1 //
2 // Copyright (C) 2016 The Android Open Source Project
3 //
4 // Licensed under the Apache License, Version 2.0 (the "License");
5 // you may not use this file except in compliance with the License.
6 // You may obtain a copy of the License at
7 //
8 //      http://www.apache.org/licenses/LICENSE-2.0
9 //
10 // Unless required by applicable law or agreed to in writing, software
11 // distributed under the License is distributed on an "AS IS" BASIS,
12 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 // See the License for the specific language governing permissions and
14 // limitations under the License.
15 //
16 
17 #include "update_engine/aosp/daemon_state_android.h"
18 
19 #include <base/logging.h>
20 
21 #include "update_engine/aosp/apex_handler_android.h"
22 #include "update_engine/aosp/update_attempter_android.h"
23 #include "update_engine/common/boot_control.h"
24 #include "update_engine/common/boot_control_stub.h"
25 #include "update_engine/common/hardware.h"
26 #include "update_engine/common/prefs.h"
27 
28 namespace chromeos_update_engine {
29 
Initialize()30 bool DaemonStateAndroid::Initialize() {
31   boot_control_ = boot_control::CreateBootControl();
32   if (!boot_control_) {
33     LOG(WARNING) << "Unable to create BootControl instance, using stub "
34                  << "instead. All update attempts will fail.";
35     boot_control_.reset(new BootControlStub());
36   }
37 
38   hardware_ = hardware::CreateHardware();
39   if (!hardware_) {
40     LOG(ERROR) << "Error initializing the HardwareInterface.";
41     return false;
42   }
43 
44   LOG_IF(INFO, !hardware_->IsNormalBootMode()) << "Booted in dev mode.";
45   LOG_IF(INFO, !hardware_->IsOfficialBuild()) << "Booted non-official build.";
46 
47   // Initialize prefs.
48   base::FilePath non_volatile_path;
49   if (!hardware_->GetNonVolatileDirectory(&non_volatile_path)) {
50     prefs_.reset(new MemoryPrefs());
51     LOG(WARNING)
52         << "Could not get a non-volatile directory, fall back to memory prefs";
53   } else {
54     Prefs* prefs = new Prefs();
55     prefs_.reset(prefs);
56     if (!prefs->Init(non_volatile_path.Append(kPrefsSubDirectory))) {
57       LOG(ERROR) << "Failed to initialize preferences.";
58       return false;
59     }
60   }
61 
62   // The CertificateChecker singleton is used by the update attempter.
63   certificate_checker_.reset(
64       new CertificateChecker(prefs_.get(), &openssl_wrapper_));
65   certificate_checker_->Init();
66 
67   // Initialize the UpdateAttempter before the UpdateManager.
68   update_attempter_.reset(new UpdateAttempterAndroid(this,
69                                                      prefs_.get(),
70                                                      boot_control_.get(),
71                                                      hardware_.get(),
72                                                      CreateApexHandler()));
73 
74   return true;
75 }
76 
StartUpdater()77 bool DaemonStateAndroid::StartUpdater() {
78   // The DaemonState in Android is a passive daemon. It will only start applying
79   // an update when instructed to do so from the exposed binder API.
80   update_attempter_->Init();
81   return true;
82 }
83 
AddObserver(ServiceObserverInterface * observer)84 void DaemonStateAndroid::AddObserver(ServiceObserverInterface* observer) {
85   service_observers_.insert(observer);
86 }
87 
RemoveObserver(ServiceObserverInterface * observer)88 void DaemonStateAndroid::RemoveObserver(ServiceObserverInterface* observer) {
89   service_observers_.erase(observer);
90 }
91 
service_delegate()92 ServiceDelegateAndroidInterface* DaemonStateAndroid::service_delegate() {
93   return update_attempter_.get();
94 }
95 
96 }  // namespace chromeos_update_engine
97