#include <ac/signal.h>
#include <ac/errno.h>
-#include "ldapconfig.h"
+#include "ldap_defaults.h"
#include "slap.h"
-#include "lutil.h" /* Get lutil_detach() */
+#include "lutil.h"
#ifdef LDAP_SIGCHLD
static RETSIGTYPE wait4child( int sig );
#endif
+#ifdef HAVE_WINSOCK
+#define MAIN_RETURN(x) return
+struct sockaddr_in bind_addr;
+
+/* in nt_main.c */
+extern SERVICE_STATUS SLAPDServiceStatus;
+extern SERVICE_STATUS_HANDLE hSLAPDServiceStatus;
+extern ldap_pvt_thread_cond_t started_event, stopped_event;
+extern int is_NT_Service;
+
+void LogSlapdStartedEvent( char *svc, int slap_debug, char *configfile, short port, int udp );
+void LogSlapdStoppedEvent( char *svc );
+
+void CommenceStartupProcessing( LPCTSTR serviceName,
+ void(*stopper)(int));
+void ReportSlapdShutdownComplete( void );
+void *getRegParam( char *svc, char *value );
+
+#define SERVICE_EXIT( e, n ) \
+ if ( is_NT_Service ) \
+{ \
+ SLAPDServiceStatus.dwWin32ExitCode = e; \
+ SLAPDServiceStatus.dwServiceSpecificExitCode = n; \
+}
+#else
+#define SERVICE_EXIT( e, n )
+#define MAIN_RETURN(x) return(x)
+#endif
+
+short port = LDAP_PORT;
+#ifdef HAVE_TLS
+short tls_port = LDAP_TLS_PORT;
+#endif
/*
* when more than one slapd is running on one machine, each one might have
* it's own LOCAL for syslogging and must have its own pid/args files
*/
+#ifndef HAVE_MKVERSION
+const char Versionstr[] =
+ OPENLDAP_PACKAGE " " OPENLDAP_VERSION " Standalone LDAP Server (slapd)";
+#endif
+
#ifdef LOG_LOCAL4
#define DEFAULT_SYSLOG_USER LOG_LOCAL4
{
fprintf( stderr, "usage: %s [-d ?|debuglevel] [-f configfile] [-p portnumber] [-s sysloglevel]", name );
fprintf( stderr, "\n [-a bind-address] [-i] [-u]" );
+#ifdef HAVE_WINSOCK
+ fprintf( stderr, " [-n NTserviceName]" );
+#endif
+#if LDAP_CONNECTIONLESS
+ fprintf( stderr, " [-c]" );
+#endif
#ifdef SLAPD_BDB2
fprintf( stderr, " [-t]" );
#endif
#ifdef LOG_LOCAL4
fprintf( stderr, " [-l sysloguser]" );
+#endif
+#if defined(HAVE_SETUID) && defined(HAVE_SETGID)
+ fprintf( stderr, " [-u user] [-g group]" );
#endif
fprintf( stderr, "\n" );
}
time_t starttime;
+struct sockaddr_in bind_addr;
+ber_int_t tcps;
+#ifdef HAVE_TLS
+struct sockaddr_in tls_bind_addr;
+ber_int_t tls_tcps;
+#endif
-int
-main( int argc, char **argv )
+#ifdef HAVE_WINSOCK
+void WINAPI ServiceMain( DWORD argc, LPTSTR *argv )
+#else
+int main( int argc, char **argv )
+#endif
{
int i;
int inetd = 0;
int rc;
- struct sockaddr_in bind_addr, *slapd_addr;
+ struct slapd_args args;
int udp;
+#if defined(HAVE_SETUID) && defined(HAVE_SETGID)
+ char *username = NULL;
+ char *groupname = NULL;
+#endif
#ifdef LOG_LOCAL4
int syslogUser = DEFAULT_SYSLOG_USER;
#endif
- char *configfile;
+#ifdef HAVE_WINSOCK
+ char *NTservice = SERVICE_NAME;
+ char *configfile = ".\\slapd.conf";
+#else
+ char *configfile = SLAPD_DEFAULT_CONFIGFILE;
+#endif
char *serverName;
int serverMode = SLAP_SERVER_MODE;
-
- configfile = SLAPD_DEFAULT_CONFIGFILE;
+ int use_tls_port = 0;
(void) memset( (void*) &bind_addr, '\0', sizeof(bind_addr));
bind_addr.sin_family = AF_INET;
bind_addr.sin_addr.s_addr = htonl(INADDR_ANY);
- bind_addr.sin_port = htons(LDAP_PORT);
+ bind_addr.sin_port = htons(port);
+#ifdef HAVE_TLS
+ tls_bind_addr.sin_family = AF_INET;
+ tls_bind_addr.sin_addr.s_addr = htonl(INADDR_ANY);
+ tls_bind_addr.sin_port = htons(tls_port);
+#endif
g_argc = argc;
g_argv = argv;
+#ifdef HAVE_WINSOCK
+ {
+ int *newPort;
+ int *newDebugLevel;
+ char *newConfigFile;
+ ldap_debug = 0xffff;
+ if ( is_NT_Service ) CommenceStartupProcessing( NTservice, slap_set_shutdown );
+ newPort = (int*)getRegParam( NULL, "Port" );
+ if ( newPort != NULL )
+ {
+ port = *newPort;
+ bind_addr.sin_port = htons(port);
+ Debug ( LDAP_DEBUG_ANY, "new port from registry is: %d\n", port, 0, 0 );
+ }
+ newDebugLevel = (int*)getRegParam( NULL, "DebugLevel" );
+ if ( newDebugLevel != NULL )
+ {
+ slap_debug = *newDebugLevel;
+ Debug( LDAP_DEBUG_ANY, "new debug level from registry is: %d\n", slap_debug, 0, 0 );
+ }
+ newConfigFile = (char*)getRegParam( NULL, "ConfigFile" );
+ if ( newConfigFile != NULL )
+ {
+ configfile = newConfigFile;
+ Debug ( LDAP_DEBUG_ANY, "new config file from registry is: %s\n", configfile, 0, 0 );
+ }
+ }
+#endif
+
while ( (i = getopt( argc, argv,
"d:f:ia:p:s:u"
#ifdef LOG_LOCAL4
#endif
#ifdef SLAPD_BDB2
"t"
+#endif
+#if defined(HAVE_SETUID) && defined(HAVE_SETGID)
+ "u:g:"
+#endif
+#ifdef LDAP_CONNECTIONLESS
+ "c"
+#endif
+#ifdef HAVE_WINSOCK
+ "n:"
+#endif
+#ifdef HAVE_TLS
+ "P:T"
#endif
)) != EOF ) {
switch ( i ) {
case 'a': /* bind address */
#ifdef HAVE_WINSOCK
- if(!(bind_addr.sin_addr.S_un.S_addr = inet_addr(optarg))) {
+ if(!(bind_addr.sin_addr.S_un.S_addr = inet_addr(optarg)))
#else
- if(!inet_aton(optarg, &bind_addr.sin_addr)) {
+ if(!inet_aton(optarg, &bind_addr.sin_addr))
#endif
+ {
fprintf(stderr, "invalid address (%s) for -a option", optarg);
}
+#ifdef HAVE_TLS
+#ifdef HAVE_WINSOCK
+ tls_bind_addr.sin_addr.S_un.S_addr = inet_addr(optarg);
+#else
+ inet_aton(optarg, &tls_bind_addr.sin_addr);
+#endif
+#endif
break;
#ifdef LDAP_DEBUG
break;
case 'p': { /* port on which to listen */
- short port = (short)atoi( optarg );
+ port = (short)atoi( optarg );
if(! port ) {
fprintf(stderr, "-p %s must be numeric\n", optarg);
} else {
}
} break;
+#ifdef HAVE_TLS
+ case 'P': { /* port on which to listen for TLS */
+ tls_port = (short)atoi( optarg );
+ if(! tls_port ) {
+ fprintf(stderr, "-P %s must be numeric\n", optarg);
+ } else {
+ tls_bind_addr.sin_port = htons(tls_port);
+ }
+ } break;
+#endif
+
case 's': /* set syslog level */
ldap_syslog = atoi( optarg );
break;
break;
#endif
- case 'u': /* do udp */
+#ifdef LDAP_CONNECTIONLESS
+ case 'c': /* do connectionless (udp) */
udp = 1;
break;
+#endif
#ifdef SLAPD_BDB2
case 't': /* timed server */
break;
#endif
+#if defined(HAVE_SETUID) && defined(HAVE_SETGID)
+ case 'u': /* user name */
+ if( username ) free(username);
+ username = ch_strdup( optarg );
+ break;
+
+ case 'g': /* group name */
+ if( groupname ) free(groupname);
+ groupname = ch_strdup( optarg );
+ break;
+#endif /* SETUID && GETUID */
+#ifdef HAVE_WINSOCK
+ case 'n': /* NT service name */
+ NTservice = ch_strdup( optarg );
+ break;
+#endif
+#ifdef HAVE_TLS
+ case 'T': /* Bind on TLS port */
+ use_tls_port = 1;
+ break;
+#endif
default:
usage( argv[0] );
- exit( 1 );
+ rc = 1;
+ SERVICE_EXIT( ERROR_SERVICE_SPECIFIC_ERROR, 15 );
+ goto stop;
}
}
- lber_set_option(NULL, LBER_OPT_DEBUG_LEVEL, &slap_debug);
+ ber_set_option(NULL, LBER_OPT_DEBUG_LEVEL, &slap_debug);
ldap_set_option(NULL, LDAP_OPT_DEBUG_LEVEL, &slap_debug);
ldif_debug = slap_debug;
Debug( LDAP_DEBUG_TRACE, "%s", Versionstr, 0, 0 );
- if ( (serverName = strrchr( argv[0], '/' )) == NULL ) {
+ if ( (serverName = strrchr( argv[0], *LDAP_DIRSEP )) == NULL ) {
serverName = ch_strdup( argv[0] );
} else {
serverName = ch_strdup( serverName + 1 );
openlog( serverName, OPENLOG_OPTIONS );
#endif
+#if defined(HAVE_SETUID) && defined(HAVE_SETGID)
+ if ( username != NULL || groupname != NULL )
+ slap_init_user( username, groupname );
+#endif
+
if ( slap_init( serverMode, serverName ) != 0 ) {
rc = 1;
+ SERVICE_EXIT( ERROR_SERVICE_SPECIFIC_ERROR, 18 );
goto destroy;
}
if ( read_config( configfile ) != 0 ) {
rc = 1;
+ SERVICE_EXIT( ERROR_SERVICE_SPECIFIC_ERROR, 19 );
+ goto destroy;
+ }
+
+#ifdef HAVE_TLS
+ ldap_pvt_tls_init();
+ ldap_pvt_tls_init_def_ctx();
+#endif
+
+ tcps = set_socket( inetd ? NULL : &bind_addr );
+ if ( tcps == -1 )
goto destroy;
+#ifdef HAVE_TLS
+ if ( use_tls_port ) {
+ tls_tcps = set_socket( inetd ? NULL : &tls_bind_addr );
+ if ( tls_tcps == -1 )
+ goto destroy;
+ } else {
+ tls_tcps = -1;
}
+#endif
(void) SIGNAL( LDAP_SIGUSR1, slap_do_nothing );
(void) SIGNAL( LDAP_SIGUSR2, slap_set_shutdown );
#ifdef LDAP_SIGCHLD
(void) SIGNAL( LDAP_SIGCHLD, wait4child );
#endif
+#ifdef SIGBREAK
+ /* SIGBREAK is generated when Ctrl-Break is pressed. */
+ (void) SIGNAL( SIGBREAK, slap_set_shutdown );
+#endif
-#ifndef WIN32
+#ifndef HAVE_WINSOCK
if(!inetd) {
#ifdef LDAP_DEBUG
lutil_detach( ldap_debug, 0 );
lutil_detach( 0, 0 );
#endif
}
-#endif /* WIN32 */
+#endif /* HAVE_WINSOC */
if ( slap_startup(-1) != 0 ) {
rc = 1;
+ SERVICE_EXIT( ERROR_SERVICE_SPECIFIC_ERROR, 20 );
goto shutdown;
}
if(!inetd) {
FILE *fp;
- slapd_addr = &bind_addr;
+ args.addr = &bind_addr;
+#ifdef HAVE_TLS
+ args.tls_addr = &tls_bind_addr;
+#endif
Debug( LDAP_DEBUG_ANY, "slapd starting\n", 0, 0, 0 );
}
} else {
- slapd_addr = NULL;
+ args.addr = NULL;
+#ifdef HAVE_TLS
+ args.tls_addr = NULL;
+#endif
}
+ args.tcps = tcps;
+#ifdef HAVE_TLS
+ args.tls_tcps = tls_tcps;
+#endif
time( &starttime );
+#ifdef HAVE_WINSOCK
+ LogSlapdStartedEvent( NTservice, slap_debug, configfile, port, udp );
+#endif
- rc = slapd_daemon( slapd_addr );
+ rc = slapd_daemon( &args );
+
+#ifdef HAVE_WINSOCK
+ /* Throw away the event that we used during the startup process. */
+ if ( is_NT_Service )
+ ldap_pvt_thread_cond_destroy( &started_event );
+#endif
shutdown:
/* remember an error during shutdown */
/* remember an error during destroy */
rc |= slap_destroy();
+stop:
+#ifdef HAVE_WINSOCK
+ LogSlapdStoppedEvent( NTservice );
+#endif
Debug( LDAP_DEBUG_ANY, "slapd stopped.\n", 0, 0, 0 );
+#ifdef HAVE_WINSOCK
+ ReportSlapdShutdownComplete();
+#endif
+
+ closelog();
- return rc;
+ MAIN_RETURN(rc);
}