The FreeRADIUS server $Id: 15bac2a4c627c01d1aa2047687b3418955ac7f00 $
Loading...
Searching...
No Matches
proto_ldap_sync_ldap.c
Go to the documentation of this file.
1/*
2 * This program is free software; you can redistribute it and/or modify
3 * it under the terms of the GNU General Public License as published by
4 * the Free Software Foundation; either version 2 of the License, or
5 * (at your option) any later version.
6 *
7 * This program is distributed in the hope that it will be useful,
8 * but WITHOUT ANY WARRANTY; without even the implied warranty of
9 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
10 * GNU General Public License for more details.
11 *
12 * You should have received a copy of the GNU General Public License
13 * along with this program; if not, write to the Free Software
14 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
15 */
16
17/**
18 * $Id: 45383185be13d92ea380394019732556ceee9a20 $
19 * @file proto_ldap_sync_ldap.c
20 * @brief LDAP sync handler.
21 *
22 * @copyright 2022 Network RADIUS SAS (legal@networkradius.com)
23 */
25
26#define LOG_PREFIX "proto_ldap_sync_ldap"
27
28#include <freeradius-devel/protocol/freeradius/freeradius.internal.h>
29#include <freeradius-devel/internal/internal.h>
30#include <freeradius-devel/server/protocol.h>
31#include <freeradius-devel/server/request.h>
32#include <freeradius-devel/io/listen.h>
33#include <freeradius-devel/io/application.h>
34#include <freeradius-devel/unlang/call.h>
35#include <freeradius-devel/util/dbuff.h>
36#include <freeradius-devel/ldap/base.h>
37#include <freeradius-devel/ldap/conf.h>
38
40#include "rfc4533.h"
41#include "persistent_search.h"
42#include "active_directory.h"
43
45
48
50 /*
51 * LDAP server definition
52 */
54
55 /*
56 * Common LDAP conf parsers
57 */
59
60 /*
61 * Network tunable parameters
62 */
63 { FR_CONF_OFFSET_IS_SET("recv_buff", FR_TYPE_UINT32, 0, proto_ldap_sync_ldap_t, recv_buff) },
64 { FR_CONF_OFFSET("max_outstanding", proto_ldap_sync_ldap_t, max_outstanding), .dflt = "65536" },
65
67};
68
71
74 { .out = &dict_ldap_sync, .proto = "ldap" },
75 { .out = &dict_freeradius, .proto = "freeradius" },
76 { NULL }
77};
78
87
90 { .out = &attr_ldap_sync_packet_id, .name = "Sync-Packet-ID", .type = FR_TYPE_UINT32, .dict = &dict_ldap_sync },
91 { .out = &attr_ldap_sync_cookie, .name = "LDAP-Sync.Cookie", .type = FR_TYPE_OCTETS, .dict = &dict_ldap_sync },
92 { .out = &attr_ldap_sync_entry_dn, .name = "LDAP-Sync.Entry-DN", .type = FR_TYPE_STRING, .dict = &dict_ldap_sync },
93 { .out = &attr_ldap_sync_entry_uuid, .name = "LDAP-Sync.Entry-UUID", .type = FR_TYPE_OCTETS, .dict = &dict_ldap_sync },
94 { .out = &attr_ldap_sync_orig_dn, .name = "LDAP-Sync.Original-DN", .type = FR_TYPE_STRING, .dict = &dict_ldap_sync },
95 { .out = &attr_ldap_sync_root_dn, .name = "LDAP-Sync.Directory-Root-DN", .type = FR_TYPE_STRING, .dict = &dict_ldap_sync },
96 { .out = &attr_packet_type, .name = "Packet-Type", .type = FR_TYPE_UINT32, .dict = &dict_ldap_sync },
97 { .out = &attr_ldap_sync_base_dn, .name = "LDAP-Sync-Base-DN", .type = FR_TYPE_STRING, .dict = &dict_freeradius },
98 { NULL }
99};
100
106
107/** Operations performed on entries
108 */
110 { L("add"), SYNC_OP_ADD },
111 { L("delete"), SYNC_OP_DELETE },
112 { L("modify"), SYNC_OP_MODIFY },
113 { L("present"), SYNC_OP_PRESENT },
114};
116
117/** Context used when looking up Directory types
118 */
125
126/** Context for "load Cookie" retry timed event
127 */
133
134/** Compare two sync state structures on msgid
135 *
136 * @param[in] one first sync to compare.
137 * @param[in] two second sync to compare.
138 * @return CMP(one, two)
139 */
140int8_t sync_state_cmp(void const *one, void const *two)
141{
142 sync_state_t const *a = one, *b = two;
143
144 return CMP(a->msgid, b->msgid);
145}
146
147/** Tell the remote server to stop the sync
148 *
149 * Terminates the search informing the remote server that we no longer want to receive results
150 * for this sync. A RFC 4511 abandon request is used to inform the server.
151 *
152 * This allows individual syncs to be stopped without destroying the underlying connection.
153 *
154 * Removes the sync's msgid from the tree of msgids associated with the connection.
155 *
156 * @param[in] sync to abandon.
157 * @return 0
158 */
160{
161 fr_ldap_connection_t *conn = talloc_get_type_abort(sync->conn, fr_ldap_connection_t);
162 fr_rb_tree_t *tree = talloc_get_type_abort(conn->uctx, fr_rb_tree_t);
163
164 DEBUG3("Abandoning sync base dn \"%s\", filter \"%s\"", sync->config->base_dn, sync->config->filter);
165
166 trigger_exec(NULL, sync->config->cs, "ldap_sync.stop", true, &sync->trigger_args);
167
168 if (!sync->conn->handle) return 0; /* Handled already closed? */
169
170 /*
171 * Tell the remote server to stop sending results
172 */
173 if (sync->msgid >= 0) ldap_abandon_ext(sync->conn->handle, sync->msgid, NULL, NULL);
174 fr_rb_delete(tree, &(sync_state_t){.msgid = sync->msgid});
175
176 return 0;
177}
178
179/** Allocate a sync state
180 *
181 * @param[in] ctx to allocate the sync state in.
182 * @param[in] conn which the sync will run on.
183 * @param[in] inst module instance for the sync.
184 * @param[in] sync_no number of the sync in the array of configs.
185 * @param[in] config for the sync.
186 * @return new sync state.
187 */
189 size_t sync_no, sync_config_t const *config)
190{
191 sync_state_t *sync;
192 fr_pair_t *vp;
193
194 MEM(sync = talloc_zero(ctx, sync_state_t));
195 sync->conn = conn;
196 sync->inst = inst;
197 sync->config = config;
198 sync->sync_no = sync_no;
199 sync->phase = SYNC_PHASE_INIT;
200
202
203 /*
204 * Create arguments to pass to triggers
205 */
208 talloc_array_length(config->base_dn) - 1, false);
209
210 /*
211 * If the connection is freed, all the sync state is also freed
212 */
213 talloc_set_destructor(sync, sync_state_free);
214
215 return sync;
216}
217
218/** Add a new cookie packet ctx to the pending list
219 *
220 * Does not actually send the packet.
221 *
222 * @param[in] sync the cookie was received for.
223 * @param[in] refresh the sync after storing this cookie.
224 * @return
225 * - 0 on success.
226 * - -1 on failure
227 */
228int ldap_sync_cookie_store(sync_state_t *sync, bool refresh)
229{
230 sync_packet_ctx_t *sync_packet_ctx = NULL;
231 uint8_t *cookie = sync->cookie;
232
233 MEM(sync_packet_ctx = talloc_zero(sync, sync_packet_ctx_t));
234 sync_packet_ctx->sync = sync;
235
236 sync_packet_ctx->type = SYNC_PACKET_TYPE_COOKIE;
237 if (cookie) sync_packet_ctx->cookie = talloc_memdup(sync_packet_ctx, cookie, talloc_array_length(cookie));
238 sync_packet_ctx->refresh = refresh;
239
240 if (fr_dlist_insert_tail(&sync->pending, sync_packet_ctx) < 0) {
241 talloc_free(sync_packet_ctx);
242 return -1;
243 }
244 sync->pending_cookies++;
245
246 return 0;
247}
248
249/** Event to handle storing of cookies on a timed basis
250 *
251 * Looks at the head of the list of pending sync packets for a cookie.
252 * A cookie at the head says that all the previous changes have been
253 * completed, so the cookie can be sent.
254 */
256{
257 sync_state_t *sync = talloc_get_type_abort(uctx, sync_state_t);
258 sync_packet_ctx_t *sync_packet_ctx;
259
260 if (sync->pending_cookies == 0) goto finish;
261
262 /*
263 * Check the head entry in the list - is it a pending cookie
264 */
265 sync_packet_ctx = fr_dlist_head(&sync->pending);
266 if ((sync_packet_ctx->type != SYNC_PACKET_TYPE_COOKIE) ||
267 (sync_packet_ctx->status != SYNC_PACKET_PENDING)) goto finish;
268
269 ldap_sync_cookie_send(sync_packet_ctx);
270
271finish:
272 (void) fr_timer_in(sync, tl, &sync->cookie_ev, sync->inst->cookie_interval,
273 false, ldap_sync_cookie_event, sync);
274}
275
276/** Enqueue a new cookie store packet
277 *
278 * Create a new internal packet containing the cookie we received from the LDAP server.
279 * This allows the administrator to store the cookie and provide it on a future call to
280 * load Cookie.
281 *
282 * @param[in] sync_packet_ctx packet context containing the cookie to store.
283 * @return
284 * - 0 on success.
285 * - -1 on failure.
286*/
288{
289 sync_state_t *sync = sync_packet_ctx->sync;
290 proto_ldap_sync_ldap_thread_t *thread = talloc_get_type_abort(sync->config->user_ctx, proto_ldap_sync_ldap_thread_t);
291 fr_dbuff_t *dbuff;
292 fr_pair_list_t pairs;
293 fr_pair_t *vp;
294 TALLOC_CTX *local = NULL;
295 uint8_t *cookie = sync_packet_ctx->cookie;
296
297 if (sync_packet_ctx->status != SYNC_PACKET_PENDING) return 0;
298 sync_packet_ctx->status = SYNC_PACKET_PREPARING;
299
300 FR_DBUFF_TALLOC_THREAD_LOCAL(&dbuff, 1024, 4096);
301
302 local = talloc_new(NULL);
303 fr_pair_list_init(&pairs);
304 if (fr_pair_list_copy(local, &pairs, &sync->config->sync_pairs) < 0) {
305 error:
306 talloc_free(local);
307 return -1;
308 }
309
311 if (!vp) goto error;
312
314 if (!vp) goto error;
315
316 /*
317 * Add the cookie to the packet, if set.
318 * If the server has indicated a refresh is required it can do so
319 * with no cookie set - so we store a blank cookie to clear anything
320 * which was previously stored.
321 */
322 if (cookie) {
324 cookie, talloc_array_length(cookie), true);
325 if (!vp) goto error;
326 }
327
328 if (fr_internal_encode_list(dbuff, &pairs, &encode_ctx) < 0) goto error;
329 talloc_free(local);
330
331 if (fr_network_listen_send_packet(thread->nr, thread->li, thread->li, fr_dbuff_buff(dbuff),
332 fr_dbuff_used(dbuff), fr_time(), sync_packet_ctx) < 0) {
333 sync_packet_ctx->status = SYNC_PACKET_PENDING;
334 return -1;
335 }
336
337 sync_packet_ctx->status = SYNC_PACKET_PROCESSING;
338
339 return 0;
340}
341
342/** Send a change packet to the workers
343 *
344 * Called each time a change packet is received and also from a
345 * timer event retrying packets which previously failed to send.
346 *
347 * @param sync_packet_ctx Packet to send
348 * @return
349 * - 0 on success.
350 * - -1 on failure.
351 */
353{
354 proto_ldap_sync_ldap_thread_t *thread = talloc_get_type_abort(sync_packet_ctx->sync->config->user_ctx,
356 fr_dbuff_t *dbuff;
357
358 FR_DBUFF_TALLOC_THREAD_LOCAL(&dbuff, 1024, 4096);
359
360 if (fr_internal_encode_list(dbuff, &sync_packet_ctx->pairs, &encode_ctx) < 0) return -1;
361 if (fr_network_listen_send_packet(thread->nr, thread->li, thread->li, fr_dbuff_buff(dbuff),
362 fr_dbuff_used(dbuff), fr_time(), sync_packet_ctx) < 0) return -1;
363
364 sync_packet_ctx->status = SYNC_PACKET_PROCESSING;
365 fr_pair_list_free(&sync_packet_ctx->pairs);
366
367 return 0;
368}
369
370/** Event to handle sending of any change packets which failed to send.
371 *
372 * Looks at the head of the list of pending sync packets for unsent
373 * change packets and sends any up to the first cookie.
374 */
375static void ldap_sync_retry_event(fr_timer_list_t *tl, UNUSED fr_time_t now, void *uctx)
376{
377 sync_state_t *sync = talloc_get_type_abort(uctx, sync_state_t);
378 sync_packet_ctx_t *sync_packet_ctx = NULL;
379
380 while ((sync_packet_ctx = fr_dlist_next(&sync->pending, sync_packet_ctx))) {
381 if (sync_packet_ctx->type != SYNC_PACKET_TYPE_CHANGE) break;
382 if (sync_packet_ctx->status != SYNC_PACKET_PENDING) continue;
383
384 /*
385 * Retry sending packet. Don't try any more if it fails.
386 */
387 if (ldap_sync_entry_send_network(sync_packet_ctx) < 0) break;
388 }
389
390 /*
391 * We didn't run through the whole list, so there may be other pending
392 * packets - reschedule a retry event.
393 */
394 if (sync_packet_ctx) {
395 (void) fr_timer_in(sync, tl, &sync->retry_ev, sync->inst->retry_interval,
396 false, ldap_sync_retry_event, sync);
397 }
398}
399
406
407/** Enqueue a new entry change packet.
408 *
409 * @param[in] sync notification has arrived for.
410 * @param[in] uuid of the entry (RFC 4533 only).
411 * @param[in] orig_dn original DN of the entry - provided by those directories
412 * implementing persistent search, when an entry is renamed.
413 * @param[in] msg containing the entry.
414 * @param[in] op The type of modification we need to perform to our
415 * representation of the entry.
416 * @return
417 * - 0 on success.
418 * - -1 on failure.
419 */
420int ldap_sync_entry_send(sync_state_t *sync, uint8_t const uuid[SYNC_UUID_LENGTH], struct berval *orig_dn,
421 LDAPMessage *msg, sync_op_t op)
422{
424 fr_pair_list_t *pairs;
425 fr_pair_t *vp;
426 sync_packet_ctx_t *sync_packet_ctx = NULL;
427
428 MEM(sync_packet_ctx = talloc_zero(sync, sync_packet_ctx_t));
429 sync_packet_ctx->sync = sync;
430
431 fr_pair_list_init(&sync_packet_ctx->pairs);
432 pairs = &sync_packet_ctx->pairs;
433
434 if (fr_pair_list_copy(sync_packet_ctx, pairs, &sync->config->sync_pairs) < 0) {
435 error:
436 if (msg) ldap_msgfree(msg);
437 talloc_free(sync_packet_ctx);
438 return -1;
439 }
440
441 pcode = sync_packet_code_table[op];
442
443 fr_pair_list_append_by_da(sync_packet_ctx, vp, pairs, attr_packet_type, (uint32_t)pcode, false);
444 if (!vp) goto error;
445
446 fr_pair_list_append_by_da(sync_packet_ctx, vp, pairs, attr_ldap_sync_packet_id, (uint32_t)sync->sync_no, false);
447 if (!vp) goto error;
448
449 /*
450 * Add the UUID if provided
451 */
452 if (uuid) {
454 uuid, SYNC_UUID_LENGTH, true);
455 if (!vp) goto error;
456 }
457
458 /*
459 * Add the original DN if provided
460 */
461 if (orig_dn && (orig_dn->bv_len > 0)) {
463 orig_dn->bv_val, orig_dn->bv_len, true);
464 if (!vp) goto error;
465 }
466
467 /*
468 * Add the entry DN if there is an LDAP message to read
469 */
470 if (msg) {
471 char *entry_dn = ldap_get_dn(sync->conn->handle, msg);
472 map_t const *map = NULL;
473 struct berval **values;
474 int count, i;
475
477 entry_dn, strlen(entry_dn), true);
478 if (!vp) goto error;
479
480 ldap_memfree(entry_dn);
481
482 /*
483 * Map LDAP returned attributes to pairs as per update map
484 */
485 while ((map = map_list_next(&sync->config->entry_map, map))) {
486 values = ldap_get_values_len(fr_ldap_handle_thread_local(), msg, map->rhs->name);
487 if (!values) goto next;
488
489 count = ldap_count_values_len(values);
490
491 for (i = 0; i < count; i++) {
492 if (values[i]->bv_len == 0) continue;
493
494 if (pair_append_by_tmpl_parent(sync_packet_ctx, &vp, pairs, map->lhs, true) < 0) break;
495 if (fr_value_box_from_str(vp, &vp->data, vp->vp_type, NULL, values[i]->bv_val,
496 values[i]->bv_len, NULL) < 0) {
497 fr_pair_remove(pairs, vp);
499 }
500
501 /* Only += operator adds multiple values */
502 if (map->op != T_OP_ADD_EQ) break;
503 }
504 next:
505 ldap_value_free_len(values);
506 }
507 }
508
509 if (fr_dlist_insert_tail(&sync->pending, sync_packet_ctx) < 0) goto error;
510
511 ldap_msgfree(msg);
512
513 /*
514 * Send the packet and if it fails to send add a retry event
515 */
516 if ((ldap_sync_entry_send_network(sync_packet_ctx) < 0) &&
517 (fr_timer_in(sync, sync->conn->conn->el->tl, &sync->retry_ev,
518 sync->inst->retry_interval, false, ldap_sync_retry_event, sync) < 0)) {
519 PERROR("Inserting LDAP sync retry timer failed");
520 }
521
522 return 0;
523}
524
526 UNUSED connection_state_t state, void *uctx);
527
529 UNUSED connection_state_t state, void *uctx);
530
531/** Attempt to (re)initialise a connection
532 *
533 * Performs complete re-initialization of a connection. Called during socket_open
534 * to create the initial connection and again any time we need to reopen the connection.
535 *
536 * @param[in] tl the event list managing listen event.
537 * @param[in] now current time.
538 * @param[in] user_ctx Listener.
539 */
540static void proto_ldap_connection_init(fr_timer_list_t *tl, UNUSED fr_time_t now, void *user_ctx)
541{
542 fr_listen_t *listen = talloc_get_type_abort(user_ctx, fr_listen_t);
543 proto_ldap_sync_ldap_thread_t *thread = talloc_get_type_abort(listen->thread_instance, proto_ldap_sync_ldap_thread_t);
545
546 if (thread->conn) talloc_free(thread->conn);
547
548 /*
549 * Allocate an outbound LDAP connection
550 */
551 thread->conn = fr_ldap_connection_state_alloc(thread, thread->el, &inst->handle_config, "ldap_sync");
552
553 if (!thread->conn) {
554 PERROR("Failed (re)initialising connection, will retry in %pV seconds",
555 fr_box_time_delta(inst->handle_config.reconnection_delay));
556
557 if (fr_timer_in(thread, tl, &thread->conn_retry_ev,
558 inst->handle_config.reconnection_delay,
559 false, proto_ldap_connection_init, listen) < 0) {
560 FATAL("Failed inserting event: %s", fr_strerror());
561 }
562 }
563
564 /*
565 * Add watch functions on the LDAP connection
566 */
568 _proto_ldap_socket_init, true, thread);
569
572
573 /*
574 * Signal the connection to start
575 */
577
578 return;
579}
580
581/** Child listener mod_close
582 *
583 * Ensures the LDAP connection is signalled to close gracefully when
584 * the listener is closed.
585 */
587{
589
591 return 0;
592}
593
594/** LDAP sync mod_read for child listener
595 *
596 * Called when there is data to read on the LDAP connection
597 *
598 * Actual packets are created by the various callbacks since a single LDAP
599 * message can result in multiple packets to process e.g.:
600 *
601 * - Sync Info Message with syncInfoValue of syncIdSet can reference
602 * multiple directory entries.
603 * - Various sync related messages can include a new cookie in
604 * addition to their other data.
605 */
607 UNUSED size_t buffer_len, UNUSED size_t *leftover)
608{
610 fr_ldap_connection_t *conn = talloc_get_type_abort(thread->conn->h, fr_ldap_connection_t);
611 struct timeval poll = { 1, 0 };
612 LDAPMessage *msg = NULL;
613 int ret = 0;
614 fr_ldap_rcode_t rcode;
615 sync_state_t *sync = NULL;
616 fr_rb_tree_t *tree;
617 int type, msgid;
618 LDAPControl **ctrls = NULL;
619 sync_msg_t callback = NULL;
620
621 fr_assert(conn);
622
623 /*
624 * If there are already too many outstanding requests just return.
625 * This will (potentially) cause the TCP buffer to fill and push the
626 * backpressure back to the LDAP server.
627 */
628 if (fr_network_listen_outstanding(thread->nr, li) >= thread->inst->max_outstanding) return 0;
629
630 tree = talloc_get_type_abort(conn->uctx, fr_rb_tree_t);
631
632 /*
633 * Pull the next outstanding message from this connection.
634 * We process one message at a time so that the message can be
635 * passed to the worker, and freed once the request has been
636 * handled.
637 */
638 ret = ldap_result(conn->handle, LDAP_RES_ANY, LDAP_MSG_ONE, &poll, &msg);
639
640 switch (ret) {
641 case 0: /*
642 * Timeout - this has been observed if changes are being
643 * processed slowly, the TCP receive buffer fills and
644 * the LDAP directory pauses sending data for a period.
645 * Then all pending changes are processed and the receive buffer
646 * is emptied.
647 * The situation resolves when the directory starts sending
648 * data again.
649 */
650 return 0;
651
652 case -1:
653 rcode = fr_ldap_error_check(NULL, conn, NULL, NULL);
654 if (rcode == LDAP_PROC_BAD_CONN) return -2;
655 return -1;
656
657 default:
658 break;
659 }
660
661 /*
662 * De-multiplex based on msgid
663 */
664 if (!msg) return 0;
665
666 msgid = ldap_msgid(msg);
667 type = ldap_msgtype(msg);
668
669 ret = 0;
670 if (msgid == 0) {
671 WARN("Ignoring unsolicited %s message",
673 free_msg:
674 if (ctrls) ldap_controls_free(ctrls);
675 ldap_msgfree(msg);
676 return ret;
677 }
678
679 sync = fr_rb_find(tree, &(sync_state_t){.msgid = msgid});
680 if (!sync) {
681 WARN("Ignoring msgid %i, doesn't match any outstanding syncs", msgid);
682 goto free_msg;
683 }
684
685 /*
686 * Check for errors contained within the message.
687 * This has to be per message, as multiple syncs
688 * are multiplexed together on one connection.
689 */
690 switch (fr_ldap_error_check(&ctrls, conn, msg, sync->config->base_dn)) {
692 break;
693
694 /*
695 * The e-syncRefresRequired result code is the server informing us that
696 * the query needs to be restarted for a new refresh phase to run.
697 * It is sent as the result code for a SearchResultsDone message.
698 */
700 if (type != LDAP_RES_SEARCH_RESULT) {
701 PERROR("e-syncRefreshRequired result code received on wrong message type");
702 ret = -1;
703 goto free_msg;
704 }
705
706 DEBUG2("LDAP Server returned e-syncRefreshRequired");
707 if (sync->config->refresh) {
708 return sync->config->refresh(sync, msg, ctrls);
709 }
710 goto free_msg;
711
712 /*
713 * Don't think this should happen... but libldap
714 * is wonky sometimes...
715 */
717 PERROR("Connection unusable");
718 ret = -2;
719 goto free_msg;
720
721 default:
722 PERROR("Sync error");
723 ret = -1;
724 goto free_msg;
725 }
726
727 DEBUG3("Got %s message for sync (msgid %i)",
729
730 switch (type) {
731 case LDAP_RES_SEARCH_REFERENCE:
732 case LDAP_RES_SEARCH_ENTRY:
733 callback = sync->config->entry;
734 break;
735
736 case LDAP_RES_INTERMEDIATE:
737 callback = sync->config->intermediate;
738 break;
739
740 default:
741 WARN("Ignoring unexpected message type (%i)", type);
742 ret = 0;
743 goto free_msg;
744 }
745
746 if (callback) {
747 ret = callback(sync, msg, ctrls);
748 if (ret < 0) PERROR("Sync callback error");
749 } else {
750 /*
751 * Callbacks are responsible for freeing the msg
752 * so if there is no callback, free it.
753 */
754 ldap_msgfree(msg);
755 }
756
757 ldap_controls_free(ctrls);
758
759 return ret;
760}
761
762/** Send a fake packet to run the "load Cookie" section
763 *
764 * @param ctx Context to allocate temporary pairs in.
765 * @param inst LDAP sync configuration.
766 * @param sync_no Id of the sync whose.
767 * @param thread Thread specific LDAP sync data.
768 * @return
769 * - 0 on success
770 * - -1 on failure
771 */
772static int proto_ldap_cookie_load_send(TALLOC_CTX *ctx, proto_ldap_sync_ldap_t const *inst, size_t sync_no,
774 size_t j, len;
775 sync_config_t *config = inst->parent->sync_config[sync_no];
776 fr_pair_list_t pairs;
777 fr_pair_t *vp;
778 fr_dbuff_t *dbuff;
779 fr_ldap_connection_t *ldap_conn = thread->conn->h;
780
781 fr_pair_list_init(&pairs);
782 if (unlikely(fr_pair_list_copy(ctx, &pairs, &config->sync_pairs) < 0)) return -1;
783
784 /*
785 * Ensure we have access to the thread instance
786 * in for the demux callbacks
787 */
788 inst->parent->sync_config[sync_no]->user_ctx = thread;
789
790 /*
791 * Assess the namingContext which applies to this sync
792 */
793 for (j = 0; j < talloc_array_length(ldap_conn->directory->naming_contexts); j++) {
794 len = strlen(ldap_conn->directory->naming_contexts[j]);
795 if (strlen(config->base_dn) < len) continue;
796
797 if (strncasecmp(&config->base_dn[strlen(config->base_dn)-len],
798 ldap_conn->directory->naming_contexts[j],
799 strlen(ldap_conn->directory->naming_contexts[j])) == 0) {
800 config->root_dn = ldap_conn->directory->naming_contexts[j];
801 break;
802 }
803 }
804
805 /*
806 * Set up callbacks based on directory type.
807 */
808 switch (ldap_conn->directory->sync_type) {
812 config->intermediate = rfc4533_sync_intermediate;
814 break;
815
819 break;
820
824 break;
825
826 default:
827 fr_assert(0);
828 }
829
832 if (!vp) return -1;
833 fr_pair_list_append_by_da(ctx, vp, &pairs, attr_ldap_sync_packet_id, (uint32_t)sync_no, false);
834 if (!vp) return -1;
835
836 if (config->root_dn) {
838 config->root_dn, strlen(config->root_dn), false);
839 if (!vp) return -1;
840 }
841
842 FR_DBUFF_TALLOC_THREAD_LOCAL(&dbuff, 1024, 4096);
843
844 if (fr_internal_encode_list(dbuff, &pairs, &encode_ctx) < 0) return -1;
845
846 if (fr_network_listen_send_packet(thread->nr, thread->li, thread->li,
847 fr_dbuff_buff(dbuff), fr_dbuff_used(dbuff),
848 fr_time(), NULL) < 0) return -1;
849 fr_pair_list_free(&pairs);
850 return 0;
851}
852
853/** Timer event to retry running "load Cookie" on failures
854 *
855 */
857{
858 proto_ldap_cookie_load_retry_ctx *retry_ctx = talloc_get_type_abort(uctx, proto_ldap_cookie_load_retry_ctx);
859
860 DEBUG2("Retrying \"load Cookie\" for sync no %ld", retry_ctx->sync_no);
861 if (proto_ldap_cookie_load_send(retry_ctx, retry_ctx->inst, retry_ctx->sync_no,
862 retry_ctx->thread) < 0) {
863 ERROR("Failed retrying \"load Cookie\". Will try again in %pV seconds",
865 (void) fr_timer_in(retry_ctx->thread->conn->h, tl,
866 &retry_ctx->inst->parent->sync_config[retry_ctx->sync_no]->ev,
868 false, proto_ldap_cookie_load_retry, retry_ctx);
869 return;
870 }
871 talloc_free(retry_ctx);
872}
873
874/** LDAP sync mod_write for child listener
875 *
876 * Handle any returned data after the worker has processed the packet and,
877 * for packets where tracking structures were used, ensure they are freed.
878 */
879static ssize_t proto_ldap_child_mod_write(fr_listen_t *li, void *packet_ctx, UNUSED fr_time_t request_time,
880 uint8_t *buffer, size_t buffer_len, UNUSED size_t written)
881{
884 fr_dbuff_t dbuff;
886 uint32_t packet_id;
887 fr_pair_list_t tmp;
888 fr_pair_t *vp = NULL;
889 ssize_t ret;
890 TALLOC_CTX *local;
891 sync_packet_ctx_t *sync_packet_ctx = NULL;
892
893 local = talloc_new(NULL);
894 fr_dbuff_init(&dbuff, buffer, buffer_len);
895
896 if (packet_ctx) sync_packet_ctx = talloc_get_type_abort(packet_ctx, sync_packet_ctx_t);
897
898 /*
899 * Extract returned attributes into a temporary list
900 */
901 fr_pair_list_init(&tmp);
902
903 ret = fr_internal_decode_list_dbuff(local, &tmp, fr_dict_root(dict_ldap_sync), &dbuff, NULL);
904 if (ret < 0) goto finish;
905
906 /*
907 * There should always be a packet ID and code
908 */
910 fr_assert(vp);
911 packet_id = vp->vp_uint32;
912
914 fr_assert(vp);
915 pcode = vp->vp_uint32;
916
917 switch (pcode) {
919 {
920 uint8_t *cookie = NULL;
921
922 /*
923 * If the received packet ID is greater than the number of syncs
924 * we have then something very bad has happened
925 */
926 fr_assert (packet_id <= talloc_array_length(inst->parent->sync_config));
927
928 /*
929 * Look for the returned cookie.
930 */
932 if (vp) cookie = talloc_memdup(inst, vp->vp_octets, vp->vp_length);
933
934 if (inst->parent->sync_config[packet_id]->init(thread->conn->h, packet_id, inst->parent, cookie) < 0) {
935 ret = -1;
936 goto finish;
937 }
938 }
939 break;
940
942 break;
943
945 {
946 sync_config_t const *sync_config;
947
948 if (!sync_packet_ctx || !sync_packet_ctx->refresh) break;
949
950 /*
951 * Abandon the old sync and start a new one with the relevant cookie.
952 */
953 sync_config = sync_packet_ctx->sync->config;
954 DEBUG3("Restarting sync with base %s", sync_config->base_dn);
955 talloc_free(sync_packet_ctx->sync);
956 if (inst->parent->sync_config[packet_id]->init(thread->conn->h, packet_id, inst->parent,
957 sync_packet_ctx->cookie) < 0) {
958 ret = -1;
959 goto finish;
960 }
961 }
962 break;
963
965 {
967
968 ERROR("Load Cookie failed for sync %d, retrying in %pV seconds", packet_id,
969 fr_box_time_delta(inst->handle_config.reconnection_delay));
970
971 MEM(retry_ctx = talloc(thread, proto_ldap_cookie_load_retry_ctx));
973 .thread = thread,
974 .inst = inst,
975 .sync_no = packet_id,
976 };
977
978 (void) fr_timer_in(thread->conn->h, thread->el->tl, &inst->parent->sync_config[packet_id]->ev,
979 inst->handle_config.reconnection_delay,
980 false, proto_ldap_cookie_load_retry, retry_ctx);
981 }
982 break;
983
984 default:
985 ERROR("Invalid packet type returned %d", pcode);
986 break;
987 }
988
989 if (sync_packet_ctx) {
990 sync_state_t *sync = sync_packet_ctx->sync;
992 proto_ldap_sync_t *ldap_sync = inst->parent;
993
994 sync_packet_ctx->status = SYNC_PACKET_COMPLETE;
995
996 /*
997 * A cookie has been stored, reset the counter of changes
998 */
999 if (sync_packet_ctx->type == SYNC_PACKET_TYPE_COOKIE) sync->changes_since_cookie = 0;
1000
1001 /*
1002 * Pop any processed updates from the head of the list
1003 */
1004 while ((pc = fr_dlist_head(&sync->pending))) {
1005 /*
1006 * If the head entry in the list is a pending cookie but we have
1007 * not processed enough entries and there are more pending
1008 * cookies, mark this one as processed.
1009 */
1010 if ((pc->type == SYNC_PACKET_TYPE_COOKIE) && (pc->status == SYNC_PACKET_PENDING) &&
1011 (sync->changes_since_cookie < ldap_sync->cookie_changes) &&
1012 (sync->pending_cookies > 1)) pc->status = SYNC_PACKET_COMPLETE;
1013
1014 if (pc->status != SYNC_PACKET_COMPLETE) break;
1015
1016 /*
1017 * Update counters depending on entry type
1018 */
1019 if (pc->type == SYNC_PACKET_TYPE_COOKIE) {
1020 sync->pending_cookies--;
1021 } else {
1022 sync->changes_since_cookie++;
1023 }
1024 pc = fr_dlist_pop_head(&sync->pending);
1025 talloc_free(pc);
1026 }
1027
1028 /*
1029 * If the head of the list is a cookie which has not yet
1030 * been processed and sufficient changes have been recorded
1031 * send the cookie.
1032 */
1033 if (pc && (pc->type == SYNC_PACKET_TYPE_COOKIE) && (pc->status == SYNC_PACKET_PENDING) &&
1035 }
1036
1037finish:
1038 fr_pair_list_free(&tmp);
1039 talloc_free(local);
1040
1041 return ret;
1042}
1043
1044/** Callback for socket errors when running initial root query
1045 */
1047 UNUSED int fd_errno, void *uctx)
1048{
1049 proto_ldap_dir_ctx *dir_ctx = talloc_get_type_abort(uctx, proto_ldap_dir_ctx);
1050 fr_ldap_connection_t *ldap_conn = talloc_get_type_abort(dir_ctx->conn->h, fr_ldap_connection_t);
1051
1052 talloc_free(dir_ctx);
1053 fr_ldap_state_error(ldap_conn);
1054}
1055
1056/** Callback to process results of initial root query, identifying directory type
1057 */
1058static void _proto_ldap_socket_open_read(fr_event_list_t *el, int fd, UNUSED int flags, void *uctx)
1059{
1060 proto_ldap_dir_ctx *dir_ctx = talloc_get_type_abort(uctx, proto_ldap_dir_ctx);
1061 fr_ldap_connection_t *ldap_conn = talloc_get_type_abort(dir_ctx->conn->h, fr_ldap_connection_t);
1064 proto_ldap_sync_ldap_thread_t *thread = talloc_get_type_abort(dir_ctx->main_listen->thread_instance,
1066 fr_ldap_rcode_t status;
1067 LDAPMessage *result;
1068
1069 size_t i;
1070 TALLOC_CTX *local = NULL;
1071
1072 /*
1073 * Fetch the result. Setting the timeout to 0 here means use
1074 * res_timeout from the configuration.
1075 */
1076 status = fr_ldap_result(&result, NULL, ldap_conn, dir_ctx->msgid, LDAP_MSG_ALL, NULL, fr_time_delta_from_msec(0));
1077 if (status != LDAP_PROC_SUCCESS) {
1078 PERROR("Failed querying for directory type");
1079 if (result) ldap_msgfree(result);
1080 error:
1081 talloc_free(dir_ctx);
1082 if (local) talloc_free(local);
1084 return;
1085 }
1086
1087 fr_ldap_directory_result_parse(ldap_conn->directory, ldap_conn->handle, result, ldap_conn->config->name);
1088 ldap_msgfree(result);
1089
1090 /*
1091 * If the server does not support any of the relevant controls, we just
1092 * tidy up - no point in signalling to reconnect.
1093 */
1094 if (ldap_conn->directory->sync_type == FR_LDAP_SYNC_NONE) {
1095 ERROR("LDAP sync configured for directory which does not support any suitable control");
1096 talloc_free(dir_ctx);
1097 connection_signal_halt(ldap_conn->conn);
1098 return;
1099 }
1100
1101 /*
1102 * We've done all the preparation work on the LDAP connection, now
1103 * use normal network event listeners.
1104 */
1106 if (unlikely(fr_network_listen_add(thread->nr, thread->li) < 0)) {
1107 PERROR("Failed adding listener");
1108 goto error; /* retry? */
1109 }
1110
1111 DEBUG2("Starting sync(s)");
1112
1113 local = talloc_new(NULL);
1114
1115 /*
1116 * Sync operations start by sending a fake packet to run
1117 * the load Cookie section in order to retrieve the cookie
1118 */
1119 for (i = 0; i < talloc_array_length(inst->parent->sync_config); i++) {
1120 if (proto_ldap_cookie_load_send(local, inst, i, thread) < 0) goto error;
1121 }
1122
1123 talloc_free(dir_ctx);
1124 talloc_free(local);
1125}
1126
1127/** Allocate a child listener
1128 *
1129 * Called as a watch function when the LDAP connection enters the INIT state
1130 */
1132 UNUSED connection_state_t state, void *uctx)
1133{
1134 proto_ldap_sync_ldap_thread_t *thread = talloc_get_type_abort(uctx, proto_ldap_sync_ldap_thread_t);
1135 fr_listen_t *li;
1136
1137 MEM(li = talloc_zero(conn, fr_listen_t));
1138
1139 thread->li = li;
1140 li->thread_instance = thread;
1141
1143 li->name = li->app_io->common.name;
1145
1146 /*
1147 * Use the app from the parent listener to access
1148 * the encoder / decoder functions
1149 */
1150 li->app = thread->parent->app;
1151 li->app_instance = thread->parent->app_instance;
1152 li->server_cs = thread->inst->parent->server_cs;
1153}
1154
1155/** Callback for closure of LDAP connection
1156 *
1157 * Schedules re-start of the connection if appropriate
1158 */
1160 UNUSED connection_state_t state, void *uctx)
1161{
1162 fr_listen_t *listen = talloc_get_type_abort(uctx, fr_listen_t);
1163 proto_ldap_sync_ldap_thread_t *thread = talloc_get_type_abort(listen->thread_instance, proto_ldap_sync_ldap_thread_t);
1164 proto_ldap_sync_ldap_t const *inst = thread->inst;
1165
1166 if (fr_event_loop_exiting(thread->el)) return;
1167
1168 if (prev == CONNECTION_STATE_CONNECTED) {
1169 ERROR("LDAP connection closed. Scheduling restart in %pVs",
1170 fr_box_time_delta(inst->handle_config.reconnection_delay));
1171 if (fr_timer_in(thread, thread->el->tl, &thread->conn_retry_ev,
1172 inst->handle_config.reconnection_delay,
1173 false, proto_ldap_connection_init, listen) < 0) {
1174 FATAL("Failed inserting event: %s", fr_strerror());
1175 }
1176 }
1177}
1178
1179/** Query an LDAP server to establish its type
1180 *
1181 * Called as a watch function once the LDAP connection enters the CONNECTED state
1182 *
1183 * There are three different forms of LDAP sync/persistent search - so we need
1184 * to know what we're dealing with, and whether the relevant options have been enabled.
1185 */
1187 UNUSED connection_state_t state, void *uctx)
1188{
1189 proto_ldap_sync_ldap_thread_t *thread = talloc_get_type_abort(uctx, proto_ldap_sync_ldap_thread_t);
1190 fr_listen_t *listen = talloc_get_type_abort(thread->parent, fr_listen_t);
1193 fr_ldap_connection_t *ldap_conn = talloc_get_type_abort(conn->h, fr_ldap_connection_t);
1194
1195 proto_ldap_dir_ctx *dir_ctx;
1196
1197 if (ldap_conn->fd < 0) {
1198 connection_failed:
1199 if (fr_timer_in(thread, thread->el->tl, &thread->conn_retry_ev,
1200 inst->handle_config.reconnection_delay,
1201 false, proto_ldap_connection_init, listen) < 0) {
1202 FATAL("Failed inserting event: %s", fr_strerror());
1203 }
1204 return;
1205 }
1206
1207 thread->li->fd = ldap_conn->fd;
1208
1209 MEM(dir_ctx = talloc_zero(inst, proto_ldap_dir_ctx));
1210 if (!dir_ctx) goto connection_failed;
1211
1212 dir_ctx->main_listen = listen;
1213 dir_ctx->conn = conn;
1214 dir_ctx->child_listen = thread->li;
1215
1216#ifdef SO_RCVBUF
1217 if (inst->recv_buff_is_set) {
1218 int opt;
1219
1220 opt = inst->recv_buff;
1221 if (setsockopt(ldap_conn->fd, SOL_SOCKET, SO_RCVBUF, &opt, sizeof(int)) < 0) {
1222 WARN("Failed setting 'recv_buff': %s", fr_syserror(errno));
1223 }
1224 }
1225#endif
1226
1227 /*
1228 * Set the callback which will handle the results of this query
1229 */
1230 if (fr_event_fd_insert(conn, NULL, conn->el, ldap_conn->fd,
1232 NULL,
1234 dir_ctx) < 0) {
1235 goto connection_failed;
1236 }
1237
1238 /*
1239 * Allocate the directory structure and send the query
1240 */
1241 dir_ctx->msgid = fr_ldap_conn_directory_alloc_async(ldap_conn);
1242
1243 if (dir_ctx->msgid < 0) {
1244 talloc_free(dir_ctx);
1245 goto connection_failed;
1246 }
1247
1248 /*
1249 * Add a watch to catch closed LDAP connections
1250 */
1252 _proto_ldap_socket_closed, true, listen);
1253}
1254
1255/** Callback triggered when parent listener app_io has its event list set
1256 *
1257 * Initiates the actual outbound LDAP connection
1258 *
1259 * @param[in] li The parent listener.
1260 * @param[in] el Event list for this listener.
1261 * @param[in] nr Network handler.
1262 */
1264{
1267
1268 /*
1269 * Set up thread data
1270 */
1271 thread->name = inst->handle_config.name;
1272 thread->parent = li;
1273 thread->el = el;
1274 thread->nr = nr;
1275 thread->inst = inst;
1276
1277 /*
1278 * Initialise the connection
1279 */
1281}
1282
1283static int mod_instantiate(module_inst_ctx_t const *mctx)
1284{
1285 proto_ldap_sync_ldap_t *inst = talloc_get_type_abort(mctx->mi->data, proto_ldap_sync_ldap_t);
1286 CONF_SECTION *conf = mctx->mi->conf;
1287 char const *server;
1288
1289 /*
1290 * Verify that the LDAP server configuration is valid, either
1291 * distinct server and port or an LDAP url.
1292 */
1293 fr_assert(inst->server);
1294
1295 inst->parent = talloc_get_type_abort(mctx->mi->parent->data, proto_ldap_sync_t);
1296 inst->cs = conf;
1297
1298 if (inst->recv_buff_is_set) {
1299 FR_INTEGER_BOUND_CHECK("recv_buff", inst->recv_buff, >=, 32);
1300 FR_INTEGER_BOUND_CHECK("recv_buff", inst->recv_buff, <=, INT_MAX);
1301 }
1302
1303 server = inst->server;
1304 inst->handle_config.server = talloc_strdup(inst, "");
1305
1306 if (ldap_is_ldap_url(server)) {
1307 if (fr_ldap_server_url_check(&inst->handle_config, server, conf) < 0) return -1;
1308 } else {
1309 if (fr_ldap_server_config_check(&inst->handle_config, server, conf) < 0) return -1;
1310 }
1311
1312 inst->handle_config.server[talloc_array_length(inst->handle_config.server) - 1] = '\0';
1313
1314 inst->handle_config.name = talloc_typed_asprintf(inst, "proto_ldap_conn (%s)",
1316
1317 return 0;
1318}
1319
1321 .common = {
1322 .magic = MODULE_MAGIC_INIT,
1323 .name = "ldap_sync_child"
1324 },
1328
1329 .default_message_size = 4096,
1330 .track_duplicates = false,
1331};
1332
1334 .common = {
1335 .magic = MODULE_MAGIC_INIT,
1336 .name = "ldap_sync_ldap",
1338 .inst_size = sizeof(proto_ldap_sync_ldap_t),
1339 .thread_inst_size = sizeof(proto_ldap_sync_ldap_thread_t),
1340 .instantiate = mod_instantiate
1341 },
1342
1343 .default_message_size = 4096,
1344 .track_duplicates = false,
1345
1346 .event_list_set = mod_event_list_set,
1347};
int active_directory_sync_state_init(fr_ldap_connection_t *conn, size_t sync_no, proto_ldap_sync_t const *inst, UNUSED uint8_t const *cookie)
Allocate a sync state structure and issue the search.
int active_directory_sync_search_entry(sync_state_t *sync, LDAPMessage *msg, UNUSED LDAPControl **ctrls)
Handle a LDAP_RES_SEARCH_ENTRY (SearchResultEntry) response.
static int const char char buffer[256]
Definition acutest.h:576
log_entry msg
Definition acutest.h:794
module_t common
Common fields to all loadable modules.
Definition app_io.h:34
size_t default_message_size
Usually maximum message size.
Definition app_io.h:39
Public structure describing an I/O path for a protocol.
Definition app_io.h:33
#define USES_APPLE_DEPRECATED_API
Definition build.h:472
#define L(_str)
Helper for initialising arrays of string literals.
Definition build.h:209
#define CMP(_a, _b)
Same as CMP_PREFER_SMALLER use when you don't really care about ordering, you just want an ordering.
Definition build.h:112
#define unlikely(_x)
Definition build.h:383
#define UNUSED
Definition build.h:317
#define NUM_ELEMENTS(_t)
Definition build.h:339
#define CONF_PARSER_TERMINATOR
Definition cf_parse.h:658
#define FR_INTEGER_BOUND_CHECK(_name, _var, _op, _bound)
Definition cf_parse.h:518
#define FR_CONF_OFFSET(_name, _struct, _field)
conf_parser_t which parses a single CONF_PAIR, writing the result to a field in a struct
Definition cf_parse.h:284
#define FR_CONF_OFFSET_IS_SET(_name, _type, _flags, _struct, _field)
conf_parser_t which parses a single CONF_PAIR, writing the result to a field in a struct,...
Definition cf_parse.h:298
#define FR_CONF_OFFSET_FLAGS(_name, _flags, _struct, _field)
conf_parser_t which parses a single CONF_PAIR, writing the result to a field in a struct
Definition cf_parse.h:272
@ CONF_FLAG_REQUIRED
Error out if no matching CONF_PAIR is found, and no dflt value is set.
Definition cf_parse.h:434
Defines a CONF_PAIR to C data type mapping.
Definition cf_parse.h:595
A section grouping multiple CONF_PAIR.
Definition cf_priv.h:101
CONF_SECTION * cf_item_to_section(CONF_ITEM const *ci)
Cast a CONF_ITEM to a CONF_SECTION.
Definition cf_util.c:684
char const * cf_section_name(CONF_SECTION const *cs)
Return name2 if set, else name1.
Definition cf_util.c:1197
#define cf_parent(_cf)
Definition cf_util.h:101
static int max_outstanding
connection_state_t
Definition connection.h:45
@ CONNECTION_STATE_CLOSED
Connection has been closed.
Definition connection.h:55
@ CONNECTION_STATE_CONNECTED
File descriptor is open (ready for writing).
Definition connection.h:52
@ CONNECTION_STATE_INIT
Init state, sets up connection.
Definition connection.h:49
@ CONNECTION_FAILED
Connection is being reconnected because it failed.
Definition connection.h:84
#define fr_dbuff_used(_dbuff_or_marker)
Return the number of bytes remaining between the start of the dbuff or marker and the current positio...
Definition dbuff.h:767
#define fr_dbuff_init(_out, _start, _len_or_end)
Initialise an dbuff for encoding or decoding.
Definition dbuff.h:354
#define fr_dbuff_buff(_dbuff_or_marker)
Return the underlying buffer in a dbuff or one of marker.
Definition dbuff.h:882
#define FR_DBUFF_TALLOC_THREAD_LOCAL(_out, _init, _max)
Create a function local and thread local extensible dbuff.
Definition dbuff.h:556
#define MEM(x)
Definition debug.h:36
#define ERROR(fmt,...)
Definition dhcpclient.c:41
fr_dict_attr_t const * fr_dict_root(fr_dict_t const *dict)
Return the root attribute of a dictionary.
Definition dict_util.c:2407
fr_dict_attr_t const ** out
Where to write a pointer to the resolved fr_dict_attr_t.
Definition dict.h:272
fr_dict_t const ** out
Where to write a pointer to the loaded/resolved fr_dict_t.
Definition dict.h:285
Specifies an attribute which must be present for the module to function.
Definition dict.h:271
Specifies a dictionary which must be loaded/loadable for the module to function.
Definition dict.h:284
#define MODULE_MAGIC_INIT
Stop people using different module/library/server versions together.
Definition dl_module.h:63
static void * fr_dlist_head(fr_dlist_head_t const *list_head)
Return the HEAD item of a list or NULL if the list is empty.
Definition dlist.h:486
static void * fr_dlist_pop_head(fr_dlist_head_t *list_head)
Remove the head item in a list.
Definition dlist.h:672
static int fr_dlist_insert_tail(fr_dlist_head_t *list_head, void *ptr)
Insert an item into the tail of a list.
Definition dlist.h:378
#define fr_dlist_talloc_init(_head, _type, _field)
Initialise the head structure of a doubly linked list.
Definition dlist.h:275
static void * fr_dlist_next(fr_dlist_head_t const *list_head, void const *ptr)
Get the next item in a list.
Definition dlist.h:555
#define fr_event_fd_insert(...)
Definition event.h:248
@ FR_EVENT_FILTER_IO
Combined filter for read/write functions/.
Definition event.h:84
#define GLOBAL_LIB_TERMINATOR
Definition global_lib.h:51
Structure to define how to initialise libraries with global configuration.
Definition global_lib.h:38
bool allow_name_only
Allow name only pairs.
Definition internal.h:36
char const * name
printable name for this socket - set by open
Definition listen.h:29
void const * app_instance
Definition listen.h:38
size_t default_message_size
copied from app_io, but may be changed
Definition listen.h:51
fr_app_t const * app
Definition listen.h:37
void const * app_io_instance
I/O path configuration context.
Definition listen.h:32
CONF_SECTION * server_cs
CONF_SECTION of the server.
Definition listen.h:40
void * thread_instance
thread / socket context
Definition listen.h:33
int fd
file descriptor for this socket - set by open
Definition listen.h:28
fr_app_io_t const * app_io
I/O path functions.
Definition listen.h:31
size_t fr_network_listen_outstanding(fr_network_t *nr, fr_listen_t *li)
Get the number of outstanding packets.
Definition network.c:811
int fr_network_listen_send_packet(fr_network_t *nr, fr_listen_t *parent, fr_listen_t *li, const uint8_t *buffer, size_t buflen, fr_time_t recv_time, void *packet_ctx)
Send a packet to the worker.
Definition network.c:769
int fr_network_listen_add(fr_network_t *nr, fr_listen_t *li)
Add a fr_listen_t to a network.
Definition network.c:236
connection_t * fr_ldap_connection_state_alloc(TALLOC_CTX *ctx, fr_event_list_t *el, fr_ldap_config_t const *config, char const *log_prefix)
Alloc a self re-establishing connection to an LDAP server.
Definition connection.c:386
int fr_ldap_conn_directory_alloc_async(fr_ldap_connection_t *ldap_conn)
Async extract useful information from the rootDSE of the LDAP server.
Definition directory.c:287
fr_ldap_sync_type_t sync_type
What kind of LDAP sync this directory supports.
Definition base.h:211
LDAP * handle
libldap handle.
Definition base.h:333
fr_ldap_directory_t * directory
The type of directory we're connected to.
Definition base.h:342
int fd
File descriptor for this connection.
Definition base.h:349
void fr_ldap_state_error(fr_ldap_connection_t *c)
Signal that there's been an error on the connection.
Definition state.c:134
int fr_ldap_server_url_check(fr_ldap_config_t *handle_config, char const *server, CONF_SECTION const *cs)
Check an LDAP server entry in URL format is valid.
Definition util.c:656
fr_ldap_config_t const * config
rlm_ldap connection configuration.
Definition base.h:344
int fr_ldap_server_config_check(fr_ldap_config_t *handle_config, char const *server, CONF_SECTION *cs)
Check an LDAP server config in server:port format is valid.
Definition util.c:752
char const * name
Name of the module that created this connection.
Definition base.h:222
fr_time_delta_t reconnection_delay
How long to wait before attempting to reconnect.
Definition base.h:311
int fr_ldap_directory_result_parse(fr_ldap_directory_t *directory, LDAP *handle, LDAPMessage *result, char const *name)
Definition directory.c:52
void * uctx
User data associated with the handle.
Definition base.h:354
@ FR_LDAP_SYNC_NONE
No support for LDAP sync.
Definition base.h:158
@ FR_LDAP_SYNC_ACTIVE_DIRECTORY
Directory supports AD style persistent search.
Definition base.h:160
@ FR_LDAP_SYNC_PERSISTENT_SEARCH
Directory supports persistent search.
Definition base.h:161
@ FR_LDAP_SYNC_RFC4533
Directory supports RFC 4533.
Definition base.h:159
connection_t * conn
Connection state handle.
Definition base.h:345
char const ** naming_contexts
Databases served by this directory.
Definition base.h:213
fr_ldap_rcode_t
Codes returned by fr_ldap internal functions.
Definition base.h:582
@ LDAP_PROC_SUCCESS
Operation was successful.
Definition base.h:585
@ LDAP_PROC_BAD_CONN
Transitory error, caller should retry the operation with a new connection.
Definition base.h:589
@ LDAP_PROC_REFRESH_REQUIRED
Don't continue with the current refresh phase, exit, and retry the operation with a NULL cookie.
Definition base.h:604
Tracks the state of a libldap connection handle.
Definition base.h:332
#define FR_LDAP_COMMON_CONF(_conf)
Definition conf.h:19
fr_ldap_rcode_t fr_ldap_error_check(LDAPControl ***ctrls, fr_ldap_connection_t const *conn, LDAPMessage *msg, char const *dn)
Perform basic parsing of multiple types of messages, checking for error conditions.
Definition base.c:232
LDAP * fr_ldap_handle_thread_local(void)
Get a thread local dummy LDAP handle.
Definition base.c:1106
global_lib_autoinst_t fr_libldap_global_config
Definition base.c:134
fr_ldap_rcode_t fr_ldap_result(LDAPMessage **result, LDAPControl ***ctrls, fr_ldap_connection_t const *conn, int msgid, int all, char const *dn, fr_time_delta_t timeout)
Parse response from LDAP server dealing with any errors.
Definition base.c:450
#define PERROR(_fmt,...)
Definition log.h:228
#define FATAL(_fmt,...)
Definition log.h:224
#define DEBUG3(_fmt,...)
Definition log.h:266
fr_time_t fr_event_list_time(fr_event_list_t *el)
Get the current server time according to the event list.
Definition event.c:593
talloc_free(reap)
bool fr_event_loop_exiting(fr_event_list_t *el)
Check to see whether the event loop is in the process of exiting.
Definition event.c:2386
int fr_event_fd_delete(fr_event_list_t *el, int fd, fr_event_filter_t filter)
Remove a file descriptor from the event loop.
Definition event.c:1206
Stores all information relating to an event list.
Definition event.c:380
@ FR_TYPE_STRING
String of printable characters.
@ FR_TYPE_UINT32
32 Bit unsigned integer.
@ FR_TYPE_OCTETS
Raw octets.
unsigned int uint32_t
long int ssize_t
unsigned char uint8_t
int strncasecmp(char *s1, char *s2, int n)
Definition missing.c:36
module_instance_t * mi
Instance of the module being instantiated.
Definition module_ctx.h:51
Temporary structure to hold arguments for instantiation calls.
Definition module_ctx.h:50
int fr_pair_list_copy(TALLOC_CTX *ctx, fr_pair_list_t *to, fr_pair_list_t const *from)
Duplicate a list of pairs.
Definition pair.c:2321
fr_pair_t * fr_pair_find_by_da_nested(fr_pair_list_t const *list, fr_pair_t const *prev, fr_dict_attr_t const *da)
Find a pair with a matching fr_dict_attr_t, by walking the nested fr_dict_attr_t tree.
Definition pair.c:772
fr_pair_t * fr_pair_find_by_da(fr_pair_list_t const *list, fr_pair_t const *prev, fr_dict_attr_t const *da)
Find the first pair with a matching da.
Definition pair.c:695
void fr_pair_list_init(fr_pair_list_t *list)
Initialise a pair list header.
Definition pair.c:46
int persistent_sync_search_entry(sync_state_t *sync, LDAPMessage *msg, LDAPControl **ctrls)
Handle a SearchResultEntry response from Persistent Search LDAP servers.
int persistent_sync_state_init(fr_ldap_connection_t *conn, size_t sync_no, proto_ldap_sync_t const *inst, UNUSED uint8_t const *cookie)
Allocate and initialise sync queries for persistent searches.
static const conf_parser_t config[]
Definition base.c:183
char const * filter
Filter to retrieve only user objects.
CONF_SECTION * server_cs
server CS for this listener.
fr_timer_t * ev
Event for retrying cookie load.
sync_config_t ** sync_config
DNs and filters to monitor.
int(* sync_msg_t)(sync_state_t *sync, LDAPMessage *msg, LDAPControl **ctrls)
Received an LDAP message related to a sync.
sync_op_t
Operations to perform on entries.
@ SYNC_OP_ADD
Entry should be added to our copy.
@ SYNC_OP_MODIFY
Entry should be updated in our copy.
@ SYNC_OP_DELETE
Entry should be deleted from our copy.
@ SYNC_OP_PRESENT
Entry is present and unchanged on the server.
char const * base_dn
DN to search for users under.
sync_msg_t entry
Called when we receive a searchEntry message.
sync_msg_t refresh
Called when we receive a eSyncRefreshRequired code.
CONF_SECTION * cs
Config section where this sync was defined.
sync_msg_t intermediate
Called when we receive a syncIntermediate message.
map_list_t entry_map
How to convert attributes in entries to FreeRADIUS attributes.
fr_pair_list_t sync_pairs
Pairs representing the sync config sent to the worker with each request.
fr_time_delta_t cookie_interval
Interval between storing cookies.
uint32_t cookie_changes
Number of LDAP changes to process between each cookie store operation.
fr_time_delta_t retry_interval
Interval between retrying failed change packets.
void * user_ctx
User ctx to pass to the callbacks.
An instance of a proto_ldap_sync listen section.
Areas of the directory to receive notifications for.
int ldap_sync_cookie_send(sync_packet_ctx_t *sync_packet_ctx)
Enqueue a new cookie store packet.
fr_app_io_t proto_ldap_sync_ldap
static void _proto_ldap_socket_closed(UNUSED connection_t *conn, connection_state_t prev, UNUSED connection_state_t state, void *uctx)
Callback for closure of LDAP connection.
static fr_dict_attr_t const * attr_packet_type
static fr_ldap_sync_packet_code_t const sync_packet_code_table[4]
static int proto_ldap_child_mod_close(fr_listen_t *li)
Child listener mod_close.
static int proto_ldap_cookie_load_send(TALLOC_CTX *ctx, proto_ldap_sync_ldap_t const *inst, size_t sync_no, proto_ldap_sync_ldap_thread_t *thread)
Send a fake packet to run the "load Cookie" section.
global_lib_autoinst_t const * proto_ldap_sync_ldap_lib[]
static fr_dict_attr_t const * attr_ldap_sync_packet_id
static void ldap_sync_retry_event(fr_timer_list_t *tl, UNUSED fr_time_t now, void *uctx)
Event to handle sending of any change packets which failed to send.
static fr_dict_t const * dict_ldap_sync
proto_ldap_sync_ldap_t const * inst
static fr_dict_attr_t const * attr_ldap_sync_entry_dn
int ldap_sync_cookie_store(sync_state_t *sync, bool refresh)
Add a new cookie packet ctx to the pending list.
static int sync_state_free(sync_state_t *sync)
Tell the remote server to stop the sync.
static fr_dict_t const * dict_freeradius
static fr_dict_attr_t const * attr_ldap_sync_base_dn
void ldap_sync_cookie_event(fr_timer_list_t *tl, UNUSED fr_time_t now, void *uctx)
Event to handle storing of cookies on a timed basis.
static fr_dict_attr_t const * attr_ldap_sync_orig_dn
static void mod_event_list_set(fr_listen_t *li, fr_event_list_t *el, void *nr)
Callback triggered when parent listener app_io has its event list set.
fr_app_io_t proto_ldap_sync_child
static conf_parser_t const proto_ldap_sync_ldap_config[]
static void _proto_ldap_socket_open_error(UNUSED fr_event_list_t *el, UNUSED int fd, UNUSED int flags, UNUSED int fd_errno, void *uctx)
Callback for socket errors when running initial root query.
int ldap_sync_entry_send(sync_state_t *sync, uint8_t const uuid[SYNC_UUID_LENGTH], struct berval *orig_dn, LDAPMessage *msg, sync_op_t op)
Enqueue a new entry change packet.
static ssize_t proto_ldap_child_mod_read(fr_listen_t *li, UNUSED void **packet_ctx, UNUSED fr_time_t *recv_time_p, UNUSED uint8_t *buffer, UNUSED size_t buffer_len, UNUSED size_t *leftover)
LDAP sync mod_read for child listener.
size_t sync_op_table_len
fr_table_num_sorted_t const sync_op_table[]
Operations performed on entries.
static fr_dict_attr_t const * attr_ldap_sync_root_dn
static fr_internal_encode_ctx_t encode_ctx
static int ldap_sync_entry_send_network(sync_packet_ctx_t *sync_packet_ctx)
Send a change packet to the workers.
int8_t sync_state_cmp(void const *one, void const *two)
Compare two sync state structures on msgid.
static void proto_ldap_connection_init(fr_timer_list_t *tl, UNUSED fr_time_t now, void *user_ctx)
Attempt to (re)initialise a connection.
static fr_dict_attr_t const * attr_ldap_sync_entry_uuid
static void _proto_ldap_socket_init(connection_t *conn, UNUSED connection_state_t prev, UNUSED connection_state_t state, void *uctx)
Allocate a child listener.
sync_state_t * sync_state_alloc(TALLOC_CTX *ctx, fr_ldap_connection_t *conn, proto_ldap_sync_t const *inst, size_t sync_no, sync_config_t const *config)
Allocate a sync state.
fr_dict_attr_autoload_t proto_ldap_sync_ldap_dict_attr[]
static void proto_ldap_cookie_load_retry(fr_timer_list_t *tl, UNUSED fr_time_t now, void *uctx)
Timer event to retry running "load Cookie" on failures.
static fr_dict_attr_t const * attr_ldap_sync_cookie
proto_ldap_sync_ldap_thread_t * thread
fr_dict_autoload_t proto_ldap_sync_ldap_dict[]
static int mod_instantiate(module_inst_ctx_t const *mctx)
static void _proto_ldap_socket_open_read(fr_event_list_t *el, int fd, UNUSED int flags, void *uctx)
Callback to process results of initial root query, identifying directory type.
static void _proto_ldap_socket_open_connected(connection_t *conn, UNUSED connection_state_t prev, UNUSED connection_state_t state, void *uctx)
Query an LDAP server to establish its type.
static ssize_t proto_ldap_child_mod_write(fr_listen_t *li, void *packet_ctx, UNUSED fr_time_t request_time, uint8_t *buffer, size_t buffer_len, UNUSED size_t written)
LDAP sync mod_write for child listener.
Context used when looking up Directory types.
uint32_t pending_cookies
How many cookies are in the pending heap.
uint8_t * cookie
Opaque cookie, used to resume synchronisation.
size_t sync_no
Array position of config for this sync.
@ SYNC_PACKET_TYPE_CHANGE
Packet is an entry change.
@ SYNC_PACKET_TYPE_COOKIE
sync_phases_t phase
Phase this sync is in.
uint32_t max_outstanding
Maximum number of outstanding packets.
int msgid
The unique identifier for this sync session.
uint8_t * cookie
Cookie to store - can be NULL.
fr_timer_t * retry_ev
Timer event for retrying failed changes.
fr_pair_list_t pairs
Pairs to send with change packets.
fr_dlist_head_t pending
List of pending changes in progress.
sync_config_t const * config
Configuration for this sync.
static fr_table_num_sorted_t const sync_ldap_msg_table[]
Types of LDAP messages relevant to LDAP sync.
sync_state_t * sync
Sync packet relates to.
sync_packet_status_t status
Status of this packet.
@ SYNC_PACKET_PREPARING
Packet being prepared.
@ SYNC_PACKET_PENDING
Packet not yet sent.
@ SYNC_PACKET_PROCESSING
Packet sent to worker.
@ SYNC_PACKET_COMPLETE
Packet response received from worker.
fr_listen_t * li
Our listener.
fr_timer_t * cookie_ev
Timer event for sending cookies.
connection_t * conn
Our connection to the LDAP directory.
proto_ldap_sync_t const * inst
Module instance for this sync.
fr_ldap_config_t handle_config
Connection configuration instance.
fr_network_t * nr
Network handler.
fr_listen_t * parent
master IO handler.
#define SYNC_UUID_LENGTH
proto_ldap_sync_t * parent
The module that spawned us.
bool refresh
Does the sync require a refresh.
@ SYNC_PHASE_INIT
We haven't entered any of the refresh phases.
sync_packet_type_t type
Type of packet.
uint32_t changes_since_cookie
How many changes have been added since the last cookie was stored.
fr_ldap_connection_t * conn
Connection the sync is running on.
fr_pair_list_t trigger_args
Arguments to make available in triggers.
fr_event_list_t * el
Network side event list.
fr_timer_t * conn_retry_ev
When to retry re-establishing the conn.
proto_ldap_sync_ldap_t const * inst
instance data
Tracking structure for ldap sync packets.
State of an individual sync.
ssize_t fr_internal_decode_list_dbuff(TALLOC_CTX *ctx, fr_pair_list_t *out, fr_dict_attr_t const *parent, fr_dbuff_t *dbuff, void *decode_ctx)
Retrieve all pairs from the dbuff.
Definition decode.c:310
ssize_t fr_internal_encode_list(fr_dbuff_t *dbuff, fr_pair_list_t const *list, void *encode_ctx)
Encode a list of pairs using the internal encoder.
Definition encode.c:303
#define fr_assert(_expr)
Definition rad_assert.h:38
#define DEBUG2(fmt,...)
Definition radclient.h:43
#define WARN(fmt,...)
Definition radclient.h:47
static rs_t * conf
Definition radsniff.c:53
void * fr_rb_find(fr_rb_tree_t const *tree, void const *data)
Find an element in the tree, returning the data, not the node.
Definition rb.c:577
bool fr_rb_delete(fr_rb_tree_t *tree, void const *data)
Remove node and free data (if a free function was specified)
Definition rb.c:741
The main red black tree structure.
Definition rb.h:73
int rfc4533_sync_refresh_required(sync_state_t *sync, LDAPMessage *msg, LDAPControl **ctrls)
Handle result code of e-syncRefreshRequired.
Definition rfc4533.c:717
int rfc4533_sync_search_entry(sync_state_t *sync, LDAPMessage *msg, LDAPControl **ctrls)
Handle a SearchResultEntry or SearchResultReference response from an RFC 4533 server.
Definition rfc4533.c:260
int rfc4533_sync_init(fr_ldap_connection_t *conn, size_t sync_no, proto_ldap_sync_t const *inst, uint8_t const *cookie)
Allocate and initialise RFC 4533 sync queries.
Definition rfc4533.c:74
int rfc4533_sync_intermediate(sync_state_t *sync, LDAPMessage *msg, UNUSED LDAPControl **ctrls)
Handle a LDAP_RES_INTERMEDIATE (SyncInfo) response.
Definition rfc4533.c:452
void connection_signal_shutdown(connection_t *conn)
Shuts down a connection gracefully.
void connection_signal_halt(connection_t *conn)
Shuts down a connection ungracefully.
void connection_signal_reconnect(connection_t *conn, connection_reason_t reason)
Asynchronously signal the connection should be reconnected.
void connection_signal_init(connection_t *conn)
Asynchronously signal a halted connection to start.
connection_watch_entry_t * connection_add_watch_post(connection_t *conn, connection_state_t state, connection_watch_t watch, bool oneshot, void const *uctx)
Add a callback to be executed after a state function has been called.
Definition connection.c:535
CONF_SECTION * conf
Module's instance configuration.
Definition module.h:329
void * data
Module's instance data.
Definition module.h:271
module_instance_t const * parent
Parent module's instance (if any).
Definition module.h:337
conf_parser_t const * config
How to convert a CONF_SECTION to a module instance.
Definition module.h:198
int pair_append_by_tmpl_parent(TALLOC_CTX *ctx, fr_pair_t **out, fr_pair_list_t *list, tmpl_t const *vpt, bool skip_list))
Allocate and insert a leaf vp from a tmpl_t, building the parent vps if needed.
Definition tmpl_eval.c:965
return count
Definition module.c:163
eap_aka_sim_process_conf_t * inst
fr_aka_sim_id_type_t type
fr_pair_t * vp
#define fr_time()
Allow us to arbitrarily manipulate time.
Definition state_test.c:8
Value pair map.
Definition map.h:77
fr_token_t op
The operator that controls insertion of the dst attribute.
Definition map.h:82
tmpl_t * lhs
Typically describes the attribute to add, modify or compare.
Definition map.h:78
tmpl_t * rhs
Typically describes a literal value or a src attribute to copy or compare.
Definition map.h:79
Stores an attribute, a value and various bits of other data.
Definition pair.h:68
fr_ldap_sync_packet_code_t
Types of the internal packets for processing LDAP sync messages.
Definition sync.h:31
@ FR_LDAP_SYNC_CODE_PRESENT
LDAP server indicates a particular object is present and unchanged.
Definition sync.h:33
@ FR_LDAP_SYNC_CODE_COOKIE_STORE_RESPONSE
Response to storing the new cookie.
Definition sync.h:52
@ FR_LDAP_SYNC_CODE_ENTRY_RESPONSE
Response packet to present / add / modify / delete.
Definition sync.h:42
@ FR_LDAP_SYNC_CODE_COOKIE_LOAD_FAIL
Response when coolie load fails.
Definition sync.h:48
@ FR_LDAP_SYNC_CODE_ADD
Object has been added to the LDAP directory.
Definition sync.h:36
@ FR_LDAP_SYNC_CODE_COOKIE_STORE
The server has sent a new cookie.
Definition sync.h:50
@ FR_LDAP_SYNC_CODE_COOKIE_LOAD_RESPONSE
Response with the returned cookie.
Definition sync.h:46
@ FR_LDAP_SYNC_CODE_DELETE
Object has been deleted.
Definition sync.h:40
@ FR_LDAP_SYNC_CODE_COOKIE_LOAD
Before the sync starts, request any previously stored cookie.
Definition sync.h:44
@ FR_LDAP_SYNC_CODE_MODIFY
Object has been modified.
Definition sync.h:38
char const * fr_syserror(int num)
Guaranteed to be thread-safe version of strerror.
Definition syserror.c:243
#define fr_table_str_by_value(_table, _number, _def)
Convert an integer to a string.
Definition table.h:772
An element in a lexicographically sorted array of name to num mappings.
Definition table.h:49
char * talloc_typed_asprintf(TALLOC_CTX *ctx, char const *fmt,...)
Call talloc vasprintf, setting the type on the new chunk correctly.
Definition talloc.c:492
#define talloc_get_type_abort_const
Definition talloc.h:282
static fr_time_delta_t fr_time_delta_from_msec(int64_t msec)
Definition time.h:575
"server local" time.
Definition time.h:69
An event timer list.
Definition timer.c:53
#define fr_timer_in(...)
Definition timer.h:86
@ T_OP_ADD_EQ
Definition token.h:69
int trigger_exec(unlang_interpret_t *intp, CONF_SECTION const *cs, char const *name, bool rate_limit, fr_pair_list_t *args)
Execute a trigger - call an executable to process an event.
Definition trigger.c:233
static fr_event_list_t * el
#define fr_pair_list_append_by_da_len(_ctx, _vp, _list, _attr, _val, _len, _tainted)
Append a pair to a list, assigning its value.
Definition pair.h:309
fr_pair_t * fr_pair_remove(fr_pair_list_t *list, fr_pair_t *vp)
Remove fr_pair_t from a list without freeing.
Definition pair_inline.c:94
void fr_pair_list_free(fr_pair_list_t *list)
Free memory used by a valuepair list.
#define fr_pair_list_append_by_da(_ctx, _vp, _list, _attr, _val, _tainted)
Append a pair to a list, assigning its value.
Definition pair.h:286
#define fr_pair_list_append_by_da_parent_len(_ctx, _vp, _list, _attr, _val, _len, _tainted)
Definition pair.h:331
char const * fr_strerror(void)
Get the last library error.
Definition strerror.c:554
ssize_t fr_value_box_from_str(TALLOC_CTX *ctx, fr_value_box_t *dst, fr_type_t dst_type, fr_dict_attr_t const *dst_enumv, char const *in, size_t inlen, fr_sbuff_unescape_rules_t const *erules)
Definition value.c:5246
#define fr_box_time_delta(_val)
Definition value.h:354