int sock_back_unbind( Operation *op, SlapReply *rs ) { struct sockinfo *si = (struct sockinfo *) op->o_bd->be_private; FILE *fp; if ( (fp = opensock( si->si_sockpath )) == NULL ) { send_ldap_error( op, rs, LDAP_OTHER, "could not open socket" ); return( -1 ); } /* write out the request to the unbind process */ fprintf( fp, "UNBIND\n" ); fprintf( fp, "msgid: %ld\n", (long) op->o_msgid ); sock_print_conn( fp, op->o_conn, si ); sock_print_suffixes( fp, op->o_bd ); fprintf( fp, "\n" ); /* no response to unbind */ fclose( fp ); return 0; }
int sock_back_compare( Operation *op, SlapReply *rs ) { struct sockinfo *si = (struct sockinfo *) op->o_bd->be_private; AttributeDescription *entry = slap_schema.si_ad_entry; Entry e; FILE *fp; char *text; e.e_id = NOID; e.e_name = op->o_req_dn; e.e_nname = op->o_req_ndn; e.e_attrs = NULL; e.e_ocflags = 0; e.e_bv.bv_len = 0; e.e_bv.bv_val = NULL; e.e_private = NULL; if ( ! access_allowed( op, &e, entry, NULL, ACL_COMPARE, NULL ) ) { send_ldap_error( op, rs, LDAP_INSUFFICIENT_ACCESS, NULL ); return -1; } if ( (fp = opensock( si->si_sockpath )) == NULL ) { send_ldap_error( op, rs, LDAP_OTHER, "could not open socket" ); return( -1 ); } /* write out the request to the compare process */ fprintf( fp, "COMPARE\n" ); fprintf( fp, "msgid: %ld\n", (long) op->o_msgid ); sock_print_conn( fp, op->o_conn, si ); sock_print_suffixes( fp, op->o_bd ); fprintf( fp, "dn: %s\n", op->o_req_dn.bv_val ); /* could be binary */ text = ldif_put_wrap( LDIF_PUT_VALUE, op->orc_ava->aa_desc->ad_cname.bv_val, op->orc_ava->aa_value.bv_val, op->orc_ava->aa_value.bv_len, LDIF_LINE_WIDTH_MAX ); if ( text ) { fprintf( fp, "%s\n", text ); ber_memfree( text ); } else { fprintf( fp, "\n\n" ); } /* read in the result and send it along */ sock_read_and_send_results( op, rs, fp ); fclose( fp ); return( 0 ); }
static int sock_over_response( Operation *op, SlapReply *rs ) { slap_overinst *on = (slap_overinst *)op->o_bd->bd_info; struct sockinfo *si = (struct sockinfo *)on->on_bi.bi_private; FILE *fp; if ( rs->sr_type == REP_RESULT ) { if ( !( si->si_resps & SOCK_REP_RESULT )) return SLAP_CB_CONTINUE; } else if ( rs->sr_type == REP_SEARCH ) { if ( !( si->si_resps & SOCK_REP_SEARCH )) return SLAP_CB_CONTINUE; } else return SLAP_CB_CONTINUE; if (( fp = opensock( si->si_sockpath )) == NULL ) return SLAP_CB_CONTINUE; if ( rs->sr_type == REP_RESULT ) { /* write out the result */ fprintf( fp, "RESULT\n" ); fprintf( fp, "msgid: %ld\n", (long) op->o_msgid ); sock_print_conn( fp, op->o_conn, si ); fprintf( fp, "code: %d\n", rs->sr_err ); if ( rs->sr_matched ) fprintf( fp, "matched: %s\n", rs->sr_matched ); if (rs->sr_text ) fprintf( fp, "info: %s\n", rs->sr_text ); } else { /* write out the search entry */ int len; fprintf( fp, "ENTRY\n" ); fprintf( fp, "msgid: %ld\n", (long) op->o_msgid ); sock_print_conn( fp, op->o_conn, si ); ldap_pvt_thread_mutex_lock( &entry2str_mutex ); fprintf( fp, "%s", entry2str( rs->sr_entry, &len ) ); ldap_pvt_thread_mutex_unlock( &entry2str_mutex ); } fprintf( fp, "\n" ); fclose( fp ); return SLAP_CB_CONTINUE; }
int sock_back_modrdn( Operation *op, SlapReply *rs ) { struct sockinfo *si = (struct sockinfo *) op->o_bd->be_private; AttributeDescription *entry = slap_schema.si_ad_entry; Entry e; FILE *fp; e.e_id = NOID; e.e_name = op->o_req_dn; e.e_nname = op->o_req_ndn; e.e_attrs = NULL; e.e_ocflags = 0; e.e_bv.bv_len = 0; e.e_bv.bv_val = NULL; e.e_private = NULL; if ( ! access_allowed( op, &e, entry, NULL, op->oq_modrdn.rs_newSup ? ACL_WDEL : ACL_WRITE, NULL ) ) { send_ldap_error( op, rs, LDAP_INSUFFICIENT_ACCESS, NULL ); return -1; } if ( (fp = opensock( si->si_sockpath )) == NULL ) { send_ldap_error( op, rs, LDAP_OTHER, "could not open socket" ); return( -1 ); } /* write out the request to the modrdn process */ fprintf( fp, "MODRDN\n" ); fprintf( fp, "msgid: %ld\n", (long) op->o_msgid ); sock_print_conn( fp, op->o_conn, si ); sock_print_suffixes( fp, op->o_bd ); fprintf( fp, "dn: %s\n", op->o_req_dn.bv_val ); fprintf( fp, "newrdn: %s\n", op->oq_modrdn.rs_newrdn.bv_val ); fprintf( fp, "deleteoldrdn: %d\n", op->oq_modrdn.rs_deleteoldrdn ? 1 : 0 ); if ( op->oq_modrdn.rs_newSup != NULL ) { fprintf( fp, "newSuperior: %s\n", op->oq_modrdn.rs_newSup->bv_val ); } fprintf( fp, "\n" ); /* read in the results and send them along */ sock_read_and_send_results( op, rs, fp ); fclose( fp ); return( 0 ); }
int sock_back_bind( Operation *op, SlapReply *rs ) { struct sockinfo *si = (struct sockinfo *) op->o_bd->be_private; AttributeDescription *entry = slap_schema.si_ad_entry; Entry e; FILE *fp; int rc; e.e_id = NOID; e.e_name = op->o_req_dn; e.e_nname = op->o_req_ndn; e.e_attrs = NULL; e.e_ocflags = 0; e.e_bv.bv_len = 0; e.e_bv.bv_val = NULL; e.e_private = NULL; if ( ! access_allowed( op, &e, entry, NULL, ACL_AUTH, NULL ) ) { send_ldap_error( op, rs, LDAP_INSUFFICIENT_ACCESS, NULL ); return -1; } if ( (fp = opensock( si->si_sockpath )) == NULL ) { send_ldap_error( op, rs, LDAP_OTHER, "could not open socket" ); return( -1 ); } /* write out the request to the bind process */ fprintf( fp, "BIND\n" ); fprintf( fp, "msgid: %ld\n", (long) op->o_msgid ); sock_print_conn( fp, op->o_conn, si ); sock_print_suffixes( fp, op->o_bd ); fprintf( fp, "dn: %s\n", op->o_req_dn.bv_val ); fprintf( fp, "method: %d\n", op->oq_bind.rb_method ); fprintf( fp, "credlen: %lu\n", op->oq_bind.rb_cred.bv_len ); fprintf( fp, "cred: %s\n", op->oq_bind.rb_cred.bv_val ); /* XXX */ fprintf( fp, "\n" ); /* read in the results and send them along */ rc = sock_read_and_send_results( op, rs, fp ); fclose( fp ); return( rc ); }
int sock_back_search( Operation *op, SlapReply *rs ) { struct sockinfo *si = (struct sockinfo *) op->o_bd->be_private; FILE *fp; AttributeName *an; if ( (fp = opensock( si->si_sockpath )) == NULL ) { send_ldap_error( op, rs, LDAP_OTHER, "could not open socket" ); return( -1 ); } /* write out the request to the search process */ fprintf( fp, "SEARCH\n" ); fprintf( fp, "msgid: %ld\n", (long) op->o_msgid ); sock_print_conn( fp, op->o_conn, si ); sock_print_suffixes( fp, op->o_bd ); fprintf( fp, "base: %s\n", op->o_req_dn.bv_val ); fprintf( fp, "scope: %d\n", op->oq_search.rs_scope ); fprintf( fp, "deref: %d\n", op->oq_search.rs_deref ); fprintf( fp, "sizelimit: %d\n", op->oq_search.rs_slimit ); fprintf( fp, "timelimit: %d\n", op->oq_search.rs_tlimit ); fprintf( fp, "filter: %s\n", op->oq_search.rs_filterstr.bv_val ); fprintf( fp, "attrsonly: %d\n", op->oq_search.rs_attrsonly ? 1 : 0 ); fprintf( fp, "attrs:%s", op->oq_search.rs_attrs == NULL ? " all" : "" ); for ( an = op->oq_search.rs_attrs; an && an->an_name.bv_val; an++ ) { fprintf( fp, " %s", an->an_name.bv_val ); } fprintf( fp, "\n\n" ); /* end of attr line plus blank line */ /* read in the results and send them along */ rs->sr_attrs = op->oq_search.rs_attrs; sock_read_and_send_results( op, rs, fp ); fclose( fp ); return( 0 ); }
int sock_back_add( Operation *op, SlapReply *rs ) { struct sockinfo *si = (struct sockinfo *) op->o_bd->be_private; AttributeDescription *entry = slap_schema.si_ad_entry; FILE *fp; int len; if ( ! access_allowed( op, op->oq_add.rs_e, entry, NULL, ACL_WADD, NULL ) ) { send_ldap_error( op, rs, LDAP_INSUFFICIENT_ACCESS, NULL ); return -1; } if ( (fp = opensock( si->si_sockpath )) == NULL ) { send_ldap_error( op, rs, LDAP_OTHER, "could not open socket" ); return( -1 ); } /* write out the request to the add process */ fprintf( fp, "ADD\n" ); fprintf( fp, "msgid: %ld\n", (long) op->o_msgid ); sock_print_conn( fp, op->o_conn, si ); sock_print_suffixes( fp, op->o_bd ); ldap_pvt_thread_mutex_lock( &entry2str_mutex ); fprintf( fp, "%s", entry2str( op->oq_add.rs_e, &len ) ); ldap_pvt_thread_mutex_unlock( &entry2str_mutex ); fprintf (fp, "\n" ); /* read in the result and send it along */ sock_read_and_send_results( op, rs, fp ); fclose( fp ); return( 0 ); }
int sock_back_modify( Operation *op, SlapReply *rs ) { Modification *mod; struct sockinfo *si = (struct sockinfo *) op->o_bd->be_private; AttributeDescription *entry = slap_schema.si_ad_entry; Modifications *ml = op->orm_modlist; Entry e; FILE *fp; int i; e.e_id = NOID; e.e_name = op->o_req_dn; e.e_nname = op->o_req_ndn; e.e_attrs = NULL; e.e_ocflags = 0; e.e_bv.bv_len = 0; e.e_bv.bv_val = NULL; e.e_private = NULL; if ( ! access_allowed( op, &e, entry, NULL, ACL_WRITE, NULL ) ) { send_ldap_error( op, rs, LDAP_INSUFFICIENT_ACCESS, NULL ); return -1; } if ( (fp = opensock( si->si_sockpath )) == NULL ) { send_ldap_error( op, rs, LDAP_OTHER, "could not open socket" ); return( -1 ); } /* write out the request to the modify process */ fprintf( fp, "MODIFY\n" ); fprintf( fp, "msgid: %ld\n", (long) op->o_msgid ); sock_print_conn( fp, op->o_conn, si ); sock_print_suffixes( fp, op->o_bd ); fprintf( fp, "dn: %s\n", op->o_req_dn.bv_val ); for ( ; ml != NULL; ml = ml->sml_next ) { mod = &ml->sml_mod; /* FIXME: should use LDIF routines to deal with binary data */ switch ( mod->sm_op ) { case LDAP_MOD_ADD: fprintf( fp, "add: %s\n", mod->sm_desc->ad_cname.bv_val ); break; case LDAP_MOD_DELETE: fprintf( fp, "delete: %s\n", mod->sm_desc->ad_cname.bv_val ); break; case LDAP_MOD_REPLACE: fprintf( fp, "replace: %s\n", mod->sm_desc->ad_cname.bv_val ); break; } if( mod->sm_values != NULL ) { for ( i = 0; mod->sm_values[i].bv_val != NULL; i++ ) { fprintf( fp, "%s: %s\n", mod->sm_desc->ad_cname.bv_val, mod->sm_values[i].bv_val /* binary! */ ); } } fprintf( fp, "-\n" ); } fprintf( fp, "\n" ); /* read in the results and send them along */ sock_read_and_send_results( op, rs, fp ); fclose( fp ); return( 0 ); }