openldap/tests/progs/slapd-search.c

408 lines
8.8 KiB
C
Raw Normal View History

1999-09-02 16:40:22 +08:00
/* $OpenLDAP$ */
2003-11-26 23:24:38 +08:00
/* This work is part of OpenLDAP Software <http://www.openldap.org/>.
*
2006-01-04 07:11:52 +08:00
* Copyright 1999-2006 The OpenLDAP Foundation.
2003-11-26 23:24:38 +08:00
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted only as authorized by the OpenLDAP
* Public License.
*
* A copy of this license is available in file LICENSE in the
* top-level directory of the distribution or, alternatively, at
* <http://www.OpenLDAP.org/license.html>.
1999-09-02 08:56:32 +08:00
*/
2003-11-26 23:24:38 +08:00
/* ACKNOWLEDGEMENTS:
* This work was initially developed by Kurt Spanier for inclusion
* in OpenLDAP Software.
*/
#include "portable.h"
#include <stdio.h>
1999-06-03 08:37:44 +08:00
#include <ac/stdlib.h>
#include <ac/ctype.h>
1999-11-02 01:21:24 +08:00
#include <ac/param.h>
#include <ac/socket.h>
#include <ac/string.h>
#include <ac/unistd.h>
#include <ac/wait.h>
#include <ldap.h>
2005-11-24 09:10:05 +08:00
#include <lutil.h>
#include "slapd-common.h"
#define LOOPS 100
#define RETRIES 0
static void
do_search( char *uri, char *manager, struct berval *passwd,
2006-03-28 08:14:11 +08:00
char *sbase, char *filter, LDAP **ldp, int noattrs,
2006-03-25 18:13:30 +08:00
int innerloop, int maxretries, int delay, int force, int chaserefs );
static void
do_random( char *uri, char *manager, struct berval *passwd,
2006-03-28 08:14:11 +08:00
char *sbase, char *filter, char *attr, int noattrs, int innerloop,
2006-03-25 18:13:30 +08:00
int maxretries, int delay, int force, int chaserefs );
static void
usage( char *name )
{
fprintf( stderr,
"usage: %s "
"-H <uri> | ([-h <host>] -p <port>) "
"-D <manager> "
"-w <passwd> "
"-b <searchbase> "
"-f <searchfilter> "
"[-a <attr>] "
2006-03-28 08:14:11 +08:00
"[-A] "
2006-03-25 18:13:30 +08:00
"[-C] "
2006-03-28 08:14:11 +08:00
"[-F] "
"[-l <loops>] "
2006-03-04 00:02:34 +08:00
"[-L <outerloops>] "
"[-r <maxretries>] "
"[-t <delay>]\n",
name );
exit( EXIT_FAILURE );
}
int
main( int argc, char **argv )
{
1999-03-06 14:33:34 +08:00
int i;
char *uri = NULL;
char *host = "localhost";
int port = -1;
char *manager = NULL;
struct berval passwd = { 0, NULL };
char *sbase = NULL;
char *filter = NULL;
char *attr = NULL;
int loops = LOOPS;
2006-03-04 00:02:34 +08:00
int outerloops = 1;
int retries = RETRIES;
int delay = 0;
2006-03-23 08:19:09 +08:00
int force = 0;
2006-03-25 18:13:30 +08:00
int chaserefs = 0;
2006-03-28 08:14:11 +08:00
int noattrs = 0;
tester_init( "slapd-search" );
2006-03-28 08:14:11 +08:00
while ( (i = getopt( argc, argv, "Aa:b:CD:f:FH:h:l:L:p:w:r:t:" )) != EOF ) {
switch( i ) {
2006-03-28 08:14:11 +08:00
case 'A':
noattrs++;
break;
2006-03-25 18:13:30 +08:00
case 'C':
chaserefs++;
break;
case 'H': /* the server uri */
uri = strdup( optarg );
break;
case 'h': /* the servers host */
host = strdup( optarg );
break;
case 'p': /* the servers port */
2005-11-24 09:10:05 +08:00
if ( lutil_atoi( &port, optarg ) != 0 ) {
usage( argv[0] );
}
break;
case 'D': /* the servers manager */
manager = strdup( optarg );
break;
case 'w': /* the server managers password */
passwd.bv_val = strdup( optarg );
passwd.bv_len = strlen( optarg );
break;
case 'a':
attr = strdup( optarg );
break;
case 'b': /* file with search base */
sbase = strdup( optarg );
break;
case 'f': /* the search request */
filter = strdup( optarg );
break;
2006-03-23 08:19:09 +08:00
case 'F':
force++;
break;
case 'l': /* number of loops */
2005-11-24 09:10:05 +08:00
if ( lutil_atoi( &loops, optarg ) != 0 ) {
usage( argv[0] );
}
break;
2006-03-04 00:02:34 +08:00
case 'L': /* number of loops */
if ( lutil_atoi( &outerloops, optarg ) != 0 ) {
usage( argv[0] );
}
break;
case 'r': /* number of retries */
2005-11-24 09:10:05 +08:00
if ( lutil_atoi( &retries, optarg ) != 0 ) {
usage( argv[0] );
}
break;
case 't': /* delay in seconds */
2005-11-24 09:10:05 +08:00
if ( lutil_atoi( &delay, optarg ) != 0 ) {
usage( argv[0] );
}
break;
default:
usage( argv[0] );
break;
}
}
if (( sbase == NULL ) || ( filter == NULL ) || ( port == -1 && uri == NULL ))
usage( argv[0] );
if ( *filter == '\0' ) {
fprintf( stderr, "%s: invalid EMPTY search filter.\n",
argv[0] );
exit( EXIT_FAILURE );
}
uri = tester_uri( uri, host, port );
2006-03-04 00:02:34 +08:00
for ( i = 0; i < outerloops; i++ ) {
if ( attr != NULL ) {
do_random( uri, manager, &passwd, sbase, filter, attr,
2006-03-28 08:14:11 +08:00
noattrs, loops, retries, delay, force, chaserefs );
} else {
do_search( uri, manager, &passwd, sbase, filter, NULL,
2006-03-28 08:14:11 +08:00
noattrs, loops, retries, delay, force, chaserefs );
}
2006-03-04 00:02:34 +08:00
}
exit( EXIT_SUCCESS );
}
static void
do_random( char *uri, char *manager, struct berval *passwd,
2006-03-28 08:14:11 +08:00
char *sbase, char *filter, char *attr, int noattrs,
2006-03-25 18:13:30 +08:00
int innerloop, int maxretries, int delay, int force, int chaserefs )
{
LDAP *ld = NULL;
int i = 0, do_retry = maxretries;
char *attrs[ 2 ];
pid_t pid = getpid();
int rc = LDAP_SUCCESS;
int version = LDAP_VERSION3;
int nvalues = 0;
char **values = NULL;
LDAPMessage *res = NULL, *e = NULL;
attrs[ 0 ] = attr;
attrs[ 1 ] = NULL;
ldap_initialize( &ld, uri );
if ( ld == NULL ) {
tester_perror( "ldap_initialize" );
exit( EXIT_FAILURE );
}
(void) ldap_set_option( ld, LDAP_OPT_PROTOCOL_VERSION, &version );
2006-03-25 18:13:30 +08:00
(void) ldap_set_option( ld, LDAP_OPT_REFERRALS,
chaserefs ? LDAP_OPT_ON : LDAP_OPT_OFF );
if ( do_retry == maxretries ) {
fprintf( stderr, "PID=%ld - Search(%d): base=\"%s\", filter=\"%s\" attr=\"%s\".\n",
(long) pid, innerloop, sbase, filter, attr );
}
rc = ldap_sasl_bind_s( ld, manager, LDAP_SASL_SIMPLE, passwd, NULL, NULL, NULL );
if ( rc != LDAP_SUCCESS ) {
tester_ldap_error( ld, "ldap_sasl_bind_s" );
2005-08-17 16:17:30 +08:00
switch ( rc ) {
case LDAP_BUSY:
case LDAP_UNAVAILABLE:
/* fallthru */
default:
break;
}
exit( EXIT_FAILURE );
}
rc = ldap_search_ext_s( ld, sbase, LDAP_SCOPE_SUBTREE,
filter, attrs, 0, NULL, NULL, NULL, LDAP_NO_LIMIT, &res );
switch ( rc ) {
case LDAP_SIZELIMIT_EXCEEDED:
case LDAP_TIMELIMIT_EXCEEDED:
case LDAP_SUCCESS:
if ( ldap_count_entries( ld, res ) == 0 ) {
break;
}
for ( e = ldap_first_entry( ld, res ); e != NULL; e = ldap_next_entry( ld, e ) )
{
struct berval **v = ldap_get_values_len( ld, e, attr );
if ( v != NULL ) {
int n = ldap_count_values_len( v );
int j;
values = realloc( values, ( nvalues + n + 1 )*sizeof( char * ) );
for ( j = 0; j < n; j++ ) {
values[ nvalues + j ] = strdup( v[ j ]->bv_val );
}
values[ nvalues + j ] = NULL;
nvalues += n;
ldap_value_free_len( v );
}
}
ldap_msgfree( res );
if ( do_retry == maxretries ) {
fprintf( stderr, "PID=%ld - got %d values.\n", (long) pid, nvalues );
}
for ( i = 0; i < innerloop; i++ ) {
char buf[ BUFSIZ ];
snprintf( buf, sizeof( buf ), "(%s=%s)", attr, values[ rand() % nvalues ] );
2006-03-28 08:14:11 +08:00
do_search( uri, manager, passwd, sbase, buf, &ld, noattrs,
2006-03-25 18:13:30 +08:00
1, maxretries, delay, force, chaserefs );
}
2006-04-06 02:15:30 +08:00
break;
default:
tester_ldap_error( ld, "ldap_search_ext_s" );
break;
}
fprintf( stderr, " PID=%ld - Search done (%d).\n", (long) pid, rc );
if ( ld != NULL ) {
ldap_unbind_ext( ld, NULL, NULL );
}
}
2006-03-28 08:14:11 +08:00
static void
do_search( char *uri, char *manager, struct berval *passwd,
char *sbase, char *filter, LDAP **ldp,
2006-03-28 08:14:11 +08:00
int noattrs, int innerloop, int maxretries, int delay,
2006-03-25 18:13:30 +08:00
int force, int chaserefs )
{
LDAP *ld = ldp ? *ldp : NULL;
int i = 0, do_retry = maxretries;
char *attrs[] = { "cn", "sn", NULL };
pid_t pid = getpid();
int rc = LDAP_SUCCESS;
int version = LDAP_VERSION3;
2006-03-23 08:19:09 +08:00
int first = 1;
retry:;
if ( ld == NULL ) {
ldap_initialize( &ld, uri );
if ( ld == NULL ) {
tester_perror( "ldap_initialize" );
exit( EXIT_FAILURE );
}
(void) ldap_set_option( ld, LDAP_OPT_PROTOCOL_VERSION, &version );
2006-03-25 18:13:30 +08:00
(void) ldap_set_option( ld, LDAP_OPT_REFERRALS,
chaserefs ? LDAP_OPT_ON : LDAP_OPT_OFF );
if ( do_retry == maxretries ) {
fprintf( stderr, "PID=%ld - Search(%d): base=\"%s\", filter=\"%s\".\n",
(long) pid, innerloop, sbase, filter );
}
rc = ldap_sasl_bind_s( ld, manager, LDAP_SASL_SIMPLE, passwd, NULL, NULL, NULL );
if ( rc != LDAP_SUCCESS ) {
tester_ldap_error( ld, "ldap_sasl_bind_s" );
switch ( rc ) {
case LDAP_BUSY:
case LDAP_UNAVAILABLE:
if ( do_retry > 0 ) {
ldap_unbind_ext( ld, NULL, NULL );
do_retry--;
if ( delay != 0 ) {
sleep( delay );
}
goto retry;
}
/* fallthru */
default:
break;
}
exit( EXIT_FAILURE );
}
}
2006-03-04 00:02:34 +08:00
for ( ; i < innerloop; i++ ) {
2006-03-23 08:19:09 +08:00
LDAPMessage *res = NULL;
rc = ldap_search_ext_s( ld, sbase, LDAP_SCOPE_SUBTREE,
2006-03-28 08:14:11 +08:00
filter, attrs, noattrs, NULL, NULL,
2006-03-23 08:19:09 +08:00
NULL, LDAP_NO_LIMIT, &res );
if ( res != NULL ) {
ldap_msgfree( res );
}
switch ( rc ) {
case LDAP_REFERRAL:
/* don't log: it's intended */
if ( force >= 2 ) {
if ( !first ) {
break;
}
first = 0;
}
tester_ldap_error( ld, "ldap_search_ext_s" );
/* fallthru */
case LDAP_SUCCESS:
break;
default:
tester_ldap_error( ld, "ldap_search_ext_s" );
2005-08-18 00:19:58 +08:00
if ( rc == LDAP_BUSY && do_retry > 0 ) {
2006-01-10 00:14:26 +08:00
ldap_unbind_ext( ld, NULL, NULL );
2005-08-18 00:19:58 +08:00
do_retry--;
goto retry;
}
2006-03-23 08:19:09 +08:00
if ( rc != LDAP_NO_SUCH_OBJECT ) {
goto done;
}
break;
}
}
2006-03-23 08:19:09 +08:00
done:;
if ( ldp != NULL ) {
*ldp = ld;
} else {
fprintf( stderr, " PID=%ld - Search done (%d).\n", (long) pid, rc );
if ( ld != NULL ) {
ldap_unbind_ext( ld, NULL, NULL );
}
}
}