12 #ifndef ROOT_XrdProofdManager
13 #define ROOT_XrdProofdManager
33 #include "XrdOuc/XrdOucString.hh"
64 char *val, XrdOucStream *cfg,
bool rcf);
XrdProofdProofServMgr * fSessionMgr
int DoDirectiveRootdAllow(char *, XrdOucStream *, bool)
Process 'rootdallow' directive xpd.rootdallow host1,host2 host3 Host names may contain the wild card ...
XrdProofdClientMgr * ClientMgr() const
const char * DataDirUrlOpts() const
int DoDirectiveFilterLibPaths(char *, XrdOucStream *, bool)
Process 'filterlibpaths' directive xpd.filterlibpaths 1|0 [path1,path2 path3 path4 ...
XrdProofdClientMgr * fClientMgr
int GetWorkers(XrdOucString &workers, XrdProofdProofServ *, const char *)
Get a list of workers from the available resource broker.
int DoDirectiveRole(char *, XrdOucStream *, bool)
Process 'role' directive.
const char * PoolURL() const
std::list< XrdOucString * > fMastersAllowed
const char * SockPathDir() const
const char ** RootdArgs() const
int Config(bool rcf=0)
Run configuration and parse the entered config directives.
const char * DataDir() const
XrdProofGroupMgr * GroupsMgr() const
virtual ~XrdProofdManager()
Destructor.
int Process(XrdProofdProtocol *p)
Process manager request.
const char * RootdExe() const
const char * BareLibPath() const
XrdProofdProofServMgr * SessionMgr() const
XrdOucHash< int > fAllowedUsers
XrdProofdPriorityMgr * fPriorityMgr
int DoDirectiveRootd(char *, XrdOucStream *, bool)
Process 'rootd' directive xpd.rootd deny|allow [rootsys:<tag>] [path:abs-path/] [mode:ro|rw] [auth:no...
XrdProofSched * LoadScheduler()
Load PROOF scheduler.
XrdProofGroupMgr * fGroupsMgr
int DoDirective(XrdProofdDirective *d, char *val, XrdOucStream *cfg, bool rcf)
Update the priorities of the active sessions.
const char * DataSetExp() const
XrdOucString fEffectiveUser
XrdOucString fStageReqRepo
XrdProofdClientMgr * fClientMgr
XrdProofdManager(XrdProtocol_Config *pi, XrdSysError *edest)
Constructor.
int DoDirectiveAllowedGroups(char *, XrdOucStream *, bool)
Process 'allowedgroups' directive.
XrdProofSched * ProofSched() const
int DoDirectiveTrace(char *, XrdOucStream *, bool)
Scan the config file for tracing settings.
int DoDirectiveDataDir(char *, XrdOucStream *, bool)
Process 'datadir' directive.
XrdProofSched * fProofSched
bool CheckMaster(const char *m)
Check if master 'm' is allowed to connect to this host.
const char * NameSpace() const
XrdProofSched * fProofSched
XrdOucString fBareLibPath
int DoDirectiveDataSetReqRepo(char *, XrdOucStream *, bool)
int DoDirectiveAllow(char *, XrdOucStream *, bool)
Process 'allow' directive.
const char * Image() const
std::list< XrdProofdDSInfo * > fDataSetSrcs
std::list< XrdOucString > fRootdArgs
bool IsRootdAllowed(const char *host)
Check if 'host' is allowed to access files via rootd.
XrdScheduler * Sched() const
int CheckUser(const char *usr, const char *grp, XrdProofUI &ui, XrdOucString &e, bool &su)
Check if the user is allowed to use the system Return 0 if OK, -1 if not.
XrdOucString fDataDirUrlOpts
rpdunixsrv * fRootdUnixSrv
XrdProofdAdmin * Admin() const
XrdProofdNetMgr * NetMgr() const
std::list< XrdProofdDSInfo * > * DataSetSrcs()
const char * StageReqRepo() const
const char * AdminPath() const
void RegisterDirectives()
Register directives for configuration.
rpdunixsrv * RootdUnixSrv() const
XrdProofdProofServMgr * fSessionMgr
XrdOucHash< int > fAllowedGroups
const char ** fRootdArgsPtrs
int ResolveKeywords(XrdOucString &s, XrdProofdClient *pcl)
Resolve special keywords in 's' for client 'pcl'.
std::list< XrdOucString > fRootdAllow
XrdOucHash< XrdOucString > fLibPathsToRemove
const char * Host() const
XrdOucString fDataDirOpts
XrdProofdNetMgr * fNetMgr
int DoDirectiveGroupfile(char *, XrdOucStream *, bool)
Process 'groupfile' directive.
const char * LocalROOT() const
int DoDirectivePort(char *, XrdOucStream *, bool)
Process 'xrd.protocol' directive to find the port.
XrdProofdPriorityMgr * PriorityMgr() const
int DoDirectiveMultiUser(char *, XrdOucStream *, bool)
Process 'multiuser' directive.
const char * EffectiveUser() const
void CheckLogFileOwnership()
Make sure that the log file belongs to the original effective user.
XrdROOTMgr * ROOTMgr() const
const char * DataDirOpts() const
int DoDirectiveDataSetSrc(char *, XrdOucStream *, bool)
Process 'datasetsrc' directive.
int DoDirectiveMaxOldLogs(char *, XrdOucStream *, bool)
Process 'maxoldlogs' directive.
XrdOucString fSockPathDir
bool ValidateLocalDataSetSrc(XrdOucString &url, bool &local)
Validate local dataset src at URL (check the URL and make the relevant directories).
const char * TMPdir() const
int DoDirectiveAllowedUsers(char *, XrdOucStream *, bool)
Process 'allowedusers' directive.
const char * WorkDir() const