1 /* result.c - routines to send ldap results, errors, and referrals */
10 #include <ac/signal.h>
11 #include <ac/string.h>
14 #include <ac/unistd.h>
18 /* we need LBER internals */
19 #include "../../libraries/liblber/lber-int.h"
21 static char *v2ref( struct berval **ref, const char *text )
23 size_t len = 0, i = 0;
29 return ch_strdup(text);
36 if (text[len-1] != '\n')
39 v2 = ch_malloc( len+i+sizeof("Referral:") );
45 strcpy( v2+len, "Referral:" );
46 len += sizeof("Referral:");
48 for( i=0; ref[i] != NULL; i++ ) {
49 v2 = ch_realloc( v2, len + ref[i]->bv_len + 1 );
51 memcpy(&v2[len], ref[i]->bv_val, ref[i]->bv_len );
52 len += ref[i]->bv_len;
53 if (ref[i]->bv_val[ref[i]->bv_len-1] != '/')
61 static ber_tag_t req2res( ber_tag_t tag )
66 case LDAP_REQ_COMPARE:
67 case LDAP_REQ_EXTENDED:
74 tag = LDAP_RES_DELETE;
77 case LDAP_REQ_ABANDON:
83 tag = LDAP_RES_SEARCH_RESULT;
93 static void trim_refs_urls(
94 struct berval **refs )
98 if( refs == NULL ) return;
100 for( i=0; refs[i] != NULL; i++ ) {
101 if( refs[i]->bv_len > sizeof("ldap://")-1 &&
102 strncasecmp( refs[i]->bv_val, "ldap://",
103 sizeof("ldap://")-1 ) == 0 )
106 for( j=sizeof("ldap://")-1; j<refs[i]->bv_len ; j++ ) {
107 if( refs[i]->bv_val[j] == '/' ) {
108 refs[i]->bv_val[j] = '\0';
117 struct berval **get_entry_referrals(
124 struct berval **refs;
127 attr = attr_find( e->e_attrs, "ref" );
129 if( attr == NULL ) return NULL;
131 for( i=0; attr->a_vals[i] != NULL; i++ ) {
132 /* count references */
135 if( i < 1 ) return NULL;
137 refs = ch_malloc( i + 1 );
139 for( i=0, j=0; attr->a_vals[i] != NULL; i++ ) {
141 struct berval *ref = ber_bvdup( attr->a_vals[i] );
144 for( k=0; k<ref->bv_len; k++ ) {
145 if( isspace(ref->bv_val[k]) ) {
146 ref->bv_val[k] = '\0';
152 if( ref->bv_len > 0 ) {
163 ber_bvecfree( refs );
167 /* we should check that a referral value exists... */
172 static long send_ldap_ber(
178 ber_get_option( ber, LBER_OPT_BER_BYTES_TO_WRITE, &bytes );
180 /* write only one pdu at a time - wait til it's our turn */
181 ldap_pvt_thread_mutex_lock( &conn->c_write_mutex );
183 /* lock the connection */
184 ldap_pvt_thread_mutex_lock( &conn->c_mutex );
190 if ( connection_state_closing( conn ) ) {
191 ldap_pvt_thread_mutex_unlock( &conn->c_mutex );
192 ldap_pvt_thread_mutex_unlock( &conn->c_write_mutex );
197 if ( ber_flush( conn->c_sb, ber, 0 ) == 0 ) {
204 * we got an error. if it's ewouldblock, we need to
205 * wait on the socket being writable. otherwise, figure
206 * it's a hard error and return.
209 Debug( LDAP_DEBUG_CONNS, "ber_flush failed errno=%d reason=\"%s\"\n",
210 err, STRERROR(err), 0 );
212 if ( err != EWOULDBLOCK && err != EAGAIN ) {
213 connection_closing( conn );
215 ldap_pvt_thread_mutex_unlock( &conn->c_mutex );
216 ldap_pvt_thread_mutex_unlock( &conn->c_write_mutex );
221 /* wait for socket to be write-ready */
222 conn->c_writewaiter = 1;
223 slapd_set_write( ber_pvt_sb_get_desc( conn->c_sb ), 1 );
225 ldap_pvt_thread_cond_wait( &conn->c_write_cv, &conn->c_mutex );
226 conn->c_writewaiter = 0;
229 ldap_pvt_thread_mutex_unlock( &conn->c_mutex );
230 ldap_pvt_thread_mutex_unlock( &conn->c_write_mutex );
246 struct berval *resdata,
247 struct berval *sasldata,
255 assert( ctrls == NULL ); /* ctrls not implemented */
257 ber = ber_alloc_t( LBER_USE_DER );
259 Debug( LDAP_DEBUG_TRACE, "send_ldap_response: msgid=%ld tag=%ld err=%ld\n",
260 (long) msgid, (long) tag, (long) err );
263 Debug( LDAP_DEBUG_ANY, "ber_alloc failed\n", 0, 0, 0 );
267 #ifdef LDAP_CONNECTIONLESS
269 rc = ber_printf( ber, "{is{t{ess}}}", msgid, "", tag,
270 err, matched ? matched : "", text ? text : "" );
274 rc = ber_printf( ber, "{it{ess",
276 matched == NULL ? "" : matched,
277 text == NULL ? "" : text );
279 if( rc != -1 && ref != NULL ) {
280 rc = ber_printf( ber, "{V}", ref );
283 if( rc != -1 && sasldata != NULL ) {
284 rc = ber_printf( ber, "tO",
285 LDAP_TAG_SASL_RES_CREDS, sasldata );
288 if( rc != -1 && resoid != NULL ) {
289 rc = ber_printf( ber, "ts",
290 LDAP_TAG_EXOP_RES_OID, resoid );
293 if( rc != -1 && resdata != NULL ) {
294 rc = ber_printf( ber, "tO",
295 LDAP_TAG_EXOP_RES_VALUE, resdata );
299 rc = ber_printf( ber, "}}" );
304 Debug( LDAP_DEBUG_ANY, "ber_printf failed\n", 0, 0, 0 );
310 bytes = send_ldap_ber( conn, ber );
314 Debug( LDAP_DEBUG_ANY,
315 "send_ldap_response: ber write failed\n",
320 ldap_pvt_thread_mutex_lock( &num_sent_mutex );
321 num_bytes_sent += bytes;
323 ldap_pvt_thread_mutex_unlock( &num_sent_mutex );
329 send_ldap_disconnect(
340 #define LDAP_UNSOLICITED_ERROR(e) \
341 ( (e) == LDAP_PROTOCOL_ERROR \
342 || (e) == LDAP_STRONG_AUTH_REQUIRED \
343 || (e) == LDAP_UNAVAILABLE )
345 assert( LDAP_UNSOLICITED_ERROR( err ) );
347 Debug( LDAP_DEBUG_TRACE,
348 "send_ldap_disconnect %d:%s\n",
349 err, text ? text : "", NULL );
351 if ( op->o_protocol < LDAP_VERSION3 ) {
353 tag = req2res( op->o_tag );
354 msgid = (tag != LBER_SEQUENCE) ? op->o_msgid : 0;
357 reqoid = LDAP_NOTICE_DISCONNECT;
358 tag = LDAP_RES_EXTENDED;
362 #ifdef LDAP_CONNECTIONLESS
364 ber_pvt_sb_udp_set_dst( conn->c_sb, &op->o_clientaddr );
365 Debug( LDAP_DEBUG_TRACE, "UDP response to %s port %d\n",
366 inet_ntoa(((struct sockaddr_in *)
367 &op->o_clientaddr)->sin_addr ),
368 ((struct sockaddr_in *) &op->o_clientaddr)->sin_port,
373 send_ldap_response( conn, op, tag, msgid,
374 err, NULL, text, NULL,
375 reqoid, NULL, NULL, NULL );
377 Statslog( LDAP_DEBUG_STATS,
378 "conn=%ld op=%ld DISCONNECT err=%ld tag=%lu text=%s\n",
379 (long) op->o_connid, (long) op->o_opid,
380 (long) tag, (long) err, text ? text : "" );
398 assert( !LDAP_API_ERROR( err ) );
400 Debug( LDAP_DEBUG_TRACE, "send_ldap_result: conn=%ld op=%ld p=%d\n",
401 (long) op->o_connid, (long) op->o_opid, op->o_protocol );
402 Debug( LDAP_DEBUG_ARGS, "send_ldap_result: %d:%s:%s\n",
403 err, matched ? matched : "", text ? text : "" );
405 assert( err != LDAP_PARTIAL_RESULTS );
407 if( op->o_tag != LDAP_REQ_SEARCH ) {
408 trim_refs_urls( ref );
411 if ( err == LDAP_REFERRAL ) {
413 err = LDAP_NO_SUCH_OBJECT;
414 } else if ( op->o_protocol < LDAP_VERSION3 ) {
415 err = LDAP_PARTIAL_RESULTS;
419 if ( op->o_protocol < LDAP_VERSION3 ) {
420 tmp = v2ref( ref, text );
425 tag = req2res( op->o_tag );
426 msgid = (tag != LBER_SEQUENCE) ? op->o_msgid : 0;
428 #ifdef LDAP_CONNECTIONLESS
430 ber_pvt_sb_udp_set_dst( conn->c_sb, &op->o_clientaddr );
431 Debug( LDAP_DEBUG_TRACE, "UDP response to %s port %d\n",
432 inet_ntoa(((struct sockaddr_in *)
433 &op->o_clientaddr)->sin_addr ),
434 ((struct sockaddr_in *) &op->o_clientaddr)->sin_port,
439 send_ldap_response( conn, op, tag, msgid,
440 err, matched, text, ref,
441 NULL, NULL, NULL, ctrls );
443 Statslog( LDAP_DEBUG_STATS,
444 "conn=%ld op=%ld RESULT tag=%lu err=%ld text=%s\n",
445 (long) op->o_connid, (long) op->o_opid,
446 (long) tag, (long) err, text ? text : "" );
467 Debug( LDAP_DEBUG_TRACE, "send_ldap_sasl %ld\n",
468 (long) err, NULL, NULL );
470 tag = req2res( op->o_tag );
471 msgid = (tag != LBER_SEQUENCE) ? op->o_msgid : 0;
473 #ifdef LDAP_CONNECTIONLESS
475 ber_pvt_sb_udp_set_dst( conn->c_sb, &op->o_clientaddr );
476 Debug( LDAP_DEBUG_TRACE, "UDP response to %s port %d\n",
477 inet_ntoa(((struct sockaddr_in *)
478 &op->o_clientaddr)->sin_addr ),
479 ((struct sockaddr_in *) &op->o_clientaddr)->sin_port,
484 send_ldap_response( conn, op, tag, msgid,
485 err, matched, text, NULL,
486 NULL, NULL, cred, ctrls );
496 struct berval **refs,
498 struct berval *rspdata,
505 Debug( LDAP_DEBUG_TRACE,
506 "send_ldap_extended %ld:%s (%ld)\n",
508 rspoid ? rspoid : "",
509 rspdata != NULL ? (long) rspdata->bv_len : (long) 0 );
511 tag = req2res( op->o_tag );
512 msgid = (tag != LBER_SEQUENCE) ? op->o_msgid : 0;
514 #ifdef LDAP_CONNECTIONLESS
516 ber_pvt_sb_udp_set_dst( conn->c_sb, &op->o_clientaddr );
517 Debug( LDAP_DEBUG_TRACE, "UDP response to %s port %d\n",
518 inet_ntoa(((struct sockaddr_in *)
519 &op->o_clientaddr)->sin_addr ),
520 ((struct sockaddr_in *) &op->o_clientaddr)->sin_port,
525 send_ldap_response( conn, op, tag, msgid,
526 err, matched, text, refs,
527 rspoid, rspdata, NULL, ctrls );
538 struct berval **refs,
546 assert( !LDAP_API_ERROR( err ) );
548 Debug( LDAP_DEBUG_TRACE, "send_ldap_search_result %d:%s:%s\n",
549 err, matched ? matched : "", text ? text : "" );
551 assert( err != LDAP_PARTIAL_RESULTS );
553 trim_refs_urls( refs );
555 if( op->o_protocol < LDAP_VERSION3 ) {
556 /* send references in search results */
557 if( err == LDAP_REFERRAL ) {
558 err = LDAP_PARTIAL_RESULTS;
561 tmp = v2ref( refs, text );
565 /* don't send references in search results */
566 assert( refs == NULL );
569 if( err == LDAP_REFERRAL ) {
574 tag = req2res( op->o_tag );
575 msgid = (tag != LBER_SEQUENCE) ? op->o_msgid : 0;
577 #ifdef LDAP_CONNECTIONLESS
579 ber_pvt_sb_udp_set_dst( conn->c_sb, &op->o_clientaddr );
580 Debug( LDAP_DEBUG_TRACE, "UDP response to %s port %d\n",
581 inet_ntoa(((struct sockaddr_in *)
582 &op->o_clientaddr)->sin_addr ),
583 ((struct sockaddr_in *) &op->o_clientaddr)->sin_port,
588 send_ldap_response( conn, op, tag, msgid,
589 err, matched, text, refs,
590 NULL, NULL, NULL, ctrls );
592 Statslog( LDAP_DEBUG_STATS,
593 "conn=%ld op=%ld SEARCH RESULT tag=%lu err=%ld text=%s\n",
594 (long) op->o_connid, (long) op->o_opid,
595 (long) tag, (long) err, text ? text : "" );
620 Debug( LDAP_DEBUG_TRACE, "=> send_search_entry: \"%s\"\n", e->e_dn, 0, 0 );
622 if ( ! access_allowed( be, conn, op, e,
623 "entry", NULL, ACL_READ ) )
625 Debug( LDAP_DEBUG_ACL, "acl: access to entry not allowed\n",
632 ber = ber_alloc_t( LBER_USE_DER );
635 Debug( LDAP_DEBUG_ANY, "ber_alloc failed\n", 0, 0, 0 );
636 send_ldap_result( conn, op, LDAP_OPERATIONS_ERROR,
637 NULL, "allocating BER error", NULL, NULL );
641 rc = ber_printf( ber, "{it{s{", op->o_msgid,
642 LDAP_RES_SEARCH_ENTRY, e->e_dn );
645 Debug( LDAP_DEBUG_ANY, "ber_printf failed\n", 0, 0, 0 );
647 send_ldap_result( conn, op, LDAP_OPERATIONS_ERROR,
648 NULL, "encoding dn error", NULL, NULL );
652 /* check for special all user attributes ("*") type */
653 userattrs = ( attrs == NULL ) ? 1
654 : charray_inlist( attrs, LDAP_ALL_USER_ATTRIBUTES );
656 /* check for special all operational attributes ("+") type */
657 opattrs = ( attrs == NULL ) ? 0
658 : charray_inlist( attrs, LDAP_ALL_OPERATIONAL_ATTRIBUTES );
660 for ( a = e->e_attrs; a != NULL; a = a->a_next ) {
661 if ( attrs == NULL ) {
662 /* all addrs request, skip operational attributes */
663 if( !opattrs && oc_check_operational_attr( a->a_type ) ) {
668 /* specific addrs requested */
669 if ( oc_check_operational_attr( a->a_type ) ) {
670 if( !opattrs && !charray_inlist( attrs, a->a_type ) )
675 if (!userattrs && !charray_inlist( attrs, a->a_type ) )
682 if ( ! access_allowed( be, conn, op, e,
683 a->a_type, NULL, ACL_READ ) )
685 Debug( LDAP_DEBUG_ACL, "acl: access to attribute %s not allowed\n",
690 if (( rc = ber_printf( ber, "{s[" /*]}*/ , a->a_type )) == -1 ) {
691 Debug( LDAP_DEBUG_ANY, "ber_printf failed\n", 0, 0, 0 );
693 send_ldap_result( conn, op, LDAP_OPERATIONS_ERROR,
694 NULL, "encoding type error", NULL, NULL );
699 for ( i = 0; a->a_vals[i] != NULL; i++ ) {
700 if ( ! access_allowed( be, conn, op, e,
701 a->a_type, a->a_vals[i], ACL_READ ) )
703 Debug( LDAP_DEBUG_ACL,
704 "acl: access to attribute %s, value %d not allowed\n",
709 if (( rc = ber_printf( ber, "O", a->a_vals[i] )) == -1 ) {
710 Debug( LDAP_DEBUG_ANY,
711 "ber_printf failed\n", 0, 0, 0 );
713 send_ldap_result( conn, op, LDAP_OPERATIONS_ERROR,
714 NULL, "encoding value error", NULL, NULL );
720 if (( rc = ber_printf( ber, /*{[*/ "]}" )) == -1 ) {
721 Debug( LDAP_DEBUG_ANY, "ber_printf failed\n", 0, 0, 0 );
723 send_ldap_result( conn, op, LDAP_OPERATIONS_ERROR,
724 NULL, "encode end error", NULL, NULL );
729 #ifdef SLAPD_SCHEMA_DN
730 /* eventually will loop through generated operational attributes */
731 /* only have subschemaSubentry implemented */
732 a = backend_subschemasubentry( be );
735 if ( attrs == NULL ) {
736 /* all addrs request, skip operational attributes */
737 if( !opattrs && oc_check_operational_attr( a->a_type ) ) {
742 /* specific addrs requested */
743 if ( oc_check_operational_attr( a->a_type ) ) {
744 if( !opattrs && !charray_inlist( attrs, a->a_type ) )
749 if (!userattrs && !charray_inlist( attrs, a->a_type ) )
756 if ( ! access_allowed( be, conn, op, e,
757 a->a_type, NULL, ACL_READ ) )
759 Debug( LDAP_DEBUG_ACL, "acl: access to attribute %s not allowed\n",
764 if (( rc = ber_printf( ber, "{s[" /*]}*/ , a->a_type )) == -1 ) {
765 Debug( LDAP_DEBUG_ANY, "ber_printf failed\n", 0, 0, 0 );
767 send_ldap_result( conn, op, LDAP_OPERATIONS_ERROR,
768 NULL, "encoding type error", NULL, NULL );
773 for ( i = 0; a->a_vals[i] != NULL; i++ ) {
774 if ( ! access_allowed( be, conn, op, e,
775 a->a_type, a->a_vals[i], ACL_READ ) )
777 Debug( LDAP_DEBUG_ACL,
778 "acl: access to attribute %s, value %d not allowed\n",
784 if (( rc = ber_printf( ber, "O", a->a_vals[i] )) == -1 ) {
785 Debug( LDAP_DEBUG_ANY,
786 "ber_printf failed\n", 0, 0, 0 );
788 send_ldap_result( conn, op, LDAP_OPERATIONS_ERROR,
789 NULL, "encoding value error", NULL, NULL );
795 if (( rc = ber_printf( ber, /*{[*/ "]}" )) == -1 ) {
796 Debug( LDAP_DEBUG_ANY, "ber_printf failed\n", 0, 0, 0 );
798 send_ldap_result( conn, op, LDAP_OPERATIONS_ERROR,
799 NULL, "encode end error", NULL, NULL );
805 rc = ber_printf( ber, /*{{{*/ "}}}" );
808 Debug( LDAP_DEBUG_ANY, "ber_printf failed\n", 0, 0, 0 );
810 send_ldap_result( conn, op, LDAP_OPERATIONS_ERROR,
811 NULL, "encode entry end error", NULL, NULL );
815 bytes = send_ldap_ber( conn, ber );
819 Debug( LDAP_DEBUG_ANY,
820 "send_ldap_response: ber write failed\n",
825 ldap_pvt_thread_mutex_lock( &num_sent_mutex );
826 num_bytes_sent += bytes;
829 ldap_pvt_thread_mutex_unlock( &num_sent_mutex );
831 Statslog( LDAP_DEBUG_STATS2, "conn=%ld op=%ld ENTRY dn=\"%s\"\n",
832 (long) conn->c_connid, (long) op->o_opid, e->e_dn, 0, 0 );
834 Debug( LDAP_DEBUG_TRACE, "<= send_search_entry\n", 0, 0, 0 );
843 send_search_reference(
848 struct berval **refs,
851 struct berval ***v2refs
858 Debug( LDAP_DEBUG_TRACE, "=> send_search_reference (%s)\n", e->e_dn, 0, 0 );
860 if ( ! access_allowed( be, conn, op, e,
861 "entry", NULL, ACL_READ ) )
863 Debug( LDAP_DEBUG_ACL,
864 "send_search_reference: access to entry not allowed\n",
869 if ( ! access_allowed( be, conn, op, e,
870 "ref", NULL, ACL_READ ) )
872 Debug( LDAP_DEBUG_ACL,
873 "send_search_reference: access to reference not allowed\n",
879 Debug( LDAP_DEBUG_ANY,
880 "send_search_reference: null ref in (%s)\n",
885 if( op->o_protocol < LDAP_VERSION3 ) {
886 /* save the references for the result */
887 if( *refs != NULL ) {
888 value_add( v2refs, refs );
893 ber = ber_alloc_t( LBER_USE_DER );
896 Debug( LDAP_DEBUG_ANY,
897 "send_search_reference: ber_alloc failed\n", 0, 0, 0 );
898 send_ldap_result( conn, op, LDAP_OPERATIONS_ERROR,
899 NULL, "alloc BER error", NULL, NULL );
903 rc = ber_printf( ber, "{it{V}}", op->o_msgid,
904 LDAP_RES_SEARCH_REFERENCE, refs );
907 Debug( LDAP_DEBUG_ANY,
908 "send_search_reference: ber_printf failed\n", 0, 0, 0 );
910 send_ldap_result( conn, op, LDAP_OPERATIONS_ERROR,
911 NULL, "encode dn error", NULL, NULL );
915 bytes = send_ldap_ber( conn, ber );
918 ldap_pvt_thread_mutex_lock( &num_sent_mutex );
919 num_bytes_sent += bytes;
922 ldap_pvt_thread_mutex_unlock( &num_sent_mutex );
924 Statslog( LDAP_DEBUG_STATS2, "conn=%ld op=%ld ENTRY dn=\"%s\"\n",
925 (long) conn->c_connid, (long) op->o_opid, e->e_dn, 0, 0 );
927 Debug( LDAP_DEBUG_TRACE, "<= send_search_reference\n", 0, 0, 0 );
944 *code = LDAP_SUCCESS;
948 if ( strncasecmp( s, "RESULT", 6 ) != 0 ) {
949 Debug( LDAP_DEBUG_ANY, "str2result (%s) expecting \"RESULT\"\n",
956 while ( (s = strchr( s, '\n' )) != NULL ) {
961 if ( (c = strchr( s, ':' )) != NULL ) {
965 if ( strncasecmp( s, "code", 4 ) == 0 ) {
969 } else if ( strncasecmp( s, "matched", 7 ) == 0 ) {
973 } else if ( strncasecmp( s, "info", 4 ) == 0 ) {
978 Debug( LDAP_DEBUG_ANY, "str2result (%s) unknown\n",