]> git.sur5r.net Git - openldap/blob - servers/slapd/limits.c
Fix warning in assignment
[openldap] / servers / slapd / limits.c
1 /* limits.c - routines to handle regex-based size and time limits */
2 /* $OpenLDAP$ */
3 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
4  *
5  * Copyright 1998-2004 The OpenLDAP Foundation.
6  * All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted only as authorized by the OpenLDAP
10  * Public License.
11  *
12  * A copy of this license is available in the file LICENSE in the
13  * top-level directory of the distribution or, alternatively, at
14  * <http://www.OpenLDAP.org/license.html>.
15  */
16
17 #include "portable.h"
18
19 #include <stdio.h>
20
21 #include <ac/regex.h>
22 #include <ac/string.h>
23
24 #include "slap.h"
25
26 int
27 limits_get( 
28         Operation               *op,
29         struct berval           *ndn, 
30         struct slap_limits_set  **limit
31 )
32 {
33         struct slap_limits **lm;
34
35         assert( op );
36         assert( limit );
37
38         /*
39          * default values
40          */
41         *limit = &op->o_bd->be_def_limit;
42
43         if ( op->o_bd->be_limits == NULL ) {
44                 return( 0 );
45         }
46
47         for ( lm = op->o_bd->be_limits; lm[0] != NULL; lm++ ) {
48                 unsigned        style = lm[0]->lm_flags & SLAP_LIMITS_MASK;
49                 unsigned        type = lm[0]->lm_flags & SLAP_LIMITS_TYPE_MASK;
50
51                 switch ( style ) {
52                 case SLAP_LIMITS_EXACT:
53                         if ( ndn->bv_len == 0 ) {
54                                 break;
55                         }
56
57                         if ( type == SLAP_LIMITS_TYPE_GROUP ) {
58                                 int     rc;
59
60                                 rc = backend_group( op, NULL,
61                                                 &lm[0]->lm_pat, ndn,
62                                                 lm[0]->lm_group_oc,
63                                                 lm[0]->lm_group_ad );
64                                 if ( rc == 0 ) {
65                                         *limit = &lm[0]->lm_limits;
66                                         return( 0 );
67                                 }
68                         }
69                         
70                         if ( dn_match( &lm[0]->lm_pat, ndn ) ) {
71                                 *limit = &lm[0]->lm_limits;
72                                 return( 0 );
73                         }
74                         break;
75
76                 case SLAP_LIMITS_ONE:
77                 case SLAP_LIMITS_SUBTREE:
78                 case SLAP_LIMITS_CHILDREN: {
79                         size_t d;
80                         
81                         if ( ndn->bv_len == 0 ) {
82                                 break;
83                         }
84
85                         /* ndn shorter than dn_pat */
86                         if ( ndn->bv_len < lm[0]->lm_pat.bv_len ) {
87                                 break;
88                         }
89                         d = ndn->bv_len - lm[0]->lm_pat.bv_len;
90
91                         /* allow exact match for SUBTREE only */
92                         if ( d == 0 ) {
93                                 if ( style != SLAP_LIMITS_SUBTREE ) {
94                                         break;
95                                 }
96                         } else {
97                                 /* check for unescaped rdn separator */
98                                 if ( !DN_SEPARATOR( ndn->bv_val[d-1] ) ) {
99                                         break;
100                                 }
101                         }
102
103                         /* in case of (sub)match ... */
104                         if ( lm[0]->lm_pat.bv_len == ( ndn->bv_len - d )
105                                         && strcmp( lm[0]->lm_pat.bv_val,
106                                                 &ndn->bv_val[d] ) == 0 )
107                         {
108                                 /* check for exactly one rdn in case of ONE */
109                                 if ( style == SLAP_LIMITS_ONE ) {
110                                         /*
111                                          * if ndn is more that one rdn
112                                          * below dn_pat, continue
113                                          */
114                                         if ( (size_t) dn_rdnlen( NULL, ndn )
115                                                         != d - 1 )
116                                         {
117                                                 break;
118                                         }
119                                 }
120
121                                 *limit = &lm[0]->lm_limits;
122                                 return( 0 );
123                         }
124
125                         break;
126                 }
127
128                 case SLAP_LIMITS_REGEX:
129                         if ( ndn->bv_len == 0 ) {
130                                 break;
131                         }
132                         if ( regexec( &lm[0]->lm_regex, ndn->bv_val,
133                                                 0, NULL, 0 ) == 0 )
134                         {
135                                 *limit = &lm[0]->lm_limits;
136                                 return( 0 );
137                         }
138                         break;
139
140                 case SLAP_LIMITS_ANONYMOUS:
141                         if ( ndn->bv_len == 0 ) {
142                                 *limit = &lm[0]->lm_limits;
143                                 return( 0 );
144                         }
145                         break;
146
147                 case SLAP_LIMITS_USERS:
148                         if ( ndn->bv_len != 0 ) {
149                                 *limit = &lm[0]->lm_limits;
150                                 return( 0 );
151                         }
152                         break;
153
154                 case SLAP_LIMITS_ANY:
155                         *limit = &lm[0]->lm_limits;
156                         return( 0 );
157
158                 default:
159                         assert( 0 );    /* unreachable */
160                         return( -1 );
161                 }
162         }
163
164         return( 0 );
165 }
166
167 static int
168 limits_add(
169         Backend                 *be,
170         unsigned                flags,
171         const char              *pattern,
172         ObjectClass             *group_oc,
173         AttributeDescription    *group_ad,
174         struct slap_limits_set  *limit
175 )
176 {
177         int                     i;
178         struct slap_limits      *lm;
179         unsigned                type, style;
180         
181         assert( be );
182         assert( limit );
183
184         type = flags & SLAP_LIMITS_TYPE_MASK;
185         style = flags & SLAP_LIMITS_MASK;
186
187         switch ( style ) {
188         case SLAP_LIMITS_ANONYMOUS:
189         case SLAP_LIMITS_USERS:
190         case SLAP_LIMITS_ANY:
191                 for ( i = 0; be->be_limits && be->be_limits[ i ]; i++ ) {
192                         if ( be->be_limits[ i ]->lm_flags == style ) {
193                                 return( -1 );
194                         }
195                 }
196                 break;
197         }
198
199
200         lm = ( struct slap_limits * )ch_calloc( sizeof( struct slap_limits ), 1 );
201
202         switch ( style ) {
203         case SLAP_LIMITS_UNDEFINED:
204                 style = SLAP_LIMITS_EXACT;
205                 /* continue to next cases */
206         case SLAP_LIMITS_EXACT:
207         case SLAP_LIMITS_ONE:
208         case SLAP_LIMITS_SUBTREE:
209         case SLAP_LIMITS_CHILDREN:
210                 lm->lm_flags = style | type;
211                 {
212                         int rc;
213                         struct berval bv;
214                         bv.bv_val = (char *) pattern;
215                         bv.bv_len = strlen( pattern );
216
217                         rc = dnNormalize( 0, NULL, NULL, &bv, &lm->lm_pat, NULL );
218                         if ( rc != LDAP_SUCCESS ) {
219                                 ch_free( lm );
220                                 return( -1 );
221                         }
222                 }
223                 break;
224                 
225         case SLAP_LIMITS_REGEX:
226                 lm->lm_flags = style | type;
227                 ber_str2bv( pattern, 0, 1, &lm->lm_pat );
228                 if ( regcomp( &lm->lm_regex, lm->lm_pat.bv_val, 
229                                         REG_EXTENDED | REG_ICASE ) ) {
230                         free( lm->lm_pat.bv_val );
231                         ch_free( lm );
232                         return( -1 );
233                 }
234                 break;
235
236         case SLAP_LIMITS_ANONYMOUS:
237         case SLAP_LIMITS_USERS:
238         case SLAP_LIMITS_ANY:
239                 lm->lm_flags = style | type;
240                 lm->lm_pat.bv_val = NULL;
241                 lm->lm_pat.bv_len = 0;
242                 break;
243         }
244
245         switch ( type ) {
246         case SLAP_LIMITS_TYPE_GROUP:
247                 assert( group_oc );
248                 assert( group_ad );
249                 lm->lm_group_oc = group_oc;
250                 lm->lm_group_ad = group_ad;
251                 break;
252         }
253
254         lm->lm_limits = *limit;
255
256         i = 0;
257         if ( be->be_limits != NULL ) {
258                 for ( ; be->be_limits[i]; i++ );
259         }
260
261         be->be_limits = ( struct slap_limits ** )ch_realloc( be->be_limits,
262                         sizeof( struct slap_limits * ) * ( i + 2 ) );
263         be->be_limits[i] = lm;
264         be->be_limits[i+1] = NULL;
265         
266         return( 0 );
267 }
268
269 int
270 limits_parse(
271         Backend     *be,
272         const char  *fname,
273         int         lineno,
274         int         argc,
275         char        **argv
276 )
277 {
278         int                     flags = SLAP_LIMITS_UNDEFINED;
279         char                    *pattern;
280         struct slap_limits_set  limit;
281         int                     i, rc = 0;
282         ObjectClass             *group_oc = NULL;
283         AttributeDescription    *group_ad = NULL;
284
285         assert( be );
286
287         if ( argc < 3 ) {
288 #ifdef NEW_LOGGING
289                 LDAP_LOG( CONFIG, CRIT, 
290                         "%s : line %d: missing arg(s) in "
291                         "\"limits <pattern> <limits>\" line.\n", fname, lineno, 0 );
292 #else
293                 Debug( LDAP_DEBUG_ANY,
294                         "%s : line %d: missing arg(s) in "
295                         "\"limits <pattern> <limits>\" line.\n%s",
296                         fname, lineno, "" );
297 #endif
298                 return( -1 );
299         }
300
301         limit = be->be_def_limit;
302
303         /*
304          * syntax:
305          *
306          * "limits" <pattern> <limit> [ ... ]
307          * 
308          * 
309          * <pattern>:
310          * 
311          * "anonymous"
312          * "users"
313          * [ "dn" [ "." { "exact" | "base" | "onelevel" | "subtree" | children"
314          *      | "regex" | "anonymous" } ] "=" ] <dn pattern>
315          *
316          * Note:
317          *      "exact" and "base" are the same (exact match);
318          *      "onelevel" means exactly one rdn below, NOT including pattern
319          *      "subtree" means any rdn below, including pattern
320          *      "children" means any rdn below, NOT including pattern
321          *      
322          *      "anonymous" may be deprecated in favour 
323          *      of the pattern = "anonymous" form
324          *
325          * "group[/objectClass[/attributeType]]" "=" "<dn pattern>"
326          *
327          * <limit>:
328          *
329          * "time" [ "." { "soft" | "hard" } ] "=" <integer>
330          *
331          * "size" [ "." { "soft" | "hard" | "unchecked" } ] "=" <integer>
332          */
333         
334         pattern = argv[1];
335         if ( strcmp( pattern, "*" ) == 0) {
336                 flags = SLAP_LIMITS_ANY;
337
338         } else if ( strcasecmp( pattern, "anonymous" ) == 0 ) {
339                 flags = SLAP_LIMITS_ANONYMOUS;
340
341         } else if ( strcasecmp( pattern, "users" ) == 0 ) {
342                 flags = SLAP_LIMITS_USERS;
343                 
344         } else if ( strncasecmp( pattern, "dn", STRLENOF( "dn" ) ) == 0 ) {
345                 pattern += STRLENOF( "dn" );
346                 if ( pattern[0] == '.' ) {
347                         pattern++;
348                         if ( strncasecmp( pattern, "exact", STRLENOF( "exact" )) == 0 ) {
349                                 flags = SLAP_LIMITS_EXACT;
350                                 pattern += STRLENOF( "exact" );
351
352                         } else if ( strncasecmp( pattern, "base", STRLENOF( "base" ) ) == 0 ) {
353                                 flags = SLAP_LIMITS_BASE;
354                                 pattern += STRLENOF( "base" );
355
356                         } else if ( strncasecmp( pattern, "one", STRLENOF( "one" ) ) == 0 ) {
357                                 flags = SLAP_LIMITS_ONE;
358                                 pattern += STRLENOF( "one" );
359                                 if ( strncasecmp( pattern, "level", STRLENOF( "level" ) ) == 0 ) {
360                                         pattern += STRLENOF( "level" );
361
362                                 } else {
363 #ifdef NEW_LOGGING
364                                         LDAP_LOG( CONFIG, WARNING , 
365                                                 "%s : line %d: deprecated \"one\" style "
366                                                 "\"limits <pattern> <limits>\" line; "
367                                                 "use \"onelevel\" instead.\n", fname, lineno, 0 );
368 #else
369                                         Debug( LDAP_DEBUG_ANY,
370                                                 "%s : line %d: deprecated \"one\" style "
371                                                 "\"limits <pattern> <limits>\" line; "
372                                                 "use \"onelevel\" instead.\n", fname, lineno, 0 );
373 #endif
374                                 }
375
376                         } else if ( strncasecmp( pattern, "sub", STRLENOF( "sub" ) ) == 0 ) {
377                                 flags = SLAP_LIMITS_SUBTREE;
378                                 pattern += STRLENOF( "sub" );
379                                 if ( strncasecmp( pattern, "tree", STRLENOF( "tree" ) ) == 0 ) {
380                                         pattern += STRLENOF( "tree" );
381
382                                 } else {
383 #ifdef NEW_LOGGING
384                                         LDAP_LOG( CONFIG, WARNING , 
385                                                 "%s : line %d: deprecated \"sub\" style "
386                                                 "\"limits <pattern> <limits>\" line; "
387                                                 "use \"subtree\" instead.\n", fname, lineno, 0 );
388 #else
389                                         Debug( LDAP_DEBUG_ANY,
390                                                 "%s : line %d: deprecated \"sub\" style "
391                                                 "\"limits <pattern> <limits>\" line; "
392                                                 "use \"subtree\" instead.\n", fname, lineno, 0 );
393 #endif
394                                 }
395
396                         } else if ( strncasecmp( pattern, "children", STRLENOF( "children" ) ) == 0 ) {
397                                 flags = SLAP_LIMITS_CHILDREN;
398                                 pattern += STRLENOF( "children" );
399
400                         } else if ( strncasecmp( pattern, "regex", STRLENOF( "regex" ) ) == 0 ) {
401                                 flags = SLAP_LIMITS_REGEX;
402                                 pattern += STRLENOF( "regex" );
403
404                         /* 
405                          * this could be deprecated in favour
406                          * of the pattern = "anonymous" form
407                          */
408                         } else if ( strncasecmp( pattern, "anonymous", STRLENOF( "anonymous" ) ) == 0 ) {
409                                 flags = SLAP_LIMITS_ANONYMOUS;
410                                 pattern = NULL;
411                         }
412                 }
413
414                 /* pre-check the data */
415                 switch ( flags ) {
416                 case SLAP_LIMITS_ANONYMOUS:
417                 case SLAP_LIMITS_USERS:
418
419                         /* no need for pattern */
420                         pattern = NULL;
421                         break;
422
423                 default:
424                         if ( pattern[0] != '=' ) {
425 #ifdef NEW_LOGGING
426                                 LDAP_LOG( CONFIG, CRIT, 
427                                         "%s : line %d: missing '=' in "
428                                         "\"dn[.{exact|base|onelevel|subtree"
429                                         "|children|regex|anonymous}]" "=<pattern>\" in "
430                                         "\"limits <pattern> <limits>\" line.\n", fname, lineno, 0 );
431 #else
432                                 Debug( LDAP_DEBUG_ANY,
433                                         "%s : line %d: missing '=' in "
434                                         "\"dn[.{exact|base|onelevel|subtree"
435                                         "|children|regex|anonymous}]"
436                                         "=<pattern>\" in "
437                                         "\"limits <pattern> <limits>\" "
438                                         "line.\n%s",
439                                         fname, lineno, "" );
440 #endif
441                                 return( -1 );
442                         }
443
444                         /* skip '=' (required) */
445                         pattern++;
446
447                         /* trim obvious cases */
448                         if ( strcmp( pattern, "*" ) == 0 ) {
449                                 flags = SLAP_LIMITS_ANY;
450                                 pattern = NULL;
451
452                         } else if ( flags == SLAP_LIMITS_REGEX
453                                         && strcmp( pattern, ".*" ) == 0 ) {
454                                 flags = SLAP_LIMITS_ANY;
455                                 pattern = NULL;
456                         }
457                 }
458
459         } else if (strncasecmp( pattern, "group", STRLENOF( "group" ) ) == 0 ) {
460                 pattern += STRLENOF( "group" );
461
462                 if ( pattern[0] == '/' ) {
463                         struct berval   oc, ad;
464
465                         oc.bv_val = pattern + 1;
466
467                         ad.bv_val = strchr(pattern, '/');
468                         if ( ad.bv_val != NULL ) {
469                                 const char      *text = NULL;
470                                 int             rc;
471
472                                 oc.bv_len = ad.bv_val - oc.bv_val;
473
474                                 ad.bv_val++;
475                                 ad.bv_len = strlen( ad.bv_val );
476                                 rc = slap_bv2ad( &ad, &group_ad, &text );
477                                 if ( rc != LDAP_SUCCESS ) {
478                                         goto no_ad;
479                                 }
480
481                                 pattern = ad.bv_val + ad.bv_len;
482
483                         } else {
484                                 oc.bv_len = strlen( oc.bv_val );
485
486                                 pattern = oc.bv_val + oc.bv_len;
487                         }
488
489                         group_oc = oc_bvfind( &oc );
490                         if ( group_oc == NULL ) {
491                                 goto no_oc;
492                         }
493                 }
494
495                 if ( group_oc == NULL ) {
496                         group_oc = oc_find( SLAPD_GROUP_CLASS );
497                         if ( group_oc == NULL ) {
498 no_oc:;
499                                 return( -1 );
500                         }
501                 }
502
503                 if ( group_ad == NULL ) {
504                         const char      *text = NULL;
505                         int             rc;
506                         
507                         rc = slap_str2ad( SLAPD_GROUP_ATTR, &group_ad, &text );
508
509                         if ( rc != LDAP_SUCCESS ) {
510 no_ad:;
511                                 return( -1 );
512                         }
513                 }
514
515                 flags = SLAP_LIMITS_TYPE_GROUP | SLAP_LIMITS_EXACT;
516
517                 if ( pattern[0] != '=' ) {
518 #ifdef NEW_LOGGING
519                         LDAP_LOG( CONFIG, CRIT, 
520                                 "%s : line %d: missing '=' in "
521                                 "\"group[/objectClass[/attributeType]]"
522                                 "=<pattern>\" in "
523                                 "\"limits <pattern> <limits>\" line.\n",
524                                 fname, lineno, 0 );
525 #else
526                         Debug( LDAP_DEBUG_ANY,
527                                 "%s : line %d: missing '=' in "
528                                 "\"group[/objectClass[/attributeType]]"
529                                 "=<pattern>\" in "
530                                 "\"limits <pattern> <limits>\" line.\n",
531                                 fname, lineno, 0 );
532 #endif
533                         return( -1 );
534                 }
535
536                 /* skip '=' (required) */
537                 pattern++;
538         }
539
540         /* get the limits */
541         for ( i = 2; i < argc; i++ ) {
542                 if ( limits_parse_one( argv[i], &limit ) ) {
543
544 #ifdef NEW_LOGGING
545                         LDAP_LOG( CONFIG, CRIT, 
546                                 "%s : line %d: unknown limit values \"%s\" in "
547                                 "\"limits <pattern> <limits>\" line.\n",
548                                 fname, lineno, argv[i] );
549 #else
550                         Debug( LDAP_DEBUG_ANY,
551                                 "%s : line %d: unknown limit values \"%s\" in "
552                                 "\"limits <pattern> <limits>\" line.\n",
553                         fname, lineno, argv[i] );
554 #endif
555
556                         return( 1 );
557                 }
558         }
559
560         /*
561          * sanity checks ...
562          */
563         if ( limit.lms_t_hard > 0 && 
564                         ( limit.lms_t_hard < limit.lms_t_soft 
565                           || limit.lms_t_soft == -1 ) ) {
566                 limit.lms_t_hard = limit.lms_t_soft;
567         }
568         
569         if ( limit.lms_s_hard > 0 && 
570                         ( limit.lms_s_hard < limit.lms_s_soft 
571                           || limit.lms_s_soft == -1 ) ) {
572                 limit.lms_s_hard = limit.lms_s_soft;
573         }
574
575         /*
576          * defaults ...
577          */
578         if ( limit.lms_t_hard == 0 ) {
579                 limit.lms_t_hard = limit.lms_t_soft;
580         }
581
582         if ( limit.lms_s_hard == 0 ) {
583                 limit.lms_s_hard = limit.lms_s_soft;
584         }
585
586         if ( limit.lms_s_pr_total == 0 ) {
587                 limit.lms_s_pr_total = limit.lms_s_hard;
588         }
589
590         rc = limits_add( be, flags, pattern, group_oc, group_ad, &limit );
591         if ( rc ) {
592
593 #ifdef NEW_LOGGING
594                 LDAP_LOG( CONFIG, CRIT, 
595                         "%s : line %d: unable to add limit in "
596                         "\"limits <pattern> <limits>\" line.\n",
597                         fname, lineno, 0 );
598 #else
599                 Debug( LDAP_DEBUG_ANY,
600                         "%s : line %d: unable to add limit in "
601                         "\"limits <pattern> <limits>\" line.\n",
602                 fname, lineno, 0 );
603 #endif
604         }
605
606         return( rc );
607 }
608
609 int
610 limits_parse_one(
611         const char              *arg,
612         struct slap_limits_set  *limit
613 )
614 {
615         assert( arg );
616         assert( limit );
617
618         if ( strncasecmp( arg, "time", STRLENOF( "time" ) ) == 0 ) {
619                 arg += STRLENOF( "time" );
620
621                 if ( arg[0] == '.' ) {
622                         arg++;
623                         if ( strncasecmp( arg, "soft=", STRLENOF( "soft=" ) ) == 0 ) {
624                                 arg += STRLENOF( "soft=" );
625                                 if ( strcasecmp( arg, "none" ) == 0 ) {
626                                         limit->lms_t_soft = -1;
627
628                                 } else {
629                                         char    *next = NULL;
630                                         int     soft = strtol( arg, &next, 10 );
631
632                                         if ( next == arg || next[ 0 ] != '\0' ) {
633                                                 return( 1 );
634                                         }
635
636                                         if ( soft < -1 ) {
637                                                 return( 1 );
638                                         }
639
640                                         if ( soft == -1 ) {
641                                                 /* FIXME: use "none" instead */
642                                         }
643
644                                         limit->lms_t_soft = soft;
645                                 }
646                                 
647                         } else if ( strncasecmp( arg, "hard=", STRLENOF( "hard=" ) ) == 0 ) {
648                                 arg += STRLENOF( "hard=" );
649                                 if ( strcasecmp( arg, "soft" ) == 0 ) {
650                                         limit->lms_t_hard = 0;
651
652                                 } else if ( strcasecmp( arg, "none" ) == 0 ) {
653                                         limit->lms_t_hard = -1;
654
655                                 } else {
656                                         char    *next = NULL;
657                                         int     hard = strtol( arg, &next, 10 );
658
659                                         if ( next == arg || next[ 0 ] != '\0' ) {
660                                                 return( 1 );
661                                         }
662
663                                         if ( hard < -1 ) {
664                                                 return( 1 );
665                                         }
666
667                                         if ( hard == -1 ) {
668                                                 /* FIXME: use "none" instead */
669                                         }
670
671                                         if ( hard == 0 ) {
672                                                 /* FIXME: use "soft" instead */
673                                         }
674
675                                         limit->lms_t_hard = hard;
676                                 }
677                                 
678                         } else {
679                                 return( 1 );
680                         }
681                         
682                 } else if ( arg[0] == '=' ) {
683                         arg++;
684                         if ( strcasecmp( arg, "none" ) == 0 ) {
685                                 limit->lms_t_soft = -1;
686
687                         } else {
688                                 char    *next = NULL;
689
690                                 limit->lms_t_soft = strtol( arg, &next, 10 );
691                                 if ( next == arg || limit->lms_t_soft < -1 ) {
692                                         return( 1 );
693                                 }
694                         }
695                         limit->lms_t_hard = 0;
696                         
697                 } else {
698                         return( 1 );
699                 }
700
701         } else if ( strncasecmp( arg, "size", STRLENOF( "size" ) ) == 0 ) {
702                 arg += STRLENOF( "size" );
703                 
704                 if ( arg[0] == '.' ) {
705                         arg++;
706                         if ( strncasecmp( arg, "soft=", STRLENOF( "soft=" ) ) == 0 ) {
707                                 arg += STRLENOF( "soft=" );
708                                 if ( strcasecmp( arg, "none" ) == 0 ) {
709                                         limit->lms_s_soft = -1;
710
711                                 } else {
712                                         char    *next = NULL;
713                                         int     soft = strtol( arg, &next, 10 );
714
715                                         if ( next == arg || next[ 0 ] != '\0' ) {
716                                                 return( 1 );
717                                         }
718
719                                         if ( soft < -1 ) {
720                                                 return( 1 );
721                                         }
722
723                                         if ( soft == -1 ) {
724                                                 /* FIXME: use "none" instead */
725                                         }
726
727                                         limit->lms_s_soft = soft;
728                                 }
729                                 
730                         } else if ( strncasecmp( arg, "hard=", STRLENOF( "hard=" ) ) == 0 ) {
731                                 arg += STRLENOF( "hard=" );
732                                 if ( strcasecmp( arg, "soft" ) == 0 ) {
733                                         limit->lms_s_hard = 0;
734
735                                 } else if ( strcasecmp( arg, "none" ) == 0 ) {
736                                         limit->lms_s_hard = -1;
737
738                                 } else {
739                                         char    *next = NULL;
740                                         int     hard = strtol( arg, &next, 10 );
741
742                                         if ( next == arg || next[ 0 ] != '\0' ) {
743                                                 return( 1 );
744                                         }
745
746                                         if ( hard < -1 ) {
747                                                 return( 1 );
748                                         }
749
750                                         if ( hard == -1 ) {
751                                                 /* FIXME: use "none" instead */
752                                         }
753
754                                         if ( hard == 0 ) {
755                                                 /* FIXME: use "soft" instead */
756                                         }
757
758                                         limit->lms_s_hard = hard;
759                                 }
760                                 
761                         } else if ( strncasecmp( arg, "unchecked=", STRLENOF( "unchecked=" ) ) == 0 ) {
762                                 arg += STRLENOF( "unchecked=" );
763                                 if ( strcasecmp( arg, "none" ) == 0 ) {
764                                         limit->lms_s_unchecked = -1;
765
766                                 } else if ( strcasecmp( arg, "disabled" ) == 0 ) {
767                                         limit->lms_s_unchecked = 0;
768
769                                 } else {
770                                         char    *next = NULL;
771                                         int     unchecked = strtol( arg, &next, 10 );
772
773                                         if ( next == arg || next[ 0 ] != '\0' ) {
774                                                 return( 1 );
775                                         }
776
777                                         if ( unchecked < -1 ) {
778                                                 return( 1 );
779                                         }
780
781                                         if ( unchecked == -1 ) {
782                                                 /*  FIXME: use "none" instead */
783                                         }
784
785                                         limit->lms_s_unchecked = unchecked;
786                                 }
787
788                         } else if ( strncasecmp( arg, "pr=", STRLENOF( "pr=" ) ) == 0 ) {
789                                 arg += STRLENOF( "pr=" );
790                                 if ( strcasecmp( arg, "noEstimate" ) == 0 ) {
791                                         limit->lms_s_pr_hide = 1;
792
793                                 } else if ( strcasecmp( arg, "none" ) == 0 ) {
794                                         limit->lms_s_pr = -1;
795
796                                 } else if ( strcasecmp( arg, "disabled" ) == 0 ) {
797                                         limit->lms_s_pr_total = -2;
798
799                                 } else {
800                                         char    *next = NULL;
801                                         int     pr = strtol( arg, &next, 10 );
802
803                                         if ( next == arg || next[ 0 ] != '\0' ) {
804                                                 return( 1 );
805                                         }
806
807                                         if ( pr < -1 ) {
808                                                 return( 1 );
809                                         }
810
811                                         if ( pr == -1 ) {
812                                                 /* FIXME: use "none" instead */
813                                         }
814
815                                         limit->lms_s_pr = pr;
816                                 }
817
818                         } else if ( strncasecmp( arg, "prtotal=", STRLENOF( "prtotal=" ) ) == 0 ) {
819                                 arg += STRLENOF( "prtotal=" );
820
821                                 if ( strcasecmp( arg, "none" ) == 0 ) {
822                                         limit->lms_s_pr_total = -1;
823
824                                 } else if ( strcasecmp( arg, "hard" ) == 0 ) {
825                                         limit->lms_s_pr_total = 0;
826
827                                 } else {
828                                         char    *next = NULL;
829                                         int     total;
830
831                                         total = strtol( arg, &next, 10 );
832                                         if ( next == arg || next[ 0 ] != '\0' ) {
833                                                 return( 1 );
834                                         }
835
836                                         if ( total < -1 ) {
837                                                 return( 1 );
838                                         }
839
840                                         if ( total == -1 ) {
841                                                 /* FIXME: use "none" instead */
842                                         }
843
844                                         if ( total == 0 ) {
845                                                 /* FIXME: use "pr=disable" instead */
846                                         }
847
848                                         limit->lms_s_pr_total = total;
849                                 }
850
851                         } else {
852                                 return( 1 );
853                         }
854                         
855                 } else if ( arg[0] == '=' ) {
856                         arg++;
857                         if ( strcasecmp( arg, "none" ) == 0 ) {
858                                 limit->lms_s_soft = -1;
859
860                         } else {
861                                 char    *next = NULL;
862
863                                 limit->lms_s_soft = strtol( arg, &next, 10 );
864                                 if ( next == arg || limit->lms_s_soft < -1 ) {
865                                         return( 1 );
866                                 }
867                         }
868                         limit->lms_s_hard = 0;
869                         
870                 } else {
871                         return( 1 );
872                 }
873         }
874
875         return 0;
876 }
877
878
879 int
880 limits_check( Operation *op, SlapReply *rs )
881 {
882         assert( op );
883         assert( rs );
884         /* FIXME: should this be always true? */
885         assert( op->o_tag == LDAP_REQ_SEARCH);
886         
887         /* allow root to set no limit */
888         if ( be_isroot( op ) ) {
889                 op->ors_limit = NULL;
890
891                 if ( op->ors_tlimit == 0 ) {
892                         op->ors_tlimit = -1;
893                 }
894
895                 if ( op->ors_slimit == 0 ) {
896                         op->ors_slimit = -1;
897                 }
898
899         /* if not root, get appropriate limits */
900         } else {
901                 ( void ) limits_get( op, &op->o_ndn, &op->ors_limit );
902
903                 assert( op->ors_limit != NULL );
904
905                 /* if no limit is required, use soft limit */
906                 if ( op->ors_tlimit <= 0 ) {
907                         op->ors_tlimit = op->ors_limit->lms_t_soft;
908
909                 } else {
910                         /* no hard limit means use soft instead */
911                         if ( op->ors_limit->lms_t_hard == 0 ) {
912                                 if ( op->ors_limit->lms_t_soft > -1
913                                                 && op->ors_tlimit > op->ors_limit->lms_t_soft ) {
914                                         op->ors_tlimit = op->ors_limit->lms_t_soft;
915                                 }
916
917                         /* -1 means no hard limit */
918                         } else if ( op->ors_limit->lms_t_hard == -1 ) {
919                                 op->ors_tlimit = -1;
920                 
921                         /* error if exceeding hard limit */     
922                         } else if ( op->ors_tlimit > op->ors_limit->lms_t_hard ) {
923                                 rs->sr_err = LDAP_ADMINLIMIT_EXCEEDED;
924                                 send_ldap_result( op, rs );
925                                 rs->sr_err = LDAP_SUCCESS;
926                                 return -1;
927                         }
928                 }
929
930                 /* don't even get to backend if candidate check is disabled */
931                 if ( op->ors_limit->lms_s_unchecked == 0 ) {
932                         rs->sr_err = LDAP_ADMINLIMIT_EXCEEDED;
933                         send_ldap_result( op, rs );
934                         rs->sr_err = LDAP_SUCCESS;
935                         return -1;
936                 }
937
938                 /* if paged results is requested */     
939                 if ( get_pagedresults( op ) ) {
940                         int     slimit = -2;
941
942                         /* paged results is not allowed */
943                         if ( op->ors_limit->lms_s_pr_total == -2 ) {
944                                 rs->sr_err = LDAP_ADMINLIMIT_EXCEEDED;
945                                 rs->sr_text = "pagedResults control not allowed";
946                                 send_ldap_result( op, rs );
947                                 rs->sr_err = LDAP_SUCCESS;
948                                 rs->sr_text = NULL;
949                                 return -1;
950
951                         } else if ( op->ors_limit->lms_s_pr_total == -1 ) {
952                                 slimit = -1;
953         
954                         } else {
955                                 /* if no limit is required, use soft limit */
956                                 int     total;
957                                 int     slimit2 = -1;
958
959                                 /* first round of pagedResults: set count to any appropriate limit */
960
961                                 /* if the limit is set, check that it does not violate any limit */
962                                 if ( op->ors_slimit > 0 ) {
963                                         slimit2 = op->ors_slimit;
964                                         if ( op->ors_slimit > op->ors_limit->lms_s_pr_total ) {
965                                                 rs->sr_err = LDAP_ADMINLIMIT_EXCEEDED;
966                                                 send_ldap_result( op, rs );
967                                                 rs->sr_err = LDAP_SUCCESS;
968                                                 return -1;
969                                         }
970
971                                 } else {
972                                         slimit2 = op->ors_limit->lms_s_pr_total;
973                                 }
974
975                                 total = slimit2 - op->o_pagedresults_state.ps_count;
976
977                                 if ( total >= 0 && op->ors_limit->lms_s_pr > 0 ) {
978                                         /* use the smallest limit set by total/per page */
979                                         if ( total < op->ors_limit->lms_s_pr ) {
980                                                 slimit = total;
981
982                                         } else {
983                                                 /* use the perpage limit if any 
984                                                  * NOTE: + 1 because the given value must be legal */
985                                                 slimit = op->ors_limit->lms_s_pr + 1;
986                                         }
987
988                                 } else if ( total >= 0 ) {
989                                         /* use the total limit if any */
990                                         slimit = total;
991
992                                 } else if ( op->ors_limit->lms_s_pr != 0 ) {
993                                         /* use the perpage limit if any 
994                                          * NOTE: + 1 because the given value must be legal */
995                                         slimit = op->ors_limit->lms_s_pr + 1;
996
997                                 } else {
998                                         /* use the standard hard/soft limit if any */
999                                         slimit = op->ors_limit->lms_s_hard;
1000                                 }
1001                         }
1002                 
1003                         /* if got any limit, use it */
1004                         if ( slimit != -2 ) {
1005                                 if ( op->ors_slimit <= 0 ) {
1006                                         op->ors_slimit = slimit;
1007
1008                                 } else if ( op->ors_slimit - op->o_pagedresults_state.ps_count > slimit ) {
1009                                         rs->sr_err = LDAP_ADMINLIMIT_EXCEEDED;
1010                                         send_ldap_result( op, rs );
1011                                         rs->sr_err = LDAP_SUCCESS;
1012                                         return -1;
1013
1014                                 } else {
1015                                         op->ors_slimit = slimit;
1016                                 }
1017
1018                         } else {
1019                                 /* use the standard hard/soft limit if any */
1020                                 op->ors_slimit = op->ors_limit->lms_s_hard;
1021                         }
1022
1023                 } else if ( op->ors_slimit == 0 ) {
1024                         op->ors_slimit = op->ors_limit->lms_s_soft;
1025
1026                 } else {
1027                         /* no hard limit means use soft instead */
1028                         if ( op->ors_limit->lms_s_hard == 0 ) {
1029                                 if ( op->ors_limit->lms_s_soft > -1
1030                                                 && op->ors_slimit > op->ors_limit->lms_s_soft ) {
1031                                         op->ors_slimit = op->ors_limit->lms_s_soft;
1032                                 }
1033
1034                         /* -1 means no hard limit */
1035                         } else if ( op->ors_limit->lms_s_hard == -1 ) {
1036                                 op->ors_slimit = -1;
1037                                         
1038                         /* error if exceeding hard limit */     
1039                         } else if ( op->ors_slimit > op->ors_limit->lms_s_hard ) {
1040                                 rs->sr_err = LDAP_ADMINLIMIT_EXCEEDED;
1041                                 send_ldap_result( op, rs );
1042                                 rs->sr_err = LDAP_SUCCESS;
1043                                 return -1;
1044                         }
1045                 }
1046         }
1047
1048         return 0;
1049 }
1050