]> git.sur5r.net Git - openldap/blob - servers/slapd/back-ldap/init.c
e7f2fdd42e7f1e374534d60fb84ec2107e511381
[openldap] / servers / slapd / back-ldap / init.c
1 /* init.c - initialize ldap backend */
2 /* $OpenLDAP$ */
3 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
4  *
5  * Copyright 2003-2004 The OpenLDAP Foundation.
6  * Portions Copyright 1999-2003 Howard Chu.
7  * Portions Copyright 2000-2003 Pierangelo Masarati.
8  * All rights reserved.
9  *
10  * Redistribution and use in source and binary forms, with or without
11  * modification, are permitted only as authorized by the OpenLDAP
12  * Public License.
13  *
14  * A copy of this license is available in the file LICENSE in the
15  * top-level directory of the distribution or, alternatively, at
16  * <http://www.OpenLDAP.org/license.html>.
17  */
18 /* ACKNOWLEDGEMENTS:
19  * This work was initially developed by the Howard Chu for inclusion
20  * in OpenLDAP Software and subsequently enhanced by Pierangelo
21  * Masarati.
22  */
23
24 #include "portable.h"
25
26 #include <stdio.h>
27
28 #include <ac/string.h>
29 #include <ac/socket.h>
30
31 #include "slap.h"
32 #include "back-ldap.h"
33
34 #if SLAPD_LDAP == SLAPD_MOD_DYNAMIC
35
36 int init_module(int argc, char *argv[]) {
37     BackendInfo bi;
38
39     memset( &bi, '\0', sizeof(bi) );
40     bi.bi_type = "ldap";
41     bi.bi_init = ldap_back_initialize;
42
43     backend_add(&bi);
44     return 0;
45 }
46
47 #endif /* SLAPD_LDAP */
48
49 int
50 ldap_back_initialize(
51     BackendInfo *bi
52 )
53 {
54         bi->bi_controls = slap_known_controls;
55
56         bi->bi_open = 0;
57         bi->bi_config = 0;
58         bi->bi_close = 0;
59         bi->bi_destroy = 0;
60
61         bi->bi_db_init = ldap_back_db_init;
62         bi->bi_db_config = ldap_back_db_config;
63         bi->bi_db_open = 0;
64         bi->bi_db_close = 0;
65         bi->bi_db_destroy = ldap_back_db_destroy;
66
67         bi->bi_op_bind = ldap_back_bind;
68         bi->bi_op_unbind = 0;
69         bi->bi_op_search = ldap_back_search;
70         bi->bi_op_compare = ldap_back_compare;
71         bi->bi_op_modify = ldap_back_modify;
72         bi->bi_op_modrdn = ldap_back_modrdn;
73         bi->bi_op_add = ldap_back_add;
74         bi->bi_op_delete = ldap_back_delete;
75         bi->bi_op_abandon = 0;
76
77         bi->bi_extended = ldap_back_extended;
78
79         bi->bi_chk_referrals = 0;
80         bi->bi_entry_get_rw = ldap_back_entry_get;
81
82         bi->bi_connection_init = 0;
83         bi->bi_connection_destroy = ldap_back_conn_destroy;
84
85         return 0;
86 }
87
88 int
89 ldap_back_db_init(
90     Backend     *be
91 )
92 {
93         struct ldapinfo *li;
94         struct ldapmapping *mapping;
95
96         li = (struct ldapinfo *) ch_calloc( 1, sizeof(struct ldapinfo) );
97         if ( li == NULL ) {
98                 return -1;
99         }
100
101         BER_BVZERO( &li->acl_authcDN );
102         BER_BVZERO( &li->acl_passwd );
103
104 #ifdef LDAP_BACK_PROXY_AUTHZ
105         li->idassert_mode = LDAP_BACK_IDASSERT_LEGACY;
106
107         BER_BVZERO( &li->idassert_authcID );
108         BER_BVZERO( &li->idassert_authcDN );
109         BER_BVZERO( &li->idassert_passwd );
110
111         BER_BVZERO( &li->idassert_authzID );
112         li->idassert_authz = NULL;
113
114         li->idassert_authmethod = LDAP_AUTH_SIMPLE;
115         li->idassert_sasl_flags = LDAP_SASL_QUIET;
116         BER_BVZERO( &li->idassert_sasl_mech );
117         BER_BVZERO( &li->idassert_sasl_realm );
118
119         li->idassert_ppolicy = 0;
120
121         /* by default, use proxyAuthz control on each operation */
122         li->idassert_flags = LDAP_BACK_AUTH_NONE;
123 #endif /* LDAP_BACK_PROXY_AUTHZ */
124
125 #ifdef ENABLE_REWRITE
126         li->rwmap.rwm_rw = rewrite_info_init( REWRITE_MODE_USE_DEFAULT );
127         if ( li->rwmap.rwm_rw == NULL ) {
128                 ch_free( li );
129                 return -1;
130         }
131
132         {
133                 char    *rargv[3];
134
135                 /*
136                  * the filter rewrite as a string must be disabled
137                  * by default; it can be re-enabled by adding rules;
138                  * this creates an empty rewriteContext
139                  */
140                 rargv[ 0 ] = "rewriteContext";
141                 rargv[ 1 ] = "searchFilter";
142                 rargv[ 2 ] = NULL;
143                 rewrite_parse( li->rwmap.rwm_rw, "<suffix massage>", 
144                                 1, 2, rargv );
145
146                 rargv[ 0 ] = "rewriteContext";
147                 rargv[ 1 ] = "default";
148                 rargv[ 2 ] = NULL;
149                 rewrite_parse( li->rwmap.rwm_rw, "<suffix massage>", 
150                                 1, 2, rargv );
151         }
152 #endif /* ENABLE_REWRITE */
153
154         ldap_pvt_thread_mutex_init( &li->conn_mutex );
155
156         ldap_back_map_init( &li->rwmap.rwm_oc, &mapping );
157         ldap_back_map_init( &li->rwmap.rwm_at, &mapping );
158
159         be->be_private = li;
160         SLAP_DBFLAGS(be) |= SLAP_DBFLAG_NOLASTMOD;
161
162         return 0;
163 }
164
165 void
166 ldap_back_conn_free( 
167         void *v_lc
168 )
169 {
170         struct ldapconn *lc = v_lc;
171         ldap_unbind( lc->ld );
172         if ( lc->bound_dn.bv_val ) {
173                 ch_free( lc->bound_dn.bv_val );
174         }
175         if ( lc->cred.bv_val ) {
176                 memset( lc->cred.bv_val, 0, lc->cred.bv_len );
177                 ch_free( lc->cred.bv_val );
178         }
179         if ( lc->local_dn.bv_val ) {
180                 ch_free( lc->local_dn.bv_val );
181         }
182         ldap_pvt_thread_mutex_destroy( &lc->lc_mutex );
183         ch_free( lc );
184 }
185
186 void
187 mapping_free( void *v_mapping )
188 {
189         struct ldapmapping *mapping = v_mapping;
190         ch_free( mapping->src.bv_val );
191         ch_free( mapping->dst.bv_val );
192         ch_free( mapping );
193 }
194
195 int
196 ldap_back_db_destroy(
197     Backend     *be
198 )
199 {
200         struct ldapinfo *li;
201
202         if (be->be_private) {
203                 li = (struct ldapinfo *)be->be_private;
204
205                 ldap_pvt_thread_mutex_lock( &li->conn_mutex );
206
207                 if (li->url) {
208                         ch_free(li->url);
209                         li->url = NULL;
210                 }
211                 if ( li->lud ) {
212                         ldap_free_urldesc( li->lud );
213                         li->lud = NULL;
214                 }
215                 if ( !BER_BVISNULL( &li->acl_authcDN ) ) {
216                         ch_free( li->acl_authcDN.bv_val );
217                         BER_BVZERO( &li->acl_authcDN );
218                 }
219                 if ( !BER_BVISNULL( &li->acl_passwd ) ) {
220                         ch_free( li->acl_passwd.bv_val );
221                         BER_BVZERO( &li->acl_passwd );
222                 }
223 #ifdef LDAP_BACK_PROXY_AUTHZ
224                 if ( !BER_BVISNULL( &li->idassert_authcID ) ) {
225                         ch_free( li->idassert_authcID.bv_val );
226                         BER_BVZERO( &li->idassert_authcID );
227                 }
228                 if ( !BER_BVISNULL( &li->idassert_authcDN ) ) {
229                         ch_free( li->idassert_authcDN.bv_val );
230                         BER_BVZERO( &li->idassert_authcDN );
231                 }
232                 if ( !BER_BVISNULL( &li->idassert_passwd ) ) {
233                         ch_free( li->idassert_passwd.bv_val );
234                         BER_BVZERO( &li->idassert_passwd );
235                 }
236                 if ( !BER_BVISNULL( &li->idassert_authzID ) ) {
237                         ch_free( li->idassert_authzID.bv_val );
238                         BER_BVZERO( &li->idassert_authzID );
239                 }
240                 if ( !BER_BVISNULL( &li->idassert_sasl_mech ) ) {
241                         ch_free( li->idassert_sasl_mech.bv_val );
242                         BER_BVZERO( &li->idassert_sasl_mech );
243                 }
244                 if ( !BER_BVISNULL( &li->idassert_sasl_realm ) ) {
245                         ch_free( li->idassert_sasl_realm.bv_val );
246                         BER_BVZERO( &li->idassert_sasl_realm );
247                 }
248 #endif /* LDAP_BACK_PROXY_AUTHZ */
249                 if (li->conntree) {
250                         avl_free( li->conntree, ldap_back_conn_free );
251                 }
252 #ifdef ENABLE_REWRITE
253                 if (li->rwmap.rwm_rw) {
254                         rewrite_info_delete( &li->rwmap.rwm_rw );
255                 }
256 #else /* !ENABLE_REWRITE */
257                 if (li->rwmap.rwm_suffix_massage) {
258                         ber_bvarray_free( li->rwmap.rwm_suffix_massage );
259                 }
260 #endif /* !ENABLE_REWRITE */
261
262                 avl_free( li->rwmap.rwm_oc.remap, NULL );
263                 avl_free( li->rwmap.rwm_oc.map, mapping_free );
264                 avl_free( li->rwmap.rwm_at.remap, NULL );
265                 avl_free( li->rwmap.rwm_at.map, mapping_free );
266                 
267                 ldap_pvt_thread_mutex_unlock( &li->conn_mutex );
268                 ldap_pvt_thread_mutex_destroy( &li->conn_mutex );
269         }
270
271         ch_free( be->be_private );
272         return 0;
273 }