OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/installer/util/google_update_settings.h" | 5 #include "chrome/installer/util/google_update_settings.h" |
6 | 6 |
7 #include <stdint.h> | 7 #include <stdint.h> |
8 | 8 |
9 #include <algorithm> | 9 #include <algorithm> |
10 #include <limits> | |
11 #include <vector> | |
12 | 10 |
13 #include "base/command_line.h" | 11 #include "base/command_line.h" |
14 #include "base/files/file_path.h" | 12 #include "base/files/file_path.h" |
15 #include "base/logging.h" | 13 #include "base/logging.h" |
16 #include "base/metrics/histogram.h" | 14 #include "base/metrics/histogram.h" |
17 #include "base/numerics/safe_conversions.h" | 15 #include "base/numerics/safe_conversions.h" |
18 #include "base/path_service.h" | 16 #include "base/path_service.h" |
19 #include "base/strings/string_number_conversions.h" | 17 #include "base/strings/string_number_conversions.h" |
20 #include "base/strings/string_util.h" | 18 #include "base/strings/string_util.h" |
21 #include "base/strings/utf_string_conversions.h" | 19 #include "base/strings/utf_string_conversions.h" |
(...skipping 127 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
149 BrowserDistribution* dist = BrowserDistribution::GetDistribution(); | 147 BrowserDistribution* dist = BrowserDistribution::GetDistribution(); |
150 base::string16 reg_path = dist->GetStateKey(); | 148 base::string16 reg_path = dist->GetStateKey(); |
151 RegKey key(HKEY_CURRENT_USER, | 149 RegKey key(HKEY_CURRENT_USER, |
152 reg_path.c_str(), | 150 reg_path.c_str(), |
153 KEY_READ | KEY_WRITE | KEY_WOW64_32KEY); | 151 KEY_READ | KEY_WRITE | KEY_WOW64_32KEY); |
154 if (!key.HasValue(name)) | 152 if (!key.HasValue(name)) |
155 return true; | 153 return true; |
156 return (key.DeleteValue(name) == ERROR_SUCCESS); | 154 return (key.DeleteValue(name) == ERROR_SUCCESS); |
157 } | 155 } |
158 | 156 |
159 // Initializes |channel_info| based on |system_install| and |dist|. Also | 157 // Initializes |channel_info| based on |system_install|. Returns false on |
160 // returns whether the install is a multi-install via output parameter | 158 // failure. |
161 // |is_multi_install|. Returns false on failure. | |
162 bool InitChannelInfo(bool system_install, | 159 bool InitChannelInfo(bool system_install, |
163 installer::ChannelInfo* channel_info, | 160 installer::ChannelInfo* channel_info) { |
164 bool* is_multi_install) { | 161 HKEY root_key = system_install ? HKEY_LOCAL_MACHINE : HKEY_CURRENT_USER; |
165 // Determine whether or not chrome is multi-install. If so, updates are | 162 BrowserDistribution* dist = BrowserDistribution::GetDistribution(); |
166 // delivered under the binaries' app guid, so that's where the relevant | 163 RegKey key(root_key, dist->GetStateKey().c_str(), |
167 // channel is found. | 164 KEY_QUERY_VALUE | KEY_WOW64_32KEY); |
168 installer::ProductState state; | 165 return channel_info->Initialize(key); |
169 ignore_result(state.Initialize(system_install)); | |
170 if (!state.is_multi_install()) { | |
171 // Use the channel info that was just read for this single-install chrome. | |
172 *channel_info = state.channel(); | |
173 } else { | |
174 // Read the channel info from the binaries' state key. | |
175 HKEY root_key = system_install ? HKEY_LOCAL_MACHINE : HKEY_CURRENT_USER; | |
176 BrowserDistribution* dist = BrowserDistribution::GetSpecificDistribution( | |
177 BrowserDistribution::CHROME_BINARIES); | |
178 RegKey key(root_key, dist->GetStateKey().c_str(), | |
179 KEY_READ | KEY_WOW64_32KEY); | |
180 | |
181 if (!channel_info->Initialize(key)) | |
182 return false; | |
183 } | |
184 *is_multi_install = state.is_multi_install(); | |
185 return true; | |
186 } | 166 } |
187 | 167 |
188 bool GetChromeChannelInternal(bool system_install, | 168 bool GetChromeChannelInternal(bool system_install, |
189 bool add_multi_modifier, | |
190 base::string16* channel) { | 169 base::string16* channel) { |
191 BrowserDistribution* dist = BrowserDistribution::GetDistribution(); | |
192 | |
193 // Shortcut in case this distribution knows what channel it is (canary). | 170 // Shortcut in case this distribution knows what channel it is (canary). |
194 if (dist->GetChromeChannel(channel)) | 171 if (BrowserDistribution::GetDistribution()->GetChromeChannel(channel)) |
195 return true; | 172 return true; |
196 | 173 |
197 installer::ChannelInfo channel_info; | 174 installer::ChannelInfo channel_info; |
198 bool is_multi_install = false; | 175 if (!InitChannelInfo(system_install, &channel_info)) { |
199 if (!InitChannelInfo(system_install, &channel_info, &is_multi_install)) { | |
200 channel->assign(installer::kChromeChannelUnknown); | 176 channel->assign(installer::kChromeChannelUnknown); |
201 return false; | 177 return false; |
202 } | 178 } |
203 | 179 |
204 if (!channel_info.GetChannelName(channel)) | 180 if (!channel_info.GetChannelName(channel)) |
205 channel->assign(installer::kChromeChannelUnknown); | 181 channel->assign(installer::kChromeChannelUnknown); |
206 | 182 |
207 // Tag the channel name if this is a multi-install. | |
208 if (add_multi_modifier && is_multi_install) { | |
209 if (!channel->empty()) | |
210 channel->push_back(L'-'); | |
211 channel->push_back(L'm'); | |
212 } | |
213 | |
214 return true; | 183 return true; |
215 } | 184 } |
216 | 185 |
217 #if defined(GOOGLE_CHROME_BUILD) | 186 #if defined(GOOGLE_CHROME_BUILD) |
218 // Populates |update_policy| with the UpdatePolicy enum value corresponding to a | 187 // Populates |update_policy| with the UpdatePolicy enum value corresponding to a |
219 // DWORD read from the registry and returns true if |value| is within range. | 188 // DWORD read from the registry and returns true if |value| is within range. |
220 // If |value| is out of range, returns false without modifying |update_policy|. | 189 // If |value| is out of range, returns false without modifying |update_policy|. |
221 bool GetUpdatePolicyFromDword( | 190 bool GetUpdatePolicyFromDword( |
222 const DWORD value, | 191 const DWORD value, |
223 GoogleUpdateSettings::UpdatePolicy* update_policy) { | 192 GoogleUpdateSettings::UpdatePolicy* update_policy) { |
224 switch (value) { | 193 switch (value) { |
225 case GoogleUpdateSettings::UPDATES_DISABLED: | 194 case GoogleUpdateSettings::UPDATES_DISABLED: |
226 case GoogleUpdateSettings::AUTOMATIC_UPDATES: | 195 case GoogleUpdateSettings::AUTOMATIC_UPDATES: |
227 case GoogleUpdateSettings::MANUAL_UPDATES_ONLY: | 196 case GoogleUpdateSettings::MANUAL_UPDATES_ONLY: |
228 case GoogleUpdateSettings::AUTO_UPDATES_ONLY: | 197 case GoogleUpdateSettings::AUTO_UPDATES_ONLY: |
229 *update_policy = static_cast<GoogleUpdateSettings::UpdatePolicy>(value); | 198 *update_policy = static_cast<GoogleUpdateSettings::UpdatePolicy>(value); |
230 return true; | 199 return true; |
231 default: | 200 default: |
232 LOG(WARNING) << "Unexpected update policy override value: " << value; | 201 LOG(WARNING) << "Unexpected update policy override value: " << value; |
233 } | 202 } |
234 return false; | 203 return false; |
235 } | 204 } |
236 #endif // defined(GOOGLE_CHROME_BUILD) | 205 #endif // defined(GOOGLE_CHROME_BUILD) |
237 | 206 |
238 bool UpdateDidRunStateForApp(const AppRegistrationData& app_reg_data, | |
239 bool did_run) { | |
240 return WriteGoogleUpdateStrKeyInternal( | |
241 app_reg_data, google_update::kRegDidRunField, did_run ? L"1" : L"0"); | |
242 } | |
243 | |
244 // Convenience routine: GoogleUpdateSettings::UpdateDidRunStateForApp() | |
245 // specialized for Chrome Binaries. | |
246 bool UpdateDidRunStateForBinaries(bool did_run) { | |
247 BrowserDistribution* dist = BrowserDistribution::GetSpecificDistribution( | |
248 BrowserDistribution::CHROME_BINARIES); | |
249 return UpdateDidRunStateForApp(dist->GetAppRegistrationData(), did_run); | |
250 } | |
251 | |
252 } // namespace | 207 } // namespace |
253 | 208 |
254 bool GoogleUpdateSettings::IsSystemInstall() { | 209 bool GoogleUpdateSettings::IsSystemInstall() { |
255 bool system_install = false; | 210 bool system_install = false; |
256 base::FilePath module_dir; | 211 base::FilePath module_dir; |
257 if (!PathService::Get(base::DIR_MODULE, &module_dir)) { | 212 if (!PathService::Get(base::DIR_MODULE, &module_dir)) { |
258 LOG(WARNING) | 213 LOG(WARNING) |
259 << "Failed to get directory of module; assuming per-user install."; | 214 << "Failed to get directory of module; assuming per-user install."; |
260 } else { | 215 } else { |
261 system_install = !InstallUtil::IsPerUserInstall(module_dir); | 216 system_install = !InstallUtil::IsPerUserInstall(module_dir); |
262 } | 217 } |
263 return system_install; | 218 return system_install; |
264 } | 219 } |
265 | 220 |
266 bool GoogleUpdateSettings::GetCollectStatsConsent() { | 221 bool GoogleUpdateSettings::GetCollectStatsConsent() { |
267 return GetCollectStatsConsentAtLevel(IsSystemInstall()); | 222 return GetCollectStatsConsentAtLevel(IsSystemInstall()); |
268 } | 223 } |
269 | 224 |
270 bool GoogleUpdateSettings::SetCollectStatsConsent(bool consented) { | 225 bool GoogleUpdateSettings::SetCollectStatsConsent(bool consented) { |
271 return SetCollectStatsConsentAtLevel(IsSystemInstall(), consented); | 226 return SetCollectStatsConsentAtLevel(IsSystemInstall(), consented); |
272 } | 227 } |
273 | 228 |
274 bool GoogleUpdateSettings::GetCollectStatsConsentAtLevel(bool system_install) { | 229 bool GoogleUpdateSettings::GetCollectStatsConsentAtLevel(bool system_install) { |
275 BrowserDistribution* dist = BrowserDistribution::GetDistribution(); | |
276 | |
277 // Consent applies to all products in a multi-install package. | |
278 if (InstallUtil::IsMultiInstall(system_install)) { | |
279 dist = BrowserDistribution::GetSpecificDistribution( | |
280 BrowserDistribution::CHROME_BINARIES); | |
281 } | |
282 | |
283 return GetCollectStatsConsentForApp(system_install, | 230 return GetCollectStatsConsentForApp(system_install, |
284 dist->GetAppRegistrationData()) == | 231 BrowserDistribution::GetDistribution() |
| 232 ->GetAppRegistrationData()) == |
285 google_update::TRISTATE_TRUE; | 233 google_update::TRISTATE_TRUE; |
286 } | 234 } |
287 | 235 |
288 google_update::Tristate GoogleUpdateSettings::GetCollectStatsConsentForApp( | 236 google_update::Tristate GoogleUpdateSettings::GetCollectStatsConsentForApp( |
289 bool system_install, | 237 bool system_install, |
290 const AppRegistrationData& reg_data) { | 238 const AppRegistrationData& reg_data) { |
291 RegKey key; | 239 RegKey key; |
292 DWORD value = google_update::TRISTATE_NONE; | 240 DWORD value = google_update::TRISTATE_NONE; |
293 bool have_value = false; | 241 bool have_value = false; |
294 const REGSAM kAccess = KEY_QUERY_VALUE | KEY_WOW64_32KEY; | 242 const REGSAM kAccess = KEY_QUERY_VALUE | KEY_WOW64_32KEY; |
(...skipping 20 matching lines...) Expand all Loading... |
315 | 263 |
316 return value == google_update::TRISTATE_TRUE ? google_update::TRISTATE_TRUE | 264 return value == google_update::TRISTATE_TRUE ? google_update::TRISTATE_TRUE |
317 : google_update::TRISTATE_FALSE; | 265 : google_update::TRISTATE_FALSE; |
318 } | 266 } |
319 | 267 |
320 // static | 268 // static |
321 bool GoogleUpdateSettings::SetCollectStatsConsentAtLevel(bool system_install, | 269 bool GoogleUpdateSettings::SetCollectStatsConsentAtLevel(bool system_install, |
322 bool consented) { | 270 bool consented) { |
323 DWORD value = | 271 DWORD value = |
324 consented ? google_update::TRISTATE_TRUE : google_update::TRISTATE_FALSE; | 272 consented ? google_update::TRISTATE_TRUE : google_update::TRISTATE_FALSE; |
325 | |
326 BrowserDistribution* dist = BrowserDistribution::GetDistribution(); | 273 BrowserDistribution* dist = BrowserDistribution::GetDistribution(); |
327 | 274 |
328 // Consent applies to all products in a multi-install package. | |
329 if (InstallUtil::IsMultiInstall(system_install)) { | |
330 dist = BrowserDistribution::GetSpecificDistribution( | |
331 BrowserDistribution::CHROME_BINARIES); | |
332 } | |
333 | |
334 // Write to ClientStateMedium for system-level; ClientState otherwise. | 275 // Write to ClientStateMedium for system-level; ClientState otherwise. |
335 HKEY root_key = system_install ? HKEY_LOCAL_MACHINE : HKEY_CURRENT_USER; | 276 HKEY root_key = system_install ? HKEY_LOCAL_MACHINE : HKEY_CURRENT_USER; |
336 base::string16 reg_path = | 277 base::string16 reg_path = |
337 system_install ? dist->GetStateMediumKey() : dist->GetStateKey(); | 278 system_install ? dist->GetStateMediumKey() : dist->GetStateKey(); |
338 RegKey key; | 279 RegKey key; |
339 LONG result = key.Create( | 280 LONG result = key.Create( |
340 root_key, reg_path.c_str(), KEY_SET_VALUE | KEY_WOW64_32KEY); | 281 root_key, reg_path.c_str(), KEY_SET_VALUE | KEY_WOW64_32KEY); |
341 if (result != ERROR_SUCCESS) { | 282 if (result != ERROR_SUCCESS) { |
342 LOG(ERROR) << "Failed opening key " << reg_path << " to set " | 283 LOG(ERROR) << "Failed opening key " << reg_path << " to set " |
343 << google_update::kRegUsageStatsField << "; result: " << result; | 284 << google_update::kRegUsageStatsField << "; result: " << result; |
344 } else { | 285 } else { |
345 result = key.WriteValue(google_update::kRegUsageStatsField, value); | 286 result = key.WriteValue(google_update::kRegUsageStatsField, value); |
346 LOG_IF(ERROR, result != ERROR_SUCCESS) << "Failed setting " | 287 LOG_IF(ERROR, result != ERROR_SUCCESS) << "Failed setting " |
347 << google_update::kRegUsageStatsField << " in key " << reg_path | 288 << google_update::kRegUsageStatsField << " in key " << reg_path |
348 << "; result: " << result; | 289 << "; result: " << result; |
349 } | 290 } |
350 | 291 |
351 // When opting out, clear registry backup of client id and related values. | 292 // When opting out, clear registry backup of client id and related values. |
352 if (result == ERROR_SUCCESS && !consented) | 293 if (result == ERROR_SUCCESS && !consented) |
353 StoreMetricsClientInfo(metrics::ClientInfo()); | 294 StoreMetricsClientInfo(metrics::ClientInfo()); |
354 | 295 |
355 return (result == ERROR_SUCCESS); | 296 return (result == ERROR_SUCCESS); |
356 } | 297 } |
357 | 298 |
358 // static | 299 // static |
359 bool GoogleUpdateSettings::GetCollectStatsConsentDefault( | 300 bool GoogleUpdateSettings::GetCollectStatsConsentDefault( |
360 bool* stats_consent_default) { | 301 bool* stats_consent_default) { |
361 installer::ChannelInfo channel_info; | 302 installer::ChannelInfo channel_info; |
362 bool is_multi_install = false; | 303 if (InitChannelInfo(IsSystemInstall(), &channel_info)) { |
363 if (InitChannelInfo(IsSystemInstall(), &channel_info, &is_multi_install)) { | |
364 base::string16 stats_default = channel_info.GetStatsDefault(); | 304 base::string16 stats_default = channel_info.GetStatsDefault(); |
365 if (stats_default == L"0" || stats_default == L"1") { | 305 if (stats_default == L"0" || stats_default == L"1") { |
366 *stats_consent_default = (stats_default == L"1"); | 306 *stats_consent_default = (stats_default == L"1"); |
367 return true; | 307 return true; |
368 } | 308 } |
369 } | 309 } |
370 return false; | 310 return false; |
371 } | 311 } |
372 | 312 |
373 std::unique_ptr<metrics::ClientInfo> | 313 std::unique_ptr<metrics::ClientInfo> |
(...skipping 101 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
475 } | 415 } |
476 | 416 |
477 bool GoogleUpdateSettings::GetReferral(base::string16* referral) { | 417 bool GoogleUpdateSettings::GetReferral(base::string16* referral) { |
478 return ReadGoogleUpdateStrKey(google_update::kRegReferralField, referral); | 418 return ReadGoogleUpdateStrKey(google_update::kRegReferralField, referral); |
479 } | 419 } |
480 | 420 |
481 bool GoogleUpdateSettings::ClearReferral() { | 421 bool GoogleUpdateSettings::ClearReferral() { |
482 return ClearGoogleUpdateStrKey(google_update::kRegReferralField); | 422 return ClearGoogleUpdateStrKey(google_update::kRegReferralField); |
483 } | 423 } |
484 | 424 |
485 bool GoogleUpdateSettings::UpdateDidRunState(bool did_run, bool system_level) { | 425 bool GoogleUpdateSettings::UpdateDidRunState(bool did_run) { |
486 BrowserDistribution* dist = BrowserDistribution::GetDistribution(); | 426 BrowserDistribution* dist = BrowserDistribution::GetDistribution(); |
487 bool result = UpdateDidRunStateForApp(dist->GetAppRegistrationData(), | 427 return WriteGoogleUpdateStrKeyInternal(dist->GetAppRegistrationData(), |
488 did_run); | 428 google_update::kRegDidRunField, |
489 // Update state for binaries, even if the previous call was unsuccessful. | 429 did_run ? L"1" : L"0"); |
490 if (InstallUtil::IsMultiInstall(system_level)) | |
491 result = UpdateDidRunStateForBinaries(did_run) && result; | |
492 return result; | |
493 } | 430 } |
494 | 431 |
495 base::string16 GoogleUpdateSettings::GetChromeChannel(bool system_install) { | 432 base::string16 GoogleUpdateSettings::GetChromeChannel(bool system_install) { |
496 base::string16 channel; | 433 base::string16 channel; |
497 GetChromeChannelInternal(system_install, false, &channel); | 434 GetChromeChannelInternal(system_install, &channel); |
498 return channel; | 435 return channel; |
499 } | 436 } |
500 | 437 |
501 bool GoogleUpdateSettings::GetChromeChannelAndModifiers( | |
502 bool system_install, | |
503 base::string16* channel) { | |
504 return GetChromeChannelInternal(system_install, true, channel); | |
505 } | |
506 | |
507 void GoogleUpdateSettings::UpdateInstallStatus(bool system_install, | 438 void GoogleUpdateSettings::UpdateInstallStatus(bool system_install, |
508 installer::ArchiveType archive_type, int install_return_code, | 439 installer::ArchiveType archive_type, int install_return_code, |
509 const base::string16& product_guid) { | 440 const base::string16& product_guid) { |
510 DCHECK(archive_type != installer::UNKNOWN_ARCHIVE_TYPE || | 441 DCHECK(archive_type != installer::UNKNOWN_ARCHIVE_TYPE || |
511 install_return_code != 0); | 442 install_return_code != 0); |
512 HKEY reg_root = (system_install) ? HKEY_LOCAL_MACHINE : HKEY_CURRENT_USER; | 443 HKEY reg_root = (system_install) ? HKEY_LOCAL_MACHINE : HKEY_CURRENT_USER; |
513 | 444 |
514 RegKey key; | 445 RegKey key; |
515 installer::ChannelInfo channel_info; | 446 installer::ChannelInfo channel_info; |
516 base::string16 reg_key(google_update::kRegPathClientState); | 447 base::string16 reg_key(google_update::kRegPathClientState); |
(...skipping 66 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
583 } else { | 514 } else { |
584 VLOG(1) << "Incremental installer failure; already on channel: " | 515 VLOG(1) << "Incremental installer failure; already on channel: " |
585 << value->value(); | 516 << value->value(); |
586 } | 517 } |
587 } else { | 518 } else { |
588 // It's okay if we don't know the archive type. In this case, leave the | 519 // It's okay if we don't know the archive type. In this case, leave the |
589 // "-full" suffix as we found it. | 520 // "-full" suffix as we found it. |
590 DCHECK_EQ(installer::UNKNOWN_ARCHIVE_TYPE, archive_type); | 521 DCHECK_EQ(installer::UNKNOWN_ARCHIVE_TYPE, archive_type); |
591 } | 522 } |
592 | 523 |
| 524 // The mini_installer in Chrome 10 through 12 added "-multifail" to the "ap" |
| 525 // value if "--multi-install" was on the command line. Unconditionally remove |
| 526 // it if present. |
| 527 // TODO(grt): Move this cleanup into mini_installer.cc's SetInstallerFlags. |
593 if (value->SetMultiFailSuffix(false)) { | 528 if (value->SetMultiFailSuffix(false)) { |
594 VLOG(1) << "Removed multi-install failure key; switching to channel: " | 529 VLOG(1) << "Removed multi-install failure key; switching to channel: " |
595 << value->value(); | 530 << value->value(); |
596 modified = true; | 531 modified = true; |
597 } | 532 } |
598 | 533 |
599 if (value->ClearStage()) { | 534 if (value->ClearStage()) { |
600 VLOG(1) << "Removed (legacy) stage information; switching to channel: " | 535 VLOG(1) << "Removed (legacy) stage information; switching to channel: " |
601 << value->value(); | 536 << value->value(); |
602 modified = true; | 537 modified = true; |
(...skipping 89 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
692 RegKey policy_key; | 627 RegKey policy_key; |
693 DWORD value = 0; | 628 DWORD value = 0; |
694 if (policy_key.Open(HKEY_LOCAL_MACHINE, kPoliciesKey, | 629 if (policy_key.Open(HKEY_LOCAL_MACHINE, kPoliciesKey, |
695 KEY_QUERY_VALUE) == ERROR_SUCCESS && | 630 KEY_QUERY_VALUE) == ERROR_SUCCESS && |
696 policy_key.ReadValueDW(kCheckPeriodOverrideMinutes, | 631 policy_key.ReadValueDW(kCheckPeriodOverrideMinutes, |
697 &value) == ERROR_SUCCESS && | 632 &value) == ERROR_SUCCESS && |
698 (value == 0 || value > kCheckPeriodOverrideMinutesMax)) { | 633 (value == 0 || value > kCheckPeriodOverrideMinutesMax)) { |
699 return false; | 634 return false; |
700 } | 635 } |
701 | 636 |
702 // Auto updates are subtly broken when Chrome and the binaries have different | |
703 // overrides in place. If this Chrome cannot possibly be multi-install by | |
704 // virtue of being a side-by-side installation, simply check Chrome's policy. | |
705 BrowserDistribution* dist = BrowserDistribution::GetDistribution(); | 637 BrowserDistribution* dist = BrowserDistribution::GetDistribution(); |
706 UpdatePolicy app_policy = GetAppUpdatePolicy(dist->GetAppGuid(), nullptr); | 638 UpdatePolicy app_policy = GetAppUpdatePolicy(dist->GetAppGuid(), nullptr); |
707 if (InstallUtil::IsChromeSxSProcess()) | 639 return app_policy == AUTOMATIC_UPDATES || app_policy == AUTO_UPDATES_ONLY; |
708 return app_policy == AUTOMATIC_UPDATES || app_policy == AUTO_UPDATES_ONLY; | |
709 | |
710 // Otherwise, check for consistency between Chrome and the binaries regardless | |
711 // of whether or not this Chrome is multi-install since the next update likely | |
712 // will attempt to migrate it to such. | |
713 BrowserDistribution* binaries = BrowserDistribution::GetSpecificDistribution( | |
714 BrowserDistribution::CHROME_BINARIES); | |
715 return (GetAppUpdatePolicy(binaries->GetAppGuid(), nullptr) == app_policy && | |
716 (app_policy == AUTOMATIC_UPDATES || app_policy == AUTO_UPDATES_ONLY)); | |
717 #else // defined(GOOGLE_CHROME_BUILD) | 640 #else // defined(GOOGLE_CHROME_BUILD) |
718 // Chromium does not auto update. | 641 // Chromium does not auto update. |
719 return false; | 642 return false; |
720 #endif // !defined(GOOGLE_CHROME_BUILD) | 643 #endif // !defined(GOOGLE_CHROME_BUILD) |
721 } | 644 } |
722 | 645 |
723 // static | 646 // static |
724 bool GoogleUpdateSettings::ReenableAutoupdates() { | 647 bool GoogleUpdateSettings::ReenableAutoupdates() { |
725 #if defined(GOOGLE_CHROME_BUILD) | 648 #if defined(GOOGLE_CHROME_BUILD) |
726 int needs_reset_count = 0; | 649 int needs_reset_count = 0; |
727 int did_reset_count = 0; | 650 int did_reset_count = 0; |
728 | 651 |
729 // Reset overrides for Chrome and for the binaries if this Chrome supports | |
730 // multi-install. | |
731 std::vector<base::string16> app_guids; | |
732 app_guids.push_back(BrowserDistribution::GetDistribution()->GetAppGuid()); | |
733 if (!InstallUtil::IsChromeSxSProcess()) { | |
734 app_guids.push_back(BrowserDistribution::GetSpecificDistribution( | |
735 BrowserDistribution::CHROME_BINARIES)->GetAppGuid()); | |
736 } | |
737 | |
738 UpdatePolicy update_policy = kDefaultUpdatePolicy; | 652 UpdatePolicy update_policy = kDefaultUpdatePolicy; |
739 RegKey policy_key; | 653 RegKey policy_key; |
740 if (policy_key.Open(HKEY_LOCAL_MACHINE, kPoliciesKey, | 654 if (policy_key.Open(HKEY_LOCAL_MACHINE, kPoliciesKey, |
741 KEY_SET_VALUE | KEY_QUERY_VALUE) == ERROR_SUCCESS) { | 655 KEY_SET_VALUE | KEY_QUERY_VALUE) == ERROR_SUCCESS) { |
742 // Set to true while app-specific overrides are present that allow automatic | 656 // Set to true while app-specific overrides are present that allow automatic |
743 // updates. When this is the case, the defaults are irrelevant and don't | 657 // updates. When this is the case, the defaults are irrelevant and don't |
744 // need to be checked or reset. | 658 // need to be checked or reset. |
745 bool automatic_updates_allowed_by_overrides = true; | 659 bool automatic_updates_allowed_by_overrides = true; |
746 DWORD value = 0; | 660 DWORD value = 0; |
747 for (const base::string16& app_guid : app_guids) { | 661 |
748 // First check the app-specific override value and reset that if needed. | 662 // First check the app-specific override value and reset that if needed. |
749 // Note that this intentionally sets the override to AUTOMATIC_UPDATES | 663 // Note that this intentionally sets the override to AUTOMATIC_UPDATES even |
750 // even if it was previously AUTO_UPDATES_ONLY. The thinking is that | 664 // if it was previously AUTO_UPDATES_ONLY. The thinking is that |
751 // AUTOMATIC_UPDATES is marginally more likely to let a user update and | 665 // AUTOMATIC_UPDATES is marginally more likely to let a user update and this |
752 // this code is only called when a stuck user asks for updates. | 666 // code is only called when a stuck user asks for updates. |
753 base::string16 app_update_override(kUpdateOverrideValuePrefix); | 667 base::string16 app_update_override(kUpdateOverrideValuePrefix); |
754 app_update_override.append(app_guid); | 668 app_update_override.append( |
755 if (policy_key.ReadValueDW(app_update_override.c_str(), | 669 BrowserDistribution::GetDistribution()->GetAppGuid()); |
756 &value) != ERROR_SUCCESS) { | 670 if (policy_key.ReadValueDW(app_update_override.c_str(), &value) != |
757 automatic_updates_allowed_by_overrides = false; | 671 ERROR_SUCCESS) { |
758 } else if (!GetUpdatePolicyFromDword(value, &update_policy) || | 672 automatic_updates_allowed_by_overrides = false; |
759 update_policy != GoogleUpdateSettings::AUTOMATIC_UPDATES) { | 673 } else if (!GetUpdatePolicyFromDword(value, &update_policy) || |
760 automatic_updates_allowed_by_overrides = false; | 674 update_policy != GoogleUpdateSettings::AUTOMATIC_UPDATES) { |
761 ++needs_reset_count; | 675 automatic_updates_allowed_by_overrides = false; |
762 if (policy_key.WriteValue( | 676 ++needs_reset_count; |
763 app_update_override.c_str(), | 677 if (policy_key.WriteValue( |
764 static_cast<DWORD>(GoogleUpdateSettings::AUTOMATIC_UPDATES)) == | 678 app_update_override.c_str(), |
765 ERROR_SUCCESS) { | 679 static_cast<DWORD>(GoogleUpdateSettings::AUTOMATIC_UPDATES)) == |
766 ++did_reset_count; | 680 ERROR_SUCCESS) { |
767 } | 681 ++did_reset_count; |
768 } | 682 } |
769 } | 683 } |
770 | 684 |
771 // If there were no app-specific override policies, see if there's a global | 685 // If there were no app-specific override policies, see if there's a global |
772 // policy preventing updates and delete it if so. | 686 // policy preventing updates and delete it if so. |
773 if (!automatic_updates_allowed_by_overrides && | 687 if (!automatic_updates_allowed_by_overrides && |
774 policy_key.ReadValueDW(kUpdatePolicyValue, &value) == ERROR_SUCCESS && | 688 policy_key.ReadValueDW(kUpdatePolicyValue, &value) == ERROR_SUCCESS && |
775 (!GetUpdatePolicyFromDword(value, &update_policy) || | 689 (!GetUpdatePolicyFromDword(value, &update_policy) || |
776 update_policy != GoogleUpdateSettings::AUTOMATIC_UPDATES)) { | 690 update_policy != GoogleUpdateSettings::AUTOMATIC_UPDATES)) { |
777 ++needs_reset_count; | 691 ++needs_reset_count; |
(...skipping 13 matching lines...) Expand all Loading... |
791 | 705 |
792 // Return whether the number of successful resets is the same as the | 706 // Return whether the number of successful resets is the same as the |
793 // number of things that appeared to need resetting. | 707 // number of things that appeared to need resetting. |
794 return (needs_reset_count == did_reset_count); | 708 return (needs_reset_count == did_reset_count); |
795 } else { | 709 } else { |
796 // For some reason we couldn't open the policy key with the desired | 710 // For some reason we couldn't open the policy key with the desired |
797 // permissions to make changes (the most likely reason is that there is no | 711 // permissions to make changes (the most likely reason is that there is no |
798 // policy set). Simply return whether or not we think updates are enabled. | 712 // policy set). Simply return whether or not we think updates are enabled. |
799 return AreAutoupdatesEnabled(); | 713 return AreAutoupdatesEnabled(); |
800 } | 714 } |
801 | |
802 #endif | 715 #endif |
803 // Non Google Chrome isn't going to autoupdate. | 716 // Non Google Chrome isn't going to autoupdate. |
804 return true; | 717 return true; |
805 } | 718 } |
806 | 719 |
807 // Reads and sanitizes the value of | 720 // Reads and sanitizes the value of |
808 // "HKLM\SOFTWARE\Policies\Google\Update\DownloadPreference". A valid | 721 // "HKLM\SOFTWARE\Policies\Google\Update\DownloadPreference". A valid |
809 // group policy option must be a single alpha numeric word of up to 32 | 722 // group policy option must be a single alpha numeric word of up to 32 |
810 // characters. | 723 // characters. |
811 base::string16 GoogleUpdateSettings::GetDownloadPreference() { | 724 base::string16 GoogleUpdateSettings::GetDownloadPreference() { |
(...skipping 10 matching lines...) Expand all Loading... |
822 for (auto ch : value) { | 735 for (auto ch : value) { |
823 if (!base::IsAsciiAlpha(ch)) | 736 if (!base::IsAsciiAlpha(ch)) |
824 return base::string16(); | 737 return base::string16(); |
825 } | 738 } |
826 return value; | 739 return value; |
827 } | 740 } |
828 return base::string16(); | 741 return base::string16(); |
829 } | 742 } |
830 | 743 |
831 void GoogleUpdateSettings::RecordChromeUpdatePolicyHistograms() { | 744 void GoogleUpdateSettings::RecordChromeUpdatePolicyHistograms() { |
832 const bool is_multi_install = InstallUtil::IsMultiInstall(IsSystemInstall()); | |
833 const base::string16 app_guid = | 745 const base::string16 app_guid = |
834 BrowserDistribution::GetSpecificDistribution( | 746 BrowserDistribution::GetDistribution()->GetAppGuid(); |
835 is_multi_install ? BrowserDistribution::CHROME_BINARIES : | |
836 BrowserDistribution::CHROME_BROWSER)->GetAppGuid(); | |
837 | 747 |
838 bool is_overridden = false; | 748 bool is_overridden = false; |
839 const UpdatePolicy update_policy = GetAppUpdatePolicy(app_guid, | 749 const UpdatePolicy update_policy = GetAppUpdatePolicy(app_guid, |
840 &is_overridden); | 750 &is_overridden); |
841 UMA_HISTOGRAM_BOOLEAN("GoogleUpdate.UpdatePolicyIsOverridden", is_overridden); | 751 UMA_HISTOGRAM_BOOLEAN("GoogleUpdate.UpdatePolicyIsOverridden", is_overridden); |
842 UMA_HISTOGRAM_ENUMERATION("GoogleUpdate.EffectivePolicy", update_policy, | 752 UMA_HISTOGRAM_ENUMERATION("GoogleUpdate.EffectivePolicy", update_policy, |
843 UPDATE_POLICIES_COUNT); | 753 UPDATE_POLICIES_COUNT); |
844 } | 754 } |
845 | 755 |
846 base::string16 GoogleUpdateSettings::GetUninstallCommandLine( | 756 base::string16 GoogleUpdateSettings::GetUninstallCommandLine( |
(...skipping 182 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1029 } | 939 } |
1030 | 940 |
1031 // If the key or value was not present, return the empty string. | 941 // If the key or value was not present, return the empty string. |
1032 if (result == ERROR_FILE_NOT_FOUND || result == ERROR_PATH_NOT_FOUND) { | 942 if (result == ERROR_FILE_NOT_FOUND || result == ERROR_PATH_NOT_FOUND) { |
1033 experiment_labels->clear(); | 943 experiment_labels->clear(); |
1034 return true; | 944 return true; |
1035 } | 945 } |
1036 | 946 |
1037 return result == ERROR_SUCCESS; | 947 return result == ERROR_SUCCESS; |
1038 } | 948 } |
OLD | NEW |