Closed
Bug 928173
Opened 11 years ago
Closed 10 years ago
Create an Add-on Hotfix to give outdated users a full installer and the ability to submit their logs to us
Categories
(Firefox :: General, defect)
Tracking
()
VERIFIED
FIXED
People
(Reporter: tdowner, Assigned: gps)
References
(Blocks 1 open bug)
Details
Attachments
(4 files)
We should have an add-on Hotfix that can be rolled out to all users on unsupported Versions of Firefox that gives these users a warning that they are out of date, a quick link to a full installer to update them to the latest version of Firefox (since their updater is likely broken), and that allows them to submit their update logs to us for analysis. rstrong should give input here on what logs would be beneficial for us to solving potential bugs in the updater.
Comment 1•11 years ago
|
||
Note: it should be possible to use the existing update ui that notifies users to manually download the installer. This way it is already localized, etc.
The files are the same as previously. In the update directory, active-update.xml, updates.xml, updates/backup-update.log, updates/last-update.log, and updates/0/update.log if they exist for the updater. If updates aren't found then messages from the error console starting with AUS: for the update component.
Updated•11 years ago
|
Blocks: fxdesktopbacklog
Updated•11 years ago
|
Whiteboard: p=0
Reporter | ||
Comment 2•11 years ago
|
||
just a change, instead of a link to the full installer it would be nice to use the internal updater mechanism to just force a download and install of a full build. Linking to the installer and expecting the user to go through the install is alot of steps and will hinder the success of this hotfix.
Comment 3•11 years ago
|
||
That assumes the updater works, though, which is quite unlikely in the relevant problem scenarios.
Reporter | ||
Comment 4•11 years ago
|
||
Is there a way we can force the updater to clear all previously downloaded partials (basically reset it) and then force it to download and install a full-installer through a more fail-safe way? Rob?
Comment 5•11 years ago
|
||
There wouldn't be a way to have update run an installer (they are apples and oranges) and there is no reason to think that clearing out a downloaded update (it only downloads one at a time) would help even if we could run an installer from it or that whatever is mucking things up which has yet to be identified wouldn't muck that up.
Comment 6•11 years ago
|
||
The hotfix addon could be written to download and run the installer itself.
Comment 7•11 years ago
|
||
Definitely
Reporter | ||
Comment 8•11 years ago
|
||
That works then. I just want to avoid the situation of making users (who are probably less technical) having to click a link, save a file, find that file, run it, and go through a full install.
Comment 9•11 years ago
|
||
At least in some if not most cases they will still need to interact with UI in that they will need to at the very least confirm elevation on Windows.
Reporter | ||
Comment 10•11 years ago
|
||
That's fine, I believe we can live with a 2-3 click process rather than a 5-6 click process.
Comment 11•11 years ago
|
||
To further streamline things, the hotfix addon could ask for permission to install the upgrade and then run the installer in a zero-click mode. (not silent; still show a UI, just without a second confirmation of install or options) This could get it down to 1-2 clicks.
Comment 12•11 years ago
|
||
One thing that would also be a good idea would be to have the hotfix addon re-prompt the user later if they agree to install the upgrade but it does not get completed fully. (e.g. didn't get permission to install) We'd then need a dedicated help page to give to these people on the second go-around.
Updated•11 years ago
|
No longer blocks: fxdesktopbacklog
Flags: firefox-backlog+
Comment 13•11 years ago
|
||
Adding wireframe from bug 994882. As Smedberg notes in bug 994882#c26, we should redirect to a SUMO page if the installer failes.
Comment 14•11 years ago
|
||
Adding Saptarshi. We should be in a position to measure the effect of this rollout when it happens.
Quick question -- this hotfix will reach *all* users from Fx 12 onwards, correct?
Comment 15•11 years ago
|
||
(In reply to John Jensen from comment #14)
> Quick question -- this hotfix will reach *all* users from Fx 12 onwards,
> correct?
No, I believe this was just targeting Windows initially:
"This quarter we are focusing on Windows users. If that is successful, we
will likely attempt to deploy a similar hotfix for Mac users."
Also, the hotfix doesn't get deployed to users with application updates disabled or to users on older versions without the new hotfix cert fingerprint who didn't get the hotfixes to rotate the fingerprint before the cert expired. See bug 803596 and bug 874513.
Comment 16•11 years ago
|
||
(In reply to Matthew N. [:MattN] from comment #15)
> Also, the hotfix doesn't get deployed to users with application updates
> disabled
It doesn't? Why not? That seems like a serious problem for this effort...
> or to users on older versions without the new hotfix cert
> fingerprint who didn't get the hotfixes to rotate the fingerprint before the
> cert expired. See bug 803596 and bug 874513.
That should be a very small set of users in theory, right?
Comment 17•11 years ago
|
||
(In reply to :Gavin Sharp (email gavin@gavinsharp.com) from comment #16)
> (In reply to Matthew N. [:MattN] from comment #15)
> > Also, the hotfix doesn't get deployed to users with application updates
> > disabled
>
> It doesn't? Why not? That seems like a serious problem for this effort...
Hotfixes are essentially providing updates so hotfix checks were tied to application update preferences[1]. Adding a new preference just for hotfixes that managed environments would have to change for their existing user base wouldn't be less ideal IMO.
On firefox-dev it sounded like the focus was on helping people whose updates were not working and not forcing people with updates disabled to upgrade so I don't think this is that serious.
> > or to users on older versions without the new hotfix cert
> > fingerprint who didn't get the hotfixes to rotate the fingerprint before the
> > cert expired. See bug 803596 and bug 874513.
>
> That should be a very small set of users in theory, right?
Well, we cut it pretty close at least one of the two times IIRC so computers that are only used occasionally (e.g. on weekends or a few times per month) very possibly missed one of those cert fingerprint rotations. If the user already had update issues at that time, they wouldn't have the new fingerprint.
[1] https://mxr.mozilla.org/mozilla-central/source/toolkit/mozapps/extensions/AddonManager.jsm?rev=0552c02f54b0&mark=1149-1154#1139
Comment 18•11 years ago
|
||
(In reply to Matthew N. [:MattN] from comment #17)
> > > or to users on older versions without the new hotfix cert
> > > fingerprint who didn't get the hotfixes to rotate the fingerprint before the
> > > cert expired. See bug 803596 and bug 874513.
> >
> > That should be a very small set of users in theory, right?
>
> Well, we cut it pretty close at least one of the two times IIRC so computers
> that are only used occasionally (e.g. on weekends or a few times per month)
> very possibly missed one of those cert fingerprint rotations. If the user
> already had update issues at that time, they wouldn't have the new
> fingerprint.
>
> [1]
> https://mxr.mozilla.org/mozilla-central/source/toolkit/mozapps/extensions/
> AddonManager.jsm?rev=0552c02f54b0&mark=1149-1154#1139
Are you certain that we actually look at the certificate's expiry date? For some reason I thought we only looked at the cert fingerprints...
I agree though, the set of users that don't have the latest hotfix fingerprints should be small. They were shipped with Firefox 24 (https://bugzilla.mozilla.org/show_bug.cgi?id=803531), and the hotfix was made available for older installs.
Comment 19•11 years ago
|
||
Hello,
I've attached a figure that has for the last 15 days, the % of ADI on different versions.
Each panel is a version. FYI recent release dates are
2014-04-29 - FF 29
2014-03-18 - FF 28
...
2013-10-29 - FF 25
Things to note
1. % on version 27 and 26 is on the down as people move of 27,26 to higher versions
2. The shape of the curves are
a) similar for panels 12 ... 25
b) The percentage of ADI from these versions hovers in the 0.5% ... 1.2%
c) the trend line (red line) fairly horizontal (no downward trend)
From 2(a,b,c) i would say profiles on versions 12-25 for some reason continue to
stay on that version and without intervention (e.g. this bug) they will continue
to stay on the version.
For "success", we can keep this chart around. Everyone has to concur what
absolute/relative percent difference is a success?
- is it 0.1% change (difference between before and after)
- is it 10% relative change (after-before)/after ?
Yes, we can see more FHR profiles come online but it will be tricky to know if
they came for this hotfix (the numbers are so small).
It would be nice if the FHR profile has a one bit of information : _did they come from this
hotfix prompt?_ (boolean)
Comment 20•10 years ago
|
||
Paul, can you please take ownership of ensuring this gets tested and signed-off?
Flags: needinfo?(paul.silaghi)
QA Contact: paul.silaghi
Comment 22•10 years ago
|
||
Can we get a status update on the testing of this?
Thanks.
Flags: needinfo?(paul.silaghi)
Comment 23•10 years ago
|
||
Actually I'm currently waiting for bug 1014194 and bug 1014187 to get fixed first.
Flags: needinfo?(paul.silaghi)
Comment 24•10 years ago
|
||
This is a two page pdf that shows the percent of ADI on different versions.
Each panel is the % contribution to ADI vs date by the version in the panel.
Steady constant decline over time.
Assignee | ||
Updated•10 years ago
|
Attachment #8455641 -
Attachment mime type: application/x-download → application/pdf
Assignee | ||
Comment 25•10 years ago
|
||
Assignee | ||
Updated•10 years ago
|
Assignee: nobody → gps
Assignee | ||
Comment 26•10 years ago
|
||
The update hotfix is now in production.
I don't see any further use of this bug, so closing.
Status: NEW → RESOLVED
Closed: 10 years ago
Resolution: --- → FIXED
Updated•10 years ago
|
Flags: firefox-backlog+
Whiteboard: p=0
Comment 27•10 years ago
|
||
Paul, can you do some quick smoketesting to make sure this is working in Production?
Flags: needinfo?(paul.silaghi)
Comment 28•10 years ago
|
||
I got one crash while the hotfix was installing on FF 27.0.1 on Win XP.
https://crash-stats.mozilla.com/report/index/d15249a6-4367-4d60-a276-9cde62140717
Don't know if it's related or not to the hotfix, I also couldn't reproduce the crash again.
Otherwise everything works fine in production. Tested on FF 10, 19, 28 Win 7, FF 15, 20.0.1, 27.0.1 Win XP.
Flags: needinfo?(paul.silaghi)
Comment 29•10 years ago
|
||
Can't tell much from the crash report: it's missing module information. I'm inclined to ignore it for now.
Updated•10 years ago
|
Status: RESOLVED → VERIFIED
Comment 30•10 years ago
|
||
Updated data as of 2014-07-20. Note, version 24 is an ESR hence the stable (non decreasing) %.
Assignee | ||
Updated•10 years ago
|
Attachment #8460308 -
Attachment mime type: application/x-download → application/pdf
Comment 31•10 years ago
|
||
Going forward, view this dashboard: https://metrics.mozilla.com/protected/dashboards/adi/ (LDAP protected)
It will be updated about 2-3 times a week (automated)
There is a steady decline of % on older versions, i dont see evidence of that being hastened.
FHR will not capture this information - if it is the profiles first time on FHR, we dont capture the version they updated from.
Comment 32•10 years ago
|
||
This hotfix is causing major problems for one of the large Australian Banks. The Bank uses our software which is based on Firefox running on a USB stick.
https://www.commbank.com.au/business/online-business-services/commbiz/netlock.html
The hotfix is causing a Firefox update to these devices which is making them inoperable, and requiring a USB hardware replacement. A lot of clients are being affected so this is a major problem.
Our software uses a custom update server (set using app.update.url.override), but it seems the hotfix is being applied anyway.
So questions
1/ Is it possible to update the hotfix so that it does not apply when app.update.url.override is set
2/ How do we best configure Firefox in future so that hotfixes like this will never be installed.
Updated•10 years ago
|
Flags: needinfo?(gps)
Comment 33•10 years ago
|
||
This is going to be tricky since there are everyday users that set that pref and forget to unset it that we want to target with this. I'll try to come up with a method for your use case. Are you creating your own update mar files or using Mozilla's?
Flags: needinfo?(gps) → needinfo?(paul.cuthbert)
Comment 34•10 years ago
|
||
If I can get a copy of your custom Firefox distro I might be able to find something else to key off on. Thanks!
Comment 35•10 years ago
|
||
and what Firefox version are you providing and updating users to at this time?
Comment 36•10 years ago
|
||
You can download from:
http://keyvault.com.au/Download/cba/Token_3.0.1500.0.7z
Just extract to a USB key. To launch, lick on NetLock.exe. This performs a quick integrity check on the USB file contents before launching Firefox. The issue is that following a Firefox update, the integrity check fails.
On launch we go to an activation page. Clients authenticate using bank credentials and then client keys and certificates are generated and installed, for mutual SSL there after. Activation also updates the mozilla.cfg and prefs.js settings, so for example updates are enabled.
This image uses Firefox 14.0.1, which granted is old. The bank is currently switching USB hardware to a more sophisticated device that support programmatic read<>read/write switching. The new version uses the latest Firefox.
And thanks for the quick response!
Flags: needinfo?(paul.cuthbert)
Comment 37•10 years ago
|
||
Benjamin, do you know of a better way to handle the use case in comment #36?
Flags: needinfo?(benjamin)
Comment 38•10 years ago
|
||
Some day's ago a reported a nearly simalar problem in an other bug: https://bugzilla.mozilla.org/show_bug.cgi?id=1042099
There my portable profile got to an Update from Firefox.
Comment 39•10 years ago
|
||
Comment 36 is an interesting edge case, but I'm not sure we should fix it. You are after all shipping a branded version of Firefox but then not updating it.
We *could* check the .url.override pref and avoid doing hotfix update if it's pointing at a non-Mozilla server. However, one of the use-cases that we explicitly wanted to fix with the hotfix was users broken because that pref got altered somehow (by addons, 3rd-party software, malware, whatever). I don't think this case is really distinguishable from that case!
Flags: needinfo?(benjamin)
Comment 40•10 years ago
|
||
Can you at least implement a workaround so that the hotfix is not installed if app.update.url.override starts with https://update.commbiz.commbank.com.au? This is affecting a lot of clients for us and requires a hardware replacement in each each, so it's a big deal.
Also, what's the recommended approach in future to disable all updates from anything other than our update server?
Comment 41•10 years ago
|
||
Guys, sorry to be pushy but are you able to help us here? Thanks.
Flags: needinfo?(robert.strong.bugs)
Flags: needinfo?(benjamin)
Comment 42•10 years ago
|
||
For the existing hotfix that was already deployed that ship has already sailed. I'll provide more info in the next day or two after I have time to consider the approaches available.
Flags: needinfo?(robert.strong.bugs)
Flags: needinfo?(benjamin)
You need to log in
before you can comment on or make changes to this bug.
Description
•