| // |
| // Copyright (C) 2012 The Android Open Source Project |
| // |
| // Licensed under the Apache License, Version 2.0 (the "License"); |
| // you may not use this file except in compliance with the License. |
| // You may obtain a copy of the License at |
| // |
| // http://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, software |
| // distributed under the License is distributed on an "AS IS" BASIS, |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| // See the License for the specific language governing permissions and |
| // limitations under the License. |
| // |
| |
| #ifndef UPDATE_ENGINE_CROS_UPDATE_ATTEMPTER_H_ |
| #define UPDATE_ENGINE_CROS_UPDATE_ATTEMPTER_H_ |
| |
| #include <time.h> |
| |
| #include <memory> |
| #include <set> |
| #include <string> |
| #include <utility> |
| #include <vector> |
| |
| #include <base/bind.h> |
| #include <base/guid.h> |
| #include <base/time/time.h> |
| #include <gtest/gtest_prod.h> // for FRIEND_TEST |
| |
| #include "update_engine/certificate_checker.h" |
| #include "update_engine/client_library/include/update_engine/update_status.h" |
| #include "update_engine/common/action_processor.h" |
| #include "update_engine/common/cpu_limiter.h" |
| #include "update_engine/common/daemon_state_interface.h" |
| #include "update_engine/common/download_action.h" |
| #include "update_engine/common/excluder_interface.h" |
| #include "update_engine/common/proxy_resolver.h" |
| #include "update_engine/common/service_observer_interface.h" |
| #include "update_engine/common/system_state.h" |
| #include "update_engine/cros/chrome_browser_proxy_resolver.h" |
| #include "update_engine/cros/omaha_request_builder_xml.h" |
| #include "update_engine/cros/omaha_request_params.h" |
| #include "update_engine/cros/omaha_response_handler_action.h" |
| #include "update_engine/payload_consumer/postinstall_runner_action.h" |
| #include "update_engine/update_manager/policy.h" |
| #include "update_engine/update_manager/staging_utils.h" |
| #include "update_engine/update_manager/update_manager.h" |
| |
| namespace policy { |
| class PolicyProvider; |
| } |
| |
| namespace chromeos_update_engine { |
| |
| class UpdateAttempter : public ActionProcessorDelegate, |
| public DownloadActionDelegate, |
| public CertificateChecker::Observer, |
| public PostinstallRunnerAction::DelegateInterface, |
| public DaemonStateInterface { |
| public: |
| using UpdateStatus = update_engine::UpdateStatus; |
| using UpdateAttemptFlags = update_engine::UpdateAttemptFlags; |
| static const int kMaxDeltaUpdateFailures; |
| |
| explicit UpdateAttempter(CertificateChecker* cert_checker); |
| ~UpdateAttempter() override; |
| |
| // Further initialization to be done post construction. |
| void Init(); |
| |
| // Initiates scheduling of update checks. |
| // Returns true if update check is scheduled. |
| virtual bool ScheduleUpdates(); |
| |
| // Checks for update and, if a newer version is available, attempts to update |
| // the system. |
| virtual void Update(const chromeos_update_manager::UpdateCheckParams& params); |
| |
| // ActionProcessorDelegate methods: |
| void ProcessingDone(const ActionProcessor* processor, |
| ErrorCode code) override; |
| void ProcessingStopped(const ActionProcessor* processor) override; |
| void ActionCompleted(ActionProcessor* processor, |
| AbstractAction* action, |
| ErrorCode code) override; |
| |
| // PostinstallRunnerAction::DelegateInterface |
| void ProgressUpdate(double progress) override; |
| |
| // Resets the current state to UPDATE_STATUS_IDLE. |
| // Used by update_engine_client for restarting a new update without |
| // having to reboot once the previous update has reached |
| // UPDATE_STATUS_UPDATED_NEED_REBOOT state. This is used only |
| // for testing purposes. |
| virtual bool ResetStatus(); |
| |
| // Returns the current status in the out param. Returns true on success. |
| virtual bool GetStatus(update_engine::UpdateEngineStatus* out_status); |
| |
| UpdateStatus status() const { return status_; } |
| |
| int http_response_code() const { return http_response_code_; } |
| void set_http_response_code(int code) { http_response_code_ = code; } |
| |
| // Set flags that influence how updates and checks are performed. These |
| // influence all future checks and updates until changed or the device |
| // reboots. |
| void SetUpdateAttemptFlags(UpdateAttemptFlags flags) { |
| update_attempt_flags_ = flags; |
| } |
| |
| // Returns the update attempt flags that are in place for the current update |
| // attempt. These are cached at the start of an update attempt so that they |
| // remain constant throughout the process. |
| virtual UpdateAttemptFlags GetCurrentUpdateAttemptFlags() const { |
| return current_update_attempt_flags_; |
| } |
| |
| // This is the internal entry point for going through an |
| // update. If the current status is idle invokes Update. |
| // This is called by the DBus implementation. |
| // This returns true if an update check was started, false if a check or an |
| // update was already in progress. |
| virtual bool CheckForUpdate(const std::string& app_version, |
| const std::string& omaha_url, |
| UpdateAttemptFlags flags); |
| |
| // This is the version of CheckForUpdate called by AttemptInstall API. |
| virtual bool CheckForInstall(const std::vector<std::string>& dlc_ids, |
| const std::string& omaha_url); |
| |
| // This is the internal entry point for going through a rollback. This will |
| // attempt to run the postinstall on the non-active partition and set it as |
| // the partition to boot from. If |powerwash| is True, perform a powerwash |
| // as part of rollback. Returns True on success. |
| bool Rollback(bool powerwash); |
| |
| // This is the internal entry point for checking if we can rollback. |
| bool CanRollback() const; |
| |
| // This is the internal entry point for getting a rollback partition name, |
| // if one exists. It returns the bootable rollback kernel device partition |
| // name or empty string if none is available. |
| BootControlInterface::Slot GetRollbackSlot() const; |
| |
| // Initiates a reboot if the current state is |
| // UPDATED_NEED_REBOOT. Returns true on success, false otherwise. |
| bool RebootIfNeeded(); |
| |
| // Sets the DLC as active or inactive. See chromeos/common_service.h |
| virtual bool SetDlcActiveValue(bool is_active, const std::string& dlc_id); |
| |
| // DownloadActionDelegate methods: |
| void BytesReceived(uint64_t bytes_progressed, |
| uint64_t bytes_received, |
| uint64_t total) override; |
| |
| // Returns that the update should be canceled when the download channel was |
| // changed. |
| bool ShouldCancel(ErrorCode* cancel_reason) override; |
| |
| void DownloadComplete() override; |
| |
| // Broadcasts the current status to all observers. |
| void BroadcastStatus(); |
| |
| ErrorCode GetAttemptErrorCode() const { return attempt_error_code_; } |
| |
| // Called at update_engine startup to do various house-keeping. |
| void UpdateEngineStarted(); |
| |
| // Returns the |Excluder| that is currently held onto. |
| virtual ExcluderInterface* GetExcluder() const { return excluder_.get(); } |
| |
| // Reloads the device policy from libbrillo. Note: This method doesn't |
| // cause a real-time policy fetch from the policy server. It just reloads the |
| // latest value that libbrillo has cached. libbrillo fetches the policies |
| // from the server asynchronously at its own frequency. |
| virtual void RefreshDevicePolicy(); |
| |
| // Stores in |out_boot_time| the boottime (CLOCK_BOOTTIME) recorded at the |
| // time of the last successful update in the current boot. Returns false if |
| // there wasn't a successful update in the current boot. |
| virtual bool GetBootTimeAtUpdate(base::Time* out_boot_time); |
| |
| // Returns a version OS version that was being used before the last reboot, |
| // and if that reboot happened to be into an update (current version). |
| // This will return an empty string otherwise. |
| const std::string& GetPrevVersion() const { return prev_version_; } |
| |
| // Returns the number of consecutive failed update checks. |
| virtual unsigned int consecutive_failed_update_checks() const { |
| return consecutive_failed_update_checks_; |
| } |
| |
| // Returns the poll interval dictated by Omaha, if provided; zero otherwise. |
| virtual unsigned int server_dictated_poll_interval() const { |
| return server_dictated_poll_interval_; |
| } |
| |
| // Sets a callback to be used when either a forced update request is received |
| // (first argument set to true) or cleared by an update attempt (first |
| // argument set to false). The callback further encodes whether the forced |
| // check is an interactive one (second argument set to true). Takes ownership |
| // of the callback object. A null value disables callback on these events. |
| // Note that only one callback can be set, so effectively at most one client |
| // can be notified. |
| virtual void set_forced_update_pending_callback( |
| base::Callback<void(bool, bool)>* callback) { |
| forced_update_pending_callback_.reset(callback); |
| } |
| |
| // Returns true if we should allow updates from any source. In official builds |
| // we want to restrict updates to known safe sources, but under certain |
| // conditions it's useful to allow updating from anywhere (e.g. to allow |
| // 'cros flash' to function properly). |
| bool IsAnyUpdateSourceAllowed() const; |
| |
| // |DaemonStateInterface| overrides. |
| bool StartUpdater() override; |
| void AddObserver(ServiceObserverInterface* observer) override { |
| service_observers_.insert(observer); |
| } |
| void RemoveObserver(ServiceObserverInterface* observer) override { |
| service_observers_.erase(observer); |
| } |
| const std::set<ServiceObserverInterface*>& service_observers() override { |
| return service_observers_; |
| } |
| |
| // Remove all the observers. |
| void ClearObservers() { service_observers_.clear(); } |
| |
| private: |
| // Friend declarations for testing purposes. |
| friend class UpdateAttempterUnderTest; |
| friend class UpdateAttempterTest; |
| FRIEND_TEST(UpdateAttempterTest, ActionCompletedDownloadTest); |
| FRIEND_TEST(UpdateAttempterTest, ActionCompletedErrorTest); |
| FRIEND_TEST(UpdateAttempterTest, ActionCompletedOmahaRequestTest); |
| FRIEND_TEST(UpdateAttempterTest, BootTimeInUpdateMarkerFile); |
| FRIEND_TEST(UpdateAttempterTest, BroadcastCompleteDownloadTest); |
| FRIEND_TEST(UpdateAttempterTest, CalculateDlcParamsInstallTest); |
| FRIEND_TEST(UpdateAttempterTest, CalculateDlcParamsNoPrefFilesTest); |
| FRIEND_TEST(UpdateAttempterTest, CalculateDlcParamsNonParseableValuesTest); |
| FRIEND_TEST(UpdateAttempterTest, CalculateDlcParamsValidValuesTest); |
| FRIEND_TEST(UpdateAttempterTest, CalculateDlcParamsRemoveStaleMetadata); |
| FRIEND_TEST(UpdateAttempterTest, ChangeToDownloadingOnReceivedBytesTest); |
| FRIEND_TEST(UpdateAttempterTest, CheckForInstallNotIdleFails); |
| FRIEND_TEST(UpdateAttempterTest, CheckForUpdateAUDlcTest); |
| FRIEND_TEST(UpdateAttempterTest, CreatePendingErrorEventTest); |
| FRIEND_TEST(UpdateAttempterTest, CreatePendingErrorEventResumedTest); |
| FRIEND_TEST(UpdateAttempterTest, DisableDeltaUpdateIfNeededTest); |
| FRIEND_TEST(UpdateAttempterTest, DownloadProgressAccumulationTest); |
| FRIEND_TEST(UpdateAttempterTest, InstallSetsStatusIdle); |
| FRIEND_TEST(UpdateAttempterTest, IsEnterpriseRollbackInGetStatusTrue); |
| FRIEND_TEST(UpdateAttempterTest, IsEnterpriseRollbackInGetStatusFalse); |
| FRIEND_TEST(UpdateAttempterTest, |
| PowerwashInGetStatusTrueBecausePowerwashRequired); |
| FRIEND_TEST(UpdateAttempterTest, PowerwashInGetStatusTrueBecauseRollback); |
| FRIEND_TEST(UpdateAttempterTest, MarkDeltaUpdateFailureTest); |
| FRIEND_TEST(UpdateAttempterTest, PingOmahaTest); |
| FRIEND_TEST(UpdateAttempterTest, ProcessingDoneInstallError); |
| FRIEND_TEST(UpdateAttempterTest, ProcessingDoneUpdateError); |
| FRIEND_TEST(UpdateAttempterTest, ReportDailyMetrics); |
| FRIEND_TEST(UpdateAttempterTest, RollbackNotAllowed); |
| FRIEND_TEST(UpdateAttempterTest, RollbackAfterInstall); |
| FRIEND_TEST(UpdateAttempterTest, RollbackAllowed); |
| FRIEND_TEST(UpdateAttempterTest, RollbackAllowedSetAndReset); |
| FRIEND_TEST(UpdateAttempterTest, ChannelDowngradeNoRollback); |
| FRIEND_TEST(UpdateAttempterTest, ChannelDowngradeRollback); |
| FRIEND_TEST(UpdateAttempterTest, RollbackMetricsNotRollbackFailure); |
| FRIEND_TEST(UpdateAttempterTest, RollbackMetricsNotRollbackSuccess); |
| FRIEND_TEST(UpdateAttempterTest, RollbackMetricsRollbackFailure); |
| FRIEND_TEST(UpdateAttempterTest, RollbackMetricsRollbackSuccess); |
| FRIEND_TEST(UpdateAttempterTest, ScheduleErrorEventActionNoEventTest); |
| FRIEND_TEST(UpdateAttempterTest, ScheduleErrorEventActionTest); |
| FRIEND_TEST(UpdateAttempterTest, SessionIdTestEnforceEmptyStrPingOmaha); |
| FRIEND_TEST(UpdateAttempterTest, SessionIdTestOnOmahaRequestActions); |
| FRIEND_TEST(UpdateAttempterTest, SetRollbackHappenedNotRollback); |
| FRIEND_TEST(UpdateAttempterTest, SetRollbackHappenedRollback); |
| FRIEND_TEST(UpdateAttempterTest, TargetChannelHintSetAndReset); |
| FRIEND_TEST(UpdateAttempterTest, TargetVersionPrefixSetAndReset); |
| FRIEND_TEST(UpdateAttempterTest, UpdateAfterInstall); |
| FRIEND_TEST(UpdateAttempterTest, UpdateAttemptFlagsCachedAtUpdateStart); |
| FRIEND_TEST(UpdateAttempterTest, UpdateDeferredByPolicyTest); |
| FRIEND_TEST(UpdateAttempterTest, UpdateIsNotRunningWhenUpdateAvailable); |
| FRIEND_TEST(UpdateAttempterTest, GetSuccessfulDlcIds); |
| FRIEND_TEST(UpdateAttempterTest, QuickFixTokenWhenDeviceIsEnterpriseEnrolled); |
| FRIEND_TEST(UpdateAttempterTest, MoveToPrefs); |
| |
| // Returns the special flags to be added to ErrorCode values based on the |
| // parameters used in the current update attempt. |
| uint32_t GetErrorCodeFlags(); |
| |
| // ActionProcessorDelegate methods |ProcessingDone()| internal helpers. |
| void ProcessingDoneInternal(const ActionProcessor* processor, ErrorCode code); |
| void ProcessingDoneUpdate(const ActionProcessor* processor, ErrorCode code); |
| void ProcessingDoneInstall(const ActionProcessor* processor, ErrorCode code); |
| |
| // CertificateChecker::Observer method. |
| // Report metrics about the certificate being checked. |
| void CertificateChecked(ServerToCheck server_to_check, |
| CertificateCheckResult result) override; |
| |
| // Checks if it's more than 24 hours since daily metrics were last |
| // reported and, if so, reports daily metrics. Returns |true| if |
| // metrics were reported, |false| otherwise. |
| bool CheckAndReportDailyMetrics(); |
| |
| // Calculates and reports the age of the currently running OS. This |
| // is defined as the age of the /etc/lsb-release file. |
| void ReportOSAge(); |
| |
| // Sets the status to the given status and notifies a status update over dbus. |
| void SetStatusAndNotify(UpdateStatus status); |
| |
| // Creates an error event object in |error_event_| to be included in an |
| // OmahaRequestAction once the current action processor is done. |
| void CreatePendingErrorEvent(AbstractAction* action, ErrorCode code); |
| |
| // If there's a pending error event allocated in |error_event_|, schedules an |
| // OmahaRequestAction with that event in the current processor, clears the |
| // pending event, updates the status and returns true. Returns false |
| // otherwise. |
| bool ScheduleErrorEventAction(); |
| |
| // Schedules an event loop callback to start the action processor. This is |
| // scheduled asynchronously to unblock the event loop. |
| void ScheduleProcessingStart(); |
| |
| // Checks if a full update is needed and forces it by updating the Omaha |
| // request params. |
| void DisableDeltaUpdateIfNeeded(); |
| |
| // If this was a delta update attempt that failed, count it so that a full |
| // update can be tried when needed. |
| void MarkDeltaUpdateFailure(); |
| |
| ProxyResolver* GetProxyResolver() { |
| if (obeying_proxies_) |
| return &chrome_proxy_resolver_; |
| return &direct_proxy_resolver_; |
| } |
| |
| // Sends a ping to Omaha. |
| // This is used after an update has been applied and we're waiting for the |
| // user to reboot. This ping helps keep the number of actives count |
| // accurate in case a user takes a long time to reboot the device after an |
| // update has been applied. |
| void PingOmaha(); |
| |
| // Helper method of Update() to calculate the update-related parameters |
| // from various sources and set the appropriate state. Please refer to |
| // Update() method for the meaning of the parameters. |
| bool CalculateUpdateParams( |
| const chromeos_update_manager::UpdateCheckParams& params); |
| |
| // Calculates all the scattering related parameters (such as waiting period, |
| // which type of scattering is enabled, etc.) and also updates/deletes |
| // the corresponding prefs file used in scattering. Should be called |
| // only after the device policy has been loaded and set in the system state. |
| void CalculateScatteringParams(bool interactive); |
| |
| // Sets a random value for the waiting period to wait for before downloading |
| // an update, if one available. This value will be upperbounded by the |
| // scatter factor value specified from policy. |
| void GenerateNewWaitingPeriod(); |
| |
| // Helper method of Update() to construct the sequence of actions to |
| // be performed for an update check. Please refer to |
| // Update() method for the meaning of the parameters. |
| void BuildUpdateActions(bool interactive); |
| |
| // Decrements the count in the kUpdateCheckCountFilePath. |
| // Returns True if successfully decremented, false otherwise. |
| bool DecrementUpdateCheckCount(); |
| |
| // Starts p2p and performs housekeeping. Returns true only if p2p is |
| // running and housekeeping was done. |
| bool StartP2PAndPerformHousekeeping(); |
| |
| // Calculates whether peer-to-peer should be used. Sets the |
| // |use_p2p_to_download_| and |use_p2p_to_share_| parameters |
| // on the |omaha_request_params_| object. |
| void CalculateP2PParams(bool interactive); |
| |
| // For each key, reads value from powerwash safe prefs and adds it to prefs |
| // if key doesnt already exist. Then deletes the powerwash safe keys. |
| void MoveToPrefs(const std::vector<std::string>& keys); |
| |
| // Starts P2P if it's enabled and there are files to actually share. |
| // Called only at program startup. Returns true only if p2p was |
| // started and housekeeping was performed. |
| bool StartP2PAtStartup(); |
| |
| // Writes to the processing completed marker. Does nothing if |
| // |update_completed_marker_| is empty. |
| void WriteUpdateCompletedMarker(); |
| |
| // Reboots the system directly by calling /sbin/shutdown. Returns true on |
| // success. |
| bool RebootDirectly(); |
| |
| // Callback for the async UpdateCheckAllowed policy request. If |status| is |
| // |EvalStatus::kSucceeded|, either runs or suppresses periodic update checks, |
| // based on the content of |params|. Otherwise, retries the policy request. |
| void OnUpdateScheduled( |
| chromeos_update_manager::EvalStatus status, |
| const chromeos_update_manager::UpdateCheckParams& params); |
| |
| // Updates the time an update was last attempted to the current time. |
| void UpdateLastCheckedTime(); |
| |
| // Checks whether we need to clear the rollback-happened preference after |
| // policy is available again. |
| void UpdateRollbackHappened(); |
| |
| // Returns if an update is: running, applied and needs reboot, or scheduled. |
| bool IsBusyOrUpdateScheduled(); |
| |
| void CalculateStagingParams(bool interactive); |
| |
| // Reports a metric that tracks the time from when the update was first seen |
| // to the time when the update was finally downloaded and applied. This metric |
| // will only be reported for enterprise enrolled devices. |
| void ReportTimeToUpdateAppliedMetric(); |
| |
| // Resets interactivity and forced update flags. |
| void ResetInteractivityFlags(); |
| |
| // Resets all the DLC prefs. |
| bool ResetDlcPrefs(const std::string& dlc_id); |
| |
| // Sets given pref key for DLC and platform. |
| void SetPref(const std::string& pref_key, |
| const std::string& pref_value, |
| const std::string& payload_id); |
| |
| // Get the integer values from the DLC metadata for |kPrefsPingLastActive| |
| // or |kPrefsPingLastRollcall|. |
| // The value is equal to -2 when the value cannot be read or is not numeric. |
| // The value is equal to -1 the first time it is being sent, which is |
| // when the metadata file doesn't exist. |
| int64_t GetPingMetadata(const std::string& metadata_key) const; |
| |
| // Calculates the update parameters for DLCs. Sets the |dlc_ids_| |
| // parameter on the |omaha_request_params_| object. |
| void CalculateDlcParams(); |
| |
| // Returns the list of DLC IDs that were installed/updated, excluding the ones |
| // which had "noupdate" in the Omaha response. |
| std::vector<std::string> GetSuccessfulDlcIds(); |
| |
| // Last status notification timestamp used for throttling. Use monotonic |
| // TimeTicks to ensure that notifications are sent even if the system clock is |
| // set back in the middle of an update. |
| base::TimeTicks last_notify_time_; |
| |
| // Our two proxy resolvers |
| DirectProxyResolver direct_proxy_resolver_; |
| ChromeBrowserProxyResolver chrome_proxy_resolver_; |
| |
| std::unique_ptr<ActionProcessor> processor_; |
| |
| ActionProcessor aux_processor_; |
| |
| // Pointer to the certificate checker instance to use. |
| CertificateChecker* cert_checker_; |
| |
| // The list of services observing changes in the updater. |
| std::set<ServiceObserverInterface*> service_observers_; |
| |
| // The install plan. |
| std::unique_ptr<InstallPlan> install_plan_; |
| |
| // Pointer to the preferences store interface. This is just a cached |
| // copy of SystemState::Get()->prefs() because it's used in many methods and |
| // is convenient this way. |
| PrefsInterface* prefs_ = nullptr; |
| |
| // Pending error event, if any. |
| std::unique_ptr<OmahaEvent> error_event_; |
| |
| // If we should request a reboot even tho we failed the update |
| bool fake_update_success_ = false; |
| |
| // HTTP server response code from the last HTTP request action. |
| int http_response_code_ = 0; |
| |
| // The attempt error code when the update attempt finished. |
| ErrorCode attempt_error_code_ = ErrorCode::kSuccess; |
| |
| // CPU limiter during the update. |
| CPULimiter cpu_limiter_; |
| |
| // For status: |
| UpdateStatus status_{UpdateStatus::IDLE}; |
| double download_progress_ = 0.0; |
| int64_t last_checked_time_ = 0; |
| std::string prev_version_; |
| std::string new_version_ = "0.0.0.0"; |
| uint64_t new_payload_size_ = 0; |
| // Flags influencing all periodic update checks |
| UpdateAttemptFlags update_attempt_flags_ = UpdateAttemptFlags::kNone; |
| // Flags influencing the currently in-progress check (cached at the start of |
| // the update check). |
| UpdateAttemptFlags current_update_attempt_flags_ = UpdateAttemptFlags::kNone; |
| |
| // Common parameters for all Omaha requests. |
| OmahaRequestParams* omaha_request_params_ = nullptr; |
| |
| // Number of consecutive manual update checks we've had where we obeyed |
| // Chrome's proxy settings. |
| int proxy_manual_checks_ = 0; |
| |
| // If true, this update cycle we are obeying proxies |
| bool obeying_proxies_ = true; |
| |
| // Used for fetching information about the device policy. |
| std::unique_ptr<policy::PolicyProvider> policy_provider_; |
| |
| // The current scatter factor as found in the policy setting. |
| base::TimeDelta scatter_factor_; |
| |
| // The number of consecutive failed update checks. Needed for calculating the |
| // next update check interval. |
| unsigned int consecutive_failed_update_checks_ = 0; |
| |
| // The poll interval (in seconds) that was dictated by Omaha, if any; zero |
| // otherwise. This is needed for calculating the update check interval. |
| unsigned int server_dictated_poll_interval_ = 0; |
| |
| // Tracks whether we have scheduled update checks. |
| bool waiting_for_scheduled_check_ = false; |
| |
| // A callback to use when a forced update request is either received (true) or |
| // cleared by an update attempt (false). The second argument indicates whether |
| // this is an interactive update, and its value is significant iff the first |
| // argument is true. |
| std::unique_ptr<base::Callback<void(bool, bool)>> |
| forced_update_pending_callback_; |
| |
| // The |app_version| and |omaha_url| parameters received during the latest |
| // forced update request. They are retrieved for use once the update is |
| // actually scheduled. |
| std::string forced_app_version_; |
| std::string forced_omaha_url_; |
| |
| // A list of DLC module IDs. |
| std::vector<std::string> dlc_ids_; |
| // Whether the operation is install (write to the current slot not the |
| // inactive slot). |
| bool is_install_; |
| |
| // If this is not TimeDelta(), then that means staging is turned on. |
| base::TimeDelta staging_wait_time_; |
| chromeos_update_manager::StagingSchedule staging_schedule_; |
| |
| // This is the session ID used to track update flow to Omaha. |
| std::string session_id_; |
| |
| // Interface for excluder. |
| std::unique_ptr<ExcluderInterface> excluder_; |
| |
| DISALLOW_COPY_AND_ASSIGN(UpdateAttempter); |
| }; |
| |
| // Turns a generic ErrorCode::kError to a generic error code specific |
| // to |action| (e.g., ErrorCode::kFilesystemVerifierError). If |code| is |
| // not ErrorCode::kError, or the action is not matched, returns |code| |
| // unchanged. |
| |
| ErrorCode GetErrorCodeForAction(AbstractAction* action, ErrorCode code); |
| |
| } // namespace chromeos_update_engine |
| |
| #endif // UPDATE_ENGINE_CROS_UPDATE_ATTEMPTER_H_ |