2 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
4 * Copyright 1999-2012 The OpenLDAP Foundation.
5 * Portions Copyright 2001-2003 Pierangelo Masarati.
6 * Portions Copyright 1999-2003 Howard Chu.
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted only as authorized by the OpenLDAP
13 * A copy of this license is available in the file LICENSE in the
14 * top-level directory of the distribution or, alternatively, at
15 * <http://www.OpenLDAP.org/license.html>.
18 * This work was initially developed by the Howard Chu for inclusion
19 * in OpenLDAP Software and subsequently enhanced by Pierangelo
27 #include <ac/string.h>
28 #include <ac/socket.h>
33 #include "../back-ldap/back-ldap.h"
34 #include "back-meta.h"
36 static ConfigDriver meta_back_cf_gen;
37 static ConfigLDAPadd meta_ldadd;
38 static ConfigCfAdd meta_cfadd;
40 static int ldap_back_map_config(
42 struct ldapmap *oc_map,
43 struct ldapmap *at_map );
45 /* Three sets of enums:
46 * 1) attrs that are only valid in the base config
47 * 2) attrs that are valid in base or target
48 * 3) attrs that are only valid in a target
53 LDAP_BACK_CFG_CONN_TTL = 1,
54 LDAP_BACK_CFG_DNCACHE_TTL,
55 LDAP_BACK_CFG_IDLE_TIMEOUT,
57 LDAP_BACK_CFG_PSEUDOROOT_BIND_DEFER,
58 LDAP_BACK_CFG_SINGLECONN,
59 LDAP_BACK_CFG_USETEMP,
60 LDAP_BACK_CFG_CONNPOOLMAX,
61 LDAP_BACK_CFG_LAST_BASE
66 LDAP_BACK_CFG_BIND_TIMEOUT = LDAP_BACK_CFG_LAST_BASE,
69 LDAP_BACK_CFG_CLIENT_PR,
70 LDAP_BACK_CFG_DEFAULT_T,
71 LDAP_BACK_CFG_NETWORK_TIMEOUT,
73 LDAP_BACK_CFG_NOUNDEFFILTER,
74 LDAP_BACK_CFG_NRETRIES,
75 LDAP_BACK_CFG_QUARANTINE,
77 LDAP_BACK_CFG_TIMEOUT,
78 LDAP_BACK_CFG_VERSION,
79 LDAP_BACK_CFG_ST_REQUEST,
82 LDAP_BACK_CFG_LAST_BOTH
87 LDAP_BACK_CFG_URI = LDAP_BACK_CFG_LAST_BOTH,
88 LDAP_BACK_CFG_ACL_AUTHCDN,
89 LDAP_BACK_CFG_ACL_PASSWD,
90 LDAP_BACK_CFG_IDASSERT_AUTHZFROM,
91 LDAP_BACK_CFG_IDASSERT_BIND,
92 LDAP_BACK_CFG_REWRITE,
93 LDAP_BACK_CFG_SUFFIXM,
95 LDAP_BACK_CFG_SUBTREE_EX,
96 LDAP_BACK_CFG_SUBTREE_IN,
97 LDAP_BACK_CFG_PSEUDOROOTDN,
98 LDAP_BACK_CFG_PSEUDOROOTPW,
103 static ConfigTable metacfg[] = {
104 { "uri", "uri", 2, 2, 0,
105 ARG_MAGIC|LDAP_BACK_CFG_URI,
106 meta_back_cf_gen, "( OLcfgDbAt:0.14 "
108 "DESC 'URI (list) for remote DSA' "
109 "SYNTAX OMsDirectoryString "
112 { "tls", "what", 2, 0, 0,
113 ARG_MAGIC|LDAP_BACK_CFG_TLS,
114 meta_back_cf_gen, "( OLcfgDbAt:3.1 "
115 "NAME 'olcDbStartTLS' "
117 "SYNTAX OMsDirectoryString "
120 { "acl-authcDN", "DN", 2, 2, 0,
121 ARG_DN|ARG_MAGIC|LDAP_BACK_CFG_ACL_AUTHCDN,
122 meta_back_cf_gen, "( OLcfgDbAt:3.2 "
123 "NAME 'olcDbACLAuthcDn' "
124 "DESC 'Remote ACL administrative identity' "
129 /* deprecated, will be removed; aliases "acl-authcDN" */
130 { "binddn", "DN", 2, 2, 0,
131 ARG_DN|ARG_MAGIC|LDAP_BACK_CFG_ACL_AUTHCDN,
132 meta_back_cf_gen, NULL, NULL, NULL },
133 { "acl-passwd", "cred", 2, 2, 0,
134 ARG_MAGIC|LDAP_BACK_CFG_ACL_PASSWD,
135 meta_back_cf_gen, "( OLcfgDbAt:3.3 "
136 "NAME 'olcDbACLPasswd' "
137 "DESC 'Remote ACL administrative identity credentials' "
139 "SYNTAX OMsDirectoryString "
142 /* deprecated, will be removed; aliases "acl-passwd" */
143 { "bindpw", "cred", 2, 2, 0,
144 ARG_MAGIC|LDAP_BACK_CFG_ACL_PASSWD,
145 meta_back_cf_gen, NULL, NULL, NULL },
146 { "idassert-bind", "args", 2, 0, 0,
147 ARG_MAGIC|LDAP_BACK_CFG_IDASSERT_BIND,
148 meta_back_cf_gen, "( OLcfgDbAt:3.7 "
149 "NAME 'olcDbIDAssertBind' "
150 "DESC 'Remote Identity Assertion administrative identity auth bind configuration' "
151 "SYNTAX OMsDirectoryString "
154 { "idassert-authzFrom", "authzRule", 2, 2, 0,
155 ARG_MAGIC|LDAP_BACK_CFG_IDASSERT_AUTHZFROM,
156 meta_back_cf_gen, "( OLcfgDbAt:3.9 "
157 "NAME 'olcDbIDAssertAuthzFrom' "
158 "DESC 'Remote Identity Assertion authz rules' "
159 "EQUALITY caseIgnoreMatch "
160 "SYNTAX OMsDirectoryString "
161 "X-ORDERED 'VALUES' )",
163 { "rebind-as-user", "true|FALSE", 1, 2, 0,
164 ARG_MAGIC|ARG_ON_OFF|LDAP_BACK_CFG_REBIND,
165 meta_back_cf_gen, "( OLcfgDbAt:3.10 "
166 "NAME 'olcDbRebindAsUser' "
167 "DESC 'Rebind as user' "
171 { "chase-referrals", "true|FALSE", 2, 2, 0,
172 ARG_MAGIC|ARG_ON_OFF|LDAP_BACK_CFG_CHASE,
173 meta_back_cf_gen, "( OLcfgDbAt:3.11 "
174 "NAME 'olcDbChaseReferrals' "
175 "DESC 'Chase referrals' "
179 { "t-f-support", "true|FALSE|discover", 2, 2, 0,
180 ARG_MAGIC|LDAP_BACK_CFG_T_F,
181 meta_back_cf_gen, "( OLcfgDbAt:3.12 "
182 "NAME 'olcDbTFSupport' "
183 "DESC 'Absolute filters support' "
184 "SYNTAX OMsDirectoryString "
187 { "timeout", "timeout(list)", 2, 0, 0,
188 ARG_MAGIC|LDAP_BACK_CFG_TIMEOUT,
189 meta_back_cf_gen, "( OLcfgDbAt:3.14 "
190 "NAME 'olcDbTimeout' "
191 "DESC 'Per-operation timeouts' "
192 "SYNTAX OMsDirectoryString "
195 { "idle-timeout", "timeout", 2, 2, 0,
196 ARG_MAGIC|LDAP_BACK_CFG_IDLE_TIMEOUT,
197 meta_back_cf_gen, "( OLcfgDbAt:3.15 "
198 "NAME 'olcDbIdleTimeout' "
199 "DESC 'connection idle timeout' "
200 "SYNTAX OMsDirectoryString "
203 { "conn-ttl", "ttl", 2, 2, 0,
204 ARG_MAGIC|LDAP_BACK_CFG_CONN_TTL,
205 meta_back_cf_gen, "( OLcfgDbAt:3.16 "
206 "NAME 'olcDbConnTtl' "
207 "DESC 'connection ttl' "
208 "SYNTAX OMsDirectoryString "
211 { "network-timeout", "timeout", 2, 2, 0,
212 ARG_MAGIC|LDAP_BACK_CFG_NETWORK_TIMEOUT,
213 meta_back_cf_gen, "( OLcfgDbAt:3.17 "
214 "NAME 'olcDbNetworkTimeout' "
215 "DESC 'connection network timeout' "
216 "SYNTAX OMsDirectoryString "
219 { "protocol-version", "version", 2, 2, 0,
220 ARG_MAGIC|ARG_INT|LDAP_BACK_CFG_VERSION,
221 meta_back_cf_gen, "( OLcfgDbAt:3.18 "
222 "NAME 'olcDbProtocolVersion' "
223 "DESC 'protocol version' "
227 { "single-conn", "true|FALSE", 2, 2, 0,
228 ARG_MAGIC|ARG_ON_OFF|LDAP_BACK_CFG_SINGLECONN,
229 meta_back_cf_gen, "( OLcfgDbAt:3.19 "
230 "NAME 'olcDbSingleConn' "
231 "DESC 'cache a single connection per identity' "
235 { "cancel", "ABANDON|ignore|exop", 2, 2, 0,
236 ARG_MAGIC|LDAP_BACK_CFG_CANCEL,
237 meta_back_cf_gen, "( OLcfgDbAt:3.20 "
238 "NAME 'olcDbCancel' "
239 "DESC 'abandon/ignore/exop operations when appropriate' "
240 "SYNTAX OMsDirectoryString "
243 { "quarantine", "retrylist", 2, 2, 0,
244 ARG_MAGIC|LDAP_BACK_CFG_QUARANTINE,
245 meta_back_cf_gen, "( OLcfgDbAt:3.21 "
246 "NAME 'olcDbQuarantine' "
247 "DESC 'Quarantine database if connection fails and retry according to rule' "
248 "SYNTAX OMsDirectoryString "
251 { "use-temporary-conn", "true|FALSE", 2, 2, 0,
252 ARG_MAGIC|ARG_ON_OFF|LDAP_BACK_CFG_USETEMP,
253 meta_back_cf_gen, "( OLcfgDbAt:3.22 "
254 "NAME 'olcDbUseTemporaryConn' "
255 "DESC 'Use temporary connections if the cached one is busy' "
259 { "conn-pool-max", "<n>", 2, 2, 0,
260 ARG_MAGIC|ARG_INT|LDAP_BACK_CFG_CONNPOOLMAX,
261 meta_back_cf_gen, "( OLcfgDbAt:3.23 "
262 "NAME 'olcDbConnectionPoolMax' "
263 "DESC 'Max size of privileged connections pool' "
267 #ifdef SLAP_CONTROL_X_SESSION_TRACKING
268 { "session-tracking-request", "true|FALSE", 2, 2, 0,
269 ARG_MAGIC|ARG_ON_OFF|LDAP_BACK_CFG_ST_REQUEST,
270 meta_back_cf_gen, "( OLcfgDbAt:3.24 "
271 "NAME 'olcDbSessionTrackingRequest' "
272 "DESC 'Add session tracking control to proxied requests' "
276 #endif /* SLAP_CONTROL_X_SESSION_TRACKING */
277 { "norefs", "true|FALSE", 2, 2, 0,
278 ARG_MAGIC|ARG_ON_OFF|LDAP_BACK_CFG_NOREFS,
279 meta_back_cf_gen, "( OLcfgDbAt:3.25 "
280 "NAME 'olcDbNoRefs' "
281 "DESC 'Do not return search reference responses' "
285 { "noundeffilter", "true|FALSE", 2, 2, 0,
286 ARG_MAGIC|ARG_ON_OFF|LDAP_BACK_CFG_NOUNDEFFILTER,
287 meta_back_cf_gen, "( OLcfgDbAt:3.26 "
288 "NAME 'olcDbNoUndefFilter' "
289 "DESC 'Do not propagate undefined search filters' "
294 { "rewrite", "arglist", 2, 4, STRLENOF( "rewrite" ),
295 ARG_STRING|ARG_MAGIC|LDAP_BACK_CFG_REWRITE,
296 meta_back_cf_gen, "( OLcfgDbAt:3.101 "
297 "NAME 'olcDbRewrite' "
298 "DESC 'DN rewriting rules' "
299 "SYNTAX OMsDirectoryString )",
301 { "suffixmassage", "virtual> <real", 3, 3, 0,
302 ARG_MAGIC|LDAP_BACK_CFG_SUFFIXM,
303 meta_back_cf_gen, NULL, NULL, NULL },
305 { "map", "attribute|objectClass> [*|<local>] *|<remote", 3, 4, 0,
306 ARG_MAGIC|LDAP_BACK_CFG_MAP,
307 meta_back_cf_gen, "( OLcfgDbAt:3.102 "
309 "DESC 'Map attribute and objectclass names' "
310 "SYNTAX OMsDirectoryString )",
313 { "subtree-exclude", "pattern", 2, 2, 0,
314 ARG_STRING|ARG_MAGIC|LDAP_BACK_CFG_SUBTREE_EX,
315 meta_back_cf_gen, "( OLcfgDbAt:3.103 "
316 "NAME 'olcDbSubtreeExclude' "
317 "DESC 'DN of subtree to exclude from target' "
318 "SYNTAX OMsDirectoryString )",
320 { "subtree-include", "pattern", 2, 2, 0,
321 ARG_STRING|ARG_MAGIC|LDAP_BACK_CFG_SUBTREE_IN,
322 meta_back_cf_gen, "( OLcfgDbAt:3.104 "
323 "NAME 'olcDbSubtreeInclude' "
324 "DESC 'DN of subtree to include in target' "
325 "SYNTAX OMsDirectoryString )",
327 { "default-target", "[none|<target ID>]", 1, 2, 0,
328 ARG_MAGIC|LDAP_BACK_CFG_DEFAULT_T,
329 meta_back_cf_gen, "( OLcfgDbAt:3.105 "
330 "NAME 'olcDbDefaultTarget' "
331 "DESC 'Specify the default target' "
332 "SYNTAX OMsDirectoryString "
335 { "dncache-ttl", "ttl", 2, 2, 0,
336 ARG_MAGIC|LDAP_BACK_CFG_DNCACHE_TTL,
337 meta_back_cf_gen, "( OLcfgDbAt:3.106 "
338 "NAME 'olcDbDnCacheTtl' "
339 "DESC 'dncache ttl' "
340 "SYNTAX OMsDirectoryString "
343 { "bind-timeout", "microseconds", 2, 2, 0,
344 ARG_MAGIC|LDAP_BACK_CFG_BIND_TIMEOUT,
345 meta_back_cf_gen, "( OLcfgDbAt:3.107 "
346 "NAME 'olcDbBindTimeout' "
347 "DESC 'bind timeout' "
348 "SYNTAX OMsDirectoryString "
351 { "onerr", "CONTINUE|report|stop", 2, 2, 0,
352 ARG_MAGIC|LDAP_BACK_CFG_ONERR,
353 meta_back_cf_gen, "( OLcfgDbAt:3.108 "
355 "DESC 'error handling' "
356 "SYNTAX OMsDirectoryString "
359 { "pseudoroot-bind-defer", "TRUE|false", 2, 2, 0,
360 ARG_MAGIC|ARG_ON_OFF|LDAP_BACK_CFG_PSEUDOROOT_BIND_DEFER,
361 meta_back_cf_gen, "( OLcfgDbAt:3.109 "
362 "NAME 'olcDbPseudoRootBindDefer' "
363 "DESC 'error handling' "
367 { "root-bind-defer", "TRUE|false", 2, 2, 0,
368 ARG_MAGIC|ARG_ON_OFF|LDAP_BACK_CFG_PSEUDOROOT_BIND_DEFER,
369 meta_back_cf_gen, NULL, NULL, NULL },
370 { "pseudorootdn", "dn", 2, 2, 0,
371 ARG_MAGIC|ARG_DN|LDAP_BACK_CFG_PSEUDOROOTDN,
372 meta_back_cf_gen, NULL, NULL, NULL },
373 { "pseudorootpw", "password", 2, 2, 0,
374 ARG_MAGIC|ARG_STRING|LDAP_BACK_CFG_PSEUDOROOTDN,
375 meta_back_cf_gen, NULL, NULL, NULL },
376 { "nretries", "NEVER|forever|<number>", 2, 2, 0,
377 ARG_MAGIC|ARG_STRING|LDAP_BACK_CFG_NRETRIES,
378 meta_back_cf_gen, "( OLcfgDbAt:3.110 "
379 "NAME 'olcDbNretries' "
380 "DESC 'retry handling' "
381 "SYNTAX OMsDirectoryString "
384 { "client-pr", "accept-unsolicited|disable|<size>", 2, 2, 0,
385 ARG_MAGIC|ARG_STRING|LDAP_BACK_CFG_CLIENT_PR,
386 meta_back_cf_gen, "( OLcfgDbAt:3.111 "
387 "NAME 'olcDbClientPr' "
388 "DESC 'PagedResults handling' "
389 "SYNTAX OMsDirectoryString "
393 { "", "", 0, 0, 0, ARG_IGNORED,
394 NULL, "( OLcfgDbAt:3.100 NAME 'olcMetaSub' "
395 "DESC 'Placeholder to name a Target entry' "
396 "SYNTAX OMsDirectoryString "
397 "SINGLE-VALUE X-ORDERED 'SIBLINGS' )", NULL, NULL },
399 { NULL, NULL, 0, 0, 0, ARG_IGNORED,
400 NULL, NULL, NULL, NULL }
403 #ifdef SLAP_CONTROL_X_SESSION_TRACKING
404 #define ST_ATTR "$ olcDbSessionTrackingRequest "
407 #endif /* SLAP_CONTROL_X_SESSION_TRACKING */
409 #define COMMON_ATTRS \
410 "$ olcDbBindTimeout " \
412 "$ olcDbChaseReferrals " \
414 "$ olcDbDefaultTarget " \
415 "$ olcDbNetworkTimeout " \
417 "$ olcDbNoUndefFilter " \
419 "$ olcDbProtocolVersion " \
420 "$ olcDbQuarantine " \
421 "$ olcDbRebindAsUser " \
426 static ConfigOCs metaocs[] = {
428 "NAME 'olcMetaConfig' "
429 "DESC 'Meta backend configuration' "
430 "SUP olcDatabaseConfig "
431 "MAY ( olcDbConnTtl "
433 "$ olcDbIdleTimeout "
435 "$ olcDbPseudoRootBindDefer "
437 "$ olcDbUseTemporaryConn "
438 "$ olcDbConnectionPoolMax "
440 /* defaults, may be overridden per-target */
443 Cft_Database, metacfg, NULL, meta_cfadd },
445 "NAME 'olcMetaTargetConfig' "
446 "DESC 'Meta target configuration' "
447 "SUP olcConfig STRUCTURAL "
448 "MUST ( olcMetaSub $ olcDbURI ) "
449 "MAY ( olcDbACLAuthcDn "
451 "$ olcDbIDAssertAuthzFrom "
452 "$ olcDbIDAssertBind "
455 "$ olcDbSubtreeExclude "
456 "$ olcDbSubtreeInclude "
459 /* defaults may be inherited */
462 Cft_Misc, metacfg, meta_ldadd },
467 meta_ldadd( CfEntryInfo *p, Entry *e, ConfigArgs *c )
469 if ( p->ce_type != Cft_Database || !p->ce_bi ||
470 p->ce_bi->bi_cf_ocs != metaocs )
471 return LDAP_CONSTRAINT_VIOLATION;
477 meta_cfadd( Operation *op, SlapReply *rs, Entry *p, ConfigArgs *c )
479 metainfo_t *mi = ( metainfo_t * )c->be->be_private;
483 for ( i=0; i<mi->mi_ntargets; i++ ) {
490 meta_back_new_target(
498 mt = ch_calloc( sizeof( metatarget_t ), 1 );
500 mt->mt_rwmap.rwm_rw = rewrite_info_init( REWRITE_MODE_USE_DEFAULT );
501 if ( mt->mt_rwmap.rwm_rw == NULL ) {
507 * the filter rewrite as a string must be disabled
508 * by default; it can be re-enabled by adding rules;
509 * this creates an empty rewriteContext
511 rargv[ 0 ] = "rewriteContext";
512 rargv[ 1 ] = "searchFilter";
514 rewrite_parse( mt->mt_rwmap.rwm_rw, "<suffix massage>", 1, 2, rargv );
516 rargv[ 0 ] = "rewriteContext";
517 rargv[ 1 ] = "default";
519 rewrite_parse( mt->mt_rwmap.rwm_rw, "<suffix massage>", 1, 2, rargv );
521 ldap_pvt_thread_mutex_init( &mt->mt_uri_mutex );
523 mt->mt_idassert_mode = LDAP_BACK_IDASSERT_LEGACY;
524 mt->mt_idassert_authmethod = LDAP_AUTH_NONE;
525 mt->mt_idassert_tls = SB_TLS_DEFAULT;
527 /* by default, use proxyAuthz control on each operation */
528 mt->mt_idassert_flags = LDAP_BACK_AUTH_PRESCRIPTIVE;
536 meta_subtree_destroy( metasubtree_t *ms )
539 meta_subtree_destroy( ms->ms_next );
542 switch ( ms->ms_type ) {
543 case META_ST_SUBTREE:
544 case META_ST_SUBORDINATE:
545 ber_memfree( ms->ms_dn.bv_val );
549 regfree( &ms->ms_regex );
550 ch_free( ms->ms_regex_pattern );
567 meta_st_t type = META_ST_SUBTREE;
569 struct berval ndn = BER_BVNULL;
570 metasubtree_t *ms = NULL;
572 if ( c->type == LDAP_BACK_CFG_SUBTREE_EX ) {
573 if ( mt->mt_subtree && !mt->mt_subtree_exclude ) {
574 snprintf( c->cr_msg, sizeof(c->cr_msg),
575 "\"subtree-exclude\" incompatible with previous \"subtree-include\" directives" );
579 mt->mt_subtree_exclude = 1;
582 if ( mt->mt_subtree && mt->mt_subtree_exclude ) {
583 snprintf( c->cr_msg, sizeof(c->cr_msg),
584 "\"subtree-include\" incompatible with previous \"subtree-exclude\" directives" );
589 pattern = c->argv[1];
590 if ( strncasecmp( pattern, "dn", STRLENOF( "dn" ) ) == 0 ) {
593 pattern = &pattern[STRLENOF( "dn")];
595 if ( pattern[0] == '.' ) {
598 if ( strncasecmp( style, "subtree", STRLENOF( "subtree" ) ) == 0 ) {
599 type = META_ST_SUBTREE;
600 pattern = &style[STRLENOF( "subtree" )];
602 } else if ( strncasecmp( style, "children", STRLENOF( "children" ) ) == 0 ) {
603 type = META_ST_SUBORDINATE;
604 pattern = &style[STRLENOF( "children" )];
606 } else if ( strncasecmp( style, "sub", STRLENOF( "sub" ) ) == 0 ) {
607 type = META_ST_SUBTREE;
608 pattern = &style[STRLENOF( "sub" )];
610 } else if ( strncasecmp( style, "regex", STRLENOF( "regex" ) ) == 0 ) {
611 type = META_ST_REGEX;
612 pattern = &style[STRLENOF( "regex" )];
615 snprintf( c->cr_msg, sizeof(c->cr_msg), "unknown style in \"dn.<style>\"" );
620 if ( pattern[0] != ':' ) {
621 snprintf( c->cr_msg, sizeof(c->cr_msg), "missing colon after \"dn.<style>\"" );
628 case META_ST_SUBTREE:
629 case META_ST_SUBORDINATE: {
632 ber_str2bv( pattern, 0, 0, &dn );
633 if ( dnNormalize( 0, NULL, NULL, &dn, &ndn, NULL )
636 snprintf( c->cr_msg, sizeof(c->cr_msg), "DN=\"%s\" is invalid", pattern );
640 if ( !dnIsSuffix( &ndn, &mt->mt_nsuffix ) ) {
641 snprintf( c->cr_msg, sizeof(c->cr_msg),
642 "DN=\"%s\" is not a subtree of target \"%s\"",
643 pattern, mt->mt_nsuffix.bv_val );
644 ber_memfree( ndn.bv_val );
650 /* silence warnings */
654 ms = ch_calloc( sizeof( metasubtree_t ), 1 );
657 switch ( ms->ms_type ) {
658 case META_ST_SUBTREE:
659 case META_ST_SUBORDINATE:
663 case META_ST_REGEX: {
666 rc = regcomp( &ms->ms_regex, pattern, REG_EXTENDED|REG_ICASE );
668 char regerr[ SLAP_TEXT_BUFLEN ];
670 regerror( rc, &ms->ms_regex, regerr, sizeof(regerr) );
672 snprintf( c->cr_msg, sizeof( c->cr_msg ),
673 "regular expression \"%s\" bad because of %s",
678 ms->ms_regex_pattern = ch_strdup( pattern );
682 if ( mt->mt_subtree == NULL ) {
688 for ( msp = &mt->mt_subtree; *msp; ) {
689 switch ( ms->ms_type ) {
690 case META_ST_SUBTREE:
691 switch ( (*msp)->ms_type ) {
692 case META_ST_SUBTREE:
693 if ( dnIsSuffix( &(*msp)->ms_dn, &ms->ms_dn ) ) {
694 metasubtree_t *tmp = *msp;
695 Debug( LDAP_DEBUG_CONFIG,
696 "%s: previous rule \"dn.subtree:%s\" is contained in rule \"dn.subtree:%s\" (replaced)\n",
697 c->log, pattern, (*msp)->ms_dn.bv_val );
698 *msp = (*msp)->ms_next;
700 meta_subtree_destroy( tmp );
703 } else if ( dnIsSuffix( &ms->ms_dn, &(*msp)->ms_dn ) ) {
704 Debug( LDAP_DEBUG_CONFIG,
705 "%s: previous rule \"dn.subtree:%s\" contains rule \"dn.subtree:%s\" (ignored)\n",
706 c->log, (*msp)->ms_dn.bv_val, pattern );
707 meta_subtree_destroy( ms );
713 case META_ST_SUBORDINATE:
714 if ( dnIsSuffix( &(*msp)->ms_dn, &ms->ms_dn ) ) {
715 metasubtree_t *tmp = *msp;
716 Debug( LDAP_DEBUG_CONFIG,
717 "%s: previous rule \"dn.children:%s\" is contained in rule \"dn.subtree:%s\" (replaced)\n",
718 c->log, pattern, (*msp)->ms_dn.bv_val );
719 *msp = (*msp)->ms_next;
721 meta_subtree_destroy( tmp );
724 } else if ( dnIsSuffix( &ms->ms_dn, &(*msp)->ms_dn ) && ms->ms_dn.bv_len > (*msp)->ms_dn.bv_len ) {
725 Debug( LDAP_DEBUG_CONFIG,
726 "%s: previous rule \"dn.children:%s\" contains rule \"dn.subtree:%s\" (ignored)\n",
727 c->log, (*msp)->ms_dn.bv_val, pattern );
728 meta_subtree_destroy( ms );
735 if ( regexec( &(*msp)->ms_regex, ms->ms_dn.bv_val, 0, NULL, 0 ) == 0 ) {
736 Debug( LDAP_DEBUG_CONFIG,
737 "%s: previous rule \"dn.regex:%s\" may contain rule \"dn.subtree:%s\"\n",
738 c->log, (*msp)->ms_regex_pattern, ms->ms_dn.bv_val );
744 case META_ST_SUBORDINATE:
745 switch ( (*msp)->ms_type ) {
746 case META_ST_SUBTREE:
747 if ( dnIsSuffix( &(*msp)->ms_dn, &ms->ms_dn ) ) {
748 metasubtree_t *tmp = *msp;
749 Debug( LDAP_DEBUG_CONFIG,
750 "%s: previous rule \"dn.children:%s\" is contained in rule \"dn.subtree:%s\" (replaced)\n",
751 c->log, pattern, (*msp)->ms_dn.bv_val );
752 *msp = (*msp)->ms_next;
754 meta_subtree_destroy( tmp );
757 } else if ( dnIsSuffix( &ms->ms_dn, &(*msp)->ms_dn ) && ms->ms_dn.bv_len > (*msp)->ms_dn.bv_len ) {
758 Debug( LDAP_DEBUG_CONFIG,
759 "%s: previous rule \"dn.children:%s\" contains rule \"dn.subtree:%s\" (ignored)\n",
760 c->log, (*msp)->ms_dn.bv_val, pattern );
761 meta_subtree_destroy( ms );
767 case META_ST_SUBORDINATE:
768 if ( dnIsSuffix( &(*msp)->ms_dn, &ms->ms_dn ) ) {
769 metasubtree_t *tmp = *msp;
770 Debug( LDAP_DEBUG_CONFIG,
771 "%s: previous rule \"dn.children:%s\" is contained in rule \"dn.children:%s\" (replaced)\n",
772 c->log, pattern, (*msp)->ms_dn.bv_val );
773 *msp = (*msp)->ms_next;
775 meta_subtree_destroy( tmp );
778 } else if ( dnIsSuffix( &ms->ms_dn, &(*msp)->ms_dn ) ) {
779 Debug( LDAP_DEBUG_CONFIG,
780 "%s: previous rule \"dn.children:%s\" contains rule \"dn.children:%s\" (ignored)\n",
781 c->log, (*msp)->ms_dn.bv_val, pattern );
782 meta_subtree_destroy( ms );
789 if ( regexec( &(*msp)->ms_regex, ms->ms_dn.bv_val, 0, NULL, 0 ) == 0 ) {
790 Debug( LDAP_DEBUG_CONFIG,
791 "%s: previous rule \"dn.regex:%s\" may contain rule \"dn.subtree:%s\"\n",
792 c->log, (*msp)->ms_regex_pattern, ms->ms_dn.bv_val );
799 switch ( (*msp)->ms_type ) {
800 case META_ST_SUBTREE:
801 case META_ST_SUBORDINATE:
802 if ( regexec( &ms->ms_regex, (*msp)->ms_dn.bv_val, 0, NULL, 0 ) == 0 ) {
803 Debug( LDAP_DEBUG_CONFIG,
804 "%s: previous rule \"dn.subtree:%s\" may be contained in rule \"dn.regex:%s\"\n",
805 c->log, (*msp)->ms_dn.bv_val, ms->ms_regex_pattern );
810 /* no check possible */
816 msp = &(*msp)->ms_next;
825 static slap_verbmasks idassert_mode[] = {
826 { BER_BVC("self"), LDAP_BACK_IDASSERT_SELF },
827 { BER_BVC("anonymous"), LDAP_BACK_IDASSERT_ANONYMOUS },
828 { BER_BVC("none"), LDAP_BACK_IDASSERT_NOASSERT },
829 { BER_BVC("legacy"), LDAP_BACK_IDASSERT_LEGACY },
833 static slap_verbmasks tls_mode[] = {
834 { BER_BVC( "propagate" ), LDAP_BACK_F_TLS_PROPAGATE_MASK },
835 { BER_BVC( "try-propagate" ), LDAP_BACK_F_PROPAGATE_TLS },
836 { BER_BVC( "start" ), LDAP_BACK_F_TLS_USE_MASK },
837 { BER_BVC( "try-start" ), LDAP_BACK_F_USE_TLS },
838 { BER_BVC( "ldaps" ), LDAP_BACK_F_TLS_LDAPS },
839 { BER_BVC( "none" ), LDAP_BACK_F_NONE },
843 static slap_verbmasks t_f_mode[] = {
844 { BER_BVC( "yes" ), LDAP_BACK_F_T_F },
845 { BER_BVC( "discover" ), LDAP_BACK_F_T_F_DISCOVER },
846 { BER_BVC( "no" ), LDAP_BACK_F_NONE },
850 static slap_verbmasks cancel_mode[] = {
851 { BER_BVC( "ignore" ), LDAP_BACK_F_CANCEL_IGNORE },
852 { BER_BVC( "exop" ), LDAP_BACK_F_CANCEL_EXOP },
853 { BER_BVC( "exop-discover" ), LDAP_BACK_F_CANCEL_EXOP_DISCOVER },
854 { BER_BVC( "abandon" ), LDAP_BACK_F_CANCEL_ABANDON },
858 static slap_verbmasks onerr_mode[] = {
859 { BER_BVC( "stop" ), META_BACK_F_ONERR_STOP },
860 { BER_BVC( "report" ), META_BACK_F_ONERR_REPORT },
861 { BER_BVC( "continue" ), LDAP_BACK_F_NONE },
865 /* see enum in slap.h */
866 static slap_cf_aux_table timeout_table[] = {
867 { BER_BVC("bind="), SLAP_OP_BIND * sizeof( time_t ), 'u', 0, NULL },
868 /* unbind makes no sense */
869 { BER_BVC("add="), SLAP_OP_ADD * sizeof( time_t ), 'u', 0, NULL },
870 { BER_BVC("delete="), SLAP_OP_DELETE * sizeof( time_t ), 'u', 0, NULL },
871 { BER_BVC("modrdn="), SLAP_OP_MODRDN * sizeof( time_t ), 'u', 0, NULL },
872 { BER_BVC("modify="), SLAP_OP_MODIFY * sizeof( time_t ), 'u', 0, NULL },
873 { BER_BVC("compare="), SLAP_OP_COMPARE * sizeof( time_t ), 'u', 0, NULL },
874 { BER_BVC("search="), SLAP_OP_SEARCH * sizeof( time_t ), 'u', 0, NULL },
875 /* abandon makes little sense */
876 #if 0 /* not implemented yet */
877 { BER_BVC("extended="), SLAP_OP_EXTENDED * sizeof( time_t ), 'u', 0, NULL },
879 { BER_BVNULL, 0, 0, 0, NULL }
883 meta_back_cf_gen( ConfigArgs *c )
885 metainfo_t *mi = ( metainfo_t * )c->be->be_private;
891 assert( mi != NULL );
893 if ( c->op == SLAP_CONFIG_EMIT ) {
895 } else if ( c->op == LDAP_MOD_DELETE ) {
899 if ( c->type >= LDAP_BACK_CFG_LAST_BASE ) {
900 /* exclude CFG_URI from this check */
901 if ( c->type > LDAP_BACK_CFG_LAST_BOTH ) {
902 if ( !mi->mi_ntargets ) {
903 snprintf( c->cr_msg, sizeof( c->cr_msg ),
904 "need \"uri\" directive first" );
905 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
909 if ( mi->mi_ntargets ) {
910 mt = mi->mi_targets[ mi->mi_ntargets-1 ];
919 case LDAP_BACK_CFG_URI: {
926 if ( c->be->be_nsuffix == NULL ) {
927 snprintf( c->cr_msg, sizeof( c->cr_msg ),
928 "the suffix must be defined before any target" );
929 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
933 i = mi->mi_ntargets++;
935 mi->mi_targets = ( metatarget_t ** )ch_realloc( mi->mi_targets,
936 sizeof( metatarget_t * ) * mi->mi_ntargets );
937 if ( mi->mi_targets == NULL ) {
938 snprintf( c->cr_msg, sizeof( c->cr_msg ),
939 "out of memory while storing server name"
940 " in \"%s <protocol>://<server>[:port]/<naming context>\"",
942 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
946 if ( meta_back_new_target( &mi->mi_targets[ i ] ) != 0 ) {
947 snprintf( c->cr_msg, sizeof( c->cr_msg ),
948 "unable to init server"
949 " in \"%s <protocol>://<server>[:port]/<naming context>\"",
951 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
955 mt = mi->mi_targets[ i ];
957 mt->mt_rebind_f = mi->mi_rebind_f;
958 mt->mt_urllist_f = mi->mi_urllist_f;
959 mt->mt_urllist_p = mt;
961 mt->mt_nretries = mi->mi_nretries;
962 mt->mt_quarantine = mi->mi_quarantine;
963 if ( META_BACK_QUARANTINE( mi ) ) {
964 ldap_pvt_thread_mutex_init( &mt->mt_quarantine_mutex );
966 mt->mt_mc = mi->mi_mc;
968 for ( j = 1; j < c->argc; j++ ) {
969 char **tmpuris = ldap_str2charray( c->argv[ j ], "\t" );
971 if ( tmpuris == NULL ) {
972 snprintf( c->cr_msg, sizeof( c->cr_msg ),
973 "unable to parse URIs #%d"
974 " in \"%s <protocol>://<server>[:port]/<naming context>\"",
976 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
984 ldap_charray_merge( &uris, tmpuris );
985 ldap_charray_free( tmpuris );
989 for ( j = 0; uris[ j ] != NULL; j++ ) {
995 if ( ldap_url_parselist_ext( &ludp, uris[ j ], "\t",
996 LDAP_PVT_URL_PARSE_NONE ) != LDAP_SUCCESS
997 || ludp->lud_next != NULL )
999 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1000 "unable to parse URI #%d"
1001 " in \"%s <protocol>://<server>[:port]/<naming context>\"",
1003 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1004 ldap_charray_free( uris );
1011 * uri MUST have the <dn> part!
1013 if ( ludp->lud_dn == NULL ) {
1014 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1015 "missing <naming context> "
1016 " in \"%s <protocol>://<server>[:port]/<naming context>\"",
1018 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1019 ldap_free_urllist( ludp );
1020 ldap_charray_free( uris );
1025 * copies and stores uri and suffix
1027 ber_str2bv( ludp->lud_dn, 0, 0, &dn );
1028 rc = dnPrettyNormal( NULL, &dn, &mt->mt_psuffix,
1029 &mt->mt_nsuffix, NULL );
1030 if ( rc != LDAP_SUCCESS ) {
1031 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1032 "target DN is invalid \"%s\"",
1034 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1035 ldap_free_urllist( ludp );
1036 ldap_charray_free( uris );
1040 ludp->lud_dn[ 0 ] = '\0';
1042 switch ( ludp->lud_scope ) {
1043 case LDAP_SCOPE_DEFAULT:
1044 mt->mt_scope = LDAP_SCOPE_SUBTREE;
1047 case LDAP_SCOPE_SUBTREE:
1048 case LDAP_SCOPE_SUBORDINATE:
1049 mt->mt_scope = ludp->lud_scope;
1053 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1054 "invalid scope for target \"%s\"",
1056 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1057 ldap_free_urllist( ludp );
1058 ldap_charray_free( uris );
1063 /* check all, to apply the scope check on the first one */
1064 if ( ludp->lud_dn != NULL && ludp->lud_dn[ 0 ] != '\0' ) {
1065 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1066 "multiple URIs must have no DN part" );
1067 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1068 ldap_free_urllist( ludp );
1069 ldap_charray_free( uris );
1075 tmpuri = ldap_url_list2urls( ludp );
1076 ldap_free_urllist( ludp );
1077 if ( tmpuri == NULL ) {
1078 snprintf( c->cr_msg, sizeof( c->cr_msg ), "no memory?" );
1079 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1080 ldap_charray_free( uris );
1083 ldap_memfree( uris[ j ] );
1087 mt->mt_uri = ldap_charray2str( uris, " " );
1088 ldap_charray_free( uris );
1089 if ( mt->mt_uri == NULL) {
1090 snprintf( c->cr_msg, sizeof( c->cr_msg ), "no memory?" );
1091 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1096 * uri MUST be a branch of suffix!
1098 for ( j = 0; !BER_BVISNULL( &c->be->be_nsuffix[ j ] ); j++ ) {
1099 if ( dnIsSuffix( &mt->mt_nsuffix, &c->be->be_nsuffix[ j ] ) ) {
1104 if ( BER_BVISNULL( &c->be->be_nsuffix[ j ] ) ) {
1105 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1106 "<naming context> of URI must be within the naming context of this database." );
1107 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1111 case LDAP_BACK_CFG_SUBTREE_EX:
1112 case LDAP_BACK_CFG_SUBTREE_IN:
1113 /* subtree-exclude */
1114 if ( meta_subtree_config( mt, c )) {
1115 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1120 case LDAP_BACK_CFG_DEFAULT_T:
1121 /* default target directive */
1122 i = mi->mi_ntargets - 1;
1124 if ( c->argc == 1 ) {
1126 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1127 "\"%s\" alone must be inside a \"uri\" directive",
1129 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1132 mi->mi_defaulttarget = i;
1135 if ( strcasecmp( c->argv[ 1 ], "none" ) == 0 ) {
1137 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1138 "\"%s none\" should go before uri definitions",
1140 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1142 mi->mi_defaulttarget = META_DEFAULT_TARGET_NONE;
1146 if ( lutil_atoi( &mi->mi_defaulttarget, c->argv[ 1 ] ) != 0
1147 || mi->mi_defaulttarget < 0
1148 || mi->mi_defaulttarget >= i - 1 )
1150 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1151 "illegal target number %d",
1152 mi->mi_defaulttarget );
1153 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1160 case LDAP_BACK_CFG_DNCACHE_TTL:
1161 /* ttl of dn cache */
1162 if ( strcasecmp( c->argv[ 1 ], "forever" ) == 0 ) {
1163 mi->mi_cache.ttl = META_DNCACHE_FOREVER;
1165 } else if ( strcasecmp( c->argv[ 1 ], "disabled" ) == 0 ) {
1166 mi->mi_cache.ttl = META_DNCACHE_DISABLED;
1171 if ( lutil_parse_time( c->argv[ 1 ], &t ) != 0 ) {
1172 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1173 "unable to parse dncache ttl \"%s\"",
1175 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1178 mi->mi_cache.ttl = (time_t)t;
1182 case LDAP_BACK_CFG_NETWORK_TIMEOUT: {
1183 /* network timeout when connecting to ldap servers */
1186 if ( lutil_parse_time( c->argv[ 1 ], &t ) ) {
1187 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1188 "unable to parse network timeout \"%s\"",
1190 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1193 mc->mc_network_timeout = (time_t)t;
1196 case LDAP_BACK_CFG_IDLE_TIMEOUT: {
1197 /* idle timeout when connecting to ldap servers */
1200 if ( lutil_parse_time( c->argv[ 1 ], &t ) ) {
1201 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1202 "unable to parse idle timeout \"%s\"",
1204 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1208 mi->mi_idle_timeout = (time_t)t;
1211 case LDAP_BACK_CFG_CONN_TTL: {
1215 if ( lutil_parse_time( c->argv[ 1 ], &t ) ) {
1216 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1217 "unable to parse conn ttl \"%s\"",
1219 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1223 mi->mi_conn_ttl = (time_t)t;
1226 case LDAP_BACK_CFG_BIND_TIMEOUT: {
1227 /* bind timeout when connecting to ldap servers */
1230 if ( lutil_atoul( &t, c->argv[ 1 ] ) != 0 ) {
1231 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1232 "unable to parse bind timeout \"%s\"",
1234 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1238 mc->mc_bind_timeout.tv_sec = t/1000000;
1239 mc->mc_bind_timeout.tv_usec = t%1000000;
1242 case LDAP_BACK_CFG_ACL_AUTHCDN:
1243 /* name to use for meta_back_group */
1244 if ( strcasecmp( c->argv[ 0 ], "binddn" ) == 0 ) {
1245 Debug( LDAP_DEBUG_ANY, "%s: "
1246 "\"binddn\" statement is deprecated; "
1247 "use \"acl-authcDN\" instead\n",
1249 /* FIXME: some day we'll need to throw an error */
1252 ber_memfree_x( c->value_dn.bv_val, NULL );
1253 mt->mt_binddn = c->value_ndn;
1254 BER_BVZERO( &c->value_dn );
1255 BER_BVZERO( &c->value_ndn );
1258 case LDAP_BACK_CFG_ACL_PASSWD:
1259 /* password to use for meta_back_group */
1260 if ( strcasecmp( c->argv[ 0 ], "bindpw" ) == 0 ) {
1261 Debug( LDAP_DEBUG_ANY, "%s "
1262 "\"bindpw\" statement is deprecated; "
1263 "use \"acl-passwd\" instead\n",
1265 /* FIXME: some day we'll need to throw an error */
1268 ber_str2bv( c->argv[ 1 ], 0L, 1, &mt->mt_bindpw );
1271 case LDAP_BACK_CFG_REBIND:
1272 /* save bind creds for referral rebinds? */
1273 if ( c->argc == 1 || c->value_int ) {
1274 mc->mc_flags |= LDAP_BACK_F_SAVECRED;
1276 mc->mc_flags &= ~LDAP_BACK_F_SAVECRED;
1280 case LDAP_BACK_CFG_CHASE:
1281 if ( c->argc == 1 || c->value_int ) {
1282 mc->mc_flags |= LDAP_BACK_F_CHASE_REFERRALS;
1284 mc->mc_flags &= ~LDAP_BACK_F_CHASE_REFERRALS;
1288 case LDAP_BACK_CFG_TLS:
1289 i = verb_to_mask( c->argv[1], tls_mode );
1290 if ( BER_BVISNULL( &tls_mode[i].word ) ) {
1291 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1292 "%s unknown argument \"%s\"",
1293 c->argv[0], c->argv[1] );
1294 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1297 mc->mc_flags &= ~LDAP_BACK_F_TLS_MASK;
1298 mc->mc_flags |= tls_mode[i].mask;
1300 if ( c->argc > 2 ) {
1301 metatarget_t *mt = NULL;
1303 if ( mi->mi_ntargets - 1 < 0 ) {
1304 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1305 "need \"uri\" directive first" );
1306 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1310 mt = mi->mi_targets[ mi->mi_ntargets - 1 ];
1312 for ( i = 2; i < c->argc; i++ ) {
1313 if ( bindconf_tls_parse( c->argv[i], &mt->mt_tls ))
1316 bindconf_tls_defaults( &mt->mt_tls );
1320 case LDAP_BACK_CFG_T_F:
1321 i = verb_to_mask( c->argv[1], t_f_mode );
1322 if ( BER_BVISNULL( &t_f_mode[i].word ) ) {
1323 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1324 "%s unknown argument \"%s\"",
1325 c->argv[0], c->argv[1] );
1326 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1329 mc->mc_flags &= ~LDAP_BACK_F_T_F_MASK2;
1330 mc->mc_flags |= t_f_mode[i].mask;
1333 case LDAP_BACK_CFG_ONERR:
1335 i = verb_to_mask( c->argv[1], onerr_mode );
1336 if ( BER_BVISNULL( &onerr_mode[i].word ) ) {
1337 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1338 "%s unknown argument \"%s\"",
1339 c->argv[0], c->argv[1] );
1340 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1343 mi->mi_flags &= ~META_BACK_F_ONERR_MASK;
1344 mi->mi_flags |= onerr_mode[i].mask;
1347 case LDAP_BACK_CFG_PSEUDOROOT_BIND_DEFER:
1349 if ( c->argc == 1 || c->value_int ) {
1350 mi->mi_flags |= META_BACK_F_DEFER_ROOTDN_BIND;
1352 mi->mi_flags &= ~META_BACK_F_DEFER_ROOTDN_BIND;
1356 case LDAP_BACK_CFG_SINGLECONN:
1358 if ( mi->mi_ntargets > 0 ) {
1359 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1360 "\"%s\" must appear before target definitions",
1362 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1365 if ( c->value_int ) {
1366 mi->mi_flags |= LDAP_BACK_F_SINGLECONN;
1368 mi->mi_flags &= ~LDAP_BACK_F_SINGLECONN;
1372 case LDAP_BACK_CFG_USETEMP:
1373 /* use-temporaries? */
1374 if ( mi->mi_ntargets > 0 ) {
1375 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1376 "\"%s\" must appear before target definitions",
1378 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1381 if ( c->value_int ) {
1382 mi->mi_flags |= LDAP_BACK_F_USE_TEMPORARIES;
1384 mi->mi_flags &= ~LDAP_BACK_F_USE_TEMPORARIES;
1388 case LDAP_BACK_CFG_CONNPOOLMAX:
1389 /* privileged connections pool max size ? */
1390 if ( mi->mi_ntargets > 0 ) {
1391 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1392 "\"%s\" must appear before target definitions",
1394 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1398 if ( c->value_int < LDAP_BACK_CONN_PRIV_MIN
1399 || c->value_int > LDAP_BACK_CONN_PRIV_MAX )
1401 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1402 "invalid max size " "of privileged "
1403 "connections pool \"%s\" "
1404 "in \"conn-pool-max <n> "
1405 "(must be between %d and %d)\"",
1407 LDAP_BACK_CONN_PRIV_MIN,
1408 LDAP_BACK_CONN_PRIV_MAX );
1409 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1412 mi->mi_conn_priv_max = c->value_int;
1415 case LDAP_BACK_CFG_CANCEL:
1416 i = verb_to_mask( c->argv[1], cancel_mode );
1417 if ( BER_BVISNULL( &cancel_mode[i].word ) ) {
1418 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1419 "%s unknown argument \"%s\"",
1420 c->argv[0], c->argv[1] );
1421 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1424 mc->mc_flags &= ~LDAP_BACK_F_CANCEL_MASK2;
1425 mc->mc_flags |= t_f_mode[i].mask;
1428 case LDAP_BACK_CFG_TIMEOUT:
1429 for ( i = 1; i < c->argc; i++ ) {
1430 if ( isdigit( (unsigned char) c->argv[ i ][ 0 ] ) ) {
1434 if ( lutil_atoux( &u, c->argv[ i ], 0 ) != 0 ) {
1435 snprintf( c->cr_msg, sizeof( c->cr_msg),
1436 "unable to parse timeout \"%s\"",
1438 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1442 for ( j = 0; j < SLAP_OP_LAST; j++ ) {
1443 mc->mc_timeout[ j ] = u;
1449 if ( slap_cf_aux_table_parse( c->argv[ i ], mc->mc_timeout, timeout_table, "slapd-meta timeout" ) ) {
1450 snprintf( c->cr_msg, sizeof( c->cr_msg),
1451 "unable to parse timeout \"%s\"",
1453 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1459 case LDAP_BACK_CFG_PSEUDOROOTDN:
1460 /* name to use as pseudo-root dn */
1462 * exact replacement:
1465 idassert-bind bindmethod=simple
1466 binddn=<pseudorootdn>
1467 credentials=<pseudorootpw>
1469 flags=non-prescriptive
1470 idassert-authzFrom "dn:<rootdn>"
1472 * so that only when authc'd as <rootdn> the proxying occurs
1473 * rebinding as the <pseudorootdn> without proxyAuthz.
1476 Debug( LDAP_DEBUG_ANY,
1477 "%s: \"pseudorootdn\", \"pseudorootpw\" are no longer supported; "
1478 "use \"idassert-bind\" and \"idassert-authzFrom\" instead.\n",
1482 char binddn[ SLAP_TEXT_BUFLEN ];
1485 "bindmethod=simple",
1488 "flags=non-prescriptive",
1497 if ( BER_BVISNULL( &c->be->be_rootndn ) ) {
1498 Debug( LDAP_DEBUG_ANY, "%s: \"pseudorootpw\": \"rootdn\" must be defined first.\n",
1503 if ( sizeof( binddn ) <= (unsigned) snprintf( binddn,
1504 sizeof( binddn ), "binddn=%s", c->argv[ 1 ] ))
1506 Debug( LDAP_DEBUG_ANY, "%s: \"pseudorootdn\" too long.\n",
1510 cargv[ 2 ] = binddn;
1516 rc = mi->mi_ldap_extra->idassert_parse( c, &mt->mt_idassert );
1522 if ( mt->mt_idassert_authz != NULL ) {
1523 Debug( LDAP_DEBUG_ANY, "%s: \"idassert-authzFrom\" already defined (discarded).\n",
1525 ber_bvarray_free( mt->mt_idassert_authz );
1526 mt->mt_idassert_authz = NULL;
1529 assert( !BER_BVISNULL( &mt->mt_idassert_authcDN ) );
1531 bv.bv_len = STRLENOF( "dn:" ) + c->be->be_rootndn.bv_len;
1532 bv.bv_val = ber_memalloc( bv.bv_len + 1 );
1533 AC_MEMCPY( bv.bv_val, "dn:", STRLENOF( "dn:" ) );
1534 AC_MEMCPY( &bv.bv_val[ STRLENOF( "dn:" ) ], c->be->be_rootndn.bv_val, c->be->be_rootndn.bv_len + 1 );
1536 ber_bvarray_add( &mt->mt_idassert_authz, &bv );
1543 case LDAP_BACK_CFG_PSEUDOROOTPW:
1544 /* password to use as pseudo-root */
1545 Debug( LDAP_DEBUG_ANY,
1546 "%s: \"pseudorootdn\", \"pseudorootpw\" are no longer supported; "
1547 "use \"idassert-bind\" and \"idassert-authzFrom\" instead.\n",
1550 if ( BER_BVISNULL( &mt->mt_idassert_authcDN ) ) {
1551 Debug( LDAP_DEBUG_ANY, "%s: \"pseudorootpw\": \"pseudorootdn\" must be defined first.\n",
1556 if ( !BER_BVISNULL( &mt->mt_idassert_passwd ) ) {
1557 memset( mt->mt_idassert_passwd.bv_val, 0,
1558 mt->mt_idassert_passwd.bv_len );
1559 ber_memfree( mt->mt_idassert_passwd.bv_val );
1561 ber_str2bv( c->argv[ 1 ], 0, 1, &mt->mt_idassert_passwd );
1564 case LDAP_BACK_CFG_IDASSERT_BIND:
1566 rc = mi->mi_ldap_extra->idassert_parse( c, &mt->mt_idassert );
1569 case LDAP_BACK_CFG_IDASSERT_AUTHZFROM:
1570 /* idassert-authzFrom */
1571 rc = mi->mi_ldap_extra->idassert_authzfrom_parse( c, &mt->mt_idassert );
1574 case LDAP_BACK_CFG_QUARANTINE:
1576 if ( META_BACK_CMN_QUARANTINE( mc ) )
1578 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1579 "quarantine already defined" );
1580 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1585 mc->mc_quarantine.ri_interval = NULL;
1586 mc->mc_quarantine.ri_num = NULL;
1587 if ( !META_BACK_QUARANTINE( mi ) ) {
1588 ldap_pvt_thread_mutex_init( &mt->mt_quarantine_mutex );
1592 if ( mi->mi_ldap_extra->retry_info_parse( c->argv[ 1 ], &mc->mc_quarantine, c->cr_msg, sizeof( c->cr_msg ) ) ) {
1593 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1597 mc->mc_flags |= LDAP_BACK_F_QUARANTINE;
1600 #ifdef SLAP_CONTROL_X_SESSION_TRACKING
1601 case LDAP_BACK_CFG_ST_REQUEST:
1602 /* session tracking request */
1603 if ( c->value_int ) {
1604 mc->mc_flags |= LDAP_BACK_F_ST_REQUEST;
1606 mc->mc_flags &= ~LDAP_BACK_F_ST_REQUEST;
1609 #endif /* SLAP_CONTROL_X_SESSION_TRACKING */
1611 case LDAP_BACK_CFG_SUFFIXM: {
1614 struct berval dn, nvnc, pvnc, nrnc, prnc;
1620 * suffixmassage <suffix> <massaged suffix>
1622 * the <suffix> field must be defined as a valid suffix
1623 * (or suffixAlias?) for the current database;
1624 * the <massaged suffix> shouldn't have already been
1625 * defined as a valid suffix or suffixAlias for the
1629 ber_str2bv( c->argv[ 1 ], 0, 0, &dn );
1630 if ( dnPrettyNormal( NULL, &dn, &pvnc, &nvnc, NULL ) != LDAP_SUCCESS ) {
1631 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1632 "suffix \"%s\" is invalid",
1634 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1638 for ( j = 0; !BER_BVISNULL( &c->be->be_nsuffix[ j ] ); j++ ) {
1639 if ( dnIsSuffix( &nvnc, &c->be->be_nsuffix[ 0 ] ) ) {
1644 if ( BER_BVISNULL( &c->be->be_nsuffix[ j ] ) ) {
1645 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1646 "suffix \"%s\" must be within the database naming context",
1648 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1649 free( pvnc.bv_val );
1650 free( nvnc.bv_val );
1654 ber_str2bv( c->argv[ 2 ], 0, 0, &dn );
1655 if ( dnPrettyNormal( NULL, &dn, &prnc, &nrnc, NULL ) != LDAP_SUCCESS ) {
1656 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1657 "massaged suffix \"%s\" is invalid",
1659 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1660 free( pvnc.bv_val );
1661 free( nvnc.bv_val );
1665 tmp_bd = select_backend( &nrnc, 0 );
1666 if ( tmp_bd != NULL && tmp_bd->be_private == c->be->be_private ) {
1667 Debug( LDAP_DEBUG_ANY,
1668 "%s: warning: <massaged suffix> \"%s\" resolves to this database, in "
1669 "\"suffixMassage <suffix> <massaged suffix>\"\n",
1670 c->log, prnc.bv_val, 0 );
1674 * The suffix massaging is emulated by means of the
1675 * rewrite capabilities
1677 rc = suffix_massage_config( mt->mt_rwmap.rwm_rw,
1678 &pvnc, &nvnc, &prnc, &nrnc );
1680 free( pvnc.bv_val );
1681 free( nvnc.bv_val );
1682 free( prnc.bv_val );
1683 free( nrnc.bv_val );
1688 case LDAP_BACK_CFG_REWRITE:
1689 /* rewrite stuff ... */
1690 return rewrite_parse( mt->mt_rwmap.rwm_rw,
1691 c->fname, c->lineno, c->argc, c->argv );
1693 case LDAP_BACK_CFG_MAP:
1694 /* objectclass/attribute mapping */
1695 return ldap_back_map_config( c, &mt->mt_rwmap.rwm_oc,
1696 &mt->mt_rwmap.rwm_at );
1698 case LDAP_BACK_CFG_NRETRIES: {
1699 int nretries = META_RETRY_UNDEFINED;
1701 if ( strcasecmp( c->argv[ 1 ], "forever" ) == 0 ) {
1702 nretries = META_RETRY_FOREVER;
1704 } else if ( strcasecmp( c->argv[ 1 ], "never" ) == 0 ) {
1705 nretries = META_RETRY_NEVER;
1708 if ( lutil_atoi( &nretries, c->argv[ 1 ] ) != 0 ) {
1709 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1710 "unable to parse nretries {never|forever|<retries>}: \"%s\"",
1712 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1717 mc->mc_nretries = nretries;
1720 case LDAP_BACK_CFG_VERSION:
1721 if ( c->value_int != 0 && ( c->value_int < LDAP_VERSION_MIN || c->value_int > LDAP_VERSION_MAX ) ) {
1722 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1723 "unsupported protocol version \"%s\"",
1725 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1728 mc->mc_version = c->value_int;
1731 case LDAP_BACK_CFG_NOREFS:
1732 /* do not return search references */
1733 if ( c->value_int ) {
1734 mc->mc_flags |= LDAP_BACK_F_NOREFS;
1736 mc->mc_flags &= ~LDAP_BACK_F_NOREFS;
1740 case LDAP_BACK_CFG_NOUNDEFFILTER:
1741 /* do not propagate undefined search filters */
1742 if ( c->value_int ) {
1743 mc->mc_flags |= LDAP_BACK_F_NOUNDEFFILTER;
1745 mc->mc_flags &= ~LDAP_BACK_F_NOUNDEFFILTER;
1749 #ifdef SLAPD_META_CLIENT_PR
1750 case LDAP_BACK_CFG_CLIENT_PR:
1751 if ( strcasecmp( c->argv[ 1 ], "accept-unsolicited" ) == 0 ) {
1752 mc->mc_ps = META_CLIENT_PR_ACCEPT_UNSOLICITED;
1754 } else if ( strcasecmp( c->argv[ 1 ], "disable" ) == 0 ) {
1755 mc->mc_ps = META_CLIENT_PR_DISABLE;
1757 } else if ( lutil_atoi( &mc->mc_ps, c->argv[ 1 ] ) || mc->mc_ps < -1 ) {
1758 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1759 "unable to parse client-pr {accept-unsolicited|disable|<size>}: \"%s\"",
1761 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1765 #endif /* SLAPD_META_CLIENT_PR */
1769 return SLAP_CONF_UNKNOWN;
1776 meta_back_init_cf( BackendInfo *bi )
1779 AttributeDescription *ad = NULL;
1782 /* Make sure we don't exceed the bits reserved for userland */
1783 config_check_userland( LDAP_BACK_CFG_LAST );
1785 bi->bi_cf_ocs = metaocs;
1787 rc = config_register_schema( metacfg, metaocs );
1792 /* setup olcDbAclPasswd and olcDbIDAssertPasswd
1793 * to be base64-encoded when written in LDIF form;
1794 * basically, we don't care if it fails */
1795 rc = slap_str2ad( "olcDbACLPasswd", &ad, &text );
1797 Debug( LDAP_DEBUG_ANY, "config_back_initialize: "
1798 "warning, unable to get \"olcDbACLPasswd\" "
1799 "attribute description: %d: %s\n",
1802 (void)ldif_must_b64_encode_register( ad->ad_cname.bv_val,
1803 ad->ad_type->sat_oid );
1807 rc = slap_str2ad( "olcDbIDAssertPasswd", &ad, &text );
1809 Debug( LDAP_DEBUG_ANY, "config_back_initialize: "
1810 "warning, unable to get \"olcDbIDAssertPasswd\" "
1811 "attribute description: %d: %s\n",
1814 (void)ldif_must_b64_encode_register( ad->ad_cname.bv_val,
1815 ad->ad_type->sat_oid );
1822 ldap_back_map_config(
1824 struct ldapmap *oc_map,
1825 struct ldapmap *at_map )
1827 struct ldapmap *map;
1828 struct ldapmapping *mapping;
1832 if ( strcasecmp( c->argv[ 1 ], "objectclass" ) == 0 ) {
1836 } else if ( strcasecmp( c->argv[ 1 ], "attribute" ) == 0 ) {
1840 snprintf( c->cr_msg, sizeof(c->cr_msg),
1841 "%s unknown argument \"%s\"",
1842 c->argv[0], c->argv[1] );
1843 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1847 if ( !is_oc && map->map == NULL ) {
1848 /* only init if required */
1849 ldap_back_map_init( map, &mapping );
1852 if ( strcmp( c->argv[ 2 ], "*" ) == 0 ) {
1853 if ( c->argc < 4 || strcmp( c->argv[ 3 ], "*" ) == 0 ) {
1854 map->drop_missing = ( c->argc < 4 );
1855 goto success_return;
1857 src = dst = c->argv[ 3 ];
1859 } else if ( c->argc < 4 ) {
1865 dst = ( strcmp( c->argv[ 3 ], "*" ) == 0 ? src : c->argv[ 3 ] );
1868 if ( ( map == at_map )
1869 && ( strcasecmp( src, "objectclass" ) == 0
1870 || strcasecmp( dst, "objectclass" ) == 0 ) )
1872 snprintf( c->cr_msg, sizeof(c->cr_msg),
1873 "objectclass attribute cannot be mapped" );
1874 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1878 mapping = (struct ldapmapping *)ch_calloc( 2,
1879 sizeof(struct ldapmapping) );
1880 if ( mapping == NULL ) {
1881 snprintf( c->cr_msg, sizeof(c->cr_msg),
1883 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1886 ber_str2bv( src, 0, 1, &mapping[ 0 ].src );
1887 ber_str2bv( dst, 0, 1, &mapping[ 0 ].dst );
1888 mapping[ 1 ].src = mapping[ 0 ].dst;
1889 mapping[ 1 ].dst = mapping[ 0 ].src;
1895 if ( src[ 0 ] != '\0' ) {
1896 if ( oc_bvfind( &mapping[ 0 ].src ) == NULL ) {
1897 Debug( LDAP_DEBUG_ANY,
1898 "warning, source objectClass '%s' should be defined in schema\n",
1902 * FIXME: this should become an err
1908 if ( oc_bvfind( &mapping[ 0 ].dst ) == NULL ) {
1909 Debug( LDAP_DEBUG_ANY,
1910 "warning, destination objectClass '%s' is not defined in schema\n",
1915 const char *text = NULL;
1916 AttributeDescription *ad = NULL;
1918 if ( src[ 0 ] != '\0' ) {
1919 rc = slap_bv2ad( &mapping[ 0 ].src, &ad, &text );
1920 if ( rc != LDAP_SUCCESS ) {
1921 Debug( LDAP_DEBUG_ANY,
1922 "warning, source attributeType '%s' should be defined in schema\n",
1926 * FIXME: this should become an err
1929 * we create a fake "proxied" ad
1933 rc = slap_bv2undef_ad( &mapping[ 0 ].src,
1934 &ad, &text, SLAP_AD_PROXIED );
1935 if ( rc != LDAP_SUCCESS ) {
1936 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1937 "source attributeType \"%s\": %d (%s)",
1938 src, rc, text ? text : "" );
1939 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1947 rc = slap_bv2ad( &mapping[ 0 ].dst, &ad, &text );
1948 if ( rc != LDAP_SUCCESS ) {
1949 Debug( LDAP_DEBUG_ANY,
1950 "warning, destination attributeType '%s' is not defined in schema\n",
1954 * we create a fake "proxied" ad
1958 rc = slap_bv2undef_ad( &mapping[ 0 ].dst,
1959 &ad, &text, SLAP_AD_PROXIED );
1960 if ( rc != LDAP_SUCCESS ) {
1961 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1962 "destination attributeType \"%s\": %d (%s)\n",
1963 dst, rc, text ? text : "" );
1964 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1970 if ( (src[ 0 ] != '\0' && avl_find( map->map, (caddr_t)&mapping[ 0 ], mapping_cmp ) != NULL)
1971 || avl_find( map->remap, (caddr_t)&mapping[ 1 ], mapping_cmp ) != NULL)
1973 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1974 "duplicate mapping found." );
1975 Debug( LDAP_DEBUG_ANY, "%s: %s.\n", c->log, c->cr_msg, 0 );
1979 if ( src[ 0 ] != '\0' ) {
1980 avl_insert( &map->map, (caddr_t)&mapping[ 0 ],
1981 mapping_cmp, mapping_dup );
1983 avl_insert( &map->remap, (caddr_t)&mapping[ 1 ],
1984 mapping_cmp, mapping_dup );
1991 ch_free( mapping[ 0 ].src.bv_val );
1992 ch_free( mapping[ 0 ].dst.bv_val );
2000 #ifdef ENABLE_REWRITE
2002 suffix_massage_regexize( const char *s )
2008 if ( s[ 0 ] == '\0' ) {
2009 return ch_strdup( "^(.+)$" );
2013 ( r = strchr( p, ',' ) ) != NULL;
2017 res = ch_calloc( sizeof( char ),
2019 + STRLENOF( "((.+),)?" )
2020 + STRLENOF( "[ ]?" ) * i
2021 + STRLENOF( "$" ) + 1 );
2023 ptr = lutil_strcopy( res, "((.+),)?" );
2025 ( r = strchr( p, ',' ) ) != NULL;
2027 ptr = lutil_strncopy( ptr, p, r - p + 1 );
2028 ptr = lutil_strcopy( ptr, "[ ]?" );
2030 if ( r[ 1 ] == ' ' ) {
2034 ptr = lutil_strcopy( ptr, p );
2043 suffix_massage_patternize( const char *s, const char *p )
2050 if ( s[ 0 ] == '\0' ) {
2054 res = ch_calloc( sizeof( char ), len + STRLENOF( "%1" ) + 1 );
2055 if ( res == NULL ) {
2059 ptr = lutil_strcopy( res, ( p[ 0 ] == '\0' ? "%2" : "%1" ) );
2060 if ( s[ 0 ] == '\0' ) {
2064 lutil_strcopy( ptr, p );
2070 suffix_massage_config(
2071 struct rewrite_info *info,
2072 struct berval *pvnc,
2073 struct berval *nvnc,
2074 struct berval *prnc,
2081 rargv[ 0 ] = "rewriteEngine";
2084 rewrite_parse( info, "<suffix massage>", ++line, 2, rargv );
2086 rargv[ 0 ] = "rewriteContext";
2087 rargv[ 1 ] = "default";
2089 rewrite_parse( info, "<suffix massage>", ++line, 2, rargv );
2091 rargv[ 0 ] = "rewriteRule";
2092 rargv[ 1 ] = suffix_massage_regexize( pvnc->bv_val );
2093 rargv[ 2 ] = suffix_massage_patternize( pvnc->bv_val, prnc->bv_val );
2096 rewrite_parse( info, "<suffix massage>", ++line, 4, rargv );
2097 ch_free( rargv[ 1 ] );
2098 ch_free( rargv[ 2 ] );
2100 if ( BER_BVISEMPTY( pvnc ) ) {
2101 rargv[ 0 ] = "rewriteRule";
2103 rargv[ 2 ] = prnc->bv_val;
2106 rewrite_parse( info, "<suffix massage>", ++line, 4, rargv );
2109 rargv[ 0 ] = "rewriteContext";
2110 rargv[ 1 ] = "searchEntryDN";
2112 rewrite_parse( info, "<suffix massage>", ++line, 2, rargv );
2114 rargv[ 0 ] = "rewriteRule";
2115 rargv[ 1 ] = suffix_massage_regexize( prnc->bv_val );
2116 rargv[ 2 ] = suffix_massage_patternize( prnc->bv_val, pvnc->bv_val );
2119 rewrite_parse( info, "<suffix massage>", ++line, 4, rargv );
2120 ch_free( rargv[ 1 ] );
2121 ch_free( rargv[ 2 ] );
2123 if ( BER_BVISEMPTY( prnc ) ) {
2124 rargv[ 0 ] = "rewriteRule";
2126 rargv[ 2 ] = pvnc->bv_val;
2129 rewrite_parse( info, "<suffix massage>", ++line, 4, rargv );
2132 /* backward compatibility */
2133 rargv[ 0 ] = "rewriteContext";
2134 rargv[ 1 ] = "searchResult";
2135 rargv[ 2 ] = "alias";
2136 rargv[ 3 ] = "searchEntryDN";
2138 rewrite_parse( info, "<suffix massage>", ++line, 4, rargv );
2140 rargv[ 0 ] = "rewriteContext";
2141 rargv[ 1 ] = "matchedDN";
2142 rargv[ 2 ] = "alias";
2143 rargv[ 3 ] = "searchEntryDN";
2145 rewrite_parse( info, "<suffix massage>", ++line, 4, rargv );
2147 rargv[ 0 ] = "rewriteContext";
2148 rargv[ 1 ] = "searchAttrDN";
2149 rargv[ 2 ] = "alias";
2150 rargv[ 3 ] = "searchEntryDN";
2152 rewrite_parse( info, "<suffix massage>", ++line, 4, rargv );
2154 /* NOTE: this corresponds to #undef'ining RWM_REFERRAL_REWRITE;
2155 * see servers/slapd/overlays/rwm.h for details */
2156 rargv[ 0 ] = "rewriteContext";
2157 rargv[ 1 ] = "referralAttrDN";
2159 rewrite_parse( info, "<suffix massage>", ++line, 2, rargv );
2161 rargv[ 0 ] = "rewriteContext";
2162 rargv[ 1 ] = "referralDN";
2164 rewrite_parse( info, "<suffix massage>", ++line, 2, rargv );
2168 #endif /* ENABLE_REWRITE */