}
}
- ldap_pvt_thread_mutex_init( &SLAPD_GLOBAL(runqueue).rq_mutex );
- LDAP_STAILQ_INIT( &SLAPD_GLOBAL(runqueue).task_list );
- LDAP_STAILQ_INIT( &SLAPD_GLOBAL(runqueue).run_list );
+ ldap_pvt_thread_mutex_init( &syncrepl_rq.rq_mutex );
+ LDAP_STAILQ_INIT( &syncrepl_rq.task_list );
+ LDAP_STAILQ_INIT( &syncrepl_rq.run_list );
/* open each backend database */
for( i = 0; i < nBackendDB; i++ ) {
LDAP_STAILQ_FOREACH( si, &backendDB[i].be_syncinfo, si_next ) {
si->si_be = &backendDB[i];
init_syncrepl( si );
- ldap_pvt_thread_mutex_lock( &SLAPD_GLOBAL(runqueue).rq_mutex );
- ldap_pvt_runqueue_insert( &SLAPD_GLOBAL(runqueue),
+ ldap_pvt_thread_mutex_lock( &syncrepl_rq.rq_mutex );
+ ldap_pvt_runqueue_insert( &syncrepl_rq,
si->si_interval, do_syncrepl, (void *) si );
- ldap_pvt_thread_mutex_unlock( &SLAPD_GLOBAL(runqueue).rq_mutex );
+ ldap_pvt_thread_mutex_unlock( &syncrepl_rq.rq_mutex );
}
}
}
}
#if defined( SLAPD_CRYPT ) || defined( SLAPD_SPASSWD )
- ldap_pvt_thread_mutex_lock( &SLAPD_GLOBAL(passwd_mutex) );
+ ldap_pvt_thread_mutex_lock( &passwd_mutex );
#ifdef SLAPD_SPASSWD
lutil_passwd_sasl_conn = op->o_conn->c_sasl_authctx;
#endif
#ifdef SLAPD_SPASSWD
lutil_passwd_sasl_conn = NULL;
#endif
- ldap_pvt_thread_mutex_unlock( &SLAPD_GLOBAL(passwd_mutex) );
+ ldap_pvt_thread_mutex_unlock( &passwd_mutex );
#endif
return result == 0;
return rs->sr_err;
}
- if( !( SLAPD_GLOBAL(allows) & SLAP_ALLOW_UPDATE_ANON ) &&
+ if( !( global_allows & SLAP_ALLOW_UPDATE_ANON ) &&
op->o_ndn.bv_len == 0 )
{
rs->sr_text = "modifications require authentication";