blob: c4dff9d7d632a5ec3e92a497fb895104375c25ba [file] [log] [blame]
Darin Petkovf2065b42011-05-17 16:36:27 -07001// Copyright (c) 2011 The Chromium OS Authors. All rights reserved.
Darin Petkova4a8a8c2010-07-15 22:21:12 -07002// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "update_engine/omaha_request_params.h"
6
7#include <errno.h>
8#include <fcntl.h>
9#include <sys/utsname.h>
10
11#include <map>
12#include <string>
Darin Petkova3df55b2010-11-15 13:33:55 -080013#include <vector>
Darin Petkova4a8a8c2010-07-15 22:21:12 -070014
Darin Petkov49d91322010-10-25 16:34:58 -070015#include <base/file_util.h>
Patrick Dubroy7fbbe8a2011-08-01 17:28:22 +020016#include <policy/device_policy.h>
Darin Petkov49d91322010-10-25 16:34:58 -070017
Darin Petkova4a8a8c2010-07-15 22:21:12 -070018#include "update_engine/simple_key_value_store.h"
19#include "update_engine/utils.h"
20
Darin Petkov49d91322010-10-25 16:34:58 -070021#define CALL_MEMBER_FN(object, member) ((object).*(member))
22
Darin Petkova4a8a8c2010-07-15 22:21:12 -070023using std::map;
24using std::string;
Darin Petkova3df55b2010-11-15 13:33:55 -080025using std::vector;
Darin Petkova4a8a8c2010-07-15 22:21:12 -070026
Darin Petkova4a8a8c2010-07-15 22:21:12 -070027namespace chromeos_update_engine {
28
Darin Petkov5a7f5652010-07-22 21:40:09 -070029const char* const OmahaRequestParams::kAppId(
30 "{87efface-864d-49a5-9bb3-4b050a7c227a}");
31const char* const OmahaRequestParams::kOsPlatform("Chrome OS");
32const char* const OmahaRequestParams::kOsVersion("Indy");
33const char* const OmahaRequestParams::kUpdateUrl(
34 "https://tools.google.com/service/update2");
35
Patrick Dubroy7fbbe8a2011-08-01 17:28:22 +020036const char OmahaRequestParams::kUpdateTrackKey[] = "CHROMEOS_RELEASE_TRACK";
37
Darin Petkov49d91322010-10-25 16:34:58 -070038OmahaRequestDeviceParams::OmahaRequestDeviceParams() :
Darin Petkov10d02dd2011-01-10 14:57:39 -080039 force_lock_down_(false),
40 forced_lock_down_(false) {}
Darin Petkov49d91322010-10-25 16:34:58 -070041
Darin Petkov5a7f5652010-07-22 21:40:09 -070042bool OmahaRequestDeviceParams::Init(const std::string& in_app_version,
Patrick Dubroy7fbbe8a2011-08-01 17:28:22 +020043 const std::string& in_update_url,
44 const std::string& in_release_track) {
Darin Petkov10d02dd2011-01-10 14:57:39 -080045 bool stateful_override = !ShouldLockDown();
Darin Petkova4a8a8c2010-07-15 22:21:12 -070046 os_platform = OmahaRequestParams::kOsPlatform;
47 os_version = OmahaRequestParams::kOsVersion;
Darin Petkov5a7f5652010-07-22 21:40:09 -070048 app_version = in_app_version.empty() ?
Darin Petkov10d02dd2011-01-10 14:57:39 -080049 GetLsbValue("CHROMEOS_RELEASE_VERSION", "", NULL, stateful_override) :
50 in_app_version;
Darin Petkova4a8a8c2010-07-15 22:21:12 -070051 os_sp = app_version + "_" + GetMachineType();
Darin Petkov10d02dd2011-01-10 14:57:39 -080052 os_board = GetLsbValue("CHROMEOS_RELEASE_BOARD", "", NULL, stateful_override);
Darin Petkovd315dc72010-11-15 09:52:24 -080053 app_id = GetLsbValue("CHROMEOS_RELEASE_APPID",
54 OmahaRequestParams::kAppId,
Darin Petkova3df55b2010-11-15 13:33:55 -080055 NULL,
Darin Petkov10d02dd2011-01-10 14:57:39 -080056 stateful_override);
Darin Petkova4a8a8c2010-07-15 22:21:12 -070057 app_lang = "en-US";
Patrick Dubroy7fbbe8a2011-08-01 17:28:22 +020058
59 // Determine the release track if it wasn't specified by the caller.
60 if (in_release_track.empty() || !IsValidTrack(in_release_track)) {
61 app_track = GetLsbValue(
62 kUpdateTrackKey,
63 "",
64 &chromeos_update_engine::OmahaRequestDeviceParams::IsValidTrack,
65 true); // stateful_override
66 } else {
67 app_track = in_release_track;
68 }
69
Darin Petkovf2065b42011-05-17 16:36:27 -070070 hardware_class = utils::GetHardwareClass();
Andrew de los Reyes3f0303a2010-07-15 22:35:35 -070071 struct stat stbuf;
Darin Petkov5a7f5652010-07-22 21:40:09 -070072
Darin Petkova3df55b2010-11-15 13:33:55 -080073 // Deltas are only okay if the /.nodelta file does not exist. If we don't
74 // know (i.e. stat() returns some unexpected error), then err on the side of
75 // caution and say deltas are not okay.
Andrew de los Reyes3f0303a2010-07-15 22:35:35 -070076 delta_okay = (stat((root_ + "/.nodelta").c_str(), &stbuf) < 0) &&
77 (errno == ENOENT);
78
Darin Petkova3df55b2010-11-15 13:33:55 -080079 // For now, disable delta updates if the rootfs track is different than the
80 // track that we're sending to the update server because such updates are
81 // destined to fail -- the source rootfs hash will be different than the
82 // expected hash due to the different track in /etc/lsb-release.
83 //
84 // Longer term we should consider an alternative: (a) clients can send
85 // (current_version, current_channel, new_channel) information, or (b) the
86 // build process can make sure releases on separate tracks are identical (i.e,
87 // by not stamping the release with the channel), or (c) the release process
88 // can ensure that different channels get different version numbers.
89 const string rootfs_track = GetLsbValue(
90 kUpdateTrackKey,
91 "",
Darin Petkov10d02dd2011-01-10 14:57:39 -080092 NULL, // No need to validate the read-only rootfs track.
93 false); // stateful_override
Darin Petkova3df55b2010-11-15 13:33:55 -080094 delta_okay = delta_okay && rootfs_track == app_track;
95
Darin Petkov5a7f5652010-07-22 21:40:09 -070096 update_url = in_update_url.empty() ?
Darin Petkova3df55b2010-11-15 13:33:55 -080097 GetLsbValue("CHROMEOS_AUSERVER",
98 OmahaRequestParams::kUpdateUrl,
99 NULL,
Darin Petkov10d02dd2011-01-10 14:57:39 -0800100 stateful_override) :
Darin Petkov5a7f5652010-07-22 21:40:09 -0700101 in_update_url;
Darin Petkova4a8a8c2010-07-15 22:21:12 -0700102 return true;
103}
104
Darin Petkov49d91322010-10-25 16:34:58 -0700105bool OmahaRequestDeviceParams::SetTrack(const std::string& track) {
106 TEST_AND_RETURN_FALSE(IsValidTrack(track));
107 FilePath kFile(root_ + utils::kStatefulPartition + "/etc/lsb-release");
108 string file_data;
109 map<string, string> data;
110 if (file_util::ReadFileToString(kFile, &file_data)) {
111 data = simple_key_value_store::ParseString(file_data);
112 }
113 data[kUpdateTrackKey] = track;
114 file_data = simple_key_value_store::AssembleString(data);
115 TEST_AND_RETURN_FALSE(file_util::CreateDirectory(kFile.DirName()));
116 TEST_AND_RETURN_FALSE(
117 file_util::WriteFile(kFile, file_data.data(), file_data.size()) ==
118 static_cast<int>(file_data.size()));
119 app_track = track;
120 return true;
121}
122
123bool OmahaRequestDeviceParams::SetDeviceTrack(const std::string& track) {
124 OmahaRequestDeviceParams params;
Patrick Dubroy7fbbe8a2011-08-01 17:28:22 +0200125 TEST_AND_RETURN_FALSE(params.Init("", "", ""));
Darin Petkov49d91322010-10-25 16:34:58 -0700126 return params.SetTrack(track);
127}
128
Satoru Takabayashi583667b2010-10-27 13:09:57 +0900129string OmahaRequestDeviceParams::GetDeviceTrack() {
130 OmahaRequestDeviceParams params;
131 // Note that params.app_track is an empty string if the value in
132 // lsb-release file is invalid. See Init() for details.
Patrick Dubroy7fbbe8a2011-08-01 17:28:22 +0200133 return params.Init("", "", "") ? params.app_track : "";
Satoru Takabayashi583667b2010-10-27 13:09:57 +0900134}
135
Darin Petkov49d91322010-10-25 16:34:58 -0700136string OmahaRequestDeviceParams::GetLsbValue(const string& key,
137 const string& default_value,
Darin Petkova3df55b2010-11-15 13:33:55 -0800138 ValueValidator validator,
139 bool stateful_override) const {
140 vector<string> files;
141 if (stateful_override) {
142 files.push_back(string(utils::kStatefulPartition) + "/etc/lsb-release");
143 }
144 files.push_back("/etc/lsb-release");
145 for (vector<string>::const_iterator it = files.begin();
146 it != files.end(); ++it) {
147 // TODO(adlr): make sure files checked are owned as root (and all their
148 // parents are recursively, too).
Darin Petkova4a8a8c2010-07-15 22:21:12 -0700149 string file_data;
Darin Petkova3df55b2010-11-15 13:33:55 -0800150 if (!utils::ReadFileToString(root_ + *it, &file_data))
Darin Petkova4a8a8c2010-07-15 22:21:12 -0700151 continue;
152
153 map<string, string> data = simple_key_value_store::ParseString(file_data);
Darin Petkov49d91322010-10-25 16:34:58 -0700154 if (utils::MapContainsKey(data, key)) {
155 const string& value = data[key];
156 if (validator && !CALL_MEMBER_FN(*this, validator)(value)) {
157 continue;
158 }
159 return value;
160 }
Darin Petkova4a8a8c2010-07-15 22:21:12 -0700161 }
162 // not found
163 return default_value;
164}
165
166string OmahaRequestDeviceParams::GetMachineType() const {
167 struct utsname buf;
168 string ret;
169 if (uname(&buf) == 0)
170 ret = buf.machine;
171 return ret;
172}
173
Darin Petkov10d02dd2011-01-10 14:57:39 -0800174bool OmahaRequestDeviceParams::ShouldLockDown() const {
175 if (force_lock_down_) {
176 return forced_lock_down_;
177 }
178 return utils::IsOfficialBuild() && utils::IsNormalBootMode();
Darin Petkov49d91322010-10-25 16:34:58 -0700179}
180
181bool OmahaRequestDeviceParams::IsValidTrack(const std::string& track) const {
Darin Petkov3f375c72010-11-05 09:42:26 -0700182 static const char* kValidTracks[] = {
183 "canary-channel",
Andrew de los Reyesdc928762011-04-12 13:15:25 -0700184 "stable-channel",
Darin Petkov3f375c72010-11-05 09:42:26 -0700185 "beta-channel",
186 "dev-channel",
187 };
Darin Petkov10d02dd2011-01-10 14:57:39 -0800188 if (!ShouldLockDown()) {
Darin Petkov3f375c72010-11-05 09:42:26 -0700189 return true;
190 }
191 for (size_t t = 0; t < arraysize(kValidTracks); ++t) {
192 if (track == kValidTracks[t]) {
193 return true;
194 }
195 }
196 return false;
Darin Petkov49d91322010-10-25 16:34:58 -0700197}
198
Darin Petkov10d02dd2011-01-10 14:57:39 -0800199void OmahaRequestDeviceParams::SetLockDown(bool lock) {
200 force_lock_down_ = true;
201 forced_lock_down_ = lock;
Darin Petkov49d91322010-10-25 16:34:58 -0700202}
203
Darin Petkova4a8a8c2010-07-15 22:21:12 -0700204} // namespace chromeos_update_engine