blob: 349167b35a21bbb29839c7957fd47b1b7838c57f [file] [log] [blame]
Alex Deymoaea4c1c2015-08-19 20:24:43 -07001//
2// Copyright (C) 2012 The Android Open Source Project
3//
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at
7//
8// http://www.apache.org/licenses/LICENSE-2.0
9//
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15//
Jay Srinivasan43488792012-06-19 00:25:31 -070016
Alex Deymo94c06162014-03-21 20:34:46 -070017#include "update_engine/real_system_state.h"
18
Alex Deymof7ead812015-10-23 17:37:27 -070019#include <string>
20
Ben Chan06c76a42014-09-05 08:21:06 -070021#include <base/files/file_util.h>
Gilad Arnoldb2271992014-06-19 12:35:24 -070022#include <base/time/time.h>
David Zeuthen6eddf262015-10-16 15:23:53 -040023#include <brillo/make_unique_ptr.h>
Jay Srinivasan43488792012-06-19 00:25:31 -070024
Alex Deymo39910dc2015-11-09 17:04:30 -080025#include "update_engine/common/boot_control.h"
26#include "update_engine/common/boot_control_stub.h"
27#include "update_engine/common/constants.h"
28#include "update_engine/common/hardware.h"
29#include "update_engine/common/utils.h"
Alex Deymo63784a52014-05-28 10:46:14 -070030#include "update_engine/update_manager/state_factory.h"
Alex Deymof7ead812015-10-23 17:37:27 -070031#include "update_engine/weave_service_factory.h"
Jay Srinivasan43488792012-06-19 00:25:31 -070032
33namespace chromeos_update_engine {
34
Alex Deymo30534502015-07-20 15:06:33 -070035RealSystemState::RealSystemState(const scoped_refptr<dbus::Bus>& bus)
Alex Vakulenkoe119e6a2016-01-06 17:13:11 -080036 : debugd_proxy_(bus),
Alex Deymod6deb1d2015-08-28 15:54:37 -070037 power_manager_proxy_(bus),
38 session_manager_proxy_(bus),
Alex Deymo30534502015-07-20 15:06:33 -070039 shill_proxy_(bus),
40 libcros_proxy_(bus) {
41}
Jay Srinivasan6f6ea002012-12-14 11:26:28 -080042
Nam T. Nguyen7d623eb2014-05-13 16:06:28 -070043bool RealSystemState::Initialize() {
Jay Srinivasan6f6ea002012-12-14 11:26:28 -080044 metrics_lib_.Init();
45
Alex Deymob17327c2015-09-04 10:29:00 -070046 boot_control_ = boot_control::CreateBootControl();
David Zeuthen6eddf262015-10-16 15:23:53 -040047 if (!boot_control_) {
48 LOG(WARNING) << "Unable to create BootControl instance, using stub "
49 << "instead. All update attempts will fail.";
50 boot_control_ = brillo::make_unique_ptr(new BootControlStub());
51 }
Alex Deymo763e7db2015-08-27 21:08:08 -070052
Alex Deymo40d86b22015-09-03 22:27:10 -070053 hardware_ = hardware::CreateHardware();
54 if (!hardware_) {
55 LOG(ERROR) << "Error intializing the HardwareInterface.";
56 return false;
57 }
58
Alex Deymo1c4e84a2015-09-22 16:58:10 -070059 LOG_IF(INFO, !hardware_->IsNormalBootMode()) << "Booted in dev mode.";
60 LOG_IF(INFO, !hardware_->IsOfficialBuild()) << "Booted non-official build.";
61
Alex Deymo30534502015-07-20 15:06:33 -070062 if (!shill_proxy_.Init()) {
63 LOG(ERROR) << "Failed to initialize shill proxy.";
64 return false;
65 }
66
Alex Deymodd132f32015-09-14 19:12:07 -070067 // Initialize standard and powerwash-safe prefs.
68 base::FilePath non_volatile_path;
69 // TODO(deymo): Fall back to in-memory prefs if there's no physical directory
70 // available.
71 if (!hardware_->GetNonVolatileDirectory(&non_volatile_path)) {
72 LOG(ERROR) << "Failed to get a non-volatile directory.";
73 return false;
74 }
75 Prefs* prefs;
76 prefs_.reset(prefs = new Prefs());
77 if (!prefs->Init(non_volatile_path.Append(kPrefsSubDirectory))) {
Jay Srinivasan6f6ea002012-12-14 11:26:28 -080078 LOG(ERROR) << "Failed to initialize preferences.";
79 return false;
80 }
81
Alex Deymodd132f32015-09-14 19:12:07 -070082 base::FilePath powerwash_safe_path;
83 if (!hardware_->GetPowerwashSafeDirectory(&powerwash_safe_path)) {
84 // TODO(deymo): Fall-back to in-memory prefs if there's no powerwash-safe
85 // directory, or disable powerwash feature.
86 powerwash_safe_path = non_volatile_path.Append("powerwash-safe");
87 LOG(WARNING) << "No powerwash-safe directory, using non-volatile one.";
88 }
89 powerwash_safe_prefs_.reset(prefs = new Prefs());
90 if (!prefs->Init(
91 powerwash_safe_path.Append(kPowerwashSafePrefsSubDirectory))) {
Chris Sosaaa18e162013-06-20 13:20:30 -070092 LOG(ERROR) << "Failed to initialize powerwash preferences.";
93 return false;
94 }
95
Alex Deymodd132f32015-09-14 19:12:07 -070096 // Check the system rebooted marker file.
97 std::string boot_id;
98 if (utils::GetBootId(&boot_id)) {
99 std::string prev_boot_id;
100 system_rebooted_ = (!prefs_->GetString(kPrefsBootId, &prev_boot_id) ||
101 prev_boot_id != boot_id);
102 prefs_->SetString(kPrefsBootId, boot_id);
103 } else {
104 LOG(WARNING) << "Couldn't detect the bootid, assuming system was rebooted.";
Chris Sosabe45bef2013-04-09 18:25:12 -0700105 system_rebooted_ = true;
106 }
107
Alex Deymo5378f5e2015-11-10 15:02:50 -0800108 // Initialize the OmahaRequestParams with the default settings. These settings
109 // will be re-initialized before every request using the actual request
110 // options. This initialization here pre-loads current channel and version, so
111 // the DBus service can access it.
112 if (!request_params_.Init("", "", false)) {
113 LOG(WARNING) << "Ignoring OmahaRequestParams initialization error. Some "
114 "features might not work properly.";
115 }
116
Alex Deymo33e91e72015-12-01 18:26:08 -0300117 certificate_checker_.reset(
118 new CertificateChecker(prefs_.get(), &openssl_wrapper_));
119 certificate_checker_->Init();
120
121 // Initialize the UpdateAttempter before the UpdateManager.
122 update_attempter_.reset(
123 new UpdateAttempter(this, certificate_checker_.get(), &libcros_proxy_,
124 &debugd_proxy_));
125 update_attempter_->Init();
126
Alex Vakulenkoe119e6a2016-01-06 17:13:11 -0800127 weave_service_ = ConstructWeaveService(update_attempter_.get());
Alex Deymof7ead812015-10-23 17:37:27 -0700128
Alex Deymo63784a52014-05-28 10:46:14 -0700129 // Initialize the Update Manager using the default state factory.
130 chromeos_update_manager::State* um_state =
131 chromeos_update_manager::DefaultStateFactory(
Alex Deymo30534502015-07-20 15:06:33 -0700132 &policy_provider_, &shill_proxy_, &session_manager_proxy_, this);
Alex Deymo63784a52014-05-28 10:46:14 -0700133 if (!um_state) {
134 LOG(ERROR) << "Failed to initialize the Update Manager.";
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800135 return false;
Gilad Arnold1f847232014-04-07 12:07:49 -0700136 }
Alex Deymo63784a52014-05-28 10:46:14 -0700137 update_manager_.reset(
Gilad Arnoldb2271992014-06-19 12:35:24 -0700138 new chromeos_update_manager::UpdateManager(
Gilad Arnoldfd45a732014-08-07 15:53:46 -0700139 &clock_, base::TimeDelta::FromSeconds(5),
140 base::TimeDelta::FromHours(12), um_state));
Gilad Arnold1f847232014-04-07 12:07:49 -0700141
Gilad Arnold4a0321b2014-10-28 15:57:30 -0700142 // The P2P Manager depends on the Update Manager for its initialization.
143 p2p_manager_.reset(P2PManager::Construct(
144 nullptr, &clock_, update_manager_.get(), "cros_au",
145 kMaxP2PFilesToKeep, base::TimeDelta::FromDays(kMaxP2PFileAgeDays)));
146
Gilad Arnold1f847232014-04-07 12:07:49 -0700147 if (!payload_state_.Initialize(this)) {
148 LOG(ERROR) << "Failed to initialize the payload state object.";
149 return false;
150 }
Jay Srinivasan6f6ea002012-12-14 11:26:28 -0800151
152 // All is well. Initialization successful.
153 return true;
154}
Jay Srinivasan43488792012-06-19 00:25:31 -0700155
Jay Srinivasan43488792012-06-19 00:25:31 -0700156} // namespace chromeos_update_engine