#ifdef SLAPD_META
#include "back-meta/external.h"
#endif
+#ifdef SLAPD_MONITOR
+#include "back-monitor/external.h"
+#endif
#ifdef SLAPD_PASSWD
#include "back-passwd/external.h"
#endif
#if defined(SLAPD_META) && !defined(SLAPD_META_DYNAMIC)
{"meta", meta_back_initialize},
#endif
+#if defined(SLAPD_MONITOR) && !defined(SLAPD_MONITOR_DYNAMIC)
+ {"monitor", monitor_back_initialize},
+#endif
#if defined(SLAPD_PASSWD) && !defined(SLAPD_PASSWD_DYNAMIC)
{"passwd", passwd_back_initialize},
#endif
if(rc != 0) {
#ifdef NEW_LOGGING
LDAP_LOG(( "backend", LDAP_LEVEL_INFO,
- "backend_init: initialized for type \"%s\"\n",
- binfo[nBackendInfo].bi_type ));
+ "backend_init: initialized for type \"%s\"\n",
+ binfo[nBackendInfo].bi_type ));
#else
Debug( LDAP_DEBUG_ANY,
"backend_init: initialized for type \"%s\"\n",
- binfo[nBackendInfo].bi_type, 0, 0 );
+ binfo[nBackendInfo].bi_type, 0, 0 );
#endif
/* destroy those we've already inited */
for( nBackendInfo--;
#else
#ifdef NEW_LOGGING
- LDAP_LOG(( "backend", LDAP_LEVEL_ERR,
- "backend_init: failed\n" ));
+ LDAP_LOG(( "backend", LDAP_LEVEL_ERR,
+ "backend_init: failed\n" ));
#else
- Debug( LDAP_DEBUG_ANY,
+ Debug( LDAP_DEBUG_ANY,
"backend_init: failed\n",
0, 0, 0 );
#endif
return -1;
}
-
-int backend_sync( Backend *be )
-{
- int i;
- int rc = 0;
-
- if( be != NULL ) {
- /* sync a specific backend database */
-
- if ( be->bd_info->bi_nDB == 0 ) {
- /* no database of this type, we never opened it */
- return 0;
- }
-
- if ( be->bd_info->bi_db_sync ) {
- be->bd_info->bi_db_sync( be );
- }
-
- return 0;
- }
-
- /* sync each backend database */
- for( i = 0; i < nBackendDB; i++ ) {
- if ( backendDB[i].bd_info->bi_db_sync ) {
- rc = backendDB[i].bd_info->bi_db_sync(
- &backendDB[i] );
- }
-
- if(rc != 0) {
- Debug( LDAP_DEBUG_ANY,
- "backend_sync: bi_sync %s failed!\n",
- backendDB[i].be_type, 0, 0 );
- }
- }
-
- return 0;
-}
-
-
int backend_shutdown( Backend *be )
{
int i;
be = &backends[nbackends++];
be->bd_info = bi;
- be->be_sizelimit = defsize;
- be->be_timelimit = deftime;
+ be->be_def_limit = deflimit;
be->be_dfltaccess = global_default_access;
be->be_restrictops = global_restrictops;
AttributeDescription *group_at
)
{
+ GroupAssertion *g;
+ int len = strlen(gr_ndn);
+ int i;
+
+ ldap_pvt_thread_mutex_lock( &op->o_abandonmutex );
+ i = op->o_abandon;
+ ldap_pvt_thread_mutex_unlock( &op->o_abandonmutex );
+ if (i)
+ return SLAPD_ABANDON;
+
+ ldap_pvt_thread_mutex_lock( &conn->c_mutex );
+ for (g = conn->c_groups; g; g=g->next) {
+ if (g->be != be || g->oc != group_oc || g->at != group_at ||
+ g->len != len)
+ continue;
+ if (strcmp( g->ndn, gr_ndn ) == 0)
+ break;
+ }
+ ldap_pvt_thread_mutex_unlock( &conn->c_mutex );
+ if (g)
+ return g->res;
+
if( strcmp( target->e_ndn, gr_ndn ) != 0 ) {
/* we won't attempt to send it to a different backend */
}
if( be->be_group ) {
- return be->be_group( be, conn, op,
+ int res = be->be_group( be, conn, op,
target, gr_ndn, op_ndn,
group_oc, group_at );
+
+ if (op->o_tag != LDAP_REQ_BIND) {
+ g = ch_malloc(sizeof(GroupAssertion) + len);
+ g->be = be;
+ g->oc = group_oc;
+ g->at = group_at;
+ g->res = res;
+ g->len = len;
+ strcpy(g->ndn, gr_ndn);
+ ldap_pvt_thread_mutex_lock( &conn->c_mutex );
+ g->next = conn->c_groups;
+ conn->c_groups = g;
+ ldap_pvt_thread_mutex_unlock( &conn->c_mutex );
+ }
+
+ return res;
}
return LDAP_UNWILLING_TO_PERFORM;
#ifdef SLAPD_SCHEMA_DN
a = ch_malloc( sizeof( Attribute ) );
- a->a_desc = ad_dup( slap_schema.si_ad_subschemaSubentry );
+ a->a_desc = slap_schema.si_ad_subschemaSubentry;
/* Should be backend specific */
a->a_vals = ch_malloc( 2 * sizeof( struct berval * ) );