]> git.sur5r.net Git - openldap/blob - tests/progs/slapd-search.c
Sync with HEAD
[openldap] / tests / progs / slapd-search.c
1 /* $OpenLDAP$ */
2 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
3  *
4  * Copyright 1999-2006 The OpenLDAP Foundation.
5  * All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted only as authorized by the OpenLDAP
9  * Public License.
10  *
11  * A copy of this license is available in file LICENSE in the
12  * top-level directory of the distribution or, alternatively, at
13  * <http://www.OpenLDAP.org/license.html>.
14  */
15 /* ACKNOWLEDGEMENTS:
16  * This work was initially developed by Kurt Spanier for inclusion
17  * in OpenLDAP Software.
18  */
19
20 #include "portable.h"
21
22 #include <stdio.h>
23
24 #include <ac/stdlib.h>
25
26 #include <ac/ctype.h>
27 #include <ac/param.h>
28 #include <ac/socket.h>
29 #include <ac/string.h>
30 #include <ac/unistd.h>
31 #include <ac/wait.h>
32
33 #include <ldap.h>
34 #include <lutil.h>
35
36 #include "slapd-common.h"
37
38 #define LOOPS   100
39 #define RETRIES 0
40
41 static void
42 do_search( char *uri, char *manager, struct berval *passwd,
43         char *sbase, char *filter, LDAP **ldp, int noattrs,
44         int innerloop, int maxretries, int delay, int force, int chaserefs );
45
46 static void
47 do_random( char *uri, char *manager, struct berval *passwd,
48         char *sbase, char *filter, char *attr, int noattrs, int innerloop,
49         int maxretries, int delay, int force, int chaserefs );
50
51 static void
52 usage( char *name )
53 {
54         fprintf( stderr,
55                 "usage: %s "
56                 "-H <uri> | ([-h <host>] -p <port>) "
57                 "-D <manager> "
58                 "-w <passwd> "
59                 "-b <searchbase> "
60                 "-f <searchfilter> "
61                 "[-a <attr>] "
62                 "[-A] "
63                 "[-C] "
64                 "[-F] "
65                 "[-i <ignore>] "
66                 "[-l <loops>] "
67                 "[-L <outerloops>] "
68                 "[-r <maxretries>] "
69                 "[-t <delay>]\n",
70                         name );
71         exit( EXIT_FAILURE );
72 }
73
74 int
75 main( int argc, char **argv )
76 {
77         int             i;
78         char            *uri = NULL;
79         char            *host = "localhost";
80         int             port = -1;
81         char            *manager = NULL;
82         struct berval   passwd = { 0, NULL };
83         char            *sbase = NULL;
84         char            *filter  = NULL;
85         char            *attr = NULL;
86         int             loops = LOOPS;
87         int             outerloops = 1;
88         int             retries = RETRIES;
89         int             delay = 0;
90         int             force = 0;
91         int             chaserefs = 0;
92         int             noattrs = 0;
93
94         tester_init( "slapd-search", TESTER_SEARCH );
95
96         /* by default, tolerate referrals and no such object */
97         tester_ignore_str2errlist( "REFERRAL,NO_SUCH_OBJECT" );
98
99         while ( (i = getopt( argc, argv, "Aa:b:CD:f:FH:h:i:l:L:p:w:r:t:" )) != EOF ) {
100                 switch( i ) {
101                 case 'A':
102                         noattrs++;
103                         break;
104
105                 case 'C':
106                         chaserefs++;
107                         break;
108
109                 case 'H':               /* the server uri */
110                         uri = strdup( optarg );
111                         break;
112
113                 case 'h':               /* the servers host */
114                         host = strdup( optarg );
115                         break;
116
117                 case 'i':
118                         tester_ignore_str2errlist( optarg );
119                         break;
120
121                 case 'p':               /* the servers port */
122                         if ( lutil_atoi( &port, optarg ) != 0 ) {
123                                 usage( argv[0] );
124                         }
125                         break;
126
127                 case 'D':               /* the servers manager */
128                         manager = strdup( optarg );
129                         break;
130
131                 case 'w':               /* the server managers password */
132                         passwd.bv_val = strdup( optarg );
133                         passwd.bv_len = strlen( optarg );
134                         memset( optarg, '*', passwd.bv_len );
135                         break;
136
137                 case 'a':
138                         attr = strdup( optarg );
139                         break;
140
141                 case 'b':               /* file with search base */
142                         sbase = strdup( optarg );
143                         break;
144
145                 case 'f':               /* the search request */
146                         filter = strdup( optarg );
147                         break;
148
149                 case 'F':
150                         force++;
151                         break;
152
153                 case 'l':               /* number of loops */
154                         if ( lutil_atoi( &loops, optarg ) != 0 ) {
155                                 usage( argv[0] );
156                         }
157                         break;
158
159                 case 'L':               /* number of loops */
160                         if ( lutil_atoi( &outerloops, optarg ) != 0 ) {
161                                 usage( argv[0] );
162                         }
163                         break;
164
165                 case 'r':               /* number of retries */
166                         if ( lutil_atoi( &retries, optarg ) != 0 ) {
167                                 usage( argv[0] );
168                         }
169                         break;
170
171                 case 't':               /* delay in seconds */
172                         if ( lutil_atoi( &delay, optarg ) != 0 ) {
173                                 usage( argv[0] );
174                         }
175                         break;
176
177                 default:
178                         usage( argv[0] );
179                         break;
180                 }
181         }
182
183         if (( sbase == NULL ) || ( filter == NULL ) || ( port == -1 && uri == NULL ))
184                 usage( argv[0] );
185
186         if ( *filter == '\0' ) {
187
188                 fprintf( stderr, "%s: invalid EMPTY search filter.\n",
189                                 argv[0] );
190                 exit( EXIT_FAILURE );
191
192         }
193
194         uri = tester_uri( uri, host, port );
195
196         for ( i = 0; i < outerloops; i++ ) {
197                 if ( attr != NULL ) {
198                         do_random( uri, manager, &passwd, sbase, filter, attr,
199                                 noattrs, loops, retries, delay, force, chaserefs );
200
201                 } else {
202                         do_search( uri, manager, &passwd, sbase, filter, NULL,
203                                 noattrs, loops, retries, delay, force, chaserefs );
204                 }
205         }
206
207         exit( EXIT_SUCCESS );
208 }
209
210
211 static void
212 do_random( char *uri, char *manager, struct berval *passwd,
213         char *sbase, char *filter, char *attr, int noattrs,
214         int innerloop, int maxretries, int delay, int force, int chaserefs )
215 {
216         LDAP    *ld = NULL;
217         int     i = 0, do_retry = maxretries;
218         char    *attrs[ 2 ];
219         pid_t   pid = getpid();
220         int     rc = LDAP_SUCCESS;
221         int     version = LDAP_VERSION3;
222         int     nvalues = 0;
223         char    **values = NULL;
224         LDAPMessage *res = NULL, *e = NULL;
225
226         attrs[ 0 ] = attr;
227         attrs[ 1 ] = NULL;
228
229         ldap_initialize( &ld, uri );
230         if ( ld == NULL ) {
231                 tester_perror( "ldap_initialize", NULL );
232                 exit( EXIT_FAILURE );
233         }
234
235         (void) ldap_set_option( ld, LDAP_OPT_PROTOCOL_VERSION, &version ); 
236         (void) ldap_set_option( ld, LDAP_OPT_REFERRALS,
237                 chaserefs ? LDAP_OPT_ON : LDAP_OPT_OFF );
238
239         if ( do_retry == maxretries ) {
240                 fprintf( stderr, "PID=%ld - Search(%d): base=\"%s\", filter=\"%s\" attr=\"%s\".\n",
241                                 (long) pid, innerloop, sbase, filter, attr );
242         }
243
244         rc = ldap_sasl_bind_s( ld, manager, LDAP_SASL_SIMPLE, passwd, NULL, NULL, NULL );
245         if ( rc != LDAP_SUCCESS ) {
246                 tester_ldap_error( ld, "ldap_sasl_bind_s", NULL );
247                 switch ( rc ) {
248                 case LDAP_BUSY:
249                 case LDAP_UNAVAILABLE:
250                 /* fallthru */
251                 default:
252                         break;
253                 }
254                 exit( EXIT_FAILURE );
255         }
256
257         rc = ldap_search_ext_s( ld, sbase, LDAP_SCOPE_SUBTREE,
258                 filter, attrs, 0, NULL, NULL, NULL, LDAP_NO_LIMIT, &res );
259         switch ( rc ) {
260         case LDAP_SIZELIMIT_EXCEEDED:
261         case LDAP_TIMELIMIT_EXCEEDED:
262         case LDAP_SUCCESS:
263                 if ( ldap_count_entries( ld, res ) == 0 ) {
264                         if ( rc ) {
265                                 tester_ldap_error( ld, "ldap_search_ext_s", NULL );
266                         }
267                         break;
268                 }
269
270                 for ( e = ldap_first_entry( ld, res ); e != NULL; e = ldap_next_entry( ld, e ) )
271                 {
272                         struct berval **v = ldap_get_values_len( ld, e, attr );
273
274                         if ( v != NULL ) {
275                                 int n = ldap_count_values_len( v );
276                                 int j;
277
278                                 values = realloc( values, ( nvalues + n + 1 )*sizeof( char * ) );
279                                 for ( j = 0; j < n; j++ ) {
280                                         values[ nvalues + j ] = strdup( v[ j ]->bv_val );
281                                 }
282                                 values[ nvalues + j ] = NULL;
283                                 nvalues += n;
284                                 ldap_value_free_len( v );
285                         }
286                 }
287
288                 ldap_msgfree( res );
289
290                 if ( do_retry == maxretries ) {
291                         fprintf( stderr, "  PID=%ld - Search base=\"%s\" filter=\"%s\" got %d values.\n",
292                                 (long) pid, sbase, filter, nvalues );
293                 }
294
295                 for ( i = 0; i < innerloop; i++ ) {
296                         char    buf[ BUFSIZ ];
297
298                         snprintf( buf, sizeof( buf ), "(%s=%s)", attr, values[ rand() % nvalues ] );
299
300                         do_search( uri, manager, passwd, sbase, buf, &ld, noattrs,
301                                         1, maxretries, delay, force, chaserefs );
302                 }
303                 break;
304
305         default:
306                 tester_ldap_error( ld, "ldap_search_ext_s", NULL );
307                 break;
308         }
309
310         fprintf( stderr, " PID=%ld - Search done (%d).\n", (long) pid, rc );
311
312         if ( ld != NULL ) {
313                 ldap_unbind_ext( ld, NULL, NULL );
314         }
315 }
316
317 static void
318 do_search( char *uri, char *manager, struct berval *passwd,
319                 char *sbase, char *filter, LDAP **ldp,
320                 int noattrs, int innerloop, int maxretries, int delay,
321                 int force, int chaserefs )
322 {
323         LDAP    *ld = ldp ? *ldp : NULL;
324         int     i = 0, do_retry = maxretries;
325         char    *attrs[] = { "cn", "sn", NULL };
326         pid_t   pid = getpid();
327         int     rc = LDAP_SUCCESS;
328         int     version = LDAP_VERSION3;
329         char    buf[ BUFSIZ ];
330
331
332 retry:;
333         if ( ld == NULL ) {
334                 ldap_initialize( &ld, uri );
335                 if ( ld == NULL ) {
336                         tester_perror( "ldap_initialize", NULL );
337                         exit( EXIT_FAILURE );
338                 }
339
340                 (void) ldap_set_option( ld, LDAP_OPT_PROTOCOL_VERSION, &version ); 
341                 (void) ldap_set_option( ld, LDAP_OPT_REFERRALS,
342                         chaserefs ? LDAP_OPT_ON : LDAP_OPT_OFF );
343
344                 if ( do_retry == maxretries ) {
345                         fprintf( stderr, "PID=%ld - Search(%d): base=\"%s\", filter=\"%s\".\n",
346                                         (long) pid, innerloop, sbase, filter );
347                 }
348
349                 rc = ldap_sasl_bind_s( ld, manager, LDAP_SASL_SIMPLE, passwd, NULL, NULL, NULL );
350                 if ( rc != LDAP_SUCCESS ) {
351                         snprintf( buf, sizeof( buf ),
352                                 "bindDN=\"%s\"", manager );
353                         tester_ldap_error( ld, "ldap_sasl_bind_s", buf );
354                         switch ( rc ) {
355                         case LDAP_BUSY:
356                         case LDAP_UNAVAILABLE:
357                                 if ( do_retry > 0 ) {
358                                         ldap_unbind_ext( ld, NULL, NULL );
359                                         do_retry--;
360                                         if ( delay != 0 ) {
361                                             sleep( delay );
362                                         }
363                                         goto retry;
364                                 }
365                         /* fallthru */
366                         default:
367                                 break;
368                         }
369                         exit( EXIT_FAILURE );
370                 }
371         }
372
373         for ( ; i < innerloop; i++ ) {
374                 LDAPMessage *res = NULL;
375
376                 rc = ldap_search_ext_s( ld, sbase, LDAP_SCOPE_SUBTREE,
377                                 filter, attrs, noattrs, NULL, NULL,
378                                 NULL, LDAP_NO_LIMIT, &res );
379                 if ( res != NULL ) {
380                         ldap_msgfree( res );
381                 }
382
383                 if ( rc ) {
384                         unsigned first = tester_ignore_err( rc );
385                         /* if ignore.. */
386                         if ( first ) {
387                                 /* only log if first occurrence */
388                                 if ( force < 2 || first == 1 ) {
389                                         tester_ldap_error( ld, "ldap_search_ext_s", NULL );
390                                 }
391                                 continue;
392                         }
393
394                         /* busy needs special handling */
395                         snprintf( buf, sizeof( buf ),
396                                 "base=\"%s\" filter=\"%s\"\n",
397                                 sbase, filter );
398                         tester_ldap_error( ld, "ldap_search_ext_s", buf );
399                         if ( rc == LDAP_BUSY && do_retry > 0 ) {
400                                 ldap_unbind_ext( ld, NULL, NULL );
401                                 ld = NULL;
402                                 do_retry--;
403                                 goto retry;
404                         }
405                         break;
406                 }
407         }
408
409         if ( ldp != NULL ) {
410                 *ldp = ld;
411
412         } else {
413                 fprintf( stderr, " PID=%ld - Search done (%d).\n", (long) pid, rc );
414
415                 if ( ld != NULL ) {
416                         ldap_unbind_ext( ld, NULL, NULL );
417                 }
418         }
419 }