This repository has been archived by the owner on Dec 31, 2022. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 0
/
main.go
101 lines (86 loc) · 2.28 KB
/
main.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
package main
import (
"errors"
"flag"
"fmt"
"golang.org/x/crypto/ssh/agent"
"log"
"net"
"os"
"os/exec"
"syscall"
"errors"
"flag"
"runtime"
)
var E_MEMLOCK = errors.New("failed to lock memory:\nTry executing with --no-mlockall or set capability with: setcap cap_ipc_lock=+ep /path/to/vault-agent")
func main() {
var file *os.File
log.SetOutput(os.Stderr)
noMlockall := flag.Bool("no-mlockall", false, "Disable mlockall syscall usage. Security will be decreased!")
foreground := flag.Bool("foreground", false, "Run in foreground")
flag.Parse()
// Reexec in background
if os.Getppid() != 1 && !*foreground {
binary, err := exec.LookPath(os.Args[0])
if err != nil {
log.Fatalln(err)
}
_, err = os.StartProcess(binary, os.Args, &os.ProcAttr{Dir: "", Env: nil,
Files: []*os.File{os.Stdin, os.Stdout, os.Stderr}, Sys: nil})
if err != nil {
log.Fatalln(err)
}
os.Exit(0)
}
// I am the child
if *noMlockall || runtime.GOOS == "darwin" {
log.Println("mlockall syscall usage disabled by flag or OS!")
} else {
// Lock memory pages in child, too
err := syscall.Mlockall(syscall.MCL_FUTURE | syscall.MCL_CURRENT)
if err != nil {
log.Fatalln(E_MEMLOCK)
}
}
// daemon business logic starts here
vaultAddr := os.Getenv("VAULT_ADDR")
vaultToken := os.Getenv("VAULT_TOKEN")
sockPath := fmt.Sprintf("/tmp/vault-agent_%d.sock", os.Geteuid())
ag, err := newAgent(vaultAddr, vaultToken, "/vault-agent")
if err != nil {
log.Fatalln(err)
}
log.Printf("[%d] Starting agent at '%s'\n", os.Getpid(), sockPath)
fmt.Printf("export SSH_AUTH_SOCK=%s\n", sockPath)
fmt.Printf("export SSH_AGENT_PID=%d\n", os.Getpid())
l, err := net.Listen("unix", sockPath)
if err != nil {
log.Fatalln(err)
}
if !*foreground {
// Get new session to disassociate from parent
_, err := syscall.Setsid()
if err != nil {
log.Fatalln(err)
}
func () {
// Disassociate std{in,out,err}
file, err = os.OpenFile("/dev/null", os.O_RDWR, 0)
if err != nil {
log.Fatalln(err)
}
defer file.Close()
syscall.Dup2(int(file.Fd()), int(os.Stderr.Fd()))
syscall.Dup2(int(file.Fd()), int(os.Stdout.Fd()))
syscall.Dup2(int(file.Fd()), int(os.Stdin.Fd()))
}()
for {
conn, err := l.Accept()
if err != nil {
// handle error
continue
}
go agent.ServeAgent(ag, conn)
}
}