| // | 
 | // Copyright (C) 2014 The Android Open Source Project | 
 | // | 
 | // Licensed under the Apache License, Version 2.0 (the "License"); | 
 | // you may not use this file except in compliance with the License. | 
 | // You may obtain a copy of the License at | 
 | // | 
 | //      http://www.apache.org/licenses/LICENSE-2.0 | 
 | // | 
 | // Unless required by applicable law or agreed to in writing, software | 
 | // distributed under the License is distributed on an "AS IS" BASIS, | 
 | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
 | // See the License for the specific language governing permissions and | 
 | // limitations under the License. | 
 | // | 
 |  | 
 | #ifndef UPDATE_ENGINE_UPDATE_MANAGER_CHROMEOS_POLICY_H_ | 
 | #define UPDATE_ENGINE_UPDATE_MANAGER_CHROMEOS_POLICY_H_ | 
 |  | 
 | #include <string> | 
 |  | 
 | #include <base/time/time.h> | 
 | #include <gtest/gtest_prod.h>  // for FRIEND_TEST | 
 |  | 
 | #include "update_engine/update_manager/policy.h" | 
 | #include "update_engine/update_manager/prng.h" | 
 |  | 
 | namespace chromeos_update_manager { | 
 |  | 
 | // Output information from UpdateBackoffAndDownloadUrl. | 
 | struct UpdateBackoffAndDownloadUrlResult { | 
 |   // Whether the failed attempt count (maintained by the caller) needs to be | 
 |   // incremented. | 
 |   bool do_increment_failures; | 
 |   // The current backoff expiry. Null if backoff is not in effect. | 
 |   base::Time backoff_expiry; | 
 |   // The new URL index to use and number of download errors associated with it. | 
 |   // Significant iff |do_increment_failures| is false and |backoff_expiry| is | 
 |   // null. Negative value means no usable URL was found. | 
 |   int url_idx; | 
 |   int url_num_errors; | 
 | }; | 
 |  | 
 | // Parameters for update scattering, as returned by UpdateScattering. | 
 | struct UpdateScatteringResult { | 
 |   bool is_scattering; | 
 |   base::TimeDelta wait_period; | 
 |   int check_threshold; | 
 | }; | 
 |  | 
 | // ChromeOSPolicy implements the policy-related logic used in ChromeOS. | 
 | class ChromeOSPolicy : public Policy { | 
 |  public: | 
 |   ChromeOSPolicy() {} | 
 |   ~ChromeOSPolicy() override {} | 
 |  | 
 |   // Policy overrides. | 
 |   EvalStatus UpdateCheckAllowed( | 
 |       EvaluationContext* ec, State* state, std::string* error, | 
 |       UpdateCheckParams* result) const override; | 
 |  | 
 |   EvalStatus UpdateCanStart( | 
 |       EvaluationContext* ec, | 
 |       State* state, | 
 |       std::string* error, | 
 |       UpdateDownloadParams* result, | 
 |       UpdateState update_state) const override; | 
 |  | 
 |   EvalStatus UpdateDownloadAllowed( | 
 |       EvaluationContext* ec, | 
 |       State* state, | 
 |       std::string* error, | 
 |       bool* result) const override; | 
 |  | 
 |   EvalStatus P2PEnabled( | 
 |       EvaluationContext* ec, | 
 |       State* state, | 
 |       std::string* error, | 
 |       bool* result) const override; | 
 |  | 
 |   EvalStatus P2PEnabledChanged( | 
 |       EvaluationContext* ec, | 
 |       State* state, | 
 |       std::string* error, | 
 |       bool* result, | 
 |       bool prev_result) const override; | 
 |  | 
 |  protected: | 
 |   // Policy override. | 
 |   std::string PolicyName() const override { return "ChromeOSPolicy"; } | 
 |  | 
 |  private: | 
 |   friend class UmChromeOSPolicyTest; | 
 |   FRIEND_TEST(UmChromeOSPolicyTest, | 
 |               FirstCheckIsAtMostInitialIntervalAfterStart); | 
 |   FRIEND_TEST(UmChromeOSPolicyTest, RecurringCheckBaseIntervalAndFuzz); | 
 |   FRIEND_TEST(UmChromeOSPolicyTest, RecurringCheckBackoffIntervalAndFuzz); | 
 |   FRIEND_TEST(UmChromeOSPolicyTest, RecurringCheckServerDictatedPollInterval); | 
 |   FRIEND_TEST(UmChromeOSPolicyTest, ExponentialBackoffIsCapped); | 
 |   FRIEND_TEST(UmChromeOSPolicyTest, UpdateCheckAllowedWaitsForTheTimeout); | 
 |   FRIEND_TEST(UmChromeOSPolicyTest, UpdateCheckAllowedWaitsForOOBE); | 
 |   FRIEND_TEST(UmChromeOSPolicyTest, | 
 |               UpdateCanStartNotAllowedScatteringNewWaitPeriodApplies); | 
 |   FRIEND_TEST(UmChromeOSPolicyTest, | 
 |               UpdateCanStartNotAllowedScatteringPrevWaitPeriodStillApplies); | 
 |   FRIEND_TEST(UmChromeOSPolicyTest, | 
 |               UpdateCanStartNotAllowedScatteringNewCountThresholdApplies); | 
 |   FRIEND_TEST(UmChromeOSPolicyTest, | 
 |               UpdateCanStartNotAllowedScatteringPrevCountThresholdStillApplies); | 
 |   FRIEND_TEST(UmChromeOSPolicyTest, UpdateCanStartAllowedScatteringSatisfied); | 
 |   FRIEND_TEST(UmChromeOSPolicyTest, | 
 |               UpdateCanStartAllowedInteractivePreventsScattering); | 
 |   FRIEND_TEST(UmChromeOSPolicyTest, | 
 |               UpdateCanStartAllowedP2PDownloadingBlockedDueToNumAttempts); | 
 |   FRIEND_TEST(UmChromeOSPolicyTest, | 
 |               UpdateCanStartAllowedP2PDownloadingBlockedDueToAttemptsPeriod); | 
 |  | 
 |   // Auxiliary constant (zero by default). | 
 |   const base::TimeDelta kZeroInterval; | 
 |  | 
 |   // Default update check timeout interval/fuzz values used to compute the | 
 |   // NextUpdateCheckTime(), in seconds. Actual fuzz is within +/- half of the | 
 |   // indicated value. | 
 |   static const int kTimeoutInitialInterval; | 
 |   static const int kTimeoutPeriodicInterval; | 
 |   static const int kTimeoutMaxBackoffInterval; | 
 |   static const int kTimeoutRegularFuzz; | 
 |  | 
 |   // Maximum update attempt backoff interval and fuzz. | 
 |   static const int kAttemptBackoffMaxIntervalInDays; | 
 |   static const int kAttemptBackoffFuzzInHours; | 
 |  | 
 |   // Maximum number of times we'll allow using P2P for the same update payload. | 
 |   static const int kMaxP2PAttempts; | 
 |   // Maximum period of time allowed for download a payload via P2P, in seconds. | 
 |   static const int kMaxP2PAttemptsPeriodInSeconds; | 
 |  | 
 |   // A private policy implementation returning the wallclock timestamp when | 
 |   // the next update check should happen. | 
 |   // TODO(garnold) We should probably change that to infer a monotonic | 
 |   // timestamp, which will make the update check intervals more resilient to | 
 |   // clock skews. Might require switching some of the variables exported by the | 
 |   // UpdaterProvider to report monotonic time, as well. | 
 |   EvalStatus NextUpdateCheckTime(EvaluationContext* ec, State* state, | 
 |                                  std::string* error, | 
 |                                  base::Time* next_update_check) const; | 
 |  | 
 |   // Returns a TimeDelta based on the provided |interval| seconds +/- half | 
 |   // |fuzz| seconds. The return value is guaranteed to be a non-negative | 
 |   // TimeDelta. | 
 |   static base::TimeDelta FuzzedInterval(PRNG* prng, int interval, int fuzz); | 
 |  | 
 |   // A private policy for determining backoff and the download URL to use. | 
 |   // Within |update_state|, |backoff_expiry| and |is_backoff_disabled| are used | 
 |   // for determining whether backoff is still in effect; if not, | 
 |   // |download_errors| is scanned past |failures_last_updated|, and a new | 
 |   // download URL from |download_urls| is found and written to |result->url_idx| | 
 |   // (-1 means no usable URL exists); |download_errors_max| determines the | 
 |   // maximum number of attempts per URL, according to the Omaha response. If an | 
 |   // update failure is identified then |result->do_increment_failures| is set to | 
 |   // true; if backoff is enabled, a new backoff period is computed (from the | 
 |   // time of failure) based on |num_failures|. Otherwise, backoff expiry is | 
 |   // nullified, indicating that no backoff is in effect. | 
 |   // | 
 |   // If backing off but the previous backoff expiry is unchanged, returns | 
 |   // |EvalStatus::kAskMeAgainLater|. Otherwise: | 
 |   // | 
 |   // * If backing off with a new expiry time, then |result->backoff_expiry| is | 
 |   //   set to this time. | 
 |   // | 
 |   // * Else, |result->backoff_expiry| is set to null, indicating that no backoff | 
 |   //   is in effect. | 
 |   // | 
 |   // In any of these cases, returns |EvalStatus::kSucceeded|. If an error | 
 |   // occurred, returns |EvalStatus::kFailed|. | 
 |   EvalStatus UpdateBackoffAndDownloadUrl( | 
 |       EvaluationContext* ec, State* state, std::string* error, | 
 |       UpdateBackoffAndDownloadUrlResult* result, | 
 |       const UpdateState& update_state) const; | 
 |  | 
 |   // A private policy for checking whether scattering is due. Writes in |result| | 
 |   // the decision as to whether or not to scatter; a wallclock-based scatter | 
 |   // wait period, which ranges from zero (do not wait) and no greater than the | 
 |   // current scatter factor provided by the device policy (if available) or the | 
 |   // maximum wait period determined by Omaha; and an update check-based | 
 |   // threshold between zero (no threshold) and the maximum number determined by | 
 |   // the update engine. Within |update_state|, |scatter_wait_period| should | 
 |   // contain the last scattering period returned by this function, or zero if no | 
 |   // wait period is known; |scatter_check_threshold| is the last update check | 
 |   // threshold, or zero if no such threshold is known. If not scattering, or if | 
 |   // any of the scattering values has changed, returns |EvalStatus::kSucceeded|; | 
 |   // otherwise, |EvalStatus::kAskMeAgainLater|. | 
 |   EvalStatus UpdateScattering(EvaluationContext* ec, State* state, | 
 |                               std::string* error, | 
 |                               UpdateScatteringResult* result, | 
 |                               const UpdateState& update_state) const; | 
 |  | 
 |   DISALLOW_COPY_AND_ASSIGN(ChromeOSPolicy); | 
 | }; | 
 |  | 
 | }  // namespace chromeos_update_manager | 
 |  | 
 | #endif  // UPDATE_ENGINE_UPDATE_MANAGER_CHROMEOS_POLICY_H_ |