blob: b4e2f60ba40afc081a94396e3e7ec26bcd982d10 [file] [log] [blame]
Alex Deymoaea4c1c2015-08-19 20:24:43 -07001//
2// Copyright (C) 2012 The Android Open Source Project
3//
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at
7//
8// http://www.apache.org/licenses/LICENSE-2.0
9//
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15//
Andrew de los Reyes4e9b9f42010-04-26 15:06:43 -070016
Gilad Arnoldcf175a02014-07-10 16:48:47 -070017#ifndef UPDATE_ENGINE_UPDATE_ATTEMPTER_H_
18#define UPDATE_ENGINE_UPDATE_ATTEMPTER_H_
Andrew de los Reyes4e9b9f42010-04-26 15:06:43 -070019
Andrew de los Reyes63b96d72010-05-10 13:08:54 -070020#include <time.h>
Darin Petkovc6c135c2010-08-11 13:36:18 -070021
Alex Deymobc91a272014-05-20 16:45:33 -070022#include <memory>
Alex Deymofa78f142016-01-26 21:36:16 -080023#include <set>
Andrew de los Reyes4e9b9f42010-04-26 15:06:43 -070024#include <string>
Alex Vakulenkod2779df2014-06-16 13:19:00 -070025#include <utility>
Alex Vakulenko44cab302014-07-23 13:12:15 -070026#include <vector>
Darin Petkovc6c135c2010-08-11 13:36:18 -070027
Gilad Arnold44dc3bf2014-07-18 23:39:38 -070028#include <base/bind.h>
Alex Vakulenko75039d72014-03-25 12:36:28 -070029#include <base/time/time.h>
Darin Petkovf42cc1c2010-09-01 09:03:02 -070030#include <gtest/gtest_prod.h> // for FRIEND_TEST
Darin Petkovc6c135c2010-08-11 13:36:18 -070031
Amin Hassanie94ece52017-08-01 15:03:08 -070032#if USE_CHROME_NETWORK_PROXY
Andrew de los Reyes000d8952011-03-02 15:21:14 -080033#include "update_engine/chrome_browser_proxy_resolver.h"
Amin Hassanie94ece52017-08-01 15:03:08 -070034#endif // USE_CHROME_NETWORK_PROXY
Alex Deymo14c0da82016-07-20 16:45:45 -070035#include "update_engine/certificate_checker.h"
Alex Deymo906191f2015-10-12 12:22:44 -070036#include "update_engine/client_library/include/update_engine/update_status.h"
Alex Deymo39910dc2015-11-09 17:04:30 -080037#include "update_engine/common/action_processor.h"
Alex Deymoab0d9762016-02-02 10:52:56 -080038#include "update_engine/common/cpu_limiter.h"
Darin Petkova4a8a8c2010-07-15 22:21:12 -070039#include "update_engine/omaha_request_params.h"
Andrew de los Reyes4e9b9f42010-04-26 15:06:43 -070040#include "update_engine/omaha_response_handler_action.h"
Alex Deymo39910dc2015-11-09 17:04:30 -080041#include "update_engine/payload_consumer/download_action.h"
Alex Deymo0d298542016-03-30 18:31:49 -070042#include "update_engine/payload_consumer/postinstall_runner_action.h"
Andrew de los Reyes45168102010-11-22 11:13:50 -080043#include "update_engine/proxy_resolver.h"
Alex Deymofa78f142016-01-26 21:36:16 -080044#include "update_engine/service_observer_interface.h"
Jay Srinivasan43488792012-06-19 00:25:31 -070045#include "update_engine/system_state.h"
Gilad Arnoldec7f9162014-07-15 13:24:46 -070046#include "update_engine/update_manager/policy.h"
47#include "update_engine/update_manager/update_manager.h"
Andrew de los Reyes4e9b9f42010-04-26 15:06:43 -070048
Darin Petkov9d65b7b2010-07-20 09:13:01 -070049class MetricsLibraryInterface;
Andrew de los Reyes63b96d72010-05-10 13:08:54 -070050
Daniel Erate5f6f252017-04-20 12:09:58 -060051namespace org {
52namespace chromium {
53class NetworkProxyServiceInterfaceProxyInterface;
54} // namespace chromium
55} // namespace org
56
Patrick Dubroy7fbbe8a2011-08-01 17:28:22 +020057namespace policy {
Alex Vakulenko157fe302014-08-11 15:59:58 -070058class PolicyProvider;
Patrick Dubroy7fbbe8a2011-08-01 17:28:22 +020059}
60
Andrew de los Reyes4e9b9f42010-04-26 15:06:43 -070061namespace chromeos_update_engine {
62
Alex Deymob7ca0962014-10-01 17:58:07 -070063class UpdateEngineAdaptor;
Darin Petkovc6c135c2010-08-11 13:36:18 -070064
Andrew de los Reyes63b96d72010-05-10 13:08:54 -070065class UpdateAttempter : public ActionProcessorDelegate,
Alex Deymoc1c17b42015-11-23 03:53:15 -030066 public DownloadActionDelegate,
Alex Deymof7ead812015-10-23 17:37:27 -070067 public CertificateChecker::Observer,
Alex Deymo0d298542016-03-30 18:31:49 -070068 public PostinstallRunnerAction::DelegateInterface {
Andrew de los Reyes4e9b9f42010-04-26 15:06:43 -070069 public:
Christopher Wileycc8ce0e2015-10-01 16:48:47 -070070 using UpdateStatus = update_engine::UpdateStatus;
Darin Petkov36275772010-10-01 11:40:57 -070071 static const int kMaxDeltaUpdateFailures;
72
Jay Srinivasan6f6ea002012-12-14 11:26:28 -080073 UpdateAttempter(SystemState* system_state,
Alex Deymo33e91e72015-12-01 18:26:08 -030074 CertificateChecker* cert_checker,
Daniel Erate5f6f252017-04-20 12:09:58 -060075 org::chromium::NetworkProxyServiceInterfaceProxyInterface*
76 network_proxy_service_proxy);
Alex Deymo610277e2014-11-11 21:18:11 -080077 ~UpdateAttempter() override;
Darin Petkovc6c135c2010-08-11 13:36:18 -070078
Gilad Arnold1f847232014-04-07 12:07:49 -070079 // Further initialization to be done post construction.
80 void Init();
81
Gilad Arnoldec7f9162014-07-15 13:24:46 -070082 // Initiates scheduling of update checks.
83 virtual void ScheduleUpdates();
84
Gilad Arnold1ebd8132012-03-05 10:19:29 -080085 // Checks for update and, if a newer version is available, attempts to update
86 // the system. Non-empty |in_app_version| or |in_update_url| prevents
Gilad Arnoldec7f9162014-07-15 13:24:46 -070087 // automatic detection of the parameter. |target_channel| denotes a
88 // policy-mandated channel we are updating to, if not empty. If |obey_proxies|
89 // is true, the update will likely respect Chrome's proxy setting. For
90 // security reasons, we may still not honor them. |interactive| should be true
91 // if this was called from the user (ie dbus).
Darin Petkov1023a602010-08-30 13:47:51 -070092 virtual void Update(const std::string& app_version,
Andrew de los Reyes45168102010-11-22 11:13:50 -080093 const std::string& omaha_url,
Gilad Arnoldec7f9162014-07-15 13:24:46 -070094 const std::string& target_channel,
95 const std::string& target_version_prefix,
Andrew de los Reyesfb2f4612011-06-09 18:21:49 -070096 bool obey_proxies,
Nam T. Nguyen7d623eb2014-05-13 16:06:28 -070097 bool interactive);
Darin Petkova4a8a8c2010-07-15 22:21:12 -070098
Andrew de los Reyes63b96d72010-05-10 13:08:54 -070099 // ActionProcessorDelegate methods:
Alex Deymo610277e2014-11-11 21:18:11 -0800100 void ProcessingDone(const ActionProcessor* processor,
101 ErrorCode code) override;
102 void ProcessingStopped(const ActionProcessor* processor) override;
Andrew de los Reyes63b96d72010-05-10 13:08:54 -0700103 void ActionCompleted(ActionProcessor* processor,
104 AbstractAction* action,
Alex Deymo610277e2014-11-11 21:18:11 -0800105 ErrorCode code) override;
Darin Petkova4a8a8c2010-07-15 22:21:12 -0700106
Alex Deymo0d298542016-03-30 18:31:49 -0700107 // PostinstallRunnerAction::DelegateInterface
108 void ProgressUpdate(double progress) override;
109
Jay Srinivasanc1ba09a2012-08-14 14:15:57 -0700110 // Resets the current state to UPDATE_STATUS_IDLE.
111 // Used by update_engine_client for restarting a new update without
112 // having to reboot once the previous update has reached
113 // UPDATE_STATUS_UPDATED_NEED_REBOOT state. This is used only
114 // for testing purposes.
Alex Deymo560ae1d2014-10-28 02:17:54 -0700115 virtual bool ResetStatus();
Jay Srinivasanc1ba09a2012-08-14 14:15:57 -0700116
Andrew de los Reyes4e9b9f42010-04-26 15:06:43 -0700117 // Returns the current status in the out params. Returns true on success.
Gilad Arnold76b2b482014-04-01 13:32:43 -0700118 virtual bool GetStatus(int64_t* last_checked_time,
119 double* progress,
120 std::string* current_operation,
121 std::string* new_version,
122 int64_t* new_size);
Andrew de los Reyes4e9b9f42010-04-26 15:06:43 -0700123
Darin Petkov58dd1342011-05-06 12:05:13 -0700124 // Runs chromeos-setgoodkernel, whose responsibility it is to mark the
125 // currently booted partition has high priority/permanent/etc. The execution
126 // is asynchronous. On completion, the action processor may be started
127 // depending on the |start_action_processor_| field. Note that every update
128 // attempt goes through this method.
Andrew de los Reyes6dbf30a2011-04-19 10:58:16 -0700129 void UpdateBootFlags();
130
Alex Deymoaa26f622015-09-16 18:21:27 -0700131 // Called when the boot flags have been updated.
132 void CompleteUpdateBootFlags(bool success);
Darin Petkov58dd1342011-05-06 12:05:13 -0700133
Darin Petkov1023a602010-08-30 13:47:51 -0700134 UpdateStatus status() const { return status_; }
135
136 int http_response_code() const { return http_response_code_; }
137 void set_http_response_code(int code) { http_response_code_ = code; }
138
Jay Srinivasane73acab2012-07-10 14:34:03 -0700139 // This is the internal entry point for going through an
Darin Petkov5a7f5652010-07-22 21:40:09 -0700140 // update. If the current status is idle invokes Update.
Jay Srinivasane73acab2012-07-10 14:34:03 -0700141 // This is called by the DBus implementation.
Alex Deymo560ae1d2014-10-28 02:17:54 -0700142 virtual void CheckForUpdate(const std::string& app_version,
143 const std::string& omaha_url,
144 bool is_interactive);
Andrew de los Reyes63b96d72010-05-10 13:08:54 -0700145
Chris Sosad317e402013-06-12 13:47:09 -0700146 // This is the internal entry point for going through a rollback. This will
147 // attempt to run the postinstall on the non-active partition and set it as
148 // the partition to boot from. If |powerwash| is True, perform a powerwash
Chris Sosa44b9b7e2014-04-02 13:53:46 -0700149 // as part of rollback. Returns True on success.
150 bool Rollback(bool powerwash);
Chris Sosad317e402013-06-12 13:47:09 -0700151
Chris Sosa44b9b7e2014-04-02 13:53:46 -0700152 // This is the internal entry point for checking if we can rollback.
Alex Vakulenko59e253e2014-02-24 10:40:21 -0800153 bool CanRollback() const;
154
Alex Vakulenko2bddadd2014-03-27 13:23:46 -0700155 // This is the internal entry point for getting a rollback partition name,
156 // if one exists. It returns the bootable rollback kernel device partition
157 // name or empty string if none is available.
Alex Deymo763e7db2015-08-27 21:08:08 -0700158 BootControlInterface::Slot GetRollbackSlot() const;
Alex Vakulenko2bddadd2014-03-27 13:23:46 -0700159
Darin Petkov296889c2010-07-23 16:20:54 -0700160 // Initiates a reboot if the current state is
161 // UPDATED_NEED_REBOOT. Returns true on sucess, false otherwise.
162 bool RebootIfNeeded();
163
Alex Deymo542c19b2015-12-03 07:43:31 -0300164 // DownloadActionDelegate methods:
165 void BytesReceived(uint64_t bytes_progressed,
166 uint64_t bytes_received,
167 uint64_t total) override;
168
169 // Returns that the update should be canceled when the download channel was
170 // changed.
171 bool ShouldCancel(ErrorCode* cancel_reason) override;
172
173 void DownloadComplete() override;
Andrew de los Reyes63b96d72010-05-10 13:08:54 -0700174
Alex Deymofa78f142016-01-26 21:36:16 -0800175 // Broadcasts the current status to all observers.
Darin Petkov61635a92011-05-18 16:20:36 -0700176 void BroadcastStatus();
177
David Zeuthena99981f2013-04-29 13:42:47 -0700178 // Returns the special flags to be added to ErrorCode values based on the
Jay Srinivasan55f50c22013-01-10 19:24:35 -0800179 // parameters used in the current update attempt.
180 uint32_t GetErrorCodeFlags();
181
David Zeuthene4c58bf2013-06-18 17:26:50 -0700182 // Called at update_engine startup to do various house-keeping.
183 void UpdateEngineStarted();
184
Alex Vakulenko1bab5a82015-10-27 11:47:28 -0700185 // Reloads the device policy from libbrillo. Note: This method doesn't
Alex Deymof4867c42013-06-28 14:41:39 -0700186 // cause a real-time policy fetch from the policy server. It just reloads the
Alex Vakulenko1bab5a82015-10-27 11:47:28 -0700187 // latest value that libbrillo has cached. libbrillo fetches the policies
Alex Deymof4867c42013-06-28 14:41:39 -0700188 // from the server asynchronously at its own frequency.
Alex Deymo560ae1d2014-10-28 02:17:54 -0700189 virtual void RefreshDevicePolicy();
Alex Deymof4867c42013-06-28 14:41:39 -0700190
Alex Deymo906191f2015-10-12 12:22:44 -0700191 // Stores in |out_boot_time| the boottime (CLOCK_BOOTTIME) recorded at the
192 // time of the last successful update in the current boot. Returns false if
193 // there wasn't a successful update in the current boot.
Gilad Arnold76b2b482014-04-01 13:32:43 -0700194 virtual bool GetBootTimeAtUpdate(base::Time *out_boot_time);
David Zeuthen3c55abd2013-10-14 12:48:03 -0700195
Alex Vakulenkodea2eac2014-03-14 15:56:59 -0700196 // Returns a version OS version that was being used before the last reboot,
197 // and if that reboot happended to be into an update (current version).
198 // This will return an empty string otherwise.
199 std::string const& GetPrevVersion() const { return prev_version_; }
200
Gilad Arnolda0258a52014-07-10 16:21:19 -0700201 // Returns the number of consecutive failed update checks.
Gilad Arnolda6dab942014-04-25 11:46:03 -0700202 virtual unsigned int consecutive_failed_update_checks() const {
203 return consecutive_failed_update_checks_;
204 }
205
Gilad Arnolda0258a52014-07-10 16:21:19 -0700206 // Returns the poll interval dictated by Omaha, if provided; zero otherwise.
207 virtual unsigned int server_dictated_poll_interval() const {
208 return server_dictated_poll_interval_;
209 }
210
Gilad Arnoldec7f9162014-07-15 13:24:46 -0700211 // Sets a callback to be used when either a forced update request is received
212 // (first argument set to true) or cleared by an update attempt (first
213 // argument set to false). The callback further encodes whether the forced
214 // check is an interactive one (second argument set to true). Takes ownership
215 // of the callback object. A null value disables callback on these events.
216 // Note that only one callback can be set, so effectively at most one client
217 // can be notified.
218 virtual void set_forced_update_pending_callback(
219 base::Callback<void(bool, bool)>* // NOLINT(readability/function)
220 callback) {
221 forced_update_pending_callback_.reset(callback);
Gilad Arnold44dc3bf2014-07-18 23:39:38 -0700222 }
223
David Pursell02c18642014-11-06 11:26:11 -0800224 // Returns true if we should allow updates from any source. In official builds
225 // we want to restrict updates to known safe sources, but under certain
226 // conditions it's useful to allow updating from anywhere (e.g. to allow
227 // 'cros flash' to function properly).
228 virtual bool IsAnyUpdateSourceAllowed();
229
Alex Deymofa78f142016-01-26 21:36:16 -0800230 // Add and remove a service observer.
231 void AddObserver(ServiceObserverInterface* observer) {
232 service_observers_.insert(observer);
233 }
234 void RemoveObserver(ServiceObserverInterface* observer) {
235 service_observers_.erase(observer);
236 }
237
Alex Deymo03a4de72016-07-20 16:08:23 -0700238 const std::set<ServiceObserverInterface*>& service_observers() {
239 return service_observers_;
240 }
241
Alex Deymofa78f142016-01-26 21:36:16 -0800242 // Remove all the observers.
243 void ClearObservers() { service_observers_.clear(); }
244
Andrew de los Reyes4e9b9f42010-04-26 15:06:43 -0700245 private:
Gilad Arnold28e2f392012-02-09 14:36:46 -0800246 // Update server URL for automated lab test.
247 static const char* const kTestUpdateUrl;
248
Alex Deymo906191f2015-10-12 12:22:44 -0700249 // Friend declarations for testing purposes.
Gilad Arnold70e476e2013-07-30 16:01:13 -0700250 friend class UpdateAttempterUnderTest;
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700251 friend class UpdateAttempterTest;
Darin Petkov1b003102010-11-30 10:18:36 -0800252 FRIEND_TEST(UpdateAttempterTest, ActionCompletedDownloadTest);
253 FRIEND_TEST(UpdateAttempterTest, ActionCompletedErrorTest);
254 FRIEND_TEST(UpdateAttempterTest, ActionCompletedOmahaRequestTest);
Darin Petkov18c7bce2011-06-16 14:07:00 -0700255 FRIEND_TEST(UpdateAttempterTest, CreatePendingErrorEventTest);
256 FRIEND_TEST(UpdateAttempterTest, CreatePendingErrorEventResumedTest);
Darin Petkov36275772010-10-01 11:40:57 -0700257 FRIEND_TEST(UpdateAttempterTest, DisableDeltaUpdateIfNeededTest);
258 FRIEND_TEST(UpdateAttempterTest, MarkDeltaUpdateFailureTest);
Darin Petkov18c7bce2011-06-16 14:07:00 -0700259 FRIEND_TEST(UpdateAttempterTest, PingOmahaTest);
Darin Petkov1b003102010-11-30 10:18:36 -0800260 FRIEND_TEST(UpdateAttempterTest, ScheduleErrorEventActionNoEventTest);
261 FRIEND_TEST(UpdateAttempterTest, ScheduleErrorEventActionTest);
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700262 FRIEND_TEST(UpdateAttempterTest, UpdateTest);
David Zeuthen985b1122013-10-09 12:13:15 -0700263 FRIEND_TEST(UpdateAttempterTest, ReportDailyMetrics);
David Zeuthen3c55abd2013-10-14 12:48:03 -0700264 FRIEND_TEST(UpdateAttempterTest, BootTimeInUpdateMarkerFile);
Xiyuan Xiac0e8f9a2017-02-22 13:19:35 -0800265 FRIEND_TEST(UpdateAttempterTest, TargetVersionPrefixSetAndReset);
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700266
Alex Deymoc1c17b42015-11-23 03:53:15 -0300267 // CertificateChecker::Observer method.
268 // Report metrics about the certificate being checked.
269 void CertificateChecked(ServerToCheck server_to_check,
270 CertificateCheckResult result) override;
271
David Zeuthen985b1122013-10-09 12:13:15 -0700272 // Checks if it's more than 24 hours since daily metrics were last
273 // reported and, if so, reports daily metrics. Returns |true| if
274 // metrics were reported, |false| otherwise.
275 bool CheckAndReportDailyMetrics();
276
277 // Calculates and reports the age of the currently running OS. This
278 // is defined as the age of the /etc/lsb-release file.
279 void ReportOSAge();
280
Gilad Arnold1ebd8132012-03-05 10:19:29 -0800281 // Sets the status to the given status and notifies a status update over dbus.
Nam T. Nguyen7d623eb2014-05-13 16:06:28 -0700282 void SetStatusAndNotify(UpdateStatus status);
Darin Petkova4a8a8c2010-07-15 22:21:12 -0700283
Darin Petkov9b230572010-10-08 10:20:09 -0700284 // Creates an error event object in |error_event_| to be included in an
285 // OmahaRequestAction once the current action processor is done.
David Zeuthena99981f2013-04-29 13:42:47 -0700286 void CreatePendingErrorEvent(AbstractAction* action, ErrorCode code);
Darin Petkov09f96c32010-07-20 09:24:57 -0700287
Darin Petkov9b230572010-10-08 10:20:09 -0700288 // If there's a pending error event allocated in |error_event_|, schedules an
289 // OmahaRequestAction with that event in the current processor, clears the
290 // pending event, updates the status and returns true. Returns false
291 // otherwise.
Darin Petkov09f96c32010-07-20 09:24:57 -0700292 bool ScheduleErrorEventAction();
293
Darin Petkov58dd1342011-05-06 12:05:13 -0700294 // Schedules an event loop callback to start the action processor. This is
295 // scheduled asynchronously to unblock the event loop.
296 void ScheduleProcessingStart();
297
Darin Petkov36275772010-10-01 11:40:57 -0700298 // Checks if a full update is needed and forces it by updating the Omaha
299 // request params.
300 void DisableDeltaUpdateIfNeeded();
301
302 // If this was a delta update attempt that failed, count it so that a full
303 // update can be tried when needed.
304 void MarkDeltaUpdateFailure();
Darin Petkov1b003102010-11-30 10:18:36 -0800305
Andrew de los Reyes45168102010-11-22 11:13:50 -0800306 ProxyResolver* GetProxyResolver() {
Amin Hassanie94ece52017-08-01 15:03:08 -0700307#if USE_CHROME_NETWORK_PROXY
Andrew de los Reyes45168102010-11-22 11:13:50 -0800308 return obeying_proxies_ ?
309 reinterpret_cast<ProxyResolver*>(&chrome_proxy_resolver_) :
310 reinterpret_cast<ProxyResolver*>(&direct_proxy_resolver_);
Alex Deymo0cd976d2016-02-11 18:45:01 -0800311#else
312 return &direct_proxy_resolver_;
Amin Hassanie94ece52017-08-01 15:03:08 -0700313#endif // USE_CHROME_NETWORK_PROXY
Andrew de los Reyes45168102010-11-22 11:13:50 -0800314 }
Darin Petkov36275772010-10-01 11:40:57 -0700315
Thieu Le116fda32011-04-19 11:01:54 -0700316 // Sends a ping to Omaha.
317 // This is used after an update has been applied and we're waiting for the
318 // user to reboot. This ping helps keep the number of actives count
319 // accurate in case a user takes a long time to reboot the device after an
320 // update has been applied.
321 void PingOmaha();
322
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700323 // Helper method of Update() to calculate the update-related parameters
324 // from various sources and set the appropriate state. Please refer to
325 // Update() method for the meaning of the parametes.
326 bool CalculateUpdateParams(const std::string& app_version,
327 const std::string& omaha_url,
Gilad Arnoldec7f9162014-07-15 13:24:46 -0700328 const std::string& target_channel,
329 const std::string& target_version_prefix,
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700330 bool obey_proxies,
Nam T. Nguyen7d623eb2014-05-13 16:06:28 -0700331 bool interactive);
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700332
Jay Srinivasan21be0752012-07-25 15:44:56 -0700333 // Calculates all the scattering related parameters (such as waiting period,
334 // which type of scattering is enabled, etc.) and also updates/deletes
335 // the corresponding prefs file used in scattering. Should be called
336 // only after the device policy has been loaded and set in the system_state_.
Gilad Arnoldb92f0df2013-01-10 16:32:45 -0800337 void CalculateScatteringParams(bool is_interactive);
Jay Srinivasan21be0752012-07-25 15:44:56 -0700338
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700339 // Sets a random value for the waiting period to wait for before downloading
340 // an update, if one available. This value will be upperbounded by the
341 // scatter factor value specified from policy.
Jay Srinivasan21be0752012-07-25 15:44:56 -0700342 void GenerateNewWaitingPeriod();
343
Chris Sosad317e402013-06-12 13:47:09 -0700344 // Helper method of Update() and Rollback() to construct the sequence of
345 // actions to be performed for the postinstall.
346 // |previous_action| is the previous action to get
347 // bonded with the install_plan that gets passed to postinstall.
348 void BuildPostInstallActions(InstallPlanAction* previous_action);
349
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700350 // Helper method of Update() to construct the sequence of actions to
351 // be performed for an update check. Please refer to
Chris Sosad317e402013-06-12 13:47:09 -0700352 // Update() method for the meaning of the parameters.
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700353 void BuildUpdateActions(bool interactive);
354
355 // Decrements the count in the kUpdateCheckCountFilePath.
356 // Returns True if successfully decremented, false otherwise.
357 bool DecrementUpdateCheckCount();
358
David Zeuthen8f191b22013-08-06 12:27:50 -0700359 // Starts p2p and performs housekeeping. Returns true only if p2p is
360 // running and housekeeping was done.
361 bool StartP2PAndPerformHousekeeping();
362
363 // Calculates whether peer-to-peer should be used. Sets the
364 // |use_p2p_to_download_| and |use_p2p_to_share_| parameters
365 // on the |omaha_request_params_| object.
366 void CalculateP2PParams(bool interactive);
367
368 // Starts P2P if it's enabled and there are files to actually share.
369 // Called only at program startup. Returns true only if p2p was
370 // started and housekeeping was performed.
371 bool StartP2PAtStartup();
372
David Zeuthen3c55abd2013-10-14 12:48:03 -0700373 // Writes to the processing completed marker. Does nothing if
374 // |update_completed_marker_| is empty.
375 void WriteUpdateCompletedMarker();
376
Daniel Erat65f1da02014-06-27 22:05:38 -0700377 // Reboots the system directly by calling /sbin/shutdown. Returns true on
378 // success.
379 bool RebootDirectly();
380
Gilad Arnoldec7f9162014-07-15 13:24:46 -0700381 // Callback for the async UpdateCheckAllowed policy request. If |status| is
382 // |EvalStatus::kSucceeded|, either runs or suppresses periodic update checks,
383 // based on the content of |params|. Otherwise, retries the policy request.
384 void OnUpdateScheduled(
385 chromeos_update_manager::EvalStatus status,
386 const chromeos_update_manager::UpdateCheckParams& params);
387
388 // Updates the time an update was last attempted to the current time.
389 void UpdateLastCheckedTime();
390
Gilad Arnold54fa66d2014-09-29 13:14:29 -0700391 // Returns whether an update is currently running or scheduled.
392 bool IsUpdateRunningOrScheduled();
393
Darin Petkov9b230572010-10-08 10:20:09 -0700394 // Last status notification timestamp used for throttling. Use monotonic
395 // TimeTicks to ensure that notifications are sent even if the system clock is
396 // set back in the middle of an update.
Darin Petkovaf183052010-08-23 12:07:13 -0700397 base::TimeTicks last_notify_time_;
Andrew de los Reyes63b96d72010-05-10 13:08:54 -0700398
Ben Chanf9cb98c2014-09-21 18:31:30 -0700399 std::vector<std::shared_ptr<AbstractAction>> actions_;
Ben Chan02f7c1d2014-10-18 15:18:02 -0700400 std::unique_ptr<ActionProcessor> processor_;
Darin Petkova4a8a8c2010-07-15 22:21:12 -0700401
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800402 // External state of the system outside the update_engine process
403 // carved out separately to mock out easily in unit tests.
404 SystemState* system_state_;
405
Alex Deymo33e91e72015-12-01 18:26:08 -0300406 // Pointer to the certificate checker instance to use.
407 CertificateChecker* cert_checker_;
408
Alex Deymofa78f142016-01-26 21:36:16 -0800409 // The list of services observing changes in the updater.
410 std::set<ServiceObserverInterface*> service_observers_;
Casey Dahlin40892492016-01-25 16:55:28 -0800411
Darin Petkov9b230572010-10-08 10:20:09 -0700412 // Pointer to the OmahaResponseHandlerAction in the actions_ vector.
Alex Deymobc91a272014-05-20 16:45:33 -0700413 std::shared_ptr<OmahaResponseHandlerAction> response_handler_action_;
Andrew de los Reyes63b96d72010-05-10 13:08:54 -0700414
Darin Petkov9b230572010-10-08 10:20:09 -0700415 // Pointer to the DownloadAction in the actions_ vector.
Alex Deymobc91a272014-05-20 16:45:33 -0700416 std::shared_ptr<DownloadAction> download_action_;
Darin Petkov9b230572010-10-08 10:20:09 -0700417
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800418 // Pointer to the preferences store interface. This is just a cached
419 // copy of system_state->prefs() because it's used in many methods and
420 // is convenient this way.
Gilad Arnold1f847232014-04-07 12:07:49 -0700421 PrefsInterface* prefs_ = nullptr;
Darin Petkov1cbd78f2010-07-29 12:38:34 -0700422
Darin Petkov09f96c32010-07-20 09:24:57 -0700423 // Pending error event, if any.
Ben Chan02f7c1d2014-10-18 15:18:02 -0700424 std::unique_ptr<OmahaEvent> error_event_;
Darin Petkov09f96c32010-07-20 09:24:57 -0700425
Andrew de los Reyesc1d5c932011-04-20 17:15:47 -0700426 // If we should request a reboot even tho we failed the update
Gilad Arnold1f847232014-04-07 12:07:49 -0700427 bool fake_update_success_ = false;
Andrew de los Reyesc1d5c932011-04-20 17:15:47 -0700428
Darin Petkov85ced132010-09-01 10:20:56 -0700429 // HTTP server response code from the last HTTP request action.
Gilad Arnold1f847232014-04-07 12:07:49 -0700430 int http_response_code_ = 0;
Darin Petkov1023a602010-08-30 13:47:51 -0700431
Alex Deymoab0d9762016-02-02 10:52:56 -0800432 // CPU limiter during the update.
433 CPULimiter cpu_limiter_;
Darin Petkovc6c135c2010-08-11 13:36:18 -0700434
Andrew de los Reyes63b96d72010-05-10 13:08:54 -0700435 // For status:
Alex Deymo906191f2015-10-12 12:22:44 -0700436 UpdateStatus status_{UpdateStatus::IDLE};
Gilad Arnold1f847232014-04-07 12:07:49 -0700437 double download_progress_ = 0.0;
438 int64_t last_checked_time_ = 0;
Alex Vakulenkodea2eac2014-03-14 15:56:59 -0700439 std::string prev_version_;
Gilad Arnold1f847232014-04-07 12:07:49 -0700440 std::string new_version_ = "0.0.0.0";
441 int64_t new_payload_size_ = 0;
Andrew de los Reyes63b96d72010-05-10 13:08:54 -0700442
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700443 // Common parameters for all Omaha requests.
Gilad Arnold1f847232014-04-07 12:07:49 -0700444 OmahaRequestParams* omaha_request_params_ = nullptr;
Darin Petkova4a8a8c2010-07-15 22:21:12 -0700445
Andrew de los Reyes45168102010-11-22 11:13:50 -0800446 // Number of consecutive manual update checks we've had where we obeyed
447 // Chrome's proxy settings.
Gilad Arnold1f847232014-04-07 12:07:49 -0700448 int proxy_manual_checks_ = 0;
Andrew de los Reyes45168102010-11-22 11:13:50 -0800449
450 // If true, this update cycle we are obeying proxies
Gilad Arnold1f847232014-04-07 12:07:49 -0700451 bool obeying_proxies_ = true;
Andrew de los Reyes45168102010-11-22 11:13:50 -0800452
453 // Our two proxy resolvers
454 DirectProxyResolver direct_proxy_resolver_;
Amin Hassanie94ece52017-08-01 15:03:08 -0700455#if USE_CHROME_NETWORK_PROXY
Andrew de los Reyes000d8952011-03-02 15:21:14 -0800456 ChromeBrowserProxyResolver chrome_proxy_resolver_;
Amin Hassanie94ece52017-08-01 15:03:08 -0700457#endif // USE_CHROME_NETWORK_PROXY
Andrew de los Reyes45168102010-11-22 11:13:50 -0800458
Darin Petkov58dd1342011-05-06 12:05:13 -0700459 // Originally, both of these flags are false. Once UpdateBootFlags is called,
460 // |update_boot_flags_running_| is set to true. As soon as UpdateBootFlags
461 // completes its asynchronous run, |update_boot_flags_running_| is reset to
462 // false and |updated_boot_flags_| is set to true. From that point on there
463 // will be no more changes to these flags.
Gilad Arnold1f847232014-04-07 12:07:49 -0700464 //
465 // True if UpdateBootFlags has completed.
466 bool updated_boot_flags_ = false;
467 // True if UpdateBootFlags is running.
468 bool update_boot_flags_running_ = false;
Darin Petkov58dd1342011-05-06 12:05:13 -0700469
470 // True if the action processor needs to be started by the boot flag updater.
Gilad Arnold1f847232014-04-07 12:07:49 -0700471 bool start_action_processor_ = false;
Andrew de los Reyes6dbf30a2011-04-19 10:58:16 -0700472
Patrick Dubroy7fbbe8a2011-08-01 17:28:22 +0200473 // Used for fetching information about the device policy.
Ben Chan02f7c1d2014-10-18 15:18:02 -0700474 std::unique_ptr<policy::PolicyProvider> policy_provider_;
Patrick Dubroy7fbbe8a2011-08-01 17:28:22 +0200475
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700476 // The current scatter factor as found in the policy setting.
477 base::TimeDelta scatter_factor_;
478
Gilad Arnolda6dab942014-04-25 11:46:03 -0700479 // The number of consecutive failed update checks. Needed for calculating the
480 // next update check interval.
481 unsigned int consecutive_failed_update_checks_ = 0;
482
Gilad Arnolda0258a52014-07-10 16:21:19 -0700483 // The poll interval (in seconds) that was dictated by Omaha, if any; zero
484 // otherwise. This is needed for calculating the update check interval.
485 unsigned int server_dictated_poll_interval_ = 0;
486
Gilad Arnoldec7f9162014-07-15 13:24:46 -0700487 // Tracks whether we have scheduled update checks.
488 bool waiting_for_scheduled_check_ = false;
489
490 // A callback to use when a forced update request is either received (true) or
491 // cleared by an update attempt (false). The second argument indicates whether
492 // this is an interactive update, and its value is significant iff the first
493 // argument is true.
Ben Chan02f7c1d2014-10-18 15:18:02 -0700494 std::unique_ptr<base::Callback<void(bool, bool)>>
Gilad Arnoldec7f9162014-07-15 13:24:46 -0700495 forced_update_pending_callback_;
496
497 // The |app_version| and |omaha_url| parameters received during the latest
498 // forced update request. They are retrieved for use once the update is
499 // actually scheduled.
500 std::string forced_app_version_;
501 std::string forced_omaha_url_;
Gilad Arnold44dc3bf2014-07-18 23:39:38 -0700502
Andrew de los Reyes4e9b9f42010-04-26 15:06:43 -0700503 DISALLOW_COPY_AND_ASSIGN(UpdateAttempter);
504};
505
506} // namespace chromeos_update_engine
507
Gilad Arnoldcf175a02014-07-10 16:48:47 -0700508#endif // UPDATE_ENGINE_UPDATE_ATTEMPTER_H_