search.c 6.02 KB
Newer Older
1
2
/* search.c - DNS SRV backend search function */
/* $OpenLDAP$ */
Kurt Zeilenga's avatar
Kurt Zeilenga committed
3
4
/* This work is part of OpenLDAP Software <http://www.openldap.org/>.
 *
Kurt Zeilenga's avatar
Kurt Zeilenga committed
5
 * Copyright 2000-2005 The OpenLDAP Foundation.
Kurt Zeilenga's avatar
Kurt Zeilenga committed
6
7
8
9
10
11
12
13
14
15
16
17
18
19
 * Portions Copyright 2000-2003 Kurt D. Zeilenga.
 * All rights reserved.
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted only as authorized by the OpenLDAP
 * Public License.
 *
 * A copy of this license is available in the file LICENSE in the
 * top-level directory of the distribution or, alternatively, at
 * <http://www.OpenLDAP.org/license.html>.
 */
/* ACKNOWLEDGEMENTS:
 * This work was originally developed by Kurt D. Zeilenga for inclusion
 * in OpenLDAP Software.
20
21
22
23
24
25
26
27
28
29
30
 */

#include "portable.h"

#include <stdio.h>

#include <ac/socket.h>
#include <ac/string.h>
#include <ac/time.h>

#include "slap.h"
31
#include "proto-dnssrv.h"
32
33
34
35

int
dnssrv_back_search(
    Operation	*op,
36
    SlapReply	*rs )
37
{
38
39
40
41
42
	int i;
	int rc;
	char *domain = NULL;
	char *hostlist = NULL;
	char **hosts = NULL;
43
	char *refdn;
Kurt Zeilenga's avatar
Kurt Zeilenga committed
44
	struct berval nrefdn = BER_BVNULL;
45
	BerVarray urls = NULL;
46
	int manageDSAit;
47

48
49
50
51
52
53
54
55
56
57
58
	rs->sr_ref = NULL;

	manageDSAit = get_manageDSAit( op );
	/*
	 * FIXME: we may return a referral if manageDSAit is not set
	 */
	if ( ! manageDSAit ) {
		send_ldap_error( op, rs, LDAP_UNWILLING_TO_PERFORM,
				"manageDSAit must be set" );
		goto done;
	}
59

60
61
	if( ldap_dn2domain( op->o_req_dn.bv_val, &domain ) || domain == NULL ) {
		rs->sr_err = LDAP_REFERRAL;
62
		rs->sr_ref = default_referral;
63
		send_ldap_result( op, rs );
64
		rs->sr_ref = NULL;
65
66
67
68
		goto done;
	}

	Debug( LDAP_DEBUG_TRACE, "DNSSRV: dn=\"%s\" -> domain=\"%s\"\n",
69
		op->o_req_dn.bv_len ? op->o_req_dn.bv_val : "", domain, 0 );
70

71
	if( ( rc = ldap_domain2hostlist( domain, &hostlist ) ) ) {
72
73
		Debug( LDAP_DEBUG_TRACE, "DNSSRV: domain2hostlist returned %d\n",
			rc, 0, 0 );
74
75
		send_ldap_error( op, rs, LDAP_NO_SUCH_OBJECT,
			"no DNS SRV RR available for DN" );
76
77
78
		goto done;
	}

79
	hosts = ldap_str2charray( hostlist, " " );
80
81
82

	if( hosts == NULL ) {
		Debug( LDAP_DEBUG_TRACE, "DNSSRV: str2charrary error\n", 0, 0, 0 );
83
84
		send_ldap_error( op, rs, LDAP_OTHER,
			"problem processing DNS SRV records for DN" );
85
86
87
88
		goto done;
	}

	for( i=0; hosts[i] != NULL; i++) {
89
		struct berval url;
90

91
92
		url.bv_len = sizeof("ldap://")-1 + strlen(hosts[i]);
		url.bv_val = ch_malloc( url.bv_len + 1 );
93

94
95
		strcpy( url.bv_val, "ldap://" );
		strcpy( &url.bv_val[sizeof("ldap://")-1], hosts[i] );
96

97
		if( ber_bvarray_add( &urls, &url ) < 0 ) {
98
			free( url.bv_val );
99
100
			send_ldap_error( op, rs, LDAP_OTHER,
			"problem processing DNS SRV records for DN" );
101
102
103
104
105
			goto done;
		}
	}

	Statslog( LDAP_DEBUG_STATS,
106
107
108
	    "%s DNSSRV p=%d dn=\"%s\" url=\"%s\"\n",
	    op->o_log_prefix, op->o_protocol,
		op->o_req_dn.bv_len ? op->o_req_dn.bv_val : "", urls[0].bv_val, 0 );
109

Kurt Zeilenga's avatar
Kurt Zeilenga committed
110
111
	Debug( LDAP_DEBUG_TRACE,
		"DNSSRV: ManageDSAit scope=%d dn=\"%s\" -> url=\"%s\"\n",
112
113
		op->oq_search.rs_scope,
		op->o_req_dn.bv_len ? op->o_req_dn.bv_val : "",
114
		urls[0].bv_val );
115
116
117
118

	rc = ldap_domain2dn(domain, &refdn);

	if( rc != LDAP_SUCCESS ) {
119
120
		send_ldap_error( op, rs, LDAP_OTHER,
			"DNS SRV problem processing manageDSAit control" );
121
122
		goto done;

123
124
125
126
127
	} else {
		struct berval bv;
		bv.bv_val = refdn;
		bv.bv_len = strlen( refdn );

Kurt Zeilenga's avatar
Kurt Zeilenga committed
128
		rc = dnNormalize( 0, NULL, NULL, &bv, &nrefdn, op->o_tmpmemctx );
129
		if( rc != LDAP_SUCCESS ) {
130
131
			send_ldap_error( op, rs, LDAP_OTHER,
				"DNS SRV problem processing manageDSAit control" );
132
133
134
			goto done;
		}
	}
135

136
	if( !dn_match( &nrefdn, &op->o_req_ndn ) ) {
137
138
139
		/* requested dn is subordinate */

		Debug( LDAP_DEBUG_TRACE,
140
141
			"DNSSRV: dn=\"%s\" subordinate to refdn=\"%s\"\n",
			op->o_req_dn.bv_len ? op->o_req_dn.bv_val : "",
142
143
			refdn == NULL ? "" : refdn,
			NULL );
144

145
146
147
		rs->sr_matched = refdn;
		rs->sr_err = LDAP_NO_SUCH_OBJECT;
		send_ldap_result( op, rs );
148
		rs->sr_matched = NULL;
149

150
151
	} else if ( op->oq_search.rs_scope == LDAP_SCOPE_ONELEVEL ) {
		send_ldap_error( op, rs, LDAP_SUCCESS, NULL );
152
153

	} else {
154
		struct berval	vals[2];
155
156
157
158
		Entry *e = ch_calloc( 1, sizeof(Entry) );
		AttributeDescription *ad_objectClass
			= slap_schema.si_ad_objectClass;
		AttributeDescription *ad_ref = slap_schema.si_ad_ref;
159
160
161
162
		e->e_name.bv_val = strdup( op->o_req_dn.bv_val );
		e->e_name.bv_len = op->o_req_dn.bv_len;
		e->e_nname.bv_val = strdup( op->o_req_ndn.bv_val );
		e->e_nname.bv_len = op->o_req_ndn.bv_len;
163
164
165
166

		e->e_attrs = NULL;
		e->e_private = NULL;

167
		vals[1].bv_val = NULL;
168

169
170
		vals[0].bv_val = "top";
		vals[0].bv_len = sizeof("top")-1;
171
		attr_mergeit( e, ad_objectClass, vals );
172

173
174
		vals[0].bv_val = "referral";
		vals[0].bv_len = sizeof("referral")-1;
175
		attr_mergeit( e, ad_objectClass, vals );
176

177
178
		vals[0].bv_val = "extensibleObject";
		vals[0].bv_len = sizeof("extensibleObject")-1;
179
		attr_mergeit( e, ad_objectClass, vals );
180
181
182
183
184
185
186
187
188

		{
			AttributeDescription *ad = NULL;
			const char *text;

			rc = slap_str2ad( "dc", &ad, &text );

			if( rc == LDAP_SUCCESS ) {
				char *p;
189
				vals[0].bv_val = ch_strdup( domain );
190

191
				p = strchr( vals[0].bv_val, '.' );
192
					
193
194
				if( p == vals[0].bv_val ) {
					vals[0].bv_val[1] = '\0';
195
196
197
198
				} else if ( p != NULL ) {
					*p = '\0';
				}

199
				vals[0].bv_len = strlen(vals[0].bv_val);
200
				attr_mergeit( e, ad, vals );
201
202
203
204
205
206
207
208
209
210
			}
		}

		{
			AttributeDescription *ad = NULL;
			const char *text;

			rc = slap_str2ad( "associatedDomain", &ad, &text );

			if( rc == LDAP_SUCCESS ) {
211
212
				vals[0].bv_val = domain;
				vals[0].bv_len = strlen(domain);
213
				attr_mergeit( e, ad, vals );
214
215
216
			}
		}

217
		attr_mergeit( e, ad_ref, urls );
218

219
		rc = test_filter( op, e, op->oq_search.rs_filter ); 
220
221

		if( rc == LDAP_COMPARE_TRUE ) {
222
223
			rs->sr_entry = e;
			rs->sr_attrs = op->oq_search.rs_attrs;
Pierangelo Masarati's avatar
Pierangelo Masarati committed
224
			rs->sr_flags = REP_ENTRY_MODIFIABLE;
225
			send_search_entry( op, rs );
226
227
			rs->sr_entry = NULL;
			rs->sr_attrs = NULL;
228
229
230
		}

		entry_free( e );
231
232
233

		rs->sr_err = LDAP_SUCCESS;
		send_ldap_result( op, rs );
234
235
	}

236
237
	if ( refdn ) free( refdn );
	if ( nrefdn.bv_val ) free( nrefdn.bv_val );
238
239
240
241

done:
	if( domain != NULL ) ch_free( domain );
	if( hostlist != NULL ) ch_free( hostlist );
242
	if( hosts != NULL ) ldap_charray_free( hosts );
243
	if( urls != NULL ) ber_bvarray_free( urls );
244
	return 0;
245
}
246