1 /* map.c - ldap backend mapping routines */
3 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
5 * Copyright 1998-2009 The OpenLDAP Foundation.
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted only as authorized by the OpenLDAP
12 * A copy of this license is available in the file LICENSE in the
13 * top-level directory of the distribution or, alternatively, at
14 * <http://www.OpenLDAP.org/license.html>.
17 * This work was initially developed by the Howard Chu for inclusion
18 * in OpenLDAP Software and subsequently enhanced by Pierangelo
21 /* This is an altered version */
23 * Copyright 1999, Howard Chu, All rights reserved. <hyc@highlandsun.com>
25 * Permission is granted to anyone to use this software for any purpose
26 * on any computer system, and to alter it and redistribute it, subject
27 * to the following restrictions:
29 * 1. The author is not responsible for the consequences of use of this
30 * software, no matter how awful, even if they arise from flaws in it.
32 * 2. The origin of this software must not be misrepresented, either by
33 * explicit claim or by omission. Since few users ever read sources,
34 * credits should appear in the documentation.
36 * 3. Altered versions must be plainly marked as such, and must not be
37 * misrepresented as being the original software. Since few users
38 * ever read sources, credits should appear in the documentation.
40 * 4. This notice may not be removed or altered.
44 * Copyright 2000, Pierangelo Masarati, All rights reserved. <ando@sys-net.it>
46 * This software is being modified by Pierangelo Masarati.
47 * The previously reported conditions apply to the modified code as well.
48 * Changes in the original code are highlighted where required.
49 * Credits for the original code go to the author, Howard Chu.
56 #include <ac/string.h>
57 #include <ac/socket.h>
61 #include "../back-ldap/back-ldap.h"
62 #include "back-meta.h"
64 #undef ldap_debug /* silence a warning in ldap-int.h */
65 #include "../../../libraries/libldap/ldap-int.h"
68 mapping_cmp ( const void *c1, const void *c2 )
70 struct ldapmapping *map1 = (struct ldapmapping *)c1;
71 struct ldapmapping *map2 = (struct ldapmapping *)c2;
72 int rc = map1->src.bv_len - map2->src.bv_len;
74 return ( strcasecmp( map1->src.bv_val, map2->src.bv_val ) );
78 mapping_dup ( void *c1, void *c2 )
80 struct ldapmapping *map1 = (struct ldapmapping *)c1;
81 struct ldapmapping *map2 = (struct ldapmapping *)c2;
83 return ( ( strcasecmp( map1->src.bv_val, map2->src.bv_val ) == 0 ) ? -1 : 0 );
87 ldap_back_map_init ( struct ldapmap *lm, struct ldapmapping **m )
89 struct ldapmapping *mapping;
95 mapping = (struct ldapmapping *)ch_calloc( 2,
96 sizeof( struct ldapmapping ) );
97 if ( mapping == NULL ) {
101 ber_str2bv( "objectclass", STRLENOF("objectclass"), 1, &mapping[0].src);
102 ber_dupbv( &mapping[0].dst, &mapping[0].src );
103 mapping[1].src = mapping[0].src;
104 mapping[1].dst = mapping[0].dst;
106 avl_insert( &lm->map, (caddr_t)&mapping[0],
107 mapping_cmp, mapping_dup );
108 avl_insert( &lm->remap, (caddr_t)&mapping[1],
109 mapping_cmp, mapping_dup );
114 ldap_back_mapping ( struct ldapmap *map, struct berval *s, struct ldapmapping **m,
118 struct ldapmapping fmapping;
122 /* let special attrnames slip through (ITS#5760) */
123 if ( bvmatch( s, slap_bv_no_attrs )
124 || bvmatch( s, slap_bv_all_user_attrs )
125 || bvmatch( s, slap_bv_all_operational_attrs ) )
131 if ( remap == BACKLDAP_REMAP ) {
139 *m = (struct ldapmapping *)avl_find( tree, (caddr_t)&fmapping, mapping_cmp );
141 return map->drop_missing;
148 ldap_back_map ( struct ldapmap *map, struct berval *s, struct berval *bv,
151 struct ldapmapping *mapping;
153 /* map->map may be NULL when mapping is configured,
154 * but map->remap can't */
155 if ( map->remap == NULL ) {
161 ( void )ldap_back_mapping( map, s, &mapping, remap );
162 if ( mapping != NULL ) {
163 if ( !BER_BVISNULL( &mapping->dst ) ) {
169 if ( !map->drop_missing ) {
176 struct ldapmap *at_map,
184 struct berval mapped;
187 *mapped_attrs = NULL;
191 for ( i = 0; !BER_BVISNULL( &an[i].an_name ); i++ )
194 na = (char **)ch_calloc( i + 1, sizeof(char *) );
196 *mapped_attrs = NULL;
197 return LDAP_NO_MEMORY;
200 for ( i = j = 0; !BER_BVISNULL( &an[i].an_name ); i++ ) {
201 ldap_back_map( at_map, &an[i].an_name, &mapped, remap );
202 if ( !BER_BVISNULL( &mapped ) && !BER_BVISEMPTY( &mapped ) ) {
203 na[j++] = mapped.bv_val;
206 if ( j == 0 && i != 0 ) {
207 na[j++] = LDAP_NO_ATTRS;
218 AttributeDescription *ad,
219 struct berval *mapped_attr,
220 struct berval *value,
221 struct berval *mapped_value,
227 ldap_back_map( &dc->target->mt_rwmap.rwm_at, &ad->ad_cname, mapped_attr, remap );
228 if ( BER_BVISNULL( mapped_attr ) || BER_BVISEMPTY( mapped_attr ) ) {
231 * FIXME: are we sure we need to search oc_map if at_map fails?
233 ldap_back_map( &dc->target->mt_rwmap.rwm_oc, &ad->ad_cname, mapped_attr, remap );
234 if ( BER_BVISNULL( mapped_attr ) || BER_BVISEMPTY( mapped_attr ) ) {
235 *mapped_attr = ad->ad_cname;
238 if ( dc->target->mt_rwmap.rwm_at.drop_missing ) {
242 *mapped_attr = ad->ad_cname;
245 if ( value == NULL ) {
249 if ( ad->ad_type->sat_syntax == slap_schema.si_syn_distinguishedName )
253 #ifdef ENABLE_REWRITE
254 fdc.ctx = "searchFilterAttrDN";
257 switch ( ldap_back_dn_massage( &fdc, value, &vtmp ) ) {
259 if ( vtmp.bv_val != value->bv_val ) {
264 case LDAP_UNWILLING_TO_PERFORM:
271 } else if ( ad->ad_type->sat_equality->smr_usage & SLAP_MR_MUTATION_NORMALIZER ) {
272 if ( ad->ad_type->sat_equality->smr_normalize(
273 (SLAP_MR_DENORMALIZE|SLAP_MR_VALUE_OF_ASSERTION_SYNTAX),
274 NULL, NULL, value, &vtmp, NULL ) )
280 } else if ( ad == slap_schema.si_ad_objectClass || ad == slap_schema.si_ad_structuralObjectClass ) {
281 ldap_back_map( &dc->target->mt_rwmap.rwm_oc, value, &vtmp, remap );
282 if ( BER_BVISNULL( &vtmp ) || BER_BVISEMPTY( &vtmp ) ) {
290 filter_escape_value( &vtmp, mapped_value );
293 ber_memfree( vtmp.bv_val );
300 ldap_back_int_filter_map_rewrite(
312 /* better than nothing... */
313 ber_bvfalse = BER_BVC( "(!(objectClass=*))" ),
314 ber_bvtf_false = BER_BVC( "(|)" ),
315 /* better than nothing... */
316 ber_bvtrue = BER_BVC( "(objectClass=*)" ),
317 ber_bvtf_true = BER_BVC( "(&)" ),
319 /* no longer needed; preserved for completeness */
320 ber_bvundefined = BER_BVC( "(?=undefined)" ),
322 ber_bverror = BER_BVC( "(?=error)" ),
323 ber_bvunknown = BER_BVC( "(?=unknown)" ),
324 ber_bvnone = BER_BVC( "(?=none)" );
327 assert( fstr != NULL );
331 ber_dupbv( fstr, &ber_bvnone );
335 switch ( ( f->f_choice & SLAPD_FILTER_MASK ) ) {
336 case LDAP_FILTER_EQUALITY:
337 if ( map_attr_value( dc, f->f_av_desc, &atmp,
338 &f->f_av_value, &vtmp, remap ) )
343 fstr->bv_len = atmp.bv_len + vtmp.bv_len
344 + ( sizeof("(=)") - 1 );
345 fstr->bv_val = ch_malloc( fstr->bv_len + 1 );
347 snprintf( fstr->bv_val, fstr->bv_len + 1, "(%s=%s)",
348 atmp.bv_val, vtmp.bv_len ? vtmp.bv_val : "" );
350 ber_memfree( vtmp.bv_val );
354 if ( map_attr_value( dc, f->f_av_desc, &atmp,
355 &f->f_av_value, &vtmp, remap ) )
360 fstr->bv_len = atmp.bv_len + vtmp.bv_len
361 + ( sizeof("(>=)") - 1 );
362 fstr->bv_val = ch_malloc( fstr->bv_len + 1 );
364 snprintf( fstr->bv_val, fstr->bv_len + 1, "(%s>=%s)",
365 atmp.bv_val, vtmp.bv_len ? vtmp.bv_val : "" );
367 ber_memfree( vtmp.bv_val );
371 if ( map_attr_value( dc, f->f_av_desc, &atmp,
372 &f->f_av_value, &vtmp, remap ) )
377 fstr->bv_len = atmp.bv_len + vtmp.bv_len
378 + ( sizeof("(<=)") - 1 );
379 fstr->bv_val = ch_malloc( fstr->bv_len + 1 );
381 snprintf( fstr->bv_val, fstr->bv_len + 1, "(%s<=%s)",
382 atmp.bv_val, vtmp.bv_len ? vtmp.bv_val : "" );
384 ber_memfree( vtmp.bv_val );
387 case LDAP_FILTER_APPROX:
388 if ( map_attr_value( dc, f->f_av_desc, &atmp,
389 &f->f_av_value, &vtmp, remap ) )
394 fstr->bv_len = atmp.bv_len + vtmp.bv_len
395 + ( sizeof("(~=)") - 1 );
396 fstr->bv_val = ch_malloc( fstr->bv_len + 1 );
398 snprintf( fstr->bv_val, fstr->bv_len + 1, "(%s~=%s)",
399 atmp.bv_val, vtmp.bv_len ? vtmp.bv_val : "" );
401 ber_memfree( vtmp.bv_val );
404 case LDAP_FILTER_SUBSTRINGS:
405 if ( map_attr_value( dc, f->f_sub_desc, &atmp,
406 NULL, NULL, remap ) )
411 /* cannot be a DN ... */
413 fstr->bv_len = atmp.bv_len + ( STRLENOF( "(=*)" ) );
414 fstr->bv_val = ch_malloc( fstr->bv_len + 128 ); /* FIXME: why 128 ? */
416 snprintf( fstr->bv_val, fstr->bv_len + 1, "(%s=*)",
419 if ( !BER_BVISNULL( &f->f_sub_initial ) ) {
422 filter_escape_value( &f->f_sub_initial, &vtmp );
424 fstr->bv_len += vtmp.bv_len;
425 fstr->bv_val = ch_realloc( fstr->bv_val, fstr->bv_len + 1 );
427 snprintf( &fstr->bv_val[len - 2], vtmp.bv_len + 3,
428 /* "(attr=" */ "%s*)",
429 vtmp.bv_len ? vtmp.bv_val : "" );
431 ber_memfree( vtmp.bv_val );
434 if ( f->f_sub_any != NULL ) {
435 for ( i = 0; !BER_BVISNULL( &f->f_sub_any[i] ); i++ ) {
437 filter_escape_value( &f->f_sub_any[i], &vtmp );
439 fstr->bv_len += vtmp.bv_len + 1;
440 fstr->bv_val = ch_realloc( fstr->bv_val, fstr->bv_len + 1 );
442 snprintf( &fstr->bv_val[len - 1], vtmp.bv_len + 3,
443 /* "(attr=[init]*[any*]" */ "%s*)",
444 vtmp.bv_len ? vtmp.bv_val : "" );
445 ber_memfree( vtmp.bv_val );
449 if ( !BER_BVISNULL( &f->f_sub_final ) ) {
452 filter_escape_value( &f->f_sub_final, &vtmp );
454 fstr->bv_len += vtmp.bv_len;
455 fstr->bv_val = ch_realloc( fstr->bv_val, fstr->bv_len + 1 );
457 snprintf( &fstr->bv_val[len - 1], vtmp.bv_len + 3,
458 /* "(attr=[init*][any*]" */ "%s)",
459 vtmp.bv_len ? vtmp.bv_val : "" );
461 ber_memfree( vtmp.bv_val );
466 case LDAP_FILTER_PRESENT:
467 if ( map_attr_value( dc, f->f_desc, &atmp,
468 NULL, NULL, remap ) )
473 fstr->bv_len = atmp.bv_len + ( STRLENOF( "(=*)" ) );
474 fstr->bv_val = ch_malloc( fstr->bv_len + 1 );
476 snprintf( fstr->bv_val, fstr->bv_len + 1, "(%s=*)",
480 case LDAP_FILTER_AND:
482 case LDAP_FILTER_NOT:
483 fstr->bv_len = STRLENOF( "(%)" );
484 fstr->bv_val = ch_malloc( fstr->bv_len + 128 ); /* FIXME: why 128? */
486 snprintf( fstr->bv_val, fstr->bv_len + 1, "(%c)",
487 f->f_choice == LDAP_FILTER_AND ? '&' :
488 f->f_choice == LDAP_FILTER_OR ? '|' : '!' );
490 for ( p = f->f_list; p != NULL; p = p->f_next ) {
495 rc = ldap_back_int_filter_map_rewrite( dc, p, &vtmp, remap );
496 if ( rc != LDAP_SUCCESS ) {
500 fstr->bv_len += vtmp.bv_len;
501 fstr->bv_val = ch_realloc( fstr->bv_val, fstr->bv_len + 1 );
503 snprintf( &fstr->bv_val[len-1], vtmp.bv_len + 2,
504 /*"("*/ "%s)", vtmp.bv_len ? vtmp.bv_val : "" );
506 ch_free( vtmp.bv_val );
511 case LDAP_FILTER_EXT:
512 if ( f->f_mr_desc ) {
513 if ( map_attr_value( dc, f->f_mr_desc, &atmp,
514 &f->f_mr_value, &vtmp, remap ) )
520 BER_BVSTR( &atmp, "" );
521 filter_escape_value( &f->f_mr_value, &vtmp );
524 /* FIXME: cleanup (less ?: operators...) */
525 fstr->bv_len = atmp.bv_len +
526 ( f->f_mr_dnattrs ? STRLENOF( ":dn" ) : 0 ) +
527 ( !BER_BVISEMPTY( &f->f_mr_rule_text ) ? f->f_mr_rule_text.bv_len + 1 : 0 ) +
528 vtmp.bv_len + ( STRLENOF( "(:=)" ) );
529 fstr->bv_val = ch_malloc( fstr->bv_len + 1 );
531 snprintf( fstr->bv_val, fstr->bv_len + 1, "(%s%s%s%s:=%s)",
533 f->f_mr_dnattrs ? ":dn" : "",
534 !BER_BVISEMPTY( &f->f_mr_rule_text ) ? ":" : "",
535 !BER_BVISEMPTY( &f->f_mr_rule_text ) ? f->f_mr_rule_text.bv_val : "",
536 vtmp.bv_len ? vtmp.bv_val : "" );
537 ber_memfree( vtmp.bv_val );
540 case SLAPD_FILTER_COMPUTED:
541 switch ( f->f_result ) {
542 /* FIXME: treat UNDEFINED as FALSE */
543 case SLAPD_COMPARE_UNDEFINED:
545 if ( META_BACK_TGT_NOUNDEFFILTER( dc->target ) ) {
546 return LDAP_COMPARE_FALSE;
550 case LDAP_COMPARE_FALSE:
551 if ( META_BACK_TGT_T_F( dc->target ) ) {
552 tmp = &ber_bvtf_false;
558 case LDAP_COMPARE_TRUE:
559 if ( META_BACK_TGT_T_F( dc->target ) ) {
560 tmp = &ber_bvtf_true;
572 ber_dupbv( fstr, tmp );
576 ber_dupbv( fstr, &ber_bvunknown );
584 ldap_back_filter_map_rewrite(
593 static char *dmy = "";
595 rc = ldap_back_int_filter_map_rewrite( dc, f, fstr, remap );
597 #ifdef ENABLE_REWRITE
598 if ( rc != LDAP_SUCCESS ) {
605 fdc.ctx = "searchFilter";
607 switch ( rewrite_session( fdc.target->mt_rwmap.rwm_rw, fdc.ctx,
608 ( !BER_BVISEMPTY( &ftmp ) ? ftmp.bv_val : dmy ),
609 fdc.conn, &fstr->bv_val ) )
611 case REWRITE_REGEXEC_OK:
612 if ( !BER_BVISNULL( fstr ) ) {
613 fstr->bv_len = strlen( fstr->bv_val );
618 Debug( LDAP_DEBUG_ARGS,
619 "[rw] %s: \"%s\" -> \"%s\"\n",
620 fdc.ctx, BER_BVISNULL( &ftmp ) ? "" : ftmp.bv_val,
621 BER_BVISNULL( fstr ) ? "" : fstr->bv_val );
625 case REWRITE_REGEXEC_UNWILLING:
627 fdc.rs->sr_err = LDAP_UNWILLING_TO_PERFORM;
628 fdc.rs->sr_text = "Operation not allowed";
630 rc = LDAP_UNWILLING_TO_PERFORM;
633 case REWRITE_REGEXEC_ERR:
635 fdc.rs->sr_err = LDAP_OTHER;
636 fdc.rs->sr_text = "Rewrite error";
642 if ( fstr->bv_val == dmy ) {
645 #endif /* ENABLE_REWRITE */
651 ldap_back_referral_result_rewrite(
658 assert( dc != NULL );
659 assert( a_vals != NULL );
661 for ( last = 0; !BER_BVISNULL( &a_vals[ last ] ); last++ )
665 for ( i = 0; !BER_BVISNULL( &a_vals[ i ] ); i++ ) {
671 rc = ldap_url_parse( a_vals[ i ].bv_val, &ludp );
672 if ( rc != LDAP_URL_SUCCESS ) {
673 /* leave attr untouched if massage failed */
677 /* FIXME: URLs like "ldap:///dc=suffix" if passed
678 * thru ldap_url_parse() and ldap_url_desc2str()
679 * get rewritten as "ldap:///dc=suffix??base";
680 * we don't want this to occur... */
681 if ( ludp->lud_scope == LDAP_SCOPE_BASE ) {
682 ludp->lud_scope = LDAP_SCOPE_DEFAULT;
685 ber_str2bv( ludp->lud_dn, 0, 0, &olddn );
687 rc = ldap_back_dn_massage( dc, &olddn, &dn );
689 case LDAP_UNWILLING_TO_PERFORM:
691 * FIXME: need to check if it may be considered
692 * legal to trim values when adding/modifying;
693 * it should be when searching (e.g. ACLs).
695 LBER_FREE( a_vals[ i ].bv_val );
697 a_vals[ i ] = a_vals[ last ];
699 BER_BVZERO( &a_vals[ last ] );
705 /* leave attr untouched if massage failed */
706 if ( !BER_BVISNULL( &dn ) && olddn.bv_val != dn.bv_val )
710 ludp->lud_dn = dn.bv_val;
711 newurl = ldap_url_desc2str( ludp );
713 if ( newurl == NULL ) {
714 /* FIXME: leave attr untouched
715 * even if ldap_url_desc2str failed...
720 LBER_FREE( a_vals[ i ].bv_val );
721 ber_str2bv( newurl, 0, 1, &a_vals[ i ] );
723 ludp->lud_dn = olddn.bv_val;
728 ldap_free_urldesc( ludp );
735 * I don't like this much, but we need two different
736 * functions because different heap managers may be
737 * in use in back-ldap/meta to reduce the amount of
738 * calls to malloc routines, and some of the free()
739 * routines may be macros with args
750 assert( a_vals != NULL );
752 for ( last = 0; !BER_BVISNULL( &a_vals[last] ); last++ )
756 for ( i = 0; !BER_BVISNULL( &a_vals[i] ); i++ ) {
757 switch ( ldap_back_dn_massage( dc, &a_vals[i], &bv ) ) {
758 case LDAP_UNWILLING_TO_PERFORM:
760 * FIXME: need to check if it may be considered
761 * legal to trim values when adding/modifying;
762 * it should be when searching (e.g. ACLs).
764 ch_free( a_vals[i].bv_val );
766 a_vals[i] = a_vals[last];
768 BER_BVZERO( &a_vals[last] );
773 /* leave attr untouched if massage failed */
774 if ( !BER_BVISNULL( &bv ) && bv.bv_val != a_vals[i].bv_val ) {
775 ch_free( a_vals[i].bv_val );
786 ldap_dnattr_result_rewrite(
794 assert( a_vals != NULL );
796 for ( last = 0; !BER_BVISNULL( &a_vals[last] ); last++ )
800 for ( i = 0; !BER_BVISNULL( &a_vals[i] ); i++ ) {
801 switch ( ldap_back_dn_massage( dc, &a_vals[i], &bv ) ) {
802 case LDAP_UNWILLING_TO_PERFORM:
804 * FIXME: need to check if it may be considered
805 * legal to trim values when adding/modifying;
806 * it should be when searching (e.g. ACLs).
808 LBER_FREE( a_vals[i].bv_val );
810 a_vals[i] = a_vals[last];
812 BER_BVZERO( &a_vals[last] );
817 /* leave attr untouched if massage failed */
818 if ( !BER_BVISNULL( &bv ) && a_vals[i].bv_val != bv.bv_val ) {
819 LBER_FREE( a_vals[i].bv_val );