blob: 6010484a09da3c8bcf165804b9669c09033b934f [file] [log] [blame]
Alex Deymoaea4c1c2015-08-19 20:24:43 -07001//
2// Copyright (C) 2012 The Android Open Source Project
3//
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at
7//
8// http://www.apache.org/licenses/LICENSE-2.0
9//
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15//
Andrew de los Reyes4e9b9f42010-04-26 15:06:43 -070016
Amin Hassaniec7bc112020-10-29 16:47:58 -070017#ifndef UPDATE_ENGINE_CROS_UPDATE_ATTEMPTER_H_
18#define UPDATE_ENGINE_CROS_UPDATE_ATTEMPTER_H_
Andrew de los Reyes4e9b9f42010-04-26 15:06:43 -070019
Andrew de los Reyes63b96d72010-05-10 13:08:54 -070020#include <time.h>
Darin Petkovc6c135c2010-08-11 13:36:18 -070021
Alex Deymobc91a272014-05-20 16:45:33 -070022#include <memory>
Alex Deymofa78f142016-01-26 21:36:16 -080023#include <set>
Andrew de los Reyes4e9b9f42010-04-26 15:06:43 -070024#include <string>
Alex Vakulenkod2779df2014-06-16 13:19:00 -070025#include <utility>
Alex Vakulenko44cab302014-07-23 13:12:15 -070026#include <vector>
Darin Petkovc6c135c2010-08-11 13:36:18 -070027
Gilad Arnold44dc3bf2014-07-18 23:39:38 -070028#include <base/bind.h>
Jae Hoon Kimedb65502019-06-14 11:52:17 -070029#include <base/guid.h>
Alex Vakulenko75039d72014-03-25 12:36:28 -070030#include <base/time/time.h>
Darin Petkovf42cc1c2010-09-01 09:03:02 -070031#include <gtest/gtest_prod.h> // for FRIEND_TEST
Darin Petkovc6c135c2010-08-11 13:36:18 -070032
Alex Deymo14c0da82016-07-20 16:45:45 -070033#include "update_engine/certificate_checker.h"
Alex Deymo906191f2015-10-12 12:22:44 -070034#include "update_engine/client_library/include/update_engine/update_status.h"
Alex Deymo39910dc2015-11-09 17:04:30 -080035#include "update_engine/common/action_processor.h"
Alex Deymoab0d9762016-02-02 10:52:56 -080036#include "update_engine/common/cpu_limiter.h"
Amin Hassanic288bf62020-11-04 19:33:43 -080037#include "update_engine/common/daemon_state_interface.h"
Amin Hassaniec7bc112020-10-29 16:47:58 -070038#include "update_engine/common/download_action.h"
Jae Hoon Kim5e8e30b2020-05-06 14:59:06 -070039#include "update_engine/common/excluder_interface.h"
Sen Jiangd8be4b52018-09-18 16:06:57 -070040#include "update_engine/common/proxy_resolver.h"
Amin Hassaniec7bc112020-10-29 16:47:58 -070041#include "update_engine/common/service_observer_interface.h"
42#include "update_engine/common/system_state.h"
Amin Hassaniec7bc112020-10-29 16:47:58 -070043#include "update_engine/cros/chrome_browser_proxy_resolver.h"
Amin Hassaniec7bc112020-10-29 16:47:58 -070044#include "update_engine/cros/omaha_request_builder_xml.h"
45#include "update_engine/cros/omaha_request_params.h"
46#include "update_engine/cros/omaha_response_handler_action.h"
Alex Deymo0d298542016-03-30 18:31:49 -070047#include "update_engine/payload_consumer/postinstall_runner_action.h"
Gilad Arnoldec7f9162014-07-15 13:24:46 -070048#include "update_engine/update_manager/policy.h"
Adolfo Victoria497044c2018-07-18 07:51:42 -070049#include "update_engine/update_manager/staging_utils.h"
Gilad Arnoldec7f9162014-07-15 13:24:46 -070050#include "update_engine/update_manager/update_manager.h"
Andrew de los Reyes4e9b9f42010-04-26 15:06:43 -070051
Patrick Dubroy7fbbe8a2011-08-01 17:28:22 +020052namespace policy {
Alex Vakulenko157fe302014-08-11 15:59:58 -070053class PolicyProvider;
Patrick Dubroy7fbbe8a2011-08-01 17:28:22 +020054}
55
Andrew de los Reyes4e9b9f42010-04-26 15:06:43 -070056namespace chromeos_update_engine {
57
Andrew de los Reyes63b96d72010-05-10 13:08:54 -070058class UpdateAttempter : public ActionProcessorDelegate,
Alex Deymoc1c17b42015-11-23 03:53:15 -030059 public DownloadActionDelegate,
Alex Deymof7ead812015-10-23 17:37:27 -070060 public CertificateChecker::Observer,
Amin Hassanic288bf62020-11-04 19:33:43 -080061 public PostinstallRunnerAction::DelegateInterface,
62 public DaemonStateInterface {
Andrew de los Reyes4e9b9f42010-04-26 15:06:43 -070063 public:
Christopher Wileycc8ce0e2015-10-01 16:48:47 -070064 using UpdateStatus = update_engine::UpdateStatus;
Aaron Woodbf5a2522017-10-04 10:58:36 -070065 using UpdateAttemptFlags = update_engine::UpdateAttemptFlags;
Darin Petkov36275772010-10-01 11:40:57 -070066 static const int kMaxDeltaUpdateFailures;
67
Amin Hassani538bd592020-11-04 20:46:08 -080068 explicit UpdateAttempter(CertificateChecker* cert_checker);
Alex Deymo610277e2014-11-11 21:18:11 -080069 ~UpdateAttempter() override;
Darin Petkovc6c135c2010-08-11 13:36:18 -070070
Gilad Arnold1f847232014-04-07 12:07:49 -070071 // Further initialization to be done post construction.
72 void Init();
73
Gilad Arnoldec7f9162014-07-15 13:24:46 -070074 // Initiates scheduling of update checks.
Xiaochu Liu88d90382018-08-29 16:09:11 -070075 // Returns true if update check is scheduled.
76 virtual bool ScheduleUpdates();
Gilad Arnoldec7f9162014-07-15 13:24:46 -070077
Gilad Arnold1ebd8132012-03-05 10:19:29 -080078 // Checks for update and, if a newer version is available, attempts to update
Amin Hassanie8153632020-10-27 15:11:28 -070079 // the system.
80 virtual void Update(const chromeos_update_manager::UpdateCheckParams& params);
Darin Petkova4a8a8c2010-07-15 22:21:12 -070081
Andrew de los Reyes63b96d72010-05-10 13:08:54 -070082 // ActionProcessorDelegate methods:
Alex Deymo610277e2014-11-11 21:18:11 -080083 void ProcessingDone(const ActionProcessor* processor,
84 ErrorCode code) override;
85 void ProcessingStopped(const ActionProcessor* processor) override;
Andrew de los Reyes63b96d72010-05-10 13:08:54 -070086 void ActionCompleted(ActionProcessor* processor,
87 AbstractAction* action,
Alex Deymo610277e2014-11-11 21:18:11 -080088 ErrorCode code) override;
Darin Petkova4a8a8c2010-07-15 22:21:12 -070089
Alex Deymo0d298542016-03-30 18:31:49 -070090 // PostinstallRunnerAction::DelegateInterface
91 void ProgressUpdate(double progress) override;
92
Jay Srinivasanc1ba09a2012-08-14 14:15:57 -070093 // Resets the current state to UPDATE_STATUS_IDLE.
94 // Used by update_engine_client for restarting a new update without
95 // having to reboot once the previous update has reached
96 // UPDATE_STATUS_UPDATED_NEED_REBOOT state. This is used only
97 // for testing purposes.
Alex Deymo560ae1d2014-10-28 02:17:54 -070098 virtual bool ResetStatus();
Jay Srinivasanc1ba09a2012-08-14 14:15:57 -070099
Aaron Wood7f92e2b2017-08-28 14:51:21 -0700100 // Returns the current status in the out param. Returns true on success.
101 virtual bool GetStatus(update_engine::UpdateEngineStatus* out_status);
Andrew de los Reyes4e9b9f42010-04-26 15:06:43 -0700102
Darin Petkov1023a602010-08-30 13:47:51 -0700103 UpdateStatus status() const { return status_; }
104
105 int http_response_code() const { return http_response_code_; }
106 void set_http_response_code(int code) { http_response_code_ = code; }
107
Aaron Woodbf5a2522017-10-04 10:58:36 -0700108 // Set flags that influence how updates and checks are performed. These
109 // influence all future checks and updates until changed or the device
110 // reboots.
111 void SetUpdateAttemptFlags(UpdateAttemptFlags flags) {
112 update_attempt_flags_ = flags;
113 }
114
115 // Returns the update attempt flags that are in place for the current update
116 // attempt. These are cached at the start of an update attempt so that they
117 // remain constant throughout the process.
Sen Jiangdaeaa432018-10-09 18:18:45 -0700118 virtual UpdateAttemptFlags GetCurrentUpdateAttemptFlags() const {
Aaron Woodbf5a2522017-10-04 10:58:36 -0700119 return current_update_attempt_flags_;
120 }
121
Jay Srinivasane73acab2012-07-10 14:34:03 -0700122 // This is the internal entry point for going through an
Darin Petkov5a7f5652010-07-22 21:40:09 -0700123 // update. If the current status is idle invokes Update.
Jay Srinivasane73acab2012-07-10 14:34:03 -0700124 // This is called by the DBus implementation.
Aaron Wood081c0232017-10-19 17:14:58 -0700125 // This returns true if an update check was started, false if a check or an
126 // update was already in progress.
127 virtual bool CheckForUpdate(const std::string& app_version,
Alex Deymo560ae1d2014-10-28 02:17:54 -0700128 const std::string& omaha_url,
Aaron Wood081c0232017-10-19 17:14:58 -0700129 UpdateAttemptFlags flags);
Andrew de los Reyes63b96d72010-05-10 13:08:54 -0700130
Xiaochu Liu88d90382018-08-29 16:09:11 -0700131 // This is the version of CheckForUpdate called by AttemptInstall API.
Amin Hassani2b68e6b2020-04-17 10:49:12 -0700132 virtual bool CheckForInstall(const std::vector<std::string>& dlc_ids,
Xiaochu Liu88d90382018-08-29 16:09:11 -0700133 const std::string& omaha_url);
134
Chris Sosad317e402013-06-12 13:47:09 -0700135 // This is the internal entry point for going through a rollback. This will
136 // attempt to run the postinstall on the non-active partition and set it as
137 // the partition to boot from. If |powerwash| is True, perform a powerwash
Chris Sosa44b9b7e2014-04-02 13:53:46 -0700138 // as part of rollback. Returns True on success.
139 bool Rollback(bool powerwash);
Chris Sosad317e402013-06-12 13:47:09 -0700140
Chris Sosa44b9b7e2014-04-02 13:53:46 -0700141 // This is the internal entry point for checking if we can rollback.
Alex Vakulenko59e253e2014-02-24 10:40:21 -0800142 bool CanRollback() const;
143
Alex Vakulenko2bddadd2014-03-27 13:23:46 -0700144 // This is the internal entry point for getting a rollback partition name,
145 // if one exists. It returns the bootable rollback kernel device partition
146 // name or empty string if none is available.
Alex Deymo763e7db2015-08-27 21:08:08 -0700147 BootControlInterface::Slot GetRollbackSlot() const;
Alex Vakulenko2bddadd2014-03-27 13:23:46 -0700148
Darin Petkov296889c2010-07-23 16:20:54 -0700149 // Initiates a reboot if the current state is
Sen Jiang771f6482018-04-04 17:59:10 -0700150 // UPDATED_NEED_REBOOT. Returns true on success, false otherwise.
Darin Petkov296889c2010-07-23 16:20:54 -0700151 bool RebootIfNeeded();
152
Amin Hassaniec7bc112020-10-29 16:47:58 -0700153 // Sets the DLC as active or inactive. See chromeos/common_service.h
Andrewa8d7df32020-03-15 20:10:01 -0700154 virtual bool SetDlcActiveValue(bool is_active, const std::string& dlc_id);
155
Alex Deymo542c19b2015-12-03 07:43:31 -0300156 // DownloadActionDelegate methods:
157 void BytesReceived(uint64_t bytes_progressed,
158 uint64_t bytes_received,
159 uint64_t total) override;
160
161 // Returns that the update should be canceled when the download channel was
162 // changed.
163 bool ShouldCancel(ErrorCode* cancel_reason) override;
164
165 void DownloadComplete() override;
Andrew de los Reyes63b96d72010-05-10 13:08:54 -0700166
Alex Deymofa78f142016-01-26 21:36:16 -0800167 // Broadcasts the current status to all observers.
Darin Petkov61635a92011-05-18 16:20:36 -0700168 void BroadcastStatus();
169
Sen Jiang3978ddd2018-03-22 18:05:44 -0700170 ErrorCode GetAttemptErrorCode() const { return attempt_error_code_; }
171
David Zeuthene4c58bf2013-06-18 17:26:50 -0700172 // Called at update_engine startup to do various house-keeping.
173 void UpdateEngineStarted();
174
Jae Hoon Kim5e8e30b2020-05-06 14:59:06 -0700175 // Returns the |Excluder| that is currently held onto.
176 virtual ExcluderInterface* GetExcluder() const { return excluder_.get(); }
177
Alex Vakulenko1bab5a82015-10-27 11:47:28 -0700178 // Reloads the device policy from libbrillo. Note: This method doesn't
Alex Deymof4867c42013-06-28 14:41:39 -0700179 // cause a real-time policy fetch from the policy server. It just reloads the
Alex Vakulenko1bab5a82015-10-27 11:47:28 -0700180 // latest value that libbrillo has cached. libbrillo fetches the policies
Alex Deymof4867c42013-06-28 14:41:39 -0700181 // from the server asynchronously at its own frequency.
Alex Deymo560ae1d2014-10-28 02:17:54 -0700182 virtual void RefreshDevicePolicy();
Alex Deymof4867c42013-06-28 14:41:39 -0700183
Alex Deymo906191f2015-10-12 12:22:44 -0700184 // Stores in |out_boot_time| the boottime (CLOCK_BOOTTIME) recorded at the
185 // time of the last successful update in the current boot. Returns false if
186 // there wasn't a successful update in the current boot.
Amin Hassani7cc8bb02019-01-14 16:29:47 -0800187 virtual bool GetBootTimeAtUpdate(base::Time* out_boot_time);
David Zeuthen3c55abd2013-10-14 12:48:03 -0700188
Alex Vakulenkodea2eac2014-03-14 15:56:59 -0700189 // Returns a version OS version that was being used before the last reboot,
Sen Jiang771f6482018-04-04 17:59:10 -0700190 // and if that reboot happened to be into an update (current version).
Alex Vakulenkodea2eac2014-03-14 15:56:59 -0700191 // This will return an empty string otherwise.
Sen Jiangdaeaa432018-10-09 18:18:45 -0700192 const std::string& GetPrevVersion() const { return prev_version_; }
Alex Vakulenkodea2eac2014-03-14 15:56:59 -0700193
Gilad Arnolda0258a52014-07-10 16:21:19 -0700194 // Returns the number of consecutive failed update checks.
Gilad Arnolda6dab942014-04-25 11:46:03 -0700195 virtual unsigned int consecutive_failed_update_checks() const {
196 return consecutive_failed_update_checks_;
197 }
198
Gilad Arnolda0258a52014-07-10 16:21:19 -0700199 // Returns the poll interval dictated by Omaha, if provided; zero otherwise.
200 virtual unsigned int server_dictated_poll_interval() const {
201 return server_dictated_poll_interval_;
202 }
203
Gilad Arnoldec7f9162014-07-15 13:24:46 -0700204 // Sets a callback to be used when either a forced update request is received
205 // (first argument set to true) or cleared by an update attempt (first
206 // argument set to false). The callback further encodes whether the forced
207 // check is an interactive one (second argument set to true). Takes ownership
208 // of the callback object. A null value disables callback on these events.
209 // Note that only one callback can be set, so effectively at most one client
210 // can be notified.
211 virtual void set_forced_update_pending_callback(
Sen Jiangdaeaa432018-10-09 18:18:45 -0700212 base::Callback<void(bool, bool)>* callback) {
Gilad Arnoldec7f9162014-07-15 13:24:46 -0700213 forced_update_pending_callback_.reset(callback);
Gilad Arnold44dc3bf2014-07-18 23:39:38 -0700214 }
215
David Pursell02c18642014-11-06 11:26:11 -0800216 // Returns true if we should allow updates from any source. In official builds
217 // we want to restrict updates to known safe sources, but under certain
218 // conditions it's useful to allow updating from anywhere (e.g. to allow
219 // 'cros flash' to function properly).
Sen Jiangdaeaa432018-10-09 18:18:45 -0700220 bool IsAnyUpdateSourceAllowed() const;
David Pursell02c18642014-11-06 11:26:11 -0800221
Amin Hassanic288bf62020-11-04 19:33:43 -0800222 // |DaemonStateInterface| overrides.
223 bool StartUpdater() override;
224 void AddObserver(ServiceObserverInterface* observer) override {
Alex Deymofa78f142016-01-26 21:36:16 -0800225 service_observers_.insert(observer);
226 }
Amin Hassanic288bf62020-11-04 19:33:43 -0800227 void RemoveObserver(ServiceObserverInterface* observer) override {
Alex Deymofa78f142016-01-26 21:36:16 -0800228 service_observers_.erase(observer);
229 }
Amin Hassanic288bf62020-11-04 19:33:43 -0800230 const std::set<ServiceObserverInterface*>& service_observers() override {
Alex Deymo03a4de72016-07-20 16:08:23 -0700231 return service_observers_;
232 }
233
Alex Deymofa78f142016-01-26 21:36:16 -0800234 // Remove all the observers.
235 void ClearObservers() { service_observers_.clear(); }
236
Andrew de los Reyes4e9b9f42010-04-26 15:06:43 -0700237 private:
Alex Deymo906191f2015-10-12 12:22:44 -0700238 // Friend declarations for testing purposes.
Gilad Arnold70e476e2013-07-30 16:01:13 -0700239 friend class UpdateAttempterUnderTest;
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700240 friend class UpdateAttempterTest;
Darin Petkov1b003102010-11-30 10:18:36 -0800241 FRIEND_TEST(UpdateAttempterTest, ActionCompletedDownloadTest);
242 FRIEND_TEST(UpdateAttempterTest, ActionCompletedErrorTest);
243 FRIEND_TEST(UpdateAttempterTest, ActionCompletedOmahaRequestTest);
Aaron Wood9321f502017-09-07 11:18:54 -0700244 FRIEND_TEST(UpdateAttempterTest, BootTimeInUpdateMarkerFile);
245 FRIEND_TEST(UpdateAttempterTest, BroadcastCompleteDownloadTest);
Andrewe045aef2020-01-08 16:29:22 -0800246 FRIEND_TEST(UpdateAttempterTest, CalculateDlcParamsInstallTest);
247 FRIEND_TEST(UpdateAttempterTest, CalculateDlcParamsNoPrefFilesTest);
248 FRIEND_TEST(UpdateAttempterTest, CalculateDlcParamsNonParseableValuesTest);
249 FRIEND_TEST(UpdateAttempterTest, CalculateDlcParamsValidValuesTest);
Andrewa8d7df32020-03-15 20:10:01 -0700250 FRIEND_TEST(UpdateAttempterTest, CalculateDlcParamsRemoveStaleMetadata);
Aaron Wood9321f502017-09-07 11:18:54 -0700251 FRIEND_TEST(UpdateAttempterTest, ChangeToDownloadingOnReceivedBytesTest);
Jae Hoon Kimc437ea52019-07-11 11:20:38 -0700252 FRIEND_TEST(UpdateAttempterTest, CheckForInstallNotIdleFails);
Xiaochu Liu8ba486f2018-11-06 11:14:10 -0800253 FRIEND_TEST(UpdateAttempterTest, CheckForUpdateAUDlcTest);
Darin Petkov18c7bce2011-06-16 14:07:00 -0700254 FRIEND_TEST(UpdateAttempterTest, CreatePendingErrorEventTest);
255 FRIEND_TEST(UpdateAttempterTest, CreatePendingErrorEventResumedTest);
Darin Petkov36275772010-10-01 11:40:57 -0700256 FRIEND_TEST(UpdateAttempterTest, DisableDeltaUpdateIfNeededTest);
Aaron Wood9321f502017-09-07 11:18:54 -0700257 FRIEND_TEST(UpdateAttempterTest, DownloadProgressAccumulationTest);
Colin Howesac170d92018-11-20 16:29:28 -0800258 FRIEND_TEST(UpdateAttempterTest, InstallSetsStatusIdle);
Amin Hassani9be122e2019-08-29 09:20:12 -0700259 FRIEND_TEST(UpdateAttempterTest, IsEnterpriseRollbackInGetStatusTrue);
260 FRIEND_TEST(UpdateAttempterTest, IsEnterpriseRollbackInGetStatusFalse);
Miriam Polzer0cf1acb2020-04-29 17:39:51 +0200261 FRIEND_TEST(UpdateAttempterTest,
262 PowerwashInGetStatusTrueBecausePowerwashRequired);
263 FRIEND_TEST(UpdateAttempterTest, PowerwashInGetStatusTrueBecauseRollback);
Darin Petkov36275772010-10-01 11:40:57 -0700264 FRIEND_TEST(UpdateAttempterTest, MarkDeltaUpdateFailureTest);
Darin Petkov18c7bce2011-06-16 14:07:00 -0700265 FRIEND_TEST(UpdateAttempterTest, PingOmahaTest);
Jae Hoon Kimed3fcc02019-07-11 14:35:38 -0700266 FRIEND_TEST(UpdateAttempterTest, ProcessingDoneInstallError);
267 FRIEND_TEST(UpdateAttempterTest, ProcessingDoneUpdateError);
Aaron Wood9321f502017-09-07 11:18:54 -0700268 FRIEND_TEST(UpdateAttempterTest, ReportDailyMetrics);
Marton Hunyadyba51c3f2018-04-25 15:18:10 +0200269 FRIEND_TEST(UpdateAttempterTest, RollbackNotAllowed);
Colin Howes978c1082018-12-03 11:46:12 -0800270 FRIEND_TEST(UpdateAttempterTest, RollbackAfterInstall);
Marton Hunyadyba51c3f2018-04-25 15:18:10 +0200271 FRIEND_TEST(UpdateAttempterTest, RollbackAllowed);
272 FRIEND_TEST(UpdateAttempterTest, RollbackAllowedSetAndReset);
Miriam Polzeraff72002020-08-27 08:20:39 +0200273 FRIEND_TEST(UpdateAttempterTest, ChannelDowngradeNoRollback);
274 FRIEND_TEST(UpdateAttempterTest, ChannelDowngradeRollback);
Marton Hunyadya0302682018-05-16 18:52:13 +0200275 FRIEND_TEST(UpdateAttempterTest, RollbackMetricsNotRollbackFailure);
276 FRIEND_TEST(UpdateAttempterTest, RollbackMetricsNotRollbackSuccess);
277 FRIEND_TEST(UpdateAttempterTest, RollbackMetricsRollbackFailure);
278 FRIEND_TEST(UpdateAttempterTest, RollbackMetricsRollbackSuccess);
Darin Petkov1b003102010-11-30 10:18:36 -0800279 FRIEND_TEST(UpdateAttempterTest, ScheduleErrorEventActionNoEventTest);
280 FRIEND_TEST(UpdateAttempterTest, ScheduleErrorEventActionTest);
Jae Hoon Kimedb65502019-06-14 11:52:17 -0700281 FRIEND_TEST(UpdateAttempterTest, SessionIdTestEnforceEmptyStrPingOmaha);
282 FRIEND_TEST(UpdateAttempterTest, SessionIdTestOnOmahaRequestActions);
Marton Hunyady199152d2018-05-07 19:08:48 +0200283 FRIEND_TEST(UpdateAttempterTest, SetRollbackHappenedNotRollback);
284 FRIEND_TEST(UpdateAttempterTest, SetRollbackHappenedRollback);
Amin Hassani37b67232020-08-13 09:29:48 -0700285 FRIEND_TEST(UpdateAttempterTest, TargetChannelHintSetAndReset);
Xiyuan Xiac0e8f9a2017-02-22 13:19:35 -0800286 FRIEND_TEST(UpdateAttempterTest, TargetVersionPrefixSetAndReset);
Colin Howes978c1082018-12-03 11:46:12 -0800287 FRIEND_TEST(UpdateAttempterTest, UpdateAfterInstall);
Aaron Woodbf5a2522017-10-04 10:58:36 -0700288 FRIEND_TEST(UpdateAttempterTest, UpdateAttemptFlagsCachedAtUpdateStart);
Aaron Wood23bd3392017-10-06 14:48:25 -0700289 FRIEND_TEST(UpdateAttempterTest, UpdateDeferredByPolicyTest);
290 FRIEND_TEST(UpdateAttempterTest, UpdateIsNotRunningWhenUpdateAvailable);
Jae Hoon Kim7fdfbf12020-04-10 18:15:50 -0700291 FRIEND_TEST(UpdateAttempterTest, GetSuccessfulDlcIds);
Saurabh Nijhara43d7adc2020-11-06 16:13:02 +0100292 FRIEND_TEST(UpdateAttempterTest, QuickFixTokenWhenDeviceIsEnterpriseEnrolled);
Vyshu6e8a37b2020-11-25 10:31:00 -0800293 FRIEND_TEST(UpdateAttempterTest, MoveToPrefs);
Sen Jiangdaeaa432018-10-09 18:18:45 -0700294
295 // Returns the special flags to be added to ErrorCode values based on the
296 // parameters used in the current update attempt.
297 uint32_t GetErrorCodeFlags();
Darin Petkovf42cc1c2010-09-01 09:03:02 -0700298
Jae Hoon Kimed3fcc02019-07-11 14:35:38 -0700299 // ActionProcessorDelegate methods |ProcessingDone()| internal helpers.
300 void ProcessingDoneInternal(const ActionProcessor* processor, ErrorCode code);
301 void ProcessingDoneUpdate(const ActionProcessor* processor, ErrorCode code);
302 void ProcessingDoneInstall(const ActionProcessor* processor, ErrorCode code);
303
Alex Deymoc1c17b42015-11-23 03:53:15 -0300304 // CertificateChecker::Observer method.
305 // Report metrics about the certificate being checked.
306 void CertificateChecked(ServerToCheck server_to_check,
307 CertificateCheckResult result) override;
308
David Zeuthen985b1122013-10-09 12:13:15 -0700309 // Checks if it's more than 24 hours since daily metrics were last
310 // reported and, if so, reports daily metrics. Returns |true| if
311 // metrics were reported, |false| otherwise.
312 bool CheckAndReportDailyMetrics();
313
314 // Calculates and reports the age of the currently running OS. This
315 // is defined as the age of the /etc/lsb-release file.
316 void ReportOSAge();
317
Gilad Arnold1ebd8132012-03-05 10:19:29 -0800318 // Sets the status to the given status and notifies a status update over dbus.
Nam T. Nguyen7d623eb2014-05-13 16:06:28 -0700319 void SetStatusAndNotify(UpdateStatus status);
Darin Petkova4a8a8c2010-07-15 22:21:12 -0700320
Darin Petkov9b230572010-10-08 10:20:09 -0700321 // Creates an error event object in |error_event_| to be included in an
322 // OmahaRequestAction once the current action processor is done.
David Zeuthena99981f2013-04-29 13:42:47 -0700323 void CreatePendingErrorEvent(AbstractAction* action, ErrorCode code);
Darin Petkov09f96c32010-07-20 09:24:57 -0700324
Darin Petkov9b230572010-10-08 10:20:09 -0700325 // If there's a pending error event allocated in |error_event_|, schedules an
326 // OmahaRequestAction with that event in the current processor, clears the
327 // pending event, updates the status and returns true. Returns false
328 // otherwise.
Darin Petkov09f96c32010-07-20 09:24:57 -0700329 bool ScheduleErrorEventAction();
330
Darin Petkov58dd1342011-05-06 12:05:13 -0700331 // Schedules an event loop callback to start the action processor. This is
332 // scheduled asynchronously to unblock the event loop.
333 void ScheduleProcessingStart();
334
Darin Petkov36275772010-10-01 11:40:57 -0700335 // Checks if a full update is needed and forces it by updating the Omaha
336 // request params.
337 void DisableDeltaUpdateIfNeeded();
338
339 // If this was a delta update attempt that failed, count it so that a full
340 // update can be tried when needed.
341 void MarkDeltaUpdateFailure();
Darin Petkov1b003102010-11-30 10:18:36 -0800342
Andrew de los Reyes45168102010-11-22 11:13:50 -0800343 ProxyResolver* GetProxyResolver() {
Sen Jiangdaeaa432018-10-09 18:18:45 -0700344 if (obeying_proxies_)
345 return &chrome_proxy_resolver_;
Sen Jiangdaeaa432018-10-09 18:18:45 -0700346 return &direct_proxy_resolver_;
Andrew de los Reyes45168102010-11-22 11:13:50 -0800347 }
Darin Petkov36275772010-10-01 11:40:57 -0700348
Thieu Le116fda32011-04-19 11:01:54 -0700349 // Sends a ping to Omaha.
350 // This is used after an update has been applied and we're waiting for the
351 // user to reboot. This ping helps keep the number of actives count
352 // accurate in case a user takes a long time to reboot the device after an
353 // update has been applied.
354 void PingOmaha();
355
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700356 // Helper method of Update() to calculate the update-related parameters
357 // from various sources and set the appropriate state. Please refer to
Sen Jiang771f6482018-04-04 17:59:10 -0700358 // Update() method for the meaning of the parameters.
Amin Hassanie8153632020-10-27 15:11:28 -0700359 bool CalculateUpdateParams(
360 const chromeos_update_manager::UpdateCheckParams& params);
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700361
Jay Srinivasan21be0752012-07-25 15:44:56 -0700362 // Calculates all the scattering related parameters (such as waiting period,
363 // which type of scattering is enabled, etc.) and also updates/deletes
364 // the corresponding prefs file used in scattering. Should be called
Amin Hassani538bd592020-11-04 20:46:08 -0800365 // only after the device policy has been loaded and set in the system state.
Amin Hassanied37d682018-04-06 13:22:00 -0700366 void CalculateScatteringParams(bool interactive);
Jay Srinivasan21be0752012-07-25 15:44:56 -0700367
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700368 // Sets a random value for the waiting period to wait for before downloading
369 // an update, if one available. This value will be upperbounded by the
370 // scatter factor value specified from policy.
Jay Srinivasan21be0752012-07-25 15:44:56 -0700371 void GenerateNewWaitingPeriod();
372
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700373 // Helper method of Update() to construct the sequence of actions to
374 // be performed for an update check. Please refer to
Chris Sosad317e402013-06-12 13:47:09 -0700375 // Update() method for the meaning of the parameters.
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700376 void BuildUpdateActions(bool interactive);
377
378 // Decrements the count in the kUpdateCheckCountFilePath.
379 // Returns True if successfully decremented, false otherwise.
380 bool DecrementUpdateCheckCount();
381
David Zeuthen8f191b22013-08-06 12:27:50 -0700382 // Starts p2p and performs housekeeping. Returns true only if p2p is
383 // running and housekeeping was done.
384 bool StartP2PAndPerformHousekeeping();
385
386 // Calculates whether peer-to-peer should be used. Sets the
387 // |use_p2p_to_download_| and |use_p2p_to_share_| parameters
388 // on the |omaha_request_params_| object.
389 void CalculateP2PParams(bool interactive);
390
Vyshu6e8a37b2020-11-25 10:31:00 -0800391 // For each key, reads value from powerwash safe prefs and adds it to prefs
392 // if key doesnt already exist. Then deletes the powerwash safe keys.
393 void MoveToPrefs(const std::vector<std::string>& keys);
394
David Zeuthen8f191b22013-08-06 12:27:50 -0700395 // Starts P2P if it's enabled and there are files to actually share.
396 // Called only at program startup. Returns true only if p2p was
397 // started and housekeeping was performed.
398 bool StartP2PAtStartup();
399
David Zeuthen3c55abd2013-10-14 12:48:03 -0700400 // Writes to the processing completed marker. Does nothing if
401 // |update_completed_marker_| is empty.
402 void WriteUpdateCompletedMarker();
403
Daniel Erat65f1da02014-06-27 22:05:38 -0700404 // Reboots the system directly by calling /sbin/shutdown. Returns true on
405 // success.
406 bool RebootDirectly();
407
Gilad Arnoldec7f9162014-07-15 13:24:46 -0700408 // Callback for the async UpdateCheckAllowed policy request. If |status| is
409 // |EvalStatus::kSucceeded|, either runs or suppresses periodic update checks,
410 // based on the content of |params|. Otherwise, retries the policy request.
411 void OnUpdateScheduled(
412 chromeos_update_manager::EvalStatus status,
413 const chromeos_update_manager::UpdateCheckParams& params);
414
415 // Updates the time an update was last attempted to the current time.
416 void UpdateLastCheckedTime();
417
Marton Hunyadye58bddb2018-04-10 20:27:26 +0200418 // Checks whether we need to clear the rollback-happened preference after
419 // policy is available again.
420 void UpdateRollbackHappened();
421
Jae Hoon Kimba2fdce2019-07-11 13:18:58 -0700422 // Returns if an update is: running, applied and needs reboot, or scheduled.
423 bool IsBusyOrUpdateScheduled();
Gilad Arnold54fa66d2014-09-29 13:14:29 -0700424
Adolfo Victoria497044c2018-07-18 07:51:42 -0700425 void CalculateStagingParams(bool interactive);
426
May Lippert60aa3ca2018-08-15 16:55:29 -0700427 // Reports a metric that tracks the time from when the update was first seen
428 // to the time when the update was finally downloaded and applied. This metric
429 // will only be reported for enterprise enrolled devices.
430 void ReportTimeToUpdateAppliedMetric();
431
Amin Hassaniecb60d32019-06-17 18:09:10 -0700432 // Resets interactivity and forced update flags.
433 void ResetInteractivityFlags();
434
Andrew065d78d2020-04-07 15:43:07 -0700435 // Resets all the DLC prefs.
436 bool ResetDlcPrefs(const std::string& dlc_id);
437
Vyshu Khota4c5413d2020-11-04 16:17:25 -0800438 // Sets given pref key for DLC and platform.
439 void SetPref(const std::string& pref_key,
440 const std::string& pref_value,
441 const std::string& payload_id);
442
Andrew065d78d2020-04-07 15:43:07 -0700443 // Get the integer values from the DLC metadata for |kPrefsPingLastActive|
444 // or |kPrefsPingLastRollcall|.
Andrewe045aef2020-01-08 16:29:22 -0800445 // The value is equal to -2 when the value cannot be read or is not numeric.
446 // The value is equal to -1 the first time it is being sent, which is
447 // when the metadata file doesn't exist.
Andrew065d78d2020-04-07 15:43:07 -0700448 int64_t GetPingMetadata(const std::string& metadata_key) const;
Andrewe045aef2020-01-08 16:29:22 -0800449
Amin Hassani2b68e6b2020-04-17 10:49:12 -0700450 // Calculates the update parameters for DLCs. Sets the |dlc_ids_|
Andrewe045aef2020-01-08 16:29:22 -0800451 // parameter on the |omaha_request_params_| object.
452 void CalculateDlcParams();
453
Jae Hoon Kim7fdfbf12020-04-10 18:15:50 -0700454 // Returns the list of DLC IDs that were installed/updated, excluding the ones
455 // which had "noupdate" in the Omaha response.
456 std::vector<std::string> GetSuccessfulDlcIds();
457
Darin Petkov9b230572010-10-08 10:20:09 -0700458 // Last status notification timestamp used for throttling. Use monotonic
459 // TimeTicks to ensure that notifications are sent even if the system clock is
460 // set back in the middle of an update.
Darin Petkovaf183052010-08-23 12:07:13 -0700461 base::TimeTicks last_notify_time_;
Andrew de los Reyes63b96d72010-05-10 13:08:54 -0700462
Amin Hassani04d41622018-12-20 15:35:41 -0800463 // Our two proxy resolvers
464 DirectProxyResolver direct_proxy_resolver_;
Amin Hassani04d41622018-12-20 15:35:41 -0800465 ChromeBrowserProxyResolver chrome_proxy_resolver_;
Amin Hassani04d41622018-12-20 15:35:41 -0800466
Ben Chan02f7c1d2014-10-18 15:18:02 -0700467 std::unique_ptr<ActionProcessor> processor_;
Darin Petkova4a8a8c2010-07-15 22:21:12 -0700468
Amin Hassani1e19be32020-11-16 14:12:33 -0800469 ActionProcessor aux_processor_;
470
Alex Deymo33e91e72015-12-01 18:26:08 -0300471 // Pointer to the certificate checker instance to use.
472 CertificateChecker* cert_checker_;
473
Alex Deymofa78f142016-01-26 21:36:16 -0800474 // The list of services observing changes in the updater.
475 std::set<ServiceObserverInterface*> service_observers_;
Casey Dahlin40892492016-01-25 16:55:28 -0800476
Amin Hassanid3f4bea2018-04-30 14:52:40 -0700477 // The install plan.
478 std::unique_ptr<InstallPlan> install_plan_;
Darin Petkov9b230572010-10-08 10:20:09 -0700479
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800480 // Pointer to the preferences store interface. This is just a cached
Amin Hassani538bd592020-11-04 20:46:08 -0800481 // copy of SystemState::Get()->prefs() because it's used in many methods and
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800482 // is convenient this way.
Gilad Arnold1f847232014-04-07 12:07:49 -0700483 PrefsInterface* prefs_ = nullptr;
Darin Petkov1cbd78f2010-07-29 12:38:34 -0700484
Darin Petkov09f96c32010-07-20 09:24:57 -0700485 // Pending error event, if any.
Ben Chan02f7c1d2014-10-18 15:18:02 -0700486 std::unique_ptr<OmahaEvent> error_event_;
Darin Petkov09f96c32010-07-20 09:24:57 -0700487
Andrew de los Reyesc1d5c932011-04-20 17:15:47 -0700488 // If we should request a reboot even tho we failed the update
Gilad Arnold1f847232014-04-07 12:07:49 -0700489 bool fake_update_success_ = false;
Andrew de los Reyesc1d5c932011-04-20 17:15:47 -0700490
Darin Petkov85ced132010-09-01 10:20:56 -0700491 // HTTP server response code from the last HTTP request action.
Gilad Arnold1f847232014-04-07 12:07:49 -0700492 int http_response_code_ = 0;
Darin Petkov1023a602010-08-30 13:47:51 -0700493
Sen Jiang3978ddd2018-03-22 18:05:44 -0700494 // The attempt error code when the update attempt finished.
495 ErrorCode attempt_error_code_ = ErrorCode::kSuccess;
496
Alex Deymoab0d9762016-02-02 10:52:56 -0800497 // CPU limiter during the update.
498 CPULimiter cpu_limiter_;
Darin Petkovc6c135c2010-08-11 13:36:18 -0700499
Andrew de los Reyes63b96d72010-05-10 13:08:54 -0700500 // For status:
Alex Deymo906191f2015-10-12 12:22:44 -0700501 UpdateStatus status_{UpdateStatus::IDLE};
Gilad Arnold1f847232014-04-07 12:07:49 -0700502 double download_progress_ = 0.0;
503 int64_t last_checked_time_ = 0;
Alex Vakulenkodea2eac2014-03-14 15:56:59 -0700504 std::string prev_version_;
Gilad Arnold1f847232014-04-07 12:07:49 -0700505 std::string new_version_ = "0.0.0.0";
Aaron Wood7f92e2b2017-08-28 14:51:21 -0700506 uint64_t new_payload_size_ = 0;
Aaron Woodbf5a2522017-10-04 10:58:36 -0700507 // Flags influencing all periodic update checks
508 UpdateAttemptFlags update_attempt_flags_ = UpdateAttemptFlags::kNone;
509 // Flags influencing the currently in-progress check (cached at the start of
510 // the update check).
511 UpdateAttemptFlags current_update_attempt_flags_ = UpdateAttemptFlags::kNone;
Andrew de los Reyes63b96d72010-05-10 13:08:54 -0700512
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700513 // Common parameters for all Omaha requests.
Gilad Arnold1f847232014-04-07 12:07:49 -0700514 OmahaRequestParams* omaha_request_params_ = nullptr;
Darin Petkova4a8a8c2010-07-15 22:21:12 -0700515
Andrew de los Reyes45168102010-11-22 11:13:50 -0800516 // Number of consecutive manual update checks we've had where we obeyed
517 // Chrome's proxy settings.
Gilad Arnold1f847232014-04-07 12:07:49 -0700518 int proxy_manual_checks_ = 0;
Andrew de los Reyes45168102010-11-22 11:13:50 -0800519
520 // If true, this update cycle we are obeying proxies
Gilad Arnold1f847232014-04-07 12:07:49 -0700521 bool obeying_proxies_ = true;
Andrew de los Reyes45168102010-11-22 11:13:50 -0800522
Patrick Dubroy7fbbe8a2011-08-01 17:28:22 +0200523 // Used for fetching information about the device policy.
Ben Chan02f7c1d2014-10-18 15:18:02 -0700524 std::unique_ptr<policy::PolicyProvider> policy_provider_;
Patrick Dubroy7fbbe8a2011-08-01 17:28:22 +0200525
Jay Srinivasan480ddfa2012-06-01 19:15:26 -0700526 // The current scatter factor as found in the policy setting.
527 base::TimeDelta scatter_factor_;
528
Gilad Arnolda6dab942014-04-25 11:46:03 -0700529 // The number of consecutive failed update checks. Needed for calculating the
530 // next update check interval.
531 unsigned int consecutive_failed_update_checks_ = 0;
532
Gilad Arnolda0258a52014-07-10 16:21:19 -0700533 // The poll interval (in seconds) that was dictated by Omaha, if any; zero
534 // otherwise. This is needed for calculating the update check interval.
535 unsigned int server_dictated_poll_interval_ = 0;
536
Gilad Arnoldec7f9162014-07-15 13:24:46 -0700537 // Tracks whether we have scheduled update checks.
538 bool waiting_for_scheduled_check_ = false;
539
540 // A callback to use when a forced update request is either received (true) or
541 // cleared by an update attempt (false). The second argument indicates whether
542 // this is an interactive update, and its value is significant iff the first
543 // argument is true.
Ben Chan02f7c1d2014-10-18 15:18:02 -0700544 std::unique_ptr<base::Callback<void(bool, bool)>>
Gilad Arnoldec7f9162014-07-15 13:24:46 -0700545 forced_update_pending_callback_;
546
547 // The |app_version| and |omaha_url| parameters received during the latest
548 // forced update request. They are retrieved for use once the update is
549 // actually scheduled.
550 std::string forced_app_version_;
551 std::string forced_omaha_url_;
Gilad Arnold44dc3bf2014-07-18 23:39:38 -0700552
Xiaochu Liuf53a5d32018-11-26 13:48:59 -0800553 // A list of DLC module IDs.
Amin Hassani2b68e6b2020-04-17 10:49:12 -0700554 std::vector<std::string> dlc_ids_;
Xiaochu Liu88d90382018-08-29 16:09:11 -0700555 // Whether the operation is install (write to the current slot not the
556 // inactive slot).
557 bool is_install_;
558
Adolfo Victoria497044c2018-07-18 07:51:42 -0700559 // If this is not TimeDelta(), then that means staging is turned on.
560 base::TimeDelta staging_wait_time_;
561 chromeos_update_manager::StagingSchedule staging_schedule_;
562
Jae Hoon Kimedb65502019-06-14 11:52:17 -0700563 // This is the session ID used to track update flow to Omaha.
564 std::string session_id_;
565
Jae Hoon Kim5e8e30b2020-05-06 14:59:06 -0700566 // Interface for excluder.
567 std::unique_ptr<ExcluderInterface> excluder_;
568
Andrew de los Reyes4e9b9f42010-04-26 15:06:43 -0700569 DISALLOW_COPY_AND_ASSIGN(UpdateAttempter);
570};
571
Amin Hassani7cc8bb02019-01-14 16:29:47 -0800572// Turns a generic ErrorCode::kError to a generic error code specific
573// to |action| (e.g., ErrorCode::kFilesystemVerifierError). If |code| is
574// not ErrorCode::kError, or the action is not matched, returns |code|
575// unchanged.
576
577ErrorCode GetErrorCodeForAction(AbstractAction* action, ErrorCode code);
578
Andrew de los Reyes4e9b9f42010-04-26 15:06:43 -0700579} // namespace chromeos_update_engine
580
Amin Hassaniec7bc112020-10-29 16:47:58 -0700581#endif // UPDATE_ENGINE_CROS_UPDATE_ATTEMPTER_H_