⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 slapo-pcache.5

📁 ldap服务器源码
💻 5
字号:
.TH SLAPO-PCACHE 5 "RELEASEDATE" "OpenLDAP LDVERSION".\" Copyright 1998-2007 The OpenLDAP Foundation, All Rights Reserved..\" Copying restrictions apply.  See the COPYRIGHT file..\" Copyright 2001, Pierangelo Masarati, All rights reserved. <ando@sys-net.it>.\" $OpenLDAP: pkg/ldap/doc/man/man5/slapo-pcache.5,v 1.3.2.10 2007/01/02 21:43:45 kurt Exp $.SH NAMEslapo-pcache \- proxycache overlay.SH SYNOPSISETCDIR/slapd.conf.SH DESCRIPTIONThe.B pcacheoverlay to.BR slapd (8)allows caching of LDAP search requests (queries) in a local database.For an incoming query, theproxy cache determines its corresponding \fBtemplate\fP. If the templatewas specified as cacheable using the \fBproxytemplate\fP directiveand the request is contained in a cached request, it is answered from the proxy cache.Otherwise, the search is performed as usual and cacheable search results are saved in the cache for use in future queries..LPA template is defined by a filter string and an index identifying a set ofattributes. The \fBtemplate string\fP for a query can be obtained byremoving assertion values from the RFC 2254 representation of its searchfilter. A query belongs to a template if its template string and set ofprojected attributes correspond to a cacheable template.Examples of template strings are \fB(mail=)\fP, \fB(|(sn=)(cn=))\fP,\fB(&(sn=)(givenName=))\fP..LP The config directives that are specific to the.B proxycacheoverlay can be prefixed by.BR proxycache\- ,to avoid conflicts with directives specific to the underlying databaseor to other stacked overlays.  This may be particularly useful for thosedirectives that refer to the backend used for local storage.The following cache specific directives can be used to configure the proxycache: .TP.B overlay pcacheThis directive adds the proxy cache overlay to the current backend. Theproxy cache overlay may be used with any backend but is intended for usewith the.BR ldap ,.BR meta ,and.BR sqlbackends..TP.B proxycache <database> <max_entries> <numattrsets> <entry_limit> <cc_period> The directive enables proxy caching in the current backend and sets generalcache parameters. A <database> backend will be used internally to maintainthe cached entries. The chosen database will need to be configured as well,as shown below. Cache replacement is invoked when the cache size grows to <max_entries> entries and continues till the cache size drops below this size.<numattrsets> should be equal to the number of following \fBproxyattrset\fPdirectives. Queries are cached only if they correspond to a cacheable template(specified by the \fBproxytemplate\fP directive) and the number of entriesreturned is less than <entry_limit>. Consistency check is performed every<cc_period> duration (specified in secs). In each cycle queries with expired"time to live(\fBTTL\fP)" are removed. A sample cache configuration is: .LP.RSproxycache \fBbdb 10000 1 50 100\fP.RE.TP.B proxycachequeries <queries>Specify the maximum number of queries to cache. The default is 10000..TP.B proxyattrset <index> <attrs...>Used to associate a set of attributes <attrs..> with an <index>. Each attributeset is associated with an integer from 0 to <numattrsets>-1. These indices areused by the \fBproxytemplate\fP directive to define cacheable templates. .TP.B proxytemplate <template_string> <attrset_index> <ttl> [<negttl>]Specifies a cacheable template and "time to live" (in sec) <ttl> of queries belonging to the template. An optional <negttl> can be used to specifythat negative results (i.e., queries that returned zero entries)should also be cached for the specified number of seconds. Negativeresults are not cached by default..TP.B response-callback { head | tail }Specifies whether the response callback should be placed at the.B tail(the default) or at the .B head(actually, wherever the stacking sequence would make it appear) of the callback list.  This affects how the overlay interacts with otheroverlays, since the proxycache overlay should be executed as early as possible (and thus configured as late as possible), to get a chance to return the cached results; however, if executed earlyat response, it would cache entries that may be later "massaged"by other databases and thus returned \fIafter\fP massaging the firsttime, and \fIbefore\fP massaging when cached..TPThere are some constraints:all values must be positive;.B <entry_limit>must be less than or equal to.BR <max_entries> ;.B <numattrsets>attribute sets SHOULD be defined by using the directive.BR proxyattrset ;all attribute sets SHOULD be referenced by (at least) one.B proxytemplatedirective; .LPThe following adds a template with filter string \fB(&(sn=)(givenName=))\fP and attributes mail, postaladdress, telephonenumber and a TTL of 1 hour. .LP.RS.nfproxyattrset \fB0 mail postaladdress telephonenumber\fPproxytemplate \fB(&(sn=)(givenName=)) 0 3600\fP.fi.RE.LPDirectives for configuring the underlying database must also be given, asshown here:.LP.RS.nfdirectory /var/tmp/cachecachesize 100.fi.RE.LPAny valid directives for the chosen database type may be used. Indexingshould be used as appropriate for the queries being handled. In addition,an equality index on the \fBqueryid\fP attribute should be configured, toassist in the removal of expired query data..SH CAVEATSCaching data is prone to inconsistencies because updates on the remote serverwill not be reflected in the response of the cache at least (and at most)for the duration of the.B proxytemplate.BR TTL .The remote server should expose the.B objectClass attribute because the underlying database that actually caches the entries may need it for optimal local processing of the queries.Another potential (and subtle) inconsistency may occur when data is retrieved with different identities and specific per-identity access controlis enforced by the remote server.If data was retrieved with an identity that collected only partial resultsbecause of access rules enforcement on the remote server, other userswith different access privileges on the remote server will get differentresults from the remote server and from the cache.If those users have higher access privileges on the remote server, they will get from the cache only a subset of the results they would get directly from the remote server; but if they have lower access privileges, they will get from the cache a superset of the results they would get directly from the remote server.Either occurrence may or may not be acceptable, based on the security policyof the cache and of the remote server.It is important to note that in this case the proxy is violating the securityof the remote server by disclosing to an identity data that was collected by another identity.For this reason, it is suggested that, when using.BR back-ldap ,proxy caching be used in conjunction with the .I identity assertionfeature of.BR slapd-ldap (5)(see the.B idassert-bindand the.B idassert-authzstatements), so that remote server interrogation occurs with a vanilla identity that has some relatively high.B searchand.B readaccess privileges, and the "real" access control is delegated to the proxy's ACLs.Beware that since only the cached fraction of the real datum is availableto the cache, it may not be possible to enforce the same access rules thatare defined on the remote server.When security is a concern, cached proxy access must be carefully tailored..SH FILES.TPETCDIR/slapd.confdefault slapd configuration file.SH SEE ALSO.BR slapd.conf (5),.BR slapd\-ldap (5),.BR slapd\-meta (5),.BR slapd\-sql (5),.BR slapd (8)..SH AUTHOROriginally implemented by Apurva Kumar as an extension to back-meta;turned into an overlay by Howard Chu.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -