1 /* result.c - routines to send ldap results, errors, and referrals */
10 #include <ac/signal.h>
11 #include <ac/string.h>
14 #include <ac/unistd.h>
18 /* we need LBER internals */
19 #include "../../libraries/liblber/lber-int.h"
21 static char *v2ref( struct berval **ref, const char *text )
23 size_t len = 0, i = 0;
29 return ch_strdup(text);
36 if (text[len-1] != '\n')
39 v2 = ch_malloc( len+i+sizeof("Referral:") );
45 strcpy( v2+len, "Referral:" );
46 len += sizeof("Referral:");
48 for( i=0; ref[i] != NULL; i++ ) {
49 v2 = ch_realloc( v2, len + ref[i]->bv_len + 1 );
51 memcpy(&v2[len], ref[i]->bv_val, ref[i]->bv_len );
52 len += ref[i]->bv_len;
53 if (ref[i]->bv_val[ref[i]->bv_len-1] != '/')
61 static ber_tag_t req2res( ber_tag_t tag )
66 case LDAP_REQ_COMPARE:
67 case LDAP_REQ_EXTENDED:
74 tag = LDAP_RES_DELETE;
77 case LDAP_REQ_ABANDON:
83 tag = LDAP_RES_SEARCH_RESULT;
93 static void trim_refs_urls(
94 struct berval **refs )
98 if( refs == NULL ) return;
100 for( i=0; refs[i] != NULL; i++ ) {
101 if( refs[i]->bv_len > sizeof("ldap://")-1 &&
102 strncasecmp( refs[i]->bv_val, "ldap://",
103 sizeof("ldap://")-1 ) == 0 )
106 for( j=sizeof("ldap://")-1; j<refs[i]->bv_len ; j++ ) {
107 if( refs[i]->bv_val[j] == '/' ) {
108 refs[i]->bv_val[j] = '\0';
117 struct berval **get_entry_referrals(
124 struct berval **refs;
127 attr = attr_find( e->e_attrs, "ref" );
129 if( attr == NULL ) return NULL;
131 for( i=0; attr->a_vals[i] != NULL; i++ ) {
132 /* count references */
135 if( i < 1 ) return NULL;
137 refs = ch_malloc( i + 1 );
139 for( i=0, j=0; attr->a_vals[i] != NULL; i++ ) {
141 struct berval *ref = ber_bvdup( attr->a_vals[i] );
144 for( k=0; k<ref->bv_len; k++ ) {
145 if( isspace(ref->bv_val[k]) ) {
146 ref->bv_val[k] = '\0';
152 if( ref->bv_len > 0 ) {
163 ber_bvecfree( refs );
167 /* we should check that a referral value exists... */
172 static long send_ldap_ber(
178 ber_get_option( ber, LBER_OPT_BER_BYTES_TO_WRITE, &bytes );
180 /* write only one pdu at a time - wait til it's our turn */
181 ldap_pvt_thread_mutex_lock( &conn->c_write_mutex );
183 /* lock the connection */
184 ldap_pvt_thread_mutex_lock( &conn->c_mutex );
190 if ( connection_state_closing( conn ) ) {
191 ldap_pvt_thread_mutex_unlock( &conn->c_mutex );
192 ldap_pvt_thread_mutex_unlock( &conn->c_write_mutex );
197 if ( ber_flush( conn->c_sb, ber, 0 ) == 0 ) {
204 * we got an error. if it's ewouldblock, we need to
205 * wait on the socket being writable. otherwise, figure
206 * it's a hard error and return.
209 Debug( LDAP_DEBUG_CONNS, "ber_flush failed errno=%d reason=\"%s\"\n",
210 err, STRERROR(err), 0 );
212 if ( err != EWOULDBLOCK && err != EAGAIN ) {
213 connection_closing( conn );
215 ldap_pvt_thread_mutex_unlock( &conn->c_mutex );
216 ldap_pvt_thread_mutex_unlock( &conn->c_write_mutex );
221 /* wait for socket to be write-ready */
222 conn->c_writewaiter = 1;
223 slapd_set_write( ber_pvt_sb_get_desc( conn->c_sb ), 1 );
225 ldap_pvt_thread_cond_wait( &conn->c_write_cv, &conn->c_mutex );
226 conn->c_writewaiter = 0;
229 ldap_pvt_thread_mutex_unlock( &conn->c_mutex );
230 ldap_pvt_thread_mutex_unlock( &conn->c_write_mutex );
246 struct berval *resdata,
247 struct berval *sasldata,
255 assert( ctrls == NULL ); /* ctrls not implemented */
257 ber = ber_alloc_t( LBER_USE_DER );
259 Debug( LDAP_DEBUG_TRACE, "send_ldap_response: msgid=%ld tag=%ld err=%ld\n",
260 (long) msgid, (long) tag, (long) err );
263 Debug( LDAP_DEBUG_ANY, "ber_alloc failed\n", 0, 0, 0 );
267 #ifdef LDAP_CONNECTIONLESS
269 rc = ber_printf( ber, "{is{t{ess}}}", msgid, "", tag,
270 err, matched ? matched : "", text ? text : "" );
274 rc = ber_printf( ber, "{it{ess",
276 matched == NULL ? "" : matched,
277 text == NULL ? "" : text );
279 if( rc != -1 && ref != NULL ) {
280 rc = ber_printf( ber, "{V}", ref );
283 if( rc != -1 && sasldata != NULL ) {
284 rc = ber_printf( ber, "tO",
285 LDAP_TAG_SASL_RES_CREDS, sasldata );
288 if( rc != -1 && resoid != NULL ) {
289 rc = ber_printf( ber, "ts",
290 LDAP_TAG_EXOP_RES_OID, resoid );
293 if( rc != -1 && resdata != NULL ) {
294 rc = ber_printf( ber, "tO",
295 LDAP_TAG_EXOP_RES_VALUE, resdata );
299 rc = ber_printf( ber, "}}" );
304 Debug( LDAP_DEBUG_ANY, "ber_printf failed\n", 0, 0, 0 );
310 bytes = send_ldap_ber( conn, ber );
314 Debug( LDAP_DEBUG_ANY,
315 "send_ldap_response: ber write failed\n",
320 ldap_pvt_thread_mutex_lock( &num_sent_mutex );
321 num_bytes_sent += bytes;
323 ldap_pvt_thread_mutex_unlock( &num_sent_mutex );
329 send_ldap_disconnect(
340 #define LDAP_UNSOLICITED_ERROR(e) \
341 ( (e) == LDAP_PROTOCOL_ERROR \
342 || (e) == LDAP_STRONG_AUTH_REQUIRED \
343 || (e) == LDAP_UNAVAILABLE )
345 assert( LDAP_UNSOLICITED_ERROR( err ) );
347 Debug( LDAP_DEBUG_TRACE,
348 "send_ldap_disconnect %d:%s\n",
349 err, text ? text : "", NULL );
351 if ( op->o_protocol < LDAP_VERSION3 ) {
353 tag = req2res( op->o_tag );
354 msgid = (tag != LBER_SEQUENCE) ? op->o_msgid : 0;
357 reqoid = LDAP_NOTICE_DISCONNECT;
358 tag = LDAP_RES_EXTENDED;
362 #ifdef LDAP_CONNECTIONLESS
364 ber_pvt_sb_udp_set_dst( conn->c_sb, &op->o_clientaddr );
365 Debug( LDAP_DEBUG_TRACE, "UDP response to %s port %d\n",
366 inet_ntoa(((struct sockaddr_in *)
367 &op->o_clientaddr)->sin_addr ),
368 ((struct sockaddr_in *) &op->o_clientaddr)->sin_port,
373 send_ldap_response( conn, op, tag, msgid,
374 err, NULL, text, NULL,
375 reqoid, NULL, NULL, NULL );
377 Statslog( LDAP_DEBUG_STATS,
378 "conn=%ld op=%ld DISCONNECT err=%ld tag=%lu text=%s\n",
379 (long) op->o_connid, (long) op->o_opid,
380 (long) tag, (long) err, text ? text : "" );
398 assert( !LDAP_API_ERROR( err ) );
400 Debug( LDAP_DEBUG_TRACE, "send_ldap_result: conn=%ld op=%ld p=%d\n",
401 (long) op->o_connid, (long) op->o_opid, op->o_protocol );
402 Debug( LDAP_DEBUG_ARGS, "send_ldap_result: %d:%s:%s\n",
403 err, matched ? matched : "", text ? text : "" );
405 assert( err != LDAP_PARTIAL_RESULTS );
407 if( op->o_tag != LDAP_REQ_SEARCH ) {
408 trim_refs_urls( ref );
411 if ( err == LDAP_REFERRAL ) {
413 err = LDAP_NO_SUCH_OBJECT;
414 } else if ( op->o_protocol < LDAP_VERSION3 ) {
415 err = LDAP_PARTIAL_RESULTS;
419 if ( op->o_protocol < LDAP_VERSION3 ) {
420 tmp = v2ref( ref, text );
425 tag = req2res( op->o_tag );
426 msgid = (tag != LBER_SEQUENCE) ? op->o_msgid : 0;
428 #ifdef LDAP_CONNECTIONLESS
430 ber_pvt_sb_udp_set_dst( conn->c_sb, &op->o_clientaddr );
431 Debug( LDAP_DEBUG_TRACE, "UDP response to %s port %d\n",
432 inet_ntoa(((struct sockaddr_in *)
433 &op->o_clientaddr)->sin_addr ),
434 ((struct sockaddr_in *) &op->o_clientaddr)->sin_port,
439 send_ldap_response( conn, op, tag, msgid,
440 err, matched, text, ref,
441 NULL, NULL, NULL, ctrls );
443 Statslog( LDAP_DEBUG_STATS,
444 "conn=%ld op=%ld RESULT tag=%lu err=%ld text=%s\n",
445 (long) op->o_connid, (long) op->o_opid,
446 (long) tag, (long) err, text ? text : "" );
467 Debug( LDAP_DEBUG_TRACE, "send_ldap_sasl %ld\n",
468 (long) err, NULL, NULL );
470 tag = req2res( op->o_tag );
471 msgid = (tag != LBER_SEQUENCE) ? op->o_msgid : 0;
473 #ifdef LDAP_CONNECTIONLESS
475 ber_pvt_sb_udp_set_dst( conn->c_sb, &op->o_clientaddr );
476 Debug( LDAP_DEBUG_TRACE, "UDP response to %s port %d\n",
477 inet_ntoa(((struct sockaddr_in *)
478 &op->o_clientaddr)->sin_addr ),
479 ((struct sockaddr_in *) &op->o_clientaddr)->sin_port,
484 send_ldap_response( conn, op, tag, msgid,
485 err, matched, text, NULL,
486 NULL, NULL, cred, ctrls );
497 struct berval *rspdata,
504 Debug( LDAP_DEBUG_TRACE,
505 "send_ldap_extended %ld:%s (%ld)\n",
507 rspoid ? rspoid : "",
508 rspdata != NULL ? (long) rspdata->bv_len : (long) 0 );
510 tag = req2res( op->o_tag );
511 msgid = (tag != LBER_SEQUENCE) ? op->o_msgid : 0;
513 #ifdef LDAP_CONNECTIONLESS
515 ber_pvt_sb_udp_set_dst( conn->c_sb, &op->o_clientaddr );
516 Debug( LDAP_DEBUG_TRACE, "UDP response to %s port %d\n",
517 inet_ntoa(((struct sockaddr_in *)
518 &op->o_clientaddr)->sin_addr ),
519 ((struct sockaddr_in *) &op->o_clientaddr)->sin_port,
524 send_ldap_response( conn, op, tag, msgid,
525 err, matched, text, NULL,
526 rspoid, rspdata, NULL, ctrls );
537 struct berval **refs,
545 assert( !LDAP_API_ERROR( err ) );
547 Debug( LDAP_DEBUG_TRACE, "send_ldap_search_result %d:%s:%s\n",
548 err, matched ? matched : "", text ? text : "" );
550 assert( err != LDAP_PARTIAL_RESULTS );
552 trim_refs_urls( refs );
554 if( op->o_protocol < LDAP_VERSION3 ) {
555 /* send references in search results */
556 if( err == LDAP_REFERRAL ) {
557 err = LDAP_PARTIAL_RESULTS;
560 tmp = v2ref( refs, text );
564 /* don't send references in search results */
565 assert( refs == NULL );
568 if( err == LDAP_REFERRAL ) {
573 tag = req2res( op->o_tag );
574 msgid = (tag != LBER_SEQUENCE) ? op->o_msgid : 0;
576 #ifdef LDAP_CONNECTIONLESS
578 ber_pvt_sb_udp_set_dst( conn->c_sb, &op->o_clientaddr );
579 Debug( LDAP_DEBUG_TRACE, "UDP response to %s port %d\n",
580 inet_ntoa(((struct sockaddr_in *)
581 &op->o_clientaddr)->sin_addr ),
582 ((struct sockaddr_in *) &op->o_clientaddr)->sin_port,
587 send_ldap_response( conn, op, tag, msgid,
588 err, matched, text, refs,
589 NULL, NULL, NULL, ctrls );
591 Statslog( LDAP_DEBUG_STATS,
592 "conn=%ld op=%ld SEARCH RESULT tag=%lu err=%ld text=%s\n",
593 (long) op->o_connid, (long) op->o_opid,
594 (long) tag, (long) err, text ? text : "" );
619 Debug( LDAP_DEBUG_TRACE, "=> send_search_entry: \"%s\"\n", e->e_dn, 0, 0 );
621 if ( ! access_allowed( be, conn, op, e,
622 "entry", NULL, ACL_READ ) )
624 Debug( LDAP_DEBUG_ACL, "acl: access to entry not allowed\n",
631 ber = ber_alloc_t( LBER_USE_DER );
634 Debug( LDAP_DEBUG_ANY, "ber_alloc failed\n", 0, 0, 0 );
635 send_ldap_result( conn, op, LDAP_OPERATIONS_ERROR,
636 NULL, "allocating BER error", NULL, NULL );
640 rc = ber_printf( ber, "{it{s{", op->o_msgid,
641 LDAP_RES_SEARCH_ENTRY, e->e_dn );
644 Debug( LDAP_DEBUG_ANY, "ber_printf failed\n", 0, 0, 0 );
646 send_ldap_result( conn, op, LDAP_OPERATIONS_ERROR,
647 NULL, "encoding dn error", NULL, NULL );
651 /* check for special all user attributes ("*") type */
652 userattrs = ( attrs == NULL ) ? 1
653 : charray_inlist( attrs, LDAP_ALL_USER_ATTRIBUTES );
655 /* check for special all operational attributes ("+") type */
656 opattrs = ( attrs == NULL ) ? 0
657 : charray_inlist( attrs, LDAP_ALL_OPERATIONAL_ATTRIBUTES );
659 for ( a = e->e_attrs; a != NULL; a = a->a_next ) {
660 if ( attrs == NULL ) {
661 /* all addrs request, skip operational attributes */
662 if( !opattrs && oc_check_operational_attr( a->a_type ) ) {
667 /* specific addrs requested */
668 if ( oc_check_operational_attr( a->a_type ) ) {
669 if( !opattrs && !charray_inlist( attrs, a->a_type ) )
674 if (!userattrs && !charray_inlist( attrs, a->a_type ) )
681 if ( ! access_allowed( be, conn, op, e,
682 a->a_type, NULL, ACL_READ ) )
684 Debug( LDAP_DEBUG_ACL, "acl: access to attribute %s not allowed\n",
689 if (( rc = ber_printf( ber, "{s[" /*]}*/ , a->a_type )) == -1 ) {
690 Debug( LDAP_DEBUG_ANY, "ber_printf failed\n", 0, 0, 0 );
692 send_ldap_result( conn, op, LDAP_OPERATIONS_ERROR,
693 NULL, "encoding type error", NULL, NULL );
698 for ( i = 0; a->a_vals[i] != NULL; i++ ) {
699 if ( ! access_allowed( be, conn, op, e,
700 a->a_type, a->a_vals[i], ACL_READ ) )
702 Debug( LDAP_DEBUG_ACL,
703 "acl: access to attribute %s, value %d not allowed\n",
708 if (( rc = ber_printf( ber, "O", a->a_vals[i] )) == -1 ) {
709 Debug( LDAP_DEBUG_ANY,
710 "ber_printf failed\n", 0, 0, 0 );
712 send_ldap_result( conn, op, LDAP_OPERATIONS_ERROR,
713 NULL, "encoding value error", NULL, NULL );
719 if (( rc = ber_printf( ber, /*{[*/ "]}" )) == -1 ) {
720 Debug( LDAP_DEBUG_ANY, "ber_printf failed\n", 0, 0, 0 );
722 send_ldap_result( conn, op, LDAP_OPERATIONS_ERROR,
723 NULL, "encode end error", NULL, NULL );
728 #ifdef SLAPD_SCHEMA_DN
729 /* eventually will loop through generated operational attributes */
730 /* only have subschemaSubentry implemented */
731 a = backend_subschemasubentry( be );
734 if ( attrs == NULL ) {
735 /* all addrs request, skip operational attributes */
736 if( !opattrs && oc_check_operational_attr( a->a_type ) ) {
741 /* specific addrs requested */
742 if ( oc_check_operational_attr( a->a_type ) ) {
743 if( !opattrs && !charray_inlist( attrs, a->a_type ) )
748 if (!userattrs && !charray_inlist( attrs, a->a_type ) )
755 if ( ! access_allowed( be, conn, op, e,
756 a->a_type, NULL, ACL_READ ) )
758 Debug( LDAP_DEBUG_ACL, "acl: access to attribute %s not allowed\n",
763 if (( rc = ber_printf( ber, "{s[" /*]}*/ , a->a_type )) == -1 ) {
764 Debug( LDAP_DEBUG_ANY, "ber_printf failed\n", 0, 0, 0 );
766 send_ldap_result( conn, op, LDAP_OPERATIONS_ERROR,
767 NULL, "encoding type error", NULL, NULL );
772 for ( i = 0; a->a_vals[i] != NULL; i++ ) {
773 if ( ! access_allowed( be, conn, op, e,
774 a->a_type, a->a_vals[i], ACL_READ ) )
776 Debug( LDAP_DEBUG_ACL,
777 "acl: access to attribute %s, value %d not allowed\n",
783 if (( rc = ber_printf( ber, "O", a->a_vals[i] )) == -1 ) {
784 Debug( LDAP_DEBUG_ANY,
785 "ber_printf failed\n", 0, 0, 0 );
787 send_ldap_result( conn, op, LDAP_OPERATIONS_ERROR,
788 NULL, "encoding value error", NULL, NULL );
794 if (( rc = ber_printf( ber, /*{[*/ "]}" )) == -1 ) {
795 Debug( LDAP_DEBUG_ANY, "ber_printf failed\n", 0, 0, 0 );
797 send_ldap_result( conn, op, LDAP_OPERATIONS_ERROR,
798 NULL, "encode end error", NULL, NULL );
804 rc = ber_printf( ber, /*{{{*/ "}}}" );
807 Debug( LDAP_DEBUG_ANY, "ber_printf failed\n", 0, 0, 0 );
809 send_ldap_result( conn, op, LDAP_OPERATIONS_ERROR,
810 NULL, "encode entry end error", NULL, NULL );
814 bytes = send_ldap_ber( conn, ber );
818 Debug( LDAP_DEBUG_ANY,
819 "send_ldap_response: ber write failed\n",
824 ldap_pvt_thread_mutex_lock( &num_sent_mutex );
825 num_bytes_sent += bytes;
828 ldap_pvt_thread_mutex_unlock( &num_sent_mutex );
830 Statslog( LDAP_DEBUG_STATS2, "conn=%ld op=%ld ENTRY dn=\"%s\"\n",
831 (long) conn->c_connid, (long) op->o_opid, e->e_dn, 0, 0 );
833 Debug( LDAP_DEBUG_TRACE, "<= send_search_entry\n", 0, 0, 0 );
842 send_search_reference(
847 struct berval **refs,
850 struct berval ***v2refs
857 Debug( LDAP_DEBUG_TRACE, "=> send_search_reference (%s)\n", e->e_dn, 0, 0 );
859 if ( ! access_allowed( be, conn, op, e,
860 "entry", NULL, ACL_READ ) )
862 Debug( LDAP_DEBUG_ACL,
863 "send_search_reference: access to entry not allowed\n",
868 if ( ! access_allowed( be, conn, op, e,
869 "ref", NULL, ACL_READ ) )
871 Debug( LDAP_DEBUG_ACL,
872 "send_search_reference: access to reference not allowed\n",
878 Debug( LDAP_DEBUG_ANY,
879 "send_search_reference: null ref in (%s)\n",
884 if( op->o_protocol < LDAP_VERSION3 ) {
885 /* save the references for the result */
886 if( *refs != NULL ) {
887 value_add( v2refs, refs );
892 ber = ber_alloc_t( LBER_USE_DER );
895 Debug( LDAP_DEBUG_ANY,
896 "send_search_reference: ber_alloc failed\n", 0, 0, 0 );
897 send_ldap_result( conn, op, LDAP_OPERATIONS_ERROR,
898 NULL, "alloc BER error", NULL, NULL );
902 rc = ber_printf( ber, "{it{V}}", op->o_msgid,
903 LDAP_RES_SEARCH_REFERENCE, refs );
906 Debug( LDAP_DEBUG_ANY,
907 "send_search_reference: ber_printf failed\n", 0, 0, 0 );
909 send_ldap_result( conn, op, LDAP_OPERATIONS_ERROR,
910 NULL, "encode dn error", NULL, NULL );
914 bytes = send_ldap_ber( conn, ber );
917 ldap_pvt_thread_mutex_lock( &num_sent_mutex );
918 num_bytes_sent += bytes;
921 ldap_pvt_thread_mutex_unlock( &num_sent_mutex );
923 Statslog( LDAP_DEBUG_STATS2, "conn=%ld op=%ld ENTRY dn=\"%s\"\n",
924 (long) conn->c_connid, (long) op->o_opid, e->e_dn, 0, 0 );
926 Debug( LDAP_DEBUG_TRACE, "<= send_search_reference\n", 0, 0, 0 );
943 *code = LDAP_SUCCESS;
947 if ( strncasecmp( s, "RESULT", 6 ) != 0 ) {
948 Debug( LDAP_DEBUG_ANY, "str2result (%s) expecting \"RESULT\"\n",
955 while ( (s = strchr( s, '\n' )) != NULL ) {
960 if ( (c = strchr( s, ':' )) != NULL ) {
964 if ( strncasecmp( s, "code", 4 ) == 0 ) {
968 } else if ( strncasecmp( s, "matched", 7 ) == 0 ) {
972 } else if ( strncasecmp( s, "info", 4 ) == 0 ) {
977 Debug( LDAP_DEBUG_ANY, "str2result (%s) unknown\n",