blob: 4549272d98dd50ea44ef3c149f7a9a6af33c6109 [file] [log] [blame]
Mike Frysinger8155d082012-04-06 15:23:18 -04001// Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
adlr@google.com3defe6a2009-12-04 20:57:17 +00002// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
Jay Srinivasan1c0fe792013-03-28 16:45:25 -07005#include "update_engine/postinstall_runner_action.h"
6
adlr@google.com3defe6a2009-12-04 20:57:17 +00007#include <sys/stat.h>
8#include <sys/types.h>
9#include <unistd.h>
Andrew de los Reyesbfabc302011-01-31 17:23:50 -080010
Ben Chan02f7c1d2014-10-18 15:18:02 -070011#include <memory>
adlr@google.com3defe6a2009-12-04 20:57:17 +000012#include <string>
13#include <vector>
Andrew de los Reyesbfabc302011-01-31 17:23:50 -080014
Ben Chan06c76a42014-09-05 08:21:06 -070015#include <base/files/file_util.h>
Alex Vakulenko75039d72014-03-25 12:36:28 -070016#include <base/strings/string_util.h>
17#include <base/strings/stringprintf.h>
Alex Deymo29b81532015-07-09 11:51:49 -070018#include <chromeos/bind_lambda.h>
19#include <chromeos/message_loops/glib_message_loop.h>
20#include <chromeos/message_loops/message_loop_utils.h>
adlr@google.com3defe6a2009-12-04 20:57:17 +000021#include <gtest/gtest.h>
Andrew de los Reyesbfabc302011-01-31 17:23:50 -080022
Jay Srinivasan1c0fe792013-03-28 16:45:25 -070023#include "update_engine/constants.h"
adlr@google.com3defe6a2009-12-04 20:57:17 +000024#include "update_engine/test_utils.h"
25#include "update_engine/utils.h"
26
Alex Deymo29b81532015-07-09 11:51:49 -070027using chromeos::MessageLoop;
Alex Deymo10875d92014-11-10 21:52:57 -080028using chromeos_update_engine::test_utils::System;
29using chromeos_update_engine::test_utils::WriteFileString;
adlr@google.com3defe6a2009-12-04 20:57:17 +000030using std::string;
Ben Chan02f7c1d2014-10-18 15:18:02 -070031using std::unique_ptr;
adlr@google.com3defe6a2009-12-04 20:57:17 +000032using std::vector;
33
34namespace chromeos_update_engine {
35
36class PostinstallRunnerActionTest : public ::testing::Test {
Alex Deymo29b81532015-07-09 11:51:49 -070037 protected:
38 void SetUp() override {
39 loop_.SetAsCurrent();
40 }
41
42 void TearDown() override {
43 EXPECT_EQ(0, chromeos::MessageLoopRunMaxIterations(&loop_, 1));
44 }
45
Jay Srinivasan1c0fe792013-03-28 16:45:25 -070046 // DoTest with various combinations of do_losetup, err_code and
47 // powerwash_required.
48 void DoTest(bool do_losetup, int err_code, bool powerwash_required);
Gilad Arnold30dedd82013-07-03 06:19:09 -070049
50 private:
51 static const char* kImageMountPointTemplate;
Alex Deymo29b81532015-07-09 11:51:49 -070052
53 chromeos::GlibMessageLoop loop_;
adlr@google.com3defe6a2009-12-04 20:57:17 +000054};
55
56class PostinstActionProcessorDelegate : public ActionProcessorDelegate {
57 public:
Darin Petkovc1a8b422010-07-19 11:34:49 -070058 PostinstActionProcessorDelegate()
Alex Deymo29b81532015-07-09 11:51:49 -070059 : code_(ErrorCode::kError),
Darin Petkovc1a8b422010-07-19 11:34:49 -070060 code_set_(false) {}
Darin Petkov6f03a3b2010-11-10 14:27:14 -080061 void ProcessingDone(const ActionProcessor* processor,
David Zeuthena99981f2013-04-29 13:42:47 -070062 ErrorCode code) {
Alex Deymo29b81532015-07-09 11:51:49 -070063 MessageLoop::current()->BreakLoop();
Darin Petkov6f03a3b2010-11-10 14:27:14 -080064 }
adlr@google.com3defe6a2009-12-04 20:57:17 +000065 void ActionCompleted(ActionProcessor* processor,
66 AbstractAction* action,
David Zeuthena99981f2013-04-29 13:42:47 -070067 ErrorCode code) {
adlr@google.com3defe6a2009-12-04 20:57:17 +000068 if (action->Type() == PostinstallRunnerAction::StaticType()) {
Darin Petkovc1a8b422010-07-19 11:34:49 -070069 code_ = code;
70 code_set_ = true;
adlr@google.com3defe6a2009-12-04 20:57:17 +000071 }
72 }
David Zeuthena99981f2013-04-29 13:42:47 -070073 ErrorCode code_;
Darin Petkovc1a8b422010-07-19 11:34:49 -070074 bool code_set_;
adlr@google.com3defe6a2009-12-04 20:57:17 +000075};
76
77TEST_F(PostinstallRunnerActionTest, RunAsRootSimpleTest) {
Jay Srinivasan1c0fe792013-03-28 16:45:25 -070078 DoTest(true, 0, false);
79}
80
81TEST_F(PostinstallRunnerActionTest, RunAsRootPowerwashRequiredTest) {
Jay Srinivasan1c0fe792013-03-28 16:45:25 -070082 DoTest(true, 0, true);
adlr@google.com3defe6a2009-12-04 20:57:17 +000083}
84
85TEST_F(PostinstallRunnerActionTest, RunAsRootCantMountTest) {
Jay Srinivasan1c0fe792013-03-28 16:45:25 -070086 DoTest(false, 0, true);
adlr@google.com3defe6a2009-12-04 20:57:17 +000087}
88
89TEST_F(PostinstallRunnerActionTest, RunAsRootErrScriptTest) {
Jay Srinivasan1c0fe792013-03-28 16:45:25 -070090 DoTest(true, 1, false);
adlr@google.com3defe6a2009-12-04 20:57:17 +000091}
92
Andrew de los Reyesc1d5c932011-04-20 17:15:47 -070093TEST_F(PostinstallRunnerActionTest, RunAsRootFirmwareBErrScriptTest) {
Jay Srinivasan1c0fe792013-03-28 16:45:25 -070094 DoTest(true, 3, false);
Andrew de los Reyesc1d5c932011-04-20 17:15:47 -070095}
96
Don Garrett81018e02013-07-30 18:46:31 -070097TEST_F(PostinstallRunnerActionTest, RunAsRootFirmwareROErrScriptTest) {
Don Garrett81018e02013-07-30 18:46:31 -070098 DoTest(true, 4, false);
99}
100
Gilad Arnold30dedd82013-07-03 06:19:09 -0700101const char* PostinstallRunnerActionTest::kImageMountPointTemplate =
102 "au_destination-XXXXXX";
103
Jay Srinivasan1c0fe792013-03-28 16:45:25 -0700104void PostinstallRunnerActionTest::DoTest(
105 bool do_losetup,
106 int err_code,
107 bool powerwash_required) {
adlr@google.com3defe6a2009-12-04 20:57:17 +0000108 ASSERT_EQ(0, getuid()) << "Run me as root. Ideally don't run other tests "
109 << "as root, tho.";
Jay Srinivasan1c0fe792013-03-28 16:45:25 -0700110 // True if the post-install action is expected to succeed.
111 bool should_succeed = do_losetup && !err_code;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000112
Gilad Arnold30dedd82013-07-03 06:19:09 -0700113 string orig_cwd;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000114 {
115 vector<char> buf(1000);
Alex Vakulenkof68bbbc2015-02-09 12:53:18 -0800116 ASSERT_EQ(buf.data(), getcwd(buf.data(), buf.size()));
117 orig_cwd = string(buf.data(), strlen(buf.data()));
adlr@google.com3defe6a2009-12-04 20:57:17 +0000118 }
119
Gilad Arnold30dedd82013-07-03 06:19:09 -0700120 // Create a unique named working directory and chdir into it.
121 string cwd;
122 ASSERT_TRUE(utils::MakeTempDirectory(
Gilad Arnolda6742b32014-01-11 00:18:34 -0800123 "postinstall_runner_action_unittest-XXXXXX",
Gilad Arnold30dedd82013-07-03 06:19:09 -0700124 &cwd));
Alex Deymo10875d92014-11-10 21:52:57 -0800125 ASSERT_EQ(0, test_utils::Chdir(cwd));
adlr@google.com3defe6a2009-12-04 20:57:17 +0000126
Gilad Arnold30dedd82013-07-03 06:19:09 -0700127 // Create a 10MiB sparse file to be used as image; format it as ext2.
Alex Deymo10875d92014-11-10 21:52:57 -0800128 ASSERT_EQ(0, System(
Alex Deymo1f93d032015-03-10 18:58:32 -0700129 "dd if=/dev/zero of=image.dat seek=10485759 bs=1 count=1 "
130 "status=none"));
Alex Deymo10875d92014-11-10 21:52:57 -0800131 ASSERT_EQ(0, System("mkfs.ext2 -F image.dat"));
adlr@google.com3defe6a2009-12-04 20:57:17 +0000132
Gilad Arnold30dedd82013-07-03 06:19:09 -0700133 // Create a uniquely named image mount point, mount the image.
134 ASSERT_EQ(0, System(string("mkdir -p ") + kStatefulPartition));
135 string mountpoint;
136 ASSERT_TRUE(utils::MakeTempDirectory(
137 string(kStatefulPartition) + "/" + kImageMountPointTemplate,
138 &mountpoint));
adlr@google.com3defe6a2009-12-04 20:57:17 +0000139 ASSERT_EQ(0, System(string("mount -o loop image.dat ") + mountpoint));
140
Gilad Arnold30dedd82013-07-03 06:19:09 -0700141 // Generate a fake postinst script inside the image.
142 string script = (err_code ?
Alex Vakulenko75039d72014-03-25 12:36:28 -0700143 base::StringPrintf("#!/bin/bash\nexit %d", err_code) :
144 base::StringPrintf(
145 "#!/bin/bash\n"
146 "mount | grep au_postint_mount | grep ext2\n"
147 "if [ $? -eq 0 ]; then\n"
148 " touch %s/postinst_called\n"
149 "fi\n",
150 cwd.c_str()));
Gilad Arnold30dedd82013-07-03 06:19:09 -0700151 const string script_file_name = mountpoint + "/postinst";
152 ASSERT_TRUE(WriteFileString(script_file_name, script));
153 ASSERT_EQ(0, System(string("chmod a+x ") + script_file_name));
adlr@google.com3defe6a2009-12-04 20:57:17 +0000154
Gilad Arnold30dedd82013-07-03 06:19:09 -0700155 // Unmount image; do not remove the uniquely named directory as it will be
156 // reused during the test.
Ben Chan77a1eba2012-10-07 22:54:55 -0700157 ASSERT_TRUE(utils::UnmountFilesystem(mountpoint));
adlr@google.com3defe6a2009-12-04 20:57:17 +0000158
adlr@google.com3defe6a2009-12-04 20:57:17 +0000159 // get a loop device we can use for the install device
Don Garrett58e8b1f2012-01-31 16:38:16 -0800160 string dev = "/dev/null";
adlr@google.com3defe6a2009-12-04 20:57:17 +0000161
Alex Deymo10875d92014-11-10 21:52:57 -0800162 unique_ptr<test_utils::ScopedLoopbackDeviceBinder> loop_releaser;
Darin Petkov56dad722011-03-03 16:03:56 -0800163 if (do_losetup) {
Alex Deymo10875d92014-11-10 21:52:57 -0800164 loop_releaser.reset(new test_utils::ScopedLoopbackDeviceBinder(
165 cwd + "/image.dat", &dev));
Darin Petkov56dad722011-03-03 16:03:56 -0800166 }
adlr@google.com3defe6a2009-12-04 20:57:17 +0000167
Gilad Arnold30dedd82013-07-03 06:19:09 -0700168 // We use a test-specific powerwash marker file, to avoid race conditions.
169 string powerwash_marker_file = mountpoint + "/factory_install_reset";
170 LOG(INFO) << ">>> powerwash_marker_file=" << powerwash_marker_file;
171
adlr@google.com3defe6a2009-12-04 20:57:17 +0000172 ActionProcessor processor;
Andrew de los Reyesf9714432010-05-04 10:21:23 -0700173 ObjectFeederAction<InstallPlan> feeder_action;
174 InstallPlan install_plan;
175 install_plan.install_path = dev;
Chris Sosa000ecb32014-04-23 12:21:18 -0700176 install_plan.download_url = "http://devserver:8080/update";
Jay Srinivasan1c0fe792013-03-28 16:45:25 -0700177 install_plan.powerwash_required = powerwash_required;
Andrew de los Reyesf9714432010-05-04 10:21:23 -0700178 feeder_action.set_obj(install_plan);
Gilad Arnold30dedd82013-07-03 06:19:09 -0700179 PostinstallRunnerAction runner_action(powerwash_marker_file.c_str());
adlr@google.com3defe6a2009-12-04 20:57:17 +0000180 BondActions(&feeder_action, &runner_action);
Andrew de los Reyesf9714432010-05-04 10:21:23 -0700181 ObjectCollectorAction<InstallPlan> collector_action;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000182 BondActions(&runner_action, &collector_action);
183 PostinstActionProcessorDelegate delegate;
184 processor.EnqueueAction(&feeder_action);
185 processor.EnqueueAction(&runner_action);
186 processor.EnqueueAction(&collector_action);
187 processor.set_delegate(&delegate);
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800188
Alex Deymo29b81532015-07-09 11:51:49 -0700189 loop_.PostTask(FROM_HERE,
190 base::Bind([&processor] { processor.StartProcessing(); }));
191 loop_.Run();
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800192 ASSERT_FALSE(processor.IsRunning());
adlr@google.com3defe6a2009-12-04 20:57:17 +0000193
Darin Petkovc1a8b422010-07-19 11:34:49 -0700194 EXPECT_TRUE(delegate.code_set_);
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700195 EXPECT_EQ(should_succeed, delegate.code_ == ErrorCode::kSuccess);
Jay Srinivasan1c0fe792013-03-28 16:45:25 -0700196 EXPECT_EQ(should_succeed, !collector_action.object().install_path.empty());
197 if (should_succeed)
Andrew de los Reyesf9714432010-05-04 10:21:23 -0700198 EXPECT_TRUE(install_plan == collector_action.object());
Jay Srinivasan1c0fe792013-03-28 16:45:25 -0700199
Alex Vakulenko75039d72014-03-25 12:36:28 -0700200 const base::FilePath kPowerwashMarkerPath(powerwash_marker_file);
Jay Srinivasan1c0fe792013-03-28 16:45:25 -0700201 string actual_cmd;
202 if (should_succeed && powerwash_required) {
Alex Vakulenko75039d72014-03-25 12:36:28 -0700203 EXPECT_TRUE(base::ReadFileToString(kPowerwashMarkerPath, &actual_cmd));
Jay Srinivasan1c0fe792013-03-28 16:45:25 -0700204 EXPECT_EQ(kPowerwashCommand, actual_cmd);
205 } else {
206 EXPECT_FALSE(
Alex Vakulenko75039d72014-03-25 12:36:28 -0700207 base::ReadFileToString(kPowerwashMarkerPath, &actual_cmd));
adlr@google.com3defe6a2009-12-04 20:57:17 +0000208 }
Jay Srinivasan1c0fe792013-03-28 16:45:25 -0700209
Andrew de los Reyesc1d5c932011-04-20 17:15:47 -0700210 if (err_code == 2)
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700211 EXPECT_EQ(ErrorCode::kPostinstallBootedFromFirmwareB, delegate.code_);
adlr@google.com3defe6a2009-12-04 20:57:17 +0000212
213 struct stat stbuf;
214 int rc = lstat((string(cwd) + "/postinst_called").c_str(), &stbuf);
Jay Srinivasan1c0fe792013-03-28 16:45:25 -0700215 if (should_succeed)
adlr@google.com3defe6a2009-12-04 20:57:17 +0000216 ASSERT_EQ(0, rc);
217 else
218 ASSERT_LT(rc, 0);
219
Darin Petkov56dad722011-03-03 16:03:56 -0800220 if (do_losetup) {
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700221 loop_releaser.reset(nullptr);
Darin Petkov56dad722011-03-03 16:03:56 -0800222 }
Gilad Arnold30dedd82013-07-03 06:19:09 -0700223
224 // Remove unique stateful directory.
225 ASSERT_EQ(0, System(string("rm -fr ") + mountpoint));
226
227 // Remove the temporary work directory.
Alex Deymo10875d92014-11-10 21:52:57 -0800228 ASSERT_EQ(0, test_utils::Chdir(orig_cwd));
Gilad Arnold30dedd82013-07-03 06:19:09 -0700229 ASSERT_EQ(0, System(string("rm -fr ") + cwd));
adlr@google.com3defe6a2009-12-04 20:57:17 +0000230}
231
232// Death tests don't seem to be working on Hardy
233TEST_F(PostinstallRunnerActionTest, DISABLED_RunAsRootDeathTest) {
234 ASSERT_EQ(0, getuid());
Darin Petkov6d5dbf62010-11-08 16:09:55 -0800235 PostinstallRunnerAction runner_action;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000236 ASSERT_DEATH({ runner_action.TerminateProcessing(); },
237 "postinstall_runner_action.h:.*] Check failed");
238}
239
240} // namespace chromeos_update_engine