EPICS Controls Argonne National Laboratory

Experimental Physics and
Industrial Control System

1994  1995  1996  1997  1998  1999  2000  2001  2002  2003  2004  2005  2006  2007  2008  2009  2010  2011  2012  2013  2014  2015  2016  2017  <20182019  2020  2021  2022  2023  2024  Index 1994  1995  1996  1997  1998  1999  2000  2001  2002  2003  2004  2005  2006  2007  2008  2009  2010  2011  2012  2013  2014  2015  2016  2017  <20182019  2020  2021  2022  2023  2024 
<== Date ==> <== Thread ==>

Subject: Re: Other Access Security implementations?
From: Andrew Johnson <[email protected]>
To: <[email protected]>
Date: Thu, 15 Feb 2018 17:42:47 -0600
On 02/15/2018 05:04 PM, Konrad, Martin wrote:
> If our rules files become more complex in the future we might need to
> consider generating them using some tool that comes with a decent
> template engine. Since we are already using Puppet for managing our
> configuration files/IOCs this might be the way to go for the future.
> Using an appropriate Hiera data backend, Puppet could pull data from any
> data source (e.g. YAML files, SQL, LDAP,...). Maybe you have a similar
> configuration-management tool you can leverage?

For simple setups it is possible to use the GNU C pre-processor to
generate ACF files.

There are rules in the EPICS build system (in configure/RULES.Db) to
pass a .acs file through cpp to generate a .acf file. The .acs input
file can #include other files which use #define to create macros that
define common lists of users and machine names or even rules, then the
.acf files use these macros as needed by the IOC/subsystem.

The preprocessor does add "# <line> <file>" lines to the output files,
but asLib just ignores them as comments. You do have to use // and
/*...*/ comments in your .acs files instead of #<comment> though.

It ought to be possible to use msi too, but I haven't tried that.

- Andrew

-- 
Arguing for surveillance because you have nothing to hide is no
different than making the claim, "I don't care about freedom of
speech because I have nothing to say." -- Edward Snowdon

References:
Other Access Security implementations? Ralph Lange
Re: Other Access Security implementations? Konrad, Martin

Navigate by Date:
Prev: Re: Other Access Security implementations? Konrad, Martin
Next: Re: Mythen M1K - Low fps Nilson Pereira
Index: 1994  1995  1996  1997  1998  1999  2000  2001  2002  2003  2004  2005  2006  2007  2008  2009  2010  2011  2012  2013  2014  2015  2016  2017  <20182019  2020  2021  2022  2023  2024 
Navigate by Thread:
Prev: Re: Other Access Security implementations? Konrad, Martin
Next: Specs EBE-4 EPICS interface gary.yendell
Index: 1994  1995  1996  1997  1998  1999  2000  2001  2002  2003  2004  2005  2006  2007  2008  2009  2010  2011  2012  2013  2014  2015  2016  2017  <20182019  2020  2021  2022  2023  2024 
ANJ, 16 Feb 2018 Valid HTML 4.01! · Home · News · About · Base · Modules · Extensions · Distributions · Download ·
· Search · EPICS V4 · IRMIS · Talk · Bugs · Documents · Links · Licensing ·