2003-11-27 09:17:14 +08:00
|
|
|
/* root_dse.c - Provides the Root DSA-Specific Entry */
|
1999-09-09 03:06:24 +08:00
|
|
|
/* $OpenLDAP$ */
|
2003-11-27 09:17:14 +08:00
|
|
|
/* This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
1999-04-20 02:21:53 +08:00
|
|
|
*
|
2006-01-04 07:11:52 +08:00
|
|
|
* Copyright 1999-2006 The OpenLDAP Foundation.
|
1999-04-20 02:21:53 +08:00
|
|
|
* All rights reserved.
|
|
|
|
*
|
2003-11-27 09:17:14 +08:00
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted only as authorized by the OpenLDAP
|
|
|
|
* Public License.
|
|
|
|
*
|
|
|
|
* A copy of this license is available in the file LICENSE in the
|
|
|
|
* top-level directory of the distribution or, alternatively, at
|
|
|
|
* <http://www.OpenLDAP.org/license.html>.
|
1999-04-20 02:21:53 +08:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include "portable.h"
|
|
|
|
|
|
|
|
#include <stdio.h>
|
2003-01-28 05:53:23 +08:00
|
|
|
|
1999-08-18 05:21:43 +08:00
|
|
|
#include <ac/string.h>
|
|
|
|
|
1999-04-20 02:21:53 +08:00
|
|
|
#include "slap.h"
|
2001-11-18 00:18:07 +08:00
|
|
|
#include <ldif.h>
|
2002-04-09 02:37:37 +08:00
|
|
|
#include "lber_pvt.h"
|
2002-12-08 01:19:29 +08:00
|
|
|
|
2003-02-10 10:09:00 +08:00
|
|
|
#ifdef LDAP_SLAPI
|
2003-12-28 12:17:48 +08:00
|
|
|
#include "slapi/slapi.h"
|
2003-02-10 10:09:00 +08:00
|
|
|
#endif
|
|
|
|
|
2005-11-28 07:17:57 +08:00
|
|
|
static struct berval builtin_supportedFeatures[] = {
|
2005-08-13 05:24:13 +08:00
|
|
|
BER_BVC(LDAP_FEATURE_MODIFY_INCREMENT), /* Modify/increment */
|
2005-11-28 07:17:57 +08:00
|
|
|
BER_BVC(LDAP_FEATURE_ALL_OP_ATTRS), /* All Op Attrs (+) */
|
2003-12-18 01:55:27 +08:00
|
|
|
BER_BVC(LDAP_FEATURE_OBJECTCLASS_ATTRS), /* OCs in Attrs List (@class) */
|
|
|
|
BER_BVC(LDAP_FEATURE_ABSOLUTE_FILTERS), /* (&) and (|) search filters */
|
2005-11-28 07:17:57 +08:00
|
|
|
BER_BVC(LDAP_FEATURE_LANGUAGE_TAG_OPTIONS), /* Language Tag Options */
|
|
|
|
BER_BVC(LDAP_FEATURE_LANGUAGE_RANGE_OPTIONS), /* Language Range Options */
|
2006-08-19 13:47:05 +08:00
|
|
|
#ifdef LDAP_DEVEL
|
2003-12-18 01:55:27 +08:00
|
|
|
BER_BVC(LDAP_FEATURE_SUBORDINATE_SCOPE), /* "children" search scope */
|
2003-09-20 02:41:28 +08:00
|
|
|
#endif
|
2005-11-28 07:17:57 +08:00
|
|
|
BER_BVNULL
|
2001-09-09 12:01:07 +08:00
|
|
|
};
|
2005-11-28 07:17:57 +08:00
|
|
|
static struct berval *supportedFeatures;
|
2001-09-09 12:01:07 +08:00
|
|
|
|
2001-10-24 07:29:41 +08:00
|
|
|
static Entry *usr_attr = NULL;
|
2001-09-09 12:01:07 +08:00
|
|
|
|
2006-01-02 16:57:56 +08:00
|
|
|
/*
|
|
|
|
* allow modules to register functions that muck with the root DSE entry
|
|
|
|
*/
|
|
|
|
|
|
|
|
typedef struct entry_info_t {
|
|
|
|
SLAP_ENTRY_INFO_FN func;
|
|
|
|
void *arg;
|
|
|
|
struct entry_info_t *next;
|
|
|
|
} entry_info_t;
|
|
|
|
|
|
|
|
static entry_info_t *extra_info;
|
|
|
|
|
|
|
|
int
|
|
|
|
entry_info_register( SLAP_ENTRY_INFO_FN func, void *arg )
|
|
|
|
{
|
|
|
|
entry_info_t *ei = ch_calloc( 1, sizeof( entry_info_t ) );
|
|
|
|
|
|
|
|
ei->func = func;
|
|
|
|
ei->arg = arg;
|
|
|
|
|
|
|
|
ei->next = extra_info;
|
|
|
|
extra_info = ei;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
entry_info_unregister( SLAP_ENTRY_INFO_FN func, void *arg )
|
|
|
|
{
|
|
|
|
entry_info_t **eip;
|
|
|
|
|
|
|
|
for ( eip = &extra_info; *eip != NULL; eip = &(*eip)->next ) {
|
|
|
|
if ( (*eip)->func == func && (*eip)->arg == arg ) {
|
|
|
|
entry_info_t *ei = *eip;
|
|
|
|
|
|
|
|
*eip = ei->next;
|
|
|
|
|
|
|
|
ch_free( ei );
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
entry_info_destroy( void )
|
|
|
|
{
|
|
|
|
entry_info_t **eip;
|
|
|
|
|
|
|
|
for ( eip = &extra_info; *eip != NULL; ) {
|
|
|
|
entry_info_t *ei = *eip;
|
|
|
|
|
|
|
|
eip = &(*eip)->next;
|
|
|
|
|
|
|
|
ch_free( ei );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Allow modules to register supported features
|
|
|
|
*/
|
|
|
|
|
2005-11-28 07:17:57 +08:00
|
|
|
static int
|
|
|
|
supported_feature_init( void )
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
if ( supportedFeatures != NULL ) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
for ( i = 0; !BER_BVISNULL( &builtin_supportedFeatures[ i ] ); i++ )
|
|
|
|
;
|
|
|
|
|
|
|
|
supportedFeatures = ch_calloc( sizeof( struct berval ), i + 1 );
|
|
|
|
if ( supportedFeatures == NULL ) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
for ( i = 0; !BER_BVISNULL( &builtin_supportedFeatures[ i ] ); i++ ) {
|
|
|
|
ber_dupbv( &supportedFeatures[ i ], &builtin_supportedFeatures[ i ] );
|
|
|
|
}
|
|
|
|
BER_BVZERO( &supportedFeatures[ i ] );
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
supported_feature_destroy( void )
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
if ( supportedFeatures == NULL ) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
for ( i = 0; !BER_BVISNULL( &supportedFeatures[ i ] ); i++ ) {
|
|
|
|
ch_free( supportedFeatures[ i ].bv_val );
|
|
|
|
}
|
|
|
|
|
|
|
|
ch_free( supportedFeatures );
|
|
|
|
supportedFeatures = NULL;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
supported_feature_load( struct berval *f )
|
|
|
|
{
|
|
|
|
struct berval *tmp;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
supported_feature_init();
|
|
|
|
|
|
|
|
for ( i = 0; !BER_BVISNULL( &supportedFeatures[ i ] ); i++ )
|
|
|
|
;
|
|
|
|
|
|
|
|
tmp = ch_realloc( supportedFeatures, sizeof( struct berval ) * ( i + 2 ) );
|
|
|
|
if ( tmp == NULL ) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
supportedFeatures = tmp;
|
|
|
|
|
|
|
|
ber_dupbv( &supportedFeatures[ i ], f );
|
|
|
|
BER_BVZERO( &supportedFeatures[ i + 1 ] );
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2000-05-17 00:22:52 +08:00
|
|
|
int
|
2000-07-14 06:54:38 +08:00
|
|
|
root_dse_info(
|
|
|
|
Connection *conn,
|
|
|
|
Entry **entry,
|
|
|
|
const char **text )
|
1999-04-20 02:21:53 +08:00
|
|
|
{
|
|
|
|
Entry *e;
|
2005-07-22 21:18:28 +08:00
|
|
|
struct berval val;
|
|
|
|
#ifdef LDAP_SLAPI
|
|
|
|
struct berval *bv;
|
|
|
|
#endif
|
1999-04-20 02:21:53 +08:00
|
|
|
int i, j;
|
2000-07-14 06:54:38 +08:00
|
|
|
char ** supportedSASLMechanisms;
|
2005-03-24 13:13:31 +08:00
|
|
|
BackendDB *be;
|
1999-04-20 02:21:53 +08:00
|
|
|
|
2001-12-20 06:41:00 +08:00
|
|
|
AttributeDescription *ad_structuralObjectClass
|
|
|
|
= slap_schema.si_ad_structuralObjectClass;
|
|
|
|
AttributeDescription *ad_objectClass
|
|
|
|
= slap_schema.si_ad_objectClass;
|
|
|
|
AttributeDescription *ad_namingContexts
|
|
|
|
= slap_schema.si_ad_namingContexts;
|
2005-07-22 21:18:28 +08:00
|
|
|
#ifdef LDAP_SLAPI
|
2001-12-20 06:41:00 +08:00
|
|
|
AttributeDescription *ad_supportedExtension
|
|
|
|
= slap_schema.si_ad_supportedExtension;
|
2005-07-22 21:18:28 +08:00
|
|
|
#endif
|
2001-12-20 06:41:00 +08:00
|
|
|
AttributeDescription *ad_supportedLDAPVersion
|
|
|
|
= slap_schema.si_ad_supportedLDAPVersion;
|
|
|
|
AttributeDescription *ad_supportedSASLMechanisms
|
|
|
|
= slap_schema.si_ad_supportedSASLMechanisms;
|
|
|
|
AttributeDescription *ad_supportedFeatures
|
|
|
|
= slap_schema.si_ad_supportedFeatures;
|
2002-06-19 14:44:16 +08:00
|
|
|
AttributeDescription *ad_monitorContext
|
|
|
|
= slap_schema.si_ad_monitorContext;
|
2005-03-15 07:21:00 +08:00
|
|
|
AttributeDescription *ad_configContext
|
|
|
|
= slap_schema.si_ad_configContext;
|
2001-12-20 06:41:00 +08:00
|
|
|
AttributeDescription *ad_ref
|
|
|
|
= slap_schema.si_ad_ref;
|
2000-05-16 05:22:57 +08:00
|
|
|
|
2006-08-29 09:43:23 +08:00
|
|
|
e = entry_alloc();
|
2002-11-09 01:13:20 +08:00
|
|
|
if( e == NULL ) {
|
|
|
|
Debug( LDAP_DEBUG_ANY,
|
2006-08-29 09:43:23 +08:00
|
|
|
"root_dse_info: entry_alloc failed", 0, 0, 0 );
|
2002-11-09 01:13:20 +08:00
|
|
|
return LDAP_OTHER;
|
|
|
|
}
|
1999-04-20 02:21:53 +08:00
|
|
|
|
|
|
|
e->e_attrs = NULL;
|
2001-12-27 00:42:35 +08:00
|
|
|
e->e_name.bv_val = ch_strdup( LDAP_ROOT_DSE );
|
|
|
|
e->e_name.bv_len = sizeof( LDAP_ROOT_DSE )-1;
|
|
|
|
e->e_nname.bv_val = ch_strdup( LDAP_ROOT_DSE );
|
|
|
|
e->e_nname.bv_len = sizeof( LDAP_ROOT_DSE )-1;
|
|
|
|
|
|
|
|
/* the DN is an empty string so no pretty/normalization is needed */
|
|
|
|
assert( !e->e_name.bv_len );
|
|
|
|
assert( !e->e_nname.bv_len );
|
|
|
|
|
1999-04-20 02:21:53 +08:00
|
|
|
e->e_private = NULL;
|
|
|
|
|
2006-01-02 16:57:56 +08:00
|
|
|
/* FIXME: is this really needed? */
|
2005-04-22 07:36:37 +08:00
|
|
|
BER_BVSTR( &val, "top" );
|
|
|
|
if( attr_merge_one( e, ad_objectClass, &val, NULL ) ) {
|
2006-05-10 21:03:42 +08:00
|
|
|
fail:
|
|
|
|
entry_free( e );
|
2002-11-02 02:59:52 +08:00
|
|
|
return LDAP_OTHER;
|
2003-02-26 05:08:48 +08:00
|
|
|
}
|
2000-05-16 05:22:57 +08:00
|
|
|
|
2005-04-22 07:36:37 +08:00
|
|
|
BER_BVSTR( &val, "OpenLDAProotDSE" );
|
|
|
|
if( attr_merge_one( e, ad_objectClass, &val, NULL ) ) {
|
2006-05-10 21:03:42 +08:00
|
|
|
goto fail;
|
2003-08-08 00:42:40 +08:00
|
|
|
}
|
2005-04-22 07:36:37 +08:00
|
|
|
if( attr_merge_one( e, ad_structuralObjectClass, &val, NULL ) ) {
|
2006-05-10 21:03:42 +08:00
|
|
|
goto fail;
|
2003-08-08 00:42:40 +08:00
|
|
|
}
|
2000-05-16 05:22:57 +08:00
|
|
|
|
2005-03-24 13:13:31 +08:00
|
|
|
LDAP_STAILQ_FOREACH( be, &backendDB, be_next ) {
|
|
|
|
if ( be->be_suffix == NULL
|
|
|
|
|| be->be_nsuffix == NULL ) {
|
2004-01-12 07:40:33 +08:00
|
|
|
/* no suffix! */
|
|
|
|
continue;
|
|
|
|
}
|
2005-03-24 13:13:31 +08:00
|
|
|
if ( SLAP_MONITOR( be )) {
|
2005-04-22 07:36:37 +08:00
|
|
|
if( attr_merge_one( e, ad_monitorContext,
|
|
|
|
&be->be_suffix[0],
|
|
|
|
&be->be_nsuffix[0] ) )
|
|
|
|
{
|
2006-05-10 21:03:42 +08:00
|
|
|
goto fail;
|
2005-03-15 07:21:00 +08:00
|
|
|
}
|
|
|
|
continue;
|
|
|
|
}
|
2005-03-24 13:13:31 +08:00
|
|
|
if ( SLAP_CONFIG( be )) {
|
2005-04-22 07:36:37 +08:00
|
|
|
if( attr_merge_one( e, ad_configContext,
|
|
|
|
&be->be_suffix[0],
|
|
|
|
& be->be_nsuffix[0] ) )
|
|
|
|
{
|
2006-05-10 21:03:42 +08:00
|
|
|
goto fail;
|
2003-02-26 05:08:48 +08:00
|
|
|
}
|
2002-06-19 14:06:21 +08:00
|
|
|
continue;
|
|
|
|
}
|
2005-03-24 13:13:31 +08:00
|
|
|
if ( SLAP_GLUE_SUBORDINATE( be ) && !SLAP_GLUE_ADVERTISE( be ) ) {
|
2001-12-09 10:01:58 +08:00
|
|
|
continue;
|
2002-01-11 06:34:11 +08:00
|
|
|
}
|
2005-03-24 13:13:31 +08:00
|
|
|
for ( j = 0; be->be_suffix[j].bv_val != NULL; j++ ) {
|
2005-04-22 07:36:37 +08:00
|
|
|
if( attr_merge_one( e, ad_namingContexts,
|
|
|
|
&be->be_suffix[j],
|
|
|
|
&be->be_nsuffix[0] ) )
|
|
|
|
{
|
2006-05-10 21:03:42 +08:00
|
|
|
goto fail;
|
2003-02-26 05:08:48 +08:00
|
|
|
}
|
1999-04-20 02:21:53 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* altServer unsupported */
|
|
|
|
|
1999-07-02 05:20:45 +08:00
|
|
|
/* supportedControl */
|
2003-02-28 20:34:35 +08:00
|
|
|
if ( controls_root_dse_info( e ) != 0 ) {
|
2006-05-10 21:03:42 +08:00
|
|
|
goto fail;
|
1999-07-02 05:20:45 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* supportedExtension */
|
2003-06-01 04:19:02 +08:00
|
|
|
if ( exop_root_dse_info( e ) != 0 ) {
|
2006-05-10 21:03:42 +08:00
|
|
|
goto fail;
|
1999-07-02 05:20:45 +08:00
|
|
|
}
|
|
|
|
|
2003-02-09 05:53:05 +08:00
|
|
|
#ifdef LDAP_SLAPI
|
2002-12-08 01:19:29 +08:00
|
|
|
/* netscape supportedExtension */
|
2003-12-28 12:14:19 +08:00
|
|
|
for ( i = 0; (bv = slapi_int_get_supported_extop(i)) != NULL; i++ ) {
|
2005-04-22 07:36:37 +08:00
|
|
|
if( attr_merge_one( e, ad_supportedExtension, bv, NULL ) ) {
|
2006-05-10 21:03:42 +08:00
|
|
|
goto fail;
|
2003-02-26 05:08:48 +08:00
|
|
|
}
|
2002-12-08 01:19:29 +08:00
|
|
|
}
|
2003-02-09 05:53:05 +08:00
|
|
|
#endif /* LDAP_SLAPI */
|
2002-12-08 01:19:29 +08:00
|
|
|
|
2001-09-09 12:01:07 +08:00
|
|
|
/* supportedFeatures */
|
2005-11-28 07:17:57 +08:00
|
|
|
if ( supportedFeatures == NULL ) {
|
|
|
|
supported_feature_init();
|
|
|
|
}
|
|
|
|
|
2003-06-01 04:19:02 +08:00
|
|
|
if( attr_merge( e, ad_supportedFeatures, supportedFeatures, NULL ) ) {
|
2006-05-10 21:03:42 +08:00
|
|
|
goto fail;
|
2003-02-26 05:08:48 +08:00
|
|
|
}
|
2001-09-09 12:01:07 +08:00
|
|
|
|
1999-07-02 05:20:45 +08:00
|
|
|
/* supportedLDAPVersion */
|
2005-05-12 06:40:50 +08:00
|
|
|
/* don't publish version 2 as we don't really support it
|
|
|
|
* (even when configured to accept version 2 Bind requests)
|
|
|
|
* and the value would never be used by true LDAPv2 (or LDAPv3)
|
|
|
|
* clients.
|
|
|
|
*/
|
|
|
|
for ( i=LDAP_VERSION3; i<=LDAP_VERSION_MAX; i++ ) {
|
2006-08-26 04:05:14 +08:00
|
|
|
char buf[sizeof("255")];
|
2002-07-24 02:35:12 +08:00
|
|
|
snprintf(buf, sizeof buf, "%d", i);
|
2005-04-22 07:36:37 +08:00
|
|
|
val.bv_val = buf;
|
|
|
|
val.bv_len = strlen( val.bv_val );
|
2005-04-22 22:34:10 +08:00
|
|
|
if( attr_merge_one( e, ad_supportedLDAPVersion, &val, NULL ) ) {
|
2006-05-10 21:03:42 +08:00
|
|
|
goto fail;
|
2003-02-26 05:08:48 +08:00
|
|
|
}
|
1999-04-20 02:21:53 +08:00
|
|
|
}
|
1999-07-02 05:20:45 +08:00
|
|
|
|
|
|
|
/* supportedSASLMechanism */
|
2000-07-14 06:54:38 +08:00
|
|
|
supportedSASLMechanisms = slap_sasl_mechs( conn );
|
|
|
|
|
1999-08-03 10:37:42 +08:00
|
|
|
if( supportedSASLMechanisms != NULL ) {
|
|
|
|
for ( i=0; supportedSASLMechanisms[i] != NULL; i++ ) {
|
2005-04-22 07:36:37 +08:00
|
|
|
val.bv_val = supportedSASLMechanisms[i];
|
|
|
|
val.bv_len = strlen( val.bv_val );
|
2005-04-22 22:34:10 +08:00
|
|
|
if( attr_merge_one( e, ad_supportedSASLMechanisms, &val, NULL ) ) {
|
2006-05-10 21:03:42 +08:00
|
|
|
ldap_charray_free( supportedSASLMechanisms );
|
|
|
|
goto fail;
|
2003-02-26 05:08:48 +08:00
|
|
|
}
|
1999-08-03 10:37:42 +08:00
|
|
|
}
|
2002-08-24 08:55:24 +08:00
|
|
|
ldap_charray_free( supportedSASLMechanisms );
|
1999-07-02 05:20:45 +08:00
|
|
|
}
|
|
|
|
|
2004-10-06 13:51:38 +08:00
|
|
|
if ( default_referral != NULL ) {
|
|
|
|
if( attr_merge( e, ad_ref, default_referral, NULL /* FIXME */ ) ) {
|
2006-05-10 21:03:42 +08:00
|
|
|
goto fail;
|
2003-02-26 05:08:48 +08:00
|
|
|
}
|
1999-07-16 10:45:46 +08:00
|
|
|
}
|
1999-07-02 05:20:45 +08:00
|
|
|
|
2001-10-24 07:29:41 +08:00
|
|
|
if( usr_attr != NULL) {
|
2002-01-05 07:49:58 +08:00
|
|
|
Attribute *a;
|
|
|
|
for( a = usr_attr->e_attrs; a != NULL; a = a->a_next ) {
|
2003-03-24 09:56:56 +08:00
|
|
|
if( attr_merge( e, a->a_desc, a->a_vals,
|
2003-08-08 00:42:40 +08:00
|
|
|
(a->a_nvals == a->a_vals) ? NULL : a->a_nvals ) )
|
2003-02-26 05:08:48 +08:00
|
|
|
{
|
2006-05-10 21:03:42 +08:00
|
|
|
goto fail;
|
2003-02-26 05:08:48 +08:00
|
|
|
}
|
2001-10-24 07:29:41 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2006-01-02 16:57:56 +08:00
|
|
|
if ( extra_info ) {
|
|
|
|
entry_info_t *ei = extra_info;
|
|
|
|
|
|
|
|
for ( ; ei; ei = ei->next ) {
|
|
|
|
ei->func( ei->arg, e );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2000-05-17 00:22:52 +08:00
|
|
|
*entry = e;
|
|
|
|
return LDAP_SUCCESS;
|
1999-04-20 02:21:53 +08:00
|
|
|
}
|
|
|
|
|
2001-10-24 07:29:41 +08:00
|
|
|
/*
|
|
|
|
* Read the entries specified in fname and merge the attributes
|
|
|
|
* to the user defined rootDSE. Note thaat if we find any errors
|
|
|
|
* what so ever, we will discard the entire entries, print an
|
|
|
|
* error message and return.
|
|
|
|
*/
|
|
|
|
int read_root_dse_file( const char *fname )
|
|
|
|
{
|
2005-05-12 08:46:39 +08:00
|
|
|
struct LDIFFP *fp;
|
2001-10-24 07:29:41 +08:00
|
|
|
int rc = 0, lineno = 0, lmax = 0;
|
|
|
|
char *buf = NULL;
|
|
|
|
|
2005-05-12 08:46:39 +08:00
|
|
|
if ( (fp = ldif_open( fname, "r" )) == NULL ) {
|
2001-10-24 07:29:41 +08:00
|
|
|
Debug( LDAP_DEBUG_ANY,
|
|
|
|
"could not open rootdse attr file \"%s\" - absolute path?\n",
|
|
|
|
fname, 0, 0 );
|
|
|
|
perror( fname );
|
|
|
|
return EXIT_FAILURE;
|
|
|
|
}
|
|
|
|
|
2006-08-29 09:43:23 +08:00
|
|
|
usr_attr = entry_alloc();
|
2002-11-09 01:13:20 +08:00
|
|
|
if( usr_attr == NULL ) {
|
|
|
|
Debug( LDAP_DEBUG_ANY,
|
2006-08-29 09:43:23 +08:00
|
|
|
"read_root_dse_file: entry_alloc failed", 0, 0, 0 );
|
2005-05-12 08:46:39 +08:00
|
|
|
ldif_close( fp );
|
2002-11-09 01:13:20 +08:00
|
|
|
return LDAP_OTHER;
|
|
|
|
}
|
2001-10-24 07:29:41 +08:00
|
|
|
usr_attr->e_attrs = NULL;
|
|
|
|
|
|
|
|
while( ldif_read_record( fp, &lineno, &buf, &lmax ) ) {
|
|
|
|
Entry *e = str2entry( buf );
|
2002-01-05 07:49:58 +08:00
|
|
|
Attribute *a;
|
2001-10-24 07:29:41 +08:00
|
|
|
|
|
|
|
if( e == NULL ) {
|
|
|
|
fprintf( stderr, "root_dse: could not parse entry (line=%d)\n",
|
|
|
|
lineno );
|
2003-03-14 17:37:27 +08:00
|
|
|
rc = EXIT_FAILURE;
|
|
|
|
break;
|
2001-10-24 07:29:41 +08:00
|
|
|
}
|
|
|
|
|
2001-12-27 00:42:35 +08:00
|
|
|
/* make sure the DN is the empty DN */
|
|
|
|
if( e->e_nname.bv_len ) {
|
2001-10-24 07:29:41 +08:00
|
|
|
fprintf( stderr,
|
|
|
|
"root_dse: invalid rootDSE - dn=\"%s\" (line=%d)\n",
|
|
|
|
e->e_dn, lineno );
|
|
|
|
entry_free( e );
|
2003-03-14 17:37:27 +08:00
|
|
|
rc = EXIT_FAILURE;
|
|
|
|
break;
|
2001-10-24 07:29:41 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* we found a valid entry, so walk thru all the attributes in the
|
|
|
|
* entry, and add each attribute type and description to the
|
|
|
|
* usr_attr entry
|
|
|
|
*/
|
|
|
|
|
|
|
|
for(a = e->e_attrs; a != NULL; a = a->a_next) {
|
2003-03-24 09:56:56 +08:00
|
|
|
if( attr_merge( usr_attr, a->a_desc, a->a_vals,
|
2003-08-08 00:42:40 +08:00
|
|
|
(a->a_nvals == a->a_vals) ? NULL : a->a_nvals ) )
|
2003-02-26 05:08:48 +08:00
|
|
|
{
|
2003-03-14 17:37:27 +08:00
|
|
|
rc = LDAP_OTHER;
|
|
|
|
break;
|
2003-02-26 05:08:48 +08:00
|
|
|
}
|
2001-10-24 07:29:41 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
entry_free( e );
|
2003-03-14 17:37:27 +08:00
|
|
|
if (rc) break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (rc) {
|
|
|
|
entry_free( usr_attr );
|
|
|
|
usr_attr = NULL;
|
2001-10-24 07:29:41 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
ch_free( buf );
|
|
|
|
|
2005-05-12 08:46:39 +08:00
|
|
|
ldif_close( fp );
|
2003-03-14 17:37:27 +08:00
|
|
|
|
2002-01-03 01:05:12 +08:00
|
|
|
Debug(LDAP_DEBUG_CONFIG, "rootDSE file %s read.\n", fname, 0, 0);
|
2001-10-24 07:29:41 +08:00
|
|
|
return rc;
|
|
|
|
}
|
2005-05-05 08:22:43 +08:00
|
|
|
|
|
|
|
int
|
|
|
|
slap_discover_feature(
|
2006-09-11 08:52:43 +08:00
|
|
|
slap_bindconf *sb,
|
2005-05-05 08:22:43 +08:00
|
|
|
const char *attr,
|
|
|
|
const char *val )
|
|
|
|
{
|
2006-09-11 08:52:43 +08:00
|
|
|
LDAP *ld = NULL;
|
2005-05-05 08:22:43 +08:00
|
|
|
LDAPMessage *res = NULL, *entry;
|
|
|
|
int rc, i;
|
|
|
|
struct berval cred = BER_BVC( "" ),
|
|
|
|
bv_val,
|
|
|
|
**values = NULL;
|
|
|
|
char *attrs[ 2 ] = { NULL, NULL };
|
|
|
|
|
2006-09-11 08:52:43 +08:00
|
|
|
rc = slap_client_connect( &ld, sb );
|
2005-05-05 08:22:43 +08:00
|
|
|
if ( rc != LDAP_SUCCESS ) {
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
2006-09-11 08:52:43 +08:00
|
|
|
attrs[ 0 ] = (char *) attr;
|
2005-05-05 08:22:43 +08:00
|
|
|
rc = ldap_search_ext_s( ld, "", LDAP_SCOPE_BASE, "(objectClass=*)",
|
|
|
|
attrs, 0, NULL, NULL, NULL, 0, &res );
|
|
|
|
if ( rc != LDAP_SUCCESS ) {
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
entry = ldap_first_entry( ld, res );
|
|
|
|
if ( entry == NULL ) {
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
values = ldap_get_values_len( ld, entry, attrs[ 0 ] );
|
|
|
|
if ( values == NULL ) {
|
|
|
|
rc = LDAP_NO_SUCH_ATTRIBUTE;
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
2006-09-11 08:52:43 +08:00
|
|
|
ber_str2bv( val, 0, 0, &bv_val );
|
2005-05-05 08:22:43 +08:00
|
|
|
for ( i = 0; values[ i ] != NULL; i++ ) {
|
|
|
|
if ( bvmatch( &bv_val, values[ i ] ) ) {
|
|
|
|
rc = LDAP_COMPARE_TRUE;
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
rc = LDAP_COMPARE_FALSE;
|
|
|
|
|
|
|
|
done:;
|
|
|
|
if ( values != NULL ) {
|
|
|
|
ldap_value_free_len( values );
|
|
|
|
}
|
|
|
|
|
|
|
|
if ( res != NULL ) {
|
|
|
|
ldap_msgfree( res );
|
|
|
|
}
|
|
|
|
|
|
|
|
ldap_unbind_ext( ld, NULL, NULL );
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|