summaryrefslogtreecommitdiff
path: root/nslcd/cfg.c
diff options
context:
space:
mode:
Diffstat (limited to 'nslcd/cfg.c')
-rw-r--r--nslcd/cfg.c226
1 files changed, 0 insertions, 226 deletions
diff --git a/nslcd/cfg.c b/nslcd/cfg.c
index 9a90003..d62cf80 100644
--- a/nslcd/cfg.c
+++ b/nslcd/cfg.c
@@ -975,232 +975,6 @@ static void cfg_read(const char *filename, struct ldap_config *cfg)
{
handle_log(filename, lnr, keyword, line);
}
- /* general connection options */
- else if (strcasecmp(keyword, "uri") == 0)
- {
- check_argumentcount(filename, lnr, keyword, (line != NULL) && (*line != '\0'));
- while (get_token(&line, token, sizeof(token)) != NULL)
- {
- if (strcasecmp(token, "dns") == 0)
- {
-#ifdef HAVE_LDAP_DOMAIN2HOSTLIST
- add_uris_from_dns(filename, lnr, cfg,
- cfg_getdomainname(filename, lnr));
-#else /* not HAVE_LDAP_DOMAIN2HOSTLIST */
- log_log(LOG_ERR, "%s:%d: value %s not supported on platform",
- filename, lnr, token);
- exit(EXIT_FAILURE);
-#endif /* not HAVE_LDAP_DOMAIN2HOSTLIST */
- }
- else if (strncasecmp(token, "dns:", 4) == 0)
- {
-#ifdef HAVE_LDAP_DOMAIN2HOSTLIST
- add_uris_from_dns(filename, lnr, cfg, strdup(token + 4));
-#else /* not HAVE_LDAP_DOMAIN2HOSTLIST */
- log_log(LOG_ERR, "%s:%d: value %s not supported on platform",
- filename, lnr, token);
- exit(EXIT_FAILURE);
-#endif /* not HAVE_LDAP_DOMAIN2HOSTLIST */
- }
- else
- add_uri(filename, lnr, cfg, token);
- }
- }
- else if (strcasecmp(keyword, "ldap_version") == 0)
- {
- cfg->ldap_version = get_int(filename, lnr, keyword, &line);
- get_eol(filename, lnr, keyword, &line);
- }
- else if (strcasecmp(keyword, "binddn") == 0)
- {
- cfg->binddn = get_linedup(filename, lnr, keyword, &line);
- }
- else if (strcasecmp(keyword, "bindpw") == 0)
- {
- check_permissions(filename, keyword);
- cfg->bindpw = get_linedup(filename, lnr, keyword, &line);
- }
- else if (strcasecmp(keyword, "rootpwmoddn") == 0)
- {
- cfg->rootpwmoddn = get_linedup(filename, lnr, keyword, &line);
- }
- else if (strcasecmp(keyword, "rootpwmodpw") == 0)
- {
- check_permissions(filename, keyword);
- cfg->rootpwmodpw = get_linedup(filename, lnr, keyword, &line);
- }
- /* SASL authentication options */
- else if (strcasecmp(keyword, "sasl_mech") == 0)
- {
- cfg->sasl_mech = get_strdup(filename, lnr, keyword, &line);
- get_eol(filename, lnr, keyword, &line);
- }
- else if (strcasecmp(keyword, "sasl_realm") == 0)
- {
- cfg->sasl_realm = get_strdup(filename, lnr, keyword, &line);
- get_eol(filename, lnr, keyword, &line);
- }
- else if (strcasecmp(keyword, "sasl_authcid") == 0)
- {
- cfg->sasl_authcid = get_strdup(filename, lnr, keyword, &line);
- get_eol(filename, lnr, keyword, &line);
- }
- else if (strcasecmp(keyword, "sasl_authzid") == 0)
- {
- cfg->sasl_authzid = get_strdup(filename, lnr, keyword, &line);
- get_eol(filename, lnr, keyword, &line);
- }
- else if (strcasecmp(keyword, "sasl_secprops") == 0)
- {
- cfg->sasl_secprops = get_strdup(filename, lnr, keyword, &line);
- get_eol(filename, lnr, keyword, &line);
- }
-#ifdef LDAP_OPT_X_SASL_NOCANON
- else if ((strcasecmp(keyword, "sasl_canonicalize") == 0) ||
- (strcasecmp(keyword, "sasl_canonicalise") == 0) ||
- (strcasecmp(keyword, "ldap_sasl_canonicalize") == 0) ||
- (strcasecmp(keyword, "sasl_canon") == 0))
- {
- cfg->sasl_canonicalize = get_boolean(filename, lnr, keyword, &line);
- get_eol(filename, lnr, keyword, &line);
- }
- else if (strcasecmp(keyword, "sasl_nocanon") == 0)
- {
- cfg->sasl_canonicalize = get_boolean(filename, lnr, keyword, &line);
- cfg->sasl_canonicalize = !cfg->sasl_canonicalize;
- get_eol(filename, lnr, keyword, &line);
- }
-#endif /* LDAP_OPT_X_SASL_NOCANON */
- /* Kerberos authentication options */
- else if (strcasecmp(keyword, "krb5_ccname") == 0)
- {
- handle_krb5_ccname(filename, lnr, keyword, line);
- }
- /* search/mapping options */
- else if (strcasecmp(keyword, "base") == 0)
- {
- handle_base(filename, lnr, keyword, line, cfg);
- }
- else if (strcasecmp(keyword, "scope") == 0)
- {
- handle_scope(filename, lnr, keyword, line, cfg);
- }
- else if (strcasecmp(keyword, "deref") == 0)
- {
- handle_deref(filename, lnr, keyword, line, cfg);
- }
- else if (strcasecmp(keyword, "referrals") == 0)
- {
- cfg->referrals = get_boolean(filename, lnr, keyword, &line);
- get_eol(filename, lnr, keyword, &line);
- }
- else if (strcasecmp(keyword, "filter") == 0)
- {
- handle_filter(filename, lnr, keyword, line);
- }
- /* timing/reconnect options */
- else if (strcasecmp(keyword, "bind_timelimit") == 0)
- {
- cfg->bind_timelimit = get_int(filename, lnr, keyword, &line);
- get_eol(filename, lnr, keyword, &line);
- }
- else if (strcasecmp(keyword, "timelimit") == 0)
- {
- cfg->timelimit = get_int(filename, lnr, keyword, &line);
- get_eol(filename, lnr, keyword, &line);
- }
- else if (strcasecmp(keyword, "idle_timelimit") == 0)
- {
- cfg->idle_timelimit = get_int(filename, lnr, keyword, &line);
- get_eol(filename, lnr, keyword, &line);
- }
- else if (!strcasecmp(keyword, "reconnect_sleeptime"))
- {
- cfg->reconnect_sleeptime = get_int(filename, lnr, keyword, &line);
- get_eol(filename, lnr, keyword, &line);
- }
- else if (strcasecmp(keyword, "reconnect_retrytime") == 0)
- {
- cfg->reconnect_retrytime = get_int(filename, lnr, keyword, &line);
- get_eol(filename, lnr, keyword, &line);
- }
-#ifdef LDAP_OPT_X_TLS
- /* SSL/TLS options */
- else if (strcasecmp(keyword, "ssl") == 0)
- {
- check_argumentcount(filename, lnr, keyword,
- (get_token(&line, token, sizeof(token)) != NULL));
- if ((strcasecmp(token, "start_tls") == 0) ||
- (strcasecmp(token, "starttls") == 0))
- cfg->ssl = SSL_START_TLS;
- else if (parse_boolean(filename, lnr, token))
- cfg->ssl = SSL_LDAPS;
- get_eol(filename, lnr, keyword, &line);
- }
- else if (strcasecmp(keyword, "tls_reqcert") == 0)
- {
- handle_tls_reqcert(filename, lnr, keyword, line);
- }
- else if (strcasecmp(keyword, "tls_cacertdir") == 0)
- {
- value = get_strdup(filename, lnr, keyword, &line);
- get_eol(filename, lnr, keyword, &line);
- /* TODO: check that the path is valid */
- log_log(LOG_DEBUG, "ldap_set_option(LDAP_OPT_X_TLS_CACERTDIR,\"%s\")",
- value);
- LDAP_SET_OPTION(NULL, LDAP_OPT_X_TLS_CACERTDIR, value);
- free(value);
- }
- else if ((strcasecmp(keyword, "tls_cacertfile") == 0) ||
- (strcasecmp(keyword, "tls_cacert") == 0))
- {
- value = get_strdup(filename, lnr, keyword, &line);
- get_eol(filename, lnr, keyword, &line);
- /* TODO: check that the path is valid */
- log_log(LOG_DEBUG, "ldap_set_option(LDAP_OPT_X_TLS_CACERTFILE,\"%s\")",
- value);
- LDAP_SET_OPTION(NULL, LDAP_OPT_X_TLS_CACERTFILE, value);
- free(value);
- }
- else if (strcasecmp(keyword, "tls_randfile") == 0)
- {
- value = get_strdup(filename, lnr, keyword, &line);
- get_eol(filename, lnr, keyword, &line);
- /* TODO: check that the path is valid */
- log_log(LOG_DEBUG, "ldap_set_option(LDAP_OPT_X_TLS_RANDOM_FILE,\"%s\")",
- value);
- LDAP_SET_OPTION(NULL, LDAP_OPT_X_TLS_RANDOM_FILE, value);
- free(value);
- }
- else if (strcasecmp(keyword, "tls_ciphers") == 0)
- {
- value = get_linedup(filename, lnr, keyword, &line);
- log_log(LOG_DEBUG, "ldap_set_option(LDAP_OPT_X_TLS_CIPHER_SUITE,\"%s\")",
- value);
- LDAP_SET_OPTION(NULL, LDAP_OPT_X_TLS_CIPHER_SUITE, value);
- free(value);
- }
- else if (strcasecmp(keyword, "tls_cert") == 0)
- {
- value = get_strdup(filename, lnr, keyword, &line);
- get_eol(filename, lnr, keyword, &line);
- /* TODO: check that the path is valid */
- log_log(LOG_DEBUG, "ldap_set_option(LDAP_OPT_X_TLS_CERTFILE,\"%s\")",
- value);
- LDAP_SET_OPTION(NULL, LDAP_OPT_X_TLS_CERTFILE, value);
- free(value);
- }
- else if (strcasecmp(keyword, "tls_key") == 0)
- {
- value = get_strdup(filename, lnr, keyword, &line);
- get_eol(filename, lnr, keyword, &line);
- /* TODO: check that the path is valid */
- log_log(LOG_DEBUG, "ldap_set_option(LDAP_OPT_X_TLS_KEYFILE,\"%s\")",
- value);
- LDAP_SET_OPTION(NULL, LDAP_OPT_X_TLS_KEYFILE, value);
- free(value);
- }
-#endif /* LDAP_OPT_X_TLS */
/* other options */
else if (strcasecmp(keyword, "pagesize") == 0)
{