blob: b9ffa2c3d868cf492291dda5b4f9e5bceeef7318 [file] [log] [blame]
Alex Deymoaea4c1c2015-08-19 20:24:43 -07001//
2// Copyright (C) 2012 The Android Open Source Project
3//
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at
7//
8// http://www.apache.org/licenses/LICENSE-2.0
9//
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15//
Jay Srinivasan43488792012-06-19 00:25:31 -070016
Alex Deymo94c06162014-03-21 20:34:46 -070017#include "update_engine/real_system_state.h"
18
Alex Deymof7ead812015-10-23 17:37:27 -070019#include <string>
20
Alex Deymoe97b39c2016-01-20 13:22:17 -080021#include <base/bind.h>
Ben Chan06c76a42014-09-05 08:21:06 -070022#include <base/files/file_util.h>
Alex Deymoe97b39c2016-01-20 13:22:17 -080023#include <base/location.h>
Gilad Arnoldb2271992014-06-19 12:35:24 -070024#include <base/time/time.h>
David Zeuthen6eddf262015-10-16 15:23:53 -040025#include <brillo/make_unique_ptr.h>
Alex Deymoe97b39c2016-01-20 13:22:17 -080026#include <brillo/message_loops/message_loop.h>
Amin Hassanie94ece52017-08-01 15:03:08 -070027#if USE_CHROME_KIOSK_APP || USE_CHROME_NETWORK_PROXY
Daniel Erate5f6f252017-04-20 12:09:58 -060028#include <chromeos/dbus/service_constants.h>
Amin Hassanie94ece52017-08-01 15:03:08 -070029#endif // USE_CHROME_KIOSK_APP || USE_CHROME_NETWORK_PROXY
Jay Srinivasan43488792012-06-19 00:25:31 -070030
Alex Deymo39910dc2015-11-09 17:04:30 -080031#include "update_engine/common/boot_control.h"
32#include "update_engine/common/boot_control_stub.h"
33#include "update_engine/common/constants.h"
34#include "update_engine/common/hardware.h"
35#include "update_engine/common/utils.h"
Tianjie Xu282aa1f2017-09-05 13:42:45 -070036#include "update_engine/metrics_reporter_omaha.h"
Daniel Erate5f6f252017-04-20 12:09:58 -060037#if USE_DBUS
38#include "update_engine/dbus_connection.h"
39#endif // USE_DBUS
Alex Deymo63784a52014-05-28 10:46:14 -070040#include "update_engine/update_manager/state_factory.h"
Jay Srinivasan43488792012-06-19 00:25:31 -070041
Alex Deymoe97b39c2016-01-20 13:22:17 -080042using brillo::MessageLoop;
43
Jay Srinivasan43488792012-06-19 00:25:31 -070044namespace chromeos_update_engine {
45
Alex Deymo8c21b352016-01-20 16:38:33 -080046RealSystemState::~RealSystemState() {
47 // Prevent any DBus communication from UpdateAttempter when shutting down the
48 // daemon.
49 if (update_attempter_)
Alex Deymofa78f142016-01-26 21:36:16 -080050 update_attempter_->ClearObservers();
Alex Deymo8c21b352016-01-20 16:38:33 -080051}
52
Nam T. Nguyen7d623eb2014-05-13 16:06:28 -070053bool RealSystemState::Initialize() {
Tianjie Xu282aa1f2017-09-05 13:42:45 -070054 metrics_reporter_.Initialize();
Jay Srinivasan6f6ea002012-12-14 11:26:28 -080055
Alex Deymob17327c2015-09-04 10:29:00 -070056 boot_control_ = boot_control::CreateBootControl();
David Zeuthen6eddf262015-10-16 15:23:53 -040057 if (!boot_control_) {
58 LOG(WARNING) << "Unable to create BootControl instance, using stub "
59 << "instead. All update attempts will fail.";
60 boot_control_ = brillo::make_unique_ptr(new BootControlStub());
61 }
Alex Deymo763e7db2015-08-27 21:08:08 -070062
Alex Deymo40d86b22015-09-03 22:27:10 -070063 hardware_ = hardware::CreateHardware();
64 if (!hardware_) {
65 LOG(ERROR) << "Error intializing the HardwareInterface.";
66 return false;
67 }
68
Amin Hassanie94ece52017-08-01 15:03:08 -070069#if USE_CHROME_KIOSK_APP
Daniel Erate5f6f252017-04-20 12:09:58 -060070 libcros_proxy_.reset(new org::chromium::LibCrosServiceInterfaceProxy(
71 DBusConnection::Get()->GetDBus(), chromeos::kLibCrosServiceName));
Amin Hassanie94ece52017-08-01 15:03:08 -070072#endif // USE_CHROME_KIOSK_APP
73#if USE_CHROME_NETWORK_PROXY
Daniel Erate5f6f252017-04-20 12:09:58 -060074 network_proxy_service_proxy_.reset(
75 new org::chromium::NetworkProxyServiceInterfaceProxy(
76 DBusConnection::Get()->GetDBus(),
77 chromeos::kNetworkProxyServiceName));
Amin Hassanie94ece52017-08-01 15:03:08 -070078#endif // USE_CHROME_NETWORK_PROXY
Daniel Erate5f6f252017-04-20 12:09:58 -060079
Alex Deymo1c4e84a2015-09-22 16:58:10 -070080 LOG_IF(INFO, !hardware_->IsNormalBootMode()) << "Booted in dev mode.";
81 LOG_IF(INFO, !hardware_->IsOfficialBuild()) << "Booted non-official build.";
82
Sen Jiangf5bebae2016-06-03 15:36:54 -070083 connection_manager_ = connection_manager::CreateConnectionManager(this);
84 if (!connection_manager_) {
85 LOG(ERROR) << "Error intializing the ConnectionManagerInterface.";
Alex Deymo30534502015-07-20 15:06:33 -070086 return false;
87 }
88
Sen Jiangb8c6a8f2016-06-07 17:33:17 -070089 power_manager_ = power_manager::CreatePowerManager();
90 if (!power_manager_) {
91 LOG(ERROR) << "Error intializing the PowerManagerInterface.";
92 return false;
93 }
94
Alex Deymodd132f32015-09-14 19:12:07 -070095 // Initialize standard and powerwash-safe prefs.
96 base::FilePath non_volatile_path;
97 // TODO(deymo): Fall back to in-memory prefs if there's no physical directory
98 // available.
99 if (!hardware_->GetNonVolatileDirectory(&non_volatile_path)) {
100 LOG(ERROR) << "Failed to get a non-volatile directory.";
101 return false;
102 }
103 Prefs* prefs;
104 prefs_.reset(prefs = new Prefs());
105 if (!prefs->Init(non_volatile_path.Append(kPrefsSubDirectory))) {
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800106 LOG(ERROR) << "Failed to initialize preferences.";
107 return false;
108 }
109
Alex Deymodd132f32015-09-14 19:12:07 -0700110 base::FilePath powerwash_safe_path;
111 if (!hardware_->GetPowerwashSafeDirectory(&powerwash_safe_path)) {
112 // TODO(deymo): Fall-back to in-memory prefs if there's no powerwash-safe
113 // directory, or disable powerwash feature.
114 powerwash_safe_path = non_volatile_path.Append("powerwash-safe");
115 LOG(WARNING) << "No powerwash-safe directory, using non-volatile one.";
116 }
117 powerwash_safe_prefs_.reset(prefs = new Prefs());
118 if (!prefs->Init(
119 powerwash_safe_path.Append(kPowerwashSafePrefsSubDirectory))) {
Chris Sosaaa18e162013-06-20 13:20:30 -0700120 LOG(ERROR) << "Failed to initialize powerwash preferences.";
121 return false;
122 }
123
Alex Deymodd132f32015-09-14 19:12:07 -0700124 // Check the system rebooted marker file.
125 std::string boot_id;
126 if (utils::GetBootId(&boot_id)) {
127 std::string prev_boot_id;
128 system_rebooted_ = (!prefs_->GetString(kPrefsBootId, &prev_boot_id) ||
129 prev_boot_id != boot_id);
130 prefs_->SetString(kPrefsBootId, boot_id);
131 } else {
132 LOG(WARNING) << "Couldn't detect the bootid, assuming system was rebooted.";
Chris Sosabe45bef2013-04-09 18:25:12 -0700133 system_rebooted_ = true;
134 }
135
Alex Deymo5378f5e2015-11-10 15:02:50 -0800136 // Initialize the OmahaRequestParams with the default settings. These settings
137 // will be re-initialized before every request using the actual request
138 // options. This initialization here pre-loads current channel and version, so
139 // the DBus service can access it.
140 if (!request_params_.Init("", "", false)) {
141 LOG(WARNING) << "Ignoring OmahaRequestParams initialization error. Some "
142 "features might not work properly.";
143 }
144
Alex Deymo33e91e72015-12-01 18:26:08 -0300145 certificate_checker_.reset(
146 new CertificateChecker(prefs_.get(), &openssl_wrapper_));
147 certificate_checker_->Init();
148
Amin Hassanie94ece52017-08-01 15:03:08 -0700149 update_attempter_.reset(
150 new UpdateAttempter(this,
151 certificate_checker_.get(),
152#if USE_CHROME_NETWORK_PROXY
153 network_proxy_service_proxy_.get()));
Sen Jiangc92195c2016-06-13 15:48:44 -0700154#else
Alex Deymo209e57a2017-08-23 19:23:00 +0200155 nullptr));
Amin Hassanie94ece52017-08-01 15:03:08 -0700156#endif // USE_CHROME_NETWORK_PROXY
Sen Jiangc92195c2016-06-13 15:48:44 -0700157
Alex Deymo33e91e72015-12-01 18:26:08 -0300158 // Initialize the UpdateAttempter before the UpdateManager.
Alex Deymo33e91e72015-12-01 18:26:08 -0300159 update_attempter_->Init();
160
Alex Deymo63784a52014-05-28 10:46:14 -0700161 // Initialize the Update Manager using the default state factory.
162 chromeos_update_manager::State* um_state =
Amin Hassanie94ece52017-08-01 15:03:08 -0700163 chromeos_update_manager::DefaultStateFactory(&policy_provider_,
164#if USE_CHROME_KIOSK_APP
165 libcros_proxy_.get(),
166#else
167 nullptr,
168#endif // USE_CHROME_KIOSK_APP
169 this);
170
Alex Deymo63784a52014-05-28 10:46:14 -0700171 if (!um_state) {
172 LOG(ERROR) << "Failed to initialize the Update Manager.";
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800173 return false;
Gilad Arnold1f847232014-04-07 12:07:49 -0700174 }
Alex Deymo63784a52014-05-28 10:46:14 -0700175 update_manager_.reset(
Gilad Arnoldb2271992014-06-19 12:35:24 -0700176 new chromeos_update_manager::UpdateManager(
Gilad Arnoldfd45a732014-08-07 15:53:46 -0700177 &clock_, base::TimeDelta::FromSeconds(5),
178 base::TimeDelta::FromHours(12), um_state));
Gilad Arnold1f847232014-04-07 12:07:49 -0700179
Gilad Arnold4a0321b2014-10-28 15:57:30 -0700180 // The P2P Manager depends on the Update Manager for its initialization.
181 p2p_manager_.reset(P2PManager::Construct(
182 nullptr, &clock_, update_manager_.get(), "cros_au",
183 kMaxP2PFilesToKeep, base::TimeDelta::FromDays(kMaxP2PFileAgeDays)));
184
Gilad Arnold1f847232014-04-07 12:07:49 -0700185 if (!payload_state_.Initialize(this)) {
186 LOG(ERROR) << "Failed to initialize the payload state object.";
187 return false;
188 }
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800189
190 // All is well. Initialization successful.
191 return true;
192}
Jay Srinivasan43488792012-06-19 00:25:31 -0700193
Alex Deymofa78f142016-01-26 21:36:16 -0800194bool RealSystemState::StartUpdater() {
Alex Deymoe97b39c2016-01-20 13:22:17 -0800195 // Initiate update checks.
196 update_attempter_->ScheduleUpdates();
197
198 // Update boot flags after 45 seconds.
199 MessageLoop::current()->PostDelayedTask(
200 FROM_HERE,
201 base::Bind(&UpdateAttempter::UpdateBootFlags,
202 base::Unretained(update_attempter_.get())),
203 base::TimeDelta::FromSeconds(45));
204
205 // Broadcast the update engine status on startup to ensure consistent system
206 // state on crashes.
207 MessageLoop::current()->PostTask(FROM_HERE, base::Bind(
208 &UpdateAttempter::BroadcastStatus,
209 base::Unretained(update_attempter_.get())));
210
211 // Run the UpdateEngineStarted() method on |update_attempter|.
212 MessageLoop::current()->PostTask(FROM_HERE, base::Bind(
213 &UpdateAttempter::UpdateEngineStarted,
214 base::Unretained(update_attempter_.get())));
Alex Deymofa78f142016-01-26 21:36:16 -0800215 return true;
216}
217
218void RealSystemState::AddObserver(ServiceObserverInterface* observer) {
219 CHECK(update_attempter_.get());
220 update_attempter_->AddObserver(observer);
221}
222
223void RealSystemState::RemoveObserver(ServiceObserverInterface* observer) {
224 CHECK(update_attempter_.get());
225 update_attempter_->RemoveObserver(observer);
Alex Deymoe97b39c2016-01-20 13:22:17 -0800226}
227
Jay Srinivasan43488792012-06-19 00:25:31 -0700228} // namespace chromeos_update_engine