EPICURE Design Note 134.1<P> <b> EPICURE Device Restoration</b>

EPICURE Design Note 134.1

EPICURE Device Restoration

Cyndee Chopp, David Kline, Brian Kramper, Larry Lee

Introduction

A need has been identified to write an application that utilizes the CDB server's ability to restore EPICURE devices. This application will be menu driven and implemented using the Motif screen interface.

The purpose of the application is to control the restoration of EPICURE devices which have been inadvertently removed from the central database, and preserve the one-to-one association between the device index and name properties.

The application operates under two modes, a privileged mode allows users who hold the ``DBSA_ADMIN'' resource identifier to restore devices regardless of who removed them. Another non-privileged mode is implemented and provides protection by allowing users to restore devices that they have removed. When the application initiates, if the user is non-privileged, the account username is used as part of the criteria for selecting which devices are to be restored. Otherwise, privileged users may select the username as part of the criteria (see below).

The application searches for devices by scanning the device history database maintained by the CDB server. The user can specify a particular search criteria for collecting device names. If the device satisfies the search criteria, the information is placed into a scratch file which can later be edited and tailored by the user. A particular date can be specified similarly to the date switch implemented by some commands (i.e. $ DIR /SINCE=TODAY). Other keywords can be specified such as ``TODAY'' and ``YESTERDAY''. In addition, the user can specify a device name that includes wildcard characters (i.e. ``*'' and ``%'').

Furthermore, the actions entered by the user are logged to a file that is later ``mailed'' to the database administrator for historical reference and audit purposes.

The remainder of this specification describes the menus and their functionality.

Menus

The application is comprised of a menu bar which consists of the ``FILE'', ``SEARCH'', ``EXECUTE'', and ``HELP'' options. When one of these menus are selected, a pulldown menu appears listing options the user can select. This section describes the contents of the pulldown menus in detail:

list [FILE] This menu contains the ``Exit'' option which concludes the user session.

[SEARCH] The contents of this pulldown menu is determined by whether the user is privileged. Regardless of user authorization; however, the pulldown menu contains the ``Date'', ``Device Name'', and ``Exit'' options. If the user is privileged, the ``User'' option is included in the pulldown menu.

The ``Date'' option provides the user with the ability to conduct the search given a specified date, since or before a particular date, and supports keywords to facilitate entry. These keywords include ``TODAY'' and ``YESTERDAY''.

The ``Device Name'' option is used to specify a particular device or set of devices. Wildcard characters, such as ``*'' and ``%'', can be included as part of the device name. In addition, several device names can be added to form a complex search criteria.

The ``User'' option requires the user to hold the DBSA_ADMIN resource identifier and is particularly meant for EPICURE system programmers and managers to restore devices on behalf of users (emergency cases). Similarly to the ``Device Name'' option, many usernames can be entered as part of the search criteria.

The ``Exit'' option removes the pulldown menu and returns the user to the last cursor position.

[EXECUTE] This option uses the criteria setup from the ``SEARCH'' menu and initiates the scanning of the device history database. While searching, the application inhibits the user from modifying the search criteria until the search is finished. When the search is complete, the collected devices are placed in a scratch file and presented to the user. The user can edit the file and select the devices which are to be restored. In addition, a minimal set of edit commands will be available to the user to control unintended corruption.

[HELP] Selecting this option provides help text for each of the above mentioned menus and includes a description of the application.

Keywords: APPLICATIONS, DATABASE, EDDS

Distribution:

Normal

Security, Privacy, Legal

rwest@fsus04.fnal.gov