diff options
Diffstat (limited to 'nslcd/cfg.c')
-rw-r--r-- | nslcd/cfg.c | 226 |
1 files changed, 0 insertions, 226 deletions
diff --git a/nslcd/cfg.c b/nslcd/cfg.c index 9a90003..d62cf80 100644 --- a/nslcd/cfg.c +++ b/nslcd/cfg.c @@ -975,232 +975,6 @@ static void cfg_read(const char *filename, struct ldap_config *cfg) { handle_log(filename, lnr, keyword, line); } - /* general connection options */ - else if (strcasecmp(keyword, "uri") == 0) - { - check_argumentcount(filename, lnr, keyword, (line != NULL) && (*line != '\0')); - while (get_token(&line, token, sizeof(token)) != NULL) - { - if (strcasecmp(token, "dns") == 0) - { -#ifdef HAVE_LDAP_DOMAIN2HOSTLIST - add_uris_from_dns(filename, lnr, cfg, - cfg_getdomainname(filename, lnr)); -#else /* not HAVE_LDAP_DOMAIN2HOSTLIST */ - log_log(LOG_ERR, "%s:%d: value %s not supported on platform", - filename, lnr, token); - exit(EXIT_FAILURE); -#endif /* not HAVE_LDAP_DOMAIN2HOSTLIST */ - } - else if (strncasecmp(token, "dns:", 4) == 0) - { -#ifdef HAVE_LDAP_DOMAIN2HOSTLIST - add_uris_from_dns(filename, lnr, cfg, strdup(token + 4)); -#else /* not HAVE_LDAP_DOMAIN2HOSTLIST */ - log_log(LOG_ERR, "%s:%d: value %s not supported on platform", - filename, lnr, token); - exit(EXIT_FAILURE); -#endif /* not HAVE_LDAP_DOMAIN2HOSTLIST */ - } - else - add_uri(filename, lnr, cfg, token); - } - } - else if (strcasecmp(keyword, "ldap_version") == 0) - { - cfg->ldap_version = get_int(filename, lnr, keyword, &line); - get_eol(filename, lnr, keyword, &line); - } - else if (strcasecmp(keyword, "binddn") == 0) - { - cfg->binddn = get_linedup(filename, lnr, keyword, &line); - } - else if (strcasecmp(keyword, "bindpw") == 0) - { - check_permissions(filename, keyword); - cfg->bindpw = get_linedup(filename, lnr, keyword, &line); - } - else if (strcasecmp(keyword, "rootpwmoddn") == 0) - { - cfg->rootpwmoddn = get_linedup(filename, lnr, keyword, &line); - } - else if (strcasecmp(keyword, "rootpwmodpw") == 0) - { - check_permissions(filename, keyword); - cfg->rootpwmodpw = get_linedup(filename, lnr, keyword, &line); - } - /* SASL authentication options */ - else if (strcasecmp(keyword, "sasl_mech") == 0) - { - cfg->sasl_mech = get_strdup(filename, lnr, keyword, &line); - get_eol(filename, lnr, keyword, &line); - } - else if (strcasecmp(keyword, "sasl_realm") == 0) - { - cfg->sasl_realm = get_strdup(filename, lnr, keyword, &line); - get_eol(filename, lnr, keyword, &line); - } - else if (strcasecmp(keyword, "sasl_authcid") == 0) - { - cfg->sasl_authcid = get_strdup(filename, lnr, keyword, &line); - get_eol(filename, lnr, keyword, &line); - } - else if (strcasecmp(keyword, "sasl_authzid") == 0) - { - cfg->sasl_authzid = get_strdup(filename, lnr, keyword, &line); - get_eol(filename, lnr, keyword, &line); - } - else if (strcasecmp(keyword, "sasl_secprops") == 0) - { - cfg->sasl_secprops = get_strdup(filename, lnr, keyword, &line); - get_eol(filename, lnr, keyword, &line); - } -#ifdef LDAP_OPT_X_SASL_NOCANON - else if ((strcasecmp(keyword, "sasl_canonicalize") == 0) || - (strcasecmp(keyword, "sasl_canonicalise") == 0) || - (strcasecmp(keyword, "ldap_sasl_canonicalize") == 0) || - (strcasecmp(keyword, "sasl_canon") == 0)) - { - cfg->sasl_canonicalize = get_boolean(filename, lnr, keyword, &line); - get_eol(filename, lnr, keyword, &line); - } - else if (strcasecmp(keyword, "sasl_nocanon") == 0) - { - cfg->sasl_canonicalize = get_boolean(filename, lnr, keyword, &line); - cfg->sasl_canonicalize = !cfg->sasl_canonicalize; - get_eol(filename, lnr, keyword, &line); - } -#endif /* LDAP_OPT_X_SASL_NOCANON */ - /* Kerberos authentication options */ - else if (strcasecmp(keyword, "krb5_ccname") == 0) - { - handle_krb5_ccname(filename, lnr, keyword, line); - } - /* search/mapping options */ - else if (strcasecmp(keyword, "base") == 0) - { - handle_base(filename, lnr, keyword, line, cfg); - } - else if (strcasecmp(keyword, "scope") == 0) - { - handle_scope(filename, lnr, keyword, line, cfg); - } - else if (strcasecmp(keyword, "deref") == 0) - { - handle_deref(filename, lnr, keyword, line, cfg); - } - else if (strcasecmp(keyword, "referrals") == 0) - { - cfg->referrals = get_boolean(filename, lnr, keyword, &line); - get_eol(filename, lnr, keyword, &line); - } - else if (strcasecmp(keyword, "filter") == 0) - { - handle_filter(filename, lnr, keyword, line); - } - /* timing/reconnect options */ - else if (strcasecmp(keyword, "bind_timelimit") == 0) - { - cfg->bind_timelimit = get_int(filename, lnr, keyword, &line); - get_eol(filename, lnr, keyword, &line); - } - else if (strcasecmp(keyword, "timelimit") == 0) - { - cfg->timelimit = get_int(filename, lnr, keyword, &line); - get_eol(filename, lnr, keyword, &line); - } - else if (strcasecmp(keyword, "idle_timelimit") == 0) - { - cfg->idle_timelimit = get_int(filename, lnr, keyword, &line); - get_eol(filename, lnr, keyword, &line); - } - else if (!strcasecmp(keyword, "reconnect_sleeptime")) - { - cfg->reconnect_sleeptime = get_int(filename, lnr, keyword, &line); - get_eol(filename, lnr, keyword, &line); - } - else if (strcasecmp(keyword, "reconnect_retrytime") == 0) - { - cfg->reconnect_retrytime = get_int(filename, lnr, keyword, &line); - get_eol(filename, lnr, keyword, &line); - } -#ifdef LDAP_OPT_X_TLS - /* SSL/TLS options */ - else if (strcasecmp(keyword, "ssl") == 0) - { - check_argumentcount(filename, lnr, keyword, - (get_token(&line, token, sizeof(token)) != NULL)); - if ((strcasecmp(token, "start_tls") == 0) || - (strcasecmp(token, "starttls") == 0)) - cfg->ssl = SSL_START_TLS; - else if (parse_boolean(filename, lnr, token)) - cfg->ssl = SSL_LDAPS; - get_eol(filename, lnr, keyword, &line); - } - else if (strcasecmp(keyword, "tls_reqcert") == 0) - { - handle_tls_reqcert(filename, lnr, keyword, line); - } - else if (strcasecmp(keyword, "tls_cacertdir") == 0) - { - value = get_strdup(filename, lnr, keyword, &line); - get_eol(filename, lnr, keyword, &line); - /* TODO: check that the path is valid */ - log_log(LOG_DEBUG, "ldap_set_option(LDAP_OPT_X_TLS_CACERTDIR,\"%s\")", - value); - LDAP_SET_OPTION(NULL, LDAP_OPT_X_TLS_CACERTDIR, value); - free(value); - } - else if ((strcasecmp(keyword, "tls_cacertfile") == 0) || - (strcasecmp(keyword, "tls_cacert") == 0)) - { - value = get_strdup(filename, lnr, keyword, &line); - get_eol(filename, lnr, keyword, &line); - /* TODO: check that the path is valid */ - log_log(LOG_DEBUG, "ldap_set_option(LDAP_OPT_X_TLS_CACERTFILE,\"%s\")", - value); - LDAP_SET_OPTION(NULL, LDAP_OPT_X_TLS_CACERTFILE, value); - free(value); - } - else if (strcasecmp(keyword, "tls_randfile") == 0) - { - value = get_strdup(filename, lnr, keyword, &line); - get_eol(filename, lnr, keyword, &line); - /* TODO: check that the path is valid */ - log_log(LOG_DEBUG, "ldap_set_option(LDAP_OPT_X_TLS_RANDOM_FILE,\"%s\")", - value); - LDAP_SET_OPTION(NULL, LDAP_OPT_X_TLS_RANDOM_FILE, value); - free(value); - } - else if (strcasecmp(keyword, "tls_ciphers") == 0) - { - value = get_linedup(filename, lnr, keyword, &line); - log_log(LOG_DEBUG, "ldap_set_option(LDAP_OPT_X_TLS_CIPHER_SUITE,\"%s\")", - value); - LDAP_SET_OPTION(NULL, LDAP_OPT_X_TLS_CIPHER_SUITE, value); - free(value); - } - else if (strcasecmp(keyword, "tls_cert") == 0) - { - value = get_strdup(filename, lnr, keyword, &line); - get_eol(filename, lnr, keyword, &line); - /* TODO: check that the path is valid */ - log_log(LOG_DEBUG, "ldap_set_option(LDAP_OPT_X_TLS_CERTFILE,\"%s\")", - value); - LDAP_SET_OPTION(NULL, LDAP_OPT_X_TLS_CERTFILE, value); - free(value); - } - else if (strcasecmp(keyword, "tls_key") == 0) - { - value = get_strdup(filename, lnr, keyword, &line); - get_eol(filename, lnr, keyword, &line); - /* TODO: check that the path is valid */ - log_log(LOG_DEBUG, "ldap_set_option(LDAP_OPT_X_TLS_KEYFILE,\"%s\")", - value); - LDAP_SET_OPTION(NULL, LDAP_OPT_X_TLS_KEYFILE, value); - free(value); - } -#endif /* LDAP_OPT_X_TLS */ /* other options */ else if (strcasecmp(keyword, "pagesize") == 0) { |