2 * Copyright (c) 2017 Apple Inc. All Rights Reserved.
4 * @APPLE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. Please obtain a copy of the License at
10 * http://www.opensource.apple.com/apsl/ and read it before using this
13 * The Original Code and all software distributed under the License are
14 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 * Please see the License for the specific language governing rights and
19 * limitations under the License.
21 * @APPLE_LICENSE_HEADER_END@
24 #include <TargetConditionals.h>
25 #import <Foundation/NSError_Private.h>
26 #import <dirhelper_priv.h>
34 #if TARGET_OS_SIMULATOR
36 int main(int argc, char** argv)
43 #import <Foundation/Foundation.h>
45 #include "debugging.h"
46 #import <Foundation/NSXPCConnection_Private.h>
47 #include <xpc/private.h>
49 @interface ServiceDelegate : NSObject <NSXPCListenerDelegate>
52 @implementation ServiceDelegate
54 - (BOOL)listener:(NSXPCListener *)listener shouldAcceptNewConnection:(NSXPCConnection *)newConnection {
55 NSNumber *num = [newConnection valueForEntitlement:@"com.apple.private.securityuploadd"];
56 if (![num isKindOfClass:[NSNumber class]] || ![num boolValue]) {
57 secerror("xpc: Client (pid: %d) doesn't have entitlement", [newConnection processIdentifier]);
60 secinfo("xpc", "Client (pid: %d) properly entitled, let's go", [newConnection processIdentifier]);
63 newConnection.exportedInterface = [NSXPCInterface interfaceWithProtocol:@protocol(supdProtocol)];
64 supd *exportedObject = [supd instance];
65 newConnection.exportedObject = exportedObject;
66 [newConnection resume];
72 static void securityuploadd_sandbox(void)
75 // Enter the sandbox on macOS
76 char homeDir[PATH_MAX] = {};
77 struct passwd* pwd = getpwuid(getuid());
79 secerror("Failed to get home directory for user: %d", errno);
83 if (realpath(pwd->pw_dir, homeDir) == NULL) {
84 strlcpy(homeDir, pwd->pw_dir, sizeof(homeDir));
87 const char *sandbox_params[] = {
93 secerror("initializing securityuploadd sandbox with HOME=%s", homeDir);
94 if (sandbox_init_with_parameters("com.apple.securityuploadd", SANDBOX_NAMED, sandbox_params, &sberror) != 0) {
95 secerror("Failed to enter securityuploadd sandbox: %{public}s", sberror);
101 int main(int argc, const char *argv[])
103 secnotice("lifecycle", "supd lives!");
104 [NSError _setFileNameLocalizationEnabled:NO];
105 securityuploadd_sandbox();
107 ServiceDelegate *delegate = [ServiceDelegate new];
109 // kick the singleton so it can register its xpc activity handler
112 NSXPCListener *listener = [[NSXPCListener alloc] initWithMachServiceName:@"com.apple.securityuploadd"];
113 listener.delegate = delegate;
115 // We're always launched in response to client activity and don't want to sit around idle.
116 dispatch_after(dispatch_time(DISPATCH_TIME_NOW, 5ull * NSEC_PER_SEC), dispatch_get_global_queue(DISPATCH_QUEUE_PRIORITY_DEFAULT, 0), ^{
117 secnotice("lifecycle", "will exit when clean");
118 xpc_transaction_exit_clean();
122 [[NSRunLoop currentRunLoop] run];
126 #endif // !TARGET_OS_SIMULATOR