Alex Deymo | aea4c1c | 2015-08-19 20:24:43 -0700 | [diff] [blame] | 1 | // |
| 2 | // Copyright (C) 2012 The Android Open Source Project |
| 3 | // |
| 4 | // Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | // you may not use this file except in compliance with the License. |
| 6 | // You may obtain a copy of the License at |
| 7 | // |
| 8 | // http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | // |
| 10 | // Unless required by applicable law or agreed to in writing, software |
| 11 | // distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | // See the License for the specific language governing permissions and |
| 14 | // limitations under the License. |
| 15 | // |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 16 | |
| 17 | #include "update_engine/update_attempter.h" |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 18 | |
Ben Chan | 9abb763 | 2014-08-07 00:10:53 -0700 | [diff] [blame] | 19 | #include <stdint.h> |
| 20 | |
Alex Vakulenko | 59e253e | 2014-02-24 10:40:21 -0800 | [diff] [blame] | 21 | #include <algorithm> |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 22 | #include <map> |
Alex Deymo | bc91a27 | 2014-05-20 16:45:33 -0700 | [diff] [blame] | 23 | #include <memory> |
| 24 | #include <string> |
Andrew | a8d7df3 | 2020-03-15 20:10:01 -0700 | [diff] [blame] | 25 | #include <unordered_set> |
Alex Vakulenko | d2779df | 2014-06-16 13:19:00 -0700 | [diff] [blame] | 26 | #include <utility> |
Alex Deymo | 44666f9 | 2014-07-22 20:29:24 -0700 | [diff] [blame] | 27 | #include <vector> |
Darin Petkov | 9d65b7b | 2010-07-20 09:13:01 -0700 | [diff] [blame] | 28 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 29 | #include <base/bind.h> |
Denis Nikitin | 8f2fa74 | 2019-05-29 10:36:52 -0700 | [diff] [blame] | 30 | #include <base/compiler_specific.h> |
Andrew | a8d7df3 | 2020-03-15 20:10:01 -0700 | [diff] [blame] | 31 | #include <base/files/file_enumerator.h> |
Ben Chan | 06c76a4 | 2014-09-05 08:21:06 -0700 | [diff] [blame] | 32 | #include <base/files/file_util.h> |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 33 | #include <base/logging.h> |
Andrew de los Reyes | 4516810 | 2010-11-22 11:13:50 -0800 | [diff] [blame] | 34 | #include <base/rand_util.h> |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 35 | #include <base/strings/string_number_conversions.h> |
Daniel Erat | 65f1da0 | 2014-06-27 22:05:38 -0700 | [diff] [blame] | 36 | #include <base/strings/string_util.h> |
Alex Vakulenko | 75039d7 | 2014-03-25 12:36:28 -0700 | [diff] [blame] | 37 | #include <base/strings/stringprintf.h> |
May Lippert | 60aa3ca | 2018-08-15 16:55:29 -0700 | [diff] [blame] | 38 | #include <base/time/time.h> |
Sen Jiang | 2703ef4 | 2017-03-16 13:36:21 -0700 | [diff] [blame] | 39 | #include <brillo/data_encoding.h> |
Sen Jiang | e67bb5b | 2016-06-20 15:53:56 -0700 | [diff] [blame] | 40 | #include <brillo/errors/error_codes.h> |
Alex Vakulenko | 3f39d5c | 2015-10-13 09:27:13 -0700 | [diff] [blame] | 41 | #include <brillo/message_loops/message_loop.h> |
Patrick Dubroy | 7fbbe8a | 2011-08-01 17:28:22 +0200 | [diff] [blame] | 42 | #include <policy/device_policy.h> |
Alex Deymo | bc91a27 | 2014-05-20 16:45:33 -0700 | [diff] [blame] | 43 | #include <policy/libpolicy.h> |
Alex Deymo | d6deb1d | 2015-08-28 15:54:37 -0700 | [diff] [blame] | 44 | #include <update_engine/dbus-constants.h> |
Darin Petkov | 9d65b7b | 2010-07-20 09:13:01 -0700 | [diff] [blame] | 45 | |
Alex Deymo | 14c0da8 | 2016-07-20 16:45:45 -0700 | [diff] [blame] | 46 | #include "update_engine/certificate_checker.h" |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 47 | #include "update_engine/common/boot_control_interface.h" |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 48 | #include "update_engine/common/clock_interface.h" |
| 49 | #include "update_engine/common/constants.h" |
Xiaochu Liu | 8ba486f | 2018-11-06 11:14:10 -0800 | [diff] [blame] | 50 | #include "update_engine/common/dlcservice_interface.h" |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 51 | #include "update_engine/common/hardware_interface.h" |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 52 | #include "update_engine/common/platform_constants.h" |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 53 | #include "update_engine/common/prefs.h" |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 54 | #include "update_engine/common/prefs_interface.h" |
| 55 | #include "update_engine/common/subprocess.h" |
| 56 | #include "update_engine/common/utils.h" |
Alex Deymo | 14c0da8 | 2016-07-20 16:45:45 -0700 | [diff] [blame] | 57 | #include "update_engine/libcurl_http_fetcher.h" |
Tianjie Xu | 282aa1f | 2017-09-05 13:42:45 -0700 | [diff] [blame] | 58 | #include "update_engine/metrics_reporter_interface.h" |
Darin Petkov | 6a5b322 | 2010-07-13 14:55:28 -0700 | [diff] [blame] | 59 | #include "update_engine/omaha_request_action.h" |
Darin Petkov | a4a8a8c | 2010-07-15 22:21:12 -0700 | [diff] [blame] | 60 | #include "update_engine/omaha_request_params.h" |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 61 | #include "update_engine/omaha_response_handler_action.h" |
Jae Hoon Kim | 051627a | 2019-09-03 12:56:32 -0700 | [diff] [blame] | 62 | #include "update_engine/omaha_utils.h" |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 63 | #include "update_engine/p2p_manager.h" |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 64 | #include "update_engine/payload_consumer/download_action.h" |
| 65 | #include "update_engine/payload_consumer/filesystem_verifier_action.h" |
| 66 | #include "update_engine/payload_consumer/postinstall_runner_action.h" |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 67 | #include "update_engine/payload_state_interface.h" |
Sen Jiang | b8c6a8f | 2016-06-07 17:33:17 -0700 | [diff] [blame] | 68 | #include "update_engine/power_manager_interface.h" |
Jay Srinivasan | 4348879 | 2012-06-19 00:25:31 -0700 | [diff] [blame] | 69 | #include "update_engine/system_state.h" |
Amin Hassani | 0882a51 | 2018-04-05 16:25:44 -0700 | [diff] [blame] | 70 | #include "update_engine/update_boot_flags_action.h" |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 71 | #include "update_engine/update_manager/policy.h" |
Marton Hunyady | e58bddb | 2018-04-10 20:27:26 +0200 | [diff] [blame] | 72 | #include "update_engine/update_manager/policy_utils.h" |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 73 | #include "update_engine/update_manager/update_manager.h" |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 74 | #include "update_engine/update_status_utils.h" |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 75 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 76 | using base::Bind; |
| 77 | using base::Callback; |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 78 | using base::FilePath; |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 79 | using base::Time; |
Darin Petkov | af18305 | 2010-08-23 12:07:13 -0700 | [diff] [blame] | 80 | using base::TimeDelta; |
| 81 | using base::TimeTicks; |
Alex Vakulenko | 3f39d5c | 2015-10-13 09:27:13 -0700 | [diff] [blame] | 82 | using brillo::MessageLoop; |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 83 | using chromeos_update_manager::CalculateStagingCase; |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 84 | using chromeos_update_manager::EvalStatus; |
| 85 | using chromeos_update_manager::Policy; |
Adolfo Victoria | 497044c | 2018-07-18 07:51:42 -0700 | [diff] [blame] | 86 | using chromeos_update_manager::StagingCase; |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 87 | using chromeos_update_manager::UpdateCheckParams; |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 88 | using std::string; |
| 89 | using std::vector; |
Aaron Wood | bf5a252 | 2017-10-04 10:58:36 -0700 | [diff] [blame] | 90 | using update_engine::UpdateAttemptFlags; |
Aaron Wood | 7f92e2b | 2017-08-28 14:51:21 -0700 | [diff] [blame] | 91 | using update_engine::UpdateEngineStatus; |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 92 | |
| 93 | namespace chromeos_update_engine { |
| 94 | |
Darin Petkov | 3627577 | 2010-10-01 11:40:57 -0700 | [diff] [blame] | 95 | const int UpdateAttempter::kMaxDeltaUpdateFailures = 3; |
| 96 | |
Andrew de los Reyes | 4516810 | 2010-11-22 11:13:50 -0800 | [diff] [blame] | 97 | namespace { |
| 98 | const int kMaxConsecutiveObeyProxyRequests = 20; |
Gilad Arnold | 70e476e | 2013-07-30 16:01:13 -0700 | [diff] [blame] | 99 | |
Alex Deymo | 0d29854 | 2016-03-30 18:31:49 -0700 | [diff] [blame] | 100 | // Minimum threshold to broadcast an status update in progress and time. |
| 101 | const double kBroadcastThresholdProgress = 0.01; // 1% |
| 102 | const int kBroadcastThresholdSeconds = 10; |
| 103 | |
David Pursell | 02c1864 | 2014-11-06 11:26:11 -0800 | [diff] [blame] | 104 | // By default autest bypasses scattering. If we want to test scattering, |
| 105 | // use kScheduledAUTestURLRequest. The URL used is same in both cases, but |
| 106 | // different params are passed to CheckForUpdate(). |
| 107 | const char kAUTestURLRequest[] = "autest"; |
| 108 | const char kScheduledAUTestURLRequest[] = "autest-scheduled"; |
Alex Vakulenko | d2779df | 2014-06-16 13:19:00 -0700 | [diff] [blame] | 109 | } // namespace |
Andrew de los Reyes | 4516810 | 2010-11-22 11:13:50 -0800 | [diff] [blame] | 110 | |
Sen Jiang | daeaa43 | 2018-10-09 18:18:45 -0700 | [diff] [blame] | 111 | ErrorCode GetErrorCodeForAction(AbstractAction* action, ErrorCode code) { |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 112 | if (code != ErrorCode::kError) |
Darin Petkov | 777dbfa | 2010-07-20 15:03:37 -0700 | [diff] [blame] | 113 | return code; |
| 114 | |
| 115 | const string type = action->Type(); |
| 116 | if (type == OmahaRequestAction::StaticType()) |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 117 | return ErrorCode::kOmahaRequestError; |
Darin Petkov | 777dbfa | 2010-07-20 15:03:37 -0700 | [diff] [blame] | 118 | if (type == OmahaResponseHandlerAction::StaticType()) |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 119 | return ErrorCode::kOmahaResponseHandlerError; |
Allie Wood | eb9e6d8 | 2015-04-17 13:55:30 -0700 | [diff] [blame] | 120 | if (type == FilesystemVerifierAction::StaticType()) |
| 121 | return ErrorCode::kFilesystemVerifierError; |
Darin Petkov | 777dbfa | 2010-07-20 15:03:37 -0700 | [diff] [blame] | 122 | if (type == PostinstallRunnerAction::StaticType()) |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 123 | return ErrorCode::kPostinstallRunnerError; |
Darin Petkov | 777dbfa | 2010-07-20 15:03:37 -0700 | [diff] [blame] | 124 | |
| 125 | return code; |
| 126 | } |
| 127 | |
Sen Jiang | 1841408 | 2018-01-11 14:50:36 -0800 | [diff] [blame] | 128 | UpdateAttempter::UpdateAttempter(SystemState* system_state, |
| 129 | CertificateChecker* cert_checker) |
Gilad Arnold | 1f84723 | 2014-04-07 12:07:49 -0700 | [diff] [blame] | 130 | : processor_(new ActionProcessor()), |
| 131 | system_state_(system_state), |
Colin Howes | 978c108 | 2018-12-03 11:46:12 -0800 | [diff] [blame] | 132 | cert_checker_(cert_checker), |
| 133 | is_install_(false) {} |
Darin Petkov | c6c135c | 2010-08-11 13:36:18 -0700 | [diff] [blame] | 134 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 135 | UpdateAttempter::~UpdateAttempter() { |
Alex Deymo | 33e91e7 | 2015-12-01 18:26:08 -0300 | [diff] [blame] | 136 | // CertificateChecker might not be initialized in unittests. |
| 137 | if (cert_checker_) |
| 138 | cert_checker_->SetObserver(nullptr); |
Alex Deymo | 2b4268c | 2015-12-04 13:56:25 -0800 | [diff] [blame] | 139 | // Release ourselves as the ActionProcessor's delegate to prevent |
| 140 | // re-scheduling the updates due to the processing stopped. |
| 141 | processor_->set_delegate(nullptr); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 142 | } |
| 143 | |
Gilad Arnold | 1f84723 | 2014-04-07 12:07:49 -0700 | [diff] [blame] | 144 | void UpdateAttempter::Init() { |
| 145 | // Pulling from the SystemState can only be done after construction, since |
| 146 | // this is an aggregate of various objects (such as the UpdateAttempter), |
| 147 | // which requires them all to be constructed prior to it being used. |
| 148 | prefs_ = system_state_->prefs(); |
| 149 | omaha_request_params_ = system_state_->request_params(); |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 150 | |
Alex Deymo | 33e91e7 | 2015-12-01 18:26:08 -0300 | [diff] [blame] | 151 | if (cert_checker_) |
| 152 | cert_checker_->SetObserver(this); |
| 153 | |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 154 | // In case of update_engine restart without a reboot we need to restore the |
| 155 | // reboot needed state. |
| 156 | if (GetBootTimeAtUpdate(nullptr)) |
| 157 | status_ = UpdateStatus::UPDATED_NEED_REBOOT; |
| 158 | else |
| 159 | status_ = UpdateStatus::IDLE; |
Gilad Arnold | 1f84723 | 2014-04-07 12:07:49 -0700 | [diff] [blame] | 160 | } |
| 161 | |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 162 | bool UpdateAttempter::ScheduleUpdates() { |
Jae Hoon Kim | ba2fdce | 2019-07-11 13:18:58 -0700 | [diff] [blame] | 163 | if (IsBusyOrUpdateScheduled()) |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 164 | return false; |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 165 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 166 | chromeos_update_manager::UpdateManager* const update_manager = |
| 167 | system_state_->update_manager(); |
| 168 | CHECK(update_manager); |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 169 | Callback<void(EvalStatus, const UpdateCheckParams&)> callback = |
| 170 | Bind(&UpdateAttempter::OnUpdateScheduled, base::Unretained(this)); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 171 | // We limit the async policy request to a reasonably short time, to avoid a |
| 172 | // starvation due to a transient bug. |
Jae Hoon Kim | 504c3cb | 2019-07-02 11:17:24 -0700 | [diff] [blame] | 173 | update_manager->AsyncPolicyRequestUpdateCheckAllowed( |
| 174 | callback, &Policy::UpdateCheckAllowed); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 175 | waiting_for_scheduled_check_ = true; |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 176 | return true; |
Darin Petkov | c6c135c | 2010-08-11 13:36:18 -0700 | [diff] [blame] | 177 | } |
| 178 | |
Alex Deymo | c1c17b4 | 2015-11-23 03:53:15 -0300 | [diff] [blame] | 179 | void UpdateAttempter::CertificateChecked(ServerToCheck server_to_check, |
| 180 | CertificateCheckResult result) { |
Tianjie Xu | 282aa1f | 2017-09-05 13:42:45 -0700 | [diff] [blame] | 181 | system_state_->metrics_reporter()->ReportCertificateCheckMetrics( |
| 182 | server_to_check, result); |
Alex Deymo | c1c17b4 | 2015-11-23 03:53:15 -0300 | [diff] [blame] | 183 | } |
| 184 | |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 185 | bool UpdateAttempter::CheckAndReportDailyMetrics() { |
| 186 | int64_t stored_value; |
Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame] | 187 | Time now = system_state_->clock()->GetWallclockTime(); |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 188 | if (system_state_->prefs()->Exists(kPrefsDailyMetricsLastReportedAt) && |
| 189 | system_state_->prefs()->GetInt64(kPrefsDailyMetricsLastReportedAt, |
| 190 | &stored_value)) { |
Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame] | 191 | Time last_reported_at = Time::FromInternalValue(stored_value); |
| 192 | TimeDelta time_reported_since = now - last_reported_at; |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 193 | if (time_reported_since.InSeconds() < 0) { |
| 194 | LOG(WARNING) << "Last reported daily metrics " |
| 195 | << utils::FormatTimeDelta(time_reported_since) << " ago " |
| 196 | << "which is negative. Either the system clock is wrong or " |
| 197 | << "the kPrefsDailyMetricsLastReportedAt state variable " |
| 198 | << "is wrong."; |
| 199 | // In this case, report daily metrics to reset. |
| 200 | } else { |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 201 | if (time_reported_since.InSeconds() < 24 * 60 * 60) { |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 202 | LOG(INFO) << "Last reported daily metrics " |
| 203 | << utils::FormatTimeDelta(time_reported_since) << " ago."; |
| 204 | return false; |
| 205 | } |
| 206 | LOG(INFO) << "Last reported daily metrics " |
| 207 | << utils::FormatTimeDelta(time_reported_since) << " ago, " |
| 208 | << "which is more than 24 hours ago."; |
| 209 | } |
| 210 | } |
| 211 | |
| 212 | LOG(INFO) << "Reporting daily metrics."; |
| 213 | system_state_->prefs()->SetInt64(kPrefsDailyMetricsLastReportedAt, |
| 214 | now.ToInternalValue()); |
| 215 | |
| 216 | ReportOSAge(); |
| 217 | |
| 218 | return true; |
| 219 | } |
| 220 | |
| 221 | void UpdateAttempter::ReportOSAge() { |
| 222 | struct stat sb; |
| 223 | |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 224 | if (system_state_ == nullptr) |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 225 | return; |
| 226 | |
| 227 | if (stat("/etc/lsb-release", &sb) != 0) { |
David Zeuthen | d9aca3b | 2014-08-21 13:11:21 -0400 | [diff] [blame] | 228 | PLOG(ERROR) << "Error getting file status for /etc/lsb-release " |
| 229 | << "(Note: this may happen in some unit tests)"; |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 230 | return; |
| 231 | } |
| 232 | |
Sen Jiang | 1c3db7d | 2019-01-10 15:48:55 -0800 | [diff] [blame] | 233 | Time lsb_release_timestamp = Time::FromTimeSpec(sb.st_ctim); |
Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame] | 234 | Time now = system_state_->clock()->GetWallclockTime(); |
| 235 | TimeDelta age = now - lsb_release_timestamp; |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 236 | if (age.InSeconds() < 0) { |
| 237 | LOG(ERROR) << "The OS age (" << utils::FormatTimeDelta(age) |
David Zeuthen | d9aca3b | 2014-08-21 13:11:21 -0400 | [diff] [blame] | 238 | << ") is negative. Maybe the clock is wrong? " |
| 239 | << "(Note: this may happen in some unit tests.)"; |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 240 | return; |
| 241 | } |
| 242 | |
Tianjie Xu | 282aa1f | 2017-09-05 13:42:45 -0700 | [diff] [blame] | 243 | system_state_->metrics_reporter()->ReportDailyMetrics(age); |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 244 | } |
| 245 | |
Gilad Arnold | 28e2f39 | 2012-02-09 14:36:46 -0800 | [diff] [blame] | 246 | void UpdateAttempter::Update(const string& app_version, |
| 247 | const string& omaha_url, |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 248 | const string& target_channel, |
| 249 | const string& target_version_prefix, |
Marton Hunyady | ba51c3f | 2018-04-25 15:18:10 +0200 | [diff] [blame] | 250 | bool rollback_allowed, |
Zentaro Kavanagh | 28def4f | 2019-01-15 17:15:01 -0800 | [diff] [blame] | 251 | bool rollback_data_save_requested, |
Zentaro Kavanagh | 0ef9a2f | 2018-07-02 12:05:07 -0700 | [diff] [blame] | 252 | int rollback_allowed_milestones, |
Andrew de los Reyes | fb2f461 | 2011-06-09 18:21:49 -0700 | [diff] [blame] | 253 | bool obey_proxies, |
Nam T. Nguyen | 7d623eb | 2014-05-13 16:06:28 -0700 | [diff] [blame] | 254 | bool interactive) { |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 255 | // This is normally called frequently enough so it's appropriate to use as a |
| 256 | // hook for reporting daily metrics. |
| 257 | // TODO(garnold) This should be hooked to a separate (reliable and consistent) |
| 258 | // timeout event. |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 259 | CheckAndReportDailyMetrics(); |
| 260 | |
Andrew de los Reyes | c1d5c93 | 2011-04-20 17:15:47 -0700 | [diff] [blame] | 261 | fake_update_success_ = false; |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 262 | if (status_ == UpdateStatus::UPDATED_NEED_REBOOT) { |
Thieu Le | 116fda3 | 2011-04-19 11:01:54 -0700 | [diff] [blame] | 263 | // Although we have applied an update, we still want to ping Omaha |
| 264 | // to ensure the number of active statistics is accurate. |
David Zeuthen | 33bae49 | 2014-02-25 16:16:18 -0800 | [diff] [blame] | 265 | // |
| 266 | // Also convey to the UpdateEngine.Check.Result metric that we're |
| 267 | // not performing an update check because of this. |
Andrew de los Reyes | 6b78e29 | 2010-05-10 15:54:39 -0700 | [diff] [blame] | 268 | LOG(INFO) << "Not updating b/c we already updated and we're waiting for " |
Thieu Le | 116fda3 | 2011-04-19 11:01:54 -0700 | [diff] [blame] | 269 | << "reboot, we'll ping Omaha instead"; |
Tianjie Xu | 282aa1f | 2017-09-05 13:42:45 -0700 | [diff] [blame] | 270 | system_state_->metrics_reporter()->ReportUpdateCheckMetrics( |
| 271 | system_state_, |
| 272 | metrics::CheckResult::kRebootPending, |
| 273 | metrics::CheckReaction::kUnset, |
| 274 | metrics::DownloadErrorCode::kUnset); |
Thieu Le | 116fda3 | 2011-04-19 11:01:54 -0700 | [diff] [blame] | 275 | PingOmaha(); |
Andrew de los Reyes | 6b78e29 | 2010-05-10 15:54:39 -0700 | [diff] [blame] | 276 | return; |
| 277 | } |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 278 | if (status_ != UpdateStatus::IDLE) { |
Andrew de los Reyes | 6b78e29 | 2010-05-10 15:54:39 -0700 | [diff] [blame] | 279 | // Update in progress. Do nothing |
| 280 | return; |
| 281 | } |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 282 | |
| 283 | if (!CalculateUpdateParams(app_version, |
| 284 | omaha_url, |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 285 | target_channel, |
| 286 | target_version_prefix, |
Marton Hunyady | ba51c3f | 2018-04-25 15:18:10 +0200 | [diff] [blame] | 287 | rollback_allowed, |
Zentaro Kavanagh | 28def4f | 2019-01-15 17:15:01 -0800 | [diff] [blame] | 288 | rollback_data_save_requested, |
Zentaro Kavanagh | 0ef9a2f | 2018-07-02 12:05:07 -0700 | [diff] [blame] | 289 | rollback_allowed_milestones, |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 290 | obey_proxies, |
Nam T. Nguyen | 7d623eb | 2014-05-13 16:06:28 -0700 | [diff] [blame] | 291 | interactive)) { |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 292 | return; |
| 293 | } |
| 294 | |
| 295 | BuildUpdateActions(interactive); |
| 296 | |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 297 | SetStatusAndNotify(UpdateStatus::CHECKING_FOR_UPDATE); |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 298 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 299 | // Update the last check time here; it may be re-updated when an Omaha |
| 300 | // response is received, but this will prevent us from repeatedly scheduling |
| 301 | // checks in the case where a response is not received. |
| 302 | UpdateLastCheckedTime(); |
| 303 | |
Amin Hassani | 0882a51 | 2018-04-05 16:25:44 -0700 | [diff] [blame] | 304 | ScheduleProcessingStart(); |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 305 | } |
| 306 | |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 307 | void UpdateAttempter::RefreshDevicePolicy() { |
| 308 | // Lazy initialize the policy provider, or reload the latest policy data. |
| 309 | if (!policy_provider_.get()) |
| 310 | policy_provider_.reset(new policy::PolicyProvider()); |
| 311 | policy_provider_->Reload(); |
| 312 | |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 313 | const policy::DevicePolicy* device_policy = nullptr; |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 314 | if (policy_provider_->device_policy_is_loaded()) |
| 315 | device_policy = &policy_provider_->GetDevicePolicy(); |
| 316 | |
| 317 | if (device_policy) |
| 318 | LOG(INFO) << "Device policies/settings present"; |
| 319 | else |
| 320 | LOG(INFO) << "No device policies/settings present."; |
| 321 | |
| 322 | system_state_->set_device_policy(device_policy); |
David Zeuthen | 92d9c8b | 2013-09-11 10:58:11 -0700 | [diff] [blame] | 323 | system_state_->p2p_manager()->SetDevicePolicy(device_policy); |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 324 | } |
| 325 | |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 326 | void UpdateAttempter::CalculateP2PParams(bool interactive) { |
| 327 | bool use_p2p_for_downloading = false; |
| 328 | bool use_p2p_for_sharing = false; |
| 329 | |
Thiemo Nagel | 27d9d53 | 2017-05-26 16:35:20 +0200 | [diff] [blame] | 330 | // Never use p2p for downloading in interactive checks unless the developer |
| 331 | // has opted in for it via a marker file. |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 332 | // |
Thiemo Nagel | 27d9d53 | 2017-05-26 16:35:20 +0200 | [diff] [blame] | 333 | // (Why would a developer want to opt in? If they are working on the |
| 334 | // update_engine or p2p codebases so they can actually test their code.) |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 335 | |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 336 | if (system_state_ != nullptr) { |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 337 | if (!system_state_->p2p_manager()->IsP2PEnabled()) { |
| 338 | LOG(INFO) << "p2p is not enabled - disallowing p2p for both" |
| 339 | << " downloading and sharing."; |
| 340 | } else { |
| 341 | // Allow p2p for sharing, even in interactive checks. |
| 342 | use_p2p_for_sharing = true; |
| 343 | if (!interactive) { |
| 344 | LOG(INFO) << "Non-interactive check - allowing p2p for downloading"; |
| 345 | use_p2p_for_downloading = true; |
| 346 | } else { |
David Zeuthen | 052d290 | 2013-09-06 11:41:30 -0700 | [diff] [blame] | 347 | LOG(INFO) << "Forcibly disabling use of p2p for downloading " |
| 348 | << "since this update attempt is interactive."; |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 349 | } |
| 350 | } |
| 351 | } |
| 352 | |
Gilad Arnold | 74b5f55 | 2014-10-07 08:17:16 -0700 | [diff] [blame] | 353 | PayloadStateInterface* const payload_state = system_state_->payload_state(); |
| 354 | payload_state->SetUsingP2PForDownloading(use_p2p_for_downloading); |
| 355 | payload_state->SetUsingP2PForSharing(use_p2p_for_sharing); |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 356 | } |
| 357 | |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 358 | bool UpdateAttempter::CalculateUpdateParams(const string& app_version, |
| 359 | const string& omaha_url, |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 360 | const string& target_channel, |
| 361 | const string& target_version_prefix, |
Marton Hunyady | ba51c3f | 2018-04-25 15:18:10 +0200 | [diff] [blame] | 362 | bool rollback_allowed, |
Zentaro Kavanagh | 28def4f | 2019-01-15 17:15:01 -0800 | [diff] [blame] | 363 | bool rollback_data_save_requested, |
Zentaro Kavanagh | 0ef9a2f | 2018-07-02 12:05:07 -0700 | [diff] [blame] | 364 | int rollback_allowed_milestones, |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 365 | bool obey_proxies, |
Nam T. Nguyen | 7d623eb | 2014-05-13 16:06:28 -0700 | [diff] [blame] | 366 | bool interactive) { |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 367 | http_response_code_ = 0; |
Gilad Arnold | 74b5f55 | 2014-10-07 08:17:16 -0700 | [diff] [blame] | 368 | PayloadStateInterface* const payload_state = system_state_->payload_state(); |
Patrick Dubroy | 7fbbe8a | 2011-08-01 17:28:22 +0200 | [diff] [blame] | 369 | |
Alex Deymo | 749ecf1 | 2014-10-21 20:06:57 -0700 | [diff] [blame] | 370 | // Refresh the policy before computing all the update parameters. |
| 371 | RefreshDevicePolicy(); |
| 372 | |
Marton Hunyady | e58bddb | 2018-04-10 20:27:26 +0200 | [diff] [blame] | 373 | // Check whether we need to clear the rollback-happened preference after |
| 374 | // policy is available again. |
| 375 | UpdateRollbackHappened(); |
| 376 | |
Xiyuan Xia | c0e8f9a | 2017-02-22 13:19:35 -0800 | [diff] [blame] | 377 | // Update the target version prefix. |
| 378 | omaha_request_params_->set_target_version_prefix(target_version_prefix); |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 379 | |
Marton Hunyady | ba51c3f | 2018-04-25 15:18:10 +0200 | [diff] [blame] | 380 | // Set whether rollback is allowed. |
| 381 | omaha_request_params_->set_rollback_allowed(rollback_allowed); |
| 382 | |
Zentaro Kavanagh | 28def4f | 2019-01-15 17:15:01 -0800 | [diff] [blame] | 383 | // Set whether saving data over rollback is requested. |
| 384 | omaha_request_params_->set_rollback_data_save_requested( |
| 385 | rollback_data_save_requested); |
| 386 | |
Adolfo Victoria | 497044c | 2018-07-18 07:51:42 -0700 | [diff] [blame] | 387 | CalculateStagingParams(interactive); |
| 388 | // If staging_wait_time_ wasn't set, staging is off, use scattering instead. |
| 389 | if (staging_wait_time_.InSeconds() == 0) { |
| 390 | CalculateScatteringParams(interactive); |
| 391 | } |
Patrick Dubroy | 7fbbe8a | 2011-08-01 17:28:22 +0200 | [diff] [blame] | 392 | |
Zentaro Kavanagh | 0ef9a2f | 2018-07-02 12:05:07 -0700 | [diff] [blame] | 393 | // Set how many milestones of rollback are allowed. |
| 394 | omaha_request_params_->set_rollback_allowed_milestones( |
| 395 | rollback_allowed_milestones); |
| 396 | |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 397 | CalculateP2PParams(interactive); |
Gilad Arnold | 74b5f55 | 2014-10-07 08:17:16 -0700 | [diff] [blame] | 398 | if (payload_state->GetUsingP2PForDownloading() || |
| 399 | payload_state->GetUsingP2PForSharing()) { |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 400 | // OK, p2p is to be used - start it and perform housekeeping. |
| 401 | if (!StartP2PAndPerformHousekeeping()) { |
| 402 | // If this fails, disable p2p for this attempt |
| 403 | LOG(INFO) << "Forcibly disabling use of p2p since starting p2p or " |
| 404 | << "performing housekeeping failed."; |
Gilad Arnold | 74b5f55 | 2014-10-07 08:17:16 -0700 | [diff] [blame] | 405 | payload_state->SetUsingP2PForDownloading(false); |
| 406 | payload_state->SetUsingP2PForSharing(false); |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 407 | } |
| 408 | } |
| 409 | |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 410 | if (!omaha_request_params_->Init(app_version, omaha_url, interactive)) { |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 411 | LOG(ERROR) << "Unable to initialize Omaha request params."; |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 412 | return false; |
Darin Petkov | a4a8a8c | 2010-07-15 22:21:12 -0700 | [diff] [blame] | 413 | } |
Darin Petkov | 3aefa86 | 2010-12-07 14:45:00 -0800 | [diff] [blame] | 414 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 415 | // Set the target channel, if one was provided. |
| 416 | if (target_channel.empty()) { |
| 417 | LOG(INFO) << "No target channel mandated by policy."; |
| 418 | } else { |
| 419 | LOG(INFO) << "Setting target channel as mandated: " << target_channel; |
| 420 | // Pass in false for powerwash_allowed until we add it to the policy |
| 421 | // protobuf. |
Alex Deymo | d942f9d | 2015-11-06 16:11:50 -0800 | [diff] [blame] | 422 | string error_message; |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 423 | if (!omaha_request_params_->SetTargetChannel( |
| 424 | target_channel, false, &error_message)) { |
Alex Deymo | d942f9d | 2015-11-06 16:11:50 -0800 | [diff] [blame] | 425 | LOG(ERROR) << "Setting the channel failed: " << error_message; |
| 426 | } |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 427 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 428 | // Since this is the beginning of a new attempt, update the download |
| 429 | // channel. The download channel won't be updated until the next attempt, |
| 430 | // even if target channel changes meanwhile, so that how we'll know if we |
| 431 | // should cancel the current download attempt if there's such a change in |
| 432 | // target channel. |
| 433 | omaha_request_params_->UpdateDownloadChannel(); |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 434 | } |
Jae Hoon Kim | c43f6bb | 2019-07-03 12:56:52 -0700 | [diff] [blame] | 435 | |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 436 | // The function |CalculateDlcParams| makes use of the function |GetAppId| from |
| 437 | // |OmahaRequestParams|, so to ensure that the return from |GetAppId| |
| 438 | // doesn't change, no changes to the values |download_channel_|, |
| 439 | // |image_props_.product_id| and |image_props_.canary_product_id| from |
| 440 | // |omaha_request_params_| shall be made below this line. |
| 441 | CalculateDlcParams(); |
| 442 | |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 443 | omaha_request_params_->set_is_install(is_install_); |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 444 | |
Amr Aboelkher | 21ac996 | 2019-05-15 14:50:05 +0200 | [diff] [blame] | 445 | // Set Quick Fix Build token if policy is set and the device is enterprise |
| 446 | // enrolled. |
Askar Aitzhan | 570ca87 | 2019-04-24 11:16:12 +0200 | [diff] [blame] | 447 | string token; |
| 448 | if (system_state_ && system_state_->device_policy()) { |
| 449 | if (!system_state_->device_policy()->GetDeviceQuickFixBuildToken(&token)) |
| 450 | token.clear(); |
| 451 | } |
| 452 | omaha_request_params_->set_autoupdate_token(token); |
| 453 | |
Gilad Arnold | afd70ed | 2014-09-30 16:27:06 -0700 | [diff] [blame] | 454 | LOG(INFO) << "target_version_prefix = " |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 455 | << omaha_request_params_->target_version_prefix() |
Marton Hunyady | ba51c3f | 2018-04-25 15:18:10 +0200 | [diff] [blame] | 456 | << ", rollback_allowed = " |
| 457 | << omaha_request_params_->rollback_allowed() |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 458 | << ", scatter_factor_in_seconds = " |
| 459 | << utils::FormatSecs(scatter_factor_.InSeconds()); |
| 460 | |
| 461 | LOG(INFO) << "Wall Clock Based Wait Enabled = " |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 462 | << omaha_request_params_->wall_clock_based_wait_enabled() |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 463 | << ", Update Check Count Wait Enabled = " |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 464 | << omaha_request_params_->update_check_count_wait_enabled() |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 465 | << ", Waiting Period = " |
| 466 | << utils::FormatSecs( |
| 467 | omaha_request_params_->waiting_period().InSeconds()); |
Jay Srinivasan | 0a70874 | 2012-03-20 11:26:12 -0700 | [diff] [blame] | 468 | |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 469 | LOG(INFO) << "Use p2p For Downloading = " |
Gilad Arnold | 74b5f55 | 2014-10-07 08:17:16 -0700 | [diff] [blame] | 470 | << payload_state->GetUsingP2PForDownloading() |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 471 | << ", Use p2p For Sharing = " |
Gilad Arnold | 74b5f55 | 2014-10-07 08:17:16 -0700 | [diff] [blame] | 472 | << payload_state->GetUsingP2PForSharing(); |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 473 | |
Andrew de los Reyes | 4516810 | 2010-11-22 11:13:50 -0800 | [diff] [blame] | 474 | obeying_proxies_ = true; |
| 475 | if (obey_proxies || proxy_manual_checks_ == 0) { |
| 476 | LOG(INFO) << "forced to obey proxies"; |
| 477 | // If forced to obey proxies, every 20th request will not use proxies |
| 478 | proxy_manual_checks_++; |
| 479 | LOG(INFO) << "proxy manual checks: " << proxy_manual_checks_; |
| 480 | if (proxy_manual_checks_ >= kMaxConsecutiveObeyProxyRequests) { |
| 481 | proxy_manual_checks_ = 0; |
| 482 | obeying_proxies_ = false; |
| 483 | } |
| 484 | } else if (base::RandInt(0, 4) == 0) { |
| 485 | obeying_proxies_ = false; |
| 486 | } |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 487 | LOG_IF(INFO, !obeying_proxies_) |
| 488 | << "To help ensure updates work, this update check we are ignoring the " |
| 489 | << "proxy settings and using direct connections."; |
Andrew de los Reyes | 4516810 | 2010-11-22 11:13:50 -0800 | [diff] [blame] | 490 | |
Darin Petkov | 3627577 | 2010-10-01 11:40:57 -0700 | [diff] [blame] | 491 | DisableDeltaUpdateIfNeeded(); |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 492 | return true; |
| 493 | } |
| 494 | |
Gilad Arnold | b92f0df | 2013-01-10 16:32:45 -0800 | [diff] [blame] | 495 | void UpdateAttempter::CalculateScatteringParams(bool interactive) { |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 496 | // Take a copy of the old scatter value before we update it, as |
| 497 | // we need to update the waiting period if this value changes. |
| 498 | TimeDelta old_scatter_factor = scatter_factor_; |
Jay Srinivasan | 6f6ea00 | 2012-12-14 11:26:28 -0800 | [diff] [blame] | 499 | const policy::DevicePolicy* device_policy = system_state_->device_policy(); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 500 | if (device_policy) { |
Ben Chan | 9abb763 | 2014-08-07 00:10:53 -0700 | [diff] [blame] | 501 | int64_t new_scatter_factor_in_secs = 0; |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 502 | device_policy->GetScatterFactorInSeconds(&new_scatter_factor_in_secs); |
Alex Vakulenko | d2779df | 2014-06-16 13:19:00 -0700 | [diff] [blame] | 503 | if (new_scatter_factor_in_secs < 0) // sanitize input, just in case. |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 504 | new_scatter_factor_in_secs = 0; |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 505 | scatter_factor_ = TimeDelta::FromSeconds(new_scatter_factor_in_secs); |
| 506 | } |
| 507 | |
| 508 | bool is_scatter_enabled = false; |
| 509 | if (scatter_factor_.InSeconds() == 0) { |
| 510 | LOG(INFO) << "Scattering disabled since scatter factor is set to 0"; |
Gilad Arnold | b92f0df | 2013-01-10 16:32:45 -0800 | [diff] [blame] | 511 | } else if (interactive) { |
| 512 | LOG(INFO) << "Scattering disabled as this is an interactive update check"; |
Alex Deymo | 46a9aae | 2016-05-04 20:20:11 -0700 | [diff] [blame] | 513 | } else if (system_state_->hardware()->IsOOBEEnabled() && |
| 514 | !system_state_->hardware()->IsOOBEComplete(nullptr)) { |
| 515 | LOG(INFO) << "Scattering disabled since OOBE is enabled but not complete " |
| 516 | "yet"; |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 517 | } else { |
| 518 | is_scatter_enabled = true; |
| 519 | LOG(INFO) << "Scattering is enabled"; |
| 520 | } |
| 521 | |
| 522 | if (is_scatter_enabled) { |
| 523 | // This means the scattering policy is turned on. |
| 524 | // Now check if we need to update the waiting period. The two cases |
| 525 | // in which we'd need to update the waiting period are: |
| 526 | // 1. First time in process or a scheduled check after a user-initiated one. |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 527 | // (omaha_request_params_->waiting_period will be zero in this case). |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 528 | // 2. Admin has changed the scattering policy value. |
| 529 | // (new scattering value will be different from old one in this case). |
Ben Chan | 9abb763 | 2014-08-07 00:10:53 -0700 | [diff] [blame] | 530 | int64_t wait_period_in_secs = 0; |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 531 | if (omaha_request_params_->waiting_period().InSeconds() == 0) { |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 532 | // First case. Check if we have a suitable value to set for |
| 533 | // the waiting period. |
Adolfo Victoria | d3a1e35 | 2018-07-16 11:40:47 -0700 | [diff] [blame] | 534 | if (prefs_->GetInt64(kPrefsWallClockScatteringWaitPeriod, |
| 535 | &wait_period_in_secs) && |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 536 | wait_period_in_secs > 0 && |
| 537 | wait_period_in_secs <= scatter_factor_.InSeconds()) { |
| 538 | // This means: |
| 539 | // 1. There's a persisted value for the waiting period available. |
| 540 | // 2. And that persisted value is still valid. |
| 541 | // So, in this case, we should reuse the persisted value instead of |
| 542 | // generating a new random value to improve the chances of a good |
| 543 | // distribution for scattering. |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 544 | omaha_request_params_->set_waiting_period( |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 545 | TimeDelta::FromSeconds(wait_period_in_secs)); |
| 546 | LOG(INFO) << "Using persisted wall-clock waiting period: " |
| 547 | << utils::FormatSecs( |
| 548 | omaha_request_params_->waiting_period().InSeconds()); |
Alex Vakulenko | d2779df | 2014-06-16 13:19:00 -0700 | [diff] [blame] | 549 | } else { |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 550 | // This means there's no persisted value for the waiting period |
| 551 | // available or its value is invalid given the new scatter_factor value. |
| 552 | // So, we should go ahead and regenerate a new value for the |
| 553 | // waiting period. |
| 554 | LOG(INFO) << "Persisted value not present or not valid (" |
| 555 | << utils::FormatSecs(wait_period_in_secs) |
| 556 | << ") for wall-clock waiting period."; |
| 557 | GenerateNewWaitingPeriod(); |
| 558 | } |
| 559 | } else if (scatter_factor_ != old_scatter_factor) { |
| 560 | // This means there's already a waiting period value, but we detected |
| 561 | // a change in the scattering policy value. So, we should regenerate the |
| 562 | // waiting period to make sure it's within the bounds of the new scatter |
| 563 | // factor value. |
| 564 | GenerateNewWaitingPeriod(); |
| 565 | } else { |
| 566 | // Neither the first time scattering is enabled nor the scattering value |
| 567 | // changed. Nothing to do. |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 568 | LOG(INFO) << "Keeping current wall-clock waiting period: " |
| 569 | << utils::FormatSecs( |
| 570 | omaha_request_params_->waiting_period().InSeconds()); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 571 | } |
| 572 | |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 573 | // The invariant at this point is that omaha_request_params_->waiting_period |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 574 | // is non-zero no matter which path we took above. |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 575 | LOG_IF(ERROR, omaha_request_params_->waiting_period().InSeconds() == 0) |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 576 | << "Waiting Period should NOT be zero at this point!!!"; |
| 577 | |
| 578 | // Since scattering is enabled, wall clock based wait will always be |
| 579 | // enabled. |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 580 | omaha_request_params_->set_wall_clock_based_wait_enabled(true); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 581 | |
| 582 | // If we don't have any issues in accessing the file system to update |
| 583 | // the update check count value, we'll turn that on as well. |
| 584 | bool decrement_succeeded = DecrementUpdateCheckCount(); |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 585 | omaha_request_params_->set_update_check_count_wait_enabled( |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 586 | decrement_succeeded); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 587 | } else { |
| 588 | // This means the scattering feature is turned off or disabled for |
| 589 | // this particular update check. Make sure to disable |
| 590 | // all the knobs and artifacts so that we don't invoke any scattering |
| 591 | // related code. |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 592 | omaha_request_params_->set_wall_clock_based_wait_enabled(false); |
| 593 | omaha_request_params_->set_update_check_count_wait_enabled(false); |
| 594 | omaha_request_params_->set_waiting_period(TimeDelta::FromSeconds(0)); |
Adolfo Victoria | d3a1e35 | 2018-07-16 11:40:47 -0700 | [diff] [blame] | 595 | prefs_->Delete(kPrefsWallClockScatteringWaitPeriod); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 596 | prefs_->Delete(kPrefsUpdateCheckCount); |
| 597 | // Don't delete the UpdateFirstSeenAt file as we don't want manual checks |
| 598 | // that result in no-updates (e.g. due to server side throttling) to |
| 599 | // cause update starvation by having the client generate a new |
| 600 | // UpdateFirstSeenAt for each scheduled check that follows a manual check. |
| 601 | } |
| 602 | } |
| 603 | |
| 604 | void UpdateAttempter::GenerateNewWaitingPeriod() { |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 605 | omaha_request_params_->set_waiting_period( |
| 606 | TimeDelta::FromSeconds(base::RandInt(1, scatter_factor_.InSeconds()))); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 607 | |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 608 | LOG(INFO) << "Generated new wall-clock waiting period: " |
| 609 | << utils::FormatSecs( |
| 610 | omaha_request_params_->waiting_period().InSeconds()); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 611 | |
| 612 | // Do a best-effort to persist this in all cases. Even if the persistence |
| 613 | // fails, we'll still be able to scatter based on our in-memory value. |
| 614 | // The persistence only helps in ensuring a good overall distribution |
| 615 | // across multiple devices if they tend to reboot too often. |
Gilad Arnold | 519cfc7 | 2014-10-02 10:34:54 -0700 | [diff] [blame] | 616 | system_state_->payload_state()->SetScatteringWaitPeriod( |
| 617 | omaha_request_params_->waiting_period()); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 618 | } |
| 619 | |
Adolfo Victoria | 497044c | 2018-07-18 07:51:42 -0700 | [diff] [blame] | 620 | void UpdateAttempter::CalculateStagingParams(bool interactive) { |
| 621 | bool oobe_complete = system_state_->hardware()->IsOOBEEnabled() && |
| 622 | system_state_->hardware()->IsOOBEComplete(nullptr); |
| 623 | auto device_policy = system_state_->device_policy(); |
| 624 | StagingCase staging_case = StagingCase::kOff; |
| 625 | if (device_policy && !interactive && oobe_complete) { |
| 626 | staging_wait_time_ = omaha_request_params_->waiting_period(); |
| 627 | staging_case = CalculateStagingCase( |
| 628 | device_policy, prefs_, &staging_wait_time_, &staging_schedule_); |
| 629 | } |
| 630 | switch (staging_case) { |
| 631 | case StagingCase::kOff: |
| 632 | // Staging is off, get rid of persisted value. |
| 633 | prefs_->Delete(kPrefsWallClockStagingWaitPeriod); |
| 634 | // Set |staging_wait_time_| to its default value so scattering can still |
| 635 | // be turned on |
| 636 | staging_wait_time_ = TimeDelta(); |
| 637 | break; |
| 638 | // Let the cases fall through since they just add, and never remove, steps |
| 639 | // to turning staging on. |
| 640 | case StagingCase::kNoSavedValue: |
| 641 | prefs_->SetInt64(kPrefsWallClockStagingWaitPeriod, |
| 642 | staging_wait_time_.InDays()); |
Denis Nikitin | 8f2fa74 | 2019-05-29 10:36:52 -0700 | [diff] [blame] | 643 | FALLTHROUGH; |
Adolfo Victoria | 497044c | 2018-07-18 07:51:42 -0700 | [diff] [blame] | 644 | case StagingCase::kSetStagingFromPref: |
| 645 | omaha_request_params_->set_waiting_period(staging_wait_time_); |
Denis Nikitin | 8f2fa74 | 2019-05-29 10:36:52 -0700 | [diff] [blame] | 646 | FALLTHROUGH; |
Adolfo Victoria | 497044c | 2018-07-18 07:51:42 -0700 | [diff] [blame] | 647 | case StagingCase::kNoAction: |
| 648 | // Staging is on, enable wallclock based wait so that its values get used. |
| 649 | omaha_request_params_->set_wall_clock_based_wait_enabled(true); |
| 650 | // Use UpdateCheckCount if possible to prevent devices updating all at |
| 651 | // once. |
| 652 | omaha_request_params_->set_update_check_count_wait_enabled( |
| 653 | DecrementUpdateCheckCount()); |
| 654 | // Scattering should not be turned on if staging is on, delete the |
| 655 | // existing scattering configuration. |
| 656 | prefs_->Delete(kPrefsWallClockScatteringWaitPeriod); |
| 657 | scatter_factor_ = TimeDelta(); |
| 658 | } |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 659 | } |
| 660 | |
Andrew | a8d7df3 | 2020-03-15 20:10:01 -0700 | [diff] [blame] | 661 | bool UpdateAttempter::SetDlcActiveValue(bool is_active, const string& dlc_id) { |
| 662 | if (dlc_id.empty()) { |
| 663 | LOG(ERROR) << "Empty DLC ID passed."; |
| 664 | return false; |
| 665 | } |
| 666 | LOG(INFO) << "Set DLC (" << dlc_id << ") to " |
| 667 | << (is_active ? "Active" : "Inactive"); |
| 668 | // TODO(andrewlassalle): Should dlc_prefs_root be in systemstate instead of |
| 669 | // omaha_request_params_? |
| 670 | base::FilePath metadata_path = |
| 671 | base::FilePath(omaha_request_params_->dlc_prefs_root()).Append(dlc_id); |
| 672 | if (is_active) { |
| 673 | base::File::Error error; |
| 674 | if (!base::CreateDirectoryAndGetError(metadata_path, &error)) { |
| 675 | PLOG(ERROR) << "Failed to create metadata directory for DLC (" << dlc_id |
| 676 | << "). Error:" << error; |
| 677 | return false; |
| 678 | } |
| 679 | |
| 680 | Prefs prefs; |
| 681 | if (!prefs.Init(metadata_path)) { |
| 682 | LOG(ERROR) << "Failed to initialize the preferences path:" |
| 683 | << metadata_path.value() << "."; |
| 684 | return false; |
| 685 | } |
| 686 | |
| 687 | if (!prefs.SetInt64(kPrefsPingActive, kPingActiveValue)) { |
| 688 | LOG(ERROR) << "Failed to set the value of ping metadata '" |
| 689 | << kPrefsPingActive << "'."; |
| 690 | return false; |
| 691 | } |
| 692 | } else { |
| 693 | if (!base::DeleteFile(metadata_path, true)) { |
| 694 | PLOG(ERROR) << "Failed to delete metadata directory(" |
| 695 | << metadata_path.value() << ") for DLC (" << dlc_id << ")."; |
| 696 | return false; |
| 697 | } |
| 698 | } |
| 699 | return true; |
| 700 | } |
| 701 | |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 702 | int64_t UpdateAttempter::GetPingMetadata( |
| 703 | const PrefsInterface& prefs, const std::string& metadata_name) const { |
| 704 | // The first time a ping is sent, the metadata files containing the values |
| 705 | // sent back by the server still don't exist. A value of -1 is used to |
| 706 | // indicate this. |
| 707 | if (!prefs.Exists(metadata_name)) |
| 708 | return kPingNeverPinged; |
| 709 | |
| 710 | int64_t value; |
| 711 | if (prefs.GetInt64(metadata_name, &value)) |
| 712 | return value; |
| 713 | |
| 714 | // Return -2 when the file exists and there is a problem reading from it, or |
| 715 | // the value cannot be converted to an integer. |
| 716 | return kPingUnknownValue; |
| 717 | } |
| 718 | |
| 719 | void UpdateAttempter::CalculateDlcParams() { |
| 720 | // Set the |dlc_module_ids_| only for an update. This is required to get the |
| 721 | // currently installed DLC(s). |
| 722 | if (!is_install_ && |
| 723 | !system_state_->dlcservice()->GetInstalled(&dlc_module_ids_)) { |
| 724 | LOG(INFO) << "Failed to retrieve DLC module IDs from dlcservice. Check the " |
| 725 | "state of dlcservice, will not update DLC modules."; |
| 726 | } |
Andrew | a8d7df3 | 2020-03-15 20:10:01 -0700 | [diff] [blame] | 727 | base::FilePath metadata_root_path = |
| 728 | base::FilePath(omaha_request_params_->dlc_prefs_root()); |
| 729 | // Cleanup any leftover metadata for DLCs which don't exist. |
| 730 | base::FileEnumerator dir_enum(metadata_root_path, |
| 731 | false /* recursive */, |
| 732 | base::FileEnumerator::DIRECTORIES); |
| 733 | std::unordered_set<string> dlc_ids(dlc_module_ids_.begin(), |
| 734 | dlc_module_ids_.end()); |
| 735 | for (base::FilePath name = dir_enum.Next(); !name.empty(); |
| 736 | name = dir_enum.Next()) { |
| 737 | string id = name.BaseName().value(); |
| 738 | if (dlc_ids.find(id) == dlc_ids.end()) { |
| 739 | LOG(INFO) << "Deleting stale metadata for DLC:" << id; |
| 740 | if (!base::DeleteFile(name, true)) |
| 741 | PLOG(WARNING) << "Failed to delete DLC prefs path:" << name.value(); |
| 742 | } |
| 743 | } |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 744 | std::map<std::string, OmahaRequestParams::AppParams> dlc_apps_params; |
Andrew | 9d5a61d | 2020-03-26 13:40:37 -0700 | [diff] [blame] | 745 | for (const auto& dlc_id : dlc_module_ids_) { |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 746 | OmahaRequestParams::AppParams dlc_params{ |
| 747 | .active_counting_type = OmahaRequestParams::kDateBased, |
| 748 | .name = dlc_id, |
| 749 | .send_ping = false}; |
| 750 | // Only send the ping when the request is to update DLCs. When installing |
| 751 | // DLCs, we don't want to send the ping yet, since the DLCs might fail to |
| 752 | // install or might not really be active yet. |
| 753 | if (!is_install_) { |
Andrew | a8d7df3 | 2020-03-15 20:10:01 -0700 | [diff] [blame] | 754 | base::FilePath metadata_path = metadata_root_path.Append(dlc_id); |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 755 | Prefs prefs; |
Andrew | a8d7df3 | 2020-03-15 20:10:01 -0700 | [diff] [blame] | 756 | if (!base::CreateDirectory(metadata_path) || !prefs.Init(metadata_path)) { |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 757 | LOG(ERROR) << "Failed to initialize the preferences path:" |
| 758 | << metadata_path.value() << "."; |
| 759 | } else { |
| 760 | dlc_params.ping_active = kPingActiveValue; |
| 761 | if (!prefs.GetInt64(kPrefsPingActive, &dlc_params.ping_active) || |
| 762 | dlc_params.ping_active != kPingActiveValue) { |
| 763 | dlc_params.ping_active = kPingInactiveValue; |
| 764 | } |
| 765 | dlc_params.ping_date_last_active = |
| 766 | GetPingMetadata(prefs, kPrefsPingLastActive); |
| 767 | dlc_params.ping_date_last_rollcall = |
| 768 | GetPingMetadata(prefs, kPrefsPingLastRollcall); |
| 769 | dlc_params.send_ping = true; |
| 770 | } |
| 771 | } |
| 772 | dlc_apps_params[omaha_request_params_->GetDlcAppId(dlc_id)] = dlc_params; |
| 773 | } |
| 774 | omaha_request_params_->set_dlc_apps_params(dlc_apps_params); |
| 775 | } |
| 776 | |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 777 | void UpdateAttempter::BuildUpdateActions(bool interactive) { |
Darin Petkov | f42cc1c | 2010-09-01 09:03:02 -0700 | [diff] [blame] | 778 | CHECK(!processor_->IsRunning()); |
| 779 | processor_->set_delegate(this); |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 780 | |
Jae Hoon Kim | edb6550 | 2019-06-14 11:52:17 -0700 | [diff] [blame] | 781 | // The session ID needs to be kept throughout the update flow. The value |
| 782 | // of the session ID will reset/update only when it is a new update flow. |
| 783 | session_id_ = base::GenerateGUID(); |
| 784 | |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 785 | // Actions: |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 786 | auto update_check_fetcher = std::make_unique<LibcurlHttpFetcher>( |
| 787 | GetProxyResolver(), system_state_->hardware()); |
Alex Deymo | 33e91e7 | 2015-12-01 18:26:08 -0300 | [diff] [blame] | 788 | update_check_fetcher->set_server_to_check(ServerToCheck::kUpdate); |
Andrew de los Reyes | fb2f461 | 2011-06-09 18:21:49 -0700 | [diff] [blame] | 789 | // Try harder to connect to the network, esp when not interactive. |
| 790 | // See comment in libcurl_http_fetcher.cc. |
| 791 | update_check_fetcher->set_no_network_max_retries(interactive ? 1 : 3); |
Xiaochu Liu | 4a1173a | 2019-04-10 10:49:08 -0700 | [diff] [blame] | 792 | update_check_fetcher->set_is_update_check(true); |
Jae Hoon Kim | edb6550 | 2019-06-14 11:52:17 -0700 | [diff] [blame] | 793 | auto update_check_action = |
| 794 | std::make_unique<OmahaRequestAction>(system_state_, |
| 795 | nullptr, |
| 796 | std::move(update_check_fetcher), |
| 797 | false, |
| 798 | session_id_); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 799 | auto response_handler_action = |
| 800 | std::make_unique<OmahaResponseHandlerAction>(system_state_); |
Amin Hassani | 0882a51 | 2018-04-05 16:25:44 -0700 | [diff] [blame] | 801 | auto update_boot_flags_action = |
| 802 | std::make_unique<UpdateBootFlagsAction>(system_state_->boot_control()); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 803 | auto download_started_action = std::make_unique<OmahaRequestAction>( |
Sen Jiang | 1841408 | 2018-01-11 14:50:36 -0800 | [diff] [blame] | 804 | system_state_, |
| 805 | new OmahaEvent(OmahaEvent::kTypeUpdateDownloadStarted), |
| 806 | std::make_unique<LibcurlHttpFetcher>(GetProxyResolver(), |
| 807 | system_state_->hardware()), |
Jae Hoon Kim | edb6550 | 2019-06-14 11:52:17 -0700 | [diff] [blame] | 808 | false, |
| 809 | session_id_); |
Alex Deymo | 33e91e7 | 2015-12-01 18:26:08 -0300 | [diff] [blame] | 810 | |
Bruno Rocha | 7f9aea2 | 2011-09-12 14:31:24 -0700 | [diff] [blame] | 811 | LibcurlHttpFetcher* download_fetcher = |
Alex Deymo | 33e91e7 | 2015-12-01 18:26:08 -0300 | [diff] [blame] | 812 | new LibcurlHttpFetcher(GetProxyResolver(), system_state_->hardware()); |
| 813 | download_fetcher->set_server_to_check(ServerToCheck::kDownload); |
Sen Jiang | ee174a1 | 2017-12-21 17:38:08 -0800 | [diff] [blame] | 814 | if (interactive) |
| 815 | download_fetcher->set_max_retry_count(kDownloadMaxRetryCountInteractive); |
Jae Hoon Kim | 0ae8fe1 | 2019-06-26 14:32:50 -0700 | [diff] [blame] | 816 | download_fetcher->SetHeader(kXGoogleUpdateSessionId, session_id_); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 817 | auto download_action = |
| 818 | std::make_unique<DownloadAction>(prefs_, |
| 819 | system_state_->boot_control(), |
| 820 | system_state_->hardware(), |
| 821 | system_state_, |
| 822 | download_fetcher, // passes ownership |
| 823 | interactive); |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 824 | download_action->set_delegate(this); |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 825 | |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 826 | auto download_finished_action = std::make_unique<OmahaRequestAction>( |
| 827 | system_state_, |
| 828 | new OmahaEvent(OmahaEvent::kTypeUpdateDownloadFinished), |
| 829 | std::make_unique<LibcurlHttpFetcher>(GetProxyResolver(), |
| 830 | system_state_->hardware()), |
Jae Hoon Kim | edb6550 | 2019-06-14 11:52:17 -0700 | [diff] [blame] | 831 | false, |
| 832 | session_id_); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 833 | auto filesystem_verifier_action = |
| 834 | std::make_unique<FilesystemVerifierAction>(); |
| 835 | auto update_complete_action = std::make_unique<OmahaRequestAction>( |
| 836 | system_state_, |
| 837 | new OmahaEvent(OmahaEvent::kTypeUpdateComplete), |
| 838 | std::make_unique<LibcurlHttpFetcher>(GetProxyResolver(), |
| 839 | system_state_->hardware()), |
Jae Hoon Kim | edb6550 | 2019-06-14 11:52:17 -0700 | [diff] [blame] | 840 | false, |
| 841 | session_id_); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 842 | |
| 843 | auto postinstall_runner_action = std::make_unique<PostinstallRunnerAction>( |
| 844 | system_state_->boot_control(), system_state_->hardware()); |
| 845 | postinstall_runner_action->set_delegate(this); |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 846 | |
| 847 | // Bond them together. We have to use the leaf-types when calling |
| 848 | // BondActions(). |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 849 | BondActions(update_check_action.get(), response_handler_action.get()); |
| 850 | BondActions(response_handler_action.get(), download_action.get()); |
| 851 | BondActions(download_action.get(), filesystem_verifier_action.get()); |
| 852 | BondActions(filesystem_verifier_action.get(), |
| 853 | postinstall_runner_action.get()); |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 854 | |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 855 | processor_->EnqueueAction(std::move(update_check_action)); |
| 856 | processor_->EnqueueAction(std::move(response_handler_action)); |
Amin Hassani | 0882a51 | 2018-04-05 16:25:44 -0700 | [diff] [blame] | 857 | processor_->EnqueueAction(std::move(update_boot_flags_action)); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 858 | processor_->EnqueueAction(std::move(download_started_action)); |
| 859 | processor_->EnqueueAction(std::move(download_action)); |
| 860 | processor_->EnqueueAction(std::move(download_finished_action)); |
| 861 | processor_->EnqueueAction(std::move(filesystem_verifier_action)); |
| 862 | processor_->EnqueueAction(std::move(postinstall_runner_action)); |
| 863 | processor_->EnqueueAction(std::move(update_complete_action)); |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 864 | } |
| 865 | |
Chris Sosa | 44b9b7e | 2014-04-02 13:53:46 -0700 | [diff] [blame] | 866 | bool UpdateAttempter::Rollback(bool powerwash) { |
Colin Howes | 978c108 | 2018-12-03 11:46:12 -0800 | [diff] [blame] | 867 | is_install_ = false; |
Chris Sosa | 44b9b7e | 2014-04-02 13:53:46 -0700 | [diff] [blame] | 868 | if (!CanRollback()) { |
| 869 | return false; |
| 870 | } |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 871 | |
Chris Sosa | 44b9b7e | 2014-04-02 13:53:46 -0700 | [diff] [blame] | 872 | // Extra check for enterprise-enrolled devices since they don't support |
| 873 | // powerwash. |
| 874 | if (powerwash) { |
| 875 | // Enterprise-enrolled devices have an empty owner in their device policy. |
| 876 | string owner; |
| 877 | RefreshDevicePolicy(); |
| 878 | const policy::DevicePolicy* device_policy = system_state_->device_policy(); |
| 879 | if (device_policy && (!device_policy->GetOwner(&owner) || owner.empty())) { |
| 880 | LOG(ERROR) << "Enterprise device detected. " |
| 881 | << "Cannot perform a powerwash for enterprise devices."; |
| 882 | return false; |
| 883 | } |
| 884 | } |
| 885 | |
| 886 | processor_->set_delegate(this); |
Chris Sosa | aa18e16 | 2013-06-20 13:20:30 -0700 | [diff] [blame] | 887 | |
Chris Sosa | 28e479c | 2013-07-12 11:39:53 -0700 | [diff] [blame] | 888 | // Initialize the default request params. |
| 889 | if (!omaha_request_params_->Init("", "", true)) { |
| 890 | LOG(ERROR) << "Unable to initialize Omaha request params."; |
| 891 | return false; |
| 892 | } |
| 893 | |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 894 | LOG(INFO) << "Setting rollback options."; |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 895 | install_plan_.reset(new InstallPlan()); |
| 896 | install_plan_->target_slot = GetRollbackSlot(); |
| 897 | install_plan_->source_slot = system_state_->boot_control()->GetCurrentSlot(); |
Chris Sosa | 76a29ae | 2013-07-11 17:59:24 -0700 | [diff] [blame] | 898 | |
Alex Deymo | 706a5ab | 2015-11-23 17:48:30 -0300 | [diff] [blame] | 899 | TEST_AND_RETURN_FALSE( |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 900 | install_plan_->LoadPartitionsFromSlots(system_state_->boot_control())); |
| 901 | install_plan_->powerwash_required = powerwash; |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 902 | |
| 903 | LOG(INFO) << "Using this install plan:"; |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 904 | install_plan_->Dump(); |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 905 | |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 906 | auto install_plan_action = |
| 907 | std::make_unique<InstallPlanAction>(*install_plan_); |
| 908 | auto postinstall_runner_action = std::make_unique<PostinstallRunnerAction>( |
| 909 | system_state_->boot_control(), system_state_->hardware()); |
| 910 | postinstall_runner_action->set_delegate(this); |
| 911 | BondActions(install_plan_action.get(), postinstall_runner_action.get()); |
| 912 | processor_->EnqueueAction(std::move(install_plan_action)); |
| 913 | processor_->EnqueueAction(std::move(postinstall_runner_action)); |
Chris Sosa | aa18e16 | 2013-06-20 13:20:30 -0700 | [diff] [blame] | 914 | |
| 915 | // Update the payload state for Rollback. |
| 916 | system_state_->payload_state()->Rollback(); |
| 917 | |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 918 | SetStatusAndNotify(UpdateStatus::ATTEMPTING_ROLLBACK); |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 919 | |
Amin Hassani | 0882a51 | 2018-04-05 16:25:44 -0700 | [diff] [blame] | 920 | ScheduleProcessingStart(); |
Chris Sosa | aa18e16 | 2013-06-20 13:20:30 -0700 | [diff] [blame] | 921 | return true; |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 922 | } |
| 923 | |
Alex Vakulenko | 59e253e | 2014-02-24 10:40:21 -0800 | [diff] [blame] | 924 | bool UpdateAttempter::CanRollback() const { |
Chris Sosa | 44b9b7e | 2014-04-02 13:53:46 -0700 | [diff] [blame] | 925 | // We can only rollback if the update_engine isn't busy and we have a valid |
| 926 | // rollback partition. |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 927 | return (status_ == UpdateStatus::IDLE && |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 928 | GetRollbackSlot() != BootControlInterface::kInvalidSlot); |
Alex Vakulenko | 2bddadd | 2014-03-27 13:23:46 -0700 | [diff] [blame] | 929 | } |
| 930 | |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 931 | BootControlInterface::Slot UpdateAttempter::GetRollbackSlot() const { |
| 932 | LOG(INFO) << "UpdateAttempter::GetRollbackSlot"; |
| 933 | const unsigned int num_slots = system_state_->boot_control()->GetNumSlots(); |
| 934 | const BootControlInterface::Slot current_slot = |
| 935 | system_state_->boot_control()->GetCurrentSlot(); |
Alex Vakulenko | 59e253e | 2014-02-24 10:40:21 -0800 | [diff] [blame] | 936 | |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 937 | LOG(INFO) << " Installed slots: " << num_slots; |
| 938 | LOG(INFO) << " Booted from slot: " |
| 939 | << BootControlInterface::SlotName(current_slot); |
Alex Vakulenko | 59e253e | 2014-02-24 10:40:21 -0800 | [diff] [blame] | 940 | |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 941 | if (current_slot == BootControlInterface::kInvalidSlot || num_slots < 2) { |
| 942 | LOG(INFO) << "Device is not updateable."; |
| 943 | return BootControlInterface::kInvalidSlot; |
Alex Vakulenko | 59e253e | 2014-02-24 10:40:21 -0800 | [diff] [blame] | 944 | } |
| 945 | |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 946 | vector<BootControlInterface::Slot> bootable_slots; |
Alex Deymo | f7ead81 | 2015-10-23 17:37:27 -0700 | [diff] [blame] | 947 | for (BootControlInterface::Slot slot = 0; slot < num_slots; slot++) { |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 948 | if (slot != current_slot && |
| 949 | system_state_->boot_control()->IsSlotBootable(slot)) { |
| 950 | LOG(INFO) << "Found bootable slot " |
| 951 | << BootControlInterface::SlotName(slot); |
| 952 | return slot; |
Alex Vakulenko | 59e253e | 2014-02-24 10:40:21 -0800 | [diff] [blame] | 953 | } |
| 954 | } |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 955 | LOG(INFO) << "No other bootable slot found."; |
| 956 | return BootControlInterface::kInvalidSlot; |
Alex Vakulenko | 2bddadd | 2014-03-27 13:23:46 -0700 | [diff] [blame] | 957 | } |
| 958 | |
Aaron Wood | 081c023 | 2017-10-19 17:14:58 -0700 | [diff] [blame] | 959 | bool UpdateAttempter::CheckForUpdate(const string& app_version, |
Jay Srinivasan | e73acab | 2012-07-10 14:34:03 -0700 | [diff] [blame] | 960 | const string& omaha_url, |
Aaron Wood | 081c023 | 2017-10-19 17:14:58 -0700 | [diff] [blame] | 961 | UpdateAttemptFlags flags) { |
Jae Hoon Kim | c437ea5 | 2019-07-11 11:20:38 -0700 | [diff] [blame] | 962 | if (status_ != UpdateStatus::IDLE) { |
| 963 | LOG(INFO) << "Refusing to do an update as there is an " |
| 964 | << (is_install_ ? "install" : "update") |
| 965 | << " already in progress."; |
Aaron Wood | 081c023 | 2017-10-19 17:14:58 -0700 | [diff] [blame] | 966 | return false; |
| 967 | } |
| 968 | |
Jae Hoon Kim | c437ea5 | 2019-07-11 11:20:38 -0700 | [diff] [blame] | 969 | bool interactive = !(flags & UpdateAttemptFlags::kFlagNonInteractive); |
Jae Hoon Kim | c437ea5 | 2019-07-11 11:20:38 -0700 | [diff] [blame] | 970 | is_install_ = false; |
| 971 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 972 | LOG(INFO) << "Forced update check requested."; |
David Pursell | 02c1864 | 2014-11-06 11:26:11 -0800 | [diff] [blame] | 973 | forced_app_version_.clear(); |
| 974 | forced_omaha_url_.clear(); |
| 975 | |
| 976 | // Certain conditions must be met to allow setting custom version and update |
| 977 | // server URLs. However, kScheduledAUTestURLRequest and kAUTestURLRequest are |
| 978 | // always allowed regardless of device state. |
| 979 | if (IsAnyUpdateSourceAllowed()) { |
| 980 | forced_app_version_ = app_version; |
| 981 | forced_omaha_url_ = omaha_url; |
| 982 | } |
| 983 | if (omaha_url == kScheduledAUTestURLRequest) { |
Alex Deymo | ac41a82 | 2015-09-15 20:52:53 -0700 | [diff] [blame] | 984 | forced_omaha_url_ = constants::kOmahaDefaultAUTestURL; |
David Pursell | 02c1864 | 2014-11-06 11:26:11 -0800 | [diff] [blame] | 985 | // Pretend that it's not user-initiated even though it is, |
| 986 | // so as to test scattering logic, etc. which get kicked off |
| 987 | // only in scheduled update checks. |
| 988 | interactive = false; |
| 989 | } else if (omaha_url == kAUTestURLRequest) { |
Alex Deymo | ac41a82 | 2015-09-15 20:52:53 -0700 | [diff] [blame] | 990 | forced_omaha_url_ = constants::kOmahaDefaultAUTestURL; |
David Pursell | 02c1864 | 2014-11-06 11:26:11 -0800 | [diff] [blame] | 991 | } |
| 992 | |
Aaron Wood | 081c023 | 2017-10-19 17:14:58 -0700 | [diff] [blame] | 993 | if (interactive) { |
| 994 | // Use the passed-in update attempt flags for this update attempt instead |
| 995 | // of the previously set ones. |
| 996 | current_update_attempt_flags_ = flags; |
| 997 | // Note: The caching for non-interactive update checks happens in |
Jae Hoon Kim | 75daa38 | 2019-07-02 11:17:24 -0700 | [diff] [blame] | 998 | // |OnUpdateScheduled()|. |
Aaron Wood | 081c023 | 2017-10-19 17:14:58 -0700 | [diff] [blame] | 999 | } |
| 1000 | |
Jae Hoon Kim | 2b73ac2 | 2019-07-02 11:17:24 -0700 | [diff] [blame] | 1001 | // |forced_update_pending_callback_| should always be set, but even in the |
| 1002 | // case that it is not, we still return true indicating success because the |
| 1003 | // scheduled periodic check will pick up these changes. |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1004 | if (forced_update_pending_callback_.get()) { |
Jae Hoon Kim | 2b73ac2 | 2019-07-02 11:17:24 -0700 | [diff] [blame] | 1005 | // Always call |ScheduleUpdates()| before forcing an update. This is because |
| 1006 | // we need an update to be scheduled for the |
| 1007 | // |forced_update_pending_callback_| to have an effect. Here we don't need |
| 1008 | // to care about the return value from |ScheduleUpdate()|. |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1009 | ScheduleUpdates(); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 1010 | forced_update_pending_callback_->Run(true, interactive); |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1011 | } |
Aaron Wood | 081c023 | 2017-10-19 17:14:58 -0700 | [diff] [blame] | 1012 | return true; |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1013 | } |
| 1014 | |
Xiaochu Liu | f53a5d3 | 2018-11-26 13:48:59 -0800 | [diff] [blame] | 1015 | bool UpdateAttempter::CheckForInstall(const vector<string>& dlc_module_ids, |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 1016 | const string& omaha_url) { |
Jae Hoon Kim | c437ea5 | 2019-07-11 11:20:38 -0700 | [diff] [blame] | 1017 | if (status_ != UpdateStatus::IDLE) { |
| 1018 | LOG(INFO) << "Refusing to do an install as there is an " |
| 1019 | << (is_install_ ? "install" : "update") |
| 1020 | << " already in progress."; |
| 1021 | return false; |
| 1022 | } |
| 1023 | |
Xiaochu Liu | f53a5d3 | 2018-11-26 13:48:59 -0800 | [diff] [blame] | 1024 | dlc_module_ids_ = dlc_module_ids; |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 1025 | is_install_ = true; |
| 1026 | forced_omaha_url_.clear(); |
| 1027 | |
| 1028 | // Certain conditions must be met to allow setting custom version and update |
| 1029 | // server URLs. However, kScheduledAUTestURLRequest and kAUTestURLRequest are |
| 1030 | // always allowed regardless of device state. |
| 1031 | if (IsAnyUpdateSourceAllowed()) { |
| 1032 | forced_omaha_url_ = omaha_url; |
| 1033 | } |
Jae Hoon Kim | c43f6bb | 2019-07-03 12:56:52 -0700 | [diff] [blame] | 1034 | |
| 1035 | if (omaha_url == kScheduledAUTestURLRequest || |
| 1036 | omaha_url == kAUTestURLRequest) { |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 1037 | forced_omaha_url_ = constants::kOmahaDefaultAUTestURL; |
| 1038 | } |
| 1039 | |
Jae Hoon Kim | 2b73ac2 | 2019-07-02 11:17:24 -0700 | [diff] [blame] | 1040 | // |forced_update_pending_callback_| should always be set, but even in the |
| 1041 | // case that it is not, we still return true indicating success because the |
| 1042 | // scheduled periodic check will pick up these changes. |
| 1043 | if (forced_update_pending_callback_.get()) { |
| 1044 | // Always call |ScheduleUpdates()| before forcing an update. This is because |
| 1045 | // we need an update to be scheduled for the |
| 1046 | // |forced_update_pending_callback_| to have an effect. Here we don't need |
| 1047 | // to care about the return value from |ScheduleUpdate()|. |
| 1048 | ScheduleUpdates(); |
| 1049 | forced_update_pending_callback_->Run(true, true); |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 1050 | } |
| 1051 | return true; |
| 1052 | } |
| 1053 | |
Darin Petkov | 296889c | 2010-07-23 16:20:54 -0700 | [diff] [blame] | 1054 | bool UpdateAttempter::RebootIfNeeded() { |
Amin Hassani | e79eab6 | 2018-03-06 11:55:57 -0800 | [diff] [blame] | 1055 | #ifdef __ANDROID__ |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1056 | if (status_ != UpdateStatus::UPDATED_NEED_REBOOT) { |
Darin Petkov | 296889c | 2010-07-23 16:20:54 -0700 | [diff] [blame] | 1057 | LOG(INFO) << "Reboot requested, but status is " |
| 1058 | << UpdateStatusToString(status_) << ", so not rebooting."; |
| 1059 | return false; |
| 1060 | } |
Amin Hassani | e79eab6 | 2018-03-06 11:55:57 -0800 | [diff] [blame] | 1061 | #endif // __ANDROID__ |
Daniel Erat | 65f1da0 | 2014-06-27 22:05:38 -0700 | [diff] [blame] | 1062 | |
Sen Jiang | b8c6a8f | 2016-06-07 17:33:17 -0700 | [diff] [blame] | 1063 | if (system_state_->power_manager()->RequestReboot()) |
Daniel Erat | 65f1da0 | 2014-06-27 22:05:38 -0700 | [diff] [blame] | 1064 | return true; |
| 1065 | |
| 1066 | return RebootDirectly(); |
Darin Petkov | 296889c | 2010-07-23 16:20:54 -0700 | [diff] [blame] | 1067 | } |
| 1068 | |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 1069 | void UpdateAttempter::WriteUpdateCompletedMarker() { |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 1070 | string boot_id; |
| 1071 | if (!utils::GetBootId(&boot_id)) |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 1072 | return; |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 1073 | prefs_->SetString(kPrefsUpdateCompletedOnBootId, boot_id); |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 1074 | |
| 1075 | int64_t value = system_state_->clock()->GetBootTime().ToInternalValue(); |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 1076 | prefs_->SetInt64(kPrefsUpdateCompletedBootTime, value); |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 1077 | } |
| 1078 | |
Daniel Erat | 65f1da0 | 2014-06-27 22:05:38 -0700 | [diff] [blame] | 1079 | bool UpdateAttempter::RebootDirectly() { |
Amin Hassani | 3a4caa1 | 2019-11-06 11:12:28 -0800 | [diff] [blame] | 1080 | vector<string> command = {"/sbin/shutdown", "-r", "now"}; |
Daniel Erat | 65f1da0 | 2014-06-27 22:05:38 -0700 | [diff] [blame] | 1081 | int rc = 0; |
Amin Hassani | 3a4caa1 | 2019-11-06 11:12:28 -0800 | [diff] [blame] | 1082 | Subprocess::SynchronousExec(command, &rc, nullptr, nullptr); |
Daniel Erat | 65f1da0 | 2014-06-27 22:05:38 -0700 | [diff] [blame] | 1083 | return rc == 0; |
| 1084 | } |
| 1085 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 1086 | void UpdateAttempter::OnUpdateScheduled(EvalStatus status, |
| 1087 | const UpdateCheckParams& params) { |
| 1088 | waiting_for_scheduled_check_ = false; |
| 1089 | |
| 1090 | if (status == EvalStatus::kSucceeded) { |
| 1091 | if (!params.updates_enabled) { |
| 1092 | LOG(WARNING) << "Updates permanently disabled."; |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1093 | // Signal disabled status, then switch right back to idle. This is |
| 1094 | // necessary for ensuring that observers waiting for a signal change will |
| 1095 | // actually notice one on subsequent calls. Note that we don't need to |
| 1096 | // re-schedule a check in this case as updates are permanently disabled; |
| 1097 | // further (forced) checks may still initiate a scheduling call. |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1098 | SetStatusAndNotify(UpdateStatus::DISABLED); |
| 1099 | SetStatusAndNotify(UpdateStatus::IDLE); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 1100 | return; |
| 1101 | } |
| 1102 | |
Amin Hassani | ed37d68 | 2018-04-06 13:22:00 -0700 | [diff] [blame] | 1103 | LOG(INFO) << "Running " << (params.interactive ? "interactive" : "periodic") |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 1104 | << " update."; |
| 1105 | |
Amin Hassani | ed37d68 | 2018-04-06 13:22:00 -0700 | [diff] [blame] | 1106 | if (!params.interactive) { |
Aaron Wood | 081c023 | 2017-10-19 17:14:58 -0700 | [diff] [blame] | 1107 | // Cache the update attempt flags that will be used by this update attempt |
| 1108 | // so that they can't be changed mid-way through. |
| 1109 | current_update_attempt_flags_ = update_attempt_flags_; |
| 1110 | } |
| 1111 | |
Aaron Wood | bf5a252 | 2017-10-04 10:58:36 -0700 | [diff] [blame] | 1112 | LOG(INFO) << "Update attempt flags in use = 0x" << std::hex |
| 1113 | << current_update_attempt_flags_; |
| 1114 | |
Amin Hassani | ed37d68 | 2018-04-06 13:22:00 -0700 | [diff] [blame] | 1115 | Update(forced_app_version_, |
| 1116 | forced_omaha_url_, |
| 1117 | params.target_channel, |
| 1118 | params.target_version_prefix, |
Marton Hunyady | ba51c3f | 2018-04-25 15:18:10 +0200 | [diff] [blame] | 1119 | params.rollback_allowed, |
Zentaro Kavanagh | 28def4f | 2019-01-15 17:15:01 -0800 | [diff] [blame] | 1120 | params.rollback_data_save_requested, |
Zentaro Kavanagh | 0ef9a2f | 2018-07-02 12:05:07 -0700 | [diff] [blame] | 1121 | params.rollback_allowed_milestones, |
Marton Hunyady | ba51c3f | 2018-04-25 15:18:10 +0200 | [diff] [blame] | 1122 | /*obey_proxies=*/false, |
Amin Hassani | ed37d68 | 2018-04-06 13:22:00 -0700 | [diff] [blame] | 1123 | params.interactive); |
Alex Deymo | 7147908 | 2016-03-25 17:54:28 -0700 | [diff] [blame] | 1124 | // Always clear the forced app_version and omaha_url after an update attempt |
| 1125 | // so the next update uses the defaults. |
| 1126 | forced_app_version_.clear(); |
| 1127 | forced_omaha_url_.clear(); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 1128 | } else { |
| 1129 | LOG(WARNING) |
| 1130 | << "Update check scheduling failed (possibly timed out); retrying."; |
| 1131 | ScheduleUpdates(); |
| 1132 | } |
| 1133 | |
| 1134 | // This check ensures that future update checks will be or are already |
| 1135 | // scheduled. The check should never fail. A check failure means that there's |
| 1136 | // a bug that will most likely prevent further automatic update checks. It |
| 1137 | // seems better to crash in such cases and restart the update_engine daemon |
| 1138 | // into, hopefully, a known good state. |
Jae Hoon Kim | ba2fdce | 2019-07-11 13:18:58 -0700 | [diff] [blame] | 1139 | CHECK(IsBusyOrUpdateScheduled()); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 1140 | } |
| 1141 | |
| 1142 | void UpdateAttempter::UpdateLastCheckedTime() { |
| 1143 | last_checked_time_ = system_state_->clock()->GetWallclockTime().ToTimeT(); |
| 1144 | } |
| 1145 | |
Marton Hunyady | e58bddb | 2018-04-10 20:27:26 +0200 | [diff] [blame] | 1146 | void UpdateAttempter::UpdateRollbackHappened() { |
| 1147 | DCHECK(system_state_); |
| 1148 | DCHECK(system_state_->payload_state()); |
| 1149 | DCHECK(policy_provider_); |
| 1150 | if (system_state_->payload_state()->GetRollbackHappened() && |
| 1151 | (policy_provider_->device_policy_is_loaded() || |
| 1152 | policy_provider_->IsConsumerDevice())) { |
| 1153 | // Rollback happened, but we already went through OOBE and policy is |
| 1154 | // present or it's a consumer device. |
| 1155 | system_state_->payload_state()->SetRollbackHappened(false); |
| 1156 | } |
| 1157 | } |
| 1158 | |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1159 | void UpdateAttempter::ProcessingDoneInternal(const ActionProcessor* processor, |
| 1160 | ErrorCode code) { |
Chris Sosa | 4f8ee27 | 2012-11-30 13:01:54 -0800 | [diff] [blame] | 1161 | // Reset cpu shares back to normal. |
Alex Deymo | ab0d976 | 2016-02-02 10:52:56 -0800 | [diff] [blame] | 1162 | cpu_limiter_.StopLimiter(); |
Darin Petkov | c6c135c | 2010-08-11 13:36:18 -0700 | [diff] [blame] | 1163 | |
Amin Hassani | ecb60d3 | 2019-06-17 18:09:10 -0700 | [diff] [blame] | 1164 | ResetInteractivityFlags(); |
Adolfo Victoria | 20262ad | 2018-08-06 10:40:11 -0700 | [diff] [blame] | 1165 | |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1166 | if (status_ == UpdateStatus::REPORTING_ERROR_EVENT) { |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1167 | LOG(INFO) << "Error event sent."; |
Gilad Arnold | 1ebd813 | 2012-03-05 10:19:29 -0800 | [diff] [blame] | 1168 | |
Amin Hassani | ecb60d3 | 2019-06-17 18:09:10 -0700 | [diff] [blame] | 1169 | // Inform scheduler of new status. |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1170 | SetStatusAndNotify(UpdateStatus::IDLE); |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1171 | ScheduleUpdates(); |
Gilad Arnold | 1ebd813 | 2012-03-05 10:19:29 -0800 | [diff] [blame] | 1172 | |
Andrew de los Reyes | c1d5c93 | 2011-04-20 17:15:47 -0700 | [diff] [blame] | 1173 | if (!fake_update_success_) { |
| 1174 | return; |
| 1175 | } |
| 1176 | LOG(INFO) << "Booted from FW B and tried to install new firmware, " |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 1177 | "so requesting reboot from user."; |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1178 | } |
| 1179 | |
Sen Jiang | 89e24c1 | 2018-03-22 18:05:44 -0700 | [diff] [blame] | 1180 | attempt_error_code_ = utils::GetBaseErrorCode(code); |
| 1181 | |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1182 | if (code != ErrorCode::kSuccess) { |
| 1183 | if (ScheduleErrorEventAction()) { |
Colin Howes | ac170d9 | 2018-11-20 16:29:28 -0800 | [diff] [blame] | 1184 | return; |
| 1185 | } |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1186 | LOG(INFO) << "No update."; |
| 1187 | SetStatusAndNotify(UpdateStatus::IDLE); |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1188 | ScheduleUpdates(); |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1189 | return; |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 1190 | } |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1191 | |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1192 | ReportTimeToUpdateAppliedMetric(); |
| 1193 | prefs_->SetInt64(kPrefsDeltaUpdateFailures, 0); |
| 1194 | prefs_->SetString(kPrefsPreviousVersion, |
| 1195 | omaha_request_params_->app_version()); |
| 1196 | DeltaPerformer::ResetUpdateProgress(prefs_, false); |
| 1197 | |
| 1198 | system_state_->payload_state()->UpdateSucceeded(); |
| 1199 | |
| 1200 | // Since we're done with scattering fully at this point, this is the |
| 1201 | // safest point delete the state files, as we're sure that the status is |
| 1202 | // set to reboot (which means no more updates will be applied until reboot) |
| 1203 | // This deletion is required for correctness as we want the next update |
| 1204 | // check to re-create a new random number for the update check count. |
| 1205 | // Similarly, we also delete the wall-clock-wait period that was persisted |
| 1206 | // so that we start with a new random value for the next update check |
| 1207 | // after reboot so that the same device is not favored or punished in any |
| 1208 | // way. |
| 1209 | prefs_->Delete(kPrefsUpdateCheckCount); |
| 1210 | system_state_->payload_state()->SetScatteringWaitPeriod(TimeDelta()); |
| 1211 | system_state_->payload_state()->SetStagingWaitPeriod(TimeDelta()); |
| 1212 | prefs_->Delete(kPrefsUpdateFirstSeenAt); |
| 1213 | |
| 1214 | // Note: below this comment should only be on |ErrorCode::kSuccess|. |
| 1215 | if (is_install_) { |
| 1216 | ProcessingDoneInstall(processor, code); |
| 1217 | } else { |
| 1218 | ProcessingDoneUpdate(processor, code); |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 1219 | } |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1220 | } |
| 1221 | |
| 1222 | void UpdateAttempter::ProcessingDoneInstall(const ActionProcessor* processor, |
| 1223 | ErrorCode code) { |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1224 | SetStatusAndNotify(UpdateStatus::IDLE); |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1225 | ScheduleUpdates(); |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1226 | LOG(INFO) << "DLC successfully installed, no reboot needed."; |
| 1227 | } |
| 1228 | |
| 1229 | void UpdateAttempter::ProcessingDoneUpdate(const ActionProcessor* processor, |
| 1230 | ErrorCode code) { |
| 1231 | WriteUpdateCompletedMarker(); |
| 1232 | |
| 1233 | SetStatusAndNotify(UpdateStatus::UPDATED_NEED_REBOOT); |
| 1234 | ScheduleUpdates(); |
| 1235 | LOG(INFO) << "Update successfully applied, waiting to reboot."; |
| 1236 | |
| 1237 | // |install_plan_| is null during rollback operations, and the stats don't |
| 1238 | // make much sense then anyway. |
| 1239 | if (install_plan_) { |
| 1240 | // Generate an unique payload identifier. |
| 1241 | string target_version_uid; |
| 1242 | for (const auto& payload : install_plan_->payloads) { |
| 1243 | target_version_uid += brillo::data_encoding::Base64Encode(payload.hash) + |
| 1244 | ":" + payload.metadata_signature + ":"; |
| 1245 | } |
| 1246 | |
| 1247 | // If we just downloaded a rollback image, we should preserve this fact |
| 1248 | // over the following powerwash. |
| 1249 | if (install_plan_->is_rollback) { |
| 1250 | system_state_->payload_state()->SetRollbackHappened(true); |
| 1251 | system_state_->metrics_reporter()->ReportEnterpriseRollbackMetrics( |
| 1252 | /*success=*/true, install_plan_->version); |
| 1253 | } |
| 1254 | |
| 1255 | // Expect to reboot into the new version to send the proper metric during |
| 1256 | // next boot. |
| 1257 | system_state_->payload_state()->ExpectRebootInNewVersion( |
| 1258 | target_version_uid); |
| 1259 | } else { |
| 1260 | // If we just finished a rollback, then we expect to have no Omaha |
| 1261 | // response. Otherwise, it's an error. |
| 1262 | if (system_state_->payload_state()->GetRollbackVersion().empty()) { |
| 1263 | LOG(ERROR) << "Can't send metrics because there was no Omaha response"; |
| 1264 | } |
| 1265 | } |
| 1266 | } |
| 1267 | |
| 1268 | // Delegate methods: |
| 1269 | void UpdateAttempter::ProcessingDone(const ActionProcessor* processor, |
| 1270 | ErrorCode code) { |
| 1271 | LOG(INFO) << "Processing Done."; |
| 1272 | ProcessingDoneInternal(processor, code); |
| 1273 | |
| 1274 | // Note: do cleanups here for any variables that need to be reset after a |
| 1275 | // failure, error, update, or install. |
| 1276 | is_install_ = false; |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1277 | } |
| 1278 | |
| 1279 | void UpdateAttempter::ProcessingStopped(const ActionProcessor* processor) { |
Chris Sosa | 4f8ee27 | 2012-11-30 13:01:54 -0800 | [diff] [blame] | 1280 | // Reset cpu shares back to normal. |
Alex Deymo | ab0d976 | 2016-02-02 10:52:56 -0800 | [diff] [blame] | 1281 | cpu_limiter_.StopLimiter(); |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1282 | download_progress_ = 0.0; |
Amin Hassani | ecb60d3 | 2019-06-17 18:09:10 -0700 | [diff] [blame] | 1283 | |
| 1284 | ResetInteractivityFlags(); |
| 1285 | |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1286 | SetStatusAndNotify(UpdateStatus::IDLE); |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1287 | ScheduleUpdates(); |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 1288 | error_event_.reset(nullptr); |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1289 | } |
| 1290 | |
| 1291 | // Called whenever an action has finished processing, either successfully |
| 1292 | // or otherwise. |
| 1293 | void UpdateAttempter::ActionCompleted(ActionProcessor* processor, |
| 1294 | AbstractAction* action, |
David Zeuthen | a99981f | 2013-04-29 13:42:47 -0700 | [diff] [blame] | 1295 | ErrorCode code) { |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 1296 | // Reset download progress regardless of whether or not the download |
| 1297 | // action succeeded. Also, get the response code from HTTP request |
| 1298 | // actions (update download as well as the initial update check |
| 1299 | // actions). |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1300 | const string type = action->Type(); |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 1301 | if (type == DownloadAction::StaticType()) { |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1302 | download_progress_ = 0.0; |
Gilad Arnold | cf175a0 | 2014-07-10 16:48:47 -0700 | [diff] [blame] | 1303 | DownloadAction* download_action = static_cast<DownloadAction*>(action); |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 1304 | http_response_code_ = download_action->GetHTTPResponseCode(); |
| 1305 | } else if (type == OmahaRequestAction::StaticType()) { |
| 1306 | OmahaRequestAction* omaha_request_action = |
Gilad Arnold | cf175a0 | 2014-07-10 16:48:47 -0700 | [diff] [blame] | 1307 | static_cast<OmahaRequestAction*>(action); |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 1308 | // If the request is not an event, then it's the update-check. |
| 1309 | if (!omaha_request_action->IsEvent()) { |
| 1310 | http_response_code_ = omaha_request_action->GetHTTPResponseCode(); |
Gilad Arnold | a6dab94 | 2014-04-25 11:46:03 -0700 | [diff] [blame] | 1311 | |
| 1312 | // Record the number of consecutive failed update checks. |
| 1313 | if (http_response_code_ == kHttpResponseInternalServerError || |
| 1314 | http_response_code_ == kHttpResponseServiceUnavailable) { |
| 1315 | consecutive_failed_update_checks_++; |
| 1316 | } else { |
| 1317 | consecutive_failed_update_checks_ = 0; |
| 1318 | } |
| 1319 | |
Weidong Guo | 421ff33 | 2017-04-17 10:08:38 -0700 | [diff] [blame] | 1320 | const OmahaResponse& omaha_response = |
| 1321 | omaha_request_action->GetOutputObject(); |
Gilad Arnold | a0258a5 | 2014-07-10 16:21:19 -0700 | [diff] [blame] | 1322 | // Store the server-dictated poll interval, if any. |
| 1323 | server_dictated_poll_interval_ = |
Weidong Guo | 421ff33 | 2017-04-17 10:08:38 -0700 | [diff] [blame] | 1324 | std::max(0, omaha_response.poll_interval); |
| 1325 | |
| 1326 | // This update is ignored by omaha request action because update over |
| 1327 | // cellular connection is not allowed. Needs to ask for user's permissions |
| 1328 | // to update. |
| 1329 | if (code == ErrorCode::kOmahaUpdateIgnoredOverCellular) { |
| 1330 | new_version_ = omaha_response.version; |
| 1331 | new_payload_size_ = 0; |
| 1332 | for (const auto& package : omaha_response.packages) { |
| 1333 | new_payload_size_ += package.size; |
| 1334 | } |
| 1335 | SetStatusAndNotify(UpdateStatus::NEED_PERMISSION_TO_UPDATE); |
| 1336 | } |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 1337 | } |
Aaron Wood | 23bd339 | 2017-10-06 14:48:25 -0700 | [diff] [blame] | 1338 | } else if (type == OmahaResponseHandlerAction::StaticType()) { |
| 1339 | // Depending on the returned error code, note that an update is available. |
| 1340 | if (code == ErrorCode::kOmahaUpdateDeferredPerPolicy || |
| 1341 | code == ErrorCode::kSuccess) { |
| 1342 | // Note that the status will be updated to DOWNLOADING when some bytes |
| 1343 | // get actually downloaded from the server and the BytesReceived |
| 1344 | // callback is invoked. This avoids notifying the user that a download |
| 1345 | // has started in cases when the server and the client are unable to |
| 1346 | // initiate the download. |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1347 | auto omaha_response_handler_action = |
| 1348 | static_cast<OmahaResponseHandlerAction*>(action); |
| 1349 | install_plan_.reset( |
| 1350 | new InstallPlan(omaha_response_handler_action->install_plan())); |
Aaron Wood | 23bd339 | 2017-10-06 14:48:25 -0700 | [diff] [blame] | 1351 | UpdateLastCheckedTime(); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1352 | new_version_ = install_plan_->version; |
Aaron Wood | 23bd339 | 2017-10-06 14:48:25 -0700 | [diff] [blame] | 1353 | new_payload_size_ = 0; |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1354 | for (const auto& payload : install_plan_->payloads) |
Aaron Wood | 23bd339 | 2017-10-06 14:48:25 -0700 | [diff] [blame] | 1355 | new_payload_size_ += payload.size; |
| 1356 | cpu_limiter_.StartLimiter(); |
| 1357 | SetStatusAndNotify(UpdateStatus::UPDATE_AVAILABLE); |
| 1358 | } |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 1359 | } |
Aaron Wood | 23bd339 | 2017-10-06 14:48:25 -0700 | [diff] [blame] | 1360 | // General failure cases. |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1361 | if (code != ErrorCode::kSuccess) { |
Darin Petkov | 7ed561b | 2011-10-04 02:59:03 -0700 | [diff] [blame] | 1362 | // If the current state is at or past the download phase, count the failure |
| 1363 | // in case a switch to full update becomes necessary. Ignore network |
| 1364 | // transfer timeouts and failures. |
Amin Hassani | 89a3712 | 2018-03-23 12:59:24 -0700 | [diff] [blame] | 1365 | if (code != ErrorCode::kDownloadTransferError) { |
| 1366 | switch (status_) { |
| 1367 | case UpdateStatus::IDLE: |
| 1368 | case UpdateStatus::CHECKING_FOR_UPDATE: |
| 1369 | case UpdateStatus::UPDATE_AVAILABLE: |
| 1370 | case UpdateStatus::NEED_PERMISSION_TO_UPDATE: |
| 1371 | break; |
| 1372 | case UpdateStatus::DOWNLOADING: |
| 1373 | case UpdateStatus::VERIFYING: |
| 1374 | case UpdateStatus::FINALIZING: |
| 1375 | case UpdateStatus::UPDATED_NEED_REBOOT: |
| 1376 | case UpdateStatus::REPORTING_ERROR_EVENT: |
| 1377 | case UpdateStatus::ATTEMPTING_ROLLBACK: |
| 1378 | case UpdateStatus::DISABLED: |
| 1379 | MarkDeltaUpdateFailure(); |
| 1380 | break; |
| 1381 | } |
Darin Petkov | 3627577 | 2010-10-01 11:40:57 -0700 | [diff] [blame] | 1382 | } |
Sen Jiang | 89e24c1 | 2018-03-22 18:05:44 -0700 | [diff] [blame] | 1383 | if (code != ErrorCode::kNoUpdate) { |
| 1384 | // On failure, schedule an error event to be sent to Omaha. |
| 1385 | CreatePendingErrorEvent(action, code); |
| 1386 | } |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1387 | return; |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1388 | } |
Aaron Wood | 23bd339 | 2017-10-06 14:48:25 -0700 | [diff] [blame] | 1389 | // Find out which action completed (successfully). |
| 1390 | if (type == DownloadAction::StaticType()) { |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1391 | SetStatusAndNotify(UpdateStatus::FINALIZING); |
Amin Hassani | afd8cea | 2017-12-04 14:20:00 -0800 | [diff] [blame] | 1392 | } else if (type == FilesystemVerifierAction::StaticType()) { |
| 1393 | // Log the system properties before the postinst and after the file system |
| 1394 | // is verified. It used to be done in the postinst itself. But postinst |
| 1395 | // cannot do this anymore. On the other hand, these logs are frequently |
| 1396 | // looked at and it is preferable not to scatter them in random location in |
| 1397 | // the log and rather log it right before the postinst. The reason not do |
| 1398 | // this in the |PostinstallRunnerAction| is to prevent dependency from |
| 1399 | // libpayload_consumer to libupdate_engine. |
| 1400 | LogImageProperties(); |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1401 | } |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 1402 | } |
| 1403 | |
Alex Deymo | 542c19b | 2015-12-03 07:43:31 -0300 | [diff] [blame] | 1404 | void UpdateAttempter::BytesReceived(uint64_t bytes_progressed, |
| 1405 | uint64_t bytes_received, |
| 1406 | uint64_t total) { |
| 1407 | // The PayloadState keeps track of how many bytes were actually downloaded |
| 1408 | // from a given URL for the URL skipping logic. |
| 1409 | system_state_->payload_state()->DownloadProgress(bytes_progressed); |
| 1410 | |
Alex Deymo | 0d29854 | 2016-03-30 18:31:49 -0700 | [diff] [blame] | 1411 | double progress = 0; |
| 1412 | if (total) |
| 1413 | progress = static_cast<double>(bytes_received) / static_cast<double>(total); |
| 1414 | if (status_ != UpdateStatus::DOWNLOADING || bytes_received == total) { |
Darin Petkov | af18305 | 2010-08-23 12:07:13 -0700 | [diff] [blame] | 1415 | download_progress_ = progress; |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1416 | SetStatusAndNotify(UpdateStatus::DOWNLOADING); |
Alex Deymo | 0d29854 | 2016-03-30 18:31:49 -0700 | [diff] [blame] | 1417 | } else { |
| 1418 | ProgressUpdate(progress); |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1419 | } |
| 1420 | } |
| 1421 | |
Alex Deymo | 542c19b | 2015-12-03 07:43:31 -0300 | [diff] [blame] | 1422 | void UpdateAttempter::DownloadComplete() { |
| 1423 | system_state_->payload_state()->DownloadComplete(); |
| 1424 | } |
| 1425 | |
Alex Deymo | 0d29854 | 2016-03-30 18:31:49 -0700 | [diff] [blame] | 1426 | void UpdateAttempter::ProgressUpdate(double progress) { |
| 1427 | // Self throttle based on progress. Also send notifications if progress is |
| 1428 | // too slow. |
| 1429 | if (progress == 1.0 || |
| 1430 | progress - download_progress_ >= kBroadcastThresholdProgress || |
| 1431 | TimeTicks::Now() - last_notify_time_ >= |
| 1432 | TimeDelta::FromSeconds(kBroadcastThresholdSeconds)) { |
| 1433 | download_progress_ = progress; |
| 1434 | BroadcastStatus(); |
| 1435 | } |
| 1436 | } |
| 1437 | |
Amin Hassani | ecb60d3 | 2019-06-17 18:09:10 -0700 | [diff] [blame] | 1438 | void UpdateAttempter::ResetInteractivityFlags() { |
| 1439 | // Reset the state that's only valid for a single update pass. |
| 1440 | current_update_attempt_flags_ = UpdateAttemptFlags::kNone; |
| 1441 | |
| 1442 | if (forced_update_pending_callback_.get()) |
| 1443 | // Clear prior interactive requests once the processor is done. |
| 1444 | forced_update_pending_callback_->Run(false, false); |
| 1445 | } |
| 1446 | |
Jay Srinivasan | c1ba09a | 2012-08-14 14:15:57 -0700 | [diff] [blame] | 1447 | bool UpdateAttempter::ResetStatus() { |
| 1448 | LOG(INFO) << "Attempting to reset state from " |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1449 | << UpdateStatusToString(status_) << " to UpdateStatus::IDLE"; |
Jay Srinivasan | c1ba09a | 2012-08-14 14:15:57 -0700 | [diff] [blame] | 1450 | |
| 1451 | switch (status_) { |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1452 | case UpdateStatus::IDLE: |
Jay Srinivasan | c1ba09a | 2012-08-14 14:15:57 -0700 | [diff] [blame] | 1453 | // no-op. |
| 1454 | return true; |
| 1455 | |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 1456 | case UpdateStatus::UPDATED_NEED_REBOOT: { |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1457 | bool ret_value = true; |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1458 | status_ = UpdateStatus::IDLE; |
Jay Srinivasan | c1ba09a | 2012-08-14 14:15:57 -0700 | [diff] [blame] | 1459 | |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1460 | // Remove the reboot marker so that if the machine is rebooted |
Jay Srinivasan | c1ba09a | 2012-08-14 14:15:57 -0700 | [diff] [blame] | 1461 | // after resetting to idle state, it doesn't go back to |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1462 | // UpdateStatus::UPDATED_NEED_REBOOT state. |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 1463 | ret_value = prefs_->Delete(kPrefsUpdateCompletedOnBootId) && ret_value; |
| 1464 | ret_value = prefs_->Delete(kPrefsUpdateCompletedBootTime) && ret_value; |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1465 | |
Alex Deymo | 9870c0e | 2015-09-23 13:58:31 -0700 | [diff] [blame] | 1466 | // Update the boot flags so the current slot has higher priority. |
| 1467 | BootControlInterface* boot_control = system_state_->boot_control(); |
| 1468 | if (!boot_control->SetActiveBootSlot(boot_control->GetCurrentSlot())) |
| 1469 | ret_value = false; |
| 1470 | |
Alex Deymo | 5259033 | 2016-11-29 18:29:13 -0800 | [diff] [blame] | 1471 | // Mark the current slot as successful again, since marking it as active |
| 1472 | // may reset the successful bit. We ignore the result of whether marking |
| 1473 | // the current slot as successful worked. |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 1474 | if (!boot_control->MarkBootSuccessfulAsync(Bind([](bool successful) {}))) |
Alex Deymo | 5259033 | 2016-11-29 18:29:13 -0800 | [diff] [blame] | 1475 | ret_value = false; |
| 1476 | |
Alex Deymo | 4243291 | 2013-07-12 20:21:15 -0700 | [diff] [blame] | 1477 | // Notify the PayloadState that the successful payload was canceled. |
| 1478 | system_state_->payload_state()->ResetUpdateStatus(); |
| 1479 | |
Alex Deymo | 87c0886 | 2015-10-30 21:56:55 -0700 | [diff] [blame] | 1480 | // The previous version is used to report back to omaha after reboot that |
| 1481 | // we actually rebooted into the new version from this "prev-version". We |
| 1482 | // need to clear out this value now to prevent it being sent on the next |
| 1483 | // updatecheck request. |
| 1484 | ret_value = prefs_->SetString(kPrefsPreviousVersion, "") && ret_value; |
| 1485 | |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 1486 | LOG(INFO) << "Reset status " << (ret_value ? "successful" : "failed"); |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1487 | return ret_value; |
Jay Srinivasan | c1ba09a | 2012-08-14 14:15:57 -0700 | [diff] [blame] | 1488 | } |
| 1489 | |
| 1490 | default: |
| 1491 | LOG(ERROR) << "Reset not allowed in this state."; |
| 1492 | return false; |
| 1493 | } |
| 1494 | } |
| 1495 | |
Aaron Wood | 7f92e2b | 2017-08-28 14:51:21 -0700 | [diff] [blame] | 1496 | bool UpdateAttempter::GetStatus(UpdateEngineStatus* out_status) { |
Aaron Wood | 795c5b4 | 2017-12-05 16:06:13 -0800 | [diff] [blame] | 1497 | out_status->last_checked_time = last_checked_time_; |
Aaron Wood | 7f92e2b | 2017-08-28 14:51:21 -0700 | [diff] [blame] | 1498 | out_status->status = status_; |
| 1499 | out_status->current_version = omaha_request_params_->app_version(); |
Aaron Wood | 7f92e2b | 2017-08-28 14:51:21 -0700 | [diff] [blame] | 1500 | out_status->progress = download_progress_; |
| 1501 | out_status->new_size_bytes = new_payload_size_; |
| 1502 | out_status->new_version = new_version_; |
Amin Hassani | 9be122e | 2019-08-29 09:20:12 -0700 | [diff] [blame] | 1503 | out_status->is_enterprise_rollback = |
| 1504 | install_plan_ && install_plan_->is_rollback; |
Jae Hoon Kim | 2f78c1c | 2019-07-25 13:20:43 -0700 | [diff] [blame] | 1505 | out_status->is_install = is_install_; |
Jae Hoon Kim | 051627a | 2019-09-03 12:56:32 -0700 | [diff] [blame] | 1506 | |
| 1507 | string str_eol_date; |
| 1508 | system_state_->prefs()->GetString(kPrefsOmahaEolDate, &str_eol_date); |
| 1509 | out_status->eol_date = StringToEolDate(str_eol_date); |
| 1510 | |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 1511 | return true; |
| 1512 | } |
| 1513 | |
Darin Petkov | 61635a9 | 2011-05-18 16:20:36 -0700 | [diff] [blame] | 1514 | void UpdateAttempter::BroadcastStatus() { |
Aaron Wood | 7f92e2b | 2017-08-28 14:51:21 -0700 | [diff] [blame] | 1515 | UpdateEngineStatus broadcast_status; |
| 1516 | // Use common method for generating the current status. |
| 1517 | GetStatus(&broadcast_status); |
| 1518 | |
Alex Deymo | fa78f14 | 2016-01-26 21:36:16 -0800 | [diff] [blame] | 1519 | for (const auto& observer : service_observers_) { |
Aaron Wood | 7f92e2b | 2017-08-28 14:51:21 -0700 | [diff] [blame] | 1520 | observer->SendStatusUpdate(broadcast_status); |
Alex Deymo | fa78f14 | 2016-01-26 21:36:16 -0800 | [diff] [blame] | 1521 | } |
Darin Petkov | af18305 | 2010-08-23 12:07:13 -0700 | [diff] [blame] | 1522 | last_notify_time_ = TimeTicks::Now(); |
Alex Deymo | fa78f14 | 2016-01-26 21:36:16 -0800 | [diff] [blame] | 1523 | } |
| 1524 | |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 1525 | uint32_t UpdateAttempter::GetErrorCodeFlags() { |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1526 | uint32_t flags = 0; |
| 1527 | |
J. Richard Barnette | 056b0ab | 2013-10-29 15:24:56 -0700 | [diff] [blame] | 1528 | if (!system_state_->hardware()->IsNormalBootMode()) |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1529 | flags |= static_cast<uint32_t>(ErrorCode::kDevModeFlag); |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1530 | |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1531 | if (install_plan_ && install_plan_->is_resume) |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1532 | flags |= static_cast<uint32_t>(ErrorCode::kResumedFlag); |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1533 | |
J. Richard Barnette | 056b0ab | 2013-10-29 15:24:56 -0700 | [diff] [blame] | 1534 | if (!system_state_->hardware()->IsOfficialBuild()) |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1535 | flags |= static_cast<uint32_t>(ErrorCode::kTestImageFlag); |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1536 | |
Sen Jiang | daeaa43 | 2018-10-09 18:18:45 -0700 | [diff] [blame] | 1537 | if (!omaha_request_params_->IsUpdateUrlOfficial()) { |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1538 | flags |= static_cast<uint32_t>(ErrorCode::kTestOmahaUrlFlag); |
Alex Deymo | ac41a82 | 2015-09-15 20:52:53 -0700 | [diff] [blame] | 1539 | } |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1540 | |
| 1541 | return flags; |
| 1542 | } |
| 1543 | |
David Zeuthen | a99981f | 2013-04-29 13:42:47 -0700 | [diff] [blame] | 1544 | bool UpdateAttempter::ShouldCancel(ErrorCode* cancel_reason) { |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1545 | // Check if the channel we're attempting to update to is the same as the |
| 1546 | // target channel currently chosen by the user. |
| 1547 | OmahaRequestParams* params = system_state_->request_params(); |
| 1548 | if (params->download_channel() != params->target_channel()) { |
| 1549 | LOG(ERROR) << "Aborting download as target channel: " |
| 1550 | << params->target_channel() |
| 1551 | << " is different from the download channel: " |
| 1552 | << params->download_channel(); |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1553 | *cancel_reason = ErrorCode::kUpdateCanceledByChannelChange; |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1554 | return true; |
| 1555 | } |
| 1556 | |
| 1557 | return false; |
| 1558 | } |
| 1559 | |
Nam T. Nguyen | 7d623eb | 2014-05-13 16:06:28 -0700 | [diff] [blame] | 1560 | void UpdateAttempter::SetStatusAndNotify(UpdateStatus status) { |
Darin Petkov | 61635a9 | 2011-05-18 16:20:36 -0700 | [diff] [blame] | 1561 | status_ = status; |
Darin Petkov | 61635a9 | 2011-05-18 16:20:36 -0700 | [diff] [blame] | 1562 | BroadcastStatus(); |
| 1563 | } |
| 1564 | |
Darin Petkov | 777dbfa | 2010-07-20 15:03:37 -0700 | [diff] [blame] | 1565 | void UpdateAttempter::CreatePendingErrorEvent(AbstractAction* action, |
David Zeuthen | a99981f | 2013-04-29 13:42:47 -0700 | [diff] [blame] | 1566 | ErrorCode code) { |
Sen Jiang | 89e24c1 | 2018-03-22 18:05:44 -0700 | [diff] [blame] | 1567 | if (error_event_.get() || status_ == UpdateStatus::REPORTING_ERROR_EVENT) { |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1568 | // This shouldn't really happen. |
| 1569 | LOG(WARNING) << "There's already an existing pending error event."; |
| 1570 | return; |
| 1571 | } |
Darin Petkov | 777dbfa | 2010-07-20 15:03:37 -0700 | [diff] [blame] | 1572 | |
Jay Srinivasan | 56d5aa4 | 2012-03-26 14:27:59 -0700 | [diff] [blame] | 1573 | // Classify the code to generate the appropriate result so that |
| 1574 | // the Borgmon charts show up the results correctly. |
| 1575 | // Do this before calling GetErrorCodeForAction which could potentially |
| 1576 | // augment the bit representation of code and thus cause no matches for |
| 1577 | // the switch cases below. |
| 1578 | OmahaEvent::Result event_result; |
| 1579 | switch (code) { |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1580 | case ErrorCode::kOmahaUpdateIgnoredPerPolicy: |
| 1581 | case ErrorCode::kOmahaUpdateDeferredPerPolicy: |
| 1582 | case ErrorCode::kOmahaUpdateDeferredForBackoff: |
Jay Srinivasan | 56d5aa4 | 2012-03-26 14:27:59 -0700 | [diff] [blame] | 1583 | event_result = OmahaEvent::kResultUpdateDeferred; |
| 1584 | break; |
| 1585 | default: |
| 1586 | event_result = OmahaEvent::kResultError; |
| 1587 | break; |
| 1588 | } |
| 1589 | |
Darin Petkov | 777dbfa | 2010-07-20 15:03:37 -0700 | [diff] [blame] | 1590 | code = GetErrorCodeForAction(action, code); |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1591 | fake_update_success_ = code == ErrorCode::kPostinstallBootedFromFirmwareB; |
Darin Petkov | 18c7bce | 2011-06-16 14:07:00 -0700 | [diff] [blame] | 1592 | |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1593 | // Compute the final error code with all the bit flags to be sent to Omaha. |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 1594 | code = |
| 1595 | static_cast<ErrorCode>(static_cast<uint32_t>(code) | GetErrorCodeFlags()); |
| 1596 | error_event_.reset( |
| 1597 | new OmahaEvent(OmahaEvent::kTypeUpdateComplete, event_result, code)); |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1598 | } |
| 1599 | |
| 1600 | bool UpdateAttempter::ScheduleErrorEventAction() { |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 1601 | if (error_event_.get() == nullptr) |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1602 | return false; |
| 1603 | |
Jay Srinivasan | 6f6ea00 | 2012-12-14 11:26:28 -0800 | [diff] [blame] | 1604 | LOG(ERROR) << "Update failed."; |
| 1605 | system_state_->payload_state()->UpdateFailed(error_event_->error_code); |
| 1606 | |
Marton Hunyady | a030268 | 2018-05-16 18:52:13 +0200 | [diff] [blame] | 1607 | // Send metrics if it was a rollback. |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1608 | if (install_plan_ && install_plan_->is_rollback) { |
| 1609 | system_state_->metrics_reporter()->ReportEnterpriseRollbackMetrics( |
| 1610 | /*success=*/false, install_plan_->version); |
Marton Hunyady | a030268 | 2018-05-16 18:52:13 +0200 | [diff] [blame] | 1611 | } |
| 1612 | |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1613 | // Send it to Omaha. |
Alex Deymo | af9a863 | 2015-09-23 18:51:48 -0700 | [diff] [blame] | 1614 | LOG(INFO) << "Reporting the error event"; |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1615 | auto error_event_action = std::make_unique<OmahaRequestAction>( |
| 1616 | system_state_, |
| 1617 | error_event_.release(), // Pass ownership. |
| 1618 | std::make_unique<LibcurlHttpFetcher>(GetProxyResolver(), |
| 1619 | system_state_->hardware()), |
Jae Hoon Kim | edb6550 | 2019-06-14 11:52:17 -0700 | [diff] [blame] | 1620 | false, |
| 1621 | session_id_); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1622 | processor_->EnqueueAction(std::move(error_event_action)); |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1623 | SetStatusAndNotify(UpdateStatus::REPORTING_ERROR_EVENT); |
Darin Petkov | f42cc1c | 2010-09-01 09:03:02 -0700 | [diff] [blame] | 1624 | processor_->StartProcessing(); |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1625 | return true; |
| 1626 | } |
| 1627 | |
Darin Petkov | 58dd134 | 2011-05-06 12:05:13 -0700 | [diff] [blame] | 1628 | void UpdateAttempter::ScheduleProcessingStart() { |
| 1629 | LOG(INFO) << "Scheduling an action processor start."; |
Alex Deymo | 60ca1a7 | 2015-06-18 18:19:15 -0700 | [diff] [blame] | 1630 | MessageLoop::current()->PostTask( |
| 1631 | FROM_HERE, |
Luis Hector Chavez | f1cf348 | 2016-07-19 14:29:19 -0700 | [diff] [blame] | 1632 | Bind([](ActionProcessor* processor) { processor->StartProcessing(); }, |
| 1633 | base::Unretained(processor_.get()))); |
Darin Petkov | 58dd134 | 2011-05-06 12:05:13 -0700 | [diff] [blame] | 1634 | } |
| 1635 | |
Darin Petkov | 3627577 | 2010-10-01 11:40:57 -0700 | [diff] [blame] | 1636 | void UpdateAttempter::DisableDeltaUpdateIfNeeded() { |
| 1637 | int64_t delta_failures; |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 1638 | if (omaha_request_params_->delta_okay() && |
Darin Petkov | 3627577 | 2010-10-01 11:40:57 -0700 | [diff] [blame] | 1639 | prefs_->GetInt64(kPrefsDeltaUpdateFailures, &delta_failures) && |
| 1640 | delta_failures >= kMaxDeltaUpdateFailures) { |
| 1641 | LOG(WARNING) << "Too many delta update failures, forcing full update."; |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 1642 | omaha_request_params_->set_delta_okay(false); |
Darin Petkov | 3627577 | 2010-10-01 11:40:57 -0700 | [diff] [blame] | 1643 | } |
| 1644 | } |
| 1645 | |
| 1646 | void UpdateAttempter::MarkDeltaUpdateFailure() { |
Darin Petkov | 2dd0109 | 2010-10-08 15:43:05 -0700 | [diff] [blame] | 1647 | // Don't try to resume a failed delta update. |
| 1648 | DeltaPerformer::ResetUpdateProgress(prefs_, false); |
Darin Petkov | 3627577 | 2010-10-01 11:40:57 -0700 | [diff] [blame] | 1649 | int64_t delta_failures; |
| 1650 | if (!prefs_->GetInt64(kPrefsDeltaUpdateFailures, &delta_failures) || |
| 1651 | delta_failures < 0) { |
| 1652 | delta_failures = 0; |
| 1653 | } |
| 1654 | prefs_->SetInt64(kPrefsDeltaUpdateFailures, ++delta_failures); |
| 1655 | } |
| 1656 | |
Thieu Le | 116fda3 | 2011-04-19 11:01:54 -0700 | [diff] [blame] | 1657 | void UpdateAttempter::PingOmaha() { |
Thieu Le | d88a857 | 2011-05-26 09:09:19 -0700 | [diff] [blame] | 1658 | if (!processor_->IsRunning()) { |
Amin Hassani | ecb60d3 | 2019-06-17 18:09:10 -0700 | [diff] [blame] | 1659 | ResetInteractivityFlags(); |
| 1660 | |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1661 | auto ping_action = std::make_unique<OmahaRequestAction>( |
Alex Deymo | c1c17b4 | 2015-11-23 03:53:15 -0300 | [diff] [blame] | 1662 | system_state_, |
| 1663 | nullptr, |
Ben Chan | ab5a0af | 2017-10-12 14:57:50 -0700 | [diff] [blame] | 1664 | std::make_unique<LibcurlHttpFetcher>(GetProxyResolver(), |
Ben Chan | 5c02c13 | 2017-06-27 07:10:36 -0700 | [diff] [blame] | 1665 | system_state_->hardware()), |
Jae Hoon Kim | edb6550 | 2019-06-14 11:52:17 -0700 | [diff] [blame] | 1666 | true, |
| 1667 | "" /* session_id */); |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 1668 | processor_->set_delegate(nullptr); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1669 | processor_->EnqueueAction(std::move(ping_action)); |
Thieu Le | d88a857 | 2011-05-26 09:09:19 -0700 | [diff] [blame] | 1670 | // Call StartProcessing() synchronously here to avoid any race conditions |
| 1671 | // caused by multiple outstanding ping Omaha requests. If we call |
| 1672 | // StartProcessing() asynchronously, the device can be suspended before we |
| 1673 | // get a chance to callback to StartProcessing(). When the device resumes |
| 1674 | // (assuming the device sleeps longer than the next update check period), |
| 1675 | // StartProcessing() is called back and at the same time, the next update |
| 1676 | // check is fired which eventually invokes StartProcessing(). A crash |
| 1677 | // can occur because StartProcessing() checks to make sure that the |
| 1678 | // processor is idle which it isn't due to the two concurrent ping Omaha |
| 1679 | // requests. |
| 1680 | processor_->StartProcessing(); |
| 1681 | } else { |
Darin Petkov | 58dd134 | 2011-05-06 12:05:13 -0700 | [diff] [blame] | 1682 | LOG(WARNING) << "Action processor running, Omaha ping suppressed."; |
Darin Petkov | 58dd134 | 2011-05-06 12:05:13 -0700 | [diff] [blame] | 1683 | } |
Thieu Le | d88a857 | 2011-05-26 09:09:19 -0700 | [diff] [blame] | 1684 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 1685 | // Update the last check time here; it may be re-updated when an Omaha |
| 1686 | // response is received, but this will prevent us from repeatedly scheduling |
| 1687 | // checks in the case where a response is not received. |
| 1688 | UpdateLastCheckedTime(); |
| 1689 | |
Thieu Le | d88a857 | 2011-05-26 09:09:19 -0700 | [diff] [blame] | 1690 | // Update the status which will schedule the next update check |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1691 | SetStatusAndNotify(UpdateStatus::UPDATED_NEED_REBOOT); |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1692 | ScheduleUpdates(); |
Thieu Le | 116fda3 | 2011-04-19 11:01:54 -0700 | [diff] [blame] | 1693 | } |
| 1694 | |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 1695 | bool UpdateAttempter::DecrementUpdateCheckCount() { |
Ben Chan | 9abb763 | 2014-08-07 00:10:53 -0700 | [diff] [blame] | 1696 | int64_t update_check_count_value; |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 1697 | |
| 1698 | if (!prefs_->Exists(kPrefsUpdateCheckCount)) { |
| 1699 | // This file does not exist. This means we haven't started our update |
| 1700 | // check count down yet, so nothing more to do. This file will be created |
| 1701 | // later when we first satisfy the wall-clock-based-wait period. |
| 1702 | LOG(INFO) << "No existing update check count. That's normal."; |
| 1703 | return true; |
| 1704 | } |
| 1705 | |
| 1706 | if (prefs_->GetInt64(kPrefsUpdateCheckCount, &update_check_count_value)) { |
| 1707 | // Only if we're able to read a proper integer value, then go ahead |
| 1708 | // and decrement and write back the result in the same file, if needed. |
| 1709 | LOG(INFO) << "Update check count = " << update_check_count_value; |
| 1710 | |
| 1711 | if (update_check_count_value == 0) { |
| 1712 | // It could be 0, if, for some reason, the file didn't get deleted |
| 1713 | // when we set our status to waiting for reboot. so we just leave it |
| 1714 | // as is so that we can prevent another update_check wait for this client. |
| 1715 | LOG(INFO) << "Not decrementing update check count as it's already 0."; |
| 1716 | return true; |
| 1717 | } |
| 1718 | |
| 1719 | if (update_check_count_value > 0) |
| 1720 | update_check_count_value--; |
| 1721 | else |
| 1722 | update_check_count_value = 0; |
| 1723 | |
| 1724 | // Write out the new value of update_check_count_value. |
| 1725 | if (prefs_->SetInt64(kPrefsUpdateCheckCount, update_check_count_value)) { |
Sen Jiang | 771f648 | 2018-04-04 17:59:10 -0700 | [diff] [blame] | 1726 | // We successfully wrote out the new value, so enable the |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 1727 | // update check based wait. |
| 1728 | LOG(INFO) << "New update check count = " << update_check_count_value; |
| 1729 | return true; |
| 1730 | } |
| 1731 | } |
| 1732 | |
| 1733 | LOG(INFO) << "Deleting update check count state due to read/write errors."; |
| 1734 | |
| 1735 | // We cannot read/write to the file, so disable the update check based wait |
| 1736 | // so that we don't get stuck in this OS version by any chance (which could |
| 1737 | // happen if there's some bug that causes to read/write incorrectly). |
| 1738 | // Also attempt to delete the file to do our best effort to cleanup. |
| 1739 | prefs_->Delete(kPrefsUpdateCheckCount); |
| 1740 | return false; |
| 1741 | } |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 1742 | |
David Zeuthen | e4c58bf | 2013-06-18 17:26:50 -0700 | [diff] [blame] | 1743 | void UpdateAttempter::UpdateEngineStarted() { |
Alex Vakulenko | dea2eac | 2014-03-14 15:56:59 -0700 | [diff] [blame] | 1744 | // If we just booted into a new update, keep the previous OS version |
| 1745 | // in case we rebooted because of a crash of the old version, so we |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 1746 | // can do a proper crash report with correct information. |
Alex Vakulenko | dea2eac | 2014-03-14 15:56:59 -0700 | [diff] [blame] | 1747 | // This must be done before calling |
| 1748 | // system_state_->payload_state()->UpdateEngineStarted() since it will |
| 1749 | // delete SystemUpdated marker file. |
| 1750 | if (system_state_->system_rebooted() && |
| 1751 | prefs_->Exists(kPrefsSystemUpdatedMarker)) { |
| 1752 | if (!prefs_->GetString(kPrefsPreviousVersion, &prev_version_)) { |
| 1753 | // If we fail to get the version string, make sure it stays empty. |
| 1754 | prev_version_.clear(); |
| 1755 | } |
| 1756 | } |
| 1757 | |
David Zeuthen | e4c58bf | 2013-06-18 17:26:50 -0700 | [diff] [blame] | 1758 | system_state_->payload_state()->UpdateEngineStarted(); |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 1759 | StartP2PAtStartup(); |
| 1760 | } |
| 1761 | |
| 1762 | bool UpdateAttempter::StartP2PAtStartup() { |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 1763 | if (system_state_ == nullptr || |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 1764 | !system_state_->p2p_manager()->IsP2PEnabled()) { |
| 1765 | LOG(INFO) << "Not starting p2p at startup since it's not enabled."; |
| 1766 | return false; |
| 1767 | } |
| 1768 | |
| 1769 | if (system_state_->p2p_manager()->CountSharedFiles() < 1) { |
| 1770 | LOG(INFO) << "Not starting p2p at startup since our application " |
| 1771 | << "is not sharing any files."; |
| 1772 | return false; |
| 1773 | } |
| 1774 | |
| 1775 | return StartP2PAndPerformHousekeeping(); |
| 1776 | } |
| 1777 | |
| 1778 | bool UpdateAttempter::StartP2PAndPerformHousekeeping() { |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 1779 | if (system_state_ == nullptr) |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 1780 | return false; |
| 1781 | |
| 1782 | if (!system_state_->p2p_manager()->IsP2PEnabled()) { |
| 1783 | LOG(INFO) << "Not starting p2p since it's not enabled."; |
| 1784 | return false; |
| 1785 | } |
| 1786 | |
| 1787 | LOG(INFO) << "Ensuring that p2p is running."; |
| 1788 | if (!system_state_->p2p_manager()->EnsureP2PRunning()) { |
| 1789 | LOG(ERROR) << "Error starting p2p."; |
| 1790 | return false; |
| 1791 | } |
| 1792 | |
| 1793 | LOG(INFO) << "Performing p2p housekeeping."; |
| 1794 | if (!system_state_->p2p_manager()->PerformHousekeeping()) { |
| 1795 | LOG(ERROR) << "Error performing housekeeping for p2p."; |
| 1796 | return false; |
| 1797 | } |
| 1798 | |
| 1799 | LOG(INFO) << "Done performing p2p housekeeping."; |
| 1800 | return true; |
David Zeuthen | e4c58bf | 2013-06-18 17:26:50 -0700 | [diff] [blame] | 1801 | } |
| 1802 | |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 1803 | bool UpdateAttempter::GetBootTimeAtUpdate(Time* out_boot_time) { |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 1804 | // In case of an update_engine restart without a reboot, we stored the boot_id |
| 1805 | // when the update was completed by setting a pref, so we can check whether |
| 1806 | // the last update was on this boot or a previous one. |
| 1807 | string boot_id; |
| 1808 | TEST_AND_RETURN_FALSE(utils::GetBootId(&boot_id)); |
| 1809 | |
| 1810 | string update_completed_on_boot_id; |
| 1811 | if (!prefs_->Exists(kPrefsUpdateCompletedOnBootId) || |
| 1812 | !prefs_->GetString(kPrefsUpdateCompletedOnBootId, |
| 1813 | &update_completed_on_boot_id) || |
| 1814 | update_completed_on_boot_id != boot_id) |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 1815 | return false; |
| 1816 | |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 1817 | // Short-circuit avoiding the read in case out_boot_time is nullptr. |
| 1818 | if (out_boot_time) { |
| 1819 | int64_t boot_time = 0; |
| 1820 | // Since the kPrefsUpdateCompletedOnBootId was correctly set, this pref |
| 1821 | // should not fail. |
| 1822 | TEST_AND_RETURN_FALSE( |
| 1823 | prefs_->GetInt64(kPrefsUpdateCompletedBootTime, &boot_time)); |
| 1824 | *out_boot_time = Time::FromInternalValue(boot_time); |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 1825 | } |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 1826 | return true; |
| 1827 | } |
| 1828 | |
Jae Hoon Kim | ba2fdce | 2019-07-11 13:18:58 -0700 | [diff] [blame] | 1829 | bool UpdateAttempter::IsBusyOrUpdateScheduled() { |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1830 | return ((status_ != UpdateStatus::IDLE && |
| 1831 | status_ != UpdateStatus::UPDATED_NEED_REBOOT) || |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1832 | waiting_for_scheduled_check_); |
| 1833 | } |
| 1834 | |
Sen Jiang | daeaa43 | 2018-10-09 18:18:45 -0700 | [diff] [blame] | 1835 | bool UpdateAttempter::IsAnyUpdateSourceAllowed() const { |
David Pursell | 907b4fa | 2015-01-27 10:27:38 -0800 | [diff] [blame] | 1836 | // We allow updates from any source if either of these are true: |
| 1837 | // * The device is running an unofficial (dev/test) image. |
| 1838 | // * The debugd dev features are accessible (i.e. in devmode with no owner). |
| 1839 | // This protects users running a base image, while still allowing a specific |
| 1840 | // window (gated by the debug dev features) where `cros flash` is usable. |
David Pursell | 02c1864 | 2014-11-06 11:26:11 -0800 | [diff] [blame] | 1841 | if (!system_state_->hardware()->IsOfficialBuild()) { |
| 1842 | LOG(INFO) << "Non-official build; allowing any update source."; |
| 1843 | return true; |
| 1844 | } |
| 1845 | |
Sen Jiang | e67bb5b | 2016-06-20 15:53:56 -0700 | [diff] [blame] | 1846 | if (system_state_->hardware()->AreDevFeaturesEnabled()) { |
| 1847 | LOG(INFO) << "Developer features enabled; allowing custom update sources."; |
David Pursell | 02c1864 | 2014-11-06 11:26:11 -0800 | [diff] [blame] | 1848 | return true; |
| 1849 | } |
Sen Jiang | e67bb5b | 2016-06-20 15:53:56 -0700 | [diff] [blame] | 1850 | |
| 1851 | LOG(INFO) |
| 1852 | << "Developer features disabled; disallowing custom update sources."; |
David Pursell | 02c1864 | 2014-11-06 11:26:11 -0800 | [diff] [blame] | 1853 | return false; |
| 1854 | } |
| 1855 | |
May Lippert | 60aa3ca | 2018-08-15 16:55:29 -0700 | [diff] [blame] | 1856 | void UpdateAttempter::ReportTimeToUpdateAppliedMetric() { |
| 1857 | const policy::DevicePolicy* device_policy = system_state_->device_policy(); |
| 1858 | if (device_policy && device_policy->IsEnterpriseEnrolled()) { |
| 1859 | vector<policy::DevicePolicy::WeeklyTimeInterval> parsed_intervals; |
| 1860 | bool has_time_restrictions = |
| 1861 | device_policy->GetDisallowedTimeIntervals(&parsed_intervals); |
| 1862 | |
| 1863 | int64_t update_first_seen_at_int; |
| 1864 | if (system_state_->prefs()->Exists(kPrefsUpdateFirstSeenAt)) { |
| 1865 | if (system_state_->prefs()->GetInt64(kPrefsUpdateFirstSeenAt, |
| 1866 | &update_first_seen_at_int)) { |
| 1867 | TimeDelta update_delay = |
| 1868 | system_state_->clock()->GetWallclockTime() - |
| 1869 | Time::FromInternalValue(update_first_seen_at_int); |
| 1870 | system_state_->metrics_reporter() |
| 1871 | ->ReportEnterpriseUpdateSeenToDownloadDays(has_time_restrictions, |
| 1872 | update_delay.InDays()); |
| 1873 | } |
| 1874 | } |
| 1875 | } |
| 1876 | } |
| 1877 | |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 1878 | } // namespace chromeos_update_engine |