blob: 81a583ae35b7071f4542e26ae2ab85159e3731a4 [file] [log] [blame]
Darin Petkov7ed561b2011-10-04 02:59:03 -07001// Copyright (c) 2011 The Chromium OS Authors. All rights reserved.
adlr@google.com3defe6a2009-12-04 20:57:17 +00002// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
Alex Deymoaab50e32014-11-10 19:55:35 -08005#include "update_engine/omaha_response_handler_action.h"
6
adlr@google.com3defe6a2009-12-04 20:57:17 +00007#include <string>
Darin Petkov73058b42010-10-06 16:32:19 -07008
adlr@google.com3defe6a2009-12-04 20:57:17 +00009#include <gtest/gtest.h>
Darin Petkov73058b42010-10-06 16:32:19 -070010
Jay Srinivasand29695d2013-04-08 15:08:05 -070011#include "update_engine/constants.h"
Gilad Arnold5bb4c902014-04-10 12:32:13 -070012#include "update_engine/fake_system_state.h"
Gilad Arnold74b5f552014-10-07 08:17:16 -070013#include "update_engine/mock_payload_state.h"
adlr@google.com3defe6a2009-12-04 20:57:17 +000014#include "update_engine/test_utils.h"
15#include "update_engine/utils.h"
16
Alex Deymo10875d92014-11-10 21:52:57 -080017using chromeos_update_engine::test_utils::System;
18using chromeos_update_engine::test_utils::WriteFileString;
adlr@google.com3defe6a2009-12-04 20:57:17 +000019using std::string;
Darin Petkov73058b42010-10-06 16:32:19 -070020using testing::Return;
adlr@google.com3defe6a2009-12-04 20:57:17 +000021
22namespace chromeos_update_engine {
23
24class OmahaResponseHandlerActionTest : public ::testing::Test {
25 public:
26 // Return true iff the OmahaResponseHandlerAction succeeded.
Alex Vakulenko88b591f2014-08-28 16:48:57 -070027 // If out is non-null, it's set w/ the response from the action.
Gilad Arnold5bb4c902014-04-10 12:32:13 -070028 bool DoTestCommon(FakeSystemState* fake_system_state,
Jay Srinivasanae4697c2013-03-18 17:08:08 -070029 const OmahaResponse& in,
30 const string& boot_dev,
Gilad Arnold4dbd47e2013-07-22 05:39:26 -070031 const string& deadline_file,
Jay Srinivasanae4697c2013-03-18 17:08:08 -070032 InstallPlan* out);
Darin Petkov6a5b3222010-07-13 14:55:28 -070033 bool DoTest(const OmahaResponse& in,
adlr@google.com3defe6a2009-12-04 20:57:17 +000034 const string& boot_dev,
Gilad Arnold4dbd47e2013-07-22 05:39:26 -070035 const string& deadline_file,
adlr@google.com3defe6a2009-12-04 20:57:17 +000036 InstallPlan* out);
37};
38
39class OmahaResponseHandlerActionProcessorDelegate
40 : public ActionProcessorDelegate {
41 public:
42 OmahaResponseHandlerActionProcessorDelegate()
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -070043 : code_(ErrorCode::kError),
Darin Petkovc1a8b422010-07-19 11:34:49 -070044 code_set_(false) {}
adlr@google.com3defe6a2009-12-04 20:57:17 +000045 void ActionCompleted(ActionProcessor* processor,
46 AbstractAction* action,
David Zeuthena99981f2013-04-29 13:42:47 -070047 ErrorCode code) {
adlr@google.com3defe6a2009-12-04 20:57:17 +000048 if (action->Type() == OmahaResponseHandlerAction::StaticType()) {
Darin Petkovc1a8b422010-07-19 11:34:49 -070049 code_ = code;
50 code_set_ = true;
adlr@google.com3defe6a2009-12-04 20:57:17 +000051 }
52 }
David Zeuthena99981f2013-04-29 13:42:47 -070053 ErrorCode code_;
Darin Petkovc1a8b422010-07-19 11:34:49 -070054 bool code_set_;
adlr@google.com3defe6a2009-12-04 20:57:17 +000055};
56
57namespace {
Alex Vakulenkod2779df2014-06-16 13:19:00 -070058const char* const kLongName =
adlr@google.com3defe6a2009-12-04 20:57:17 +000059 "very_long_name_and_no_slashes-very_long_name_and_no_slashes"
60 "very_long_name_and_no_slashes-very_long_name_and_no_slashes"
61 "very_long_name_and_no_slashes-very_long_name_and_no_slashes"
62 "very_long_name_and_no_slashes-very_long_name_and_no_slashes"
63 "very_long_name_and_no_slashes-very_long_name_and_no_slashes"
64 "very_long_name_and_no_slashes-very_long_name_and_no_slashes"
65 "very_long_name_and_no_slashes-very_long_name_and_no_slashes"
66 "-the_update_a.b.c.d_DELTA_.tgz";
Alex Vakulenkod2779df2014-06-16 13:19:00 -070067const char* const kBadVersion = "don't update me";
68} // namespace
adlr@google.com3defe6a2009-12-04 20:57:17 +000069
Jay Srinivasanae4697c2013-03-18 17:08:08 -070070bool OmahaResponseHandlerActionTest::DoTestCommon(
Gilad Arnold5bb4c902014-04-10 12:32:13 -070071 FakeSystemState* fake_system_state,
Jay Srinivasanae4697c2013-03-18 17:08:08 -070072 const OmahaResponse& in,
73 const string& boot_dev,
Gilad Arnold4dbd47e2013-07-22 05:39:26 -070074 const string& test_deadline_file,
Jay Srinivasanae4697c2013-03-18 17:08:08 -070075 InstallPlan* out) {
adlr@google.com3defe6a2009-12-04 20:57:17 +000076 ActionProcessor processor;
77 OmahaResponseHandlerActionProcessorDelegate delegate;
78 processor.set_delegate(&delegate);
79
Darin Petkov6a5b3222010-07-13 14:55:28 -070080 ObjectFeederAction<OmahaResponse> feeder_action;
adlr@google.com3defe6a2009-12-04 20:57:17 +000081 feeder_action.set_obj(in);
Alex Vakulenkod2779df2014-06-16 13:19:00 -070082 if (in.update_exists && in.version != kBadVersion) {
Gilad Arnold5bb4c902014-04-10 12:32:13 -070083 EXPECT_CALL(*(fake_system_state->mock_prefs()),
Jay Srinivasan6f6ea002012-12-14 11:26:28 -080084 SetString(kPrefsUpdateCheckResponseHash, in.hash))
Darin Petkov73058b42010-10-06 16:32:19 -070085 .WillOnce(Return(true));
86 }
Jay Srinivasan53173b92013-05-17 17:13:01 -070087
88 string current_url = in.payload_urls.size() ? in.payload_urls[0] : "";
Gilad Arnold5bb4c902014-04-10 12:32:13 -070089 EXPECT_CALL(*(fake_system_state->mock_payload_state()), GetCurrentUrl())
Jay Srinivasan53173b92013-05-17 17:13:01 -070090 .WillRepeatedly(Return(current_url));
91
Gilad Arnold4dbd47e2013-07-22 05:39:26 -070092 OmahaResponseHandlerAction response_handler_action(
Gilad Arnold5bb4c902014-04-10 12:32:13 -070093 fake_system_state,
Gilad Arnold4dbd47e2013-07-22 05:39:26 -070094 (test_deadline_file.empty() ?
95 OmahaResponseHandlerAction::kDeadlineFile : test_deadline_file));
adlr@google.com3defe6a2009-12-04 20:57:17 +000096 response_handler_action.set_boot_device(boot_dev);
97 BondActions(&feeder_action, &response_handler_action);
98 ObjectCollectorAction<InstallPlan> collector_action;
99 BondActions(&response_handler_action, &collector_action);
100 processor.EnqueueAction(&feeder_action);
101 processor.EnqueueAction(&response_handler_action);
102 processor.EnqueueAction(&collector_action);
103 processor.StartProcessing();
104 EXPECT_TRUE(!processor.IsRunning())
Alex Vakulenko072359c2014-07-18 11:41:07 -0700105 << "Update test to handle non-async actions";
adlr@google.com3defe6a2009-12-04 20:57:17 +0000106 if (out)
107 *out = collector_action.object();
Darin Petkovc1a8b422010-07-19 11:34:49 -0700108 EXPECT_TRUE(delegate.code_set_);
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700109 return delegate.code_ == ErrorCode::kSuccess;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000110}
111
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700112bool OmahaResponseHandlerActionTest::DoTest(const OmahaResponse& in,
113 const string& boot_dev,
Gilad Arnold4dbd47e2013-07-22 05:39:26 -0700114 const string& deadline_file,
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700115 InstallPlan* out) {
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700116 FakeSystemState fake_system_state;
117 return DoTestCommon(&fake_system_state, in, boot_dev, deadline_file, out);
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700118}
119
adlr@google.com3defe6a2009-12-04 20:57:17 +0000120TEST_F(OmahaResponseHandlerActionTest, SimpleTest) {
Gilad Arnold4dbd47e2013-07-22 05:39:26 -0700121 string test_deadline_file;
122 CHECK(utils::MakeTempFile(
Gilad Arnolda6742b32014-01-11 00:18:34 -0800123 "omaha_response_handler_action_unittest-XXXXXX",
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700124 &test_deadline_file, nullptr));
Gilad Arnold4dbd47e2013-07-22 05:39:26 -0700125 ScopedPathUnlinker deadline_unlinker(test_deadline_file);
adlr@google.com3defe6a2009-12-04 20:57:17 +0000126 {
Darin Petkov6a5b3222010-07-13 14:55:28 -0700127 OmahaResponse in;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000128 in.update_exists = true;
Chris Sosa3b748432013-06-20 16:42:59 -0700129 in.version = "a.b.c.d";
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800130 in.payload_urls.push_back("http://foo/the_update_a.b.c.d.tgz");
adlr@google.com3defe6a2009-12-04 20:57:17 +0000131 in.more_info_url = "http://more/info";
132 in.hash = "HASH+";
133 in.size = 12;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000134 in.prompt = false;
Darin Petkov6c118642010-10-21 12:06:30 -0700135 in.deadline = "20101020";
adlr@google.com3defe6a2009-12-04 20:57:17 +0000136 InstallPlan install_plan;
Gilad Arnold4dbd47e2013-07-22 05:39:26 -0700137 EXPECT_TRUE(DoTest(in, "/dev/sda3", test_deadline_file, &install_plan));
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800138 EXPECT_EQ(in.payload_urls[0], install_plan.download_url);
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700139 EXPECT_EQ(in.hash, install_plan.payload_hash);
Andrew de los Reyesf98bff82010-05-06 13:33:25 -0700140 EXPECT_EQ("/dev/sda5", install_plan.install_path);
Darin Petkov6c118642010-10-21 12:06:30 -0700141 string deadline;
Gilad Arnold4dbd47e2013-07-22 05:39:26 -0700142 EXPECT_TRUE(utils::ReadFile(test_deadline_file, &deadline));
Darin Petkov6c118642010-10-21 12:06:30 -0700143 EXPECT_EQ("20101020", deadline);
144 struct stat deadline_stat;
Gilad Arnold4dbd47e2013-07-22 05:39:26 -0700145 EXPECT_EQ(0, stat(test_deadline_file.c_str(), &deadline_stat));
Darin Petkov6c118642010-10-21 12:06:30 -0700146 EXPECT_EQ(S_IFREG | S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH,
147 deadline_stat.st_mode);
Chris Sosafb1020e2013-07-29 17:27:33 -0700148 EXPECT_EQ(in.version, install_plan.version);
adlr@google.com3defe6a2009-12-04 20:57:17 +0000149 }
150 {
Darin Petkov6a5b3222010-07-13 14:55:28 -0700151 OmahaResponse in;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000152 in.update_exists = true;
Chris Sosa3b748432013-06-20 16:42:59 -0700153 in.version = "a.b.c.d";
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800154 in.payload_urls.push_back("http://foo/the_update_a.b.c.d.tgz");
adlr@google.com3defe6a2009-12-04 20:57:17 +0000155 in.more_info_url = "http://more/info";
156 in.hash = "HASHj+";
157 in.size = 12;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000158 in.prompt = true;
159 InstallPlan install_plan;
Gilad Arnold4dbd47e2013-07-22 05:39:26 -0700160 EXPECT_TRUE(DoTest(in, "/dev/sda5", test_deadline_file, &install_plan));
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800161 EXPECT_EQ(in.payload_urls[0], install_plan.download_url);
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700162 EXPECT_EQ(in.hash, install_plan.payload_hash);
adlr@google.com3defe6a2009-12-04 20:57:17 +0000163 EXPECT_EQ("/dev/sda3", install_plan.install_path);
Darin Petkov6c118642010-10-21 12:06:30 -0700164 string deadline;
Gilad Arnold4dbd47e2013-07-22 05:39:26 -0700165 EXPECT_TRUE(utils::ReadFile(test_deadline_file, &deadline) &&
166 deadline.empty());
Chris Sosafb1020e2013-07-29 17:27:33 -0700167 EXPECT_EQ(in.version, install_plan.version);
adlr@google.com3defe6a2009-12-04 20:57:17 +0000168 }
169 {
Darin Petkov6a5b3222010-07-13 14:55:28 -0700170 OmahaResponse in;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000171 in.update_exists = true;
Chris Sosa3b748432013-06-20 16:42:59 -0700172 in.version = "a.b.c.d";
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800173 in.payload_urls.push_back(kLongName);
adlr@google.com3defe6a2009-12-04 20:57:17 +0000174 in.more_info_url = "http://more/info";
175 in.hash = "HASHj+";
176 in.size = 12;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000177 in.prompt = true;
Darin Petkov6c118642010-10-21 12:06:30 -0700178 in.deadline = "some-deadline";
adlr@google.com3defe6a2009-12-04 20:57:17 +0000179 InstallPlan install_plan;
Gilad Arnold4dbd47e2013-07-22 05:39:26 -0700180 EXPECT_TRUE(DoTest(in, "/dev/sda3", test_deadline_file, &install_plan));
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800181 EXPECT_EQ(in.payload_urls[0], install_plan.download_url);
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700182 EXPECT_EQ(in.hash, install_plan.payload_hash);
Andrew de los Reyesf98bff82010-05-06 13:33:25 -0700183 EXPECT_EQ("/dev/sda5", install_plan.install_path);
Darin Petkov6c118642010-10-21 12:06:30 -0700184 string deadline;
Gilad Arnold4dbd47e2013-07-22 05:39:26 -0700185 EXPECT_TRUE(utils::ReadFile(test_deadline_file, &deadline));
Darin Petkov6c118642010-10-21 12:06:30 -0700186 EXPECT_EQ("some-deadline", deadline);
Chris Sosafb1020e2013-07-29 17:27:33 -0700187 EXPECT_EQ(in.version, install_plan.version);
adlr@google.com3defe6a2009-12-04 20:57:17 +0000188 }
189}
190
191TEST_F(OmahaResponseHandlerActionTest, NoUpdatesTest) {
Darin Petkov6a5b3222010-07-13 14:55:28 -0700192 OmahaResponse in;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000193 in.update_exists = false;
194 InstallPlan install_plan;
Gilad Arnold4dbd47e2013-07-22 05:39:26 -0700195 EXPECT_FALSE(DoTest(in, "/dev/sda1", "", &install_plan));
adlr@google.com3defe6a2009-12-04 20:57:17 +0000196 EXPECT_EQ("", install_plan.download_url);
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700197 EXPECT_EQ("", install_plan.payload_hash);
adlr@google.com3defe6a2009-12-04 20:57:17 +0000198 EXPECT_EQ("", install_plan.install_path);
Chris Sosafb1020e2013-07-29 17:27:33 -0700199 EXPECT_EQ("", install_plan.version);
adlr@google.com3defe6a2009-12-04 20:57:17 +0000200}
201
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800202TEST_F(OmahaResponseHandlerActionTest, HashChecksForHttpTest) {
203 OmahaResponse in;
204 in.update_exists = true;
Chris Sosa3b748432013-06-20 16:42:59 -0700205 in.version = "a.b.c.d";
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800206 in.payload_urls.push_back("http://test.should/need/hash.checks.signed");
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800207 in.more_info_url = "http://more/info";
208 in.hash = "HASHj+";
209 in.size = 12;
David Pursell02c18642014-11-06 11:26:11 -0800210 FakeSystemState fake_system_state;
211 // Hash checks are always skipped for non-official update URLs.
212 EXPECT_CALL(*(fake_system_state.mock_request_params()),
213 IsUpdateUrlOfficial())
214 .WillRepeatedly(Return(true));
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800215 InstallPlan install_plan;
David Pursell02c18642014-11-06 11:26:11 -0800216 EXPECT_TRUE(DoTestCommon(&fake_system_state, in, "/dev/sda5", "",
217 &install_plan));
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800218 EXPECT_EQ(in.payload_urls[0], install_plan.download_url);
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800219 EXPECT_EQ(in.hash, install_plan.payload_hash);
220 EXPECT_TRUE(install_plan.hash_checks_mandatory);
Chris Sosafb1020e2013-07-29 17:27:33 -0700221 EXPECT_EQ(in.version, install_plan.version);
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800222}
223
David Pursell02c18642014-11-06 11:26:11 -0800224TEST_F(OmahaResponseHandlerActionTest, HashChecksForUnofficialUpdateUrl) {
225 OmahaResponse in;
226 in.update_exists = true;
227 in.version = "a.b.c.d";
228 in.payload_urls.push_back("http://url.normally/needs/hash.checks.signed");
229 in.more_info_url = "http://more/info";
230 in.hash = "HASHj+";
231 in.size = 12;
232 FakeSystemState fake_system_state;
233 EXPECT_CALL(*(fake_system_state.mock_request_params()),
234 IsUpdateUrlOfficial())
235 .WillRepeatedly(Return(false));
236 InstallPlan install_plan;
237 EXPECT_TRUE(DoTestCommon(&fake_system_state, in, "/dev/sda5", "",
238 &install_plan));
239 EXPECT_EQ(in.payload_urls[0], install_plan.download_url);
240 EXPECT_EQ(in.hash, install_plan.payload_hash);
241 EXPECT_FALSE(install_plan.hash_checks_mandatory);
242 EXPECT_EQ(in.version, install_plan.version);
243}
244
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800245TEST_F(OmahaResponseHandlerActionTest, HashChecksForHttpsTest) {
246 OmahaResponse in;
247 in.update_exists = true;
Chris Sosa3b748432013-06-20 16:42:59 -0700248 in.version = "a.b.c.d";
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800249 in.payload_urls.push_back("https://test.should.not/need/hash.checks.signed");
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800250 in.more_info_url = "http://more/info";
251 in.hash = "HASHj+";
252 in.size = 12;
David Pursell02c18642014-11-06 11:26:11 -0800253 FakeSystemState fake_system_state;
254 EXPECT_CALL(*(fake_system_state.mock_request_params()),
255 IsUpdateUrlOfficial())
256 .WillRepeatedly(Return(true));
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800257 InstallPlan install_plan;
David Pursell02c18642014-11-06 11:26:11 -0800258 EXPECT_TRUE(DoTestCommon(&fake_system_state, in, "/dev/sda5", "",
259 &install_plan));
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800260 EXPECT_EQ(in.payload_urls[0], install_plan.download_url);
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800261 EXPECT_EQ(in.hash, install_plan.payload_hash);
262 EXPECT_FALSE(install_plan.hash_checks_mandatory);
Chris Sosafb1020e2013-07-29 17:27:33 -0700263 EXPECT_EQ(in.version, install_plan.version);
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800264}
265
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800266TEST_F(OmahaResponseHandlerActionTest, HashChecksForBothHttpAndHttpsTest) {
267 OmahaResponse in;
268 in.update_exists = true;
Chris Sosa3b748432013-06-20 16:42:59 -0700269 in.version = "a.b.c.d";
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800270 in.payload_urls.push_back("http://test.should.still/need/hash.checks");
271 in.payload_urls.push_back("https://test.should.still/need/hash.checks");
272 in.more_info_url = "http://more/info";
273 in.hash = "HASHj+";
274 in.size = 12;
David Pursell02c18642014-11-06 11:26:11 -0800275 FakeSystemState fake_system_state;
276 EXPECT_CALL(*(fake_system_state.mock_request_params()),
277 IsUpdateUrlOfficial())
278 .WillRepeatedly(Return(true));
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800279 InstallPlan install_plan;
David Pursell02c18642014-11-06 11:26:11 -0800280 EXPECT_TRUE(DoTestCommon(&fake_system_state, in, "/dev/sda5", "",
281 &install_plan));
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800282 EXPECT_EQ(in.payload_urls[0], install_plan.download_url);
283 EXPECT_EQ(in.hash, install_plan.payload_hash);
284 EXPECT_TRUE(install_plan.hash_checks_mandatory);
Chris Sosafb1020e2013-07-29 17:27:33 -0700285 EXPECT_EQ(in.version, install_plan.version);
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800286}
287
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700288TEST_F(OmahaResponseHandlerActionTest, ChangeToMoreStableChannelTest) {
289 OmahaResponse in;
290 in.update_exists = true;
Chris Sosa3b748432013-06-20 16:42:59 -0700291 in.version = "a.b.c.d";
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700292 in.payload_urls.push_back("https://MoreStableChannelTest");
293 in.more_info_url = "http://more/info";
294 in.hash = "HASHjk";
295 in.size = 15;
296
Gilad Arnoldeff87cc2013-07-22 18:32:09 -0700297 // Create a uniquely named test directory.
298 string test_dir;
299 ASSERT_TRUE(utils::MakeTempDirectory(
300 "omaha_response_handler_action-test-XXXXXX", &test_dir));
301
302 ASSERT_EQ(0, System(string("mkdir -p ") + test_dir + "/etc"));
303 ASSERT_EQ(0, System(string("mkdir -p ") + test_dir +
Chris Sosabe45bef2013-04-09 18:25:12 -0700304 kStatefulPartition + "/etc"));
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700305 ASSERT_TRUE(WriteFileString(
Gilad Arnoldeff87cc2013-07-22 18:32:09 -0700306 test_dir + "/etc/lsb-release",
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700307 "CHROMEOS_RELEASE_TRACK=canary-channel\n"));
308 ASSERT_TRUE(WriteFileString(
Gilad Arnoldeff87cc2013-07-22 18:32:09 -0700309 test_dir + kStatefulPartition + "/etc/lsb-release",
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700310 "CHROMEOS_IS_POWERWASH_ALLOWED=true\n"
311 "CHROMEOS_RELEASE_TRACK=stable-channel\n"));
312
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700313 FakeSystemState fake_system_state;
314 OmahaRequestParams params(&fake_system_state);
Gilad Arnoldd04f8e22014-01-09 13:13:40 -0800315 params.set_root(test_dir);
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700316 params.SetLockDown(false);
317 params.Init("1.2.3.4", "", 0);
318 EXPECT_EQ("canary-channel", params.current_channel());
319 EXPECT_EQ("stable-channel", params.target_channel());
320 EXPECT_TRUE(params.to_more_stable_channel());
321 EXPECT_TRUE(params.is_powerwash_allowed());
322
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700323 fake_system_state.set_request_params(&params);
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700324 InstallPlan install_plan;
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700325 EXPECT_TRUE(DoTestCommon(&fake_system_state, in, "/dev/sda5", "",
Gilad Arnold4dbd47e2013-07-22 05:39:26 -0700326 &install_plan));
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700327 EXPECT_TRUE(install_plan.powerwash_required);
Gilad Arnoldeff87cc2013-07-22 18:32:09 -0700328
Alex Deymo10875d92014-11-10 21:52:57 -0800329 ASSERT_TRUE(test_utils::RecursiveUnlinkDir(test_dir));
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700330}
331
332TEST_F(OmahaResponseHandlerActionTest, ChangeToLessStableChannelTest) {
333 OmahaResponse in;
334 in.update_exists = true;
Chris Sosa3b748432013-06-20 16:42:59 -0700335 in.version = "a.b.c.d";
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700336 in.payload_urls.push_back("https://LessStableChannelTest");
337 in.more_info_url = "http://more/info";
338 in.hash = "HASHjk";
339 in.size = 15;
340
Gilad Arnoldeff87cc2013-07-22 18:32:09 -0700341 // Create a uniquely named test directory.
342 string test_dir;
343 ASSERT_TRUE(utils::MakeTempDirectory(
344 "omaha_response_handler_action-test-XXXXXX", &test_dir));
345
346 ASSERT_EQ(0, System(string("mkdir -p ") + test_dir + "/etc"));
347 ASSERT_EQ(0, System(string("mkdir -p ") + test_dir +
Chris Sosabe45bef2013-04-09 18:25:12 -0700348 kStatefulPartition + "/etc"));
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700349 ASSERT_TRUE(WriteFileString(
Gilad Arnoldeff87cc2013-07-22 18:32:09 -0700350 test_dir + "/etc/lsb-release",
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700351 "CHROMEOS_RELEASE_TRACK=stable-channel\n"));
352 ASSERT_TRUE(WriteFileString(
Gilad Arnoldeff87cc2013-07-22 18:32:09 -0700353 test_dir + kStatefulPartition + "/etc/lsb-release",
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700354 "CHROMEOS_RELEASE_TRACK=canary-channel\n"));
355
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700356 FakeSystemState fake_system_state;
357 OmahaRequestParams params(&fake_system_state);
Gilad Arnoldd04f8e22014-01-09 13:13:40 -0800358 params.set_root(test_dir);
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700359 params.SetLockDown(false);
360 params.Init("5.6.7.8", "", 0);
361 EXPECT_EQ("stable-channel", params.current_channel());
362 params.SetTargetChannel("canary-channel", false);
363 EXPECT_EQ("canary-channel", params.target_channel());
364 EXPECT_FALSE(params.to_more_stable_channel());
365 EXPECT_FALSE(params.is_powerwash_allowed());
366
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700367 fake_system_state.set_request_params(&params);
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700368 InstallPlan install_plan;
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700369 EXPECT_TRUE(DoTestCommon(&fake_system_state, in, "/dev/sda5", "",
Gilad Arnold4dbd47e2013-07-22 05:39:26 -0700370 &install_plan));
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700371 EXPECT_FALSE(install_plan.powerwash_required);
Gilad Arnoldeff87cc2013-07-22 18:32:09 -0700372
Alex Deymo10875d92014-11-10 21:52:57 -0800373 ASSERT_TRUE(test_utils::RecursiveUnlinkDir(test_dir));
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700374}
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800375
David Zeuthen8f191b22013-08-06 12:27:50 -0700376TEST_F(OmahaResponseHandlerActionTest, P2PUrlIsUsedAndHashChecksMandatory) {
377 OmahaResponse in;
378 in.update_exists = true;
379 in.version = "a.b.c.d";
380 in.payload_urls.push_back("https://would.not/cause/hash/checks");
381 in.more_info_url = "http://more/info";
382 in.hash = "HASHj+";
383 in.size = 12;
384
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700385 FakeSystemState fake_system_state;
386 OmahaRequestParams params(&fake_system_state);
David Pursell02c18642014-11-06 11:26:11 -0800387 // We're using a real OmahaRequestParams object here so we can't mock
388 // IsUpdateUrlOfficial(), but setting the update URL to the AutoUpdate test
389 // server will cause IsUpdateUrlOfficial() to return true.
390 params.set_update_url(kAUTestOmahaUrl);
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700391 fake_system_state.set_request_params(&params);
David Zeuthen8f191b22013-08-06 12:27:50 -0700392
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700393 EXPECT_CALL(*fake_system_state.mock_payload_state(),
David Zeuthenbb8bdc72013-09-03 13:43:48 -0700394 SetUsingP2PForDownloading(true));
395
David Zeuthen8f191b22013-08-06 12:27:50 -0700396 string p2p_url = "http://9.8.7.6/p2p";
Gilad Arnold74b5f552014-10-07 08:17:16 -0700397 EXPECT_CALL(*fake_system_state.mock_payload_state(), GetP2PUrl())
398 .WillRepeatedly(Return(p2p_url));
399 EXPECT_CALL(*fake_system_state.mock_payload_state(),
400 GetUsingP2PForDownloading()).WillRepeatedly(Return(true));
David Zeuthen8f191b22013-08-06 12:27:50 -0700401
402 InstallPlan install_plan;
Gilad Arnold5bb4c902014-04-10 12:32:13 -0700403 EXPECT_TRUE(DoTestCommon(&fake_system_state, in, "/dev/sda5", "",
David Zeuthen8f191b22013-08-06 12:27:50 -0700404 &install_plan));
405 EXPECT_EQ(in.hash, install_plan.payload_hash);
406 EXPECT_EQ(install_plan.download_url, p2p_url);
407 EXPECT_TRUE(install_plan.hash_checks_mandatory);
408}
409
adlr@google.com3defe6a2009-12-04 20:57:17 +0000410} // namespace chromeos_update_engine