1 //
2 // Copyright (C) 2016 The Android Open Source Project
3 //
4 // Licensed under the Apache License, Version 2.0 (the "License");
5 // you may not use this file except in compliance with the License.
6 // You may obtain a copy of the License at
7 //
8 // http://www.apache.org/licenses/LICENSE-2.0
9 //
10 // Unless required by applicable law or agreed to in writing, software
11 // distributed under the License is distributed on an "AS IS" BASIS,
12 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 // See the License for the specific language governing permissions and
14 // limitations under the License.
15 //
16
17 #include "update_engine/aosp/daemon_state_android.h"
18
19 #include <base/logging.h>
20
21 #include "update_engine/aosp/apex_handler_interface.h"
22 #include "update_engine/aosp/update_attempter_android.h"
23 #include "update_engine/common/boot_control.h"
24 #include "update_engine/common/boot_control_stub.h"
25 #include "update_engine/common/hardware.h"
26 #include "update_engine/common/prefs.h"
27
28 namespace chromeos_update_engine {
29
Initialize()30 bool DaemonStateAndroid::Initialize() {
31 boot_control_ = boot_control::CreateBootControl();
32 if (!boot_control_) {
33 LOG(WARNING) << "Unable to create BootControl instance, using stub "
34 << "instead. All update attempts will fail.";
35 boot_control_.reset(new BootControlStub());
36 }
37
38 hardware_ = hardware::CreateHardware();
39 if (!hardware_) {
40 LOG(ERROR) << "Error initializing the HardwareInterface.";
41 return false;
42 }
43
44 LOG_IF(INFO, !hardware_->IsNormalBootMode()) << "Booted in dev mode.";
45 LOG_IF(INFO, !hardware_->IsOfficialBuild()) << "Booted non-official build.";
46
47 // Initialize prefs.
48 base::FilePath non_volatile_path;
49 if (!hardware_->GetNonVolatileDirectory(&non_volatile_path)) {
50 prefs_.reset(new MemoryPrefs());
51 LOG(WARNING)
52 << "Could not get a non-volatile directory, fall back to memory prefs";
53 } else {
54 Prefs* prefs = new Prefs();
55 prefs_.reset(prefs);
56 if (!prefs->Init(non_volatile_path.Append(kPrefsSubDirectory))) {
57 LOG(ERROR) << "Failed to initialize preferences.";
58 return false;
59 }
60 }
61
62 // The CertificateChecker singleton is used by the update attempter.
63 certificate_checker_.reset(
64 new CertificateChecker(prefs_.get(), &openssl_wrapper_));
65 certificate_checker_->Init();
66
67 // Initialize the UpdateAttempter before the UpdateManager.
68 update_attempter_.reset(
69 new UpdateAttempterAndroid(this,
70 prefs_.get(),
71 boot_control_.get(),
72 hardware_.get(),
73 ApexHandlerInterface::CreateApexHandler()));
74
75 return true;
76 }
77
StartUpdater()78 bool DaemonStateAndroid::StartUpdater() {
79 // The DaemonState in Android is a passive daemon. It will only start applying
80 // an update when instructed to do so from the exposed binder API.
81 update_attempter_->Init();
82 return true;
83 }
84
AddObserver(ServiceObserverInterface * observer)85 void DaemonStateAndroid::AddObserver(ServiceObserverInterface* observer) {
86 service_observers_.insert(observer);
87 }
88
RemoveObserver(ServiceObserverInterface * observer)89 void DaemonStateAndroid::RemoveObserver(ServiceObserverInterface* observer) {
90 service_observers_.erase(observer);
91 }
92
service_delegate()93 ServiceDelegateAndroidInterface* DaemonStateAndroid::service_delegate() {
94 return update_attempter_.get();
95 }
96
97 } // namespace chromeos_update_engine
98