06 12:27:50 -0700765}
766
767TEST_F(UpdateAttempterTest, P2PEnabledInteractive) {
Alex Deymo60ca1a72015-06-18 18:19:15 -0700768 loop_.PostTask(FROM_HERE,
769 base::Bind(&UpdateAttempterTest::P2PEnabledInteractiveStart,
770 base::Unretained(this)));
771 loop_.Run();
David Zeuthen8f191b22013-08-06 12:27:50 -0700772}
Alex Deymo60ca1a72015-06-18 18:19:15 -0700773
David Zeuthen8f191b22013-08-06 12:27:50 -0700774void UpdateAttempterTest::P2PEnabledInteractiveStart() {
775 MockP2PManager mock_p2p_manager;
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700776 fake_system_state_.set_p2p_manager(&mock_p2p_manager);
David Zeuthen8f191b22013-08-06 12:27:50 -0700777 // For an interactive check, if P2P is enabled and starting it
778 // works, check that we performed housekeeping and that we convey
779 // p2p should be used for sharing but NOT for downloading.
780 mock_p2p_manager.fake().SetP2PEnabled(true);
781 mock_p2p_manager.fake().SetEnsureP2PRunningResult(true);
782 mock_p2p_manager.fake().SetPerformHousekeepingResult(true);
Gilad Arnold74b5f552014-10-07 08:17:16 -0700783 EXPECT_CALL(mock_p2p_manager, PerformHousekeeping());
Marton Hunyadyba51c3f2018-04-25 15:18:10 +0200784 attempter_.Update("",
785 "",
786 "",
787 "",
788 false,
789 false,
790 /*interactive=*/true);
Gilad Arnold74b5f552014-10-07 08:17:16 -0700791 EXPECT_FALSE(actual_using_p2p_for_downloading());
792 EXPECT_TRUE(actual_using_p2p_for_sharing());
Alex Deymo60ca1a72015-06-18 18:19:15 -0700793 ScheduleQuitMainLoop();
David Zeuthen8f191b22013-08-06 12:27:50 -0700794}
795
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700796TEST_F(UpdateAttempterTest, ReadScatterFactorFromPolicy) {
Alex Deymo60ca1a72015-06-18 18:19:15 -0700797 loop_.PostTask(
798 FROM_HERE,
799 base::Bind(&UpdateAttempterTest::ReadScatterFactorFromPolicyTestStart,
800 base::Unretained(this)));
801 loop_.Run();
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700802}
803
804// Tests that the scatter_factor_in_seconds value is properly fetched
805// from the device policy.
806void UpdateAttempterTest::ReadScatterFactorFromPolicyTestStart() {
Ben Chan9abb7632014-08-07 00:10:53 -0700807 int64_t scatter_factor_in_seconds = 36000;
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700808
Igor9fd76b62017-12-11 15:24:18 +0100809 auto device_policy = std::make_unique<policy::MockDevicePolicy>();
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700810 EXPECT_CALL(*device_policy, LoadPolicy()).WillRepeatedly(Return(true));
Igor9fd76b62017-12-11 15:24:18 +0100811 fake_system_state_.set_device_policy(device_policy.get());
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700812
813 EXPECT_CALL(*device_policy, GetScatterFactorInSeconds(_))
814 .WillRepeatedly(DoAll(
Ben Chan672c1f52017-10-23 15:41:39 -0700815 SetArgPointee<0>(scatter_factor_in_seconds),
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700816 Return(true)));
817
Igor9fd76b62017-12-11 15:24:18 +0100818 attempter_.policy_provider_.reset(
819 new policy::PolicyProvider(std::move(device_policy)));
820
Marton Hunyadyba51c3f2018-04-25 15:18:10 +0200821 attempter_.Update("", "", "", "", false, false, false);
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700822 EXPECT_EQ(scatter_factor_in_seconds, attempter_.scatter_factor_.InSeconds());
823
Alex Deymo60ca1a72015-06-18 18:19:15 -0700824 ScheduleQuitMainLoop();
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700825}
826
827TEST_F(UpdateAttempterTest, DecrementUpdateCheckCountTest) {
Alex Deymo60ca1a72015-06-18 18:19:15 -0700828 loop_.PostTask(
829 FROM_HERE,
830 base::Bind(&UpdateAttempterTest::DecrementUpdateCheckCountTestStart,
831 base::Unretained(this)));
832 loop_.Run();
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700833}
834
835void UpdateAttempterTest::DecrementUpdateCheckCountTestStart() {
836 // Tests that the scatter_factor_in_seconds value is properly fetched
837 // from the device policy and is decremented if value > 0.
Ben Chan9abb7632014-08-07 00:10:53 -0700838 int64_t initial_value = 5;
Alex Deymo2c0db7b2014-11-04 12:23:39 -0800839 FakePrefs fake_prefs;
840 attempter_.prefs_ = &fake_prefs;
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700841
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700842 fake_system_state_.fake_hardware()->SetIsOOBEComplete(Time::UnixEpoch());
Jay Srinivasan08fce042012-06-07 16:31:01 -0700843
Alex Deymo2c0db7b2014-11-04 12:23:39 -0800844 EXPECT_TRUE(fake_prefs.SetInt64(kPrefsUpdateCheckCount, initial_value));
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700845
Ben Chan9abb7632014-08-07 00:10:53 -0700846 int64_t scatter_factor_in_seconds = 10;
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700847
Igor9fd76b62017-12-11 15:24:18 +0100848 auto device_policy = std::make_unique<policy::MockDevicePolicy>();
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700849 EXPECT_CALL(*device_policy, LoadPolicy()).WillRepeatedly(Return(true));
Igor9fd76b62017-12-11 15:24:18 +0100850 fake_system_state_.set_device_policy(device_policy.get());
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700851
852 EXPECT_CALL(*device_policy, GetScatterFactorInSeconds(_))
853 .WillRepeatedly(DoAll(
Ben Chan672c1f52017-10-23 15:41:39 -0700854 SetArgPointee<0>(scatter_factor_in_seconds),
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700855 Return(true)));
856
Igor9fd76b62017-12-11 15:24:18 +0100857 attempter_.policy_provider_.reset(
858 new policy::PolicyProvider(std::move(device_policy)));
859
Marton Hunyadyba51c3f2018-04-25 15:18:10 +0200860 attempter_.Update("", "", "", "", false, false, false);
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700861 EXPECT_EQ(scatter_factor_in_seconds, attempter_.scatter_factor_.InSeconds());
862
863 // Make sure the file still exists.
Alex Deymo2c0db7b2014-11-04 12:23:39 -0800864 EXPECT_TRUE(fake_prefs.Exists(kPrefsUpdateCheckCount));
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700865
Ben Chan9abb7632014-08-07 00:10:53 -0700866 int64_t new_value;
Alex Deymo2c0db7b2014-11-04 12:23:39 -0800867 EXPECT_TRUE(fake_prefs.GetInt64(kPrefsUpdateCheckCount, &new_value));
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700868 EXPECT_EQ(initial_value - 1, new_value);
869
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700870 EXPECT_TRUE(
871 attempter_.omaha_request_params_->update_check_count_wait_enabled());
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700872
873 // However, if the count is already 0, it's not decremented. Test that.
874 initial_value = 0;
Alex Deymo2c0db7b2014-11-04 12:23:39 -0800875 EXPECT_TRUE(fake_prefs.SetInt64(kPrefsUpdateCheckCount, initial_value));
Marton Hunyadyba51c3f2018-04-25 15:18:10 +0200876 attempter_.Update("", "", "", "", false, false, false);
Alex Deymo2c0db7b2014-11-04 12:23:39 -0800877 EXPECT_TRUE(fake_prefs.Exists(kPrefsUpdateCheckCount));
878 EXPECT_TRUE(fake_prefs.GetInt64(kPrefsUpdateCheckCount, &new_value));
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700879 EXPECT_EQ(initial_value, new_value);
880
Alex Deymo60ca1a72015-06-18 18:19:15 -0700881 ScheduleQuitMainLoop();
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700882}
883
Jay Srinivasan08fce042012-06-07 16:31:01 -0700884TEST_F(UpdateAttempterTest, NoScatteringDoneDuringManualUpdateTestStart) {
Alex Deymo60ca1a72015-06-18 18:19:15 -0700885 loop_.PostTask(FROM_HERE, base::Bind(
886 &UpdateAttempterTest::NoScatteringDoneDuringManualUpdateTestStart,
887 base::Unretained(this)));
888 loop_.Run();
Jay Srinivasan08fce042012-06-07 16:31:01 -0700889}
890
891void UpdateAttempterTest::NoScatteringDoneDuringManualUpdateTestStart() {
892 // Tests that no scattering logic is enabled if the update check
893 // is manually done (as opposed to a scheduled update check)
Ben Chan9abb7632014-08-07 00:10:53 -0700894 int64_t initial_value = 8;
Alex Deymo2c0db7b2014-11-04 12:23:39 -0800895 FakePrefs fake_prefs;
896 attempter_.prefs_ = &fake_prefs;
Jay Srinivasan08fce042012-06-07 16:31:01 -0700897
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700898 fake_system_state_.fake_hardware()->SetIsOOBEComplete(Time::UnixEpoch());
Alex Deymo2c0db7b2014-11-04 12:23:39 -0800899 fake_system_state_.set_prefs(&fake_prefs);
Jay Srinivasan08fce042012-06-07 16:31:01 -0700900
Adolfo Victoriad3a1e352018-07-16 11:40:47 -0700901 EXPECT_TRUE(
902 fake_prefs.SetInt64(kPrefsWallClockScatteringWaitPeriod, initial_value));
Alex Deymo2c0db7b2014-11-04 12:23:39 -0800903 EXPECT_TRUE(fake_prefs.SetInt64(kPrefsUpdateCheckCount, initial_value));
Jay Srinivasan08fce042012-06-07 16:31:01 -0700904
905 // make sure scatter_factor is non-zero as scattering is disabled
906 // otherwise.
Ben Chan9abb7632014-08-07 00:10:53 -0700907 int64_t scatter_factor_in_seconds = 50;
Jay Srinivasan08fce042012-06-07 16:31:01 -0700908
Igor9fd76b62017-12-11 15:24:18 +0100909 auto device_policy = std::make_unique<policy::MockDevicePolicy>();
Jay Srinivasan08fce042012-06-07 16:31:01 -0700910 EXPECT_CALL(*device_policy, LoadPolicy()).WillRepeatedly(Return(true));
Igor9fd76b62017-12-11 15:24:18 +0100911 fake_system_state_.set_device_policy(device_policy.get());
Jay Srinivasan08fce042012-06-07 16:31:01 -0700912
913 EXPECT_CALL(*device_policy, GetScatterFactorInSeconds(_))
914 .WillRepeatedly(DoAll(
Ben Chan672c1f52017-10-23 15:41:39 -0700915 SetArgPointee<0>(scatter_factor_in_seconds),
Jay Srinivasan08fce042012-06-07 16:31:01 -0700916 Return(true)));
917
Igor9fd76b62017-12-11 15:24:18 +0100918 attempter_.policy_provider_.reset(
919 new policy::PolicyProvider(std::move(device_policy)));
920
Gilad Arnoldb92f0df2013-01-10 16:32:45 -0800921 // Trigger an interactive check so we can test that scattering is disabled.
Marton Hunyadyba51c3f2018-04-25 15:18:10 +0200922 attempter_.Update("",
923 "",
924 "",
925 "",
926 false,
927 false,
928 /*interactive=*/true);
Jay Srinivasan08fce042012-06-07 16:31:01 -0700929 EXPECT_EQ(scatter_factor_in_seconds, attempter_.scatter_factor_.InSeconds());
930
931 // Make sure scattering is disabled for manual (i.e. user initiated) update
Jay Srinivasan21be0752012-07-25 15:44:56 -0700932 // checks and all artifacts are removed.
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700933 EXPECT_FALSE(
934 attempter_.omaha_request_params_->wall_clock_based_wait_enabled());
Adolfo Victoriad3a1e352018-07-16 11:40:47 -0700935 EXPECT_FALSE(fake_prefs.Exists(kPrefsWallClockScatteringWaitPeriod));
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700936 EXPECT_EQ(0, attempter_.omaha_request_params_->waiting_period().InSeconds());
937 EXPECT_FALSE(
938 attempter_.omaha_request_params_->update_check_count_wait_enabled());
Alex Deymo2c0db7b2014-11-04 12:23:39 -0800939 EXPECT_FALSE(fake_prefs.Exists(kPrefsUpdateCheckCount));
Jay Srinivasan08fce042012-06-07 16:31:01 -0700940
Alex Deymo60ca1a72015-06-18 18:19:15 -0700941 ScheduleQuitMainLoop();
Jay Srinivasan08fce042012-06-07 16:31:01 -0700942}
943
Adolfo Victoria497044c2018-07-18 07:51:42 -0700944void UpdateAttempterTest::SetUpStagingTest(const StagingSchedule& schedule,
945 FakePrefs* prefs) {
946 attempter_.prefs_ = prefs;
947 fake_system_state_.set_prefs(prefs);
948
949 int64_t initial_value = 8;
950 EXPECT_TRUE(
951 prefs->SetInt64(kPrefsWallClockScatteringWaitPeriod, initial_value));
952 EXPECT_TRUE(prefs->SetInt64(kPrefsUpdateCheckCount, initial_value));
953 attempter_.scatter_factor_ = TimeDelta::FromSeconds(20);
954
955 auto device_policy = std::make_unique<policy::MockDevicePolicy>();
956 EXPECT_CALL(*device_policy, LoadPolicy()).WillRepeatedly(Return(true));
957 fake_system_state_.set_device_policy(device_policy.get());
958 EXPECT_CALL(*device_policy, GetDeviceUpdateStagingSchedule(_))
959 .WillRepeatedly(DoAll(SetArgPointee<0>(schedule), Return(true)));
960
961 attempter_.policy_provider_.reset(
962 new policy::PolicyProvider(std::move(device_policy)));
963}
964
965TEST_F(UpdateAttempterTest, StagingSetsPrefsAndTurnsOffScattering) {
966 loop_.PostTask(
967 FROM_HERE,
968 base::Bind(
969 &UpdateAttempterTest::StagingSetsPrefsAndTurnsOffScatteringStart,
970 base::Unretained(this)));
971 loop_.Run();
972}
973
974void UpdateAttempterTest::StagingSetsPrefsAndTurnsOffScatteringStart() {
975 // Tests that staging sets its prefs properly and turns off scattering.
976 fake_system_state_.fake_hardware()->SetIsOOBEComplete(Time::UnixEpoch());
977 FakePrefs fake_prefs;
978 SetUpStagingTest(kValidStagingSchedule, &fake_prefs);
979
980 attempter_.Update("", "", "", "", false, false, false);
981 // Check that prefs have the correct values.
982 int64_t update_count;
983 EXPECT_TRUE(fake_prefs.GetInt64(kPrefsUpdateCheckCount, &update_count));
984 int64_t waiting_time_days;
985 EXPECT_TRUE(fake_prefs.GetInt64(kPrefsWallClockStagingWaitPeriod,
986 &waiting_time_days));
987 EXPECT_GT(waiting_time_days, 0);
988 // Update count should have been decremented.
989 EXPECT_EQ(7, update_count);
990 // Check that Omaha parameters were updated correctly.
991 EXPECT_TRUE(
992 attempter_.omaha_request_params_->update_check_count_wait_enabled());
993 EXPECT_TRUE(
994 attempter_.omaha_request_params_->wall_clock_based_wait_enabled());
995 EXPECT_EQ(waiting_time_days,
996 attempter_.omaha_request_params_->waiting_period().InDays());
997 // Check class variables.
998 EXPECT_EQ(waiting_time_days, attempter_.staging_wait_time_.InDays());
999 EXPECT_EQ(kValidStagingSchedule, attempter_.staging_schedule_);
1000 // Check that scattering is turned off
1001 EXPECT_EQ(0, attempter_.scatter_factor_.InSeconds());
1002 EXPECT_FALSE(fake_prefs.Exists(kPrefsWallClockScatteringWaitPeriod));
1003
1004 ScheduleQuitMainLoop();
1005}
1006
1007void UpdateAttempterTest::CheckStagingOff() {
1008 // Check that all prefs were removed.
1009 EXPECT_FALSE(attempter_.prefs_->Exists(kPrefsUpdateCheckCount));
1010 EXPECT_FALSE(attempter_.prefs_->Exists(kPrefsWallClockScatteringWaitPeriod));
1011 EXPECT_FALSE(attempter_.prefs_->Exists(kPrefsWallClockStagingWaitPeriod));
1012 // Check that the Omaha parameters have the correct value.
1013 EXPECT_EQ(0, attempter_.omaha_request_params_->waiting_period().InDays());
1014 EXPECT_EQ(attempter_.omaha_request_params_->waiting_period(),
1015 attempter_.staging_wait_time_);
1016 EXPECT_FALSE(
1017 attempter_.omaha_request_params_->update_check_count_wait_enabled());
1018 EXPECT_FALSE(
1019 attempter_.omaha_request_params_->wall_clock_based_wait_enabled());
1020 // Check that scattering is turned off too.
1021 EXPECT_EQ(0, attempter_.scatter_factor_.InSeconds());
1022}
1023
1024TEST_F(UpdateAttempterTest, StagingOffIfInteractive) {
1025 loop_.PostTask(FROM_HERE,
1026 base::Bind(&UpdateAttempterTest::StagingOffIfInteractiveStart,
1027 base::Unretained(this)));
1028 loop_.Run();
1029}
1030
1031void UpdateAttempterTest::StagingOffIfInteractiveStart() {
1032 // Tests that staging is turned off when an interactive update is requested.
1033 fake_system_state_.fake_hardware()->SetIsOOBEComplete(Time::UnixEpoch());
1034 FakePrefs fake_prefs;
1035 SetUpStagingTest(kValidStagingSchedule, &fake_prefs);
1036
1037 attempter_.Update("", "", "", "", false, false, /* interactive = */ true);
1038 CheckStagingOff();
1039
1040 ScheduleQuitMainLoop();
1041}
1042
1043TEST_F(UpdateAttempterTest, StagingOffIfOobe) {
1044 loop_.PostTask(FROM_HERE,
1045 base::Bind(&UpdateAttempterTest::StagingOffIfOobeStart,
1046 base::Unretained(this)));
1047 loop_.Run();
1048}
1049
1050void UpdateAttempterTest::StagingOffIfOobeStart() {
1051 // Tests that staging is turned off if OOBE hasn't been completed.
1052 fake_system_state_.fake_hardware()->SetIsOOBEEnabled(true);
1053 fake_system_state_.fake_hardware()->UnsetIsOOBEComplete();
1054 FakePrefs fake_prefs;
1055 SetUpStagingTest(kValidStagingSchedule, &fake_prefs);
1056
1057 attempter_.Update("", "", "", "", false, false, /* interactive = */ true);
1058 CheckStagingOff();
1059
1060 ScheduleQuitMainLoop();
1061}
1062
David Zeuthen985b1122013-10-09 12:13:15 -07001063// Checks that we only report daily metrics at most every 24 hours.
1064TEST_F(UpdateAttempterTest, ReportDailyMetrics) {
1065 FakeClock fake_clock;
Alex Deymo2c0db7b2014-11-04 12:23:39 -08001066 FakePrefs fake_prefs;
David Zeuthen985b1122013-10-09 12:13:15 -07001067
Gilad Arnold5bb4c902014-04-10 12:32:13 -07001068 fake_system_state_.set_clock(&fake_clock);
Alex Deymo2c0db7b2014-11-04 12:23:39 -08001069 fake_system_state_.set_prefs(&fake_prefs);
David Zeuthen985b1122013-10-09 12:13:15 -07001070
1071 Time epoch = Time::FromInternalValue(0);
1072 fake_clock.SetWallclockTime(epoch);
1073
1074 // If there is no kPrefsDailyMetricsLastReportedAt state variable,
1075 // we should report.
1076 EXPECT_TRUE(attempter_.CheckAndReportDailyMetrics());
1077 // We should not report again if no time has passed.
1078 EXPECT_FALSE(attempter_.CheckAndReportDailyMetrics());
1079
1080 // We should not report if only 10 hours has passed.
1081 fake_clock.SetWallclockTime(epoch + TimeDelta::FromHours(10));
1082 EXPECT_FALSE(attempter_.CheckAndReportDailyMetrics());
1083
1084 // We should not report if only 24 hours - 1 sec has passed.
1085 fake_clock.SetWallclockTime(epoch + TimeDelta::FromHours(24) -
1086 TimeDelta::FromSeconds(1));
1087 EXPECT_FALSE(attempter_.CheckAndReportDailyMetrics());
1088
1089 // We should report if 24 hours has passed.
1090 fake_clock.SetWallclockTime(epoch + TimeDelta::FromHours(24));
1091 EXPECT_TRUE(attempter_.CheckAndReportDailyMetrics());
1092
1093 // But then we should not report again..
1094 EXPECT_FALSE(attempter_.CheckAndReportDailyMetrics());
1095
1096 // .. until another 24 hours has passed
1097 fake_clock.SetWallclockTime(epoch + TimeDelta::FromHours(47));
1098 EXPECT_FALSE(attempter_.CheckAndReportDailyMetrics());
1099 fake_clock.SetWallclockTime(epoch + TimeDelta::FromHours(48));
1100 EXPECT_TRUE(attempter_.CheckAndReportDailyMetrics());
1101 EXPECT_FALSE(attempter_.CheckAndReportDailyMetrics());
1102
1103 // .. and another 24 hours
1104 fake_clock.SetWallclockTime(epoch + TimeDelta::FromHours(71));
1105 EXPECT_FALSE(attempter_.CheckAndReportDailyMetrics());
1106 fake_clock.SetWallclockTime(epoch + TimeDelta::FromHours(72));
1107 EXPECT_TRUE(attempter_.CheckAndReportDailyMetrics());
1108 EXPECT_FALSE(attempter_.CheckAndReportDailyMetrics());
1109
1110 // If the span between time of reporting and present time is
1111 // negative, we report. This is in order to reset the timestamp and
1112 // avoid an edge condition whereby a distant point in the future is
1113 // in the state variable resulting in us never ever reporting again.
1114 fake_clock.SetWallclockTime(epoch + TimeDelta::FromHours(71));
1115 EXPECT_TRUE(attempter_.CheckAndReportDailyMetrics());
1116 EXPECT_FALSE(attempter_.CheckAndReportDailyMetrics());
1117
1118 // In this case we should not update until the clock reads 71 + 24 = 95.
1119 // Check that.
1120 fake_clock.SetWallclockTime(epoch + TimeDelta::FromHours(94));
1121 EXPECT_FALSE(attempter_.CheckAndReportDailyMetrics());
1122 fake_clock.SetWallclockTime(epoch + TimeDelta::FromHours(95));
1123 EXPECT_TRUE(attempter_.CheckAndReportDailyMetrics());
1124 EXPECT_FALSE(attempter_.CheckAndReportDailyMetrics());
David Zeuthen985b1122013-10-09 12:13:15 -07001125}
1126
David Zeuthen3c55abd2013-10-14 12:48:03 -07001127TEST_F(UpdateAttempterTest, BootTimeInUpdateMarkerFile) {
David Zeuthen3c55abd2013-10-14 12:48:03 -07001128 FakeClock fake_clock;
1129 fake_clock.SetBootTime(Time::FromTimeT(42));
Gilad Arnold5bb4c902014-04-10 12:32:13 -07001130 fake_system_state_.set_clock(&fake_clock);
Alex Deymo906191f2015-10-12 12:22:44 -07001131 FakePrefs fake_prefs;
1132 fake_system_state_.set_prefs(&fake_prefs);
Sen Jiangaeeb2e02016-06-09 15:00:16 -07001133 attempter_.Init();
David Zeuthen3c55abd2013-10-14 12:48:03 -07001134
1135 Time boot_time;
Sen Jiangaeeb2e02016-06-09 15:00:16 -07001136 EXPECT_FALSE(attempter_.GetBootTimeAtUpdate(&boot_time));
David Zeuthen3c55abd2013-10-14 12:48:03 -07001137
Sen Jiangaeeb2e02016-06-09 15:00:16 -07001138 attempter_.WriteUpdateCompletedMarker();
David Zeuthen3c55abd2013-10-14 12:48:03 -07001139
Sen Jiangaeeb2e02016-06-09 15:00:16 -07001140 EXPECT_TRUE(attempter_.GetBootTimeAtUpdate(&boot_time));
David Zeuthen3c55abd2013-10-14 12:48:03 -07001141 EXPECT_EQ(boot_time.ToTimeT(), 42);
1142}
1143
David Pursell02c18642014-11-06 11:26:11 -08001144TEST_F(UpdateAttempterTest, AnyUpdateSourceAllowedUnofficial) {
1145 fake_system_state_.fake_hardware()->SetIsOfficialBuild(false);
1146 EXPECT_TRUE(attempter_.IsAnyUpdateSourceAllowed());
1147}
1148
1149TEST_F(UpdateAttempterTest, AnyUpdateSourceAllowedOfficialDevmode) {
1150 fake_system_state_.fake_hardware()->SetIsOfficialBuild(true);
Sen Jiange67bb5b2016-06-20 15:53:56 -07001151 fake_system_state_.fake_hardware()->SetAreDevFeaturesEnabled(true);
David Pursell02c18642014-11-06 11:26:11 -08001152 EXPECT_TRUE(attempter_.IsAnyUpdateSourceAllowed());
1153}
1154
1155TEST_F(UpdateAttempterTest, AnyUpdateSourceDisallowedOfficialNormal) {
1156 fake_system_state_.fake_hardware()->SetIsOfficialBuild(true);
Sen Jiange67bb5b2016-06-20 15:53:56 -07001157 fake_system_state_.fake_hardware()->SetAreDevFeaturesEnabled(false);
David Pursell02c18642014-11-06 11:26:11 -08001158 EXPECT_FALSE(attempter_.IsAnyUpdateSourceAllowed());
1159}
1160
1161TEST_F(UpdateAttempterTest, CheckForUpdateAUTest) {
1162 fake_system_state_.fake_hardware()->SetIsOfficialBuild(true);
Sen Jiange67bb5b2016-06-20 15:53:56 -07001163 fake_system_state_.fake_hardware()->SetAreDevFeaturesEnabled(false);
Aaron Wood081c0232017-10-19 17:14:58 -07001164 attempter_.CheckForUpdate("", "autest", UpdateAttemptFlags::kNone);
Alex Deymoac41a822015-09-15 20:52:53 -07001165 EXPECT_EQ(constants::kOmahaDefaultAUTestURL, attempter_.forced_omaha_url());
David Pursell02c18642014-11-06 11:26:11 -08001166}
1167
1168TEST_F(UpdateAttempterTest, CheckForUpdateScheduledAUTest) {
1169 fake_system_state_.fake_hardware()->SetIsOfficialBuild(true);
Sen Jiange67bb5b2016-06-20 15:53:56 -07001170 fake_system_state_.fake_hardware()->SetAreDevFeaturesEnabled(false);
Aaron Wood081c0232017-10-19 17:14:58 -07001171 attempter_.CheckForUpdate("", "autest-scheduled", UpdateAttemptFlags::kNone);
Alex Deymoac41a822015-09-15 20:52:53 -07001172 EXPECT_EQ(constants::kOmahaDefaultAUTestURL, attempter_.forced_omaha_url());
David Pursell02c18642014-11-06 11:26:11 -08001173}
1174
Xiyuan Xiac0e8f9a2017-02-22 13:19:35 -08001175TEST_F(UpdateAttempterTest, TargetVersionPrefixSetAndReset) {
Marton Hunyadyba51c3f2018-04-25 15:18:10 +02001176 attempter_.CalculateUpdateParams("", "", "", "1234", false, false, false);
Xiyuan Xiac0e8f9a2017-02-22 13:19:35 -08001177 EXPECT_EQ("1234",
1178 fake_system_state_.request_params()->target_version_prefix());
1179
Marton Hunyadyba51c3f2018-04-25 15:18:10 +02001180 attempter_.CalculateUpdateParams("", "", "", "", false, false, false);
Xiyuan Xiac0e8f9a2017-02-22 13:19:35 -08001181 EXPECT_TRUE(
1182 fake_system_state_.request_params()->target_version_prefix().empty());
1183}
1184
Marton Hunyadyba51c3f2018-04-25 15:18:10 +02001185TEST_F(UpdateAttempterTest, RollbackAllowedSetAndReset) {
1186 attempter_.CalculateUpdateParams("",
1187 "",
1188 "",
1189 "1234",
1190 /*rollback_allowed=*/true,
1191 false,
1192 false);
1193 EXPECT_TRUE(fake_system_state_.request_params()->rollback_allowed());
1194
1195 attempter_.CalculateUpdateParams("",
1196 "",
1197 "",
1198 "1234",
1199 /*rollback_allowed=*/false,
1200 false,
1201 false);
1202 EXPECT_FALSE(fake_system_state_.request_params()->rollback_allowed());
1203}
1204
Aaron Wood23bd3392017-10-06 14:48:25 -07001205TEST_F(UpdateAttempterTest, UpdateDeferredByPolicyTest) {
1206 // Construct an OmahaResponseHandlerAction that has processed an InstallPlan,
1207 // but the update is being deferred by the Policy.
Amin Hassani68512d42018-07-31 23:52:33 -07001208 OmahaResponseHandlerAction response_action(&fake_system_state_);
1209 response_action.install_plan_.version = "a.b.c.d";
1210 response_action.install_plan_.system_version = "b.c.d.e";
1211 response_action.install_plan_.payloads.push_back(
Aaron Wood23bd3392017-10-06 14:48:25 -07001212 {.size = 1234ULL, .type = InstallPayloadType::kFull});
Aaron Wood23bd3392017-10-06 14:48:25 -07001213 // Inform the UpdateAttempter that the OmahaResponseHandlerAction has
1214 // completed, with the deferred-update error code.
1215 attempter_.ActionCompleted(
Amin Hassani68512d42018-07-31 23:52:33 -07001216 nullptr, &response_action, ErrorCode::kOmahaUpdateDeferredPerPolicy);
Aaron Wood23bd3392017-10-06 14:48:25 -07001217 {
1218 UpdateEngineStatus status;
1219 attempter_.GetStatus(&status);
1220 EXPECT_EQ(UpdateStatus::UPDATE_AVAILABLE, status.status);
Amin Hassanid3f4bea2018-04-30 14:52:40 -07001221 EXPECT_TRUE(attempter_.install_plan_);
1222 EXPECT_EQ(attempter_.install_plan_->version, status.new_version);
1223 EXPECT_EQ(attempter_.install_plan_->system_version,
Aaron Wood23bd3392017-10-06 14:48:25 -07001224 status.new_system_version);
Amin Hassanid3f4bea2018-04-30 14:52:40 -07001225 EXPECT_EQ(attempter_.install_plan_->payloads[0].size,
Aaron Wood23bd3392017-10-06 14:48:25 -07001226 status.new_size_bytes);
1227 }
1228 // An "error" event should have been created to tell Omaha that the update is
1229 // being deferred.
1230 EXPECT_TRUE(nullptr != attempter_.error_event_);
1231 EXPECT_EQ(OmahaEvent::kTypeUpdateComplete, attempter_.error_event_->type);
1232 EXPECT_EQ(OmahaEvent::kResultUpdateDeferred, attempter_.error_event_->result);
1233 ErrorCode expected_code = static_cast<ErrorCode>(
1234 static_cast<int>(ErrorCode::kOmahaUpdateDeferredPerPolicy) |
1235 static_cast<int>(ErrorCode::kTestOmahaUrlFlag));
1236 EXPECT_EQ(expected_code, attempter_.error_event_->error_code);
1237 // End the processing
1238 attempter_.ProcessingDone(nullptr, ErrorCode::kOmahaUpdateDeferredPerPolicy);
1239 // Validate the state of the attempter.
1240 {
1241 UpdateEngineStatus status;
1242 attempter_.GetStatus(&status);
1243 EXPECT_EQ(UpdateStatus::REPORTING_ERROR_EVENT, status.status);
Amin Hassani68512d42018-07-31 23:52:33 -07001244 EXPECT_EQ(response_action.install_plan_.version, status.new_version);
1245 EXPECT_EQ(response_action.install_plan_.system_version,
Aaron Wood23bd3392017-10-06 14:48:25 -07001246 status.new_system_version);
Amin Hassani68512d42018-07-31 23:52:33 -07001247 EXPECT_EQ(response_action.install_plan_.payloads[0].size,
Aaron Wood23bd3392017-10-06 14:48:25 -07001248 status.new_size_bytes);
1249 }
1250}
1251
1252TEST_F(UpdateAttempterTest, UpdateIsNotRunningWhenUpdateAvailable) {
1253 EXPECT_FALSE(attempter_.IsUpdateRunningOrScheduled());
1254 // Verify in-progress update with UPDATE_AVAILABLE is running
1255 attempter_.status_ = UpdateStatus::UPDATE_AVAILABLE;
1256 EXPECT_TRUE(attempter_.IsUpdateRunningOrScheduled());
1257}
1258
Aaron Woodbf5a2522017-10-04 10:58:36 -07001259TEST_F(UpdateAttempterTest, UpdateAttemptFlagsCachedAtUpdateStart) {
1260 attempter_.SetUpdateAttemptFlags(UpdateAttemptFlags::kFlagRestrictDownload);
1261
1262 UpdateCheckParams params = {.updates_enabled = true};
1263 attempter_.OnUpdateScheduled(EvalStatus::kSucceeded, params);
1264
1265 EXPECT_EQ(UpdateAttemptFlags::kFlagRestrictDownload,
1266 attempter_.GetCurrentUpdateAttemptFlags());
1267}
1268
Marton Hunyadyba51c3f2018-04-25 15:18:10 +02001269TEST_F(UpdateAttempterTest, RollbackNotAllowed) {
1270 UpdateCheckParams params = {.updates_enabled = true,
1271 .rollback_allowed = false};
1272 attempter_.OnUpdateScheduled(EvalStatus::kSucceeded, params);
1273 EXPECT_FALSE(fake_system_state_.request_params()->rollback_allowed());
1274}
1275
1276TEST_F(UpdateAttempterTest, RollbackAllowed) {
1277 UpdateCheckParams params = {.updates_enabled = true,
1278 .rollback_allowed = true};
1279 attempter_.OnUpdateScheduled(EvalStatus::kSucceeded, params);
1280 EXPECT_TRUE(fake_system_state_.request_params()->rollback_allowed());
1281}
1282
Aaron Wood081c0232017-10-19 17:14:58 -07001283TEST_F(UpdateAttempterTest, InteractiveUpdateUsesPassedRestrictions) {
1284 attempter_.SetUpdateAttemptFlags(UpdateAttemptFlags::kFlagRestrictDownload);
1285
1286 attempter_.CheckForUpdate("", "", UpdateAttemptFlags::kNone);
1287 EXPECT_EQ(UpdateAttemptFlags::kNone,
1288 attempter_.GetCurrentUpdateAttemptFlags());
1289}
1290
1291TEST_F(UpdateAttempterTest, NonInteractiveUpdateUsesSetRestrictions) {
1292 attempter_.SetUpdateAttemptFlags(UpdateAttemptFlags::kNone);
1293
1294 // This tests that when CheckForUpdate() is called with the non-interactive
1295 // flag set, that it doesn't change the current UpdateAttemptFlags.
1296 attempter_.CheckForUpdate("",
1297 "",
1298 UpdateAttemptFlags::kFlagNonInteractive |
1299 UpdateAttemptFlags::kFlagRestrictDownload);
1300 EXPECT_EQ(UpdateAttemptFlags::kNone,
1301 attempter_.GetCurrentUpdateAttemptFlags());
1302}
1303
Marton Hunyadye58bddb2018-04-10 20:27:26 +02001304void UpdateAttempterTest::ResetRollbackHappenedStart(bool is_consumer,
1305 bool is_policy_loaded,
1306 bool expected_reset) {
1307 EXPECT_CALL(*fake_system_state_.mock_payload_state(), GetRollbackHappened())
1308 .WillRepeatedly(Return(true));
1309 auto mock_policy_provider =
1310 std::make_unique<NiceMock<policy::MockPolicyProvider>>();
1311 EXPECT_CALL(*mock_policy_provider, IsConsumerDevice())
1312 .WillRepeatedly(Return(is_consumer));
1313 EXPECT_CALL(*mock_policy_provider, device_policy_is_loaded())
1314 .WillRepeatedly(Return(is_policy_loaded));
1315 const policy::MockDevicePolicy device_policy;
1316 EXPECT_CALL(*mock_policy_provider, GetDevicePolicy())
1317 .WillRepeatedly(ReturnRef(device_policy));
1318 EXPECT_CALL(*fake_system_state_.mock_payload_state(),
1319 SetRollbackHappened(false))
1320 .Times(expected_reset ? 1 : 0);
1321 attempter_.policy_provider_ = std::move(mock_policy_provider);
Marton Hunyadyba51c3f2018-04-25 15:18:10 +02001322 attempter_.Update("", "", "", "", false, false, false);
Marton Hunyadye58bddb2018-04-10 20:27:26 +02001323 ScheduleQuitMainLoop();
1324}
1325
1326TEST_F(UpdateAttempterTest, ResetRollbackHappenedOobe) {
1327 loop_.PostTask(FROM_HERE,
1328 base::Bind(&UpdateAttempterTest::ResetRollbackHappenedStart,
1329 base::Unretained(this),
1330 /*is_consumer=*/false,
1331 /*is_policy_loaded=*/false,
1332 /*expected_reset=*/false));
1333 loop_.Run();
1334}
1335
1336TEST_F(UpdateAttempterTest, ResetRollbackHappenedConsumer) {
1337 loop_.PostTask(FROM_HERE,
1338 base::Bind(&UpdateAttempterTest::ResetRollbackHappenedStart,
1339 base::Unretained(this),
1340 /*is_consumer=*/true,
1341 /*is_policy_loaded=*/false,
1342 /*expected_reset=*/true));
1343 loop_.Run();
1344}
1345
1346TEST_F(UpdateAttempterTest, ResetRollbackHappenedEnterprise) {
1347 loop_.PostTask(FROM_HERE,
1348 base::Bind(&UpdateAttempterTest::ResetRollbackHappenedStart,
1349 base::Unretained(this),
1350 /*is_consumer=*/false,
1351 /*is_policy_loaded=*/true,
1352 /*expected_reset=*/true));
1353 loop_.Run();
1354}
1355
Marton Hunyady199152d2018-05-07 19:08:48 +02001356TEST_F(UpdateAttempterTest, SetRollbackHappenedRollback) {
Amin Hassanid3f4bea2018-04-30 14:52:40 -07001357 attempter_.install_plan_.reset(new InstallPlan);
1358 attempter_.install_plan_->is_rollback = true;
Marton Hunyady199152d2018-05-07 19:08:48 +02001359
1360 EXPECT_CALL(*fake_system_state_.mock_payload_state(),
1361 SetRollbackHappened(true))
1362 .Times(1);
1363 attempter_.ProcessingDone(nullptr, ErrorCode::kSuccess);
1364}
1365
1366TEST_F(UpdateAttempterTest, SetRollbackHappenedNotRollback) {
Amin Hassanid3f4bea2018-04-30 14:52:40 -07001367 attempter_.install_plan_.reset(new InstallPlan);
1368 attempter_.install_plan_->is_rollback = false;
Marton Hunyady199152d2018-05-07 19:08:48 +02001369
1370 EXPECT_CALL(*fake_system_state_.mock_payload_state(),
1371 SetRollbackHappened(true))
1372 .Times(0);
1373 attempter_.ProcessingDone(nullptr, ErrorCode::kSuccess);
1374}
1375
Marton Hunyadya0302682018-05-16 18:52:13 +02001376TEST_F(UpdateAttempterTest, RollbackMetricsRollbackSuccess) {
Amin Hassanid3f4bea2018-04-30 14:52:40 -07001377 attempter_.install_plan_.reset(new InstallPlan);
1378 attempter_.install_plan_->is_rollback = true;
1379 attempter_.install_plan_->version = kRollbackVersion;
Marton Hunyadya0302682018-05-16 18:52:13 +02001380
1381 EXPECT_CALL(*fake_system_state_.mock_metrics_reporter(),
1382 ReportEnterpriseRollbackMetrics(true, kRollbackVersion))
1383 .Times(1);
1384 attempter_.ProcessingDone(nullptr, ErrorCode::kSuccess);
1385}
1386
1387TEST_F(UpdateAttempterTest, RollbackMetricsNotRollbackSuccess) {
Amin Hassanid3f4bea2018-04-30 14:52:40 -07001388 attempter_.install_plan_.reset(new InstallPlan);
1389 attempter_.install_plan_->is_rollback = false;
1390 attempter_.install_plan_->version = kRollbackVersion;
Marton Hunyadya0302682018-05-16 18:52:13 +02001391
1392 EXPECT_CALL(*fake_system_state_.mock_metrics_reporter(),
1393 ReportEnterpriseRollbackMetrics(_, _))
1394 .Times(0);
1395 attempter_.ProcessingDone(nullptr, ErrorCode::kSuccess);
1396}
1397
1398TEST_F(UpdateAttempterTest, RollbackMetricsRollbackFailure) {
Amin Hassanid3f4bea2018-04-30 14:52:40 -07001399 attempter_.install_plan_.reset(new InstallPlan);
1400 attempter_.install_plan_->is_rollback = true;
1401 attempter_.install_plan_->version = kRollbackVersion;
Marton Hunyadya0302682018-05-16 18:52:13 +02001402
1403 EXPECT_CALL(*fake_system_state_.mock_metrics_reporter(),
1404 ReportEnterpriseRollbackMetrics(false, kRollbackVersion))
1405 .Times(1);
1406 MockAction action;
1407 attempter_.CreatePendingErrorEvent(&action, ErrorCode::kRollbackNotPossible);
1408 attempter_.ProcessingDone(nullptr, ErrorCode::kRollbackNotPossible);
1409}
1410
1411TEST_F(UpdateAttempterTest, RollbackMetricsNotRollbackFailure) {
Amin Hassanid3f4bea2018-04-30 14:52:40 -07001412 attempter_.install_plan_.reset(new InstallPlan);
1413 attempter_.install_plan_->is_rollback = false;
1414 attempter_.install_plan_->version = kRollbackVersion;
Marton Hunyadya0302682018-05-16 18:52:13 +02001415
1416 EXPECT_CALL(*fake_system_state_.mock_metrics_reporter(),
1417 ReportEnterpriseRollbackMetrics(_, _))
1418 .Times(0);
1419 MockAction action;
1420 attempter_.CreatePendingErrorEvent(&action, ErrorCode::kRollbackNotPossible);
1421 attempter_.ProcessingDone(nullptr, ErrorCode::kRollbackNotPossible);
1422}
1423
Darin Petkovf42cc1c2010-09-01 09:03:02 -07001424} // namespace chromeos_update_engine