Alex Deymo | aea4c1c | 2015-08-19 20:24:43 -0700 | [diff] [blame] | 1 | // |
| 2 | // Copyright (C) 2012 The Android Open Source Project |
| 3 | // |
| 4 | // Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | // you may not use this file except in compliance with the License. |
| 6 | // You may obtain a copy of the License at |
| 7 | // |
| 8 | // http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | // |
| 10 | // Unless required by applicable law or agreed to in writing, software |
| 11 | // distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | // See the License for the specific language governing permissions and |
| 14 | // limitations under the License. |
| 15 | // |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 16 | |
| 17 | #include "update_engine/update_attempter.h" |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 18 | |
Ben Chan | 9abb763 | 2014-08-07 00:10:53 -0700 | [diff] [blame] | 19 | #include <stdint.h> |
| 20 | |
Alex Vakulenko | 59e253e | 2014-02-24 10:40:21 -0800 | [diff] [blame] | 21 | #include <algorithm> |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 22 | #include <map> |
Alex Deymo | bc91a27 | 2014-05-20 16:45:33 -0700 | [diff] [blame] | 23 | #include <memory> |
| 24 | #include <string> |
Andrew | a8d7df3 | 2020-03-15 20:10:01 -0700 | [diff] [blame] | 25 | #include <unordered_set> |
Alex Vakulenko | d2779df | 2014-06-16 13:19:00 -0700 | [diff] [blame] | 26 | #include <utility> |
Alex Deymo | 44666f9 | 2014-07-22 20:29:24 -0700 | [diff] [blame] | 27 | #include <vector> |
Darin Petkov | 9d65b7b | 2010-07-20 09:13:01 -0700 | [diff] [blame] | 28 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 29 | #include <base/bind.h> |
Denis Nikitin | 8f2fa74 | 2019-05-29 10:36:52 -0700 | [diff] [blame] | 30 | #include <base/compiler_specific.h> |
Ben Chan | 06c76a4 | 2014-09-05 08:21:06 -0700 | [diff] [blame] | 31 | #include <base/files/file_util.h> |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 32 | #include <base/logging.h> |
Andrew de los Reyes | 4516810 | 2010-11-22 11:13:50 -0800 | [diff] [blame] | 33 | #include <base/rand_util.h> |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 34 | #include <base/strings/string_number_conversions.h> |
Daniel Erat | 65f1da0 | 2014-06-27 22:05:38 -0700 | [diff] [blame] | 35 | #include <base/strings/string_util.h> |
Alex Vakulenko | 75039d7 | 2014-03-25 12:36:28 -0700 | [diff] [blame] | 36 | #include <base/strings/stringprintf.h> |
May Lippert | 60aa3ca | 2018-08-15 16:55:29 -0700 | [diff] [blame] | 37 | #include <base/time/time.h> |
Sen Jiang | 2703ef4 | 2017-03-16 13:36:21 -0700 | [diff] [blame] | 38 | #include <brillo/data_encoding.h> |
Sen Jiang | e67bb5b | 2016-06-20 15:53:56 -0700 | [diff] [blame] | 39 | #include <brillo/errors/error_codes.h> |
Alex Vakulenko | 3f39d5c | 2015-10-13 09:27:13 -0700 | [diff] [blame] | 40 | #include <brillo/message_loops/message_loop.h> |
Patrick Dubroy | 7fbbe8a | 2011-08-01 17:28:22 +0200 | [diff] [blame] | 41 | #include <policy/device_policy.h> |
Alex Deymo | bc91a27 | 2014-05-20 16:45:33 -0700 | [diff] [blame] | 42 | #include <policy/libpolicy.h> |
Alex Deymo | d6deb1d | 2015-08-28 15:54:37 -0700 | [diff] [blame] | 43 | #include <update_engine/dbus-constants.h> |
Darin Petkov | 9d65b7b | 2010-07-20 09:13:01 -0700 | [diff] [blame] | 44 | |
Alex Deymo | 14c0da8 | 2016-07-20 16:45:45 -0700 | [diff] [blame] | 45 | #include "update_engine/certificate_checker.h" |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 46 | #include "update_engine/common/boot_control_interface.h" |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 47 | #include "update_engine/common/clock_interface.h" |
| 48 | #include "update_engine/common/constants.h" |
Xiaochu Liu | 8ba486f | 2018-11-06 11:14:10 -0800 | [diff] [blame] | 49 | #include "update_engine/common/dlcservice_interface.h" |
Jae Hoon Kim | 5e8e30b | 2020-05-06 14:59:06 -0700 | [diff] [blame] | 50 | #include "update_engine/common/excluder_interface.h" |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 51 | #include "update_engine/common/hardware_interface.h" |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 52 | #include "update_engine/common/platform_constants.h" |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 53 | #include "update_engine/common/prefs.h" |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 54 | #include "update_engine/common/prefs_interface.h" |
| 55 | #include "update_engine/common/subprocess.h" |
| 56 | #include "update_engine/common/utils.h" |
Alex Deymo | 14c0da8 | 2016-07-20 16:45:45 -0700 | [diff] [blame] | 57 | #include "update_engine/libcurl_http_fetcher.h" |
Tianjie Xu | 282aa1f | 2017-09-05 13:42:45 -0700 | [diff] [blame] | 58 | #include "update_engine/metrics_reporter_interface.h" |
Darin Petkov | 6a5b322 | 2010-07-13 14:55:28 -0700 | [diff] [blame] | 59 | #include "update_engine/omaha_request_action.h" |
Darin Petkov | a4a8a8c | 2010-07-15 22:21:12 -0700 | [diff] [blame] | 60 | #include "update_engine/omaha_request_params.h" |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 61 | #include "update_engine/omaha_response_handler_action.h" |
Jae Hoon Kim | 051627a | 2019-09-03 12:56:32 -0700 | [diff] [blame] | 62 | #include "update_engine/omaha_utils.h" |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 63 | #include "update_engine/p2p_manager.h" |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 64 | #include "update_engine/payload_consumer/download_action.h" |
| 65 | #include "update_engine/payload_consumer/filesystem_verifier_action.h" |
| 66 | #include "update_engine/payload_consumer/postinstall_runner_action.h" |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 67 | #include "update_engine/payload_state_interface.h" |
Sen Jiang | b8c6a8f | 2016-06-07 17:33:17 -0700 | [diff] [blame] | 68 | #include "update_engine/power_manager_interface.h" |
Jay Srinivasan | 4348879 | 2012-06-19 00:25:31 -0700 | [diff] [blame] | 69 | #include "update_engine/system_state.h" |
Amin Hassani | 0882a51 | 2018-04-05 16:25:44 -0700 | [diff] [blame] | 70 | #include "update_engine/update_boot_flags_action.h" |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 71 | #include "update_engine/update_manager/policy.h" |
Marton Hunyady | e58bddb | 2018-04-10 20:27:26 +0200 | [diff] [blame] | 72 | #include "update_engine/update_manager/policy_utils.h" |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 73 | #include "update_engine/update_manager/update_manager.h" |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 74 | #include "update_engine/update_status_utils.h" |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 75 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 76 | using base::Bind; |
| 77 | using base::Callback; |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 78 | using base::FilePath; |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 79 | using base::Time; |
Darin Petkov | af18305 | 2010-08-23 12:07:13 -0700 | [diff] [blame] | 80 | using base::TimeDelta; |
| 81 | using base::TimeTicks; |
Alex Vakulenko | 3f39d5c | 2015-10-13 09:27:13 -0700 | [diff] [blame] | 82 | using brillo::MessageLoop; |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 83 | using chromeos_update_manager::CalculateStagingCase; |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 84 | using chromeos_update_manager::EvalStatus; |
| 85 | using chromeos_update_manager::Policy; |
Adolfo Victoria | 497044c | 2018-07-18 07:51:42 -0700 | [diff] [blame] | 86 | using chromeos_update_manager::StagingCase; |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 87 | using chromeos_update_manager::UpdateCheckParams; |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 88 | using std::map; |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 89 | using std::string; |
| 90 | using std::vector; |
Aaron Wood | bf5a252 | 2017-10-04 10:58:36 -0700 | [diff] [blame] | 91 | using update_engine::UpdateAttemptFlags; |
Aaron Wood | 7f92e2b | 2017-08-28 14:51:21 -0700 | [diff] [blame] | 92 | using update_engine::UpdateEngineStatus; |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 93 | |
| 94 | namespace chromeos_update_engine { |
| 95 | |
Darin Petkov | 3627577 | 2010-10-01 11:40:57 -0700 | [diff] [blame] | 96 | const int UpdateAttempter::kMaxDeltaUpdateFailures = 3; |
| 97 | |
Andrew de los Reyes | 4516810 | 2010-11-22 11:13:50 -0800 | [diff] [blame] | 98 | namespace { |
| 99 | const int kMaxConsecutiveObeyProxyRequests = 20; |
Gilad Arnold | 70e476e | 2013-07-30 16:01:13 -0700 | [diff] [blame] | 100 | |
Alex Deymo | 0d29854 | 2016-03-30 18:31:49 -0700 | [diff] [blame] | 101 | // Minimum threshold to broadcast an status update in progress and time. |
| 102 | const double kBroadcastThresholdProgress = 0.01; // 1% |
| 103 | const int kBroadcastThresholdSeconds = 10; |
| 104 | |
David Pursell | 02c1864 | 2014-11-06 11:26:11 -0800 | [diff] [blame] | 105 | // By default autest bypasses scattering. If we want to test scattering, |
| 106 | // use kScheduledAUTestURLRequest. The URL used is same in both cases, but |
| 107 | // different params are passed to CheckForUpdate(). |
| 108 | const char kAUTestURLRequest[] = "autest"; |
| 109 | const char kScheduledAUTestURLRequest[] = "autest-scheduled"; |
Alex Vakulenko | d2779df | 2014-06-16 13:19:00 -0700 | [diff] [blame] | 110 | } // namespace |
Andrew de los Reyes | 4516810 | 2010-11-22 11:13:50 -0800 | [diff] [blame] | 111 | |
Sen Jiang | daeaa43 | 2018-10-09 18:18:45 -0700 | [diff] [blame] | 112 | ErrorCode GetErrorCodeForAction(AbstractAction* action, ErrorCode code) { |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 113 | if (code != ErrorCode::kError) |
Darin Petkov | 777dbfa | 2010-07-20 15:03:37 -0700 | [diff] [blame] | 114 | return code; |
| 115 | |
| 116 | const string type = action->Type(); |
| 117 | if (type == OmahaRequestAction::StaticType()) |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 118 | return ErrorCode::kOmahaRequestError; |
Darin Petkov | 777dbfa | 2010-07-20 15:03:37 -0700 | [diff] [blame] | 119 | if (type == OmahaResponseHandlerAction::StaticType()) |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 120 | return ErrorCode::kOmahaResponseHandlerError; |
Allie Wood | eb9e6d8 | 2015-04-17 13:55:30 -0700 | [diff] [blame] | 121 | if (type == FilesystemVerifierAction::StaticType()) |
| 122 | return ErrorCode::kFilesystemVerifierError; |
Darin Petkov | 777dbfa | 2010-07-20 15:03:37 -0700 | [diff] [blame] | 123 | if (type == PostinstallRunnerAction::StaticType()) |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 124 | return ErrorCode::kPostinstallRunnerError; |
Darin Petkov | 777dbfa | 2010-07-20 15:03:37 -0700 | [diff] [blame] | 125 | |
| 126 | return code; |
| 127 | } |
| 128 | |
Sen Jiang | 1841408 | 2018-01-11 14:50:36 -0800 | [diff] [blame] | 129 | UpdateAttempter::UpdateAttempter(SystemState* system_state, |
| 130 | CertificateChecker* cert_checker) |
Gilad Arnold | 1f84723 | 2014-04-07 12:07:49 -0700 | [diff] [blame] | 131 | : processor_(new ActionProcessor()), |
| 132 | system_state_(system_state), |
Colin Howes | 978c108 | 2018-12-03 11:46:12 -0800 | [diff] [blame] | 133 | cert_checker_(cert_checker), |
| 134 | is_install_(false) {} |
Darin Petkov | c6c135c | 2010-08-11 13:36:18 -0700 | [diff] [blame] | 135 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 136 | UpdateAttempter::~UpdateAttempter() { |
Alex Deymo | 33e91e7 | 2015-12-01 18:26:08 -0300 | [diff] [blame] | 137 | // CertificateChecker might not be initialized in unittests. |
| 138 | if (cert_checker_) |
| 139 | cert_checker_->SetObserver(nullptr); |
Alex Deymo | 2b4268c | 2015-12-04 13:56:25 -0800 | [diff] [blame] | 140 | // Release ourselves as the ActionProcessor's delegate to prevent |
| 141 | // re-scheduling the updates due to the processing stopped. |
| 142 | processor_->set_delegate(nullptr); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 143 | } |
| 144 | |
Gilad Arnold | 1f84723 | 2014-04-07 12:07:49 -0700 | [diff] [blame] | 145 | void UpdateAttempter::Init() { |
| 146 | // Pulling from the SystemState can only be done after construction, since |
| 147 | // this is an aggregate of various objects (such as the UpdateAttempter), |
| 148 | // which requires them all to be constructed prior to it being used. |
| 149 | prefs_ = system_state_->prefs(); |
| 150 | omaha_request_params_ = system_state_->request_params(); |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 151 | |
Alex Deymo | 33e91e7 | 2015-12-01 18:26:08 -0300 | [diff] [blame] | 152 | if (cert_checker_) |
| 153 | cert_checker_->SetObserver(this); |
| 154 | |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 155 | // In case of update_engine restart without a reboot we need to restore the |
| 156 | // reboot needed state. |
| 157 | if (GetBootTimeAtUpdate(nullptr)) |
| 158 | status_ = UpdateStatus::UPDATED_NEED_REBOOT; |
| 159 | else |
| 160 | status_ = UpdateStatus::IDLE; |
Gilad Arnold | 1f84723 | 2014-04-07 12:07:49 -0700 | [diff] [blame] | 161 | } |
| 162 | |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 163 | bool UpdateAttempter::ScheduleUpdates() { |
Jae Hoon Kim | ba2fdce | 2019-07-11 13:18:58 -0700 | [diff] [blame] | 164 | if (IsBusyOrUpdateScheduled()) |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 165 | return false; |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 166 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 167 | chromeos_update_manager::UpdateManager* const update_manager = |
| 168 | system_state_->update_manager(); |
| 169 | CHECK(update_manager); |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 170 | Callback<void(EvalStatus, const UpdateCheckParams&)> callback = |
| 171 | Bind(&UpdateAttempter::OnUpdateScheduled, base::Unretained(this)); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 172 | // We limit the async policy request to a reasonably short time, to avoid a |
| 173 | // starvation due to a transient bug. |
Jae Hoon Kim | 504c3cb | 2019-07-02 11:17:24 -0700 | [diff] [blame] | 174 | update_manager->AsyncPolicyRequestUpdateCheckAllowed( |
| 175 | callback, &Policy::UpdateCheckAllowed); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 176 | waiting_for_scheduled_check_ = true; |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 177 | return true; |
Darin Petkov | c6c135c | 2010-08-11 13:36:18 -0700 | [diff] [blame] | 178 | } |
| 179 | |
Alex Deymo | c1c17b4 | 2015-11-23 03:53:15 -0300 | [diff] [blame] | 180 | void UpdateAttempter::CertificateChecked(ServerToCheck server_to_check, |
| 181 | CertificateCheckResult result) { |
Tianjie Xu | 282aa1f | 2017-09-05 13:42:45 -0700 | [diff] [blame] | 182 | system_state_->metrics_reporter()->ReportCertificateCheckMetrics( |
| 183 | server_to_check, result); |
Alex Deymo | c1c17b4 | 2015-11-23 03:53:15 -0300 | [diff] [blame] | 184 | } |
| 185 | |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 186 | bool UpdateAttempter::CheckAndReportDailyMetrics() { |
| 187 | int64_t stored_value; |
Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame] | 188 | Time now = system_state_->clock()->GetWallclockTime(); |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 189 | if (system_state_->prefs()->Exists(kPrefsDailyMetricsLastReportedAt) && |
| 190 | system_state_->prefs()->GetInt64(kPrefsDailyMetricsLastReportedAt, |
| 191 | &stored_value)) { |
Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame] | 192 | Time last_reported_at = Time::FromInternalValue(stored_value); |
| 193 | TimeDelta time_reported_since = now - last_reported_at; |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 194 | if (time_reported_since.InSeconds() < 0) { |
| 195 | LOG(WARNING) << "Last reported daily metrics " |
| 196 | << utils::FormatTimeDelta(time_reported_since) << " ago " |
| 197 | << "which is negative. Either the system clock is wrong or " |
| 198 | << "the kPrefsDailyMetricsLastReportedAt state variable " |
| 199 | << "is wrong."; |
| 200 | // In this case, report daily metrics to reset. |
| 201 | } else { |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 202 | if (time_reported_since.InSeconds() < 24 * 60 * 60) { |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 203 | LOG(INFO) << "Last reported daily metrics " |
| 204 | << utils::FormatTimeDelta(time_reported_since) << " ago."; |
| 205 | return false; |
| 206 | } |
| 207 | LOG(INFO) << "Last reported daily metrics " |
| 208 | << utils::FormatTimeDelta(time_reported_since) << " ago, " |
| 209 | << "which is more than 24 hours ago."; |
| 210 | } |
| 211 | } |
| 212 | |
| 213 | LOG(INFO) << "Reporting daily metrics."; |
| 214 | system_state_->prefs()->SetInt64(kPrefsDailyMetricsLastReportedAt, |
| 215 | now.ToInternalValue()); |
| 216 | |
| 217 | ReportOSAge(); |
| 218 | |
| 219 | return true; |
| 220 | } |
| 221 | |
| 222 | void UpdateAttempter::ReportOSAge() { |
| 223 | struct stat sb; |
| 224 | |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 225 | if (system_state_ == nullptr) |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 226 | return; |
| 227 | |
| 228 | if (stat("/etc/lsb-release", &sb) != 0) { |
David Zeuthen | d9aca3b | 2014-08-21 13:11:21 -0400 | [diff] [blame] | 229 | PLOG(ERROR) << "Error getting file status for /etc/lsb-release " |
| 230 | << "(Note: this may happen in some unit tests)"; |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 231 | return; |
| 232 | } |
| 233 | |
Sen Jiang | 1c3db7d | 2019-01-10 15:48:55 -0800 | [diff] [blame] | 234 | Time lsb_release_timestamp = Time::FromTimeSpec(sb.st_ctim); |
Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame] | 235 | Time now = system_state_->clock()->GetWallclockTime(); |
| 236 | TimeDelta age = now - lsb_release_timestamp; |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 237 | if (age.InSeconds() < 0) { |
| 238 | LOG(ERROR) << "The OS age (" << utils::FormatTimeDelta(age) |
David Zeuthen | d9aca3b | 2014-08-21 13:11:21 -0400 | [diff] [blame] | 239 | << ") is negative. Maybe the clock is wrong? " |
| 240 | << "(Note: this may happen in some unit tests.)"; |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 241 | return; |
| 242 | } |
| 243 | |
Tianjie Xu | 282aa1f | 2017-09-05 13:42:45 -0700 | [diff] [blame] | 244 | system_state_->metrics_reporter()->ReportDailyMetrics(age); |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 245 | } |
| 246 | |
Gilad Arnold | 28e2f39 | 2012-02-09 14:36:46 -0800 | [diff] [blame] | 247 | void UpdateAttempter::Update(const string& app_version, |
| 248 | const string& omaha_url, |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 249 | const string& target_channel, |
| 250 | const string& target_version_prefix, |
Marton Hunyady | ba51c3f | 2018-04-25 15:18:10 +0200 | [diff] [blame] | 251 | bool rollback_allowed, |
Zentaro Kavanagh | 28def4f | 2019-01-15 17:15:01 -0800 | [diff] [blame] | 252 | bool rollback_data_save_requested, |
Zentaro Kavanagh | 0ef9a2f | 2018-07-02 12:05:07 -0700 | [diff] [blame] | 253 | int rollback_allowed_milestones, |
Andrew de los Reyes | fb2f461 | 2011-06-09 18:21:49 -0700 | [diff] [blame] | 254 | bool obey_proxies, |
Nam T. Nguyen | 7d623eb | 2014-05-13 16:06:28 -0700 | [diff] [blame] | 255 | bool interactive) { |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 256 | // This is normally called frequently enough so it's appropriate to use as a |
| 257 | // hook for reporting daily metrics. |
| 258 | // TODO(garnold) This should be hooked to a separate (reliable and consistent) |
| 259 | // timeout event. |
David Zeuthen | 985b112 | 2013-10-09 12:13:15 -0700 | [diff] [blame] | 260 | CheckAndReportDailyMetrics(); |
| 261 | |
Andrew de los Reyes | c1d5c93 | 2011-04-20 17:15:47 -0700 | [diff] [blame] | 262 | fake_update_success_ = false; |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 263 | if (status_ == UpdateStatus::UPDATED_NEED_REBOOT) { |
Thieu Le | 116fda3 | 2011-04-19 11:01:54 -0700 | [diff] [blame] | 264 | // Although we have applied an update, we still want to ping Omaha |
| 265 | // to ensure the number of active statistics is accurate. |
David Zeuthen | 33bae49 | 2014-02-25 16:16:18 -0800 | [diff] [blame] | 266 | // |
| 267 | // Also convey to the UpdateEngine.Check.Result metric that we're |
| 268 | // not performing an update check because of this. |
Andrew de los Reyes | 6b78e29 | 2010-05-10 15:54:39 -0700 | [diff] [blame] | 269 | LOG(INFO) << "Not updating b/c we already updated and we're waiting for " |
Thieu Le | 116fda3 | 2011-04-19 11:01:54 -0700 | [diff] [blame] | 270 | << "reboot, we'll ping Omaha instead"; |
Tianjie Xu | 282aa1f | 2017-09-05 13:42:45 -0700 | [diff] [blame] | 271 | system_state_->metrics_reporter()->ReportUpdateCheckMetrics( |
| 272 | system_state_, |
| 273 | metrics::CheckResult::kRebootPending, |
| 274 | metrics::CheckReaction::kUnset, |
| 275 | metrics::DownloadErrorCode::kUnset); |
Thieu Le | 116fda3 | 2011-04-19 11:01:54 -0700 | [diff] [blame] | 276 | PingOmaha(); |
Andrew de los Reyes | 6b78e29 | 2010-05-10 15:54:39 -0700 | [diff] [blame] | 277 | return; |
| 278 | } |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 279 | if (status_ != UpdateStatus::IDLE) { |
Andrew de los Reyes | 6b78e29 | 2010-05-10 15:54:39 -0700 | [diff] [blame] | 280 | // Update in progress. Do nothing |
| 281 | return; |
| 282 | } |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 283 | |
| 284 | if (!CalculateUpdateParams(app_version, |
| 285 | omaha_url, |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 286 | target_channel, |
| 287 | target_version_prefix, |
Marton Hunyady | ba51c3f | 2018-04-25 15:18:10 +0200 | [diff] [blame] | 288 | rollback_allowed, |
Zentaro Kavanagh | 28def4f | 2019-01-15 17:15:01 -0800 | [diff] [blame] | 289 | rollback_data_save_requested, |
Zentaro Kavanagh | 0ef9a2f | 2018-07-02 12:05:07 -0700 | [diff] [blame] | 290 | rollback_allowed_milestones, |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 291 | obey_proxies, |
Nam T. Nguyen | 7d623eb | 2014-05-13 16:06:28 -0700 | [diff] [blame] | 292 | interactive)) { |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 293 | return; |
| 294 | } |
| 295 | |
| 296 | BuildUpdateActions(interactive); |
| 297 | |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 298 | SetStatusAndNotify(UpdateStatus::CHECKING_FOR_UPDATE); |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 299 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 300 | // Update the last check time here; it may be re-updated when an Omaha |
| 301 | // response is received, but this will prevent us from repeatedly scheduling |
| 302 | // checks in the case where a response is not received. |
| 303 | UpdateLastCheckedTime(); |
| 304 | |
Amin Hassani | 0882a51 | 2018-04-05 16:25:44 -0700 | [diff] [blame] | 305 | ScheduleProcessingStart(); |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 306 | } |
| 307 | |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 308 | void UpdateAttempter::RefreshDevicePolicy() { |
| 309 | // Lazy initialize the policy provider, or reload the latest policy data. |
| 310 | if (!policy_provider_.get()) |
| 311 | policy_provider_.reset(new policy::PolicyProvider()); |
| 312 | policy_provider_->Reload(); |
| 313 | |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 314 | const policy::DevicePolicy* device_policy = nullptr; |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 315 | if (policy_provider_->device_policy_is_loaded()) |
| 316 | device_policy = &policy_provider_->GetDevicePolicy(); |
| 317 | |
| 318 | if (device_policy) |
| 319 | LOG(INFO) << "Device policies/settings present"; |
| 320 | else |
| 321 | LOG(INFO) << "No device policies/settings present."; |
| 322 | |
| 323 | system_state_->set_device_policy(device_policy); |
David Zeuthen | 92d9c8b | 2013-09-11 10:58:11 -0700 | [diff] [blame] | 324 | system_state_->p2p_manager()->SetDevicePolicy(device_policy); |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 325 | } |
| 326 | |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 327 | void UpdateAttempter::CalculateP2PParams(bool interactive) { |
| 328 | bool use_p2p_for_downloading = false; |
| 329 | bool use_p2p_for_sharing = false; |
| 330 | |
Thiemo Nagel | 27d9d53 | 2017-05-26 16:35:20 +0200 | [diff] [blame] | 331 | // Never use p2p for downloading in interactive checks unless the developer |
| 332 | // has opted in for it via a marker file. |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 333 | // |
Thiemo Nagel | 27d9d53 | 2017-05-26 16:35:20 +0200 | [diff] [blame] | 334 | // (Why would a developer want to opt in? If they are working on the |
| 335 | // update_engine or p2p codebases so they can actually test their code.) |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 336 | |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 337 | if (system_state_ != nullptr) { |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 338 | if (!system_state_->p2p_manager()->IsP2PEnabled()) { |
| 339 | LOG(INFO) << "p2p is not enabled - disallowing p2p for both" |
| 340 | << " downloading and sharing."; |
| 341 | } else { |
| 342 | // Allow p2p for sharing, even in interactive checks. |
| 343 | use_p2p_for_sharing = true; |
| 344 | if (!interactive) { |
| 345 | LOG(INFO) << "Non-interactive check - allowing p2p for downloading"; |
| 346 | use_p2p_for_downloading = true; |
| 347 | } else { |
David Zeuthen | 052d290 | 2013-09-06 11:41:30 -0700 | [diff] [blame] | 348 | LOG(INFO) << "Forcibly disabling use of p2p for downloading " |
| 349 | << "since this update attempt is interactive."; |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 350 | } |
| 351 | } |
| 352 | } |
| 353 | |
Gilad Arnold | 74b5f55 | 2014-10-07 08:17:16 -0700 | [diff] [blame] | 354 | PayloadStateInterface* const payload_state = system_state_->payload_state(); |
| 355 | payload_state->SetUsingP2PForDownloading(use_p2p_for_downloading); |
| 356 | payload_state->SetUsingP2PForSharing(use_p2p_for_sharing); |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 357 | } |
| 358 | |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 359 | bool UpdateAttempter::CalculateUpdateParams(const string& app_version, |
| 360 | const string& omaha_url, |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 361 | const string& target_channel, |
| 362 | const string& target_version_prefix, |
Marton Hunyady | ba51c3f | 2018-04-25 15:18:10 +0200 | [diff] [blame] | 363 | bool rollback_allowed, |
Zentaro Kavanagh | 28def4f | 2019-01-15 17:15:01 -0800 | [diff] [blame] | 364 | bool rollback_data_save_requested, |
Zentaro Kavanagh | 0ef9a2f | 2018-07-02 12:05:07 -0700 | [diff] [blame] | 365 | int rollback_allowed_milestones, |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 366 | bool obey_proxies, |
Nam T. Nguyen | 7d623eb | 2014-05-13 16:06:28 -0700 | [diff] [blame] | 367 | bool interactive) { |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 368 | http_response_code_ = 0; |
Gilad Arnold | 74b5f55 | 2014-10-07 08:17:16 -0700 | [diff] [blame] | 369 | PayloadStateInterface* const payload_state = system_state_->payload_state(); |
Patrick Dubroy | 7fbbe8a | 2011-08-01 17:28:22 +0200 | [diff] [blame] | 370 | |
Alex Deymo | 749ecf1 | 2014-10-21 20:06:57 -0700 | [diff] [blame] | 371 | // Refresh the policy before computing all the update parameters. |
| 372 | RefreshDevicePolicy(); |
| 373 | |
Marton Hunyady | e58bddb | 2018-04-10 20:27:26 +0200 | [diff] [blame] | 374 | // Check whether we need to clear the rollback-happened preference after |
| 375 | // policy is available again. |
| 376 | UpdateRollbackHappened(); |
| 377 | |
Xiyuan Xia | c0e8f9a | 2017-02-22 13:19:35 -0800 | [diff] [blame] | 378 | // Update the target version prefix. |
| 379 | omaha_request_params_->set_target_version_prefix(target_version_prefix); |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 380 | |
Marton Hunyady | ba51c3f | 2018-04-25 15:18:10 +0200 | [diff] [blame] | 381 | // Set whether rollback is allowed. |
| 382 | omaha_request_params_->set_rollback_allowed(rollback_allowed); |
| 383 | |
Zentaro Kavanagh | 28def4f | 2019-01-15 17:15:01 -0800 | [diff] [blame] | 384 | // Set whether saving data over rollback is requested. |
| 385 | omaha_request_params_->set_rollback_data_save_requested( |
| 386 | rollback_data_save_requested); |
| 387 | |
Adolfo Victoria | 497044c | 2018-07-18 07:51:42 -0700 | [diff] [blame] | 388 | CalculateStagingParams(interactive); |
| 389 | // If staging_wait_time_ wasn't set, staging is off, use scattering instead. |
| 390 | if (staging_wait_time_.InSeconds() == 0) { |
| 391 | CalculateScatteringParams(interactive); |
| 392 | } |
Patrick Dubroy | 7fbbe8a | 2011-08-01 17:28:22 +0200 | [diff] [blame] | 393 | |
Zentaro Kavanagh | 0ef9a2f | 2018-07-02 12:05:07 -0700 | [diff] [blame] | 394 | // Set how many milestones of rollback are allowed. |
| 395 | omaha_request_params_->set_rollback_allowed_milestones( |
| 396 | rollback_allowed_milestones); |
| 397 | |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 398 | CalculateP2PParams(interactive); |
Gilad Arnold | 74b5f55 | 2014-10-07 08:17:16 -0700 | [diff] [blame] | 399 | if (payload_state->GetUsingP2PForDownloading() || |
| 400 | payload_state->GetUsingP2PForSharing()) { |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 401 | // OK, p2p is to be used - start it and perform housekeeping. |
| 402 | if (!StartP2PAndPerformHousekeeping()) { |
| 403 | // If this fails, disable p2p for this attempt |
| 404 | LOG(INFO) << "Forcibly disabling use of p2p since starting p2p or " |
| 405 | << "performing housekeeping failed."; |
Gilad Arnold | 74b5f55 | 2014-10-07 08:17:16 -0700 | [diff] [blame] | 406 | payload_state->SetUsingP2PForDownloading(false); |
| 407 | payload_state->SetUsingP2PForSharing(false); |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 408 | } |
| 409 | } |
| 410 | |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 411 | if (!omaha_request_params_->Init(app_version, omaha_url, interactive)) { |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 412 | LOG(ERROR) << "Unable to initialize Omaha request params."; |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 413 | return false; |
Darin Petkov | a4a8a8c | 2010-07-15 22:21:12 -0700 | [diff] [blame] | 414 | } |
Darin Petkov | 3aefa86 | 2010-12-07 14:45:00 -0800 | [diff] [blame] | 415 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 416 | // Set the target channel, if one was provided. |
| 417 | if (target_channel.empty()) { |
| 418 | LOG(INFO) << "No target channel mandated by policy."; |
| 419 | } else { |
| 420 | LOG(INFO) << "Setting target channel as mandated: " << target_channel; |
| 421 | // Pass in false for powerwash_allowed until we add it to the policy |
| 422 | // protobuf. |
Alex Deymo | d942f9d | 2015-11-06 16:11:50 -0800 | [diff] [blame] | 423 | string error_message; |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 424 | if (!omaha_request_params_->SetTargetChannel( |
| 425 | target_channel, false, &error_message)) { |
Alex Deymo | d942f9d | 2015-11-06 16:11:50 -0800 | [diff] [blame] | 426 | LOG(ERROR) << "Setting the channel failed: " << error_message; |
| 427 | } |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 428 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 429 | // Since this is the beginning of a new attempt, update the download |
| 430 | // channel. The download channel won't be updated until the next attempt, |
| 431 | // even if target channel changes meanwhile, so that how we'll know if we |
| 432 | // should cancel the current download attempt if there's such a change in |
| 433 | // target channel. |
| 434 | omaha_request_params_->UpdateDownloadChannel(); |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 435 | } |
Jae Hoon Kim | c43f6bb | 2019-07-03 12:56:52 -0700 | [diff] [blame] | 436 | |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 437 | // The function |CalculateDlcParams| makes use of the function |GetAppId| from |
| 438 | // |OmahaRequestParams|, so to ensure that the return from |GetAppId| |
| 439 | // doesn't change, no changes to the values |download_channel_|, |
| 440 | // |image_props_.product_id| and |image_props_.canary_product_id| from |
| 441 | // |omaha_request_params_| shall be made below this line. |
| 442 | CalculateDlcParams(); |
| 443 | |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 444 | omaha_request_params_->set_is_install(is_install_); |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 445 | |
Amr Aboelkher | 21ac996 | 2019-05-15 14:50:05 +0200 | [diff] [blame] | 446 | // Set Quick Fix Build token if policy is set and the device is enterprise |
| 447 | // enrolled. |
Askar Aitzhan | 570ca87 | 2019-04-24 11:16:12 +0200 | [diff] [blame] | 448 | string token; |
| 449 | if (system_state_ && system_state_->device_policy()) { |
| 450 | if (!system_state_->device_policy()->GetDeviceQuickFixBuildToken(&token)) |
| 451 | token.clear(); |
| 452 | } |
| 453 | omaha_request_params_->set_autoupdate_token(token); |
| 454 | |
Gilad Arnold | afd70ed | 2014-09-30 16:27:06 -0700 | [diff] [blame] | 455 | LOG(INFO) << "target_version_prefix = " |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 456 | << omaha_request_params_->target_version_prefix() |
Marton Hunyady | ba51c3f | 2018-04-25 15:18:10 +0200 | [diff] [blame] | 457 | << ", rollback_allowed = " |
| 458 | << omaha_request_params_->rollback_allowed() |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 459 | << ", scatter_factor_in_seconds = " |
| 460 | << utils::FormatSecs(scatter_factor_.InSeconds()); |
| 461 | |
| 462 | LOG(INFO) << "Wall Clock Based Wait Enabled = " |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 463 | << omaha_request_params_->wall_clock_based_wait_enabled() |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 464 | << ", Update Check Count Wait Enabled = " |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 465 | << omaha_request_params_->update_check_count_wait_enabled() |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 466 | << ", Waiting Period = " |
| 467 | << utils::FormatSecs( |
| 468 | omaha_request_params_->waiting_period().InSeconds()); |
Jay Srinivasan | 0a70874 | 2012-03-20 11:26:12 -0700 | [diff] [blame] | 469 | |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 470 | LOG(INFO) << "Use p2p For Downloading = " |
Gilad Arnold | 74b5f55 | 2014-10-07 08:17:16 -0700 | [diff] [blame] | 471 | << payload_state->GetUsingP2PForDownloading() |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 472 | << ", Use p2p For Sharing = " |
Gilad Arnold | 74b5f55 | 2014-10-07 08:17:16 -0700 | [diff] [blame] | 473 | << payload_state->GetUsingP2PForSharing(); |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 474 | |
Andrew de los Reyes | 4516810 | 2010-11-22 11:13:50 -0800 | [diff] [blame] | 475 | obeying_proxies_ = true; |
| 476 | if (obey_proxies || proxy_manual_checks_ == 0) { |
| 477 | LOG(INFO) << "forced to obey proxies"; |
| 478 | // If forced to obey proxies, every 20th request will not use proxies |
| 479 | proxy_manual_checks_++; |
| 480 | LOG(INFO) << "proxy manual checks: " << proxy_manual_checks_; |
| 481 | if (proxy_manual_checks_ >= kMaxConsecutiveObeyProxyRequests) { |
| 482 | proxy_manual_checks_ = 0; |
| 483 | obeying_proxies_ = false; |
| 484 | } |
| 485 | } else if (base::RandInt(0, 4) == 0) { |
| 486 | obeying_proxies_ = false; |
| 487 | } |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 488 | LOG_IF(INFO, !obeying_proxies_) |
| 489 | << "To help ensure updates work, this update check we are ignoring the " |
| 490 | << "proxy settings and using direct connections."; |
Andrew de los Reyes | 4516810 | 2010-11-22 11:13:50 -0800 | [diff] [blame] | 491 | |
Darin Petkov | 3627577 | 2010-10-01 11:40:57 -0700 | [diff] [blame] | 492 | DisableDeltaUpdateIfNeeded(); |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 493 | return true; |
| 494 | } |
| 495 | |
Gilad Arnold | b92f0df | 2013-01-10 16:32:45 -0800 | [diff] [blame] | 496 | void UpdateAttempter::CalculateScatteringParams(bool interactive) { |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 497 | // Take a copy of the old scatter value before we update it, as |
| 498 | // we need to update the waiting period if this value changes. |
| 499 | TimeDelta old_scatter_factor = scatter_factor_; |
Jay Srinivasan | 6f6ea00 | 2012-12-14 11:26:28 -0800 | [diff] [blame] | 500 | const policy::DevicePolicy* device_policy = system_state_->device_policy(); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 501 | if (device_policy) { |
Ben Chan | 9abb763 | 2014-08-07 00:10:53 -0700 | [diff] [blame] | 502 | int64_t new_scatter_factor_in_secs = 0; |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 503 | device_policy->GetScatterFactorInSeconds(&new_scatter_factor_in_secs); |
Alex Vakulenko | d2779df | 2014-06-16 13:19:00 -0700 | [diff] [blame] | 504 | if (new_scatter_factor_in_secs < 0) // sanitize input, just in case. |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 505 | new_scatter_factor_in_secs = 0; |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 506 | scatter_factor_ = TimeDelta::FromSeconds(new_scatter_factor_in_secs); |
| 507 | } |
| 508 | |
| 509 | bool is_scatter_enabled = false; |
| 510 | if (scatter_factor_.InSeconds() == 0) { |
| 511 | LOG(INFO) << "Scattering disabled since scatter factor is set to 0"; |
Gilad Arnold | b92f0df | 2013-01-10 16:32:45 -0800 | [diff] [blame] | 512 | } else if (interactive) { |
| 513 | LOG(INFO) << "Scattering disabled as this is an interactive update check"; |
Alex Deymo | 46a9aae | 2016-05-04 20:20:11 -0700 | [diff] [blame] | 514 | } else if (system_state_->hardware()->IsOOBEEnabled() && |
| 515 | !system_state_->hardware()->IsOOBEComplete(nullptr)) { |
| 516 | LOG(INFO) << "Scattering disabled since OOBE is enabled but not complete " |
| 517 | "yet"; |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 518 | } else { |
| 519 | is_scatter_enabled = true; |
| 520 | LOG(INFO) << "Scattering is enabled"; |
| 521 | } |
| 522 | |
| 523 | if (is_scatter_enabled) { |
| 524 | // This means the scattering policy is turned on. |
| 525 | // Now check if we need to update the waiting period. The two cases |
| 526 | // in which we'd need to update the waiting period are: |
| 527 | // 1. First time in process or a scheduled check after a user-initiated one. |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 528 | // (omaha_request_params_->waiting_period will be zero in this case). |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 529 | // 2. Admin has changed the scattering policy value. |
| 530 | // (new scattering value will be different from old one in this case). |
Ben Chan | 9abb763 | 2014-08-07 00:10:53 -0700 | [diff] [blame] | 531 | int64_t wait_period_in_secs = 0; |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 532 | if (omaha_request_params_->waiting_period().InSeconds() == 0) { |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 533 | // First case. Check if we have a suitable value to set for |
| 534 | // the waiting period. |
Adolfo Victoria | d3a1e35 | 2018-07-16 11:40:47 -0700 | [diff] [blame] | 535 | if (prefs_->GetInt64(kPrefsWallClockScatteringWaitPeriod, |
| 536 | &wait_period_in_secs) && |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 537 | wait_period_in_secs > 0 && |
| 538 | wait_period_in_secs <= scatter_factor_.InSeconds()) { |
| 539 | // This means: |
| 540 | // 1. There's a persisted value for the waiting period available. |
| 541 | // 2. And that persisted value is still valid. |
| 542 | // So, in this case, we should reuse the persisted value instead of |
| 543 | // generating a new random value to improve the chances of a good |
| 544 | // distribution for scattering. |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 545 | omaha_request_params_->set_waiting_period( |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 546 | TimeDelta::FromSeconds(wait_period_in_secs)); |
| 547 | LOG(INFO) << "Using persisted wall-clock waiting period: " |
| 548 | << utils::FormatSecs( |
| 549 | omaha_request_params_->waiting_period().InSeconds()); |
Alex Vakulenko | d2779df | 2014-06-16 13:19:00 -0700 | [diff] [blame] | 550 | } else { |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 551 | // This means there's no persisted value for the waiting period |
| 552 | // available or its value is invalid given the new scatter_factor value. |
| 553 | // So, we should go ahead and regenerate a new value for the |
| 554 | // waiting period. |
| 555 | LOG(INFO) << "Persisted value not present or not valid (" |
| 556 | << utils::FormatSecs(wait_period_in_secs) |
| 557 | << ") for wall-clock waiting period."; |
| 558 | GenerateNewWaitingPeriod(); |
| 559 | } |
| 560 | } else if (scatter_factor_ != old_scatter_factor) { |
| 561 | // This means there's already a waiting period value, but we detected |
| 562 | // a change in the scattering policy value. So, we should regenerate the |
| 563 | // waiting period to make sure it's within the bounds of the new scatter |
| 564 | // factor value. |
| 565 | GenerateNewWaitingPeriod(); |
| 566 | } else { |
| 567 | // Neither the first time scattering is enabled nor the scattering value |
| 568 | // changed. Nothing to do. |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 569 | LOG(INFO) << "Keeping current wall-clock waiting period: " |
| 570 | << utils::FormatSecs( |
| 571 | omaha_request_params_->waiting_period().InSeconds()); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 572 | } |
| 573 | |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 574 | // The invariant at this point is that omaha_request_params_->waiting_period |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 575 | // is non-zero no matter which path we took above. |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 576 | LOG_IF(ERROR, omaha_request_params_->waiting_period().InSeconds() == 0) |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 577 | << "Waiting Period should NOT be zero at this point!!!"; |
| 578 | |
| 579 | // Since scattering is enabled, wall clock based wait will always be |
| 580 | // enabled. |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 581 | omaha_request_params_->set_wall_clock_based_wait_enabled(true); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 582 | |
| 583 | // If we don't have any issues in accessing the file system to update |
| 584 | // the update check count value, we'll turn that on as well. |
| 585 | bool decrement_succeeded = DecrementUpdateCheckCount(); |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 586 | omaha_request_params_->set_update_check_count_wait_enabled( |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 587 | decrement_succeeded); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 588 | } else { |
| 589 | // This means the scattering feature is turned off or disabled for |
| 590 | // this particular update check. Make sure to disable |
| 591 | // all the knobs and artifacts so that we don't invoke any scattering |
| 592 | // related code. |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 593 | omaha_request_params_->set_wall_clock_based_wait_enabled(false); |
| 594 | omaha_request_params_->set_update_check_count_wait_enabled(false); |
| 595 | omaha_request_params_->set_waiting_period(TimeDelta::FromSeconds(0)); |
Adolfo Victoria | d3a1e35 | 2018-07-16 11:40:47 -0700 | [diff] [blame] | 596 | prefs_->Delete(kPrefsWallClockScatteringWaitPeriod); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 597 | prefs_->Delete(kPrefsUpdateCheckCount); |
| 598 | // Don't delete the UpdateFirstSeenAt file as we don't want manual checks |
| 599 | // that result in no-updates (e.g. due to server side throttling) to |
| 600 | // cause update starvation by having the client generate a new |
| 601 | // UpdateFirstSeenAt for each scheduled check that follows a manual check. |
| 602 | } |
| 603 | } |
| 604 | |
| 605 | void UpdateAttempter::GenerateNewWaitingPeriod() { |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 606 | omaha_request_params_->set_waiting_period( |
| 607 | TimeDelta::FromSeconds(base::RandInt(1, scatter_factor_.InSeconds()))); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 608 | |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 609 | LOG(INFO) << "Generated new wall-clock waiting period: " |
| 610 | << utils::FormatSecs( |
| 611 | omaha_request_params_->waiting_period().InSeconds()); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 612 | |
| 613 | // Do a best-effort to persist this in all cases. Even if the persistence |
| 614 | // fails, we'll still be able to scatter based on our in-memory value. |
| 615 | // The persistence only helps in ensuring a good overall distribution |
| 616 | // across multiple devices if they tend to reboot too often. |
Gilad Arnold | 519cfc7 | 2014-10-02 10:34:54 -0700 | [diff] [blame] | 617 | system_state_->payload_state()->SetScatteringWaitPeriod( |
| 618 | omaha_request_params_->waiting_period()); |
Jay Srinivasan | 21be075 | 2012-07-25 15:44:56 -0700 | [diff] [blame] | 619 | } |
| 620 | |
Adolfo Victoria | 497044c | 2018-07-18 07:51:42 -0700 | [diff] [blame] | 621 | void UpdateAttempter::CalculateStagingParams(bool interactive) { |
| 622 | bool oobe_complete = system_state_->hardware()->IsOOBEEnabled() && |
| 623 | system_state_->hardware()->IsOOBEComplete(nullptr); |
| 624 | auto device_policy = system_state_->device_policy(); |
| 625 | StagingCase staging_case = StagingCase::kOff; |
| 626 | if (device_policy && !interactive && oobe_complete) { |
| 627 | staging_wait_time_ = omaha_request_params_->waiting_period(); |
| 628 | staging_case = CalculateStagingCase( |
| 629 | device_policy, prefs_, &staging_wait_time_, &staging_schedule_); |
| 630 | } |
| 631 | switch (staging_case) { |
| 632 | case StagingCase::kOff: |
| 633 | // Staging is off, get rid of persisted value. |
| 634 | prefs_->Delete(kPrefsWallClockStagingWaitPeriod); |
| 635 | // Set |staging_wait_time_| to its default value so scattering can still |
| 636 | // be turned on |
| 637 | staging_wait_time_ = TimeDelta(); |
| 638 | break; |
| 639 | // Let the cases fall through since they just add, and never remove, steps |
| 640 | // to turning staging on. |
| 641 | case StagingCase::kNoSavedValue: |
| 642 | prefs_->SetInt64(kPrefsWallClockStagingWaitPeriod, |
| 643 | staging_wait_time_.InDays()); |
Denis Nikitin | 8f2fa74 | 2019-05-29 10:36:52 -0700 | [diff] [blame] | 644 | FALLTHROUGH; |
Adolfo Victoria | 497044c | 2018-07-18 07:51:42 -0700 | [diff] [blame] | 645 | case StagingCase::kSetStagingFromPref: |
| 646 | omaha_request_params_->set_waiting_period(staging_wait_time_); |
Denis Nikitin | 8f2fa74 | 2019-05-29 10:36:52 -0700 | [diff] [blame] | 647 | FALLTHROUGH; |
Adolfo Victoria | 497044c | 2018-07-18 07:51:42 -0700 | [diff] [blame] | 648 | case StagingCase::kNoAction: |
| 649 | // Staging is on, enable wallclock based wait so that its values get used. |
| 650 | omaha_request_params_->set_wall_clock_based_wait_enabled(true); |
| 651 | // Use UpdateCheckCount if possible to prevent devices updating all at |
| 652 | // once. |
| 653 | omaha_request_params_->set_update_check_count_wait_enabled( |
| 654 | DecrementUpdateCheckCount()); |
| 655 | // Scattering should not be turned on if staging is on, delete the |
| 656 | // existing scattering configuration. |
| 657 | prefs_->Delete(kPrefsWallClockScatteringWaitPeriod); |
| 658 | scatter_factor_ = TimeDelta(); |
| 659 | } |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 660 | } |
| 661 | |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 662 | bool UpdateAttempter::ResetDlcPrefs(const string& dlc_id) { |
| 663 | vector<string> failures; |
| 664 | PrefsInterface* prefs = system_state_->prefs(); |
| 665 | for (auto& sub_key : |
| 666 | {kPrefsPingActive, kPrefsPingLastActive, kPrefsPingLastRollcall}) { |
Jae Hoon Kim | c1f3692 | 2020-05-11 18:20:18 -0700 | [diff] [blame] | 667 | auto key = prefs->CreateSubKey({kDlcPrefsSubDir, dlc_id, sub_key}); |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 668 | if (!prefs->Delete(key)) |
| 669 | failures.emplace_back(sub_key); |
| 670 | } |
| 671 | if (failures.size() != 0) |
| 672 | PLOG(ERROR) << "Failed to delete prefs (" << base::JoinString(failures, ",") |
| 673 | << " for DLC (" << dlc_id << ")."; |
| 674 | |
| 675 | return failures.size() == 0; |
| 676 | } |
| 677 | |
Andrew | a8d7df3 | 2020-03-15 20:10:01 -0700 | [diff] [blame] | 678 | bool UpdateAttempter::SetDlcActiveValue(bool is_active, const string& dlc_id) { |
| 679 | if (dlc_id.empty()) { |
| 680 | LOG(ERROR) << "Empty DLC ID passed."; |
| 681 | return false; |
| 682 | } |
| 683 | LOG(INFO) << "Set DLC (" << dlc_id << ") to " |
| 684 | << (is_active ? "Active" : "Inactive"); |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 685 | PrefsInterface* prefs = system_state_->prefs(); |
Andrew | a8d7df3 | 2020-03-15 20:10:01 -0700 | [diff] [blame] | 686 | if (is_active) { |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 687 | auto ping_active_key = |
Jae Hoon Kim | c1f3692 | 2020-05-11 18:20:18 -0700 | [diff] [blame] | 688 | prefs->CreateSubKey({kDlcPrefsSubDir, dlc_id, kPrefsPingActive}); |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 689 | if (!prefs->SetInt64(ping_active_key, kPingActiveValue)) { |
Andrew | a8d7df3 | 2020-03-15 20:10:01 -0700 | [diff] [blame] | 690 | LOG(ERROR) << "Failed to set the value of ping metadata '" |
| 691 | << kPrefsPingActive << "'."; |
| 692 | return false; |
| 693 | } |
| 694 | } else { |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 695 | return ResetDlcPrefs(dlc_id); |
Andrew | a8d7df3 | 2020-03-15 20:10:01 -0700 | [diff] [blame] | 696 | } |
| 697 | return true; |
| 698 | } |
| 699 | |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 700 | int64_t UpdateAttempter::GetPingMetadata(const string& metadata_key) const { |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 701 | // The first time a ping is sent, the metadata files containing the values |
| 702 | // sent back by the server still don't exist. A value of -1 is used to |
| 703 | // indicate this. |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 704 | if (!system_state_->prefs()->Exists(metadata_key)) |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 705 | return kPingNeverPinged; |
| 706 | |
| 707 | int64_t value; |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 708 | if (system_state_->prefs()->GetInt64(metadata_key, &value)) |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 709 | return value; |
| 710 | |
| 711 | // Return -2 when the file exists and there is a problem reading from it, or |
| 712 | // the value cannot be converted to an integer. |
| 713 | return kPingUnknownValue; |
| 714 | } |
| 715 | |
| 716 | void UpdateAttempter::CalculateDlcParams() { |
Amin Hassani | 2b68e6b | 2020-04-17 10:49:12 -0700 | [diff] [blame] | 717 | // Set the |dlc_ids_| only for an update. This is required to get the |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 718 | // currently installed DLC(s). |
| 719 | if (!is_install_ && |
Amin Hassani | 2b68e6b | 2020-04-17 10:49:12 -0700 | [diff] [blame] | 720 | !system_state_->dlcservice()->GetDlcsToUpdate(&dlc_ids_)) { |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 721 | LOG(INFO) << "Failed to retrieve DLC module IDs from dlcservice. Check the " |
| 722 | "state of dlcservice, will not update DLC modules."; |
| 723 | } |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 724 | PrefsInterface* prefs = system_state_->prefs(); |
| 725 | map<string, OmahaRequestParams::AppParams> dlc_apps_params; |
Amin Hassani | 2b68e6b | 2020-04-17 10:49:12 -0700 | [diff] [blame] | 726 | for (const auto& dlc_id : dlc_ids_) { |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 727 | OmahaRequestParams::AppParams dlc_params{ |
| 728 | .active_counting_type = OmahaRequestParams::kDateBased, |
| 729 | .name = dlc_id, |
| 730 | .send_ping = false}; |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 731 | if (is_install_) { |
| 732 | // In some cases, |SetDlcActiveValue| might fail to reset the DLC prefs |
| 733 | // when a DLC is uninstalled. To avoid having stale values from that |
| 734 | // scenario, we reset the metadata values on a new install request. |
| 735 | // Ignore failure to delete stale prefs. |
| 736 | ResetDlcPrefs(dlc_id); |
| 737 | SetDlcActiveValue(true, dlc_id); |
| 738 | } else { |
| 739 | // Only send the ping when the request is to update DLCs. When installing |
| 740 | // DLCs, we don't want to send the ping yet, since the DLCs might fail to |
| 741 | // install or might not really be active yet. |
| 742 | dlc_params.ping_active = kPingActiveValue; |
| 743 | auto ping_active_key = |
Jae Hoon Kim | c1f3692 | 2020-05-11 18:20:18 -0700 | [diff] [blame] | 744 | prefs->CreateSubKey({kDlcPrefsSubDir, dlc_id, kPrefsPingActive}); |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 745 | if (!prefs->GetInt64(ping_active_key, &dlc_params.ping_active) || |
| 746 | dlc_params.ping_active != kPingActiveValue) { |
| 747 | dlc_params.ping_active = kPingInactiveValue; |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 748 | } |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 749 | auto ping_last_active_key = |
Jae Hoon Kim | c1f3692 | 2020-05-11 18:20:18 -0700 | [diff] [blame] | 750 | prefs->CreateSubKey({kDlcPrefsSubDir, dlc_id, kPrefsPingLastActive}); |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 751 | dlc_params.ping_date_last_active = GetPingMetadata(ping_last_active_key); |
| 752 | |
Jae Hoon Kim | c1f3692 | 2020-05-11 18:20:18 -0700 | [diff] [blame] | 753 | auto ping_last_rollcall_key = prefs->CreateSubKey( |
| 754 | {kDlcPrefsSubDir, dlc_id, kPrefsPingLastRollcall}); |
Andrew | 065d78d | 2020-04-07 15:43:07 -0700 | [diff] [blame] | 755 | dlc_params.ping_date_last_rollcall = |
| 756 | GetPingMetadata(ping_last_rollcall_key); |
| 757 | |
| 758 | dlc_params.send_ping = true; |
Andrew | e045aef | 2020-01-08 16:29:22 -0800 | [diff] [blame] | 759 | } |
| 760 | dlc_apps_params[omaha_request_params_->GetDlcAppId(dlc_id)] = dlc_params; |
| 761 | } |
| 762 | omaha_request_params_->set_dlc_apps_params(dlc_apps_params); |
| 763 | } |
| 764 | |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 765 | void UpdateAttempter::BuildUpdateActions(bool interactive) { |
Darin Petkov | f42cc1c | 2010-09-01 09:03:02 -0700 | [diff] [blame] | 766 | CHECK(!processor_->IsRunning()); |
| 767 | processor_->set_delegate(this); |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 768 | |
Jae Hoon Kim | edb6550 | 2019-06-14 11:52:17 -0700 | [diff] [blame] | 769 | // The session ID needs to be kept throughout the update flow. The value |
| 770 | // of the session ID will reset/update only when it is a new update flow. |
| 771 | session_id_ = base::GenerateGUID(); |
| 772 | |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 773 | // Actions: |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 774 | auto update_check_fetcher = std::make_unique<LibcurlHttpFetcher>( |
| 775 | GetProxyResolver(), system_state_->hardware()); |
Alex Deymo | 33e91e7 | 2015-12-01 18:26:08 -0300 | [diff] [blame] | 776 | update_check_fetcher->set_server_to_check(ServerToCheck::kUpdate); |
Andrew de los Reyes | fb2f461 | 2011-06-09 18:21:49 -0700 | [diff] [blame] | 777 | // Try harder to connect to the network, esp when not interactive. |
| 778 | // See comment in libcurl_http_fetcher.cc. |
| 779 | update_check_fetcher->set_no_network_max_retries(interactive ? 1 : 3); |
Xiaochu Liu | 4a1173a | 2019-04-10 10:49:08 -0700 | [diff] [blame] | 780 | update_check_fetcher->set_is_update_check(true); |
Jae Hoon Kim | edb6550 | 2019-06-14 11:52:17 -0700 | [diff] [blame] | 781 | auto update_check_action = |
| 782 | std::make_unique<OmahaRequestAction>(system_state_, |
| 783 | nullptr, |
| 784 | std::move(update_check_fetcher), |
| 785 | false, |
| 786 | session_id_); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 787 | auto response_handler_action = |
| 788 | std::make_unique<OmahaResponseHandlerAction>(system_state_); |
Amin Hassani | 0882a51 | 2018-04-05 16:25:44 -0700 | [diff] [blame] | 789 | auto update_boot_flags_action = |
| 790 | std::make_unique<UpdateBootFlagsAction>(system_state_->boot_control()); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 791 | auto download_started_action = std::make_unique<OmahaRequestAction>( |
Sen Jiang | 1841408 | 2018-01-11 14:50:36 -0800 | [diff] [blame] | 792 | system_state_, |
| 793 | new OmahaEvent(OmahaEvent::kTypeUpdateDownloadStarted), |
| 794 | std::make_unique<LibcurlHttpFetcher>(GetProxyResolver(), |
| 795 | system_state_->hardware()), |
Jae Hoon Kim | edb6550 | 2019-06-14 11:52:17 -0700 | [diff] [blame] | 796 | false, |
| 797 | session_id_); |
Alex Deymo | 33e91e7 | 2015-12-01 18:26:08 -0300 | [diff] [blame] | 798 | |
Bruno Rocha | 7f9aea2 | 2011-09-12 14:31:24 -0700 | [diff] [blame] | 799 | LibcurlHttpFetcher* download_fetcher = |
Alex Deymo | 33e91e7 | 2015-12-01 18:26:08 -0300 | [diff] [blame] | 800 | new LibcurlHttpFetcher(GetProxyResolver(), system_state_->hardware()); |
| 801 | download_fetcher->set_server_to_check(ServerToCheck::kDownload); |
Sen Jiang | ee174a1 | 2017-12-21 17:38:08 -0800 | [diff] [blame] | 802 | if (interactive) |
| 803 | download_fetcher->set_max_retry_count(kDownloadMaxRetryCountInteractive); |
Jae Hoon Kim | 0ae8fe1 | 2019-06-26 14:32:50 -0700 | [diff] [blame] | 804 | download_fetcher->SetHeader(kXGoogleUpdateSessionId, session_id_); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 805 | auto download_action = |
| 806 | std::make_unique<DownloadAction>(prefs_, |
| 807 | system_state_->boot_control(), |
| 808 | system_state_->hardware(), |
| 809 | system_state_, |
| 810 | download_fetcher, // passes ownership |
| 811 | interactive); |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 812 | download_action->set_delegate(this); |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 813 | |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 814 | auto download_finished_action = std::make_unique<OmahaRequestAction>( |
| 815 | system_state_, |
| 816 | new OmahaEvent(OmahaEvent::kTypeUpdateDownloadFinished), |
| 817 | std::make_unique<LibcurlHttpFetcher>(GetProxyResolver(), |
| 818 | system_state_->hardware()), |
Jae Hoon Kim | edb6550 | 2019-06-14 11:52:17 -0700 | [diff] [blame] | 819 | false, |
| 820 | session_id_); |
Tianjie | 24f9609 | 2020-06-30 12:26:25 -0700 | [diff] [blame] | 821 | auto filesystem_verifier_action = std::make_unique<FilesystemVerifierAction>( |
| 822 | system_state_->boot_control()->GetDynamicPartitionControl()); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 823 | auto update_complete_action = std::make_unique<OmahaRequestAction>( |
| 824 | system_state_, |
| 825 | new OmahaEvent(OmahaEvent::kTypeUpdateComplete), |
| 826 | std::make_unique<LibcurlHttpFetcher>(GetProxyResolver(), |
| 827 | system_state_->hardware()), |
Jae Hoon Kim | edb6550 | 2019-06-14 11:52:17 -0700 | [diff] [blame] | 828 | false, |
| 829 | session_id_); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 830 | |
| 831 | auto postinstall_runner_action = std::make_unique<PostinstallRunnerAction>( |
| 832 | system_state_->boot_control(), system_state_->hardware()); |
| 833 | postinstall_runner_action->set_delegate(this); |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 834 | |
| 835 | // Bond them together. We have to use the leaf-types when calling |
| 836 | // BondActions(). |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 837 | BondActions(update_check_action.get(), response_handler_action.get()); |
| 838 | BondActions(response_handler_action.get(), download_action.get()); |
| 839 | BondActions(download_action.get(), filesystem_verifier_action.get()); |
| 840 | BondActions(filesystem_verifier_action.get(), |
| 841 | postinstall_runner_action.get()); |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 842 | |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 843 | processor_->EnqueueAction(std::move(update_check_action)); |
| 844 | processor_->EnqueueAction(std::move(response_handler_action)); |
Amin Hassani | 0882a51 | 2018-04-05 16:25:44 -0700 | [diff] [blame] | 845 | processor_->EnqueueAction(std::move(update_boot_flags_action)); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 846 | processor_->EnqueueAction(std::move(download_started_action)); |
| 847 | processor_->EnqueueAction(std::move(download_action)); |
| 848 | processor_->EnqueueAction(std::move(download_finished_action)); |
| 849 | processor_->EnqueueAction(std::move(filesystem_verifier_action)); |
| 850 | processor_->EnqueueAction(std::move(postinstall_runner_action)); |
| 851 | processor_->EnqueueAction(std::move(update_complete_action)); |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 852 | } |
| 853 | |
Chris Sosa | 44b9b7e | 2014-04-02 13:53:46 -0700 | [diff] [blame] | 854 | bool UpdateAttempter::Rollback(bool powerwash) { |
Colin Howes | 978c108 | 2018-12-03 11:46:12 -0800 | [diff] [blame] | 855 | is_install_ = false; |
Chris Sosa | 44b9b7e | 2014-04-02 13:53:46 -0700 | [diff] [blame] | 856 | if (!CanRollback()) { |
| 857 | return false; |
| 858 | } |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 859 | |
Chris Sosa | 44b9b7e | 2014-04-02 13:53:46 -0700 | [diff] [blame] | 860 | // Extra check for enterprise-enrolled devices since they don't support |
| 861 | // powerwash. |
| 862 | if (powerwash) { |
| 863 | // Enterprise-enrolled devices have an empty owner in their device policy. |
| 864 | string owner; |
| 865 | RefreshDevicePolicy(); |
| 866 | const policy::DevicePolicy* device_policy = system_state_->device_policy(); |
| 867 | if (device_policy && (!device_policy->GetOwner(&owner) || owner.empty())) { |
| 868 | LOG(ERROR) << "Enterprise device detected. " |
| 869 | << "Cannot perform a powerwash for enterprise devices."; |
| 870 | return false; |
| 871 | } |
| 872 | } |
| 873 | |
| 874 | processor_->set_delegate(this); |
Chris Sosa | aa18e16 | 2013-06-20 13:20:30 -0700 | [diff] [blame] | 875 | |
Chris Sosa | 28e479c | 2013-07-12 11:39:53 -0700 | [diff] [blame] | 876 | // Initialize the default request params. |
| 877 | if (!omaha_request_params_->Init("", "", true)) { |
| 878 | LOG(ERROR) << "Unable to initialize Omaha request params."; |
| 879 | return false; |
| 880 | } |
| 881 | |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 882 | LOG(INFO) << "Setting rollback options."; |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 883 | install_plan_.reset(new InstallPlan()); |
| 884 | install_plan_->target_slot = GetRollbackSlot(); |
| 885 | install_plan_->source_slot = system_state_->boot_control()->GetCurrentSlot(); |
Chris Sosa | 76a29ae | 2013-07-11 17:59:24 -0700 | [diff] [blame] | 886 | |
Alex Deymo | 706a5ab | 2015-11-23 17:48:30 -0300 | [diff] [blame] | 887 | TEST_AND_RETURN_FALSE( |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 888 | install_plan_->LoadPartitionsFromSlots(system_state_->boot_control())); |
| 889 | install_plan_->powerwash_required = powerwash; |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 890 | |
| 891 | LOG(INFO) << "Using this install plan:"; |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 892 | install_plan_->Dump(); |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 893 | |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 894 | auto install_plan_action = |
| 895 | std::make_unique<InstallPlanAction>(*install_plan_); |
| 896 | auto postinstall_runner_action = std::make_unique<PostinstallRunnerAction>( |
| 897 | system_state_->boot_control(), system_state_->hardware()); |
| 898 | postinstall_runner_action->set_delegate(this); |
| 899 | BondActions(install_plan_action.get(), postinstall_runner_action.get()); |
| 900 | processor_->EnqueueAction(std::move(install_plan_action)); |
| 901 | processor_->EnqueueAction(std::move(postinstall_runner_action)); |
Chris Sosa | aa18e16 | 2013-06-20 13:20:30 -0700 | [diff] [blame] | 902 | |
| 903 | // Update the payload state for Rollback. |
| 904 | system_state_->payload_state()->Rollback(); |
| 905 | |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 906 | SetStatusAndNotify(UpdateStatus::ATTEMPTING_ROLLBACK); |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 907 | |
Amin Hassani | 0882a51 | 2018-04-05 16:25:44 -0700 | [diff] [blame] | 908 | ScheduleProcessingStart(); |
Chris Sosa | aa18e16 | 2013-06-20 13:20:30 -0700 | [diff] [blame] | 909 | return true; |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 910 | } |
| 911 | |
Alex Vakulenko | 59e253e | 2014-02-24 10:40:21 -0800 | [diff] [blame] | 912 | bool UpdateAttempter::CanRollback() const { |
Chris Sosa | 44b9b7e | 2014-04-02 13:53:46 -0700 | [diff] [blame] | 913 | // We can only rollback if the update_engine isn't busy and we have a valid |
| 914 | // rollback partition. |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 915 | return (status_ == UpdateStatus::IDLE && |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 916 | GetRollbackSlot() != BootControlInterface::kInvalidSlot); |
Alex Vakulenko | 2bddadd | 2014-03-27 13:23:46 -0700 | [diff] [blame] | 917 | } |
| 918 | |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 919 | BootControlInterface::Slot UpdateAttempter::GetRollbackSlot() const { |
| 920 | LOG(INFO) << "UpdateAttempter::GetRollbackSlot"; |
| 921 | const unsigned int num_slots = system_state_->boot_control()->GetNumSlots(); |
| 922 | const BootControlInterface::Slot current_slot = |
| 923 | system_state_->boot_control()->GetCurrentSlot(); |
Alex Vakulenko | 59e253e | 2014-02-24 10:40:21 -0800 | [diff] [blame] | 924 | |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 925 | LOG(INFO) << " Installed slots: " << num_slots; |
| 926 | LOG(INFO) << " Booted from slot: " |
| 927 | << BootControlInterface::SlotName(current_slot); |
Alex Vakulenko | 59e253e | 2014-02-24 10:40:21 -0800 | [diff] [blame] | 928 | |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 929 | if (current_slot == BootControlInterface::kInvalidSlot || num_slots < 2) { |
| 930 | LOG(INFO) << "Device is not updateable."; |
| 931 | return BootControlInterface::kInvalidSlot; |
Alex Vakulenko | 59e253e | 2014-02-24 10:40:21 -0800 | [diff] [blame] | 932 | } |
| 933 | |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 934 | vector<BootControlInterface::Slot> bootable_slots; |
Alex Deymo | f7ead81 | 2015-10-23 17:37:27 -0700 | [diff] [blame] | 935 | for (BootControlInterface::Slot slot = 0; slot < num_slots; slot++) { |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 936 | if (slot != current_slot && |
| 937 | system_state_->boot_control()->IsSlotBootable(slot)) { |
| 938 | LOG(INFO) << "Found bootable slot " |
| 939 | << BootControlInterface::SlotName(slot); |
| 940 | return slot; |
Alex Vakulenko | 59e253e | 2014-02-24 10:40:21 -0800 | [diff] [blame] | 941 | } |
| 942 | } |
Alex Deymo | 763e7db | 2015-08-27 21:08:08 -0700 | [diff] [blame] | 943 | LOG(INFO) << "No other bootable slot found."; |
| 944 | return BootControlInterface::kInvalidSlot; |
Alex Vakulenko | 2bddadd | 2014-03-27 13:23:46 -0700 | [diff] [blame] | 945 | } |
| 946 | |
Aaron Wood | 081c023 | 2017-10-19 17:14:58 -0700 | [diff] [blame] | 947 | bool UpdateAttempter::CheckForUpdate(const string& app_version, |
Jay Srinivasan | e73acab | 2012-07-10 14:34:03 -0700 | [diff] [blame] | 948 | const string& omaha_url, |
Aaron Wood | 081c023 | 2017-10-19 17:14:58 -0700 | [diff] [blame] | 949 | UpdateAttemptFlags flags) { |
Jae Hoon Kim | c437ea5 | 2019-07-11 11:20:38 -0700 | [diff] [blame] | 950 | if (status_ != UpdateStatus::IDLE) { |
| 951 | LOG(INFO) << "Refusing to do an update as there is an " |
| 952 | << (is_install_ ? "install" : "update") |
| 953 | << " already in progress."; |
Aaron Wood | 081c023 | 2017-10-19 17:14:58 -0700 | [diff] [blame] | 954 | return false; |
| 955 | } |
| 956 | |
Jae Hoon Kim | c437ea5 | 2019-07-11 11:20:38 -0700 | [diff] [blame] | 957 | bool interactive = !(flags & UpdateAttemptFlags::kFlagNonInteractive); |
Jae Hoon Kim | c437ea5 | 2019-07-11 11:20:38 -0700 | [diff] [blame] | 958 | is_install_ = false; |
| 959 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 960 | LOG(INFO) << "Forced update check requested."; |
David Pursell | 02c1864 | 2014-11-06 11:26:11 -0800 | [diff] [blame] | 961 | forced_app_version_.clear(); |
| 962 | forced_omaha_url_.clear(); |
| 963 | |
| 964 | // Certain conditions must be met to allow setting custom version and update |
| 965 | // server URLs. However, kScheduledAUTestURLRequest and kAUTestURLRequest are |
| 966 | // always allowed regardless of device state. |
| 967 | if (IsAnyUpdateSourceAllowed()) { |
| 968 | forced_app_version_ = app_version; |
| 969 | forced_omaha_url_ = omaha_url; |
| 970 | } |
| 971 | if (omaha_url == kScheduledAUTestURLRequest) { |
Alex Deymo | ac41a82 | 2015-09-15 20:52:53 -0700 | [diff] [blame] | 972 | forced_omaha_url_ = constants::kOmahaDefaultAUTestURL; |
David Pursell | 02c1864 | 2014-11-06 11:26:11 -0800 | [diff] [blame] | 973 | // Pretend that it's not user-initiated even though it is, |
| 974 | // so as to test scattering logic, etc. which get kicked off |
| 975 | // only in scheduled update checks. |
| 976 | interactive = false; |
| 977 | } else if (omaha_url == kAUTestURLRequest) { |
Alex Deymo | ac41a82 | 2015-09-15 20:52:53 -0700 | [diff] [blame] | 978 | forced_omaha_url_ = constants::kOmahaDefaultAUTestURL; |
David Pursell | 02c1864 | 2014-11-06 11:26:11 -0800 | [diff] [blame] | 979 | } |
| 980 | |
Aaron Wood | 081c023 | 2017-10-19 17:14:58 -0700 | [diff] [blame] | 981 | if (interactive) { |
| 982 | // Use the passed-in update attempt flags for this update attempt instead |
| 983 | // of the previously set ones. |
| 984 | current_update_attempt_flags_ = flags; |
| 985 | // Note: The caching for non-interactive update checks happens in |
Jae Hoon Kim | 75daa38 | 2019-07-02 11:17:24 -0700 | [diff] [blame] | 986 | // |OnUpdateScheduled()|. |
Aaron Wood | 081c023 | 2017-10-19 17:14:58 -0700 | [diff] [blame] | 987 | } |
| 988 | |
Jae Hoon Kim | 2b73ac2 | 2019-07-02 11:17:24 -0700 | [diff] [blame] | 989 | // |forced_update_pending_callback_| should always be set, but even in the |
| 990 | // case that it is not, we still return true indicating success because the |
| 991 | // scheduled periodic check will pick up these changes. |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 992 | if (forced_update_pending_callback_.get()) { |
Jae Hoon Kim | 2b73ac2 | 2019-07-02 11:17:24 -0700 | [diff] [blame] | 993 | // Always call |ScheduleUpdates()| before forcing an update. This is because |
| 994 | // we need an update to be scheduled for the |
| 995 | // |forced_update_pending_callback_| to have an effect. Here we don't need |
| 996 | // to care about the return value from |ScheduleUpdate()|. |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 997 | ScheduleUpdates(); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 998 | forced_update_pending_callback_->Run(true, interactive); |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 999 | } |
Aaron Wood | 081c023 | 2017-10-19 17:14:58 -0700 | [diff] [blame] | 1000 | return true; |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1001 | } |
| 1002 | |
Amin Hassani | 2b68e6b | 2020-04-17 10:49:12 -0700 | [diff] [blame] | 1003 | bool UpdateAttempter::CheckForInstall(const vector<string>& dlc_ids, |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 1004 | const string& omaha_url) { |
Jae Hoon Kim | c437ea5 | 2019-07-11 11:20:38 -0700 | [diff] [blame] | 1005 | if (status_ != UpdateStatus::IDLE) { |
| 1006 | LOG(INFO) << "Refusing to do an install as there is an " |
| 1007 | << (is_install_ ? "install" : "update") |
| 1008 | << " already in progress."; |
| 1009 | return false; |
| 1010 | } |
| 1011 | |
Amin Hassani | 2b68e6b | 2020-04-17 10:49:12 -0700 | [diff] [blame] | 1012 | dlc_ids_ = dlc_ids; |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 1013 | is_install_ = true; |
| 1014 | forced_omaha_url_.clear(); |
| 1015 | |
| 1016 | // Certain conditions must be met to allow setting custom version and update |
| 1017 | // server URLs. However, kScheduledAUTestURLRequest and kAUTestURLRequest are |
| 1018 | // always allowed regardless of device state. |
| 1019 | if (IsAnyUpdateSourceAllowed()) { |
| 1020 | forced_omaha_url_ = omaha_url; |
| 1021 | } |
Jae Hoon Kim | c43f6bb | 2019-07-03 12:56:52 -0700 | [diff] [blame] | 1022 | |
| 1023 | if (omaha_url == kScheduledAUTestURLRequest || |
| 1024 | omaha_url == kAUTestURLRequest) { |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 1025 | forced_omaha_url_ = constants::kOmahaDefaultAUTestURL; |
| 1026 | } |
| 1027 | |
Jae Hoon Kim | 2b73ac2 | 2019-07-02 11:17:24 -0700 | [diff] [blame] | 1028 | // |forced_update_pending_callback_| should always be set, but even in the |
| 1029 | // case that it is not, we still return true indicating success because the |
| 1030 | // scheduled periodic check will pick up these changes. |
| 1031 | if (forced_update_pending_callback_.get()) { |
| 1032 | // Always call |ScheduleUpdates()| before forcing an update. This is because |
| 1033 | // we need an update to be scheduled for the |
| 1034 | // |forced_update_pending_callback_| to have an effect. Here we don't need |
| 1035 | // to care about the return value from |ScheduleUpdate()|. |
| 1036 | ScheduleUpdates(); |
| 1037 | forced_update_pending_callback_->Run(true, true); |
Xiaochu Liu | 88d9038 | 2018-08-29 16:09:11 -0700 | [diff] [blame] | 1038 | } |
| 1039 | return true; |
| 1040 | } |
| 1041 | |
Darin Petkov | 296889c | 2010-07-23 16:20:54 -0700 | [diff] [blame] | 1042 | bool UpdateAttempter::RebootIfNeeded() { |
Amin Hassani | e79eab6 | 2018-03-06 11:55:57 -0800 | [diff] [blame] | 1043 | #ifdef __ANDROID__ |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1044 | if (status_ != UpdateStatus::UPDATED_NEED_REBOOT) { |
Darin Petkov | 296889c | 2010-07-23 16:20:54 -0700 | [diff] [blame] | 1045 | LOG(INFO) << "Reboot requested, but status is " |
| 1046 | << UpdateStatusToString(status_) << ", so not rebooting."; |
| 1047 | return false; |
| 1048 | } |
Amin Hassani | e79eab6 | 2018-03-06 11:55:57 -0800 | [diff] [blame] | 1049 | #endif // __ANDROID__ |
Daniel Erat | 65f1da0 | 2014-06-27 22:05:38 -0700 | [diff] [blame] | 1050 | |
Sen Jiang | b8c6a8f | 2016-06-07 17:33:17 -0700 | [diff] [blame] | 1051 | if (system_state_->power_manager()->RequestReboot()) |
Daniel Erat | 65f1da0 | 2014-06-27 22:05:38 -0700 | [diff] [blame] | 1052 | return true; |
| 1053 | |
| 1054 | return RebootDirectly(); |
Darin Petkov | 296889c | 2010-07-23 16:20:54 -0700 | [diff] [blame] | 1055 | } |
| 1056 | |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 1057 | void UpdateAttempter::WriteUpdateCompletedMarker() { |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 1058 | string boot_id; |
| 1059 | if (!utils::GetBootId(&boot_id)) |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 1060 | return; |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 1061 | prefs_->SetString(kPrefsUpdateCompletedOnBootId, boot_id); |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 1062 | |
| 1063 | int64_t value = system_state_->clock()->GetBootTime().ToInternalValue(); |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 1064 | prefs_->SetInt64(kPrefsUpdateCompletedBootTime, value); |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 1065 | } |
| 1066 | |
Daniel Erat | 65f1da0 | 2014-06-27 22:05:38 -0700 | [diff] [blame] | 1067 | bool UpdateAttempter::RebootDirectly() { |
Amin Hassani | 3a4caa1 | 2019-11-06 11:12:28 -0800 | [diff] [blame] | 1068 | vector<string> command = {"/sbin/shutdown", "-r", "now"}; |
Daniel Erat | 65f1da0 | 2014-06-27 22:05:38 -0700 | [diff] [blame] | 1069 | int rc = 0; |
Amin Hassani | 3a4caa1 | 2019-11-06 11:12:28 -0800 | [diff] [blame] | 1070 | Subprocess::SynchronousExec(command, &rc, nullptr, nullptr); |
Daniel Erat | 65f1da0 | 2014-06-27 22:05:38 -0700 | [diff] [blame] | 1071 | return rc == 0; |
| 1072 | } |
| 1073 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 1074 | void UpdateAttempter::OnUpdateScheduled(EvalStatus status, |
| 1075 | const UpdateCheckParams& params) { |
| 1076 | waiting_for_scheduled_check_ = false; |
| 1077 | |
| 1078 | if (status == EvalStatus::kSucceeded) { |
| 1079 | if (!params.updates_enabled) { |
| 1080 | LOG(WARNING) << "Updates permanently disabled."; |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1081 | // Signal disabled status, then switch right back to idle. This is |
| 1082 | // necessary for ensuring that observers waiting for a signal change will |
| 1083 | // actually notice one on subsequent calls. Note that we don't need to |
| 1084 | // re-schedule a check in this case as updates are permanently disabled; |
| 1085 | // further (forced) checks may still initiate a scheduling call. |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1086 | SetStatusAndNotify(UpdateStatus::DISABLED); |
| 1087 | SetStatusAndNotify(UpdateStatus::IDLE); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 1088 | return; |
| 1089 | } |
| 1090 | |
Amin Hassani | ed37d68 | 2018-04-06 13:22:00 -0700 | [diff] [blame] | 1091 | LOG(INFO) << "Running " << (params.interactive ? "interactive" : "periodic") |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 1092 | << " update."; |
| 1093 | |
Amin Hassani | ed37d68 | 2018-04-06 13:22:00 -0700 | [diff] [blame] | 1094 | if (!params.interactive) { |
Aaron Wood | 081c023 | 2017-10-19 17:14:58 -0700 | [diff] [blame] | 1095 | // Cache the update attempt flags that will be used by this update attempt |
| 1096 | // so that they can't be changed mid-way through. |
| 1097 | current_update_attempt_flags_ = update_attempt_flags_; |
| 1098 | } |
| 1099 | |
Aaron Wood | bf5a252 | 2017-10-04 10:58:36 -0700 | [diff] [blame] | 1100 | LOG(INFO) << "Update attempt flags in use = 0x" << std::hex |
| 1101 | << current_update_attempt_flags_; |
| 1102 | |
Amin Hassani | ed37d68 | 2018-04-06 13:22:00 -0700 | [diff] [blame] | 1103 | Update(forced_app_version_, |
| 1104 | forced_omaha_url_, |
| 1105 | params.target_channel, |
| 1106 | params.target_version_prefix, |
Marton Hunyady | ba51c3f | 2018-04-25 15:18:10 +0200 | [diff] [blame] | 1107 | params.rollback_allowed, |
Zentaro Kavanagh | 28def4f | 2019-01-15 17:15:01 -0800 | [diff] [blame] | 1108 | params.rollback_data_save_requested, |
Zentaro Kavanagh | 0ef9a2f | 2018-07-02 12:05:07 -0700 | [diff] [blame] | 1109 | params.rollback_allowed_milestones, |
Marton Hunyady | ba51c3f | 2018-04-25 15:18:10 +0200 | [diff] [blame] | 1110 | /*obey_proxies=*/false, |
Amin Hassani | ed37d68 | 2018-04-06 13:22:00 -0700 | [diff] [blame] | 1111 | params.interactive); |
Alex Deymo | 7147908 | 2016-03-25 17:54:28 -0700 | [diff] [blame] | 1112 | // Always clear the forced app_version and omaha_url after an update attempt |
| 1113 | // so the next update uses the defaults. |
| 1114 | forced_app_version_.clear(); |
| 1115 | forced_omaha_url_.clear(); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 1116 | } else { |
| 1117 | LOG(WARNING) |
| 1118 | << "Update check scheduling failed (possibly timed out); retrying."; |
| 1119 | ScheduleUpdates(); |
| 1120 | } |
| 1121 | |
| 1122 | // This check ensures that future update checks will be or are already |
| 1123 | // scheduled. The check should never fail. A check failure means that there's |
| 1124 | // a bug that will most likely prevent further automatic update checks. It |
| 1125 | // seems better to crash in such cases and restart the update_engine daemon |
| 1126 | // into, hopefully, a known good state. |
Jae Hoon Kim | ba2fdce | 2019-07-11 13:18:58 -0700 | [diff] [blame] | 1127 | CHECK(IsBusyOrUpdateScheduled()); |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 1128 | } |
| 1129 | |
| 1130 | void UpdateAttempter::UpdateLastCheckedTime() { |
| 1131 | last_checked_time_ = system_state_->clock()->GetWallclockTime().ToTimeT(); |
| 1132 | } |
| 1133 | |
Marton Hunyady | e58bddb | 2018-04-10 20:27:26 +0200 | [diff] [blame] | 1134 | void UpdateAttempter::UpdateRollbackHappened() { |
| 1135 | DCHECK(system_state_); |
| 1136 | DCHECK(system_state_->payload_state()); |
| 1137 | DCHECK(policy_provider_); |
| 1138 | if (system_state_->payload_state()->GetRollbackHappened() && |
| 1139 | (policy_provider_->device_policy_is_loaded() || |
| 1140 | policy_provider_->IsConsumerDevice())) { |
| 1141 | // Rollback happened, but we already went through OOBE and policy is |
| 1142 | // present or it's a consumer device. |
| 1143 | system_state_->payload_state()->SetRollbackHappened(false); |
| 1144 | } |
| 1145 | } |
| 1146 | |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1147 | void UpdateAttempter::ProcessingDoneInternal(const ActionProcessor* processor, |
| 1148 | ErrorCode code) { |
Chris Sosa | 4f8ee27 | 2012-11-30 13:01:54 -0800 | [diff] [blame] | 1149 | // Reset cpu shares back to normal. |
Alex Deymo | ab0d976 | 2016-02-02 10:52:56 -0800 | [diff] [blame] | 1150 | cpu_limiter_.StopLimiter(); |
Darin Petkov | c6c135c | 2010-08-11 13:36:18 -0700 | [diff] [blame] | 1151 | |
Amin Hassani | ecb60d3 | 2019-06-17 18:09:10 -0700 | [diff] [blame] | 1152 | ResetInteractivityFlags(); |
Adolfo Victoria | 20262ad | 2018-08-06 10:40:11 -0700 | [diff] [blame] | 1153 | |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1154 | if (status_ == UpdateStatus::REPORTING_ERROR_EVENT) { |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1155 | LOG(INFO) << "Error event sent."; |
Gilad Arnold | 1ebd813 | 2012-03-05 10:19:29 -0800 | [diff] [blame] | 1156 | |
Amin Hassani | ecb60d3 | 2019-06-17 18:09:10 -0700 | [diff] [blame] | 1157 | // Inform scheduler of new status. |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1158 | SetStatusAndNotify(UpdateStatus::IDLE); |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1159 | ScheduleUpdates(); |
Gilad Arnold | 1ebd813 | 2012-03-05 10:19:29 -0800 | [diff] [blame] | 1160 | |
Andrew de los Reyes | c1d5c93 | 2011-04-20 17:15:47 -0700 | [diff] [blame] | 1161 | if (!fake_update_success_) { |
| 1162 | return; |
| 1163 | } |
| 1164 | LOG(INFO) << "Booted from FW B and tried to install new firmware, " |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 1165 | "so requesting reboot from user."; |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1166 | } |
| 1167 | |
Sen Jiang | 89e24c1 | 2018-03-22 18:05:44 -0700 | [diff] [blame] | 1168 | attempt_error_code_ = utils::GetBaseErrorCode(code); |
| 1169 | |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1170 | if (code != ErrorCode::kSuccess) { |
| 1171 | if (ScheduleErrorEventAction()) { |
Colin Howes | ac170d9 | 2018-11-20 16:29:28 -0800 | [diff] [blame] | 1172 | return; |
| 1173 | } |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1174 | LOG(INFO) << "No update."; |
| 1175 | SetStatusAndNotify(UpdateStatus::IDLE); |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1176 | ScheduleUpdates(); |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1177 | return; |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 1178 | } |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1179 | |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1180 | ReportTimeToUpdateAppliedMetric(); |
| 1181 | prefs_->SetInt64(kPrefsDeltaUpdateFailures, 0); |
| 1182 | prefs_->SetString(kPrefsPreviousVersion, |
| 1183 | omaha_request_params_->app_version()); |
| 1184 | DeltaPerformer::ResetUpdateProgress(prefs_, false); |
| 1185 | |
| 1186 | system_state_->payload_state()->UpdateSucceeded(); |
| 1187 | |
| 1188 | // Since we're done with scattering fully at this point, this is the |
| 1189 | // safest point delete the state files, as we're sure that the status is |
| 1190 | // set to reboot (which means no more updates will be applied until reboot) |
| 1191 | // This deletion is required for correctness as we want the next update |
| 1192 | // check to re-create a new random number for the update check count. |
| 1193 | // Similarly, we also delete the wall-clock-wait period that was persisted |
| 1194 | // so that we start with a new random value for the next update check |
| 1195 | // after reboot so that the same device is not favored or punished in any |
| 1196 | // way. |
| 1197 | prefs_->Delete(kPrefsUpdateCheckCount); |
| 1198 | system_state_->payload_state()->SetScatteringWaitPeriod(TimeDelta()); |
| 1199 | system_state_->payload_state()->SetStagingWaitPeriod(TimeDelta()); |
| 1200 | prefs_->Delete(kPrefsUpdateFirstSeenAt); |
| 1201 | |
| 1202 | // Note: below this comment should only be on |ErrorCode::kSuccess|. |
| 1203 | if (is_install_) { |
| 1204 | ProcessingDoneInstall(processor, code); |
| 1205 | } else { |
| 1206 | ProcessingDoneUpdate(processor, code); |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 1207 | } |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1208 | } |
| 1209 | |
Jae Hoon Kim | 7fdfbf1 | 2020-04-10 18:15:50 -0700 | [diff] [blame] | 1210 | vector<string> UpdateAttempter::GetSuccessfulDlcIds() { |
| 1211 | vector<string> dlc_ids; |
| 1212 | for (const auto& pr : omaha_request_params_->dlc_apps_params()) |
| 1213 | if (pr.second.updated) |
| 1214 | dlc_ids.push_back(pr.second.name); |
| 1215 | return dlc_ids; |
| 1216 | } |
| 1217 | |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1218 | void UpdateAttempter::ProcessingDoneInstall(const ActionProcessor* processor, |
| 1219 | ErrorCode code) { |
Jae Hoon Kim | 7fdfbf1 | 2020-04-10 18:15:50 -0700 | [diff] [blame] | 1220 | if (!system_state_->dlcservice()->InstallCompleted(GetSuccessfulDlcIds())) |
| 1221 | LOG(WARNING) << "dlcservice didn't successfully handle install completion."; |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1222 | SetStatusAndNotify(UpdateStatus::IDLE); |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1223 | ScheduleUpdates(); |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1224 | LOG(INFO) << "DLC successfully installed, no reboot needed."; |
| 1225 | } |
| 1226 | |
| 1227 | void UpdateAttempter::ProcessingDoneUpdate(const ActionProcessor* processor, |
| 1228 | ErrorCode code) { |
| 1229 | WriteUpdateCompletedMarker(); |
| 1230 | |
Jae Hoon Kim | 7fdfbf1 | 2020-04-10 18:15:50 -0700 | [diff] [blame] | 1231 | if (!system_state_->dlcservice()->UpdateCompleted(GetSuccessfulDlcIds())) |
| 1232 | LOG(WARNING) << "dlcservice didn't successfully handle update completion."; |
Jae Hoon Kim | ed3fcc0 | 2019-07-11 14:35:38 -0700 | [diff] [blame] | 1233 | SetStatusAndNotify(UpdateStatus::UPDATED_NEED_REBOOT); |
| 1234 | ScheduleUpdates(); |
| 1235 | LOG(INFO) << "Update successfully applied, waiting to reboot."; |
| 1236 | |
| 1237 | // |install_plan_| is null during rollback operations, and the stats don't |
| 1238 | // make much sense then anyway. |
| 1239 | if (install_plan_) { |
| 1240 | // Generate an unique payload identifier. |
| 1241 | string target_version_uid; |
| 1242 | for (const auto& payload : install_plan_->payloads) { |
| 1243 | target_version_uid += brillo::data_encoding::Base64Encode(payload.hash) + |
| 1244 | ":" + payload.metadata_signature + ":"; |
| 1245 | } |
| 1246 | |
| 1247 | // If we just downloaded a rollback image, we should preserve this fact |
| 1248 | // over the following powerwash. |
| 1249 | if (install_plan_->is_rollback) { |
| 1250 | system_state_->payload_state()->SetRollbackHappened(true); |
| 1251 | system_state_->metrics_reporter()->ReportEnterpriseRollbackMetrics( |
| 1252 | /*success=*/true, install_plan_->version); |
| 1253 | } |
| 1254 | |
| 1255 | // Expect to reboot into the new version to send the proper metric during |
| 1256 | // next boot. |
| 1257 | system_state_->payload_state()->ExpectRebootInNewVersion( |
| 1258 | target_version_uid); |
| 1259 | } else { |
| 1260 | // If we just finished a rollback, then we expect to have no Omaha |
| 1261 | // response. Otherwise, it's an error. |
| 1262 | if (system_state_->payload_state()->GetRollbackVersion().empty()) { |
| 1263 | LOG(ERROR) << "Can't send metrics because there was no Omaha response"; |
| 1264 | } |
| 1265 | } |
| 1266 | } |
| 1267 | |
| 1268 | // Delegate methods: |
| 1269 | void UpdateAttempter::ProcessingDone(const ActionProcessor* processor, |
| 1270 | ErrorCode code) { |
| 1271 | LOG(INFO) << "Processing Done."; |
| 1272 | ProcessingDoneInternal(processor, code); |
| 1273 | |
| 1274 | // Note: do cleanups here for any variables that need to be reset after a |
| 1275 | // failure, error, update, or install. |
| 1276 | is_install_ = false; |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1277 | } |
| 1278 | |
| 1279 | void UpdateAttempter::ProcessingStopped(const ActionProcessor* processor) { |
Chris Sosa | 4f8ee27 | 2012-11-30 13:01:54 -0800 | [diff] [blame] | 1280 | // Reset cpu shares back to normal. |
Alex Deymo | ab0d976 | 2016-02-02 10:52:56 -0800 | [diff] [blame] | 1281 | cpu_limiter_.StopLimiter(); |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1282 | download_progress_ = 0.0; |
Amin Hassani | ecb60d3 | 2019-06-17 18:09:10 -0700 | [diff] [blame] | 1283 | |
| 1284 | ResetInteractivityFlags(); |
| 1285 | |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1286 | SetStatusAndNotify(UpdateStatus::IDLE); |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1287 | ScheduleUpdates(); |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 1288 | error_event_.reset(nullptr); |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1289 | } |
| 1290 | |
| 1291 | // Called whenever an action has finished processing, either successfully |
| 1292 | // or otherwise. |
| 1293 | void UpdateAttempter::ActionCompleted(ActionProcessor* processor, |
| 1294 | AbstractAction* action, |
David Zeuthen | a99981f | 2013-04-29 13:42:47 -0700 | [diff] [blame] | 1295 | ErrorCode code) { |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 1296 | // Reset download progress regardless of whether or not the download |
| 1297 | // action succeeded. Also, get the response code from HTTP request |
| 1298 | // actions (update download as well as the initial update check |
| 1299 | // actions). |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1300 | const string type = action->Type(); |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 1301 | if (type == DownloadAction::StaticType()) { |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1302 | download_progress_ = 0.0; |
Gilad Arnold | cf175a0 | 2014-07-10 16:48:47 -0700 | [diff] [blame] | 1303 | DownloadAction* download_action = static_cast<DownloadAction*>(action); |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 1304 | http_response_code_ = download_action->GetHTTPResponseCode(); |
| 1305 | } else if (type == OmahaRequestAction::StaticType()) { |
| 1306 | OmahaRequestAction* omaha_request_action = |
Gilad Arnold | cf175a0 | 2014-07-10 16:48:47 -0700 | [diff] [blame] | 1307 | static_cast<OmahaRequestAction*>(action); |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 1308 | // If the request is not an event, then it's the update-check. |
| 1309 | if (!omaha_request_action->IsEvent()) { |
| 1310 | http_response_code_ = omaha_request_action->GetHTTPResponseCode(); |
Gilad Arnold | a6dab94 | 2014-04-25 11:46:03 -0700 | [diff] [blame] | 1311 | |
| 1312 | // Record the number of consecutive failed update checks. |
| 1313 | if (http_response_code_ == kHttpResponseInternalServerError || |
| 1314 | http_response_code_ == kHttpResponseServiceUnavailable) { |
| 1315 | consecutive_failed_update_checks_++; |
| 1316 | } else { |
| 1317 | consecutive_failed_update_checks_ = 0; |
| 1318 | } |
| 1319 | |
Weidong Guo | 421ff33 | 2017-04-17 10:08:38 -0700 | [diff] [blame] | 1320 | const OmahaResponse& omaha_response = |
| 1321 | omaha_request_action->GetOutputObject(); |
Gilad Arnold | a0258a5 | 2014-07-10 16:21:19 -0700 | [diff] [blame] | 1322 | // Store the server-dictated poll interval, if any. |
| 1323 | server_dictated_poll_interval_ = |
Weidong Guo | 421ff33 | 2017-04-17 10:08:38 -0700 | [diff] [blame] | 1324 | std::max(0, omaha_response.poll_interval); |
| 1325 | |
| 1326 | // This update is ignored by omaha request action because update over |
| 1327 | // cellular connection is not allowed. Needs to ask for user's permissions |
| 1328 | // to update. |
| 1329 | if (code == ErrorCode::kOmahaUpdateIgnoredOverCellular) { |
| 1330 | new_version_ = omaha_response.version; |
| 1331 | new_payload_size_ = 0; |
| 1332 | for (const auto& package : omaha_response.packages) { |
| 1333 | new_payload_size_ += package.size; |
| 1334 | } |
| 1335 | SetStatusAndNotify(UpdateStatus::NEED_PERMISSION_TO_UPDATE); |
| 1336 | } |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 1337 | } |
Aaron Wood | 23bd339 | 2017-10-06 14:48:25 -0700 | [diff] [blame] | 1338 | } else if (type == OmahaResponseHandlerAction::StaticType()) { |
| 1339 | // Depending on the returned error code, note that an update is available. |
| 1340 | if (code == ErrorCode::kOmahaUpdateDeferredPerPolicy || |
| 1341 | code == ErrorCode::kSuccess) { |
| 1342 | // Note that the status will be updated to DOWNLOADING when some bytes |
| 1343 | // get actually downloaded from the server and the BytesReceived |
| 1344 | // callback is invoked. This avoids notifying the user that a download |
| 1345 | // has started in cases when the server and the client are unable to |
| 1346 | // initiate the download. |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1347 | auto omaha_response_handler_action = |
| 1348 | static_cast<OmahaResponseHandlerAction*>(action); |
| 1349 | install_plan_.reset( |
| 1350 | new InstallPlan(omaha_response_handler_action->install_plan())); |
Aaron Wood | 23bd339 | 2017-10-06 14:48:25 -0700 | [diff] [blame] | 1351 | UpdateLastCheckedTime(); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1352 | new_version_ = install_plan_->version; |
Aaron Wood | 23bd339 | 2017-10-06 14:48:25 -0700 | [diff] [blame] | 1353 | new_payload_size_ = 0; |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1354 | for (const auto& payload : install_plan_->payloads) |
Aaron Wood | 23bd339 | 2017-10-06 14:48:25 -0700 | [diff] [blame] | 1355 | new_payload_size_ += payload.size; |
| 1356 | cpu_limiter_.StartLimiter(); |
| 1357 | SetStatusAndNotify(UpdateStatus::UPDATE_AVAILABLE); |
| 1358 | } |
Darin Petkov | 1023a60 | 2010-08-30 13:47:51 -0700 | [diff] [blame] | 1359 | } |
Aaron Wood | 23bd339 | 2017-10-06 14:48:25 -0700 | [diff] [blame] | 1360 | // General failure cases. |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1361 | if (code != ErrorCode::kSuccess) { |
Darin Petkov | 7ed561b | 2011-10-04 02:59:03 -0700 | [diff] [blame] | 1362 | // If the current state is at or past the download phase, count the failure |
| 1363 | // in case a switch to full update becomes necessary. Ignore network |
| 1364 | // transfer timeouts and failures. |
Amin Hassani | 89a3712 | 2018-03-23 12:59:24 -0700 | [diff] [blame] | 1365 | if (code != ErrorCode::kDownloadTransferError) { |
| 1366 | switch (status_) { |
| 1367 | case UpdateStatus::IDLE: |
| 1368 | case UpdateStatus::CHECKING_FOR_UPDATE: |
| 1369 | case UpdateStatus::UPDATE_AVAILABLE: |
| 1370 | case UpdateStatus::NEED_PERMISSION_TO_UPDATE: |
| 1371 | break; |
| 1372 | case UpdateStatus::DOWNLOADING: |
| 1373 | case UpdateStatus::VERIFYING: |
| 1374 | case UpdateStatus::FINALIZING: |
| 1375 | case UpdateStatus::UPDATED_NEED_REBOOT: |
| 1376 | case UpdateStatus::REPORTING_ERROR_EVENT: |
| 1377 | case UpdateStatus::ATTEMPTING_ROLLBACK: |
| 1378 | case UpdateStatus::DISABLED: |
| 1379 | MarkDeltaUpdateFailure(); |
| 1380 | break; |
| 1381 | } |
Darin Petkov | 3627577 | 2010-10-01 11:40:57 -0700 | [diff] [blame] | 1382 | } |
Sen Jiang | 89e24c1 | 2018-03-22 18:05:44 -0700 | [diff] [blame] | 1383 | if (code != ErrorCode::kNoUpdate) { |
| 1384 | // On failure, schedule an error event to be sent to Omaha. |
| 1385 | CreatePendingErrorEvent(action, code); |
| 1386 | } |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1387 | return; |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1388 | } |
Aaron Wood | 23bd339 | 2017-10-06 14:48:25 -0700 | [diff] [blame] | 1389 | // Find out which action completed (successfully). |
| 1390 | if (type == DownloadAction::StaticType()) { |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1391 | SetStatusAndNotify(UpdateStatus::FINALIZING); |
Amin Hassani | afd8cea | 2017-12-04 14:20:00 -0800 | [diff] [blame] | 1392 | } else if (type == FilesystemVerifierAction::StaticType()) { |
| 1393 | // Log the system properties before the postinst and after the file system |
| 1394 | // is verified. It used to be done in the postinst itself. But postinst |
| 1395 | // cannot do this anymore. On the other hand, these logs are frequently |
| 1396 | // looked at and it is preferable not to scatter them in random location in |
| 1397 | // the log and rather log it right before the postinst. The reason not do |
| 1398 | // this in the |PostinstallRunnerAction| is to prevent dependency from |
| 1399 | // libpayload_consumer to libupdate_engine. |
| 1400 | LogImageProperties(); |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1401 | } |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 1402 | } |
| 1403 | |
Alex Deymo | 542c19b | 2015-12-03 07:43:31 -0300 | [diff] [blame] | 1404 | void UpdateAttempter::BytesReceived(uint64_t bytes_progressed, |
| 1405 | uint64_t bytes_received, |
| 1406 | uint64_t total) { |
| 1407 | // The PayloadState keeps track of how many bytes were actually downloaded |
| 1408 | // from a given URL for the URL skipping logic. |
| 1409 | system_state_->payload_state()->DownloadProgress(bytes_progressed); |
| 1410 | |
Alex Deymo | 0d29854 | 2016-03-30 18:31:49 -0700 | [diff] [blame] | 1411 | double progress = 0; |
| 1412 | if (total) |
| 1413 | progress = static_cast<double>(bytes_received) / static_cast<double>(total); |
| 1414 | if (status_ != UpdateStatus::DOWNLOADING || bytes_received == total) { |
Darin Petkov | af18305 | 2010-08-23 12:07:13 -0700 | [diff] [blame] | 1415 | download_progress_ = progress; |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1416 | SetStatusAndNotify(UpdateStatus::DOWNLOADING); |
Alex Deymo | 0d29854 | 2016-03-30 18:31:49 -0700 | [diff] [blame] | 1417 | } else { |
| 1418 | ProgressUpdate(progress); |
Andrew de los Reyes | 63b96d7 | 2010-05-10 13:08:54 -0700 | [diff] [blame] | 1419 | } |
| 1420 | } |
| 1421 | |
Alex Deymo | 542c19b | 2015-12-03 07:43:31 -0300 | [diff] [blame] | 1422 | void UpdateAttempter::DownloadComplete() { |
| 1423 | system_state_->payload_state()->DownloadComplete(); |
| 1424 | } |
| 1425 | |
Alex Deymo | 0d29854 | 2016-03-30 18:31:49 -0700 | [diff] [blame] | 1426 | void UpdateAttempter::ProgressUpdate(double progress) { |
| 1427 | // Self throttle based on progress. Also send notifications if progress is |
| 1428 | // too slow. |
| 1429 | if (progress == 1.0 || |
| 1430 | progress - download_progress_ >= kBroadcastThresholdProgress || |
| 1431 | TimeTicks::Now() - last_notify_time_ >= |
| 1432 | TimeDelta::FromSeconds(kBroadcastThresholdSeconds)) { |
| 1433 | download_progress_ = progress; |
| 1434 | BroadcastStatus(); |
| 1435 | } |
| 1436 | } |
| 1437 | |
Amin Hassani | ecb60d3 | 2019-06-17 18:09:10 -0700 | [diff] [blame] | 1438 | void UpdateAttempter::ResetInteractivityFlags() { |
| 1439 | // Reset the state that's only valid for a single update pass. |
| 1440 | current_update_attempt_flags_ = UpdateAttemptFlags::kNone; |
| 1441 | |
| 1442 | if (forced_update_pending_callback_.get()) |
| 1443 | // Clear prior interactive requests once the processor is done. |
| 1444 | forced_update_pending_callback_->Run(false, false); |
| 1445 | } |
| 1446 | |
Jay Srinivasan | c1ba09a | 2012-08-14 14:15:57 -0700 | [diff] [blame] | 1447 | bool UpdateAttempter::ResetStatus() { |
| 1448 | LOG(INFO) << "Attempting to reset state from " |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1449 | << UpdateStatusToString(status_) << " to UpdateStatus::IDLE"; |
Jay Srinivasan | c1ba09a | 2012-08-14 14:15:57 -0700 | [diff] [blame] | 1450 | |
| 1451 | switch (status_) { |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1452 | case UpdateStatus::IDLE: |
Jay Srinivasan | c1ba09a | 2012-08-14 14:15:57 -0700 | [diff] [blame] | 1453 | // no-op. |
| 1454 | return true; |
| 1455 | |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 1456 | case UpdateStatus::UPDATED_NEED_REBOOT: { |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1457 | bool ret_value = true; |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1458 | status_ = UpdateStatus::IDLE; |
Jay Srinivasan | c1ba09a | 2012-08-14 14:15:57 -0700 | [diff] [blame] | 1459 | |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1460 | // Remove the reboot marker so that if the machine is rebooted |
Jay Srinivasan | c1ba09a | 2012-08-14 14:15:57 -0700 | [diff] [blame] | 1461 | // after resetting to idle state, it doesn't go back to |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1462 | // UpdateStatus::UPDATED_NEED_REBOOT state. |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 1463 | ret_value = prefs_->Delete(kPrefsUpdateCompletedOnBootId) && ret_value; |
| 1464 | ret_value = prefs_->Delete(kPrefsUpdateCompletedBootTime) && ret_value; |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1465 | |
Alex Deymo | 9870c0e | 2015-09-23 13:58:31 -0700 | [diff] [blame] | 1466 | // Update the boot flags so the current slot has higher priority. |
| 1467 | BootControlInterface* boot_control = system_state_->boot_control(); |
| 1468 | if (!boot_control->SetActiveBootSlot(boot_control->GetCurrentSlot())) |
| 1469 | ret_value = false; |
| 1470 | |
Alex Deymo | 5259033 | 2016-11-29 18:29:13 -0800 | [diff] [blame] | 1471 | // Mark the current slot as successful again, since marking it as active |
| 1472 | // may reset the successful bit. We ignore the result of whether marking |
| 1473 | // the current slot as successful worked. |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 1474 | if (!boot_control->MarkBootSuccessfulAsync(Bind([](bool successful) {}))) |
Alex Deymo | 5259033 | 2016-11-29 18:29:13 -0800 | [diff] [blame] | 1475 | ret_value = false; |
| 1476 | |
Alex Deymo | 4243291 | 2013-07-12 20:21:15 -0700 | [diff] [blame] | 1477 | // Notify the PayloadState that the successful payload was canceled. |
| 1478 | system_state_->payload_state()->ResetUpdateStatus(); |
| 1479 | |
Alex Deymo | 87c0886 | 2015-10-30 21:56:55 -0700 | [diff] [blame] | 1480 | // The previous version is used to report back to omaha after reboot that |
| 1481 | // we actually rebooted into the new version from this "prev-version". We |
| 1482 | // need to clear out this value now to prevent it being sent on the next |
| 1483 | // updatecheck request. |
| 1484 | ret_value = prefs_->SetString(kPrefsPreviousVersion, "") && ret_value; |
| 1485 | |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 1486 | LOG(INFO) << "Reset status " << (ret_value ? "successful" : "failed"); |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1487 | return ret_value; |
Jay Srinivasan | c1ba09a | 2012-08-14 14:15:57 -0700 | [diff] [blame] | 1488 | } |
| 1489 | |
| 1490 | default: |
| 1491 | LOG(ERROR) << "Reset not allowed in this state."; |
| 1492 | return false; |
| 1493 | } |
| 1494 | } |
| 1495 | |
Aaron Wood | 7f92e2b | 2017-08-28 14:51:21 -0700 | [diff] [blame] | 1496 | bool UpdateAttempter::GetStatus(UpdateEngineStatus* out_status) { |
Aaron Wood | 795c5b4 | 2017-12-05 16:06:13 -0800 | [diff] [blame] | 1497 | out_status->last_checked_time = last_checked_time_; |
Aaron Wood | 7f92e2b | 2017-08-28 14:51:21 -0700 | [diff] [blame] | 1498 | out_status->status = status_; |
| 1499 | out_status->current_version = omaha_request_params_->app_version(); |
Aaron Wood | 7f92e2b | 2017-08-28 14:51:21 -0700 | [diff] [blame] | 1500 | out_status->progress = download_progress_; |
| 1501 | out_status->new_size_bytes = new_payload_size_; |
| 1502 | out_status->new_version = new_version_; |
Amin Hassani | 9be122e | 2019-08-29 09:20:12 -0700 | [diff] [blame] | 1503 | out_status->is_enterprise_rollback = |
| 1504 | install_plan_ && install_plan_->is_rollback; |
Jae Hoon Kim | 2f78c1c | 2019-07-25 13:20:43 -0700 | [diff] [blame] | 1505 | out_status->is_install = is_install_; |
Jae Hoon Kim | 051627a | 2019-09-03 12:56:32 -0700 | [diff] [blame] | 1506 | |
| 1507 | string str_eol_date; |
Jae Hoon Kim | 2dfd35d | 2020-06-02 10:53:13 -0700 | [diff] [blame] | 1508 | if (system_state_->prefs()->Exists(kPrefsOmahaEolDate) && |
| 1509 | !system_state_->prefs()->GetString(kPrefsOmahaEolDate, &str_eol_date)) |
| 1510 | LOG(ERROR) << "Failed to retrieve kPrefsOmahaEolDate pref."; |
Jae Hoon Kim | 051627a | 2019-09-03 12:56:32 -0700 | [diff] [blame] | 1511 | out_status->eol_date = StringToEolDate(str_eol_date); |
| 1512 | |
Miriam Polzer | 0cf1acb | 2020-04-29 17:39:51 +0200 | [diff] [blame] | 1513 | // A powerwash will take place either if the install plan says it is required |
| 1514 | // or if an enterprise rollback is happening. |
| 1515 | out_status->will_powerwash_after_reboot = |
| 1516 | install_plan_ && |
| 1517 | (install_plan_->powerwash_required || install_plan_->is_rollback); |
| 1518 | |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 1519 | return true; |
| 1520 | } |
| 1521 | |
Darin Petkov | 61635a9 | 2011-05-18 16:20:36 -0700 | [diff] [blame] | 1522 | void UpdateAttempter::BroadcastStatus() { |
Aaron Wood | 7f92e2b | 2017-08-28 14:51:21 -0700 | [diff] [blame] | 1523 | UpdateEngineStatus broadcast_status; |
| 1524 | // Use common method for generating the current status. |
| 1525 | GetStatus(&broadcast_status); |
| 1526 | |
Alex Deymo | fa78f14 | 2016-01-26 21:36:16 -0800 | [diff] [blame] | 1527 | for (const auto& observer : service_observers_) { |
Aaron Wood | 7f92e2b | 2017-08-28 14:51:21 -0700 | [diff] [blame] | 1528 | observer->SendStatusUpdate(broadcast_status); |
Alex Deymo | fa78f14 | 2016-01-26 21:36:16 -0800 | [diff] [blame] | 1529 | } |
Darin Petkov | af18305 | 2010-08-23 12:07:13 -0700 | [diff] [blame] | 1530 | last_notify_time_ = TimeTicks::Now(); |
Alex Deymo | fa78f14 | 2016-01-26 21:36:16 -0800 | [diff] [blame] | 1531 | } |
| 1532 | |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 1533 | uint32_t UpdateAttempter::GetErrorCodeFlags() { |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1534 | uint32_t flags = 0; |
| 1535 | |
J. Richard Barnette | 056b0ab | 2013-10-29 15:24:56 -0700 | [diff] [blame] | 1536 | if (!system_state_->hardware()->IsNormalBootMode()) |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1537 | flags |= static_cast<uint32_t>(ErrorCode::kDevModeFlag); |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1538 | |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1539 | if (install_plan_ && install_plan_->is_resume) |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1540 | flags |= static_cast<uint32_t>(ErrorCode::kResumedFlag); |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1541 | |
J. Richard Barnette | 056b0ab | 2013-10-29 15:24:56 -0700 | [diff] [blame] | 1542 | if (!system_state_->hardware()->IsOfficialBuild()) |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1543 | flags |= static_cast<uint32_t>(ErrorCode::kTestImageFlag); |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1544 | |
Sen Jiang | daeaa43 | 2018-10-09 18:18:45 -0700 | [diff] [blame] | 1545 | if (!omaha_request_params_->IsUpdateUrlOfficial()) { |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1546 | flags |= static_cast<uint32_t>(ErrorCode::kTestOmahaUrlFlag); |
Alex Deymo | ac41a82 | 2015-09-15 20:52:53 -0700 | [diff] [blame] | 1547 | } |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1548 | |
| 1549 | return flags; |
| 1550 | } |
| 1551 | |
David Zeuthen | a99981f | 2013-04-29 13:42:47 -0700 | [diff] [blame] | 1552 | bool UpdateAttempter::ShouldCancel(ErrorCode* cancel_reason) { |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1553 | // Check if the channel we're attempting to update to is the same as the |
| 1554 | // target channel currently chosen by the user. |
| 1555 | OmahaRequestParams* params = system_state_->request_params(); |
| 1556 | if (params->download_channel() != params->target_channel()) { |
| 1557 | LOG(ERROR) << "Aborting download as target channel: " |
| 1558 | << params->target_channel() |
| 1559 | << " is different from the download channel: " |
| 1560 | << params->download_channel(); |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1561 | *cancel_reason = ErrorCode::kUpdateCanceledByChannelChange; |
Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1562 | return true; |
| 1563 | } |
| 1564 | |
| 1565 | return false; |
| 1566 | } |
| 1567 | |
Nam T. Nguyen | 7d623eb | 2014-05-13 16:06:28 -0700 | [diff] [blame] | 1568 | void UpdateAttempter::SetStatusAndNotify(UpdateStatus status) { |
Darin Petkov | 61635a9 | 2011-05-18 16:20:36 -0700 | [diff] [blame] | 1569 | status_ = status; |
Darin Petkov | 61635a9 | 2011-05-18 16:20:36 -0700 | [diff] [blame] | 1570 | BroadcastStatus(); |
| 1571 | } |
| 1572 | |
Darin Petkov | 777dbfa | 2010-07-20 15:03:37 -0700 | [diff] [blame] | 1573 | void UpdateAttempter::CreatePendingErrorEvent(AbstractAction* action, |
David Zeuthen | a99981f | 2013-04-29 13:42:47 -0700 | [diff] [blame] | 1574 | ErrorCode code) { |
Sen Jiang | 89e24c1 | 2018-03-22 18:05:44 -0700 | [diff] [blame] | 1575 | if (error_event_.get() || status_ == UpdateStatus::REPORTING_ERROR_EVENT) { |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1576 | // This shouldn't really happen. |
| 1577 | LOG(WARNING) << "There's already an existing pending error event."; |
| 1578 | return; |
| 1579 | } |
Darin Petkov | 777dbfa | 2010-07-20 15:03:37 -0700 | [diff] [blame] | 1580 | |
Jay Srinivasan | 56d5aa4 | 2012-03-26 14:27:59 -0700 | [diff] [blame] | 1581 | // Classify the code to generate the appropriate result so that |
| 1582 | // the Borgmon charts show up the results correctly. |
| 1583 | // Do this before calling GetErrorCodeForAction which could potentially |
| 1584 | // augment the bit representation of code and thus cause no matches for |
| 1585 | // the switch cases below. |
| 1586 | OmahaEvent::Result event_result; |
| 1587 | switch (code) { |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1588 | case ErrorCode::kOmahaUpdateIgnoredPerPolicy: |
| 1589 | case ErrorCode::kOmahaUpdateDeferredPerPolicy: |
| 1590 | case ErrorCode::kOmahaUpdateDeferredForBackoff: |
Jay Srinivasan | 56d5aa4 | 2012-03-26 14:27:59 -0700 | [diff] [blame] | 1591 | event_result = OmahaEvent::kResultUpdateDeferred; |
| 1592 | break; |
| 1593 | default: |
| 1594 | event_result = OmahaEvent::kResultError; |
| 1595 | break; |
| 1596 | } |
| 1597 | |
Darin Petkov | 777dbfa | 2010-07-20 15:03:37 -0700 | [diff] [blame] | 1598 | code = GetErrorCodeForAction(action, code); |
Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1599 | fake_update_success_ = code == ErrorCode::kPostinstallBootedFromFirmwareB; |
Darin Petkov | 18c7bce | 2011-06-16 14:07:00 -0700 | [diff] [blame] | 1600 | |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1601 | // Compute the final error code with all the bit flags to be sent to Omaha. |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 1602 | code = |
| 1603 | static_cast<ErrorCode>(static_cast<uint32_t>(code) | GetErrorCodeFlags()); |
| 1604 | error_event_.reset( |
| 1605 | new OmahaEvent(OmahaEvent::kTypeUpdateComplete, event_result, code)); |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1606 | } |
| 1607 | |
| 1608 | bool UpdateAttempter::ScheduleErrorEventAction() { |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 1609 | if (error_event_.get() == nullptr) |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1610 | return false; |
| 1611 | |
Jay Srinivasan | 6f6ea00 | 2012-12-14 11:26:28 -0800 | [diff] [blame] | 1612 | LOG(ERROR) << "Update failed."; |
| 1613 | system_state_->payload_state()->UpdateFailed(error_event_->error_code); |
| 1614 | |
Marton Hunyady | a030268 | 2018-05-16 18:52:13 +0200 | [diff] [blame] | 1615 | // Send metrics if it was a rollback. |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1616 | if (install_plan_ && install_plan_->is_rollback) { |
| 1617 | system_state_->metrics_reporter()->ReportEnterpriseRollbackMetrics( |
| 1618 | /*success=*/false, install_plan_->version); |
Marton Hunyady | a030268 | 2018-05-16 18:52:13 +0200 | [diff] [blame] | 1619 | } |
| 1620 | |
Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1621 | // Send it to Omaha. |
Alex Deymo | af9a863 | 2015-09-23 18:51:48 -0700 | [diff] [blame] | 1622 | LOG(INFO) << "Reporting the error event"; |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1623 | auto error_event_action = std::make_unique<OmahaRequestAction>( |
| 1624 | system_state_, |
| 1625 | error_event_.release(), // Pass ownership. |
| 1626 | std::make_unique<LibcurlHttpFetcher>(GetProxyResolver(), |
| 1627 | system_state_->hardware()), |
Jae Hoon Kim | edb6550 | 2019-06-14 11:52:17 -0700 | [diff] [blame] | 1628 | false, |
| 1629 | session_id_); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1630 | processor_->EnqueueAction(std::move(error_event_action)); |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1631 | SetStatusAndNotify(UpdateStatus::REPORTING_ERROR_EVENT); |
Darin Petkov | f42cc1c | 2010-09-01 09:03:02 -0700 | [diff] [blame] | 1632 | processor_->StartProcessing(); |
Darin Petkov | 09f96c3 | 2010-07-20 09:24:57 -0700 | [diff] [blame] | 1633 | return true; |
| 1634 | } |
| 1635 | |
Darin Petkov | 58dd134 | 2011-05-06 12:05:13 -0700 | [diff] [blame] | 1636 | void UpdateAttempter::ScheduleProcessingStart() { |
| 1637 | LOG(INFO) << "Scheduling an action processor start."; |
Alex Deymo | 60ca1a7 | 2015-06-18 18:19:15 -0700 | [diff] [blame] | 1638 | MessageLoop::current()->PostTask( |
| 1639 | FROM_HERE, |
Luis Hector Chavez | f1cf348 | 2016-07-19 14:29:19 -0700 | [diff] [blame] | 1640 | Bind([](ActionProcessor* processor) { processor->StartProcessing(); }, |
| 1641 | base::Unretained(processor_.get()))); |
Darin Petkov | 58dd134 | 2011-05-06 12:05:13 -0700 | [diff] [blame] | 1642 | } |
| 1643 | |
Darin Petkov | 3627577 | 2010-10-01 11:40:57 -0700 | [diff] [blame] | 1644 | void UpdateAttempter::DisableDeltaUpdateIfNeeded() { |
| 1645 | int64_t delta_failures; |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 1646 | if (omaha_request_params_->delta_okay() && |
Darin Petkov | 3627577 | 2010-10-01 11:40:57 -0700 | [diff] [blame] | 1647 | prefs_->GetInt64(kPrefsDeltaUpdateFailures, &delta_failures) && |
| 1648 | delta_failures >= kMaxDeltaUpdateFailures) { |
| 1649 | LOG(WARNING) << "Too many delta update failures, forcing full update."; |
Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 1650 | omaha_request_params_->set_delta_okay(false); |
Darin Petkov | 3627577 | 2010-10-01 11:40:57 -0700 | [diff] [blame] | 1651 | } |
| 1652 | } |
| 1653 | |
| 1654 | void UpdateAttempter::MarkDeltaUpdateFailure() { |
Darin Petkov | 2dd0109 | 2010-10-08 15:43:05 -0700 | [diff] [blame] | 1655 | // Don't try to resume a failed delta update. |
| 1656 | DeltaPerformer::ResetUpdateProgress(prefs_, false); |
Darin Petkov | 3627577 | 2010-10-01 11:40:57 -0700 | [diff] [blame] | 1657 | int64_t delta_failures; |
| 1658 | if (!prefs_->GetInt64(kPrefsDeltaUpdateFailures, &delta_failures) || |
| 1659 | delta_failures < 0) { |
| 1660 | delta_failures = 0; |
| 1661 | } |
| 1662 | prefs_->SetInt64(kPrefsDeltaUpdateFailures, ++delta_failures); |
| 1663 | } |
| 1664 | |
Thieu Le | 116fda3 | 2011-04-19 11:01:54 -0700 | [diff] [blame] | 1665 | void UpdateAttempter::PingOmaha() { |
Thieu Le | d88a857 | 2011-05-26 09:09:19 -0700 | [diff] [blame] | 1666 | if (!processor_->IsRunning()) { |
Amin Hassani | ecb60d3 | 2019-06-17 18:09:10 -0700 | [diff] [blame] | 1667 | ResetInteractivityFlags(); |
| 1668 | |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1669 | auto ping_action = std::make_unique<OmahaRequestAction>( |
Alex Deymo | c1c17b4 | 2015-11-23 03:53:15 -0300 | [diff] [blame] | 1670 | system_state_, |
| 1671 | nullptr, |
Ben Chan | ab5a0af | 2017-10-12 14:57:50 -0700 | [diff] [blame] | 1672 | std::make_unique<LibcurlHttpFetcher>(GetProxyResolver(), |
Ben Chan | 5c02c13 | 2017-06-27 07:10:36 -0700 | [diff] [blame] | 1673 | system_state_->hardware()), |
Jae Hoon Kim | edb6550 | 2019-06-14 11:52:17 -0700 | [diff] [blame] | 1674 | true, |
| 1675 | "" /* session_id */); |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 1676 | processor_->set_delegate(nullptr); |
Amin Hassani | d3f4bea | 2018-04-30 14:52:40 -0700 | [diff] [blame] | 1677 | processor_->EnqueueAction(std::move(ping_action)); |
Thieu Le | d88a857 | 2011-05-26 09:09:19 -0700 | [diff] [blame] | 1678 | // Call StartProcessing() synchronously here to avoid any race conditions |
| 1679 | // caused by multiple outstanding ping Omaha requests. If we call |
| 1680 | // StartProcessing() asynchronously, the device can be suspended before we |
| 1681 | // get a chance to callback to StartProcessing(). When the device resumes |
| 1682 | // (assuming the device sleeps longer than the next update check period), |
| 1683 | // StartProcessing() is called back and at the same time, the next update |
| 1684 | // check is fired which eventually invokes StartProcessing(). A crash |
| 1685 | // can occur because StartProcessing() checks to make sure that the |
| 1686 | // processor is idle which it isn't due to the two concurrent ping Omaha |
| 1687 | // requests. |
| 1688 | processor_->StartProcessing(); |
| 1689 | } else { |
Darin Petkov | 58dd134 | 2011-05-06 12:05:13 -0700 | [diff] [blame] | 1690 | LOG(WARNING) << "Action processor running, Omaha ping suppressed."; |
Darin Petkov | 58dd134 | 2011-05-06 12:05:13 -0700 | [diff] [blame] | 1691 | } |
Thieu Le | d88a857 | 2011-05-26 09:09:19 -0700 | [diff] [blame] | 1692 | |
Gilad Arnold | ec7f916 | 2014-07-15 13:24:46 -0700 | [diff] [blame] | 1693 | // Update the last check time here; it may be re-updated when an Omaha |
| 1694 | // response is received, but this will prevent us from repeatedly scheduling |
| 1695 | // checks in the case where a response is not received. |
| 1696 | UpdateLastCheckedTime(); |
| 1697 | |
Thieu Le | d88a857 | 2011-05-26 09:09:19 -0700 | [diff] [blame] | 1698 | // Update the status which will schedule the next update check |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1699 | SetStatusAndNotify(UpdateStatus::UPDATED_NEED_REBOOT); |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1700 | ScheduleUpdates(); |
Thieu Le | 116fda3 | 2011-04-19 11:01:54 -0700 | [diff] [blame] | 1701 | } |
| 1702 | |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 1703 | bool UpdateAttempter::DecrementUpdateCheckCount() { |
Ben Chan | 9abb763 | 2014-08-07 00:10:53 -0700 | [diff] [blame] | 1704 | int64_t update_check_count_value; |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 1705 | |
| 1706 | if (!prefs_->Exists(kPrefsUpdateCheckCount)) { |
| 1707 | // This file does not exist. This means we haven't started our update |
| 1708 | // check count down yet, so nothing more to do. This file will be created |
| 1709 | // later when we first satisfy the wall-clock-based-wait period. |
| 1710 | LOG(INFO) << "No existing update check count. That's normal."; |
| 1711 | return true; |
| 1712 | } |
| 1713 | |
| 1714 | if (prefs_->GetInt64(kPrefsUpdateCheckCount, &update_check_count_value)) { |
| 1715 | // Only if we're able to read a proper integer value, then go ahead |
| 1716 | // and decrement and write back the result in the same file, if needed. |
| 1717 | LOG(INFO) << "Update check count = " << update_check_count_value; |
| 1718 | |
| 1719 | if (update_check_count_value == 0) { |
| 1720 | // It could be 0, if, for some reason, the file didn't get deleted |
| 1721 | // when we set our status to waiting for reboot. so we just leave it |
| 1722 | // as is so that we can prevent another update_check wait for this client. |
| 1723 | LOG(INFO) << "Not decrementing update check count as it's already 0."; |
| 1724 | return true; |
| 1725 | } |
| 1726 | |
| 1727 | if (update_check_count_value > 0) |
| 1728 | update_check_count_value--; |
| 1729 | else |
| 1730 | update_check_count_value = 0; |
| 1731 | |
| 1732 | // Write out the new value of update_check_count_value. |
| 1733 | if (prefs_->SetInt64(kPrefsUpdateCheckCount, update_check_count_value)) { |
Sen Jiang | 771f648 | 2018-04-04 17:59:10 -0700 | [diff] [blame] | 1734 | // We successfully wrote out the new value, so enable the |
Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 1735 | // update check based wait. |
| 1736 | LOG(INFO) << "New update check count = " << update_check_count_value; |
| 1737 | return true; |
| 1738 | } |
| 1739 | } |
| 1740 | |
| 1741 | LOG(INFO) << "Deleting update check count state due to read/write errors."; |
| 1742 | |
| 1743 | // We cannot read/write to the file, so disable the update check based wait |
| 1744 | // so that we don't get stuck in this OS version by any chance (which could |
| 1745 | // happen if there's some bug that causes to read/write incorrectly). |
| 1746 | // Also attempt to delete the file to do our best effort to cleanup. |
| 1747 | prefs_->Delete(kPrefsUpdateCheckCount); |
| 1748 | return false; |
| 1749 | } |
Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 1750 | |
David Zeuthen | e4c58bf | 2013-06-18 17:26:50 -0700 | [diff] [blame] | 1751 | void UpdateAttempter::UpdateEngineStarted() { |
Alex Vakulenko | dea2eac | 2014-03-14 15:56:59 -0700 | [diff] [blame] | 1752 | // If we just booted into a new update, keep the previous OS version |
| 1753 | // in case we rebooted because of a crash of the old version, so we |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 1754 | // can do a proper crash report with correct information. |
Alex Vakulenko | dea2eac | 2014-03-14 15:56:59 -0700 | [diff] [blame] | 1755 | // This must be done before calling |
| 1756 | // system_state_->payload_state()->UpdateEngineStarted() since it will |
| 1757 | // delete SystemUpdated marker file. |
| 1758 | if (system_state_->system_rebooted() && |
| 1759 | prefs_->Exists(kPrefsSystemUpdatedMarker)) { |
| 1760 | if (!prefs_->GetString(kPrefsPreviousVersion, &prev_version_)) { |
| 1761 | // If we fail to get the version string, make sure it stays empty. |
| 1762 | prev_version_.clear(); |
| 1763 | } |
| 1764 | } |
| 1765 | |
David Zeuthen | e4c58bf | 2013-06-18 17:26:50 -0700 | [diff] [blame] | 1766 | system_state_->payload_state()->UpdateEngineStarted(); |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 1767 | StartP2PAtStartup(); |
Jae Hoon Kim | 5e8e30b | 2020-05-06 14:59:06 -0700 | [diff] [blame] | 1768 | |
| 1769 | excluder_ = CreateExcluder(system_state_->prefs()); |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 1770 | } |
| 1771 | |
| 1772 | bool UpdateAttempter::StartP2PAtStartup() { |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 1773 | if (system_state_ == nullptr || |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 1774 | !system_state_->p2p_manager()->IsP2PEnabled()) { |
| 1775 | LOG(INFO) << "Not starting p2p at startup since it's not enabled."; |
| 1776 | return false; |
| 1777 | } |
| 1778 | |
| 1779 | if (system_state_->p2p_manager()->CountSharedFiles() < 1) { |
| 1780 | LOG(INFO) << "Not starting p2p at startup since our application " |
| 1781 | << "is not sharing any files."; |
| 1782 | return false; |
| 1783 | } |
| 1784 | |
| 1785 | return StartP2PAndPerformHousekeeping(); |
| 1786 | } |
| 1787 | |
| 1788 | bool UpdateAttempter::StartP2PAndPerformHousekeeping() { |
Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 1789 | if (system_state_ == nullptr) |
David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 1790 | return false; |
| 1791 | |
| 1792 | if (!system_state_->p2p_manager()->IsP2PEnabled()) { |
| 1793 | LOG(INFO) << "Not starting p2p since it's not enabled."; |
| 1794 | return false; |
| 1795 | } |
| 1796 | |
| 1797 | LOG(INFO) << "Ensuring that p2p is running."; |
| 1798 | if (!system_state_->p2p_manager()->EnsureP2PRunning()) { |
| 1799 | LOG(ERROR) << "Error starting p2p."; |
| 1800 | return false; |
| 1801 | } |
| 1802 | |
| 1803 | LOG(INFO) << "Performing p2p housekeeping."; |
| 1804 | if (!system_state_->p2p_manager()->PerformHousekeeping()) { |
| 1805 | LOG(ERROR) << "Error performing housekeeping for p2p."; |
| 1806 | return false; |
| 1807 | } |
| 1808 | |
| 1809 | LOG(INFO) << "Done performing p2p housekeeping."; |
| 1810 | return true; |
David Zeuthen | e4c58bf | 2013-06-18 17:26:50 -0700 | [diff] [blame] | 1811 | } |
| 1812 | |
Amin Hassani | 7cc8bb0 | 2019-01-14 16:29:47 -0800 | [diff] [blame] | 1813 | bool UpdateAttempter::GetBootTimeAtUpdate(Time* out_boot_time) { |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 1814 | // In case of an update_engine restart without a reboot, we stored the boot_id |
| 1815 | // when the update was completed by setting a pref, so we can check whether |
| 1816 | // the last update was on this boot or a previous one. |
| 1817 | string boot_id; |
| 1818 | TEST_AND_RETURN_FALSE(utils::GetBootId(&boot_id)); |
| 1819 | |
| 1820 | string update_completed_on_boot_id; |
| 1821 | if (!prefs_->Exists(kPrefsUpdateCompletedOnBootId) || |
| 1822 | !prefs_->GetString(kPrefsUpdateCompletedOnBootId, |
| 1823 | &update_completed_on_boot_id) || |
| 1824 | update_completed_on_boot_id != boot_id) |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 1825 | return false; |
| 1826 | |
Alex Deymo | 906191f | 2015-10-12 12:22:44 -0700 | [diff] [blame] | 1827 | // Short-circuit avoiding the read in case out_boot_time is nullptr. |
| 1828 | if (out_boot_time) { |
| 1829 | int64_t boot_time = 0; |
| 1830 | // Since the kPrefsUpdateCompletedOnBootId was correctly set, this pref |
| 1831 | // should not fail. |
| 1832 | TEST_AND_RETURN_FALSE( |
| 1833 | prefs_->GetInt64(kPrefsUpdateCompletedBootTime, &boot_time)); |
| 1834 | *out_boot_time = Time::FromInternalValue(boot_time); |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 1835 | } |
David Zeuthen | 3c55abd | 2013-10-14 12:48:03 -0700 | [diff] [blame] | 1836 | return true; |
| 1837 | } |
| 1838 | |
Jae Hoon Kim | ba2fdce | 2019-07-11 13:18:58 -0700 | [diff] [blame] | 1839 | bool UpdateAttempter::IsBusyOrUpdateScheduled() { |
Christopher Wiley | cc8ce0e | 2015-10-01 16:48:47 -0700 | [diff] [blame] | 1840 | return ((status_ != UpdateStatus::IDLE && |
| 1841 | status_ != UpdateStatus::UPDATED_NEED_REBOOT) || |
Gilad Arnold | 54fa66d | 2014-09-29 13:14:29 -0700 | [diff] [blame] | 1842 | waiting_for_scheduled_check_); |
| 1843 | } |
| 1844 | |
Sen Jiang | daeaa43 | 2018-10-09 18:18:45 -0700 | [diff] [blame] | 1845 | bool UpdateAttempter::IsAnyUpdateSourceAllowed() const { |
David Pursell | 907b4fa | 2015-01-27 10:27:38 -0800 | [diff] [blame] | 1846 | // We allow updates from any source if either of these are true: |
| 1847 | // * The device is running an unofficial (dev/test) image. |
| 1848 | // * The debugd dev features are accessible (i.e. in devmode with no owner). |
| 1849 | // This protects users running a base image, while still allowing a specific |
| 1850 | // window (gated by the debug dev features) where `cros flash` is usable. |
David Pursell | 02c1864 | 2014-11-06 11:26:11 -0800 | [diff] [blame] | 1851 | if (!system_state_->hardware()->IsOfficialBuild()) { |
| 1852 | LOG(INFO) << "Non-official build; allowing any update source."; |
| 1853 | return true; |
| 1854 | } |
| 1855 | |
Sen Jiang | e67bb5b | 2016-06-20 15:53:56 -0700 | [diff] [blame] | 1856 | if (system_state_->hardware()->AreDevFeaturesEnabled()) { |
| 1857 | LOG(INFO) << "Developer features enabled; allowing custom update sources."; |
David Pursell | 02c1864 | 2014-11-06 11:26:11 -0800 | [diff] [blame] | 1858 | return true; |
| 1859 | } |
Sen Jiang | e67bb5b | 2016-06-20 15:53:56 -0700 | [diff] [blame] | 1860 | |
| 1861 | LOG(INFO) |
| 1862 | << "Developer features disabled; disallowing custom update sources."; |
David Pursell | 02c1864 | 2014-11-06 11:26:11 -0800 | [diff] [blame] | 1863 | return false; |
| 1864 | } |
| 1865 | |
May Lippert | 60aa3ca | 2018-08-15 16:55:29 -0700 | [diff] [blame] | 1866 | void UpdateAttempter::ReportTimeToUpdateAppliedMetric() { |
| 1867 | const policy::DevicePolicy* device_policy = system_state_->device_policy(); |
| 1868 | if (device_policy && device_policy->IsEnterpriseEnrolled()) { |
| 1869 | vector<policy::DevicePolicy::WeeklyTimeInterval> parsed_intervals; |
| 1870 | bool has_time_restrictions = |
| 1871 | device_policy->GetDisallowedTimeIntervals(&parsed_intervals); |
| 1872 | |
| 1873 | int64_t update_first_seen_at_int; |
| 1874 | if (system_state_->prefs()->Exists(kPrefsUpdateFirstSeenAt)) { |
| 1875 | if (system_state_->prefs()->GetInt64(kPrefsUpdateFirstSeenAt, |
| 1876 | &update_first_seen_at_int)) { |
| 1877 | TimeDelta update_delay = |
| 1878 | system_state_->clock()->GetWallclockTime() - |
| 1879 | Time::FromInternalValue(update_first_seen_at_int); |
| 1880 | system_state_->metrics_reporter() |
| 1881 | ->ReportEnterpriseUpdateSeenToDownloadDays(has_time_restrictions, |
| 1882 | update_delay.InDays()); |
| 1883 | } |
| 1884 | } |
| 1885 | } |
| 1886 | } |
| 1887 | |
Andrew de los Reyes | 4e9b9f4 | 2010-04-26 15:06:43 -0700 | [diff] [blame] | 1888 | } // namespace chromeos_update_engine |