1998-08-09 08:43:13 +08:00
|
|
|
/* search.c - ldbm backend search function */
|
1999-09-09 03:06:24 +08:00
|
|
|
/* $OpenLDAP$ */
|
1999-08-07 07:07:46 +08:00
|
|
|
/*
|
2002-01-05 05:17:25 +08:00
|
|
|
* Copyright 1998-2002 The OpenLDAP Foundation, All Rights Reserved.
|
1999-08-07 07:07:46 +08:00
|
|
|
* COPYING RESTRICTIONS APPLY, see COPYRIGHT file
|
|
|
|
*/
|
1998-08-09 08:43:13 +08:00
|
|
|
|
1998-10-25 09:41:42 +08:00
|
|
|
#include "portable.h"
|
|
|
|
|
1998-08-09 08:43:13 +08:00
|
|
|
#include <stdio.h>
|
1998-10-25 09:41:42 +08:00
|
|
|
|
|
|
|
#include <ac/string.h>
|
|
|
|
#include <ac/socket.h>
|
|
|
|
|
1998-08-09 08:43:13 +08:00
|
|
|
#include "slap.h"
|
|
|
|
#include "back-ldbm.h"
|
1998-09-21 04:22:46 +08:00
|
|
|
#include "proto-back-ldbm.h"
|
1998-08-09 08:43:13 +08:00
|
|
|
|
1999-07-16 10:45:46 +08:00
|
|
|
static ID_BLOCK *base_candidate(
|
|
|
|
Backend *be, Entry *e );
|
|
|
|
|
|
|
|
static ID_BLOCK *search_candidates(
|
|
|
|
Backend *be, Entry *e, Filter *filter,
|
|
|
|
int scope, int deref, int manageDSAit );
|
|
|
|
|
1998-08-09 08:43:13 +08:00
|
|
|
|
|
|
|
int
|
|
|
|
ldbm_back_search(
|
|
|
|
Backend *be,
|
|
|
|
Connection *conn,
|
|
|
|
Operation *op,
|
2001-12-27 03:50:40 +08:00
|
|
|
struct berval *base,
|
|
|
|
struct berval *nbase,
|
1998-08-09 08:43:13 +08:00
|
|
|
int scope,
|
|
|
|
int deref,
|
|
|
|
int slimit,
|
|
|
|
int tlimit,
|
|
|
|
Filter *filter,
|
2002-01-02 19:00:36 +08:00
|
|
|
struct berval *filterstr,
|
2001-12-31 19:35:52 +08:00
|
|
|
AttributeName *attrs,
|
2000-06-17 13:01:50 +08:00
|
|
|
int attrsonly )
|
1998-08-09 08:43:13 +08:00
|
|
|
{
|
|
|
|
struct ldbminfo *li = (struct ldbminfo *) be->be_private;
|
1999-07-16 10:45:46 +08:00
|
|
|
int rc, err;
|
2000-05-29 06:38:21 +08:00
|
|
|
const char *text = NULL;
|
1998-08-09 08:43:13 +08:00
|
|
|
time_t stoptime;
|
1999-01-31 15:55:53 +08:00
|
|
|
ID_BLOCK *candidates;
|
1999-08-08 05:14:24 +08:00
|
|
|
ID id, cursor;
|
1998-08-09 08:43:13 +08:00
|
|
|
Entry *e;
|
2002-01-14 09:43:17 +08:00
|
|
|
BerVarray v2refs = NULL;
|
1999-07-16 10:45:46 +08:00
|
|
|
Entry *matched = NULL;
|
2001-12-30 18:47:28 +08:00
|
|
|
struct berval realbase = { 0, NULL };
|
1998-08-09 08:43:13 +08:00
|
|
|
int nentries = 0;
|
1999-07-16 10:45:46 +08:00
|
|
|
int manageDSAit = get_manageDSAit( op );
|
2001-10-26 10:05:14 +08:00
|
|
|
int cscope = LDAP_SCOPE_DEFAULT;
|
1999-07-16 10:45:46 +08:00
|
|
|
|
2001-08-01 18:09:04 +08:00
|
|
|
struct slap_limits_set *limit = NULL;
|
2001-07-28 19:25:00 +08:00
|
|
|
int isroot = 0;
|
|
|
|
|
2001-01-18 01:01:19 +08:00
|
|
|
#ifdef NEW_LOGGING
|
|
|
|
LDAP_LOG(( "backend", LDAP_LEVEL_ENTRY,
|
2001-12-27 03:50:40 +08:00
|
|
|
"ldbm_back_search: enter\n" ));
|
2001-01-18 01:01:19 +08:00
|
|
|
#else
|
1999-07-16 10:45:46 +08:00
|
|
|
Debug(LDAP_DEBUG_TRACE, "=> ldbm_back_search\n", 0, 0, 0);
|
2001-01-18 01:01:19 +08:00
|
|
|
#endif
|
|
|
|
|
2002-01-30 01:58:36 +08:00
|
|
|
/* grab giant lock for reading */
|
|
|
|
ldap_pvt_thread_rdwr_rlock(&li->li_giant_rwlock);
|
1999-07-16 10:45:46 +08:00
|
|
|
|
2001-12-27 03:50:40 +08:00
|
|
|
if ( nbase->bv_len == 0 ) {
|
2000-10-19 03:29:40 +08:00
|
|
|
/* DIT root special case */
|
2001-11-17 01:05:32 +08:00
|
|
|
e = (Entry *) &slap_entry_root;
|
2000-10-19 03:29:40 +08:00
|
|
|
|
|
|
|
/* need normalized dn below */
|
2001-12-30 18:47:28 +08:00
|
|
|
ber_dupbv( &realbase, &e->e_nname );
|
2000-10-19 03:29:40 +08:00
|
|
|
|
|
|
|
candidates = search_candidates( be, e, filter,
|
|
|
|
scope, deref, manageDSAit );
|
|
|
|
|
|
|
|
goto searchit;
|
|
|
|
|
|
|
|
} else if ( deref & LDAP_DEREF_FINDING ) {
|
|
|
|
/* deref dn and get entry with reader lock */
|
2001-12-27 08:26:59 +08:00
|
|
|
e = deref_dn_r( be, nbase, &err, &matched, &text );
|
1998-08-09 08:43:13 +08:00
|
|
|
|
2001-04-13 07:02:20 +08:00
|
|
|
if( err == LDAP_NO_SUCH_OBJECT ) err = LDAP_REFERRAL;
|
|
|
|
|
1999-07-16 10:45:46 +08:00
|
|
|
} else {
|
2000-10-19 03:29:40 +08:00
|
|
|
/* get entry with reader lock */
|
2002-01-01 21:31:20 +08:00
|
|
|
e = dn2entry_r( be, nbase, &matched );
|
1999-07-16 10:45:46 +08:00
|
|
|
err = e != NULL ? LDAP_SUCCESS : LDAP_REFERRAL;
|
|
|
|
text = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ( e == NULL ) {
|
2002-01-06 01:49:59 +08:00
|
|
|
struct berval matched_dn = { 0, NULL };
|
2002-01-14 09:43:17 +08:00
|
|
|
BerVarray refs = NULL;
|
1999-07-16 10:45:46 +08:00
|
|
|
|
|
|
|
if ( matched != NULL ) {
|
2002-01-14 09:43:17 +08:00
|
|
|
BerVarray erefs;
|
2002-01-06 01:49:59 +08:00
|
|
|
ber_dupbv( &matched_dn, &matched->e_name );
|
1999-07-16 10:45:46 +08:00
|
|
|
|
2001-10-26 10:05:14 +08:00
|
|
|
erefs = is_entry_referral( matched )
|
2001-12-27 04:59:24 +08:00
|
|
|
? get_entry_referrals( be, conn, op, matched )
|
1999-07-16 10:45:46 +08:00
|
|
|
: NULL;
|
|
|
|
|
|
|
|
cache_return_entry_r( &li->li_cache, matched );
|
2001-04-13 07:02:20 +08:00
|
|
|
|
2001-10-26 10:05:14 +08:00
|
|
|
if( erefs ) {
|
2002-01-06 01:49:59 +08:00
|
|
|
refs = referral_rewrite( erefs, &matched_dn,
|
2001-12-27 04:59:24 +08:00
|
|
|
base, scope );
|
2001-10-26 10:05:14 +08:00
|
|
|
|
2002-01-14 09:43:17 +08:00
|
|
|
ber_bvarray_free( erefs );
|
2001-10-26 10:05:14 +08:00
|
|
|
}
|
|
|
|
|
1999-07-16 10:45:46 +08:00
|
|
|
} else {
|
2001-10-26 10:05:14 +08:00
|
|
|
refs = referral_rewrite( default_referral,
|
2001-12-27 04:59:24 +08:00
|
|
|
NULL, base, scope );
|
1999-07-16 10:45:46 +08:00
|
|
|
}
|
|
|
|
|
2002-01-30 01:58:36 +08:00
|
|
|
ldap_pvt_thread_rdwr_runlock(&li->li_giant_rwlock);
|
|
|
|
|
2002-01-06 01:49:59 +08:00
|
|
|
send_ldap_result( conn, op, err, matched_dn.bv_val,
|
2001-12-27 20:16:58 +08:00
|
|
|
text, refs, NULL );
|
1999-07-16 10:45:46 +08:00
|
|
|
|
2002-01-14 09:43:17 +08:00
|
|
|
ber_bvarray_free( refs );
|
2002-01-06 01:49:59 +08:00
|
|
|
ber_memfree( matched_dn.bv_val );
|
1999-07-16 10:45:46 +08:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!manageDSAit && is_entry_referral( e ) ) {
|
|
|
|
/* entry is a referral, don't allow add */
|
2002-01-06 01:49:59 +08:00
|
|
|
struct berval matched_dn;
|
2002-01-14 09:43:17 +08:00
|
|
|
BerVarray erefs;
|
|
|
|
BerVarray refs;
|
2002-01-06 01:49:59 +08:00
|
|
|
|
|
|
|
ber_dupbv( &matched_dn, &e->e_name );
|
2002-01-06 08:35:01 +08:00
|
|
|
erefs = get_entry_referrals( be, conn, op, e );
|
|
|
|
refs = NULL;
|
1999-07-16 10:45:46 +08:00
|
|
|
|
|
|
|
cache_return_entry_r( &li->li_cache, e );
|
2002-01-30 01:58:36 +08:00
|
|
|
ldap_pvt_thread_rdwr_runlock(&li->li_giant_rwlock);
|
1999-07-16 10:45:46 +08:00
|
|
|
|
2001-01-18 01:01:19 +08:00
|
|
|
#ifdef NEW_LOGGING
|
|
|
|
LDAP_LOG(( "backend", LDAP_LEVEL_INFO,
|
2001-10-26 10:05:14 +08:00
|
|
|
"ldbm_search: entry (%s) is a referral.\n",
|
|
|
|
e->e_dn ));
|
2001-01-18 01:01:19 +08:00
|
|
|
#else
|
2000-09-25 14:49:27 +08:00
|
|
|
Debug( LDAP_DEBUG_TRACE,
|
|
|
|
"ldbm_search: entry is referral\n",
|
|
|
|
0, 0, 0 );
|
2001-01-18 01:01:19 +08:00
|
|
|
#endif
|
|
|
|
|
2001-10-26 10:05:14 +08:00
|
|
|
if( erefs ) {
|
2002-01-06 01:49:59 +08:00
|
|
|
refs = referral_rewrite( erefs, &matched_dn,
|
2001-12-27 04:59:24 +08:00
|
|
|
base, scope );
|
1999-07-16 10:45:46 +08:00
|
|
|
|
2002-01-14 09:43:17 +08:00
|
|
|
ber_bvarray_free( erefs );
|
2001-10-26 10:05:14 +08:00
|
|
|
}
|
1999-07-16 10:45:46 +08:00
|
|
|
|
2001-10-26 10:05:14 +08:00
|
|
|
if( refs ) {
|
|
|
|
send_ldap_result( conn, op, LDAP_REFERRAL,
|
2002-01-06 01:49:59 +08:00
|
|
|
matched_dn.bv_val, NULL, refs, NULL );
|
2002-01-14 09:43:17 +08:00
|
|
|
ber_bvarray_free( refs );
|
2001-10-26 10:05:14 +08:00
|
|
|
|
|
|
|
} else {
|
2001-12-27 04:59:24 +08:00
|
|
|
send_ldap_result( conn, op, LDAP_OTHER,
|
2002-01-06 01:49:59 +08:00
|
|
|
matched_dn.bv_val,
|
2001-12-27 04:59:24 +08:00
|
|
|
"bad referral object", NULL, NULL );
|
2001-10-26 10:05:14 +08:00
|
|
|
}
|
1999-07-16 10:45:46 +08:00
|
|
|
|
2002-01-06 01:49:59 +08:00
|
|
|
ber_memfree( matched_dn.bv_val );
|
1999-07-16 10:45:46 +08:00
|
|
|
return 1;
|
|
|
|
}
|
1998-09-21 04:22:46 +08:00
|
|
|
|
2000-06-17 10:00:30 +08:00
|
|
|
if ( is_entry_alias( e ) ) {
|
|
|
|
/* don't deref */
|
|
|
|
deref = LDAP_DEREF_NEVER;
|
|
|
|
}
|
|
|
|
|
1999-10-27 12:40:56 +08:00
|
|
|
if ( scope == LDAP_SCOPE_BASE ) {
|
2001-10-26 10:05:14 +08:00
|
|
|
cscope = LDAP_SCOPE_BASE;
|
1999-07-16 10:45:46 +08:00
|
|
|
candidates = base_candidate( be, e );
|
1998-08-09 08:43:13 +08:00
|
|
|
|
1999-07-16 10:45:46 +08:00
|
|
|
} else {
|
2001-10-26 10:05:14 +08:00
|
|
|
cscope = ( scope != LDAP_SCOPE_SUBTREE )
|
|
|
|
? LDAP_SCOPE_BASE : LDAP_SCOPE_SUBTREE;
|
1999-07-16 10:45:46 +08:00
|
|
|
candidates = search_candidates( be, e, filter,
|
|
|
|
scope, deref, manageDSAit );
|
1998-08-09 08:43:13 +08:00
|
|
|
}
|
|
|
|
|
1999-07-16 10:45:46 +08:00
|
|
|
/* need normalized dn below */
|
2001-12-30 18:47:28 +08:00
|
|
|
ber_dupbv( &realbase, &e->e_nname );
|
2000-05-28 03:21:28 +08:00
|
|
|
|
1999-07-16 10:45:46 +08:00
|
|
|
cache_return_entry_r( &li->li_cache, e );
|
|
|
|
|
2000-10-19 03:29:40 +08:00
|
|
|
searchit:
|
1998-08-09 08:43:13 +08:00
|
|
|
if ( candidates == NULL ) {
|
1999-07-16 10:45:46 +08:00
|
|
|
/* no candidates */
|
2001-01-18 01:01:19 +08:00
|
|
|
#ifdef NEW_LOGGING
|
|
|
|
LDAP_LOG(( "backend", LDAP_LEVEL_INFO,
|
2001-10-26 10:05:14 +08:00
|
|
|
"ldbm_search: no candidates\n" ));
|
2001-01-18 01:01:19 +08:00
|
|
|
#else
|
2000-09-25 14:49:27 +08:00
|
|
|
Debug( LDAP_DEBUG_TRACE, "ldbm_search: no candidates\n",
|
|
|
|
0, 0, 0 );
|
2001-01-18 01:01:19 +08:00
|
|
|
#endif
|
|
|
|
|
1999-07-16 10:45:46 +08:00
|
|
|
send_search_result( conn, op,
|
|
|
|
LDAP_SUCCESS,
|
|
|
|
NULL, NULL, NULL, NULL, 0 );
|
1998-08-09 08:43:13 +08:00
|
|
|
|
1999-07-16 10:45:46 +08:00
|
|
|
rc = 1;
|
|
|
|
goto done;
|
1998-12-22 01:45:47 +08:00
|
|
|
}
|
|
|
|
|
2001-08-01 18:09:04 +08:00
|
|
|
/* if not root, get appropriate limits */
|
2001-12-26 03:48:26 +08:00
|
|
|
if ( be_isroot( be, &op->o_ndn ) ) {
|
2001-07-28 19:25:00 +08:00
|
|
|
isroot = 1;
|
|
|
|
} else {
|
2001-12-26 23:28:01 +08:00
|
|
|
( void ) get_limits( be, &op->o_ndn, &limit );
|
2001-08-01 18:09:04 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* if candidates exceed to-be-checked entries, abort */
|
|
|
|
if ( !isroot && limit->lms_s_unchecked != -1 ) {
|
2001-12-09 10:34:45 +08:00
|
|
|
if ( ID_BLOCK_NIDS( candidates ) > (unsigned) limit->lms_s_unchecked ) {
|
2001-08-01 18:09:04 +08:00
|
|
|
send_search_result( conn, op, LDAP_UNWILLING_TO_PERFORM,
|
|
|
|
NULL, NULL, NULL, NULL, 0 );
|
|
|
|
rc = 0;
|
|
|
|
goto done;
|
2001-07-28 19:25:00 +08:00
|
|
|
}
|
|
|
|
}
|
2001-08-01 18:09:04 +08:00
|
|
|
|
2001-11-13 01:12:43 +08:00
|
|
|
/* if root an no specific limit is required, allow unlimited search */
|
|
|
|
if ( isroot ) {
|
|
|
|
if ( tlimit == 0 ) {
|
|
|
|
tlimit = -1;
|
2001-08-01 18:09:04 +08:00
|
|
|
}
|
2001-07-28 19:25:00 +08:00
|
|
|
|
2001-11-13 01:12:43 +08:00
|
|
|
if ( slimit == 0 ) {
|
|
|
|
slimit = -1;
|
|
|
|
}
|
2000-10-19 03:29:40 +08:00
|
|
|
|
2001-11-13 01:12:43 +08:00
|
|
|
} else {
|
|
|
|
/* if no limit is required, use soft limit */
|
|
|
|
if ( tlimit <= 0 ) {
|
|
|
|
tlimit = limit->lms_t_soft;
|
|
|
|
|
|
|
|
/* if requested limit higher than hard limit, abort */
|
|
|
|
} else if ( tlimit > limit->lms_t_hard ) {
|
|
|
|
/* no hard limit means use soft instead */
|
|
|
|
if ( limit->lms_t_hard == 0 ) {
|
|
|
|
tlimit = limit->lms_t_soft;
|
|
|
|
|
|
|
|
/* positive hard limit means abort */
|
|
|
|
} else if ( limit->lms_t_hard > 0 ) {
|
|
|
|
send_search_result( conn, op,
|
|
|
|
LDAP_UNWILLING_TO_PERFORM,
|
|
|
|
NULL, NULL, NULL, NULL, 0 );
|
|
|
|
rc = 0;
|
|
|
|
goto done;
|
|
|
|
}
|
2001-08-01 18:09:04 +08:00
|
|
|
|
2001-11-13 01:12:43 +08:00
|
|
|
/* negative hard limit means no limit */
|
2001-08-01 18:09:04 +08:00
|
|
|
}
|
2001-11-13 01:12:43 +08:00
|
|
|
|
|
|
|
/* if no limit is required, use soft limit */
|
|
|
|
if ( slimit <= 0 ) {
|
2001-08-01 18:09:04 +08:00
|
|
|
slimit = limit->lms_s_soft;
|
|
|
|
|
2001-11-13 01:12:43 +08:00
|
|
|
/* if requested limit higher than hard limit, abort */
|
|
|
|
} else if ( slimit > limit->lms_s_hard ) {
|
|
|
|
/* no hard limit means use soft instead */
|
|
|
|
if ( limit->lms_s_hard == 0 ) {
|
|
|
|
slimit = limit->lms_s_soft;
|
|
|
|
|
|
|
|
/* positive hard limit means abort */
|
|
|
|
} else if ( limit->lms_s_hard > 0 ) {
|
|
|
|
send_search_result( conn, op,
|
|
|
|
LDAP_UNWILLING_TO_PERFORM,
|
|
|
|
NULL, NULL, NULL, NULL, 0 );
|
|
|
|
rc = 0;
|
|
|
|
goto done;
|
|
|
|
}
|
2001-08-01 18:09:04 +08:00
|
|
|
|
2001-11-13 01:12:43 +08:00
|
|
|
/* negative hard limit means no limit */
|
|
|
|
}
|
2000-10-19 03:29:40 +08:00
|
|
|
}
|
|
|
|
|
2001-11-13 01:12:43 +08:00
|
|
|
/* compute it anyway; root does not use it */
|
|
|
|
stoptime = op->o_time + tlimit;
|
|
|
|
|
1999-08-08 05:14:24 +08:00
|
|
|
for ( id = idl_firstid( candidates, &cursor ); id != NOID;
|
|
|
|
id = idl_nextid( candidates, &cursor ) )
|
1999-07-16 10:45:46 +08:00
|
|
|
{
|
2001-10-26 10:05:14 +08:00
|
|
|
int scopeok = 0;
|
1999-03-22 15:14:54 +08:00
|
|
|
|
1998-08-09 08:43:13 +08:00
|
|
|
/* check for abandon */
|
1999-01-28 12:34:55 +08:00
|
|
|
ldap_pvt_thread_mutex_lock( &op->o_abandonmutex );
|
1999-07-16 10:45:46 +08:00
|
|
|
|
1998-08-09 08:43:13 +08:00
|
|
|
if ( op->o_abandon ) {
|
1999-01-28 12:34:55 +08:00
|
|
|
ldap_pvt_thread_mutex_unlock( &op->o_abandonmutex );
|
1999-07-16 10:45:46 +08:00
|
|
|
rc = 0;
|
|
|
|
goto done;
|
1998-08-09 08:43:13 +08:00
|
|
|
}
|
1999-07-16 10:45:46 +08:00
|
|
|
|
1999-01-28 12:34:55 +08:00
|
|
|
ldap_pvt_thread_mutex_unlock( &op->o_abandonmutex );
|
1998-08-09 08:43:13 +08:00
|
|
|
|
|
|
|
/* check time limit */
|
2001-11-14 04:31:00 +08:00
|
|
|
if ( tlimit != -1 && slap_get_time() > stoptime ) {
|
1999-07-16 10:45:46 +08:00
|
|
|
send_search_result( conn, op, LDAP_TIMELIMIT_EXCEEDED,
|
|
|
|
NULL, NULL, v2refs, NULL, nentries );
|
|
|
|
rc = 0;
|
|
|
|
goto done;
|
1998-08-09 08:43:13 +08:00
|
|
|
}
|
|
|
|
|
1998-09-21 04:22:46 +08:00
|
|
|
/* get the entry with reader lock */
|
1999-07-16 10:45:46 +08:00
|
|
|
e = id2entry_r( be, id );
|
|
|
|
|
|
|
|
if ( e == NULL ) {
|
2001-01-18 01:01:19 +08:00
|
|
|
#ifdef NEW_LOGGING
|
|
|
|
LDAP_LOG(( "backend", LDAP_LEVEL_INFO,
|
2001-10-26 10:05:14 +08:00
|
|
|
"ldbm_search: candidate %ld not found.\n", id ));
|
2001-01-18 01:01:19 +08:00
|
|
|
#else
|
2000-09-25 14:49:27 +08:00
|
|
|
Debug( LDAP_DEBUG_TRACE,
|
|
|
|
"ldbm_search: candidate %ld not found\n",
|
1999-07-16 10:45:46 +08:00
|
|
|
id, 0, 0 );
|
2001-01-18 01:01:19 +08:00
|
|
|
#endif
|
|
|
|
|
1999-07-16 10:45:46 +08:00
|
|
|
goto loop_continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ( deref & LDAP_DEREF_SEARCHING && is_entry_alias( e ) ) {
|
|
|
|
Entry *matched;
|
|
|
|
int err;
|
2000-05-22 11:46:57 +08:00
|
|
|
const char *text;
|
1999-07-16 10:45:46 +08:00
|
|
|
|
|
|
|
e = deref_entry_r( be, e, &err, &matched, &text );
|
|
|
|
|
|
|
|
if( e == NULL ) {
|
|
|
|
e = matched;
|
|
|
|
goto loop_continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
if( e->e_id == id ) {
|
|
|
|
/* circular loop */
|
|
|
|
goto loop_continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* need to skip alias which deref into scope */
|
|
|
|
if( scope & LDAP_SCOPE_ONELEVEL ) {
|
2002-01-26 14:52:59 +08:00
|
|
|
struct berval pdn;
|
|
|
|
dnParent( &e->e_nname, &pdn );
|
|
|
|
if ( ber_bvcmp( &pdn, &realbase ) ) {
|
|
|
|
goto loop_continue;
|
1999-07-16 10:45:46 +08:00
|
|
|
}
|
|
|
|
|
2001-12-30 18:47:28 +08:00
|
|
|
} else if ( dnIsSuffix( &e->e_nname, &realbase ) ) {
|
1999-07-16 10:45:46 +08:00
|
|
|
/* alias is within scope */
|
2001-01-18 01:01:19 +08:00
|
|
|
#ifdef NEW_LOGGING
|
|
|
|
LDAP_LOG(( "backend", LDAP_LEVEL_DETAIL1,
|
2001-10-26 10:05:14 +08:00
|
|
|
"ldbm_search: alias \"%s\" in subtree\n", e->e_dn ));
|
2001-01-18 01:01:19 +08:00
|
|
|
#else
|
2000-09-25 14:49:27 +08:00
|
|
|
Debug( LDAP_DEBUG_TRACE,
|
2001-10-26 10:05:14 +08:00
|
|
|
"ldbm_search: alias \"%s\" in subtree\n",
|
1999-07-16 10:45:46 +08:00
|
|
|
e->e_dn, 0, 0 );
|
2001-01-18 01:01:19 +08:00
|
|
|
#endif
|
|
|
|
|
1999-07-16 10:45:46 +08:00
|
|
|
goto loop_continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
scopeok = 1;
|
1998-08-09 08:43:13 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* if it's a referral, add it to the list of referrals. only do
|
1999-07-16 10:45:46 +08:00
|
|
|
* this for non-base searches, and don't check the filter
|
|
|
|
* explicitly here since it's only a candidate anyway.
|
1998-08-09 08:43:13 +08:00
|
|
|
*/
|
1999-07-16 10:45:46 +08:00
|
|
|
if ( !manageDSAit && scope != LDAP_SCOPE_BASE &&
|
|
|
|
is_entry_referral( e ) )
|
1998-08-09 08:43:13 +08:00
|
|
|
{
|
2002-01-26 14:52:59 +08:00
|
|
|
struct berval dn;
|
2001-09-08 10:37:02 +08:00
|
|
|
|
|
|
|
/* check scope */
|
|
|
|
if ( !scopeok && scope == LDAP_SCOPE_ONELEVEL ) {
|
2002-01-26 14:52:59 +08:00
|
|
|
if ( !be_issuffix( be, &e->e_nname ) ) {
|
|
|
|
dnParent( &e->e_nname, &dn );
|
|
|
|
scopeok = dn_match( &dn, &realbase );
|
2001-09-08 10:37:02 +08:00
|
|
|
} else {
|
2001-12-30 18:47:28 +08:00
|
|
|
scopeok = (realbase.bv_len == 0);
|
2001-09-08 10:37:02 +08:00
|
|
|
}
|
1998-08-09 08:43:13 +08:00
|
|
|
|
2001-09-08 10:37:02 +08:00
|
|
|
} else if ( !scopeok && scope == LDAP_SCOPE_SUBTREE ) {
|
2001-12-30 18:47:28 +08:00
|
|
|
scopeok = dnIsSuffix( &e->e_nname, &realbase );
|
2001-09-08 10:37:02 +08:00
|
|
|
|
|
|
|
} else {
|
|
|
|
scopeok = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if( scopeok ) {
|
2002-01-14 09:43:17 +08:00
|
|
|
BerVarray erefs = get_entry_referrals(
|
2001-12-27 04:59:24 +08:00
|
|
|
be, conn, op, e );
|
2002-01-14 09:43:17 +08:00
|
|
|
BerVarray refs = referral_rewrite( erefs,
|
2001-12-27 04:59:24 +08:00
|
|
|
&e->e_name, NULL,
|
2001-12-08 06:28:46 +08:00
|
|
|
scope == LDAP_SCOPE_SUBTREE
|
|
|
|
? LDAP_SCOPE_SUBTREE
|
|
|
|
: LDAP_SCOPE_BASE );
|
2001-09-08 10:37:02 +08:00
|
|
|
|
|
|
|
send_search_reference( be, conn, op,
|
2001-10-26 10:05:14 +08:00
|
|
|
e, refs, NULL, &v2refs );
|
2001-09-08 10:37:02 +08:00
|
|
|
|
2002-01-14 09:43:17 +08:00
|
|
|
ber_bvarray_free( refs );
|
2001-09-08 10:37:02 +08:00
|
|
|
|
|
|
|
} else {
|
|
|
|
#ifdef NEW_LOGGING
|
|
|
|
LDAP_LOG(( "backend", LDAP_LEVEL_DETAIL2,
|
|
|
|
"ldbm_search: candidate referral %ld scope not okay\n",
|
|
|
|
id ));
|
|
|
|
#else
|
|
|
|
Debug( LDAP_DEBUG_TRACE,
|
|
|
|
"ldbm_search: candidate referral %ld scope not okay\n",
|
|
|
|
id, 0, 0 );
|
|
|
|
#endif
|
|
|
|
}
|
1998-08-09 08:43:13 +08:00
|
|
|
|
1999-07-16 10:45:46 +08:00
|
|
|
goto loop_continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* if it matches the filter and scope, send it */
|
2000-02-07 05:09:44 +08:00
|
|
|
if ( test_filter( be, conn, op, e, filter ) == LDAP_COMPARE_TRUE ) {
|
2002-01-26 14:52:59 +08:00
|
|
|
struct berval dn;
|
1999-07-16 10:45:46 +08:00
|
|
|
|
|
|
|
/* check scope */
|
|
|
|
if ( !scopeok && scope == LDAP_SCOPE_ONELEVEL ) {
|
2002-01-26 14:52:59 +08:00
|
|
|
if ( !be_issuffix( be, &e->e_nname ) ) {
|
|
|
|
dnParent( &e->e_nname, &dn );
|
|
|
|
scopeok = dn_match( &dn, &realbase );
|
1999-07-16 10:45:46 +08:00
|
|
|
} else {
|
2001-12-30 18:47:28 +08:00
|
|
|
scopeok = (realbase.bv_len == 0);
|
1998-08-09 08:43:13 +08:00
|
|
|
}
|
|
|
|
|
1999-07-16 10:45:46 +08:00
|
|
|
} else if ( !scopeok && scope == LDAP_SCOPE_SUBTREE ) {
|
2001-12-30 18:47:28 +08:00
|
|
|
scopeok = dnIsSuffix( &e->e_nname, &realbase );
|
1999-07-16 10:45:46 +08:00
|
|
|
|
|
|
|
} else {
|
|
|
|
scopeok = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ( scopeok ) {
|
|
|
|
/* check size limit */
|
|
|
|
if ( --slimit == -1 ) {
|
|
|
|
cache_return_entry_r( &li->li_cache, e );
|
|
|
|
send_search_result( conn, op,
|
|
|
|
LDAP_SIZELIMIT_EXCEEDED, NULL, NULL,
|
|
|
|
v2refs, NULL, nentries );
|
|
|
|
rc = 0;
|
|
|
|
goto done;
|
|
|
|
}
|
1998-08-09 08:43:13 +08:00
|
|
|
|
1999-07-16 10:45:46 +08:00
|
|
|
if (e) {
|
2000-06-17 09:22:55 +08:00
|
|
|
int result = send_search_entry(be, conn, op,
|
2000-05-22 11:46:57 +08:00
|
|
|
e, attrs, attrsonly, NULL);
|
2000-02-15 04:57:34 +08:00
|
|
|
|
2000-06-17 09:22:55 +08:00
|
|
|
switch (result) {
|
1999-07-16 10:45:46 +08:00
|
|
|
case 0: /* entry sent ok */
|
|
|
|
nentries++;
|
1998-10-24 10:42:38 +08:00
|
|
|
break;
|
1999-07-16 10:45:46 +08:00
|
|
|
case 1: /* entry not sent */
|
|
|
|
break;
|
|
|
|
case -1: /* connection closed */
|
|
|
|
cache_return_entry_r( &li->li_cache, e );
|
|
|
|
rc = 0;
|
|
|
|
goto done;
|
1998-08-09 08:43:13 +08:00
|
|
|
}
|
|
|
|
}
|
1999-07-16 10:45:46 +08:00
|
|
|
} else {
|
2001-01-18 01:01:19 +08:00
|
|
|
#ifdef NEW_LOGGING
|
|
|
|
LDAP_LOG(( "backend", LDAP_LEVEL_DETAIL2,
|
2001-10-26 10:05:14 +08:00
|
|
|
"ldbm_search: candidate entry %ld scope not okay\n", id ));
|
2001-01-18 01:01:19 +08:00
|
|
|
#else
|
2000-09-25 14:49:27 +08:00
|
|
|
Debug( LDAP_DEBUG_TRACE,
|
2001-10-26 10:05:14 +08:00
|
|
|
"ldbm_search: candidate entry %ld scope not okay\n",
|
1999-07-16 10:45:46 +08:00
|
|
|
id, 0, 0 );
|
2001-01-18 01:01:19 +08:00
|
|
|
#endif
|
1998-08-09 08:43:13 +08:00
|
|
|
}
|
2001-10-26 10:05:14 +08:00
|
|
|
|
1999-07-16 10:45:46 +08:00
|
|
|
} else {
|
2001-01-18 01:01:19 +08:00
|
|
|
#ifdef NEW_LOGGING
|
|
|
|
LDAP_LOG(( "backend", LDAP_LEVEL_DETAIL2,
|
2001-10-26 10:05:14 +08:00
|
|
|
"ldbm_search: candidate entry %ld does not match filter\n", id ));
|
2001-01-18 01:01:19 +08:00
|
|
|
#else
|
2000-09-25 14:49:27 +08:00
|
|
|
Debug( LDAP_DEBUG_TRACE,
|
2001-10-26 10:05:14 +08:00
|
|
|
"ldbm_search: candidate entry %ld does not match filter\n",
|
1999-07-16 10:45:46 +08:00
|
|
|
id, 0, 0 );
|
2001-01-18 01:01:19 +08:00
|
|
|
#endif
|
1998-08-09 08:43:13 +08:00
|
|
|
}
|
|
|
|
|
1999-07-16 10:45:46 +08:00
|
|
|
loop_continue:
|
1998-10-27 01:37:35 +08:00
|
|
|
if( e != NULL ) {
|
1998-09-21 04:22:46 +08:00
|
|
|
/* free reader lock */
|
|
|
|
cache_return_entry_r( &li->li_cache, e );
|
|
|
|
}
|
1998-08-09 08:43:13 +08:00
|
|
|
|
1999-01-28 12:34:55 +08:00
|
|
|
ldap_pvt_thread_yield();
|
1998-08-09 08:43:13 +08:00
|
|
|
}
|
2001-10-26 10:05:14 +08:00
|
|
|
|
1999-07-16 10:45:46 +08:00
|
|
|
send_search_result( conn, op,
|
|
|
|
v2refs == NULL ? LDAP_SUCCESS : LDAP_REFERRAL,
|
|
|
|
NULL, NULL, v2refs, NULL, nentries );
|
|
|
|
|
|
|
|
rc = 0;
|
|
|
|
|
|
|
|
done:
|
2002-01-30 01:58:36 +08:00
|
|
|
ldap_pvt_thread_rdwr_runlock(&li->li_giant_rwlock);
|
|
|
|
|
1999-08-26 08:51:27 +08:00
|
|
|
if( candidates != NULL )
|
|
|
|
idl_free( candidates );
|
1998-08-09 08:43:13 +08:00
|
|
|
|
2002-01-14 09:43:17 +08:00
|
|
|
if( v2refs ) ber_bvarray_free( v2refs );
|
2001-12-30 18:47:28 +08:00
|
|
|
if( realbase.bv_val ) free( realbase.bv_val );
|
1998-12-22 01:45:47 +08:00
|
|
|
|
1999-07-16 10:45:46 +08:00
|
|
|
return rc;
|
1998-08-09 08:43:13 +08:00
|
|
|
}
|
|
|
|
|
1999-01-31 15:55:53 +08:00
|
|
|
static ID_BLOCK *
|
1999-07-16 10:45:46 +08:00
|
|
|
base_candidate(
|
1998-08-09 08:43:13 +08:00
|
|
|
Backend *be,
|
2000-06-17 13:01:50 +08:00
|
|
|
Entry *e )
|
1998-08-09 08:43:13 +08:00
|
|
|
{
|
1999-01-31 15:55:53 +08:00
|
|
|
ID_BLOCK *idl;
|
1998-09-21 04:22:46 +08:00
|
|
|
|
2001-01-18 01:01:19 +08:00
|
|
|
#ifdef NEW_LOGGING
|
|
|
|
LDAP_LOG(( "backend", LDAP_LEVEL_ENTRY,
|
|
|
|
"base_candidate: base (%s)\n", e->e_dn ));
|
|
|
|
#else
|
1999-07-16 10:45:46 +08:00
|
|
|
Debug(LDAP_DEBUG_TRACE, "base_candidates: base: \"%s\"\n",
|
|
|
|
e->e_dn, 0, 0);
|
2001-01-18 01:01:19 +08:00
|
|
|
#endif
|
|
|
|
|
1998-09-21 04:22:46 +08:00
|
|
|
|
1998-08-09 08:43:13 +08:00
|
|
|
idl = idl_alloc( 1 );
|
|
|
|
idl_insert( &idl, e->e_id, 1 );
|
|
|
|
|
|
|
|
return( idl );
|
|
|
|
}
|
|
|
|
|
1999-01-31 15:55:53 +08:00
|
|
|
static ID_BLOCK *
|
1999-07-16 10:45:46 +08:00
|
|
|
search_candidates(
|
1998-08-09 08:43:13 +08:00
|
|
|
Backend *be,
|
1999-07-16 10:45:46 +08:00
|
|
|
Entry *e,
|
1998-08-09 08:43:13 +08:00
|
|
|
Filter *filter,
|
1999-07-16 10:45:46 +08:00
|
|
|
int scope,
|
|
|
|
int deref,
|
2000-06-17 13:01:50 +08:00
|
|
|
int manageDSAit )
|
1998-08-09 08:43:13 +08:00
|
|
|
{
|
1999-01-31 15:55:53 +08:00
|
|
|
ID_BLOCK *candidates;
|
2000-06-17 13:01:50 +08:00
|
|
|
Filter f, fand, rf, af, xf;
|
|
|
|
AttributeAssertion aa_ref, aa_alias;
|
2001-12-29 23:01:10 +08:00
|
|
|
struct berval bv_ref = { sizeof("REFERRAL")-1, "REFERRAL" };
|
|
|
|
struct berval bv_alias = { sizeof("ALIAS")-1, "ALIAS" };
|
2000-06-17 13:01:50 +08:00
|
|
|
|
2001-01-18 01:01:19 +08:00
|
|
|
#ifdef NEW_LOGGING
|
|
|
|
LDAP_LOG(( "backend", LDAP_LEVEL_DETAIL1,
|
|
|
|
"search_candidates: base (%s) scope %d deref %d\n",
|
|
|
|
e->e_ndn, scope, deref ));
|
|
|
|
#else
|
2000-09-25 14:49:27 +08:00
|
|
|
Debug(LDAP_DEBUG_TRACE,
|
|
|
|
"search_candidates: base=\"%s\" s=%d d=%d\n",
|
2000-06-17 13:01:50 +08:00
|
|
|
e->e_ndn, scope, deref );
|
2001-01-18 01:01:19 +08:00
|
|
|
#endif
|
|
|
|
|
2000-06-17 13:01:50 +08:00
|
|
|
|
|
|
|
xf.f_or = filter;
|
|
|
|
xf.f_choice = LDAP_FILTER_OR;
|
|
|
|
xf.f_next = NULL;
|
|
|
|
|
|
|
|
if( !manageDSAit ) {
|
|
|
|
/* match referrals */
|
|
|
|
rf.f_choice = LDAP_FILTER_EQUALITY;
|
|
|
|
rf.f_ava = &aa_ref;
|
|
|
|
rf.f_av_desc = slap_schema.si_ad_objectClass;
|
2001-12-29 23:01:10 +08:00
|
|
|
rf.f_av_value = bv_ref;
|
2000-06-17 13:01:50 +08:00
|
|
|
rf.f_next = xf.f_or;
|
|
|
|
xf.f_or = &rf;
|
|
|
|
}
|
|
|
|
|
|
|
|
if( deref & LDAP_DEREF_SEARCHING ) {
|
|
|
|
/* match aliases */
|
|
|
|
af.f_choice = LDAP_FILTER_EQUALITY;
|
|
|
|
af.f_ava = &aa_alias;
|
|
|
|
af.f_av_desc = slap_schema.si_ad_objectClass;
|
2001-12-29 23:01:10 +08:00
|
|
|
af.f_av_value = bv_alias;
|
2000-06-17 13:01:50 +08:00
|
|
|
af.f_next = xf.f_or;
|
|
|
|
xf.f_or = ⁡
|
|
|
|
}
|
|
|
|
|
|
|
|
f.f_next = NULL;
|
|
|
|
f.f_choice = LDAP_FILTER_AND;
|
|
|
|
f.f_and = &fand;
|
|
|
|
fand.f_choice = scope == LDAP_SCOPE_SUBTREE
|
|
|
|
? SLAPD_FILTER_DN_SUBTREE
|
|
|
|
: SLAPD_FILTER_DN_ONE;
|
2001-12-27 07:37:59 +08:00
|
|
|
fand.f_dn = &e->e_nname;
|
2000-06-17 13:01:50 +08:00
|
|
|
fand.f_next = xf.f_or == filter ? filter : &xf ;
|
|
|
|
|
|
|
|
candidates = filter_candidates( be, &f );
|
2000-05-28 03:21:28 +08:00
|
|
|
|
1998-08-09 08:43:13 +08:00
|
|
|
return( candidates );
|
|
|
|
}
|