mirror of
https://git.openldap.org/openldap/openldap.git
synced 2025-12-22 15:49:34 -05:00
Adhere to "servers will not return operational attributes" in
all cases (including root dse).
This commit is contained in:
parent
cabe6ebe16
commit
6ba2272321
3 changed files with 11 additions and 5 deletions
|
|
@ -497,9 +497,6 @@ AC_AIX
|
||||||
AC_ISC_POSIX
|
AC_ISC_POSIX
|
||||||
AC_MINIX
|
AC_MINIX
|
||||||
|
|
||||||
dnl BeOS requires -lbe -lroot -lnet
|
|
||||||
AC_CHECK_LIB(be, be_app, [LIBS="$LIBS -lbe -lroot -lnet"], :, [-lroot -lnet])
|
|
||||||
|
|
||||||
dnl Checks for system services
|
dnl Checks for system services
|
||||||
AC_CYGWIN
|
AC_CYGWIN
|
||||||
AC_MINGW32
|
AC_MINGW32
|
||||||
|
|
@ -508,6 +505,9 @@ AC_OBJEXT
|
||||||
|
|
||||||
AC_DEFINE_UNQUOTED( EXEEXT, "${EXEEXT}", [defined to be the EXE extension])
|
AC_DEFINE_UNQUOTED( EXEEXT, "${EXEEXT}", [defined to be the EXE extension])
|
||||||
|
|
||||||
|
dnl BeOS requires -lbe -lroot -lnet
|
||||||
|
AC_CHECK_LIB(be, be_app, [LIBS="$LIBS -lbe -lroot -lnet"], :, [-lroot -lnet])
|
||||||
|
|
||||||
dnl OpenLDAP requires STDC features
|
dnl OpenLDAP requires STDC features
|
||||||
AM_PROG_CC_STDC
|
AM_PROG_CC_STDC
|
||||||
if test "X${am_cv_prog_cc_stdc}" = "Xno" ; then
|
if test "X${am_cv_prog_cc_stdc}" = "Xno" ; then
|
||||||
|
|
@ -523,6 +523,7 @@ if test "${ol_cv_mkdep}" = no ; then
|
||||||
AC_MSG_WARN([do not know how to generate dependencies])
|
AC_MSG_WARN([do not know how to generate dependencies])
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
dnl ----------------------------------------------------------------
|
||||||
dnl Checks for libraries
|
dnl Checks for libraries
|
||||||
|
|
||||||
dnl Find socket()
|
dnl Find socket()
|
||||||
|
|
|
||||||
|
|
@ -91,7 +91,7 @@ root_dse_info( Connection *conn, Operation *op, char **attrs, int attrsonly )
|
||||||
for ( i=0; supportedSASLMechanisms[i] != NULL; i++ ) {
|
for ( i=0; supportedSASLMechanisms[i] != NULL; i++ ) {
|
||||||
val.bv_val = supportedSASLMechanisms[i];
|
val.bv_val = supportedSASLMechanisms[i];
|
||||||
val.bv_len = strlen( val.bv_val );
|
val.bv_len = strlen( val.bv_val );
|
||||||
attr_merge( e, "supportedSASLMechanism", vals );
|
attr_merge( e, "supportedSASLMechanisms", vals );
|
||||||
}
|
}
|
||||||
|
|
||||||
if ( default_referral != NULL ) {
|
if ( default_referral != NULL ) {
|
||||||
|
|
@ -99,7 +99,7 @@ root_dse_info( Connection *conn, Operation *op, char **attrs, int attrsonly )
|
||||||
}
|
}
|
||||||
|
|
||||||
send_search_entry( &backends[0], conn, op,
|
send_search_entry( &backends[0], conn, op,
|
||||||
e, attrs, attrsonly, 1, NULL );
|
e, attrs, attrsonly, 0, NULL );
|
||||||
send_search_result( conn, op, LDAP_SUCCESS,
|
send_search_result( conn, op, LDAP_SUCCESS,
|
||||||
NULL, NULL, NULL, NULL, 1 );
|
NULL, NULL, NULL, NULL, 1 );
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -145,6 +145,11 @@ static char *oc_operational_attrs[] = {
|
||||||
"dITContentRules",
|
"dITContentRules",
|
||||||
"nameForms",
|
"nameForms",
|
||||||
"ldapSyntaxes",
|
"ldapSyntaxes",
|
||||||
|
"namingContexts",
|
||||||
|
"supportedExtension",
|
||||||
|
"supportedControl",
|
||||||
|
"supportedSASLMechanisms",
|
||||||
|
"supportedLDAPversion",
|
||||||
NULL
|
NULL
|
||||||
|
|
||||||
};
|
};
|
||||||
|
|
|
||||||
Loading…
Reference in a new issue