#! /bin/sh
# $OpenLDAP$
-# from OpenLDAP: pkg/ldap/configure.in,v 1.428 2002/08/28 05:12:22 hyc Exp
+# from OpenLDAP: pkg/ldap/configure.in,v 1.430 2002/09/04 08:58:25 hyc Exp
# Copyright 1998-2002 The OpenLDAP Foundation. All Rights Reserved.
#
PLAT=UNIX
fi
+if test -z "$SLAPD_STATIC_BACKENDS"; then
+ SLAPD_NO_STATIC='#'
+else
+ SLAPD_NO_STATIC=
+fi
+
+
# Check whether --with-xxinstall or --without-xxinstall was given.
s%@MOD_TCL_LIB@%$MOD_TCL_LIB%g
s%@SLAPD_MODULES_CPPFLAGS@%$SLAPD_MODULES_CPPFLAGS%g
s%@SLAPD_MODULES_LDFLAGS@%$SLAPD_MODULES_LDFLAGS%g
+s%@SLAPD_NO_STATIC@%$SLAPD_NO_STATIC%g
s%@SLAPD_STATIC_BACKENDS@%$SLAPD_STATIC_BACKENDS%g
s%@SLAPD_DYNAMIC_BACKENDS@%$SLAPD_DYNAMIC_BACKENDS%g
s%@PERL_CPPFLAGS@%$PERL_CPPFLAGS%g
entry_ndn->bv_val, 0, 0 );
#endif
-
} else {
dn2entry_retry:
/* can we find entry */
goto return_results;
}
- if (conn != NULL && op != NULL
- && access_allowed( be, conn, op, e, slap_schema.si_ad_entry,
- NULL, ACL_READ, &acl_state ) == 0 )
- {
- rc = LDAP_INSUFFICIENT_ACCESS;
- goto return_results;
- }
-
if ((attr = attr_find(e->e_attrs, entry_at)) == NULL) {
#ifdef NEW_LOGGING
LDAP_LOG( BACK_BDB, INFO,
}
if (conn != NULL && op != NULL
- && access_allowed( be, conn, op, e, entry_at, NULL, ACL_READ,
- &acl_state ) == 0 )
+ && access_allowed( be, conn, op, e, entry_at, NULL,
+ ACL_AUTH, &acl_state ) == 0 )
{
rc = LDAP_INSUFFICIENT_ACCESS;
goto return_results;
if( conn != NULL
&& op != NULL
&& access_allowed(be, conn, op, e, entry_at,
- &attr->a_vals[i], ACL_READ, &acl_state ) == 0)
+ &attr->a_vals[i], ACL_AUTH, &acl_state ) == 0)
{
continue;
}
goto return_results;
}
- if (conn != NULL && op != NULL
- && access_allowed( be, conn, op, e, slap_schema.si_ad_entry,
- NULL, ACL_READ, NULL ) == 0)
- {
- rc = LDAP_INSUFFICIENT_ACCESS;
- goto return_results;
- }
-
if ((attr = attr_find(e->e_attrs, entry_at)) == NULL) {
#ifdef NEW_LOGGING
LDAP_LOG( BACK_LDBM, INFO,
if (conn != NULL && op != NULL
&& access_allowed( be, conn, op, e, entry_at, NULL,
- ACL_READ, &acl_state ) == 0)
+ ACL_AUTH, &acl_state ) == 0)
{
rc = LDAP_INSUFFICIENT_ACCESS;
goto return_results;
if( conn != NULL
&& op != NULL
&& access_allowed( be, conn, op, e, entry_at,
- iv, ACL_READ, &acl_state ) == 0)
+ iv, ACL_AUTH, &acl_state ) == 0)
{
continue;
}
#ifdef NEW_LOGGING
LDAP_LOG( TRANSPORT, ENTRY,
- "slap_sasl_check_authz: does %s match %s rule in %s?\n",
- assertDN->bv_val, ad->ad_cname.bv_val, searchDN->bv_val);
+ "slap_sasl_check_authz: does %s match %s rule in %s?\n",
+ assertDN->bv_val, ad->ad_cname.bv_val, searchDN->bv_val);
#else
Debug( LDAP_DEBUG_TRACE,
"==>slap_sasl_check_authz: does %s match %s rule in %s?\n",
assertDN->bv_val, ad->ad_cname.bv_val, searchDN->bv_val);
#endif
- rc = backend_attribute( NULL, NULL, conn->c_sasl_bindop, NULL, searchDN, ad, &vals );
+ rc = backend_attribute( NULL, NULL, conn->c_sasl_bindop, NULL,
+ searchDN, ad, &vals );
if( rc != LDAP_SUCCESS )
goto COMPLETE;
#ifdef NEW_LOGGING
LDAP_LOG( TRANSPORT, RESULTS,
- "slap_sasl_check_authz: %s check returning %s\n",
- ad->ad_cname.bv_val, rc, 0 );
+ "slap_sasl_check_authz: %s check returning %s\n",
+ ad->ad_cname.bv_val, rc, 0 );
#else
Debug( LDAP_DEBUG_TRACE,
- "<==slap_sasl_check_authz: %s check returning %d\n", ad->ad_cname.bv_val, rc, 0);
+ "<==slap_sasl_check_authz: %s check returning %d\n",
+ ad->ad_cname.bv_val, rc, 0);
#endif
return( rc );