blob: eb3e29fad4a87dbc2cadca8a52ea2fd492240580 [file] [log] [blame]
Alex Deymo5e3ea272016-01-28 13:42:23 -08001//
2// Copyright (C) 2016 The Android Open Source Project
3//
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at
7//
8// http://www.apache.org/licenses/LICENSE-2.0
9//
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15//
16
Amin Hassaniec7bc112020-10-29 16:47:58 -070017#ifndef UPDATE_ENGINE_AOSP_UPDATE_ATTEMPTER_ANDROID_H_
18#define UPDATE_ENGINE_AOSP_UPDATE_ATTEMPTER_ANDROID_H_
Alex Deymo5e3ea272016-01-28 13:42:23 -080019
20#include <stdint.h>
21
22#include <memory>
23#include <string>
24#include <vector>
25
Kyeongkab.Nam500ca132019-06-26 13:48:07 +090026#include <android-base/unique_fd.h>
Alex Deymo5e3ea272016-01-28 13:42:23 -080027#include <base/time/time.h>
28
Mohammad Samiul Islam24a82792021-02-12 16:52:36 +000029#include "update_engine/aosp/apex_handler_interface.h"
Amin Hassaniec7bc112020-10-29 16:47:58 -070030#include "update_engine/aosp/service_delegate_android_interface.h"
Alex Deymo5e3ea272016-01-28 13:42:23 -080031#include "update_engine/client_library/include/update_engine/update_status.h"
32#include "update_engine/common/action_processor.h"
33#include "update_engine/common/boot_control_interface.h"
Kelvin Zhangc7a1d1f2022-07-29 13:36:29 -070034#include "update_engine/common/clock_interface.h"
Amin Hassaniec7bc112020-10-29 16:47:58 -070035#include "update_engine/common/daemon_state_interface.h"
36#include "update_engine/common/download_action.h"
Kelvin Zhangf8441982022-12-07 18:18:47 -080037#include "update_engine/common/error_code.h"
Alex Deymo5e3ea272016-01-28 13:42:23 -080038#include "update_engine/common/hardware_interface.h"
Amin Hassaniec7bc112020-10-29 16:47:58 -070039#include "update_engine/common/metrics_reporter_interface.h"
40#include "update_engine/common/network_selector_interface.h"
Alex Deymo5e3ea272016-01-28 13:42:23 -080041#include "update_engine/common/prefs_interface.h"
Kelvin Zhang32a73a92022-12-19 12:27:41 -080042#include "update_engine/metrics_utils.h"
Kelvin Zhang70eef232020-06-12 20:32:40 +000043#include "update_engine/payload_consumer/filesystem_verifier_action.h"
Alex Deymo0d298542016-03-30 18:31:49 -070044#include "update_engine/payload_consumer/postinstall_runner_action.h"
Alex Deymo5e3ea272016-01-28 13:42:23 -080045
46namespace chromeos_update_engine {
47
Kelvin Zhanga43d6e82021-05-26 10:14:42 -040048enum class OTAResult {
49 NOT_ATTEMPTED,
50 ROLLED_BACK,
51 UPDATED_NEED_REBOOT,
52 OTA_SUCCESSFUL,
53};
54
Kelvin Zhang9c5baeb2024-11-05 13:42:32 -080055class UpdateAttempterAndroid final
Alex Deymo0d298542016-03-30 18:31:49 -070056 : public ServiceDelegateAndroidInterface,
57 public ActionProcessorDelegate,
58 public DownloadActionDelegate,
Kelvin Zhang70eef232020-06-12 20:32:40 +000059 public FilesystemVerifyDelegate,
Yifan Hong90965502020-02-19 15:22:47 -080060 public PostinstallRunnerAction::DelegateInterface,
61 public CleanupPreviousUpdateActionDelegateInterface {
Alex Deymo5e3ea272016-01-28 13:42:23 -080062 public:
63 using UpdateStatus = update_engine::UpdateStatus;
64
Alex Deymo03a4de72016-07-20 16:08:23 -070065 UpdateAttempterAndroid(DaemonStateInterface* daemon_state,
Alex Deymo5e3ea272016-01-28 13:42:23 -080066 PrefsInterface* prefs,
67 BootControlInterface* boot_control_,
Mohammad Samiul Islam24a82792021-02-12 16:52:36 +000068 HardwareInterface* hardware_,
69 std::unique_ptr<ApexHandlerInterface> apex_handler);
Alex Deymo5e3ea272016-01-28 13:42:23 -080070 ~UpdateAttempterAndroid() override;
71
72 // Further initialization to be done post construction.
73 void Init();
74
75 // ServiceDelegateAndroidInterface overrides.
76 bool ApplyPayload(const std::string& payload_url,
77 int64_t payload_offset,
78 int64_t payload_size,
79 const std::vector<std::string>& key_value_pair_headers,
Daniel Zheng92f7d172023-06-22 14:31:37 -070080 Error* error) override;
Kyeongkab.Nam500ca132019-06-26 13:48:07 +090081 bool ApplyPayload(int fd,
82 int64_t payload_offset,
83 int64_t payload_size,
84 const std::vector<std::string>& key_value_pair_headers,
Daniel Zheng92f7d172023-06-22 14:31:37 -070085 Error* error) override;
86 bool SuspendUpdate(Error* error) override;
87 bool ResumeUpdate(Error* error) override;
88 bool CancelUpdate(Error* error) override;
89 bool ResetStatus(Error* error) override;
Sen Jiang28d8ed92018-02-01 13:46:39 -080090 bool VerifyPayloadApplicable(const std::string& metadata_filename,
Daniel Zheng92f7d172023-06-22 14:31:37 -070091 Error* error) override;
Yifan Hong6f7e29f2019-12-13 14:41:06 -080092 uint64_t AllocateSpaceForPayload(
93 const std::string& metadata_filename,
94 const std::vector<std::string>& key_value_pair_headers,
Daniel Zheng92f7d172023-06-22 14:31:37 -070095 Error* error) override;
Yifan Hong40bb0d02020-02-24 17:33:14 -080096 void CleanupSuccessfulUpdate(
97 std::unique_ptr<CleanupSuccessfulUpdateCallbackInterface> callback,
Daniel Zheng92f7d172023-06-22 14:31:37 -070098 Error* error) override;
Tianjie7f8f2ab2021-07-23 17:08:50 -070099 bool setShouldSwitchSlotOnReboot(const std::string& metadata_filename,
Daniel Zheng92f7d172023-06-22 14:31:37 -0700100 Error* error) override;
101 bool resetShouldSwitchSlotOnReboot(Error* error) override;
Kelvin Zhang9c5baeb2024-11-05 13:42:32 -0800102 bool TriggerPostinstall(const std::string& partition, Error* error) override;
Alex Deymo5e3ea272016-01-28 13:42:23 -0800103
104 // ActionProcessorDelegate methods:
105 void ProcessingDone(const ActionProcessor* processor,
106 ErrorCode code) override;
107 void ProcessingStopped(const ActionProcessor* processor) override;
108 void ActionCompleted(ActionProcessor* processor,
109 AbstractAction* action,
110 ErrorCode code) override;
111
112 // DownloadActionDelegate overrides.
113 void BytesReceived(uint64_t bytes_progressed,
114 uint64_t bytes_received,
115 uint64_t total) override;
116 bool ShouldCancel(ErrorCode* cancel_reason) override;
117 void DownloadComplete() override;
118
Kelvin Zhang70eef232020-06-12 20:32:40 +0000119 // FilesystemVerifyDelegate overrides
120 void OnVerifyProgressUpdate(double progress) override;
121
Alex Deymo0d298542016-03-30 18:31:49 -0700122 // PostinstallRunnerAction::DelegateInterface
123 void ProgressUpdate(double progress) override;
124
Yifan Hong90965502020-02-19 15:22:47 -0800125 // CleanupPreviousUpdateActionDelegateInterface
126 void OnCleanupProgressUpdate(double progress) override;
127
Kelvin Zhanga43d6e82021-05-26 10:14:42 -0400128 // Check the result of an OTA update. Intended to be called after reboot, this
129 // will use prefs on disk to determine if OTA was installed, or rolledback.
130 [[nodiscard]] OTAResult GetOTAUpdateResult() const;
131 // Intended to be called:
132 // 1. When system rebooted and slot switch is attempted
133 // 2. When a new update is started
134 // 3. When user called |ResetStatus()|
135 bool ClearUpdateCompletedMarker();
136
Kelvin Zhang1304fe72021-10-06 19:12:12 -0700137 void set_update_certificates_path(
138 const std::string& update_certificates_path) {
139 update_certificates_path_ = update_certificates_path;
140 }
141
Alex Deymo5e3ea272016-01-28 13:42:23 -0800142 private:
Tianjie Xu90aaa102017-10-10 17:39:03 -0700143 friend class UpdateAttempterAndroidTest;
144
Kelvin Zhanga43d6e82021-05-26 10:14:42 -0400145 // Return |true| only if slot switched successfully after an OTA reboot.
146 // This will return |false| if an downgrade OTA is applied. Because after a
147 // downgrade OTA, we wipe /data, and there's no way for update_engine to
148 // "remember" that a downgrade OTA took place.
149 [[nodiscard]] bool OTARebootSucceeded() const;
150
Alex Deymo5e3ea272016-01-28 13:42:23 -0800151 // Schedules an event loop callback to start the action processor. This is
152 // scheduled asynchronously to unblock the event loop.
153 void ScheduleProcessingStart();
154
155 // Notifies an update request completed with the given error |code| to all
156 // observers.
157 void TerminateUpdateAndNotify(ErrorCode error_code);
158
159 // Sets the status to the given |status| and notifies a status update to
160 // all observers.
161 void SetStatusAndNotify(UpdateStatus status);
162
163 // Helper method to construct the sequence of actions to be performed for
Amin Hassani667cf7b2018-07-25 14:32:00 -0700164 // applying an update using a given HttpFetcher. The ownership of |fetcher| is
165 // passed to this function.
166 void BuildUpdateActions(HttpFetcher* fetcher);
Alex Deymo5e3ea272016-01-28 13:42:23 -0800167
Alex Deymo5e3ea272016-01-28 13:42:23 -0800168 // Writes to the processing completed marker. Does nothing if
169 // |update_completed_marker_| is empty.
Kelvin Zhanga43d6e82021-05-26 10:14:42 -0400170 [[nodiscard]] bool WriteUpdateCompletedMarker();
Alex Deymo5e3ea272016-01-28 13:42:23 -0800171
Kelvin Zhang1bcd7d72023-02-14 16:43:34 -0800172 // Returns whether a slot switch was attempted in the current boot.
173 [[nodiscard]] bool UpdateCompletedOnThisBoot() const;
Alex Deymo5e3ea272016-01-28 13:42:23 -0800174
Tianjie Xu90aaa102017-10-10 17:39:03 -0700175 // Prefs to use for metrics report
176 // |kPrefsPayloadAttemptNumber|: number of update attempts for the current
177 // payload_id.
178 // |KprefsNumReboots|: number of reboots when applying the current update.
179 // |kPrefsSystemUpdatedMarker|: end timestamp of the last successful update.
Tianjie Xu2a0ea632018-08-06 12:59:23 -0700180 // |kPrefsUpdateTimestampStart|: start timestamp in monotonic time of the
181 // current update.
182 // |kPrefsUpdateBootTimestampStart|: start timestamp in boot time of
183 // the current update.
Tianjie Xud4777a12017-10-24 14:54:18 -0700184 // |kPrefsCurrentBytesDownloaded|: number of bytes downloaded for the current
185 // payload_id.
186 // |kPrefsTotalBytesDownloaded|: number of bytes downloaded in total since
187 // the last successful update.
Tianjie Xu90aaa102017-10-10 17:39:03 -0700188
189 // Metrics report function to call:
190 // |ReportUpdateAttemptMetrics|
191 // |ReportSuccessfulUpdateMetrics|
192 // Prefs to update:
193 // |kPrefsSystemUpdatedMarker|
194 void CollectAndReportUpdateMetricsOnUpdateFinished(ErrorCode error_code);
195
Kelvin Zhang4061c512021-05-25 13:42:55 -0400196 // This function is called after update_engine is started after device
197 // reboots. If update_engine is restarted w/o device reboot, this function
198 // would not be called.
199
Tianjie Xu90aaa102017-10-10 17:39:03 -0700200 // Metrics report function to call:
201 // |ReportAbnormallyTerminatedUpdateAttemptMetrics|
202 // |ReportTimeToRebootMetrics|
203 // Prefs to update:
204 // |kPrefsBootId|, |kPrefsPreviousVersion|
Kelvin Zhanga43d6e82021-05-26 10:14:42 -0400205 void UpdateStateAfterReboot(OTAResult result);
Tianjie Xu90aaa102017-10-10 17:39:03 -0700206
207 // Prefs to update:
Tianjie Xu2a0ea632018-08-06 12:59:23 -0700208 // |kPrefsPayloadAttemptNumber|, |kPrefsUpdateTimestampStart|,
209 // |kPrefsUpdateBootTimestampStart|
Tianjie Xu90aaa102017-10-10 17:39:03 -0700210 void UpdatePrefsOnUpdateStart(bool is_resume);
211
212 // Prefs to delete:
xunchang9cf52622019-01-25 11:04:58 -0800213 // |kPrefsNumReboots|, |kPrefsCurrentBytesDownloaded|
Tianjie Xud4777a12017-10-24 14:54:18 -0700214 // |kPrefsSystemUpdatedMarker|, |kPrefsUpdateTimestampStart|,
xunchang9cf52622019-01-25 11:04:58 -0800215 // |kPrefsUpdateBootTimestampStart|
Tianjie Xu90aaa102017-10-10 17:39:03 -0700216 void ClearMetricsPrefs();
217
Yifan Hongbd47d622019-12-13 14:59:58 -0800218 // Return source and target slots for update.
219 BootControlInterface::Slot GetCurrentSlot() const;
220 BootControlInterface::Slot GetTargetSlot() const;
221
222 // Helper of public VerifyPayloadApplicable. Return the parsed manifest in
223 // |manifest|.
224 static bool VerifyPayloadParseManifest(const std::string& metadata_filename,
Kelvin Zhangabb082f2023-04-27 20:46:06 -0700225 std::string_view metadata_hash,
Yifan Hongbd47d622019-12-13 14:59:58 -0800226 DeltaArchiveManifest* manifest,
Daniel Zheng92f7d172023-06-22 14:31:37 -0700227 Error* error);
Kelvin Zhangabb082f2023-04-27 20:46:06 -0700228 static bool VerifyPayloadParseManifest(const std::string& metadata_filename,
229 DeltaArchiveManifest* manifest,
Daniel Zheng92f7d172023-06-22 14:31:37 -0700230 Error* error) {
Kelvin Zhangabb082f2023-04-27 20:46:06 -0700231 return VerifyPayloadParseManifest(metadata_filename, "", manifest, error);
232 }
Yifan Hongbd47d622019-12-13 14:59:58 -0800233
Yifan Hong90965502020-02-19 15:22:47 -0800234 // Enqueue and run a CleanupPreviousUpdateAction.
235 void ScheduleCleanupPreviousUpdate();
236
Yifan Hong40bb0d02020-02-24 17:33:14 -0800237 // Notify and clear |cleanup_previous_update_callbacks_|.
238 void NotifyCleanupPreviousUpdateCallbacksAndClear();
239
240 // Remove |callback| from |cleanup_previous_update_callbacks_|.
241 void RemoveCleanupPreviousUpdateCallback(
242 CleanupSuccessfulUpdateCallbackInterface* callback);
243
Daniel Zheng9fc62b82023-03-24 22:57:20 +0000244 bool IsProductionBuild();
245
Alex Deymo03a4de72016-07-20 16:08:23 -0700246 DaemonStateInterface* daemon_state_;
Alex Deymo5e3ea272016-01-28 13:42:23 -0800247
248 // DaemonStateAndroid pointers.
249 PrefsInterface* prefs_;
250 BootControlInterface* boot_control_;
251 HardwareInterface* hardware_;
252
Mohammad Samiul Islam24a82792021-02-12 16:52:36 +0000253 std::unique_ptr<ApexHandlerInterface> apex_handler_android_;
254
Alex Deymo5e3ea272016-01-28 13:42:23 -0800255 // Last status notification timestamp used for throttling. Use monotonic
256 // TimeTicks to ensure that notifications are sent even if the system clock is
257 // set back in the middle of an update.
258 base::TimeTicks last_notify_time_;
259
Amin Hassani667cf7b2018-07-25 14:32:00 -0700260 // The processor for running Actions.
Alex Deymo5e3ea272016-01-28 13:42:23 -0800261 std::unique_ptr<ActionProcessor> processor_;
262
Alex Deymo5e3ea272016-01-28 13:42:23 -0800263 // The InstallPlan used during the ongoing update.
264 InstallPlan install_plan_;
265
266 // For status:
267 UpdateStatus status_{UpdateStatus::IDLE};
268 double download_progress_{0.0};
269
Alex Deymo0fd51ff2016-02-03 14:22:43 -0800270 // The offset in the payload file where the CrAU part starts.
271 int64_t base_offset_{0};
272
Alex Deymo87792ea2016-07-25 15:40:36 -0700273 // Helper class to select the network to use during the update.
274 std::unique_ptr<NetworkSelectorInterface> network_selector_;
275
Tianjie Xu90aaa102017-10-10 17:39:03 -0700276 std::unique_ptr<ClockInterface> clock_;
277
Tianjie Xu1b661142017-09-28 14:03:42 -0700278 std::unique_ptr<MetricsReporterInterface> metrics_reporter_;
279
Kyeongkab.Nam500ca132019-06-26 13:48:07 +0900280 ::android::base::unique_fd payload_fd_;
281
Yifan Hong40bb0d02020-02-24 17:33:14 -0800282 std::vector<std::unique_ptr<CleanupSuccessfulUpdateCallbackInterface>>
283 cleanup_previous_update_callbacks_;
284 // Result of previous CleanupPreviousUpdateAction. Nullopt If
285 // CleanupPreviousUpdateAction has not been executed.
286 std::optional<ErrorCode> cleanup_previous_update_code_{std::nullopt};
287
Kelvin Zhang1304fe72021-10-06 19:12:12 -0700288 // The path to the zip file with X509 certificates.
289 std::string update_certificates_path_{constants::kUpdateCertificatesPath};
Kelvin Zhangf8441982022-12-07 18:18:47 -0800290 ErrorCode last_error_{ErrorCode::kSuccess};
Kelvin Zhang1304fe72021-10-06 19:12:12 -0700291
Kelvin Zhang32a73a92022-12-19 12:27:41 -0800292 metrics_utils::PersistedValue<int64_t> metric_bytes_downloaded_;
293 metrics_utils::PersistedValue<int64_t> metric_total_bytes_downloaded_;
294
Alex Deymo5e3ea272016-01-28 13:42:23 -0800295 DISALLOW_COPY_AND_ASSIGN(UpdateAttempterAndroid);
296};
297
298} // namespace chromeos_update_engine
299
Amin Hassaniec7bc112020-10-29 16:47:58 -0700300#endif // UPDATE_ENGINE_AOSP_UPDATE_ATTEMPTER_ANDROID_H_