blob: 0713e06a84942190d8f4c762db3662f47d4dcc76 [file] [log] [blame]
//
// Copyright (C) 2014 The Android Open Source Project
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
#include "update_engine/common/system_state.h"
#include "update_engine/update_manager/default_policy.h"
using chromeos_update_engine::ErrorCode;
using chromeos_update_engine::InstallPlan;
using chromeos_update_engine::SystemState;
namespace {
// A fixed minimum interval between consecutive allowed update checks. This
// needs to be long enough to prevent busywork and/or DDoS attacks on Omaha, but
// at the same time short enough to allow the machine to update itself
// reasonably soon.
const int kCheckIntervalInSeconds = 15 * 60;
} // namespace
namespace chromeos_update_manager {
EvalStatus DefaultPolicy::UpdateCheckAllowed(EvaluationContext* ec,
State* state,
std::string* error,
UpdateCheckParams* result) const {
result->updates_enabled = true;
result->target_channel.clear();
result->lts_tag.clear();
result->target_version_prefix.clear();
result->rollback_allowed = false;
result->rollback_allowed_milestones = -1; // No version rolls should happen.
result->rollback_on_channel_downgrade = false;
result->interactive = false;
result->quick_fix_build_token.clear();
// Ensure that the minimum interval is set. If there's no clock, this defaults
// to always allowing the update.
if (!aux_state_->IsLastCheckAllowedTimeSet() ||
ec->IsMonotonicTimeGreaterThan(
aux_state_->last_check_allowed_time() +
base::TimeDelta::FromSeconds(kCheckIntervalInSeconds))) {
aux_state_->set_last_check_allowed_time(
SystemState::Get()->clock()->GetMonotonicTime());
return EvalStatus::kSucceeded;
}
return EvalStatus::kAskMeAgainLater;
}
EvalStatus DefaultPolicy::UpdateCanBeApplied(EvaluationContext* ec,
State* state,
std::string* error,
ErrorCode* result,
InstallPlan* install_plan) const {
*result = ErrorCode::kSuccess;
return EvalStatus::kSucceeded;
}
EvalStatus DefaultPolicy::UpdateCanStart(EvaluationContext* ec,
State* state,
std::string* error,
UpdateDownloadParams* result,
const UpdateState update_state) const {
result->update_can_start = true;
result->cannot_start_reason = UpdateCannotStartReason::kUndefined;
result->download_url_idx = 0;
result->download_url_allowed = true;
result->download_url_num_errors = 0;
result->p2p_downloading_allowed = false;
result->p2p_sharing_allowed = false;
result->do_increment_failures = false;
result->backoff_expiry = base::Time();
result->scatter_wait_period = base::TimeDelta();
result->scatter_check_threshold = 0;
return EvalStatus::kSucceeded;
}
EvalStatus DefaultPolicy::P2PEnabled(EvaluationContext* ec,
State* state,
std::string* error,
bool* result) const {
*result = false;
return EvalStatus::kSucceeded;
}
EvalStatus DefaultPolicy::P2PEnabledChanged(EvaluationContext* ec,
State* state,
std::string* error,
bool* result,
bool prev_result) const {
// This policy will always prohibit P2P, so this is signaling to the caller
// that the decision is final (because the current value is the same as the
// previous one) and there's no need to issue another call.
*result = false;
return EvalStatus::kSucceeded;
}
} // namespace chromeos_update_manager