version 1.1.2.12, 2007/01/09 20:25:40
|
version 1.1.4.9, 2007/05/10 17:46:19
|
|
|
| |
#include <cstdio> | #include <cstdio> |
#include <cstdlib> | #include <cstdlib> |
#include <cstdlib> |
|
#include <cstring> | #include <cstring> |
| |
|
#include <Pegasus/Common/Config.h> |
|
|
#if defined(PEGASUS_OS_TYPE_WINDOWS) | #if defined(PEGASUS_OS_TYPE_WINDOWS) |
# include <windows.h> | # include <windows.h> |
#else | #else |
|
|
# include <unistd.h> | # include <unistd.h> |
# include <fcntl.h> | # include <fcntl.h> |
# include <sys/wait.h> | # include <sys/wait.h> |
# include <unistd.h> |
|
# include <sys/time.h> | # include <sys/time.h> |
# include <sys/resource.h> | # include <sys/resource.h> |
#endif | #endif |
| |
#include "Constants.h" |
#include <Pegasus/Common/Constants.h> |
#include "Executor.h" |
#include <Pegasus/Common/Mutex.h> |
#include "Mutex.h" |
#include <Pegasus/Common/FileSystem.h> |
#include "FileSystem.h" |
#include <Pegasus/Common/String.h> |
#include "String.h" |
#include <Pegasus/Common/Tracer.h> |
|
#include <Pegasus/Common/Executor.h> |
|
|
#include <Executor/Strlcpy.h> | #include <Executor/Strlcpy.h> |
#include <Executor/Strlcat.h> |
|
| |
#if defined(PEGASUS_ENABLE_PRIVILEGE_SEPARATION) | #if defined(PEGASUS_ENABLE_PRIVILEGE_SEPARATION) |
|
# include <Executor/Socket.h> |
# include <Executor/Messages.h> | # include <Executor/Messages.h> |
#endif | #endif |
| |
|
|
| |
PEGASUS_NAMESPACE_BEGIN | PEGASUS_NAMESPACE_BEGIN |
| |
static int _sock = -1; |
//////////////////////////////////////////////////////////////////////////////// |
static Mutex _mutex; |
// |
|
// |
|
// class ExecutorImpl |
|
// |
|
// |
|
//////////////////////////////////////////////////////////////////////////////// |
| |
static int _getSock() |
class ExecutorImpl |
|
{ |
|
public: |
|
|
|
virtual ~ExecutorImpl() |
{ | { |
int sock; |
|
_mutex.lock(); |
|
sock = _sock; |
|
_mutex.unlock(); |
|
return sock; |
|
} | } |
| |
|
virtual int detectExecutor() = 0; |
|
|
|
virtual int ping() = 0; |
|
|
|
virtual FILE* openFile( |
|
const char* path, |
|
int mode) = 0; |
|
|
|
virtual int renameFile( |
|
const char* oldPath, |
|
const char* newPath) = 0; |
|
|
|
virtual int removeFile( |
|
const char* path) = 0; |
|
|
|
virtual int startProviderAgent( |
|
const char* module, |
|
const String& userName, |
|
int uid, |
|
int gid, |
|
int& pid, |
|
AnonymousPipe*& readPipe, |
|
AnonymousPipe*& writePipe) = 0; |
|
|
|
virtual int daemonizeExecutor() = 0; |
|
|
|
virtual int reapProviderAgent( |
|
int pid) = 0; |
|
|
|
virtual int authenticatePassword( |
|
const char* username, |
|
const char* password) = 0; |
|
|
|
virtual int validateUser( |
|
const char* username) = 0; |
|
|
|
virtual int challengeLocal( |
|
const char* username, |
|
char challengeFilePath[EXECUTOR_BUFFER_SIZE]) = 0; |
|
|
|
virtual int authenticateLocal( |
|
const char* challengeFilePath, |
|
const char* response) = 0; |
|
}; |
|
|
//////////////////////////////////////////////////////////////////////////////// | //////////////////////////////////////////////////////////////////////////////// |
//////////////////////////////////////////////////////////////////////////////// |
// |
//// |
// |
//// Loopback stubs: |
// class ExecutorLoopbackImpl |
//// |
// |
//////////////////////////////////////////////////////////////////////////////// |
// |
//////////////////////////////////////////////////////////////////////////////// | //////////////////////////////////////////////////////////////////////////////// |
| |
static int Loopback_ping() |
class ExecutorLoopbackImpl : public ExecutorImpl |
{ | { |
// Nothing to do. |
public: |
return 0; |
|
|
virtual ~ExecutorLoopbackImpl() |
|
{ |
|
} |
|
|
|
virtual int detectExecutor() |
|
{ |
|
return -1; |
} | } |
| |
FILE* Loopback_openFile( |
virtual int ping() |
|
{ |
|
return -1; |
|
} |
|
|
|
virtual FILE* openFile( |
const char* path, | const char* path, |
int mode) | int mode) |
{ | { |
|
|
} | } |
} | } |
| |
static int Loopback_renameFile( |
virtual int renameFile( |
const char* oldPath, | const char* oldPath, |
const char* newPath) | const char* newPath) |
{ | { |
return FileSystem::renameFile(oldPath, newPath) ? 0 : -1; | return FileSystem::renameFile(oldPath, newPath) ? 0 : -1; |
} | } |
| |
static int Loopback_removeFile( |
|
|
virtual int removeFile( |
const char* path) | const char* path) |
{ | { |
return FileSystem::removeFile(path) ? 0 : -1; | return FileSystem::removeFile(path) ? 0 : -1; |
} | } |
| |
static int _getProviderAgentPath(String& path) |
|
{ |
|
// ATTN: is this really a sufficient replacement for getHomedPath(). |
|
// Does getHomedPath() use the configuration file? |
|
|
|
path = PEGASUS_PROVIDER_AGENT_PROC_NAME; |
|
|
|
if (path[0] != '/') |
|
{ |
|
const char* env = getenv("PEGASUS_HOME"); |
|
|
|
if (!env) |
|
return -1; |
|
|
|
path = String(env) + String("/") + path; |
|
} |
|
|
|
return 0; |
|
} |
|
| |
#if defined(PEGASUS_OS_TYPE_WINDOWS) |
virtual int startProviderAgent( |
|
|
static int Loopback_startProviderAgent( |
|
const char* module, | const char* module, |
|
const String& userName, |
int uid, | int uid, |
int gid, | int gid, |
int& pid, | int& pid, |
AnonymousPipe*& readPipe, | AnonymousPipe*& readPipe, |
AnonymousPipe*& writePipe) | AnonymousPipe*& writePipe) |
{ | { |
|
// Add logging here. |
|
|
|
#if defined(PEGASUS_OS_TYPE_WINDOWS) |
|
|
AutoMutex autoMutex(_mutex); | AutoMutex autoMutex(_mutex); |
| |
// Set output parameters in case of failure. | // Set output parameters in case of failure. |
|
|
writePipe = pipeToAgent; | writePipe = pipeToAgent; |
| |
return 0; | return 0; |
} |
|
| |
#elif defined(PEGASUS_OS_OS400) | #elif defined(PEGASUS_OS_OS400) |
| |
static int Loopback_startProviderAgent( |
|
const char* module, |
|
int uid, |
|
int gid, |
|
int& pid, |
|
AnonymousPipe*& readPipe, |
|
AnonymousPipe*& writePipe) |
|
{ |
|
// ATTN: no implementation for OS400. | // ATTN: no implementation for OS400. |
return -1; | return -1; |
} |
|
| |
#else /* POSIX CASE FOLLOWS */ | #else /* POSIX CASE FOLLOWS */ |
| |
static int Loopback_startProviderAgent( |
|
const SessionKey& sessionKey, |
|
const char* module, |
|
int uid, |
|
int gid, |
|
int& pid, |
|
SessionKey& providerAgentSessionKey, |
|
AnonymousPipe*& readPipe, |
|
AnonymousPipe*& writePipe) |
|
{ |
|
AutoMutex autoMutex(_mutex); | AutoMutex autoMutex(_mutex); |
| |
// Initialize output parameters in case of error. | // Initialize output parameters in case of error. |
| |
providerAgentSessionKey.clear(); |
|
pid = -1; | pid = -1; |
readPipe = 0; | readPipe = 0; |
writePipe = 0; | writePipe = 0; |
|
|
| |
// Fork process: | // Fork process: |
| |
#if !defined(PEGASUS_OS_VMS) |
#if defined(PEGASUS_OS_VMS) |
pid = (int)vfork(); | pid = (int)vfork(); |
#else | #else |
pid = (int)fork(); | pid = (int)fork(); |
|
|
| |
if (pid == 0) | if (pid == 0) |
{ | { |
|
#if !defined(PEGASUS_OS_VMS) |
// Close unused pipe descriptors: | // Close unused pipe descriptors: |
| |
close(to[1]); | close(to[1]); |
close(from[0]); | close(from[0]); |
| |
#if !defined(PEGASUS_OS_VMS) |
|
| |
// Close unused descriptors. Leave stdin, stdout, stderr, and the |
// Close unused descriptors. Leave stdin, stdout, stderr, |
// child's pipe descriptors open. |
// and the child's pipe descriptors open. |
| |
struct rlimit rlim; | struct rlimit rlim; |
| |
|
|
| |
if (uid != -1 && gid != -1) | if (uid != -1 && gid != -1) |
{ | { |
if ((int)getgid() != gid) |
PEG_TRACE((TRC_OS_ABSTRACTION, Tracer::LEVEL4, |
|
"Changing user context to: userName=%s uid=%d, gid=%d", |
|
(const char*)userName.getCString(), uid, gid)); |
|
|
|
if (setgid(gid) != 0) |
{ | { |
// ATTN: log failure! |
PEG_TRACE_STRING(TRC_OS_ABSTRACTION, Tracer::LEVEL2, |
setgid(gid); |
String("setgid failed: ") + String(strerror(errno))); |
|
return false; |
} | } |
| |
if ((int)getuid() != uid) |
if (setuid(uid) != 0) |
{ | { |
// ATTN: log failure! |
PEG_TRACE_STRING(TRC_OS_ABSTRACTION, Tracer::LEVEL2, |
setuid(uid); |
String("setuid failed: ") + String(strerror(errno))); |
|
return false; |
} | } |
} | } |
| |
|
|
| |
{ | { |
CString cstr = path.getCString(); | CString cstr = path.getCString(); |
execl(cstr, cstr, arg1, arg2, module, (char*)0); |
if (execl(cstr, cstr, arg1, arg2, module, (char*)0) == -1) |
|
{ |
|
PEG_TRACE((TRC_DISCARDED_DATA, Tracer::LEVEL2, |
|
"execl() failed. errno = %d.", errno)); |
_exit(1); | _exit(1); |
} | } |
|
} |
// ATTN: log failure! |
|
} | } |
} | } |
while (0); | while (0); |
|
|
writePipe = new AnonymousPipe(0, writeFdStr); | writePipe = new AnonymousPipe(0, writeFdStr); |
| |
return 0; | return 0; |
} |
|
| |
#endif /* !defined(START_PROVIDER_AGENT) */ | #endif /* !defined(START_PROVIDER_AGENT) */ |
|
|
static int Loopback_daemonizeExecutor() |
|
{ |
|
// Nothing to do. |
|
return 0; |
|
} | } |
| |
static int Loopback_changeOwner( |
virtual int daemonizeExecutor() |
const char* path, |
|
const char* owner) |
|
{ | { |
return FileSystem::changeFileOwner(path, owner) ? 0 : -1; |
return -1; |
} | } |
| |
static int Loopback_reapProviderAgent( |
virtual int reapProviderAgent( |
const SessionKey& sessionKey, |
|
int pid) | int pid) |
{ | { |
int status; |
int status = 0; |
| |
|
#if defined(PEGASUS_HAS_SIGNALS) |
while ((status = waitpid(pid, 0, 0)) == -1 && errno == EINTR) | while ((status = waitpid(pid, 0, 0)) == -1 && errno == EINTR) |
; | ; |
|
#endif |
| |
return status; | return status; |
} | } |
| |
static int Loopback_authenticatePassword( |
virtual int authenticatePassword( |
const char* username, | const char* username, |
const char* password, |
const char* password) |
SessionKey& sessionKey) |
|
{ | { |
sessionKey.clear(); |
|
|
|
#if defined(PEGASUS_PAM_AUTHENTICATION) | #if defined(PEGASUS_PAM_AUTHENTICATION) |
return PAMAuthenticate(username, password); | return PAMAuthenticate(username, password); |
#else | #else |
|
// ATTN: not handled so don't call in this case. |
return -1; | return -1; |
#endif | #endif |
} | } |
| |
static int Loopback_validateUser( |
virtual int validateUser( |
const char* username) | const char* username) |
{ | { |
#if defined(PEGASUS_PAM_AUTHENTICATION) | #if defined(PEGASUS_PAM_AUTHENTICATION) |
return PAMValidateUser(username); | return PAMValidateUser(username); |
#else | #else |
|
// ATTN: not handled so don't call in this case. |
return -1; | return -1; |
#endif | #endif |
} | } |
| |
//////////////////////////////////////////////////////////////////////////////// |
virtual int challengeLocal( |
//////////////////////////////////////////////////////////////////////////////// |
const char* username, |
//// |
char challengeFilePath[EXECUTOR_BUFFER_SIZE]) |
//// Out-of-process stubs. |
|
//// |
|
//////////////////////////////////////////////////////////////////////////////// |
|
//////////////////////////////////////////////////////////////////////////////// |
|
|
|
#if defined(PEGASUS_ENABLE_PRIVILEGE_SEPARATION) |
|
|
|
//============================================================================== |
|
// |
|
// _recv() |
|
// |
|
// Receives *size* bytes from the given socket. |
|
// |
|
//============================================================================== |
|
|
|
static ssize_t _recv(int sock, void* buffer, size_t size) |
|
{ | { |
size_t r = size; |
// ATTN: not handled so don't call in this case. |
char* p = (char*)buffer; |
|
|
|
if (size == 0) |
|
return -1; | return -1; |
|
} |
| |
while (r) |
virtual int authenticateLocal( |
|
const char* challengeFilePath, |
|
const char* response) |
{ | { |
ssize_t n; |
// ATTN: not handled so don't call in this case. |
|
|
EXECUTOR_RESTART(read(sock, p, r), n); |
|
|
|
if (n == -1) |
|
return -1; | return -1; |
else if (n == 0) |
|
return size - r; |
|
|
|
r -= n; |
|
p += n; |
|
} | } |
| |
return size - r; |
private: |
} |
|
| |
//============================================================================== |
static int _getProviderAgentPath(String& path) |
// |
|
// _send() |
|
// |
|
// Sends *size* bytes on the given socket. |
|
// |
|
//============================================================================== |
|
|
|
static ssize_t _send(int sock, void* buffer, size_t size) |
|
{ | { |
size_t r = size; |
path = PEGASUS_PROVIDER_AGENT_PROC_NAME; |
char* p = (char*)buffer; |
|
| |
while (r) |
if (path[0] != '/') |
{ | { |
ssize_t n; |
const char* env = getenv("PEGASUS_HOME"); |
EXECUTOR_RESTART(write(sock, p, r), n); |
|
| |
if (n == -1) |
if (!env) |
return -1; | return -1; |
else if (n == 0) |
|
return size - r; |
|
| |
r -= n; |
path = String(env) + String("/") + path; |
p += n; |
|
} | } |
| |
return size - r; |
return 0; |
} | } |
| |
static int _receiveDescriptorArray(int sock, int descriptors[], size_t count) |
Mutex _mutex; |
{ |
}; |
// This control data begins with a cmsghdr struct followed by the data |
|
// (a descriptor in this case). The union ensures that the data is aligned |
|
// suitably for the leading cmsghdr struct. The descriptor itself is |
|
// properly aligned since the cmsghdr ends on a boundary that is suitably |
|
// aligned for any type (including int). |
|
// |
|
// ControlData = [ cmsghdr | int ] |
|
|
|
size_t size = CMSG_SPACE(sizeof(int) * count); |
|
char* data = (char*)malloc(size); |
|
|
|
// Define a msghdr that refers to the control data, which is filled in |
|
// by calling recvmsg() below. |
|
|
|
msghdr mh; |
|
memset(&mh, 0, sizeof(mh)); |
|
mh.msg_control = data; |
|
mh.msg_controllen = size; |
|
| |
// The other process sends a single-byte message. This byte is not |
//////////////////////////////////////////////////////////////////////////////// |
// used since we only need the control data (the descriptor) but we |
// |
// must request at least one byte from recvmsg(). |
// |
|
// class ExecutorSocketImpl : public ExecutorImpl |
struct iovec iov[1]; |
// |
memset(iov, 0, sizeof(iov)); |
// |
|
//////////////////////////////////////////////////////////////////////////////// |
char dummy; |
|
iov[0].iov_base = &dummy; |
|
iov[0].iov_len = 1; |
|
mh.msg_iov = iov; |
|
mh.msg_iovlen = 1; |
|
|
|
// Receive the message from the other process. |
|
|
|
ssize_t n = recvmsg(sock, &mh, 0); |
|
|
|
if (n <= 0) |
|
return -1; |
|
| |
// Get a pointer to control message. Return if the header is null or does |
#if defined(PEGASUS_ENABLE_PRIVILEGE_SEPARATION) |
// not contain what we expect. |
|
| |
cmsghdr* cmh = CMSG_FIRSTHDR(&mh); |
class ExecutorSocketImpl : public ExecutorImpl |
|
{ |
|
public: |
| |
if (!cmh || |
ExecutorSocketImpl(int sock) : _sock(sock) |
cmh->cmsg_len != CMSG_LEN(sizeof(int) * count) || |
|
cmh->cmsg_level != SOL_SOCKET || |
|
cmh->cmsg_type != SCM_RIGHTS) |
|
{ | { |
return -1; |
|
} | } |
| |
// Copy the data: |
virtual ~ExecutorSocketImpl() |
|
{ |
memcpy(descriptors, CMSG_DATA(cmh), sizeof(int) * count); |
} |
| |
|
virtual int detectExecutor() |
|
{ |
return 0; | return 0; |
} | } |
| |
static int Socket_ping() |
virtual int ping() |
{ | { |
AutoMutex autoMutex(_mutex); | AutoMutex autoMutex(_mutex); |
| |
|
|
ExecutorRequestHeader header; | ExecutorRequestHeader header; |
header.code = EXECUTOR_PING_MESSAGE; | header.code = EXECUTOR_PING_MESSAGE; |
| |
if (_send(_getSock(), &header, sizeof(header)) != sizeof(header)) |
if (_send(_sock, &header, sizeof(header)) != sizeof(header)) |
return -1; | return -1; |
| |
ExecutorPingResponse response; | ExecutorPingResponse response; |
| |
if (_recv(_getSock(), &response, sizeof(response)) != sizeof(response)) |
if (_recv(_sock, &response, sizeof(response)) != sizeof(response)) |
return -1; | return -1; |
| |
if (response.magic == EXECUTOR_PING_MAGIC) | if (response.magic == EXECUTOR_PING_MAGIC) |
|
|
return -1; | return -1; |
} | } |
| |
FILE* Socket_openFile( |
virtual FILE* openFile( |
const char* path, | const char* path, |
int mode) | int mode) |
{ | { |
|
|
ExecutorRequestHeader header; | ExecutorRequestHeader header; |
header.code = EXECUTOR_OPEN_FILE_MESSAGE; | header.code = EXECUTOR_OPEN_FILE_MESSAGE; |
| |
if (_send(_getSock(), &header, sizeof(header)) != sizeof(header)) |
if (_send(_sock, &header, sizeof(header)) != sizeof(header)) |
return NULL; | return NULL; |
| |
// _send request body. | // _send request body. |
|
|
Strlcpy(request.path, path, EXECUTOR_BUFFER_SIZE); | Strlcpy(request.path, path, EXECUTOR_BUFFER_SIZE); |
request.mode = mode; | request.mode = mode; |
| |
if (_send(_getSock(), &request, sizeof(request)) != sizeof(request)) |
if (_send(_sock, &request, sizeof(request)) != sizeof(request)) |
return NULL; | return NULL; |
| |
// Receive the response | // Receive the response |
| |
ExecutorOpenFileResponse response; | ExecutorOpenFileResponse response; |
| |
if (_recv(_getSock(), &response, sizeof(response)) != sizeof(response)) |
if (_recv(_sock, &response, sizeof(response)) != sizeof(response)) |
return NULL; | return NULL; |
| |
// Receive descriptor (if response successful). | // Receive descriptor (if response successful). |
|
|
{ | { |
int fds[1]; | int fds[1]; |
| |
if (_receiveDescriptorArray(_getSock(), fds, 1) != 0) |
if (RecvDescriptorArray(_sock, fds, 1) != 0) |
return NULL; | return NULL; |
| |
if (fds[0] == -1) | if (fds[0] == -1) |
|
|
return NULL; | return NULL; |
} | } |
| |
static int Socket_renameFile( |
virtual int renameFile( |
const char* oldPath, | const char* oldPath, |
const char* newPath) | const char* newPath) |
{ | { |
|
|
ExecutorRequestHeader header; | ExecutorRequestHeader header; |
header.code = EXECUTOR_RENAME_FILE_MESSAGE; | header.code = EXECUTOR_RENAME_FILE_MESSAGE; |
| |
if (_send(_getSock(), &header, sizeof(header)) != sizeof(header)) |
if (_send(_sock, &header, sizeof(header)) != sizeof(header)) |
return -1; | return -1; |
| |
// _send request body. | // _send request body. |
|
|
Strlcpy(request.oldPath, oldPath, EXECUTOR_BUFFER_SIZE); | Strlcpy(request.oldPath, oldPath, EXECUTOR_BUFFER_SIZE); |
Strlcpy(request.newPath, newPath, EXECUTOR_BUFFER_SIZE); | Strlcpy(request.newPath, newPath, EXECUTOR_BUFFER_SIZE); |
| |
if (_send(_getSock(), &request, sizeof(request)) != sizeof(request)) |
if (_send(_sock, &request, sizeof(request)) != sizeof(request)) |
return -1; | return -1; |
| |
// Receive the response | // Receive the response |
| |
ExecutorRenameFileResponse response; | ExecutorRenameFileResponse response; |
| |
if (_recv(_getSock(), &response, sizeof(response)) != sizeof(response)) |
if (_recv(_sock, &response, sizeof(response)) != sizeof(response)) |
return -1; | return -1; |
| |
return response.status; | return response.status; |
} | } |
| |
static int Socket_removeFile( |
virtual int removeFile( |
const char* path) | const char* path) |
{ | { |
AutoMutex autoMutex(_mutex); | AutoMutex autoMutex(_mutex); |
|
|
ExecutorRequestHeader header; | ExecutorRequestHeader header; |
header.code = EXECUTOR_REMOVE_FILE_MESSAGE; | header.code = EXECUTOR_REMOVE_FILE_MESSAGE; |
| |
if (_send(_getSock(), &header, sizeof(header)) != sizeof(header)) |
if (_send(_sock, &header, sizeof(header)) != sizeof(header)) |
return -1; | return -1; |
| |
// _send request body. | // _send request body. |
|
|
memset(&request, 0, sizeof(request)); | memset(&request, 0, sizeof(request)); |
Strlcpy(request.path, path, EXECUTOR_BUFFER_SIZE); | Strlcpy(request.path, path, EXECUTOR_BUFFER_SIZE); |
| |
if (_send(_getSock(), &request, sizeof(request)) != sizeof(request)) |
if (_send(_sock, &request, sizeof(request)) != sizeof(request)) |
return -1; | return -1; |
| |
// Receive the response | // Receive the response |
| |
ExecutorRemoveFileResponse response; | ExecutorRemoveFileResponse response; |
| |
if (_recv(_getSock(), &response, sizeof(response)) != sizeof(response)) |
if (_recv(_sock, &response, sizeof(response)) != sizeof(response)) |
return -1; | return -1; |
| |
return response.status; | return response.status; |
} | } |
| |
static int Socket_startProviderAgent( |
virtual int startProviderAgent( |
const SessionKey& sessionKey, |
|
const char* module, | const char* module, |
|
const String& userName, |
int uid, | int uid, |
int gid, | int gid, |
int& pid, | int& pid, |
SessionKey& providerAgentSessionKey, |
|
AnonymousPipe*& readPipe, | AnonymousPipe*& readPipe, |
AnonymousPipe*& writePipe) | AnonymousPipe*& writePipe) |
{ | { |
AutoMutex autoMutex(_mutex); | AutoMutex autoMutex(_mutex); |
| |
providerAgentSessionKey.clear(); |
|
readPipe = 0; | readPipe = 0; |
writePipe = 0; | writePipe = 0; |
| |
|
|
ExecutorRequestHeader header; | ExecutorRequestHeader header; |
header.code = EXECUTOR_START_PROVIDER_AGENT_MESSAGE; | header.code = EXECUTOR_START_PROVIDER_AGENT_MESSAGE; |
| |
if (_send(_getSock(), &header, sizeof(header)) != sizeof(header)) |
if (_send(_sock, &header, sizeof(header)) != sizeof(header)) |
return -1; | return -1; |
| |
// _send request body. | // _send request body. |
| |
ExecutorStartProviderAgentRequest request; | ExecutorStartProviderAgentRequest request; |
memset(&request, 0, sizeof(request)); | memset(&request, 0, sizeof(request)); |
Strlcpy(request.key, sessionKey.data(), sizeof(request.key)); |
|
memcpy(request.module, module, n); | memcpy(request.module, module, n); |
request.uid = uid; | request.uid = uid; |
request.gid = gid; | request.gid = gid; |
| |
if (_send(_getSock(), &request, sizeof(request)) != sizeof(request)) |
if (_send(_sock, &request, sizeof(request)) != sizeof(request)) |
return -1; | return -1; |
| |
// Receive the response | // Receive the response |
| |
ExecutorStartProviderAgentResponse response; | ExecutorStartProviderAgentResponse response; |
| |
if (_recv(_getSock(), &response, sizeof(response)) != sizeof(response)) |
if (_recv(_sock, &response, sizeof(response)) != sizeof(response)) |
return -1; | return -1; |
| |
// Get the session key. |
|
|
|
Strlcpy((char*)providerAgentSessionKey.data(), |
|
response.key, providerAgentSessionKey.size()); |
|
|
|
// Check response status and pid. | // Check response status and pid. |
| |
if (response.status != 0) | if (response.status != 0) |
|
|
// Receive descriptors. | // Receive descriptors. |
| |
int descriptors[2]; | int descriptors[2]; |
int result = _receiveDescriptorArray(_getSock(), descriptors, 2); |
int result = RecvDescriptorArray(_sock, descriptors, 2); |
| |
if (result == 0) | if (result == 0) |
{ | { |
int readFd = descriptors[0]; | int readFd = descriptors[0]; |
int writeFd = descriptors[1]; | int writeFd = descriptors[1]; |
| |
// Create to and from AnonymousPipe instances to correspond to the pipe |
// Create to and from AnonymousPipe instances to correspond to |
// descriptors created above. |
// the pipe descriptors created above. |
| |
char readFdStr[32]; | char readFdStr[32]; |
char writeFdStr[32]; | char writeFdStr[32]; |
|
|
return result; | return result; |
} | } |
| |
static int Socket_daemonizeExecutor() |
virtual int daemonizeExecutor() |
{ | { |
AutoMutex autoMutex(_mutex); | AutoMutex autoMutex(_mutex); |
| |
|
|
ExecutorRequestHeader header; | ExecutorRequestHeader header; |
header.code = EXECUTOR_DAEMONIZE_EXECUTOR_MESSAGE; | header.code = EXECUTOR_DAEMONIZE_EXECUTOR_MESSAGE; |
| |
if (_send(_getSock(), &header, sizeof(header)) != sizeof(header)) |
if (_send(_sock, &header, sizeof(header)) != sizeof(header)) |
return -1; | return -1; |
| |
// Receive the response | // Receive the response |
| |
ExecutorDaemonizeExecutorResponse response; | ExecutorDaemonizeExecutorResponse response; |
| |
if (_recv(_getSock(), &response, sizeof(response)) != sizeof(response)) |
if (_recv(_sock, &response, sizeof(response)) != sizeof(response)) |
return -1; | return -1; |
| |
return response.status; | return response.status; |
} | } |
| |
static int Socket_reapProviderAgent( |
virtual int reapProviderAgent( |
const SessionKey& sessionKey, |
|
int pid) | int pid) |
{ | { |
AutoMutex autoMutex(_mutex); | AutoMutex autoMutex(_mutex); |
|
|
ExecutorRequestHeader header; | ExecutorRequestHeader header; |
header.code = EXECUTOR_REAP_PROVIDER_AGENT; | header.code = EXECUTOR_REAP_PROVIDER_AGENT; |
| |
if (_send(_getSock(), &header, sizeof(header)) != sizeof(header)) |
if (_send(_sock, &header, sizeof(header)) != sizeof(header)) |
return -1; | return -1; |
| |
// _send request body: | // _send request body: |
| |
ExecutorReapProviderAgentRequest request; | ExecutorReapProviderAgentRequest request; |
memset(&request, 0, sizeof(request)); | memset(&request, 0, sizeof(request)); |
Strlcpy(request.key, sessionKey.data(), sizeof(request.key)); |
|
request.pid = pid; | request.pid = pid; |
| |
if (_send(_getSock(), &request, sizeof(request)) != sizeof(request)) |
if (_send(_sock, &request, sizeof(request)) != sizeof(request)) |
return -1; | return -1; |
| |
// Receive the response | // Receive the response |
| |
ExecutorReapProviderAgentResponse response; | ExecutorReapProviderAgentResponse response; |
| |
if (_recv(_getSock(), &response, sizeof(response)) != sizeof(response)) |
if (_recv(_sock, &response, sizeof(response)) != sizeof(response)) |
return -1; | return -1; |
| |
return response.status; | return response.status; |
} | } |
| |
static int Socket_authenticatePassword( |
virtual int authenticatePassword( |
const char* username, | const char* username, |
const char* password, |
const char* password) |
SessionKey& sessionKey) |
|
{ | { |
AutoMutex autoMutex(_mutex); | AutoMutex autoMutex(_mutex); |
| |
sessionKey.clear(); |
|
|
|
// _send request header: | // _send request header: |
| |
ExecutorRequestHeader header; | ExecutorRequestHeader header; |
header.code = EXECUTOR_AUTHENTICATE_PASSWORD_MESSAGE; | header.code = EXECUTOR_AUTHENTICATE_PASSWORD_MESSAGE; |
| |
if (_send(_getSock(), &header, sizeof(header)) != sizeof(header)) |
if (_send(_sock, &header, sizeof(header)) != sizeof(header)) |
return -1; | return -1; |
| |
// _send request body. | // _send request body. |
|
|
Strlcpy(request.username, username, EXECUTOR_BUFFER_SIZE); | Strlcpy(request.username, username, EXECUTOR_BUFFER_SIZE); |
Strlcpy(request.password, password, EXECUTOR_BUFFER_SIZE); | Strlcpy(request.password, password, EXECUTOR_BUFFER_SIZE); |
| |
if (_send(_getSock(), &request, sizeof(request)) != sizeof(request)) |
if (_send(_sock, &request, sizeof(request)) != sizeof(request)) |
return -1; | return -1; |
| |
// Receive the response | // Receive the response |
| |
ExecutorAuthenticatePasswordResponse response; | ExecutorAuthenticatePasswordResponse response; |
| |
if (_recv(_getSock(), &response, sizeof(response)) != sizeof(response)) |
if (_recv(_sock, &response, sizeof(response)) != sizeof(response)) |
return -1; | return -1; |
| |
Strlcpy((char*)sessionKey.data(), response.key, sessionKey.size()); |
|
|
|
return response.status; | return response.status; |
} | } |
| |
static int Socket_validateUser( |
virtual int validateUser( |
const char* username) | const char* username) |
{ | { |
AutoMutex autoMutex(_mutex); | AutoMutex autoMutex(_mutex); |
|
|
ExecutorRequestHeader header; | ExecutorRequestHeader header; |
header.code = EXECUTOR_VALIDATE_USER_MESSAGE; | header.code = EXECUTOR_VALIDATE_USER_MESSAGE; |
| |
if (_send(_getSock(), &header, sizeof(header)) != sizeof(header)) |
if (_send(_sock, &header, sizeof(header)) != sizeof(header)) |
return -1; | return -1; |
| |
// _send request body. | // _send request body. |
|
|
memset(&request, 0, sizeof(request)); | memset(&request, 0, sizeof(request)); |
Strlcpy(request.username, username, EXECUTOR_BUFFER_SIZE); | Strlcpy(request.username, username, EXECUTOR_BUFFER_SIZE); |
| |
if (_send(_getSock(), &request, sizeof(request)) != sizeof(request)) |
if (_send(_sock, &request, sizeof(request)) != sizeof(request)) |
return -1; | return -1; |
| |
// Receive the response | // Receive the response |
| |
ExecutorValidateUserResponse response; | ExecutorValidateUserResponse response; |
| |
if (_recv(_getSock(), &response, sizeof(response)) != sizeof(response)) |
if (_recv(_sock, &response, sizeof(response)) != sizeof(response)) |
return -1; | return -1; |
| |
return response.status; | return response.status; |
} | } |
| |
int Socket_challengeLocal( |
virtual int challengeLocal( |
const char* user, |
const char* username, |
char challenge[EXECUTOR_BUFFER_SIZE], |
char challengeFilePath[EXECUTOR_BUFFER_SIZE]) |
SessionKey& sessionKey) |
|
{ | { |
AutoMutex autoMutex(_mutex); | AutoMutex autoMutex(_mutex); |
| |
sessionKey.clear(); |
|
|
|
// _send request header: | // _send request header: |
| |
ExecutorRequestHeader header; | ExecutorRequestHeader header; |
header.code = EXECUTOR_CHALLENGE_LOCAL_MESSAGE; | header.code = EXECUTOR_CHALLENGE_LOCAL_MESSAGE; |
| |
if (_send(_getSock(), &header, sizeof(header)) != sizeof(header)) |
if (_send(_sock, &header, sizeof(header)) != sizeof(header)) |
return -1; | return -1; |
| |
// _send request body. | // _send request body. |
| |
ExecutorChallengeLocalRequest request; | ExecutorChallengeLocalRequest request; |
memset(&request, 0, sizeof(request)); | memset(&request, 0, sizeof(request)); |
Strlcpy(request.user, user, EXECUTOR_BUFFER_SIZE); |
Strlcpy(request.user, username, EXECUTOR_BUFFER_SIZE); |
| |
if (_send(_getSock(), &request, sizeof(request)) != sizeof(request)) |
if (_send(_sock, &request, sizeof(request)) != sizeof(request)) |
return -1; | return -1; |
| |
// Receive the response | // Receive the response |
| |
ExecutorChallengeLocalResponse response; | ExecutorChallengeLocalResponse response; |
| |
if (_recv(_getSock(), &response, sizeof(response)) != sizeof(response)) |
if (_recv(_sock, &response, sizeof(response)) != sizeof(response)) |
return -1; | return -1; |
| |
Strlcpy((char*)sessionKey.data(), response.key, sessionKey.size()); |
Strlcpy(challengeFilePath, response.challenge, EXECUTOR_BUFFER_SIZE); |
Strlcpy(challenge, response.challenge, EXECUTOR_BUFFER_SIZE); |
|
| |
return response.status; | return response.status; |
} | } |
| |
int Socket_authenticateLocal( |
virtual int authenticateLocal( |
const SessionKey& sessionKey, |
const char* challengeFilePath, |
const char* token) |
const char* response) |
{ | { |
AutoMutex autoMutex(_mutex); | AutoMutex autoMutex(_mutex); |
| |
|
|
ExecutorRequestHeader header; | ExecutorRequestHeader header; |
header.code = EXECUTOR_AUTHENTICATE_LOCAL_MESSAGE; | header.code = EXECUTOR_AUTHENTICATE_LOCAL_MESSAGE; |
| |
if (_send(_getSock(), &header, sizeof(header)) != sizeof(header)) |
if (_send(_sock, &header, sizeof(header)) != sizeof(header)) |
return -1; | return -1; |
| |
// _send request body. | // _send request body. |
| |
ExecutorAuthenticateLocalRequest request; | ExecutorAuthenticateLocalRequest request; |
memset(&request, 0, sizeof(request)); | memset(&request, 0, sizeof(request)); |
Strlcpy(request.key, (char*)sessionKey.data(), EXECUTOR_BUFFER_SIZE); |
Strlcpy(request.challenge, challengeFilePath, EXECUTOR_BUFFER_SIZE); |
Strlcpy(request.token, token, EXECUTOR_BUFFER_SIZE); |
Strlcpy(request.response, response, EXECUTOR_BUFFER_SIZE); |
| |
if (_send(_getSock(), &request, sizeof(request)) != sizeof(request)) |
if (_send(_sock, &request, sizeof(request)) != sizeof(request)) |
return -1; | return -1; |
| |
// Receive the response | // Receive the response |
| |
ExecutorAuthenticateLocalResponse response; |
ExecutorAuthenticateLocalResponse response_; |
| |
if (_recv(_getSock(), &response, sizeof(response)) != sizeof(response)) |
if (_recv(_sock, &response_, sizeof(response_)) != sizeof(response_)) |
return -1; | return -1; |
| |
return response.status; |
return response_.status; |
} | } |
| |
int Socket_newSessionKey( |
private: |
const char username[EXECUTOR_BUFFER_SIZE], |
|
SessionKey& sessionKey) |
|
{ |
|
AutoMutex autoMutex(_mutex); |
|
|
|
sessionKey.clear(); |
|
|
|
// _send request header: |
|
| |
ExecutorRequestHeader header; |
static ssize_t _recv(int sock, void* buffer, size_t size) |
header.code = EXECUTOR_NEW_SESSION_KEY_MESSAGE; |
{ |
|
size_t r = size; |
if (_send(_getSock(), &header, sizeof(header)) != sizeof(header)) |
char* p = (char*)buffer; |
return -1; |
|
|
|
// _send request body. |
|
|
|
ExecutorNewSessionKeyRequest request; |
|
memset(&request, 0, sizeof(request)); |
|
Strlcpy(request.username, username, sizeof(request.username)); |
|
| |
if (_send(_getSock(), &request, sizeof(request)) != sizeof(request)) |
if (size == 0) |
return -1; | return -1; |
| |
// Receive the response |
while (r) |
|
{ |
|
ssize_t n; |
| |
ExecutorNewSessionKeyResponse response; |
EXECUTOR_RESTART(read(sock, p, r), n); |
| |
if (_recv(_getSock(), &response, sizeof(response)) != sizeof(response)) |
if (n == -1) |
return -1; | return -1; |
|
else if (n == 0) |
|
return size - r; |
| |
Strlcpy((char*)sessionKey.data(), response.key, sessionKey.size()); |
r -= n; |
|
p += n; |
|
} |
| |
return response.status; |
return size - r; |
} | } |
| |
int Socket_deleteSessionKey( |
static ssize_t _send(int sock, void* buffer, size_t size) |
const SessionKey& sessionKey) |
|
{ | { |
AutoMutex autoMutex(_mutex); |
size_t r = size; |
|
char* p = (char*)buffer; |
// Send request header: |
|
| |
ExecutorRequestHeader header; |
while (r) |
header.code = EXECUTOR_DELETE_SESSION_KEY_MESSAGE; |
{ |
|
ssize_t n; |
|
EXECUTOR_RESTART(write(sock, p, r), n); |
| |
if (_send(_getSock(), &header, sizeof(header)) != sizeof(header)) |
if (n == -1) |
return -1; | return -1; |
|
else if (n == 0) |
|
return size - r; |
| |
// Send request body. |
r -= n; |
|
p += n; |
|
} |
| |
ExecutorDeleteSessionKeyRequest request; |
return size - r; |
memset(&request, 0, sizeof(request)); |
} |
Strlcpy(request.key, sessionKey.data(), sizeof(request.key)); |
|
| |
if (_send(_getSock(), &request, sizeof(request)) != sizeof(request)) |
int _sock; |
return -1; |
Mutex _mutex; |
|
}; |
| |
// Receive the response |
#endif /* defined(PEGASUS_ENABLE_PRIVILEGE_SEPARATION) */ |
| |
ExecutorDeleteSessionKeyResponse response; |
//////////////////////////////////////////////////////////////////////////////// |
|
// |
|
// |
|
// class Executor |
|
// |
|
// |
|
//////////////////////////////////////////////////////////////////////////////// |
| |
if (_recv(_getSock(), &response, sizeof(response)) != sizeof(response)) |
static int _sock = -1; |
return -1; |
static ExecutorImpl* _impl = 0; |
|
static Mutex _mutex; |
| |
return response.status; |
static ExecutorImpl* _getImpl() |
|
{ |
|
// Use the double-checked locking technique to avoid the overhead of a lock |
|
// on every call. |
|
|
|
if (_impl == 0) |
|
{ |
|
_mutex.lock(); |
|
|
|
if (_impl == 0) |
|
{ |
|
#if defined(PEGASUS_ENABLE_PRIVILEGE_SEPARATION) |
|
if (_sock == -1) |
|
_impl = new ExecutorLoopbackImpl(); |
|
else |
|
_impl = new ExecutorSocketImpl(_sock); |
|
#else |
|
_impl = new ExecutorLoopbackImpl(); |
|
#endif |
} | } |
| |
#endif /* defined(PEGASUS_ENABLE_PRIVILEGE_SEPARATION) */ |
_mutex.unlock(); |
|
} |
| |
//////////////////////////////////////////////////////////////////////////////// |
return _impl; |
//////////////////////////////////////////////////////////////////////////////// |
} |
//// |
|
//// Executor Methods: |
|
//// |
|
//////////////////////////////////////////////////////////////////////////////// |
|
//////////////////////////////////////////////////////////////////////////////// |
|
| |
void Executor::setSock(int sock) | void Executor::setSock(int sock) |
{ | { |
|
|
| |
int Executor::detectExecutor() | int Executor::detectExecutor() |
{ | { |
if (_getSock() == -1) |
return _getImpl()->detectExecutor(); |
return -1; |
|
else |
|
return 0; |
|
} | } |
| |
int Executor::ping() | int Executor::ping() |
{ | { |
if (_getSock() == -1) |
return _getImpl()->ping(); |
return Loopback_ping(); |
|
|
|
#if defined(PEGASUS_ENABLE_PRIVILEGE_SEPARATION) |
|
return Socket_ping(); |
|
#else |
|
return -1; |
|
#endif /* defined(PEGASUS_ENABLE_PRIVILEGE_SEPARATION) */ |
|
} | } |
| |
FILE* Executor::openFile( | FILE* Executor::openFile( |
const char* path, | const char* path, |
int mode) | int mode) |
{ | { |
if (_getSock() == -1) |
return _getImpl()->openFile(path, mode); |
return Loopback_openFile(path, mode); |
|
|
|
#if defined(PEGASUS_ENABLE_PRIVILEGE_SEPARATION) |
|
return Socket_openFile(path, mode); |
|
#else |
|
return NULL; |
|
#endif /* defined(PEGASUS_ENABLE_PRIVILEGE_SEPARATION) */ |
|
} | } |
| |
int Executor::renameFile( | int Executor::renameFile( |
const char* oldPath, | const char* oldPath, |
const char* newPath) | const char* newPath) |
{ | { |
if (_getSock() == -1) |
return _getImpl()->renameFile(oldPath, newPath); |
return Loopback_renameFile(oldPath, newPath); |
|
|
|
#if defined(PEGASUS_ENABLE_PRIVILEGE_SEPARATION) |
|
return Socket_renameFile(oldPath, newPath); |
|
#else |
|
return -1; |
|
#endif /* defined(PEGASUS_ENABLE_PRIVILEGE_SEPARATION) */ |
|
} | } |
| |
int Executor::removeFile( | int Executor::removeFile( |
const char* path) | const char* path) |
{ | { |
if (_getSock() == -1) |
return _getImpl()->removeFile(path); |
return Loopback_removeFile(path); |
|
|
|
#if defined(PEGASUS_ENABLE_PRIVILEGE_SEPARATION) |
|
return Socket_removeFile(path); |
|
#else |
|
return -1; |
|
#endif /* defined(PEGASUS_ENABLE_PRIVILEGE_SEPARATION) */ |
|
} | } |
| |
int Executor::startProviderAgent( | int Executor::startProviderAgent( |
const SessionKey& sessionKey, |
|
const char* module, | const char* module, |
|
const String& userName, |
int uid, | int uid, |
int gid, | int gid, |
int& pid, | int& pid, |
SessionKey& providerAgentSessionKey, |
|
AnonymousPipe*& readPipe, | AnonymousPipe*& readPipe, |
AnonymousPipe*& writePipe) | AnonymousPipe*& writePipe) |
{ | { |
if (_getSock() == -1) |
return _getImpl()->startProviderAgent(module, |
return Loopback_startProviderAgent(sessionKey, module, |
userName, uid, gid, pid, readPipe, writePipe); |
uid, gid, pid, providerAgentSessionKey, readPipe, writePipe); |
|
|
|
#if defined(PEGASUS_ENABLE_PRIVILEGE_SEPARATION) |
|
return Socket_startProviderAgent(sessionKey, module, |
|
uid, gid, pid, providerAgentSessionKey, readPipe, writePipe); |
|
#else |
|
providerAgentSessionKey.clear(); |
|
return -1; |
|
#endif /* defined(PEGASUS_ENABLE_PRIVILEGE_SEPARATION) */ |
|
} | } |
| |
int Executor::daemonizeExecutor() | int Executor::daemonizeExecutor() |
{ | { |
if (_getSock() == -1) |
return _getImpl()->daemonizeExecutor(); |
return Loopback_daemonizeExecutor(); |
|
|
|
#if defined(PEGASUS_ENABLE_PRIVILEGE_SEPARATION) |
|
return Socket_daemonizeExecutor(); |
|
#else |
|
return -1; |
|
#endif /* defined(PEGASUS_ENABLE_PRIVILEGE_SEPARATION) */ |
|
} | } |
| |
int Executor::reapProviderAgent( | int Executor::reapProviderAgent( |
const SessionKey& sessionKey, |
|
int pid) | int pid) |
{ | { |
if (_getSock() == -1) |
return _getImpl()->reapProviderAgent(pid); |
return Loopback_reapProviderAgent(sessionKey, pid); |
|
|
|
#if defined(PEGASUS_ENABLE_PRIVILEGE_SEPARATION) |
|
return Socket_reapProviderAgent(sessionKey, pid); |
|
#else |
|
return -1; |
|
#endif /* defined(PEGASUS_ENABLE_PRIVILEGE_SEPARATION) */ |
|
} | } |
| |
int Executor::authenticatePassword( | int Executor::authenticatePassword( |
const char* username, | const char* username, |
const char* password, |
const char* password) |
SessionKey& sessionKey) |
|
{ | { |
if (_getSock() == -1) |
return _getImpl()->authenticatePassword(username, password); |
return Loopback_authenticatePassword(username, password, sessionKey); |
|
|
|
#if defined(PEGASUS_ENABLE_PRIVILEGE_SEPARATION) |
|
return Socket_authenticatePassword(username, password, sessionKey); |
|
#else |
|
sessionKey.clear(); |
|
return -1; |
|
#endif /* defined(PEGASUS_ENABLE_PRIVILEGE_SEPARATION) */ |
|
} | } |
| |
int Executor::validateUser( | int Executor::validateUser( |
const char* username) | const char* username) |
{ | { |
if (_getSock() == -1) |
return _getImpl()->validateUser(username); |
return Loopback_validateUser(username); |
|
|
|
#if defined(PEGASUS_ENABLE_PRIVILEGE_SEPARATION) |
|
return Socket_validateUser(username); |
|
#else |
|
return -1; |
|
#endif /* defined(PEGASUS_ENABLE_PRIVILEGE_SEPARATION) */ |
|
} | } |
| |
int Executor::challengeLocal( | int Executor::challengeLocal( |
const char* user, | const char* user, |
char path[EXECUTOR_BUFFER_SIZE], |
char challengeFilePath[EXECUTOR_BUFFER_SIZE]) |
SessionKey& sessionKey) |
|
{ | { |
if (_getSock() == -1) |
return _getImpl()->challengeLocal(user, challengeFilePath); |
return -1; |
|
|
|
#if defined(PEGASUS_ENABLE_PRIVILEGE_SEPARATION) |
|
return Socket_challengeLocal(user, path, sessionKey); |
|
#else |
|
sessionKey.clear(); |
|
return -1; |
|
#endif /* defined(PEGASUS_ENABLE_PRIVILEGE_SEPARATION) */ |
|
} | } |
| |
int Executor::authenticateLocal( | int Executor::authenticateLocal( |
const SessionKey& sessionKey, |
const char* challengeFilePath, |
const char* challengeResponse) |
const char* response) |
{ |
|
if (_getSock() == -1) |
|
return -1; |
|
|
|
#if defined(PEGASUS_ENABLE_PRIVILEGE_SEPARATION) |
|
return Socket_authenticateLocal(sessionKey, challengeResponse); |
|
#else |
|
return -1; |
|
#endif /* defined(PEGASUS_ENABLE_PRIVILEGE_SEPARATION) */ |
|
} |
|
|
|
int Executor::newSessionKey( |
|
const char username[EXECUTOR_BUFFER_SIZE], |
|
SessionKey& sessionKey) |
|
{ |
|
if (_getSock() == -1) |
|
{ |
|
sessionKey.clear(); |
|
return 0; |
|
} |
|
|
|
#if defined(PEGASUS_ENABLE_PRIVILEGE_SEPARATION) |
|
return Socket_newSessionKey(username, sessionKey); |
|
#else |
|
return -1; |
|
#endif /* defined(PEGASUS_ENABLE_PRIVILEGE_SEPARATION) */ |
|
} |
|
|
|
int Executor::deleteSessionKey( |
|
const SessionKey& sessionKey) |
|
{ | { |
if (_getSock() == -1) |
return _getImpl()->authenticateLocal(challengeFilePath, response); |
return 0; |
|
|
|
#if defined(PEGASUS_ENABLE_PRIVILEGE_SEPARATION) |
|
return Socket_deleteSessionKey(sessionKey); |
|
#else |
|
return 0; |
|
#endif /* defined(PEGASUS_ENABLE_PRIVILEGE_SEPARATION) */ |
|
} | } |
| |
PEGASUS_NAMESPACE_END | PEGASUS_NAMESPACE_END |