| // |
| // Copyright (C) 2012 The Android Open Source Project |
| // |
| // Licensed under the Apache License, Version 2.0 (the "License"); |
| // you may not use this file except in compliance with the License. |
| // You may obtain a copy of the License at |
| // |
| // http://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, software |
| // distributed under the License is distributed on an "AS IS" BASIS, |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| // See the License for the specific language governing permissions and |
| // limitations under the License. |
| // |
| |
| #include "update_engine/cros/real_system_state.h" |
| |
| #include <memory> |
| #include <string> |
| #include <utility> |
| |
| #include <base/bind.h> |
| #include <base/files/file_util.h> |
| #include <base/location.h> |
| #include <base/time/time.h> |
| #include <brillo/message_loops/message_loop.h> |
| #include <chromeos/dbus/service_constants.h> |
| |
| #include "update_engine/common/boot_control.h" |
| #include "update_engine/common/boot_control_stub.h" |
| #include "update_engine/common/constants.h" |
| #include "update_engine/common/dlcservice_interface.h" |
| #include "update_engine/common/hardware.h" |
| #include "update_engine/common/utils.h" |
| #include "update_engine/cros/metrics_reporter_omaha.h" |
| #if USE_DBUS |
| #include "update_engine/cros/dbus_connection.h" |
| #endif // USE_DBUS |
| #include "update_engine/update_manager/state_factory.h" |
| |
| namespace chromeos_update_engine { |
| |
| bool RealSystemState::Initialize() { |
| boot_control_ = boot_control::CreateBootControl(); |
| if (!boot_control_) { |
| LOG(WARNING) << "Unable to create BootControl instance, using stub " |
| << "instead. All update attempts will fail."; |
| boot_control_ = std::make_unique<BootControlStub>(); |
| } |
| |
| hardware_ = hardware::CreateHardware(); |
| if (!hardware_) { |
| LOG(ERROR) << "Error initializing the HardwareInterface."; |
| return false; |
| } |
| |
| kiosk_app_proxy_.reset(new org::chromium::KioskAppServiceInterfaceProxy( |
| DBusConnection::Get()->GetDBus(), chromeos::kKioskAppServiceName)); |
| |
| LOG_IF(INFO, !hardware_->IsNormalBootMode()) << "Booted in dev mode."; |
| LOG_IF(INFO, !hardware_->IsOfficialBuild()) << "Booted non-official build."; |
| |
| connection_manager_ = connection_manager::CreateConnectionManager(); |
| if (!connection_manager_) { |
| LOG(ERROR) << "Error initializing the ConnectionManagerInterface."; |
| return false; |
| } |
| |
| power_manager_ = power_manager::CreatePowerManager(); |
| if (!power_manager_) { |
| LOG(ERROR) << "Error initializing the PowerManagerInterface."; |
| return false; |
| } |
| |
| dlcservice_ = CreateDlcService(); |
| if (!dlcservice_) { |
| LOG(ERROR) << "Error initializing the DlcServiceInterface."; |
| return false; |
| } |
| |
| // Initialize standard and powerwash-safe prefs. |
| base::FilePath non_volatile_path; |
| // TODO(deymo): Fall back to in-memory prefs if there's no physical directory |
| // available. |
| if (!hardware_->GetNonVolatileDirectory(&non_volatile_path)) { |
| LOG(ERROR) << "Failed to get a non-volatile directory."; |
| return false; |
| } |
| Prefs* prefs; |
| prefs_.reset(prefs = new Prefs()); |
| if (!prefs->Init(non_volatile_path.Append(kPrefsSubDirectory))) { |
| LOG(ERROR) << "Failed to initialize preferences."; |
| return false; |
| } |
| |
| base::FilePath powerwash_safe_path; |
| if (!hardware_->GetPowerwashSafeDirectory(&powerwash_safe_path)) { |
| // TODO(deymo): Fall-back to in-memory prefs if there's no powerwash-safe |
| // directory, or disable powerwash feature. |
| powerwash_safe_path = non_volatile_path.Append("powerwash-safe"); |
| LOG(WARNING) << "No powerwash-safe directory, using non-volatile one."; |
| } |
| powerwash_safe_prefs_.reset(prefs = new Prefs()); |
| if (!prefs->Init( |
| powerwash_safe_path.Append(kPowerwashSafePrefsSubDirectory))) { |
| LOG(ERROR) << "Failed to initialize powerwash preferences."; |
| return false; |
| } |
| |
| // Check the system rebooted marker file. |
| std::string boot_id; |
| if (utils::GetBootId(&boot_id)) { |
| std::string prev_boot_id; |
| system_rebooted_ = (!prefs_->GetString(kPrefsBootId, &prev_boot_id) || |
| prev_boot_id != boot_id); |
| prefs_->SetString(kPrefsBootId, boot_id); |
| } else { |
| LOG(WARNING) << "Couldn't detect the bootid, assuming system was rebooted."; |
| system_rebooted_ = true; |
| } |
| |
| // Initialize the OmahaRequestParams with the default settings. These settings |
| // will be re-initialized before every request using the actual request |
| // options. This initialization here pre-loads current channel and version, so |
| // the DBus service can access it. |
| if (!request_params_.Init("", "", {})) { |
| LOG(WARNING) << "Ignoring OmahaRequestParams initialization error. Some " |
| "features might not work properly."; |
| } |
| |
| certificate_checker_.reset( |
| new CertificateChecker(prefs_.get(), &openssl_wrapper_)); |
| certificate_checker_->Init(); |
| |
| update_attempter_.reset(new UpdateAttempter(certificate_checker_.get())); |
| |
| // Initialize the UpdateAttempter before the UpdateManager. |
| update_attempter_->Init(); |
| |
| // Initialize the Update Manager using the default state factory. |
| chromeos_update_manager::State* um_state = |
| chromeos_update_manager::DefaultStateFactory(&policy_provider_, |
| kiosk_app_proxy_.get()); |
| |
| if (!um_state) { |
| LOG(ERROR) << "Failed to initialize the Update Manager."; |
| return false; |
| } |
| update_manager_.reset(new chromeos_update_manager::UpdateManager( |
| base::TimeDelta::FromSeconds(5), |
| base::TimeDelta::FromHours(12), |
| um_state)); |
| |
| // The P2P Manager depends on the Update Manager for its initialization. |
| p2p_manager_.reset( |
| P2PManager::Construct(nullptr, |
| update_manager_.get(), |
| "cros_au", |
| kMaxP2PFilesToKeep, |
| base::TimeDelta::FromDays(kMaxP2PFileAgeDays))); |
| |
| if (!payload_state_.Initialize()) { |
| LOG(ERROR) << "Failed to initialize the payload state object."; |
| return false; |
| } |
| |
| // For images that are build for debugging purposes like test images |
| // initialize max kernel key version to 0xfffffffe, which is logical infinity. |
| if (!hardware_->IsOfficialBuild()) { |
| if (!hardware()->SetMaxKernelKeyRollforward( |
| chromeos_update_manager::kRollforwardInfinity)) { |
| LOG(ERROR) << "Failed to set kernel_max_rollforward to infinity for" |
| << " device with test/dev image."; |
| } |
| } |
| |
| // All is well. Initialization successful. |
| return true; |
| } |
| |
| } // namespace chromeos_update_engine |