/* $OpenLDAP$ */ /* This work is part of OpenLDAP Software . * * Copyright 1999-2005 The OpenLDAP Foundation. * Portions Copyright 2001-2003 Pierangelo Masarati. * Portions Copyright 1999-2003 Howard Chu. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted only as authorized by the OpenLDAP * Public License. * * A copy of this license is available in the file LICENSE in the * top-level directory of the distribution or, alternatively, at * . */ /* ACKNOWLEDGEMENTS: * This work was initially developed by the Howard Chu for inclusion * in OpenLDAP Software and subsequently enhanced by Pierangelo * Masarati. */ #include "portable.h" #include #include #include #include "slap.h" #include "lutil.h" #include "../back-ldap/back-ldap.h" #undef ldap_debug /* silence a warning in ldap-int.h */ #include "../../../libraries/libldap/ldap-int.h" #include "back-meta.h" static int new_target( metatarget_t *mt ) { struct ldapmapping *mapping; char *rargv[ 3 ]; memset( mt, 0, sizeof( metatarget_t ) ); mt->mt_rwmap.rwm_rw = rewrite_info_init( REWRITE_MODE_USE_DEFAULT ); if ( mt->mt_rwmap.rwm_rw == NULL ) { return -1; } /* * the filter rewrite as a string must be disabled * by default; it can be re-enabled by adding rules; * this creates an empty rewriteContext */ rargv[ 0 ] = "rewriteContext"; rargv[ 1 ] = "searchFilter"; rargv[ 2 ] = NULL; rewrite_parse( mt->mt_rwmap.rwm_rw, "", 1, 2, rargv ); rargv[ 0 ] = "rewriteContext"; rargv[ 1 ] = "default"; rargv[ 2 ] = NULL; rewrite_parse( mt->mt_rwmap.rwm_rw, "", 1, 2, rargv ); ldap_back_map_init( &mt->mt_rwmap.rwm_at, &mapping ); return 0; } int meta_back_db_config( BackendDB *be, const char *fname, int lineno, int argc, char **argv ) { metainfo_t *mi = ( metainfo_t * )be->be_private; if ( mi == NULL ) { fprintf( stderr, "%s: line %d: meta backend info is null!\n", fname, lineno ); return 1; } /* URI of server to query */ if ( strcasecmp( argv[ 0 ], "uri" ) == 0 ) { int i = mi->mi_ntargets; #if 0 int j; #endif /* uncomment if uri MUST be a branch of suffix */ LDAPURLDesc *ludp, *tmpludp; struct berval dn; int rc; if ( argc != 2 ) { fprintf( stderr, "%s: line %d: missing address" " in \"uri ://[:port]/\" line\n", fname, lineno ); return 1; } ++mi->mi_ntargets; mi->mi_targets = ( metatarget_t * )ch_realloc( mi->mi_targets, sizeof( metatarget_t ) * mi->mi_ntargets ); if ( mi->mi_targets == NULL ) { fprintf( stderr, "%s: line %d: out of memory while storing server name" " in \"uri ://[:port]/\" line\n", fname, lineno ); return 1; } if ( new_target( &mi->mi_targets[ i ] ) != 0 ) { fprintf( stderr, "%s: line %d: unable to init server" " in \"uri ://[:port]/\" line\n", fname, lineno ); return 1; } mi->mi_targets[ i ].mt_nretries = mi->mi_nretries; mi->mi_targets[ i ].mt_flags = mi->flags; mi->mi_targets[ i ].mt_version = mi->mi_version; /* * uri MUST be legal! */ if ( ldap_url_parselist_ext( &ludp, argv[ 1 ], "\t" ) != LDAP_SUCCESS ) { fprintf( stderr, "%s: line %d: unable to parse URI" " in \"uri ://[:port]/\" line\n", fname, lineno ); return 1; } /* * uri MUST have the part! */ if ( ludp->lud_dn == NULL || ludp->lud_dn[ 0 ] == '\0' ) { fprintf( stderr, "%s: line %d: missing " " in \"uri ://[:port]/\" line\n", fname, lineno ); return 1; } /* * copies and stores uri and suffix */ dn.bv_val = ludp->lud_dn; dn.bv_len = strlen( ludp->lud_dn ); rc = dnPrettyNormal( NULL, &dn, &mi->mi_targets[ i ].mt_psuffix, &mi->mi_targets[ i ].mt_nsuffix, NULL ); if( rc != LDAP_SUCCESS ) { fprintf( stderr, "%s: line %d: " "target '%s' DN is invalid\n", fname, lineno, argv[ 1 ] ); return( 1 ); } ludp->lud_dn[ 0 ] = '\0'; /* check all, to apply the scope check on the first one */ for ( tmpludp = ludp; tmpludp; tmpludp = tmpludp->lud_next ) { if ( tmpludp->lud_dn != NULL && tmpludp->lud_dn[ 0 ] != '\0' ) { fprintf( stderr, "%s: line %d: " "multiple URIs must have " "no DN part\n", fname, lineno ); return( 1 ); } if ( tmpludp->lud_scope == LDAP_SCOPE_BASE ) { tmpludp->lud_scope = LDAP_SCOPE_DEFAULT; } } mi->mi_targets[ i ].mt_uri = ldap_url_list2urls( ludp ); ldap_free_urllist( ludp ); if ( mi->mi_targets[ i ].mt_uri == NULL) { fprintf( stderr, "%s: line %d: no memory?\n", fname, lineno ); return( 1 ); } /* * uri MUST be a branch of suffix! */ #if 0 /* too strict a constraint */ if ( select_backend( &mi->mi_targets[ i ].suffix, 0, 0 ) != be ) { fprintf( stderr, "%s: line %d: of URI does not refer to current backend" " in \"uri ://[:port]/\" line\n", fname, lineno ); return 1; } #else /* * uri MUST be a branch of a suffix! */ if ( select_backend( &mi->mi_targets[ i ].mt_nsuffix, 0, 0 ) == NULL ) { fprintf( stderr, "%s: line %d: of URI does not resolve to a backend" " in \"uri ://[:port]/\" line\n", fname, lineno ); return 1; } #endif /* default target directive */ } else if ( strcasecmp( argv[ 0 ], "default-target" ) == 0 ) { int i = mi->mi_ntargets - 1; if ( argc == 1 ) { if ( i < 0 ) { fprintf( stderr, "%s: line %d: \"default-target\" alone need be" " inside a \"uri\" directive\n", fname, lineno ); return 1; } mi->mi_defaulttarget = i; } else { if ( strcasecmp( argv[ 1 ], "none" ) == 0 ) { if ( i >= 0 ) { fprintf( stderr, "%s: line %d: \"default-target none\"" " should go before uri definitions\n", fname, lineno ); } mi->mi_defaulttarget = META_DEFAULT_TARGET_NONE; } else { char *next; int n = strtol( argv[ 1 ], &next, 10 ); if ( n < 0 || n >= i - 1 ) { fprintf( stderr, "%s: line %d: illegal target number %d\n", fname, lineno, n ); return 1; } mi->mi_defaulttarget = n; } } /* ttl of dn cache */ } else if ( strcasecmp( argv[ 0 ], "dncache-ttl" ) == 0 ) { if ( argc != 2 ) { fprintf( stderr, "%s: line %d: missing ttl in \"dncache-ttl \" line\n", fname, lineno ); return 1; } if ( strcasecmp( argv[ 1 ], "forever" ) == 0 ) { mi->mi_cache.ttl = META_DNCACHE_FOREVER; } else if ( strcasecmp( argv[ 1 ], "disabled" ) == 0 ) { mi->mi_cache.ttl = META_DNCACHE_DISABLED; } else { mi->mi_cache.ttl = atol( argv[ 1 ] ); } /* network timeout when connecting to ldap servers */ } else if ( strcasecmp( argv[ 0 ], "network-timeout" ) == 0 ) { if ( argc != 2 ) { fprintf( stderr, "%s: line %d: missing network timeout in \"network-timeout \" line\n", fname, lineno ); return 1; } mi->mi_network_timeout = atol(argv[ 1 ]); /* name to use for meta_back_group */ } else if ( strcasecmp( argv[ 0 ], "acl-authcDN" ) == 0 || strcasecmp( argv[ 0 ], "binddn" ) == 0 ) { int i = mi->mi_ntargets - 1; struct berval dn; if ( i < 0 ) { fprintf( stderr, "%s: line %d: need \"uri\" directive first\n", fname, lineno ); return 1; } if ( argc != 2 ) { fprintf( stderr, "%s: line %d: missing name in \"binddn \" line\n", fname, lineno ); return 1; } if ( strcasecmp( argv[ 0 ], "binddn" ) == 0 ) { fprintf( stderr, "%s: line %d: " "\"binddn\" statement is deprecated; " "use \"acl-authcDN\" instead\n", fname, lineno ); /* FIXME: some day we'll need to throw an error */ } dn.bv_val = argv[ 1 ]; dn.bv_len = strlen( argv[ 1 ] ); if ( dnNormalize( 0, NULL, NULL, &dn, &mi->mi_targets[ i ].mt_binddn, NULL ) != LDAP_SUCCESS ) { fprintf( stderr, "%s: line %d: " "bind DN '%s' is invalid\n", fname, lineno, argv[ 1 ] ); return( 1 ); } /* password to use for meta_back_group */ } else if ( strcasecmp( argv[ 0 ], "acl-passwd" ) == 0 || strcasecmp( argv[ 0 ], "bindpw" ) == 0 ) { int i = mi->mi_ntargets - 1; if ( i < 0 ) { fprintf( stderr, "%s: line %d: need \"uri\" directive first\n", fname, lineno ); return 1; } if ( argc != 2 ) { fprintf( stderr, "%s: line %d: missing password in \"bindpw \" line\n", fname, lineno ); return 1; } if ( strcasecmp( argv[ 0 ], "bindpw" ) == 0 ) { fprintf( stderr, "%s: line %d: " "\"bindpw\" statement is deprecated; " "use \"acl-passwd\" instead\n", fname, lineno ); /* FIXME: some day we'll need to throw an error */ } ber_str2bv( argv[ 1 ], 0L, 1, &mi->mi_targets[ i ].mt_bindpw ); /* save bind creds for referral rebinds? */ } else if ( strcasecmp( argv[ 0 ], "rebind-as-user" ) == 0 ) { if (argc != 1) { fprintf( stderr, "%s: line %d: rebind-as-user takes no arguments\n", fname, lineno ); return( 1 ); } mi->flags |= LDAP_BACK_F_SAVECRED; } else if ( strcasecmp( argv[ 0 ], "chase-referrals" ) == 0 ) { unsigned *flagsp = mi->mi_ntargets ? &mi->mi_targets[ mi->mi_ntargets - 1 ].mt_flags : &mi->flags; if ( argc != 2 ) { fprintf( stderr, "%s: line %d: \"chase-referrals\" needs 1 argument.\n", fname, lineno ); return( 1 ); } /* this is the default; we add it because the default might change... */ if ( strcasecmp( argv[ 1 ], "yes" ) == 0 ) { *flagsp |= LDAP_BACK_F_CHASE_REFERRALS; } else if ( strcasecmp( argv[ 1 ], "no" ) == 0 ) { *flagsp &= ~LDAP_BACK_F_CHASE_REFERRALS; } else { fprintf( stderr, "%s: line %d: \"chase-referrals {yes|no}\": unknown argument \"%s\".\n", fname, lineno, argv[ 1 ] ); return( 1 ); } } else if ( strcasecmp( argv[ 0 ], "tls" ) == 0 ) { unsigned *flagsp = mi->mi_ntargets ? &mi->mi_targets[ mi->mi_ntargets - 1 ].mt_flags : &mi->flags; if ( argc != 2 ) { fprintf( stderr, "%s: line %d: \"tls \" needs 1 argument.\n", fname, lineno ); return( 1 ); } /* start */ if ( strcasecmp( argv[ 1 ], "start" ) == 0 ) { *flagsp |= ( LDAP_BACK_F_USE_TLS | LDAP_BACK_F_TLS_CRITICAL ); /* try start tls */ } else if ( strcasecmp( argv[ 1 ], "try-start" ) == 0 ) { *flagsp &= ~LDAP_BACK_F_TLS_CRITICAL; *flagsp |= LDAP_BACK_F_USE_TLS; /* propagate start tls */ } else if ( strcasecmp( argv[ 1 ], "propagate" ) == 0 ) { *flagsp |= ( LDAP_BACK_F_PROPAGATE_TLS | LDAP_BACK_F_TLS_CRITICAL ); /* try start tls */ } else if ( strcasecmp( argv[ 1 ], "try-propagate" ) == 0 ) { *flagsp &= ~LDAP_BACK_F_TLS_CRITICAL; *flagsp |= LDAP_BACK_F_PROPAGATE_TLS; } else { fprintf( stderr, "%s: line %d: \"tls \": unknown argument \"%s\".\n", fname, lineno, argv[ 1 ] ); return( 1 ); } } else if ( strcasecmp( argv[ 0 ], "t-f-support" ) == 0 ) { unsigned *flagsp = mi->mi_ntargets ? &mi->mi_targets[ mi->mi_ntargets - 1 ].mt_flags : &mi->flags; if ( argc != 2 ) { fprintf( stderr, "%s: line %d: \"t-f-support {no|yes|discover}\" needs 1 argument.\n", fname, lineno ); return( 1 ); } if ( strcasecmp( argv[ 1 ], "no" ) == 0 ) { *flagsp &= ~(LDAP_BACK_F_SUPPORT_T_F|LDAP_BACK_F_SUPPORT_T_F_DISCOVER); } else if ( strcasecmp( argv[ 1 ], "yes" ) == 0 ) { *flagsp |= LDAP_BACK_F_SUPPORT_T_F; } else if ( strcasecmp( argv[ 1 ], "discover" ) == 0 ) { *flagsp |= LDAP_BACK_F_SUPPORT_T_F_DISCOVER; } else { fprintf( stderr, "%s: line %d: unknown value \"%s\" for \"t-f-support {no|yes|discover}\".\n", fname, lineno, argv[ 1 ] ); return 1; } /* name to use as pseudo-root dn */ } else if ( strcasecmp( argv[ 0 ], "pseudorootdn" ) == 0 ) { int i = mi->mi_ntargets - 1; struct berval dn; if ( i < 0 ) { fprintf( stderr, "%s: line %d: need \"uri\" directive first\n", fname, lineno ); return 1; } if ( argc != 2 ) { fprintf( stderr, "%s: line %d: missing name in \"pseudorootdn \" line\n", fname, lineno ); return 1; } dn.bv_val = argv[ 1 ]; dn.bv_len = strlen( argv[ 1 ] ); if ( dnNormalize( 0, NULL, NULL, &dn, &mi->mi_targets[ i ].mt_pseudorootdn, NULL ) != LDAP_SUCCESS ) { fprintf( stderr, "%s: line %d: " "pseudoroot DN '%s' is invalid\n", fname, lineno, argv[ 1 ] ); return( 1 ); } /* password to use as pseudo-root */ } else if ( strcasecmp( argv[ 0 ], "pseudorootpw" ) == 0 ) { int i = mi->mi_ntargets - 1; if ( i < 0 ) { fprintf( stderr, "%s: line %d: need \"uri\" directive first\n", fname, lineno ); return 1; } if ( argc != 2 ) { fprintf( stderr, "%s: line %d: missing password in \"pseudorootpw \" line\n", fname, lineno ); return 1; } ber_str2bv( argv[ 1 ], 0L, 1, &mi->mi_targets[ i ].mt_pseudorootpw ); /* dn massaging */ } else if ( strcasecmp( argv[ 0 ], "suffixmassage" ) == 0 ) { BackendDB *tmp_be; int i = mi->mi_ntargets - 1; struct berval dn, nvnc, pvnc, nrnc, prnc; if ( i < 0 ) { fprintf( stderr, "%s: line %d: need \"uri\" directive first\n", fname, lineno ); return 1; } /* * syntax: * * suffixmassage * * the field must be defined as a valid suffix * (or suffixAlias?) for the current database; * the shouldn't have already been * defined as a valid suffix or suffixAlias for the * current server */ if ( argc != 3 ) { fprintf( stderr, "%s: line %d: syntax is \"suffixMassage \"\n", fname, lineno ); return 1; } dn.bv_val = argv[ 1 ]; dn.bv_len = strlen( argv[ 1 ] ); if ( dnPrettyNormal( NULL, &dn, &pvnc, &nvnc, NULL ) != LDAP_SUCCESS ) { fprintf( stderr, "%s: line %d: " "suffix '%s' is invalid\n", fname, lineno, argv[ 1 ] ); return 1; } tmp_be = select_backend( &nvnc, 0, 0 ); if ( tmp_be != NULL && tmp_be != be ) { fprintf( stderr, "%s: line %d: suffix already in use by another backend in" " \"suffixMassage \"\n", fname, lineno ); free( pvnc.bv_val ); free( nvnc.bv_val ); return 1; } dn.bv_val = argv[ 2 ]; dn.bv_len = strlen( argv[ 2 ] ); if ( dnPrettyNormal( NULL, &dn, &prnc, &nrnc, NULL ) != LDAP_SUCCESS ) { fprintf( stderr, "%s: line %d: " "massaged suffix '%s' is invalid\n", fname, lineno, argv[ 2 ] ); free( pvnc.bv_val ); free( nvnc.bv_val ); return 1; } #if 0 tmp_be = select_backend( &nrnc, 0, 0 ); if ( tmp_be != NULL ) { fprintf( stderr, "%s: line %d: massaged suffix already in use by another backend in" " \"suffixMassage \"\n", fname, lineno ); free( pvnc.bv_val ); free( nvnc.bv_val ); free( prnc.bv_val ); free( nrnc.bv_val ); return 1; } #endif /* * The suffix massaging is emulated by means of the * rewrite capabilities * FIXME: no extra rewrite capabilities should be added * to the database */ return suffix_massage_config( mi->mi_targets[ i ].mt_rwmap.rwm_rw, &pvnc, &nvnc, &prnc, &nrnc ); /* rewrite stuff ... */ } else if ( strncasecmp( argv[ 0 ], "rewrite", 7 ) == 0 ) { int i = mi->mi_ntargets - 1; if ( i < 0 ) { fprintf( stderr, "%s: line %d: \"rewrite\" " "statement outside target definition.\n", fname, lineno ); return 1; } return rewrite_parse( mi->mi_targets[ i ].mt_rwmap.rwm_rw, fname, lineno, argc, argv ); /* objectclass/attribute mapping */ } else if ( strcasecmp( argv[ 0 ], "map" ) == 0 ) { int i = mi->mi_ntargets - 1; if ( i < 0 ) { fprintf( stderr, "%s: line %d: need \"uri\" directive first\n", fname, lineno ); return 1; } return ldap_back_map_config( &mi->mi_targets[ i ].mt_rwmap.rwm_oc, &mi->mi_targets[ i ].mt_rwmap.rwm_at, fname, lineno, argc, argv ); } else if ( strcasecmp( argv[ 0 ], "nretries" ) == 0 ) { int i = mi->mi_ntargets - 1; int nretries = META_RETRY_UNDEFINED; if ( argc != 2 ) { fprintf( stderr, "%s: line %d: need value in \"nretries \"\n", fname, lineno ); return 1; } if ( strcasecmp( argv[ 1 ], "forever" ) == 0 ) { nretries = META_RETRY_FOREVER; } else if ( strcasecmp( argv[ 1 ], "never" ) == 0 ) { nretries = META_RETRY_NEVER; } else { char *next; nretries = strtol( argv[ 1 ], &next, 10 ); if ( next == argv[ 1 ] || next[ 0 ] != '\0' ) { fprintf( stderr, "%s: line %d: unable to parse value \"%s\" in \"nretries \"\n", fname, lineno, argv[ 1 ] ); return 1; } } if ( i < 0 ) { mi->mi_nretries = nretries; } else { mi->mi_targets[ i ].mt_nretries = nretries; } /* anything else */ } else { return SLAP_CONF_UNKNOWN; } return 0; } int ldap_back_map_config( struct ldapmap *oc_map, struct ldapmap *at_map, const char *fname, int lineno, int argc, char **argv ) { struct ldapmap *map; struct ldapmapping *mapping; char *src, *dst; int is_oc = 0; if ( argc < 3 || argc > 4 ) { fprintf( stderr, "%s: line %d: syntax is \"map {objectclass | attribute} [ | *] { | *}\"\n", fname, lineno ); return 1; } if ( strcasecmp( argv[ 1 ], "objectclass" ) == 0 ) { map = oc_map; is_oc = 1; } else if ( strcasecmp( argv[ 1 ], "attribute" ) == 0 ) { map = at_map; } else { fprintf( stderr, "%s: line %d: syntax is " "\"map {objectclass | attribute} [ | *] " "{ | *}\"\n", fname, lineno ); return 1; } if ( strcmp( argv[ 2 ], "*" ) == 0 ) { if ( argc < 4 || strcmp( argv[ 3 ], "*" ) == 0 ) { map->drop_missing = ( argc < 4 ); return 0; } src = dst = argv[ 3 ]; } else if ( argc < 4 ) { src = ""; dst = argv[ 2 ]; } else { src = argv[ 2 ]; dst = ( strcmp( argv[ 3 ], "*" ) == 0 ? src : argv[ 3 ] ); } if ( ( map == at_map ) && ( strcasecmp( src, "objectclass" ) == 0 || strcasecmp( dst, "objectclass" ) == 0 ) ) { fprintf( stderr, "%s: line %d: objectclass attribute cannot be mapped\n", fname, lineno ); } mapping = (struct ldapmapping *)ch_calloc( 2, sizeof(struct ldapmapping) ); if ( mapping == NULL ) { fprintf( stderr, "%s: line %d: out of memory\n", fname, lineno ); return 1; } ber_str2bv( src, 0, 1, &mapping->src ); ber_str2bv( dst, 0, 1, &mapping->dst ); mapping[ 1 ].src = mapping->dst; mapping[ 1 ].dst = mapping->src; /* * schema check */ if ( is_oc ) { if ( src[ 0 ] != '\0' ) { if ( oc_bvfind( &mapping->src ) == NULL ) { fprintf( stderr, "%s: line %d: warning, source objectClass '%s' " "should be defined in schema\n", fname, lineno, src ); /* * FIXME: this should become an err */ goto error_return; } } if ( oc_bvfind( &mapping->dst ) == NULL ) { fprintf( stderr, "%s: line %d: warning, destination objectClass '%s' " "is not defined in schema\n", fname, lineno, dst ); } } else { int rc; const char *text = NULL; AttributeDescription *ad = NULL; if ( src[ 0 ] != '\0' ) { rc = slap_bv2ad( &mapping->src, &ad, &text ); if ( rc != LDAP_SUCCESS ) { fprintf( stderr, "%s: line %d: warning, source attributeType '%s' " "should be defined in schema\n", fname, lineno, src ); /* * FIXME: this should become an err */ goto error_return; } ad = NULL; } rc = slap_bv2ad( &mapping->dst, &ad, &text ); if ( rc != LDAP_SUCCESS ) { fprintf( stderr, "%s: line %d: warning, destination attributeType '%s' " "is not defined in schema\n", fname, lineno, dst ); } } if ( (src[ 0 ] != '\0' && avl_find( map->map, (caddr_t)mapping, mapping_cmp ) != NULL) || avl_find( map->remap, (caddr_t)&mapping[ 1 ], mapping_cmp ) != NULL) { fprintf( stderr, "%s: line %d: duplicate mapping found" SLAPD_CONF_UNKNOWN_IGNORED ".\n", fname, lineno ); goto error_return; } if ( src[ 0 ] != '\0' ) { avl_insert( &map->map, (caddr_t)mapping, mapping_cmp, mapping_dup ); } avl_insert( &map->remap, (caddr_t)&mapping[ 1 ], mapping_cmp, mapping_dup ); return 0; error_return:; if ( mapping ) { ch_free( mapping->src.bv_val ); ch_free( mapping->dst.bv_val ); ch_free( mapping ); } return 1; } #ifdef ENABLE_REWRITE static char * suffix_massage_regexize( const char *s ) { char *res, *ptr; const char *p, *r; int i; for ( i = 0, p = s; ( r = strchr( p, ',' ) ) != NULL; p = r + 1, i++ ) ; res = ch_calloc( sizeof( char ), strlen( s ) + STRLENOF( "(.+,)?" ) + STRLENOF( "[ ]?" ) * i + 1 ); ptr = lutil_strcopy( res, "(.+,)?" ); for ( i = 0, p = s; ( r = strchr( p, ',' ) ) != NULL; p = r + 1 , i++ ) { ptr = lutil_strncopy( ptr, p, r - p + 1 ); ptr = lutil_strcopy( ptr, "[ ]?" ); if ( r[ 1 ] == ' ' ) { r++; } } lutil_strcopy( ptr, p ); return res; } static char * suffix_massage_patternize( const char *s ) { ber_len_t len; char *res; len = strlen( s ); res = ch_calloc( sizeof( char ), len + STRLENOF( "%1" ) + 1 ); if ( res == NULL ) { return NULL; } strcpy( res, "%1" ); strcpy( &res[ STRLENOF( "%1" ) ], s ); return res; } int suffix_massage_config( struct rewrite_info *info, struct berval *pvnc, struct berval *nvnc, struct berval *prnc, struct berval *nrnc ) { char *rargv[ 5 ]; int line = 0; rargv[ 0 ] = "rewriteEngine"; rargv[ 1 ] = "on"; rargv[ 2 ] = NULL; rewrite_parse( info, "", ++line, 2, rargv ); rargv[ 0 ] = "rewriteContext"; rargv[ 1 ] = "default"; rargv[ 2 ] = NULL; rewrite_parse( info, "", ++line, 2, rargv ); rargv[ 0 ] = "rewriteRule"; rargv[ 1 ] = suffix_massage_regexize( pvnc->bv_val ); rargv[ 2 ] = suffix_massage_patternize( prnc->bv_val ); rargv[ 3 ] = ":"; rargv[ 4 ] = NULL; rewrite_parse( info, "", ++line, 4, rargv ); ch_free( rargv[ 1 ] ); ch_free( rargv[ 2 ] ); rargv[ 0 ] = "rewriteContext"; rargv[ 1 ] = "searchEntryDN"; rargv[ 2 ] = NULL; rewrite_parse( info, "", ++line, 2, rargv ); rargv[ 0 ] = "rewriteRule"; rargv[ 1 ] = suffix_massage_regexize( prnc->bv_val ); rargv[ 2 ] = suffix_massage_patternize( pvnc->bv_val ); rargv[ 3 ] = ":"; rargv[ 4 ] = NULL; rewrite_parse( info, "", ++line, 4, rargv ); ch_free( rargv[ 1 ] ); ch_free( rargv[ 2 ] ); /* backward compatibility */ rargv[ 0 ] = "rewriteContext"; rargv[ 1 ] = "searchResult"; rargv[ 2 ] = "alias"; rargv[ 3 ] = "searchEntryDN"; rargv[ 4 ] = NULL; rewrite_parse( info, "", ++line, 4, rargv ); rargv[ 0 ] = "rewriteContext"; rargv[ 1 ] = "matchedDN"; rargv[ 2 ] = "alias"; rargv[ 3 ] = "searchEntryDN"; rargv[ 4 ] = NULL; rewrite_parse( info, "", ++line, 4, rargv ); rargv[ 0 ] = "rewriteContext"; rargv[ 1 ] = "searchAttrDN"; rargv[ 2 ] = "alias"; rargv[ 3 ] = "searchEntryDN"; rargv[ 4 ] = NULL; rewrite_parse( info, "", ++line, 4, rargv ); /* NOTE: this corresponds to #undef'ining RWM_REFERRAL_REWRITE; * see servers/slapd/overlays/rwm.h for details */ rargv[ 0 ] = "rewriteContext"; rargv[ 1 ] = "referralAttrDN"; rargv[ 2 ] = NULL; rewrite_parse( info, "", ++line, 2, rargv ); rargv[ 0 ] = "rewriteContext"; rargv[ 1 ] = "referralDN"; rargv[ 2 ] = NULL; rewrite_parse( info, "", ++line, 2, rargv ); return 0; } #endif /* ENABLE_REWRITE */