| // Copyright (c) 2011 The Chromium OS Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include <glib.h> |
| #include <gmock/gmock.h> |
| #include <gtest/gtest.h> |
| |
| #include <string> |
| #include <utility> |
| #include <vector> |
| |
| #include <base/file_path.h> |
| #include <base/file_util.h> |
| #include <base/stringprintf.h> |
| |
| #include "update_engine/action_pipe.h" |
| #include "update_engine/download_action.h" |
| #include "update_engine/mock_http_fetcher.h" |
| #include "update_engine/mock_system_state.h" |
| #include "update_engine/omaha_hash_calculator.h" |
| #include "update_engine/fake_p2p_manager_configuration.h" |
| #include "update_engine/prefs_mock.h" |
| #include "update_engine/test_utils.h" |
| #include "update_engine/utils.h" |
| |
| namespace chromeos_update_engine { |
| |
| using std::string; |
| using std::vector; |
| using testing::_; |
| using testing::AtLeast; |
| using testing::InSequence; |
| using base::FilePath; |
| using base::StringPrintf; |
| using file_util::WriteFile; |
| using file_util::ReadFileToString; |
| |
| class DownloadActionTest : public ::testing::Test { }; |
| |
| namespace { |
| class DownloadActionDelegateMock : public DownloadActionDelegate { |
| public: |
| MOCK_METHOD1(SetDownloadStatus, void(bool active)); |
| MOCK_METHOD2(BytesReceived, void(uint64_t bytes_received, uint64_t total)); |
| }; |
| |
| class DownloadActionTestProcessorDelegate : public ActionProcessorDelegate { |
| public: |
| explicit DownloadActionTestProcessorDelegate(ErrorCode expected_code) |
| : loop_(NULL), |
| processing_done_called_(false), |
| expected_code_(expected_code) {} |
| virtual ~DownloadActionTestProcessorDelegate() { |
| EXPECT_TRUE(processing_done_called_); |
| } |
| virtual void ProcessingDone(const ActionProcessor* processor, |
| ErrorCode code) { |
| ASSERT_TRUE(loop_); |
| g_main_loop_quit(loop_); |
| vector<char> found_data; |
| ASSERT_TRUE(utils::ReadFile(path_, &found_data)); |
| if (expected_code_ != kErrorCodeDownloadWriteError) { |
| ASSERT_EQ(expected_data_.size(), found_data.size()); |
| for (unsigned i = 0; i < expected_data_.size(); i++) { |
| EXPECT_EQ(expected_data_[i], found_data[i]); |
| } |
| } |
| processing_done_called_ = true; |
| } |
| |
| virtual void ActionCompleted(ActionProcessor* processor, |
| AbstractAction* action, |
| ErrorCode code) { |
| const string type = action->Type(); |
| if (type == DownloadAction::StaticType()) { |
| EXPECT_EQ(expected_code_, code); |
| } else { |
| EXPECT_EQ(kErrorCodeSuccess, code); |
| } |
| } |
| |
| GMainLoop *loop_; |
| string path_; |
| vector<char> expected_data_; |
| bool processing_done_called_; |
| ErrorCode expected_code_; |
| }; |
| |
| class TestDirectFileWriter : public DirectFileWriter { |
| public: |
| TestDirectFileWriter() : fail_write_(0), current_write_(0) {} |
| void set_fail_write(int fail_write) { fail_write_ = fail_write; } |
| |
| virtual bool Write(const void* bytes, size_t count) { |
| if (++current_write_ == fail_write_) { |
| return false; |
| } |
| return DirectFileWriter::Write(bytes, count); |
| } |
| |
| private: |
| // If positive, fail on the |fail_write_| call to Write. |
| int fail_write_; |
| int current_write_; |
| }; |
| |
| struct EntryPointArgs { |
| const vector<char> *data; |
| GMainLoop *loop; |
| ActionProcessor *processor; |
| }; |
| |
| struct StartProcessorInRunLoopArgs { |
| ActionProcessor* processor; |
| MockHttpFetcher* http_fetcher; |
| }; |
| |
| gboolean StartProcessorInRunLoop(gpointer data) { |
| ActionProcessor* processor = |
| reinterpret_cast<StartProcessorInRunLoopArgs*>(data)->processor; |
| processor->StartProcessing(); |
| MockHttpFetcher* http_fetcher = |
| reinterpret_cast<StartProcessorInRunLoopArgs*>(data)->http_fetcher; |
| http_fetcher->SetOffset(1); |
| return FALSE; |
| } |
| |
| void TestWithData(const vector<char>& data, |
| int fail_write, |
| bool use_download_delegate) { |
| GMainLoop *loop = g_main_loop_new(g_main_context_default(), FALSE); |
| |
| // TODO(adlr): see if we need a different file for build bots |
| ScopedTempFile output_temp_file; |
| TestDirectFileWriter writer; |
| writer.set_fail_write(fail_write); |
| |
| // We pull off the first byte from data and seek past it. |
| |
| string hash = |
| OmahaHashCalculator::OmahaHashOfBytes(&data[1], data.size() - 1); |
| uint64_t size = data.size(); |
| InstallPlan install_plan(false, |
| false, |
| "", |
| size, |
| hash, |
| 0, |
| "", |
| output_temp_file.GetPath(), |
| "", |
| ""); |
| ObjectFeederAction<InstallPlan> feeder_action; |
| feeder_action.set_obj(install_plan); |
| PrefsMock prefs; |
| MockHttpFetcher* http_fetcher = new MockHttpFetcher(&data[0], |
| data.size(), |
| NULL); |
| // takes ownership of passed in HttpFetcher |
| DownloadAction download_action(&prefs, NULL, http_fetcher); |
| download_action.SetTestFileWriter(&writer); |
| BondActions(&feeder_action, &download_action); |
| DownloadActionDelegateMock download_delegate; |
| if (use_download_delegate) { |
| InSequence s; |
| download_action.set_delegate(&download_delegate); |
| EXPECT_CALL(download_delegate, SetDownloadStatus(true)).Times(1); |
| if (data.size() > kMockHttpFetcherChunkSize) |
| EXPECT_CALL(download_delegate, |
| BytesReceived(1 + kMockHttpFetcherChunkSize, _)); |
| EXPECT_CALL(download_delegate, BytesReceived(_, _)).Times(AtLeast(1)); |
| EXPECT_CALL(download_delegate, SetDownloadStatus(false)).Times(1); |
| } |
| ErrorCode expected_code = kErrorCodeSuccess; |
| if (fail_write > 0) |
| expected_code = kErrorCodeDownloadWriteError; |
| DownloadActionTestProcessorDelegate delegate(expected_code); |
| delegate.loop_ = loop; |
| delegate.expected_data_ = vector<char>(data.begin() + 1, data.end()); |
| delegate.path_ = output_temp_file.GetPath(); |
| ActionProcessor processor; |
| processor.set_delegate(&delegate); |
| processor.EnqueueAction(&feeder_action); |
| processor.EnqueueAction(&download_action); |
| |
| StartProcessorInRunLoopArgs args; |
| args.processor = &processor; |
| args.http_fetcher = http_fetcher; |
| g_timeout_add(0, &StartProcessorInRunLoop, &args); |
| g_main_loop_run(loop); |
| g_main_loop_unref(loop); |
| } |
| } // namespace {} |
| |
| TEST(DownloadActionTest, SimpleTest) { |
| vector<char> small; |
| const char* foo = "foo"; |
| small.insert(small.end(), foo, foo + strlen(foo)); |
| TestWithData(small, |
| 0, // fail_write |
| true); // use_download_delegate |
| } |
| |
| TEST(DownloadActionTest, LargeTest) { |
| vector<char> big(5 * kMockHttpFetcherChunkSize); |
| char c = '0'; |
| for (unsigned int i = 0; i < big.size(); i++) { |
| big[i] = c; |
| c = ('9' == c) ? '0' : c + 1; |
| } |
| TestWithData(big, |
| 0, // fail_write |
| true); // use_download_delegate |
| } |
| |
| TEST(DownloadActionTest, FailWriteTest) { |
| vector<char> big(5 * kMockHttpFetcherChunkSize); |
| char c = '0'; |
| for (unsigned int i = 0; i < big.size(); i++) { |
| big[i] = c; |
| c = ('9' == c) ? '0' : c + 1; |
| } |
| TestWithData(big, |
| 2, // fail_write |
| true); // use_download_delegate |
| } |
| |
| TEST(DownloadActionTest, NoDownloadDelegateTest) { |
| vector<char> small; |
| const char* foo = "foofoo"; |
| small.insert(small.end(), foo, foo + strlen(foo)); |
| TestWithData(small, |
| 0, // fail_write |
| false); // use_download_delegate |
| } |
| |
| namespace { |
| class TerminateEarlyTestProcessorDelegate : public ActionProcessorDelegate { |
| public: |
| void ProcessingStopped(const ActionProcessor* processor) { |
| ASSERT_TRUE(loop_); |
| g_main_loop_quit(loop_); |
| } |
| GMainLoop *loop_; |
| }; |
| |
| gboolean TerminateEarlyTestStarter(gpointer data) { |
| ActionProcessor *processor = reinterpret_cast<ActionProcessor*>(data); |
| processor->StartProcessing(); |
| CHECK(processor->IsRunning()); |
| processor->StopProcessing(); |
| return FALSE; |
| } |
| |
| void TestTerminateEarly(bool use_download_delegate) { |
| GMainLoop *loop = g_main_loop_new(g_main_context_default(), FALSE); |
| |
| vector<char> data(kMockHttpFetcherChunkSize + kMockHttpFetcherChunkSize / 2); |
| memset(&data[0], 0, data.size()); |
| |
| ScopedTempFile temp_file; |
| { |
| DirectFileWriter writer; |
| |
| // takes ownership of passed in HttpFetcher |
| ObjectFeederAction<InstallPlan> feeder_action; |
| InstallPlan install_plan(false, false, "", 0, "", 0, "", |
| temp_file.GetPath(), "", ""); |
| feeder_action.set_obj(install_plan); |
| PrefsMock prefs; |
| DownloadAction download_action(&prefs, NULL, |
| new MockHttpFetcher(&data[0], |
| data.size(), |
| NULL)); |
| download_action.SetTestFileWriter(&writer); |
| DownloadActionDelegateMock download_delegate; |
| if (use_download_delegate) { |
| InSequence s; |
| download_action.set_delegate(&download_delegate); |
| EXPECT_CALL(download_delegate, SetDownloadStatus(true)).Times(1); |
| EXPECT_CALL(download_delegate, SetDownloadStatus(false)).Times(1); |
| } |
| TerminateEarlyTestProcessorDelegate delegate; |
| delegate.loop_ = loop; |
| ActionProcessor processor; |
| processor.set_delegate(&delegate); |
| processor.EnqueueAction(&feeder_action); |
| processor.EnqueueAction(&download_action); |
| BondActions(&feeder_action, &download_action); |
| |
| g_timeout_add(0, &TerminateEarlyTestStarter, &processor); |
| g_main_loop_run(loop); |
| g_main_loop_unref(loop); |
| } |
| |
| // 1 or 0 chunks should have come through |
| const off_t resulting_file_size(utils::FileSize(temp_file.GetPath())); |
| EXPECT_GE(resulting_file_size, 0); |
| if (resulting_file_size != 0) |
| EXPECT_EQ(kMockHttpFetcherChunkSize, resulting_file_size); |
| } |
| |
| } // namespace {} |
| |
| TEST(DownloadActionTest, TerminateEarlyTest) { |
| TestTerminateEarly(true); |
| } |
| |
| TEST(DownloadActionTest, TerminateEarlyNoDownloadDelegateTest) { |
| TestTerminateEarly(false); |
| } |
| |
| class DownloadActionTestAction; |
| |
| template<> |
| class ActionTraits<DownloadActionTestAction> { |
| public: |
| typedef InstallPlan OutputObjectType; |
| typedef InstallPlan InputObjectType; |
| }; |
| |
| // This is a simple Action class for testing. |
| class DownloadActionTestAction : public Action<DownloadActionTestAction> { |
| public: |
| DownloadActionTestAction() : did_run_(false) {} |
| typedef InstallPlan InputObjectType; |
| typedef InstallPlan OutputObjectType; |
| ActionPipe<InstallPlan>* in_pipe() { return in_pipe_.get(); } |
| ActionPipe<InstallPlan>* out_pipe() { return out_pipe_.get(); } |
| ActionProcessor* processor() { return processor_; } |
| void PerformAction() { |
| did_run_ = true; |
| ASSERT_TRUE(HasInputObject()); |
| EXPECT_TRUE(expected_input_object_ == GetInputObject()); |
| ASSERT_TRUE(processor()); |
| processor()->ActionComplete(this, kErrorCodeSuccess); |
| } |
| string Type() const { return "DownloadActionTestAction"; } |
| InstallPlan expected_input_object_; |
| bool did_run_; |
| }; |
| |
| namespace { |
| // This class is an ActionProcessorDelegate that simply terminates the |
| // run loop when the ActionProcessor has completed processing. It's used |
| // only by the test PassObjectOutTest. |
| class PassObjectOutTestProcessorDelegate : public ActionProcessorDelegate { |
| public: |
| void ProcessingDone(const ActionProcessor* processor, ErrorCode code) { |
| ASSERT_TRUE(loop_); |
| g_main_loop_quit(loop_); |
| } |
| GMainLoop *loop_; |
| }; |
| |
| gboolean PassObjectOutTestStarter(gpointer data) { |
| ActionProcessor *processor = reinterpret_cast<ActionProcessor*>(data); |
| processor->StartProcessing(); |
| return FALSE; |
| } |
| } |
| |
| TEST(DownloadActionTest, PassObjectOutTest) { |
| GMainLoop *loop = g_main_loop_new(g_main_context_default(), FALSE); |
| |
| DirectFileWriter writer; |
| |
| // takes ownership of passed in HttpFetcher |
| InstallPlan install_plan(false, |
| false, |
| "", |
| 1, |
| OmahaHashCalculator::OmahaHashOfString("x"), |
| 0, |
| "", |
| "/dev/null", |
| "/dev/null", |
| ""); |
| ObjectFeederAction<InstallPlan> feeder_action; |
| feeder_action.set_obj(install_plan); |
| PrefsMock prefs; |
| DownloadAction download_action(&prefs, NULL, |
| new MockHttpFetcher("x", 1, NULL)); |
| download_action.SetTestFileWriter(&writer); |
| |
| DownloadActionTestAction test_action; |
| test_action.expected_input_object_ = install_plan; |
| BondActions(&feeder_action, &download_action); |
| BondActions(&download_action, &test_action); |
| |
| ActionProcessor processor; |
| PassObjectOutTestProcessorDelegate delegate; |
| delegate.loop_ = loop; |
| processor.set_delegate(&delegate); |
| processor.EnqueueAction(&feeder_action); |
| processor.EnqueueAction(&download_action); |
| processor.EnqueueAction(&test_action); |
| |
| g_timeout_add(0, &PassObjectOutTestStarter, &processor); |
| g_main_loop_run(loop); |
| g_main_loop_unref(loop); |
| |
| EXPECT_EQ(true, test_action.did_run_); |
| } |
| |
| TEST(DownloadActionTest, BadOutFileTest) { |
| GMainLoop *loop = g_main_loop_new(g_main_context_default(), FALSE); |
| |
| const string path("/fake/path/that/cant/be/created/because/of/missing/dirs"); |
| DirectFileWriter writer; |
| |
| // takes ownership of passed in HttpFetcher |
| InstallPlan install_plan(false, false, "", 0, "", 0, "", path, "", ""); |
| ObjectFeederAction<InstallPlan> feeder_action; |
| feeder_action.set_obj(install_plan); |
| PrefsMock prefs; |
| DownloadAction download_action(&prefs, NULL, |
| new MockHttpFetcher("x", 1, NULL)); |
| download_action.SetTestFileWriter(&writer); |
| |
| BondActions(&feeder_action, &download_action); |
| |
| ActionProcessor processor; |
| processor.EnqueueAction(&feeder_action); |
| processor.EnqueueAction(&download_action); |
| processor.StartProcessing(); |
| ASSERT_FALSE(processor.IsRunning()); |
| |
| g_main_loop_unref(loop); |
| } |
| |
| gboolean StartProcessorInRunLoopForP2P(gpointer user_data) { |
| ActionProcessor* processor = reinterpret_cast<ActionProcessor*>(user_data); |
| processor->StartProcessing(); |
| return FALSE; |
| } |
| |
| // Test fixture for P2P tests. |
| class P2PDownloadActionTest : public testing::Test { |
| protected: |
| P2PDownloadActionTest() |
| : loop_(NULL), |
| start_at_offset_(0) {} |
| |
| virtual ~P2PDownloadActionTest() {} |
| |
| // Derived from testing::Test. |
| virtual void SetUp() { |
| loop_ = g_main_loop_new(g_main_context_default(), FALSE); |
| } |
| |
| // Derived from testing::Test. |
| virtual void TearDown() { |
| if (loop_ != NULL) |
| g_main_loop_unref(loop_); |
| } |
| |
| // To be called by tests to setup the download. The |
| // |starting_offset| parameter is for where to resume. |
| void SetupDownload(off_t starting_offset) { |
| start_at_offset_ = starting_offset; |
| // Prepare data 10 kB of data. |
| data_.clear(); |
| for (unsigned int i = 0; i < 10 * 1000; i++) |
| data_ += 'a' + (i % 25); |
| |
| // Setup p2p. |
| FakeP2PManagerConfiguration *test_conf = new FakeP2PManagerConfiguration(); |
| p2p_manager_.reset(P2PManager::Construct(test_conf, NULL, "cros_au", 3)); |
| mock_system_state_.set_p2p_manager(p2p_manager_.get()); |
| } |
| |
| // To be called by tests to perform the download. The |
| // |use_p2p_to_share| parameter is used to indicate whether the |
| // payload should be shared via p2p. |
| void StartDownload(bool use_p2p_to_share) { |
| mock_system_state_.request_params()->set_use_p2p_for_sharing( |
| use_p2p_to_share); |
| |
| ScopedTempFile output_temp_file; |
| TestDirectFileWriter writer; |
| InstallPlan install_plan(false, |
| false, |
| "", |
| data_.length(), |
| "1234hash", |
| 0, |
| "", |
| output_temp_file.GetPath(), |
| "", |
| ""); |
| ObjectFeederAction<InstallPlan> feeder_action; |
| feeder_action.set_obj(install_plan); |
| PrefsMock prefs; |
| http_fetcher_ = new MockHttpFetcher(data_.c_str(), |
| data_.length(), |
| NULL); |
| // Note that DownloadAction takes ownership of the passed in HttpFetcher. |
| download_action_.reset(new DownloadAction(&prefs, &mock_system_state_, |
| http_fetcher_)); |
| download_action_->SetTestFileWriter(&writer); |
| BondActions(&feeder_action, download_action_.get()); |
| DownloadActionTestProcessorDelegate delegate(kErrorCodeSuccess); |
| delegate.loop_ = loop_; |
| delegate.expected_data_ = vector<char>(data_.begin() + start_at_offset_, |
| data_.end()); |
| delegate.path_ = output_temp_file.GetPath(); |
| processor_.set_delegate(&delegate); |
| processor_.EnqueueAction(&feeder_action); |
| processor_.EnqueueAction(download_action_.get()); |
| |
| g_timeout_add(0, &StartProcessorInRunLoopForP2P, this); |
| g_main_loop_run(loop_); |
| } |
| |
| // The DownloadAction instance under test. |
| scoped_ptr<DownloadAction> download_action_; |
| |
| // The HttpFetcher used in the test. |
| MockHttpFetcher* http_fetcher_; |
| |
| // The P2PManager used in the test. |
| scoped_ptr<P2PManager> p2p_manager_; |
| |
| // The ActionProcessor used for running the actions. |
| ActionProcessor processor_; |
| |
| // A fake system state. |
| MockSystemState mock_system_state_; |
| |
| // The data being downloaded. |
| string data_; |
| |
| private: |
| // Callback used in StartDownload() method. |
| static gboolean StartProcessorInRunLoopForP2P(gpointer user_data) { |
| class P2PDownloadActionTest *test = |
| reinterpret_cast<P2PDownloadActionTest*>(user_data); |
| test->processor_.StartProcessing(); |
| test->http_fetcher_->SetOffset(test->start_at_offset_); |
| return FALSE; |
| } |
| |
| // Mainloop used to make StartDownload() synchronous. |
| GMainLoop *loop_; |
| |
| // The requested starting offset passed to SetupDownload(). |
| off_t start_at_offset_; |
| }; |
| |
| TEST_F(P2PDownloadActionTest, IsWrittenTo) { |
| if (!utils::IsXAttrSupported(FilePath("/tmp"))) { |
| LOG(WARNING) << "Skipping test because /tmp does not support xattr. " |
| << "Please update your system to support this feature."; |
| return; |
| } |
| |
| SetupDownload(0); // starting_offset |
| StartDownload(true); // use_p2p_to_share |
| |
| // Check the p2p file and its content matches what was sent. |
| string file_id = download_action_->p2p_file_id(); |
| EXPECT_NE(file_id, ""); |
| EXPECT_EQ(p2p_manager_->FileGetSize(file_id), data_.length()); |
| EXPECT_EQ(p2p_manager_->FileGetExpectedSize(file_id), data_.length()); |
| string p2p_file_contents; |
| EXPECT_TRUE(ReadFileToString(p2p_manager_->FileGetPath(file_id), |
| &p2p_file_contents)); |
| EXPECT_EQ(data_, p2p_file_contents); |
| } |
| |
| TEST_F(P2PDownloadActionTest, DeleteIfHoleExists) { |
| if (!utils::IsXAttrSupported(FilePath("/tmp"))) { |
| LOG(WARNING) << "Skipping test because /tmp does not support xattr. " |
| << "Please update your system to support this feature."; |
| return; |
| } |
| |
| SetupDownload(1000); // starting_offset |
| StartDownload(true); // use_p2p_to_share |
| |
| // DownloadAction should convey that the file is not being shared. |
| // and that we don't have any p2p files. |
| EXPECT_EQ(download_action_->p2p_file_id(), ""); |
| EXPECT_EQ(p2p_manager_->CountSharedFiles(), 0); |
| } |
| |
| TEST_F(P2PDownloadActionTest, CanAppend) { |
| if (!utils::IsXAttrSupported(FilePath("/tmp"))) { |
| LOG(WARNING) << "Skipping test because /tmp does not support xattr. " |
| << "Please update your system to support this feature."; |
| return; |
| } |
| |
| SetupDownload(1000); // starting_offset |
| |
| // Prepare the file with existing data before starting to write to |
| // it via DownloadAction. |
| string file_id = utils::CalculateP2PFileId("1234hash", data_.length()); |
| ASSERT_TRUE(p2p_manager_->FileShare(file_id, data_.length())); |
| string existing_data; |
| for (unsigned int i = 0; i < 1000; i++) |
| existing_data += '0' + (i % 10); |
| ASSERT_EQ(WriteFile(p2p_manager_->FileGetPath(file_id), existing_data.c_str(), |
| 1000), 1000); |
| |
| StartDownload(true); // use_p2p_to_share |
| |
| // DownloadAction should convey the same file_id and the file should |
| // have the expected size. |
| EXPECT_EQ(download_action_->p2p_file_id(), file_id); |
| EXPECT_EQ(p2p_manager_->FileGetSize(file_id), data_.length()); |
| EXPECT_EQ(p2p_manager_->FileGetExpectedSize(file_id), data_.length()); |
| string p2p_file_contents; |
| // Check that the first 1000 bytes wasn't touched and that we |
| // appended the remaining as appropriate. |
| EXPECT_TRUE(ReadFileToString(p2p_manager_->FileGetPath(file_id), |
| &p2p_file_contents)); |
| EXPECT_EQ(existing_data, p2p_file_contents.substr(0, 1000)); |
| EXPECT_EQ(data_.substr(1000), p2p_file_contents.substr(1000)); |
| } |
| |
| TEST_F(P2PDownloadActionTest, DeletePartialP2PFileIfResumingWithoutP2P) { |
| if (!utils::IsXAttrSupported(FilePath("/tmp"))) { |
| LOG(WARNING) << "Skipping test because /tmp does not support xattr. " |
| << "Please update your system to support this feature."; |
| return; |
| } |
| |
| SetupDownload(1000); // starting_offset |
| |
| // Prepare the file with all existing data before starting to write |
| // to it via DownloadAction. |
| string file_id = utils::CalculateP2PFileId("1234hash", data_.length()); |
| ASSERT_TRUE(p2p_manager_->FileShare(file_id, data_.length())); |
| string existing_data; |
| for (unsigned int i = 0; i < 1000; i++) |
| existing_data += '0' + (i % 10); |
| ASSERT_EQ(WriteFile(p2p_manager_->FileGetPath(file_id), existing_data.c_str(), |
| 1000), 1000); |
| |
| // Check that the file is there. |
| EXPECT_EQ(p2p_manager_->FileGetSize(file_id), 1000); |
| EXPECT_EQ(p2p_manager_->CountSharedFiles(), 1); |
| |
| StartDownload(false); // use_p2p_to_share |
| |
| // DownloadAction should have deleted the p2p file. Check that it's gone. |
| EXPECT_EQ(p2p_manager_->FileGetSize(file_id), -1); |
| EXPECT_EQ(p2p_manager_->CountSharedFiles(), 0); |
| } |
| |
| } // namespace chromeos_update_engine |