blob: 73ba426eae8f2a84aa92f090511b4e5bed710284 [file] [log] [blame]
// Copyright 2014 The Chromium OS Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include <sysexits.h>
#include <memory>
#include <string>
#include <base/command_line.h>
#include <chromeos/daemons/dbus_daemon.h>
#include <chromeos/dbus/async_event_sequencer.h>
#include <chromeos/minijail/minijail.h>
#include <chromeos/syslog_logging.h>
#include <chromeos/userdb_utils.h>
#include "attestation/common/dbus_interface.h"
#include "attestation/server/attestation_service.h"
#include "attestation/server/dbus_service.h"
#include <chromeos/libminijail.h>
namespace {
const uid_t kRootUID = 0;
const char kAttestationUser[] = "attestation";
const char kAttestationGroup[] = "attestation";
const char kAttestationSeccompPath[] =
"/usr/share/policy/attestationd-seccomp.policy";
void InitMinijailSandbox() {
uid_t attestation_uid;
gid_t attestation_gid;
CHECK(chromeos::userdb::GetUserInfo(kAttestationUser,
&attestation_uid,
&attestation_gid))
<< "Error getting attestation uid and gid.";
CHECK_EQ(getuid(), kRootUID) << "AttestationDaemon not initialized as root.";
chromeos::Minijail* minijail = chromeos::Minijail::GetInstance();
struct minijail* jail = minijail->New();
minijail->DropRoot(jail, kAttestationUser, kAttestationGroup);
minijail->UseSeccompFilter(jail, kAttestationSeccompPath);
minijail->Enter(jail);
minijail->Destroy(jail);
CHECK_EQ(getuid(), attestation_uid)
<< "AttestationDaemon was not able to drop to attestation user.";
CHECK_EQ(getgid(), attestation_gid)
<< "AttestationDaemon was not able to drop to attestation group.";
}
} // namespace
using chromeos::dbus_utils::AsyncEventSequencer;
class AttestationDaemon : public chromeos::DBusServiceDaemon {
public:
AttestationDaemon()
: chromeos::DBusServiceDaemon(attestation::kAttestationServiceName) {
attestation_service_.reset(new attestation::AttestationService);
// Move initialize call down to OnInit
CHECK(attestation_service_->Initialize());
}
protected:
int OnInit() override {
int result = chromeos::DBusServiceDaemon::OnInit();
if (result != EX_OK) {
LOG(ERROR) << "Error starting attestation dbus daemon.";
return result;
}
return EX_OK;
}
void RegisterDBusObjectsAsync(AsyncEventSequencer* sequencer) override {
dbus_service_.reset(new attestation::DBusService(
bus_,
attestation_service_.get()));
dbus_service_->Register(sequencer->GetHandler("Register() failed.", true));
}
private:
std::unique_ptr<attestation::AttestationInterface> attestation_service_;
std::unique_ptr<attestation::DBusService> dbus_service_;
DISALLOW_COPY_AND_ASSIGN(AttestationDaemon);
};
int main(int argc, char* argv[]) {
base::CommandLine::Init(argc, argv);
chromeos::InitLog(chromeos::kLogToSyslog | chromeos::kLogToStderr);
AttestationDaemon daemon;
LOG(INFO) << "Attestation Daemon Started.";
InitMinijailSandbox();
return daemon.Run();
}