veyron/security: Replaced references to AllPrincipals pattern "*" with
security.AllPrincipals (now "...").
This is needed because of https://veyron-review.googlesource.com/#/c/4163/.
Change-Id: I46233cb33347de3adfc30fffa2b110669ea5f793
diff --git a/examples/bank/bank/main.go b/examples/bank/bank/main.go
index 333163a..c01cad2 100644
--- a/examples/bank/bank/main.go
+++ b/examples/bank/bank/main.go
@@ -24,7 +24,7 @@
var (
// TODO(rthellend): Remove the address flag when the config manager is working.
address = flag.String("address", "", "the address/endpoint of the bank server")
- serverPattern = flag.String("server_pattern", "*", "server_pattern is an optional pattern for the expected identity of the fortune server. Example: the pattern \"myorg/fortune\" matches identities with names \"myorg/fortune\" or \"myorg\". If the flag is absent then the default pattern \"*\" matches all identities.")
+ serverPattern = flag.String("server_pattern", string(security.AllPrincipals), "server_pattern is an optional pattern for the expected identity of the fortune server. Example: the pattern \"myorg/fortune\" matches identities with names \"myorg/fortune\" or \"myorg\". If the flag is absent then the default pattern \"...\" matches all identities.")
accountMountTableName string
)
diff --git a/examples/fortune/fortune/main.go b/examples/fortune/fortune/main.go
index bf53acd..559ef1a 100644
--- a/examples/fortune/fortune/main.go
+++ b/examples/fortune/fortune/main.go
@@ -12,13 +12,14 @@
"veyron2"
"veyron2/naming"
"veyron2/rt"
+ "veyron2/security"
)
var (
// TODO(rthellend): Remove the address flag when the config manager is working.
address = flag.String("address", "", "the address/endpoint of the fortune server")
newFortune = flag.String("new_fortune", "", "an optional, new fortune to add to the server's set")
- serverPattern = flag.String("server_pattern", "*", "server_pattern is an optional pattern for the expected identity of the fortune server. Example: the pattern \"myorg/fortune\" matches identities with names \"myorg/fortune\" or \"myorg\". If the flag is absent then the default pattern \"*\" matches all identities.")
+ serverPattern = flag.String("server_pattern", string(security.AllPrincipals), "server_pattern is an optional pattern for the expected identity of the fortune server. Example: the pattern \"myorg/fortune\" matches identities with names \"myorg/fortune\" or \"myorg\". If the flag is absent then the default pattern \"...\" matches all identities.")
)
func main() {
@@ -36,7 +37,7 @@
}
// Issue a Get() rpc specifying the provided pattern for the server's identity as
- // an option. If no pattern is provided then the default pattern "*" matches all
+ // an option. If no pattern is provided then the default pattern "..." matches all
// identities.
ctx, cancel := runtime.NewContext().WithTimeout(time.Minute)
defer cancel()
diff --git a/runtimes/google/ipc/benchmarks/README.txt b/runtimes/google/ipc/benchmarks/README.txt
index 861911b..3a1ce9d 100644
--- a/runtimes/google/ipc/benchmarks/README.txt
+++ b/runtimes/google/ipc/benchmarks/README.txt
@@ -62,7 +62,7 @@
In this case, we can see the cost of name resolution, creating the VC, etc. in
the first RPC.
-$ $VEYRON_ROOT/veyron/go/bin/bmserver --address=localhost:8888 --acl='{"*":"A"}'
+$ $VEYRON_ROOT/veyron/go/bin/bmserver --address=localhost:8888 --acl='{"...":"A"}'
(In a different shell)
$ $VEYRON_ROOT/veyron/go/bin/bmclient --server=/localhost:8888 --count=10 \
@@ -112,7 +112,7 @@
about 22 ms, and streaming many 1 KB chunks takes about 6.5 ms per chunk.
-$ ./bmserver --address=localhost:8888 --acl='{"*":"A"}'
+$ ./bmserver --address=localhost:8888 --acl='{"...":"A"}'
$ ./bmclient --server=/localhost:8888 --count=10 --payload_size=1000
CallEcho 0 2573406000
diff --git a/runtimes/google/security/publicid_store.go b/runtimes/google/security/publicid_store.go
index 4763555..02a5765 100644
--- a/runtimes/google/security/publicid_store.go
+++ b/runtimes/google/security/publicid_store.go
@@ -229,11 +229,11 @@
// NewPublicIDStore returns a security.PublicIDStore based on params.
// * If params is nil, a new store with an empty set of PublicIDs and the default
-// pattern "*" (matched by all PublicIDs) is returned. The store only lives in
+// pattern "..." (matched by all PublicIDs) is returned. The store only lives in
// memory and is never persisted.
// * If params is non-nil, then a store obtained from the serialized data present
// in params.Dir is returned if the data exists, or else a new store with an
-// empty set of PublicIDs and the default pattern "*" is returned. Any subsequent
+// empty set of PublicIDs and the default pattern "..." is returned. Any subsequent
// modifications to the returned store are always signed (using params.Signer)
// and persisted in params.Dir.
func NewPublicIDStore(params *PublicIDStoreParams) (security.PublicIDStore, error) {
diff --git a/security/acl_authorizer.go b/security/acl_authorizer.go
index 30f000d..bf59751 100644
--- a/security/acl_authorizer.go
+++ b/security/acl_authorizer.go
@@ -64,12 +64,12 @@
// The JSON-encoding of a ACL is essentially a JSON object describing a map from
// BlessingPatterns to encoded LabelSets (see LabelSet.MarshalJSON).
// Examples:
-// * `{"*" : "RW"}` encodes an ACL that allows all principals to access all methods with
+// * `{"..." : "RW"}` encodes an ACL that allows all principals to access all methods with
// ReadLabel or WriteLabel.
-// * `{"veyron/alice": "RW", "veyron/bob/*": "R"} encodes an ACL that allows all principals
-// matching "veyron/alice" to access methods with ReadLabel or WriteLabel,
-// and all principals matching "veyron/bob/*" to access methods with ReadLabel.
-// (Also see PublicID.Match.)
+// * `{"veyron/alice": "RW", "veyron/bob/...": "R"}` encodes an ACL that allows all principals
+// matched by "veyron/alice" to access methods with ReadLabel or WriteLabel, and all
+// principals matched by "veyron/bob/..." to access methods with ReadLabel.
+// (Also see BlessingPattern.MatchedBy)
//
// TODO(ataly, ashankar): Instead of reading the file on each call we should use the "inotify"
// mechanism to watch the file. Eventually we should also support ACLs stored in the Veyron