1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104
|
#ifndef __SGE_SECURITY_H
#define __SGE_SECURITY_H
/*___INFO__MARK_BEGIN__*/
/*************************************************************************
*
* The Contents of this file are made available subject to the terms of
* the Sun Industry Standards Source License Version 1.2
*
* Sun Microsystems Inc., March, 2001
*
*
* Sun Industry Standards Source License Version 1.2
* =================================================
* The contents of this file are subject to the Sun Industry Standards
* Source License Version 1.2 (the "License"); You may not use this file
* except in compliance with the License. You may obtain a copy of the
* License at http://gridengine.sunsource.net/Gridengine_SISSL_license.html
*
* Software provided under this License is provided on an "AS IS" basis,
* WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING,
* WITHOUT LIMITATION, WARRANTIES THAT THE SOFTWARE IS FREE OF DEFECTS,
* MERCHANTABLE, FIT FOR A PARTICULAR PURPOSE, OR NON-INFRINGING.
* See the License for the specific provisions governing your rights and
* obligations concerning the Software.
*
* The Initial Developer of the Original Code is: Sun Microsystems, Inc.
*
* Copyright: 2001 by Sun Microsystems, Inc.
*
* All Rights Reserved.
*
************************************************************************/
/*___INFO__MARK_END__*/
#include "cull/cull.h"
#include "gdi/sge_gdiP.h"
#include "gdi/sge_gdi_ctx.h"
#include "gdi/sge_gdi_packet.h"
#include "sge_qmaster_timed_event.h"
#ifdef KERBEROS
# include "krb_lib.h"
#endif
#define SGE_SEC_BUFSIZE 1024
enum {
auth_ok = 0,
auth_no_method,
auth_failed
};
void sge_security_exit(int i);
#ifdef SECURE
/* int 0 on success, -1 on failure */
int sge_ssl_setup_security_path(const char *progname, const char *username);
#endif
#ifdef KERBEROS
int kerb_job(lListElem *jelem, const char *commproc, const char *host, u_short id);
#endif
void tgt2cc(lListElem *jep, const char *rhost);
void tgtcclr(lListElem *jep, const char *rhost);
int set_sec_cred(const char *sge_root, const char *mastername, lListElem *job, lList **alpp);
void delete_credentials(const char *sge_root, lListElem *jep);
bool cache_sec_cred(const char *sge_root, lListElem *jep, const char *rhost);
int store_sec_cred(const char *sge_root, sge_gdi_packet_class_t *packe, lListElem *jep,
int do_authentication, lList **alpp, sge_gdi_ctx_class_t *ctx);
int store_sec_cred2(const char* sge_root,
const char* unqualified_hostname,
lListElem *jelem,
int do_authentication,
int *general,
dstring *err_str);
int sge_security_verify_user(const char *host, const char *commproc, u_long32 id,
const char *admin_user, const char *user, const char *progname);
bool sge_security_verify_unique_identifier(bool check_admin_user,
const char* user,
const char* progname,
unsigned long progid,
const char* hostname,
const char* commproc,
unsigned long commid);
void sge_security_event_handler(sge_gdi_ctx_class_t *ctx, te_event_t anEvent, monitoring_t *monitor);
bool
sge_gdi_packet_initialize_auth_info(sge_gdi_ctx_class_t *ctx,
sge_gdi_packet_class_t *packet_handle,
lList **answer_list, bool use_euid_egid);
bool
sge_gdi_packet_parse_auth_info(sge_gdi_packet_class_t *packet, lList **answer_list);
int sge_put_auth_token(sge_gdi_packet_class_t *packet, lList **answer_list);
#endif /* __SGE_SECURITY_H */
|