| // |
| // Copyright (C) 2016 The Android Open Source Project |
| // |
| // Licensed under the Apache License, Version 2.0 (the "License"); |
| // you may not use this file except in compliance with the License. |
| // You may obtain a copy of the License at |
| // |
| // http://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, software |
| // distributed under the License is distributed on an "AS IS" BASIS, |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| // See the License for the specific language governing permissions and |
| // limitations under the License. |
| // |
| |
| #ifndef UPDATE_ENGINE_AOSP_UPDATE_ATTEMPTER_ANDROID_H_ |
| #define UPDATE_ENGINE_AOSP_UPDATE_ATTEMPTER_ANDROID_H_ |
| |
| #include <stdint.h> |
| |
| #include <memory> |
| #include <string> |
| #include <vector> |
| |
| #include <android-base/unique_fd.h> |
| #include <base/time/time.h> |
| |
| #include "update_engine/aosp/apex_handler_interface.h" |
| #include "update_engine/aosp/service_delegate_android_interface.h" |
| #include "update_engine/client_library/include/update_engine/update_status.h" |
| #include "update_engine/common/action_processor.h" |
| #include "update_engine/common/boot_control_interface.h" |
| #include "update_engine/common/clock.h" |
| #include "update_engine/common/daemon_state_interface.h" |
| #include "update_engine/common/download_action.h" |
| #include "update_engine/common/hardware_interface.h" |
| #include "update_engine/common/metrics_reporter_interface.h" |
| #include "update_engine/common/network_selector_interface.h" |
| #include "update_engine/common/prefs_interface.h" |
| #include "update_engine/common/service_observer_interface.h" |
| #include "update_engine/metrics_utils.h" |
| #include "update_engine/payload_consumer/filesystem_verifier_action.h" |
| #include "update_engine/payload_consumer/postinstall_runner_action.h" |
| |
| namespace chromeos_update_engine { |
| |
| enum class OTAResult { |
| NOT_ATTEMPTED, |
| ROLLED_BACK, |
| UPDATED_NEED_REBOOT, |
| OTA_SUCCESSFUL, |
| }; |
| |
| class UpdateAttempterAndroid |
| : public ServiceDelegateAndroidInterface, |
| public ActionProcessorDelegate, |
| public DownloadActionDelegate, |
| public FilesystemVerifyDelegate, |
| public PostinstallRunnerAction::DelegateInterface, |
| public CleanupPreviousUpdateActionDelegateInterface { |
| public: |
| using UpdateStatus = update_engine::UpdateStatus; |
| |
| UpdateAttempterAndroid(DaemonStateInterface* daemon_state, |
| PrefsInterface* prefs, |
| BootControlInterface* boot_control_, |
| HardwareInterface* hardware_, |
| std::unique_ptr<ApexHandlerInterface> apex_handler); |
| ~UpdateAttempterAndroid() override; |
| |
| // Further initialization to be done post construction. |
| void Init(); |
| |
| // ServiceDelegateAndroidInterface overrides. |
| bool ApplyPayload(const std::string& payload_url, |
| int64_t payload_offset, |
| int64_t payload_size, |
| const std::vector<std::string>& key_value_pair_headers, |
| brillo::ErrorPtr* error) override; |
| bool ApplyPayload(int fd, |
| int64_t payload_offset, |
| int64_t payload_size, |
| const std::vector<std::string>& key_value_pair_headers, |
| brillo::ErrorPtr* error) override; |
| bool SuspendUpdate(brillo::ErrorPtr* error) override; |
| bool ResumeUpdate(brillo::ErrorPtr* error) override; |
| bool CancelUpdate(brillo::ErrorPtr* error) override; |
| bool ResetStatus(brillo::ErrorPtr* error) override; |
| bool VerifyPayloadApplicable(const std::string& metadata_filename, |
| brillo::ErrorPtr* error) override; |
| uint64_t AllocateSpaceForPayload( |
| const std::string& metadata_filename, |
| const std::vector<std::string>& key_value_pair_headers, |
| brillo::ErrorPtr* error) override; |
| void CleanupSuccessfulUpdate( |
| std::unique_ptr<CleanupSuccessfulUpdateCallbackInterface> callback, |
| brillo::ErrorPtr* error) override; |
| bool setShouldSwitchSlotOnReboot(const std::string& metadata_filename, |
| brillo::ErrorPtr* error) override; |
| bool resetShouldSwitchSlotOnReboot(brillo::ErrorPtr* error) override; |
| |
| // ActionProcessorDelegate methods: |
| void ProcessingDone(const ActionProcessor* processor, |
| ErrorCode code) override; |
| void ProcessingStopped(const ActionProcessor* processor) override; |
| void ActionCompleted(ActionProcessor* processor, |
| AbstractAction* action, |
| ErrorCode code) override; |
| |
| // DownloadActionDelegate overrides. |
| void BytesReceived(uint64_t bytes_progressed, |
| uint64_t bytes_received, |
| uint64_t total) override; |
| bool ShouldCancel(ErrorCode* cancel_reason) override; |
| void DownloadComplete() override; |
| |
| // FilesystemVerifyDelegate overrides |
| void OnVerifyProgressUpdate(double progress) override; |
| |
| // PostinstallRunnerAction::DelegateInterface |
| void ProgressUpdate(double progress) override; |
| |
| // CleanupPreviousUpdateActionDelegateInterface |
| void OnCleanupProgressUpdate(double progress) override; |
| |
| // Check the result of an OTA update. Intended to be called after reboot, this |
| // will use prefs on disk to determine if OTA was installed, or rolledback. |
| [[nodiscard]] OTAResult GetOTAUpdateResult() const; |
| // Intended to be called: |
| // 1. When system rebooted and slot switch is attempted |
| // 2. When a new update is started |
| // 3. When user called |ResetStatus()| |
| bool ClearUpdateCompletedMarker(); |
| |
| void set_update_certificates_path( |
| const std::string& update_certificates_path) { |
| update_certificates_path_ = update_certificates_path; |
| } |
| |
| private: |
| friend class UpdateAttempterAndroidTest; |
| |
| // Return |true| only if slot switched successfully after an OTA reboot. |
| // This will return |false| if an downgrade OTA is applied. Because after a |
| // downgrade OTA, we wipe /data, and there's no way for update_engine to |
| // "remember" that a downgrade OTA took place. |
| [[nodiscard]] bool OTARebootSucceeded() const; |
| |
| // Schedules an event loop callback to start the action processor. This is |
| // scheduled asynchronously to unblock the event loop. |
| void ScheduleProcessingStart(); |
| |
| // Notifies an update request completed with the given error |code| to all |
| // observers. |
| void TerminateUpdateAndNotify(ErrorCode error_code); |
| |
| // Sets the status to the given |status| and notifies a status update to |
| // all observers. |
| void SetStatusAndNotify(UpdateStatus status); |
| |
| // Helper method to construct the sequence of actions to be performed for |
| // applying an update using a given HttpFetcher. The ownership of |fetcher| is |
| // passed to this function. |
| void BuildUpdateActions(HttpFetcher* fetcher); |
| |
| // Writes to the processing completed marker. Does nothing if |
| // |update_completed_marker_| is empty. |
| [[nodiscard]] bool WriteUpdateCompletedMarker(); |
| |
| // Returns whether an update was completed in the current boot. |
| [[nodiscard]] bool UpdateCompletedOnThisBoot(); |
| |
| // Prefs to use for metrics report |
| // |kPrefsPayloadAttemptNumber|: number of update attempts for the current |
| // payload_id. |
| // |KprefsNumReboots|: number of reboots when applying the current update. |
| // |kPrefsSystemUpdatedMarker|: end timestamp of the last successful update. |
| // |kPrefsUpdateTimestampStart|: start timestamp in monotonic time of the |
| // current update. |
| // |kPrefsUpdateBootTimestampStart|: start timestamp in boot time of |
| // the current update. |
| // |kPrefsCurrentBytesDownloaded|: number of bytes downloaded for the current |
| // payload_id. |
| // |kPrefsTotalBytesDownloaded|: number of bytes downloaded in total since |
| // the last successful update. |
| |
| // Metrics report function to call: |
| // |ReportUpdateAttemptMetrics| |
| // |ReportSuccessfulUpdateMetrics| |
| // Prefs to update: |
| // |kPrefsSystemUpdatedMarker| |
| void CollectAndReportUpdateMetricsOnUpdateFinished(ErrorCode error_code); |
| |
| // This function is called after update_engine is started after device |
| // reboots. If update_engine is restarted w/o device reboot, this function |
| // would not be called. |
| |
| // Metrics report function to call: |
| // |ReportAbnormallyTerminatedUpdateAttemptMetrics| |
| // |ReportTimeToRebootMetrics| |
| // Prefs to update: |
| // |kPrefsBootId|, |kPrefsPreviousVersion| |
| void UpdateStateAfterReboot(OTAResult result); |
| |
| // Prefs to update: |
| // |kPrefsPayloadAttemptNumber|, |kPrefsUpdateTimestampStart|, |
| // |kPrefsUpdateBootTimestampStart| |
| void UpdatePrefsOnUpdateStart(bool is_resume); |
| |
| // Prefs to delete: |
| // |kPrefsNumReboots|, |kPrefsCurrentBytesDownloaded| |
| // |kPrefsSystemUpdatedMarker|, |kPrefsUpdateTimestampStart|, |
| // |kPrefsUpdateBootTimestampStart| |
| void ClearMetricsPrefs(); |
| |
| // Return source and target slots for update. |
| BootControlInterface::Slot GetCurrentSlot() const; |
| BootControlInterface::Slot GetTargetSlot() const; |
| |
| // Helper of public VerifyPayloadApplicable. Return the parsed manifest in |
| // |manifest|. |
| static bool VerifyPayloadParseManifest(const std::string& metadata_filename, |
| DeltaArchiveManifest* manifest, |
| brillo::ErrorPtr* error); |
| |
| // Enqueue and run a CleanupPreviousUpdateAction. |
| void ScheduleCleanupPreviousUpdate(); |
| |
| // Notify and clear |cleanup_previous_update_callbacks_|. |
| void NotifyCleanupPreviousUpdateCallbacksAndClear(); |
| |
| // Remove |callback| from |cleanup_previous_update_callbacks_|. |
| void RemoveCleanupPreviousUpdateCallback( |
| CleanupSuccessfulUpdateCallbackInterface* callback); |
| |
| DaemonStateInterface* daemon_state_; |
| |
| // DaemonStateAndroid pointers. |
| PrefsInterface* prefs_; |
| BootControlInterface* boot_control_; |
| HardwareInterface* hardware_; |
| |
| std::unique_ptr<ApexHandlerInterface> apex_handler_android_; |
| |
| // Last status notification timestamp used for throttling. Use monotonic |
| // TimeTicks to ensure that notifications are sent even if the system clock is |
| // set back in the middle of an update. |
| base::TimeTicks last_notify_time_; |
| |
| // Only direct proxy supported. |
| DirectProxyResolver proxy_resolver_; |
| |
| // The processor for running Actions. |
| std::unique_ptr<ActionProcessor> processor_; |
| |
| // The InstallPlan used during the ongoing update. |
| InstallPlan install_plan_; |
| |
| // For status: |
| UpdateStatus status_{UpdateStatus::IDLE}; |
| double download_progress_{0.0}; |
| |
| // The offset in the payload file where the CrAU part starts. |
| int64_t base_offset_{0}; |
| |
| // Helper class to select the network to use during the update. |
| std::unique_ptr<NetworkSelectorInterface> network_selector_; |
| |
| std::unique_ptr<ClockInterface> clock_; |
| |
| std::unique_ptr<MetricsReporterInterface> metrics_reporter_; |
| |
| ::android::base::unique_fd payload_fd_; |
| |
| std::vector<std::unique_ptr<CleanupSuccessfulUpdateCallbackInterface>> |
| cleanup_previous_update_callbacks_; |
| // Result of previous CleanupPreviousUpdateAction. Nullopt If |
| // CleanupPreviousUpdateAction has not been executed. |
| std::optional<ErrorCode> cleanup_previous_update_code_{std::nullopt}; |
| |
| // The path to the zip file with X509 certificates. |
| std::string update_certificates_path_{constants::kUpdateCertificatesPath}; |
| |
| DISALLOW_COPY_AND_ASSIGN(UpdateAttempterAndroid); |
| }; |
| |
| } // namespace chromeos_update_engine |
| |
| #endif // UPDATE_ENGINE_AOSP_UPDATE_ATTEMPTER_ANDROID_H_ |