Alex Deymo | aea4c1c | 2015-08-19 20:24:43 -0700 | [diff] [blame] | 1 | // |
| 2 | // Copyright (C) 2012 The Android Open Source Project |
| 3 | // |
| 4 | // Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | // you may not use this file except in compliance with the License. |
| 6 | // You may obtain a copy of the License at |
| 7 | // |
| 8 | // http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | // |
| 10 | // Unless required by applicable law or agreed to in writing, software |
| 11 | // distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | // See the License for the specific language governing permissions and |
| 14 | // limitations under the License. |
| 15 | // |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 16 | |
| 17 | #include "update_engine/update_attempter.h" |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 18 | |
Ben Chan | 9abb763 | 2014-08-07 00:10:53 -0700 | [diff] [blame] | 19 | #include <stdint.h> |
| 20 | |
Alex Vakulenko | 59e253e | 2014-02-24 10:40:21 -0800 | [diff] [blame] | 21 | #include <algorithm> |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 22 | #include <map> |
Alex Deymo | bc91a27 | 2014-05-20 16:45:33 -0700 | [diff] [blame] | 23 | #include <memory> |
| 24 | #include <string> |
Andrew | a8d7df3 | 2020-03-15 20:10:01 -0700 | [diff] [blame] | 25 | #include <unordered_set> |
Alex Vakulenko | d2779df | 2014-06-16 13:19:00 -0700 | [diff] [blame] | 26 | #include <utility> |
Alex Deymo | 44666f9 | 2014-07-22 20:29:24 -0700 | [diff] [blame] | 27 | #include <vector> |
Darin Petkov | 9d65b7b | 2010-07-20 09:13:01 -0700 | [diff] [blame] | 28 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 29 | #include <base/bind.h> |
Denis Nikitin | 8f2fa74 | 2019-05-29 10:36:52 -0700 | [diff] [blame] | 30 | #include <base/compiler_specific.h> |
Ben Chan | 06c76a4 | 2014-09-05 08:21:06 -0700 | [diff] [blame] | 31 | #include <base/files/file_util.h> |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 32 | #include <base/logging.h> |
Andrew de los Reyes | 4516810 | 2010-11-22 11:13:50 -0800 | [diff] [blame] | 33 | #include <base/rand_util.h> |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 34 | #include <base/strings/string_number_conversions.h> |
Daniel Erat | 65f1da0 | 2014-06-27 22:05:38 -0700 | [diff] [blame] | 35 | #include <base/strings/string_util.h> |
Alex Vakulenko | 75039d7 | 2014-03-25 12:36:28 -0700 | [diff] [blame] | 36 | #include <base/strings/stringprintf.h> |
May Lippert | 60aa3ca | 2018-08-15 16:55:29 -0700 | [diff] [blame] | 37 | #include <base/time/time.h> |
Sen Jiang | 2703ef4 | 2017-03-16 13:36:21 -0700 | [diff] [blame] | 38 | #include <brillo/data_encoding.h> |
Sen Jiang | e67bb5b | 2016-06-20 15:53:56 -0700 | [diff] [blame] | 39 | #include <brillo/errors/error_codes.h> |
Alex Vakulenko | 3f39d5c | 2015-10-13 09:27:13 -0700 | [diff] [blame] | 40 | #include <brillo/message_loops/message_loop.h> |
Patrick Dubroy | 7fbbe8a | 2011-08-01 17:28:22 +0200 | [diff] [blame] | 41 | #include <policy/device_policy.h> |
Alex Deymo | bc91a27 | 2014-05-20 16:45:33 -0700 | [diff] [blame] | 42 | #include <policy/libpolicy.h> |
Alex Deymo | d6deb1d | 2015-08-28 15:54:37 -0700 | [diff] [blame] | 43 | #include <update_engine/dbus-constants.h> |
Darin Petkov | 9d65b7b | 2010-07-20 09:13:01 -0700 | [diff] [blame] | 44 | |
Alex Deymo | 14c0da8 | 2016-07-20 16:45:45 -0700 | [diff] [blame] | 45 | #include "update_engine/certificate_checker.h" |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 46 | #include "update_engine/common/boot_control_interface.h" |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 47 | #include "update_engine/common/clock_interface.h" |
| 48 | #include "update_engine/common/constants.h" |
Xiaochu Liu | 8ba486f | 2018-11-06 11:14:10 -0800 | [diff] [blame] | 49 | #include "update_engine/common/dlcservice_interface.h" |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 50 | #include "update_engine/common/hardware_interface.h" |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 51 | #include "update_engine/common/platform_constants.h" |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 52 | #include "update_engine/common/prefs.h" |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 53 | #include "update_engine/common/prefs_interface.h" |
| 54 | #include "update_engine/common/subprocess.h" |
| 55 | #include "update_engine/common/utils.h" |
Alex Deymo | 14c0da8 | 2016-07-20 16:45:45 -0700 | [diff] [blame] | 56 | #include "update_engine/libcurl_http_fetcher.h" |
Tianjie Xu | 282aa1f | 2017-09-05 13:42:45 -0700 | [diff] [blame] | 57 | #include "update_engine/metrics_reporter_interface.h" |
Darin Petkov | 6a5b322 | 2010-07-13 14:55:28 -0700 | [diff] [blame] | 58 | #include "update_engine/omaha_request_action.h" |
Darin Petkov | a4a8a8c | 2010-07-15 22:21:12 -0700 | [diff] [blame] | 59 | #include "update_engine/omaha_request_params.h" |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 60 | #include "update_engine/omaha_response_handler_action.h" |
Jae Hoon Kim | 051627a | 2019-09-03 12:56:32 -0700 | [diff] [blame] | 61 | #include "update_engine/omaha_utils.h" |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 62 | #include "update_engine/p2p_manager.h" |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 63 | #include "update_engine/payload_consumer/download_action.h" |
| 64 | #include "update_engine/payload_consumer/filesystem_verifier_action.h" |
| 65 | #include "update_engine/payload_consumer/postinstall_runner_action.h" |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 66 | #include "update_engine/payload_state_interface.h" |
Sen Jiang | b8c6a8f | 2016-06-07 17:33:17 -0700 | [diff] [blame] | 67 | #include "update_engine/power_manager_interface.h" |
Jay Srinivasan | 4348879 | 2012-06-19 00:25:31 -0700 | [diff] [blame] | 68 | #include "update_engine/system_state.h" |
Amin Hassani | 0882a51 | 2018-04-05 16:25:44 -0700 | [diff] [blame] | 69 | #include "update_engine/update_boot_flags_action.h" |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 70 | #include "update_engine/update_manager/policy.h" |
Marton Hunyady | e58bddb | 2018-04-10 20:27:26 +0200 | [diff] [blame] | 71 | #include "update_engine/update_manager/policy_utils.h" |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 72 | #include "update_engine/update_manager/update_manager.h" |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 73 | #include "update_engine/update_status_utils.h" |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 74 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 75 | using base::Bind; |
| 76 | using base::Callback; |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 77 | using base::FilePath; |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 78 | using base::Time; |
Darin Petkov | af18305 | 2010-08-23 12:07:13 -0700 | [diff] [blame] | 79 | using base::TimeDelta; |
| 80 | using base::TimeTicks; |
Alex Vakulenko | 3f39d5c | 2015-10-13 09:27:13 -0700 | [diff] [blame] | 81 | using brillo::MessageLoop; |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 82 | using chromeos_update_manager::CalculateStagingCase; |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 83 | using chromeos_update_manager::EvalStatus; |
| 84 | using chromeos_update_manager::Policy; |
Adolfo Victoria | 497044c | 2018-07-18 07:51:42 -0700 | [diff] [blame] | 85 | using chromeos_update_manager::StagingCase; |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 86 | using chromeos_update_manager::UpdateCheckParams; |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 87 | using std::map; |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 88 | using std::string; |
| 89 | using std::vector; |
Aaron Wood | bf5a252 | 2017-10-04 10:58:36 -0700 | [diff] [blame] | 90 | using update_engine::UpdateAttemptFlags; |
Aaron Wood | 7f92e2b | 2017-08-28 14:51:21 -0700 | [diff] [blame] | 91 | using update_engine::UpdateEngineStatus; |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 92 | |
| 93 | namespace chromeos_update_engine { |
| 94 | |
Darin Petkov | 3627577 | 2010-10-01 11:40:57 -0700 | [diff] [blame] | 95 | const int UpdateAttempter::kMaxDeltaUpdateFailures = 3; |
| 96 | |
Andrew de los Reyes | 4516810 | 2010-11-22 11:13:50 -0800 | [diff] [blame] | 97 | namespace { |
| 98 | const int kMaxConsecutiveObeyProxyRequests = 20; |
Gilad Arnold | 70e476e | 2013-07-30 16:01:13 -0700 | [diff] [blame] | 99 | |
Alex Deymo | 0d29854 | 2016-03-30 18:31:49 -0700 | [diff] [blame] | 100 | // Minimum threshold to broadcast an status update in progress and time. |
| 101 | const double kBroadcastThresholdProgress = 0.01; // 1% |
| 102 | const int kBroadcastThresholdSeconds = 10; |
| 103 | |
David Pursell | 02c1864 | 2014-11-06 11:26:11 -0800 | [diff] [blame] | 104 | // By default autest bypasses scattering. If we want to test scattering, |
| 105 | // use kScheduledAUTestURLRequest. The URL used is same in both cases, but |
| 106 | // different params are passed to CheckForUpdate(). |
| 107 | const char kAUTestURLRequest[] = "autest"; |
| 108 | const char kScheduledAUTestURLRequest[] = "autest-scheduled"; |
Alex Vakulenko | d2779df | 2014-06-16 13:19:00 -0700 | [diff] [blame] | 109 | } // namespace |
Andrew de los Reyes | 4516810 | 2010-11-22 11:13:50 -0800 | [diff] [blame] | 110 | |
Sen Jiang | daeaa43 | 2018-10-09 18:18:45 -0700 | [diff] [blame] | 111 | ErrorCode GetErrorCodeForAction(AbstractAction* action, ErrorCode code) { |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 112 | if (code != ErrorCode::kError) |
Darin Petkov | 777dbfa | 2010-07-20 15:03:37 -0700 | [diff] [blame] | 113 | return code; |
| 114 | |
| 115 | const string type = action->Type(); |
| 116 | if (type == OmahaRequestAction::StaticType()) |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 117 | return ErrorCode::kOmahaRequestError; |
Darin Petkov | 777dbfa | 2010-07-20 15:03:37 -0700 | [diff] [blame] | 118 | if (type == OmahaResponseHandlerAction::StaticType()) |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 119 | return ErrorCode::kOmahaResponseHandlerError; |
Allie Wood | eb9e6d8 | 2015-04-17 13:55:30 -0700 | [diff] [blame] | 120 | if (type == FilesystemVerifierAction::StaticType()) |
| 121 | return ErrorCode::kFilesystemVerifierError; |
Darin Petkov | 777dbfa | 2010-07-20 15:03:37 -0700 | [diff] [blame] | 122 | if (type == PostinstallRunnerAction::StaticType()) |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 123 | return ErrorCode::kPostinstallRunnerError; |
Darin Petkov | 777dbfa | 2010-07-20 15:03:37 -0700 | [diff] [blame] | 124 | |
| 125 | return code; |
| 126 | } |
| 127 | |
Sen Jiang | 1841408 | 2018-01-11 14:50:36 -0800 | [diff] [blame] | 128 | UpdateAttempter::UpdateAttempter(SystemState* system_state, |
| 129 | CertificateChecker* cert_checker) |
Gilad Arnold | 1f84723 | 2014-04-07 12:07:49 -0700 | [diff] [blame] | 130 | : processor_(new ActionProcessor()), |
| 131 | system_state_(system_state), |
Colin Howes | 978c108 | 2018-12-03 11:46:12 -0800 | [diff] [blame] | 132 | cert_checker_(cert_checker), |
| 133 | is_install_(false) {} |
Darin Petkov | c6c135c | 2010-08-11 13:36:18 -0700 | [diff] [blame] | 134 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 135 | UpdateAttempter::~UpdateAttempter() { |
Alex Deymo | 33e91e7 | 2015-12-01 18:26:08 -0300 | [diff] [blame] | 136 | // CertificateChecker might not be initialized in unittests. |
| 137 | if (cert_checker_) |
| 138 | cert_checker_->SetObserver(nullptr); |
Alex Deymo | 2b4268c | 2015-12-04 13:56:25 -0800 | [diff] [blame] | 139 | // Release ourselves as the ActionProcessor's delegate to prevent |
| 140 | // re-scheduling the updates due to the processing stopped. |
| 141 | processor_->set_delegate(nullptr); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 142 | } |
| 143 | |
Gilad Arnold | 1f84723 | 2014-04-07 12:07:49 -0700 | [diff] [blame] | 144 | void UpdateAttempter::Init() { |
| 145 | // Pulling from the SystemState can only be done after construction, since |
| 146 | // this is an aggregate of various objects (such as the UpdateAttempter), |
| 147 | // which requires them all to be constructed prior to it being used. |
| 148 | prefs_ = system_state_->prefs(); |
| 149 | omaha_request_params_ = system_state_->request_params(); |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 150 | |
Alex Deymo | 33e91e7 | 2015-12-01 18:26:08 -0300 | [diff] [blame] | 151 | if (cert_checker_) |
| 152 | cert_checker_->SetObserver(this); |
| 153 | |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 154 | // In case of update_engine restart without a reboot we need to restore the |
| 155 | // reboot needed state. |
| 156 | if (GetBootTimeAtUpdate(nullptr)) |
| 157 | status_ = UpdateStatus::UPDATED_NEED_REBOOT; |
| 158 | else |
| 159 | status_ = UpdateStatus::IDLE; |
Gilad Arnold | 1f84723 | 2014-04-07 12:07:49 -0700 | [diff] [blame] | 160 | } |
| 161 | |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 162 | bool UpdateAttempter::ScheduleUpdates() { |
Jae Hoon Kim | ba2fdce | 2019-07-11 13:18:58 -0700 | [diff] [blame] | 163 | if (IsBusyOrUpdateScheduled()) |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 164 | return false; |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 165 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 166 | chromeos_update_manager::UpdateManager* const update_manager = |
| 167 | system_state_->update_manager(); |
| 168 | CHECK(update_manager); |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 169 | Callback<void(EvalStatus, const UpdateCheckParams&)> callback = |
| 170 | Bind(&UpdateAttempter::OnUpdateScheduled, base::Unretained(this)); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 171 | // We limit the async policy request to a reasonably short time, to avoid a |
| 172 | // starvation due to a transient bug. |
Jae Hoon Kim | 504c3cb | 2019-07-02 11:17:24 -0700 | [diff] [blame] | 173 | update_manager->AsyncPolicyRequestUpdateCheckAllowed( |
| 174 | callback, &Policy::UpdateCheckAllowed); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 175 | waiting_for_scheduled_check_ = true; |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 176 | return true; |
Darin Petkov | c6c135c | 2010-08-11 13:36:18 -0700 | [diff] [blame] | 177 | } |
| 178 | |
Alex Deymo | c1c17b4 | 2015-11-23 03:53:15 -0300 | [diff] [blame] | 179 | void UpdateAttempter::CertificateChecked(ServerToCheck server_to_check, |
| 180 | CertificateCheckResult result) { |
Tianjie Xu | 282aa1f | 2017-09-05 13:42:45 -0700 | [diff] [blame] | 181 | system_state_->metrics_reporter()->ReportCertificateCheckMetrics( |
| 182 | server_to_check, result); |
Alex Deymo | c1c17b4 | 2015-11-23 03:53:15 -0300 | [diff] [blame] | 183 | } |
| 184 | |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 185 | bool UpdateAttempter::CheckAndReportDailyMetrics() { |
| 186 | int64_t stored_value; |
Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame] | 187 | Time now = system_state_->clock()->GetWallclockTime(); |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 188 | if (system_state_->prefs()->Exists(kPrefsDailyMetricsLastReportedAt) && |
| 189 | system_state_->prefs()->GetInt64(kPrefsDailyMetricsLastReportedAt, |
| 190 | &stored_value)) { |
Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame] | 191 | Time last_reported_at = Time::FromInternalValue(stored_value); |
| 192 | TimeDelta time_reported_since = now - last_reported_at; |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 193 | if (time_reported_since.InSeconds() < 0) { |
| 194 | LOG(WARNING) << "Last reported daily metrics " |
| 195 | << utils::FormatTimeDelta(time_reported_since) << " ago " |
| 196 | << "which is negative. Either the system clock is wrong or " |
| 197 | << "the kPrefsDailyMetricsLastReportedAt state variable " |
| 198 | << "is wrong."; |
| 199 | // In this case, report daily metrics to reset. |
| 200 | } else { |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 201 | if (time_reported_since.InSeconds() < 24 * 60 * 60) { |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 202 | LOG(INFO) << "Last reported daily metrics " |
| 203 | << utils::FormatTimeDelta(time_reported_since) << " ago."; |
| 204 | return false; |
| 205 | } |
| 206 | LOG(INFO) << "Last reported daily metrics " |
| 207 | << utils::FormatTimeDelta(time_reported_since) << " ago, " |
| 208 | << "which is more than 24 hours ago."; |
| 209 | } |
| 210 | } |
| 211 | |
| 212 | LOG(INFO) << "Reporting daily metrics."; |
| 213 | system_state_->prefs()->SetInt64(kPrefsDailyMetricsLastReportedAt, |
| 214 | now.ToInternalValue()); |
| 215 | |
| 216 | ReportOSAge(); |
| 217 | |
| 218 | return true; |
| 219 | } |
| 220 | |
| 221 | void UpdateAttempter::ReportOSAge() { |
| 222 | struct stat sb; |
| 223 | |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 224 | if (system_state_ == nullptr) |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 225 | return; |
| 226 | |
| 227 | if (stat("/etc/lsb-release", &sb) != 0) { |
David Zeuthen | d9aca3b | 2014-08-21 13:11:21 -0400 | [diff] [blame] | 228 | PLOG(ERROR) << "Error getting file status for /etc/lsb-release " |
| 229 | << "(Note: this may happen in some unit tests)"; |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 230 | return; |
| 231 | } |
| 232 | |
Sen Jiang | 1c3db7d | 2019-01-10 15:48:55 -0800 | [diff] [blame] | 233 | Time lsb_release_timestamp = Time::FromTimeSpec(sb.st_ctim); |
Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame] | 234 | Time now = system_state_->clock()->GetWallclockTime(); |
| 235 | TimeDelta age = now - lsb_release_timestamp; |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 236 | if (age.InSeconds() < 0) { |
| 237 | LOG(ERROR) << "The OS age (" << utils::FormatTimeDelta(age) |
David Zeuthen | d9aca3b | 2014-08-21 13:11:21 -0400 | [diff] [blame] | 238 | << ") is negative. Maybe the clock is wrong? " |
| 239 | << "(Note: this may happen in some unit tests.)"; |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 240 | return; |
| 241 | } |
| 242 | |
Tianjie Xu | 282aa1f | 2017-09-05 13:42:45 -0700 | [diff] [blame] | 243 | system_state_->metrics_reporter()->ReportDailyMetrics(age); |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 244 | } |
| 245 | |
Gilad Arnold | 28e2f39 | 2012-02-09 14:36:46 -0800 | [diff] [blame] | 246 | void UpdateAttempter::Update(const string& app_version, |
| 247 | const string& omaha_url, |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 248 | const string& target_channel, |
| 249 | const string& target_version_prefix, |
Marton Hunyady | ba51c3f | 2018-04-25 15:18:10 +0200 | [diff] [blame] | 250 | bool rollback_allowed, |
Zentaro Kavanagh | 28def4f | 2019-01-15 17:15:01 -0800 | [diff] [blame] | 251 | bool rollback_data_save_requested, |
Zentaro Kavanagh | 0ef9a2f | 2018-07-02 12:05:07 -0700 | [diff] [blame] | 252 | int rollback_allowed_milestones, |
Andrew de los Reyes | fb2f461 | 2011-06-09 18:21:49 -0700 | [diff] [blame] | 253 | bool obey_proxies, |
Nam T. Nguyen | 7d623eb | 2014-05-13 16:06:28 -0700 | [diff] [blame] | 254 | bool interactive) { |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 255 | // This is normally called frequently enough so it's appropriate to use as a |
| 256 | // hook for reporting daily metrics. |
| 257 | // TODO(garnold) This should be hooked to a separate (reliable and consistent) |
| 258 | // timeout event. |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 259 | CheckAndReportDailyMetrics(); |
| 260 | |
Andrew de los Reyes | c1d5c93 | 2011-04-20 17:15:47 -0700 | [diff] [blame] | 261 | fake_update_success_ = false; |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 262 | if (status_ == UpdateStatus::UPDATED_NEED_REBOOT) { |
Thieu Le | 116fda3 | 2011-04-19 11:01:54 -0700 | [diff] [blame] | 263 | // Although we have applied an update, we still want to ping Omaha |
| 264 | // to ensure the number of active statistics is accurate. |
David Zeuthen | 33bae49 | 2014-02-25 16:16:18 -0800 | [diff] [blame] | 265 | // |
| 266 | // Also convey to the UpdateEngine.Check.Result metric that we're |
| 267 | // not performing an update check because of this. |
Andrew de los Reyes | 6b78e29 | 2010-05-10 15:54:39 -0700 | [diff] [blame] | 268 | LOG(INFO) << "Not updating b/c we already updated and we're waiting for " |
Thieu Le | 116fda3 | 2011-04-19 11:01:54 -0700 | [diff] [blame] | 269 | << "reboot, we'll ping Omaha instead"; |
Tianjie Xu | 282aa1f | 2017-09-05 13:42:45 -0700 | [diff] [blame] | 270 | system_state_->metrics_reporter()->ReportUpdateCheckMetrics( |
| 271 | system_state_, |
| 272 | metrics::CheckResult::kRebootPending, |
| 273 | metrics::CheckReaction::kUnset, |
| 274 | metrics::DownloadErrorCode::kUnset); |
Thieu Le | 116fda3 | 2011-04-19 11:01:54 -0700 | [diff] [blame] | 275 | PingOmaha(); |
Andrew de los Reyes | 6b78e29 | 2010-05-10 15:54:39 -0700 | [diff] [blame] | 276 | return; |
| 277 | } |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 278 | if (status_ != UpdateStatus::IDLE) { |
Andrew de los Reyes | 6b78e29 | 2010-05-10 15:54:39 -0700 | [diff] [blame] | 279 | // Update in progress. Do nothing |
| 280 | return; |
| 281 | } |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 282 | |
| 283 | if (!CalculateUpdateParams(app_version, |
| 284 | omaha_url, |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 285 | target_channel, |
| 286 | target_version_prefix, |
Marton Hunyady | ba51c3f | 2018-04-25 15:18:10 +0200 | [diff] [blame] | 287 | rollback_allowed, |
Zentaro Kavanagh | 28def4f | 2019-01-15 17:15:01 -0800 | [diff] [blame] | 288 | rollback_data_save_requested, |
Zentaro Kavanagh | 0ef9a2f | 2018-07-02 12:05:07 -0700 | [diff] [blame] | 289 | rollback_allowed_milestones, |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 290 | obey_proxies, |
Nam T. Nguyen | 7d623eb | 2014-05-13 16:06:28 -0700 | [diff] [blame] | 291 | interactive)) { |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 292 | return; |
| 293 | } |
| 294 | |
| 295 | BuildUpdateActions(interactive); |
| 296 | |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 297 | SetStatusAndNotify(UpdateStatus::CHECKING_FOR_UPDATE); |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 298 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 299 | // Update the last check time here; it may be re-updated when an Omaha |
| 300 | // response is received, but this will prevent us from repeatedly scheduling |
| 301 | // checks in the case where a response is not received. |
| 302 | UpdateLastCheckedTime(); |
| 303 | |
Amin Hassani | 0882a51 | 2018-04-05 16:25:44 -0700 | [diff] [blame] | 304 | ScheduleProcessingStart(); |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 305 | } |
| 306 | |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 307 | void UpdateAttempter::RefreshDevicePolicy() { |
| 308 | // Lazy initialize the policy provider, or reload the latest policy data. |
| 309 | if (!policy_provider_.get()) |
| 310 | policy_provider_.reset(new policy::PolicyProvider()); |
| 311 | policy_provider_->Reload(); |
| 312 | |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 313 | const policy::DevicePolicy* device_policy = nullptr; |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 314 | if (policy_provider_->device_policy_is_loaded()) |
| 315 | device_policy = &policy_provider_->GetDevicePolicy(); |
| 316 | |
| 317 | if (device_policy) |
| 318 | LOG(INFO) << "Device policies/settings present"; |
| 319 | else |
| 320 | LOG(INFO) << "No device policies/settings present."; |
| 321 | |
| 322 | system_state_->set_device_policy(device_policy); |
David Zeuthen | 92d9c8b | 2013-09-11 10:58:11 -0700 | [diff] [blame] | 323 | system_state_->p2p_manager()->SetDevicePolicy(device_policy); |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 324 | } |
| 325 | |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 326 | void UpdateAttempter::CalculateP2PParams(bool interactive) { |
| 327 | bool use_p2p_for_downloading = false; |
| 328 | bool use_p2p_for_sharing = false; |
| 329 | |
Thiemo Nagel | 27d9d53 | 2017-05-26 16:35:20 +0200 | [diff] [blame] | 330 | // Never use p2p for downloading in interactive checks unless the developer |
| 331 | // has opted in for it via a marker file. |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 332 | // |
Thiemo Nagel | 27d9d53 | 2017-05-26 16:35:20 +0200 | [diff] [blame] | 333 | // (Why would a developer want to opt in? If they are working on the |
| 334 | // update_engine or p2p codebases so they can actually test their code.) |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 335 | |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 336 | if (system_state_ != nullptr) { |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 337 | if (!system_state_->p2p_manager()->IsP2PEnabled()) { |
| 338 | LOG(INFO) << "p2p is not enabled - disallowing p2p for both" |
| 339 | << " downloading and sharing."; |
| 340 | } else { |
| 341 | // Allow p2p for sharing, even in interactive checks. |
| 342 | use_p2p_for_sharing = true; |
| 343 | if (!interactive) { |
| 344 | LOG(INFO) << "Non-interactive check - allowing p2p for downloading"; |
| 345 | use_p2p_for_downloading = true; |
| 346 | } else { |
David Zeuthen | 052d290 | 2013-09-06 11:41:30 -0700 | [diff] [blame] | 347 | LOG(INFO) << "Forcibly disabling use of p2p for downloading " |
| 348 | << "since this update attempt is interactive."; |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 349 | } |
| 350 | } |
| 351 | } |
| 352 | |
Gilad Arnold | 74b5f55 | 2014-10-07 08:17:16 -0700 | [diff] [blame] | 353 | PayloadStateInterface* const payload_state = system_state_->payload_state(); |
| 354 | payload_state->SetUsingP2PForDownloading(use_p2p_for_downloading); |
| 355 | payload_state->SetUsingP2PForSharing(use_p2p_for_sharing); |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 356 | } |
| 357 | |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 358 | bool UpdateAttempter::CalculateUpdateParams(const string& app_version, |
| 359 | const string& omaha_url, |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 360 | const string& target_channel, |
| 361 | const string& target_version_prefix, |
Marton Hunyady | ba51c3f | 2018-04-25 15:18:10 +0200 | [diff] [blame] | 362 | bool rollback_allowed, |
Zentaro Kavanagh | 28def4f | 2019-01-15 17:15:01 -0800 | [diff] [blame] | 363 | bool rollback_data_save_requested, |
Zentaro Kavanagh | 0ef9a2f | 2018-07-02 12:05:07 -0700 | [diff] [blame] | 364 | int rollback_allowed_milestones, |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 365 | bool obey_proxies, |
Nam T. Nguyen | 7d623eb | 2014-05-13 16:06:28 -0700 | [diff] [blame] | 366 | bool interactive) { |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 367 | http_response_code_ = 0; |
Gilad Arnold | 74b5f55 | 2014-10-07 08:17:16 -0700 | [diff] [blame] | 368 | PayloadStateInterface* const payload_state = system_state_->payload_state(); |
Patrick Dubroy | 7fbbe8a | 2011-08-01 17:28:22 +0200 | [diff] [blame] | 369 | |
Alex Deymo | 749ecf1 | 2014-10-21 20:06:57 -0700 | [diff] [blame] | 370 | // Refresh the policy before computing all the update parameters. |
| 371 | RefreshDevicePolicy(); |
| 372 | |
Marton Hunyady | e58bddb | 2018-04-10 20:27:26 +0200 | [diff] [blame] | 373 | // Check whether we need to clear the rollback-happened preference after |
| 374 | // policy is available again. |
| 375 | UpdateRollbackHappened(); |
| 376 | |
Xiyuan Xia | c0e8f9a | 2017-02-22 13:19:35 -0800 | [diff] [blame] | 377 | // Update the target version prefix. |
| 378 | omaha_request_params_->set_target_version_prefix(target_version_prefix); |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 379 | |
Marton Hunyady | ba51c3f | 2018-04-25 15:18:10 +0200 | [diff] [blame] | 380 | // Set whether rollback is allowed. |
| 381 | omaha_request_params_->set_rollback_allowed(rollback_allowed); |
| 382 | |
Zentaro Kavanagh | 28def4f | 2019-01-15 17:15:01 -0800 | [diff] [blame] | 383 | // Set whether saving data over rollback is requested. |
| 384 | omaha_request_params_->set_rollback_data_save_requested( |
| 385 | rollback_data_save_requested); |
| 386 | |
Adolfo Victoria | 497044c | 2018-07-18 07:51:42 -0700 | [diff] [blame] | 387 | CalculateStagingParams(interactive); |
| 388 | // If staging_wait_time_ wasn't set, staging is off, use scattering instead. |
| 389 | if (staging_wait_time_.InSeconds() == 0) { |
| 390 | CalculateScatteringParams(interactive); |
| 391 | } |
Patrick Dubroy | 7fbbe8a | 2011-08-01 17:28:22 +0200 | [diff] [blame] | 392 | |
Zentaro Kavanagh | 0ef9a2f | 2018-07-02 12:05:07 -0700 | [diff] [blame] | 393 | // Set how many milestones of rollback are allowed. |
| 394 | omaha_request_params_->set_rollback_allowed_milestones( |
| 395 | rollback_allowed_milestones); |
| 396 | |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 397 | CalculateP2PParams(interactive); |
Gilad Arnold | 74b5f55 | 2014-10-07 08:17:16 -0700 | [diff] [blame] | 398 | if (payload_state->GetUsingP2PForDownloading() || |
| 399 | payload_state->GetUsingP2PForSharing()) { |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 400 | // OK, p2p is to be used - start it and perform housekeeping. |
| 401 | if (!StartP2PAndPerformHousekeeping()) { |
| 402 | // If this fails, disable p2p for this attempt |
| 403 | LOG(INFO) << "Forcibly disabling use of p2p since starting p2p or " |
| 404 | << "performing housekeeping failed."; |
Gilad Arnold | 74b5f55 | 2014-10-07 08:17:16 -0700 | [diff] [blame] | 405 | payload_state->SetUsingP2PForDownloading(false); |
| 406 | payload_state->SetUsingP2PForSharing(false); |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 407 | } |
| 408 | } |
| 409 | |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 410 | if (!omaha_request_params_->Init(app_version, omaha_url, interactive)) { |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 411 | LOG(ERROR) << "Unable to initialize Omaha request params."; |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 412 | return false; |
Darin Petkov | a4a8a8c | 2010-07-15 22:21:12 -0700 | [diff] [blame] | 413 | } |
Darin Petkov | 3aefa86 | 2010-12-07 14:45:00 -0800 | [diff] [blame] | 414 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 415 | // Set the target channel, if one was provided. |
| 416 | if (target_channel.empty()) { |
| 417 | LOG(INFO) << "No target channel mandated by policy."; |
| 418 | } else { |
| 419 | LOG(INFO) << "Setting target channel as mandated: " << target_channel; |
| 420 | // Pass in false for powerwash_allowed until we add it to the policy |
| 421 | // protobuf. |
Alex Deymo | d942f9d | 2015-11-06 16:11:50 -0800 | [diff] [blame] | 422 | string error_message; |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 423 | if (!omaha_request_params_->SetTargetChannel( |
| 424 | target_channel, false, &error_message)) { |
Alex Deymo | d942f9d | 2015-11-06 16:11:50 -0800 | [diff] [blame] | 425 | LOG(ERROR) << "Setting the channel failed: " << error_message; |
| 426 | } |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 427 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 428 | // Since this is the beginning of a new attempt, update the download |
| 429 | // channel. The download channel won't be updated until the next attempt, |
| 430 | // even if target channel changes meanwhile, so that how we'll know if we |
| 431 | // should cancel the current download attempt if there's such a change in |
| 432 | // target channel. |
| 433 | omaha_request_params_->UpdateDownloadChannel(); |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 434 | } |
Jae Hoon Kim | c43f6bb | 2019-07-03 12:56:52 -0700 | [diff] [blame] | 435 | |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 436 | // The function |CalculateDlcParams| makes use of the function |GetAppId| from |
| 437 | // |OmahaRequestParams|, so to ensure that the return from |GetAppId| |
| 438 | // doesn't change, no changes to the values |download_channel_|, |
| 439 | // |image_props_.product_id| and |image_props_.canary_product_id| from |
| 440 | // |omaha_request_params_| shall be made below this line. |
| 441 | CalculateDlcParams(); |
| 442 | |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 443 | omaha_request_params_->set_is_install(is_install_); |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 444 | |
Amr Aboelkher | 21ac996 | 2019-05-15 14:50:05 +0200 | [diff] [blame] | 445 | // Set Quick Fix Build token if policy is set and the device is enterprise |
| 446 | // enrolled. |
Askar Aitzhan | 570ca87 | 2019-04-24 11:16:12 +0200 | [diff] [blame] | 447 | string token; |
| 448 | if (system_state_ && system_state_->device_policy()) { |
| 449 | if (!system_state_->device_policy()->GetDeviceQuickFixBuildToken(&token)) |
| 450 | token.clear(); |
| 451 | } |
| 452 | omaha_request_params_->set_autoupdate_token(token); |
| 453 | |
Gilad Arnold | afd70ed | 2014-09-30 16:27:06 -0700 | [diff] [blame] | 454 | LOG(INFO) << "target_version_prefix = " |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 455 | << omaha_request_params_->target_version_prefix() |
Marton Hunyady | ba51c3f | 2018-04-25 15:18:10 +0200 | [diff] [blame] | 456 | << ", rollback_allowed = " |
| 457 | << omaha_request_params_->rollback_allowed() |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 458 | << ", scatter_factor_in_seconds = " |
| 459 | << utils::FormatSecs(scatter_factor_.InSeconds()); |
| 460 | |
| 461 | LOG(INFO) << "Wall Clock Based Wait Enabled = " |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 462 | << omaha_request_params_->wall_clock_based_wait_enabled() |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 463 | << ", Update Check Count Wait Enabled = " |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 464 | << omaha_request_params_->update_check_count_wait_enabled() |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 465 | << ", Waiting Period = " |
| 466 | << utils::FormatSecs( |
| 467 | omaha_request_params_->waiting_period().InSeconds()); |
Jay Srinivasan | 0a70874 | 2012-03-20 11:26:12 -0700 | [diff] [blame] | 468 | |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 469 | LOG(INFO) << "Use p2p For Downloading = " |
Gilad Arnold | 74b5f55 | 2014-10-07 08:17:16 -0700 | [diff] [blame] | 470 | << payload_state->GetUsingP2PForDownloading() |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 471 | << ", Use p2p For Sharing = " |
Gilad Arnold | 74b5f55 | 2014-10-07 08:17:16 -0700 | [diff] [blame] | 472 | << payload_state->GetUsingP2PForSharing(); |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 473 | |
Andrew de los Reyes | 4516810 | 2010-11-22 11:13:50 -0800 | [diff] [blame] | 474 | obeying_proxies_ = true; |
| 475 | if (obey_proxies || proxy_manual_checks_ == 0) { |
| 476 | LOG(INFO) << "forced to obey proxies"; |
| 477 | // If forced to obey proxies, every 20th request will not use proxies |
| 478 | proxy_manual_checks_++; |
| 479 | LOG(INFO) << "proxy manual checks: " << proxy_manual_checks_; |
| 480 | if (proxy_manual_checks_ >= kMaxConsecutiveObeyProxyRequests) { |
| 481 | proxy_manual_checks_ = 0; |
| 482 | obeying_proxies_ = false; |
| 483 | } |
| 484 | } else if (base::RandInt(0, 4) == 0) { |
| 485 | obeying_proxies_ = false; |
| 486 | } |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 487 | LOG_IF(INFO, !obeying_proxies_) |
| 488 | << "To help ensure updates work, this update check we are ignoring the " |
| 489 | << "proxy settings and using direct connections."; |
Andrew de los Reyes | 4516810 | 2010-11-22 11:13:50 -0800 | [diff] [blame] | 490 | |
Darin Petkov | 3627577 | 2010-10-01 11:40:57 -0700 | [diff] [blame] | 491 | DisableDeltaUpdateIfNeeded(); |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 492 | return true; |
| 493 | } |
| 494 | |
Gilad Arnold | b92f0df | 2013-01-10 16:32:45 -0800 | [diff] [blame] | 495 | void UpdateAttempter::CalculateScatteringParams(bool interactive) { |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 496 | // Take a copy of the old scatter value before we update it, as |
| 497 | // we need to update the waiting period if this value changes. |
| 498 | TimeDelta old_scatter_factor = scatter_factor_; |
Jay Srinivasan | 6f6ea00 | 2012-12-14 11:26:28 -0800 | [diff] [blame] | 499 | const policy::DevicePolicy* device_policy = system_state_->device_policy(); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 500 | if (device_policy) { |
Ben Chan | 9abb763 | 2014-08-07 00:10:53 -0700 | [diff] [blame] | 501 | int64_t new_scatter_factor_in_secs = 0; |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 502 | device_policy->GetScatterFactorInSeconds(&new_scatter_factor_in_secs); |
Alex Vakulenko | d2779df | 2014-06-16 13:19:00 -0700 | [diff] [blame] | 503 | if (new_scatter_factor_in_secs < 0) // sanitize input, just in case. |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 504 | new_scatter_factor_in_secs = 0; |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 505 | scatter_factor_ = TimeDelta::FromSeconds(new_scatter_factor_in_secs); |
| 506 | } |
| 507 | |
| 508 | bool is_scatter_enabled = false; |
| 509 | if (scatter_factor_.InSeconds() == 0) { |
| 510 | LOG(INFO) << "Scattering disabled since scatter factor is set to 0"; |
Gilad Arnold | b92f0df | 2013-01-10 16:32:45 -0800 | [diff] [blame] | 511 | } else if (interactive) { |
| 512 | LOG(INFO) << "Scattering disabled as this is an interactive update check"; |
Alex Deymo | 46a9aae | 2016-05-04 20:20:11 -0700 | [diff] [blame] | 513 | } else if (system_state_->hardware()->IsOOBEEnabled() && |
| 514 | !system_state_->hardware()->IsOOBEComplete(nullptr)) { |
| 515 | LOG(INFO) << "Scattering disabled since OOBE is enabled but not complete " |
| 516 | "yet"; |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 517 | } else { |
| 518 | is_scatter_enabled = true; |
| 519 | LOG(INFO) << "Scattering is enabled"; |
| 520 | } |
| 521 | |
| 522 | if (is_scatter_enabled) { |
| 523 | // This means the scattering policy is turned on. |
| 524 | // Now check if we need to update the waiting period. The two cases |
| 525 | // in which we'd need to update the waiting period are: |
| 526 | // 1. First time in process or a scheduled check after a user-initiated one. |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 527 | // (omaha_request_params_->waiting_period will be zero in this case). |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 528 | // 2. Admin has changed the scattering policy value. |
| 529 | // (new scattering value will be different from old one in this case). |
Ben Chan | 9abb763 | 2014-08-07 00:10:53 -0700 | [diff] [blame] | 530 | int64_t wait_period_in_secs = 0; |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 531 | if (omaha_request_params_->waiting_period().InSeconds() == 0) { |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 532 | // First case. Check if we have a suitable value to set for |
| 533 | // the waiting period. |
Adolfo Victoria | d3a1e35 | 2018-07-16 11:40:47 -0700 | [diff] [blame] | 534 | if (prefs_->GetInt64(kPrefsWallClockScatteringWaitPeriod, |
| 535 | &wait_period_in_secs) && |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 536 | wait_period_in_secs > 0 && |
| 537 | wait_period_in_secs <= scatter_factor_.InSeconds()) { |
| 538 | // This means: |
| 539 | // 1. There's a persisted value for the waiting period available. |
| 540 | // 2. And that persisted value is still valid. |
| 541 | // So, in this case, we should reuse the persisted value instead of |
| 542 | // generating a new random value to improve the chances of a good |
| 543 | // distribution for scattering. |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 544 | omaha_request_params_->set_waiting_period( |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 545 | TimeDelta::FromSeconds(wait_period_in_secs)); |
| 546 | LOG(INFO) << "Using persisted wall-clock waiting period: " |
| 547 | << utils::FormatSecs( |
| 548 | omaha_request_params_->waiting_period().InSeconds()); |
Alex Vakulenko | d2779df | 2014-06-16 13:19:00 -0700 | [diff] [blame] | 549 | } else { |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 550 | // This means there's no persisted value for the waiting period |
| 551 | // available or its value is invalid given the new scatter_factor value. |
| 552 | // So, we should go ahead and regenerate a new value for the |
| 553 | // waiting period. |
| 554 | LOG(INFO) << "Persisted value not present or not valid (" |
| 555 | << utils::FormatSecs(wait_period_in_secs) |
| 556 | << ") for wall-clock waiting period."; |
| 557 | GenerateNewWaitingPeriod(); |
| 558 | } |
| 559 | } else if (scatter_factor_ != old_scatter_factor) { |
| 560 | // This means there's already a waiting period value, but we detected |
| 561 | // a change in the scattering policy value. So, we should regenerate the |
| 562 | // waiting period to make sure it's within the bounds of the new scatter |
| 563 | // factor value. |
| 564 | GenerateNewWaitingPeriod(); |
| 565 | } else { |
| 566 | // Neither the first time scattering is enabled nor the scattering value |
| 567 | // changed. Nothing to do. |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 568 | LOG(INFO) << "Keeping current wall-clock waiting period: " |
| 569 | << utils::FormatSecs( |
| 570 | omaha_request_params_->waiting_period().InSeconds()); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 571 | } |
| 572 | |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 573 | // The invariant at this point is that omaha_request_params_->waiting_period |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 574 | // is non-zero no matter which path we took above. |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 575 | LOG_IF(ERROR, omaha_request_params_->waiting_period().InSeconds() == 0) |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 576 | << "Waiting Period should NOT be zero at this point!!!"; |
| 577 | |
| 578 | // Since scattering is enabled, wall clock based wait will always be |
| 579 | // enabled. |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 580 | omaha_request_params_->set_wall_clock_based_wait_enabled(true); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 581 | |
| 582 | // If we don't have any issues in accessing the file system to update |
| 583 | // the update check count value, we'll turn that on as well. |
| 584 | bool decrement_succeeded = DecrementUpdateCheckCount(); |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 585 | omaha_request_params_->set_update_check_count_wait_enabled( |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 586 | decrement_succeeded); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 587 | } else { |
| 588 | // This means the scattering feature is turned off or disabled for |
| 589 | // this particular update check. Make sure to disable |
| 590 | // all the knobs and artifacts so that we don't invoke any scattering |
| 591 | // related code. |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 592 | omaha_request_params_->set_wall_clock_based_wait_enabled(false); |
| 593 | omaha_request_params_->set_update_check_count_wait_enabled(false); |
| 594 | omaha_request_params_->set_waiting_period(TimeDelta::FromSeconds(0)); |
Adolfo Victoria | d3a1e35 | 2018-07-16 11:40:47 -0700 | [diff] [blame] | 595 | prefs_->Delete(kPrefsWallClockScatteringWaitPeriod); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 596 | prefs_->Delete(kPrefsUpdateCheckCount); |
| 597 | // Don't delete the UpdateFirstSeenAt file as we don't want manual checks |
| 598 | // that result in no-updates (e.g. due to server side throttling) to |
| 599 | // cause update starvation by having the client generate a new |
| 600 | // UpdateFirstSeenAt for each scheduled check that follows a manual check. |
| 601 | } |
| 602 | } |
| 603 | |
| 604 | void UpdateAttempter::GenerateNewWaitingPeriod() { |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 605 | omaha_request_params_->set_waiting_period( |
| 606 | TimeDelta::FromSeconds(base::RandInt(1, scatter_factor_.InSeconds()))); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 607 | |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 608 | LOG(INFO) << "Generated new wall-clock waiting period: " |
| 609 | << utils::FormatSecs( |
| 610 | omaha_request_params_->waiting_period().InSeconds()); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 611 | |
| 612 | // Do a best-effort to persist this in all cases. Even if the persistence |
| 613 | // fails, we'll still be able to scatter based on our in-memory value. |
| 614 | // The persistence only helps in ensuring a good overall distribution |
| 615 | // across multiple devices if they tend to reboot too often. |
Gilad Arnold | 519cfc7 | 2014-10-02 10:34:54 -0700 | [diff] [blame] | 616 | system_state_->payload_state()->SetScatteringWaitPeriod( |
| 617 | omaha_request_params_->waiting_period()); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 618 | } |
| 619 | |
Adolfo Victoria | 497044c | 2018-07-18 07:51:42 -0700 | [diff] [blame] | 620 | void UpdateAttempter::CalculateStagingParams(bool interactive) { |
| 621 | bool oobe_complete = system_state_->hardware()->IsOOBEEnabled() && |
| 622 | system_state_->hardware()->IsOOBEComplete(nullptr); |
| 623 | auto device_policy = system_state_->device_policy(); |
| 624 | StagingCase staging_case = StagingCase::kOff; |
| 625 | if (device_policy && !interactive && oobe_complete) { |
| 626 | staging_wait_time_ = omaha_request_params_->waiting_period(); |
| 627 | staging_case = CalculateStagingCase( |
| 628 | device_policy, prefs_, &staging_wait_time_, &staging_schedule_); |
| 629 | } |
| 630 | switch (staging_case) { |
| 631 | case StagingCase::kOff: |
| 632 | // Staging is off, get rid of persisted value. |
| 633 | prefs_->Delete(kPrefsWallClockStagingWaitPeriod); |
| 634 | // Set |staging_wait_time_| to its default value so scattering can still |
| 635 | // be turned on |
| 636 | staging_wait_time_ = TimeDelta(); |
| 637 | break; |
| 638 | // Let the cases fall through since they just add, and never remove, steps |
| 639 | // to turning staging on. |
| 640 | case StagingCase::kNoSavedValue: |
| 641 | prefs_->SetInt64(kPrefsWallClockStagingWaitPeriod, |
| 642 | staging_wait_time_.InDays()); |
Denis Nikitin | 8f2fa74 | 2019-05-29 10:36:52 -0700 | [diff] [blame] | 643 | FALLTHROUGH; |
Adolfo Victoria | 497044c | 2018-07-18 07:51:42 -0700 | [diff] [blame] | 644 | case StagingCase::kSetStagingFromPref: |
| 645 | omaha_request_params_->set_waiting_period(staging_wait_time_); |
Denis Nikitin | 8f2fa74 | 2019-05-29 10:36:52 -0700 | [diff] [blame] | 646 | FALLTHROUGH; |
Adolfo Victoria | 497044c | 2018-07-18 07:51:42 -0700 | [diff] [blame] | 647 | case StagingCase::kNoAction: |
| 648 | // Staging is on, enable wallclock based wait so that its values get used. |
| 649 | omaha_request_params_->set_wall_clock_based_wait_enabled(true); |
| 650 | // Use UpdateCheckCount if possible to prevent devices updating all at |
| 651 | // once. |
| 652 | omaha_request_params_->set_update_check_count_wait_enabled( |
| 653 | DecrementUpdateCheckCount()); |
| 654 | // Scattering should not be turned on if staging is on, delete the |
| 655 | // existing scattering configuration. |
| 656 | prefs_->Delete(kPrefsWallClockScatteringWaitPeriod); |
| 657 | scatter_factor_ = TimeDelta(); |
| 658 | } |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 659 | } |
| 660 | |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 661 | bool UpdateAttempter::ResetDlcPrefs(const string& dlc_id) { |
| 662 | vector<string> failures; |
| 663 | PrefsInterface* prefs = system_state_->prefs(); |
| 664 | for (auto& sub_key : |
| 665 | {kPrefsPingActive, kPrefsPingLastActive, kPrefsPingLastRollcall}) { |
| 666 | auto key = prefs->CreateSubKey(kDlcPrefsSubDir, dlc_id, sub_key); |
| 667 | if (!prefs->Delete(key)) |
| 668 | failures.emplace_back(sub_key); |
| 669 | } |
| 670 | if (failures.size() != 0) |
| 671 | PLOG(ERROR) << "Failed to delete prefs (" << base::JoinString(failures, ",") |
| 672 | << " for DLC (" << dlc_id << ")."; |
| 673 | |
| 674 | return failures.size() == 0; |
| 675 | } |
| 676 | |
Andrew | a8d7df3 | 2020-03-15 20:10:01 -0700 | [diff] [blame] | 677 | bool UpdateAttempter::SetDlcActiveValue(bool is_active, const string& dlc_id) { |
| 678 | if (dlc_id.empty()) { |
| 679 | LOG(ERROR) << "Empty DLC ID passed."; |
| 680 | return false; |
| 681 | } |
| 682 | LOG(INFO) << "Set DLC (" << dlc_id << ") to " |
| 683 | << (is_active ? "Active" : "Inactive"); |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 684 | PrefsInterface* prefs = system_state_->prefs(); |
Andrew | a8d7df3 | 2020-03-15 20:10:01 -0700 | [diff] [blame] | 685 | if (is_active) { |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 686 | auto ping_active_key = |
| 687 | prefs->CreateSubKey(kDlcPrefsSubDir, dlc_id, kPrefsPingActive); |
| 688 | if (!prefs->SetInt64(ping_active_key, kPingActiveValue)) { |
Andrew | a8d7df3 | 2020-03-15 20:10:01 -0700 | [diff] [blame] | 689 | LOG(ERROR) << "Failed to set the value of ping metadata '" |
| 690 | << kPrefsPingActive << "'."; |
| 691 | return false; |
| 692 | } |
| 693 | } else { |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 694 | return ResetDlcPrefs(dlc_id); |
Andrew | a8d7df3 | 2020-03-15 20:10:01 -0700 | [diff] [blame] | 695 | } |
| 696 | return true; |
| 697 | } |
| 698 | |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 699 | int64_t UpdateAttempter::GetPingMetadata(const string& metadata_key) const { |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 700 | // The first time a ping is sent, the metadata files containing the values |
| 701 | // sent back by the server still don't exist. A value of -1 is used to |
| 702 | // indicate this. |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 703 | if (!system_state_->prefs()->Exists(metadata_key)) |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 704 | return kPingNeverPinged; |
| 705 | |
| 706 | int64_t value; |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 707 | if (system_state_->prefs()->GetInt64(metadata_key, &value)) |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 708 | return value; |
| 709 | |
| 710 | // Return -2 when the file exists and there is a problem reading from it, or |
| 711 | // the value cannot be converted to an integer. |
| 712 | return kPingUnknownValue; |
| 713 | } |
| 714 | |
| 715 | void UpdateAttempter::CalculateDlcParams() { |
Amin Hassani | 2b68e6b | 2020-04-17 10:49:12 -0700 | [diff] [blame] | 716 | // Set the |dlc_ids_| only for an update. This is required to get the |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 717 | // currently installed DLC(s). |
| 718 | if (!is_install_ && |
Amin Hassani | 2b68e6b | 2020-04-17 10:49:12 -0700 | [diff] [blame] | 719 | !system_state_->dlcservice()->GetDlcsToUpdate(&dlc_ids_)) { |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 720 | LOG(INFO) << "Failed to retrieve DLC module IDs from dlcservice. Check the " |
| 721 | "state of dlcservice, will not update DLC modules."; |
| 722 | } |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 723 | PrefsInterface* prefs = system_state_->prefs(); |
| 724 | map<string, OmahaRequestParams::AppParams> dlc_apps_params; |
Amin Hassani | 2b68e6b | 2020-04-17 10:49:12 -0700 | [diff] [blame] | 725 | for (const auto& dlc_id : dlc_ids_) { |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 726 | OmahaRequestParams::AppParams dlc_params{ |
| 727 | .active_counting_type = OmahaRequestParams::kDateBased, |
| 728 | .name = dlc_id, |
| 729 | .send_ping = false}; |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 730 | if (is_install_) { |
| 731 | // In some cases, |SetDlcActiveValue| might fail to reset the DLC prefs |
| 732 | // when a DLC is uninstalled. To avoid having stale values from that |
| 733 | // scenario, we reset the metadata values on a new install request. |
| 734 | // Ignore failure to delete stale prefs. |
| 735 | ResetDlcPrefs(dlc_id); |
| 736 | SetDlcActiveValue(true, dlc_id); |
| 737 | } else { |
| 738 | // Only send the ping when the request is to update DLCs. When installing |
| 739 | // DLCs, we don't want to send the ping yet, since the DLCs might fail to |
| 740 | // install or might not really be active yet. |
| 741 | dlc_params.ping_active = kPingActiveValue; |
| 742 | auto ping_active_key = |
| 743 | prefs->CreateSubKey(kDlcPrefsSubDir, dlc_id, kPrefsPingActive); |
| 744 | if (!prefs->GetInt64(ping_active_key, &dlc_params.ping_active) || |
| 745 | dlc_params.ping_active != kPingActiveValue) { |
| 746 | dlc_params.ping_active = kPingInactiveValue; |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 747 | } |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 748 | auto ping_last_active_key = |
| 749 | prefs->CreateSubKey(kDlcPrefsSubDir, dlc_id, kPrefsPingLastActive); |
| 750 | dlc_params.ping_date_last_active = GetPingMetadata(ping_last_active_key); |
| 751 | |
| 752 | auto ping_last_rollcall_key = |
| 753 | prefs->CreateSubKey(kDlcPrefsSubDir, dlc_id, kPrefsPingLastRollcall); |
| 754 | dlc_params.ping_date_last_rollcall = |
| 755 | GetPingMetadata(ping_last_rollcall_key); |
| 756 | |
| 757 | dlc_params.send_ping = true; |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 758 | } |
| 759 | dlc_apps_params[omaha_request_params_->GetDlcAppId(dlc_id)] = dlc_params; |
| 760 | } |
| 761 | omaha_request_params_->set_dlc_apps_params(dlc_apps_params); |
| 762 | } |
| 763 | |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 764 | void UpdateAttempter::BuildUpdateActions(bool interactive) { |
Darin Petkov | f42cc1c | 2010-09-01 09:03:02 -0700 | [diff] [blame] | 765 | CHECK(!processor_->IsRunning()); |
| 766 | processor_->set_delegate(this); |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 767 | |
Jae Hoon Kim | edb6550 | 2019-06-14 11:52:17 -0700 | [diff] [blame] | 768 | // The session ID needs to be kept throughout the update flow. The value |
| 769 | // of the session ID will reset/update only when it is a new update flow. |
| 770 | session_id_ = base::GenerateGUID(); |
| 771 | |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 772 | // Actions: |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 773 | auto update_check_fetcher = std::make_unique<LibcurlHttpFetcher>( |
| 774 | GetProxyResolver(), system_state_->hardware()); |
Alex Deymo | 33e91e7 | 2015-12-01 18:26:08 -0300 | [diff] [blame] | 775 | update_check_fetcher->set_server_to_check(ServerToCheck::kUpdate); |
Andrew de los Reyes | fb2f461 | 2011-06-09 18:21:49 -0700 | [diff] [blame] | 776 | // Try harder to connect to the network, esp when not interactive. |
| 777 | // See comment in libcurl_http_fetcher.cc. |
| 778 | update_check_fetcher->set_no_network_max_retries(interactive ? 1 : 3); |
Xiaochu Liu | 4a1173a | 2019-04-10 10:49:08 -0700 | [diff] [blame] | 779 | update_check_fetcher->set_is_update_check(true); |
Jae Hoon Kim | edb6550 | 2019-06-14 11:52:17 -0700 | [diff] [blame] | 780 | auto update_check_action = |
| 781 | std::make_unique<OmahaRequestAction>(system_state_, |
| 782 | nullptr, |
| 783 | std::move(update_check_fetcher), |
| 784 | false, |
| 785 | session_id_); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 786 | auto response_handler_action = |
| 787 | std::make_unique<OmahaResponseHandlerAction>(system_state_); |
Amin Hassani | 0882a51 | 2018-04-05 16:25:44 -0700 | [diff] [blame] | 788 | auto update_boot_flags_action = |
| 789 | std::make_unique<UpdateBootFlagsAction>(system_state_->boot_control()); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 790 | auto download_started_action = std::make_unique<OmahaRequestAction>( |
Sen Jiang | 1841408 | 2018-01-11 14:50:36 -0800 | [diff] [blame] | 791 | system_state_, |
| 792 | new OmahaEvent(OmahaEvent::kTypeUpdateDownloadStarted), |
| 793 | std::make_unique<LibcurlHttpFetcher>(GetProxyResolver(), |
| 794 | system_state_->hardware()), |
Jae Hoon Kim | edb6550 | 2019-06-14 11:52:17 -0700 | [diff] [blame] | 795 | false, |
| 796 | session_id_); |
Alex Deymo | 33e91e7 | 2015-12-01 18:26:08 -0300 | [diff] [blame] | 797 | |
Bruno Rocha | 7f9aea2 | 2011-09-12 14:31:24 -0700 | [diff] [blame] | 798 | LibcurlHttpFetcher* download_fetcher = |
Alex Deymo | 33e91e7 | 2015-12-01 18:26:08 -0300 | [diff] [blame] | 799 | new LibcurlHttpFetcher(GetProxyResolver(), system_state_->hardware()); |
| 800 | download_fetcher->set_server_to_check(ServerToCheck::kDownload); |
Sen Jiang | ee174a1 | 2017-12-21 17:38:08 -0800 | [diff] [blame] | 801 | if (interactive) |
| 802 | download_fetcher->set_max_retry_count(kDownloadMaxRetryCountInteractive); |
Jae Hoon Kim | 0ae8fe1 | 2019-06-26 14:32:50 -0700 | [diff] [blame] | 803 | download_fetcher->SetHeader(kXGoogleUpdateSessionId, session_id_); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 804 | auto download_action = |
| 805 | std::make_unique<DownloadAction>(prefs_, |
| 806 | system_state_->boot_control(), |
| 807 | system_state_->hardware(), |
| 808 | system_state_, |
| 809 | download_fetcher, // passes ownership |
| 810 | interactive); |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 811 | download_action->set_delegate(this); |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 812 | |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 813 | auto download_finished_action = std::make_unique<OmahaRequestAction>( |
| 814 | system_state_, |
| 815 | new OmahaEvent(OmahaEvent::kTypeUpdateDownloadFinished), |
| 816 | std::make_unique<LibcurlHttpFetcher>(GetProxyResolver(), |
| 817 | system_state_->hardware()), |
Jae Hoon Kim | edb6550 | 2019-06-14 11:52:17 -0700 | [diff] [blame] | 818 | false, |
| 819 | session_id_); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 820 | auto filesystem_verifier_action = |
| 821 | std::make_unique<FilesystemVerifierAction>(); |
| 822 | auto update_complete_action = std::make_unique<OmahaRequestAction>( |
| 823 | system_state_, |
| 824 | new OmahaEvent(OmahaEvent::kTypeUpdateComplete), |
| 825 | std::make_unique<LibcurlHttpFetcher>(GetProxyResolver(), |
| 826 | system_state_->hardware()), |
Jae Hoon Kim | edb6550 | 2019-06-14 11:52:17 -0700 | [diff] [blame] | 827 | false, |
| 828 | session_id_); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 829 | |
| 830 | auto postinstall_runner_action = std::make_unique<PostinstallRunnerAction>( |
| 831 | system_state_->boot_control(), system_state_->hardware()); |
| 832 | postinstall_runner_action->set_delegate(this); |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 833 | |
| 834 | // Bond them together. We have to use the leaf-types when calling |
| 835 | // BondActions(). |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 836 | BondActions(update_check_action.get(), response_handler_action.get()); |
| 837 | BondActions(response_handler_action.get(), download_action.get()); |
| 838 | BondActions(download_action.get(), filesystem_verifier_action.get()); |
| 839 | BondActions(filesystem_verifier_action.get(), |
| 840 | postinstall_runner_action.get()); |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 841 | |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 842 | processor_->EnqueueAction(std::move(update_check_action)); |
| 843 | processor_->EnqueueAction(std::move(response_handler_action)); |
Amin Hassani | 0882a51 | 2018-04-05 16:25:44 -0700 | [diff] [blame] | 844 | processor_->EnqueueAction(std::move(update_boot_flags_action)); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 845 | processor_->EnqueueAction(std::move(download_started_action)); |
| 846 | processor_->EnqueueAction(std::move(download_action)); |
| 847 | processor_->EnqueueAction(std::move(download_finished_action)); |
| 848 | processor_->EnqueueAction(std::move(filesystem_verifier_action)); |
| 849 | processor_->EnqueueAction(std::move(postinstall_runner_action)); |
| 850 | processor_->EnqueueAction(std::move(update_complete_action)); |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 851 | } |
| 852 | |
Chris Sosa | 44b9b7e | 2014-04-02 13:53:46 -0700 | [diff] [blame] | 853 | bool UpdateAttempter::Rollback(bool powerwash) { |
Colin Howes | 978c108 | 2018-12-03 11:46:12 -0800 | [diff] [blame] | 854 | is_install_ = false; |
Chris Sosa | 44b9b7e | 2014-04-02 13:53:46 -0700 | [diff] [blame] | 855 | if (!CanRollback()) { |
| 856 | return false; |
| 857 | } |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 858 | |
Chris Sosa | 44b9b7e | 2014-04-02 13:53:46 -0700 | [diff] [blame] | 859 | // Extra check for enterprise-enrolled devices since they don't support |
| 860 | // powerwash. |
| 861 | if (powerwash) { |
| 862 | // Enterprise-enrolled devices have an empty owner in their device policy. |
| 863 | string owner; |
| 864 | RefreshDevicePolicy(); |
| 865 | const policy::DevicePolicy* device_policy = system_state_->device_policy(); |
| 866 | if (device_policy && (!device_policy->GetOwner(&owner) || owner.empty())) { |
| 867 | LOG(ERROR) << "Enterprise device detected. " |
| 868 | << "Cannot perform a powerwash for enterprise devices."; |
| 869 | return false; |
| 870 | } |
| 871 | } |
| 872 | |
| 873 | processor_->set_delegate(this); |
Chris Sosa | aa18e16 | 2013-06-20 13:20:30 -0700 | [diff] [blame] | 874 | |
Chris Sosa | 28e479c | 2013-07-12 11:39:53 -0700 | [diff] [blame] | 875 | // Initialize the default request params. |
| 876 | if (!omaha_request_params_->Init("", "", true)) { |
| 877 | LOG(ERROR) << "Unable to initialize Omaha request params."; |
| 878 | return false; |
| 879 | } |
| 880 | |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 881 | LOG(INFO) << "Setting rollback options."; |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 882 | install_plan_.reset(new InstallPlan()); |
| 883 | install_plan_->target_slot = GetRollbackSlot(); |
| 884 | install_plan_->source_slot = system_state_->boot_control()->GetCurrentSlot(); |
Chris Sosa | 76a29ae | 2013-07-11 17:59:24 -0700 | [diff] [blame] | 885 | |
Alex Deymo | 706a5ab | 2015-11-23 17:48:30 -0300 | [diff] [blame] | 886 | TEST_AND_RETURN_FALSE( |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 887 | install_plan_->LoadPartitionsFromSlots(system_state_->boot_control())); |
| 888 | install_plan_->powerwash_required = powerwash; |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 889 | |
| 890 | LOG(INFO) << "Using this install plan:"; |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 891 | install_plan_->Dump(); |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 892 | |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 893 | auto install_plan_action = |
| 894 | std::make_unique<InstallPlanAction>(*install_plan_); |
| 895 | auto postinstall_runner_action = std::make_unique<PostinstallRunnerAction>( |
| 896 | system_state_->boot_control(), system_state_->hardware()); |
| 897 | postinstall_runner_action->set_delegate(this); |
| 898 | BondActions(install_plan_action.get(), postinstall_runner_action.get()); |
| 899 | processor_->EnqueueAction(std::move(install_plan_action)); |
| 900 | processor_->EnqueueAction(std::move(postinstall_runner_action)); |
Chris Sosa | aa18e16 | 2013-06-20 13:20:30 -0700 | [diff] [blame] | 901 | |
| 902 | // Update the payload state for Rollback. |
| 903 | system_state_->payload_state()->Rollback(); |
| 904 | |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 905 | SetStatusAndNotify(UpdateStatus::ATTEMPTING_ROLLBACK); |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 906 | |
Amin Hassani | 0882a51 | 2018-04-05 16:25:44 -0700 | [diff] [blame] | 907 | ScheduleProcessingStart(); |
Chris Sosa | aa18e16 | 2013-06-20 13:20:30 -0700 | [diff] [blame] | 908 | return true; |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 909 | } |
| 910 | |
Alex Vakulenko | 59e253e | 2014-02-24 10:40:21 -0800 | [diff] [blame] | 911 | bool UpdateAttempter::CanRollback() const { |
Chris Sosa | 44b9b7e | 2014-04-02 13:53:46 -0700 | [diff] [blame] | 912 | // We can only rollback if the update_engine isn't busy and we have a valid |
| 913 | // rollback partition. |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 914 | return (status_ == UpdateStatus::IDLE && |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 915 | GetRollbackSlot() != BootControlInterface::kInvalidSlot); |
Alex Vakulenko | 2bddadd | 2014-03-27 13:23:46 -0700 | [diff] [blame] | 916 | } |
| 917 | |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 918 | BootControlInterface::Slot UpdateAttempter::GetRollbackSlot() const { |
| 919 | LOG(INFO) << "UpdateAttempter::GetRollbackSlot"; |
| 920 | const unsigned int num_slots = system_state_->boot_control()->GetNumSlots(); |
| 921 | const BootControlInterface::Slot current_slot = |
| 922 | system_state_->boot_control()->GetCurrentSlot(); |
Alex Vakulenko | 59e253e | 2014-02-24 10:40:21 -0800 | [diff] [blame] | 923 | |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 924 | LOG(INFO) << " Installed slots: " << num_slots; |
| 925 | LOG(INFO) << " Booted from slot: " |
| 926 | << BootControlInterface::SlotName(current_slot); |
Alex Vakulenko | 59e253e | 2014-02-24 10:40:21 -0800 | [diff] [blame] | 927 | |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 928 | if (current_slot == BootControlInterface::kInvalidSlot || num_slots < 2) { |
| 929 | LOG(INFO) << "Device is not updateable."; |
| 930 | return BootControlInterface::kInvalidSlot; |
Alex Vakulenko | 59e253e | 2014-02-24 10:40:21 -0800 | [diff] [blame] | 931 | } |
| 932 | |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 933 | vector<BootControlInterface::Slot> bootable_slots; |
Alex Deymo | f7ead81 | 2015-10-23 17:37:27 -0700 | [diff] [blame] | 934 | for (BootControlInterface::Slot slot = 0; slot < num_slots; slot++) { |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 935 | if (slot != current_slot && |
| 936 | system_state_->boot_control()->IsSlotBootable(slot)) { |
| 937 | LOG(INFO) << "Found bootable slot " |
| 938 | << BootControlInterface::SlotName(slot); |
| 939 | return slot; |
Alex Vakulenko | 59e253e | 2014-02-24 10:40:21 -0800 | [diff] [blame] | 940 | } |
| 941 | } |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 942 | LOG(INFO) << "No other bootable slot found."; |
| 943 | return BootControlInterface::kInvalidSlot; |
Alex Vakulenko | 2bddadd | 2014-03-27 13:23:46 -0700 | [diff] [blame] | 944 | } |
| 945 | |
Aaron Wood | 081c023 | 2017-10-19 17:14:58 -0700 | [diff] [blame] | 946 | bool UpdateAttempter::CheckForUpdate(const string& app_version, |
Jay Srinivasan | e73acab | 2012-07-10 14:34:03 -0700 | [diff] [blame] | 947 | const string& omaha_url, |
Aaron Wood | 081c023 | 2017-10-19 17:14:58 -0700 | [diff] [blame] | 948 | UpdateAttemptFlags flags) { |
Jae Hoon Kim | c437ea5 | 2019-07-11 11:20:38 -0700 | [diff] [blame] | 949 | if (status_ != UpdateStatus::IDLE) { |
| 950 | LOG(INFO) << "Refusing to do an update as there is an " |
| 951 | << (is_install_ ? "install" : "update") |
| 952 | << " already in progress."; |
Aaron Wood | 081c023 | 2017-10-19 17:14:58 -0700 | [diff] [blame] | 953 | return false; |
| 954 | } |
| 955 | |
Jae Hoon Kim | c437ea5 | 2019-07-11 11:20:38 -0700 | [diff] [blame] | 956 | bool interactive = !(flags & UpdateAttemptFlags::kFlagNonInteractive); |
Jae Hoon Kim | c437ea5 | 2019-07-11 11:20:38 -0700 | [diff] [blame] | 957 | is_install_ = false; |
| 958 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 959 | LOG(INFO) << "Forced update check requested."; |
David Pursell | 02c1864 | 2014-11-06 11:26:11 -0800 | [diff] [blame] | 960 | forced_app_version_.clear(); |
| 961 | forced_omaha_url_.clear(); |
| 962 | |
| 963 | // Certain conditions must be met to allow setting custom version and update |
| 964 | // server URLs. However, kScheduledAUTestURLRequest and kAUTestURLRequest are |
| 965 | // always allowed regardless of device state. |
| 966 | if (IsAnyUpdateSourceAllowed()) { |
| 967 | forced_app_version_ = app_version; |
| 968 | forced_omaha_url_ = omaha_url; |
| 969 | } |
| 970 | if (omaha_url == kScheduledAUTestURLRequest) { |
Alex Deymo | ac41a82 | 2015-09-15 20:52:53 -0700 | [diff] [blame] | 971 | forced_omaha_url_ = constants::kOmahaDefaultAUTestURL; |
David Pursell | 02c1864 | 2014-11-06 11:26:11 -0800 | [diff] [blame] | 972 | // Pretend that it's not user-initiated even though it is, |
| 973 | // so as to test scattering logic, etc. which get kicked off |
| 974 | // only in scheduled update checks. |
| 975 | interactive = false; |
| 976 | } else if (omaha_url == kAUTestURLRequest) { |
Alex Deymo | ac41a82 | 2015-09-15 20:52:53 -0700 | [diff] [blame] | 977 | forced_omaha_url_ = constants::kOmahaDefaultAUTestURL; |
David Pursell | 02c1864 | 2014-11-06 11:26:11 -0800 | [diff] [blame] | 978 | } |
| 979 | |
Aaron Wood | 081c023 | 2017-10-19 17:14:58 -0700 | [diff] [blame] | 980 | if (interactive) { |
| 981 | // Use the passed-in update attempt flags for this update attempt instead |
| 982 | // of the previously set ones. |
| 983 | current_update_attempt_flags_ = flags; |
| 984 | // Note: The caching for non-interactive update checks happens in |
Jae Hoon Kim | 75daa38 | 2019-07-02 11:17:24 -0700 | [diff] [blame] | 985 | // |OnUpdateScheduled()|. |
Aaron Wood | 081c023 | 2017-10-19 17:14:58 -0700 | [diff] [blame] | 986 | } |
| 987 | |
Jae Hoon Kim | 2b73ac2 | 2019-07-02 11:17:24 -0700 | [diff] [blame] | 988 | // |forced_update_pending_callback_| should always be set, but even in the |
| 989 | // case that it is not, we still return true indicating success because the |
| 990 | // scheduled periodic check will pick up these changes. |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 991 | if (forced_update_pending_callback_.get()) { |
Jae Hoon Kim | 2b73ac2 | 2019-07-02 11:17:24 -0700 | [diff] [blame] | 992 | // Always call |ScheduleUpdates()| before forcing an update. This is because |
| 993 | // we need an update to be scheduled for the |
| 994 | // |forced_update_pending_callback_| to have an effect. Here we don't need |
| 995 | // to care about the return value from |ScheduleUpdate()|. |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 996 | ScheduleUpdates(); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 997 | forced_update_pending_callback_->Run(true, interactive); |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 998 | } |
Aaron Wood | 081c023 | 2017-10-19 17:14:58 -0700 | [diff] [blame] | 999 | return true; |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1000 | } |
| 1001 | |
Amin Hassani | 2b68e6b | 2020-04-17 10:49:12 -0700 | [diff] [blame] | 1002 | bool UpdateAttempter::CheckForInstall(const vector<string>& dlc_ids, |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 1003 | const string& omaha_url) { |
Jae Hoon Kim | c437ea5 | 2019-07-11 11:20:38 -0700 | [diff] [blame] | 1004 | if (status_ != UpdateStatus::IDLE) { |
| 1005 | LOG(INFO) << "Refusing to do an install as there is an " |
| 1006 | << (is_install_ ? "install" : "update") |
| 1007 | << " already in progress."; |
| 1008 | return false; |
| 1009 | } |
| 1010 | |
Amin Hassani | 2b68e6b | 2020-04-17 10:49:12 -0700 | [diff] [blame] | 1011 | dlc_ids_ = dlc_ids; |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 1012 | is_install_ = true; |
| 1013 | forced_omaha_url_.clear(); |
| 1014 | |
| 1015 | // Certain conditions must be met to allow setting custom version and update |
| 1016 | // server URLs. However, kScheduledAUTestURLRequest and kAUTestURLRequest are |
| 1017 | // always allowed regardless of device state. |
| 1018 | if (IsAnyUpdateSourceAllowed()) { |
| 1019 | forced_omaha_url_ = omaha_url; |
| 1020 | } |
Jae Hoon Kim | c43f6bb | 2019-07-03 12:56:52 -0700 | [diff] [blame] | 1021 | |
| 1022 | if (omaha_url == kScheduledAUTestURLRequest || |
| 1023 | omaha_url == kAUTestURLRequest) { |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 1024 | forced_omaha_url_ = constants::kOmahaDefaultAUTestURL; |
| 1025 | } |
| 1026 | |
Jae Hoon Kim | 2b73ac2 | 2019-07-02 11:17:24 -0700 | [diff] [blame] | 1027 | // |forced_update_pending_callback_| should always be set, but even in the |
| 1028 | // case that it is not, we still return true indicating success because the |
| 1029 | // scheduled periodic check will pick up these changes. |
| 1030 | if (forced_update_pending_callback_.get()) { |
| 1031 | // Always call |ScheduleUpdates()| before forcing an update. This is because |
| 1032 | // we need an update to be scheduled for the |
| 1033 | // |forced_update_pending_callback_| to have an effect. Here we don't need |
| 1034 | // to care about the return value from |ScheduleUpdate()|. |
| 1035 | ScheduleUpdates(); |
| 1036 | forced_update_pending_callback_->Run(true, true); |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 1037 | } |
| 1038 | return true; |
| 1039 | } |
| 1040 | |
Darin Petkov | 296889c | 2010-07-23 16:20:54 -0700 | [diff] [blame] | 1041 | bool UpdateAttempter::RebootIfNeeded() { |
Amin Hassani | e79eab6 | 2018-03-06 11:55:57 -0800 | [diff] [blame] | 1042 | #ifdef __ANDROID__ |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1043 | if (status_ != UpdateStatus::UPDATED_NEED_REBOOT) { |
Darin Petkov | 296889c | 2010-07-23 16:20:54 -0700 | [diff] [blame] | 1044 | LOG(INFO) << "Reboot requested, but status is " |
| 1045 | << UpdateStatusToString(status_) << ", so not rebooting."; |
| 1046 | return false; |
| 1047 | } |
Amin Hassani | e79eab6 | 2018-03-06 11:55:57 -0800 | [diff] [blame] | 1048 | #endif // __ANDROID__ |
Daniel Erat | 65f1da0 | 2014-06-27 22:05:38 -0700 | [diff] [blame] | 1049 | |
Sen Jiang | b8c6a8f | 2016-06-07 17:33:17 -0700 | [diff] [blame] | 1050 | if (system_state_->power_manager()->RequestReboot()) |
Daniel Erat | 65f1da0 | 2014-06-27 22:05:38 -0700 | [diff] [blame] | 1051 | return true; |
| 1052 | |
| 1053 | return RebootDirectly(); |
Darin Petkov | 296889c | 2010-07-23 16:20:54 -0700 | [diff] [blame] | 1054 | } |
| 1055 | |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 1056 | void UpdateAttempter::WriteUpdateCompletedMarker() { |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 1057 | string boot_id; |
| 1058 | if (!utils::GetBootId(&boot_id)) |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 1059 | return; |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 1060 | prefs_->SetString(kPrefsUpdateCompletedOnBootId, boot_id); |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 1061 | |
| 1062 | int64_t value = system_state_->clock()->GetBootTime().ToInternalValue(); |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 1063 | prefs_->SetInt64(kPrefsUpdateCompletedBootTime, value); |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 1064 | } |
| 1065 | |
Daniel Erat | 65f1da0 | 2014-06-27 22:05:38 -0700 | [diff] [blame] | 1066 | bool UpdateAttempter::RebootDirectly() { |
Amin Hassani | 3a4caa1 | 2019-11-06 11:12:28 -0800 | [diff] [blame] | 1067 | vector<string> command = {"/sbin/shutdown", "-r", "now"}; |
Daniel Erat | 65f1da0 | 2014-06-27 22:05:38 -0700 | [diff] [blame] | 1068 | int rc = 0; |
Amin Hassani | 3a4caa1 | 2019-11-06 11:12:28 -0800 | [diff] [blame] | 1069 | Subprocess::SynchronousExec(command, &rc, nullptr, nullptr); |
Daniel Erat | 65f1da0 | 2014-06-27 22:05:38 -0700 | [diff] [blame] | 1070 | return rc == 0; |
| 1071 | } |
| 1072 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 1073 | void UpdateAttempter::OnUpdateScheduled(EvalStatus status, |
| 1074 | const UpdateCheckParams& params) { |
| 1075 | waiting_for_scheduled_check_ = false; |
| 1076 | |
| 1077 | if (status == EvalStatus::kSucceeded) { |
| 1078 | if (!params.updates_enabled) { |
| 1079 | LOG(WARNING) << "Updates permanently disabled."; |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1080 | // Signal disabled status, then switch right back to idle. This is |
| 1081 | // necessary for ensuring that observers waiting for a signal change will |
| 1082 | // actually notice one on subsequent calls. Note that we don't need to |
| 1083 | // re-schedule a check in this case as updates are permanently disabled; |
| 1084 | // further (forced) checks may still initiate a scheduling call. |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1085 | SetStatusAndNotify(UpdateStatus::DISABLED); |
| 1086 | SetStatusAndNotify(UpdateStatus::IDLE); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 1087 | return; |
| 1088 | } |
| 1089 | |
Amin Hassani | ed37d68 | 2018-04-06 13:22:00 -0700 | [diff] [blame] | 1090 | LOG(INFO) << "Running " << (params.interactive ? "interactive" : "periodic") |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 1091 | << " update."; |
| 1092 | |
Amin Hassani | ed37d68 | 2018-04-06 13:22:00 -0700 | [diff] [blame] | 1093 | if (!params.interactive) { |
Aaron Wood | 081c023 | 2017-10-19 17:14:58 -0700 | [diff] [blame] | 1094 | // Cache the update attempt flags that will be used by this update attempt |
| 1095 | // so that they can't be changed mid-way through. |
| 1096 | current_update_attempt_flags_ = update_attempt_flags_; |
| 1097 | } |
| 1098 | |
Aaron Wood | bf5a252 | 2017-10-04 10:58:36 -0700 | [diff] [blame] | 1099 | LOG(INFO) << "Update attempt flags in use = 0x" << std::hex |
| 1100 | << current_update_attempt_flags_; |
| 1101 | |
Amin Hassani | ed37d68 | 2018-04-06 13:22:00 -0700 | [diff] [blame] | 1102 | Update(forced_app_version_, |
| 1103 | forced_omaha_url_, |
| 1104 | params.target_channel, |
| 1105 | params.target_version_prefix, |
Marton Hunyady | ba51c3f | 2018-04-25 15:18:10 +0200 | [diff] [blame] | 1106 | params.rollback_allowed, |
Zentaro Kavanagh | 28def4f | 2019-01-15 17:15:01 -0800 | [diff] [blame] | 1107 | params.rollback_data_save_requested, |
Zentaro Kavanagh | 0ef9a2f | 2018-07-02 12:05:07 -0700 | [diff] [blame] | 1108 | params.rollback_allowed_milestones, |
Marton Hunyady | ba51c3f | 2018-04-25 15:18:10 +0200 | [diff] [blame] | 1109 | /*obey_proxies=*/false, |
Amin Hassani | ed37d68 | 2018-04-06 13:22:00 -0700 | [diff] [blame] | 1110 | params.interactive); |
Alex Deymo | 7147908 | 2016-03-25 17:54:28 -0700 | [diff] [blame] | 1111 | // Always clear the forced app_version and omaha_url after an update attempt |
| 1112 | // so the next update uses the defaults. |
| 1113 | forced_app_version_.clear(); |
| 1114 | forced_omaha_url_.clear(); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 1115 | } else { |
| 1116 | LOG(WARNING) |
| 1117 | << "Update check scheduling failed (possibly timed out); retrying."; |
| 1118 | ScheduleUpdates(); |
| 1119 | } |
| 1120 | |
| 1121 | // This check ensures that future update checks will be or are already |
| 1122 | // scheduled. The check should never fail. A check failure means that there's |
| 1123 | // a bug that will most likely prevent further automatic update checks. It |
| 1124 | // seems better to crash in such cases and restart the update_engine daemon |
| 1125 | // into, hopefully, a known good state. |
Jae Hoon Kim | ba2fdce | 2019-07-11 13:18:58 -0700 | [diff] [blame] | 1126 | CHECK(IsBusyOrUpdateScheduled()); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 1127 | } |
| 1128 | |
| 1129 | void UpdateAttempter::UpdateLastCheckedTime() { |
| 1130 | last_checked_time_ = system_state_->clock()->GetWallclockTime().ToTimeT(); |
| 1131 | } |
| 1132 | |
Marton Hunyady | e58bddb | 2018-04-10 20:27:26 +0200 | [diff] [blame] | 1133 | void UpdateAttempter::UpdateRollbackHappened() { |
| 1134 | DCHECK(system_state_); |
| 1135 | DCHECK(system_state_->payload_state()); |
| 1136 | DCHECK(policy_provider_); |
| 1137 | if (system_state_->payload_state()->GetRollbackHappened() && |
| 1138 | (policy_provider_->device_policy_is_loaded() || |
| 1139 | policy_provider_->IsConsumerDevice())) { |
| 1140 | // Rollback happened, but we already went through OOBE and policy is |
| 1141 | // present or it's a consumer device. |
| 1142 | system_state_->payload_state()->SetRollbackHappened(false); |
| 1143 | } |
| 1144 | } |
| 1145 | |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1146 | void UpdateAttempter::ProcessingDoneInternal(const ActionProcessor* processor, |
| 1147 | ErrorCode code) { |
Chris Sosa | 4f8ee27 | 2012-11-30 13:01:54 -0800 | [diff] [blame] | 1148 | // Reset cpu shares back to normal. |
Alex Deymo | ab0d976 | 2016-02-02 10:52:56 -0800 | [diff] [blame] | 1149 | cpu_limiter_.StopLimiter(); |
Darin Petkov | c6c135c | 2010-08-11 13:36:18 -0700 | [diff] [blame] | 1150 | |
Amin Hassani | ecb60d3 | 2019-06-17 18:09:10 -0700 | [diff] [blame] | 1151 | ResetInteractivityFlags(); |
Adolfo Victoria | 20262ad | 2018-08-06 10:40:11 -0700 | [diff] [blame] | 1152 | |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1153 | if (status_ == UpdateStatus::REPORTING_ERROR_EVENT) { |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1154 | LOG(INFO) << "Error event sent."; |
Gilad Arnold | 1ebd813 | 2012-03-05 10:19:29 -0800 | [diff] [blame] | 1155 | |
Amin Hassani | ecb60d3 | 2019-06-17 18:09:10 -0700 | [diff] [blame] | 1156 | // Inform scheduler of new status. |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1157 | SetStatusAndNotify(UpdateStatus::IDLE); |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1158 | ScheduleUpdates(); |
Gilad Arnold | 1ebd813 | 2012-03-05 10:19:29 -0800 | [diff] [blame] | 1159 | |
Andrew de los Reyes | c1d5c93 | 2011-04-20 17:15:47 -0700 | [diff] [blame] | 1160 | if (!fake_update_success_) { |
| 1161 | return; |
| 1162 | } |
| 1163 | LOG(INFO) << "Booted from FW B and tried to install new firmware, " |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 1164 | "so requesting reboot from user."; |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1165 | } |
| 1166 | |
Sen Jiang | 89e24c1 | 2018-03-22 18:05:44 -0700 | [diff] [blame] | 1167 | attempt_error_code_ = utils::GetBaseErrorCode(code); |
| 1168 | |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1169 | if (code != ErrorCode::kSuccess) { |
| 1170 | if (ScheduleErrorEventAction()) { |
Colin Howes | ac170d9 | 2018-11-20 16:29:28 -0800 | [diff] [blame] | 1171 | return; |
| 1172 | } |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1173 | LOG(INFO) << "No update."; |
| 1174 | SetStatusAndNotify(UpdateStatus::IDLE); |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1175 | ScheduleUpdates(); |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1176 | return; |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 1177 | } |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1178 | |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1179 | ReportTimeToUpdateAppliedMetric(); |
| 1180 | prefs_->SetInt64(kPrefsDeltaUpdateFailures, 0); |
| 1181 | prefs_->SetString(kPrefsPreviousVersion, |
| 1182 | omaha_request_params_->app_version()); |
| 1183 | DeltaPerformer::ResetUpdateProgress(prefs_, false); |
| 1184 | |
| 1185 | system_state_->payload_state()->UpdateSucceeded(); |
| 1186 | |
| 1187 | // Since we're done with scattering fully at this point, this is the |
| 1188 | // safest point delete the state files, as we're sure that the status is |
| 1189 | // set to reboot (which means no more updates will be applied until reboot) |
| 1190 | // This deletion is required for correctness as we want the next update |
| 1191 | // check to re-create a new random number for the update check count. |
| 1192 | // Similarly, we also delete the wall-clock-wait period that was persisted |
| 1193 | // so that we start with a new random value for the next update check |
| 1194 | // after reboot so that the same device is not favored or punished in any |
| 1195 | // way. |
| 1196 | prefs_->Delete(kPrefsUpdateCheckCount); |
| 1197 | system_state_->payload_state()->SetScatteringWaitPeriod(TimeDelta()); |
| 1198 | system_state_->payload_state()->SetStagingWaitPeriod(TimeDelta()); |
| 1199 | prefs_->Delete(kPrefsUpdateFirstSeenAt); |
| 1200 | |
| 1201 | // Note: below this comment should only be on |ErrorCode::kSuccess|. |
| 1202 | if (is_install_) { |
| 1203 | ProcessingDoneInstall(processor, code); |
| 1204 | } else { |
| 1205 | ProcessingDoneUpdate(processor, code); |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 1206 | } |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1207 | } |
| 1208 | |
Jae Hoon Kim | 7fdfbf1 | 2020-04-10 18:15:50 -0700 | [diff] [blame] | 1209 | vector<string> UpdateAttempter::GetSuccessfulDlcIds() { |
| 1210 | vector<string> dlc_ids; |
| 1211 | for (const auto& pr : omaha_request_params_->dlc_apps_params()) |
| 1212 | if (pr.second.updated) |
| 1213 | dlc_ids.push_back(pr.second.name); |
| 1214 | return dlc_ids; |
| 1215 | } |
| 1216 | |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1217 | void UpdateAttempter::ProcessingDoneInstall(const ActionProcessor* processor, |
| 1218 | ErrorCode code) { |
Jae Hoon Kim | 7fdfbf1 | 2020-04-10 18:15:50 -0700 | [diff] [blame] | 1219 | if (!system_state_->dlcservice()->InstallCompleted(GetSuccessfulDlcIds())) |
| 1220 | LOG(WARNING) << "dlcservice didn't successfully handle install completion."; |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1221 | SetStatusAndNotify(UpdateStatus::IDLE); |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1222 | ScheduleUpdates(); |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1223 | LOG(INFO) << "DLC successfully installed, no reboot needed."; |
| 1224 | } |
| 1225 | |
| 1226 | void UpdateAttempter::ProcessingDoneUpdate(const ActionProcessor* processor, |
| 1227 | ErrorCode code) { |
| 1228 | WriteUpdateCompletedMarker(); |
| 1229 | |
Jae Hoon Kim | 7fdfbf1 | 2020-04-10 18:15:50 -0700 | [diff] [blame] | 1230 | if (!system_state_->dlcservice()->UpdateCompleted(GetSuccessfulDlcIds())) |
| 1231 | LOG(WARNING) << "dlcservice didn't successfully handle update completion."; |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1232 | SetStatusAndNotify(UpdateStatus::UPDATED_NEED_REBOOT); |
| 1233 | ScheduleUpdates(); |
| 1234 | LOG(INFO) << "Update successfully applied, waiting to reboot."; |
| 1235 | |
| 1236 | // |install_plan_| is null during rollback operations, and the stats don't |
| 1237 | // make much sense then anyway. |
| 1238 | if (install_plan_) { |
| 1239 | // Generate an unique payload identifier. |
| 1240 | string target_version_uid; |
| 1241 | for (const auto& payload : install_plan_->payloads) { |
| 1242 | target_version_uid += brillo::data_encoding::Base64Encode(payload.hash) + |
| 1243 | ":" + payload.metadata_signature + ":"; |
| 1244 | } |
| 1245 | |
| 1246 | // If we just downloaded a rollback image, we should preserve this fact |
| 1247 | // over the following powerwash. |
| 1248 | if (install_plan_->is_rollback) { |
| 1249 | system_state_->payload_state()->SetRollbackHappened(true); |
| 1250 | system_state_->metrics_reporter()->ReportEnterpriseRollbackMetrics( |
| 1251 | /*success=*/true, install_plan_->version); |
| 1252 | } |
| 1253 | |
| 1254 | // Expect to reboot into the new version to send the proper metric during |
| 1255 | // next boot. |
| 1256 | system_state_->payload_state()->ExpectRebootInNewVersion( |
| 1257 | target_version_uid); |
| 1258 | } else { |
| 1259 | // If we just finished a rollback, then we expect to have no Omaha |
| 1260 | // response. Otherwise, it's an error. |
| 1261 | if (system_state_->payload_state()->GetRollbackVersion().empty()) { |
| 1262 | LOG(ERROR) << "Can't send metrics because there was no Omaha response"; |
| 1263 | } |
| 1264 | } |
| 1265 | } |
| 1266 | |
| 1267 | // Delegate methods: |
| 1268 | void UpdateAttempter::ProcessingDone(const ActionProcessor* processor, |
| 1269 | ErrorCode code) { |
| 1270 | LOG(INFO) << "Processing Done."; |
| 1271 | ProcessingDoneInternal(processor, code); |
| 1272 | |
| 1273 | // Note: do cleanups here for any variables that need to be reset after a |
| 1274 | // failure, error, update, or install. |
| 1275 | is_install_ = false; |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1276 | } |
| 1277 | |
| 1278 | void UpdateAttempter::ProcessingStopped(const ActionProcessor* processor) { |
Chris Sosa | 4f8ee27 | 2012-11-30 13:01:54 -0800 | [diff] [blame] | 1279 | // Reset cpu shares back to normal. |
Alex Deymo | ab0d976 | 2016-02-02 10:52:56 -0800 | [diff] [blame] | 1280 | cpu_limiter_.StopLimiter(); |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1281 | download_progress_ = 0.0; |
Amin Hassani | ecb60d3 | 2019-06-17 18:09:10 -0700 | [diff] [blame] | 1282 | |
| 1283 | ResetInteractivityFlags(); |
| 1284 | |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1285 | SetStatusAndNotify(UpdateStatus::IDLE); |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1286 | ScheduleUpdates(); |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 1287 | error_event_.reset(nullptr); |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1288 | } |
| 1289 | |
| 1290 | // Called whenever an action has finished processing, either successfully |
| 1291 | // or otherwise. |
| 1292 | void UpdateAttempter::ActionCompleted(ActionProcessor* processor, |
| 1293 | AbstractAction* action, |
David Zeuthen | a99981f | 2013-04-29 13:42:47 -0700 | [diff] [blame] | 1294 | ErrorCode code) { |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 1295 | // Reset download progress regardless of whether or not the download |
| 1296 | // action succeeded. Also, get the response code from HTTP request |
| 1297 | // actions (update download as well as the initial update check |
| 1298 | // actions). |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1299 | const string type = action->Type(); |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 1300 | if (type == DownloadAction::StaticType()) { |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1301 | download_progress_ = 0.0; |
Gilad Arnold | cf175a0 | 2014-07-10 16:48:47 -0700 | [diff] [blame] | 1302 | DownloadAction* download_action = static_cast<DownloadAction*>(action); |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 1303 | http_response_code_ = download_action->GetHTTPResponseCode(); |
| 1304 | } else if (type == OmahaRequestAction::StaticType()) { |
| 1305 | OmahaRequestAction* omaha_request_action = |
Gilad Arnold | cf175a0 | 2014-07-10 16:48:47 -0700 | [diff] [blame] | 1306 | static_cast<OmahaRequestAction*>(action); |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 1307 | // If the request is not an event, then it's the update-check. |
| 1308 | if (!omaha_request_action->IsEvent()) { |
| 1309 | http_response_code_ = omaha_request_action->GetHTTPResponseCode(); |
Gilad Arnold | a6dab94 | 2014-04-25 11:46:03 -0700 | [diff] [blame] | 1310 | |
| 1311 | // Record the number of consecutive failed update checks. |
| 1312 | if (http_response_code_ == kHttpResponseInternalServerError || |
| 1313 | http_response_code_ == kHttpResponseServiceUnavailable) { |
| 1314 | consecutive_failed_update_checks_++; |
| 1315 | } else { |
| 1316 | consecutive_failed_update_checks_ = 0; |
| 1317 | } |
| 1318 | |
Weidong Guo | 421ff33 | 2017-04-17 10:08:38 -0700 | [diff] [blame] | 1319 | const OmahaResponse& omaha_response = |
| 1320 | omaha_request_action->GetOutputObject(); |
Gilad Arnold | a0258a5 | 2014-07-10 16:21:19 -0700 | [diff] [blame] | 1321 | // Store the server-dictated poll interval, if any. |
| 1322 | server_dictated_poll_interval_ = |
Weidong Guo | 421ff33 | 2017-04-17 10:08:38 -0700 | [diff] [blame] | 1323 | std::max(0, omaha_response.poll_interval); |
| 1324 | |
| 1325 | // This update is ignored by omaha request action because update over |
| 1326 | // cellular connection is not allowed. Needs to ask for user's permissions |
| 1327 | // to update. |
| 1328 | if (code == ErrorCode::kOmahaUpdateIgnoredOverCellular) { |
| 1329 | new_version_ = omaha_response.version; |
| 1330 | new_payload_size_ = 0; |
| 1331 | for (const auto& package : omaha_response.packages) { |
| 1332 | new_payload_size_ += package.size; |
| 1333 | } |
| 1334 | SetStatusAndNotify(UpdateStatus::NEED_PERMISSION_TO_UPDATE); |
| 1335 | } |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 1336 | } |
Aaron Wood | 23bd339 | 2017-10-06 14:48:25 -0700 | [diff] [blame] | 1337 | } else if (type == OmahaResponseHandlerAction::StaticType()) { |
| 1338 | // Depending on the returned error code, note that an update is available. |
| 1339 | if (code == ErrorCode::kOmahaUpdateDeferredPerPolicy || |
| 1340 | code == ErrorCode::kSuccess) { |
| 1341 | // Note that the status will be updated to DOWNLOADING when some bytes |
| 1342 | // get actually downloaded from the server and the BytesReceived |
| 1343 | // callback is invoked. This avoids notifying the user that a download |
| 1344 | // has started in cases when the server and the client are unable to |
| 1345 | // initiate the download. |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1346 | auto omaha_response_handler_action = |
| 1347 | static_cast<OmahaResponseHandlerAction*>(action); |
| 1348 | install_plan_.reset( |
| 1349 | new InstallPlan(omaha_response_handler_action->install_plan())); |
Aaron Wood | 23bd339 | 2017-10-06 14:48:25 -0700 | [diff] [blame] | 1350 | UpdateLastCheckedTime(); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1351 | new_version_ = install_plan_->version; |
Aaron Wood | 23bd339 | 2017-10-06 14:48:25 -0700 | [diff] [blame] | 1352 | new_payload_size_ = 0; |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1353 | for (const auto& payload : install_plan_->payloads) |
Aaron Wood | 23bd339 | 2017-10-06 14:48:25 -0700 | [diff] [blame] | 1354 | new_payload_size_ += payload.size; |
| 1355 | cpu_limiter_.StartLimiter(); |
| 1356 | SetStatusAndNotify(UpdateStatus::UPDATE_AVAILABLE); |
| 1357 | } |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 1358 | } |
Aaron Wood | 23bd339 | 2017-10-06 14:48:25 -0700 | [diff] [blame] | 1359 | // General failure cases. |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1360 | if (code != ErrorCode::kSuccess) { |
Darin Petkov | 7ed561b | 2011-10-04 02:59:03 -0700 | [diff] [blame] | 1361 | // If the current state is at or past the download phase, count the failure |
| 1362 | // in case a switch to full update becomes necessary. Ignore network |
| 1363 | // transfer timeouts and failures. |
Amin Hassani | 89a3712 | 2018-03-23 12:59:24 -0700 | [diff] [blame] | 1364 | if (code != ErrorCode::kDownloadTransferError) { |
| 1365 | switch (status_) { |
| 1366 | case UpdateStatus::IDLE: |
| 1367 | case UpdateStatus::CHECKING_FOR_UPDATE: |
| 1368 | case UpdateStatus::UPDATE_AVAILABLE: |
| 1369 | case UpdateStatus::NEED_PERMISSION_TO_UPDATE: |
| 1370 | break; |
| 1371 | case UpdateStatus::DOWNLOADING: |
| 1372 | case UpdateStatus::VERIFYING: |
| 1373 | case UpdateStatus::FINALIZING: |
| 1374 | case UpdateStatus::UPDATED_NEED_REBOOT: |
| 1375 | case UpdateStatus::REPORTING_ERROR_EVENT: |
| 1376 | case UpdateStatus::ATTEMPTING_ROLLBACK: |
| 1377 | case UpdateStatus::DISABLED: |
| 1378 | MarkDeltaUpdateFailure(); |
| 1379 | break; |
| 1380 | } |
Darin Petkov | 3627577 | 2010-10-01 11:40:57 -0700 | [diff] [blame] | 1381 | } |
Sen Jiang | 89e24c1 | 2018-03-22 18:05:44 -0700 | [diff] [blame] | 1382 | if (code != ErrorCode::kNoUpdate) { |
| 1383 | // On failure, schedule an error event to be sent to Omaha. |
| 1384 | CreatePendingErrorEvent(action, code); |
| 1385 | } |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1386 | return; |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1387 | } |
Aaron Wood | 23bd339 | 2017-10-06 14:48:25 -0700 | [diff] [blame] | 1388 | // Find out which action completed (successfully). |
| 1389 | if (type == DownloadAction::StaticType()) { |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1390 | SetStatusAndNotify(UpdateStatus::FINALIZING); |
Amin Hassani | afd8cea | 2017-12-04 14:20:00 -0800 | [diff] [blame] | 1391 | } else if (type == FilesystemVerifierAction::StaticType()) { |
| 1392 | // Log the system properties before the postinst and after the file system |
| 1393 | // is verified. It used to be done in the postinst itself. But postinst |
| 1394 | // cannot do this anymore. On the other hand, these logs are frequently |
| 1395 | // looked at and it is preferable not to scatter them in random location in |
| 1396 | // the log and rather log it right before the postinst. The reason not do |
| 1397 | // this in the |PostinstallRunnerAction| is to prevent dependency from |
| 1398 | // libpayload_consumer to libupdate_engine. |
| 1399 | LogImageProperties(); |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1400 | } |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 1401 | } |
| 1402 | |
Alex Deymo | 542c19b | 2015-12-03 07:43:31 -0300 | [diff] [blame] | 1403 | void UpdateAttempter::BytesReceived(uint64_t bytes_progressed, |
| 1404 | uint64_t bytes_received, |
| 1405 | uint64_t total) { |
| 1406 | // The PayloadState keeps track of how many bytes were actually downloaded |
| 1407 | // from a given URL for the URL skipping logic. |
| 1408 | system_state_->payload_state()->DownloadProgress(bytes_progressed); |
| 1409 | |
Alex Deymo | 0d29854 | 2016-03-30 18:31:49 -0700 | [diff] [blame] | 1410 | double progress = 0; |
| 1411 | if (total) |
| 1412 | progress = static_cast<double>(bytes_received) / static_cast<double>(total); |
| 1413 | if (status_ != UpdateStatus::DOWNLOADING || bytes_received == total) { |
Darin Petkov | af18305 | 2010-08-23 12:07:13 -0700 | [diff] [blame] | 1414 | download_progress_ = progress; |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1415 | SetStatusAndNotify(UpdateStatus::DOWNLOADING); |
Alex Deymo | 0d29854 | 2016-03-30 18:31:49 -0700 | [diff] [blame] | 1416 | } else { |
| 1417 | ProgressUpdate(progress); |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1418 | } |
| 1419 | } |
| 1420 | |
Alex Deymo | 542c19b | 2015-12-03 07:43:31 -0300 | [diff] [blame] | 1421 | void UpdateAttempter::DownloadComplete() { |
| 1422 | system_state_->payload_state()->DownloadComplete(); |
| 1423 | } |
| 1424 | |
Alex Deymo | 0d29854 | 2016-03-30 18:31:49 -0700 | [diff] [blame] | 1425 | void UpdateAttempter::ProgressUpdate(double progress) { |
| 1426 | // Self throttle based on progress. Also send notifications if progress is |
| 1427 | // too slow. |
| 1428 | if (progress == 1.0 || |
| 1429 | progress - download_progress_ >= kBroadcastThresholdProgress || |
| 1430 | TimeTicks::Now() - last_notify_time_ >= |
| 1431 | TimeDelta::FromSeconds(kBroadcastThresholdSeconds)) { |
| 1432 | download_progress_ = progress; |
| 1433 | BroadcastStatus(); |
| 1434 | } |
| 1435 | } |
| 1436 | |
Amin Hassani | ecb60d3 | 2019-06-17 18:09:10 -0700 | [diff] [blame] | 1437 | void UpdateAttempter::ResetInteractivityFlags() { |
| 1438 | // Reset the state that's only valid for a single update pass. |
| 1439 | current_update_attempt_flags_ = UpdateAttemptFlags::kNone; |
| 1440 | |
| 1441 | if (forced_update_pending_callback_.get()) |
| 1442 | // Clear prior interactive requests once the processor is done. |
| 1443 | forced_update_pending_callback_->Run(false, false); |
| 1444 | } |
| 1445 | |
Jay Srinivasan | c1ba09a | 2012-08-14 14:15:57 -0700 | [diff] [blame] | 1446 | bool UpdateAttempter::ResetStatus() { |
| 1447 | LOG(INFO) << "Attempting to reset state from " |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1448 | << UpdateStatusToString(status_) << " to UpdateStatus::IDLE"; |
Jay Srinivasan | c1ba09a | 2012-08-14 14:15:57 -0700 | [diff] [blame] | 1449 | |
| 1450 | switch (status_) { |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1451 | case UpdateStatus::IDLE: |
Jay Srinivasan | c1ba09a | 2012-08-14 14:15:57 -0700 | [diff] [blame] | 1452 | // no-op. |
| 1453 | return true; |
| 1454 | |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 1455 | case UpdateStatus::UPDATED_NEED_REBOOT: { |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1456 | bool ret_value = true; |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1457 | status_ = UpdateStatus::IDLE; |
Jay Srinivasan | c1ba09a | 2012-08-14 14:15:57 -0700 | [diff] [blame] | 1458 | |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1459 | // Remove the reboot marker so that if the machine is rebooted |
Jay Srinivasan | c1ba09a | 2012-08-14 14:15:57 -0700 | [diff] [blame] | 1460 | // after resetting to idle state, it doesn't go back to |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1461 | // UpdateStatus::UPDATED_NEED_REBOOT state. |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 1462 | ret_value = prefs_->Delete(kPrefsUpdateCompletedOnBootId) && ret_value; |
| 1463 | ret_value = prefs_->Delete(kPrefsUpdateCompletedBootTime) && ret_value; |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1464 | |
Alex Deymo | 9870c0e | 2015-09-23 13:58:31 -0700 | [diff] [blame] | 1465 | // Update the boot flags so the current slot has higher priority. |
| 1466 | BootControlInterface* boot_control = system_state_->boot_control(); |
| 1467 | if (!boot_control->SetActiveBootSlot(boot_control->GetCurrentSlot())) |
| 1468 | ret_value = false; |
| 1469 | |
Alex Deymo | 5259033 | 2016-11-29 18:29:13 -0800 | [diff] [blame] | 1470 | // Mark the current slot as successful again, since marking it as active |
| 1471 | // may reset the successful bit. We ignore the result of whether marking |
| 1472 | // the current slot as successful worked. |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 1473 | if (!boot_control->MarkBootSuccessfulAsync(Bind([](bool successful) {}))) |
Alex Deymo | 5259033 | 2016-11-29 18:29:13 -0800 | [diff] [blame] | 1474 | ret_value = false; |
| 1475 | |
Alex Deymo | 4243291 | 2013-07-12 20:21:15 -0700 | [diff] [blame] | 1476 | // Notify the PayloadState that the successful payload was canceled. |
| 1477 | system_state_->payload_state()->ResetUpdateStatus(); |
| 1478 | |
Alex Deymo | 87c0886 | 2015-10-30 21:56:55 -0700 | [diff] [blame] | 1479 | // The previous version is used to report back to omaha after reboot that |
| 1480 | // we actually rebooted into the new version from this "prev-version". We |
| 1481 | // need to clear out this value now to prevent it being sent on the next |
| 1482 | // updatecheck request. |
| 1483 | ret_value = prefs_->SetString(kPrefsPreviousVersion, "") && ret_value; |
| 1484 | |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 1485 | LOG(INFO) << "Reset status " << (ret_value ? "successful" : "failed"); |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1486 | return ret_value; |
Jay Srinivasan | c1ba09a | 2012-08-14 14:15:57 -0700 | [diff] [blame] | 1487 | } |
| 1488 | |
| 1489 | default: |
| 1490 | LOG(ERROR) << "Reset not allowed in this state."; |
| 1491 | return false; |
| 1492 | } |
| 1493 | } |
| 1494 | |
Aaron Wood | 7f92e2b | 2017-08-28 14:51:21 -0700 | [diff] [blame] | 1495 | bool UpdateAttempter::GetStatus(UpdateEngineStatus* out_status) { |
Aaron Wood | 795c5b4 | 2017-12-05 16:06:13 -0800 | [diff] [blame] | 1496 | out_status->last_checked_time = last_checked_time_; |
Aaron Wood | 7f92e2b | 2017-08-28 14:51:21 -0700 | [diff] [blame] | 1497 | out_status->status = status_; |
| 1498 | out_status->current_version = omaha_request_params_->app_version(); |
Aaron Wood | 7f92e2b | 2017-08-28 14:51:21 -0700 | [diff] [blame] | 1499 | out_status->progress = download_progress_; |
| 1500 | out_status->new_size_bytes = new_payload_size_; |
| 1501 | out_status->new_version = new_version_; |
Amin Hassani | 9be122e | 2019-08-29 09:20:12 -0700 | [diff] [blame] | 1502 | out_status->is_enterprise_rollback = |
| 1503 | install_plan_ && install_plan_->is_rollback; |
Jae Hoon Kim | 2f78c1c | 2019-07-25 13:20:43 -0700 | [diff] [blame] | 1504 | out_status->is_install = is_install_; |
Jae Hoon Kim | 051627a | 2019-09-03 12:56:32 -0700 | [diff] [blame] | 1505 | |
| 1506 | string str_eol_date; |
| 1507 | system_state_->prefs()->GetString(kPrefsOmahaEolDate, &str_eol_date); |
| 1508 | out_status->eol_date = StringToEolDate(str_eol_date); |
| 1509 | |
Miriam Polzer | 0cf1acb | 2020-04-29 17:39:51 +0200 | [diff] [blame^] | 1510 | // A powerwash will take place either if the install plan says it is required |
| 1511 | // or if an enterprise rollback is happening. |
| 1512 | out_status->will_powerwash_after_reboot = |
| 1513 | install_plan_ && |
| 1514 | (install_plan_->powerwash_required || install_plan_->is_rollback); |
| 1515 | |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 1516 | return true; |
| 1517 | } |
| 1518 | |
Darin Petkov | 61635a9 | 2011-05-18 16:20:36 -0700 | [diff] [blame] | 1519 | void UpdateAttempter::BroadcastStatus() { |
Aaron Wood | 7f92e2b | 2017-08-28 14:51:21 -0700 | [diff] [blame] | 1520 | UpdateEngineStatus broadcast_status; |
| 1521 | // Use common method for generating the current status. |
| 1522 | GetStatus(&broadcast_status); |
| 1523 | |
Alex Deymo | fa78f14 | 2016-01-26 21:36:16 -0800 | [diff] [blame] | 1524 | for (const auto& observer : service_observers_) { |
Aaron Wood | 7f92e2b | 2017-08-28 14:51:21 -0700 | [diff] [blame] | 1525 | observer->SendStatusUpdate(broadcast_status); |
Alex Deymo | fa78f14 | 2016-01-26 21:36:16 -0800 | [diff] [blame] | 1526 | } |
Darin Petkov | af18305 | 2010-08-23 12:07:13 -0700 | [diff] [blame] | 1527 | last_notify_time_ = TimeTicks::Now(); |
Alex Deymo | fa78f14 | 2016-01-26 21:36:16 -0800 | [diff] [blame] | 1528 | } |
| 1529 | |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 1530 | uint32_t UpdateAttempter::GetErrorCodeFlags() { |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1531 | uint32_t flags = 0; |
| 1532 | |
J. Richard Barnette | 056b0ab | 2013-10-29 15:24:56 -0700 | [diff] [blame] | 1533 | if (!system_state_->hardware()->IsNormalBootMode()) |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1534 | flags |= static_cast<uint32_t>(ErrorCode::kDevModeFlag); |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1535 | |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1536 | if (install_plan_ && install_plan_->is_resume) |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1537 | flags |= static_cast<uint32_t>(ErrorCode::kResumedFlag); |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1538 | |
J. Richard Barnette | 056b0ab | 2013-10-29 15:24:56 -0700 | [diff] [blame] | 1539 | if (!system_state_->hardware()->IsOfficialBuild()) |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1540 | flags |= static_cast<uint32_t>(ErrorCode::kTestImageFlag); |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1541 | |
Sen Jiang | daeaa43 | 2018-10-09 18:18:45 -0700 | [diff] [blame] | 1542 | if (!omaha_request_params_->IsUpdateUrlOfficial()) { |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1543 | flags |= static_cast<uint32_t>(ErrorCode::kTestOmahaUrlFlag); |
Alex Deymo | ac41a82 | 2015-09-15 20:52:53 -0700 | [diff] [blame] | 1544 | } |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1545 | |
| 1546 | return flags; |
| 1547 | } |
| 1548 | |
David Zeuthen | a99981f | 2013-04-29 13:42:47 -0700 | [diff] [blame] | 1549 | bool UpdateAttempter::ShouldCancel(ErrorCode* cancel_reason) { |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1550 | // Check if the channel we're attempting to update to is the same as the |
| 1551 | // target channel currently chosen by the user. |
| 1552 | OmahaRequestParams* params = system_state_->request_params(); |
| 1553 | if (params->download_channel() != params->target_channel()) { |
| 1554 | LOG(ERROR) << "Aborting download as target channel: " |
| 1555 | << params->target_channel() |
| 1556 | << " is different from the download channel: " |
| 1557 | << params->download_channel(); |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1558 | *cancel_reason = ErrorCode::kUpdateCanceledByChannelChange; |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1559 | return true; |
| 1560 | } |
| 1561 | |
| 1562 | return false; |
| 1563 | } |
| 1564 | |
Nam T. Nguyen | 7d623eb | 2014-05-13 16:06:28 -0700 | [diff] [blame] | 1565 | void UpdateAttempter::SetStatusAndNotify(UpdateStatus status) { |
Darin Petkov | 61635a9 | 2011-05-18 16:20:36 -0700 | [diff] [blame] | 1566 | status_ = status; |
Darin Petkov | 61635a9 | 2011-05-18 16:20:36 -0700 | [diff] [blame] | 1567 | BroadcastStatus(); |
| 1568 | } |
| 1569 | |
Darin Petkov | 777dbfa | 2010-07-20 15:03:37 -0700 | [diff] [blame] | 1570 | void UpdateAttempter::CreatePendingErrorEvent(AbstractAction* action, |
David Zeuthen | a99981f | 2013-04-29 13:42:47 -0700 | [diff] [blame] | 1571 | ErrorCode code) { |
Sen Jiang | 89e24c1 | 2018-03-22 18:05:44 -0700 | [diff] [blame] | 1572 | if (error_event_.get() || status_ == UpdateStatus::REPORTING_ERROR_EVENT) { |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1573 | // This shouldn't really happen. |
| 1574 | LOG(WARNING) << "There's already an existing pending error event."; |
| 1575 | return; |
| 1576 | } |
Darin Petkov | 777dbfa | 2010-07-20 15:03:37 -0700 | [diff] [blame] | 1577 | |
Jay Srinivasan | 56d5aa4 | 2012-03-26 14:27:59 -0700 | [diff] [blame] | 1578 | // Classify the code to generate the appropriate result so that |
| 1579 | // the Borgmon charts show up the results correctly. |
| 1580 | // Do this before calling GetErrorCodeForAction which could potentially |
| 1581 | // augment the bit representation of code and thus cause no matches for |
| 1582 | // the switch cases below. |
| 1583 | OmahaEvent::Result event_result; |
| 1584 | switch (code) { |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1585 | case ErrorCode::kOmahaUpdateIgnoredPerPolicy: |
| 1586 | case ErrorCode::kOmahaUpdateDeferredPerPolicy: |
| 1587 | case ErrorCode::kOmahaUpdateDeferredForBackoff: |
Jay Srinivasan | 56d5aa4 | 2012-03-26 14:27:59 -0700 | [diff] [blame] | 1588 | event_result = OmahaEvent::kResultUpdateDeferred; |
| 1589 | break; |
| 1590 | default: |
| 1591 | event_result = OmahaEvent::kResultError; |
| 1592 | break; |
| 1593 | } |
| 1594 | |
Darin Petkov | 777dbfa | 2010-07-20 15:03:37 -0700 | [diff] [blame] | 1595 | code = GetErrorCodeForAction(action, code); |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1596 | fake_update_success_ = code == ErrorCode::kPostinstallBootedFromFirmwareB; |
Darin Petkov | 18c7bce | 2011-06-16 14:07:00 -0700 | [diff] [blame] | 1597 | |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1598 | // Compute the final error code with all the bit flags to be sent to Omaha. |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 1599 | code = |
| 1600 | static_cast<ErrorCode>(static_cast<uint32_t>(code) | GetErrorCodeFlags()); |
| 1601 | error_event_.reset( |
| 1602 | new OmahaEvent(OmahaEvent::kTypeUpdateComplete, event_result, code)); |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1603 | } |
| 1604 | |
| 1605 | bool UpdateAttempter::ScheduleErrorEventAction() { |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 1606 | if (error_event_.get() == nullptr) |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1607 | return false; |
| 1608 | |
Jay Srinivasan | 6f6ea00 | 2012-12-14 11:26:28 -0800 | [diff] [blame] | 1609 | LOG(ERROR) << "Update failed."; |
| 1610 | system_state_->payload_state()->UpdateFailed(error_event_->error_code); |
| 1611 | |
Marton Hunyady | a030268 | 2018-05-16 18:52:13 +0200 | [diff] [blame] | 1612 | // Send metrics if it was a rollback. |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1613 | if (install_plan_ && install_plan_->is_rollback) { |
| 1614 | system_state_->metrics_reporter()->ReportEnterpriseRollbackMetrics( |
| 1615 | /*success=*/false, install_plan_->version); |
Marton Hunyady | a030268 | 2018-05-16 18:52:13 +0200 | [diff] [blame] | 1616 | } |
| 1617 | |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1618 | // Send it to Omaha. |
Alex Deymo | af9a863 | 2015-09-23 18:51:48 -0700 | [diff] [blame] | 1619 | LOG(INFO) << "Reporting the error event"; |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1620 | auto error_event_action = std::make_unique<OmahaRequestAction>( |
| 1621 | system_state_, |
| 1622 | error_event_.release(), // Pass ownership. |
| 1623 | std::make_unique<LibcurlHttpFetcher>(GetProxyResolver(), |
| 1624 | system_state_->hardware()), |
Jae Hoon Kim | edb6550 | 2019-06-14 11:52:17 -0700 | [diff] [blame] | 1625 | false, |
| 1626 | session_id_); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1627 | processor_->EnqueueAction(std::move(error_event_action)); |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1628 | SetStatusAndNotify(UpdateStatus::REPORTING_ERROR_EVENT); |
Darin Petkov | f42cc1c | 2010-09-01 09:03:02 -0700 | [diff] [blame] | 1629 | processor_->StartProcessing(); |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1630 | return true; |
| 1631 | } |
| 1632 | |
Darin Petkov | 58dd134 | 2011-05-06 12:05:13 -0700 | [diff] [blame] | 1633 | void UpdateAttempter::ScheduleProcessingStart() { |
| 1634 | LOG(INFO) << "Scheduling an action processor start."; |
Alex Deymo | 60ca1a7 | 2015-06-18 18:19:15 -0700 | [diff] [blame] | 1635 | MessageLoop::current()->PostTask( |
| 1636 | FROM_HERE, |
Luis Hector Chavez | f1cf348 | 2016-07-19 14:29:19 -0700 | [diff] [blame] | 1637 | Bind([](ActionProcessor* processor) { processor->StartProcessing(); }, |
| 1638 | base::Unretained(processor_.get()))); |
Darin Petkov | 58dd134 | 2011-05-06 12:05:13 -0700 | [diff] [blame] | 1639 | } |
| 1640 | |
Darin Petkov | 3627577 | 2010-10-01 11:40:57 -0700 | [diff] [blame] | 1641 | void UpdateAttempter::DisableDeltaUpdateIfNeeded() { |
| 1642 | int64_t delta_failures; |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 1643 | if (omaha_request_params_->delta_okay() && |
Darin Petkov | 3627577 | 2010-10-01 11:40:57 -0700 | [diff] [blame] | 1644 | prefs_->GetInt64(kPrefsDeltaUpdateFailures, &delta_failures) && |
| 1645 | delta_failures >= kMaxDeltaUpdateFailures) { |
| 1646 | LOG(WARNING) << "Too many delta update failures, forcing full update."; |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 1647 | omaha_request_params_->set_delta_okay(false); |
Darin Petkov | 3627577 | 2010-10-01 11:40:57 -0700 | [diff] [blame] | 1648 | } |
| 1649 | } |
| 1650 | |
| 1651 | void UpdateAttempter::MarkDeltaUpdateFailure() { |
Darin Petkov | 2dd0109 | 2010-10-08 15:43:05 -0700 | [diff] [blame] | 1652 | // Don't try to resume a failed delta update. |
| 1653 | DeltaPerformer::ResetUpdateProgress(prefs_, false); |
Darin Petkov | 3627577 | 2010-10-01 11:40:57 -0700 | [diff] [blame] | 1654 | int64_t delta_failures; |
| 1655 | if (!prefs_->GetInt64(kPrefsDeltaUpdateFailures, &delta_failures) || |
| 1656 | delta_failures < 0) { |
| 1657 | delta_failures = 0; |
| 1658 | } |
| 1659 | prefs_->SetInt64(kPrefsDeltaUpdateFailures, ++delta_failures); |
| 1660 | } |
| 1661 | |
Thieu Le | 116fda3 | 2011-04-19 11:01:54 -0700 | [diff] [blame] | 1662 | void UpdateAttempter::PingOmaha() { |
Thieu Le | d88a857 | 2011-05-26 09:09:19 -0700 | [diff] [blame] | 1663 | if (!processor_->IsRunning()) { |
Amin Hassani | ecb60d3 | 2019-06-17 18:09:10 -0700 | [diff] [blame] | 1664 | ResetInteractivityFlags(); |
| 1665 | |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1666 | auto ping_action = std::make_unique<OmahaRequestAction>( |
Alex Deymo | c1c17b4 | 2015-11-23 03:53:15 -0300 | [diff] [blame] | 1667 | system_state_, |
| 1668 | nullptr, |
Ben Chan | ab5a0af | 2017-10-12 14:57:50 -0700 | [diff] [blame] | 1669 | std::make_unique<LibcurlHttpFetcher>(GetProxyResolver(), |
Ben Chan | 5c02c13 | 2017-06-27 07:10:36 -0700 | [diff] [blame] | 1670 | system_state_->hardware()), |
Jae Hoon Kim | edb6550 | 2019-06-14 11:52:17 -0700 | [diff] [blame] | 1671 | true, |
| 1672 | "" /* session_id */); |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 1673 | processor_->set_delegate(nullptr); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1674 | processor_->EnqueueAction(std::move(ping_action)); |
Thieu Le | d88a857 | 2011-05-26 09:09:19 -0700 | [diff] [blame] | 1675 | // Call StartProcessing() synchronously here to avoid any race conditions |
| 1676 | // caused by multiple outstanding ping Omaha requests. If we call |
| 1677 | // StartProcessing() asynchronously, the device can be suspended before we |
| 1678 | // get a chance to callback to StartProcessing(). When the device resumes |
| 1679 | // (assuming the device sleeps longer than the next update check period), |
| 1680 | // StartProcessing() is called back and at the same time, the next update |
| 1681 | // check is fired which eventually invokes StartProcessing(). A crash |
| 1682 | // can occur because StartProcessing() checks to make sure that the |
| 1683 | // processor is idle which it isn't due to the two concurrent ping Omaha |
| 1684 | // requests. |
| 1685 | processor_->StartProcessing(); |
| 1686 | } else { |
Darin Petkov | 58dd134 | 2011-05-06 12:05:13 -0700 | [diff] [blame] | 1687 | LOG(WARNING) << "Action processor running, Omaha ping suppressed."; |
Darin Petkov | 58dd134 | 2011-05-06 12:05:13 -0700 | [diff] [blame] | 1688 | } |
Thieu Le | d88a857 | 2011-05-26 09:09:19 -0700 | [diff] [blame] | 1689 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 1690 | // Update the last check time here; it may be re-updated when an Omaha |
| 1691 | // response is received, but this will prevent us from repeatedly scheduling |
| 1692 | // checks in the case where a response is not received. |
| 1693 | UpdateLastCheckedTime(); |
| 1694 | |
Thieu Le | d88a857 | 2011-05-26 09:09:19 -0700 | [diff] [blame] | 1695 | // Update the status which will schedule the next update check |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1696 | SetStatusAndNotify(UpdateStatus::UPDATED_NEED_REBOOT); |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1697 | ScheduleUpdates(); |
Thieu Le | 116fda3 | 2011-04-19 11:01:54 -0700 | [diff] [blame] | 1698 | } |
| 1699 | |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 1700 | bool UpdateAttempter::DecrementUpdateCheckCount() { |
Ben Chan | 9abb763 | 2014-08-07 00:10:53 -0700 | [diff] [blame] | 1701 | int64_t update_check_count_value; |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 1702 | |
| 1703 | if (!prefs_->Exists(kPrefsUpdateCheckCount)) { |
| 1704 | // This file does not exist. This means we haven't started our update |
| 1705 | // check count down yet, so nothing more to do. This file will be created |
| 1706 | // later when we first satisfy the wall-clock-based-wait period. |
| 1707 | LOG(INFO) << "No existing update check count. That's normal."; |
| 1708 | return true; |
| 1709 | } |
| 1710 | |
| 1711 | if (prefs_->GetInt64(kPrefsUpdateCheckCount, &update_check_count_value)) { |
| 1712 | // Only if we're able to read a proper integer value, then go ahead |
| 1713 | // and decrement and write back the result in the same file, if needed. |
| 1714 | LOG(INFO) << "Update check count = " << update_check_count_value; |
| 1715 | |
| 1716 | if (update_check_count_value == 0) { |
| 1717 | // It could be 0, if, for some reason, the file didn't get deleted |
| 1718 | // when we set our status to waiting for reboot. so we just leave it |
| 1719 | // as is so that we can prevent another update_check wait for this client. |
| 1720 | LOG(INFO) << "Not decrementing update check count as it's already 0."; |
| 1721 | return true; |
| 1722 | } |
| 1723 | |
| 1724 | if (update_check_count_value > 0) |
| 1725 | update_check_count_value--; |
| 1726 | else |
| 1727 | update_check_count_value = 0; |
| 1728 | |
| 1729 | // Write out the new value of update_check_count_value. |
| 1730 | if (prefs_->SetInt64(kPrefsUpdateCheckCount, update_check_count_value)) { |
Sen Jiang | 771f648 | 2018-04-04 17:59:10 -0700 | [diff] [blame] | 1731 | // We successfully wrote out the new value, so enable the |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 1732 | // update check based wait. |
| 1733 | LOG(INFO) << "New update check count = " << update_check_count_value; |
| 1734 | return true; |
| 1735 | } |
| 1736 | } |
| 1737 | |
| 1738 | LOG(INFO) << "Deleting update check count state due to read/write errors."; |
| 1739 | |
| 1740 | // We cannot read/write to the file, so disable the update check based wait |
| 1741 | // so that we don't get stuck in this OS version by any chance (which could |
| 1742 | // happen if there's some bug that causes to read/write incorrectly). |
| 1743 | // Also attempt to delete the file to do our best effort to cleanup. |
| 1744 | prefs_->Delete(kPrefsUpdateCheckCount); |
| 1745 | return false; |
| 1746 | } |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 1747 | |
David Zeuthen | e4c58bf | 2013-06-18 17:26:50 -0700 | [diff] [blame] | 1748 | void UpdateAttempter::UpdateEngineStarted() { |
Alex Vakulenko | dea2eac | 2014-03-14 15:56:59 -0700 | [diff] [blame] | 1749 | // If we just booted into a new update, keep the previous OS version |
| 1750 | // in case we rebooted because of a crash of the old version, so we |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 1751 | // can do a proper crash report with correct information. |
Alex Vakulenko | dea2eac | 2014-03-14 15:56:59 -0700 | [diff] [blame] | 1752 | // This must be done before calling |
| 1753 | // system_state_->payload_state()->UpdateEngineStarted() since it will |
| 1754 | // delete SystemUpdated marker file. |
| 1755 | if (system_state_->system_rebooted() && |
| 1756 | prefs_->Exists(kPrefsSystemUpdatedMarker)) { |
| 1757 | if (!prefs_->GetString(kPrefsPreviousVersion, &prev_version_)) { |
| 1758 | // If we fail to get the version string, make sure it stays empty. |
| 1759 | prev_version_.clear(); |
| 1760 | } |
| 1761 | } |
| 1762 | |
David Zeuthen | e4c58bf | 2013-06-18 17:26:50 -0700 | [diff] [blame] | 1763 | system_state_->payload_state()->UpdateEngineStarted(); |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 1764 | StartP2PAtStartup(); |
| 1765 | } |
| 1766 | |
| 1767 | bool UpdateAttempter::StartP2PAtStartup() { |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 1768 | if (system_state_ == nullptr || |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 1769 | !system_state_->p2p_manager()->IsP2PEnabled()) { |
| 1770 | LOG(INFO) << "Not starting p2p at startup since it's not enabled."; |
| 1771 | return false; |
| 1772 | } |
| 1773 | |
| 1774 | if (system_state_->p2p_manager()->CountSharedFiles() < 1) { |
| 1775 | LOG(INFO) << "Not starting p2p at startup since our application " |
| 1776 | << "is not sharing any files."; |
| 1777 | return false; |
| 1778 | } |
| 1779 | |
| 1780 | return StartP2PAndPerformHousekeeping(); |
| 1781 | } |
| 1782 | |
| 1783 | bool UpdateAttempter::StartP2PAndPerformHousekeeping() { |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 1784 | if (system_state_ == nullptr) |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 1785 | return false; |
| 1786 | |
| 1787 | if (!system_state_->p2p_manager()->IsP2PEnabled()) { |
| 1788 | LOG(INFO) << "Not starting p2p since it's not enabled."; |
| 1789 | return false; |
| 1790 | } |
| 1791 | |
| 1792 | LOG(INFO) << "Ensuring that p2p is running."; |
| 1793 | if (!system_state_->p2p_manager()->EnsureP2PRunning()) { |
| 1794 | LOG(ERROR) << "Error starting p2p."; |
| 1795 | return false; |
| 1796 | } |
| 1797 | |
| 1798 | LOG(INFO) << "Performing p2p housekeeping."; |
| 1799 | if (!system_state_->p2p_manager()->PerformHousekeeping()) { |
| 1800 | LOG(ERROR) << "Error performing housekeeping for p2p."; |
| 1801 | return false; |
| 1802 | } |
| 1803 | |
| 1804 | LOG(INFO) << "Done performing p2p housekeeping."; |
| 1805 | return true; |
David Zeuthen | e4c58bf | 2013-06-18 17:26:50 -0700 | [diff] [blame] | 1806 | } |
| 1807 | |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 1808 | bool UpdateAttempter::GetBootTimeAtUpdate(Time* out_boot_time) { |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 1809 | // In case of an update_engine restart without a reboot, we stored the boot_id |
| 1810 | // when the update was completed by setting a pref, so we can check whether |
| 1811 | // the last update was on this boot or a previous one. |
| 1812 | string boot_id; |
| 1813 | TEST_AND_RETURN_FALSE(utils::GetBootId(&boot_id)); |
| 1814 | |
| 1815 | string update_completed_on_boot_id; |
| 1816 | if (!prefs_->Exists(kPrefsUpdateCompletedOnBootId) || |
| 1817 | !prefs_->GetString(kPrefsUpdateCompletedOnBootId, |
| 1818 | &update_completed_on_boot_id) || |
| 1819 | update_completed_on_boot_id != boot_id) |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 1820 | return false; |
| 1821 | |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 1822 | // Short-circuit avoiding the read in case out_boot_time is nullptr. |
| 1823 | if (out_boot_time) { |
| 1824 | int64_t boot_time = 0; |
| 1825 | // Since the kPrefsUpdateCompletedOnBootId was correctly set, this pref |
| 1826 | // should not fail. |
| 1827 | TEST_AND_RETURN_FALSE( |
| 1828 | prefs_->GetInt64(kPrefsUpdateCompletedBootTime, &boot_time)); |
| 1829 | *out_boot_time = Time::FromInternalValue(boot_time); |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 1830 | } |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 1831 | return true; |
| 1832 | } |
| 1833 | |
Jae Hoon Kim | ba2fdce | 2019-07-11 13:18:58 -0700 | [diff] [blame] | 1834 | bool UpdateAttempter::IsBusyOrUpdateScheduled() { |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1835 | return ((status_ != UpdateStatus::IDLE && |
| 1836 | status_ != UpdateStatus::UPDATED_NEED_REBOOT) || |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1837 | waiting_for_scheduled_check_); |
| 1838 | } |
| 1839 | |
Sen Jiang | daeaa43 | 2018-10-09 18:18:45 -0700 | [diff] [blame] | 1840 | bool UpdateAttempter::IsAnyUpdateSourceAllowed() const { |
David Pursell | 907b4fa | 2015-01-27 10:27:38 -0800 | [diff] [blame] | 1841 | // We allow updates from any source if either of these are true: |
| 1842 | // * The device is running an unofficial (dev/test) image. |
| 1843 | // * The debugd dev features are accessible (i.e. in devmode with no owner). |
| 1844 | // This protects users running a base image, while still allowing a specific |
| 1845 | // window (gated by the debug dev features) where `cros flash` is usable. |
David Pursell | 02c1864 | 2014-11-06 11:26:11 -0800 | [diff] [blame] | 1846 | if (!system_state_->hardware()->IsOfficialBuild()) { |
| 1847 | LOG(INFO) << "Non-official build; allowing any update source."; |
| 1848 | return true; |
| 1849 | } |
| 1850 | |
Sen Jiang | e67bb5b | 2016-06-20 15:53:56 -0700 | [diff] [blame] | 1851 | if (system_state_->hardware()->AreDevFeaturesEnabled()) { |
| 1852 | LOG(INFO) << "Developer features enabled; allowing custom update sources."; |
David Pursell | 02c1864 | 2014-11-06 11:26:11 -0800 | [diff] [blame] | 1853 | return true; |
| 1854 | } |
Sen Jiang | e67bb5b | 2016-06-20 15:53:56 -0700 | [diff] [blame] | 1855 | |
| 1856 | LOG(INFO) |
| 1857 | << "Developer features disabled; disallowing custom update sources."; |
David Pursell | 02c1864 | 2014-11-06 11:26:11 -0800 | [diff] [blame] | 1858 | return false; |
| 1859 | } |
| 1860 | |
May Lippert | 60aa3ca | 2018-08-15 16:55:29 -0700 | [diff] [blame] | 1861 | void UpdateAttempter::ReportTimeToUpdateAppliedMetric() { |
| 1862 | const policy::DevicePolicy* device_policy = system_state_->device_policy(); |
| 1863 | if (device_policy && device_policy->IsEnterpriseEnrolled()) { |
| 1864 | vector<policy::DevicePolicy::WeeklyTimeInterval> parsed_intervals; |
| 1865 | bool has_time_restrictions = |
| 1866 | device_policy->GetDisallowedTimeIntervals(&parsed_intervals); |
| 1867 | |
| 1868 | int64_t update_first_seen_at_int; |
| 1869 | if (system_state_->prefs()->Exists(kPrefsUpdateFirstSeenAt)) { |
| 1870 | if (system_state_->prefs()->GetInt64(kPrefsUpdateFirstSeenAt, |
| 1871 | &update_first_seen_at_int)) { |
| 1872 | TimeDelta update_delay = |
| 1873 | system_state_->clock()->GetWallclockTime() - |
| 1874 | Time::FromInternalValue(update_first_seen_at_int); |
| 1875 | system_state_->metrics_reporter() |
| 1876 | ->ReportEnterpriseUpdateSeenToDownloadDays(has_time_restrictions, |
| 1877 | update_delay.InDays()); |
| 1878 | } |
| 1879 | } |
| 1880 | } |
| 1881 | } |
| 1882 | |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 1883 | } // namespace chromeos_update_engine |