blob: 5d832e0ac7ac87101babbb29bcab7f00583e46fe [file] [log] [blame]
Alex Deymo5e3ea272016-01-28 13:42:23 -08001//
2// Copyright (C) 2016 The Android Open Source Project
3//
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at
7//
8// http://www.apache.org/licenses/LICENSE-2.0
9//
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15//
16
Amin Hassaniec7bc112020-10-29 16:47:58 -070017#ifndef UPDATE_ENGINE_AOSP_UPDATE_ATTEMPTER_ANDROID_H_
18#define UPDATE_ENGINE_AOSP_UPDATE_ATTEMPTER_ANDROID_H_
Alex Deymo5e3ea272016-01-28 13:42:23 -080019
20#include <stdint.h>
21
22#include <memory>
23#include <string>
24#include <vector>
25
Kyeongkab.Nam500ca132019-06-26 13:48:07 +090026#include <android-base/unique_fd.h>
Alex Deymo5e3ea272016-01-28 13:42:23 -080027#include <base/time/time.h>
28
Mohammad Samiul Islam24a82792021-02-12 16:52:36 +000029#include "update_engine/aosp/apex_handler_interface.h"
Amin Hassaniec7bc112020-10-29 16:47:58 -070030#include "update_engine/aosp/service_delegate_android_interface.h"
Alex Deymo5e3ea272016-01-28 13:42:23 -080031#include "update_engine/client_library/include/update_engine/update_status.h"
32#include "update_engine/common/action_processor.h"
33#include "update_engine/common/boot_control_interface.h"
Tianjie Xu90aaa102017-10-10 17:39:03 -070034#include "update_engine/common/clock.h"
Amin Hassaniec7bc112020-10-29 16:47:58 -070035#include "update_engine/common/daemon_state_interface.h"
36#include "update_engine/common/download_action.h"
Alex Deymo5e3ea272016-01-28 13:42:23 -080037#include "update_engine/common/hardware_interface.h"
Amin Hassaniec7bc112020-10-29 16:47:58 -070038#include "update_engine/common/metrics_reporter_interface.h"
39#include "update_engine/common/network_selector_interface.h"
Alex Deymo5e3ea272016-01-28 13:42:23 -080040#include "update_engine/common/prefs_interface.h"
Amin Hassaniec7bc112020-10-29 16:47:58 -070041#include "update_engine/common/service_observer_interface.h"
Tianjie Xu90aaa102017-10-10 17:39:03 -070042#include "update_engine/metrics_utils.h"
Kelvin Zhang70eef232020-06-12 20:32:40 +000043#include "update_engine/payload_consumer/filesystem_verifier_action.h"
Alex Deymo0d298542016-03-30 18:31:49 -070044#include "update_engine/payload_consumer/postinstall_runner_action.h"
Alex Deymo5e3ea272016-01-28 13:42:23 -080045
46namespace chromeos_update_engine {
47
Kelvin Zhanga43d6e82021-05-26 10:14:42 -040048enum class OTAResult {
49 NOT_ATTEMPTED,
50 ROLLED_BACK,
51 UPDATED_NEED_REBOOT,
52 OTA_SUCCESSFUL,
53};
54
Alex Deymo0d298542016-03-30 18:31:49 -070055class UpdateAttempterAndroid
56 : public ServiceDelegateAndroidInterface,
57 public ActionProcessorDelegate,
58 public DownloadActionDelegate,
Kelvin Zhang70eef232020-06-12 20:32:40 +000059 public FilesystemVerifyDelegate,
Yifan Hong90965502020-02-19 15:22:47 -080060 public PostinstallRunnerAction::DelegateInterface,
61 public CleanupPreviousUpdateActionDelegateInterface {
Alex Deymo5e3ea272016-01-28 13:42:23 -080062 public:
63 using UpdateStatus = update_engine::UpdateStatus;
64
Alex Deymo03a4de72016-07-20 16:08:23 -070065 UpdateAttempterAndroid(DaemonStateInterface* daemon_state,
Alex Deymo5e3ea272016-01-28 13:42:23 -080066 PrefsInterface* prefs,
67 BootControlInterface* boot_control_,
Mohammad Samiul Islam24a82792021-02-12 16:52:36 +000068 HardwareInterface* hardware_,
69 std::unique_ptr<ApexHandlerInterface> apex_handler);
Alex Deymo5e3ea272016-01-28 13:42:23 -080070 ~UpdateAttempterAndroid() override;
71
72 // Further initialization to be done post construction.
73 void Init();
74
75 // ServiceDelegateAndroidInterface overrides.
76 bool ApplyPayload(const std::string& payload_url,
77 int64_t payload_offset,
78 int64_t payload_size,
79 const std::vector<std::string>& key_value_pair_headers,
80 brillo::ErrorPtr* error) override;
Kyeongkab.Nam500ca132019-06-26 13:48:07 +090081 bool ApplyPayload(int fd,
82 int64_t payload_offset,
83 int64_t payload_size,
84 const std::vector<std::string>& key_value_pair_headers,
85 brillo::ErrorPtr* error) override;
Alex Deymo5e3ea272016-01-28 13:42:23 -080086 bool SuspendUpdate(brillo::ErrorPtr* error) override;
87 bool ResumeUpdate(brillo::ErrorPtr* error) override;
88 bool CancelUpdate(brillo::ErrorPtr* error) override;
Alex Deymo3b678db2016-02-09 11:50:06 -080089 bool ResetStatus(brillo::ErrorPtr* error) override;
Sen Jiang28d8ed92018-02-01 13:46:39 -080090 bool VerifyPayloadApplicable(const std::string& metadata_filename,
91 brillo::ErrorPtr* error) override;
Yifan Hong6f7e29f2019-12-13 14:41:06 -080092 uint64_t AllocateSpaceForPayload(
93 const std::string& metadata_filename,
94 const std::vector<std::string>& key_value_pair_headers,
95 brillo::ErrorPtr* error) override;
Yifan Hong40bb0d02020-02-24 17:33:14 -080096 void CleanupSuccessfulUpdate(
97 std::unique_ptr<CleanupSuccessfulUpdateCallbackInterface> callback,
98 brillo::ErrorPtr* error) override;
Tianjie7f8f2ab2021-07-23 17:08:50 -070099 bool setShouldSwitchSlotOnReboot(const std::string& metadata_filename,
100 brillo::ErrorPtr* error) override;
101 bool resetShouldSwitchSlotOnReboot(brillo::ErrorPtr* error) override;
Alex Deymo5e3ea272016-01-28 13:42:23 -0800102
103 // ActionProcessorDelegate methods:
104 void ProcessingDone(const ActionProcessor* processor,
105 ErrorCode code) override;
106 void ProcessingStopped(const ActionProcessor* processor) override;
107 void ActionCompleted(ActionProcessor* processor,
108 AbstractAction* action,
109 ErrorCode code) override;
110
111 // DownloadActionDelegate overrides.
112 void BytesReceived(uint64_t bytes_progressed,
113 uint64_t bytes_received,
114 uint64_t total) override;
115 bool ShouldCancel(ErrorCode* cancel_reason) override;
116 void DownloadComplete() override;
117
Kelvin Zhang70eef232020-06-12 20:32:40 +0000118 // FilesystemVerifyDelegate overrides
119 void OnVerifyProgressUpdate(double progress) override;
120
Alex Deymo0d298542016-03-30 18:31:49 -0700121 // PostinstallRunnerAction::DelegateInterface
122 void ProgressUpdate(double progress) override;
123
Yifan Hong90965502020-02-19 15:22:47 -0800124 // CleanupPreviousUpdateActionDelegateInterface
125 void OnCleanupProgressUpdate(double progress) override;
126
Kelvin Zhanga43d6e82021-05-26 10:14:42 -0400127 // Check the result of an OTA update. Intended to be called after reboot, this
128 // will use prefs on disk to determine if OTA was installed, or rolledback.
129 [[nodiscard]] OTAResult GetOTAUpdateResult() const;
130 // Intended to be called:
131 // 1. When system rebooted and slot switch is attempted
132 // 2. When a new update is started
133 // 3. When user called |ResetStatus()|
134 bool ClearUpdateCompletedMarker();
135
Kelvin Zhang1304fe72021-10-06 19:12:12 -0700136 void set_update_certificates_path(
137 const std::string& update_certificates_path) {
138 update_certificates_path_ = update_certificates_path;
139 }
140
Alex Deymo5e3ea272016-01-28 13:42:23 -0800141 private:
Tianjie Xu90aaa102017-10-10 17:39:03 -0700142 friend class UpdateAttempterAndroidTest;
143
Kelvin Zhanga43d6e82021-05-26 10:14:42 -0400144 // Return |true| only if slot switched successfully after an OTA reboot.
145 // This will return |false| if an downgrade OTA is applied. Because after a
146 // downgrade OTA, we wipe /data, and there's no way for update_engine to
147 // "remember" that a downgrade OTA took place.
148 [[nodiscard]] bool OTARebootSucceeded() const;
149
Alex Deymo5e3ea272016-01-28 13:42:23 -0800150 // Schedules an event loop callback to start the action processor. This is
151 // scheduled asynchronously to unblock the event loop.
152 void ScheduleProcessingStart();
153
154 // Notifies an update request completed with the given error |code| to all
155 // observers.
156 void TerminateUpdateAndNotify(ErrorCode error_code);
157
158 // Sets the status to the given |status| and notifies a status update to
159 // all observers.
160 void SetStatusAndNotify(UpdateStatus status);
161
162 // Helper method to construct the sequence of actions to be performed for
Amin Hassani667cf7b2018-07-25 14:32:00 -0700163 // applying an update using a given HttpFetcher. The ownership of |fetcher| is
164 // passed to this function.
165 void BuildUpdateActions(HttpFetcher* fetcher);
Alex Deymo5e3ea272016-01-28 13:42:23 -0800166
Alex Deymo5e3ea272016-01-28 13:42:23 -0800167 // Writes to the processing completed marker. Does nothing if
168 // |update_completed_marker_| is empty.
Kelvin Zhanga43d6e82021-05-26 10:14:42 -0400169 [[nodiscard]] bool WriteUpdateCompletedMarker();
Alex Deymo5e3ea272016-01-28 13:42:23 -0800170
171 // Returns whether an update was completed in the current boot.
Kelvin Zhanga43d6e82021-05-26 10:14:42 -0400172 [[nodiscard]] bool UpdateCompletedOnThisBoot();
Alex Deymo5e3ea272016-01-28 13:42:23 -0800173
Tianjie Xu90aaa102017-10-10 17:39:03 -0700174 // Prefs to use for metrics report
175 // |kPrefsPayloadAttemptNumber|: number of update attempts for the current
176 // payload_id.
177 // |KprefsNumReboots|: number of reboots when applying the current update.
178 // |kPrefsSystemUpdatedMarker|: end timestamp of the last successful update.
Tianjie Xu2a0ea632018-08-06 12:59:23 -0700179 // |kPrefsUpdateTimestampStart|: start timestamp in monotonic time of the
180 // current update.
181 // |kPrefsUpdateBootTimestampStart|: start timestamp in boot time of
182 // the current update.
Tianjie Xud4777a12017-10-24 14:54:18 -0700183 // |kPrefsCurrentBytesDownloaded|: number of bytes downloaded for the current
184 // payload_id.
185 // |kPrefsTotalBytesDownloaded|: number of bytes downloaded in total since
186 // the last successful update.
Tianjie Xu90aaa102017-10-10 17:39:03 -0700187
188 // Metrics report function to call:
189 // |ReportUpdateAttemptMetrics|
190 // |ReportSuccessfulUpdateMetrics|
191 // Prefs to update:
192 // |kPrefsSystemUpdatedMarker|
193 void CollectAndReportUpdateMetricsOnUpdateFinished(ErrorCode error_code);
194
Kelvin Zhang4061c512021-05-25 13:42:55 -0400195 // This function is called after update_engine is started after device
196 // reboots. If update_engine is restarted w/o device reboot, this function
197 // would not be called.
198
Tianjie Xu90aaa102017-10-10 17:39:03 -0700199 // Metrics report function to call:
200 // |ReportAbnormallyTerminatedUpdateAttemptMetrics|
201 // |ReportTimeToRebootMetrics|
202 // Prefs to update:
203 // |kPrefsBootId|, |kPrefsPreviousVersion|
Kelvin Zhanga43d6e82021-05-26 10:14:42 -0400204 void UpdateStateAfterReboot(OTAResult result);
Tianjie Xu90aaa102017-10-10 17:39:03 -0700205
206 // Prefs to update:
Tianjie Xu2a0ea632018-08-06 12:59:23 -0700207 // |kPrefsPayloadAttemptNumber|, |kPrefsUpdateTimestampStart|,
208 // |kPrefsUpdateBootTimestampStart|
Tianjie Xu90aaa102017-10-10 17:39:03 -0700209 void UpdatePrefsOnUpdateStart(bool is_resume);
210
211 // Prefs to delete:
xunchang9cf52622019-01-25 11:04:58 -0800212 // |kPrefsNumReboots|, |kPrefsCurrentBytesDownloaded|
Tianjie Xud4777a12017-10-24 14:54:18 -0700213 // |kPrefsSystemUpdatedMarker|, |kPrefsUpdateTimestampStart|,
xunchang9cf52622019-01-25 11:04:58 -0800214 // |kPrefsUpdateBootTimestampStart|
Tianjie Xu90aaa102017-10-10 17:39:03 -0700215 void ClearMetricsPrefs();
216
Yifan Hongbd47d622019-12-13 14:59:58 -0800217 // Return source and target slots for update.
218 BootControlInterface::Slot GetCurrentSlot() const;
219 BootControlInterface::Slot GetTargetSlot() const;
220
221 // Helper of public VerifyPayloadApplicable. Return the parsed manifest in
222 // |manifest|.
223 static bool VerifyPayloadParseManifest(const std::string& metadata_filename,
224 DeltaArchiveManifest* manifest,
225 brillo::ErrorPtr* error);
226
Yifan Hong90965502020-02-19 15:22:47 -0800227 // Enqueue and run a CleanupPreviousUpdateAction.
228 void ScheduleCleanupPreviousUpdate();
229
Yifan Hong40bb0d02020-02-24 17:33:14 -0800230 // Notify and clear |cleanup_previous_update_callbacks_|.
231 void NotifyCleanupPreviousUpdateCallbacksAndClear();
232
233 // Remove |callback| from |cleanup_previous_update_callbacks_|.
234 void RemoveCleanupPreviousUpdateCallback(
235 CleanupSuccessfulUpdateCallbackInterface* callback);
236
Alex Deymo03a4de72016-07-20 16:08:23 -0700237 DaemonStateInterface* daemon_state_;
Alex Deymo5e3ea272016-01-28 13:42:23 -0800238
239 // DaemonStateAndroid pointers.
240 PrefsInterface* prefs_;
241 BootControlInterface* boot_control_;
242 HardwareInterface* hardware_;
243
Mohammad Samiul Islam24a82792021-02-12 16:52:36 +0000244 std::unique_ptr<ApexHandlerInterface> apex_handler_android_;
245
Alex Deymo5e3ea272016-01-28 13:42:23 -0800246 // Last status notification timestamp used for throttling. Use monotonic
247 // TimeTicks to ensure that notifications are sent even if the system clock is
248 // set back in the middle of an update.
249 base::TimeTicks last_notify_time_;
250
Amin Hassani04d41622018-12-20 15:35:41 -0800251 // Only direct proxy supported.
252 DirectProxyResolver proxy_resolver_;
253
Amin Hassani667cf7b2018-07-25 14:32:00 -0700254 // The processor for running Actions.
Alex Deymo5e3ea272016-01-28 13:42:23 -0800255 std::unique_ptr<ActionProcessor> processor_;
256
Alex Deymo5e3ea272016-01-28 13:42:23 -0800257 // The InstallPlan used during the ongoing update.
258 InstallPlan install_plan_;
259
260 // For status:
261 UpdateStatus status_{UpdateStatus::IDLE};
262 double download_progress_{0.0};
263
Alex Deymo0fd51ff2016-02-03 14:22:43 -0800264 // The offset in the payload file where the CrAU part starts.
265 int64_t base_offset_{0};
266
Alex Deymo87792ea2016-07-25 15:40:36 -0700267 // Helper class to select the network to use during the update.
268 std::unique_ptr<NetworkSelectorInterface> network_selector_;
269
Tianjie Xu90aaa102017-10-10 17:39:03 -0700270 std::unique_ptr<ClockInterface> clock_;
271
Tianjie Xu1b661142017-09-28 14:03:42 -0700272 std::unique_ptr<MetricsReporterInterface> metrics_reporter_;
273
Kyeongkab.Nam500ca132019-06-26 13:48:07 +0900274 ::android::base::unique_fd payload_fd_;
275
Yifan Hong40bb0d02020-02-24 17:33:14 -0800276 std::vector<std::unique_ptr<CleanupSuccessfulUpdateCallbackInterface>>
277 cleanup_previous_update_callbacks_;
278 // Result of previous CleanupPreviousUpdateAction. Nullopt If
279 // CleanupPreviousUpdateAction has not been executed.
280 std::optional<ErrorCode> cleanup_previous_update_code_{std::nullopt};
281
Kelvin Zhang1304fe72021-10-06 19:12:12 -0700282 // The path to the zip file with X509 certificates.
283 std::string update_certificates_path_{constants::kUpdateCertificatesPath};
284
Alex Deymo5e3ea272016-01-28 13:42:23 -0800285 DISALLOW_COPY_AND_ASSIGN(UpdateAttempterAndroid);
286};
287
288} // namespace chromeos_update_engine
289
Amin Hassaniec7bc112020-10-29 16:47:58 -0700290#endif // UPDATE_ENGINE_AOSP_UPDATE_ATTEMPTER_ANDROID_H_