blob: 3f0005cb0650b4a350d0448e01cf7790d40869be [file] [log] [blame]
Alex Deymoaea4c1c2015-08-19 20:24:43 -07001//
2// Copyright (C) 2011 The Android Open Source Project
3//
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at
7//
8// http://www.apache.org/licenses/LICENSE-2.0
9//
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15//
adlr@google.com3defe6a2009-12-04 20:57:17 +000016
Alex Deymo39910dc2015-11-09 17:04:30 -080017#ifndef UPDATE_ENGINE_PAYLOAD_CONSUMER_INSTALL_PLAN_H_
18#define UPDATE_ENGINE_PAYLOAD_CONSUMER_INSTALL_PLAN_H_
adlr@google.com3defe6a2009-12-04 20:57:17 +000019
20#include <string>
Darin Petkov698d0412010-10-13 10:59:44 -070021#include <vector>
22
Ben Chan05735a12014-09-03 07:48:22 -070023#include <base/macros.h>
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -070024#include <brillo/secure_blob.h>
adlr@google.com3defe6a2009-12-04 20:57:17 +000025
Alex Deymo39910dc2015-11-09 17:04:30 -080026#include "update_engine/common/action.h"
27#include "update_engine/common/boot_control_interface.h"
Chris Sosad317e402013-06-12 13:47:09 -070028
adlr@google.com3defe6a2009-12-04 20:57:17 +000029// InstallPlan is a simple struct that contains relevant info for many
30// parts of the update system about the install that should happen.
adlr@google.com3defe6a2009-12-04 20:57:17 +000031namespace chromeos_update_engine {
32
Alex Deymo64d98782016-02-05 18:03:48 -080033enum class InstallPayloadType {
34 kUnknown,
35 kFull,
36 kDelta,
37};
Jay Srinivasan738fdf32012-12-07 17:40:54 -080038
Alex Deymo64d98782016-02-05 18:03:48 -080039std::string InstallPayloadTypeToString(InstallPayloadType type);
40
41struct InstallPlan {
Alex Deymo763e7db2015-08-27 21:08:08 -070042 InstallPlan() = default;
Jay Srinivasanae4697c2013-03-18 17:08:08 -070043
44 bool operator==(const InstallPlan& that) const;
45 bool operator!=(const InstallPlan& that) const;
46
47 void Dump() const;
adlr@google.com3defe6a2009-12-04 20:57:17 +000048
Alex Deymoe5e5fe92015-10-05 09:28:19 -070049 // Load the |source_path| and |target_path| of all |partitions| based on the
50 // |source_slot| and |target_slot| if available. Returns whether it succeeded
51 // to load all the partitions for the valid slots.
Alex Deymo706a5ab2015-11-23 17:48:30 -030052 bool LoadPartitionsFromSlots(BootControlInterface* boot_control);
Alex Deymo763e7db2015-08-27 21:08:08 -070053
54 bool is_resume{false};
Alex Deymo64d98782016-02-05 18:03:48 -080055 InstallPayloadType payload_type{InstallPayloadType::kUnknown};
adlr@google.com3defe6a2009-12-04 20:57:17 +000056 std::string download_url; // url to download from
Chris Sosafb1020e2013-07-29 17:27:33 -070057 std::string version; // version we are installing.
Jay Srinivasan51dcf262012-09-13 17:24:32 -070058
Alex Deymo763e7db2015-08-27 21:08:08 -070059 uint64_t payload_size{0}; // size of the payload
60 std::string payload_hash; // SHA256 hash of the payload
61 uint64_t metadata_size{0}; // size of the metadata
Jay Srinivasanf4318702012-09-24 11:56:24 -070062 std::string metadata_signature; // signature of the metadata
Alex Deymo763e7db2015-08-27 21:08:08 -070063
64 // The partition slots used for the update.
65 BootControlInterface::Slot source_slot{BootControlInterface::kInvalidSlot};
66 BootControlInterface::Slot target_slot{BootControlInterface::kInvalidSlot};
67
Alex Deymoe5e5fe92015-10-05 09:28:19 -070068 // The vector below is used for partition verification. The flow is:
Darin Petkov3aefa862010-12-07 14:45:00 -080069 //
Sen Jiangfef85fd2016-03-25 15:32:49 -070070 // 1. DownloadAction fills in the expected source and target partition sizes
71 // and hashes based on the manifest.
Darin Petkov3aefa862010-12-07 14:45:00 -080072 //
Sen Jiangfef85fd2016-03-25 15:32:49 -070073 // 2. FilesystemVerifierAction computes and verifies the partition sizes and
74 // hashes against the expected values.
Alex Deymoe5e5fe92015-10-05 09:28:19 -070075 struct Partition {
76 bool operator==(const Partition& that) const;
77
78 // The name of the partition.
79 std::string name;
80
81 std::string source_path;
82 uint64_t source_size{0};
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -070083 brillo::Blob source_hash;
Alex Deymoe5e5fe92015-10-05 09:28:19 -070084
85 std::string target_path;
86 uint64_t target_size{0};
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -070087 brillo::Blob target_hash;
Alex Deymoe5e5fe92015-10-05 09:28:19 -070088
Alex Deymo390efed2016-02-18 11:00:40 -080089 // Whether we should run the postinstall script from this partition and the
90 // postinstall parameters.
Alex Deymoe5e5fe92015-10-05 09:28:19 -070091 bool run_postinstall{false};
Alex Deymo390efed2016-02-18 11:00:40 -080092 std::string postinstall_path;
93 std::string filesystem_type;
Alex Deymo5b91c6b2016-08-04 20:33:36 -070094 bool postinstall_optional{false};
Alex Deymoe5e5fe92015-10-05 09:28:19 -070095 };
96 std::vector<Partition> partitions;
adlr@google.com3defe6a2009-12-04 20:57:17 +000097
Jay Srinivasan738fdf32012-12-07 17:40:54 -080098 // True if payload hash checks are mandatory based on the system state and
99 // the Omaha response.
Alex Deymo763e7db2015-08-27 21:08:08 -0700100 bool hash_checks_mandatory{false};
Jay Srinivasan738fdf32012-12-07 17:40:54 -0800101
Jay Srinivasanae4697c2013-03-18 17:08:08 -0700102 // True if Powerwash is required on reboot after applying the payload.
103 // False otherwise.
Alex Deymo763e7db2015-08-27 21:08:08 -0700104 bool powerwash_required{false};
David Zeuthene7f89172013-10-31 10:21:04 -0700105
106 // If not blank, a base-64 encoded representation of the PEM-encoded
107 // public key in the response.
108 std::string public_key_rsa;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000109};
110
Chris Sosad317e402013-06-12 13:47:09 -0700111class InstallPlanAction;
112
113template<>
114class ActionTraits<InstallPlanAction> {
115 public:
116 // Takes the install plan as input
117 typedef InstallPlan InputObjectType;
118 // Passes the install plan as output
119 typedef InstallPlan OutputObjectType;
120};
121
122// Basic action that only receives and sends Install Plans.
123// Can be used to construct an Install Plan to send to any other Action that
124// accept an InstallPlan.
125class InstallPlanAction : public Action<InstallPlanAction> {
126 public:
127 InstallPlanAction() {}
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700128 explicit InstallPlanAction(const InstallPlan& install_plan):
Chris Sosad317e402013-06-12 13:47:09 -0700129 install_plan_(install_plan) {}
130
Alex Deymo610277e2014-11-11 21:18:11 -0800131 void PerformAction() override {
Chris Sosad317e402013-06-12 13:47:09 -0700132 if (HasOutputPipe()) {
133 SetOutputObject(install_plan_);
134 }
Gilad Arnoldd1c4d2d2014-06-05 14:07:53 -0700135 processor_->ActionComplete(this, ErrorCode::kSuccess);
Chris Sosad317e402013-06-12 13:47:09 -0700136 }
137
Chris Sosa76a29ae2013-07-11 17:59:24 -0700138 InstallPlan* install_plan() { return &install_plan_; }
139
140 static std::string StaticType() { return "InstallPlanAction"; }
Alex Deymo610277e2014-11-11 21:18:11 -0800141 std::string Type() const override { return StaticType(); }
Chris Sosad317e402013-06-12 13:47:09 -0700142
143 typedef ActionTraits<InstallPlanAction>::InputObjectType InputObjectType;
144 typedef ActionTraits<InstallPlanAction>::OutputObjectType OutputObjectType;
145
146 private:
147 InstallPlan install_plan_;
148
Alex Vakulenkod2779df2014-06-16 13:19:00 -0700149 DISALLOW_COPY_AND_ASSIGN(InstallPlanAction);
Chris Sosad317e402013-06-12 13:47:09 -0700150};
151
adlr@google.com3defe6a2009-12-04 20:57:17 +0000152} // namespace chromeos_update_engine
153
Alex Deymo39910dc2015-11-09 17:04:30 -0800154#endif // UPDATE_ENGINE_PAYLOAD_CONSUMER_INSTALL_PLAN_H_