OpenLDAP 2.1 Change Log
OpenLDAP 2.1.13 Engineering
- Fixed back-bdb group ACL deadlock bug
- Fixed slapd RDN handling
+ Fixed back-bdb group ACL deadlock bug (ITS#2195)
+ Fixed slapd RDN handling (ITS#2243)
+ Fixed slap tools argument handling (ITS#2266)
+ Fixed liblber PROTOS bugs (ITS#2275) (ITS#2280)
+ Fixed ber_flush debug level
+ Fixed libldap SASL null cred bug (ITS#2267)
+ Fixed slapd SASL anon bugs (ITS#2268)
+ Fixed back-glue exceeded results bug (ITS#2299)
+ Fixed back-glue search reference bug
Changed slapd DNS reverse lookups default to off
- Added slapd ACL caching
- Added slapd attribute options enhancement
- Added slapd ldapi// SASL EXTERNAL support
Updated slapd bind stats logging
Updated slapd proxy authorization support
- Added back-glue reference support
- Fixed back-glue exceeded results bug
- Updated back-ldap and back-meta
Updated libldap TLS certificate checking (ITS#2161)
Updated client tool argument handling
Updated liblutil detach handling
+ Updated back-ldap, back-meta, back-sql
+ Added slapd ACL caching
+ Added slapd attribute options enhancement
+ Added slapd ldapi// SASL EXTERNAL support
Added libldap ldap_whoami routines
Added liblber ber_flatten2 routine
Added liblutil passwd sanity checks (ITS#2159)
- Fixed liblber PROTOS bugs (ITS#2275) (ITS#2280)
- Fixed ber_flush debug level
- Fixed libldap NULL cred bug (ITS#2267)
Build Environment
Check back-bdb requirement for BDB 4.1
Remove configure flags for deprecated features
LDAPSEARCH="$CLIENTDIR/ldapsearch $TOOLPROTO $TOOLARGS -LLL"
LDAPRSEARCH="$CLIENTDIR/ldapsearch $TOOLPROTO $TOOLARGS"
LDAPMODIFY="$CLIENTDIR/ldapmodify $TOOLPROTO $TOOLARGS"
-LDAPADD="$CLIENTDIR/ldapmodify -a $TOOLPROTO $TOOLARGS"
+LDAPADD="$CLIENTDIR/ldapadd $TOOLPROTO $TOOLARGS"
LDAPMODRDN="$CLIENTDIR/ldapmodrdn $TOOLPROTO $TOOLARGS"
LDAPWHOAMI="$CLIENTDIR/ldapwhoami $TOOLARGS"
SLAPDTESTER=$PROGDIR/slapd-tester
exit $RC
fi
+echo "Testing ldapwhoami as ${MANAGERDN} for anonymous..."
+$LDAPWHOAMI -h $LOCALHOST -p $PORT -D "$MANAGERDN" -w $PASSWD \
+ -e \!authzid=""
+
+RC=$?
+if test $RC != 0 ; then
+ echo "ldapwhoami failed ($RC)!"
+ kill -HUP $PID
+ exit $RC
+fi
+
+echo "Testing ldapwhoami as ${MANAGERDN} for dn:$BABSDN..."
+$LDAPWHOAMI -h $LOCALHOST -p $PORT -D "$MANAGERDN" -w $PASSWD \
+ -e \!authzid="dn:$BABSDN"
+
+RC=$?
+if test $RC != 0 ; then
+ echo "ldapwhoami failed ($RC)!"
+ kill -HUP $PID
+ exit $RC
+fi
+
+echo "Testing ldapwhoami as ${MANAGERDN} for u:ursula..."
+$LDAPWHOAMI -h $LOCALHOST -p $PORT -D "$MANAGERDN" -w $PASSWD \
+ -e \!authzid="u:ursula"
+
+RC=$?
+if test $RC != 0 ; then
+ echo "ldapwhoami failed ($RC)!"
+ kill -HUP $PID
+ exit $RC
+fi
+
kill -HUP $PID
echo ">>>>> Test succeeded"