]> git.sur5r.net Git - openldap/blobdiff - servers/slapd/daemon.c
Fix pkiUser
[openldap] / servers / slapd / daemon.c
index 2ab0fa769ff440d01a274ad3dab7c4eb701dc4e1..1a72f5b070348f87c04c9a8c7088d5cb68160901 100644 (file)
@@ -33,6 +33,8 @@ int deny_severity = LOG_NOTICE;
 #define LDAPI_MOD_URLEXT               "x-mod"
 #endif /* LDAP_PF_LOCAL */
 
+int slap_inet4or6 = AF_UNSPEC;
+
 /* globals */
 time_t starttime;
 ber_socket_t dtblsize;
@@ -55,12 +57,12 @@ do { if (w) tcp_write( wake_sds[1], "0", 1 ); } while(0)
 #ifndef HAVE_WINSOCK
 static
 #endif
-volatile sig_atomic_t slapd_shutdown = 0;
+volatile sig_atomic_t slapd_shutdown = 0, slapd_gentle_shutdown = 0;
 
 static struct slap_daemon {
        ldap_pvt_thread_mutex_t sd_mutex;
 
-       int sd_nactives;
+       ber_socket_t sd_nactives;
 
 #ifndef HAVE_WINSOCK
        /* In winsock, accept() returns values higher than dtblsize
@@ -192,6 +194,8 @@ static void slapd_add(ber_socket_t s) {
        }
 #endif
 
+       slap_daemon.sd_nactives++;
+
        FD_SET( s, &slap_daemon.sd_actives );
        FD_SET( s, &slap_daemon.sd_readers );
 
@@ -216,6 +220,8 @@ static void slapd_add(ber_socket_t s) {
 void slapd_remove(ber_socket_t s, int wake) {
        ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
 
+       slap_daemon.sd_nactives--;
+
 #ifdef NEW_LOGGING
        LDAP_LOG(( "connection", LDAP_LEVEL_DETAIL1,
                   "slapd_remove: removing %ld%s%s\n",
@@ -233,7 +239,7 @@ void slapd_remove(ber_socket_t s, int wake) {
        FD_CLR( s, &slap_daemon.sd_writers );
 
        ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
-       WAKE_LISTENER(wake);
+       WAKE_LISTENER(wake || slapd_gentle_shutdown == 2);
 }
 
 void slapd_clr_write(ber_socket_t s, int wake) {
@@ -410,7 +416,7 @@ static int slap_get_listener_addresses(
                memset( &hints, '\0', sizeof(hints) );
                hints.ai_flags = AI_PASSIVE;
                hints.ai_socktype = SOCK_STREAM;
-               hints.ai_family = AF_UNSPEC;
+               hints.ai_family = slap_inet4or6;
                snprintf(serv, sizeof serv, "%d", port);
 
                if ( (err = getaddrinfo(host, serv, &hints, &res)) ) {
@@ -486,13 +492,15 @@ static int slap_get_listener_addresses(
 
                freeaddrinfo(res);
 #else
+               int i, n = 1;
                struct in_addr in;
+               struct hostent *he = NULL;
 
                if ( host == NULL ) {
                        in.s_addr = htonl(INADDR_ANY);
 
                } else if ( !inet_aton( host, &in ) ) {
-                       struct hostent *he = gethostbyname( host );
+                       he = gethostbyname( host );
                        if( he == NULL ) {
 #ifdef NEW_LOGGING
                                LDAP_LOG(( "connection", LDAP_LEVEL_INFO,
@@ -504,25 +512,30 @@ static int slap_get_listener_addresses(
 #endif
                                return -1;
                        }
-                       AC_MEMCPY( &in, he->h_addr, sizeof( in ) );
+                       for (n = 0; he->h_addr_list[n]; n++) ;
                }
 
-               *sal = ch_malloc(2 * sizeof(void *));
+               *sal = ch_malloc((n+1) * sizeof(void *));
                if (*sal == NULL) {
                        return -1;
                }
 
                sap = *sal;
-               *sap = ch_malloc(sizeof(struct sockaddr_in));
-               if (*sap == NULL) {
-                       goto errexit;
+               for ( i = 0; i<n; i++ ) {
+                       sap[i] = ch_malloc(sizeof(struct sockaddr_in));
+                       if (*sap == NULL) {
+                               goto errexit;
+                       }
+                       (void)memset( (void *)sap[i], '\0', sizeof(struct sockaddr_in) );
+                       sap[i]->sa_family = AF_INET;
+                       ((struct sockaddr_in *)sap[i])->sin_port = htons(port);
+                       if (he) {
+                               AC_MEMCPY( &((struct sockaddr_in *)sap[i])->sin_addr, he->h_addr_list[i], sizeof(struct in_addr) );
+                       } else {
+                               AC_MEMCPY( &((struct sockaddr_in *)sap[i])->sin_addr, &in, sizeof(struct in_addr) );
+                       }
                }
-               sap[1] = NULL;
-
-               (void)memset( (void *)*sap, '\0', sizeof(struct sockaddr_in) );
-               (*sap)->sa_family = AF_INET;
-               ((struct sockaddr_in *)*sap)->sin_port = htons(port);
-               ((struct sockaddr_in *)*sap)->sin_addr = in;
+               sap[i] = NULL;
 #endif
        }
 
@@ -533,10 +546,13 @@ errexit:
        return -1;
 }
 
-static Listener * slap_open_listener(
-       const char* url )
+static int slap_open_listener(
+       const char* url,
+       int *listeners,
+       int *cur
+       )
 {
-       int     tmp, rc;
+       int     num, tmp, rc;
        Listener l;
        Listener *li;
        LDAPURLDesc *lud;
@@ -561,7 +577,7 @@ static Listener * slap_open_listener(
                        "daemon: listen URL \"%s\" parse error=%d\n",
                        url, rc, 0 );
 #endif
-               return NULL;
+               return rc;
        }
 
 #ifndef HAVE_TLS
@@ -576,7 +592,7 @@ static Listener * slap_open_listener(
                        url, 0, 0 );
 #endif
                ldap_free_urldesc( lud );
-               return NULL;
+               return -1;
        }
 
        if(! lud->lud_port ) {
@@ -616,7 +632,7 @@ static Listener * slap_open_listener(
                        url, 0, 0);
 #endif
                ldap_free_urldesc( lud );
-               return NULL;
+               return -1;
 #endif
        } else {
 #ifdef LDAP_CONNECTIONLESS
@@ -633,7 +649,16 @@ static Listener * slap_open_listener(
 
        ldap_free_urldesc( lud );
        if ( err ) {
-               return NULL;
+               return -1;
+       }
+
+       /* If we got more than one address returned, we need to make space
+        * for it in the slap_listeners array.
+        */
+       for ( num=0; sal[num]; num++ );
+       if ( num > 1 ) {
+               *listeners += num-1;
+               slap_listeners = ch_realloc( slap_listeners, (*listeners + 1) * sizeof(Listener *) );
        }
 
        psal = sal;
@@ -718,6 +743,24 @@ static Listener * slap_open_listener(
                        break;
 #ifdef LDAP_PF_INET6
                case AF_INET6:
+#ifdef IPV6_V6ONLY
+                       /* Try to use IPv6 sockets for IPv6 only */
+                       tmp = 1;
+                       rc = setsockopt( l.sl_sd, IPPROTO_IPV6, IPV6_V6ONLY,
+                                        (char *) &tmp, sizeof(tmp) );
+                       if ( rc == AC_SOCKET_ERROR ) {
+                               int err = sock_errno();
+#ifdef NEW_LOGGING
+                               LDAP_LOG(( "connection", LDAP_LEVEL_INFO,
+                                          "slap_open_listener: setsockopt( %ld, IPV6_V6ONLY ) failed errno %d (%s)\n",
+                                          (long)l.sl_sd, err, sock_errstr(err) ));
+#else
+                               Debug( LDAP_DEBUG_ANY,
+                                      "slapd(%ld): setsockopt(IPV6_V6ONLY) failed errno=%d (%s)\n",
+                                      (long) l.sl_sd, err, sock_errstr(err) );
+#endif
+                       }
+#endif
                        addrlen = sizeof(struct sockaddr_in6);
                        break;
 #endif
@@ -728,9 +771,8 @@ static Listener * slap_open_listener(
 #endif
                }
 
-               if (!bind(l.sl_sd, *sal, addrlen))
-                       break;
-               err = sock_errno();
+               if (bind(l.sl_sd, *sal, addrlen)) {
+                       err = sock_errno();
 #ifdef NEW_LOGGING
                LDAP_LOG(( "connection", LDAP_LEVEL_INFO,
                           "slap_open_listener: bind(%ld) failed errno=%d (%s)\n",
@@ -739,21 +781,10 @@ static Listener * slap_open_listener(
                Debug( LDAP_DEBUG_ANY, "daemon: bind(%ld) failed errno=%d (%s)\n",
                       (long) l.sl_sd, err, sock_errstr(err) );
 #endif
-               tcp_close( l.sl_sd );
-               sal++;
-       } /* while ( *sal != NULL ) */
-
-       if ( *sal == NULL ) {
-#ifdef NEW_LOGGING
-               LDAP_LOG(( "connection", LDAP_LEVEL_INFO,
-                          "slap_open_listener: bind(%ld) failed.\n", (long)l.sl_sd ));
-#else
-               Debug( LDAP_DEBUG_ANY, "daemon: bind(%ld) failed\n",
-                       (long) l.sl_sd, 0, 0 );
-#endif
-               slap_free_listener_addresses(psal);
-               return NULL;
-       }
+                       tcp_close( l.sl_sd );
+                       sal++;
+                       continue;
+               }
 
        switch ( (*sal)->sa_family ) {
 #ifdef LDAP_PF_LOCAL
@@ -771,7 +802,7 @@ static Listener * slap_open_listener(
 #endif
                        tcp_close( l.sl_sd );
                        slap_free_listener_addresses(psal);
-                       return NULL;
+                       return -1;
                }
                l.sl_name = ch_malloc( strlen(addr) + sizeof("PATH=") );
                sprintf( l.sl_name, "PATH=%s", addr );
@@ -817,20 +848,27 @@ static Listener * slap_open_listener(
                break;
        }
 
-       slap_free_listener_addresses(psal);
-
+       AC_MEMCPY(&l.sl_sa, *sal, addrlen);
        l.sl_url = ch_strdup( url );
        li = ch_malloc( sizeof( Listener ) );
        *li = l;
+       slap_listeners[*cur] = li;
+       (*cur)++;
+       sal++;
+
+       } /* while ( *sal != NULL ) */
+
+       slap_free_listener_addresses(psal);
+
 
 #ifdef NEW_LOGGING
        LDAP_LOG(( "connection", LDAP_LEVEL_RESULTS,
-                  "slap_open_listener: daemon initialzed %s\n", l.sl_url ));
+                  "slap_open_listener: daemon initialized %s\n", l.sl_url ));
 #else
        Debug( LDAP_DEBUG_TRACE, "daemon: initialized %s\n",
                l.sl_url, 0, 0 );
 #endif
-       return li;
+       return 0;
 }
 
 static int sockinit(void);
@@ -838,7 +876,7 @@ static int sockdestroy(void);
 
 int slapd_daemon_init( const char *urls )
 {
-       int i, rc;
+       int i, j, n, rc;
        char **u;
 
 #ifdef NEW_LOGGING
@@ -934,15 +972,13 @@ int slapd_daemon_init( const char *urls )
 #endif
        slap_listeners = ch_malloc( (i+1)*sizeof(Listener *) );
 
-       for(i = 0; u[i] != NULL; i++ ) {
-               slap_listeners[i] = slap_open_listener( u[i] );
-
-               if( slap_listeners[i] == NULL ) {
+       for(n = 0, j = 0; u[n]; n++ ) {
+               if ( slap_open_listener( u[n], &i, &j ) ) {
                        charray_free( u );
                        return -1;
                }
        }
-       slap_listeners[i] = NULL;
+       slap_listeners[j] = NULL;
 
 #ifdef NEW_LOGGING
        LDAP_LOG(( "connection", LDAP_LEVEL_DETAIL1,
@@ -980,6 +1016,34 @@ slapd_daemon_destroy(void)
 }
 
 
+static void
+close_listeners(
+       int remove
+)
+{
+       int l;
+
+       for ( l = 0; slap_listeners[l] != NULL; l++ ) {
+               if ( slap_listeners[l]->sl_sd != AC_SOCKET_INVALID ) {
+                       if ( remove )
+                               slapd_remove( slap_listeners[l]->sl_sd, 0 );
+#ifdef LDAP_PF_LOCAL
+                       if ( slap_listeners[l]->sl_sa.sa_addr.sa_family == AF_LOCAL ) {
+                               unlink( slap_listeners[l]->sl_sa.sa_un_addr.sun_path );
+                       }
+#endif /* LDAP_PF_LOCAL */
+                       slapd_close( slap_listeners[l]->sl_sd );
+               }
+               if ( slap_listeners[l]->sl_url )
+                       free ( slap_listeners[l]->sl_url );
+               if ( slap_listeners[l]->sl_name )
+                       free ( slap_listeners[l]->sl_name );
+               free ( slap_listeners[l] );
+               slap_listeners[l] = NULL;
+       }
+}
+
+
 static void *
 slapd_daemon_task(
        void *ptr
@@ -1009,6 +1073,43 @@ slapd_daemon_task(
 
                if ( listen( slap_listeners[l]->sl_sd, SLAPD_LISTEN ) == -1 ) {
                        int err = sock_errno();
+
+#ifdef LDAP_PF_INET6
+                       /* If error is EADDRINUSE, we are trying to listen to INADDR_ANY and
+                        * we are already listening to in6addr_any, then we want to ignore
+                        * this and continue.
+                        */
+                       if ( err == EADDRINUSE ) {
+                               int i;
+                               struct sockaddr_in sa = slap_listeners[l]->sl_sa.sa_in_addr;
+                               struct sockaddr_in6 sa6;
+                               
+                               if ( sa.sin_family == AF_INET &&
+                                    sa.sin_addr.s_addr == htonl(INADDR_ANY) ) {
+                                       for ( i = 0 ; i < l; i++ ) {
+                                               sa6 = slap_listeners[i]->sl_sa.sa_in6_addr;
+                                               if ( sa6.sin6_family == AF_INET6 &&
+                                                    !memcmp( &sa6.sin6_addr, &in6addr_any, sizeof(struct in6_addr) ) )
+                                                       break;
+                                       }
+
+                                       if ( i < l ) {
+                                               /* We are already listening to in6addr_any */
+#ifdef NEW_LOGGING
+                                               LDAP_LOG(( "connection", LDAP_LEVEL_WARNING,
+                                                          "slapd_daemon_task: Attempt to listen to 0.0.0.0 failed, already listening on ::, assuming IPv4 included\n" ));
+#else
+                                               Debug( LDAP_DEBUG_CONNS,
+                                                      "daemon: Attempt to listen to 0.0.0.0 failed, already listening on ::, assuming IPv4 included\n",
+                                                      0, 0, 0 );
+#endif
+                                               slapd_close( slap_listeners[l]->sl_sd );
+                                               slap_listeners[l]->sl_sd = AC_SOCKET_INVALID;
+                                               continue;
+                                       }
+                               }
+                       }
+#endif                         
 #ifdef NEW_LOGGING
                        LDAP_LOG(( "connection", LDAP_LEVEL_ERR,
                                   "slapd_daemon_task: listen( %s, 5 ) failed errno=%d (%s)\n",
@@ -1066,6 +1167,27 @@ slapd_daemon_task(
                        }
                }
 
+#ifdef SIGHUP
+               if( slapd_gentle_shutdown ) {
+                       ber_socket_t active;
+
+                       if( slapd_gentle_shutdown == 1 ) {
+                               Debug( LDAP_DEBUG_ANY, "slapd gentle shutdown\n", 0, 0, 0 );
+                               close_listeners( 1 );
+                               global_restrictops |= SLAP_RESTRICT_OP_WRITES;
+                               slapd_gentle_shutdown = 2;
+                       }
+
+                       ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
+                       active = slap_daemon.sd_nactives;
+                       ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
+                       if( active == 0 ) {
+                               slapd_shutdown = 2;
+                               break;
+                       }
+               }
+#endif
+
                FD_ZERO( &writefds );
                FD_ZERO( &readfds );
 
@@ -1393,10 +1515,12 @@ slapd_daemon_task(
                                         (unsigned) ntohs( from.sa_in6_addr.sin6_port ) );
                        } else {
                                char addr[INET6_ADDRSTRLEN];
+
+                               peeraddr = (char *) inet_ntop( AF_INET6,
+                                                     &from.sa_in6_addr.sin6_addr,
+                                                     addr, sizeof addr );
                                sprintf( peername, "IP=%s %d",
-                                        inet_ntop( AF_INET6,
-                                                   &from.sa_in6_addr.sin6_addr,
-                                                   addr, sizeof addr) ? addr : "unknown",
+                                        peeraddr != NULL ? peeraddr : "unknown",
                                         (unsigned) ntohs( from.sa_in6_addr.sin6_port ) );
                        }
                        break;
@@ -1716,21 +1840,8 @@ slapd_daemon_task(
 #endif
        }
 
-       for ( l = 0; slap_listeners[l] != NULL; l++ ) {
-               if ( slap_listeners[l]->sl_sd != AC_SOCKET_INVALID ) {
-#ifdef LDAP_PF_LOCAL
-                       if ( slap_listeners[l]->sl_sa.sa_addr.sa_family == AF_LOCAL ) {
-                               unlink( slap_listeners[l]->sl_sa.sa_un_addr.sun_path );
-                       }
-#endif /* LDAP_PF_LOCAL */
-                       slapd_close( slap_listeners[l]->sl_sd );
-               }
-               if ( slap_listeners[l]->sl_url )
-                       free ( slap_listeners[l]->sl_url );
-               if ( slap_listeners[l]->sl_name )
-                       free ( slap_listeners[l]->sl_name );
-               free ( slap_listeners[l] );
-       }
+       if( slapd_gentle_shutdown != 2 )
+               close_listeners ( 0 );
        free ( slap_listeners );
        slap_listeners = NULL;
 
@@ -1862,6 +1973,11 @@ slap_sig_shutdown( int sig )
                  0, 0, 0);
 #endif
        else
+#endif
+#ifdef SIGHUP
+       if (sig == SIGHUP && global_gentlehup && slapd_gentle_shutdown == 0)
+               slapd_gentle_shutdown = 1;
+       else
 #endif
        slapd_shutdown = 1;