1 /* memberof.c - back-reference for group membership */
3 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
5 * Copyright 2005-2007 Pierangelo Masarati <ando@sys-net.it>
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted only as authorized by the OpenLDAP
12 * A copy of this license is available in the file LICENSE in the
13 * top-level directory of the distribution or, alternatively, at
14 * <http://www.OpenLDAP.org/license.html>.
17 * This work was initially developed by Pierangelo Masarati for inclusion
18 * in OpenLDAP Software, sponsored by SysNet s.r.l.
23 #ifdef SLAPD_OVER_MEMBEROF
27 #include "ac/string.h"
28 #include "ac/socket.h"
37 * GROUP a group object (an entry with GROUP_OC
39 * MEMBER a member object (an entry whose DN is
40 * listed as MEMBER_AT value of a GROUP)
41 * GROUP_OC the objectClass of the group object
42 * (default: groupOfNames)
43 * MEMBER_AT the membership attribute, DN-valued;
44 * note: nameAndOptionalUID is tolerated
45 * as soon as the optionalUID is absent
47 * MEMBER_OF reverse membership attribute
51 * - if the entry that is being added is a GROUP,
52 * the MEMBER_AT defined as values of the add operation
53 * get the MEMBER_OF value directly from the request.
55 * if configured to do so, the MEMBER objects do not exist,
56 * and no relax control is issued, either:
58 * - drop non-existing members
59 * (by default: don't muck with values)
61 * - if (configured to do so,) the referenced GROUP exists,
62 * the relax control is set and the user has
63 * "manage" privileges, allow to add MEMBER_OF values to
67 * - if the entry being modified is a GROUP_OC and the
68 * MEMBER_AT attribute is modified, the MEMBER_OF value
69 * of the (existing) MEMBER_AT entries that are affected
70 * is modified according to the request:
71 * - if a MEMBER is removed from the group,
72 * delete the corresponding MEMBER_OF
73 * - if a MEMBER is added to a group,
74 * add the corresponding MEMBER_OF
76 * We need to determine, from the database, if it is
77 * a GROUP_OC, and we need to check, from the
78 * modification list, if the MEMBER_AT attribute is being
79 * affected, and what MEMBER_AT values are affected.
81 * if configured to do so, the entries corresponding to
82 * the MEMBER_AT values do not exist, and no relax control
85 * - drop non-existing members
86 * (by default: don't muck with values)
88 * - if configured to do so, the referenced GROUP exists,
89 * (the relax control is set) and the user has
90 * "manage" privileges, allow to add MEMBER_OF values to
91 * generic entries; the change is NOT automatically reflected
92 * in the MEMBER attribute of the GROUP referenced
93 * by the value of MEMBER_OF; a separate modification,
94 * with or without relax control, needs to be performed.
97 * - if the entry being renamed is a GROUP, the MEMBER_OF
98 * value of the (existing) MEMBER objects is modified
99 * accordingly based on the newDN of the GROUP.
101 * We need to determine, from the database, if it is
102 * a GROUP; the list of MEMBER objects is obtained from
105 * Non-existing MEMBER objects are ignored, since the
106 * MEMBER_AT is not being addressed by the operation.
108 * - if the entry being renamed has the MEMBER_OF attribute,
109 * the corresponding MEMBER value must be modified in the
110 * respective group entries.
114 * - if the entry being deleted is a GROUP, the (existing)
115 * MEMBER objects are modified accordingly; a copy of the
116 * values of the MEMBER_AT is saved and, if the delete
117 * succeeds, the MEMBER_OF value of the (existing) MEMBER
118 * objects is deleted.
120 * We need to determine, from the database, if it is
123 * Non-existing MEMBER objects are ignored, since the entry
126 * - if the entry being deleted has the MEMBER_OF attribute,
127 * the corresponding value of the MEMBER_AT must be deleted
128 * from the respective GROUP entries.
131 #define SLAPD_MEMBEROF_ATTR "memberOf"
133 static slap_overinst memberof;
135 typedef struct memberof_t {
137 struct berval mo_ndn;
139 ObjectClass *mo_oc_group;
140 AttributeDescription *mo_ad_member;
141 AttributeDescription *mo_ad_memberof;
143 struct berval mo_groupFilterstr;
144 AttributeAssertion mo_groupAVA;
145 Filter mo_groupFilter;
147 struct berval mo_memberFilterstr;
148 Filter mo_memberFilter;
151 #define MEMBEROF_NONE 0x00U
152 #define MEMBEROF_FDANGLING_DROP 0x01U
153 #define MEMBEROF_FDANGLING_ERROR 0x02U
154 #define MEMBEROF_FDANGLING_MASK (MEMBEROF_FDANGLING_DROP|MEMBEROF_FDANGLING_ERROR)
155 #define MEMBEROF_FREFINT 0x04U
156 #define MEMBEROF_FREVERSE 0x08U
158 ber_int_t mo_dangling_err;
160 #define MEMBEROF_CHK(mo,f) \
161 (((mo)->mo_flags & (f)) == (f))
162 #define MEMBEROF_DANGLING_CHECK(mo) \
163 ((mo)->mo_flags & MEMBEROF_FDANGLING_MASK)
164 #define MEMBEROF_DANGLING_DROP(mo) \
165 MEMBEROF_CHK((mo),MEMBEROF_FDANGLING_DROP)
166 #define MEMBEROF_DANGLING_ERROR(mo) \
167 MEMBEROF_CHK((mo),MEMBEROF_FDANGLING_ERROR)
168 #define MEMBEROF_REFINT(mo) \
169 MEMBEROF_CHK((mo),MEMBEROF_FREFINT)
170 #define MEMBEROF_REVERSE(mo) \
171 MEMBEROF_CHK((mo),MEMBEROF_FREVERSE)
174 typedef enum memberof_is_t {
175 MEMBEROF_IS_NONE = 0x00,
176 MEMBEROF_IS_GROUP = 0x01,
177 MEMBEROF_IS_MEMBER = 0x02,
178 MEMBEROF_IS_BOTH = (MEMBEROF_IS_GROUP|MEMBEROF_IS_MEMBER)
181 typedef struct memberof_cookie_t {
182 AttributeDescription *ad;
187 typedef struct memberof_cbinfo_t {
195 memberof_set_backend( Operation *op_target, Operation *op, slap_overinst *on )
197 BackendInfo *bi = op->o_bd->bd_info;
199 if ( bi->bi_type == memberof.on_bi.bi_type )
200 op_target->o_bd->bd_info = (BackendInfo *)on->on_info;
204 memberof_isGroupOrMember_cb( Operation *op, SlapReply *rs )
206 if ( rs->sr_type == REP_SEARCH ) {
207 memberof_cookie_t *mc;
209 mc = (memberof_cookie_t *)op->o_callback->sc_private;
217 * callback for internal search that saves the member attribute values
218 * of groups being deleted.
221 memberof_saveMember_cb( Operation *op, SlapReply *rs )
223 if ( rs->sr_type == REP_SEARCH ) {
224 memberof_cookie_t *mc;
227 mc = (memberof_cookie_t *)op->o_callback->sc_private;
230 assert( rs->sr_entry != NULL );
231 assert( rs->sr_entry->e_attrs != NULL );
233 a = attr_find( rs->sr_entry->e_attrs, mc->ad );
235 ber_bvarray_dup_x( &mc->vals, a->a_nvals, op->o_tmpmemctx );
237 assert( attr_find( a->a_next, mc->ad ) == NULL );
245 * the delete hook performs an internal search that saves the member
246 * attribute values of groups being deleted.
249 memberof_isGroupOrMember( Operation *op, memberof_cbinfo_t *mci )
251 slap_overinst *on = mci->on;
252 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
255 slap_callback cb = { 0 };
256 BackendInfo *bi = op->o_bd->bd_info;
257 AttributeName an[ 2 ];
259 memberof_is_t iswhat = MEMBEROF_IS_NONE;
260 memberof_cookie_t mc;
262 assert( mci->what != MEMBEROF_IS_NONE );
265 if ( op->o_tag == LDAP_REQ_DELETE ) {
266 cb.sc_response = memberof_saveMember_cb;
269 cb.sc_response = memberof_isGroupOrMember_cb;
272 op2.o_tag = LDAP_REQ_SEARCH;
273 op2.o_callback = &cb;
274 op2.o_dn = op->o_bd->be_rootdn;
275 op2.o_ndn = op->o_bd->be_rootndn;
277 op2.ors_scope = LDAP_SCOPE_BASE;
278 op2.ors_deref = LDAP_DEREF_NEVER;
279 BER_BVZERO( &an[ 1 ].an_name );
281 op2.ors_attrsonly = 0;
282 op2.ors_limit = NULL;
284 op2.ors_tlimit = SLAP_NO_LIMIT;
286 if ( mci->what & MEMBEROF_IS_GROUP ) {
287 SlapReply rs2 = { REP_RESULT };
289 mc.ad = mo->mo_ad_member;
292 an[ 0 ].an_desc = mo->mo_ad_member;
293 an[ 0 ].an_name = an[ 0 ].an_desc->ad_cname;
294 op2.ors_filterstr = mo->mo_groupFilterstr;
295 op2.ors_filter = &mo->mo_groupFilter;
297 memberof_set_backend( &op2, op, on );
298 (void)op->o_bd->be_search( &op2, &rs2 );
299 op2.o_bd->bd_info = bi;
302 iswhat |= MEMBEROF_IS_GROUP;
303 if ( mc.vals ) mci->member = mc.vals;
308 if ( mci->what & MEMBEROF_IS_MEMBER ) {
309 SlapReply rs2 = { REP_RESULT };
311 mc.ad = mo->mo_ad_memberof;
314 an[ 0 ].an_desc = mo->mo_ad_memberof;
315 an[ 0 ].an_name = an[ 0 ].an_desc->ad_cname;
316 op2.ors_filterstr = mo->mo_memberFilterstr;
317 op2.ors_filter = &mo->mo_memberFilter;
319 memberof_set_backend( &op2, op, on );
320 (void)op->o_bd->be_search( &op2, &rs2 );
321 op2.o_bd->bd_info = bi;
324 iswhat |= MEMBEROF_IS_MEMBER;
325 if ( mc.vals ) mci->memberof = mc.vals;
336 * response callback that adds memberof values when a group is modified.
339 memberof_value_modify(
342 AttributeDescription *ad,
343 struct berval *old_dn,
344 struct berval *old_ndn,
345 struct berval *new_dn,
346 struct berval *new_ndn )
348 memberof_cbinfo_t *mci = op->o_callback->sc_private;
349 slap_overinst *on = mci->on;
350 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
353 unsigned long opid = op->o_opid;
354 SlapReply rs2 = { REP_RESULT };
355 slap_callback cb = { NULL, slap_null_cb, NULL, NULL };
356 Modifications mod[ 2 ] = { { { 0 } } }, *ml;
357 struct berval values[ 4 ], nvalues[ 4 ];
360 op2.o_tag = LDAP_REQ_MODIFY;
363 op2.o_req_ndn = *ndn;
365 op2.o_callback = &cb;
366 op2.o_dn = op->o_bd->be_rootdn;
367 op2.o_ndn = op->o_bd->be_rootndn;
368 op2.orm_modlist = NULL;
370 /* Internal ops, never replicate these */
371 op2.o_opid = 0; /* shared with op, saved above */
372 op2.orm_no_opattrs = 1;
373 op2.o_dont_replicate = 1;
375 if ( !BER_BVISNULL( &mo->mo_ndn ) ) {
378 ml->sml_values = &values[ 0 ];
379 ml->sml_values[ 0 ] = mo->mo_dn;
380 BER_BVZERO( &ml->sml_values[ 1 ] );
381 ml->sml_nvalues = &nvalues[ 0 ];
382 ml->sml_nvalues[ 0 ] = mo->mo_ndn;
383 BER_BVZERO( &ml->sml_nvalues[ 1 ] );
384 ml->sml_desc = slap_schema.si_ad_modifiersName;
385 ml->sml_type = ml->sml_desc->ad_cname;
386 ml->sml_op = LDAP_MOD_REPLACE;
387 ml->sml_flags = SLAP_MOD_INTERNAL;
388 ml->sml_next = op2.orm_modlist;
389 op2.orm_modlist = ml;
396 ml->sml_values = &values[ 2 ];
397 BER_BVZERO( &ml->sml_values[ 1 ] );
398 ml->sml_nvalues = &nvalues[ 2 ];
399 BER_BVZERO( &ml->sml_nvalues[ 1 ] );
401 ml->sml_type = ml->sml_desc->ad_cname;
402 ml->sml_flags = SLAP_MOD_INTERNAL;
403 ml->sml_next = op2.orm_modlist;
404 op2.orm_modlist = ml;
406 if ( new_ndn != NULL ) {
407 BackendInfo *bi = op2.o_bd->bd_info;
410 assert( !BER_BVISNULL( new_dn ) );
411 assert( !BER_BVISNULL( new_ndn ) );
414 ml->sml_op = LDAP_MOD_ADD;
416 ml->sml_values[ 0 ] = *new_dn;
417 ml->sml_nvalues[ 0 ] = *new_ndn;
419 oex.oe_key = (void *)&memberof;
420 LDAP_SLIST_INSERT_HEAD(&op2.o_extra, &oex, oe_next);
421 memberof_set_backend( &op2, op, on );
422 (void)op->o_bd->be_modify( &op2, &rs2 );
423 op2.o_bd->bd_info = bi;
424 LDAP_SLIST_REMOVE(&op2.o_extra, &oex, OpExtra, oe_next);
425 if ( rs2.sr_err != LDAP_SUCCESS ) {
426 char buf[ SLAP_TEXT_BUFLEN ];
427 snprintf( buf, sizeof( buf ),
428 "memberof_value_modify DN=\"%s\" add %s=\"%s\" failed err=%d",
429 op2.o_req_dn.bv_val, ad->ad_cname.bv_val, new_dn->bv_val, rs2.sr_err );
430 Debug( LDAP_DEBUG_ANY, "%s: %s\n",
431 op->o_log_prefix, buf, 0 );
434 assert( op2.orm_modlist == &mod[ mcnt ] );
435 assert( mcnt == 0 || op2.orm_modlist->sml_next == &mod[ 0 ] );
436 ml = op2.orm_modlist->sml_next;
438 assert( ml == &mod[ 0 ] );
442 slap_mods_free( ml, 1 );
445 mod[ 0 ].sml_next = NULL;
448 if ( old_ndn != NULL ) {
449 BackendInfo *bi = op2.o_bd->bd_info;
452 assert( !BER_BVISNULL( old_dn ) );
453 assert( !BER_BVISNULL( old_ndn ) );
456 ml->sml_op = LDAP_MOD_DELETE;
458 ml->sml_values[ 0 ] = *old_dn;
459 ml->sml_nvalues[ 0 ] = *old_ndn;
461 oex.oe_key = (void *)&memberof;
462 LDAP_SLIST_INSERT_HEAD(&op2.o_extra, &oex, oe_next);
463 memberof_set_backend( &op2, op, on );
464 (void)op->o_bd->be_modify( &op2, &rs2 );
465 op2.o_bd->bd_info = bi;
466 LDAP_SLIST_REMOVE(&op2.o_extra, &oex, OpExtra, oe_next);
467 if ( rs2.sr_err != LDAP_SUCCESS ) {
468 char buf[ SLAP_TEXT_BUFLEN ];
469 snprintf( buf, sizeof( buf ),
470 "memberof_value_modify DN=\"%s\" delete %s=\"%s\" failed err=%d",
471 op2.o_req_dn.bv_val, ad->ad_cname.bv_val, old_dn->bv_val, rs2.sr_err );
472 Debug( LDAP_DEBUG_ANY, "%s: %s\n",
473 op->o_log_prefix, buf, 0 );
476 assert( op2.orm_modlist == &mod[ mcnt ] );
477 ml = op2.orm_modlist->sml_next;
479 assert( ml == &mod[ 0 ] );
483 slap_mods_free( ml, 1 );
486 /* restore original opid */
489 /* FIXME: if old_group_ndn doesn't exist, both delete __and__
490 * add will fail; better split in two operations, although
491 * not optimal in terms of performance. At least it would
492 * move towards self-repairing capabilities. */
496 memberof_cleanup( Operation *op, SlapReply *rs )
498 slap_callback *sc = op->o_callback;
499 memberof_cbinfo_t *mci = sc->sc_private;
501 op->o_callback = sc->sc_next;
503 ber_bvarray_free_x( mci->memberof, op->o_tmpmemctx );
505 ber_bvarray_free_x( mci->member, op->o_tmpmemctx );
506 op->o_tmpfree( sc, op->o_tmpmemctx );
510 static int memberof_res_add( Operation *op, SlapReply *rs );
511 static int memberof_res_delete( Operation *op, SlapReply *rs );
512 static int memberof_res_modify( Operation *op, SlapReply *rs );
513 static int memberof_res_modrdn( Operation *op, SlapReply *rs );
516 memberof_op_add( Operation *op, SlapReply *rs )
518 slap_overinst *on = (slap_overinst *)op->o_bd->bd_info;
519 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
521 Attribute **ap, **map = NULL;
522 int rc = SLAP_CB_CONTINUE;
524 struct berval save_dn, save_ndn;
526 memberof_cbinfo_t *mci;
529 LDAP_SLIST_FOREACH( oex, &op->o_extra, oe_next ) {
530 if ( oex->oe_key == (void *)&memberof )
531 return SLAP_CB_CONTINUE;
534 if ( op->ora_e->e_attrs == NULL ) {
535 /* FIXME: global overlay; need to deal with */
536 Debug( LDAP_DEBUG_ANY, "%s: memberof_op_add(\"%s\"): "
537 "consistency checks not implemented when overlay "
538 "is instantiated as global.\n",
539 op->o_log_prefix, op->o_req_dn.bv_val, 0 );
540 return SLAP_CB_CONTINUE;
543 if ( MEMBEROF_REVERSE( mo ) ) {
544 for ( ap = &op->ora_e->e_attrs; *ap; ap = &(*ap)->a_next ) {
547 if ( a->a_desc == mo->mo_ad_memberof ) {
555 save_ndn = op->o_ndn;
557 if ( MEMBEROF_DANGLING_CHECK( mo )
559 && is_entry_objectclass_or_sub( op->ora_e, mo->mo_oc_group ) )
561 op->o_dn = op->o_bd->be_rootdn;
562 op->o_ndn = op->o_bd->be_rootndn;
563 op->o_bd->bd_info = (BackendInfo *)on->on_info;
565 for ( ap = &op->ora_e->e_attrs; *ap; ) {
568 if ( !is_ad_subtype( a->a_desc, mo->mo_ad_member ) ) {
573 assert( a->a_nvals != NULL );
575 for ( i = 0; !BER_BVISNULL( &a->a_nvals[ i ] ); i++ ) {
578 /* ITS#6670 Ignore member pointing to this entry */
579 if ( dn_match( &a->a_nvals[i], &save_ndn ))
582 rc = be_entry_get_rw( op, &a->a_nvals[ i ],
584 if ( rc == LDAP_SUCCESS ) {
585 be_entry_release_r( op, e );
589 if ( MEMBEROF_DANGLING_ERROR( mo ) ) {
590 rc = rs->sr_err = mo->mo_dangling_err;
591 rs->sr_text = "adding non-existing object "
593 send_ldap_result( op, rs );
597 if ( MEMBEROF_DANGLING_DROP( mo ) ) {
600 Debug( LDAP_DEBUG_ANY, "%s: memberof_op_add(\"%s\"): "
601 "member=\"%s\" does not exist (stripping...)\n",
602 op->o_log_prefix, op->ora_e->e_name.bv_val,
603 a->a_vals[ i ].bv_val );
605 for ( j = i + 1; !BER_BVISNULL( &a->a_nvals[ j ] ); j++ );
606 ber_memfree( a->a_vals[ i ].bv_val );
607 BER_BVZERO( &a->a_vals[ i ] );
608 if ( a->a_nvals != a->a_vals ) {
609 ber_memfree( a->a_nvals[ i ].bv_val );
610 BER_BVZERO( &a->a_nvals[ i ] );
617 AC_MEMCPY( &a->a_vals[ i ], &a->a_vals[ i + 1 ],
618 sizeof( struct berval ) * ( j - i ) );
619 if ( a->a_nvals != a->a_vals ) {
620 AC_MEMCPY( &a->a_nvals[ i ], &a->a_nvals[ i + 1 ],
621 sizeof( struct berval ) * ( j - i ) );
627 /* If all values have been removed,
628 * remove the attribute itself. */
629 if ( BER_BVISNULL( &a->a_nvals[ 0 ] ) ) {
638 op->o_ndn = save_ndn;
639 op->o_bd->bd_info = (BackendInfo *)on;
644 AccessControlState acl_state = ACL_STATE_INIT;
646 for ( i = 0; !BER_BVISNULL( &a->a_nvals[ i ] ); i++ ) {
649 op->o_bd->bd_info = (BackendInfo *)on->on_info;
650 /* access is checked with the original identity */
651 rc = access_allowed( op, op->ora_e, mo->mo_ad_memberof,
652 &a->a_nvals[ i ], ACL_WADD,
655 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
657 send_ldap_result( op, rs );
660 /* ITS#6670 Ignore member pointing to this entry */
661 if ( dn_match( &a->a_nvals[i], &save_ndn ))
664 rc = be_entry_get_rw( op, &a->a_nvals[ i ],
666 op->o_bd->bd_info = (BackendInfo *)on;
667 if ( rc != LDAP_SUCCESS ) {
668 if ( get_relax( op ) ) {
672 if ( MEMBEROF_DANGLING_ERROR( mo ) ) {
673 rc = rs->sr_err = mo->mo_dangling_err;
674 rs->sr_text = "adding non-existing object "
676 send_ldap_result( op, rs );
680 if ( MEMBEROF_DANGLING_DROP( mo ) ) {
683 Debug( LDAP_DEBUG_ANY, "%s: memberof_op_add(\"%s\"): "
684 "memberof=\"%s\" does not exist (stripping...)\n",
685 op->o_log_prefix, op->ora_e->e_name.bv_val,
686 a->a_nvals[ i ].bv_val );
688 for ( j = i + 1; !BER_BVISNULL( &a->a_nvals[ j ] ); j++ );
689 ber_memfree( a->a_vals[ i ].bv_val );
690 BER_BVZERO( &a->a_vals[ i ] );
691 if ( a->a_nvals != a->a_vals ) {
692 ber_memfree( a->a_nvals[ i ].bv_val );
693 BER_BVZERO( &a->a_nvals[ i ] );
699 AC_MEMCPY( &a->a_vals[ i ], &a->a_vals[ i + 1 ],
700 sizeof( struct berval ) * ( j - i ) );
701 if ( a->a_nvals != a->a_vals ) {
702 AC_MEMCPY( &a->a_nvals[ i ], &a->a_nvals[ i + 1 ],
703 sizeof( struct berval ) * ( j - i ) );
711 /* access is checked with the original identity */
712 op->o_bd->bd_info = (BackendInfo *)on->on_info;
713 rc = access_allowed( op, e, mo->mo_ad_member,
714 &op->o_req_ndn, ACL_WADD, NULL );
715 be_entry_release_r( op, e );
716 op->o_bd->bd_info = (BackendInfo *)on;
719 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
720 rs->sr_text = "insufficient access to object referenced by memberof";
721 send_ldap_result( op, rs );
726 if ( BER_BVISNULL( &a->a_nvals[ 0 ] ) ) {
732 rc = SLAP_CB_CONTINUE;
734 sc = op->o_tmpalloc( sizeof(slap_callback)+sizeof(*mci), op->o_tmpmemctx );
735 sc->sc_private = sc+1;
736 sc->sc_response = memberof_res_add;
737 sc->sc_cleanup = memberof_cleanup;
738 mci = sc->sc_private;
741 mci->memberof = NULL;
742 sc->sc_next = op->o_callback;
747 op->o_ndn = save_ndn;
748 op->o_bd->bd_info = (BackendInfo *)on;
754 memberof_op_delete( Operation *op, SlapReply *rs )
756 slap_overinst *on = (slap_overinst *)op->o_bd->bd_info;
757 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
760 memberof_cbinfo_t *mci;
763 LDAP_SLIST_FOREACH( oex, &op->o_extra, oe_next ) {
764 if ( oex->oe_key == (void *)&memberof )
765 return SLAP_CB_CONTINUE;
768 sc = op->o_tmpalloc( sizeof(slap_callback)+sizeof(*mci), op->o_tmpmemctx );
769 sc->sc_private = sc+1;
770 sc->sc_response = memberof_res_delete;
771 sc->sc_cleanup = memberof_cleanup;
772 mci = sc->sc_private;
775 mci->memberof = NULL;
776 mci->what = MEMBEROF_IS_GROUP;
777 if ( MEMBEROF_REFINT( mo ) ) {
778 mci->what = MEMBEROF_IS_BOTH;
781 memberof_isGroupOrMember( op, mci );
783 sc->sc_next = op->o_callback;
786 return SLAP_CB_CONTINUE;
790 memberof_op_modify( Operation *op, SlapReply *rs )
792 slap_overinst *on = (slap_overinst *)op->o_bd->bd_info;
793 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
795 Modifications **mlp, **mmlp = NULL;
796 int rc = SLAP_CB_CONTINUE, save_member = 0;
797 struct berval save_dn, save_ndn;
799 memberof_cbinfo_t *mci, mcis;
802 LDAP_SLIST_FOREACH( oex, &op->o_extra, oe_next ) {
803 if ( oex->oe_key == (void *)&memberof )
804 return SLAP_CB_CONTINUE;
807 if ( MEMBEROF_REVERSE( mo ) ) {
808 for ( mlp = &op->orm_modlist; *mlp; mlp = &(*mlp)->sml_next ) {
809 Modifications *ml = *mlp;
811 if ( ml->sml_desc == mo->mo_ad_memberof ) {
819 save_ndn = op->o_ndn;
821 mcis.what = MEMBEROF_IS_GROUP;
823 if ( memberof_isGroupOrMember( op, &mcis ) == LDAP_SUCCESS
824 && ( mcis.what & MEMBEROF_IS_GROUP ) )
828 for ( ml = op->orm_modlist; ml; ml = ml->sml_next ) {
829 if ( ml->sml_desc == mo->mo_ad_member ) {
830 switch ( ml->sml_op ) {
831 case LDAP_MOD_DELETE:
832 case LDAP_MOD_REPLACE:
833 case SLAP_MOD_SOFTDEL: /* ITS#7487: can be used by syncrepl (in mirror mode?) */
841 if ( MEMBEROF_DANGLING_CHECK( mo )
842 && !get_relax( op ) )
844 op->o_dn = op->o_bd->be_rootdn;
845 op->o_ndn = op->o_bd->be_rootndn;
846 op->o_bd->bd_info = (BackendInfo *)on->on_info;
848 assert( op->orm_modlist != NULL );
850 for ( mlp = &op->orm_modlist; *mlp; ) {
851 Modifications *ml = *mlp;
854 if ( !is_ad_subtype( ml->sml_desc, mo->mo_ad_member ) ) {
859 switch ( ml->sml_op ) {
860 case LDAP_MOD_DELETE:
861 case SLAP_MOD_SOFTDEL: /* ITS#7487: can be used by syncrepl (in mirror mode?) */
862 /* we don't care about cancellations: if the value
863 * exists, fine; if it doesn't, we let the underlying
864 * database fail as appropriate; */
868 case LDAP_MOD_REPLACE:
869 /* Handle this just like a delete (see above) */
870 if ( !ml->sml_values ) {
876 case SLAP_MOD_SOFTADD: /* ITS#7487 */
877 case SLAP_MOD_ADD_IF_NOT_PRESENT: /* ITS#7487 */
878 /* NOTE: right now, the attributeType we use
879 * for member must have a normalized value */
880 assert( ml->sml_nvalues != NULL );
882 for ( i = 0; !BER_BVISNULL( &ml->sml_nvalues[ i ] ); i++ ) {
886 /* ITS#6670 Ignore member pointing to this entry */
887 if ( dn_match( &ml->sml_nvalues[i], &save_ndn ))
890 if ( be_entry_get_rw( op, &ml->sml_nvalues[ i ],
891 NULL, NULL, 0, &e ) == LDAP_SUCCESS )
893 be_entry_release_r( op, e );
897 if ( MEMBEROF_DANGLING_ERROR( mo ) ) {
898 rc = rs->sr_err = mo->mo_dangling_err;
899 rs->sr_text = "adding non-existing object "
901 send_ldap_result( op, rs );
905 if ( MEMBEROF_DANGLING_DROP( mo ) ) {
908 Debug( LDAP_DEBUG_ANY, "%s: memberof_op_modify(\"%s\"): "
909 "member=\"%s\" does not exist (stripping...)\n",
910 op->o_log_prefix, op->o_req_dn.bv_val,
911 ml->sml_nvalues[ i ].bv_val );
913 for ( j = i + 1; !BER_BVISNULL( &ml->sml_nvalues[ j ] ); j++ );
914 ber_memfree( ml->sml_values[ i ].bv_val );
915 BER_BVZERO( &ml->sml_values[ i ] );
916 ber_memfree( ml->sml_nvalues[ i ].bv_val );
917 BER_BVZERO( &ml->sml_nvalues[ i ] );
923 AC_MEMCPY( &ml->sml_values[ i ], &ml->sml_values[ i + 1 ],
924 sizeof( struct berval ) * ( j - i ) );
925 AC_MEMCPY( &ml->sml_nvalues[ i ], &ml->sml_nvalues[ i + 1 ],
926 sizeof( struct berval ) * ( j - i ) );
931 if ( BER_BVISNULL( &ml->sml_nvalues[ 0 ] ) ) {
933 slap_mod_free( &ml->sml_mod, 0 );
949 if ( mmlp != NULL ) {
950 Modifications *ml = *mmlp;
954 op->o_bd->bd_info = (BackendInfo *)on->on_info;
955 rc = be_entry_get_rw( op, &op->o_req_ndn,
956 NULL, NULL, 0, &target );
957 op->o_bd->bd_info = (BackendInfo *)on;
958 if ( rc != LDAP_SUCCESS ) {
959 rc = rs->sr_err = LDAP_NO_SUCH_OBJECT;
960 send_ldap_result( op, rs );
964 switch ( ml->sml_op ) {
965 case LDAP_MOD_DELETE:
966 case SLAP_MOD_SOFTDEL: /* ITS#7487: can be used by syncrepl (in mirror mode?) */
967 if ( ml->sml_nvalues != NULL ) {
968 AccessControlState acl_state = ACL_STATE_INIT;
970 for ( i = 0; !BER_BVISNULL( &ml->sml_nvalues[ i ] ); i++ ) {
973 op->o_bd->bd_info = (BackendInfo *)on->on_info;
974 /* access is checked with the original identity */
975 rc = access_allowed( op, target,
977 &ml->sml_nvalues[ i ],
981 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
983 send_ldap_result( op, rs );
987 rc = be_entry_get_rw( op, &ml->sml_nvalues[ i ],
989 op->o_bd->bd_info = (BackendInfo *)on;
990 if ( rc != LDAP_SUCCESS ) {
991 if ( get_relax( op ) ) {
995 if ( MEMBEROF_DANGLING_ERROR( mo ) ) {
996 rc = rs->sr_err = mo->mo_dangling_err;
997 rs->sr_text = "deleting non-existing object "
999 send_ldap_result( op, rs );
1003 if ( MEMBEROF_DANGLING_DROP( mo ) ) {
1006 Debug( LDAP_DEBUG_ANY, "%s: memberof_op_modify(\"%s\"): "
1007 "memberof=\"%s\" does not exist (stripping...)\n",
1008 op->o_log_prefix, op->o_req_ndn.bv_val,
1009 ml->sml_nvalues[ i ].bv_val );
1011 for ( j = i + 1; !BER_BVISNULL( &ml->sml_nvalues[ j ] ); j++ );
1012 ber_memfree( ml->sml_values[ i ].bv_val );
1013 BER_BVZERO( &ml->sml_values[ i ] );
1014 if ( ml->sml_nvalues != ml->sml_values ) {
1015 ber_memfree( ml->sml_nvalues[ i ].bv_val );
1016 BER_BVZERO( &ml->sml_nvalues[ i ] );
1023 AC_MEMCPY( &ml->sml_values[ i ], &ml->sml_values[ i + 1 ],
1024 sizeof( struct berval ) * ( j - i ) );
1025 if ( ml->sml_nvalues != ml->sml_values ) {
1026 AC_MEMCPY( &ml->sml_nvalues[ i ], &ml->sml_nvalues[ i + 1 ],
1027 sizeof( struct berval ) * ( j - i ) );
1035 /* access is checked with the original identity */
1036 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1037 rc = access_allowed( op, e, mo->mo_ad_member,
1040 be_entry_release_r( op, e );
1041 op->o_bd->bd_info = (BackendInfo *)on;
1044 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
1045 rs->sr_text = "insufficient access to object referenced by memberof";
1046 send_ldap_result( op, rs );
1051 if ( BER_BVISNULL( &ml->sml_nvalues[ 0 ] ) ) {
1052 *mmlp = ml->sml_next;
1053 slap_mod_free( &ml->sml_mod, 0 );
1061 case LDAP_MOD_REPLACE:
1063 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1064 /* access is checked with the original identity */
1065 rc = access_allowed( op, target,
1069 op->o_bd->bd_info = (BackendInfo *)on;
1071 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
1073 send_ldap_result( op, rs );
1077 if ( ml->sml_op == LDAP_MOD_DELETE || ml->sml_op == SLAP_MOD_SOFTDEL || !ml->sml_values ) {
1083 case SLAP_MOD_SOFTADD: /* ITS#7487 */
1084 case SLAP_MOD_ADD_IF_NOT_PRESENT: /* ITS#7487 */
1086 AccessControlState acl_state = ACL_STATE_INIT;
1088 for ( i = 0; !BER_BVISNULL( &ml->sml_nvalues[ i ] ); i++ ) {
1091 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1092 /* access is checked with the original identity */
1093 rc = access_allowed( op, target,
1095 &ml->sml_nvalues[ i ],
1099 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
1101 send_ldap_result( op, rs );
1105 /* ITS#6670 Ignore member pointing to this entry */
1106 if ( dn_match( &ml->sml_nvalues[i], &save_ndn ))
1109 rc = be_entry_get_rw( op, &ml->sml_nvalues[ i ],
1110 NULL, NULL, 0, &e );
1111 op->o_bd->bd_info = (BackendInfo *)on;
1112 if ( rc != LDAP_SUCCESS ) {
1113 if ( MEMBEROF_DANGLING_ERROR( mo ) ) {
1114 rc = rs->sr_err = mo->mo_dangling_err;
1115 rs->sr_text = "adding non-existing object "
1117 send_ldap_result( op, rs );
1121 if ( MEMBEROF_DANGLING_DROP( mo ) ) {
1124 Debug( LDAP_DEBUG_ANY, "%s: memberof_op_modify(\"%s\"): "
1125 "memberof=\"%s\" does not exist (stripping...)\n",
1126 op->o_log_prefix, op->o_req_ndn.bv_val,
1127 ml->sml_nvalues[ i ].bv_val );
1129 for ( j = i + 1; !BER_BVISNULL( &ml->sml_nvalues[ j ] ); j++ );
1130 ber_memfree( ml->sml_values[ i ].bv_val );
1131 BER_BVZERO( &ml->sml_values[ i ] );
1132 if ( ml->sml_nvalues != ml->sml_values ) {
1133 ber_memfree( ml->sml_nvalues[ i ].bv_val );
1134 BER_BVZERO( &ml->sml_nvalues[ i ] );
1141 AC_MEMCPY( &ml->sml_values[ i ], &ml->sml_values[ i + 1 ],
1142 sizeof( struct berval ) * ( j - i ) );
1143 if ( ml->sml_nvalues != ml->sml_values ) {
1144 AC_MEMCPY( &ml->sml_nvalues[ i ], &ml->sml_nvalues[ i + 1 ],
1145 sizeof( struct berval ) * ( j - i ) );
1153 /* access is checked with the original identity */
1154 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1155 rc = access_allowed( op, e, mo->mo_ad_member,
1158 be_entry_release_r( op, e );
1159 op->o_bd->bd_info = (BackendInfo *)on;
1162 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
1163 rs->sr_text = "insufficient access to object referenced by memberof";
1164 send_ldap_result( op, rs );
1169 if ( BER_BVISNULL( &ml->sml_nvalues[ 0 ] ) ) {
1170 *mmlp = ml->sml_next;
1171 slap_mod_free( &ml->sml_mod, 0 );
1182 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1183 be_entry_release_r( op, target );
1184 op->o_bd->bd_info = (BackendInfo *)on;
1187 sc = op->o_tmpalloc( sizeof(slap_callback)+sizeof(*mci), op->o_tmpmemctx );
1188 sc->sc_private = sc+1;
1189 sc->sc_response = memberof_res_modify;
1190 sc->sc_cleanup = memberof_cleanup;
1191 mci = sc->sc_private;
1194 mci->memberof = NULL;
1195 mci->what = mcis.what;
1197 if ( save_member ) {
1198 op->o_dn = op->o_bd->be_rootdn;
1199 op->o_ndn = op->o_bd->be_rootndn;
1200 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1201 rc = backend_attribute( op, NULL, &op->o_req_ndn,
1202 mo->mo_ad_member, &mci->member, ACL_READ );
1203 op->o_bd->bd_info = (BackendInfo *)on;
1206 sc->sc_next = op->o_callback;
1207 op->o_callback = sc;
1209 rc = SLAP_CB_CONTINUE;
1213 op->o_ndn = save_ndn;
1214 op->o_bd->bd_info = (BackendInfo *)on;
1220 memberof_op_modrdn( Operation *op, SlapReply *rs )
1222 slap_overinst *on = (slap_overinst *)op->o_bd->bd_info;
1224 memberof_cbinfo_t *mci;
1227 LDAP_SLIST_FOREACH( oex, &op->o_extra, oe_next ) {
1228 if ( oex->oe_key == (void *)&memberof )
1229 return SLAP_CB_CONTINUE;
1232 sc = op->o_tmpalloc( sizeof(slap_callback)+sizeof(*mci), op->o_tmpmemctx );
1233 sc->sc_private = sc+1;
1234 sc->sc_response = memberof_res_modrdn;
1235 sc->sc_cleanup = memberof_cleanup;
1236 mci = sc->sc_private;
1239 mci->memberof = NULL;
1241 sc->sc_next = op->o_callback;
1242 op->o_callback = sc;
1244 return SLAP_CB_CONTINUE;
1248 * response callback that adds memberof values when a group is added.
1251 memberof_res_add( Operation *op, SlapReply *rs )
1253 memberof_cbinfo_t *mci = op->o_callback->sc_private;
1254 slap_overinst *on = mci->on;
1255 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
1259 if ( rs->sr_err != LDAP_SUCCESS ) {
1260 return SLAP_CB_CONTINUE;
1263 if ( MEMBEROF_REVERSE( mo ) ) {
1266 ma = attr_find( op->ora_e->e_attrs, mo->mo_ad_memberof );
1268 /* relax is required to allow to add
1269 * a non-existing member */
1270 op->o_relax = SLAP_CONTROL_CRITICAL;
1272 for ( i = 0; !BER_BVISNULL( &ma->a_nvals[ i ] ); i++ ) {
1274 /* ITS#6670 Ignore member pointing to this entry */
1275 if ( dn_match( &ma->a_nvals[i], &op->o_req_ndn ))
1278 /* the modification is attempted
1279 * with the original identity */
1280 memberof_value_modify( op,
1281 &ma->a_nvals[ i ], mo->mo_ad_member,
1282 NULL, NULL, &op->o_req_dn, &op->o_req_ndn );
1287 if ( is_entry_objectclass_or_sub( op->ora_e, mo->mo_oc_group ) ) {
1290 for ( a = attrs_find( op->ora_e->e_attrs, mo->mo_ad_member );
1292 a = attrs_find( a->a_next, mo->mo_ad_member ) )
1294 for ( i = 0; !BER_BVISNULL( &a->a_nvals[ i ] ); i++ ) {
1295 /* ITS#6670 Ignore member pointing to this entry */
1296 if ( dn_match( &a->a_nvals[i], &op->o_req_ndn ))
1299 memberof_value_modify( op,
1309 return SLAP_CB_CONTINUE;
1313 * response callback that deletes memberof values when a group is deleted.
1316 memberof_res_delete( Operation *op, SlapReply *rs )
1318 memberof_cbinfo_t *mci = op->o_callback->sc_private;
1319 slap_overinst *on = mci->on;
1320 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
1325 if ( rs->sr_err != LDAP_SUCCESS ) {
1326 return SLAP_CB_CONTINUE;
1330 if ( vals != NULL ) {
1331 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1332 memberof_value_modify( op,
1333 &vals[ i ], mo->mo_ad_memberof,
1334 &op->o_req_dn, &op->o_req_ndn,
1339 if ( MEMBEROF_REFINT( mo ) ) {
1340 vals = mci->memberof;
1341 if ( vals != NULL ) {
1342 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1343 memberof_value_modify( op,
1344 &vals[ i ], mo->mo_ad_member,
1345 &op->o_req_dn, &op->o_req_ndn,
1351 return SLAP_CB_CONTINUE;
1355 * response callback that adds/deletes memberof values when a group
1359 memberof_res_modify( Operation *op, SlapReply *rs )
1361 memberof_cbinfo_t *mci = op->o_callback->sc_private;
1362 slap_overinst *on = mci->on;
1363 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
1366 Modifications *ml, *mml = NULL;
1369 if ( rs->sr_err != LDAP_SUCCESS ) {
1370 return SLAP_CB_CONTINUE;
1373 if ( MEMBEROF_REVERSE( mo ) ) {
1374 for ( ml = op->orm_modlist; ml; ml = ml->sml_next ) {
1375 if ( ml->sml_desc == mo->mo_ad_memberof ) {
1382 if ( mml != NULL ) {
1383 BerVarray vals = mml->sml_nvalues;
1385 switch ( mml->sml_op ) {
1386 case LDAP_MOD_DELETE:
1387 case SLAP_MOD_SOFTDEL: /* ITS#7487: can be used by syncrepl (in mirror mode?) */
1388 if ( vals != NULL ) {
1389 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1390 memberof_value_modify( op,
1391 &vals[ i ], mo->mo_ad_member,
1392 &op->o_req_dn, &op->o_req_ndn,
1399 case LDAP_MOD_REPLACE:
1400 /* delete all ... */
1401 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1402 rc = backend_attribute( op, NULL, &op->o_req_ndn,
1403 mo->mo_ad_memberof, &vals, ACL_READ );
1404 op->o_bd->bd_info = (BackendInfo *)on;
1405 if ( rc == LDAP_SUCCESS ) {
1406 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1407 memberof_value_modify( op,
1408 &vals[ i ], mo->mo_ad_member,
1409 &op->o_req_dn, &op->o_req_ndn,
1412 ber_bvarray_free_x( vals, op->o_tmpmemctx );
1415 if ( ml->sml_op == LDAP_MOD_DELETE || !mml->sml_values ) {
1421 case SLAP_MOD_SOFTADD: /* ITS#7487 */
1422 case SLAP_MOD_ADD_IF_NOT_PRESENT: /* ITS#7487 */
1423 assert( vals != NULL );
1425 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1426 memberof_value_modify( op,
1427 &vals[ i ], mo->mo_ad_member,
1429 &op->o_req_dn, &op->o_req_ndn );
1438 if ( mci->what & MEMBEROF_IS_GROUP )
1440 for ( ml = op->orm_modlist; ml; ml = ml->sml_next ) {
1441 if ( ml->sml_desc != mo->mo_ad_member ) {
1445 switch ( ml->sml_op ) {
1446 case LDAP_MOD_DELETE:
1447 case SLAP_MOD_SOFTDEL: /* ITS#7487: can be used by syncrepl (in mirror mode?) */
1448 vals = ml->sml_nvalues;
1449 if ( vals != NULL ) {
1450 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1451 memberof_value_modify( op,
1452 &vals[ i ], mo->mo_ad_memberof,
1453 &op->o_req_dn, &op->o_req_ndn,
1460 case LDAP_MOD_REPLACE:
1463 /* delete all ... */
1464 if ( vals != NULL ) {
1465 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1466 memberof_value_modify( op,
1467 &vals[ i ], mo->mo_ad_memberof,
1468 &op->o_req_dn, &op->o_req_ndn,
1473 if ( ml->sml_op == LDAP_MOD_DELETE || ml->sml_op == SLAP_MOD_SOFTDEL || !ml->sml_values ) {
1479 case SLAP_MOD_SOFTADD: /* ITS#7487 */
1480 case SLAP_MOD_ADD_IF_NOT_PRESENT : /* ITS#7487 */
1481 assert( ml->sml_nvalues != NULL );
1482 vals = ml->sml_nvalues;
1483 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1484 memberof_value_modify( op,
1485 &vals[ i ], mo->mo_ad_memberof,
1487 &op->o_req_dn, &op->o_req_ndn );
1497 return SLAP_CB_CONTINUE;
1501 * response callback that adds/deletes member values when a group member
1505 memberof_res_modrdn( Operation *op, SlapReply *rs )
1507 memberof_cbinfo_t *mci = op->o_callback->sc_private;
1508 slap_overinst *on = mci->on;
1509 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
1511 struct berval newPDN, newDN = BER_BVNULL, newPNDN, newNDN;
1515 struct berval save_dn, save_ndn;
1517 if ( rs->sr_err != LDAP_SUCCESS ) {
1518 return SLAP_CB_CONTINUE;
1521 mci->what = MEMBEROF_IS_GROUP;
1522 if ( MEMBEROF_REFINT( mo ) ) {
1523 mci->what |= MEMBEROF_IS_MEMBER;
1526 if ( op->orr_nnewSup ) {
1527 newPNDN = *op->orr_nnewSup;
1530 dnParent( &op->o_req_ndn, &newPNDN );
1533 build_new_dn( &newNDN, &newPNDN, &op->orr_nnewrdn, op->o_tmpmemctx );
1535 save_dn = op->o_req_dn;
1536 save_ndn = op->o_req_ndn;
1538 op->o_req_dn = newNDN;
1539 op->o_req_ndn = newNDN;
1540 rc = memberof_isGroupOrMember( op, mci );
1541 op->o_req_dn = save_dn;
1542 op->o_req_ndn = save_ndn;
1544 if ( rc != LDAP_SUCCESS || mci->what == MEMBEROF_IS_NONE ) {
1548 if ( op->orr_newSup ) {
1549 newPDN = *op->orr_newSup;
1552 dnParent( &op->o_req_dn, &newPDN );
1555 build_new_dn( &newDN, &newPDN, &op->orr_newrdn, op->o_tmpmemctx );
1557 if ( mci->what & MEMBEROF_IS_GROUP ) {
1558 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1559 rc = backend_attribute( op, NULL, &newNDN,
1560 mo->mo_ad_member, &vals, ACL_READ );
1561 op->o_bd->bd_info = (BackendInfo *)on;
1563 if ( rc == LDAP_SUCCESS ) {
1564 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1565 memberof_value_modify( op,
1566 &vals[ i ], mo->mo_ad_memberof,
1567 &op->o_req_dn, &op->o_req_ndn,
1570 ber_bvarray_free_x( vals, op->o_tmpmemctx );
1574 if ( MEMBEROF_REFINT( mo ) && ( mci->what & MEMBEROF_IS_MEMBER ) ) {
1575 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1576 rc = backend_attribute( op, NULL, &newNDN,
1577 mo->mo_ad_memberof, &vals, ACL_READ );
1578 op->o_bd->bd_info = (BackendInfo *)on;
1580 if ( rc == LDAP_SUCCESS ) {
1581 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1582 memberof_value_modify( op,
1583 &vals[ i ], mo->mo_ad_member,
1584 &op->o_req_dn, &op->o_req_ndn,
1587 ber_bvarray_free_x( vals, op->o_tmpmemctx );
1592 if ( !BER_BVISNULL( &newDN ) ) {
1593 op->o_tmpfree( newDN.bv_val, op->o_tmpmemctx );
1595 op->o_tmpfree( newNDN.bv_val, op->o_tmpmemctx );
1597 return SLAP_CB_CONTINUE;
1606 slap_overinst *on = (slap_overinst *)be->bd_info;
1609 mo = (memberof_t *)ch_calloc( 1, sizeof( memberof_t ) );
1612 mo->mo_dangling_err = LDAP_CONSTRAINT_VIOLATION;
1614 on->on_bi.bi_private = (void *)mo;
1635 static ConfigDriver mo_cf_gen;
1637 #define OID "1.3.6.1.4.1.7136.2.666.4"
1638 #define OIDAT OID ".1.1"
1639 #define OIDCFGAT OID ".1.2"
1640 #define OIDOC OID ".2.1"
1641 #define OIDCFGOC OID ".2.2"
1644 static ConfigTable mo_cfg[] = {
1645 { "memberof-dn", "modifiersName",
1646 2, 2, 0, ARG_MAGIC|ARG_DN|MO_DN, mo_cf_gen,
1647 "( OLcfgOvAt:18.0 NAME 'olcMemberOfDN' "
1648 "DESC 'DN to be used as modifiersName' "
1649 "SYNTAX OMsDN SINGLE-VALUE )",
1652 { "memberof-dangling", "ignore|drop|error",
1653 2, 2, 0, ARG_MAGIC|MO_DANGLING, mo_cf_gen,
1654 "( OLcfgOvAt:18.1 NAME 'olcMemberOfDangling' "
1655 "DESC 'Behavior with respect to dangling members, "
1656 "constrained to ignore, drop, error' "
1657 "SYNTAX OMsDirectoryString SINGLE-VALUE )",
1660 { "memberof-refint", "true|FALSE",
1661 2, 2, 0, ARG_MAGIC|ARG_ON_OFF|MO_REFINT, mo_cf_gen,
1662 "( OLcfgOvAt:18.2 NAME 'olcMemberOfRefInt' "
1663 "DESC 'Take care of referential integrity' "
1664 "SYNTAX OMsBoolean SINGLE-VALUE )",
1667 { "memberof-group-oc", "objectClass",
1668 2, 2, 0, ARG_MAGIC|MO_GROUP_OC, mo_cf_gen,
1669 "( OLcfgOvAt:18.3 NAME 'olcMemberOfGroupOC' "
1670 "DESC 'Group objectClass' "
1671 "SYNTAX OMsDirectoryString SINGLE-VALUE )",
1674 { "memberof-member-ad", "member attribute",
1675 2, 2, 0, ARG_MAGIC|MO_MEMBER_AD, mo_cf_gen,
1676 "( OLcfgOvAt:18.4 NAME 'olcMemberOfMemberAD' "
1677 "DESC 'member attribute' "
1678 "SYNTAX OMsDirectoryString SINGLE-VALUE )",
1681 { "memberof-memberof-ad", "memberOf attribute",
1682 2, 2, 0, ARG_MAGIC|MO_MEMBER_OF_AD, mo_cf_gen,
1683 "( OLcfgOvAt:18.5 NAME 'olcMemberOfMemberOfAD' "
1684 "DESC 'memberOf attribute' "
1685 "SYNTAX OMsDirectoryString SINGLE-VALUE )",
1689 { "memberof-reverse", "true|FALSE",
1690 2, 2, 0, ARG_MAGIC|ARG_ON_OFF|MO_REVERSE, mo_cf_gen,
1691 "( OLcfgOvAt:18.6 NAME 'olcMemberOfReverse' "
1692 "DESC 'Take care of referential integrity "
1693 "also when directly modifying memberOf' "
1694 "SYNTAX OMsBoolean SINGLE-VALUE )",
1698 { "memberof-dangling-error", "error code",
1699 2, 2, 0, ARG_MAGIC|MO_DANGLING_ERROR, mo_cf_gen,
1700 "( OLcfgOvAt:18.7 NAME 'olcMemberOfDanglingError' "
1701 "DESC 'Error code returned in case of dangling back reference' "
1702 "SYNTAX OMsDirectoryString SINGLE-VALUE )",
1705 { NULL, NULL, 0, 0, 0, ARG_IGNORED }
1708 static ConfigOCs mo_ocs[] = {
1709 { "( OLcfgOvOc:18.1 "
1710 "NAME 'olcMemberOf' "
1711 "DESC 'Member-of configuration' "
1712 "SUP olcOverlayConfig "
1715 "$ olcMemberOfDangling "
1716 "$ olcMemberOfDanglingError"
1717 "$ olcMemberOfRefInt "
1718 "$ olcMemberOfGroupOC "
1719 "$ olcMemberOfMemberAD "
1720 "$ olcMemberOfMemberOfAD "
1722 "$ olcMemberOfReverse "
1726 Cft_Overlay, mo_cfg, NULL, NULL },
1730 static slap_verbmasks dangling_mode[] = {
1731 { BER_BVC( "ignore" ), MEMBEROF_NONE },
1732 { BER_BVC( "drop" ), MEMBEROF_FDANGLING_DROP },
1733 { BER_BVC( "error" ), MEMBEROF_FDANGLING_ERROR },
1738 memberof_make_group_filter( memberof_t *mo )
1742 if ( !BER_BVISNULL( &mo->mo_groupFilterstr ) ) {
1743 ch_free( mo->mo_groupFilterstr.bv_val );
1746 mo->mo_groupFilter.f_choice = LDAP_FILTER_EQUALITY;
1747 mo->mo_groupFilter.f_ava = &mo->mo_groupAVA;
1749 mo->mo_groupFilter.f_av_desc = slap_schema.si_ad_objectClass;
1750 mo->mo_groupFilter.f_av_value = mo->mo_oc_group->soc_cname;
1752 mo->mo_groupFilterstr.bv_len = STRLENOF( "(=)" )
1753 + slap_schema.si_ad_objectClass->ad_cname.bv_len
1754 + mo->mo_oc_group->soc_cname.bv_len;
1755 ptr = mo->mo_groupFilterstr.bv_val = ch_malloc( mo->mo_groupFilterstr.bv_len + 1 );
1757 ptr = lutil_strcopy( ptr, slap_schema.si_ad_objectClass->ad_cname.bv_val );
1759 ptr = lutil_strcopy( ptr, mo->mo_oc_group->soc_cname.bv_val );
1767 memberof_make_member_filter( memberof_t *mo )
1771 if ( !BER_BVISNULL( &mo->mo_memberFilterstr ) ) {
1772 ch_free( mo->mo_memberFilterstr.bv_val );
1775 mo->mo_memberFilter.f_choice = LDAP_FILTER_PRESENT;
1776 mo->mo_memberFilter.f_desc = mo->mo_ad_memberof;
1778 mo->mo_memberFilterstr.bv_len = STRLENOF( "(=*)" )
1779 + mo->mo_ad_memberof->ad_cname.bv_len;
1780 ptr = mo->mo_memberFilterstr.bv_val = ch_malloc( mo->mo_memberFilterstr.bv_len + 1 );
1782 ptr = lutil_strcopy( ptr, mo->mo_ad_memberof->ad_cname.bv_val );
1783 ptr = lutil_strcopy( ptr, "=*)" );
1789 mo_cf_gen( ConfigArgs *c )
1791 slap_overinst *on = (slap_overinst *)c->bi;
1792 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
1796 if ( c->op == SLAP_CONFIG_EMIT ) {
1797 struct berval bv = BER_BVNULL;
1801 if ( mo->mo_dn.bv_val != NULL) {
1802 value_add_one( &c->rvalue_vals, &mo->mo_dn );
1803 value_add_one( &c->rvalue_nvals, &mo->mo_ndn );
1808 enum_to_verb( dangling_mode, (mo->mo_flags & MEMBEROF_FDANGLING_MASK), &bv );
1809 if ( BER_BVISNULL( &bv ) ) {
1810 /* there's something wrong... */
1815 value_add_one( &c->rvalue_vals, &bv );
1819 case MO_DANGLING_ERROR:
1820 if ( mo->mo_flags & MEMBEROF_FDANGLING_ERROR ) {
1821 char buf[ SLAP_TEXT_BUFLEN ];
1822 enum_to_verb( slap_ldap_response_code, mo->mo_dangling_err, &bv );
1823 if ( BER_BVISNULL( &bv ) ) {
1824 bv.bv_len = snprintf( buf, sizeof( buf ), "0x%x", mo->mo_dangling_err );
1825 if ( bv.bv_len < sizeof( buf ) ) {
1832 value_add_one( &c->rvalue_vals, &bv );
1839 c->value_int = MEMBEROF_REFINT( mo );
1844 c->value_int = MEMBEROF_REVERSE( mo );
1849 if ( mo->mo_oc_group != NULL ){
1850 value_add_one( &c->rvalue_vals, &mo->mo_oc_group->soc_cname );
1855 if ( mo->mo_ad_member != NULL ){
1856 value_add_one( &c->rvalue_vals, &mo->mo_ad_member->ad_cname );
1860 case MO_MEMBER_OF_AD:
1861 if ( mo->mo_ad_memberof != NULL ){
1862 value_add_one( &c->rvalue_vals, &mo->mo_ad_memberof->ad_cname );
1873 } else if ( c->op == LDAP_MOD_DELETE ) {
1874 return 1; /* FIXME */
1879 if ( !BER_BVISNULL( &mo->mo_dn ) ) {
1880 ber_memfree( mo->mo_dn.bv_val );
1881 ber_memfree( mo->mo_ndn.bv_val );
1883 mo->mo_dn = c->value_dn;
1884 mo->mo_ndn = c->value_ndn;
1888 i = verb_to_mask( c->argv[ 1 ], dangling_mode );
1889 if ( BER_BVISNULL( &dangling_mode[ i ].word ) ) {
1893 mo->mo_flags &= ~MEMBEROF_FDANGLING_MASK;
1894 mo->mo_flags |= dangling_mode[ i ].mask;
1897 case MO_DANGLING_ERROR:
1898 i = verb_to_mask( c->argv[ 1 ], slap_ldap_response_code );
1899 if ( !BER_BVISNULL( &slap_ldap_response_code[ i ].word ) ) {
1900 mo->mo_dangling_err = slap_ldap_response_code[ i ].mask;
1901 } else if ( lutil_atoix( &mo->mo_dangling_err, c->argv[ 1 ], 0 ) ) {
1907 if ( c->value_int ) {
1908 mo->mo_flags |= MEMBEROF_FREFINT;
1911 mo->mo_flags &= ~MEMBEROF_FREFINT;
1917 if ( c->value_int ) {
1918 mo->mo_flags |= MEMBEROF_FREVERSE;
1921 mo->mo_flags &= ~MEMBEROF_FREVERSE;
1927 ObjectClass *oc = NULL;
1929 oc = oc_find( c->argv[ 1 ] );
1931 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1932 "unable to find group objectClass=\"%s\"",
1934 Debug( LDAP_DEBUG_CONFIG, "%s: %s.\n",
1935 c->log, c->cr_msg, 0 );
1939 mo->mo_oc_group = oc;
1940 memberof_make_group_filter( mo );
1943 case MO_MEMBER_AD: {
1944 AttributeDescription *ad = NULL;
1945 const char *text = NULL;
1948 rc = slap_str2ad( c->argv[ 1 ], &ad, &text );
1949 if ( rc != LDAP_SUCCESS ) {
1950 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1951 "unable to find member attribute=\"%s\": %s (%d)",
1952 c->argv[ 1 ], text, rc );
1953 Debug( LDAP_DEBUG_CONFIG, "%s: %s.\n",
1954 c->log, c->cr_msg, 0 );
1958 if ( !is_at_syntax( ad->ad_type, SLAPD_DN_SYNTAX ) /* e.g. "member" */
1959 && !is_at_syntax( ad->ad_type, SLAPD_NAMEUID_SYNTAX ) ) /* e.g. "uniqueMember" */
1961 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1962 "member attribute=\"%s\" must either "
1963 "have DN (%s) or nameUID (%s) syntax",
1964 c->argv[ 1 ], SLAPD_DN_SYNTAX, SLAPD_NAMEUID_SYNTAX );
1965 Debug( LDAP_DEBUG_CONFIG, "%s: %s.\n",
1966 c->log, c->cr_msg, 0 );
1970 mo->mo_ad_member = ad;
1973 case MO_MEMBER_OF_AD: {
1974 AttributeDescription *ad = NULL;
1975 const char *text = NULL;
1978 rc = slap_str2ad( c->argv[ 1 ], &ad, &text );
1979 if ( rc != LDAP_SUCCESS ) {
1980 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1981 "unable to find memberof attribute=\"%s\": %s (%d)",
1982 c->argv[ 1 ], text, rc );
1983 Debug( LDAP_DEBUG_CONFIG, "%s: %s.\n",
1984 c->log, c->cr_msg, 0 );
1988 if ( !is_at_syntax( ad->ad_type, SLAPD_DN_SYNTAX ) /* e.g. "member" */
1989 && !is_at_syntax( ad->ad_type, SLAPD_NAMEUID_SYNTAX ) ) /* e.g. "uniqueMember" */
1991 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1992 "memberof attribute=\"%s\" must either "
1993 "have DN (%s) or nameUID (%s) syntax",
1994 c->argv[ 1 ], SLAPD_DN_SYNTAX, SLAPD_NAMEUID_SYNTAX );
1995 Debug( LDAP_DEBUG_CONFIG, "%s: %s.\n",
1996 c->log, c->cr_msg, 0 );
2000 mo->mo_ad_memberof = ad;
2001 memberof_make_member_filter( mo );
2018 slap_overinst *on = (slap_overinst *)be->bd_info;
2019 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
2022 const char *text = NULL;
2024 if( ! mo->mo_ad_memberof ){
2025 rc = slap_str2ad( SLAPD_MEMBEROF_ATTR, &mo->mo_ad_memberof, &text );
2026 if ( rc != LDAP_SUCCESS ) {
2027 Debug( LDAP_DEBUG_ANY, "memberof_db_open: "
2028 "unable to find attribute=\"%s\": %s (%d)\n",
2029 SLAPD_MEMBEROF_ATTR, text, rc );
2034 if( ! mo->mo_ad_member ){
2035 rc = slap_str2ad( SLAPD_GROUP_ATTR, &mo->mo_ad_member, &text );
2036 if ( rc != LDAP_SUCCESS ) {
2037 Debug( LDAP_DEBUG_ANY, "memberof_db_open: "
2038 "unable to find attribute=\"%s\": %s (%d)\n",
2039 SLAPD_GROUP_ATTR, text, rc );
2044 if( ! mo->mo_oc_group ){
2045 mo->mo_oc_group = oc_find( SLAPD_GROUP_CLASS );
2046 if ( mo->mo_oc_group == NULL ) {
2047 Debug( LDAP_DEBUG_ANY,
2048 "memberof_db_open: "
2049 "unable to find objectClass=\"%s\"\n",
2050 SLAPD_GROUP_CLASS, 0, 0 );
2055 if ( BER_BVISNULL( &mo->mo_dn ) && !BER_BVISNULL( &be->be_rootdn ) ) {
2056 ber_dupbv( &mo->mo_dn, &be->be_rootdn );
2057 ber_dupbv( &mo->mo_ndn, &be->be_rootndn );
2060 if ( BER_BVISNULL( &mo->mo_groupFilterstr ) ) {
2061 memberof_make_group_filter( mo );
2064 if ( BER_BVISNULL( &mo->mo_memberFilterstr ) ) {
2065 memberof_make_member_filter( mo );
2072 memberof_db_destroy(
2076 slap_overinst *on = (slap_overinst *)be->bd_info;
2077 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
2080 if ( !BER_BVISNULL( &mo->mo_dn ) ) {
2081 ber_memfree( mo->mo_dn.bv_val );
2082 ber_memfree( mo->mo_ndn.bv_val );
2085 if ( !BER_BVISNULL( &mo->mo_groupFilterstr ) ) {
2086 ber_memfree( mo->mo_groupFilterstr.bv_val );
2089 if ( !BER_BVISNULL( &mo->mo_memberFilterstr ) ) {
2090 ber_memfree( mo->mo_memberFilterstr.bv_val );
2100 static AttributeDescription *ad_memberOf;
2104 AttributeDescription **adp;
2106 { "( 1.2.840.113556.1.2.102 "
2108 "DESC 'Group that the entry belongs to' "
2109 "SYNTAX '1.3.6.1.4.1.1466.115.121.1.12' "
2110 "EQUALITY distinguishedNameMatch " /* added */
2111 "USAGE dSAOperation " /* added; questioned */
2112 /* "NO-USER-MODIFICATION " */ /* add? */
2113 "X-ORIGIN 'iPlanet Delegated Administrator' )",
2118 #if SLAPD_OVER_MEMBEROF == SLAPD_MOD_DYNAMIC
2120 #endif /* SLAPD_OVER_MEMBEROF == SLAPD_MOD_DYNAMIC */
2122 memberof_initialize( void )
2126 for ( i = 0; as[ i ].desc != NULL; i++ ) {
2127 code = register_at( as[ i ].desc, as[ i ].adp, 0 );
2129 Debug( LDAP_DEBUG_ANY,
2130 "memberof_initialize: register_at #%d failed\n",
2136 memberof.on_bi.bi_type = "memberof";
2138 memberof.on_bi.bi_db_init = memberof_db_init;
2139 memberof.on_bi.bi_db_open = memberof_db_open;
2140 memberof.on_bi.bi_db_destroy = memberof_db_destroy;
2142 memberof.on_bi.bi_op_add = memberof_op_add;
2143 memberof.on_bi.bi_op_delete = memberof_op_delete;
2144 memberof.on_bi.bi_op_modify = memberof_op_modify;
2145 memberof.on_bi.bi_op_modrdn = memberof_op_modrdn;
2147 memberof.on_bi.bi_cf_ocs = mo_ocs;
2149 code = config_register_schema( mo_cfg, mo_ocs );
2150 if ( code ) return code;
2152 return overlay_register( &memberof );
2155 #if SLAPD_OVER_MEMBEROF == SLAPD_MOD_DYNAMIC
2157 init_module( int argc, char *argv[] )
2159 return memberof_initialize();
2161 #endif /* SLAPD_OVER_MEMBEROF == SLAPD_MOD_DYNAMIC */
2163 #endif /* SLAPD_OVER_MEMBEROF */