Alex Deymo | aea4c1c | 2015-08-19 20:24:43 -0700 | [diff] [blame] | 1 | // |
| 2 | // Copyright (C) 2013 The Android Open Source Project |
| 3 | // |
| 4 | // Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | // you may not use this file except in compliance with the License. |
| 6 | // You may obtain a copy of the License at |
| 7 | // |
| 8 | // http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | // |
| 10 | // Unless required by applicable law or agreed to in writing, software |
| 11 | // distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | // See the License for the specific language governing permissions and |
| 14 | // limitations under the License. |
| 15 | // |
Alex Deymo | 4243291 | 2013-07-12 20:21:15 -0700 | [diff] [blame] | 16 | |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 17 | #ifndef UPDATE_ENGINE_COMMON_HARDWARE_INTERFACE_H_ |
| 18 | #define UPDATE_ENGINE_COMMON_HARDWARE_INTERFACE_H_ |
Alex Deymo | 4243291 | 2013-07-12 20:21:15 -0700 | [diff] [blame] | 19 | |
Sen Jiang | 5011df6 | 2017-06-28 17:13:19 -0700 | [diff] [blame] | 20 | #include <stdint.h> |
| 21 | |
Alex Deymo | 4243291 | 2013-07-12 20:21:15 -0700 | [diff] [blame] | 22 | #include <string> |
Alex Vakulenko | 59e253e | 2014-02-24 10:40:21 -0800 | [diff] [blame] | 23 | #include <vector> |
Alex Deymo | 4243291 | 2013-07-12 20:21:15 -0700 | [diff] [blame] | 24 | |
Alex Deymo | dd132f3 | 2015-09-14 19:12:07 -0700 | [diff] [blame] | 25 | #include <base/files/file_path.h> |
Alex Deymo | bccbc38 | 2014-04-03 13:38:55 -0700 | [diff] [blame] | 26 | #include <base/time/time.h> |
| 27 | |
Alex Deymo | 4243291 | 2013-07-12 20:21:15 -0700 | [diff] [blame] | 28 | namespace chromeos_update_engine { |
| 29 | |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 30 | // The hardware interface allows access to the crossystem exposed properties, |
| 31 | // such as the firmware version, hwid, verified boot mode. |
Alex Deymo | 4243291 | 2013-07-12 20:21:15 -0700 | [diff] [blame] | 32 | // These stateless functions are tied together in this interface to facilitate |
| 33 | // unit testing. |
| 34 | class HardwareInterface { |
| 35 | public: |
Alex Deymo | 610277e | 2014-11-11 21:18:11 -0800 | [diff] [blame] | 36 | virtual ~HardwareInterface() {} |
| 37 | |
Alex Deymo | 1c4e84a | 2015-09-22 16:58:10 -0700 | [diff] [blame] | 38 | // Returns whether this is an official build. Official build means that the |
| 39 | // server maintains and updates the build, so update_engine should run and |
| 40 | // periodically check for updates. |
Alex Vakulenko | d0fdfb3 | 2014-02-21 15:26:26 -0800 | [diff] [blame] | 41 | virtual bool IsOfficialBuild() const = 0; |
J. Richard Barnette | 056b0ab | 2013-10-29 15:24:56 -0700 | [diff] [blame] | 42 | |
| 43 | // Returns true if the boot mode is normal or if it's unable to |
| 44 | // determine the boot mode. Returns false if the boot mode is |
Alex Deymo | 1c4e84a | 2015-09-22 16:58:10 -0700 | [diff] [blame] | 45 | // developer. A dev-mode boot will allow the user to access developer-only |
| 46 | // features. |
Alex Vakulenko | d0fdfb3 | 2014-02-21 15:26:26 -0800 | [diff] [blame] | 47 | virtual bool IsNormalBootMode() const = 0; |
J. Richard Barnette | 522d36f | 2013-10-28 17:22:12 -0700 | [diff] [blame] | 48 | |
Sen Jiang | e67bb5b | 2016-06-20 15:53:56 -0700 | [diff] [blame] | 49 | // Returns whether the developer features are enabled. |
| 50 | virtual bool AreDevFeaturesEnabled() const = 0; |
| 51 | |
Alex Deymo | 46a9aae | 2016-05-04 20:20:11 -0700 | [diff] [blame] | 52 | // Returns whether the device has an OOBE flow that the user must go through |
| 53 | // before getting non-critical updates. Use IsOOBEComplete() to determine if |
| 54 | // that flow is complete. |
| 55 | virtual bool IsOOBEEnabled() const = 0; |
| 56 | |
Alex Deymo | bccbc38 | 2014-04-03 13:38:55 -0700 | [diff] [blame] | 57 | // Returns true if the OOBE process has been completed and EULA accepted, |
| 58 | // False otherwise. If True is returned, and |out_time_of_oobe| isn't null, |
| 59 | // the time-stamp of when OOBE happened is stored at |out_time_of_oobe|. |
| 60 | virtual bool IsOOBEComplete(base::Time* out_time_of_oobe) const = 0; |
| 61 | |
J. Richard Barnette | 522d36f | 2013-10-28 17:22:12 -0700 | [diff] [blame] | 62 | // Returns the HWID or an empty string on error. |
Alex Vakulenko | d0fdfb3 | 2014-02-21 15:26:26 -0800 | [diff] [blame] | 63 | virtual std::string GetHardwareClass() const = 0; |
J. Richard Barnette | 522d36f | 2013-10-28 17:22:12 -0700 | [diff] [blame] | 64 | |
| 65 | // Returns the firmware version or an empty string if the system is |
| 66 | // not running chrome os firmware. |
Alex Vakulenko | d0fdfb3 | 2014-02-21 15:26:26 -0800 | [diff] [blame] | 67 | virtual std::string GetFirmwareVersion() const = 0; |
J. Richard Barnette | 522d36f | 2013-10-28 17:22:12 -0700 | [diff] [blame] | 68 | |
| 69 | // Returns the ec version or an empty string if the system is not |
| 70 | // running a custom chrome os ec. |
Alex Vakulenko | d0fdfb3 | 2014-02-21 15:26:26 -0800 | [diff] [blame] | 71 | virtual std::string GetECVersion() const = 0; |
Alex Deymo | 4243291 | 2013-07-12 20:21:15 -0700 | [diff] [blame] | 72 | |
Matt Ziegelbaum | aa8e1a4 | 2019-05-09 21:41:58 -0400 | [diff] [blame] | 73 | // Returns the OEM device requisition or an empty string if the system does |
| 74 | // not have a requisition, or if not running Chrome OS. |
| 75 | virtual std::string GetDeviceRequisition() const = 0; |
| 76 | |
Zentaro Kavanagh | baacb98 | 2018-02-20 17:48:39 -0800 | [diff] [blame] | 77 | // Returns the minimum kernel key version that verified boot on Chrome OS |
| 78 | // will allow to boot. This is the value of crossystem tpm_kernver. Returns |
| 79 | // -1 on error, or if not running on Chrome OS. |
| 80 | virtual int GetMinKernelKeyVersion() const = 0; |
| 81 | |
Marton Hunyady | 99ced78 | 2018-05-08 12:59:50 +0200 | [diff] [blame] | 82 | // Returns the minimum firmware key version that verified boot on Chrome OS |
| 83 | // will allow to boot. This is the value of crossystem tpm_fwver. Returns |
| 84 | // -1 on error, or if not running on Chrome OS. |
| 85 | virtual int GetMinFirmwareKeyVersion() const = 0; |
| 86 | |
Zentaro Kavanagh | 8f6f243 | 2018-05-16 13:48:12 -0700 | [diff] [blame] | 87 | // Returns the maximum firmware key version that verified boot should roll |
| 88 | // forward to. This is the value of crossystem firmware_max_rollforward. |
| 89 | // Returns -1 on error, if this board does not yet support this value, or |
| 90 | // if not running on Chrome OS. |
| 91 | virtual int GetMaxFirmwareKeyRollforward() const = 0; |
| 92 | |
| 93 | // Sets the maximum firmware key version that verified boot should roll |
| 94 | // forward to. This is the value of crossystem firmware_max_rollforward. |
| 95 | // This value is not available on all Chrome OS devices. |
| 96 | virtual bool SetMaxFirmwareKeyRollforward(int firmware_max_rollforward) = 0; |
| 97 | |
Zentaro Kavanagh | baacb98 | 2018-02-20 17:48:39 -0800 | [diff] [blame] | 98 | // Sets the maximum kernel key version that verified boot should roll |
Zentaro Kavanagh | 5d95615 | 2018-05-15 09:40:33 -0700 | [diff] [blame] | 99 | // forward to. This is the value of crossystem kernel_max_rollforward. |
Zentaro Kavanagh | baacb98 | 2018-02-20 17:48:39 -0800 | [diff] [blame] | 100 | // Returns false if the value cannot be set, or if not running on Chrome OS. |
Zentaro Kavanagh | 5d95615 | 2018-05-15 09:40:33 -0700 | [diff] [blame] | 101 | virtual bool SetMaxKernelKeyRollforward(int kernel_max_rollforward) = 0; |
Zentaro Kavanagh | baacb98 | 2018-02-20 17:48:39 -0800 | [diff] [blame] | 102 | |
Alex Deymo | ebbe7ef | 2014-10-30 13:02:49 -0700 | [diff] [blame] | 103 | // Returns the powerwash_count from the stateful. If the file is not found |
| 104 | // or is invalid, returns -1. Brand new machines out of the factory or after |
| 105 | // recovery don't have this value set. |
| 106 | virtual int GetPowerwashCount() const = 0; |
Alex Deymo | dd132f3 | 2015-09-14 19:12:07 -0700 | [diff] [blame] | 107 | |
Alex Deymo | fb905d9 | 2016-06-03 19:26:58 -0700 | [diff] [blame] | 108 | // Signals that a powerwash (stateful partition wipe) should be performed |
Zentaro Kavanagh | 28def4f | 2019-01-15 17:15:01 -0800 | [diff] [blame] | 109 | // after reboot. If |save_rollback_data| is true additional state is |
| 110 | // preserved during shutdown that can be restored after the powerwash. |
| 111 | virtual bool SchedulePowerwash(bool save_rollback_data) = 0; |
Alex Deymo | fb905d9 | 2016-06-03 19:26:58 -0700 | [diff] [blame] | 112 | |
| 113 | // Cancel the powerwash operation scheduled to be performed on next boot. |
| 114 | virtual bool CancelPowerwash() = 0; |
| 115 | |
Alex Deymo | dd132f3 | 2015-09-14 19:12:07 -0700 | [diff] [blame] | 116 | // Store in |path| the path to a non-volatile directory (persisted across |
| 117 | // reboots) available for this daemon. In case of an error, such as no |
| 118 | // directory available, returns false. |
| 119 | virtual bool GetNonVolatileDirectory(base::FilePath* path) const = 0; |
| 120 | |
| 121 | // Store in |path| the path to a non-volatile directory persisted across |
| 122 | // powerwash cycles. In case of an error, such as no directory available, |
| 123 | // returns false. |
| 124 | virtual bool GetPowerwashSafeDirectory(base::FilePath* path) const = 0; |
Sen Jiang | 5011df6 | 2017-06-28 17:13:19 -0700 | [diff] [blame] | 125 | |
| 126 | // Returns the timestamp of the current OS build. |
| 127 | virtual int64_t GetBuildTimestamp() const = 0; |
Sen Jiang | 4490696 | 2018-01-08 17:39:04 -0800 | [diff] [blame] | 128 | |
Tianjie Xu | 4ad3af6 | 2019-10-30 11:59:45 -0700 | [diff] [blame] | 129 | // Returns true if the current OS build allows installing the payload with an |
| 130 | // older timestamp. |
| 131 | virtual bool AllowDowngrade() const = 0; |
| 132 | |
Amin Hassani | 1677e81 | 2017-06-21 13:36:36 -0700 | [diff] [blame] | 133 | // Returns whether the first active ping was sent to Omaha at some point, and |
| 134 | // that the value is persisted across recovery (and powerwash) once set with |
| 135 | // |SetFirstActiveOmahaPingSent()|. |
| 136 | virtual bool GetFirstActiveOmahaPingSent() const = 0; |
| 137 | |
Amin Hassani | 80f4d4c | 2018-05-16 13:34:00 -0700 | [diff] [blame] | 138 | // Persist the fact that first active ping was sent to omaha and returns false |
| 139 | // if failed to persist it. |
| 140 | virtual bool SetFirstActiveOmahaPingSent() = 0; |
Tianjie Xu | d6aa91f | 2019-11-14 11:55:10 -0800 | [diff] [blame] | 141 | |
| 142 | // If |warm_reset| is true, sets the warm reset to indicate a warm reset is |
| 143 | // needed on the next reboot. Otherwise, clears the flag. |
| 144 | virtual void SetWarmReset(bool warm_reset) = 0; |
Kelvin Zhang | d719103 | 2020-08-11 10:48:16 -0400 | [diff] [blame] | 145 | |
| 146 | // Return the version/timestamp for partition `partition_name`. |
| 147 | // Don't make any assumption about the formatting of returned string. |
| 148 | // Only used for logging/debugging purposes. |
| 149 | virtual std::string GetVersionForLogging( |
| 150 | const std::string& partition_name) const = 0; |
| 151 | |
| 152 | // Return true if and only if `new_version` is "newer" than the |
| 153 | // version number of partition `partition_name`. The notion of |
| 154 | // "newer" is defined by this function. Caller should not make |
| 155 | // any assumption about the underlying logic. |
| 156 | virtual bool IsPartitionUpdateValid(const std::string& partition_name, |
| 157 | const std::string& new_version) const = 0; |
Alex Deymo | 4243291 | 2013-07-12 20:21:15 -0700 | [diff] [blame] | 158 | }; |
| 159 | |
| 160 | } // namespace chromeos_update_engine |
| 161 | |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 162 | #endif // UPDATE_ENGINE_COMMON_HARDWARE_INTERFACE_H_ |