/* slapcommon.c - common routine for the slap tools */ /* $OpenLDAP$ */ /* This work is part of OpenLDAP Software . * * Copyright 1998-2004 The OpenLDAP Foundation. * Portions Copyright 1998-2003 Kurt D. Zeilenga. * Portions Copyright 2003 IBM Corporation. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted only as authorized by the OpenLDAP * Public License. * * A copy of this license is available in file LICENSE in the * top-level directory of the distribution or, alternatively, at * . */ /* ACKNOWLEDGEMENTS: * This work was initially developed by Kurt Zeilenga for inclusion * in OpenLDAP Software. Additional signficant contributors include * Jong Hyuk Choi * Hallvard B. Furuseth * Howard Chu * Pierangelo Masarati */ #include "portable.h" #include #include #include #include #include #include #include "slapcommon.h" #include "lutil.h" tool_vars tool_globals; #ifdef CSRIMALLOC static char *leakfilename; static FILE *leakfile; #endif static void usage( int tool, const char *progname ) { char *options = NULL; fprintf( stderr, "usage: %s [-v] [-c] [-d debuglevel] [-f configfile]\n", progname ); switch( tool ) { case SLAPADD: options = "\t[-n databasenumber | -b suffix]\n" "\t[-l ldiffile] [-u] [-p [-w] | -r [-i syncreplidlist] [-w]]\n"; break; case SLAPCAT: options = "\t[-n databasenumber | -b suffix]" " [-l ldiffile] [-a filter] [-m] [-k]\n"; break; case SLAPDN: options = "\tDN [...]\n"; break; case SLAPINDEX: options = "\t[-n databasenumber | -b suffix]\n"; break; case SLAPAUTH: options = "\t[-U authcID] [-X authzID] [-R realm] [-M mech] ID [...]\n"; break; case SLAPACL: options = "\t[-U authcID | -D authcDN]" " -b DN [attr[/access][:value]] [...]\n"; break; } if ( options != NULL ) { fputs( options, stderr ); } exit( EXIT_FAILURE ); } /* * slap_tool_init - initialize slap utility, handle program options. * arguments: * name program name * tool tool code * argc, argv command line arguments */ void slap_tool_init( const char* progname, int tool, int argc, char **argv ) { char *options; char *conffile = SLAPD_DEFAULT_CONFIGFILE; struct berval base = BER_BVNULL; char *filterstr = NULL; char *subtree = NULL; char *ldiffile = NULL; int rc, i, dbnum; int mode = SLAP_TOOL_MODE; int truncatemode = 0; #ifdef CSRIMALLOC leakfilename = malloc( strlen( progname ) + STRLEOF( ".leak" ) - 1 ); sprintf( leakfilename, "%s.leak", progname ); if( ( leakfile = fopen( leakfilename, "w" )) == NULL ) { leakfile = stderr; } free( leakfilename ); #endif switch( tool ) { case SLAPADD: options = "b:cd:f:i:l:n:prtuvWw"; break; case SLAPCAT: options = "a:b:cd:f:kl:mn:s:v"; mode |= SLAP_TOOL_READMAIN | SLAP_TOOL_READONLY; break; case SLAPDN: case SLAPTEST: options = "d:f:v"; mode |= SLAP_TOOL_READMAIN | SLAP_TOOL_READONLY; break; case SLAPAUTH: options = "d:f:M:R:U:vX:"; mode |= SLAP_TOOL_READMAIN | SLAP_TOOL_READONLY; break; case SLAPINDEX: options = "b:cd:f:n:v"; mode |= SLAP_TOOL_READMAIN; break; case SLAPACL: options = "b:D:d:f:U:v"; mode |= SLAP_TOOL_READMAIN | SLAP_TOOL_READONLY; break; default: fprintf( stderr, "%s: unknown tool mode (%d)\n", progname, tool ); exit( EXIT_FAILURE ); } dbnum = -1; while ( (i = getopt( argc, argv, options )) != EOF ) { switch ( i ) { case 'a': filterstr = strdup( optarg ); break; case 'b': ber_str2bv( optarg, 0, 1, &base ); break; case 'c': /* enable continue mode */ continuemode++; break; case 'd': /* turn on debugging */ ldap_debug += atoi( optarg ); break; case 'D': ber_str2bv( optarg, 0, 1, &authcDN ); break; case 'f': /* specify a conf file */ conffile = strdup( optarg ); break; case 'i': /* specify syncrepl id list */ replica_id_string = strdup( optarg ); if ( !isdigit( (unsigned char) *replica_id_string )) { usage( tool, progname ); exit( EXIT_FAILURE ); } slap_str2clist( &replica_id_strlist, replica_id_string, "," ); for ( i = 0; replica_id_strlist && replica_id_strlist[i]; i++ ) ; replica_id_list = ch_calloc( i + 1, sizeof( int ) ); for ( i = 0; replica_id_strlist && replica_id_strlist[i]; i++ ) { replica_id_list[i] = atoi( replica_id_strlist[i] ); if ( replica_id_list[i] >= 1000 ) { fprintf(stderr, "%s: syncrepl id %d is out of range [0..999]\n", progname, replica_id_list[i] ); exit( EXIT_FAILURE ); } } replica_id_list[i] = -1; break; case 'k': /* Retrieve sync cookie entry */ retrieve_synccookie = 1; break; case 'l': /* LDIF file */ ldiffile = strdup( optarg ); break; case 'm': /* Retrieve ldapsync entry */ retrieve_ctxcsn = 1; break; case 'M': ber_str2bv( optarg, 0, 0, &mech ); break; case 'n': /* which config file db to index */ dbnum = atoi( optarg ) - 1; break; case 'p': /* replica promotion */ replica_promotion = 1; break; case 'r': /* replica demotion */ replica_demotion = 1; break; case 'R': realm = optarg; break; case 's': /* dump subtree */ subtree = strdup( optarg ); break; case 't': /* turn on truncate */ truncatemode++; mode |= SLAP_TRUNCATE_MODE; break; case 'U': ber_str2bv( optarg, 0, 0, &authcID ); break; case 'u': /* dry run */ dryrun++; break; case 'v': /* turn on verbose */ verbose++; break; case 'W': /* write context csn on every entry add */ update_ctxcsn = SLAP_TOOL_CTXCSN_BATCH; /* FIXME : update_ctxcsn = SLAP_TOOL_CTXCSN_ENTRY; */ break; case 'w': /* write context csn on at the end */ update_ctxcsn = SLAP_TOOL_CTXCSN_BATCH; break; case 'X': ber_str2bv( optarg, 0, 0, &authzID ); break; default: usage( tool, progname ); break; } } switch ( tool ) { case SLAPADD: case SLAPCAT: case SLAPINDEX: if ( ( argc != optind ) || (dbnum >= 0 && base.bv_val != NULL ) ) { usage( tool, progname ); } if ( replica_promotion && replica_demotion ) { usage( tool, progname ); } else if ( !replica_promotion && !replica_demotion ) { if ( update_ctxcsn != SLAP_TOOL_CTXCSN_KEEP ) { usage( tool, progname ); } } break; case SLAPDN: if ( argc == optind ) { usage( tool, progname ); } break; case SLAPAUTH: if ( argc == optind && BER_BVISNULL( &authcID ) ) { usage( tool, progname ); } break; case SLAPTEST: if ( argc != optind ) { usage( tool, progname ); } break; case SLAPACL: if ( !BER_BVISNULL( &authcDN ) && !BER_BVISNULL( &authcID ) ) { usage( tool, progname ); } if ( BER_BVISNULL( &base ) ) { usage( tool, progname ); } ber_dupbv( &baseDN, &base ); break; default: break; } if ( ldiffile == NULL ) { ldiffp = tool == SLAPCAT ? stdout : stdin; } else if ((ldiffp = fopen( ldiffile, tool == SLAPCAT ? "w" : "r" )) == NULL ) { perror( ldiffile ); exit( EXIT_FAILURE ); } /* * initialize stuff and figure out which backend we're dealing with */ #ifdef SLAPD_MODULES if ( module_init() != 0 ) { fprintf( stderr, "%s: module_init failed!\n", progname ); exit( EXIT_FAILURE ); } #endif rc = slap_init( mode, progname ); if ( rc != 0 ) { fprintf( stderr, "%s: slap_init failed!\n", progname ); exit( EXIT_FAILURE ); } rc = slap_schema_init(); if ( rc != 0 ) { fprintf( stderr, "%s: slap_schema_init failed!\n", progname ); exit( EXIT_FAILURE ); } if ( frontend_init() ) { fprintf( stderr, "%s: frontend_init failed!\n", progname ); exit( EXIT_FAILURE ); } if ( overlay_init() ) { fprintf( stderr, "%s: overlay_init failed!\n", progname ); exit( EXIT_FAILURE ); } rc = read_config( conffile, 0 ); if ( rc != 0 ) { fprintf( stderr, "%s: bad configuration file!\n", progname ); exit( EXIT_FAILURE ); } ldap_syslog = 0; switch ( tool ) { case SLAPADD: case SLAPCAT: case SLAPINDEX: if ( !nbackends ) { fprintf( stderr, "No databases found " "in config file\n" ); exit( EXIT_FAILURE ); } break; default: break; } rc = slap_schema_check(); if ( rc != 0 ) { fprintf( stderr, "%s: slap_schema_prep failed!\n", progname ); exit( EXIT_FAILURE ); } switch ( tool ) { case SLAPDN: case SLAPTEST: case SLAPAUTH: be = NULL; goto startup; default: break; } if( filterstr ) { filter = str2filter( filterstr ); if( filter == NULL ) { fprintf( stderr, "Invalid filter '%s'\n", filterstr ); exit( EXIT_FAILURE ); } } if( subtree ) { struct berval val; ber_str2bv( subtree, 0, 0, &val ); rc = dnNormalize( 0, NULL, NULL, &val, &sub_ndn, NULL ); if( rc != LDAP_SUCCESS ) { fprintf( stderr, "Invalid subtree DN '%s'\n", subtree ); exit( EXIT_FAILURE ); } if ( BER_BVISNULL( &base ) && dbnum == -1 ) { base = val; } else { free( subtree ); } } if( base.bv_val != NULL ) { struct berval nbase; rc = dnNormalize( 0, NULL, NULL, &base, &nbase, NULL ); if( rc != LDAP_SUCCESS ) { fprintf( stderr, "%s: slap_init invalid suffix (\"%s\")\n", progname, base.bv_val ); exit( EXIT_FAILURE ); } be = select_backend( &nbase, 0, 0 ); ber_memfree( nbase.bv_val ); switch ( tool ) { case SLAPACL: goto startup; default: break; } if( be == NULL ) { fprintf( stderr, "%s: slap_init no backend for \"%s\"\n", progname, base.bv_val ); exit( EXIT_FAILURE ); } /* If the named base is a glue master, operate on the * entire context */ if (SLAP_GLUE_INSTANCE(be)) { nosubordinates = 1; } } else if ( dbnum == -1 ) { if ( nbackends <= 0 ) { fprintf( stderr, "No available databases\n" ); exit( EXIT_FAILURE ); } be = &backends[dbnum=0]; /* If just doing the first by default and it is a * glue subordinate, find the master. */ while (SLAP_GLUE_SUBORDINATE(be) || SLAP_MONITOR(be)) { if (SLAP_GLUE_SUBORDINATE(be)) { nosubordinates = 1; } be++; dbnum++; } if ( dbnum >= nbackends ) { fprintf( stderr, "Available database(s) " "do not allow %s\n", progname ); exit( EXIT_FAILURE ); } if ( nosubordinates == 0 && dbnum > 0 ) { Debug( LDAP_DEBUG_ANY, "The first database does not allow %s;" " using the first available one (%d)\n", progname, dbnum + 1, 0 ); } } else if ( dbnum < 0 || dbnum > (nbackends-1) ) { fprintf( stderr, "Database number selected via -n is out of range\n" "Must be in the range 1 to %d" " (number of databases in the config file)\n", nbackends ); exit( EXIT_FAILURE ); } else { be = &backends[dbnum]; } startup:; #ifdef CSRIMALLOC mal_leaktrace(1); #endif if ( !dryrun && slap_startup( be ) ) { fprintf( stderr, "slap_startup failed\n" ); exit( EXIT_FAILURE ); } } void slap_tool_destroy( void ) { if ( !dryrun && be != NULL ) { slap_shutdown( be ); } slap_destroy(); #ifdef SLAPD_MODULES if ( slapMode == SLAP_SERVER_MODE ) { /* always false. just pulls in necessary symbol references. */ lutil_uuidstr(NULL, 0); } module_kill(); #endif schema_destroy(); #ifdef HAVE_TLS ldap_pvt_tls_destroy(); #endif config_destroy(); #ifdef CSRIMALLOC mal_dumpleaktrace( leakfile ); #endif if ( !BER_BVISNULL( &authcDN ) ) { ch_free( authcDN.bv_val ); } }