Alex Deymo | aea4c1c | 2015-08-19 20:24:43 -0700 | [diff] [blame] | 1 | // |
| 2 | // Copyright (C) 2012 The Android Open Source Project |
| 3 | // |
| 4 | // Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | // you may not use this file except in compliance with the License. |
| 6 | // You may obtain a copy of the License at |
| 7 | // |
| 8 | // http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | // |
| 10 | // Unless required by applicable law or agreed to in writing, software |
| 11 | // distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | // See the License for the specific language governing permissions and |
| 14 | // limitations under the License. |
| 15 | // |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 16 | |
Amin Hassani | ec7bc11 | 2020-10-29 16:47:58 -0700 | [diff] [blame] | 17 | #include "update_engine/cros/update_attempter.h" |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 18 | |
Ben Chan | 9abb763 | 2014-08-07 00:10:53 -0700 | [diff] [blame] | 19 | #include <stdint.h> |
| 20 | |
Alex Vakulenko | 59e253e | 2014-02-24 10:40:21 -0800 | [diff] [blame] | 21 | #include <algorithm> |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 22 | #include <map> |
Alex Deymo | bc91a27 | 2014-05-20 16:45:33 -0700 | [diff] [blame] | 23 | #include <memory> |
| 24 | #include <string> |
Andrew | a8d7df3 | 2020-03-15 20:10:01 -0700 | [diff] [blame] | 25 | #include <unordered_set> |
Alex Vakulenko | d2779df | 2014-06-16 13:19:00 -0700 | [diff] [blame] | 26 | #include <utility> |
Alex Deymo | 44666f9 | 2014-07-22 20:29:24 -0700 | [diff] [blame] | 27 | #include <vector> |
Darin Petkov | 9d65b7b | 2010-07-20 09:13:01 -0700 | [diff] [blame] | 28 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 29 | #include <base/bind.h> |
Denis Nikitin | 8f2fa74 | 2019-05-29 10:36:52 -0700 | [diff] [blame] | 30 | #include <base/compiler_specific.h> |
Ben Chan | 06c76a4 | 2014-09-05 08:21:06 -0700 | [diff] [blame] | 31 | #include <base/files/file_util.h> |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 32 | #include <base/logging.h> |
Andrew de los Reyes | 4516810 | 2010-11-22 11:13:50 -0800 | [diff] [blame] | 33 | #include <base/rand_util.h> |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 34 | #include <base/strings/string_number_conversions.h> |
Daniel Erat | 65f1da0 | 2014-06-27 22:05:38 -0700 | [diff] [blame] | 35 | #include <base/strings/string_util.h> |
Alex Vakulenko | 75039d7 | 2014-03-25 12:36:28 -0700 | [diff] [blame] | 36 | #include <base/strings/stringprintf.h> |
May Lippert | 60aa3ca | 2018-08-15 16:55:29 -0700 | [diff] [blame] | 37 | #include <base/time/time.h> |
Sen Jiang | 2703ef4 | 2017-03-16 13:36:21 -0700 | [diff] [blame] | 38 | #include <brillo/data_encoding.h> |
Sen Jiang | e67bb5b | 2016-06-20 15:53:56 -0700 | [diff] [blame] | 39 | #include <brillo/errors/error_codes.h> |
Alex Vakulenko | 3f39d5c | 2015-10-13 09:27:13 -0700 | [diff] [blame] | 40 | #include <brillo/message_loops/message_loop.h> |
Patrick Dubroy | 7fbbe8a | 2011-08-01 17:28:22 +0200 | [diff] [blame] | 41 | #include <policy/device_policy.h> |
Alex Deymo | bc91a27 | 2014-05-20 16:45:33 -0700 | [diff] [blame] | 42 | #include <policy/libpolicy.h> |
Alex Deymo | d6deb1d | 2015-08-28 15:54:37 -0700 | [diff] [blame] | 43 | #include <update_engine/dbus-constants.h> |
Darin Petkov | 9d65b7b | 2010-07-20 09:13:01 -0700 | [diff] [blame] | 44 | |
Alex Deymo | 14c0da8 | 2016-07-20 16:45:45 -0700 | [diff] [blame] | 45 | #include "update_engine/certificate_checker.h" |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 46 | #include "update_engine/common/boot_control_interface.h" |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 47 | #include "update_engine/common/constants.h" |
Xiaochu Liu | 8ba486f | 2018-11-06 11:14:10 -0800 | [diff] [blame] | 48 | #include "update_engine/common/dlcservice_interface.h" |
Amin Hassani | ec7bc11 | 2020-10-29 16:47:58 -0700 | [diff] [blame] | 49 | #include "update_engine/common/download_action.h" |
Jae Hoon Kim | 5e8e30b | 2020-05-06 14:59:06 -0700 | [diff] [blame] | 50 | #include "update_engine/common/excluder_interface.h" |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 51 | #include "update_engine/common/hardware_interface.h" |
Amin Hassani | ec7bc11 | 2020-10-29 16:47:58 -0700 | [diff] [blame] | 52 | #include "update_engine/common/metrics_reporter_interface.h" |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 53 | #include "update_engine/common/platform_constants.h" |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 54 | #include "update_engine/common/prefs.h" |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 55 | #include "update_engine/common/prefs_interface.h" |
| 56 | #include "update_engine/common/subprocess.h" |
Amin Hassani | ec7bc11 | 2020-10-29 16:47:58 -0700 | [diff] [blame] | 57 | #include "update_engine/common/system_state.h" |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 58 | #include "update_engine/common/utils.h" |
Kelvin Zhang | 97cb058 | 2020-12-02 16:42:15 -0500 | [diff] [blame] | 59 | #include "update_engine/cros/download_action_chromeos.h" |
Amin Hassani | ec7bc11 | 2020-10-29 16:47:58 -0700 | [diff] [blame] | 60 | #include "update_engine/cros/omaha_request_action.h" |
| 61 | #include "update_engine/cros/omaha_request_params.h" |
| 62 | #include "update_engine/cros/omaha_response_handler_action.h" |
| 63 | #include "update_engine/cros/omaha_utils.h" |
| 64 | #include "update_engine/cros/p2p_manager.h" |
| 65 | #include "update_engine/cros/payload_state_interface.h" |
| 66 | #include "update_engine/cros/power_manager_interface.h" |
Alex Deymo | 14c0da8 | 2016-07-20 16:45:45 -0700 | [diff] [blame] | 67 | #include "update_engine/libcurl_http_fetcher.h" |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 68 | #include "update_engine/payload_consumer/filesystem_verifier_action.h" |
| 69 | #include "update_engine/payload_consumer/postinstall_runner_action.h" |
Amin Hassani | 0882a51 | 2018-04-05 16:25:44 -0700 | [diff] [blame] | 70 | #include "update_engine/update_boot_flags_action.h" |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 71 | #include "update_engine/update_manager/policy.h" |
Marton Hunyady | e58bddb | 2018-04-10 20:27:26 +0200 | [diff] [blame] | 72 | #include "update_engine/update_manager/policy_utils.h" |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 73 | #include "update_engine/update_manager/update_manager.h" |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 74 | #include "update_engine/update_status_utils.h" |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 75 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 76 | using base::Bind; |
| 77 | using base::Callback; |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 78 | using base::FilePath; |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 79 | using base::Time; |
Darin Petkov | af18305 | 2010-08-23 12:07:13 -0700 | [diff] [blame] | 80 | using base::TimeDelta; |
| 81 | using base::TimeTicks; |
Alex Vakulenko | 3f39d5c | 2015-10-13 09:27:13 -0700 | [diff] [blame] | 82 | using brillo::MessageLoop; |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 83 | using chromeos_update_manager::CalculateStagingCase; |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 84 | using chromeos_update_manager::EvalStatus; |
| 85 | using chromeos_update_manager::Policy; |
Adolfo Victoria | 497044c | 2018-07-18 07:51:42 -0700 | [diff] [blame] | 86 | using chromeos_update_manager::StagingCase; |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 87 | using chromeos_update_manager::UpdateCheckParams; |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 88 | using std::map; |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 89 | using std::string; |
| 90 | using std::vector; |
Aaron Wood | bf5a252 | 2017-10-04 10:58:36 -0700 | [diff] [blame] | 91 | using update_engine::UpdateAttemptFlags; |
Aaron Wood | 7f92e2b | 2017-08-28 14:51:21 -0700 | [diff] [blame] | 92 | using update_engine::UpdateEngineStatus; |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 93 | |
| 94 | namespace chromeos_update_engine { |
| 95 | |
Darin Petkov | 3627577 | 2010-10-01 11:40:57 -0700 | [diff] [blame] | 96 | const int UpdateAttempter::kMaxDeltaUpdateFailures = 3; |
| 97 | |
Andrew de los Reyes | 4516810 | 2010-11-22 11:13:50 -0800 | [diff] [blame] | 98 | namespace { |
| 99 | const int kMaxConsecutiveObeyProxyRequests = 20; |
Gilad Arnold | 70e476e | 2013-07-30 16:01:13 -0700 | [diff] [blame] | 100 | |
Alex Deymo | 0d29854 | 2016-03-30 18:31:49 -0700 | [diff] [blame] | 101 | // Minimum threshold to broadcast an status update in progress and time. |
| 102 | const double kBroadcastThresholdProgress = 0.01; // 1% |
| 103 | const int kBroadcastThresholdSeconds = 10; |
| 104 | |
David Pursell | 02c1864 | 2014-11-06 11:26:11 -0800 | [diff] [blame] | 105 | // By default autest bypasses scattering. If we want to test scattering, |
| 106 | // use kScheduledAUTestURLRequest. The URL used is same in both cases, but |
| 107 | // different params are passed to CheckForUpdate(). |
| 108 | const char kAUTestURLRequest[] = "autest"; |
| 109 | const char kScheduledAUTestURLRequest[] = "autest-scheduled"; |
Alex Vakulenko | d2779df | 2014-06-16 13:19:00 -0700 | [diff] [blame] | 110 | } // namespace |
Andrew de los Reyes | 4516810 | 2010-11-22 11:13:50 -0800 | [diff] [blame] | 111 | |
Sen Jiang | daeaa43 | 2018-10-09 18:18:45 -0700 | [diff] [blame] | 112 | ErrorCode GetErrorCodeForAction(AbstractAction* action, ErrorCode code) { |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 113 | if (code != ErrorCode::kError) |
Darin Petkov | 777dbfa | 2010-07-20 15:03:37 -0700 | [diff] [blame] | 114 | return code; |
| 115 | |
| 116 | const string type = action->Type(); |
| 117 | if (type == OmahaRequestAction::StaticType()) |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 118 | return ErrorCode::kOmahaRequestError; |
Darin Petkov | 777dbfa | 2010-07-20 15:03:37 -0700 | [diff] [blame] | 119 | if (type == OmahaResponseHandlerAction::StaticType()) |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 120 | return ErrorCode::kOmahaResponseHandlerError; |
Allie Wood | eb9e6d8 | 2015-04-17 13:55:30 -0700 | [diff] [blame] | 121 | if (type == FilesystemVerifierAction::StaticType()) |
| 122 | return ErrorCode::kFilesystemVerifierError; |
Darin Petkov | 777dbfa | 2010-07-20 15:03:37 -0700 | [diff] [blame] | 123 | if (type == PostinstallRunnerAction::StaticType()) |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 124 | return ErrorCode::kPostinstallRunnerError; |
Darin Petkov | 777dbfa | 2010-07-20 15:03:37 -0700 | [diff] [blame] | 125 | |
| 126 | return code; |
| 127 | } |
| 128 | |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 129 | UpdateAttempter::UpdateAttempter(CertificateChecker* cert_checker) |
Gilad Arnold | 1f84723 | 2014-04-07 12:07:49 -0700 | [diff] [blame] | 130 | : processor_(new ActionProcessor()), |
Colin Howes | 978c108 | 2018-12-03 11:46:12 -0800 | [diff] [blame] | 131 | cert_checker_(cert_checker), |
| 132 | is_install_(false) {} |
Darin Petkov | c6c135c | 2010-08-11 13:36:18 -0700 | [diff] [blame] | 133 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 134 | UpdateAttempter::~UpdateAttempter() { |
Amin Hassani | c288bf6 | 2020-11-04 19:33:43 -0800 | [diff] [blame] | 135 | // Prevent any DBus communication from UpdateAttempter when shutting down the |
| 136 | // daemon. |
| 137 | ClearObservers(); |
| 138 | |
Alex Deymo | 33e91e7 | 2015-12-01 18:26:08 -0300 | [diff] [blame] | 139 | // CertificateChecker might not be initialized in unittests. |
| 140 | if (cert_checker_) |
| 141 | cert_checker_->SetObserver(nullptr); |
Alex Deymo | 2b4268c | 2015-12-04 13:56:25 -0800 | [diff] [blame] | 142 | // Release ourselves as the ActionProcessor's delegate to prevent |
| 143 | // re-scheduling the updates due to the processing stopped. |
| 144 | processor_->set_delegate(nullptr); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 145 | } |
| 146 | |
Gilad Arnold | 1f84723 | 2014-04-07 12:07:49 -0700 | [diff] [blame] | 147 | void UpdateAttempter::Init() { |
| 148 | // Pulling from the SystemState can only be done after construction, since |
| 149 | // this is an aggregate of various objects (such as the UpdateAttempter), |
| 150 | // which requires them all to be constructed prior to it being used. |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 151 | prefs_ = SystemState::Get()->prefs(); |
| 152 | omaha_request_params_ = SystemState::Get()->request_params(); |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 153 | |
Alex Deymo | 33e91e7 | 2015-12-01 18:26:08 -0300 | [diff] [blame] | 154 | if (cert_checker_) |
| 155 | cert_checker_->SetObserver(this); |
| 156 | |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 157 | // In case of update_engine restart without a reboot we need to restore the |
| 158 | // reboot needed state. |
Vyshu Khota | 4c5413d | 2020-11-04 16:17:25 -0800 | [diff] [blame] | 159 | if (GetBootTimeAtUpdate(nullptr)) { |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 160 | status_ = UpdateStatus::UPDATED_NEED_REBOOT; |
Vyshu Khota | 4c5413d | 2020-11-04 16:17:25 -0800 | [diff] [blame] | 161 | } else { |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 162 | status_ = UpdateStatus::IDLE; |
Vyshu Khota | 4c5413d | 2020-11-04 16:17:25 -0800 | [diff] [blame] | 163 | prefs_->Delete(kPrefsLastFp, {kDlcPrefsSubDir}); |
| 164 | } |
Gilad Arnold | 1f84723 | 2014-04-07 12:07:49 -0700 | [diff] [blame] | 165 | } |
| 166 | |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 167 | bool UpdateAttempter::ScheduleUpdates() { |
Jae Hoon Kim | ba2fdce | 2019-07-11 13:18:58 -0700 | [diff] [blame] | 168 | if (IsBusyOrUpdateScheduled()) |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 169 | return false; |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 170 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 171 | chromeos_update_manager::UpdateManager* const update_manager = |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 172 | SystemState::Get()->update_manager(); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 173 | CHECK(update_manager); |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 174 | Callback<void(EvalStatus, const UpdateCheckParams&)> callback = |
| 175 | Bind(&UpdateAttempter::OnUpdateScheduled, base::Unretained(this)); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 176 | // We limit the async policy request to a reasonably short time, to avoid a |
| 177 | // starvation due to a transient bug. |
Jae Hoon Kim | 504c3cb | 2019-07-02 11:17:24 -0700 | [diff] [blame] | 178 | update_manager->AsyncPolicyRequestUpdateCheckAllowed( |
| 179 | callback, &Policy::UpdateCheckAllowed); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 180 | waiting_for_scheduled_check_ = true; |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 181 | return true; |
Darin Petkov | c6c135c | 2010-08-11 13:36:18 -0700 | [diff] [blame] | 182 | } |
| 183 | |
Amin Hassani | c288bf6 | 2020-11-04 19:33:43 -0800 | [diff] [blame] | 184 | bool UpdateAttempter::StartUpdater() { |
| 185 | // Initiate update checks. |
| 186 | ScheduleUpdates(); |
| 187 | |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 188 | auto update_boot_flags_action = std::make_unique<UpdateBootFlagsAction>( |
| 189 | SystemState::Get()->boot_control()); |
Amin Hassani | 1e19be3 | 2020-11-16 14:12:33 -0800 | [diff] [blame] | 190 | aux_processor_.EnqueueAction(std::move(update_boot_flags_action)); |
Amin Hassani | c288bf6 | 2020-11-04 19:33:43 -0800 | [diff] [blame] | 191 | // Update boot flags after 45 seconds. |
| 192 | MessageLoop::current()->PostDelayedTask( |
| 193 | FROM_HERE, |
| 194 | base::Bind(&ActionProcessor::StartProcessing, |
Amin Hassani | 1e19be3 | 2020-11-16 14:12:33 -0800 | [diff] [blame] | 195 | base::Unretained(&aux_processor_)), |
Amin Hassani | c288bf6 | 2020-11-04 19:33:43 -0800 | [diff] [blame] | 196 | base::TimeDelta::FromSeconds(45)); |
| 197 | |
| 198 | // Broadcast the update engine status on startup to ensure consistent system |
| 199 | // state on crashes. |
| 200 | MessageLoop::current()->PostTask( |
| 201 | FROM_HERE, |
| 202 | base::Bind(&UpdateAttempter::BroadcastStatus, base::Unretained(this))); |
| 203 | |
| 204 | MessageLoop::current()->PostTask( |
| 205 | FROM_HERE, |
| 206 | base::Bind(&UpdateAttempter::UpdateEngineStarted, |
| 207 | base::Unretained(this))); |
| 208 | return true; |
| 209 | } |
| 210 | |
Alex Deymo | c1c17b4 | 2015-11-23 03:53:15 -0300 | [diff] [blame] | 211 | void UpdateAttempter::CertificateChecked(ServerToCheck server_to_check, |
| 212 | CertificateCheckResult result) { |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 213 | SystemState::Get()->metrics_reporter()->ReportCertificateCheckMetrics( |
Tianjie Xu | 282aa1f | 2017-09-05 13:42:45 -0700 | [diff] [blame] | 214 | server_to_check, result); |
Alex Deymo | c1c17b4 | 2015-11-23 03:53:15 -0300 | [diff] [blame] | 215 | } |
| 216 | |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 217 | bool UpdateAttempter::CheckAndReportDailyMetrics() { |
| 218 | int64_t stored_value; |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 219 | Time now = SystemState::Get()->clock()->GetWallclockTime(); |
| 220 | if (SystemState::Get()->prefs()->Exists(kPrefsDailyMetricsLastReportedAt) && |
| 221 | SystemState::Get()->prefs()->GetInt64(kPrefsDailyMetricsLastReportedAt, |
| 222 | &stored_value)) { |
Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame] | 223 | Time last_reported_at = Time::FromInternalValue(stored_value); |
| 224 | TimeDelta time_reported_since = now - last_reported_at; |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 225 | if (time_reported_since.InSeconds() < 0) { |
| 226 | LOG(WARNING) << "Last reported daily metrics " |
| 227 | << utils::FormatTimeDelta(time_reported_since) << " ago " |
| 228 | << "which is negative. Either the system clock is wrong or " |
| 229 | << "the kPrefsDailyMetricsLastReportedAt state variable " |
| 230 | << "is wrong."; |
| 231 | // In this case, report daily metrics to reset. |
| 232 | } else { |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 233 | if (time_reported_since.InSeconds() < 24 * 60 * 60) { |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 234 | LOG(INFO) << "Last reported daily metrics " |
| 235 | << utils::FormatTimeDelta(time_reported_since) << " ago."; |
| 236 | return false; |
| 237 | } |
| 238 | LOG(INFO) << "Last reported daily metrics " |
| 239 | << utils::FormatTimeDelta(time_reported_since) << " ago, " |
| 240 | << "which is more than 24 hours ago."; |
| 241 | } |
| 242 | } |
| 243 | |
| 244 | LOG(INFO) << "Reporting daily metrics."; |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 245 | SystemState::Get()->prefs()->SetInt64(kPrefsDailyMetricsLastReportedAt, |
| 246 | now.ToInternalValue()); |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 247 | |
| 248 | ReportOSAge(); |
| 249 | |
| 250 | return true; |
| 251 | } |
| 252 | |
| 253 | void UpdateAttempter::ReportOSAge() { |
| 254 | struct stat sb; |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 255 | if (stat("/etc/lsb-release", &sb) != 0) { |
David Zeuthen | d9aca3b | 2014-08-21 13:11:21 -0400 | [diff] [blame] | 256 | PLOG(ERROR) << "Error getting file status for /etc/lsb-release " |
| 257 | << "(Note: this may happen in some unit tests)"; |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 258 | return; |
| 259 | } |
| 260 | |
Sen Jiang | 1c3db7d | 2019-01-10 15:48:55 -0800 | [diff] [blame] | 261 | Time lsb_release_timestamp = Time::FromTimeSpec(sb.st_ctim); |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 262 | Time now = SystemState::Get()->clock()->GetWallclockTime(); |
Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame] | 263 | TimeDelta age = now - lsb_release_timestamp; |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 264 | if (age.InSeconds() < 0) { |
| 265 | LOG(ERROR) << "The OS age (" << utils::FormatTimeDelta(age) |
David Zeuthen | d9aca3b | 2014-08-21 13:11:21 -0400 | [diff] [blame] | 266 | << ") is negative. Maybe the clock is wrong? " |
| 267 | << "(Note: this may happen in some unit tests.)"; |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 268 | return; |
| 269 | } |
| 270 | |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 271 | SystemState::Get()->metrics_reporter()->ReportDailyMetrics(age); |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 272 | } |
| 273 | |
Amin Hassani | e815363 | 2020-10-27 15:11:28 -0700 | [diff] [blame] | 274 | void UpdateAttempter::Update(const UpdateCheckParams& params) { |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 275 | // This is normally called frequently enough so it's appropriate to use as a |
| 276 | // hook for reporting daily metrics. |
| 277 | // TODO(garnold) This should be hooked to a separate (reliable and consistent) |
| 278 | // timeout event. |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 279 | CheckAndReportDailyMetrics(); |
| 280 | |
Andrew de los Reyes | c1d5c93 | 2011-04-20 17:15:47 -0700 | [diff] [blame] | 281 | fake_update_success_ = false; |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 282 | if (status_ == UpdateStatus::UPDATED_NEED_REBOOT) { |
Thieu Le | 116fda3 | 2011-04-19 11:01:54 -0700 | [diff] [blame] | 283 | // Although we have applied an update, we still want to ping Omaha |
| 284 | // to ensure the number of active statistics is accurate. |
David Zeuthen | 33bae49 | 2014-02-25 16:16:18 -0800 | [diff] [blame] | 285 | // |
| 286 | // Also convey to the UpdateEngine.Check.Result metric that we're |
| 287 | // not performing an update check because of this. |
Andrew de los Reyes | 6b78e29 | 2010-05-10 15:54:39 -0700 | [diff] [blame] | 288 | LOG(INFO) << "Not updating b/c we already updated and we're waiting for " |
Thieu Le | 116fda3 | 2011-04-19 11:01:54 -0700 | [diff] [blame] | 289 | << "reboot, we'll ping Omaha instead"; |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 290 | SystemState::Get()->metrics_reporter()->ReportUpdateCheckMetrics( |
Tianjie Xu | 282aa1f | 2017-09-05 13:42:45 -0700 | [diff] [blame] | 291 | metrics::CheckResult::kRebootPending, |
| 292 | metrics::CheckReaction::kUnset, |
| 293 | metrics::DownloadErrorCode::kUnset); |
Thieu Le | 116fda3 | 2011-04-19 11:01:54 -0700 | [diff] [blame] | 294 | PingOmaha(); |
Andrew de los Reyes | 6b78e29 | 2010-05-10 15:54:39 -0700 | [diff] [blame] | 295 | return; |
| 296 | } |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 297 | if (status_ != UpdateStatus::IDLE) { |
Andrew de los Reyes | 6b78e29 | 2010-05-10 15:54:39 -0700 | [diff] [blame] | 298 | // Update in progress. Do nothing |
| 299 | return; |
| 300 | } |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 301 | |
Amin Hassani | e815363 | 2020-10-27 15:11:28 -0700 | [diff] [blame] | 302 | if (!CalculateUpdateParams(params)) { |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 303 | return; |
| 304 | } |
| 305 | |
Amin Hassani | e815363 | 2020-10-27 15:11:28 -0700 | [diff] [blame] | 306 | BuildUpdateActions(params.interactive); |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 307 | |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 308 | SetStatusAndNotify(UpdateStatus::CHECKING_FOR_UPDATE); |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 309 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 310 | // Update the last check time here; it may be re-updated when an Omaha |
| 311 | // response is received, but this will prevent us from repeatedly scheduling |
| 312 | // checks in the case where a response is not received. |
| 313 | UpdateLastCheckedTime(); |
| 314 | |
Amin Hassani | 0882a51 | 2018-04-05 16:25:44 -0700 | [diff] [blame] | 315 | ScheduleProcessingStart(); |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 316 | } |
| 317 | |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 318 | void UpdateAttempter::RefreshDevicePolicy() { |
| 319 | // Lazy initialize the policy provider, or reload the latest policy data. |
| 320 | if (!policy_provider_.get()) |
| 321 | policy_provider_.reset(new policy::PolicyProvider()); |
| 322 | policy_provider_->Reload(); |
| 323 | |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 324 | const policy::DevicePolicy* device_policy = nullptr; |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 325 | if (policy_provider_->device_policy_is_loaded()) |
| 326 | device_policy = &policy_provider_->GetDevicePolicy(); |
| 327 | |
| 328 | if (device_policy) |
| 329 | LOG(INFO) << "Device policies/settings present"; |
| 330 | else |
| 331 | LOG(INFO) << "No device policies/settings present."; |
| 332 | |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 333 | SystemState::Get()->set_device_policy(device_policy); |
| 334 | SystemState::Get()->p2p_manager()->SetDevicePolicy(device_policy); |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 335 | } |
| 336 | |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 337 | void UpdateAttempter::CalculateP2PParams(bool interactive) { |
| 338 | bool use_p2p_for_downloading = false; |
| 339 | bool use_p2p_for_sharing = false; |
| 340 | |
Thiemo Nagel | 27d9d53 | 2017-05-26 16:35:20 +0200 | [diff] [blame] | 341 | // Never use p2p for downloading in interactive checks unless the developer |
| 342 | // has opted in for it via a marker file. |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 343 | // |
Thiemo Nagel | 27d9d53 | 2017-05-26 16:35:20 +0200 | [diff] [blame] | 344 | // (Why would a developer want to opt in? If they are working on the |
| 345 | // update_engine or p2p codebases so they can actually test their code.) |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 346 | |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 347 | if (!SystemState::Get()->p2p_manager()->IsP2PEnabled()) { |
| 348 | LOG(INFO) << "p2p is not enabled - disallowing p2p for both" |
| 349 | << " downloading and sharing."; |
| 350 | } else { |
| 351 | // Allow p2p for sharing, even in interactive checks. |
| 352 | use_p2p_for_sharing = true; |
| 353 | if (!interactive) { |
| 354 | LOG(INFO) << "Non-interactive check - allowing p2p for downloading"; |
| 355 | use_p2p_for_downloading = true; |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 356 | } else { |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 357 | LOG(INFO) << "Forcibly disabling use of p2p for downloading " |
| 358 | << "since this update attempt is interactive."; |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 359 | } |
| 360 | } |
| 361 | |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 362 | PayloadStateInterface* const payload_state = |
| 363 | SystemState::Get()->payload_state(); |
Gilad Arnold | 74b5f55 | 2014-10-07 08:17:16 -0700 | [diff] [blame] | 364 | payload_state->SetUsingP2PForDownloading(use_p2p_for_downloading); |
| 365 | payload_state->SetUsingP2PForSharing(use_p2p_for_sharing); |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 366 | } |
| 367 | |
Amin Hassani | e815363 | 2020-10-27 15:11:28 -0700 | [diff] [blame] | 368 | bool UpdateAttempter::CalculateUpdateParams(const UpdateCheckParams& params) { |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 369 | http_response_code_ = 0; |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 370 | PayloadStateInterface* const payload_state = |
| 371 | SystemState::Get()->payload_state(); |
Patrick Dubroy | 7fbbe8a | 2011-08-01 17:28:22 +0200 | [diff] [blame] | 372 | |
Alex Deymo | 749ecf1 | 2014-10-21 20:06:57 -0700 | [diff] [blame] | 373 | // Refresh the policy before computing all the update parameters. |
| 374 | RefreshDevicePolicy(); |
| 375 | |
Marton Hunyady | e58bddb | 2018-04-10 20:27:26 +0200 | [diff] [blame] | 376 | // Check whether we need to clear the rollback-happened preference after |
| 377 | // policy is available again. |
| 378 | UpdateRollbackHappened(); |
| 379 | |
Amin Hassani | e815363 | 2020-10-27 15:11:28 -0700 | [diff] [blame] | 380 | CalculateStagingParams(params.interactive); |
Adolfo Victoria | 497044c | 2018-07-18 07:51:42 -0700 | [diff] [blame] | 381 | // If staging_wait_time_ wasn't set, staging is off, use scattering instead. |
| 382 | if (staging_wait_time_.InSeconds() == 0) { |
Amin Hassani | e815363 | 2020-10-27 15:11:28 -0700 | [diff] [blame] | 383 | CalculateScatteringParams(params.interactive); |
Adolfo Victoria | 497044c | 2018-07-18 07:51:42 -0700 | [diff] [blame] | 384 | } |
Patrick Dubroy | 7fbbe8a | 2011-08-01 17:28:22 +0200 | [diff] [blame] | 385 | |
Amin Hassani | e815363 | 2020-10-27 15:11:28 -0700 | [diff] [blame] | 386 | CalculateP2PParams(params.interactive); |
Gilad Arnold | 74b5f55 | 2014-10-07 08:17:16 -0700 | [diff] [blame] | 387 | if (payload_state->GetUsingP2PForDownloading() || |
| 388 | payload_state->GetUsingP2PForSharing()) { |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 389 | // OK, p2p is to be used - start it and perform housekeeping. |
| 390 | if (!StartP2PAndPerformHousekeeping()) { |
| 391 | // If this fails, disable p2p for this attempt |
| 392 | LOG(INFO) << "Forcibly disabling use of p2p since starting p2p or " |
| 393 | << "performing housekeeping failed."; |
Gilad Arnold | 74b5f55 | 2014-10-07 08:17:16 -0700 | [diff] [blame] | 394 | payload_state->SetUsingP2PForDownloading(false); |
| 395 | payload_state->SetUsingP2PForSharing(false); |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 396 | } |
| 397 | } |
| 398 | |
Amin Hassani | e815363 | 2020-10-27 15:11:28 -0700 | [diff] [blame] | 399 | if (!omaha_request_params_->Init( |
| 400 | forced_app_version_, forced_omaha_url_, params)) { |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 401 | LOG(ERROR) << "Unable to initialize Omaha request params."; |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 402 | return false; |
Darin Petkov | a4a8a8c | 2010-07-15 22:21:12 -0700 | [diff] [blame] | 403 | } |
Darin Petkov | 3aefa86 | 2010-12-07 14:45:00 -0800 | [diff] [blame] | 404 | |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 405 | // The function |CalculateDlcParams| makes use of the function |GetAppId| from |
| 406 | // |OmahaRequestParams|, so to ensure that the return from |GetAppId| |
| 407 | // doesn't change, no changes to the values |download_channel_|, |
| 408 | // |image_props_.product_id| and |image_props_.canary_product_id| from |
| 409 | // |omaha_request_params_| shall be made below this line. |
| 410 | CalculateDlcParams(); |
| 411 | |
Gilad Arnold | afd70ed | 2014-09-30 16:27:06 -0700 | [diff] [blame] | 412 | LOG(INFO) << "target_version_prefix = " |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 413 | << omaha_request_params_->target_version_prefix() |
Marton Hunyady | ba51c3f | 2018-04-25 15:18:10 +0200 | [diff] [blame] | 414 | << ", rollback_allowed = " |
| 415 | << omaha_request_params_->rollback_allowed() |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 416 | << ", scatter_factor_in_seconds = " |
| 417 | << utils::FormatSecs(scatter_factor_.InSeconds()); |
| 418 | |
| 419 | LOG(INFO) << "Wall Clock Based Wait Enabled = " |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 420 | << omaha_request_params_->wall_clock_based_wait_enabled() |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 421 | << ", Update Check Count Wait Enabled = " |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 422 | << omaha_request_params_->update_check_count_wait_enabled() |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 423 | << ", Waiting Period = " |
| 424 | << utils::FormatSecs( |
| 425 | omaha_request_params_->waiting_period().InSeconds()); |
Jay Srinivasan | 0a70874 | 2012-03-20 11:26:12 -0700 | [diff] [blame] | 426 | |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 427 | LOG(INFO) << "Use p2p For Downloading = " |
Gilad Arnold | 74b5f55 | 2014-10-07 08:17:16 -0700 | [diff] [blame] | 428 | << payload_state->GetUsingP2PForDownloading() |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 429 | << ", Use p2p For Sharing = " |
Gilad Arnold | 74b5f55 | 2014-10-07 08:17:16 -0700 | [diff] [blame] | 430 | << payload_state->GetUsingP2PForSharing(); |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 431 | |
Andrew de los Reyes | 4516810 | 2010-11-22 11:13:50 -0800 | [diff] [blame] | 432 | obeying_proxies_ = true; |
Amin Hassani | e815363 | 2020-10-27 15:11:28 -0700 | [diff] [blame] | 433 | if (proxy_manual_checks_ == 0) { |
Andrew de los Reyes | 4516810 | 2010-11-22 11:13:50 -0800 | [diff] [blame] | 434 | LOG(INFO) << "forced to obey proxies"; |
| 435 | // If forced to obey proxies, every 20th request will not use proxies |
| 436 | proxy_manual_checks_++; |
| 437 | LOG(INFO) << "proxy manual checks: " << proxy_manual_checks_; |
| 438 | if (proxy_manual_checks_ >= kMaxConsecutiveObeyProxyRequests) { |
| 439 | proxy_manual_checks_ = 0; |
| 440 | obeying_proxies_ = false; |
| 441 | } |
| 442 | } else if (base::RandInt(0, 4) == 0) { |
| 443 | obeying_proxies_ = false; |
| 444 | } |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 445 | LOG_IF(INFO, !obeying_proxies_) |
| 446 | << "To help ensure updates work, this update check we are ignoring the " |
| 447 | << "proxy settings and using direct connections."; |
Andrew de los Reyes | 4516810 | 2010-11-22 11:13:50 -0800 | [diff] [blame] | 448 | |
Darin Petkov | 3627577 | 2010-10-01 11:40:57 -0700 | [diff] [blame] | 449 | DisableDeltaUpdateIfNeeded(); |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 450 | return true; |
| 451 | } |
| 452 | |
Gilad Arnold | b92f0df | 2013-01-10 16:32:45 -0800 | [diff] [blame] | 453 | void UpdateAttempter::CalculateScatteringParams(bool interactive) { |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 454 | // Take a copy of the old scatter value before we update it, as |
| 455 | // we need to update the waiting period if this value changes. |
| 456 | TimeDelta old_scatter_factor = scatter_factor_; |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 457 | const policy::DevicePolicy* device_policy = |
| 458 | SystemState::Get()->device_policy(); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 459 | if (device_policy) { |
Ben Chan | 9abb763 | 2014-08-07 00:10:53 -0700 | [diff] [blame] | 460 | int64_t new_scatter_factor_in_secs = 0; |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 461 | device_policy->GetScatterFactorInSeconds(&new_scatter_factor_in_secs); |
Alex Vakulenko | d2779df | 2014-06-16 13:19:00 -0700 | [diff] [blame] | 462 | if (new_scatter_factor_in_secs < 0) // sanitize input, just in case. |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 463 | new_scatter_factor_in_secs = 0; |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 464 | scatter_factor_ = TimeDelta::FromSeconds(new_scatter_factor_in_secs); |
| 465 | } |
| 466 | |
| 467 | bool is_scatter_enabled = false; |
| 468 | if (scatter_factor_.InSeconds() == 0) { |
| 469 | LOG(INFO) << "Scattering disabled since scatter factor is set to 0"; |
Gilad Arnold | b92f0df | 2013-01-10 16:32:45 -0800 | [diff] [blame] | 470 | } else if (interactive) { |
| 471 | LOG(INFO) << "Scattering disabled as this is an interactive update check"; |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 472 | } else if (SystemState::Get()->hardware()->IsOOBEEnabled() && |
| 473 | !SystemState::Get()->hardware()->IsOOBEComplete(nullptr)) { |
Alex Deymo | 46a9aae | 2016-05-04 20:20:11 -0700 | [diff] [blame] | 474 | LOG(INFO) << "Scattering disabled since OOBE is enabled but not complete " |
| 475 | "yet"; |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 476 | } else { |
| 477 | is_scatter_enabled = true; |
| 478 | LOG(INFO) << "Scattering is enabled"; |
| 479 | } |
| 480 | |
| 481 | if (is_scatter_enabled) { |
| 482 | // This means the scattering policy is turned on. |
| 483 | // Now check if we need to update the waiting period. The two cases |
| 484 | // in which we'd need to update the waiting period are: |
| 485 | // 1. First time in process or a scheduled check after a user-initiated one. |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 486 | // (omaha_request_params_->waiting_period will be zero in this case). |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 487 | // 2. Admin has changed the scattering policy value. |
| 488 | // (new scattering value will be different from old one in this case). |
Ben Chan | 9abb763 | 2014-08-07 00:10:53 -0700 | [diff] [blame] | 489 | int64_t wait_period_in_secs = 0; |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 490 | if (omaha_request_params_->waiting_period().InSeconds() == 0) { |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 491 | // First case. Check if we have a suitable value to set for |
| 492 | // the waiting period. |
Adolfo Victoria | d3a1e35 | 2018-07-16 11:40:47 -0700 | [diff] [blame] | 493 | if (prefs_->GetInt64(kPrefsWallClockScatteringWaitPeriod, |
| 494 | &wait_period_in_secs) && |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 495 | wait_period_in_secs > 0 && |
| 496 | wait_period_in_secs <= scatter_factor_.InSeconds()) { |
| 497 | // This means: |
| 498 | // 1. There's a persisted value for the waiting period available. |
| 499 | // 2. And that persisted value is still valid. |
| 500 | // So, in this case, we should reuse the persisted value instead of |
| 501 | // generating a new random value to improve the chances of a good |
| 502 | // distribution for scattering. |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 503 | omaha_request_params_->set_waiting_period( |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 504 | TimeDelta::FromSeconds(wait_period_in_secs)); |
| 505 | LOG(INFO) << "Using persisted wall-clock waiting period: " |
| 506 | << utils::FormatSecs( |
| 507 | omaha_request_params_->waiting_period().InSeconds()); |
Alex Vakulenko | d2779df | 2014-06-16 13:19:00 -0700 | [diff] [blame] | 508 | } else { |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 509 | // This means there's no persisted value for the waiting period |
| 510 | // available or its value is invalid given the new scatter_factor value. |
| 511 | // So, we should go ahead and regenerate a new value for the |
| 512 | // waiting period. |
| 513 | LOG(INFO) << "Persisted value not present or not valid (" |
| 514 | << utils::FormatSecs(wait_period_in_secs) |
| 515 | << ") for wall-clock waiting period."; |
| 516 | GenerateNewWaitingPeriod(); |
| 517 | } |
| 518 | } else if (scatter_factor_ != old_scatter_factor) { |
| 519 | // This means there's already a waiting period value, but we detected |
| 520 | // a change in the scattering policy value. So, we should regenerate the |
| 521 | // waiting period to make sure it's within the bounds of the new scatter |
| 522 | // factor value. |
| 523 | GenerateNewWaitingPeriod(); |
| 524 | } else { |
| 525 | // Neither the first time scattering is enabled nor the scattering value |
| 526 | // changed. Nothing to do. |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 527 | LOG(INFO) << "Keeping current wall-clock waiting period: " |
| 528 | << utils::FormatSecs( |
| 529 | omaha_request_params_->waiting_period().InSeconds()); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 530 | } |
| 531 | |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 532 | // The invariant at this point is that omaha_request_params_->waiting_period |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 533 | // is non-zero no matter which path we took above. |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 534 | LOG_IF(ERROR, omaha_request_params_->waiting_period().InSeconds() == 0) |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 535 | << "Waiting Period should NOT be zero at this point!!!"; |
| 536 | |
| 537 | // Since scattering is enabled, wall clock based wait will always be |
| 538 | // enabled. |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 539 | omaha_request_params_->set_wall_clock_based_wait_enabled(true); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 540 | |
| 541 | // If we don't have any issues in accessing the file system to update |
| 542 | // the update check count value, we'll turn that on as well. |
| 543 | bool decrement_succeeded = DecrementUpdateCheckCount(); |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 544 | omaha_request_params_->set_update_check_count_wait_enabled( |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 545 | decrement_succeeded); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 546 | } else { |
| 547 | // This means the scattering feature is turned off or disabled for |
| 548 | // this particular update check. Make sure to disable |
| 549 | // all the knobs and artifacts so that we don't invoke any scattering |
| 550 | // related code. |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 551 | omaha_request_params_->set_wall_clock_based_wait_enabled(false); |
| 552 | omaha_request_params_->set_update_check_count_wait_enabled(false); |
| 553 | omaha_request_params_->set_waiting_period(TimeDelta::FromSeconds(0)); |
Adolfo Victoria | d3a1e35 | 2018-07-16 11:40:47 -0700 | [diff] [blame] | 554 | prefs_->Delete(kPrefsWallClockScatteringWaitPeriod); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 555 | prefs_->Delete(kPrefsUpdateCheckCount); |
| 556 | // Don't delete the UpdateFirstSeenAt file as we don't want manual checks |
| 557 | // that result in no-updates (e.g. due to server side throttling) to |
| 558 | // cause update starvation by having the client generate a new |
| 559 | // UpdateFirstSeenAt for each scheduled check that follows a manual check. |
| 560 | } |
| 561 | } |
| 562 | |
| 563 | void UpdateAttempter::GenerateNewWaitingPeriod() { |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 564 | omaha_request_params_->set_waiting_period( |
| 565 | TimeDelta::FromSeconds(base::RandInt(1, scatter_factor_.InSeconds()))); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 566 | |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 567 | LOG(INFO) << "Generated new wall-clock waiting period: " |
| 568 | << utils::FormatSecs( |
| 569 | omaha_request_params_->waiting_period().InSeconds()); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 570 | |
| 571 | // Do a best-effort to persist this in all cases. Even if the persistence |
| 572 | // fails, we'll still be able to scatter based on our in-memory value. |
| 573 | // The persistence only helps in ensuring a good overall distribution |
| 574 | // across multiple devices if they tend to reboot too often. |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 575 | SystemState::Get()->payload_state()->SetScatteringWaitPeriod( |
Gilad Arnold | 519cfc7 | 2014-10-02 10:34:54 -0700 | [diff] [blame] | 576 | omaha_request_params_->waiting_period()); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 577 | } |
| 578 | |
Adolfo Victoria | 497044c | 2018-07-18 07:51:42 -0700 | [diff] [blame] | 579 | void UpdateAttempter::CalculateStagingParams(bool interactive) { |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 580 | bool oobe_complete = SystemState::Get()->hardware()->IsOOBEEnabled() && |
| 581 | SystemState::Get()->hardware()->IsOOBEComplete(nullptr); |
| 582 | auto device_policy = SystemState::Get()->device_policy(); |
Adolfo Victoria | 497044c | 2018-07-18 07:51:42 -0700 | [diff] [blame] | 583 | StagingCase staging_case = StagingCase::kOff; |
| 584 | if (device_policy && !interactive && oobe_complete) { |
| 585 | staging_wait_time_ = omaha_request_params_->waiting_period(); |
| 586 | staging_case = CalculateStagingCase( |
Amin Hassani | 90e9f19 | 2020-11-18 14:20:56 -0800 | [diff] [blame] | 587 | device_policy, &staging_wait_time_, &staging_schedule_); |
Adolfo Victoria | 497044c | 2018-07-18 07:51:42 -0700 | [diff] [blame] | 588 | } |
| 589 | switch (staging_case) { |
| 590 | case StagingCase::kOff: |
| 591 | // Staging is off, get rid of persisted value. |
| 592 | prefs_->Delete(kPrefsWallClockStagingWaitPeriod); |
| 593 | // Set |staging_wait_time_| to its default value so scattering can still |
| 594 | // be turned on |
| 595 | staging_wait_time_ = TimeDelta(); |
| 596 | break; |
| 597 | // Let the cases fall through since they just add, and never remove, steps |
| 598 | // to turning staging on. |
| 599 | case StagingCase::kNoSavedValue: |
| 600 | prefs_->SetInt64(kPrefsWallClockStagingWaitPeriod, |
| 601 | staging_wait_time_.InDays()); |
Denis Nikitin | 8f2fa74 | 2019-05-29 10:36:52 -0700 | [diff] [blame] | 602 | FALLTHROUGH; |
Adolfo Victoria | 497044c | 2018-07-18 07:51:42 -0700 | [diff] [blame] | 603 | case StagingCase::kSetStagingFromPref: |
| 604 | omaha_request_params_->set_waiting_period(staging_wait_time_); |
Denis Nikitin | 8f2fa74 | 2019-05-29 10:36:52 -0700 | [diff] [blame] | 605 | FALLTHROUGH; |
Adolfo Victoria | 497044c | 2018-07-18 07:51:42 -0700 | [diff] [blame] | 606 | case StagingCase::kNoAction: |
| 607 | // Staging is on, enable wallclock based wait so that its values get used. |
| 608 | omaha_request_params_->set_wall_clock_based_wait_enabled(true); |
| 609 | // Use UpdateCheckCount if possible to prevent devices updating all at |
| 610 | // once. |
| 611 | omaha_request_params_->set_update_check_count_wait_enabled( |
| 612 | DecrementUpdateCheckCount()); |
| 613 | // Scattering should not be turned on if staging is on, delete the |
| 614 | // existing scattering configuration. |
| 615 | prefs_->Delete(kPrefsWallClockScatteringWaitPeriod); |
| 616 | scatter_factor_ = TimeDelta(); |
| 617 | } |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 618 | } |
| 619 | |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 620 | bool UpdateAttempter::ResetDlcPrefs(const string& dlc_id) { |
| 621 | vector<string> failures; |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 622 | for (auto& sub_key : |
| 623 | {kPrefsPingActive, kPrefsPingLastActive, kPrefsPingLastRollcall}) { |
Amin Hassani | 90e9f19 | 2020-11-18 14:20:56 -0800 | [diff] [blame] | 624 | auto key = prefs_->CreateSubKey({kDlcPrefsSubDir, dlc_id, sub_key}); |
| 625 | if (!prefs_->Delete(key)) |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 626 | failures.emplace_back(sub_key); |
| 627 | } |
| 628 | if (failures.size() != 0) |
| 629 | PLOG(ERROR) << "Failed to delete prefs (" << base::JoinString(failures, ",") |
| 630 | << " for DLC (" << dlc_id << ")."; |
| 631 | |
| 632 | return failures.size() == 0; |
| 633 | } |
| 634 | |
Vyshu Khota | 4c5413d | 2020-11-04 16:17:25 -0800 | [diff] [blame] | 635 | void UpdateAttempter::SetPref(const string& pref_key, |
| 636 | const string& pref_value, |
| 637 | const string& payload_id) { |
| 638 | string dlc_id; |
| 639 | if (!omaha_request_params_->GetDlcId(payload_id, &dlc_id)) { |
| 640 | // Not a DLC ID, set fingerprint in perf for platform ID. |
| 641 | prefs_->SetString(pref_key, pref_value); |
| 642 | } else { |
| 643 | // Set fingerprint in pref for DLC ID. |
| 644 | auto key = prefs_->CreateSubKey({kDlcPrefsSubDir, dlc_id, pref_key}); |
| 645 | prefs_->SetString(key, pref_value); |
| 646 | } |
| 647 | } |
| 648 | |
Andrew | a8d7df3 | 2020-03-15 20:10:01 -0700 | [diff] [blame] | 649 | bool UpdateAttempter::SetDlcActiveValue(bool is_active, const string& dlc_id) { |
| 650 | if (dlc_id.empty()) { |
| 651 | LOG(ERROR) << "Empty DLC ID passed."; |
| 652 | return false; |
| 653 | } |
| 654 | LOG(INFO) << "Set DLC (" << dlc_id << ") to " |
| 655 | << (is_active ? "Active" : "Inactive"); |
Andrew | a8d7df3 | 2020-03-15 20:10:01 -0700 | [diff] [blame] | 656 | if (is_active) { |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 657 | auto ping_active_key = |
Amin Hassani | 90e9f19 | 2020-11-18 14:20:56 -0800 | [diff] [blame] | 658 | prefs_->CreateSubKey({kDlcPrefsSubDir, dlc_id, kPrefsPingActive}); |
| 659 | if (!prefs_->SetInt64(ping_active_key, kPingActiveValue)) { |
Andrew | a8d7df3 | 2020-03-15 20:10:01 -0700 | [diff] [blame] | 660 | LOG(ERROR) << "Failed to set the value of ping metadata '" |
| 661 | << kPrefsPingActive << "'."; |
| 662 | return false; |
| 663 | } |
| 664 | } else { |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 665 | return ResetDlcPrefs(dlc_id); |
Andrew | a8d7df3 | 2020-03-15 20:10:01 -0700 | [diff] [blame] | 666 | } |
| 667 | return true; |
| 668 | } |
| 669 | |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 670 | int64_t UpdateAttempter::GetPingMetadata(const string& metadata_key) const { |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 671 | // The first time a ping is sent, the metadata files containing the values |
| 672 | // sent back by the server still don't exist. A value of -1 is used to |
| 673 | // indicate this. |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 674 | if (!SystemState::Get()->prefs()->Exists(metadata_key)) |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 675 | return kPingNeverPinged; |
| 676 | |
| 677 | int64_t value; |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 678 | if (SystemState::Get()->prefs()->GetInt64(metadata_key, &value)) |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 679 | return value; |
| 680 | |
| 681 | // Return -2 when the file exists and there is a problem reading from it, or |
| 682 | // the value cannot be converted to an integer. |
| 683 | return kPingUnknownValue; |
| 684 | } |
| 685 | |
| 686 | void UpdateAttempter::CalculateDlcParams() { |
Amin Hassani | 2b68e6b | 2020-04-17 10:49:12 -0700 | [diff] [blame] | 687 | // Set the |dlc_ids_| only for an update. This is required to get the |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 688 | // currently installed DLC(s). |
| 689 | if (!is_install_ && |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 690 | !SystemState::Get()->dlcservice()->GetDlcsToUpdate(&dlc_ids_)) { |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 691 | LOG(INFO) << "Failed to retrieve DLC module IDs from dlcservice. Check the " |
| 692 | "state of dlcservice, will not update DLC modules."; |
| 693 | } |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 694 | map<string, OmahaRequestParams::AppParams> dlc_apps_params; |
Amin Hassani | 2b68e6b | 2020-04-17 10:49:12 -0700 | [diff] [blame] | 695 | for (const auto& dlc_id : dlc_ids_) { |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 696 | OmahaRequestParams::AppParams dlc_params{ |
| 697 | .active_counting_type = OmahaRequestParams::kDateBased, |
| 698 | .name = dlc_id, |
| 699 | .send_ping = false}; |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 700 | if (is_install_) { |
| 701 | // In some cases, |SetDlcActiveValue| might fail to reset the DLC prefs |
| 702 | // when a DLC is uninstalled. To avoid having stale values from that |
| 703 | // scenario, we reset the metadata values on a new install request. |
| 704 | // Ignore failure to delete stale prefs. |
| 705 | ResetDlcPrefs(dlc_id); |
| 706 | SetDlcActiveValue(true, dlc_id); |
| 707 | } else { |
| 708 | // Only send the ping when the request is to update DLCs. When installing |
| 709 | // DLCs, we don't want to send the ping yet, since the DLCs might fail to |
| 710 | // install or might not really be active yet. |
| 711 | dlc_params.ping_active = kPingActiveValue; |
| 712 | auto ping_active_key = |
Amin Hassani | 90e9f19 | 2020-11-18 14:20:56 -0800 | [diff] [blame] | 713 | prefs_->CreateSubKey({kDlcPrefsSubDir, dlc_id, kPrefsPingActive}); |
| 714 | if (!prefs_->GetInt64(ping_active_key, &dlc_params.ping_active) || |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 715 | dlc_params.ping_active != kPingActiveValue) { |
| 716 | dlc_params.ping_active = kPingInactiveValue; |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 717 | } |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 718 | auto ping_last_active_key = |
Amin Hassani | 90e9f19 | 2020-11-18 14:20:56 -0800 | [diff] [blame] | 719 | prefs_->CreateSubKey({kDlcPrefsSubDir, dlc_id, kPrefsPingLastActive}); |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 720 | dlc_params.ping_date_last_active = GetPingMetadata(ping_last_active_key); |
| 721 | |
Amin Hassani | 90e9f19 | 2020-11-18 14:20:56 -0800 | [diff] [blame] | 722 | auto ping_last_rollcall_key = prefs_->CreateSubKey( |
Jae Hoon Kim | c1f3692 | 2020-05-11 18:20:18 -0700 | [diff] [blame] | 723 | {kDlcPrefsSubDir, dlc_id, kPrefsPingLastRollcall}); |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 724 | dlc_params.ping_date_last_rollcall = |
| 725 | GetPingMetadata(ping_last_rollcall_key); |
| 726 | |
| 727 | dlc_params.send_ping = true; |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 728 | } |
| 729 | dlc_apps_params[omaha_request_params_->GetDlcAppId(dlc_id)] = dlc_params; |
| 730 | } |
| 731 | omaha_request_params_->set_dlc_apps_params(dlc_apps_params); |
Amin Hassani | e815363 | 2020-10-27 15:11:28 -0700 | [diff] [blame] | 732 | omaha_request_params_->set_is_install(is_install_); |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 733 | } |
| 734 | |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 735 | void UpdateAttempter::BuildUpdateActions(bool interactive) { |
Darin Petkov | f42cc1c | 2010-09-01 09:03:02 -0700 | [diff] [blame] | 736 | CHECK(!processor_->IsRunning()); |
| 737 | processor_->set_delegate(this); |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 738 | |
Jae Hoon Kim | edb6550 | 2019-06-14 11:52:17 -0700 | [diff] [blame] | 739 | // The session ID needs to be kept throughout the update flow. The value |
| 740 | // of the session ID will reset/update only when it is a new update flow. |
| 741 | session_id_ = base::GenerateGUID(); |
| 742 | |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 743 | // Actions: |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 744 | auto update_check_fetcher = std::make_unique<LibcurlHttpFetcher>( |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 745 | GetProxyResolver(), SystemState::Get()->hardware()); |
Alex Deymo | 33e91e7 | 2015-12-01 18:26:08 -0300 | [diff] [blame] | 746 | update_check_fetcher->set_server_to_check(ServerToCheck::kUpdate); |
Andrew de los Reyes | fb2f461 | 2011-06-09 18:21:49 -0700 | [diff] [blame] | 747 | // Try harder to connect to the network, esp when not interactive. |
| 748 | // See comment in libcurl_http_fetcher.cc. |
| 749 | update_check_fetcher->set_no_network_max_retries(interactive ? 1 : 3); |
Xiaochu Liu | 4a1173a | 2019-04-10 10:49:08 -0700 | [diff] [blame] | 750 | update_check_fetcher->set_is_update_check(true); |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 751 | auto update_check_action = std::make_unique<OmahaRequestAction>( |
| 752 | nullptr, std::move(update_check_fetcher), false, session_id_); |
| 753 | auto response_handler_action = std::make_unique<OmahaResponseHandlerAction>(); |
| 754 | auto update_boot_flags_action = std::make_unique<UpdateBootFlagsAction>( |
| 755 | SystemState::Get()->boot_control()); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 756 | auto download_started_action = std::make_unique<OmahaRequestAction>( |
Sen Jiang | 1841408 | 2018-01-11 14:50:36 -0800 | [diff] [blame] | 757 | new OmahaEvent(OmahaEvent::kTypeUpdateDownloadStarted), |
| 758 | std::make_unique<LibcurlHttpFetcher>(GetProxyResolver(), |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 759 | SystemState::Get()->hardware()), |
Jae Hoon Kim | edb6550 | 2019-06-14 11:52:17 -0700 | [diff] [blame] | 760 | false, |
| 761 | session_id_); |
Alex Deymo | 33e91e7 | 2015-12-01 18:26:08 -0300 | [diff] [blame] | 762 | |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 763 | LibcurlHttpFetcher* download_fetcher = new LibcurlHttpFetcher( |
| 764 | GetProxyResolver(), SystemState::Get()->hardware()); |
Alex Deymo | 33e91e7 | 2015-12-01 18:26:08 -0300 | [diff] [blame] | 765 | download_fetcher->set_server_to_check(ServerToCheck::kDownload); |
Sen Jiang | ee174a1 | 2017-12-21 17:38:08 -0800 | [diff] [blame] | 766 | if (interactive) |
| 767 | download_fetcher->set_max_retry_count(kDownloadMaxRetryCountInteractive); |
Jae Hoon Kim | 0ae8fe1 | 2019-06-26 14:32:50 -0700 | [diff] [blame] | 768 | download_fetcher->SetHeader(kXGoogleUpdateSessionId, session_id_); |
Kelvin Zhang | 97cb058 | 2020-12-02 16:42:15 -0500 | [diff] [blame] | 769 | auto download_action = std::make_unique<DownloadActionChromeos>( |
| 770 | prefs_, |
| 771 | SystemState::Get()->boot_control(), |
| 772 | SystemState::Get()->hardware(), |
| 773 | download_fetcher, // passes ownership |
| 774 | interactive); |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 775 | download_action->set_delegate(this); |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 776 | |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 777 | auto download_finished_action = std::make_unique<OmahaRequestAction>( |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 778 | new OmahaEvent(OmahaEvent::kTypeUpdateDownloadFinished), |
| 779 | std::make_unique<LibcurlHttpFetcher>(GetProxyResolver(), |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 780 | SystemState::Get()->hardware()), |
Jae Hoon Kim | edb6550 | 2019-06-14 11:52:17 -0700 | [diff] [blame] | 781 | false, |
| 782 | session_id_); |
Tianjie | 24f9609 | 2020-06-30 12:26:25 -0700 | [diff] [blame] | 783 | auto filesystem_verifier_action = std::make_unique<FilesystemVerifierAction>( |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 784 | SystemState::Get()->boot_control()->GetDynamicPartitionControl()); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 785 | auto update_complete_action = std::make_unique<OmahaRequestAction>( |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 786 | new OmahaEvent(OmahaEvent::kTypeUpdateComplete), |
| 787 | std::make_unique<LibcurlHttpFetcher>(GetProxyResolver(), |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 788 | SystemState::Get()->hardware()), |
Jae Hoon Kim | edb6550 | 2019-06-14 11:52:17 -0700 | [diff] [blame] | 789 | false, |
| 790 | session_id_); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 791 | |
| 792 | auto postinstall_runner_action = std::make_unique<PostinstallRunnerAction>( |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 793 | SystemState::Get()->boot_control(), SystemState::Get()->hardware()); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 794 | postinstall_runner_action->set_delegate(this); |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 795 | |
| 796 | // Bond them together. We have to use the leaf-types when calling |
| 797 | // BondActions(). |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 798 | BondActions(update_check_action.get(), response_handler_action.get()); |
| 799 | BondActions(response_handler_action.get(), download_action.get()); |
| 800 | BondActions(download_action.get(), filesystem_verifier_action.get()); |
| 801 | BondActions(filesystem_verifier_action.get(), |
| 802 | postinstall_runner_action.get()); |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 803 | |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 804 | processor_->EnqueueAction(std::move(update_check_action)); |
| 805 | processor_->EnqueueAction(std::move(response_handler_action)); |
Amin Hassani | 0882a51 | 2018-04-05 16:25:44 -0700 | [diff] [blame] | 806 | processor_->EnqueueAction(std::move(update_boot_flags_action)); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 807 | processor_->EnqueueAction(std::move(download_started_action)); |
| 808 | processor_->EnqueueAction(std::move(download_action)); |
| 809 | processor_->EnqueueAction(std::move(download_finished_action)); |
| 810 | processor_->EnqueueAction(std::move(filesystem_verifier_action)); |
| 811 | processor_->EnqueueAction(std::move(postinstall_runner_action)); |
| 812 | processor_->EnqueueAction(std::move(update_complete_action)); |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 813 | } |
| 814 | |
Chris Sosa | 44b9b7e | 2014-04-02 13:53:46 -0700 | [diff] [blame] | 815 | bool UpdateAttempter::Rollback(bool powerwash) { |
Colin Howes | 978c108 | 2018-12-03 11:46:12 -0800 | [diff] [blame] | 816 | is_install_ = false; |
Chris Sosa | 44b9b7e | 2014-04-02 13:53:46 -0700 | [diff] [blame] | 817 | if (!CanRollback()) { |
| 818 | return false; |
| 819 | } |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 820 | |
Chris Sosa | 44b9b7e | 2014-04-02 13:53:46 -0700 | [diff] [blame] | 821 | // Extra check for enterprise-enrolled devices since they don't support |
| 822 | // powerwash. |
| 823 | if (powerwash) { |
| 824 | // Enterprise-enrolled devices have an empty owner in their device policy. |
| 825 | string owner; |
| 826 | RefreshDevicePolicy(); |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 827 | const policy::DevicePolicy* device_policy = |
| 828 | SystemState::Get()->device_policy(); |
Chris Sosa | 44b9b7e | 2014-04-02 13:53:46 -0700 | [diff] [blame] | 829 | if (device_policy && (!device_policy->GetOwner(&owner) || owner.empty())) { |
| 830 | LOG(ERROR) << "Enterprise device detected. " |
| 831 | << "Cannot perform a powerwash for enterprise devices."; |
| 832 | return false; |
| 833 | } |
| 834 | } |
| 835 | |
| 836 | processor_->set_delegate(this); |
Chris Sosa | aa18e16 | 2013-06-20 13:20:30 -0700 | [diff] [blame] | 837 | |
Chris Sosa | 28e479c | 2013-07-12 11:39:53 -0700 | [diff] [blame] | 838 | // Initialize the default request params. |
Amin Hassani | e815363 | 2020-10-27 15:11:28 -0700 | [diff] [blame] | 839 | if (!omaha_request_params_->Init("", "", {.interactive = true})) { |
Chris Sosa | 28e479c | 2013-07-12 11:39:53 -0700 | [diff] [blame] | 840 | LOG(ERROR) << "Unable to initialize Omaha request params."; |
| 841 | return false; |
| 842 | } |
| 843 | |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 844 | LOG(INFO) << "Setting rollback options."; |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 845 | install_plan_.reset(new InstallPlan()); |
| 846 | install_plan_->target_slot = GetRollbackSlot(); |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 847 | install_plan_->source_slot = |
| 848 | SystemState::Get()->boot_control()->GetCurrentSlot(); |
Chris Sosa | 76a29ae | 2013-07-11 17:59:24 -0700 | [diff] [blame] | 849 | |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 850 | TEST_AND_RETURN_FALSE(install_plan_->LoadPartitionsFromSlots( |
| 851 | SystemState::Get()->boot_control())); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 852 | install_plan_->powerwash_required = powerwash; |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 853 | |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 854 | install_plan_->Dump(); |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 855 | |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 856 | auto install_plan_action = |
| 857 | std::make_unique<InstallPlanAction>(*install_plan_); |
| 858 | auto postinstall_runner_action = std::make_unique<PostinstallRunnerAction>( |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 859 | SystemState::Get()->boot_control(), SystemState::Get()->hardware()); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 860 | postinstall_runner_action->set_delegate(this); |
| 861 | BondActions(install_plan_action.get(), postinstall_runner_action.get()); |
| 862 | processor_->EnqueueAction(std::move(install_plan_action)); |
| 863 | processor_->EnqueueAction(std::move(postinstall_runner_action)); |
Chris Sosa | aa18e16 | 2013-06-20 13:20:30 -0700 | [diff] [blame] | 864 | |
| 865 | // Update the payload state for Rollback. |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 866 | SystemState::Get()->payload_state()->Rollback(); |
Chris Sosa | aa18e16 | 2013-06-20 13:20:30 -0700 | [diff] [blame] | 867 | |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 868 | SetStatusAndNotify(UpdateStatus::ATTEMPTING_ROLLBACK); |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 869 | |
Amin Hassani | 0882a51 | 2018-04-05 16:25:44 -0700 | [diff] [blame] | 870 | ScheduleProcessingStart(); |
Chris Sosa | aa18e16 | 2013-06-20 13:20:30 -0700 | [diff] [blame] | 871 | return true; |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 872 | } |
| 873 | |
Alex Vakulenko | 59e253e | 2014-02-24 10:40:21 -0800 | [diff] [blame] | 874 | bool UpdateAttempter::CanRollback() const { |
Chris Sosa | 44b9b7e | 2014-04-02 13:53:46 -0700 | [diff] [blame] | 875 | // We can only rollback if the update_engine isn't busy and we have a valid |
| 876 | // rollback partition. |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 877 | return (status_ == UpdateStatus::IDLE && |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 878 | GetRollbackSlot() != BootControlInterface::kInvalidSlot); |
Alex Vakulenko | 2bddadd | 2014-03-27 13:23:46 -0700 | [diff] [blame] | 879 | } |
| 880 | |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 881 | BootControlInterface::Slot UpdateAttempter::GetRollbackSlot() const { |
| 882 | LOG(INFO) << "UpdateAttempter::GetRollbackSlot"; |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 883 | const unsigned int num_slots = |
| 884 | SystemState::Get()->boot_control()->GetNumSlots(); |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 885 | const BootControlInterface::Slot current_slot = |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 886 | SystemState::Get()->boot_control()->GetCurrentSlot(); |
Alex Vakulenko | 59e253e | 2014-02-24 10:40:21 -0800 | [diff] [blame] | 887 | |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 888 | LOG(INFO) << " Installed slots: " << num_slots; |
| 889 | LOG(INFO) << " Booted from slot: " |
| 890 | << BootControlInterface::SlotName(current_slot); |
Alex Vakulenko | 59e253e | 2014-02-24 10:40:21 -0800 | [diff] [blame] | 891 | |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 892 | if (current_slot == BootControlInterface::kInvalidSlot || num_slots < 2) { |
| 893 | LOG(INFO) << "Device is not updateable."; |
| 894 | return BootControlInterface::kInvalidSlot; |
Alex Vakulenko | 59e253e | 2014-02-24 10:40:21 -0800 | [diff] [blame] | 895 | } |
| 896 | |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 897 | vector<BootControlInterface::Slot> bootable_slots; |
Alex Deymo | f7ead81 | 2015-10-23 17:37:27 -0700 | [diff] [blame] | 898 | for (BootControlInterface::Slot slot = 0; slot < num_slots; slot++) { |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 899 | if (slot != current_slot && |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 900 | SystemState::Get()->boot_control()->IsSlotBootable(slot)) { |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 901 | LOG(INFO) << "Found bootable slot " |
| 902 | << BootControlInterface::SlotName(slot); |
| 903 | return slot; |
Alex Vakulenko | 59e253e | 2014-02-24 10:40:21 -0800 | [diff] [blame] | 904 | } |
| 905 | } |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 906 | LOG(INFO) << "No other bootable slot found."; |
| 907 | return BootControlInterface::kInvalidSlot; |
Alex Vakulenko | 2bddadd | 2014-03-27 13:23:46 -0700 | [diff] [blame] | 908 | } |
| 909 | |
Aaron Wood | 081c023 | 2017-10-19 17:14:58 -0700 | [diff] [blame] | 910 | bool UpdateAttempter::CheckForUpdate(const string& app_version, |
Jay Srinivasan | e73acab | 2012-07-10 14:34:03 -0700 | [diff] [blame] | 911 | const string& omaha_url, |
Aaron Wood | 081c023 | 2017-10-19 17:14:58 -0700 | [diff] [blame] | 912 | UpdateAttemptFlags flags) { |
Jae Hoon Kim | c437ea5 | 2019-07-11 11:20:38 -0700 | [diff] [blame] | 913 | if (status_ != UpdateStatus::IDLE) { |
| 914 | LOG(INFO) << "Refusing to do an update as there is an " |
| 915 | << (is_install_ ? "install" : "update") |
| 916 | << " already in progress."; |
Aaron Wood | 081c023 | 2017-10-19 17:14:58 -0700 | [diff] [blame] | 917 | return false; |
| 918 | } |
| 919 | |
Jae Hoon Kim | c437ea5 | 2019-07-11 11:20:38 -0700 | [diff] [blame] | 920 | bool interactive = !(flags & UpdateAttemptFlags::kFlagNonInteractive); |
Jae Hoon Kim | c437ea5 | 2019-07-11 11:20:38 -0700 | [diff] [blame] | 921 | is_install_ = false; |
| 922 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 923 | LOG(INFO) << "Forced update check requested."; |
David Pursell | 02c1864 | 2014-11-06 11:26:11 -0800 | [diff] [blame] | 924 | forced_app_version_.clear(); |
| 925 | forced_omaha_url_.clear(); |
| 926 | |
| 927 | // Certain conditions must be met to allow setting custom version and update |
| 928 | // server URLs. However, kScheduledAUTestURLRequest and kAUTestURLRequest are |
| 929 | // always allowed regardless of device state. |
| 930 | if (IsAnyUpdateSourceAllowed()) { |
| 931 | forced_app_version_ = app_version; |
| 932 | forced_omaha_url_ = omaha_url; |
| 933 | } |
| 934 | if (omaha_url == kScheduledAUTestURLRequest) { |
Alex Deymo | ac41a82 | 2015-09-15 20:52:53 -0700 | [diff] [blame] | 935 | forced_omaha_url_ = constants::kOmahaDefaultAUTestURL; |
David Pursell | 02c1864 | 2014-11-06 11:26:11 -0800 | [diff] [blame] | 936 | // Pretend that it's not user-initiated even though it is, |
| 937 | // so as to test scattering logic, etc. which get kicked off |
| 938 | // only in scheduled update checks. |
| 939 | interactive = false; |
| 940 | } else if (omaha_url == kAUTestURLRequest) { |
Alex Deymo | ac41a82 | 2015-09-15 20:52:53 -0700 | [diff] [blame] | 941 | forced_omaha_url_ = constants::kOmahaDefaultAUTestURL; |
David Pursell | 02c1864 | 2014-11-06 11:26:11 -0800 | [diff] [blame] | 942 | } |
| 943 | |
Aaron Wood | 081c023 | 2017-10-19 17:14:58 -0700 | [diff] [blame] | 944 | if (interactive) { |
| 945 | // Use the passed-in update attempt flags for this update attempt instead |
| 946 | // of the previously set ones. |
| 947 | current_update_attempt_flags_ = flags; |
| 948 | // Note: The caching for non-interactive update checks happens in |
Jae Hoon Kim | 75daa38 | 2019-07-02 11:17:24 -0700 | [diff] [blame] | 949 | // |OnUpdateScheduled()|. |
Aaron Wood | 081c023 | 2017-10-19 17:14:58 -0700 | [diff] [blame] | 950 | } |
| 951 | |
Jae Hoon Kim | 2b73ac2 | 2019-07-02 11:17:24 -0700 | [diff] [blame] | 952 | // |forced_update_pending_callback_| should always be set, but even in the |
| 953 | // case that it is not, we still return true indicating success because the |
| 954 | // scheduled periodic check will pick up these changes. |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 955 | if (forced_update_pending_callback_.get()) { |
Jae Hoon Kim | 2b73ac2 | 2019-07-02 11:17:24 -0700 | [diff] [blame] | 956 | // Always call |ScheduleUpdates()| before forcing an update. This is because |
| 957 | // we need an update to be scheduled for the |
| 958 | // |forced_update_pending_callback_| to have an effect. Here we don't need |
| 959 | // to care about the return value from |ScheduleUpdate()|. |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 960 | ScheduleUpdates(); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 961 | forced_update_pending_callback_->Run(true, interactive); |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 962 | } |
Aaron Wood | 081c023 | 2017-10-19 17:14:58 -0700 | [diff] [blame] | 963 | return true; |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 964 | } |
| 965 | |
Amin Hassani | 2b68e6b | 2020-04-17 10:49:12 -0700 | [diff] [blame] | 966 | bool UpdateAttempter::CheckForInstall(const vector<string>& dlc_ids, |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 967 | const string& omaha_url) { |
Jae Hoon Kim | c437ea5 | 2019-07-11 11:20:38 -0700 | [diff] [blame] | 968 | if (status_ != UpdateStatus::IDLE) { |
| 969 | LOG(INFO) << "Refusing to do an install as there is an " |
| 970 | << (is_install_ ? "install" : "update") |
| 971 | << " already in progress."; |
| 972 | return false; |
| 973 | } |
| 974 | |
Amin Hassani | 2b68e6b | 2020-04-17 10:49:12 -0700 | [diff] [blame] | 975 | dlc_ids_ = dlc_ids; |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 976 | is_install_ = true; |
| 977 | forced_omaha_url_.clear(); |
| 978 | |
| 979 | // Certain conditions must be met to allow setting custom version and update |
| 980 | // server URLs. However, kScheduledAUTestURLRequest and kAUTestURLRequest are |
| 981 | // always allowed regardless of device state. |
| 982 | if (IsAnyUpdateSourceAllowed()) { |
| 983 | forced_omaha_url_ = omaha_url; |
| 984 | } |
Jae Hoon Kim | c43f6bb | 2019-07-03 12:56:52 -0700 | [diff] [blame] | 985 | |
| 986 | if (omaha_url == kScheduledAUTestURLRequest || |
| 987 | omaha_url == kAUTestURLRequest) { |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 988 | forced_omaha_url_ = constants::kOmahaDefaultAUTestURL; |
| 989 | } |
| 990 | |
Jae Hoon Kim | 2b73ac2 | 2019-07-02 11:17:24 -0700 | [diff] [blame] | 991 | // |forced_update_pending_callback_| should always be set, but even in the |
| 992 | // case that it is not, we still return true indicating success because the |
| 993 | // scheduled periodic check will pick up these changes. |
| 994 | if (forced_update_pending_callback_.get()) { |
| 995 | // Always call |ScheduleUpdates()| before forcing an update. This is because |
| 996 | // we need an update to be scheduled for the |
| 997 | // |forced_update_pending_callback_| to have an effect. Here we don't need |
| 998 | // to care about the return value from |ScheduleUpdate()|. |
| 999 | ScheduleUpdates(); |
| 1000 | forced_update_pending_callback_->Run(true, true); |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 1001 | } |
| 1002 | return true; |
| 1003 | } |
| 1004 | |
Darin Petkov | 296889c | 2010-07-23 16:20:54 -0700 | [diff] [blame] | 1005 | bool UpdateAttempter::RebootIfNeeded() { |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1006 | if (SystemState::Get()->power_manager()->RequestReboot()) |
Daniel Erat | 65f1da0 | 2014-06-27 22:05:38 -0700 | [diff] [blame] | 1007 | return true; |
| 1008 | |
| 1009 | return RebootDirectly(); |
Darin Petkov | 296889c | 2010-07-23 16:20:54 -0700 | [diff] [blame] | 1010 | } |
| 1011 | |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 1012 | void UpdateAttempter::WriteUpdateCompletedMarker() { |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 1013 | string boot_id; |
| 1014 | if (!utils::GetBootId(&boot_id)) |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 1015 | return; |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 1016 | prefs_->SetString(kPrefsUpdateCompletedOnBootId, boot_id); |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 1017 | |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1018 | int64_t value = SystemState::Get()->clock()->GetBootTime().ToInternalValue(); |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 1019 | prefs_->SetInt64(kPrefsUpdateCompletedBootTime, value); |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 1020 | } |
| 1021 | |
Daniel Erat | 65f1da0 | 2014-06-27 22:05:38 -0700 | [diff] [blame] | 1022 | bool UpdateAttempter::RebootDirectly() { |
Amin Hassani | 3a4caa1 | 2019-11-06 11:12:28 -0800 | [diff] [blame] | 1023 | vector<string> command = {"/sbin/shutdown", "-r", "now"}; |
Daniel Erat | 65f1da0 | 2014-06-27 22:05:38 -0700 | [diff] [blame] | 1024 | int rc = 0; |
Amin Hassani | 3a4caa1 | 2019-11-06 11:12:28 -0800 | [diff] [blame] | 1025 | Subprocess::SynchronousExec(command, &rc, nullptr, nullptr); |
Daniel Erat | 65f1da0 | 2014-06-27 22:05:38 -0700 | [diff] [blame] | 1026 | return rc == 0; |
| 1027 | } |
| 1028 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 1029 | void UpdateAttempter::OnUpdateScheduled(EvalStatus status, |
| 1030 | const UpdateCheckParams& params) { |
| 1031 | waiting_for_scheduled_check_ = false; |
| 1032 | |
| 1033 | if (status == EvalStatus::kSucceeded) { |
| 1034 | if (!params.updates_enabled) { |
| 1035 | LOG(WARNING) << "Updates permanently disabled."; |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1036 | // Signal disabled status, then switch right back to idle. This is |
| 1037 | // necessary for ensuring that observers waiting for a signal change will |
| 1038 | // actually notice one on subsequent calls. Note that we don't need to |
| 1039 | // re-schedule a check in this case as updates are permanently disabled; |
| 1040 | // further (forced) checks may still initiate a scheduling call. |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1041 | SetStatusAndNotify(UpdateStatus::DISABLED); |
| 1042 | SetStatusAndNotify(UpdateStatus::IDLE); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 1043 | return; |
| 1044 | } |
| 1045 | |
Amin Hassani | ed37d68 | 2018-04-06 13:22:00 -0700 | [diff] [blame] | 1046 | LOG(INFO) << "Running " << (params.interactive ? "interactive" : "periodic") |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 1047 | << " update."; |
| 1048 | |
Amin Hassani | ed37d68 | 2018-04-06 13:22:00 -0700 | [diff] [blame] | 1049 | if (!params.interactive) { |
Aaron Wood | 081c023 | 2017-10-19 17:14:58 -0700 | [diff] [blame] | 1050 | // Cache the update attempt flags that will be used by this update attempt |
| 1051 | // so that they can't be changed mid-way through. |
| 1052 | current_update_attempt_flags_ = update_attempt_flags_; |
| 1053 | } |
| 1054 | |
Aaron Wood | bf5a252 | 2017-10-04 10:58:36 -0700 | [diff] [blame] | 1055 | LOG(INFO) << "Update attempt flags in use = 0x" << std::hex |
| 1056 | << current_update_attempt_flags_; |
| 1057 | |
Amin Hassani | e815363 | 2020-10-27 15:11:28 -0700 | [diff] [blame] | 1058 | Update(params); |
Alex Deymo | 7147908 | 2016-03-25 17:54:28 -0700 | [diff] [blame] | 1059 | // Always clear the forced app_version and omaha_url after an update attempt |
| 1060 | // so the next update uses the defaults. |
| 1061 | forced_app_version_.clear(); |
| 1062 | forced_omaha_url_.clear(); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 1063 | } else { |
| 1064 | LOG(WARNING) |
| 1065 | << "Update check scheduling failed (possibly timed out); retrying."; |
| 1066 | ScheduleUpdates(); |
| 1067 | } |
| 1068 | |
| 1069 | // This check ensures that future update checks will be or are already |
| 1070 | // scheduled. The check should never fail. A check failure means that there's |
| 1071 | // a bug that will most likely prevent further automatic update checks. It |
| 1072 | // seems better to crash in such cases and restart the update_engine daemon |
| 1073 | // into, hopefully, a known good state. |
Jae Hoon Kim | ba2fdce | 2019-07-11 13:18:58 -0700 | [diff] [blame] | 1074 | CHECK(IsBusyOrUpdateScheduled()); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 1075 | } |
| 1076 | |
| 1077 | void UpdateAttempter::UpdateLastCheckedTime() { |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1078 | last_checked_time_ = |
| 1079 | SystemState::Get()->clock()->GetWallclockTime().ToTimeT(); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 1080 | } |
| 1081 | |
Marton Hunyady | e58bddb | 2018-04-10 20:27:26 +0200 | [diff] [blame] | 1082 | void UpdateAttempter::UpdateRollbackHappened() { |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1083 | DCHECK(SystemState::Get()->payload_state()); |
Marton Hunyady | e58bddb | 2018-04-10 20:27:26 +0200 | [diff] [blame] | 1084 | DCHECK(policy_provider_); |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1085 | if (SystemState::Get()->payload_state()->GetRollbackHappened() && |
Marton Hunyady | e58bddb | 2018-04-10 20:27:26 +0200 | [diff] [blame] | 1086 | (policy_provider_->device_policy_is_loaded() || |
| 1087 | policy_provider_->IsConsumerDevice())) { |
| 1088 | // Rollback happened, but we already went through OOBE and policy is |
| 1089 | // present or it's a consumer device. |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1090 | SystemState::Get()->payload_state()->SetRollbackHappened(false); |
Marton Hunyady | e58bddb | 2018-04-10 20:27:26 +0200 | [diff] [blame] | 1091 | } |
| 1092 | } |
| 1093 | |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1094 | void UpdateAttempter::ProcessingDoneInternal(const ActionProcessor* processor, |
| 1095 | ErrorCode code) { |
Chris Sosa | 4f8ee27 | 2012-11-30 13:01:54 -0800 | [diff] [blame] | 1096 | // Reset cpu shares back to normal. |
Alex Deymo | ab0d976 | 2016-02-02 10:52:56 -0800 | [diff] [blame] | 1097 | cpu_limiter_.StopLimiter(); |
Darin Petkov | c6c135c | 2010-08-11 13:36:18 -0700 | [diff] [blame] | 1098 | |
Amin Hassani | ecb60d3 | 2019-06-17 18:09:10 -0700 | [diff] [blame] | 1099 | ResetInteractivityFlags(); |
Adolfo Victoria | 20262ad | 2018-08-06 10:40:11 -0700 | [diff] [blame] | 1100 | |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1101 | if (status_ == UpdateStatus::REPORTING_ERROR_EVENT) { |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1102 | LOG(INFO) << "Error event sent."; |
Gilad Arnold | 1ebd813 | 2012-03-05 10:19:29 -0800 | [diff] [blame] | 1103 | |
Amin Hassani | ecb60d3 | 2019-06-17 18:09:10 -0700 | [diff] [blame] | 1104 | // Inform scheduler of new status. |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1105 | SetStatusAndNotify(UpdateStatus::IDLE); |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1106 | ScheduleUpdates(); |
Gilad Arnold | 1ebd813 | 2012-03-05 10:19:29 -0800 | [diff] [blame] | 1107 | |
Andrew de los Reyes | c1d5c93 | 2011-04-20 17:15:47 -0700 | [diff] [blame] | 1108 | if (!fake_update_success_) { |
| 1109 | return; |
| 1110 | } |
| 1111 | LOG(INFO) << "Booted from FW B and tried to install new firmware, " |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 1112 | "so requesting reboot from user."; |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1113 | } |
| 1114 | |
Sen Jiang | 89e24c1 | 2018-03-22 18:05:44 -0700 | [diff] [blame] | 1115 | attempt_error_code_ = utils::GetBaseErrorCode(code); |
| 1116 | |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1117 | if (code != ErrorCode::kSuccess) { |
| 1118 | if (ScheduleErrorEventAction()) { |
Colin Howes | ac170d9 | 2018-11-20 16:29:28 -0800 | [diff] [blame] | 1119 | return; |
| 1120 | } |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1121 | LOG(INFO) << "No update."; |
| 1122 | SetStatusAndNotify(UpdateStatus::IDLE); |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1123 | ScheduleUpdates(); |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1124 | return; |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 1125 | } |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1126 | |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1127 | ReportTimeToUpdateAppliedMetric(); |
| 1128 | prefs_->SetInt64(kPrefsDeltaUpdateFailures, 0); |
| 1129 | prefs_->SetString(kPrefsPreviousVersion, |
| 1130 | omaha_request_params_->app_version()); |
| 1131 | DeltaPerformer::ResetUpdateProgress(prefs_, false); |
| 1132 | |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1133 | SystemState::Get()->payload_state()->UpdateSucceeded(); |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1134 | |
| 1135 | // Since we're done with scattering fully at this point, this is the |
| 1136 | // safest point delete the state files, as we're sure that the status is |
| 1137 | // set to reboot (which means no more updates will be applied until reboot) |
| 1138 | // This deletion is required for correctness as we want the next update |
| 1139 | // check to re-create a new random number for the update check count. |
| 1140 | // Similarly, we also delete the wall-clock-wait period that was persisted |
| 1141 | // so that we start with a new random value for the next update check |
| 1142 | // after reboot so that the same device is not favored or punished in any |
| 1143 | // way. |
| 1144 | prefs_->Delete(kPrefsUpdateCheckCount); |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1145 | SystemState::Get()->payload_state()->SetScatteringWaitPeriod(TimeDelta()); |
| 1146 | SystemState::Get()->payload_state()->SetStagingWaitPeriod(TimeDelta()); |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1147 | prefs_->Delete(kPrefsUpdateFirstSeenAt); |
| 1148 | |
| 1149 | // Note: below this comment should only be on |ErrorCode::kSuccess|. |
| 1150 | if (is_install_) { |
| 1151 | ProcessingDoneInstall(processor, code); |
| 1152 | } else { |
| 1153 | ProcessingDoneUpdate(processor, code); |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 1154 | } |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1155 | } |
| 1156 | |
Jae Hoon Kim | 7fdfbf1 | 2020-04-10 18:15:50 -0700 | [diff] [blame] | 1157 | vector<string> UpdateAttempter::GetSuccessfulDlcIds() { |
| 1158 | vector<string> dlc_ids; |
| 1159 | for (const auto& pr : omaha_request_params_->dlc_apps_params()) |
| 1160 | if (pr.second.updated) |
| 1161 | dlc_ids.push_back(pr.second.name); |
| 1162 | return dlc_ids; |
| 1163 | } |
| 1164 | |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1165 | void UpdateAttempter::ProcessingDoneInstall(const ActionProcessor* processor, |
| 1166 | ErrorCode code) { |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1167 | if (!SystemState::Get()->dlcservice()->InstallCompleted( |
| 1168 | GetSuccessfulDlcIds())) |
Jae Hoon Kim | 7fdfbf1 | 2020-04-10 18:15:50 -0700 | [diff] [blame] | 1169 | LOG(WARNING) << "dlcservice didn't successfully handle install completion."; |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1170 | SetStatusAndNotify(UpdateStatus::IDLE); |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1171 | ScheduleUpdates(); |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1172 | LOG(INFO) << "DLC successfully installed, no reboot needed."; |
| 1173 | } |
| 1174 | |
| 1175 | void UpdateAttempter::ProcessingDoneUpdate(const ActionProcessor* processor, |
| 1176 | ErrorCode code) { |
| 1177 | WriteUpdateCompletedMarker(); |
| 1178 | |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1179 | if (!SystemState::Get()->dlcservice()->UpdateCompleted(GetSuccessfulDlcIds())) |
Jae Hoon Kim | 7fdfbf1 | 2020-04-10 18:15:50 -0700 | [diff] [blame] | 1180 | LOG(WARNING) << "dlcservice didn't successfully handle update completion."; |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1181 | SetStatusAndNotify(UpdateStatus::UPDATED_NEED_REBOOT); |
| 1182 | ScheduleUpdates(); |
| 1183 | LOG(INFO) << "Update successfully applied, waiting to reboot."; |
| 1184 | |
| 1185 | // |install_plan_| is null during rollback operations, and the stats don't |
| 1186 | // make much sense then anyway. |
| 1187 | if (install_plan_) { |
| 1188 | // Generate an unique payload identifier. |
| 1189 | string target_version_uid; |
| 1190 | for (const auto& payload : install_plan_->payloads) { |
| 1191 | target_version_uid += brillo::data_encoding::Base64Encode(payload.hash) + |
| 1192 | ":" + payload.metadata_signature + ":"; |
Vyshu Khota | 4c5413d | 2020-11-04 16:17:25 -0800 | [diff] [blame] | 1193 | // Set fingerprint value for updates only. |
| 1194 | if (!is_install_) |
| 1195 | SetPref(kPrefsLastFp, payload.fp, payload.app_id); |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1196 | } |
| 1197 | |
| 1198 | // If we just downloaded a rollback image, we should preserve this fact |
| 1199 | // over the following powerwash. |
| 1200 | if (install_plan_->is_rollback) { |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1201 | SystemState::Get()->payload_state()->SetRollbackHappened(true); |
| 1202 | SystemState::Get()->metrics_reporter()->ReportEnterpriseRollbackMetrics( |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1203 | /*success=*/true, install_plan_->version); |
| 1204 | } |
| 1205 | |
| 1206 | // Expect to reboot into the new version to send the proper metric during |
| 1207 | // next boot. |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1208 | SystemState::Get()->payload_state()->ExpectRebootInNewVersion( |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1209 | target_version_uid); |
| 1210 | } else { |
| 1211 | // If we just finished a rollback, then we expect to have no Omaha |
| 1212 | // response. Otherwise, it's an error. |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1213 | if (SystemState::Get()->payload_state()->GetRollbackVersion().empty()) { |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1214 | LOG(ERROR) << "Can't send metrics because there was no Omaha response"; |
| 1215 | } |
| 1216 | } |
| 1217 | } |
| 1218 | |
| 1219 | // Delegate methods: |
| 1220 | void UpdateAttempter::ProcessingDone(const ActionProcessor* processor, |
| 1221 | ErrorCode code) { |
| 1222 | LOG(INFO) << "Processing Done."; |
| 1223 | ProcessingDoneInternal(processor, code); |
| 1224 | |
| 1225 | // Note: do cleanups here for any variables that need to be reset after a |
| 1226 | // failure, error, update, or install. |
| 1227 | is_install_ = false; |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1228 | } |
| 1229 | |
| 1230 | void UpdateAttempter::ProcessingStopped(const ActionProcessor* processor) { |
Chris Sosa | 4f8ee27 | 2012-11-30 13:01:54 -0800 | [diff] [blame] | 1231 | // Reset cpu shares back to normal. |
Alex Deymo | ab0d976 | 2016-02-02 10:52:56 -0800 | [diff] [blame] | 1232 | cpu_limiter_.StopLimiter(); |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1233 | download_progress_ = 0.0; |
Amin Hassani | ecb60d3 | 2019-06-17 18:09:10 -0700 | [diff] [blame] | 1234 | |
| 1235 | ResetInteractivityFlags(); |
| 1236 | |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1237 | SetStatusAndNotify(UpdateStatus::IDLE); |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1238 | ScheduleUpdates(); |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 1239 | error_event_.reset(nullptr); |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1240 | } |
| 1241 | |
| 1242 | // Called whenever an action has finished processing, either successfully |
| 1243 | // or otherwise. |
| 1244 | void UpdateAttempter::ActionCompleted(ActionProcessor* processor, |
| 1245 | AbstractAction* action, |
David Zeuthen | a99981f | 2013-04-29 13:42:47 -0700 | [diff] [blame] | 1246 | ErrorCode code) { |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 1247 | // Reset download progress regardless of whether or not the download |
| 1248 | // action succeeded. Also, get the response code from HTTP request |
| 1249 | // actions (update download as well as the initial update check |
| 1250 | // actions). |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1251 | const string type = action->Type(); |
Kelvin Zhang | 97cb058 | 2020-12-02 16:42:15 -0500 | [diff] [blame] | 1252 | if (type == DownloadActionChromeos::StaticType()) { |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1253 | download_progress_ = 0.0; |
Kelvin Zhang | 97cb058 | 2020-12-02 16:42:15 -0500 | [diff] [blame] | 1254 | DownloadActionChromeos* download_action = |
| 1255 | static_cast<DownloadActionChromeos*>(action); |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 1256 | http_response_code_ = download_action->GetHTTPResponseCode(); |
| 1257 | } else if (type == OmahaRequestAction::StaticType()) { |
| 1258 | OmahaRequestAction* omaha_request_action = |
Gilad Arnold | cf175a0 | 2014-07-10 16:48:47 -0700 | [diff] [blame] | 1259 | static_cast<OmahaRequestAction*>(action); |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 1260 | // If the request is not an event, then it's the update-check. |
| 1261 | if (!omaha_request_action->IsEvent()) { |
| 1262 | http_response_code_ = omaha_request_action->GetHTTPResponseCode(); |
Gilad Arnold | a6dab94 | 2014-04-25 11:46:03 -0700 | [diff] [blame] | 1263 | |
| 1264 | // Record the number of consecutive failed update checks. |
| 1265 | if (http_response_code_ == kHttpResponseInternalServerError || |
| 1266 | http_response_code_ == kHttpResponseServiceUnavailable) { |
| 1267 | consecutive_failed_update_checks_++; |
| 1268 | } else { |
| 1269 | consecutive_failed_update_checks_ = 0; |
| 1270 | } |
| 1271 | |
Weidong Guo | 421ff33 | 2017-04-17 10:08:38 -0700 | [diff] [blame] | 1272 | const OmahaResponse& omaha_response = |
| 1273 | omaha_request_action->GetOutputObject(); |
Gilad Arnold | a0258a5 | 2014-07-10 16:21:19 -0700 | [diff] [blame] | 1274 | // Store the server-dictated poll interval, if any. |
| 1275 | server_dictated_poll_interval_ = |
Weidong Guo | 421ff33 | 2017-04-17 10:08:38 -0700 | [diff] [blame] | 1276 | std::max(0, omaha_response.poll_interval); |
| 1277 | |
| 1278 | // This update is ignored by omaha request action because update over |
| 1279 | // cellular connection is not allowed. Needs to ask for user's permissions |
| 1280 | // to update. |
| 1281 | if (code == ErrorCode::kOmahaUpdateIgnoredOverCellular) { |
| 1282 | new_version_ = omaha_response.version; |
| 1283 | new_payload_size_ = 0; |
| 1284 | for (const auto& package : omaha_response.packages) { |
| 1285 | new_payload_size_ += package.size; |
| 1286 | } |
| 1287 | SetStatusAndNotify(UpdateStatus::NEED_PERMISSION_TO_UPDATE); |
| 1288 | } |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 1289 | } |
Aaron Wood | 23bd339 | 2017-10-06 14:48:25 -0700 | [diff] [blame] | 1290 | } else if (type == OmahaResponseHandlerAction::StaticType()) { |
| 1291 | // Depending on the returned error code, note that an update is available. |
| 1292 | if (code == ErrorCode::kOmahaUpdateDeferredPerPolicy || |
| 1293 | code == ErrorCode::kSuccess) { |
| 1294 | // Note that the status will be updated to DOWNLOADING when some bytes |
| 1295 | // get actually downloaded from the server and the BytesReceived |
| 1296 | // callback is invoked. This avoids notifying the user that a download |
| 1297 | // has started in cases when the server and the client are unable to |
| 1298 | // initiate the download. |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1299 | auto omaha_response_handler_action = |
| 1300 | static_cast<OmahaResponseHandlerAction*>(action); |
| 1301 | install_plan_.reset( |
| 1302 | new InstallPlan(omaha_response_handler_action->install_plan())); |
Aaron Wood | 23bd339 | 2017-10-06 14:48:25 -0700 | [diff] [blame] | 1303 | UpdateLastCheckedTime(); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1304 | new_version_ = install_plan_->version; |
Aaron Wood | 23bd339 | 2017-10-06 14:48:25 -0700 | [diff] [blame] | 1305 | new_payload_size_ = 0; |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1306 | for (const auto& payload : install_plan_->payloads) |
Aaron Wood | 23bd339 | 2017-10-06 14:48:25 -0700 | [diff] [blame] | 1307 | new_payload_size_ += payload.size; |
| 1308 | cpu_limiter_.StartLimiter(); |
| 1309 | SetStatusAndNotify(UpdateStatus::UPDATE_AVAILABLE); |
| 1310 | } |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 1311 | } |
Aaron Wood | 23bd339 | 2017-10-06 14:48:25 -0700 | [diff] [blame] | 1312 | // General failure cases. |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1313 | if (code != ErrorCode::kSuccess) { |
Darin Petkov | 7ed561b | 2011-10-04 02:59:03 -0700 | [diff] [blame] | 1314 | // If the current state is at or past the download phase, count the failure |
| 1315 | // in case a switch to full update becomes necessary. Ignore network |
| 1316 | // transfer timeouts and failures. |
Amin Hassani | 89a3712 | 2018-03-23 12:59:24 -0700 | [diff] [blame] | 1317 | if (code != ErrorCode::kDownloadTransferError) { |
| 1318 | switch (status_) { |
| 1319 | case UpdateStatus::IDLE: |
| 1320 | case UpdateStatus::CHECKING_FOR_UPDATE: |
| 1321 | case UpdateStatus::UPDATE_AVAILABLE: |
| 1322 | case UpdateStatus::NEED_PERMISSION_TO_UPDATE: |
| 1323 | break; |
| 1324 | case UpdateStatus::DOWNLOADING: |
| 1325 | case UpdateStatus::VERIFYING: |
| 1326 | case UpdateStatus::FINALIZING: |
| 1327 | case UpdateStatus::UPDATED_NEED_REBOOT: |
| 1328 | case UpdateStatus::REPORTING_ERROR_EVENT: |
| 1329 | case UpdateStatus::ATTEMPTING_ROLLBACK: |
| 1330 | case UpdateStatus::DISABLED: |
Amin Hassani | 70a90f5 | 2020-09-15 15:30:09 -0700 | [diff] [blame] | 1331 | case UpdateStatus::CLEANUP_PREVIOUS_UPDATE: |
Amin Hassani | 89a3712 | 2018-03-23 12:59:24 -0700 | [diff] [blame] | 1332 | MarkDeltaUpdateFailure(); |
| 1333 | break; |
| 1334 | } |
Darin Petkov | 3627577 | 2010-10-01 11:40:57 -0700 | [diff] [blame] | 1335 | } |
Sen Jiang | 89e24c1 | 2018-03-22 18:05:44 -0700 | [diff] [blame] | 1336 | if (code != ErrorCode::kNoUpdate) { |
| 1337 | // On failure, schedule an error event to be sent to Omaha. |
| 1338 | CreatePendingErrorEvent(action, code); |
| 1339 | } |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1340 | return; |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1341 | } |
Aaron Wood | 23bd339 | 2017-10-06 14:48:25 -0700 | [diff] [blame] | 1342 | // Find out which action completed (successfully). |
| 1343 | if (type == DownloadAction::StaticType()) { |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1344 | SetStatusAndNotify(UpdateStatus::FINALIZING); |
Amin Hassani | afd8cea | 2017-12-04 14:20:00 -0800 | [diff] [blame] | 1345 | } else if (type == FilesystemVerifierAction::StaticType()) { |
| 1346 | // Log the system properties before the postinst and after the file system |
| 1347 | // is verified. It used to be done in the postinst itself. But postinst |
| 1348 | // cannot do this anymore. On the other hand, these logs are frequently |
| 1349 | // looked at and it is preferable not to scatter them in random location in |
| 1350 | // the log and rather log it right before the postinst. The reason not do |
| 1351 | // this in the |PostinstallRunnerAction| is to prevent dependency from |
| 1352 | // libpayload_consumer to libupdate_engine. |
| 1353 | LogImageProperties(); |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1354 | } |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 1355 | } |
| 1356 | |
Alex Deymo | 542c19b | 2015-12-03 07:43:31 -0300 | [diff] [blame] | 1357 | void UpdateAttempter::BytesReceived(uint64_t bytes_progressed, |
| 1358 | uint64_t bytes_received, |
| 1359 | uint64_t total) { |
| 1360 | // The PayloadState keeps track of how many bytes were actually downloaded |
| 1361 | // from a given URL for the URL skipping logic. |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1362 | SystemState::Get()->payload_state()->DownloadProgress(bytes_progressed); |
Alex Deymo | 542c19b | 2015-12-03 07:43:31 -0300 | [diff] [blame] | 1363 | |
Alex Deymo | 0d29854 | 2016-03-30 18:31:49 -0700 | [diff] [blame] | 1364 | double progress = 0; |
| 1365 | if (total) |
| 1366 | progress = static_cast<double>(bytes_received) / static_cast<double>(total); |
| 1367 | if (status_ != UpdateStatus::DOWNLOADING || bytes_received == total) { |
Darin Petkov | af18305 | 2010-08-23 12:07:13 -0700 | [diff] [blame] | 1368 | download_progress_ = progress; |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1369 | SetStatusAndNotify(UpdateStatus::DOWNLOADING); |
Alex Deymo | 0d29854 | 2016-03-30 18:31:49 -0700 | [diff] [blame] | 1370 | } else { |
| 1371 | ProgressUpdate(progress); |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1372 | } |
| 1373 | } |
| 1374 | |
Alex Deymo | 542c19b | 2015-12-03 07:43:31 -0300 | [diff] [blame] | 1375 | void UpdateAttempter::DownloadComplete() { |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1376 | SystemState::Get()->payload_state()->DownloadComplete(); |
Alex Deymo | 542c19b | 2015-12-03 07:43:31 -0300 | [diff] [blame] | 1377 | } |
| 1378 | |
Alex Deymo | 0d29854 | 2016-03-30 18:31:49 -0700 | [diff] [blame] | 1379 | void UpdateAttempter::ProgressUpdate(double progress) { |
| 1380 | // Self throttle based on progress. Also send notifications if progress is |
| 1381 | // too slow. |
| 1382 | if (progress == 1.0 || |
| 1383 | progress - download_progress_ >= kBroadcastThresholdProgress || |
| 1384 | TimeTicks::Now() - last_notify_time_ >= |
| 1385 | TimeDelta::FromSeconds(kBroadcastThresholdSeconds)) { |
| 1386 | download_progress_ = progress; |
| 1387 | BroadcastStatus(); |
| 1388 | } |
| 1389 | } |
| 1390 | |
Amin Hassani | ecb60d3 | 2019-06-17 18:09:10 -0700 | [diff] [blame] | 1391 | void UpdateAttempter::ResetInteractivityFlags() { |
| 1392 | // Reset the state that's only valid for a single update pass. |
| 1393 | current_update_attempt_flags_ = UpdateAttemptFlags::kNone; |
| 1394 | |
| 1395 | if (forced_update_pending_callback_.get()) |
| 1396 | // Clear prior interactive requests once the processor is done. |
| 1397 | forced_update_pending_callback_->Run(false, false); |
| 1398 | } |
| 1399 | |
Jay Srinivasan | c1ba09a | 2012-08-14 14:15:57 -0700 | [diff] [blame] | 1400 | bool UpdateAttempter::ResetStatus() { |
| 1401 | LOG(INFO) << "Attempting to reset state from " |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1402 | << UpdateStatusToString(status_) << " to UpdateStatus::IDLE"; |
Jay Srinivasan | c1ba09a | 2012-08-14 14:15:57 -0700 | [diff] [blame] | 1403 | |
| 1404 | switch (status_) { |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1405 | case UpdateStatus::IDLE: |
Jay Srinivasan | c1ba09a | 2012-08-14 14:15:57 -0700 | [diff] [blame] | 1406 | // no-op. |
| 1407 | return true; |
| 1408 | |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 1409 | case UpdateStatus::UPDATED_NEED_REBOOT: { |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1410 | bool ret_value = true; |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1411 | status_ = UpdateStatus::IDLE; |
Jay Srinivasan | c1ba09a | 2012-08-14 14:15:57 -0700 | [diff] [blame] | 1412 | |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1413 | // Remove the reboot marker so that if the machine is rebooted |
Jay Srinivasan | c1ba09a | 2012-08-14 14:15:57 -0700 | [diff] [blame] | 1414 | // after resetting to idle state, it doesn't go back to |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1415 | // UpdateStatus::UPDATED_NEED_REBOOT state. |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 1416 | ret_value = prefs_->Delete(kPrefsUpdateCompletedOnBootId) && ret_value; |
| 1417 | ret_value = prefs_->Delete(kPrefsUpdateCompletedBootTime) && ret_value; |
Vyshu Khota | 4c5413d | 2020-11-04 16:17:25 -0800 | [diff] [blame] | 1418 | ret_value = prefs_->Delete(kPrefsLastFp, {kDlcPrefsSubDir}) && ret_value; |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1419 | |
Alex Deymo | 9870c0e | 2015-09-23 13:58:31 -0700 | [diff] [blame] | 1420 | // Update the boot flags so the current slot has higher priority. |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1421 | BootControlInterface* boot_control = SystemState::Get()->boot_control(); |
Alex Deymo | 9870c0e | 2015-09-23 13:58:31 -0700 | [diff] [blame] | 1422 | if (!boot_control->SetActiveBootSlot(boot_control->GetCurrentSlot())) |
| 1423 | ret_value = false; |
| 1424 | |
Alex Deymo | 5259033 | 2016-11-29 18:29:13 -0800 | [diff] [blame] | 1425 | // Mark the current slot as successful again, since marking it as active |
| 1426 | // may reset the successful bit. We ignore the result of whether marking |
| 1427 | // the current slot as successful worked. |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 1428 | if (!boot_control->MarkBootSuccessfulAsync(Bind([](bool successful) {}))) |
Alex Deymo | 5259033 | 2016-11-29 18:29:13 -0800 | [diff] [blame] | 1429 | ret_value = false; |
| 1430 | |
Alex Deymo | 4243291 | 2013-07-12 20:21:15 -0700 | [diff] [blame] | 1431 | // Notify the PayloadState that the successful payload was canceled. |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1432 | SystemState::Get()->payload_state()->ResetUpdateStatus(); |
Alex Deymo | 4243291 | 2013-07-12 20:21:15 -0700 | [diff] [blame] | 1433 | |
Alex Deymo | 87c0886 | 2015-10-30 21:56:55 -0700 | [diff] [blame] | 1434 | // The previous version is used to report back to omaha after reboot that |
| 1435 | // we actually rebooted into the new version from this "prev-version". We |
| 1436 | // need to clear out this value now to prevent it being sent on the next |
| 1437 | // updatecheck request. |
| 1438 | ret_value = prefs_->SetString(kPrefsPreviousVersion, "") && ret_value; |
| 1439 | |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 1440 | LOG(INFO) << "Reset status " << (ret_value ? "successful" : "failed"); |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1441 | return ret_value; |
Jay Srinivasan | c1ba09a | 2012-08-14 14:15:57 -0700 | [diff] [blame] | 1442 | } |
| 1443 | |
| 1444 | default: |
| 1445 | LOG(ERROR) << "Reset not allowed in this state."; |
| 1446 | return false; |
| 1447 | } |
| 1448 | } |
| 1449 | |
Aaron Wood | 7f92e2b | 2017-08-28 14:51:21 -0700 | [diff] [blame] | 1450 | bool UpdateAttempter::GetStatus(UpdateEngineStatus* out_status) { |
Aaron Wood | 795c5b4 | 2017-12-05 16:06:13 -0800 | [diff] [blame] | 1451 | out_status->last_checked_time = last_checked_time_; |
Aaron Wood | 7f92e2b | 2017-08-28 14:51:21 -0700 | [diff] [blame] | 1452 | out_status->status = status_; |
| 1453 | out_status->current_version = omaha_request_params_->app_version(); |
Aaron Wood | 7f92e2b | 2017-08-28 14:51:21 -0700 | [diff] [blame] | 1454 | out_status->progress = download_progress_; |
| 1455 | out_status->new_size_bytes = new_payload_size_; |
| 1456 | out_status->new_version = new_version_; |
Amin Hassani | 9be122e | 2019-08-29 09:20:12 -0700 | [diff] [blame] | 1457 | out_status->is_enterprise_rollback = |
| 1458 | install_plan_ && install_plan_->is_rollback; |
Jae Hoon Kim | 2f78c1c | 2019-07-25 13:20:43 -0700 | [diff] [blame] | 1459 | out_status->is_install = is_install_; |
Jae Hoon Kim | 051627a | 2019-09-03 12:56:32 -0700 | [diff] [blame] | 1460 | |
| 1461 | string str_eol_date; |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1462 | if (SystemState::Get()->prefs()->Exists(kPrefsOmahaEolDate) && |
| 1463 | !SystemState::Get()->prefs()->GetString(kPrefsOmahaEolDate, |
| 1464 | &str_eol_date)) |
Jae Hoon Kim | 2dfd35d | 2020-06-02 10:53:13 -0700 | [diff] [blame] | 1465 | LOG(ERROR) << "Failed to retrieve kPrefsOmahaEolDate pref."; |
Jae Hoon Kim | 051627a | 2019-09-03 12:56:32 -0700 | [diff] [blame] | 1466 | out_status->eol_date = StringToEolDate(str_eol_date); |
| 1467 | |
Miriam Polzer | 0cf1acb | 2020-04-29 17:39:51 +0200 | [diff] [blame] | 1468 | // A powerwash will take place either if the install plan says it is required |
| 1469 | // or if an enterprise rollback is happening. |
| 1470 | out_status->will_powerwash_after_reboot = |
| 1471 | install_plan_ && |
| 1472 | (install_plan_->powerwash_required || install_plan_->is_rollback); |
| 1473 | |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 1474 | return true; |
| 1475 | } |
| 1476 | |
Darin Petkov | 61635a9 | 2011-05-18 16:20:36 -0700 | [diff] [blame] | 1477 | void UpdateAttempter::BroadcastStatus() { |
Aaron Wood | 7f92e2b | 2017-08-28 14:51:21 -0700 | [diff] [blame] | 1478 | UpdateEngineStatus broadcast_status; |
| 1479 | // Use common method for generating the current status. |
| 1480 | GetStatus(&broadcast_status); |
| 1481 | |
Alex Deymo | fa78f14 | 2016-01-26 21:36:16 -0800 | [diff] [blame] | 1482 | for (const auto& observer : service_observers_) { |
Aaron Wood | 7f92e2b | 2017-08-28 14:51:21 -0700 | [diff] [blame] | 1483 | observer->SendStatusUpdate(broadcast_status); |
Alex Deymo | fa78f14 | 2016-01-26 21:36:16 -0800 | [diff] [blame] | 1484 | } |
Darin Petkov | af18305 | 2010-08-23 12:07:13 -0700 | [diff] [blame] | 1485 | last_notify_time_ = TimeTicks::Now(); |
Alex Deymo | fa78f14 | 2016-01-26 21:36:16 -0800 | [diff] [blame] | 1486 | } |
| 1487 | |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 1488 | uint32_t UpdateAttempter::GetErrorCodeFlags() { |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1489 | uint32_t flags = 0; |
| 1490 | |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1491 | if (!SystemState::Get()->hardware()->IsNormalBootMode()) |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1492 | flags |= static_cast<uint32_t>(ErrorCode::kDevModeFlag); |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1493 | |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1494 | if (install_plan_ && install_plan_->is_resume) |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1495 | flags |= static_cast<uint32_t>(ErrorCode::kResumedFlag); |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1496 | |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1497 | if (!SystemState::Get()->hardware()->IsOfficialBuild()) |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1498 | flags |= static_cast<uint32_t>(ErrorCode::kTestImageFlag); |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1499 | |
Sen Jiang | daeaa43 | 2018-10-09 18:18:45 -0700 | [diff] [blame] | 1500 | if (!omaha_request_params_->IsUpdateUrlOfficial()) { |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1501 | flags |= static_cast<uint32_t>(ErrorCode::kTestOmahaUrlFlag); |
Alex Deymo | ac41a82 | 2015-09-15 20:52:53 -0700 | [diff] [blame] | 1502 | } |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1503 | |
| 1504 | return flags; |
| 1505 | } |
| 1506 | |
David Zeuthen | a99981f | 2013-04-29 13:42:47 -0700 | [diff] [blame] | 1507 | bool UpdateAttempter::ShouldCancel(ErrorCode* cancel_reason) { |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1508 | // Check if the channel we're attempting to update to is the same as the |
| 1509 | // target channel currently chosen by the user. |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1510 | OmahaRequestParams* params = SystemState::Get()->request_params(); |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1511 | if (params->download_channel() != params->target_channel()) { |
| 1512 | LOG(ERROR) << "Aborting download as target channel: " |
| 1513 | << params->target_channel() |
| 1514 | << " is different from the download channel: " |
| 1515 | << params->download_channel(); |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1516 | *cancel_reason = ErrorCode::kUpdateCanceledByChannelChange; |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1517 | return true; |
| 1518 | } |
| 1519 | |
| 1520 | return false; |
| 1521 | } |
| 1522 | |
Nam T. Nguyen | 7d623eb | 2014-05-13 16:06:28 -0700 | [diff] [blame] | 1523 | void UpdateAttempter::SetStatusAndNotify(UpdateStatus status) { |
Darin Petkov | 61635a9 | 2011-05-18 16:20:36 -0700 | [diff] [blame] | 1524 | status_ = status; |
Darin Petkov | 61635a9 | 2011-05-18 16:20:36 -0700 | [diff] [blame] | 1525 | BroadcastStatus(); |
| 1526 | } |
| 1527 | |
Darin Petkov | 777dbfa | 2010-07-20 15:03:37 -0700 | [diff] [blame] | 1528 | void UpdateAttempter::CreatePendingErrorEvent(AbstractAction* action, |
David Zeuthen | a99981f | 2013-04-29 13:42:47 -0700 | [diff] [blame] | 1529 | ErrorCode code) { |
Sen Jiang | 89e24c1 | 2018-03-22 18:05:44 -0700 | [diff] [blame] | 1530 | if (error_event_.get() || status_ == UpdateStatus::REPORTING_ERROR_EVENT) { |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1531 | // This shouldn't really happen. |
| 1532 | LOG(WARNING) << "There's already an existing pending error event."; |
| 1533 | return; |
| 1534 | } |
Darin Petkov | 777dbfa | 2010-07-20 15:03:37 -0700 | [diff] [blame] | 1535 | |
Jay Srinivasan | 56d5aa4 | 2012-03-26 14:27:59 -0700 | [diff] [blame] | 1536 | // Classify the code to generate the appropriate result so that |
| 1537 | // the Borgmon charts show up the results correctly. |
| 1538 | // Do this before calling GetErrorCodeForAction which could potentially |
| 1539 | // augment the bit representation of code and thus cause no matches for |
| 1540 | // the switch cases below. |
| 1541 | OmahaEvent::Result event_result; |
| 1542 | switch (code) { |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1543 | case ErrorCode::kOmahaUpdateIgnoredPerPolicy: |
| 1544 | case ErrorCode::kOmahaUpdateDeferredPerPolicy: |
| 1545 | case ErrorCode::kOmahaUpdateDeferredForBackoff: |
Jay Srinivasan | 56d5aa4 | 2012-03-26 14:27:59 -0700 | [diff] [blame] | 1546 | event_result = OmahaEvent::kResultUpdateDeferred; |
| 1547 | break; |
| 1548 | default: |
| 1549 | event_result = OmahaEvent::kResultError; |
| 1550 | break; |
| 1551 | } |
| 1552 | |
Darin Petkov | 777dbfa | 2010-07-20 15:03:37 -0700 | [diff] [blame] | 1553 | code = GetErrorCodeForAction(action, code); |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1554 | fake_update_success_ = code == ErrorCode::kPostinstallBootedFromFirmwareB; |
Darin Petkov | 18c7bce | 2011-06-16 14:07:00 -0700 | [diff] [blame] | 1555 | |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1556 | // Compute the final error code with all the bit flags to be sent to Omaha. |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 1557 | code = |
| 1558 | static_cast<ErrorCode>(static_cast<uint32_t>(code) | GetErrorCodeFlags()); |
| 1559 | error_event_.reset( |
| 1560 | new OmahaEvent(OmahaEvent::kTypeUpdateComplete, event_result, code)); |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1561 | } |
| 1562 | |
| 1563 | bool UpdateAttempter::ScheduleErrorEventAction() { |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 1564 | if (error_event_.get() == nullptr) |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1565 | return false; |
| 1566 | |
Jay Srinivasan | 6f6ea00 | 2012-12-14 11:26:28 -0800 | [diff] [blame] | 1567 | LOG(ERROR) << "Update failed."; |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1568 | SystemState::Get()->payload_state()->UpdateFailed(error_event_->error_code); |
Jay Srinivasan | 6f6ea00 | 2012-12-14 11:26:28 -0800 | [diff] [blame] | 1569 | |
Marton Hunyady | a030268 | 2018-05-16 18:52:13 +0200 | [diff] [blame] | 1570 | // Send metrics if it was a rollback. |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1571 | if (install_plan_ && install_plan_->is_rollback) { |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1572 | SystemState::Get()->metrics_reporter()->ReportEnterpriseRollbackMetrics( |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1573 | /*success=*/false, install_plan_->version); |
Marton Hunyady | a030268 | 2018-05-16 18:52:13 +0200 | [diff] [blame] | 1574 | } |
| 1575 | |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1576 | // Send it to Omaha. |
Alex Deymo | af9a863 | 2015-09-23 18:51:48 -0700 | [diff] [blame] | 1577 | LOG(INFO) << "Reporting the error event"; |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1578 | auto error_event_action = std::make_unique<OmahaRequestAction>( |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1579 | error_event_.release(), // Pass ownership. |
| 1580 | std::make_unique<LibcurlHttpFetcher>(GetProxyResolver(), |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1581 | SystemState::Get()->hardware()), |
Jae Hoon Kim | edb6550 | 2019-06-14 11:52:17 -0700 | [diff] [blame] | 1582 | false, |
| 1583 | session_id_); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1584 | processor_->EnqueueAction(std::move(error_event_action)); |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1585 | SetStatusAndNotify(UpdateStatus::REPORTING_ERROR_EVENT); |
Darin Petkov | f42cc1c | 2010-09-01 09:03:02 -0700 | [diff] [blame] | 1586 | processor_->StartProcessing(); |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1587 | return true; |
| 1588 | } |
| 1589 | |
Darin Petkov | 58dd134 | 2011-05-06 12:05:13 -0700 | [diff] [blame] | 1590 | void UpdateAttempter::ScheduleProcessingStart() { |
| 1591 | LOG(INFO) << "Scheduling an action processor start."; |
Alex Deymo | 60ca1a7 | 2015-06-18 18:19:15 -0700 | [diff] [blame] | 1592 | MessageLoop::current()->PostTask( |
| 1593 | FROM_HERE, |
Luis Hector Chavez | f1cf348 | 2016-07-19 14:29:19 -0700 | [diff] [blame] | 1594 | Bind([](ActionProcessor* processor) { processor->StartProcessing(); }, |
| 1595 | base::Unretained(processor_.get()))); |
Darin Petkov | 58dd134 | 2011-05-06 12:05:13 -0700 | [diff] [blame] | 1596 | } |
| 1597 | |
Darin Petkov | 3627577 | 2010-10-01 11:40:57 -0700 | [diff] [blame] | 1598 | void UpdateAttempter::DisableDeltaUpdateIfNeeded() { |
| 1599 | int64_t delta_failures; |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 1600 | if (omaha_request_params_->delta_okay() && |
Darin Petkov | 3627577 | 2010-10-01 11:40:57 -0700 | [diff] [blame] | 1601 | prefs_->GetInt64(kPrefsDeltaUpdateFailures, &delta_failures) && |
| 1602 | delta_failures >= kMaxDeltaUpdateFailures) { |
| 1603 | LOG(WARNING) << "Too many delta update failures, forcing full update."; |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 1604 | omaha_request_params_->set_delta_okay(false); |
Darin Petkov | 3627577 | 2010-10-01 11:40:57 -0700 | [diff] [blame] | 1605 | } |
| 1606 | } |
| 1607 | |
| 1608 | void UpdateAttempter::MarkDeltaUpdateFailure() { |
Darin Petkov | 2dd0109 | 2010-10-08 15:43:05 -0700 | [diff] [blame] | 1609 | // Don't try to resume a failed delta update. |
| 1610 | DeltaPerformer::ResetUpdateProgress(prefs_, false); |
Darin Petkov | 3627577 | 2010-10-01 11:40:57 -0700 | [diff] [blame] | 1611 | int64_t delta_failures; |
| 1612 | if (!prefs_->GetInt64(kPrefsDeltaUpdateFailures, &delta_failures) || |
| 1613 | delta_failures < 0) { |
| 1614 | delta_failures = 0; |
| 1615 | } |
| 1616 | prefs_->SetInt64(kPrefsDeltaUpdateFailures, ++delta_failures); |
| 1617 | } |
| 1618 | |
Thieu Le | 116fda3 | 2011-04-19 11:01:54 -0700 | [diff] [blame] | 1619 | void UpdateAttempter::PingOmaha() { |
Thieu Le | d88a857 | 2011-05-26 09:09:19 -0700 | [diff] [blame] | 1620 | if (!processor_->IsRunning()) { |
Amin Hassani | ecb60d3 | 2019-06-17 18:09:10 -0700 | [diff] [blame] | 1621 | ResetInteractivityFlags(); |
| 1622 | |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1623 | auto ping_action = std::make_unique<OmahaRequestAction>( |
Alex Deymo | c1c17b4 | 2015-11-23 03:53:15 -0300 | [diff] [blame] | 1624 | nullptr, |
Ben Chan | ab5a0af | 2017-10-12 14:57:50 -0700 | [diff] [blame] | 1625 | std::make_unique<LibcurlHttpFetcher>(GetProxyResolver(), |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1626 | SystemState::Get()->hardware()), |
Jae Hoon Kim | edb6550 | 2019-06-14 11:52:17 -0700 | [diff] [blame] | 1627 | true, |
| 1628 | "" /* session_id */); |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 1629 | processor_->set_delegate(nullptr); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1630 | processor_->EnqueueAction(std::move(ping_action)); |
Thieu Le | d88a857 | 2011-05-26 09:09:19 -0700 | [diff] [blame] | 1631 | // Call StartProcessing() synchronously here to avoid any race conditions |
| 1632 | // caused by multiple outstanding ping Omaha requests. If we call |
| 1633 | // StartProcessing() asynchronously, the device can be suspended before we |
| 1634 | // get a chance to callback to StartProcessing(). When the device resumes |
| 1635 | // (assuming the device sleeps longer than the next update check period), |
| 1636 | // StartProcessing() is called back and at the same time, the next update |
| 1637 | // check is fired which eventually invokes StartProcessing(). A crash |
| 1638 | // can occur because StartProcessing() checks to make sure that the |
| 1639 | // processor is idle which it isn't due to the two concurrent ping Omaha |
| 1640 | // requests. |
| 1641 | processor_->StartProcessing(); |
| 1642 | } else { |
Darin Petkov | 58dd134 | 2011-05-06 12:05:13 -0700 | [diff] [blame] | 1643 | LOG(WARNING) << "Action processor running, Omaha ping suppressed."; |
Darin Petkov | 58dd134 | 2011-05-06 12:05:13 -0700 | [diff] [blame] | 1644 | } |
Thieu Le | d88a857 | 2011-05-26 09:09:19 -0700 | [diff] [blame] | 1645 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 1646 | // Update the last check time here; it may be re-updated when an Omaha |
| 1647 | // response is received, but this will prevent us from repeatedly scheduling |
| 1648 | // checks in the case where a response is not received. |
| 1649 | UpdateLastCheckedTime(); |
| 1650 | |
Thieu Le | d88a857 | 2011-05-26 09:09:19 -0700 | [diff] [blame] | 1651 | // Update the status which will schedule the next update check |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1652 | SetStatusAndNotify(UpdateStatus::UPDATED_NEED_REBOOT); |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1653 | ScheduleUpdates(); |
Thieu Le | 116fda3 | 2011-04-19 11:01:54 -0700 | [diff] [blame] | 1654 | } |
| 1655 | |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 1656 | bool UpdateAttempter::DecrementUpdateCheckCount() { |
Ben Chan | 9abb763 | 2014-08-07 00:10:53 -0700 | [diff] [blame] | 1657 | int64_t update_check_count_value; |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 1658 | |
| 1659 | if (!prefs_->Exists(kPrefsUpdateCheckCount)) { |
| 1660 | // This file does not exist. This means we haven't started our update |
| 1661 | // check count down yet, so nothing more to do. This file will be created |
| 1662 | // later when we first satisfy the wall-clock-based-wait period. |
| 1663 | LOG(INFO) << "No existing update check count. That's normal."; |
| 1664 | return true; |
| 1665 | } |
| 1666 | |
| 1667 | if (prefs_->GetInt64(kPrefsUpdateCheckCount, &update_check_count_value)) { |
| 1668 | // Only if we're able to read a proper integer value, then go ahead |
| 1669 | // and decrement and write back the result in the same file, if needed. |
| 1670 | LOG(INFO) << "Update check count = " << update_check_count_value; |
| 1671 | |
| 1672 | if (update_check_count_value == 0) { |
| 1673 | // It could be 0, if, for some reason, the file didn't get deleted |
| 1674 | // when we set our status to waiting for reboot. so we just leave it |
| 1675 | // as is so that we can prevent another update_check wait for this client. |
| 1676 | LOG(INFO) << "Not decrementing update check count as it's already 0."; |
| 1677 | return true; |
| 1678 | } |
| 1679 | |
| 1680 | if (update_check_count_value > 0) |
| 1681 | update_check_count_value--; |
| 1682 | else |
| 1683 | update_check_count_value = 0; |
| 1684 | |
| 1685 | // Write out the new value of update_check_count_value. |
| 1686 | if (prefs_->SetInt64(kPrefsUpdateCheckCount, update_check_count_value)) { |
Sen Jiang | 771f648 | 2018-04-04 17:59:10 -0700 | [diff] [blame] | 1687 | // We successfully wrote out the new value, so enable the |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 1688 | // update check based wait. |
| 1689 | LOG(INFO) << "New update check count = " << update_check_count_value; |
| 1690 | return true; |
| 1691 | } |
| 1692 | } |
| 1693 | |
| 1694 | LOG(INFO) << "Deleting update check count state due to read/write errors."; |
| 1695 | |
| 1696 | // We cannot read/write to the file, so disable the update check based wait |
| 1697 | // so that we don't get stuck in this OS version by any chance (which could |
| 1698 | // happen if there's some bug that causes to read/write incorrectly). |
| 1699 | // Also attempt to delete the file to do our best effort to cleanup. |
| 1700 | prefs_->Delete(kPrefsUpdateCheckCount); |
| 1701 | return false; |
| 1702 | } |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 1703 | |
David Zeuthen | e4c58bf | 2013-06-18 17:26:50 -0700 | [diff] [blame] | 1704 | void UpdateAttempter::UpdateEngineStarted() { |
Alex Vakulenko | dea2eac | 2014-03-14 15:56:59 -0700 | [diff] [blame] | 1705 | // If we just booted into a new update, keep the previous OS version |
| 1706 | // in case we rebooted because of a crash of the old version, so we |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 1707 | // can do a proper crash report with correct information. |
Alex Vakulenko | dea2eac | 2014-03-14 15:56:59 -0700 | [diff] [blame] | 1708 | // This must be done before calling |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1709 | // SystemState::Get()->payload_state()->UpdateEngineStarted() since it will |
Alex Vakulenko | dea2eac | 2014-03-14 15:56:59 -0700 | [diff] [blame] | 1710 | // delete SystemUpdated marker file. |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1711 | if (SystemState::Get()->system_rebooted() && |
Alex Vakulenko | dea2eac | 2014-03-14 15:56:59 -0700 | [diff] [blame] | 1712 | prefs_->Exists(kPrefsSystemUpdatedMarker)) { |
| 1713 | if (!prefs_->GetString(kPrefsPreviousVersion, &prev_version_)) { |
| 1714 | // If we fail to get the version string, make sure it stays empty. |
| 1715 | prev_version_.clear(); |
| 1716 | } |
| 1717 | } |
| 1718 | |
Vyshu | 6e8a37b | 2020-11-25 10:31:00 -0800 | [diff] [blame] | 1719 | MoveToPrefs({kPrefsLastRollCallPingDay, kPrefsLastActivePingDay}); |
| 1720 | |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1721 | SystemState::Get()->payload_state()->UpdateEngineStarted(); |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 1722 | StartP2PAtStartup(); |
Jae Hoon Kim | 5e8e30b | 2020-05-06 14:59:06 -0700 | [diff] [blame] | 1723 | |
Amin Hassani | 90e9f19 | 2020-11-18 14:20:56 -0800 | [diff] [blame] | 1724 | excluder_ = CreateExcluder(); |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 1725 | } |
| 1726 | |
Vyshu | 6e8a37b | 2020-11-25 10:31:00 -0800 | [diff] [blame] | 1727 | void UpdateAttempter::MoveToPrefs(const vector<string>& keys) { |
| 1728 | auto* powerwash_safe_prefs = SystemState::Get()->powerwash_safe_prefs(); |
| 1729 | for (const auto& key : keys) { |
| 1730 | // Do not overwrite existing pref key with powerwash prefs. |
| 1731 | if (!prefs_->Exists(key) && powerwash_safe_prefs->Exists(key)) { |
| 1732 | string value; |
| 1733 | if (!powerwash_safe_prefs->GetString(key, &value) || |
| 1734 | !prefs_->SetString(key, value)) { |
| 1735 | PLOG(ERROR) << "Unable to add powerwash safe key " << key |
| 1736 | << " to prefs. Powerwash safe key will be deleted."; |
| 1737 | } |
| 1738 | } |
| 1739 | // Delete keys regardless of operation success to preserve privacy. |
| 1740 | powerwash_safe_prefs->Delete(key); |
| 1741 | } |
| 1742 | } |
| 1743 | |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 1744 | bool UpdateAttempter::StartP2PAtStartup() { |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1745 | if (!SystemState::Get()->p2p_manager()->IsP2PEnabled()) { |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 1746 | LOG(INFO) << "Not starting p2p at startup since it's not enabled."; |
| 1747 | return false; |
| 1748 | } |
| 1749 | |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1750 | if (SystemState::Get()->p2p_manager()->CountSharedFiles() < 1) { |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 1751 | LOG(INFO) << "Not starting p2p at startup since our application " |
| 1752 | << "is not sharing any files."; |
| 1753 | return false; |
| 1754 | } |
| 1755 | |
| 1756 | return StartP2PAndPerformHousekeeping(); |
| 1757 | } |
| 1758 | |
| 1759 | bool UpdateAttempter::StartP2PAndPerformHousekeeping() { |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1760 | if (!SystemState::Get()->p2p_manager()->IsP2PEnabled()) { |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 1761 | LOG(INFO) << "Not starting p2p since it's not enabled."; |
| 1762 | return false; |
| 1763 | } |
| 1764 | |
| 1765 | LOG(INFO) << "Ensuring that p2p is running."; |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1766 | if (!SystemState::Get()->p2p_manager()->EnsureP2PRunning()) { |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 1767 | LOG(ERROR) << "Error starting p2p."; |
| 1768 | return false; |
| 1769 | } |
| 1770 | |
| 1771 | LOG(INFO) << "Performing p2p housekeeping."; |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1772 | if (!SystemState::Get()->p2p_manager()->PerformHousekeeping()) { |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 1773 | LOG(ERROR) << "Error performing housekeeping for p2p."; |
| 1774 | return false; |
| 1775 | } |
| 1776 | |
| 1777 | LOG(INFO) << "Done performing p2p housekeeping."; |
| 1778 | return true; |
David Zeuthen | e4c58bf | 2013-06-18 17:26:50 -0700 | [diff] [blame] | 1779 | } |
| 1780 | |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 1781 | bool UpdateAttempter::GetBootTimeAtUpdate(Time* out_boot_time) { |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 1782 | // In case of an update_engine restart without a reboot, we stored the boot_id |
| 1783 | // when the update was completed by setting a pref, so we can check whether |
| 1784 | // the last update was on this boot or a previous one. |
| 1785 | string boot_id; |
| 1786 | TEST_AND_RETURN_FALSE(utils::GetBootId(&boot_id)); |
| 1787 | |
| 1788 | string update_completed_on_boot_id; |
| 1789 | if (!prefs_->Exists(kPrefsUpdateCompletedOnBootId) || |
| 1790 | !prefs_->GetString(kPrefsUpdateCompletedOnBootId, |
| 1791 | &update_completed_on_boot_id) || |
| 1792 | update_completed_on_boot_id != boot_id) |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 1793 | return false; |
| 1794 | |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 1795 | // Short-circuit avoiding the read in case out_boot_time is nullptr. |
| 1796 | if (out_boot_time) { |
| 1797 | int64_t boot_time = 0; |
| 1798 | // Since the kPrefsUpdateCompletedOnBootId was correctly set, this pref |
| 1799 | // should not fail. |
| 1800 | TEST_AND_RETURN_FALSE( |
| 1801 | prefs_->GetInt64(kPrefsUpdateCompletedBootTime, &boot_time)); |
| 1802 | *out_boot_time = Time::FromInternalValue(boot_time); |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 1803 | } |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 1804 | return true; |
| 1805 | } |
| 1806 | |
Jae Hoon Kim | ba2fdce | 2019-07-11 13:18:58 -0700 | [diff] [blame] | 1807 | bool UpdateAttempter::IsBusyOrUpdateScheduled() { |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1808 | return ((status_ != UpdateStatus::IDLE && |
| 1809 | status_ != UpdateStatus::UPDATED_NEED_REBOOT) || |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1810 | waiting_for_scheduled_check_); |
| 1811 | } |
| 1812 | |
Sen Jiang | daeaa43 | 2018-10-09 18:18:45 -0700 | [diff] [blame] | 1813 | bool UpdateAttempter::IsAnyUpdateSourceAllowed() const { |
David Pursell | 907b4fa | 2015-01-27 10:27:38 -0800 | [diff] [blame] | 1814 | // We allow updates from any source if either of these are true: |
| 1815 | // * The device is running an unofficial (dev/test) image. |
| 1816 | // * The debugd dev features are accessible (i.e. in devmode with no owner). |
| 1817 | // This protects users running a base image, while still allowing a specific |
| 1818 | // window (gated by the debug dev features) where `cros flash` is usable. |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1819 | if (!SystemState::Get()->hardware()->IsOfficialBuild()) { |
David Pursell | 02c1864 | 2014-11-06 11:26:11 -0800 | [diff] [blame] | 1820 | LOG(INFO) << "Non-official build; allowing any update source."; |
| 1821 | return true; |
| 1822 | } |
| 1823 | |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1824 | if (SystemState::Get()->hardware()->AreDevFeaturesEnabled()) { |
Sen Jiang | e67bb5b | 2016-06-20 15:53:56 -0700 | [diff] [blame] | 1825 | LOG(INFO) << "Developer features enabled; allowing custom update sources."; |
David Pursell | 02c1864 | 2014-11-06 11:26:11 -0800 | [diff] [blame] | 1826 | return true; |
| 1827 | } |
Sen Jiang | e67bb5b | 2016-06-20 15:53:56 -0700 | [diff] [blame] | 1828 | |
| 1829 | LOG(INFO) |
| 1830 | << "Developer features disabled; disallowing custom update sources."; |
David Pursell | 02c1864 | 2014-11-06 11:26:11 -0800 | [diff] [blame] | 1831 | return false; |
| 1832 | } |
| 1833 | |
May Lippert | 60aa3ca | 2018-08-15 16:55:29 -0700 | [diff] [blame] | 1834 | void UpdateAttempter::ReportTimeToUpdateAppliedMetric() { |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1835 | const policy::DevicePolicy* device_policy = |
| 1836 | SystemState::Get()->device_policy(); |
May Lippert | 60aa3ca | 2018-08-15 16:55:29 -0700 | [diff] [blame] | 1837 | if (device_policy && device_policy->IsEnterpriseEnrolled()) { |
| 1838 | vector<policy::DevicePolicy::WeeklyTimeInterval> parsed_intervals; |
| 1839 | bool has_time_restrictions = |
| 1840 | device_policy->GetDisallowedTimeIntervals(&parsed_intervals); |
| 1841 | |
| 1842 | int64_t update_first_seen_at_int; |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1843 | if (SystemState::Get()->prefs()->Exists(kPrefsUpdateFirstSeenAt)) { |
| 1844 | if (SystemState::Get()->prefs()->GetInt64(kPrefsUpdateFirstSeenAt, |
| 1845 | &update_first_seen_at_int)) { |
May Lippert | 60aa3ca | 2018-08-15 16:55:29 -0700 | [diff] [blame] | 1846 | TimeDelta update_delay = |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1847 | SystemState::Get()->clock()->GetWallclockTime() - |
May Lippert | 60aa3ca | 2018-08-15 16:55:29 -0700 | [diff] [blame] | 1848 | Time::FromInternalValue(update_first_seen_at_int); |
Amin Hassani | 538bd59 | 2020-11-04 20:46:08 -0800 | [diff] [blame] | 1849 | SystemState::Get() |
| 1850 | ->metrics_reporter() |
May Lippert | 60aa3ca | 2018-08-15 16:55:29 -0700 | [diff] [blame] | 1851 | ->ReportEnterpriseUpdateSeenToDownloadDays(has_time_restrictions, |
| 1852 | update_delay.InDays()); |
| 1853 | } |
| 1854 | } |
| 1855 | } |
| 1856 | } |
| 1857 | |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 1858 | } // namespace chromeos_update_engine |