blob: bce8bc24c8767263d7c80cded3abb6274b6bb113 [file] [log] [blame]
//
// Copyright (C) 2013 The Android Open Source Project
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
#ifndef UPDATE_ENGINE_CROS_HARDWARE_CHROMEOS_H_
#define UPDATE_ENGINE_CROS_HARDWARE_CHROMEOS_H_
#include <memory>
#include <optional>
#include <string>
#include <vector>
#include <base/time/time.h>
#include <debugd/dbus-proxies.h>
#include <gtest/gtest_prod.h> // for FRIEND_TEST
#include <libcrossystem/crossystem.h>
#include "update_engine/common/error_code.h"
#include "update_engine/common/hardware_interface.h"
namespace chromeos_update_engine {
// Implements the real interface with Chrome OS verified boot and recovery
// process.
class HardwareChromeOS final : public HardwareInterface {
public:
HardwareChromeOS();
HardwareChromeOS(const HardwareChromeOS&) = delete;
HardwareChromeOS& operator=(const HardwareChromeOS&) = delete;
~HardwareChromeOS() override = default;
void Init();
// HardwareInterface methods.
bool IsOfficialBuild() const override;
bool IsNormalBootMode() const override;
bool IsRunningFromMiniOs() const override;
bool AreDevFeaturesEnabled() const override;
bool IsOOBEEnabled() const override;
bool IsOOBEComplete(base::Time* out_time_of_oobe) const override;
std::string GetHardwareClass() const override;
std::string GetDeviceRequisition() const override;
std::unique_ptr<base::Value> ReadLocalState() const override;
bool IsEnrollmentRecoveryModeEnabled(
const base::Value* local_state) const override;
bool IsConsumerSegmentSet(const base::Value* local_state) const override;
int GetMinKernelKeyVersion() const override;
int GetMinFirmwareKeyVersion() const override;
int GetMaxFirmwareKeyRollforward() const override;
bool SetMaxFirmwareKeyRollforward(int firmware_max_rollforward) override;
bool SetMaxKernelKeyRollforward(int kernel_max_rollforward) override;
int GetPowerwashCount() const override;
std::optional<bool> IsPowerwashScheduledByUpdateEngine() const override;
// Must not be called prior to boot control initialization.
bool SchedulePowerwash(bool save_rollback_data) override;
bool CancelPowerwash() override;
bool GetNonVolatileDirectory(base::FilePath* path) const override;
bool GetRecoveryKeyVersion(std::string* version) override;
bool GetPowerwashSafeDirectory(base::FilePath* path) const override;
int64_t GetBuildTimestamp() const override;
bool AllowDowngrade() const override { return false; }
bool GetFirstActiveOmahaPingSent() const override;
bool SetFirstActiveOmahaPingSent() override;
std::string GetActivateDate() const override;
std::string GetFsiVersion() const override;
int GetActiveMiniOsPartition() const override;
bool SetActiveMiniOsPartition(int active_partition) override;
void SetWarmReset(bool warm_reset) override;
std::string GetVersionForLogging(
const std::string& partition_name) const override;
ErrorCode IsPartitionUpdateValid(
const std::string& partition_name,
const std::string& new_version) const override;
bool IsRootfsVerificationEnabled() const override;
void SetRootForTest(base::FilePath test_root) { root_ = test_root; }
void SetNonVolatileDirectoryForTest(const base::FilePath& path) {
non_volatile_path_ = path;
}
bool ResetFWTryNextSlot() override;
base::FilePath GetPowerwashMarkerFullPath() const override;
private:
friend class HardwareChromeOSTest;
FRIEND_TEST(HardwareChromeOSTest, GeneratePowerwashCommandCheck);
FRIEND_TEST(HardwareChromeOSTest,
GeneratePowerwashCommandWithRollbackDataCheck);
FRIEND_TEST(HardwareChromeOSFWTest,
ResetsFWTryNextSlotProperlyIfValidMainFwAct);
FRIEND_TEST(HardwareChromeOSTest, ResetFWTryNextSlotFailsIfInvalidMainFwAct);
FRIEND_TEST(HardwareChromeOSTest, ResetFWTryNextSlotFailsIfMissingMainFwAct);
FRIEND_TEST(HardwareChromeOSTest,
ResetFWTryNextSlotFailsIfSettingResultFlagFails);
FRIEND_TEST(HardwareChromeOSTest,
ResetFWTryNextSlotFailsIfSettingTryCountFails);
// Returns a currently active firmware slot.
// `kFWSlotA` or `kFWSlotB` most of the time, though can be "recovery" or
// "error".
std::optional<std::string> GetMainFWAct() const;
// Sets a RW firmware partition slot to try on next boot to
// |target_slot|.
// Expects only `kFWSlotA` or `kFWSlotB` as |target_slot|.
// Returns false on failure.
bool SetFWTryNextSlot(base::StringPiece target_slot);
// Marks current RW firmware boot result as success.
// Returns false on failure.
bool SetFWResultSuccessful();
// Sets a number of times to try a next boot RW partition slot to |count|.
// Returns false on failure.
bool SetFWTryCount(int count);
// Load the update manager config flags (is_oobe_enabled flag) from the
// appropriate location based on whether we are in a normal mode boot (as
// passed in |normal_mode|) prefixing the paths with |root_prefix|.
void LoadConfig(const std::string& root_prefix, bool normal_mode);
std::string GeneratePowerwashCommand(bool save_rollback_data) const;
bool is_oobe_enabled_;
std::string recovery_key_version_;
base::FilePath root_;
base::FilePath non_volatile_path_;
std::unique_ptr<org::chromium::debugdProxyInterface> debugd_proxy_;
std::unique_ptr<crossystem::Crossystem> crossystem_;
};
} // namespace chromeos_update_engine
#endif // UPDATE_ENGINE_CROS_HARDWARE_CHROMEOS_H_