veyron/security/agent: Make the agent a pricipal.
* The private key for the principal will have to be in a file named
privatekey.pem located in the directory VEYRON_CREDENTIALS.
* Agent server will have a underlying pricipal.
* Agent client makes rpcs to server to act as a principal.
Change-Id: I29d69c0bfbae4ef3c7530f6a4636b304d56c9cf3
diff --git a/security/agent/agentd/main.go b/security/agent/agentd/main.go
index bcabd77..569032d 100644
--- a/security/agent/agentd/main.go
+++ b/security/agent/agentd/main.go
@@ -21,18 +21,16 @@
flag.Usage = func() {
fmt.Fprintf(os.Stderr, `Usage: %s [agent options] command command_args...
-Loads the private key specified in under privatekey.pem in VEYRON_AGENT into memory, then
+Loads the private key specified in under privatekey.pem in VEYRON_CREDENTIALS into memory, then
starts the specified command with access to the private key via the
agent protocol instead of directly reading from disk.
`, os.Args[0])
flag.PrintDefaults()
}
- // TODO(suharshs): Switch to "VEYRON_CREDENTIALS" after agent is a principal.
- // This will be the end of the old sec model here. Also change the comment above.
- dir := os.Getenv("VEYRON_AGENT")
+ dir := os.Getenv("VEYRON_CREDENTIALS")
if len(dir) == 0 {
- vlog.Fatal("VEYRON_AGENT must be set to directory")
+ vlog.Fatal("VEYRON_CREDENTIALS must be set to directory")
}
p, err := newPrincipalFromDir(dir)
@@ -96,7 +94,11 @@
return nil, fmt.Errorf("failed to read passphrase: %v", err)
}
p, err := vsecurity.CreatePersistentPrincipal(dir, []byte(pass))
- return p, err
+ if err != nil {
+ return nil, err
+ }
+ vsecurity.InitDefaultBlessings(p, "agent_principal")
+ return p, nil
}
func handlePassphrase(dir string) (security.Principal, error) {