blob: 8370b8104ffcd1633ed19df65ebc75e78d555b37 [file] [log] [blame]
Andrew de los Reyes09e56d62010-04-23 13:45:53 -07001// Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#ifndef CHROMEOS_PLATFORM_UPDATE_ENGINE_DELTA_PERFORMER_H__
6#define CHROMEOS_PLATFORM_UPDATE_ENGINE_DELTA_PERFORMER_H__
7
8#include <inttypes.h>
Darin Petkovd7061ab2010-10-06 14:37:09 -07009
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070010#include <vector>
Darin Petkovd7061ab2010-10-06 14:37:09 -070011
Gilad Arnold8a86fa52013-01-15 12:35:05 -080012#include <base/time.h>
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070013#include <google/protobuf/repeated_field.h>
Andrew de los Reyes353777c2010-10-08 10:34:30 -070014#include <gtest/gtest_prod.h> // for FRIEND_TEST
Darin Petkovd7061ab2010-10-06 14:37:09 -070015
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070016#include "update_engine/file_writer.h"
Jay Srinivasan51dcf262012-09-13 17:24:32 -070017#include "update_engine/install_plan.h"
Darin Petkovd7061ab2010-10-06 14:37:09 -070018#include "update_engine/omaha_hash_calculator.h"
Jay Srinivasanf0572052012-10-23 18:12:56 -070019#include "update_engine/system_state.h"
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070020#include "update_engine/update_metadata.pb.h"
21
22namespace chromeos_update_engine {
23
Darin Petkov73058b42010-10-06 16:32:19 -070024class PrefsInterface;
25
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070026// This class performs the actions in a delta update synchronously. The delta
27// update itself should be passed in in chunks as it is received.
28
29class DeltaPerformer : public FileWriter {
30 public:
Darin Petkov9574f7e2011-01-13 10:48:12 -080031 enum MetadataParseResult {
32 kMetadataParseSuccess,
33 kMetadataParseError,
34 kMetadataParseInsufficientData,
35 };
36
Jay Srinivasanf4318702012-09-24 11:56:24 -070037 static const uint64_t kDeltaVersionSize;
38 static const uint64_t kDeltaManifestSizeSize;
Darin Petkovabc7bc02011-02-23 14:39:43 -080039 static const char kUpdatePayloadPublicKeyPath[];
40
Gilad Arnold8a86fa52013-01-15 12:35:05 -080041 // Defines the granularity of progress logging in terms of how many "completed
42 // chunks" we want to report at the most.
43 static const unsigned kProgressLogMaxChunks;
44 // Defines a timeout since the last progress was logged after which we want to
45 // force another log message (even if the current chunk was not completed).
46 static const unsigned kProgressLogTimeoutSeconds;
47 // These define the relative weights (0-100) we give to the different work
48 // components associated with an update when computing an overall progress.
49 // Currently they include the download progress and the number of completed
50 // operations. They must add up to one hundred (100).
51 static const unsigned kProgressDownloadWeight;
52 static const unsigned kProgressOperationsWeight;
53
Jay Srinivasanf0572052012-10-23 18:12:56 -070054 DeltaPerformer(PrefsInterface* prefs,
55 SystemState* system_state,
56 InstallPlan* install_plan)
Darin Petkov73058b42010-10-06 16:32:19 -070057 : prefs_(prefs),
Jay Srinivasanf0572052012-10-23 18:12:56 -070058 system_state_(system_state),
Jay Srinivasan51dcf262012-09-13 17:24:32 -070059 install_plan_(install_plan),
Darin Petkov73058b42010-10-06 16:32:19 -070060 fd_(-1),
Andrew de los Reyesf4c7ef12010-04-30 10:37:00 -070061 kernel_fd_(-1),
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070062 manifest_valid_(false),
Darin Petkov437adc42010-10-07 13:12:24 -070063 manifest_metadata_size_(0),
Andrew de los Reyesf4c7ef12010-04-30 10:37:00 -070064 next_operation_num_(0),
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070065 buffer_offset_(0),
Darin Petkov0406e402010-10-06 21:33:11 -070066 last_updated_buffer_offset_(kuint64max),
Jay Srinivasan51dcf262012-09-13 17:24:32 -070067 block_size_(0),
Gilad Arnold8a86fa52013-01-15 12:35:05 -080068 public_key_path_(kUpdatePayloadPublicKeyPath),
69 total_bytes_received_(0),
70 num_rootfs_operations_(0),
71 num_total_operations_(0),
72 overall_progress_(0),
73 last_progress_chunk_(0),
74 forced_progress_log_wait_(
75 base::TimeDelta::FromSeconds(kProgressLogTimeoutSeconds)) {}
Darin Petkovd7061ab2010-10-06 14:37:09 -070076
Andrew de los Reyesf4c7ef12010-04-30 10:37:00 -070077 // Opens the kernel. Should be called before or after Open(), but before
78 // Write(). The kernel file will be close()d when Close() is called.
79 bool OpenKernel(const char* kernel_path);
80
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070081 // flags and mode ignored. Once Close()d, a DeltaPerformer can't be
82 // Open()ed again.
83 int Open(const char* path, int flags, mode_t mode);
84
Jay Srinivasan51dcf262012-09-13 17:24:32 -070085 // FileWriter's Write implementation where caller doesn't care about
86 // error codes.
87 bool Write(const void* bytes, size_t count) {
88 ActionExitCode error;
89 return Write(bytes, count, &error);
90 }
91
92 // FileWriter's Write implementation that returns a more specific |error| code
93 // in case of failures in Write operation.
94 bool Write(const void* bytes, size_t count, ActionExitCode *error);
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070095
96 // Wrapper around close. Returns 0 on success or -errno on error.
Andrew de los Reyesf4c7ef12010-04-30 10:37:00 -070097 // Closes both 'path' given to Open() and the kernel path.
Andrew de los Reyes09e56d62010-04-23 13:45:53 -070098 int Close();
Darin Petkovd7061ab2010-10-06 14:37:09 -070099
100 // Verifies the downloaded payload against the signed hash included in the
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700101 // payload, against the update check hash (which is in base64 format) and
102 // size using the public key and returns kActionCodeSuccess on success, an
103 // error code on failure. This method should be called after closing the
104 // stream. Note this method skips the signed hash check if the public key is
105 // unavailable; it returns kActionCodeSignedDeltaPayloadExpectedError if the
106 // public key is available but the delta payload doesn't include a signature.
107 ActionExitCode VerifyPayload(const std::string& update_check_response_hash,
Andrew de los Reyes771e1bd2011-08-30 14:47:23 -0700108 const uint64_t update_check_response_size);
Darin Petkovd7061ab2010-10-06 14:37:09 -0700109
Darin Petkov3aefa862010-12-07 14:45:00 -0800110 // Reads from the update manifest the expected sizes and hashes of the target
111 // kernel and rootfs partitions. These values can be used for applied update
112 // hash verification. This method must be called after the update manifest has
113 // been parsed (e.g., after closing the stream). Returns true on success, and
114 // false on failure (e.g., when the values are not present in the update
115 // manifest).
116 bool GetNewPartitionInfo(uint64_t* kernel_size,
117 std::vector<char>* kernel_hash,
118 uint64_t* rootfs_size,
119 std::vector<char>* rootfs_hash);
Darin Petkov2dd01092010-10-08 15:43:05 -0700120
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700121 // Converts an ordered collection of Extent objects which contain data of
122 // length full_length to a comma-separated string. For each Extent, the
123 // string will have the start offset and then the length in bytes.
124 // The length value of the last extent in the string may be short, since
125 // the full length of all extents in the string is capped to full_length.
126 // Also, an extent starting at kSparseHole, appears as -1 in the string.
127 // For example, if the Extents are {1, 1}, {4, 2}, {kSparseHole, 1},
128 // {0, 1}, block_size is 4096, and full_length is 5 * block_size - 13,
129 // the resulting string will be: "4096:4096,16384:8192,-1:4096,0:4083"
130 static bool ExtentsToBsdiffPositionsString(
131 const google::protobuf::RepeatedPtrField<Extent>& extents,
132 uint64_t block_size,
133 uint64_t full_length,
134 std::string* positions_string);
135
Darin Petkov0406e402010-10-06 21:33:11 -0700136 // Returns true if a previous update attempt can be continued based on the
137 // persistent preferences and the new update check response hash.
138 static bool CanResumeUpdate(PrefsInterface* prefs,
139 std::string update_check_response_hash);
140
141 // Resets the persistent update progress state to indicate that an update
Darin Petkov9b230572010-10-08 10:20:09 -0700142 // can't be resumed. Performs a quick update-in-progress reset if |quick| is
143 // true, otherwise resets all progress-related update state. Returns true on
144 // success, false otherwise.
145 static bool ResetUpdateProgress(PrefsInterface* prefs, bool quick);
Darin Petkov0406e402010-10-06 21:33:11 -0700146
Darin Petkov9574f7e2011-01-13 10:48:12 -0800147 // Attempts to parse the update metadata starting from the beginning of
148 // |payload| into |manifest|. On success, sets |metadata_size| to the total
149 // metadata bytes (including the delta magic and metadata size fields), and
150 // returns kMetadataParseSuccess. Returns kMetadataParseInsufficientData if
151 // more data is needed to parse the complete metadata. Returns
152 // kMetadataParseError if the metadata can't be parsed given the payload.
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700153 MetadataParseResult ParsePayloadMetadata(
Darin Petkov9574f7e2011-01-13 10:48:12 -0800154 const std::vector<char>& payload,
155 DeltaArchiveManifest* manifest,
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700156 uint64_t* metadata_size,
157 ActionExitCode* error);
Darin Petkov9574f7e2011-01-13 10:48:12 -0800158
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700159 void set_public_key_path(const std::string& public_key_path) {
160 public_key_path_ = public_key_path;
Darin Petkov698d0412010-10-13 10:59:44 -0700161 }
162
Jay Srinivasanf4318702012-09-24 11:56:24 -0700163 // Returns the byte offset at which the manifest protobuf begins in a
164 // payload.
165 static uint64_t GetManifestOffset();
166
167 // Returns the byte offset where the size of the manifest is stored in
168 // a payload. This offset precedes the actual start of the manifest
169 // that's returned by the GetManifestOffset method.
170 static uint64_t GetManifestSizeOffset();
171
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700172 private:
Andrew de los Reyes353777c2010-10-08 10:34:30 -0700173 friend class DeltaPerformerTest;
174 FRIEND_TEST(DeltaPerformerTest, IsIdempotentOperationTest);
175
Gilad Arnold8a86fa52013-01-15 12:35:05 -0800176 // Logs the progress of downloading/applying an update.
177 void LogProgress(const char* message_prefix);
178
179 // Update overall progress metrics, log as necessary.
180 void UpdateOverallProgress(bool force_log, const char* message_prefix);
181
Andrew de los Reyes353777c2010-10-08 10:34:30 -0700182 static bool IsIdempotentOperation(
183 const DeltaArchiveManifest_InstallOperation& op);
184
Darin Petkov698d0412010-10-13 10:59:44 -0700185 // Verifies that the expected source partition hashes (if present) match the
186 // hashes for the current partitions. Returns true if there're no expected
187 // hashes in the payload (e.g., if it's a new-style full update) or if the
188 // hashes match; returns false otherwise.
189 bool VerifySourcePartitions();
190
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700191 // Returns true if enough of the delta file has been passed via Write()
192 // to be able to perform a given install operation.
193 bool CanPerformInstallOperation(
194 const DeltaArchiveManifest_InstallOperation& operation);
Darin Petkovd7061ab2010-10-06 14:37:09 -0700195
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700196 // Validates that the hash of the blobs corresponding to the given |operation|
197 // matches what's specified in the manifest in the payload.
198 // Returns kActionCodeSuccess on match or a suitable error code otherwise.
199 ActionExitCode ValidateOperationHash(
Gilad Arnold8a86fa52013-01-15 12:35:05 -0800200 const DeltaArchiveManifest_InstallOperation& operation);
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700201
202 // Interprets the given |protobuf| as a DeltaArchiveManifest protocol buffer
203 // of the given protobuf_length and verifies that the signed hash of the
Jay Srinivasanf4318702012-09-24 11:56:24 -0700204 // metadata matches what's specified in the install plan from Omaha.
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700205 // Returns kActionCodeSuccess on match or a suitable error code otherwise.
206 // This method must be called before any part of the |protobuf| is parsed
207 // so that a man-in-the-middle attack on the SSL connection to the payload
208 // server doesn't exploit any vulnerability in the code that parses the
209 // protocol buffer.
Jay Srinivasanf4318702012-09-24 11:56:24 -0700210 ActionExitCode ValidateMetadataSignature(const char* protobuf,
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700211 uint64_t protobuf_length);
212
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700213 // Returns true on success.
214 bool PerformInstallOperation(
215 const DeltaArchiveManifest_InstallOperation& operation);
Darin Petkovd7061ab2010-10-06 14:37:09 -0700216
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700217 // These perform a specific type of operation and return true on success.
218 bool PerformReplaceOperation(
Andrew de los Reyesf4c7ef12010-04-30 10:37:00 -0700219 const DeltaArchiveManifest_InstallOperation& operation,
220 bool is_kernel_partition);
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700221 bool PerformMoveOperation(
Andrew de los Reyesf4c7ef12010-04-30 10:37:00 -0700222 const DeltaArchiveManifest_InstallOperation& operation,
223 bool is_kernel_partition);
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700224 bool PerformBsdiffOperation(
Andrew de los Reyesf4c7ef12010-04-30 10:37:00 -0700225 const DeltaArchiveManifest_InstallOperation& operation,
226 bool is_kernel_partition);
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700227
Darin Petkovd7061ab2010-10-06 14:37:09 -0700228 // Returns true if the payload signature message has been extracted from
229 // |operation|, false otherwise.
230 bool ExtractSignatureMessage(
231 const DeltaArchiveManifest_InstallOperation& operation);
232
Darin Petkov437adc42010-10-07 13:12:24 -0700233 // Updates the hash calculator with |count| bytes at the head of |buffer_| and
234 // then discards them.
235 void DiscardBufferHeadBytes(size_t count);
Darin Petkovd7061ab2010-10-06 14:37:09 -0700236
Darin Petkov0406e402010-10-06 21:33:11 -0700237 // Checkpoints the update progress into persistent storage to allow this
238 // update attempt to be resumed after reboot.
Darin Petkov73058b42010-10-06 16:32:19 -0700239 bool CheckpointUpdateProgress();
240
Darin Petkov9b230572010-10-08 10:20:09 -0700241 // Primes the required update state. Returns true if the update state was
242 // successfully initialized to a saved resume state or if the update is a new
243 // update. Returns false otherwise.
244 bool PrimeUpdateState();
245
Jay Srinivasanf0572052012-10-23 18:12:56 -0700246 // Sends UMA statistics for the given error code.
Jay Srinivasanedce2832012-10-24 18:57:47 -0700247 void SendUmaStat(ActionExitCode code);
Jay Srinivasanf0572052012-10-23 18:12:56 -0700248
Darin Petkov73058b42010-10-06 16:32:19 -0700249 // Update Engine preference store.
250 PrefsInterface* prefs_;
251
Jay Srinivasanf0572052012-10-23 18:12:56 -0700252 // Global context of the system.
253 SystemState* system_state_;
254
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700255 // Install Plan based on Omaha Response.
256 InstallPlan* install_plan_;
257
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700258 // File descriptor of open device.
259 int fd_;
Darin Petkovd7061ab2010-10-06 14:37:09 -0700260
Andrew de los Reyesf4c7ef12010-04-30 10:37:00 -0700261 // File descriptor of the kernel device
262 int kernel_fd_;
Darin Petkovd7061ab2010-10-06 14:37:09 -0700263
Andrew de los Reyesf4c7ef12010-04-30 10:37:00 -0700264 std::string path_; // Path that fd_ refers to.
265 std::string kernel_path_; // Path that kernel_fd_ refers to.
Darin Petkovd7061ab2010-10-06 14:37:09 -0700266
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700267 DeltaArchiveManifest manifest_;
268 bool manifest_valid_;
Darin Petkov437adc42010-10-07 13:12:24 -0700269 uint64_t manifest_metadata_size_;
Darin Petkovd7061ab2010-10-06 14:37:09 -0700270
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700271 // Index of the next operation to perform in the manifest.
Gilad Arnold8a86fa52013-01-15 12:35:05 -0800272 size_t next_operation_num_;
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700273
274 // buffer_ is a window of the data that's been downloaded. At first,
275 // it contains the beginning of the download, but after the protobuf
276 // has been downloaded and parsed, it contains a sliding window of
277 // data blobs.
278 std::vector<char> buffer_;
279 // Offset of buffer_ in the binary blobs section of the update.
280 uint64_t buffer_offset_;
Darin Petkovd7061ab2010-10-06 14:37:09 -0700281
Darin Petkov0406e402010-10-06 21:33:11 -0700282 // Last |buffer_offset_| value updated as part of the progress update.
283 uint64_t last_updated_buffer_offset_;
284
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700285 // The block size (parsed from the manifest).
286 uint32_t block_size_;
Darin Petkovd7061ab2010-10-06 14:37:09 -0700287
Darin Petkov437adc42010-10-07 13:12:24 -0700288 // Calculates the payload hash.
Darin Petkovd7061ab2010-10-06 14:37:09 -0700289 OmahaHashCalculator hash_calculator_;
290
Darin Petkov437adc42010-10-07 13:12:24 -0700291 // Saves the signed hash context.
292 std::string signed_hash_context_;
293
Darin Petkovd7061ab2010-10-06 14:37:09 -0700294 // Signatures message blob extracted directly from the payload.
295 std::vector<char> signatures_message_data_;
296
Jay Srinivasan51dcf262012-09-13 17:24:32 -0700297 // The public key to be used. Provided as a member so that tests can
298 // override with test keys.
299 std::string public_key_path_;
Darin Petkov698d0412010-10-13 10:59:44 -0700300
Gilad Arnold8a86fa52013-01-15 12:35:05 -0800301 // The number of bytes received so far, used for progress tracking.
302 size_t total_bytes_received_;
303
304 // The number rootfs and total operations in a payload, once we know them.
305 size_t num_rootfs_operations_;
306 size_t num_total_operations_;
307
308 // An overall progress counter, which should reflect both download progress
309 // and the ratio of applied operations. Range is 0-100.
310 unsigned overall_progress_;
311
312 // The last progress chunk recorded.
313 unsigned last_progress_chunk_;
314
315 // The timeout after which we should force emitting a progress log (constant),
316 // and the actual point in time for the next forced log to be emitted.
317 const base::TimeDelta forced_progress_log_wait_;
318 base::Time forced_progress_log_time_;
319
Andrew de los Reyes09e56d62010-04-23 13:45:53 -0700320 DISALLOW_COPY_AND_ASSIGN(DeltaPerformer);
321};
322
323} // namespace chromeos_update_engine
324
325#endif // CHROMEOS_PLATFORM_UPDATE_ENGINE_DELTA_PERFORMER_H__