blob: ba2e934c677fa3ee096684eefc7238ce15d8c474 [file] [log] [blame]
Mike Frysinger8155d082012-04-06 15:23:18 -04001// Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
Andrew de los Reyes09e56d62010-04-23 13:45:53 -07002// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include <sys/mount.h>
6#include <inttypes.h>
7
8#include <algorithm>
9#include <string>
10#include <vector>
11
Darin Petkov9fa7ec52010-10-18 11:45:23 -070012#include <base/file_util.h>
Chris Masoned903c3b2011-05-12 15:35:46 -070013#include <base/memory/scoped_ptr.h>
Darin Petkov73058b42010-10-06 16:32:19 -070014#include <base/string_util.h>
Mike Frysinger8155d082012-04-06 15:23:18 -040015#include <base/stringprintf.h>
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070016#include <google/protobuf/repeated_field.h>
17#include <gtest/gtest.h>
18
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070019#include "update_engine/delta_diff_generator.h"
20#include "update_engine/delta_performer.h"
Andrew de los Reyes353777c2010-10-08 10:34:30 -070021#include "update_engine/extent_ranges.h"
Darin Petkov7a22d792010-11-08 14:10:00 -080022#include "update_engine/full_update_generator.h"
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070023#include "update_engine/graph_types.h"
Jay Srinivasanf0572052012-10-23 18:12:56 -070024#include "update_engine/mock_system_state.h"
Andrew de los Reyes932bc4c2010-08-23 18:14:09 -070025#include "update_engine/payload_signer.h"
Darin Petkov73058b42010-10-06 16:32:19 -070026#include "update_engine/prefs_mock.h"
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070027#include "update_engine/test_utils.h"
28#include "update_engine/update_metadata.pb.h"
29#include "update_engine/utils.h"
30
31namespace chromeos_update_engine {
32
33using std::min;
34using std::string;
35using std::vector;
Darin Petkov73058b42010-10-06 16:32:19 -070036using testing::_;
37using testing::Return;
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070038
Andrew de los Reyes932bc4c2010-08-23 18:14:09 -070039extern const char* kUnittestPrivateKeyPath;
Darin Petkovd7061ab2010-10-06 14:37:09 -070040extern const char* kUnittestPublicKeyPath;
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -070041extern const char* kUnittestPrivateKey2Path;
42extern const char* kUnittestPublicKey2Path;
Andrew de los Reyes932bc4c2010-08-23 18:14:09 -070043
Jay Srinivasan738fdf32012-12-07 17:40:54 -080044static const size_t kBlockSize = 4096;
45static const char* kBogusMetadataSignature1 = "awSFIUdUZz2VWFiR+ku0Pj00V7bPQPQFYQSXjEXr3vaw3TE4xHV5CraY3/YrZpBvJ5z4dSBskoeuaO1TNC/S6E05t+yt36tE4Fh79tMnJ/z9fogBDXWgXLEUyG78IEQrYH6/eBsQGT2RJtBgXIXbZ9W+5G9KmGDoPOoiaeNsDuqHiBc/58OFsrxskH8E6vMSBmMGGk82mvgzic7ApcoURbCGey1b3Mwne/hPZ/bb9CIyky8Og9IfFMdL2uAweOIRfjoTeLYZpt+WN65Vu7jJ0cQN8e1y+2yka5112wpRf/LLtPgiAjEZnsoYpLUd7CoVpLRtClp97kN2+tXGNBQqkA==";
46
47static const int kDefaultKernelSize = 4096; // Something small for a test
48static const char* kNewDataString = "This is new data.";
49
Andrew de los Reyes27f7d372010-10-07 11:26:07 -070050namespace {
Jay Srinivasan738fdf32012-12-07 17:40:54 -080051struct DeltaState {
52 string a_img;
53 string b_img;
54 int image_size;
Andrew de los Reyes27f7d372010-10-07 11:26:07 -070055
Jay Srinivasan738fdf32012-12-07 17:40:54 -080056 string delta_path;
57 uint64_t metadata_size;
Andrew de los Reyes27f7d372010-10-07 11:26:07 -070058
Jay Srinivasan738fdf32012-12-07 17:40:54 -080059 string old_kernel;
60 vector<char> old_kernel_data;
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070061
Jay Srinivasan738fdf32012-12-07 17:40:54 -080062 string new_kernel;
63 vector<char> new_kernel_data;
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070064
Jay Srinivasan738fdf32012-12-07 17:40:54 -080065 // The in-memory copy of delta file.
66 vector<char> delta;
Jay Srinivasan2b5a0f02012-12-19 17:25:56 -080067
68 // The mock system state object with which we initialize the
69 // delta performer.
70 MockSystemState mock_system_state;
Jay Srinivasan738fdf32012-12-07 17:40:54 -080071};
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070072
Jay Srinivasan738fdf32012-12-07 17:40:54 -080073enum SignatureTest {
74 kSignatureNone, // No payload signing.
75 kSignatureGenerator, // Sign the payload at generation time.
76 kSignatureGenerated, // Sign the payload after it's generated.
77 kSignatureGeneratedShell, // Sign the generated payload through shell cmds.
78 kSignatureGeneratedShellBadKey, // Sign with a bad key through shell cmds.
79 kSignatureGeneratedShellRotateCl1, // Rotate key, test client v1
80 kSignatureGeneratedShellRotateCl2, // Rotate key, test client v2
81};
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070082
Jay Srinivasan738fdf32012-12-07 17:40:54 -080083// Different options that determine what we should fill into the
84// install_plan.metadata_signature to simulate the contents received in the
85// Omaha response.
86enum MetadataSignatureTest {
87 kEmptyMetadataSignature,
88 kInvalidMetadataSignature,
89 kValidMetadataSignature,
90};
91
92enum OperationHashTest {
93 kInvalidOperationData,
94 kValidOperationData,
95};
96
97} // namespace {}
98
99static void CompareFilesByBlock(const string& a_file, const string& b_file) {
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700100 vector<char> a_data, b_data;
Andrew de los Reyes3270f742010-07-15 22:28:14 -0700101 EXPECT_TRUE(utils::ReadFile(a_file, &a_data)) << "file failed: " << a_file;
102 EXPECT_TRUE(utils::ReadFile(b_file, &b_data)) << "file failed: " << b_file;
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700103
104 EXPECT_EQ(a_data.size(), b_data.size());
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700105 EXPECT_EQ(0, a_data.size() % kBlockSize);
106 for (size_t i = 0; i < a_data.size(); i += kBlockSize) {
107 EXPECT_EQ(0, i % kBlockSize);
108 vector<char> a_sub(&a_data[i], &a_data[i + kBlockSize]);
109 vector<char> b_sub(&b_data[i], &b_data[i + kBlockSize]);
110 EXPECT_TRUE(a_sub == b_sub) << "Block " << (i/kBlockSize) << " differs";
111 }
112}
113
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800114static bool WriteSparseFile(const string& path, off_t size) {
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700115 int fd = open(path.c_str(), O_CREAT | O_TRUNC | O_WRONLY, 0644);
116 TEST_AND_RETURN_FALSE_ERRNO(fd >= 0);
117 ScopedFdCloser fd_closer(&fd);
118 off_t rc = lseek(fd, size + 1, SEEK_SET);
119 TEST_AND_RETURN_FALSE_ERRNO(rc != static_cast<off_t>(-1));
120 int return_code = ftruncate(fd, size);
121 TEST_AND_RETURN_FALSE_ERRNO(return_code == 0);
122 return true;
123}
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700124
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800125static size_t GetSignatureSize(const string& private_key_path) {
Darin Petkovcbfb0172011-01-14 15:24:45 -0800126 const vector<char> data(1, 'x');
127 vector<char> hash;
128 EXPECT_TRUE(OmahaHashCalculator::RawHashOfData(data, &hash));
129 vector<char> signature;
130 EXPECT_TRUE(PayloadSigner::SignHash(hash,
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800131 private_key_path,
Darin Petkovcbfb0172011-01-14 15:24:45 -0800132 &signature));
133 return signature.size();
134}
135
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800136static void SignGeneratedPayload(const string& payload_path,
137 uint64_t* out_metadata_size) {
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800138 int signature_size = GetSignatureSize(kUnittestPrivateKeyPath);
Darin Petkovcbfb0172011-01-14 15:24:45 -0800139 vector<char> hash;
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -0700140 ASSERT_TRUE(PayloadSigner::HashPayloadForSigning(
141 payload_path,
142 vector<int>(1, signature_size),
143 &hash));
Darin Petkovcbfb0172011-01-14 15:24:45 -0800144 vector<char> signature;
145 ASSERT_TRUE(PayloadSigner::SignHash(hash,
146 kUnittestPrivateKeyPath,
147 &signature));
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -0700148 ASSERT_TRUE(PayloadSigner::AddSignatureToPayload(
149 payload_path,
150 vector<vector<char> >(1, signature),
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800151 payload_path,
152 out_metadata_size));
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -0700153 EXPECT_TRUE(PayloadSigner::VerifySignedPayload(
154 payload_path,
155 kUnittestPublicKeyPath,
156 kSignatureMessageOriginalVersion));
Darin Petkovcbfb0172011-01-14 15:24:45 -0800157}
158
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800159static void SignGeneratedShellPayload(SignatureTest signature_test,
160 const string& payload_path) {
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800161 string private_key_path = kUnittestPrivateKeyPath;
162 if (signature_test == kSignatureGeneratedShellBadKey) {
163 ASSERT_TRUE(utils::MakeTempFile("/tmp/key.XXXXXX",
164 &private_key_path,
165 NULL));
166 } else {
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -0700167 ASSERT_TRUE(signature_test == kSignatureGeneratedShell ||
168 signature_test == kSignatureGeneratedShellRotateCl1 ||
169 signature_test == kSignatureGeneratedShellRotateCl2);
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800170 }
171 ScopedPathUnlinker key_unlinker(private_key_path);
172 key_unlinker.set_should_remove(signature_test ==
173 kSignatureGeneratedShellBadKey);
174 // Generates a new private key that will not match the public key.
175 if (signature_test == kSignatureGeneratedShellBadKey) {
176 LOG(INFO) << "Generating a mismatched private key.";
177 ASSERT_EQ(0,
178 System(StringPrintf(
Mike Frysinger2149be42012-03-12 19:23:47 -0400179 "openssl genrsa -out %s 2048",
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800180 private_key_path.c_str())));
181 }
182 int signature_size = GetSignatureSize(private_key_path);
Darin Petkovcbfb0172011-01-14 15:24:45 -0800183 string hash_file;
184 ASSERT_TRUE(utils::MakeTempFile("/tmp/hash.XXXXXX", &hash_file, NULL));
185 ScopedPathUnlinker hash_unlinker(hash_file);
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -0700186 string signature_size_string;
187 if (signature_test == kSignatureGeneratedShellRotateCl1 ||
188 signature_test == kSignatureGeneratedShellRotateCl2)
189 signature_size_string = StringPrintf("%d:%d",
190 signature_size, signature_size);
191 else
192 signature_size_string = StringPrintf("%d", signature_size);
Darin Petkovcbfb0172011-01-14 15:24:45 -0800193 ASSERT_EQ(0,
194 System(StringPrintf(
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -0700195 "./delta_generator -in_file %s -signature_size %s "
Darin Petkovcbfb0172011-01-14 15:24:45 -0800196 "-out_hash_file %s",
197 payload_path.c_str(),
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -0700198 signature_size_string.c_str(),
Darin Petkovcbfb0172011-01-14 15:24:45 -0800199 hash_file.c_str())));
200
Andrew de los Reyesbdfaaf02011-03-30 10:35:12 -0700201 // Pad the hash
202 vector<char> hash;
203 ASSERT_TRUE(utils::ReadFile(hash_file, &hash));
204 ASSERT_TRUE(PayloadSigner::PadRSA2048SHA256Hash(&hash));
205 ASSERT_TRUE(WriteFileVector(hash_file, hash));
206
Darin Petkovcbfb0172011-01-14 15:24:45 -0800207 string sig_file;
208 ASSERT_TRUE(utils::MakeTempFile("/tmp/signature.XXXXXX", &sig_file, NULL));
209 ScopedPathUnlinker sig_unlinker(sig_file);
210 ASSERT_EQ(0,
211 System(StringPrintf(
Mike Frysinger2149be42012-03-12 19:23:47 -0400212 "openssl rsautl -raw -sign -inkey %s -in %s -out %s",
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800213 private_key_path.c_str(),
Darin Petkovcbfb0172011-01-14 15:24:45 -0800214 hash_file.c_str(),
215 sig_file.c_str())));
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -0700216 string sig_file2;
217 ASSERT_TRUE(utils::MakeTempFile("/tmp/signature.XXXXXX", &sig_file2, NULL));
218 ScopedPathUnlinker sig2_unlinker(sig_file2);
219 if (signature_test == kSignatureGeneratedShellRotateCl1 ||
220 signature_test == kSignatureGeneratedShellRotateCl2) {
221 ASSERT_EQ(0,
222 System(StringPrintf(
Mike Frysinger2149be42012-03-12 19:23:47 -0400223 "openssl rsautl -raw -sign -inkey %s -in %s -out %s",
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -0700224 kUnittestPrivateKey2Path,
225 hash_file.c_str(),
226 sig_file2.c_str())));
227 // Append second sig file to first path
228 sig_file += ":" + sig_file2;
229 }
230
Darin Petkovcbfb0172011-01-14 15:24:45 -0800231 ASSERT_EQ(0,
232 System(StringPrintf(
233 "./delta_generator -in_file %s -signature_file %s "
234 "-out_file %s",
235 payload_path.c_str(),
236 sig_file.c_str(),
237 payload_path.c_str())));
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800238 int verify_result =
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -0700239 System(StringPrintf(
240 "./delta_generator -in_file %s -public_key %s -public_key_version %d",
241 payload_path.c_str(),
242 signature_test == kSignatureGeneratedShellRotateCl2 ?
243 kUnittestPublicKey2Path : kUnittestPublicKeyPath,
244 signature_test == kSignatureGeneratedShellRotateCl2 ? 2 : 1));
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800245 if (signature_test == kSignatureGeneratedShellBadKey) {
246 ASSERT_NE(0, verify_result);
247 } else {
248 ASSERT_EQ(0, verify_result);
249 }
Darin Petkovcbfb0172011-01-14 15:24:45 -0800250}
251
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800252static void GenerateDeltaFile(bool full_kernel,
253 bool full_rootfs,
254 bool noop,
255 SignatureTest signature_test,
256 DeltaState *state) {
257 EXPECT_TRUE(utils::MakeTempFile("/tmp/a_img.XXXXXX", &state->a_img, NULL));
258 EXPECT_TRUE(utils::MakeTempFile("/tmp/b_img.XXXXXX", &state->b_img, NULL));
259 CreateExtImageAtPath(state->a_img, NULL);
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700260
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800261 state->image_size = static_cast<int>(utils::FileSize(state->a_img));
Darin Petkov7ea32332010-10-13 10:46:11 -0700262
263 // Extend the "partitions" holding the file system a bit.
264 EXPECT_EQ(0, System(base::StringPrintf(
265 "dd if=/dev/zero of=%s seek=%d bs=1 count=1",
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800266 state->a_img.c_str(),
267 state->image_size + 1024 * 1024 - 1)));
268 EXPECT_EQ(state->image_size + 1024 * 1024, utils::FileSize(state->a_img));
Darin Petkov7ea32332010-10-13 10:46:11 -0700269
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700270 // Make some changes to the A image.
271 {
272 string a_mnt;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800273 ScopedLoopMounter b_mounter(state->a_img, &a_mnt, 0);
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700274
275 EXPECT_TRUE(utils::WriteFile(StringPrintf("%s/hardtocompress",
276 a_mnt.c_str()).c_str(),
277 reinterpret_cast<const char*>(kRandomString),
278 sizeof(kRandomString) - 1));
279 // Write 1 MiB of 0xff to try to catch the case where writing a bsdiff
280 // patch fails to zero out the final block.
281 vector<char> ones(1024 * 1024, 0xff);
282 EXPECT_TRUE(utils::WriteFile(StringPrintf("%s/ones",
283 a_mnt.c_str()).c_str(),
284 &ones[0],
285 ones.size()));
286 }
287
Darin Petkov9fa7ec52010-10-18 11:45:23 -0700288 if (noop) {
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800289 EXPECT_TRUE(file_util::CopyFile(FilePath(state->a_img),
290 FilePath(state->b_img)));
Darin Petkov9fa7ec52010-10-18 11:45:23 -0700291 } else {
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800292 CreateExtImageAtPath(state->b_img, NULL);
Darin Petkov9fa7ec52010-10-18 11:45:23 -0700293 EXPECT_EQ(0, System(base::StringPrintf(
294 "dd if=/dev/zero of=%s seek=%d bs=1 count=1",
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800295 state->b_img.c_str(),
296 state->image_size + 1024 * 1024 - 1)));
297 EXPECT_EQ(state->image_size + 1024 * 1024, utils::FileSize(state->b_img));
Darin Petkov9fa7ec52010-10-18 11:45:23 -0700298
299 // Make some changes to the B image.
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700300 string b_mnt;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800301 ScopedLoopMounter b_mounter(state->b_img, &b_mnt, 0);
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700302
303 EXPECT_EQ(0, system(StringPrintf("cp %s/hello %s/hello2", b_mnt.c_str(),
304 b_mnt.c_str()).c_str()));
305 EXPECT_EQ(0, system(StringPrintf("rm %s/hello", b_mnt.c_str()).c_str()));
306 EXPECT_EQ(0, system(StringPrintf("mv %s/hello2 %s/hello", b_mnt.c_str(),
307 b_mnt.c_str()).c_str()));
308 EXPECT_EQ(0, system(StringPrintf("echo foo > %s/foo",
309 b_mnt.c_str()).c_str()));
310 EXPECT_EQ(0, system(StringPrintf("touch %s/emptyfile",
311 b_mnt.c_str()).c_str()));
312 EXPECT_TRUE(WriteSparseFile(StringPrintf("%s/fullsparse", b_mnt.c_str()),
313 1024 * 1024));
314 EXPECT_EQ(0, system(StringPrintf("dd if=/dev/zero of=%s/partsparese bs=1 "
315 "seek=4096 count=1",
316 b_mnt.c_str()).c_str()));
Andrew de los Reyes29da8aa2011-02-15 13:34:57 -0800317 EXPECT_EQ(0, system(StringPrintf("cp %s/srchardlink0 %s/tmp && "
318 "mv %s/tmp %s/srchardlink1",
319 b_mnt.c_str(), b_mnt.c_str(),
320 b_mnt.c_str(), b_mnt.c_str()).c_str()));
Andrew de los Reyes48a0a482011-02-22 15:32:11 -0800321 EXPECT_EQ(0, system(StringPrintf("rm %s/boguslink && "
322 "echo foobar > %s/boguslink",
323 b_mnt.c_str(), b_mnt.c_str()).c_str()));
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700324 EXPECT_TRUE(utils::WriteFile(StringPrintf("%s/hardtocompress",
325 b_mnt.c_str()).c_str(),
326 reinterpret_cast<const char*>(kRandomString),
327 sizeof(kRandomString)));
328 }
329
Andrew de los Reyesf4c7ef12010-04-30 10:37:00 -0700330 string old_kernel;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800331 EXPECT_TRUE(utils::MakeTempFile("/tmp/old_kernel.XXXXXX",
332 &state->old_kernel,
333 NULL));
Andrew de los Reyesf4c7ef12010-04-30 10:37:00 -0700334
335 string new_kernel;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800336 EXPECT_TRUE(utils::MakeTempFile("/tmp/new_kernel.XXXXXX",
337 &state->new_kernel,
338 NULL));
Andrew de los Reyesf4c7ef12010-04-30 10:37:00 -0700339
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800340 state->old_kernel_data.resize(kDefaultKernelSize);
341 state->new_kernel_data.resize(state->old_kernel_data.size());
342 FillWithData(&state->old_kernel_data);
343 FillWithData(&state->new_kernel_data);
Andrew de los Reyes932bc4c2010-08-23 18:14:09 -0700344
Andrew de los Reyesf4c7ef12010-04-30 10:37:00 -0700345 // change the new kernel data
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800346 strcpy(&state->new_kernel_data[0], kNewDataString);
Andrew de los Reyesf4c7ef12010-04-30 10:37:00 -0700347
Darin Petkov9fa7ec52010-10-18 11:45:23 -0700348 if (noop) {
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800349 state->old_kernel_data = state->new_kernel_data;
Darin Petkov9fa7ec52010-10-18 11:45:23 -0700350 }
351
Andrew de los Reyesf4c7ef12010-04-30 10:37:00 -0700352 // Write kernels to disk
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800353 EXPECT_TRUE(utils::WriteFile(state->old_kernel.c_str(),
354 &state->old_kernel_data[0],
355 state->old_kernel_data.size()));
356 EXPECT_TRUE(utils::WriteFile(state->new_kernel.c_str(),
357 &state->new_kernel_data[0],
358 state->new_kernel_data.size()));
Andrew de los Reyesf4c7ef12010-04-30 10:37:00 -0700359
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800360 EXPECT_TRUE(utils::MakeTempFile("/tmp/delta.XXXXXX",
361 &state->delta_path,
362 NULL));
363 LOG(INFO) << "delta path: " << state->delta_path;
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700364 {
365 string a_mnt, b_mnt;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800366 ScopedLoopMounter a_mounter(state->a_img, &a_mnt, MS_RDONLY);
367 ScopedLoopMounter b_mounter(state->b_img, &b_mnt, MS_RDONLY);
Darin Petkovcbfb0172011-01-14 15:24:45 -0800368 const string private_key =
369 signature_test == kSignatureGenerator ? kUnittestPrivateKeyPath : "";
Andrew de los Reyes932bc4c2010-08-23 18:14:09 -0700370 EXPECT_TRUE(
Darin Petkov68c10d12010-10-14 09:24:37 -0700371 DeltaDiffGenerator::GenerateDeltaUpdateFile(
Darin Petkov7a22d792010-11-08 14:10:00 -0800372 full_rootfs ? "" : a_mnt,
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800373 full_rootfs ? "" : state->a_img,
Darin Petkov68c10d12010-10-14 09:24:37 -0700374 b_mnt,
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800375 state->b_img,
376 full_kernel ? "" : state->old_kernel,
377 state->new_kernel,
378 state->delta_path,
379 private_key,
380 &state->metadata_size));
Darin Petkov9574f7e2011-01-13 10:48:12 -0800381 }
382
Darin Petkovcbfb0172011-01-14 15:24:45 -0800383 if (signature_test == kSignatureGenerated) {
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800384 // Generate the signed payload and update the metadata size in state to
385 // reflect the new size after adding the signature operation to the
386 // manifest.
387 SignGeneratedPayload(state->delta_path, &state->metadata_size);
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800388 } else if (signature_test == kSignatureGeneratedShell ||
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -0700389 signature_test == kSignatureGeneratedShellBadKey ||
390 signature_test == kSignatureGeneratedShellRotateCl1 ||
391 signature_test == kSignatureGeneratedShellRotateCl2) {
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800392 SignGeneratedShellPayload(signature_test, state->delta_path);
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700393 }
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800394}
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700395
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800396static void ApplyDeltaFile(bool full_kernel, bool full_rootfs, bool noop,
397 SignatureTest signature_test, DeltaState* state,
398 bool hash_checks_mandatory,
399 OperationHashTest op_hash_test,
400 DeltaPerformer** performer) {
Darin Petkov36a58222010-10-07 22:00:09 -0700401 // Check the metadata.
Andrew de los Reyes932bc4c2010-08-23 18:14:09 -0700402 {
Andrew de los Reyes932bc4c2010-08-23 18:14:09 -0700403 DeltaArchiveManifest manifest;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800404 EXPECT_TRUE(PayloadSigner::LoadPayload(state->delta_path,
405 &state->delta,
406 &manifest,
407 &state->metadata_size));
408 LOG(INFO) << "Metadata size: " << state->metadata_size;
Andrew de los Reyes932bc4c2010-08-23 18:14:09 -0700409
Darin Petkovcbfb0172011-01-14 15:24:45 -0800410 if (signature_test == kSignatureNone) {
411 EXPECT_FALSE(manifest.has_signatures_offset());
412 EXPECT_FALSE(manifest.has_signatures_size());
413 } else {
414 EXPECT_TRUE(manifest.has_signatures_offset());
415 EXPECT_TRUE(manifest.has_signatures_size());
416 Signatures sigs_message;
417 EXPECT_TRUE(sigs_message.ParseFromArray(
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800418 &state->delta[state->metadata_size + manifest.signatures_offset()],
Darin Petkovcbfb0172011-01-14 15:24:45 -0800419 manifest.signatures_size()));
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -0700420 if (signature_test == kSignatureGeneratedShellRotateCl1 ||
421 signature_test == kSignatureGeneratedShellRotateCl2)
422 EXPECT_EQ(2, sigs_message.signatures_size());
423 else
424 EXPECT_EQ(1, sigs_message.signatures_size());
Darin Petkovcbfb0172011-01-14 15:24:45 -0800425 const Signatures_Signature& signature = sigs_message.signatures(0);
426 EXPECT_EQ(1, signature.version());
Andrew de los Reyes932bc4c2010-08-23 18:14:09 -0700427
Darin Petkovcbfb0172011-01-14 15:24:45 -0800428 uint64_t expected_sig_data_length = 0;
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -0700429 vector<string> key_paths (1, kUnittestPrivateKeyPath);
430 if (signature_test == kSignatureGeneratedShellRotateCl1 ||
431 signature_test == kSignatureGeneratedShellRotateCl2) {
432 key_paths.push_back(kUnittestPrivateKey2Path);
433 }
Darin Petkovcbfb0172011-01-14 15:24:45 -0800434 EXPECT_TRUE(PayloadSigner::SignatureBlobLength(
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -0700435 key_paths,
436 &expected_sig_data_length));
Darin Petkovcbfb0172011-01-14 15:24:45 -0800437 EXPECT_EQ(expected_sig_data_length, manifest.signatures_size());
438 EXPECT_FALSE(signature.data().empty());
439 }
Darin Petkov36a58222010-10-07 22:00:09 -0700440
Darin Petkov9fa7ec52010-10-18 11:45:23 -0700441 if (noop) {
442 EXPECT_EQ(1, manifest.install_operations_size());
443 EXPECT_EQ(1, manifest.kernel_install_operations_size());
444 }
445
Darin Petkovd43d6902010-10-14 11:17:50 -0700446 if (full_kernel) {
447 EXPECT_FALSE(manifest.has_old_kernel_info());
448 } else {
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800449 EXPECT_EQ(state->old_kernel_data.size(),
450 manifest.old_kernel_info().size());
Darin Petkovd43d6902010-10-14 11:17:50 -0700451 EXPECT_FALSE(manifest.old_kernel_info().hash().empty());
452 }
Darin Petkov698d0412010-10-13 10:59:44 -0700453
Darin Petkov7a22d792010-11-08 14:10:00 -0800454 if (full_rootfs) {
455 EXPECT_FALSE(manifest.has_old_rootfs_info());
456 } else {
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800457 EXPECT_EQ(state->image_size, manifest.old_rootfs_info().size());
Darin Petkov7a22d792010-11-08 14:10:00 -0800458 EXPECT_FALSE(manifest.old_rootfs_info().hash().empty());
459 }
460
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800461 EXPECT_EQ(state->new_kernel_data.size(), manifest.new_kernel_info().size());
462 EXPECT_EQ(state->image_size, manifest.new_rootfs_info().size());
Darin Petkov36a58222010-10-07 22:00:09 -0700463
Darin Petkov36a58222010-10-07 22:00:09 -0700464 EXPECT_FALSE(manifest.new_kernel_info().hash().empty());
Darin Petkov36a58222010-10-07 22:00:09 -0700465 EXPECT_FALSE(manifest.new_rootfs_info().hash().empty());
Andrew de los Reyes932bc4c2010-08-23 18:14:09 -0700466 }
467
Darin Petkov73058b42010-10-06 16:32:19 -0700468 PrefsMock prefs;
469 EXPECT_CALL(prefs, SetInt64(kPrefsManifestMetadataSize,
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800470 state->metadata_size)).WillOnce(Return(true));
Darin Petkov73058b42010-10-06 16:32:19 -0700471 EXPECT_CALL(prefs, SetInt64(kPrefsUpdateStateNextOperation, _))
472 .WillRepeatedly(Return(true));
Darin Petkov9b230572010-10-08 10:20:09 -0700473 EXPECT_CALL(prefs, GetInt64(kPrefsUpdateStateNextOperation, _))
474 .WillOnce(Return(false));
Darin Petkov73058b42010-10-06 16:32:19 -0700475 EXPECT_CALL(prefs, SetInt64(kPrefsUpdateStateNextDataOffset, _))
476 .WillRepeatedly(Return(true));
Darin Petkov437adc42010-10-07 13:12:24 -0700477 EXPECT_CALL(prefs, SetString(kPrefsUpdateStateSHA256Context, _))
Darin Petkov73058b42010-10-06 16:32:19 -0700478 .WillRepeatedly(Return(true));
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800479 if (op_hash_test == kValidOperationData && signature_test != kSignatureNone) {
Darin Petkovcbfb0172011-01-14 15:24:45 -0800480 EXPECT_CALL(prefs, SetString(kPrefsUpdateStateSignedSHA256Context, _))
481 .WillOnce(Return(true));
Darin Petkov4f0a07b2011-05-25 16:47:20 -0700482 EXPECT_CALL(prefs, SetString(kPrefsUpdateStateSignatureBlob, _))
483 .WillOnce(Return(true));
Darin Petkovcbfb0172011-01-14 15:24:45 -0800484 }
Darin Petkov73058b42010-10-06 16:32:19 -0700485
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700486 // Update the A image in place.
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700487 InstallPlan install_plan;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800488 install_plan.hash_checks_mandatory = hash_checks_mandatory;
489 install_plan.metadata_size = state->metadata_size;
490 LOG(INFO) << "Setting payload metadata size in Omaha = "
491 << state->metadata_size;
Jay Srinivasanf4318702012-09-24 11:56:24 -0700492 ASSERT_TRUE(PayloadSigner::GetMetadataSignature(
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800493 &state->delta[0],
494 state->metadata_size,
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700495 kUnittestPrivateKeyPath,
Jay Srinivasanf4318702012-09-24 11:56:24 -0700496 &install_plan.metadata_signature));
497 EXPECT_FALSE(install_plan.metadata_signature.empty());
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700498
Jay Srinivasan2b5a0f02012-12-19 17:25:56 -0800499 *performer = new DeltaPerformer(&prefs,
500 &state->mock_system_state,
501 &install_plan);
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700502 EXPECT_TRUE(utils::FileExists(kUnittestPublicKeyPath));
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800503 (*performer)->set_public_key_path(kUnittestPublicKeyPath);
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700504
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800505 EXPECT_EQ(state->image_size,
506 OmahaHashCalculator::RawHashOfFile(state->a_img,
507 state->image_size,
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700508 &install_plan.rootfs_hash));
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800509 EXPECT_TRUE(OmahaHashCalculator::RawHashOfData(state->old_kernel_data,
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700510 &install_plan.kernel_hash));
511
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800512 EXPECT_EQ(0, (*performer)->Open(state->a_img.c_str(), 0, 0));
513 EXPECT_TRUE((*performer)->OpenKernel(state->old_kernel.c_str()));
514
515 ActionExitCode expected_error, actual_error;
516 bool continue_writing;
517 switch(op_hash_test) {
518 case kInvalidOperationData: {
519 // Muck with some random offset post the metadata size so that
520 // some operation hash will result in a mismatch.
521 int some_offset = state->metadata_size + 300;
522 LOG(INFO) << "Tampered value at offset: " << some_offset;
523 state->delta[some_offset]++;
524 expected_error = kActionCodeDownloadOperationHashMismatch;
525 continue_writing = false;
526 break;
527 }
528
529 case kValidOperationData:
530 default:
531 // no change.
532 expected_error = kActionCodeSuccess;
533 continue_writing = true;
534 break;
535 }
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700536
537 // Write at some number of bytes per operation. Arbitrarily chose 5.
538 const size_t kBytesPerWrite = 5;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800539 for (size_t i = 0; i < state->delta.size(); i += kBytesPerWrite) {
540 size_t count = min(state->delta.size() - i, kBytesPerWrite);
541 bool write_succeeded = ((*performer)->Write(&state->delta[i],
542 count,
543 &actual_error));
544 // Normally write_succeeded should be true every time and
545 // actual_error should be kActionCodeSuccess. If so, continue the loop.
546 // But if we seeded an operation hash error above, then write_succeeded
547 // will be false. The failure may happen at any operation n. So, all
548 // Writes until n-1 should succeed and the nth operation will fail with
549 // actual_error. In this case, we should bail out of the loop because
550 // we cannot proceed applying the delta.
551 if (!write_succeeded) {
552 LOG(INFO) << "Write failed. Checking if it failed with expected error";
553 EXPECT_EQ(expected_error, actual_error);
554 if (!continue_writing) {
555 LOG(INFO) << "Cannot continue writing. Bailing out.";
556 break;
557 }
558 }
559
560 EXPECT_EQ(kActionCodeSuccess, actual_error);
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700561 }
562
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800563 // If we had continued all the way through, Close should succeed.
564 // Otherwise, it should fail. Check appropriately.
565 bool close_result = (*performer)->Close();
566 if (continue_writing)
567 EXPECT_EQ(0, close_result);
568 else
569 EXPECT_LE(0, close_result);
570}
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700571
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800572void VerifyPayloadResult(DeltaPerformer* performer,
573 DeltaState* state,
574 ActionExitCode expected_result) {
575 if (!performer) {
576 EXPECT_TRUE(!"Skipping payload verification since performer is NULL.");
577 return;
578 }
579
Jay Srinivasan2b5a0f02012-12-19 17:25:56 -0800580 int expected_times = (expected_result == kActionCodeSuccess) ? 1 : 0;
581 EXPECT_CALL(*(state->mock_system_state.mock_payload_state()),
582 DownloadComplete()).Times(expected_times);
583
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800584 LOG(INFO) << "Verifying payload for expected result "
585 << expected_result;
586 EXPECT_EQ(expected_result, performer->VerifyPayload(
587 OmahaHashCalculator::OmahaHashOfData(state->delta),
588 state->delta.size()));
589 LOG(INFO) << "Verified payload.";
590
591 if (expected_result != kActionCodeSuccess) {
592 // no need to verify new partition if VerifyPayload failed.
593 return;
594 }
595
596 CompareFilesByBlock(state->old_kernel, state->new_kernel);
597 CompareFilesByBlock(state->a_img, state->b_img);
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700598
599 vector<char> updated_kernel_partition;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800600 EXPECT_TRUE(utils::ReadFile(state->old_kernel, &updated_kernel_partition));
601 EXPECT_EQ(0, strncmp(&updated_kernel_partition[0], kNewDataString,
602 strlen(kNewDataString)));
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700603
604 uint64_t new_kernel_size;
605 vector<char> new_kernel_hash;
606 uint64_t new_rootfs_size;
607 vector<char> new_rootfs_hash;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800608 EXPECT_TRUE(performer->GetNewPartitionInfo(&new_kernel_size,
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700609 &new_kernel_hash,
610 &new_rootfs_size,
611 &new_rootfs_hash));
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800612 EXPECT_EQ(kDefaultKernelSize, new_kernel_size);
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700613 vector<char> expected_new_kernel_hash;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800614 EXPECT_TRUE(OmahaHashCalculator::RawHashOfData(state->new_kernel_data,
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700615 &expected_new_kernel_hash));
616 EXPECT_TRUE(expected_new_kernel_hash == new_kernel_hash);
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800617 EXPECT_EQ(state->image_size, new_rootfs_size);
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700618 vector<char> expected_new_rootfs_hash;
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800619 EXPECT_EQ(state->image_size,
620 OmahaHashCalculator::RawHashOfFile(state->b_img,
621 state->image_size,
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700622 &expected_new_rootfs_hash));
623 EXPECT_TRUE(expected_new_rootfs_hash == new_rootfs_hash);
624}
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800625
626void VerifyPayload(DeltaPerformer* performer,
627 DeltaState* state,
628 SignatureTest signature_test) {
629 ActionExitCode expected_result = kActionCodeSuccess;
630 switch (signature_test) {
631 case kSignatureNone:
632 expected_result = kActionCodeSignedDeltaPayloadExpectedError;
633 break;
634 case kSignatureGeneratedShellBadKey:
635 expected_result = kActionCodeDownloadPayloadPubKeyVerificationError;
636 break;
637 default: break; // appease gcc
638 }
639
640 VerifyPayloadResult(performer, state, expected_result);
641}
642
643void DoSmallImageTest(bool full_kernel, bool full_rootfs, bool noop,
644 SignatureTest signature_test,
645 bool hash_checks_mandatory) {
646 DeltaState state;
647 DeltaPerformer *performer;
648 GenerateDeltaFile(full_kernel, full_rootfs, noop, signature_test, &state);
649 ScopedPathUnlinker a_img_unlinker(state.a_img);
650 ScopedPathUnlinker b_img_unlinker(state.b_img);
651 ScopedPathUnlinker delta_unlinker(state.delta_path);
652 ScopedPathUnlinker old_kernel_unlinker(state.old_kernel);
653 ScopedPathUnlinker new_kernel_unlinker(state.new_kernel);
654 ApplyDeltaFile(full_kernel, full_rootfs, noop, signature_test,
655 &state, hash_checks_mandatory, kValidOperationData,
656 &performer);
657 VerifyPayload(performer, &state, signature_test);
658}
659
660// Calls delta performer's Write method by pretending to pass in bytes from a
661// delta file whose metadata size is actual_metadata_size and tests if all
662// checks are correctly performed if the install plan contains
663// expected_metadata_size and that the result of the parsing are as per
664// hash_checks_mandatory flag.
665void DoMetadataSizeTest(uint64_t expected_metadata_size,
666 uint64_t actual_metadata_size,
667 bool hash_checks_mandatory) {
668 PrefsMock prefs;
669 InstallPlan install_plan;
670 install_plan.hash_checks_mandatory = hash_checks_mandatory;
671 MockSystemState mock_system_state;
672 DeltaPerformer performer(&prefs, &mock_system_state, &install_plan);
673 EXPECT_EQ(0, performer.Open("/dev/null", 0, 0));
674 EXPECT_TRUE(performer.OpenKernel("/dev/null"));
675
676 // Set a valid magic string and version number 1.
677 EXPECT_TRUE(performer.Write("CrAU", 4));
678 uint64_t version = htobe64(1);
679 EXPECT_TRUE(performer.Write(&version, 8));
680
681 install_plan.metadata_size = expected_metadata_size;
682 ActionExitCode error_code;
683 // When filling in size in manifest, exclude the size of the 20-byte header.
684 uint64_t size_in_manifest = htobe64(actual_metadata_size - 20);
685 bool result = performer.Write(&size_in_manifest, 8, &error_code);
686 if (expected_metadata_size == actual_metadata_size ||
687 !hash_checks_mandatory) {
688 EXPECT_TRUE(result);
689 } else {
690 EXPECT_FALSE(result);
691 EXPECT_EQ(kActionCodeDownloadInvalidMetadataSize, error_code);
692 }
693
694 EXPECT_LT(performer.Close(), 0);
695}
696
697// Generates a valid delta file but tests the delta performer by suppling
698// different metadata signatures as per omaha_metadata_signature flag and
699// sees if the result of the parsing are as per hash_checks_mandatory flag.
700void DoMetadataSignatureTest(MetadataSignatureTest metadata_signature_test,
701 SignatureTest signature_test,
702 bool hash_checks_mandatory) {
703 DeltaState state;
704
705 // Using kSignatureNone since it doesn't affect the results of our test.
706 // If we've to use other signature options, then we'd have to get the
707 // metadata size again after adding the signing operation to the manifest.
708 GenerateDeltaFile(true, true, false, signature_test, &state);
709
710 ScopedPathUnlinker a_img_unlinker(state.a_img);
711 ScopedPathUnlinker b_img_unlinker(state.b_img);
712 ScopedPathUnlinker delta_unlinker(state.delta_path);
713 ScopedPathUnlinker old_kernel_unlinker(state.old_kernel);
714 ScopedPathUnlinker new_kernel_unlinker(state.new_kernel);
715
716 // Loads the payload and parses the manifest.
717 vector<char> payload;
718 EXPECT_TRUE(utils::ReadFile(state.delta_path, &payload));
719 LOG(INFO) << "Payload size: " << payload.size();
720
721 InstallPlan install_plan;
722 install_plan.hash_checks_mandatory = hash_checks_mandatory;
723 install_plan.metadata_size = state.metadata_size;
724
725 DeltaPerformer::MetadataParseResult expected_result, actual_result;
726 ActionExitCode expected_error, actual_error;
727
728 // Fill up the metadata signature in install plan according to the test.
729 switch (metadata_signature_test) {
730 case kEmptyMetadataSignature:
731 install_plan.metadata_signature.clear();
732 expected_result = DeltaPerformer::kMetadataParseError;
733 expected_error = kActionCodeDownloadMetadataSignatureMissingError;
734 break;
735
736 case kInvalidMetadataSignature:
737 install_plan.metadata_signature = kBogusMetadataSignature1;
738 expected_result = DeltaPerformer::kMetadataParseError;
739 expected_error = kActionCodeDownloadMetadataSignatureMismatch;
740 break;
741
742 case kValidMetadataSignature:
743 default:
744 // Set the install plan's metadata size to be the same as the one
745 // in the manifest so that we pass the metadata size checks. Only
746 // then we can get to manifest signature checks.
747 ASSERT_TRUE(PayloadSigner::GetMetadataSignature(
748 &payload[0],
749 state.metadata_size,
750 kUnittestPrivateKeyPath,
751 &install_plan.metadata_signature));
752 EXPECT_FALSE(install_plan.metadata_signature.empty());
753 expected_result = DeltaPerformer::kMetadataParseSuccess;
754 expected_error = kActionCodeSuccess;
755 break;
756 }
757
758 // Ignore the expected result/error if hash checks are not mandatory.
759 if (!hash_checks_mandatory) {
760 expected_result = DeltaPerformer::kMetadataParseSuccess;
761 expected_error = kActionCodeSuccess;
762 }
763
764 // Create the delta performer object.
765 PrefsMock prefs;
Jay Srinivasan2b5a0f02012-12-19 17:25:56 -0800766 DeltaPerformer delta_performer(&prefs,
767 &state.mock_system_state,
768 &install_plan);
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800769
770 // Use the public key corresponding to the private key used above to
771 // sign the metadata.
772 EXPECT_TRUE(utils::FileExists(kUnittestPublicKeyPath));
773 delta_performer.set_public_key_path(kUnittestPublicKeyPath);
774
775 // Parse the delta payload we created.
776 DeltaArchiveManifest manifest;
777 uint64_t parsed_metadata_size;
778
779 // Init actual_error with an invalid value so that we make sure
780 // ParsePayloadMetadata properly populates it in all cases.
781 actual_error = kActionCodeUmaReportedMax;
782 actual_result = delta_performer.ParsePayloadMetadata(payload, &manifest,
783 &parsed_metadata_size, &actual_error);
784
785 EXPECT_EQ(expected_result, actual_result);
786 EXPECT_EQ(expected_error, actual_error);
787
788 // Check that the parsed metadata size is what's expected. This test
789 // implicitly confirms that the metadata signature is valid, if required.
790 EXPECT_EQ(state.metadata_size, parsed_metadata_size);
791}
792
793void DoOperationHashMismatchTest(OperationHashTest op_hash_test,
794 bool hash_checks_mandatory) {
795 DeltaState state;
796 GenerateDeltaFile(true, true, false, kSignatureGenerated, &state);
797 ScopedPathUnlinker a_img_unlinker(state.a_img);
798 ScopedPathUnlinker b_img_unlinker(state.b_img);
799 ScopedPathUnlinker delta_unlinker(state.delta_path);
800 ScopedPathUnlinker old_kernel_unlinker(state.old_kernel);
801 ScopedPathUnlinker new_kernel_unlinker(state.new_kernel);
802 DeltaPerformer *performer;
803 ApplyDeltaFile(true, true, false, kSignatureGenerated,
804 &state, hash_checks_mandatory, op_hash_test, &performer);
805}
806
807class DeltaPerformerTest : public ::testing::Test { };
808
809TEST(DeltaPerformerTest, ExtentsToByteStringTest) {
810 uint64_t test[] = {1, 1, 4, 2, kSparseHole, 1, 0, 1};
811 COMPILE_ASSERT(arraysize(test) % 2 == 0, array_size_uneven);
812 const uint64_t block_size = 4096;
813 const uint64_t file_length = 5 * block_size - 13;
814
815 google::protobuf::RepeatedPtrField<Extent> extents;
816 for (size_t i = 0; i < arraysize(test); i += 2) {
817 Extent* extent = extents.Add();
818 extent->set_start_block(test[i]);
819 extent->set_num_blocks(test[i + 1]);
820 }
821
822 string expected_output = "4096:4096,16384:8192,-1:4096,0:4083";
823 string actual_output;
824 EXPECT_TRUE(DeltaPerformer::ExtentsToBsdiffPositionsString(extents,
825 block_size,
826 file_length,
827 &actual_output));
828 EXPECT_EQ(expected_output, actual_output);
829}
Darin Petkov68c10d12010-10-14 09:24:37 -0700830
831TEST(DeltaPerformerTest, RunAsRootSmallImageTest) {
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800832 bool hash_checks_mandatory = false;
833 DoSmallImageTest(false, false, false, kSignatureGenerator,
834 hash_checks_mandatory);
Darin Petkov68c10d12010-10-14 09:24:37 -0700835}
836
837TEST(DeltaPerformerTest, RunAsRootFullKernelSmallImageTest) {
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800838 bool hash_checks_mandatory = false;
839 DoSmallImageTest(true, false, false, kSignatureGenerator,
840 hash_checks_mandatory);
Darin Petkov7a22d792010-11-08 14:10:00 -0800841}
842
843TEST(DeltaPerformerTest, RunAsRootFullSmallImageTest) {
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800844 bool hash_checks_mandatory = true;
845 DoSmallImageTest(true, true, false, kSignatureGenerator,
846 hash_checks_mandatory);
Darin Petkov9fa7ec52010-10-18 11:45:23 -0700847}
848
849TEST(DeltaPerformerTest, RunAsRootNoopSmallImageTest) {
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800850 bool hash_checks_mandatory = false;
851 DoSmallImageTest(false, false, true, kSignatureGenerator,
852 hash_checks_mandatory);
Darin Petkov9574f7e2011-01-13 10:48:12 -0800853}
854
Darin Petkovcbfb0172011-01-14 15:24:45 -0800855TEST(DeltaPerformerTest, RunAsRootSmallImageSignNoneTest) {
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800856 bool hash_checks_mandatory = false;
857 DoSmallImageTest(false, false, false, kSignatureNone,
858 hash_checks_mandatory);
Darin Petkovcbfb0172011-01-14 15:24:45 -0800859}
860
861TEST(DeltaPerformerTest, RunAsRootSmallImageSignGeneratedTest) {
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800862 bool hash_checks_mandatory = true;
863 DoSmallImageTest(false, false, false, kSignatureGenerated,
864 hash_checks_mandatory);
Darin Petkovcbfb0172011-01-14 15:24:45 -0800865}
866
867TEST(DeltaPerformerTest, RunAsRootSmallImageSignGeneratedShellTest) {
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800868 bool hash_checks_mandatory = false;
869 DoSmallImageTest(false, false, false, kSignatureGeneratedShell,
870 hash_checks_mandatory);
Andrew de los Reyes27f7d372010-10-07 11:26:07 -0700871}
872
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800873TEST(DeltaPerformerTest, RunAsRootSmallImageSignGeneratedShellBadKeyTest) {
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800874 bool hash_checks_mandatory = false;
875 DoSmallImageTest(false, false, false, kSignatureGeneratedShellBadKey,
876 hash_checks_mandatory);
Darin Petkov52dcaeb2011-01-14 15:33:06 -0800877}
878
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -0700879TEST(DeltaPerformerTest, RunAsRootSmallImageSignGeneratedShellRotateCl1Test) {
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800880 bool hash_checks_mandatory = false;
881 DoSmallImageTest(false, false, false, kSignatureGeneratedShellRotateCl1,
882 hash_checks_mandatory);
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -0700883}
884
885TEST(DeltaPerformerTest, RunAsRootSmallImageSignGeneratedShellRotateCl2Test) {
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800886 bool hash_checks_mandatory = false;
887 DoSmallImageTest(false, false, false, kSignatureGeneratedShellRotateCl2,
888 hash_checks_mandatory);
Andrew de los Reyesc24e3f32011-08-30 15:45:20 -0700889}
890
Darin Petkov934bb412010-11-18 11:21:35 -0800891TEST(DeltaPerformerTest, BadDeltaMagicTest) {
892 PrefsMock prefs;
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700893 InstallPlan install_plan;
Jay Srinivasanf0572052012-10-23 18:12:56 -0700894 MockSystemState mock_system_state;
895 DeltaPerformer performer(&prefs, &mock_system_state, &install_plan);
Darin Petkov934bb412010-11-18 11:21:35 -0800896 EXPECT_EQ(0, performer.Open("/dev/null", 0, 0));
897 EXPECT_TRUE(performer.OpenKernel("/dev/null"));
Don Garrette410e0f2011-11-10 15:39:01 -0800898 EXPECT_TRUE(performer.Write("junk", 4));
899 EXPECT_TRUE(performer.Write("morejunk", 8));
900 EXPECT_FALSE(performer.Write("morejunk", 8));
Darin Petkov934bb412010-11-18 11:21:35 -0800901 EXPECT_LT(performer.Close(), 0);
902}
903
Andrew de los Reyes353777c2010-10-08 10:34:30 -0700904TEST(DeltaPerformerTest, IsIdempotentOperationTest) {
905 DeltaArchiveManifest_InstallOperation op;
906 EXPECT_TRUE(DeltaPerformer::IsIdempotentOperation(op));
907 *(op.add_dst_extents()) = ExtentForRange(0, 5);
908 EXPECT_TRUE(DeltaPerformer::IsIdempotentOperation(op));
909 *(op.add_src_extents()) = ExtentForRange(4, 1);
910 EXPECT_FALSE(DeltaPerformer::IsIdempotentOperation(op));
911 op.clear_src_extents();
912 *(op.add_src_extents()) = ExtentForRange(5, 3);
913 EXPECT_TRUE(DeltaPerformer::IsIdempotentOperation(op));
914 *(op.add_dst_extents()) = ExtentForRange(20, 6);
915 EXPECT_TRUE(DeltaPerformer::IsIdempotentOperation(op));
916 *(op.add_src_extents()) = ExtentForRange(19, 2);
917 EXPECT_FALSE(DeltaPerformer::IsIdempotentOperation(op));
918}
919
Jay Srinivasan2b5a0f02012-12-19 17:25:56 -0800920TEST(DeltaPerformerTest, WriteUpdatesPayloadState) {
921 PrefsMock prefs;
922 InstallPlan install_plan;
923 MockSystemState mock_system_state;
924 DeltaPerformer performer(&prefs, &mock_system_state, &install_plan);
925 EXPECT_EQ(0, performer.Open("/dev/null", 0, 0));
926 EXPECT_TRUE(performer.OpenKernel("/dev/null"));
927
928 EXPECT_CALL(*(mock_system_state.mock_payload_state()),
929 DownloadProgress(4)).Times(1);
930 EXPECT_CALL(*(mock_system_state.mock_payload_state()),
931 DownloadProgress(8)).Times(2);
932
933 EXPECT_TRUE(performer.Write("junk", 4));
934 EXPECT_TRUE(performer.Write("morejunk", 8));
935 EXPECT_FALSE(performer.Write("morejunk", 8));
936 EXPECT_LT(performer.Close(), 0);
937}
938
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800939TEST(DeltaPerformerTest, MissingMandatoryMetadataSizeTest) {
940 DoMetadataSizeTest(0, 75456, true);
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700941}
942
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800943TEST(DeltaPerformerTest, MissingNonMandatoryMetadataSizeTest) {
944 DoMetadataSizeTest(0, 123456, false);
945}
946
947TEST(DeltaPerformerTest, InvalidMandatoryMetadataSizeTest) {
948 DoMetadataSizeTest(13000, 140000, true);
949}
950
951TEST(DeltaPerformerTest, InvalidNonMandatoryMetadataSizeTest) {
952 DoMetadataSizeTest(40000, 50000, false);
953}
954
955TEST(DeltaPerformerTest, ValidMandatoryMetadataSizeTest) {
956 DoMetadataSizeTest(85376, 85376, true);
957}
958
959TEST(DeltaPerformerTest, RunAsRootMandatoryEmptyMetadataSignatureTest) {
960 DoMetadataSignatureTest(kEmptyMetadataSignature, kSignatureGenerated, true);
961}
962
963TEST(DeltaPerformerTest, RunAsRootNonMandatoryEmptyMetadataSignatureTest) {
964 DoMetadataSignatureTest(kEmptyMetadataSignature, kSignatureGenerated, false);
965}
966
967TEST(DeltaPerformerTest, RunAsRootMandatoryInvalidMetadataSignatureTest) {
968 DoMetadataSignatureTest(kInvalidMetadataSignature, kSignatureGenerated, true);
969}
970
971TEST(DeltaPerformerTest, RunAsRootNonMandatoryInvalidMetadataSignatureTest) {
972 DoMetadataSignatureTest(kInvalidMetadataSignature, kSignatureGenerated,
973 false);
974}
975
976TEST(DeltaPerformerTest, RunAsRootMandatoryValidMetadataSignature1Test) {
977 DoMetadataSignatureTest(kValidMetadataSignature, kSignatureNone, true);
978}
979
980TEST(DeltaPerformerTest, RunAsRootMandatoryValidMetadataSignature2Test) {
981 DoMetadataSignatureTest(kValidMetadataSignature, kSignatureGenerated, true);
982}
983
984TEST(DeltaPerformerTest, RunAsRootNonMandatoryValidMetadataSignatureTest) {
985 DoMetadataSignatureTest(kValidMetadataSignature, kSignatureGenerated, false);
986}
987
988TEST(DeltaPerformerTest, RunAsRootMandatoryOperationHashMismatchTest) {
989 DoOperationHashMismatchTest(kInvalidOperationData, true);
990}
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700991
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700992} // namespace chromeos_update_engine