X-Git-Url: https://git.sur5r.net/?a=blobdiff_plain;f=servers%2Fslapd%2Fconfig.c;h=cbfc9482ca0ad0b4017b9da8197eba52b976bc05;hb=b0b3eff457f0e431c4fd094d3d9cfeb6383df91d;hp=783550f8d3437e882ce29dad9d5d31283bed9d9c;hpb=30ccb6087f7ccceebffc674095e5fc4a34268994;p=openldap diff --git a/servers/slapd/config.c b/servers/slapd/config.c index 783550f8d3..cbfc9482ca 100644 --- a/servers/slapd/config.c +++ b/servers/slapd/config.c @@ -1,8 +1,27 @@ /* config.c - configuration file handling routines */ /* $OpenLDAP$ */ -/* - * Copyright 1998-2003 The OpenLDAP Foundation, All Rights Reserved. - * COPYING RESTRICTIONS APPLY, see COPYRIGHT file +/* This work is part of OpenLDAP Software . + * + * Copyright 1998-2003 The OpenLDAP Foundation. + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted only as authorized by the OpenLDAP + * Public License. + * + * A copy of this license is available in the file LICENSE in the + * top-level directory of the distribution or, alternatively, at + * . + */ +/* Portions Copyright (c) 1995 Regents of the University of Michigan. + * All rights reserved. + * + * Redistribution and use in source and binary forms are permitted + * provided that this notice is preserved and that due credit is given + * to the University of Michigan at Ann Arbor. The name of the University + * may not be used to endorse or promote products derived from this + * software without specific prior written permission. This software + * is provided ``as is'' without express or implied warranty. */ #include "portable.h" @@ -73,6 +92,10 @@ char *strtok_quote_ptr; int use_reverse_lookup = 0; +#ifdef LDAP_SLAPI +int slapi_plugins_used = 0; +#endif + static char *fp_getline(FILE *fp, int *lineno); static void fp_getline_init(int *lineno); static int fp_parse_line(int lineno, char *line); @@ -80,10 +103,8 @@ static int fp_parse_line(int lineno, char *line); static char *strtok_quote(char *line, char *sep); static int load_ucdata(char *path); -#ifdef LDAP_SYNCREPL -static void add_syncrepl LDAP_P(( Backend *, char **, int )); +static int add_syncrepl LDAP_P(( Backend *, char **, int )); static int parse_syncrepl_line LDAP_P(( char **, int, syncinfo_t *)); -#endif int read_config( const char *fname, int depth ) @@ -1641,13 +1662,11 @@ read_config( const char *fname, int depth ) #endif } -#ifdef SLAP_EXTENDED_SCHEMA } else if ( strcasecmp( cargv[0], "ditcontentrule" ) == 0 ) { char * p; p = strchr(saveline,'(' /*')'*/); rc = parse_cr( fname, lineno, p, cargv ); if( rc ) return rc; -#endif /* specify an attribute type */ } else if (( strcasecmp( cargv[0], "attributetype" ) == 0 ) @@ -1747,12 +1766,25 @@ read_config( const char *fname, int depth ) ldap_syslog += atoi( cargv[1] ); } -#ifdef LDAP_SYNCREPL /* list of sync replication information in this backend (slave only) */ } else if ( strcasecmp( cargv[0], "syncrepl" ) == 0 ) { - add_syncrepl( be, cargv, cargc ); + if ( be == NULL ) { +#ifdef NEW_LOGGING + LDAP_LOG( CONFIG, INFO, + "%s: line %d: syncrepl line must appear inside " + "a database definition.\n", fname, lineno, 0); +#else + Debug( LDAP_DEBUG_ANY, + "%s: line %d: syncrepl line must appear inside " + "a database definition.\n", fname, lineno, 0); #endif + return 1; + } else { + if ( add_syncrepl( be, cargv, cargc )) { + return 1; + } + } /* list of replicas of the data in this backend (master only) */ } else if ( strcasecmp( cargv[0], "replica" ) == 0 ) { @@ -1926,7 +1958,7 @@ read_config( const char *fname, int depth ) } } - /* dn of master entity allowed to write to replica */ + /* dn of slave entity allowed to write to replica */ } else if ( strcasecmp( cargv[0], "updatedn" ) == 0 ) { if ( cargc < 2 ) { #ifdef NEW_LOGGING @@ -2380,7 +2412,7 @@ read_config( const char *fname, int depth ) #ifdef NEW_LOGGING LDAP_LOG( CONFIG, INFO, "%s: line %d: plugin line must appear " - "inside a database definition.\n", + "insid a database definition.\n", fname, lineno, 0 ); #else Debug( LDAP_DEBUG_ANY, "%s: line %d: plugin " @@ -2395,6 +2427,7 @@ read_config( const char *fname, int depth ) != LDAP_SUCCESS ) { return( 1 ); } + slapi_plugins_used++; #else /* !defined( LDAP_SLAPI ) */ #ifdef NEW_LOGGING @@ -2733,8 +2766,7 @@ config_destroy( ) acl_destroy( global_acl, NULL ); } -#ifdef LDAP_SYNCREPL -static void +static int add_syncrepl( Backend *be, char **cargv, @@ -2742,12 +2774,11 @@ add_syncrepl( ) { syncinfo_t *si; + syncinfo_t *si_entry; + int rc = 0; + int duplicated_replica_id = 0; - si = be->syncinfo = (syncinfo_t *) ch_calloc( 1, sizeof( syncinfo_t ) ); - - /* set default values; FIXME : add others */ - si->tlimit = -1; - si->slimit = -1; + si = (syncinfo_t *) ch_calloc( 1, sizeof( syncinfo_t ) ); if ( si == NULL ) { #ifdef NEW_LOGGING @@ -2755,79 +2786,144 @@ add_syncrepl( #else Debug( LDAP_DEBUG_ANY, "out of memory in add_syncrepl\n", 0, 0, 0 ); #endif - exit( EXIT_FAILURE ); + return 1; } - if ( parse_syncrepl_line( cargv, cargc, si ) < 0 ) { + si->si_tls = SYNCINFO_TLS_OFF; + if ( be->be_rootndn.bv_val ) { + ber_dupbv( &si->si_updatedn, &be->be_rootndn ); + } + si->si_bindmethod = LDAP_AUTH_SIMPLE; + si->si_schemachecking = 0; + ber_str2bv( "(objectclass=*)", sizeof("(objectclass=*)")-1, 0, + &si->si_filterstr ); + si->si_base.bv_val = NULL; + si->si_scope = LDAP_SCOPE_SUBTREE; + si->si_attrsonly = 0; + si->si_attrs = (char **) ch_calloc( 1, sizeof( char * )); + si->si_attrs[0] = NULL; + si->si_type = LDAP_SYNC_REFRESH_ONLY; + si->si_interval = 86400; + si->si_syncCookie.ctxcsn = NULL; + si->si_syncCookie.octet_str = NULL; + si->si_syncCookie.sid = -1; + si->si_manageDSAit = 0; + si->si_tlimit = -1; + si->si_slimit = -1; + si->si_syncUUID_ndn.bv_val = NULL; + si->si_syncUUID_ndn.bv_len = 0; + + si->si_presentlist = NULL; + LDAP_LIST_INIT( &si->si_nonpresentlist ); + + rc = parse_syncrepl_line( cargv, cargc, si ); + + LDAP_STAILQ_FOREACH( si_entry, &be->be_syncinfo, si_next ) { + if ( si->si_rid == si_entry->si_rid ) { +#ifdef NEW_LOGGING + LDAP_LOG( CONFIG, ERR, + "add_syncrepl: duplicaetd replica id\n", 0, 0,0 ); +#else + Debug( LDAP_DEBUG_ANY, + "add_syncrepl: duplicated replica id\n",0, 0, 0 ); +#endif + duplicated_replica_id = 1; + break; + } + } + + if ( rc < 0 || duplicated_replica_id ) { + syncinfo_t *si_entry; /* Something bad happened - back out */ #ifdef NEW_LOGGING LDAP_LOG( CONFIG, ERR, "failed to add syncinfo\n", 0, 0,0 ); #else Debug( LDAP_DEBUG_ANY, "failed to add syncinfo\n", 0, 0, 0 ); #endif - free( si ); - be->syncinfo = NULL; + + /* If error, remove all syncinfo */ + LDAP_STAILQ_FOREACH( si_entry, &be->be_syncinfo, si_next ) { + if ( si_entry->si_updatedn.bv_val ) { + ch_free( si->si_updatedn.bv_val ); + } + if ( si_entry->si_filterstr.bv_val ) { + ch_free( si->si_filterstr.bv_val ); + } + if ( si_entry->si_attrs ) { + int i = 0; + while ( si_entry->si_attrs[i] != NULL ) { + ch_free( si_entry->si_attrs[i] ); + i++; + } + ch_free( si_entry->si_attrs ); + } + } + + while ( !LDAP_STAILQ_EMPTY( &be->be_syncinfo )) { + si_entry = LDAP_STAILQ_FIRST( &be->be_syncinfo ); + LDAP_STAILQ_REMOVE_HEAD( &be->be_syncinfo, si_next ); + ch_free( si_entry ); + } + LDAP_STAILQ_INIT( &be->be_syncinfo ); + return 1; } else { #ifdef NEW_LOGGING LDAP_LOG ( CONFIG, RESULTS, "add_syncrepl: Config: ** successfully added syncrepl \"%s\"\n", - si->masteruri == NULL ? "(null)" : si->masteruri, 0, 0 ); + si->si_provideruri == NULL ? "(null)" : si->si_provideruri, 0, 0 ); #else Debug( LDAP_DEBUG_CONFIG, "Config: ** successfully added syncrepl \"%s\"\n", - si->masteruri == NULL ? "(null)" : si->masteruri, 0, 0 ); + si->si_provideruri == NULL ? "(null)" : si->si_provideruri, 0, 0 ); #endif - si->be = be; + if ( !si->si_schemachecking ) { + be->be_flags |= SLAP_BFLAG_NO_SCHEMA_CHECK; + } + si->si_be = be; + LDAP_STAILQ_INSERT_TAIL( &be->be_syncinfo, si, si_next ); + return 0; } } -#define IDSTR "id" -#define PROVIDERSTR "provider" -#define SUFFIXSTR "suffix" +#define IDSTR "rid" +#define PROVIDERSTR "provider" +#define SUFFIXSTR "suffix" #define UPDATEDNSTR "updatedn" -#define BINDDNSTR "binddn" -#define BINDMETHSTR "bindmethod" -#define SIMPLESTR "simple" -#define SASLSTR "sasl" -#define CREDSTR "credentials" -#define OLDAUTHCSTR "bindprincipal" -#define AUTHCSTR "authcID" -#define AUTHZSTR "authzID" -#define SRVTABSTR "srvtab" -#define SASLMECHSTR "saslmech" -#define REALMSTR "realm" -#define SECPROPSSTR "secprops" -#define STARTTLSSTR "starttls" -#define CRITICALSTR "critical" - -#define FILTERSTR "filter" -#define SEARCHBASESTR "searchbase" -#define SCOPESTR "scope" -#define ATTRSSTR "attrs" -#define ATTRSONLYSTR "attrsonly" -#define TYPESTR "type" -#define INTERVALSTR "interval" -#define COOKIESTR "cookie" -#define LASTMODSTR "lastmod" -#define LMREQSTR "req" -#define LMGENSTR "gen" -#define LMNOSTR "no" +#define BINDMETHSTR "bindmethod" +#define SIMPLESTR "simple" +#define SASLSTR "sasl" +#define BINDDNSTR "binddn" +#define CREDSTR "credentials" +#define OLDAUTHCSTR "bindprincipal" +#define AUTHCSTR "authcID" +#define AUTHZSTR "authzID" +#define SRVTABSTR "srvtab" +#define SASLMECHSTR "saslmech" +#define REALMSTR "realm" +#define SECPROPSSTR "secprops" +#define STARTTLSSTR "starttls" +#define CRITICALSTR "critical" + +#define SCHEMASTR "schemachecking" +#define FILTERSTR "filter" +#define SEARCHBASESTR "searchbase" +#define SCOPESTR "scope" +#define ATTRSSTR "attrs" +#define ATTRSONLYSTR "attrsonly" +#define TYPESTR "type" +#define INTERVALSTR "interval" +#define LASTMODSTR "lastmod" +#define LMREQSTR "req" +#define LMGENSTR "gen" +#define LMNOSTR "no" +#define MANAGEDSAITSTR "manageDSAit" +#define SLIMITSTR "sizelimit" +#define TLIMITSTR "timelimit" #define GOT_ID 0x0001 -#define GOT_HOST 0x0002 -#define GOT_DN 0x0004 -#define GOT_METHOD 0x0008 -#define GOT_MECH 0x0010 -#define GOT_FILTER 0x0020 -#define GOT_SEARCHBASE 0x0040 -#define GOT_SCOPE 0x0080 -#define GOT_ATTRS 0x0100 -#define GOT_TYPE 0x0200 -#define GOT_INTERVAL 0x0400 -#define GOT_LASTMOD 0x0800 -#define GOT_UPDATEDN 0x1000 - -#define GOT_ALL 0x1FFF +#define GOT_PROVIDER 0x0002 +#define GOT_METHOD 0x0004 +#define GOT_ALL 0x0007 static int parse_syncrepl_line( @@ -2843,193 +2939,290 @@ parse_syncrepl_line( for ( i = 1; i < cargc; i++ ) { if ( !strncasecmp( cargv[ i ], IDSTR, sizeof( IDSTR ) - 1 )) { + int tmp; /* '\0' string terminator accounts for '=' */ val = cargv[ i ] + sizeof( IDSTR ); - si->id = atoi( val ); + tmp= atoi( val ); + if ( tmp >= 1000 || tmp < 0 ) { + fprintf( stderr, "Error: parse_syncrepl_line: " + "syncrepl id %d is out of range [0..999]\n", tmp ); + return -1; + } + si->si_rid = tmp; gots |= GOT_ID; } else if ( !strncasecmp( cargv[ i ], PROVIDERSTR, sizeof( PROVIDERSTR ) - 1 )) { val = cargv[ i ] + sizeof( PROVIDERSTR ); - si->masteruri = ch_strdup( val ); - gots |= GOT_HOST; + si->si_provideruri = ch_strdup( val ); + si->si_provideruri_bv = (BerVarray) + ch_calloc( 2, sizeof( struct berval )); + ber_str2bv( si->si_provideruri, strlen( si->si_provideruri ), + 0, &si->si_provideruri_bv[0] ); + si->si_provideruri_bv[1].bv_len = 0; + si->si_provideruri_bv[1].bv_val = NULL; + gots |= GOT_PROVIDER; } else if ( !strncasecmp( cargv[ i ], STARTTLSSTR, sizeof(STARTTLSSTR) - 1 ) ) { val = cargv[ i ] + sizeof( STARTTLSSTR ); if( !strcasecmp( val, CRITICALSTR ) ) { - si->tls = TLS_CRITICAL; + si->si_tls = SYNCINFO_TLS_CRITICAL; } else { - si->tls = TLS_ON; + si->si_tls = SYNCINFO_TLS_ON; } } else if ( !strncasecmp( cargv[ i ], - UPDATEDNSTR, sizeof( UPDATEDNSTR ) - 1 ) ) { - char *str; + UPDATEDNSTR, sizeof( UPDATEDNSTR ) - 1 ) ) + { struct berval updatedn = {0, NULL}; val = cargv[ i ] + sizeof( UPDATEDNSTR ); - str = ch_strdup( val ); - ber_str2bv( str, strlen(str), 1, &updatedn ); - dnNormalize( 0, NULL, NULL, &updatedn, &si->updatedn, NULL ); - ch_free( str ); - ch_free( updatedn.bv_val ); - gots |= GOT_UPDATEDN; - } else if ( !strncasecmp( cargv[ i ], - BINDDNSTR, sizeof( BINDDNSTR ) - 1 ) ) { - val = cargv[ i ] + sizeof( BINDDNSTR ); - si->binddn = ch_strdup( val ); - gots |= GOT_DN; + ber_str2bv( val, 0, 0, &updatedn ); + ch_free( si->si_updatedn.bv_val ); + dnNormalize( 0, NULL, NULL, &updatedn, &si->si_updatedn, NULL ); } else if ( !strncasecmp( cargv[ i ], BINDMETHSTR, - sizeof( BINDMETHSTR ) - 1 ) ) { + sizeof( BINDMETHSTR ) - 1 ) ) + { val = cargv[ i ] + sizeof( BINDMETHSTR ); if ( !strcasecmp( val, SIMPLESTR )) { - si->bindmethod = LDAP_AUTH_SIMPLE; + si->si_bindmethod = LDAP_AUTH_SIMPLE; gots |= GOT_METHOD; } else if ( !strcasecmp( val, SASLSTR )) { - si->bindmethod = LDAP_AUTH_SASL; +#ifdef HAVE_CYRUS_SASL + si->si_bindmethod = LDAP_AUTH_SASL; gots |= GOT_METHOD; +#else /* HAVE_CYRUS_SASL */ + fprintf( stderr, "Error: parse_syncrepl_line: " + "not compiled with SASL support\n" ); + return 1; +#endif /* HAVE_CYRUS_SASL */ } else { - si->bindmethod = -1; - } - } else if ( !strncasecmp( cargv[ i ], LASTMODSTR, - sizeof( LASTMODSTR ) - 1 ) ) { - val = cargv[ i ] + sizeof( LASTMODSTR ); - if ( !strcasecmp( val, LMREQSTR )) { - si->lastmod = LASTMOD_REQ; - gots |= GOT_LASTMOD; - } else if ( !strcasecmp( val, LMGENSTR )) { - si->lastmod = LASTMOD_GEN; - gots |= GOT_LASTMOD; - } else if ( !strcasecmp( val, LMNOSTR )) { - si->lastmod = LASTMOD_NO; - gots |= GOT_LASTMOD; - } else { - si->lastmod = -1; + si->si_bindmethod = -1; } } else if ( !strncasecmp( cargv[ i ], - SASLMECHSTR, sizeof( SASLMECHSTR ) - 1 ) ) { - val = cargv[ i ] + sizeof( SASLMECHSTR ); - gots |= GOT_MECH; - si->saslmech = ch_strdup( val ); + BINDDNSTR, sizeof( BINDDNSTR ) - 1 ) ) { + val = cargv[ i ] + sizeof( BINDDNSTR ); + si->si_binddn = ch_strdup( val ); } else if ( !strncasecmp( cargv[ i ], CREDSTR, sizeof( CREDSTR ) - 1 ) ) { val = cargv[ i ] + sizeof( CREDSTR ); - si->passwd = ch_strdup( val ); + si->si_passwd = ch_strdup( val ); + } else if ( !strncasecmp( cargv[ i ], + SASLMECHSTR, sizeof( SASLMECHSTR ) - 1 ) ) { + val = cargv[ i ] + sizeof( SASLMECHSTR ); + si->si_saslmech = ch_strdup( val ); } else if ( !strncasecmp( cargv[ i ], SECPROPSSTR, sizeof( SECPROPSSTR ) - 1 ) ) { val = cargv[ i ] + sizeof( SECPROPSSTR ); - si->secprops = ch_strdup( val ); + si->si_secprops = ch_strdup( val ); } else if ( !strncasecmp( cargv[ i ], REALMSTR, sizeof( REALMSTR ) - 1 ) ) { val = cargv[ i ] + sizeof( REALMSTR ); - si->realm = ch_strdup( val ); + si->si_realm = ch_strdup( val ); } else if ( !strncasecmp( cargv[ i ], AUTHCSTR, sizeof( AUTHCSTR ) - 1 ) ) { val = cargv[ i ] + sizeof( AUTHCSTR ); - si->authcId = ch_strdup( val ); + si->si_authcId = ch_strdup( val ); } else if ( !strncasecmp( cargv[ i ], OLDAUTHCSTR, sizeof( OLDAUTHCSTR ) - 1 ) ) { /* Old authcID is provided for some backwards compatibility */ val = cargv[ i ] + sizeof( OLDAUTHCSTR ); - si->authcId = ch_strdup( val ); + si->si_authcId = ch_strdup( val ); } else if ( !strncasecmp( cargv[ i ], AUTHZSTR, sizeof( AUTHZSTR ) - 1 ) ) { val = cargv[ i ] + sizeof( AUTHZSTR ); - si->authzId = ch_strdup( val ); + si->si_authzId = ch_strdup( val ); } else if ( !strncasecmp( cargv[ i ], - SRVTABSTR, sizeof( SRVTABSTR ) - 1 ) ) { - val = cargv[ i ] + sizeof( SRVTABSTR ); - if ( si->srvtab != NULL ) { - free( si->srvtab ); + SCHEMASTR, sizeof( SCHEMASTR ) - 1 ) ) + { + val = cargv[ i ] + sizeof( SCHEMASTR ); + if ( !strncasecmp( val, "on", sizeof( "on" ) - 1 )) { + si->si_schemachecking = 1; + } else if ( !strncasecmp( val, "off", sizeof( "off" ) - 1 ) ) { + si->si_schemachecking = 0; + } else { + si->si_schemachecking = 1; } - si->srvtab = ch_strdup( val ); } else if ( !strncasecmp( cargv[ i ], - FILTERSTR, sizeof( FILTERSTR ) - 1 ) ) { + FILTERSTR, sizeof( FILTERSTR ) - 1 ) ) + { val = cargv[ i ] + sizeof( FILTERSTR ); - gots |= GOT_FILTER; - si->filterstr = ch_strdup( val ); + ber_str2bv( val, 0, 1, &si->si_filterstr ); } else if ( !strncasecmp( cargv[ i ], - SEARCHBASESTR, sizeof( SEARCHBASESTR ) - 1 ) ) { + SEARCHBASESTR, sizeof( SEARCHBASESTR ) - 1 ) ) + { + struct berval bv; val = cargv[ i ] + sizeof( SEARCHBASESTR ); - gots |= GOT_SEARCHBASE; - si->base = ch_strdup( val ); + if ( si->si_base.bv_val ) { + ch_free( si->si_base.bv_val ); + } + ber_str2bv( val, 0, 0, &bv ); + if ( dnNormalize( 0, NULL, NULL, &bv, &si->si_base, NULL )) { + fprintf( stderr, "Invalid base DN \"%s\"\n", val ); + return 1; + } } else if ( !strncasecmp( cargv[ i ], - SCOPESTR, sizeof( SCOPESTR ) - 1 ) ) { + SCOPESTR, sizeof( SCOPESTR ) - 1 ) ) + { val = cargv[ i ] + sizeof( SCOPESTR ); - gots |= GOT_SCOPE; if ( !strncasecmp( val, "base", sizeof( "base" ) - 1 )) { - si->scope = LDAP_SCOPE_BASE; + si->si_scope = LDAP_SCOPE_BASE; } else if ( !strncasecmp( val, "one", sizeof( "one" ) - 1 )) { - si->scope = LDAP_SCOPE_ONELEVEL; + si->si_scope = LDAP_SCOPE_ONELEVEL; } else if ( !strncasecmp( val, "sub", sizeof( "sub" ) - 1 )) { - si->scope = LDAP_SCOPE_SUBTREE; + si->si_scope = LDAP_SCOPE_SUBTREE; } else { fprintf( stderr, "Error: parse_syncrepl_line: " - "unknown scope \"%s\"\n", val); + "unknown scope \"%s\"\n", val); return 1; } } else if ( !strncasecmp( cargv[ i ], - ATTRSONLYSTR, sizeof( ATTRSONLYSTR ) - 1 ) ) { - si->attrsonly = 1; + ATTRSONLYSTR, sizeof( ATTRSONLYSTR ) - 1 ) ) + { + si->si_attrsonly = 1; } else if ( !strncasecmp( cargv[ i ], - ATTRSSTR, sizeof( ATTRSSTR ) - 1 ) ) { + ATTRSSTR, sizeof( ATTRSSTR ) - 1 ) ) + { val = cargv[ i ] + sizeof( ATTRSSTR ); - si->attrs = NULL; - si->attrs = str2clist( si->attrs, val, "," ); - gots |= GOT_ATTRS; + str2clist( &si->si_attrs, val, "," ); } else if ( !strncasecmp( cargv[ i ], - TYPESTR, sizeof( TYPESTR ) - 1 ) ) { + TYPESTR, sizeof( TYPESTR ) - 1 ) ) + { val = cargv[ i ] + sizeof( TYPESTR ); - gots |= GOT_TYPE; - if ( !strncasecmp( val, "refreshOnly", sizeof( "refreshOnly" ) - 1 )) { - si->type = LDAP_SYNC_REFRESH_ONLY; - } else if ( !strncasecmp( val, "refreshAndPersist", sizeof( "refreshAndPersist" ) - 1 )) { - gots |= GOT_INTERVAL; - si->type = LDAP_SYNC_REFRESH_AND_PERSIST; - si->interval = 0; + if ( !strncasecmp( val, "refreshOnly", sizeof("refreshOnly")-1 )) { + si->si_type = LDAP_SYNC_REFRESH_ONLY; + } else if ( !strncasecmp( val, "refreshAndPersist", + sizeof("refreshAndPersist")-1 )) + { + si->si_type = LDAP_SYNC_REFRESH_AND_PERSIST; + si->si_interval = 60; } else { fprintf( stderr, "Error: parse_syncrepl_line: " - "unknown sync type \"%s\"\n", val); + "unknown sync type \"%s\"\n", val); return 1; } } else if ( !strncasecmp( cargv[ i ], - INTERVALSTR, sizeof( INTERVALSTR ) - 1 ) ) { + INTERVALSTR, sizeof( INTERVALSTR ) - 1 ) ) + { val = cargv[ i ] + sizeof( INTERVALSTR ); - gots |= GOT_INTERVAL; - if ( gots & GOT_TYPE && si->type == LDAP_SYNC_REFRESH_AND_PERSIST ) - si->interval = 0; - else - si->interval = atoi( val ); - if ( si->interval < 0 ) { + if ( si->si_type == LDAP_SYNC_REFRESH_AND_PERSIST ) { + si->si_interval = 0; + } else { + char *hstr; + char *mstr; + char *dstr; + char *sstr; + int dd, hh, mm, ss; + dstr = val; + hstr = strchr( dstr, ':' ); + if ( hstr == NULL ) { + fprintf( stderr, "Error: parse_syncrepl_line: " + "invalid interval \"%s\"\n", val ); + return 1; + } + *hstr++ = '\0'; + mstr = strchr( hstr, ':' ); + if ( mstr == NULL ) { + fprintf( stderr, "Error: parse_syncrepl_line: " + "invalid interval \"%s\"\n", val ); + return 1; + } + *mstr++ = '\0'; + sstr = strchr( mstr, ':' ); + if ( sstr == NULL ) { + fprintf( stderr, "Error: parse_syncrepl_line: " + "invalid interval \"%s\"\n", val ); + return 1; + } + *sstr++ = '\0'; + + dd = atoi( dstr ); + hh = atoi( hstr ); + mm = atoi( mstr ); + ss = atoi( sstr ); + if (( hh > 24 ) || ( hh < 0 ) || + ( mm > 60 ) || ( mm < 0 ) || + ( ss > 60 ) || ( ss < 0 ) || ( dd < 0 )) { + fprintf( stderr, "Error: parse_syncrepl_line: " + "invalid interval \"%s\"\n", val ); + return 1; + } + si->si_interval = (( dd * 24 + hh ) * 60 + mm ) * 60 + ss; + } + if ( si->si_interval < 0 ) { fprintf( stderr, "Error: parse_syncrepl_line: " - "invalid interval \"%ld\"\n", - (long) si->interval); + "invalid interval \"%ld\"\n", + (long) si->si_interval); return 1; } } else if ( !strncasecmp( cargv[ i ], - COOKIESTR, sizeof( COOKIESTR ) - 1 ) ) { - val = cargv[ i ] + sizeof( COOKIESTR ); - si->syncCookie = ber_str2bv( val, strlen( val ), 1, NULL ); + MANAGEDSAITSTR, sizeof( MANAGEDSAITSTR ) - 1 ) ) + { + val = cargv[ i ] + sizeof( MANAGEDSAITSTR ); + si->si_manageDSAit = atoi( val ); + } else if ( !strncasecmp( cargv[ i ], + SLIMITSTR, sizeof( SLIMITSTR ) - 1 ) ) + { + val = cargv[ i ] + sizeof( SLIMITSTR ); + si->si_slimit = atoi( val ); + } else if ( !strncasecmp( cargv[ i ], + TLIMITSTR, sizeof( TLIMITSTR ) - 1 ) ) + { + val = cargv[ i ] + sizeof( TLIMITSTR ); + si->si_tlimit = atoi( val ); } else { fprintf( stderr, "Error: parse_syncrepl_line: " - "unknown keyword \"%s\"\n", cargv[ i ] ); + "unknown keyword \"%s\"\n", cargv[ i ] ); } } - if ( si->bindmethod == LDAP_AUTH_SASL) { - if ((gots & GOT_MECH) == 0) { - fprintf( stderr, "Error: \"syncrepl\" line needs SASLmech flag " - "in slapd config file\n" ); - return -1; - } - } - - gots |= GOT_MECH; - if ( gots != GOT_ALL ) { - fprintf( stderr, "Error: Malformed \"syncrepl\" line in slapd config file" - ); + fprintf( stderr, + "Error: Malformed \"syncrepl\" line in slapd config file" ); return -1; } return 0; } -#endif /* LDAP_SYNCREPL */ + +char ** +str2clist( char ***out, char *in, const char *brkstr ) +{ + char *str; + char *s; + char *lasts; + int i, j; + const char *text; + char **new; + + /* find last element in list */ + for (i = 0; *out && *out[i]; i++); + + /* protect the input string from strtok */ + str = ch_strdup( in ); + + if ( *str == '\0' ) { + free( str ); + return( *out ); + } + + /* Count words in string */ + j=1; + for ( s = str; *s; s++ ) { + if ( strchr( brkstr, *s ) != NULL ) { + j++; + } + } + + *out = ch_realloc( *out, ( i + j + 1 ) * sizeof( char * ) ); + new = *out + i; + for ( s = ldap_pvt_strtok( str, brkstr, &lasts ); + s != NULL; + s = ldap_pvt_strtok( NULL, brkstr, &lasts ) ) + { + *new = ch_strdup( s ); + new++; + } + + *new = NULL; + free( str ); + return( *out ); +}