blob: fbf500ad303c34a076b777a600723e3bf75c7a3e [file] [log] [blame]
Janis Danisevskis1af91262020-08-10 14:58:08 -07001// Copyright 2020, The Android Open Source Project
2//
3// Licensed under the Apache License, Version 2.0 (the "License");
4// you may not use this file except in compliance with the License.
5// You may obtain a copy of the License at
6//
7// http://www.apache.org/licenses/LICENSE-2.0
8//
9// Unless required by applicable law or agreed to in writing, software
10// distributed under the License is distributed on an "AS IS" BASIS,
11// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12// See the License for the specific language governing permissions and
13// limitations under the License.
14
Janis Danisevskise242b032020-11-17 15:57:51 -080015//! This crate implements the Keystore 2.0 service entry point.
Janis Danisevskis1af91262020-08-10 14:58:08 -070016
17use binder::Interface;
Janis Danisevskis7a1cf382020-11-20 11:22:14 -080018use keystore2::apc::ApcManager;
Janis Danisevskis9f10a6a2021-01-18 16:45:21 +000019use keystore2::authorization::AuthorizationManager;
Janis Danisevskis1af91262020-08-10 14:58:08 -070020use keystore2::service::KeystoreService;
21use log::{error, info};
22use std::panic;
23
24static KS2_SERVICE_NAME: &str = "android.system.keystore2";
Janis Danisevskis7a1cf382020-11-20 11:22:14 -080025static APC_SERVICE_NAME: &str = "android.security.apc";
Janis Danisevskis9f10a6a2021-01-18 16:45:21 +000026static AUTHORIZATION_SERVICE_NAME: &str = "android.security.authorization";
Janis Danisevskis1af91262020-08-10 14:58:08 -070027
28/// Keystore 2.0 takes one argument which is a path indicating its designated working directory.
29fn main() {
30 // Initialize android logging.
31 android_logger::init_once(
32 android_logger::Config::default().with_tag("keystore2").with_min_level(log::Level::Debug),
33 );
34 // Redirect panic messages to logcat.
35 panic::set_hook(Box::new(|panic_info| {
36 error!("{}", panic_info);
37 }));
38
39 // Saying hi.
40 info!("Keystore2 is starting.");
41
Janis Danisevskisb00ebd02021-02-02 21:52:24 -080042 // Initialize the per boot database.
43 let _keep_me_alive = keystore2::database::KeystoreDB::keep_perboot_db_alive()
44 .expect("Failed to initialize the perboot database.");
45
Janis Danisevskis1af91262020-08-10 14:58:08 -070046 let mut args = std::env::args();
47 args.next().expect("That's odd. How is there not even a first argument?");
Janis Danisevskisbf15d732020-12-08 10:35:26 -080048
49 // Keystore changes to the database directory on startup (typically /data/misc/keystore).
50 // For the ground truth check the service startup rule for init (typically in keystore2.rc).
Janis Danisevskis1af91262020-08-10 14:58:08 -070051 if let Some(dir) = args.next() {
52 if std::env::set_current_dir(dir.clone()).is_err() {
53 panic!("Failed to set working directory {}.", dir)
54 }
55 } else {
56 panic!("Must specify a working directory.");
57 }
58
Janis Danisevskis8c6378e2021-01-01 09:30:37 -080059 info!("Starting thread pool now.");
60 binder::ProcessState::start_thread_pool();
61
Janis Danisevskis1af91262020-08-10 14:58:08 -070062 let ks_service = KeystoreService::new_native_binder().unwrap_or_else(|e| {
63 panic!("Failed to create service {} because of {:?}.", KS2_SERVICE_NAME, e);
64 });
65 binder::add_service(KS2_SERVICE_NAME, ks_service.as_binder()).unwrap_or_else(|e| {
66 panic!("Failed to register service {} because of {:?}.", KS2_SERVICE_NAME, e);
67 });
68
Janis Danisevskis7a1cf382020-11-20 11:22:14 -080069 let apc_service = ApcManager::new_native_binder().unwrap_or_else(|e| {
70 panic!("Failed to create service {} because of {:?}.", APC_SERVICE_NAME, e);
71 });
72 binder::add_service(APC_SERVICE_NAME, apc_service.as_binder()).unwrap_or_else(|e| {
73 panic!("Failed to register service {} because of {:?}.", APC_SERVICE_NAME, e);
74 });
75
Janis Danisevskis9f10a6a2021-01-18 16:45:21 +000076 let authorization_service = AuthorizationManager::new_native_binder().unwrap_or_else(|e| {
77 panic!("Failed to create service {} because of {:?}.", AUTHORIZATION_SERVICE_NAME, e);
78 });
79 binder::add_service(AUTHORIZATION_SERVICE_NAME, authorization_service.as_binder())
80 .unwrap_or_else(|e| {
81 panic!("Failed to register service {} because of {:?}.", AUTHORIZATION_SERVICE_NAME, e);
82 });
83
Janis Danisevskis1af91262020-08-10 14:58:08 -070084 info!("Successfully registered Keystore 2.0 service.");
Janis Danisevskis1af91262020-08-10 14:58:08 -070085
Janis Danisevskise242b032020-11-17 15:57:51 -080086 info!("Joining thread pool now.");
Janis Danisevskis1af91262020-08-10 14:58:08 -070087 binder::ProcessState::join_thread_pool();
88}