Howard Chu
f491c89387
Fix unportable code. Thanks, Hallvard.
1999-07-25 22:13:52 +00:00
Kurt Zeilenga
b9764fff76
Back out paralyzing changes.
1999-07-24 21:40:58 +00:00
Howard Chu
5692be1fe4
Minor changes to support parallel make.
1999-07-24 09:21:34 +00:00
Kurt Zeilenga
a39cf6f93d
Add support for LDAP_ALL_OPERATIONAL_ATTRIBUTES ("+") (based on
...
LDAPext discussions).
Add attrs and attrsonly support to monitor/config info.
Add rdn attributes to schema/monitor/config.
Add extensibleObject objectclass to schema/monitor/config.
Add top objectclass to rootdse/monitor/config.
Remove opattrs option from send_search_entry().
1999-07-24 03:39:23 +00:00
Kurt Zeilenga
06b667b8c6
Move subschemasubentry from "no-user-mod operational" to "operational"
...
as it's not stored the directory.
1999-07-24 02:22:14 +00:00
Kurt Zeilenga
6ba2272321
Adhere to "servers will not return operational attributes" in
...
all cases (including root dse).
1999-07-24 02:12:42 +00:00
Kurt Zeilenga
cabe6ebe16
Really fix subschemasubentry...
1999-07-24 01:27:32 +00:00
Kurt Zeilenga
7ee088518c
Fix subschemasubentry operational attribute.
1999-07-24 00:45:25 +00:00
Julio Sánchez Fernández
44e371d45c
Add missing semicolon.
1999-07-23 09:45:34 +00:00
Randy Kunkee
820ac76ceb
Include sys/param.h on OSF4.0e to define MAXPATHLEN.
1999-07-23 00:59:27 +00:00
Kurt Zeilenga
d147e609d2
Implement TCP_NODELAY on both client and server side.
1999-07-22 21:49:35 +00:00
Kurt Zeilenga
f0c1fc37f5
Fix IP: typo in peername
1999-07-22 20:37:56 +00:00
Kurt Zeilenga
983f43785b
Fix "*" op-attr search
1999-07-22 20:19:18 +00:00
Kurt Zeilenga
766b78765f
Typo made all missed all aliasedobjectname values.
1999-07-22 19:17:16 +00:00
Kurt Zeilenga
c9778dd116
Implement better DN checking... make sure attribute type is
...
an OID or a proper type string (letter followed by 0 or more
alnum/-).
1999-07-22 19:06:56 +00:00
Kurt Zeilenga
68d561a97b
Add limited LDAP_INVALID_DN_SYNTAX support. dn_normalize{,_case}() now returns
...
NULL does not meet basic syntax rules.
1999-07-22 17:14:42 +00:00
Kurt Zeilenga
3f91cffa15
Fix unknown critical extensions.
1999-07-22 05:06:41 +00:00
Kurt Zeilenga
42304b7ada
Fix control parsing and controls free routine.
1999-07-22 04:47:58 +00:00
Kurt Zeilenga
0ed1a76d27
Release writer lock on new parent.
1999-07-22 03:42:02 +00:00
Kurt Zeilenga
5600097ae1
Update ACL field names and usage statement to match -devel post
1999-07-22 00:50:11 +00:00
Kurt Zeilenga
a11630f9b8
Fix maxDeref directive
1999-07-22 00:49:25 +00:00
Kurt Zeilenga
d5b1892ccc
Fix acl parse bug
1999-07-21 21:08:05 +00:00
Kurt Zeilenga
933908f72f
ACL CHANGES:
...
by <who> <access> changed to by <who>+ <access> (joined with AND)
added peername=<regex> sockname=<regex> url=<regex>
removed addr=<regex> (use peername instead).
replace dn_upcase with str2upper and str2lower. Use where needed.
1999-07-21 20:54:23 +00:00
Gary Williams
b8b68f0668
set tls_port to zero if !defined(HAVE_TLS) to satisfy assert in slapd_daemon_init
1999-07-21 15:08:50 +00:00
Julio Sánchez Fernández
f0f29cd82e
Backout the input exhaustion change, it loops. Still looking for
...
the right way.
1999-07-21 13:22:35 +00:00
Gary Williams
f4eb2feba5
use rd instead of i looking for listeners (line 848)
1999-07-20 21:55:06 +00:00
Julio Sánchez Fernández
288a28a762
Add support for TLSVerifyClient.
1999-07-20 18:05:50 +00:00
Julio Sánchez Fernández
504038ffac
Move the input data exhaustion loop to connection.c from daemon.c
1999-07-20 18:03:29 +00:00
Julio Sánchez Fernández
76227acb1f
Move the input data exhaustion loop to connection.c from daemon.c
...
Let transport (TLS or somesuch) force reading or writing on
sockets even if the higher layers think otherwise.
1999-07-20 18:02:44 +00:00
Julio Sánchez Fernández
535cc34421
If we did gethostbyname, we need no further address manipulation.
1999-07-20 11:26:44 +00:00
Kurt Zeilenga
cb94e155ae
Don't call Debug inside a signal handler
1999-07-20 07:11:56 +00:00
Kurt Zeilenga
b2937bee5b
s/struct entry/Entry/
1999-07-19 21:08:59 +00:00
Kurt Zeilenga
598c472bf9
s/backend_db/slap_backend_db/
1999-07-19 21:01:07 +00:00
Kurt Zeilenga
6847e329bc
Fix new URL startup code.
1999-07-19 20:48:19 +00:00
Kurt Zeilenga
170836751a
Namespace changes
...
added slap_ and ldbm_ to many structures
added typedefs to many structures
used typedefs
New main.c argument parsing with ldap url support (replacing -a address).
New sockaddr_in handling and support for multiple listeners.
1999-07-19 19:40:33 +00:00
Hallvard Furuseth
30b3958f94
Introduce got_<gid,uid> (the r1.4 change misbehaved with -user <root>).
...
Also free <user> in !HAVE_GETPWUID case.
1999-07-18 01:04:49 +00:00
Kurt Zeilenga
12f481d657
Import patches mistakenly applied to OPENLDAP_DEVEL_REFERRALS.
...
ldap_modify: delete of last attribute value should delete attribute (ITS#229)
thr_nt: use sleep to yield
1999-07-18 00:33:30 +00:00
Kurt Zeilenga
f92d01c2bb
fix substring_comp_candidates logic if intersection of candidates
...
is ever empty. See ITS#228.
1999-07-16 22:26:57 +00:00
Kurt Zeilenga
059ee8c86d
(re)introduce o_connid such that STATS doesn't need c_mutex (which it
...
didn't bother to acquire)...
1999-07-16 22:24:32 +00:00
Hallvard Furuseth
425bab2c47
Add comment thatPass socklen_t* instead of int* to getsockopt, accept, getpeername, recvfrom
1999-07-16 18:57:11 +00:00
Julio Sánchez Fernández
0053b27ce0
Look on connection_read() if it returns positive so it has a chance
...
to exhaust all protocol units received from the transport layer.
I think this is the necessary fix for the TLS-data-ready/
socket-not-ready issue, but I have not experimented that problem
yet, so I am unsure about its effectiveness.
Now, do we need something like that for connection_write? How would
we go about implementing it?
1999-07-16 18:53:30 +00:00
Julio Sánchez Fernández
ea8669c37d
Clear c_needs_tls_acccept on ldap_pvt_tls_accept errors
1999-07-16 18:48:13 +00:00
Hallvard Furuseth
5ab862aee7
Pass socklen_t* instead of int* to getsockopt, accept, getpeername, recvfrom
1999-07-16 18:43:10 +00:00
Julio Sánchez Fernández
68b508d2f0
Move calls to ldap_pvt_tls_accept to connection_read instead of
...
connection_init so that we get into the select() logic.
Make use of new flags in the connection.
BTW, and before I forget, it sort of works. I have connected with
a Netscape client using a secure connection and did a failed
search (my test database is empty), but the trace looked correct.
Make sure you have your CA certificate in your Netscape preinstalled.
Otherwise, the connection fails with error 0xFFFFFFFF that is rather
uninformative.
1999-07-16 15:52:17 +00:00
Julio Sánchez Fernández
a4a675f987
Two new flags in Connection. One to indicate that it is a raw TLS
...
section (that is, not SASL). The second to indicate that we need to
do SSL_accept on this connection.
1999-07-16 15:43:47 +00:00
Julio Sánchez Fernández
8af470a543
Fix syntax oid for type 2.16.840.1.113730.3.1.34 (ref)
1999-07-16 10:51:31 +00:00
Julio Sánchez Fernández
ac49f25f75
Definitely, 'dn' and 'distinguishedName' are different things. The
...
former is a pseudo attribute type used internally by slapd to represent
the distinguished name of an entry and its existance should not be
visible. The latter is an "abstract" attribute type that is not meant
to exist in practice except as supertype of other dn-valued types.
So, the definition of attribute type 2.5.4.49 has been changed to be
just distinguishedName. Work on the OPENLDAP_DEVEL_SCHEMA branch will
treat pseudo attributes especially and will not be visible to the
clients.
1999-07-16 10:39:40 +00:00
Julio Sánchez Fernández
fd8b582aa9
We should stop using SSL to refer to TLS. This is a first step.
1999-07-16 10:28:51 +00:00
Kurt Zeilenga
73276e84ae
Import experimental referral implementation from OPENLDAP_DEVEL_REFERRALS.
...
Includes support for update referral for each replicated backend.
Reworked replication test to use update referral.
Includes major rewrite of response encoding codes (result.c).
Includes reworked alias support and eliminates old suffix alias codes
(can be emulated using named alias).
Includes (untested) support for the Manage DSA IT control.
Works in LDAPv2 world. Still testing in LDAPv3 world.
Added default referral (test009) test.
1999-07-16 02:45:46 +00:00
Kurt Zeilenga
9568a013a8
Backend lock wasn't being released properly.
1999-07-16 00:16:54 +00:00
Julio Sánchez Fernández
edb1d671f8
Initialize the TLS environment *after* reading the config files.
1999-07-15 21:07:01 +00:00
Julio Sánchez Fernández
fd49eacc4b
Parse more TLS options in slapd.conf
1999-07-15 21:05:08 +00:00
Julio Sánchez Fernández
d92c7c1c7d
A couple of options for TLS configuration. Still a conflict here,
...
the default context is initialized before the config file is read,
so the locations are not know at context initialization.
1999-07-15 15:04:02 +00:00
Julio Sánchez Fernández
1df71e1814
Get rid of two compilation warnings. One is thought to be properly
...
taken care of. The second, however, on remove_old_locks is unclear.
1999-07-14 19:51:35 +00:00
Julio Sánchez Fernández
e74ff638ba
Parsing of flag -T was falling through to the default case.
...
Init the TLS environment if necessary. Lots of things needed here,
in particular, preparing properly the default context.
1999-07-14 19:49:39 +00:00
Julio Sánchez Fernández
6d75d0f8fb
connection_init now takes one more argument that indicates whether to
...
use TLS right away or not on that connection.
1999-07-14 19:44:18 +00:00
Julio Sánchez Fernández
c18d6e7ecf
Only bind on TLS port if explicitly requested with -T, otherwise all
...
kind of conflicts happen when running tests.
1999-07-14 13:39:30 +00:00
Julio Sánchez Fernández
5b7babdee4
Bind and listen on TLS port too
1999-07-14 13:16:13 +00:00
Julio Sánchez Fernández
8542e45380
Extend slapd_args with TLS info
1999-07-14 13:14:54 +00:00
Julio Sánchez Fernández
0dac59ca26
Include $(TLS_LIBS)
1999-07-13 19:15:14 +00:00
Kurt Zeilenga
12b87ceebc
Fix debug message.
1999-07-13 08:24:26 +00:00
Hallvard Furuseth
fb3b8e5ef1
Fix LDAP_CONNECTIONLESS code rot
1999-07-13 06:39:55 +00:00
Hallvard Furuseth
c4a13efbea
Fix NULLxxx -> NULL
1999-07-13 06:37:19 +00:00
Hallvard Furuseth
4e80e9b9f2
Add opattrs=0 arg to send_search_entry() call
1999-07-13 05:05:59 +00:00
Hallvard Furuseth
b5455b8e47
Erase bad space from blank Makefile line
1999-07-13 04:13:21 +00:00
Hallvard Furuseth
55fa595f56
Add missing newline at EOF
1999-07-13 04:11:49 +00:00
Hallvard Furuseth
7e3ede2e01
Erase bad space from blank Makefile line
1999-07-13 04:01:25 +00:00
Kurt Zeilenga
5e14b911e6
Mirror <ac/time.h> inclusion made in re12
1999-07-09 21:10:19 +00:00
Kurt Zeilenga
469baeb3c0
Forgot the most important part of unsolicited notifications... exop!
1999-07-07 18:53:51 +00:00
Kurt Zeilenga
e9c2895472
Add support for unsolicited notifications.
1999-07-07 18:51:39 +00:00
Kurt Zeilenga
b8edef2b2c
Copy LDBM bind "ACL_AUTH" and SASL framework to bdb2.
1999-07-07 18:47:51 +00:00
Kurt Zeilenga
7541ccbe10
Fix CRITICIAL typo.
1999-07-07 18:32:41 +00:00
Kurt Zeilenga
6c1758ae33
Add matching rule assertion structure to filter union.
1999-07-07 18:02:32 +00:00
Kurt Zeilenga
fb593fc5b9
Add controls.c to pick up get_ctrls().
1999-07-05 23:08:43 +00:00
Kurt Zeilenga
32cefa43a0
Add controls.c: initial version of get_ctrls()
1999-07-05 23:04:35 +00:00
Kurt Zeilenga
00086db3f6
Add get_ctrls()...
1999-07-05 23:01:17 +00:00
Kurt Zeilenga
51d1c90887
unifdef -DSLAPD_ACLGROUPS -DSLAPD_ACLAUTH
1999-07-05 06:26:26 +00:00
Kurt Zeilenga
549c89f817
Regarding previous commit:
...
Fix broken ACL macros.
Fix o_dn/o_ndn == NULL vs "".
1999-07-04 19:53:00 +00:00
Kurt Zeilenga
49f39bc4cf
o_dn/o_ndn must not be NULL. Set to "" upon receiving bind request.
1999-07-04 19:37:25 +00:00
Kurt Zeilenga
106eef41d8
HEADS UP: connections are forced to "anonymous" status upon receiving
...
of a bind request and, upon failure, are left "anonymous."
Rework ACL code to hide access testing within macros to facilate additions
and eventual redesign.
Addition of #ifdef SLAPD_ACLAUTH to conditional include EXPERIMENTAL
"auth" access controls. Adds ACL_AUTH "auth" access level (above none,
below "compare"). bind requires anonymous access at this level or above access
to "entry"/"userPassword"/"krbName". This allows administrators to restrict
which entries can be bound to. (This will likely become default behavior
after testing has completed).
1999-07-04 18:46:24 +00:00
Kurt Zeilenga
daf40a51c1
Abandon all operations upon receiving a BindRequest.
1999-07-02 21:42:53 +00:00
Kurt Zeilenga
b7bbc7504d
More bind changes to support SASL/DIGEST.
...
Added configuration support for "digest-realm <realm>" configure directive.
Added connection state and bind_in_progress fields to cn=monitor connection
attribute.
1999-07-02 19:48:07 +00:00
Kurt Zeilenga
175ace59c8
Send LDAP_SASL_BIND_IN_PROGRESS if o_bind_in_progress is true.
1999-07-02 00:46:28 +00:00
Kurt Zeilenga
6f8fad20f2
Add conn/op bind_in_progress flags such that operations can detect
...
if multiple step SASL binds are in progress.
1999-07-02 00:04:47 +00:00
Kurt Zeilenga
97bc107537
Add macros to support testing of error categories to ldap.h
...
Modify ldap_result to assert returned error is not an one reserved
for API use.
Modify frontend LDAP operation routines to return an error code.
The returned value will be used to determine if an unsolicited notification
should be sent to the client.
Need to review returned error codes. Namely some LDAP_PROTOCOL_ERROR
will like need to be changed (as they will cause unsolicited notifications).
1999-07-01 21:20:45 +00:00
Kurt Zeilenga
d7b311c6e1
s/LDAP_NOT_SUPPORTED/LDAP_UNWILLING_TO_PERFORM/
1999-07-01 04:43:48 +00:00
Kurt Zeilenga
ddd0559284
Fairly complete slapd SASL bind parsing... and centralized cleanup code.
...
Update error strings and cldap misuse of server error.
1999-07-01 04:42:01 +00:00
Kurt Zeilenga
129ee42f37
NO-OP SASL parsing... DIGEST-MD5 coming soon.
1999-07-01 03:18:00 +00:00
Kurt Zeilenga
f9db1ea889
Rework BER decoding with lieu of LDAPv3 controls (coming soon).
...
Add place holder for handling LDAPv3 extended operations (coming soon).
1999-06-30 22:43:27 +00:00
Kurt Zeilenga
14820afdd9
Reimplement connection counters. Format of "connection" attribute
...
changed significantly.
1999-06-30 02:50:40 +00:00
Kurt Zeilenga
9225707a06
Modify lutil_passwd to accept a third argument char** methods to
...
specific which methods may be used. This will facilate development
of a slapd config directive "passwordMethod ..." to specify which
methods should be allowed.
1999-06-29 22:24:53 +00:00
Kurt Zeilenga
fe00263875
expose oc_check_operational from schema.c
...
Use everywhere.
Apply search ACLs to operational attributes.
Only provide operational attributes when explicitly requested.
1999-06-29 04:52:55 +00:00
Kurt Zeilenga
a7dfc2aada
Add sasl "mech" argument to backend bind routines.
1999-06-29 03:29:26 +00:00
Kurt Zeilenga
1ee85df297
Add framework for sasl and controls.
1999-06-29 03:17:22 +00:00
Kurt Zeilenga
c0af81253a
remove obsolete file.
1999-06-29 03:01:02 +00:00
Kurt Zeilenga
dcc5bdfe7e
Log out to stderr, add LDAP_VERSION3 support to bind.c and modrdn.c
1999-06-29 01:02:48 +00:00
Kurt Zeilenga
2660d0b42f
Remove old U-Mich v3.0 and OLD_LDAP_* crud.
...
Leave only LDAPv2+ and LDAPv3.
1999-06-29 00:03:34 +00:00
Kurt Zeilenga
cf89dd83cd
don't set unsigned variables to -1 and expect them to be negative.
...
verify uid/gid are positive, not non-negative.
1999-06-27 03:58:06 +00:00
Bastiaan Bakker
5a470f8959
Merged dynamic module support patch (see ITS #196 ). To enable, run ./configure w
...
ith --enable-modules. GLib v1.2 or higher is required.
1999-06-24 17:06:34 +00:00
Bastiaan Bakker
e2b5b21155
Added connection initialisation and destruction notification. Now backends can register functions in backend_info.bi_connection_init and backend_info.bi_connection_destroy that will be called when a connection is initialized or destroyed.
1999-06-23 12:31:35 +00:00