openldap/servers/slapd/daemon.c

2138 lines
50 KiB
C
Raw Normal View History

/* $OpenLDAP$ */
2003-11-27 09:17:14 +08:00
/* This work is part of OpenLDAP Software <http://www.openldap.org/>.
*
* Copyright 1998-2003 The OpenLDAP Foundation.
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted only as authorized by the OpenLDAP
* Public License.
*
* A copy of this license is available in the file LICENSE in the
* top-level directory of the distribution or, alternatively, at
* <http://www.OpenLDAP.org/license.html>.
*/
/* Portions Copyright (c) 1995 Regents of the University of Michigan.
* All rights reserved.
*
* Redistribution and use in source and binary forms are permitted
* provided that this notice is preserved and that due credit is given
* to the University of Michigan at Ann Arbor. The name of the University
* may not be used to endorse or promote products derived from this
* software without specific prior written permission. This software
* is provided ``as is'' without express or implied warranty.
1999-08-07 07:07:46 +08:00
*/
1998-10-25 09:41:42 +08:00
#include "portable.h"
1998-08-09 08:43:13 +08:00
#include <stdio.h>
1998-10-25 09:41:42 +08:00
#include <ac/ctype.h>
#include <ac/errno.h>
#include <ac/socket.h>
#include <ac/string.h>
#include <ac/time.h>
#include <ac/unistd.h>
#include "ldap_pvt.h"
2001-12-07 12:03:25 +08:00
#include "ldap_pvt_thread.h"
#include "lutil.h"
#include "slap.h"
1998-10-25 09:41:42 +08:00
#include "ldap_rq.h"
1998-10-25 09:41:42 +08:00
#ifdef HAVE_TCPD
#include <tcpd.h>
2002-10-27 02:51:24 +08:00
#define SLAP_STRING_UNKNOWN STRING_UNKNOWN
int allow_severity = LOG_INFO;
int deny_severity = LOG_NOTICE;
2002-10-27 02:51:24 +08:00
#else /* ! TCP Wrappers */
#define SLAP_STRING_UNKNOWN "unknown"
#endif /* ! TCP Wrappers */
#ifdef LDAP_PF_LOCAL
#include <sys/stat.h>
/* this should go in <ldap.h> as soon as it is accepted */
#define LDAPI_MOD_URLEXT "x-mod"
#endif /* LDAP_PF_LOCAL */
#ifdef LDAP_PF_INET6
int slap_inet4or6 = AF_UNSPEC;
#else
int slap_inet4or6 = AF_INET;
#endif
/* globals */
time_t starttime;
ber_socket_t dtblsize;
1999-07-20 04:48:19 +08:00
Listener **slap_listeners = NULL;
1998-08-09 08:43:13 +08:00
2000-10-17 14:36:22 +08:00
#define SLAPD_LISTEN 10
static ber_socket_t wake_sds[2];
static int emfile;
#if defined(NO_THREADS) || defined(HAVE_GNU_PTH)
static int waking;
#define WAKE_LISTENER(w) \
((w && !waking) ? tcp_write( wake_sds[1], "0", 1 ), waking=1 : 0)
#else
#define WAKE_LISTENER(w) \
do { if (w) tcp_write( wake_sds[1], "0", 1 ); } while(0)
#endif
#ifndef HAVE_WINSOCK
static
#endif
2002-06-04 00:47:43 +08:00
volatile sig_atomic_t slapd_shutdown = 0, slapd_gentle_shutdown = 0;
volatile sig_atomic_t slapd_abrupt_shutdown = 0;
static struct slap_daemon {
ldap_pvt_thread_mutex_t sd_mutex;
2002-06-04 00:47:43 +08:00
ber_socket_t sd_nactives;
#ifndef HAVE_WINSOCK
/* In winsock, accept() returns values higher than dtblsize
so don't bother with this optimization */
int sd_nfds;
#endif
fd_set sd_actives;
fd_set sd_readers;
fd_set sd_writers;
} slap_daemon;
#ifdef HAVE_SLP
/*
* SLP related functions
*/
#include <slp.h>
#define LDAP_SRVTYPE_PREFIX "service:ldap://"
2001-05-03 03:44:21 +08:00
#define LDAPS_SRVTYPE_PREFIX "service:ldaps://"
static char** slapd_srvurls = NULL;
static SLPHandle slapd_hslp = 0;
void slapd_slp_init( const char* urls ) {
int i;
slapd_srvurls = ldap_str2charray( urls, " " );
2001-05-05 06:50:51 +08:00
if( slapd_srvurls == NULL ) return;
2001-05-03 03:44:21 +08:00
/* find and expand INADDR_ANY URLs */
for( i=0; slapd_srvurls[i] != NULL; i++ ) {
if( strcmp( slapd_srvurls[i], "ldap:///" ) == 0) {
2001-05-03 03:44:21 +08:00
char *host = ldap_pvt_get_fqdn( NULL );
if ( host != NULL ) {
2003-03-10 04:15:30 +08:00
slapd_srvurls[i] = (char *) ch_realloc( slapd_srvurls[i],
2001-05-03 03:44:21 +08:00
strlen( host ) +
sizeof( LDAP_SRVTYPE_PREFIX ) );
strcpy( lutil_strcopy(slapd_srvurls[i],
2001-12-27 00:25:18 +08:00
LDAP_SRVTYPE_PREFIX ), host );
2001-05-03 03:44:21 +08:00
ch_free( host );
}
} else if ( strcmp( slapd_srvurls[i], "ldaps:///" ) == 0) {
char *host = ldap_pvt_get_fqdn( NULL );
if ( host != NULL ) {
2003-03-10 04:15:30 +08:00
slapd_srvurls[i] = (char *) ch_realloc( slapd_srvurls[i],
2001-05-03 03:44:21 +08:00
strlen( host ) +
sizeof( LDAPS_SRVTYPE_PREFIX ) );
strcpy( lutil_strcopy(slapd_srvurls[i],
2001-12-27 00:25:18 +08:00
LDAPS_SRVTYPE_PREFIX ), host );
2001-05-03 03:44:21 +08:00
ch_free( host );
}
}
}
/* open the SLP handle */
2001-05-03 03:44:21 +08:00
SLPOpen( "en", 0, &slapd_hslp );
}
void slapd_slp_deinit() {
2001-05-05 06:50:51 +08:00
if( slapd_srvurls == NULL ) return;
2001-05-03 03:44:21 +08:00
ldap_charray_free( slapd_srvurls );
2001-05-03 03:44:21 +08:00
slapd_srvurls = NULL;
/* close the SLP handle */
SLPClose( slapd_hslp );
}
void slapd_slp_regreport(
SLPHandle hslp,
SLPError errcode,
void* cookie )
{
/* empty report */
}
void slapd_slp_reg() {
int i;
if( slapd_srvurls == NULL ) return;
for( i=0; slapd_srvurls[i] != NULL; i++ ) {
2001-05-03 03:44:21 +08:00
if( strncmp( slapd_srvurls[i], LDAP_SRVTYPE_PREFIX,
sizeof( LDAP_SRVTYPE_PREFIX ) - 1 ) == 0 ||
strncmp( slapd_srvurls[i], LDAPS_SRVTYPE_PREFIX,
sizeof( LDAPS_SRVTYPE_PREFIX ) - 1 ) == 0 )
{
SLPReg( slapd_hslp,
slapd_srvurls[i],
SLP_LIFETIME_MAXIMUM,
"ldap",
"",
1,
slapd_slp_regreport,
NULL );
}
}
}
void slapd_slp_dereg() {
int i;
2003-04-11 12:25:55 +08:00
if( slapd_srvurls == NULL ) return;
for( i=0; slapd_srvurls[i] != NULL; i++ ) {
SLPDereg( slapd_hslp,
slapd_srvurls[i],
slapd_slp_regreport,
NULL );
}
}
#endif /* HAVE_SLP */
/*
* Add a descriptor to daemon control
*
* If isactive, the descriptor is a live server session and is subject
* to idletimeout control. Otherwise, the descriptor is a passive
* listener or an outbound client session, and not subject to
* idletimeout.
*/
static void slapd_add(ber_socket_t s, int isactive) {
ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
assert( !FD_ISSET( s, &slap_daemon.sd_actives ));
assert( !FD_ISSET( s, &slap_daemon.sd_readers ));
assert( !FD_ISSET( s, &slap_daemon.sd_writers ));
#ifndef HAVE_WINSOCK
if (s >= slap_daemon.sd_nfds) {
slap_daemon.sd_nfds = s + 1;
}
#endif
if ( isactive ) {
slap_daemon.sd_nactives++;
}
2002-06-04 00:47:43 +08:00
FD_SET( s, &slap_daemon.sd_actives );
FD_SET( s, &slap_daemon.sd_readers );
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, DETAIL1,
"slapd_add: added %ld%s%s\n", (long)s,
FD_ISSET(s, &slap_daemon.sd_readers) ? "r" : "",
FD_ISSET(s, &slap_daemon.sd_writers) ? "w" : "" );
2001-01-16 03:17:29 +08:00
#else
Debug( LDAP_DEBUG_CONNS, "daemon: added %ld%s%s\n",
(long) s,
FD_ISSET(s, &slap_daemon.sd_readers) ? "r" : "",
FD_ISSET(s, &slap_daemon.sd_writers) ? "w" : "" );
2001-01-16 03:17:29 +08:00
#endif
ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
}
/*
* Remove the descriptor from daemon control
*/
void slapd_remove(ber_socket_t s, int wasactive, int wake) {
ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
if ( wasactive ) {
slap_daemon.sd_nactives--;
}
2002-06-04 00:47:43 +08:00
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, DETAIL1,
"slapd_remove: removing %ld%s%s\n", (long) s,
FD_ISSET(s, &slap_daemon.sd_readers) ? "r" : "",
FD_ISSET(s, &slap_daemon.sd_writers) ? "w" : "" );
2001-01-16 03:17:29 +08:00
#else
Debug( LDAP_DEBUG_CONNS, "daemon: removing %ld%s%s\n",
(long) s,
FD_ISSET(s, &slap_daemon.sd_readers) ? "r" : "",
FD_ISSET(s, &slap_daemon.sd_writers) ? "w" : "" );
2001-01-16 03:17:29 +08:00
#endif
FD_CLR( s, &slap_daemon.sd_actives );
FD_CLR( s, &slap_daemon.sd_readers );
FD_CLR( s, &slap_daemon.sd_writers );
/* If we ran out of file descriptors, we dropped a listener from
* the select() loop. Now that we're removing a session from our
* control, we can try to resume a dropped listener to use.
*/
if ( emfile ) {
int i;
for ( i = 0; slap_listeners[i] != NULL; i++ ) {
if ( slap_listeners[i]->sl_sd != AC_SOCKET_INVALID ) {
if ( slap_listeners[i]->sl_sd == s ) continue;
if ( slap_listeners[i]->sl_is_mute ) {
slap_listeners[i]->sl_is_mute = 0;
emfile--;
break;
}
}
}
/* Walked the entire list without enabling anything; emfile
* counter is stale. Reset it.
*/
if ( slap_listeners[i] == NULL )
emfile = 0;
}
ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
WAKE_LISTENER(wake || slapd_gentle_shutdown == 2);
}
void slapd_clr_write(ber_socket_t s, int wake) {
ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
assert( FD_ISSET( s, &slap_daemon.sd_actives) );
FD_CLR( s, &slap_daemon.sd_writers );
ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
WAKE_LISTENER(wake);
}
void slapd_set_write(ber_socket_t s, int wake) {
ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
assert( FD_ISSET( s, &slap_daemon.sd_actives) );
if (!FD_ISSET(s, &slap_daemon.sd_writers))
FD_SET( (unsigned) s, &slap_daemon.sd_writers );
ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
WAKE_LISTENER(wake);
}
void slapd_clr_read(ber_socket_t s, int wake) {
ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
assert( FD_ISSET( s, &slap_daemon.sd_actives) );
FD_CLR( s, &slap_daemon.sd_readers );
ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
WAKE_LISTENER(wake);
}
void slapd_set_read(ber_socket_t s, int wake) {
ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
assert( FD_ISSET( s, &slap_daemon.sd_actives) );
if (!FD_ISSET(s, &slap_daemon.sd_readers))
FD_SET( s, &slap_daemon.sd_readers );
ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
WAKE_LISTENER(wake);
}
static void slapd_close(ber_socket_t s) {
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, DETAIL1, "slapd_close: closing %ld\n", (long)s, 0, 0);
2001-01-16 03:17:29 +08:00
#else
Debug( LDAP_DEBUG_CONNS, "daemon: closing %ld\n",
(long) s, 0, 0 );
2001-01-16 03:17:29 +08:00
#endif
tcp_close(s);
}
2000-10-18 08:35:09 +08:00
static void slap_free_listener_addresses(struct sockaddr **sal)
{
struct sockaddr **sap;
if (sal == NULL) {
return;
}
for (sap = sal; *sap != NULL; sap++) {
ch_free(*sap);
}
ch_free(sal);
}
#if defined(LDAP_PF_LOCAL) || defined(SLAP_X_LISTENER_MOD)
static int get_url_perms(
char **exts,
mode_t *perms,
int *crit )
{
int i;
assert( exts );
assert( perms );
assert( crit );
*crit = 0;
for ( i = 0; exts[ i ]; i++ ) {
char *type = exts[ i ];
int c = 0;
if ( type[ 0 ] == '!' ) {
c = 1;
type++;
}
if ( strncasecmp( type, LDAPI_MOD_URLEXT "=", sizeof(LDAPI_MOD_URLEXT "=") - 1 ) == 0 ) {
char *value = type
+ ( sizeof(LDAPI_MOD_URLEXT "=") - 1 );
mode_t p = 0;
int j;
switch (strlen(value)) {
case 4:
/* skip leading '0' */
if ( value[ 0 ] != '0' ) {
return LDAP_OTHER;
}
value++;
case 3:
for ( j = 0; j < 3; j++) {
int v;
v = value[ j ] - '0';
if ( v < 0 || v > 7 ) {
return LDAP_OTHER;
}
p |= v << 3*(2-j);
}
break;
case 10:
for ( j = 1; j < 10; j++ ) {
static mode_t m[] = { 0,
S_IRUSR, S_IWUSR, S_IXUSR,
S_IRGRP, S_IWGRP, S_IXGRP,
S_IROTH, S_IWOTH, S_IXOTH
};
static char c[] = "-rwxrwxrwx";
if ( value[ j ] == c[ j ] ) {
p |= m[ j ];
} else if ( value[ j ] != '-' ) {
return LDAP_OTHER;
}
}
break;
default:
return LDAP_OTHER;
}
*crit = c;
*perms = p;
return LDAP_SUCCESS;
}
}
return LDAP_OTHER;
}
#endif /* LDAP_PF_LOCAL || SLAP_X_LISTENER_MOD */
/* port = 0 indicates AF_LOCAL */
static int slap_get_listener_addresses(
const char *host,
unsigned short port,
struct sockaddr ***sal)
{
struct sockaddr **sap;
#ifdef LDAP_PF_LOCAL
if ( port == 0 ) {
*sal = ch_malloc(2 * sizeof(void *));
if (*sal == NULL) {
return -1;
}
sap = *sal;
*sap = ch_malloc(sizeof(struct sockaddr_un));
if (*sap == NULL)
goto errexit;
sap[1] = NULL;
if ( strlen(host) >
(sizeof(((struct sockaddr_un *)*sap)->sun_path) - 1) ) {
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, INFO,
"slap_get_listener_addresses: domain socket path (%s) "
"too long in URL\n", host, 0, 0 );
2001-01-16 03:17:29 +08:00
#else
Debug( LDAP_DEBUG_ANY,
"daemon: domain socket path (%s) too long in URL",
host, 0, 0);
2001-01-16 03:17:29 +08:00
#endif
goto errexit;
}
(void)memset( (void *)*sap, '\0', sizeof(struct sockaddr_un) );
(*sap)->sa_family = AF_LOCAL;
strcpy( ((struct sockaddr_un *)*sap)->sun_path, host );
} else
#endif
{
#ifdef HAVE_GETADDRINFO
struct addrinfo hints, *res, *sai;
int n, err;
char serv[7];
memset( &hints, '\0', sizeof(hints) );
hints.ai_flags = AI_PASSIVE;
hints.ai_socktype = SOCK_STREAM;
hints.ai_family = slap_inet4or6;
snprintf(serv, sizeof serv, "%d", port);
2001-11-18 00:18:07 +08:00
if ( (err = getaddrinfo(host, serv, &hints, &res)) ) {
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, INFO,
2001-01-18 00:35:53 +08:00
"slap_get_listener_addresses: getaddrinfo failed: %s\n",
AC_GAI_STRERROR(err), 0, 0 );
2001-01-16 03:17:29 +08:00
#else
Debug( LDAP_DEBUG_ANY, "daemon: getaddrinfo failed: %s\n",
2000-11-24 13:30:52 +08:00
AC_GAI_STRERROR(err), 0, 0);
2001-01-16 03:17:29 +08:00
#endif
return -1;
}
sai = res;
for (n=2; (sai = sai->ai_next) != NULL; n++) {
/* EMPTY */ ;
}
*sal = ch_calloc(n, sizeof(void *));
if (*sal == NULL) {
return -1;
}
sap = *sal;
2001-11-04 06:02:57 +08:00
*sap = NULL;
for ( sai=res; sai; sai=sai->ai_next ) {
if( sai->ai_addr == NULL ) {
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, INFO,
"slap_get_listener_addresses: "
"getaddrinfo ai_addr is NULL?\n", 0, 0, 0 );
#else
Debug( LDAP_DEBUG_ANY, "slap_get_listener_addresses: "
"getaddrinfo ai_addr is NULL?\n", 0, 0, 0 );
#endif
freeaddrinfo(res);
goto errexit;
}
switch (sai->ai_family) {
# ifdef LDAP_PF_INET6
case AF_INET6:
*sap = ch_malloc(sizeof(struct sockaddr_in6));
if (*sap == NULL) {
freeaddrinfo(res);
goto errexit;
}
*(struct sockaddr_in6 *)*sap =
*((struct sockaddr_in6 *)sai->ai_addr);
break;
# endif
case AF_INET:
*sap = ch_malloc(sizeof(struct sockaddr_in));
if (*sap == NULL) {
freeaddrinfo(res);
goto errexit;
}
*(struct sockaddr_in *)*sap =
*((struct sockaddr_in *)sai->ai_addr);
break;
default:
*sap = NULL;
break;
}
2001-11-04 06:02:57 +08:00
if (*sap != NULL) {
(*sap)->sa_family = sai->ai_family;
sap++;
2001-11-04 06:02:57 +08:00
*sap = NULL;
}
}
freeaddrinfo(res);
#else
int i, n = 1;
struct in_addr in;
struct hostent *he = NULL;
if ( host == NULL ) {
in.s_addr = htonl(INADDR_ANY);
} else if ( !inet_aton( host, &in ) ) {
he = gethostbyname( host );
if( he == NULL ) {
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, INFO,
"slap_get_listener_addresses: invalid host %s\n", host, 0, 0 );
2001-01-16 03:17:29 +08:00
#else
Debug( LDAP_DEBUG_ANY,
"daemon: invalid host %s", host, 0, 0);
2001-01-16 03:17:29 +08:00
#endif
return -1;
}
for (n = 0; he->h_addr_list[n]; n++) ;
}
*sal = ch_malloc((n+1) * sizeof(void *));
if (*sal == NULL) {
return -1;
}
sap = *sal;
for ( i = 0; i<n; i++ ) {
sap[i] = ch_malloc(sizeof(struct sockaddr_in));
if (*sap == NULL) {
goto errexit;
}
(void)memset( (void *)sap[i], '\0', sizeof(struct sockaddr_in) );
sap[i]->sa_family = AF_INET;
((struct sockaddr_in *)sap[i])->sin_port = htons(port);
if (he) {
AC_MEMCPY( &((struct sockaddr_in *)sap[i])->sin_addr, he->h_addr_list[i], sizeof(struct in_addr) );
} else {
AC_MEMCPY( &((struct sockaddr_in *)sap[i])->sin_addr, &in, sizeof(struct in_addr) );
}
}
sap[i] = NULL;
#endif
}
return 0;
errexit:
slap_free_listener_addresses(*sal);
return -1;
}
static int slap_open_listener(
const char* url,
int *listeners,
int *cur
)
{
int num, tmp, rc;
Listener l;
Listener *li;
LDAPURLDesc *lud;
unsigned short port;
2001-11-18 00:18:07 +08:00
int err, addrlen = 0;
struct sockaddr **sal, **psal;
int socktype = SOCK_STREAM; /* default to COTS */
#if defined(LDAP_PF_LOCAL) || defined(SLAP_X_LISTENER_MOD)
/*
* use safe defaults
*/
int crit = 1;
#endif /* LDAP_PF_LOCAL || SLAP_X_LISTENER_MOD */
rc = ldap_url_parse( url, &lud );
if( rc != LDAP_URL_SUCCESS ) {
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, ERR,
"slap_open_listener: listen URL \"%s\" parse error %d\n",
url, rc , 0 );
2001-01-16 03:17:29 +08:00
#else
Debug( LDAP_DEBUG_ANY,
"daemon: listen URL \"%s\" parse error=%d\n",
url, rc, 0 );
2001-01-16 03:17:29 +08:00
#endif
return rc;
}
l.sl_url.bv_val = NULL;
l.sl_is_mute = 0;
#ifndef HAVE_TLS
if( ldap_pvt_url_scheme2tls( lud->lud_scheme ) ) {
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, INFO,
"slap_open_listener: TLS is not supported (%s)\n", url, 0, 0 );
2001-01-16 03:17:29 +08:00
#else
Debug( LDAP_DEBUG_ANY,
"daemon: TLS not supported (%s)\n",
url, 0, 0 );
2001-01-16 03:17:29 +08:00
#endif
ldap_free_urldesc( lud );
return -1;
}
if(! lud->lud_port ) {
lud->lud_port = LDAP_PORT;
}
#else
l.sl_is_tls = ldap_pvt_url_scheme2tls( lud->lud_scheme );
1999-07-20 04:48:19 +08:00
if(! lud->lud_port ) {
lud->lud_port = l.sl_is_tls ? LDAPS_PORT : LDAP_PORT;
}
#endif
port = (unsigned short) lud->lud_port;
tmp = ldap_pvt_url_scheme2proto(lud->lud_scheme);
if ( tmp == LDAP_PROTO_IPC ) {
#ifdef LDAP_PF_LOCAL
if ( lud->lud_host == NULL || lud->lud_host[0] == '\0' ) {
err = slap_get_listener_addresses(LDAPI_SOCK, 0, &sal);
} else {
err = slap_get_listener_addresses(lud->lud_host, 0, &sal);
}
#else
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, INFO,
"slap_open_listener: URL scheme is not supported: %s\n", url, 0, 0 );
2001-01-16 03:17:29 +08:00
#else
Debug( LDAP_DEBUG_ANY, "daemon: URL scheme not supported: %s",
url, 0, 0);
2001-01-16 03:17:29 +08:00
#endif
ldap_free_urldesc( lud );
return -1;
#endif
} else {
if( lud->lud_host == NULL || lud->lud_host[0] == '\0'
|| strcmp(lud->lud_host, "*") == 0 )
{
err = slap_get_listener_addresses(NULL, port, &sal);
} else {
err = slap_get_listener_addresses(lud->lud_host, port, &sal);
}
}
2003-01-24 19:08:54 +08:00
#ifdef LDAP_CONNECTIONLESS
l.sl_is_udp = ( tmp == LDAP_PROTO_UDP );
#endif
#if defined(LDAP_PF_LOCAL) || defined(SLAP_X_LISTENER_MOD)
if ( lud->lud_exts ) {
err = get_url_perms( lud->lud_exts, &l.sl_perms, &crit );
} else {
2003-04-04 05:23:36 +08:00
l.sl_perms = S_IRWXU | S_IRWXO;
}
#endif /* LDAP_PF_LOCAL || SLAP_X_LISTENER_MOD */
ldap_free_urldesc( lud );
if ( err ) {
return -1;
}
/* If we got more than one address returned, we need to make space
* for it in the slap_listeners array.
*/
for ( num=0; sal[num]; num++ );
if ( num > 1 ) {
*listeners += num-1;
slap_listeners = ch_realloc( slap_listeners, (*listeners + 1) * sizeof(Listener *) );
}
psal = sal;
while ( *sal != NULL ) {
char *af;
switch( (*sal)->sa_family ) {
case AF_INET:
af = "IPv4";
break;
#ifdef LDAP_PF_INET6
case AF_INET6:
af = "IPv6";
break;
#endif
#ifdef LDAP_PF_LOCAL
case AF_LOCAL:
af = "Local";
break;
#endif
default:
sal++;
continue;
}
#ifdef LDAP_CONNECTIONLESS
2002-09-17 05:50:55 +08:00
if( l.sl_is_udp ) socktype = SOCK_DGRAM;
#endif
l.sl_sd = socket( (*sal)->sa_family, socktype, 0);
if ( l.sl_sd == AC_SOCKET_INVALID ) {
2000-06-26 13:23:33 +08:00
int err = sock_errno();
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, ERR,
"slap_open_listener: %s socket() failed errno=%d (%s)\n",
af, err, sock_errstr(err) );
2001-01-16 03:17:29 +08:00
#else
Debug( LDAP_DEBUG_ANY,
"daemon: %s socket() failed errno=%d (%s)\n",
af, err, sock_errstr(err) );
2001-01-16 03:17:29 +08:00
#endif
sal++;
continue;
}
#ifndef HAVE_WINSOCK
if ( l.sl_sd >= dtblsize ) {
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, ERR,
"slap_open_listener: listener descriptor %ld is too "
"great %ld\n", (long)l.sl_sd, (long)dtblsize, 0 );
2001-01-16 03:17:29 +08:00
#else
Debug( LDAP_DEBUG_ANY,
"daemon: listener descriptor %ld is too great %ld\n",
(long) l.sl_sd, (long) dtblsize, 0 );
2001-01-16 03:17:29 +08:00
#endif
tcp_close( l.sl_sd );
sal++;
continue;
}
#endif
#ifdef LDAP_PF_LOCAL
if ( (*sal)->sa_family == AF_LOCAL ) {
unlink ( ((struct sockaddr_un *)*sal)->sun_path );
} else
#endif
{
#ifdef SO_REUSEADDR
/* enable address reuse */
tmp = 1;
rc = setsockopt( l.sl_sd, SOL_SOCKET, SO_REUSEADDR,
(char *) &tmp, sizeof(tmp) );
if ( rc == AC_SOCKET_ERROR ) {
int err = sock_errno();
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, INFO,
"slap_open_listener: setsockopt( %ld, SO_REUSEADDR ) "
"failed errno %d (%s)\n", (long)l.sl_sd, err,
sock_errstr(err) );
2001-01-16 03:17:29 +08:00
#else
Debug( LDAP_DEBUG_ANY,
"slapd(%ld): setsockopt(SO_REUSEADDR) failed errno=%d (%s)\n",
(long) l.sl_sd, err, sock_errstr(err) );
2001-01-16 03:17:29 +08:00
#endif
}
#endif
}
switch( (*sal)->sa_family ) {
case AF_INET:
addrlen = sizeof(struct sockaddr_in);
break;
#ifdef LDAP_PF_INET6
case AF_INET6:
#ifdef IPV6_V6ONLY
/* Try to use IPv6 sockets for IPv6 only */
tmp = 1;
rc = setsockopt( l.sl_sd, IPPROTO_IPV6, IPV6_V6ONLY,
(char *) &tmp, sizeof(tmp) );
if ( rc == AC_SOCKET_ERROR ) {
int err = sock_errno();
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, INFO,
"slap_open_listener: setsockopt( %ld, IPV6_V6ONLY ) failed errno %d (%s)\n",
(long)l.sl_sd, err, sock_errstr(err) );
#else
Debug( LDAP_DEBUG_ANY,
"slapd(%ld): setsockopt(IPV6_V6ONLY) failed errno=%d (%s)\n",
(long) l.sl_sd, err, sock_errstr(err) );
#endif
}
#endif
addrlen = sizeof(struct sockaddr_in6);
break;
#endif
#ifdef LDAP_PF_LOCAL
case AF_LOCAL:
addrlen = sizeof(struct sockaddr_un);
break;
#endif
}
if (bind(l.sl_sd, *sal, addrlen)) {
err = sock_errno();
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, INFO,
"slap_open_listener: bind(%ld) failed errno=%d (%s)\n",
(long)l.sl_sd, err, sock_errstr(err) );
2001-01-16 03:17:29 +08:00
#else
Debug( LDAP_DEBUG_ANY, "daemon: bind(%ld) failed errno=%d (%s)\n",
(long) l.sl_sd, err, sock_errstr(err) );
2001-01-16 03:17:29 +08:00
#endif
tcp_close( l.sl_sd );
sal++;
continue;
}
switch ( (*sal)->sa_family ) {
#ifdef LDAP_PF_LOCAL
case AF_LOCAL: {
char *addr = ((struct sockaddr_un *)*sal)->sun_path;
2003-04-03 07:01:21 +08:00
#if 0 /* don't muck with socket perms */
if ( chmod( addr, l.sl_perms ) < 0 && crit ) {
2000-06-26 13:23:33 +08:00
int err = sock_errno();
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, INFO,
"slap_open_listener: fchmod(%ld) failed errno=%d (%s)\n",
(long)l.sl_sd, err, sock_errstr(err) );
2001-01-16 03:17:29 +08:00
#else
Debug( LDAP_DEBUG_ANY, "daemon: fchmod(%ld) failed errno=%d (%s)",
(long) l.sl_sd, err, sock_errstr(err) );
2001-01-16 03:17:29 +08:00
#endif
tcp_close( l.sl_sd );
slap_free_listener_addresses(psal);
return -1;
}
2003-04-03 07:01:21 +08:00
#endif
l.sl_name.bv_len = strlen(addr) + sizeof("PATH=") - 1;
l.sl_name.bv_val = ber_memalloc( l.sl_name.bv_len + 1 );
snprintf( l.sl_name.bv_val, l.sl_name.bv_len + 1,
"PATH=%s", addr );
} break;
#endif /* LDAP_PF_LOCAL */
case AF_INET: {
char *s;
2001-05-10 07:41:16 +08:00
#if defined( HAVE_GETADDRINFO ) && defined( HAVE_INET_NTOP )
char addr[INET_ADDRSTRLEN];
inet_ntop( AF_INET, &((struct sockaddr_in *)*sal)->sin_addr,
addr, sizeof(addr) );
s = addr;
#else
s = inet_ntoa( ((struct sockaddr_in *) *sal)->sin_addr );
#endif
2002-03-08 04:23:48 +08:00
port = ntohs( ((struct sockaddr_in *)*sal) ->sin_port );
l.sl_name.bv_val = ber_memalloc( sizeof("IP=255.255.255.255:65535") );
snprintf( l.sl_name.bv_val, sizeof("IP=255.255.255.255:65535"),
"IP=%s:%d",
2002-10-27 02:51:24 +08:00
s != NULL ? s : SLAP_STRING_UNKNOWN, port );
l.sl_name.bv_len = strlen( l.sl_name.bv_val );
} break;
#ifdef LDAP_PF_INET6
case AF_INET6: {
char addr[INET6_ADDRSTRLEN];
inet_ntop( AF_INET6, &((struct sockaddr_in6 *)*sal)->sin6_addr,
addr, sizeof addr);
2002-03-08 04:23:48 +08:00
port = ntohs( ((struct sockaddr_in6 *)*sal)->sin6_port );
l.sl_name.bv_len = strlen(addr) + sizeof("IP= 65535");
l.sl_name.bv_val = ber_memalloc( l.sl_name.bv_len );
snprintf( l.sl_name.bv_val, l.sl_name.bv_len, "IP=%s %d",
addr, port );
l.sl_name.bv_len = strlen( l.sl_name.bv_val );
} break;
#endif /* LDAP_PF_INET6 */
default:
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, INFO,
"slap_open_listener: unsupported address family (%d)\n",
(int)(*sal)->sa_family, 0, 0 );
2001-01-16 03:17:29 +08:00
#else
Debug( LDAP_DEBUG_ANY, "daemon: unsupported address family (%d)\n",
(int) (*sal)->sa_family, 0, 0 );
2001-01-16 03:17:29 +08:00
#endif
break;
}
AC_MEMCPY(&l.sl_sa, *sal, addrlen);
ber_str2bv( url, 0, 1, &l.sl_url);
li = ch_malloc( sizeof( Listener ) );
*li = l;
slap_listeners[*cur] = li;
(*cur)++;
sal++;
} /* while ( *sal != NULL ) */
slap_free_listener_addresses(psal);
if ( l.sl_url.bv_val == NULL )
{
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, RESULTS,
"slap_open_listener: failed on %s\n", url, 0, 0 );
#else
Debug( LDAP_DEBUG_TRACE,
"slap_open_listener: failed on %s\n", url, 0, 0 );
#endif
return -1;
}
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, RESULTS,
"slap_open_listener: daemon initialized %s\n",
l.sl_url.bv_val, 0, 0 );
2001-01-16 03:17:29 +08:00
#else
1999-07-20 04:48:19 +08:00
Debug( LDAP_DEBUG_TRACE, "daemon: initialized %s\n",
l.sl_url.bv_val, 0, 0 );
2001-01-16 03:17:29 +08:00
#endif
return 0;
}
static int sockinit(void);
static int sockdestroy(void);
int slapd_daemon_init( const char *urls )
1998-08-09 08:43:13 +08:00
{
int i, j, n, rc;
char **u;
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, ARGS,
"slapd_daemon_init: %s\n", urls ? urls : "<null>", 0, 0 );
2001-01-16 03:17:29 +08:00
#else
Debug( LDAP_DEBUG_ARGS, "daemon_init: %s\n",
urls ? urls : "<null>", 0, 0 );
2001-01-16 03:17:29 +08:00
#endif
1999-09-06 12:42:20 +08:00
if( (rc = sockinit()) != 0 ) {
return rc;
}
1998-08-09 08:43:13 +08:00
1998-10-25 09:41:42 +08:00
#ifdef HAVE_SYSCONF
1998-08-18 07:26:25 +08:00
dtblsize = sysconf( _SC_OPEN_MAX );
1998-10-25 09:41:42 +08:00
#elif HAVE_GETDTABLESIZE
1998-08-18 07:26:25 +08:00
dtblsize = getdtablesize();
1998-10-25 09:41:42 +08:00
#else
1999-04-02 00:32:11 +08:00
dtblsize = FD_SETSIZE;
1998-10-25 09:41:42 +08:00
#endif
1998-08-18 07:26:25 +08:00
#ifdef FD_SETSIZE
1998-08-09 09:05:15 +08:00
if(dtblsize > FD_SETSIZE) {
dtblsize = FD_SETSIZE;
}
#endif /* !FD_SETSIZE */
1998-08-18 07:26:25 +08:00
/* open a pipe (or something equivalent connected to itself).
* we write a byte on this fd whenever we catch a signal. The main
* loop will be select'ing on this socket, and will wake up when
* this byte arrives.
*/
if( (rc = lutil_pair( wake_sds )) < 0 ) {
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, ERR,
"slap_daemon_init: lutil_pair() failed rc=%d\n", rc, 0, 0);
2001-01-16 03:17:29 +08:00
#else
Debug( LDAP_DEBUG_ANY,
"daemon: lutil_pair() failed rc=%d\n", rc, 0, 0 );
2001-01-16 03:17:29 +08:00
#endif
return rc;
}
FD_ZERO( &slap_daemon.sd_readers );
FD_ZERO( &slap_daemon.sd_writers );
1998-08-09 08:43:13 +08:00
if( urls == NULL ) {
1999-07-20 04:48:19 +08:00
urls = "ldap:///";
}
1998-08-09 08:43:13 +08:00
u = ldap_str2charray( urls, " " );
1998-08-09 08:43:13 +08:00
1999-07-20 04:48:19 +08:00
if( u == NULL || u[0] == NULL ) {
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, ERR,
"slap_daemon_init: no urls (%s) provided.\n", urls, 0, 0 );
2001-01-16 03:17:29 +08:00
#else
1999-07-20 04:48:19 +08:00
Debug( LDAP_DEBUG_ANY, "daemon_init: no urls (%s) provided.\n",
urls, 0, 0 );
2001-01-16 03:17:29 +08:00
#endif
return -1;
}
1999-07-20 04:48:19 +08:00
for( i=0; u[i] != NULL; i++ ) {
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, DETAIL1,
"slap_daemon_init: listen on %s\n", u[i], 0, 0 );
2001-01-16 03:17:29 +08:00
#else
1999-07-20 04:48:19 +08:00
Debug( LDAP_DEBUG_TRACE, "daemon_init: listen on %s\n",
u[i], 0, 0 );
2001-01-16 03:17:29 +08:00
#endif
}
1999-07-20 04:48:19 +08:00
if( i == 0 ) {
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, INFO,
"slap_daemon_init: no listeners to open (%s)\n", urls, 0, 0 );
2001-01-16 03:17:29 +08:00
#else
1999-07-20 04:48:19 +08:00
Debug( LDAP_DEBUG_ANY, "daemon_init: no listeners to open (%s)\n",
urls, 0, 0 );
2001-01-16 03:17:29 +08:00
#endif
ldap_charray_free( u );
1999-07-20 04:48:19 +08:00
return -1;
}
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, INFO,
"slap_daemon_init: %d listeners to open...\n", i, 0, 0 );
2001-01-16 03:17:29 +08:00
#else
1999-07-20 04:48:19 +08:00
Debug( LDAP_DEBUG_TRACE, "daemon_init: %d listeners to open...\n",
i, 0, 0 );
2001-01-16 03:17:29 +08:00
#endif
slap_listeners = ch_malloc( (i+1)*sizeof(Listener *) );
for(n = 0, j = 0; u[n]; n++ ) {
if ( slap_open_listener( u[n], &i, &j ) ) {
ldap_charray_free( u );
return -1;
}
}
slap_listeners[j] = NULL;
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, DETAIL1,
"slap_daemon_init: %d listeners opened\n", i, 0, 0 );
2001-01-16 03:17:29 +08:00
#else
1999-08-19 08:40:18 +08:00
Debug( LDAP_DEBUG_TRACE, "daemon_init: %d listeners opened\n",
1999-07-20 04:48:19 +08:00
i, 0, 0 );
2001-01-16 03:17:29 +08:00
#endif
#ifdef HAVE_SLP
slapd_slp_init( urls );
slapd_slp_reg();
#endif
ldap_charray_free( u );
ldap_pvt_thread_mutex_init( &slap_daemon.sd_mutex );
1999-07-20 04:48:19 +08:00
return !i;
}
int
slapd_daemon_destroy(void)
{
connections_destroy();
tcp_close( wake_sds[1] );
tcp_close( wake_sds[0] );
sockdestroy();
#ifdef HAVE_SLP
slapd_slp_dereg();
slapd_slp_deinit();
#endif
return 0;
}
2002-06-04 00:47:43 +08:00
static void
close_listeners(
int remove
)
{
int l;
for ( l = 0; slap_listeners[l] != NULL; l++ ) {
if ( slap_listeners[l]->sl_sd != AC_SOCKET_INVALID ) {
if ( remove )
slapd_remove( slap_listeners[l]->sl_sd, 0, 0 );
2002-06-04 00:47:43 +08:00
#ifdef LDAP_PF_LOCAL
if ( slap_listeners[l]->sl_sa.sa_addr.sa_family == AF_LOCAL ) {
unlink( slap_listeners[l]->sl_sa.sa_un_addr.sun_path );
}
#endif /* LDAP_PF_LOCAL */
slapd_close( slap_listeners[l]->sl_sd );
}
if ( slap_listeners[l]->sl_url.bv_val )
ber_memfree( slap_listeners[l]->sl_url.bv_val );
if ( slap_listeners[l]->sl_name.bv_val )
ber_memfree( slap_listeners[l]->sl_name.bv_val );
2002-06-04 00:47:43 +08:00
free ( slap_listeners[l] );
slap_listeners[l] = NULL;
}
}
static void *
slapd_daemon_task(
void *ptr
)
{
1999-07-14 21:16:13 +08:00
int l;
2001-11-18 00:18:07 +08:00
time_t last_idle_check = 0;
struct timeval idle;
#define SLAPD_IDLE_CHECK_LIMIT 4
if ( global_idletimeout > 0 ) {
last_idle_check = slap_get_time();
/* Set the select timeout.
* Don't just truncate, preserve the fractions of
* seconds to prevent sleeping for zero time.
*/
idle.tv_sec = global_idletimeout/SLAPD_IDLE_CHECK_LIMIT;
idle.tv_usec = global_idletimeout - idle.tv_sec * SLAPD_IDLE_CHECK_LIMIT;
idle.tv_usec *= 1000000 / SLAPD_IDLE_CHECK_LIMIT;
} else {
idle.tv_sec = 0;
idle.tv_usec = 0;
}
for ( l = 0; slap_listeners[l] != NULL; l++ ) {
if ( slap_listeners[l]->sl_sd == AC_SOCKET_INVALID )
continue;
#ifdef LDAP_CONNECTIONLESS
/* Since this is connectionless, the data port is the
* listening port. The listen() and accept() calls
* are unnecessary.
*/
2002-09-17 05:50:55 +08:00
if ( slap_listeners[l]->sl_is_udp ) {
slapd_add( slap_listeners[l]->sl_sd, 1 );
continue;
}
#endif
2000-10-17 14:36:22 +08:00
if ( listen( slap_listeners[l]->sl_sd, SLAPD_LISTEN ) == -1 ) {
int err = sock_errno();
#ifdef LDAP_PF_INET6
/* If error is EADDRINUSE, we are trying to listen to INADDR_ANY and
* we are already listening to in6addr_any, then we want to ignore
* this and continue.
*/
if ( err == EADDRINUSE ) {
int i;
struct sockaddr_in sa = slap_listeners[l]->sl_sa.sa_in_addr;
struct sockaddr_in6 sa6;
if ( sa.sin_family == AF_INET &&
sa.sin_addr.s_addr == htonl(INADDR_ANY) ) {
for ( i = 0 ; i < l; i++ ) {
sa6 = slap_listeners[i]->sl_sa.sa_in6_addr;
if ( sa6.sin6_family == AF_INET6 &&
!memcmp( &sa6.sin6_addr, &in6addr_any, sizeof(struct in6_addr) ) )
break;
}
if ( i < l ) {
/* We are already listening to in6addr_any */
#ifdef NEW_LOGGING
LDAP_LOG(CONNECTION, WARNING,
"slapd_daemon_task: Attempt to listen to 0.0.0.0 failed, already listening on ::, assuming IPv4 included\n", 0, 0, 0 );
#else
Debug( LDAP_DEBUG_CONNS,
"daemon: Attempt to listen to 0.0.0.0 failed, already listening on ::, assuming IPv4 included\n",
0, 0, 0 );
#endif
slapd_close( slap_listeners[l]->sl_sd );
slap_listeners[l]->sl_sd = AC_SOCKET_INVALID;
continue;
}
}
}
#endif
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, ERR,
"slapd_daemon_task: listen( %s, 5 ) failed errno=%d (%s)\n",
slap_listeners[l]->sl_url.bv_val, err, sock_errstr(err) );
2001-01-16 03:17:29 +08:00
#else
Debug( LDAP_DEBUG_ANY,
1999-08-19 08:40:18 +08:00
"daemon: listen(%s, 5) failed errno=%d (%s)\n",
slap_listeners[l]->sl_url.bv_val, err,
sock_errstr(err) );
2001-01-16 03:17:29 +08:00
#endif
return( (void*)-1 );
1998-08-09 08:43:13 +08:00
}
slapd_add( slap_listeners[l]->sl_sd, 0 );
1998-08-09 08:43:13 +08:00
}
#ifdef HAVE_NT_SERVICE_MANAGER
if ( started_event != NULL ) {
ldap_pvt_thread_cond_signal( &started_event );
}
#endif
/* initialization complete. Here comes the loop. */
1998-08-09 08:43:13 +08:00
while ( !slapd_shutdown ) {
ber_socket_t i;
int ns;
int at;
ber_socket_t nfds;
#define SLAPD_EBADF_LIMIT 16
int ebadf = 0;
time_t now;
fd_set readfds;
fd_set writefds;
Sockaddr from;
struct timeval tv;
1998-08-09 08:43:13 +08:00
struct timeval *tvp;
struct timeval *cat;
time_t tdelta = 1;
2003-05-08 06:29:26 +08:00
struct re_s* rtask;
2003-05-08 06:22:21 +08:00
now = slap_get_time();
if( ( global_idletimeout > 0 ) &&
difftime( last_idle_check +
global_idletimeout/SLAPD_IDLE_CHECK_LIMIT, now ) < 0 ) {
connections_timeout_idle( now );
last_idle_check = now;
}
tv = idle;
2002-06-04 00:47:43 +08:00
#ifdef SIGHUP
if( slapd_gentle_shutdown ) {
ber_socket_t active;
if( slapd_gentle_shutdown == 1 ) {
2002-06-04 00:47:43 +08:00
Debug( LDAP_DEBUG_ANY, "slapd gentle shutdown\n", 0, 0, 0 );
close_listeners( 1 );
global_restrictops |= SLAP_RESTRICT_OP_WRITES;
slapd_gentle_shutdown = 2;
2002-06-04 00:47:43 +08:00
}
ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
active = slap_daemon.sd_nactives;
ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
if( active == 0 ) {
slapd_shutdown = 2;
2002-06-04 00:47:43 +08:00
break;
}
}
#endif
1998-08-09 08:43:13 +08:00
FD_ZERO( &writefds );
FD_ZERO( &readfds );
at = 0;
ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
#ifdef FD_SET_MANUAL_COPY
for( s = 0; s < nfds; s++ ) {
if(FD_ISSET( &slap_sd_readers, s )) {
FD_SET( s, &readfds );
}
if(FD_ISSET( &slap_sd_writers, s )) {
FD_SET( s, &writefds );
1998-08-09 08:43:13 +08:00
}
}
#else
AC_MEMCPY( &readfds, &slap_daemon.sd_readers, sizeof(fd_set) );
AC_MEMCPY( &writefds, &slap_daemon.sd_writers, sizeof(fd_set) );
#endif
assert(!FD_ISSET(wake_sds[0], &readfds));
FD_SET( wake_sds[0], &readfds );
for ( l = 0; slap_listeners[l] != NULL; l++ ) {
if ( slap_listeners[l]->sl_sd == AC_SOCKET_INVALID )
continue;
if ( slap_listeners[l]->sl_is_mute )
FD_CLR( slap_listeners[l]->sl_sd, &readfds );
else
if (!FD_ISSET(slap_listeners[l]->sl_sd, &readfds))
FD_SET( slap_listeners[l]->sl_sd, &readfds );
1999-07-14 21:16:13 +08:00
}
#ifndef HAVE_WINSOCK
nfds = slap_daemon.sd_nfds;
#else
nfds = dtblsize;
#endif
if ( global_idletimeout && slap_daemon.sd_nactives )
at = 1;
ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
1998-08-09 08:43:13 +08:00
2003-06-07 07:52:06 +08:00
if ( at
#if defined(HAVE_YIELDING_SELECT) || defined(NO_THREADS)
&& ( tv.tv_sec || tv.tv_usec )
#endif
)
tvp = &tv;
else
tvp = NULL;
2003-05-08 06:29:26 +08:00
ldap_pvt_thread_mutex_lock( &syncrepl_rq.rq_mutex );
rtask = ldap_pvt_runqueue_next_sched( &syncrepl_rq, &cat );
2003-05-08 07:52:08 +08:00
while ( cat && cat->tv_sec && cat->tv_sec <= now ) {
if ( ldap_pvt_runqueue_isrunning( &syncrepl_rq, rtask )) {
ldap_pvt_runqueue_resched( &syncrepl_rq, rtask, 0 );
2003-05-08 07:52:08 +08:00
} else {
ldap_pvt_runqueue_runtask( &syncrepl_rq, rtask );
ldap_pvt_runqueue_resched( &syncrepl_rq, rtask, 0 );
2003-05-08 07:52:08 +08:00
ldap_pvt_thread_mutex_unlock( &syncrepl_rq.rq_mutex );
ldap_pvt_thread_pool_submit( &connection_pool,
rtask->routine, (void *) rtask );
2003-10-13 22:08:55 +08:00
ldap_pvt_thread_mutex_lock( &syncrepl_rq.rq_mutex );
2003-05-08 07:52:08 +08:00
}
rtask = ldap_pvt_runqueue_next_sched( &syncrepl_rq, &cat );
}
2003-05-08 06:29:26 +08:00
ldap_pvt_thread_mutex_unlock( &syncrepl_rq.rq_mutex );
2003-05-08 07:52:08 +08:00
if ( cat != NULL ) {
time_t diff = difftime( cat->tv_sec, now );
if ( diff == 0 )
diff = tdelta;
if ( tvp == NULL || diff < tv.tv_sec ) {
tv.tv_sec = diff;
tv.tv_usec = 0;
tvp = &tv;
}
}
for ( l = 0; slap_listeners[l] != NULL; l++ ) {
if ( slap_listeners[l]->sl_sd == AC_SOCKET_INVALID ||
slap_listeners[l]->sl_is_mute )
continue;
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, DETAIL1,
"slapd_daemon_task: select: listen=%d "
"active_threads=%d tvp=%s\n",
slap_listeners[l]->sl_sd, at, tvp == NULL ? "NULL" : "zero" );
2001-01-16 03:17:29 +08:00
#else
1999-07-14 21:16:13 +08:00
Debug( LDAP_DEBUG_CONNS,
"daemon: select: listen=%d active_threads=%d tvp=%s\n",
slap_listeners[l]->sl_sd, at,
tvp == NULL ? "NULL" : "zero" );
2001-01-16 03:17:29 +08:00
#endif
1999-07-14 21:16:13 +08:00
}
1998-08-09 08:43:13 +08:00
switch(ns = select( nfds, &readfds,
#ifdef HAVE_WINSOCK
/* don't pass empty fd_set */
( writefds.fd_count > 0 ? &writefds : NULL ),
#else
&writefds,
#endif
NULL, tvp ))
{
case -1: { /* failure - try again */
int err = sock_errno();
if( err == EBADF
#ifdef WSAENOTSOCK
/* you'd think this would be EBADF */
|| err == WSAENOTSOCK
#endif
) {
if (++ebadf < SLAPD_EBADF_LIMIT)
continue;
1999-06-11 05:11:21 +08:00
}
if( err != EINTR ) {
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, INFO,
"slapd_daemon_task: select failed (%d): %s\n",
err, sock_errstr(err), 0 );
2001-01-16 03:17:29 +08:00
#else
Debug( LDAP_DEBUG_CONNS,
"daemon: select failed (%d): %s\n",
err, sock_errstr(err), 0 );
2001-01-16 03:17:29 +08:00
#endif
slapd_shutdown = 2;
}
}
1998-08-09 08:43:13 +08:00
continue;
case 0: /* timeout - let threads run */
1999-06-11 05:11:21 +08:00
ebadf = 0;
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, DETAIL2,
"slapd_daemon_task: select timeout - yielding\n", 0, 0, 0 );
2001-01-16 03:17:29 +08:00
#else
Debug( LDAP_DEBUG_CONNS, "daemon: select timeout - yielding\n",
1998-08-09 08:43:13 +08:00
0, 0, 0 );
2001-01-16 03:17:29 +08:00
#endif
ldap_pvt_thread_yield();
1998-08-09 08:43:13 +08:00
continue;
default: /* something happened - deal with it */
if( slapd_shutdown ) continue;
1999-06-11 05:11:21 +08:00
ebadf = 0;
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, DETAIL2,
"slapd_daemon_task: activity on %d descriptors\n", ns, 0, 0 );
2001-01-16 03:17:29 +08:00
#else
Debug( LDAP_DEBUG_CONNS, "daemon: activity on %d descriptors\n",
ns, 0, 0 );
2001-01-16 03:17:29 +08:00
#endif
/* FALL THRU */
1998-08-09 08:43:13 +08:00
}
if( FD_ISSET( wake_sds[0], &readfds ) ) {
char c[BUFSIZ];
tcp_read( wake_sds[0], c, sizeof(c) );
#if defined(NO_THREADS) || defined(HAVE_GNU_PTH)
waking = 0;
#endif
continue;
}
for ( l = 0; slap_listeners[l] != NULL; l++ ) {
2000-10-18 08:35:09 +08:00
ber_socket_t s;
socklen_t len = sizeof(from);
long id;
2000-08-26 09:14:05 +08:00
slap_ssf_t ssf = 0;
char *authid = NULL;
#ifdef SLAPD_RLOOKUPS
char hbuf[NI_MAXHOST];
#endif
2001-11-18 00:18:07 +08:00
char *dnsname = NULL;
char *peeraddr = NULL;
#ifdef LDAP_PF_LOCAL
char peername[MAXPATHLEN + sizeof("PATH=")];
#elif defined(LDAP_PF_INET6)
char peername[sizeof("IP=ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff 65535")];
2000-06-09 07:12:52 +08:00
#else
1999-07-23 04:37:56 +08:00
char peername[sizeof("IP=255.255.255.255:65336")];
#endif /* LDAP_PF_LOCAL */
2000-06-09 07:12:52 +08:00
peername[0] = '\0';
if ( slap_listeners[l]->sl_sd == AC_SOCKET_INVALID )
continue;
if ( !FD_ISSET( slap_listeners[l]->sl_sd, &readfds ) )
1999-07-14 21:16:13 +08:00
continue;
#ifdef LDAP_CONNECTIONLESS
2002-09-17 05:50:55 +08:00
if ( slap_listeners[l]->sl_is_udp ) {
/* The first time we receive a query, we set this
* up as a "connection". It remains open for the life
* of the slapd.
*/
if ( slap_listeners[l]->sl_is_udp < 2 ) {
id = connection_init(
slap_listeners[l]->sl_sd,
slap_listeners[l], "", "",
CONN_IS_UDP, ssf, authid );
slap_listeners[l]->sl_is_udp++;
}
continue;
}
#endif
/* Don't need to look at this in the data loops */
FD_CLR( slap_listeners[l]->sl_sd, &readfds );
FD_CLR( slap_listeners[l]->sl_sd, &writefds );
s = accept( slap_listeners[l]->sl_sd,
(struct sockaddr *) &from, &len );
if ( s == AC_SOCKET_INVALID ) {
int err = sock_errno();
if(
#ifdef EMFILE
err == EMFILE ||
#endif
#ifdef ENFILE
err == ENFILE ||
#endif
0 )
2001-10-24 06:17:41 +08:00
{
ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
emfile++;
/* Stop listening until an existing session closes */
slap_listeners[l]->sl_is_mute = 1;
ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
2001-10-24 06:17:41 +08:00
}
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, ERR,
"slapd_daemon_task: accept(%ld) failed errno=%d (%s)\n",
(long)slap_listeners[l]->sl_sd,
err, sock_errstr(err) );
2001-01-16 03:17:29 +08:00
#else
Debug( LDAP_DEBUG_ANY,
"daemon: accept(%ld) failed errno=%d (%s)\n",
(long) slap_listeners[l]->sl_sd, err,
sock_errstr(err) );
#endif
2001-10-24 06:17:41 +08:00
ldap_pvt_thread_yield();
1998-08-09 08:43:13 +08:00
continue;
}
#ifndef HAVE_WINSOCK
/* make sure descriptor number isn't too great */
if ( s >= dtblsize ) {
2001-08-30 03:49:05 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, ERR,
2001-10-24 06:17:41 +08:00
"slapd_daemon_task: %ld beyond descriptor table size %ld\n",
(long)s, (long)dtblsize, 0 );
2001-01-16 03:17:29 +08:00
#else
Debug( LDAP_DEBUG_ANY,
"daemon: %ld beyond descriptor table size %ld\n",
(long) s, (long) dtblsize, 0 );
2001-01-16 03:17:29 +08:00
#endif
2001-10-24 06:17:41 +08:00
slapd_close(s);
ldap_pvt_thread_yield();
continue;
}
#endif
#ifdef LDAP_DEBUG
ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
/* newly accepted stream should not be in any of the FD SETS */
assert( !FD_ISSET( s, &slap_daemon.sd_actives) );
assert( !FD_ISSET( s, &slap_daemon.sd_readers) );
assert( !FD_ISSET( s, &slap_daemon.sd_writers) );
ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
#endif
#if defined( SO_KEEPALIVE ) || defined( TCP_NODELAY )
#ifdef LDAP_PF_LOCAL
/* for IPv4 and IPv6 sockets only */
if ( from.sa_addr.sa_family != AF_LOCAL )
#endif /* LDAP_PF_LOCAL */
{
int rc;
int tmp;
#ifdef SO_KEEPALIVE
/* enable keep alives */
tmp = 1;
rc = setsockopt( s, SOL_SOCKET, SO_KEEPALIVE,
(char *) &tmp, sizeof(tmp) );
if ( rc == AC_SOCKET_ERROR ) {
int err = sock_errno();
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, ERR,
"slapd_daemon_task: setsockopt( %ld, SO_KEEPALIVE)"
" failed errno=%d (%s)\n",
(long)s, err, sock_errstr(err) );
2001-01-16 03:17:29 +08:00
#else
Debug( LDAP_DEBUG_ANY,
"slapd(%ld): setsockopt(SO_KEEPALIVE) failed "
"errno=%d (%s)\n", (long) s, err, sock_errstr(err) );
2001-01-16 03:17:29 +08:00
#endif
}
#endif
#ifdef TCP_NODELAY
/* enable no delay */
tmp = 1;
rc = setsockopt( s, IPPROTO_TCP, TCP_NODELAY,
(char *)&tmp, sizeof(tmp) );
if ( rc == AC_SOCKET_ERROR ) {
int err = sock_errno();
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, ERR,
"slapd_daemon_task: setsockopt( %ld, "
"TCP_NODELAY) failed errno=%d (%s)\n",
(long)s, err, sock_errstr(err) );
2001-01-16 03:17:29 +08:00
#else
Debug( LDAP_DEBUG_ANY,
"slapd(%ld): setsockopt(TCP_NODELAY) failed "
"errno=%d (%s)\n", (long) s, err, sock_errstr(err) );
2001-01-16 03:17:29 +08:00
#endif
}
#endif
}
#endif
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, DETAIL1,
"slapd_daemon_task: new connection on %ld\n", (long)s, 0, 0 );
2001-01-16 03:17:29 +08:00
#else
Debug( LDAP_DEBUG_CONNS, "daemon: new connection on %ld\n",
(long) s, 0, 0 );
2001-01-16 03:17:29 +08:00
#endif
switch ( from.sa_addr.sa_family ) {
# ifdef LDAP_PF_LOCAL
case AF_LOCAL:
sprintf( peername, "PATH=%s", from.sa_un_addr.sun_path );
ssf = LDAP_PVT_SASL_LOCAL_SSF;
{
uid_t uid;
gid_t gid;
if( getpeereid( s, &uid, &gid ) == 0 ) {
authid = ch_malloc(
sizeof("uidnumber=4294967295+gidnumber=4294967295,"
"cn=peercred,cn=external,cn=auth"));
sprintf(authid, "uidnumber=%d+gidnumber=%d,"
"cn=peercred,cn=external,cn=auth",
2003-01-19 22:07:02 +08:00
(int) uid, (int) gid);
}
}
dnsname = "local";
break;
#endif /* LDAP_PF_LOCAL */
# ifdef LDAP_PF_INET6
case AF_INET6:
if ( IN6_IS_ADDR_V4MAPPED(&from.sa_in6_addr.sin6_addr) ) {
peeraddr = inet_ntoa( *((struct in_addr *)
&from.sa_in6_addr.sin6_addr.s6_addr[12]) );
sprintf( peername, "IP=%s:%d",
2002-10-27 02:51:24 +08:00
peeraddr != NULL ? peeraddr : SLAP_STRING_UNKNOWN,
(unsigned) ntohs( from.sa_in6_addr.sin6_port ) );
} else {
char addr[INET6_ADDRSTRLEN];
peeraddr = (char *) inet_ntop( AF_INET6,
&from.sa_in6_addr.sin6_addr,
addr, sizeof addr );
sprintf( peername, "IP=%s %d",
2002-10-27 02:51:24 +08:00
peeraddr != NULL ? peeraddr : SLAP_STRING_UNKNOWN,
(unsigned) ntohs( from.sa_in6_addr.sin6_port ) );
}
break;
# endif /* LDAP_PF_INET6 */
case AF_INET:
peeraddr = inet_ntoa( from.sa_in_addr.sin_addr );
1999-07-23 04:37:56 +08:00
sprintf( peername, "IP=%s:%d",
2002-10-27 02:51:24 +08:00
peeraddr != NULL ? peeraddr : SLAP_STRING_UNKNOWN,
(unsigned) ntohs( from.sa_in_addr.sin_port ) );
break;
1998-08-09 08:43:13 +08:00
default:
slapd_close(s);
continue;
}
if ( ( from.sa_addr.sa_family == AF_INET )
#ifdef LDAP_PF_INET6
|| ( from.sa_addr.sa_family == AF_INET6 )
#endif
) {
#ifdef SLAPD_RLOOKUPS
if ( use_reverse_lookup ) {
char *herr;
2003-03-11 20:25:39 +08:00
if (ldap_pvt_get_hname( (const struct sockaddr *)&from, len, hbuf,
sizeof(hbuf), &herr ) == 0) {
ldap_pvt_str2lower( hbuf );
dnsname = hbuf;
}
}
#else
dnsname = NULL;
#endif /* SLAPD_RLOOKUPS */
1998-10-25 09:41:42 +08:00
#ifdef HAVE_TCPD
if ( !hosts_ctl("slapd",
2002-10-27 02:51:24 +08:00
dnsname != NULL ? dnsname : SLAP_STRING_UNKNOWN,
peeraddr != NULL ? peeraddr : SLAP_STRING_UNKNOWN,
SLAP_STRING_UNKNOWN ))
{
/* DENY ACCESS */
Statslog( LDAP_DEBUG_STATS,
"fd=%ld DENIED from %s (%s)\n",
(long) s,
2002-10-27 02:51:24 +08:00
dnsname != NULL ? dnsname : SLAP_STRING_UNKNOWN,
peeraddr != NULL ? peeraddr : SLAP_STRING_UNKNOWN,
0, 0 );
slapd_close(s);
continue;
}
1998-10-25 09:41:42 +08:00
#endif /* HAVE_TCPD */
}
id = connection_init(s,
slap_listeners[l],
2002-10-27 02:51:24 +08:00
dnsname != NULL ? dnsname : SLAP_STRING_UNKNOWN,
1999-07-28 02:49:32 +08:00
peername,
#ifdef HAVE_TLS
slap_listeners[l]->sl_is_tls ? CONN_IS_TLS : 0,
#else
0,
#endif
ssf,
authid );
if( authid ) ch_free(authid);
if( id < 0 ) {
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, INFO,
"slapd_daemon_task: "
"connection_init(%ld, %s, %s) "
"failed.\n",
(long)s, peername,
slap_listeners[l]->sl_name.bv_val );
2001-01-16 03:17:29 +08:00
#else
Debug( LDAP_DEBUG_ANY,
"daemon: connection_init(%ld, %s, %s) "
"failed.\n",
(long) s,
peername,
slap_listeners[l]->sl_name.bv_val );
2001-01-16 03:17:29 +08:00
#endif
slapd_close(s);
continue;
}
Statslog( LDAP_DEBUG_STATS,
2002-12-20 12:08:06 +08:00
"conn=%ld fd=%ld ACCEPT from %s (%s)\n",
id, (long) s,
peername,
slap_listeners[l]->sl_name.bv_val,
0 );
slapd_add( s, 1 );
continue;
1998-08-09 08:43:13 +08:00
}
#ifdef LDAP_DEBUG
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, DETAIL2,
"slapd_daemon_task: activity on ", 0, 0, 0 );
2001-01-16 03:17:29 +08:00
#else
Debug( LDAP_DEBUG_CONNS, "daemon: activity on:", 0, 0, 0 );
2001-01-16 03:17:29 +08:00
#endif
1999-04-02 00:32:11 +08:00
#ifdef HAVE_WINSOCK
for ( i = 0; i < readfds.fd_count; i++ ) {
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, DETAIL2,
" %d%s", readfds.fd_array[i], "r", 0, 0 );
2001-01-16 03:17:29 +08:00
#else
Debug( LDAP_DEBUG_CONNS, " %d%s",
readfds.fd_array[i], "r", 0 );
2001-01-16 03:17:29 +08:00
#endif
1999-04-02 00:32:11 +08:00
}
for ( i = 0; i < writefds.fd_count; i++ ) {
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, DETAIL2,
" %d%s", writefds.fd_array[i], "w" , 0 );
2001-01-16 03:17:29 +08:00
#else
Debug( LDAP_DEBUG_CONNS, " %d%s",
writefds.fd_array[i], "w", 0 );
2001-01-16 03:17:29 +08:00
#endif
1999-04-02 00:32:11 +08:00
}
2001-01-16 03:17:29 +08:00
1999-04-02 00:32:11 +08:00
#else
for ( i = 0; i < nfds; i++ ) {
int r, w;
1998-08-09 08:43:13 +08:00
r = FD_ISSET( i, &readfds );
w = FD_ISSET( i, &writefds );
1999-07-14 21:16:13 +08:00
if ( r || w ) {
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, DETAIL2,
" %d%s%s", i, r ? "r" : "", w ? "w" : "" );
2001-01-16 03:17:29 +08:00
#else
1998-08-09 08:43:13 +08:00
Debug( LDAP_DEBUG_CONNS, " %d%s%s", i,
r ? "r" : "", w ? "w" : "" );
2001-01-16 03:17:29 +08:00
#endif
1998-08-09 08:43:13 +08:00
}
}
1999-04-02 00:32:11 +08:00
#endif
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, DETAIL2, "\n", 0, 0, 0 );
2001-01-16 03:17:29 +08:00
#else
1998-08-09 08:43:13 +08:00
Debug( LDAP_DEBUG_CONNS, "\n", 0, 0, 0 );
2001-01-16 03:17:29 +08:00
#endif
#endif
1998-08-09 08:43:13 +08:00
/* loop through the writers */
1999-04-02 00:32:11 +08:00
#ifdef HAVE_WINSOCK
for ( i = 0; i < writefds.fd_count; i++ )
#else
for ( i = 0; i < nfds; i++ )
#endif
{
ber_socket_t wd;
#ifdef HAVE_WINSOCK
wd = writefds.fd_array[i];
#else
if( ! FD_ISSET( i, &writefds ) ) {
continue;
}
wd = i;
#endif
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, DETAIL2,
"slapd_daemon_task: write active on %d\n", wd, 0, 0 );
2001-01-16 03:17:29 +08:00
#else
1999-04-02 00:32:11 +08:00
Debug( LDAP_DEBUG_CONNS,
"daemon: write active on %d\n",
wd, 0, 0 );
2001-01-16 03:17:29 +08:00
#endif
/*
* NOTE: it is possible that the connection was closed
* and that the stream is now inactive.
* connection_write() must valid the stream is still
* active.
*/
if ( connection_write( wd ) < 0 ) {
Vienna Bulk Commit This commit includes many changes. All changes compile under NT but have not been tested under UNIX. A Summary of changes (likely incomplete): NT changes: Removed lint. Clean up configuration support for "Debug", "Release", "SDebug", and "SRelease" configurations. Share output directories for clients, libraries, and slapd. (maybe they should be combined further and moved to build/{,S}{Debug,Release}). Enable threading when _MT is defined. Enable debuging when _DEBUG is defined. Disable setting of NDEBUG under Release/SRelease. Asserts are disabled in <ac/assert.h> when LDAP_DEBUG is not defined. Added 'build/main.dsp' Master project. Removed non-slapd projects from slapd.dsp (see main.dsp). Removed replaced many uses of _WIN32 macro with feature based macros. ldap_cdefs.h changes #define LDAP_CONST const (see below) #define LDAP_F(type) LDAP_F_PRE type LDAP_F_POST To allow specifiers to be added before and after the type declaration. (For DLL handling) LBER/LDAP changes Namespace changes: s/lber_/ber_/ for here and there. s/NAME_ERROR/LDAP_NAME_ERROR/g Deleted NULLMSG and other NULL* macros for namespace reasons. "const" libraries. Installed headers (ie: lber.h, ldap.h) use LDAP_CONST macro. Normally set to 'const' when __STDC__. Can be set externally to enable/disable 'constification' of external interface. Internal interface always uses 'const'. Did not fix warnings in -lldif (in lieu of new LDIF parser). Added _ext API implementations (excepting search and bind). Need to implement ldap_int_get_controls() for reponses with controls. Added numberous assert() checks. LDAP_R _MT defines HAVE_NT_THREADS Added numberous assert() checks. Changed ldap_pthread_t back to unsigned long. Used cast to HANDLE in _join(). LDBM Replaced _WIN32 with HAVE_SYSLOG ud Added version string if MKVERSION is not defined. (MKVERSION needs to be set under UNIX). slapd Made connection sockbuf field a pointer to a sockbuf. This removed slap.h dependency on lber-int.h. lber-int.h now only included by those files needing to mess with the sockbuf. Used ber_* functions/macros to access sockbuf internals whenever possible. Added version string if MKVERSION is not defined. (MKVERSION needs to be set under UNIX). Removed FD_SET unsigned lint slapd/tools Used EXEEXT to added ".exe" to routines. Need to define EXEEXT under UNIX. ldappasswd Added ldappasswd.dsp. Ported to NT. Used getpid() to seed rand(). nt_debug Minor cleanup. Added "portable.h" include and used <ac/*.h> where appropriate. Added const to char* format argument.
1999-05-19 09:12:33 +08:00
FD_CLR( (unsigned) wd, &readfds );
slapd_close( wd );
1999-04-02 00:32:11 +08:00
}
}
#ifdef HAVE_WINSOCK
for ( i = 0; i < readfds.fd_count; i++ )
1999-04-02 00:32:11 +08:00
#else
for ( i = 0; i < nfds; i++ )
#endif
{
ber_socket_t rd;
#ifdef HAVE_WINSOCK
rd = readfds.fd_array[i];
#else
if( ! FD_ISSET( i, &readfds ) ) {
1998-08-09 08:43:13 +08:00
continue;
}
rd = i;
1999-04-02 00:32:11 +08:00
#endif
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, DETAIL2,
"slapd_daemon_task: read activity on %d\n", rd, 0, 0 );
2001-01-16 03:17:29 +08:00
#else
1999-04-02 00:32:11 +08:00
Debug ( LDAP_DEBUG_CONNS,
"daemon: read activity on %d\n", rd, 0, 0 );
2001-01-16 03:17:29 +08:00
#endif
/*
* NOTE: it is possible that the connection was closed
* and that the stream is now inactive.
* connection_read() must valid the stream is still
* active.
*/
1998-08-09 08:43:13 +08:00
if ( connection_read( rd ) < 0 ) {
slapd_close( rd );
1998-08-09 08:43:13 +08:00
}
}
ldap_pvt_thread_yield();
1998-08-09 08:43:13 +08:00
}
if( slapd_shutdown == 1 ) {
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, CRIT,
"slapd_daemon_task: shutdown requested and initiated.\n", 0, 0, 0 );
2001-01-16 03:17:29 +08:00
#else
Debug( LDAP_DEBUG_TRACE,
"daemon: shutdown requested and initiated.\n",
0, 0, 0 );
2001-01-16 03:17:29 +08:00
#endif
} else if ( slapd_shutdown == 2 ) {
#ifdef HAVE_NT_SERVICE_MANAGER
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, CRIT,
"slapd_daemon_task: shutdown initiated by Service Manager.\n",
0, 0, 0);
2001-01-16 03:17:29 +08:00
#else
2001-01-18 00:35:53 +08:00
Debug( LDAP_DEBUG_TRACE,
"daemon: shutdown initiated by Service Manager.\n",
0, 0, 0);
2001-01-16 03:17:29 +08:00
#endif
#else /* !HAVE_NT_SERVICE_MANAGER */
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, CRIT,
"slapd_daemon_task: abnormal condition, "
"shutdown initiated.\n", 0, 0, 0 );
2001-01-16 03:17:29 +08:00
#else
2001-01-18 00:35:53 +08:00
Debug( LDAP_DEBUG_TRACE,
"daemon: abnormal condition, shutdown initiated.\n",
0, 0, 0 );
2001-01-16 03:17:29 +08:00
#endif
#endif /* !HAVE_NT_SERVICE_MANAGER */
} else {
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, CRIT,
"slapd_daemon_task: no active streams, shutdown initiated.\n",
0, 0, 0 );
2001-01-16 03:17:29 +08:00
#else
Debug( LDAP_DEBUG_TRACE,
2001-01-18 00:35:53 +08:00
"daemon: no active streams, shutdown initiated.\n",
0, 0, 0 );
2001-01-16 03:17:29 +08:00
#endif
}
if( slapd_gentle_shutdown != 2 ) {
2002-06-04 00:47:43 +08:00
close_listeners ( 0 );
}
free ( slap_listeners );
slap_listeners = NULL;
if( !slapd_gentle_shutdown ) {
slapd_abrupt_shutdown = 1;
connections_shutdown();
}
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, CRIT,
"slapd_daemon_task: shutdown waiting for %d threads to terminate.\n",
ldap_pvt_thread_pool_backload(&connection_pool), 0, 0 );
2001-01-16 03:17:29 +08:00
#else
1998-08-09 08:43:13 +08:00
Debug( LDAP_DEBUG_ANY,
"slapd shutdown: waiting for %d threads to terminate\n",
ldap_pvt_thread_pool_backload(&connection_pool), 0, 0 );
2001-01-16 03:17:29 +08:00
#endif
ldap_pvt_thread_pool_destroy(&connection_pool, 1);
1998-08-09 08:43:13 +08:00
return NULL;
1998-08-09 08:43:13 +08:00
}
int slapd_daemon( void )
{
int rc;
connections_init();
#define SLAPD_LISTENER_THREAD 1
#if defined( SLAPD_LISTENER_THREAD )
{
ldap_pvt_thread_t listener_tid;
/* listener as a separate THREAD */
rc = ldap_pvt_thread_create( &listener_tid,
0, slapd_daemon_task, NULL );
if ( rc != 0 ) {
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, ERR,
"slapd_daemon: listener ldap_pvt_thread_create failed (%d).\n",
rc, 0, 0 );
2001-01-16 03:17:29 +08:00
#else
Debug( LDAP_DEBUG_ANY,
2001-01-18 00:35:53 +08:00
"listener ldap_pvt_thread_create failed (%d)\n", rc, 0, 0 );
2001-01-16 03:17:29 +08:00
#endif
return rc;
}
/* wait for the listener thread to complete */
ldap_pvt_thread_join( listener_tid, (void *) NULL );
2001-01-18 00:35:53 +08:00
}
#else
/* experimental code */
slapd_daemon_task( NULL );
#endif
return 0;
}
int sockinit(void)
{
#if defined( HAVE_WINSOCK2 )
WORD wVersionRequested;
WSADATA wsaData;
int err;
wVersionRequested = MAKEWORD( 2, 0 );
err = WSAStartup( wVersionRequested, &wsaData );
if ( err != 0 ) {
/* Tell the user that we couldn't find a usable */
2001-01-18 00:35:53 +08:00
/* WinSock DLL. */
return -1;
}
/* Confirm that the WinSock DLL supports 2.0.*/
/* Note that if the DLL supports versions greater */
/* than 2.0 in addition to 2.0, it will still return */
2001-01-18 00:35:53 +08:00
/* 2.0 in wVersion since that is the version we */
/* requested. */
if ( LOBYTE( wsaData.wVersion ) != 2 ||
HIBYTE( wsaData.wVersion ) != 0 )
{
/* Tell the user that we couldn't find a usable */
2001-01-18 00:35:53 +08:00
/* WinSock DLL. */
WSACleanup();
return -1;
}
/* The WinSock DLL is acceptable. Proceed. */
#elif defined( HAVE_WINSOCK )
WSADATA wsaData;
if ( WSAStartup( 0x0101, &wsaData ) != 0 ) {
return -1;
}
#endif
return 0;
}
int sockdestroy(void)
{
#if defined( HAVE_WINSOCK2 ) || defined( HAVE_WINSOCK )
WSACleanup();
#endif
return 0;
}
RETSIGTYPE
slap_sig_shutdown( int sig )
1998-08-09 08:43:13 +08:00
{
#if 0
2001-01-16 03:17:29 +08:00
#ifdef NEW_LOGGING
LDAP_LOG( CONNECTION, CRIT,
"slap_sig_shutdown: signal %d\n", sig, 0, 0 );
2001-01-16 03:17:29 +08:00
#else
Debug(LDAP_DEBUG_TRACE, "slap_sig_shutdown: signal %d\n", sig, 0, 0);
#endif
2001-01-16 03:17:29 +08:00
#endif
/*
* If the NT Service Manager is controlling the server, we don't
* want SIGBREAK to kill the server. For some strange reason,
* SIGBREAK is generated when a user logs out.
*/
#if HAVE_NT_SERVICE_MANAGER && SIGBREAK
if (is_NT_Service && sig == SIGBREAK)
2003-10-15 20:16:35 +08:00
;
else
2002-06-04 00:47:43 +08:00
#endif
#ifdef SIGHUP
if (sig == SIGHUP && global_gentlehup && slapd_gentle_shutdown == 0)
slapd_gentle_shutdown = 1;
else
#endif
slapd_shutdown = 1;
WAKE_LISTENER(1);
/* reinstall self */
(void) SIGNAL_REINSTALL( sig, slap_sig_shutdown );
1998-08-09 08:43:13 +08:00
}
RETSIGTYPE
slap_sig_wake( int sig )
1998-08-09 08:43:13 +08:00
{
WAKE_LISTENER(1);
/* reinstall self */
(void) SIGNAL_REINSTALL( sig, slap_sig_wake );
1998-08-09 08:43:13 +08:00
}
2000-09-22 01:32:54 +08:00
void slapd_add_internal(ber_socket_t s, int isactive) {
slapd_add(s, isactive);
2000-09-22 01:32:54 +08:00
}
2002-01-11 19:43:35 +08:00
Listener ** slapd_get_listeners(void) {
return slap_listeners;
}