2 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
4 * Copyright 1999-2005 The OpenLDAP Foundation.
5 * Portions Copyright 2001-2003 Pierangelo Masarati.
6 * Portions Copyright 1999-2003 Howard Chu.
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted only as authorized by the OpenLDAP
13 * A copy of this license is available in the file LICENSE in the
14 * top-level directory of the distribution or, alternatively, at
15 * <http://www.OpenLDAP.org/license.html>.
18 * This work was initially developed by the Howard Chu for inclusion
19 * in OpenLDAP Software and subsequently enhanced by Pierangelo
27 #include <ac/string.h>
28 #include <ac/socket.h>
32 #include "../back-ldap/back-ldap.h"
33 #undef ldap_debug /* silence a warning in ldap-int.h */
34 #include "../../../libraries/libldap/ldap-int.h"
35 #include "back-meta.h"
37 static struct metatarget *
40 struct metatarget *lt;
41 struct ldapmapping *mapping;
43 lt = ch_calloc( sizeof( struct metatarget ), 1 );
48 lt->mt_rwmap.rwm_rw = rewrite_info_init( REWRITE_MODE_USE_DEFAULT );
49 if ( lt->mt_rwmap.rwm_rw == NULL ) {
58 * the filter rewrite as a string must be disabled
59 * by default; it can be re-enabled by adding rules;
60 * this creates an empty rewriteContext
62 rargv[ 0 ] = "rewriteContext";
63 rargv[ 1 ] = "searchFilter";
65 rewrite_parse( lt->mt_rwmap.rwm_rw, "<suffix massage>",
68 rargv[ 0 ] = "rewriteContext";
69 rargv[ 1 ] = "default";
71 rewrite_parse( lt->mt_rwmap.rwm_rw, "<suffix massage>",
75 ldap_back_map_init( <->mt_rwmap.rwm_at, &mapping );
89 struct metainfo *li = ( struct metainfo * )be->be_private;
93 "%s: line %d: meta backend info is null!\n",
98 /* URI of server to query */
99 if ( strcasecmp( argv[ 0 ], "uri" ) == 0 ) {
100 int i = li->ntargets;
103 #endif /* uncomment if uri MUST be a branch of suffix */
104 LDAPURLDesc *ludp, *tmpludp;
110 "%s: line %d: missing address"
111 " in \"uri <protocol>://<server>[:port]/<naming context>\" line\n",
118 li->targets = ch_realloc( li->targets,
119 sizeof( struct metatarget *)*li->ntargets );
120 if ( li->targets == NULL ) {
122 "%s: line %d: out of memory while storing server name"
123 " in \"uri <protocol>://<server>[:port]/<naming context>\" line\n",
128 if ( ( li->targets[ i ] = new_target() ) == NULL ) {
130 "%s: line %d: unable to init server"
131 " in \"uri <protocol>://<server>[:port]/<naming context>\" line\n",
139 if ( ldap_url_parselist_ext( &ludp, argv[ 1 ], "\t" ) != LDAP_SUCCESS ) {
141 "%s: line %d: unable to parse URI"
142 " in \"uri <protocol>://<server>[:port]/<naming context>\" line\n",
148 * uri MUST have the <dn> part!
150 if ( ludp->lud_dn == NULL || ludp->lud_dn[ 0 ] == '\0' ) {
152 "%s: line %d: missing <naming context> "
153 " in \"uri <protocol>://<server>[:port]/<naming context>\" line\n",
159 * copies and stores uri and suffix
161 dn.bv_val = ludp->lud_dn;
162 dn.bv_len = strlen( ludp->lud_dn );
164 rc = dnPrettyNormal( NULL, &dn, &li->targets[ i ]->mt_psuffix,
165 &li->targets[ i ]->mt_nsuffix, NULL );
166 if( rc != LDAP_SUCCESS ) {
167 fprintf( stderr, "%s: line %d: "
168 "target '%s' DN is invalid\n",
169 fname, lineno, argv[ 1 ] );
173 ludp->lud_dn[ 0 ] = '\0';
175 /* check all, to apply the scope check on the first one */
176 for ( tmpludp = ludp; tmpludp; tmpludp = tmpludp->lud_next ) {
177 if ( tmpludp->lud_dn != NULL && tmpludp->lud_dn[ 0 ] != '\0' ) {
178 fprintf( stderr, "%s: line %d: "
179 "multiple URIs must have "
186 if ( tmpludp->lud_scope == LDAP_SCOPE_BASE ) {
187 tmpludp->lud_scope = LDAP_SCOPE_DEFAULT;
191 li->targets[ i ]->mt_uri = ldap_url_list2urls( ludp );
192 ldap_free_urllist( ludp );
193 if ( li->targets[ i ]->mt_uri == NULL) {
194 fprintf( stderr, "%s: line %d: no memory?\n",
200 * uri MUST be a branch of suffix!
202 #if 0 /* too strict a constraint */
203 if ( select_backend( &li->targets[ i ]->suffix, 0, 0 ) != be ) {
205 "%s: line %d: <naming context> of URI does not refer to current backend"
206 " in \"uri <protocol>://<server>[:port]/<naming context>\" line\n",
212 * uri MUST be a branch of a suffix!
214 if ( select_backend( &li->targets[ i ]->mt_nsuffix, 0, 0 ) == NULL ) {
216 "%s: line %d: <naming context> of URI does not resolve to a backend"
217 " in \"uri <protocol>://<server>[:port]/<naming context>\" line\n",
225 * uri MUST not be used by other URIs!
227 * FIXME: this limitation may be removed,
228 * or worked out, at least, in some manner
230 for ( j = 0; j < i-1; j++ ) {
231 if ( dn_match( &li->targets[ i ]->suffix,
232 &li->targets[ j ]->suffix ) ) {
234 "%s: line %d: naming context \"%s\" already used"
235 " in \"uri <protocol>://<server>[:port]/<naming context>\" line\n",
236 fname, lineno, last+1 );
243 fprintf(stderr, "%s: line %d: URI \"%s\", suffix \"%s\"\n",
244 fname, lineno, li->targets[ i ]->uri,
245 li->targets[ i ]->psuffix.bv_val );
248 /* default target directive */
249 } else if ( strcasecmp( argv[ 0 ], "default-target" ) == 0 ) {
250 int i = li->ntargets-1;
255 "%s: line %d: \"default-target\" alone need be"
256 " inside a \"uri\" directive\n",
260 li->defaulttarget = i;
262 if ( strcasecmp( argv[ 1 ], "none" ) == 0 ) {
265 "%s: line %d: \"default-target none\""
266 " should go before uri definitions\n",
269 li->defaulttarget = META_DEFAULT_TARGET_NONE;
271 int n = atoi( argv[ 1 ] );
272 if ( n < 1 || n >= i ) {
274 "%s: line %d: illegal target number %d\n",
278 li->defaulttarget = n-1;
282 /* ttl of dn cache */
283 } else if ( strcasecmp( argv[ 0 ], "dncache-ttl" ) == 0 ) {
286 "%s: line %d: missing ttl in \"dncache-ttl <ttl>\" line\n",
291 if ( strcasecmp( argv[ 1 ], "forever" ) == 0 ) {
292 li->cache.ttl = META_DNCACHE_FOREVER;
293 } else if ( strcasecmp( argv[ 1 ], "disabled" ) == 0 ) {
294 li->cache.ttl = META_DNCACHE_DISABLED;
296 li->cache.ttl = atol( argv[ 1 ] );
299 /* network timeout when connecting to ldap servers */
300 } else if ( strcasecmp( argv[ 0 ], "network-timeout" ) == 0 ) {
303 "%s: line %d: missing network timeout in \"network-timeout <seconds>\" line\n",
307 li->network_timeout = atol(argv[ 1 ]);
309 /* name to use for meta_back_group */
310 } else if ( strcasecmp( argv[ 0 ], "acl-authcDN" ) == 0
311 || strcasecmp( argv[ 0 ], "binddn" ) == 0 )
313 int i = li->ntargets-1;
318 "%s: line %d: need \"uri\" directive first\n",
325 "%s: line %d: missing name in \"binddn <name>\" line\n",
330 if ( strcasecmp( argv[ 0 ], "binddn" ) == 0 ) {
331 fprintf( stderr, "%s: line %d: "
332 "\"binddn\" statement is deprecated; "
333 "use \"acl-authcDN\" instead\n",
335 /* FIXME: some day we'll need to throw an error */
338 dn.bv_val = argv[ 1 ];
339 dn.bv_len = strlen( argv[ 1 ] );
340 if ( dnNormalize( 0, NULL, NULL, &dn, &li->targets[ i ]->mt_binddn,
341 NULL ) != LDAP_SUCCESS )
343 fprintf( stderr, "%s: line %d: "
344 "bind DN '%s' is invalid\n",
345 fname, lineno, argv[ 1 ] );
349 /* password to use for meta_back_group */
350 } else if ( strcasecmp( argv[ 0 ], "acl-passwd" ) == 0
351 || strcasecmp( argv[ 0 ], "bindpw" ) == 0 )
353 int i = li->ntargets-1;
357 "%s: line %d: need \"uri\" directive first\n",
364 "%s: line %d: missing password in \"bindpw <password>\" line\n",
369 if ( strcasecmp( argv[ 0 ], "bindpw" ) == 0 ) {
370 fprintf( stderr, "%s: line %d: "
371 "\"bindpw\" statement is deprecated; "
372 "use \"acl-passwd\" instead\n",
374 /* FIXME: some day we'll need to throw an error */
377 ber_str2bv( argv[ 1 ], 0L, 1, &li->targets[ i ]->mt_bindpw );
379 /* save bind creds for referral rebinds? */
380 } else if ( strcasecmp( argv[0], "rebind-as-user" ) == 0 ) {
383 "%s: line %d: rebind-as-user takes no arguments\n",
388 li->flags |= LDAP_BACK_F_SAVECRED;
390 } else if ( strcasecmp( argv[0], "chase-referrals" ) == 0 ) {
393 "%s: line %d: \"chase-referrals\" takes no arguments\n",
398 li->flags |= LDAP_BACK_F_CHASE_REFERRALS;
400 } else if ( strcasecmp( argv[0], "dont-chase-referrals" ) == 0 ) {
403 "%s: line %d: \"dont-chase-referrals\" takes no arguments\n",
408 li->flags &= ~LDAP_BACK_F_CHASE_REFERRALS;
410 } else if ( strncasecmp( argv[0], "tls-", STRLENOF( "tls-" ) ) == 0 ) {
413 if ( strcasecmp( argv[0], "tls-start" ) == 0 ) {
416 "%s: line %d: tls-start takes no arguments\n",
420 li->flags |= ( LDAP_BACK_F_USE_TLS | LDAP_BACK_F_TLS_CRITICAL );
423 } else if ( strcasecmp( argv[0], "tls-try-start" ) == 0 ) {
426 "%s: line %d: tls-try-start takes no arguments\n",
430 li->flags &= ~LDAP_BACK_F_TLS_CRITICAL;
431 li->flags |= LDAP_BACK_F_USE_TLS;
433 /* propagate start tls */
434 } else if ( strcasecmp( argv[0], "tls-propagate" ) == 0 ) {
437 "%s: line %d: tls-propagate takes no arguments\n",
441 li->flags |= ( LDAP_BACK_F_PROPAGATE_TLS | LDAP_BACK_F_TLS_CRITICAL );
444 } else if ( strcasecmp( argv[0], "tls-try-propagate" ) == 0 ) {
447 "%s: line %d: tls-try-propagate takes no arguments\n",
451 li->flags &= ~LDAP_BACK_F_TLS_CRITICAL;
452 li->flags |= LDAP_BACK_F_PROPAGATE_TLS;
455 /* name to use as pseudo-root dn */
456 } else if ( strcasecmp( argv[ 0 ], "pseudorootdn" ) == 0 ) {
457 int i = li->ntargets-1;
462 "%s: line %d: need \"uri\" directive first\n",
469 "%s: line %d: missing name in \"pseudorootdn <name>\" line\n",
474 dn.bv_val = argv[ 1 ];
475 dn.bv_len = strlen( argv[ 1 ] );
476 if ( dnNormalize( 0, NULL, NULL, &dn,
477 &li->targets[ i ]->mt_pseudorootdn, NULL ) != LDAP_SUCCESS )
479 fprintf( stderr, "%s: line %d: "
480 "pseudoroot DN '%s' is invalid\n",
481 fname, lineno, argv[ 1 ] );
485 /* password to use as pseudo-root */
486 } else if ( strcasecmp( argv[ 0 ], "pseudorootpw" ) == 0 ) {
487 int i = li->ntargets-1;
491 "%s: line %d: need \"uri\" directive first\n",
498 "%s: line %d: missing password in \"pseudorootpw <password>\" line\n",
502 ber_str2bv( argv[ 1 ], 0L, 1, &li->targets[ i ]->mt_pseudorootpw );
505 } else if ( strcasecmp( argv[ 0 ], "suffixmassage" ) == 0 ) {
507 int i = li->ntargets-1;
508 struct berval dn, nvnc, pvnc, nrnc, prnc;
512 "%s: line %d: need \"uri\" directive first\n",
520 * suffixmassage <suffix> <massaged suffix>
522 * the <suffix> field must be defined as a valid suffix
523 * (or suffixAlias?) for the current database;
524 * the <massaged suffix> shouldn't have already been
525 * defined as a valid suffix or suffixAlias for the
530 "%s: line %d: syntax is \"suffixMassage <suffix> <massaged suffix>\"\n",
535 dn.bv_val = argv[ 1 ];
536 dn.bv_len = strlen( argv[ 1 ] );
537 if ( dnPrettyNormal( NULL, &dn, &pvnc, &nvnc, NULL ) != LDAP_SUCCESS ) {
538 fprintf( stderr, "%s: line %d: "
539 "suffix '%s' is invalid\n",
540 fname, lineno, argv[ 1 ] );
544 tmp_be = select_backend( &nvnc, 0, 0 );
545 if ( tmp_be != NULL && tmp_be != be ) {
547 "%s: line %d: suffix already in use by another backend in"
548 " \"suffixMassage <suffix> <massaged suffix>\"\n",
555 dn.bv_val = argv[ 2 ];
556 dn.bv_len = strlen( argv[ 2 ] );
557 if ( dnPrettyNormal( NULL, &dn, &prnc, &nrnc, NULL ) != LDAP_SUCCESS ) {
558 fprintf( stderr, "%s: line %d: "
559 "massaged suffix '%s' is invalid\n",
560 fname, lineno, argv[ 2 ] );
567 tmp_be = select_backend( &nrnc, 0, 0 );
568 if ( tmp_be != NULL ) {
570 "%s: line %d: massaged suffix already in use by another backend in"
571 " \"suffixMassage <suffix> <massaged suffix>\"\n",
582 * The suffix massaging is emulated by means of the
583 * rewrite capabilities
584 * FIXME: no extra rewrite capabilities should be added
587 return suffix_massage_config( li->targets[ i ]->mt_rwmap.rwm_rw,
588 &pvnc, &nvnc, &prnc, &nrnc );
590 /* rewrite stuff ... */
591 } else if ( strncasecmp( argv[ 0 ], "rewrite", 7 ) == 0 ) {
592 int i = li->ntargets-1;
595 if ( strcasecmp( argv[0], "rewriteEngine" ) == 0 ) {
596 li->rwinfo = rewrite_info_init( REWRITE_MODE_USE_DEFAULT );
598 return rewrite_parse( li->rwinfo, fname, lineno,
602 return rewrite_parse( li->targets[ i ]->mt_rwmap.rwm_rw,
603 fname, lineno, argc, argv );
605 /* objectclass/attribute mapping */
606 } else if ( strcasecmp( argv[ 0 ], "map" ) == 0 ) {
607 int i = li->ntargets-1;
611 "%s: line %d: need \"uri\" directive first\n",
616 return ldap_back_map_config( &li->targets[ i ]->mt_rwmap.rwm_oc,
617 &li->targets[ i ]->mt_rwmap.rwm_at,
618 fname, lineno, argc, argv );
621 return SLAP_CONF_UNKNOWN;
627 ldap_back_map_config(
628 struct ldapmap *oc_map,
629 struct ldapmap *at_map,
636 struct ldapmapping *mapping;
640 if ( argc < 3 || argc > 4 ) {
642 "%s: line %d: syntax is \"map {objectclass | attribute} [<local> | *] {<foreign> | *}\"\n",
647 if ( strcasecmp( argv[1], "objectclass" ) == 0 ) {
651 } else if ( strcasecmp( argv[1], "attribute" ) == 0 ) {
655 fprintf( stderr, "%s: line %d: syntax is "
656 "\"map {objectclass | attribute} [<local> | *] "
657 "{<foreign> | *}\"\n",
662 if ( strcmp( argv[2], "*" ) == 0 ) {
663 if ( argc < 4 || strcmp( argv[3], "*" ) == 0 ) {
664 map->drop_missing = ( argc < 4 );
669 } else if ( argc < 4 ) {
675 dst = ( strcmp( argv[3], "*" ) == 0 ? src : argv[3] );
678 if ( ( map == at_map )
679 && ( strcasecmp( src, "objectclass" ) == 0
680 || strcasecmp( dst, "objectclass" ) == 0 ) )
683 "%s: line %d: objectclass attribute cannot be mapped\n",
687 mapping = (struct ldapmapping *)ch_calloc( 2,
688 sizeof(struct ldapmapping) );
689 if ( mapping == NULL ) {
691 "%s: line %d: out of memory\n",
695 ber_str2bv( src, 0, 1, &mapping->src );
696 ber_str2bv( dst, 0, 1, &mapping->dst );
697 mapping[1].src = mapping->dst;
698 mapping[1].dst = mapping->src;
704 if ( src[0] != '\0' ) {
705 if ( oc_bvfind( &mapping->src ) == NULL ) {
707 "%s: line %d: warning, source objectClass '%s' "
708 "should be defined in schema\n",
709 fname, lineno, src );
712 * FIXME: this should become an err
718 if ( oc_bvfind( &mapping->dst ) == NULL ) {
720 "%s: line %d: warning, destination objectClass '%s' "
721 "is not defined in schema\n",
722 fname, lineno, dst );
726 const char *text = NULL;
727 AttributeDescription *ad = NULL;
729 if ( src[0] != '\0' ) {
730 rc = slap_bv2ad( &mapping->src, &ad, &text );
731 if ( rc != LDAP_SUCCESS ) {
733 "%s: line %d: warning, source attributeType '%s' "
734 "should be defined in schema\n",
735 fname, lineno, src );
738 * FIXME: this should become an err
746 rc = slap_bv2ad( &mapping->dst, &ad, &text );
747 if ( rc != LDAP_SUCCESS ) {
749 "%s: line %d: warning, destination attributeType '%s' "
750 "is not defined in schema\n",
751 fname, lineno, dst );
755 if ( (src[0] != '\0' && avl_find( map->map, (caddr_t)mapping, mapping_cmp ) != NULL)
756 || avl_find( map->remap, (caddr_t)&mapping[1], mapping_cmp ) != NULL)
759 "%s: line %d: duplicate mapping found (ignored)\n",
764 if ( src[0] != '\0' ) {
765 avl_insert( &map->map, (caddr_t)mapping,
766 mapping_cmp, mapping_dup );
768 avl_insert( &map->remap, (caddr_t)&mapping[1],
769 mapping_cmp, mapping_dup );
775 ch_free( mapping->src.bv_val );
776 ch_free( mapping->dst.bv_val );
784 #ifdef ENABLE_REWRITE
786 suffix_massage_regexize( const char *s )
793 ( r = strchr( p, ',' ) ) != NULL;
797 res = ch_calloc( sizeof( char ), strlen( s ) + 4 + 4*i + 1 );
799 ptr = lutil_strcopy( res, "(.*)" );
801 ( r = strchr( p, ',' ) ) != NULL;
803 ptr = lutil_strncopy( ptr, p, r - p + 1 );
804 ptr = lutil_strcopy( ptr, "[ ]?" );
806 if ( r[ 1 ] == ' ' ) {
810 lutil_strcopy( ptr, p );
816 suffix_massage_patternize( const char *s )
823 res = ch_calloc( sizeof( char ), len + sizeof( "%1" ) );
829 strcpy( res + sizeof( "%1" ) - 1, s );
835 suffix_massage_config(
836 struct rewrite_info *info,
846 rargv[ 0 ] = "rewriteEngine";
849 rewrite_parse( info, "<suffix massage>", ++line, 2, rargv );
851 rargv[ 0 ] = "rewriteContext";
852 rargv[ 1 ] = "default";
854 rewrite_parse( info, "<suffix massage>", ++line, 2, rargv );
856 rargv[ 0 ] = "rewriteRule";
857 rargv[ 1 ] = suffix_massage_regexize( pvnc->bv_val );
858 rargv[ 2 ] = suffix_massage_patternize( prnc->bv_val );
861 rewrite_parse( info, "<suffix massage>", ++line, 4, rargv );
862 ch_free( rargv[ 1 ] );
863 ch_free( rargv[ 2 ] );
865 rargv[ 0 ] = "rewriteContext";
866 rargv[ 1 ] = "searchEntryDN";
868 rewrite_parse( info, "<suffix massage>", ++line, 2, rargv );
870 rargv[ 0 ] = "rewriteRule";
871 rargv[ 1 ] = suffix_massage_regexize( prnc->bv_val );
872 rargv[ 2 ] = suffix_massage_patternize( pvnc->bv_val );
875 rewrite_parse( info, "<suffix massage>", ++line, 4, rargv );
876 ch_free( rargv[ 1 ] );
877 ch_free( rargv[ 2 ] );
879 /* backward compatibility */
880 rargv[ 0 ] = "rewriteContext";
881 rargv[ 1 ] = "searchResult";
882 rargv[ 2 ] = "alias";
883 rargv[ 3 ] = "searchEntryDN";
885 rewrite_parse( info, "<suffix massage>", ++line, 4, rargv );
887 rargv[ 0 ] = "rewriteContext";
888 rargv[ 1 ] = "matchedDN";
889 rargv[ 2 ] = "alias";
890 rargv[ 3 ] = "searchEntryDN";
892 rewrite_parse( info, "<suffix massage>", ++line, 4, rargv );
894 rargv[ 0 ] = "rewriteContext";
895 rargv[ 1 ] = "searchAttrDN";
896 rargv[ 2 ] = "alias";
897 rargv[ 3 ] = "searchEntryDN";
899 rewrite_parse( info, "<suffix massage>", ++line, 4, rargv );
901 /* NOTE: this corresponds to #undef'ining RWM_REFERRAL_REWRITE;
902 * see servers/slapd/overlays/rwm.h for details */
903 rargv[ 0 ] = "rewriteContext";
904 rargv[ 1 ] = "referralAttrDN";
906 rewrite_parse( info, "<suffix massage>", ++line, 2, rargv );
908 rargv[ 0 ] = "rewriteContext";
909 rargv[ 1 ] = "referralDN";
911 rewrite_parse( info, "<suffix massage>", ++line, 2, rargv );
915 #endif /* ENABLE_REWRITE */