package chromeos_update_engine

Mouse Melon logoGet desktop application:
View/edit binary Protocol Buffers messages

message DeltaArchiveManifest

update_metadata.proto:276

message DynamicPartitionGroup

update_metadata.proto:252

Used in: DynamicPartitionMetadata

message DynamicPartitionMetadata

update_metadata.proto:262

Metadata related to all dynamic partitions.

Used in: DeltaArchiveManifest

message Extent

update_metadata.proto:102

Data is packed into blocks on disk, always starting from the beginning of the block. If a file's data is too large for one block, it overflows into another block, which may or may not be the following block on the physical partition. An ordered list of extents is another representation of an ordered list of blocks. For example, a file stored in blocks 9, 10, 11, 2, 18, 12 (in that order) would be stored in extents { {9, 3}, {2, 1}, {18, 1}, {12, 1} } (in that order). In general, files are stored sequentially on disk, so it's more efficient to use extents to encode the block lists (this is effectively run-length encoding). A sentinel value (kuint64max) as the start block denotes a sparse-hole in a file whose block-length is specified by num_blocks.

Used in: InstallOperation, PartitionUpdate

message ImageInfo

update_metadata.proto:142

Describe an image we are based on in a human friendly way. Examples: dev-channel, x86-alex, 1.2.3, mp-v3 nplusone-channel, x86-alex, 1.2.4, mp-v3, dev-channel, 1.2.3 All fields will be set, if this message is present.

Used in: DeltaArchiveManifest

message InstallOperation

update_metadata.proto:153

Used in: DeltaArchiveManifest, PartitionUpdate

enum InstallOperation.Type

update_metadata.proto:154

Used in: InstallOperation

message PartitionInfo

update_metadata.proto:132

Used in: DeltaArchiveManifest, PartitionUpdate

message PartitionUpdate

update_metadata.proto:204

Describes the update to apply to a single partition.

Used in: DeltaArchiveManifest

message Signatures

update_metadata.proto:117

Signatures: Updates may be signed by the OS vendor. The client verifies an update's signature by hashing the entire download. The section of the download that contains the signature is at the end of the file, so when signing a file, only the part up to the signature part is signed. Then, the client looks inside the download's Signatures message for a Signature message that it knows how to handle. Generally, a client will only know how to handle one type of signature, but an update may contain many signatures to support many different types of client. Then client selects a Signature message and uses that, along with a known public key, to verify the download. The public key is expected to be part of the client.

message Signatures.Signature

update_metadata.proto:118

Used in: PartitionUpdate, Signatures