| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931293229332934293529362937293829392940294129422943294429452946294729482949295029512952295329542955295629572958295929602961296229632964296529662967296829692970297129722973297429752976297729782979298029812982298329842985298629872988298929902991299229932994299529962997299829993000300130023003300430053006300730083009301030113012301330143015301630173018301930203021302230233024302530263027302830293030303130323033303430353036303730383039304030413042304330443045304630473048304930503051305230533054305530563057305830593060306130623063306430653066306730683069307030713072307330743075307630773078307930803081308230833084308530863087308830893090309130923093309430953096309730983099310031013102310331043105310631073108310931103111311231133114311531163117311831193120312131223123312431253126312731283129313031313132313331343135313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222322332243225322632273228322932303231323232333234323532363237323832393240324132423243324432453246324732483249325032513252325332543255325632573258325932603261326232633264326532663267326832693270327132723273327432753276327732783279328032813282328332843285328632873288328932903291329232933294329532963297329832993300330133023303330433053306330733083309331033113312331333143315331633173318331933203321332233233324332533263327332833293330333133323333333433353336333733383339334033413342334333443345334633473348334933503351335233533354335533563357335833593360336133623363336433653366336733683369337033713372337333743375337633773378337933803381338233833384338533863387338833893390339133923393339433953396339733983399340034013402340334043405340634073408340934103411341234133414341534163417341834193420342134223423342434253426342734283429343034313432343334343435343634373438343934403441344234433444344534463447344834493450345134523453345434553456345734583459346034613462346334643465346634673468346934703471347234733474347534763477347834793480348134823483348434853486348734883489349034913492349334943495349634973498349935003501350235033504350535063507350835093510351135123513351435153516351735183519352035213522352335243525352635273528352935303531353235333534353535363537353835393540354135423543354435453546354735483549355035513552355335543555355635573558355935603561356235633564356535663567356835693570357135723573357435753576357735783579358035813582358335843585358635873588358935903591359235933594359535963597359835993600360136023603360436053606360736083609361036113612361336143615361636173618361936203621362236233624362536263627362836293630363136323633363436353636363736383639364036413642364336443645364636473648364936503651365236533654365536563657365836593660366136623663366436653666366736683669367036713672367336743675367636773678367936803681368236833684368536863687368836893690369136923693369436953696369736983699370037013702370337043705370637073708370937103711371237133714371537163717371837193720372137223723372437253726372737283729373037313732373337343735373637373738373937403741374237433744374537463747374837493750375137523753375437553756375737583759376037613762376337643765376637673768376937703771377237733774377537763777377837793780378137823783378437853786378737883789379037913792379337943795379637973798379938003801380238033804380538063807380838093810381138123813381438153816381738183819382038213822382338243825382638273828382938303831383238333834383538363837383838393840384138423843384438453846384738483849385038513852385338543855385638573858385938603861386238633864386538663867386838693870387138723873387438753876387738783879388038813882388338843885388638873888388938903891389238933894389538963897389838993900390139023903390439053906390739083909391039113912391339143915391639173918391939203921392239233924392539263927392839293930393139323933393439353936393739383939394039413942394339443945394639473948394939503951395239533954395539563957395839593960396139623963396439653966396739683969397039713972397339743975397639773978397939803981398239833984398539863987398839893990399139923993399439953996399739983999400040014002400340044005400640074008400940104011401240134014401540164017401840194020402140224023402440254026402740284029403040314032403340344035403640374038403940404041404240434044404540464047404840494050405140524053405440554056405740584059406040614062406340644065406640674068406940704071407240734074407540764077407840794080408140824083408440854086408740884089409040914092409340944095409640974098409941004101410241034104410541064107410841094110411141124113411441154116411741184119412041214122412341244125412641274128412941304131413241334134413541364137413841394140414141424143414441454146414741484149415041514152415341544155415641574158415941604161416241634164416541664167416841694170417141724173417441754176417741784179418041814182418341844185418641874188418941904191419241934194419541964197419841994200420142024203420442054206420742084209421042114212421342144215421642174218421942204221422242234224422542264227422842294230423142324233423442354236423742384239424042414242424342444245424642474248424942504251425242534254425542564257425842594260426142624263426442654266426742684269427042714272427342744275427642774278427942804281428242834284428542864287428842894290429142924293429442954296429742984299430043014302430343044305430643074308430943104311431243134314431543164317431843194320432143224323432443254326432743284329433043314332433343344335433643374338433943404341434243434344434543464347434843494350435143524353435443554356435743584359436043614362436343644365436643674368436943704371437243734374437543764377437843794380438143824383438443854386438743884389439043914392439343944395439643974398439944004401440244034404440544064407440844094410441144124413441444154416441744184419442044214422442344244425442644274428442944304431443244334434443544364437443844394440444144424443444444454446444744484449445044514452445344544455445644574458445944604461446244634464446544664467446844694470447144724473447444754476447744784479448044814482448344844485448644874488448944904491449244934494449544964497449844994500450145024503450445054506450745084509451045114512451345144515451645174518451945204521452245234524452545264527452845294530453145324533453445354536453745384539454045414542454345444545454645474548454945504551455245534554455545564557455845594560456145624563456445654566456745684569457045714572457345744575457645774578457945804581458245834584458545864587458845894590459145924593459445954596459745984599460046014602460346044605460646074608460946104611461246134614461546164617461846194620462146224623462446254626462746284629463046314632463346344635463646374638463946404641464246434644464546464647464846494650465146524653465446554656465746584659466046614662466346644665466646674668466946704671467246734674467546764677467846794680468146824683468446854686468746884689469046914692469346944695469646974698469947004701470247034704470547064707470847094710471147124713471447154716471747184719472047214722472347244725472647274728472947304731473247334734473547364737473847394740474147424743474447454746474747484749475047514752475347544755475647574758475947604761476247634764476547664767476847694770477147724773477447754776477747784779478047814782478347844785478647874788478947904791479247934794479547964797479847994800480148024803480448054806480748084809481048114812481348144815481648174818481948204821482248234824482548264827482848294830483148324833483448354836483748384839484048414842484348444845484648474848484948504851485248534854485548564857485848594860486148624863486448654866486748684869487048714872487348744875487648774878487948804881488248834884488548864887488848894890489148924893489448954896489748984899490049014902490349044905490649074908490949104911491249134914491549164917491849194920492149224923492449254926492749284929493049314932493349344935493649374938493949404941494249434944494549464947494849494950495149524953495449554956495749584959496049614962496349644965496649674968496949704971497249734974497549764977497849794980498149824983498449854986498749884989499049914992499349944995499649974998499950005001500250035004500550065007500850095010501150125013501450155016501750185019502050215022502350245025502650275028502950305031503250335034503550365037503850395040504150425043504450455046504750485049505050515052505350545055505650575058505950605061506250635064506550665067506850695070507150725073507450755076507750785079508050815082508350845085508650875088508950905091509250935094509550965097509850995100510151025103510451055106510751085109511051115112511351145115511651175118511951205121512251235124512551265127512851295130513151325133513451355136513751385139514051415142514351445145514651475148514951505151515251535154515551565157515851595160516151625163516451655166516751685169517051715172517351745175517651775178517951805181518251835184518551865187518851895190519151925193519451955196519751985199520052015202520352045205520652075208520952105211521252135214521552165217521852195220522152225223522452255226522752285229523052315232523352345235523652375238523952405241524252435244524552465247524852495250525152525253525452555256525752585259526052615262526352645265526652675268526952705271527252735274527552765277527852795280528152825283528452855286528752885289529052915292529352945295529652975298529953005301530253035304530553065307530853095310531153125313531453155316531753185319532053215322532353245325532653275328532953305331533253335334533553365337533853395340534153425343534453455346534753485349535053515352535353545355535653575358535953605361536253635364536553665367536853695370537153725373537453755376537753785379538053815382538353845385538653875388538953905391539253935394539553965397539853995400540154025403540454055406540754085409541054115412541354145415541654175418541954205421542254235424542554265427542854295430543154325433543454355436543754385439544054415442544354445445544654475448544954505451545254535454545554565457545854595460546154625463546454655466546754685469547054715472547354745475547654775478547954805481548254835484548554865487548854895490549154925493549454955496549754985499550055015502550355045505550655075508550955105511551255135514551555165517551855195520552155225523552455255526552755285529553055315532553355345535553655375538553955405541554255435544554555465547554855495550555155525553555455555556555755585559556055615562556355645565556655675568556955705571557255735574557555765577557855795580558155825583558455855586558755885589559055915592559355945595559655975598559956005601560256035604560556065607560856095610561156125613561456155616561756185619562056215622 |
- /** BEGIN COPYRIGHT BLOCK
- * This Program is free software; you can redistribute it and/or modify it under
- * the terms of the GNU General Public License as published by the Free Software
- * Foundation; version 2 of the License.
- *
- * This Program is distributed in the hope that it will be useful, but WITHOUT
- * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
- * FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License along with
- * this Program; if not, write to the Free Software Foundation, Inc., 59 Temple
- * Place, Suite 330, Boston, MA 02111-1307 USA.
- *
- * In addition, as a special exception, Red Hat, Inc. gives You the additional
- * right to link the code of this Program with code not covered under the GNU
- * General Public License ("Non-GPL Code") and to distribute linked combinations
- * including the two, subject to the limitations in this paragraph. Non-GPL Code
- * permitted under this exception must only link to the code of this Program
- * through those well defined interfaces identified in the file named EXCEPTION
- * found in the source code files (the "Approved Interfaces"). The files of
- * Non-GPL Code may instantiate templates or use macros or inline functions from
- * the Approved Interfaces without causing the resulting work to be covered by
- * the GNU General Public License. Only Red Hat, Inc. may make changes or
- * additions to the list of Approved Interfaces. You must obey the GNU General
- * Public License in all respects for all of the Program code and other code used
- * in conjunction with the Program except the Non-GPL Code covered by this
- * exception. If you modify this file, you may extend this exception to your
- * version of the file, but you are not obligated to do so. If you do not wish to
- * provide this exception without modification, you must delete this exception
- * statement from your version and license this file solely under the GPL without
- * exception.
- *
- *
- * Copyright (C) 2001 Sun Microsystems, Inc. Used by permission.
- * Copyright (C) 2005 Red Hat, Inc.
- * All rights reserved.
- * END COPYRIGHT BLOCK **/
- #ifdef HAVE_CONFIG_H
- # include <config.h>
- #endif
- /*
- *
- * libglobs.c -- SLAPD library global variables
- */
- /* for windows only
- we define slapd_ldap_debug here, so we don't want to declare
- it in any header file which might conflict with our definition
- */
- #define DONT_DECLARE_SLAPD_LDAP_DEBUG /* see ldaplog.h */
- #include "ldap.h"
- #include <sslproto.h>
- #undef OFF
- #undef LITTLE_ENDIAN
- #include <stdio.h>
- #include <string.h>
- #include <sys/types.h>
- #include <time.h>
- #include <stdarg.h>
- #include <stdlib.h>
- #if defined( _WIN32 )
- #define R_OK 04
- #include "ntslapdmessages.h"
- #include "proto-ntutil.h"
- #else
- #include <sys/time.h>
- #include <sys/param.h> /* MAXPATHLEN */
- #include <sys/socket.h>
- #include <netinet/in.h>
- #include <arpa/inet.h>
- #include <netdb.h>
- #include <unistd.h>
- #include <pwd.h> /* pwdnam */
- #endif
- #ifdef USE_SYSCONF
- #include <unistd.h>
- #endif /* USE_SYSCONF */
- #include "slap.h"
- #include "plhash.h"
- #define REMOVE_CHANGELOG_CMD "remove"
- /* On UNIX, there's only one copy of slapd_ldap_debug */
- /* On NT, each module keeps its own module_ldap_debug, which */
- /* points to the process' slapd_ldap_debug */
- #ifdef _WIN32
- int *module_ldap_debug;
- int __declspec(dllexport) slapd_ldap_debug = LDAP_DEBUG_ANY;
- #else
- int slapd_ldap_debug = LDAP_DEBUG_ANY;
- #endif
- char *ldap_srvtab = "";
- /* Note that the 'attrname' arguments are used only for log messages */
- typedef int (*ConfigSetFunc)(const char *attrname, char *value,
- char *errorbuf, int apply);
- typedef int (*LogSetFunc)(const char *attrname, char *value, int whichlog,
- char *errorbuf, int apply);
- typedef enum {
- CONFIG_INT, /* maps to int */
- CONFIG_LONG, /* maps to long */
- CONFIG_STRING, /* maps to char* */
- CONFIG_CHARRAY, /* maps to char** */
- CONFIG_ON_OFF, /* maps 0/1 to "off"/"on" */
- CONFIG_STRING_OR_OFF, /* use "off" instead of null or an empty string */
- CONFIG_STRING_OR_UNKNOWN, /* use "unknown" instead of an empty string */
- CONFIG_CONSTANT_INT, /* for #define values, e.g. */
- CONFIG_CONSTANT_STRING, /* for #define values, e.g. */
- CONFIG_SPECIAL_REFERRALLIST, /* this is a berval list */
- CONFIG_SPECIAL_SSLCLIENTAUTH, /* maps strings to an enumeration */
- CONFIG_SPECIAL_ERRORLOGLEVEL, /* requires & with LDAP_DEBUG_ANY */
- CONFIG_STRING_OR_EMPTY /* use an empty string */
- } ConfigVarType;
- static int config_set_onoff( const char *attrname, char *value,
- int *configvalue, char *errorbuf, int apply );
- static int config_set_schemareplace ( const char *attrname, char *value,
- char *errorbuf, int apply );
- static int
- isInt(ConfigVarType type)
- {
- return type == CONFIG_INT || type == CONFIG_ON_OFF || type == CONFIG_SPECIAL_SSLCLIENTAUTH || type == CONFIG_SPECIAL_ERRORLOGLEVEL;
- }
- /* the caller will typically have to cast the result based on the ConfigVarType */
- typedef void *(*ConfigGetFunc)(void);
- /* static Ref_Array global_referrals; */
- static slapdFrontendConfig_t global_slapdFrontendConfig;
- static struct config_get_and_set {
- const char *attr_name; /* the name of the attribute */
- ConfigSetFunc setfunc; /* the function to call to set the value */
- LogSetFunc logsetfunc; /* log functions are special */
- int whichlog; /* ACCESS, ERROR, AUDIT, etc. */
- void** config_var_addr; /* address of member of slapdFrontendConfig struct */
- ConfigVarType config_var_type; /* cast to this type when getting */
- ConfigGetFunc getfunc; /* for special handling */
- } ConfigList[] = {
- {CONFIG_AUDITLOG_MODE_ATTRIBUTE, NULL,
- log_set_mode, SLAPD_AUDIT_LOG,
- (void**)&global_slapdFrontendConfig.auditlog_mode, CONFIG_STRING, NULL},
- {CONFIG_AUDITLOG_LOGROTATIONSYNCENABLED_ATTRIBUTE, NULL,
- log_set_rotationsync_enabled, SLAPD_AUDIT_LOG,
- (void**)&global_slapdFrontendConfig.auditlog_rotationsync_enabled, CONFIG_ON_OFF, NULL},
- {CONFIG_AUDITLOG_LOGROTATIONSYNCHOUR_ATTRIBUTE, NULL,
- log_set_rotationsynchour, SLAPD_AUDIT_LOG,
- (void**)&global_slapdFrontendConfig.auditlog_rotationsynchour, CONFIG_INT, NULL},
- {CONFIG_AUDITLOG_LOGROTATIONSYNCMIN_ATTRIBUTE, NULL,
- log_set_rotationsyncmin, SLAPD_AUDIT_LOG,
- (void**)&global_slapdFrontendConfig.auditlog_rotationsyncmin, CONFIG_INT, NULL},
- {CONFIG_AUDITLOG_LOGROTATIONTIME_ATTRIBUTE, NULL,
- log_set_rotationtime, SLAPD_AUDIT_LOG,
- (void**)&global_slapdFrontendConfig.auditlog_rotationtime, CONFIG_INT, NULL},
- {CONFIG_ACCESSLOG_MODE_ATTRIBUTE, NULL,
- log_set_mode, SLAPD_ACCESS_LOG,
- (void**)&global_slapdFrontendConfig.accesslog_mode, CONFIG_STRING, NULL},
- {CONFIG_ACCESSLOG_MAXNUMOFLOGSPERDIR_ATTRIBUTE, NULL,
- log_set_numlogsperdir, SLAPD_ACCESS_LOG,
- (void**)&global_slapdFrontendConfig.accesslog_maxnumlogs, CONFIG_INT, NULL},
- {CONFIG_LOGLEVEL_ATTRIBUTE, config_set_errorlog_level,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.errorloglevel,
- CONFIG_SPECIAL_ERRORLOGLEVEL, NULL},
- {CONFIG_ERRORLOG_LOGGING_ENABLED_ATTRIBUTE, NULL,
- log_set_logging, SLAPD_ERROR_LOG,
- (void**)&global_slapdFrontendConfig.errorlog_logging_enabled, CONFIG_ON_OFF, NULL},
- {CONFIG_ERRORLOG_MODE_ATTRIBUTE, NULL,
- log_set_mode, SLAPD_ERROR_LOG,
- (void**)&global_slapdFrontendConfig.errorlog_mode, CONFIG_STRING, NULL},
- {CONFIG_ERRORLOG_LOGEXPIRATIONTIME_ATTRIBUTE, NULL,
- log_set_expirationtime, SLAPD_ERROR_LOG,
- (void**)&global_slapdFrontendConfig.errorlog_exptime, CONFIG_INT, NULL},
- {CONFIG_ACCESSLOG_LOGGING_ENABLED_ATTRIBUTE, NULL,
- log_set_logging, SLAPD_ACCESS_LOG,
- (void**)&global_slapdFrontendConfig.accesslog_logging_enabled, CONFIG_ON_OFF, NULL},
- {CONFIG_PORT_ATTRIBUTE, config_set_port,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.port, CONFIG_INT, NULL},
- {CONFIG_WORKINGDIR_ATTRIBUTE, config_set_workingdir,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.workingdir, CONFIG_STRING_OR_EMPTY, NULL},
- {CONFIG_MAXTHREADSPERCONN_ATTRIBUTE, config_set_maxthreadsperconn,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.maxthreadsperconn, CONFIG_INT, NULL},
- {CONFIG_ACCESSLOG_LOGEXPIRATIONTIME_ATTRIBUTE, NULL,
- log_set_expirationtime, SLAPD_ACCESS_LOG,
- (void**)&global_slapdFrontendConfig.accesslog_exptime, CONFIG_INT, NULL},
- #ifndef _WIN32
- {CONFIG_LOCALUSER_ATTRIBUTE, config_set_localuser,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.localuser, CONFIG_STRING, NULL},
- #endif
- {CONFIG_ERRORLOG_LOGROTATIONSYNCENABLED_ATTRIBUTE, NULL,
- log_set_rotationsync_enabled, SLAPD_ERROR_LOG,
- (void**)&global_slapdFrontendConfig.errorlog_rotationsync_enabled, CONFIG_ON_OFF, NULL},
- {CONFIG_ERRORLOG_LOGROTATIONSYNCHOUR_ATTRIBUTE, NULL,
- log_set_rotationsynchour, SLAPD_ERROR_LOG,
- (void**)&global_slapdFrontendConfig.errorlog_rotationsynchour, CONFIG_INT, NULL},
- {CONFIG_ERRORLOG_LOGROTATIONSYNCMIN_ATTRIBUTE, NULL,
- log_set_rotationsyncmin, SLAPD_ERROR_LOG,
- (void**)&global_slapdFrontendConfig.errorlog_rotationsyncmin, CONFIG_INT, NULL},
- {CONFIG_ERRORLOG_LOGROTATIONTIME_ATTRIBUTE, NULL,
- log_set_rotationtime, SLAPD_ERROR_LOG,
- (void**)&global_slapdFrontendConfig.errorlog_rotationtime, CONFIG_INT, NULL},
- {CONFIG_PW_INHISTORY_ATTRIBUTE, config_set_pw_inhistory,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.pw_policy.pw_inhistory, CONFIG_INT, NULL},
- {CONFIG_PW_STORAGESCHEME_ATTRIBUTE, config_set_pw_storagescheme,
- NULL, 0, NULL, CONFIG_STRING, (ConfigGetFunc)config_get_pw_storagescheme},
- {CONFIG_PW_UNLOCK_ATTRIBUTE, config_set_pw_unlock,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.pw_policy.pw_unlock, CONFIG_ON_OFF, NULL},
- {CONFIG_PW_GRACELIMIT_ATTRIBUTE, config_set_pw_gracelimit,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.pw_policy.pw_gracelimit, CONFIG_INT, NULL},
- {CONFIG_ACCESSLOG_LOGROTATIONSYNCENABLED_ATTRIBUTE, NULL,
- log_set_rotationsync_enabled, SLAPD_ACCESS_LOG,
- (void**)&global_slapdFrontendConfig.accesslog_rotationsync_enabled, CONFIG_ON_OFF, NULL},
- {CONFIG_ACCESSLOG_LOGROTATIONSYNCHOUR_ATTRIBUTE, NULL,
- log_set_rotationsynchour, SLAPD_ACCESS_LOG,
- (void**)&global_slapdFrontendConfig.accesslog_rotationsynchour, CONFIG_INT, NULL},
- {CONFIG_ACCESSLOG_LOGROTATIONSYNCMIN_ATTRIBUTE, NULL,
- log_set_rotationsyncmin, SLAPD_ACCESS_LOG,
- (void**)&global_slapdFrontendConfig.accesslog_rotationsyncmin, CONFIG_INT, NULL},
- {CONFIG_ACCESSLOG_LOGROTATIONTIME_ATTRIBUTE, NULL,
- log_set_rotationtime, SLAPD_ACCESS_LOG,
- (void**)&global_slapdFrontendConfig.accesslog_rotationtime, CONFIG_INT, NULL},
- {CONFIG_PW_MUSTCHANGE_ATTRIBUTE, config_set_pw_must_change,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.pw_policy.pw_must_change, CONFIG_ON_OFF, NULL},
- {CONFIG_PWPOLICY_LOCAL_ATTRIBUTE, config_set_pwpolicy_local,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.pwpolicy_local, CONFIG_ON_OFF, NULL},
- {CONFIG_AUDITLOG_MAXLOGDISKSPACE_ATTRIBUTE, NULL,
- log_set_maxdiskspace, SLAPD_AUDIT_LOG,
- (void**)&global_slapdFrontendConfig.auditlog_maxdiskspace, CONFIG_INT, NULL},
- {CONFIG_SIZELIMIT_ATTRIBUTE, config_set_sizelimit,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.sizelimit, CONFIG_INT, NULL},
- {CONFIG_AUDITLOG_MAXLOGSIZE_ATTRIBUTE, NULL,
- log_set_logsize, SLAPD_AUDIT_LOG,
- (void**)&global_slapdFrontendConfig.auditlog_maxlogsize, CONFIG_INT, NULL},
- {CONFIG_PW_WARNING_ATTRIBUTE, config_set_pw_warning,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.pw_policy.pw_warning, CONFIG_LONG, NULL},
- {CONFIG_READONLY_ATTRIBUTE, config_set_readonly,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.readonly, CONFIG_ON_OFF, NULL},
- {CONFIG_THREADNUMBER_ATTRIBUTE, config_set_threadnumber,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.threadnumber, CONFIG_INT, NULL},
- {CONFIG_PW_LOCKOUT_ATTRIBUTE, config_set_pw_lockout,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.pw_policy.pw_lockout, CONFIG_ON_OFF, NULL},
- {CONFIG_ENQUOTE_SUP_OC_ATTRIBUTE, config_set_enquote_sup_oc,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.enquote_sup_oc, CONFIG_ON_OFF, NULL},
- {CONFIG_LOCALHOST_ATTRIBUTE, config_set_localhost,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.localhost, CONFIG_STRING, NULL},
- {CONFIG_IOBLOCKTIMEOUT_ATTRIBUTE, config_set_ioblocktimeout,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.ioblocktimeout, CONFIG_INT, NULL},
- {CONFIG_MAX_FILTER_NEST_LEVEL_ATTRIBUTE, config_set_max_filter_nest_level,
- NULL, 0, (void**)&global_slapdFrontendConfig.max_filter_nest_level,
- CONFIG_INT, NULL},
- {CONFIG_ERRORLOG_MAXLOGDISKSPACE_ATTRIBUTE, NULL,
- log_set_maxdiskspace, SLAPD_ERROR_LOG,
- (void**)&global_slapdFrontendConfig.errorlog_maxdiskspace, CONFIG_INT, NULL},
- {CONFIG_PW_MINLENGTH_ATTRIBUTE, config_set_pw_minlength,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.pw_policy.pw_minlength, CONFIG_INT, NULL},
- {CONFIG_PW_MINDIGITS_ATTRIBUTE, config_set_pw_mindigits,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.pw_policy.pw_mindigits, CONFIG_INT, NULL},
- {CONFIG_PW_MINALPHAS_ATTRIBUTE, config_set_pw_minalphas,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.pw_policy.pw_minalphas, CONFIG_INT, NULL},
- {CONFIG_PW_MINUPPERS_ATTRIBUTE, config_set_pw_minuppers,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.pw_policy.pw_minuppers, CONFIG_INT, NULL},
- {CONFIG_PW_MINLOWERS_ATTRIBUTE, config_set_pw_minlowers,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.pw_policy.pw_minlowers, CONFIG_INT, NULL},
- {CONFIG_PW_MINSPECIALS_ATTRIBUTE, config_set_pw_minspecials,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.pw_policy.pw_minspecials, CONFIG_INT, NULL},
- {CONFIG_PW_MIN8BIT_ATTRIBUTE, config_set_pw_min8bit,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.pw_policy.pw_min8bit, CONFIG_INT, NULL},
- {CONFIG_PW_MAXREPEATS_ATTRIBUTE, config_set_pw_maxrepeats,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.pw_policy.pw_maxrepeats, CONFIG_INT, NULL},
- {CONFIG_PW_MINCATEGORIES_ATTRIBUTE, config_set_pw_mincategories,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.pw_policy.pw_mincategories, CONFIG_INT, NULL},
- {CONFIG_PW_MINTOKENLENGTH_ATTRIBUTE, config_set_pw_mintokenlength,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.pw_policy.pw_mintokenlength, CONFIG_INT, NULL},
- {CONFIG_ERRORLOG_ATTRIBUTE, config_set_errorlog,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.errorlog, CONFIG_STRING_OR_EMPTY, NULL},
- {CONFIG_AUDITLOG_LOGEXPIRATIONTIME_ATTRIBUTE, NULL,
- log_set_expirationtime, SLAPD_AUDIT_LOG,
- (void**)&global_slapdFrontendConfig.auditlog_exptime, CONFIG_INT, NULL},
- {CONFIG_SCHEMACHECK_ATTRIBUTE, config_set_schemacheck,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.schemacheck, CONFIG_ON_OFF, NULL},
- {CONFIG_SYNTAXCHECK_ATTRIBUTE, config_set_syntaxcheck,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.syntaxcheck, CONFIG_ON_OFF, NULL},
- {CONFIG_SYNTAXLOGGING_ATTRIBUTE, config_set_syntaxlogging,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.syntaxlogging, CONFIG_ON_OFF, NULL},
- {CONFIG_DN_VALIDATE_STRICT_ATTRIBUTE, config_set_dn_validate_strict,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.dn_validate_strict, CONFIG_ON_OFF, NULL},
- {CONFIG_DS4_COMPATIBLE_SCHEMA_ATTRIBUTE, config_set_ds4_compatible_schema,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.ds4_compatible_schema,
- CONFIG_ON_OFF, NULL},
- {CONFIG_SCHEMA_IGNORE_TRAILING_SPACES,
- config_set_schema_ignore_trailing_spaces, NULL, 0,
- (void**)&global_slapdFrontendConfig.schema_ignore_trailing_spaces,
- CONFIG_ON_OFF, NULL},
- {CONFIG_SCHEMAREPLACE_ATTRIBUTE, config_set_schemareplace, NULL, 0,
- (void**)&global_slapdFrontendConfig.schemareplace,
- CONFIG_STRING_OR_OFF, NULL},
- {CONFIG_ACCESSLOG_MAXLOGDISKSPACE_ATTRIBUTE, NULL,
- log_set_maxdiskspace, SLAPD_ACCESS_LOG,
- (void**)&global_slapdFrontendConfig.accesslog_maxdiskspace, CONFIG_INT, NULL},
- {CONFIG_REFERRAL_ATTRIBUTE, (ConfigSetFunc)config_set_defaultreferral,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.defaultreferral,
- CONFIG_SPECIAL_REFERRALLIST, NULL},
- {CONFIG_PW_MAXFAILURE_ATTRIBUTE, config_set_pw_maxfailure,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.pw_policy.pw_maxfailure, CONFIG_INT, NULL},
- {CONFIG_ACCESSLOG_ATTRIBUTE, config_set_accesslog,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.accesslog, CONFIG_STRING_OR_EMPTY, NULL},
- {CONFIG_LASTMOD_ATTRIBUTE, config_set_lastmod,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.lastmod, CONFIG_ON_OFF, NULL},
- {CONFIG_ROOTPWSTORAGESCHEME_ATTRIBUTE, config_set_rootpwstoragescheme,
- NULL, 0, NULL, CONFIG_STRING, (ConfigGetFunc)config_get_rootpwstoragescheme},
- {CONFIG_PW_HISTORY_ATTRIBUTE, config_set_pw_history,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.pw_policy.pw_history, CONFIG_ON_OFF, NULL},
- {CONFIG_SECURITY_ATTRIBUTE, config_set_security,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.security, CONFIG_ON_OFF, NULL},
- {CONFIG_PW_MAXAGE_ATTRIBUTE, config_set_pw_maxage,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.pw_policy.pw_maxage, CONFIG_LONG, NULL},
- {CONFIG_AUDITLOG_LOGROTATIONTIMEUNIT_ATTRIBUTE, NULL,
- log_set_rotationtimeunit, SLAPD_AUDIT_LOG,
- (void**)&global_slapdFrontendConfig.auditlog_rotationunit,
- CONFIG_STRING_OR_UNKNOWN, NULL},
- {CONFIG_PW_RESETFAILURECOUNT_ATTRIBUTE, config_set_pw_resetfailurecount,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.pw_policy.pw_resetfailurecount, CONFIG_LONG, NULL},
- {CONFIG_PW_ISGLOBAL_ATTRIBUTE, config_set_pw_is_global_policy,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.pw_is_global_policy, CONFIG_ON_OFF, NULL},
- {CONFIG_AUDITLOG_MAXNUMOFLOGSPERDIR_ATTRIBUTE, NULL,
- log_set_numlogsperdir, SLAPD_AUDIT_LOG,
- (void**)&global_slapdFrontendConfig.auditlog_maxnumlogs, CONFIG_INT, NULL},
- {CONFIG_ERRORLOG_LOGEXPIRATIONTIMEUNIT_ATTRIBUTE, NULL,
- log_set_expirationtimeunit, SLAPD_ERROR_LOG,
- (void**)&global_slapdFrontendConfig.errorlog_exptimeunit,
- CONFIG_STRING_OR_UNKNOWN, NULL},
- /* errorlog list is read only, so no set func and no config var addr */
- {CONFIG_ERRORLOG_LIST_ATTRIBUTE, NULL, NULL, 0, NULL,
- CONFIG_CHARRAY, (ConfigGetFunc)config_get_errorlog_list},
- {CONFIG_GROUPEVALNESTLEVEL_ATTRIBUTE, config_set_groupevalnestlevel,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.groupevalnestlevel, CONFIG_INT, NULL},
- {CONFIG_ACCESSLOG_LOGEXPIRATIONTIMEUNIT_ATTRIBUTE, NULL,
- log_set_expirationtimeunit, SLAPD_ACCESS_LOG,
- (void**)&global_slapdFrontendConfig.accesslog_exptimeunit,
- CONFIG_STRING_OR_UNKNOWN, NULL},
- {CONFIG_ROOTPW_ATTRIBUTE, config_set_rootpw,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.rootpw, CONFIG_STRING, NULL},
- {CONFIG_PW_CHANGE_ATTRIBUTE, config_set_pw_change,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.pw_policy.pw_change, CONFIG_ON_OFF, NULL},
- {CONFIG_ACCESSLOGLEVEL_ATTRIBUTE, config_set_accesslog_level,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.accessloglevel, CONFIG_INT, NULL},
- {CONFIG_ERRORLOG_LOGROTATIONTIMEUNIT_ATTRIBUTE, NULL,
- log_set_rotationtimeunit, SLAPD_ERROR_LOG,
- (void**)&global_slapdFrontendConfig.errorlog_rotationunit,
- CONFIG_STRING_OR_UNKNOWN, NULL},
- {CONFIG_SECUREPORT_ATTRIBUTE, config_set_secureport,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.secureport, CONFIG_INT, NULL},
- {CONFIG_BASEDN_ATTRIBUTE, config_set_basedn,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.certmap_basedn, CONFIG_STRING, NULL},
- {CONFIG_TIMELIMIT_ATTRIBUTE, config_set_timelimit,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.timelimit, CONFIG_INT, NULL},
- {CONFIG_ERRORLOG_MAXLOGSIZE_ATTRIBUTE, NULL,
- log_set_logsize, SLAPD_ERROR_LOG,
- (void**)&global_slapdFrontendConfig.errorlog_maxlogsize, CONFIG_INT, NULL},
- {CONFIG_RESERVEDESCRIPTORS_ATTRIBUTE, config_set_reservedescriptors,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.reservedescriptors, CONFIG_INT, NULL},
- /* access log list is read only, no set func, no config var addr */
- {CONFIG_ACCESSLOG_LIST_ATTRIBUTE, NULL, NULL, 0,
- NULL, CONFIG_CHARRAY, (ConfigGetFunc)config_get_accesslog_list},
- {CONFIG_SVRTAB_ATTRIBUTE, config_set_srvtab,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.srvtab, CONFIG_STRING, NULL},
- {CONFIG_PW_EXP_ATTRIBUTE, config_set_pw_exp,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.pw_policy.pw_exp, CONFIG_ON_OFF, NULL},
- {CONFIG_ACCESSCONTROL_ATTRIBUTE, config_set_accesscontrol,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.accesscontrol, CONFIG_ON_OFF, NULL},
- {CONFIG_AUDITLOG_LIST_ATTRIBUTE, NULL, NULL, 0,
- NULL, CONFIG_CHARRAY, (ConfigGetFunc)config_get_auditlog_list},
- {CONFIG_ACCESSLOG_LOGROTATIONTIMEUNIT_ATTRIBUTE, NULL,
- log_set_rotationtimeunit, SLAPD_ACCESS_LOG,
- (void**)&global_slapdFrontendConfig.accesslog_rotationunit, CONFIG_STRING, NULL},
- {CONFIG_PW_LOCKDURATION_ATTRIBUTE, config_set_pw_lockduration,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.pw_policy.pw_lockduration, CONFIG_LONG, NULL},
- {CONFIG_ACCESSLOG_MAXLOGSIZE_ATTRIBUTE, NULL,
- log_set_logsize, SLAPD_ACCESS_LOG,
- (void**)&global_slapdFrontendConfig.accesslog_maxlogsize, CONFIG_INT, NULL},
- {CONFIG_IDLETIMEOUT_ATTRIBUTE, config_set_idletimeout,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.idletimeout, CONFIG_INT, NULL},
- {CONFIG_NAGLE_ATTRIBUTE, config_set_nagle,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.nagle, CONFIG_ON_OFF, NULL},
- {CONFIG_ERRORLOG_MINFREEDISKSPACE_ATTRIBUTE, NULL,
- log_set_mindiskspace, SLAPD_ERROR_LOG,
- (void**)&global_slapdFrontendConfig.errorlog_minfreespace, CONFIG_INT, NULL},
- {CONFIG_AUDITLOG_LOGGING_ENABLED_ATTRIBUTE, NULL,
- log_set_logging, SLAPD_AUDIT_LOG,
- (void**)&global_slapdFrontendConfig.auditlog_logging_enabled, CONFIG_ON_OFF, NULL},
- {CONFIG_ACCESSLOG_BUFFERING_ATTRIBUTE, config_set_accesslogbuffering,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.accesslogbuffering, CONFIG_ON_OFF, NULL},
- {CONFIG_CSNLOGGING_ATTRIBUTE, config_set_csnlogging,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.csnlogging, CONFIG_ON_OFF, NULL},
- {CONFIG_AUDITLOG_LOGEXPIRATIONTIMEUNIT_ATTRIBUTE, NULL,
- log_set_expirationtimeunit, SLAPD_AUDIT_LOG,
- (void**)&global_slapdFrontendConfig.auditlog_exptimeunit,
- CONFIG_STRING_OR_UNKNOWN, NULL},
- {CONFIG_PW_SYNTAX_ATTRIBUTE, config_set_pw_syntax,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.pw_policy.pw_syntax, CONFIG_ON_OFF, NULL},
- {CONFIG_LISTENHOST_ATTRIBUTE, config_set_listenhost,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.listenhost, CONFIG_STRING, NULL},
- {CONFIG_LDAPI_FILENAME_ATTRIBUTE, config_set_ldapi_filename,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.ldapi_filename, CONFIG_STRING, NULL},
- {CONFIG_LDAPI_SWITCH_ATTRIBUTE, config_set_ldapi_switch,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.ldapi_switch, CONFIG_ON_OFF, NULL},
- {CONFIG_LDAPI_BIND_SWITCH_ATTRIBUTE, config_set_ldapi_bind_switch,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.ldapi_bind_switch, CONFIG_ON_OFF, NULL},
- {CONFIG_LDAPI_ROOT_DN_ATTRIBUTE, config_set_ldapi_root_dn,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.ldapi_root_dn, CONFIG_STRING, NULL},
- {CONFIG_LDAPI_MAP_ENTRIES_ATTRIBUTE, config_set_ldapi_map_entries,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.ldapi_map_entries, CONFIG_ON_OFF, NULL},
- {CONFIG_LDAPI_UIDNUMBER_TYPE_ATTRIBUTE, config_set_ldapi_uidnumber_type,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.ldapi_uidnumber_type, CONFIG_STRING, NULL},
- {CONFIG_LDAPI_GIDNUMBER_TYPE_ATTRIBUTE, config_set_ldapi_gidnumber_type,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.ldapi_gidnumber_type, CONFIG_STRING, NULL},
- {CONFIG_LDAPI_SEARCH_BASE_DN_ATTRIBUTE, config_set_ldapi_search_base_dn,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.ldapi_search_base_dn, CONFIG_STRING, NULL},
- #if defined(ENABLE_AUTO_DN_SUFFIX)
- {CONFIG_LDAPI_AUTO_DN_SUFFIX_ATTRIBUTE, config_set_ldapi_auto_dn_suffix,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.ldapi_auto_dn_suffix, CONFIG_STRING, NULL},
- #endif
- {CONFIG_SLAPI_COUNTER_ATTRIBUTE, config_set_slapi_counters,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.slapi_counters, CONFIG_ON_OFF,
- (ConfigGetFunc)config_get_slapi_counters},
- {CONFIG_ACCESSLOG_MINFREEDISKSPACE_ATTRIBUTE, NULL,
- log_set_mindiskspace, SLAPD_ACCESS_LOG,
- (void**)&global_slapdFrontendConfig.accesslog_minfreespace, CONFIG_INT, NULL},
- {CONFIG_ERRORLOG_MAXNUMOFLOGSPERDIR_ATTRIBUTE, NULL,
- log_set_numlogsperdir, SLAPD_ERROR_LOG,
- (void**)&global_slapdFrontendConfig.errorlog_maxnumlogs, CONFIG_INT, NULL},
- {CONFIG_SECURELISTENHOST_ATTRIBUTE, config_set_securelistenhost,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.securelistenhost, CONFIG_STRING, NULL},
- {CONFIG_AUDITLOG_MINFREEDISKSPACE_ATTRIBUTE, NULL,
- log_set_mindiskspace, SLAPD_AUDIT_LOG,
- (void**)&global_slapdFrontendConfig.auditlog_minfreespace, CONFIG_INT, NULL},
- {CONFIG_ROOTDN_ATTRIBUTE, config_set_rootdn,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.rootdn, CONFIG_STRING, NULL},
- {CONFIG_PW_MINAGE_ATTRIBUTE, config_set_pw_minage,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.pw_policy.pw_minage, CONFIG_LONG, NULL},
- {CONFIG_AUDITFILE_ATTRIBUTE, config_set_auditlog,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.auditlog, CONFIG_STRING_OR_EMPTY, NULL},
- {CONFIG_RETURN_EXACT_CASE_ATTRIBUTE, config_set_return_exact_case,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.return_exact_case, CONFIG_ON_OFF, NULL},
- {CONFIG_RESULT_TWEAK_ATTRIBUTE, config_set_result_tweak,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.result_tweak, CONFIG_ON_OFF, NULL},
- {CONFIG_ATTRIBUTE_NAME_EXCEPTION_ATTRIBUTE, config_set_attrname_exceptions,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.attrname_exceptions, CONFIG_ON_OFF, NULL},
- {CONFIG_MAXBERSIZE_ATTRIBUTE, config_set_maxbersize,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.maxbersize, CONFIG_INT, NULL},
- {CONFIG_MAXSASLIOSIZE_ATTRIBUTE, config_set_maxsasliosize,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.maxsasliosize, CONFIG_INT, NULL},
- {CONFIG_VERSIONSTRING_ATTRIBUTE, config_set_versionstring,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.versionstring, CONFIG_STRING, NULL},
- {CONFIG_REFERRAL_MODE_ATTRIBUTE, config_set_referral_mode,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.refer_url, CONFIG_STRING, NULL},
- #if !defined(_WIN32) && !defined(AIX)
- {CONFIG_MAXDESCRIPTORS_ATTRIBUTE, config_set_maxdescriptors,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.maxdescriptors, CONFIG_INT, NULL},
- #endif
- {CONFIG_CONNTABLESIZE_ATTRIBUTE, config_set_conntablesize,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.conntablesize, CONFIG_INT, NULL},
- {CONFIG_SSLCLIENTAUTH_ATTRIBUTE, config_set_SSLclientAuth,
- NULL, 0,
- (void **)&global_slapdFrontendConfig.SSLclientAuth, CONFIG_SPECIAL_SSLCLIENTAUTH, NULL},
- {CONFIG_SSL_CHECK_HOSTNAME_ATTRIBUTE, config_set_ssl_check_hostname,
- NULL, 0, NULL, CONFIG_ON_OFF, (ConfigGetFunc)config_get_ssl_check_hostname},
- {CONFIG_CONFIG_ATTRIBUTE, 0, NULL, 0, (void**)SLAPD_CONFIG_DN,
- CONFIG_CONSTANT_STRING, NULL},
- {CONFIG_HASH_FILTERS_ATTRIBUTE, config_set_hash_filters,
- NULL, 0, NULL, CONFIG_ON_OFF, (ConfigGetFunc)config_get_hash_filters},
- /* instance dir; used by admin tasks */
- {CONFIG_INSTDIR_ATTRIBUTE, config_set_instancedir,
- NULL, 0, NULL, CONFIG_STRING, NULL},
- /* parameterizing schema dir */
- {CONFIG_SCHEMADIR_ATTRIBUTE, config_set_schemadir,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.schemadir, CONFIG_STRING, NULL},
- /* parameterizing lock dir */
- {CONFIG_LOCKDIR_ATTRIBUTE, config_set_lockdir,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.lockdir, CONFIG_STRING, (ConfigGetFunc)config_get_lockdir},
- /* parameterizing tmp dir */
- {CONFIG_TMPDIR_ATTRIBUTE, config_set_tmpdir,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.tmpdir, CONFIG_STRING, (ConfigGetFunc)config_get_tmpdir},
- /* parameterizing cert dir */
- {CONFIG_CERTDIR_ATTRIBUTE, config_set_certdir,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.certdir, CONFIG_STRING, (ConfigGetFunc)config_get_certdir},
- /* parameterizing ldif dir */
- {CONFIG_LDIFDIR_ATTRIBUTE, config_set_ldifdir,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.ldifdir, CONFIG_STRING, (ConfigGetFunc)config_get_ldifdir},
- /* parameterizing bak dir */
- {CONFIG_BAKDIR_ATTRIBUTE, config_set_bakdir,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.bakdir, CONFIG_STRING, (ConfigGetFunc)config_get_bakdir},
- /* parameterizing sasl plugin path */
- {CONFIG_SASLPATH_ATTRIBUTE, config_set_saslpath,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.saslpath, CONFIG_STRING, (ConfigGetFunc)config_get_saslpath},
- /* parameterizing run dir */
- {CONFIG_RUNDIR_ATTRIBUTE, config_set_rundir,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.rundir, CONFIG_STRING, (ConfigGetFunc)config_get_rundir},
- {CONFIG_REWRITE_RFC1274_ATTRIBUTE, config_set_rewrite_rfc1274,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.rewrite_rfc1274, CONFIG_ON_OFF, NULL},
- {CONFIG_OUTBOUND_LDAP_IO_TIMEOUT_ATTRIBUTE,
- config_set_outbound_ldap_io_timeout,
- NULL, 0,
- (void **)&global_slapdFrontendConfig.outbound_ldap_io_timeout,
- CONFIG_INT, NULL},
- {CONFIG_UNAUTH_BINDS_ATTRIBUTE, config_set_unauth_binds_switch,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.allow_unauth_binds, CONFIG_ON_OFF,
- (ConfigGetFunc)config_get_unauth_binds_switch},
- {CONFIG_REQUIRE_SECURE_BINDS_ATTRIBUTE, config_set_require_secure_binds,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.require_secure_binds, CONFIG_ON_OFF,
- (ConfigGetFunc)config_get_require_secure_binds}
- #ifdef MEMPOOL_EXPERIMENTAL
- ,{CONFIG_MEMPOOL_SWITCH_ATTRIBUTE, config_set_mempool_switch,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.mempool_switch, CONFIG_ON_OFF, (ConfigGetFunc)config_get_mempool_switch},
- {CONFIG_MEMPOOL_MAXFREELIST_ATTRIBUTE, config_set_mempool_maxfreelist,
- NULL, 0,
- (void**)&global_slapdFrontendConfig.mempool_maxfreelist, CONFIG_INT, (ConfigGetFunc)config_get_mempool_maxfreelist}
- #endif /* MEMPOOL_EXPERIMENTAL */
- };
- /*
- * hashNocaseString - used for case insensitive hash lookups
- */
- static PLHashNumber
- hashNocaseString(const void *key)
- {
- PLHashNumber h = 0;
- const unsigned char *s;
-
- for (s = key; *s; s++)
- h = (h >> 28) ^ (h << 4) ^ (tolower(*s));
- return h;
- }
- /*
- * hashNocaseCompare - used for case insensitive hash key comparisons
- */
- static PRIntn
- hashNocaseCompare(const void *v1, const void *v2)
- {
- return (strcasecmp((char *)v1, (char *)v2) == 0);
- }
- static PLHashTable *confighash = 0;
- static void
- init_config_get_and_set()
- {
- if (!confighash) {
- int ii = 0;
- int tablesize = sizeof(ConfigList)/sizeof(ConfigList[0]);
- confighash = PL_NewHashTable(tablesize+1, hashNocaseString,
- hashNocaseCompare,
- PL_CompareValues, 0, 0);
- for (ii = 0; ii < tablesize; ++ii) {
- if (PL_HashTableLookup(confighash, ConfigList[ii].attr_name))
- printf("error: %s is already in the list\n",
- ConfigList[ii].attr_name);
- if (!PL_HashTableAdd(confighash, ConfigList[ii].attr_name, &ConfigList[ii]))
- printf("error: could not add %s to the list\n",
- ConfigList[ii].attr_name);
- }
- }
- }
- #if 0
- #define GOLDEN_RATIO 0x9E3779B9U
- PR_IMPLEMENT(PLHashEntry **)
- PL_HashTableRawLookup(PLHashTable *ht, PLHashNumber keyHash, const void *key)
- {
- PLHashEntry *he, **hep, **hep0;
- PLHashNumber h;
- #ifdef HASHMETER
- ht->nlookups++;
- #endif
- h = keyHash * GOLDEN_RATIO;
- h >>= ht->shift;
- hep = hep0 = &ht->buckets[h];
- while ((he = *hep) != 0) {
- if (he->keyHash == keyHash && (*ht->keyCompare)(key, he->key)) {
- /* Move to front of chain if not already there */
- if (hep != hep0) {
- *hep = he->next;
- he->next = *hep0;
- *hep0 = he;
- }
- return hep0;
- }
- hep = &he->next;
- #ifdef HASHMETER
- ht->nsteps++;
- #endif
- }
- return hep;
- }
- static void
- debugHashTable(const char *key)
- {
- int ii = 0;
- PLHashEntry **hep = PL_HashTableRawLookup(confighash, hashNocaseString(key),
- key);
- if (!hep || !*hep)
- printf("raw lookup failed for %s\n", key);
- else if (hep && *hep)
- printf("raw lookup found %s -> %ul %s\n", key, (*hep)->keyHash, (*hep)->key);
- printf("hash table has %d entries\n", confighash->nentries);
- for (ii = 0; ii < confighash->nentries; ++ii)
- {
- PLHashEntry *he = confighash->buckets[ii];
- if (!he)
- printf("hash table entry %d is null\n", ii);
- else {
- printf("hash bucket %d:\n", ii);
- while (he) {
- int keys = !hashNocaseCompare(key, he->key);
- int hash = (hashNocaseString(key) == he->keyHash);
- printf("\thashval = %ul key = %s\n", he->keyHash, he->key);
- if (keys && hash) {
- printf("\t\tFOUND\n");
- } else if (keys) {
- printf("\t\tkeys match but hash vals do not\n");
- } else if (hash) {
- printf("\t\thash match but keys do not\n");
- }
- he = he->next;
- }
- }
- }
- }
- #endif
- static void
- bervalarray_free(struct berval **bvec)
- {
- int ii = 0;
- for(ii = 0; bvec && bvec[ii]; ++ii) {
- slapi_ch_free((void **)&bvec[ii]->bv_val);
- slapi_ch_free((void **)&bvec[ii]);
- }
- slapi_ch_free((void**)&bvec);
- }
- static struct berval **
- strarray2bervalarray(const char **strarray)
- {
- int ii = 0;
- struct berval **newlist = 0;
- /* first, count the number of items in the list */
- for (ii = 0; strarray && strarray[ii]; ++ii);
- /* if no items, return null */
- if (!ii)
- return newlist;
- /* allocate the list */
- newlist = (struct berval **)slapi_ch_malloc((ii+1) * sizeof(struct berval *));
- newlist[ii] = 0;
- for (; ii; --ii) {
- newlist[ii-1] = (struct berval *)slapi_ch_malloc(sizeof(struct berval));
- newlist[ii-1]->bv_val = slapi_ch_strdup(strarray[ii-1]);
- newlist[ii-1]->bv_len = strlen(strarray[ii-1]);
- }
- return newlist;
- }
- /*
- * counter for active threads
- */
- static PRInt32 active_threads = 0;
- void
- g_incr_active_threadcnt()
- {
- PR_AtomicIncrement(&active_threads);
- }
- void
- g_decr_active_threadcnt()
- {
- PR_AtomicDecrement(&active_threads);
- }
- int
- g_get_active_threadcnt()
- {
- return (int)active_threads;
- }
- /*
- ** Setting this flag forces the server to shutdown.
- */
- static int slapd_shutdown;
- void g_set_shutdown( int reason )
- {
- slapd_shutdown = reason;
- }
- int g_get_shutdown()
- {
- return slapd_shutdown;
- }
- static int cmd_shutdown;
- void c_set_shutdown()
- {
- cmd_shutdown = SLAPI_SHUTDOWN_SIGNAL;
- }
- int c_get_shutdown()
- {
- return cmd_shutdown;
- }
- slapdFrontendConfig_t *
- getFrontendConfig()
- {
- return &global_slapdFrontendConfig;
- }
- /*
- * FrontendConfig_init:
- * Put all default values for config stuff here.
- * If there's no default value, the value will be NULL if it's not set in dse.ldif
- */
- void
- FrontendConfig_init () {
- slapdFrontendConfig_t *cfg = getFrontendConfig();
- /* initialize the read/write configuration lock */
- if ( (cfg->cfg_rwlock = rwl_new()) == NULL ) {
- LDAPDebug ( LDAP_DEBUG_ANY,
- "FrontendConfig_init: failed to initialize cfg_rwlock. Exiting now.",
- 0,0,0 );
- exit(-1);
- }
-
- cfg->port = LDAP_PORT;
- cfg->secureport = LDAPS_PORT;
- cfg->ldapi_filename = slapi_ch_strdup(SLAPD_LDAPI_DEFAULT_FILENAME);
- cfg->ldapi_switch = LDAP_OFF;
- cfg->ldapi_bind_switch = LDAP_OFF;
- cfg->ldapi_root_dn = slapi_ch_strdup("cn=Directory Manager");
- cfg->ldapi_map_entries = LDAP_OFF;
- cfg->ldapi_uidnumber_type = slapi_ch_strdup("uidNumber");
- cfg->ldapi_gidnumber_type = slapi_ch_strdup("gidNumber");
- cfg->ldapi_search_base_dn = slapi_ch_strdup("dc=example, dc=com");
- #if defined(ENABLE_AUTO_DN_SUFFIX)
- cfg->ldapi_auto_dn_suffix = slapi_ch_strdup("cn=peercred,cn=external,cn=auth");
- #endif
- cfg->allow_unauth_binds = LDAP_OFF;
- cfg->require_secure_binds = LDAP_OFF;
- cfg->slapi_counters = LDAP_ON;
- cfg->threadnumber = SLAPD_DEFAULT_MAX_THREADS;
- cfg->maxthreadsperconn = SLAPD_DEFAULT_MAX_THREADS_PER_CONN;
- cfg->reservedescriptors = SLAPD_DEFAULT_RESERVE_FDS;
- cfg->idletimeout = SLAPD_DEFAULT_IDLE_TIMEOUT;
- cfg->ioblocktimeout = SLAPD_DEFAULT_IOBLOCK_TIMEOUT;
- cfg->outbound_ldap_io_timeout = SLAPD_DEFAULT_OUTBOUND_LDAP_IO_TIMEOUT;
- cfg->max_filter_nest_level = SLAPD_DEFAULT_MAX_FILTER_NEST_LEVEL;
- cfg->maxsasliosize = SLAPD_DEFAULT_MAX_SASLIO_SIZE;
- #ifdef _WIN32
- cfg->conntablesize = SLAPD_DEFAULT_CONNTABLESIZE;
- #else
- #ifdef USE_SYSCONF
- cfg->conntablesize = sysconf( _SC_OPEN_MAX );
- #else /* USE_SYSCONF */
- cfg->conntablesize = getdtablesize();
- #endif /* USE_SYSCONF */
- #endif /* _WIN32 */
- cfg->accesscontrol = LDAP_ON;
- cfg->security = LDAP_OFF;
- cfg->ssl_check_hostname = LDAP_ON;
- cfg->return_exact_case = LDAP_ON;
- cfg->result_tweak = LDAP_OFF;
- cfg->reservedescriptors = SLAPD_DEFAULT_RESERVE_FDS;
- cfg->useroc = slapi_ch_strdup ( "" );
- cfg->userat = slapi_ch_strdup ( "" );
- /* kexcoff: should not be initialized by default here
- cfg->rootpwstoragescheme = pw_name2scheme( SHA1_SCHEME_NAME );
- cfg->pw_storagescheme = pw_name2scheme( SHA1_SCHEME_NAME );
- */
- cfg->slapd_type = 0;
- cfg->versionstring = SLAPD_VERSION_STR;
- cfg->sizelimit = SLAPD_DEFAULT_SIZELIMIT;
- cfg->timelimit = SLAPD_DEFAULT_TIMELIMIT;
- cfg->schemacheck = LDAP_ON;
- cfg->syntaxcheck = LDAP_OFF;
- cfg->syntaxlogging = LDAP_OFF;
- cfg->dn_validate_strict = LDAP_OFF;
- cfg->ds4_compatible_schema = LDAP_OFF;
- cfg->enquote_sup_oc = LDAP_OFF;
- cfg->lastmod = LDAP_ON;
- cfg->rewrite_rfc1274 = LDAP_OFF;
- cfg->schemareplace = slapi_ch_strdup( CONFIG_SCHEMAREPLACE_STR_REPLICATION_ONLY );
- cfg->schema_ignore_trailing_spaces = SLAPD_DEFAULT_SCHEMA_IGNORE_TRAILING_SPACES;
- cfg->pwpolicy_local = LDAP_OFF;
- cfg->pw_policy.pw_change = LDAP_ON;
- cfg->pw_policy.pw_must_change = LDAP_OFF;
- cfg->pw_policy.pw_syntax = LDAP_OFF;
- cfg->pw_policy.pw_exp = LDAP_OFF;
- cfg->pw_policy.pw_minlength = 8;
- cfg->pw_policy.pw_mindigits = 0;
- cfg->pw_policy.pw_minalphas = 0;
- cfg->pw_policy.pw_minuppers = 0;
- cfg->pw_policy.pw_minlowers = 0;
- cfg->pw_policy.pw_minspecials = 0;
- cfg->pw_policy.pw_min8bit = 0;
- cfg->pw_policy.pw_maxrepeats = 0;
- cfg->pw_policy.pw_mincategories = 3;
- cfg->pw_policy.pw_mintokenlength = 3;
- cfg->pw_policy.pw_maxage = 8640000; /* 100 days */
- cfg->pw_policy.pw_minage = 0;
- cfg->pw_policy.pw_warning = 86400; /* 1 day */
- cfg->pw_policy.pw_history = LDAP_OFF;
- cfg->pw_policy.pw_inhistory = 6;
- cfg->pw_policy.pw_lockout = LDAP_OFF;
- cfg->pw_policy.pw_maxfailure = 3;
- cfg->pw_policy.pw_unlock = LDAP_ON;
- cfg->pw_policy.pw_lockduration = 3600; /* 60 minutes */
- cfg->pw_policy.pw_resetfailurecount = 600; /* 10 minutes */
- cfg->pw_policy.pw_gracelimit = 0;
- cfg->pw_is_global_policy = LDAP_OFF;
- cfg->accesslog_logging_enabled = LDAP_ON;
- cfg->accesslog_mode = slapi_ch_strdup("600");
- cfg->accesslog_maxnumlogs = 10;
- cfg->accesslog_maxlogsize = 100;
- cfg->accesslog_rotationtime = 1;
- cfg->accesslog_rotationunit = slapi_ch_strdup("day");
- cfg->accesslog_rotationsync_enabled = LDAP_OFF;
- cfg->accesslog_rotationsynchour = 0;
- cfg->accesslog_rotationsyncmin = 0;
- cfg->accesslog_maxdiskspace = 500;
- cfg->accesslog_minfreespace = 5;
- cfg->accesslog_exptime = 1;
- cfg->accesslog_exptimeunit = slapi_ch_strdup("month");
- cfg->accessloglevel = 256;
- cfg->accesslogbuffering = LDAP_ON;
- cfg->csnlogging = LDAP_ON;
- cfg->errorlog_logging_enabled = LDAP_ON;
- cfg->errorlog_mode = slapi_ch_strdup("600");
- cfg->errorlog_maxnumlogs = 1;
- cfg->errorlog_maxlogsize = 100;
- cfg->errorlog_rotationtime = 1;
- cfg->errorlog_rotationunit = slapi_ch_strdup ("week");
- cfg->errorlog_rotationsync_enabled = LDAP_OFF;
- cfg->errorlog_rotationsynchour = 0;
- cfg->errorlog_rotationsyncmin = 0;
- cfg->errorlog_maxdiskspace = 100;
- cfg->errorlog_minfreespace = 5;
- cfg->errorlog_exptime = 1;
- cfg->errorlog_exptimeunit = slapi_ch_strdup("month");
- cfg->errorloglevel = 0;
- cfg->auditlog_logging_enabled = LDAP_OFF;
- cfg->auditlog_mode = slapi_ch_strdup("600");
- cfg->auditlog_maxnumlogs = 1;
- cfg->auditlog_maxlogsize = 100;
- cfg->auditlog_rotationtime = 1;
- cfg->auditlog_rotationunit = slapi_ch_strdup ("week");
- cfg->auditlog_rotationsync_enabled = LDAP_OFF;
- cfg->auditlog_rotationsynchour = 0;
- cfg->auditlog_rotationsyncmin = 0;
- cfg->auditlog_maxdiskspace = 100;
- cfg->auditlog_minfreespace = 5;
- cfg->auditlog_exptime = 1;
- cfg->auditlog_exptimeunit = slapi_ch_strdup("month");
- #ifdef MEMPOOL_EXPERIMENTAL
- cfg->mempool_switch = LDAP_ON;
- cfg->mempool_maxfreelist = 1024;
- cfg->system_page_size = sysconf(_SC_PAGE_SIZE); /* not to get every time; no set, get only */
- {
- long sc_size = cfg->system_page_size;
- cfg->system_page_bits = 0;
- while ((sc_size >>= 1) > 0) {
- cfg->system_page_bits++; /* to calculate once; no set, get only */
- }
- }
- #endif /* MEMPOOL_EXPERIMENTAL */
- init_config_get_and_set();
- }
- int
- g_get_global_lastmod()
- {
- return config_get_lastmod();
- }
- int g_get_slapd_security_on(){
- return config_get_security();
- }
- #ifdef _WIN32
- void libldap_init_debug_level(int *val_ptr)
- {
- module_ldap_debug = val_ptr;
- }
- #endif
- struct snmp_vars_t global_snmp_vars;
- struct snmp_vars_t * g_get_global_snmp_vars(){
- return &global_snmp_vars;
- }
- static slapdEntryPoints *sep = NULL;
- void
- set_dll_entry_points( slapdEntryPoints *p )
- {
- if ( NULL == sep )
- {
- sep = p;
- }
- }
- int
- get_entry_point( int ep_name, caddr_t *ep_addr )
- {
- int rc = 0;
- if(sep!=NULL)
- {
- switch ( ep_name ) {
- case ENTRY_POINT_PS_WAKEUP_ALL:
- *ep_addr = sep->sep_ps_wakeup_all;
- break;
- case ENTRY_POINT_PS_SERVICE:
- *ep_addr = sep->sep_ps_service;
- break;
- case ENTRY_POINT_DISCONNECT_SERVER:
- *ep_addr = sep->sep_disconnect_server;
- break;
- case ENTRY_POINT_SLAPD_SSL_INIT:
- *ep_addr = sep->sep_slapd_ssl_init;
- break;
- case ENTRY_POINT_SLAPD_SSL_INIT2:
- *ep_addr = sep->sep_slapd_ssl_init2;
- break;
- default:
- rc = -1;
- }
- }
- else
- {
- rc= -1;
- }
- return rc;
- }
- /*
- * Utility function called by many of the config_set_XXX() functions.
- * Returns a non-zero value if 'value' is NULL and zero if not.
- * Also constructs an error message in 'errorbuf' if value is NULL.
- * If or_zero_length is non-zero, zero length values are treated as
- * equivalent to NULL (i.e., they will cause a non-zero value to be
- * returned by this function).
- */
- static int
- config_value_is_null( const char *attrname, const char *value, char *errorbuf,
- int or_zero_length )
- {
- if ( NULL == value || ( or_zero_length && *value == '\0' )) {
- PR_snprintf( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE, "%s: NULL value",
- attrname );
- return 1;
- }
- return 0;
- }
- int
- config_set_port( const char *attrname, char *port, char *errorbuf, int apply ) {
- long nPort;
- char *endp = NULL;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal = LDAP_SUCCESS;
-
- if ( config_value_is_null( attrname, port, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- errno = 0;
- nPort = strtol(port, &endp, 10);
-
- if ( *endp != '\0' || errno == ERANGE || nPort > LDAP_PORT_MAX || nPort < 0 ) {
- retVal = LDAP_OPERATIONS_ERROR;
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE,
- "%s: \"%s\" is invalid, ports must range from 0 to %d",
- attrname, port, LDAP_PORT_MAX );
- return retVal;
- }
- if ( nPort == 0 ) {
- LDAPDebug( LDAP_DEBUG_ANY,
- "Information: Non-Secure Port Disabled\n", 0, 0, 0 );
- }
-
- if ( apply ) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapdFrontendConfig->port = nPort;
- /* n_port = nPort; */
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- int
- config_set_secureport( const char *attrname, char *port, char *errorbuf, int apply ) {
- long nPort;
- char *endp = NULL;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal = LDAP_SUCCESS;
- if ( config_value_is_null( attrname, port, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- errno = 0;
- nPort = strtol(port, &endp, 10);
-
- if (*endp != '\0' || errno == ERANGE || nPort > LDAP_PORT_MAX || nPort <= 0 ) {
- retVal = LDAP_OPERATIONS_ERROR;
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE,
- "%s: \"%s\" is invalid, ports must range from 1 to %d",
- attrname, port, LDAP_PORT_MAX );
- }
-
- if (apply) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
-
- slapdFrontendConfig->secureport = nPort;
-
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
-
- int
- config_set_SSLclientAuth( const char *attrname, char *value, char *errorbuf, int apply ) {
-
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- retVal = LDAP_OPERATIONS_ERROR;
- }
- /* first check the value, return an error if it's invalid */
- else if ( strcasecmp (value, "off") != 0 &&
- strcasecmp (value, "allowed") != 0 &&
- strcasecmp (value, "required")!= 0 ) {
- retVal = LDAP_OPERATIONS_ERROR;
- if( errorbuf )
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE,
- "%s: unsupported value: %s", attrname, value );
- return retVal;
- }
- else if ( !apply ) {
- /* return success now, if we aren't supposed to apply the change */
- return retVal;
- }
- CFG_LOCK_WRITE(slapdFrontendConfig);
- if ( !strcasecmp( value, "off" )) {
- slapdFrontendConfig->SSLclientAuth = SLAPD_SSLCLIENTAUTH_OFF;
- }
- else if ( !strcasecmp( value, "allowed" )) {
- slapdFrontendConfig->SSLclientAuth = SLAPD_SSLCLIENTAUTH_ALLOWED;
- }
- else if ( !strcasecmp( value, "required" )) {
- slapdFrontendConfig->SSLclientAuth = SLAPD_SSLCLIENTAUTH_REQUIRED;
- }
- else {
- retVal = LDAP_OPERATIONS_ERROR;
- if( errorbuf )
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE,
- "%s: unsupported value: %s", attrname, value );
- }
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
-
- return retVal;
- }
- int
- config_set_ssl_check_hostname(const char *attrname, char *value,
- char *errorbuf, int apply)
- {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- retVal = config_set_onoff(attrname,
- value,
- &(slapdFrontendConfig->ssl_check_hostname),
- errorbuf,
- apply);
-
- return retVal;
- }
- int
- config_set_localhost( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- if (apply) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapi_ch_free ( (void **) &(slapdFrontendConfig->localhost) );
- slapdFrontendConfig->localhost = slapi_ch_strdup ( value );
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- int
- config_set_listenhost( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
-
- if ( apply) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
-
- slapi_ch_free ( (void **) &(slapdFrontendConfig->listenhost) );
- slapdFrontendConfig->listenhost = slapi_ch_strdup ( value );
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- int
- config_set_ldapi_filename( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- if ( apply) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapi_ch_free ( (void **) &(slapdFrontendConfig->ldapi_filename) );
- slapdFrontendConfig->ldapi_filename = slapi_ch_strdup ( value );
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- int
- config_set_ldapi_switch( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- retVal = config_set_onoff(attrname,
- value,
- &(slapdFrontendConfig->ldapi_switch),
- errorbuf,
- apply);
- return retVal;
- }
- int config_set_ldapi_bind_switch( const char *attrname, char *value, char *errorbuf, int apply )
- {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- retVal = config_set_onoff(attrname,
- value,
- &(slapdFrontendConfig->ldapi_bind_switch),
- errorbuf,
- apply);
- return retVal;
- }
- int config_set_ldapi_root_dn( const char *attrname, char *value, char *errorbuf, int apply )
- {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- if ( apply) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapi_ch_free ( (void **) &(slapdFrontendConfig->ldapi_root_dn) );
- slapdFrontendConfig->ldapi_root_dn = slapi_ch_strdup ( value );
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- int config_set_ldapi_map_entries( const char *attrname, char *value, char *errorbuf, int apply )
- {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- retVal = config_set_onoff(attrname,
- value,
- &(slapdFrontendConfig->ldapi_map_entries),
- errorbuf,
- apply);
- return retVal;
- }
- int config_set_ldapi_uidnumber_type( const char *attrname, char *value, char *errorbuf, int apply )
- {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- if ( apply) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapi_ch_free ( (void **) &(slapdFrontendConfig->ldapi_uidnumber_type) );
- slapdFrontendConfig->ldapi_uidnumber_type = slapi_ch_strdup ( value );
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- int config_set_ldapi_gidnumber_type( const char *attrname, char *value, char *errorbuf, int apply )
- {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- if ( apply) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapi_ch_free ( (void **) &(slapdFrontendConfig->ldapi_gidnumber_type) );
- slapdFrontendConfig->ldapi_gidnumber_type = slapi_ch_strdup ( value );
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- int config_set_ldapi_search_base_dn( const char *attrname, char *value, char *errorbuf, int apply )
- {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- if ( apply) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapi_ch_free ( (void **) &(slapdFrontendConfig->ldapi_search_base_dn) );
- slapdFrontendConfig->ldapi_search_base_dn = slapi_ch_strdup ( value );
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- #if defined(ENABLE_AUTO_DN_SUFFIX)
- int config_set_ldapi_auto_dn_suffix( const char *attrname, char *value, char *errorbuf, int apply )
- {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- if ( apply) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapi_ch_free ( (void **) &(slapdFrontendConfig->ldapi_auto_dn_suffix) );
- slapdFrontendConfig->ldapi_auto_dn_suffix = slapi_ch_strdup ( value );
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- #endif
- /*
- * Set nsslapd-counters: on | off to the internal config variable slapi_counters.
- * If set to off, slapi_counters is not initialized and the counters are not
- * incremented. Note: counters which are necessary for the server's running
- * are not disabled.
- */
- int config_set_slapi_counters( const char *attrname, char *value, char *errorbuf, int apply )
- {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- retVal = config_set_onoff(attrname, value,
- &(slapdFrontendConfig->slapi_counters), errorbuf, apply);
- return retVal;
- }
- int
- config_set_securelistenhost( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- if ( apply ) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
-
- slapi_ch_free ( (void **) &(slapdFrontendConfig->securelistenhost) );
- slapdFrontendConfig->securelistenhost = slapi_ch_strdup ( value );
-
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- int
- config_set_srvtab( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- if (apply) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
-
- slapi_ch_free ( (void **) &(slapdFrontendConfig->srvtab) );
- ldap_srvtab = slapi_ch_strdup ( value );
- slapdFrontendConfig->srvtab = slapi_ch_strdup ( value );
-
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- int
- config_set_sizelimit( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- long sizelimit;
- char *endp = NULL;
- Slapi_Backend *be;
- char *cookie;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- errno = 0;
- sizelimit = strtol(value, &endp, 10);
- if ( *endp != '\0' || errno == ERANGE || sizelimit < -1 ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE, "%s: \"%s\" is invalid, sizelimit must range from -1 to %ld",
- attrname, value, LONG_MAX );
- retVal = LDAP_OPERATIONS_ERROR;
- return retVal;
- }
- if (apply) {
-
- CFG_LOCK_WRITE(slapdFrontendConfig);
-
- slapdFrontendConfig->sizelimit= sizelimit;
- g_set_defsize (sizelimit);
- cookie = NULL;
- be = slapi_get_first_backend(&cookie);
- while (be) {
- be->be_sizelimit = slapdFrontendConfig->sizelimit;
- be = slapi_get_next_backend(cookie);
- }
-
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- slapi_ch_free ((void **)&cookie);
- }
- return retVal;
- }
- int
- config_set_pw_storagescheme( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- struct pw_scheme *new_scheme = NULL;
- char * scheme_list = NULL;
-
- if ( config_value_is_null( attrname, value, errorbuf, 1 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- scheme_list = plugin_get_pwd_storage_scheme_list(PLUGIN_LIST_PWD_STORAGE_SCHEME);
-
- new_scheme = pw_name2scheme(value);
- if ( new_scheme == NULL) {
- if ( scheme_list != NULL ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE,
- "%s: invalid scheme - %s. Valid schemes are: %s",
- attrname, value, scheme_list );
- } else {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE,
- "%s: invalid scheme - %s (no pwdstorage scheme"
- " plugin loaded)",
- attrname, value);
- }
- retVal = LDAP_OPERATIONS_ERROR;
- slapi_ch_free_string(&scheme_list);
- return retVal;
- }
- else if ( new_scheme->pws_enc == NULL )
- {
- /* For example: the NS-MTA-MD5 password scheme is for comparision only and for backward
- compatibility with an Old Messaging Server that was setting passwords in the
- directory already encrypted. The scheme cannot and don't encrypt password if
- they are in clear. We don't take it */
- if ( scheme_list != NULL ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE,
- "pw_storagescheme: invalid encoding scheme - %s\nValid values are: %s\n", value, scheme_list );
- }
- retVal = LDAP_UNWILLING_TO_PERFORM;
- slapi_ch_free_string(&scheme_list);
- return retVal;
- }
-
- if ( apply ) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- free_pw_scheme(slapdFrontendConfig->pw_storagescheme);
- slapdFrontendConfig->pw_storagescheme = new_scheme;
-
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- } else {
- free_pw_scheme(new_scheme);
- }
- slapi_ch_free_string(&scheme_list);
- return retVal;
- }
-
- int
- config_set_pw_change( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- retVal = config_set_onoff ( attrname,
- value,
- &(slapdFrontendConfig->pw_policy.pw_change),
- errorbuf,
- apply);
-
- if (retVal == LDAP_SUCCESS) {
- /* LP: Update ACI to reflect the value ! */
- if (apply)
- pw_mod_allowchange_aci(!slapdFrontendConfig->pw_policy.pw_change &&
- !slapdFrontendConfig->pw_policy.pw_must_change);
- }
-
- return retVal;
- }
- int
- config_set_pw_history( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- retVal = config_set_onoff ( attrname,
- value,
- &(slapdFrontendConfig->pw_policy.pw_history),
- errorbuf,
- apply);
-
- return retVal;
- }
- int
- config_set_pw_must_change( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- retVal = config_set_onoff ( attrname,
- value,
- &(slapdFrontendConfig->pw_policy.pw_must_change),
- errorbuf,
- apply);
-
- if (retVal == LDAP_SUCCESS) {
- /* LP: Update ACI to reflect the value ! */
- if (apply)
- pw_mod_allowchange_aci(!slapdFrontendConfig->pw_policy.pw_change &&
- !slapdFrontendConfig->pw_policy.pw_must_change);
- }
-
- return retVal;
- }
- int
- config_set_pwpolicy_local( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- retVal = config_set_onoff ( attrname,
- value,
- &(slapdFrontendConfig->pwpolicy_local),
- errorbuf,
- apply);
-
- return retVal;
- }
- int
- config_set_pw_syntax( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- retVal = config_set_onoff ( attrname,
- value,
- &(slapdFrontendConfig->pw_policy.pw_syntax),
- errorbuf,
- apply);
-
- return retVal;
- }
- int
- config_set_pw_minlength( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- long minLength = 0;
- char *endp = NULL;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
-
- errno = 0;
- minLength = strtol(value, &endp, 10);
- if ( *endp != '\0' || errno == ERANGE || minLength < 2 || minLength > 512 ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE,
- "password minimum length \"%s\" is invalid. "
- "The minimum length must range from 2 to 512.",
- value );
- retVal = LDAP_OPERATIONS_ERROR;
- return retVal;
- }
- if ( apply ) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapdFrontendConfig->pw_policy.pw_minlength = minLength;
-
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
-
- return retVal;
- }
- int
- config_set_pw_mindigits( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- long minDigits = 0;
- char *endp = NULL;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- errno = 0;
- minDigits = strtol(value, &endp, 10);
- if ( *endp != '\0' || errno == ERANGE || minDigits < 0 || minDigits > 64 ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE,
- "password minimum number of digits \"%s\" is invalid. "
- "The minimum number of digits must range from 0 to 64.",
- value );
- retVal = LDAP_OPERATIONS_ERROR;
- return retVal;
- }
- if ( apply ) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapdFrontendConfig->pw_policy.pw_mindigits = minDigits;
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- int
- config_set_pw_minalphas( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- long minAlphas = 0;
- char *endp = NULL;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- errno = 0;
- minAlphas = strtol(value, &endp, 10);
- if ( *endp != '\0' || errno == ERANGE || minAlphas < 0 || minAlphas > 64 ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE,
- "password minimum number of alphas \"%s\" is invalid. "
- "The minimum number of alphas must range from 0 to 64.",
- value );
- retVal = LDAP_OPERATIONS_ERROR;
- return retVal;
- }
- if ( apply ) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapdFrontendConfig->pw_policy.pw_minalphas = minAlphas;
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- int
- config_set_pw_minuppers( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- long minUppers = 0;
- char *endp = NULL;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- errno = 0;
- minUppers = strtol(value, &endp, 10);
- if ( *endp != '\0' || errno == ERANGE || minUppers < 0 || minUppers > 64 ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE,
- "password minimum number of uppercase characters \"%s\" is invalid. "
- "The minimum number of uppercase characters must range from 0 to 64.",
- value );
- retVal = LDAP_OPERATIONS_ERROR;
- return retVal;
- }
- if ( apply ) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapdFrontendConfig->pw_policy.pw_minuppers = minUppers;
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- int
- config_set_pw_minlowers( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- long minLowers = 0;
- char *endp = NULL;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- errno = 0;
- minLowers = strtol(value, &endp, 10);
- if ( *endp != '\0' || errno == ERANGE || minLowers < 0 || minLowers > 64 ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE,
- "password minimum number of lowercase characters \"%s\" is invalid. "
- "The minimum number of lowercase characters must range from 0 to 64.",
- value );
- retVal = LDAP_OPERATIONS_ERROR;
- return retVal;
- }
- if ( apply ) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapdFrontendConfig->pw_policy.pw_minlowers = minLowers;
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- int
- config_set_pw_minspecials( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- long minSpecials = 0;
- char *endp = NULL;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- errno = 0;
- minSpecials = strtol(value, &endp, 10);
- if ( *endp != '\0' || errno == ERANGE || minSpecials < 0 || minSpecials > 64 ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE,
- "password minimum number of special characters \"%s\" is invalid. "
- "The minimum number of special characters must range from 0 to 64.",
- value );
- retVal = LDAP_OPERATIONS_ERROR;
- return retVal;
- }
- if ( apply ) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapdFrontendConfig->pw_policy.pw_minspecials = minSpecials;
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- int
- config_set_pw_min8bit( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- long min8bit = 0;
- char *endp = NULL;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- errno = 0;
- min8bit = strtol(value, &endp, 10);
- if ( *endp != '\0' || errno == ERANGE || min8bit < 0 || min8bit > 64 ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE,
- "password minimum number of 8-bit characters \"%s\" is invalid. "
- "The minimum number of 8-bit characters must range from 0 to 64.",
- value );
- retVal = LDAP_OPERATIONS_ERROR;
- return retVal;
- }
- if ( apply ) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapdFrontendConfig->pw_policy.pw_min8bit = min8bit;
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- int
- config_set_pw_maxrepeats( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- long maxRepeats = 0;
- char *endp = NULL;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- errno = 0;
- maxRepeats = strtol(value, &endp, 10);
- if ( *endp != '\0' || errno == ERANGE || maxRepeats < 0 || maxRepeats > 64 ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE,
- "password maximum number of repeated characters \"%s\" is invalid. "
- "The maximum number of repeated characters must range from 0 to 64.",
- value );
- retVal = LDAP_OPERATIONS_ERROR;
- return retVal;
- }
- if ( apply ) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapdFrontendConfig->pw_policy.pw_maxrepeats = maxRepeats;
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- int
- config_set_pw_mincategories( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- long minCategories = 0;
- char *endp = NULL;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- errno = 0;
- minCategories = strtol(value, &endp, 10);
- if ( *endp != '\0' || errno == ERANGE || minCategories < 1 || minCategories > 5 ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE,
- "password minimum number of categories \"%s\" is invalid. "
- "The minimum number of categories must range from 1 to 5.",
- value );
- retVal = LDAP_OPERATIONS_ERROR;
- return retVal;
- }
- if ( apply ) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapdFrontendConfig->pw_policy.pw_mincategories = minCategories;
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- int
- config_set_pw_mintokenlength( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- long minTokenLength = 0;
- char *endp = NULL;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- errno = 0;
- minTokenLength = strtol(value, &endp, 10);
- if ( *endp != '\0' || errno == ERANGE || minTokenLength < 1 || minTokenLength > 64 ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE,
- "password minimum token length \"%s\" is invalid. "
- "The minimum token length must range from 1 to 64.",
- value );
- retVal = LDAP_OPERATIONS_ERROR;
- return retVal;
- }
- if ( apply ) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapdFrontendConfig->pw_policy.pw_mintokenlength = minTokenLength;
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- int
- config_set_pw_maxfailure( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- long maxFailure = 0;
- char *endp = NULL;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
-
- errno = 0;
- maxFailure = strtol(value, &endp, 10);
- if ( *endp != '\0' || errno == ERANGE || maxFailure <= 0 || maxFailure > 32767 ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE,
- "password maximum retry \"%s\" is invalid. "
- "Password maximum failure must range from 1 to 32767",
- value );
- retVal = LDAP_OPERATIONS_ERROR;
- return retVal;
- }
- if ( apply ) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapdFrontendConfig->pw_policy.pw_maxfailure = maxFailure;
-
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
-
- return retVal;
- }
- int
- config_set_pw_inhistory( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- long history = 0;
- char *endp = NULL;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
-
- errno = 0;
- history = strtol(value, &endp, 10);
- if ( *endp != '\0' || errno == ERANGE || history < 2 || history > 24 ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE,
- "password history length \"%s\" is invalid. "
- "The password history must range from 2 to 24",
- value );
- retVal = LDAP_OPERATIONS_ERROR;
- return retVal;
- }
- if ( apply ) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapdFrontendConfig->pw_policy.pw_inhistory = history;
-
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
-
- return retVal;
- }
- int
- config_set_pw_lockduration( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- long duration = 0; /* in minutes */
- char *endp = NULL;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- errno = 0;
- /* in seconds */
- duration = strtol(value, &endp, 10);
- if ( *endp != '\0' || errno == ERANGE || duration <= 0 || duration > (MAX_ALLOWED_TIME_IN_SECS - current_time()) ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE,
- "password lockout duration \"%s\" seconds is invalid. ",
- value );
- retVal = LDAP_OPERATIONS_ERROR;
- return retVal;
- }
- if ( apply ) {
- slapdFrontendConfig->pw_policy.pw_lockduration = duration;
- }
-
- return retVal;
- }
- int
- config_set_pw_resetfailurecount( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- long duration = 0; /* in minutes */
- char *endp = NULL;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- errno = 0;
- /* in seconds */
- duration = strtol(value, &endp, 10);
- if ( *endp != '\0' || errno == ERANGE || duration < 0 || duration > (MAX_ALLOWED_TIME_IN_SECS - current_time()) ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE,
- "password reset count duration \"%s\" seconds is invalid. ",
- value );
- retVal = LDAP_OPERATIONS_ERROR;
- return retVal;
- }
- if ( apply ) {
- slapdFrontendConfig->pw_policy.pw_resetfailurecount = duration;
- }
-
- return retVal;
- }
- int
- config_set_pw_is_global_policy( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- retVal = config_set_onoff ( attrname,
- value,
- &(slapdFrontendConfig->pw_is_global_policy),
- errorbuf,
- apply);
-
- return retVal;
- }
- int
- config_set_pw_exp( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- retVal = config_set_onoff ( attrname,
- value,
- &(slapdFrontendConfig->pw_policy.pw_exp),
- errorbuf,
- apply);
-
- return retVal;
- }
- int
- config_set_pw_unlock( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- retVal = config_set_onoff ( attrname,
- value,
- &(slapdFrontendConfig->pw_policy.pw_unlock),
- errorbuf,
- apply);
-
- return retVal;
- }
- int
- config_set_pw_lockout( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- retVal = config_set_onoff ( attrname,
- value,
- &(slapdFrontendConfig->pw_policy.pw_lockout),
- errorbuf,
- apply);
-
- return retVal;
- }
- int
- config_set_pw_gracelimit( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- long gracelimit = 0;
- char *endp = NULL;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- errno = 0;
- gracelimit = strtol(value, &endp, 10);
- if ( *endp != '\0' || errno == ERANGE || gracelimit < 0 ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE,
- "password grace limit \"%s\" is invalid, password grace limit must range from 0 to %ld",
- value , LONG_MAX );
- retVal = LDAP_OPERATIONS_ERROR;
- return retVal;
- }
- if ( apply ) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapdFrontendConfig->pw_policy.pw_gracelimit = gracelimit;
-
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
-
- return retVal;
- }
- int
- config_set_lastmod( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- Slapi_Backend *be = NULL;
- char *cookie;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- retVal = config_set_onoff ( attrname,
- value,
- &(slapdFrontendConfig->lastmod),
- errorbuf,
- apply);
-
- if ( retVal == LDAP_SUCCESS && apply ) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- cookie = NULL;
- be = slapi_get_first_backend (&cookie);
- while (be) {
- be->be_lastmod = slapdFrontendConfig->lastmod;
- be = slapi_get_next_backend (cookie);
- }
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- slapi_ch_free ((void **)&cookie);
- }
-
- return retVal;
- }
- int
- config_set_nagle( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- retVal = config_set_onoff ( attrname,
- value,
- &(slapdFrontendConfig->nagle),
- errorbuf,
- apply);
- return retVal;
- }
- int
- config_set_accesscontrol( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- retVal = config_set_onoff ( attrname,
- value,
- &(slapdFrontendConfig->accesscontrol),
- errorbuf,
- apply);
-
- return retVal;
- }
- int
- config_set_return_exact_case( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- retVal = config_set_onoff ( attrname,
- value,
- &(slapdFrontendConfig->return_exact_case),
- errorbuf,
- apply);
-
- return retVal;
- }
- int
- config_set_result_tweak( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- retVal = config_set_onoff ( attrname,
- value,
- &(slapdFrontendConfig->result_tweak),
- errorbuf,
- apply);
-
- return retVal;
- }
- int
- config_set_security( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- retVal = config_set_onoff ( attrname,
- value,
- &(slapdFrontendConfig->security),
- errorbuf,
- apply);
-
- return retVal;
- }
- static int
- config_set_onoff ( const char *attrname, char *value, int *configvalue,
- char *errorbuf, int apply )
- {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
-
- if ( strcasecmp ( value, "on" ) != 0 &&
- strcasecmp ( value, "off") != 0 ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE,
- "%s: invalid value \"%s\". Valid values are \"on\" or \"off\".",
- attrname, value );
- retVal = LDAP_OPERATIONS_ERROR;
- }
-
- if ( !apply ) {
- /* we can return now if we aren't applying the changes */
- return retVal;
- }
- CFG_LOCK_WRITE(slapdFrontendConfig);
-
- if ( strcasecmp ( value, "on" ) == 0 ) {
- *configvalue = LDAP_ON;
- }
- else if ( strcasecmp ( value, "off" ) == 0 ) {
- *configvalue = LDAP_OFF;
- }
-
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- return retVal;
- }
-
- int
- config_set_readonly( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- retVal = config_set_onoff ( attrname,
- value,
- &(slapdFrontendConfig->readonly),
- errorbuf,
- apply );
-
- return retVal;
- }
- int
- config_set_schemacheck( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- retVal = config_set_onoff ( attrname,
- value,
- &(slapdFrontendConfig->schemacheck),
- errorbuf,
- apply);
-
- return retVal;
- }
- int
- config_set_syntaxcheck( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- retVal = config_set_onoff ( attrname,
- value,
- &(slapdFrontendConfig->syntaxcheck),
- errorbuf,
- apply);
- return retVal;
- }
- int
- config_set_syntaxlogging( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- retVal = config_set_onoff ( attrname,
- value,
- &(slapdFrontendConfig->syntaxlogging),
- errorbuf,
- apply);
- return retVal;
- }
- int
- config_set_dn_validate_strict( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- retVal = config_set_onoff ( attrname,
- value,
- &(slapdFrontendConfig->dn_validate_strict),
- errorbuf,
- apply);
- return retVal;
- }
- int
- config_set_ds4_compatible_schema( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- retVal = config_set_onoff ( attrname,
- value,
- &(slapdFrontendConfig->ds4_compatible_schema),
- errorbuf,
- apply);
-
- return retVal;
- }
- int
- config_set_schema_ignore_trailing_spaces( const char *attrname, char *value,
- char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- retVal = config_set_onoff ( attrname,
- value,
- &(slapdFrontendConfig->schema_ignore_trailing_spaces),
- errorbuf,
- apply);
-
- return retVal;
- }
- int
- config_set_enquote_sup_oc( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- retVal = config_set_onoff ( attrname,
- value,
- &(slapdFrontendConfig->enquote_sup_oc),
- errorbuf,
- apply);
-
- return retVal;
- }
- int
- config_set_rootdn( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- if ( apply ) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapi_ch_free ( (void **) &(slapdFrontendConfig->rootdn) );
- slapdFrontendConfig->rootdn = slapi_dn_normalize (slapi_ch_strdup ( value ) );
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- int
- config_set_rootpw( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- struct pw_scheme *is_hashed = NULL;
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
-
- if (!apply) {
- return retVal;
- }
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapi_ch_free ( (void **) &(slapdFrontendConfig->rootpw) );
-
- is_hashed = pw_val2scheme ( value, NULL, 0 );
-
- if ( is_hashed ) {
- slapdFrontendConfig->rootpw = slapi_ch_strdup ( value );
- free_pw_scheme(is_hashed);
- } else if (slapd_nss_is_initialized() ||
- (strcasecmp(slapdFrontendConfig->rootpwstoragescheme->pws_name,
- "clear") == 0)) {
- /* to hash, security library should have been initialized, by now */
- /* pwd enc func returns slapi_ch_malloc memory */
- slapdFrontendConfig->rootpw = (slapdFrontendConfig->rootpwstoragescheme->pws_enc)(value);
- } else {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE,
- "%s: password scheme mismatch (passwd scheme is %s; "
- "password is clear text)", attrname,
- slapdFrontendConfig->rootpwstoragescheme->pws_name);
- retVal = LDAP_PARAM_ERROR;
- }
-
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- return retVal;
- }
- int
- config_set_rootpwstoragescheme( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- struct pw_scheme *new_scheme = NULL;
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- new_scheme = pw_name2scheme ( value );
- if (new_scheme == NULL ) {
- char * scheme_list = plugin_get_pwd_storage_scheme_list(PLUGIN_LIST_PWD_STORAGE_SCHEME);
- if ( scheme_list != NULL ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE,
- "%s: invalid scheme - %s. Valid schemes are: %s",
- attrname, value, scheme_list );
- } else {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE,
- "%s: invalid scheme - %s (no pwdstorage scheme"
- " plugin loaded)", attrname, value);
- }
- slapi_ch_free_string(&scheme_list);
- retVal = LDAP_OPERATIONS_ERROR;
- return retVal;
- }
-
- CFG_LOCK_WRITE(slapdFrontendConfig);
- free_pw_scheme(slapdFrontendConfig->rootpwstoragescheme);
- slapdFrontendConfig->rootpwstoragescheme = new_scheme;
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
-
- return retVal;
- }
-
- /*
- * kexcoff: to replace default initialization in FrontendConfig_init()
- */
- int config_set_storagescheme() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- struct pw_scheme *new_scheme = NULL;
- CFG_LOCK_WRITE(slapdFrontendConfig);
- new_scheme = pw_name2scheme("SSHA");
- free_pw_scheme(slapdFrontendConfig->pw_storagescheme);
- slapdFrontendConfig->pw_storagescheme = new_scheme;
- new_scheme = pw_name2scheme("SSHA");
- slapdFrontendConfig->rootpwstoragescheme = new_scheme;
-
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- return ( new_scheme == NULL );
- }
- #ifndef _WIN32
- int
- config_set_localuser( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- if (apply) {
- struct passwd *pw = NULL;
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapi_ch_free ( (void **) &slapdFrontendConfig->localuser );
- slapdFrontendConfig->localuser = slapi_ch_strdup ( value );
- if (slapdFrontendConfig->localuserinfo != NULL) {
- slapi_ch_free ( (void **) &(slapdFrontendConfig->localuserinfo) );
- }
- pw = getpwnam( value );
- if ( pw ) {
- slapdFrontendConfig->localuserinfo =
- (struct passwd *)slapi_ch_malloc(sizeof(struct passwd));
- memcpy(slapdFrontendConfig->localuserinfo, pw, sizeof(struct passwd));
- }
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- #endif /* _WIN32 */
- int
- config_set_workingdir( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- if ( PR_Access ( value, PR_ACCESS_EXISTS ) != 0 ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE, "Working directory \"%s\" does not exist.", value );
- retVal = LDAP_OPERATIONS_ERROR;
- return retVal;
- }
- if ( PR_Access ( value, PR_ACCESS_WRITE_OK ) != 0 ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE, "Working directory \"%s\" is not writeable.", value );
- retVal = LDAP_OPERATIONS_ERROR;
- return retVal;
- }
- if ( apply) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapdFrontendConfig->workingdir = slapi_ch_strdup ( value );
- #ifdef _WIN32
- dostounixpath(slapdFrontendConfig->workingdir);
- #endif /* _WIN32 */
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- /* alias of encryption key and certificate files is now retrieved through */
- /* calls to psetFullCreate() and psetGetAttrSingleValue(). See ssl.c, */
- /* where this function is still used to set the global variable */
- int
- config_set_encryptionalias( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- if (apply) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapi_ch_free ( (void **) &(slapdFrontendConfig->encryptionalias) );
-
- slapdFrontendConfig->encryptionalias = slapi_ch_strdup ( value );
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- int
- config_set_threadnumber( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- long threadnum = 0;
- char *endp = NULL;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- errno = 0;
- threadnum = strtol(value, &endp, 10);
-
- if ( *endp != '\0' || errno == ERANGE || threadnum < 1 || threadnum > 65535 ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE, "%s: invalid value \"%s\", maximum thread number must range from 1 to 65535", attrname, value );
- retVal = LDAP_OPERATIONS_ERROR;
- }
-
- if (apply) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- /* max_threads = threadnum; */
- slapdFrontendConfig->threadnumber = threadnum;
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- int
- config_set_maxthreadsperconn( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- long maxthreadnum = 0;
- char *endp = NULL;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- errno = 0;
- maxthreadnum = strtol(value, &endp, 10);
-
- if ( *endp != '\0' || errno == ERANGE || maxthreadnum < 1 || maxthreadnum > 65535 ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE, "%s: invalid value \"%s\", maximum thread number per connection must range from 1 to 65535", attrname, value );
- retVal = LDAP_OPERATIONS_ERROR;
- }
-
- if (apply) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- /* max_threads_per_conn = maxthreadnum; */
- slapdFrontendConfig->maxthreadsperconn = maxthreadnum;
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- #if !defined(_WIN32) && !defined(AIX)
- #include <sys/resource.h>
- int
- config_set_maxdescriptors( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- long nValue = 0;
- int maxVal = 65535;
- struct rlimit rlp;
- char *endp = NULL;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- if ( 0 == getrlimit( RLIMIT_NOFILE, &rlp ) ) {
- maxVal = (int)rlp.rlim_max;
- }
- errno = 0;
- nValue = strtol(value, &endp, 10);
- if ( *endp != '\0' || errno == ERANGE || nValue < 1 || nValue > maxVal ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE, "%s: invalid value \"%s\", maximum "
- "file descriptors must range from 1 to %d (the current process limit). "
- "Server will use a setting of %d.", attrname, value, maxVal, maxVal);
- if ( nValue > maxVal ) {
- nValue = maxVal;
- retVal = LDAP_UNWILLING_TO_PERFORM;
- } else {
- retVal = LDAP_OPERATIONS_ERROR;
- }
- }
-
- if (apply) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapdFrontendConfig->maxdescriptors = nValue;
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- #endif /* !_WIN32 && !AIX */
- int
- config_set_conntablesize( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- long nValue = 0;
- int maxVal = 65535;
- char *endp = NULL;
- #ifndef _WIN32
- struct rlimit rlp;
- #endif
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- #ifndef _WIN32
- if ( 0 == getrlimit( RLIMIT_NOFILE, &rlp ) ) {
- maxVal = (int)rlp.rlim_max;
- }
- #endif
- errno = 0;
- nValue = strtol(value, &endp, 0);
-
- #ifdef _WIN32
- if ( *endp != '\0' || errno == ERANGE || nValue < 1 || nValue > 0xfffffe ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE, "%s: invalid value \"%s\", connection table size must range from 1 to 0xfffffe", attrname, value );
- retVal = LDAP_OPERATIONS_ERROR;
- }
- #elif !defined(AIX)
- if ( *endp != '\0' || errno == ERANGE || nValue < 1 || nValue > maxVal ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE, "%s: invalid value \"%s\", connection table "
- "size must range from 1 to %d (the current process maxdescriptors limit). "
- "Server will use a setting of %d.", attrname, value, maxVal, maxVal );
- if ( nValue > maxVal) {
- nValue = maxVal;
- retVal = LDAP_UNWILLING_TO_PERFORM;
- } else {
- retVal = LDAP_OPERATIONS_ERROR;
- }
- }
- #endif
-
- if (apply) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapdFrontendConfig->conntablesize = nValue;
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- int
- config_set_reservedescriptors( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- int maxVal = 65535;
- long nValue = 0;
- char *endp = NULL;
- #ifndef _WIN32
- struct rlimit rlp;
- #endif
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- #ifndef _WIN32
- if ( 0 == getrlimit( RLIMIT_NOFILE, &rlp ) ) {
- maxVal = (int)rlp.rlim_max;
- }
- #endif
- errno = 0;
- nValue = strtol(value, &endp, 10);
-
- if ( *endp != '\0' || errno == ERANGE || nValue < 1 || nValue > maxVal ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE, "%s: invalid value \"%s\", reserved file "
- "descriptors must range from 1 to %d (the current process maxdescriptors limit). "
- "Server will use a setting of %d.", attrname, value, maxVal, maxVal );
- if ( nValue > maxVal) {
- nValue = maxVal;
- retVal = LDAP_UNWILLING_TO_PERFORM;
- } else {
- retVal = LDAP_OPERATIONS_ERROR;
- }
- }
-
- if (apply) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapdFrontendConfig->reservedescriptors = nValue;
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- int
- config_set_ioblocktimeout( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- long nValue = 0;
- char *endp = NULL;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- errno = 0;
- nValue = strtol(value, &endp, 10);
- if ( *endp != '\0' || errno == ERANGE || nValue < 0 ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE, "%s: invalid value \"%s\", I/O block timeout must range from 0 to %ld",
- attrname, value, LONG_MAX );
- retVal = LDAP_OPERATIONS_ERROR;
- return retVal;
- }
- #if defined(IRIX)
- /* on IRIX poll can only handle timeouts up to
- 2147483 without failing, cap it at 30 minutes */
- if ( nValue > SLAPD_DEFAULT_IOBLOCK_TIMEOUT ) {
- nValue = SLAPD_DEFAULT_IOBLOCK_TIMEOUT;
- }
- #endif /* IRIX */
- if ( apply ) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapdFrontendConfig->ioblocktimeout = nValue;
- /* g_ioblock_timeout= nValue; */
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- int
- config_set_idletimeout( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- long nValue = 0;
- char *endp = NULL;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- errno = 0;
- nValue = strtol(value, &endp, 10);
- if (*endp != '\0' || errno == ERANGE || nValue < 0 ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE, "%s: invalid value \"%s\", idle timeout must range from 0 to %ld",
- attrname, value, LONG_MAX );
- retVal = LDAP_OPERATIONS_ERROR;
- return retVal;
- }
- if (apply) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapdFrontendConfig->idletimeout = nValue;
- /* g_idle_timeout= nValue; */
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- int
- config_set_groupevalnestlevel( const char *attrname, char * value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- long nValue = 0;
- char *endp = NULL;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- errno = 0;
- nValue = strtol(value, &endp, 10);
-
- if ( *endp != '\0' || errno == ERANGE || nValue < 0 || nValue > 5 ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE,
- "%s: invalid value \"%s\", group eval nest level must range from 0 to 5",
- attrname, value );
- retVal = LDAP_OPERATIONS_ERROR;
- return retVal;
- }
- if (apply) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapdFrontendConfig->groupevalnestlevel = nValue;
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- int
- config_set_defaultreferral( const char *attrname, struct berval **value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, (char *)value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- if (apply) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- g_set_default_referral( value );
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- int
- config_set_userat( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- if ( config_value_is_null( attrname, value, errorbuf, 1 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- if ( apply ) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapi_ch_free( (void **) &(slapdFrontendConfig->userat) );
- slapdFrontendConfig->userat = slapi_ch_strdup(value);
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- int
- config_set_timelimit( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- long nVal = 0;
- char *endp = NULL;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- Slapi_Backend *be = NULL;
- char *cookie;
-
- *errorbuf = 0;
- if ( config_value_is_null( attrname, value, errorbuf, 1 )) {
- return LDAP_OPERATIONS_ERROR;
- }
-
- errno = 0;
- nVal = strtol(value, &endp, 10);
- if ( *endp != '\0' || errno == ERANGE || nVal < -1 ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE,
- "%s: invalid value \"%s\", time limit must range from -1 to %ld",
- attrname, value, LONG_MAX );
- retVal = LDAP_OPERATIONS_ERROR;
- return retVal;
- }
- if ( apply ) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- g_set_deftime ( nVal );
- slapdFrontendConfig->timelimit = nVal;
- be = slapi_get_first_backend (&cookie);
- while (be) {
- be->be_timelimit = slapdFrontendConfig->timelimit;
- be = slapi_get_next_backend (cookie);
- }
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- slapi_ch_free ((void **)&cookie);
- }
- return retVal;
- }
- int
- config_set_useroc( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- if ( config_value_is_null( attrname, value, errorbuf, 1 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- if ( apply ) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapi_ch_free ( (void **) &(slapdFrontendConfig->useroc) );
- slapdFrontendConfig->useroc = slapi_ch_strdup( value );
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- int
- config_set_accesslog( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 1 )) {
- return LDAP_OPERATIONS_ERROR;
- }
-
- retVal = log_update_accesslogdir ( value, apply );
-
- if ( retVal != LDAP_SUCCESS ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE,
- "Cannot open accesslog directory \"%s\", client accesses will "
- "not be logged.", value );
- }
-
- if ( apply ) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapi_ch_free ( (void **) &(slapdFrontendConfig->accesslog) );
- slapdFrontendConfig->accesslog = slapi_ch_strdup ( value );
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- int
- config_set_errorlog( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 1 )) {
- return LDAP_OPERATIONS_ERROR;
- }
-
- retVal = log_update_errorlogdir ( value, apply );
-
- if ( retVal != LDAP_SUCCESS ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE,
- "Cannot open errorlog file \"%s\", errors cannot be logged. Exiting...",
- value );
- syslog(LOG_ERR,
- "Cannot open errorlog file \"%s\", errors cannot be logged. Exiting...",
- value );
- g_set_shutdown( SLAPI_SHUTDOWN_EXIT );
- }
-
- if ( apply ) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapi_ch_free ( (void **) &(slapdFrontendConfig->errorlog) );
- slapdFrontendConfig->errorlog = slapi_ch_strdup ( value );
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- int
- config_set_auditlog( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- if ( config_value_is_null( attrname, value, errorbuf, 1 )) {
- return LDAP_OPERATIONS_ERROR;
- }
-
- retVal = log_update_auditlogdir ( value, apply );
-
- if ( retVal != LDAP_SUCCESS ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE,
- "Cannot open auditlog directory \"%s\"", value );
- }
-
- if ( apply ) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapi_ch_free ( (void **) &(slapdFrontendConfig->auditlog) );
- slapdFrontendConfig->auditlog = slapi_ch_strdup ( value );
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- int
- config_set_pw_maxage( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- long age;
- char *endp = NULL;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 1 )) {
- return LDAP_OPERATIONS_ERROR;
- }
-
- errno = 0;
- /* age in seconds */
- age = strtol(value, &endp, 10);
- if ( *endp != '\0' || errno == ERANGE || age <= 0 || age > (MAX_ALLOWED_TIME_IN_SECS - current_time()) ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE,
- "%s: password maximum age \"%s\" seconds is invalid. ",
- attrname, value );
- retVal = LDAP_OPERATIONS_ERROR;
- return retVal;
- }
-
- if ( apply ) {
- slapdFrontendConfig->pw_policy.pw_maxage = age;
- }
- return retVal;
- }
- int
- config_set_pw_minage( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- long age;
- char *endPtr = NULL;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 1 )) {
- return LDAP_OPERATIONS_ERROR;
- }
-
- errno = 0;
- /* age in seconds */
- age = strtol(value, &endPtr, 0 );
- /* endPtr should never be NULL, but we check just in case; if the
- value contains no digits, or a string that does not begin with
- a valid digit (e.g. "z2"), the days will be 0, and endPtr will
- point to the beginning of value; if days contains at least 1
- valid digit string, endPtr will point to the character after
- the end of the first valid digit string in value. Example:
- value = " 2 3 " endPtr will point at the space character
- between the 2 and the 3. So, we should be able to simply
- check to see if the character at *(endPtr - 1) is a digit.
- */
- if ( (age < 0) ||
- (age > (MAX_ALLOWED_TIME_IN_SECS - current_time())) ||
- (endPtr == NULL) || (endPtr == value) || !isdigit(*(endPtr-1)) ||
- errno == ERANGE ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE,
- "%s: password minimum age \"%s\" seconds is invalid. ",
- attrname, value );
- retVal = LDAP_OPERATIONS_ERROR;
- return retVal;
- }
- if ( apply ) {
- slapdFrontendConfig->pw_policy.pw_minage = age;
- }
- return retVal;
- }
- int
- config_set_pw_warning( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- long sec;
- char *endp = NULL;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 1 )) {
- return LDAP_OPERATIONS_ERROR;
- }
-
- errno = 0;
- /* in seconds */
- sec = strtol(value, &endp, 10);
- if (*endp != '\0' || errno == ERANGE || sec < 0) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE,
- "%s: password warning age \"%s\" seconds is invalid, password warning "
- "age must range from 0 to %ld seconds",
- attrname, value, LONG_MAX );
- retVal = LDAP_OPERATIONS_ERROR;
- return retVal;
- }
- /* translate to seconds */
- if ( apply ) {
- slapdFrontendConfig->pw_policy.pw_warning = sec;
- }
- return retVal;
- }
- int
- config_set_errorlog_level( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- long level = 0;
- char *endp = NULL;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 1 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- errno = 0;
- level = strtol(value, &endp, 10);
- if ( *endp != '\0' || errno == ERANGE || level < 0 ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE, "%s: error log level \"%s\" is invalid,"
- " error log level must range from 0 to %ld", attrname, value, LONG_MAX );
- retVal = LDAP_OPERATIONS_ERROR;
- return retVal;
- }
-
- if ( apply ) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- level |= LDAP_DEBUG_ANY;
- #ifdef _WIN32
- *module_ldap_debug = level;
- #else
- slapd_ldap_debug = level;
- #endif
- slapdFrontendConfig->errorloglevel = level;
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- int
- config_set_accesslog_level( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- long level = 0;
- char *endp = NULL;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 1 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- errno = 0;
- level = strtol(value, &endp, 10);
- if ( *endp != '\0' || errno == ERANGE || level < 0 ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE, "%s: access log level \"%s\" is invalid,"
- " access log level must range from 0 to %ld", attrname, value, LONG_MAX );
- retVal = LDAP_OPERATIONS_ERROR;
- return retVal;
- }
-
- if ( apply ) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- g_set_accesslog_level ( level );
- slapdFrontendConfig->accessloglevel = level;
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- /* set the referral-mode url (which puts us into referral mode) */
- int config_set_referral_mode(const char *attrname, char *url, char *errorbuf, int apply)
- {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- slapdFrontendConfig->refer_mode=REFER_MODE_OFF;
- if ((!url) || (!url[0])) {
- strcpy(errorbuf, "referral url must have a value");
- return LDAP_OPERATIONS_ERROR;
- }
- if (apply) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapdFrontendConfig->refer_url = slapi_ch_strdup(url);
- slapdFrontendConfig->refer_mode = REFER_MODE_ON;
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return LDAP_SUCCESS;
- }
- int
- config_set_versionstring( const char *attrname, char *version, char *errorbuf, int apply ) {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ((!version) || (!version[0])) {
- PL_strncpyz(errorbuf, "versionstring must have a value", SLAPI_DSE_RETURNTEXT_SIZE);
- return LDAP_OPERATIONS_ERROR;
- }
- if (apply) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapdFrontendConfig->versionstring = slapi_ch_strdup(version);
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return LDAP_SUCCESS;
- }
- #define config_copy_strval( s ) s ? slapi_ch_strdup (s) : NULL;
- int
- config_get_port(){
- int retVal;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->port;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- char *
- config_get_ldapi_filename(){
- char *retVal;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapi_ch_strdup(slapdFrontendConfig->ldapi_filename);
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int config_get_ldapi_switch(){
- int retVal;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->ldapi_switch;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int config_get_ldapi_bind_switch(){
- int retVal;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->ldapi_bind_switch;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- char *config_get_ldapi_root_dn(){
- char *retVal;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapi_ch_strdup(slapdFrontendConfig->ldapi_root_dn);
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int config_get_ldapi_map_entries(){
- int retVal;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->ldapi_map_entries;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- char *config_get_ldapi_uidnumber_type(){
- char *retVal;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapi_ch_strdup(slapdFrontendConfig->ldapi_uidnumber_type);
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- char *config_get_ldapi_gidnumber_type(){
- char *retVal;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapi_ch_strdup(slapdFrontendConfig->ldapi_gidnumber_type);
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- char *config_get_ldapi_search_base_dn(){
- char *retVal;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapi_ch_strdup(slapdFrontendConfig->ldapi_search_base_dn);
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- #if defined(ENABLE_AUTO_DN_SUFFIX)
- char *config_get_ldapi_auto_dn_suffix(){
- char *retVal;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapi_ch_strdup(slapdFrontendConfig->ldapi_auto_dn_suffix);
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- #endif
- int config_get_slapi_counters()
- {
- int retVal;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->slapi_counters;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- char *
- config_get_workingdir() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- char *retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapi_ch_strdup(slapdFrontendConfig->workingdir);
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- char *
- config_get_versionstring() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- char *retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapi_ch_strdup(slapdFrontendConfig->versionstring);
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
-
- }
-
- char *
- config_get_buildnum(void)
- {
- return slapi_ch_strdup(BUILD_NUM);
- }
- int
- config_get_secureport() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
-
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->secureport;
- CFG_UNLOCK_READ(slapdFrontendConfig);
-
- return retVal;
- }
-
- int
- config_get_SSLclientAuth() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
-
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->SSLclientAuth;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_ssl_check_hostname()
- {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- return slapdFrontendConfig->ssl_check_hostname;
- }
- char *
- config_get_localhost() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- char *retVal;
-
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = config_copy_strval ( slapdFrontendConfig->localhost );
- CFG_UNLOCK_READ(slapdFrontendConfig);
-
- return retVal;
- }
- char *
- config_get_listenhost() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- char *retVal;
-
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = config_copy_strval ( slapdFrontendConfig->listenhost );
- CFG_UNLOCK_READ(slapdFrontendConfig);
-
- return retVal;
- }
- char *
- config_get_securelistenhost() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- char *retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = config_copy_strval( slapdFrontendConfig->securelistenhost );
- CFG_UNLOCK_READ(slapdFrontendConfig);
-
- return retVal;
- }
- char *
- config_get_srvtab() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- char *retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = config_copy_strval(slapdFrontendConfig->srvtab);
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_sizelimit() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
-
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->sizelimit;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- char *
- config_get_pw_storagescheme() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- char *retVal = 0;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = config_copy_strval(slapdFrontendConfig->pw_storagescheme->pws_name);
- CFG_UNLOCK_READ(slapdFrontendConfig);
-
- return retVal;
- }
-
- int
- config_get_pw_change() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
-
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->pw_policy.pw_change;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_pw_history() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->pw_policy.pw_history;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_pw_must_change() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->pw_policy.pw_must_change;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_pw_syntax() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->pw_policy.pw_syntax;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_pw_minlength() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->pw_policy.pw_minlength;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_pw_mindigits() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->pw_policy.pw_mindigits;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_pw_minalphas() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->pw_policy.pw_minalphas;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_pw_minuppers() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->pw_policy.pw_minuppers;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_pw_minlowers() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->pw_policy.pw_minlowers;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_pw_minspecials() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->pw_policy.pw_minspecials;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_pw_min8bit() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->pw_policy.pw_min8bit;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_pw_maxrepeats() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->pw_policy.pw_maxrepeats;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_pw_mincategories() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->pw_policy.pw_mincategories;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_pw_mintokenlength() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->pw_policy.pw_mintokenlength;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_pw_maxfailure() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
-
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->pw_policy.pw_maxfailure;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_pw_inhistory() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
-
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->pw_policy.pw_inhistory;
- CFG_UNLOCK_READ(slapdFrontendConfig);
-
- return retVal;
- }
- long
- config_get_pw_lockduration() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- long retVal;
-
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->pw_policy.pw_lockduration;
- CFG_UNLOCK_READ(slapdFrontendConfig);
-
- return retVal;
- }
- long
- config_get_pw_resetfailurecount() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- long retVal;
-
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->pw_policy.pw_resetfailurecount;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_pw_is_global_policy() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->pw_is_global_policy;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_pw_exp() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->pw_policy.pw_exp;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_pw_unlock() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
-
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->pw_policy.pw_unlock;
- CFG_UNLOCK_READ(slapdFrontendConfig);
-
- return retVal;
- }
- int
- config_get_pw_lockout(){
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
-
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->pw_policy.pw_lockout;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_pw_gracelimit() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal=0;
-
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->pw_policy.pw_gracelimit;
- CFG_UNLOCK_READ(slapdFrontendConfig);
-
- return retVal;
- }
- int
- config_get_lastmod(){
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->lastmod;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_enquote_sup_oc(){
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->enquote_sup_oc;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_nagle() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->nagle;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal; }
- int
- config_get_accesscontrol() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
-
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->accesscontrol;
- CFG_UNLOCK_READ(slapdFrontendConfig);
-
- return retVal;
- }
- int
- config_get_return_exact_case() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
- retVal = slapdFrontendConfig->return_exact_case;
- return retVal;
- }
- int
- config_get_result_tweak() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->result_tweak;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_security() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
-
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->security;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
-
- int
- slapi_config_get_readonly() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->readonly;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_schemacheck() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
-
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->schemacheck;
- CFG_UNLOCK_READ(slapdFrontendConfig);
-
- return retVal;
- }
- int
- config_get_syntaxcheck() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->syntaxcheck;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_syntaxlogging() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->syntaxlogging;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_dn_validate_strict() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->dn_validate_strict;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_ds4_compatible_schema() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
-
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->ds4_compatible_schema;
- CFG_UNLOCK_READ(slapdFrontendConfig);
-
- return retVal;
- }
- int
- config_get_schema_ignore_trailing_spaces() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
-
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->schema_ignore_trailing_spaces;
- CFG_UNLOCK_READ(slapdFrontendConfig);
-
- return retVal;
- }
- char *
- config_get_rootdn() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- char *retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = config_copy_strval (slapdFrontendConfig->rootdn);
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- char * slapi_get_rootdn() {
- return config_get_rootdn();
- }
- char *
- config_get_rootpw() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- char *retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = config_copy_strval (slapdFrontendConfig->rootpw);
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- char *
- config_get_rootpwstoragescheme() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- char *retVal;
-
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = config_copy_strval(slapdFrontendConfig->rootpwstoragescheme->pws_name);
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- #ifndef _WIN32
- char *
- config_get_localuser() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- char *retVal;
-
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = config_copy_strval(slapdFrontendConfig->localuser);
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- #endif /* _WIN32 */
- /* alias of encryption key and certificate files is now retrieved through */
- /* calls to psetFullCreate() and psetGetAttrSingleValue(). See ssl.c, */
- /* where this function is still used to set the global variable */
- char *
- config_get_encryptionalias() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- char *retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = config_copy_strval(slapdFrontendConfig->encryptionalias);
- CFG_UNLOCK_READ(slapdFrontendConfig);
-
- return retVal;
- }
- int
- config_get_threadnumber() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
-
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->threadnumber;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_maxthreadsperconn(){
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
-
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->maxthreadsperconn;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- #if !defined(_WIN32) && !defined(AIX)
- int
- config_get_maxdescriptors() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
-
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->maxdescriptors;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- #endif /* !_WIN32 && !AIX */
- int
- config_get_reservedescriptors(){
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
-
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->reservedescriptors;
- CFG_UNLOCK_READ(slapdFrontendConfig);
-
- return retVal;
- }
- int
- config_get_ioblocktimeout(){
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
-
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->ioblocktimeout;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_idletimeout(){
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
-
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->idletimeout;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_groupevalnestlevel(){
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
-
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->groupevalnestlevel;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- struct berval **
- config_get_defaultreferral() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- struct berval **refs;
- int nReferrals = 0;
- CFG_LOCK_READ(slapdFrontendConfig);
- /* count the number of referrals */
- for ( nReferrals = 0;
- slapdFrontendConfig->defaultreferral &&
- slapdFrontendConfig->defaultreferral[nReferrals];
- nReferrals++)
- ;
-
- refs = (struct berval **)
- slapi_ch_malloc( (nReferrals + 1) * sizeof(struct berval *) );
-
- /*terminate the end, and add the referrals backwards */
- refs [nReferrals--] = NULL;
- while ( nReferrals >= 0 ) {
- refs[nReferrals] = (struct berval *) slapi_ch_malloc( sizeof(struct berval) );
- refs[nReferrals]->bv_val =
- config_copy_strval( slapdFrontendConfig->defaultreferral[nReferrals]->bv_val );
- refs[nReferrals]->bv_len = slapdFrontendConfig->defaultreferral[nReferrals]->bv_len;
- nReferrals--;
- }
- CFG_UNLOCK_READ(slapdFrontendConfig);
-
- return refs;
- }
- char *
- config_get_userat ( ){
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- char *retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = config_copy_strval( slapdFrontendConfig->userat );
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_timelimit(){
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal= slapdFrontendConfig->timelimit;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- char*
- config_get_useroc(){
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- char *retVal;
- CFG_LOCK_WRITE(slapdFrontendConfig);
- retVal = config_copy_strval(slapdFrontendConfig->useroc );
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- return retVal;
- }
- char *
- config_get_accesslog(){
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- char *retVal;
-
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = config_copy_strval(slapdFrontendConfig->accesslog);
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- char *
- config_get_errorlog( ){
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- char *retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = config_copy_strval(slapdFrontendConfig->errorlog);
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- char *
- config_get_auditlog( ){
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- char *retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = config_copy_strval(slapdFrontendConfig->auditlog);
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- long
- config_get_pw_maxage() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- long retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->pw_policy.pw_maxage;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- long
- config_get_pw_minage(){
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- long retVal;
-
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->pw_policy.pw_minage;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- long
- config_get_pw_warning() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- long retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->pw_policy.pw_warning;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_errorlog_level(){
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->errorloglevel;
- CFG_UNLOCK_READ(slapdFrontendConfig);
-
- return retVal;
- }
- /* return integer -- don't worry about locking similar to config_check_referral_mode
- below */
- int
- config_get_accesslog_level(){
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
- retVal = slapdFrontendConfig->accessloglevel;
- return retVal;
- }
- /* return integer -- don't worry about locking similar to config_check_referral_mode
- below */
- int
- config_get_auditlog_logging_enabled(){
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
- retVal = slapdFrontendConfig->auditlog_logging_enabled;
- return retVal;
- }
- char *config_get_referral_mode(void)
- {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- char *ret;
- CFG_LOCK_READ(slapdFrontendConfig);
- ret = config_copy_strval(slapdFrontendConfig->refer_url);
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return ret;
- }
- int
- config_get_conntablesize(void){
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
-
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->conntablesize;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- /* return yes/no without actually copying the referral url
- we don't worry about another thread changing this value
- since we now return an integer */
- int config_check_referral_mode(void)
- {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- return(slapdFrontendConfig->refer_mode & REFER_MODE_ON);
- }
- int
- config_get_outbound_ldap_io_timeout(void)
- {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->outbound_ldap_io_timeout;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_unauth_binds_switch(void)
- {
- int retVal;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->allow_unauth_binds;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_require_secure_binds(void)
- {
- int retVal;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->require_secure_binds;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_set_maxbersize( const char *attrname, char *value, char *errorbuf, int apply )
- {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
-
- if ( !apply ) {
- return retVal;
- }
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapdFrontendConfig->maxbersize = atoi(value);
-
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- return retVal;
- }
- ber_len_t
- config_get_maxbersize()
- {
- ber_len_t maxbersize;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- maxbersize = slapdFrontendConfig->maxbersize;
- if(maxbersize==0)
- maxbersize= 2 * 1024 * 1024; /* Default: 2Mb */
- return maxbersize;
- }
- int
- config_set_maxsasliosize( const char *attrname, char *value, char *errorbuf, int apply )
- {
- int retVal = LDAP_SUCCESS;
- long maxsasliosize;
- char *endptr;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- maxsasliosize = strtol(value, &endptr, 10);
- /* Check for non-numeric garbage in the value */
- if (*endptr != '\0') {
- retVal = LDAP_OPERATIONS_ERROR;
- }
- /* Check for a value overflow */
- if (((maxsasliosize == LONG_MAX) || (maxsasliosize == LONG_MIN)) && (errno == ERANGE)){
- retVal = LDAP_OPERATIONS_ERROR;
- }
- /* A setting of -1 means unlimited. Don't allow other negative values. */
- if ((maxsasliosize < 0) && (maxsasliosize != -1)) {
- retVal = LDAP_OPERATIONS_ERROR;
- }
- if (retVal != LDAP_SUCCESS) {
- PR_snprintf(errorbuf, SLAPI_DSE_RETURNTEXT_SIZE,
- "%s: \"%s\" is invalid. Value must range from -1 to %ld",
- attrname, value, LONG_MAX );
- } else if (apply) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapdFrontendConfig->maxsasliosize = maxsasliosize;
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return retVal;
- }
- size_t
- config_get_maxsasliosize()
- {
- size_t maxsasliosize;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- maxsasliosize = slapdFrontendConfig->maxsasliosize;
- return maxsasliosize;
- }
- int
- config_set_max_filter_nest_level( const char *attrname, char *value,
- char *errorbuf, int apply )
- {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
-
- if ( !apply ) {
- return retVal;
- }
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapdFrontendConfig->max_filter_nest_level = atoi(value);
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- return retVal;
- }
- int
- config_get_max_filter_nest_level()
- {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = slapdFrontendConfig->max_filter_nest_level;
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- char *
- config_get_basedn() {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- char *retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = config_copy_strval ( slapdFrontendConfig->certmap_basedn );
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_set_basedn ( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
-
- if ( !apply ) {
- return retVal;
- }
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapi_ch_free ( (void **) &slapdFrontendConfig->certmap_basedn );
- slapdFrontendConfig->certmap_basedn = slapi_dn_normalize( slapi_ch_strdup(value) );
-
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- return retVal;
- }
- char *
- config_get_configdir()
- {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- char *retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = config_copy_strval(slapdFrontendConfig->configdir);
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_set_configdir(const char *attrname, char *value, char *errorbuf, int apply)
- {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
-
- if (!apply) {
- return retVal;
- }
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapi_ch_free((void **)&slapdFrontendConfig->configdir);
- slapdFrontendConfig->configdir = slapi_ch_strdup(value);
-
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- return retVal;
- }
- /* W/o the setter, "config_set: the attribute nsslapd-instancedir is read only" is printed out. */
- int
- config_set_instancedir(const char *attrname, char *value, char *errorbuf, int apply)
- {
- return LDAP_SUCCESS;
- }
- char *
- config_get_schemadir()
- {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- char *retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = config_copy_strval(slapdFrontendConfig->schemadir);
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_set_schemadir(const char *attrname, char *value, char *errorbuf, int apply)
- {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
-
- if (!apply) {
- return retVal;
- }
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapi_ch_free((void **)&slapdFrontendConfig->schemadir);
- slapdFrontendConfig->schemadir = slapi_ch_strdup(value);
-
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- return retVal;
- }
- char *
- config_get_lockdir()
- {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- char *retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = config_copy_strval(slapdFrontendConfig->lockdir);
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_set_lockdir(const char *attrname, char *value, char *errorbuf, int apply)
- {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
-
- if (!apply) {
- return retVal;
- }
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapi_ch_free((void **)&slapdFrontendConfig->lockdir);
- slapdFrontendConfig->lockdir = slapi_ch_strdup(value);
-
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- return retVal;
- }
- char *
- config_get_tmpdir()
- {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- char *retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = config_copy_strval(slapdFrontendConfig->tmpdir);
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_set_tmpdir(const char *attrname, char *value, char *errorbuf, int apply)
- {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
-
- if (!apply) {
- return retVal;
- }
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapi_ch_free((void **)&slapdFrontendConfig->tmpdir);
- slapdFrontendConfig->tmpdir = slapi_ch_strdup(value);
-
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- return retVal;
- }
- char *
- config_get_certdir()
- {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- char *retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = config_copy_strval(slapdFrontendConfig->certdir);
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_set_certdir(const char *attrname, char *value, char *errorbuf, int apply)
- {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
-
- if (!apply) {
- return retVal;
- }
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapi_ch_free((void **)&slapdFrontendConfig->certdir);
- slapdFrontendConfig->certdir = slapi_ch_strdup(value);
-
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- return retVal;
- }
- char *
- config_get_ldifdir()
- {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- char *retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = config_copy_strval(slapdFrontendConfig->ldifdir);
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_set_ldifdir(const char *attrname, char *value, char *errorbuf, int apply)
- {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
-
- if (!apply) {
- return retVal;
- }
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapi_ch_free((void **)&slapdFrontendConfig->ldifdir);
- slapdFrontendConfig->ldifdir = slapi_ch_strdup(value);
-
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- return retVal;
- }
- char *
- config_get_bakdir()
- {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- char *retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = config_copy_strval(slapdFrontendConfig->bakdir);
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_set_bakdir(const char *attrname, char *value, char *errorbuf, int apply)
- {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
-
- if (!apply) {
- return retVal;
- }
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapi_ch_free((void **)&slapdFrontendConfig->bakdir);
- slapdFrontendConfig->bakdir = slapi_ch_strdup(value);
-
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- return retVal;
- }
- char *
- config_get_rundir()
- {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- char *retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = config_copy_strval(slapdFrontendConfig->rundir);
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_set_rundir(const char *attrname, char *value, char *errorbuf, int apply)
- {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
-
- if (!apply) {
- return retVal;
- }
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapi_ch_free((void **)&slapdFrontendConfig->rundir);
- slapdFrontendConfig->rundir = slapi_ch_strdup(value);
-
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- return retVal;
- }
- char *
- config_get_saslpath()
- {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- char *retVal;
- CFG_LOCK_READ(slapdFrontendConfig);
- retVal = config_copy_strval(slapdFrontendConfig->saslpath);
- CFG_UNLOCK_READ(slapdFrontendConfig);
- return retVal;
- }
- int
- config_set_saslpath(const char *attrname, char *value, char *errorbuf, int apply)
- {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- if (!apply) {
- return retVal;
- }
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapi_ch_free((void **)&slapdFrontendConfig->saslpath);
- slapdFrontendConfig->saslpath = slapi_ch_strdup(value);
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- return retVal;
- }
- char **
- config_get_errorlog_list()
- {
- return log_get_loglist(SLAPD_ERROR_LOG);
- }
- char **
- config_get_accesslog_list()
- {
- return log_get_loglist(SLAPD_ACCESS_LOG);
- }
- char **
- config_get_auditlog_list()
- {
- return log_get_loglist(SLAPD_AUDIT_LOG);
- }
- int
- config_set_accesslogbuffering(const char *attrname, char *value, char *errorbuf, int apply)
- {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- retVal = config_set_onoff(attrname,
- value,
- &(slapdFrontendConfig->accesslogbuffering),
- errorbuf,
- apply);
-
- return retVal;
- }
- #ifdef MEMPOOL_EXPERIMENTAL
- int
- config_set_mempool_switch( const char *attrname, char *value, char *errorbuf, int apply ) {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- retVal = config_set_onoff(attrname,
- value,
- &(slapdFrontendConfig->mempool_switch),
- errorbuf,
- apply);
- return retVal;
- }
- int
- config_get_mempool_switch()
- {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- return slapdFrontendConfig->mempool_switch;
- }
- int
- config_set_mempool_maxfreelist( const char *attrname, char *value, char *errorbuf, int apply )
- {
- int retVal = LDAP_SUCCESS;
- char *endp = NULL;
- int maxfreelist;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- errno = 0;
- maxfreelist = strtol(value, &endp, 10);
- if (0 != errno ) {
- return LDAP_OPERATIONS_ERROR;
- }
- if ( apply ) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapdFrontendConfig->mempool_maxfreelist = maxfreelist;
-
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
-
- return retVal;
- }
- int
- config_get_mempool_maxfreelist()
- {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- return slapdFrontendConfig->mempool_maxfreelist;
- }
- long
- config_get_system_page_size()
- {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- return slapdFrontendConfig->system_page_size;
- }
- int
- config_get_system_page_bits()
- {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- return slapdFrontendConfig->system_page_bits;
- }
- #endif /* MEMPOOL_EXPERIMENTAL */
- int
- config_set_csnlogging(const char *attrname, char *value, char *errorbuf, int apply)
- {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- retVal = config_set_onoff(attrname,
- value,
- &(slapdFrontendConfig->csnlogging),
- errorbuf,
- apply);
-
- return retVal;
- }
- int
- config_get_csnlogging()
- {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- return slapdFrontendConfig->csnlogging;
- }
- int
- config_set_attrname_exceptions(const char *attrname, char *value, char *errorbuf, int apply)
- {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- retVal = config_set_onoff(attrname,
- value,
- &(slapdFrontendConfig->attrname_exceptions),
- errorbuf,
- apply);
-
- return retVal;
- }
- int
- config_get_attrname_exceptions()
- {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- return slapdFrontendConfig->attrname_exceptions;
- }
- int
- config_set_hash_filters(const char *attrname, char *value, char *errorbuf, int apply)
- {
- int val = 0;
- int retVal = LDAP_SUCCESS;
-
- retVal = config_set_onoff(attrname,
- value,
- &val,
- errorbuf,
- apply);
-
- if (retVal == LDAP_SUCCESS) {
- set_hash_filters(val);
- }
- return retVal;
- }
- int
- config_get_hash_filters()
- {
- return 0; /* for now */
- }
- int
- config_set_rewrite_rfc1274(const char *attrname, char *value, char *errorbuf, int apply)
- {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- retVal = config_set_onoff(attrname,
- value,
- &(slapdFrontendConfig->rewrite_rfc1274),
- errorbuf,
- apply);
-
- return retVal;
- }
- /* we don't worry about another thread changing this flag since it is an
- integer */
- int
- config_get_rewrite_rfc1274()
- {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- int retVal;
- retVal = slapdFrontendConfig->rewrite_rfc1274;
- return retVal;
- }
- static int
- config_set_schemareplace( const char *attrname, char *value, char *errorbuf, int apply )
- {
- int retVal = LDAP_SUCCESS;
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- retVal = LDAP_OPERATIONS_ERROR;
- } else {
- /*
- * check that the value is one we allow.
- */
- if ( 0 != strcasecmp( value, CONFIG_SCHEMAREPLACE_STR_OFF ) &&
- 0 != strcasecmp( value, CONFIG_SCHEMAREPLACE_STR_ON ) &&
- 0 != strcasecmp( value, CONFIG_SCHEMAREPLACE_STR_REPLICATION_ONLY )) {
- retVal = LDAP_OPERATIONS_ERROR;
- if( errorbuf ) {
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE, "unsupported value: %s", value );
- }
- }
- }
- if ( LDAP_SUCCESS == retVal && apply ) {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapi_ch_free( (void **)&slapdFrontendConfig->schemareplace );
- slapdFrontendConfig->schemareplace = slapi_ch_strdup( value );
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
-
- return retVal;
- }
- int
- config_set_outbound_ldap_io_timeout( const char *attrname, char *value,
- char *errorbuf, int apply )
- {
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
-
- if ( config_value_is_null( attrname, value, errorbuf, 0 )) {
- return LDAP_OPERATIONS_ERROR;
- }
- if ( apply ) {
- CFG_LOCK_WRITE(slapdFrontendConfig);
- slapdFrontendConfig->outbound_ldap_io_timeout = atoi( value );
- CFG_UNLOCK_WRITE(slapdFrontendConfig);
- }
- return LDAP_SUCCESS;
- }
- int
- config_set_unauth_binds_switch( const char *attrname, char *value,
- char *errorbuf, int apply )
- {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- retVal = config_set_onoff(attrname,
- value,
- &(slapdFrontendConfig->allow_unauth_binds),
- errorbuf,
- apply);
- return retVal;
- }
- int
- config_set_require_secure_binds( const char *attrname, char *value,
- char *errorbuf, int apply )
- {
- int retVal = LDAP_SUCCESS;
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- retVal = config_set_onoff(attrname,
- value,
- &(slapdFrontendConfig->require_secure_binds),
- errorbuf,
- apply);
- return retVal;
- }
- /*
- * This function is intended to be used from the dse code modify callback. It
- * is "optimized" for that case because it takes a berval** of values, which is
- * currently what is used by ldapmod to hold the values. We could easily switch
- * this to take a Slapi_Value array or even a Slapi_Attr. Most config params
- * have simple config_set_XXX functions which take a char* argument holding the
- * value. The log_set_XXX functions have an additional parameter which
- * discriminates the log to use. The config parameters with types CONFIG_SPECIAL_XXX
- * require special handling to set their values.
- */
- int
- config_set(const char *attr, struct berval **values, char *errorbuf, int apply)
- {
- int ii = 0;
- int retval = LDAP_SUCCESS;
- struct config_get_and_set *cgas = 0;
- cgas = (struct config_get_and_set *)PL_HashTableLookup(confighash, attr);
- if (!cgas)
- {
- #if 0
- debugHashTable(attr);
- #endif
- PR_snprintf ( errorbuf, SLAPI_DSE_RETURNTEXT_SIZE, "Unknown attribute %s will be ignored", attr);
- slapi_log_error(SLAPI_LOG_FATAL, "config", "%s\n", errorbuf);
- return retval;
- }
- switch (cgas->config_var_type)
- {
- case CONFIG_SPECIAL_REFERRALLIST:
- if (NULL == values) /* special token which means to remove referrals */
- {
- struct berval val;
- struct berval *vals[2] = {0, 0};
- vals[0] = &val;
- val.bv_val = REFERRAL_REMOVE_CMD;
- val.bv_len = strlen(REFERRAL_REMOVE_CMD);
- retval = config_set_defaultreferral(attr, vals, errorbuf, apply);
- }
- else
- {
- retval = config_set_defaultreferral(attr, values, errorbuf, apply);
- }
- break;
- default:
- for (ii = 0; !retval && values && values[ii]; ++ii)
- {
- if (cgas->setfunc)
- retval = (cgas->setfunc)(cgas->attr_name,
- (char *)values[ii]->bv_val, errorbuf, apply);
- else if (cgas->logsetfunc)
- retval = (cgas->logsetfunc)(cgas->attr_name,
- (char *)values[ii]->bv_val, cgas->whichlog,
- errorbuf, apply);
- else
- LDAPDebug(LDAP_DEBUG_ANY,
- "config_set: the attribute %s is read only; ignoring new value %s\n",
- attr, values[ii]->bv_val, 0);
- }
- break;
- }
- return retval;
- }
- static void
- config_set_value(
- Slapi_Entry *e,
- struct config_get_and_set *cgas,
- void **value
- )
- {
- struct berval **values = 0;
- char *sval = 0;
- int ival = 0;
- uintptr_t pval;
- /* for null values, just set the attr value to the empty
- string */
- if (!value) {
- slapi_entry_attr_set_charptr(e, cgas->attr_name, "");
- return;
- }
- switch (cgas->config_var_type) {
- case CONFIG_ON_OFF: /* convert 0,1 to "off","on" */
- slapi_entry_attr_set_charptr(e, cgas->attr_name,
- (value && *((int *)value)) ? "on" : "off");
- break;
- case CONFIG_INT:
- if (value)
- slapi_entry_attr_set_int(e, cgas->attr_name, *((int *)value));
- else
- slapi_entry_attr_set_charptr(e, cgas->attr_name, "");
- break;
- case CONFIG_LONG:
- if (value)
- slapi_entry_attr_set_long(e, cgas->attr_name, *((long *)value));
- else
- slapi_entry_attr_set_charptr(e, cgas->attr_name, "");
- break;
- case CONFIG_STRING:
- slapi_entry_attr_set_charptr(e, cgas->attr_name,
- (value && *((char **)value)) ?
- *((char **)value) : "");
- break;
- case CONFIG_CHARRAY:
- values = strarray2bervalarray((const char **)*((char ***)value));
- if (!values) {
- slapi_entry_attr_set_charptr(e, cgas->attr_name, "");
- } else {
- slapi_entry_attr_replace(e, cgas->attr_name, values);
- bervalarray_free(values);
- }
- break;
- case CONFIG_SPECIAL_REFERRALLIST:
- /* referral list is already an array of berval* */
- if (value)
- slapi_entry_attr_replace(e, cgas->attr_name, (struct berval**)*value);
- else
- slapi_entry_attr_set_charptr(e, cgas->attr_name, "");
- break;
- case CONFIG_CONSTANT_STRING:
- PR_ASSERT(value); /* should be a constant value */
- slapi_entry_attr_set_charptr(e, cgas->attr_name, (char*)value);
- break;
- case CONFIG_CONSTANT_INT:
- PR_ASSERT(value); /* should be a constant value */
- pval = (uintptr_t)value;
- ival = (int)pval;
- slapi_entry_attr_set_int(e, cgas->attr_name, ival);
- break;
- case CONFIG_SPECIAL_SSLCLIENTAUTH:
- if (!value) {
- slapi_entry_attr_set_charptr(e, cgas->attr_name, "off");
- break;
- }
- if (*((int *)value) == SLAPD_SSLCLIENTAUTH_ALLOWED) {
- sval = "allowed";
- } else if (*((int *)value) == SLAPD_SSLCLIENTAUTH_REQUIRED) {
- sval = "required";
- } else {
- sval = "off";
- }
- slapi_entry_attr_set_charptr(e, cgas->attr_name, sval);
- break;
- case CONFIG_STRING_OR_OFF:
- slapi_entry_attr_set_charptr(e, cgas->attr_name,
- (value && *((char **)value)) ?
- *((char **)value) : "off");
- break;
- case CONFIG_STRING_OR_EMPTY:
- slapi_entry_attr_set_charptr(e, cgas->attr_name,
- (value && *((char **)value)) ?
- *((char **)value) : "");
- break;
- case CONFIG_STRING_OR_UNKNOWN:
- slapi_entry_attr_set_charptr(e, cgas->attr_name,
- (value && *((char **)value)) ?
- *((char **)value) : "unknown");
- break;
- case CONFIG_SPECIAL_ERRORLOGLEVEL:
- if (value) {
- int ival = *(int *)value;
- ival &= ~LDAP_DEBUG_ANY;
- slapi_entry_attr_set_int(e, cgas->attr_name, ival);
- }
- else
- slapi_entry_attr_set_charptr(e, cgas->attr_name, "");
- break;
- default:
- PR_ASSERT(0); /* something went horribly wrong . . . */
- break;
- }
- return;
- }
- /*
- * Fill in the given slapi_entry with the config attributes and values
- */
- int
- config_set_entry(Slapi_Entry *e)
- {
- int ii = 0;
- int tablesize = sizeof(ConfigList)/sizeof(ConfigList[0]);
- slapdFrontendConfig_t *slapdFrontendConfig = getFrontendConfig();
- /*
- * Avoid recursive calls to the readers/writer
- * lock as it causes deadlock under stress. Each
- * individual config get function acquires a read
- * lock where necessary.
- */
- /*
- * Pass 1: Values which do not have a get function.
- */
- CFG_LOCK_READ(slapdFrontendConfig);
- for (ii = 0; ii < tablesize; ++ii) {
- struct config_get_and_set *cgas = &ConfigList[ii];
- void **value = 0;
- PR_ASSERT(cgas);
- value = cgas->config_var_addr;
- PR_ASSERT(cgas->attr_name);
- /* Skip values handled in pass 2 */
- if (NULL == value && cgas->getfunc) {
- continue;
- }
- config_set_value(e, cgas, value);
- }
- CFG_UNLOCK_READ(slapdFrontendConfig);
- /*
- * Pass 2: Values which do have a get function.
- */
- for (ii = 0; ii < tablesize; ++ii) {
- struct config_get_and_set *cgas = &ConfigList[ii];
- int ival = 0;
- long lval = 0;
- void **value = NULL;
- void *alloc_val = NULL;
- int needs_free = 0;
- PR_ASSERT(cgas);
- value = cgas->config_var_addr;
- PR_ASSERT(cgas->attr_name);
- /* Skip values handled in pass 1 */
- if (NULL != value || cgas->getfunc == NULL) {
- continue;
- }
- /* must cast return of getfunc and store in variable of correct sized type */
- /* otherwise endianness problems will ensue */
- if (isInt(cgas->config_var_type)) {
- ival = (int)(intptr_t)(cgas->getfunc)();
- value = (void **)&ival; /* value must be address of int */
- } else if (cgas->config_var_type == CONFIG_LONG) {
- lval = (long)(intptr_t)(cgas->getfunc)();
- value = (void **)&lval; /* value must be address of long */
- } else {
- alloc_val = (cgas->getfunc)();
- value = &alloc_val; /* value must be address of pointer */
- needs_free = 1; /* get funcs must return alloc'd memory except for get
- funcs which return a simple integral type e.g. int */
- }
- config_set_value(e, cgas, value);
- if (needs_free && value) { /* assumes memory allocated by slapi_ch_Xalloc */
- if (CONFIG_CHARRAY == cgas->config_var_type) {
- charray_free(*((char ***)value));
- } else if (CONFIG_SPECIAL_REFERRALLIST == cgas->config_var_type) {
- ber_bvecfree(*((struct berval ***)value));
- } else if ((CONFIG_CONSTANT_INT != cgas->config_var_type) && /* do not free constants */
- (CONFIG_CONSTANT_STRING != cgas->config_var_type)) {
- slapi_ch_free(value);
- }
- }
- }
- return 1;
- }
|