|  | // | 
|  | // Copyright (C) 2012 The Android Open Source Project | 
|  | // | 
|  | // Licensed under the Apache License, Version 2.0 (the "License"); | 
|  | // you may not use this file except in compliance with the License. | 
|  | // You may obtain a copy of the License at | 
|  | // | 
|  | //      http://www.apache.org/licenses/LICENSE-2.0 | 
|  | // | 
|  | // Unless required by applicable law or agreed to in writing, software | 
|  | // distributed under the License is distributed on an "AS IS" BASIS, | 
|  | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
|  | // See the License for the specific language governing permissions and | 
|  | // limitations under the License. | 
|  | // | 
|  |  | 
|  | #include "update_engine/real_system_state.h" | 
|  |  | 
|  | #include <memory> | 
|  | #include <string> | 
|  | #include <utility> | 
|  |  | 
|  | #include <base/bind.h> | 
|  | #include <base/files/file_util.h> | 
|  | #include <base/location.h> | 
|  | #include <base/time/time.h> | 
|  | #include <brillo/message_loops/message_loop.h> | 
|  | #if USE_CHROME_KIOSK_APP | 
|  | #include <chromeos/dbus/service_constants.h> | 
|  | #endif  // USE_CHROME_KIOSK_APP | 
|  |  | 
|  | #include "update_engine/common/boot_control.h" | 
|  | #include "update_engine/common/boot_control_stub.h" | 
|  | #include "update_engine/common/constants.h" | 
|  | #include "update_engine/common/dlcservice_interface.h" | 
|  | #include "update_engine/common/hardware.h" | 
|  | #include "update_engine/common/utils.h" | 
|  | #include "update_engine/metrics_reporter_omaha.h" | 
|  | #include "update_engine/update_boot_flags_action.h" | 
|  | #if USE_DBUS | 
|  | #include "update_engine/dbus_connection.h" | 
|  | #endif  // USE_DBUS | 
|  | #include "update_engine/update_manager/state_factory.h" | 
|  |  | 
|  | using brillo::MessageLoop; | 
|  |  | 
|  | namespace chromeos_update_engine { | 
|  |  | 
|  | RealSystemState::~RealSystemState() { | 
|  | // Prevent any DBus communication from UpdateAttempter when shutting down the | 
|  | // daemon. | 
|  | if (update_attempter_) | 
|  | update_attempter_->ClearObservers(); | 
|  | } | 
|  |  | 
|  | bool RealSystemState::Initialize() { | 
|  | boot_control_ = boot_control::CreateBootControl(); | 
|  | if (!boot_control_) { | 
|  | LOG(WARNING) << "Unable to create BootControl instance, using stub " | 
|  | << "instead. All update attempts will fail."; | 
|  | boot_control_ = std::make_unique<BootControlStub>(); | 
|  | } | 
|  |  | 
|  | hardware_ = hardware::CreateHardware(); | 
|  | if (!hardware_) { | 
|  | LOG(ERROR) << "Error initializing the HardwareInterface."; | 
|  | return false; | 
|  | } | 
|  |  | 
|  | #if USE_CHROME_KIOSK_APP | 
|  | kiosk_app_proxy_.reset(new org::chromium::KioskAppServiceInterfaceProxy( | 
|  | DBusConnection::Get()->GetDBus(), chromeos::kKioskAppServiceName)); | 
|  | #endif  // USE_CHROME_KIOSK_APP | 
|  |  | 
|  | LOG_IF(INFO, !hardware_->IsNormalBootMode()) << "Booted in dev mode."; | 
|  | LOG_IF(INFO, !hardware_->IsOfficialBuild()) << "Booted non-official build."; | 
|  |  | 
|  | connection_manager_ = connection_manager::CreateConnectionManager(this); | 
|  | if (!connection_manager_) { | 
|  | LOG(ERROR) << "Error initializing the ConnectionManagerInterface."; | 
|  | return false; | 
|  | } | 
|  |  | 
|  | power_manager_ = power_manager::CreatePowerManager(); | 
|  | if (!power_manager_) { | 
|  | LOG(ERROR) << "Error initializing the PowerManagerInterface."; | 
|  | return false; | 
|  | } | 
|  |  | 
|  | dlcservice_ = CreateDlcService(); | 
|  | if (!dlcservice_) { | 
|  | LOG(ERROR) << "Error initializing the DlcServiceInterface."; | 
|  | return false; | 
|  | } | 
|  |  | 
|  | // Initialize standard and powerwash-safe prefs. | 
|  | base::FilePath non_volatile_path; | 
|  | // TODO(deymo): Fall back to in-memory prefs if there's no physical directory | 
|  | // available. | 
|  | if (!hardware_->GetNonVolatileDirectory(&non_volatile_path)) { | 
|  | LOG(ERROR) << "Failed to get a non-volatile directory."; | 
|  | return false; | 
|  | } | 
|  | Prefs* prefs; | 
|  | prefs_.reset(prefs = new Prefs()); | 
|  | if (!prefs->Init(non_volatile_path.Append(kPrefsSubDirectory))) { | 
|  | LOG(ERROR) << "Failed to initialize preferences."; | 
|  | return false; | 
|  | } | 
|  |  | 
|  | base::FilePath powerwash_safe_path; | 
|  | if (!hardware_->GetPowerwashSafeDirectory(&powerwash_safe_path)) { | 
|  | // TODO(deymo): Fall-back to in-memory prefs if there's no powerwash-safe | 
|  | // directory, or disable powerwash feature. | 
|  | powerwash_safe_path = non_volatile_path.Append("powerwash-safe"); | 
|  | LOG(WARNING) << "No powerwash-safe directory, using non-volatile one."; | 
|  | } | 
|  | powerwash_safe_prefs_.reset(prefs = new Prefs()); | 
|  | if (!prefs->Init( | 
|  | powerwash_safe_path.Append(kPowerwashSafePrefsSubDirectory))) { | 
|  | LOG(ERROR) << "Failed to initialize powerwash preferences."; | 
|  | return false; | 
|  | } | 
|  |  | 
|  | // Check the system rebooted marker file. | 
|  | std::string boot_id; | 
|  | if (utils::GetBootId(&boot_id)) { | 
|  | std::string prev_boot_id; | 
|  | system_rebooted_ = (!prefs_->GetString(kPrefsBootId, &prev_boot_id) || | 
|  | prev_boot_id != boot_id); | 
|  | prefs_->SetString(kPrefsBootId, boot_id); | 
|  | } else { | 
|  | LOG(WARNING) << "Couldn't detect the bootid, assuming system was rebooted."; | 
|  | system_rebooted_ = true; | 
|  | } | 
|  |  | 
|  | // Initialize the OmahaRequestParams with the default settings. These settings | 
|  | // will be re-initialized before every request using the actual request | 
|  | // options. This initialization here pre-loads current channel and version, so | 
|  | // the DBus service can access it. | 
|  | if (!request_params_.Init("", "", false)) { | 
|  | LOG(WARNING) << "Ignoring OmahaRequestParams initialization error. Some " | 
|  | "features might not work properly."; | 
|  | } | 
|  |  | 
|  | certificate_checker_.reset( | 
|  | new CertificateChecker(prefs_.get(), &openssl_wrapper_)); | 
|  | certificate_checker_->Init(); | 
|  |  | 
|  | update_attempter_.reset( | 
|  | new UpdateAttempter(this, certificate_checker_.get())); | 
|  |  | 
|  | // Initialize the UpdateAttempter before the UpdateManager. | 
|  | update_attempter_->Init(); | 
|  |  | 
|  | // Initialize the Update Manager using the default state factory. | 
|  | chromeos_update_manager::State* um_state = | 
|  | chromeos_update_manager::DefaultStateFactory(&policy_provider_, | 
|  | #if USE_CHROME_KIOSK_APP | 
|  | kiosk_app_proxy_.get(), | 
|  | #else | 
|  | nullptr, | 
|  | #endif  // USE_CHROME_KIOSK_APP | 
|  | this); | 
|  |  | 
|  | if (!um_state) { | 
|  | LOG(ERROR) << "Failed to initialize the Update Manager."; | 
|  | return false; | 
|  | } | 
|  | update_manager_.reset(new chromeos_update_manager::UpdateManager( | 
|  | &clock_, | 
|  | base::TimeDelta::FromSeconds(5), | 
|  | base::TimeDelta::FromHours(12), | 
|  | um_state)); | 
|  |  | 
|  | // The P2P Manager depends on the Update Manager for its initialization. | 
|  | p2p_manager_.reset( | 
|  | P2PManager::Construct(nullptr, | 
|  | &clock_, | 
|  | update_manager_.get(), | 
|  | "cros_au", | 
|  | kMaxP2PFilesToKeep, | 
|  | base::TimeDelta::FromDays(kMaxP2PFileAgeDays))); | 
|  |  | 
|  | if (!payload_state_.Initialize(this)) { | 
|  | LOG(ERROR) << "Failed to initialize the payload state object."; | 
|  | return false; | 
|  | } | 
|  |  | 
|  | // For images that are build for debugging purposes like test images | 
|  | // initialize max kernel key version to 0xfffffffe, which is logical infinity. | 
|  | if (!hardware_->IsOfficialBuild()) { | 
|  | if (!hardware()->SetMaxKernelKeyRollforward( | 
|  | chromeos_update_manager::kRollforwardInfinity)) { | 
|  | LOG(ERROR) << "Failed to set kernel_max_rollforward to infinity for" | 
|  | << " device with test/dev image."; | 
|  | } | 
|  | } | 
|  |  | 
|  | // All is well. Initialization successful. | 
|  | return true; | 
|  | } | 
|  |  | 
|  | bool RealSystemState::StartUpdater() { | 
|  | // Initiate update checks. | 
|  | update_attempter_->ScheduleUpdates(); | 
|  |  | 
|  | auto update_boot_flags_action = | 
|  | std::make_unique<UpdateBootFlagsAction>(boot_control_.get()); | 
|  | processor_.EnqueueAction(std::move(update_boot_flags_action)); | 
|  | // Update boot flags after 45 seconds. | 
|  | MessageLoop::current()->PostDelayedTask( | 
|  | FROM_HERE, | 
|  | base::Bind(&ActionProcessor::StartProcessing, | 
|  | base::Unretained(&processor_)), | 
|  | base::TimeDelta::FromSeconds(45)); | 
|  |  | 
|  | // Broadcast the update engine status on startup to ensure consistent system | 
|  | // state on crashes. | 
|  | MessageLoop::current()->PostTask( | 
|  | FROM_HERE, | 
|  | base::Bind(&UpdateAttempter::BroadcastStatus, | 
|  | base::Unretained(update_attempter_.get()))); | 
|  |  | 
|  | // Run the UpdateEngineStarted() method on |update_attempter|. | 
|  | MessageLoop::current()->PostTask( | 
|  | FROM_HERE, | 
|  | base::Bind(&UpdateAttempter::UpdateEngineStarted, | 
|  | base::Unretained(update_attempter_.get()))); | 
|  | return true; | 
|  | } | 
|  |  | 
|  | void RealSystemState::AddObserver(ServiceObserverInterface* observer) { | 
|  | CHECK(update_attempter_.get()); | 
|  | update_attempter_->AddObserver(observer); | 
|  | } | 
|  |  | 
|  | void RealSystemState::RemoveObserver(ServiceObserverInterface* observer) { | 
|  | CHECK(update_attempter_.get()); | 
|  | update_attempter_->RemoveObserver(observer); | 
|  | } | 
|  |  | 
|  | }  // namespace chromeos_update_engine |