blob: 29f94e295eff3d9966ebff83060ca97d88b379fa [file] [log] [blame]
// Copyright 2015 The Vanadium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
// The following enables go generate to generate the doc.go file.
//go:generate go run $JIRI_ROOT/release/go/src/v.io/x/lib/cmdline/testdata/gendoc.go . -help
package main
import (
"bytes"
"encoding/base64"
"fmt"
"io/ioutil"
"v.io/v23"
"v.io/v23/context"
"v.io/v23/security"
"v.io/v23/vom"
"v.io/x/lib/cmdline"
vsecurity "v.io/x/ref/lib/security"
"v.io/x/ref/lib/signals"
"v.io/x/ref/lib/v23cmd"
_ "v.io/x/ref/runtime/factories/roaming"
"v.io/x/ref/services/internal/restsigner"
irole "v.io/x/ref/services/role/roled/internal"
)
var (
configDir string
name string
remoteSignerBlessings string
)
func main() {
cmdRoleD.Flags.StringVar(&configDir, "config-dir", "", "The directory where the role configuration files are stored.")
cmdRoleD.Flags.StringVar(&name, "name", "", "The name to publish for this service.")
cmdRoleD.Flags.StringVar(&remoteSignerBlessings, "remote-signer-blessings", "", "Path to a file containing base64url-vom-encoded blessings to be used with a remote signer. Empty string disables the remote signer.")
cmdline.HideGlobalFlagsExcept()
cmdline.Main(cmdRoleD)
}
var cmdRoleD = &cmdline.Command{
Runner: v23cmd.RunnerFunc(runRoleD),
Name: "roled",
Short: "Runs the Role interface daemon.",
Long: "Command roled runs the Role interface daemon.",
}
func runRoleD(ctx *context.T, env *cmdline.Env, args []string) error {
if len(configDir) == 0 {
return env.UsageErrorf("-config-dir must be specified")
}
if len(name) == 0 {
return env.UsageErrorf("-name must be specified")
}
if remoteSignerBlessings != "" {
// TODO(ashankar): Remove this block
signer, err := restsigner.NewRestSigner()
if err != nil {
return fmt.Errorf("failed to create remote signer: %v", err)
}
// Decode the blessings and ensure that they are attached to the same public key.
encoded, err := ioutil.ReadFile(remoteSignerBlessings)
if err != nil {
return fmt.Errorf("unable to read --remote-signer-blessings (%s): %v", remoteSignerBlessings, err)
}
buf := bytes.NewBuffer(encoded)
var b security.Blessings
if err := vom.NewDecoder(base64.NewDecoder(base64.URLEncoding, buf)).Decode(&b); err != nil {
return fmt.Errorf("unable to decode --remote-signer-blessings (%s): %v", remoteSignerBlessings, err)
}
if buf.Len() != 0 {
return fmt.Errorf("unexpected trailing %d bytes in %s", buf.Len(), remoteSignerBlessings)
}
p, err := security.CreatePrincipal(signer, vsecurity.FixedBlessingsStore(b, nil), vsecurity.NewBlessingRoots())
if err != nil {
return err
}
if err := security.AddToRoots(p, b); err != nil {
return err
}
if ctx, err = v23.WithPrincipal(ctx, p); err != nil {
return err
}
}
ctx, _, err := v23.WithNewDispatchingServer(ctx, name, irole.NewDispatcher(configDir, name))
if err != nil {
return fmt.Errorf("NewServer failed: %v", err)
}
fmt.Printf("NAME=%s\n", name)
<-signals.ShutdownOnSignals(ctx)
return nil
}