blob: b4370c4393a347d93c8656f4c04b08e43768562c [file] [log] [blame]
//
// Copyright (C) 2014 The Android Open Source Project
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
#ifndef UPDATE_ENGINE_UPDATE_MANAGER_CHROMEOS_POLICY_H_
#define UPDATE_ENGINE_UPDATE_MANAGER_CHROMEOS_POLICY_H_
#include <string>
#include <base/time/time.h>
#include <gtest/gtest_prod.h> // for FRIEND_TEST
#include "update_engine/update_manager/policy.h"
#include "update_engine/update_manager/prng.h"
namespace chromeos_update_manager {
// Output information from UpdateBackoffAndDownloadUrl.
struct UpdateBackoffAndDownloadUrlResult {
// Whether the failed attempt count (maintained by the caller) needs to be
// incremented.
bool do_increment_failures;
// The current backoff expiry. Null if backoff is not in effect.
base::Time backoff_expiry;
// The new URL index to use and number of download errors associated with it.
// Significant iff |do_increment_failures| is false and |backoff_expiry| is
// null. Negative value means no usable URL was found.
int url_idx;
int url_num_errors;
};
// Parameters for update scattering, as returned by UpdateScattering.
struct UpdateScatteringResult {
bool is_scattering;
base::TimeDelta wait_period;
int check_threshold;
};
// ChromeOSPolicy implements the policy-related logic used in ChromeOS.
class ChromeOSPolicy : public Policy {
public:
ChromeOSPolicy() {}
~ChromeOSPolicy() override {}
// Policy overrides.
EvalStatus UpdateCheckAllowed(
EvaluationContext* ec, State* state, std::string* error,
UpdateCheckParams* result) const override;
EvalStatus UpdateCanStart(
EvaluationContext* ec,
State* state,
std::string* error,
UpdateDownloadParams* result,
UpdateState update_state) const override;
EvalStatus UpdateDownloadAllowed(
EvaluationContext* ec,
State* state,
std::string* error,
bool* result) const override;
EvalStatus P2PEnabled(
EvaluationContext* ec,
State* state,
std::string* error,
bool* result) const override;
EvalStatus P2PEnabledChanged(
EvaluationContext* ec,
State* state,
std::string* error,
bool* result,
bool prev_result) const override;
protected:
// Policy override.
std::string PolicyName() const override { return "ChromeOSPolicy"; }
private:
friend class UmChromeOSPolicyTest;
FRIEND_TEST(UmChromeOSPolicyTest,
FirstCheckIsAtMostInitialIntervalAfterStart);
FRIEND_TEST(UmChromeOSPolicyTest, RecurringCheckBaseIntervalAndFuzz);
FRIEND_TEST(UmChromeOSPolicyTest, RecurringCheckBackoffIntervalAndFuzz);
FRIEND_TEST(UmChromeOSPolicyTest, RecurringCheckServerDictatedPollInterval);
FRIEND_TEST(UmChromeOSPolicyTest, ExponentialBackoffIsCapped);
FRIEND_TEST(UmChromeOSPolicyTest, UpdateCheckAllowedWaitsForTheTimeout);
FRIEND_TEST(UmChromeOSPolicyTest, UpdateCheckAllowedWaitsForOOBE);
FRIEND_TEST(UmChromeOSPolicyTest,
UpdateCanStartNotAllowedScatteringNewWaitPeriodApplies);
FRIEND_TEST(UmChromeOSPolicyTest,
UpdateCanStartNotAllowedScatteringPrevWaitPeriodStillApplies);
FRIEND_TEST(UmChromeOSPolicyTest,
UpdateCanStartNotAllowedScatteringNewCountThresholdApplies);
FRIEND_TEST(UmChromeOSPolicyTest,
UpdateCanStartNotAllowedScatteringPrevCountThresholdStillApplies);
FRIEND_TEST(UmChromeOSPolicyTest, UpdateCanStartAllowedScatteringSatisfied);
FRIEND_TEST(UmChromeOSPolicyTest,
UpdateCanStartAllowedInteractivePreventsScattering);
FRIEND_TEST(UmChromeOSPolicyTest,
UpdateCanStartAllowedP2PDownloadingBlockedDueToNumAttempts);
FRIEND_TEST(UmChromeOSPolicyTest,
UpdateCanStartAllowedP2PDownloadingBlockedDueToAttemptsPeriod);
// Auxiliary constant (zero by default).
const base::TimeDelta kZeroInterval;
// Default update check timeout interval/fuzz values used to compute the
// NextUpdateCheckTime(), in seconds. Actual fuzz is within +/- half of the
// indicated value.
static const int kTimeoutInitialInterval;
static const int kTimeoutPeriodicInterval;
static const int kTimeoutMaxBackoffInterval;
static const int kTimeoutRegularFuzz;
// Maximum update attempt backoff interval and fuzz.
static const int kAttemptBackoffMaxIntervalInDays;
static const int kAttemptBackoffFuzzInHours;
// Maximum number of times we'll allow using P2P for the same update payload.
static const int kMaxP2PAttempts;
// Maximum period of time allowed for download a payload via P2P, in seconds.
static const int kMaxP2PAttemptsPeriodInSeconds;
// A private policy implementation returning the wallclock timestamp when
// the next update check should happen.
// TODO(garnold) We should probably change that to infer a monotonic
// timestamp, which will make the update check intervals more resilient to
// clock skews. Might require switching some of the variables exported by the
// UpdaterProvider to report monotonic time, as well.
EvalStatus NextUpdateCheckTime(EvaluationContext* ec, State* state,
std::string* error,
base::Time* next_update_check) const;
// Returns a TimeDelta based on the provided |interval| seconds +/- half
// |fuzz| seconds. The return value is guaranteed to be a non-negative
// TimeDelta.
static base::TimeDelta FuzzedInterval(PRNG* prng, int interval, int fuzz);
// A private policy for determining backoff and the download URL to use.
// Within |update_state|, |backoff_expiry| and |is_backoff_disabled| are used
// for determining whether backoff is still in effect; if not,
// |download_errors| is scanned past |failures_last_updated|, and a new
// download URL from |download_urls| is found and written to |result->url_idx|
// (-1 means no usable URL exists); |download_errors_max| determines the
// maximum number of attempts per URL, according to the Omaha response. If an
// update failure is identified then |result->do_increment_failures| is set to
// true; if backoff is enabled, a new backoff period is computed (from the
// time of failure) based on |num_failures|. Otherwise, backoff expiry is
// nullified, indicating that no backoff is in effect.
//
// If backing off but the previous backoff expiry is unchanged, returns
// |EvalStatus::kAskMeAgainLater|. Otherwise:
//
// * If backing off with a new expiry time, then |result->backoff_expiry| is
// set to this time.
//
// * Else, |result->backoff_expiry| is set to null, indicating that no backoff
// is in effect.
//
// In any of these cases, returns |EvalStatus::kSucceeded|. If an error
// occurred, returns |EvalStatus::kFailed|.
EvalStatus UpdateBackoffAndDownloadUrl(
EvaluationContext* ec, State* state, std::string* error,
UpdateBackoffAndDownloadUrlResult* result,
const UpdateState& update_state) const;
// A private policy for checking whether scattering is due. Writes in |result|
// the decision as to whether or not to scatter; a wallclock-based scatter
// wait period, which ranges from zero (do not wait) and no greater than the
// current scatter factor provided by the device policy (if available) or the
// maximum wait period determined by Omaha; and an update check-based
// threshold between zero (no threshold) and the maximum number determined by
// the update engine. Within |update_state|, |scatter_wait_period| should
// contain the last scattering period returned by this function, or zero if no
// wait period is known; |scatter_check_threshold| is the last update check
// threshold, or zero if no such threshold is known. If not scattering, or if
// any of the scattering values has changed, returns |EvalStatus::kSucceeded|;
// otherwise, |EvalStatus::kAskMeAgainLater|.
EvalStatus UpdateScattering(EvaluationContext* ec, State* state,
std::string* error,
UpdateScatteringResult* result,
const UpdateState& update_state) const;
DISALLOW_COPY_AND_ASSIGN(ChromeOSPolicy);
};
} // namespace chromeos_update_manager
#endif // UPDATE_ENGINE_UPDATE_MANAGER_CHROMEOS_POLICY_H_