blob: 32ee61b19417babec0085f90625be9209b0f6a27 [file] [log] [blame]
Christopher Tate487529a2009-04-29 14:03:25 -07001/*
2 * Copyright (C) 2009 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package com.android.server;
18
Christopher Tate181fafa2009-05-14 11:12:14 -070019import android.app.ActivityManagerNative;
Christopher Tateb6787f22009-07-02 17:40:45 -070020import android.app.AlarmManager;
Christopher Tate181fafa2009-05-14 11:12:14 -070021import android.app.IActivityManager;
22import android.app.IApplicationThread;
23import android.app.IBackupAgent;
Christopher Tateb6787f22009-07-02 17:40:45 -070024import android.app.PendingIntent;
Christopher Tate3799bc22009-05-06 16:13:56 -070025import android.content.BroadcastReceiver;
Dan Egnor87a02bc2009-06-17 02:30:10 -070026import android.content.ComponentName;
Christopher Tate487529a2009-04-29 14:03:25 -070027import android.content.Context;
28import android.content.Intent;
Christopher Tate3799bc22009-05-06 16:13:56 -070029import android.content.IntentFilter;
Dan Egnor87a02bc2009-06-17 02:30:10 -070030import android.content.ServiceConnection;
Christopher Tate181fafa2009-05-14 11:12:14 -070031import android.content.pm.ApplicationInfo;
Christopher Tatec7b31e32009-06-10 15:49:30 -070032import android.content.pm.IPackageDataObserver;
Christopher Tate7b881282009-06-07 13:52:37 -070033import android.content.pm.PackageInfo;
Christopher Tate043dadc2009-06-02 16:11:00 -070034import android.content.pm.PackageManager.NameNotFoundException;
Dan Egnor87a02bc2009-06-17 02:30:10 -070035import android.content.pm.PackageManager;
Christopher Tateabce4e82009-06-18 18:35:32 -070036import android.content.pm.Signature;
Christopher Tate3799bc22009-05-06 16:13:56 -070037import android.net.Uri;
Christopher Tatece0bf062009-07-01 11:43:53 -070038import android.provider.Settings;
Christopher Tate487529a2009-04-29 14:03:25 -070039import android.os.Binder;
Christopher Tate3799bc22009-05-06 16:13:56 -070040import android.os.Bundle;
Christopher Tate22b87872009-05-04 16:41:53 -070041import android.os.Environment;
Christopher Tate487529a2009-04-29 14:03:25 -070042import android.os.Handler;
43import android.os.IBinder;
44import android.os.Message;
Christopher Tate22b87872009-05-04 16:41:53 -070045import android.os.ParcelFileDescriptor;
Christopher Tateb6787f22009-07-02 17:40:45 -070046import android.os.PowerManager;
Christopher Tate043dadc2009-06-02 16:11:00 -070047import android.os.Process;
Christopher Tate487529a2009-04-29 14:03:25 -070048import android.os.RemoteException;
Dan Egnorbb9001c2009-07-27 12:20:13 -070049import android.os.SystemClock;
50import android.util.EventLog;
Christopher Tate487529a2009-04-29 14:03:25 -070051import android.util.Log;
52import android.util.SparseArray;
53
54import android.backup.IBackupManager;
Christopher Tate7d562ec2009-06-25 18:03:43 -070055import android.backup.IRestoreObserver;
Christopher Tate8c850b72009-06-07 19:33:20 -070056import android.backup.IRestoreSession;
Christopher Tate9b3905c2009-06-08 15:24:01 -070057import android.backup.RestoreSet;
Christopher Tate043dadc2009-06-02 16:11:00 -070058
Christopher Tate9bbc21a2009-06-10 20:23:25 -070059import com.android.internal.backup.LocalTransport;
Christopher Tate043dadc2009-06-02 16:11:00 -070060import com.android.internal.backup.IBackupTransport;
Christopher Tate487529a2009-04-29 14:03:25 -070061
Christopher Tate6785dd82009-06-18 15:58:25 -070062import com.android.server.PackageManagerBackupAgent;
Christopher Tate6aa41f42009-06-19 14:14:22 -070063import com.android.server.PackageManagerBackupAgent.Metadata;
Christopher Tate6785dd82009-06-18 15:58:25 -070064
Christopher Tatecde87f42009-06-12 12:55:53 -070065import java.io.EOFException;
Christopher Tate22b87872009-05-04 16:41:53 -070066import java.io.File;
Joe Onoratob1a7ffe2009-05-06 18:06:21 -070067import java.io.FileDescriptor;
Christopher Tatec7b31e32009-06-10 15:49:30 -070068import java.io.IOException;
Joe Onoratob1a7ffe2009-05-06 18:06:21 -070069import java.io.PrintWriter;
Christopher Tatecde87f42009-06-12 12:55:53 -070070import java.io.RandomAccessFile;
Christopher Tate487529a2009-04-29 14:03:25 -070071import java.lang.String;
Joe Onorato8ad02812009-05-13 01:41:44 -040072import java.util.ArrayList;
73import java.util.HashMap;
Christopher Tate487529a2009-04-29 14:03:25 -070074import java.util.HashSet;
75import java.util.List;
Christopher Tate91717492009-06-26 21:07:13 -070076import java.util.Map;
Christopher Tate487529a2009-04-29 14:03:25 -070077
78class BackupManagerService extends IBackupManager.Stub {
79 private static final String TAG = "BackupManagerService";
80 private static final boolean DEBUG = true;
Christopher Tateaa088442009-06-16 18:25:46 -070081
Christopher Tate49401dd2009-07-01 12:34:29 -070082 // How often we perform a backup pass. Privileged external callers can
83 // trigger an immediate pass.
Christopher Tateb6787f22009-07-02 17:40:45 -070084 private static final long BACKUP_INTERVAL = AlarmManager.INTERVAL_HOUR;
Christopher Tate487529a2009-04-29 14:03:25 -070085
Christopher Tate8031a3d2009-07-06 16:36:05 -070086 // The amount of time between the initial provisioning of the device and
87 // the first backup pass.
88 private static final long FIRST_BACKUP_INTERVAL = 12 * AlarmManager.INTERVAL_HOUR;
89
Christopher Tateb6787f22009-07-02 17:40:45 -070090 private static final String RUN_BACKUP_ACTION = "_backup_run_";
Christopher Tate487529a2009-04-29 14:03:25 -070091 private static final int MSG_RUN_BACKUP = 1;
Christopher Tate043dadc2009-06-02 16:11:00 -070092 private static final int MSG_RUN_FULL_BACKUP = 2;
Christopher Tate9bbc21a2009-06-10 20:23:25 -070093 private static final int MSG_RUN_RESTORE = 3;
Christopher Tateee0e78a2009-07-02 11:17:03 -070094 private static final int MSG_RUN_CLEAR = 4;
Christopher Tatec7b31e32009-06-10 15:49:30 -070095
Dan Egnorbb9001c2009-07-27 12:20:13 -070096 // Event tags -- see system/core/logcat/event-log-tags
97 private static final int BACKUP_DATA_CHANGED_EVENT = 2820;
98 private static final int BACKUP_START_EVENT = 2821;
99 private static final int BACKUP_TRANSPORT_FAILURE_EVENT = 2822;
100 private static final int BACKUP_AGENT_FAILURE_EVENT = 2823;
101 private static final int BACKUP_PACKAGE_EVENT = 2824;
102 private static final int BACKUP_SUCCESS_EVENT = 2825;
103
104 private static final int RESTORE_START_EVENT = 2830;
105 private static final int RESTORE_TRANSPORT_FAILURE_EVENT = 2831;
106 private static final int RESTORE_AGENT_FAILURE_EVENT = 2832;
107 private static final int RESTORE_PACKAGE_EVENT = 2833;
108 private static final int RESTORE_SUCCESS_EVENT = 2834;
109
Christopher Tatec7b31e32009-06-10 15:49:30 -0700110 // Timeout interval for deciding that a bind or clear-data has taken too long
111 static final long TIMEOUT_INTERVAL = 10 * 1000;
112
Christopher Tate487529a2009-04-29 14:03:25 -0700113 private Context mContext;
114 private PackageManager mPackageManager;
Christopher Tate6ef58a12009-06-29 14:56:28 -0700115 private IActivityManager mActivityManager;
Christopher Tateb6787f22009-07-02 17:40:45 -0700116 private PowerManager mPowerManager;
117 private AlarmManager mAlarmManager;
118
Christopher Tate73e02522009-07-15 14:18:26 -0700119 boolean mEnabled; // access to this is synchronized on 'this'
120 boolean mProvisioned;
121 PowerManager.WakeLock mWakelock;
122 final BackupHandler mBackupHandler = new BackupHandler();
123 PendingIntent mRunBackupIntent;
124 BroadcastReceiver mRunBackupReceiver;
125 IntentFilter mRunBackupFilter;
Christopher Tate487529a2009-04-29 14:03:25 -0700126 // map UIDs to the set of backup client services within that UID's app set
Christopher Tate73e02522009-07-15 14:18:26 -0700127 final SparseArray<HashSet<ApplicationInfo>> mBackupParticipants
Christopher Tate181fafa2009-05-14 11:12:14 -0700128 = new SparseArray<HashSet<ApplicationInfo>>();
Christopher Tate487529a2009-04-29 14:03:25 -0700129 // set of backup services that have pending changes
Christopher Tate73e02522009-07-15 14:18:26 -0700130 class BackupRequest {
Christopher Tate181fafa2009-05-14 11:12:14 -0700131 public ApplicationInfo appInfo;
Christopher Tate46758122009-05-06 11:22:00 -0700132 public boolean fullBackup;
Christopher Tateaa088442009-06-16 18:25:46 -0700133
Christopher Tate181fafa2009-05-14 11:12:14 -0700134 BackupRequest(ApplicationInfo app, boolean isFull) {
135 appInfo = app;
Christopher Tate46758122009-05-06 11:22:00 -0700136 fullBackup = isFull;
137 }
Christopher Tate181fafa2009-05-14 11:12:14 -0700138
139 public String toString() {
140 return "BackupRequest{app=" + appInfo + " full=" + fullBackup + "}";
141 }
Christopher Tate46758122009-05-06 11:22:00 -0700142 }
Joe Onorato8ad02812009-05-13 01:41:44 -0400143 // Backups that we haven't started yet.
Christopher Tate73e02522009-07-15 14:18:26 -0700144 HashMap<ApplicationInfo,BackupRequest> mPendingBackups
Christopher Tate181fafa2009-05-14 11:12:14 -0700145 = new HashMap<ApplicationInfo,BackupRequest>();
Christopher Tate5cb400b2009-06-25 16:03:14 -0700146
147 // Pseudoname that we use for the Package Manager metadata "package"
Christopher Tate73e02522009-07-15 14:18:26 -0700148 static final String PACKAGE_MANAGER_SENTINEL = "@pm@";
Christopher Tate6aa41f42009-06-19 14:14:22 -0700149
150 // locking around the pending-backup management
Christopher Tate73e02522009-07-15 14:18:26 -0700151 final Object mQueueLock = new Object();
Christopher Tate487529a2009-04-29 14:03:25 -0700152
Christopher Tate043dadc2009-06-02 16:11:00 -0700153 // The thread performing the sequence of queued backups binds to each app's agent
154 // in succession. Bind notifications are asynchronously delivered through the
155 // Activity Manager; use this lock object to signal when a requested binding has
156 // completed.
Christopher Tate73e02522009-07-15 14:18:26 -0700157 final Object mAgentConnectLock = new Object();
158 IBackupAgent mConnectedAgent;
159 volatile boolean mConnecting;
Christopher Tate043dadc2009-06-02 16:11:00 -0700160
Christopher Tatec7b31e32009-06-10 15:49:30 -0700161 // A similar synchronicity mechanism around clearing apps' data for restore
Christopher Tate73e02522009-07-15 14:18:26 -0700162 final Object mClearDataLock = new Object();
163 volatile boolean mClearingData;
Christopher Tatec7b31e32009-06-10 15:49:30 -0700164
Christopher Tate91717492009-06-26 21:07:13 -0700165 // Transport bookkeeping
Christopher Tate73e02522009-07-15 14:18:26 -0700166 final HashMap<String,IBackupTransport> mTransports
Christopher Tate91717492009-06-26 21:07:13 -0700167 = new HashMap<String,IBackupTransport>();
Christopher Tate73e02522009-07-15 14:18:26 -0700168 String mCurrentTransport;
169 IBackupTransport mLocalTransport, mGoogleTransport;
170 RestoreSession mActiveRestoreSession;
Christopher Tate043dadc2009-06-02 16:11:00 -0700171
Christopher Tate73e02522009-07-15 14:18:26 -0700172 class RestoreParams {
Christopher Tate7d562ec2009-06-25 18:03:43 -0700173 public IBackupTransport transport;
174 public IRestoreObserver observer;
Dan Egnor156411d2009-06-26 13:20:02 -0700175 public long token;
Christopher Tate7d562ec2009-06-25 18:03:43 -0700176
Dan Egnor156411d2009-06-26 13:20:02 -0700177 RestoreParams(IBackupTransport _transport, IRestoreObserver _obs, long _token) {
Christopher Tate7d562ec2009-06-25 18:03:43 -0700178 transport = _transport;
179 observer = _obs;
Dan Egnor156411d2009-06-26 13:20:02 -0700180 token = _token;
Christopher Tate7d562ec2009-06-25 18:03:43 -0700181 }
182 }
183
Christopher Tate73e02522009-07-15 14:18:26 -0700184 class ClearParams {
Christopher Tateee0e78a2009-07-02 11:17:03 -0700185 public IBackupTransport transport;
186 public PackageInfo packageInfo;
187
188 ClearParams(IBackupTransport _transport, PackageInfo _info) {
189 transport = _transport;
190 packageInfo = _info;
191 }
192 }
193
Christopher Tate5cb400b2009-06-25 16:03:14 -0700194 // Where we keep our journal files and other bookkeeping
Christopher Tate73e02522009-07-15 14:18:26 -0700195 File mBaseStateDir;
196 File mDataDir;
197 File mJournalDir;
198 File mJournal;
199 RandomAccessFile mJournalStream;
200
201 // Keep a log of all the apps we've ever backed up
202 private File mEverStored;
203 private RandomAccessFile mEverStoredStream;
204 HashSet<String> mEverStoredApps = new HashSet<String>();
205
Christopher Tateaa088442009-06-16 18:25:46 -0700206
Christopher Tate487529a2009-04-29 14:03:25 -0700207 public BackupManagerService(Context context) {
208 mContext = context;
209 mPackageManager = context.getPackageManager();
Christopher Tate181fafa2009-05-14 11:12:14 -0700210 mActivityManager = ActivityManagerNative.getDefault();
Christopher Tate487529a2009-04-29 14:03:25 -0700211
Christopher Tateb6787f22009-07-02 17:40:45 -0700212 mAlarmManager = (AlarmManager) context.getSystemService(Context.ALARM_SERVICE);
213 mPowerManager = (PowerManager) context.getSystemService(Context.POWER_SERVICE);
214
Christopher Tate22b87872009-05-04 16:41:53 -0700215 // Set up our bookkeeping
Christopher Tateb6787f22009-07-02 17:40:45 -0700216 boolean areEnabled = Settings.Secure.getInt(context.getContentResolver(),
Dianne Hackborncf098292009-07-01 19:55:20 -0700217 Settings.Secure.BACKUP_ENABLED, 0) != 0;
Christopher Tate8031a3d2009-07-06 16:36:05 -0700218 // !!! TODO: mProvisioned needs to default to 0, not 1.
219 mProvisioned = Settings.Secure.getInt(context.getContentResolver(),
Joe Onoratoab9a2a52009-07-27 08:56:39 -0700220 Settings.Secure.BACKUP_PROVISIONED, 0) != 0;
Christopher Tate5cb400b2009-06-25 16:03:14 -0700221 mBaseStateDir = new File(Environment.getDataDirectory(), "backup");
Christopher Tatef4172472009-05-05 15:50:03 -0700222 mDataDir = Environment.getDownloadCacheDirectory();
Christopher Tate9bbc21a2009-06-10 20:23:25 -0700223
Christopher Tateb6787f22009-07-02 17:40:45 -0700224 mRunBackupReceiver = new RunBackupReceiver();
225 mRunBackupFilter = new IntentFilter();
226 mRunBackupFilter.addAction(RUN_BACKUP_ACTION);
227 context.registerReceiver(mRunBackupReceiver, mRunBackupFilter);
228
229 Intent backupIntent = new Intent(RUN_BACKUP_ACTION);
230 // !!! TODO: restrict delivery to our receiver; the naive setClass() doesn't seem to work
231 //backupIntent.setClass(context, mRunBackupReceiver.getClass());
232 backupIntent.addFlags(Intent.FLAG_RECEIVER_REGISTERED_ONLY);
233 mRunBackupIntent = PendingIntent.getBroadcast(context, MSG_RUN_BACKUP, backupIntent, 0);
234
Christopher Tatecde87f42009-06-12 12:55:53 -0700235 // Set up the backup-request journaling
Christopher Tate5cb400b2009-06-25 16:03:14 -0700236 mJournalDir = new File(mBaseStateDir, "pending");
237 mJournalDir.mkdirs(); // creates mBaseStateDir along the way
Christopher Tatecde87f42009-06-12 12:55:53 -0700238 makeJournalLocked(); // okay because no other threads are running yet
239
Christopher Tate73e02522009-07-15 14:18:26 -0700240 // Set up the various sorts of package tracking we do
241 initPackageTracking();
242
Christopher Tateabce4e82009-06-18 18:35:32 -0700243 // Build our mapping of uid to backup client services. This implicitly
244 // schedules a backup pass on the Package Manager metadata the first
245 // time anything needs to be backed up.
Christopher Tate3799bc22009-05-06 16:13:56 -0700246 synchronized (mBackupParticipants) {
247 addPackageParticipantsLocked(null);
Christopher Tate487529a2009-04-29 14:03:25 -0700248 }
249
Dan Egnor87a02bc2009-06-17 02:30:10 -0700250 // Set up our transport options and initialize the default transport
251 // TODO: Have transports register themselves somehow?
252 // TODO: Don't create transports that we don't need to?
Dan Egnor87a02bc2009-06-17 02:30:10 -0700253 mLocalTransport = new LocalTransport(context); // This is actually pretty cheap
Christopher Tate91717492009-06-26 21:07:13 -0700254 ComponentName localName = new ComponentName(context, LocalTransport.class);
255 registerTransport(localName.flattenToShortString(), mLocalTransport);
Dan Egnor87a02bc2009-06-17 02:30:10 -0700256
Christopher Tate91717492009-06-26 21:07:13 -0700257 mGoogleTransport = null;
Dianne Hackborncf098292009-07-01 19:55:20 -0700258 mCurrentTransport = Settings.Secure.getString(context.getContentResolver(),
259 Settings.Secure.BACKUP_TRANSPORT);
260 if ("".equals(mCurrentTransport)) {
261 mCurrentTransport = null;
Christopher Tatece0bf062009-07-01 11:43:53 -0700262 }
Christopher Tate91717492009-06-26 21:07:13 -0700263 if (DEBUG) Log.v(TAG, "Starting with transport " + mCurrentTransport);
264
265 // Attach to the Google backup transport. When this comes up, it will set
266 // itself as the current transport because we explicitly reset mCurrentTransport
267 // to null.
Dan Egnor87a02bc2009-06-17 02:30:10 -0700268 Intent intent = new Intent().setComponent(new ComponentName(
269 "com.google.android.backup",
270 "com.google.android.backup.BackupTransportService"));
271 context.bindService(intent, mGoogleConnection, Context.BIND_AUTO_CREATE);
Christopher Tateaa088442009-06-16 18:25:46 -0700272
Christopher Tatecde87f42009-06-12 12:55:53 -0700273 // Now that we know about valid backup participants, parse any
Christopher Tate49401dd2009-07-01 12:34:29 -0700274 // leftover journal files into the pending backup set
Christopher Tatecde87f42009-06-12 12:55:53 -0700275 parseLeftoverJournals();
276
Christopher Tateb6787f22009-07-02 17:40:45 -0700277 // Power management
278 mWakelock = mPowerManager.newWakeLock(PowerManager.PARTIAL_WAKE_LOCK, "backup");
279
280 // Start the backup passes going
281 setBackupEnabled(areEnabled);
282 }
283
284 private class RunBackupReceiver extends BroadcastReceiver {
285 public void onReceive(Context context, Intent intent) {
286 if (RUN_BACKUP_ACTION.equals(intent.getAction())) {
287 if (DEBUG) Log.v(TAG, "Running a backup pass");
288
289 synchronized (mQueueLock) {
290 // acquire a wakelock and pass it to the backup thread. it will
291 // be released once backup concludes.
292 mWakelock.acquire();
293
294 Message msg = mBackupHandler.obtainMessage(MSG_RUN_BACKUP);
295 mBackupHandler.sendMessage(msg);
296 }
297 }
Christopher Tate49401dd2009-07-01 12:34:29 -0700298 }
Christopher Tateb6787f22009-07-02 17:40:45 -0700299 }
Christopher Tate3799bc22009-05-06 16:13:56 -0700300
Christopher Tate73e02522009-07-15 14:18:26 -0700301 private void initPackageTracking() {
302 if (DEBUG) Log.v(TAG, "Initializing package tracking");
303
Christopher Tatee97e8072009-07-15 16:45:50 -0700304 // Keep a log of what apps we've ever backed up. Because we might have
305 // rebooted in the middle of an operation that was removing something from
306 // this log, we sanity-check its contents here and reconstruct it.
Christopher Tate73e02522009-07-15 14:18:26 -0700307 mEverStored = new File(mBaseStateDir, "processed");
Christopher Tatee97e8072009-07-15 16:45:50 -0700308 File tempProcessedFile = new File(mBaseStateDir, "processed.new");
Christopher Tate73e02522009-07-15 14:18:26 -0700309 try {
Christopher Tatedfec20b2009-08-03 15:38:09 -0700310 // If there are previous contents, parse them out then start a new
311 // file to continue the recordkeeping.
312 if (mEverStored.exists()) {
313 RandomAccessFile temp = new RandomAccessFile(tempProcessedFile, "rw");
314 mEverStoredStream = new RandomAccessFile(mEverStored, "r");
Christopher Tate73e02522009-07-15 14:18:26 -0700315
Christopher Tatedfec20b2009-08-03 15:38:09 -0700316 // parse its existing contents
317 mEverStoredStream.seek(0);
318 temp.seek(0);
319 try {
320 while (true) {
321 PackageInfo info;
322 String pkg = mEverStoredStream.readUTF();
323 try {
324 info = mPackageManager.getPackageInfo(pkg, 0);
325 mEverStoredApps.add(pkg);
326 temp.writeUTF(pkg);
327 if (DEBUG) Log.v(TAG, " + " + pkg);
328 } catch (NameNotFoundException e) {
329 // nope, this package was uninstalled; don't include it
330 if (DEBUG) Log.v(TAG, " - " + pkg);
331 }
Christopher Tatee97e8072009-07-15 16:45:50 -0700332 }
Christopher Tatedfec20b2009-08-03 15:38:09 -0700333 } catch (EOFException e) {
334 // now we're at EOF
Christopher Tate73e02522009-07-15 14:18:26 -0700335 }
Christopher Tatee97e8072009-07-15 16:45:50 -0700336
Christopher Tatedfec20b2009-08-03 15:38:09 -0700337 // Once we've rewritten the backup history log, atomically replace the
338 // old one with the new one then reopen the file for continuing use.
339 temp.close();
340 mEverStoredStream.close();
341 tempProcessedFile.renameTo(mEverStored);
342 }
343 // This will create the file if it doesn't exist
Christopher Tatee97e8072009-07-15 16:45:50 -0700344 mEverStoredStream = new RandomAccessFile(mEverStored, "rwd");
Christopher Tatedfec20b2009-08-03 15:38:09 -0700345 mEverStoredStream.seek(mEverStoredStream.length());
Christopher Tate73e02522009-07-15 14:18:26 -0700346 } catch (IOException e) {
347 Log.e(TAG, "Unable to open known-stored file!");
348 mEverStoredStream = null;
349 }
350
Christopher Tatee97e8072009-07-15 16:45:50 -0700351 // If we were in the middle of removing something from the ever-backed-up
352 // file, there might be a transient "processed.new" file still present.
353 // We've reconstructed a coherent state at this point though, so we can
354 // safely discard that file now.
355 if (tempProcessedFile.exists()) {
356 tempProcessedFile.delete();
357 }
358
Christopher Tate73e02522009-07-15 14:18:26 -0700359 // Register for broadcasts about package install, etc., so we can
360 // update the provider list.
361 IntentFilter filter = new IntentFilter();
362 filter.addAction(Intent.ACTION_PACKAGE_ADDED);
363 filter.addAction(Intent.ACTION_PACKAGE_REMOVED);
364 filter.addDataScheme("package");
365 mContext.registerReceiver(mBroadcastReceiver, filter);
366 }
367
Christopher Tatecde87f42009-06-12 12:55:53 -0700368 private void makeJournalLocked() {
369 try {
370 mJournal = File.createTempFile("journal", null, mJournalDir);
371 mJournalStream = new RandomAccessFile(mJournal, "rwd");
372 } catch (IOException e) {
373 Log.e(TAG, "Unable to write backup journals");
374 mJournal = null;
375 mJournalStream = null;
376 }
377 }
378
379 private void parseLeftoverJournals() {
380 if (mJournal != null) {
381 File[] allJournals = mJournalDir.listFiles();
382 for (File f : allJournals) {
383 if (f.compareTo(mJournal) != 0) {
384 // This isn't the current journal, so it must be a leftover. Read
385 // out the package names mentioned there and schedule them for
386 // backup.
387 try {
388 Log.i(TAG, "Found stale backup journal, scheduling:");
389 RandomAccessFile in = new RandomAccessFile(f, "r");
390 while (true) {
391 String packageName = in.readUTF();
392 Log.i(TAG, " + " + packageName);
393 dataChanged(packageName);
394 }
395 } catch (EOFException e) {
396 // no more data; we're done
397 } catch (Exception e) {
398 // can't read it or other error; just skip it
399 } finally {
400 // close/delete the file
401 f.delete();
402 }
403 }
404 }
405 }
406 }
407
Christopher Tate91717492009-06-26 21:07:13 -0700408 // Add a transport to our set of available backends
409 private void registerTransport(String name, IBackupTransport transport) {
410 synchronized (mTransports) {
Christopher Tate34ebd0e2009-07-06 15:44:54 -0700411 if (DEBUG) Log.v(TAG, "Registering transport " + name + " = " + transport);
Christopher Tate91717492009-06-26 21:07:13 -0700412 mTransports.put(name, transport);
413 }
414 }
415
Christopher Tate3799bc22009-05-06 16:13:56 -0700416 // ----- Track installation/removal of packages -----
417 BroadcastReceiver mBroadcastReceiver = new BroadcastReceiver() {
418 public void onReceive(Context context, Intent intent) {
419 if (DEBUG) Log.d(TAG, "Received broadcast " + intent);
420
421 Uri uri = intent.getData();
422 if (uri == null) {
423 return;
Christopher Tate487529a2009-04-29 14:03:25 -0700424 }
Christopher Tate3799bc22009-05-06 16:13:56 -0700425 String pkgName = uri.getSchemeSpecificPart();
426 if (pkgName == null) {
427 return;
428 }
429
430 String action = intent.getAction();
431 if (Intent.ACTION_PACKAGE_ADDED.equals(action)) {
432 synchronized (mBackupParticipants) {
433 Bundle extras = intent.getExtras();
434 if (extras != null && extras.getBoolean(Intent.EXTRA_REPLACING, false)) {
435 // The package was just upgraded
436 updatePackageParticipantsLocked(pkgName);
437 } else {
438 // The package was just added
439 addPackageParticipantsLocked(pkgName);
440 }
441 }
442 }
443 else if (Intent.ACTION_PACKAGE_REMOVED.equals(action)) {
444 Bundle extras = intent.getExtras();
445 if (extras != null && extras.getBoolean(Intent.EXTRA_REPLACING, false)) {
446 // The package is being updated. We'll receive a PACKAGE_ADDED shortly.
447 } else {
448 synchronized (mBackupParticipants) {
449 removePackageParticipantsLocked(pkgName);
450 }
451 }
452 }
453 }
454 };
455
Dan Egnor87a02bc2009-06-17 02:30:10 -0700456 // ----- Track connection to GoogleBackupTransport service -----
457 ServiceConnection mGoogleConnection = new ServiceConnection() {
458 public void onServiceConnected(ComponentName name, IBinder service) {
459 if (DEBUG) Log.v(TAG, "Connected to Google transport");
460 mGoogleTransport = IBackupTransport.Stub.asInterface(service);
Christopher Tate91717492009-06-26 21:07:13 -0700461 registerTransport(name.flattenToShortString(), mGoogleTransport);
Dan Egnor87a02bc2009-06-17 02:30:10 -0700462 }
463
464 public void onServiceDisconnected(ComponentName name) {
465 if (DEBUG) Log.v(TAG, "Disconnected from Google transport");
466 mGoogleTransport = null;
Christopher Tate91717492009-06-26 21:07:13 -0700467 registerTransport(name.flattenToShortString(), null);
Dan Egnor87a02bc2009-06-17 02:30:10 -0700468 }
469 };
470
Joe Onorato8ad02812009-05-13 01:41:44 -0400471 // ----- Run the actual backup process asynchronously -----
472
Christopher Tate181fafa2009-05-14 11:12:14 -0700473 private class BackupHandler extends Handler {
Joe Onorato8ad02812009-05-13 01:41:44 -0400474 public void handleMessage(Message msg) {
475
476 switch (msg.what) {
477 case MSG_RUN_BACKUP:
Dan Egnor87a02bc2009-06-17 02:30:10 -0700478 {
Christopher Tate91717492009-06-26 21:07:13 -0700479 IBackupTransport transport = getTransport(mCurrentTransport);
Dan Egnor87a02bc2009-06-17 02:30:10 -0700480 if (transport == null) {
481 Log.v(TAG, "Backup requested but no transport available");
Christopher Tateb6787f22009-07-02 17:40:45 -0700482 mWakelock.release();
Dan Egnor87a02bc2009-06-17 02:30:10 -0700483 break;
484 }
485
Joe Onorato8ad02812009-05-13 01:41:44 -0400486 // snapshot the pending-backup set and work on that
Christopher Tate6aa41f42009-06-19 14:14:22 -0700487 ArrayList<BackupRequest> queue = new ArrayList<BackupRequest>();
Christopher Tatecde87f42009-06-12 12:55:53 -0700488 File oldJournal = mJournal;
Joe Onorato8ad02812009-05-13 01:41:44 -0400489 synchronized (mQueueLock) {
Christopher Tate49401dd2009-07-01 12:34:29 -0700490 // Do we have any work to do?
491 if (mPendingBackups.size() > 0) {
492 for (BackupRequest b: mPendingBackups.values()) {
493 queue.add(b);
Christopher Tatecde87f42009-06-12 12:55:53 -0700494 }
Christopher Tate49401dd2009-07-01 12:34:29 -0700495 Log.v(TAG, "clearing pending backups");
496 mPendingBackups.clear();
Christopher Tatecde87f42009-06-12 12:55:53 -0700497
Christopher Tate49401dd2009-07-01 12:34:29 -0700498 // Start a new backup-queue journal file too
499 if (mJournalStream != null) {
500 try {
501 mJournalStream.close();
502 } catch (IOException e) {
503 // don't need to do anything
504 }
505 makeJournalLocked();
506 }
507
508 // At this point, we have started a new journal file, and the old
509 // file identity is being passed to the backup processing thread.
510 // When it completes successfully, that old journal file will be
511 // deleted. If we crash prior to that, the old journal is parsed
512 // at next boot and the journaled requests fulfilled.
513 (new PerformBackupThread(transport, queue, oldJournal)).start();
514 } else {
515 Log.v(TAG, "Backup requested but nothing pending");
Christopher Tateb6787f22009-07-02 17:40:45 -0700516 mWakelock.release();
Christopher Tate49401dd2009-07-01 12:34:29 -0700517 }
Joe Onorato8ad02812009-05-13 01:41:44 -0400518 }
Christopher Tate043dadc2009-06-02 16:11:00 -0700519 break;
Dan Egnor87a02bc2009-06-17 02:30:10 -0700520 }
Christopher Tate043dadc2009-06-02 16:11:00 -0700521
522 case MSG_RUN_FULL_BACKUP:
Joe Onorato8ad02812009-05-13 01:41:44 -0400523 break;
Christopher Tate9bbc21a2009-06-10 20:23:25 -0700524
525 case MSG_RUN_RESTORE:
526 {
Christopher Tate7d562ec2009-06-25 18:03:43 -0700527 RestoreParams params = (RestoreParams)msg.obj;
Joe Onorato9a5e3e12009-07-01 21:04:03 -0400528 Log.d(TAG, "MSG_RUN_RESTORE observer=" + params.observer);
Christopher Tateb6787f22009-07-02 17:40:45 -0700529 (new PerformRestoreThread(params.transport, params.observer,
530 params.token)).start();
Christopher Tate9bbc21a2009-06-10 20:23:25 -0700531 break;
532 }
Christopher Tateee0e78a2009-07-02 11:17:03 -0700533
534 case MSG_RUN_CLEAR:
535 {
536 ClearParams params = (ClearParams)msg.obj;
537 (new PerformClearThread(params.transport, params.packageInfo)).start();
538 break;
539 }
Joe Onorato8ad02812009-05-13 01:41:44 -0400540 }
541 }
Joe Onorato8ad02812009-05-13 01:41:44 -0400542 }
543
Christopher Tate181fafa2009-05-14 11:12:14 -0700544 // Add the backup agents in the given package to our set of known backup participants.
545 // If 'packageName' is null, adds all backup agents in the whole system.
Christopher Tate3799bc22009-05-06 16:13:56 -0700546 void addPackageParticipantsLocked(String packageName) {
Christopher Tate181fafa2009-05-14 11:12:14 -0700547 // Look for apps that define the android:backupAgent attribute
Christopher Tate043dadc2009-06-02 16:11:00 -0700548 if (DEBUG) Log.v(TAG, "addPackageParticipantsLocked: " + packageName);
Dan Egnorefe52642009-06-24 00:16:33 -0700549 List<PackageInfo> targetApps = allAgentPackages();
Christopher Tate181fafa2009-05-14 11:12:14 -0700550 addPackageParticipantsLockedInner(packageName, targetApps);
Christopher Tate3799bc22009-05-06 16:13:56 -0700551 }
552
Christopher Tate181fafa2009-05-14 11:12:14 -0700553 private void addPackageParticipantsLockedInner(String packageName,
Dan Egnorefe52642009-06-24 00:16:33 -0700554 List<PackageInfo> targetPkgs) {
Christopher Tate181fafa2009-05-14 11:12:14 -0700555 if (DEBUG) {
Dan Egnorefe52642009-06-24 00:16:33 -0700556 Log.v(TAG, "Adding " + targetPkgs.size() + " backup participants:");
557 for (PackageInfo p : targetPkgs) {
Christopher Tate111bd4a2009-06-24 17:29:38 -0700558 Log.v(TAG, " " + p + " agent=" + p.applicationInfo.backupAgentName
559 + " uid=" + p.applicationInfo.uid);
Christopher Tate181fafa2009-05-14 11:12:14 -0700560 }
561 }
562
Dan Egnorefe52642009-06-24 00:16:33 -0700563 for (PackageInfo pkg : targetPkgs) {
564 if (packageName == null || pkg.packageName.equals(packageName)) {
565 int uid = pkg.applicationInfo.uid;
Christopher Tate181fafa2009-05-14 11:12:14 -0700566 HashSet<ApplicationInfo> set = mBackupParticipants.get(uid);
Christopher Tate3799bc22009-05-06 16:13:56 -0700567 if (set == null) {
Christopher Tate181fafa2009-05-14 11:12:14 -0700568 set = new HashSet<ApplicationInfo>();
Christopher Tate3799bc22009-05-06 16:13:56 -0700569 mBackupParticipants.put(uid, set);
570 }
Dan Egnorefe52642009-06-24 00:16:33 -0700571 set.add(pkg.applicationInfo);
Christopher Tate73e02522009-07-15 14:18:26 -0700572
573 // If we've never seen this app before, schedule a backup for it
574 if (!mEverStoredApps.contains(pkg.packageName)) {
575 if (DEBUG) Log.i(TAG, "New app " + pkg.packageName
576 + " never backed up; scheduling");
577 try {
578 dataChanged(pkg.packageName);
579 } catch (RemoteException e) {
580 // can't happen; it's a local method call
581 }
582 }
Christopher Tate3799bc22009-05-06 16:13:56 -0700583 }
Christopher Tate487529a2009-04-29 14:03:25 -0700584 }
585 }
586
Christopher Tate6785dd82009-06-18 15:58:25 -0700587 // Remove the given package's entry from our known active set. If
588 // 'packageName' is null, *all* participating apps will be removed.
Christopher Tate3799bc22009-05-06 16:13:56 -0700589 void removePackageParticipantsLocked(String packageName) {
Christopher Tate043dadc2009-06-02 16:11:00 -0700590 if (DEBUG) Log.v(TAG, "removePackageParticipantsLocked: " + packageName);
Dan Egnorefe52642009-06-24 00:16:33 -0700591 List<PackageInfo> allApps = null;
Christopher Tate181fafa2009-05-14 11:12:14 -0700592 if (packageName != null) {
Dan Egnorefe52642009-06-24 00:16:33 -0700593 allApps = new ArrayList<PackageInfo>();
Christopher Tate181fafa2009-05-14 11:12:14 -0700594 try {
Dan Egnorefe52642009-06-24 00:16:33 -0700595 int flags = PackageManager.GET_SIGNATURES;
596 allApps.add(mPackageManager.getPackageInfo(packageName, flags));
Christopher Tate181fafa2009-05-14 11:12:14 -0700597 } catch (Exception e) {
Dan Egnorefe52642009-06-24 00:16:33 -0700598 // just skip it (???)
Christopher Tate181fafa2009-05-14 11:12:14 -0700599 }
600 } else {
601 // all apps with agents
Dan Egnorefe52642009-06-24 00:16:33 -0700602 allApps = allAgentPackages();
Christopher Tate181fafa2009-05-14 11:12:14 -0700603 }
604 removePackageParticipantsLockedInner(packageName, allApps);
Christopher Tate3799bc22009-05-06 16:13:56 -0700605 }
606
Joe Onorato8ad02812009-05-13 01:41:44 -0400607 private void removePackageParticipantsLockedInner(String packageName,
Dan Egnorefe52642009-06-24 00:16:33 -0700608 List<PackageInfo> agents) {
Christopher Tate043dadc2009-06-02 16:11:00 -0700609 if (DEBUG) {
610 Log.v(TAG, "removePackageParticipantsLockedInner (" + packageName
611 + ") removing " + agents.size() + " entries");
Dan Egnorefe52642009-06-24 00:16:33 -0700612 for (PackageInfo p : agents) {
613 Log.v(TAG, " - " + p);
Christopher Tate043dadc2009-06-02 16:11:00 -0700614 }
615 }
Dan Egnorefe52642009-06-24 00:16:33 -0700616 for (PackageInfo pkg : agents) {
617 if (packageName == null || pkg.packageName.equals(packageName)) {
618 int uid = pkg.applicationInfo.uid;
Christopher Tate181fafa2009-05-14 11:12:14 -0700619 HashSet<ApplicationInfo> set = mBackupParticipants.get(uid);
Christopher Tate3799bc22009-05-06 16:13:56 -0700620 if (set != null) {
Christopher Tatecd4ff2e2009-06-05 13:57:54 -0700621 // Find the existing entry with the same package name, and remove it.
622 // We can't just remove(app) because the instances are different.
623 for (ApplicationInfo entry: set) {
Dan Egnorefe52642009-06-24 00:16:33 -0700624 if (entry.packageName.equals(pkg.packageName)) {
Christopher Tatecd4ff2e2009-06-05 13:57:54 -0700625 set.remove(entry);
Christopher Tatee97e8072009-07-15 16:45:50 -0700626 removeEverBackedUp(pkg.packageName);
Christopher Tatecd4ff2e2009-06-05 13:57:54 -0700627 break;
628 }
629 }
Christopher Tate3799bc22009-05-06 16:13:56 -0700630 if (set.size() == 0) {
Dan Egnorefe52642009-06-24 00:16:33 -0700631 mBackupParticipants.delete(uid);
632 }
Christopher Tate3799bc22009-05-06 16:13:56 -0700633 }
634 }
635 }
636 }
637
Christopher Tate181fafa2009-05-14 11:12:14 -0700638 // Returns the set of all applications that define an android:backupAgent attribute
Christopher Tate73e02522009-07-15 14:18:26 -0700639 List<PackageInfo> allAgentPackages() {
Christopher Tate6785dd82009-06-18 15:58:25 -0700640 // !!! TODO: cache this and regenerate only when necessary
Dan Egnorefe52642009-06-24 00:16:33 -0700641 int flags = PackageManager.GET_SIGNATURES;
642 List<PackageInfo> packages = mPackageManager.getInstalledPackages(flags);
643 int N = packages.size();
644 for (int a = N-1; a >= 0; a--) {
645 ApplicationInfo app = packages.get(a).applicationInfo;
646 if (((app.flags&ApplicationInfo.FLAG_ALLOW_BACKUP) == 0)
647 || app.backupAgentName == null) {
648 packages.remove(a);
Christopher Tate181fafa2009-05-14 11:12:14 -0700649 }
650 }
Dan Egnorefe52642009-06-24 00:16:33 -0700651 return packages;
Christopher Tate181fafa2009-05-14 11:12:14 -0700652 }
Christopher Tateaa088442009-06-16 18:25:46 -0700653
Christopher Tate3799bc22009-05-06 16:13:56 -0700654 // Reset the given package's known backup participants. Unlike add/remove, the update
655 // action cannot be passed a null package name.
656 void updatePackageParticipantsLocked(String packageName) {
657 if (packageName == null) {
658 Log.e(TAG, "updatePackageParticipants called with null package name");
659 return;
660 }
Christopher Tate043dadc2009-06-02 16:11:00 -0700661 if (DEBUG) Log.v(TAG, "updatePackageParticipantsLocked: " + packageName);
Christopher Tate3799bc22009-05-06 16:13:56 -0700662
663 // brute force but small code size
Dan Egnorefe52642009-06-24 00:16:33 -0700664 List<PackageInfo> allApps = allAgentPackages();
Christopher Tate181fafa2009-05-14 11:12:14 -0700665 removePackageParticipantsLockedInner(packageName, allApps);
666 addPackageParticipantsLockedInner(packageName, allApps);
Christopher Tate3799bc22009-05-06 16:13:56 -0700667 }
668
Christopher Tate73e02522009-07-15 14:18:26 -0700669 // Called from the backup thread: record that the given app has been successfully
670 // backed up at least once
671 void logBackupComplete(String packageName) {
Christopher Tatee97e8072009-07-15 16:45:50 -0700672 if (mEverStoredStream != null && !packageName.equals(PACKAGE_MANAGER_SENTINEL)) {
Christopher Tate73e02522009-07-15 14:18:26 -0700673 synchronized (mEverStoredApps) {
674 if (mEverStoredApps.add(packageName)) {
675 try {
676 mEverStoredStream.writeUTF(packageName);
677 } catch (IOException e) {
678 Log.e(TAG, "Unable to log backup of " + packageName + ", ceasing log");
679 try {
680 mEverStoredStream.close();
681 } catch (IOException ioe) {
682 // we're dropping it; no need to handle an exception on close here
683 }
684 mEverStoredStream = null;
685 }
686 }
687 }
688 }
689 }
690
Christopher Tatee97e8072009-07-15 16:45:50 -0700691 // Remove our awareness of having ever backed up the given package
692 void removeEverBackedUp(String packageName) {
693 if (DEBUG) Log.v(TAG, "Removing backed-up knowledge of " + packageName
694 + ", new set:");
695
696 if (mEverStoredStream != null) {
697 synchronized (mEverStoredApps) {
698 // Rewrite the file and rename to overwrite. If we reboot in the middle,
699 // we'll recognize on initialization time that the package no longer
700 // exists and fix it up then.
701 File tempKnownFile = new File(mBaseStateDir, "processed.new");
702 try {
703 mEverStoredStream.close();
704 RandomAccessFile known = new RandomAccessFile(tempKnownFile, "rw");
705 mEverStoredApps.remove(packageName);
706 for (String s : mEverStoredApps) {
707 known.writeUTF(s);
708 if (DEBUG) Log.v(TAG, " " + s);
709 }
710 known.close();
711 tempKnownFile.renameTo(mEverStored);
712 mEverStoredStream = new RandomAccessFile(mEverStored, "rwd");
713 } catch (IOException e) {
714 // Bad: we couldn't create the new copy. For safety's sake we
715 // abandon the whole process and remove all what's-backed-up
716 // state entirely, meaning we'll force a backup pass for every
717 // participant on the next boot or [re]install.
718 Log.w(TAG, "Error rewriting backed-up set; halting log");
719 mEverStoredStream = null;
720 mEverStoredApps.clear();
721 tempKnownFile.delete();
722 mEverStored.delete();
723 }
724 }
725 }
726 }
727
Dan Egnor87a02bc2009-06-17 02:30:10 -0700728 // Return the given transport
Christopher Tate91717492009-06-26 21:07:13 -0700729 private IBackupTransport getTransport(String transportName) {
730 synchronized (mTransports) {
731 IBackupTransport transport = mTransports.get(transportName);
732 if (transport == null) {
733 Log.w(TAG, "Requested unavailable transport: " + transportName);
734 }
735 return transport;
Christopher Tate8c850b72009-06-07 19:33:20 -0700736 }
Christopher Tate8c850b72009-06-07 19:33:20 -0700737 }
738
Christopher Tatedf01dea2009-06-09 20:45:02 -0700739 // fire off a backup agent, blocking until it attaches or times out
740 IBackupAgent bindToAgentSynchronous(ApplicationInfo app, int mode) {
741 IBackupAgent agent = null;
742 synchronized(mAgentConnectLock) {
743 mConnecting = true;
744 mConnectedAgent = null;
745 try {
746 if (mActivityManager.bindBackupAgent(app, mode)) {
747 Log.d(TAG, "awaiting agent for " + app);
748
749 // success; wait for the agent to arrive
Christopher Tatec7b31e32009-06-10 15:49:30 -0700750 // only wait 10 seconds for the clear data to happen
751 long timeoutMark = System.currentTimeMillis() + TIMEOUT_INTERVAL;
752 while (mConnecting && mConnectedAgent == null
753 && (System.currentTimeMillis() < timeoutMark)) {
Christopher Tatedf01dea2009-06-09 20:45:02 -0700754 try {
Christopher Tatec7b31e32009-06-10 15:49:30 -0700755 mAgentConnectLock.wait(5000);
Christopher Tatedf01dea2009-06-09 20:45:02 -0700756 } catch (InterruptedException e) {
Christopher Tatec7b31e32009-06-10 15:49:30 -0700757 // just bail
Christopher Tatedf01dea2009-06-09 20:45:02 -0700758 return null;
759 }
760 }
761
762 // if we timed out with no connect, abort and move on
763 if (mConnecting == true) {
764 Log.w(TAG, "Timeout waiting for agent " + app);
765 return null;
766 }
767 agent = mConnectedAgent;
768 }
769 } catch (RemoteException e) {
770 // can't happen
771 }
772 }
773 return agent;
774 }
775
Christopher Tatec7b31e32009-06-10 15:49:30 -0700776 // clear an application's data, blocking until the operation completes or times out
777 void clearApplicationDataSynchronous(String packageName) {
Christopher Tatef7c886b2009-06-26 15:34:09 -0700778 // Don't wipe packages marked allowClearUserData=false
779 try {
780 PackageInfo info = mPackageManager.getPackageInfo(packageName, 0);
781 if ((info.applicationInfo.flags & ApplicationInfo.FLAG_ALLOW_CLEAR_USER_DATA) == 0) {
782 if (DEBUG) Log.i(TAG, "allowClearUserData=false so not wiping "
783 + packageName);
784 return;
785 }
786 } catch (NameNotFoundException e) {
787 Log.w(TAG, "Tried to clear data for " + packageName + " but not found");
788 return;
789 }
790
Christopher Tatec7b31e32009-06-10 15:49:30 -0700791 ClearDataObserver observer = new ClearDataObserver();
792
793 synchronized(mClearDataLock) {
794 mClearingData = true;
Amith Yamasani2e6bca62009-08-07 20:26:13 -0700795 /* This is causing some critical processes to be killed during setup.
796 Temporarily revert this change until we find a better solution.
Christopher Tate9dfdac52009-08-06 14:57:53 -0700797 try {
798 mActivityManager.clearApplicationUserData(packageName, observer);
799 } catch (RemoteException e) {
800 // can't happen because the activity manager is in this process
801 }
Amith Yamasani2e6bca62009-08-07 20:26:13 -0700802 */
803 mPackageManager.clearApplicationUserData(packageName, observer);
Christopher Tatec7b31e32009-06-10 15:49:30 -0700804
805 // only wait 10 seconds for the clear data to happen
806 long timeoutMark = System.currentTimeMillis() + TIMEOUT_INTERVAL;
807 while (mClearingData && (System.currentTimeMillis() < timeoutMark)) {
808 try {
809 mClearDataLock.wait(5000);
810 } catch (InterruptedException e) {
811 // won't happen, but still.
812 mClearingData = false;
813 }
814 }
815 }
816 }
817
818 class ClearDataObserver extends IPackageDataObserver.Stub {
819 public void onRemoveCompleted(String packageName, boolean succeeded)
Dan Egnor0084da52009-07-29 12:57:16 -0700820 throws RemoteException {
Christopher Tatec7b31e32009-06-10 15:49:30 -0700821 synchronized(mClearDataLock) {
822 mClearingData = false;
Christopher Tatef68eb502009-06-16 11:02:01 -0700823 mClearDataLock.notifyAll();
Christopher Tatec7b31e32009-06-10 15:49:30 -0700824 }
825 }
826 }
827
Christopher Tate043dadc2009-06-02 16:11:00 -0700828 // ----- Back up a set of applications via a worker thread -----
829
830 class PerformBackupThread extends Thread {
831 private static final String TAG = "PerformBackupThread";
Christopher Tateaa088442009-06-16 18:25:46 -0700832 IBackupTransport mTransport;
Christopher Tate043dadc2009-06-02 16:11:00 -0700833 ArrayList<BackupRequest> mQueue;
Christopher Tate5cb400b2009-06-25 16:03:14 -0700834 File mStateDir;
Christopher Tatecde87f42009-06-12 12:55:53 -0700835 File mJournal;
Christopher Tate043dadc2009-06-02 16:11:00 -0700836
Christopher Tateaa088442009-06-16 18:25:46 -0700837 public PerformBackupThread(IBackupTransport transport, ArrayList<BackupRequest> queue,
Christopher Tatecde87f42009-06-12 12:55:53 -0700838 File journal) {
Christopher Tateaa088442009-06-16 18:25:46 -0700839 mTransport = transport;
Christopher Tate043dadc2009-06-02 16:11:00 -0700840 mQueue = queue;
Christopher Tatecde87f42009-06-12 12:55:53 -0700841 mJournal = journal;
Christopher Tate5cb400b2009-06-25 16:03:14 -0700842
843 try {
844 mStateDir = new File(mBaseStateDir, transport.transportDirName());
845 } catch (RemoteException e) {
846 // can't happen; the transport is local
847 }
848 mStateDir.mkdirs();
Christopher Tate043dadc2009-06-02 16:11:00 -0700849 }
850
851 @Override
852 public void run() {
Dan Egnorbb9001c2009-07-27 12:20:13 -0700853 long startRealtime = SystemClock.elapsedRealtime();
Christopher Tate043dadc2009-06-02 16:11:00 -0700854 if (DEBUG) Log.v(TAG, "Beginning backup of " + mQueue.size() + " targets");
855
Christopher Tate79588342009-06-30 16:11:49 -0700856 // Backups run at background priority
857 Process.setThreadPriority(Process.THREAD_PRIORITY_BACKGROUND);
858
Christopher Tate043dadc2009-06-02 16:11:00 -0700859 try {
Dan Egnorbb9001c2009-07-27 12:20:13 -0700860 EventLog.writeEvent(BACKUP_START_EVENT, mTransport.transportDirName());
861
862 // The package manager doesn't have a proper <application> etc, but since
863 // it's running here in the system process we can just set up its agent
864 // directly and use a synthetic BackupRequest. We always run this pass
865 // because it's cheap and this way we guarantee that we don't get out of
866 // step even if we're selecting among various transports at run time.
867 PackageManagerBackupAgent pmAgent = new PackageManagerBackupAgent(
868 mPackageManager, allAgentPackages());
869 BackupRequest pmRequest = new BackupRequest(new ApplicationInfo(), false);
870 pmRequest.appInfo.packageName = PACKAGE_MANAGER_SENTINEL;
871 processOneBackup(pmRequest,
872 IBackupAgent.Stub.asInterface(pmAgent.onBind()), mTransport);
873
874 // Now run all the backups in our queue
875 int count = mQueue.size();
876 doQueuedBackups(mTransport);
877
878 // Finally, tear down the transport
879 if (mTransport.finishBackup()) {
880 int millis = (int) (SystemClock.elapsedRealtime() - startRealtime);
881 EventLog.writeEvent(BACKUP_SUCCESS_EVENT, count, millis);
882 } else {
883 EventLog.writeEvent(BACKUP_TRANSPORT_FAILURE_EVENT, "");
884 Log.e(TAG, "Transport error in finishBackup()");
Dan Egnorefe52642009-06-24 00:16:33 -0700885 }
Christopher Tatecde87f42009-06-12 12:55:53 -0700886
Dan Egnorbb9001c2009-07-27 12:20:13 -0700887 if (!mJournal.delete()) {
888 Log.e(TAG, "Unable to remove backup journal file " + mJournal);
889 }
890 } catch (Exception e) {
891 Log.e(TAG, "Error in backup thread", e);
892 } finally {
893 // Only once we're entirely finished do we release the wakelock
894 mWakelock.release();
Christopher Tatecde87f42009-06-12 12:55:53 -0700895 }
Christopher Tate043dadc2009-06-02 16:11:00 -0700896 }
897
898 private void doQueuedBackups(IBackupTransport transport) {
899 for (BackupRequest request : mQueue) {
Christopher Tatedf01dea2009-06-09 20:45:02 -0700900 Log.d(TAG, "starting agent for backup of " + request);
Christopher Tate043dadc2009-06-02 16:11:00 -0700901
902 IBackupAgent agent = null;
903 int mode = (request.fullBackup)
904 ? IApplicationThread.BACKUP_MODE_FULL
905 : IApplicationThread.BACKUP_MODE_INCREMENTAL;
906 try {
Christopher Tatedf01dea2009-06-09 20:45:02 -0700907 agent = bindToAgentSynchronous(request.appInfo, mode);
908 if (agent != null) {
909 processOneBackup(request, agent, transport);
Christopher Tate043dadc2009-06-02 16:11:00 -0700910 }
Christopher Tatedf01dea2009-06-09 20:45:02 -0700911
912 // unbind even on timeout, just in case
913 mActivityManager.unbindBackupAgent(request.appInfo);
Christopher Tate043dadc2009-06-02 16:11:00 -0700914 } catch (SecurityException ex) {
915 // Try for the next one.
Christopher Tatec7b31e32009-06-10 15:49:30 -0700916 Log.d(TAG, "error in bind/backup", ex);
Christopher Tate043dadc2009-06-02 16:11:00 -0700917 } catch (RemoteException e) {
Christopher Tatec7b31e32009-06-10 15:49:30 -0700918 Log.v(TAG, "bind/backup threw");
919 e.printStackTrace();
Christopher Tate043dadc2009-06-02 16:11:00 -0700920 }
921 }
922 }
Christopher Tatec7b31e32009-06-10 15:49:30 -0700923
924 void processOneBackup(BackupRequest request, IBackupAgent agent, IBackupTransport transport) {
925 final String packageName = request.appInfo.packageName;
Dan Egnorbb9001c2009-07-27 12:20:13 -0700926 if (DEBUG) Log.d(TAG, "processOneBackup doBackup() on " + packageName);
Christopher Tatec7b31e32009-06-10 15:49:30 -0700927
Dan Egnorbb9001c2009-07-27 12:20:13 -0700928 // !!! TODO: get the state file dir from the transport
929 File savedStateName = new File(mStateDir, packageName);
930 File backupDataName = new File(mDataDir, packageName + ".data");
931 File newStateName = new File(mStateDir, packageName + ".new");
932
933 ParcelFileDescriptor savedState = null;
934 ParcelFileDescriptor backupData = null;
935 ParcelFileDescriptor newState = null;
936
937 PackageInfo packInfo;
Christopher Tatec7b31e32009-06-10 15:49:30 -0700938 try {
939 // Look up the package info & signatures. This is first so that if it
940 // throws an exception, there's no file setup yet that would need to
941 // be unraveled.
Christopher Tateabce4e82009-06-18 18:35:32 -0700942 if (packageName.equals(PACKAGE_MANAGER_SENTINEL)) {
943 // The metadata 'package' is synthetic
944 packInfo = new PackageInfo();
945 packInfo.packageName = packageName;
946 } else {
947 packInfo = mPackageManager.getPackageInfo(packageName,
Christopher Tatec7b31e32009-06-10 15:49:30 -0700948 PackageManager.GET_SIGNATURES);
Christopher Tateabce4e82009-06-18 18:35:32 -0700949 }
Christopher Tatec7b31e32009-06-10 15:49:30 -0700950
Christopher Tatec7b31e32009-06-10 15:49:30 -0700951 // In a full backup, we pass a null ParcelFileDescriptor as
952 // the saved-state "file"
Dan Egnorbb9001c2009-07-27 12:20:13 -0700953 if (!request.fullBackup) {
954 savedState = ParcelFileDescriptor.open(savedStateName,
Christopher Tatec7b31e32009-06-10 15:49:30 -0700955 ParcelFileDescriptor.MODE_READ_ONLY |
Dan Egnorbb9001c2009-07-27 12:20:13 -0700956 ParcelFileDescriptor.MODE_CREATE); // Make an empty file if necessary
957 }
Christopher Tatec7b31e32009-06-10 15:49:30 -0700958
Dan Egnorbb9001c2009-07-27 12:20:13 -0700959 backupData = ParcelFileDescriptor.open(backupDataName,
960 ParcelFileDescriptor.MODE_READ_WRITE |
961 ParcelFileDescriptor.MODE_CREATE |
962 ParcelFileDescriptor.MODE_TRUNCATE);
Christopher Tatec7b31e32009-06-10 15:49:30 -0700963
Dan Egnorbb9001c2009-07-27 12:20:13 -0700964 newState = ParcelFileDescriptor.open(newStateName,
965 ParcelFileDescriptor.MODE_READ_WRITE |
966 ParcelFileDescriptor.MODE_CREATE |
967 ParcelFileDescriptor.MODE_TRUNCATE);
Christopher Tatec7b31e32009-06-10 15:49:30 -0700968
969 // Run the target's backup pass
Dan Egnorbb9001c2009-07-27 12:20:13 -0700970 agent.doBackup(savedState, backupData, newState);
971 logBackupComplete(packageName);
972 if (DEBUG) Log.v(TAG, "doBackup() success");
Christopher Tatec7b31e32009-06-10 15:49:30 -0700973 } catch (Exception e) {
Dan Egnorefe52642009-06-24 00:16:33 -0700974 Log.e(TAG, "Error backing up " + packageName, e);
Dan Egnorbb9001c2009-07-27 12:20:13 -0700975 EventLog.writeEvent(BACKUP_AGENT_FAILURE_EVENT, packageName, e.toString());
976 backupDataName.delete();
977 newStateName.delete();
978 return;
979 } finally {
980 try { if (savedState != null) savedState.close(); } catch (IOException e) {}
981 try { if (backupData != null) backupData.close(); } catch (IOException e) {}
982 try { if (newState != null) newState.close(); } catch (IOException e) {}
983 savedState = backupData = newState = null;
984 }
985
986 // Now propagate the newly-backed-up data to the transport
987 try {
988 int size = (int) backupDataName.length();
989 if (size > 0) {
990 backupData = ParcelFileDescriptor.open(backupDataName,
991 ParcelFileDescriptor.MODE_READ_ONLY);
992
993 if (!transport.performBackup(packInfo, backupData)) throw new Exception();
994 } else {
995 if (DEBUG) Log.i(TAG, "no backup data written; not calling transport");
996 }
997
998 // After successful transport, delete the now-stale data
999 // and juggle the files so that next time we supply the agent
1000 // with the new state file it just created.
1001 backupDataName.delete();
1002 newStateName.renameTo(savedStateName);
1003 EventLog.writeEvent(BACKUP_PACKAGE_EVENT, packageName, size);
1004 } catch (Exception e) {
1005 Log.e(TAG, "Transport error backing up " + packageName, e);
1006 EventLog.writeEvent(BACKUP_TRANSPORT_FAILURE_EVENT, packageName);
1007 return;
1008 } finally {
1009 try { if (backupData != null) backupData.close(); } catch (IOException e) {}
Christopher Tatec7b31e32009-06-10 15:49:30 -07001010 }
1011 }
Christopher Tate043dadc2009-06-02 16:11:00 -07001012 }
1013
Christopher Tatedf01dea2009-06-09 20:45:02 -07001014
1015 // ----- Restore handling -----
1016
Christopher Tateabce4e82009-06-18 18:35:32 -07001017 private boolean signaturesMatch(Signature[] storedSigs, Signature[] deviceSigs) {
Christopher Tate20efdf62009-06-18 19:41:36 -07001018 // Allow unsigned apps, but not signed on one device and unsigned on the other
1019 // !!! TODO: is this the right policy?
Christopher Tate6aa41f42009-06-19 14:14:22 -07001020 if (DEBUG) Log.v(TAG, "signaturesMatch(): stored=" + storedSigs
1021 + " device=" + deviceSigs);
Christopher Tate20efdf62009-06-18 19:41:36 -07001022 if ((storedSigs == null || storedSigs.length == 0)
1023 && (deviceSigs == null || deviceSigs.length == 0)) {
1024 return true;
1025 }
1026 if (storedSigs == null || deviceSigs == null) {
1027 return false;
1028 }
1029
Christopher Tateabce4e82009-06-18 18:35:32 -07001030 // !!! TODO: this demands that every stored signature match one
1031 // that is present on device, and does not demand the converse.
1032 // Is this this right policy?
1033 int nStored = storedSigs.length;
1034 int nDevice = deviceSigs.length;
1035
1036 for (int i=0; i < nStored; i++) {
1037 boolean match = false;
1038 for (int j=0; j < nDevice; j++) {
1039 if (storedSigs[i].equals(deviceSigs[j])) {
1040 match = true;
1041 break;
1042 }
1043 }
1044 if (!match) {
1045 return false;
1046 }
1047 }
1048 return true;
1049 }
1050
Christopher Tatedf01dea2009-06-09 20:45:02 -07001051 class PerformRestoreThread extends Thread {
1052 private IBackupTransport mTransport;
Christopher Tate7d562ec2009-06-25 18:03:43 -07001053 private IRestoreObserver mObserver;
Dan Egnor156411d2009-06-26 13:20:02 -07001054 private long mToken;
Christopher Tate5cb400b2009-06-25 16:03:14 -07001055 private File mStateDir;
Christopher Tatedf01dea2009-06-09 20:45:02 -07001056
Christopher Tate5cbbf562009-06-22 16:44:51 -07001057 class RestoreRequest {
1058 public PackageInfo app;
1059 public int storedAppVersion;
1060
1061 RestoreRequest(PackageInfo _app, int _version) {
1062 app = _app;
1063 storedAppVersion = _version;
1064 }
1065 }
1066
Christopher Tate7d562ec2009-06-25 18:03:43 -07001067 PerformRestoreThread(IBackupTransport transport, IRestoreObserver observer,
Dan Egnor156411d2009-06-26 13:20:02 -07001068 long restoreSetToken) {
Christopher Tatedf01dea2009-06-09 20:45:02 -07001069 mTransport = transport;
Joe Onorato9a5e3e12009-07-01 21:04:03 -04001070 Log.d(TAG, "PerformRestoreThread mObserver=" + mObserver);
Christopher Tate7d562ec2009-06-25 18:03:43 -07001071 mObserver = observer;
Christopher Tate9bbc21a2009-06-10 20:23:25 -07001072 mToken = restoreSetToken;
Christopher Tate5cb400b2009-06-25 16:03:14 -07001073
1074 try {
1075 mStateDir = new File(mBaseStateDir, transport.transportDirName());
1076 } catch (RemoteException e) {
1077 // can't happen; the transport is local
1078 }
1079 mStateDir.mkdirs();
Christopher Tatedf01dea2009-06-09 20:45:02 -07001080 }
1081
1082 @Override
1083 public void run() {
Dan Egnorbb9001c2009-07-27 12:20:13 -07001084 long startRealtime = SystemClock.elapsedRealtime();
Joe Onorato9a5e3e12009-07-01 21:04:03 -04001085 if (DEBUG) Log.v(TAG, "Beginning restore process mTransport=" + mTransport
1086 + " mObserver=" + mObserver + " mToken=" + mToken);
Christopher Tatedf01dea2009-06-09 20:45:02 -07001087 /**
1088 * Restore sequence:
1089 *
Dan Egnorefe52642009-06-24 00:16:33 -07001090 * 1. get the restore set description for our identity
1091 * 2. for each app in the restore set:
Dan Egnorbb9001c2009-07-27 12:20:13 -07001092 * 2.a. if it's restorable on this device, add it to the restore queue
Dan Egnorefe52642009-06-24 00:16:33 -07001093 * 3. for each app in the restore queue:
1094 * 3.a. clear the app data
1095 * 3.b. get the restore data for the app from the transport
1096 * 3.c. launch the backup agent for the app
1097 * 3.d. agent.doRestore() with the data from the server
1098 * 3.e. unbind the agent [and kill the app?]
1099 * 4. shut down the transport
Dan Egnorbb9001c2009-07-27 12:20:13 -07001100 *
1101 * On errors, we try our best to recover and move on to the next
1102 * application, but if necessary we abort the whole operation --
1103 * the user is waiting, after al.
Christopher Tatedf01dea2009-06-09 20:45:02 -07001104 */
1105
Christopher Tate7d562ec2009-06-25 18:03:43 -07001106 int error = -1; // assume error
1107
Dan Egnorefe52642009-06-24 00:16:33 -07001108 // build the set of apps to restore
Christopher Tatedf01dea2009-06-09 20:45:02 -07001109 try {
Dan Egnorbb9001c2009-07-27 12:20:13 -07001110 // TODO: Log this before getAvailableRestoreSets, somehow
1111 EventLog.writeEvent(RESTORE_START_EVENT, mTransport.transportDirName());
Christopher Tateabce4e82009-06-18 18:35:32 -07001112
Dan Egnorefe52642009-06-24 00:16:33 -07001113 // Get the list of all packages which have backup enabled.
1114 // (Include the Package Manager metadata pseudo-package first.)
1115 ArrayList<PackageInfo> restorePackages = new ArrayList<PackageInfo>();
1116 PackageInfo omPackage = new PackageInfo();
1117 omPackage.packageName = PACKAGE_MANAGER_SENTINEL;
1118 restorePackages.add(omPackage);
Christopher Tatedf01dea2009-06-09 20:45:02 -07001119
Dan Egnorefe52642009-06-24 00:16:33 -07001120 List<PackageInfo> agentPackages = allAgentPackages();
1121 restorePackages.addAll(agentPackages);
1122
Christopher Tate7d562ec2009-06-25 18:03:43 -07001123 // let the observer know that we're running
1124 if (mObserver != null) {
1125 try {
1126 // !!! TODO: get an actual count from the transport after
1127 // its startRestore() runs?
1128 mObserver.restoreStarting(restorePackages.size());
1129 } catch (RemoteException e) {
1130 Log.d(TAG, "Restore observer died at restoreStarting");
1131 mObserver = null;
1132 }
1133 }
1134
Dan Egnor156411d2009-06-26 13:20:02 -07001135 if (!mTransport.startRestore(mToken, restorePackages.toArray(new PackageInfo[0]))) {
Dan Egnorefe52642009-06-24 00:16:33 -07001136 Log.e(TAG, "Error starting restore operation");
Dan Egnorbb9001c2009-07-27 12:20:13 -07001137 EventLog.writeEvent(RESTORE_TRANSPORT_FAILURE_EVENT);
Dan Egnorefe52642009-06-24 00:16:33 -07001138 return;
1139 }
1140
1141 String packageName = mTransport.nextRestorePackage();
1142 if (packageName == null) {
Dan Egnorefe52642009-06-24 00:16:33 -07001143 Log.e(TAG, "Error getting first restore package");
Dan Egnorbb9001c2009-07-27 12:20:13 -07001144 EventLog.writeEvent(RESTORE_TRANSPORT_FAILURE_EVENT);
Dan Egnorefe52642009-06-24 00:16:33 -07001145 return;
1146 } else if (packageName.equals("")) {
1147 Log.i(TAG, "No restore data available");
Dan Egnorbb9001c2009-07-27 12:20:13 -07001148 int millis = (int) (SystemClock.elapsedRealtime() - startRealtime);
1149 EventLog.writeEvent(RESTORE_SUCCESS_EVENT, 0, millis);
Dan Egnorefe52642009-06-24 00:16:33 -07001150 return;
1151 } else if (!packageName.equals(PACKAGE_MANAGER_SENTINEL)) {
1152 Log.e(TAG, "Expected restore data for \"" + PACKAGE_MANAGER_SENTINEL
1153 + "\", found only \"" + packageName + "\"");
Dan Egnorbb9001c2009-07-27 12:20:13 -07001154 EventLog.writeEvent(RESTORE_AGENT_FAILURE_EVENT, PACKAGE_MANAGER_SENTINEL,
1155 "Package manager data missing");
Dan Egnorefe52642009-06-24 00:16:33 -07001156 return;
1157 }
1158
1159 // Pull the Package Manager metadata from the restore set first
1160 PackageManagerBackupAgent pmAgent = new PackageManagerBackupAgent(
1161 mPackageManager, agentPackages);
1162 processOneRestore(omPackage, 0, IBackupAgent.Stub.asInterface(pmAgent.onBind()));
1163
Christopher Tate8c032472009-07-02 14:28:47 -07001164 // Verify that the backup set includes metadata. If not, we can't do
1165 // signature/version verification etc, so we simply do not proceed with
1166 // the restore operation.
Christopher Tate3d7cd132009-07-07 14:23:07 -07001167 if (!pmAgent.hasMetadata()) {
Dan Egnorbb9001c2009-07-27 12:20:13 -07001168 Log.e(TAG, "No restore metadata available, so not restoring settings");
1169 EventLog.writeEvent(RESTORE_AGENT_FAILURE_EVENT, PACKAGE_MANAGER_SENTINEL,
1170 "Package manager restore metadata missing");
Christopher Tate8c032472009-07-02 14:28:47 -07001171 return;
1172 }
1173
Christopher Tate7d562ec2009-06-25 18:03:43 -07001174 int count = 0;
Dan Egnorefe52642009-06-24 00:16:33 -07001175 for (;;) {
1176 packageName = mTransport.nextRestorePackage();
Dan Egnorbb9001c2009-07-27 12:20:13 -07001177
Dan Egnorefe52642009-06-24 00:16:33 -07001178 if (packageName == null) {
Dan Egnorefe52642009-06-24 00:16:33 -07001179 Log.e(TAG, "Error getting next restore package");
Dan Egnorbb9001c2009-07-27 12:20:13 -07001180 EventLog.writeEvent(RESTORE_TRANSPORT_FAILURE_EVENT);
Dan Egnorefe52642009-06-24 00:16:33 -07001181 return;
1182 } else if (packageName.equals("")) {
1183 break;
Christopher Tatedf01dea2009-06-09 20:45:02 -07001184 }
Christopher Tatedf01dea2009-06-09 20:45:02 -07001185
Christopher Tate7d562ec2009-06-25 18:03:43 -07001186 if (mObserver != null) {
Christopher Tate7d562ec2009-06-25 18:03:43 -07001187 try {
1188 mObserver.onUpdate(count);
1189 } catch (RemoteException e) {
1190 Log.d(TAG, "Restore observer died in onUpdate");
1191 mObserver = null;
1192 }
1193 }
1194
Dan Egnorefe52642009-06-24 00:16:33 -07001195 Metadata metaInfo = pmAgent.getRestoredMetadata(packageName);
1196 if (metaInfo == null) {
1197 Log.e(TAG, "Missing metadata for " + packageName);
Dan Egnorbb9001c2009-07-27 12:20:13 -07001198 EventLog.writeEvent(RESTORE_AGENT_FAILURE_EVENT, packageName,
1199 "Package metadata missing");
Dan Egnorefe52642009-06-24 00:16:33 -07001200 continue;
1201 }
Christopher Tatedf01dea2009-06-09 20:45:02 -07001202
Dan Egnorbb9001c2009-07-27 12:20:13 -07001203 PackageInfo packageInfo;
1204 try {
1205 int flags = PackageManager.GET_SIGNATURES;
1206 packageInfo = mPackageManager.getPackageInfo(packageName, flags);
1207 } catch (NameNotFoundException e) {
1208 Log.e(TAG, "Invalid package restoring data", e);
1209 EventLog.writeEvent(RESTORE_AGENT_FAILURE_EVENT, packageName,
1210 "Package missing on device");
1211 continue;
1212 }
1213
Dan Egnorefe52642009-06-24 00:16:33 -07001214 if (metaInfo.versionCode > packageInfo.versionCode) {
Dan Egnorbb9001c2009-07-27 12:20:13 -07001215 String message = "Version " + metaInfo.versionCode
1216 + " > installed version " + packageInfo.versionCode;
1217 Log.w(TAG, "Package " + packageName + ": " + message);
1218 EventLog.writeEvent(RESTORE_AGENT_FAILURE_EVENT, packageName, message);
Dan Egnorefe52642009-06-24 00:16:33 -07001219 continue;
1220 }
Christopher Tatedf01dea2009-06-09 20:45:02 -07001221
Dan Egnorefe52642009-06-24 00:16:33 -07001222 if (!signaturesMatch(metaInfo.signatures, packageInfo.signatures)) {
1223 Log.w(TAG, "Signature mismatch restoring " + packageName);
Dan Egnorbb9001c2009-07-27 12:20:13 -07001224 EventLog.writeEvent(RESTORE_AGENT_FAILURE_EVENT, packageName,
1225 "Signature mismatch");
Dan Egnorefe52642009-06-24 00:16:33 -07001226 continue;
1227 }
Christopher Tatedf01dea2009-06-09 20:45:02 -07001228
Dan Egnorefe52642009-06-24 00:16:33 -07001229 if (DEBUG) Log.v(TAG, "Package " + packageName
1230 + " restore version [" + metaInfo.versionCode
1231 + "] is compatible with installed version ["
1232 + packageInfo.versionCode + "]");
Christopher Tatec7b31e32009-06-10 15:49:30 -07001233
Dan Egnorefe52642009-06-24 00:16:33 -07001234 // Now perform the actual restore
1235 clearApplicationDataSynchronous(packageName);
1236 IBackupAgent agent = bindToAgentSynchronous(
1237 packageInfo.applicationInfo,
Christopher Tatec7b31e32009-06-10 15:49:30 -07001238 IApplicationThread.BACKUP_MODE_RESTORE);
Dan Egnorefe52642009-06-24 00:16:33 -07001239 if (agent == null) {
1240 Log.w(TAG, "Can't find backup agent for " + packageName);
Dan Egnorbb9001c2009-07-27 12:20:13 -07001241 EventLog.writeEvent(RESTORE_AGENT_FAILURE_EVENT, packageName,
1242 "Restore agent missing");
Dan Egnorefe52642009-06-24 00:16:33 -07001243 continue;
Christopher Tatedf01dea2009-06-09 20:45:02 -07001244 }
1245
Dan Egnorefe52642009-06-24 00:16:33 -07001246 try {
1247 processOneRestore(packageInfo, metaInfo.versionCode, agent);
Dan Egnorbb9001c2009-07-27 12:20:13 -07001248 ++count;
Dan Egnorefe52642009-06-24 00:16:33 -07001249 } finally {
1250 // unbind even on timeout or failure, just in case
1251 mActivityManager.unbindBackupAgent(packageInfo.applicationInfo);
1252 }
Christopher Tatedf01dea2009-06-09 20:45:02 -07001253 }
Christopher Tate7d562ec2009-06-25 18:03:43 -07001254
1255 // if we get this far, report success to the observer
1256 error = 0;
Dan Egnorbb9001c2009-07-27 12:20:13 -07001257 int millis = (int) (SystemClock.elapsedRealtime() - startRealtime);
1258 EventLog.writeEvent(RESTORE_SUCCESS_EVENT, count, millis);
1259 } catch (Exception e) {
1260 Log.e(TAG, "Error in restore thread", e);
Dan Egnorefe52642009-06-24 00:16:33 -07001261 } finally {
Dan Egnorbb9001c2009-07-27 12:20:13 -07001262 if (DEBUG) Log.d(TAG, "finishing restore mObserver=" + mObserver);
1263
Dan Egnorefe52642009-06-24 00:16:33 -07001264 try {
1265 mTransport.finishRestore();
1266 } catch (RemoteException e) {
1267 Log.e(TAG, "Error finishing restore", e);
1268 }
Christopher Tate7d562ec2009-06-25 18:03:43 -07001269
1270 if (mObserver != null) {
1271 try {
1272 mObserver.restoreFinished(error);
1273 } catch (RemoteException e) {
1274 Log.d(TAG, "Restore observer died at restoreFinished");
1275 }
1276 }
Christopher Tateb6787f22009-07-02 17:40:45 -07001277
1278 // done; we can finally release the wakelock
1279 mWakelock.release();
Christopher Tatedf01dea2009-06-09 20:45:02 -07001280 }
1281 }
1282
Dan Egnorefe52642009-06-24 00:16:33 -07001283 // Do the guts of a restore of one application, using mTransport.getRestoreData().
1284 void processOneRestore(PackageInfo app, int appVersionCode, IBackupAgent agent) {
Christopher Tatedf01dea2009-06-09 20:45:02 -07001285 // !!! TODO: actually run the restore through mTransport
Christopher Tatec7b31e32009-06-10 15:49:30 -07001286 final String packageName = app.packageName;
1287
Dan Egnorbb9001c2009-07-27 12:20:13 -07001288 if (DEBUG) Log.d(TAG, "processOneRestore packageName=" + packageName);
Joe Onorato9a5e3e12009-07-01 21:04:03 -04001289
Christopher Tatec7b31e32009-06-10 15:49:30 -07001290 // !!! TODO: get the dirs from the transport
1291 File backupDataName = new File(mDataDir, packageName + ".restore");
Dan Egnorbb9001c2009-07-27 12:20:13 -07001292 File newStateName = new File(mStateDir, packageName + ".new");
1293 File savedStateName = new File(mStateDir, packageName);
Christopher Tatec7b31e32009-06-10 15:49:30 -07001294
Dan Egnorbb9001c2009-07-27 12:20:13 -07001295 ParcelFileDescriptor backupData = null;
1296 ParcelFileDescriptor newState = null;
1297
1298 try {
Christopher Tatec7b31e32009-06-10 15:49:30 -07001299 // Run the transport's restore pass
Dan Egnorbb9001c2009-07-27 12:20:13 -07001300 backupData = ParcelFileDescriptor.open(backupDataName,
1301 ParcelFileDescriptor.MODE_READ_WRITE |
1302 ParcelFileDescriptor.MODE_CREATE |
1303 ParcelFileDescriptor.MODE_TRUNCATE);
1304
1305 if (!mTransport.getRestoreData(backupData)) {
1306 Log.e(TAG, "Error getting restore data for " + packageName);
1307 EventLog.writeEvent(RESTORE_TRANSPORT_FAILURE_EVENT);
1308 return;
Christopher Tatec7b31e32009-06-10 15:49:30 -07001309 }
1310
1311 // Okay, we have the data. Now have the agent do the restore.
Dan Egnorbb9001c2009-07-27 12:20:13 -07001312 backupData.close();
Christopher Tatec7b31e32009-06-10 15:49:30 -07001313 backupData = ParcelFileDescriptor.open(backupDataName,
1314 ParcelFileDescriptor.MODE_READ_ONLY);
1315
Dan Egnorbb9001c2009-07-27 12:20:13 -07001316 newState = ParcelFileDescriptor.open(newStateName,
1317 ParcelFileDescriptor.MODE_READ_WRITE |
1318 ParcelFileDescriptor.MODE_CREATE |
1319 ParcelFileDescriptor.MODE_TRUNCATE);
1320
1321 agent.doRestore(backupData, appVersionCode, newState);
Christopher Tatec7b31e32009-06-10 15:49:30 -07001322
1323 // if everything went okay, remember the recorded state now
Dan Egnorefe52642009-06-24 00:16:33 -07001324 newStateName.renameTo(savedStateName);
Dan Egnorbb9001c2009-07-27 12:20:13 -07001325 int size = (int) backupDataName.length();
1326 EventLog.writeEvent(RESTORE_PACKAGE_EVENT, packageName, size);
Christopher Tatec7b31e32009-06-10 15:49:30 -07001327 } catch (Exception e) {
Dan Egnorbb9001c2009-07-27 12:20:13 -07001328 Log.e(TAG, "Error restoring data for " + packageName, e);
1329 EventLog.writeEvent(RESTORE_AGENT_FAILURE_EVENT, packageName, e.toString());
1330
Christopher Tate96733042009-07-20 14:49:13 -07001331 // If the agent fails restore, it might have put the app's data
1332 // into an incoherent state. For consistency we wipe its data
1333 // again in this case before propagating the exception
Christopher Tate96733042009-07-20 14:49:13 -07001334 clearApplicationDataSynchronous(packageName);
Christopher Tate1531dc82009-07-24 16:37:43 -07001335 } finally {
1336 backupDataName.delete();
Dan Egnorbb9001c2009-07-27 12:20:13 -07001337 try { if (backupData != null) backupData.close(); } catch (IOException e) {}
1338 try { if (newState != null) newState.close(); } catch (IOException e) {}
1339 backupData = newState = null;
Christopher Tatec7b31e32009-06-10 15:49:30 -07001340 }
Christopher Tatedf01dea2009-06-09 20:45:02 -07001341 }
1342 }
1343
Christopher Tateee0e78a2009-07-02 11:17:03 -07001344 class PerformClearThread extends Thread {
1345 IBackupTransport mTransport;
1346 PackageInfo mPackage;
1347
1348 PerformClearThread(IBackupTransport transport, PackageInfo packageInfo) {
1349 mTransport = transport;
1350 mPackage = packageInfo;
1351 }
1352
1353 @Override
1354 public void run() {
1355 try {
1356 // Clear the on-device backup state to ensure a full backup next time
1357 File stateDir = new File(mBaseStateDir, mTransport.transportDirName());
1358 File stateFile = new File(stateDir, mPackage.packageName);
1359 stateFile.delete();
1360
1361 // Tell the transport to remove all the persistent storage for the app
1362 mTransport.clearBackupData(mPackage);
1363 } catch (RemoteException e) {
1364 // can't happen; the transport is local
1365 } finally {
1366 try {
1367 mTransport.finishBackup();
1368 } catch (RemoteException e) {
1369 // can't happen; the transport is local
1370 }
Christopher Tateb6787f22009-07-02 17:40:45 -07001371
1372 // Last but not least, release the cpu
1373 mWakelock.release();
Christopher Tateee0e78a2009-07-02 11:17:03 -07001374 }
1375 }
1376 }
1377
Christopher Tatedf01dea2009-06-09 20:45:02 -07001378
Christopher Tate487529a2009-04-29 14:03:25 -07001379 // ----- IBackupManager binder interface -----
Christopher Tatedf01dea2009-06-09 20:45:02 -07001380
Christopher Tatea8bf8152009-04-30 11:36:21 -07001381 public void dataChanged(String packageName) throws RemoteException {
Christopher Tate487529a2009-04-29 14:03:25 -07001382 // Record that we need a backup pass for the caller. Since multiple callers
1383 // may share a uid, we need to note all candidates within that uid and schedule
1384 // a backup pass for each of them.
Dan Egnorbb9001c2009-07-27 12:20:13 -07001385 EventLog.writeEvent(BACKUP_DATA_CHANGED_EVENT, packageName);
Joe Onoratob1a7ffe2009-05-06 18:06:21 -07001386
Christopher Tate63d27002009-06-16 17:16:42 -07001387 // If the caller does not hold the BACKUP permission, it can only request a
1388 // backup of its own data.
1389 HashSet<ApplicationInfo> targets;
Dianne Hackborncf098292009-07-01 19:55:20 -07001390 if ((mContext.checkPermission(android.Manifest.permission.BACKUP, Binder.getCallingPid(),
Christopher Tate63d27002009-06-16 17:16:42 -07001391 Binder.getCallingUid())) == PackageManager.PERMISSION_DENIED) {
1392 targets = mBackupParticipants.get(Binder.getCallingUid());
1393 } else {
1394 // a caller with full permission can ask to back up any participating app
1395 // !!! TODO: allow backup of ANY app?
Christopher Tate63d27002009-06-16 17:16:42 -07001396 targets = new HashSet<ApplicationInfo>();
1397 int N = mBackupParticipants.size();
1398 for (int i = 0; i < N; i++) {
1399 HashSet<ApplicationInfo> s = mBackupParticipants.valueAt(i);
1400 if (s != null) {
1401 targets.addAll(s);
1402 }
1403 }
1404 }
Christopher Tate487529a2009-04-29 14:03:25 -07001405 if (targets != null) {
1406 synchronized (mQueueLock) {
1407 // Note that this client has made data changes that need to be backed up
Christopher Tate181fafa2009-05-14 11:12:14 -07001408 for (ApplicationInfo app : targets) {
Christopher Tatea8bf8152009-04-30 11:36:21 -07001409 // validate the caller-supplied package name against the known set of
1410 // packages associated with this uid
Christopher Tate181fafa2009-05-14 11:12:14 -07001411 if (app.packageName.equals(packageName)) {
Joe Onorato8ad02812009-05-13 01:41:44 -04001412 // Add the caller to the set of pending backups. If there is
1413 // one already there, then overwrite it, but no harm done.
Christopher Tate181fafa2009-05-14 11:12:14 -07001414 BackupRequest req = new BackupRequest(app, false);
Christopher Tatea7de3842009-07-07 14:50:26 -07001415 if (mPendingBackups.put(app, req) == null) {
1416 // Journal this request in case of crash. The put()
1417 // operation returned null when this package was not already
1418 // in the set; we want to avoid touching the disk redundantly.
1419 writeToJournalLocked(packageName);
Christopher Tate487529a2009-04-29 14:03:25 -07001420
Christopher Tate22b60d82009-07-07 16:36:02 -07001421 if (DEBUG) {
1422 int numKeys = mPendingBackups.size();
1423 Log.d(TAG, "Now awaiting backup for " + numKeys + " participants:");
1424 for (BackupRequest b : mPendingBackups.values()) {
1425 Log.d(TAG, " + " + b + " agent=" + b.appInfo.backupAgentName);
1426 }
1427 }
1428 }
Christopher Tate181fafa2009-05-14 11:12:14 -07001429 }
1430 }
Christopher Tate487529a2009-04-29 14:03:25 -07001431 }
Christopher Tatedf01dea2009-06-09 20:45:02 -07001432 } else {
Christopher Tate73e02522009-07-15 14:18:26 -07001433 Log.w(TAG, "dataChanged but no participant pkg='" + packageName + "'"
1434 + " uid=" + Binder.getCallingUid());
Christopher Tate487529a2009-04-29 14:03:25 -07001435 }
1436 }
Christopher Tate46758122009-05-06 11:22:00 -07001437
Christopher Tatecde87f42009-06-12 12:55:53 -07001438 private void writeToJournalLocked(String str) {
1439 if (mJournalStream != null) {
1440 try {
1441 mJournalStream.writeUTF(str);
1442 } catch (IOException e) {
1443 Log.e(TAG, "Error writing to backup journal");
1444 mJournalStream = null;
1445 mJournal = null;
1446 }
1447 }
1448 }
1449
Christopher Tateee0e78a2009-07-02 11:17:03 -07001450 // Clear the given package's backup data from the current transport
1451 public void clearBackupData(String packageName) {
1452 if (DEBUG) Log.v(TAG, "clearBackupData() of " + packageName);
1453 PackageInfo info;
1454 try {
1455 info = mPackageManager.getPackageInfo(packageName, PackageManager.GET_SIGNATURES);
1456 } catch (NameNotFoundException e) {
1457 Log.d(TAG, "No such package '" + packageName + "' - not clearing backup data");
1458 return;
1459 }
1460
1461 // If the caller does not hold the BACKUP permission, it can only request a
1462 // wipe of its own backed-up data.
1463 HashSet<ApplicationInfo> apps;
Christopher Tate4e3e50c2009-07-02 12:14:05 -07001464 if ((mContext.checkPermission(android.Manifest.permission.BACKUP, Binder.getCallingPid(),
Christopher Tateee0e78a2009-07-02 11:17:03 -07001465 Binder.getCallingUid())) == PackageManager.PERMISSION_DENIED) {
1466 apps = mBackupParticipants.get(Binder.getCallingUid());
1467 } else {
1468 // a caller with full permission can ask to back up any participating app
1469 // !!! TODO: allow data-clear of ANY app?
1470 if (DEBUG) Log.v(TAG, "Privileged caller, allowing clear of other apps");
1471 apps = new HashSet<ApplicationInfo>();
1472 int N = mBackupParticipants.size();
1473 for (int i = 0; i < N; i++) {
1474 HashSet<ApplicationInfo> s = mBackupParticipants.valueAt(i);
1475 if (s != null) {
1476 apps.addAll(s);
1477 }
1478 }
1479 }
1480
1481 // now find the given package in the set of candidate apps
1482 for (ApplicationInfo app : apps) {
1483 if (app.packageName.equals(packageName)) {
1484 if (DEBUG) Log.v(TAG, "Found the app - running clear process");
1485 // found it; fire off the clear request
1486 synchronized (mQueueLock) {
Christopher Tateaa93b042009-08-05 18:21:40 -07001487 long oldId = Binder.clearCallingIdentity();
Christopher Tateb6787f22009-07-02 17:40:45 -07001488 mWakelock.acquire();
Christopher Tateee0e78a2009-07-02 11:17:03 -07001489 Message msg = mBackupHandler.obtainMessage(MSG_RUN_CLEAR,
1490 new ClearParams(getTransport(mCurrentTransport), info));
1491 mBackupHandler.sendMessage(msg);
Christopher Tateaa93b042009-08-05 18:21:40 -07001492 Binder.restoreCallingIdentity(oldId);
Christopher Tateee0e78a2009-07-02 11:17:03 -07001493 }
1494 break;
1495 }
1496 }
1497 }
1498
Christopher Tateace7f092009-06-15 18:07:25 -07001499 // Run a backup pass immediately for any applications that have declared
1500 // that they have pending updates.
1501 public void backupNow() throws RemoteException {
Joe Onorato5933a492009-07-23 18:24:08 -04001502 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.BACKUP, "backupNow");
Christopher Tate043dadc2009-06-02 16:11:00 -07001503
Christopher Tateace7f092009-06-15 18:07:25 -07001504 if (DEBUG) Log.v(TAG, "Scheduling immediate backup pass");
Christopher Tate46758122009-05-06 11:22:00 -07001505 synchronized (mQueueLock) {
Christopher Tateb6787f22009-07-02 17:40:45 -07001506 try {
1507 if (DEBUG) Log.v(TAG, "sending immediate backup broadcast");
1508 mRunBackupIntent.send();
1509 } catch (PendingIntent.CanceledException e) {
1510 // should never happen
1511 Log.e(TAG, "run-backup intent cancelled!");
1512 }
Christopher Tate46758122009-05-06 11:22:00 -07001513 }
1514 }
Joe Onoratob1a7ffe2009-05-06 18:06:21 -07001515
Christopher Tate8031a3d2009-07-06 16:36:05 -07001516 // Enable/disable the backup service
Christopher Tate6ef58a12009-06-29 14:56:28 -07001517 public void setBackupEnabled(boolean enable) {
Christopher Tateb6787f22009-07-02 17:40:45 -07001518 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.BACKUP,
1519 "setBackupEnabled");
Christopher Tate6ef58a12009-06-29 14:56:28 -07001520
1521 boolean wasEnabled = mEnabled;
1522 synchronized (this) {
Dianne Hackborncf098292009-07-01 19:55:20 -07001523 Settings.Secure.putInt(mContext.getContentResolver(),
1524 Settings.Secure.BACKUP_ENABLED, enable ? 1 : 0);
Christopher Tate6ef58a12009-06-29 14:56:28 -07001525 mEnabled = enable;
1526 }
1527
Christopher Tate49401dd2009-07-01 12:34:29 -07001528 synchronized (mQueueLock) {
Christopher Tate8031a3d2009-07-06 16:36:05 -07001529 if (enable && !wasEnabled && mProvisioned) {
Christopher Tate49401dd2009-07-01 12:34:29 -07001530 // if we've just been enabled, start scheduling backup passes
Christopher Tate8031a3d2009-07-06 16:36:05 -07001531 startBackupAlarmsLocked(BACKUP_INTERVAL);
Christopher Tate49401dd2009-07-01 12:34:29 -07001532 } else if (!enable) {
Christopher Tateb6787f22009-07-02 17:40:45 -07001533 // No longer enabled, so stop running backups
1534 mAlarmManager.cancel(mRunBackupIntent);
Christopher Tate6ef58a12009-06-29 14:56:28 -07001535 }
1536 }
Christopher Tate49401dd2009-07-01 12:34:29 -07001537 }
Christopher Tate6ef58a12009-06-29 14:56:28 -07001538
Christopher Tate8031a3d2009-07-06 16:36:05 -07001539 // Mark the backup service as having been provisioned
1540 public void setBackupProvisioned(boolean available) {
1541 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.BACKUP,
1542 "setBackupProvisioned");
1543
1544 boolean wasProvisioned = mProvisioned;
1545 synchronized (this) {
1546 Settings.Secure.putInt(mContext.getContentResolver(),
1547 Settings.Secure.BACKUP_PROVISIONED, available ? 1 : 0);
1548 mProvisioned = available;
1549 }
1550
1551 synchronized (mQueueLock) {
1552 if (available && !wasProvisioned && mEnabled) {
1553 // we're now good to go, so start the backup alarms
1554 startBackupAlarmsLocked(FIRST_BACKUP_INTERVAL);
1555 } else if (!available) {
1556 // No longer enabled, so stop running backups
1557 Log.w(TAG, "Backup service no longer provisioned");
1558 mAlarmManager.cancel(mRunBackupIntent);
1559 }
1560 }
1561 }
1562
1563 private void startBackupAlarmsLocked(long delayBeforeFirstBackup) {
1564 long when = System.currentTimeMillis() + delayBeforeFirstBackup;
1565 mAlarmManager.setInexactRepeating(AlarmManager.RTC_WAKEUP, when,
1566 BACKUP_INTERVAL, mRunBackupIntent);
1567 }
1568
Christopher Tate6ef58a12009-06-29 14:56:28 -07001569 // Report whether the backup mechanism is currently enabled
1570 public boolean isBackupEnabled() {
Joe Onorato5933a492009-07-23 18:24:08 -04001571 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.BACKUP, "isBackupEnabled");
Christopher Tate6ef58a12009-06-29 14:56:28 -07001572 return mEnabled; // no need to synchronize just to read it
1573 }
1574
Christopher Tate91717492009-06-26 21:07:13 -07001575 // Report the name of the currently active transport
1576 public String getCurrentTransport() {
Joe Onorato5933a492009-07-23 18:24:08 -04001577 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.BACKUP,
Christopher Tate4e3e50c2009-07-02 12:14:05 -07001578 "getCurrentTransport");
Joe Onorato9a5e3e12009-07-01 21:04:03 -04001579 Log.v(TAG, "... getCurrentTransport() returning " + mCurrentTransport);
Christopher Tate91717492009-06-26 21:07:13 -07001580 return mCurrentTransport;
Christopher Tateace7f092009-06-15 18:07:25 -07001581 }
1582
Christopher Tate91717492009-06-26 21:07:13 -07001583 // Report all known, available backup transports
1584 public String[] listAllTransports() {
Christopher Tate34ebd0e2009-07-06 15:44:54 -07001585 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.BACKUP, "listAllTransports");
Christopher Tate043dadc2009-06-02 16:11:00 -07001586
Christopher Tate91717492009-06-26 21:07:13 -07001587 String[] list = null;
1588 ArrayList<String> known = new ArrayList<String>();
1589 for (Map.Entry<String, IBackupTransport> entry : mTransports.entrySet()) {
1590 if (entry.getValue() != null) {
1591 known.add(entry.getKey());
1592 }
1593 }
1594
1595 if (known.size() > 0) {
1596 list = new String[known.size()];
1597 known.toArray(list);
1598 }
1599 return list;
1600 }
1601
1602 // Select which transport to use for the next backup operation. If the given
1603 // name is not one of the available transports, no action is taken and the method
1604 // returns null.
1605 public String selectBackupTransport(String transport) {
Joe Onorato5933a492009-07-23 18:24:08 -04001606 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.BACKUP, "selectBackupTransport");
Christopher Tate91717492009-06-26 21:07:13 -07001607
1608 synchronized (mTransports) {
1609 String prevTransport = null;
1610 if (mTransports.get(transport) != null) {
1611 prevTransport = mCurrentTransport;
1612 mCurrentTransport = transport;
Dianne Hackborncf098292009-07-01 19:55:20 -07001613 Settings.Secure.putString(mContext.getContentResolver(),
1614 Settings.Secure.BACKUP_TRANSPORT, transport);
Christopher Tate91717492009-06-26 21:07:13 -07001615 Log.v(TAG, "selectBackupTransport() set " + mCurrentTransport
1616 + " returning " + prevTransport);
1617 } else {
1618 Log.w(TAG, "Attempt to select unavailable transport " + transport);
1619 }
1620 return prevTransport;
1621 }
Christopher Tate043dadc2009-06-02 16:11:00 -07001622 }
1623
1624 // Callback: a requested backup agent has been instantiated. This should only
1625 // be called from the Activity Manager.
Christopher Tate181fafa2009-05-14 11:12:14 -07001626 public void agentConnected(String packageName, IBinder agentBinder) {
Christopher Tate043dadc2009-06-02 16:11:00 -07001627 synchronized(mAgentConnectLock) {
1628 if (Binder.getCallingUid() == Process.SYSTEM_UID) {
1629 Log.d(TAG, "agentConnected pkg=" + packageName + " agent=" + agentBinder);
1630 IBackupAgent agent = IBackupAgent.Stub.asInterface(agentBinder);
1631 mConnectedAgent = agent;
1632 mConnecting = false;
1633 } else {
1634 Log.w(TAG, "Non-system process uid=" + Binder.getCallingUid()
1635 + " claiming agent connected");
1636 }
1637 mAgentConnectLock.notifyAll();
1638 }
Christopher Tate181fafa2009-05-14 11:12:14 -07001639 }
1640
1641 // Callback: a backup agent has failed to come up, or has unexpectedly quit.
1642 // If the agent failed to come up in the first place, the agentBinder argument
Christopher Tate043dadc2009-06-02 16:11:00 -07001643 // will be null. This should only be called from the Activity Manager.
Christopher Tate181fafa2009-05-14 11:12:14 -07001644 public void agentDisconnected(String packageName) {
1645 // TODO: handle backup being interrupted
Christopher Tate043dadc2009-06-02 16:11:00 -07001646 synchronized(mAgentConnectLock) {
1647 if (Binder.getCallingUid() == Process.SYSTEM_UID) {
1648 mConnectedAgent = null;
1649 mConnecting = false;
1650 } else {
1651 Log.w(TAG, "Non-system process uid=" + Binder.getCallingUid()
1652 + " claiming agent disconnected");
1653 }
1654 mAgentConnectLock.notifyAll();
1655 }
Christopher Tate181fafa2009-05-14 11:12:14 -07001656 }
Christopher Tate181fafa2009-05-14 11:12:14 -07001657
Christopher Tate8c850b72009-06-07 19:33:20 -07001658 // Hand off a restore session
Christopher Tate91717492009-06-26 21:07:13 -07001659 public IRestoreSession beginRestoreSession(String transport) {
Joe Onorato5933a492009-07-23 18:24:08 -04001660 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.BACKUP, "beginRestoreSession");
Christopher Tatef68eb502009-06-16 11:02:01 -07001661
1662 synchronized(this) {
1663 if (mActiveRestoreSession != null) {
1664 Log.d(TAG, "Restore session requested but one already active");
1665 return null;
1666 }
Christopher Tate91717492009-06-26 21:07:13 -07001667 mActiveRestoreSession = new RestoreSession(transport);
Christopher Tatef68eb502009-06-16 11:02:01 -07001668 }
1669 return mActiveRestoreSession;
Christopher Tate8c850b72009-06-07 19:33:20 -07001670 }
Christopher Tate043dadc2009-06-02 16:11:00 -07001671
Christopher Tate9b3905c2009-06-08 15:24:01 -07001672 // ----- Restore session -----
1673
1674 class RestoreSession extends IRestoreSession.Stub {
Christopher Tatef68eb502009-06-16 11:02:01 -07001675 private static final String TAG = "RestoreSession";
1676
Christopher Tate9b3905c2009-06-08 15:24:01 -07001677 private IBackupTransport mRestoreTransport = null;
1678 RestoreSet[] mRestoreSets = null;
1679
Christopher Tate91717492009-06-26 21:07:13 -07001680 RestoreSession(String transport) {
1681 mRestoreTransport = getTransport(transport);
Christopher Tate9b3905c2009-06-08 15:24:01 -07001682 }
1683
1684 // --- Binder interface ---
Dan Egnor0084da52009-07-29 12:57:16 -07001685 public synchronized RestoreSet[] getAvailableRestoreSets() {
Joe Onorato5933a492009-07-23 18:24:08 -04001686 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.BACKUP,
Christopher Tate9bbc21a2009-06-10 20:23:25 -07001687 "getAvailableRestoreSets");
1688
Christopher Tatef68eb502009-06-16 11:02:01 -07001689 try {
Christopher Tate43383042009-07-13 15:17:13 -07001690 if (mRestoreTransport == null) {
1691 Log.w(TAG, "Null transport getting restore sets");
Dan Egnor0084da52009-07-29 12:57:16 -07001692 return null;
1693 }
1694 if (mRestoreSets == null) { // valid transport; do the one-time fetch
Christopher Tate9b3905c2009-06-08 15:24:01 -07001695 mRestoreSets = mRestoreTransport.getAvailableRestoreSets();
Dan Egnorbb9001c2009-07-27 12:20:13 -07001696 if (mRestoreSets == null) EventLog.writeEvent(RESTORE_TRANSPORT_FAILURE_EVENT);
Christopher Tate9b3905c2009-06-08 15:24:01 -07001697 }
1698 return mRestoreSets;
Dan Egnor0084da52009-07-29 12:57:16 -07001699 } catch (Exception e) {
1700 Log.e(TAG, "Error in getAvailableRestoreSets", e);
1701 return null;
Christopher Tatef68eb502009-06-16 11:02:01 -07001702 }
Christopher Tate9b3905c2009-06-08 15:24:01 -07001703 }
1704
Dan Egnor0084da52009-07-29 12:57:16 -07001705 public synchronized int performRestore(long token, IRestoreObserver observer) {
1706 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.BACKUP,
1707 "performRestore");
Christopher Tate9bbc21a2009-06-10 20:23:25 -07001708
Dan Egnor0084da52009-07-29 12:57:16 -07001709 if (DEBUG) Log.d(TAG, "performRestore token=" + token + " observer=" + observer);
Joe Onorato9a5e3e12009-07-01 21:04:03 -04001710
Dan Egnor0084da52009-07-29 12:57:16 -07001711 if (mRestoreTransport == null || mRestoreSets == null) {
1712 Log.e(TAG, "Ignoring performRestore() with no restore set");
1713 return -1;
1714 }
1715
1716 for (int i = 0; i < mRestoreSets.length; i++) {
1717 if (token == mRestoreSets[i].token) {
Christopher Tateaa93b042009-08-05 18:21:40 -07001718 long oldId = Binder.clearCallingIdentity();
Dan Egnor0084da52009-07-29 12:57:16 -07001719 mWakelock.acquire();
1720 Message msg = mBackupHandler.obtainMessage(MSG_RUN_RESTORE);
1721 msg.obj = new RestoreParams(mRestoreTransport, observer, token);
1722 mBackupHandler.sendMessage(msg);
Christopher Tateaa93b042009-08-05 18:21:40 -07001723 Binder.restoreCallingIdentity(oldId);
Dan Egnor0084da52009-07-29 12:57:16 -07001724 return 0;
Christopher Tate9bbc21a2009-06-10 20:23:25 -07001725 }
1726 }
Christopher Tate9b3905c2009-06-08 15:24:01 -07001727 return -1;
1728 }
1729
Dan Egnor0084da52009-07-29 12:57:16 -07001730 public synchronized void endRestoreSession() {
Joe Onorato5933a492009-07-23 18:24:08 -04001731 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.BACKUP,
Christopher Tate9bbc21a2009-06-10 20:23:25 -07001732 "endRestoreSession");
1733
Dan Egnor0084da52009-07-29 12:57:16 -07001734 if (DEBUG) Log.d(TAG, "endRestoreSession");
Joe Onorato9a5e3e12009-07-01 21:04:03 -04001735
Dan Egnor0084da52009-07-29 12:57:16 -07001736 synchronized (this) {
1737 try {
1738 if (mRestoreTransport != null) mRestoreTransport.finishRestore();
1739 } catch (Exception e) {
1740 Log.e(TAG, "Error in finishRestore", e);
1741 } finally {
1742 mRestoreTransport = null;
1743 }
1744 }
1745
1746 synchronized (BackupManagerService.this) {
Christopher Tatef68eb502009-06-16 11:02:01 -07001747 if (BackupManagerService.this.mActiveRestoreSession == this) {
1748 BackupManagerService.this.mActiveRestoreSession = null;
1749 } else {
1750 Log.e(TAG, "ending non-current restore session");
1751 }
1752 }
Christopher Tate9b3905c2009-06-08 15:24:01 -07001753 }
1754 }
1755
Christopher Tate043dadc2009-06-02 16:11:00 -07001756
Joe Onoratob1a7ffe2009-05-06 18:06:21 -07001757 @Override
1758 public void dump(FileDescriptor fd, PrintWriter pw, String[] args) {
1759 synchronized (mQueueLock) {
Christopher Tate8031a3d2009-07-06 16:36:05 -07001760 pw.println("Backup Manager is " + (mEnabled ? "enabled" : "disabled")
1761 + " / " + (!mProvisioned ? "not " : "") + "provisioned");
Christopher Tate91717492009-06-26 21:07:13 -07001762 pw.println("Available transports:");
1763 for (String t : listAllTransports()) {
Christopher Tate6ef58a12009-06-29 14:56:28 -07001764 String pad = (t.equals(mCurrentTransport)) ? " * " : " ";
1765 pw.println(pad + t);
Christopher Tate91717492009-06-26 21:07:13 -07001766 }
Joe Onoratob1a7ffe2009-05-06 18:06:21 -07001767 int N = mBackupParticipants.size();
Christopher Tatece0bf062009-07-01 11:43:53 -07001768 pw.println("Participants: " + N);
Joe Onoratob1a7ffe2009-05-06 18:06:21 -07001769 for (int i=0; i<N; i++) {
1770 int uid = mBackupParticipants.keyAt(i);
1771 pw.print(" uid: ");
1772 pw.println(uid);
Christopher Tate181fafa2009-05-14 11:12:14 -07001773 HashSet<ApplicationInfo> participants = mBackupParticipants.valueAt(i);
1774 for (ApplicationInfo app: participants) {
Christopher Tate6ef58a12009-06-29 14:56:28 -07001775 pw.println(" " + app.toString());
Joe Onoratob1a7ffe2009-05-06 18:06:21 -07001776 }
1777 }
Christopher Tate73e02522009-07-15 14:18:26 -07001778 pw.println("Ever backed up: " + mEverStoredApps.size());
1779 for (String pkg : mEverStoredApps) {
1780 pw.println(" " + pkg);
1781 }
Christopher Tate6aa41f42009-06-19 14:14:22 -07001782 pw.println("Pending: " + mPendingBackups.size());
1783 for (BackupRequest req : mPendingBackups.values()) {
Christopher Tate6ef58a12009-06-29 14:56:28 -07001784 pw.println(" " + req);
Christopher Tate181fafa2009-05-14 11:12:14 -07001785 }
Joe Onoratob1a7ffe2009-05-06 18:06:21 -07001786 }
1787 }
Christopher Tate487529a2009-04-29 14:03:25 -07001788}