blob: 0248c22a9d33d700cbe0d98299cd8d8fda8ffa9e [file] [log] [blame]
// Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include <glib.h>
#include <stdint.h>
#include <string>
#include <vector>
#include <base/strings/string_util.h>
#include <base/strings/stringprintf.h>
#include <base/time/time.h>
#include <chromeos/dbus/service_constants.h>
#include "gtest/gtest.h"
#include "update_engine/action_pipe.h"
#include "update_engine/constants.h"
#include "update_engine/mock_connection_manager.h"
#include "update_engine/mock_http_fetcher.h"
#include "update_engine/omaha_hash_calculator.h"
#include "update_engine/omaha_request_action.h"
#include "update_engine/omaha_request_params.h"
#include "update_engine/prefs.h"
#include "update_engine/test_utils.h"
#include "update_engine/utils.h"
using base::Time;
using base::TimeDelta;
using std::string;
using std::vector;
using testing::_;
using testing::AllOf;
using testing::DoAll;
using testing::Ge;
using testing::Le;
using testing::NiceMock;
using testing::Return;
using testing::SetArgumentPointee;
using testing::AnyNumber;
namespace chromeos_update_engine {
class OmahaRequestActionTest : public ::testing::Test {};
namespace {
FakeSystemState fake_system_state;
OmahaRequestParams kDefaultTestParams(
&fake_system_state,
OmahaRequestParams::kOsPlatform,
OmahaRequestParams::kOsVersion,
"service_pack",
"x86-generic",
OmahaRequestParams::kAppId,
"0.1.0.0",
"en-US",
"unittest",
"OEM MODEL 09235 7471",
"ChromeOSFirmware.1.0",
"0X0A1",
false, // delta okay
false, // interactive
"http://url",
"", // target_version_prefix
false, // use_p2p_for_downloading
false); // use_p2p_for_sharing
string GetNoUpdateResponse(const string& app_id) {
return string(
"<?xml version=\"1.0\" encoding=\"UTF-8\"?><response protocol=\"3.0\">"
"<daystart elapsed_seconds=\"100\"/>"
"<app appid=\"") + app_id + "\" status=\"ok\"><ping "
"status=\"ok\"/><updatecheck status=\"noupdate\"/></app></response>";
}
string GetNoUpdateResponseWithEntity(const string& app_id) {
return string(
"<?xml version=\"1.0\" encoding=\"UTF-8\"?>"
"<!DOCTYPE response ["
"<!ENTITY CrOS \"ChromeOS\">"
"]>"
"<response protocol=\"3.0\">"
"<daystart elapsed_seconds=\"100\"/>"
"<app appid=\"") + app_id + "\" status=\"ok\"><ping "
"status=\"ok\"/><updatecheck status=\"noupdate\"/></app></response>";
}
string GetUpdateResponse2(const string& app_id,
const string& version,
const string& more_info_url,
const string& prompt,
const string& codebase,
const string& filename,
const string& hash,
const string& needsadmin,
const string& size,
const string& deadline,
const string& max_days_to_scatter,
const string& elapsed_days,
bool disable_p2p_for_downloading,
bool disable_p2p_for_sharing) {
string response =
"<?xml version=\"1.0\" encoding=\"UTF-8\"?><response "
"protocol=\"3.0\">"
"<daystart elapsed_seconds=\"100\"" +
(elapsed_days.empty() ? "" : (" elapsed_days=\"" + elapsed_days + "\"")) +
"/>"
"<app appid=\"" + app_id + "\" status=\"ok\">"
"<ping status=\"ok\"/><updatecheck status=\"ok\">"
"<urls><url codebase=\"" + codebase + "\"/></urls>"
"<manifest version=\"" + version + "\">"
"<packages><package hash=\"not-used\" name=\"" + filename + "\" "
"size=\"" + size + "\"/></packages>"
"<actions><action event=\"postinstall\" "
"ChromeOSVersion=\"" + version + "\" "
"MoreInfo=\"" + more_info_url + "\" Prompt=\"" + prompt + "\" "
"IsDelta=\"true\" "
"IsDeltaPayload=\"true\" "
"MaxDaysToScatter=\"" + max_days_to_scatter + "\" "
"sha256=\"" + hash + "\" "
"needsadmin=\"" + needsadmin + "\" " +
(deadline.empty() ? "" : ("deadline=\"" + deadline + "\" ")) +
(disable_p2p_for_downloading ?
"DisableP2PForDownloading=\"true\" " : "") +
(disable_p2p_for_sharing ? "DisableP2PForSharing=\"true\" " : "") +
"/></actions></manifest></updatecheck></app></response>";
LOG(INFO) << "Response = " << response;
return response;
}
string GetUpdateResponse(const string& app_id,
const string& version,
const string& more_info_url,
const string& prompt,
const string& codebase,
const string& filename,
const string& hash,
const string& needsadmin,
const string& size,
const string& deadline) {
return GetUpdateResponse2(app_id,
version,
more_info_url,
prompt,
codebase,
filename,
hash,
needsadmin,
size,
deadline,
"7",
"42", // elapsed_days
false, // disable_p2p_for_downloading
false); // disable_p2p_for sharing
}
class OmahaRequestActionTestProcessorDelegate : public ActionProcessorDelegate {
public:
OmahaRequestActionTestProcessorDelegate()
: loop_(nullptr),
expected_code_(ErrorCode::kSuccess) {}
virtual ~OmahaRequestActionTestProcessorDelegate() {
}
virtual void ProcessingDone(const ActionProcessor* processor,
ErrorCode code) {
ASSERT_TRUE(loop_);
g_main_loop_quit(loop_);
}
virtual void ActionCompleted(ActionProcessor* processor,
AbstractAction* action,
ErrorCode code) {
// make sure actions always succeed
if (action->Type() == OmahaRequestAction::StaticType())
EXPECT_EQ(expected_code_, code);
else
EXPECT_EQ(ErrorCode::kSuccess, code);
}
GMainLoop *loop_;
ErrorCode expected_code_;
};
gboolean StartProcessorInRunLoop(gpointer data) {
ActionProcessor *processor = reinterpret_cast<ActionProcessor*>(data);
processor->StartProcessing();
return FALSE;
}
} // namespace
class OutputObjectCollectorAction;
template<>
class ActionTraits<OutputObjectCollectorAction> {
public:
// Does not take an object for input
typedef OmahaResponse InputObjectType;
// On success, puts the output path on output
typedef NoneType OutputObjectType;
};
class OutputObjectCollectorAction : public Action<OutputObjectCollectorAction> {
public:
OutputObjectCollectorAction() : has_input_object_(false) {}
void PerformAction() {
// copy input object
has_input_object_ = HasInputObject();
if (has_input_object_)
omaha_response_ = GetInputObject();
processor_->ActionComplete(this, ErrorCode::kSuccess);
}
// Should never be called
void TerminateProcessing() {
CHECK(false);
}
// Debugging/logging
static std::string StaticType() {
return "OutputObjectCollectorAction";
}
std::string Type() const { return StaticType(); }
bool has_input_object_;
OmahaResponse omaha_response_;
};
// Returns true iff an output response was obtained from the
// OmahaRequestAction. |prefs| may be null, in which case a local PrefsMock
// is used. |payload_state| may be null, in which case a local mock is used.
// |p2p_manager| may be null, in which case a local mock is used.
// |connection_manager| may be null, in which case a local mock is used.
// out_response may be null. If |fail_http_response_code| is non-negative,
// the transfer will fail with that code. |ping_only| is passed through to the
// OmahaRequestAction constructor. out_post_data may be null; if non-null, the
// post-data received by the mock HttpFetcher is returned.
//
// The |expected_check_result|, |expected_check_reaction| and
// |expected_error_code| parameters are for checking expectations
// about reporting UpdateEngine.Check.{Result,Reaction,DownloadError}
// UMA statistics. Use the appropriate ::kUnset value to specify that
// the given metric should not be reported.
bool TestUpdateCheck(PrefsInterface* prefs,
PayloadStateInterface *payload_state,
P2PManager *p2p_manager,
ConnectionManager *connection_manager,
OmahaRequestParams* params,
const string& http_response,
int fail_http_response_code,
bool ping_only,
ErrorCode expected_code,
metrics::CheckResult expected_check_result,
metrics::CheckReaction expected_check_reaction,
metrics::DownloadErrorCode expected_download_error_code,
OmahaResponse* out_response,
vector<char>* out_post_data) {
GMainLoop* loop = g_main_loop_new(g_main_context_default(), FALSE);
MockHttpFetcher* fetcher = new MockHttpFetcher(http_response.data(),
http_response.size(),
nullptr);
if (fail_http_response_code >= 0) {
fetcher->FailTransfer(fail_http_response_code);
}
FakeSystemState fake_system_state;
if (prefs)
fake_system_state.set_prefs(prefs);
if (payload_state)
fake_system_state.set_payload_state(payload_state);
if (p2p_manager)
fake_system_state.set_p2p_manager(p2p_manager);
if (connection_manager)
fake_system_state.set_connection_manager(connection_manager);
fake_system_state.set_request_params(params);
OmahaRequestAction action(&fake_system_state,
nullptr,
fetcher,
ping_only);
OmahaRequestActionTestProcessorDelegate delegate;
delegate.loop_ = loop;
delegate.expected_code_ = expected_code;
ActionProcessor processor;
processor.set_delegate(&delegate);
processor.EnqueueAction(&action);
OutputObjectCollectorAction collector_action;
BondActions(&action, &collector_action);
processor.EnqueueAction(&collector_action);
EXPECT_CALL(*fake_system_state.mock_metrics_lib(), SendEnumToUMA(_, _, _))
.Times(AnyNumber());
EXPECT_CALL(*fake_system_state.mock_metrics_lib(),
SendEnumToUMA(metrics::kMetricCheckResult,
static_cast<int>(expected_check_result),
static_cast<int>(metrics::CheckResult::kNumConstants) - 1))
.Times(expected_check_result == metrics::CheckResult::kUnset ? 0 : 1);
EXPECT_CALL(*fake_system_state.mock_metrics_lib(),
SendEnumToUMA(metrics::kMetricCheckReaction,
static_cast<int>(expected_check_reaction),
static_cast<int>(metrics::CheckReaction::kNumConstants) - 1))
.Times(expected_check_reaction == metrics::CheckReaction::kUnset ? 0 : 1);
EXPECT_CALL(*fake_system_state.mock_metrics_lib(),
SendSparseToUMA(metrics::kMetricCheckDownloadErrorCode,
static_cast<int>(expected_download_error_code)))
.Times(expected_download_error_code == metrics::DownloadErrorCode::kUnset
? 0 : 1);
g_timeout_add(0, &StartProcessorInRunLoop, &processor);
g_main_loop_run(loop);
g_main_loop_unref(loop);
if (collector_action.has_input_object_ && out_response)
*out_response = collector_action.omaha_response_;
if (out_post_data)
*out_post_data = fetcher->post_data();
return collector_action.has_input_object_;
}
// Tests Event requests -- they should always succeed. |out_post_data|
// may be null; if non-null, the post-data received by the mock
// HttpFetcher is returned.
void TestEvent(OmahaRequestParams params,
OmahaEvent* event,
const string& http_response,
vector<char>* out_post_data) {
GMainLoop* loop = g_main_loop_new(g_main_context_default(), FALSE);
MockHttpFetcher* fetcher = new MockHttpFetcher(http_response.data(),
http_response.size(),
nullptr);
FakeSystemState fake_system_state;
fake_system_state.set_request_params(&params);
OmahaRequestAction action(&fake_system_state, event, fetcher, false);
OmahaRequestActionTestProcessorDelegate delegate;
delegate.loop_ = loop;
ActionProcessor processor;
processor.set_delegate(&delegate);
processor.EnqueueAction(&action);
g_timeout_add(0, &StartProcessorInRunLoop, &processor);
g_main_loop_run(loop);
g_main_loop_unref(loop);
if (out_post_data)
*out_post_data = fetcher->post_data();
}
TEST(OmahaRequestActionTest, RejectEntities) {
OmahaResponse response;
ASSERT_FALSE(
TestUpdateCheck(nullptr, // prefs
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&kDefaultTestParams,
GetNoUpdateResponseWithEntity(OmahaRequestParams::kAppId),
-1,
false, // ping_only
ErrorCode::kOmahaRequestXMLHasEntityDecl,
metrics::CheckResult::kParsingError,
metrics::CheckReaction::kUnset,
metrics::DownloadErrorCode::kUnset,
&response,
nullptr));
EXPECT_FALSE(response.update_exists);
}
TEST(OmahaRequestActionTest, NoUpdateTest) {
OmahaResponse response;
ASSERT_TRUE(
TestUpdateCheck(nullptr, // prefs
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&kDefaultTestParams,
GetNoUpdateResponse(OmahaRequestParams::kAppId),
-1,
false, // ping_only
ErrorCode::kSuccess,
metrics::CheckResult::kNoUpdateAvailable,
metrics::CheckReaction::kUnset,
metrics::DownloadErrorCode::kUnset,
&response,
nullptr));
EXPECT_FALSE(response.update_exists);
}
TEST(OmahaRequestActionTest, ValidUpdateTest) {
OmahaResponse response;
ASSERT_TRUE(
TestUpdateCheck(nullptr, // prefs
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&kDefaultTestParams,
GetUpdateResponse(OmahaRequestParams::kAppId,
"1.2.3.4", // version
"http://more/info",
"true", // prompt
"http://code/base/", // dl url
"file.signed", // file name
"HASH1234=", // checksum
"false", // needs admin
"123", // size
"20101020"), // deadline
-1,
false, // ping_only
ErrorCode::kSuccess,
metrics::CheckResult::kUpdateAvailable,
metrics::CheckReaction::kUpdating,
metrics::DownloadErrorCode::kUnset,
&response,
nullptr));
EXPECT_TRUE(response.update_exists);
EXPECT_TRUE(response.update_exists);
EXPECT_EQ("1.2.3.4", response.version);
EXPECT_EQ("http://code/base/file.signed", response.payload_urls[0]);
EXPECT_EQ("http://more/info", response.more_info_url);
EXPECT_EQ("HASH1234=", response.hash);
EXPECT_EQ(123, response.size);
EXPECT_TRUE(response.prompt);
EXPECT_EQ("20101020", response.deadline);
}
TEST(OmahaRequestActionTest, ValidUpdateBlockedByConnection) {
OmahaResponse response;
// Set up a connection manager that doesn't allow a valid update over
// the current ethernet connection.
MockConnectionManager mock_cm(nullptr);
EXPECT_CALL(mock_cm, GetConnectionProperties(_, _, _))
.WillRepeatedly(DoAll(SetArgumentPointee<1>(kNetEthernet),
SetArgumentPointee<2>(NetworkTethering::kUnknown),
Return(true)));
EXPECT_CALL(mock_cm, IsUpdateAllowedOver(kNetEthernet, _))
.WillRepeatedly(Return(false));
EXPECT_CALL(mock_cm, StringForConnectionType(kNetEthernet))
.WillRepeatedly(Return(shill::kTypeEthernet));
ASSERT_FALSE(
TestUpdateCheck(nullptr, // prefs
nullptr, // payload_state
nullptr, // p2p_manager
&mock_cm, // connection_manager
&kDefaultTestParams,
GetUpdateResponse(OmahaRequestParams::kAppId,
"1.2.3.4", // version
"http://more/info",
"true", // prompt
"http://code/base/", // dl url
"file.signed", // file name
"HASH1234=", // checksum
"false", // needs admin
"123", // size
""), // deadline
-1,
false, // ping_only
ErrorCode::kOmahaUpdateIgnoredPerPolicy,
metrics::CheckResult::kUpdateAvailable,
metrics::CheckReaction::kIgnored,
metrics::DownloadErrorCode::kUnset,
&response,
nullptr));
EXPECT_FALSE(response.update_exists);
}
TEST(OmahaRequestActionTest, ValidUpdateBlockedByRollback) {
string rollback_version = "1234.0.0";
OmahaResponse response;
MockPayloadState mock_payload_state;
EXPECT_CALL(mock_payload_state, GetRollbackVersion())
.WillRepeatedly(Return(rollback_version));
ASSERT_FALSE(
TestUpdateCheck(nullptr, // prefs
&mock_payload_state, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&kDefaultTestParams,
GetUpdateResponse(OmahaRequestParams::kAppId,
rollback_version, // version
"http://more/info",
"true", // prompt
"http://code/base/", // dl url
"file.signed", // file name
"HASH1234=", // checksum
"false", // needs admin
"123", // size
""), // deadline
-1,
false, // ping_only
ErrorCode::kOmahaUpdateIgnoredPerPolicy,
metrics::CheckResult::kUpdateAvailable,
metrics::CheckReaction::kIgnored,
metrics::DownloadErrorCode::kUnset,
&response,
nullptr));
EXPECT_FALSE(response.update_exists);
}
TEST(OmahaRequestActionTest, WallClockBasedWaitAloneCausesScattering) {
OmahaResponse response;
OmahaRequestParams params = kDefaultTestParams;
params.set_wall_clock_based_wait_enabled(true);
params.set_update_check_count_wait_enabled(false);
params.set_waiting_period(TimeDelta::FromDays(2));
string prefs_dir;
EXPECT_TRUE(utils::MakeTempDirectory("ue_ut_prefs.XXXXXX",
&prefs_dir));
ScopedDirRemover temp_dir_remover(prefs_dir);
Prefs prefs;
LOG_IF(ERROR, !prefs.Init(base::FilePath(prefs_dir)))
<< "Failed to initialize preferences.";
ASSERT_FALSE(
TestUpdateCheck(&prefs, // prefs
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&params,
GetUpdateResponse2(OmahaRequestParams::kAppId,
"1.2.3.4", // version
"http://more/info",
"true", // prompt
"http://code/base/", // dl url
"file.signed", // file name
"HASH1234=", // checksum
"false", // needs admin
"123", // size
"", // deadline
"7", // max days to scatter
"42", // elapsed_days
false, // disable_p2p_for_downloading
false), // disable_p2p_for sharing
-1,
false, // ping_only
ErrorCode::kOmahaUpdateDeferredPerPolicy,
metrics::CheckResult::kUpdateAvailable,
metrics::CheckReaction::kDeferring,
metrics::DownloadErrorCode::kUnset,
&response,
nullptr));
EXPECT_FALSE(response.update_exists);
// Verify if we are interactive check we don't defer.
params.set_interactive(true);
ASSERT_TRUE(
TestUpdateCheck(&prefs, // prefs
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&params,
GetUpdateResponse2(OmahaRequestParams::kAppId,
"1.2.3.4", // version
"http://more/info",
"true", // prompt
"http://code/base/", // dl url
"file.signed", // file name
"HASH1234=", // checksum
"false", // needs admin
"123", // size
"", // deadline
"7", // max days to scatter
"42", // elapsed_days
false, // disable_p2p_for_downloading
false), // disable_p2p_for sharing
-1,
false, // ping_only
ErrorCode::kSuccess,
metrics::CheckResult::kUpdateAvailable,
metrics::CheckReaction::kUpdating,
metrics::DownloadErrorCode::kUnset,
&response,
nullptr));
EXPECT_TRUE(response.update_exists);
}
TEST(OmahaRequestActionTest, NoWallClockBasedWaitCausesNoScattering) {
OmahaResponse response;
OmahaRequestParams params = kDefaultTestParams;
params.set_wall_clock_based_wait_enabled(false);
params.set_waiting_period(TimeDelta::FromDays(2));
params.set_update_check_count_wait_enabled(true);
params.set_min_update_checks_needed(1);
params.set_max_update_checks_allowed(8);
string prefs_dir;
EXPECT_TRUE(utils::MakeTempDirectory("ue_ut_prefs.XXXXXX",
&prefs_dir));
ScopedDirRemover temp_dir_remover(prefs_dir);
Prefs prefs;
LOG_IF(ERROR, !prefs.Init(base::FilePath(prefs_dir)))
<< "Failed to initialize preferences.";
ASSERT_TRUE(
TestUpdateCheck(&prefs, // prefs
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&params,
GetUpdateResponse2(OmahaRequestParams::kAppId,
"1.2.3.4", // version
"http://more/info",
"true", // prompt
"http://code/base/", // dl url
"file.signed", // file name
"HASH1234=", // checksum
"false", // needs admin
"123", // size
"", // deadline
"7", // max days to scatter
"42", // elapsed_days
false, // disable_p2p_for_downloading
false), // disable_p2p_for sharing
-1,
false, // ping_only
ErrorCode::kSuccess,
metrics::CheckResult::kUpdateAvailable,
metrics::CheckReaction::kUpdating,
metrics::DownloadErrorCode::kUnset,
&response,
nullptr));
EXPECT_TRUE(response.update_exists);
}
TEST(OmahaRequestActionTest, ZeroMaxDaysToScatterCausesNoScattering) {
OmahaResponse response;
OmahaRequestParams params = kDefaultTestParams;
params.set_wall_clock_based_wait_enabled(true);
params.set_waiting_period(TimeDelta::FromDays(2));
params.set_update_check_count_wait_enabled(true);
params.set_min_update_checks_needed(1);
params.set_max_update_checks_allowed(8);
string prefs_dir;
EXPECT_TRUE(utils::MakeTempDirectory("ue_ut_prefs.XXXXXX",
&prefs_dir));
ScopedDirRemover temp_dir_remover(prefs_dir);
Prefs prefs;
LOG_IF(ERROR, !prefs.Init(base::FilePath(prefs_dir)))
<< "Failed to initialize preferences.";
ASSERT_TRUE(
TestUpdateCheck(&prefs, // prefs
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&params,
GetUpdateResponse2(OmahaRequestParams::kAppId,
"1.2.3.4", // version
"http://more/info",
"true", // prompt
"http://code/base/", // dl url
"file.signed", // file name
"HASH1234=", // checksum
"false", // needs admin
"123", // size
"", // deadline
"0", // max days to scatter
"42", // elapsed_days
false, // disable_p2p_for_downloading
false), // disable_p2p_for sharing
-1,
false, // ping_only
ErrorCode::kSuccess,
metrics::CheckResult::kUpdateAvailable,
metrics::CheckReaction::kUpdating,
metrics::DownloadErrorCode::kUnset,
&response,
nullptr));
EXPECT_TRUE(response.update_exists);
}
TEST(OmahaRequestActionTest, ZeroUpdateCheckCountCausesNoScattering) {
OmahaResponse response;
OmahaRequestParams params = kDefaultTestParams;
params.set_wall_clock_based_wait_enabled(true);
params.set_waiting_period(TimeDelta());
params.set_update_check_count_wait_enabled(true);
params.set_min_update_checks_needed(0);
params.set_max_update_checks_allowed(0);
string prefs_dir;
EXPECT_TRUE(utils::MakeTempDirectory("ue_ut_prefs.XXXXXX",
&prefs_dir));
ScopedDirRemover temp_dir_remover(prefs_dir);
Prefs prefs;
LOG_IF(ERROR, !prefs.Init(base::FilePath(prefs_dir)))
<< "Failed to initialize preferences.";
ASSERT_TRUE(TestUpdateCheck(
&prefs, // prefs
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&params,
GetUpdateResponse2(OmahaRequestParams::kAppId,
"1.2.3.4", // version
"http://more/info",
"true", // prompt
"http://code/base/", // dl url
"file.signed", // file name
"HASH1234=", // checksum
"false", // needs admin
"123", // size
"", // deadline
"7", // max days to scatter
"42", // elapsed_days
false, // disable_p2p_for_downloading
false), // disable_p2p_for sharing
-1,
false, // ping_only
ErrorCode::kSuccess,
metrics::CheckResult::kUpdateAvailable,
metrics::CheckReaction::kUpdating,
metrics::DownloadErrorCode::kUnset,
&response,
nullptr));
int64_t count;
ASSERT_TRUE(prefs.GetInt64(kPrefsUpdateCheckCount, &count));
ASSERT_EQ(count, 0);
EXPECT_TRUE(response.update_exists);
}
TEST(OmahaRequestActionTest, NonZeroUpdateCheckCountCausesScattering) {
OmahaResponse response;
OmahaRequestParams params = kDefaultTestParams;
params.set_wall_clock_based_wait_enabled(true);
params.set_waiting_period(TimeDelta());
params.set_update_check_count_wait_enabled(true);
params.set_min_update_checks_needed(1);
params.set_max_update_checks_allowed(8);
string prefs_dir;
EXPECT_TRUE(utils::MakeTempDirectory("ue_ut_prefs.XXXXXX",
&prefs_dir));
ScopedDirRemover temp_dir_remover(prefs_dir);
Prefs prefs;
LOG_IF(ERROR, !prefs.Init(base::FilePath(prefs_dir)))
<< "Failed to initialize preferences.";
ASSERT_FALSE(TestUpdateCheck(
&prefs, // prefs
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&params,
GetUpdateResponse2(OmahaRequestParams::kAppId,
"1.2.3.4", // version
"http://more/info",
"true", // prompt
"http://code/base/", // dl url
"file.signed", // file name
"HASH1234=", // checksum
"false", // needs admin
"123", // size
"", // deadline
"7", // max days to scatter
"42", // elapsed_days
false, // disable_p2p_for_downloading
false), // disable_p2p_for sharing
-1,
false, // ping_only
ErrorCode::kOmahaUpdateDeferredPerPolicy,
metrics::CheckResult::kUpdateAvailable,
metrics::CheckReaction::kDeferring,
metrics::DownloadErrorCode::kUnset,
&response,
nullptr));
int64_t count;
ASSERT_TRUE(prefs.GetInt64(kPrefsUpdateCheckCount, &count));
ASSERT_GT(count, 0);
EXPECT_FALSE(response.update_exists);
// Verify if we are interactive check we don't defer.
params.set_interactive(true);
ASSERT_TRUE(
TestUpdateCheck(&prefs, // prefs
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&params,
GetUpdateResponse2(OmahaRequestParams::kAppId,
"1.2.3.4", // version
"http://more/info",
"true", // prompt
"http://code/base/", // dl url
"file.signed", // file name
"HASH1234=", // checksum
"false", // needs admin
"123", // size
"", // deadline
"7", // max days to scatter
"42", // elapsed_days
false, // disable_p2p_for_downloading
false), // disable_p2p_for sharing
-1,
false, // ping_only
ErrorCode::kSuccess,
metrics::CheckResult::kUpdateAvailable,
metrics::CheckReaction::kUpdating,
metrics::DownloadErrorCode::kUnset,
&response,
nullptr));
EXPECT_TRUE(response.update_exists);
}
TEST(OmahaRequestActionTest, ExistingUpdateCheckCountCausesScattering) {
OmahaResponse response;
OmahaRequestParams params = kDefaultTestParams;
params.set_wall_clock_based_wait_enabled(true);
params.set_waiting_period(TimeDelta());
params.set_update_check_count_wait_enabled(true);
params.set_min_update_checks_needed(1);
params.set_max_update_checks_allowed(8);
string prefs_dir;
EXPECT_TRUE(utils::MakeTempDirectory("ue_ut_prefs.XXXXXX",
&prefs_dir));
ScopedDirRemover temp_dir_remover(prefs_dir);
Prefs prefs;
LOG_IF(ERROR, !prefs.Init(base::FilePath(prefs_dir)))
<< "Failed to initialize preferences.";
ASSERT_TRUE(prefs.SetInt64(kPrefsUpdateCheckCount, 5));
ASSERT_FALSE(TestUpdateCheck(
&prefs, // prefs
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&params,
GetUpdateResponse2(OmahaRequestParams::kAppId,
"1.2.3.4", // version
"http://more/info",
"true", // prompt
"http://code/base/", // dl url
"file.signed", // file name
"HASH1234=", // checksum
"false", // needs admin
"123", // size
"", // deadline
"7", // max days to scatter
"42", // elapsed_days
false, // disable_p2p_for_downloading
false), // disable_p2p_for sharing
-1,
false, // ping_only
ErrorCode::kOmahaUpdateDeferredPerPolicy,
metrics::CheckResult::kUpdateAvailable,
metrics::CheckReaction::kDeferring,
metrics::DownloadErrorCode::kUnset,
&response,
nullptr));
int64_t count;
ASSERT_TRUE(prefs.GetInt64(kPrefsUpdateCheckCount, &count));
// count remains the same, as the decrementing happens in update_attempter
// which this test doesn't exercise.
ASSERT_EQ(count, 5);
EXPECT_FALSE(response.update_exists);
// Verify if we are interactive check we don't defer.
params.set_interactive(true);
ASSERT_TRUE(
TestUpdateCheck(&prefs, // prefs
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&params,
GetUpdateResponse2(OmahaRequestParams::kAppId,
"1.2.3.4", // version
"http://more/info",
"true", // prompt
"http://code/base/", // dl url
"file.signed", // file name
"HASH1234=", // checksum
"false", // needs admin
"123", // size
"", // deadline
"7", // max days to scatter
"42", // elapsed_days
false, // disable_p2p_for_downloading
false), // disable_p2p_for sharing
-1,
false, // ping_only
ErrorCode::kSuccess,
metrics::CheckResult::kUpdateAvailable,
metrics::CheckReaction::kUpdating,
metrics::DownloadErrorCode::kUnset,
&response,
nullptr));
EXPECT_TRUE(response.update_exists);
}
TEST(OmahaRequestActionTest, NoOutputPipeTest) {
const string http_response(GetNoUpdateResponse(OmahaRequestParams::kAppId));
GMainLoop *loop = g_main_loop_new(g_main_context_default(), FALSE);
FakeSystemState fake_system_state;
OmahaRequestParams params = kDefaultTestParams;
fake_system_state.set_request_params(&params);
OmahaRequestAction action(&fake_system_state, nullptr,
new MockHttpFetcher(http_response.data(),
http_response.size(),
nullptr),
false);
OmahaRequestActionTestProcessorDelegate delegate;
delegate.loop_ = loop;
ActionProcessor processor;
processor.set_delegate(&delegate);
processor.EnqueueAction(&action);
g_timeout_add(0, &StartProcessorInRunLoop, &processor);
g_main_loop_run(loop);
g_main_loop_unref(loop);
EXPECT_FALSE(processor.IsRunning());
}
TEST(OmahaRequestActionTest, InvalidXmlTest) {
OmahaResponse response;
ASSERT_FALSE(
TestUpdateCheck(nullptr, // prefs
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&kDefaultTestParams,
"invalid xml>",
-1,
false, // ping_only
ErrorCode::kOmahaRequestXMLParseError,
metrics::CheckResult::kParsingError,
metrics::CheckReaction::kUnset,
metrics::DownloadErrorCode::kUnset,
&response,
nullptr));
EXPECT_FALSE(response.update_exists);
}
TEST(OmahaRequestActionTest, EmptyResponseTest) {
OmahaResponse response;
ASSERT_FALSE(
TestUpdateCheck(nullptr, // prefs
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&kDefaultTestParams,
"",
-1,
false, // ping_only
ErrorCode::kOmahaRequestEmptyResponseError,
metrics::CheckResult::kParsingError,
metrics::CheckReaction::kUnset,
metrics::DownloadErrorCode::kUnset,
&response,
nullptr));
EXPECT_FALSE(response.update_exists);
}
TEST(OmahaRequestActionTest, MissingStatusTest) {
OmahaResponse response;
ASSERT_FALSE(TestUpdateCheck(
nullptr, // prefs
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&kDefaultTestParams,
"<?xml version=\"1.0\" encoding=\"UTF-8\"?><response protocol=\"3.0\">"
"<daystart elapsed_seconds=\"100\"/>"
"<app appid=\"foo\" status=\"ok\">"
"<ping status=\"ok\"/>"
"<updatecheck/></app></response>",
-1,
false, // ping_only
ErrorCode::kOmahaResponseInvalid,
metrics::CheckResult::kParsingError,
metrics::CheckReaction::kUnset,
metrics::DownloadErrorCode::kUnset,
&response,
nullptr));
EXPECT_FALSE(response.update_exists);
}
TEST(OmahaRequestActionTest, InvalidStatusTest) {
OmahaResponse response;
ASSERT_FALSE(TestUpdateCheck(
nullptr, // prefs
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&kDefaultTestParams,
"<?xml version=\"1.0\" encoding=\"UTF-8\"?><response protocol=\"3.0\">"
"<daystart elapsed_seconds=\"100\"/>"
"<app appid=\"foo\" status=\"ok\">"
"<ping status=\"ok\"/>"
"<updatecheck status=\"InvalidStatusTest\"/></app></response>",
-1,
false, // ping_only
ErrorCode::kOmahaResponseInvalid,
metrics::CheckResult::kParsingError,
metrics::CheckReaction::kUnset,
metrics::DownloadErrorCode::kUnset,
&response,
nullptr));
EXPECT_FALSE(response.update_exists);
}
TEST(OmahaRequestActionTest, MissingNodesetTest) {
OmahaResponse response;
ASSERT_FALSE(TestUpdateCheck(
nullptr, // prefs
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&kDefaultTestParams,
"<?xml version=\"1.0\" encoding=\"UTF-8\"?><response protocol=\"3.0\">"
"<daystart elapsed_seconds=\"100\"/>"
"<app appid=\"foo\" status=\"ok\">"
"<ping status=\"ok\"/>"
"</app></response>",
-1,
false, // ping_only
ErrorCode::kOmahaResponseInvalid,
metrics::CheckResult::kParsingError,
metrics::CheckReaction::kUnset,
metrics::DownloadErrorCode::kUnset,
&response,
nullptr));
EXPECT_FALSE(response.update_exists);
}
TEST(OmahaRequestActionTest, MissingFieldTest) {
string input_response =
"<?xml version=\"1.0\" encoding=\"UTF-8\"?><response protocol=\"3.0\">"
"<daystart elapsed_seconds=\"100\"/>"
"<app appid=\"xyz\" status=\"ok\">"
"<updatecheck status=\"ok\">"
"<urls><url codebase=\"http://missing/field/test/\"/></urls>"
"<manifest version=\"10.2.3.4\">"
"<packages><package hash=\"not-used\" name=\"f\" "
"size=\"587\"/></packages>"
"<actions><action event=\"postinstall\" "
"ChromeOSVersion=\"10.2.3.4\" "
"Prompt=\"false\" "
"IsDelta=\"true\" "
"IsDeltaPayload=\"false\" "
"sha256=\"lkq34j5345\" "
"needsadmin=\"true\" "
"/></actions></manifest></updatecheck></app></response>";
LOG(INFO) << "Input Response = " << input_response;
OmahaResponse response;
ASSERT_TRUE(TestUpdateCheck(nullptr, // prefs
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&kDefaultTestParams,
input_response,
-1,
false, // ping_only
ErrorCode::kSuccess,
metrics::CheckResult::kUpdateAvailable,
metrics::CheckReaction::kUpdating,
metrics::DownloadErrorCode::kUnset,
&response,
nullptr));
EXPECT_TRUE(response.update_exists);
EXPECT_EQ("10.2.3.4", response.version);
EXPECT_EQ("http://missing/field/test/f", response.payload_urls[0]);
EXPECT_EQ("", response.more_info_url);
EXPECT_EQ("lkq34j5345", response.hash);
EXPECT_EQ(587, response.size);
EXPECT_FALSE(response.prompt);
EXPECT_TRUE(response.deadline.empty());
}
namespace {
class TerminateEarlyTestProcessorDelegate : public ActionProcessorDelegate {
public:
void ProcessingStopped(const ActionProcessor* processor) {
ASSERT_TRUE(loop_);
g_main_loop_quit(loop_);
}
GMainLoop *loop_;
};
gboolean TerminateTransferTestStarter(gpointer data) {
ActionProcessor *processor = reinterpret_cast<ActionProcessor*>(data);
processor->StartProcessing();
CHECK(processor->IsRunning());
processor->StopProcessing();
return FALSE;
}
} // namespace
TEST(OmahaRequestActionTest, TerminateTransferTest) {
string http_response("doesn't matter");
GMainLoop *loop = g_main_loop_new(g_main_context_default(), FALSE);
FakeSystemState fake_system_state;
OmahaRequestParams params = kDefaultTestParams;
fake_system_state.set_request_params(&params);
OmahaRequestAction action(&fake_system_state, nullptr,
new MockHttpFetcher(http_response.data(),
http_response.size(),
nullptr),
false);
TerminateEarlyTestProcessorDelegate delegate;
delegate.loop_ = loop;
ActionProcessor processor;
processor.set_delegate(&delegate);
processor.EnqueueAction(&action);
g_timeout_add(0, &TerminateTransferTestStarter, &processor);
g_main_loop_run(loop);
g_main_loop_unref(loop);
}
TEST(OmahaRequestActionTest, XmlEncodeTest) {
EXPECT_EQ("ab", XmlEncode("ab"));
EXPECT_EQ("a&lt;b", XmlEncode("a<b"));
EXPECT_EQ("&lt;&amp;&gt;", XmlEncode("<&>"));
EXPECT_EQ("&amp;lt;&amp;amp;&amp;gt;", XmlEncode("&lt;&amp;&gt;"));
vector<char> post_data;
// Make sure XML Encode is being called on the params
FakeSystemState fake_system_state;
OmahaRequestParams params(&fake_system_state,
OmahaRequestParams::kOsPlatform,
OmahaRequestParams::kOsVersion,
"testtheservice_pack>",
"x86 generic<id",
OmahaRequestParams::kAppId,
"0.1.0.0",
"en-US",
"unittest_track&lt;",
"<OEM MODEL>",
"ChromeOSFirmware.1.0",
"EC100",
false, // delta okay
false, // interactive
"http://url",
"", // target_version_prefix
false, // use_p2p_for_downloading
false); // use_p2p_for_sharing
OmahaResponse response;
ASSERT_FALSE(
TestUpdateCheck(nullptr, // prefs
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&params,
"invalid xml>",
-1,
false, // ping_only
ErrorCode::kOmahaRequestXMLParseError,
metrics::CheckResult::kParsingError,
metrics::CheckReaction::kUnset,
metrics::DownloadErrorCode::kUnset,
&response,
&post_data));
// convert post_data to string
string post_str(&post_data[0], post_data.size());
EXPECT_NE(post_str.find("testtheservice_pack&gt;"), string::npos);
EXPECT_EQ(post_str.find("testtheservice_pack>"), string::npos);
EXPECT_NE(post_str.find("x86 generic&lt;id"), string::npos);
EXPECT_EQ(post_str.find("x86 generic<id"), string::npos);
EXPECT_NE(post_str.find("unittest_track&amp;lt;"), string::npos);
EXPECT_EQ(post_str.find("unittest_track&lt;"), string::npos);
EXPECT_NE(post_str.find("&lt;OEM MODEL&gt;"), string::npos);
EXPECT_EQ(post_str.find("<OEM MODEL>"), string::npos);
}
TEST(OmahaRequestActionTest, XmlDecodeTest) {
OmahaResponse response;
ASSERT_TRUE(
TestUpdateCheck(nullptr, // prefs
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&kDefaultTestParams,
GetUpdateResponse(OmahaRequestParams::kAppId,
"1.2.3.4", // version
"testthe&lt;url", // more info
"true", // prompt
"testthe&amp;codebase/", // dl url
"file.signed", // file name
"HASH1234=", // checksum
"false", // needs admin
"123", // size
"&lt;20110101"), // deadline
-1,
false, // ping_only
ErrorCode::kSuccess,
metrics::CheckResult::kUpdateAvailable,
metrics::CheckReaction::kUpdating,
metrics::DownloadErrorCode::kUnset,
&response,
nullptr));
EXPECT_EQ(response.more_info_url, "testthe<url");
EXPECT_EQ(response.payload_urls[0], "testthe&codebase/file.signed");
EXPECT_EQ(response.deadline, "<20110101");
}
TEST(OmahaRequestActionTest, ParseIntTest) {
OmahaResponse response;
ASSERT_TRUE(
TestUpdateCheck(nullptr, // prefs
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&kDefaultTestParams,
GetUpdateResponse(OmahaRequestParams::kAppId,
"1.2.3.4", // version
"theurl", // more info
"true", // prompt
"thecodebase/", // dl url
"file.signed", // file name
"HASH1234=", // checksum
"false", // needs admin
// overflows int32_t:
"123123123123123", // size
"deadline"),
-1,
false, // ping_only
ErrorCode::kSuccess,
metrics::CheckResult::kUpdateAvailable,
metrics::CheckReaction::kUpdating,
metrics::DownloadErrorCode::kUnset,
&response,
nullptr));
EXPECT_EQ(response.size, 123123123123123ll);
}
TEST(OmahaRequestActionTest, FormatUpdateCheckOutputTest) {
vector<char> post_data;
NiceMock<PrefsMock> prefs;
EXPECT_CALL(prefs, GetString(kPrefsPreviousVersion, _))
.WillOnce(DoAll(SetArgumentPointee<1>(string("")), Return(true)));
EXPECT_CALL(prefs, SetString(kPrefsPreviousVersion, _)).Times(1);
ASSERT_FALSE(TestUpdateCheck(&prefs,
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&kDefaultTestParams,
"invalid xml>",
-1,
false, // ping_only
ErrorCode::kOmahaRequestXMLParseError,
metrics::CheckResult::kParsingError,
metrics::CheckReaction::kUnset,
metrics::DownloadErrorCode::kUnset,
nullptr, // response
&post_data));
// convert post_data to string
string post_str(&post_data[0], post_data.size());
EXPECT_NE(post_str.find(
" <ping active=\"1\" a=\"-1\" r=\"-1\"></ping>\n"
" <updatecheck targetversionprefix=\"\"></updatecheck>\n"),
string::npos);
EXPECT_NE(post_str.find("hardware_class=\"OEM MODEL 09235 7471\""),
string::npos);
EXPECT_NE(post_str.find("fw_version=\"ChromeOSFirmware.1.0\""),
string::npos);
EXPECT_NE(post_str.find("ec_version=\"0X0A1\""),
string::npos);
}
TEST(OmahaRequestActionTest, FormatSuccessEventOutputTest) {
vector<char> post_data;
TestEvent(kDefaultTestParams,
new OmahaEvent(OmahaEvent::kTypeUpdateDownloadStarted),
"invalid xml>",
&post_data);
// convert post_data to string
string post_str(&post_data[0], post_data.size());
string expected_event = base::StringPrintf(
" <event eventtype=\"%d\" eventresult=\"%d\"></event>\n",
OmahaEvent::kTypeUpdateDownloadStarted,
OmahaEvent::kResultSuccess);
EXPECT_NE(post_str.find(expected_event), string::npos);
EXPECT_EQ(post_str.find("ping"), string::npos);
EXPECT_EQ(post_str.find("updatecheck"), string::npos);
}
TEST(OmahaRequestActionTest, FormatErrorEventOutputTest) {
vector<char> post_data;
TestEvent(kDefaultTestParams,
new OmahaEvent(OmahaEvent::kTypeDownloadComplete,
OmahaEvent::kResultError,
ErrorCode::kError),
"invalid xml>",
&post_data);
// convert post_data to string
string post_str(&post_data[0], post_data.size());
string expected_event = base::StringPrintf(
" <event eventtype=\"%d\" eventresult=\"%d\" "
"errorcode=\"%d\"></event>\n",
OmahaEvent::kTypeDownloadComplete,
OmahaEvent::kResultError,
static_cast<int>(ErrorCode::kError));
EXPECT_NE(post_str.find(expected_event), string::npos);
EXPECT_EQ(post_str.find("updatecheck"), string::npos);
}
TEST(OmahaRequestActionTest, IsEventTest) {
string http_response("doesn't matter");
FakeSystemState fake_system_state;
OmahaRequestParams params = kDefaultTestParams;
fake_system_state.set_request_params(&params);
OmahaRequestAction update_check_action(
&fake_system_state,
nullptr,
new MockHttpFetcher(http_response.data(),
http_response.size(),
nullptr),
false);
EXPECT_FALSE(update_check_action.IsEvent());
params = kDefaultTestParams;
fake_system_state.set_request_params(&params);
OmahaRequestAction event_action(
&fake_system_state,
new OmahaEvent(OmahaEvent::kTypeUpdateComplete),
new MockHttpFetcher(http_response.data(),
http_response.size(),
nullptr),
false);
EXPECT_TRUE(event_action.IsEvent());
}
TEST(OmahaRequestActionTest, FormatDeltaOkayOutputTest) {
for (int i = 0; i < 2; i++) {
bool delta_okay = i == 1;
const char* delta_okay_str = delta_okay ? "true" : "false";
vector<char> post_data;
FakeSystemState fake_system_state;
OmahaRequestParams params(&fake_system_state,
OmahaRequestParams::kOsPlatform,
OmahaRequestParams::kOsVersion,
"service_pack",
"x86-generic",
OmahaRequestParams::kAppId,
"0.1.0.0",
"en-US",
"unittest_track",
"OEM MODEL REV 1234",
"ChromeOSFirmware.1.0",
"EC100",
delta_okay,
false, // interactive
"http://url",
"", // target_version_prefix
false, // use_p2p_for_downloading
false); // use_p2p_for_sharing
ASSERT_FALSE(TestUpdateCheck(nullptr, // prefs
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&params,
"invalid xml>",
-1,
false, // ping_only
ErrorCode::kOmahaRequestXMLParseError,
metrics::CheckResult::kParsingError,
metrics::CheckReaction::kUnset,
metrics::DownloadErrorCode::kUnset,
nullptr,
&post_data));
// convert post_data to string
string post_str(post_data.data(), post_data.size());
EXPECT_NE(post_str.find(base::StringPrintf(" delta_okay=\"%s\"",
delta_okay_str)),
string::npos)
<< "i = " << i;
}
}
TEST(OmahaRequestActionTest, FormatInteractiveOutputTest) {
for (int i = 0; i < 2; i++) {
bool interactive = i == 1;
const char* interactive_str = interactive ? "ondemandupdate" : "scheduler";
vector<char> post_data;
FakeSystemState fake_system_state;
OmahaRequestParams params(&fake_system_state,
OmahaRequestParams::kOsPlatform,
OmahaRequestParams::kOsVersion,
"service_pack",
"x86-generic",
OmahaRequestParams::kAppId,
"0.1.0.0",
"en-US",
"unittest_track",
"OEM MODEL REV 1234",
"ChromeOSFirmware.1.0",
"EC100",
true, // delta_okay
interactive,
"http://url",
"", // target_version_prefix
false, // use_p2p_for_downloading
false); // use_p2p_for_sharing
ASSERT_FALSE(TestUpdateCheck(nullptr, // prefs
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&params,
"invalid xml>",
-1,
false, // ping_only
ErrorCode::kOmahaRequestXMLParseError,
metrics::CheckResult::kParsingError,
metrics::CheckReaction::kUnset,
metrics::DownloadErrorCode::kUnset,
nullptr,
&post_data));
// convert post_data to string
string post_str(&post_data[0], post_data.size());
EXPECT_NE(post_str.find(base::StringPrintf("installsource=\"%s\"",
interactive_str)),
string::npos)
<< "i = " << i;
}
}
TEST(OmahaRequestActionTest, OmahaEventTest) {
OmahaEvent default_event;
EXPECT_EQ(OmahaEvent::kTypeUnknown, default_event.type);
EXPECT_EQ(OmahaEvent::kResultError, default_event.result);
EXPECT_EQ(ErrorCode::kError, default_event.error_code);
OmahaEvent success_event(OmahaEvent::kTypeUpdateDownloadStarted);
EXPECT_EQ(OmahaEvent::kTypeUpdateDownloadStarted, success_event.type);
EXPECT_EQ(OmahaEvent::kResultSuccess, success_event.result);
EXPECT_EQ(ErrorCode::kSuccess, success_event.error_code);
OmahaEvent error_event(OmahaEvent::kTypeUpdateDownloadFinished,
OmahaEvent::kResultError,
ErrorCode::kError);
EXPECT_EQ(OmahaEvent::kTypeUpdateDownloadFinished, error_event.type);
EXPECT_EQ(OmahaEvent::kResultError, error_event.result);
EXPECT_EQ(ErrorCode::kError, error_event.error_code);
}
TEST(OmahaRequestActionTest, PingTest) {
for (int ping_only = 0; ping_only < 2; ping_only++) {
NiceMock<PrefsMock> prefs;
EXPECT_CALL(prefs, GetInt64(kPrefsMetricsCheckLastReportingTime, _))
.Times(AnyNumber());
EXPECT_CALL(prefs, SetInt64(_, _)).Times(AnyNumber());
// Add a few hours to the day difference to test no rounding, etc.
int64_t five_days_ago =
(Time::Now() - TimeDelta::FromHours(5 * 24 + 13)).ToInternalValue();
int64_t six_days_ago =
(Time::Now() - TimeDelta::FromHours(6 * 24 + 11)).ToInternalValue();
EXPECT_CALL(prefs, GetInt64(kPrefsInstallDateDays, _))
.WillOnce(DoAll(SetArgumentPointee<1>(0), Return(true)));
EXPECT_CALL(prefs, GetInt64(kPrefsLastActivePingDay, _))
.WillOnce(DoAll(SetArgumentPointee<1>(six_days_ago), Return(true)));
EXPECT_CALL(prefs, GetInt64(kPrefsLastRollCallPingDay, _))
.WillOnce(DoAll(SetArgumentPointee<1>(five_days_ago), Return(true)));
vector<char> post_data;
ASSERT_TRUE(
TestUpdateCheck(&prefs,
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&kDefaultTestParams,
GetNoUpdateResponse(OmahaRequestParams::kAppId),
-1,
ping_only,
ErrorCode::kSuccess,
metrics::CheckResult::kUnset,
metrics::CheckReaction::kUnset,
metrics::DownloadErrorCode::kUnset,
nullptr,
&post_data));
string post_str(&post_data[0], post_data.size());
EXPECT_NE(post_str.find("<ping active=\"1\" a=\"6\" r=\"5\"></ping>"),
string::npos);
if (ping_only) {
EXPECT_EQ(post_str.find("updatecheck"), string::npos);
EXPECT_EQ(post_str.find("previousversion"), string::npos);
} else {
EXPECT_NE(post_str.find("updatecheck"), string::npos);
EXPECT_NE(post_str.find("previousversion"), string::npos);
}
}
}
TEST(OmahaRequestActionTest, ActivePingTest) {
NiceMock<PrefsMock> prefs;
EXPECT_CALL(prefs, GetInt64(kPrefsMetricsCheckLastReportingTime, _))
.Times(AnyNumber());
EXPECT_CALL(prefs, SetInt64(_, _)).Times(AnyNumber());
int64_t three_days_ago =
(Time::Now() - TimeDelta::FromHours(3 * 24 + 12)).ToInternalValue();
int64_t now = Time::Now().ToInternalValue();
EXPECT_CALL(prefs, GetInt64(kPrefsInstallDateDays, _))
.WillOnce(DoAll(SetArgumentPointee<1>(0), Return(true)));
EXPECT_CALL(prefs, GetInt64(kPrefsLastActivePingDay, _))
.WillOnce(DoAll(SetArgumentPointee<1>(three_days_ago), Return(true)));
EXPECT_CALL(prefs, GetInt64(kPrefsLastRollCallPingDay, _))
.WillOnce(DoAll(SetArgumentPointee<1>(now), Return(true)));
vector<char> post_data;
ASSERT_TRUE(
TestUpdateCheck(&prefs,
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&kDefaultTestParams,
GetNoUpdateResponse(OmahaRequestParams::kAppId),
-1,
false, // ping_only
ErrorCode::kSuccess,
metrics::CheckResult::kNoUpdateAvailable,
metrics::CheckReaction::kUnset,
metrics::DownloadErrorCode::kUnset,
nullptr,
&post_data));
string post_str(&post_data[0], post_data.size());
EXPECT_NE(post_str.find("<ping active=\"1\" a=\"3\"></ping>"),
string::npos);
}
TEST(OmahaRequestActionTest, RollCallPingTest) {
NiceMock<PrefsMock> prefs;
EXPECT_CALL(prefs, GetInt64(kPrefsMetricsCheckLastReportingTime, _))
.Times(AnyNumber());
EXPECT_CALL(prefs, SetInt64(_, _)).Times(AnyNumber());
int64_t four_days_ago =
(Time::Now() - TimeDelta::FromHours(4 * 24)).ToInternalValue();
int64_t now = Time::Now().ToInternalValue();
EXPECT_CALL(prefs, GetInt64(kPrefsInstallDateDays, _))
.WillOnce(DoAll(SetArgumentPointee<1>(0), Return(true)));
EXPECT_CALL(prefs, GetInt64(kPrefsLastActivePingDay, _))
.WillOnce(DoAll(SetArgumentPointee<1>(now), Return(true)));
EXPECT_CALL(prefs, GetInt64(kPrefsLastRollCallPingDay, _))
.WillOnce(DoAll(SetArgumentPointee<1>(four_days_ago), Return(true)));
vector<char> post_data;
ASSERT_TRUE(
TestUpdateCheck(&prefs,
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&kDefaultTestParams,
GetNoUpdateResponse(OmahaRequestParams::kAppId),
-1,
false, // ping_only
ErrorCode::kSuccess,
metrics::CheckResult::kNoUpdateAvailable,
metrics::CheckReaction::kUnset,
metrics::DownloadErrorCode::kUnset,
nullptr,
&post_data));
string post_str(&post_data[0], post_data.size());
EXPECT_NE(post_str.find("<ping active=\"1\" r=\"4\"></ping>\n"),
string::npos);
}
TEST(OmahaRequestActionTest, NoPingTest) {
NiceMock<PrefsMock> prefs;
EXPECT_CALL(prefs, GetInt64(kPrefsMetricsCheckLastReportingTime, _))
.Times(AnyNumber());
EXPECT_CALL(prefs, SetInt64(_, _)).Times(AnyNumber());
int64_t one_hour_ago =
(Time::Now() - TimeDelta::FromHours(1)).ToInternalValue();
EXPECT_CALL(prefs, GetInt64(kPrefsInstallDateDays, _))
.WillOnce(DoAll(SetArgumentPointee<1>(0), Return(true)));
EXPECT_CALL(prefs, GetInt64(kPrefsLastActivePingDay, _))
.WillOnce(DoAll(SetArgumentPointee<1>(one_hour_ago), Return(true)));
EXPECT_CALL(prefs, GetInt64(kPrefsLastRollCallPingDay, _))
.WillOnce(DoAll(SetArgumentPointee<1>(one_hour_ago), Return(true)));
EXPECT_CALL(prefs, SetInt64(kPrefsLastActivePingDay, _)).Times(0);
EXPECT_CALL(prefs, SetInt64(kPrefsLastRollCallPingDay, _)).Times(0);
vector<char> post_data;
ASSERT_TRUE(
TestUpdateCheck(&prefs,
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&kDefaultTestParams,
GetNoUpdateResponse(OmahaRequestParams::kAppId),
-1,
false, // ping_only
ErrorCode::kSuccess,
metrics::CheckResult::kNoUpdateAvailable,
metrics::CheckReaction::kUnset,
metrics::DownloadErrorCode::kUnset,
nullptr,
&post_data));
string post_str(&post_data[0], post_data.size());
EXPECT_EQ(post_str.find("ping"), string::npos);
}
TEST(OmahaRequestActionTest, IgnoreEmptyPingTest) {
// This test ensures that we ignore empty ping only requests.
NiceMock<PrefsMock> prefs;
int64_t now = Time::Now().ToInternalValue();
EXPECT_CALL(prefs, GetInt64(kPrefsLastActivePingDay, _))
.WillOnce(DoAll(SetArgumentPointee<1>(now), Return(true)));
EXPECT_CALL(prefs, GetInt64(kPrefsLastRollCallPingDay, _))
.WillOnce(DoAll(SetArgumentPointee<1>(now), Return(true)));
EXPECT_CALL(prefs, SetInt64(kPrefsLastActivePingDay, _)).Times(0);
EXPECT_CALL(prefs, SetInt64(kPrefsLastRollCallPingDay, _)).Times(0);
vector<char> post_data;
EXPECT_TRUE(
TestUpdateCheck(&prefs,
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&kDefaultTestParams,
GetNoUpdateResponse(OmahaRequestParams::kAppId),
-1,
true, // ping_only
ErrorCode::kSuccess,
metrics::CheckResult::kUnset,
metrics::CheckReaction::kUnset,
metrics::DownloadErrorCode::kUnset,
nullptr,
&post_data));
EXPECT_EQ(post_data.size(), 0);
}
TEST(OmahaRequestActionTest, BackInTimePingTest) {
NiceMock<PrefsMock> prefs;
EXPECT_CALL(prefs, GetInt64(kPrefsMetricsCheckLastReportingTime, _))
.Times(AnyNumber());
EXPECT_CALL(prefs, SetInt64(_, _)).Times(AnyNumber());
int64_t future =
(Time::Now() + TimeDelta::FromHours(3 * 24 + 4)).ToInternalValue();
EXPECT_CALL(prefs, GetInt64(kPrefsInstallDateDays, _))
.WillOnce(DoAll(SetArgumentPointee<1>(0), Return(true)));
EXPECT_CALL(prefs, GetInt64(kPrefsLastActivePingDay, _))
.WillOnce(DoAll(SetArgumentPointee<1>(future), Return(true)));
EXPECT_CALL(prefs, GetInt64(kPrefsLastRollCallPingDay, _))
.WillOnce(DoAll(SetArgumentPointee<1>(future), Return(true)));
EXPECT_CALL(prefs, SetInt64(kPrefsLastActivePingDay, _))
.WillOnce(Return(true));
EXPECT_CALL(prefs, SetInt64(kPrefsLastRollCallPingDay, _))
.WillOnce(Return(true));
vector<char> post_data;
ASSERT_TRUE(
TestUpdateCheck(&prefs,
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&kDefaultTestParams,
"<?xml version=\"1.0\" encoding=\"UTF-8\"?><response "
"protocol=\"3.0\"><daystart elapsed_seconds=\"100\"/>"
"<app appid=\"foo\" status=\"ok\"><ping status=\"ok\"/>"
"<updatecheck status=\"noupdate\"/></app></response>",
-1,
false, // ping_only
ErrorCode::kSuccess,
metrics::CheckResult::kNoUpdateAvailable,
metrics::CheckReaction::kUnset,
metrics::DownloadErrorCode::kUnset,
nullptr,
&post_data));
string post_str(&post_data[0], post_data.size());
EXPECT_EQ(post_str.find("ping"), string::npos);
}
TEST(OmahaRequestActionTest, LastPingDayUpdateTest) {
// This test checks that the action updates the last ping day to now
// minus 200 seconds with a slack of 5 seconds. Therefore, the test
// may fail if it runs for longer than 5 seconds. It shouldn't run
// that long though.
int64_t midnight =
(Time::Now() - TimeDelta::FromSeconds(200)).ToInternalValue();
int64_t midnight_slack =
(Time::Now() - TimeDelta::FromSeconds(195)).ToInternalValue();
NiceMock<PrefsMock> prefs;
EXPECT_CALL(prefs, GetInt64(_, _)).Times(AnyNumber());
EXPECT_CALL(prefs, SetInt64(_, _)).Times(AnyNumber());
EXPECT_CALL(prefs, SetInt64(kPrefsLastActivePingDay,
AllOf(Ge(midnight), Le(midnight_slack))))
.WillOnce(Return(true));
EXPECT_CALL(prefs, SetInt64(kPrefsLastRollCallPingDay,
AllOf(Ge(midnight), Le(midnight_slack))))
.WillOnce(Return(true));
ASSERT_TRUE(
TestUpdateCheck(&prefs,
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&kDefaultTestParams,
"<?xml version=\"1.0\" encoding=\"UTF-8\"?><response "
"protocol=\"3.0\"><daystart elapsed_seconds=\"200\"/>"
"<app appid=\"foo\" status=\"ok\"><ping status=\"ok\"/>"
"<updatecheck status=\"noupdate\"/></app></response>",
-1,
false, // ping_only
ErrorCode::kSuccess,
metrics::CheckResult::kNoUpdateAvailable,
metrics::CheckReaction::kUnset,
metrics::DownloadErrorCode::kUnset,
nullptr,
nullptr));
}
TEST(OmahaRequestActionTest, NoElapsedSecondsTest) {
NiceMock<PrefsMock> prefs;
EXPECT_CALL(prefs, GetInt64(_, _)).Times(AnyNumber());
EXPECT_CALL(prefs, SetInt64(_, _)).Times(AnyNumber());
EXPECT_CALL(prefs, SetInt64(kPrefsLastActivePingDay, _)).Times(0);
EXPECT_CALL(prefs, SetInt64(kPrefsLastRollCallPingDay, _)).Times(0);
ASSERT_TRUE(
TestUpdateCheck(&prefs,
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&kDefaultTestParams,
"<?xml version=\"1.0\" encoding=\"UTF-8\"?><response "
"protocol=\"3.0\"><daystart blah=\"200\"/>"
"<app appid=\"foo\" status=\"ok\"><ping status=\"ok\"/>"
"<updatecheck status=\"noupdate\"/></app></response>",
-1,
false, // ping_only
ErrorCode::kSuccess,
metrics::CheckResult::kNoUpdateAvailable,
metrics::CheckReaction::kUnset,
metrics::DownloadErrorCode::kUnset,
nullptr,
nullptr));
}
TEST(OmahaRequestActionTest, BadElapsedSecondsTest) {
NiceMock<PrefsMock> prefs;
EXPECT_CALL(prefs, GetInt64(_, _)).Times(AnyNumber());
EXPECT_CALL(prefs, SetInt64(_, _)).Times(AnyNumber());
EXPECT_CALL(prefs, SetInt64(kPrefsLastActivePingDay, _)).Times(0);
EXPECT_CALL(prefs, SetInt64(kPrefsLastRollCallPingDay, _)).Times(0);
ASSERT_TRUE(
TestUpdateCheck(&prefs,
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&kDefaultTestParams,
"<?xml version=\"1.0\" encoding=\"UTF-8\"?><response "
"protocol=\"3.0\"><daystart elapsed_seconds=\"x\"/>"
"<app appid=\"foo\" status=\"ok\"><ping status=\"ok\"/>"
"<updatecheck status=\"noupdate\"/></app></response>",
-1,
false, // ping_only
ErrorCode::kSuccess,
metrics::CheckResult::kNoUpdateAvailable,
metrics::CheckReaction::kUnset,
metrics::DownloadErrorCode::kUnset,
nullptr,
nullptr));
}
TEST(OmahaRequestActionTest, NoUniqueIDTest) {
vector<char> post_data;
ASSERT_FALSE(TestUpdateCheck(nullptr, // prefs
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&kDefaultTestParams,
"invalid xml>",
-1,
false, // ping_only
ErrorCode::kOmahaRequestXMLParseError,
metrics::CheckResult::kParsingError,
metrics::CheckReaction::kUnset,
metrics::DownloadErrorCode::kUnset,
nullptr, // response
&post_data));
// convert post_data to string
string post_str(&post_data[0], post_data.size());
EXPECT_EQ(post_str.find("machineid="), string::npos);
EXPECT_EQ(post_str.find("userid="), string::npos);
}
TEST(OmahaRequestActionTest, NetworkFailureTest) {
OmahaResponse response;
const int http_error_code =
static_cast<int>(ErrorCode::kOmahaRequestHTTPResponseBase) + 501;
ASSERT_FALSE(
TestUpdateCheck(nullptr, // prefs
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&kDefaultTestParams,
"",
501,
false, // ping_only
static_cast<ErrorCode>(http_error_code),
metrics::CheckResult::kDownloadError,
metrics::CheckReaction::kUnset,
static_cast<metrics::DownloadErrorCode>(501),
&response,
nullptr));
EXPECT_FALSE(response.update_exists);
}
TEST(OmahaRequestActionTest, NetworkFailureBadHTTPCodeTest) {
OmahaResponse response;
const int http_error_code =
static_cast<int>(ErrorCode::kOmahaRequestHTTPResponseBase) + 999;
ASSERT_FALSE(
TestUpdateCheck(nullptr, // prefs
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&kDefaultTestParams,
"",
1500,
false, // ping_only
static_cast<ErrorCode>(http_error_code),
metrics::CheckResult::kDownloadError,
metrics::CheckReaction::kUnset,
metrics::DownloadErrorCode::kHttpStatusOther,
&response,
nullptr));
EXPECT_FALSE(response.update_exists);
}
TEST(OmahaRequestActionTest, TestUpdateFirstSeenAtGetsPersistedFirstTime) {
OmahaResponse response;
OmahaRequestParams params = kDefaultTestParams;
params.set_wall_clock_based_wait_enabled(true);
params.set_waiting_period(TimeDelta().FromDays(1));
params.set_update_check_count_wait_enabled(false);
string prefs_dir;
EXPECT_TRUE(utils::MakeTempDirectory("ue_ut_prefs.XXXXXX",
&prefs_dir));
ScopedDirRemover temp_dir_remover(prefs_dir);
Prefs prefs;
LOG_IF(ERROR, !prefs.Init(base::FilePath(prefs_dir)))
<< "Failed to initialize preferences.";
ASSERT_FALSE(TestUpdateCheck(
&prefs, // prefs
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&params,
GetUpdateResponse2(OmahaRequestParams::kAppId,
"1.2.3.4", // version
"http://more/info",
"true", // prompt
"http://code/base/", // dl url
"file.signed", // file name
"HASH1234=", // checksum
"false", // needs admin
"123", // size
"", // deadline
"7", // max days to scatter
"42", // elapsed_days
false, // disable_p2p_for_downloading
false), // disable_p2p_for sharing
-1,
false, // ping_only
ErrorCode::kOmahaUpdateDeferredPerPolicy,
metrics::CheckResult::kUpdateAvailable,
metrics::CheckReaction::kDeferring,
metrics::DownloadErrorCode::kUnset,
&response,
nullptr));
int64_t timestamp = 0;
ASSERT_TRUE(prefs.GetInt64(kPrefsUpdateFirstSeenAt, &timestamp));
ASSERT_GT(timestamp, 0);
EXPECT_FALSE(response.update_exists);
// Verify if we are interactive check we don't defer.
params.set_interactive(true);
ASSERT_TRUE(
TestUpdateCheck(&prefs, // prefs
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&params,
GetUpdateResponse2(OmahaRequestParams::kAppId,
"1.2.3.4", // version
"http://more/info",
"true", // prompt
"http://code/base/", // dl url
"file.signed", // file name
"HASH1234=", // checksum
"false", // needs admin
"123", // size
"", // deadline
"7", // max days to scatter
"42", // elapsed_days
false, // disable_p2p_for_downloading
false), // disable_p2p_for sharing
-1,
false, // ping_only
ErrorCode::kSuccess,
metrics::CheckResult::kUpdateAvailable,
metrics::CheckReaction::kUpdating,
metrics::DownloadErrorCode::kUnset,
&response,
nullptr));
EXPECT_TRUE(response.update_exists);
}
TEST(OmahaRequestActionTest, TestUpdateFirstSeenAtGetsUsedIfAlreadyPresent) {
OmahaResponse response;
OmahaRequestParams params = kDefaultTestParams;
params.set_wall_clock_based_wait_enabled(true);
params.set_waiting_period(TimeDelta().FromDays(1));
params.set_update_check_count_wait_enabled(false);
string prefs_dir;
EXPECT_TRUE(utils::MakeTempDirectory("ue_ut_prefs.XXXXXX",
&prefs_dir));
ScopedDirRemover temp_dir_remover(prefs_dir);
Prefs prefs;
LOG_IF(ERROR, !prefs.Init(base::FilePath(prefs_dir)))
<< "Failed to initialize preferences.";
// Set the timestamp to a very old value such that it exceeds the
// waiting period set above.
Time t1;
Time::FromString("1/1/2012", &t1);
ASSERT_TRUE(prefs.SetInt64(kPrefsUpdateFirstSeenAt, t1.ToInternalValue()));
ASSERT_TRUE(TestUpdateCheck(
&prefs, // prefs
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&params,
GetUpdateResponse2(OmahaRequestParams::kAppId,
"1.2.3.4", // version
"http://more/info",
"true", // prompt
"http://code/base/", // dl url
"file.signed", // file name
"HASH1234=", // checksum
"false", // needs admin
"123", // size
"", // deadline
"7", // max days to scatter
"42", // elapsed_days
false, // disable_p2p_for_downloading
false), // disable_p2p_for sharing
-1,
false, // ping_only
ErrorCode::kSuccess,
metrics::CheckResult::kUpdateAvailable,
metrics::CheckReaction::kUpdating,
metrics::DownloadErrorCode::kUnset,
&response,
nullptr));
EXPECT_TRUE(response.update_exists);
// Make sure the timestamp t1 is unchanged showing that it was reused.
int64_t timestamp = 0;
ASSERT_TRUE(prefs.GetInt64(kPrefsUpdateFirstSeenAt, &timestamp));
ASSERT_TRUE(timestamp == t1.ToInternalValue());
}
TEST(OmahaRequestActionTest, TestChangingToMoreStableChannel) {
// Create a uniquely named test directory.
string test_dir;
ASSERT_TRUE(utils::MakeTempDirectory(
"omaha_request_action-test-XXXXXX", &test_dir));
ASSERT_EQ(0, System(string("mkdir -p ") + test_dir + "/etc"));
ASSERT_EQ(0, System(string("mkdir -p ") + test_dir +
kStatefulPartition + "/etc"));
vector<char> post_data;
NiceMock<PrefsMock> prefs;
ASSERT_TRUE(WriteFileString(
test_dir + "/etc/lsb-release",
"CHROMEOS_RELEASE_APPID={11111111-1111-1111-1111-111111111111}\n"
"CHROMEOS_BOARD_APPID={22222222-2222-2222-2222-222222222222}\n"
"CHROMEOS_RELEASE_TRACK=canary-channel\n"));
ASSERT_TRUE(WriteFileString(
test_dir + kStatefulPartition + "/etc/lsb-release",
"CHROMEOS_IS_POWERWASH_ALLOWED=true\n"
"CHROMEOS_RELEASE_TRACK=stable-channel\n"));
OmahaRequestParams params = kDefaultTestParams;
params.set_root(test_dir);
params.SetLockDown(false);
params.Init("1.2.3.4", "", 0);
EXPECT_EQ("canary-channel", params.current_channel());
EXPECT_EQ("stable-channel", params.target_channel());
EXPECT_TRUE(params.to_more_stable_channel());
EXPECT_TRUE(params.is_powerwash_allowed());
ASSERT_FALSE(TestUpdateCheck(&prefs,
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&params,
"invalid xml>",
-1,
false, // ping_only
ErrorCode::kOmahaRequestXMLParseError,
metrics::CheckResult::kParsingError,
metrics::CheckReaction::kUnset,
metrics::DownloadErrorCode::kUnset,
nullptr, // response
&post_data));
// convert post_data to string
string post_str(&post_data[0], post_data.size());
EXPECT_NE(string::npos, post_str.find(
"appid=\"{22222222-2222-2222-2222-222222222222}\" "
"version=\"0.0.0.0\" from_version=\"1.2.3.4\" "
"track=\"stable-channel\" from_track=\"canary-channel\" "));
ASSERT_TRUE(utils::RecursiveUnlinkDir(test_dir));
}
TEST(OmahaRequestActionTest, TestChangingToLessStableChannel) {
// Create a uniquely named test directory.
string test_dir;
ASSERT_TRUE(utils::MakeTempDirectory(
"omaha_request_action-test-XXXXXX", &test_dir));
ASSERT_EQ(0, System(string("mkdir -p ") + test_dir + "/etc"));
ASSERT_EQ(0, System(string("mkdir -p ") + test_dir +
kStatefulPartition + "/etc"));
vector<char> post_data;
NiceMock<PrefsMock> prefs;
ASSERT_TRUE(WriteFileString(
test_dir + "/etc/lsb-release",
"CHROMEOS_RELEASE_APPID={11111111-1111-1111-1111-111111111111}\n"
"CHROMEOS_BOARD_APPID={22222222-2222-2222-2222-222222222222}\n"
"CHROMEOS_RELEASE_TRACK=stable-channel\n"));
ASSERT_TRUE(WriteFileString(
test_dir + kStatefulPartition + "/etc/lsb-release",
"CHROMEOS_RELEASE_TRACK=canary-channel\n"));
OmahaRequestParams params = kDefaultTestParams;
params.set_root(test_dir);
params.SetLockDown(false);
params.Init("5.6.7.8", "", 0);
EXPECT_EQ("stable-channel", params.current_channel());
EXPECT_EQ("canary-channel", params.target_channel());
EXPECT_FALSE(params.to_more_stable_channel());
EXPECT_FALSE(params.is_powerwash_allowed());
ASSERT_FALSE(TestUpdateCheck(&prefs,
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&params,
"invalid xml>",
-1,
false, // ping_only
ErrorCode::kOmahaRequestXMLParseError,
metrics::CheckResult::kParsingError,
metrics::CheckReaction::kUnset,
metrics::DownloadErrorCode::kUnset,
nullptr, // response
&post_data));
// convert post_data to string
string post_str(&post_data[0], post_data.size());
EXPECT_NE(string::npos, post_str.find(
"appid=\"{11111111-1111-1111-1111-111111111111}\" "
"version=\"5.6.7.8\" "
"track=\"canary-channel\" from_track=\"stable-channel\""));
EXPECT_EQ(string::npos, post_str.find("from_version"));
ASSERT_TRUE(utils::RecursiveUnlinkDir(test_dir));
}
void P2PTest(bool initial_allow_p2p_for_downloading,
bool initial_allow_p2p_for_sharing,
bool omaha_disable_p2p_for_downloading,
bool omaha_disable_p2p_for_sharing,
bool payload_state_allow_p2p_attempt,
bool expect_p2p_client_lookup,
const string& p2p_client_result_url,
bool expected_allow_p2p_for_downloading,
bool expected_allow_p2p_for_sharing,
const string& expected_p2p_url) {
OmahaResponse response;
OmahaRequestParams request_params = kDefaultTestParams;
request_params.set_use_p2p_for_downloading(initial_allow_p2p_for_downloading);
request_params.set_use_p2p_for_sharing(initial_allow_p2p_for_sharing);
MockPayloadState mock_payload_state;
EXPECT_CALL(mock_payload_state, P2PAttemptAllowed())
.WillRepeatedly(Return(payload_state_allow_p2p_attempt));
MockP2PManager mock_p2p_manager;
mock_p2p_manager.fake().SetLookupUrlForFileResult(p2p_client_result_url);
TimeDelta timeout = TimeDelta::FromSeconds(kMaxP2PNetworkWaitTimeSeconds);
EXPECT_CALL(mock_p2p_manager, LookupUrlForFile(_, _, timeout, _))
.Times(expect_p2p_client_lookup ? 1 : 0);
ASSERT_TRUE(
TestUpdateCheck(nullptr, // prefs
&mock_payload_state,
&mock_p2p_manager,
nullptr, // connection_manager
&request_params,
GetUpdateResponse2(OmahaRequestParams::kAppId,
"1.2.3.4", // version
"http://more/info",
"true", // prompt
"http://code/base/", // dl url
"file.signed", // file name
"HASH1234=", // checksum
"false", // needs admin
"123", // size
"", // deadline
"7", // max days to scatter
"42", // elapsed_days
omaha_disable_p2p_for_downloading,
omaha_disable_p2p_for_sharing),
-1,
false, // ping_only
ErrorCode::kSuccess,
metrics::CheckResult::kUpdateAvailable,
metrics::CheckReaction::kUpdating,
metrics::DownloadErrorCode::kUnset,
&response,
nullptr));
EXPECT_TRUE(response.update_exists);
EXPECT_EQ(response.disable_p2p_for_downloading,
omaha_disable_p2p_for_downloading);
EXPECT_EQ(response.disable_p2p_for_sharing,
omaha_disable_p2p_for_sharing);
EXPECT_EQ(request_params.use_p2p_for_downloading(),
expected_allow_p2p_for_downloading);
EXPECT_EQ(request_params.use_p2p_for_sharing(),
expected_allow_p2p_for_sharing);
EXPECT_EQ(request_params.p2p_url(), expected_p2p_url);
}
TEST(OmahaRequestActionTest, P2PWithPeer) {
P2PTest(true, // initial_allow_p2p_for_downloading
true, // initial_allow_p2p_for_sharing
false, // omaha_disable_p2p_for_downloading
false, // omaha_disable_p2p_for_sharing
true, // payload_state_allow_p2p_attempt
true, // expect_p2p_client_lookup
"http://1.3.5.7/p2p", // p2p_client_result_url
true, // expected_allow_p2p_for_downloading
true, // expected_allow_p2p_for_sharing
"http://1.3.5.7/p2p"); // expected_p2p_url
}
TEST(OmahaRequestActionTest, P2PWithoutPeer) {
P2PTest(true, // initial_allow_p2p_for_downloading
true, // initial_allow_p2p_for_sharing
false, // omaha_disable_p2p_for_downloading
false, // omaha_disable_p2p_for_sharing
true, // payload_state_allow_p2p_attempt
true, // expect_p2p_client_lookup
"", // p2p_client_result_url
false, // expected_allow_p2p_for_downloading
true, // expected_allow_p2p_for_sharing
""); // expected_p2p_url
}
TEST(OmahaRequestActionTest, P2PDownloadNotAllowed) {
P2PTest(false, // initial_allow_p2p_for_downloading
true, // initial_allow_p2p_for_sharing
false, // omaha_disable_p2p_for_downloading
false, // omaha_disable_p2p_for_sharing
true, // payload_state_allow_p2p_attempt
false, // expect_p2p_client_lookup
"unset", // p2p_client_result_url
false, // expected_allow_p2p_for_downloading
true, // expected_allow_p2p_for_sharing
""); // expected_p2p_url
}
TEST(OmahaRequestActionTest, P2PWithPeerDownloadDisabledByOmaha) {
P2PTest(true, // initial_allow_p2p_for_downloading
true, // initial_allow_p2p_for_sharing
true, // omaha_disable_p2p_for_downloading
false, // omaha_disable_p2p_for_sharing
true, // payload_state_allow_p2p_attempt
false, // expect_p2p_client_lookup
"unset", // p2p_client_result_url
false, // expected_allow_p2p_for_downloading
true, // expected_allow_p2p_for_sharing
""); // expected_p2p_url
}
TEST(OmahaRequestActionTest, P2PWithPeerSharingDisabledByOmaha) {
P2PTest(true, // initial_allow_p2p_for_downloading
true, // initial_allow_p2p_for_sharing
false, // omaha_disable_p2p_for_downloading
true, // omaha_disable_p2p_for_sharing
true, // payload_state_allow_p2p_attempt
true, // expect_p2p_client_lookup
"http://1.3.5.7/p2p", // p2p_client_result_url
true, // expected_allow_p2p_for_downloading
false, // expected_allow_p2p_for_sharing
"http://1.3.5.7/p2p"); // expected_p2p_url
}
TEST(OmahaRequestActionTest, P2PWithPeerBothDisabledByOmaha) {
P2PTest(true, // initial_allow_p2p_for_downloading
true, // initial_allow_p2p_for_sharing
true, // omaha_disable_p2p_for_downloading
true, // omaha_disable_p2p_for_sharing
true, // payload_state_allow_p2p_attempt
false, // expect_p2p_client_lookup
"unset", // p2p_client_result_url
false, // expected_allow_p2p_for_downloading
false, // expected_allow_p2p_for_sharing
""); // expected_p2p_url
}
bool InstallDateParseHelper(const std::string &elapsed_days,
PrefsInterface* prefs,
OmahaResponse *response) {
return
TestUpdateCheck(prefs,
nullptr, // payload_state
nullptr, // p2p_manager
nullptr, // connection_manager
&kDefaultTestParams,
GetUpdateResponse2(OmahaRequestParams::kAppId,
"1.2.3.4", // version
"http://more/info",
"true", // prompt
"http://code/base/", // dl url
"file.signed", // file name
"HASH1234=", // checksum
"false", // needs admin
"123", // size
"", // deadline
"7", // max days to scatter
elapsed_days,
false, // disable_p2p_for_downloading
false), // disable_p2p_for sharing
-1,
false, // ping_only
ErrorCode::kSuccess,
metrics::CheckResult::kUpdateAvailable,
metrics::CheckReaction::kUpdating,
metrics::DownloadErrorCode::kUnset,
response,
nullptr);
}
TEST(OmahaRequestActionTest, ParseInstallDateFromResponse) {
OmahaResponse response;
string temp_dir;
Prefs prefs;
EXPECT_TRUE(utils::MakeTempDirectory("ParseInstallDateFromResponse.XXXXXX",
&temp_dir));
prefs.Init(base::FilePath(temp_dir));
// Check that we parse elapsed_days in the Omaha Response correctly.
// and that the kPrefsInstallDateDays value is written to.
EXPECT_FALSE(prefs.Exists(kPrefsInstallDateDays));
EXPECT_TRUE(InstallDateParseHelper("42", &prefs, &response));
EXPECT_TRUE(response.update_exists);
EXPECT_EQ(42, response.install_date_days);
EXPECT_TRUE(prefs.Exists(kPrefsInstallDateDays));
int64_t prefs_days;
EXPECT_TRUE(prefs.GetInt64(kPrefsInstallDateDays, &prefs_days));
EXPECT_EQ(prefs_days, 42);
// If there already is a value set, we shouldn't do anything.
EXPECT_TRUE(InstallDateParseHelper("7", &prefs, &response));
EXPECT_TRUE(response.update_exists);
EXPECT_EQ(7, response.install_date_days);
EXPECT_TRUE(prefs.GetInt64(kPrefsInstallDateDays, &prefs_days));
EXPECT_EQ(prefs_days, 42);
// Note that elapsed_days is not necessarily divisible by 7 so check
// that we round down correctly when populating kPrefsInstallDateDays.
EXPECT_TRUE(prefs.Delete(kPrefsInstallDateDays));
EXPECT_TRUE(InstallDateParseHelper("23", &prefs, &response));
EXPECT_TRUE(response.update_exists);
EXPECT_EQ(23, response.install_date_days);
EXPECT_TRUE(prefs.GetInt64(kPrefsInstallDateDays, &prefs_days));
EXPECT_EQ(prefs_days, 21);
// Check that we correctly handle elapsed_days not being included in
// the Omaha Response.
EXPECT_TRUE(InstallDateParseHelper("", &prefs, &response));
EXPECT_TRUE(response.update_exists);
EXPECT_EQ(-1, response.install_date_days);
EXPECT_TRUE(utils::RecursiveUnlinkDir(temp_dir));
}
TEST(OmahaRequestActionTest, GetInstallDate) {
string temp_dir;
Prefs prefs;
EXPECT_TRUE(utils::MakeTempDirectory("GetInstallDate.XXXXXX",
&temp_dir));
prefs.Init(base::FilePath(temp_dir));
// If there is no prefs and OOBE is not complete, we should not
// report anything to Omaha.
{
FakeSystemState system_state;
system_state.set_prefs(&prefs);
EXPECT_EQ(OmahaRequestAction::GetInstallDate(&system_state), -1);
EXPECT_FALSE(prefs.Exists(kPrefsInstallDateDays));
}
// If OOBE is complete and happened on a valid date (e.g. after Jan
// 1 2007 0:00 PST), that date should be used and written to
// prefs. However, first try with an invalid date and check we do
// nothing.
{
FakeSystemState fake_system_state;
fake_system_state.set_prefs(&prefs);
Time oobe_date = Time::FromTimeT(42); // Dec 31, 1969 16:00:42 PST.
fake_system_state.fake_hardware()->SetIsOOBEComplete(oobe_date);
EXPECT_EQ(OmahaRequestAction::GetInstallDate(&fake_system_state), -1);
EXPECT_FALSE(prefs.Exists(kPrefsInstallDateDays));
}
// Then check with a valid date. The date Jan 20, 2007 0:00 PST
// should yield an InstallDate of 14.
{
FakeSystemState fake_system_state;
fake_system_state.set_prefs(&prefs);
Time oobe_date = Time::FromTimeT(1169280000); // Jan 20, 2007 0:00 PST.
fake_system_state.fake_hardware()->SetIsOOBEComplete(oobe_date);
EXPECT_EQ(OmahaRequestAction::GetInstallDate(&fake_system_state), 14);
EXPECT_TRUE(prefs.Exists(kPrefsInstallDateDays));
int64_t prefs_days;
EXPECT_TRUE(prefs.GetInt64(kPrefsInstallDateDays, &prefs_days));
EXPECT_EQ(prefs_days, 14);
}
// Now that we have a valid date in prefs, check that we keep using
// that even if OOBE date reports something else. The date Jan 30,
// 2007 0:00 PST should yield an InstallDate of 28... but since
// there's a prefs file, we should still get 14.
{
FakeSystemState fake_system_state;
fake_system_state.set_prefs(&prefs);
Time oobe_date = Time::FromTimeT(1170144000); // Jan 30, 2007 0:00 PST.
fake_system_state.fake_hardware()->SetIsOOBEComplete(oobe_date);
EXPECT_EQ(OmahaRequestAction::GetInstallDate(&fake_system_state), 14);
int64_t prefs_days;
EXPECT_TRUE(prefs.GetInt64(kPrefsInstallDateDays, &prefs_days));
EXPECT_EQ(prefs_days, 14);
// If we delete the prefs file, we should get 28 days.
EXPECT_TRUE(prefs.Delete(kPrefsInstallDateDays));
EXPECT_EQ(OmahaRequestAction::GetInstallDate(&fake_system_state), 28);
EXPECT_TRUE(prefs.GetInt64(kPrefsInstallDateDays, &prefs_days));
EXPECT_EQ(prefs_days, 28);
}
EXPECT_TRUE(utils::RecursiveUnlinkDir(temp_dir));
}
} // namespace chromeos_update_engine