Plasma GitLab Archive
Projects Blog Knowledge

----------------------------------------------------------------------
File Queues:
----------------------------------------------------------------------

This is a quite complicated example. The qserver manages several queues
of files. The qclient accesses these queues via RPC.


*** Configuration ***

You must change qserver.ml in order to configure the qserver. There is
one option of interest in the source code: The variable "spooldir"
right at the beginning.  Set it to the directory where the queues will
reside.

This directory must exist, and the user running qserver must have 
read and write permissions.

Furthermore, you must set the authentication style:

- auth_sys: Insecure "system authentication" (included only for purposes
  of an example). This is the default.

- auth_gssapi: authentication via GSSAPI (usually Kerberos)

- auth_ssl: RPC over SSL.

The Makefile variable AUTH_MODULE must be set accordingly, e.g.

$ make AUTH_MODULE=auth_ssl


See the comments on the authentication modules below.



*** System requirements ***

The program assumes that the portmapper (or rpcbind) runs!



*** Overview ***

qclient supports the following commands:

qclient queues   [ -help | options ]          - List queues
qclient create   [ -help | options ]          - Create a new queue
qclient destroy  [ -help | options ]          - Destroy a queue
qclient status   [ -help | options ]          - Show the status of a queue
qclient set      [ -help | options ]          - Set queue parameters
qclient list     [ -help | options ]          - List queue members
qclient add      [ -help | options ]          - Upload a file and add to queue
qclient pop      [ -help | options ]          - Download a file from queue
qclient cancel   [ -help | options ]          - Cancel queue members

Note that new files always added at the end of a queue, and that files
are popped from the beginning of a queue.

You can set the environment variable QCLIENT_HOST to set a default for
the host to contact (which server to contact).


*** Features ***

There may be additional properties with every file. Properties are lists
of (key,value) pairs. A number of properties are predefined (see 
qserver.ml, or just try).

The commands will block if the request cannot be immediately fulfilled, but
probably in the future. For example, if you try to pop a file from an
empty queue, the client blocks until a file is available. It is possible
to specify timeouts.

The queues can be active and inactive. After creation the queues are
inactive (because you may want to set further parameters before starting
operation). If inactive, every operation is rejected. 

An active queue may accept new files or not accept them. In the latter
case, the attempt to add a new file blocks the client until the queue
accepts files.

An active queue may deliver files or do not deliver them. In the latter
case, the attempt to download a file blocks the client until delivery
is again turned on.

It is possible to specify a maximum length for a queue. The client will
block if it tries to add further files.

You can set the state (active/inactive etc.) and other parameters with
"qclient set".


*** Authorization ***

Everybody ( = every authenticated user) can list the queues and obtain
status information. Everybody can create a new queue.

Only the owner of a queue can do the other operations. The owner is
the creator of a queue.


======================================================================
Authentication module auth_sys
======================================================================

This style of authentication does not use any verification, and is
inscure because of this. However, it works out of the box.

======================================================================
Authentication module auth_gssapi
======================================================================

This requires that the netgss-system library is available. For the
normal case that Kerberos is active, the following applies:

 - Kerberos must be configured on both the client and server machine
 - The server needs a keytab. For MIT Kerberos you can create the keytab
   as follows:

   * In kadmin, run the following (where FQDN is the fully-qualified host
     name of the server, and REALM is the Kerberos realm):

     addprinc -randkey ocamlnet_queues/FQDN@REALM
     ktadd -k ocamlnet.keytab ocamlnet_queues/FQDN@REALM

     This puts a file ocamlnet.keytab into the working directory.

   * Ensure that ocamlnet.keytab is readable by the user running qserver.

 - When starting the server, you need to set the environment variable
   KRB5_KTNAME to the absolute path of ocamlnet.keytab
   so the keytab is found (otherwise the system-wide keytab is accessed,
   and this can only do root).

   env KRB5_KTNAME=... ./qserver

 - You need a client credential before you can run qclient (kinit command)
 - On the client side, set the environment variable QCLIENT_HOST to the
   FQDN of the server. The default ("localhost") will not work.

   export QCLIENT_HOST=...
   ./qclient queues

======================================================================
Authentication module auth_ssl
======================================================================

Certificates are used for authentication.

You need the following files (all in PEM format):

- ca.crt: The root certificate (for both client and server)

- server.crt: The server certificate

- server.key: The server private key (w/o password)

- client.crt: The client certificate

- client.key: The client private key (w/o password)

Put these files into the current working directory. The script create_certs.sh
does this with some sample certificates.


The DN of the client cert is the user name.

This web site is published by Informatikbüro Gerd Stolpmann
Powered by Caml