]> git.sur5r.net Git - openldap/blob - servers/slapd/search.c
196e82c30489839e62843849f9c801443c5130d0
[openldap] / servers / slapd / search.c
1 /* $OpenLDAP$ */
2 /*
3  * Copyright 1998-2000 The OpenLDAP Foundation, All Rights Reserved.
4  * COPYING RESTRICTIONS APPLY, see COPYRIGHT file
5  */
6 /* Portions
7  * Copyright (c) 1995 Regents of the University of Michigan.
8  * All rights reserved.
9  *
10  * Redistribution and use in source and binary forms are permitted
11  * provided that this notice is preserved and that due credit is given
12  * to the University of Michigan at Ann Arbor. The name of the University
13  * may not be used to endorse or promote products derived from this
14  * software without specific prior written permission. This software
15  * is provided ``as is'' without express or implied warranty.
16  */
17
18 #include "portable.h"
19
20 #include <stdio.h>
21
22 #include <ac/string.h>
23 #include <ac/socket.h>
24
25 #include "ldap_pvt.h"
26 #include "slap.h"
27
28 int
29 do_search(
30     Connection  *conn,  /* where to send results */
31     Operation   *op     /* info about the op to which we're responding */
32 ) {
33         int             i;
34         ber_int_t       scope, deref, attrsonly;
35         ber_int_t       sizelimit, timelimit;
36         struct berval base = { 0, NULL };
37         struct berval pbase = { 0, NULL };
38         struct berval nbase = { 0, NULL };
39         struct berval   fstr = { 0, NULL };
40         Filter          *filter = NULL;
41         AttributeName   an, *al = NULL, *alast, *anew;
42         Backend         *be;
43         int                     rc;
44         const char      *text;
45         int                     manageDSAit;
46
47 #ifdef NEW_LOGGING
48         LDAP_LOG(( "operation", LDAP_LEVEL_ENTRY,
49                 "do_search: conn %d\n", conn->c_connid ));
50 #else
51         Debug( LDAP_DEBUG_TRACE, "do_search\n", 0, 0, 0 );
52 #endif
53
54         /*
55          * Parse the search request.  It looks like this:
56          *
57          *      SearchRequest := [APPLICATION 3] SEQUENCE {
58          *              baseObject      DistinguishedName,
59          *              scope           ENUMERATED {
60          *                      baseObject      (0),
61          *                      singleLevel     (1),
62          *                      wholeSubtree    (2)
63          *              },
64          *              derefAliases    ENUMERATED {
65          *                      neverDerefaliases       (0),
66          *                      derefInSearching        (1),
67          *                      derefFindingBaseObj     (2),
68          *                      alwaysDerefAliases      (3)
69          *              },
70          *              sizelimit       INTEGER (0 .. 65535),
71          *              timelimit       INTEGER (0 .. 65535),
72          *              attrsOnly       BOOLEAN,
73          *              filter          Filter,
74          *              attributes      SEQUENCE OF AttributeType
75          *      }
76          */
77
78         /* baseObject, scope, derefAliases, sizelimit, timelimit, attrsOnly */
79         if ( ber_scanf( op->o_ber, "{oiiiib" /*}*/,
80                 &base, &scope, &deref, &sizelimit,
81             &timelimit, &attrsonly ) == LBER_ERROR )
82         {
83                 send_ldap_disconnect( conn, op,
84                         LDAP_PROTOCOL_ERROR, "decoding error" );
85                 rc = SLAPD_DISCONNECT;
86                 goto return_results;
87         }
88
89         switch( scope ) {
90         case LDAP_SCOPE_BASE:
91         case LDAP_SCOPE_ONELEVEL:
92         case LDAP_SCOPE_SUBTREE:
93                 break;
94         default:
95                 send_ldap_result( conn, op, rc = LDAP_PROTOCOL_ERROR,
96                         NULL, "invalid scope", NULL, NULL );
97                 goto return_results;
98         }
99
100         switch( deref ) {
101         case LDAP_DEREF_NEVER:
102         case LDAP_DEREF_FINDING:
103         case LDAP_DEREF_SEARCHING:
104         case LDAP_DEREF_ALWAYS:
105                 break;
106         default:
107                 send_ldap_result( conn, op, rc = LDAP_PROTOCOL_ERROR,
108                         NULL, "invalid deref", NULL, NULL );
109                 goto return_results;
110         }
111
112         rc = dnPrettyNormal( NULL, &base, &pbase, &nbase );
113         if( rc != LDAP_SUCCESS ) {
114 #ifdef NEW_LOGGING
115                 LDAP_LOG(( "operation", LDAP_LEVEL_INFO,
116                         "do_search: conn %d  invalid dn (%s)\n",
117                         conn->c_connid, base.bv_val ));
118 #else
119                 Debug( LDAP_DEBUG_ANY,
120                         "do_search: invalid dn (%s)\n", base.bv_val, 0, 0 );
121 #endif
122                 send_ldap_result( conn, op, rc = LDAP_INVALID_DN_SYNTAX, NULL,
123                     "invalid DN", NULL, NULL );
124                 goto return_results;
125         }
126
127 #ifdef NEW_LOGGING
128         LDAP_LOG(( "operation", LDAP_LEVEL_ARGS,
129                 "do_search \"%s\" %d %d %d %d %d\n", base.bv_val, scope,
130                 deref, sizelimit, timelimit, attrsonly ));
131 #else
132         Debug( LDAP_DEBUG_ARGS, "SRCH \"%s\" %d %d", base.bv_val, scope, deref );
133         Debug( LDAP_DEBUG_ARGS, "    %d %d %d\n", sizelimit, timelimit,
134             attrsonly);
135 #endif
136
137         /* filter - returns a "normalized" version */
138         rc = get_filter( conn, op->o_ber, &filter, &fstr, &text );
139         if( rc != LDAP_SUCCESS ) {
140                 if( rc == SLAPD_DISCONNECT ) {
141                         send_ldap_disconnect( conn, op,
142                                 LDAP_PROTOCOL_ERROR, text );
143                 } else {
144                         send_ldap_result( conn, op, rc,
145                                 NULL, text, NULL, NULL );
146                 }
147                 goto return_results;
148         }
149
150 #ifdef NEW_LOGGING
151         LDAP_LOG(( "operation", LDAP_LEVEL_ARGS,
152                 "do_search: conn %d     filter: %s\n", conn->c_connid, fstr.bv_val ));
153 #else
154         Debug( LDAP_DEBUG_ARGS, "    filter: %s\n", fstr.bv_val, 0, 0 );
155 #endif
156
157
158         /* attributes */
159         if ( ber_scanf( op->o_ber, "{" /*}*/ ) == LBER_ERROR ) {
160                 send_ldap_disconnect( conn, op,
161                         LDAP_PROTOCOL_ERROR, "decoding attrs error" );
162                 rc = SLAPD_DISCONNECT;
163                 goto return_results;
164         }
165         while ( ber_scanf( op->o_ber, "o", &an.an_name ) != LBER_ERROR) {
166                 anew = ch_malloc(sizeof(AttributeName));
167                 anew->an_next = NULL;
168                 anew->an_name = an.an_name;
169                 anew->an_desc = NULL;
170                 slap_bv2ad( &anew->an_name, &anew->an_desc, &text );
171                 if (!al) {
172                         al = anew;
173                 } else {
174                         alast->an_next = anew;
175                 }
176                 alast = anew;
177         }
178         if ( ber_scanf( op->o_ber, /*{{*/ "}}" ) == LBER_ERROR ) {
179                 send_ldap_disconnect( conn, op,
180                         LDAP_PROTOCOL_ERROR, "decoding attrs error" );
181                 rc = SLAPD_DISCONNECT;
182                 goto return_results;
183         }
184
185         if( (rc = get_ctrls( conn, op, 1 )) != LDAP_SUCCESS ) {
186 #ifdef NEW_LOGGING
187                 LDAP_LOG(( "operation", LDAP_LEVEL_INFO,
188                         "do_search: conn %d  get_ctrls failed (%d)\n",
189                         conn->c_connid, rc ));
190 #else
191                 Debug( LDAP_DEBUG_ANY, "do_search: get_ctrls failed\n", 0, 0, 0 );
192 #endif
193
194                 goto return_results;
195         } 
196
197         rc = LDAP_SUCCESS;
198
199 #ifdef NEW_LOGGING
200         LDAP_LOG(( "operation", LDAP_LEVEL_ARGS,
201                 "do_search: conn %d     attrs:", conn->c_connid ));
202 #else
203         Debug( LDAP_DEBUG_ARGS, "    attrs:", 0, 0, 0 );
204 #endif
205
206
207         if ( al != NULL ) {
208                 for ( anew = al; anew; anew=anew->an_next ) {
209 #ifdef NEW_LOGGING
210                         LDAP_LOG(( "operation", LDAP_LEVEL_ARGS,
211                                 "do_search:        %s", anew->an_name.bv_val ));
212 #else
213                         Debug( LDAP_DEBUG_ARGS, " %s", anew->an_name.bv_val, 0, 0 );
214 #endif
215
216                 }
217         }
218
219 #ifdef NEW_LOGGING
220         LDAP_LOG(( "operation", LDAP_LEVEL_ARGS, "\n" ));
221 #else
222         Debug( LDAP_DEBUG_ARGS, "\n", 0, 0, 0 );
223 #endif
224
225         Statslog( LDAP_DEBUG_STATS,
226             "conn=%ld op=%d SRCH base=\"%s\" scope=%d filter=\"%s\"\n",
227             op->o_connid, op->o_opid, pbase.bv_val, scope, fstr.bv_val );
228
229         manageDSAit = get_manageDSAit( op );
230
231         if ( scope == LDAP_SCOPE_BASE ) {
232                 Entry *entry = NULL;
233
234                 if ( strcasecmp( nbase.bv_val, LDAP_ROOT_DSE ) == 0 ) {
235 #ifdef LDAP_CONNECTIONLESS
236                         /* Ignore LDAPv2 CLDAP DSE queries */
237                         if (op->o_protocol==LDAP_VERSION2 && conn->c_is_udp) {
238                                 goto return_results;
239                         }
240 #endif
241                         /* check restrictions */
242                         rc = backend_check_restrictions( NULL, conn, op, NULL, &text ) ;
243                         if( rc != LDAP_SUCCESS ) {
244                                 send_ldap_result( conn, op, rc,
245                                         NULL, text, NULL, NULL );
246                                 goto return_results;
247                         }
248
249                         rc = root_dse_info( conn, &entry, &text );
250                 }
251
252 #if defined( SLAPD_SCHEMA_DN )
253                 else if ( strcasecmp( nbase.bv_val, SLAPD_SCHEMA_DN ) == 0 ) {
254                         /* check restrictions */
255                         rc = backend_check_restrictions( NULL, conn, op, NULL, &text ) ;
256                         if( rc != LDAP_SUCCESS ) {
257                                 send_ldap_result( conn, op, rc,
258                                         NULL, text, NULL, NULL );
259                                 goto return_results;
260                         }
261
262                         rc = schema_info( &entry, &text );
263                 }
264 #endif
265
266                 if( rc != LDAP_SUCCESS ) {
267                         send_ldap_result( conn, op, rc,
268                                 NULL, text, NULL, NULL );
269                         goto return_results;
270
271                 } else if ( entry != NULL ) {
272                         rc = test_filter( NULL, conn, op,
273                                 entry, filter );
274
275                         if( rc == LDAP_COMPARE_TRUE ) {
276                                 send_search_entry( NULL, conn, op,
277                                         entry, al, attrsonly, NULL );
278                         }
279                         entry_free( entry );
280
281                         send_ldap_result( conn, op, LDAP_SUCCESS,
282                                 NULL, NULL, NULL, NULL );
283
284                         goto return_results;
285                 }
286         }
287
288         if( !nbase.bv_len && default_search_nbase.bv_len ) {
289                 ch_free( pbase.bv_val );
290                 ch_free( nbase.bv_val );
291
292                 ber_dupbv( &pbase, &default_search_base );
293                 ber_dupbv( &nbase, &default_search_nbase );
294         }
295
296         /*
297          * We could be serving multiple database backends.  Select the
298          * appropriate one, or send a referral to our "referral server"
299          * if we don't hold it.
300          */
301         if ( (be = select_backend( &nbase, manageDSAit, 1 )) == NULL ) {
302                 struct berval **ref = referral_rewrite( default_referral,
303                         NULL, &pbase, scope );
304
305                 send_ldap_result( conn, op, rc = LDAP_REFERRAL,
306                         NULL, NULL, ref ? ref : default_referral, NULL );
307
308                 ber_bvecfree( ref );
309                 goto return_results;
310         }
311
312         /* check restrictions */
313         rc = backend_check_restrictions( be, conn, op, NULL, &text ) ;
314         if( rc != LDAP_SUCCESS ) {
315                 send_ldap_result( conn, op, rc,
316                         NULL, text, NULL, NULL );
317                 goto return_results;
318         }
319
320         /* check for referrals */
321         rc = backend_check_referrals( be, conn, op, &pbase, &nbase );
322         if ( rc != LDAP_SUCCESS ) {
323                 goto return_results;
324         }
325
326         /* deref the base if needed */
327         suffix_alias( be, &nbase );
328
329         /* actually do the search and send the result(s) */
330         if ( be->be_search ) {
331                 (*be->be_search)( be, conn, op, &pbase, &nbase,
332                         scope, deref, sizelimit,
333                     timelimit, filter, fstr.bv_val, al, attrsonly );
334         } else {
335                 send_ldap_result( conn, op, rc = LDAP_UNWILLING_TO_PERFORM,
336                         NULL, "operation not supported within namingContext", NULL, NULL );
337         }
338
339 return_results:;
340         free( base.bv_val );
341         if( pbase.bv_val != NULL) free( pbase.bv_val );
342         if( nbase.bv_val != NULL) free( nbase.bv_val );
343
344         if( fstr.bv_val != NULL) free( fstr.bv_val );
345         if( filter != NULL) filter_free( filter );
346         for (; al; al=anew ) {
347                 anew = al->an_next;
348                 free(al->an_name.bv_val);
349                 free(al);
350         }
351
352         return rc;
353 }