History log of /system/update_engine/sideload_main.cc
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
dc066f14d22f7e3843ad3c4bbcfd8718f95d4dcd 27-Mar-2017 Alex Deymo <deymo@google.com> Remove weave support from update_engine.

This codepath is not used anymore.

Bug: None
Test: `make checkbuild`.
Change-Id: I0f7f22d63cb2c3fbfabcda25763160e2470ef2c5
/system/update_engine/sideload_main.cc
3295102ed64107f966d4cf8bfe733bb936646630 11-Aug-2016 Alex Deymo <deymo@google.com> Setup a temporary directory for update_engine_sideload.

When running update_engine_sideload from recovery, the default temp
directory (/data/misc/update_engine/tmp) is not available. This
directory is currently used to store a blob when applying a bspatch
from a child process. This patch uses /tmp/update_engine_sideload as
a temporary directory when running update_engine_sideload from recovery.

Bug: 27178350
TEST=`adb sideload` an incremental update.

Change-Id: Iec9f4ec8314e8dae4f6b1e78402dd39ca49c4fa4
/system/update_engine/sideload_main.cc
40a017db5df92ab7f9c3dcd73cd736a645931c93 03-Aug-2016 Alex Deymo <deymo@google.com> Report the progress of the update when sideloading.

update_engine_sideload now accepts a file descriptor number via a new
--status_fd flag. When applying the update, it will report back to
recovery via this file descriptor the progress of the update in the
format expected by recovery.

This patch also initializes the Subprocess singleton used during the
update.

Bug: 27178350
TEST=Executed update_engine_sideload from recovery and watched message updates.

Change-Id: I40f5452c9220530651e8cd6cde681e39dd0a6aad
/system/update_engine/sideload_main.cc
03a4de7dc77b058987fc0670f4f67ba10ff31bc8 21-Jul-2016 Alex Deymo <deymo@google.com> Build update_engine_sideload.

Add a new "sideload" executable target that applies an update payload
directly using the UpdateAttempterAndroid.

This initial CL buils a dynamically linked program that's targeted to
run in the system image for now, but will later be transformed into a
static binary to run from the recovery environment.

Bug: 27178350
TEST=Applied a payload directly on a device using:
`update_engine_sideload --payload=file://foo/bar ...`

Change-Id: I289a724d013abdc390187d669dccd3edf2fd3434
/system/update_engine/sideload_main.cc