XRootD
XrdMacaroonsAuthz.cc
Go to the documentation of this file.
1 
2 #include <stdexcept>
3 #include <sstream>
4 
5 #include <ctime>
6 
7 #include "macaroons.h"
8 
9 #include "XrdOuc/XrdOucEnv.hh"
11 #include "XrdSec/XrdSecEntity.hh"
13 
14 #include "XrdMacaroonsHandler.hh"
15 #include "XrdMacaroonsAuthz.hh"
16 
17 using namespace Macaroons;
18 
19 
20 namespace {
21 
22 class AuthzCheck
23 {
24 public:
25  AuthzCheck(const char *req_path, const Access_Operation req_oper, ssize_t max_duration, XrdSysError &log);
26 
27  const std::string &GetSecName() const {return m_sec_name;}
28  const std::string &GetErrorMessage() const {return m_emsg;}
29 
30  static int verify_before_s(void *authz_ptr,
31  const unsigned char *pred,
32  size_t pred_sz);
33 
34  static int verify_activity_s(void *authz_ptr,
35  const unsigned char *pred,
36  size_t pred_sz);
37 
38  static int verify_path_s(void *authz_ptr,
39  const unsigned char *pred,
40  size_t pred_sz);
41 
42  static int verify_name_s(void *authz_ptr,
43  const unsigned char *pred,
44  size_t pred_sz);
45 
46 private:
47  int verify_before(const unsigned char *pred, size_t pred_sz);
48  int verify_activity(const unsigned char *pred, size_t pred_sz);
49  int verify_path(const unsigned char *pred, size_t pred_sz);
50  int verify_name(const unsigned char *pred, size_t pred_sz);
51 
52  ssize_t m_max_duration;
53  XrdSysError &m_log;
54  std::string m_emsg;
55  const std::string m_path;
56  std::string m_desired_activity;
57  std::string m_sec_name;
58  Access_Operation m_oper;
59  time_t m_now;
60 };
61 
62 
63 static XrdAccPrivs AddPriv(Access_Operation op, XrdAccPrivs privs)
64 {
65  int new_privs = privs;
66  switch (op) {
67  case AOP_Any:
68  break;
69  case AOP_Chmod:
70  new_privs |= static_cast<int>(XrdAccPriv_Chmod);
71  break;
72  case AOP_Chown:
73  new_privs |= static_cast<int>(XrdAccPriv_Chown);
74  break;
75  case AOP_Excl_Create: // fallthrough
76  case AOP_Create:
77  new_privs |= static_cast<int>(XrdAccPriv_Create);
78  break;
79  case AOP_Delete:
80  new_privs |= static_cast<int>(XrdAccPriv_Delete);
81  break;
82  case AOP_Excl_Insert: // fallthrough
83  case AOP_Insert:
84  new_privs |= static_cast<int>(XrdAccPriv_Insert);
85  break;
86  case AOP_Lock:
87  new_privs |= static_cast<int>(XrdAccPriv_Lock);
88  break;
89  case AOP_Mkdir:
90  new_privs |= static_cast<int>(XrdAccPriv_Mkdir);
91  break;
92  case AOP_Read:
93  new_privs |= static_cast<int>(XrdAccPriv_Read);
94  break;
95  case AOP_Readdir:
96  new_privs |= static_cast<int>(XrdAccPriv_Readdir);
97  break;
98  case AOP_Rename:
99  new_privs |= static_cast<int>(XrdAccPriv_Rename);
100  break;
101  case AOP_Stat:
102  new_privs |= static_cast<int>(XrdAccPriv_Lookup);
103  break;
104  case AOP_Update:
105  new_privs |= static_cast<int>(XrdAccPriv_Update);
106  break;
107  };
108  return static_cast<XrdAccPrivs>(new_privs);
109 }
110 
111 
112 // Accept any value of the path, name, or activity caveats
113 int validate_verify_empty(void *emsg_ptr,
114  const unsigned char *pred,
115  size_t pred_sz)
116 {
117  if ((pred_sz >= 5) && (!memcmp(reinterpret_cast<const char *>(pred), "path:", 5) ||
118  !memcmp(reinterpret_cast<const char *>(pred), "name:", 5)))
119  {
120  return 0;
121  }
122  if ((pred_sz >= 9) && (!memcmp(reinterpret_cast<const char *>(pred), "activity:", 9)))
123  {
124  return 0;
125  }
126  return 1;
127 }
128 
129 }
130 
131 
132 Authz::Authz(XrdSysLogger *log, char const *config, XrdAccAuthorize *chain)
133  : m_max_duration(86400),
134  m_chain(chain),
135  m_log(log, "macarons_"),
136  m_authz_behavior(static_cast<int>(Handler::AuthzBehavior::PASSTHROUGH))
137 {
138  Handler::AuthzBehavior behavior(Handler::AuthzBehavior::PASSTHROUGH);
139  XrdOucEnv env;
140  if (!Handler::Config(config, &env, &m_log, m_location, m_secret, m_max_duration, behavior))
141  {
142  throw std::runtime_error("Macaroon authorization config failed.");
143  }
144  m_authz_behavior = static_cast<int>(behavior);
145 }
146 
147 
149 Authz::OnMissing(const XrdSecEntity *Entity, const char *path,
150  const Access_Operation oper, XrdOucEnv *env)
151 {
152  switch (m_authz_behavior) {
153  case Handler::AuthzBehavior::PASSTHROUGH:
154  return m_chain ? m_chain->Access(Entity, path, oper, env) : XrdAccPriv_None;
155  case Handler::AuthzBehavior::ALLOW:
156  return AddPriv(oper, XrdAccPriv_None);;
157  case Handler::AuthzBehavior::DENY:
158  return XrdAccPriv_None;
159  }
160  // Code should be unreachable.
161  return XrdAccPriv_None;
162 }
163 
165 Authz::Access(const XrdSecEntity *Entity, const char *path,
166  const Access_Operation oper, XrdOucEnv *env)
167 {
168  // We don't allow any testing to occur in this authz module, preventing
169  // a macaroon to be used to receive further macaroons.
170  if (oper == AOP_Any)
171  {
172  return m_chain ? m_chain->Access(Entity, path, oper, env) : XrdAccPriv_None;
173  }
174 
175  const char *authz = env ? env->Get("authz") : nullptr;
176  if (authz && !strncmp(authz, "Bearer%20", 9))
177  {
178  authz += 9;
179  }
180  else if (!authz && (authz = env ? env->Get("access_token") : nullptr) && !strncmp(authz, "Bearer%20", 9))
181  {
182  authz += 9;
183  }
184 
185  // If there's no request-specific token, check for a ZTN session token
186  if (!authz && Entity && !strcmp("ztn", Entity->prot) && Entity->creds &&
187  Entity->credslen && Entity->creds[Entity->credslen] == '\0')
188  {
189  authz = Entity->creds;
190  }
191 
192  if (!authz) {
193  return OnMissing(Entity, path, oper, env);
194  }
195 
196  macaroon_returncode mac_err = MACAROON_SUCCESS;
197  struct macaroon* macaroon = macaroon_deserialize(
198  authz,
199  &mac_err);
200  if (!macaroon)
201  {
202  // Do not log - might be other token type!
203  //m_log.Emsg("Access", "Failed to parse the macaroon");
204  return OnMissing(Entity, path, oper, env);
205  }
206 
207  struct macaroon_verifier *verifier = macaroon_verifier_create();
208  if (!verifier)
209  {
210  m_log.Emsg("Access", "Failed to create a new macaroon verifier");
211  return XrdAccPriv_None;
212  }
213  if (!path)
214  {
215  m_log.Emsg("Access", "Request with no provided path.");
216  macaroon_verifier_destroy(verifier);
217  return XrdAccPriv_None;
218  }
219 
220  AuthzCheck check_helper(path, oper, m_max_duration, m_log);
221 
222  if (macaroon_verifier_satisfy_general(verifier, AuthzCheck::verify_before_s, &check_helper, &mac_err) ||
223  macaroon_verifier_satisfy_general(verifier, AuthzCheck::verify_activity_s, &check_helper, &mac_err) ||
224  macaroon_verifier_satisfy_general(verifier, AuthzCheck::verify_name_s, &check_helper, &mac_err) ||
225  macaroon_verifier_satisfy_general(verifier, AuthzCheck::verify_path_s, &check_helper, &mac_err))
226  {
227  m_log.Emsg("Access", "Failed to configure caveat verifier:");
228  macaroon_verifier_destroy(verifier);
229  return XrdAccPriv_None;
230  }
231 
232  const unsigned char *macaroon_loc;
233  size_t location_sz;
234  macaroon_location(macaroon, &macaroon_loc, &location_sz);
235  if (strncmp(reinterpret_cast<const char *>(macaroon_loc), m_location.c_str(), location_sz))
236  {
237  std::string location_str(reinterpret_cast<const char *>(macaroon_loc), location_sz);
238  m_log.Emsg("Access", "Macaroon is for incorrect location", location_str.c_str());
239  macaroon_verifier_destroy(verifier);
240  macaroon_destroy(macaroon);
241  return m_chain ? m_chain->Access(Entity, path, oper, env) : XrdAccPriv_None;
242  }
243 
244  if (macaroon_verify(verifier, macaroon,
245  reinterpret_cast<const unsigned char *>(m_secret.c_str()),
246  m_secret.size(),
247  NULL, 0, // discharge macaroons
248  &mac_err))
249  {
250  m_log.Log(LogMask::Debug, "Access", "Macaroon verification failed");
251  macaroon_verifier_destroy(verifier);
252  macaroon_destroy(macaroon);
253  return m_chain ? m_chain->Access(Entity, path, oper, env) : XrdAccPriv_None;
254  }
255  macaroon_verifier_destroy(verifier);
256 
257  const unsigned char *macaroon_id;
258  size_t id_sz;
259  macaroon_identifier(macaroon, &macaroon_id, &id_sz);
260 
261  std::string macaroon_id_str(reinterpret_cast<const char *>(macaroon_id), id_sz);
262  m_log.Log(LogMask::Info, "Access", "Macaroon verification successful; ID", macaroon_id_str.c_str());
263  macaroon_destroy(macaroon);
264 
265  // Copy the name, if present into the macaroon, into the credential object.
266  if (Entity && check_helper.GetSecName().size()) {
267  const std::string &username = check_helper.GetSecName();
268  m_log.Log(LogMask::Debug, "Access", "Setting the request name to", username.c_str());
269  Entity->eaAPI->Add("request.name", username,true);
270  }
271 
272  // We passed verification - give the correct privilege.
273  return AddPriv(oper, XrdAccPriv_None);
274 }
275 
276 bool Authz::Validate(const char *token,
277  std::string &emsg,
278  long long *expT,
279  XrdSecEntity *entP)
280 {
281  macaroon_returncode mac_err = MACAROON_SUCCESS;
282  std::unique_ptr<struct macaroon, decltype(&macaroon_destroy)> macaroon(
283  macaroon_deserialize(token, &mac_err),
284  &macaroon_destroy);
285 
286  if (!macaroon)
287  {
288  emsg = "Failed to deserialize the token as a macaroon";
289  // Purposely log at debug level in case if this validation is ever
290  // chained so we don't have overly-chatty logs.
291  m_log.Log(LogMask::Debug, "Validate", emsg.c_str());
292  return false;
293  }
294 
295  std::unique_ptr<struct macaroon_verifier, decltype(&macaroon_verifier_destroy)> verifier(
296  macaroon_verifier_create(), &macaroon_verifier_destroy);
297  if (!verifier)
298  {
299  emsg = "Internal error: failed to create a verifier.";
300  m_log.Log(LogMask::Error, "Validate", emsg.c_str());
301  return false;
302  }
303 
304  // Note the path and operation here are ignored as we won't use those validators
305  AuthzCheck check_helper("/", AOP_Read, m_max_duration, m_log);
306 
307  if (macaroon_verifier_satisfy_general(verifier.get(), AuthzCheck::verify_before_s, &check_helper, &mac_err) ||
308  macaroon_verifier_satisfy_general(verifier.get(), validate_verify_empty, nullptr, &mac_err))
309  {
310  emsg = "Failed to configure the verifier";
311  m_log.Log(LogMask::Error, "Validate", emsg.c_str());
312  return false;
313  }
314 
315  const unsigned char *macaroon_loc;
316  size_t location_sz;
317  macaroon_location(macaroon.get(), &macaroon_loc, &location_sz);
318  if (strncmp(reinterpret_cast<const char *>(macaroon_loc), m_location.c_str(), location_sz))
319  {
320  emsg = "Macaroon contains incorrect location: " +
321  std::string(reinterpret_cast<const char *>(macaroon_loc), location_sz);
322  m_log.Log(LogMask::Warning, "Validate", emsg.c_str(), ("all.sitename is " + m_location).c_str());
323  return false;
324  }
325 
326  if (macaroon_verify(verifier.get(), macaroon.get(),
327  reinterpret_cast<const unsigned char *>(m_secret.c_str()),
328  m_secret.size(),
329  nullptr, 0,
330  &mac_err))
331  {
332  emsg = "Macaroon verification error" + (check_helper.GetErrorMessage().size() ?
333  (", " + check_helper.GetErrorMessage()) : "");
334  m_log.Log(LogMask::Warning, "Validate", emsg.c_str());
335  return false;
336  }
337 
338  const unsigned char *macaroon_id;
339  size_t id_sz;
340  macaroon_identifier(macaroon.get(), &macaroon_id, &id_sz);
341  m_log.Log(LogMask::Info, "Validate", ("Macaroon verification successful; ID " +
342  std::string(reinterpret_cast<const char *>(macaroon_id), id_sz)).c_str());
343 
344  return true;
345 }
346 
347 
348 AuthzCheck::AuthzCheck(const char *req_path, const Access_Operation req_oper, ssize_t max_duration, XrdSysError &log)
349  : m_max_duration(max_duration),
350  m_log(log),
351  m_path(NormalizeSlashes(req_path)),
352  m_oper(req_oper),
353  m_now(time(NULL))
354 {
355  switch (m_oper)
356  {
357  case AOP_Any:
358  break;
359  case AOP_Chmod:
360  case AOP_Chown:
361  m_desired_activity = "UPDATE_METADATA";
362  break;
363  case AOP_Insert:
364  case AOP_Lock:
365  case AOP_Mkdir:
366  case AOP_Update:
367  case AOP_Create:
368  m_desired_activity = "MANAGE";
369  break;
370  case AOP_Rename:
371  case AOP_Excl_Create:
372  case AOP_Excl_Insert:
373  m_desired_activity = "UPLOAD";
374  break;
375  case AOP_Delete:
376  m_desired_activity = "DELETE";
377  break;
378  case AOP_Read:
379  m_desired_activity = "DOWNLOAD";
380  break;
381  case AOP_Readdir:
382  m_desired_activity = "LIST";
383  break;
384  case AOP_Stat:
385  m_desired_activity = "READ_METADATA";
386  };
387 }
388 
389 
390 int
391 AuthzCheck::verify_before_s(void *authz_ptr,
392  const unsigned char *pred,
393  size_t pred_sz)
394 {
395  return static_cast<AuthzCheck*>(authz_ptr)->verify_before(pred, pred_sz);
396 }
397 
398 
399 int
400 AuthzCheck::verify_activity_s(void *authz_ptr,
401  const unsigned char *pred,
402  size_t pred_sz)
403 {
404  return static_cast<AuthzCheck*>(authz_ptr)->verify_activity(pred, pred_sz);
405 }
406 
407 
408 int
409 AuthzCheck::verify_path_s(void *authz_ptr,
410  const unsigned char *pred,
411  size_t pred_sz)
412 {
413  return static_cast<AuthzCheck*>(authz_ptr)->verify_path(pred, pred_sz);
414 }
415 
416 
417 int
418 AuthzCheck::verify_name_s(void *authz_ptr,
419  const unsigned char *pred,
420  size_t pred_sz)
421 {
422  return static_cast<AuthzCheck*>(authz_ptr)->verify_name(pred, pred_sz);
423 }
424 
425 
426 int
427 AuthzCheck::verify_before(const unsigned char * pred, size_t pred_sz)
428 {
429  std::string pred_str(reinterpret_cast<const char *>(pred), pred_sz);
430  if (strncmp("before:", pred_str.c_str(), 7))
431  {
432  return 1;
433  }
434  m_log.Log(LogMask::Debug, "AuthzCheck", "Checking macaroon for expiration; caveat:", pred_str.c_str());
435 
436  struct tm caveat_tm;
437  if (strptime(&pred_str[7], "%Y-%m-%dT%H:%M:%SZ", &caveat_tm) == nullptr)
438  {
439  m_emsg = "Failed to parse time string: " + pred_str.substr(7);
440  m_log.Log(LogMask::Warning, "AuthzCheck", m_emsg.c_str());
441  return 1;
442  }
443  caveat_tm.tm_isdst = -1;
444 
445  time_t caveat_time = timegm(&caveat_tm);
446  if (-1 == caveat_time)
447  {
448  m_emsg = "Failed to generate unix time: " + pred_str.substr(7);
449  m_log.Log(LogMask::Warning, "AuthzCheck", m_emsg.c_str());
450  return 1;
451  }
452  if ((m_max_duration > 0) && (caveat_time > m_now + m_max_duration))
453  {
454  m_emsg = "Max token age is greater than configured max duration; rejecting";
455  m_log.Log(LogMask::Warning, "AuthzCheck", m_emsg.c_str());
456  return 1;
457  }
458 
459  int result = (m_now >= caveat_time);
460  if (!result)
461  {
462  m_log.Log(LogMask::Debug, "AuthzCheck", "Macaroon has not expired.");
463  }
464  else
465  {
466  m_emsg = "Macaroon expired at " + pred_str.substr(7);
467  m_log.Log(LogMask::Debug, "AuthzCheck", m_emsg.c_str());
468  }
469  return result;
470 }
471 
472 
473 int
474 AuthzCheck::verify_activity(const unsigned char * pred, size_t pred_sz)
475 {
476  if (!m_desired_activity.size()) {return 1;}
477  std::string pred_str(reinterpret_cast<const char *>(pred), pred_sz);
478  if (strncmp("activity:", pred_str.c_str(), 9)) {return 1;}
479  m_log.Log(LogMask::Debug, "AuthzCheck", "running verify activity", pred_str.c_str());
480 
481  std::stringstream ss(pred_str.substr(9));
482  for (std::string activity; std::getline(ss, activity, ','); )
483  {
484  // Any allowed activity also implies "READ_METADATA"
485  if (m_desired_activity == "READ_METADATA") {return 0;}
486  if ((activity == m_desired_activity) || ((m_desired_activity == "UPLOAD") && (activity == "MANAGE")))
487  {
488  m_log.Log(LogMask::Debug, "AuthzCheck", "macaroon has desired activity", activity.c_str());
489  return 0;
490  }
491  }
492  m_log.Log(LogMask::Info, "AuthzCheck", "macaroon does NOT have desired activity", m_desired_activity.c_str());
493  return 1;
494 }
495 
496 
497 int
498 AuthzCheck::verify_path(const unsigned char * pred, size_t pred_sz)
499 {
500  std::string pred_str_raw(reinterpret_cast<const char *>(pred), pred_sz);
501  if (strncmp("path:", pred_str_raw.c_str(), 5)) {return 1;}
502  std::string pred_str = NormalizeSlashes(pred_str_raw.substr(5));
503  m_log.Log(LogMask::Debug, "AuthzCheck", "running verify path", pred_str.c_str());
504 
505  if ((m_path.find("/./") != std::string::npos) ||
506  (m_path.find("/../") != std::string::npos))
507  {
508  m_log.Log(LogMask::Info, "AuthzCheck", "invalid requested path", m_path.c_str());
509  return 1;
510  }
511 
512  // Allow operations under subdirectories and not substrings
513  // For e.g. pred_str = "/data/sudir/mydir"
514  // Allows m_path = /data/subdir/mydir/newdir
515  // But rejects, m_path = /data/subdir/mydirmycoolname/newdir
516  int is_subdir = is_subdirectory(pred_str, m_path);
517  if (is_subdir)
518  {
519  m_log.Log(LogMask::Debug, "AuthzCheck", "path request verified for", m_path.c_str());
520  }
521 
522  // READ_METADATA (i.e AOP_Stat) permission for /foo/bar automatically implies permission
523  // to READ_METADATA for /foo.
524  // Similarly, MKDIR Pemissions for a parent path is implied.
525  else if (m_oper == AOP_Stat || m_oper == AOP_Mkdir)
526  {
527  is_subdir = is_subdirectory(m_path, pred_str);
528  const char *opName = (m_oper == AOP_Stat) ? "READ_METADATA" : "MKDIR";
529  m_log.Log(LogMask::Debug, "AuthzCheck",
530  (std::string(opName) + (is_subdir? " Path request verified for" : " Path request NOT allowed for")).c_str(),
531  m_path.c_str());
532  }
533  else
534  {
535  m_log.Log(LogMask::Debug, "AuthzCheck", "path request NOT allowed", m_path.c_str());
536  }
537 
538  return !is_subdir;
539 }
540 
541 
542 int
543 AuthzCheck::verify_name(const unsigned char * pred, size_t pred_sz)
544 {
545  std::string pred_str(reinterpret_cast<const char *>(pred), pred_sz);
546  if (strncmp("name:", pred_str.c_str(), 5)) {return 1;}
547  if (pred_str.size() < 6) {return 1;}
548  m_log.Log(LogMask::Debug, "AuthzCheck", "Verifying macaroon with", pred_str.c_str());
549 
550  // Make a copy of the name for the XrdSecEntity; this will be used later.
551  m_sec_name = pred_str.substr(5);
552 
553  return 0;
554 }
Access_Operation
The following are supported operations.
@ AOP_Delete
rm() or rmdir()
@ AOP_Mkdir
mkdir()
@ AOP_Update
open() r/w or append
@ AOP_Create
open() with create
@ AOP_Readdir
opendir()
@ AOP_Chmod
chmod()
@ AOP_Any
Special for getting privs.
@ AOP_Stat
exists(), stat()
@ AOP_Rename
mv() for source
@ AOP_Read
open() r/o, prepare()
@ AOP_Excl_Create
open() with O_EXCL|O_CREAT
@ AOP_Insert
mv() for target
@ AOP_Lock
n/a
@ AOP_Chown
chown()
@ AOP_Excl_Insert
mv() where destination doesn't exist.
XrdAccPrivs
Definition: XrdAccPrivs.hh:39
@ XrdAccPriv_Mkdir
Definition: XrdAccPrivs.hh:46
@ XrdAccPriv_Chown
Definition: XrdAccPrivs.hh:41
@ XrdAccPriv_Insert
Definition: XrdAccPrivs.hh:44
@ XrdAccPriv_Lookup
Definition: XrdAccPrivs.hh:47
@ XrdAccPriv_Rename
Definition: XrdAccPrivs.hh:48
@ XrdAccPriv_Update
Definition: XrdAccPrivs.hh:52
@ XrdAccPriv_Read
Definition: XrdAccPrivs.hh:49
@ XrdAccPriv_Lock
Definition: XrdAccPrivs.hh:45
@ XrdAccPriv_None
Definition: XrdAccPrivs.hh:53
@ XrdAccPriv_Delete
Definition: XrdAccPrivs.hh:43
@ XrdAccPriv_Create
Definition: XrdAccPrivs.hh:42
@ XrdAccPriv_Readdir
Definition: XrdAccPrivs.hh:50
@ XrdAccPriv_Chmod
Definition: XrdAccPrivs.hh:40
static bool is_subdirectory(const std::string_view dir, const std::string_view subdir)
bool Debug
void getline(uchar *buff, int blen)
int emsg(int rc, char *msg)
@ Error
virtual bool Validate(const char *token, std::string &emsg, long long *expT, XrdSecEntity *entP) override
Authz(XrdSysLogger *lp, const char *parms, XrdAccAuthorize *chain)
virtual XrdAccPrivs Access(const XrdSecEntity *Entity, const char *path, const Access_Operation oper, XrdOucEnv *env) override
static bool Config(const char *config, XrdOucEnv *env, XrdSysError *log, std::string &location, std::string &secret, ssize_t &max_duration, AuthzBehavior &behavior)
virtual XrdAccPrivs Access(const XrdSecEntity *Entity, const char *path, const Access_Operation oper, XrdOucEnv *Env=0)=0
char * Get(const char *varname)
Definition: XrdOucEnv.hh:69
bool Add(XrdSecAttr &attr)
int credslen
Length of the 'creds' data.
Definition: XrdSecEntity.hh:78
XrdSecEntityAttr * eaAPI
non-const API to attributes
Definition: XrdSecEntity.hh:92
char prot[XrdSecPROTOIDSIZE]
Auth protocol used (e.g. krb5)
Definition: XrdSecEntity.hh:67
char * creds
Raw entity credentials or cert.
Definition: XrdSecEntity.hh:77
int Emsg(const char *esfx, int ecode, const char *text1, const char *text2=0)
Definition: XrdSysError.cc:95
void Log(int mask, const char *esfx, const char *text1, const char *text2=0, const char *text3=0)
Definition: XrdSysError.hh:133
std::string NormalizeSlashes(const std::string &)
@ Warning