1 /* memberof.c - back-reference for group membership */
3 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
5 * Copyright 2005-2007 Pierangelo Masarati <ando@sys-net.it>
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted only as authorized by the OpenLDAP
12 * A copy of this license is available in the file LICENSE in the
13 * top-level directory of the distribution or, alternatively, at
14 * <http://www.OpenLDAP.org/license.html>.
17 * This work was initially developed by Pierangelo Masarati for inclusion
18 * in OpenLDAP Software, sponsored by SysNet s.r.l.
23 #ifdef SLAPD_OVER_MEMBEROF
27 #include "ac/string.h"
28 #include "ac/socket.h"
37 * GROUP a group object (an entry with GROUP_OC
39 * MEMBER a member object (an entry whose DN is
40 * listed as MEMBER_AT value of a GROUP)
41 * GROUP_OC the objectClass of the group object
42 * (default: groupOfNames)
43 * MEMBER_AT the membership attribute, DN-valued;
44 * note: nameAndOptionalUID is tolerated
45 * as soon as the optionalUID is absent
47 * MEMBER_OF reverse membership attribute
51 * - if the entry that is being added is a GROUP,
52 * the MEMBER_AT defined as values of the add operation
53 * get the MEMBER_OF value directly from the request.
55 * if configured to do so, the MEMBER objects do not exist,
56 * and no relax control is issued, either:
58 * - drop non-existing members
59 * (by default: don't muck with values)
61 * - if (configured to do so,) the referenced GROUP exists,
62 * the relax control is set and the user has
63 * "manage" privileges, allow to add MEMBER_OF values to
67 * - if the entry being modified is a GROUP_OC and the
68 * MEMBER_AT attribute is modified, the MEMBER_OF value
69 * of the (existing) MEMBER_AT entries that are affected
70 * is modified according to the request:
71 * - if a MEMBER is removed from the group,
72 * delete the corresponding MEMBER_OF
73 * - if a MEMBER is added to a group,
74 * add the corresponding MEMBER_OF
76 * We need to determine, from the database, if it is
77 * a GROUP_OC, and we need to check, from the
78 * modification list, if the MEMBER_AT attribute is being
79 * affected, and what MEMBER_AT values are affected.
81 * if configured to do so, the entries corresponding to
82 * the MEMBER_AT values do not exist, and no relax control
85 * - drop non-existing members
86 * (by default: don't muck with values)
88 * - if configured to do so, the referenced GROUP exists,
89 * (the relax control is set) and the user has
90 * "manage" privileges, allow to add MEMBER_OF values to
91 * generic entries; the change is NOT automatically reflected
92 * in the MEMBER attribute of the GROUP referenced
93 * by the value of MEMBER_OF; a separate modification,
94 * with or without relax control, needs to be performed.
97 * - if the entry being renamed is a GROUP, the MEMBER_OF
98 * value of the (existing) MEMBER objects is modified
99 * accordingly based on the newDN of the GROUP.
101 * We need to determine, from the database, if it is
102 * a GROUP; the list of MEMBER objects is obtained from
105 * Non-existing MEMBER objects are ignored, since the
106 * MEMBER_AT is not being addressed by the operation.
108 * - if the entry being renamed has the MEMBER_OF attribute,
109 * the corresponding MEMBER value must be modified in the
110 * respective group entries.
114 * - if the entry being deleted is a GROUP, the (existing)
115 * MEMBER objects are modified accordingly; a copy of the
116 * values of the MEMBER_AT is saved and, if the delete
117 * succeeds, the MEMBER_OF value of the (existing) MEMBER
118 * objects is deleted.
120 * We need to determine, from the database, if it is
123 * Non-existing MEMBER objects are ignored, since the entry
126 * - if the entry being deleted has the MEMBER_OF attribute,
127 * the corresponding value of the MEMBER_AT must be deleted
128 * from the respective GROUP entries.
131 #define SLAPD_MEMBEROF_ATTR "memberOf"
133 static slap_overinst memberof;
135 typedef struct memberof_t {
137 struct berval mo_ndn;
139 ObjectClass *mo_oc_group;
140 AttributeDescription *mo_ad_member;
141 AttributeDescription *mo_ad_memberof;
143 struct berval mo_groupFilterstr;
144 AttributeAssertion mo_groupAVA;
145 Filter mo_groupFilter;
147 struct berval mo_memberFilterstr;
148 Filter mo_memberFilter;
151 #define MEMBEROF_NONE 0x00U
152 #define MEMBEROF_FDANGLING_DROP 0x01U
153 #define MEMBEROF_FDANGLING_ERROR 0x02U
154 #define MEMBEROF_FDANGLING_MASK (MEMBEROF_FDANGLING_DROP|MEMBEROF_FDANGLING_ERROR)
155 #define MEMBEROF_FREFINT 0x04U
156 #define MEMBEROF_FREVERSE 0x08U
158 ber_int_t mo_dangling_err;
160 #define MEMBEROF_CHK(mo,f) \
161 (((mo)->mo_flags & (f)) == (f))
162 #define MEMBEROF_DANGLING_CHECK(mo) \
163 ((mo)->mo_flags & MEMBEROF_FDANGLING_MASK)
164 #define MEMBEROF_DANGLING_DROP(mo) \
165 MEMBEROF_CHK((mo),MEMBEROF_FDANGLING_DROP)
166 #define MEMBEROF_DANGLING_ERROR(mo) \
167 MEMBEROF_CHK((mo),MEMBEROF_FDANGLING_ERROR)
168 #define MEMBEROF_REFINT(mo) \
169 MEMBEROF_CHK((mo),MEMBEROF_FREFINT)
170 #define MEMBEROF_REVERSE(mo) \
171 MEMBEROF_CHK((mo),MEMBEROF_FREVERSE)
174 typedef enum memberof_is_t {
175 MEMBEROF_IS_NONE = 0x00,
176 MEMBEROF_IS_GROUP = 0x01,
177 MEMBEROF_IS_MEMBER = 0x02,
178 MEMBEROF_IS_BOTH = (MEMBEROF_IS_GROUP|MEMBEROF_IS_MEMBER)
181 typedef struct memberof_cookie_t {
182 AttributeDescription *ad;
187 typedef struct memberof_cbinfo_t {
195 memberof_isGroupOrMember_cb( Operation *op, SlapReply *rs )
197 if ( rs->sr_type == REP_SEARCH ) {
198 memberof_cookie_t *mc;
200 mc = (memberof_cookie_t *)op->o_callback->sc_private;
208 * callback for internal search that saves the member attribute values
209 * of groups being deleted.
212 memberof_saveMember_cb( Operation *op, SlapReply *rs )
214 if ( rs->sr_type == REP_SEARCH ) {
215 memberof_cookie_t *mc;
218 mc = (memberof_cookie_t *)op->o_callback->sc_private;
221 assert( rs->sr_entry != NULL );
222 assert( rs->sr_entry->e_attrs != NULL );
224 a = attr_find( rs->sr_entry->e_attrs, mc->ad );
226 ber_bvarray_dup_x( &mc->vals, a->a_nvals, op->o_tmpmemctx );
228 assert( attr_find( a->a_next, mc->ad ) == NULL );
236 * the delete hook performs an internal search that saves the member
237 * attribute values of groups being deleted.
240 memberof_isGroupOrMember( Operation *op, memberof_cbinfo_t *mci )
242 slap_overinst *on = mci->on;
243 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
246 SlapReply rs2 = { REP_RESULT };
247 slap_callback cb = { 0 };
248 BackendInfo *bi = op->o_bd->bd_info;
249 AttributeName an[ 2 ];
251 memberof_is_t iswhat = MEMBEROF_IS_NONE;
252 memberof_cookie_t mc;
254 assert( mci->what != MEMBEROF_IS_NONE );
257 if ( op->o_tag == LDAP_REQ_DELETE ) {
258 cb.sc_response = memberof_saveMember_cb;
261 cb.sc_response = memberof_isGroupOrMember_cb;
264 op2.o_tag = LDAP_REQ_SEARCH;
265 op2.o_callback = &cb;
266 op2.o_dn = op->o_bd->be_rootdn;
267 op2.o_ndn = op->o_bd->be_rootndn;
269 op2.ors_scope = LDAP_SCOPE_BASE;
270 op2.ors_deref = LDAP_DEREF_NEVER;
271 BER_BVZERO( &an[ 1 ].an_name );
273 op2.ors_attrsonly = 0;
274 op2.ors_limit = NULL;
276 op2.ors_tlimit = SLAP_NO_LIMIT;
278 if ( mci->what & MEMBEROF_IS_GROUP ) {
279 mc.ad = mo->mo_ad_member;
282 an[ 0 ].an_desc = mo->mo_ad_member;
283 an[ 0 ].an_name = an[ 0 ].an_desc->ad_cname;
284 op2.ors_filterstr = mo->mo_groupFilterstr;
285 op2.ors_filter = &mo->mo_groupFilter;
287 op2.o_bd->bd_info = (BackendInfo *)on->on_info;
288 (void)op->o_bd->be_search( &op2, &rs2 );
289 op2.o_bd->bd_info = bi;
292 iswhat |= MEMBEROF_IS_GROUP;
293 if ( mc.vals ) mci->member = mc.vals;
298 if ( mci->what & MEMBEROF_IS_MEMBER ) {
299 mc.ad = mo->mo_ad_memberof;
302 an[ 0 ].an_desc = mo->mo_ad_memberof;
303 an[ 0 ].an_name = an[ 0 ].an_desc->ad_cname;
304 op2.ors_filterstr = mo->mo_memberFilterstr;
305 op2.ors_filter = &mo->mo_memberFilter;
307 op2.o_bd->bd_info = (BackendInfo *)on->on_info;
308 (void)op->o_bd->be_search( &op2, &rs2 );
309 op2.o_bd->bd_info = bi;
312 iswhat |= MEMBEROF_IS_MEMBER;
313 if ( mc.vals ) mci->memberof = mc.vals;
324 * response callback that adds memberof values when a group is modified.
327 memberof_value_modify(
331 AttributeDescription *ad,
332 struct berval *old_dn,
333 struct berval *old_ndn,
334 struct berval *new_dn,
335 struct berval *new_ndn )
337 memberof_cbinfo_t *mci = op->o_callback->sc_private;
338 slap_overinst *on = mci->on;
339 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
342 SlapReply rs2 = { REP_RESULT };
343 slap_callback cb = { NULL, slap_null_cb, NULL, NULL };
344 Modifications mod[ 2 ] = { { { 0 } } }, *ml;
345 struct berval values[ 4 ], nvalues[ 4 ];
348 op2.o_tag = LDAP_REQ_MODIFY;
351 op2.o_req_ndn = *ndn;
353 op2.o_callback = &cb;
354 op2.o_dn = op->o_bd->be_rootdn;
355 op2.o_ndn = op->o_bd->be_rootndn;
356 op2.orm_modlist = NULL;
358 if ( !BER_BVISNULL( &mo->mo_ndn ) ) {
361 ml->sml_values = &values[ 0 ];
362 ml->sml_values[ 0 ] = mo->mo_dn;
363 BER_BVZERO( &ml->sml_values[ 1 ] );
364 ml->sml_nvalues = &nvalues[ 0 ];
365 ml->sml_nvalues[ 0 ] = mo->mo_ndn;
366 BER_BVZERO( &ml->sml_nvalues[ 1 ] );
367 ml->sml_desc = slap_schema.si_ad_modifiersName;
368 ml->sml_type = ml->sml_desc->ad_cname;
369 ml->sml_op = LDAP_MOD_REPLACE;
370 ml->sml_flags = SLAP_MOD_INTERNAL;
371 ml->sml_next = op2.orm_modlist;
372 op2.orm_modlist = ml;
379 ml->sml_values = &values[ 2 ];
380 BER_BVZERO( &ml->sml_values[ 1 ] );
381 ml->sml_nvalues = &nvalues[ 2 ];
382 BER_BVZERO( &ml->sml_nvalues[ 1 ] );
384 ml->sml_type = ml->sml_desc->ad_cname;
385 ml->sml_flags = SLAP_MOD_INTERNAL;
386 ml->sml_next = op2.orm_modlist;
387 op2.orm_modlist = ml;
388 op2.orm_no_opattrs = 0;
390 if ( new_ndn != NULL ) {
391 assert( !BER_BVISNULL( new_dn ) );
392 assert( !BER_BVISNULL( new_ndn ) );
395 ml->sml_op = LDAP_MOD_ADD;
397 ml->sml_values[ 0 ] = *new_dn;
398 ml->sml_nvalues[ 0 ] = *new_ndn;
400 (void)op->o_bd->be_modify( &op2, &rs2 );
401 if ( rs2.sr_err != LDAP_SUCCESS ) {
402 char buf[ SLAP_TEXT_BUFLEN ];
403 snprintf( buf, sizeof( buf ),
404 "memberof_value_modify %s=\"%s\" failed err=%d text=%s",
405 ad->ad_cname.bv_val, new_dn->bv_val, rs2.sr_err,
406 rs2.sr_text ? rs2.sr_text : "" );
407 Debug( LDAP_DEBUG_ANY, "%s: %s\n",
408 op->o_log_prefix, buf, 0 );
411 assert( op2.orm_modlist == &mod[ mcnt ] );
412 assert( mcnt == 0 || op2.orm_modlist->sml_next == &mod[ 0 ] );
413 ml = op2.orm_modlist->sml_next;
415 assert( ml == &mod[ 0 ] );
419 slap_mods_free( ml, 1 );
422 mod[ 0 ].sml_next = NULL;
425 if ( old_ndn != NULL ) {
426 assert( !BER_BVISNULL( old_dn ) );
427 assert( !BER_BVISNULL( old_ndn ) );
430 ml->sml_op = LDAP_MOD_DELETE;
432 ml->sml_values[ 0 ] = *old_dn;
433 ml->sml_nvalues[ 0 ] = *old_ndn;
435 (void)op->o_bd->be_modify( &op2, &rs2 );
436 if ( rs2.sr_err != LDAP_SUCCESS ) {
437 char buf[ SLAP_TEXT_BUFLEN ];
438 snprintf( buf, sizeof( buf ),
439 "memberof_value_modify %s=\"%s\" failed err=%d text=%s",
440 ad->ad_cname.bv_val, old_dn->bv_val, rs2.sr_err,
441 rs2.sr_text ? rs2.sr_text : "" );
442 Debug( LDAP_DEBUG_ANY, "%s: %s\n",
443 op->o_log_prefix, buf, 0 );
446 assert( op2.orm_modlist == &mod[ mcnt ] );
447 ml = op2.orm_modlist->sml_next;
449 assert( ml == &mod[ 0 ] );
453 slap_mods_free( ml, 1 );
457 /* FIXME: if old_group_ndn doesn't exist, both delete __and__
458 * add will fail; better split in two operations, although
459 * not optimal in terms of performance. At least it would
460 * move towards self-repairing capabilities. */
466 memberof_cleanup( Operation *op, SlapReply *rs )
468 slap_callback *sc = op->o_callback;
469 memberof_cbinfo_t *mci = sc->sc_private;
471 op->o_callback = sc->sc_next;
473 ber_bvarray_free_x( mci->memberof, op->o_tmpmemctx );
475 ber_bvarray_free_x( mci->member, op->o_tmpmemctx );
476 op->o_tmpfree( sc, op->o_tmpmemctx );
480 static int memberof_res_add( Operation *op, SlapReply *rs );
481 static int memberof_res_delete( Operation *op, SlapReply *rs );
482 static int memberof_res_modify( Operation *op, SlapReply *rs );
483 static int memberof_res_modrdn( Operation *op, SlapReply *rs );
486 memberof_op_add( Operation *op, SlapReply *rs )
488 slap_overinst *on = (slap_overinst *)op->o_bd->bd_info;
489 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
491 Attribute **ap, **map = NULL;
492 int rc = SLAP_CB_CONTINUE;
494 struct berval save_dn, save_ndn;
496 memberof_cbinfo_t *mci;
498 if ( op->ora_e->e_attrs == NULL ) {
499 /* FIXME: global overlay; need to deal with */
500 Debug( LDAP_DEBUG_ANY, "%s: memberof_op_add(\"%s\"): "
501 "consistency checks not implemented when overlay "
502 "is instantiated as global.\n",
503 op->o_log_prefix, op->o_req_dn.bv_val, 0 );
504 return SLAP_CB_CONTINUE;
507 if ( MEMBEROF_REVERSE( mo ) ) {
508 for ( ap = &op->ora_e->e_attrs; *ap; ap = &(*ap)->a_next ) {
511 if ( a->a_desc == mo->mo_ad_memberof ) {
519 save_ndn = op->o_ndn;
521 if ( MEMBEROF_DANGLING_CHECK( mo )
523 && is_entry_objectclass_or_sub( op->ora_e, mo->mo_oc_group ) )
525 op->o_dn = op->o_bd->be_rootdn;
526 op->o_ndn = op->o_bd->be_rootndn;
527 op->o_bd->bd_info = (BackendInfo *)on->on_info;
529 for ( ap = &op->ora_e->e_attrs; *ap; ) {
532 if ( !is_ad_subtype( a->a_desc, mo->mo_ad_member ) ) {
537 assert( a->a_nvals != NULL );
539 for ( i = 0; !BER_BVISNULL( &a->a_nvals[ i ] ); i++ ) {
542 rc = be_entry_get_rw( op, &a->a_nvals[ i ],
544 if ( rc == LDAP_SUCCESS ) {
545 be_entry_release_r( op, e );
549 if ( MEMBEROF_DANGLING_ERROR( mo ) ) {
550 rc = rs->sr_err = mo->mo_dangling_err;
551 rs->sr_text = "adding non-existing object "
553 send_ldap_result( op, rs );
557 if ( MEMBEROF_DANGLING_DROP( mo ) ) {
560 Debug( LDAP_DEBUG_ANY, "%s: memberof_op_add(\"%s\"): "
561 "member=\"%s\" does not exist (stripping...)\n",
562 op->o_log_prefix, op->ora_e->e_name.bv_val,
563 a->a_vals[ i ].bv_val );
565 for ( j = i + 1; !BER_BVISNULL( &a->a_nvals[ j ] ); j++ );
566 ber_memfree( a->a_vals[ i ].bv_val );
567 BER_BVZERO( &a->a_vals[ i ] );
568 if ( a->a_nvals != a->a_vals ) {
569 ber_memfree( a->a_nvals[ i ].bv_val );
570 BER_BVZERO( &a->a_nvals[ i ] );
576 AC_MEMCPY( &a->a_vals[ i ], &a->a_vals[ i + 1 ],
577 sizeof( struct berval ) * ( j - i ) );
578 if ( a->a_nvals != a->a_vals ) {
579 AC_MEMCPY( &a->a_nvals[ i ], &a->a_nvals[ i + 1 ],
580 sizeof( struct berval ) * ( j - i ) );
586 /* If all values have been removed,
587 * remove the attribute itself. */
588 if ( BER_BVISNULL( &a->a_nvals[ 0 ] ) ) {
597 op->o_ndn = save_ndn;
598 op->o_bd->bd_info = (BackendInfo *)on;
603 AccessControlState acl_state = ACL_STATE_INIT;
605 for ( i = 0; !BER_BVISNULL( &a->a_nvals[ i ] ); i++ ) {
608 op->o_bd->bd_info = (BackendInfo *)on->on_info;
609 /* access is checked with the original identity */
610 rc = access_allowed( op, op->ora_e, mo->mo_ad_memberof,
611 &a->a_nvals[ i ], ACL_WADD,
614 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
616 send_ldap_result( op, rs );
619 rc = be_entry_get_rw( op, &a->a_nvals[ i ],
621 op->o_bd->bd_info = (BackendInfo *)on;
622 if ( rc != LDAP_SUCCESS ) {
623 if ( get_relax( op ) ) {
627 if ( MEMBEROF_DANGLING_ERROR( mo ) ) {
628 rc = rs->sr_err = mo->mo_dangling_err;
629 rs->sr_text = "adding non-existing object "
631 send_ldap_result( op, rs );
635 if ( MEMBEROF_DANGLING_DROP( mo ) ) {
638 Debug( LDAP_DEBUG_ANY, "%s: memberof_op_add(\"%s\"): "
639 "memberof=\"%s\" does not exist (stripping...)\n",
640 op->o_log_prefix, op->ora_e->e_name.bv_val,
641 a->a_nvals[ i ].bv_val );
643 for ( j = i + 1; !BER_BVISNULL( &a->a_nvals[ j ] ); j++ );
644 ber_memfree( a->a_vals[ i ].bv_val );
645 BER_BVZERO( &a->a_vals[ i ] );
646 if ( a->a_nvals != a->a_vals ) {
647 ber_memfree( a->a_nvals[ i ].bv_val );
648 BER_BVZERO( &a->a_nvals[ i ] );
654 AC_MEMCPY( &a->a_vals[ i ], &a->a_vals[ i + 1 ],
655 sizeof( struct berval ) * ( j - i ) );
656 if ( a->a_nvals != a->a_vals ) {
657 AC_MEMCPY( &a->a_nvals[ i ], &a->a_nvals[ i + 1 ],
658 sizeof( struct berval ) * ( j - i ) );
666 /* access is checked with the original identity */
667 op->o_bd->bd_info = (BackendInfo *)on->on_info;
668 rc = access_allowed( op, e, mo->mo_ad_member,
669 &op->o_req_ndn, ACL_WADD, NULL );
670 be_entry_release_r( op, e );
671 op->o_bd->bd_info = (BackendInfo *)on;
674 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
675 rs->sr_text = "insufficient access to object referenced by memberof";
676 send_ldap_result( op, rs );
681 if ( BER_BVISNULL( &a->a_nvals[ 0 ] ) ) {
687 rc = SLAP_CB_CONTINUE;
689 sc = op->o_tmpalloc( sizeof(slap_callback)+sizeof(*mci), op->o_tmpmemctx );
690 sc->sc_private = sc+1;
691 sc->sc_response = memberof_res_add;
692 sc->sc_cleanup = memberof_cleanup;
693 mci = sc->sc_private;
696 mci->memberof = NULL;
697 sc->sc_next = op->o_callback;
702 op->o_ndn = save_ndn;
703 op->o_bd->bd_info = (BackendInfo *)on;
709 memberof_op_delete( Operation *op, SlapReply *rs )
711 slap_overinst *on = (slap_overinst *)op->o_bd->bd_info;
712 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
715 memberof_cbinfo_t *mci;
718 sc = op->o_tmpalloc( sizeof(slap_callback)+sizeof(*mci), op->o_tmpmemctx );
719 sc->sc_private = sc+1;
720 sc->sc_response = memberof_res_delete;
721 sc->sc_cleanup = memberof_cleanup;
722 mci = sc->sc_private;
725 mci->memberof = NULL;
726 mci->what = MEMBEROF_IS_GROUP;
727 if ( MEMBEROF_REFINT( mo ) ) {
728 mci->what = MEMBEROF_IS_BOTH;
731 memberof_isGroupOrMember( op, mci );
733 sc->sc_next = op->o_callback;
736 return SLAP_CB_CONTINUE;
740 memberof_op_modify( Operation *op, SlapReply *rs )
742 slap_overinst *on = (slap_overinst *)op->o_bd->bd_info;
743 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
745 Modifications **mlp, **mmlp = NULL;
746 int rc = SLAP_CB_CONTINUE, save_member = 0;
747 struct berval save_dn, save_ndn;
749 memberof_cbinfo_t *mci, mcis;
751 if ( MEMBEROF_REVERSE( mo ) ) {
752 for ( mlp = &op->orm_modlist; *mlp; mlp = &(*mlp)->sml_next ) {
753 Modifications *ml = *mlp;
755 if ( ml->sml_desc == mo->mo_ad_memberof ) {
763 save_ndn = op->o_ndn;
765 mcis.what = MEMBEROF_IS_GROUP;
767 if ( memberof_isGroupOrMember( op, &mcis ) == LDAP_SUCCESS
768 && ( mcis.what & MEMBEROF_IS_GROUP ) )
772 for ( ml = op->orm_modlist; ml; ml = ml->sml_next ) {
773 if ( ml->sml_desc == mo->mo_ad_member ) {
774 switch ( ml->sml_op ) {
775 case LDAP_MOD_DELETE:
776 case LDAP_MOD_REPLACE:
784 if ( MEMBEROF_DANGLING_CHECK( mo )
785 && !get_relax( op ) )
787 op->o_dn = op->o_bd->be_rootdn;
788 op->o_ndn = op->o_bd->be_rootndn;
789 op->o_bd->bd_info = (BackendInfo *)on->on_info;
791 assert( op->orm_modlist != NULL );
793 for ( mlp = &op->orm_modlist; *mlp; ) {
794 Modifications *ml = *mlp;
797 if ( !is_ad_subtype( ml->sml_desc, mo->mo_ad_member ) ) {
802 switch ( ml->sml_op ) {
803 case LDAP_MOD_DELETE:
804 /* we don't care about cancellations: if the value
805 * exists, fine; if it doesn't, we let the underlying
806 * database fail as appropriate; */
810 case LDAP_MOD_REPLACE:
811 /* Handle this just like a delete (see above) */
812 if ( !ml->sml_values ) {
818 /* NOTE: right now, the attributeType we use
819 * for member must have a normalized value */
820 assert( ml->sml_nvalues != NULL );
822 for ( i = 0; !BER_BVISNULL( &ml->sml_nvalues[ i ] ); i++ ) {
826 if ( be_entry_get_rw( op, &ml->sml_nvalues[ i ],
827 NULL, NULL, 0, &e ) == LDAP_SUCCESS )
829 be_entry_release_r( op, e );
833 if ( MEMBEROF_DANGLING_ERROR( mo ) ) {
834 rc = rs->sr_err = mo->mo_dangling_err;
835 rs->sr_text = "adding non-existing object "
837 send_ldap_result( op, rs );
841 if ( MEMBEROF_DANGLING_DROP( mo ) ) {
844 Debug( LDAP_DEBUG_ANY, "%s: memberof_op_modify(\"%s\"): "
845 "member=\"%s\" does not exist (stripping...)\n",
846 op->o_log_prefix, op->o_req_dn.bv_val,
847 ml->sml_nvalues[ i ].bv_val );
849 for ( j = i + 1; !BER_BVISNULL( &ml->sml_nvalues[ j ] ); j++ );
850 ber_memfree( ml->sml_values[ i ].bv_val );
851 BER_BVZERO( &ml->sml_values[ i ] );
852 ber_memfree( ml->sml_nvalues[ i ].bv_val );
853 BER_BVZERO( &ml->sml_nvalues[ i ] );
859 AC_MEMCPY( &ml->sml_values[ i ], &ml->sml_values[ i + 1 ],
860 sizeof( struct berval ) * ( j - i ) );
861 AC_MEMCPY( &ml->sml_nvalues[ i ], &ml->sml_nvalues[ i + 1 ],
862 sizeof( struct berval ) * ( j - i ) );
867 if ( BER_BVISNULL( &ml->sml_nvalues[ 0 ] ) ) {
869 slap_mod_free( &ml->sml_mod, 0 );
885 if ( mmlp != NULL ) {
886 Modifications *ml = *mmlp;
890 op->o_bd->bd_info = (BackendInfo *)on->on_info;
891 rc = be_entry_get_rw( op, &op->o_req_ndn,
892 NULL, NULL, 0, &target );
893 op->o_bd->bd_info = (BackendInfo *)on;
894 if ( rc != LDAP_SUCCESS ) {
895 rc = rs->sr_err = LDAP_NO_SUCH_OBJECT;
896 send_ldap_result( op, rs );
900 switch ( ml->sml_op ) {
901 case LDAP_MOD_DELETE:
902 if ( ml->sml_nvalues != NULL ) {
903 AccessControlState acl_state = ACL_STATE_INIT;
905 for ( i = 0; !BER_BVISNULL( &ml->sml_nvalues[ i ] ); i++ ) {
908 op->o_bd->bd_info = (BackendInfo *)on->on_info;
909 /* access is checked with the original identity */
910 rc = access_allowed( op, target,
912 &ml->sml_nvalues[ i ],
916 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
918 send_ldap_result( op, rs );
922 rc = be_entry_get_rw( op, &ml->sml_nvalues[ i ],
924 op->o_bd->bd_info = (BackendInfo *)on;
925 if ( rc != LDAP_SUCCESS ) {
926 if ( get_relax( op ) ) {
930 if ( MEMBEROF_DANGLING_ERROR( mo ) ) {
931 rc = rs->sr_err = mo->mo_dangling_err;
932 rs->sr_text = "deleting non-existing object "
934 send_ldap_result( op, rs );
938 if ( MEMBEROF_DANGLING_DROP( mo ) ) {
941 Debug( LDAP_DEBUG_ANY, "%s: memberof_op_modify(\"%s\"): "
942 "memberof=\"%s\" does not exist (stripping...)\n",
943 op->o_log_prefix, op->o_req_ndn.bv_val,
944 ml->sml_nvalues[ i ].bv_val );
946 for ( j = i + 1; !BER_BVISNULL( &ml->sml_nvalues[ j ] ); j++ );
947 ber_memfree( ml->sml_values[ i ].bv_val );
948 BER_BVZERO( &ml->sml_values[ i ] );
949 if ( ml->sml_nvalues != ml->sml_values ) {
950 ber_memfree( ml->sml_nvalues[ i ].bv_val );
951 BER_BVZERO( &ml->sml_nvalues[ i ] );
958 AC_MEMCPY( &ml->sml_values[ i ], &ml->sml_values[ i + 1 ],
959 sizeof( struct berval ) * ( j - i ) );
960 if ( ml->sml_nvalues != ml->sml_values ) {
961 AC_MEMCPY( &ml->sml_nvalues[ i ], &ml->sml_nvalues[ i + 1 ],
962 sizeof( struct berval ) * ( j - i ) );
970 /* access is checked with the original identity */
971 op->o_bd->bd_info = (BackendInfo *)on->on_info;
972 rc = access_allowed( op, e, mo->mo_ad_member,
975 be_entry_release_r( op, e );
976 op->o_bd->bd_info = (BackendInfo *)on;
979 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
980 rs->sr_text = "insufficient access to object referenced by memberof";
981 send_ldap_result( op, rs );
986 if ( BER_BVISNULL( &ml->sml_nvalues[ 0 ] ) ) {
987 *mmlp = ml->sml_next;
988 slap_mod_free( &ml->sml_mod, 0 );
996 case LDAP_MOD_REPLACE:
998 op->o_bd->bd_info = (BackendInfo *)on->on_info;
999 /* access is checked with the original identity */
1000 rc = access_allowed( op, target,
1004 op->o_bd->bd_info = (BackendInfo *)on;
1006 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
1008 send_ldap_result( op, rs );
1012 if ( ml->sml_op == LDAP_MOD_DELETE || !ml->sml_values ) {
1017 case LDAP_MOD_ADD: {
1018 AccessControlState acl_state = ACL_STATE_INIT;
1020 for ( i = 0; !BER_BVISNULL( &ml->sml_nvalues[ i ] ); i++ ) {
1023 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1024 /* access is checked with the original identity */
1025 rc = access_allowed( op, target,
1027 &ml->sml_nvalues[ i ],
1031 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
1033 send_ldap_result( op, rs );
1037 rc = be_entry_get_rw( op, &ml->sml_nvalues[ i ],
1038 NULL, NULL, 0, &e );
1039 op->o_bd->bd_info = (BackendInfo *)on;
1040 if ( rc != LDAP_SUCCESS ) {
1041 if ( MEMBEROF_DANGLING_ERROR( mo ) ) {
1042 rc = rs->sr_err = mo->mo_dangling_err;
1043 rs->sr_text = "adding non-existing object "
1045 send_ldap_result( op, rs );
1049 if ( MEMBEROF_DANGLING_DROP( mo ) ) {
1052 Debug( LDAP_DEBUG_ANY, "%s: memberof_op_modify(\"%s\"): "
1053 "memberof=\"%s\" does not exist (stripping...)\n",
1054 op->o_log_prefix, op->o_req_ndn.bv_val,
1055 ml->sml_nvalues[ i ].bv_val );
1057 for ( j = i + 1; !BER_BVISNULL( &ml->sml_nvalues[ j ] ); j++ );
1058 ber_memfree( ml->sml_values[ i ].bv_val );
1059 BER_BVZERO( &ml->sml_values[ i ] );
1060 if ( ml->sml_nvalues != ml->sml_values ) {
1061 ber_memfree( ml->sml_nvalues[ i ].bv_val );
1062 BER_BVZERO( &ml->sml_nvalues[ i ] );
1069 AC_MEMCPY( &ml->sml_values[ i ], &ml->sml_values[ i + 1 ],
1070 sizeof( struct berval ) * ( j - i ) );
1071 if ( ml->sml_nvalues != ml->sml_values ) {
1072 AC_MEMCPY( &ml->sml_nvalues[ i ], &ml->sml_nvalues[ i + 1 ],
1073 sizeof( struct berval ) * ( j - i ) );
1081 /* access is checked with the original identity */
1082 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1083 rc = access_allowed( op, e, mo->mo_ad_member,
1086 be_entry_release_r( op, e );
1087 op->o_bd->bd_info = (BackendInfo *)on;
1090 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
1091 rs->sr_text = "insufficient access to object referenced by memberof";
1092 send_ldap_result( op, rs );
1097 if ( BER_BVISNULL( &ml->sml_nvalues[ 0 ] ) ) {
1098 *mmlp = ml->sml_next;
1099 slap_mod_free( &ml->sml_mod, 0 );
1110 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1111 be_entry_release_r( op, target );
1112 op->o_bd->bd_info = (BackendInfo *)on;
1115 sc = op->o_tmpalloc( sizeof(slap_callback)+sizeof(*mci), op->o_tmpmemctx );
1116 sc->sc_private = sc+1;
1117 sc->sc_response = memberof_res_modify;
1118 sc->sc_cleanup = memberof_cleanup;
1119 mci = sc->sc_private;
1122 mci->memberof = NULL;
1123 mci->what = mcis.what;
1125 if ( save_member ) {
1126 op->o_dn = op->o_bd->be_rootdn;
1127 op->o_ndn = op->o_bd->be_rootndn;
1128 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1129 rc = backend_attribute( op, NULL, &op->o_req_ndn,
1130 mo->mo_ad_member, &mci->member, ACL_READ );
1131 op->o_bd->bd_info = (BackendInfo *)on;
1134 sc->sc_next = op->o_callback;
1135 op->o_callback = sc;
1137 rc = SLAP_CB_CONTINUE;
1141 op->o_ndn = save_ndn;
1142 op->o_bd->bd_info = (BackendInfo *)on;
1148 memberof_op_modrdn( Operation *op, SlapReply *rs )
1150 slap_overinst *on = (slap_overinst *)op->o_bd->bd_info;
1152 memberof_cbinfo_t *mci;
1154 sc = op->o_tmpalloc( sizeof(slap_callback)+sizeof(*mci), op->o_tmpmemctx );
1155 sc->sc_private = sc+1;
1156 sc->sc_response = memberof_res_modrdn;
1157 sc->sc_cleanup = memberof_cleanup;
1158 mci = sc->sc_private;
1161 mci->memberof = NULL;
1163 sc->sc_next = op->o_callback;
1164 op->o_callback = sc;
1166 return SLAP_CB_CONTINUE;
1170 * response callback that adds memberof values when a group is added.
1173 memberof_res_add( Operation *op, SlapReply *rs )
1175 memberof_cbinfo_t *mci = op->o_callback->sc_private;
1176 slap_overinst *on = mci->on;
1177 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
1181 if ( rs->sr_err != LDAP_SUCCESS ) {
1182 return SLAP_CB_CONTINUE;
1185 if ( MEMBEROF_REVERSE( mo ) ) {
1188 ma = attr_find( op->ora_e->e_attrs, mo->mo_ad_memberof );
1190 char relax = op->o_relax;
1192 /* relax is required to allow to add
1193 * a non-existing member */
1194 op->o_relax = SLAP_CONTROL_CRITICAL;
1196 for ( i = 0; !BER_BVISNULL( &ma->a_nvals[ i ] ); i++ ) {
1198 /* the modification is attempted
1199 * with the original identity */
1200 (void)memberof_value_modify( op, rs,
1201 &ma->a_nvals[ i ], mo->mo_ad_member,
1202 NULL, NULL, &op->o_req_dn, &op->o_req_ndn );
1207 if ( is_entry_objectclass_or_sub( op->ora_e, mo->mo_oc_group ) ) {
1210 for ( a = attrs_find( op->ora_e->e_attrs, mo->mo_ad_member );
1212 a = attrs_find( a->a_next, mo->mo_ad_member ) )
1214 for ( i = 0; !BER_BVISNULL( &a->a_nvals[ i ] ); i++ ) {
1215 (void)memberof_value_modify( op, rs,
1225 return SLAP_CB_CONTINUE;
1229 * response callback that deletes memberof values when a group is deleted.
1232 memberof_res_delete( Operation *op, SlapReply *rs )
1234 memberof_cbinfo_t *mci = op->o_callback->sc_private;
1235 slap_overinst *on = mci->on;
1236 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
1241 if ( rs->sr_err != LDAP_SUCCESS ) {
1242 return SLAP_CB_CONTINUE;
1246 if ( vals != NULL ) {
1247 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1248 (void)memberof_value_modify( op, rs,
1249 &vals[ i ], mo->mo_ad_memberof,
1250 &op->o_req_dn, &op->o_req_ndn,
1255 if ( MEMBEROF_REFINT( mo ) ) {
1256 vals = mci->memberof;
1257 if ( vals != NULL ) {
1258 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1259 (void)memberof_value_modify( op, rs,
1260 &vals[ i ], mo->mo_ad_member,
1261 &op->o_req_dn, &op->o_req_ndn,
1267 return SLAP_CB_CONTINUE;
1271 * response callback that adds/deletes memberof values when a group
1275 memberof_res_modify( Operation *op, SlapReply *rs )
1277 memberof_cbinfo_t *mci = op->o_callback->sc_private;
1278 slap_overinst *on = mci->on;
1279 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
1282 Modifications *ml, *mml = NULL;
1285 if ( rs->sr_err != LDAP_SUCCESS ) {
1286 return SLAP_CB_CONTINUE;
1289 if ( MEMBEROF_REVERSE( mo ) ) {
1290 for ( ml = op->orm_modlist; ml; ml = ml->sml_next ) {
1291 if ( ml->sml_desc == mo->mo_ad_memberof ) {
1298 if ( mml != NULL ) {
1299 BerVarray vals = mml->sml_nvalues;
1301 switch ( mml->sml_op ) {
1302 case LDAP_MOD_DELETE:
1303 if ( vals != NULL ) {
1304 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1305 memberof_value_modify( op, rs,
1306 &vals[ i ], mo->mo_ad_member,
1307 &op->o_req_dn, &op->o_req_ndn,
1314 case LDAP_MOD_REPLACE:
1315 /* delete all ... */
1316 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1317 rc = backend_attribute( op, NULL, &op->o_req_ndn,
1318 mo->mo_ad_memberof, &vals, ACL_READ );
1319 op->o_bd->bd_info = (BackendInfo *)on;
1320 if ( rc == LDAP_SUCCESS ) {
1321 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1322 (void)memberof_value_modify( op, rs,
1323 &vals[ i ], mo->mo_ad_member,
1324 &op->o_req_dn, &op->o_req_ndn,
1327 ber_bvarray_free_x( vals, op->o_tmpmemctx );
1330 if ( ml->sml_op == LDAP_MOD_DELETE || !mml->sml_values ) {
1336 assert( vals != NULL );
1338 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1339 memberof_value_modify( op, rs,
1340 &vals[ i ], mo->mo_ad_member,
1342 &op->o_req_dn, &op->o_req_ndn );
1351 if ( mci->what & MEMBEROF_IS_GROUP )
1353 for ( ml = op->orm_modlist; ml; ml = ml->sml_next ) {
1354 if ( ml->sml_desc != mo->mo_ad_member ) {
1358 switch ( ml->sml_op ) {
1359 case LDAP_MOD_DELETE:
1360 vals = ml->sml_nvalues;
1361 if ( vals != NULL ) {
1362 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1363 memberof_value_modify( op, rs,
1364 &vals[ i ], mo->mo_ad_memberof,
1365 &op->o_req_dn, &op->o_req_ndn,
1372 case LDAP_MOD_REPLACE:
1375 /* delete all ... */
1376 if ( vals != NULL ) {
1377 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1378 (void)memberof_value_modify( op, rs,
1379 &vals[ i ], mo->mo_ad_memberof,
1380 &op->o_req_dn, &op->o_req_ndn,
1385 if ( ml->sml_op == LDAP_MOD_DELETE || !ml->sml_values ) {
1391 assert( ml->sml_nvalues != NULL );
1392 vals = ml->sml_nvalues;
1393 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1394 memberof_value_modify( op, rs,
1395 &vals[ i ], mo->mo_ad_memberof,
1397 &op->o_req_dn, &op->o_req_ndn );
1407 return SLAP_CB_CONTINUE;
1411 * response callback that adds/deletes member values when a group member
1415 memberof_res_modrdn( Operation *op, SlapReply *rs )
1417 memberof_cbinfo_t *mci = op->o_callback->sc_private;
1418 slap_overinst *on = mci->on;
1419 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
1421 struct berval newPDN, newDN = BER_BVNULL, newPNDN, newNDN;
1425 struct berval save_dn, save_ndn;
1427 if ( rs->sr_err != LDAP_SUCCESS ) {
1428 return SLAP_CB_CONTINUE;
1431 mci->what = MEMBEROF_IS_GROUP;
1432 if ( MEMBEROF_REFINT( mo ) ) {
1433 mci->what |= MEMBEROF_IS_MEMBER;
1436 if ( op->orr_nnewSup ) {
1437 newPNDN = *op->orr_nnewSup;
1440 dnParent( &op->o_req_ndn, &newPNDN );
1443 build_new_dn( &newNDN, &newPNDN, &op->orr_nnewrdn, op->o_tmpmemctx );
1445 save_dn = op->o_req_dn;
1446 save_ndn = op->o_req_ndn;
1448 op->o_req_dn = newNDN;
1449 op->o_req_ndn = newNDN;
1450 rc = memberof_isGroupOrMember( op, mci );
1451 op->o_req_dn = save_dn;
1452 op->o_req_ndn = save_ndn;
1454 if ( rc != LDAP_SUCCESS || mci->what == MEMBEROF_IS_NONE ) {
1458 if ( op->orr_newSup ) {
1459 newPDN = *op->orr_newSup;
1462 dnParent( &op->o_req_dn, &newPDN );
1465 build_new_dn( &newDN, &newPDN, &op->orr_newrdn, op->o_tmpmemctx );
1467 if ( mci->what & MEMBEROF_IS_GROUP ) {
1468 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1469 rc = backend_attribute( op, NULL, &newNDN,
1470 mo->mo_ad_member, &vals, ACL_READ );
1471 op->o_bd->bd_info = (BackendInfo *)on;
1473 if ( rc == LDAP_SUCCESS ) {
1474 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1475 (void)memberof_value_modify( op, rs,
1476 &vals[ i ], mo->mo_ad_memberof,
1477 &op->o_req_dn, &op->o_req_ndn,
1480 ber_bvarray_free_x( vals, op->o_tmpmemctx );
1484 if ( MEMBEROF_REFINT( mo ) && ( mci->what & MEMBEROF_IS_MEMBER ) ) {
1485 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1486 rc = backend_attribute( op, NULL, &newNDN,
1487 mo->mo_ad_memberof, &vals, ACL_READ );
1488 op->o_bd->bd_info = (BackendInfo *)on;
1490 if ( rc == LDAP_SUCCESS ) {
1491 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1492 (void)memberof_value_modify( op, rs,
1493 &vals[ i ], mo->mo_ad_member,
1494 &op->o_req_dn, &op->o_req_ndn,
1497 ber_bvarray_free_x( vals, op->o_tmpmemctx );
1502 if ( !BER_BVISNULL( &newDN ) ) {
1503 op->o_tmpfree( newDN.bv_val, op->o_tmpmemctx );
1505 op->o_tmpfree( newNDN.bv_val, op->o_tmpmemctx );
1507 return SLAP_CB_CONTINUE;
1516 slap_overinst *on = (slap_overinst *)be->bd_info;
1519 mo = (memberof_t *)ch_calloc( 1, sizeof( memberof_t ) );
1522 mo->mo_dangling_err = LDAP_CONSTRAINT_VIOLATION;
1524 on->on_bi.bi_private = (void *)mo;
1545 static ConfigDriver mo_cf_gen;
1547 #define OID "1.3.6.1.4.1.7136.2.666.4"
1548 #define OIDAT OID ".1.1"
1549 #define OIDCFGAT OID ".1.2"
1550 #define OIDOC OID ".2.1"
1551 #define OIDCFGOC OID ".2.2"
1554 static ConfigTable mo_cfg[] = {
1555 { "memberof-dn", "modifiersName",
1556 2, 2, 0, ARG_MAGIC|ARG_DN|MO_DN, mo_cf_gen,
1557 "( OLcfgOvAt:18.0 NAME 'olcMemberOfDN' "
1558 "DESC 'DN to be used as modifiersName' "
1559 "SYNTAX OMsDN SINGLE-VALUE )",
1562 { "memberof-dangling", "ignore|drop|error",
1563 2, 2, 0, ARG_MAGIC|MO_DANGLING, mo_cf_gen,
1564 "( OLcfgOvAt:18.1 NAME 'olcMemberOfDangling' "
1565 "DESC 'Behavior with respect to dangling members, "
1566 "constrained to ignore, drop, error' "
1567 "SYNTAX OMsDirectoryString SINGLE-VALUE )",
1570 { "memberof-refint", "true|FALSE",
1571 2, 2, 0, ARG_MAGIC|ARG_ON_OFF|MO_REFINT, mo_cf_gen,
1572 "( OLcfgOvAt:18.2 NAME 'olcMemberOfRefInt' "
1573 "DESC 'Take care of referential integrity' "
1574 "SYNTAX OMsBoolean SINGLE-VALUE )",
1577 { "memberof-group-oc", "objectClass",
1578 2, 2, 0, ARG_MAGIC|MO_GROUP_OC, mo_cf_gen,
1579 "( OLcfgOvAt:18.3 NAME 'olcMemberOfGroupOC' "
1580 "DESC 'Group objectClass' "
1581 "SYNTAX OMsDirectoryString SINGLE-VALUE )",
1584 { "memberof-member-ad", "member attribute",
1585 2, 2, 0, ARG_MAGIC|MO_MEMBER_AD, mo_cf_gen,
1586 "( OLcfgOvAt:18.4 NAME 'olcMemberOfMemberAD' "
1587 "DESC 'member attribute' "
1588 "SYNTAX OMsDirectoryString SINGLE-VALUE )",
1591 { "memberof-memberof-ad", "memberOf attribute",
1592 2, 2, 0, ARG_MAGIC|MO_MEMBER_OF_AD, mo_cf_gen,
1593 "( OLcfgOvAt:18.5 NAME 'olcMemberOfMemberOfAD' "
1594 "DESC 'memberOf attribute' "
1595 "SYNTAX OMsDirectoryString SINGLE-VALUE )",
1599 { "memberof-reverse", "true|FALSE",
1600 2, 2, 0, ARG_MAGIC|ARG_ON_OFF|MO_REVERSE, mo_cf_gen,
1601 "( OLcfgOvAt:18.6 NAME 'olcMemberOfReverse' "
1602 "DESC 'Take care of referential integrity "
1603 "also when directly modifying memberOf' "
1604 "SYNTAX OMsBoolean SINGLE-VALUE )",
1608 { "memberof-dangling-error", "error code",
1609 2, 2, 0, ARG_MAGIC|MO_DANGLING_ERROR, mo_cf_gen,
1610 "( OLcfgOvAt:18.7 NAME 'olcMemberOfDanglingError' "
1611 "DESC 'Error code returned in case of dangling back reference' "
1612 "SYNTAX OMsDirectoryString SINGLE-VALUE )",
1615 { NULL, NULL, 0, 0, 0, ARG_IGNORED }
1618 static ConfigOCs mo_ocs[] = {
1619 { "( OLcfgOvOc:18.1 "
1620 "NAME 'olcMemberOf' "
1621 "DESC 'Member-of configuration' "
1622 "SUP olcOverlayConfig "
1625 "$ olcMemberOfDangling "
1626 "$ olcMemberOfDanglingError"
1627 "$ olcMemberOfRefInt "
1628 "$ olcMemberOfGroupOC "
1629 "$ olcMemberOfMemberAD "
1630 "$ olcMemberOfMemberOfAD "
1632 "$ olcMemberOfReverse "
1636 Cft_Overlay, mo_cfg, NULL, NULL },
1640 static slap_verbmasks dangling_mode[] = {
1641 { BER_BVC( "ignore" ), MEMBEROF_NONE },
1642 { BER_BVC( "drop" ), MEMBEROF_FDANGLING_DROP },
1643 { BER_BVC( "error" ), MEMBEROF_FDANGLING_ERROR },
1648 memberof_make_group_filter( memberof_t *mo )
1652 if ( !BER_BVISNULL( &mo->mo_groupFilterstr ) ) {
1653 ch_free( mo->mo_groupFilterstr.bv_val );
1656 mo->mo_groupFilter.f_choice = LDAP_FILTER_EQUALITY;
1657 mo->mo_groupFilter.f_ava = &mo->mo_groupAVA;
1659 mo->mo_groupFilter.f_av_desc = slap_schema.si_ad_objectClass;
1660 mo->mo_groupFilter.f_av_value = mo->mo_oc_group->soc_cname;
1662 mo->mo_groupFilterstr.bv_len = STRLENOF( "(=)" )
1663 + slap_schema.si_ad_objectClass->ad_cname.bv_len
1664 + mo->mo_oc_group->soc_cname.bv_len;
1665 ptr = mo->mo_groupFilterstr.bv_val = ch_malloc( mo->mo_groupFilterstr.bv_len + 1 );
1667 ptr = lutil_strcopy( ptr, slap_schema.si_ad_objectClass->ad_cname.bv_val );
1669 ptr = lutil_strcopy( ptr, mo->mo_oc_group->soc_cname.bv_val );
1677 memberof_make_member_filter( memberof_t *mo )
1681 if ( !BER_BVISNULL( &mo->mo_memberFilterstr ) ) {
1682 ch_free( mo->mo_memberFilterstr.bv_val );
1685 mo->mo_memberFilter.f_choice = LDAP_FILTER_PRESENT;
1686 mo->mo_memberFilter.f_desc = mo->mo_ad_memberof;
1688 mo->mo_memberFilterstr.bv_len = STRLENOF( "(=*)" )
1689 + mo->mo_ad_memberof->ad_cname.bv_len;
1690 ptr = mo->mo_memberFilterstr.bv_val = ch_malloc( mo->mo_memberFilterstr.bv_len + 1 );
1692 ptr = lutil_strcopy( ptr, mo->mo_ad_memberof->ad_cname.bv_val );
1693 ptr = lutil_strcopy( ptr, "=*)" );
1699 mo_cf_gen( ConfigArgs *c )
1701 slap_overinst *on = (slap_overinst *)c->bi;
1702 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
1706 if ( c->op == SLAP_CONFIG_EMIT ) {
1707 struct berval bv = BER_BVNULL;
1711 if ( mo->mo_dn.bv_val != NULL) {
1712 value_add_one( &c->rvalue_vals, &mo->mo_dn );
1713 value_add_one( &c->rvalue_nvals, &mo->mo_ndn );
1718 enum_to_verb( dangling_mode, (mo->mo_flags & MEMBEROF_FDANGLING_MASK), &bv );
1719 if ( BER_BVISNULL( &bv ) ) {
1720 /* there's something wrong... */
1725 value_add_one( &c->rvalue_vals, &bv );
1729 case MO_DANGLING_ERROR:
1730 if ( mo->mo_flags & MEMBEROF_FDANGLING_ERROR ) {
1731 char buf[ SLAP_TEXT_BUFLEN ];
1732 enum_to_verb( slap_ldap_response_code, mo->mo_dangling_err, &bv );
1733 if ( BER_BVISNULL( &bv ) ) {
1734 bv.bv_len = snprintf( buf, sizeof( buf ), "0x%x", mo->mo_dangling_err );
1735 if ( bv.bv_len < sizeof( buf ) ) {
1742 value_add_one( &c->rvalue_vals, &bv );
1749 c->value_int = MEMBEROF_REFINT( mo );
1754 c->value_int = MEMBEROF_REVERSE( mo );
1759 if ( mo->mo_oc_group != NULL ){
1760 value_add_one( &c->rvalue_vals, &mo->mo_oc_group->soc_cname );
1765 if ( mo->mo_ad_member != NULL ){
1766 value_add_one( &c->rvalue_vals, &mo->mo_ad_member->ad_cname );
1770 case MO_MEMBER_OF_AD:
1771 if ( mo->mo_ad_memberof != NULL ){
1772 value_add_one( &c->rvalue_vals, &mo->mo_ad_memberof->ad_cname );
1783 } else if ( c->op == LDAP_MOD_DELETE ) {
1784 return 1; /* FIXME */
1789 if ( !BER_BVISNULL( &mo->mo_dn ) ) {
1790 ber_memfree( mo->mo_dn.bv_val );
1791 ber_memfree( mo->mo_ndn.bv_val );
1793 mo->mo_dn = c->value_dn;
1794 mo->mo_ndn = c->value_ndn;
1798 i = verb_to_mask( c->argv[ 1 ], dangling_mode );
1799 if ( BER_BVISNULL( &dangling_mode[ i ].word ) ) {
1803 mo->mo_flags &= ~MEMBEROF_FDANGLING_MASK;
1804 mo->mo_flags |= dangling_mode[ i ].mask;
1807 case MO_DANGLING_ERROR:
1808 i = verb_to_mask( c->argv[ 1 ], slap_ldap_response_code );
1809 if ( !BER_BVISNULL( &slap_ldap_response_code[ i ].word ) ) {
1810 mo->mo_dangling_err = slap_ldap_response_code[ i ].mask;
1811 } else if ( lutil_atoix( &mo->mo_dangling_err, c->argv[ 1 ], 0 ) ) {
1817 if ( c->value_int ) {
1818 mo->mo_flags |= MEMBEROF_FREFINT;
1821 mo->mo_flags &= ~MEMBEROF_FREFINT;
1827 if ( c->value_int ) {
1828 mo->mo_flags |= MEMBEROF_FREVERSE;
1831 mo->mo_flags &= ~MEMBEROF_FREVERSE;
1837 ObjectClass *oc = NULL;
1839 oc = oc_find( c->argv[ 1 ] );
1841 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1842 "unable to find group objectClass=\"%s\"",
1844 Debug( LDAP_DEBUG_CONFIG, "%s: %s.\n",
1845 c->log, c->cr_msg, 0 );
1849 mo->mo_oc_group = oc;
1850 memberof_make_group_filter( mo );
1853 case MO_MEMBER_AD: {
1854 AttributeDescription *ad = NULL;
1855 const char *text = NULL;
1858 rc = slap_str2ad( c->argv[ 1 ], &ad, &text );
1859 if ( rc != LDAP_SUCCESS ) {
1860 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1861 "unable to find member attribute=\"%s\": %s (%d)",
1862 c->argv[ 1 ], text, rc );
1863 Debug( LDAP_DEBUG_CONFIG, "%s: %s.\n",
1864 c->log, c->cr_msg, 0 );
1868 if ( !is_at_syntax( ad->ad_type, SLAPD_DN_SYNTAX ) /* e.g. "member" */
1869 && !is_at_syntax( ad->ad_type, SLAPD_NAMEUID_SYNTAX ) ) /* e.g. "uniqueMember" */
1871 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1872 "member attribute=\"%s\" must either "
1873 "have DN (%s) or nameUID (%s) syntax",
1874 c->argv[ 1 ], SLAPD_DN_SYNTAX, SLAPD_NAMEUID_SYNTAX );
1875 Debug( LDAP_DEBUG_CONFIG, "%s: %s.\n",
1876 c->log, c->cr_msg, 0 );
1880 mo->mo_ad_member = ad;
1883 case MO_MEMBER_OF_AD: {
1884 AttributeDescription *ad = NULL;
1885 const char *text = NULL;
1888 rc = slap_str2ad( c->argv[ 1 ], &ad, &text );
1889 if ( rc != LDAP_SUCCESS ) {
1890 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1891 "unable to find memberof attribute=\"%s\": %s (%d)",
1892 c->argv[ 1 ], text, rc );
1893 Debug( LDAP_DEBUG_CONFIG, "%s: %s.\n",
1894 c->log, c->cr_msg, 0 );
1898 if ( !is_at_syntax( ad->ad_type, SLAPD_DN_SYNTAX ) /* e.g. "member" */
1899 && !is_at_syntax( ad->ad_type, SLAPD_NAMEUID_SYNTAX ) ) /* e.g. "uniqueMember" */
1901 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1902 "memberof attribute=\"%s\" must either "
1903 "have DN (%s) or nameUID (%s) syntax",
1904 c->argv[ 1 ], SLAPD_DN_SYNTAX, SLAPD_NAMEUID_SYNTAX );
1905 Debug( LDAP_DEBUG_CONFIG, "%s: %s.\n",
1906 c->log, c->cr_msg, 0 );
1910 mo->mo_ad_memberof = ad;
1911 memberof_make_member_filter( mo );
1928 slap_overinst *on = (slap_overinst *)be->bd_info;
1929 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
1932 const char *text = NULL;
1934 if( ! mo->mo_ad_memberof ){
1935 rc = slap_str2ad( SLAPD_MEMBEROF_ATTR, &mo->mo_ad_memberof, &text );
1936 if ( rc != LDAP_SUCCESS ) {
1937 Debug( LDAP_DEBUG_ANY, "memberof_db_open: "
1938 "unable to find attribute=\"%s\": %s (%d)\n",
1939 SLAPD_MEMBEROF_ATTR, text, rc );
1944 if( ! mo->mo_ad_member ){
1945 rc = slap_str2ad( SLAPD_GROUP_ATTR, &mo->mo_ad_member, &text );
1946 if ( rc != LDAP_SUCCESS ) {
1947 Debug( LDAP_DEBUG_ANY, "memberof_db_open: "
1948 "unable to find attribute=\"%s\": %s (%d)\n",
1949 SLAPD_GROUP_ATTR, text, rc );
1954 if( ! mo->mo_oc_group ){
1955 mo->mo_oc_group = oc_find( SLAPD_GROUP_CLASS );
1956 if ( mo->mo_oc_group == NULL ) {
1957 Debug( LDAP_DEBUG_ANY,
1958 "memberof_db_open: "
1959 "unable to find objectClass=\"%s\"\n",
1960 SLAPD_GROUP_CLASS, 0, 0 );
1965 if ( BER_BVISNULL( &mo->mo_dn ) && !BER_BVISNULL( &be->be_rootdn ) ) {
1966 ber_dupbv( &mo->mo_dn, &be->be_rootdn );
1967 ber_dupbv( &mo->mo_ndn, &be->be_rootndn );
1970 if ( BER_BVISNULL( &mo->mo_groupFilterstr ) ) {
1971 memberof_make_group_filter( mo );
1974 if ( BER_BVISNULL( &mo->mo_memberFilterstr ) ) {
1975 memberof_make_member_filter( mo );
1982 memberof_db_destroy(
1986 slap_overinst *on = (slap_overinst *)be->bd_info;
1987 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
1990 if ( !BER_BVISNULL( &mo->mo_dn ) ) {
1991 ber_memfree( mo->mo_dn.bv_val );
1992 ber_memfree( mo->mo_ndn.bv_val );
1995 if ( !BER_BVISNULL( &mo->mo_groupFilterstr ) ) {
1996 ber_memfree( mo->mo_groupFilterstr.bv_val );
1999 if ( !BER_BVISNULL( &mo->mo_memberFilterstr ) ) {
2000 ber_memfree( mo->mo_memberFilterstr.bv_val );
2010 static AttributeDescription *ad_memberOf;
2014 AttributeDescription **adp;
2016 { "( 1.2.840.113556.1.2.102 "
2018 "DESC 'Group that the entry belongs to' "
2019 "SYNTAX '1.3.6.1.4.1.1466.115.121.1.12' "
2020 "EQUALITY distinguishedNameMatch " /* added */
2021 "USAGE dSAOperation " /* added; questioned */
2022 /* "NO-USER-MODIFICATION " */ /* add? */
2023 "X-ORIGIN 'iPlanet Delegated Administrator' )",
2028 #if SLAPD_OVER_MEMBEROF == SLAPD_MOD_DYNAMIC
2030 #endif /* SLAPD_OVER_MEMBEROF == SLAPD_MOD_DYNAMIC */
2032 memberof_initialize( void )
2036 for ( i = 0; as[ i ].desc != NULL; i++ ) {
2037 code = register_at( as[ i ].desc, as[ i ].adp, 0 );
2039 Debug( LDAP_DEBUG_ANY,
2040 "memberof_initialize: register_at #%d failed\n",
2046 memberof.on_bi.bi_type = "memberof";
2048 memberof.on_bi.bi_db_init = memberof_db_init;
2049 memberof.on_bi.bi_db_open = memberof_db_open;
2050 memberof.on_bi.bi_db_destroy = memberof_db_destroy;
2052 memberof.on_bi.bi_op_add = memberof_op_add;
2053 memberof.on_bi.bi_op_delete = memberof_op_delete;
2054 memberof.on_bi.bi_op_modify = memberof_op_modify;
2055 memberof.on_bi.bi_op_modrdn = memberof_op_modrdn;
2057 memberof.on_bi.bi_cf_ocs = mo_ocs;
2059 code = config_register_schema( mo_cfg, mo_ocs );
2060 if ( code ) return code;
2062 return overlay_register( &memberof );
2065 #if SLAPD_OVER_MEMBEROF == SLAPD_MOD_DYNAMIC
2067 init_module( int argc, char *argv[] )
2069 return memberof_initialize();
2071 #endif /* SLAPD_OVER_MEMBEROF == SLAPD_MOD_DYNAMIC */
2073 #endif /* SLAPD_OVER_MEMBEROF */