X-Git-Url: https://git.sur5r.net/?a=blobdiff_plain;f=servers%2Fslapd%2Fback-ldbm%2Fsearch.c;h=0f949ca5b00aa35d7d33dc4634259ad9a910ebd1;hb=a4d161cff64c74e03e5898eae104d5d52cc54a91;hp=87f4b9278b1676360089b3b42d5fd18445464e53;hpb=6107ba67d2fd7eadb23ffdd1d284306011ef4013;p=openldap diff --git a/servers/slapd/back-ldbm/search.c b/servers/slapd/back-ldbm/search.c index 87f4b9278b..0f949ca5b0 100644 --- a/servers/slapd/back-ldbm/search.c +++ b/servers/slapd/back-ldbm/search.c @@ -1,8 +1,17 @@ /* search.c - ldbm backend search function */ /* $OpenLDAP$ */ -/* - * Copyright 1998-2002 The OpenLDAP Foundation, All Rights Reserved. - * COPYING RESTRICTIONS APPLY, see COPYRIGHT file +/* This work is part of OpenLDAP Software . + * + * Copyright 1998-2006 The OpenLDAP Foundation. + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted only as authorized by the OpenLDAP + * Public License. + * + * A copy of this license is available in the file LICENSE in the + * top-level directory of the distribution or, alternatively, at + * . */ #include "portable.h" @@ -20,172 +29,180 @@ static ID_BLOCK *base_candidate( Backend *be, Entry *e ); static ID_BLOCK *search_candidates( - Backend *be, Entry *e, Filter *filter, + Operation *op, Entry *e, Filter *filter, int scope, int deref, int manageDSAit ); int ldbm_back_search( - Backend *be, - Connection *conn, Operation *op, - struct berval *base, - struct berval *nbase, - int scope, - int deref, - int slimit, - int tlimit, - Filter *filter, - struct berval *filterstr, - AttributeName *attrs, - int attrsonly ) + SlapReply *rs ) { - struct ldbminfo *li = (struct ldbminfo *) be->be_private; - int rc, err; - const char *text = NULL; + struct ldbminfo *li = (struct ldbminfo *) op->o_bd->be_private; + int rc; time_t stoptime; ID_BLOCK *candidates; ID id, cursor; Entry *e; - BerVarray v2refs = NULL; Entry *matched = NULL; - struct berval realbase = { 0, NULL }; - int nentries = 0; + struct berval realbase = BER_BVNULL; int manageDSAit = get_manageDSAit( op ); - int cscope = LDAP_SCOPE_DEFAULT; +#ifdef SLAP_ACL_HONOR_DISCLOSE + slap_mask_t mask; +#endif - struct slap_limits_set *limit = NULL; - int isroot = 0; - -#ifdef NEW_LOGGING - LDAP_LOG( BACK_LDBM, ENTRY, "ldbm_back_search: enter\n", 0, 0, 0 ); -#else Debug(LDAP_DEBUG_TRACE, "=> ldbm_back_search\n", 0, 0, 0); -#endif /* grab giant lock for reading */ ldap_pvt_thread_rdwr_rlock(&li->li_giant_rwlock); - if ( nbase->bv_len == 0 ) { + if ( op->o_req_ndn.bv_len == 0 ) { /* DIT root special case */ e = (Entry *) &slap_entry_root; /* need normalized dn below */ ber_dupbv( &realbase, &e->e_nname ); - candidates = search_candidates( be, e, filter, - scope, deref, manageDSAit ); + candidates = search_candidates( op, e, op->ors_filter, + op->ors_scope, op->ors_deref, + manageDSAit || get_domainScope(op) ); goto searchit; - } else if ( deref & LDAP_DEREF_FINDING ) { + } else if ( op->ors_deref & LDAP_DEREF_FINDING ) { /* deref dn and get entry with reader lock */ - e = deref_dn_r( be, nbase, &err, &matched, &text ); + e = deref_dn_r( op->o_bd, &op->o_req_ndn, + &rs->sr_err, &matched, &rs->sr_text ); - if( err == LDAP_NO_SUCH_OBJECT ) err = LDAP_REFERRAL; + if( rs->sr_err == LDAP_NO_SUCH_OBJECT ) rs->sr_err = LDAP_REFERRAL; } else { /* get entry with reader lock */ - e = dn2entry_r( be, nbase, &matched ); - err = e != NULL ? LDAP_SUCCESS : LDAP_REFERRAL; - text = NULL; + e = dn2entry_r( op->o_bd, &op->o_req_ndn, &matched ); + rs->sr_err = e != NULL ? LDAP_SUCCESS : LDAP_REFERRAL; + rs->sr_text = NULL; } if ( e == NULL ) { - struct berval matched_dn = { 0, NULL }; - BerVarray refs = NULL; + struct berval matched_dn = BER_BVNULL; if ( matched != NULL ) { - BerVarray erefs; - ber_dupbv( &matched_dn, &matched->e_name ); - - erefs = is_entry_referral( matched ) - ? get_entry_referrals( be, conn, op, matched ) - : NULL; + BerVarray erefs = NULL; + +#ifdef SLAP_ACL_HONOR_DISCLOSE + if ( ! access_allowed( op, matched, + slap_schema.si_ad_entry, + NULL, ACL_DISCLOSE, NULL ) ) + { + rs->sr_err = LDAP_NO_SUCH_OBJECT; + + } else +#endif /* SLAP_ACL_HONOR_DISCLOSE */ + { + ber_dupbv( &matched_dn, &matched->e_name ); + + erefs = is_entry_referral( matched ) + ? get_entry_referrals( op, matched ) + : NULL; + } cache_return_entry_r( &li->li_cache, matched ); - if( erefs ) { - refs = referral_rewrite( erefs, &matched_dn, - base, scope ); + if ( erefs ) { + rs->sr_ref = referral_rewrite( erefs, &matched_dn, + &op->o_req_dn, op->ors_scope ); ber_bvarray_free( erefs ); } } else { - refs = referral_rewrite( default_referral, - NULL, base, scope ); + rs->sr_ref = referral_rewrite( default_referral, + NULL, &op->o_req_dn, op->ors_scope ); } ldap_pvt_thread_rdwr_runlock(&li->li_giant_rwlock); - send_ldap_result( conn, op, err, matched_dn.bv_val, - text, refs, NULL ); + rs->sr_matched = matched_dn.bv_val; + send_ldap_result( op, rs ); - ber_bvarray_free( refs ); + ber_bvarray_free( rs->sr_ref ); ber_memfree( matched_dn.bv_val ); - return 1; + rs->sr_ref = NULL; + rs->sr_matched = NULL; + return rs->sr_err; } - if (!manageDSAit && is_entry_referral( e ) ) { +#ifdef SLAP_ACL_HONOR_DISCLOSE + /* NOTE: __NEW__ "search" access is required + * on searchBase object */ + if ( ! access_allowed_mask( op, e, slap_schema.si_ad_entry, + NULL, ACL_SEARCH, NULL, &mask ) ) + { + if ( !ACL_GRANT( mask, ACL_DISCLOSE ) ) { + rs->sr_err = LDAP_NO_SUCH_OBJECT; + } else { + rs->sr_err = LDAP_INSUFFICIENT_ACCESS; + } + + cache_return_entry_r( &li->li_cache, e ); + ldap_pvt_thread_rdwr_runlock(&li->li_giant_rwlock); + + send_ldap_result( op, rs ); + return rs->sr_err; + } +#endif /* SLAP_ACL_HONOR_DISCLOSE */ + + if ( !manageDSAit && is_entry_referral( e ) ) { /* entry is a referral, don't allow add */ - struct berval matched_dn; - BerVarray erefs; - BerVarray refs; + struct berval matched_dn = BER_BVNULL; + BerVarray erefs = NULL; + + rs->sr_ref = NULL; + rs->sr_err = LDAP_OTHER; + rs->sr_text = "bad referral object"; ber_dupbv( &matched_dn, &e->e_name ); - erefs = get_entry_referrals( be, conn, op, e ); - refs = NULL; + erefs = get_entry_referrals( op, e ); cache_return_entry_r( &li->li_cache, e ); ldap_pvt_thread_rdwr_runlock(&li->li_giant_rwlock); -#ifdef NEW_LOGGING - LDAP_LOG( BACK_LDBM, INFO, - "ldbm_search: entry (%s) is a referral.\n", - e->e_dn, 0, 0 ); -#else Debug( LDAP_DEBUG_TRACE, "ldbm_search: entry is referral\n", 0, 0, 0 ); -#endif - if( erefs ) { - refs = referral_rewrite( erefs, &matched_dn, - base, scope ); + if ( erefs ) { + rs->sr_ref = referral_rewrite( erefs, &matched_dn, + &op->o_req_dn, op->ors_scope ); ber_bvarray_free( erefs ); + + if ( rs->sr_ref ) { + rs->sr_err = LDAP_REFERRAL; + rs->sr_text = NULL; + } } - if( refs ) { - send_ldap_result( conn, op, LDAP_REFERRAL, - matched_dn.bv_val, NULL, refs, NULL ); - ber_bvarray_free( refs ); - - } else { - send_ldap_result( conn, op, LDAP_OTHER, - matched_dn.bv_val, - "bad referral object", NULL, NULL ); - } - + rs->sr_matched = matched_dn.bv_val; + send_ldap_result( op, rs ); + ber_bvarray_free( rs->sr_ref ); ber_memfree( matched_dn.bv_val ); - return 1; + rs->sr_ref = NULL; + rs->sr_matched = NULL; + return rs->sr_err; } if ( is_entry_alias( e ) ) { /* don't deref */ - deref = LDAP_DEREF_NEVER; + op->ors_deref = LDAP_DEREF_NEVER; } - if ( scope == LDAP_SCOPE_BASE ) { - cscope = LDAP_SCOPE_BASE; - candidates = base_candidate( be, e ); + if ( op->ors_scope == LDAP_SCOPE_BASE ) { + candidates = base_candidate( op->o_bd, e ); } else { - cscope = ( scope != LDAP_SCOPE_SUBTREE ) - ? LDAP_SCOPE_BASE : LDAP_SCOPE_SUBTREE; - candidates = search_candidates( be, e, filter, - scope, deref, manageDSAit ); + candidates = search_candidates( op, e, op->ors_filter, + op->ors_scope, op->ors_deref, manageDSAit ); } /* need normalized dn below */ @@ -196,139 +213,90 @@ ldbm_back_search( searchit: if ( candidates == NULL ) { /* no candidates */ -#ifdef NEW_LOGGING - LDAP_LOG( BACK_LDBM, INFO, - "ldbm_search: no candidates\n" , 0, 0, 0); -#else Debug( LDAP_DEBUG_TRACE, "ldbm_search: no candidates\n", 0, 0, 0 ); -#endif - send_search_result( conn, op, - LDAP_SUCCESS, - NULL, NULL, NULL, NULL, 0 ); + rs->sr_err = LDAP_SUCCESS; + send_ldap_result( op, rs ); - rc = 1; + rc = LDAP_SUCCESS; goto done; } - /* if not root, get appropriate limits */ - if ( be_isroot( be, &op->o_ndn ) ) { - isroot = 1; - } else { - ( void ) get_limits( be, &op->o_ndn, &limit ); - } - /* if candidates exceed to-be-checked entries, abort */ - if ( !isroot && limit->lms_s_unchecked != -1 ) { - if ( ID_BLOCK_NIDS( candidates ) > (unsigned) limit->lms_s_unchecked ) { - send_search_result( conn, op, LDAP_ADMINLIMIT_EXCEEDED, - NULL, NULL, NULL, NULL, 0 ); - rc = 0; - goto done; - } + if ( op->ors_limit /* isroot == FALSE */ + && op->ors_limit->lms_s_unchecked != -1 + && ID_BLOCK_NIDS( candidates ) > (unsigned) op->ors_limit->lms_s_unchecked ) + { + send_ldap_error( op, rs, LDAP_ADMINLIMIT_EXCEEDED, NULL ); + rc = LDAP_SUCCESS; + goto done; } - /* if root an no specific limit is required, allow unlimited search */ - if ( isroot ) { - if ( tlimit == 0 ) { - tlimit = -1; - } - - if ( slimit == 0 ) { - slimit = -1; - } - - } else { - /* if no limit is required, use soft limit */ - if ( tlimit <= 0 ) { - tlimit = limit->lms_t_soft; - - /* if requested limit higher than hard limit, abort */ - } else if ( tlimit > limit->lms_t_hard ) { - /* no hard limit means use soft instead */ - if ( limit->lms_t_hard == 0 && tlimit > limit->lms_t_soft ) { - tlimit = limit->lms_t_soft; - - /* positive hard limit means abort */ - } else if ( limit->lms_t_hard > 0 ) { - send_search_result( conn, op, - LDAP_UNWILLING_TO_PERFORM, - NULL, NULL, NULL, NULL, 0 ); - rc = 0; - goto done; - } - - /* negative hard limit means no limit */ - } - - /* if no limit is required, use soft limit */ - if ( slimit <= 0 ) { - slimit = limit->lms_s_soft; - - /* if requested limit higher than hard limit, abort */ - } else if ( slimit > limit->lms_s_hard ) { - /* no hard limit means use soft instead */ - if ( limit->lms_s_hard == 0 && slimit > limit->lms_s_soft ) { - slimit = limit->lms_s_soft; - - /* positive hard limit means abort */ - } else if ( limit->lms_s_hard > 0 ) { - send_search_result( conn, op, - LDAP_UNWILLING_TO_PERFORM, - NULL, NULL, NULL, NULL, 0 ); - rc = 0; - goto done; - } - - /* negative hard limit means no limit */ - } - } - /* compute it anyway; root does not use it */ - stoptime = op->o_time + tlimit; + stoptime = op->o_time + op->ors_tlimit; + rs->sr_attrs = op->ors_attrs; for ( id = idl_firstid( candidates, &cursor ); id != NOID; id = idl_nextid( candidates, &cursor ) ) { int scopeok = 0; + int result = 0; /* check for abandon */ if ( op->o_abandon ) { - rc = 0; + rc = SLAPD_ABANDON; goto done; } /* check time limit */ - if ( tlimit != -1 && slap_get_time() > stoptime ) { - send_search_result( conn, op, LDAP_TIMELIMIT_EXCEEDED, - NULL, NULL, v2refs, NULL, nentries ); - rc = 0; + if ( op->ors_tlimit != SLAP_NO_LIMIT + && slap_get_time() > stoptime ) + { + rs->sr_err = LDAP_TIMELIMIT_EXCEEDED; + send_ldap_result( op, rs ); + rc = LDAP_SUCCESS; goto done; } /* get the entry with reader lock */ - e = id2entry_r( be, id ); + e = id2entry_r( op->o_bd, id ); if ( e == NULL ) { -#ifdef NEW_LOGGING - LDAP_LOG( BACK_LDBM, INFO, - "ldbm_search: candidate %ld not found.\n", id, 0, 0 ); -#else Debug( LDAP_DEBUG_TRACE, "ldbm_search: candidate %ld not found\n", id, 0, 0 ); -#endif goto loop_continue; } - if ( deref & LDAP_DEREF_SEARCHING && is_entry_alias( e ) ) { + rs->sr_entry = e; + + if ( is_entry_subentry( e ) ) { + if( op->ors_scope != LDAP_SCOPE_BASE ) { + if(!get_subentries_visibility( op )) { + /* only subentries are visible */ + goto loop_continue; + } + } else if ( get_subentries( op ) && + !get_subentries_visibility( op )) + { + /* only subentries are visible */ + goto loop_continue; + } + } else if ( get_subentries_visibility( op )) { + /* only subentries are visible */ + goto loop_continue; + } + + if ( op->ors_deref & LDAP_DEREF_SEARCHING && + is_entry_alias( e ) ) + { Entry *matched; int err; const char *text; - e = deref_entry_r( be, e, &err, &matched, &text ); + e = deref_entry_r( op->o_bd, e, &err, &matched, &text ); if( e == NULL ) { e = matched; @@ -341,7 +309,7 @@ searchit: } /* need to skip alias which deref into scope */ - if( scope & LDAP_SCOPE_ONELEVEL ) { + if( op->ors_scope == LDAP_SCOPE_ONELEVEL ) { struct berval pdn; dnParent( &e->e_nname, &pdn ); if ( ber_bvcmp( &pdn, &realbase ) ) { @@ -350,145 +318,143 @@ searchit: } else if ( dnIsSuffix( &e->e_nname, &realbase ) ) { /* alias is within scope */ -#ifdef NEW_LOGGING - LDAP_LOG( BACK_LDBM, DETAIL1, - "ldbm_search: alias \"%s\" in subtree\n", e->e_dn, 0, 0 ); -#else Debug( LDAP_DEBUG_TRACE, "ldbm_search: alias \"%s\" in subtree\n", e->e_dn, 0, 0 ); -#endif goto loop_continue; } + rs->sr_entry = e; + scopeok = 1; } /* - * if it's a referral, add it to the list of referrals. only do - * this for non-base searches, and don't check the filter - * explicitly here since it's only a candidate anyway. + * If it's a referral, add it to the list of referrals. + * Only do this for non-base searches, and don't check + * the filter explicitly here since it's only a candidate + * anyway. */ - if ( !manageDSAit && scope != LDAP_SCOPE_BASE && + if ( !manageDSAit && op->ors_scope != LDAP_SCOPE_BASE && is_entry_referral( e ) ) { struct berval dn; /* check scope */ - if ( !scopeok && scope == LDAP_SCOPE_ONELEVEL ) { - if ( !be_issuffix( be, &e->e_nname ) ) { + if ( !scopeok && op->ors_scope == LDAP_SCOPE_ONELEVEL ) { + if ( !be_issuffix( op->o_bd, &e->e_nname ) ) { dnParent( &e->e_nname, &dn ); scopeok = dn_match( &dn, &realbase ); } else { scopeok = (realbase.bv_len == 0); } - } else if ( !scopeok && scope == LDAP_SCOPE_SUBTREE ) { + } else if ( !scopeok + && op->ors_scope == LDAP_SCOPE_SUBTREE ) + { scopeok = dnIsSuffix( &e->e_nname, &realbase ); +#ifdef LDAP_SCOPE_SUBORDINATE + } else if ( !scopeok + && op->ors_scope == LDAP_SCOPE_SUBORDINATE ) + { + scopeok = !dn_match( &e->e_nname, &realbase ) + && dnIsSuffix( &e->e_nname, &realbase ); +#endif + } else { scopeok = 1; } if( scopeok ) { - BerVarray erefs = get_entry_referrals( - be, conn, op, e ); - BerVarray refs = referral_rewrite( erefs, + BerVarray erefs = get_entry_referrals( op, e ); + rs->sr_ref = referral_rewrite( erefs, &e->e_name, NULL, - scope == LDAP_SCOPE_SUBTREE - ? LDAP_SCOPE_SUBTREE - : LDAP_SCOPE_BASE ); + op->ors_scope == LDAP_SCOPE_ONELEVEL + ? LDAP_SCOPE_BASE + : LDAP_SCOPE_SUBTREE ); + + ber_bvarray_free( erefs ); - send_search_reference( be, conn, op, - e, refs, NULL, &v2refs ); + send_search_reference( op, rs ); - ber_bvarray_free( refs ); + ber_bvarray_free( rs->sr_ref ); + rs->sr_ref = NULL; } else { -#ifdef NEW_LOGGING - LDAP_LOG( BACK_LDBM, DETAIL2, - "ldbm_search: candidate referral %ld scope not okay\n", - id, 0, 0 ); -#else Debug( LDAP_DEBUG_TRACE, "ldbm_search: candidate referral %ld scope not okay\n", id, 0, 0 ); -#endif } goto loop_continue; } + if ( !manageDSAit && is_entry_glue( e )) { + goto loop_continue; + } + /* if it matches the filter and scope, send it */ - if ( test_filter( be, conn, op, e, filter ) == LDAP_COMPARE_TRUE ) { + result = test_filter( op, e, op->ors_filter ); + + if ( result == LDAP_COMPARE_TRUE ) { struct berval dn; /* check scope */ - if ( !scopeok && scope == LDAP_SCOPE_ONELEVEL ) { - if ( !be_issuffix( be, &e->e_nname ) ) { + if ( !scopeok && op->ors_scope == LDAP_SCOPE_ONELEVEL ) { + if ( !be_issuffix( op->o_bd, &e->e_nname ) ) { dnParent( &e->e_nname, &dn ); scopeok = dn_match( &dn, &realbase ); } else { scopeok = (realbase.bv_len == 0); } - } else if ( !scopeok && scope == LDAP_SCOPE_SUBTREE ) { + } else if ( !scopeok && + op->ors_scope == LDAP_SCOPE_SUBTREE ) + { scopeok = dnIsSuffix( &e->e_nname, &realbase ); + } else if ( !scopeok && + op->ors_scope == LDAP_SCOPE_SUBORDINATE ) + { + scopeok = !dn_match( &e->e_nname, &realbase ) + && dnIsSuffix( &e->e_nname, &realbase ); + } else { scopeok = 1; } if ( scopeok ) { - /* check size limit */ - if ( --slimit == -1 ) { - cache_return_entry_r( &li->li_cache, e ); - send_search_result( conn, op, - LDAP_SIZELIMIT_EXCEEDED, NULL, NULL, - v2refs, NULL, nentries ); - rc = 0; - goto done; - } - if (e) { - int result = send_search_entry(be, conn, op, - e, attrs, attrsonly, NULL); - - switch (result) { - case 0: /* entry sent ok */ - nentries++; - break; - case 1: /* entry not sent */ - break; - case -1: /* connection closed */ + rs->sr_flags = 0; + rs->sr_err = send_search_entry( op, rs ); + + switch ( rs->sr_err ) { + case LDAP_UNAVAILABLE: /* connection closed */ + cache_return_entry_r( &li->li_cache, e ); + rc = LDAP_SUCCESS; + goto done; + case LDAP_SIZELIMIT_EXCEEDED: cache_return_entry_r( &li->li_cache, e ); - rc = 0; + rc = rs->sr_err; + rs->sr_entry = NULL; + send_ldap_result( op, rs ); + rc = LDAP_SUCCESS; goto done; } } + } else { -#ifdef NEW_LOGGING - LDAP_LOG( BACK_LDBM, DETAIL2, - "ldbm_search: candidate entry %ld scope not okay\n", - id, 0, 0 ); -#else Debug( LDAP_DEBUG_TRACE, "ldbm_search: candidate entry %ld scope not okay\n", id, 0, 0 ); -#endif } } else { -#ifdef NEW_LOGGING - LDAP_LOG( BACK_LDBM, DETAIL2, - "ldbm_search: candidate entry %ld does not match filter\n", - id, 0, 0 ); -#else Debug( LDAP_DEBUG_TRACE, "ldbm_search: candidate entry %ld does not match filter\n", id, 0, 0 ); -#endif } loop_continue: @@ -500,11 +466,11 @@ loop_continue: ldap_pvt_thread_yield(); } - send_search_result( conn, op, - v2refs == NULL ? LDAP_SUCCESS : LDAP_REFERRAL, - NULL, NULL, v2refs, NULL, nentries ); + rs->sr_err = rs->sr_v2ref ? LDAP_REFERRAL : LDAP_SUCCESS; + rs->sr_ref = rs->sr_v2ref; + send_ldap_result( op, rs ); - rc = 0; + rc = LDAP_SUCCESS; done: ldap_pvt_thread_rdwr_runlock(&li->li_giant_rwlock); @@ -512,7 +478,7 @@ done: if( candidates != NULL ) idl_free( candidates ); - if( v2refs ) ber_bvarray_free( v2refs ); + if( rs->sr_v2ref ) ber_bvarray_free( rs->sr_v2ref ); if( realbase.bv_val ) free( realbase.bv_val ); return rc; @@ -525,12 +491,8 @@ base_candidate( { ID_BLOCK *idl; -#ifdef NEW_LOGGING - LDAP_LOG( BACK_LDBM, ENTRY, "base_candidate: base (%s)\n", e->e_dn, 0, 0 ); -#else Debug(LDAP_DEBUG_TRACE, "base_candidates: base: \"%s\"\n", e->e_dn, 0, 0); -#endif idl = idl_alloc( 1 ); @@ -541,7 +503,7 @@ base_candidate( static ID_BLOCK * search_candidates( - Backend *be, + Operation *op, Entry *e, Filter *filter, int scope, @@ -551,18 +513,14 @@ search_candidates( ID_BLOCK *candidates; Filter f, fand, rf, af, xf; AttributeAssertion aa_ref, aa_alias; - struct berval bv_ref = { sizeof("REFERRAL")-1, "REFERRAL" }; - struct berval bv_alias = { sizeof("ALIAS")-1, "ALIAS" }; - -#ifdef NEW_LOGGING - LDAP_LOG( BACK_LDBM, DETAIL1, - "search_candidates: base (%s) scope %d deref %d\n", - e->e_ndn, scope, deref ); -#else + struct berval bv_ref = { sizeof("referral")-1, "referral" }; + struct berval bv_alias = { sizeof("alias")-1, "alias" }; + Filter sf; + AttributeAssertion aa_subentry; + Debug(LDAP_DEBUG_TRACE, "search_candidates: base=\"%s\" s=%d d=%d\n", e->e_ndn, scope, deref ); -#endif xf.f_or = filter; @@ -592,13 +550,22 @@ search_candidates( f.f_next = NULL; f.f_choice = LDAP_FILTER_AND; f.f_and = &fand; - fand.f_choice = scope == LDAP_SCOPE_SUBTREE - ? SLAPD_FILTER_DN_SUBTREE - : SLAPD_FILTER_DN_ONE; + fand.f_choice = scope == LDAP_SCOPE_ONELEVEL + ? SLAPD_FILTER_DN_ONE + : SLAPD_FILTER_DN_SUBTREE; fand.f_dn = &e->e_nname; fand.f_next = xf.f_or == filter ? filter : &xf ; - candidates = filter_candidates( be, &f ); + if ( get_subentries_visibility( op )) { + struct berval bv_subentry = { sizeof("SUBENTRY")-1, "SUBENTRY" }; + sf.f_choice = LDAP_FILTER_EQUALITY; + sf.f_ava = &aa_subentry; + sf.f_av_desc = slap_schema.si_ad_objectClass; + sf.f_av_value = bv_subentry; + sf.f_next = fand.f_next; + fand.f_next = &sf; + } + candidates = filter_candidates( op, &f ); return( candidates ); }