1 //
2 // Copyright (C) 2016 The Android Open Source Project
3 //
4 // Licensed under the Apache License, Version 2.0 (the "License");
5 // you may not use this file except in compliance with the License.
6 // You may obtain a copy of the License at
7 //
8 // http://www.apache.org/licenses/LICENSE-2.0
9 //
10 // Unless required by applicable law or agreed to in writing, software
11 // distributed under the License is distributed on an "AS IS" BASIS,
12 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 // See the License for the specific language governing permissions and
14 // limitations under the License.
15 //
16
17 #include "update_engine/aosp/daemon_state_android.h"
18
19 #include <base/logging.h>
20
21 #include "update_engine/aosp/apex_handler_android.h"
22 #include "update_engine/aosp/update_attempter_android.h"
23 #include "update_engine/common/boot_control.h"
24 #include "update_engine/common/boot_control_stub.h"
25 #include "update_engine/common/hardware.h"
26 #include "update_engine/common/prefs.h"
27
28 namespace chromeos_update_engine {
29
Initialize()30 bool DaemonStateAndroid::Initialize() {
31 boot_control_ = boot_control::CreateBootControl();
32 if (!boot_control_) {
33 LOG(WARNING) << "Unable to create BootControl instance, using stub "
34 << "instead. All update attempts will fail.";
35 boot_control_.reset(new BootControlStub());
36 }
37
38 hardware_ = hardware::CreateHardware();
39 if (!hardware_) {
40 LOG(ERROR) << "Error initializing the HardwareInterface.";
41 return false;
42 }
43
44 LOG_IF(INFO, !hardware_->IsNormalBootMode()) << "Booted in dev mode.";
45 LOG_IF(INFO, !hardware_->IsOfficialBuild()) << "Booted non-official build.";
46
47 // Initialize prefs.
48 base::FilePath non_volatile_path;
49 if (!hardware_->GetNonVolatileDirectory(&non_volatile_path)) {
50 prefs_.reset(new MemoryPrefs());
51 LOG(WARNING)
52 << "Could not get a non-volatile directory, fall back to memory prefs";
53 } else {
54 Prefs* prefs = new Prefs();
55 prefs_.reset(prefs);
56 if (!prefs->Init(non_volatile_path.Append(kPrefsSubDirectory))) {
57 LOG(ERROR) << "Failed to initialize preferences.";
58 return false;
59 }
60 }
61
62 // The CertificateChecker singleton is used by the update attempter.
63 certificate_checker_.reset(
64 new CertificateChecker(prefs_.get(), &openssl_wrapper_));
65 certificate_checker_->Init();
66
67 // Initialize the UpdateAttempter before the UpdateManager.
68 update_attempter_.reset(new UpdateAttempterAndroid(this,
69 prefs_.get(),
70 boot_control_.get(),
71 hardware_.get(),
72 CreateApexHandler()));
73
74 return true;
75 }
76
StartUpdater()77 bool DaemonStateAndroid::StartUpdater() {
78 // The DaemonState in Android is a passive daemon. It will only start applying
79 // an update when instructed to do so from the exposed binder API.
80 update_attempter_->Init();
81 return true;
82 }
83
AddObserver(ServiceObserverInterface * observer)84 void DaemonStateAndroid::AddObserver(ServiceObserverInterface* observer) {
85 service_observers_.insert(observer);
86 }
87
RemoveObserver(ServiceObserverInterface * observer)88 void DaemonStateAndroid::RemoveObserver(ServiceObserverInterface* observer) {
89 service_observers_.erase(observer);
90 }
91
service_delegate()92 ServiceDelegateAndroidInterface* DaemonStateAndroid::service_delegate() {
93 return update_attempter_.get();
94 }
95
96 } // namespace chromeos_update_engine
97