blob: 586d582c92dbeef69f70217f9ef3c5e2d488d746 [file] [log] [blame]
Andrew de los Reyes09e56d62010-04-23 13:45:53 -07001// Copyright (c) 2009 The Chromium OS Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include <sys/mount.h>
6#include <inttypes.h>
7
8#include <algorithm>
9#include <string>
10#include <vector>
11
Darin Petkov9fa7ec52010-10-18 11:45:23 -070012#include <base/file_util.h>
Darin Petkov73058b42010-10-06 16:32:19 -070013#include <base/scoped_ptr.h>
14#include <base/string_util.h>
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070015#include <google/protobuf/repeated_field.h>
16#include <gtest/gtest.h>
17
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070018#include "update_engine/delta_diff_generator.h"
19#include "update_engine/delta_performer.h"
Andrew de los Reyes353777c2010-10-08 10:34:30 -070020#include "update_engine/extent_ranges.h"
Darin Petkov7a22d792010-11-08 14:10:00 -080021#include "update_engine/full_update_generator.h"
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070022#include "update_engine/graph_types.h"
Andrew de los Reyes932bc4c2010-08-23 18:14:09 -070023#include "update_engine/payload_signer.h"
Darin Petkov73058b42010-10-06 16:32:19 -070024#include "update_engine/prefs_mock.h"
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070025#include "update_engine/test_utils.h"
26#include "update_engine/update_metadata.pb.h"
27#include "update_engine/utils.h"
28
29namespace chromeos_update_engine {
30
31using std::min;
32using std::string;
33using std::vector;
Darin Petkov73058b42010-10-06 16:32:19 -070034using testing::_;
35using testing::Return;
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070036
Andrew de los Reyes932bc4c2010-08-23 18:14:09 -070037extern const char* kUnittestPrivateKeyPath;
Darin Petkovd7061ab2010-10-06 14:37:09 -070038extern const char* kUnittestPublicKeyPath;
Andrew de los Reyes932bc4c2010-08-23 18:14:09 -070039
Andrew de los Reyes27f7d372010-10-07 11:26:07 -070040namespace {
Andrew de los Reyes29da8aa2011-02-15 13:34:57 -080041const size_t kBlockSize = 4096;
Andrew de los Reyes27f7d372010-10-07 11:26:07 -070042} // namespace {}
43
44
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070045class DeltaPerformerTest : public ::testing::Test { };
46
47TEST(DeltaPerformerTest, ExtentsToByteStringTest) {
48 uint64_t test[] = {1, 1, 4, 2, kSparseHole, 1, 0, 1};
49 COMPILE_ASSERT(arraysize(test) % 2 == 0, array_size_uneven);
50 const uint64_t block_size = 4096;
51 const uint64_t file_length = 5 * block_size - 13;
52
53 google::protobuf::RepeatedPtrField<Extent> extents;
54 for (size_t i = 0; i < arraysize(test); i += 2) {
55 Extent* extent = extents.Add();
56 extent->set_start_block(test[i]);
57 extent->set_num_blocks(test[i + 1]);
58 }
59
60 string expected_output = "4096:4096,16384:8192,-1:4096,0:4083";
61 string actual_output;
62 EXPECT_TRUE(DeltaPerformer::ExtentsToBsdiffPositionsString(extents,
63 block_size,
64 file_length,
65 &actual_output));
66 EXPECT_EQ(expected_output, actual_output);
67}
68
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070069void CompareFilesByBlock(const string& a_file, const string& b_file) {
70 vector<char> a_data, b_data;
Andrew de los Reyes3270f742010-07-15 22:28:14 -070071 EXPECT_TRUE(utils::ReadFile(a_file, &a_data)) << "file failed: " << a_file;
72 EXPECT_TRUE(utils::ReadFile(b_file, &b_data)) << "file failed: " << b_file;
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070073
74 EXPECT_EQ(a_data.size(), b_data.size());
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070075 EXPECT_EQ(0, a_data.size() % kBlockSize);
76 for (size_t i = 0; i < a_data.size(); i += kBlockSize) {
77 EXPECT_EQ(0, i % kBlockSize);
78 vector<char> a_sub(&a_data[i], &a_data[i + kBlockSize]);
79 vector<char> b_sub(&b_data[i], &b_data[i + kBlockSize]);
80 EXPECT_TRUE(a_sub == b_sub) << "Block " << (i/kBlockSize) << " differs";
81 }
82}
83
84namespace {
85bool WriteSparseFile(const string& path, off_t size) {
86 int fd = open(path.c_str(), O_CREAT | O_TRUNC | O_WRONLY, 0644);
87 TEST_AND_RETURN_FALSE_ERRNO(fd >= 0);
88 ScopedFdCloser fd_closer(&fd);
89 off_t rc = lseek(fd, size + 1, SEEK_SET);
90 TEST_AND_RETURN_FALSE_ERRNO(rc != static_cast<off_t>(-1));
91 int return_code = ftruncate(fd, size);
92 TEST_AND_RETURN_FALSE_ERRNO(return_code == 0);
93 return true;
94}
Darin Petkov9574f7e2011-01-13 10:48:12 -080095} // namespace {}
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070096
Darin Petkov9574f7e2011-01-13 10:48:12 -080097namespace {
Darin Petkovcbfb0172011-01-14 15:24:45 -080098enum SignatureTest {
99 kSignatureNone, // No payload signing.
100 kSignatureGenerator, // Sign the payload at generation time.
101 kSignatureGenerated, // Sign the payload after it's generated.
102 kSignatureGeneratedShell, // Sign the generated payload through shell cmds.
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800103 kSignatureGeneratedShellBadKey, // Sign with a bad key through shell cmds.
Darin Petkovcbfb0172011-01-14 15:24:45 -0800104};
105
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800106size_t GetSignatureSize(const string& private_key_path) {
Darin Petkovcbfb0172011-01-14 15:24:45 -0800107 const vector<char> data(1, 'x');
108 vector<char> hash;
109 EXPECT_TRUE(OmahaHashCalculator::RawHashOfData(data, &hash));
110 vector<char> signature;
111 EXPECT_TRUE(PayloadSigner::SignHash(hash,
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800112 private_key_path,
Darin Petkovcbfb0172011-01-14 15:24:45 -0800113 &signature));
114 return signature.size();
115}
116
117void SignGeneratedPayload(const string& payload_path) {
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800118 int signature_size = GetSignatureSize(kUnittestPrivateKeyPath);
Darin Petkovcbfb0172011-01-14 15:24:45 -0800119 vector<char> hash;
120 ASSERT_TRUE(PayloadSigner::HashPayloadForSigning(payload_path,
121 signature_size,
122 &hash));
123 vector<char> signature;
124 ASSERT_TRUE(PayloadSigner::SignHash(hash,
125 kUnittestPrivateKeyPath,
126 &signature));
127 ASSERT_TRUE(PayloadSigner::AddSignatureToPayload(payload_path,
128 signature,
129 payload_path));
130 EXPECT_TRUE(PayloadSigner::VerifySignedPayload(payload_path,
131 kUnittestPublicKeyPath));
132}
133
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800134void SignGeneratedShellPayload(SignatureTest signature_test,
135 const string& payload_path) {
136 string private_key_path = kUnittestPrivateKeyPath;
137 if (signature_test == kSignatureGeneratedShellBadKey) {
138 ASSERT_TRUE(utils::MakeTempFile("/tmp/key.XXXXXX",
139 &private_key_path,
140 NULL));
141 } else {
142 ASSERT_EQ(kSignatureGeneratedShell, signature_test);
143 }
144 ScopedPathUnlinker key_unlinker(private_key_path);
145 key_unlinker.set_should_remove(signature_test ==
146 kSignatureGeneratedShellBadKey);
147 // Generates a new private key that will not match the public key.
148 if (signature_test == kSignatureGeneratedShellBadKey) {
149 LOG(INFO) << "Generating a mismatched private key.";
150 ASSERT_EQ(0,
151 System(StringPrintf(
152 "/usr/bin/openssl genrsa -out %s 1024",
153 private_key_path.c_str())));
154 }
155 int signature_size = GetSignatureSize(private_key_path);
Darin Petkovcbfb0172011-01-14 15:24:45 -0800156 string hash_file;
157 ASSERT_TRUE(utils::MakeTempFile("/tmp/hash.XXXXXX", &hash_file, NULL));
158 ScopedPathUnlinker hash_unlinker(hash_file);
Darin Petkovcbfb0172011-01-14 15:24:45 -0800159 ASSERT_EQ(0,
160 System(StringPrintf(
161 "./delta_generator -in_file %s -signature_size %d "
162 "-out_hash_file %s",
163 payload_path.c_str(),
164 signature_size,
165 hash_file.c_str())));
166
167 string sig_file;
168 ASSERT_TRUE(utils::MakeTempFile("/tmp/signature.XXXXXX", &sig_file, NULL));
169 ScopedPathUnlinker sig_unlinker(sig_file);
170 ASSERT_EQ(0,
171 System(StringPrintf(
172 "/usr/bin/openssl rsautl -pkcs -sign -inkey %s -in %s -out %s",
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800173 private_key_path.c_str(),
Darin Petkovcbfb0172011-01-14 15:24:45 -0800174 hash_file.c_str(),
175 sig_file.c_str())));
176 ASSERT_EQ(0,
177 System(StringPrintf(
178 "./delta_generator -in_file %s -signature_file %s "
179 "-out_file %s",
180 payload_path.c_str(),
181 sig_file.c_str(),
182 payload_path.c_str())));
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800183 int verify_result =
184 System(StringPrintf("./delta_generator -in_file %s -public_key %s",
185 payload_path.c_str(),
186 kUnittestPublicKeyPath));
187 if (signature_test == kSignatureGeneratedShellBadKey) {
188 ASSERT_NE(0, verify_result);
189 } else {
190 ASSERT_EQ(0, verify_result);
191 }
Darin Petkovcbfb0172011-01-14 15:24:45 -0800192}
193
Darin Petkov9574f7e2011-01-13 10:48:12 -0800194void DoSmallImageTest(bool full_kernel, bool full_rootfs, bool noop,
Darin Petkovcbfb0172011-01-14 15:24:45 -0800195 SignatureTest signature_test) {
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700196 string a_img, b_img;
197 EXPECT_TRUE(utils::MakeTempFile("/tmp/a_img.XXXXXX", &a_img, NULL));
198 ScopedPathUnlinker a_img_unlinker(a_img);
199 EXPECT_TRUE(utils::MakeTempFile("/tmp/b_img.XXXXXX", &b_img, NULL));
200 ScopedPathUnlinker b_img_unlinker(b_img);
201
202 CreateExtImageAtPath(a_img, NULL);
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700203
Darin Petkov7ea32332010-10-13 10:46:11 -0700204 int image_size = static_cast<int>(utils::FileSize(a_img));
205
206 // Extend the "partitions" holding the file system a bit.
207 EXPECT_EQ(0, System(base::StringPrintf(
208 "dd if=/dev/zero of=%s seek=%d bs=1 count=1",
209 a_img.c_str(),
210 image_size + 1024 * 1024 - 1)));
Darin Petkov7ea32332010-10-13 10:46:11 -0700211 EXPECT_EQ(image_size + 1024 * 1024, utils::FileSize(a_img));
Darin Petkov7ea32332010-10-13 10:46:11 -0700212
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700213 // Make some changes to the A image.
214 {
215 string a_mnt;
216 ScopedLoopMounter b_mounter(a_img, &a_mnt, 0);
217
218 EXPECT_TRUE(utils::WriteFile(StringPrintf("%s/hardtocompress",
219 a_mnt.c_str()).c_str(),
220 reinterpret_cast<const char*>(kRandomString),
221 sizeof(kRandomString) - 1));
222 // Write 1 MiB of 0xff to try to catch the case where writing a bsdiff
223 // patch fails to zero out the final block.
224 vector<char> ones(1024 * 1024, 0xff);
225 EXPECT_TRUE(utils::WriteFile(StringPrintf("%s/ones",
226 a_mnt.c_str()).c_str(),
227 &ones[0],
228 ones.size()));
229 }
230
Darin Petkov9fa7ec52010-10-18 11:45:23 -0700231 if (noop) {
232 EXPECT_TRUE(file_util::CopyFile(FilePath(a_img), FilePath(b_img)));
233 } else {
234 CreateExtImageAtPath(b_img, NULL);
235 EXPECT_EQ(0, System(base::StringPrintf(
236 "dd if=/dev/zero of=%s seek=%d bs=1 count=1",
237 b_img.c_str(),
238 image_size + 1024 * 1024 - 1)));
239 EXPECT_EQ(image_size + 1024 * 1024, utils::FileSize(b_img));
240
241 // Make some changes to the B image.
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700242 string b_mnt;
243 ScopedLoopMounter b_mounter(b_img, &b_mnt, 0);
244
245 EXPECT_EQ(0, system(StringPrintf("cp %s/hello %s/hello2", b_mnt.c_str(),
246 b_mnt.c_str()).c_str()));
247 EXPECT_EQ(0, system(StringPrintf("rm %s/hello", b_mnt.c_str()).c_str()));
248 EXPECT_EQ(0, system(StringPrintf("mv %s/hello2 %s/hello", b_mnt.c_str(),
249 b_mnt.c_str()).c_str()));
250 EXPECT_EQ(0, system(StringPrintf("echo foo > %s/foo",
251 b_mnt.c_str()).c_str()));
252 EXPECT_EQ(0, system(StringPrintf("touch %s/emptyfile",
253 b_mnt.c_str()).c_str()));
254 EXPECT_TRUE(WriteSparseFile(StringPrintf("%s/fullsparse", b_mnt.c_str()),
255 1024 * 1024));
256 EXPECT_EQ(0, system(StringPrintf("dd if=/dev/zero of=%s/partsparese bs=1 "
257 "seek=4096 count=1",
258 b_mnt.c_str()).c_str()));
Andrew de los Reyes29da8aa2011-02-15 13:34:57 -0800259 EXPECT_EQ(0, system(StringPrintf("cp %s/srchardlink0 %s/tmp && "
260 "mv %s/tmp %s/srchardlink1",
261 b_mnt.c_str(), b_mnt.c_str(),
262 b_mnt.c_str(), b_mnt.c_str()).c_str()));
Andrew de los Reyes48a0a482011-02-22 15:32:11 -0800263 EXPECT_EQ(0, system(StringPrintf("rm %s/boguslink && "
264 "echo foobar > %s/boguslink",
265 b_mnt.c_str(), b_mnt.c_str()).c_str()));
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700266 EXPECT_TRUE(utils::WriteFile(StringPrintf("%s/hardtocompress",
267 b_mnt.c_str()).c_str(),
268 reinterpret_cast<const char*>(kRandomString),
269 sizeof(kRandomString)));
270 }
271
Andrew de los Reyesf4c7ef12010-04-30 10:37:00 -0700272 string old_kernel;
273 EXPECT_TRUE(utils::MakeTempFile("/tmp/old_kernel.XXXXXX", &old_kernel, NULL));
274 ScopedPathUnlinker old_kernel_unlinker(old_kernel);
275
276 string new_kernel;
277 EXPECT_TRUE(utils::MakeTempFile("/tmp/new_kernel.XXXXXX", &new_kernel, NULL));
278 ScopedPathUnlinker new_kernel_unlinker(new_kernel);
279
280 vector<char> old_kernel_data(4096); // Something small for a test
281 vector<char> new_kernel_data(old_kernel_data.size());
282 FillWithData(&old_kernel_data);
283 FillWithData(&new_kernel_data);
Andrew de los Reyes932bc4c2010-08-23 18:14:09 -0700284
Andrew de los Reyesf4c7ef12010-04-30 10:37:00 -0700285 // change the new kernel data
286 const char* new_data_string = "This is new data.";
287 strcpy(&new_kernel_data[0], new_data_string);
288
Darin Petkov9fa7ec52010-10-18 11:45:23 -0700289 if (noop) {
290 old_kernel_data = new_kernel_data;
291 }
292
Andrew de los Reyesf4c7ef12010-04-30 10:37:00 -0700293 // Write kernels to disk
294 EXPECT_TRUE(utils::WriteFile(
295 old_kernel.c_str(), &old_kernel_data[0], old_kernel_data.size()));
296 EXPECT_TRUE(utils::WriteFile(
297 new_kernel.c_str(), &new_kernel_data[0], new_kernel_data.size()));
298
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700299 string delta_path;
300 EXPECT_TRUE(utils::MakeTempFile("/tmp/delta.XXXXXX", &delta_path, NULL));
Andrew de los Reyes932bc4c2010-08-23 18:14:09 -0700301 LOG(INFO) << "delta path: " << delta_path;
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700302 ScopedPathUnlinker delta_path_unlinker(delta_path);
303 {
304 string a_mnt, b_mnt;
305 ScopedLoopMounter a_mounter(a_img, &a_mnt, MS_RDONLY);
306 ScopedLoopMounter b_mounter(b_img, &b_mnt, MS_RDONLY);
Darin Petkovcbfb0172011-01-14 15:24:45 -0800307 const string private_key =
308 signature_test == kSignatureGenerator ? kUnittestPrivateKeyPath : "";
Andrew de los Reyes932bc4c2010-08-23 18:14:09 -0700309 EXPECT_TRUE(
Darin Petkov68c10d12010-10-14 09:24:37 -0700310 DeltaDiffGenerator::GenerateDeltaUpdateFile(
Darin Petkov7a22d792010-11-08 14:10:00 -0800311 full_rootfs ? "" : a_mnt,
312 full_rootfs ? "" : a_img,
Darin Petkov68c10d12010-10-14 09:24:37 -0700313 b_mnt,
314 b_img,
315 full_kernel ? "" : old_kernel,
316 new_kernel,
317 delta_path,
Darin Petkovcbfb0172011-01-14 15:24:45 -0800318 private_key));
Darin Petkov9574f7e2011-01-13 10:48:12 -0800319 }
320
Darin Petkovcbfb0172011-01-14 15:24:45 -0800321 if (signature_test == kSignatureGenerated) {
322 SignGeneratedPayload(delta_path);
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800323 } else if (signature_test == kSignatureGeneratedShell ||
324 signature_test == kSignatureGeneratedShellBadKey) {
325 SignGeneratedShellPayload(signature_test, delta_path);
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700326 }
327
328 // Read delta into memory.
329 vector<char> delta;
330 EXPECT_TRUE(utils::ReadFile(delta_path, &delta));
331
Darin Petkov73058b42010-10-06 16:32:19 -0700332 uint64_t manifest_metadata_size;
333
Darin Petkov36a58222010-10-07 22:00:09 -0700334 // Check the metadata.
Andrew de los Reyes932bc4c2010-08-23 18:14:09 -0700335 {
336 LOG(INFO) << "delta size: " << delta.size();
337 DeltaArchiveManifest manifest;
338 const int kManifestSizeOffset = 12;
339 const int kManifestOffset = 20;
340 uint64_t manifest_size = 0;
341 memcpy(&manifest_size, &delta[kManifestSizeOffset], sizeof(manifest_size));
342 manifest_size = be64toh(manifest_size);
343 LOG(INFO) << "manifest size: " << manifest_size;
344 EXPECT_TRUE(manifest.ParseFromArray(&delta[kManifestOffset],
345 manifest_size));
Darin Petkov73058b42010-10-06 16:32:19 -0700346 manifest_metadata_size = kManifestOffset + manifest_size;
Andrew de los Reyes932bc4c2010-08-23 18:14:09 -0700347
Darin Petkovcbfb0172011-01-14 15:24:45 -0800348 if (signature_test == kSignatureNone) {
349 EXPECT_FALSE(manifest.has_signatures_offset());
350 EXPECT_FALSE(manifest.has_signatures_size());
351 } else {
352 EXPECT_TRUE(manifest.has_signatures_offset());
353 EXPECT_TRUE(manifest.has_signatures_size());
354 Signatures sigs_message;
355 EXPECT_TRUE(sigs_message.ParseFromArray(
356 &delta[manifest_metadata_size + manifest.signatures_offset()],
357 manifest.signatures_size()));
358 EXPECT_EQ(1, sigs_message.signatures_size());
359 const Signatures_Signature& signature = sigs_message.signatures(0);
360 EXPECT_EQ(1, signature.version());
Andrew de los Reyes932bc4c2010-08-23 18:14:09 -0700361
Darin Petkovcbfb0172011-01-14 15:24:45 -0800362 uint64_t expected_sig_data_length = 0;
363 EXPECT_TRUE(PayloadSigner::SignatureBlobLength(
364 kUnittestPrivateKeyPath, &expected_sig_data_length));
365 EXPECT_EQ(expected_sig_data_length, manifest.signatures_size());
366 EXPECT_FALSE(signature.data().empty());
367 }
Darin Petkov36a58222010-10-07 22:00:09 -0700368
Darin Petkov9fa7ec52010-10-18 11:45:23 -0700369 if (noop) {
370 EXPECT_EQ(1, manifest.install_operations_size());
371 EXPECT_EQ(1, manifest.kernel_install_operations_size());
372 }
373
Darin Petkovd43d6902010-10-14 11:17:50 -0700374 if (full_kernel) {
375 EXPECT_FALSE(manifest.has_old_kernel_info());
376 } else {
377 EXPECT_EQ(old_kernel_data.size(), manifest.old_kernel_info().size());
378 EXPECT_FALSE(manifest.old_kernel_info().hash().empty());
379 }
Darin Petkov698d0412010-10-13 10:59:44 -0700380
Darin Petkov7a22d792010-11-08 14:10:00 -0800381 if (full_rootfs) {
382 EXPECT_FALSE(manifest.has_old_rootfs_info());
383 } else {
384 EXPECT_EQ(image_size, manifest.old_rootfs_info().size());
385 EXPECT_FALSE(manifest.old_rootfs_info().hash().empty());
386 }
387
Darin Petkov36a58222010-10-07 22:00:09 -0700388 EXPECT_EQ(new_kernel_data.size(), manifest.new_kernel_info().size());
Darin Petkov7ea32332010-10-13 10:46:11 -0700389 EXPECT_EQ(image_size, manifest.new_rootfs_info().size());
Darin Petkov36a58222010-10-07 22:00:09 -0700390
Darin Petkov36a58222010-10-07 22:00:09 -0700391 EXPECT_FALSE(manifest.new_kernel_info().hash().empty());
Darin Petkov36a58222010-10-07 22:00:09 -0700392 EXPECT_FALSE(manifest.new_rootfs_info().hash().empty());
Andrew de los Reyes932bc4c2010-08-23 18:14:09 -0700393 }
394
Darin Petkov73058b42010-10-06 16:32:19 -0700395 PrefsMock prefs;
396 EXPECT_CALL(prefs, SetInt64(kPrefsManifestMetadataSize,
397 manifest_metadata_size)).WillOnce(Return(true));
398 EXPECT_CALL(prefs, SetInt64(kPrefsUpdateStateNextOperation, _))
399 .WillRepeatedly(Return(true));
Darin Petkov9b230572010-10-08 10:20:09 -0700400 EXPECT_CALL(prefs, GetInt64(kPrefsUpdateStateNextOperation, _))
401 .WillOnce(Return(false));
Darin Petkov73058b42010-10-06 16:32:19 -0700402 EXPECT_CALL(prefs, SetInt64(kPrefsUpdateStateNextDataOffset, _))
403 .WillRepeatedly(Return(true));
Darin Petkov437adc42010-10-07 13:12:24 -0700404 EXPECT_CALL(prefs, SetString(kPrefsUpdateStateSHA256Context, _))
Darin Petkov73058b42010-10-06 16:32:19 -0700405 .WillRepeatedly(Return(true));
Darin Petkovcbfb0172011-01-14 15:24:45 -0800406 if (signature_test != kSignatureNone) {
407 EXPECT_CALL(prefs, SetString(kPrefsUpdateStateSignedSHA256Context, _))
408 .WillOnce(Return(true));
409 }
Darin Petkov73058b42010-10-06 16:32:19 -0700410
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700411 // Update the A image in place.
Darin Petkov73058b42010-10-06 16:32:19 -0700412 DeltaPerformer performer(&prefs);
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700413
Darin Petkovd43d6902010-10-14 11:17:50 -0700414 vector<char> rootfs_hash;
415 EXPECT_EQ(image_size,
416 OmahaHashCalculator::RawHashOfFile(a_img,
417 image_size,
418 &rootfs_hash));
Darin Petkov3aefa862010-12-07 14:45:00 -0800419 performer.set_current_rootfs_hash(rootfs_hash);
Darin Petkovd43d6902010-10-14 11:17:50 -0700420 vector<char> kernel_hash;
421 EXPECT_TRUE(OmahaHashCalculator::RawHashOfData(old_kernel_data,
422 &kernel_hash));
Darin Petkov3aefa862010-12-07 14:45:00 -0800423 performer.set_current_kernel_hash(kernel_hash);
Darin Petkovd43d6902010-10-14 11:17:50 -0700424
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700425 EXPECT_EQ(0, performer.Open(a_img.c_str(), 0, 0));
Andrew de los Reyesf4c7ef12010-04-30 10:37:00 -0700426 EXPECT_TRUE(performer.OpenKernel(old_kernel.c_str()));
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700427
428 // Write at some number of bytes per operation. Arbitrarily chose 5.
429 const size_t kBytesPerWrite = 5;
430 for (size_t i = 0; i < delta.size(); i += kBytesPerWrite) {
431 size_t count = min(delta.size() - i, kBytesPerWrite);
432 EXPECT_EQ(count, performer.Write(&delta[i], count));
433 }
434
435 // Wrapper around close. Returns 0 on success or -errno on error.
436 EXPECT_EQ(0, performer.Close());
437
Andrew de los Reyesf4c7ef12010-04-30 10:37:00 -0700438 CompareFilesByBlock(old_kernel, new_kernel);
Darin Petkov2dd01092010-10-08 15:43:05 -0700439 CompareFilesByBlock(a_img, b_img);
Andrew de los Reyes932bc4c2010-08-23 18:14:09 -0700440
Andrew de los Reyesf4c7ef12010-04-30 10:37:00 -0700441 vector<char> updated_kernel_partition;
442 EXPECT_TRUE(utils::ReadFile(old_kernel, &updated_kernel_partition));
443 EXPECT_EQ(0, strncmp(&updated_kernel_partition[0], new_data_string,
444 strlen(new_data_string)));
Darin Petkovd7061ab2010-10-06 14:37:09 -0700445
446 EXPECT_TRUE(utils::FileExists(kUnittestPublicKeyPath));
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800447 bool expect_verify_success =
448 signature_test != kSignatureNone &&
449 signature_test != kSignatureGeneratedShellBadKey;
450 EXPECT_EQ(expect_verify_success,
Darin Petkovcbfb0172011-01-14 15:24:45 -0800451 performer.VerifyPayload(
452 kUnittestPublicKeyPath,
453 OmahaHashCalculator::OmahaHashOfData(delta),
454 delta.size()));
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800455 EXPECT_TRUE(performer.VerifyPayload(
456 "/public/key/does/not/exists",
457 OmahaHashCalculator::OmahaHashOfData(delta),
458 delta.size()));
Darin Petkov3aefa862010-12-07 14:45:00 -0800459
460 uint64_t new_kernel_size;
461 vector<char> new_kernel_hash;
462 uint64_t new_rootfs_size;
463 vector<char> new_rootfs_hash;
464 EXPECT_TRUE(performer.GetNewPartitionInfo(&new_kernel_size,
465 &new_kernel_hash,
466 &new_rootfs_size,
467 &new_rootfs_hash));
468 EXPECT_EQ(4096, new_kernel_size);
469 vector<char> expected_new_kernel_hash;
470 EXPECT_TRUE(OmahaHashCalculator::RawHashOfData(new_kernel_data,
471 &expected_new_kernel_hash));
472 EXPECT_TRUE(expected_new_kernel_hash == new_kernel_hash);
473 EXPECT_EQ(image_size, new_rootfs_size);
474 vector<char> expected_new_rootfs_hash;
475 EXPECT_EQ(image_size,
476 OmahaHashCalculator::RawHashOfFile(b_img,
477 image_size,
478 &expected_new_rootfs_hash));
479 EXPECT_TRUE(expected_new_rootfs_hash == new_rootfs_hash);
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700480}
Darin Petkov68c10d12010-10-14 09:24:37 -0700481}
482
483TEST(DeltaPerformerTest, RunAsRootSmallImageTest) {
Darin Petkovcbfb0172011-01-14 15:24:45 -0800484 DoSmallImageTest(false, false, false, kSignatureGenerator);
Darin Petkov68c10d12010-10-14 09:24:37 -0700485}
486
487TEST(DeltaPerformerTest, RunAsRootFullKernelSmallImageTest) {
Darin Petkovcbfb0172011-01-14 15:24:45 -0800488 DoSmallImageTest(true, false, false, kSignatureGenerator);
Darin Petkov7a22d792010-11-08 14:10:00 -0800489}
490
491TEST(DeltaPerformerTest, RunAsRootFullSmallImageTest) {
Darin Petkovcbfb0172011-01-14 15:24:45 -0800492 DoSmallImageTest(true, true, false, kSignatureGenerator);
Darin Petkov9fa7ec52010-10-18 11:45:23 -0700493}
494
495TEST(DeltaPerformerTest, RunAsRootNoopSmallImageTest) {
Darin Petkovcbfb0172011-01-14 15:24:45 -0800496 DoSmallImageTest(false, false, true, kSignatureGenerator);
Darin Petkov9574f7e2011-01-13 10:48:12 -0800497}
498
Darin Petkovcbfb0172011-01-14 15:24:45 -0800499TEST(DeltaPerformerTest, RunAsRootSmallImageSignNoneTest) {
500 DoSmallImageTest(false, false, false, kSignatureNone);
501}
502
503TEST(DeltaPerformerTest, RunAsRootSmallImageSignGeneratedTest) {
504 DoSmallImageTest(false, false, false, kSignatureGenerated);
505}
506
507TEST(DeltaPerformerTest, RunAsRootSmallImageSignGeneratedShellTest) {
508 DoSmallImageTest(false, false, false, kSignatureGeneratedShell);
Andrew de los Reyes27f7d372010-10-07 11:26:07 -0700509}
510
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800511TEST(DeltaPerformerTest, RunAsRootSmallImageSignGeneratedShellBadKeyTest) {
512 DoSmallImageTest(false, false, false, kSignatureGeneratedShellBadKey);
513}
514
Darin Petkov934bb412010-11-18 11:21:35 -0800515TEST(DeltaPerformerTest, BadDeltaMagicTest) {
516 PrefsMock prefs;
517 DeltaPerformer performer(&prefs);
518 EXPECT_EQ(0, performer.Open("/dev/null", 0, 0));
519 EXPECT_TRUE(performer.OpenKernel("/dev/null"));
520 EXPECT_EQ(4, performer.Write("junk", 4));
521 EXPECT_EQ(8, performer.Write("morejunk", 8));
522 EXPECT_LT(performer.Write("morejunk", 8), 0);
523 EXPECT_LT(performer.Close(), 0);
524}
525
Andrew de los Reyes353777c2010-10-08 10:34:30 -0700526TEST(DeltaPerformerTest, IsIdempotentOperationTest) {
527 DeltaArchiveManifest_InstallOperation op;
528 EXPECT_TRUE(DeltaPerformer::IsIdempotentOperation(op));
529 *(op.add_dst_extents()) = ExtentForRange(0, 5);
530 EXPECT_TRUE(DeltaPerformer::IsIdempotentOperation(op));
531 *(op.add_src_extents()) = ExtentForRange(4, 1);
532 EXPECT_FALSE(DeltaPerformer::IsIdempotentOperation(op));
533 op.clear_src_extents();
534 *(op.add_src_extents()) = ExtentForRange(5, 3);
535 EXPECT_TRUE(DeltaPerformer::IsIdempotentOperation(op));
536 *(op.add_dst_extents()) = ExtentForRange(20, 6);
537 EXPECT_TRUE(DeltaPerformer::IsIdempotentOperation(op));
538 *(op.add_src_extents()) = ExtentForRange(19, 2);
539 EXPECT_FALSE(DeltaPerformer::IsIdempotentOperation(op));
540}
541
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700542} // namespace chromeos_update_engine