]> git.sur5r.net Git - openldap/blob - servers/slapd/limits.c
Fix prev commit
[openldap] / servers / slapd / limits.c
1 /* limits.c - routines to handle regex-based size and time limits */
2 /* $OpenLDAP$ */
3 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
4  *
5  * Copyright 1998-2004 The OpenLDAP Foundation.
6  * All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted only as authorized by the OpenLDAP
10  * Public License.
11  *
12  * A copy of this license is available in the file LICENSE in the
13  * top-level directory of the distribution or, alternatively, at
14  * <http://www.OpenLDAP.org/license.html>.
15  */
16
17 #include "portable.h"
18
19 #include <stdio.h>
20
21 #include <ac/regex.h>
22 #include <ac/string.h>
23
24 #include "slap.h"
25
26 int
27 limits_get( 
28         Operation               *op,
29         struct berval           *ndn, 
30         struct slap_limits_set  **limit
31 )
32 {
33         struct slap_limits **lm;
34
35         assert( op );
36         assert( limit );
37
38         /*
39          * default values
40          */
41         *limit = &op->o_bd->be_def_limit;
42
43         if ( op->o_bd->be_limits == NULL ) {
44                 return( 0 );
45         }
46
47         for ( lm = op->o_bd->be_limits; lm[0] != NULL; lm++ ) {
48                 unsigned        style = lm[0]->lm_flags & SLAP_LIMITS_MASK;
49                 unsigned        type = lm[0]->lm_flags & SLAP_LIMITS_TYPE_MASK;
50
51                 switch ( style ) {
52                 case SLAP_LIMITS_EXACT:
53                         if ( ndn->bv_len == 0 ) {
54                                 break;
55                         }
56
57                         if ( type == SLAP_LIMITS_TYPE_GROUP ) {
58                                 int     rc;
59
60                                 rc = backend_group( op, NULL,
61                                                 &lm[0]->lm_pat, ndn,
62                                                 lm[0]->lm_group_oc,
63                                                 lm[0]->lm_group_ad );
64                                 if ( rc == 0 ) {
65                                         *limit = &lm[0]->lm_limits;
66                                         return( 0 );
67                                 }
68                         }
69                         
70                         if ( dn_match( &lm[0]->lm_pat, ndn ) ) {
71                                 *limit = &lm[0]->lm_limits;
72                                 return( 0 );
73                         }
74                         break;
75
76                 case SLAP_LIMITS_ONE:
77                 case SLAP_LIMITS_SUBTREE:
78                 case SLAP_LIMITS_CHILDREN: {
79                         size_t d;
80                         
81                         if ( ndn->bv_len == 0 ) {
82                                 break;
83                         }
84
85                         /* ndn shorter than dn_pat */
86                         if ( ndn->bv_len < lm[0]->lm_pat.bv_len ) {
87                                 break;
88                         }
89                         d = ndn->bv_len - lm[0]->lm_pat.bv_len;
90
91                         /* allow exact match for SUBTREE only */
92                         if ( d == 0 ) {
93                                 if ( style != SLAP_LIMITS_SUBTREE ) {
94                                         break;
95                                 }
96                         } else {
97                                 /* check for unescaped rdn separator */
98                                 if ( !DN_SEPARATOR( ndn->bv_val[d-1] ) ) {
99                                         break;
100                                 }
101                         }
102
103                         /* in case of (sub)match ... */
104                         if ( lm[0]->lm_pat.bv_len == ( ndn->bv_len - d )
105                                         && strcmp( lm[0]->lm_pat.bv_val,
106                                                 &ndn->bv_val[d] ) == 0 )
107                         {
108                                 /* check for exactly one rdn in case of ONE */
109                                 if ( style == SLAP_LIMITS_ONE ) {
110                                         /*
111                                          * if ndn is more that one rdn
112                                          * below dn_pat, continue
113                                          */
114                                         if ( (size_t) dn_rdnlen( NULL, ndn )
115                                                         != d - 1 )
116                                         {
117                                                 break;
118                                         }
119                                 }
120
121                                 *limit = &lm[0]->lm_limits;
122                                 return( 0 );
123                         }
124
125                         break;
126                 }
127
128                 case SLAP_LIMITS_REGEX:
129                         if ( ndn->bv_len == 0 ) {
130                                 break;
131                         }
132                         if ( regexec( &lm[0]->lm_regex, ndn->bv_val,
133                                                 0, NULL, 0 ) == 0 )
134                         {
135                                 *limit = &lm[0]->lm_limits;
136                                 return( 0 );
137                         }
138                         break;
139
140                 case SLAP_LIMITS_ANONYMOUS:
141                         if ( ndn->bv_len == 0 ) {
142                                 *limit = &lm[0]->lm_limits;
143                                 return( 0 );
144                         }
145                         break;
146
147                 case SLAP_LIMITS_USERS:
148                         if ( ndn->bv_len != 0 ) {
149                                 *limit = &lm[0]->lm_limits;
150                                 return( 0 );
151                         }
152                         break;
153
154                 case SLAP_LIMITS_ANY:
155                         *limit = &lm[0]->lm_limits;
156                         return( 0 );
157
158                 default:
159                         assert( 0 );    /* unreachable */
160                         return( -1 );
161                 }
162         }
163
164         return( 0 );
165 }
166
167 static int
168 limits_add(
169         Backend                 *be,
170         unsigned                flags,
171         const char              *pattern,
172         ObjectClass             *group_oc,
173         AttributeDescription    *group_ad,
174         struct slap_limits_set  *limit
175 )
176 {
177         int                     i;
178         struct slap_limits      *lm;
179         unsigned                type, style;
180         
181         assert( be );
182         assert( limit );
183
184         type = flags & SLAP_LIMITS_TYPE_MASK;
185         style = flags & SLAP_LIMITS_MASK;
186
187         switch ( style ) {
188         case SLAP_LIMITS_ANONYMOUS:
189         case SLAP_LIMITS_USERS:
190         case SLAP_LIMITS_ANY:
191                 for ( i = 0; be->be_limits && be->be_limits[ i ]; i++ ) {
192                         if ( be->be_limits[ i ]->lm_flags == style ) {
193                                 return( -1 );
194                         }
195                 }
196                 break;
197         }
198
199
200         lm = ( struct slap_limits * )ch_calloc( sizeof( struct slap_limits ), 1 );
201
202         switch ( style ) {
203         case SLAP_LIMITS_UNDEFINED:
204                 style = SLAP_LIMITS_EXACT;
205                 /* continue to next cases */
206         case SLAP_LIMITS_EXACT:
207         case SLAP_LIMITS_ONE:
208         case SLAP_LIMITS_SUBTREE:
209         case SLAP_LIMITS_CHILDREN:
210                 lm->lm_flags = style | type;
211                 {
212                         int rc;
213                         struct berval bv;
214                         bv.bv_val = (char *) pattern;
215                         bv.bv_len = strlen( pattern );
216
217                         rc = dnNormalize( 0, NULL, NULL, &bv, &lm->lm_pat, NULL );
218                         if ( rc != LDAP_SUCCESS ) {
219                                 ch_free( lm );
220                                 return( -1 );
221                         }
222                 }
223                 break;
224                 
225         case SLAP_LIMITS_REGEX:
226                 lm->lm_flags = style | type;
227                 ber_str2bv( pattern, 0, 1, &lm->lm_pat );
228                 if ( regcomp( &lm->lm_regex, lm->lm_pat.bv_val, 
229                                         REG_EXTENDED | REG_ICASE ) ) {
230                         free( lm->lm_pat.bv_val );
231                         ch_free( lm );
232                         return( -1 );
233                 }
234                 break;
235
236         case SLAP_LIMITS_ANONYMOUS:
237         case SLAP_LIMITS_USERS:
238         case SLAP_LIMITS_ANY:
239                 lm->lm_flags = style | type;
240                 lm->lm_pat.bv_val = NULL;
241                 lm->lm_pat.bv_len = 0;
242                 break;
243         }
244
245         switch ( type ) {
246         case SLAP_LIMITS_TYPE_GROUP:
247                 assert( group_oc );
248                 assert( group_ad );
249                 lm->lm_group_oc = group_oc;
250                 lm->lm_group_ad = group_ad;
251                 break;
252         }
253
254         lm->lm_limits = *limit;
255
256         i = 0;
257         if ( be->be_limits != NULL ) {
258                 for ( ; be->be_limits[i]; i++ );
259         }
260
261         be->be_limits = ( struct slap_limits ** )ch_realloc( be->be_limits,
262                         sizeof( struct slap_limits * ) * ( i + 2 ) );
263         be->be_limits[i] = lm;
264         be->be_limits[i+1] = NULL;
265         
266         return( 0 );
267 }
268
269 int
270 limits_parse(
271         Backend     *be,
272         const char  *fname,
273         int         lineno,
274         int         argc,
275         char        **argv
276 )
277 {
278         int                     flags = SLAP_LIMITS_UNDEFINED;
279         char                    *pattern;
280         struct slap_limits_set  limit;
281         int                     i, rc = 0;
282         ObjectClass             *group_oc = NULL;
283         AttributeDescription    *group_ad = NULL;
284
285         assert( be );
286
287         if ( argc < 3 ) {
288 #ifdef NEW_LOGGING
289                 LDAP_LOG( CONFIG, CRIT, 
290                         "%s : line %d: missing arg(s) in "
291                         "\"limits <pattern> <limits>\" line.\n", fname, lineno, 0 );
292 #else
293                 Debug( LDAP_DEBUG_ANY,
294                         "%s : line %d: missing arg(s) in "
295                         "\"limits <pattern> <limits>\" line.\n%s",
296                         fname, lineno, "" );
297 #endif
298                 return( -1 );
299         }
300
301         limit = be->be_def_limit;
302
303         /*
304          * syntax:
305          *
306          * "limits" <pattern> <limit> [ ... ]
307          * 
308          * 
309          * <pattern>:
310          * 
311          * "anonymous"
312          * "users"
313          * [ "dn" [ "." { "exact" | "base" | "onelevel" | "subtree" | children"
314          *      | "regex" | "anonymous" } ] "=" ] <dn pattern>
315          *
316          * Note:
317          *      "exact" and "base" are the same (exact match);
318          *      "onelevel" means exactly one rdn below, NOT including pattern
319          *      "subtree" means any rdn below, including pattern
320          *      "children" means any rdn below, NOT including pattern
321          *      
322          *      "anonymous" may be deprecated in favour 
323          *      of the pattern = "anonymous" form
324          *
325          * "group[/objectClass[/attributeType]]" "=" "<dn pattern>"
326          *
327          * <limit>:
328          *
329          * "time" [ "." { "soft" | "hard" } ] "=" <integer>
330          *
331          * "size" [ "." { "soft" | "hard" | "unchecked" } ] "=" <integer>
332          */
333         
334         pattern = argv[1];
335         if ( strcmp( pattern, "*" ) == 0) {
336                 flags = SLAP_LIMITS_ANY;
337
338         } else if ( strcasecmp( pattern, "anonymous" ) == 0 ) {
339                 flags = SLAP_LIMITS_ANONYMOUS;
340
341         } else if ( strcasecmp( pattern, "users" ) == 0 ) {
342                 flags = SLAP_LIMITS_USERS;
343                 
344         } else if ( strncasecmp( pattern, "dn", sizeof( "dn" ) - 1 ) == 0 ) {
345                 pattern += sizeof( "dn" ) - 1;
346                 if ( pattern[0] == '.' ) {
347                         pattern++;
348                         if ( strncasecmp( pattern, "exact", sizeof( "exact" ) - 1 ) == 0 ) {
349                                 flags = SLAP_LIMITS_EXACT;
350                                 pattern += sizeof( "exact" ) - 1;
351
352                         } else if ( strncasecmp( pattern, "base", sizeof( "base" ) - 1 ) == 0 ) {
353                                 flags = SLAP_LIMITS_BASE;
354                                 pattern += sizeof( "base" ) - 1;
355
356                         } else if ( strncasecmp( pattern, "one", sizeof( "one" ) - 1 ) == 0 ) {
357                                 flags = SLAP_LIMITS_ONE;
358                                 pattern += sizeof( "one" ) - 1;
359                                 if ( strncasecmp( pattern, "level", sizeof( "level" ) - 1 ) == 0 ) {
360                                         pattern += sizeof( "level" ) - 1;
361
362                                 } else {
363 #ifdef NEW_LOGGING
364                                         LDAP_LOG( CONFIG, WARNING , 
365                                                 "%s : line %d: deprecated \"one\" style "
366                                                 "\"limits <pattern> <limits>\" line; "
367                                                 "use \"onelevel\" instead.\n", fname, lineno, 0 );
368 #else
369                                         Debug( LDAP_DEBUG_ANY,
370                                                 "%s : line %d: deprecated \"one\" style "
371                                                 "\"limits <pattern> <limits>\" line; "
372                                                 "use \"onelevel\" instead.\n", fname, lineno, 0 );
373 #endif
374                                 }
375
376                         } else if ( strncasecmp( pattern, "sub", sizeof( "sub" ) - 1 ) == 0 ) {
377                                 flags = SLAP_LIMITS_SUBTREE;
378                                 pattern += sizeof( "sub" ) - 1;
379                                 if ( strncasecmp( pattern, "tree", sizeof( "tree" ) - 1 ) == 0 ) {
380                                         pattern += sizeof( "tree" ) - 1;
381
382                                 } else {
383 #ifdef NEW_LOGGING
384                                         LDAP_LOG( CONFIG, WARNING , 
385                                                 "%s : line %d: deprecated \"sub\" style "
386                                                 "\"limits <pattern> <limits>\" line; "
387                                                 "use \"subtree\" instead.\n", fname, lineno, 0 );
388 #else
389                                         Debug( LDAP_DEBUG_ANY,
390                                                 "%s : line %d: deprecated \"sub\" style "
391                                                 "\"limits <pattern> <limits>\" line; "
392                                                 "use \"subtree\" instead.\n", fname, lineno, 0 );
393 #endif
394                                 }
395
396                         } else if ( strncasecmp( pattern, "children", sizeof( "children" ) - 1 ) == 0 ) {
397                                 flags = SLAP_LIMITS_CHILDREN;
398                                 pattern += sizeof( "children" ) - 1;
399
400                         } else if ( strncasecmp( pattern, "regex", sizeof( "regex" ) - 1 ) == 0 ) {
401                                 flags = SLAP_LIMITS_REGEX;
402                                 pattern += sizeof( "regex" ) - 1;
403
404                         /* 
405                          * this could be deprecated in favour
406                          * of the pattern = "anonymous" form
407                          */
408                         } else if ( strncasecmp( pattern, "anonymous", sizeof( "anonymous" ) - 1 ) == 0 ) {
409                                 flags = SLAP_LIMITS_ANONYMOUS;
410                                 pattern = NULL;
411                         }
412                 }
413
414                 /* pre-check the data */
415                 switch ( flags ) {
416                 case SLAP_LIMITS_ANONYMOUS:
417                 case SLAP_LIMITS_USERS:
418
419                         /* no need for pattern */
420                         pattern = NULL;
421                         break;
422
423                 default:
424                         if ( pattern[0] != '=' ) {
425 #ifdef NEW_LOGGING
426                                 LDAP_LOG( CONFIG, CRIT, 
427                                         "%s : line %d: missing '=' in "
428                                         "\"dn[.{exact|base|onelevel|subtree"
429                                         "|children|regex|anonymous}]" "=<pattern>\" in "
430                                         "\"limits <pattern> <limits>\" line.\n", fname, lineno, 0 );
431 #else
432                                 Debug( LDAP_DEBUG_ANY,
433                                         "%s : line %d: missing '=' in "
434                                         "\"dn[.{exact|base|onelevel|subtree"
435                                         "|children|regex|anonymous}]"
436                                         "=<pattern>\" in "
437                                         "\"limits <pattern> <limits>\" "
438                                         "line.\n%s",
439                                         fname, lineno, "" );
440 #endif
441                                 return( -1 );
442                         }
443
444                         /* skip '=' (required) */
445                         pattern++;
446
447                         /* trim obvious cases */
448                         if ( strcmp( pattern, "*" ) == 0 ) {
449                                 flags = SLAP_LIMITS_ANY;
450                                 pattern = NULL;
451
452                         } else if ( flags == SLAP_LIMITS_REGEX
453                                         && strcmp( pattern, ".*" ) == 0 ) {
454                                 flags = SLAP_LIMITS_ANY;
455                                 pattern = NULL;
456                         }
457                 }
458
459         } else if (strncasecmp( pattern, "group", sizeof( "group" ) - 1 ) == 0 ) {
460                 pattern += sizeof( "group" ) - 1;
461
462                 if ( pattern[0] == '/' ) {
463                         struct berval   oc, ad;
464
465                         oc.bv_val = pattern + 1;
466
467                         ad.bv_val = strchr(pattern, '/');
468                         if ( ad.bv_val != NULL ) {
469                                 const char      *text = NULL;
470                                 int             rc;
471
472                                 oc.bv_len = ad.bv_val - oc.bv_val;
473
474                                 ad.bv_val++;
475                                 ad.bv_len = strlen( ad.bv_val );
476                                 rc = slap_bv2ad( &ad, &group_ad, &text );
477                                 if ( rc != LDAP_SUCCESS ) {
478                                         goto no_ad;
479                                 }
480
481                                 pattern = ad.bv_val + ad.bv_len;
482
483                         } else {
484                                 oc.bv_len = strlen( oc.bv_val );
485
486                                 pattern = oc.bv_val + oc.bv_len;
487                         }
488
489                         group_oc = oc_bvfind( &oc );
490                         if ( group_oc == NULL ) {
491                                 goto no_oc;
492                         }
493                 }
494
495                 if ( group_oc == NULL ) {
496                         group_oc = oc_find( SLAPD_GROUP_CLASS );
497                         if ( group_oc == NULL ) {
498 no_oc:;
499                                 return( -1 );
500                         }
501                 }
502
503                 if ( group_ad == NULL ) {
504                         const char      *text = NULL;
505                         int             rc;
506                         
507                         rc = slap_str2ad( SLAPD_GROUP_ATTR, &group_ad, &text );
508
509                         if ( rc != LDAP_SUCCESS ) {
510 no_ad:;
511                                 return( -1 );
512                         }
513                 }
514
515                 flags = SLAP_LIMITS_TYPE_GROUP | SLAP_LIMITS_EXACT;
516
517                 if ( pattern[0] != '=' ) {
518 #ifdef NEW_LOGGING
519                         LDAP_LOG( CONFIG, CRIT, 
520                                 "%s : line %d: missing '=' in "
521                                 "\"group[/objectClass[/attributeType]]"
522                                 "=<pattern>\" in "
523                                 "\"limits <pattern> <limits>\" line.\n",
524                                 fname, lineno, 0 );
525 #else
526                         Debug( LDAP_DEBUG_ANY,
527                                 "%s : line %d: missing '=' in "
528                                 "\"group[/objectClass[/attributeType]]"
529                                 "=<pattern>\" in "
530                                 "\"limits <pattern> <limits>\" line.\n",
531                                 fname, lineno, 0 );
532 #endif
533                         return( -1 );
534                 }
535
536                 /* skip '=' (required) */
537                 pattern++;
538         }
539
540         /* get the limits */
541         for ( i = 2; i < argc; i++ ) {
542                 if ( limits_parse_one( argv[i], &limit ) ) {
543
544 #ifdef NEW_LOGGING
545                         LDAP_LOG( CONFIG, CRIT, 
546                                 "%s : line %d: unknown limit values \"%s\" in "
547                                 "\"limits <pattern> <limits>\" line.\n",
548                                 fname, lineno, argv[i] );
549 #else
550                         Debug( LDAP_DEBUG_ANY,
551                                 "%s : line %d: unknown limit values \"%s\" in "
552                                 "\"limits <pattern> <limits>\" line.\n",
553                         fname, lineno, argv[i] );
554 #endif
555
556                         return( 1 );
557                 }
558         }
559
560         /*
561          * sanity checks ...
562          */
563         if ( limit.lms_t_hard > 0 && 
564                         ( limit.lms_t_hard < limit.lms_t_soft 
565                           || limit.lms_t_soft == -1 ) ) {
566                 limit.lms_t_hard = limit.lms_t_soft;
567         }
568         
569         if ( limit.lms_s_hard > 0 && 
570                         ( limit.lms_s_hard < limit.lms_s_soft 
571                           || limit.lms_s_soft == -1 ) ) {
572                 limit.lms_s_hard = limit.lms_s_soft;
573         }
574         
575         rc = limits_add( be, flags, pattern, group_oc, group_ad, &limit );
576         if ( rc ) {
577
578 #ifdef NEW_LOGGING
579                 LDAP_LOG( CONFIG, CRIT, 
580                         "%s : line %d: unable to add limit in "
581                         "\"limits <pattern> <limits>\" line.\n",
582                         fname, lineno, 0 );
583 #else
584                 Debug( LDAP_DEBUG_ANY,
585                         "%s : line %d: unable to add limit in "
586                         "\"limits <pattern> <limits>\" line.\n",
587                 fname, lineno, 0 );
588 #endif
589         }
590
591         return( rc );
592 }
593
594 int
595 limits_parse_one(
596         const char              *arg,
597         struct slap_limits_set  *limit
598 )
599 {
600         assert( arg );
601         assert( limit );
602
603         if ( strncasecmp( arg, "time", sizeof( "time" ) - 1 ) == 0 ) {
604                 arg += 4;
605
606                 if ( arg[0] == '.' ) {
607                         arg++;
608                         if ( strncasecmp( arg, "soft", sizeof( "soft" ) - 1 ) == 0 ) {
609                                 arg += 4;
610                                 if ( arg[0] != '=' ) {
611                                         return( 1 );
612                                 }
613                                 arg++;
614                                 if ( strcasecmp( arg, "none" ) == 0 ) {
615                                         limit->lms_t_soft = -1;
616                                 } else {
617                                         char    *next = NULL;
618
619                                         limit->lms_t_soft = 
620                                                 strtol( arg, &next, 10 );
621                                         if ( next == arg || limit->lms_t_soft < -1 ) {
622                                                 return( 1 );
623                                         }
624                                 }
625                                 
626                         } else if ( strncasecmp( arg, "hard", sizeof( "hard" ) - 1 ) == 0 ) {
627                                 arg += 4;
628                                 if ( arg[0] != '=' ) {
629                                         return( 1 );
630                                 }
631                                 arg++;
632                                 if ( strcasecmp( arg, "soft" ) == 0 ) {
633                                         limit->lms_t_hard = 0;
634                                 } else if ( strcasecmp( arg, "none" ) == 0 ) {
635                                         limit->lms_t_hard = -1;
636                                 } else {
637                                         char    *next = NULL;
638
639                                         limit->lms_t_hard = 
640                                                 strtol( arg, &next, 10 );
641                                         if ( next == arg || limit->lms_t_hard < -1 ) {
642                                                 return( 1 );
643                                         }
644                                 }
645                                 
646                         } else {
647                                 return( 1 );
648                         }
649                         
650                 } else if ( arg[0] == '=' ) {
651                         arg++;
652                         if ( strcasecmp( arg, "none" ) == 0 ) {
653                                 limit->lms_t_soft = -1;
654                         } else {
655                                 char    *next = NULL;
656
657                                 limit->lms_t_soft = strtol( arg, &next, 10 );
658                                 if ( next == arg || limit->lms_t_soft < -1 ) {
659                                         return( 1 );
660                                 }
661                         }
662                         limit->lms_t_hard = 0;
663                         
664                 } else {
665                         return( 1 );
666                 }
667
668         } else if ( strncasecmp( arg, "size", sizeof( "size" ) - 1 ) == 0 ) {
669                 arg += 4;
670                 
671                 if ( arg[0] == '.' ) {
672                         arg++;
673                         if ( strncasecmp( arg, "soft", sizeof( "soft" ) - 1 ) == 0 ) {
674                                 arg += 4;
675                                 if ( arg[0] != '=' ) {
676                                         return( 1 );
677                                 }
678                                 arg++;
679                                 if ( strcasecmp( arg, "none" ) == 0 ) {
680                                         limit->lms_s_soft = -1;
681                                 } else {
682                                         char    *next = NULL;
683
684                                         limit->lms_s_soft = 
685                                                 strtol( arg, &next, 10 );
686                                         if ( next == arg || limit->lms_s_soft < -1 ) {
687                                                 return( 1 );
688                                         }
689                                 }
690                                 
691                         } else if ( strncasecmp( arg, "hard", sizeof( "hard" ) - 1 ) == 0 ) {
692                                 arg += 4;
693                                 if ( arg[0] != '=' ) {
694                                         return( 1 );
695                                 }
696                                 arg++;
697                                 if ( strcasecmp( arg, "soft" ) == 0 ) {
698                                         limit->lms_s_hard = 0;
699                                 } else if ( strcasecmp( arg, "none" ) == 0 ) {
700                                         limit->lms_s_hard = -1;
701                                 } else {
702                                         char    *next = NULL;
703
704                                         limit->lms_s_hard = 
705                                                 strtol( arg, &next, 10 );
706                                         if ( next == arg || limit->lms_s_hard < -1 ) {
707                                                 return( 1 );
708                                         }
709                                 }
710                                 
711                         } else if ( strncasecmp( arg, "unchecked", sizeof( "unchecked" ) - 1 ) == 0 ) {
712                                 arg += 9;
713                                 if ( arg[0] != '=' ) {
714                                         return( 1 );
715                                 }
716                                 arg++;
717                                 if ( strcasecmp( arg, "none" ) == 0 ) {
718                                         limit->lms_s_unchecked = -1;
719                                 } else {
720                                         char    *next = NULL;
721
722                                         limit->lms_s_unchecked = 
723                                                 strtol( arg, &next, 10 );
724                                         if ( next == arg || limit->lms_s_unchecked < -1 ) {
725                                                 return( 1 );
726                                         }
727                                 }
728
729                         } else if ( strncasecmp( arg, "pr", sizeof( "pr" ) - 1 ) == 0 ) {
730                                 arg += sizeof( "pr" ) - 1;
731                                 if ( arg[0] != '=' ) {
732                                         return( 1 );
733                                 }
734                                 arg++;
735                                 if ( strcasecmp( arg, "noEstimate" ) == 0 ) {
736                                         limit->lms_s_pr_hide = 1;
737                                 } else {
738                                         char    *next = NULL;
739
740                                         limit->lms_s_pr = 
741                                                 strtol( arg, &next, 10 );
742                                         if ( next == arg || limit->lms_s_pr < -1 ) {
743                                                 return( 1 );
744                                         }
745                                 }
746                                 
747                         } else {
748                                 return( 1 );
749                         }
750                         
751                 } else if ( arg[0] == '=' ) {
752                         arg++;
753                         if ( strcasecmp( arg, "none" ) == 0 ) {
754                                 limit->lms_s_soft = -1;
755                         } else {
756                                 char    *next = NULL;
757
758                                 limit->lms_s_soft = strtol( arg, &next, 10 );
759                                 if ( next == arg || limit->lms_s_soft < -1 ) {
760                                         return( 1 );
761                                 }
762                         }
763                         limit->lms_s_hard = 0;
764                         
765                 } else {
766                         return( 1 );
767                 }
768         }
769
770         return 0;
771 }
772
773
774 int
775 limits_check( Operation *op, SlapReply *rs )
776 {
777         assert( op );
778         assert( rs );
779         /* FIXME: should this be always true? */
780         assert( op->o_tag == LDAP_REQ_SEARCH);
781         
782         /* allow root to set no limit */
783         if ( be_isroot( op->o_bd, &op->o_ndn ) ) {
784                 op->ors_limit = NULL;
785
786                 if ( op->ors_tlimit == 0 ) {
787                         op->ors_tlimit = -1;
788                 }
789
790                 if ( op->ors_slimit == 0 ) {
791                         op->ors_slimit = -1;
792                 }
793
794         /* if not root, get appropriate limits */
795         } else {
796                 ( void ) limits_get( op, &op->o_ndn, &op->ors_limit );
797
798                 assert( op->ors_limit != NULL );
799
800                 /* if no limit is required, use soft limit */
801                 if ( op->ors_tlimit <= 0 ) {
802                         op->ors_tlimit = op->ors_limit->lms_t_soft;
803
804                 /* if requested limit higher than hard limit, abort */
805                 } else if ( op->ors_tlimit > op->ors_limit->lms_t_hard ) {
806                         /* no hard limit means use soft instead */
807                         if ( op->ors_limit->lms_t_hard == 0
808                                         && op->ors_limit->lms_t_soft > -1
809                                         && op->ors_tlimit > op->ors_limit->lms_t_soft ) {
810                                 op->ors_tlimit = op->ors_limit->lms_t_soft;
811
812                         /* positive hard limit means abort */
813                         } else if ( op->ors_limit->lms_t_hard > 0 ) {
814                                 rs->sr_err = LDAP_ADMINLIMIT_EXCEEDED;
815                                 send_ldap_result( op, rs );
816                                 rs->sr_err = LDAP_SUCCESS;
817                                 return -1;
818                         }
819         
820                         /* negative hard limit means no limit */
821                 }
822         
823                 /* if no limit is required, use soft limit */
824                 if ( op->ors_slimit <= 0 ) {
825                         if ( get_pagedresults( op ) && op->ors_limit->lms_s_pr != 0 ) {
826                                 op->ors_slimit = op->ors_limit->lms_s_pr;
827                         } else {
828                                 op->ors_slimit = op->ors_limit->lms_s_soft;
829                         }
830
831                 /* if requested limit higher than hard limit, abort */
832                 } else if ( op->ors_slimit > op->ors_limit->lms_s_hard ) {
833                         /* no hard limit means use soft instead */
834                         if ( op->ors_limit->lms_s_hard == 0
835                                         && op->ors_limit->lms_s_soft > -1
836                                         && op->ors_slimit > op->ors_limit->lms_s_soft ) {
837                                 op->ors_slimit = op->ors_limit->lms_s_soft;
838
839                         /* positive hard limit means abort */
840                         } else if ( op->ors_limit->lms_s_hard > 0 ) {
841                                 rs->sr_err = LDAP_ADMINLIMIT_EXCEEDED;
842                                 send_ldap_result( op, rs );
843                                 rs->sr_err = LDAP_SUCCESS;      
844                                 return -1;
845                         }
846                 
847                         /* negative hard limit means no limit */
848                 }
849         }
850
851         return 0;
852 }
853