X-Git-Url: https://git.sur5r.net/?a=blobdiff_plain;f=servers%2Fslapd%2Fback-ldap%2Finit.c;h=d9a4ff61c4250aca3d77f24a1a85a48c428c4e5a;hb=fb2e448e877a8a387084dde517362c9f7bf1b6b7;hp=13a4fc57fcc184e1338ac2554f728c11e5959fc8;hpb=7e87f547160f78690b4fe2a6bdf7f67505de8ee4;p=openldap diff --git a/servers/slapd/back-ldap/init.c b/servers/slapd/back-ldap/init.c index 13a4fc57fc..d9a4ff61c4 100644 --- a/servers/slapd/back-ldap/init.c +++ b/servers/slapd/back-ldap/init.c @@ -2,7 +2,7 @@ /* $OpenLDAP$ */ /* This work is part of OpenLDAP Software . * - * Copyright 2003-2004 The OpenLDAP Foundation. + * Copyright 2003-2007 The OpenLDAP Foundation. * Portions Copyright 1999-2003 Howard Chu. * Portions Copyright 2000-2003 Pierangelo Masarati. * All rights reserved. @@ -31,44 +31,37 @@ #include "slap.h" #include "back-ldap.h" -#if SLAPD_LDAP == SLAPD_MOD_DYNAMIC - -int init_module(int argc, char *argv[]) { - BackendInfo bi; - - memset( &bi, '\0', sizeof(bi) ); - bi.bi_type = "ldap"; - bi.bi_init = ldap_back_initialize; - - backend_add(&bi); - return 0; -} - -#endif /* SLAPD_LDAP */ - -static int -ldap_back_open( - BackendInfo *bi -) +int +ldap_back_open( BackendInfo *bi ) { bi->bi_controls = slap_known_controls; return 0; } int -ldap_back_initialize( - BackendInfo *bi -) +ldap_back_initialize( BackendInfo *bi ) { + int rc; + + bi->bi_flags = +#ifdef LDAP_DYNAMIC_OBJECTS + /* this is set because all the support a proxy has to provide + * is the capability to forward the refresh exop, and to + * pass thru entries that contain the dynamicObject class + * and the entryTtl attribute */ + SLAP_BFLAG_DYNAMIC | +#endif /* LDAP_DYNAMIC_OBJECTS */ + 0; + bi->bi_open = ldap_back_open; bi->bi_config = 0; bi->bi_close = 0; bi->bi_destroy = 0; bi->bi_db_init = ldap_back_db_init; - bi->bi_db_config = ldap_back_db_config; + bi->bi_db_config = config_generic_wrapper; bi->bi_db_open = ldap_back_db_open; - bi->bi_db_close = 0; + bi->bi_db_close = ldap_back_db_close; bi->bi_db_destroy = ldap_back_db_destroy; bi->bi_op_bind = ldap_back_bind; @@ -89,218 +82,287 @@ ldap_back_initialize( bi->bi_connection_init = 0; bi->bi_connection_destroy = ldap_back_conn_destroy; - return 0; + rc = chain_initialize(); + if ( rc ) { + return rc; + } + +#ifdef SLAP_DISTPROC + rc = distproc_initialize(); + if ( rc ) { + return rc; + } +#endif + + return ldap_back_init_cf( bi ); } int -ldap_back_db_init( - Backend *be -) +ldap_back_db_init( Backend *be ) { - struct ldapinfo *li; - struct ldapmapping *mapping; + ldapinfo_t *li; + int rc; + unsigned i; - li = (struct ldapinfo *) ch_calloc( 1, sizeof(struct ldapinfo) ); + li = (ldapinfo_t *)ch_calloc( 1, sizeof( ldapinfo_t ) ); if ( li == NULL ) { return -1; } - BER_BVZERO( &li->acl_authcDN ); - BER_BVZERO( &li->acl_passwd ); + li->li_rebind_f = ldap_back_default_rebind; + li->li_urllist_f = ldap_back_default_urllist; + li->li_urllist_p = li; + ldap_pvt_thread_mutex_init( &li->li_uri_mutex ); -#ifdef LDAP_BACK_PROXY_AUTHZ - li->idassert_mode = LDAP_BACK_IDASSERT_LEGACY; + BER_BVZERO( &li->li_acl_authcID ); + BER_BVZERO( &li->li_acl_authcDN ); + BER_BVZERO( &li->li_acl_passwd ); - BER_BVZERO( &li->idassert_authcID ); - BER_BVZERO( &li->idassert_authcDN ); - BER_BVZERO( &li->idassert_passwd ); + li->li_acl_authmethod = LDAP_AUTH_NONE; + BER_BVZERO( &li->li_acl_sasl_mech ); + li->li_acl.sb_tls = SB_TLS_DEFAULT; - BER_BVZERO( &li->idassert_authzID ); - li->idassert_authz = NULL; + li->li_idassert_mode = LDAP_BACK_IDASSERT_LEGACY; - li->idassert_authmethod = LDAP_AUTH_SIMPLE; - li->idassert_sasl_flags = LDAP_SASL_QUIET; - BER_BVZERO( &li->idassert_sasl_mech ); - BER_BVZERO( &li->idassert_sasl_realm ); + BER_BVZERO( &li->li_idassert_authcID ); + BER_BVZERO( &li->li_idassert_authcDN ); + BER_BVZERO( &li->li_idassert_passwd ); - li->idassert_ppolicy = 0; + BER_BVZERO( &li->li_idassert_authzID ); + + li->li_idassert_authmethod = LDAP_AUTH_NONE; + BER_BVZERO( &li->li_idassert_sasl_mech ); + li->li_idassert_tls = SB_TLS_DEFAULT; /* by default, use proxyAuthz control on each operation */ - li->idassert_flags = LDAP_BACK_AUTH_NONE; -#endif /* LDAP_BACK_PROXY_AUTHZ */ + li->li_idassert_flags = LDAP_BACK_AUTH_PRESCRIPTIVE; -#ifdef ENABLE_REWRITE - li->rwmap.rwm_rw = rewrite_info_init( REWRITE_MODE_USE_DEFAULT ); - if ( li->rwmap.rwm_rw == NULL ) { - ch_free( li ); - return -1; - } + li->li_idassert_authz = NULL; - { - char *rargv[3]; - - /* - * the filter rewrite as a string must be disabled - * by default; it can be re-enabled by adding rules; - * this creates an empty rewriteContext - */ - rargv[ 0 ] = "rewriteContext"; - rargv[ 1 ] = "searchFilter"; - rargv[ 2 ] = NULL; - rewrite_parse( li->rwmap.rwm_rw, "", - 1, 2, rargv ); - - rargv[ 0 ] = "rewriteContext"; - rargv[ 1 ] = "default"; - rargv[ 2 ] = NULL; - rewrite_parse( li->rwmap.rwm_rw, "", - 1, 2, rargv ); - } -#endif /* ENABLE_REWRITE */ + /* initialize flags */ + li->li_flags = LDAP_BACK_F_CHASE_REFERRALS; - ldap_pvt_thread_mutex_init( &li->conn_mutex ); + /* initialize version */ + li->li_version = LDAP_VERSION3; - ldap_back_map_init( &li->rwmap.rwm_oc, &mapping ); - ldap_back_map_init( &li->rwmap.rwm_at, &mapping ); + ldap_pvt_thread_mutex_init( &li->li_conninfo.lai_mutex ); + + for ( i = LDAP_BACK_PCONN_FIRST; i < LDAP_BACK_PCONN_LAST; i++ ) { + li->li_conn_priv[ i ].lic_num = 0; + LDAP_TAILQ_INIT( &li->li_conn_priv[ i ].lic_priv ); + } + li->li_conn_priv_max = LDAP_BACK_CONN_PRIV_DEFAULT; be->be_private = li; - SLAP_DBFLAGS(be) |= SLAP_DBFLAG_NOLASTMOD; + SLAP_DBFLAGS( be ) |= SLAP_DBFLAG_NOLASTMOD; - return 0; + be->be_cf_ocs = be->bd_info->bi_cf_ocs; + + rc = ldap_back_monitor_db_init( be ); + if ( rc != 0 ) { + /* ignore, by now */ + rc = 0; + } + + return rc; } int ldap_back_db_open( BackendDB *be ) { - struct ldapinfo *li = (struct ldapinfo *)be->be_private; + ldapinfo_t *li = (ldapinfo_t *)be->be_private; + + slap_bindconf sb = { BER_BVNULL }; + int rc = 0; Debug( LDAP_DEBUG_TRACE, - "ldap_back_db_open: URI=%s\n", li->url, 0, 0 ); + "ldap_back_db_open: URI=%s\n", + li->li_uri != NULL ? li->li_uri : "", 0, 0 ); -#ifdef LDAP_BACK_PROXY_AUTHZ /* by default, use proxyAuthz control on each operation */ - switch ( li->idassert_mode ) { + switch ( li->li_idassert_mode ) { case LDAP_BACK_IDASSERT_LEGACY: case LDAP_BACK_IDASSERT_SELF: /* however, since admin connections are pooled and shared, * only static authzIDs can be native */ - li->idassert_flags &= ~LDAP_BACK_AUTH_NATIVE_AUTHZ; + li->li_idassert_flags &= ~LDAP_BACK_AUTH_NATIVE_AUTHZ; break; default: break; } -#endif /* LDAP_BACK_PROXY_AUTHZ */ - return 0; + ber_str2bv( li->li_uri, 0, 0, &sb.sb_uri ); + sb.sb_version = li->li_version; + sb.sb_method = LDAP_AUTH_SIMPLE; + BER_BVSTR( &sb.sb_binddn, "" ); + + if ( LDAP_BACK_T_F_DISCOVER( li ) && !LDAP_BACK_T_F( li ) ) { + rc = slap_discover_feature( &sb, + slap_schema.si_ad_supportedFeatures->ad_cname.bv_val, + LDAP_FEATURE_ABSOLUTE_FILTERS ); + if ( rc == LDAP_COMPARE_TRUE ) { + li->li_flags |= LDAP_BACK_F_T_F; + } + } + + if ( LDAP_BACK_CANCEL_DISCOVER( li ) && !LDAP_BACK_CANCEL( li ) ) { + rc = slap_discover_feature( &sb, + slap_schema.si_ad_supportedExtension->ad_cname.bv_val, + LDAP_EXOP_CANCEL ); + if ( rc == LDAP_COMPARE_TRUE ) { + li->li_flags |= LDAP_BACK_F_CANCEL_EXOP; + } + } + + /* monitor setup */ + rc = ldap_back_monitor_db_open( be ); + if ( rc != 0 ) { + /* ignore by now */ + rc = 0; +#if 0 + goto fail; +#endif + } + + li->li_flags |= LDAP_BACK_F_ISOPEN; + +fail:; + return rc; } void -ldap_back_conn_free( - void *v_lc -) +ldap_back_conn_free( void *v_lc ) { - struct ldapconn *lc = v_lc; - ldap_unbind( lc->ld ); - if ( lc->bound_dn.bv_val ) { - ch_free( lc->bound_dn.bv_val ); + ldapconn_t *lc = v_lc; + + if ( lc->lc_ld != NULL ) { + ldap_unbind_ext( lc->lc_ld, NULL, NULL ); + } + if ( !BER_BVISNULL( &lc->lc_bound_ndn ) ) { + ch_free( lc->lc_bound_ndn.bv_val ); } - if ( lc->cred.bv_val ) { - memset( lc->cred.bv_val, 0, lc->cred.bv_len ); - ch_free( lc->cred.bv_val ); + if ( !BER_BVISNULL( &lc->lc_cred ) ) { + memset( lc->lc_cred.bv_val, 0, lc->lc_cred.bv_len ); + ch_free( lc->lc_cred.bv_val ); } - if ( lc->local_dn.bv_val ) { - ch_free( lc->local_dn.bv_val ); + if ( !BER_BVISNULL( &lc->lc_local_ndn ) ) { + ch_free( lc->lc_local_ndn.bv_val ); } - ldap_pvt_thread_mutex_destroy( &lc->lc_mutex ); + lc->lc_q.tqe_prev = NULL; + lc->lc_q.tqe_next = NULL; ch_free( lc ); } -void -mapping_free( void *v_mapping ) +int +ldap_back_db_close( Backend *be ) { - struct ldapmapping *mapping = v_mapping; - ch_free( mapping->src.bv_val ); - ch_free( mapping->dst.bv_val ); - ch_free( mapping ); + int rc = 0; + + if ( be->be_private ) { + rc = ldap_back_monitor_db_close( be ); + } + + return rc; } int -ldap_back_db_destroy( - Backend *be -) +ldap_back_db_destroy( Backend *be ) { - struct ldapinfo *li; + if ( be->be_private ) { + ldapinfo_t *li = ( ldapinfo_t * )be->be_private; + unsigned i; - if (be->be_private) { - li = (struct ldapinfo *)be->be_private; + (void)ldap_back_monitor_db_destroy( be ); - ldap_pvt_thread_mutex_lock( &li->conn_mutex ); + ldap_pvt_thread_mutex_lock( &li->li_conninfo.lai_mutex ); - if (li->url) { - ch_free(li->url); - li->url = NULL; + if ( li->li_uri != NULL ) { + ch_free( li->li_uri ); + li->li_uri = NULL; + + assert( li->li_bvuri != NULL ); + ber_bvarray_free( li->li_bvuri ); + li->li_bvuri = NULL; + } + if ( !BER_BVISNULL( &li->li_acl_authcID ) ) { + ch_free( li->li_acl_authcID.bv_val ); + BER_BVZERO( &li->li_acl_authcID ); } - if ( li->lud ) { - ldap_free_urldesc( li->lud ); - li->lud = NULL; + if ( !BER_BVISNULL( &li->li_acl_authcDN ) ) { + ch_free( li->li_acl_authcDN.bv_val ); + BER_BVZERO( &li->li_acl_authcDN ); } - if ( !BER_BVISNULL( &li->acl_authcDN ) ) { - ch_free( li->acl_authcDN.bv_val ); - BER_BVZERO( &li->acl_authcDN ); + if ( !BER_BVISNULL( &li->li_acl_passwd ) ) { + ch_free( li->li_acl_passwd.bv_val ); + BER_BVZERO( &li->li_acl_passwd ); } - if ( !BER_BVISNULL( &li->acl_passwd ) ) { - ch_free( li->acl_passwd.bv_val ); - BER_BVZERO( &li->acl_passwd ); + if ( !BER_BVISNULL( &li->li_acl_sasl_mech ) ) { + ch_free( li->li_acl_sasl_mech.bv_val ); + BER_BVZERO( &li->li_acl_sasl_mech ); } -#ifdef LDAP_BACK_PROXY_AUTHZ - if ( !BER_BVISNULL( &li->idassert_authcID ) ) { - ch_free( li->idassert_authcID.bv_val ); - BER_BVZERO( &li->idassert_authcID ); + if ( !BER_BVISNULL( &li->li_acl_sasl_realm ) ) { + ch_free( li->li_acl_sasl_realm.bv_val ); + BER_BVZERO( &li->li_acl_sasl_realm ); } - if ( !BER_BVISNULL( &li->idassert_authcDN ) ) { - ch_free( li->idassert_authcDN.bv_val ); - BER_BVZERO( &li->idassert_authcDN ); + if ( !BER_BVISNULL( &li->li_idassert_authcID ) ) { + ch_free( li->li_idassert_authcID.bv_val ); + BER_BVZERO( &li->li_idassert_authcID ); } - if ( !BER_BVISNULL( &li->idassert_passwd ) ) { - ch_free( li->idassert_passwd.bv_val ); - BER_BVZERO( &li->idassert_passwd ); + if ( !BER_BVISNULL( &li->li_idassert_authcDN ) ) { + ch_free( li->li_idassert_authcDN.bv_val ); + BER_BVZERO( &li->li_idassert_authcDN ); } - if ( !BER_BVISNULL( &li->idassert_authzID ) ) { - ch_free( li->idassert_authzID.bv_val ); - BER_BVZERO( &li->idassert_authzID ); + if ( !BER_BVISNULL( &li->li_idassert_passwd ) ) { + ch_free( li->li_idassert_passwd.bv_val ); + BER_BVZERO( &li->li_idassert_passwd ); } - if ( !BER_BVISNULL( &li->idassert_sasl_mech ) ) { - ch_free( li->idassert_sasl_mech.bv_val ); - BER_BVZERO( &li->idassert_sasl_mech ); + if ( !BER_BVISNULL( &li->li_idassert_authzID ) ) { + ch_free( li->li_idassert_authzID.bv_val ); + BER_BVZERO( &li->li_idassert_authzID ); } - if ( !BER_BVISNULL( &li->idassert_sasl_realm ) ) { - ch_free( li->idassert_sasl_realm.bv_val ); - BER_BVZERO( &li->idassert_sasl_realm ); + if ( !BER_BVISNULL( &li->li_idassert_sasl_mech ) ) { + ch_free( li->li_idassert_sasl_mech.bv_val ); + BER_BVZERO( &li->li_idassert_sasl_mech ); } -#endif /* LDAP_BACK_PROXY_AUTHZ */ - if (li->conntree) { - avl_free( li->conntree, ldap_back_conn_free ); + if ( !BER_BVISNULL( &li->li_idassert_sasl_realm ) ) { + ch_free( li->li_idassert_sasl_realm.bv_val ); + BER_BVZERO( &li->li_idassert_sasl_realm ); } -#ifdef ENABLE_REWRITE - if (li->rwmap.rwm_rw) { - rewrite_info_delete( &li->rwmap.rwm_rw ); + if ( li->li_idassert_authz != NULL ) { + ber_bvarray_free( li->li_idassert_authz ); + li->li_idassert_authz = NULL; } -#else /* !ENABLE_REWRITE */ - if (li->rwmap.rwm_suffix_massage) { - ber_bvarray_free( li->rwmap.rwm_suffix_massage ); - } -#endif /* !ENABLE_REWRITE */ - - avl_free( li->rwmap.rwm_oc.remap, NULL ); - avl_free( li->rwmap.rwm_oc.map, mapping_free ); - avl_free( li->rwmap.rwm_at.remap, NULL ); - avl_free( li->rwmap.rwm_at.map, mapping_free ); - - ldap_pvt_thread_mutex_unlock( &li->conn_mutex ); - ldap_pvt_thread_mutex_destroy( &li->conn_mutex ); + if ( li->li_conninfo.lai_tree ) { + avl_free( li->li_conninfo.lai_tree, ldap_back_conn_free ); + } + for ( i = LDAP_BACK_PCONN_FIRST; i < LDAP_BACK_PCONN_LAST; i++ ) { + while ( !LDAP_TAILQ_EMPTY( &li->li_conn_priv[ i ].lic_priv ) ) { + ldapconn_t *lc = LDAP_TAILQ_FIRST( &li->li_conn_priv[ i ].lic_priv ); + + LDAP_TAILQ_REMOVE( &li->li_conn_priv[ i ].lic_priv, lc, lc_q ); + ldap_back_conn_free( lc ); + } + } + if ( LDAP_BACK_QUARANTINE( li ) ) { + slap_retry_info_destroy( &li->li_quarantine ); + ldap_pvt_thread_mutex_destroy( &li->li_quarantine_mutex ); + } + + ldap_pvt_thread_mutex_unlock( &li->li_conninfo.lai_mutex ); + ldap_pvt_thread_mutex_destroy( &li->li_conninfo.lai_mutex ); + ldap_pvt_thread_mutex_destroy( &li->li_uri_mutex ); } ch_free( be->be_private ); + return 0; } + +#if SLAPD_LDAP == SLAPD_MOD_DYNAMIC + +/* conditionally define the init_module() function */ +SLAP_BACKEND_INIT_MODULE( ldap ) + +#endif /* SLAPD_LDAP == SLAPD_MOD_DYNAMIC */ +