1 /* memberof.c - back-reference for group membership */
3 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
5 * Copyright 2005-2007 Pierangelo Masarati <ando@sys-net.it>
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted only as authorized by the OpenLDAP
12 * A copy of this license is available in the file LICENSE in the
13 * top-level directory of the distribution or, alternatively, at
14 * <http://www.OpenLDAP.org/license.html>.
17 * This work was initially developed by Pierangelo Masarati for inclusion
18 * in OpenLDAP Software, sponsored by SysNet s.r.l.
23 #ifdef SLAPD_OVER_MEMBEROF
27 #include "ac/string.h"
28 #include "ac/socket.h"
37 * GROUP a group object (an entry with GROUP_OC
39 * MEMBER a member object (an entry whose DN is
40 * listed as MEMBER_AT value of a GROUP)
41 * GROUP_OC the objectClass of the group object
42 * (default: groupOfNames)
43 * MEMBER_AT the membership attribute, DN-valued;
44 * note: nameAndOptionalUID is tolerated
45 * as soon as the optionalUID is absent
47 * MEMBER_OF reverse membership attribute
51 * - if the entry that is being added is a GROUP,
52 * the MEMBER_AT defined as values of the add operation
53 * get the MEMBER_OF value directly from the request.
55 * if configured to do so, the MEMBER objects do not exist,
56 * and no relax control is issued, either:
58 * - drop non-existing members
59 * (by default: don't muck with values)
61 * - if (configured to do so,) the referenced GROUP exists,
62 * the relax control is set and the user has
63 * "manage" privileges, allow to add MEMBER_OF values to
67 * - if the entry being modified is a GROUP_OC and the
68 * MEMBER_AT attribute is modified, the MEMBER_OF value
69 * of the (existing) MEMBER_AT entries that are affected
70 * is modified according to the request:
71 * - if a MEMBER is removed from the group,
72 * delete the corresponding MEMBER_OF
73 * - if a MEMBER is added to a group,
74 * add the corresponding MEMBER_OF
76 * We need to determine, from the database, if it is
77 * a GROUP_OC, and we need to check, from the
78 * modification list, if the MEMBER_AT attribute is being
79 * affected, and what MEMBER_AT values are affected.
81 * if configured to do so, the entries corresponding to
82 * the MEMBER_AT values do not exist, and no relax control
85 * - drop non-existing members
86 * (by default: don't muck with values)
88 * - if configured to do so, the referenced GROUP exists,
89 * (the relax control is set) and the user has
90 * "manage" privileges, allow to add MEMBER_OF values to
91 * generic entries; the change is NOT automatically reflected
92 * in the MEMBER attribute of the GROUP referenced
93 * by the value of MEMBER_OF; a separate modification,
94 * with or without relax control, needs to be performed.
97 * - if the entry being renamed is a GROUP, the MEMBER_OF
98 * value of the (existing) MEMBER objects is modified
99 * accordingly based on the newDN of the GROUP.
101 * We need to determine, from the database, if it is
102 * a GROUP; the list of MEMBER objects is obtained from
105 * Non-existing MEMBER objects are ignored, since the
106 * MEMBER_AT is not being addressed by the operation.
108 * - if the entry being renamed has the MEMBER_OF attribute,
109 * the corresponding MEMBER value must be modified in the
110 * respective group entries.
114 * - if the entry being deleted is a GROUP, the (existing)
115 * MEMBER objects are modified accordingly; a copy of the
116 * values of the MEMBER_AT is saved and, if the delete
117 * succeeds, the MEMBER_OF value of the (existing) MEMBER
118 * objects is deleted.
120 * We need to determine, from the database, if it is
123 * Non-existing MEMBER objects are ignored, since the entry
126 * - if the entry being deleted has the MEMBER_OF attribute,
127 * the corresponding value of the MEMBER_AT must be deleted
128 * from the respective GROUP entries.
131 #define SLAPD_MEMBEROF_ATTR "memberOf"
133 static slap_overinst memberof;
135 typedef struct memberof_t {
137 struct berval mo_ndn;
139 ObjectClass *mo_oc_group;
140 AttributeDescription *mo_ad_member;
141 AttributeDescription *mo_ad_memberof;
143 struct berval mo_groupFilterstr;
144 AttributeAssertion mo_groupAVA;
145 Filter mo_groupFilter;
147 struct berval mo_memberFilterstr;
148 Filter mo_memberFilter;
151 #define MEMBEROF_NONE 0x00U
152 #define MEMBEROF_FDANGLING_DROP 0x01U
153 #define MEMBEROF_FDANGLING_ERROR 0x02U
154 #define MEMBEROF_FDANGLING_MASK (MEMBEROF_FDANGLING_DROP|MEMBEROF_FDANGLING_ERROR)
155 #define MEMBEROF_FREFINT 0x04U
156 #define MEMBEROF_FREVERSE 0x08U
158 #define MEMBEROF_CHK(mo,f) \
159 (((mo)->mo_flags & (f)) == (f))
160 #define MEMBEROF_DANGLING_CHECK(mo) \
161 ((mo)->mo_flags & MEMBEROF_FDANGLING_MASK)
162 #define MEMBEROF_DANGLING_DROP(mo) \
163 MEMBEROF_CHK((mo),MEMBEROF_FDANGLING_DROP)
164 #define MEMBEROF_DANGLING_ERROR(mo) \
165 MEMBEROF_CHK((mo),MEMBEROF_FDANGLING_ERROR)
166 #define MEMBEROF_REFINT(mo) \
167 MEMBEROF_CHK((mo),MEMBEROF_FREFINT)
168 #define MEMBEROF_REVERSE(mo) \
169 MEMBEROF_CHK((mo),MEMBEROF_FREVERSE)
172 typedef enum memberof_is_t {
173 MEMBEROF_IS_NONE = 0x00,
174 MEMBEROF_IS_GROUP = 0x01,
175 MEMBEROF_IS_MEMBER = 0x02,
176 MEMBEROF_IS_BOTH = (MEMBEROF_IS_GROUP|MEMBEROF_IS_MEMBER)
180 * failover storage for member attribute values of groups being deleted
181 * handles [no]thread cases.
183 static BerVarray saved_member_vals;
184 static BerVarray saved_memberof_vals;
187 memberof_saved_member_free( void *key, void *data )
189 ber_bvarray_free( (BerVarray)data );
193 memberof_saved_member_get( Operation *op, void *keyp )
196 BerVarray *key = (BerVarray *)keyp;
198 assert( op != NULL );
200 if ( op->o_threadctx == NULL ) {
205 ldap_pvt_thread_pool_getkey( op->o_threadctx,
206 key, (void **)&vals, NULL );
207 ldap_pvt_thread_pool_setkey( op->o_threadctx,
215 memberof_saved_member_set( Operation *op, void *keyp, BerVarray vals )
217 BerVarray saved_vals = NULL;
218 BerVarray *key = (BerVarray*)keyp;
220 assert( op != NULL );
223 ber_bvarray_dup_x( &saved_vals, vals, NULL );
226 if ( op->o_threadctx == NULL ) {
228 ber_bvarray_free( *key );
233 ldap_pvt_thread_pool_setkey( op->o_threadctx, key,
234 saved_vals, memberof_saved_member_free );
238 typedef struct memberof_cookie_t {
239 AttributeDescription *ad;
245 memberof_isGroupOrMember_cb( Operation *op, SlapReply *rs )
247 if ( rs->sr_type == REP_SEARCH ) {
248 memberof_cookie_t *mc;
250 mc = (memberof_cookie_t *)op->o_callback->sc_private;
258 * callback for internal search that saves the member attribute values
259 * of groups being deleted.
262 memberof_saveMember_cb( Operation *op, SlapReply *rs )
264 if ( rs->sr_type == REP_SEARCH ) {
265 memberof_cookie_t *mc;
268 mc = (memberof_cookie_t *)op->o_callback->sc_private;
271 assert( rs->sr_entry != NULL );
272 assert( rs->sr_entry->e_attrs != NULL );
274 a = attr_find( rs->sr_entry->e_attrs, mc->ad );
278 memberof_saved_member_set( op, mc->key, a->a_nvals );
280 if ( attr_find( a->a_next, mc->ad ) != NULL ) {
281 Debug( LDAP_DEBUG_ANY,
282 "%s: memberof_saveMember_cb(\"%s\"): "
283 "more than one occurrence of \"%s\" "
286 rs->sr_entry->e_name.bv_val,
287 mc->ad->ad_cname.bv_val );
295 * the delete hook performs an internal search that saves the member
296 * attribute values of groups being deleted.
299 memberof_isGroupOrMember( Operation *op, memberof_is_t *iswhatp )
301 slap_overinst *on = (slap_overinst *)op->o_bd->bd_info;
302 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
305 SlapReply rs2 = { REP_RESULT };
306 slap_callback cb = { 0 };
307 memberof_cookie_t mc;
308 AttributeName an[ 2 ];
310 memberof_is_t iswhat = MEMBEROF_IS_NONE;
312 assert( iswhatp != NULL );
313 assert( *iswhatp != MEMBEROF_IS_NONE );
316 if ( op->o_tag == LDAP_REQ_DELETE ) {
317 cb.sc_response = memberof_saveMember_cb;
320 cb.sc_response = memberof_isGroupOrMember_cb;
323 op2.o_tag = LDAP_REQ_SEARCH;
324 op2.o_callback = &cb;
325 op2.o_dn = op->o_bd->be_rootdn;
326 op2.o_ndn = op->o_bd->be_rootndn;
328 op2.ors_scope = LDAP_SCOPE_BASE;
329 op2.ors_deref = LDAP_DEREF_NEVER;
330 BER_BVZERO( &an[ 1 ].an_name );
332 op2.ors_attrsonly = 0;
333 op2.ors_limit = NULL;
335 op2.ors_tlimit = SLAP_NO_LIMIT;
337 if ( *iswhatp & MEMBEROF_IS_GROUP ) {
338 mc.ad = mo->mo_ad_member;
339 mc.key = &saved_member_vals;
341 an[ 0 ].an_desc = mo->mo_ad_member;
342 an[ 0 ].an_name = an[ 0 ].an_desc->ad_cname;
343 op2.ors_filterstr = mo->mo_groupFilterstr;
344 op2.ors_filter = &mo->mo_groupFilter;
346 op2.o_bd->bd_info = (BackendInfo *)on->on_info;
347 (void)op->o_bd->be_search( &op2, &rs2 );
348 op2.o_bd->bd_info = (BackendInfo *)on;
351 iswhat |= MEMBEROF_IS_GROUP;
354 memberof_saved_member_set( op, mc.key, NULL );
358 if ( *iswhatp & MEMBEROF_IS_MEMBER ) {
359 mc.ad = mo->mo_ad_memberof;
360 mc.key = &saved_memberof_vals;
362 an[ 0 ].an_desc = mo->mo_ad_memberof;
363 an[ 0 ].an_name = an[ 0 ].an_desc->ad_cname;
364 op2.ors_filterstr = mo->mo_memberFilterstr;
365 op2.ors_filter = &mo->mo_memberFilter;
367 op2.o_bd->bd_info = (BackendInfo *)on->on_info;
368 (void)op->o_bd->be_search( &op2, &rs2 );
369 op2.o_bd->bd_info = (BackendInfo *)on;
372 iswhat |= MEMBEROF_IS_MEMBER;
375 memberof_saved_member_set( op, mc.key, NULL );
385 * response callback that adds memberof values when a group is modified.
388 memberof_value_modify(
392 AttributeDescription *ad,
393 struct berval *old_dn,
394 struct berval *old_ndn,
395 struct berval *new_dn,
396 struct berval *new_ndn )
398 slap_overinst *on = (slap_overinst *)op->o_bd->bd_info;
399 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
402 SlapReply rs2 = { REP_RESULT };
403 slap_callback cb = { NULL, slap_null_cb, NULL, NULL };
404 Modifications mod[ 2 ] = { { { 0 } } }, *ml;
405 struct berval values[ 4 ], nvalues[ 4 ];
407 op2.o_tag = LDAP_REQ_MODIFY;
410 op2.o_req_ndn = *ndn;
412 op2.o_bd->bd_info = (BackendInfo *)on->on_info;
414 op2.o_callback = &cb;
415 op2.o_dn = op->o_bd->be_rootdn;
416 op2.o_ndn = op->o_bd->be_rootndn;
420 ml->sml_values = &values[ 0 ];
421 ml->sml_values[ 0 ] = mo->mo_dn;
422 BER_BVZERO( &ml->sml_values[ 1 ] );
423 ml->sml_nvalues = &nvalues[ 0 ];
424 ml->sml_nvalues[ 0 ] = mo->mo_ndn;
425 BER_BVZERO( &ml->sml_nvalues[ 1 ] );
426 ml->sml_desc = slap_schema.si_ad_modifiersName;
427 ml->sml_type = ml->sml_desc->ad_cname;
428 ml->sml_op = LDAP_MOD_REPLACE;
429 ml->sml_flags = SLAP_MOD_INTERNAL;
431 op2.orm_modlist = ml;
435 ml->sml_values = &values[ 2 ];
436 BER_BVZERO( &ml->sml_values[ 1 ] );
437 ml->sml_nvalues = &nvalues[ 2 ];
438 BER_BVZERO( &ml->sml_nvalues[ 1 ] );
440 ml->sml_type = ml->sml_desc->ad_cname;
441 ml->sml_flags = SLAP_MOD_INTERNAL;
443 op2.orm_modlist->sml_next = ml;
445 if ( new_ndn != NULL ) {
446 assert( !BER_BVISNULL( new_dn ) );
447 assert( !BER_BVISNULL( new_ndn ) );
450 ml->sml_op = LDAP_MOD_ADD;
452 ml->sml_values[ 0 ] = *new_dn;
453 ml->sml_nvalues[ 0 ] = *new_ndn;
455 (void)op->o_bd->be_modify( &op2, &rs2 );
457 assert( op2.orm_modlist == &mod[ 0 ] );
458 assert( op2.orm_modlist->sml_next == &mod[ 1 ] );
459 ml = op2.orm_modlist->sml_next->sml_next;
461 slap_mods_free( ml, 1 );
465 if ( old_ndn != NULL ) {
466 assert( !BER_BVISNULL( old_dn ) );
467 assert( !BER_BVISNULL( old_ndn ) );
470 ml->sml_op = LDAP_MOD_DELETE;
472 ml->sml_values[ 0 ] = *old_dn;
473 ml->sml_nvalues[ 0 ] = *old_ndn;
475 (void)op->o_bd->be_modify( &op2, &rs2 );
477 assert( op2.orm_modlist == &mod[ 0 ] );
478 assert( op2.orm_modlist->sml_next == &mod[ 1 ] );
479 ml = op2.orm_modlist->sml_next->sml_next;
481 slap_mods_free( ml, 1 );
485 /* FIXME: if old_group_ndn doesn't exist, both delete __and__
486 * add will fail; better split in two operations, although
487 * not optimal in terms of performance. At least it would
488 * move towards self-repairing capabilities. */
490 op2.o_bd->bd_info = (BackendInfo *)on;
496 memberof_op_add( Operation *op, SlapReply *rs )
498 slap_overinst *on = (slap_overinst *)op->o_bd->bd_info;
499 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
501 Attribute **ap, **map = NULL;
502 int rc = SLAP_CB_CONTINUE;
504 struct berval save_dn, save_ndn;
506 if ( op->ora_e->e_attrs == NULL ) {
507 /* FIXME: global overlay; need to deal with */
508 Debug( LDAP_DEBUG_ANY, "%s: memberof_op_add(\"%s\"): "
509 "consistency checks not implemented when overlay "
510 "is instantiated as global.\n",
511 op->o_log_prefix, op->o_req_dn.bv_val, 0 );
512 return SLAP_CB_CONTINUE;
515 if ( MEMBEROF_REVERSE( mo ) ) {
516 for ( ap = &op->ora_e->e_attrs; *ap; ap = &(*ap)->a_next ) {
519 if ( a->a_desc == mo->mo_ad_memberof ) {
527 save_ndn = op->o_ndn;
529 if ( MEMBEROF_DANGLING_CHECK( mo )
531 && is_entry_objectclass( op->ora_e, mo->mo_oc_group, 0 ) )
533 op->o_dn = op->o_bd->be_rootdn;
534 op->o_dn = op->o_bd->be_rootndn;
535 op->o_bd->bd_info = (BackendInfo *)on->on_info;
537 for ( ap = &op->ora_e->e_attrs; *ap; ) {
540 if ( !is_ad_subtype( a->a_desc, mo->mo_ad_member ) ) {
545 assert( a->a_nvals != NULL );
547 for ( i = 0; !BER_BVISNULL( &a->a_nvals[ i ] ); i++ ) {
550 /* FIXME: entry_get_rw does not pass
551 * thru overlays yet; when it does, we
552 * might need to make a copy of the DN */
554 rc = be_entry_get_rw( op, &a->a_nvals[ i ],
556 if ( rc == LDAP_SUCCESS ) {
557 be_entry_release_r( op, e );
561 if ( MEMBEROF_DANGLING_ERROR( mo ) ) {
562 rc = rs->sr_err = LDAP_CONSTRAINT_VIOLATION;
563 rs->sr_text = "adding non-existing object "
565 send_ldap_result( op, rs );
569 if ( MEMBEROF_DANGLING_DROP( mo ) ) {
572 Debug( LDAP_DEBUG_ANY, "%s: memberof_op_add(\"%s\"): "
573 "member=\"%s\" does not exist (stripping...)\n",
574 op->o_log_prefix, op->ora_e->e_name.bv_val,
575 a->a_vals[ i ].bv_val );
577 for ( j = i + 1; !BER_BVISNULL( &a->a_nvals[ j ] ); j++ );
578 ber_memfree( a->a_vals[ i ].bv_val );
579 BER_BVZERO( &a->a_vals[ i ] );
580 if ( a->a_nvals != a->a_vals ) {
581 ber_memfree( a->a_nvals[ i ].bv_val );
582 BER_BVZERO( &a->a_nvals[ i ] );
588 AC_MEMCPY( &a->a_vals[ i ], &a->a_vals[ i + 1 ],
589 sizeof( struct berval ) * ( j - i ) );
590 if ( a->a_nvals != a->a_vals ) {
591 AC_MEMCPY( &a->a_nvals[ i ], &a->a_nvals[ i + 1 ],
592 sizeof( struct berval ) * ( j - i ) );
598 /* If all values have been removed,
599 * remove the attribute itself. */
600 if ( BER_BVISNULL( &a->a_nvals[ 0 ] ) ) {
609 op->o_ndn = save_ndn;
610 op->o_bd->bd_info = (BackendInfo *)on;
615 AccessControlState acl_state = ACL_STATE_INIT;
617 for ( i = 0; !BER_BVISNULL( &a->a_nvals[ i ] ); i++ ) {
620 op->o_bd->bd_info = (BackendInfo *)on->on_info;
621 /* access is checked with the original identity */
622 rc = access_allowed( op, op->ora_e, mo->mo_ad_memberof,
623 &a->a_nvals[ i ], ACL_WADD,
626 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
628 send_ldap_result( op, rs );
631 rc = be_entry_get_rw( op, &a->a_nvals[ i ],
633 op->o_bd->bd_info = (BackendInfo *)on;
634 if ( rc != LDAP_SUCCESS ) {
635 if ( get_relax( op ) ) {
639 if ( MEMBEROF_DANGLING_ERROR( mo ) ) {
640 rc = rs->sr_err = LDAP_CONSTRAINT_VIOLATION;
641 rs->sr_text = "adding non-existing object "
643 send_ldap_result( op, rs );
647 if ( MEMBEROF_DANGLING_DROP( mo ) ) {
650 Debug( LDAP_DEBUG_ANY, "%s: memberof_op_add(\"%s\"): "
651 "memberof=\"%s\" does not exist (stripping...)\n",
652 op->o_log_prefix, op->ora_e->e_name.bv_val,
653 a->a_nvals[ i ].bv_val );
655 for ( j = i + 1; !BER_BVISNULL( &a->a_nvals[ j ] ); j++ );
656 ber_memfree( a->a_vals[ i ].bv_val );
657 BER_BVZERO( &a->a_vals[ i ] );
658 if ( a->a_nvals != a->a_vals ) {
659 ber_memfree( a->a_nvals[ i ].bv_val );
660 BER_BVZERO( &a->a_nvals[ i ] );
666 AC_MEMCPY( &a->a_vals[ i ], &a->a_vals[ i + 1 ],
667 sizeof( struct berval ) * ( j - i ) );
668 if ( a->a_nvals != a->a_vals ) {
669 AC_MEMCPY( &a->a_nvals[ i ], &a->a_nvals[ i + 1 ],
670 sizeof( struct berval ) * ( j - i ) );
678 /* access is checked with the original identity */
679 op->o_bd->bd_info = (BackendInfo *)on->on_info;
680 rc = access_allowed( op, e, mo->mo_ad_member,
681 &op->o_req_ndn, ACL_WADD, NULL );
682 be_entry_release_r( op, e );
683 op->o_bd->bd_info = (BackendInfo *)on;
686 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
687 rs->sr_text = "insufficient access to object referenced by memberof";
688 send_ldap_result( op, rs );
693 if ( BER_BVISNULL( &a->a_nvals[ 0 ] ) ) {
699 rc = SLAP_CB_CONTINUE;
703 op->o_ndn = save_ndn;
704 op->o_bd->bd_info = (BackendInfo *)on;
710 memberof_op_delete( Operation *op, SlapReply *rs )
712 slap_overinst *on = (slap_overinst *)op->o_bd->bd_info;
713 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
715 memberof_is_t iswhat = MEMBEROF_IS_GROUP;
717 if ( MEMBEROF_REFINT( mo ) ) {
718 iswhat = MEMBEROF_IS_BOTH;
721 memberof_isGroupOrMember( op, &iswhat );
723 return SLAP_CB_CONTINUE;
727 memberof_op_modify( Operation *op, SlapReply *rs )
729 slap_overinst *on = (slap_overinst *)op->o_bd->bd_info;
730 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
732 Modifications **mlp, **mmlp = NULL;
733 int rc = SLAP_CB_CONTINUE;
734 struct berval save_dn, save_ndn;
735 memberof_is_t iswhat = MEMBEROF_IS_GROUP;
737 if ( MEMBEROF_REVERSE( mo ) ) {
738 for ( mlp = &op->orm_modlist; *mlp; mlp = &(*mlp)->sml_next ) {
739 Modifications *ml = *mlp;
741 if ( ml->sml_desc == mo->mo_ad_memberof ) {
749 save_ndn = op->o_ndn;
751 if ( memberof_isGroupOrMember( op, &iswhat ) == LDAP_SUCCESS
752 && ( iswhat & MEMBEROF_IS_GROUP ) )
757 for ( ml = op->orm_modlist; ml; ml = ml->sml_next ) {
758 if ( ml->sml_desc == mo->mo_ad_member ) {
759 switch ( ml->sml_op ) {
760 case LDAP_MOD_DELETE:
761 case LDAP_MOD_REPLACE:
769 BerVarray vals = NULL;
771 op->o_dn = op->o_bd->be_rootdn;
772 op->o_dn = op->o_bd->be_rootndn;
773 op->o_bd->bd_info = (BackendInfo *)on->on_info;
774 rc = backend_attribute( op, NULL, &op->o_req_ndn,
775 mo->mo_ad_member, &vals, ACL_READ );
776 op->o_bd->bd_info = (BackendInfo *)on;
777 if ( rc == LDAP_SUCCESS && vals != NULL ) {
778 memberof_saved_member_set( op, &saved_member_vals, vals );
779 ber_bvarray_free_x( vals, op->o_tmpmemctx );
783 if ( MEMBEROF_DANGLING_CHECK( mo )
784 && !get_relax( op ) )
786 op->o_dn = op->o_bd->be_rootdn;
787 op->o_dn = op->o_bd->be_rootndn;
788 op->o_bd->bd_info = (BackendInfo *)on->on_info;
790 assert( op->orm_modlist != NULL );
792 for ( mlp = &op->orm_modlist; *mlp; ) {
793 Modifications *ml = *mlp;
796 if ( !is_ad_subtype( ml->sml_desc, mo->mo_ad_member ) ) {
801 switch ( ml->sml_op ) {
802 case LDAP_MOD_DELETE:
803 /* we don't care about cancellations: if the value
804 * exists, fine; if it doesn't, we let the underlying
805 * database fail as appropriate; */
809 case LDAP_MOD_REPLACE:
811 /* NOTE: right now, the attributeType we use
812 * for member must have a normalized value */
813 assert( ml->sml_nvalues != NULL );
815 for ( i = 0; !BER_BVISNULL( &ml->sml_nvalues[ i ] ); i++ ) {
819 if ( be_entry_get_rw( op, &ml->sml_nvalues[ i ],
820 NULL, NULL, 0, &e ) == LDAP_SUCCESS )
822 be_entry_release_r( op, e );
826 if ( MEMBEROF_DANGLING_ERROR( mo ) ) {
827 rc = rs->sr_err = LDAP_CONSTRAINT_VIOLATION;
828 rs->sr_text = "adding non-existing object "
830 send_ldap_result( op, rs );
834 if ( MEMBEROF_DANGLING_DROP( mo ) ) {
837 Debug( LDAP_DEBUG_ANY, "%s: memberof_op_modify(\"%s\"): "
838 "member=\"%s\" does not exist (stripping...)\n",
839 op->o_log_prefix, op->o_req_dn.bv_val,
840 ml->sml_nvalues[ i ].bv_val );
842 for ( j = i + 1; !BER_BVISNULL( &ml->sml_nvalues[ j ] ); j++ );
843 ber_memfree( ml->sml_values[ i ].bv_val );
844 BER_BVZERO( &ml->sml_values[ i ] );
845 ber_memfree( ml->sml_nvalues[ i ].bv_val );
846 BER_BVZERO( &ml->sml_nvalues[ i ] );
852 AC_MEMCPY( &ml->sml_values[ i ], &ml->sml_values[ i + 1 ],
853 sizeof( struct berval ) * ( j - i ) );
854 AC_MEMCPY( &ml->sml_nvalues[ i ], &ml->sml_nvalues[ i + 1 ],
855 sizeof( struct berval ) * ( j - i ) );
860 if ( BER_BVISNULL( &ml->sml_nvalues[ 0 ] ) ) {
862 slap_mod_free( &ml->sml_mod, 0 );
878 if ( mmlp != NULL ) {
879 Modifications *ml = *mmlp;
883 op->o_bd->bd_info = (BackendInfo *)on->on_info;
884 rc = be_entry_get_rw( op, &op->o_req_ndn,
885 NULL, NULL, 0, &target );
886 op->o_bd->bd_info = (BackendInfo *)on;
887 if ( rc != LDAP_SUCCESS ) {
888 rc = rs->sr_err = LDAP_NO_SUCH_OBJECT;
889 send_ldap_result( op, rs );
893 switch ( ml->sml_op ) {
894 case LDAP_MOD_DELETE:
895 if ( ml->sml_nvalues != NULL ) {
896 AccessControlState acl_state = ACL_STATE_INIT;
898 for ( i = 0; !BER_BVISNULL( &ml->sml_nvalues[ i ] ); i++ ) {
901 op->o_bd->bd_info = (BackendInfo *)on->on_info;
902 /* access is checked with the original identity */
903 rc = access_allowed( op, target,
905 &ml->sml_nvalues[ i ],
909 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
911 send_ldap_result( op, rs );
915 rc = be_entry_get_rw( op, &ml->sml_nvalues[ i ],
917 op->o_bd->bd_info = (BackendInfo *)on;
918 if ( rc != LDAP_SUCCESS ) {
919 if ( get_relax( op ) ) {
923 if ( MEMBEROF_DANGLING_ERROR( mo ) ) {
924 rc = rs->sr_err = LDAP_CONSTRAINT_VIOLATION;
925 rs->sr_text = "deleting non-existing object "
927 send_ldap_result( op, rs );
931 if ( MEMBEROF_DANGLING_DROP( mo ) ) {
934 Debug( LDAP_DEBUG_ANY, "%s: memberof_op_modify(\"%s\"): "
935 "memberof=\"%s\" does not exist (stripping...)\n",
936 op->o_log_prefix, op->o_req_ndn.bv_val,
937 ml->sml_nvalues[ i ].bv_val );
939 for ( j = i + 1; !BER_BVISNULL( &ml->sml_nvalues[ j ] ); j++ );
940 ber_memfree( ml->sml_values[ i ].bv_val );
941 BER_BVZERO( &ml->sml_values[ i ] );
942 if ( ml->sml_nvalues != ml->sml_values ) {
943 ber_memfree( ml->sml_nvalues[ i ].bv_val );
944 BER_BVZERO( &ml->sml_nvalues[ i ] );
951 AC_MEMCPY( &ml->sml_values[ i ], &ml->sml_values[ i + 1 ],
952 sizeof( struct berval ) * ( j - i ) );
953 if ( ml->sml_nvalues != ml->sml_values ) {
954 AC_MEMCPY( &ml->sml_nvalues[ i ], &ml->sml_nvalues[ i + 1 ],
955 sizeof( struct berval ) * ( j - i ) );
963 /* access is checked with the original identity */
964 op->o_bd->bd_info = (BackendInfo *)on->on_info;
965 rc = access_allowed( op, e, mo->mo_ad_member,
968 be_entry_release_r( op, e );
969 op->o_bd->bd_info = (BackendInfo *)on;
972 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
973 rs->sr_text = "insufficient access to object referenced by memberof";
974 send_ldap_result( op, rs );
979 if ( BER_BVISNULL( &ml->sml_nvalues[ 0 ] ) ) {
980 *mmlp = ml->sml_next;
981 slap_mod_free( &ml->sml_mod, 0 );
989 case LDAP_MOD_REPLACE:
991 op->o_bd->bd_info = (BackendInfo *)on->on_info;
992 /* access is checked with the original identity */
993 rc = access_allowed( op, target,
997 op->o_bd->bd_info = (BackendInfo *)on;
999 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
1001 send_ldap_result( op, rs );
1005 if ( ml->sml_op == LDAP_MOD_DELETE ) {
1010 case LDAP_MOD_ADD: {
1011 AccessControlState acl_state = ACL_STATE_INIT;
1013 for ( i = 0; !BER_BVISNULL( &ml->sml_nvalues[ i ] ); i++ ) {
1016 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1017 /* access is checked with the original identity */
1018 rc = access_allowed( op, target,
1020 &ml->sml_nvalues[ i ],
1024 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
1026 send_ldap_result( op, rs );
1030 rc = be_entry_get_rw( op, &ml->sml_nvalues[ i ],
1031 NULL, NULL, 0, &e );
1032 op->o_bd->bd_info = (BackendInfo *)on;
1033 if ( rc != LDAP_SUCCESS ) {
1034 if ( MEMBEROF_DANGLING_ERROR( mo ) ) {
1035 rc = rs->sr_err = LDAP_CONSTRAINT_VIOLATION;
1036 rs->sr_text = "adding non-existing object "
1038 send_ldap_result( op, rs );
1042 if ( MEMBEROF_DANGLING_DROP( mo ) ) {
1045 Debug( LDAP_DEBUG_ANY, "%s: memberof_op_modify(\"%s\"): "
1046 "memberof=\"%s\" does not exist (stripping...)\n",
1047 op->o_log_prefix, op->o_req_ndn.bv_val,
1048 ml->sml_nvalues[ i ].bv_val );
1050 for ( j = i + 1; !BER_BVISNULL( &ml->sml_nvalues[ j ] ); j++ );
1051 ber_memfree( ml->sml_values[ i ].bv_val );
1052 BER_BVZERO( &ml->sml_values[ i ] );
1053 if ( ml->sml_nvalues != ml->sml_values ) {
1054 ber_memfree( ml->sml_nvalues[ i ].bv_val );
1055 BER_BVZERO( &ml->sml_nvalues[ i ] );
1062 AC_MEMCPY( &ml->sml_values[ i ], &ml->sml_values[ i + 1 ],
1063 sizeof( struct berval ) * ( j - i ) );
1064 if ( ml->sml_nvalues != ml->sml_values ) {
1065 AC_MEMCPY( &ml->sml_nvalues[ i ], &ml->sml_nvalues[ i + 1 ],
1066 sizeof( struct berval ) * ( j - i ) );
1074 /* access is checked with the original identity */
1075 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1076 rc = access_allowed( op, e, mo->mo_ad_member,
1079 be_entry_release_r( op, e );
1080 op->o_bd->bd_info = (BackendInfo *)on;
1083 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
1084 rs->sr_text = "insufficient access to object referenced by memberof";
1085 send_ldap_result( op, rs );
1090 if ( BER_BVISNULL( &ml->sml_nvalues[ 0 ] ) ) {
1091 *mmlp = ml->sml_next;
1092 slap_mod_free( &ml->sml_mod, 0 );
1103 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1104 be_entry_release_r( op, target );
1105 op->o_bd->bd_info = (BackendInfo *)on;
1108 rc = SLAP_CB_CONTINUE;
1112 op->o_ndn = save_ndn;
1113 op->o_bd->bd_info = (BackendInfo *)on;
1119 * response callback that adds memberof values when a group is added.
1122 memberof_res_add( Operation *op, SlapReply *rs )
1124 slap_overinst *on = (slap_overinst *)op->o_bd->bd_info;
1125 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
1129 if ( MEMBEROF_REVERSE( mo ) ) {
1132 ma = attr_find( op->ora_e->e_attrs, mo->mo_ad_memberof );
1134 Operation op2 = *op;
1135 SlapReply rs2 = { 0 };
1137 /* relax is required to allow to add
1138 * a non-existing member */
1139 op2.o_relax = SLAP_CONTROL_CRITICAL;
1141 for ( i = 0; !BER_BVISNULL( &ma->a_nvals[ i ] ); i++ ) {
1143 /* the modification is attempted
1144 * with the original identity */
1145 (void)memberof_value_modify( &op2, &rs2,
1146 &ma->a_nvals[ i ], mo->mo_ad_member,
1147 NULL, NULL, &op->o_req_dn, &op->o_req_ndn );
1152 if ( is_entry_objectclass( op->ora_e, mo->mo_oc_group, 0 ) ) {
1155 for ( a = attrs_find( op->ora_e->e_attrs, mo->mo_ad_member );
1157 a = attrs_find( a->a_next, mo->mo_ad_member ) )
1159 for ( i = 0; !BER_BVISNULL( &a->a_nvals[ i ] ); i++ ) {
1160 (void)memberof_value_modify( op, rs,
1170 return SLAP_CB_CONTINUE;
1174 * response callback that deletes memberof values when a group is deleted.
1177 memberof_res_delete( Operation *op, SlapReply *rs )
1179 slap_overinst *on = (slap_overinst *)op->o_bd->bd_info;
1180 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
1185 vals = memberof_saved_member_get( op, &saved_member_vals );
1186 if ( vals != NULL ) {
1187 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1188 (void)memberof_value_modify( op, rs,
1189 &vals[ i ], mo->mo_ad_memberof,
1190 &op->o_req_dn, &op->o_req_ndn,
1194 ber_bvarray_free( vals );
1197 if ( MEMBEROF_REFINT( mo ) ) {
1198 vals = memberof_saved_member_get( op, &saved_memberof_vals );
1199 if ( vals != NULL ) {
1200 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1201 (void)memberof_value_modify( op, rs,
1202 &vals[ i ], mo->mo_ad_member,
1203 &op->o_req_dn, &op->o_req_ndn,
1207 ber_bvarray_free( vals );
1211 return SLAP_CB_CONTINUE;
1215 * response callback that adds/deletes memberof values when a group
1219 memberof_res_modify( Operation *op, SlapReply *rs )
1221 slap_overinst *on = (slap_overinst *)op->o_bd->bd_info;
1222 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
1225 Modifications *ml, *mml = NULL;
1227 memberof_is_t iswhat = MEMBEROF_IS_GROUP;
1229 if ( MEMBEROF_REVERSE( mo ) ) {
1230 for ( ml = op->orm_modlist; ml; ml = ml->sml_next ) {
1231 if ( ml->sml_desc == mo->mo_ad_memberof ) {
1238 if ( mml != NULL ) {
1239 BerVarray vals = mml->sml_nvalues;
1241 switch ( mml->sml_op ) {
1242 case LDAP_MOD_DELETE:
1243 if ( vals != NULL ) {
1244 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1245 memberof_value_modify( op, rs,
1246 &vals[ i ], mo->mo_ad_member,
1247 &op->o_req_dn, &op->o_req_ndn,
1254 case LDAP_MOD_REPLACE:
1255 /* delete all ... */
1256 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1257 rc = backend_attribute( op, NULL, &op->o_req_ndn,
1258 mo->mo_ad_memberof, &vals, ACL_READ );
1259 op->o_bd->bd_info = (BackendInfo *)on;
1260 if ( rc == LDAP_SUCCESS ) {
1261 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1262 (void)memberof_value_modify( op, rs,
1263 &vals[ i ], mo->mo_ad_member,
1264 &op->o_req_dn, &op->o_req_ndn,
1267 ber_bvarray_free_x( vals, op->o_tmpmemctx );
1270 if ( ml->sml_op == LDAP_MOD_DELETE ) {
1276 assert( vals != NULL );
1278 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1279 memberof_value_modify( op, rs,
1280 &vals[ i ], mo->mo_ad_member,
1282 &op->o_req_dn, &op->o_req_ndn );
1291 if ( memberof_isGroupOrMember( op, &iswhat ) == LDAP_SUCCESS
1292 && ( iswhat & MEMBEROF_IS_GROUP ) )
1294 for ( ml = op->orm_modlist; ml; ml = ml->sml_next ) {
1295 if ( ml->sml_desc != mo->mo_ad_member ) {
1299 switch ( ml->sml_op ) {
1300 case LDAP_MOD_DELETE:
1301 vals = ml->sml_nvalues;
1302 if ( vals != NULL ) {
1303 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1304 memberof_value_modify( op, rs,
1305 &vals[ i ], mo->mo_ad_memberof,
1306 &op->o_req_dn, &op->o_req_ndn,
1313 case LDAP_MOD_REPLACE:
1314 vals = memberof_saved_member_get( op, &saved_member_vals );
1316 /* delete all ... */
1317 if ( vals != NULL ) {
1318 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1319 (void)memberof_value_modify( op, rs,
1320 &vals[ i ], mo->mo_ad_memberof,
1321 &op->o_req_dn, &op->o_req_ndn,
1324 ber_bvarray_free_x( vals, op->o_tmpmemctx );
1327 if ( ml->sml_op == LDAP_MOD_DELETE ) {
1333 assert( ml->sml_nvalues != NULL );
1334 vals = ml->sml_nvalues;
1335 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1336 memberof_value_modify( op, rs,
1337 &vals[ i ], mo->mo_ad_memberof,
1339 &op->o_req_dn, &op->o_req_ndn );
1349 return SLAP_CB_CONTINUE;
1353 * response callback that adds/deletes member values when a group member
1357 memberof_res_rename( Operation *op, SlapReply *rs )
1359 slap_overinst *on = (slap_overinst *)op->o_bd->bd_info;
1360 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
1362 struct berval newPDN, newDN = BER_BVNULL, newPNDN, newNDN;
1366 struct berval save_dn, save_ndn;
1367 memberof_is_t iswhat = MEMBEROF_IS_GROUP;
1369 if ( MEMBEROF_REFINT( mo ) ) {
1370 iswhat |= MEMBEROF_IS_MEMBER;
1373 if ( op->orr_nnewSup ) {
1374 newPNDN = *op->orr_nnewSup;
1377 dnParent( &op->o_req_ndn, &newPNDN );
1380 build_new_dn( &newNDN, &newPNDN, &op->orr_nnewrdn, op->o_tmpmemctx );
1382 save_dn = op->o_req_dn;
1383 save_ndn = op->o_req_ndn;
1385 op->o_req_dn = newNDN;
1386 op->o_req_ndn = newNDN;
1387 rc = memberof_isGroupOrMember( op, &iswhat );
1388 op->o_req_dn = save_dn;
1389 op->o_req_ndn = save_ndn;
1391 if ( rc != LDAP_SUCCESS || iswhat == MEMBEROF_IS_NONE ) {
1395 if ( op->orr_newSup ) {
1396 newPDN = *op->orr_newSup;
1399 dnParent( &op->o_req_dn, &newPDN );
1402 build_new_dn( &newDN, &newPDN, &op->orr_newrdn, op->o_tmpmemctx );
1404 if ( iswhat & MEMBEROF_IS_GROUP ) {
1405 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1406 rc = backend_attribute( op, NULL, &newNDN,
1407 mo->mo_ad_member, &vals, ACL_READ );
1408 op->o_bd->bd_info = (BackendInfo *)on;
1410 if ( rc == LDAP_SUCCESS ) {
1411 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1412 (void)memberof_value_modify( op, rs,
1413 &vals[ i ], mo->mo_ad_memberof,
1414 &op->o_req_dn, &op->o_req_ndn,
1417 ber_bvarray_free_x( vals, op->o_tmpmemctx );
1421 if ( MEMBEROF_REFINT( mo ) && ( iswhat & MEMBEROF_IS_MEMBER ) ) {
1422 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1423 rc = backend_attribute( op, NULL, &newNDN,
1424 mo->mo_ad_memberof, &vals, ACL_READ );
1425 op->o_bd->bd_info = (BackendInfo *)on;
1427 if ( rc == LDAP_SUCCESS ) {
1428 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1429 (void)memberof_value_modify( op, rs,
1430 &vals[ i ], mo->mo_ad_member,
1431 &op->o_req_dn, &op->o_req_ndn,
1434 ber_bvarray_free_x( vals, op->o_tmpmemctx );
1439 if ( !BER_BVISNULL( &newDN ) ) {
1440 op->o_tmpfree( newDN.bv_val, op->o_tmpmemctx );
1442 op->o_tmpfree( newNDN.bv_val, op->o_tmpmemctx );
1444 return SLAP_CB_CONTINUE;
1448 memberof_response( Operation *op, SlapReply *rs )
1450 if ( rs->sr_err != LDAP_SUCCESS ) {
1451 return SLAP_CB_CONTINUE;
1454 switch ( op->o_tag ) {
1456 return memberof_res_add( op, rs );
1458 case LDAP_REQ_DELETE:
1459 return memberof_res_delete( op, rs );
1461 case LDAP_REQ_MODIFY:
1462 return memberof_res_modify( op, rs );
1464 case LDAP_REQ_MODDN:
1465 return memberof_res_rename( op, rs );
1468 return SLAP_CB_CONTINUE;
1477 slap_overinst *on = (slap_overinst *)be->bd_info;
1478 memberof_t tmp_mo = { 0 }, *mo;
1480 mo = (memberof_t *)ch_calloc( 1, sizeof( memberof_t ) );
1481 on->on_bi.bi_private = (void *)mo;
1498 static ConfigDriver mo_cf_gen;
1500 #define OID "1.3.6.1.4.1.7136.2.666.4"
1501 #define OIDAT OID ".1.1"
1502 #define OIDCFGAT OID ".1.2"
1503 #define OIDOC OID ".2.1"
1504 #define OIDCFGOC OID ".2.2"
1507 static ConfigTable mo_cfg[] = {
1508 { "memberof-dn", "modifiersName",
1509 2, 2, 0, ARG_MAGIC|ARG_DN|MO_DN, mo_cf_gen,
1510 "( OLcfgOvAt:18.0 NAME 'olcMemberOfDN' "
1511 "DESC 'DN to be used as modifiersName' "
1512 "SYNTAX OMsDN SINGLE-VALUE )",
1515 { "memberof-dangling", "ignore|drop|error",
1516 2, 2, 0, ARG_MAGIC|MO_DANGLING, mo_cf_gen,
1517 "( OLcfgOvAt:18.1 NAME 'olcMemberOfDangling' "
1518 "DESC 'Behavior with respect to dangling members, "
1519 "constrained to ignore, drop, error' "
1520 "SYNTAX OMsDirectoryString SINGLE-VALUE )",
1523 { "memberof-refint", "true|FALSE",
1524 2, 2, 0, ARG_MAGIC|ARG_ON_OFF|MO_REFINT, mo_cf_gen,
1525 "( OLcfgOvAt:18.2 NAME 'olcMemberOfRefInt' "
1526 "DESC 'Take care of referential integrity' "
1527 "SYNTAX OMsBoolean SINGLE-VALUE )",
1530 { "memberof-group-oc", "objectClass",
1531 2, 2, 0, ARG_MAGIC|MO_GROUP_OC, mo_cf_gen,
1532 "( OLcfgOvAt:18.3 NAME 'olcMemberOfGroupOC' "
1533 "DESC 'Group objectClass' "
1534 "SYNTAX OMsDirectoryString SINGLE-VALUE )",
1537 { "memberof-member-ad", "member attribute",
1538 2, 2, 0, ARG_MAGIC|MO_MEMBER_AD, mo_cf_gen,
1539 "( OLcfgOvAt:18.4 NAME 'olcMemberOfMemberAD' "
1540 "DESC 'member attribute' "
1541 "SYNTAX OMsDirectoryString SINGLE-VALUE )",
1544 { "memberof-memberof-ad", "memberOf attribute",
1545 2, 2, 0, ARG_MAGIC|MO_MEMBER_OF_AD, mo_cf_gen,
1546 "( OLcfgOvAt:18.5 NAME 'olcMemberOfMemberOfAD' "
1547 "DESC 'memberOf attribute' "
1548 "SYNTAX OMsDirectoryString SINGLE-VALUE )",
1552 { "memberof-reverse", "true|FALSE",
1553 2, 2, 0, ARG_MAGIC|ARG_ON_OFF|MO_REVERSE, mo_cf_gen,
1554 "( OLcfgOvAt:18.6 NAME 'olcMemberOfReverse' "
1555 "DESC 'Take care of referential integrity "
1556 "also when directly modifying memberOf' "
1557 "SYNTAX OMsBoolean SINGLE-VALUE )",
1561 { NULL, NULL, 0, 0, 0, ARG_IGNORED }
1564 static ConfigOCs mo_ocs[] = {
1565 { "( OLcfgOvOc:18.1 "
1566 "NAME 'olcMemberOf' "
1567 "DESC 'Member-of configuration' "
1568 "SUP olcOverlayConfig "
1571 "$ olcMemberOfDangling "
1572 "$ olcMemberOfRefInt "
1573 "$ olcMemberOfGroupOC "
1574 "$ olcMemberOfMemberAD "
1575 "$ olcMemberOfMemberOfAD "
1577 "$ olcMemberOfReverse "
1581 Cft_Overlay, mo_cfg, NULL, NULL },
1585 static slap_verbmasks dangling_mode[] = {
1586 { BER_BVC( "ignore" ), MEMBEROF_NONE },
1587 { BER_BVC( "drop" ), MEMBEROF_FDANGLING_DROP },
1588 { BER_BVC( "error" ), MEMBEROF_FDANGLING_ERROR },
1593 memberof_make_group_filter( memberof_t *mo )
1597 if ( !BER_BVISNULL( &mo->mo_groupFilterstr ) ) {
1598 ch_free( mo->mo_groupFilterstr.bv_val );
1601 mo->mo_groupFilter.f_choice = LDAP_FILTER_EQUALITY;
1602 mo->mo_groupFilter.f_ava = &mo->mo_groupAVA;
1604 mo->mo_groupFilter.f_av_desc = slap_schema.si_ad_objectClass;
1605 mo->mo_groupFilter.f_av_value = mo->mo_oc_group->soc_cname;
1607 mo->mo_groupFilterstr.bv_len = STRLENOF( "(=)" )
1608 + slap_schema.si_ad_objectClass->ad_cname.bv_len
1609 + mo->mo_oc_group->soc_cname.bv_len;
1610 ptr = mo->mo_groupFilterstr.bv_val = ch_malloc( mo->mo_groupFilterstr.bv_len + 1 );
1612 ptr = lutil_strcopy( ptr, slap_schema.si_ad_objectClass->ad_cname.bv_val );
1614 ptr = lutil_strcopy( ptr, mo->mo_oc_group->soc_cname.bv_val );
1622 memberof_make_member_filter( memberof_t *mo )
1626 if ( !BER_BVISNULL( &mo->mo_memberFilterstr ) ) {
1627 ch_free( mo->mo_memberFilterstr.bv_val );
1630 mo->mo_memberFilter.f_choice = LDAP_FILTER_PRESENT;
1631 mo->mo_memberFilter.f_desc = mo->mo_ad_memberof;
1633 mo->mo_memberFilterstr.bv_len = STRLENOF( "(=*)" )
1634 + mo->mo_ad_memberof->ad_cname.bv_len;
1635 ptr = mo->mo_memberFilterstr.bv_val = ch_malloc( mo->mo_memberFilterstr.bv_len + 1 );
1637 ptr = lutil_strcopy( ptr, mo->mo_ad_memberof->ad_cname.bv_val );
1638 ptr = lutil_strcopy( ptr, "=*)" );
1644 mo_cf_gen( ConfigArgs *c )
1646 slap_overinst *on = (slap_overinst *)c->bi;
1647 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
1651 if ( c->op == SLAP_CONFIG_EMIT ) {
1652 struct berval bv = BER_BVNULL;
1656 if ( mo->mo_dn.bv_val != NULL) {
1657 value_add_one( &c->rvalue_vals, &mo->mo_dn );
1658 value_add_one( &c->rvalue_nvals, &mo->mo_ndn );
1663 enum_to_verb( dangling_mode, (mo->mo_flags & MEMBEROF_FDANGLING_MASK), &bv );
1664 if ( BER_BVISNULL( &bv ) ) {
1665 /* there's something wrong... */
1670 value_add_one( &c->rvalue_vals, &bv );
1675 c->value_int = MEMBEROF_REFINT( mo );
1680 c->value_int = MEMBEROF_REVERSE( mo );
1685 if ( mo->mo_oc_group != NULL ){
1686 value_add_one( &c->rvalue_vals, &mo->mo_oc_group->soc_cname );
1691 if ( mo->mo_ad_member != NULL ){
1692 value_add_one( &c->rvalue_vals, &mo->mo_ad_member->ad_cname );
1696 case MO_MEMBER_OF_AD:
1697 if ( mo->mo_ad_memberof != NULL ){
1698 value_add_one( &c->rvalue_vals, &mo->mo_ad_memberof->ad_cname );
1709 } else if ( c->op == LDAP_MOD_DELETE ) {
1710 return 1; /* FIXME */
1715 if ( !BER_BVISNULL( &mo->mo_dn ) ) {
1716 ber_memfree( mo->mo_dn.bv_val );
1717 ber_memfree( mo->mo_ndn.bv_val );
1719 mo->mo_dn = c->value_dn;
1720 mo->mo_ndn = c->value_ndn;
1724 i = verb_to_mask( c->argv[ 1 ], dangling_mode );
1725 if ( BER_BVISNULL( &dangling_mode[ i ].word ) ) {
1729 mo->mo_flags &= ~MEMBEROF_FDANGLING_MASK;
1730 mo->mo_flags |= dangling_mode[ i ].mask;
1734 if ( c->value_int ) {
1735 mo->mo_flags |= MEMBEROF_FREFINT;
1738 mo->mo_flags &= ~MEMBEROF_FREFINT;
1744 if ( c->value_int ) {
1745 mo->mo_flags |= MEMBEROF_FREVERSE;
1748 mo->mo_flags &= ~MEMBEROF_FREVERSE;
1754 ObjectClass *oc = NULL;
1756 oc = oc_find( c->argv[ 1 ] );
1758 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1759 "unable to find group objectClass=\"%s\"",
1761 Debug( LDAP_DEBUG_CONFIG, "%s: %s.\n",
1762 c->log, c->cr_msg, 0 );
1766 mo->mo_oc_group = oc;
1767 memberof_make_group_filter( mo );
1770 case MO_MEMBER_AD: {
1771 AttributeDescription *ad = NULL;
1772 const char *text = NULL;
1775 rc = slap_str2ad( c->argv[ 1 ], &ad, &text );
1776 if ( rc != LDAP_SUCCESS ) {
1777 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1778 "unable to find member attribute=\"%s\": %s (%d)",
1779 c->argv[ 1 ], text, rc );
1780 Debug( LDAP_DEBUG_CONFIG, "%s: %s.\n",
1781 c->log, c->cr_msg, 0 );
1785 if ( !is_at_syntax( ad->ad_type, SLAPD_DN_SYNTAX ) /* e.g. "member" */
1786 && !is_at_syntax( ad->ad_type, SLAPD_NAMEUID_SYNTAX ) ) /* e.g. "uniqueMember" */
1788 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1789 "member attribute=\"%s\" must either "
1790 "have DN (%s) or nameUID (%s) syntax",
1791 c->argv[ 1 ], SLAPD_DN_SYNTAX, SLAPD_NAMEUID_SYNTAX );
1792 Debug( LDAP_DEBUG_CONFIG, "%s: %s.\n",
1793 c->log, c->cr_msg, 0 );
1797 mo->mo_ad_member = ad;
1800 case MO_MEMBER_OF_AD: {
1801 AttributeDescription *ad = NULL;
1802 const char *text = NULL;
1805 rc = slap_str2ad( c->argv[ 1 ], &ad, &text );
1806 if ( rc != LDAP_SUCCESS ) {
1807 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1808 "unable to find memberof attribute=\"%s\": %s (%d)",
1809 c->argv[ 1 ], text, rc );
1810 Debug( LDAP_DEBUG_CONFIG, "%s: %s.\n",
1811 c->log, c->cr_msg, 0 );
1815 if ( !is_at_syntax( ad->ad_type, SLAPD_DN_SYNTAX ) /* e.g. "member" */
1816 && !is_at_syntax( ad->ad_type, SLAPD_NAMEUID_SYNTAX ) ) /* e.g. "uniqueMember" */
1818 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1819 "memberof attribute=\"%s\" must either "
1820 "have DN (%s) or nameUID (%s) syntax",
1821 c->argv[ 1 ], SLAPD_DN_SYNTAX, SLAPD_NAMEUID_SYNTAX );
1822 Debug( LDAP_DEBUG_CONFIG, "%s: %s.\n",
1823 c->log, c->cr_msg, 0 );
1827 mo->mo_ad_memberof = ad;
1828 memberof_make_member_filter( mo );
1845 slap_overinst *on = (slap_overinst *)be->bd_info;
1846 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
1849 const char *text = NULL;
1851 if( ! mo->mo_ad_memberof ){
1852 rc = slap_str2ad( SLAPD_MEMBEROF_ATTR, &mo->mo_ad_memberof, &text );
1853 if ( rc != LDAP_SUCCESS ) {
1854 Debug( LDAP_DEBUG_ANY, "memberof_db_open: "
1855 "unable to find attribute=\"%s\": %s (%d)\n",
1856 SLAPD_MEMBEROF_ATTR, text, rc );
1861 if( ! mo->mo_ad_member ){
1862 rc = slap_str2ad( SLAPD_GROUP_ATTR, &mo->mo_ad_member, &text );
1863 if ( rc != LDAP_SUCCESS ) {
1864 Debug( LDAP_DEBUG_ANY, "memberof_db_open: "
1865 "unable to find attribute=\"%s\": %s (%d)\n",
1866 SLAPD_GROUP_ATTR, text, rc );
1871 if( ! mo->mo_oc_group ){
1872 mo->mo_oc_group = oc_find( SLAPD_GROUP_CLASS );
1873 if ( mo->mo_oc_group == NULL ) {
1874 Debug( LDAP_DEBUG_ANY,
1875 "memberof_db_open: "
1876 "unable to find objectClass=\"%s\"\n",
1877 SLAPD_GROUP_CLASS, 0, 0 );
1882 if ( BER_BVISNULL( &mo->mo_dn ) ) {
1883 ber_dupbv( &mo->mo_dn, &be->be_rootdn );
1884 ber_dupbv( &mo->mo_ndn, &be->be_rootndn );
1887 if ( BER_BVISNULL( &mo->mo_groupFilterstr ) ) {
1888 memberof_make_group_filter( mo );
1891 if ( BER_BVISNULL( &mo->mo_memberFilterstr ) ) {
1892 memberof_make_member_filter( mo );
1899 memberof_db_destroy(
1903 slap_overinst *on = (slap_overinst *)be->bd_info;
1904 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
1907 if ( !BER_BVISNULL( &mo->mo_dn ) ) {
1908 ber_memfree( mo->mo_dn.bv_val );
1909 ber_memfree( mo->mo_ndn.bv_val );
1912 if ( !BER_BVISNULL( &mo->mo_groupFilterstr ) ) {
1913 ber_memfree( mo->mo_groupFilterstr.bv_val );
1916 if ( !BER_BVISNULL( &mo->mo_memberFilterstr ) ) {
1917 ber_memfree( mo->mo_memberFilterstr.bv_val );
1927 static AttributeDescription *ad_memberOf;
1931 AttributeDescription **adp;
1933 { "( 1.2.840.113556.1.2.102 "
1935 "DESC 'Group that the entry belongs to' "
1936 "SYNTAX '1.3.6.1.4.1.1466.115.121.1.12' "
1937 "EQUALITY distinguishedNameMatch " /* added */
1938 "USAGE dSAOperation " /* added; questioned */
1939 /* "NO-USER-MODIFICATION " */ /* add? */
1940 "X-ORIGIN 'iPlanet Delegated Administrator' )",
1945 #if SLAPD_OVER_MEMBEROF == SLAPD_MOD_DYNAMIC
1947 #endif /* SLAPD_OVER_MEMBEROF == SLAPD_MOD_DYNAMIC */
1949 memberof_initialize( void )
1953 for ( i = 0; as[ i ].desc != NULL; i++ ) {
1954 code = register_at( as[ i ].desc, as[ i ].adp, 0 );
1956 Debug( LDAP_DEBUG_ANY,
1957 "memberof_initialize: register_at #%d failed\n",
1963 memberof.on_bi.bi_type = "memberof";
1965 memberof.on_bi.bi_db_init = memberof_db_init;
1966 memberof.on_bi.bi_db_open = memberof_db_open;
1967 memberof.on_bi.bi_db_destroy = memberof_db_destroy;
1969 memberof.on_bi.bi_op_add = memberof_op_add;
1970 memberof.on_bi.bi_op_delete = memberof_op_delete;
1971 memberof.on_bi.bi_op_modify = memberof_op_modify;
1973 memberof.on_response = memberof_response;
1975 memberof.on_bi.bi_cf_ocs = mo_ocs;
1977 code = config_register_schema( mo_cfg, mo_ocs );
1978 if ( code ) return code;
1980 return overlay_register( &memberof );
1983 #if SLAPD_OVER_MEMBEROF == SLAPD_MOD_DYNAMIC
1985 init_module( int argc, char *argv[] )
1987 return memberof_initialize();
1989 #endif /* SLAPD_OVER_MEMBEROF == SLAPD_MOD_DYNAMIC */
1991 #endif /* SLAPD_OVER_MEMBEROF */