1 //
2 // Copyright (C) 2012 The Android Open Source Project
3 //
4 // Licensed under the Apache License, Version 2.0 (the "License");
5 // you may not use this file except in compliance with the License.
6 // You may obtain a copy of the License at
7 //
8 //      http://www.apache.org/licenses/LICENSE-2.0
9 //
10 // Unless required by applicable law or agreed to in writing, software
11 // distributed under the License is distributed on an "AS IS" BASIS,
12 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 // See the License for the specific language governing permissions and
14 // limitations under the License.
15 //
16 
17 #ifndef UPDATE_ENGINE_UPDATE_ATTEMPTER_H_
18 #define UPDATE_ENGINE_UPDATE_ATTEMPTER_H_
19 
20 #include <time.h>
21 
22 #include <memory>
23 #include <set>
24 #include <string>
25 #include <utility>
26 #include <vector>
27 
28 #include <base/bind.h>
29 #include <base/guid.h>
30 #include <base/time/time.h>
31 #include <gtest/gtest_prod.h>  // for FRIEND_TEST
32 
33 #if USE_CHROME_NETWORK_PROXY
34 #include "update_engine/chrome_browser_proxy_resolver.h"
35 #endif  // USE_CHROME_NETWORK_PROXY
36 #include "update_engine/certificate_checker.h"
37 #include "update_engine/client_library/include/update_engine/update_status.h"
38 #include "update_engine/common/action_processor.h"
39 #include "update_engine/common/cpu_limiter.h"
40 #include "update_engine/common/excluder_interface.h"
41 #include "update_engine/common/proxy_resolver.h"
42 #include "update_engine/omaha_request_builder_xml.h"
43 #include "update_engine/omaha_request_params.h"
44 #include "update_engine/omaha_response_handler_action.h"
45 #include "update_engine/payload_consumer/download_action.h"
46 #include "update_engine/payload_consumer/postinstall_runner_action.h"
47 #include "update_engine/service_observer_interface.h"
48 #include "update_engine/system_state.h"
49 #include "update_engine/update_manager/policy.h"
50 #include "update_engine/update_manager/staging_utils.h"
51 #include "update_engine/update_manager/update_manager.h"
52 
53 namespace policy {
54 class PolicyProvider;
55 }
56 
57 namespace chromeos_update_engine {
58 
59 class UpdateAttempter : public ActionProcessorDelegate,
60                         public DownloadActionDelegate,
61                         public CertificateChecker::Observer,
62                         public PostinstallRunnerAction::DelegateInterface {
63  public:
64   using UpdateStatus = update_engine::UpdateStatus;
65   using UpdateAttemptFlags = update_engine::UpdateAttemptFlags;
66   static const int kMaxDeltaUpdateFailures;
67 
68   UpdateAttempter(SystemState* system_state, CertificateChecker* cert_checker);
69   ~UpdateAttempter() override;
70 
71   // Further initialization to be done post construction.
72   void Init();
73 
74   // Initiates scheduling of update checks.
75   // Returns true if update check is scheduled.
76   virtual bool ScheduleUpdates();
77 
78   // Checks for update and, if a newer version is available, attempts to update
79   // the system. Non-empty |in_app_version| or |in_update_url| prevents
80   // automatic detection of the parameter.  |target_channel| denotes a
81   // policy-mandated channel we are updating to, if not empty. If |obey_proxies|
82   // is true, the update will likely respect Chrome's proxy setting. For
83   // security reasons, we may still not honor them. |interactive| should be true
84   // if this was called from the user (ie dbus).
85   virtual void Update(const std::string& app_version,
86                       const std::string& omaha_url,
87                       const std::string& target_channel,
88                       const std::string& target_version_prefix,
89                       bool rollback_allowed,
90                       bool rollback_data_save_requested,
91                       int rollback_allowed_milestones,
92                       bool obey_proxies,
93                       bool interactive);
94 
95   // ActionProcessorDelegate methods:
96   void ProcessingDone(const ActionProcessor* processor,
97                       ErrorCode code) override;
98   void ProcessingStopped(const ActionProcessor* processor) override;
99   void ActionCompleted(ActionProcessor* processor,
100                        AbstractAction* action,
101                        ErrorCode code) override;
102 
103   // PostinstallRunnerAction::DelegateInterface
104   void ProgressUpdate(double progress) override;
105 
106   // Resets the current state to UPDATE_STATUS_IDLE.
107   // Used by update_engine_client for restarting a new update without
108   // having to reboot once the previous update has reached
109   // UPDATE_STATUS_UPDATED_NEED_REBOOT state. This is used only
110   // for testing purposes.
111   virtual bool ResetStatus();
112 
113   // Returns the current status in the out param. Returns true on success.
114   virtual bool GetStatus(update_engine::UpdateEngineStatus* out_status);
115 
status()116   UpdateStatus status() const { return status_; }
117 
http_response_code()118   int http_response_code() const { return http_response_code_; }
set_http_response_code(int code)119   void set_http_response_code(int code) { http_response_code_ = code; }
120 
121   // Set flags that influence how updates and checks are performed.  These
122   // influence all future checks and updates until changed or the device
123   // reboots.
SetUpdateAttemptFlags(UpdateAttemptFlags flags)124   void SetUpdateAttemptFlags(UpdateAttemptFlags flags) {
125     update_attempt_flags_ = flags;
126   }
127 
128   // Returns the update attempt flags that are in place for the current update
129   // attempt.  These are cached at the start of an update attempt so that they
130   // remain constant throughout the process.
GetCurrentUpdateAttemptFlags()131   virtual UpdateAttemptFlags GetCurrentUpdateAttemptFlags() const {
132     return current_update_attempt_flags_;
133   }
134 
135   // This is the internal entry point for going through an
136   // update. If the current status is idle invokes Update.
137   // This is called by the DBus implementation.
138   // This returns true if an update check was started, false if a check or an
139   // update was already in progress.
140   virtual bool CheckForUpdate(const std::string& app_version,
141                               const std::string& omaha_url,
142                               UpdateAttemptFlags flags);
143 
144   // This is the version of CheckForUpdate called by AttemptInstall API.
145   virtual bool CheckForInstall(const std::vector<std::string>& dlc_ids,
146                                const std::string& omaha_url);
147 
148   // This is the internal entry point for going through a rollback. This will
149   // attempt to run the postinstall on the non-active partition and set it as
150   // the partition to boot from. If |powerwash| is True, perform a powerwash
151   // as part of rollback. Returns True on success.
152   bool Rollback(bool powerwash);
153 
154   // This is the internal entry point for checking if we can rollback.
155   bool CanRollback() const;
156 
157   // This is the internal entry point for getting a rollback partition name,
158   // if one exists. It returns the bootable rollback kernel device partition
159   // name or empty string if none is available.
160   BootControlInterface::Slot GetRollbackSlot() const;
161 
162   // Initiates a reboot if the current state is
163   // UPDATED_NEED_REBOOT. Returns true on success, false otherwise.
164   bool RebootIfNeeded();
165 
166   // Sets the DLC as active or inactive. See common_service.h
167   virtual bool SetDlcActiveValue(bool is_active, const std::string& dlc_id);
168 
169   // DownloadActionDelegate methods:
170   void BytesReceived(uint64_t bytes_progressed,
171                      uint64_t bytes_received,
172                      uint64_t total) override;
173 
174   // Returns that the update should be canceled when the download channel was
175   // changed.
176   bool ShouldCancel(ErrorCode* cancel_reason) override;
177 
178   void DownloadComplete() override;
179 
180   // Broadcasts the current status to all observers.
181   void BroadcastStatus();
182 
GetAttemptErrorCode()183   ErrorCode GetAttemptErrorCode() const { return attempt_error_code_; }
184 
185   // Called at update_engine startup to do various house-keeping.
186   void UpdateEngineStarted();
187 
188   // Returns the |Excluder| that is currently held onto.
GetExcluder()189   virtual ExcluderInterface* GetExcluder() const { return excluder_.get(); }
190 
191   // Reloads the device policy from libbrillo. Note: This method doesn't
192   // cause a real-time policy fetch from the policy server. It just reloads the
193   // latest value that libbrillo has cached. libbrillo fetches the policies
194   // from the server asynchronously at its own frequency.
195   virtual void RefreshDevicePolicy();
196 
197   // Stores in |out_boot_time| the boottime (CLOCK_BOOTTIME) recorded at the
198   // time of the last successful update in the current boot. Returns false if
199   // there wasn't a successful update in the current boot.
200   virtual bool GetBootTimeAtUpdate(base::Time* out_boot_time);
201 
202   // Returns a version OS version that was being used before the last reboot,
203   // and if that reboot happened to be into an update (current version).
204   // This will return an empty string otherwise.
GetPrevVersion()205   const std::string& GetPrevVersion() const { return prev_version_; }
206 
207   // Returns the number of consecutive failed update checks.
consecutive_failed_update_checks()208   virtual unsigned int consecutive_failed_update_checks() const {
209     return consecutive_failed_update_checks_;
210   }
211 
212   // Returns the poll interval dictated by Omaha, if provided; zero otherwise.
server_dictated_poll_interval()213   virtual unsigned int server_dictated_poll_interval() const {
214     return server_dictated_poll_interval_;
215   }
216 
217   // Sets a callback to be used when either a forced update request is received
218   // (first argument set to true) or cleared by an update attempt (first
219   // argument set to false). The callback further encodes whether the forced
220   // check is an interactive one (second argument set to true). Takes ownership
221   // of the callback object. A null value disables callback on these events.
222   // Note that only one callback can be set, so effectively at most one client
223   // can be notified.
set_forced_update_pending_callback(base::Callback<void (bool,bool)> * callback)224   virtual void set_forced_update_pending_callback(
225       base::Callback<void(bool, bool)>* callback) {
226     forced_update_pending_callback_.reset(callback);
227   }
228 
229   // Returns true if we should allow updates from any source. In official builds
230   // we want to restrict updates to known safe sources, but under certain
231   // conditions it's useful to allow updating from anywhere (e.g. to allow
232   // 'cros flash' to function properly).
233   bool IsAnyUpdateSourceAllowed() const;
234 
235   // Add and remove a service observer.
AddObserver(ServiceObserverInterface * observer)236   void AddObserver(ServiceObserverInterface* observer) {
237     service_observers_.insert(observer);
238   }
RemoveObserver(ServiceObserverInterface * observer)239   void RemoveObserver(ServiceObserverInterface* observer) {
240     service_observers_.erase(observer);
241   }
242 
service_observers()243   const std::set<ServiceObserverInterface*>& service_observers() {
244     return service_observers_;
245   }
246 
247   // Remove all the observers.
ClearObservers()248   void ClearObservers() { service_observers_.clear(); }
249 
250  private:
251   // Friend declarations for testing purposes.
252   friend class UpdateAttempterUnderTest;
253   friend class UpdateAttempterTest;
254   FRIEND_TEST(UpdateAttempterTest, ActionCompletedDownloadTest);
255   FRIEND_TEST(UpdateAttempterTest, ActionCompletedErrorTest);
256   FRIEND_TEST(UpdateAttempterTest, ActionCompletedOmahaRequestTest);
257   FRIEND_TEST(UpdateAttempterTest, BootTimeInUpdateMarkerFile);
258   FRIEND_TEST(UpdateAttempterTest, BroadcastCompleteDownloadTest);
259   FRIEND_TEST(UpdateAttempterTest, CalculateDlcParamsInstallTest);
260   FRIEND_TEST(UpdateAttempterTest, CalculateDlcParamsNoPrefFilesTest);
261   FRIEND_TEST(UpdateAttempterTest, CalculateDlcParamsNonParseableValuesTest);
262   FRIEND_TEST(UpdateAttempterTest, CalculateDlcParamsValidValuesTest);
263   FRIEND_TEST(UpdateAttempterTest, CalculateDlcParamsRemoveStaleMetadata);
264   FRIEND_TEST(UpdateAttempterTest, ChangeToDownloadingOnReceivedBytesTest);
265   FRIEND_TEST(UpdateAttempterTest, CheckForInstallNotIdleFails);
266   FRIEND_TEST(UpdateAttempterTest, CheckForUpdateAUDlcTest);
267   FRIEND_TEST(UpdateAttempterTest, CreatePendingErrorEventTest);
268   FRIEND_TEST(UpdateAttempterTest, CreatePendingErrorEventResumedTest);
269   FRIEND_TEST(UpdateAttempterTest, DisableDeltaUpdateIfNeededTest);
270   FRIEND_TEST(UpdateAttempterTest, DownloadProgressAccumulationTest);
271   FRIEND_TEST(UpdateAttempterTest, InstallSetsStatusIdle);
272   FRIEND_TEST(UpdateAttempterTest, IsEnterpriseRollbackInGetStatusTrue);
273   FRIEND_TEST(UpdateAttempterTest, IsEnterpriseRollbackInGetStatusFalse);
274   FRIEND_TEST(UpdateAttempterTest,
275               PowerwashInGetStatusTrueBecausePowerwashRequired);
276   FRIEND_TEST(UpdateAttempterTest, PowerwashInGetStatusTrueBecauseRollback);
277   FRIEND_TEST(UpdateAttempterTest, MarkDeltaUpdateFailureTest);
278   FRIEND_TEST(UpdateAttempterTest, PingOmahaTest);
279   FRIEND_TEST(UpdateAttempterTest, ProcessingDoneInstallError);
280   FRIEND_TEST(UpdateAttempterTest, ProcessingDoneUpdateError);
281   FRIEND_TEST(UpdateAttempterTest, ReportDailyMetrics);
282   FRIEND_TEST(UpdateAttempterTest, RollbackNotAllowed);
283   FRIEND_TEST(UpdateAttempterTest, RollbackAfterInstall);
284   FRIEND_TEST(UpdateAttempterTest, RollbackAllowed);
285   FRIEND_TEST(UpdateAttempterTest, RollbackAllowedSetAndReset);
286   FRIEND_TEST(UpdateAttempterTest, RollbackMetricsNotRollbackFailure);
287   FRIEND_TEST(UpdateAttempterTest, RollbackMetricsNotRollbackSuccess);
288   FRIEND_TEST(UpdateAttempterTest, RollbackMetricsRollbackFailure);
289   FRIEND_TEST(UpdateAttempterTest, RollbackMetricsRollbackSuccess);
290   FRIEND_TEST(UpdateAttempterTest, ScheduleErrorEventActionNoEventTest);
291   FRIEND_TEST(UpdateAttempterTest, ScheduleErrorEventActionTest);
292   FRIEND_TEST(UpdateAttempterTest, SessionIdTestEnforceEmptyStrPingOmaha);
293   FRIEND_TEST(UpdateAttempterTest, SessionIdTestOnOmahaRequestActions);
294   FRIEND_TEST(UpdateAttempterTest, SetRollbackHappenedNotRollback);
295   FRIEND_TEST(UpdateAttempterTest, SetRollbackHappenedRollback);
296   FRIEND_TEST(UpdateAttempterTest, TargetVersionPrefixSetAndReset);
297   FRIEND_TEST(UpdateAttempterTest, UpdateAfterInstall);
298   FRIEND_TEST(UpdateAttempterTest, UpdateAttemptFlagsCachedAtUpdateStart);
299   FRIEND_TEST(UpdateAttempterTest, UpdateDeferredByPolicyTest);
300   FRIEND_TEST(UpdateAttempterTest, UpdateIsNotRunningWhenUpdateAvailable);
301   FRIEND_TEST(UpdateAttempterTest, GetSuccessfulDlcIds);
302 
303   // Returns the special flags to be added to ErrorCode values based on the
304   // parameters used in the current update attempt.
305   uint32_t GetErrorCodeFlags();
306 
307   // ActionProcessorDelegate methods |ProcessingDone()| internal helpers.
308   void ProcessingDoneInternal(const ActionProcessor* processor, ErrorCode code);
309   void ProcessingDoneUpdate(const ActionProcessor* processor, ErrorCode code);
310   void ProcessingDoneInstall(const ActionProcessor* processor, ErrorCode code);
311 
312   // CertificateChecker::Observer method.
313   // Report metrics about the certificate being checked.
314   void CertificateChecked(ServerToCheck server_to_check,
315                           CertificateCheckResult result) override;
316 
317   // Checks if it's more than 24 hours since daily metrics were last
318   // reported and, if so, reports daily metrics. Returns |true| if
319   // metrics were reported, |false| otherwise.
320   bool CheckAndReportDailyMetrics();
321 
322   // Calculates and reports the age of the currently running OS. This
323   // is defined as the age of the /etc/lsb-release file.
324   void ReportOSAge();
325 
326   // Sets the status to the given status and notifies a status update over dbus.
327   void SetStatusAndNotify(UpdateStatus status);
328 
329   // Creates an error event object in |error_event_| to be included in an
330   // OmahaRequestAction once the current action processor is done.
331   void CreatePendingErrorEvent(AbstractAction* action, ErrorCode code);
332 
333   // If there's a pending error event allocated in |error_event_|, schedules an
334   // OmahaRequestAction with that event in the current processor, clears the
335   // pending event, updates the status and returns true. Returns false
336   // otherwise.
337   bool ScheduleErrorEventAction();
338 
339   // Schedules an event loop callback to start the action processor. This is
340   // scheduled asynchronously to unblock the event loop.
341   void ScheduleProcessingStart();
342 
343   // Checks if a full update is needed and forces it by updating the Omaha
344   // request params.
345   void DisableDeltaUpdateIfNeeded();
346 
347   // If this was a delta update attempt that failed, count it so that a full
348   // update can be tried when needed.
349   void MarkDeltaUpdateFailure();
350 
GetProxyResolver()351   ProxyResolver* GetProxyResolver() {
352 #if USE_CHROME_NETWORK_PROXY
353     if (obeying_proxies_)
354       return &chrome_proxy_resolver_;
355 #endif  // USE_CHROME_NETWORK_PROXY
356     return &direct_proxy_resolver_;
357   }
358 
359   // Sends a ping to Omaha.
360   // This is used after an update has been applied and we're waiting for the
361   // user to reboot.  This ping helps keep the number of actives count
362   // accurate in case a user takes a long time to reboot the device after an
363   // update has been applied.
364   void PingOmaha();
365 
366   // Helper method of Update() to calculate the update-related parameters
367   // from various sources and set the appropriate state. Please refer to
368   // Update() method for the meaning of the parameters.
369   bool CalculateUpdateParams(const std::string& app_version,
370                              const std::string& omaha_url,
371                              const std::string& target_channel,
372                              const std::string& target_version_prefix,
373                              bool rollback_allowed,
374                              bool rollback_data_save_requested,
375                              int rollback_allowed_milestones,
376                              bool obey_proxies,
377                              bool interactive);
378 
379   // Calculates all the scattering related parameters (such as waiting period,
380   // which type of scattering is enabled, etc.) and also updates/deletes
381   // the corresponding prefs file used in scattering. Should be called
382   // only after the device policy has been loaded and set in the system_state_.
383   void CalculateScatteringParams(bool interactive);
384 
385   // Sets a random value for the waiting period to wait for before downloading
386   // an update, if one available. This value will be upperbounded by the
387   // scatter factor value specified from policy.
388   void GenerateNewWaitingPeriod();
389 
390   // Helper method of Update() to construct the sequence of actions to
391   // be performed for an update check. Please refer to
392   // Update() method for the meaning of the parameters.
393   void BuildUpdateActions(bool interactive);
394 
395   // Decrements the count in the kUpdateCheckCountFilePath.
396   // Returns True if successfully decremented, false otherwise.
397   bool DecrementUpdateCheckCount();
398 
399   // Starts p2p and performs housekeeping. Returns true only if p2p is
400   // running and housekeeping was done.
401   bool StartP2PAndPerformHousekeeping();
402 
403   // Calculates whether peer-to-peer should be used. Sets the
404   // |use_p2p_to_download_| and |use_p2p_to_share_| parameters
405   // on the |omaha_request_params_| object.
406   void CalculateP2PParams(bool interactive);
407 
408   // Starts P2P if it's enabled and there are files to actually share.
409   // Called only at program startup. Returns true only if p2p was
410   // started and housekeeping was performed.
411   bool StartP2PAtStartup();
412 
413   // Writes to the processing completed marker. Does nothing if
414   // |update_completed_marker_| is empty.
415   void WriteUpdateCompletedMarker();
416 
417   // Reboots the system directly by calling /sbin/shutdown. Returns true on
418   // success.
419   bool RebootDirectly();
420 
421   // Callback for the async UpdateCheckAllowed policy request. If |status| is
422   // |EvalStatus::kSucceeded|, either runs or suppresses periodic update checks,
423   // based on the content of |params|. Otherwise, retries the policy request.
424   void OnUpdateScheduled(
425       chromeos_update_manager::EvalStatus status,
426       const chromeos_update_manager::UpdateCheckParams& params);
427 
428   // Updates the time an update was last attempted to the current time.
429   void UpdateLastCheckedTime();
430 
431   // Checks whether we need to clear the rollback-happened preference after
432   // policy is available again.
433   void UpdateRollbackHappened();
434 
435   // Returns if an update is: running, applied and needs reboot, or scheduled.
436   bool IsBusyOrUpdateScheduled();
437 
438   void CalculateStagingParams(bool interactive);
439 
440   // Reports a metric that tracks the time from when the update was first seen
441   // to the time when the update was finally downloaded and applied. This metric
442   // will only be reported for enterprise enrolled devices.
443   void ReportTimeToUpdateAppliedMetric();
444 
445   // Resets interactivity and forced update flags.
446   void ResetInteractivityFlags();
447 
448   // Resets all the DLC prefs.
449   bool ResetDlcPrefs(const std::string& dlc_id);
450 
451   // Get the integer values from the DLC metadata for |kPrefsPingLastActive|
452   // or |kPrefsPingLastRollcall|.
453   // The value is equal to -2 when the value cannot be read or is not numeric.
454   // The value is equal to -1 the first time it is being sent, which is
455   // when the metadata file doesn't exist.
456   int64_t GetPingMetadata(const std::string& metadata_key) const;
457 
458   // Calculates the update parameters for DLCs. Sets the |dlc_ids_|
459   // parameter on the |omaha_request_params_| object.
460   void CalculateDlcParams();
461 
462   // Returns the list of DLC IDs that were installed/updated, excluding the ones
463   // which had "noupdate" in the Omaha response.
464   std::vector<std::string> GetSuccessfulDlcIds();
465 
466   // Last status notification timestamp used for throttling. Use monotonic
467   // TimeTicks to ensure that notifications are sent even if the system clock is
468   // set back in the middle of an update.
469   base::TimeTicks last_notify_time_;
470 
471   // Our two proxy resolvers
472   DirectProxyResolver direct_proxy_resolver_;
473 #if USE_CHROME_NETWORK_PROXY
474   ChromeBrowserProxyResolver chrome_proxy_resolver_;
475 #endif  // USE_CHROME_NETWORK_PROXY
476 
477   std::unique_ptr<ActionProcessor> processor_;
478 
479   // External state of the system outside the update_engine process
480   // carved out separately to mock out easily in unit tests.
481   SystemState* system_state_;
482 
483   // Pointer to the certificate checker instance to use.
484   CertificateChecker* cert_checker_;
485 
486   // The list of services observing changes in the updater.
487   std::set<ServiceObserverInterface*> service_observers_;
488 
489   // The install plan.
490   std::unique_ptr<InstallPlan> install_plan_;
491 
492   // Pointer to the preferences store interface. This is just a cached
493   // copy of system_state->prefs() because it's used in many methods and
494   // is convenient this way.
495   PrefsInterface* prefs_ = nullptr;
496 
497   // Pending error event, if any.
498   std::unique_ptr<OmahaEvent> error_event_;
499 
500   // If we should request a reboot even tho we failed the update
501   bool fake_update_success_ = false;
502 
503   // HTTP server response code from the last HTTP request action.
504   int http_response_code_ = 0;
505 
506   // The attempt error code when the update attempt finished.
507   ErrorCode attempt_error_code_ = ErrorCode::kSuccess;
508 
509   // CPU limiter during the update.
510   CPULimiter cpu_limiter_;
511 
512   // For status:
513   UpdateStatus status_{UpdateStatus::IDLE};
514   double download_progress_ = 0.0;
515   int64_t last_checked_time_ = 0;
516   std::string prev_version_;
517   std::string new_version_ = "0.0.0.0";
518   uint64_t new_payload_size_ = 0;
519   // Flags influencing all periodic update checks
520   UpdateAttemptFlags update_attempt_flags_ = UpdateAttemptFlags::kNone;
521   // Flags influencing the currently in-progress check (cached at the start of
522   // the update check).
523   UpdateAttemptFlags current_update_attempt_flags_ = UpdateAttemptFlags::kNone;
524 
525   // Common parameters for all Omaha requests.
526   OmahaRequestParams* omaha_request_params_ = nullptr;
527 
528   // Number of consecutive manual update checks we've had where we obeyed
529   // Chrome's proxy settings.
530   int proxy_manual_checks_ = 0;
531 
532   // If true, this update cycle we are obeying proxies
533   bool obeying_proxies_ = true;
534 
535   // Used for fetching information about the device policy.
536   std::unique_ptr<policy::PolicyProvider> policy_provider_;
537 
538   // The current scatter factor as found in the policy setting.
539   base::TimeDelta scatter_factor_;
540 
541   // The number of consecutive failed update checks. Needed for calculating the
542   // next update check interval.
543   unsigned int consecutive_failed_update_checks_ = 0;
544 
545   // The poll interval (in seconds) that was dictated by Omaha, if any; zero
546   // otherwise. This is needed for calculating the update check interval.
547   unsigned int server_dictated_poll_interval_ = 0;
548 
549   // Tracks whether we have scheduled update checks.
550   bool waiting_for_scheduled_check_ = false;
551 
552   // A callback to use when a forced update request is either received (true) or
553   // cleared by an update attempt (false). The second argument indicates whether
554   // this is an interactive update, and its value is significant iff the first
555   // argument is true.
556   std::unique_ptr<base::Callback<void(bool, bool)>>
557       forced_update_pending_callback_;
558 
559   // The |app_version| and |omaha_url| parameters received during the latest
560   // forced update request. They are retrieved for use once the update is
561   // actually scheduled.
562   std::string forced_app_version_;
563   std::string forced_omaha_url_;
564 
565   // A list of DLC module IDs.
566   std::vector<std::string> dlc_ids_;
567   // Whether the operation is install (write to the current slot not the
568   // inactive slot).
569   bool is_install_;
570 
571   // If this is not TimeDelta(), then that means staging is turned on.
572   base::TimeDelta staging_wait_time_;
573   chromeos_update_manager::StagingSchedule staging_schedule_;
574 
575   // This is the session ID used to track update flow to Omaha.
576   std::string session_id_;
577 
578   // Interface for excluder.
579   std::unique_ptr<ExcluderInterface> excluder_;
580 
581   DISALLOW_COPY_AND_ASSIGN(UpdateAttempter);
582 };
583 
584 // Turns a generic ErrorCode::kError to a generic error code specific
585 // to |action| (e.g., ErrorCode::kFilesystemVerifierError). If |code| is
586 // not ErrorCode::kError, or the action is not matched, returns |code|
587 // unchanged.
588 
589 ErrorCode GetErrorCodeForAction(AbstractAction* action, ErrorCode code);
590 
591 }  // namespace chromeos_update_engine
592 
593 #endif  // UPDATE_ENGINE_UPDATE_ATTEMPTER_H_
594