blob: 615eb661906d46e1509b648b290f505d35bec9ec [file] [log] [blame]
Alex Deymoaea4c1c2015-08-19 20:24:43 -07001//
2// Copyright (C) 2011 The Android Open Source Project
3//
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at
7//
8// http://www.apache.org/licenses/LICENSE-2.0
9//
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15//
rspangler@google.com49fdf182009-10-10 00:57:34 +000016
Amin Hassaniec7bc112020-10-29 16:47:58 -070017#include "update_engine/common/download_action.h"
Alex Deymoaab50e32014-11-10 19:55:35 -080018
adlr@google.comc98a7ed2009-12-04 18:54:03 +000019#include <errno.h>
Alex Deymoe5e5fe92015-10-05 09:28:19 -070020
adlr@google.comc98a7ed2009-12-04 18:54:03 +000021#include <algorithm>
Andrew de los Reyesf9714432010-05-04 10:21:23 -070022#include <string>
David Zeuthen8f191b22013-08-06 12:27:50 -070023
Alex Vakulenko75039d72014-03-25 12:36:28 -070024#include <base/files/file_path.h>
Lann Martin39f57142017-07-14 09:18:42 -060025#include <base/metrics/statistics_recorder.h>
Alex Vakulenko75039d72014-03-25 12:36:28 -070026#include <base/strings/stringprintf.h>
David Zeuthen8f191b22013-08-06 12:27:50 -070027
Alex Deymo39910dc2015-11-09 17:04:30 -080028#include "update_engine/common/boot_control_interface.h"
Alex Deymoed9cc182016-06-15 16:19:29 -070029#include "update_engine/common/error_code_utils.h"
Sen Jiang5ae865b2017-04-18 14:24:40 -070030#include "update_engine/common/multi_range_http_fetcher.h"
Kelvin Zhang5c1451f2020-12-02 17:01:54 -050031#include "update_engine/common/prefs_interface.h"
Alex Deymo39910dc2015-11-09 17:04:30 -080032#include "update_engine/common/utils.h"
adlr@google.comc98a7ed2009-12-04 18:54:03 +000033
Alex Deymof329b932014-10-30 01:37:48 -070034using base::FilePath;
Andrew de los Reyesf9714432010-05-04 10:21:23 -070035using std::string;
rspangler@google.com49fdf182009-10-10 00:57:34 +000036
37namespace chromeos_update_engine {
38
Darin Petkov73058b42010-10-06 16:32:19 -070039DownloadAction::DownloadAction(PrefsInterface* prefs,
Alex Deymo1b3556c2016-02-03 09:54:02 -080040 BootControlInterface* boot_control,
41 HardwareInterface* hardware,
Amin Hassani7ecda262017-07-11 17:10:50 -070042 HttpFetcher* http_fetcher,
Kelvin Zhang1304fe72021-10-06 19:12:12 -070043 bool interactive,
44 std::string update_certificates_path)
Darin Petkov73058b42010-10-06 16:32:19 -070045 : prefs_(prefs),
Alex Deymo1b3556c2016-02-03 09:54:02 -080046 boot_control_(boot_control),
47 hardware_(hardware),
Sen Jiang5ae865b2017-04-18 14:24:40 -070048 http_fetcher_(new MultiRangeHttpFetcher(http_fetcher)),
Amin Hassanied37d682018-04-06 13:22:00 -070049 interactive_(interactive),
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -070050 code_(ErrorCode::kSuccess),
Kelvin Zhang1304fe72021-10-06 19:12:12 -070051 delegate_(nullptr),
52 update_certificates_path_(std::move(update_certificates_path)) {}
rspangler@google.com49fdf182009-10-10 00:57:34 +000053
54DownloadAction::~DownloadAction() {}
55
56void DownloadAction::PerformAction() {
57 http_fetcher_->set_delegate(this);
rspangler@google.com49fdf182009-10-10 00:57:34 +000058
adlr@google.comc98a7ed2009-12-04 18:54:03 +000059 // Get the InstallPlan and read it
60 CHECK(HasInputObject());
Andrew de los Reyesf9185172010-05-03 11:07:05 -070061 install_plan_ = GetInputObject();
Andrew de los Reyesf9185172010-05-03 11:07:05 -070062 install_plan_.Dump();
Sen Jiang5ae865b2017-04-18 14:24:40 -070063
64 bytes_received_ = 0;
Aaron Wood9321f502017-09-07 11:18:54 -070065 bytes_received_previous_payloads_ = 0;
Sen Jiang5ae865b2017-04-18 14:24:40 -070066 bytes_total_ = 0;
67 for (const auto& payload : install_plan_.payloads)
68 bytes_total_ += payload.size;
69
70 if (install_plan_.is_resume) {
71 int64_t payload_index = 0;
72 if (prefs_->GetInt64(kPrefsUpdateStatePayloadIndex, &payload_index) &&
73 static_cast<size_t>(payload_index) < install_plan_.payloads.size()) {
74 // Save the index for the resume payload before downloading any previous
75 // payload, otherwise it will be overwritten.
76 resume_payload_index_ = payload_index;
77 for (int i = 0; i < payload_index; i++)
78 install_plan_.payloads[i].already_applied = true;
79 }
80 }
Kelvin Zhang5c1451f2020-12-02 17:01:54 -050081 CHECK_GE(install_plan_.payloads.size(), 1UL);
Sen Jiang0affc2c2017-02-10 15:55:05 -080082 if (!payload_)
83 payload_ = &install_plan_.payloads[0];
adlr@google.comc98a7ed2009-12-04 18:54:03 +000084
Alex Deymo5ed695e2015-10-05 16:59:23 -070085 LOG(INFO) << "Marking new slot as unbootable";
Alex Deymo1b3556c2016-02-03 09:54:02 -080086 if (!boot_control_->MarkSlotUnbootable(install_plan_.target_slot)) {
Alex Deymo5ed695e2015-10-05 16:59:23 -070087 LOG(WARNING) << "Unable to mark new slot "
88 << BootControlInterface::SlotName(install_plan_.target_slot)
89 << ". Proceeding with the update anyway.";
90 }
91
Sen Jiang6c736682017-03-10 15:01:36 -080092 StartDownloading();
93}
94
Kelvin Zhangcc011d32020-07-10 18:20:08 -040095bool DownloadAction::LoadCachedManifest(int64_t manifest_size) {
96 std::string cached_manifest_bytes;
97 if (!prefs_->GetString(kPrefsManifestBytes, &cached_manifest_bytes) ||
98 cached_manifest_bytes.size() <= 0) {
99 LOG(INFO) << "Cached Manifest data not found";
100 return false;
101 }
102 if (static_cast<int64_t>(cached_manifest_bytes.size()) != manifest_size) {
103 LOG(WARNING) << "Cached metadata has unexpected size: "
104 << cached_manifest_bytes.size() << " vs. " << manifest_size;
105 return false;
106 }
107
Daniel Zhengda4f7292022-09-02 22:59:32 +0000108 ErrorCode error{};
Kelvin Zhangcc011d32020-07-10 18:20:08 -0400109 const bool success =
Kelvin Zhang22b62e42020-12-14 14:50:40 -0500110 delta_performer_->Write(
Kelvin Zhangcc011d32020-07-10 18:20:08 -0400111 cached_manifest_bytes.data(), cached_manifest_bytes.size(), &error) &&
Kelvin Zhang22b62e42020-12-14 14:50:40 -0500112 delta_performer_->IsManifestValid();
Kelvin Zhangcc011d32020-07-10 18:20:08 -0400113 if (success) {
114 LOG(INFO) << "Successfully parsed cached manifest";
115 } else {
116 // If parsing of cached data failed, fall back to fetch them using HTTP
117 LOG(WARNING) << "Cached manifest data fails to load, error code:"
118 << static_cast<int>(error) << "," << error;
119 }
120 return success;
121}
122
Sen Jiang6c736682017-03-10 15:01:36 -0800123void DownloadAction::StartDownloading() {
Sen Jiang5ae865b2017-04-18 14:24:40 -0700124 download_active_ = true;
125 http_fetcher_->ClearRanges();
Kelvin Zhangcc011d32020-07-10 18:20:08 -0400126
Kelvin Zhang22b62e42020-12-14 14:50:40 -0500127 if (delta_performer_ != nullptr) {
Kelvin Zhangcc011d32020-07-10 18:20:08 -0400128 LOG(INFO) << "Using writer for test.";
129 } else {
130 delta_performer_.reset(new DeltaPerformer(prefs_,
131 boot_control_,
132 hardware_,
133 delegate_,
134 &install_plan_,
135 payload_,
Kelvin Zhang1304fe72021-10-06 19:12:12 -0700136 interactive_,
137 update_certificates_path_));
Kelvin Zhangcc011d32020-07-10 18:20:08 -0400138 }
139
Sen Jiang5ae865b2017-04-18 14:24:40 -0700140 if (install_plan_.is_resume &&
141 payload_ == &install_plan_.payloads[resume_payload_index_]) {
Kelvin Zhangcc011d32020-07-10 18:20:08 -0400142 // Resuming an update so parse the cached manifest first
Sen Jiang5ae865b2017-04-18 14:24:40 -0700143 int64_t manifest_metadata_size = 0;
144 int64_t manifest_signature_size = 0;
145 prefs_->GetInt64(kPrefsManifestMetadataSize, &manifest_metadata_size);
146 prefs_->GetInt64(kPrefsManifestSignatureSize, &manifest_signature_size);
Kelvin Zhangcc011d32020-07-10 18:20:08 -0400147
148 // TODO(zhangkelvin) Add unittest for success and fallback route
149 if (!LoadCachedManifest(manifest_metadata_size + manifest_signature_size)) {
150 if (delta_performer_) {
151 // Create a new DeltaPerformer to reset all its state
Kelvin Zhang1304fe72021-10-06 19:12:12 -0700152 delta_performer_ =
153 std::make_unique<DeltaPerformer>(prefs_,
154 boot_control_,
155 hardware_,
156 delegate_,
157 &install_plan_,
158 payload_,
159 interactive_,
160 update_certificates_path_);
Kelvin Zhangcc011d32020-07-10 18:20:08 -0400161 }
162 http_fetcher_->AddRange(base_offset_,
163 manifest_metadata_size + manifest_signature_size);
164 }
165
Kelvin Zhangead9fd72020-12-03 12:57:35 -0500166 // If there're remaining unprocessed data blobs, fetch them. Be careful
167 // not to request data beyond the end of the payload to avoid 416 HTTP
168 // response error codes.
Sen Jiang5ae865b2017-04-18 14:24:40 -0700169 int64_t next_data_offset = 0;
170 prefs_->GetInt64(kPrefsUpdateStateNextDataOffset, &next_data_offset);
171 uint64_t resume_offset =
172 manifest_metadata_size + manifest_signature_size + next_data_offset;
173 if (!payload_->size) {
174 http_fetcher_->AddRange(base_offset_ + resume_offset);
175 } else if (resume_offset < payload_->size) {
176 http_fetcher_->AddRange(base_offset_ + resume_offset,
177 payload_->size - resume_offset);
178 }
179 } else {
180 if (payload_->size) {
181 http_fetcher_->AddRange(base_offset_, payload_->size);
182 } else {
183 // If no payload size is passed we assume we read until the end of the
184 // stream.
185 http_fetcher_->AddRange(base_offset_);
186 }
187 }
188
Andrew de los Reyesf9185172010-05-03 11:07:05 -0700189 http_fetcher_->BeginTransfer(install_plan_.download_url);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000190}
191
Alex Deymof2858572016-02-25 11:20:13 -0800192void DownloadAction::SuspendAction() {
193 http_fetcher_->Pause();
194}
195
196void DownloadAction::ResumeAction() {
197 http_fetcher_->Unpause();
198}
199
rspangler@google.com49fdf182009-10-10 00:57:34 +0000200void DownloadAction::TerminateProcessing() {
Kelvin Zhang22b62e42020-12-14 14:50:40 -0500201 if (delta_performer_) {
202 delta_performer_->Close();
203 delta_performer_.reset();
Darin Petkov698d0412010-10-13 10:59:44 -0700204 }
Alex Deymo1b3556c2016-02-03 09:54:02 -0800205 download_active_ = false;
Darin Petkov9ce452b2010-11-17 14:33:28 -0800206 // Terminates the transfer. The action is terminated, if necessary, when the
207 // TransferTerminated callback is received.
208 http_fetcher_->TerminateTransfer();
rspangler@google.com49fdf182009-10-10 00:57:34 +0000209}
210
Andrew de los Reyes34e41a12010-10-26 20:07:58 -0700211void DownloadAction::SeekToOffset(off_t offset) {
212 bytes_received_ = offset;
213}
214
Amin Hassani0cd9d772018-07-31 23:55:43 -0700215bool DownloadAction::ReceivedBytes(HttpFetcher* fetcher,
Alex Vakulenkof68bbbc2015-02-09 12:53:18 -0800216 const void* bytes,
217 size_t length) {
Andrew de los Reyes63b96d72010-05-10 13:08:54 -0700218 bytes_received_ += length;
Aaron Wood9321f502017-09-07 11:18:54 -0700219 uint64_t bytes_downloaded_total =
220 bytes_received_previous_payloads_ + bytes_received_;
Alex Deymo542c19b2015-12-03 07:43:31 -0300221 if (delegate_ && download_active_) {
Aaron Wood9321f502017-09-07 11:18:54 -0700222 delegate_->BytesReceived(length, bytes_downloaded_total, bytes_total_);
Alex Deymo542c19b2015-12-03 07:43:31 -0300223 }
Kelvin Zhang22b62e42020-12-14 14:50:40 -0500224 if (delta_performer_ && !delta_performer_->Write(bytes, length, &code_)) {
Sen Jiang5ae865b2017-04-18 14:24:40 -0700225 if (code_ != ErrorCode::kSuccess) {
226 LOG(ERROR) << "Error " << utils::ErrorCodeToString(code_) << " (" << code_
227 << ") in DeltaPerformer's Write method when "
228 << "processing the received payload -- Terminating processing";
Kelvin Zhang430852d2023-05-25 17:00:24 -0700229 } else {
230 LOG(ERROR) << "Unknown error in DeltaPerformer's Write method when "
231 << "processing the received payload -- Terminating processing";
232 code_ = ErrorCode::kDownloadWriteError;
Sen Jiang5ae865b2017-04-18 14:24:40 -0700233 }
Darin Petkov9ce452b2010-11-17 14:33:28 -0800234 // Don't tell the action processor that the action is complete until we get
235 // the TransferTerminated callback. Otherwise, this and the HTTP fetcher
236 // objects may get destroyed before all callbacks are complete.
Darin Petkov698d0412010-10-13 10:59:44 -0700237 TerminateProcessing();
Amin Hassani0cd9d772018-07-31 23:55:43 -0700238 return false;
Darin Petkov698d0412010-10-13 10:59:44 -0700239 }
David Zeuthen8f191b22013-08-06 12:27:50 -0700240
Amin Hassani0cd9d772018-07-31 23:55:43 -0700241 return true;
rspangler@google.com49fdf182009-10-10 00:57:34 +0000242}
243
Alex Deymo60ca1a72015-06-18 18:19:15 -0700244void DownloadAction::TransferComplete(HttpFetcher* fetcher, bool successful) {
Kelvin Zhang22b62e42020-12-14 14:50:40 -0500245 if (delta_performer_) {
246 LOG_IF(WARNING, delta_performer_->Close() != 0)
247 << "Error closing the writer.";
rspangler@google.com49fdf182009-10-10 00:57:34 +0000248 }
Alex Deymo1b3556c2016-02-03 09:54:02 -0800249 download_active_ = false;
David Zeuthena99981f2013-04-29 13:42:47 -0700250 ErrorCode code =
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700251 successful ? ErrorCode::kSuccess : ErrorCode::kDownloadTransferError;
Aaron Wood9321f502017-09-07 11:18:54 -0700252 if (code == ErrorCode::kSuccess) {
253 if (delta_performer_ && !payload_->already_applied)
Sen Jiang5ae865b2017-04-18 14:24:40 -0700254 code = delta_performer_->VerifyPayload(payload_->hash, payload_->size);
Lann Martin39f57142017-07-14 09:18:42 -0600255 if (code == ErrorCode::kSuccess) {
Kelvin Zhang5c1451f2020-12-02 17:01:54 -0500256 CHECK_EQ(install_plan_.payloads.size(), 1UL);
Sen Jiang7ebfccf2018-03-15 13:55:55 -0700257 // All payloads have been applied and verified.
258 if (delegate_)
259 delegate_->DownloadComplete();
260
Lann Martin39f57142017-07-14 09:18:42 -0600261 // Log UpdateEngine.DownloadAction.* histograms to help diagnose
Sen Jiang7ebfccf2018-03-15 13:55:55 -0700262 // long-blocking operations.
Lann Martin39f57142017-07-14 09:18:42 -0600263 std::string histogram_output;
Amin Hassani008c4582019-01-13 16:22:47 -0800264 base::StatisticsRecorder::WriteGraph("UpdateEngine.DownloadAction.",
265 &histogram_output);
Lann Martin39f57142017-07-14 09:18:42 -0600266 LOG(INFO) << histogram_output;
267 } else {
Darin Petkov7ed561b2011-10-04 02:59:03 -0700268 LOG(ERROR) << "Download of " << install_plan_.download_url
269 << " failed due to payload verification error.";
rspangler@google.com49fdf182009-10-10 00:57:34 +0000270 }
271 }
Darin Petkovc1a8b422010-07-19 11:34:49 -0700272
Darin Petkovc97435c2010-07-20 12:37:43 -0700273 // Write the path to the output pipe if we're successful.
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700274 if (code == ErrorCode::kSuccess && HasOutputPipe())
Darin Petkov3aefa862010-12-07 14:45:00 -0800275 SetOutputObject(install_plan_);
Darin Petkovc97435c2010-07-20 12:37:43 -0700276 processor_->ActionComplete(this, code);
rspangler@google.com49fdf182009-10-10 00:57:34 +0000277}
278
Sen Jiang5ae865b2017-04-18 14:24:40 -0700279void DownloadAction::TransferTerminated(HttpFetcher* fetcher) {
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700280 if (code_ != ErrorCode::kSuccess) {
Darin Petkov9ce452b2010-11-17 14:33:28 -0800281 processor_->ActionComplete(this, code_);
Sen Jiang5ae865b2017-04-18 14:24:40 -0700282 } else if (payload_->already_applied) {
283 LOG(INFO) << "TransferTerminated with ErrorCode::kSuccess when the current "
284 "payload has already applied, treating as TransferComplete.";
285 TransferComplete(fetcher, true);
Darin Petkov9ce452b2010-11-17 14:33:28 -0800286 }
287}
288
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700289} // namespace chromeos_update_engine