irods
4.2.8
About: iRODS (the integrated Rule Oriented Data System) is a distributed data-management system for creating data grids, digital libraries, persistent archives, and real-time data systems. Fossies Dox: irods-4.2.8.tar.gz ("unofficial" and yet experimental doxygen-generated source code documentation) 
|
Go to the documentation of this file.
16 #define IRODS_FILESYSTEM_ENABLE_SERVER_SIDE_API
73 "role not supported [%s]",
123 "%s/%s", parColl, childName );
129 std::string svc_role;
143 "role not supported [%s]",
186 memset(&collInfo, 0,
sizeof(collInfo));
194 "%s/%s", parColl, childName );
200 std::string svc_role;
214 "role not supported [%s]",
263 std::string svc_role;
277 "role not supported [%s]",
320 std::string svc_role;
328 if ( strncmp( rei->
uoio->
userType,
"rodsgroup", 9 ) == 0 ) {
339 "role not supported [%s]",
383 std::string svc_role;
402 "role not supported [%s]",
445 std::string svc_role;
455 const fs::path src_path =
static_cast<const char*
>(oldName->
inOutStruct);
456 const fs::path dst_path =
static_cast<const char*
>(newName->
inOutStruct);
461 catch (
const fs::filesystem_error&
e) {
463 return e.code().value();
517 std::string svc_role;
524 std::string strict =
"off";
526 if ( inputArg !=
NULL ) {
527 if ( strncmp( inputArg,
"STRICT", 6 ) == 0 ) {
629 generalAdminInp.
arg0 =
"set-quota";
636 if ( strcmp( generalAdminInp.
arg1,
"user" ) && strcmp( generalAdminInp.
arg1,
"group" ) ) {
638 rodsLog(
LOG_ERROR,
"msiSetQuota: Invalid user type: %s. Valid types are \"user\" and \"group\"",
639 generalAdminInp.
arg1 );
651 generalAdminInp.
arg3 =
"total";
656 generalAdminInp.
arg4 = (
char * )
value->inOutStruct;
659 snprintf( quota, 11,
"%d", *(
int * )
value->inOutStruct );
660 generalAdminInp.
arg4 = quota;
664 generalAdminInp.
arg4 = quota;
673 generalAdminInp.
arg5 =
"";
674 generalAdminInp.
arg6 =
"";
675 generalAdminInp.
arg7 =
"";
676 generalAdminInp.
arg8 =
"";
677 generalAdminInp.
arg9 =
"";
void rodsLog(int level, const char *formatStr,...)
int chlDelCollByAdmin(rsComm_t *rsComm, collInfo_t *collInfo)
const std::string CFG_SERVICE_ROLE_CONSUMER("consumer")
@ SYS_INTERNAL_NULL_INPUT_ERR
int msiDeleteCollByAdmin(msParam_t *xparColl, msParam_t *xchildName, ruleExecInfo_t *rei)
@ SYS_SERVICE_ROLE_NOT_SUPPORTED
int msiDeleteUser(ruleExecInfo_t *rei)
#define PASS(prev_error_)
int chlGenQueryAccessControlSetup(const char *user, const char *zone, const char *host, int priv, int controlFlag)
int msiSetQuota(msParam_t *type, msParam_t *name, msParam_t *resource, msParam_t *value, ruleExecInfo_t *rei)
char * parseMspForStr(msParam_t *inpParam)
int msiCreateUser(ruleExecInfo_t *rei)
int rsGeneralAdmin(rsComm_t *rsComm, generalAdminInp_t *generalAdminInp)
int msiAddUserToGroup(msParam_t *msParam, ruleExecInfo_t *rei)
@ CAT_INSUFFICIENT_PRIVILEGE_LEVEL
int chlRenameLocalZone(rsComm_t *rsComm, const char *oldZoneName, const char *newZoneName)
const std::string CFG_SERVICE_ROLE_PROVIDER("provider")
int msiCreateCollByAdmin(msParam_t *xparColl, msParam_t *xchildName, ruleExecInfo_t *rei)
const std::string STRICT_ACL_KW("strict_acls")
#define LOCAL_PRIV_USER_AUTH
int msiRenameCollection(msParam_t *oldName, msParam_t *newName, ruleExecInfo_t *rei)
int chlRegUserRE(rsComm_t *rsComm, userInfo_t *userInfo)
int chlDelUserRE(rsComm_t *rsComm, userInfo_t *userInfo)
irods::error get_catalog_service_role(std::string &_role)
#define RE_TEST_MACRO(msg)
int msiAclPolicy(msParam_t *msParam, ruleExecInfo_t *)
auto rename(rcComm_t &_comm, const path &_from, const path &_to) -> void
int chlModGroup(rsComm_t *rsComm, const char *groupName, const char *option, const char *userName, const char *userZone)
int chlRegCollByAdmin(rsComm_t *rsComm, collInfo_t *collInfo)
int msiRenameLocalZone(msParam_t *oldName, msParam_t *newName, ruleExecInfo_t *rei)
int freeRErrorContent(rError_t *myError)