blob: 914120c644462303eaf0145d2243100121808e9a [file] [log] [blame]
// Copyright 2014 The Chromium OS Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include <string>
#include <base/files/file_path.h>
#include <chromeos/daemons/dbus_daemon.h>
#include <chromeos/dbus/async_event_sequencer.h>
#include <chromeos/dbus/exported_object_manager.h>
#include <chromeos/flag_helper.h>
#include <chromeos/strings/string_utils.h>
#include <chromeos/syslog_logging.h>
#include "buffet/buffet_config.h"
#include "buffet/dbus_constants.h"
#include "buffet/manager.h"
using chromeos::dbus_utils::AsyncEventSequencer;
using chromeos::DBusServiceDaemon;
using buffet::dbus_constants::kServiceName;
using buffet::dbus_constants::kRootServicePath;
namespace buffet {
class Daemon final : public DBusServiceDaemon {
public:
Daemon(const weave::Device::Options& options,
const BuffetConfigPaths& paths,
const std::set<std::string>& device_whitelist)
: DBusServiceDaemon(kServiceName, kRootServicePath),
options_{options},
paths_(paths),
device_whitelist_{device_whitelist} {}
protected:
void RegisterDBusObjectsAsync(AsyncEventSequencer* sequencer) override {
manager_.reset(new buffet::Manager(object_manager_->AsWeakPtr()));
manager_->Start(options_, paths_, device_whitelist_, sequencer);
}
void OnShutdown(int* return_code) override { manager_->Stop(); }
private:
weave::Device::Options options_;
BuffetConfigPaths paths_;
std::set<std::string> device_whitelist_;
std::unique_ptr<buffet::Manager> manager_;
DISALLOW_COPY_AND_ASSIGN(Daemon);
};
} // namespace buffet
namespace {
const char kDefaultConfigFilePath[] = "/etc/weaved/weaved.conf";
const char kDefaultStateFilePath[] = "/data/misc/weaved/device_reg_info";
} // namespace
int main(int argc, char* argv[]) {
DEFINE_bool(log_to_stderr, false, "log trace messages to stderr as well");
DEFINE_string(config_path, kDefaultConfigFilePath,
"Path to file containing config information.");
DEFINE_string(state_path, kDefaultStateFilePath,
"Path to file containing state information.");
DEFINE_bool(enable_xmpp, true,
"Connect to GCD via a persistent XMPP connection.");
DEFINE_bool(disable_privet, false, "disable Privet protocol");
DEFINE_bool(enable_ping, false, "enable test HTTP handler at /privet/ping");
DEFINE_string(device_whitelist, "",
"Comma separated list of network interfaces to monitor for "
"connectivity (an empty list enables all interfaces).");
DEFINE_bool(disable_security, false,
"disable Privet security for tests. For test only.");
DEFINE_string(test_privet_ssid, "",
"Fixed SSID for WiFi bootstrapping. For test only.");
DEFINE_string(test_definitions_path, "",
"Path to directory containing additional command "
"and state definitions. For test only.");
chromeos::FlagHelper::Init(argc, argv, "Privet protocol handler daemon");
if (FLAGS_config_path.empty())
FLAGS_config_path = kDefaultConfigFilePath;
if (FLAGS_state_path.empty())
FLAGS_state_path = kDefaultStateFilePath;
int flags = chromeos::kLogToSyslog | chromeos::kLogHeader;
if (FLAGS_log_to_stderr)
flags |= chromeos::kLogToStderr;
chromeos::InitLog(flags);
auto device_whitelist =
chromeos::string_utils::Split(FLAGS_device_whitelist, ",", true, true);
buffet::BuffetConfigPaths paths;
paths.defaults = base::FilePath{FLAGS_config_path};
paths.settings = base::FilePath{FLAGS_state_path};
paths.definitions = base::FilePath{"/etc/weaved"};
paths.test_definitions = base::FilePath{FLAGS_test_definitions_path};
weave::Device::Options options;
options.xmpp_enabled = FLAGS_enable_xmpp;
options.disable_privet = FLAGS_disable_privet;
options.disable_security = FLAGS_disable_security;
options.enable_ping = FLAGS_enable_ping;
options.test_privet_ssid = FLAGS_test_privet_ssid;
buffet::Daemon daemon{
options, paths,
std::set<std::string>{device_whitelist.begin(), device_whitelist.end()}};
return daemon.Run();
}