blob: b996d3862213821c825045c3e7833036376fb5ef [file] [log] [blame]
Alex Deymoaea4c1c2015-08-19 20:24:43 -07001//
2// Copyright (C) 2011 The Android Open Source Project
3//
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at
7//
8// http://www.apache.org/licenses/LICENSE-2.0
9//
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15//
adlr@google.com3defe6a2009-12-04 20:57:17 +000016
Alex Deymoaab50e32014-11-10 19:55:35 -080017#include "update_engine/omaha_response_handler_action.h"
18
adlr@google.com3defe6a2009-12-04 20:57:17 +000019#include <string>
Darin Petkov73058b42010-10-06 16:32:19 -070020
Alex Deymo110e0302015-10-19 20:35:21 -070021#include <base/files/file_util.h>
adlr@google.com3defe6a2009-12-04 20:57:17 +000022#include <gtest/gtest.h>
Darin Petkov73058b42010-10-06 16:32:19 -070023
Alex Deymo39910dc2015-11-09 17:04:30 -080024#include "update_engine/common/constants.h"
25#include "update_engine/common/platform_constants.h"
26#include "update_engine/common/test_utils.h"
27#include "update_engine/common/utils.h"
Gilad Arnold5bb4c902014-04-10 12:32:13 -070028#include "update_engine/fake_system_state.h"
Gilad Arnold74b5f552014-10-07 08:17:16 -070029#include "update_engine/mock_payload_state.h"
Alex Deymo39910dc2015-11-09 17:04:30 -080030#include "update_engine/payload_consumer/payload_constants.h"
adlr@google.com3defe6a2009-12-04 20:57:17 +000031
Alex Deymo10875d92014-11-10 21:52:57 -080032using chromeos_update_engine::test_utils::System;
33using chromeos_update_engine::test_utils::WriteFileString;
adlr@google.com3defe6a2009-12-04 20:57:17 +000034using std::string;
Darin Petkov73058b42010-10-06 16:32:19 -070035using testing::Return;
adlr@google.com3defe6a2009-12-04 20:57:17 +000036
37namespace chromeos_update_engine {
38
39class OmahaResponseHandlerActionTest : public ::testing::Test {
Alex Deymo763e7db2015-08-27 21:08:08 -070040 protected:
41 void SetUp() override {
42 FakeBootControl* fake_boot_control = fake_system_state_.fake_boot_control();
43 fake_boot_control->SetPartitionDevice(
44 kLegacyPartitionNameKernel, 0, "/dev/sdz2");
45 fake_boot_control->SetPartitionDevice(
46 kLegacyPartitionNameRoot, 0, "/dev/sdz3");
47 fake_boot_control->SetPartitionDevice(
48 kLegacyPartitionNameKernel, 1, "/dev/sdz4");
49 fake_boot_control->SetPartitionDevice(
50 kLegacyPartitionNameRoot, 1, "/dev/sdz5");
51 }
52
adlr@google.com3defe6a2009-12-04 20:57:17 +000053 // Return true iff the OmahaResponseHandlerAction succeeded.
Alex Vakulenko88b591f2014-08-28 16:48:57 -070054 // If out is non-null, it's set w/ the response from the action.
Darin Petkov6a5b3222010-07-13 14:55:28 -070055 bool DoTest(const OmahaResponse& in,
Gilad Arnold4dbd47e2013-07-22 05:39:26 -070056 const string& deadline_file,
adlr@google.com3defe6a2009-12-04 20:57:17 +000057 InstallPlan* out);
Alex Deymo763e7db2015-08-27 21:08:08 -070058
59 FakeSystemState fake_system_state_;
adlr@google.com3defe6a2009-12-04 20:57:17 +000060};
61
62class OmahaResponseHandlerActionProcessorDelegate
63 : public ActionProcessorDelegate {
64 public:
65 OmahaResponseHandlerActionProcessorDelegate()
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -070066 : code_(ErrorCode::kError),
Darin Petkovc1a8b422010-07-19 11:34:49 -070067 code_set_(false) {}
adlr@google.com3defe6a2009-12-04 20:57:17 +000068 void ActionCompleted(ActionProcessor* processor,
69 AbstractAction* action,
David Zeuthena99981f2013-04-29 13:42:47 -070070 ErrorCode code) {
adlr@google.com3defe6a2009-12-04 20:57:17 +000071 if (action->Type() == OmahaResponseHandlerAction::StaticType()) {
Darin Petkovc1a8b422010-07-19 11:34:49 -070072 code_ = code;
73 code_set_ = true;
adlr@google.com3defe6a2009-12-04 20:57:17 +000074 }
75 }
David Zeuthena99981f2013-04-29 13:42:47 -070076 ErrorCode code_;
Darin Petkovc1a8b422010-07-19 11:34:49 -070077 bool code_set_;
adlr@google.com3defe6a2009-12-04 20:57:17 +000078};
79
80namespace {
Alex Vakulenkod2779df2014-06-16 13:19:00 -070081const char* const kLongName =
adlr@google.com3defe6a2009-12-04 20:57:17 +000082 "very_long_name_and_no_slashes-very_long_name_and_no_slashes"
83 "very_long_name_and_no_slashes-very_long_name_and_no_slashes"
84 "very_long_name_and_no_slashes-very_long_name_and_no_slashes"
85 "very_long_name_and_no_slashes-very_long_name_and_no_slashes"
86 "very_long_name_and_no_slashes-very_long_name_and_no_slashes"
87 "very_long_name_and_no_slashes-very_long_name_and_no_slashes"
88 "very_long_name_and_no_slashes-very_long_name_and_no_slashes"
89 "-the_update_a.b.c.d_DELTA_.tgz";
Alex Vakulenkod2779df2014-06-16 13:19:00 -070090const char* const kBadVersion = "don't update me";
91} // namespace
adlr@google.com3defe6a2009-12-04 20:57:17 +000092
Alex Deymo763e7db2015-08-27 21:08:08 -070093bool OmahaResponseHandlerActionTest::DoTest(
Jay Srinivasanae4697c2013-03-18 17:08:08 -070094 const OmahaResponse& in,
Gilad Arnold4dbd47e2013-07-22 05:39:26 -070095 const string& test_deadline_file,
Jay Srinivasanae4697c2013-03-18 17:08:08 -070096 InstallPlan* out) {
adlr@google.com3defe6a2009-12-04 20:57:17 +000097 ActionProcessor processor;
98 OmahaResponseHandlerActionProcessorDelegate delegate;
99 processor.set_delegate(&delegate);
100
Darin Petkov6a5b3222010-07-13 14:55:28 -0700101 ObjectFeederAction<OmahaResponse> feeder_action;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000102 feeder_action.set_obj(in);
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700103 if (in.update_exists && in.version != kBadVersion) {
Alex Deymo763e7db2015-08-27 21:08:08 -0700104 EXPECT_CALL(*(fake_system_state_.mock_prefs()),
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800105 SetString(kPrefsUpdateCheckResponseHash, in.hash))
Darin Petkov73058b42010-10-06 16:32:19 -0700106 .WillOnce(Return(true));
Alex Deymo85616652015-10-15 18:48:31 -0700107
108 int slot = 1 - fake_system_state_.fake_boot_control()->GetCurrentSlot();
109 string key = kPrefsChannelOnSlotPrefix + std::to_string(slot);
110 EXPECT_CALL(*(fake_system_state_.mock_prefs()), SetString(key, testing::_))
111 .WillOnce(Return(true));
Darin Petkov73058b42010-10-06 16:32:19 -0700112 }
Jay Srinivasan53173b92013-05-17 17:13:01 -0700113
114 string current_url = in.payload_urls.size() ? in.payload_urls[0] : "";
Alex Deymo763e7db2015-08-27 21:08:08 -0700115 EXPECT_CALL(*(fake_system_state_.mock_payload_state()), GetCurrentUrl())
Jay Srinivasan53173b92013-05-17 17:13:01 -0700116 .WillRepeatedly(Return(current_url));
117
Gilad Arnold4dbd47e2013-07-22 05:39:26 -0700118 OmahaResponseHandlerAction response_handler_action(
Alex Deymo763e7db2015-08-27 21:08:08 -0700119 &fake_system_state_,
Gilad Arnold4dbd47e2013-07-22 05:39:26 -0700120 (test_deadline_file.empty() ?
Alex Deymo6dd160a2015-10-09 18:45:14 -0700121 constants::kOmahaResponseDeadlineFile : test_deadline_file));
adlr@google.com3defe6a2009-12-04 20:57:17 +0000122 BondActions(&feeder_action, &response_handler_action);
123 ObjectCollectorAction<InstallPlan> collector_action;
124 BondActions(&response_handler_action, &collector_action);
125 processor.EnqueueAction(&feeder_action);
126 processor.EnqueueAction(&response_handler_action);
127 processor.EnqueueAction(&collector_action);
128 processor.StartProcessing();
129 EXPECT_TRUE(!processor.IsRunning())
Alex Vakulenko072359c2014-07-18 11:41:07 -0700130 << "Update test to handle non-async actions";
adlr@google.com3defe6a2009-12-04 20:57:17 +0000131 if (out)
132 *out = collector_action.object();
Darin Petkovc1a8b422010-07-19 11:34:49 -0700133 EXPECT_TRUE(delegate.code_set_);
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700134 return delegate.code_ == ErrorCode::kSuccess;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000135}
136
137TEST_F(OmahaResponseHandlerActionTest, SimpleTest) {
Gilad Arnold4dbd47e2013-07-22 05:39:26 -0700138 string test_deadline_file;
139 CHECK(utils::MakeTempFile(
Gilad Arnolda6742b32014-01-11 00:18:34 -0800140 "omaha_response_handler_action_unittest-XXXXXX",
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700141 &test_deadline_file, nullptr));
Gilad Arnold4dbd47e2013-07-22 05:39:26 -0700142 ScopedPathUnlinker deadline_unlinker(test_deadline_file);
adlr@google.com3defe6a2009-12-04 20:57:17 +0000143 {
Darin Petkov6a5b3222010-07-13 14:55:28 -0700144 OmahaResponse in;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000145 in.update_exists = true;
Chris Sosa3b748432013-06-20 16:42:59 -0700146 in.version = "a.b.c.d";
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800147 in.payload_urls.push_back("http://foo/the_update_a.b.c.d.tgz");
adlr@google.com3defe6a2009-12-04 20:57:17 +0000148 in.more_info_url = "http://more/info";
149 in.hash = "HASH+";
150 in.size = 12;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000151 in.prompt = false;
Darin Petkov6c118642010-10-21 12:06:30 -0700152 in.deadline = "20101020";
adlr@google.com3defe6a2009-12-04 20:57:17 +0000153 InstallPlan install_plan;
Alex Deymo763e7db2015-08-27 21:08:08 -0700154 EXPECT_TRUE(DoTest(in, test_deadline_file, &install_plan));
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800155 EXPECT_EQ(in.payload_urls[0], install_plan.download_url);
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700156 EXPECT_EQ(in.hash, install_plan.payload_hash);
Alex Deymo763e7db2015-08-27 21:08:08 -0700157 EXPECT_EQ(1, install_plan.target_slot);
Darin Petkov6c118642010-10-21 12:06:30 -0700158 string deadline;
Gilad Arnold4dbd47e2013-07-22 05:39:26 -0700159 EXPECT_TRUE(utils::ReadFile(test_deadline_file, &deadline));
Darin Petkov6c118642010-10-21 12:06:30 -0700160 EXPECT_EQ("20101020", deadline);
161 struct stat deadline_stat;
Gilad Arnold4dbd47e2013-07-22 05:39:26 -0700162 EXPECT_EQ(0, stat(test_deadline_file.c_str(), &deadline_stat));
Darin Petkov6c118642010-10-21 12:06:30 -0700163 EXPECT_EQ(S_IFREG | S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH,
164 deadline_stat.st_mode);
Chris Sosafb1020e2013-07-29 17:27:33 -0700165 EXPECT_EQ(in.version, install_plan.version);
adlr@google.com3defe6a2009-12-04 20:57:17 +0000166 }
167 {
Darin Petkov6a5b3222010-07-13 14:55:28 -0700168 OmahaResponse in;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000169 in.update_exists = true;
Chris Sosa3b748432013-06-20 16:42:59 -0700170 in.version = "a.b.c.d";
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800171 in.payload_urls.push_back("http://foo/the_update_a.b.c.d.tgz");
adlr@google.com3defe6a2009-12-04 20:57:17 +0000172 in.more_info_url = "http://more/info";
173 in.hash = "HASHj+";
174 in.size = 12;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000175 in.prompt = true;
176 InstallPlan install_plan;
Alex Deymo763e7db2015-08-27 21:08:08 -0700177 // Set the other slot as current.
178 fake_system_state_.fake_boot_control()->SetCurrentSlot(1);
179 EXPECT_TRUE(DoTest(in, test_deadline_file, &install_plan));
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800180 EXPECT_EQ(in.payload_urls[0], install_plan.download_url);
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700181 EXPECT_EQ(in.hash, install_plan.payload_hash);
Alex Deymo763e7db2015-08-27 21:08:08 -0700182 EXPECT_EQ(0, install_plan.target_slot);
Darin Petkov6c118642010-10-21 12:06:30 -0700183 string deadline;
Gilad Arnold4dbd47e2013-07-22 05:39:26 -0700184 EXPECT_TRUE(utils::ReadFile(test_deadline_file, &deadline) &&
185 deadline.empty());
Chris Sosafb1020e2013-07-29 17:27:33 -0700186 EXPECT_EQ(in.version, install_plan.version);
adlr@google.com3defe6a2009-12-04 20:57:17 +0000187 }
188 {
Darin Petkov6a5b3222010-07-13 14:55:28 -0700189 OmahaResponse in;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000190 in.update_exists = true;
Chris Sosa3b748432013-06-20 16:42:59 -0700191 in.version = "a.b.c.d";
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800192 in.payload_urls.push_back(kLongName);
adlr@google.com3defe6a2009-12-04 20:57:17 +0000193 in.more_info_url = "http://more/info";
194 in.hash = "HASHj+";
195 in.size = 12;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000196 in.prompt = true;
Darin Petkov6c118642010-10-21 12:06:30 -0700197 in.deadline = "some-deadline";
adlr@google.com3defe6a2009-12-04 20:57:17 +0000198 InstallPlan install_plan;
Alex Deymo763e7db2015-08-27 21:08:08 -0700199 fake_system_state_.fake_boot_control()->SetCurrentSlot(0);
200 EXPECT_TRUE(DoTest(in, test_deadline_file, &install_plan));
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800201 EXPECT_EQ(in.payload_urls[0], install_plan.download_url);
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700202 EXPECT_EQ(in.hash, install_plan.payload_hash);
Alex Deymo763e7db2015-08-27 21:08:08 -0700203 EXPECT_EQ(1, install_plan.target_slot);
Darin Petkov6c118642010-10-21 12:06:30 -0700204 string deadline;
Gilad Arnold4dbd47e2013-07-22 05:39:26 -0700205 EXPECT_TRUE(utils::ReadFile(test_deadline_file, &deadline));
Darin Petkov6c118642010-10-21 12:06:30 -0700206 EXPECT_EQ("some-deadline", deadline);
Chris Sosafb1020e2013-07-29 17:27:33 -0700207 EXPECT_EQ(in.version, install_plan.version);
adlr@google.com3defe6a2009-12-04 20:57:17 +0000208 }
209}
210
211TEST_F(OmahaResponseHandlerActionTest, NoUpdatesTest) {
Darin Petkov6a5b3222010-07-13 14:55:28 -0700212 OmahaResponse in;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000213 in.update_exists = false;
214 InstallPlan install_plan;
Alex Deymo763e7db2015-08-27 21:08:08 -0700215 EXPECT_FALSE(DoTest(in, "", &install_plan));
Alex Deymoe5e5fe92015-10-05 09:28:19 -0700216 EXPECT_TRUE(install_plan.partitions.empty());
adlr@google.com3defe6a2009-12-04 20:57:17 +0000217}
218
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800219TEST_F(OmahaResponseHandlerActionTest, HashChecksForHttpTest) {
220 OmahaResponse in;
221 in.update_exists = true;
Chris Sosa3b748432013-06-20 16:42:59 -0700222 in.version = "a.b.c.d";
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800223 in.payload_urls.push_back("http://test.should/need/hash.checks.signed");
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800224 in.more_info_url = "http://more/info";
225 in.hash = "HASHj+";
226 in.size = 12;
David Pursell02c18642014-11-06 11:26:11 -0800227 // Hash checks are always skipped for non-official update URLs.
Alex Deymo763e7db2015-08-27 21:08:08 -0700228 EXPECT_CALL(*(fake_system_state_.mock_request_params()),
David Pursell02c18642014-11-06 11:26:11 -0800229 IsUpdateUrlOfficial())
230 .WillRepeatedly(Return(true));
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800231 InstallPlan install_plan;
Alex Deymo763e7db2015-08-27 21:08:08 -0700232 EXPECT_TRUE(DoTest(in, "", &install_plan));
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800233 EXPECT_EQ(in.payload_urls[0], install_plan.download_url);
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800234 EXPECT_EQ(in.hash, install_plan.payload_hash);
235 EXPECT_TRUE(install_plan.hash_checks_mandatory);
Chris Sosafb1020e2013-07-29 17:27:33 -0700236 EXPECT_EQ(in.version, install_plan.version);
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800237}
238
David Pursell02c18642014-11-06 11:26:11 -0800239TEST_F(OmahaResponseHandlerActionTest, HashChecksForUnofficialUpdateUrl) {
240 OmahaResponse in;
241 in.update_exists = true;
242 in.version = "a.b.c.d";
243 in.payload_urls.push_back("http://url.normally/needs/hash.checks.signed");
244 in.more_info_url = "http://more/info";
245 in.hash = "HASHj+";
246 in.size = 12;
Alex Deymo763e7db2015-08-27 21:08:08 -0700247 EXPECT_CALL(*(fake_system_state_.mock_request_params()),
David Pursell02c18642014-11-06 11:26:11 -0800248 IsUpdateUrlOfficial())
249 .WillRepeatedly(Return(false));
250 InstallPlan install_plan;
Alex Deymo763e7db2015-08-27 21:08:08 -0700251 EXPECT_TRUE(DoTest(in, "", &install_plan));
David Pursell02c18642014-11-06 11:26:11 -0800252 EXPECT_EQ(in.payload_urls[0], install_plan.download_url);
253 EXPECT_EQ(in.hash, install_plan.payload_hash);
254 EXPECT_FALSE(install_plan.hash_checks_mandatory);
255 EXPECT_EQ(in.version, install_plan.version);
256}
257
David Pursell907b4fa2015-01-27 10:27:38 -0800258TEST_F(OmahaResponseHandlerActionTest,
259 HashChecksForOfficialUrlUnofficialBuildTest) {
260 // Official URLs for unofficial builds (dev/test images) don't require hash.
261 OmahaResponse in;
262 in.update_exists = true;
263 in.version = "a.b.c.d";
264 in.payload_urls.push_back("http://url.normally/needs/hash.checks.signed");
265 in.more_info_url = "http://more/info";
266 in.hash = "HASHj+";
267 in.size = 12;
Alex Deymo763e7db2015-08-27 21:08:08 -0700268 EXPECT_CALL(*(fake_system_state_.mock_request_params()),
David Pursell907b4fa2015-01-27 10:27:38 -0800269 IsUpdateUrlOfficial())
270 .WillRepeatedly(Return(true));
Alex Deymo763e7db2015-08-27 21:08:08 -0700271 fake_system_state_.fake_hardware()->SetIsOfficialBuild(false);
David Pursell907b4fa2015-01-27 10:27:38 -0800272 InstallPlan install_plan;
Alex Deymo763e7db2015-08-27 21:08:08 -0700273 EXPECT_TRUE(DoTest(in, "", &install_plan));
David Pursell907b4fa2015-01-27 10:27:38 -0800274 EXPECT_EQ(in.payload_urls[0], install_plan.download_url);
275 EXPECT_EQ(in.hash, install_plan.payload_hash);
276 EXPECT_FALSE(install_plan.hash_checks_mandatory);
277 EXPECT_EQ(in.version, install_plan.version);
278}
279
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800280TEST_F(OmahaResponseHandlerActionTest, HashChecksForHttpsTest) {
281 OmahaResponse in;
282 in.update_exists = true;
Chris Sosa3b748432013-06-20 16:42:59 -0700283 in.version = "a.b.c.d";
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800284 in.payload_urls.push_back("https://test.should.not/need/hash.checks.signed");
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800285 in.more_info_url = "http://more/info";
286 in.hash = "HASHj+";
287 in.size = 12;
Alex Deymo763e7db2015-08-27 21:08:08 -0700288 EXPECT_CALL(*(fake_system_state_.mock_request_params()),
David Pursell02c18642014-11-06 11:26:11 -0800289 IsUpdateUrlOfficial())
290 .WillRepeatedly(Return(true));
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800291 InstallPlan install_plan;
Alex Deymo763e7db2015-08-27 21:08:08 -0700292 EXPECT_TRUE(DoTest(in, "", &install_plan));
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800293 EXPECT_EQ(in.payload_urls[0], install_plan.download_url);
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800294 EXPECT_EQ(in.hash, install_plan.payload_hash);
295 EXPECT_FALSE(install_plan.hash_checks_mandatory);
Chris Sosafb1020e2013-07-29 17:27:33 -0700296 EXPECT_EQ(in.version, install_plan.version);
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800297}
298
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800299TEST_F(OmahaResponseHandlerActionTest, HashChecksForBothHttpAndHttpsTest) {
300 OmahaResponse in;
301 in.update_exists = true;
Chris Sosa3b748432013-06-20 16:42:59 -0700302 in.version = "a.b.c.d";
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800303 in.payload_urls.push_back("http://test.should.still/need/hash.checks");
304 in.payload_urls.push_back("https://test.should.still/need/hash.checks");
305 in.more_info_url = "http://more/info";
306 in.hash = "HASHj+";
307 in.size = 12;
Alex Deymo763e7db2015-08-27 21:08:08 -0700308 EXPECT_CALL(*(fake_system_state_.mock_request_params()),
David Pursell02c18642014-11-06 11:26:11 -0800309 IsUpdateUrlOfficial())
310 .WillRepeatedly(Return(true));
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800311 InstallPlan install_plan;
Alex Deymo763e7db2015-08-27 21:08:08 -0700312 EXPECT_TRUE(DoTest(in, "", &install_plan));
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800313 EXPECT_EQ(in.payload_urls[0], install_plan.download_url);
314 EXPECT_EQ(in.hash, install_plan.payload_hash);
315 EXPECT_TRUE(install_plan.hash_checks_mandatory);
Chris Sosafb1020e2013-07-29 17:27:33 -0700316 EXPECT_EQ(in.version, install_plan.version);
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800317}
318
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700319TEST_F(OmahaResponseHandlerActionTest, ChangeToMoreStableChannelTest) {
320 OmahaResponse in;
321 in.update_exists = true;
Chris Sosa3b748432013-06-20 16:42:59 -0700322 in.version = "a.b.c.d";
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700323 in.payload_urls.push_back("https://MoreStableChannelTest");
324 in.more_info_url = "http://more/info";
325 in.hash = "HASHjk";
326 in.size = 15;
327
Gilad Arnoldeff87cc2013-07-22 18:32:09 -0700328 // Create a uniquely named test directory.
329 string test_dir;
330 ASSERT_TRUE(utils::MakeTempDirectory(
331 "omaha_response_handler_action-test-XXXXXX", &test_dir));
332
333 ASSERT_EQ(0, System(string("mkdir -p ") + test_dir + "/etc"));
334 ASSERT_EQ(0, System(string("mkdir -p ") + test_dir +
Chris Sosabe45bef2013-04-09 18:25:12 -0700335 kStatefulPartition + "/etc"));
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700336 ASSERT_TRUE(WriteFileString(
Gilad Arnoldeff87cc2013-07-22 18:32:09 -0700337 test_dir + "/etc/lsb-release",
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700338 "CHROMEOS_RELEASE_TRACK=canary-channel\n"));
339 ASSERT_TRUE(WriteFileString(
Gilad Arnoldeff87cc2013-07-22 18:32:09 -0700340 test_dir + kStatefulPartition + "/etc/lsb-release",
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700341 "CHROMEOS_IS_POWERWASH_ALLOWED=true\n"
342 "CHROMEOS_RELEASE_TRACK=stable-channel\n"));
343
Alex Deymo763e7db2015-08-27 21:08:08 -0700344 OmahaRequestParams params(&fake_system_state_);
Alex Deymo85616652015-10-15 18:48:31 -0700345 fake_system_state_.fake_hardware()->SetIsOfficialBuild(false);
Gilad Arnoldd04f8e22014-01-09 13:13:40 -0800346 params.set_root(test_dir);
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700347 params.Init("1.2.3.4", "", 0);
348 EXPECT_EQ("canary-channel", params.current_channel());
349 EXPECT_EQ("stable-channel", params.target_channel());
350 EXPECT_TRUE(params.to_more_stable_channel());
351 EXPECT_TRUE(params.is_powerwash_allowed());
352
Alex Deymo763e7db2015-08-27 21:08:08 -0700353 fake_system_state_.set_request_params(&params);
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700354 InstallPlan install_plan;
Alex Deymo763e7db2015-08-27 21:08:08 -0700355 EXPECT_TRUE(DoTest(in, "", &install_plan));
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700356 EXPECT_TRUE(install_plan.powerwash_required);
Gilad Arnoldeff87cc2013-07-22 18:32:09 -0700357
Alex Deymo110e0302015-10-19 20:35:21 -0700358 ASSERT_TRUE(base::DeleteFile(base::FilePath(test_dir), true));
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700359}
360
361TEST_F(OmahaResponseHandlerActionTest, ChangeToLessStableChannelTest) {
362 OmahaResponse in;
363 in.update_exists = true;
Chris Sosa3b748432013-06-20 16:42:59 -0700364 in.version = "a.b.c.d";
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700365 in.payload_urls.push_back("https://LessStableChannelTest");
366 in.more_info_url = "http://more/info";
367 in.hash = "HASHjk";
368 in.size = 15;
369
Gilad Arnoldeff87cc2013-07-22 18:32:09 -0700370 // Create a uniquely named test directory.
371 string test_dir;
372 ASSERT_TRUE(utils::MakeTempDirectory(
373 "omaha_response_handler_action-test-XXXXXX", &test_dir));
374
375 ASSERT_EQ(0, System(string("mkdir -p ") + test_dir + "/etc"));
376 ASSERT_EQ(0, System(string("mkdir -p ") + test_dir +
Chris Sosabe45bef2013-04-09 18:25:12 -0700377 kStatefulPartition + "/etc"));
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700378 ASSERT_TRUE(WriteFileString(
Gilad Arnoldeff87cc2013-07-22 18:32:09 -0700379 test_dir + "/etc/lsb-release",
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700380 "CHROMEOS_RELEASE_TRACK=stable-channel\n"));
381 ASSERT_TRUE(WriteFileString(
Gilad Arnoldeff87cc2013-07-22 18:32:09 -0700382 test_dir + kStatefulPartition + "/etc/lsb-release",
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700383 "CHROMEOS_RELEASE_TRACK=canary-channel\n"));
384
Alex Deymo763e7db2015-08-27 21:08:08 -0700385 OmahaRequestParams params(&fake_system_state_);
Alex Deymo85616652015-10-15 18:48:31 -0700386 fake_system_state_.fake_hardware()->SetIsOfficialBuild(false);
Gilad Arnoldd04f8e22014-01-09 13:13:40 -0800387 params.set_root(test_dir);
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700388 params.Init("5.6.7.8", "", 0);
389 EXPECT_EQ("stable-channel", params.current_channel());
Alex Deymod942f9d2015-11-06 16:11:50 -0800390 params.SetTargetChannel("canary-channel", false, nullptr);
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700391 EXPECT_EQ("canary-channel", params.target_channel());
392 EXPECT_FALSE(params.to_more_stable_channel());
393 EXPECT_FALSE(params.is_powerwash_allowed());
394
Alex Deymo763e7db2015-08-27 21:08:08 -0700395 fake_system_state_.set_request_params(&params);
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700396 InstallPlan install_plan;
Alex Deymo763e7db2015-08-27 21:08:08 -0700397 EXPECT_TRUE(DoTest(in, "", &install_plan));
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700398 EXPECT_FALSE(install_plan.powerwash_required);
Gilad Arnoldeff87cc2013-07-22 18:32:09 -0700399
Alex Deymo110e0302015-10-19 20:35:21 -0700400 ASSERT_TRUE(base::DeleteFile(base::FilePath(test_dir), true));
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700401}
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800402
David Zeuthen8f191b22013-08-06 12:27:50 -0700403TEST_F(OmahaResponseHandlerActionTest, P2PUrlIsUsedAndHashChecksMandatory) {
404 OmahaResponse in;
405 in.update_exists = true;
406 in.version = "a.b.c.d";
407 in.payload_urls.push_back("https://would.not/cause/hash/checks");
408 in.more_info_url = "http://more/info";
409 in.hash = "HASHj+";
410 in.size = 12;
411
Alex Deymo763e7db2015-08-27 21:08:08 -0700412 OmahaRequestParams params(&fake_system_state_);
David Pursell02c18642014-11-06 11:26:11 -0800413 // We're using a real OmahaRequestParams object here so we can't mock
414 // IsUpdateUrlOfficial(), but setting the update URL to the AutoUpdate test
415 // server will cause IsUpdateUrlOfficial() to return true.
Alex Deymoac41a822015-09-15 20:52:53 -0700416 params.set_update_url(constants::kOmahaDefaultAUTestURL);
Alex Deymo763e7db2015-08-27 21:08:08 -0700417 fake_system_state_.set_request_params(&params);
David Zeuthen8f191b22013-08-06 12:27:50 -0700418
Alex Deymo763e7db2015-08-27 21:08:08 -0700419 EXPECT_CALL(*fake_system_state_.mock_payload_state(),
David Zeuthenbb8bdc72013-09-03 13:43:48 -0700420 SetUsingP2PForDownloading(true));
421
David Zeuthen8f191b22013-08-06 12:27:50 -0700422 string p2p_url = "http://9.8.7.6/p2p";
Alex Deymo763e7db2015-08-27 21:08:08 -0700423 EXPECT_CALL(*fake_system_state_.mock_payload_state(), GetP2PUrl())
Gilad Arnold74b5f552014-10-07 08:17:16 -0700424 .WillRepeatedly(Return(p2p_url));
Alex Deymo763e7db2015-08-27 21:08:08 -0700425 EXPECT_CALL(*fake_system_state_.mock_payload_state(),
Gilad Arnold74b5f552014-10-07 08:17:16 -0700426 GetUsingP2PForDownloading()).WillRepeatedly(Return(true));
David Zeuthen8f191b22013-08-06 12:27:50 -0700427
428 InstallPlan install_plan;
Alex Deymo763e7db2015-08-27 21:08:08 -0700429 EXPECT_TRUE(DoTest(in, "", &install_plan));
David Zeuthen8f191b22013-08-06 12:27:50 -0700430 EXPECT_EQ(in.hash, install_plan.payload_hash);
431 EXPECT_EQ(install_plan.download_url, p2p_url);
432 EXPECT_TRUE(install_plan.hash_checks_mandatory);
433}
434
adlr@google.com3defe6a2009-12-04 20:57:17 +0000435} // namespace chromeos_update_engine