1 Introduction 2 Ground Rules Building a File System 3 File Systems 4 File Content Data Structure 5 Allocation Cluster Manager 6 Exceptions and Emancipation 7 Base Classes, Testing, and More 8 File Meta Data 9 Native File Class 10 Our File System 11 Allocation Table 12 File System Support Code 13 Initializing the File System 14 Contiguous Files 15 Rebuilding the File System 16 Native File System Support Methods 17 Lookups, Wildcards, and Unicode, Oh My 18 Finishing the File System Class The Init Program 19 Hardware Abstraction and UOS Architecture 20 Init Command Mode 21 Using Our File System 22 Hardware and Device Lists 23 Fun with Stores: Partitions 24 Fun with Stores: RAID 25 Fun with Stores: RAM Disks 26 Init wrap-up The Executive 27 Overview of The Executive 28 Starting the Kernel 29 The Kernel 30 Making a Store Bootable 31 The MMC 32 The HMC 33 Loading the components 34 Using the File Processor 35 Symbols and the SSC 36 The File Processor and Device Management 37 The File Processor and File System Management 38 Finishing Executive Startup Users and Security 39 Introduction to Users and Security 40 More Fun With Stores: File Heaps 41 File Heaps, part 2 42 SysUAF 43 TUser 44 SysUAF API Terminal I/O 45 Shells and UCL 46 UOS API, the Application Side 47 UOS API, the Executive Side 48 I/O Devices 49 Streams 50 Terminal Output Filters 51 The TTerminal Class 52 Handles 53 Putting it All Together 54 Getting Terminal Input 55 QIO 56 Cooking Terminal Input 57 Putting it all together, part 2 58 Quotas and I/O UCL 59 UCL Basics 60 Symbol Substitution 61 Command execution 62 Command execution, part 2 63 Command Abbreviation 64 ASTs 65 Expressions, Part 1 66 Expressions, Part 2: Support code 67 Expressions, part 3: Parsing 68 SYS_GETJPIW and SYS_TRNLNM 69 Expressions, part 4: Evaluation UCL Lexical Functions 70 PROCESS_SCAN 71 PROCESS_SCAN, Part 2 72 TProcess updates 73 Unicode revisted 74 Lexical functions: F$CONTEXT 75 Lexical functions: F$PID 76 Lexical Functions: F$CUNITS 77 Lexical Functions: F$CVSI and F$CVUI 78 UOS Date and Time Formatting 79 Lexical Functions: F$CVTIME 80 LIB_CVTIME 81 Date/Time Contexts 82 SYS_GETTIM, LIB_Get_Timestamp, SYS_ASCTIM, and LIB_SYS_ASCTIM 83 Lexical Functions: F$DELTA_TIME 84 Lexical functions: F$DEVICE 85 SYS_DEVICE_SCAN 86 Lexical functions: F$DIRECTORY 87 Lexical functions: F$EDIT and F$ELEMENT 88 Lexical functions: F$ENVIRONMENT 89 SYS_GETUAI 90 Lexical functions: F$EXTRACT and F$IDENTIFIER 91 LIB_FAO and LIB_FAOL 92 LIB_FAO and LIB_FAOL, part 2 93 Lexical functions: F$FAO 94 File Processing Structures 95 Lexical functions: F$FILE_ATTRIBUTES 96 SYS_DISPLAY 97 Lexical functions: F$GETDVI 98 Parse_GetDVI 99 GetDVI 100 GetDVI, part 2 101 GetDVI, part 3 102 Lexical functions: F$GETJPI 103 GETJPI 104 Lexical functions: F$GETSYI 105 GETSYI 106 Lexical functions: F$INTEGER, F$LENGTH, F$LOCATE, and F$MATCH_WILD 107 Lexical function: F$PARSE 108 FILESCAN 109 SYS_PARSE 110 Lexical Functions: F$MODE, F$PRIVILEGE, and F$PROCESS 111 File Lookup Service 112 Lexical Functions: F$SEARCH 113 SYS_SEARCH 114 F$SETPRV and SYS_SETPRV 115 Lexical Functions: F$STRING, F$TIME, and F$TYPE 116 More on symbols 117 Lexical Functions: F$TRNLNM 118 SYS_TRNLNM, Part 2 119 Lexical functions: F$UNIQUE, F$USER, and F$VERIFY 120 Lexical functions: F$MESSAGE 121 TUOS_File_Wrapper 122 OPEN, CLOSE, and READ system services UCL Commands 123 WRITE 124 Symbol assignment 125 The @ command 126 @ and EXIT 127 CRELNT system service 128 DELLNT system service 129 IF...THEN...ELSE 130 Comments, labels, and GOTO 131 GOSUB and RETURN 132 CALL, SUBROUTINE, and ENDSUBROUTINE 133 ON, SET {NO}ON, and error handling 134 INQUIRE 135 SYS_WRITE Service 136 OPEN 137 CLOSE 138 DELLNM system service 139 READ 140 Command Recall 141 RECALL 142 RUN 143 LIB_RUN 144 The Data Stream Interface 145 Preparing for execution 146 EOJ and LOGOUT 147 SYS_DELPROC and LIB_GET_FOREIGN CUSPs and utilities 148 The I/O Queue 149 Timers 150 Logging in, part one 151 Logging in, part 2 152 System configuration 153 SET NODE utility 154 UUI 155 SETTERM utility 156 SETTERM utility, part 2 157 SETTERM utility, part 3 158 AUTHORIZE utility 159 AUTHORIZE utility, UI 160 AUTHORIZE utility, Access Restrictions 161 AUTHORIZE utility, Part 4 162 AUTHORIZE utility, Reporting 163 AUTHORIZE utility, Part 6 164 Authentication 165 Hashlib 166 Authenticate, Part 7 167 Logging in, part 3 168 DAY_OF_WEEK, CVT_FROM_INTERNAL_TIME, and SPAWN 169 DAY_OF_WEEK and CVT_FROM_INTERNAL_TIME 170 LIB_SPAWN 171 CREPRC 172 CREPRC, Part 2 173 COPY 174 COPY, part 2 175 COPY, part 3 176 COPY, part 4 177 LIB_Get_Default_File_Protection and LIB_Substitute_Wildcards 178 CREATESTREAM, STREAMNAME, and Set_Contiguous 179 Help Files 180 LBR Services 181 LBR Services, Part 2 182 LIBRARY utility 183 LIBRARY utility, Part 2 184 FS Services 185 FS Services, Part 2 186 Implementing Help 187 HELP 188 HELP, Part 2 189 DMG_Get_Key and LIB_Put_Formatted_Output 190 LIBRARY utility, Part 3 191 Shutting Down UOS 192 SHUTDOWN 193 WAIT 194 SETIMR 195 WAITFR and Scheduling 196 REPLY, OPCOM, and Mailboxes 197 REPLY utility 198 Mailboxes 199 BRKTHRU 200 OPCOM 201 Mailbox Services 202 Mailboxes, Part 2 203 DEFINE 204 CRELNM 205 DISABLE 206 STOP 207 OPCCRASH and SHUTDOWN 208 APPEND Glossary/Index Downloads |
SysUAF API In the last few articles, we described the SysUAF module, which is the interface to the SysUAF.DAT file. We've covered the constants, structures, the TUser class, and one of the Module API functions. In this article, we will look at the rest of the API functions, and then we'll look at the USC methods that implement the forced login. A forced login is only called by the executive and doesn't provide any validation (that is assumed to be done before the function is called). It allows the executive to force a login without reguard to authentication, quotas, or flags.
As a file heap, SysUAF needs a header that serves as the root structure for the heap. The header contains a version that we can check in case we ever change the SysUAF format. Flags are reserved for future use. The Encryption code (coder/decoder - or in this case encrypter/decrypter) indicates the codec that is used to has password values. We will discuss that in a later article. Users is the root of the list of users, and User_Names is a string list that contains lowercase versions of each user name. Using lowercase allows us to normalize the names so that we can do case-insensitive lookups of users by name. Groups and Group_Names will be discussed when we get to the topic of user groups in the future. Here are the variables for the module:
var UAF_Header : TUAF_Header ;
We will describe these variables as we look at the API functions.
Before any of the other API functions will work, the SysUAF module needs to be made aware of the SysUAF.DAT file. This is done via the Set_Sysuaf_File function. If an exception occurs, that exception will be returned. Otherwise we return nil. If our native file store instance has not yet been created, we create one. We set the file store instance's file to the passed file. If the file heap instance has not been created, we create it and assign the file to it. If the file heap's Origin value is 0, then this is a newly created file. In such case, we need to construct a header record and write it out to the file. This involves clearing the values, then creating a store list and store string list and updating the header with the addresses for those structures. Finally, we load the header from the file (whether it was just written or already existing) and construct the Users_List and Users_Names_List instances. The first is a list of user account records, and the latter is a list of lowercase user names.
This function returns an instance of the TUser class, for the passed user. If the UIC is less than zero or greater than the maximum used UIC, we return nil and exit. Next we search the Cached_Users list for the passed UIC. If we find a match, we return the existing TUser instance. Otherwise, we create a new instance. If the UIC is 1 (Startup), we hard-code the values; all privileges are given and interrupts are disabled. We disable interrupts so that the user cannot abort the system startup or system setup. If it isn't UIC 1, we assign the address from Users_List. Then we return the instance. This demonstrates the way that the Cached_Users list is used to ensure only a single instance of each user exists at any time.
These two functions return a user name for the UIC. LC_Name_From_UIC returns the lowercase version of the name from the User_Names_List list. Name_From_UIC returns the name from the user authorization record.
This function adds a new user to SysUAF. First we default the result to -1 to indicate an error condition (we will set it otherwise on success). Next we validate that the name isn't null. Then we create a lowercase version of the name, and use that to see if a user with this name already exists. If so, we exit. Finally, we ensure that there are at least 8 positions reserved for the system UICs. This should have already been done when SysUAF was initialized, but we check here just to be safe.
Next, the function allocates space for a new user record, and exits if that fails. If the caller requested a special (system) account, we check UICs 2 through 7 for an unused entry. If one is found, we update the Users_List and Users_Names_List with the new user's information., and we set the result to that UIC. If Special was false, or there were no available system UICs, we add the new user to the end of the Users_List and Users_Names_List, and set the result to the newly added index.
Now that we have a TUser instance, we attach to it, set its UIC, address, and name. Note that we set the _Address instance data directly rather than using the property. This is because we don't want to trigger the side-effect of loading the header, since it isn't set up yet. Normally this would be pathlogical coupling, but this function is in the same module as the TUser class and these details are hidden from the outside world. Next, if a template UIC was passed, we load that user and then copy the information from the template to the new user (not including name or password). When done, we detach from the template user. Finally, we detach from the new user instance. There is more to the SysUAF module that we will cover in the future. Now, let's move to the USC and look at the way it uses the SysUAF module. The Force_Login method is called directly by the Kernel startup. All other logins eventually make their way to this function as well:
Force_Login is guaranteed to be called at the end of the executive startup and before the system startup. Thus, this is a good place to place deferred setup code - it is early, but not too early. So, when Force_Login is called the first time, the _Setup flag hasn't been set yet and the code executes the initial setup. The first order of business is to open the SysUAF.DAT file. We always use the file from the boot device. If there is a problem opening the file, we set the error and exit. Otherwise we call the Set_Sysuaf_File function in the SysUAF module. Then we repeat the process for the accounting file. As mentioned before, we will address accounting in future articles. The next loop sets up a logical for each user. The logical name is the user name and its value is the user's home directory (which defaults to sys:\Users\
We only return True if there is a problem, so we default the result to False (success). If the UIC or PID (Process ID) is invalid, we exit with an error. Next we set the SSC and HAL for the sysUAF module. We do this each time in case either have changed since the last call. Next we get the user. If nil is returned, the UIC is not valid so we set an error and exit. Otherwise, we attach to the TUser instance. Thus, each time this user logs in, the user instance for that UIC is attached to. Each time the user logs out, the instance will be detached from. Therefore, when all instances of this user log off, the user instance will self-destruct. Finally we add the UIC to our list of logged-in users. We will address more about users and security as we go on, but in the next article, we will begin a discussion of the default UOS shell. Copyright © 2017 by Alan Conroy. This article may be copied in whole or in part as long as this copyright is included. |