]> git.sur5r.net Git - openldap/blob - servers/slapd/compare.c
ITS#5489
[openldap] / servers / slapd / compare.c
1 /* $OpenLDAP$ */
2 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
3  *
4  * Copyright 1998-2008 The OpenLDAP Foundation.
5  * All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted only as authorized by the OpenLDAP
9  * Public License.
10  *
11  * A copy of this license is available in the file LICENSE in the
12  * top-level directory of the distribution or, alternatively, at
13  * <http://www.OpenLDAP.org/license.html>.
14  */
15 /* Portions Copyright (c) 1995 Regents of the University of Michigan.
16  * All rights reserved.
17  *
18  * Redistribution and use in source and binary forms are permitted
19  * provided that this notice is preserved and that due credit is given
20  * to the University of Michigan at Ann Arbor. The name of the University
21  * may not be used to endorse or promote products derived from this
22  * software without specific prior written permission. This software
23  * is provided ``as is'' without express or implied warranty.
24  */
25
26 #include "portable.h"
27
28 #include <stdio.h>
29 #include <ac/socket.h>
30 #include <ac/string.h>
31
32 #include "slap.h"
33
34 static int compare_entry(
35         Operation *op,
36         Entry *e,
37         AttributeAssertion *ava );
38
39 int
40 do_compare(
41     Operation   *op,
42     SlapReply   *rs )
43 {
44         struct berval dn = BER_BVNULL;
45         struct berval desc = BER_BVNULL;
46         struct berval value = BER_BVNULL;
47 #ifdef LDAP_COMP_MATCH
48         AttributeAssertion ava = { NULL, BER_BVNULL, NULL };
49 #else
50         AttributeAssertion ava = { NULL, BER_BVNULL };
51 #endif
52
53         ava.aa_desc = NULL;
54
55         Debug( LDAP_DEBUG_TRACE, "do_compare\n", 0, 0, 0 );
56         /*
57          * Parse the compare request.  It looks like this:
58          *
59          *      CompareRequest := [APPLICATION 14] SEQUENCE {
60          *              entry   DistinguishedName,
61          *              ava     SEQUENCE {
62          *                      type    AttributeType,
63          *                      value   AttributeValue
64          *              }
65          *      }
66          */
67
68         if ( ber_scanf( op->o_ber, "{m" /*}*/, &dn ) == LBER_ERROR ) {
69                 Debug( LDAP_DEBUG_ANY, "ber_scanf failed\n", 0, 0, 0 );
70                 send_ldap_discon( op, rs, LDAP_PROTOCOL_ERROR, "decoding error" );
71                 return SLAPD_DISCONNECT;
72         }
73
74         if ( ber_scanf( op->o_ber, "{mm}", &desc, &value ) == LBER_ERROR ) {
75                 Debug( LDAP_DEBUG_ANY, "do_compare: get ava failed\n", 0, 0, 0 );
76                 send_ldap_discon( op, rs, LDAP_PROTOCOL_ERROR, "decoding error" );
77                 return SLAPD_DISCONNECT;
78         }
79
80         if ( ber_scanf( op->o_ber, /*{*/ "}" ) == LBER_ERROR ) {
81                 Debug( LDAP_DEBUG_ANY, "ber_scanf failed\n", 0, 0, 0 );
82                 send_ldap_discon( op, rs, LDAP_PROTOCOL_ERROR, "decoding error" );
83                 return SLAPD_DISCONNECT;
84         }
85
86         if( get_ctrls( op, rs, 1 ) != LDAP_SUCCESS ) {
87                 Debug( LDAP_DEBUG_ANY, "do_compare: get_ctrls failed\n", 0, 0, 0 );
88                 goto cleanup;
89         } 
90
91         rs->sr_err = dnPrettyNormal( NULL, &dn, &op->o_req_dn, &op->o_req_ndn,
92                 op->o_tmpmemctx );
93         if( rs->sr_err != LDAP_SUCCESS ) {
94                 Debug( LDAP_DEBUG_ANY,
95                         "do_compare: invalid dn (%s)\n", dn.bv_val, 0, 0 );
96                 send_ldap_error( op, rs, LDAP_INVALID_DN_SYNTAX, "invalid DN" );
97                 goto cleanup;
98         }
99
100         rs->sr_err = slap_bv2ad( &desc, &ava.aa_desc, &rs->sr_text );
101         if( rs->sr_err != LDAP_SUCCESS ) {
102                 rs->sr_err = slap_bv2undef_ad( &desc, &ava.aa_desc,
103                                 &rs->sr_text,
104                                 SLAP_AD_PROXIED|SLAP_AD_NOINSERT );
105                 if( rs->sr_err != LDAP_SUCCESS ) {
106                         send_ldap_result( op, rs );
107                         goto cleanup;
108                 }
109         }
110
111         rs->sr_err = asserted_value_validate_normalize( ava.aa_desc,
112                 ava.aa_desc->ad_type->sat_equality,
113                 SLAP_MR_EQUALITY|SLAP_MR_VALUE_OF_ASSERTION_SYNTAX,
114                 &value, &ava.aa_value, &rs->sr_text, op->o_tmpmemctx );
115         if( rs->sr_err != LDAP_SUCCESS ) {
116                 send_ldap_result( op, rs );
117                 goto cleanup;
118         }
119
120         op->orc_ava = &ava;
121
122         op->o_bd = frontendDB;
123         rs->sr_err = frontendDB->be_compare( op, rs );
124
125 cleanup:;
126         op->o_tmpfree( op->o_req_dn.bv_val, op->o_tmpmemctx );
127         op->o_tmpfree( op->o_req_ndn.bv_val, op->o_tmpmemctx );
128         if ( !BER_BVISNULL( &ava.aa_value ) ) {
129                 op->o_tmpfree( ava.aa_value.bv_val, op->o_tmpmemctx );
130         }
131
132         return rs->sr_err;
133 }
134
135 int
136 fe_op_compare( Operation *op, SlapReply *rs )
137 {
138         Entry *entry = NULL;
139         int manageDSAit;
140         AttributeAssertion ava = *op->orc_ava;
141         BackendDB       *bd = op->o_bd;
142
143         if( strcasecmp( op->o_req_ndn.bv_val, LDAP_ROOT_DSE ) == 0 ) {
144                 Debug( LDAP_DEBUG_ARGS,
145                         "do_compare: dn (%s) attr (%s) value (%s)\n",
146                         op->o_req_dn.bv_val,
147                         ava.aa_desc->ad_cname.bv_val, ava.aa_value.bv_val );
148
149                 Statslog( LDAP_DEBUG_STATS,
150                         "%s CMP dn=\"%s\" attr=\"%s\"\n",
151                         op->o_log_prefix, op->o_req_dn.bv_val,
152                         ava.aa_desc->ad_cname.bv_val, 0, 0 );
153
154                 if( backend_check_restrictions( op, rs, NULL ) != LDAP_SUCCESS ) {
155                         send_ldap_result( op, rs );
156                         goto cleanup;
157                 }
158
159                 rs->sr_err = root_dse_info( op->o_conn, &entry, &rs->sr_text );
160                 if( rs->sr_err != LDAP_SUCCESS ) {
161                         send_ldap_result( op, rs );
162                         goto cleanup;
163                 }
164
165         } else if ( bvmatch( &op->o_req_ndn, &frontendDB->be_schemandn ) ) {
166                 Debug( LDAP_DEBUG_ARGS, "do_compare: dn (%s) attr (%s) value (%s)\n",
167                         op->o_req_dn.bv_val,
168                         ava.aa_desc->ad_cname.bv_val, ava.aa_value.bv_val );
169
170                 Statslog( LDAP_DEBUG_STATS,
171                         "%s CMP dn=\"%s\" attr=\"%s\"\n",
172                         op->o_log_prefix, op->o_req_dn.bv_val,
173                         ava.aa_desc->ad_cname.bv_val, 0, 0 );
174
175                 if( backend_check_restrictions( op, rs, NULL ) != LDAP_SUCCESS ) {
176                         send_ldap_result( op, rs );
177                         rs->sr_err = 0;
178                         goto cleanup;
179                 }
180
181                 rs->sr_err = schema_info( &entry, &rs->sr_text );
182                 if( rs->sr_err != LDAP_SUCCESS ) {
183                         send_ldap_result( op, rs );
184                         rs->sr_err = 0;
185                         goto cleanup;
186                 }
187         }
188
189         if( entry ) {
190                 rs->sr_err = compare_entry( op, entry, &ava );
191                 entry_free( entry );
192
193                 send_ldap_result( op, rs );
194
195                 if( rs->sr_err == LDAP_COMPARE_TRUE ||
196                         rs->sr_err == LDAP_COMPARE_FALSE )
197                 {
198                         rs->sr_err = LDAP_SUCCESS;
199                 }
200
201                 goto cleanup;
202         }
203
204         manageDSAit = get_manageDSAit( op );
205
206         /*
207          * We could be serving multiple database backends.  Select the
208          * appropriate one, or send a referral to our "referral server"
209          * if we don't hold it.
210          */
211         op->o_bd = select_backend( &op->o_req_ndn, manageDSAit, 0 );
212         if ( op->o_bd == NULL ) {
213                 rs->sr_ref = referral_rewrite( default_referral,
214                         NULL, &op->o_req_dn, LDAP_SCOPE_DEFAULT );
215
216                 rs->sr_err = LDAP_REFERRAL;
217                 if (!rs->sr_ref) rs->sr_ref = default_referral;
218                 op->o_bd = bd;
219                 send_ldap_result( op, rs );
220
221                 if (rs->sr_ref != default_referral) ber_bvarray_free( rs->sr_ref );
222                 rs->sr_err = 0;
223                 goto cleanup;
224         }
225
226         /* check restrictions */
227         if( backend_check_restrictions( op, rs, NULL ) != LDAP_SUCCESS ) {
228                 send_ldap_result( op, rs );
229                 goto cleanup;
230         }
231
232         /* check for referrals */
233         if( backend_check_referrals( op, rs ) != LDAP_SUCCESS ) {
234                 goto cleanup;
235         }
236
237         Debug( LDAP_DEBUG_ARGS, "do_compare: dn (%s) attr (%s) value (%s)\n",
238             op->o_req_dn.bv_val,
239                 ava.aa_desc->ad_cname.bv_val, ava.aa_value.bv_val );
240
241         Statslog( LDAP_DEBUG_STATS, "%s CMP dn=\"%s\" attr=\"%s\"\n",
242                 op->o_log_prefix, op->o_req_dn.bv_val,
243                 ava.aa_desc->ad_cname.bv_val, 0, 0 );
244
245         op->orc_ava = &ava;
246         if ( ava.aa_desc == slap_schema.si_ad_entryDN ) {
247                 send_ldap_error( op, rs, LDAP_UNWILLING_TO_PERFORM,
248                         "entryDN compare not supported" );
249
250         } else if ( ava.aa_desc == slap_schema.si_ad_subschemaSubentry ) {
251                 send_ldap_error( op, rs, LDAP_UNWILLING_TO_PERFORM,
252                         "subschemaSubentry compare not supported" );
253
254 #ifndef SLAP_COMPARE_IN_FRONTEND
255         } else if ( ava.aa_desc == slap_schema.si_ad_hasSubordinates
256                 && op->o_bd->be_has_subordinates )
257         {
258                 int     rc, hasSubordinates = LDAP_SUCCESS;
259
260                 rc = be_entry_get_rw( op, &op->o_req_ndn, NULL, NULL, 0, &entry );
261                 if ( rc == 0 && entry ) {
262                         if ( ! access_allowed( op, entry,
263                                 ava.aa_desc, &ava.aa_value, ACL_COMPARE, NULL ) )
264                         {       
265                                 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
266                                 
267                         } else {
268                                 rc = rs->sr_err = op->o_bd->be_has_subordinates( op,
269                                                 entry, &hasSubordinates );
270                                 be_entry_release_r( op, entry );
271                         }
272                 }
273
274                 if ( rc == 0 ) {
275                         int     asserted;
276
277                         asserted = bvmatch( &ava.aa_value, &slap_true_bv )
278                                 ? LDAP_COMPARE_TRUE : LDAP_COMPARE_FALSE;
279                         if ( hasSubordinates == asserted ) {
280                                 rs->sr_err = LDAP_COMPARE_TRUE;
281
282                         } else {
283                                 rs->sr_err = LDAP_COMPARE_FALSE;
284                         }
285
286                 } else {
287 #ifdef SLAP_ACL_HONOR_DISCLOSE
288                         /* return error only if "disclose"
289                          * is granted on the object */
290                         if ( backend_access( op, NULL, &op->o_req_ndn,
291                                         slap_schema.si_ad_entry,
292                                         NULL, ACL_DISCLOSE, NULL ) == LDAP_INSUFFICIENT_ACCESS )
293                         {
294                                 rs->sr_err = LDAP_NO_SUCH_OBJECT;
295                         }
296 #endif /* SLAP_ACL_HONOR_DISCLOSE */
297                 }
298
299                 send_ldap_result( op, rs );
300
301                 if ( rc == 0 ) {
302                         rs->sr_err = LDAP_SUCCESS;
303                 }
304
305         } else if ( op->o_bd->be_compare ) {
306                 rs->sr_err = op->o_bd->be_compare( op, rs );
307
308 #endif /* ! SLAP_COMPARE_IN_FRONTEND */
309         } else {
310                 rs->sr_err = SLAP_CB_CONTINUE;
311         }
312
313         if ( rs->sr_err == SLAP_CB_CONTINUE ) {
314                 /* do our best to compare that AVA
315                  * 
316                  * NOTE: this code is used only
317                  * if SLAP_COMPARE_IN_FRONTEND 
318                  * is #define'd (it's not by default)
319                  * or if op->o_bd->be_compare is NULL.
320                  * 
321                  * FIXME: one potential issue is that
322                  * if SLAP_COMPARE_IN_FRONTEND overlays
323                  * are not executed for compare. */
324                 BerVarray       vals = NULL;
325                 int             rc = LDAP_OTHER;
326
327                 rs->sr_err = backend_attribute( op, NULL, &op->o_req_ndn,
328                                 ava.aa_desc, &vals, ACL_COMPARE );
329                 switch ( rs->sr_err ) {
330                 default:
331 #ifdef SLAP_ACL_HONOR_DISCLOSE
332                         /* return error only if "disclose"
333                          * is granted on the object */
334                         if ( backend_access( op, NULL, &op->o_req_ndn,
335                                         slap_schema.si_ad_entry,
336                                         NULL, ACL_DISCLOSE, NULL )
337                                         == LDAP_INSUFFICIENT_ACCESS )
338                         {
339                                 rs->sr_err = LDAP_NO_SUCH_OBJECT;
340                         }
341 #endif /* SLAP_ACL_HONOR_DISCLOSE */
342                         break;
343
344                 case LDAP_SUCCESS:
345                         if ( value_find_ex( op->oq_compare.rs_ava->aa_desc,
346                                 SLAP_MR_ATTRIBUTE_VALUE_NORMALIZED_MATCH |
347                                         SLAP_MR_ASSERTED_VALUE_NORMALIZED_MATCH,
348                                 vals, &ava.aa_value, op->o_tmpmemctx ) == 0 )
349                         {
350                                 rs->sr_err = LDAP_COMPARE_TRUE;
351                                 break;
352
353                         } else {
354                                 rs->sr_err = LDAP_COMPARE_FALSE;
355                         }
356                         rc = LDAP_SUCCESS;
357                         break;
358                 }
359
360                 send_ldap_result( op, rs );
361
362                 if ( rc == 0 ) {
363                         rs->sr_err = LDAP_SUCCESS;
364                 }
365                 
366                 if ( vals ) {
367                         ber_bvarray_free_x( vals, op->o_tmpmemctx );
368                 }
369         }
370
371 cleanup:;
372         op->o_bd = bd;
373         return rs->sr_err;
374 }
375
376 static int compare_entry(
377         Operation *op,
378         Entry *e,
379         AttributeAssertion *ava )
380 {
381         int rc = LDAP_COMPARE_FALSE;
382         Attribute *a;
383
384         if ( ! access_allowed( op, e,
385                 ava->aa_desc, &ava->aa_value, ACL_COMPARE, NULL ) )
386         {       
387                 rc = LDAP_INSUFFICIENT_ACCESS;
388                 goto done;
389         }
390
391         a = attrs_find( e->e_attrs, ava->aa_desc );
392         if( a == NULL ) {
393                 rc = LDAP_NO_SUCH_ATTRIBUTE;
394                 goto done;
395         }
396
397         for(a = attrs_find( e->e_attrs, ava->aa_desc );
398                 a != NULL;
399                 a = attrs_find( a->a_next, ava->aa_desc ))
400         {
401                 if (( ava->aa_desc != a->a_desc ) && ! access_allowed( op,
402                         e, a->a_desc, &ava->aa_value, ACL_COMPARE, NULL ) )
403                 {       
404                         rc = LDAP_INSUFFICIENT_ACCESS;
405                         break;
406                 }
407
408                 if ( value_find_ex( ava->aa_desc,
409                         SLAP_MR_ATTRIBUTE_VALUE_NORMALIZED_MATCH |
410                                 SLAP_MR_ASSERTED_VALUE_NORMALIZED_MATCH,
411                         a->a_nvals, &ava->aa_value, op->o_tmpmemctx ) == 0 )
412                 {
413                         rc = LDAP_COMPARE_TRUE;
414                         break;
415                 }
416         }
417
418 done:
419 #ifdef LDAP_ACL_HONOR_DISCLOSE
420         if( rc != LDAP_COMPARE_TRUE && rc != LDAP_COMPARE_FALSE ) {
421                 if ( ! access_allowed( op, e,
422                         slap_schema.si_ad_entry, NULL, ACL_DISCLOSE, NULL ) )
423                 {
424                         rc = LDAP_NO_SUCH_OBJECT;
425                 }
426         }
427 #endif
428
429         return rc;
430 }