2017-03-09 06:59:57 +08:00
|
|
|
/* $OpenLDAP$ */
|
|
|
|
/* This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
|
|
|
*
|
|
|
|
* Copyright 1998-2020 The OpenLDAP Foundation.
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted only as authorized by the OpenLDAP
|
|
|
|
* Public License.
|
|
|
|
*
|
|
|
|
* A copy of this license is available in the file LICENSE in the
|
|
|
|
* top-level directory of the distribution or, alternatively, at
|
|
|
|
* <http://www.OpenLDAP.org/license.html>.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "portable.h"
|
|
|
|
|
|
|
|
#include <ac/socket.h>
|
|
|
|
#include <ac/errno.h>
|
|
|
|
#include <ac/string.h>
|
|
|
|
#include <ac/time.h>
|
|
|
|
#include <ac/unistd.h>
|
|
|
|
|
|
|
|
#include "lutil.h"
|
|
|
|
#include "slap.h"
|
|
|
|
|
|
|
|
static void
|
|
|
|
client_read_cb( evutil_socket_t s, short what, void *arg )
|
|
|
|
{
|
|
|
|
Connection *c = arg;
|
2017-03-16 20:25:01 +08:00
|
|
|
BerElement *ber;
|
2017-03-29 01:40:20 +08:00
|
|
|
Operation *op = NULL;
|
2017-03-16 20:25:01 +08:00
|
|
|
ber_tag_t tag;
|
|
|
|
ber_len_t len;
|
2017-03-29 01:40:20 +08:00
|
|
|
int rc = 0;
|
2017-03-16 19:41:07 +08:00
|
|
|
|
2017-04-21 18:07:43 +08:00
|
|
|
/* What if the shutdown is already in progress and we get to lock the
|
|
|
|
* connection? */
|
|
|
|
CONNECTION_LOCK(c);
|
|
|
|
|
2017-03-09 06:59:57 +08:00
|
|
|
Debug( LDAP_DEBUG_CONNS, "client_read_cb: "
|
|
|
|
"connection %lu ready to read\n",
|
|
|
|
c->c_connid );
|
2017-03-16 20:25:01 +08:00
|
|
|
|
|
|
|
ber = c->c_currentber;
|
|
|
|
if ( ber == NULL && (ber = ber_alloc()) == NULL ) {
|
2017-03-29 01:12:27 +08:00
|
|
|
Debug( LDAP_DEBUG_ANY, "client_read_cb: "
|
|
|
|
"ber_alloc failed\n" );
|
2017-04-21 18:07:43 +08:00
|
|
|
CLIENT_DESTROY(c);
|
2017-03-16 20:25:01 +08:00
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
|
|
|
|
tag = ber_get_next( c->c_sb, &len, ber );
|
|
|
|
if ( tag != LDAP_TAG_MESSAGE ) {
|
|
|
|
int err = sock_errno();
|
|
|
|
|
|
|
|
if ( err != EWOULDBLOCK && err != EAGAIN ) {
|
|
|
|
char ebuf[128];
|
2017-03-29 01:12:27 +08:00
|
|
|
Debug( LDAP_DEBUG_ANY, "client_read_cb: "
|
|
|
|
"ber_get_next on fd %d failed errno=%d (%s)\n",
|
|
|
|
c->c_fd, err, sock_errstr( err, ebuf, sizeof(ebuf) ) );
|
2017-03-16 20:25:01 +08:00
|
|
|
|
|
|
|
c->c_currentber = NULL;
|
2017-04-21 18:07:43 +08:00
|
|
|
CLIENT_DESTROY(c);
|
2017-03-16 20:25:01 +08:00
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
c->c_currentber = ber;
|
2017-04-21 18:07:43 +08:00
|
|
|
CONNECTION_UNLOCK(c);
|
2017-03-16 20:25:01 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
c->c_currentber = NULL;
|
|
|
|
|
|
|
|
op = operation_init( c, ber );
|
|
|
|
if ( !op ) {
|
2017-03-29 01:12:27 +08:00
|
|
|
Debug( LDAP_DEBUG_ANY, "client_read_cb: "
|
|
|
|
"operation_init failed\n" );
|
2017-04-21 18:07:43 +08:00
|
|
|
CLIENT_DESTROY(c);
|
2017-03-16 20:25:01 +08:00
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
|
2017-03-29 01:40:20 +08:00
|
|
|
switch ( op->o_tag ) {
|
|
|
|
case LDAP_REQ_UNBIND:
|
2017-04-21 18:07:43 +08:00
|
|
|
/* We do not expect anything more from the client. Also, we are the
|
|
|
|
* read event, so don't need to unlock */
|
2017-03-29 01:40:20 +08:00
|
|
|
event_del( c->c_read_event );
|
|
|
|
|
|
|
|
rc = ldap_pvt_thread_pool_submit(
|
|
|
|
&connection_pool, client_reset, op );
|
|
|
|
if ( rc ) {
|
2017-04-21 18:07:43 +08:00
|
|
|
CONNECTION_UNLOCK(c);
|
|
|
|
client_reset( NULL, op );
|
2017-03-29 01:40:20 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case LDAP_REQ_BIND:
|
|
|
|
rc = ldap_pvt_thread_pool_submit(
|
|
|
|
&connection_pool, client_bind, op );
|
|
|
|
break;
|
|
|
|
default:
|
2017-04-14 16:41:57 +08:00
|
|
|
if ( c->c_state == SLAP_C_BINDING ) {
|
2017-04-21 18:07:43 +08:00
|
|
|
CONNECTION_UNLOCK(c);
|
2017-04-14 16:41:57 +08:00
|
|
|
operation_send_reject(
|
|
|
|
op, LDAP_PROTOCOL_ERROR, "bind in progress", 0 );
|
|
|
|
return;
|
|
|
|
}
|
2017-03-29 01:40:20 +08:00
|
|
|
rc = ldap_pvt_thread_pool_submit(
|
|
|
|
&connection_pool, request_process, op );
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2017-04-21 18:07:43 +08:00
|
|
|
/* FIXME: unlocks in this function need more thought when we refcount
|
|
|
|
* operations */
|
|
|
|
CONNECTION_UNLOCK(c);
|
|
|
|
|
2017-03-29 01:40:20 +08:00
|
|
|
if ( !rc ) {
|
|
|
|
return;
|
2017-03-16 20:25:01 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
fail:
|
2017-03-29 01:40:20 +08:00
|
|
|
if ( op ) {
|
2017-04-14 16:39:24 +08:00
|
|
|
operation_send_reject(
|
|
|
|
op, LDAP_OTHER, "server error or overloaded", 1 );
|
2017-03-29 01:40:20 +08:00
|
|
|
operation_destroy( op );
|
2017-04-19 16:51:47 +08:00
|
|
|
} else if ( ber ) {
|
|
|
|
ber_free( ber, 1 );
|
2017-03-16 20:25:01 +08:00
|
|
|
}
|
2017-03-29 01:40:20 +08:00
|
|
|
|
2017-03-16 20:25:01 +08:00
|
|
|
return;
|
2017-03-09 06:59:57 +08:00
|
|
|
}
|
|
|
|
|
2017-03-16 20:11:45 +08:00
|
|
|
void
|
2017-03-09 06:59:57 +08:00
|
|
|
client_write_cb( evutil_socket_t s, short what, void *arg )
|
|
|
|
{
|
|
|
|
Connection *c = arg;
|
2017-03-16 20:19:31 +08:00
|
|
|
|
2017-04-21 18:07:43 +08:00
|
|
|
/* What if the shutdown is already in progress and we get to lock the
|
|
|
|
* connection? */
|
|
|
|
CONNECTION_LOCK(c);
|
|
|
|
CONNECTION_UNLOCK_INCREF(c);
|
|
|
|
|
2017-03-16 20:19:31 +08:00
|
|
|
ldap_pvt_thread_mutex_lock( &c->c_io_mutex );
|
|
|
|
Debug( LDAP_DEBUG_CONNS, "client_write_cb: "
|
|
|
|
"have something to write to client %lu\n",
|
|
|
|
c->c_connid );
|
|
|
|
|
|
|
|
if ( ber_flush( c->c_sb, c->c_pendingber, 1 ) ) {
|
|
|
|
int err = sock_errno();
|
|
|
|
if ( err != EWOULDBLOCK && err != EAGAIN ) {
|
|
|
|
ldap_pvt_thread_mutex_unlock( &c->c_io_mutex );
|
2017-04-21 18:07:43 +08:00
|
|
|
CLIENT_LOCK_DESTROY(c);
|
2017-03-16 20:19:31 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
event_add( c->c_write_event, NULL );
|
|
|
|
}
|
|
|
|
c->c_pendingber = NULL;
|
|
|
|
ldap_pvt_thread_mutex_unlock( &c->c_io_mutex );
|
2017-04-21 18:07:43 +08:00
|
|
|
|
|
|
|
CONNECTION_LOCK_DECREF(c);
|
|
|
|
CLIENT_UNLOCK_OR_DESTROY(c);
|
2017-03-09 06:59:57 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
Connection *
|
|
|
|
client_init(
|
|
|
|
ber_socket_t s,
|
|
|
|
Listener *listener,
|
|
|
|
const char *peername,
|
|
|
|
struct event_base *base,
|
|
|
|
int flags )
|
|
|
|
{
|
|
|
|
Connection *c;
|
|
|
|
struct event *event;
|
|
|
|
|
|
|
|
assert( listener != NULL );
|
|
|
|
|
|
|
|
c = connection_init( s, peername, flags );
|
|
|
|
|
2017-03-17 22:29:38 +08:00
|
|
|
c->c_state = SLAP_C_READY;
|
|
|
|
|
2017-03-09 06:59:57 +08:00
|
|
|
event = event_new( base, s, EV_READ|EV_PERSIST, client_read_cb, c );
|
|
|
|
if ( !event ) {
|
2017-03-29 01:12:27 +08:00
|
|
|
Debug( LDAP_DEBUG_ANY, "client_init: "
|
|
|
|
"Read event could not be allocated\n" );
|
2017-03-09 06:59:57 +08:00
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
event_add( event, NULL );
|
|
|
|
c->c_read_event = event;
|
|
|
|
|
|
|
|
event = event_new( base, s, EV_WRITE, client_write_cb, c );
|
|
|
|
if ( !event ) {
|
2017-03-29 01:12:27 +08:00
|
|
|
Debug( LDAP_DEBUG_ANY, "client_init: "
|
|
|
|
"Write event could not be allocated\n" );
|
2017-03-09 06:59:57 +08:00
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
/* We only register the write event when we have data pending */
|
|
|
|
c->c_write_event = event;
|
|
|
|
|
|
|
|
c->c_private = listener;
|
2017-04-21 18:07:43 +08:00
|
|
|
CONNECTION_UNLOCK(c);
|
2017-03-09 06:59:57 +08:00
|
|
|
|
|
|
|
return c;
|
|
|
|
fail:
|
|
|
|
if ( c->c_write_event ) {
|
|
|
|
event_del( c->c_write_event );
|
|
|
|
event_free( c->c_write_event );
|
|
|
|
}
|
|
|
|
if ( c->c_read_event ) {
|
|
|
|
event_del( c->c_read_event );
|
|
|
|
event_free( c->c_read_event );
|
|
|
|
}
|
2017-03-17 22:29:38 +08:00
|
|
|
c->c_state = SLAP_C_INVALID;
|
2017-03-09 06:59:57 +08:00
|
|
|
connection_destroy( c );
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2017-03-29 01:40:20 +08:00
|
|
|
void
|
2017-03-09 06:59:57 +08:00
|
|
|
client_destroy( Connection *c )
|
|
|
|
{
|
2017-04-14 16:45:18 +08:00
|
|
|
TAvlnode *root, *node;
|
|
|
|
|
|
|
|
Debug( LDAP_DEBUG_CONNS, "client_destroy: "
|
|
|
|
"destroying client %lu\n",
|
|
|
|
c->c_connid );
|
|
|
|
|
2017-03-29 01:40:20 +08:00
|
|
|
assert( c->c_read_event != NULL );
|
2017-03-09 06:59:57 +08:00
|
|
|
event_del( c->c_read_event );
|
|
|
|
event_free( c->c_read_event );
|
|
|
|
|
2017-03-29 01:40:20 +08:00
|
|
|
assert( c->c_write_event != NULL );
|
2017-03-09 06:59:57 +08:00
|
|
|
event_del( c->c_write_event );
|
|
|
|
event_free( c->c_write_event );
|
|
|
|
|
2017-04-14 16:45:18 +08:00
|
|
|
root = c->c_ops;
|
|
|
|
c->c_ops = NULL;
|
|
|
|
|
|
|
|
if ( !BER_BVISNULL( &c->c_auth ) ) {
|
|
|
|
ch_free( c->c_auth.bv_val );
|
|
|
|
}
|
|
|
|
|
2017-03-17 22:29:38 +08:00
|
|
|
c->c_state = SLAP_C_INVALID;
|
2017-03-09 06:59:57 +08:00
|
|
|
connection_destroy( c );
|
2017-04-14 16:45:18 +08:00
|
|
|
|
|
|
|
if ( !root ) return;
|
|
|
|
|
|
|
|
/* We don't hold c_mutex anymore */
|
|
|
|
node = tavl_end( root, TAVL_DIR_LEFT );
|
|
|
|
do {
|
|
|
|
Operation *op = node->avl_data;
|
|
|
|
|
|
|
|
op->o_client = NULL;
|
|
|
|
operation_abandon( op );
|
|
|
|
} while ( (node = tavl_next( node, TAVL_DIR_RIGHT )) );
|
|
|
|
tavl_free( root, NULL );
|
2017-03-09 06:59:57 +08:00
|
|
|
}
|