1 /* slapcommon.c - common routine for the slap tools */
3 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
5 * Copyright 1998-2004 The OpenLDAP Foundation.
6 * Portions Copyright 1998-2003 Kurt D. Zeilenga.
7 * Portions Copyright 2003 IBM Corporation.
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted only as authorized by the OpenLDAP
14 * A copy of this license is available in file LICENSE in the
15 * top-level directory of the distribution or, alternatively, at
16 * <http://www.OpenLDAP.org/license.html>.
19 * This work was initially developed by Kurt Zeilenga for inclusion
20 * in OpenLDAP Software. Additional signficant contributors include
22 * Hallvard B. Furuseth
31 #include <ac/stdlib.h>
33 #include <ac/string.h>
34 #include <ac/socket.h>
35 #include <ac/unistd.h>
37 #include "slapcommon.h"
40 tool_vars tool_globals;
43 static char *leakfilename;
44 static FILE *leakfile;
48 usage( int tool, const char *progname )
52 "usage: %s [-v] [-c] [-d debuglevel] [-f configfile]\n",
57 options = "\t[-n databasenumber | -b suffix]\n"
58 "\t[-l ldiffile] [-u] [-p [-w] | -r [-i syncreplidlist] [-w]]\n";
62 options = "\t[-n databasenumber | -b suffix]"
63 " [-l ldiffile] [-a filter] [-m] [-k]\n";
67 options = "\tDN [...]\n";
71 options = "\t[-n databasenumber | -b suffix]\n";
75 options = "\t[-U authcID] [-X authzID] ID [...]\n";
79 options = "\t[-U authcID | -D authcDN]"
80 " -b DN attr[/level][:value] [...]\n";
84 if ( options != NULL ) {
85 fputs( options, stderr );
92 * slap_tool_init - initialize slap utility, handle program options.
96 * argc, argv command line arguments
101 const char* progname,
103 int argc, char **argv )
106 char *conffile = SLAPD_DEFAULT_CONFIGFILE;
107 struct berval base = BER_BVNULL;
108 char *filterstr = NULL;
109 char *subtree = NULL;
110 char *ldiffile = NULL;
112 int mode = SLAP_TOOL_MODE;
113 int truncatemode = 0;
116 leakfilename = malloc( strlen( progname ) + STRLEOF( ".leak" ) - 1 );
117 sprintf( leakfilename, "%s.leak", progname );
118 if( ( leakfile = fopen( leakfilename, "w" )) == NULL ) {
121 free( leakfilename );
126 options = "b:cd:f:i:l:n:prtuvWw";
130 options = "a:b:cd:f:kl:mn:s:v";
131 mode |= SLAP_TOOL_READMAIN | SLAP_TOOL_READONLY;
137 mode |= SLAP_TOOL_READMAIN | SLAP_TOOL_READONLY;
141 options = "d:f:U:vX:";
142 mode |= SLAP_TOOL_READMAIN | SLAP_TOOL_READONLY;
146 options = "b:cd:f:n:v";
147 mode |= SLAP_TOOL_READMAIN;
151 options = "b:D:d:f:U:v";
152 mode |= SLAP_TOOL_READMAIN | SLAP_TOOL_READONLY;
156 fprintf( stderr, "%s: unknown tool mode (%d)\n", progname, tool );
157 exit( EXIT_FAILURE );
161 while ( (i = getopt( argc, argv, options )) != EOF ) {
164 filterstr = strdup( optarg );
168 ber_str2bv( optarg, 0, 1, &base );
171 case 'c': /* enable continue mode */
175 case 'd': /* turn on debugging */
176 ldap_debug += atoi( optarg );
180 ber_str2bv( optarg, 0, 1, &authcDN );
183 case 'f': /* specify a conf file */
184 conffile = strdup( optarg );
187 case 'i': /* specify syncrepl id list */
188 replica_id_string = strdup( optarg );
189 if ( !isdigit( (unsigned char) *replica_id_string )) {
190 usage( tool, progname );
191 exit( EXIT_FAILURE );
193 slap_str2clist( &replica_id_strlist, replica_id_string, "," );
194 for ( i = 0; replica_id_strlist && replica_id_strlist[i]; i++ ) ;
195 replica_id_list = ch_calloc( i + 1, sizeof( int ) );
196 for ( i = 0; replica_id_strlist && replica_id_strlist[i]; i++ ) {
197 replica_id_list[i] = atoi( replica_id_strlist[i] );
198 if ( replica_id_list[i] >= 1000 ) {
200 "%s: syncrepl id %d is out of range [0..999]\n",
201 progname, replica_id_list[i] );
202 exit( EXIT_FAILURE );
205 replica_id_list[i] = -1;
208 case 'k': /* Retrieve sync cookie entry */
209 retrieve_synccookie = 1;
212 case 'l': /* LDIF file */
213 ldiffile = strdup( optarg );
216 case 'm': /* Retrieve ldapsync entry */
220 case 'n': /* which config file db to index */
221 dbnum = atoi( optarg ) - 1;
224 case 'p': /* replica promotion */
225 replica_promotion = 1;
228 case 'r': /* replica demotion */
229 replica_demotion = 1;
232 case 's': /* dump subtree */
233 subtree = strdup( optarg );
236 case 't': /* turn on truncate */
238 mode |= SLAP_TRUNCATE_MODE;
242 ber_str2bv( optarg, 0, 0, &authcID );
245 case 'u': /* dry run */
249 case 'v': /* turn on verbose */
253 case 'W': /* write context csn on every entry add */
254 update_ctxcsn = SLAP_TOOL_CTXCSN_BATCH;
255 /* FIXME : update_ctxcsn = SLAP_TOOL_CTXCSN_ENTRY; */
258 case 'w': /* write context csn on at the end */
259 update_ctxcsn = SLAP_TOOL_CTXCSN_BATCH;
263 ber_str2bv( optarg, 0, 0, &authzID );
267 usage( tool, progname );
276 if ( ( argc != optind ) || (dbnum >= 0 && base.bv_val != NULL ) ) {
277 usage( tool, progname );
280 if ( replica_promotion && replica_demotion ) {
281 usage( tool, progname );
283 } else if ( !replica_promotion && !replica_demotion ) {
284 if ( update_ctxcsn != SLAP_TOOL_CTXCSN_KEEP ) {
285 usage( tool, progname );
291 if ( argc == optind ) {
292 usage( tool, progname );
297 if ( argc == optind && BER_BVISNULL( &authcID ) ) {
298 usage( tool, progname );
303 if ( argc != optind ) {
304 usage( tool, progname );
309 if ( argc == optind ) {
310 usage( tool, progname );
312 if ( !BER_BVISNULL( &authcDN ) && !BER_BVISNULL( &authcID ) ) {
313 usage( tool, progname );
315 if ( BER_BVISNULL( &base ) ) {
316 usage( tool, progname );
318 ber_dupbv( &baseDN, &base );
325 if ( ldiffile == NULL ) {
326 ldiffp = tool == SLAPCAT ? stdout : stdin;
328 } else if ((ldiffp = fopen( ldiffile, tool == SLAPCAT ? "w" : "r" ))
332 exit( EXIT_FAILURE );
336 * initialize stuff and figure out which backend we're dealing with
340 if ( module_init() != 0 ) {
341 fprintf( stderr, "%s: module_init failed!\n", progname );
342 exit( EXIT_FAILURE );
346 rc = slap_init( mode, progname );
349 fprintf( stderr, "%s: slap_init failed!\n", progname );
350 exit( EXIT_FAILURE );
353 rc = slap_schema_init();
356 fprintf( stderr, "%s: slap_schema_init failed!\n", progname );
357 exit( EXIT_FAILURE );
360 if ( frontend_init() ) {
361 fprintf( stderr, "%s: frontend_init failed!\n", progname );
362 exit( EXIT_FAILURE );
365 if ( overlay_init() ) {
366 fprintf( stderr, "%s: overlay_init failed!\n", progname );
367 exit( EXIT_FAILURE );
370 rc = read_config( conffile, 0 );
373 fprintf( stderr, "%s: bad configuration file!\n", progname );
374 exit( EXIT_FAILURE );
384 fprintf( stderr, "No databases found "
385 "in config file\n" );
386 exit( EXIT_FAILURE );
394 rc = glue_sub_init();
397 fprintf( stderr, "Subordinate configuration error\n" );
398 exit( EXIT_FAILURE );
401 rc = slap_schema_check();
404 fprintf( stderr, "%s: slap_schema_prep failed!\n", progname );
405 exit( EXIT_FAILURE );
420 filter = str2filter( filterstr );
422 if( filter == NULL ) {
423 fprintf( stderr, "Invalid filter '%s'\n", filterstr );
424 exit( EXIT_FAILURE );
430 ber_str2bv( subtree, 0, 0, &val );
431 rc = dnNormalize( 0, NULL, NULL, &val, &sub_ndn, NULL );
432 if( rc != LDAP_SUCCESS ) {
433 fprintf( stderr, "Invalid subtree DN '%s'\n", subtree );
434 exit( EXIT_FAILURE );
437 if ( BER_BVISNULL( &base ) && dbnum == -1 ) {
444 if( base.bv_val != NULL ) {
447 rc = dnNormalize( 0, NULL, NULL, &base, &nbase, NULL );
448 if( rc != LDAP_SUCCESS ) {
449 fprintf( stderr, "%s: slap_init invalid suffix (\"%s\")\n",
450 progname, base.bv_val );
451 exit( EXIT_FAILURE );
454 be = select_backend( &nbase, 0, 0 );
455 ber_memfree( nbase.bv_val );
466 fprintf( stderr, "%s: slap_init no backend for \"%s\"\n",
467 progname, base.bv_val );
468 exit( EXIT_FAILURE );
470 /* If the named base is a glue master, operate on the
473 if (SLAP_GLUE_INSTANCE(be)) {
477 } else if ( dbnum == -1 ) {
478 if ( nbackends <= 0 ) {
479 fprintf( stderr, "No available databases\n" );
480 exit( EXIT_FAILURE );
483 be = &backends[dbnum=0];
484 /* If just doing the first by default and it is a
485 * glue subordinate, find the master.
487 while (SLAP_GLUE_SUBORDINATE(be) || SLAP_MONITOR(be)) {
488 if (SLAP_GLUE_SUBORDINATE(be)) {
496 if ( dbnum >= nbackends ) {
497 fprintf( stderr, "Available database(s) "
498 "do not allow %s\n", progname );
499 exit( EXIT_FAILURE );
502 if ( nosubordinates == 0 && dbnum > 0 ) {
503 Debug( LDAP_DEBUG_ANY,
504 "The first database does not allow %s;"
505 " using the first available one (%d)\n",
506 progname, dbnum + 1, 0 );
509 } else if ( dbnum < 0 || dbnum > (nbackends-1) ) {
511 "Database number selected via -n is out of range\n"
512 "Must be in the range 1 to %d"
513 " (number of databases in the config file)\n",
515 exit( EXIT_FAILURE );
518 be = &backends[dbnum];
527 if ( !dryrun && slap_startup( be ) ) {
528 fprintf( stderr, "slap_startup failed\n" );
529 exit( EXIT_FAILURE );
533 void slap_tool_destroy( void )
535 if ( !dryrun && be != NULL ) {
540 if ( slapMode == SLAP_SERVER_MODE ) {
541 /* always false. just pulls in necessary symbol references. */
542 lutil_uuidstr(NULL, 0);
548 ldap_pvt_tls_destroy();
553 mal_dumpleaktrace( leakfile );
556 if ( !BER_BVISNULL( &authcDN ) ) {
557 ch_free( authcDN.bv_val );