1999-05-26 10:35:20 +08:00
|
|
|
/* init.c - initialize ldap backend */
|
1999-09-09 03:06:24 +08:00
|
|
|
/* $OpenLDAP$ */
|
2003-11-27 14:35:14 +08:00
|
|
|
/* This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
|
|
|
*
|
2005-01-02 04:49:32 +08:00
|
|
|
* Copyright 2003-2005 The OpenLDAP Foundation.
|
2003-12-09 01:41:40 +08:00
|
|
|
* Portions Copyright 1999-2003 Howard Chu.
|
|
|
|
* Portions Copyright 2000-2003 Pierangelo Masarati.
|
2003-11-27 14:35:14 +08:00
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted only as authorized by the OpenLDAP
|
|
|
|
* Public License.
|
|
|
|
*
|
|
|
|
* A copy of this license is available in the file LICENSE in the
|
|
|
|
* top-level directory of the distribution or, alternatively, at
|
|
|
|
* <http://www.OpenLDAP.org/license.html>.
|
|
|
|
*/
|
|
|
|
/* ACKNOWLEDGEMENTS:
|
|
|
|
* This work was initially developed by the Howard Chu for inclusion
|
|
|
|
* in OpenLDAP Software and subsequently enhanced by Pierangelo
|
|
|
|
* Masarati.
|
2001-01-17 15:09:22 +08:00
|
|
|
*/
|
1999-05-26 10:35:20 +08:00
|
|
|
|
|
|
|
#include "portable.h"
|
|
|
|
|
|
|
|
#include <stdio.h>
|
|
|
|
|
2003-04-29 23:02:01 +08:00
|
|
|
#include <ac/string.h>
|
1999-05-26 10:35:20 +08:00
|
|
|
#include <ac/socket.h>
|
|
|
|
|
|
|
|
#include "slap.h"
|
|
|
|
#include "back-ldap.h"
|
|
|
|
|
2004-11-10 17:45:02 +08:00
|
|
|
int
|
2004-11-13 22:43:30 +08:00
|
|
|
ldap_back_open( BackendInfo *bi )
|
2004-08-19 20:10:22 +08:00
|
|
|
{
|
2004-10-06 13:51:38 +08:00
|
|
|
bi->bi_controls = slap_known_controls;
|
2004-08-19 20:10:22 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
1999-05-26 10:35:20 +08:00
|
|
|
int
|
2004-11-13 22:43:30 +08:00
|
|
|
ldap_back_initialize( BackendInfo *bi )
|
1999-05-26 10:35:20 +08:00
|
|
|
{
|
2004-08-19 20:10:22 +08:00
|
|
|
bi->bi_open = ldap_back_open;
|
1999-05-26 10:35:20 +08:00
|
|
|
bi->bi_config = 0;
|
|
|
|
bi->bi_close = 0;
|
|
|
|
bi->bi_destroy = 0;
|
|
|
|
|
|
|
|
bi->bi_db_init = ldap_back_db_init;
|
2005-05-22 03:07:14 +08:00
|
|
|
bi->bi_db_config = config_generic_wrapper;
|
2004-06-21 08:57:12 +08:00
|
|
|
bi->bi_db_open = ldap_back_db_open;
|
1999-05-26 10:35:20 +08:00
|
|
|
bi->bi_db_close = 0;
|
|
|
|
bi->bi_db_destroy = ldap_back_db_destroy;
|
|
|
|
|
|
|
|
bi->bi_op_bind = ldap_back_bind;
|
1999-07-26 06:16:01 +08:00
|
|
|
bi->bi_op_unbind = 0;
|
1999-05-26 10:35:20 +08:00
|
|
|
bi->bi_op_search = ldap_back_search;
|
|
|
|
bi->bi_op_compare = ldap_back_compare;
|
|
|
|
bi->bi_op_modify = ldap_back_modify;
|
|
|
|
bi->bi_op_modrdn = ldap_back_modrdn;
|
|
|
|
bi->bi_op_add = ldap_back_add;
|
|
|
|
bi->bi_op_delete = ldap_back_delete;
|
|
|
|
bi->bi_op_abandon = 0;
|
|
|
|
|
2003-02-16 17:22:44 +08:00
|
|
|
bi->bi_extended = ldap_back_extended;
|
1999-12-08 12:37:59 +08:00
|
|
|
|
2000-06-16 09:46:42 +08:00
|
|
|
bi->bi_chk_referrals = 0;
|
2003-03-26 19:50:03 +08:00
|
|
|
bi->bi_entry_get_rw = ldap_back_entry_get;
|
1999-05-26 10:35:20 +08:00
|
|
|
|
1999-06-23 20:31:35 +08:00
|
|
|
bi->bi_connection_init = 0;
|
1999-07-26 06:16:01 +08:00
|
|
|
bi->bi_connection_destroy = ldap_back_conn_destroy;
|
1999-06-23 20:31:35 +08:00
|
|
|
|
2005-05-22 03:07:14 +08:00
|
|
|
if ( chain_init() ) {
|
2005-01-10 05:26:32 +08:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2005-05-22 03:07:14 +08:00
|
|
|
return ldap_back_init_cf( bi );
|
1999-05-26 10:35:20 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2004-11-13 22:43:30 +08:00
|
|
|
ldap_back_db_init( Backend *be )
|
1999-05-26 10:35:20 +08:00
|
|
|
{
|
|
|
|
struct ldapinfo *li;
|
|
|
|
|
2004-11-13 22:43:30 +08:00
|
|
|
li = (struct ldapinfo *)ch_calloc( 1, sizeof( struct ldapinfo ) );
|
2001-05-12 08:51:28 +08:00
|
|
|
if ( li == NULL ) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2005-04-11 07:44:06 +08:00
|
|
|
BER_BVZERO( &li->acl_authcID );
|
2004-05-23 01:26:02 +08:00
|
|
|
BER_BVZERO( &li->acl_authcDN );
|
|
|
|
BER_BVZERO( &li->acl_passwd );
|
2003-04-04 05:35:27 +08:00
|
|
|
|
2005-05-23 15:25:00 +08:00
|
|
|
li->acl_authmethod = LDAP_AUTH_NONE;
|
2005-04-11 07:44:06 +08:00
|
|
|
BER_BVZERO( &li->acl_sasl_mech );
|
2005-05-23 15:25:00 +08:00
|
|
|
li->acl_sb.sb_tls = SB_TLS_DEFAULT;
|
2005-04-11 07:44:06 +08:00
|
|
|
|
2004-05-14 18:01:22 +08:00
|
|
|
li->idassert_mode = LDAP_BACK_IDASSERT_LEGACY;
|
2004-05-15 18:11:10 +08:00
|
|
|
|
|
|
|
BER_BVZERO( &li->idassert_authcID );
|
|
|
|
BER_BVZERO( &li->idassert_authcDN );
|
|
|
|
BER_BVZERO( &li->idassert_passwd );
|
|
|
|
|
|
|
|
BER_BVZERO( &li->idassert_authzID );
|
|
|
|
|
2005-05-23 15:25:00 +08:00
|
|
|
li->idassert_authmethod = LDAP_AUTH_NONE;
|
2004-05-15 18:11:10 +08:00
|
|
|
BER_BVZERO( &li->idassert_sasl_mech );
|
2005-05-23 15:25:00 +08:00
|
|
|
li->idassert_sb.sb_tls = SB_TLS_DEFAULT;
|
2004-06-20 02:18:26 +08:00
|
|
|
|
2004-06-21 06:42:36 +08:00
|
|
|
/* by default, use proxyAuthz control on each operation */
|
2004-06-20 02:18:26 +08:00
|
|
|
li->idassert_flags = LDAP_BACK_AUTH_NONE;
|
2003-12-13 18:57:42 +08:00
|
|
|
|
2005-04-11 07:44:06 +08:00
|
|
|
li->idassert_authz = NULL;
|
|
|
|
|
2005-01-31 06:56:59 +08:00
|
|
|
/* initialize flags */
|
|
|
|
li->flags = LDAP_BACK_F_CHASE_REFERRALS;
|
|
|
|
|
2005-05-05 08:07:17 +08:00
|
|
|
/* initialize version */
|
|
|
|
li->version = LDAP_VERSION3;
|
|
|
|
|
1999-05-26 10:35:20 +08:00
|
|
|
ldap_pvt_thread_mutex_init( &li->conn_mutex );
|
|
|
|
|
|
|
|
be->be_private = li;
|
2004-11-13 22:43:30 +08:00
|
|
|
SLAP_DBFLAGS( be ) |= SLAP_DBFLAG_NOLASTMOD;
|
1999-05-26 10:35:20 +08:00
|
|
|
|
2005-05-22 03:07:14 +08:00
|
|
|
be->be_cf_ocs = be->bd_info->bi_cf_ocs;
|
|
|
|
|
2001-05-12 08:51:28 +08:00
|
|
|
return 0;
|
1999-05-26 10:35:20 +08:00
|
|
|
}
|
|
|
|
|
2004-06-21 08:57:12 +08:00
|
|
|
int
|
|
|
|
ldap_back_db_open( BackendDB *be )
|
|
|
|
{
|
|
|
|
struct ldapinfo *li = (struct ldapinfo *)be->be_private;
|
|
|
|
|
2004-07-24 19:17:03 +08:00
|
|
|
Debug( LDAP_DEBUG_TRACE,
|
2004-12-09 03:11:27 +08:00
|
|
|
"ldap_back_db_open: URI=%s\n",
|
|
|
|
li->url != NULL ? li->url : "", 0, 0 );
|
2004-07-24 19:17:03 +08:00
|
|
|
|
2004-06-21 08:57:12 +08:00
|
|
|
/* by default, use proxyAuthz control on each operation */
|
|
|
|
switch ( li->idassert_mode ) {
|
|
|
|
case LDAP_BACK_IDASSERT_LEGACY:
|
|
|
|
case LDAP_BACK_IDASSERT_SELF:
|
|
|
|
/* however, since admin connections are pooled and shared,
|
|
|
|
* only static authzIDs can be native */
|
|
|
|
li->idassert_flags &= ~LDAP_BACK_AUTH_NATIVE_AUTHZ;
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2004-11-14 01:20:24 +08:00
|
|
|
#if 0 && defined(SLAPD_MONITOR)
|
2004-11-13 22:43:30 +08:00
|
|
|
{
|
2005-01-20 17:04:37 +08:00
|
|
|
/* FIXME: disabled because namingContexts doesn't have
|
|
|
|
* a matching rule, and using an MRA filter doesn't work
|
|
|
|
* because the normalized assertion is compared to the
|
2005-01-24 17:38:11 +08:00
|
|
|
* non-normalized value, which in general differs from
|
|
|
|
* the normalized one. See ITS#3406 */
|
2004-11-13 22:43:30 +08:00
|
|
|
struct berval filter,
|
2005-01-24 17:38:11 +08:00
|
|
|
base = BER_BVC( "cn=Databases," SLAPD_MONITOR );
|
2004-11-13 22:43:30 +08:00
|
|
|
struct berval vals[ 2 ];
|
|
|
|
Attribute a = { 0 };
|
|
|
|
|
2004-11-15 22:17:08 +08:00
|
|
|
filter.bv_len = STRLENOF( "(&(namingContexts:distinguishedNameMatch:=)(monitoredInfo=ldap))" )
|
2004-11-13 22:43:30 +08:00
|
|
|
+ be->be_nsuffix[ 0 ].bv_len;
|
|
|
|
filter.bv_val = ch_malloc( filter.bv_len + 1 );
|
|
|
|
snprintf( filter.bv_val, filter.bv_len + 1,
|
2004-11-15 22:17:08 +08:00
|
|
|
"(&(namingContexts:distinguishedNameMatch:=%s)(monitoredInfo=ldap))",
|
2004-11-13 22:43:30 +08:00
|
|
|
be->be_nsuffix[ 0 ].bv_val );
|
|
|
|
|
|
|
|
a.a_desc = slap_schema.si_ad_labeledURI;
|
|
|
|
ber_str2bv( li->url, 0, 0, &vals[ 0 ] );
|
|
|
|
BER_BVZERO( &vals[ 1 ] );
|
|
|
|
a.a_vals = vals;
|
|
|
|
a.a_nvals = vals;
|
|
|
|
if ( monitor_back_register_entry_attrs( NULL, &a, NULL, &base, LDAP_SCOPE_SUBTREE, &filter ) ) {
|
|
|
|
/* error */
|
|
|
|
}
|
2004-11-15 22:17:08 +08:00
|
|
|
|
|
|
|
ch_free( filter.bv_val );
|
2004-11-13 22:43:30 +08:00
|
|
|
}
|
|
|
|
#endif /* SLAPD_MONITOR */
|
|
|
|
|
2005-05-05 08:07:17 +08:00
|
|
|
if ( li->flags & LDAP_BACK_F_SUPPORT_T_F_DISCOVER ) {
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
li->flags &= ~LDAP_BACK_F_SUPPORT_T_F_DISCOVER;
|
|
|
|
|
2005-05-05 08:22:43 +08:00
|
|
|
rc = slap_discover_feature( li->url, li->version,
|
|
|
|
slap_schema.si_ad_supportedFeatures->ad_cname.bv_val,
|
|
|
|
LDAP_FEATURE_ABSOLUTE_FILTERS );
|
2005-05-05 08:07:17 +08:00
|
|
|
if ( rc == LDAP_COMPARE_TRUE ) {
|
|
|
|
li->flags |= LDAP_BACK_F_SUPPORT_T_F;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2004-06-21 08:57:12 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2003-02-14 07:29:56 +08:00
|
|
|
void
|
2004-11-13 22:43:30 +08:00
|
|
|
ldap_back_conn_free( void *v_lc )
|
2001-01-20 05:27:20 +08:00
|
|
|
{
|
2004-11-13 22:43:30 +08:00
|
|
|
struct ldapconn *lc = v_lc;
|
|
|
|
|
|
|
|
ldap_unbind_ext_s( lc->lc_ld, NULL, NULL );
|
|
|
|
if ( !BER_BVISNULL( &lc->lc_bound_ndn ) ) {
|
|
|
|
ch_free( lc->lc_bound_ndn.bv_val );
|
2002-01-13 01:35:01 +08:00
|
|
|
}
|
2004-11-13 22:43:30 +08:00
|
|
|
if ( !BER_BVISNULL( &lc->lc_cred ) ) {
|
|
|
|
memset( lc->lc_cred.bv_val, 0, lc->lc_cred.bv_len );
|
|
|
|
ch_free( lc->lc_cred.bv_val );
|
2002-04-25 10:05:34 +08:00
|
|
|
}
|
2004-11-13 22:43:30 +08:00
|
|
|
if ( !BER_BVISNULL( &lc->lc_local_ndn ) ) {
|
|
|
|
ch_free( lc->lc_local_ndn.bv_val );
|
2003-02-14 07:29:56 +08:00
|
|
|
}
|
|
|
|
ldap_pvt_thread_mutex_destroy( &lc->lc_mutex );
|
2002-01-13 01:35:01 +08:00
|
|
|
ch_free( lc );
|
2001-01-20 05:27:20 +08:00
|
|
|
}
|
|
|
|
|
1999-05-26 10:35:20 +08:00
|
|
|
int
|
|
|
|
ldap_back_db_destroy(
|
|
|
|
Backend *be
|
|
|
|
)
|
|
|
|
{
|
|
|
|
struct ldapinfo *li;
|
|
|
|
|
2004-11-13 22:43:30 +08:00
|
|
|
if ( be->be_private ) {
|
|
|
|
li = ( struct ldapinfo * )be->be_private;
|
2001-01-20 05:27:20 +08:00
|
|
|
|
|
|
|
ldap_pvt_thread_mutex_lock( &li->conn_mutex );
|
|
|
|
|
2004-12-09 03:11:27 +08:00
|
|
|
if ( li->url != NULL ) {
|
2004-11-13 22:43:30 +08:00
|
|
|
ch_free( li->url );
|
2000-06-05 12:59:26 +08:00
|
|
|
li->url = NULL;
|
|
|
|
}
|
2004-04-06 01:36:53 +08:00
|
|
|
if ( li->lud ) {
|
|
|
|
ldap_free_urldesc( li->lud );
|
|
|
|
li->lud = NULL;
|
|
|
|
}
|
2005-04-11 07:44:06 +08:00
|
|
|
if ( !BER_BVISNULL( &li->acl_authcID ) ) {
|
|
|
|
ch_free( li->acl_authcID.bv_val );
|
|
|
|
BER_BVZERO( &li->acl_authcID );
|
|
|
|
}
|
2004-05-23 01:26:02 +08:00
|
|
|
if ( !BER_BVISNULL( &li->acl_authcDN ) ) {
|
|
|
|
ch_free( li->acl_authcDN.bv_val );
|
|
|
|
BER_BVZERO( &li->acl_authcDN );
|
2000-06-05 12:59:26 +08:00
|
|
|
}
|
2004-05-23 01:26:02 +08:00
|
|
|
if ( !BER_BVISNULL( &li->acl_passwd ) ) {
|
|
|
|
ch_free( li->acl_passwd.bv_val );
|
|
|
|
BER_BVZERO( &li->acl_passwd );
|
1999-05-26 10:35:20 +08:00
|
|
|
}
|
2005-04-11 07:44:06 +08:00
|
|
|
if ( !BER_BVISNULL( &li->acl_sasl_mech ) ) {
|
|
|
|
ch_free( li->acl_sasl_mech.bv_val );
|
|
|
|
BER_BVZERO( &li->acl_sasl_mech );
|
|
|
|
}
|
|
|
|
if ( !BER_BVISNULL( &li->acl_sasl_realm ) ) {
|
|
|
|
ch_free( li->acl_sasl_realm.bv_val );
|
|
|
|
BER_BVZERO( &li->acl_sasl_realm );
|
|
|
|
}
|
2004-05-15 18:11:10 +08:00
|
|
|
if ( !BER_BVISNULL( &li->idassert_authcID ) ) {
|
|
|
|
ch_free( li->idassert_authcID.bv_val );
|
|
|
|
BER_BVZERO( &li->idassert_authcID );
|
|
|
|
}
|
|
|
|
if ( !BER_BVISNULL( &li->idassert_authcDN ) ) {
|
|
|
|
ch_free( li->idassert_authcDN.bv_val );
|
|
|
|
BER_BVZERO( &li->idassert_authcDN );
|
|
|
|
}
|
|
|
|
if ( !BER_BVISNULL( &li->idassert_passwd ) ) {
|
|
|
|
ch_free( li->idassert_passwd.bv_val );
|
|
|
|
BER_BVZERO( &li->idassert_passwd );
|
|
|
|
}
|
|
|
|
if ( !BER_BVISNULL( &li->idassert_authzID ) ) {
|
|
|
|
ch_free( li->idassert_authzID.bv_val );
|
|
|
|
BER_BVZERO( &li->idassert_authzID );
|
2004-05-14 04:25:53 +08:00
|
|
|
}
|
2004-05-15 18:11:10 +08:00
|
|
|
if ( !BER_BVISNULL( &li->idassert_sasl_mech ) ) {
|
|
|
|
ch_free( li->idassert_sasl_mech.bv_val );
|
|
|
|
BER_BVZERO( &li->idassert_sasl_mech );
|
2003-12-13 18:57:42 +08:00
|
|
|
}
|
2004-05-15 18:11:10 +08:00
|
|
|
if ( !BER_BVISNULL( &li->idassert_sasl_realm ) ) {
|
|
|
|
ch_free( li->idassert_sasl_realm.bv_val );
|
|
|
|
BER_BVZERO( &li->idassert_sasl_realm );
|
2003-12-13 18:57:42 +08:00
|
|
|
}
|
2004-11-13 22:43:30 +08:00
|
|
|
if ( li->conntree ) {
|
2003-02-14 07:29:56 +08:00
|
|
|
avl_free( li->conntree, ldap_back_conn_free );
|
2001-01-20 05:27:20 +08:00
|
|
|
}
|
2004-11-13 22:43:30 +08:00
|
|
|
|
2001-01-20 05:27:20 +08:00
|
|
|
ldap_pvt_thread_mutex_unlock( &li->conn_mutex );
|
1999-05-26 10:35:20 +08:00
|
|
|
ldap_pvt_thread_mutex_destroy( &li->conn_mutex );
|
|
|
|
}
|
|
|
|
|
2002-01-13 01:35:01 +08:00
|
|
|
ch_free( be->be_private );
|
2004-11-13 22:43:30 +08:00
|
|
|
|
1999-05-26 10:35:20 +08:00
|
|
|
return 0;
|
|
|
|
}
|
2004-11-14 02:52:44 +08:00
|
|
|
|
|
|
|
#if SLAPD_LDAP == SLAPD_MOD_DYNAMIC
|
|
|
|
|
2004-11-16 03:45:49 +08:00
|
|
|
/* conditionally define the init_module() function */
|
|
|
|
SLAP_BACKEND_INIT_MODULE( ldap )
|
2004-11-14 02:52:44 +08:00
|
|
|
|
2004-11-16 03:45:49 +08:00
|
|
|
#endif /* SLAPD_LDAP == SLAPD_MOD_DYNAMIC */
|
2004-11-14 02:52:44 +08:00
|
|
|
|