blob: 3c06d0ec7950372b2e04efa7572ed94561f49295 [file] [log] [blame]
/*
* Copyright (C) 2017 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package com.android.server.security;
import android.content.BroadcastReceiver;
import android.content.ComponentName;
import android.content.Context;
import android.content.Intent;
import android.content.IntentFilter;
import android.content.pm.PackageManager;
import android.os.Process;
import android.os.UserHandle;
import android.security.IKeyChainService;
import android.util.Slog;
import com.android.server.DeviceIdleInternal;
import com.android.server.LocalServices;
import com.android.server.SystemService;
/**
* Service related to {@link android.security.KeyChain}.
* <p>
* Most of the implementation of KeyChain is provided by the com.android.keychain app. Until O,
* this was OK because a system app has roughly the same privileges as the system process.
* <p>
* With the introduction of background check, PACKAGE_* broadcasts (_ADDED, _REMOVED, _REPLACED)
* aren't received when the KeyChain app is in the background, which is bad as it uses those to
* drive internal cleanup.
* <p>
* TODO (b/35968281): take a more sophisticated look at what bits of KeyChain should be inside the
* system server and which make sense inside a system app.
*/
public class KeyChainSystemService extends SystemService {
private static final String TAG = "KeyChainSystemService";
/**
* Maximum time limit for the KeyChain app to deal with packages being removed.
*/
private static final int KEYCHAIN_IDLE_WHITELIST_DURATION_MS = 30 * 1000;
public KeyChainSystemService(final Context context) {
super(context);
}
@Override
public void onStart() {
IntentFilter packageFilter = new IntentFilter(Intent.ACTION_PACKAGE_REMOVED);
packageFilter.addDataScheme("package");
try {
getContext().registerReceiverAsUser(mPackageReceiver, UserHandle.ALL,
packageFilter, null /*broadcastPermission*/, null /*handler*/);
} catch (RuntimeException e) {
Slog.w(TAG, "Unable to register for package removed broadcast", e);
}
}
private final BroadcastReceiver mPackageReceiver = new BroadcastReceiver() {
@Override
public void onReceive(final Context context, final Intent broadcastIntent) {
if (broadcastIntent.getPackage() != null) {
return;
}
try {
final Intent intent = new Intent(IKeyChainService.class.getName());
ComponentName service =
intent.resolveSystemService(getContext().getPackageManager(), 0 /*flags*/);
if (service == null) {
return;
}
intent.setComponent(service);
intent.setAction(broadcastIntent.getAction());
startServiceInBackgroundAsUser(intent, UserHandle.of(getSendingUserId()));
} catch (RuntimeException e) {
Slog.e(TAG, "Unable to forward package removed broadcast to KeyChain", e);
}
}
};
private void startServiceInBackgroundAsUser(final Intent intent, final UserHandle user) {
if (intent.getComponent() == null) {
return;
}
final String packageName = intent.getComponent().getPackageName();
final DeviceIdleInternal idleController =
LocalServices.getService(DeviceIdleInternal.class);
idleController.addPowerSaveTempWhitelistApp(Process.myUid(), packageName,
KEYCHAIN_IDLE_WHITELIST_DURATION_MS, user.getIdentifier(), false, "keychain");
getContext().startServiceAsUser(intent, user);
}
}