X-Git-Url: https://git.sur5r.net/?a=blobdiff_plain;f=servers%2Fslapd%2Faclparse.c;h=051e4a6fb4ace6f12a3614915d89552ae188d208;hb=c3960b98d3b5fbd6ebeb200ca7799ece7b766d50;hp=567e2b63f37071d511e0c52fc0900a31a022fef7;hpb=f5b9ff7940245da236a391019394598198074780;p=openldap diff --git a/servers/slapd/aclparse.c b/servers/slapd/aclparse.c index 567e2b63f3..051e4a6fb4 100644 --- a/servers/slapd/aclparse.c +++ b/servers/slapd/aclparse.c @@ -52,12 +52,14 @@ char *style_strings[] = { "users", "self", "ip", + "ipv6", "path", NULL }; static void split(char *line, int splitchar, char **left, char **right); static void access_append(Access **l, Access *a); +static void access_free( Access *a ); static int acl_usage(void); static void acl_regex_normalized_dn(const char *src, struct berval *pat); @@ -327,12 +329,11 @@ parse_acl( int i; char *left, *right, *style; struct berval bv; - AccessControl *a; - Access *b; + AccessControl *a = NULL; + Access *b = NULL; int rc; const char *text; - a = NULL; for ( i = 1; i < argc; i++ ) { /* to clause - select which entries are protected */ if ( strcasecmp( argv[i], "to" ) == 0 ) { @@ -340,7 +341,7 @@ parse_acl( Debug( LDAP_DEBUG_ANY, "%s: line %d: " "only one to clause allowed in access line\n", fname, lineno, 0 ); - return acl_usage(); + goto fail; } a = (AccessControl *) ch_calloc( 1, sizeof(AccessControl) ); for ( ++i; i < argc; i++ ) { @@ -357,7 +358,7 @@ parse_acl( "%s: line %d: dn pattern" " already specified in to clause.\n", fname, lineno, 0 ); - return acl_usage(); + goto fail; } ber_str2bv( "*", STRLENOF( "*" ), 1, &a->acl_dn_pat ); @@ -371,7 +372,7 @@ parse_acl( Debug( LDAP_DEBUG_ANY, "%s: line %d: " "missing \"=\" in \"%s\" in to clause\n", fname, lineno, left ); - return acl_usage(); + goto fail; } if ( strcasecmp( left, "dn" ) == 0 ) { @@ -382,7 +383,7 @@ parse_acl( "%s: line %d: dn pattern" " already specified in to clause.\n", fname, lineno, 0 ); - return acl_usage(); + goto fail; } if ( style == NULL || *style == '\0' || @@ -440,7 +441,7 @@ parse_acl( Debug( LDAP_DEBUG_ANY, "%s: line %d: " "unknown dn style \"%s\" in to clause\n", fname, lineno, style ); - return acl_usage(); + goto fail; } continue; @@ -451,7 +452,7 @@ parse_acl( Debug( LDAP_DEBUG_ANY, "%s: line %d: bad filter \"%s\" in to clause\n", fname, lineno, right ); - return acl_usage(); + goto fail; } } else if ( strcasecmp( left, "attr" ) == 0 /* TOLERATED */ @@ -471,7 +472,7 @@ parse_acl( Debug( LDAP_DEBUG_ANY, "%s: line %d: unknown attr \"%s\" in to clause\n", fname, lineno, right ); - return acl_usage(); + goto fail; } } else if ( strncasecmp( left, "val", 3 ) == 0 ) { @@ -482,14 +483,14 @@ parse_acl( Debug( LDAP_DEBUG_ANY, "%s: line %d: attr val already specified in to clause.\n", fname, lineno, 0 ); - return acl_usage(); + goto fail; } if ( a->acl_attrs == NULL || !BER_BVISEMPTY( &a->acl_attrs[1].an_name ) ) { Debug( LDAP_DEBUG_ANY, "%s: line %d: attr val requires a single attribute.\n", fname, lineno, 0 ); - return acl_usage(); + goto fail; } ber_str2bv( right, 0, 0, &bv ); @@ -505,7 +506,7 @@ parse_acl( Debug( LDAP_DEBUG_ANY, "%s: line %d: " "invalid matching rule \"%s\".\n", fname, lineno, mr ); - return acl_usage(); + goto fail; } if( !mr_usable_with_at( a->acl_attrval_mr, a->acl_attrs[ 0 ].an_desc->ad_type ) ) @@ -520,7 +521,7 @@ parse_acl( Debug( LDAP_DEBUG_ANY, "%s: line %d: %s\n", fname, lineno, buf ); - return acl_usage(); + goto fail; } } @@ -540,7 +541,7 @@ parse_acl( Debug( LDAP_DEBUG_ANY, "%s: line %d: %s\n", fname, lineno, buf ); - return acl_usage(); + goto fail; } a->acl_attrval_style = ACL_STYLE_REGEX; @@ -571,8 +572,6 @@ parse_acl( } else { char buf[ SLAP_TEXT_BUFLEN ]; - /* FIXME: should be an error */ - snprintf( buf, sizeof( buf ), "unknown val.