blob: fd8a492b45c6e8a758a9f31228b98bb89b33faf5 [file] [log] [blame]
Janis Danisevskis1af91262020-08-10 14:58:08 -07001// Copyright 2020, The Android Open Source Project
2//
3// Licensed under the Apache License, Version 2.0 (the "License");
4// you may not use this file except in compliance with the License.
5// You may obtain a copy of the License at
6//
7// http://www.apache.org/licenses/LICENSE-2.0
8//
9// Unless required by applicable law or agreed to in writing, software
10// distributed under the License is distributed on an "AS IS" BASIS,
11// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12// See the License for the specific language governing permissions and
13// limitations under the License.
14
Janis Danisevskise242b032020-11-17 15:57:51 -080015//! This crate implements the Keystore 2.0 service entry point.
Janis Danisevskis1af91262020-08-10 14:58:08 -070016
David Drysdale0e45a612021-02-25 17:24:36 +000017use keystore2::entropy;
Janis Danisevskisb1673db2021-02-08 18:11:57 -080018use keystore2::globals::ENFORCEMENTS;
Janis Danisevskis333b7c02021-03-23 18:57:41 -070019use keystore2::maintenance::Maintenance;
Seth Moore78c091f2021-04-09 21:38:30 +000020use keystore2::metrics;
Max Biresb2e1d032021-02-08 21:35:05 -080021use keystore2::remote_provisioning::RemoteProvisioningService;
Janis Danisevskis1af91262020-08-10 14:58:08 -070022use keystore2::service::KeystoreService;
Janis Danisevskis84a83e42021-03-21 21:46:54 -070023use keystore2::{apc::ApcManager, shared_secret_negotiation};
Janis Danisevskis5cb52dc2021-04-07 16:31:18 -070024use keystore2::{authorization::AuthorizationManager, id_rotation::IdRotationState};
Janis Danisevskis1af91262020-08-10 14:58:08 -070025use log::{error, info};
Janis Danisevskisb1673db2021-02-08 18:11:57 -080026use std::{panic, path::Path, sync::mpsc::channel};
Janis Danisevskis77d72042021-01-20 15:36:30 -080027use vpnprofilestore::VpnProfileStore;
Janis Danisevskis1af91262020-08-10 14:58:08 -070028
Stephen Crane56936e82021-03-10 17:48:26 -080029static KS2_SERVICE_NAME: &str = "android.system.keystore2.IKeystoreService/default";
Janis Danisevskis7a1cf382020-11-20 11:22:14 -080030static APC_SERVICE_NAME: &str = "android.security.apc";
Janis Danisevskis9f10a6a2021-01-18 16:45:21 +000031static AUTHORIZATION_SERVICE_NAME: &str = "android.security.authorization";
Max Biresb2e1d032021-02-08 21:35:05 -080032static REMOTE_PROVISIONING_SERVICE_NAME: &str = "android.security.remoteprovisioning";
Janis Danisevskis34a0cf22021-03-08 09:19:03 -080033static USER_MANAGER_SERVICE_NAME: &str = "android.security.maintenance";
Janis Danisevskis77d72042021-01-20 15:36:30 -080034static VPNPROFILESTORE_SERVICE_NAME: &str = "android.security.vpnprofilestore";
Janis Danisevskis1af91262020-08-10 14:58:08 -070035
36/// Keystore 2.0 takes one argument which is a path indicating its designated working directory.
37fn main() {
38 // Initialize android logging.
39 android_logger::init_once(
40 android_logger::Config::default().with_tag("keystore2").with_min_level(log::Level::Debug),
41 );
42 // Redirect panic messages to logcat.
43 panic::set_hook(Box::new(|panic_info| {
44 error!("{}", panic_info);
45 }));
46
47 // Saying hi.
48 info!("Keystore2 is starting.");
49
Janis Danisevskisb00ebd02021-02-02 21:52:24 -080050 // Initialize the per boot database.
51 let _keep_me_alive = keystore2::database::KeystoreDB::keep_perboot_db_alive()
52 .expect("Failed to initialize the perboot database.");
53
Janis Danisevskis1af91262020-08-10 14:58:08 -070054 let mut args = std::env::args();
55 args.next().expect("That's odd. How is there not even a first argument?");
Janis Danisevskisbf15d732020-12-08 10:35:26 -080056
Janis Danisevskis3f2955c2021-02-02 21:53:35 -080057 // Keystore 2.0 cannot change to the database directory (typically /data/misc/keystore) on
58 // startup as Keystore 1.0 did because Keystore 2.0 is intended to run much earlier than
59 // Keystore 1.0. Instead we set a global variable to the database path.
Janis Danisevskisbf15d732020-12-08 10:35:26 -080060 // For the ground truth check the service startup rule for init (typically in keystore2.rc).
Janis Danisevskis5cb52dc2021-04-07 16:31:18 -070061 let id_rotation_state = if let Some(dir) = args.next() {
62 let db_path = Path::new(&dir);
Janis Danisevskis3f2955c2021-02-02 21:53:35 -080063 *keystore2::globals::DB_PATH.lock().expect("Could not lock DB_PATH.") =
Janis Danisevskis5cb52dc2021-04-07 16:31:18 -070064 db_path.to_path_buf();
65 IdRotationState::new(&db_path)
Janis Danisevskis1af91262020-08-10 14:58:08 -070066 } else {
Janis Danisevskis5cb52dc2021-04-07 16:31:18 -070067 panic!("Must specify a database directory.");
68 };
Janis Danisevskis1af91262020-08-10 14:58:08 -070069
Janis Danisevskisb1673db2021-02-08 18:11:57 -080070 let (confirmation_token_sender, confirmation_token_receiver) = channel();
71
72 ENFORCEMENTS.install_confirmation_token_receiver(confirmation_token_receiver);
73
Ulyana Trafimovich229f2c02021-04-06 16:07:07 +000074 info!("Starting boot level watcher.");
75 std::thread::spawn(|| {
76 keystore2::globals::ENFORCEMENTS
77 .watch_boot_level()
78 .unwrap_or_else(|e| error!("watch_boot_level failed: {}", e));
79 });
80
David Drysdale0e45a612021-02-25 17:24:36 +000081 entropy::register_feeder();
Janis Danisevskis84a83e42021-03-21 21:46:54 -070082 shared_secret_negotiation::perform_shared_secret_negotiation();
David Drysdale0e45a612021-02-25 17:24:36 +000083
Janis Danisevskis8c6378e2021-01-01 09:30:37 -080084 info!("Starting thread pool now.");
85 binder::ProcessState::start_thread_pool();
86
Janis Danisevskis5cb52dc2021-04-07 16:31:18 -070087 let ks_service = KeystoreService::new_native_binder(id_rotation_state).unwrap_or_else(|e| {
Janis Danisevskis1af91262020-08-10 14:58:08 -070088 panic!("Failed to create service {} because of {:?}.", KS2_SERVICE_NAME, e);
89 });
90 binder::add_service(KS2_SERVICE_NAME, ks_service.as_binder()).unwrap_or_else(|e| {
91 panic!("Failed to register service {} because of {:?}.", KS2_SERVICE_NAME, e);
92 });
93
Janis Danisevskisb1673db2021-02-08 18:11:57 -080094 let apc_service =
95 ApcManager::new_native_binder(confirmation_token_sender).unwrap_or_else(|e| {
96 panic!("Failed to create service {} because of {:?}.", APC_SERVICE_NAME, e);
97 });
Janis Danisevskis7a1cf382020-11-20 11:22:14 -080098 binder::add_service(APC_SERVICE_NAME, apc_service.as_binder()).unwrap_or_else(|e| {
99 panic!("Failed to register service {} because of {:?}.", APC_SERVICE_NAME, e);
100 });
101
Janis Danisevskis9f10a6a2021-01-18 16:45:21 +0000102 let authorization_service = AuthorizationManager::new_native_binder().unwrap_or_else(|e| {
103 panic!("Failed to create service {} because of {:?}.", AUTHORIZATION_SERVICE_NAME, e);
104 });
105 binder::add_service(AUTHORIZATION_SERVICE_NAME, authorization_service.as_binder())
106 .unwrap_or_else(|e| {
107 panic!("Failed to register service {} because of {:?}.", AUTHORIZATION_SERVICE_NAME, e);
108 });
109
Janis Danisevskis34a0cf22021-03-08 09:19:03 -0800110 let maintenance_service = Maintenance::new_native_binder().unwrap_or_else(|e| {
Hasini Gunasingheda895552021-01-27 19:34:37 +0000111 panic!("Failed to create service {} because of {:?}.", USER_MANAGER_SERVICE_NAME, e);
112 });
Janis Danisevskis34a0cf22021-03-08 09:19:03 -0800113 binder::add_service(USER_MANAGER_SERVICE_NAME, maintenance_service.as_binder()).unwrap_or_else(
Hasini Gunasingheda895552021-01-27 19:34:37 +0000114 |e| {
115 panic!("Failed to register service {} because of {:?}.", USER_MANAGER_SERVICE_NAME, e);
116 },
117 );
118
Max Biresb2e1d032021-02-08 21:35:05 -0800119 // Devices with KS2 and KM 1.0 may not have any IRemotelyProvisionedComponent HALs at all. Do
120 // not panic if new_native_binder returns failure because it could not find the TEE HAL.
121 if let Ok(remote_provisioning_service) = RemoteProvisioningService::new_native_binder() {
122 binder::add_service(
123 REMOTE_PROVISIONING_SERVICE_NAME,
124 remote_provisioning_service.as_binder(),
125 )
126 .unwrap_or_else(|e| {
127 panic!(
128 "Failed to register service {} because of {:?}.",
129 REMOTE_PROVISIONING_SERVICE_NAME, e
130 );
131 });
132 }
Janis Danisevskis77d72042021-01-20 15:36:30 -0800133
134 let vpnprofilestore = VpnProfileStore::new_native_binder(
135 &keystore2::globals::DB_PATH.lock().expect("Could not get DB_PATH."),
136 );
137 binder::add_service(VPNPROFILESTORE_SERVICE_NAME, vpnprofilestore.as_binder()).unwrap_or_else(
138 |e| {
139 panic!(
140 "Failed to register service {} because of {:?}.",
141 VPNPROFILESTORE_SERVICE_NAME, e
142 );
143 },
144 );
145
Seth Moore78c091f2021-04-09 21:38:30 +0000146 std::thread::spawn(|| {
147 match metrics::register_pull_metrics_callbacks() {
148 Err(e) => error!("register_pull_metrics_callbacks failed: {:?}.", e),
149 _ => info!("Pull metrics callbacks successfully registered."),
150 };
151 });
152
Janis Danisevskis1af91262020-08-10 14:58:08 -0700153 info!("Successfully registered Keystore 2.0 service.");
Janis Danisevskis1af91262020-08-10 14:58:08 -0700154
Janis Danisevskise242b032020-11-17 15:57:51 -0800155 info!("Joining thread pool now.");
Janis Danisevskis1af91262020-08-10 14:58:08 -0700156 binder::ProcessState::join_thread_pool();
157}