diff --git a/proof/proofd/inc/XrdProofdManager.h b/proof/proofd/inc/XrdProofdManager.h index d55009e36367c4895419c69b8b48dcb7c910955b..ae27d47fae32509e7b80cb856b470dede806f256 100644 --- a/proof/proofd/inc/XrdProofdManager.h +++ b/proof/proofd/inc/XrdProofdManager.h @@ -96,12 +96,6 @@ class XrdProofdManager : public XrdProofdConfig { const char *DataSetExp() const { return fDataSetExp.c_str(); } const char *StageReqRepo() const { return fStageReqRepo.c_str(); } - const char *RootdExe() const { return fRootdExe.c_str(); } - const char **RootdArgs() const { return fRootdArgsPtrs; } - bool IsRootdAllowed(const char *host); - rpdunixsrv *RootdUnixSrv() const { return fRootdUnixSrv; } - bool RootdFork() const { return fRootdFork; } - bool RemotePLite() const { return fRemotePLite; } std::list<XrdProofdDSInfo *> *DataSetSrcs() { return &fDataSetSrcs; } @@ -152,14 +146,6 @@ class XrdProofdManager : public XrdProofdConfig { XrdOucString fDataSetExp; // List of local dataset repositories to be asserted XrdOucString fStageReqRepo; // Directive for staging requests - - XrdOucString fRootdExe; // Path to 'rootd' to be use for protocol 'rootd://' - std::list<XrdOucString> fRootdArgs;// Rootd arguments - const char **fRootdArgsPtrs; // Null terminated array of arguments to execv 'rootd' - std::list<XrdOucString> fRootdAllow;// Host allowed to open files via 'rootd' - rpdunixsrv *fRootdUnixSrv; // Unix socket for rootd callbacks - bool fRootdFork; // If true use fork to start rootd - XrdProtocol *fXrootd; // Reference instance of XrdXrootdProtocol XrdOucString fXrootdLibPath; // Path to 'xrootd' plug-in XrdSysPlugin *fXrootdPlugin; // 'xrootd' plug-in handler diff --git a/proof/proofd/inc/XrdProofdProtocol.h b/proof/proofd/inc/XrdProofdProtocol.h index 6d26eb9f8cefc47e73a6f85940b79ea4cb04f31e..d61b1e7219889d578a39e04489ce4910e97ac331 100644 --- a/proof/proofd/inc/XrdProofdProtocol.h +++ b/proof/proofd/inc/XrdProofdProtocol.h @@ -124,7 +124,6 @@ public: int SendDataN(XrdProofdProofServ *xps, XrdSrvBuffer **buf = 0, bool sb = 0); int SendMsg(); int CtrlC(); - int StartRootd(XrdLink *lp, XrdOucString &emsg); void TouchAdminPath(); int Urgent(); diff --git a/proof/proofd/src/XrdProofdManager.cxx b/proof/proofd/src/XrdProofdManager.cxx index aa0007eab646b5b5c495cb7f4bb9ed454b0c8c94..37082f272252fadc3b7e7669b87f21562247402b 100644 --- a/proof/proofd/src/XrdProofdManager.cxx +++ b/proof/proofd/src/XrdProofdManager.cxx @@ -250,28 +250,6 @@ XrdProofdManager::XrdProofdManager(char *parms, XrdProtocol_Config *pi, XrdSysEr fDataDirOpts = ""; // Default: no action fDataDirUrlOpts = ""; // Default: none - ////// This is deprecated: see fXrootd below - // Rootd file serving enabled by default in readonly mode - fRootdExe = ""; - // Add mandatory arguments - fRootdArgs.push_back(XrdOucString("-i")); - fRootdArgs.push_back(XrdOucString("-nologin")); - fRootdArgs.push_back(XrdOucString("-r")); // Readonly - fRootdArgs.push_back(XrdOucString("-noauth")); // No auth - // Build the argument list - fRootdArgsPtrs = new const char *[fRootdArgs.size() + 2]; - fRootdArgsPtrs[0] = fRootdExe.c_str(); - int i = 1; - std::list<XrdOucString>::iterator ia = fRootdArgs.begin(); - while (ia != fRootdArgs.end()) { - fRootdArgsPtrs[i] = (*ia).c_str(); - ++i; ++ia; - } - fRootdArgsPtrs[fRootdArgs.size() + 1] = 0; - // Started with 'system' (not 'fork') - fRootdFork = 0; - ///////////////////////////////////////////////////////////////// - // Tools to enable xrootd file serving fXrootdLibPath = "<>"; fXrootdPlugin = 0; @@ -330,7 +308,6 @@ XrdProofdManager::~XrdProofdManager() SafeDelete(fProofSched); SafeDelete(fROOTMgr); SafeDelete(fSessionMgr); - SafeDelArray(fRootdArgsPtrs); SafeDelete(fXrootdPlugin); } @@ -1241,61 +1218,8 @@ int XrdProofdManager::Config(bool rcf) } // Xrootd protocol service - if ((fXrootd = LoadXrootd(fParms, fPi, fEDest))) { - // If enabled, Xrootd takes precedence - fRootdExe = ""; - } - - // File server - if (fRootdExe.length() > 0) { - // Absolute or relative? - if (!fRootdExe.beginswith("/")) { - if (fROOTMgr) { - XrdOucString rtag; - if (fRootdExe.beginswith("<") && fRootdExe.endswith(">")) { - if (fRootdExe.length() > 2) rtag.assign(fRootdExe, 1, fRootdExe.length() - 2); - fRootdExe = "rootd"; - fRootdArgsPtrs[0] = fRootdExe.c_str(); - } - XrdROOT *roo = 0; - if (rtag.length() <= 0 || !(roo = fROOTMgr->GetVersion(rtag.c_str()))) - roo = fROOTMgr->DefaultVersion(); - if (roo && strlen(roo->BinDir()) > 0) { - XrdOucString bindir(roo->BinDir()); - if (!bindir.endswith("/")) bindir += "/"; - fRootdExe.insert(bindir, 0); - fRootdArgsPtrs[0] = fRootdExe.c_str(); - } - } - } - // Create unix socket where to accepts callbacks from rootd launchers - XrdOucString sockpath; - XPDFORM(sockpath, "%s/xpd.%d.%d.rootd", fSockPathDir.c_str(), fPort, getpid()); - fRootdUnixSrv = new rpdunixsrv(sockpath.c_str()); - if (!fRootdUnixSrv || (fRootdUnixSrv && !fRootdUnixSrv->isvalid(0))) { - XPDERR("could not start unix server connection on path "<< - sockpath<<" - errno: "<<(int)errno); - fRootdExe = ""; - return -1; - } - TRACE(ALL, "unix socket path for rootd call backs: "<<sockpath); - // Check if access is controlled - if (fRootdAllow.size() > 0) { - XrdOucString hhs; - std::list<XrdOucString>::iterator ia = fRootdAllow.begin(); - while (ia != fRootdAllow.end()) { - if (hhs.length() > 0) hhs += ","; - hhs += (*ia).c_str(); - ++ia; - } - TRACE(ALL, "serving files with: '" << fRootdExe <<"' (protocol: 'rootd://') to ALLOWED hosts"); - TRACE(ALL, "rootd-allowed hosts: "<< hhs); - } else { - TRACE(ALL, "serving files with: '" << fRootdExe <<"' (protocol: 'rootd://') to ALL hosts"); - } - - } else { - TRACE(ALL, "file serving (protocol: 'rootd://') explicitly disabled"); + if (!(fXrootd = LoadXrootd(fParms, fPi, fEDest))) { + TRACE(ALL, "file serving (protocol: 'root://') not available"); } if (!rcf) { @@ -1425,8 +1349,6 @@ void XrdProofdManager::RegisterDirectives() Register("port", new XrdProofdDirective("port", this, &DoDirectiveClass)); Register("datadir", new XrdProofdDirective("datadir", this, &DoDirectiveClass)); Register("datasetsrc", new XrdProofdDirective("datasetsrc", this, &DoDirectiveClass)); - Register("rootd", new XrdProofdDirective("rootd", this, &DoDirectiveClass)); - Register("rootdallow", new XrdProofdDirective("rootdallow", this, &DoDirectiveClass)); Register("xrd.protocol", new XrdProofdDirective("xrd.protocol", this, &DoDirectiveClass)); Register("filterlibpaths", new XrdProofdDirective("filterlibpaths", this, &DoDirectiveClass)); Register("xrootd", new XrdProofdDirective("xrootd", this, &DoDirectiveClass)); @@ -2015,68 +1937,11 @@ int XrdProofdManager::DoDirectiveXrootd(char *val, XrdOucStream *, bool) /// xpd.rootd deny|allow [rootsys:<tag>] [path:abs-path/] [mode:ro|rw] /// [auth:none|full] [other_rootd_args] -int XrdProofdManager::DoDirectiveRootd(char *val, XrdOucStream *cfg, bool) +int XrdProofdManager::DoDirectiveRootd(char *, XrdOucStream *, bool) { XPDLOC(ALL, "Manager::DoDirectiveRootd") - if (!val) - // undefined inputs - return -1; - - // Rebuild arguments list - fRootdArgs.clear(); - SafeDelArray(fRootdArgsPtrs); - - TRACE(ALL, "val: "<< val); - - // Parse directive - XrdOucString mode("ro"), auth("none"), fork("0"); - bool denied = 1; - char *nxt = val; - do { - if (!strcmp(nxt, "deny") || !strcmp(nxt, "disable") || !strcmp(nxt, "off")) { - denied = 1; - fRootdExe = ""; - } else if (!strcmp(nxt, "allow") || !strcmp(nxt, "enable") || !strcmp(nxt, "on")) { - denied = 0; - fRootdExe = "<>"; - TRACE(ALL, "Use of this directive is deprecated: use xpd.xrootd instead"); - } else if (!strncmp(nxt, "mode:", 5)) { - mode = nxt + 5; - } else if (!strncmp(nxt, "auth:", 5)) { - auth = nxt + 5; - } else if (!strncmp(nxt, "fork:", 5)) { - fork = nxt + 5; - } else { - // Assume rootd argument - fRootdArgs.push_back(XrdOucString(nxt)); - } - } while ((nxt = cfg->GetWord())); - - if (!denied) { - // If no exec given assume 'rootd' in the default path - if (fRootdExe.length() <= 0) fRootdExe = "<>"; - // Add mandatory arguments - fRootdArgs.push_back(XrdOucString("-i")); - fRootdArgs.push_back(XrdOucString("-nologin")); - if (mode == "ro") fRootdArgs.push_back(XrdOucString("-r")); - if (auth == "none") fRootdArgs.push_back(XrdOucString("-noauth")); - fRootdFork = (fork == "1" || fork == "yes") ? 1 : 0; - } else { - // Nothing else to do, if denied - return 0; - } - - // Build the argument list - fRootdArgsPtrs = new const char *[fRootdArgs.size() + 2]; - fRootdArgsPtrs[0] = fRootdExe.c_str(); - int i = 1; - std::list<XrdOucString>::iterator ia = fRootdArgs.begin(); - while (ia != fRootdArgs.end()) { - fRootdArgsPtrs[i] = (*ia).c_str(); - ++i; ++ia; - } - fRootdArgsPtrs[fRootdArgs.size() + 1] = 0; + TRACE(ALL, "unsupported!!! "); // Done return 0; @@ -2087,28 +1952,11 @@ int XrdProofdManager::DoDirectiveRootd(char *val, XrdOucStream *cfg, bool) /// xpd.rootdallow host1,host2 host3 /// Host names may contain the wild card '*' -int XrdProofdManager::DoDirectiveRootdAllow(char *val, XrdOucStream *cfg, bool) +int XrdProofdManager::DoDirectiveRootdAllow(char *, XrdOucStream *, bool) { XPDLOC(ALL, "Manager::DoDirectiveRootdAllow") - if (!val) - // undefined inputs - return -1; - - TRACE(ALL, "Use of this and 'xpd.rootd' directives is deprecated: use xpd.xrootd instead"); - - TRACE(ALL, "val: "<< val); - - // Parse directive - XrdOucString hosts, h; - char *nxt = val; - do { - hosts = nxt; - int from = 0; - while ((from = hosts.tokenize(h, from, ',')) != -1) { - if (h.length() > 0) fRootdAllow.push_back(h); - } - } while ((nxt = cfg->GetWord())); + TRACE(ALL, "unsupported!!! "); // Done return 0; @@ -2153,32 +2001,6 @@ int XrdProofdManager::DoDirectiveFilterLibPaths(char *val, XrdOucStream *cfg, bo return 0; } -//////////////////////////////////////////////////////////////////////////////// -/// Check if 'host' is allowed to access files via rootd - -bool XrdProofdManager::IsRootdAllowed(const char *host) -{ - XPDLOC(ALL, "Manager::IsRootdAllowed") - - // Check if access is controlled - if (fRootdAllow.size() <= 0) return 1; - - // Need an host name - if (!host || strlen(host) <= 0) return 0; - - TRACE(DBG, "checking host: "<< host); - - XrdOucString h(host); - std::list<XrdOucString>::iterator ia = fRootdAllow.begin(); - while (ia != fRootdAllow.end()) { - if (h.matches((*ia).c_str(), '*') > 0) return 1; - ++ia; - } - - // Done - return 0; -} - //////////////////////////////////////////////////////////////////////////////// /// Process manager request diff --git a/proof/proofd/src/XrdProofdProofServMgr.cxx b/proof/proofd/src/XrdProofdProofServMgr.cxx index 040b9e6bcab4d3fcad0b4b244bc0e15769e1b553..7fad635914a9622a659679feef1927cae8903257 100644 --- a/proof/proofd/src/XrdProofdProofServMgr.cxx +++ b/proof/proofd/src/XrdProofdProofServMgr.cxx @@ -3538,17 +3538,8 @@ int XrdProofdProofServMgr::CreateProofServEnvFile(XrdProofdProtocol *p, void *in // Local data server XrdOucString locdatasrv; - if (strlen(fMgr->RootdExe()) <= 0) { - XPDFORM(locdatasrv, "root://%s", fMgr->Host()); - } else { - XrdOucString uh(fMgr->Host()); - if (fMgr->MultiUser()) { - XPDFORM(uh, "%s@%s", fMgr->EffectiveUser(), fMgr->Host()); - } else { - XPDFORM(uh, "<effuser>@%s", fMgr->Host()); - } - XPDFORM(locdatasrv, "rootd://%s:%d", uh.c_str(), fMgr->Port()); - } + XPDFORM(locdatasrv, "root://%s", fMgr->Host()); + int nrk = fMgr->ResolveKeywords(locdatasrv, p->Client()); TRACE(HDBG, nrk << " placeholders resolved for LOCALDATASERVER"); len = strlen("LOCALDATASERVER=") + locdatasrv.length() + 2; diff --git a/proof/proofd/src/XrdProofdProtocol.cxx b/proof/proofd/src/XrdProofdProtocol.cxx index ed0d5a67d7c23eb284187641e6017e6bf650795a..2d7bd294e7f54c11f0a21d689665d03e1358f170 100644 --- a/proof/proofd/src/XrdProofdProtocol.cxx +++ b/proof/proofd/src/XrdProofdProtocol.cxx @@ -306,23 +306,10 @@ XrdProtocol *XrdProofdProtocol::Match(XrdLink *lp) if ((dlen = lp->Peek(hsbuff,sizeof(hsdata),fgReadWait)) != sizeof(hsdata)) { if (dlen <= 0) lp->setEtext("Match: handshake not received"); if (dlen == 12) { - // Check if it is a request to open a file via 'rootd' + // Check if it is a request to open a file via 'rootd', unsupported hsdata.first = ntohl(hsdata.first); if (hsdata.first == 8) { - if (strlen(fgMgr->RootdExe()) > 0) { - if (fgMgr->IsRootdAllowed((const char *)lp->Host())) { - TRACE(ALL, "matched rootd protocol on link: executing "<<fgMgr->RootdExe()); - XrdOucString em; - if (StartRootd(lp, em) != 0) { - emsg = "rootd: failed to start daemon: "; - emsg += em; - } - } else { - XPDFORM(emsg, "rootd-file serving not authorized for host '%s'", lp->Host()); - } - } else { - emsg = "rootd-file serving not enabled"; - } + emsg = "rootd-file serving not supported any-longer"; } if (emsg.length() > 0) { lp->setEtext(emsg.c_str()); @@ -386,105 +373,6 @@ XrdProtocol *XrdProofdProtocol::Match(XrdLink *lp) return xp; } -//////////////////////////////////////////////////////////////////////////////// -/// Transfer the connection to a rootd daemon to serve a file access request -/// Return 0 on success, -1 on failure - -int XrdProofdProtocol::StartRootd(XrdLink *lp, XrdOucString &emsg) -{ - XPDLOC(ALL, "Protocol::StartRootd") - - const char *prog = fgMgr->RootdExe(); - const char **progArg = fgMgr->RootdArgs(); - - if (fgMgr->RootdFork()) { - - // Start rootd using fork() - - pid_t pid; - if ((pid = fgMgr->Sched()->Fork(lp->Name()))) { - if (pid < 0) { - emsg = "rootd fork failed"; - return -1; - } - return 0; - } - // In the child ... - - // Restablish standard error for the program we will exec - dup2(fStdErrFD, STDERR_FILENO); - close(fStdErrFD); - - // Force stdin/out to point to the socket FD (this will also bypass the - // close on exec setting for the socket) - dup2(lp->FDnum(), STDIN_FILENO); - dup2(lp->FDnum(), STDOUT_FILENO); - - // Do the exec - execv((const char *)prog, (char * const *)progArg); - TRACE(XERR, "rootd: Oops! Exec(" <<prog <<") failed; errno: " <<errno); - _exit(17); - - } else { - - // Start rootd using system + proofexecv - - // ROOT version - XrdROOT *roo = fgMgr->ROOTMgr()->DefaultVersion(); - if (!roo) { - emsg = "ROOT version undefined!"; - return -1; - } - // The path to the executable - XrdOucString pexe; - XPDFORM(pexe, "%s/proofexecv", roo->BinDir()); - if (access(pexe.c_str(), X_OK) != 0) { - XPDFORM(emsg, "path '%s' does not exist or is not executable (errno: %d)", - pexe.c_str(), (int)errno); - return -1; - } - - // Start the proofexecv - XrdOucString cmd, exp; - XPDFORM(cmd, "export ROOTBINDIR=\"%s\"; %s 20 0 %s %s", roo->BinDir(), - pexe.c_str(), fgMgr->RootdUnixSrv()->path(), prog); - int n = 1; - while (progArg[n] != 0) { - cmd += " "; cmd += progArg[n]; n++; - } - cmd += " &"; - TRACE(HDBG, cmd); - if (system(cmd.c_str()) == -1) { - XPDFORM(emsg, "failure from 'system' (errno: %d)", (int)errno); - return -1; - } - - // Accept a connection from the second server - int err = 0; - rpdunix *uconn = fgMgr->RootdUnixSrv()->accept(-1, &err); - if (!uconn || !uconn->isvalid(0)) { - XPDFORM(emsg, "failure accepting callback (errno: %d)", -err); - if (uconn) delete uconn; - return -1; - } - TRACE(HDBG, "proofexecv connected!"); - - int rcc = 0; - // Transfer the open descriptor to be used in rootd - int fd = dup(lp->FDnum()); - if (fd < 0 || (rcc = uconn->senddesc(fd)) != 0) { - XPDFORM(emsg, "failure sending descriptor '%d' (original: %d); (errno: %d)", fd, lp->FDnum(), -rcc); - if (uconn) delete uconn; - return -1; - } - // Close the connection to the parent - delete uconn; - } - - // Done - return 0; -} - //////////////////////////////////////////////////////////////////////////////// /// Return statistics info about the protocol. /// Not really implemented yet: this is a reduced XrdXrootd version. diff --git a/proof/proofd/src/proofexecv.cxx b/proof/proofd/src/proofexecv.cxx index 74d14e53e5977710d6478e6bc92d34bd212461e0..598a3000388f9c0deb8067da7ea1ca5f3df5bb24 100644 --- a/proof/proofd/src/proofexecv.cxx +++ b/proof/proofd/src/proofexecv.cxx @@ -62,7 +62,6 @@ int setproofservenv(const std::string &envfile, int redirectoutput(const std::string &logfile); void start_ps(int argc, char **argv); -void start_rootd(int argc, char **argv); //////////////////////////////////////////////////////////////////////////////// /// Write info message to syslog. @@ -107,8 +106,8 @@ int main(int argc, char **argv) start_ps(argc, argv); exit(1); } else if (gType == 20) { - // Start a rootd to serve a file - start_rootd(argc, argv); + // rootd not supported anylonger + Info("ERROR: 'rootd' has been removed from ROOT"); exit(1); } else { Info("ERROR: process type %d not yet implemented", gType); @@ -119,71 +118,6 @@ int main(int argc, char **argv) exit(0); } -//////////////////////////////////////////////////////////////////////////////// -/// Process a request to start a rootd server - -void start_rootd(int argc, char **argv) -{ - if (argc < 6) { - Info("argc=%d: at least 5 additional arguments required - exit", argc); - return; - } - - // Parse arguments: - // 1 process type (2=top-master, 1=sub-master 0=worker, 3=test, 10=admin, 20=rootd) - // 2 debug level - // 3 path to unix socket to the parent to receive the open descriptor - // 4 path to rootd executable - // >=5 arguments to rootd - - // Call back the parent, so that it can move to other processes - std::string sockpath = argv[3]; - rpdunix *uconn = new rpdunix(sockpath.c_str()); - if (!uconn || (uconn && !uconn->isvalid(0))) { - Info("ERROR: failure calling back parent on '%s'", sockpath.c_str()); - return; - } - - int rcc = 0; - // Receive the open descriptor to be used in rootd - int fd = -1; - if ((rcc = uconn->recvdesc(fd)) != 0) { - Info("ERROR: failure receiving open descriptor from parent (errno: %d)", -rcc); - delete uconn; - return; - } - // Close the connection to the parent - delete uconn; - - // Force stdin/out to point to the socket FD (this will also bypass the - // close on exec setting for the socket) - if (dup2(fd, STDIN_FILENO) != 0) - Info("WARNING: failure duplicating STDIN (errno: %d)", errno); - if (dup2(fd, STDOUT_FILENO) != 0) - Info("WARNING: failure duplicating STDOUT (errno: %d)", errno); - - // Prepare execv - int na = argc - 4; - char **argvv = new char *[na + 1]; - - // Fill arguments - argvv[0] = argv[4]; - int ia = 5, ka = 1; - while (ia < argc) { - argvv[ka] = argv[ia]; - ka++; ia++; - } - argvv[na] = 0; - - // Run the program - execv(argv[4], argvv); - - // We should not be here!!! - Info("ERROR: returned from execv: bad, bad sign !!!"); - delete [] argvv; - return; -} - //////////////////////////////////////////////////////////////////////////////// /// Process a request to start a proofserv process @@ -195,7 +129,7 @@ void start_ps(int argc, char **argv) } // Parse arguments: - // 1 process type (2=top-master, 1=sub-master 0=worker, 3=test, 10=admin, 20=rootd) + // 1 process type (2=top-master, 1=sub-master 0=worker, 3=test, 10=admin) // 2 debug level // 3 user name // 4 root path for relevant directories and files (to be completed with PID)