]> git.sur5r.net Git - openldap/blobdiff - servers/slapd/back-ldap/init.c
cleanup
[openldap] / servers / slapd / back-ldap / init.c
index 08767a481123c2e4264e0c34ffd67c5a10518f20..d9a4ff61c4250aca3d77f24a1a85a48c428c4e5a 100644 (file)
@@ -2,7 +2,7 @@
 /* $OpenLDAP$ */
 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
  *
- * Copyright 2003-2005 The OpenLDAP Foundation.
+ * Copyright 2003-2007 The OpenLDAP Foundation.
  * Portions Copyright 1999-2003 Howard Chu.
  * Portions Copyright 2000-2003 Pierangelo Masarati.
  * All rights reserved.
@@ -41,15 +41,27 @@ ldap_back_open( BackendInfo *bi )
 int
 ldap_back_initialize( BackendInfo *bi )
 {
+       int             rc;
+
+       bi->bi_flags =
+#ifdef LDAP_DYNAMIC_OBJECTS
+               /* this is set because all the support a proxy has to provide
+                * is the capability to forward the refresh exop, and to
+                * pass thru entries that contain the dynamicObject class
+                * and the entryTtl attribute */
+               SLAP_BFLAG_DYNAMIC |
+#endif /* LDAP_DYNAMIC_OBJECTS */
+               0;
+
        bi->bi_open = ldap_back_open;
        bi->bi_config = 0;
        bi->bi_close = 0;
        bi->bi_destroy = 0;
 
        bi->bi_db_init = ldap_back_db_init;
-       bi->bi_db_config = ldap_back_db_config;
+       bi->bi_db_config = config_generic_wrapper;
        bi->bi_db_open = ldap_back_db_open;
-       bi->bi_db_close = 0;
+       bi->bi_db_close = ldap_back_db_close;
        bi->bi_db_destroy = ldap_back_db_destroy;
 
        bi->bi_op_bind = ldap_back_bind;
@@ -70,119 +82,163 @@ ldap_back_initialize( BackendInfo *bi )
        bi->bi_connection_init = 0;
        bi->bi_connection_destroy = ldap_back_conn_destroy;
 
-       if ( chain_init( ) ) {
-               return -1;
+       rc = chain_initialize();
+       if ( rc ) {
+               return rc;
        }
 
-       return 0;
+#ifdef SLAP_DISTPROC
+       rc = distproc_initialize();
+       if ( rc ) {
+               return rc;
+       }
+#endif
+
+       return ldap_back_init_cf( bi );
 }
 
 int
 ldap_back_db_init( Backend *be )
 {
-       struct ldapinfo *li;
+       ldapinfo_t      *li;
+       int             rc;
+       unsigned        i;
 
-       li = (struct ldapinfo *)ch_calloc( 1, sizeof( struct ldapinfo ) );
+       li = (ldapinfo_t *)ch_calloc( 1, sizeof( ldapinfo_t ) );
        if ( li == NULL ) {
                return -1;
        }
 
-       BER_BVZERO( &li->acl_authcDN );
-       BER_BVZERO( &li->acl_passwd );
+       li->li_rebind_f = ldap_back_default_rebind;
+       li->li_urllist_f = ldap_back_default_urllist;
+       li->li_urllist_p = li;
+       ldap_pvt_thread_mutex_init( &li->li_uri_mutex );
+
+       BER_BVZERO( &li->li_acl_authcID );
+       BER_BVZERO( &li->li_acl_authcDN );
+       BER_BVZERO( &li->li_acl_passwd );
 
-       li->idassert_mode = LDAP_BACK_IDASSERT_LEGACY;
+       li->li_acl_authmethod = LDAP_AUTH_NONE;
+       BER_BVZERO( &li->li_acl_sasl_mech );
+       li->li_acl.sb_tls = SB_TLS_DEFAULT;
 
-       BER_BVZERO( &li->idassert_authcID );
-       BER_BVZERO( &li->idassert_authcDN );
-       BER_BVZERO( &li->idassert_passwd );
+       li->li_idassert_mode = LDAP_BACK_IDASSERT_LEGACY;
 
-       BER_BVZERO( &li->idassert_authzID );
-       li->idassert_authz = NULL;
+       BER_BVZERO( &li->li_idassert_authcID );
+       BER_BVZERO( &li->li_idassert_authcDN );
+       BER_BVZERO( &li->li_idassert_passwd );
 
-       li->idassert_authmethod = LDAP_AUTH_SIMPLE;
-       li->idassert_sasl_flags = LDAP_SASL_QUIET;
-       BER_BVZERO( &li->idassert_sasl_mech );
-       BER_BVZERO( &li->idassert_sasl_realm );
+       BER_BVZERO( &li->li_idassert_authzID );
 
-       li->idassert_ppolicy = 0;
+       li->li_idassert_authmethod = LDAP_AUTH_NONE;
+       BER_BVZERO( &li->li_idassert_sasl_mech );
+       li->li_idassert_tls = SB_TLS_DEFAULT;
 
        /* by default, use proxyAuthz control on each operation */
-       li->idassert_flags = LDAP_BACK_AUTH_NONE;
+       li->li_idassert_flags = LDAP_BACK_AUTH_PRESCRIPTIVE;
+
+       li->li_idassert_authz = NULL;
 
        /* initialize flags */
-       li->flags = LDAP_BACK_F_CHASE_REFERRALS;
+       li->li_flags = LDAP_BACK_F_CHASE_REFERRALS;
+
+       /* initialize version */
+       li->li_version = LDAP_VERSION3;
 
-       ldap_pvt_thread_mutex_init( &li->conn_mutex );
+       ldap_pvt_thread_mutex_init( &li->li_conninfo.lai_mutex );
+
+       for ( i = LDAP_BACK_PCONN_FIRST; i < LDAP_BACK_PCONN_LAST; i++ ) {
+               li->li_conn_priv[ i ].lic_num = 0;
+               LDAP_TAILQ_INIT( &li->li_conn_priv[ i ].lic_priv );
+       }
+       li->li_conn_priv_max = LDAP_BACK_CONN_PRIV_DEFAULT;
 
        be->be_private = li;
        SLAP_DBFLAGS( be ) |= SLAP_DBFLAG_NOLASTMOD;
 
-       return 0;
+       be->be_cf_ocs = be->bd_info->bi_cf_ocs;
+
+       rc = ldap_back_monitor_db_init( be );
+       if ( rc != 0 ) {
+               /* ignore, by now */
+               rc = 0;
+       }
+
+       return rc;
 }
 
 int
 ldap_back_db_open( BackendDB *be )
 {
-       struct ldapinfo *li = (struct ldapinfo *)be->be_private;
+       ldapinfo_t      *li = (ldapinfo_t *)be->be_private;
+
+       slap_bindconf   sb = { BER_BVNULL };
+       int             rc = 0;
 
        Debug( LDAP_DEBUG_TRACE,
                "ldap_back_db_open: URI=%s\n",
-               li->url != NULL ? li->url : "", 0, 0 );
+               li->li_uri != NULL ? li->li_uri : "", 0, 0 );
 
        /* by default, use proxyAuthz control on each operation */
-       switch ( li->idassert_mode ) {
+       switch ( li->li_idassert_mode ) {
        case LDAP_BACK_IDASSERT_LEGACY:
        case LDAP_BACK_IDASSERT_SELF:
                /* however, since admin connections are pooled and shared,
                 * only static authzIDs can be native */
-               li->idassert_flags &= ~LDAP_BACK_AUTH_NATIVE_AUTHZ;
+               li->li_idassert_flags &= ~LDAP_BACK_AUTH_NATIVE_AUTHZ;
                break;
 
        default:
                break;
        }
 
-#if 0 && defined(SLAPD_MONITOR)
-       {
-               /* FIXME: disabled because namingContexts doesn't have
-                * a matching rule, and using an MRA filter doesn't work
-                * because the normalized assertion is compared to the 
-                * non-normalized value, which in general differs from
-                * the normalized one.  See ITS#3406 */
-               struct berval   filter,
-                               base = BER_BVC( "cn=Databases," SLAPD_MONITOR );
-               struct berval   vals[ 2 ];
-               Attribute       a = { 0 };
-
-               filter.bv_len = STRLENOF( "(&(namingContexts:distinguishedNameMatch:=)(monitoredInfo=ldap))" )
-                       + be->be_nsuffix[ 0 ].bv_len;
-               filter.bv_val = ch_malloc( filter.bv_len + 1 );
-               snprintf( filter.bv_val, filter.bv_len + 1,
-                               "(&(namingContexts:distinguishedNameMatch:=%s)(monitoredInfo=ldap))",
-                               be->be_nsuffix[ 0 ].bv_val );
-
-               a.a_desc = slap_schema.si_ad_labeledURI;
-               ber_str2bv( li->url, 0, 0, &vals[ 0 ] );
-               BER_BVZERO( &vals[ 1 ] );
-               a.a_vals = vals;
-               a.a_nvals = vals;
-               if ( monitor_back_register_entry_attrs( NULL, &a, NULL, &base, LDAP_SCOPE_SUBTREE, &filter ) ) {
-                       /* error */
+       ber_str2bv( li->li_uri, 0, 0, &sb.sb_uri );
+       sb.sb_version = li->li_version;
+       sb.sb_method = LDAP_AUTH_SIMPLE;
+       BER_BVSTR( &sb.sb_binddn, "" );
+
+       if ( LDAP_BACK_T_F_DISCOVER( li ) && !LDAP_BACK_T_F( li ) ) {
+               rc = slap_discover_feature( &sb,
+                               slap_schema.si_ad_supportedFeatures->ad_cname.bv_val,
+                               LDAP_FEATURE_ABSOLUTE_FILTERS );
+               if ( rc == LDAP_COMPARE_TRUE ) {
+                       li->li_flags |= LDAP_BACK_F_T_F;
                }
+       }
 
-               ch_free( filter.bv_val );
+       if ( LDAP_BACK_CANCEL_DISCOVER( li ) && !LDAP_BACK_CANCEL( li ) ) {
+               rc = slap_discover_feature( &sb,
+                               slap_schema.si_ad_supportedExtension->ad_cname.bv_val,
+                               LDAP_EXOP_CANCEL );
+               if ( rc == LDAP_COMPARE_TRUE ) {
+                       li->li_flags |= LDAP_BACK_F_CANCEL_EXOP;
+               }
        }
-#endif /* SLAPD_MONITOR */
 
-       return 0;
+       /* monitor setup */
+       rc = ldap_back_monitor_db_open( be );
+       if ( rc != 0 ) {
+               /* ignore by now */
+               rc = 0;
+#if 0
+               goto fail;
+#endif
+       }
+
+       li->li_flags |= LDAP_BACK_F_ISOPEN;
+
+fail:;
+       return rc;
 }
 
 void
 ldap_back_conn_free( void *v_lc )
 {
-       struct ldapconn *lc = v_lc;
-       
-       ldap_unbind_ext_s( lc->lc_ld, NULL, NULL );
+       ldapconn_t      *lc = v_lc;
+
+       if ( lc->lc_ld != NULL ) {      
+               ldap_unbind_ext( lc->lc_ld, NULL, NULL );
+       }
        if ( !BER_BVISNULL( &lc->lc_bound_ndn ) ) {
                ch_free( lc->lc_bound_ndn.bv_val );
        }
@@ -193,68 +249,109 @@ ldap_back_conn_free( void *v_lc )
        if ( !BER_BVISNULL( &lc->lc_local_ndn ) ) {
                ch_free( lc->lc_local_ndn.bv_val );
        }
-       ldap_pvt_thread_mutex_destroy( &lc->lc_mutex );
+       lc->lc_q.tqe_prev = NULL;
+       lc->lc_q.tqe_next = NULL;
        ch_free( lc );
 }
 
 int
-ldap_back_db_destroy(
-    Backend    *be
-)
+ldap_back_db_close( Backend *be )
 {
-       struct ldapinfo *li;
+       int             rc = 0;
 
        if ( be->be_private ) {
-               li = ( struct ldapinfo * )be->be_private;
+               rc = ldap_back_monitor_db_close( be );
+       }
+
+       return rc;
+}
+
+int
+ldap_back_db_destroy( Backend *be )
+{
+       if ( be->be_private ) {
+               ldapinfo_t      *li = ( ldapinfo_t * )be->be_private;
+               unsigned        i;
+
+               (void)ldap_back_monitor_db_destroy( be );
+
+               ldap_pvt_thread_mutex_lock( &li->li_conninfo.lai_mutex );
 
-               ldap_pvt_thread_mutex_lock( &li->conn_mutex );
+               if ( li->li_uri != NULL ) {
+                       ch_free( li->li_uri );
+                       li->li_uri = NULL;
 
-               if ( li->url != NULL ) {
-                       ch_free( li->url );
-                       li->url = NULL;
+                       assert( li->li_bvuri != NULL );
+                       ber_bvarray_free( li->li_bvuri );
+                       li->li_bvuri = NULL;
+               }
+               if ( !BER_BVISNULL( &li->li_acl_authcID ) ) {
+                       ch_free( li->li_acl_authcID.bv_val );
+                       BER_BVZERO( &li->li_acl_authcID );
+               }
+               if ( !BER_BVISNULL( &li->li_acl_authcDN ) ) {
+                       ch_free( li->li_acl_authcDN.bv_val );
+                       BER_BVZERO( &li->li_acl_authcDN );
                }
-               if ( li->lud ) {
-                       ldap_free_urldesc( li->lud );
-                       li->lud = NULL;
+               if ( !BER_BVISNULL( &li->li_acl_passwd ) ) {
+                       ch_free( li->li_acl_passwd.bv_val );
+                       BER_BVZERO( &li->li_acl_passwd );
                }
-               if ( !BER_BVISNULL( &li->acl_authcDN ) ) {
-                       ch_free( li->acl_authcDN.bv_val );
-                       BER_BVZERO( &li->acl_authcDN );
+               if ( !BER_BVISNULL( &li->li_acl_sasl_mech ) ) {
+                       ch_free( li->li_acl_sasl_mech.bv_val );
+                       BER_BVZERO( &li->li_acl_sasl_mech );
                }
-               if ( !BER_BVISNULL( &li->acl_passwd ) ) {
-                       ch_free( li->acl_passwd.bv_val );
-                       BER_BVZERO( &li->acl_passwd );
+               if ( !BER_BVISNULL( &li->li_acl_sasl_realm ) ) {
+                       ch_free( li->li_acl_sasl_realm.bv_val );
+                       BER_BVZERO( &li->li_acl_sasl_realm );
                }
-               if ( !BER_BVISNULL( &li->idassert_authcID ) ) {
-                       ch_free( li->idassert_authcID.bv_val );
-                       BER_BVZERO( &li->idassert_authcID );
+               if ( !BER_BVISNULL( &li->li_idassert_authcID ) ) {
+                       ch_free( li->li_idassert_authcID.bv_val );
+                       BER_BVZERO( &li->li_idassert_authcID );
                }
-               if ( !BER_BVISNULL( &li->idassert_authcDN ) ) {
-                       ch_free( li->idassert_authcDN.bv_val );
-                       BER_BVZERO( &li->idassert_authcDN );
+               if ( !BER_BVISNULL( &li->li_idassert_authcDN ) ) {
+                       ch_free( li->li_idassert_authcDN.bv_val );
+                       BER_BVZERO( &li->li_idassert_authcDN );
                }
-               if ( !BER_BVISNULL( &li->idassert_passwd ) ) {
-                       ch_free( li->idassert_passwd.bv_val );
-                       BER_BVZERO( &li->idassert_passwd );
+               if ( !BER_BVISNULL( &li->li_idassert_passwd ) ) {
+                       ch_free( li->li_idassert_passwd.bv_val );
+                       BER_BVZERO( &li->li_idassert_passwd );
                }
-               if ( !BER_BVISNULL( &li->idassert_authzID ) ) {
-                       ch_free( li->idassert_authzID.bv_val );
-                       BER_BVZERO( &li->idassert_authzID );
+               if ( !BER_BVISNULL( &li->li_idassert_authzID ) ) {
+                       ch_free( li->li_idassert_authzID.bv_val );
+                       BER_BVZERO( &li->li_idassert_authzID );
                }
-               if ( !BER_BVISNULL( &li->idassert_sasl_mech ) ) {
-                       ch_free( li->idassert_sasl_mech.bv_val );
-                       BER_BVZERO( &li->idassert_sasl_mech );
+               if ( !BER_BVISNULL( &li->li_idassert_sasl_mech ) ) {
+                       ch_free( li->li_idassert_sasl_mech.bv_val );
+                       BER_BVZERO( &li->li_idassert_sasl_mech );
                }
-               if ( !BER_BVISNULL( &li->idassert_sasl_realm ) ) {
-                       ch_free( li->idassert_sasl_realm.bv_val );
-                       BER_BVZERO( &li->idassert_sasl_realm );
+               if ( !BER_BVISNULL( &li->li_idassert_sasl_realm ) ) {
+                       ch_free( li->li_idassert_sasl_realm.bv_val );
+                       BER_BVZERO( &li->li_idassert_sasl_realm );
+               }
+               if ( li->li_idassert_authz != NULL ) {
+                       ber_bvarray_free( li->li_idassert_authz );
+                       li->li_idassert_authz = NULL;
+               }
+                       if ( li->li_conninfo.lai_tree ) {
+                       avl_free( li->li_conninfo.lai_tree, ldap_back_conn_free );
+               }
+               for ( i = LDAP_BACK_PCONN_FIRST; i < LDAP_BACK_PCONN_LAST; i++ ) {
+                       while ( !LDAP_TAILQ_EMPTY( &li->li_conn_priv[ i ].lic_priv ) ) {
+                               ldapconn_t      *lc = LDAP_TAILQ_FIRST( &li->li_conn_priv[ i ].lic_priv );
+
+                               LDAP_TAILQ_REMOVE( &li->li_conn_priv[ i ].lic_priv, lc, lc_q );
+                               ldap_back_conn_free( lc );
+                       }
                }
-                if ( li->conntree ) {
-                       avl_free( li->conntree, ldap_back_conn_free );
+               if ( LDAP_BACK_QUARANTINE( li ) ) {
+                       slap_retry_info_destroy( &li->li_quarantine );
+                       ldap_pvt_thread_mutex_destroy( &li->li_quarantine_mutex );
                }
 
-               ldap_pvt_thread_mutex_unlock( &li->conn_mutex );
-               ldap_pvt_thread_mutex_destroy( &li->conn_mutex );
+               ldap_pvt_thread_mutex_unlock( &li->li_conninfo.lai_mutex );
+               ldap_pvt_thread_mutex_destroy( &li->li_conninfo.lai_mutex );
+               ldap_pvt_thread_mutex_destroy( &li->li_uri_mutex );
        }
 
        ch_free( be->be_private );