1just-man-pages/condor_ping(1)General Commands Manuajlust-man-pages/condor_ping(1)
2
3
4
6 condor_ping Attempt a security negotiation to determine if it succeeds
7
9 condor_ping [ -help -version ]
10
11 condor_ping [ -debug ] [ -address <a.b.c.d:port> ] [ -pool host name ]
12 [ -name daemon name ] [ -type subsystem ] [ -config filename ] [ -quiet
13 | -table | -verbose ] token [ token [...] ]
14
16 condor_ping attempts a security negotiation to discover whether the
17 configuration is set such that the negotiation succeeds. The target of
18 the negotiation is defined by one or a combination of the address ,
19 pool , name , or type options. If no target is specified, the default
20 target is the condor_schedd daemon on the local machine.
21
22 One or more token s may be listed, thereby specifying one or more
23 authorization level to impersonate in security negotiation. A token is
24 the value ALL , an authorization level, a command name, or the integer
25 value of a command. The many command names and their associated integer
26 values will more likely be used by experts, and they are defined in the
27 file condor_includes/condor_commands.h .
28
29 An authorization level may be one of the following strings. If ALL is
30 listed, then negotiation is attempted for each of these possible autho‐
31 rization levels.
32
33 READ
34
35
36
37
38
39 WRITE
40
41
42
43
44
45 ADMINISTRATOR
46
47
48
49
50
51 SOAP
52
53
54
55
56
57 CONFIG
58
59
60
61
62
63 OWNER
64
65
66
67
68
69 DAEMON
70
71
72
73
74
75 NEGOTIATOR
76
77
78
79
80
81 ADVERTISE_MASTER
82
83
84
85
86
87 ADVERTISE_STARTD
88
89
90
91
92
93 ADVERTISE_SCHEDD
94
95
96
97
98
99 CLIENT
100
101
102
103
104
106 -help
107
108 Display usage information
109
110
111
112 -version
113
114 Display version information
115
116
117
118 -debug
119
120 Print extra debugging information as the command executes.
121
122
123
124 -config filename
125
126 Attempt the negotiation based on the contents of the configuration
127 file contents in file filename .
128
129
130
131 -address <a.b.c.d:port>
132
133 Target the given IP address with the negotiation attempt.
134
135
136
137 -pool hostname
138
139 Target the given host with the negotiation attempt. May be combined
140 with specifications defined by name and type options.
141
142
143
144 -name daemonname
145
146 Target the daemon given by daemonname with the negotiation attempt.
147
148
149
150 -type subsystem
151
152 Target the daemon identified by subsystem , one of the values of the
153 predefined $(SUBSYSTEM) macro.
154
155
156
157 -quiet
158
159 Set exit status only; no output displayed.
160
161
162
163 -table
164
165 Output is displayed with one result per line, in a table format.
166
167
168
169 -verbose
170
171 Display all available output.
172
173
174
176 The example Unix command
177
178 condor_ping -address "<127.0.0.1:9618>" -table READ WRITE DAEMON
179
180 places double quote marks around the sinful string to prevent the less
181 than and the greater than characters from causing redirect of input and
182 output. The given IP address is targeted with 3 attempts to negotiate:
183 one at the READ authorization level, one at the WRITE authorization
184 level, and one at the DAEMON authorization level.
185
187 condor_ping will exit with the status value of the negotiation it
188 attempted, where 0 (zero) indicates success, and 1 (one) indicates
189 failure. If multiple security negotiations were attempted, the exit
190 status will be the logical OR of all values.
191
193 Center for High Throughput Computing, University of Wisconsin-Madison
194
196 Copyright (C) 1990-2018 Center for High Throughput Computing, Computer
197 Sciences Department, University of Wisconsin-Madison, Madison, WI. All
198 Rights Reserved. Licensed under the Apache License, Version 2.0.
199
200
201
202 date just-man-pages/condor_ping(1)