]> git.sur5r.net Git - openldap/blobdiff - servers/slapd/back-ldap/extended.c
address ITS#4332; might remove dynamicObject counting
[openldap] / servers / slapd / back-ldap / extended.c
index 6f35c898a2cbfb613ef298eab16f6cab2e4f2230..de7a1c7ad132e92de4d39d94bb93de6fda5bb0f5 100644 (file)
@@ -2,7 +2,7 @@
 /* $OpenLDAP$ */
 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
  *
- * Copyright 2003-2004 The OpenLDAP Foundation.
+ * Copyright 2003-2006 The OpenLDAP Foundation.
  * All rights reserved.
  *
  * Redistribution and use in source and binary forms, with or without
 #include "back-ldap.h"
 #include "lber_pvt.h"
 
-BI_op_extended ldap_back_exop_passwd;
+static BI_op_extended ldap_back_exop_passwd;
+static BI_op_extended ldap_back_exop_generic;
 
 static struct exop {
-       struct berval *oid;
+       struct berval   oid;
        BI_op_extended  *extended;
 } exop_table[] = {
-       { (struct berval *)&slap_EXOP_MODIFY_PASSWD, ldap_back_exop_passwd },
-       { NULL, NULL }
+       { BER_BVC(LDAP_EXOP_MODIFY_PASSWD),     ldap_back_exop_passwd },
+       { BER_BVNULL, NULL }
 };
 
-int
-ldap_back_extended(
-       Operation               *op,
-       SlapReply               *rs )
+static int
+ldap_back_extended_one( Operation *op, SlapReply *rs, BI_op_extended exop )
 {
-       int i;
-
-       for( i=0; exop_table[i].extended != NULL; i++ ) {
-               if( ber_bvcmp( exop_table[i].oid, &op->oq_extended.rs_reqoid ) == 0 ) {
-#ifdef LDAP_BACK_PROXY_AUTHZ 
-                       struct ldapconn *lc;
-                       LDAPControl **oldctrls = NULL;
-                       int rc;
-
-                       /* FIXME: this needs to be called here, so it is
-                        * called twice; maybe we could avoid the 
-                        * ldap_back_dobind() call inside each extended()
-                        * call ... */
-                       lc = ldap_back_getconn(op, rs);
-                       if (!lc || !ldap_back_dobind(lc, op, rs) ) {
-                               return -1;
-                       }
+       ldapconn_t      *lc;
+       LDAPControl     **oldctrls = NULL;
+       int             rc;
 
-                       oldctrls = op->o_ctrls;
-                       if ( ldap_back_proxy_authz_ctrl( lc, op, rs, &op->o_ctrls ) ) {
-                               op->o_ctrls = oldctrls;
-                               send_ldap_result( op, rs );
-                               rs->sr_text = NULL;
-                               return rs->sr_err;
-                       }
+       /* FIXME: this needs to be called here, so it is
+        * called twice; maybe we could avoid the 
+        * ldap_back_dobind() call inside each extended()
+        * call ... */
+       lc = ldap_back_getconn( op, rs, LDAP_BACK_SENDERR );
+       if ( !lc || !ldap_back_dobind( lc, op, rs, LDAP_BACK_SENDERR ) ) {
+               return -1;
+       }
 
-                       rc = (exop_table[i].extended)( op, rs );
+       oldctrls = op->o_ctrls;
+       if ( ldap_back_proxy_authz_ctrl( lc, op, rs, &op->o_ctrls ) ) {
+               op->o_ctrls = oldctrls;
+               send_ldap_extended( op, rs );
+               rs->sr_text = NULL;
+               /* otherwise frontend resends result */
+               rc = rs->sr_err = SLAPD_ABANDON;
+               goto done;
+       }
 
-                       if ( op->o_ctrls && op->o_ctrls != oldctrls ) {
-                               free( op->o_ctrls[ 0 ] );
-                               free( op->o_ctrls );
-                       }
-                       op->o_ctrls = oldctrls;
+       rc = exop( op, rs );
 
-                       return rc;
-#else /* ! LDAP_BACK_PROXY_AUTHZ */
-                       return (exop_table[i].extended)( op, rs );
-#endif /* ! LDAP_BACK_PROXY_AUTHZ */
-               }
+       if ( op->o_ctrls && op->o_ctrls != oldctrls ) {
+               free( op->o_ctrls[ 0 ] );
+               free( op->o_ctrls );
        }
+       op->o_ctrls = oldctrls;
 
-       rs->sr_text = "not supported within naming context";
-       return LDAP_UNWILLING_TO_PERFORM;
+done:;
+       if ( lc != NULL ) {
+               ldap_back_release_conn( op, rs, lc );
+       }
+                       
+       return rc;
 }
 
 int
+ldap_back_extended(
+               Operation       *op,
+               SlapReply       *rs )
+{
+       int     i;
+
+       for ( i = 0; exop_table[i].extended != NULL; i++ ) {
+               if ( bvmatch( &exop_table[i].oid, &op->oq_extended.rs_reqoid ) )
+               {
+                       return ldap_back_extended_one( op, rs, exop_table[i].extended );
+               }
+       }
+
+       /* if we get here, the exop is known; the best that we can do
+        * is pass it thru as is */
+       /* FIXME: maybe a list of OIDs to pass thru would be safer */
+       return ldap_back_extended_one( op, rs, ldap_back_exop_generic );
+}
+
+static int
 ldap_back_exop_passwd(
-       Operation               *op,
-       SlapReply               *rs )
+               Operation       *op,
+               SlapReply       *rs )
 {
-       struct ldapinfo *li = (struct ldapinfo *) op->o_bd->be_private;
-       struct ldapconn *lc;
-       req_pwdexop_s *qpw = &op->oq_pwdexop;
-       struct berval mdn = BER_BVNULL, newpw;
-       LDAPMessage *res;
-       ber_int_t msgid;
-       int rc, isproxy;
-       dncookie dc;
-
-       lc = ldap_back_getconn(op, rs);
-       if (!lc || !ldap_back_dobind(lc, op, rs) ) {
+       ldapconn_t      *lc;
+       req_pwdexop_s   *qpw = &op->oq_pwdexop;
+       LDAPMessage     *res;
+       ber_int_t       msgid;
+       int             rc, isproxy;
+       int             do_retry = 1;
+
+       lc = ldap_back_getconn( op, rs, LDAP_BACK_SENDERR );
+       if ( !lc || !ldap_back_dobind( lc, op, rs, LDAP_BACK_SENDERR ) ) {
                return -1;
        }
 
        isproxy = ber_bvcmp( &op->o_req_ndn, &op->o_ndn );
 
-#ifdef NEW_LOGGING
-       LDAP_LOG ( ACL, DETAIL1, "ldap_back_exop_passwd: \"%s\"%s\"\n",
+       Debug( LDAP_DEBUG_ARGS, "==> ldap_back_exop_passwd(\"%s\")%s\n",
                op->o_req_dn.bv_val, isproxy ? " (proxy)" : "", 0 );
-#else
-       Debug( LDAP_DEBUG_TRACE, "ldap_back_exop_passwd: \"%s\"%s\n",
-               op->o_req_dn.bv_val, isproxy ? " (proxy)" : "", 0 );
-#endif
-
-       if ( isproxy ) {
-               dc.rwmap = &li->rwmap;
-#ifdef ENABLE_REWRITE
-               dc.conn = op->o_conn;
-               dc.rs = rs;
-               dc.ctx = "exopPasswdDN";
-#else
-               dc.tofrom = 1;
-               dc.normalized = 0;
-#endif
-               if ( ldap_back_dn_massage( &dc, &op->o_req_dn, &mdn ) ) {
-                       send_ldap_result( op, rs );
-                       return -1;
-               }
-       }
 
-       rc = ldap_passwd(lc->ld, isproxy ? &mdn : NULL,
+retry:
+       rc = ldap_passwd( lc->lc_ld, isproxy ? &op->o_req_dn : NULL,
                qpw->rs_old.bv_val ? &qpw->rs_old : NULL,
                qpw->rs_new.bv_val ? &qpw->rs_new : NULL,
-               op->o_ctrls, NULL, &msgid);
+               op->o_ctrls, NULL, &msgid );
+
+       if ( rc == LDAP_SUCCESS ) {
+               if ( ldap_result( lc->lc_ld, msgid, LDAP_MSG_ALL, NULL, &res ) == -1 ) {
+                       ldap_get_option( lc->lc_ld, LDAP_OPT_ERROR_NUMBER, &rc );
+                       ldap_back_freeconn( op, lc, 0 );
+                       lc = NULL;
+
+               } else {
+                       /* sigh. parse twice, because parse_passwd
+                        * doesn't give us the err / match / msg info.
+                        */
+                       rc = ldap_parse_result( lc->lc_ld, res, &rs->sr_err,
+                                       (char **)&rs->sr_matched,
+                                       (char **)&rs->sr_text,
+                                       NULL, NULL, 0 );
+#ifndef LDAP_NULL_IS_NULL
+                       if ( rs->sr_matched && rs->sr_matched[ 0 ] == '\0' ) {
+                               free( (char *)rs->sr_matched );
+                               rs->sr_matched = NULL;
+                       }
+                       if ( rs->sr_text && rs->sr_text[ 0 ] == '\0' ) {
+                               free( (char *)rs->sr_text );
+                               rs->sr_text = NULL;
+                       }
+#endif /* LDAP_NULL_IS_NULL */
+
+                       if ( rc == LDAP_SUCCESS ) {
+                               if ( rs->sr_err == LDAP_SUCCESS ) {
+                                       struct berval   newpw;
+
+                                       /* this never happens because 
+                                        * the frontend is generating 
+                                        * the new password, so when
+                                        * the passwd exop is proxied,
+                                        * it never delegates password
+                                        * generation to the remote server
+                                        */
+                                       rc = ldap_parse_passwd( lc->lc_ld, res,
+                                                       &newpw );
+                                       if ( rc == LDAP_SUCCESS &&
+                                                       !BER_BVISNULL( &newpw ) )
+                                       {
+                                               rs->sr_type = REP_EXTENDED;
+                                               rs->sr_rspdata = slap_passwd_return( &newpw );
+                                               free( newpw.bv_val );
+                                       }
+
+                               } else {
+                                       rc = rs->sr_err;
+                               }
+                       }
+                       ldap_msgfree( res );
+               }
+       }
+       if ( rc != LDAP_SUCCESS ) {
+               rs->sr_err = slap_map_api2result( rs );
+               if ( rs->sr_err == LDAP_UNAVAILABLE && do_retry ) {
+                       do_retry = 0;
+                       if ( ldap_back_retry( &lc, op, rs, LDAP_BACK_SENDERR ) ) {
+                               goto retry;
+                       }
+               }
+               send_ldap_extended( op, rs );
+               /* otherwise frontend resends result */
+               rc = rs->sr_err = SLAPD_ABANDON;
+       }
+
+       /* these have to be freed anyway... */
+       if ( rs->sr_matched ) {
+               free( (char *)rs->sr_matched );
+               rs->sr_matched = NULL;
+       }
+       if ( rs->sr_text ) {
+               free( (char *)rs->sr_text );
+               rs->sr_text = NULL;
+       }
+
+       if ( lc != NULL ) {
+               ldap_back_release_conn( op, rs, lc );
+       }
+
+       return rc;
+}
 
-       if (mdn.bv_val != op->o_req_dn.bv_val) {
-               free(mdn.bv_val);
+static int
+ldap_back_exop_generic(
+       Operation       *op,
+       SlapReply       *rs )
+{
+       ldapconn_t      *lc;
+       LDAPMessage     *res;
+       ber_int_t       msgid;
+       int             rc;
+       int             do_retry = 1;
+
+       lc = ldap_back_getconn( op, rs, LDAP_BACK_SENDERR );
+       if ( !lc || !ldap_back_dobind( lc, op, rs, LDAP_BACK_SENDERR ) ) {
+               return -1;
        }
 
-       if (rc == LDAP_SUCCESS) {
-               if (ldap_result(lc->ld, msgid, 1, NULL, &res) == -1) {
-                       ldap_get_option(lc->ld, LDAP_OPT_ERROR_NUMBER, &rc);
+       Debug( LDAP_DEBUG_ARGS, "==> ldap_back_exop_generic(%s, \"%s\")\n",
+               op->ore_reqoid.bv_val, op->o_req_dn.bv_val, 0 );
+
+retry:
+       rc = ldap_extended_operation( lc->lc_ld,
+               op->ore_reqoid.bv_val, op->ore_reqdata,
+               op->o_ctrls, NULL, &msgid );
+
+       if ( rc == LDAP_SUCCESS ) {
+               if ( ldap_result( lc->lc_ld, msgid, LDAP_MSG_ALL, NULL, &res ) == -1 ) {
+                       ldap_get_option( lc->lc_ld, LDAP_OPT_ERROR_NUMBER, &rc );
+                       ldap_back_freeconn( op, lc, 0 );
+                       lc = NULL;
+
                } else {
-                       /* sigh. parse twice, because parse_passwd doesn't give
-                        * us the err / match / msg info.
+                       /* sigh. parse twice, because parse_passwd
+                        * doesn't give us the err / match / msg info.
                         */
-                       rc = ldap_parse_result(lc->ld, res, &rs->sr_err, (char **)&rs->sr_matched, (char **)&rs->sr_text,
-                               NULL, NULL, 0);
-                       if (rc == LDAP_SUCCESS) {
-                               if (rs->sr_err == LDAP_SUCCESS) {
-                                       rc = ldap_parse_passwd(lc->ld, res, &newpw);
-                                       if (rc == LDAP_SUCCESS && newpw.bv_val) {
+                       rc = ldap_parse_result( lc->lc_ld, res, &rs->sr_err,
+                                       (char **)&rs->sr_matched,
+                                       (char **)&rs->sr_text,
+                                       NULL, NULL, 0 );
+#ifndef LDAP_NULL_IS_NULL
+                       if ( rs->sr_matched && rs->sr_matched[ 0 ] == '\0' ) {
+                               free( (char *)rs->sr_matched );
+                               rs->sr_matched = NULL;
+                       }
+                       if ( rs->sr_text && rs->sr_text[ 0 ] == '\0' ) {
+                               free( (char *)rs->sr_text );
+                               rs->sr_text = NULL;
+                       }
+#endif /* LDAP_NULL_IS_NULL */
+                       if ( rc == LDAP_SUCCESS ) {
+                               if ( rs->sr_err == LDAP_SUCCESS ) {
+                                       rc = ldap_parse_extended_result( lc->lc_ld, res,
+                                                       (char **)&rs->sr_rspoid, &rs->sr_rspdata, 0 );
+                                       if ( rc == LDAP_SUCCESS ) {
                                                rs->sr_type = REP_EXTENDED;
-                                               rs->sr_rspdata = slap_passwd_return(&newpw);
-                                               free(newpw.bv_val);
                                        }
+
                                } else {
                                        rc = rs->sr_err;
                                }
                        }
-                       ldap_msgfree(res);
+                       ldap_msgfree( res );
                }
        }
-       if (rc != LDAP_SUCCESS) {
+       if ( rc != LDAP_SUCCESS ) {
                rs->sr_err = slap_map_api2result( rs );
-               send_ldap_result(op, rs);
-               if (rs->sr_matched) free((char *)rs->sr_matched);
-               if (rs->sr_text) free((char *)rs->sr_text);
+               if ( rs->sr_err == LDAP_UNAVAILABLE && do_retry ) {
+                       do_retry = 0;
+                       if ( ldap_back_retry( &lc, op, rs, LDAP_BACK_SENDERR ) ) {
+                               goto retry;
+                       }
+               }
+               send_ldap_extended( op, rs );
+               /* otherwise frontend resends result */
+               rc = rs->sr_err = SLAPD_ABANDON;
+       }
+
+       /* these have to be freed anyway... */
+       if ( rs->sr_matched ) {
+               free( (char *)rs->sr_matched );
                rs->sr_matched = NULL;
+       }
+       if ( rs->sr_text ) {
+               free( (char *)rs->sr_text );
                rs->sr_text = NULL;
-               rc = -1;
        }
+
+       if ( lc != NULL ) {
+               ldap_back_release_conn( op, rs, lc );
+       }
+
        return rc;
 }
+