nis_parse_ldap_conf.c revision b9175c69691c8949bec97fb8f689b7d1efdb05bb
/*
* CDDL HEADER START
*
* The contents of this file are subject to the terms of the
* Common Development and Distribution License (the "License").
* You may not use this file except in compliance with the License.
*
* You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
* or http://www.opensolaris.org/os/licensing.
* See the License for the specific language governing permissions
* and limitations under the License.
*
* When distributing Covered Code, include this CDDL HEADER in each
* file and include the License file at usr/src/OPENSOLARIS.LICENSE.
* If applicable, add the following below this CDDL HEADER, with the
* fields enclosed by brackets "[]" replaced with your own identifying
* information: Portions Copyright [yyyy] [name of copyright owner]
*
* CDDL HEADER END
*/
/*
* Copyright 2009 Sun Microsystems, Inc. All rights reserved.
* Use is subject to license terms.
*/
#include <stdio.h>
#include <string.h>
#include <stdlib.h>
#include <ctype.h>
#include <fcntl.h>
#include <unistd.h>
#include <errno.h>
#include <locale.h>
#include <sys/stat.h>
#include <lber.h>
#include <ldap.h>
#include <deflt.h>
#include "ldap_map.h"
#include "ldap_parse.h"
#include "ldap_glob.h"
#include "nis_parse_ldap_conf.h"
__nis_ldap_proxy_info proxyInfo =
{NULL, (auth_method_t)NO_VALUE_SET, (tls_method_t)NO_VALUE_SET, NULL,
NULL, NULL, NULL, NULL, (follow_referral_t)NO_VALUE_SET};
__nis_config_t ldapConfig;
__nisdb_table_mapping_t ldapDBTableMapping;
__nis_table_mapping_t *ldapTableMapping = NULL;
__yp_domain_context_t ypDomains;
parse_error p_error = no_parse_error;
int cur_line_num = 0;
int start_line_num = 0;
int seq_num = 0;
const char *warn_file = NULL;
char _key_val[38];
const char *command_line_source = NULL;
const char *file_source = NULL;
const char *ldap_source = NULL;
static
const char *const *cmdline_config = NULL;
static bool_t got_config_data = FALSE;
/* high level parsing functions functions */
static int parse_ldap_cmd_line(const char *const *cmdline_options,
__nis_ldap_proxy_info *proxy_info, __nis_config_t *nis_config,
__nis_table_mapping_t **table_mapping, __nis_config_info_t *config_info,
__nisdb_table_mapping_t *table_info);
static int parse_ldap_default_conf(__nis_ldap_proxy_info *proxy_info,
__nis_config_t *nis_config, __nis_config_info_t *config_info,
__nisdb_table_mapping_t *table_info);
static int parse_ldap_config_file(const char *config_file,
__nis_ldap_proxy_info *proxy_info, __nis_config_t *nis_config,
__nis_table_mapping_t **table_mapping, __nis_config_info_t *config_info,
__nisdb_table_mapping_t *table_info);
static int parse_ldap_config_dn_attrs(__nis_ldap_proxy_info *proxy_info,
__nis_config_t *nis_config, __nis_table_mapping_t **table_mapping,
__nis_config_info_t *config_info, __nisdb_table_mapping_t *table_info);
static int yp_parse_ldap_default_conf(__nis_ldap_proxy_info *proxy_info,
__nis_config_t *nis_config, __nis_config_info_t *config_info,
__nisdb_table_mapping_t *table_info);
/* helper functions */
static config_key get_attrib_num_cmdline(const char *s,
const char **begin_s, const char **end_s);
static config_key get_file_attr_val(int fd, char **attr_val);
static void get_attribute_list(
const __nis_ldap_proxy_info *proxy_info,
const __nis_config_t *nis_config,
const __nis_config_info_t *config_info,
const __nisdb_table_mapping_t *table_info,
char **ldap_config_attributes);
/*
* FUNCTION: parse_ldap_migration
*
* Parses the information for LDAP. The values are first
* obtained from the command line, secondly from the preference
* file, and finally from an LDAP profile (if so configured in
* the command line or preference file). Any unset values will
* be set to their default values.
*
* If no command line options, no settings in the /etc/default
* configuration file, and no mapping file, then no mapping
* should be used.
*
* RETURN VALUE:
* 0 Success
* -1 Config file stat/open or parse error
* 1 No mapping should be used.
*
* INPUT: command line parameters, configuration file
*/
int
parse_ldap_migration(
const char *const *cmdline_options,
const char *config_file)
{
int rc = 0;
__nis_config_info_t config_info
= {NULL, NULL, (auth_method_t)NO_VALUE_SET,
(tls_method_t)NO_VALUE_SET, NULL,
NULL, NULL};
struct stat buf;
int i = 0;
p_error = no_parse_error;
if (verbose)
report_info("Getting LDAP configuration", NULL);
initialize_parse_structs(&proxyInfo, &ldapConfig, &ldapDBTableMapping);
if (yp2ldap)
initialize_yp_parse_structs(&ypDomains);
if (cmdline_options != NULL) {
got_config_data = TRUE;
/* NIS to LDAP does not read command line attributes */
if (!yp2ldap)
rc = parse_ldap_cmd_line(cmdline_options, &proxyInfo,
&ldapConfig, &ldapTableMapping, &config_info,
&ldapDBTableMapping);
else
rc = 0;
}
if (rc == 0) {
if (yp2ldap)
rc = yp_parse_ldap_default_conf(&proxyInfo, &ldapConfig,
&config_info, &ldapDBTableMapping);
else
rc = parse_ldap_default_conf(&proxyInfo, &ldapConfig,
&config_info, &ldapDBTableMapping);
}
if (config_file == NULL) {
if (yp2ldap) {
if (stat(YP_DEFAULT_MAPPING_FILE, &buf) == 0)
config_file = YP_DEFAULT_MAPPING_FILE;
} else {
if (stat(DEFAULT_MAPPING_FILE, &buf) == 0)
config_file = DEFAULT_MAPPING_FILE;
}
}
if (rc == 0 && config_file != NULL) {
got_config_data = TRUE;
warn_file = config_file;
cmdline_config = cmdline_options;
if (yp2ldap)
rc = yp_parse_ldap_config_file(config_file, &proxyInfo,
&ldapConfig, &ldapTableMapping, &config_info,
&ldapDBTableMapping, &ypDomains);
else
rc = parse_ldap_config_file(config_file, &proxyInfo,
&ldapConfig, &ldapTableMapping, &config_info,
&ldapDBTableMapping);
warn_file = NULL;
cmdline_config = NULL;
}
if (rc == 0 && (config_info.config_dn != NULL) &&
(config_info.config_dn[0] != '\0')) {
rc = parse_ldap_config_dn_attrs(&proxyInfo,
&ldapConfig, &ldapTableMapping, &config_info,
&ldapDBTableMapping);
}
free_config_info(&config_info);
if (rc == 0 && got_config_data == FALSE)
rc = 1;
set_default_values(&proxyInfo, &ldapConfig, &ldapDBTableMapping);
if (yp2ldap == 1 && rc == 0) {
rc = second_parser_pass(&ldapTableMapping);
if (rc == 0)
rc = final_parser_pass(&ldapTableMapping, &ypDomains);
if (rc == -2)
return (-1);
}
if (rc == 0)
rc = finish_parse(&proxyInfo, &ldapTableMapping);
if (rc == 0)
rc = linked2hash(ldapTableMapping);
if ((rc == 0) && yptol_mode)
rc = map_id_list_init();
if (rc != 0) {
free_parse_structs();
} else if (verbose)
report_info("LDAP configuration complete", NULL);
return (rc);
}
/*
* FUNCTION: parse_ldap_cmd_line
*
* Parses the information for LDAP from the command line
*
* RETURN VALUE: 0 on success, -1 on failure
*
* INPUT: command line values
*/
static int
parse_ldap_cmd_line(
const char *const *cmdline_options,
__nis_ldap_proxy_info *proxy_info,
__nis_config_t *nis_config,
__nis_table_mapping_t **table_mapping,
__nis_config_info_t *config_info,
__nisdb_table_mapping_t *table_info)
{
int rc = 0;
config_key attrib_num;
const char *begin_s;
const char *end_s;
if (verbose)
report_info("Command line values: ", NULL);
while (*cmdline_options != NULL) {
if (verbose)
report_info("\t", *cmdline_options);
attrib_num = get_attrib_num_cmdline(
*cmdline_options, &begin_s, &end_s);
if (attrib_num == key_bad) {
command_line_source = "command line";
report_error(*cmdline_options, NULL);
command_line_source = NULL;
rc = -1;
break;
} else if (IS_CONFIG_KEYWORD(attrib_num)) {
rc = add_config_attribute(attrib_num,
begin_s, end_s - begin_s, config_info);
} else if (IS_BIND_INFO(attrib_num)) {
rc = add_bind_attribute(attrib_num,
begin_s, end_s - begin_s, proxy_info);
} else if (IS_OPER_INFO(attrib_num)) {
rc = add_operation_attribute(attrib_num,
begin_s, end_s - begin_s, nis_config,
table_info);
} else {
rc = add_mapping_attribute(attrib_num,
begin_s, end_s - begin_s, table_mapping);
}
if (rc < 0) {
command_line_source = "command line";
report_error(begin_s, _key_val);
command_line_source = NULL;
break;
}
cmdline_options++;
}
return (rc);
}
static int
parse_ldap_default_conf(
__nis_ldap_proxy_info *proxy_info,
__nis_config_t *nis_config,
__nis_config_info_t *config_info,
__nisdb_table_mapping_t *table_info)
{
int rc = 0;
char *ldap_config_attributes[n_config_keys];
char attr_buf[128];
char *attr;
char *attr_val;
int defflags;
config_key attrib_num;
int i;
int len;
int attr_len;
void *defp;
if ((defp = defopen_r(ETCCONFFILE)) != NULL) {
file_source = ETCCONFFILE;
if (verbose)
report_info("default configuration values: ", NULL);
/* Set defread_r() to be case insensitive */
defflags = defcntl_r(DC_GETFLAGS, 0, defp);
TURNOFF(defflags, DC_CASE);
(void) defcntl_r(DC_SETFLAGS, defflags, defp);
get_attribute_list(proxy_info, nis_config, config_info,
table_info, ldap_config_attributes);
i = 0;
while ((attr = ldap_config_attributes[i++]) != NULL) {
(void) strlcpy(attr_buf, attr, sizeof (attr_buf));
/*
* if nisplusUpdateBatching, make sure
* we don't match nisplusUpdateBatchingTimeout
*/
if (strcmp(attr, UPDATE_BATCHING) == 0) {
attr_len = strlen(attr);
attr_buf[attr_len] = '=';
attr_buf[attr_len + 1] = '\0';
attr_val = defread_r(attr_buf, defp);
if (attr_val == 0) {
attr_buf[attr_len] = ' ';
attr_val = defread_r(attr_buf, defp);
}
if (attr_val == 0) {
attr_buf[attr_len] = '\t';
attr_val = defread_r(attr_buf, defp);
}
if (attr_val == 0) {
attr_buf[attr_len] = '\n';
attr_val = defread_r(attr_buf, defp);
}
} else {
attr_val = defread_r(attr_buf, defp);
}
if (attr_val == NULL)
continue;
got_config_data = TRUE;
attrib_num = get_attrib_num(attr, strlen(attr));
if (attrib_num == key_bad) {
report_error(attr, NULL);
rc = -1;
break;
}
/*
* Allow either entries of the form
* attr val
* or
* attr = val
*/
while (is_whitespace(*attr_val))
attr_val++;
if (*attr_val == '=')
attr_val++;
while (is_whitespace(*attr_val))
attr_val++;
len = strlen(attr_val);
while (len > 0 && is_whitespace(attr_val[len - 1]))
len--;
if (verbose) {
report_info("\t", attr);
report_info("\t\t", attr_val);
}
if (IS_BIND_INFO(attrib_num)) {
rc = add_bind_attribute(attrib_num,
attr_val, len, proxy_info);
} else if (IS_OPER_INFO(attrib_num)) {
rc = add_operation_attribute(attrib_num,
attr_val, len, nis_config,
table_info);
}
if (p_error != no_parse_error) {
report_error(attr_val, attr);
rc = -1;
break;
}
}
file_source = NULL;
/* Close the /etc/default file */
defclose_r(defp);
}
return (rc);
}
static int
yp_parse_ldap_default_conf(
__nis_ldap_proxy_info *proxy_info,
__nis_config_t *nis_config,
__nis_config_info_t *config_info,
__nisdb_table_mapping_t *table_info)
{
int rc = 0;
char *ldap_config_attributes[n_config_keys];
char attr_buf[128];
char *attr;
char *attr_val;
int defflags;
config_key attrib_num;
int i, len, attr_len;
void *defp;
if ((defp = defopen_r(YP_ETCCONFFILE)) != NULL) {
file_source = YP_ETCCONFFILE;
if (verbose)
report_info("default configuration values: ", NULL);
/* Set defread_r() to be case insensitive */
defflags = defcntl_r(DC_GETFLAGS, 0, defp);
TURNOFF(defflags, DC_CASE);
(void) defcntl_r(DC_SETFLAGS, defflags, defp);
get_attribute_list(proxy_info, nis_config, config_info,
table_info, ldap_config_attributes);
i = 0;
while ((attr = ldap_config_attributes[i++]) != NULL) {
if ((strlcpy(attr_buf, attr, sizeof (attr_buf))) >=
sizeof (attr_buf)) {
report_error(
"Static buffer attr_buf overflow", NULL);
defclose_r(defp);
return (-1);
}
if ((attr_val = defread_r(attr_buf, defp)) == NULL)
continue;
got_config_data = TRUE;
attrib_num = get_attrib_num(attr, strlen(attr));
if (attrib_num == key_bad) {
report_error(attr, NULL);
rc = -1;
break;
}
/*
* Allow either entries of the form
* attr val
* or
* attr = val
*/
while (is_whitespace(*attr_val))
attr_val++;
if (*attr_val == '=')
attr_val++;
while (is_whitespace(*attr_val))
attr_val++;
len = strlen(attr_val);
while (len > 0 && is_whitespace(attr_val[len - 1]))
len--;
if (verbose) {
report_info("\t", attr);
report_info("\t\t", attr_val);
}
if (IS_YP_BIND_INFO(attrib_num)) {
rc = add_bind_attribute(attrib_num,
attr_val, len, proxy_info);
} else if (IS_YP_OPER_INFO(attrib_num)) {
rc = add_operation_attribute(attrib_num,
attr_val, len, nis_config,
table_info);
}
if (p_error != no_parse_error) {
report_error(attr_val, attr);
rc = -1;
break;
}
}
file_source = NULL;
/* Close the /etc/default file */
defclose_r(defp);
}
return (rc);
}
/*
* FUNCTION: get_attrib_num_cmdline
*
* Parses the information for LDAP from the command line
* The form of the command line request is
* -x attribute=value
*
* RETURN VALUE: 0 on success, -1 on failure
*
* INPUT: command line values
*/
static config_key
get_attrib_num_cmdline(
const char *s,
const char **begin_s,
const char **end_s)
{
const char *s_end = s + strlen(s);
const char *equal_s;
const char *s1;
config_key attrib_num;
while (s < s_end && is_whitespace(*s))
s++;
for (equal_s = s; equal_s < s_end; equal_s++)
if (*equal_s == EQUAL_CHAR)
break;
if (equal_s == s_end) {
p_error = parse_bad_command_line_attribute_format;
return (key_bad);
}
for (s1 = equal_s; s1 > s && is_whitespace(s1[-1]); s1--)
;
if (s1 == s) {
p_error = parse_bad_command_line_attribute_format;
return (key_bad);
}
attrib_num = get_attrib_num(s, s1 - s);
if (attrib_num != key_bad) {
s1 = equal_s + 1;
while (s1 < s_end && is_whitespace(*s1))
s1++;
*begin_s = s1;
while (s_end > s1 && is_whitespace(s_end[-1]))
s_end--;
*end_s = s_end;
}
return (attrib_num);
}
/*
* FUNCTION: parse_ldap_config_file
*
* Parses the information for LDAP from a configuration
* file. If no file is specified, /var/nis/NIS+LDAPmapping
* is used
*
* RETURN VALUE: 0 on success, -1 on failure
*
* INPUT: configuration file name
*/
static int
parse_ldap_config_file(
const char *config_file,
__nis_ldap_proxy_info *proxy_info,
__nis_config_t *nis_config,
__nis_table_mapping_t **table_mapping,
__nis_config_info_t *config_info,
__nisdb_table_mapping_t *table_info)
{
int rc = 0;
config_key attrib_num;
int fd;
char *attr_val;
int len;
if ((fd = open(config_file, O_RDONLY)) == -1) {
p_error = parse_open_file_error;
report_error(config_file, NULL);
return (-1);
}
start_line_num = 1;
cur_line_num = 1;
if (verbose)
report_info("Reading configuration from ", config_file);
file_source = config_file;
while ((attrib_num = get_file_attr_val(fd, &attr_val)) > 0) {
len = attr_val == NULL ? 0 : strlen(attr_val);
if (IS_CONFIG_KEYWORD(attrib_num)) {
rc = add_config_attribute(attrib_num,
attr_val, len, config_info);
} else if (IS_BIND_INFO(attrib_num)) {
rc = add_bind_attribute(attrib_num,
attr_val, len, proxy_info);
} else if (IS_OPER_INFO(attrib_num)) {
rc = add_operation_attribute(attrib_num,
attr_val, len, nis_config, table_info);
} else {
rc = add_mapping_attribute(attrib_num,
attr_val, len, table_mapping);
}
if (rc < 0) {
report_error(attr_val == NULL ?
"<no attribute>" : attr_val, _key_val);
if (attr_val)
free(attr_val);
break;
}
if (attr_val)
free(attr_val);
}
(void) close(fd);
if (attrib_num == key_bad) {
report_error(_key_val, NULL);
rc = -1;
}
start_line_num = 0;
file_source = NULL;
return (rc);
}
/*
* FUNCTION: yp_parse_ldap_config_file
*
* Parses the information for LDAP from a configuration
* file. If no file is specified, /var/yp/NISLDAPmapping
* is used
*
* RETURN VALUE: 0 on success, -1 on failure
*
* INPUT: configuration file name
*/
int
yp_parse_ldap_config_file(
const char *config_file,
__nis_ldap_proxy_info *proxy_info,
__nis_config_t *nis_config,
__nis_table_mapping_t **table_mapping,
__nis_config_info_t *config_info,
__nisdb_table_mapping_t *table_info,
__yp_domain_context_t *ypDomains)
{
int rc = 0;
int numDomains = 0;
config_key attrib_num;
int fd;
char *attr_val = NULL;
int len;
if ((fd = open(config_file, O_RDONLY)) == -1) {
p_error = parse_open_file_error;
report_error(config_file, NULL);
return (-1);
}
start_line_num = 1;
cur_line_num = 1;
if (verbose)
report_info("Reading configuration from ", config_file);
file_source = config_file;
while ((attrib_num = get_file_attr_val(fd, &attr_val)) > 0) {
len = attr_val == NULL ? 0 : strlen(attr_val);
if (IS_YP_CONFIG_KEYWORD(attrib_num)) {
rc = add_config_attribute(attrib_num,
attr_val, len, config_info);
} else if (IS_YP_BIND_INFO(attrib_num)) {
rc = add_bind_attribute(attrib_num,
attr_val, len, proxy_info);
} else if (IS_YP_OPER_INFO(attrib_num)) {
rc = add_operation_attribute(attrib_num,
attr_val, len, nis_config, table_info);
} else if (IS_YP_DOMAIN_INFO(attrib_num)) {
rc = add_ypdomains_attribute(attrib_num,
attr_val, len, ypDomains);
} else if (IS_YP_MAP_ATTR(attrib_num)) {
rc = add_mapping_attribute(attrib_num,
attr_val, len, table_mapping);
} else {
rc = -1;
p_error = parse_unsupported_format;
}
if (rc < 0) {
report_error(attr_val == NULL ?
"<no attribute>" : attr_val, _key_val);
if (attr_val)
free(attr_val);
break;
}
if (attr_val) {
free(attr_val);
attr_val = NULL;
}
}
(void) close(fd);
if (attrib_num == key_bad) {
report_error(_key_val, NULL);
rc = -1;
}
start_line_num = 0;
file_source = NULL;
return (rc);
}
/*
* FUNCTION: get_file_attr_val
*
* Gets the next attribute from the configuration file.
*
* RETURN VALUE: The config key if more attributes
* no_more_keys if eof
* key_bad if error
*/
static config_key
get_file_attr_val(int fd, char **attr_val)
{
char buf[BUFSIZE];
char *start_tag;
char *start_val;
char *end_val;
char *cut_here;
char *s;
char *a;
char *attribute_value;
int ret;
config_key attrib_num = no_more_keys;
int found_quote = 0;
*attr_val = NULL;
if ((ret = read_line(fd, buf, sizeof (buf))) > 0) {
for (s = buf; is_whitespace(*s); s++)
;
start_tag = s;
while (*s != '\0' && !is_whitespace(*s))
s++;
if (verbose)
report_info("\t", start_tag);
attrib_num = get_attrib_num(start_tag, s - start_tag);
if (attrib_num == key_bad)
return (key_bad);
while (is_whitespace(*s))
s++;
if (*s == '\0')
return (attrib_num);
start_val = s;
/* note that read_line will not return a line ending with \ */
for (; *s != '\0'; s++) {
if (*s == ESCAPE_CHAR)
s++;
}
while (s > start_val && is_whitespace(s[-1]))
s--;
attribute_value =
calloc(1, (size_t)(s - start_val) + 1);
if (attribute_value == NULL) {
p_error = parse_no_mem_error;
return (key_bad);
}
attr_val[0] = attribute_value;
a = *attr_val;
end_val = s;
cut_here = 0;
for (s = start_val; s < end_val; s++) {
if (*s == POUND_SIGN) {
cut_here = s;
while (s < end_val) {
if (*s == DOUBLE_QUOTE_CHAR ||
*s == SINGLE_QUOTE_CHAR) {
cut_here = 0;
break;
}
s++;
}
}
}
if (cut_here != 0)
end_val = cut_here;
for (s = start_val; s < end_val; s++)
*a++ = *s;
*a++ = '\0';
}
if (ret == -1)
return (key_bad);
return (attrib_num);
}
static LDAP *
connect_to_ldap_config_server(
char *sever_name,
int server_port,
__nis_config_info_t *config_info)
{
int rc = 0;
LDAP *ld = NULL;
int ldapVersion = LDAP_VERSION3;
int derefOption = LDAP_DEREF_ALWAYS;
int timelimit = LDAP_NO_LIMIT;
int sizelimit = LDAP_NO_LIMIT;
int errnum;
bool_t retrying = FALSE;
int sleep_seconds = 1;
struct berval cred;
if (config_info->tls_method == no_tls) {
ld = ldap_init(sever_name, server_port);
if (ld == NULL) {
p_error = parse_ldap_init_error;
report_error(strerror(errno), NULL);
return (NULL);
}
} else {
if ((errnum = ldapssl_client_init(
config_info->tls_cert_db, NULL)) < 0) {
p_error = parse_ldapssl_client_init_error;
report_error(ldapssl_err2string(errnum), NULL);
return (NULL);
}
ld = ldapssl_init(sever_name, server_port, 1);
if (ld == NULL) {
p_error = parse_ldapssl_init_error;
report_error(strerror(errno), NULL);
return (NULL);
}
}
(void) ldap_set_option(ld, LDAP_OPT_PROTOCOL_VERSION,
&ldapVersion);
(void) ldap_set_option(ld, LDAP_OPT_DEREF, &derefOption);
(void) ldap_set_option(ld, LDAP_OPT_REFERRALS, LDAP_OPT_OFF);
(void) ldap_set_option(ld, LDAP_OPT_TIMELIMIT, &timelimit);
(void) ldap_set_option(ld, LDAP_OPT_SIZELIMIT, &sizelimit);
/*
* Attempt to bind to the LDAP server.
* We will loop until success or until an error other
* than LDAP_CONNECT_ERROR or LDAP_SERVER_DOWN
*/
if (verbose)
report_info("Connecting to ", sever_name);
for (;;) {
if (config_info->auth_method == simple) {
errnum = ldap_simple_bind_s(ld, config_info->proxy_dn,
config_info->proxy_passwd);
} else if (config_info->auth_method == cram_md5) {
cred.bv_len = strlen(config_info->proxy_passwd);
cred.bv_val = config_info->proxy_passwd;
errnum = ldap_sasl_cram_md5_bind_s(ld,
config_info->proxy_dn, &cred, NULL, NULL);
} else if (config_info->auth_method == digest_md5) {
cred.bv_len = strlen(config_info->proxy_passwd);
cred.bv_val = config_info->proxy_passwd;
errnum = ldap_x_sasl_digest_md5_bind_s(ld,
config_info->proxy_dn, &cred, NULL, NULL);
} else {
errnum = ldap_simple_bind_s(ld, NULL, NULL);
}
if (errnum == LDAP_SUCCESS)
break;
if (errnum == LDAP_CONNECT_ERROR ||
errnum == LDAP_SERVER_DOWN) {
if (!retrying) {
if (verbose)
report_info(
"LDAP server unavailable. Retrying...",
NULL);
retrying = TRUE;
}
(void) sleep(sleep_seconds);
sleep_seconds *= 2;
if (sleep_seconds > MAX_LDAP_CONFIG_RETRY_TIME)
sleep_seconds = MAX_LDAP_CONFIG_RETRY_TIME;
p_error = no_parse_error;
continue;
}
p_error = parse_ldap_bind_error;
report_error2(config_info->proxy_dn, ldap_err2string(errnum));
(void) ldap_unbind(ld);
return (NULL);
}
if (verbose)
report_info("Reading values from ", config_info->config_dn);
return (ld);
}
/*
* FUNCTION: process_ldap_config_result
*
* Extracts the LDAPMessage containing the nis+/LDAP
* configuration
*
* RETURN VALUE: 0 on success, -1 on failure
*
* INPUT: LDAP the LDAP connection
* LDAPMessage the LDAP message
*/
static int
process_ldap_config_result(
LDAP *ld,
LDAPMessage *resultMsg,
__nis_ldap_proxy_info *proxy_info,
__nis_config_t *nis_config,
__nis_table_mapping_t **table_mapping,
__nisdb_table_mapping_t *table_info)
{
LDAPMessage *e;
int errnum;
char *attr;
BerElement *ber = NULL;
config_key attrib_num;
char **vals;
int n;
int i;
char *attr_val;
int len;
int rc = 0;
bool_t error_reported = FALSE;
e = ldap_first_entry(ld, resultMsg);
if (e != NULL) {
for (attr = ldap_first_attribute(ld, e, &ber); attr != NULL;
attr = ldap_next_attribute(ld, e, ber)) {
if (verbose)
report_info("\t", attr);
attrib_num = get_attrib_num(attr, strlen(attr));
if (attrib_num == key_bad) {
report_error(attr, NULL);
break;
}
if ((vals = ldap_get_values(ld, e, attr)) != NULL) {
n = ldap_count_values(vals);
/* parse the attribute values */
for (i = 0; i < n; i++) {
attr_val = vals[i];
while (is_whitespace(*attr_val))
attr_val++;
if (verbose)
report_info("\t\t", attr_val);
len = strlen(attr_val);
while (len > 0 &&
is_whitespace(attr_val[len - 1]))
len--;
if (yp2ldap) {
if (IS_YP_BIND_INFO(attrib_num)) {
rc = add_bind_attribute(attrib_num, attr_val,
len, proxy_info);
} else if (IS_YP_OPER_INFO(attrib_num)) {
rc = add_operation_attribute(attrib_num,
attr_val, len, nis_config, table_info);
} else if (IS_YP_MAP_ATTR(attrib_num)) {
rc = add_mapping_attribute(attrib_num, attr_val,
len, table_mapping);
} else {
p_error = parse_unsupported_format;
}
} else {
if (IS_BIND_INFO(attrib_num)) {
rc = add_bind_attribute(attrib_num, attr_val,
len, proxy_info);
} else if (IS_OPER_INFO(attrib_num)) {
rc = add_operation_attribute(attrib_num,
attr_val, len, nis_config, table_info);
} else {
rc = add_mapping_attribute(attrib_num, attr_val,
len, table_mapping);
}
}
if (p_error != no_parse_error) {
report_error(attr_val, attr);
error_reported = TRUE;
break;
}
}
ldap_value_free(vals);
} else {
(void) ldap_get_option(ld,
LDAP_OPT_ERROR_NUMBER, &errnum);
if (errnum != LDAP_SUCCESS)
p_error = parse_ldap_get_values_error;
}
ldap_memfree(attr);
if (p_error != no_parse_error)
break;
}
} else {
errnum = ldap_result2error(ld, resultMsg, FALSE);
if (errnum != LDAP_SUCCESS)
p_error = parse_ldap_search_error;
}
if (ber != NULL)
ber_free(ber, 0);
if (!error_reported && p_error != no_parse_error) {
report_error(ldap_err2string(errnum), 0);
}
if (p_error != no_parse_error)
rc = -1;
return (rc);
}
/*
* FUNCTION: process_ldap_referral
*
* Retrieves the configuration for a referral url
*
* RETURN VALUE: 0 on success, -1 on failure, 1 on skip
*
* INPUT: url the ldap url
* __nis_ldap_proxy_info
*/
static int
process_ldap_referral(
char *url,
char **attrs,
__nis_ldap_proxy_info *proxy_info,
__nis_config_t *nis_config,
__nis_table_mapping_t **table_mapping,
__nis_config_info_t *config_info,
__nisdb_table_mapping_t *table_info)
{
LDAPURLDesc *ludpp = NULL;
int rc;
LDAP *ld = NULL;
int errnum;
LDAPMessage *resultMsg = NULL;
if ((rc = ldap_url_parse(url, &ludpp)) != LDAP_SUCCESS)
return (1);
#ifdef LDAP_URL_OPT_SECURE
if (ludpp->lud_options & LDAP_URL_OPT_SECURE) {
if (config_info->tls_method != ssl_tls) {
ldap_free_urldesc(ludpp);
return (1);
}
} else {
if (config_info->tls_method != no_tls) {
ldap_free_urldesc(ludpp);
return (1);
}
}
#endif
if ((ld = connect_to_ldap_config_server(ludpp->lud_host,
ludpp->lud_port, config_info)) == NULL) {
ldap_free_urldesc(ludpp);
return (-1);
}
errnum = ldap_search_s(ld, config_info->config_dn, LDAP_SCOPE_BASE,
"objectclass=nisplusLDAPconfig", attrs, 0, &resultMsg);
ldap_source = config_info->config_dn;
if (errnum != LDAP_SUCCESS) {
p_error = parse_ldap_search_error;
report_error(ldap_err2string(errnum), 0);
rc = -1;
} else {
rc = process_ldap_config_result(ld, resultMsg, proxy_info,
nis_config, table_mapping, table_info);
}
ldap_source = NULL;
(void) ldap_unbind(ld);
if (resultMsg != NULL)
(void) ldap_msgfree(resultMsg);
return (rc);
}
/*
* FUNCTION: process_ldap_referral_msg
*
* Retrieves the configuration from referred servers
*
* RETURN VALUE: 0 on success, -1 on failure
*
* INPUT: LDAP the LDAP connection
* LDAPMessage the LDAP message
* __nis_ldap_proxy_info
*/
static int
process_ldap_referral_msg(
LDAP *ld,
LDAPMessage *resultMsg,
char **attrs,
__nis_ldap_proxy_info *proxy_info,
__nis_config_t *nis_config,
__nis_table_mapping_t **table_mapping,
__nis_config_info_t *config_info,
__nisdb_table_mapping_t *table_info)
{
int errCode;
char **referralsp = NULL;
int i;
int rc;
rc = ldap_parse_result(ld, resultMsg, &errCode, NULL, NULL, &referralsp,
NULL, 0);
if (rc != LDAP_SUCCESS || errCode != LDAP_REFERRAL) {
p_error = parse_ldap_get_values_error;
report_error(ldap_err2string(errCode), 0);
rc = -1;
} else {
for (i = 0; referralsp[i] != NULL; i++) {
rc = process_ldap_referral(referralsp[i], attrs,
proxy_info, nis_config, table_mapping,
config_info, table_info);
if (rc <= 0)
break;
else
report_info("Cannot use referral \n",
referralsp[i]);
}
if (rc > 0) {
p_error = parse_no_available_referrals_error;
report_error(0, 0);
}
}
if (referralsp)
ldap_value_free(referralsp);
return (rc);
}
/*
* FUNCTION: parse_ldap_config_dn_attrs
*
* Parses the information for LDAP from the LDAP profile
* - the profile object name, the LDAP server, and the
* authentication method must be specified.
*
* RETURN VALUE: 0 on success, -1 on failure
*
* INPUT: __nis_ldap_proxy_info
*/
static int
parse_ldap_config_dn_attrs(
__nis_ldap_proxy_info *proxy_info,
__nis_config_t *nis_config,
__nis_table_mapping_t **table_mapping,
__nis_config_info_t *config_info,
__nisdb_table_mapping_t *table_info)
{
int rc = 0;
LDAP *ld = NULL;
int errnum;
char *ldap_config_attributes[n_config_keys];
LDAPMessage *resultMsg = NULL;
/* Determine if properly configured for LDAP lookup */
if (config_info->auth_method == simple &&
config_info->proxy_dn == NULL)
p_error = parse_no_proxy_dn_error;
else if (config_info->auth_method ==
(auth_method_t)NO_VALUE_SET)
p_error = parse_no_config_auth_error;
else if ((config_info->default_servers == NULL) ||
(config_info->default_servers[0] == '\0'))
p_error = parse_no_config_server_addr;
if (p_error != no_parse_error) {
report_error(NULL, NULL);
return (-1);
}
if (config_info->tls_method == (tls_method_t)NO_VALUE_SET)
config_info->tls_method = no_tls;
else if (config_info->tls_method == ssl_tls &&
(config_info->tls_cert_db == NULL ||
*config_info->tls_cert_db == '\0')) {
p_error = parse_no_config_cert_db;
report_error(NULL, NULL);
return (-1);
}
if (verbose)
report_info(
"Getting configuration from LDAP server(s): ",
config_info->default_servers);
/* Determine which attributes should be retrieved */
get_attribute_list(proxy_info, nis_config, NULL, table_info,
ldap_config_attributes);
if ((ld = connect_to_ldap_config_server(config_info->default_servers, 0,
config_info)) == NULL)
return (-1);
/* Get the attribute values */
errnum = ldap_search_s(ld, config_info->config_dn, LDAP_SCOPE_BASE,
"objectclass=nisplusLDAPconfig",
ldap_config_attributes, 0, &resultMsg);
ldap_source = config_info->config_dn;
if (errnum == LDAP_REFERRAL) {
rc = process_ldap_referral_msg(ld, resultMsg,
ldap_config_attributes, proxy_info, nis_config,
table_mapping, config_info, table_info);
} else if (errnum != LDAP_SUCCESS) {
p_error = parse_ldap_search_error;
report_error(ldap_err2string(errnum), 0);
rc = -1;
} else {
rc = process_ldap_config_result(ld, resultMsg, proxy_info,
nis_config, table_mapping, table_info);
}
ldap_source = NULL;
(void) ldap_unbind(ld);
if (resultMsg != NULL)
(void) ldap_msgfree(resultMsg);
return (rc);
}
bool_t
is_cmd_line_option(config_key a_num)
{
const char *const *cmdline_options = cmdline_config;
config_key attrib_num;
const char *begin_s;
const char *end_s;
if (cmdline_options == NULL)
return (FALSE);
while (*cmdline_options != NULL) {
attrib_num = get_attrib_num_cmdline(
*cmdline_options, &begin_s, &end_s);
if (attrib_num == a_num)
break;
cmdline_options++;
}
return (*cmdline_options != NULL);
}
/*
* FUNCTION: get_attribute_list
*
* Get a list of attributes from the LDAP server that have not yet
* been gotten. If config_info is NULL, the associated parameters
* are not needed.
*
* RETURN VALUE: none
*
* INPUT: Returns a list of parameters in attributes
* which is assumed to be of sufficient size.
*/
static void
get_attribute_list(
const __nis_ldap_proxy_info *proxy_info,
const __nis_config_t *nis_config,
const __nis_config_info_t *config_info,
const __nisdb_table_mapping_t *table_info,
char **attributes)
{
int n_attrs;
/* Determine which attributes should be retrieved */
n_attrs = 0;
if (config_info != NULL) {
if (yp2ldap) {
if (config_info->config_dn == NULL)
attributes[n_attrs++] = YP_CONFIG_DN;
if (config_info->default_servers == NULL)
attributes[n_attrs++] = YP_CONFIG_SERVER_LIST;
if (config_info->auth_method ==
(auth_method_t)NO_VALUE_SET)
attributes[n_attrs++] = YP_CONFIG_AUTH_METHOD;
if (config_info->tls_method ==
(tls_method_t)NO_VALUE_SET)
attributes[n_attrs++] = YP_CONFIG_TLS_OPTION;
if (config_info->proxy_dn == NULL)
attributes[n_attrs++] = YP_CONFIG_PROXY_USER;
if (config_info->proxy_passwd == NULL)
attributes[n_attrs++] = YP_CONFIG_PROXY_PASSWD;
if (config_info->tls_cert_db == NULL)
attributes[n_attrs++] = YP_CONFIG_TLS_CERT_DB;
} else {
if (config_info->config_dn == NULL)
attributes[n_attrs++] = CONFIG_DN;
if (config_info->default_servers == NULL)
attributes[n_attrs++] = CONFIG_SERVER_LIST;
if (config_info->auth_method ==
(auth_method_t)NO_VALUE_SET)
attributes[n_attrs++] = CONFIG_AUTH_METHOD;
if (config_info->tls_method ==
(tls_method_t)NO_VALUE_SET)
attributes[n_attrs++] = CONFIG_TLS_OPTION;
if (config_info->proxy_dn == NULL)
attributes[n_attrs++] = CONFIG_PROXY_USER;
if (config_info->proxy_passwd == NULL)
attributes[n_attrs++] = CONFIG_PROXY_PASSWD;
if (config_info->tls_cert_db == NULL)
attributes[n_attrs++] = CONFIG_TLS_CERT_DB;
}
} else {
if (yp2ldap) {
attributes[n_attrs++] = YP_DOMAIN_CONTEXT;
attributes[n_attrs++] = YPPASSWDD_DOMAINS;
attributes[n_attrs++] = YP_DB_ID_MAP;
attributes[n_attrs++] = YP_COMMENT_CHAR;
attributes[n_attrs++] = YP_MAP_FLAGS;
attributes[n_attrs++] = YP_ENTRY_TTL;
attributes[n_attrs++] = YP_NAME_FIELDS;
attributes[n_attrs++] = YP_SPLIT_FIELD;
attributes[n_attrs++] = YP_REPEATED_FIELD_SEPARATORS;
attributes[n_attrs++] = YP_LDAP_OBJECT_DN;
attributes[n_attrs++] = NIS_TO_LDAP_MAP;
attributes[n_attrs++] = LDAP_TO_NIS_MAP;
} else {
attributes[n_attrs++] = DB_ID_MAP;
attributes[n_attrs++] = ENTRY_TTL;
attributes[n_attrs++] = LDAP_OBJECT_DN;
attributes[n_attrs++] = NISPLUS_TO_LDAP_MAP;
attributes[n_attrs++] = LDAP_TO_NISPLUS_MAP;
}
}
if (yp2ldap) {
if (proxy_info->default_servers == NULL)
attributes[n_attrs++] = PREFERRED_SERVERS;
if (proxy_info->auth_method == (auth_method_t)NO_VALUE_SET)
attributes[n_attrs++] = AUTH_METHOD;
if (proxy_info->tls_method == (tls_method_t)NO_VALUE_SET)
attributes[n_attrs++] = YP_TLS_OPTION;
if (proxy_info->tls_cert_db == NULL)
attributes[n_attrs++] = YP_TLS_CERT_DB;
if (proxy_info->default_search_base == NULL)
attributes[n_attrs++] = SEARCH_BASE;
if (proxy_info->proxy_dn == NULL)
attributes[n_attrs++] = YP_PROXY_USER;
if (proxy_info->proxy_passwd == NULL)
attributes[n_attrs++] = YP_PROXY_PASSWD;
if (proxy_info->default_nis_domain == NULL)
attributes[n_attrs++] = YP_LDAP_BASE_DOMAIN;
if (proxy_info->bind_timeout.tv_sec ==
(time_t)NO_VALUE_SET)
attributes[n_attrs++] = YP_BIND_TIMEOUT;
if (proxy_info->search_timeout.tv_sec ==
(time_t)NO_VALUE_SET)
attributes[n_attrs++] = YP_SEARCH_TIMEOUT;
if (proxy_info->modify_timeout.tv_sec ==
(time_t)NO_VALUE_SET)
attributes[n_attrs++] = YP_MODIFY_TIMEOUT;
if (proxy_info->add_timeout.tv_sec == (time_t)NO_VALUE_SET)
attributes[n_attrs++] = YP_ADD_TIMEOUT;
if (proxy_info->delete_timeout.tv_sec ==
(time_t)NO_VALUE_SET)
attributes[n_attrs++] = YP_DELETE_TIMEOUT;
if (proxy_info->search_time_limit == (int)NO_VALUE_SET)
attributes[n_attrs++] = YP_SEARCH_TIME_LIMIT;
if (proxy_info->search_size_limit == (int)NO_VALUE_SET)
attributes[n_attrs++] = YP_SEARCH_SIZE_LIMIT;
if (proxy_info->follow_referral ==
(follow_referral_t)NO_VALUE_SET)
attributes[n_attrs++] = YP_FOLLOW_REFERRAL;
if (table_info->retrieveError ==
(__nis_retrieve_error_t)NO_VALUE_SET)
attributes[n_attrs++] = YP_RETRIEVE_ERROR_ACTION;
if (table_info->retrieveErrorRetry.attempts == NO_VALUE_SET)
attributes[n_attrs++] = YP_RETREIVE_ERROR_ATTEMPTS;
if (table_info->retrieveErrorRetry.timeout ==
(time_t)NO_VALUE_SET)
attributes[n_attrs++] = YP_RETREIVE_ERROR_TIMEOUT;
if (table_info->storeError ==
(__nis_store_error_t)NO_VALUE_SET)
attributes[n_attrs++] = YP_STORE_ERROR_ACTION;
if (table_info->storeErrorRetry.attempts == NO_VALUE_SET)
attributes[n_attrs++] = YP_STORE_ERROR_ATTEMPTS;
if (table_info->storeErrorRetry.timeout ==
(time_t)NO_VALUE_SET)
attributes[n_attrs++] = YP_STORE_ERROR_TIMEOUT;
if (table_info->refreshError ==
(__nis_refresh_error_t)NO_VALUE_SET)
attributes[n_attrs++] = REFRESH_ERROR_ACTION;
if (table_info->refreshErrorRetry.attempts == NO_VALUE_SET)
attributes[n_attrs++] = REFRESH_ERROR_ATTEMPTS;
if (table_info->refreshErrorRetry.timeout ==
(time_t)NO_VALUE_SET)
attributes[n_attrs++] = REFRESH_ERROR_TIMEOUT;
if (table_info->matchFetch ==
(__nis_match_fetch_t)NO_VALUE_SET)
attributes[n_attrs++] = YP_MATCH_FETCH;
} else {
if (proxy_info->default_servers == NULL)
attributes[n_attrs++] = PREFERRED_SERVERS;
if (proxy_info->auth_method == (auth_method_t)NO_VALUE_SET)
attributes[n_attrs++] = AUTH_METHOD;
if (proxy_info->tls_method == (tls_method_t)NO_VALUE_SET)
attributes[n_attrs++] = TLS_OPTION;
if (proxy_info->tls_cert_db == NULL)
attributes[n_attrs++] = TLS_CERT_DB;
if (proxy_info->default_search_base == NULL)
attributes[n_attrs++] = SEARCH_BASE;
if (proxy_info->proxy_dn == NULL)
attributes[n_attrs++] = PROXY_USER;
if (proxy_info->proxy_passwd == NULL)
attributes[n_attrs++] = PROXY_PASSWD;
if (proxy_info->default_nis_domain == NULL)
attributes[n_attrs++] = LDAP_BASE_DOMAIN;
if (proxy_info->bind_timeout.tv_sec ==
(time_t)NO_VALUE_SET)
attributes[n_attrs++] = BIND_TIMEOUT;
if (proxy_info->search_timeout.tv_sec ==
(time_t)NO_VALUE_SET)
attributes[n_attrs++] = SEARCH_TIMEOUT;
if (proxy_info->modify_timeout.tv_sec ==
(time_t)NO_VALUE_SET)
attributes[n_attrs++] = MODIFY_TIMEOUT;
if (proxy_info->add_timeout.tv_sec == (time_t)NO_VALUE_SET)
attributes[n_attrs++] = ADD_TIMEOUT;
if (proxy_info->delete_timeout.tv_sec ==
(time_t)NO_VALUE_SET)
attributes[n_attrs++] = DELETE_TIMEOUT;
if (proxy_info->search_time_limit == (int)NO_VALUE_SET)
attributes[n_attrs++] = SEARCH_TIME_LIMIT;
if (proxy_info->search_size_limit == (int)NO_VALUE_SET)
attributes[n_attrs++] = SEARCH_SIZE_LIMIT;
if (proxy_info->follow_referral ==
(follow_referral_t)NO_VALUE_SET)
attributes[n_attrs++] = FOLLOW_REFERRAL;
if (table_info->retrieveError ==
(__nis_retrieve_error_t)NO_VALUE_SET)
attributes[n_attrs++] = RETRIEVE_ERROR_ACTION;
if (table_info->retrieveErrorRetry.attempts == NO_VALUE_SET)
attributes[n_attrs++] = RETREIVE_ERROR_ATTEMPTS;
if (table_info->retrieveErrorRetry.timeout ==
(time_t)NO_VALUE_SET)
attributes[n_attrs++] = RETREIVE_ERROR_TIMEOUT;
if (table_info->storeError ==
(__nis_store_error_t)NO_VALUE_SET)
attributes[n_attrs++] = STORE_ERROR_ACTION;
if (table_info->storeErrorRetry.attempts == NO_VALUE_SET)
attributes[n_attrs++] = STORE_ERROR_ATTEMPTS;
if (table_info->storeErrorRetry.timeout ==
(time_t)NO_VALUE_SET)
attributes[n_attrs++] = STORE_ERROR_TIMEOUT;
if (table_info->refreshError ==
(__nis_refresh_error_t)NO_VALUE_SET)
attributes[n_attrs++] = REFRESH_ERROR_ACTION;
if (table_info->refreshErrorRetry.attempts == NO_VALUE_SET)
attributes[n_attrs++] = REFRESH_ERROR_ATTEMPTS;
if (table_info->refreshErrorRetry.timeout ==
(time_t)NO_VALUE_SET)
attributes[n_attrs++] = REFRESH_ERROR_TIMEOUT;
if (table_info->matchFetch ==
(__nis_match_fetch_t)NO_VALUE_SET)
attributes[n_attrs++] = MATCH_FETCH;
}
switch (nis_config->initialUpdate) {
case (__nis_initial_update_t)NO_VALUE_SET:
attributes[n_attrs++] = INITIAL_UPDATE_ACTION;
attributes[n_attrs++] = INITIAL_UPDATE_ONLY;
break;
case (__nis_initial_update_t)INITIAL_UPDATE_NO_ACTION:
case (__nis_initial_update_t)NO_INITIAL_UPDATE_NO_ACTION:
attributes[n_attrs++] = INITIAL_UPDATE_ACTION;
break;
case (__nis_initial_update_t)FROM_NO_INITIAL_UPDATE:
case (__nis_initial_update_t)TO_NO_INITIAL_UPDATE:
attributes[n_attrs++] = INITIAL_UPDATE_ONLY;
break;
}
if (nis_config->threadCreationError ==
(__nis_thread_creation_error_t)NO_VALUE_SET)
attributes[n_attrs++] = THREAD_CREATE_ERROR_ACTION;
if (nis_config->threadCreationErrorTimeout.attempts == NO_VALUE_SET)
attributes[n_attrs++] = THREAD_CREATE_ERROR_ATTEMPTS;
if (nis_config->threadCreationErrorTimeout.timeout ==
(time_t)NO_VALUE_SET)
attributes[n_attrs++] = THREAD_CREATE_ERROR_TIMEOUT;
if (nis_config->dumpError == (__nis_dump_error_t)NO_VALUE_SET)
attributes[n_attrs++] = DUMP_ERROR_ACTION;
if (nis_config->dumpErrorTimeout.attempts == NO_VALUE_SET)
attributes[n_attrs++] = DUMP_ERROR_ATTEMPTS;
if (nis_config->dumpErrorTimeout.timeout == (time_t)NO_VALUE_SET)
attributes[n_attrs++] = DUMP_ERROR_TIMEOUT;
if (nis_config->resyncService == (__nis_resync_service_t)NO_VALUE_SET)
attributes[n_attrs++] = RESYNC;
if (nis_config->updateBatching ==
(__nis_update_batching_t)NO_VALUE_SET)
attributes[n_attrs++] = UPDATE_BATCHING;
if (nis_config->updateBatchingTimeout.timeout == (time_t)NO_VALUE_SET)
attributes[n_attrs++] = UPDATE_BATCHING_TIMEOUT;
if (nis_config->numberOfServiceThreads == (int)NO_VALUE_SET)
attributes[n_attrs++] = NUMBER_THEADS;
if (nis_config->emulate_yp == (int)NO_VALUE_SET)
attributes[n_attrs++] = YP_EMULATION;
/* maxRPCRecordSize is not configurable through LDAP profiles */
if (nis_config->maxRPCRecordSize == (int)NO_VALUE_SET)
attributes[n_attrs++] = MAX_RPC_RECSIZE;
attributes[n_attrs++] = NULL;
}
/*
* Notes on adding new attributes
* 1. Determine where the attribute value will be saved
* Currently, the following structures are defined:
* __nis_config_info_t config_info
* __nis_ldap_proxy_info proxyInfo
* __nis_config_t ldapConfig
* __nisdb_table_mapping_t ldapDBTableMapping
* __nis_table_mapping_t ldapTableMapping
* or add a new structure or variable - this will require
* more code.
* 2. Initialize the value to a known unconfigured value.
* This can be done in initialize_parse_structs or
* parse_ldap_migration.
* 3. In the header file nis_parse_ldap_conf.h, add the name
* of the attribute. (Currently, the attribute name is assumed
* to be the same for the command line, the preference file,
* and LDAP.) The names are grouped logically. Add a corresponding
* config_key to the enum. Note that position in this file is
* essential because the macros such as IS_BIND_INFO depend on
* the sequence. The corresponding macro (IS_CONFIG_KEYWORD,
* IS_BIND_INFO, or IS_OPER_INFO) may need to be adjusted. These
* are used to partition the attributes into smaller chunks.
* 4. Add the correspond entry to the keyword_lookup array in
* nis_parse_ldap_attr.c, which is used to determine the config_key
* from the corresponding key word.
* 5. Add the attribute to the list of attributes to retrieve from
* the LDAP server if no value has been set in the function
* parse_ldap_config_dn_attrs. (This assumes that the attribute
* is not used to get the configuration from the LDAP server.)
* 6. Add logic to parse the individual attribute in
* add_config_attribute, add_bind_attribute,
* add_operation_attribute, or add_mapping_attribute depending
* which group of attributes the added attribute belongs to.
* 7. In set_default_values, if the attribute value has not been set, set
* the default value. If any additional fixup is needed depending
* on other configuration values, it should be done here.
* 8. If an attribute name is a subset of another, parse_ldap_default_conf
* should be modified.
* 9. Add the new attribute to the class action script
* usr/src/pkgdefs/common_files/i.defrpc.nisd, if the user
* configured value has to be preserved across upgrades
*/