Use afs_error_message instead of the more conflicting error_message.
[invirt/packages/python-afs.git] / afs / _pts.pyx
index 43a0f03..8a5751c 100644 (file)
@@ -1,16 +1,78 @@
-cimport afs as a
+from afs cimport *
 
 cdef class PTS:
-    cdef a.ubik_client * client
+    cdef ubik_client * client
     
-    def __cinit__(self):
-        cdef a.afs_int32 code
+    def __cinit__(self, cell=None, sec=1):
+        cdef afs_int32 code
+        cdef afsconf_dir *cdir
+        cdef afsconf_cell info
+        cdef char * c_cell
+        cdef ktc_principal prin
+        cdef ktc_token token
+        cdef rx_securityClass *sc
+        cdef rx_connection *serverconns[MAXSERVERS]
+        cdef int i
+        
+        if cell is None:
+            c_cell = NULL
+        else:
+            c_cell = cell
         
         self.client = NULL
         
-        code = a.rx_Init(0)
+        code = rx_Init(0)
+        if code != 0:
+            raise Exception(code, "Error initializing Rx")
+        
+        cdir = afsconf_Open(AFSDIR_CLIENT_ETC_DIRPATH)
+        if cdir is NULL:
+            raise OSError(errno,
+                          "Error opening configuration directory (%s): %s" % \
+                              (AFSDIR_CLIENT_ETC_DIRPATH, strerror(errno)))
+        code = afsconf_GetCellInfo(cdir, c_cell, "afsprot", &info)
         if code != 0:
-            raise Exception(str(code))
+            raise Exception(code, "GetCellInfo: %s" % afs_error_message(code))
+        
+        if sec > 0:
+            strncpy(prin.cell, info.name, sizeof(prin.cell))
+            prin.instance[0] = 0
+            strncpy(prin.name, "afs", sizeof(prin.name))
+            
+            code = ktc_GetToken(&prin, &token, sizeof(token), NULL);
+            if code != 0:
+                if sec >= 2:
+                    # No really - we wanted authentication
+                    raise Exception(code, "Failed to get token for service AFS: %s" % afs_error_message(code))
+                sec = 0
+            else:
+                if sec == 3:
+                    level = rxkad_crypt
+                else:
+                    level = rxkad_clear
+                sc = rxkad_NewClientSecurityObject(level, &token.sessionKey,
+                                                   token.kvno, token.ticketLen,
+                                                   token.ticket)
+        
+        if sec == 0:
+            sc = rxnull_NewClientSecurityObject()
+        else:
+            sec = 2
+        
+        memset(serverconns, 0, sizeof(serverconns))
+        for 0 <= i < info.numServers:
+            serverconns[i] = rx_NewConnection(info.hostAddr[i].sin_addr.s_addr,
+                                              info.hostAddr[i].sin_port,
+                                              PRSRV,
+                                              sc,
+                                              sec)
+        
+        code = ubik_ClientInit(serverconns, &self.client)
+        if code != 0:
+            raise Exception("Failed to initialize ubik connection to Protection server: %s" % afs_error_message(code))
+        
+        code = rxs_Release(sc)
     
     def __dealloc__(self):
-        a.rx_Finalize()
+        ubik_ClientDestroy(self.client)
+        rx_Finalize()