<feed xmlns='http://www.w3.org/2005/Atom'>
<title>ds.git/ldap/servers/plugins/syntaxes, branch master</title>
<subtitle>Unnamed repository; edit this file to name it for gitweb.</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/rmeggins/public_git/ds.git/'/>
<entry>
<title>postalAddress syntax does not accept empty values</title>
<updated>2010-08-24T22:56:01+00:00</updated>
<author>
<name>Rich Megginson</name>
<email>rmeggins@redhat.com</email>
</author>
<published>2010-08-24T22:56:01+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/rmeggins/public_git/ds.git/commit/?id=148fa9c396e81a42296e5eaf9d66557342e59d6a'/>
<id>148fa9c396e81a42296e5eaf9d66557342e59d6a</id>
<content type='text'>
The postal_validate() function cannot accept an empty string as a valid
value of postalAddress syntax.  In addition, we were not properly checking
a value which did not contain a '$' character.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The postal_validate() function cannot accept an empty string as a valid
value of postalAddress syntax.  In addition, we were not properly checking
a value which did not contain a '$' character.
</pre>
</div>
</content>
</entry>
<entry>
<title>Bug 613056 - fix coverify Defect Type: Null pointer dereferences issues 11892 - 11939</title>
<updated>2010-08-20T18:48:26+00:00</updated>
<author>
<name>Endi S. Dewata</name>
<email>edewata@redhat.com</email>
</author>
<published>2010-07-10T01:26:57+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/rmeggins/public_git/ds.git/commit/?id=b89a1eae02412fcc13d8996645865b3359bb07cd'/>
<id>b89a1eae02412fcc13d8996645865b3359bb07cd</id>
<content type='text'>
https://bugzilla.redhat.com/show_bug.cgi?id=613056
Resolves: bug 613056
Bug description: Fix coverify Defect Type: Null pointer dereferences issues 11892 - 11939
Fix description: Catch possible NULL pointer in value_cmp().
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://bugzilla.redhat.com/show_bug.cgi?id=613056
Resolves: bug 613056
Bug description: Fix coverify Defect Type: Null pointer dereferences issues 11892 - 11939
Fix description: Catch possible NULL pointer in value_cmp().
</pre>
</div>
</content>
</entry>
<entry>
<title>Bug 617630 - fix coverify Defect Type: Resource leaks issues CID 12052 - 12093</title>
<updated>2010-08-19T23:59:33+00:00</updated>
<author>
<name>Endi S. Dewata</name>
<email>edewata@redhat.com</email>
</author>
<published>2010-07-24T06:15:17+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/rmeggins/public_git/ds.git/commit/?id=fd8ac10e935bca1f72bfe0f5735fe8f5c2572229'/>
<id>fd8ac10e935bca1f72bfe0f5735fe8f5c2572229</id>
<content type='text'>
https://bugzilla.redhat.com/show_bug.cgi?id=617630
Resolves: bug 617630
Bug description: fix coverify Defect Type: Resource leaks issues CID 12064, 12065.
description: string_assertion2keys_sub() has been modified to release resources before returning.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://bugzilla.redhat.com/show_bug.cgi?id=617630
Resolves: bug 617630
Bug description: fix coverify Defect Type: Resource leaks issues CID 12064, 12065.
description: string_assertion2keys_sub() has been modified to release resources before returning.
</pre>
</div>
</content>
</entry>
<entry>
<title>610281 - fix coverity Defect Type: Control flow issues</title>
<updated>2010-07-23T20:35:19+00:00</updated>
<author>
<name>Noriko Hosoi</name>
<email>nhosoi@redhat.com</email>
</author>
<published>2010-07-03T00:23:07+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/rmeggins/public_git/ds.git/commit/?id=732b57f12ed407bf7c1acb661bf48504b42b28ea'/>
<id>732b57f12ed407bf7c1acb661bf48504b42b28ea</id>
<content type='text'>
https://bugzilla.redhat.com/show_bug.cgi?id=610281

11815 DEADCODE Triaged Unassigned Bug Minor Fix Required
distinguishedname_validate() ds/ldap/servers/plugins/syntaxes/validate.c

Comment:
A variable val_copy is declared and initialized, but not used.
We remove these lines:
364 char *val_copy = NULL;
403 if (val_copy) {
Execution cannot reach this statement "slapi_ch_free_string(&amp;val_c...".
404 slapi_ch_free_string(&amp;val_copy);
405 }
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://bugzilla.redhat.com/show_bug.cgi?id=610281

11815 DEADCODE Triaged Unassigned Bug Minor Fix Required
distinguishedname_validate() ds/ldap/servers/plugins/syntaxes/validate.c

Comment:
A variable val_copy is declared and initialized, but not used.
We remove these lines:
364 char *val_copy = NULL;
403 if (val_copy) {
Execution cannot reach this statement "slapi_ch_free_string(&amp;val_c...".
404 slapi_ch_free_string(&amp;val_copy);
405 }
</pre>
</div>
</content>
</entry>
<entry>
<title>610281 - fix coverity Defect Type: Control flow issues</title>
<updated>2010-07-23T20:35:13+00:00</updated>
<author>
<name>Noriko Hosoi</name>
<email>nhosoi@redhat.com</email>
</author>
<published>2010-07-03T00:15:22+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/rmeggins/public_git/ds.git/commit/?id=c766b7ac3ce68eae18ace54805bdd3badcaf7a80'/>
<id>c766b7ac3ce68eae18ace54805bdd3badcaf7a80</id>
<content type='text'>
https://bugzilla.redhat.com/show_bug.cgi?id=610281

11814 DEADCODE Triaged Unassigned Bug Moderate Fix Required
string_filter_sub() ds/ldap/servers/plugins/syntaxes/string.c

Comment:
A code to update tmpbufsize was missing. This "tpbufsize = len + 1;"
is needed before slapi_ch_realloc.
351 tmpbufsize = len + 1;
352 tmpbuf = (char *) slapi_ch_realloc( tmpbuf, tmpbufsize );

Also, if (len &lt; tmpbufsize) were true (could not be true since
tmpbufsize never have been set), bvp-&gt;bv_val was copied to buf
which is not long enough for bvp-&gt;bv_val.  The bug was also
fixed.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://bugzilla.redhat.com/show_bug.cgi?id=610281

11814 DEADCODE Triaged Unassigned Bug Moderate Fix Required
string_filter_sub() ds/ldap/servers/plugins/syntaxes/string.c

Comment:
A code to update tmpbufsize was missing. This "tpbufsize = len + 1;"
is needed before slapi_ch_realloc.
351 tmpbufsize = len + 1;
352 tmpbuf = (char *) slapi_ch_realloc( tmpbuf, tmpbufsize );

Also, if (len &lt; tmpbufsize) were true (could not be true since
tmpbufsize never have been set), bvp-&gt;bv_val was copied to buf
which is not long enough for bvp-&gt;bv_val.  The bug was also
fixed.
</pre>
</div>
</content>
</entry>
<entry>
<title>591336 - Implementing upgrade DN format tool</title>
<updated>2010-05-17T23:47:55+00:00</updated>
<author>
<name>Noriko Hosoi</name>
<email>nhosoi@redhat.com</email>
</author>
<published>2010-05-17T23:47:55+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/rmeggins/public_git/ds.git/commit/?id=c12c48f47a0cdd7282950fa25e5e7548dd1c5ab0'/>
<id>c12c48f47a0cdd7282950fa25e5e7548dd1c5ab0</id>
<content type='text'>
Change description:
. adding upgradednformat utility to each server instance.
. adding 91upgradednformat.pl for in-place-upgrade.
. implementing ldbm_back_upgradednformat sharing the import/
  reincexing codes.
. adding a new DBVERSION ID "dn-4514" for the upgraded db.
. fixing access logs (delete.c and modify.c)
. fixing compiler warnings.
. fixing memory leaks.
. fixing a bug in syntax plugin to free strings.
. adding templates for plugin id, version, vendor, and description,
  which are needed for the online upgrade.
. dbversion_write takes an additional bit flags, which indicates
  which extra DBVERSION strings are written to the DBVERSION file.
  It was introduced for the upgrade tools not to intervene each
  other's tasks (e.g., dn2rdn for converting entrydn to entryrdn
  and upgradednformat for upgrading the DN format).
. fixing a bug in entryrdn index code which was missing to normalize
  RDN.

See also:
https://bugzilla.redhat.com/show_bug.cgi?id=591336
http://directory.fedoraproject.org/wiki/Upgrade_to_New_DN_Format#Migration.2FUpgrade
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Change description:
. adding upgradednformat utility to each server instance.
. adding 91upgradednformat.pl for in-place-upgrade.
. implementing ldbm_back_upgradednformat sharing the import/
  reincexing codes.
. adding a new DBVERSION ID "dn-4514" for the upgraded db.
. fixing access logs (delete.c and modify.c)
. fixing compiler warnings.
. fixing memory leaks.
. fixing a bug in syntax plugin to free strings.
. adding templates for plugin id, version, vendor, and description,
  which are needed for the online upgrade.
. dbversion_write takes an additional bit flags, which indicates
  which extra DBVERSION strings are written to the DBVERSION file.
  It was introduced for the upgrade tools not to intervene each
  other's tasks (e.g., dn2rdn for converting entrydn to entryrdn
  and upgradednformat for upgrading the DN format).
. fixing a bug in entryrdn index code which was missing to normalize
  RDN.

See also:
https://bugzilla.redhat.com/show_bug.cgi?id=591336
http://directory.fedoraproject.org/wiki/Upgrade_to_New_DN_Format#Migration.2FUpgrade
</pre>
</div>
</content>
</entry>
<entry>
<title>Update to New DN Format</title>
<updated>2010-04-26T18:03:52+00:00</updated>
<author>
<name>Noriko Hosoi</name>
<email>nhosoi@redhat.com</email>
</author>
<published>2010-04-26T18:03:52+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/rmeggins/public_git/ds.git/commit/?id=78c50664d6421cc5d0836bb03820680dc2cb7acf'/>
<id>78c50664d6421cc5d0836bb03820680dc2cb7acf</id>
<content type='text'>
Fix Description:
. adding slapi_dn_normalize_ext and its siblings to normalize/validate
  invalid DNs; deprecating slapi_dn_normalize and its siblings. (dn.c)
. replacing slapi_dn_normalize with new corresponding functions.
. normalizing hardcoded DNs (e.g., removing spaces around ',')
. setting correct DN syntax to nsslapd-suffix, nsslapd-ldapiautodnsuffix,
  costemplatedn, nsslapd-changelogsuffix, nsBaseDN, nsBindDN
. if nsslapd-dn-validate-strict is enabled, incoming DN is examined and
  rejected if it is invalid.  Once approved, the DN is normalized.
. fixing compiler warnings and typos.

See also:
http://directory.fedoraproject.org/wiki/Upgrade_to_New_DN_Format

Related bugs:
Bug 199923 - subtree search fails to find items under a db containing special
             characters
Bug 567968 - subtree/user level password policy created using 389-ds-console
             doesn't work.
Bug 570107 - The import of LDIFs with base-64 encoded DNs fails, modrdn with
             non-ASCII new rdn incorrect
Bug 570962 - ns-inactivate.pl does not work
Bug 572785 - DN syntax: old style of DN &lt;type&gt;="&lt;DN&gt;",&lt;the_rest&gt; is not
             correctly normalized
Bug 573060 - DN normalizer: ESC HEX HEX is not normalized
Bug 574167 - An escaped space at the end of the RDN value is not handled
             correctly
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Fix Description:
. adding slapi_dn_normalize_ext and its siblings to normalize/validate
  invalid DNs; deprecating slapi_dn_normalize and its siblings. (dn.c)
. replacing slapi_dn_normalize with new corresponding functions.
. normalizing hardcoded DNs (e.g., removing spaces around ',')
. setting correct DN syntax to nsslapd-suffix, nsslapd-ldapiautodnsuffix,
  costemplatedn, nsslapd-changelogsuffix, nsBaseDN, nsBindDN
. if nsslapd-dn-validate-strict is enabled, incoming DN is examined and
  rejected if it is invalid.  Once approved, the DN is normalized.
. fixing compiler warnings and typos.

See also:
http://directory.fedoraproject.org/wiki/Upgrade_to_New_DN_Format

Related bugs:
Bug 199923 - subtree search fails to find items under a db containing special
             characters
Bug 567968 - subtree/user level password policy created using 389-ds-console
             doesn't work.
Bug 570107 - The import of LDIFs with base-64 encoded DNs fails, modrdn with
             non-ASCII new rdn incorrect
Bug 570962 - ns-inactivate.pl does not work
Bug 572785 - DN syntax: old style of DN &lt;type&gt;="&lt;DN&gt;",&lt;the_rest&gt; is not
             correctly normalized
Bug 573060 - DN normalizer: ESC HEX HEX is not normalized
Bug 574167 - An escaped space at the end of the RDN value is not handled
             correctly
</pre>
</div>
</content>
</entry>
<entry>
<title>Bug 572162 - the string "|*" within a search filter on a non-indexed attribute returns all elements.</title>
<updated>2010-04-07T17:01:56+00:00</updated>
<author>
<name>Rich Megginson</name>
<email>rmeggins@redhat.com</email>
</author>
<published>2010-04-07T16:16:22+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/rmeggins/public_git/ds.git/commit/?id=b433e4c852a2ef78558dffc1ccbaf464c1186934'/>
<id>b433e4c852a2ef78558dffc1ccbaf464c1186934</id>
<content type='text'>
https://bugzilla.redhat.com/show_bug.cgi?id=572162
Resolves: bug 572162
Bug Description: the string "|*" within a search filter on a non-indexed attribute returns all elements.
Reviewed by: nhosoi (Thanks!)
Branch: HEAD
Fix Description: PCRE interprets the '|' character as the start of
alternative branch.  In the search filter, the other side of the '|' is
empty, which means match everything.  The solution is to escape this and
other PCRE special chars before matching.
Platforms tested: RHEL5 x86_64
Flag Day: no
Doc impact: no
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://bugzilla.redhat.com/show_bug.cgi?id=572162
Resolves: bug 572162
Bug Description: the string "|*" within a search filter on a non-indexed attribute returns all elements.
Reviewed by: nhosoi (Thanks!)
Branch: HEAD
Fix Description: PCRE interprets the '|' character as the start of
alternative branch.  In the search filter, the other side of the '|' is
empty, which means match everything.  The solution is to escape this and
other PCRE special chars before matching.
Platforms tested: RHEL5 x86_64
Flag Day: no
Doc impact: no
</pre>
</div>
</content>
</entry>
<entry>
<title>Bug 576074 - search filters with parentheses fail</title>
<updated>2010-03-25T18:26:30+00:00</updated>
<author>
<name>Rich Megginson</name>
<email>rmeggins@redhat.com</email>
</author>
<published>2010-03-25T17:51:26+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/rmeggins/public_git/ds.git/commit/?id=c1d2e7461ac41f39f5f27f3d9dcd6084bb4435a5'/>
<id>c1d2e7461ac41f39f5f27f3d9dcd6084bb4435a5</id>
<content type='text'>
https://bugzilla.redhat.com/show_bug.cgi?id=576074
Resolves: bug 576074
Bug Description: search filters with parentheses fail
Reviewed by: nhosoi (Thanks!)
Branch: HEAD
Fix Description: PCRE requires '(' and ')' to be escaped to match a literal
parenthesis.  Otherwise, it thinks the parenthesis is used for grouping.
Platforms tested: RHEL5 x86_64
Flag Day: no
Doc impact: no
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
https://bugzilla.redhat.com/show_bug.cgi?id=576074
Resolves: bug 576074
Bug Description: search filters with parentheses fail
Reviewed by: nhosoi (Thanks!)
Branch: HEAD
Fix Description: PCRE requires '(' and ')' to be escaped to match a literal
parenthesis.  Otherwise, it thinks the parenthesis is used for grouping.
Platforms tested: RHEL5 x86_64
Flag Day: no
Doc impact: no
</pre>
</div>
</content>
</entry>
<entry>
<title>199923 - subtree search fails to find items under a db</title>
<updated>2010-03-11T19:10:48+00:00</updated>
<author>
<name>Noriko Hosoi</name>
<email>nhosoi@redhat.com</email>
</author>
<published>2010-03-11T19:10:48+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/rmeggins/public_git/ds.git/commit/?id=f11afee0ca0c4039cebc0efe4388b95776b6da4b'/>
<id>f11afee0ca0c4039cebc0efe4388b95776b6da4b</id>
<content type='text'>
         containing special characters

https://bugzilla.redhat.com/show_bug.cgi?id=199923

Description: regression observed in the tests.
&gt; as of March 04, 2010, this is happening again.

Fix Description:
dn.c: Based upon RFC 4514, the following characters in the RDN
values need to be escaped:
  '+', ';', '&lt;', '&gt;', and '=' for the intermediate characters
  '+', ';', '&lt;', '&gt;', '=', '#' and ' ' for leading characters
  '+', ';', '&lt;', '&gt;', '=', and ' ' for trailing characters

validate.c: If an escaped character followed by another escaped
character, e.g., \#\&lt;,  the pointer was moved twice skipping '\'
before '&lt;' and it makes the validation fail.

ldbm_add.c: a local variable addr was not initialized.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
         containing special characters

https://bugzilla.redhat.com/show_bug.cgi?id=199923

Description: regression observed in the tests.
&gt; as of March 04, 2010, this is happening again.

Fix Description:
dn.c: Based upon RFC 4514, the following characters in the RDN
values need to be escaped:
  '+', ';', '&lt;', '&gt;', and '=' for the intermediate characters
  '+', ';', '&lt;', '&gt;', '=', '#' and ' ' for leading characters
  '+', ';', '&lt;', '&gt;', '=', and ' ' for trailing characters

validate.c: If an escaped character followed by another escaped
character, e.g., \#\&lt;,  the pointer was moved twice skipping '\'
before '&lt;' and it makes the validation fail.

ldbm_add.c: a local variable addr was not initialized.
</pre>
</div>
</content>
</entry>
</feed>
