]> git.sur5r.net Git - openldap/blob - servers/slapd/back-ldap/init.c
90604606f066b6d8aaa8339c259ec10d81cd3cd2
[openldap] / servers / slapd / back-ldap / init.c
1 /* init.c - initialize ldap backend */
2 /* $OpenLDAP$ */
3 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
4  *
5  * Copyright 2003-2005 The OpenLDAP Foundation.
6  * Portions Copyright 1999-2003 Howard Chu.
7  * Portions Copyright 2000-2003 Pierangelo Masarati.
8  * All rights reserved.
9  *
10  * Redistribution and use in source and binary forms, with or without
11  * modification, are permitted only as authorized by the OpenLDAP
12  * Public License.
13  *
14  * A copy of this license is available in the file LICENSE in the
15  * top-level directory of the distribution or, alternatively, at
16  * <http://www.OpenLDAP.org/license.html>.
17  */
18 /* ACKNOWLEDGEMENTS:
19  * This work was initially developed by the Howard Chu for inclusion
20  * in OpenLDAP Software and subsequently enhanced by Pierangelo
21  * Masarati.
22  */
23
24 #include "portable.h"
25
26 #include <stdio.h>
27
28 #include <ac/string.h>
29 #include <ac/socket.h>
30
31 #include "slap.h"
32 #include "back-ldap.h"
33
34 int
35 ldap_back_open( BackendInfo     *bi )
36 {
37         bi->bi_controls = slap_known_controls;
38         return 0;
39 }
40
41 int
42 ldap_back_initialize( BackendInfo *bi )
43 {
44         bi->bi_open = ldap_back_open;
45         bi->bi_config = 0;
46         bi->bi_close = 0;
47         bi->bi_destroy = 0;
48
49         bi->bi_db_init = ldap_back_db_init;
50         bi->bi_db_config = ldap_back_db_config;
51         bi->bi_db_open = ldap_back_db_open;
52         bi->bi_db_close = 0;
53         bi->bi_db_destroy = ldap_back_db_destroy;
54
55         bi->bi_op_bind = ldap_back_bind;
56         bi->bi_op_unbind = 0;
57         bi->bi_op_search = ldap_back_search;
58         bi->bi_op_compare = ldap_back_compare;
59         bi->bi_op_modify = ldap_back_modify;
60         bi->bi_op_modrdn = ldap_back_modrdn;
61         bi->bi_op_add = ldap_back_add;
62         bi->bi_op_delete = ldap_back_delete;
63         bi->bi_op_abandon = 0;
64
65         bi->bi_extended = ldap_back_extended;
66
67         bi->bi_chk_referrals = 0;
68         bi->bi_entry_get_rw = ldap_back_entry_get;
69
70         bi->bi_connection_init = 0;
71         bi->bi_connection_destroy = ldap_back_conn_destroy;
72
73         if ( chain_init( ) ) {
74                 return -1;
75         }
76
77         return 0;
78 }
79
80 int
81 ldap_back_db_init( Backend *be )
82 {
83         struct ldapinfo *li;
84
85         li = (struct ldapinfo *)ch_calloc( 1, sizeof( struct ldapinfo ) );
86         if ( li == NULL ) {
87                 return -1;
88         }
89
90         BER_BVZERO( &li->acl_authcDN );
91         BER_BVZERO( &li->acl_passwd );
92
93 #ifdef LDAP_BACK_PROXY_AUTHZ
94         li->idassert_mode = LDAP_BACK_IDASSERT_LEGACY;
95
96         BER_BVZERO( &li->idassert_authcID );
97         BER_BVZERO( &li->idassert_authcDN );
98         BER_BVZERO( &li->idassert_passwd );
99
100         BER_BVZERO( &li->idassert_authzID );
101         li->idassert_authz = NULL;
102
103         li->idassert_authmethod = LDAP_AUTH_SIMPLE;
104         li->idassert_sasl_flags = LDAP_SASL_QUIET;
105         BER_BVZERO( &li->idassert_sasl_mech );
106         BER_BVZERO( &li->idassert_sasl_realm );
107
108         li->idassert_ppolicy = 0;
109
110         /* by default, use proxyAuthz control on each operation */
111         li->idassert_flags = LDAP_BACK_AUTH_NONE;
112 #endif /* LDAP_BACK_PROXY_AUTHZ */
113
114         ldap_pvt_thread_mutex_init( &li->conn_mutex );
115
116         be->be_private = li;
117         SLAP_DBFLAGS( be ) |= SLAP_DBFLAG_NOLASTMOD;
118
119         return 0;
120 }
121
122 int
123 ldap_back_db_open( BackendDB *be )
124 {
125         struct ldapinfo *li = (struct ldapinfo *)be->be_private;
126
127         Debug( LDAP_DEBUG_TRACE,
128                 "ldap_back_db_open: URI=%s\n",
129                 li->url != NULL ? li->url : "", 0, 0 );
130
131 #ifdef LDAP_BACK_PROXY_AUTHZ
132         /* by default, use proxyAuthz control on each operation */
133         switch ( li->idassert_mode ) {
134         case LDAP_BACK_IDASSERT_LEGACY:
135         case LDAP_BACK_IDASSERT_SELF:
136                 /* however, since admin connections are pooled and shared,
137                  * only static authzIDs can be native */
138                 li->idassert_flags &= ~LDAP_BACK_AUTH_NATIVE_AUTHZ;
139                 break;
140
141         default:
142                 break;
143         }
144 #endif /* LDAP_BACK_PROXY_AUTHZ */
145
146 #if 0 && defined(SLAPD_MONITOR)
147         {
148                 struct berval   filter,
149                                 base = BER_BVC( "cn=Databases,cn=Monitor" );
150                 struct berval   vals[ 2 ];
151                 Attribute       a = { 0 };
152
153                 filter.bv_len = STRLENOF( "(&(namingContexts:distinguishedNameMatch:=)(monitoredInfo=ldap))" )
154                         + be->be_nsuffix[ 0 ].bv_len;
155                 filter.bv_val = ch_malloc( filter.bv_len + 1 );
156                 snprintf( filter.bv_val, filter.bv_len + 1,
157                                 "(&(namingContexts:distinguishedNameMatch:=%s)(monitoredInfo=ldap))",
158                                 be->be_nsuffix[ 0 ].bv_val );
159
160                 a.a_desc = slap_schema.si_ad_labeledURI;
161                 ber_str2bv( li->url, 0, 0, &vals[ 0 ] );
162                 BER_BVZERO( &vals[ 1 ] );
163                 a.a_vals = vals;
164                 a.a_nvals = vals;
165                 if ( monitor_back_register_entry_attrs( NULL, &a, NULL, &base, LDAP_SCOPE_SUBTREE, &filter ) ) {
166                         /* error */
167                 }
168
169                 ch_free( filter.bv_val );
170         }
171 #endif /* SLAPD_MONITOR */
172
173         return 0;
174 }
175
176 void
177 ldap_back_conn_free( void *v_lc )
178 {
179         struct ldapconn *lc = v_lc;
180         
181         ldap_unbind_ext_s( lc->lc_ld, NULL, NULL );
182         if ( !BER_BVISNULL( &lc->lc_bound_ndn ) ) {
183                 ch_free( lc->lc_bound_ndn.bv_val );
184         }
185         if ( !BER_BVISNULL( &lc->lc_cred ) ) {
186                 memset( lc->lc_cred.bv_val, 0, lc->lc_cred.bv_len );
187                 ch_free( lc->lc_cred.bv_val );
188         }
189         if ( !BER_BVISNULL( &lc->lc_local_ndn ) ) {
190                 ch_free( lc->lc_local_ndn.bv_val );
191         }
192         ldap_pvt_thread_mutex_destroy( &lc->lc_mutex );
193         ch_free( lc );
194 }
195
196 int
197 ldap_back_db_destroy(
198     Backend     *be
199 )
200 {
201         struct ldapinfo *li;
202
203         if ( be->be_private ) {
204                 li = ( struct ldapinfo * )be->be_private;
205
206                 ldap_pvt_thread_mutex_lock( &li->conn_mutex );
207
208                 if ( li->url != NULL ) {
209                         ch_free( li->url );
210                         li->url = NULL;
211                 }
212                 if ( li->lud ) {
213                         ldap_free_urldesc( li->lud );
214                         li->lud = NULL;
215                 }
216                 if ( !BER_BVISNULL( &li->acl_authcDN ) ) {
217                         ch_free( li->acl_authcDN.bv_val );
218                         BER_BVZERO( &li->acl_authcDN );
219                 }
220                 if ( !BER_BVISNULL( &li->acl_passwd ) ) {
221                         ch_free( li->acl_passwd.bv_val );
222                         BER_BVZERO( &li->acl_passwd );
223                 }
224 #ifdef LDAP_BACK_PROXY_AUTHZ
225                 if ( !BER_BVISNULL( &li->idassert_authcID ) ) {
226                         ch_free( li->idassert_authcID.bv_val );
227                         BER_BVZERO( &li->idassert_authcID );
228                 }
229                 if ( !BER_BVISNULL( &li->idassert_authcDN ) ) {
230                         ch_free( li->idassert_authcDN.bv_val );
231                         BER_BVZERO( &li->idassert_authcDN );
232                 }
233                 if ( !BER_BVISNULL( &li->idassert_passwd ) ) {
234                         ch_free( li->idassert_passwd.bv_val );
235                         BER_BVZERO( &li->idassert_passwd );
236                 }
237                 if ( !BER_BVISNULL( &li->idassert_authzID ) ) {
238                         ch_free( li->idassert_authzID.bv_val );
239                         BER_BVZERO( &li->idassert_authzID );
240                 }
241                 if ( !BER_BVISNULL( &li->idassert_sasl_mech ) ) {
242                         ch_free( li->idassert_sasl_mech.bv_val );
243                         BER_BVZERO( &li->idassert_sasl_mech );
244                 }
245                 if ( !BER_BVISNULL( &li->idassert_sasl_realm ) ) {
246                         ch_free( li->idassert_sasl_realm.bv_val );
247                         BER_BVZERO( &li->idassert_sasl_realm );
248                 }
249 #endif /* LDAP_BACK_PROXY_AUTHZ */
250                 if ( li->conntree ) {
251                         avl_free( li->conntree, ldap_back_conn_free );
252                 }
253
254                 ldap_pvt_thread_mutex_unlock( &li->conn_mutex );
255                 ldap_pvt_thread_mutex_destroy( &li->conn_mutex );
256         }
257
258         ch_free( be->be_private );
259
260         return 0;
261 }
262
263 #if SLAPD_LDAP == SLAPD_MOD_DYNAMIC
264
265 /* conditionally define the init_module() function */
266 SLAP_BACKEND_INIT_MODULE( ldap )
267
268 #endif /* SLAPD_LDAP == SLAPD_MOD_DYNAMIC */
269