core: Remove the Principal method of the Runtime interface.
This is part of the runtimeX migration.
Change-Id: Id7747624f46663ee0b793eed248063aa39f864a5
diff --git a/tools/principal/main.go b/tools/principal/main.go
index 52551c0..9fbdf04 100644
--- a/tools/principal/main.go
+++ b/tools/principal/main.go
@@ -67,7 +67,7 @@
}
defer runtime.Cleanup()
- p := runtime.Principal()
+ p := veyron2.GetPrincipal(runtime.NewContext())
fmt.Printf("Public key : %v\n", p.PublicKey())
fmt.Println("---------------- BlessingStore ----------------")
fmt.Printf("%v", p.BlessingStore().DebugString())
@@ -160,8 +160,8 @@
panic(err)
}
defer runtime.Cleanup()
-
- blessing, err := runtime.Principal().BlessSelf(name, caveats...)
+ principal := veyron2.GetPrincipal(runtime.NewContext())
+ blessing, err := principal.BlessSelf(name, caveats...)
if err != nil {
return fmt.Errorf("failed to create self-signed blessing for name %q: %v", name, err)
}
@@ -217,7 +217,7 @@
}
defer runtime.Cleanup()
- p := runtime.Principal()
+ p := veyron2.GetPrincipal(runtime.NewContext())
var with security.Blessings
var caveats []security.Caveat
@@ -291,8 +291,8 @@
panic(err)
}
defer runtime.Cleanup()
-
- return dumpBlessings(runtime.Principal().BlessingStore().ForPeer(args...))
+ principal := veyron2.GetPrincipal(runtime.NewContext())
+ return dumpBlessings(principal.BlessingStore().ForPeer(args...))
},
}
@@ -309,8 +309,8 @@
panic(err)
}
defer runtime.Cleanup()
-
- return dumpBlessings(runtime.Principal().BlessingStore().Default())
+ principal := veyron2.GetPrincipal(runtime.NewContext())
+ return dumpBlessings(principal.BlessingStore().Default())
},
}
@@ -355,7 +355,7 @@
}
defer runtime.Cleanup()
- p := runtime.Principal()
+ p := veyron2.GetPrincipal(runtime.NewContext())
if _, err := p.BlessingStore().Set(blessings, pattern); err != nil {
return fmt.Errorf("failed to set blessings %v for peers %v: %v", blessings, pattern, err)
}
@@ -403,7 +403,7 @@
}
defer runtime.Cleanup()
- p := runtime.Principal()
+ p := veyron2.GetPrincipal(runtime.NewContext())
if err := p.AddToRoots(blessings); err != nil {
return fmt.Errorf("AddToRoots failed: %v", err)
}
@@ -441,7 +441,7 @@
}
defer runtime.Cleanup()
- p := runtime.Principal()
+ p := veyron2.GetPrincipal(runtime.NewContext())
if err := p.BlessingStore().SetDefault(blessings); err != nil {
return fmt.Errorf("failed to set blessings %v as default: %v", blessings, err)
}
@@ -547,7 +547,7 @@
return fmt.Errorf("failed to read blessings from --with=%q: %v", flagForkWith, err)
}
} else {
- with = runtime.Principal().BlessingStore().Default()
+ with = veyron2.GetPrincipal(runtime.NewContext()).BlessingStore().Default()
}
if c, err := security.ExpiryCaveat(time.Now().Add(flagForkFor)); err != nil {
return fmt.Errorf("failed to create ExpiryCaveat: %v", err)
@@ -558,7 +558,8 @@
// revocation, method etc.
key := p.PublicKey()
- blessings, err := runtime.Principal().Bless(key, with, extension, caveats[0], caveats[1:]...)
+ rp := veyron2.GetPrincipal(runtime.NewContext())
+ blessings, err := rp.Bless(key, with, extension, caveats[0], caveats[1:]...)
if err != nil {
return fmt.Errorf("Bless(%v, %v, %q, ...) failed: %v", key, with, extension, err)
}
@@ -617,18 +618,20 @@
// Wait for getTokenForBlessRPC to clean up:
<-macaroonChan
+ p := veyron2.GetPrincipal(runtime.NewContext())
+
if flagSeekBlessingsSetDefault {
- if err := runtime.Principal().BlessingStore().SetDefault(blessings); err != nil {
+ if err := p.BlessingStore().SetDefault(blessings); err != nil {
return fmt.Errorf("failed to set blessings %v as default: %v", blessings, err)
}
}
if pattern := security.BlessingPattern(flagSeekBlessingsForPeer); len(pattern) > 0 {
- if _, err := runtime.Principal().BlessingStore().Set(blessings, pattern); err != nil {
+ if _, err := p.BlessingStore().Set(blessings, pattern); err != nil {
return fmt.Errorf("failed to set blessings %v for peers %v: %v", blessings, pattern, err)
}
}
if flagAddToRoots {
- if err := runtime.Principal().AddToRoots(blessings); err != nil {
+ if err := p.AddToRoots(blessings); err != nil {
return fmt.Errorf("AddToRoots failed: %v", err)
}
}
@@ -681,7 +684,7 @@
}
defer runtime.Cleanup()
- server, err := runtime.NewServer()
+ server, err := veyron2.NewServer(runtime.NewContext())
if err != nil {
return fmt.Errorf("failed to create server to listen for blessings: %v", err)
}
@@ -694,8 +697,10 @@
if _, err := rand.Read(token[:]); err != nil {
return fmt.Errorf("unable to generate token: %v", err)
}
+
+ p := veyron2.GetPrincipal(runtime.NewContext())
service := &recvBlessingsService{
- principal: runtime.Principal(),
+ principal: p,
token: base64.URLEncoding.EncodeToString(token[:]),
notify: make(chan error),
}
@@ -708,7 +713,7 @@
fmt.Println("You may want to adjust flags affecting the caveats on this blessing, for example using")
fmt.Println("the --for flag, or change the extension to something more meaningful")
fmt.Println()
- fmt.Printf("principal bless --remote_key=%v --remote_token=%v %v %v\n", runtime.Principal().PublicKey(), service.token, naming.JoinAddressName(eps[0].String(), ""), extension)
+ fmt.Printf("principal bless --remote_key=%v --remote_token=%v %v %v\n", p.PublicKey(), service.token, naming.JoinAddressName(eps[0].String(), ""), extension)
fmt.Println()
fmt.Println("...waiting for sender..")
return <-service.notify