]> git.sur5r.net Git - openldap/blobdiff - servers/slapd/search.c
ITS#4780 plug leak
[openldap] / servers / slapd / search.c
index 24bf9c34b3a1ccffc4d2df49160f517513567c2f..b6eb2832f4c952b9401a359d40a242cc609656d1 100644 (file)
@@ -1,10 +1,18 @@
 /* $OpenLDAP$ */
-/*
- * Copyright 1998-1999 The OpenLDAP Foundation, All Rights Reserved.
- * COPYING RESTRICTIONS APPLY, see COPYRIGHT file
+/* This work is part of OpenLDAP Software <http://www.openldap.org/>.
+ *
+ * Copyright 1998-2006 The OpenLDAP Foundation.
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted only as authorized by the OpenLDAP
+ * Public License.
+ *
+ * A copy of this license is available in the file LICENSE in the
+ * top-level directory of the distribution or, alternatively, at
+ * <http://www.OpenLDAP.org/license.html>.
  */
-/* Portions
- * Copyright (c) 1995 Regents of the University of Michigan.
+/* Portions Copyright (c) 1995 Regents of the University of Michigan.
  * All rights reserved.
  *
  * Redistribution and use in source and binary forms are permitted
 #include <ac/string.h>
 #include <ac/socket.h>
 
-#include "ldap_pvt.h"
+#include "lutil.h"
 #include "slap.h"
 
-
 int
 do_search(
-    Connection *conn,  /* where to send results                       */
-    Operation  *op     /* info about the op to which we're responding */
-)
+    Operation  *op,    /* info about the op to which we're responding */
+    SlapReply  *rs     /* all the response data we'll send */ )
 {
-       int             i;
-       ber_int_t               scope, deref, attrsonly;
-       ber_int_t               sizelimit, timelimit;
-       char            *base = NULL, *nbase = NULL, *fstr = NULL;
-       Filter          *filter = NULL;
-       char            **attrs = NULL;
-       Backend         *be;
-       int                     rc;
+       struct berval base = BER_BVNULL;
+       ber_len_t       siz, off, i;
 
        Debug( LDAP_DEBUG_TRACE, "do_search\n", 0, 0, 0 );
 
-       if( op->o_bind_in_progress ) {
-               Debug( LDAP_DEBUG_ANY, "do_search: SASL bind in progress.\n",
-                       0, 0, 0 );
-               send_ldap_result( conn, op, LDAP_SASL_BIND_IN_PROGRESS,
-                       NULL, "SASL bind in progress", NULL, NULL );
-               return LDAP_SASL_BIND_IN_PROGRESS;
-       }
-
        /*
         * Parse the search request.  It looks like this:
         *
@@ -59,7 +51,8 @@ do_search(
         *              scope           ENUMERATED {
         *                      baseObject      (0),
         *                      singleLevel     (1),
-        *                      wholeSubtree    (2)
+        *                      wholeSubtree (2),
+        *          subordinate (3)  -- OpenLDAP extension
         *              },
         *              derefAliases    ENUMERATED {
         *                      neverDerefaliases       (0),
@@ -76,122 +69,249 @@ do_search(
         */
 
        /* baseObject, scope, derefAliases, sizelimit, timelimit, attrsOnly */
-       if ( ber_scanf( op->o_ber, "{aiiiib" /*}*/,
-               &base, &scope, &deref, &sizelimit,
-           &timelimit, &attrsonly ) == LBER_ERROR ) {
-               send_ldap_disconnect( conn, op,
-                       LDAP_PROTOCOL_ERROR, "decoding error" );
-               rc = SLAPD_DISCONNECT;
+       if ( ber_scanf( op->o_ber, "{miiiib" /*}*/,
+               &base, &op->ors_scope, &op->ors_deref, &op->ors_slimit,
+           &op->ors_tlimit, &op->ors_attrsonly ) == LBER_ERROR )
+       {
+               send_ldap_discon( op, rs, LDAP_PROTOCOL_ERROR, "decoding error" );
+               rs->sr_err = SLAPD_DISCONNECT;
+               goto return_results;
+       }
+
+       if ( op->ors_tlimit < 0 || op->ors_tlimit > SLAP_MAX_LIMIT ) {
+               send_ldap_error( op, rs, LDAP_PROTOCOL_ERROR, "invalid time limit" );
+               goto return_results;
+       }
+
+       if ( op->ors_slimit < 0 || op->ors_slimit > SLAP_MAX_LIMIT ) {
+               send_ldap_error( op, rs, LDAP_PROTOCOL_ERROR, "invalid size limit" );
                goto return_results;
        }
 
-       switch( scope ) {
+       switch( op->ors_scope ) {
        case LDAP_SCOPE_BASE:
        case LDAP_SCOPE_ONELEVEL:
        case LDAP_SCOPE_SUBTREE:
+       case LDAP_SCOPE_SUBORDINATE:
                break;
        default:
-               send_ldap_result( conn, op, rc = LDAP_PROTOCOL_ERROR,
-                       NULL, "invalid scope", NULL, NULL );
+               send_ldap_error( op, rs, LDAP_PROTOCOL_ERROR, "invalid scope" );
                goto return_results;
        }
 
-       switch( deref ) {
+       switch( op->ors_deref ) {
        case LDAP_DEREF_NEVER:
        case LDAP_DEREF_FINDING:
        case LDAP_DEREF_SEARCHING:
        case LDAP_DEREF_ALWAYS:
                break;
        default:
-               send_ldap_result( conn, op, rc = LDAP_PROTOCOL_ERROR,
-                       NULL, "invalid deref", NULL, NULL );
+               send_ldap_error( op, rs, LDAP_PROTOCOL_ERROR, "invalid deref" );
                goto return_results;
        }
 
-       nbase = ch_strdup( base );
-
-       if( dn_normalize( nbase ) == NULL ) {
-               send_ldap_result( conn, op, rc = LDAP_INVALID_DN_SYNTAX,
-                       NULL, "invalid DN", NULL, NULL );
+       rs->sr_err = dnPrettyNormal( NULL, &base, &op->o_req_dn, &op->o_req_ndn, op->o_tmpmemctx );
+       if( rs->sr_err != LDAP_SUCCESS ) {
+               Debug( LDAP_DEBUG_ANY,
+                       "do_search: invalid dn (%s)\n", base.bv_val, 0, 0 );
+               send_ldap_error( op, rs, LDAP_INVALID_DN_SYNTAX, "invalid DN" );
                goto return_results;
        }
 
-       Debug( LDAP_DEBUG_ARGS, "SRCH \"%s\" %d %d", base, scope, deref );
-       Debug( LDAP_DEBUG_ARGS, "    %d %d %d\n", sizelimit, timelimit,
-           attrsonly);
+       Debug( LDAP_DEBUG_ARGS, "SRCH \"%s\" %d %d",
+               base.bv_val, op->ors_scope, op->ors_deref );
+       Debug( LDAP_DEBUG_ARGS, "    %d %d %d\n",
+               op->ors_slimit, op->ors_tlimit, op->ors_attrsonly);
 
        /* filter - returns a "normalized" version */
-       if ( (rc = get_filter( conn, op->o_ber, &filter, &fstr )) != LDAP_SUCCESS ) {
-               if( rc == SLAPD_DISCONNECT ) {
-                       send_ldap_disconnect( conn, op,
-                               LDAP_PROTOCOL_ERROR, "decode filter error" );
+       rs->sr_err = get_filter( op, op->o_ber, &op->ors_filter, &rs->sr_text );
+       if( rs->sr_err != LDAP_SUCCESS ) {
+               if( rs->sr_err == SLAPD_DISCONNECT ) {
+                       rs->sr_err = LDAP_PROTOCOL_ERROR;
+                       send_ldap_disconnect( op, rs );
+                       rs->sr_err = SLAPD_DISCONNECT;
                } else {
-                       send_ldap_result( conn, op, rc,
-                               NULL, "bad search filter", NULL, NULL );
+                       send_ldap_result( op, rs );
                }
                goto return_results;
        }
-
-       Debug( LDAP_DEBUG_ARGS, "    filter: %s\n", fstr, 0, 0 );
+       filter2bv_x( op, op->ors_filter, &op->ors_filterstr );
+       
+       Debug( LDAP_DEBUG_ARGS, "    filter: %s\n",
+               !BER_BVISEMPTY( &op->ors_filterstr ) ? op->ors_filterstr.bv_val : "empty", 0, 0 );
 
        /* attributes */
-       if ( ber_scanf( op->o_ber, /*{*/ "{v}}", &attrs ) == LBER_ERROR ) {
-               send_ldap_disconnect( conn, op,
-                       LDAP_PROTOCOL_ERROR, "decoding attrs error" );
-               rc = SLAPD_DISCONNECT;
+       siz = sizeof(AttributeName);
+       off = offsetof(AttributeName,an_name);
+       if ( ber_scanf( op->o_ber, "{M}}", &op->ors_attrs, &siz, off ) == LBER_ERROR ) {
+               send_ldap_discon( op, rs, LDAP_PROTOCOL_ERROR, "decoding attrs error" );
+               rs->sr_err = SLAPD_DISCONNECT;
                goto return_results;
        }
+       for ( i=0; i<siz; i++ ) {
+               const char *dummy;      /* ignore msgs from bv2ad */
+               op->ors_attrs[i].an_desc = NULL;
+               op->ors_attrs[i].an_oc = NULL;
+               op->ors_attrs[i].an_oc_exclude = 0;
+               if ( slap_bv2ad( &op->ors_attrs[i].an_name,
+                       &op->ors_attrs[i].an_desc, &dummy ) != LDAP_SUCCESS )
+               {
+                       slap_bv2undef_ad( &op->ors_attrs[i].an_name,
+                               &op->ors_attrs[i].an_desc, &dummy,
+                               SLAP_AD_PROXIED|SLAP_AD_NOINSERT );
+               };
+       }
 
-       if( (rc = get_ctrls( conn, op, 1 )) != LDAP_SUCCESS ) {
+       if( get_ctrls( op, rs, 1 ) != LDAP_SUCCESS ) {
                Debug( LDAP_DEBUG_ANY, "do_search: get_ctrls failed\n", 0, 0, 0 );
-               goto return_results;
-       } 
 
-       rc = 0;
+               goto return_results;
+       }
 
        Debug( LDAP_DEBUG_ARGS, "    attrs:", 0, 0, 0 );
 
-       if ( attrs != NULL ) {
-               for ( i = 0; attrs[i] != NULL; i++ ) {
-#ifndef SLAPD_SCHEMA_NOT_COMPAT
-                       attr_normalize( attrs[i] );
-#endif
-                       Debug( LDAP_DEBUG_ARGS, " %s", attrs[i], 0, 0 );
+       if ( siz != 0 ) {
+               for ( i = 0; i<siz; i++ ) {
+                       Debug( LDAP_DEBUG_ARGS, " %s", op->ors_attrs[i].an_name.bv_val, 0, 0 );
                }
        }
 
        Debug( LDAP_DEBUG_ARGS, "\n", 0, 0, 0 );
 
-       Statslog( LDAP_DEBUG_STATS,
-           "conn=%ld op=%d SRCH base=\"%s\" scope=%d filter=\"%s\"\n",
-           op->o_connid, op->o_opid, base, scope, fstr );
-
-       if ( scope == LDAP_SCOPE_BASE ) {
-#if defined( SLAPD_MONITOR_DN )
-               if ( strcmp( nbase, SLAPD_MONITOR_DN ) == 0 ) {
-                       monitor_info( conn, op, attrs, attrsonly );
-                       goto return_results;
+       if ( StatslogTest( LDAP_DEBUG_STATS ) ) {
+               char abuf[BUFSIZ/2], *ptr = abuf;
+               int len = 0, alen;
+
+               sprintf(abuf, "scope=%d deref=%d", op->ors_scope, op->ors_deref);
+               Statslog( LDAP_DEBUG_STATS,
+                       "%s SRCH base=\"%s\" %s filter=\"%s\"\n",
+                       op->o_log_prefix, op->o_req_dn.bv_val, abuf,
+                       op->ors_filterstr.bv_val, 0 );
+
+               for ( i = 0; i<siz; i++ ) {
+                       alen = op->ors_attrs[i].an_name.bv_len;
+                       if (alen >= sizeof(abuf)) {
+                               alen = sizeof(abuf)-1;
+                       }
+                       if (len && (len + 1 + alen >= sizeof(abuf))) {
+                               Statslog( LDAP_DEBUG_STATS, "%s SRCH attr=%s\n",
+                                   op->o_log_prefix, abuf, 0, 0, 0 );
+                               len = 0;
+                               ptr = abuf;
+                       }
+                       if (len) {
+                               *ptr++ = ' ';
+                               len++;
+                       }
+                       ptr = lutil_strncopy(ptr, op->ors_attrs[i].an_name.bv_val, alen);
+                       len += alen;
+                       *ptr = '\0';
                }
-#endif
-
-#if defined( SLAPD_CONFIG_DN )
-               if ( strcmp( nbase, SLAPD_CONFIG_DN ) == 0 ) {
-                       config_info( conn, op, attrs, attrsonly );
-                       goto return_results;
+               if (len) {
+                       Statslog( LDAP_DEBUG_STATS, "%s SRCH attr=%s\n",
+                               op->o_log_prefix, abuf, 0, 0, 0 );
                }
+       }
+
+       op->o_bd = frontendDB;
+       rs->sr_err = frontendDB->be_search( op, rs );
+
+return_results:;
+       if ( !BER_BVISNULL( &op->o_req_dn ) ) {
+               slap_sl_free( op->o_req_dn.bv_val, op->o_tmpmemctx );
+       }
+       if ( !BER_BVISNULL( &op->o_req_ndn ) ) {
+               slap_sl_free( op->o_req_ndn.bv_val, op->o_tmpmemctx );
+       }
+       if ( !BER_BVISNULL( &op->ors_filterstr ) ) {
+               op->o_tmpfree( op->ors_filterstr.bv_val, op->o_tmpmemctx );
+       }
+       if ( op->ors_filter != NULL) {
+               filter_free_x( op, op->ors_filter );
+       }
+       if ( op->ors_attrs != NULL ) {
+               op->o_tmpfree( op->ors_attrs, op->o_tmpmemctx );
+       }
+
+       return rs->sr_err;
+}
+
+int
+fe_op_search( Operation *op, SlapReply *rs )
+{
+       int                     manageDSAit;
+       int                     be_manageDSAit;
+       BackendDB               *bd = op->o_bd;
+
+       manageDSAit = get_manageDSAit( op );
+
+       /* fake while loop to allow breaking out */
+       while ( op->ors_scope == LDAP_SCOPE_BASE ) {
+               Entry *entry = NULL;
+
+               if ( BER_BVISEMPTY( &op->o_req_ndn ) ) {
+#ifdef LDAP_CONNECTIONLESS
+                       /* Ignore LDAPv2 CLDAP Root DSE queries */
+                       if (op->o_protocol == LDAP_VERSION2 && op->o_conn->c_is_udp) {
+                               goto return_results;
+                       }
 #endif
+                       /* check restrictions */
+                       if( backend_check_restrictions( op, rs, NULL ) != LDAP_SUCCESS ) {
+                               send_ldap_result( op, rs );
+                               goto return_results;
+                       }
+
+                       rs->sr_err = root_dse_info( op->o_conn, &entry, &rs->sr_text );
+
+               } else if ( bvmatch( &op->o_req_ndn, &frontendDB->be_schemandn ) ) {
+                       /* check restrictions */
+                       if( backend_check_restrictions( op, rs, NULL ) != LDAP_SUCCESS ) {
+                               send_ldap_result( op, rs );
+                               goto return_results;
+                       }
+
+                       rs->sr_err = schema_info( &entry, &rs->sr_text );
+               }
 
-#if defined( SLAPD_SCHEMA_DN )
-               if ( strcmp( nbase, SLAPD_SCHEMA_DN ) == 0 ) {
-                       schema_info( conn, op, attrs, attrsonly );
+               if( rs->sr_err != LDAP_SUCCESS ) {
+                       send_ldap_result( op, rs );
                        goto return_results;
-               }
-#endif
 
-               if ( strcmp( nbase, LDAP_ROOT_DSE ) == 0 ) {
-                       root_dse_info( conn, op, attrs, attrsonly );
+               } else if ( entry != NULL ) {
+                       rs->sr_err = test_filter( op, entry, op->ors_filter );
+
+                       if( rs->sr_err == LDAP_COMPARE_TRUE ) {
+                               /* note: we set no limits because either
+                                * no limit is specified, or at least 1
+                                * is specified, and we're going to return
+                                * at most one entry */                 
+                               op->ors_slimit = SLAP_NO_LIMIT;
+                               op->ors_tlimit = SLAP_NO_LIMIT;
+
+                               rs->sr_entry = entry;
+                               rs->sr_attrs = op->ors_attrs;
+                               rs->sr_operational_attrs = NULL;
+                               rs->sr_flags = 0;
+                               send_search_entry( op, rs );
+                               rs->sr_entry = NULL;
+                               rs->sr_operational_attrs = NULL;
+                       }
+                       entry_free( entry );
+
+                       rs->sr_err = LDAP_SUCCESS;
+                       send_ldap_result( op, rs );
                        goto return_results;
                }
+               break;
+       }
+
+       if( BER_BVISEMPTY( &op->o_req_ndn ) && !BER_BVISEMPTY( &default_search_nbase ) ) {
+               slap_sl_free( op->o_req_dn.bv_val, op->o_tmpmemctx );
+               slap_sl_free( op->o_req_ndn.bv_val, op->o_tmpmemctx );
+
+               ber_dupbv_x( &op->o_req_dn, &default_search_base, op->o_tmpmemctx );
+               ber_dupbv_x( &op->o_req_ndn, &default_search_nbase, op->o_tmpmemctx );
        }
 
        /*
@@ -199,42 +319,69 @@ do_search(
         * appropriate one, or send a referral to our "referral server"
         * if we don't hold it.
         */
-       if ( (be = select_backend( nbase )) == NULL ) {
-               send_ldap_result( conn, op, rc = LDAP_REFERRAL,
-                       NULL, NULL, default_referral, NULL );
 
+       be_manageDSAit = manageDSAit;
+
+       op->o_bd = select_backend( &op->o_req_ndn, be_manageDSAit, 1 );
+       if ( op->o_bd == NULL ) {
+               rs->sr_ref = referral_rewrite( default_referral,
+                       NULL, &op->o_req_dn, op->ors_scope );
+
+               if (!rs->sr_ref) rs->sr_ref = default_referral;
+               rs->sr_err = LDAP_REFERRAL;
+               op->o_bd = bd;
+               send_ldap_result( op, rs );
+
+               if (rs->sr_ref != default_referral)
+               ber_bvarray_free( rs->sr_ref );
+               rs->sr_ref = NULL;
                goto return_results;
        }
 
-       /* make sure this backend recongizes critical controls */
-       rc = backend_check_controls( be, conn, op ) ;
+       /* check restrictions */
+       if( backend_check_restrictions( op, rs, NULL ) != LDAP_SUCCESS ) {
+               send_ldap_result( op, rs );
+               goto return_results;
+       }
 
-       if( rc != LDAP_SUCCESS ) {
-               send_ldap_result( conn, op, rc,
-                       NULL, NULL, NULL, NULL );
+       /* check for referrals */
+       if( backend_check_referrals( op, rs ) != LDAP_SUCCESS ) {
                goto return_results;
        }
 
-       /* deref the base if needed */
-       nbase = suffix_alias( be, nbase );
+       if ( SLAP_SHADOW(op->o_bd) && get_dontUseCopy(op) ) {
+               /* don't use shadow copy */
+               BerVarray defref = op->o_bd->be_update_refs
+                       ? op->o_bd->be_update_refs : default_referral;
+
+               if( defref != NULL ) {
+                       rs->sr_ref = referral_rewrite( defref,
+                               NULL, &op->o_req_dn, op->ors_scope );
+                       if( !rs->sr_ref) rs->sr_ref = defref;
+                       rs->sr_err = LDAP_REFERRAL;
+                       send_ldap_result( op, rs );
+
+                       if (rs->sr_ref != defref) ber_bvarray_free( rs->sr_ref );
+
+               } else {
+                       send_ldap_error( op, rs, LDAP_UNWILLING_TO_PERFORM,
+                               "copy not used; no referral information available" );
+               }
+
+       } else if ( op->o_bd->be_search ) {
+               if ( limits_check( op, rs ) == 0 ) {
+                       /* actually do the search and send the result(s) */
+                       (op->o_bd->be_search)( op, rs );
+               }
+               /* else limits_check() sends error */
 
-       /* actually do the search and send the result(s) */
-       if ( be->be_search ) {
-               (*be->be_search)( be, conn, op, base, nbase, scope, deref, sizelimit,
-                   timelimit, filter, fstr, attrs, attrsonly );
        } else {
-               send_ldap_result( conn, op, rc = LDAP_UNWILLING_TO_PERFORM,
-                       NULL, "Function not implemented", NULL, NULL );
+               send_ldap_error( op, rs, LDAP_UNWILLING_TO_PERFORM,
+                       "operation not supported within namingContext" );
        }
 
 return_results:;
-       if( base != NULL) free( base );
-       if( nbase != NULL) free( nbase );
-       if( fstr != NULL) free( fstr );
-       if( filter != NULL) filter_free( filter );
-       if ( attrs != NULL ) {
-               charray_free( attrs );
-       }
-
-       return rc;
+       op->o_bd = bd;
+       return rs->sr_err;
 }
+