/* $NetBSD: result.c,v 1.1.1.7.6.1 2019/08/10 06:17:20 martin Exp $ */ /* result.c - sock backend result reading function */ /* $OpenLDAP$ */ /* This work is part of OpenLDAP Software . * * Copyright 2007-2019 The OpenLDAP Foundation. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted only as authorized by the OpenLDAP * Public License. * * A copy of this license is available in the file LICENSE in the * top-level directory of the distribution or, alternatively, at * . */ /* ACKNOWLEDGEMENTS: * This work was initially developed by Brian Candler for inclusion * in OpenLDAP Software. */ #include __RCSID("$NetBSD: result.c,v 1.1.1.7.6.1 2019/08/10 06:17:20 martin Exp $"); #include "portable.h" #include #include #include #include #include #include "slap.h" #include "back-sock.h" /* * FIXME: make a RESULT section compulsory from the socket response. * Otherwise, a partial/aborted response is treated as 'success'. * This is a divergence from the back-shell protocol, but makes things * more robust. */ int sock_read_and_send_results( Operation *op, SlapReply *rs, FILE *fp ) { int bsize, len; char *buf, *bp; char line[BUFSIZ]; char ebuf[128]; (void) fflush(fp); /* read in the result and send it along */ buf = (char *) ch_malloc( BUFSIZ ); buf[0] = '\0'; bsize = BUFSIZ; bp = buf; while ( !feof(fp) ) { errno = 0; if ( fgets( line, sizeof(line), fp ) == NULL ) { if ( errno == EINTR ) continue; Debug( LDAP_DEBUG_ANY, "sock: fgets failed: %s (%d)\n", AC_STRERROR_R(errno, ebuf, sizeof ebuf), errno, 0 ); break; } Debug( LDAP_DEBUG_SHELL, "sock search reading line (%s)\n", line, 0, 0 ); /* ignore lines beginning with # (LDIFv1 comments) */ if ( *line == '#' ) { continue; } /* ignore lines beginning with DEBUG: */ if ( strncasecmp( line, "DEBUG:", 6 ) == 0 ) { continue; } if ( strncasecmp( line, "CONTINUE", 8 ) == 0 ) { struct sockinfo *si = (struct sockinfo *) op->o_bd->be_private; /* Only valid when operating as an overlay! */ assert( si->si_ops != 0 ); rs->sr_err = SLAP_CB_CONTINUE; goto skip; } len = strlen( line ); while ( bp + len + 1 - buf > bsize ) { size_t offset = bp - buf; bsize += BUFSIZ; buf = (char *) ch_realloc( buf, bsize ); bp = &buf[offset]; } strcpy( bp, line ); bp += len; /* line marked the end of an entry or result */ if ( *line == '\n' ) { if ( strncasecmp( buf, "RESULT", 6 ) == 0 ) { break; } if ( (rs->sr_entry = str2entry( buf )) == NULL ) { Debug( LDAP_DEBUG_ANY, "str2entry(%s) failed\n", buf, 0, 0 ); } else { rs->sr_attrs = op->oq_search.rs_attrs; rs->sr_flags = REP_ENTRY_MODIFIABLE; send_search_entry( op, rs ); entry_free( rs->sr_entry ); rs->sr_attrs = NULL; } bp = buf; } } (void) str2result( buf, &rs->sr_err, (char **)&rs->sr_matched, (char **)&rs->sr_text ); /* otherwise, front end will send this result */ if ( rs->sr_err != 0 || op->o_tag != LDAP_REQ_BIND ) { send_ldap_result( op, rs ); } skip: ch_free( buf ); return( rs->sr_err ); } void sock_print_suffixes( FILE *fp, Backend *be ) { int i; for ( i = 0; be->be_suffix[i].bv_val != NULL; i++ ) { fprintf( fp, "suffix: %s\n", be->be_suffix[i].bv_val ); } } void sock_print_conn( FILE *fp, Connection *conn, struct sockinfo *si ) { if ( conn == NULL ) return; if( si->si_extensions & SOCK_EXT_BINDDN ) { fprintf( fp, "binddn: %s\n", conn->c_dn.bv_len ? conn->c_dn.bv_val : "" ); } if( si->si_extensions & SOCK_EXT_PEERNAME ) { fprintf( fp, "peername: %s\n", conn->c_peer_name.bv_len ? conn->c_peer_name.bv_val : "" ); } if( si->si_extensions & SOCK_EXT_SSF ) { fprintf( fp, "ssf: %d\n", conn->c_ssf ); } if( si->si_extensions & SOCK_EXT_CONNID ) { fprintf( fp, "connid: %lu\n", conn->c_connid ); } }