Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(176)

Unified Diff: chrome/browser/upgrade_detector_impl.cc

Issue 11440020: Add an outdated upgrade bubble view. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Some more self-CR cleanups Created 7 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: chrome/browser/upgrade_detector_impl.cc
diff --git a/chrome/browser/upgrade_detector_impl.cc b/chrome/browser/upgrade_detector_impl.cc
index 570275e391ba59c8452c3de6d6861f7f4ead8e04..6cd508afc482e70b0bf6f6c246c130be31fe68f3 100644
--- a/chrome/browser/upgrade_detector_impl.cc
+++ b/chrome/browser/upgrade_detector_impl.cc
@@ -7,28 +7,33 @@
#include <string>
#include "base/bind.h"
+#include "base/build_time.h"
#include "base/command_line.h"
#include "base/file_path.h"
#include "base/memory/scoped_ptr.h"
#include "base/memory/singleton.h"
+#include "base/metrics/field_trial.h"
#include "base/path_service.h"
#include "base/string_number_conversions.h"
#include "base/string_util.h"
#include "base/time.h"
#include "base/utf_string_conversions.h"
+#include "base/version.h"
+#include "chrome/browser/browser_process.h"
#include "chrome/common/chrome_switches.h"
#include "chrome/common/chrome_version_info.h"
-#include "chrome/installer/util/browser_distribution.h"
#include "content/public/browser/browser_thread.h"
#include "ui/base/resource/resource_bundle.h"
#if defined(OS_WIN)
+#include "chrome/installer/util/browser_distribution.h"
+#include "chrome/installer/util/google_update_settings.h"
+#include "chrome/installer/util/helper.h"
#include "chrome/installer/util/install_util.h"
#elif defined(OS_MACOSX)
#include "chrome/browser/mac/keystone_glue.h"
#elif defined(OS_POSIX)
#include "base/process_util.h"
-#include "base/version.h"
#endif
using content::BrowserThread;
@@ -46,6 +51,13 @@ const int kNotifyCycleTimeMs = 20 * 60 * 1000; // 20 minutes.
// Same as kNotifyCycleTimeMs but only used during testing.
const int kNotifyCycleTimeForTestingMs = 500; // Half a second.
+// The number of days after which we identify a build/install as outdated.
+const uint64 kOutdatedBuildAgeInDays = 12 * 7;
+
+// Finch Experiment strings to identify if we should check for outdated install.
+const char kOutdatedInstallCheckTrialName[] = "OutdatedInstallCheck";
+const char kOutdatedInstallCheck12WeeksGroupName[] = "12WeeksOutdatedIntalls";
+
std::string CmdLineInterval() {
const CommandLine& cmd_line = *CommandLine::ForCurrentProcess();
return cmd_line.GetSwitchValueASCII(switches::kCheckForUpdateIntervalSec);
@@ -54,7 +66,9 @@ std::string CmdLineInterval() {
bool IsTesting() {
const CommandLine& cmd_line = *CommandLine::ForCurrentProcess();
return cmd_line.HasSwitch(switches::kSimulateUpgrade) ||
- cmd_line.HasSwitch(switches::kCheckForUpdateIntervalSec);
+ cmd_line.HasSwitch(switches::kCheckForUpdateIntervalSec) ||
+ cmd_line.HasSwitch(switches::kSimulateCriticalUpdate) ||
+ cmd_line.HasSwitch(switches::kSimulateOutdated);
}
// How often to check for an upgrade.
@@ -68,12 +82,120 @@ int GetCheckForUpgradeEveryMs() {
return kCheckForUpgradeMs;
}
+#if defined(OS_WIN)
+bool IsSystemInstall() {
+ FilePath exe_path;
+ if (!PathService::Get(base::DIR_EXE, &exe_path)) {
+ NOTREACHED() << "Failed to find executable path";
+ return false;
+ }
+
+ return !InstallUtil::IsPerUserInstall(exe_path.value().c_str());
+}
+
+// This task checks the update policy and calls back the task only if automatic
+// updates are allowed.
+void DetectUpdatability(bool* is_auto_update_allowed) {
+ DCHECK(BrowserThread::CurrentlyOn(BrowserThread::FILE));
+
+ string16 app_guid = installer::GetAppGuidForUpdates(IsSystemInstall());
+ DCHECK(!app_guid.empty());
+ *is_auto_update_allowed = GoogleUpdateSettings::AUTOMATIC_UPDATES ==
+ GoogleUpdateSettings::GetAppUpdatePolicy(app_guid, NULL);
+}
+#endif // defined(OS_WIN)
+
+} // namespace
+
+UpgradeDetectorImpl::UpgradeDetectorImpl()
+ : ALLOW_THIS_IN_INITIALIZER_LIST(weak_factory_(this)),
+ is_unstable_channel_(false),
+ is_outdated_reinstall_allowed_(false),
+ build_date_(base::GetBuildTime()) {
+ CommandLine command_line(*CommandLine::ForCurrentProcess());
+ // The different command line switches that affect testing can't be used
+ // simultaneously, if they do, here's the precedence order, based on the order
+ // of the if statements below:
+ // - kDisableBackgroundNetworking prevents any of the other tests to work.
Finnur 2013/02/01 17:09:15 nit: You prevent something _from_ working, but you
MAD 2013/02/02 03:55:34 Done.
+ // - kSimulateUpgrade will not test critical or outdated upgrade tests.
+ // - kSimulateCriticalUpdate has precedence over kSimulateOutdated.
+ // - kSimulateOutdated can work on it's own, or with a specified date.
+ if (command_line.HasSwitch(switches::kDisableBackgroundNetworking))
+ return;
+ if (command_line.HasSwitch(switches::kSimulateUpgrade)) {
+ UpgradeDetected(false, is_unstable_channel_);
+ return;
+ }
+ if (command_line.HasSwitch(switches::kSimulateCriticalUpdate)) {
+ UpgradeDetected(true, is_unstable_channel_);
+ return;
+ }
+ if (command_line.HasSwitch(switches::kSimulateOutdated)) {
+ // The outdated simulation can work without a value, which means outdated
+ // now, or with a value that must be a well formed date/time string that
+ // overrides the build date.
+ is_outdated_reinstall_allowed_ = true;
+ std::string build_date = command_line.GetSwitchValueASCII(
+ switches::kSimulateOutdated);
+ base::Time maybe_build_time;
+ bool result = base::Time::FromString(build_date.c_str(), &maybe_build_time);
+ if (result && !maybe_build_time.is_null()) {
+ // We got a valid build date simulation so use it and check for upgrades.
+ build_date_ = maybe_build_time;
+ detect_upgrade_timer_.Start(FROM_HERE,
+ base::TimeDelta::FromMilliseconds(GetCheckForUpgradeEveryMs()),
+ this, &UpgradeDetectorImpl::CheckForUpgrade);
+ } else {
+ // Without a valid date, we simulate that we are already outdated...
+ upgrade_required_ = UPGRADE_REQUIRED_OUTDATED;
+ UpgradeDetected(false, is_unstable_channel_);
+ }
+ return;
+ }
+ // Windows: only enable upgrade notifications for official builds.
+ // Mac: only enable them if the updater (Keystone) is present.
+ // Linux (and other POSIX): always enable regardless of branding.
+#if (defined(OS_WIN) && defined(GOOGLE_CHROME_BUILD)) || defined(OS_POSIX)
+#if defined(OS_MACOSX)
+ is_outdated_reinstall_allowed_ = keystone_glue::KeystoneEnabled();
+ if (is_outdated_reinstall_allowed_)
+#endif
+ {
+ detect_upgrade_timer_.Start(FROM_HERE,
+ base::TimeDelta::FromMilliseconds(GetCheckForUpgradeEveryMs()),
+ this, &UpgradeDetectorImpl::CheckForUpgrade);
+ }
+#endif
+
+ // Only enable the outdated install check if we are running the trial for it.
+ if (base::FieldTrialList::FindFullName(kOutdatedInstallCheckTrialName) !=
+ kOutdatedInstallCheck12WeeksGroupName) {
+ is_outdated_reinstall_allowed_ = false;
+ return;
+ }
+
+// On Windows, there might be a policy preventing updates, so validate
+// updatability, and then set |is_outdated_reinstall_allowed_| appropriately.
+#if defined(OS_WIN) && defined(GOOGLE_CHROME_BUILD)
+ BrowserThread::PostTask(BrowserThread::FILE, FROM_HERE,
+ base::Bind(&DetectUpdatability,
Finnur 2013/02/01 17:09:15 I believe we have a race condition here for the Wi
MAD 2013/02/02 03:55:34 OK, I agree that things need to be cleaned up, but
+ &is_outdated_reinstall_allowed_));
+#elif defined(OS_POSIX) && !(defined(OS_MACOSX) || defined(OS_CHROME))
+ // All other POSIX devices are always allowed, except OS_MACOSX which sets it
+ // above, and Chrome OS which doesn't support the reinstall bubble.
+ is_outdated_reinstall_allowed_ = true;
+#endif
+}
+
+UpgradeDetectorImpl::~UpgradeDetectorImpl() {
+}
+
+// Static
// This task checks the currently running version of Chrome against the
-// installed version. If the installed version is newer, it runs the passed
-// callback task. Otherwise it just deletes the task.
-void DetectUpgradeTask(const base::Closure& upgrade_detected_task,
- bool* is_unstable_channel,
- bool* is_critical_upgrade) {
+// installed version. If the installed version is newer, it calls back
+// UpgradeDetectorImpl::UpgradeDetected.
+void UpgradeDetectorImpl::DetectUpgradeTask(
+ base::WeakPtr<UpgradeDetectorImpl> upgrade_detector) {
DCHECK(BrowserThread::CurrentlyOn(BrowserThread::FILE));
Version installed_version;
@@ -83,14 +205,7 @@ void DetectUpgradeTask(const base::Closure& upgrade_detected_task,
// Get the version of the currently *installed* instance of Chrome,
// which might be newer than the *running* instance if we have been
// upgraded in the background.
- FilePath exe_path;
- if (!PathService::Get(base::DIR_EXE, &exe_path)) {
- NOTREACHED() << "Failed to find executable path";
- return;
- }
-
- bool system_install =
- !InstallUtil::IsPerUserInstall(exe_path.value().c_str());
+ bool system_install = IsSystemInstall();
// TODO(tommi): Check if using the default distribution is always the right
// thing to do.
@@ -118,8 +233,8 @@ void DetectUpgradeTask(const base::Closure& upgrade_detected_task,
#endif
chrome::VersionInfo::Channel channel = chrome::VersionInfo::GetChannel();
- *is_unstable_channel = channel == chrome::VersionInfo::CHANNEL_DEV ||
- channel == chrome::VersionInfo::CHANNEL_CANARY;
+ bool is_unstable_channel = channel == chrome::VersionInfo::CHANNEL_DEV ||
+ channel == chrome::VersionInfo::CHANNEL_CANARY;
// Get the version of the currently *running* instance of Chrome.
chrome::VersionInfo version_info;
@@ -140,64 +255,71 @@ void DetectUpgradeTask(const base::Closure& upgrade_detected_task,
(installed_version.CompareTo(running_version) > 0)) {
// If a more recent version is available, it might be that we are lacking
// a critical update, such as a zero-day fix.
- *is_critical_upgrade =
- critical_update.IsValid() &&
- (critical_update.CompareTo(running_version) > 0);
+ bool critical = critical_update.IsValid() &&
+ critical_update.CompareTo(running_version) > 0;
// Fire off the upgrade detected task.
BrowserThread::PostTask(BrowserThread::UI, FROM_HERE,
- upgrade_detected_task);
+ base::Bind(&UpgradeDetectorImpl::UpgradeDetected,
+ upgrade_detector, critical, is_unstable_channel));
}
}
-} // namespace
-
-UpgradeDetectorImpl::UpgradeDetectorImpl()
- : ALLOW_THIS_IN_INITIALIZER_LIST(weak_factory_(this)),
- is_unstable_channel_(false) {
- CommandLine command_line(*CommandLine::ForCurrentProcess());
- if (command_line.HasSwitch(switches::kDisableBackgroundNetworking))
- return;
- if (command_line.HasSwitch(switches::kSimulateUpgrade)) {
- UpgradeDetected();
- return;
- }
- // Windows: only enable upgrade notifications for official builds.
- // Mac: only enable them if the updater (Keystone) is present.
- // Linux (and other POSIX): always enable regardless of branding.
-#if (defined(OS_WIN) && defined(GOOGLE_CHROME_BUILD)) || defined(OS_POSIX)
-#if defined(OS_MACOSX)
- if (keystone_glue::KeystoneEnabled())
-#endif
- {
- detect_upgrade_timer_.Start(FROM_HERE,
- base::TimeDelta::FromMilliseconds(GetCheckForUpgradeEveryMs()),
- this, &UpgradeDetectorImpl::CheckForUpgrade);
+void UpgradeDetectorImpl::CheckForUpgrade() {
+ // Only check for outdated install when allowed and when no upgrade has been
+ // detected.
+ if (is_outdated_reinstall_allowed_ &&
Finnur 2013/02/01 17:09:15 This would be a field trial check instead (accordi
MAD 2013/02/02 03:55:34 Done.
+ upgrade_required_ == UPGRADE_REQUIRED_NONE) {
+ CompareBuildTimeToSaneTime();
}
-#endif
-}
-UpgradeDetectorImpl::~UpgradeDetectorImpl() {
-}
+ // If we are simulating an outdated install, no need to detect an upgrade.
+ // Since upgrade has precedence over outdated installs, it would prevent
+ // testing. And [critical] upgrade simulations should never get here, they go
+ // straight to UpgtradeDetected.
+ const CommandLine& cmd_line = *CommandLine::ForCurrentProcess();
+ DCHECK(!cmd_line.HasSwitch(switches::kSimulateCriticalUpdate));
+ DCHECK(!cmd_line.HasSwitch(switches::kSimulateUpgrade));
+ if (cmd_line.HasSwitch(switches::kSimulateOutdated))
+ return;
-void UpgradeDetectorImpl::CheckForUpgrade() {
weak_factory_.InvalidateWeakPtrs();
- base::Closure callback_task =
- base::Bind(&UpgradeDetectorImpl::UpgradeDetected,
- weak_factory_.GetWeakPtr());
// We use FILE as the thread to run the upgrade detection code on all
// platforms. For Linux, this is because we don't want to block the UI thread
// while launching a background process and reading its output; on the Mac and
// on Windows checking for an upgrade requires reading a file.
BrowserThread::PostTask(BrowserThread::FILE, FROM_HERE,
- base::Bind(&DetectUpgradeTask,
- callback_task,
- &is_unstable_channel_,
- &is_critical_upgrade_));
+ base::Bind(&UpgradeDetectorImpl::DetectUpgradeTask,
+ weak_factory_.GetWeakPtr()));
+}
+
+void UpgradeDetectorImpl::CompareBuildTimeToSaneTime() {
+ DCHECK(is_outdated_reinstall_allowed_);
+ // Check again, in case we got posted more than once by CheckForUpgrade.
+ if (upgrade_required_ != UPGRADE_REQUIRED_NONE)
+ return;
+
+ base::Time network_time;
+// TODO(mad): Uncomment when variations service NetworkTime CL get committed.
+// if (!g_browser_process->variations_service()->GetNetworkTime(&network_time))
+// return;
Finnur 2013/02/01 17:09:15 I likey.
MAD 2013/02/02 03:55:34 B-)
+
Finnur 2013/02/01 17:09:15 I think you should add a check, just to be sure. S
MAD 2013/02/02 03:55:34 Done.
+ DCHECK(!network_time.is_null());
Finnur 2013/02/01 17:09:15 You could pull that into the if above and check th
MAD 2013/02/02 03:55:34 Done.
+ if (network_time - build_date_ >
+ base::TimeDelta::FromDays(kOutdatedBuildAgeInDays)) {
+ upgrade_required_ = UPGRADE_REQUIRED_OUTDATED;
+ UpgradeDetected(false, is_unstable_channel_);
+ }
}
-void UpgradeDetectorImpl::UpgradeDetected() {
+void UpgradeDetectorImpl::UpgradeDetected(bool critical,
+ bool is_unstable_channel) {
DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
+ is_unstable_channel_ = is_unstable_channel;
+ if (critical)
+ upgrade_required_ = UPGRADE_REQUIRED_CRITICAL;
+ else if (upgrade_required_ == UPGRADE_REQUIRED_NONE)
Finnur 2013/02/01 17:09:15 I'm sure that a few months down the line we're goi
MAD 2013/02/02 03:55:34 Refactoring took care of this.
+ upgrade_required_ = UPGRADE_REQUIRED_REGULAR;
// Stop the recurring timer (that is checking for changes).
detect_upgrade_timer_.Stop();
@@ -222,13 +344,14 @@ void UpgradeDetectorImpl::NotifyOnUpgrade() {
bool is_testing = IsTesting();
int64 time_passed = is_testing ? delta.InSeconds() : delta.InHours();
+ bool is_critical_or_outdated = upgrade_required_ > UPGRADE_REQUIRED_REGULAR;
if (is_unstable_channel_) {
// There's only one threat level for unstable channels like dev and
// canary, and it hits after one hour. During testing, it hits after one
// minute.
const int kUnstableThreshold = 1;
- if (is_critical_upgrade_)
+ if (is_critical_or_outdated)
set_upgrade_notification_stage(UPGRADE_ANNOYANCE_CRITICAL);
else if (time_passed >= kUnstableThreshold) {
set_upgrade_notification_stage(UPGRADE_ANNOYANCE_LOW);
@@ -247,10 +370,10 @@ void UpgradeDetectorImpl::NotifyOnUpgrade() {
const int kLowThreshold = 2 * kMultiplier;
// These if statements must be sorted (highest interval first).
- if (time_passed >= kSevereThreshold || is_critical_upgrade_) {
+ if (time_passed >= kSevereThreshold || is_critical_or_outdated) {
set_upgrade_notification_stage(
- is_critical_upgrade_ ? UPGRADE_ANNOYANCE_CRITICAL :
- UPGRADE_ANNOYANCE_SEVERE);
+ is_critical_or_outdated ? UPGRADE_ANNOYANCE_CRITICAL :
+ UPGRADE_ANNOYANCE_SEVERE);
// We can't get any higher, baby.
upgrade_notification_timer_.Stop();

Powered by Google App Engine
This is Rietveld 408576698