• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 //
2 // Copyright (C) 2011 The Android Open Source Project
3 //
4 // Licensed under the Apache License, Version 2.0 (the "License");
5 // you may not use this file except in compliance with the License.
6 // You may obtain a copy of the License at
7 //
8 //      http://www.apache.org/licenses/LICENSE-2.0
9 //
10 // Unless required by applicable law or agreed to in writing, software
11 // distributed under the License is distributed on an "AS IS" BASIS,
12 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 // See the License for the specific language governing permissions and
14 // limitations under the License.
15 //
16 
17 #include "update_engine/payload_consumer/download_action.h"
18 
19 #include <gmock/gmock.h>
20 #include <gtest/gtest.h>
21 
22 #include <memory>
23 #include <string>
24 #include <utility>
25 #include <vector>
26 
27 #include <base/bind.h>
28 #include <base/files/file_path.h>
29 #include <base/files/file_util.h>
30 #include <base/location.h>
31 #include <base/strings/stringprintf.h>
32 #include <brillo/message_loops/fake_message_loop.h>
33 #include <brillo/message_loops/message_loop.h>
34 
35 #include "update_engine/common/action_pipe.h"
36 #include "update_engine/common/hash_calculator.h"
37 #include "update_engine/common/mock_http_fetcher.h"
38 #include "update_engine/common/mock_prefs.h"
39 #include "update_engine/common/test_utils.h"
40 #include "update_engine/common/utils.h"
41 #include "update_engine/fake_p2p_manager_configuration.h"
42 #include "update_engine/fake_system_state.h"
43 #include "update_engine/mock_file_writer.h"
44 #include "update_engine/payload_consumer/mock_download_action.h"
45 #include "update_engine/update_manager/fake_update_manager.h"
46 
47 namespace chromeos_update_engine {
48 
49 using base::FilePath;
50 using base::ReadFileToString;
51 using base::WriteFile;
52 using std::string;
53 using std::unique_ptr;
54 using test_utils::ScopedTempFile;
55 using testing::AtLeast;
56 using testing::InSequence;
57 using testing::Return;
58 using testing::SetArgPointee;
59 using testing::_;
60 
61 class DownloadActionTest : public ::testing::Test { };
62 
63 namespace {
64 
65 class DownloadActionTestProcessorDelegate : public ActionProcessorDelegate {
66  public:
DownloadActionTestProcessorDelegate(ErrorCode expected_code)67   explicit DownloadActionTestProcessorDelegate(ErrorCode expected_code)
68       : processing_done_called_(false),
69         expected_code_(expected_code) {}
~DownloadActionTestProcessorDelegate()70   ~DownloadActionTestProcessorDelegate() override {
71     EXPECT_TRUE(processing_done_called_);
72   }
ProcessingDone(const ActionProcessor * processor,ErrorCode code)73   void ProcessingDone(const ActionProcessor* processor,
74                       ErrorCode code) override {
75     brillo::MessageLoop::current()->BreakLoop();
76     brillo::Blob found_data;
77     ASSERT_TRUE(utils::ReadFile(path_, &found_data));
78     if (expected_code_ != ErrorCode::kDownloadWriteError) {
79       ASSERT_EQ(expected_data_.size(), found_data.size());
80       for (unsigned i = 0; i < expected_data_.size(); i++) {
81         EXPECT_EQ(expected_data_[i], found_data[i]);
82       }
83     }
84     processing_done_called_ = true;
85   }
86 
ActionCompleted(ActionProcessor * processor,AbstractAction * action,ErrorCode code)87   void ActionCompleted(ActionProcessor* processor,
88                        AbstractAction* action,
89                        ErrorCode code) override {
90     const string type = action->Type();
91     if (type == DownloadAction::StaticType()) {
92       EXPECT_EQ(expected_code_, code);
93     } else {
94       EXPECT_EQ(ErrorCode::kSuccess, code);
95     }
96   }
97 
98   string path_;
99   brillo::Blob expected_data_;
100   bool processing_done_called_;
101   ErrorCode expected_code_;
102 };
103 
104 class TestDirectFileWriter : public DirectFileWriter {
105  public:
TestDirectFileWriter()106   TestDirectFileWriter() : fail_write_(0), current_write_(0) {}
set_fail_write(int fail_write)107   void set_fail_write(int fail_write) { fail_write_ = fail_write; }
108 
Write(const void * bytes,size_t count)109   virtual bool Write(const void* bytes, size_t count) {
110     if (++current_write_ == fail_write_) {
111       return false;
112     }
113     return DirectFileWriter::Write(bytes, count);
114   }
115 
116  private:
117   // If positive, fail on the |fail_write_| call to Write.
118   int fail_write_;
119   int current_write_;
120 };
121 
StartProcessorInRunLoop(ActionProcessor * processor,MockHttpFetcher * http_fetcher)122 void StartProcessorInRunLoop(ActionProcessor* processor,
123                              MockHttpFetcher* http_fetcher) {
124   processor->StartProcessing();
125   http_fetcher->SetOffset(1);
126 }
127 
TestWithData(const brillo::Blob & data,int fail_write,bool use_download_delegate)128 void TestWithData(const brillo::Blob& data,
129                   int fail_write,
130                   bool use_download_delegate) {
131   brillo::FakeMessageLoop loop(nullptr);
132   loop.SetAsCurrent();
133   FakeSystemState fake_system_state;
134 
135   // TODO(adlr): see if we need a different file for build bots
136   ScopedTempFile output_temp_file;
137   TestDirectFileWriter writer;
138   EXPECT_EQ(
139       0, writer.Open(output_temp_file.path().c_str(), O_WRONLY | O_CREAT, 0));
140   writer.set_fail_write(fail_write);
141 
142   uint64_t size = data.size() - 1;
143   InstallPlan install_plan;
144   install_plan.payloads.push_back(
145       {.size = size, .type = InstallPayloadType::kDelta});
146   // We pull off the first byte from data and seek past it.
147   EXPECT_TRUE(HashCalculator::RawHashOfBytes(
148       &data[1], data.size() - 1, &install_plan.payloads[0].hash));
149   install_plan.source_slot = 0;
150   install_plan.target_slot = 1;
151   // We mark both slots as bootable. Only the target slot should be unbootable
152   // after the download starts.
153   fake_system_state.fake_boot_control()->SetSlotBootable(
154       install_plan.source_slot, true);
155   fake_system_state.fake_boot_control()->SetSlotBootable(
156       install_plan.target_slot, true);
157   ObjectFeederAction<InstallPlan> feeder_action;
158   feeder_action.set_obj(install_plan);
159   MockPrefs prefs;
160   MockHttpFetcher* http_fetcher = new MockHttpFetcher(data.data(),
161                                                       data.size(),
162                                                       nullptr);
163   // takes ownership of passed in HttpFetcher
164   DownloadAction download_action(&prefs,
165                                  fake_system_state.boot_control(),
166                                  fake_system_state.hardware(),
167                                  &fake_system_state,
168                                  http_fetcher,
169                                  false /* is_interactive */);
170   download_action.SetTestFileWriter(&writer);
171   BondActions(&feeder_action, &download_action);
172   MockDownloadActionDelegate download_delegate;
173   if (use_download_delegate) {
174     InSequence s;
175     download_action.set_delegate(&download_delegate);
176     if (data.size() > kMockHttpFetcherChunkSize)
177       EXPECT_CALL(download_delegate,
178                   BytesReceived(_, kMockHttpFetcherChunkSize, _));
179     EXPECT_CALL(download_delegate, BytesReceived(_, _, _)).Times(AtLeast(1));
180   }
181   ErrorCode expected_code = ErrorCode::kSuccess;
182   if (fail_write > 0)
183     expected_code = ErrorCode::kDownloadWriteError;
184   DownloadActionTestProcessorDelegate delegate(expected_code);
185   delegate.expected_data_ = brillo::Blob(data.begin() + 1, data.end());
186   delegate.path_ = output_temp_file.path();
187   ActionProcessor processor;
188   processor.set_delegate(&delegate);
189   processor.EnqueueAction(&feeder_action);
190   processor.EnqueueAction(&download_action);
191 
192   loop.PostTask(FROM_HERE,
193                 base::Bind(&StartProcessorInRunLoop, &processor, http_fetcher));
194   loop.Run();
195   EXPECT_FALSE(loop.PendingTasks());
196 
197   EXPECT_TRUE(fake_system_state.fake_boot_control()->IsSlotBootable(
198       install_plan.source_slot));
199   EXPECT_FALSE(fake_system_state.fake_boot_control()->IsSlotBootable(
200       install_plan.target_slot));
201 }
202 }  // namespace
203 
TEST(DownloadActionTest,SimpleTest)204 TEST(DownloadActionTest, SimpleTest) {
205   brillo::Blob small;
206   const char* foo = "foo";
207   small.insert(small.end(), foo, foo + strlen(foo));
208   TestWithData(small,
209                0,  // fail_write
210                true);  // use_download_delegate
211 }
212 
TEST(DownloadActionTest,LargeTest)213 TEST(DownloadActionTest, LargeTest) {
214   brillo::Blob big(5 * kMockHttpFetcherChunkSize);
215   char c = '0';
216   for (unsigned int i = 0; i < big.size(); i++) {
217     big[i] = c;
218     c = ('9' == c) ? '0' : c + 1;
219   }
220   TestWithData(big,
221                0,  // fail_write
222                true);  // use_download_delegate
223 }
224 
TEST(DownloadActionTest,FailWriteTest)225 TEST(DownloadActionTest, FailWriteTest) {
226   brillo::Blob big(5 * kMockHttpFetcherChunkSize);
227   char c = '0';
228   for (unsigned int i = 0; i < big.size(); i++) {
229     big[i] = c;
230     c = ('9' == c) ? '0' : c + 1;
231   }
232   TestWithData(big,
233                2,  // fail_write
234                true);  // use_download_delegate
235 }
236 
TEST(DownloadActionTest,NoDownloadDelegateTest)237 TEST(DownloadActionTest, NoDownloadDelegateTest) {
238   brillo::Blob small;
239   const char* foo = "foofoo";
240   small.insert(small.end(), foo, foo + strlen(foo));
241   TestWithData(small,
242                0,  // fail_write
243                false);  // use_download_delegate
244 }
245 
TEST(DownloadActionTest,MultiPayloadProgressTest)246 TEST(DownloadActionTest, MultiPayloadProgressTest) {
247   std::vector<brillo::Blob> payload_datas;
248   // the first payload must be the largest, as it's the actual payload used by
249   // the MockHttpFetcher for all downloaded data.
250   payload_datas.emplace_back(4 * kMockHttpFetcherChunkSize + 256);
251   payload_datas.emplace_back(2 * kMockHttpFetcherChunkSize);
252   brillo::FakeMessageLoop loop(nullptr);
253   loop.SetAsCurrent();
254   FakeSystemState fake_system_state;
255   EXPECT_CALL(*fake_system_state.mock_payload_state(), NextPayload())
256       .WillOnce(Return(true));
257 
258   MockFileWriter mock_file_writer;
259   EXPECT_CALL(mock_file_writer, Close()).WillRepeatedly(Return(0));
260   EXPECT_CALL(mock_file_writer, Write(_, _, _))
261       .WillRepeatedly(
262           DoAll(SetArgPointee<2>(ErrorCode::kSuccess), Return(true)));
263 
264   InstallPlan install_plan;
265   uint64_t total_expected_download_size{0};
266   for (const auto& data : payload_datas) {
267     uint64_t size = data.size();
268     install_plan.payloads.push_back(
269         {.size = size, .type = InstallPayloadType::kFull});
270     total_expected_download_size += size;
271   }
272   ObjectFeederAction<InstallPlan> feeder_action;
273   feeder_action.set_obj(install_plan);
274   MockPrefs prefs;
275   MockHttpFetcher* http_fetcher = new MockHttpFetcher(
276       payload_datas[0].data(), payload_datas[0].size(), nullptr);
277   // takes ownership of passed in HttpFetcher
278   DownloadAction download_action(&prefs,
279                                  fake_system_state.boot_control(),
280                                  fake_system_state.hardware(),
281                                  &fake_system_state,
282                                  http_fetcher,
283                                  false /* is_interactive */);
284   download_action.SetTestFileWriter(&mock_file_writer);
285   BondActions(&feeder_action, &download_action);
286   MockDownloadActionDelegate download_delegate;
287   {
288     InSequence s;
289     download_action.set_delegate(&download_delegate);
290     // these are hand-computed based on the payloads specified above
291     EXPECT_CALL(download_delegate,
292                 BytesReceived(kMockHttpFetcherChunkSize,
293                               kMockHttpFetcherChunkSize,
294                               total_expected_download_size));
295     EXPECT_CALL(download_delegate,
296                 BytesReceived(kMockHttpFetcherChunkSize,
297                               kMockHttpFetcherChunkSize * 2,
298                               total_expected_download_size));
299     EXPECT_CALL(download_delegate,
300                 BytesReceived(kMockHttpFetcherChunkSize,
301                               kMockHttpFetcherChunkSize * 3,
302                               total_expected_download_size));
303     EXPECT_CALL(download_delegate,
304                 BytesReceived(kMockHttpFetcherChunkSize,
305                               kMockHttpFetcherChunkSize * 4,
306                               total_expected_download_size));
307     EXPECT_CALL(download_delegate,
308                 BytesReceived(256,
309                               kMockHttpFetcherChunkSize * 4 + 256,
310                               total_expected_download_size));
311     EXPECT_CALL(download_delegate,
312                 BytesReceived(kMockHttpFetcherChunkSize,
313                               kMockHttpFetcherChunkSize * 5 + 256,
314                               total_expected_download_size));
315     EXPECT_CALL(download_delegate,
316                 BytesReceived(kMockHttpFetcherChunkSize,
317                               total_expected_download_size,
318                               total_expected_download_size));
319   }
320   ActionProcessor processor;
321   processor.EnqueueAction(&feeder_action);
322   processor.EnqueueAction(&download_action);
323 
324   loop.PostTask(
325       FROM_HERE,
326       base::Bind(
327           [](ActionProcessor* processor) { processor->StartProcessing(); },
328           base::Unretained(&processor)));
329   loop.Run();
330   EXPECT_FALSE(loop.PendingTasks());
331 }
332 
333 namespace {
334 class TerminateEarlyTestProcessorDelegate : public ActionProcessorDelegate {
335  public:
ProcessingStopped(const ActionProcessor * processor)336   void ProcessingStopped(const ActionProcessor* processor) {
337     brillo::MessageLoop::current()->BreakLoop();
338   }
339 };
340 
TerminateEarlyTestStarter(ActionProcessor * processor)341 void TerminateEarlyTestStarter(ActionProcessor* processor) {
342   processor->StartProcessing();
343   CHECK(processor->IsRunning());
344   processor->StopProcessing();
345 }
346 
TestTerminateEarly(bool use_download_delegate)347 void TestTerminateEarly(bool use_download_delegate) {
348   brillo::FakeMessageLoop loop(nullptr);
349   loop.SetAsCurrent();
350 
351   brillo::Blob data(kMockHttpFetcherChunkSize +
352                       kMockHttpFetcherChunkSize / 2);
353   memset(data.data(), 0, data.size());
354 
355   ScopedTempFile temp_file;
356   {
357     DirectFileWriter writer;
358     EXPECT_EQ(0, writer.Open(temp_file.path().c_str(), O_WRONLY | O_CREAT, 0));
359 
360     // takes ownership of passed in HttpFetcher
361     ObjectFeederAction<InstallPlan> feeder_action;
362     InstallPlan install_plan;
363     install_plan.payloads.resize(1);
364     feeder_action.set_obj(install_plan);
365     FakeSystemState fake_system_state_;
366     MockPrefs prefs;
367     DownloadAction download_action(
368         &prefs,
369         fake_system_state_.boot_control(),
370         fake_system_state_.hardware(),
371         &fake_system_state_,
372         new MockHttpFetcher(data.data(), data.size(), nullptr),
373         false /* is_interactive */);
374     download_action.SetTestFileWriter(&writer);
375     MockDownloadActionDelegate download_delegate;
376     if (use_download_delegate) {
377       download_action.set_delegate(&download_delegate);
378       EXPECT_CALL(download_delegate, BytesReceived(_, _, _)).Times(0);
379     }
380     TerminateEarlyTestProcessorDelegate delegate;
381     ActionProcessor processor;
382     processor.set_delegate(&delegate);
383     processor.EnqueueAction(&feeder_action);
384     processor.EnqueueAction(&download_action);
385     BondActions(&feeder_action, &download_action);
386 
387     loop.PostTask(FROM_HERE,
388                   base::Bind(&TerminateEarlyTestStarter, &processor));
389     loop.Run();
390     EXPECT_FALSE(loop.PendingTasks());
391   }
392 
393   // 1 or 0 chunks should have come through
394   const off_t resulting_file_size(utils::FileSize(temp_file.path()));
395   EXPECT_GE(resulting_file_size, 0);
396   if (resulting_file_size != 0)
397     EXPECT_EQ(kMockHttpFetcherChunkSize,
398               static_cast<size_t>(resulting_file_size));
399 }
400 
401 }  // namespace
402 
TEST(DownloadActionTest,TerminateEarlyTest)403 TEST(DownloadActionTest, TerminateEarlyTest) {
404   TestTerminateEarly(true);
405 }
406 
TEST(DownloadActionTest,TerminateEarlyNoDownloadDelegateTest)407 TEST(DownloadActionTest, TerminateEarlyNoDownloadDelegateTest) {
408   TestTerminateEarly(false);
409 }
410 
411 class DownloadActionTestAction;
412 
413 template<>
414 class ActionTraits<DownloadActionTestAction> {
415  public:
416   typedef InstallPlan OutputObjectType;
417   typedef InstallPlan InputObjectType;
418 };
419 
420 // This is a simple Action class for testing.
421 class DownloadActionTestAction : public Action<DownloadActionTestAction> {
422  public:
DownloadActionTestAction()423   DownloadActionTestAction() : did_run_(false) {}
424   typedef InstallPlan InputObjectType;
425   typedef InstallPlan OutputObjectType;
in_pipe()426   ActionPipe<InstallPlan>* in_pipe() { return in_pipe_.get(); }
out_pipe()427   ActionPipe<InstallPlan>* out_pipe() { return out_pipe_.get(); }
processor()428   ActionProcessor* processor() { return processor_; }
PerformAction()429   void PerformAction() {
430     did_run_ = true;
431     ASSERT_TRUE(HasInputObject());
432     EXPECT_TRUE(expected_input_object_ == GetInputObject());
433     ASSERT_TRUE(processor());
434     processor()->ActionComplete(this, ErrorCode::kSuccess);
435   }
Type() const436   string Type() const { return "DownloadActionTestAction"; }
437   InstallPlan expected_input_object_;
438   bool did_run_;
439 };
440 
441 namespace {
442 // This class is an ActionProcessorDelegate that simply terminates the
443 // run loop when the ActionProcessor has completed processing. It's used
444 // only by the test PassObjectOutTest.
445 class PassObjectOutTestProcessorDelegate : public ActionProcessorDelegate {
446  public:
ProcessingDone(const ActionProcessor * processor,ErrorCode code)447   void ProcessingDone(const ActionProcessor* processor, ErrorCode code) {
448     brillo::MessageLoop::current()->BreakLoop();
449   }
450 };
451 
452 }  // namespace
453 
TEST(DownloadActionTest,PassObjectOutTest)454 TEST(DownloadActionTest, PassObjectOutTest) {
455   brillo::FakeMessageLoop loop(nullptr);
456   loop.SetAsCurrent();
457 
458   DirectFileWriter writer;
459   EXPECT_EQ(0, writer.Open("/dev/null", O_WRONLY | O_CREAT, 0));
460 
461   // takes ownership of passed in HttpFetcher
462   InstallPlan install_plan;
463   install_plan.payloads.push_back({.size = 1});
464   EXPECT_TRUE(
465       HashCalculator::RawHashOfData({'x'}, &install_plan.payloads[0].hash));
466   ObjectFeederAction<InstallPlan> feeder_action;
467   feeder_action.set_obj(install_plan);
468   MockPrefs prefs;
469   FakeSystemState fake_system_state_;
470   DownloadAction download_action(&prefs,
471                                  fake_system_state_.boot_control(),
472                                  fake_system_state_.hardware(),
473                                  &fake_system_state_,
474                                  new MockHttpFetcher("x", 1, nullptr),
475                                  false /* is_interactive */);
476   download_action.SetTestFileWriter(&writer);
477 
478   DownloadActionTestAction test_action;
479   test_action.expected_input_object_ = install_plan;
480   BondActions(&feeder_action, &download_action);
481   BondActions(&download_action, &test_action);
482 
483   ActionProcessor processor;
484   PassObjectOutTestProcessorDelegate delegate;
485   processor.set_delegate(&delegate);
486   processor.EnqueueAction(&feeder_action);
487   processor.EnqueueAction(&download_action);
488   processor.EnqueueAction(&test_action);
489 
490   loop.PostTask(
491       FROM_HERE,
492       base::Bind(
493           [](ActionProcessor* processor) { processor->StartProcessing(); },
494           base::Unretained(&processor)));
495   loop.Run();
496   EXPECT_FALSE(loop.PendingTasks());
497 
498   EXPECT_EQ(true, test_action.did_run_);
499 }
500 
501 // Test fixture for P2P tests.
502 class P2PDownloadActionTest : public testing::Test {
503  protected:
P2PDownloadActionTest()504   P2PDownloadActionTest()
505     : start_at_offset_(0),
506       fake_um_(fake_system_state_.fake_clock()) {}
507 
~P2PDownloadActionTest()508   ~P2PDownloadActionTest() override {}
509 
510   // Derived from testing::Test.
SetUp()511   void SetUp() override {
512     loop_.SetAsCurrent();
513   }
514 
515   // Derived from testing::Test.
TearDown()516   void TearDown() override {
517     EXPECT_FALSE(loop_.PendingTasks());
518   }
519 
520   // To be called by tests to setup the download. The
521   // |starting_offset| parameter is for where to resume.
SetupDownload(off_t starting_offset)522   void SetupDownload(off_t starting_offset) {
523     start_at_offset_ = starting_offset;
524     // Prepare data 10 kB of data.
525     data_.clear();
526     for (unsigned int i = 0; i < 10 * 1000; i++)
527       data_ += 'a' + (i % 25);
528 
529     // Setup p2p.
530     FakeP2PManagerConfiguration *test_conf = new FakeP2PManagerConfiguration();
531     p2p_manager_.reset(P2PManager::Construct(
532         test_conf, nullptr, &fake_um_, "cros_au", 3,
533         base::TimeDelta::FromDays(5)));
534     fake_system_state_.set_p2p_manager(p2p_manager_.get());
535   }
536 
537   // To be called by tests to perform the download. The
538   // |use_p2p_to_share| parameter is used to indicate whether the
539   // payload should be shared via p2p.
StartDownload(bool use_p2p_to_share)540   void StartDownload(bool use_p2p_to_share) {
541     EXPECT_CALL(*fake_system_state_.mock_payload_state(),
542                 GetUsingP2PForSharing())
543         .WillRepeatedly(Return(use_p2p_to_share));
544 
545     ScopedTempFile output_temp_file;
546     TestDirectFileWriter writer;
547     EXPECT_EQ(
548         0, writer.Open(output_temp_file.path().c_str(), O_WRONLY | O_CREAT, 0));
549     InstallPlan install_plan;
550     install_plan.payloads.push_back(
551         {.size = data_.length(),
552          .hash = {'1', '2', '3', '4', 'h', 'a', 's', 'h'}});
553     ObjectFeederAction<InstallPlan> feeder_action;
554     feeder_action.set_obj(install_plan);
555     MockPrefs prefs;
556     http_fetcher_ = new MockHttpFetcher(data_.c_str(),
557                                         data_.length(),
558                                         nullptr);
559     // Note that DownloadAction takes ownership of the passed in HttpFetcher.
560     download_action_.reset(new DownloadAction(&prefs,
561                                               fake_system_state_.boot_control(),
562                                               fake_system_state_.hardware(),
563                                               &fake_system_state_,
564                                               http_fetcher_,
565                                               false /* is_interactive */));
566     download_action_->SetTestFileWriter(&writer);
567     BondActions(&feeder_action, download_action_.get());
568     DownloadActionTestProcessorDelegate delegate(ErrorCode::kSuccess);
569     delegate.expected_data_ = brillo::Blob(data_.begin() + start_at_offset_,
570                                            data_.end());
571     delegate.path_ = output_temp_file.path();
572     processor_.set_delegate(&delegate);
573     processor_.EnqueueAction(&feeder_action);
574     processor_.EnqueueAction(download_action_.get());
575 
576     loop_.PostTask(FROM_HERE, base::Bind(
577         &P2PDownloadActionTest::StartProcessorInRunLoopForP2P,
578         base::Unretained(this)));
579     loop_.Run();
580   }
581 
582   // Mainloop used to make StartDownload() synchronous.
583   brillo::FakeMessageLoop loop_{nullptr};
584 
585   // The DownloadAction instance under test.
586   unique_ptr<DownloadAction> download_action_;
587 
588   // The HttpFetcher used in the test.
589   MockHttpFetcher* http_fetcher_;
590 
591   // The P2PManager used in the test.
592   unique_ptr<P2PManager> p2p_manager_;
593 
594   // The ActionProcessor used for running the actions.
595   ActionProcessor processor_;
596 
597   // A fake system state.
598   FakeSystemState fake_system_state_;
599 
600   // The data being downloaded.
601   string data_;
602 
603  private:
604   // Callback used in StartDownload() method.
StartProcessorInRunLoopForP2P()605   void StartProcessorInRunLoopForP2P() {
606     processor_.StartProcessing();
607     download_action_->http_fetcher()->SetOffset(start_at_offset_);
608   }
609 
610   // The requested starting offset passed to SetupDownload().
611   off_t start_at_offset_;
612 
613   chromeos_update_manager::FakeUpdateManager fake_um_;
614 };
615 
TEST_F(P2PDownloadActionTest,IsWrittenTo)616 TEST_F(P2PDownloadActionTest, IsWrittenTo) {
617   if (!test_utils::IsXAttrSupported(FilePath("/tmp"))) {
618     LOG(WARNING) << "Skipping test because /tmp does not support xattr. "
619                  << "Please update your system to support this feature.";
620     return;
621   }
622 
623   SetupDownload(0);     // starting_offset
624   StartDownload(true);  // use_p2p_to_share
625 
626   // Check the p2p file and its content matches what was sent.
627   string file_id = download_action_->p2p_file_id();
628   EXPECT_NE("", file_id);
629   EXPECT_EQ(static_cast<int>(data_.length()),
630             p2p_manager_->FileGetSize(file_id));
631   EXPECT_EQ(static_cast<int>(data_.length()),
632             p2p_manager_->FileGetExpectedSize(file_id));
633   string p2p_file_contents;
634   EXPECT_TRUE(ReadFileToString(p2p_manager_->FileGetPath(file_id),
635                                &p2p_file_contents));
636   EXPECT_EQ(data_, p2p_file_contents);
637 }
638 
TEST_F(P2PDownloadActionTest,DeleteIfHoleExists)639 TEST_F(P2PDownloadActionTest, DeleteIfHoleExists) {
640   if (!test_utils::IsXAttrSupported(FilePath("/tmp"))) {
641     LOG(WARNING) << "Skipping test because /tmp does not support xattr. "
642                  << "Please update your system to support this feature.";
643     return;
644   }
645 
646   SetupDownload(1000);  // starting_offset
647   StartDownload(true);  // use_p2p_to_share
648 
649   // DownloadAction should convey that the file is not being shared.
650   // and that we don't have any p2p files.
651   EXPECT_EQ(download_action_->p2p_file_id(), "");
652   EXPECT_EQ(p2p_manager_->CountSharedFiles(), 0);
653 }
654 
TEST_F(P2PDownloadActionTest,CanAppend)655 TEST_F(P2PDownloadActionTest, CanAppend) {
656   if (!test_utils::IsXAttrSupported(FilePath("/tmp"))) {
657     LOG(WARNING) << "Skipping test because /tmp does not support xattr. "
658                  << "Please update your system to support this feature.";
659     return;
660   }
661 
662   SetupDownload(1000);  // starting_offset
663 
664   // Prepare the file with existing data before starting to write to
665   // it via DownloadAction.
666   string file_id = utils::CalculateP2PFileId(
667       {'1', '2', '3', '4', 'h', 'a', 's', 'h'}, data_.length());
668   ASSERT_TRUE(p2p_manager_->FileShare(file_id, data_.length()));
669   string existing_data;
670   for (unsigned int i = 0; i < 1000; i++)
671     existing_data += '0' + (i % 10);
672   ASSERT_EQ(WriteFile(p2p_manager_->FileGetPath(file_id), existing_data.c_str(),
673                       1000), 1000);
674 
675   StartDownload(true);  // use_p2p_to_share
676 
677   // DownloadAction should convey the same file_id and the file should
678   // have the expected size.
679   EXPECT_EQ(download_action_->p2p_file_id(), file_id);
680   EXPECT_EQ(static_cast<ssize_t>(data_.length()),
681             p2p_manager_->FileGetSize(file_id));
682   EXPECT_EQ(static_cast<ssize_t>(data_.length()),
683             p2p_manager_->FileGetExpectedSize(file_id));
684   string p2p_file_contents;
685   // Check that the first 1000 bytes wasn't touched and that we
686   // appended the remaining as appropriate.
687   EXPECT_TRUE(ReadFileToString(p2p_manager_->FileGetPath(file_id),
688                                &p2p_file_contents));
689   EXPECT_EQ(existing_data, p2p_file_contents.substr(0, 1000));
690   EXPECT_EQ(data_.substr(1000), p2p_file_contents.substr(1000));
691 }
692 
TEST_F(P2PDownloadActionTest,DeletePartialP2PFileIfResumingWithoutP2P)693 TEST_F(P2PDownloadActionTest, DeletePartialP2PFileIfResumingWithoutP2P) {
694   if (!test_utils::IsXAttrSupported(FilePath("/tmp"))) {
695     LOG(WARNING) << "Skipping test because /tmp does not support xattr. "
696                  << "Please update your system to support this feature.";
697     return;
698   }
699 
700   SetupDownload(1000);  // starting_offset
701 
702   // Prepare the file with all existing data before starting to write
703   // to it via DownloadAction.
704   string file_id = utils::CalculateP2PFileId(
705       {'1', '2', '3', '4', 'h', 'a', 's', 'h'}, data_.length());
706   ASSERT_TRUE(p2p_manager_->FileShare(file_id, data_.length()));
707   string existing_data;
708   for (unsigned int i = 0; i < 1000; i++)
709     existing_data += '0' + (i % 10);
710   ASSERT_EQ(WriteFile(p2p_manager_->FileGetPath(file_id), existing_data.c_str(),
711                       1000), 1000);
712 
713   // Check that the file is there.
714   EXPECT_EQ(1000, p2p_manager_->FileGetSize(file_id));
715   EXPECT_EQ(1, p2p_manager_->CountSharedFiles());
716 
717   StartDownload(false);  // use_p2p_to_share
718 
719   // DownloadAction should have deleted the p2p file. Check that it's gone.
720   EXPECT_EQ(-1, p2p_manager_->FileGetSize(file_id));
721   EXPECT_EQ(0, p2p_manager_->CountSharedFiles());
722 }
723 
724 }  // namespace chromeos_update_engine
725