Alex Deymo | aea4c1c | 2015-08-19 20:24:43 -0700 | [diff] [blame] | 1 | // |
| 2 | // Copyright (C) 2012 The Android Open Source Project |
| 3 | // |
| 4 | // Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | // you may not use this file except in compliance with the License. |
| 6 | // You may obtain a copy of the License at |
| 7 | // |
| 8 | // http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | // |
| 10 | // Unless required by applicable law or agreed to in writing, software |
| 11 | // distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | // See the License for the specific language governing permissions and |
| 14 | // limitations under the License. |
| 15 | // |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 16 | |
Amin Hassani | ec7bc11 | 2020-10-29 16:47:58 -0700 | [diff] [blame] | 17 | #include "update_engine/cros/update_attempter.h" |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 18 | |
Ben Chan | 9abb763 | 2014-08-07 00:10:53 -0700 | [diff] [blame] | 19 | #include <stdint.h> |
| 20 | |
Alex Vakulenko | 59e253e | 2014-02-24 10:40:21 -0800 | [diff] [blame] | 21 | #include <algorithm> |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 22 | #include <map> |
Alex Deymo | bc91a27 | 2014-05-20 16:45:33 -0700 | [diff] [blame] | 23 | #include <memory> |
| 24 | #include <string> |
Andrew | a8d7df3 | 2020-03-15 20:10:01 -0700 | [diff] [blame] | 25 | #include <unordered_set> |
Alex Vakulenko | d2779df | 2014-06-16 13:19:00 -0700 | [diff] [blame] | 26 | #include <utility> |
Alex Deymo | 44666f9 | 2014-07-22 20:29:24 -0700 | [diff] [blame] | 27 | #include <vector> |
Darin Petkov | 9d65b7b | 2010-07-20 09:13:01 -0700 | [diff] [blame] | 28 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 29 | #include <base/bind.h> |
Denis Nikitin | 8f2fa74 | 2019-05-29 10:36:52 -0700 | [diff] [blame] | 30 | #include <base/compiler_specific.h> |
Ben Chan | 06c76a4 | 2014-09-05 08:21:06 -0700 | [diff] [blame] | 31 | #include <base/files/file_util.h> |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 32 | #include <base/logging.h> |
Andrew de los Reyes | 4516810 | 2010-11-22 11:13:50 -0800 | [diff] [blame] | 33 | #include <base/rand_util.h> |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 34 | #include <base/strings/string_number_conversions.h> |
Daniel Erat | 65f1da0 | 2014-06-27 22:05:38 -0700 | [diff] [blame] | 35 | #include <base/strings/string_util.h> |
Alex Vakulenko | 75039d7 | 2014-03-25 12:36:28 -0700 | [diff] [blame] | 36 | #include <base/strings/stringprintf.h> |
May Lippert | 60aa3ca | 2018-08-15 16:55:29 -0700 | [diff] [blame] | 37 | #include <base/time/time.h> |
Sen Jiang | 2703ef4 | 2017-03-16 13:36:21 -0700 | [diff] [blame] | 38 | #include <brillo/data_encoding.h> |
Sen Jiang | e67bb5b | 2016-06-20 15:53:56 -0700 | [diff] [blame] | 39 | #include <brillo/errors/error_codes.h> |
Alex Vakulenko | 3f39d5c | 2015-10-13 09:27:13 -0700 | [diff] [blame] | 40 | #include <brillo/message_loops/message_loop.h> |
Patrick Dubroy | 7fbbe8a | 2011-08-01 17:28:22 +0200 | [diff] [blame] | 41 | #include <policy/device_policy.h> |
Alex Deymo | bc91a27 | 2014-05-20 16:45:33 -0700 | [diff] [blame] | 42 | #include <policy/libpolicy.h> |
Alex Deymo | d6deb1d | 2015-08-28 15:54:37 -0700 | [diff] [blame] | 43 | #include <update_engine/dbus-constants.h> |
Darin Petkov | 9d65b7b | 2010-07-20 09:13:01 -0700 | [diff] [blame] | 44 | |
Alex Deymo | 14c0da8 | 2016-07-20 16:45:45 -0700 | [diff] [blame] | 45 | #include "update_engine/certificate_checker.h" |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 46 | #include "update_engine/common/boot_control_interface.h" |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 47 | #include "update_engine/common/clock_interface.h" |
| 48 | #include "update_engine/common/constants.h" |
Xiaochu Liu | 8ba486f | 2018-11-06 11:14:10 -0800 | [diff] [blame] | 49 | #include "update_engine/common/dlcservice_interface.h" |
Amin Hassani | ec7bc11 | 2020-10-29 16:47:58 -0700 | [diff] [blame] | 50 | #include "update_engine/common/download_action.h" |
Jae Hoon Kim | 5e8e30b | 2020-05-06 14:59:06 -0700 | [diff] [blame] | 51 | #include "update_engine/common/excluder_interface.h" |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 52 | #include "update_engine/common/hardware_interface.h" |
Amin Hassani | ec7bc11 | 2020-10-29 16:47:58 -0700 | [diff] [blame] | 53 | #include "update_engine/common/metrics_reporter_interface.h" |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 54 | #include "update_engine/common/platform_constants.h" |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 55 | #include "update_engine/common/prefs.h" |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 56 | #include "update_engine/common/prefs_interface.h" |
| 57 | #include "update_engine/common/subprocess.h" |
Amin Hassani | ec7bc11 | 2020-10-29 16:47:58 -0700 | [diff] [blame] | 58 | #include "update_engine/common/system_state.h" |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 59 | #include "update_engine/common/utils.h" |
Amin Hassani | ec7bc11 | 2020-10-29 16:47:58 -0700 | [diff] [blame] | 60 | #include "update_engine/cros/omaha_request_action.h" |
| 61 | #include "update_engine/cros/omaha_request_params.h" |
| 62 | #include "update_engine/cros/omaha_response_handler_action.h" |
| 63 | #include "update_engine/cros/omaha_utils.h" |
| 64 | #include "update_engine/cros/p2p_manager.h" |
| 65 | #include "update_engine/cros/payload_state_interface.h" |
| 66 | #include "update_engine/cros/power_manager_interface.h" |
Alex Deymo | 14c0da8 | 2016-07-20 16:45:45 -0700 | [diff] [blame] | 67 | #include "update_engine/libcurl_http_fetcher.h" |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 68 | #include "update_engine/payload_consumer/filesystem_verifier_action.h" |
| 69 | #include "update_engine/payload_consumer/postinstall_runner_action.h" |
Amin Hassani | 0882a51 | 2018-04-05 16:25:44 -0700 | [diff] [blame] | 70 | #include "update_engine/update_boot_flags_action.h" |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 71 | #include "update_engine/update_manager/policy.h" |
Marton Hunyady | e58bddb | 2018-04-10 20:27:26 +0200 | [diff] [blame] | 72 | #include "update_engine/update_manager/policy_utils.h" |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 73 | #include "update_engine/update_manager/update_manager.h" |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 74 | #include "update_engine/update_status_utils.h" |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 75 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 76 | using base::Bind; |
| 77 | using base::Callback; |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 78 | using base::FilePath; |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 79 | using base::Time; |
Darin Petkov | af18305 | 2010-08-23 12:07:13 -0700 | [diff] [blame] | 80 | using base::TimeDelta; |
| 81 | using base::TimeTicks; |
Alex Vakulenko | 3f39d5c | 2015-10-13 09:27:13 -0700 | [diff] [blame] | 82 | using brillo::MessageLoop; |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 83 | using chromeos_update_manager::CalculateStagingCase; |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 84 | using chromeos_update_manager::EvalStatus; |
| 85 | using chromeos_update_manager::Policy; |
Adolfo Victoria | 497044c | 2018-07-18 07:51:42 -0700 | [diff] [blame] | 86 | using chromeos_update_manager::StagingCase; |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 87 | using chromeos_update_manager::UpdateCheckParams; |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 88 | using std::map; |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 89 | using std::string; |
| 90 | using std::vector; |
Aaron Wood | bf5a252 | 2017-10-04 10:58:36 -0700 | [diff] [blame] | 91 | using update_engine::UpdateAttemptFlags; |
Aaron Wood | 7f92e2b | 2017-08-28 14:51:21 -0700 | [diff] [blame] | 92 | using update_engine::UpdateEngineStatus; |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 93 | |
| 94 | namespace chromeos_update_engine { |
| 95 | |
Darin Petkov | 3627577 | 2010-10-01 11:40:57 -0700 | [diff] [blame] | 96 | const int UpdateAttempter::kMaxDeltaUpdateFailures = 3; |
| 97 | |
Andrew de los Reyes | 4516810 | 2010-11-22 11:13:50 -0800 | [diff] [blame] | 98 | namespace { |
| 99 | const int kMaxConsecutiveObeyProxyRequests = 20; |
Gilad Arnold | 70e476e | 2013-07-30 16:01:13 -0700 | [diff] [blame] | 100 | |
Alex Deymo | 0d29854 | 2016-03-30 18:31:49 -0700 | [diff] [blame] | 101 | // Minimum threshold to broadcast an status update in progress and time. |
| 102 | const double kBroadcastThresholdProgress = 0.01; // 1% |
| 103 | const int kBroadcastThresholdSeconds = 10; |
| 104 | |
David Pursell | 02c1864 | 2014-11-06 11:26:11 -0800 | [diff] [blame] | 105 | // By default autest bypasses scattering. If we want to test scattering, |
| 106 | // use kScheduledAUTestURLRequest. The URL used is same in both cases, but |
| 107 | // different params are passed to CheckForUpdate(). |
| 108 | const char kAUTestURLRequest[] = "autest"; |
| 109 | const char kScheduledAUTestURLRequest[] = "autest-scheduled"; |
Alex Vakulenko | d2779df | 2014-06-16 13:19:00 -0700 | [diff] [blame] | 110 | } // namespace |
Andrew de los Reyes | 4516810 | 2010-11-22 11:13:50 -0800 | [diff] [blame] | 111 | |
Sen Jiang | daeaa43 | 2018-10-09 18:18:45 -0700 | [diff] [blame] | 112 | ErrorCode GetErrorCodeForAction(AbstractAction* action, ErrorCode code) { |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 113 | if (code != ErrorCode::kError) |
Darin Petkov | 777dbfa | 2010-07-20 15:03:37 -0700 | [diff] [blame] | 114 | return code; |
| 115 | |
| 116 | const string type = action->Type(); |
| 117 | if (type == OmahaRequestAction::StaticType()) |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 118 | return ErrorCode::kOmahaRequestError; |
Darin Petkov | 777dbfa | 2010-07-20 15:03:37 -0700 | [diff] [blame] | 119 | if (type == OmahaResponseHandlerAction::StaticType()) |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 120 | return ErrorCode::kOmahaResponseHandlerError; |
Allie Wood | eb9e6d8 | 2015-04-17 13:55:30 -0700 | [diff] [blame] | 121 | if (type == FilesystemVerifierAction::StaticType()) |
| 122 | return ErrorCode::kFilesystemVerifierError; |
Darin Petkov | 777dbfa | 2010-07-20 15:03:37 -0700 | [diff] [blame] | 123 | if (type == PostinstallRunnerAction::StaticType()) |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 124 | return ErrorCode::kPostinstallRunnerError; |
Darin Petkov | 777dbfa | 2010-07-20 15:03:37 -0700 | [diff] [blame] | 125 | |
| 126 | return code; |
| 127 | } |
| 128 | |
Sen Jiang | 1841408 | 2018-01-11 14:50:36 -0800 | [diff] [blame] | 129 | UpdateAttempter::UpdateAttempter(SystemState* system_state, |
| 130 | CertificateChecker* cert_checker) |
Gilad Arnold | 1f84723 | 2014-04-07 12:07:49 -0700 | [diff] [blame] | 131 | : processor_(new ActionProcessor()), |
| 132 | system_state_(system_state), |
Colin Howes | 978c108 | 2018-12-03 11:46:12 -0800 | [diff] [blame] | 133 | cert_checker_(cert_checker), |
| 134 | is_install_(false) {} |
Darin Petkov | c6c135c | 2010-08-11 13:36:18 -0700 | [diff] [blame] | 135 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 136 | UpdateAttempter::~UpdateAttempter() { |
Amin Hassani | c288bf6 | 2020-11-04 19:33:43 -0800 | [diff] [blame] | 137 | // Prevent any DBus communication from UpdateAttempter when shutting down the |
| 138 | // daemon. |
| 139 | ClearObservers(); |
| 140 | |
Alex Deymo | 33e91e7 | 2015-12-01 18:26:08 -0300 | [diff] [blame] | 141 | // CertificateChecker might not be initialized in unittests. |
| 142 | if (cert_checker_) |
| 143 | cert_checker_->SetObserver(nullptr); |
Alex Deymo | 2b4268c | 2015-12-04 13:56:25 -0800 | [diff] [blame] | 144 | // Release ourselves as the ActionProcessor's delegate to prevent |
| 145 | // re-scheduling the updates due to the processing stopped. |
| 146 | processor_->set_delegate(nullptr); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 147 | } |
| 148 | |
Gilad Arnold | 1f84723 | 2014-04-07 12:07:49 -0700 | [diff] [blame] | 149 | void UpdateAttempter::Init() { |
| 150 | // Pulling from the SystemState can only be done after construction, since |
| 151 | // this is an aggregate of various objects (such as the UpdateAttempter), |
| 152 | // which requires them all to be constructed prior to it being used. |
| 153 | prefs_ = system_state_->prefs(); |
| 154 | omaha_request_params_ = system_state_->request_params(); |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 155 | |
Alex Deymo | 33e91e7 | 2015-12-01 18:26:08 -0300 | [diff] [blame] | 156 | if (cert_checker_) |
| 157 | cert_checker_->SetObserver(this); |
| 158 | |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 159 | // In case of update_engine restart without a reboot we need to restore the |
| 160 | // reboot needed state. |
| 161 | if (GetBootTimeAtUpdate(nullptr)) |
| 162 | status_ = UpdateStatus::UPDATED_NEED_REBOOT; |
| 163 | else |
| 164 | status_ = UpdateStatus::IDLE; |
Gilad Arnold | 1f84723 | 2014-04-07 12:07:49 -0700 | [diff] [blame] | 165 | } |
| 166 | |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 167 | bool UpdateAttempter::ScheduleUpdates() { |
Jae Hoon Kim | ba2fdce | 2019-07-11 13:18:58 -0700 | [diff] [blame] | 168 | if (IsBusyOrUpdateScheduled()) |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 169 | return false; |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 170 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 171 | chromeos_update_manager::UpdateManager* const update_manager = |
| 172 | system_state_->update_manager(); |
| 173 | CHECK(update_manager); |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 174 | Callback<void(EvalStatus, const UpdateCheckParams&)> callback = |
| 175 | Bind(&UpdateAttempter::OnUpdateScheduled, base::Unretained(this)); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 176 | // We limit the async policy request to a reasonably short time, to avoid a |
| 177 | // starvation due to a transient bug. |
Jae Hoon Kim | 504c3cb | 2019-07-02 11:17:24 -0700 | [diff] [blame] | 178 | update_manager->AsyncPolicyRequestUpdateCheckAllowed( |
| 179 | callback, &Policy::UpdateCheckAllowed); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 180 | waiting_for_scheduled_check_ = true; |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 181 | return true; |
Darin Petkov | c6c135c | 2010-08-11 13:36:18 -0700 | [diff] [blame] | 182 | } |
| 183 | |
Amin Hassani | c288bf6 | 2020-11-04 19:33:43 -0800 | [diff] [blame] | 184 | bool UpdateAttempter::StartUpdater() { |
| 185 | // Initiate update checks. |
| 186 | ScheduleUpdates(); |
| 187 | |
| 188 | auto update_boot_flags_action = |
| 189 | std::make_unique<UpdateBootFlagsAction>(system_state_->boot_control()); |
| 190 | processor_->EnqueueAction(std::move(update_boot_flags_action)); |
| 191 | // Update boot flags after 45 seconds. |
| 192 | MessageLoop::current()->PostDelayedTask( |
| 193 | FROM_HERE, |
| 194 | base::Bind(&ActionProcessor::StartProcessing, |
| 195 | base::Unretained(processor_.get())), |
| 196 | base::TimeDelta::FromSeconds(45)); |
| 197 | |
| 198 | // Broadcast the update engine status on startup to ensure consistent system |
| 199 | // state on crashes. |
| 200 | MessageLoop::current()->PostTask( |
| 201 | FROM_HERE, |
| 202 | base::Bind(&UpdateAttempter::BroadcastStatus, base::Unretained(this))); |
| 203 | |
| 204 | MessageLoop::current()->PostTask( |
| 205 | FROM_HERE, |
| 206 | base::Bind(&UpdateAttempter::UpdateEngineStarted, |
| 207 | base::Unretained(this))); |
| 208 | return true; |
| 209 | } |
| 210 | |
Alex Deymo | c1c17b4 | 2015-11-23 03:53:15 -0300 | [diff] [blame] | 211 | void UpdateAttempter::CertificateChecked(ServerToCheck server_to_check, |
| 212 | CertificateCheckResult result) { |
Tianjie Xu | 282aa1f | 2017-09-05 13:42:45 -0700 | [diff] [blame] | 213 | system_state_->metrics_reporter()->ReportCertificateCheckMetrics( |
| 214 | server_to_check, result); |
Alex Deymo | c1c17b4 | 2015-11-23 03:53:15 -0300 | [diff] [blame] | 215 | } |
| 216 | |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 217 | bool UpdateAttempter::CheckAndReportDailyMetrics() { |
| 218 | int64_t stored_value; |
Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame] | 219 | Time now = system_state_->clock()->GetWallclockTime(); |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 220 | if (system_state_->prefs()->Exists(kPrefsDailyMetricsLastReportedAt) && |
| 221 | system_state_->prefs()->GetInt64(kPrefsDailyMetricsLastReportedAt, |
| 222 | &stored_value)) { |
Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame] | 223 | Time last_reported_at = Time::FromInternalValue(stored_value); |
| 224 | TimeDelta time_reported_since = now - last_reported_at; |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 225 | if (time_reported_since.InSeconds() < 0) { |
| 226 | LOG(WARNING) << "Last reported daily metrics " |
| 227 | << utils::FormatTimeDelta(time_reported_since) << " ago " |
| 228 | << "which is negative. Either the system clock is wrong or " |
| 229 | << "the kPrefsDailyMetricsLastReportedAt state variable " |
| 230 | << "is wrong."; |
| 231 | // In this case, report daily metrics to reset. |
| 232 | } else { |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 233 | if (time_reported_since.InSeconds() < 24 * 60 * 60) { |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 234 | LOG(INFO) << "Last reported daily metrics " |
| 235 | << utils::FormatTimeDelta(time_reported_since) << " ago."; |
| 236 | return false; |
| 237 | } |
| 238 | LOG(INFO) << "Last reported daily metrics " |
| 239 | << utils::FormatTimeDelta(time_reported_since) << " ago, " |
| 240 | << "which is more than 24 hours ago."; |
| 241 | } |
| 242 | } |
| 243 | |
| 244 | LOG(INFO) << "Reporting daily metrics."; |
| 245 | system_state_->prefs()->SetInt64(kPrefsDailyMetricsLastReportedAt, |
| 246 | now.ToInternalValue()); |
| 247 | |
| 248 | ReportOSAge(); |
| 249 | |
| 250 | return true; |
| 251 | } |
| 252 | |
| 253 | void UpdateAttempter::ReportOSAge() { |
| 254 | struct stat sb; |
| 255 | |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 256 | if (system_state_ == nullptr) |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 257 | return; |
| 258 | |
| 259 | if (stat("/etc/lsb-release", &sb) != 0) { |
David Zeuthen | d9aca3b | 2014-08-21 13:11:21 -0400 | [diff] [blame] | 260 | PLOG(ERROR) << "Error getting file status for /etc/lsb-release " |
| 261 | << "(Note: this may happen in some unit tests)"; |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 262 | return; |
| 263 | } |
| 264 | |
Sen Jiang | 1c3db7d | 2019-01-10 15:48:55 -0800 | [diff] [blame] | 265 | Time lsb_release_timestamp = Time::FromTimeSpec(sb.st_ctim); |
Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame] | 266 | Time now = system_state_->clock()->GetWallclockTime(); |
| 267 | TimeDelta age = now - lsb_release_timestamp; |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 268 | if (age.InSeconds() < 0) { |
| 269 | LOG(ERROR) << "The OS age (" << utils::FormatTimeDelta(age) |
David Zeuthen | d9aca3b | 2014-08-21 13:11:21 -0400 | [diff] [blame] | 270 | << ") is negative. Maybe the clock is wrong? " |
| 271 | << "(Note: this may happen in some unit tests.)"; |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 272 | return; |
| 273 | } |
| 274 | |
Tianjie Xu | 282aa1f | 2017-09-05 13:42:45 -0700 | [diff] [blame] | 275 | system_state_->metrics_reporter()->ReportDailyMetrics(age); |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 276 | } |
| 277 | |
Amin Hassani | e815363 | 2020-10-27 15:11:28 -0700 | [diff] [blame] | 278 | void UpdateAttempter::Update(const UpdateCheckParams& params) { |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 279 | // This is normally called frequently enough so it's appropriate to use as a |
| 280 | // hook for reporting daily metrics. |
| 281 | // TODO(garnold) This should be hooked to a separate (reliable and consistent) |
| 282 | // timeout event. |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 283 | CheckAndReportDailyMetrics(); |
| 284 | |
Andrew de los Reyes | c1d5c93 | 2011-04-20 17:15:47 -0700 | [diff] [blame] | 285 | fake_update_success_ = false; |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 286 | if (status_ == UpdateStatus::UPDATED_NEED_REBOOT) { |
Thieu Le | 116fda3 | 2011-04-19 11:01:54 -0700 | [diff] [blame] | 287 | // Although we have applied an update, we still want to ping Omaha |
| 288 | // to ensure the number of active statistics is accurate. |
David Zeuthen | 33bae49 | 2014-02-25 16:16:18 -0800 | [diff] [blame] | 289 | // |
| 290 | // Also convey to the UpdateEngine.Check.Result metric that we're |
| 291 | // not performing an update check because of this. |
Andrew de los Reyes | 6b78e29 | 2010-05-10 15:54:39 -0700 | [diff] [blame] | 292 | LOG(INFO) << "Not updating b/c we already updated and we're waiting for " |
Thieu Le | 116fda3 | 2011-04-19 11:01:54 -0700 | [diff] [blame] | 293 | << "reboot, we'll ping Omaha instead"; |
Tianjie Xu | 282aa1f | 2017-09-05 13:42:45 -0700 | [diff] [blame] | 294 | system_state_->metrics_reporter()->ReportUpdateCheckMetrics( |
| 295 | system_state_, |
| 296 | metrics::CheckResult::kRebootPending, |
| 297 | metrics::CheckReaction::kUnset, |
| 298 | metrics::DownloadErrorCode::kUnset); |
Thieu Le | 116fda3 | 2011-04-19 11:01:54 -0700 | [diff] [blame] | 299 | PingOmaha(); |
Andrew de los Reyes | 6b78e29 | 2010-05-10 15:54:39 -0700 | [diff] [blame] | 300 | return; |
| 301 | } |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 302 | if (status_ != UpdateStatus::IDLE) { |
Andrew de los Reyes | 6b78e29 | 2010-05-10 15:54:39 -0700 | [diff] [blame] | 303 | // Update in progress. Do nothing |
| 304 | return; |
| 305 | } |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 306 | |
Amin Hassani | e815363 | 2020-10-27 15:11:28 -0700 | [diff] [blame] | 307 | if (!CalculateUpdateParams(params)) { |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 308 | return; |
| 309 | } |
| 310 | |
Amin Hassani | e815363 | 2020-10-27 15:11:28 -0700 | [diff] [blame] | 311 | BuildUpdateActions(params.interactive); |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 312 | |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 313 | SetStatusAndNotify(UpdateStatus::CHECKING_FOR_UPDATE); |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 314 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 315 | // Update the last check time here; it may be re-updated when an Omaha |
| 316 | // response is received, but this will prevent us from repeatedly scheduling |
| 317 | // checks in the case where a response is not received. |
| 318 | UpdateLastCheckedTime(); |
| 319 | |
Amin Hassani | 0882a51 | 2018-04-05 16:25:44 -0700 | [diff] [blame] | 320 | ScheduleProcessingStart(); |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 321 | } |
| 322 | |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 323 | void UpdateAttempter::RefreshDevicePolicy() { |
| 324 | // Lazy initialize the policy provider, or reload the latest policy data. |
| 325 | if (!policy_provider_.get()) |
| 326 | policy_provider_.reset(new policy::PolicyProvider()); |
| 327 | policy_provider_->Reload(); |
| 328 | |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 329 | const policy::DevicePolicy* device_policy = nullptr; |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 330 | if (policy_provider_->device_policy_is_loaded()) |
| 331 | device_policy = &policy_provider_->GetDevicePolicy(); |
| 332 | |
| 333 | if (device_policy) |
| 334 | LOG(INFO) << "Device policies/settings present"; |
| 335 | else |
| 336 | LOG(INFO) << "No device policies/settings present."; |
| 337 | |
| 338 | system_state_->set_device_policy(device_policy); |
David Zeuthen | 92d9c8b | 2013-09-11 10:58:11 -0700 | [diff] [blame] | 339 | system_state_->p2p_manager()->SetDevicePolicy(device_policy); |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 340 | } |
| 341 | |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 342 | void UpdateAttempter::CalculateP2PParams(bool interactive) { |
| 343 | bool use_p2p_for_downloading = false; |
| 344 | bool use_p2p_for_sharing = false; |
| 345 | |
Thiemo Nagel | 27d9d53 | 2017-05-26 16:35:20 +0200 | [diff] [blame] | 346 | // Never use p2p for downloading in interactive checks unless the developer |
| 347 | // has opted in for it via a marker file. |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 348 | // |
Thiemo Nagel | 27d9d53 | 2017-05-26 16:35:20 +0200 | [diff] [blame] | 349 | // (Why would a developer want to opt in? If they are working on the |
| 350 | // update_engine or p2p codebases so they can actually test their code.) |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 351 | |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 352 | if (system_state_ != nullptr) { |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 353 | if (!system_state_->p2p_manager()->IsP2PEnabled()) { |
| 354 | LOG(INFO) << "p2p is not enabled - disallowing p2p for both" |
| 355 | << " downloading and sharing."; |
| 356 | } else { |
| 357 | // Allow p2p for sharing, even in interactive checks. |
| 358 | use_p2p_for_sharing = true; |
| 359 | if (!interactive) { |
| 360 | LOG(INFO) << "Non-interactive check - allowing p2p for downloading"; |
| 361 | use_p2p_for_downloading = true; |
| 362 | } else { |
David Zeuthen | 052d290 | 2013-09-06 11:41:30 -0700 | [diff] [blame] | 363 | LOG(INFO) << "Forcibly disabling use of p2p for downloading " |
| 364 | << "since this update attempt is interactive."; |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 365 | } |
| 366 | } |
| 367 | } |
| 368 | |
Gilad Arnold | 74b5f55 | 2014-10-07 08:17:16 -0700 | [diff] [blame] | 369 | PayloadStateInterface* const payload_state = system_state_->payload_state(); |
| 370 | payload_state->SetUsingP2PForDownloading(use_p2p_for_downloading); |
| 371 | payload_state->SetUsingP2PForSharing(use_p2p_for_sharing); |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 372 | } |
| 373 | |
Amin Hassani | e815363 | 2020-10-27 15:11:28 -0700 | [diff] [blame] | 374 | bool UpdateAttempter::CalculateUpdateParams(const UpdateCheckParams& params) { |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 375 | http_response_code_ = 0; |
Gilad Arnold | 74b5f55 | 2014-10-07 08:17:16 -0700 | [diff] [blame] | 376 | PayloadStateInterface* const payload_state = system_state_->payload_state(); |
Patrick Dubroy | 7fbbe8a | 2011-08-01 17:28:22 +0200 | [diff] [blame] | 377 | |
Alex Deymo | 749ecf1 | 2014-10-21 20:06:57 -0700 | [diff] [blame] | 378 | // Refresh the policy before computing all the update parameters. |
| 379 | RefreshDevicePolicy(); |
| 380 | |
Marton Hunyady | e58bddb | 2018-04-10 20:27:26 +0200 | [diff] [blame] | 381 | // Check whether we need to clear the rollback-happened preference after |
| 382 | // policy is available again. |
| 383 | UpdateRollbackHappened(); |
| 384 | |
Amin Hassani | e815363 | 2020-10-27 15:11:28 -0700 | [diff] [blame] | 385 | CalculateStagingParams(params.interactive); |
Adolfo Victoria | 497044c | 2018-07-18 07:51:42 -0700 | [diff] [blame] | 386 | // If staging_wait_time_ wasn't set, staging is off, use scattering instead. |
| 387 | if (staging_wait_time_.InSeconds() == 0) { |
Amin Hassani | e815363 | 2020-10-27 15:11:28 -0700 | [diff] [blame] | 388 | CalculateScatteringParams(params.interactive); |
Adolfo Victoria | 497044c | 2018-07-18 07:51:42 -0700 | [diff] [blame] | 389 | } |
Patrick Dubroy | 7fbbe8a | 2011-08-01 17:28:22 +0200 | [diff] [blame] | 390 | |
Amin Hassani | e815363 | 2020-10-27 15:11:28 -0700 | [diff] [blame] | 391 | CalculateP2PParams(params.interactive); |
Gilad Arnold | 74b5f55 | 2014-10-07 08:17:16 -0700 | [diff] [blame] | 392 | if (payload_state->GetUsingP2PForDownloading() || |
| 393 | payload_state->GetUsingP2PForSharing()) { |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 394 | // OK, p2p is to be used - start it and perform housekeeping. |
| 395 | if (!StartP2PAndPerformHousekeeping()) { |
| 396 | // If this fails, disable p2p for this attempt |
| 397 | LOG(INFO) << "Forcibly disabling use of p2p since starting p2p or " |
| 398 | << "performing housekeeping failed."; |
Gilad Arnold | 74b5f55 | 2014-10-07 08:17:16 -0700 | [diff] [blame] | 399 | payload_state->SetUsingP2PForDownloading(false); |
| 400 | payload_state->SetUsingP2PForSharing(false); |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 401 | } |
| 402 | } |
| 403 | |
Amin Hassani | e815363 | 2020-10-27 15:11:28 -0700 | [diff] [blame] | 404 | if (!omaha_request_params_->Init( |
| 405 | forced_app_version_, forced_omaha_url_, params)) { |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 406 | LOG(ERROR) << "Unable to initialize Omaha request params."; |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 407 | return false; |
Darin Petkov | a4a8a8c | 2010-07-15 22:21:12 -0700 | [diff] [blame] | 408 | } |
Darin Petkov | 3aefa86 | 2010-12-07 14:45:00 -0800 | [diff] [blame] | 409 | |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 410 | // The function |CalculateDlcParams| makes use of the function |GetAppId| from |
| 411 | // |OmahaRequestParams|, so to ensure that the return from |GetAppId| |
| 412 | // doesn't change, no changes to the values |download_channel_|, |
| 413 | // |image_props_.product_id| and |image_props_.canary_product_id| from |
| 414 | // |omaha_request_params_| shall be made below this line. |
| 415 | CalculateDlcParams(); |
| 416 | |
Amr Aboelkher | 21ac996 | 2019-05-15 14:50:05 +0200 | [diff] [blame] | 417 | // Set Quick Fix Build token if policy is set and the device is enterprise |
| 418 | // enrolled. |
Askar Aitzhan | 570ca87 | 2019-04-24 11:16:12 +0200 | [diff] [blame] | 419 | string token; |
| 420 | if (system_state_ && system_state_->device_policy()) { |
| 421 | if (!system_state_->device_policy()->GetDeviceQuickFixBuildToken(&token)) |
| 422 | token.clear(); |
| 423 | } |
| 424 | omaha_request_params_->set_autoupdate_token(token); |
| 425 | |
Gilad Arnold | afd70ed | 2014-09-30 16:27:06 -0700 | [diff] [blame] | 426 | LOG(INFO) << "target_version_prefix = " |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 427 | << omaha_request_params_->target_version_prefix() |
Marton Hunyady | ba51c3f | 2018-04-25 15:18:10 +0200 | [diff] [blame] | 428 | << ", rollback_allowed = " |
| 429 | << omaha_request_params_->rollback_allowed() |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 430 | << ", scatter_factor_in_seconds = " |
| 431 | << utils::FormatSecs(scatter_factor_.InSeconds()); |
| 432 | |
| 433 | LOG(INFO) << "Wall Clock Based Wait Enabled = " |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 434 | << omaha_request_params_->wall_clock_based_wait_enabled() |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 435 | << ", Update Check Count Wait Enabled = " |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 436 | << omaha_request_params_->update_check_count_wait_enabled() |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 437 | << ", Waiting Period = " |
| 438 | << utils::FormatSecs( |
| 439 | omaha_request_params_->waiting_period().InSeconds()); |
Jay Srinivasan | 0a70874 | 2012-03-20 11:26:12 -0700 | [diff] [blame] | 440 | |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 441 | LOG(INFO) << "Use p2p For Downloading = " |
Gilad Arnold | 74b5f55 | 2014-10-07 08:17:16 -0700 | [diff] [blame] | 442 | << payload_state->GetUsingP2PForDownloading() |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 443 | << ", Use p2p For Sharing = " |
Gilad Arnold | 74b5f55 | 2014-10-07 08:17:16 -0700 | [diff] [blame] | 444 | << payload_state->GetUsingP2PForSharing(); |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 445 | |
Andrew de los Reyes | 4516810 | 2010-11-22 11:13:50 -0800 | [diff] [blame] | 446 | obeying_proxies_ = true; |
Amin Hassani | e815363 | 2020-10-27 15:11:28 -0700 | [diff] [blame] | 447 | if (proxy_manual_checks_ == 0) { |
Andrew de los Reyes | 4516810 | 2010-11-22 11:13:50 -0800 | [diff] [blame] | 448 | LOG(INFO) << "forced to obey proxies"; |
| 449 | // If forced to obey proxies, every 20th request will not use proxies |
| 450 | proxy_manual_checks_++; |
| 451 | LOG(INFO) << "proxy manual checks: " << proxy_manual_checks_; |
| 452 | if (proxy_manual_checks_ >= kMaxConsecutiveObeyProxyRequests) { |
| 453 | proxy_manual_checks_ = 0; |
| 454 | obeying_proxies_ = false; |
| 455 | } |
| 456 | } else if (base::RandInt(0, 4) == 0) { |
| 457 | obeying_proxies_ = false; |
| 458 | } |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 459 | LOG_IF(INFO, !obeying_proxies_) |
| 460 | << "To help ensure updates work, this update check we are ignoring the " |
| 461 | << "proxy settings and using direct connections."; |
Andrew de los Reyes | 4516810 | 2010-11-22 11:13:50 -0800 | [diff] [blame] | 462 | |
Darin Petkov | 3627577 | 2010-10-01 11:40:57 -0700 | [diff] [blame] | 463 | DisableDeltaUpdateIfNeeded(); |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 464 | return true; |
| 465 | } |
| 466 | |
Gilad Arnold | b92f0df | 2013-01-10 16:32:45 -0800 | [diff] [blame] | 467 | void UpdateAttempter::CalculateScatteringParams(bool interactive) { |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 468 | // Take a copy of the old scatter value before we update it, as |
| 469 | // we need to update the waiting period if this value changes. |
| 470 | TimeDelta old_scatter_factor = scatter_factor_; |
Jay Srinivasan | 6f6ea00 | 2012-12-14 11:26:28 -0800 | [diff] [blame] | 471 | const policy::DevicePolicy* device_policy = system_state_->device_policy(); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 472 | if (device_policy) { |
Ben Chan | 9abb763 | 2014-08-07 00:10:53 -0700 | [diff] [blame] | 473 | int64_t new_scatter_factor_in_secs = 0; |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 474 | device_policy->GetScatterFactorInSeconds(&new_scatter_factor_in_secs); |
Alex Vakulenko | d2779df | 2014-06-16 13:19:00 -0700 | [diff] [blame] | 475 | if (new_scatter_factor_in_secs < 0) // sanitize input, just in case. |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 476 | new_scatter_factor_in_secs = 0; |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 477 | scatter_factor_ = TimeDelta::FromSeconds(new_scatter_factor_in_secs); |
| 478 | } |
| 479 | |
| 480 | bool is_scatter_enabled = false; |
| 481 | if (scatter_factor_.InSeconds() == 0) { |
| 482 | LOG(INFO) << "Scattering disabled since scatter factor is set to 0"; |
Gilad Arnold | b92f0df | 2013-01-10 16:32:45 -0800 | [diff] [blame] | 483 | } else if (interactive) { |
| 484 | LOG(INFO) << "Scattering disabled as this is an interactive update check"; |
Alex Deymo | 46a9aae | 2016-05-04 20:20:11 -0700 | [diff] [blame] | 485 | } else if (system_state_->hardware()->IsOOBEEnabled() && |
| 486 | !system_state_->hardware()->IsOOBEComplete(nullptr)) { |
| 487 | LOG(INFO) << "Scattering disabled since OOBE is enabled but not complete " |
| 488 | "yet"; |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 489 | } else { |
| 490 | is_scatter_enabled = true; |
| 491 | LOG(INFO) << "Scattering is enabled"; |
| 492 | } |
| 493 | |
| 494 | if (is_scatter_enabled) { |
| 495 | // This means the scattering policy is turned on. |
| 496 | // Now check if we need to update the waiting period. The two cases |
| 497 | // in which we'd need to update the waiting period are: |
| 498 | // 1. First time in process or a scheduled check after a user-initiated one. |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 499 | // (omaha_request_params_->waiting_period will be zero in this case). |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 500 | // 2. Admin has changed the scattering policy value. |
| 501 | // (new scattering value will be different from old one in this case). |
Ben Chan | 9abb763 | 2014-08-07 00:10:53 -0700 | [diff] [blame] | 502 | int64_t wait_period_in_secs = 0; |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 503 | if (omaha_request_params_->waiting_period().InSeconds() == 0) { |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 504 | // First case. Check if we have a suitable value to set for |
| 505 | // the waiting period. |
Adolfo Victoria | d3a1e35 | 2018-07-16 11:40:47 -0700 | [diff] [blame] | 506 | if (prefs_->GetInt64(kPrefsWallClockScatteringWaitPeriod, |
| 507 | &wait_period_in_secs) && |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 508 | wait_period_in_secs > 0 && |
| 509 | wait_period_in_secs <= scatter_factor_.InSeconds()) { |
| 510 | // This means: |
| 511 | // 1. There's a persisted value for the waiting period available. |
| 512 | // 2. And that persisted value is still valid. |
| 513 | // So, in this case, we should reuse the persisted value instead of |
| 514 | // generating a new random value to improve the chances of a good |
| 515 | // distribution for scattering. |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 516 | omaha_request_params_->set_waiting_period( |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 517 | TimeDelta::FromSeconds(wait_period_in_secs)); |
| 518 | LOG(INFO) << "Using persisted wall-clock waiting period: " |
| 519 | << utils::FormatSecs( |
| 520 | omaha_request_params_->waiting_period().InSeconds()); |
Alex Vakulenko | d2779df | 2014-06-16 13:19:00 -0700 | [diff] [blame] | 521 | } else { |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 522 | // This means there's no persisted value for the waiting period |
| 523 | // available or its value is invalid given the new scatter_factor value. |
| 524 | // So, we should go ahead and regenerate a new value for the |
| 525 | // waiting period. |
| 526 | LOG(INFO) << "Persisted value not present or not valid (" |
| 527 | << utils::FormatSecs(wait_period_in_secs) |
| 528 | << ") for wall-clock waiting period."; |
| 529 | GenerateNewWaitingPeriod(); |
| 530 | } |
| 531 | } else if (scatter_factor_ != old_scatter_factor) { |
| 532 | // This means there's already a waiting period value, but we detected |
| 533 | // a change in the scattering policy value. So, we should regenerate the |
| 534 | // waiting period to make sure it's within the bounds of the new scatter |
| 535 | // factor value. |
| 536 | GenerateNewWaitingPeriod(); |
| 537 | } else { |
| 538 | // Neither the first time scattering is enabled nor the scattering value |
| 539 | // changed. Nothing to do. |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 540 | LOG(INFO) << "Keeping current wall-clock waiting period: " |
| 541 | << utils::FormatSecs( |
| 542 | omaha_request_params_->waiting_period().InSeconds()); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 543 | } |
| 544 | |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 545 | // The invariant at this point is that omaha_request_params_->waiting_period |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 546 | // is non-zero no matter which path we took above. |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 547 | LOG_IF(ERROR, omaha_request_params_->waiting_period().InSeconds() == 0) |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 548 | << "Waiting Period should NOT be zero at this point!!!"; |
| 549 | |
| 550 | // Since scattering is enabled, wall clock based wait will always be |
| 551 | // enabled. |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 552 | omaha_request_params_->set_wall_clock_based_wait_enabled(true); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 553 | |
| 554 | // If we don't have any issues in accessing the file system to update |
| 555 | // the update check count value, we'll turn that on as well. |
| 556 | bool decrement_succeeded = DecrementUpdateCheckCount(); |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 557 | omaha_request_params_->set_update_check_count_wait_enabled( |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 558 | decrement_succeeded); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 559 | } else { |
| 560 | // This means the scattering feature is turned off or disabled for |
| 561 | // this particular update check. Make sure to disable |
| 562 | // all the knobs and artifacts so that we don't invoke any scattering |
| 563 | // related code. |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 564 | omaha_request_params_->set_wall_clock_based_wait_enabled(false); |
| 565 | omaha_request_params_->set_update_check_count_wait_enabled(false); |
| 566 | omaha_request_params_->set_waiting_period(TimeDelta::FromSeconds(0)); |
Adolfo Victoria | d3a1e35 | 2018-07-16 11:40:47 -0700 | [diff] [blame] | 567 | prefs_->Delete(kPrefsWallClockScatteringWaitPeriod); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 568 | prefs_->Delete(kPrefsUpdateCheckCount); |
| 569 | // Don't delete the UpdateFirstSeenAt file as we don't want manual checks |
| 570 | // that result in no-updates (e.g. due to server side throttling) to |
| 571 | // cause update starvation by having the client generate a new |
| 572 | // UpdateFirstSeenAt for each scheduled check that follows a manual check. |
| 573 | } |
| 574 | } |
| 575 | |
| 576 | void UpdateAttempter::GenerateNewWaitingPeriod() { |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 577 | omaha_request_params_->set_waiting_period( |
| 578 | TimeDelta::FromSeconds(base::RandInt(1, scatter_factor_.InSeconds()))); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 579 | |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 580 | LOG(INFO) << "Generated new wall-clock waiting period: " |
| 581 | << utils::FormatSecs( |
| 582 | omaha_request_params_->waiting_period().InSeconds()); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 583 | |
| 584 | // Do a best-effort to persist this in all cases. Even if the persistence |
| 585 | // fails, we'll still be able to scatter based on our in-memory value. |
| 586 | // The persistence only helps in ensuring a good overall distribution |
| 587 | // across multiple devices if they tend to reboot too often. |
Gilad Arnold | 519cfc7 | 2014-10-02 10:34:54 -0700 | [diff] [blame] | 588 | system_state_->payload_state()->SetScatteringWaitPeriod( |
| 589 | omaha_request_params_->waiting_period()); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 590 | } |
| 591 | |
Adolfo Victoria | 497044c | 2018-07-18 07:51:42 -0700 | [diff] [blame] | 592 | void UpdateAttempter::CalculateStagingParams(bool interactive) { |
| 593 | bool oobe_complete = system_state_->hardware()->IsOOBEEnabled() && |
| 594 | system_state_->hardware()->IsOOBEComplete(nullptr); |
| 595 | auto device_policy = system_state_->device_policy(); |
| 596 | StagingCase staging_case = StagingCase::kOff; |
| 597 | if (device_policy && !interactive && oobe_complete) { |
| 598 | staging_wait_time_ = omaha_request_params_->waiting_period(); |
| 599 | staging_case = CalculateStagingCase( |
| 600 | device_policy, prefs_, &staging_wait_time_, &staging_schedule_); |
| 601 | } |
| 602 | switch (staging_case) { |
| 603 | case StagingCase::kOff: |
| 604 | // Staging is off, get rid of persisted value. |
| 605 | prefs_->Delete(kPrefsWallClockStagingWaitPeriod); |
| 606 | // Set |staging_wait_time_| to its default value so scattering can still |
| 607 | // be turned on |
| 608 | staging_wait_time_ = TimeDelta(); |
| 609 | break; |
| 610 | // Let the cases fall through since they just add, and never remove, steps |
| 611 | // to turning staging on. |
| 612 | case StagingCase::kNoSavedValue: |
| 613 | prefs_->SetInt64(kPrefsWallClockStagingWaitPeriod, |
| 614 | staging_wait_time_.InDays()); |
Denis Nikitin | 8f2fa74 | 2019-05-29 10:36:52 -0700 | [diff] [blame] | 615 | FALLTHROUGH; |
Adolfo Victoria | 497044c | 2018-07-18 07:51:42 -0700 | [diff] [blame] | 616 | case StagingCase::kSetStagingFromPref: |
| 617 | omaha_request_params_->set_waiting_period(staging_wait_time_); |
Denis Nikitin | 8f2fa74 | 2019-05-29 10:36:52 -0700 | [diff] [blame] | 618 | FALLTHROUGH; |
Adolfo Victoria | 497044c | 2018-07-18 07:51:42 -0700 | [diff] [blame] | 619 | case StagingCase::kNoAction: |
| 620 | // Staging is on, enable wallclock based wait so that its values get used. |
| 621 | omaha_request_params_->set_wall_clock_based_wait_enabled(true); |
| 622 | // Use UpdateCheckCount if possible to prevent devices updating all at |
| 623 | // once. |
| 624 | omaha_request_params_->set_update_check_count_wait_enabled( |
| 625 | DecrementUpdateCheckCount()); |
| 626 | // Scattering should not be turned on if staging is on, delete the |
| 627 | // existing scattering configuration. |
| 628 | prefs_->Delete(kPrefsWallClockScatteringWaitPeriod); |
| 629 | scatter_factor_ = TimeDelta(); |
| 630 | } |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 631 | } |
| 632 | |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 633 | bool UpdateAttempter::ResetDlcPrefs(const string& dlc_id) { |
| 634 | vector<string> failures; |
| 635 | PrefsInterface* prefs = system_state_->prefs(); |
| 636 | for (auto& sub_key : |
| 637 | {kPrefsPingActive, kPrefsPingLastActive, kPrefsPingLastRollcall}) { |
Jae Hoon Kim | c1f3692 | 2020-05-11 18:20:18 -0700 | [diff] [blame] | 638 | auto key = prefs->CreateSubKey({kDlcPrefsSubDir, dlc_id, sub_key}); |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 639 | if (!prefs->Delete(key)) |
| 640 | failures.emplace_back(sub_key); |
| 641 | } |
| 642 | if (failures.size() != 0) |
| 643 | PLOG(ERROR) << "Failed to delete prefs (" << base::JoinString(failures, ",") |
| 644 | << " for DLC (" << dlc_id << ")."; |
| 645 | |
| 646 | return failures.size() == 0; |
| 647 | } |
| 648 | |
Andrew | a8d7df3 | 2020-03-15 20:10:01 -0700 | [diff] [blame] | 649 | bool UpdateAttempter::SetDlcActiveValue(bool is_active, const string& dlc_id) { |
| 650 | if (dlc_id.empty()) { |
| 651 | LOG(ERROR) << "Empty DLC ID passed."; |
| 652 | return false; |
| 653 | } |
| 654 | LOG(INFO) << "Set DLC (" << dlc_id << ") to " |
| 655 | << (is_active ? "Active" : "Inactive"); |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 656 | PrefsInterface* prefs = system_state_->prefs(); |
Andrew | a8d7df3 | 2020-03-15 20:10:01 -0700 | [diff] [blame] | 657 | if (is_active) { |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 658 | auto ping_active_key = |
Jae Hoon Kim | c1f3692 | 2020-05-11 18:20:18 -0700 | [diff] [blame] | 659 | prefs->CreateSubKey({kDlcPrefsSubDir, dlc_id, kPrefsPingActive}); |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 660 | if (!prefs->SetInt64(ping_active_key, kPingActiveValue)) { |
Andrew | a8d7df3 | 2020-03-15 20:10:01 -0700 | [diff] [blame] | 661 | LOG(ERROR) << "Failed to set the value of ping metadata '" |
| 662 | << kPrefsPingActive << "'."; |
| 663 | return false; |
| 664 | } |
| 665 | } else { |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 666 | return ResetDlcPrefs(dlc_id); |
Andrew | a8d7df3 | 2020-03-15 20:10:01 -0700 | [diff] [blame] | 667 | } |
| 668 | return true; |
| 669 | } |
| 670 | |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 671 | int64_t UpdateAttempter::GetPingMetadata(const string& metadata_key) const { |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 672 | // The first time a ping is sent, the metadata files containing the values |
| 673 | // sent back by the server still don't exist. A value of -1 is used to |
| 674 | // indicate this. |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 675 | if (!system_state_->prefs()->Exists(metadata_key)) |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 676 | return kPingNeverPinged; |
| 677 | |
| 678 | int64_t value; |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 679 | if (system_state_->prefs()->GetInt64(metadata_key, &value)) |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 680 | return value; |
| 681 | |
| 682 | // Return -2 when the file exists and there is a problem reading from it, or |
| 683 | // the value cannot be converted to an integer. |
| 684 | return kPingUnknownValue; |
| 685 | } |
| 686 | |
| 687 | void UpdateAttempter::CalculateDlcParams() { |
Amin Hassani | 2b68e6b | 2020-04-17 10:49:12 -0700 | [diff] [blame] | 688 | // Set the |dlc_ids_| only for an update. This is required to get the |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 689 | // currently installed DLC(s). |
| 690 | if (!is_install_ && |
Amin Hassani | 2b68e6b | 2020-04-17 10:49:12 -0700 | [diff] [blame] | 691 | !system_state_->dlcservice()->GetDlcsToUpdate(&dlc_ids_)) { |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 692 | LOG(INFO) << "Failed to retrieve DLC module IDs from dlcservice. Check the " |
| 693 | "state of dlcservice, will not update DLC modules."; |
| 694 | } |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 695 | PrefsInterface* prefs = system_state_->prefs(); |
| 696 | map<string, OmahaRequestParams::AppParams> dlc_apps_params; |
Amin Hassani | 2b68e6b | 2020-04-17 10:49:12 -0700 | [diff] [blame] | 697 | for (const auto& dlc_id : dlc_ids_) { |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 698 | OmahaRequestParams::AppParams dlc_params{ |
| 699 | .active_counting_type = OmahaRequestParams::kDateBased, |
| 700 | .name = dlc_id, |
| 701 | .send_ping = false}; |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 702 | if (is_install_) { |
| 703 | // In some cases, |SetDlcActiveValue| might fail to reset the DLC prefs |
| 704 | // when a DLC is uninstalled. To avoid having stale values from that |
| 705 | // scenario, we reset the metadata values on a new install request. |
| 706 | // Ignore failure to delete stale prefs. |
| 707 | ResetDlcPrefs(dlc_id); |
| 708 | SetDlcActiveValue(true, dlc_id); |
| 709 | } else { |
| 710 | // Only send the ping when the request is to update DLCs. When installing |
| 711 | // DLCs, we don't want to send the ping yet, since the DLCs might fail to |
| 712 | // install or might not really be active yet. |
| 713 | dlc_params.ping_active = kPingActiveValue; |
| 714 | auto ping_active_key = |
Jae Hoon Kim | c1f3692 | 2020-05-11 18:20:18 -0700 | [diff] [blame] | 715 | prefs->CreateSubKey({kDlcPrefsSubDir, dlc_id, kPrefsPingActive}); |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 716 | if (!prefs->GetInt64(ping_active_key, &dlc_params.ping_active) || |
| 717 | dlc_params.ping_active != kPingActiveValue) { |
| 718 | dlc_params.ping_active = kPingInactiveValue; |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 719 | } |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 720 | auto ping_last_active_key = |
Jae Hoon Kim | c1f3692 | 2020-05-11 18:20:18 -0700 | [diff] [blame] | 721 | prefs->CreateSubKey({kDlcPrefsSubDir, dlc_id, kPrefsPingLastActive}); |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 722 | dlc_params.ping_date_last_active = GetPingMetadata(ping_last_active_key); |
| 723 | |
Jae Hoon Kim | c1f3692 | 2020-05-11 18:20:18 -0700 | [diff] [blame] | 724 | auto ping_last_rollcall_key = prefs->CreateSubKey( |
| 725 | {kDlcPrefsSubDir, dlc_id, kPrefsPingLastRollcall}); |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 726 | dlc_params.ping_date_last_rollcall = |
| 727 | GetPingMetadata(ping_last_rollcall_key); |
| 728 | |
| 729 | dlc_params.send_ping = true; |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 730 | } |
| 731 | dlc_apps_params[omaha_request_params_->GetDlcAppId(dlc_id)] = dlc_params; |
| 732 | } |
| 733 | omaha_request_params_->set_dlc_apps_params(dlc_apps_params); |
Amin Hassani | e815363 | 2020-10-27 15:11:28 -0700 | [diff] [blame] | 734 | omaha_request_params_->set_is_install(is_install_); |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 735 | } |
| 736 | |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 737 | void UpdateAttempter::BuildUpdateActions(bool interactive) { |
Darin Petkov | f42cc1c | 2010-09-01 09:03:02 -0700 | [diff] [blame] | 738 | CHECK(!processor_->IsRunning()); |
| 739 | processor_->set_delegate(this); |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 740 | |
Jae Hoon Kim | edb6550 | 2019-06-14 11:52:17 -0700 | [diff] [blame] | 741 | // The session ID needs to be kept throughout the update flow. The value |
| 742 | // of the session ID will reset/update only when it is a new update flow. |
| 743 | session_id_ = base::GenerateGUID(); |
| 744 | |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 745 | // Actions: |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 746 | auto update_check_fetcher = std::make_unique<LibcurlHttpFetcher>( |
| 747 | GetProxyResolver(), system_state_->hardware()); |
Alex Deymo | 33e91e7 | 2015-12-01 18:26:08 -0300 | [diff] [blame] | 748 | update_check_fetcher->set_server_to_check(ServerToCheck::kUpdate); |
Andrew de los Reyes | fb2f461 | 2011-06-09 18:21:49 -0700 | [diff] [blame] | 749 | // Try harder to connect to the network, esp when not interactive. |
| 750 | // See comment in libcurl_http_fetcher.cc. |
| 751 | update_check_fetcher->set_no_network_max_retries(interactive ? 1 : 3); |
Xiaochu Liu | 4a1173a | 2019-04-10 10:49:08 -0700 | [diff] [blame] | 752 | update_check_fetcher->set_is_update_check(true); |
Jae Hoon Kim | edb6550 | 2019-06-14 11:52:17 -0700 | [diff] [blame] | 753 | auto update_check_action = |
| 754 | std::make_unique<OmahaRequestAction>(system_state_, |
| 755 | nullptr, |
| 756 | std::move(update_check_fetcher), |
| 757 | false, |
| 758 | session_id_); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 759 | auto response_handler_action = |
| 760 | std::make_unique<OmahaResponseHandlerAction>(system_state_); |
Amin Hassani | 0882a51 | 2018-04-05 16:25:44 -0700 | [diff] [blame] | 761 | auto update_boot_flags_action = |
| 762 | std::make_unique<UpdateBootFlagsAction>(system_state_->boot_control()); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 763 | auto download_started_action = std::make_unique<OmahaRequestAction>( |
Sen Jiang | 1841408 | 2018-01-11 14:50:36 -0800 | [diff] [blame] | 764 | system_state_, |
| 765 | new OmahaEvent(OmahaEvent::kTypeUpdateDownloadStarted), |
| 766 | std::make_unique<LibcurlHttpFetcher>(GetProxyResolver(), |
| 767 | system_state_->hardware()), |
Jae Hoon Kim | edb6550 | 2019-06-14 11:52:17 -0700 | [diff] [blame] | 768 | false, |
| 769 | session_id_); |
Alex Deymo | 33e91e7 | 2015-12-01 18:26:08 -0300 | [diff] [blame] | 770 | |
Bruno Rocha | 7f9aea2 | 2011-09-12 14:31:24 -0700 | [diff] [blame] | 771 | LibcurlHttpFetcher* download_fetcher = |
Alex Deymo | 33e91e7 | 2015-12-01 18:26:08 -0300 | [diff] [blame] | 772 | new LibcurlHttpFetcher(GetProxyResolver(), system_state_->hardware()); |
| 773 | download_fetcher->set_server_to_check(ServerToCheck::kDownload); |
Sen Jiang | ee174a1 | 2017-12-21 17:38:08 -0800 | [diff] [blame] | 774 | if (interactive) |
| 775 | download_fetcher->set_max_retry_count(kDownloadMaxRetryCountInteractive); |
Jae Hoon Kim | 0ae8fe1 | 2019-06-26 14:32:50 -0700 | [diff] [blame] | 776 | download_fetcher->SetHeader(kXGoogleUpdateSessionId, session_id_); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 777 | auto download_action = |
| 778 | std::make_unique<DownloadAction>(prefs_, |
| 779 | system_state_->boot_control(), |
| 780 | system_state_->hardware(), |
| 781 | system_state_, |
| 782 | download_fetcher, // passes ownership |
| 783 | interactive); |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 784 | download_action->set_delegate(this); |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 785 | |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 786 | auto download_finished_action = std::make_unique<OmahaRequestAction>( |
| 787 | system_state_, |
| 788 | new OmahaEvent(OmahaEvent::kTypeUpdateDownloadFinished), |
| 789 | std::make_unique<LibcurlHttpFetcher>(GetProxyResolver(), |
| 790 | system_state_->hardware()), |
Jae Hoon Kim | edb6550 | 2019-06-14 11:52:17 -0700 | [diff] [blame] | 791 | false, |
| 792 | session_id_); |
Tianjie | 24f9609 | 2020-06-30 12:26:25 -0700 | [diff] [blame] | 793 | auto filesystem_verifier_action = std::make_unique<FilesystemVerifierAction>( |
| 794 | system_state_->boot_control()->GetDynamicPartitionControl()); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 795 | auto update_complete_action = std::make_unique<OmahaRequestAction>( |
| 796 | system_state_, |
| 797 | new OmahaEvent(OmahaEvent::kTypeUpdateComplete), |
| 798 | std::make_unique<LibcurlHttpFetcher>(GetProxyResolver(), |
| 799 | system_state_->hardware()), |
Jae Hoon Kim | edb6550 | 2019-06-14 11:52:17 -0700 | [diff] [blame] | 800 | false, |
| 801 | session_id_); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 802 | |
| 803 | auto postinstall_runner_action = std::make_unique<PostinstallRunnerAction>( |
| 804 | system_state_->boot_control(), system_state_->hardware()); |
| 805 | postinstall_runner_action->set_delegate(this); |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 806 | |
| 807 | // Bond them together. We have to use the leaf-types when calling |
| 808 | // BondActions(). |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 809 | BondActions(update_check_action.get(), response_handler_action.get()); |
| 810 | BondActions(response_handler_action.get(), download_action.get()); |
| 811 | BondActions(download_action.get(), filesystem_verifier_action.get()); |
| 812 | BondActions(filesystem_verifier_action.get(), |
| 813 | postinstall_runner_action.get()); |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 814 | |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 815 | processor_->EnqueueAction(std::move(update_check_action)); |
| 816 | processor_->EnqueueAction(std::move(response_handler_action)); |
Amin Hassani | 0882a51 | 2018-04-05 16:25:44 -0700 | [diff] [blame] | 817 | processor_->EnqueueAction(std::move(update_boot_flags_action)); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 818 | processor_->EnqueueAction(std::move(download_started_action)); |
| 819 | processor_->EnqueueAction(std::move(download_action)); |
| 820 | processor_->EnqueueAction(std::move(download_finished_action)); |
| 821 | processor_->EnqueueAction(std::move(filesystem_verifier_action)); |
| 822 | processor_->EnqueueAction(std::move(postinstall_runner_action)); |
| 823 | processor_->EnqueueAction(std::move(update_complete_action)); |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 824 | } |
| 825 | |
Chris Sosa | 44b9b7e | 2014-04-02 13:53:46 -0700 | [diff] [blame] | 826 | bool UpdateAttempter::Rollback(bool powerwash) { |
Colin Howes | 978c108 | 2018-12-03 11:46:12 -0800 | [diff] [blame] | 827 | is_install_ = false; |
Chris Sosa | 44b9b7e | 2014-04-02 13:53:46 -0700 | [diff] [blame] | 828 | if (!CanRollback()) { |
| 829 | return false; |
| 830 | } |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 831 | |
Chris Sosa | 44b9b7e | 2014-04-02 13:53:46 -0700 | [diff] [blame] | 832 | // Extra check for enterprise-enrolled devices since they don't support |
| 833 | // powerwash. |
| 834 | if (powerwash) { |
| 835 | // Enterprise-enrolled devices have an empty owner in their device policy. |
| 836 | string owner; |
| 837 | RefreshDevicePolicy(); |
| 838 | const policy::DevicePolicy* device_policy = system_state_->device_policy(); |
| 839 | if (device_policy && (!device_policy->GetOwner(&owner) || owner.empty())) { |
| 840 | LOG(ERROR) << "Enterprise device detected. " |
| 841 | << "Cannot perform a powerwash for enterprise devices."; |
| 842 | return false; |
| 843 | } |
| 844 | } |
| 845 | |
| 846 | processor_->set_delegate(this); |
Chris Sosa | aa18e16 | 2013-06-20 13:20:30 -0700 | [diff] [blame] | 847 | |
Chris Sosa | 28e479c | 2013-07-12 11:39:53 -0700 | [diff] [blame] | 848 | // Initialize the default request params. |
Amin Hassani | e815363 | 2020-10-27 15:11:28 -0700 | [diff] [blame] | 849 | if (!omaha_request_params_->Init("", "", {.interactive = true})) { |
Chris Sosa | 28e479c | 2013-07-12 11:39:53 -0700 | [diff] [blame] | 850 | LOG(ERROR) << "Unable to initialize Omaha request params."; |
| 851 | return false; |
| 852 | } |
| 853 | |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 854 | LOG(INFO) << "Setting rollback options."; |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 855 | install_plan_.reset(new InstallPlan()); |
| 856 | install_plan_->target_slot = GetRollbackSlot(); |
| 857 | install_plan_->source_slot = system_state_->boot_control()->GetCurrentSlot(); |
Chris Sosa | 76a29ae | 2013-07-11 17:59:24 -0700 | [diff] [blame] | 858 | |
Alex Deymo | 706a5ab | 2015-11-23 17:48:30 -0300 | [diff] [blame] | 859 | TEST_AND_RETURN_FALSE( |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 860 | install_plan_->LoadPartitionsFromSlots(system_state_->boot_control())); |
| 861 | install_plan_->powerwash_required = powerwash; |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 862 | |
| 863 | LOG(INFO) << "Using this install plan:"; |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 864 | install_plan_->Dump(); |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 865 | |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 866 | auto install_plan_action = |
| 867 | std::make_unique<InstallPlanAction>(*install_plan_); |
| 868 | auto postinstall_runner_action = std::make_unique<PostinstallRunnerAction>( |
| 869 | system_state_->boot_control(), system_state_->hardware()); |
| 870 | postinstall_runner_action->set_delegate(this); |
| 871 | BondActions(install_plan_action.get(), postinstall_runner_action.get()); |
| 872 | processor_->EnqueueAction(std::move(install_plan_action)); |
| 873 | processor_->EnqueueAction(std::move(postinstall_runner_action)); |
Chris Sosa | aa18e16 | 2013-06-20 13:20:30 -0700 | [diff] [blame] | 874 | |
| 875 | // Update the payload state for Rollback. |
| 876 | system_state_->payload_state()->Rollback(); |
| 877 | |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 878 | SetStatusAndNotify(UpdateStatus::ATTEMPTING_ROLLBACK); |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 879 | |
Amin Hassani | 0882a51 | 2018-04-05 16:25:44 -0700 | [diff] [blame] | 880 | ScheduleProcessingStart(); |
Chris Sosa | aa18e16 | 2013-06-20 13:20:30 -0700 | [diff] [blame] | 881 | return true; |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 882 | } |
| 883 | |
Alex Vakulenko | 59e253e | 2014-02-24 10:40:21 -0800 | [diff] [blame] | 884 | bool UpdateAttempter::CanRollback() const { |
Chris Sosa | 44b9b7e | 2014-04-02 13:53:46 -0700 | [diff] [blame] | 885 | // We can only rollback if the update_engine isn't busy and we have a valid |
| 886 | // rollback partition. |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 887 | return (status_ == UpdateStatus::IDLE && |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 888 | GetRollbackSlot() != BootControlInterface::kInvalidSlot); |
Alex Vakulenko | 2bddadd | 2014-03-27 13:23:46 -0700 | [diff] [blame] | 889 | } |
| 890 | |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 891 | BootControlInterface::Slot UpdateAttempter::GetRollbackSlot() const { |
| 892 | LOG(INFO) << "UpdateAttempter::GetRollbackSlot"; |
| 893 | const unsigned int num_slots = system_state_->boot_control()->GetNumSlots(); |
| 894 | const BootControlInterface::Slot current_slot = |
| 895 | system_state_->boot_control()->GetCurrentSlot(); |
Alex Vakulenko | 59e253e | 2014-02-24 10:40:21 -0800 | [diff] [blame] | 896 | |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 897 | LOG(INFO) << " Installed slots: " << num_slots; |
| 898 | LOG(INFO) << " Booted from slot: " |
| 899 | << BootControlInterface::SlotName(current_slot); |
Alex Vakulenko | 59e253e | 2014-02-24 10:40:21 -0800 | [diff] [blame] | 900 | |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 901 | if (current_slot == BootControlInterface::kInvalidSlot || num_slots < 2) { |
| 902 | LOG(INFO) << "Device is not updateable."; |
| 903 | return BootControlInterface::kInvalidSlot; |
Alex Vakulenko | 59e253e | 2014-02-24 10:40:21 -0800 | [diff] [blame] | 904 | } |
| 905 | |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 906 | vector<BootControlInterface::Slot> bootable_slots; |
Alex Deymo | f7ead81 | 2015-10-23 17:37:27 -0700 | [diff] [blame] | 907 | for (BootControlInterface::Slot slot = 0; slot < num_slots; slot++) { |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 908 | if (slot != current_slot && |
| 909 | system_state_->boot_control()->IsSlotBootable(slot)) { |
| 910 | LOG(INFO) << "Found bootable slot " |
| 911 | << BootControlInterface::SlotName(slot); |
| 912 | return slot; |
Alex Vakulenko | 59e253e | 2014-02-24 10:40:21 -0800 | [diff] [blame] | 913 | } |
| 914 | } |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 915 | LOG(INFO) << "No other bootable slot found."; |
| 916 | return BootControlInterface::kInvalidSlot; |
Alex Vakulenko | 2bddadd | 2014-03-27 13:23:46 -0700 | [diff] [blame] | 917 | } |
| 918 | |
Aaron Wood | 081c023 | 2017-10-19 17:14:58 -0700 | [diff] [blame] | 919 | bool UpdateAttempter::CheckForUpdate(const string& app_version, |
Jay Srinivasan | e73acab | 2012-07-10 14:34:03 -0700 | [diff] [blame] | 920 | const string& omaha_url, |
Aaron Wood | 081c023 | 2017-10-19 17:14:58 -0700 | [diff] [blame] | 921 | UpdateAttemptFlags flags) { |
Jae Hoon Kim | c437ea5 | 2019-07-11 11:20:38 -0700 | [diff] [blame] | 922 | if (status_ != UpdateStatus::IDLE) { |
| 923 | LOG(INFO) << "Refusing to do an update as there is an " |
| 924 | << (is_install_ ? "install" : "update") |
| 925 | << " already in progress."; |
Aaron Wood | 081c023 | 2017-10-19 17:14:58 -0700 | [diff] [blame] | 926 | return false; |
| 927 | } |
| 928 | |
Jae Hoon Kim | c437ea5 | 2019-07-11 11:20:38 -0700 | [diff] [blame] | 929 | bool interactive = !(flags & UpdateAttemptFlags::kFlagNonInteractive); |
Jae Hoon Kim | c437ea5 | 2019-07-11 11:20:38 -0700 | [diff] [blame] | 930 | is_install_ = false; |
| 931 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 932 | LOG(INFO) << "Forced update check requested."; |
David Pursell | 02c1864 | 2014-11-06 11:26:11 -0800 | [diff] [blame] | 933 | forced_app_version_.clear(); |
| 934 | forced_omaha_url_.clear(); |
| 935 | |
| 936 | // Certain conditions must be met to allow setting custom version and update |
| 937 | // server URLs. However, kScheduledAUTestURLRequest and kAUTestURLRequest are |
| 938 | // always allowed regardless of device state. |
| 939 | if (IsAnyUpdateSourceAllowed()) { |
| 940 | forced_app_version_ = app_version; |
| 941 | forced_omaha_url_ = omaha_url; |
| 942 | } |
| 943 | if (omaha_url == kScheduledAUTestURLRequest) { |
Alex Deymo | ac41a82 | 2015-09-15 20:52:53 -0700 | [diff] [blame] | 944 | forced_omaha_url_ = constants::kOmahaDefaultAUTestURL; |
David Pursell | 02c1864 | 2014-11-06 11:26:11 -0800 | [diff] [blame] | 945 | // Pretend that it's not user-initiated even though it is, |
| 946 | // so as to test scattering logic, etc. which get kicked off |
| 947 | // only in scheduled update checks. |
| 948 | interactive = false; |
| 949 | } else if (omaha_url == kAUTestURLRequest) { |
Alex Deymo | ac41a82 | 2015-09-15 20:52:53 -0700 | [diff] [blame] | 950 | forced_omaha_url_ = constants::kOmahaDefaultAUTestURL; |
David Pursell | 02c1864 | 2014-11-06 11:26:11 -0800 | [diff] [blame] | 951 | } |
| 952 | |
Aaron Wood | 081c023 | 2017-10-19 17:14:58 -0700 | [diff] [blame] | 953 | if (interactive) { |
| 954 | // Use the passed-in update attempt flags for this update attempt instead |
| 955 | // of the previously set ones. |
| 956 | current_update_attempt_flags_ = flags; |
| 957 | // Note: The caching for non-interactive update checks happens in |
Jae Hoon Kim | 75daa38 | 2019-07-02 11:17:24 -0700 | [diff] [blame] | 958 | // |OnUpdateScheduled()|. |
Aaron Wood | 081c023 | 2017-10-19 17:14:58 -0700 | [diff] [blame] | 959 | } |
| 960 | |
Jae Hoon Kim | 2b73ac2 | 2019-07-02 11:17:24 -0700 | [diff] [blame] | 961 | // |forced_update_pending_callback_| should always be set, but even in the |
| 962 | // case that it is not, we still return true indicating success because the |
| 963 | // scheduled periodic check will pick up these changes. |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 964 | if (forced_update_pending_callback_.get()) { |
Jae Hoon Kim | 2b73ac2 | 2019-07-02 11:17:24 -0700 | [diff] [blame] | 965 | // Always call |ScheduleUpdates()| before forcing an update. This is because |
| 966 | // we need an update to be scheduled for the |
| 967 | // |forced_update_pending_callback_| to have an effect. Here we don't need |
| 968 | // to care about the return value from |ScheduleUpdate()|. |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 969 | ScheduleUpdates(); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 970 | forced_update_pending_callback_->Run(true, interactive); |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 971 | } |
Aaron Wood | 081c023 | 2017-10-19 17:14:58 -0700 | [diff] [blame] | 972 | return true; |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 973 | } |
| 974 | |
Amin Hassani | 2b68e6b | 2020-04-17 10:49:12 -0700 | [diff] [blame] | 975 | bool UpdateAttempter::CheckForInstall(const vector<string>& dlc_ids, |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 976 | const string& omaha_url) { |
Jae Hoon Kim | c437ea5 | 2019-07-11 11:20:38 -0700 | [diff] [blame] | 977 | if (status_ != UpdateStatus::IDLE) { |
| 978 | LOG(INFO) << "Refusing to do an install as there is an " |
| 979 | << (is_install_ ? "install" : "update") |
| 980 | << " already in progress."; |
| 981 | return false; |
| 982 | } |
| 983 | |
Amin Hassani | 2b68e6b | 2020-04-17 10:49:12 -0700 | [diff] [blame] | 984 | dlc_ids_ = dlc_ids; |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 985 | is_install_ = true; |
| 986 | forced_omaha_url_.clear(); |
| 987 | |
| 988 | // Certain conditions must be met to allow setting custom version and update |
| 989 | // server URLs. However, kScheduledAUTestURLRequest and kAUTestURLRequest are |
| 990 | // always allowed regardless of device state. |
| 991 | if (IsAnyUpdateSourceAllowed()) { |
| 992 | forced_omaha_url_ = omaha_url; |
| 993 | } |
Jae Hoon Kim | c43f6bb | 2019-07-03 12:56:52 -0700 | [diff] [blame] | 994 | |
| 995 | if (omaha_url == kScheduledAUTestURLRequest || |
| 996 | omaha_url == kAUTestURLRequest) { |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 997 | forced_omaha_url_ = constants::kOmahaDefaultAUTestURL; |
| 998 | } |
| 999 | |
Jae Hoon Kim | 2b73ac2 | 2019-07-02 11:17:24 -0700 | [diff] [blame] | 1000 | // |forced_update_pending_callback_| should always be set, but even in the |
| 1001 | // case that it is not, we still return true indicating success because the |
| 1002 | // scheduled periodic check will pick up these changes. |
| 1003 | if (forced_update_pending_callback_.get()) { |
| 1004 | // Always call |ScheduleUpdates()| before forcing an update. This is because |
| 1005 | // we need an update to be scheduled for the |
| 1006 | // |forced_update_pending_callback_| to have an effect. Here we don't need |
| 1007 | // to care about the return value from |ScheduleUpdate()|. |
| 1008 | ScheduleUpdates(); |
| 1009 | forced_update_pending_callback_->Run(true, true); |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 1010 | } |
| 1011 | return true; |
| 1012 | } |
| 1013 | |
Darin Petkov | 296889c | 2010-07-23 16:20:54 -0700 | [diff] [blame] | 1014 | bool UpdateAttempter::RebootIfNeeded() { |
Sen Jiang | b8c6a8f | 2016-06-07 17:33:17 -0700 | [diff] [blame] | 1015 | if (system_state_->power_manager()->RequestReboot()) |
Daniel Erat | 65f1da0 | 2014-06-27 22:05:38 -0700 | [diff] [blame] | 1016 | return true; |
| 1017 | |
| 1018 | return RebootDirectly(); |
Darin Petkov | 296889c | 2010-07-23 16:20:54 -0700 | [diff] [blame] | 1019 | } |
| 1020 | |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 1021 | void UpdateAttempter::WriteUpdateCompletedMarker() { |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 1022 | string boot_id; |
| 1023 | if (!utils::GetBootId(&boot_id)) |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 1024 | return; |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 1025 | prefs_->SetString(kPrefsUpdateCompletedOnBootId, boot_id); |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 1026 | |
| 1027 | int64_t value = system_state_->clock()->GetBootTime().ToInternalValue(); |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 1028 | prefs_->SetInt64(kPrefsUpdateCompletedBootTime, value); |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 1029 | } |
| 1030 | |
Daniel Erat | 65f1da0 | 2014-06-27 22:05:38 -0700 | [diff] [blame] | 1031 | bool UpdateAttempter::RebootDirectly() { |
Amin Hassani | 3a4caa1 | 2019-11-06 11:12:28 -0800 | [diff] [blame] | 1032 | vector<string> command = {"/sbin/shutdown", "-r", "now"}; |
Daniel Erat | 65f1da0 | 2014-06-27 22:05:38 -0700 | [diff] [blame] | 1033 | int rc = 0; |
Amin Hassani | 3a4caa1 | 2019-11-06 11:12:28 -0800 | [diff] [blame] | 1034 | Subprocess::SynchronousExec(command, &rc, nullptr, nullptr); |
Daniel Erat | 65f1da0 | 2014-06-27 22:05:38 -0700 | [diff] [blame] | 1035 | return rc == 0; |
| 1036 | } |
| 1037 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 1038 | void UpdateAttempter::OnUpdateScheduled(EvalStatus status, |
| 1039 | const UpdateCheckParams& params) { |
| 1040 | waiting_for_scheduled_check_ = false; |
| 1041 | |
| 1042 | if (status == EvalStatus::kSucceeded) { |
| 1043 | if (!params.updates_enabled) { |
| 1044 | LOG(WARNING) << "Updates permanently disabled."; |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1045 | // Signal disabled status, then switch right back to idle. This is |
| 1046 | // necessary for ensuring that observers waiting for a signal change will |
| 1047 | // actually notice one on subsequent calls. Note that we don't need to |
| 1048 | // re-schedule a check in this case as updates are permanently disabled; |
| 1049 | // further (forced) checks may still initiate a scheduling call. |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1050 | SetStatusAndNotify(UpdateStatus::DISABLED); |
| 1051 | SetStatusAndNotify(UpdateStatus::IDLE); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 1052 | return; |
| 1053 | } |
| 1054 | |
Amin Hassani | ed37d68 | 2018-04-06 13:22:00 -0700 | [diff] [blame] | 1055 | LOG(INFO) << "Running " << (params.interactive ? "interactive" : "periodic") |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 1056 | << " update."; |
| 1057 | |
Amin Hassani | ed37d68 | 2018-04-06 13:22:00 -0700 | [diff] [blame] | 1058 | if (!params.interactive) { |
Aaron Wood | 081c023 | 2017-10-19 17:14:58 -0700 | [diff] [blame] | 1059 | // Cache the update attempt flags that will be used by this update attempt |
| 1060 | // so that they can't be changed mid-way through. |
| 1061 | current_update_attempt_flags_ = update_attempt_flags_; |
| 1062 | } |
| 1063 | |
Aaron Wood | bf5a252 | 2017-10-04 10:58:36 -0700 | [diff] [blame] | 1064 | LOG(INFO) << "Update attempt flags in use = 0x" << std::hex |
| 1065 | << current_update_attempt_flags_; |
| 1066 | |
Amin Hassani | e815363 | 2020-10-27 15:11:28 -0700 | [diff] [blame] | 1067 | Update(params); |
Alex Deymo | 7147908 | 2016-03-25 17:54:28 -0700 | [diff] [blame] | 1068 | // Always clear the forced app_version and omaha_url after an update attempt |
| 1069 | // so the next update uses the defaults. |
| 1070 | forced_app_version_.clear(); |
| 1071 | forced_omaha_url_.clear(); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 1072 | } else { |
| 1073 | LOG(WARNING) |
| 1074 | << "Update check scheduling failed (possibly timed out); retrying."; |
| 1075 | ScheduleUpdates(); |
| 1076 | } |
| 1077 | |
| 1078 | // This check ensures that future update checks will be or are already |
| 1079 | // scheduled. The check should never fail. A check failure means that there's |
| 1080 | // a bug that will most likely prevent further automatic update checks. It |
| 1081 | // seems better to crash in such cases and restart the update_engine daemon |
| 1082 | // into, hopefully, a known good state. |
Jae Hoon Kim | ba2fdce | 2019-07-11 13:18:58 -0700 | [diff] [blame] | 1083 | CHECK(IsBusyOrUpdateScheduled()); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 1084 | } |
| 1085 | |
| 1086 | void UpdateAttempter::UpdateLastCheckedTime() { |
| 1087 | last_checked_time_ = system_state_->clock()->GetWallclockTime().ToTimeT(); |
| 1088 | } |
| 1089 | |
Marton Hunyady | e58bddb | 2018-04-10 20:27:26 +0200 | [diff] [blame] | 1090 | void UpdateAttempter::UpdateRollbackHappened() { |
| 1091 | DCHECK(system_state_); |
| 1092 | DCHECK(system_state_->payload_state()); |
| 1093 | DCHECK(policy_provider_); |
| 1094 | if (system_state_->payload_state()->GetRollbackHappened() && |
| 1095 | (policy_provider_->device_policy_is_loaded() || |
| 1096 | policy_provider_->IsConsumerDevice())) { |
| 1097 | // Rollback happened, but we already went through OOBE and policy is |
| 1098 | // present or it's a consumer device. |
| 1099 | system_state_->payload_state()->SetRollbackHappened(false); |
| 1100 | } |
| 1101 | } |
| 1102 | |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1103 | void UpdateAttempter::ProcessingDoneInternal(const ActionProcessor* processor, |
| 1104 | ErrorCode code) { |
Chris Sosa | 4f8ee27 | 2012-11-30 13:01:54 -0800 | [diff] [blame] | 1105 | // Reset cpu shares back to normal. |
Alex Deymo | ab0d976 | 2016-02-02 10:52:56 -0800 | [diff] [blame] | 1106 | cpu_limiter_.StopLimiter(); |
Darin Petkov | c6c135c | 2010-08-11 13:36:18 -0700 | [diff] [blame] | 1107 | |
Amin Hassani | ecb60d3 | 2019-06-17 18:09:10 -0700 | [diff] [blame] | 1108 | ResetInteractivityFlags(); |
Adolfo Victoria | 20262ad | 2018-08-06 10:40:11 -0700 | [diff] [blame] | 1109 | |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1110 | if (status_ == UpdateStatus::REPORTING_ERROR_EVENT) { |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1111 | LOG(INFO) << "Error event sent."; |
Gilad Arnold | 1ebd813 | 2012-03-05 10:19:29 -0800 | [diff] [blame] | 1112 | |
Amin Hassani | ecb60d3 | 2019-06-17 18:09:10 -0700 | [diff] [blame] | 1113 | // Inform scheduler of new status. |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1114 | SetStatusAndNotify(UpdateStatus::IDLE); |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1115 | ScheduleUpdates(); |
Gilad Arnold | 1ebd813 | 2012-03-05 10:19:29 -0800 | [diff] [blame] | 1116 | |
Andrew de los Reyes | c1d5c93 | 2011-04-20 17:15:47 -0700 | [diff] [blame] | 1117 | if (!fake_update_success_) { |
| 1118 | return; |
| 1119 | } |
| 1120 | LOG(INFO) << "Booted from FW B and tried to install new firmware, " |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 1121 | "so requesting reboot from user."; |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1122 | } |
| 1123 | |
Sen Jiang | 89e24c1 | 2018-03-22 18:05:44 -0700 | [diff] [blame] | 1124 | attempt_error_code_ = utils::GetBaseErrorCode(code); |
| 1125 | |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1126 | if (code != ErrorCode::kSuccess) { |
| 1127 | if (ScheduleErrorEventAction()) { |
Colin Howes | ac170d9 | 2018-11-20 16:29:28 -0800 | [diff] [blame] | 1128 | return; |
| 1129 | } |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1130 | LOG(INFO) << "No update."; |
| 1131 | SetStatusAndNotify(UpdateStatus::IDLE); |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1132 | ScheduleUpdates(); |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1133 | return; |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 1134 | } |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1135 | |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1136 | ReportTimeToUpdateAppliedMetric(); |
| 1137 | prefs_->SetInt64(kPrefsDeltaUpdateFailures, 0); |
| 1138 | prefs_->SetString(kPrefsPreviousVersion, |
| 1139 | omaha_request_params_->app_version()); |
| 1140 | DeltaPerformer::ResetUpdateProgress(prefs_, false); |
| 1141 | |
| 1142 | system_state_->payload_state()->UpdateSucceeded(); |
| 1143 | |
| 1144 | // Since we're done with scattering fully at this point, this is the |
| 1145 | // safest point delete the state files, as we're sure that the status is |
| 1146 | // set to reboot (which means no more updates will be applied until reboot) |
| 1147 | // This deletion is required for correctness as we want the next update |
| 1148 | // check to re-create a new random number for the update check count. |
| 1149 | // Similarly, we also delete the wall-clock-wait period that was persisted |
| 1150 | // so that we start with a new random value for the next update check |
| 1151 | // after reboot so that the same device is not favored or punished in any |
| 1152 | // way. |
| 1153 | prefs_->Delete(kPrefsUpdateCheckCount); |
| 1154 | system_state_->payload_state()->SetScatteringWaitPeriod(TimeDelta()); |
| 1155 | system_state_->payload_state()->SetStagingWaitPeriod(TimeDelta()); |
| 1156 | prefs_->Delete(kPrefsUpdateFirstSeenAt); |
| 1157 | |
| 1158 | // Note: below this comment should only be on |ErrorCode::kSuccess|. |
| 1159 | if (is_install_) { |
| 1160 | ProcessingDoneInstall(processor, code); |
| 1161 | } else { |
| 1162 | ProcessingDoneUpdate(processor, code); |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 1163 | } |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1164 | } |
| 1165 | |
Jae Hoon Kim | 7fdfbf1 | 2020-04-10 18:15:50 -0700 | [diff] [blame] | 1166 | vector<string> UpdateAttempter::GetSuccessfulDlcIds() { |
| 1167 | vector<string> dlc_ids; |
| 1168 | for (const auto& pr : omaha_request_params_->dlc_apps_params()) |
| 1169 | if (pr.second.updated) |
| 1170 | dlc_ids.push_back(pr.second.name); |
| 1171 | return dlc_ids; |
| 1172 | } |
| 1173 | |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1174 | void UpdateAttempter::ProcessingDoneInstall(const ActionProcessor* processor, |
| 1175 | ErrorCode code) { |
Jae Hoon Kim | 7fdfbf1 | 2020-04-10 18:15:50 -0700 | [diff] [blame] | 1176 | if (!system_state_->dlcservice()->InstallCompleted(GetSuccessfulDlcIds())) |
| 1177 | LOG(WARNING) << "dlcservice didn't successfully handle install completion."; |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1178 | SetStatusAndNotify(UpdateStatus::IDLE); |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1179 | ScheduleUpdates(); |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1180 | LOG(INFO) << "DLC successfully installed, no reboot needed."; |
| 1181 | } |
| 1182 | |
| 1183 | void UpdateAttempter::ProcessingDoneUpdate(const ActionProcessor* processor, |
| 1184 | ErrorCode code) { |
| 1185 | WriteUpdateCompletedMarker(); |
| 1186 | |
Jae Hoon Kim | 7fdfbf1 | 2020-04-10 18:15:50 -0700 | [diff] [blame] | 1187 | if (!system_state_->dlcservice()->UpdateCompleted(GetSuccessfulDlcIds())) |
| 1188 | LOG(WARNING) << "dlcservice didn't successfully handle update completion."; |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1189 | SetStatusAndNotify(UpdateStatus::UPDATED_NEED_REBOOT); |
| 1190 | ScheduleUpdates(); |
| 1191 | LOG(INFO) << "Update successfully applied, waiting to reboot."; |
| 1192 | |
| 1193 | // |install_plan_| is null during rollback operations, and the stats don't |
| 1194 | // make much sense then anyway. |
| 1195 | if (install_plan_) { |
| 1196 | // Generate an unique payload identifier. |
| 1197 | string target_version_uid; |
| 1198 | for (const auto& payload : install_plan_->payloads) { |
| 1199 | target_version_uid += brillo::data_encoding::Base64Encode(payload.hash) + |
| 1200 | ":" + payload.metadata_signature + ":"; |
| 1201 | } |
| 1202 | |
| 1203 | // If we just downloaded a rollback image, we should preserve this fact |
| 1204 | // over the following powerwash. |
| 1205 | if (install_plan_->is_rollback) { |
| 1206 | system_state_->payload_state()->SetRollbackHappened(true); |
| 1207 | system_state_->metrics_reporter()->ReportEnterpriseRollbackMetrics( |
| 1208 | /*success=*/true, install_plan_->version); |
| 1209 | } |
| 1210 | |
| 1211 | // Expect to reboot into the new version to send the proper metric during |
| 1212 | // next boot. |
| 1213 | system_state_->payload_state()->ExpectRebootInNewVersion( |
| 1214 | target_version_uid); |
| 1215 | } else { |
| 1216 | // If we just finished a rollback, then we expect to have no Omaha |
| 1217 | // response. Otherwise, it's an error. |
| 1218 | if (system_state_->payload_state()->GetRollbackVersion().empty()) { |
| 1219 | LOG(ERROR) << "Can't send metrics because there was no Omaha response"; |
| 1220 | } |
| 1221 | } |
| 1222 | } |
| 1223 | |
| 1224 | // Delegate methods: |
| 1225 | void UpdateAttempter::ProcessingDone(const ActionProcessor* processor, |
| 1226 | ErrorCode code) { |
| 1227 | LOG(INFO) << "Processing Done."; |
| 1228 | ProcessingDoneInternal(processor, code); |
| 1229 | |
| 1230 | // Note: do cleanups here for any variables that need to be reset after a |
| 1231 | // failure, error, update, or install. |
| 1232 | is_install_ = false; |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1233 | } |
| 1234 | |
| 1235 | void UpdateAttempter::ProcessingStopped(const ActionProcessor* processor) { |
Chris Sosa | 4f8ee27 | 2012-11-30 13:01:54 -0800 | [diff] [blame] | 1236 | // Reset cpu shares back to normal. |
Alex Deymo | ab0d976 | 2016-02-02 10:52:56 -0800 | [diff] [blame] | 1237 | cpu_limiter_.StopLimiter(); |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1238 | download_progress_ = 0.0; |
Amin Hassani | ecb60d3 | 2019-06-17 18:09:10 -0700 | [diff] [blame] | 1239 | |
| 1240 | ResetInteractivityFlags(); |
| 1241 | |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1242 | SetStatusAndNotify(UpdateStatus::IDLE); |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1243 | ScheduleUpdates(); |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 1244 | error_event_.reset(nullptr); |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1245 | } |
| 1246 | |
| 1247 | // Called whenever an action has finished processing, either successfully |
| 1248 | // or otherwise. |
| 1249 | void UpdateAttempter::ActionCompleted(ActionProcessor* processor, |
| 1250 | AbstractAction* action, |
David Zeuthen | a99981f | 2013-04-29 13:42:47 -0700 | [diff] [blame] | 1251 | ErrorCode code) { |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 1252 | // Reset download progress regardless of whether or not the download |
| 1253 | // action succeeded. Also, get the response code from HTTP request |
| 1254 | // actions (update download as well as the initial update check |
| 1255 | // actions). |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1256 | const string type = action->Type(); |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 1257 | if (type == DownloadAction::StaticType()) { |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1258 | download_progress_ = 0.0; |
Gilad Arnold | cf175a0 | 2014-07-10 16:48:47 -0700 | [diff] [blame] | 1259 | DownloadAction* download_action = static_cast<DownloadAction*>(action); |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 1260 | http_response_code_ = download_action->GetHTTPResponseCode(); |
| 1261 | } else if (type == OmahaRequestAction::StaticType()) { |
| 1262 | OmahaRequestAction* omaha_request_action = |
Gilad Arnold | cf175a0 | 2014-07-10 16:48:47 -0700 | [diff] [blame] | 1263 | static_cast<OmahaRequestAction*>(action); |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 1264 | // If the request is not an event, then it's the update-check. |
| 1265 | if (!omaha_request_action->IsEvent()) { |
| 1266 | http_response_code_ = omaha_request_action->GetHTTPResponseCode(); |
Gilad Arnold | a6dab94 | 2014-04-25 11:46:03 -0700 | [diff] [blame] | 1267 | |
| 1268 | // Record the number of consecutive failed update checks. |
| 1269 | if (http_response_code_ == kHttpResponseInternalServerError || |
| 1270 | http_response_code_ == kHttpResponseServiceUnavailable) { |
| 1271 | consecutive_failed_update_checks_++; |
| 1272 | } else { |
| 1273 | consecutive_failed_update_checks_ = 0; |
| 1274 | } |
| 1275 | |
Weidong Guo | 421ff33 | 2017-04-17 10:08:38 -0700 | [diff] [blame] | 1276 | const OmahaResponse& omaha_response = |
| 1277 | omaha_request_action->GetOutputObject(); |
Gilad Arnold | a0258a5 | 2014-07-10 16:21:19 -0700 | [diff] [blame] | 1278 | // Store the server-dictated poll interval, if any. |
| 1279 | server_dictated_poll_interval_ = |
Weidong Guo | 421ff33 | 2017-04-17 10:08:38 -0700 | [diff] [blame] | 1280 | std::max(0, omaha_response.poll_interval); |
| 1281 | |
| 1282 | // This update is ignored by omaha request action because update over |
| 1283 | // cellular connection is not allowed. Needs to ask for user's permissions |
| 1284 | // to update. |
| 1285 | if (code == ErrorCode::kOmahaUpdateIgnoredOverCellular) { |
| 1286 | new_version_ = omaha_response.version; |
| 1287 | new_payload_size_ = 0; |
| 1288 | for (const auto& package : omaha_response.packages) { |
| 1289 | new_payload_size_ += package.size; |
| 1290 | } |
| 1291 | SetStatusAndNotify(UpdateStatus::NEED_PERMISSION_TO_UPDATE); |
| 1292 | } |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 1293 | } |
Aaron Wood | 23bd339 | 2017-10-06 14:48:25 -0700 | [diff] [blame] | 1294 | } else if (type == OmahaResponseHandlerAction::StaticType()) { |
| 1295 | // Depending on the returned error code, note that an update is available. |
| 1296 | if (code == ErrorCode::kOmahaUpdateDeferredPerPolicy || |
| 1297 | code == ErrorCode::kSuccess) { |
| 1298 | // Note that the status will be updated to DOWNLOADING when some bytes |
| 1299 | // get actually downloaded from the server and the BytesReceived |
| 1300 | // callback is invoked. This avoids notifying the user that a download |
| 1301 | // has started in cases when the server and the client are unable to |
| 1302 | // initiate the download. |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1303 | auto omaha_response_handler_action = |
| 1304 | static_cast<OmahaResponseHandlerAction*>(action); |
| 1305 | install_plan_.reset( |
| 1306 | new InstallPlan(omaha_response_handler_action->install_plan())); |
Aaron Wood | 23bd339 | 2017-10-06 14:48:25 -0700 | [diff] [blame] | 1307 | UpdateLastCheckedTime(); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1308 | new_version_ = install_plan_->version; |
Aaron Wood | 23bd339 | 2017-10-06 14:48:25 -0700 | [diff] [blame] | 1309 | new_payload_size_ = 0; |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1310 | for (const auto& payload : install_plan_->payloads) |
Aaron Wood | 23bd339 | 2017-10-06 14:48:25 -0700 | [diff] [blame] | 1311 | new_payload_size_ += payload.size; |
| 1312 | cpu_limiter_.StartLimiter(); |
| 1313 | SetStatusAndNotify(UpdateStatus::UPDATE_AVAILABLE); |
| 1314 | } |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 1315 | } |
Aaron Wood | 23bd339 | 2017-10-06 14:48:25 -0700 | [diff] [blame] | 1316 | // General failure cases. |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1317 | if (code != ErrorCode::kSuccess) { |
Darin Petkov | 7ed561b | 2011-10-04 02:59:03 -0700 | [diff] [blame] | 1318 | // If the current state is at or past the download phase, count the failure |
| 1319 | // in case a switch to full update becomes necessary. Ignore network |
| 1320 | // transfer timeouts and failures. |
Amin Hassani | 89a3712 | 2018-03-23 12:59:24 -0700 | [diff] [blame] | 1321 | if (code != ErrorCode::kDownloadTransferError) { |
| 1322 | switch (status_) { |
| 1323 | case UpdateStatus::IDLE: |
| 1324 | case UpdateStatus::CHECKING_FOR_UPDATE: |
| 1325 | case UpdateStatus::UPDATE_AVAILABLE: |
| 1326 | case UpdateStatus::NEED_PERMISSION_TO_UPDATE: |
| 1327 | break; |
| 1328 | case UpdateStatus::DOWNLOADING: |
| 1329 | case UpdateStatus::VERIFYING: |
| 1330 | case UpdateStatus::FINALIZING: |
| 1331 | case UpdateStatus::UPDATED_NEED_REBOOT: |
| 1332 | case UpdateStatus::REPORTING_ERROR_EVENT: |
| 1333 | case UpdateStatus::ATTEMPTING_ROLLBACK: |
| 1334 | case UpdateStatus::DISABLED: |
Amin Hassani | 70a90f5 | 2020-09-15 15:30:09 -0700 | [diff] [blame] | 1335 | case UpdateStatus::CLEANUP_PREVIOUS_UPDATE: |
Amin Hassani | 89a3712 | 2018-03-23 12:59:24 -0700 | [diff] [blame] | 1336 | MarkDeltaUpdateFailure(); |
| 1337 | break; |
| 1338 | } |
Darin Petkov | 3627577 | 2010-10-01 11:40:57 -0700 | [diff] [blame] | 1339 | } |
Sen Jiang | 89e24c1 | 2018-03-22 18:05:44 -0700 | [diff] [blame] | 1340 | if (code != ErrorCode::kNoUpdate) { |
| 1341 | // On failure, schedule an error event to be sent to Omaha. |
| 1342 | CreatePendingErrorEvent(action, code); |
| 1343 | } |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1344 | return; |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1345 | } |
Aaron Wood | 23bd339 | 2017-10-06 14:48:25 -0700 | [diff] [blame] | 1346 | // Find out which action completed (successfully). |
| 1347 | if (type == DownloadAction::StaticType()) { |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1348 | SetStatusAndNotify(UpdateStatus::FINALIZING); |
Amin Hassani | afd8cea | 2017-12-04 14:20:00 -0800 | [diff] [blame] | 1349 | } else if (type == FilesystemVerifierAction::StaticType()) { |
| 1350 | // Log the system properties before the postinst and after the file system |
| 1351 | // is verified. It used to be done in the postinst itself. But postinst |
| 1352 | // cannot do this anymore. On the other hand, these logs are frequently |
| 1353 | // looked at and it is preferable not to scatter them in random location in |
| 1354 | // the log and rather log it right before the postinst. The reason not do |
| 1355 | // this in the |PostinstallRunnerAction| is to prevent dependency from |
| 1356 | // libpayload_consumer to libupdate_engine. |
| 1357 | LogImageProperties(); |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1358 | } |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 1359 | } |
| 1360 | |
Alex Deymo | 542c19b | 2015-12-03 07:43:31 -0300 | [diff] [blame] | 1361 | void UpdateAttempter::BytesReceived(uint64_t bytes_progressed, |
| 1362 | uint64_t bytes_received, |
| 1363 | uint64_t total) { |
| 1364 | // The PayloadState keeps track of how many bytes were actually downloaded |
| 1365 | // from a given URL for the URL skipping logic. |
| 1366 | system_state_->payload_state()->DownloadProgress(bytes_progressed); |
| 1367 | |
Alex Deymo | 0d29854 | 2016-03-30 18:31:49 -0700 | [diff] [blame] | 1368 | double progress = 0; |
| 1369 | if (total) |
| 1370 | progress = static_cast<double>(bytes_received) / static_cast<double>(total); |
| 1371 | if (status_ != UpdateStatus::DOWNLOADING || bytes_received == total) { |
Darin Petkov | af18305 | 2010-08-23 12:07:13 -0700 | [diff] [blame] | 1372 | download_progress_ = progress; |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1373 | SetStatusAndNotify(UpdateStatus::DOWNLOADING); |
Alex Deymo | 0d29854 | 2016-03-30 18:31:49 -0700 | [diff] [blame] | 1374 | } else { |
| 1375 | ProgressUpdate(progress); |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1376 | } |
| 1377 | } |
| 1378 | |
Alex Deymo | 542c19b | 2015-12-03 07:43:31 -0300 | [diff] [blame] | 1379 | void UpdateAttempter::DownloadComplete() { |
| 1380 | system_state_->payload_state()->DownloadComplete(); |
| 1381 | } |
| 1382 | |
Alex Deymo | 0d29854 | 2016-03-30 18:31:49 -0700 | [diff] [blame] | 1383 | void UpdateAttempter::ProgressUpdate(double progress) { |
| 1384 | // Self throttle based on progress. Also send notifications if progress is |
| 1385 | // too slow. |
| 1386 | if (progress == 1.0 || |
| 1387 | progress - download_progress_ >= kBroadcastThresholdProgress || |
| 1388 | TimeTicks::Now() - last_notify_time_ >= |
| 1389 | TimeDelta::FromSeconds(kBroadcastThresholdSeconds)) { |
| 1390 | download_progress_ = progress; |
| 1391 | BroadcastStatus(); |
| 1392 | } |
| 1393 | } |
| 1394 | |
Amin Hassani | ecb60d3 | 2019-06-17 18:09:10 -0700 | [diff] [blame] | 1395 | void UpdateAttempter::ResetInteractivityFlags() { |
| 1396 | // Reset the state that's only valid for a single update pass. |
| 1397 | current_update_attempt_flags_ = UpdateAttemptFlags::kNone; |
| 1398 | |
| 1399 | if (forced_update_pending_callback_.get()) |
| 1400 | // Clear prior interactive requests once the processor is done. |
| 1401 | forced_update_pending_callback_->Run(false, false); |
| 1402 | } |
| 1403 | |
Jay Srinivasan | c1ba09a | 2012-08-14 14:15:57 -0700 | [diff] [blame] | 1404 | bool UpdateAttempter::ResetStatus() { |
| 1405 | LOG(INFO) << "Attempting to reset state from " |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1406 | << UpdateStatusToString(status_) << " to UpdateStatus::IDLE"; |
Jay Srinivasan | c1ba09a | 2012-08-14 14:15:57 -0700 | [diff] [blame] | 1407 | |
| 1408 | switch (status_) { |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1409 | case UpdateStatus::IDLE: |
Jay Srinivasan | c1ba09a | 2012-08-14 14:15:57 -0700 | [diff] [blame] | 1410 | // no-op. |
| 1411 | return true; |
| 1412 | |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 1413 | case UpdateStatus::UPDATED_NEED_REBOOT: { |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1414 | bool ret_value = true; |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1415 | status_ = UpdateStatus::IDLE; |
Jay Srinivasan | c1ba09a | 2012-08-14 14:15:57 -0700 | [diff] [blame] | 1416 | |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1417 | // Remove the reboot marker so that if the machine is rebooted |
Jay Srinivasan | c1ba09a | 2012-08-14 14:15:57 -0700 | [diff] [blame] | 1418 | // after resetting to idle state, it doesn't go back to |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1419 | // UpdateStatus::UPDATED_NEED_REBOOT state. |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 1420 | ret_value = prefs_->Delete(kPrefsUpdateCompletedOnBootId) && ret_value; |
| 1421 | ret_value = prefs_->Delete(kPrefsUpdateCompletedBootTime) && ret_value; |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1422 | |
Alex Deymo | 9870c0e | 2015-09-23 13:58:31 -0700 | [diff] [blame] | 1423 | // Update the boot flags so the current slot has higher priority. |
| 1424 | BootControlInterface* boot_control = system_state_->boot_control(); |
| 1425 | if (!boot_control->SetActiveBootSlot(boot_control->GetCurrentSlot())) |
| 1426 | ret_value = false; |
| 1427 | |
Alex Deymo | 5259033 | 2016-11-29 18:29:13 -0800 | [diff] [blame] | 1428 | // Mark the current slot as successful again, since marking it as active |
| 1429 | // may reset the successful bit. We ignore the result of whether marking |
| 1430 | // the current slot as successful worked. |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 1431 | if (!boot_control->MarkBootSuccessfulAsync(Bind([](bool successful) {}))) |
Alex Deymo | 5259033 | 2016-11-29 18:29:13 -0800 | [diff] [blame] | 1432 | ret_value = false; |
| 1433 | |
Alex Deymo | 4243291 | 2013-07-12 20:21:15 -0700 | [diff] [blame] | 1434 | // Notify the PayloadState that the successful payload was canceled. |
| 1435 | system_state_->payload_state()->ResetUpdateStatus(); |
| 1436 | |
Alex Deymo | 87c0886 | 2015-10-30 21:56:55 -0700 | [diff] [blame] | 1437 | // The previous version is used to report back to omaha after reboot that |
| 1438 | // we actually rebooted into the new version from this "prev-version". We |
| 1439 | // need to clear out this value now to prevent it being sent on the next |
| 1440 | // updatecheck request. |
| 1441 | ret_value = prefs_->SetString(kPrefsPreviousVersion, "") && ret_value; |
| 1442 | |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 1443 | LOG(INFO) << "Reset status " << (ret_value ? "successful" : "failed"); |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1444 | return ret_value; |
Jay Srinivasan | c1ba09a | 2012-08-14 14:15:57 -0700 | [diff] [blame] | 1445 | } |
| 1446 | |
| 1447 | default: |
| 1448 | LOG(ERROR) << "Reset not allowed in this state."; |
| 1449 | return false; |
| 1450 | } |
| 1451 | } |
| 1452 | |
Aaron Wood | 7f92e2b | 2017-08-28 14:51:21 -0700 | [diff] [blame] | 1453 | bool UpdateAttempter::GetStatus(UpdateEngineStatus* out_status) { |
Aaron Wood | 795c5b4 | 2017-12-05 16:06:13 -0800 | [diff] [blame] | 1454 | out_status->last_checked_time = last_checked_time_; |
Aaron Wood | 7f92e2b | 2017-08-28 14:51:21 -0700 | [diff] [blame] | 1455 | out_status->status = status_; |
| 1456 | out_status->current_version = omaha_request_params_->app_version(); |
Aaron Wood | 7f92e2b | 2017-08-28 14:51:21 -0700 | [diff] [blame] | 1457 | out_status->progress = download_progress_; |
| 1458 | out_status->new_size_bytes = new_payload_size_; |
| 1459 | out_status->new_version = new_version_; |
Amin Hassani | 9be122e | 2019-08-29 09:20:12 -0700 | [diff] [blame] | 1460 | out_status->is_enterprise_rollback = |
| 1461 | install_plan_ && install_plan_->is_rollback; |
Jae Hoon Kim | 2f78c1c | 2019-07-25 13:20:43 -0700 | [diff] [blame] | 1462 | out_status->is_install = is_install_; |
Jae Hoon Kim | 051627a | 2019-09-03 12:56:32 -0700 | [diff] [blame] | 1463 | |
| 1464 | string str_eol_date; |
Jae Hoon Kim | 2dfd35d | 2020-06-02 10:53:13 -0700 | [diff] [blame] | 1465 | if (system_state_->prefs()->Exists(kPrefsOmahaEolDate) && |
| 1466 | !system_state_->prefs()->GetString(kPrefsOmahaEolDate, &str_eol_date)) |
| 1467 | LOG(ERROR) << "Failed to retrieve kPrefsOmahaEolDate pref."; |
Jae Hoon Kim | 051627a | 2019-09-03 12:56:32 -0700 | [diff] [blame] | 1468 | out_status->eol_date = StringToEolDate(str_eol_date); |
| 1469 | |
Miriam Polzer | 0cf1acb | 2020-04-29 17:39:51 +0200 | [diff] [blame] | 1470 | // A powerwash will take place either if the install plan says it is required |
| 1471 | // or if an enterprise rollback is happening. |
| 1472 | out_status->will_powerwash_after_reboot = |
| 1473 | install_plan_ && |
| 1474 | (install_plan_->powerwash_required || install_plan_->is_rollback); |
| 1475 | |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 1476 | return true; |
| 1477 | } |
| 1478 | |
Darin Petkov | 61635a9 | 2011-05-18 16:20:36 -0700 | [diff] [blame] | 1479 | void UpdateAttempter::BroadcastStatus() { |
Aaron Wood | 7f92e2b | 2017-08-28 14:51:21 -0700 | [diff] [blame] | 1480 | UpdateEngineStatus broadcast_status; |
| 1481 | // Use common method for generating the current status. |
| 1482 | GetStatus(&broadcast_status); |
| 1483 | |
Alex Deymo | fa78f14 | 2016-01-26 21:36:16 -0800 | [diff] [blame] | 1484 | for (const auto& observer : service_observers_) { |
Aaron Wood | 7f92e2b | 2017-08-28 14:51:21 -0700 | [diff] [blame] | 1485 | observer->SendStatusUpdate(broadcast_status); |
Alex Deymo | fa78f14 | 2016-01-26 21:36:16 -0800 | [diff] [blame] | 1486 | } |
Darin Petkov | af18305 | 2010-08-23 12:07:13 -0700 | [diff] [blame] | 1487 | last_notify_time_ = TimeTicks::Now(); |
Alex Deymo | fa78f14 | 2016-01-26 21:36:16 -0800 | [diff] [blame] | 1488 | } |
| 1489 | |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 1490 | uint32_t UpdateAttempter::GetErrorCodeFlags() { |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1491 | uint32_t flags = 0; |
| 1492 | |
J. Richard Barnette | 056b0ab | 2013-10-29 15:24:56 -0700 | [diff] [blame] | 1493 | if (!system_state_->hardware()->IsNormalBootMode()) |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1494 | flags |= static_cast<uint32_t>(ErrorCode::kDevModeFlag); |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1495 | |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1496 | if (install_plan_ && install_plan_->is_resume) |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1497 | flags |= static_cast<uint32_t>(ErrorCode::kResumedFlag); |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1498 | |
J. Richard Barnette | 056b0ab | 2013-10-29 15:24:56 -0700 | [diff] [blame] | 1499 | if (!system_state_->hardware()->IsOfficialBuild()) |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1500 | flags |= static_cast<uint32_t>(ErrorCode::kTestImageFlag); |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1501 | |
Sen Jiang | daeaa43 | 2018-10-09 18:18:45 -0700 | [diff] [blame] | 1502 | if (!omaha_request_params_->IsUpdateUrlOfficial()) { |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1503 | flags |= static_cast<uint32_t>(ErrorCode::kTestOmahaUrlFlag); |
Alex Deymo | ac41a82 | 2015-09-15 20:52:53 -0700 | [diff] [blame] | 1504 | } |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1505 | |
| 1506 | return flags; |
| 1507 | } |
| 1508 | |
David Zeuthen | a99981f | 2013-04-29 13:42:47 -0700 | [diff] [blame] | 1509 | bool UpdateAttempter::ShouldCancel(ErrorCode* cancel_reason) { |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1510 | // Check if the channel we're attempting to update to is the same as the |
| 1511 | // target channel currently chosen by the user. |
| 1512 | OmahaRequestParams* params = system_state_->request_params(); |
| 1513 | if (params->download_channel() != params->target_channel()) { |
| 1514 | LOG(ERROR) << "Aborting download as target channel: " |
| 1515 | << params->target_channel() |
| 1516 | << " is different from the download channel: " |
| 1517 | << params->download_channel(); |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1518 | *cancel_reason = ErrorCode::kUpdateCanceledByChannelChange; |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1519 | return true; |
| 1520 | } |
| 1521 | |
| 1522 | return false; |
| 1523 | } |
| 1524 | |
Nam T. Nguyen | 7d623eb | 2014-05-13 16:06:28 -0700 | [diff] [blame] | 1525 | void UpdateAttempter::SetStatusAndNotify(UpdateStatus status) { |
Darin Petkov | 61635a9 | 2011-05-18 16:20:36 -0700 | [diff] [blame] | 1526 | status_ = status; |
Darin Petkov | 61635a9 | 2011-05-18 16:20:36 -0700 | [diff] [blame] | 1527 | BroadcastStatus(); |
| 1528 | } |
| 1529 | |
Darin Petkov | 777dbfa | 2010-07-20 15:03:37 -0700 | [diff] [blame] | 1530 | void UpdateAttempter::CreatePendingErrorEvent(AbstractAction* action, |
David Zeuthen | a99981f | 2013-04-29 13:42:47 -0700 | [diff] [blame] | 1531 | ErrorCode code) { |
Sen Jiang | 89e24c1 | 2018-03-22 18:05:44 -0700 | [diff] [blame] | 1532 | if (error_event_.get() || status_ == UpdateStatus::REPORTING_ERROR_EVENT) { |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1533 | // This shouldn't really happen. |
| 1534 | LOG(WARNING) << "There's already an existing pending error event."; |
| 1535 | return; |
| 1536 | } |
Darin Petkov | 777dbfa | 2010-07-20 15:03:37 -0700 | [diff] [blame] | 1537 | |
Jay Srinivasan | 56d5aa4 | 2012-03-26 14:27:59 -0700 | [diff] [blame] | 1538 | // Classify the code to generate the appropriate result so that |
| 1539 | // the Borgmon charts show up the results correctly. |
| 1540 | // Do this before calling GetErrorCodeForAction which could potentially |
| 1541 | // augment the bit representation of code and thus cause no matches for |
| 1542 | // the switch cases below. |
| 1543 | OmahaEvent::Result event_result; |
| 1544 | switch (code) { |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1545 | case ErrorCode::kOmahaUpdateIgnoredPerPolicy: |
| 1546 | case ErrorCode::kOmahaUpdateDeferredPerPolicy: |
| 1547 | case ErrorCode::kOmahaUpdateDeferredForBackoff: |
Jay Srinivasan | 56d5aa4 | 2012-03-26 14:27:59 -0700 | [diff] [blame] | 1548 | event_result = OmahaEvent::kResultUpdateDeferred; |
| 1549 | break; |
| 1550 | default: |
| 1551 | event_result = OmahaEvent::kResultError; |
| 1552 | break; |
| 1553 | } |
| 1554 | |
Darin Petkov | 777dbfa | 2010-07-20 15:03:37 -0700 | [diff] [blame] | 1555 | code = GetErrorCodeForAction(action, code); |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1556 | fake_update_success_ = code == ErrorCode::kPostinstallBootedFromFirmwareB; |
Darin Petkov | 18c7bce | 2011-06-16 14:07:00 -0700 | [diff] [blame] | 1557 | |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1558 | // Compute the final error code with all the bit flags to be sent to Omaha. |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 1559 | code = |
| 1560 | static_cast<ErrorCode>(static_cast<uint32_t>(code) | GetErrorCodeFlags()); |
| 1561 | error_event_.reset( |
| 1562 | new OmahaEvent(OmahaEvent::kTypeUpdateComplete, event_result, code)); |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1563 | } |
| 1564 | |
| 1565 | bool UpdateAttempter::ScheduleErrorEventAction() { |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 1566 | if (error_event_.get() == nullptr) |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1567 | return false; |
| 1568 | |
Jay Srinivasan | 6f6ea00 | 2012-12-14 11:26:28 -0800 | [diff] [blame] | 1569 | LOG(ERROR) << "Update failed."; |
| 1570 | system_state_->payload_state()->UpdateFailed(error_event_->error_code); |
| 1571 | |
Marton Hunyady | a030268 | 2018-05-16 18:52:13 +0200 | [diff] [blame] | 1572 | // Send metrics if it was a rollback. |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1573 | if (install_plan_ && install_plan_->is_rollback) { |
| 1574 | system_state_->metrics_reporter()->ReportEnterpriseRollbackMetrics( |
| 1575 | /*success=*/false, install_plan_->version); |
Marton Hunyady | a030268 | 2018-05-16 18:52:13 +0200 | [diff] [blame] | 1576 | } |
| 1577 | |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1578 | // Send it to Omaha. |
Alex Deymo | af9a863 | 2015-09-23 18:51:48 -0700 | [diff] [blame] | 1579 | LOG(INFO) << "Reporting the error event"; |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1580 | auto error_event_action = std::make_unique<OmahaRequestAction>( |
| 1581 | system_state_, |
| 1582 | error_event_.release(), // Pass ownership. |
| 1583 | std::make_unique<LibcurlHttpFetcher>(GetProxyResolver(), |
| 1584 | system_state_->hardware()), |
Jae Hoon Kim | edb6550 | 2019-06-14 11:52:17 -0700 | [diff] [blame] | 1585 | false, |
| 1586 | session_id_); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1587 | processor_->EnqueueAction(std::move(error_event_action)); |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1588 | SetStatusAndNotify(UpdateStatus::REPORTING_ERROR_EVENT); |
Darin Petkov | f42cc1c | 2010-09-01 09:03:02 -0700 | [diff] [blame] | 1589 | processor_->StartProcessing(); |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1590 | return true; |
| 1591 | } |
| 1592 | |
Darin Petkov | 58dd134 | 2011-05-06 12:05:13 -0700 | [diff] [blame] | 1593 | void UpdateAttempter::ScheduleProcessingStart() { |
| 1594 | LOG(INFO) << "Scheduling an action processor start."; |
Alex Deymo | 60ca1a7 | 2015-06-18 18:19:15 -0700 | [diff] [blame] | 1595 | MessageLoop::current()->PostTask( |
| 1596 | FROM_HERE, |
Luis Hector Chavez | f1cf348 | 2016-07-19 14:29:19 -0700 | [diff] [blame] | 1597 | Bind([](ActionProcessor* processor) { processor->StartProcessing(); }, |
| 1598 | base::Unretained(processor_.get()))); |
Darin Petkov | 58dd134 | 2011-05-06 12:05:13 -0700 | [diff] [blame] | 1599 | } |
| 1600 | |
Darin Petkov | 3627577 | 2010-10-01 11:40:57 -0700 | [diff] [blame] | 1601 | void UpdateAttempter::DisableDeltaUpdateIfNeeded() { |
| 1602 | int64_t delta_failures; |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 1603 | if (omaha_request_params_->delta_okay() && |
Darin Petkov | 3627577 | 2010-10-01 11:40:57 -0700 | [diff] [blame] | 1604 | prefs_->GetInt64(kPrefsDeltaUpdateFailures, &delta_failures) && |
| 1605 | delta_failures >= kMaxDeltaUpdateFailures) { |
| 1606 | LOG(WARNING) << "Too many delta update failures, forcing full update."; |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 1607 | omaha_request_params_->set_delta_okay(false); |
Darin Petkov | 3627577 | 2010-10-01 11:40:57 -0700 | [diff] [blame] | 1608 | } |
| 1609 | } |
| 1610 | |
| 1611 | void UpdateAttempter::MarkDeltaUpdateFailure() { |
Darin Petkov | 2dd0109 | 2010-10-08 15:43:05 -0700 | [diff] [blame] | 1612 | // Don't try to resume a failed delta update. |
| 1613 | DeltaPerformer::ResetUpdateProgress(prefs_, false); |
Darin Petkov | 3627577 | 2010-10-01 11:40:57 -0700 | [diff] [blame] | 1614 | int64_t delta_failures; |
| 1615 | if (!prefs_->GetInt64(kPrefsDeltaUpdateFailures, &delta_failures) || |
| 1616 | delta_failures < 0) { |
| 1617 | delta_failures = 0; |
| 1618 | } |
| 1619 | prefs_->SetInt64(kPrefsDeltaUpdateFailures, ++delta_failures); |
| 1620 | } |
| 1621 | |
Thieu Le | 116fda3 | 2011-04-19 11:01:54 -0700 | [diff] [blame] | 1622 | void UpdateAttempter::PingOmaha() { |
Thieu Le | d88a857 | 2011-05-26 09:09:19 -0700 | [diff] [blame] | 1623 | if (!processor_->IsRunning()) { |
Amin Hassani | ecb60d3 | 2019-06-17 18:09:10 -0700 | [diff] [blame] | 1624 | ResetInteractivityFlags(); |
| 1625 | |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1626 | auto ping_action = std::make_unique<OmahaRequestAction>( |
Alex Deymo | c1c17b4 | 2015-11-23 03:53:15 -0300 | [diff] [blame] | 1627 | system_state_, |
| 1628 | nullptr, |
Ben Chan | ab5a0af | 2017-10-12 14:57:50 -0700 | [diff] [blame] | 1629 | std::make_unique<LibcurlHttpFetcher>(GetProxyResolver(), |
Ben Chan | 5c02c13 | 2017-06-27 07:10:36 -0700 | [diff] [blame] | 1630 | system_state_->hardware()), |
Jae Hoon Kim | edb6550 | 2019-06-14 11:52:17 -0700 | [diff] [blame] | 1631 | true, |
| 1632 | "" /* session_id */); |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 1633 | processor_->set_delegate(nullptr); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1634 | processor_->EnqueueAction(std::move(ping_action)); |
Thieu Le | d88a857 | 2011-05-26 09:09:19 -0700 | [diff] [blame] | 1635 | // Call StartProcessing() synchronously here to avoid any race conditions |
| 1636 | // caused by multiple outstanding ping Omaha requests. If we call |
| 1637 | // StartProcessing() asynchronously, the device can be suspended before we |
| 1638 | // get a chance to callback to StartProcessing(). When the device resumes |
| 1639 | // (assuming the device sleeps longer than the next update check period), |
| 1640 | // StartProcessing() is called back and at the same time, the next update |
| 1641 | // check is fired which eventually invokes StartProcessing(). A crash |
| 1642 | // can occur because StartProcessing() checks to make sure that the |
| 1643 | // processor is idle which it isn't due to the two concurrent ping Omaha |
| 1644 | // requests. |
| 1645 | processor_->StartProcessing(); |
| 1646 | } else { |
Darin Petkov | 58dd134 | 2011-05-06 12:05:13 -0700 | [diff] [blame] | 1647 | LOG(WARNING) << "Action processor running, Omaha ping suppressed."; |
Darin Petkov | 58dd134 | 2011-05-06 12:05:13 -0700 | [diff] [blame] | 1648 | } |
Thieu Le | d88a857 | 2011-05-26 09:09:19 -0700 | [diff] [blame] | 1649 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 1650 | // Update the last check time here; it may be re-updated when an Omaha |
| 1651 | // response is received, but this will prevent us from repeatedly scheduling |
| 1652 | // checks in the case where a response is not received. |
| 1653 | UpdateLastCheckedTime(); |
| 1654 | |
Thieu Le | d88a857 | 2011-05-26 09:09:19 -0700 | [diff] [blame] | 1655 | // Update the status which will schedule the next update check |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1656 | SetStatusAndNotify(UpdateStatus::UPDATED_NEED_REBOOT); |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1657 | ScheduleUpdates(); |
Thieu Le | 116fda3 | 2011-04-19 11:01:54 -0700 | [diff] [blame] | 1658 | } |
| 1659 | |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 1660 | bool UpdateAttempter::DecrementUpdateCheckCount() { |
Ben Chan | 9abb763 | 2014-08-07 00:10:53 -0700 | [diff] [blame] | 1661 | int64_t update_check_count_value; |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 1662 | |
| 1663 | if (!prefs_->Exists(kPrefsUpdateCheckCount)) { |
| 1664 | // This file does not exist. This means we haven't started our update |
| 1665 | // check count down yet, so nothing more to do. This file will be created |
| 1666 | // later when we first satisfy the wall-clock-based-wait period. |
| 1667 | LOG(INFO) << "No existing update check count. That's normal."; |
| 1668 | return true; |
| 1669 | } |
| 1670 | |
| 1671 | if (prefs_->GetInt64(kPrefsUpdateCheckCount, &update_check_count_value)) { |
| 1672 | // Only if we're able to read a proper integer value, then go ahead |
| 1673 | // and decrement and write back the result in the same file, if needed. |
| 1674 | LOG(INFO) << "Update check count = " << update_check_count_value; |
| 1675 | |
| 1676 | if (update_check_count_value == 0) { |
| 1677 | // It could be 0, if, for some reason, the file didn't get deleted |
| 1678 | // when we set our status to waiting for reboot. so we just leave it |
| 1679 | // as is so that we can prevent another update_check wait for this client. |
| 1680 | LOG(INFO) << "Not decrementing update check count as it's already 0."; |
| 1681 | return true; |
| 1682 | } |
| 1683 | |
| 1684 | if (update_check_count_value > 0) |
| 1685 | update_check_count_value--; |
| 1686 | else |
| 1687 | update_check_count_value = 0; |
| 1688 | |
| 1689 | // Write out the new value of update_check_count_value. |
| 1690 | if (prefs_->SetInt64(kPrefsUpdateCheckCount, update_check_count_value)) { |
Sen Jiang | 771f648 | 2018-04-04 17:59:10 -0700 | [diff] [blame] | 1691 | // We successfully wrote out the new value, so enable the |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 1692 | // update check based wait. |
| 1693 | LOG(INFO) << "New update check count = " << update_check_count_value; |
| 1694 | return true; |
| 1695 | } |
| 1696 | } |
| 1697 | |
| 1698 | LOG(INFO) << "Deleting update check count state due to read/write errors."; |
| 1699 | |
| 1700 | // We cannot read/write to the file, so disable the update check based wait |
| 1701 | // so that we don't get stuck in this OS version by any chance (which could |
| 1702 | // happen if there's some bug that causes to read/write incorrectly). |
| 1703 | // Also attempt to delete the file to do our best effort to cleanup. |
| 1704 | prefs_->Delete(kPrefsUpdateCheckCount); |
| 1705 | return false; |
| 1706 | } |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 1707 | |
David Zeuthen | e4c58bf | 2013-06-18 17:26:50 -0700 | [diff] [blame] | 1708 | void UpdateAttempter::UpdateEngineStarted() { |
Alex Vakulenko | dea2eac | 2014-03-14 15:56:59 -0700 | [diff] [blame] | 1709 | // If we just booted into a new update, keep the previous OS version |
| 1710 | // in case we rebooted because of a crash of the old version, so we |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 1711 | // can do a proper crash report with correct information. |
Alex Vakulenko | dea2eac | 2014-03-14 15:56:59 -0700 | [diff] [blame] | 1712 | // This must be done before calling |
| 1713 | // system_state_->payload_state()->UpdateEngineStarted() since it will |
| 1714 | // delete SystemUpdated marker file. |
| 1715 | if (system_state_->system_rebooted() && |
| 1716 | prefs_->Exists(kPrefsSystemUpdatedMarker)) { |
| 1717 | if (!prefs_->GetString(kPrefsPreviousVersion, &prev_version_)) { |
| 1718 | // If we fail to get the version string, make sure it stays empty. |
| 1719 | prev_version_.clear(); |
| 1720 | } |
| 1721 | } |
| 1722 | |
David Zeuthen | e4c58bf | 2013-06-18 17:26:50 -0700 | [diff] [blame] | 1723 | system_state_->payload_state()->UpdateEngineStarted(); |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 1724 | StartP2PAtStartup(); |
Jae Hoon Kim | 5e8e30b | 2020-05-06 14:59:06 -0700 | [diff] [blame] | 1725 | |
| 1726 | excluder_ = CreateExcluder(system_state_->prefs()); |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 1727 | } |
| 1728 | |
| 1729 | bool UpdateAttempter::StartP2PAtStartup() { |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 1730 | if (system_state_ == nullptr || |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 1731 | !system_state_->p2p_manager()->IsP2PEnabled()) { |
| 1732 | LOG(INFO) << "Not starting p2p at startup since it's not enabled."; |
| 1733 | return false; |
| 1734 | } |
| 1735 | |
| 1736 | if (system_state_->p2p_manager()->CountSharedFiles() < 1) { |
| 1737 | LOG(INFO) << "Not starting p2p at startup since our application " |
| 1738 | << "is not sharing any files."; |
| 1739 | return false; |
| 1740 | } |
| 1741 | |
| 1742 | return StartP2PAndPerformHousekeeping(); |
| 1743 | } |
| 1744 | |
| 1745 | bool UpdateAttempter::StartP2PAndPerformHousekeeping() { |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 1746 | if (system_state_ == nullptr) |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 1747 | return false; |
| 1748 | |
| 1749 | if (!system_state_->p2p_manager()->IsP2PEnabled()) { |
| 1750 | LOG(INFO) << "Not starting p2p since it's not enabled."; |
| 1751 | return false; |
| 1752 | } |
| 1753 | |
| 1754 | LOG(INFO) << "Ensuring that p2p is running."; |
| 1755 | if (!system_state_->p2p_manager()->EnsureP2PRunning()) { |
| 1756 | LOG(ERROR) << "Error starting p2p."; |
| 1757 | return false; |
| 1758 | } |
| 1759 | |
| 1760 | LOG(INFO) << "Performing p2p housekeeping."; |
| 1761 | if (!system_state_->p2p_manager()->PerformHousekeeping()) { |
| 1762 | LOG(ERROR) << "Error performing housekeeping for p2p."; |
| 1763 | return false; |
| 1764 | } |
| 1765 | |
| 1766 | LOG(INFO) << "Done performing p2p housekeeping."; |
| 1767 | return true; |
David Zeuthen | e4c58bf | 2013-06-18 17:26:50 -0700 | [diff] [blame] | 1768 | } |
| 1769 | |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 1770 | bool UpdateAttempter::GetBootTimeAtUpdate(Time* out_boot_time) { |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 1771 | // In case of an update_engine restart without a reboot, we stored the boot_id |
| 1772 | // when the update was completed by setting a pref, so we can check whether |
| 1773 | // the last update was on this boot or a previous one. |
| 1774 | string boot_id; |
| 1775 | TEST_AND_RETURN_FALSE(utils::GetBootId(&boot_id)); |
| 1776 | |
| 1777 | string update_completed_on_boot_id; |
| 1778 | if (!prefs_->Exists(kPrefsUpdateCompletedOnBootId) || |
| 1779 | !prefs_->GetString(kPrefsUpdateCompletedOnBootId, |
| 1780 | &update_completed_on_boot_id) || |
| 1781 | update_completed_on_boot_id != boot_id) |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 1782 | return false; |
| 1783 | |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 1784 | // Short-circuit avoiding the read in case out_boot_time is nullptr. |
| 1785 | if (out_boot_time) { |
| 1786 | int64_t boot_time = 0; |
| 1787 | // Since the kPrefsUpdateCompletedOnBootId was correctly set, this pref |
| 1788 | // should not fail. |
| 1789 | TEST_AND_RETURN_FALSE( |
| 1790 | prefs_->GetInt64(kPrefsUpdateCompletedBootTime, &boot_time)); |
| 1791 | *out_boot_time = Time::FromInternalValue(boot_time); |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 1792 | } |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 1793 | return true; |
| 1794 | } |
| 1795 | |
Jae Hoon Kim | ba2fdce | 2019-07-11 13:18:58 -0700 | [diff] [blame] | 1796 | bool UpdateAttempter::IsBusyOrUpdateScheduled() { |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1797 | return ((status_ != UpdateStatus::IDLE && |
| 1798 | status_ != UpdateStatus::UPDATED_NEED_REBOOT) || |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1799 | waiting_for_scheduled_check_); |
| 1800 | } |
| 1801 | |
Sen Jiang | daeaa43 | 2018-10-09 18:18:45 -0700 | [diff] [blame] | 1802 | bool UpdateAttempter::IsAnyUpdateSourceAllowed() const { |
David Pursell | 907b4fa | 2015-01-27 10:27:38 -0800 | [diff] [blame] | 1803 | // We allow updates from any source if either of these are true: |
| 1804 | // * The device is running an unofficial (dev/test) image. |
| 1805 | // * The debugd dev features are accessible (i.e. in devmode with no owner). |
| 1806 | // This protects users running a base image, while still allowing a specific |
| 1807 | // window (gated by the debug dev features) where `cros flash` is usable. |
David Pursell | 02c1864 | 2014-11-06 11:26:11 -0800 | [diff] [blame] | 1808 | if (!system_state_->hardware()->IsOfficialBuild()) { |
| 1809 | LOG(INFO) << "Non-official build; allowing any update source."; |
| 1810 | return true; |
| 1811 | } |
| 1812 | |
Sen Jiang | e67bb5b | 2016-06-20 15:53:56 -0700 | [diff] [blame] | 1813 | if (system_state_->hardware()->AreDevFeaturesEnabled()) { |
| 1814 | LOG(INFO) << "Developer features enabled; allowing custom update sources."; |
David Pursell | 02c1864 | 2014-11-06 11:26:11 -0800 | [diff] [blame] | 1815 | return true; |
| 1816 | } |
Sen Jiang | e67bb5b | 2016-06-20 15:53:56 -0700 | [diff] [blame] | 1817 | |
| 1818 | LOG(INFO) |
| 1819 | << "Developer features disabled; disallowing custom update sources."; |
David Pursell | 02c1864 | 2014-11-06 11:26:11 -0800 | [diff] [blame] | 1820 | return false; |
| 1821 | } |
| 1822 | |
May Lippert | 60aa3ca | 2018-08-15 16:55:29 -0700 | [diff] [blame] | 1823 | void UpdateAttempter::ReportTimeToUpdateAppliedMetric() { |
| 1824 | const policy::DevicePolicy* device_policy = system_state_->device_policy(); |
| 1825 | if (device_policy && device_policy->IsEnterpriseEnrolled()) { |
| 1826 | vector<policy::DevicePolicy::WeeklyTimeInterval> parsed_intervals; |
| 1827 | bool has_time_restrictions = |
| 1828 | device_policy->GetDisallowedTimeIntervals(&parsed_intervals); |
| 1829 | |
| 1830 | int64_t update_first_seen_at_int; |
| 1831 | if (system_state_->prefs()->Exists(kPrefsUpdateFirstSeenAt)) { |
| 1832 | if (system_state_->prefs()->GetInt64(kPrefsUpdateFirstSeenAt, |
| 1833 | &update_first_seen_at_int)) { |
| 1834 | TimeDelta update_delay = |
| 1835 | system_state_->clock()->GetWallclockTime() - |
| 1836 | Time::FromInternalValue(update_first_seen_at_int); |
| 1837 | system_state_->metrics_reporter() |
| 1838 | ->ReportEnterpriseUpdateSeenToDownloadDays(has_time_restrictions, |
| 1839 | update_delay.InDays()); |
| 1840 | } |
| 1841 | } |
| 1842 | } |
| 1843 | } |
| 1844 | |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 1845 | } // namespace chromeos_update_engine |