/* * Copyright (C) 2016 The Android Open Source Project * * Licensed under the Apache License, version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agree to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "applypatch/applypatch.h" #include "common/test_constants.h" #include "otautil/paths.h" #include "otautil/print_sha1.h" using namespace std::string_literals; static void sha1sum(const std::string& fname, std::string* sha1, size_t* fsize = nullptr) { ASSERT_TRUE(sha1 != nullptr); std::string data; ASSERT_TRUE(android::base::ReadFileToString(fname, &data)); if (fsize != nullptr) { *fsize = data.size(); } uint8_t digest[SHA_DIGEST_LENGTH]; SHA1(reinterpret_cast(data.c_str()), data.size(), digest); *sha1 = print_sha1(digest); } static void mangle_file(const std::string& fname) { std::string content(1024, '\0'); for (size_t i = 0; i < 1024; i++) { content[i] = rand() % 256; } ASSERT_TRUE(android::base::WriteStringToFile(content, fname)); } class ApplyPatchTest : public ::testing::Test { public: void SetUp() override { // set up files old_file = from_testdata_base("old.file"); new_file = from_testdata_base("new.file"); nonexistent_file = from_testdata_base("nonexistent.file"); // set up SHA constants sha1sum(old_file, &old_sha1, &old_size); sha1sum(new_file, &new_sha1, &new_size); srand(time(nullptr)); bad_sha1_a = android::base::StringPrintf("%040x", rand()); bad_sha1_b = android::base::StringPrintf("%040x", rand()); } std::string old_file; std::string new_file; std::string nonexistent_file; std::string old_sha1; std::string new_sha1; std::string bad_sha1_a; std::string bad_sha1_b; size_t old_size; size_t new_size; }; TEST_F(ApplyPatchTest, CheckModeSkip) { std::vector sha1s; ASSERT_EQ(0, applypatch_check(&old_file[0], sha1s)); } TEST_F(ApplyPatchTest, CheckModeSingle) { std::vector sha1s = { old_sha1 }; ASSERT_EQ(0, applypatch_check(&old_file[0], sha1s)); } TEST_F(ApplyPatchTest, CheckModeMultiple) { std::vector sha1s = { bad_sha1_a, old_sha1, bad_sha1_b }; ASSERT_EQ(0, applypatch_check(&old_file[0], sha1s)); } TEST_F(ApplyPatchTest, CheckModeFailure) { std::vector sha1s = { bad_sha1_a, bad_sha1_b }; ASSERT_NE(0, applypatch_check(&old_file[0], sha1s)); } TEST_F(ApplyPatchTest, CheckModeEmmcTarget) { // EMMC:old_file:size:sha1 should pass the check. std::string src_file = "EMMC:" + old_file + ":" + std::to_string(old_size) + ":" + old_sha1; std::vector sha1s; ASSERT_EQ(0, applypatch_check(src_file.c_str(), sha1s)); // EMMC:old_file:(size-1):sha1:(size+1):sha1 should fail the check. src_file = "EMMC:" + old_file + ":" + std::to_string(old_size - 1) + ":" + old_sha1 + ":" + std::to_string(old_size + 1) + ":" + old_sha1; ASSERT_EQ(1, applypatch_check(src_file.c_str(), sha1s)); // EMMC:old_file:(size-1):sha1:size:sha1:(size+1):sha1 should pass the check. src_file = "EMMC:" + old_file + ":" + std::to_string(old_size - 1) + ":" + old_sha1 + ":" + std::to_string(old_size) + ":" + old_sha1 + ":" + std::to_string(old_size + 1) + ":" + old_sha1; ASSERT_EQ(0, applypatch_check(src_file.c_str(), sha1s)); // EMMC:old_file:(size+1):sha1:(size-1):sha1:size:sha1 should pass the check. src_file = "EMMC:" + old_file + ":" + std::to_string(old_size + 1) + ":" + old_sha1 + ":" + std::to_string(old_size - 1) + ":" + old_sha1 + ":" + std::to_string(old_size) + ":" + old_sha1; ASSERT_EQ(0, applypatch_check(src_file.c_str(), sha1s)); // EMMC:new_file:(size+1):old_sha1:(size-1):old_sha1:size:old_sha1:size:new_sha1 // should pass the check. src_file = "EMMC:" + new_file + ":" + std::to_string(old_size + 1) + ":" + old_sha1 + ":" + std::to_string(old_size - 1) + ":" + old_sha1 + ":" + std::to_string(old_size) + ":" + old_sha1 + ":" + std::to_string(new_size) + ":" + new_sha1; ASSERT_EQ(0, applypatch_check(src_file.c_str(), sha1s)); } class ApplyPatchCacheTest : public ApplyPatchTest { protected: void SetUp() override { ApplyPatchTest::SetUp(); Paths::Get().set_cache_temp_source(old_file); } }; TEST_F(ApplyPatchCacheTest, CheckCacheCorruptedSourceSingle) { TemporaryFile temp_file; mangle_file(temp_file.path); std::vector sha1s_single = { old_sha1 }; ASSERT_EQ(0, applypatch_check(temp_file.path, sha1s_single)); ASSERT_EQ(0, applypatch_check(nonexistent_file.c_str(), sha1s_single)); } TEST_F(ApplyPatchCacheTest, CheckCacheCorruptedSourceMultiple) { TemporaryFile temp_file; mangle_file(temp_file.path); std::vector sha1s_multiple = { bad_sha1_a, old_sha1, bad_sha1_b }; ASSERT_EQ(0, applypatch_check(temp_file.path, sha1s_multiple)); ASSERT_EQ(0, applypatch_check(nonexistent_file.c_str(), sha1s_multiple)); } TEST_F(ApplyPatchCacheTest, CheckCacheCorruptedSourceFailure) { TemporaryFile temp_file; mangle_file(temp_file.path); std::vector sha1s_failure = { bad_sha1_a, bad_sha1_b }; ASSERT_NE(0, applypatch_check(temp_file.path, sha1s_failure)); ASSERT_NE(0, applypatch_check(nonexistent_file.c_str(), sha1s_failure)); } class FreeCacheTest : public ::testing::Test { protected: static constexpr size_t PARTITION_SIZE = 4096 * 10; // Returns a sorted list of files in |dirname|. static std::vector FindFilesInDir(const std::string& dirname) { std::vector file_list; std::unique_ptr d(opendir(dirname.c_str()), closedir); struct dirent* de; while ((de = readdir(d.get())) != 0) { std::string path = dirname + "/" + de->d_name; struct stat st; if (stat(path.c_str(), &st) == 0 && S_ISREG(st.st_mode)) { file_list.emplace_back(de->d_name); } } std::sort(file_list.begin(), file_list.end()); return file_list; } static void AddFilesToDir(const std::string& dir, const std::vector& files) { std::string zeros(4096, 0); for (const auto& file : files) { std::string path = dir + "/" + file; ASSERT_TRUE(android::base::WriteStringToFile(zeros, path)); } } void SetUp() override { Paths::Get().set_cache_log_directory(mock_log_dir.path); } // A mock method to calculate the free space. It assumes the partition has a total size of 40960 // bytes and all files are 4096 bytes in size. size_t MockFreeSpaceChecker(const std::string& dirname) { std::vector files = FindFilesInDir(dirname); return PARTITION_SIZE - 4096 * files.size(); } TemporaryDir mock_cache; TemporaryDir mock_log_dir; }; TEST_F(FreeCacheTest, FreeCacheSmoke) { std::vector files = { "file1", "file2", "file3" }; AddFilesToDir(mock_cache.path, files); ASSERT_EQ(files, FindFilesInDir(mock_cache.path)); ASSERT_EQ(4096 * 7, MockFreeSpaceChecker(mock_cache.path)); ASSERT_TRUE(RemoveFilesInDirectory(4096 * 9, mock_cache.path, [&](const std::string& dir) { return this->MockFreeSpaceChecker(dir); })); ASSERT_EQ(std::vector{ "file3" }, FindFilesInDir(mock_cache.path)); ASSERT_EQ(4096 * 9, MockFreeSpaceChecker(mock_cache.path)); } TEST_F(FreeCacheTest, FreeCacheOpenFile) { std::vector files = { "file1", "file2" }; AddFilesToDir(mock_cache.path, files); ASSERT_EQ(files, FindFilesInDir(mock_cache.path)); ASSERT_EQ(4096 * 8, MockFreeSpaceChecker(mock_cache.path)); std::string file1_path = mock_cache.path + "/file1"s; android::base::unique_fd fd(open(file1_path.c_str(), O_RDONLY)); // file1 can't be deleted as it's opened by us. ASSERT_FALSE(RemoveFilesInDirectory(4096 * 10, mock_cache.path, [&](const std::string& dir) { return this->MockFreeSpaceChecker(dir); })); ASSERT_EQ(std::vector{ "file1" }, FindFilesInDir(mock_cache.path)); } TEST_F(FreeCacheTest, FreeCacheLogsSmoke) { std::vector log_files = { "last_log", "last_log.1", "last_kmsg.2", "last_log.5", "last_log.10" }; AddFilesToDir(mock_log_dir.path, log_files); ASSERT_EQ(4096 * 5, MockFreeSpaceChecker(mock_log_dir.path)); ASSERT_TRUE(RemoveFilesInDirectory(4096 * 8, mock_log_dir.path, [&](const std::string& dir) { return this->MockFreeSpaceChecker(dir); })); // Logs with a higher index will be deleted first std::vector expected = { "last_log", "last_log.1" }; ASSERT_EQ(expected, FindFilesInDir(mock_log_dir.path)); ASSERT_EQ(4096 * 8, MockFreeSpaceChecker(mock_log_dir.path)); } TEST_F(FreeCacheTest, FreeCacheLogsStringComparison) { std::vector log_files = { "last_log.1", "last_kmsg.1", "last_log.not_number", "last_kmsgrandom" }; AddFilesToDir(mock_log_dir.path, log_files); ASSERT_EQ(4096 * 6, MockFreeSpaceChecker(mock_log_dir.path)); ASSERT_TRUE(RemoveFilesInDirectory(4096 * 9, mock_log_dir.path, [&](const std::string& dir) { return this->MockFreeSpaceChecker(dir); })); // Logs with incorrect format will be deleted first; and the last_kmsg with the same index is // deleted before last_log. std::vector expected = { "last_log.1" }; ASSERT_EQ(expected, FindFilesInDir(mock_log_dir.path)); ASSERT_EQ(4096 * 9, MockFreeSpaceChecker(mock_log_dir.path)); } TEST_F(FreeCacheTest, FreeCacheLogsOtherFiles) { std::vector log_files = { "last_install", "command", "block.map", "last_log", "last_kmsg.1" }; AddFilesToDir(mock_log_dir.path, log_files); ASSERT_EQ(4096 * 5, MockFreeSpaceChecker(mock_log_dir.path)); ASSERT_FALSE(RemoveFilesInDirectory(4096 * 8, mock_log_dir.path, [&](const std::string& dir) { return this->MockFreeSpaceChecker(dir); })); // Non log files in /cache/recovery won't be deleted. std::vector expected = { "block.map", "command", "last_install" }; ASSERT_EQ(expected, FindFilesInDir(mock_log_dir.path)); }