/* search.c - search operation */ /* $OpenLDAP$ */ /* * Copyright 1998-2000 The OpenLDAP Foundation, All Rights Reserved. * COPYING RESTRICTIONS APPLY, see COPYRIGHT file */ #include "portable.h" #include #include #include "back-bdb.h" #include "idl.h" #include "external.h" static int base_candidate( BackendDB *be, Entry *e, ID *ids ); static int search_candidates( BackendDB *be, Entry *e, Filter *filter, int scope, int deref, int manageDSAit, ID *ids ); int bdb_search( BackendDB *be, Connection *conn, Operation *op, const char *base, const char *nbase, int scope, int deref, int slimit, int tlimit, Filter *filter, const char *filterstr, char **attrs, int attrsonly ) { struct bdb_info *bdb = (struct bdb_info *) be->be_private; int abandon; int rc; const char *text = NULL; time_t stoptime; ID id, cursor; ID candidates[BDB_IDL_UM_SIZE]; Entry *e = NULL; struct berval **v2refs = NULL; Entry *matched = NULL; char *realbase = NULL; int nentries = 0; int manageDSAit; struct slap_limits_set *limit = NULL; int isroot = 0; Debug( LDAP_DEBUG_TRACE, "=> bdb_back_search\n", 0, 0, 0); manageDSAit = get_manageDSAit( op ); if ( *nbase == '\0' ) { /* DIT root special case */ e = (Entry *) &slap_entry_root; rc = 0; } else #ifdef BDB_ALIASES /* get entry with reader lock */ if ( deref & LDAP_DEREF_FINDING ) { e = deref_dn_r( be, nbase, &err, &matched, &text ); } else #endif { rc = bdb_dn2entry( be, NULL, nbase, &e, &matched, 0 ); } switch(rc) { case DB_NOTFOUND: case 0: break; default: send_ldap_result( conn, op, rc=LDAP_OTHER, NULL, "internal error", NULL, NULL ); return rc; } if ( e == NULL ) { char *matched_dn = NULL; struct berval **refs = NULL; if ( matched != NULL ) { struct berval **erefs; matched_dn = ch_strdup( matched->e_dn ); erefs = is_entry_referral( matched ) ? get_entry_referrals( be, conn, op, matched, base, scope ) : NULL; bdb_entry_return( be, matched ); matched = NULL; if( erefs ) { refs = referral_rewrite( erefs, matched_dn, base, scope ); ber_bvecfree( erefs ); } } else { refs = referral_rewrite( default_referral, NULL, base, scope ); } send_ldap_result( conn, op, rc=LDAP_REFERRAL , matched_dn, text, refs, NULL ); ber_bvecfree( refs ); free( matched_dn ); return rc; } if (!manageDSAit && e != &slap_entry_root && is_entry_referral( e ) ) { /* entry is a referral, don't allow add */ char *matched_dn = ch_strdup( e->e_dn ); struct berval **erefs = get_entry_referrals( be, conn, op, e, base, scope ); struct berval **refs = NULL; bdb_entry_return( be, e ); e = NULL; if( erefs ) { refs = referral_rewrite( erefs, matched_dn, base, scope ); ber_bvecfree( erefs ); } Debug( LDAP_DEBUG_TRACE, "bdb_search: entry is referral\n", 0, 0, 0 ); send_ldap_result( conn, op, LDAP_REFERRAL, matched_dn, refs ? NULL : "bad referral object", refs, NULL ); ber_bvecfree( refs ); free( matched_dn ); return 1; } /* if not root, get appropriate limits */ if ( be_isroot( be, op->o_ndn ) ) { isroot = 1; } else { ( void ) get_limits( be, op->o_ndn, &limit ); } /* The time/size limits come first because they require very little * effort, so there's no chance the candidates are selected and then * the request is not honored only because of time/size constraints */ /* if no time limit requested, use soft limit (unless root!) */ if ( isroot ) { if ( tlimit == 0 ) { tlimit = -1; /* allow root to set no limit */ } if ( slimit == 0 ) { slimit = -1; } } else { /* if no limit is required, use soft limit */ if ( tlimit <= 0 ) { tlimit = limit->lms_t_soft; /* if requested limit higher than hard limit, abort */ } else if ( tlimit > limit->lms_t_hard ) { /* no hard limit means use soft instead */ if ( limit->lms_t_hard == 0 ) { tlimit = limit->lms_t_soft; /* positive hard limit means abort */ } else if ( limit->lms_t_hard > 0 ) { send_search_result( conn, op, LDAP_UNWILLING_TO_PERFORM, NULL, NULL, NULL, NULL, 0 ); rc = 0; goto done; } /* negative hard limit means no limit */ } /* if no limit is required, use soft limit */ if ( slimit <= 0 ) { slimit = limit->lms_s_soft; /* if requested limit higher than hard limit, abort */ } else if ( slimit > limit->lms_s_hard ) { /* no hard limit means use soft instead */ if ( limit->lms_s_hard == 0 ) { slimit = limit->lms_s_soft; /* positive hard limit means abort */ } else if ( limit->lms_s_hard > 0 ) { send_search_result( conn, op, LDAP_UNWILLING_TO_PERFORM, NULL, NULL, NULL, NULL, 0 ); rc = 0; goto done; } /* negative hard limit means no limit */ } } /* compute it anyway; root does not use it */ stoptime = op->o_time + tlimit; /* select candidates */ if ( scope == LDAP_SCOPE_BASE ) { rc = base_candidate( be, e, candidates ); } else { BDB_IDL_ALL( bdb, candidates ); rc = search_candidates( be, e, filter, scope, deref, manageDSAit, candidates ); } /* need normalized dn below */ realbase = ch_strdup( e->e_ndn ); /* start cursor at base entry's id * FIXME: hack to make "" base work */ cursor = e->e_id == NOID ? 1 : e->e_id; if ( e != &slap_entry_root ) { bdb_entry_return( be, e ); } e = NULL; if ( candidates[0] == 0 ) { Debug( LDAP_DEBUG_TRACE, "bdb_search: no candidates\n", 0, 0, 0 ); send_search_result( conn, op, LDAP_SUCCESS, NULL, NULL, NULL, NULL, 0 ); rc = 1; goto done; } /* if not root and candidates exceed to-be-checked entries, abort */ if ( !isroot && limit->lms_s_unchecked != -1 ) { if ( BDB_IDL_N(candidates) > limit->lms_s_unchecked ) { send_search_result( conn, op, LDAP_UNWILLING_TO_PERFORM, NULL, NULL, NULL, NULL, 0 ); rc = 1; goto done; } } for ( id = bdb_idl_first( candidates, &cursor ); id != NOID; id = bdb_idl_next( candidates, &cursor ) ) { int scopeok = 0; /* check for abandon */ ldap_pvt_thread_mutex_lock( &op->o_abandonmutex ); abandon = op->o_abandon; ldap_pvt_thread_mutex_unlock( &op->o_abandonmutex ); if ( abandon ) { rc = 0; goto done; } /* check time limit */ if ( tlimit != -1 && slap_get_time() > stoptime ) { send_search_result( conn, op, rc = LDAP_TIMELIMIT_EXCEEDED, NULL, NULL, v2refs, NULL, nentries ); goto done; } /* get the entry with reader lock */ rc = bdb_id2entry( be, NULL, id, &e ); if ( e == NULL ) { if( !BDB_IDL_IS_RANGE(candidates) ) { /* only complain for non-range IDLs */ Debug( LDAP_DEBUG_TRACE, "bdb_search: candidate %ld not found\n", (long) id, 0, 0 ); } goto loop_continue; } #ifdef BDB_ALIASES if ( deref & LDAP_DEREF_SEARCHING && is_entry_alias( e ) ) { Entry *matched; int err; const char *text; e = deref_entry_r( be, e, &err, &matched, &text ); if( e == NULL ) { e = matched; goto loop_continue; } if( e->e_id == id ) { /* circular loop */ goto loop_continue; } /* need to skip alias which deref into scope */ if( scope & LDAP_SCOPE_ONELEVEL ) { char *pdn = dn_parent( NULL, e->e_ndn ); if ( pdn != NULL ) { if( strcmp( pdn, realbase ) ) { free( pdn ); goto loop_continue; } free(pdn); } } else if ( dn_issuffix( e->e_ndn, realbase ) ) { /* alias is within scope */ Debug( LDAP_DEBUG_TRACE, "bdb_search: \"%s\" in subtree\n", e->e_dn, 0, 0 ); goto loop_continue; } scopeok = 1; } #endif /* * if it's a referral, add it to the list of referrals. only do * this for non-base searches, and don't check the filter * explicitly here since it's only a candidate anyway. */ if ( !manageDSAit && scope != LDAP_SCOPE_BASE && is_entry_referral( e ) ) { struct berval **refs = get_entry_referrals( be, conn, op, e, NULL, scope ); send_search_reference( be, conn, op, e, refs, NULL, &v2refs ); ber_bvecfree( refs ); goto loop_continue; } /* if it matches the filter and scope, send it */ rc = test_filter( be, conn, op, e, filter ); if ( rc == LDAP_COMPARE_TRUE ) { char *dn; /* check scope */ if ( !scopeok && scope == LDAP_SCOPE_ONELEVEL ) { if ( (dn = dn_parent( be, e->e_ndn )) != NULL ) { (void) dn_normalize( dn ); scopeok = (dn == realbase) ? 1 : (strcmp( dn, realbase ) ? 0 : 1 ); free( dn ); } else { scopeok = (realbase == NULL || *realbase == '\0'); } } else if ( !scopeok && scope == LDAP_SCOPE_SUBTREE ) { dn = ch_strdup( e->e_ndn ); scopeok = dn_issuffix( dn, realbase ); free( dn ); } else { scopeok = 1; } if ( scopeok ) { /* check size limit */ if ( --slimit == -1 ) { bdb_entry_return( be, e ); e = NULL; send_search_result( conn, op, rc = LDAP_SIZELIMIT_EXCEEDED, NULL, NULL, v2refs, NULL, nentries ); goto done; } if (e) { int result = send_search_entry( be, conn, op, e, attrs, attrsonly, NULL); switch (result) { case 0: /* entry sent ok */ nentries++; break; case 1: /* entry not sent */ break; case -1: /* connection closed */ bdb_entry_return( be, e ); e = NULL; rc = LDAP_OTHER; goto done; } } } else { Debug( LDAP_DEBUG_TRACE, "bdb_search: %ld scope not okay\n", (long) id, 0, 0 ); } } else { Debug( LDAP_DEBUG_TRACE, "bdb_search: %ld does match filter\n", (long) id, 0, 0 ); } loop_continue: if( e != NULL ) { /* free reader lock */ bdb_entry_return( be, e ); } ldap_pvt_thread_yield(); } send_search_result( conn, op, v2refs == NULL ? LDAP_SUCCESS : LDAP_REFERRAL, NULL, NULL, v2refs, NULL, nentries ); rc = 0; done: ber_bvecfree( v2refs ); if( realbase ) ch_free( realbase ); return rc; } static int base_candidate( BackendDB *be, Entry *e, ID *ids ) { Debug(LDAP_DEBUG_ARGS, "base_candidates: base: \"%s\" (0x%08lx)\n", e->e_dn, (long) e->e_id, 0); ids[0] = 1; ids[1] = e->e_id; return 0; } /* Is "objectClass=xx" mentioned anywhere in this filter? Presence * doesn't count, we're looking for explicit values. */ static int oc_filter( Filter *f ) { int rc = 0; switch(f->f_choice) { case LDAP_FILTER_EQUALITY: case LDAP_FILTER_APPROX: if (f->f_av_desc == slap_schema.si_ad_objectClass) rc = 1; break; case LDAP_FILTER_SUBSTRINGS: if (f->f_sub_desc == slap_schema.si_ad_objectClass) rc = 1; break; case LDAP_FILTER_AND: case LDAP_FILTER_OR: for (f=f->f_and; f; f=f->f_next) if ((rc = oc_filter(f))) break; break; default: break; } return rc; } static int search_candidates( BackendDB *be, Entry *e, Filter *filter, int scope, int deref, int manageDSAit, ID *ids ) { int rc; Filter f, fand, rf, xf; ID tmp[BDB_IDL_UM_SIZE]; AttributeAssertion aa_ref; struct bdb_info *bdb = (struct bdb_info *) be->be_private; #ifdef BDB_ALIASES Filter af; AttributeAssertion aa_alias; #endif Debug(LDAP_DEBUG_TRACE, "search_candidates: base=\"%s\" (0x%08lx) scope=%d\n", e->e_dn, (long) e->e_id, scope ); xf.f_or = filter; xf.f_choice = LDAP_FILTER_OR; xf.f_next = NULL; /* If the user's filter doesn't mention objectClass, or if * it just uses objectClass=*, these clauses are redundant. */ if (oc_filter(filter)) { if( !manageDSAit ) { /* match referrals */ static struct berval bv_ref = { sizeof("REFERRAL")-1, "REFERRAL" }; rf.f_choice = LDAP_FILTER_EQUALITY; rf.f_ava = &aa_ref; rf.f_av_desc = slap_schema.si_ad_objectClass; rf.f_av_value = &bv_ref; rf.f_next = xf.f_or; xf.f_or = &rf; } #ifdef BDB_ALIASES if( deref & LDAP_DEREF_SEARCHING ) { /* match aliases */ static struct berval bv_alias = { sizeof("ALIAS")-1, "ALIAS" }; af.f_choice = LDAP_FILTER_EQUALITY; af.f_ava = &aa_alias; af.f_av_desc = slap_schema.si_ad_objectClass; af.f_av_value = &bv_alias; af.f_next = xf.f_or; xf.f_or = ⁡ } #endif } f.f_next = NULL; f.f_choice = LDAP_FILTER_AND; f.f_and = &fand; fand.f_choice = scope == LDAP_SCOPE_SUBTREE ? SLAPD_FILTER_DN_SUBTREE : SLAPD_FILTER_DN_ONE; fand.f_dn = e->e_ndn; fand.f_next = xf.f_or == filter ? filter : &xf ; #ifdef BDB_FILTER_INDICES rc = bdb_filter_candidates( be, &f, ids, tmp ); #else /* FIXME: Original code: BDB_IDL_ID( bdb, ids, e->e_id ); * this is a hack to make "" base work; when bdb_filter_candidates * is used this should not be needed any more */ BDB_IDL_ID( bdb, ids, (e->e_id == NOID ? 1 : e->e_id) ); rc = 0; #endif Debug(LDAP_DEBUG_TRACE, "bdb_search_candidates: id=%ld first=%ld last=%ld\n", (long) ids[0], (long) BDB_IDL_FIRST(ids), (long) BDB_IDL_LAST(ids) ); return rc; }