node-ldapjs/lib/server.js

889 lines
24 KiB
JavaScript
Raw Normal View History

2011-08-04 20:32:01 +00:00
// Copyright 2011 Mark Cavage, Inc. All rights reserved.
2020-10-31 21:07:32 +00:00
const assert = require('assert')
const EventEmitter = require('events').EventEmitter
const net = require('net')
const tls = require('tls')
const util = require('util')
2011-08-04 20:32:01 +00:00
// var asn1 = require('asn1')
2020-10-31 21:07:32 +00:00
const VError = require('verror').VError
const dn = require('./dn')
const dtrace = require('./dtrace')
const errors = require('./errors')
const Protocol = require('./protocol')
const Parser = require('./messages').Parser
const AbandonResponse = require('./messages/abandon_response')
const AddResponse = require('./messages/add_response')
const BindResponse = require('./messages/bind_response')
const CompareResponse = require('./messages/compare_response')
const DeleteResponse = require('./messages/del_response')
const ExtendedResponse = require('./messages/ext_response')
// var LDAPResult = require('./messages/result')
2020-10-31 21:07:32 +00:00
const ModifyResponse = require('./messages/modify_response')
const ModifyDNResponse = require('./messages/moddn_response')
const SearchRequest = require('./messages/search_request')
const SearchResponse = require('./messages/search_response')
const UnbindResponse = require('./messages/unbind_response')
2011-08-04 20:32:01 +00:00
/// --- Globals
2011-08-04 20:32:01 +00:00
// var Ber = asn1.Ber
// var BerReader = asn1.BerReader
2020-10-31 21:07:32 +00:00
const DN = dn.DN
2011-08-04 20:32:01 +00:00
// var sprintf = util.format
2011-08-04 20:32:01 +00:00
/// --- Helpers
2011-08-04 20:32:01 +00:00
function mergeFunctionArgs (argv, start, end) {
assert.ok(argv)
if (!start) { start = 0 }
if (!end) { end = argv.length }
2011-08-04 20:32:01 +00:00
2020-10-31 21:07:32 +00:00
const handlers = []
2020-10-31 21:07:32 +00:00
for (let i = start; i < end; i++) {
if (argv[i] instanceof Array) {
2020-10-31 21:07:32 +00:00
const arr = argv[i]
for (let j = 0; j < arr.length; j++) {
if (!(arr[j] instanceof Function)) {
throw new TypeError('Invalid argument type: ' + typeof (arr[j]))
}
handlers.push(arr[j])
}
} else if (argv[i] instanceof Function) {
handlers.push(argv[i])
} else {
throw new TypeError('Invalid argument type: ' + typeof (argv[i]))
}
}
2011-08-04 20:32:01 +00:00
return handlers
2011-08-04 20:32:01 +00:00
}
function getResponse (req) {
assert.ok(req)
2011-08-04 20:32:01 +00:00
2020-10-31 21:07:32 +00:00
let Response
2011-08-04 20:32:01 +00:00
switch (req.protocolOp) {
case Protocol.LDAP_REQ_BIND:
Response = BindResponse
break
case Protocol.LDAP_REQ_ABANDON:
Response = AbandonResponse
break
case Protocol.LDAP_REQ_ADD:
Response = AddResponse
break
case Protocol.LDAP_REQ_COMPARE:
Response = CompareResponse
break
case Protocol.LDAP_REQ_DELETE:
Response = DeleteResponse
break
case Protocol.LDAP_REQ_EXTENSION:
Response = ExtendedResponse
break
case Protocol.LDAP_REQ_MODIFY:
Response = ModifyResponse
break
case Protocol.LDAP_REQ_MODRDN:
Response = ModifyDNResponse
break
case Protocol.LDAP_REQ_SEARCH:
Response = SearchResponse
break
case Protocol.LDAP_REQ_UNBIND:
Response = UnbindResponse
break
default:
return null
2011-08-04 20:32:01 +00:00
}
assert.ok(Response)
2011-08-04 20:32:01 +00:00
2020-10-31 21:07:32 +00:00
const res = new Response({
2011-08-04 20:32:01 +00:00
messageID: req.messageID,
2012-02-18 08:54:22 +00:00
log: req.log,
attributes: ((req instanceof SearchRequest) ? req.attributes : undefined)
})
res.connection = req.connection
res.logId = req.logId
2011-08-04 20:32:01 +00:00
return res
2011-08-04 20:32:01 +00:00
}
function defaultHandler (req, res, next) {
assert.ok(req)
assert.ok(res)
assert.ok(next)
2011-08-04 20:32:01 +00:00
res.matchedDN = req.dn.toString()
res.errorMessage = 'Server method not implemented'
res.end(errors.LDAP_OTHER)
return next()
2011-08-04 20:32:01 +00:00
}
function defaultNoOpHandler (req, res, next) {
assert.ok(req)
assert.ok(res)
assert.ok(next)
2011-08-04 20:32:01 +00:00
res.end()
return next()
2011-08-24 19:38:23 +00:00
}
function noSuffixHandler (req, res, next) {
assert.ok(req)
assert.ok(res)
assert.ok(next)
2011-08-24 19:38:23 +00:00
res.errorMessage = 'No tree found for: ' + req.dn.toString()
res.end(errors.LDAP_NO_SUCH_OBJECT)
return next()
2011-08-04 20:32:01 +00:00
}
function noExOpHandler (req, res, next) {
assert.ok(req)
assert.ok(res)
assert.ok(next)
2011-08-04 20:32:01 +00:00
res.errorMessage = req.requestName + ' not supported'
res.end(errors.LDAP_PROTOCOL_ERROR)
return next()
2011-08-04 20:32:01 +00:00
}
function fireDTraceProbe (req, res) {
assert.ok(req)
2011-08-04 20:32:01 +00:00
req._dtraceId = res._dtraceId = dtrace._nextId()
2020-10-31 21:07:32 +00:00
const probeArgs = [
2011-11-19 00:39:37 +00:00
req._dtraceId,
req.connection.remoteAddress || 'localhost',
req.connection.ldap.bindDN.toString(),
req.dn.toString()
]
2020-10-31 21:07:32 +00:00
let op
2011-11-19 00:39:37 +00:00
switch (req.protocolOp) {
case Protocol.LDAP_REQ_ABANDON:
op = 'abandon'
break
case Protocol.LDAP_REQ_ADD:
op = 'add'
probeArgs.push(req.attributes.length)
break
case Protocol.LDAP_REQ_BIND:
op = 'bind'
break
case Protocol.LDAP_REQ_COMPARE:
op = 'compare'
probeArgs.push(req.attribute)
probeArgs.push(req.value)
break
case Protocol.LDAP_REQ_DELETE:
op = 'delete'
break
case Protocol.LDAP_REQ_EXTENSION:
op = 'exop'
probeArgs.push(req.name)
probeArgs.push(req.value)
break
case Protocol.LDAP_REQ_MODIFY:
op = 'modify'
probeArgs.push(req.changes.length)
break
case Protocol.LDAP_REQ_MODRDN:
op = 'modifydn'
probeArgs.push(req.newRdn.toString())
probeArgs.push((req.newSuperior ? req.newSuperior.toString() : ''))
break
case Protocol.LDAP_REQ_SEARCH:
op = 'search'
probeArgs.push(req.scope)
probeArgs.push(req.filter.toString())
break
case Protocol.LDAP_REQ_UNBIND:
op = 'unbind'
break
default:
break
2011-11-19 00:39:37 +00:00
}
res._dtraceOp = op
dtrace.fire('server-' + op + '-start', function () {
return probeArgs
})
}
2011-08-04 20:32:01 +00:00
/// --- API
2011-08-04 20:32:01 +00:00
/**
* Constructs a new server that you can call .listen() on, in the various
* forms node supports. You need to first assign some handlers to the various
* LDAP operations however.
*
* The options object currently only takes a certificate/private key, and a
2012-02-18 08:54:22 +00:00
* bunyan logger handle.
*
* This object exposes the following events:
* - 'error'
* - 'close'
*
* @param {Object} options (optional) parameterization object.
* @throws {TypeError} on bad input.
*/
function Server (options) {
if (options) {
if (typeof (options) !== 'object') { throw new TypeError('options (object) required') }
if (typeof (options.log) !== 'object') { throw new TypeError('options.log must be an object') }
if (options.certificate || options.key) {
if (!(options.certificate && options.key) ||
(typeof (options.certificate) !== 'string' &&
!Buffer.isBuffer(options.certificate)) ||
(typeof (options.key) !== 'string' &&
!Buffer.isBuffer(options.key))) {
throw new TypeError('options.certificate and options.key ' +
'(string or buffer) are both required for TLS')
2011-08-04 20:32:01 +00:00
}
}
} else {
options = {}
}
2020-10-31 21:07:32 +00:00
const self = this
2011-08-04 20:32:01 +00:00
EventEmitter.call(this, options)
2011-08-04 20:32:01 +00:00
this._chain = []
this.log = options.log
this.strictDN = (options.strictDN !== undefined) ? options.strictDN : true
2020-10-31 21:07:32 +00:00
const log = this.log
2011-08-04 20:32:01 +00:00
function setupConnection (c) {
assert.ok(c)
2011-08-04 20:32:01 +00:00
if (c.type === 'unix') {
c.remoteAddress = self.server.path
c.remotePort = c.fd
} else if (c.socket) {
// TLS
c.remoteAddress = c.socket.remoteAddress
c.remotePort = c.socket.remotePort
}
2020-10-31 21:07:32 +00:00
const rdn = new dn.RDN({ cn: 'anonymous' })
c.ldap = {
id: c.remoteAddress + ':' + c.remotePort,
2011-08-30 04:48:05 +00:00
config: options,
_bindDN: new DN([rdn])
}
c.addListener('timeout', function () {
log.trace('%s timed out', c.ldap.id)
c.destroy()
})
c.addListener('end', function () {
log.trace('%s shutdown', c.ldap.id)
})
c.addListener('error', function (err) {
log.warn('%s unexpected connection error', c.ldap.id, err)
self.emit('clientError', err)
c.destroy()
})
c.addListener('close', function (closeError) {
log.trace('%s close; had_err=%j', c.ldap.id, closeError)
c.end()
})
c.ldap.__defineGetter__('bindDN', function () {
return c.ldap._bindDN
})
c.ldap.__defineSetter__('bindDN', function (val) {
if (!(val instanceof DN)) { throw new TypeError('DN required') }
c.ldap._bindDN = val
return val
})
return c
}
2011-08-04 20:32:01 +00:00
self.newConnection = function (conn) {
2021-05-21 12:04:41 +00:00
// TODO: make `newConnection` available on the `Server` prototype
// https://github.com/ldapjs/node-ldapjs/pull/727/files#r636572294
2020-12-05 23:58:13 +00:00
setupConnection(conn)
log.trace('new connection from %s', conn.ldap.id)
dtrace.fire('server-connection', function () {
2020-12-05 23:58:13 +00:00
return [conn.remoteAddress]
})
2011-08-04 20:32:01 +00:00
2020-12-05 23:58:13 +00:00
conn.parser = new Parser({
2012-02-18 08:54:22 +00:00
log: options.log
})
2020-12-05 23:58:13 +00:00
conn.parser.on('message', function (req) {
req.connection = conn
req.logId = conn.ldap.id + '::' + req.messageID
req.startTime = new Date().getTime()
2011-08-04 20:32:01 +00:00
2020-12-05 23:58:13 +00:00
log.debug('%s: message received: req=%j', conn.ldap.id, req.json)
2011-08-04 20:32:01 +00:00
2020-10-31 21:07:32 +00:00
const res = getResponse(req)
if (!res) {
log.warn('Unimplemented server method: %s', req.type)
2020-12-05 23:58:13 +00:00
conn.destroy()
return false
2011-08-04 20:32:01 +00:00
}
// parse string DNs for routing/etc
2015-10-31 14:01:50 +00:00
try {
switch (req.protocolOp) {
case Protocol.LDAP_REQ_BIND:
req.name = dn.parse(req.name)
break
case Protocol.LDAP_REQ_ADD:
case Protocol.LDAP_REQ_COMPARE:
case Protocol.LDAP_REQ_DELETE:
req.entry = dn.parse(req.entry)
break
case Protocol.LDAP_REQ_MODIFY:
req.object = dn.parse(req.object)
break
case Protocol.LDAP_REQ_MODRDN:
req.entry = dn.parse(req.entry)
// TODO: handle newRdn/Superior
break
case Protocol.LDAP_REQ_SEARCH:
req.baseObject = dn.parse(req.baseObject)
break
default:
break
2015-10-31 14:01:50 +00:00
}
} catch (e) {
if (self.strictDN) {
return res.end(errors.LDAP_INVALID_DN_SYNTAX)
2015-10-31 14:01:50 +00:00
}
}
2020-12-05 23:58:13 +00:00
res.connection = conn
res.logId = req.logId
res.requestDN = req.dn
2011-08-30 04:48:05 +00:00
2020-10-31 21:07:32 +00:00
const chain = self._getHandlerChain(req, res)
2011-08-04 20:32:01 +00:00
2020-10-31 21:07:32 +00:00
let i = 0
return (function messageIIFE (err) {
2020-12-05 23:58:13 +00:00
function sendError (sendErr) {
res.status = sendErr.code || errors.LDAP_OPERATIONS_ERROR
res.matchedDN = req.suffix ? req.suffix.toString() : ''
2020-12-05 23:58:13 +00:00
res.errorMessage = sendErr.message || ''
return res.end()
}
2011-08-04 20:32:01 +00:00
function after () {
if (!self._postChain || !self._postChain.length) { return }
function next () {} // stub out next for the post chain
2020-12-05 23:58:13 +00:00
self._postChain.forEach(function (cb) {
cb.call(self, req, res, next)
})
}
if (err) {
log.trace('%s sending error: %s', req.logId, err.stack || err)
self.emit('clientError', err)
sendError(err)
return after()
}
try {
2020-10-31 21:07:32 +00:00
const next = messageIIFE
if (chain.handlers[i]) { return chain.handlers[i++].call(chain.backend, req, res, next) }
2021-07-12 15:02:12 +00:00
if (req.protocolOp === Protocol.LDAP_REQ_BIND && res.status === 0) {
// 0 length == anonymous bind
2021-07-12 15:32:06 +00:00
if (req.dn.length === 0 && req.credentials === '') {
2021-07-12 15:02:12 +00:00
conn.ldap.bindDN = new DN([new dn.RDN({ cn: 'anonymous' })])
} else {
conn.ldap.bindDN = req.dn
}
}
// unbind clear bindDN for safety
// conn should terminate on unbind (RFC4511 4.3)
if (req.protocolOp === Protocol.LDAP_REQ_UNBIND && res.status === 0) {
conn.ldap.bindDN = new DN([new dn.RDN({ cn: 'anonymous' })])
}
return after()
} catch (e) {
if (!e.stack) { e.stack = e.toString() }
log.error('%s uncaught exception: %s', req.logId, e.stack)
return sendError(new errors.OperationsError(e.message))
}
}())
})
2011-08-04 20:32:01 +00:00
2020-12-05 23:58:13 +00:00
conn.parser.on('error', function (err, message) {
self.emit('error', new VError(err, 'Parser error for %s', conn.ldap.id))
2011-11-11 18:08:48 +00:00
2020-12-05 23:58:13 +00:00
if (!message) { return conn.destroy() }
2011-11-11 18:08:48 +00:00
2020-10-31 21:07:32 +00:00
const res = getResponse(message)
2020-12-05 23:58:13 +00:00
if (!res) { return conn.destroy() }
2011-11-11 18:08:48 +00:00
res.status = 0x02 // protocol error
res.errorMessage = err.toString()
2020-12-05 23:58:13 +00:00
return conn.end(res.toBer())
})
2020-12-05 23:58:13 +00:00
conn.on('data', function (data) {
log.trace('data on %s: %s', conn.ldap.id, util.inspect(data))
2011-08-04 20:32:01 +00:00
2020-12-05 23:58:13 +00:00
conn.parser.write(data)
})
} // end newConnection
2011-08-04 20:32:01 +00:00
this.routes = {}
if ((options.cert || options.certificate) && options.key) {
options.cert = options.cert || options.certificate
this.server = tls.createServer(options, options.connectionRouter ? options.connectionRouter : self.newConnection)
} else {
this.server = net.createServer(options.connectionRouter ? options.connectionRouter : self.newConnection)
2011-08-04 20:32:01 +00:00
}
this.server.log = options.log
this.server.ldap = {
config: options
}
this.server.on('close', function () {
self.emit('close')
})
this.server.on('error', function (err) {
self.emit('error', err)
})
}
util.inherits(Server, EventEmitter)
Object.defineProperties(Server.prototype, {
maxConnections: {
get: function getMaxConnections () {
return this.server.maxConnections
},
set: function setMaxConnections (val) {
this.server.maxConnections = val
},
configurable: false
},
connections: {
get: function getConnections () {
return this.server.connections
},
configurable: false
},
name: {
get: function getName () {
return 'LDAPServer'
},
configurable: false
},
url: {
get: function getURL () {
2020-10-31 21:07:32 +00:00
let str
const addr = this.server.address()
if (!addr) {
return null
}
if (!addr.family) {
str = 'ldapi://'
2020-10-31 21:07:32 +00:00
str += this.host.replace(/\//g, '%2f')
return str
}
if (this.server instanceof tls.Server) {
str = 'ldaps://'
} else {
str = 'ldap://'
}
str += this.host + ':' + this.port
return str
},
configurable: false
}
})
module.exports = Server
/**
* Adds a handler (chain) for the LDAP add method.
*
* Note that this is of the form f(name, [function]) where the second...N
* arguments can all either be functions or arrays of functions.
*
* @param {String} name the DN to mount this handler chain at.
* @return {Server} this so you can chain calls.
* @throws {TypeError} on bad input
*/
Server.prototype.add = function (name) {
2020-10-31 21:07:32 +00:00
const args = Array.prototype.slice.call(arguments, 1)
return this._mount(Protocol.LDAP_REQ_ADD, name, args)
}
2011-08-04 20:32:01 +00:00
/**
* Adds a handler (chain) for the LDAP bind method.
*
* Note that this is of the form f(name, [function]) where the second...N
* arguments can all either be functions or arrays of functions.
*
* @param {String} name the DN to mount this handler chain at.
* @return {Server} this so you can chain calls.
* @throws {TypeError} on bad input
*/
Server.prototype.bind = function (name) {
2020-10-31 21:07:32 +00:00
const args = Array.prototype.slice.call(arguments, 1)
return this._mount(Protocol.LDAP_REQ_BIND, name, args)
}
2011-08-04 20:32:01 +00:00
/**
* Adds a handler (chain) for the LDAP compare method.
*
* Note that this is of the form f(name, [function]) where the second...N
* arguments can all either be functions or arrays of functions.
*
* @param {String} name the DN to mount this handler chain at.
* @return {Server} this so you can chain calls.
* @throws {TypeError} on bad input
*/
Server.prototype.compare = function (name) {
2020-10-31 21:07:32 +00:00
const args = Array.prototype.slice.call(arguments, 1)
return this._mount(Protocol.LDAP_REQ_COMPARE, name, args)
}
2011-08-04 20:32:01 +00:00
/**
* Adds a handler (chain) for the LDAP delete method.
*
* Note that this is of the form f(name, [function]) where the second...N
* arguments can all either be functions or arrays of functions.
*
* @param {String} name the DN to mount this handler chain at.
* @return {Server} this so you can chain calls.
* @throws {TypeError} on bad input
*/
Server.prototype.del = function (name) {
2020-10-31 21:07:32 +00:00
const args = Array.prototype.slice.call(arguments, 1)
return this._mount(Protocol.LDAP_REQ_DELETE, name, args)
}
2011-08-04 20:32:01 +00:00
/**
* Adds a handler (chain) for the LDAP exop method.
*
* Note that this is of the form f(name, [function]) where the second...N
* arguments can all either be functions or arrays of functions.
*
* @param {String} name OID to assign this handler chain to.
* @return {Server} this so you can chain calls.
* @throws {TypeError} on bad input.
*/
Server.prototype.exop = function (name) {
2020-10-31 21:07:32 +00:00
const args = Array.prototype.slice.call(arguments, 1)
return this._mount(Protocol.LDAP_REQ_EXTENSION, name, args, true)
}
2011-08-04 20:32:01 +00:00
/**
* Adds a handler (chain) for the LDAP modify method.
*
* Note that this is of the form f(name, [function]) where the second...N
* arguments can all either be functions or arrays of functions.
*
* @param {String} name the DN to mount this handler chain at.
* @return {Server} this so you can chain calls.
* @throws {TypeError} on bad input
*/
Server.prototype.modify = function (name) {
2020-10-31 21:07:32 +00:00
const args = Array.prototype.slice.call(arguments, 1)
return this._mount(Protocol.LDAP_REQ_MODIFY, name, args)
}
2011-08-04 20:32:01 +00:00
/**
* Adds a handler (chain) for the LDAP modifyDN method.
*
* Note that this is of the form f(name, [function]) where the second...N
* arguments can all either be functions or arrays of functions.
*
* @param {String} name the DN to mount this handler chain at.
* @return {Server} this so you can chain calls.
* @throws {TypeError} on bad input
*/
Server.prototype.modifyDN = function (name) {
2020-10-31 21:07:32 +00:00
const args = Array.prototype.slice.call(arguments, 1)
return this._mount(Protocol.LDAP_REQ_MODRDN, name, args)
}
2011-08-04 20:32:01 +00:00
/**
* Adds a handler (chain) for the LDAP search method.
*
* Note that this is of the form f(name, [function]) where the second...N
* arguments can all either be functions or arrays of functions.
*
* @param {String} name the DN to mount this handler chain at.
* @return {Server} this so you can chain calls.
* @throws {TypeError} on bad input
*/
Server.prototype.search = function (name) {
2020-10-31 21:07:32 +00:00
const args = Array.prototype.slice.call(arguments, 1)
return this._mount(Protocol.LDAP_REQ_SEARCH, name, args)
}
2011-08-04 20:32:01 +00:00
/**
* Adds a handler (chain) for the LDAP unbind method.
*
* This method is different than the others and takes no mount point, as unbind
* is a connection-wide operation, not constrianed to part of the DIT.
*
* @return {Server} this so you can chain calls.
* @throws {TypeError} on bad input
*/
Server.prototype.unbind = function () {
2020-10-31 21:07:32 +00:00
const args = Array.prototype.slice.call(arguments, 0)
return this._mount(Protocol.LDAP_REQ_UNBIND, 'unbind', args, true)
}
2011-08-04 20:32:01 +00:00
Server.prototype.use = function use () {
2020-10-31 21:07:32 +00:00
const args = Array.prototype.slice.call(arguments)
const chain = mergeFunctionArgs(args, 0, args.length)
const self = this
chain.forEach(function (c) {
self._chain.push(c)
})
}
2012-01-06 23:10:46 +00:00
Server.prototype.after = function () {
if (!this._postChain) { this._postChain = [] }
2020-10-31 21:07:32 +00:00
const self = this
mergeFunctionArgs(arguments).forEach(function (h) {
self._postChain.push(h)
})
}
// All these just reexpose the requisite net.Server APIs
Server.prototype.listen = function (port, host, callback) {
if (typeof (port) !== 'number' && typeof (port) !== 'string') { throw new TypeError('port (number or path) required') }
if (typeof (host) === 'function') {
callback = host
host = '0.0.0.0'
}
if (typeof (port) === 'string' && /^[0-9]+$/.test(port)) {
// Disambiguate between string ports and file paths
port = parseInt(port, 10)
}
2020-10-31 21:07:32 +00:00
const self = this
function cbListen () {
if (typeof (port) === 'number') {
self.host = self.address().address
self.port = self.address().port
} else {
self.host = port
self.port = self.server.fd
}
2011-08-04 20:32:01 +00:00
if (typeof (callback) === 'function') { callback() }
}
if (typeof (port) === 'number') {
return this.server.listen(port, host, cbListen)
} else {
return this.server.listen(port, cbListen)
}
}
Server.prototype.listenFD = function (fd) {
this.host = 'unix-domain-socket'
this.port = fd
return this.server.listenFD(fd)
}
Server.prototype.close = function (callback) {
return this.server.close(callback)
}
Server.prototype.address = function () {
return this.server.address()
}
2011-08-04 20:32:01 +00:00
Server.prototype.getConnections = function (callback) {
return this.server.getConnections(callback)
}
Server.prototype._getRoute = function (_dn, backend) {
assert.ok(dn)
2011-08-04 20:32:01 +00:00
if (!backend) { backend = this }
2011-08-04 20:32:01 +00:00
2020-10-31 21:07:32 +00:00
let name
if (_dn instanceof dn.DN) {
name = _dn.toString()
} else {
name = _dn
}
2011-08-04 20:32:01 +00:00
if (!this.routes[name]) {
this.routes[name] = {}
this.routes[name].backend = backend
this.routes[name].dn = _dn
// Force regeneration of the route key cache on next request
this._routeKeyCache = null
}
2011-08-04 20:32:01 +00:00
return this.routes[name]
}
2011-08-04 20:32:01 +00:00
Server.prototype._sortedRouteKeys = function _sortedRouteKeys () {
// The filtered/sorted route keys are cached to prevent needlessly
// regenerating the list for every incoming request.
if (!this._routeKeyCache) {
2020-10-31 21:07:32 +00:00
const self = this
const reversedRDNsToKeys = {}
// Generate mapping of reversedRDNs(DN) -> routeKey
Object.keys(this.routes).forEach(function (key) {
2020-10-31 21:07:32 +00:00
const _dn = self.routes[key].dn
// Ignore non-DN routes such as exop or unbind
if (_dn instanceof dn.DN) {
2020-10-31 21:07:32 +00:00
const reversed = _dn.clone()
reversed.rdns.reverse()
reversedRDNsToKeys[reversed.format()] = key
}
})
2020-10-31 21:07:32 +00:00
const output = []
// Reverse-sort on reversedRDS(DN) in order to output routeKey list.
// This will place more specific DNs in front of their parents:
// 1. dc=test, dc=domain, dc=sub
// 2. dc=test, dc=domain
// 3. dc=other, dc=foobar
Object.keys(reversedRDNsToKeys).sort().reverse().forEach(function (_dn) {
output.push(reversedRDNsToKeys[_dn])
})
this._routeKeyCache = output
}
return this._routeKeyCache
}
Server.prototype._getHandlerChain = function _getHandlerChain (req, res) {
assert.ok(req)
fireDTraceProbe(req, res)
2011-08-04 20:32:01 +00:00
2020-10-31 21:07:32 +00:00
const self = this
const routes = this.routes
let route
2011-11-19 00:39:37 +00:00
2011-08-24 19:38:23 +00:00
// check anonymous bind
if (req.protocolOp === Protocol.LDAP_REQ_BIND &&
req.dn.toString() === '' &&
req.credentials === '') {
return {
backend: self,
2011-11-19 00:39:37 +00:00
handlers: [defaultNoOpHandler]
}
2011-08-24 19:38:23 +00:00
}
2020-10-31 21:07:32 +00:00
const op = '0x' + req.protocolOp.toString(16)
// Special cases are exops, unbinds and abandons. Handle those first.
if (req.protocolOp === Protocol.LDAP_REQ_EXTENSION) {
route = routes[req.requestName]
if (route) {
return {
backend: route.backend,
handlers: (route[op] ? route[op] : [noExOpHandler])
}
} else {
return {
backend: self,
handlers: [noExOpHandler]
}
}
} else if (req.protocolOp === Protocol.LDAP_REQ_UNBIND) {
route = routes.unbind
if (route) {
return {
backend: route.backend,
handlers: route[op]
}
} else {
return {
backend: self,
handlers: [defaultNoOpHandler]
}
}
} else if (req.protocolOp === Protocol.LDAP_REQ_ABANDON) {
return {
backend: self,
handlers: [defaultNoOpHandler]
}
}
// Otherwise, match via DN rules
assert.ok(req.dn)
2020-10-31 21:07:32 +00:00
const keys = this._sortedRouteKeys()
let fallbackHandler = [noSuffixHandler]
// invalid DNs in non-strict mode are routed to the default handler
2020-10-31 21:07:32 +00:00
const testDN = (typeof (req.dn) === 'string') ? '' : req.dn
2020-10-31 21:07:32 +00:00
for (let i = 0; i < keys.length; i++) {
const suffix = keys[i]
route = routes[suffix]
assert.ok(route.dn)
// Match a valid route or the route wildcard ('')
if (route.dn.equals(testDN) || route.dn.parentOf(testDN) || suffix === '') {
if (route[op]) {
// We should be good to go.
req.suffix = route.dn
return {
backend: route.backend,
handlers: route[op]
}
} else {
if (suffix === '') {
break
} else {
// We found a valid suffix but not a valid operation.
// There might be a more generic suffix with a legitimate operation.
fallbackHandler = [defaultHandler]
}
}
}
}
return {
backend: self,
handlers: fallbackHandler
}
}
2011-08-15 16:44:31 +00:00
Server.prototype._mount = function (op, name, argv, notDN) {
assert.ok(op)
assert.ok(name !== undefined)
assert.ok(argv)
2011-08-15 16:44:31 +00:00
if (typeof (name) !== 'string') { throw new TypeError('name (string) required') }
if (!argv.length) { throw new Error('at least one handler required') }
2011-08-15 16:44:31 +00:00
2020-10-31 21:07:32 +00:00
let backend = this
let index = 0
if (typeof (argv[0]) === 'object' && !Array.isArray(argv[0])) {
backend = argv[0]
index = 1
2011-08-15 16:44:31 +00:00
}
2020-10-31 21:07:32 +00:00
const route = this._getRoute(notDN ? name : dn.parse(name), backend)
2012-01-06 23:10:46 +00:00
2020-10-31 21:07:32 +00:00
const chain = this._chain.slice()
argv.slice(index).forEach(function (a) {
chain.push(a)
})
route['0x' + op.toString(16)] = mergeFunctionArgs(chain)
2011-08-15 16:44:31 +00:00
return this
}