|  | // | 
|  | // Copyright (C) 2012 The Android Open Source Project | 
|  | // | 
|  | // Licensed under the Apache License, Version 2.0 (the "License"); | 
|  | // you may not use this file except in compliance with the License. | 
|  | // You may obtain a copy of the License at | 
|  | // | 
|  | //      http://www.apache.org/licenses/LICENSE-2.0 | 
|  | // | 
|  | // Unless required by applicable law or agreed to in writing, software | 
|  | // distributed under the License is distributed on an "AS IS" BASIS, | 
|  | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
|  | // See the License for the specific language governing permissions and | 
|  | // limitations under the License. | 
|  | // | 
|  |  | 
|  | #include "update_engine/cros/real_system_state.h" | 
|  |  | 
|  | #include <memory> | 
|  | #include <string> | 
|  | #include <utility> | 
|  |  | 
|  | #include <base/bind.h> | 
|  | #include <base/files/file_util.h> | 
|  | #include <base/location.h> | 
|  | #include <base/time/time.h> | 
|  | #include <brillo/message_loops/message_loop.h> | 
|  | #include <chromeos/dbus/service_constants.h> | 
|  |  | 
|  | #include "update_engine/common/boot_control.h" | 
|  | #include "update_engine/common/boot_control_stub.h" | 
|  | #include "update_engine/common/constants.h" | 
|  | #include "update_engine/common/dlcservice_interface.h" | 
|  | #include "update_engine/common/hardware.h" | 
|  | #include "update_engine/common/utils.h" | 
|  | #include "update_engine/cros/metrics_reporter_omaha.h" | 
|  | #if USE_DBUS | 
|  | #include "update_engine/cros/dbus_connection.h" | 
|  | #endif  // USE_DBUS | 
|  | #include "update_engine/update_manager/state_factory.h" | 
|  |  | 
|  | namespace chromeos_update_engine { | 
|  |  | 
|  | bool RealSystemState::Initialize() { | 
|  | boot_control_ = boot_control::CreateBootControl(); | 
|  | if (!boot_control_) { | 
|  | LOG(WARNING) << "Unable to create BootControl instance, using stub " | 
|  | << "instead. All update attempts will fail."; | 
|  | boot_control_ = std::make_unique<BootControlStub>(); | 
|  | } | 
|  |  | 
|  | hardware_ = hardware::CreateHardware(); | 
|  | if (!hardware_) { | 
|  | LOG(ERROR) << "Error initializing the HardwareInterface."; | 
|  | return false; | 
|  | } | 
|  |  | 
|  | kiosk_app_proxy_.reset(new org::chromium::KioskAppServiceInterfaceProxy( | 
|  | DBusConnection::Get()->GetDBus(), chromeos::kKioskAppServiceName)); | 
|  |  | 
|  | LOG_IF(INFO, !hardware_->IsNormalBootMode()) << "Booted in dev mode."; | 
|  | LOG_IF(INFO, !hardware_->IsOfficialBuild()) << "Booted non-official build."; | 
|  |  | 
|  | connection_manager_ = connection_manager::CreateConnectionManager(); | 
|  | if (!connection_manager_) { | 
|  | LOG(ERROR) << "Error initializing the ConnectionManagerInterface."; | 
|  | return false; | 
|  | } | 
|  |  | 
|  | power_manager_ = power_manager::CreatePowerManager(); | 
|  | if (!power_manager_) { | 
|  | LOG(ERROR) << "Error initializing the PowerManagerInterface."; | 
|  | return false; | 
|  | } | 
|  |  | 
|  | dlcservice_ = CreateDlcService(); | 
|  | if (!dlcservice_) { | 
|  | LOG(ERROR) << "Error initializing the DlcServiceInterface."; | 
|  | return false; | 
|  | } | 
|  |  | 
|  | // Initialize standard and powerwash-safe prefs. | 
|  | base::FilePath non_volatile_path; | 
|  | // TODO(deymo): Fall back to in-memory prefs if there's no physical directory | 
|  | // available. | 
|  | if (!hardware_->GetNonVolatileDirectory(&non_volatile_path)) { | 
|  | LOG(ERROR) << "Failed to get a non-volatile directory."; | 
|  | return false; | 
|  | } | 
|  | Prefs* prefs; | 
|  | prefs_.reset(prefs = new Prefs()); | 
|  | if (!prefs->Init(non_volatile_path.Append(kPrefsSubDirectory))) { | 
|  | LOG(ERROR) << "Failed to initialize preferences."; | 
|  | return false; | 
|  | } | 
|  |  | 
|  | base::FilePath powerwash_safe_path; | 
|  | if (!hardware_->GetPowerwashSafeDirectory(&powerwash_safe_path)) { | 
|  | // TODO(deymo): Fall-back to in-memory prefs if there's no powerwash-safe | 
|  | // directory, or disable powerwash feature. | 
|  | powerwash_safe_path = non_volatile_path.Append("powerwash-safe"); | 
|  | LOG(WARNING) << "No powerwash-safe directory, using non-volatile one."; | 
|  | } | 
|  | powerwash_safe_prefs_.reset(prefs = new Prefs()); | 
|  | if (!prefs->Init( | 
|  | powerwash_safe_path.Append(kPowerwashSafePrefsSubDirectory))) { | 
|  | LOG(ERROR) << "Failed to initialize powerwash preferences."; | 
|  | return false; | 
|  | } | 
|  |  | 
|  | // Check the system rebooted marker file. | 
|  | std::string boot_id; | 
|  | if (utils::GetBootId(&boot_id)) { | 
|  | std::string prev_boot_id; | 
|  | system_rebooted_ = (!prefs_->GetString(kPrefsBootId, &prev_boot_id) || | 
|  | prev_boot_id != boot_id); | 
|  | prefs_->SetString(kPrefsBootId, boot_id); | 
|  | } else { | 
|  | LOG(WARNING) << "Couldn't detect the bootid, assuming system was rebooted."; | 
|  | system_rebooted_ = true; | 
|  | } | 
|  |  | 
|  | // Initialize the OmahaRequestParams with the default settings. These settings | 
|  | // will be re-initialized before every request using the actual request | 
|  | // options. This initialization here pre-loads current channel and version, so | 
|  | // the DBus service can access it. | 
|  | if (!request_params_.Init("", "", {})) { | 
|  | LOG(WARNING) << "Ignoring OmahaRequestParams initialization error. Some " | 
|  | "features might not work properly."; | 
|  | } | 
|  |  | 
|  | certificate_checker_.reset( | 
|  | new CertificateChecker(prefs_.get(), &openssl_wrapper_)); | 
|  | certificate_checker_->Init(); | 
|  |  | 
|  | update_attempter_.reset(new UpdateAttempter(certificate_checker_.get())); | 
|  |  | 
|  | // Initialize the UpdateAttempter before the UpdateManager. | 
|  | update_attempter_->Init(); | 
|  |  | 
|  | // Initialize the Update Manager using the default state factory. | 
|  | chromeos_update_manager::State* um_state = | 
|  | chromeos_update_manager::DefaultStateFactory(&policy_provider_, | 
|  | kiosk_app_proxy_.get()); | 
|  |  | 
|  | if (!um_state) { | 
|  | LOG(ERROR) << "Failed to initialize the Update Manager."; | 
|  | return false; | 
|  | } | 
|  | update_manager_.reset(new chromeos_update_manager::UpdateManager( | 
|  | base::TimeDelta::FromSeconds(5), | 
|  | base::TimeDelta::FromHours(12), | 
|  | um_state)); | 
|  |  | 
|  | // The P2P Manager depends on the Update Manager for its initialization. | 
|  | p2p_manager_.reset( | 
|  | P2PManager::Construct(nullptr, | 
|  | update_manager_.get(), | 
|  | "cros_au", | 
|  | kMaxP2PFilesToKeep, | 
|  | base::TimeDelta::FromDays(kMaxP2PFileAgeDays))); | 
|  |  | 
|  | if (!payload_state_.Initialize()) { | 
|  | LOG(ERROR) << "Failed to initialize the payload state object."; | 
|  | return false; | 
|  | } | 
|  |  | 
|  | // For images that are build for debugging purposes like test images | 
|  | // initialize max kernel key version to 0xfffffffe, which is logical infinity. | 
|  | if (!hardware_->IsOfficialBuild()) { | 
|  | if (!hardware()->SetMaxKernelKeyRollforward( | 
|  | chromeos_update_manager::kRollforwardInfinity)) { | 
|  | LOG(ERROR) << "Failed to set kernel_max_rollforward to infinity for" | 
|  | << " device with test/dev image."; | 
|  | } | 
|  | } | 
|  |  | 
|  | // All is well. Initialization successful. | 
|  | return true; | 
|  | } | 
|  |  | 
|  | }  // namespace chromeos_update_engine |