1 /* memberof.c - back-reference for group membership */
3 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
5 * Copyright 2005-2007 Pierangelo Masarati <ando@sys-net.it>
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted only as authorized by the OpenLDAP
12 * A copy of this license is available in the file LICENSE in the
13 * top-level directory of the distribution or, alternatively, at
14 * <http://www.OpenLDAP.org/license.html>.
17 * This work was initially developed by Pierangelo Masarati for inclusion
18 * in OpenLDAP Software, sponsored by SysNet s.r.l.
23 #ifdef SLAPD_OVER_MEMBEROF
27 #include "ac/string.h"
28 #include "ac/socket.h"
37 * GROUP a group object (an entry with GROUP_OC
39 * MEMBER a member object (an entry whose DN is
40 * listed as MEMBER_AT value of a GROUP)
41 * GROUP_OC the objectClass of the group object
42 * (default: groupOfNames)
43 * MEMBER_AT the membership attribute, DN-valued;
44 * note: nameAndOptionalUID is tolerated
45 * as soon as the optionalUID is absent
47 * MEMBER_OF reverse membership attribute
51 * - if the entry that is being added is a GROUP,
52 * the MEMBER_AT defined as values of the add operation
53 * get the MEMBER_OF value directly from the request.
55 * if configured to do so, the MEMBER objects do not exist,
56 * and no relax control is issued, either:
58 * - drop non-existing members
59 * (by default: don't muck with values)
61 * - if (configured to do so,) the referenced GROUP exists,
62 * the relax control is set and the user has
63 * "manage" privileges, allow to add MEMBER_OF values to
67 * - if the entry being modified is a GROUP_OC and the
68 * MEMBER_AT attribute is modified, the MEMBER_OF value
69 * of the (existing) MEMBER_AT entries that are affected
70 * is modified according to the request:
71 * - if a MEMBER is removed from the group,
72 * delete the corresponding MEMBER_OF
73 * - if a MEMBER is added to a group,
74 * add the corresponding MEMBER_OF
76 * We need to determine, from the database, if it is
77 * a GROUP_OC, and we need to check, from the
78 * modification list, if the MEMBER_AT attribute is being
79 * affected, and what MEMBER_AT values are affected.
81 * if configured to do so, the entries corresponding to
82 * the MEMBER_AT values do not exist, and no relax control
85 * - drop non-existing members
86 * (by default: don't muck with values)
88 * - if configured to do so, the referenced GROUP exists,
89 * (the relax control is set) and the user has
90 * "manage" privileges, allow to add MEMBER_OF values to
91 * generic entries; the change is NOT automatically reflected
92 * in the MEMBER attribute of the GROUP referenced
93 * by the value of MEMBER_OF; a separate modification,
94 * with or without relax control, needs to be performed.
97 * - if the entry being renamed is a GROUP, the MEMBER_OF
98 * value of the (existing) MEMBER objects is modified
99 * accordingly based on the newDN of the GROUP.
101 * We need to determine, from the database, if it is
102 * a GROUP; the list of MEMBER objects is obtained from
105 * Non-existing MEMBER objects are ignored, since the
106 * MEMBER_AT is not being addressed by the operation.
108 * - if the entry being renamed has the MEMBER_OF attribute,
109 * the corresponding MEMBER value must be modified in the
110 * respective group entries.
114 * - if the entry being deleted is a GROUP, the (existing)
115 * MEMBER objects are modified accordingly; a copy of the
116 * values of the MEMBER_AT is saved and, if the delete
117 * succeeds, the MEMBER_OF value of the (existing) MEMBER
118 * objects is deleted.
120 * We need to determine, from the database, if it is
123 * Non-existing MEMBER objects are ignored, since the entry
126 * - if the entry being deleted has the MEMBER_OF attribute,
127 * the corresponding value of the MEMBER_AT must be deleted
128 * from the respective GROUP entries.
131 #define SLAPD_MEMBEROF_ATTR "memberOf"
133 static slap_overinst memberof;
135 typedef struct memberof_t {
137 struct berval mo_ndn;
139 ObjectClass *mo_oc_group;
140 AttributeDescription *mo_ad_member;
141 AttributeDescription *mo_ad_memberof;
143 struct berval mo_groupFilterstr;
144 AttributeAssertion mo_groupAVA;
145 Filter mo_groupFilter;
147 struct berval mo_memberFilterstr;
148 Filter mo_memberFilter;
151 #define MEMBEROF_NONE 0x00U
152 #define MEMBEROF_FDANGLING_DROP 0x01U
153 #define MEMBEROF_FDANGLING_ERROR 0x02U
154 #define MEMBEROF_FDANGLING_MASK (MEMBEROF_FDANGLING_DROP|MEMBEROF_FDANGLING_ERROR)
155 #define MEMBEROF_FREFINT 0x04U
156 #define MEMBEROF_FREVERSE 0x08U
158 ber_int_t mo_dangling_err;
160 #define MEMBEROF_CHK(mo,f) \
161 (((mo)->mo_flags & (f)) == (f))
162 #define MEMBEROF_DANGLING_CHECK(mo) \
163 ((mo)->mo_flags & MEMBEROF_FDANGLING_MASK)
164 #define MEMBEROF_DANGLING_DROP(mo) \
165 MEMBEROF_CHK((mo),MEMBEROF_FDANGLING_DROP)
166 #define MEMBEROF_DANGLING_ERROR(mo) \
167 MEMBEROF_CHK((mo),MEMBEROF_FDANGLING_ERROR)
168 #define MEMBEROF_REFINT(mo) \
169 MEMBEROF_CHK((mo),MEMBEROF_FREFINT)
170 #define MEMBEROF_REVERSE(mo) \
171 MEMBEROF_CHK((mo),MEMBEROF_FREVERSE)
174 typedef enum memberof_is_t {
175 MEMBEROF_IS_NONE = 0x00,
176 MEMBEROF_IS_GROUP = 0x01,
177 MEMBEROF_IS_MEMBER = 0x02,
178 MEMBEROF_IS_BOTH = (MEMBEROF_IS_GROUP|MEMBEROF_IS_MEMBER)
181 typedef struct memberof_cookie_t {
182 AttributeDescription *ad;
187 typedef struct memberof_cbinfo_t {
195 memberof_isGroupOrMember_cb( Operation *op, SlapReply *rs )
197 if ( rs->sr_type == REP_SEARCH ) {
198 memberof_cookie_t *mc;
200 mc = (memberof_cookie_t *)op->o_callback->sc_private;
208 * callback for internal search that saves the member attribute values
209 * of groups being deleted.
212 memberof_saveMember_cb( Operation *op, SlapReply *rs )
214 if ( rs->sr_type == REP_SEARCH ) {
215 memberof_cookie_t *mc;
218 mc = (memberof_cookie_t *)op->o_callback->sc_private;
221 assert( rs->sr_entry != NULL );
222 assert( rs->sr_entry->e_attrs != NULL );
224 a = attr_find( rs->sr_entry->e_attrs, mc->ad );
226 ber_bvarray_dup_x( &mc->vals, a->a_nvals, op->o_tmpmemctx );
228 assert( attr_find( a->a_next, mc->ad ) == NULL );
236 * the delete hook performs an internal search that saves the member
237 * attribute values of groups being deleted.
240 memberof_isGroupOrMember( Operation *op, memberof_cbinfo_t *mci )
242 slap_overinst *on = mci->on;
243 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
246 slap_callback cb = { 0 };
247 BackendInfo *bi = op->o_bd->bd_info;
248 AttributeName an[ 2 ];
250 memberof_is_t iswhat = MEMBEROF_IS_NONE;
251 memberof_cookie_t mc;
253 assert( mci->what != MEMBEROF_IS_NONE );
256 if ( op->o_tag == LDAP_REQ_DELETE ) {
257 cb.sc_response = memberof_saveMember_cb;
260 cb.sc_response = memberof_isGroupOrMember_cb;
263 op2.o_tag = LDAP_REQ_SEARCH;
264 op2.o_callback = &cb;
265 op2.o_dn = op->o_bd->be_rootdn;
266 op2.o_ndn = op->o_bd->be_rootndn;
268 op2.ors_scope = LDAP_SCOPE_BASE;
269 op2.ors_deref = LDAP_DEREF_NEVER;
270 BER_BVZERO( &an[ 1 ].an_name );
272 op2.ors_attrsonly = 0;
273 op2.ors_limit = NULL;
275 op2.ors_tlimit = SLAP_NO_LIMIT;
277 if ( mci->what & MEMBEROF_IS_GROUP ) {
278 SlapReply rs2 = { REP_RESULT };
280 mc.ad = mo->mo_ad_member;
283 an[ 0 ].an_desc = mo->mo_ad_member;
284 an[ 0 ].an_name = an[ 0 ].an_desc->ad_cname;
285 op2.ors_filterstr = mo->mo_groupFilterstr;
286 op2.ors_filter = &mo->mo_groupFilter;
288 op2.o_bd->bd_info = (BackendInfo *)on->on_info;
289 (void)op->o_bd->be_search( &op2, &rs2 );
290 op2.o_bd->bd_info = bi;
293 iswhat |= MEMBEROF_IS_GROUP;
294 if ( mc.vals ) mci->member = mc.vals;
299 if ( mci->what & MEMBEROF_IS_MEMBER ) {
300 SlapReply rs2 = { REP_RESULT };
302 mc.ad = mo->mo_ad_memberof;
305 an[ 0 ].an_desc = mo->mo_ad_memberof;
306 an[ 0 ].an_name = an[ 0 ].an_desc->ad_cname;
307 op2.ors_filterstr = mo->mo_memberFilterstr;
308 op2.ors_filter = &mo->mo_memberFilter;
310 op2.o_bd->bd_info = (BackendInfo *)on->on_info;
311 (void)op->o_bd->be_search( &op2, &rs2 );
312 op2.o_bd->bd_info = bi;
315 iswhat |= MEMBEROF_IS_MEMBER;
316 if ( mc.vals ) mci->memberof = mc.vals;
327 * response callback that adds memberof values when a group is modified.
330 memberof_value_modify(
333 AttributeDescription *ad,
334 struct berval *old_dn,
335 struct berval *old_ndn,
336 struct berval *new_dn,
337 struct berval *new_ndn )
339 memberof_cbinfo_t *mci = op->o_callback->sc_private;
340 slap_overinst *on = mci->on;
341 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
344 SlapReply rs2 = { REP_RESULT };
345 slap_callback cb = { NULL, slap_null_cb, NULL, NULL };
346 Modifications mod[ 2 ] = { { { 0 } } }, *ml;
347 struct berval values[ 4 ], nvalues[ 4 ];
350 op2.o_tag = LDAP_REQ_MODIFY;
353 op2.o_req_ndn = *ndn;
355 op2.o_callback = &cb;
356 op2.o_dn = op->o_bd->be_rootdn;
357 op2.o_ndn = op->o_bd->be_rootndn;
358 op2.orm_modlist = NULL;
360 /* Internal ops, never replicate these */
361 op2.orm_no_opattrs = 1;
362 op2.o_dont_replicate = 1;
364 if ( !BER_BVISNULL( &mo->mo_ndn ) ) {
367 ml->sml_values = &values[ 0 ];
368 ml->sml_values[ 0 ] = mo->mo_dn;
369 BER_BVZERO( &ml->sml_values[ 1 ] );
370 ml->sml_nvalues = &nvalues[ 0 ];
371 ml->sml_nvalues[ 0 ] = mo->mo_ndn;
372 BER_BVZERO( &ml->sml_nvalues[ 1 ] );
373 ml->sml_desc = slap_schema.si_ad_modifiersName;
374 ml->sml_type = ml->sml_desc->ad_cname;
375 ml->sml_op = LDAP_MOD_REPLACE;
376 ml->sml_flags = SLAP_MOD_INTERNAL;
377 ml->sml_next = op2.orm_modlist;
378 op2.orm_modlist = ml;
385 ml->sml_values = &values[ 2 ];
386 BER_BVZERO( &ml->sml_values[ 1 ] );
387 ml->sml_nvalues = &nvalues[ 2 ];
388 BER_BVZERO( &ml->sml_nvalues[ 1 ] );
390 ml->sml_type = ml->sml_desc->ad_cname;
391 ml->sml_flags = SLAP_MOD_INTERNAL;
392 ml->sml_next = op2.orm_modlist;
393 op2.orm_modlist = ml;
395 if ( new_ndn != NULL ) {
396 BackendInfo *bi = op2.o_bd->bd_info;
399 assert( !BER_BVISNULL( new_dn ) );
400 assert( !BER_BVISNULL( new_ndn ) );
403 ml->sml_op = LDAP_MOD_ADD;
405 ml->sml_values[ 0 ] = *new_dn;
406 ml->sml_nvalues[ 0 ] = *new_ndn;
408 oex.oe_key = (void *)&memberof;
409 LDAP_SLIST_INSERT_HEAD(&op2.o_extra, &oex, oe_next);
410 op2.o_bd->bd_info = (BackendInfo *)on->on_info;
411 (void)op->o_bd->be_modify( &op2, &rs2 );
412 op2.o_bd->bd_info = bi;
413 LDAP_SLIST_REMOVE(&op2.o_extra, &oex, OpExtra, oe_next);
414 if ( rs2.sr_err != LDAP_SUCCESS ) {
415 char buf[ SLAP_TEXT_BUFLEN ];
416 snprintf( buf, sizeof( buf ),
417 "memberof_value_modify DN=\"%s\" add %s=\"%s\" failed err=%d",
418 op2.o_req_dn.bv_val, ad->ad_cname.bv_val, new_dn->bv_val, rs2.sr_err );
419 Debug( LDAP_DEBUG_ANY, "%s: %s\n",
420 op->o_log_prefix, buf, 0 );
423 assert( op2.orm_modlist == &mod[ mcnt ] );
424 assert( mcnt == 0 || op2.orm_modlist->sml_next == &mod[ 0 ] );
425 ml = op2.orm_modlist->sml_next;
427 assert( ml == &mod[ 0 ] );
431 slap_mods_free( ml, 1 );
434 mod[ 0 ].sml_next = NULL;
437 if ( old_ndn != NULL ) {
438 BackendInfo *bi = op2.o_bd->bd_info;
441 assert( !BER_BVISNULL( old_dn ) );
442 assert( !BER_BVISNULL( old_ndn ) );
445 ml->sml_op = LDAP_MOD_DELETE;
447 ml->sml_values[ 0 ] = *old_dn;
448 ml->sml_nvalues[ 0 ] = *old_ndn;
450 oex.oe_key = (void *)&memberof;
451 LDAP_SLIST_INSERT_HEAD(&op2.o_extra, &oex, oe_next);
452 op2.o_bd->bd_info = (BackendInfo *)on->on_info;
453 (void)op->o_bd->be_modify( &op2, &rs2 );
454 op2.o_bd->bd_info = bi;
455 LDAP_SLIST_REMOVE(&op2.o_extra, &oex, OpExtra, oe_next);
456 if ( rs2.sr_err != LDAP_SUCCESS ) {
457 char buf[ SLAP_TEXT_BUFLEN ];
458 snprintf( buf, sizeof( buf ),
459 "memberof_value_modify DN=\"%s\" delete %s=\"%s\" failed err=%d",
460 op2.o_req_dn.bv_val, ad->ad_cname.bv_val, old_dn->bv_val, rs2.sr_err );
461 Debug( LDAP_DEBUG_ANY, "%s: %s\n",
462 op->o_log_prefix, buf, 0 );
465 assert( op2.orm_modlist == &mod[ mcnt ] );
466 ml = op2.orm_modlist->sml_next;
468 assert( ml == &mod[ 0 ] );
472 slap_mods_free( ml, 1 );
476 /* FIXME: if old_group_ndn doesn't exist, both delete __and__
477 * add will fail; better split in two operations, although
478 * not optimal in terms of performance. At least it would
479 * move towards self-repairing capabilities. */
483 memberof_cleanup( Operation *op, SlapReply *rs )
485 slap_callback *sc = op->o_callback;
486 memberof_cbinfo_t *mci = sc->sc_private;
488 op->o_callback = sc->sc_next;
490 ber_bvarray_free_x( mci->memberof, op->o_tmpmemctx );
492 ber_bvarray_free_x( mci->member, op->o_tmpmemctx );
493 op->o_tmpfree( sc, op->o_tmpmemctx );
497 static int memberof_res_add( Operation *op, SlapReply *rs );
498 static int memberof_res_delete( Operation *op, SlapReply *rs );
499 static int memberof_res_modify( Operation *op, SlapReply *rs );
500 static int memberof_res_modrdn( Operation *op, SlapReply *rs );
503 memberof_op_add( Operation *op, SlapReply *rs )
505 slap_overinst *on = (slap_overinst *)op->o_bd->bd_info;
506 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
508 Attribute **ap, **map = NULL;
509 int rc = SLAP_CB_CONTINUE;
511 struct berval save_dn, save_ndn;
513 memberof_cbinfo_t *mci;
516 LDAP_SLIST_FOREACH( oex, &op->o_extra, oe_next ) {
517 if ( oex->oe_key == (void *)&memberof )
518 return SLAP_CB_CONTINUE;
521 if ( op->ora_e->e_attrs == NULL ) {
522 /* FIXME: global overlay; need to deal with */
523 Debug( LDAP_DEBUG_ANY, "%s: memberof_op_add(\"%s\"): "
524 "consistency checks not implemented when overlay "
525 "is instantiated as global.\n",
526 op->o_log_prefix, op->o_req_dn.bv_val, 0 );
527 return SLAP_CB_CONTINUE;
530 if ( MEMBEROF_REVERSE( mo ) ) {
531 for ( ap = &op->ora_e->e_attrs; *ap; ap = &(*ap)->a_next ) {
534 if ( a->a_desc == mo->mo_ad_memberof ) {
542 save_ndn = op->o_ndn;
544 if ( MEMBEROF_DANGLING_CHECK( mo )
546 && is_entry_objectclass_or_sub( op->ora_e, mo->mo_oc_group ) )
548 op->o_dn = op->o_bd->be_rootdn;
549 op->o_ndn = op->o_bd->be_rootndn;
550 op->o_bd->bd_info = (BackendInfo *)on->on_info;
552 for ( ap = &op->ora_e->e_attrs; *ap; ) {
555 if ( !is_ad_subtype( a->a_desc, mo->mo_ad_member ) ) {
560 assert( a->a_nvals != NULL );
562 for ( i = 0; !BER_BVISNULL( &a->a_nvals[ i ] ); i++ ) {
565 /* ITS#6670 Ignore member pointing to this entry */
566 if ( dn_match( &a->a_nvals[i], &save_ndn ))
569 rc = be_entry_get_rw( op, &a->a_nvals[ i ],
571 if ( rc == LDAP_SUCCESS ) {
572 be_entry_release_r( op, e );
576 if ( MEMBEROF_DANGLING_ERROR( mo ) ) {
577 rc = rs->sr_err = mo->mo_dangling_err;
578 rs->sr_text = "adding non-existing object "
580 send_ldap_result( op, rs );
584 if ( MEMBEROF_DANGLING_DROP( mo ) ) {
587 Debug( LDAP_DEBUG_ANY, "%s: memberof_op_add(\"%s\"): "
588 "member=\"%s\" does not exist (stripping...)\n",
589 op->o_log_prefix, op->ora_e->e_name.bv_val,
590 a->a_vals[ i ].bv_val );
592 for ( j = i + 1; !BER_BVISNULL( &a->a_nvals[ j ] ); j++ );
593 ber_memfree( a->a_vals[ i ].bv_val );
594 BER_BVZERO( &a->a_vals[ i ] );
595 if ( a->a_nvals != a->a_vals ) {
596 ber_memfree( a->a_nvals[ i ].bv_val );
597 BER_BVZERO( &a->a_nvals[ i ] );
603 AC_MEMCPY( &a->a_vals[ i ], &a->a_vals[ i + 1 ],
604 sizeof( struct berval ) * ( j - i ) );
605 if ( a->a_nvals != a->a_vals ) {
606 AC_MEMCPY( &a->a_nvals[ i ], &a->a_nvals[ i + 1 ],
607 sizeof( struct berval ) * ( j - i ) );
614 /* If all values have been removed,
615 * remove the attribute itself. */
616 if ( BER_BVISNULL( &a->a_nvals[ 0 ] ) ) {
625 op->o_ndn = save_ndn;
626 op->o_bd->bd_info = (BackendInfo *)on;
631 AccessControlState acl_state = ACL_STATE_INIT;
633 for ( i = 0; !BER_BVISNULL( &a->a_nvals[ i ] ); i++ ) {
636 op->o_bd->bd_info = (BackendInfo *)on->on_info;
637 /* access is checked with the original identity */
638 rc = access_allowed( op, op->ora_e, mo->mo_ad_memberof,
639 &a->a_nvals[ i ], ACL_WADD,
642 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
644 send_ldap_result( op, rs );
647 /* ITS#6670 Ignore member pointing to this entry */
648 if ( dn_match( &a->a_nvals[i], &save_ndn ))
651 rc = be_entry_get_rw( op, &a->a_nvals[ i ],
653 op->o_bd->bd_info = (BackendInfo *)on;
654 if ( rc != LDAP_SUCCESS ) {
655 if ( get_relax( op ) ) {
659 if ( MEMBEROF_DANGLING_ERROR( mo ) ) {
660 rc = rs->sr_err = mo->mo_dangling_err;
661 rs->sr_text = "adding non-existing object "
663 send_ldap_result( op, rs );
667 if ( MEMBEROF_DANGLING_DROP( mo ) ) {
670 Debug( LDAP_DEBUG_ANY, "%s: memberof_op_add(\"%s\"): "
671 "memberof=\"%s\" does not exist (stripping...)\n",
672 op->o_log_prefix, op->ora_e->e_name.bv_val,
673 a->a_nvals[ i ].bv_val );
675 for ( j = i + 1; !BER_BVISNULL( &a->a_nvals[ j ] ); j++ );
676 ber_memfree( a->a_vals[ i ].bv_val );
677 BER_BVZERO( &a->a_vals[ i ] );
678 if ( a->a_nvals != a->a_vals ) {
679 ber_memfree( a->a_nvals[ i ].bv_val );
680 BER_BVZERO( &a->a_nvals[ i ] );
686 AC_MEMCPY( &a->a_vals[ i ], &a->a_vals[ i + 1 ],
687 sizeof( struct berval ) * ( j - i ) );
688 if ( a->a_nvals != a->a_vals ) {
689 AC_MEMCPY( &a->a_nvals[ i ], &a->a_nvals[ i + 1 ],
690 sizeof( struct berval ) * ( j - i ) );
698 /* access is checked with the original identity */
699 op->o_bd->bd_info = (BackendInfo *)on->on_info;
700 rc = access_allowed( op, e, mo->mo_ad_member,
701 &op->o_req_ndn, ACL_WADD, NULL );
702 be_entry_release_r( op, e );
703 op->o_bd->bd_info = (BackendInfo *)on;
706 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
707 rs->sr_text = "insufficient access to object referenced by memberof";
708 send_ldap_result( op, rs );
713 if ( BER_BVISNULL( &a->a_nvals[ 0 ] ) ) {
719 rc = SLAP_CB_CONTINUE;
721 sc = op->o_tmpalloc( sizeof(slap_callback)+sizeof(*mci), op->o_tmpmemctx );
722 sc->sc_private = sc+1;
723 sc->sc_response = memberof_res_add;
724 sc->sc_cleanup = memberof_cleanup;
725 mci = sc->sc_private;
728 mci->memberof = NULL;
729 sc->sc_next = op->o_callback;
734 op->o_ndn = save_ndn;
735 op->o_bd->bd_info = (BackendInfo *)on;
741 memberof_op_delete( Operation *op, SlapReply *rs )
743 slap_overinst *on = (slap_overinst *)op->o_bd->bd_info;
744 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
747 memberof_cbinfo_t *mci;
750 LDAP_SLIST_FOREACH( oex, &op->o_extra, oe_next ) {
751 if ( oex->oe_key == (void *)&memberof )
752 return SLAP_CB_CONTINUE;
755 sc = op->o_tmpalloc( sizeof(slap_callback)+sizeof(*mci), op->o_tmpmemctx );
756 sc->sc_private = sc+1;
757 sc->sc_response = memberof_res_delete;
758 sc->sc_cleanup = memberof_cleanup;
759 mci = sc->sc_private;
762 mci->memberof = NULL;
763 mci->what = MEMBEROF_IS_GROUP;
764 if ( MEMBEROF_REFINT( mo ) ) {
765 mci->what = MEMBEROF_IS_BOTH;
768 memberof_isGroupOrMember( op, mci );
770 sc->sc_next = op->o_callback;
773 return SLAP_CB_CONTINUE;
777 memberof_op_modify( Operation *op, SlapReply *rs )
779 slap_overinst *on = (slap_overinst *)op->o_bd->bd_info;
780 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
782 Modifications **mlp, **mmlp = NULL;
783 int rc = SLAP_CB_CONTINUE, save_member = 0;
784 struct berval save_dn, save_ndn;
786 memberof_cbinfo_t *mci, mcis;
789 LDAP_SLIST_FOREACH( oex, &op->o_extra, oe_next ) {
790 if ( oex->oe_key == (void *)&memberof )
791 return SLAP_CB_CONTINUE;
794 if ( MEMBEROF_REVERSE( mo ) ) {
795 for ( mlp = &op->orm_modlist; *mlp; mlp = &(*mlp)->sml_next ) {
796 Modifications *ml = *mlp;
798 if ( ml->sml_desc == mo->mo_ad_memberof ) {
806 save_ndn = op->o_ndn;
808 mcis.what = MEMBEROF_IS_GROUP;
810 if ( memberof_isGroupOrMember( op, &mcis ) == LDAP_SUCCESS
811 && ( mcis.what & MEMBEROF_IS_GROUP ) )
815 for ( ml = op->orm_modlist; ml; ml = ml->sml_next ) {
816 if ( ml->sml_desc == mo->mo_ad_member ) {
817 switch ( ml->sml_op ) {
818 case LDAP_MOD_DELETE:
819 case LDAP_MOD_REPLACE:
820 case SLAP_MOD_SOFTDEL: /* ITS#7487: can be used by syncrepl (in mirror mode?) */
828 if ( MEMBEROF_DANGLING_CHECK( mo )
829 && !get_relax( op ) )
831 op->o_dn = op->o_bd->be_rootdn;
832 op->o_ndn = op->o_bd->be_rootndn;
833 op->o_bd->bd_info = (BackendInfo *)on->on_info;
835 assert( op->orm_modlist != NULL );
837 for ( mlp = &op->orm_modlist; *mlp; ) {
838 Modifications *ml = *mlp;
841 if ( !is_ad_subtype( ml->sml_desc, mo->mo_ad_member ) ) {
846 switch ( ml->sml_op ) {
847 case LDAP_MOD_DELETE:
848 case SLAP_MOD_SOFTDEL: /* ITS#7487: can be used by syncrepl (in mirror mode?) */
849 /* we don't care about cancellations: if the value
850 * exists, fine; if it doesn't, we let the underlying
851 * database fail as appropriate; */
855 case LDAP_MOD_REPLACE:
856 /* Handle this just like a delete (see above) */
857 if ( !ml->sml_values ) {
863 case SLAP_MOD_SOFTADD: /* ITS#7487 */
864 case SLAP_MOD_ADD_IF_NOT_PRESENT: /* ITS#7487 */
865 /* NOTE: right now, the attributeType we use
866 * for member must have a normalized value */
867 assert( ml->sml_nvalues != NULL );
869 for ( i = 0; !BER_BVISNULL( &ml->sml_nvalues[ i ] ); i++ ) {
873 /* ITS#6670 Ignore member pointing to this entry */
874 if ( dn_match( &ml->sml_nvalues[i], &save_ndn ))
877 if ( be_entry_get_rw( op, &ml->sml_nvalues[ i ],
878 NULL, NULL, 0, &e ) == LDAP_SUCCESS )
880 be_entry_release_r( op, e );
884 if ( MEMBEROF_DANGLING_ERROR( mo ) ) {
885 rc = rs->sr_err = mo->mo_dangling_err;
886 rs->sr_text = "adding non-existing object "
888 send_ldap_result( op, rs );
892 if ( MEMBEROF_DANGLING_DROP( mo ) ) {
895 Debug( LDAP_DEBUG_ANY, "%s: memberof_op_modify(\"%s\"): "
896 "member=\"%s\" does not exist (stripping...)\n",
897 op->o_log_prefix, op->o_req_dn.bv_val,
898 ml->sml_nvalues[ i ].bv_val );
900 for ( j = i + 1; !BER_BVISNULL( &ml->sml_nvalues[ j ] ); j++ );
901 ber_memfree( ml->sml_values[ i ].bv_val );
902 BER_BVZERO( &ml->sml_values[ i ] );
903 ber_memfree( ml->sml_nvalues[ i ].bv_val );
904 BER_BVZERO( &ml->sml_nvalues[ i ] );
910 AC_MEMCPY( &ml->sml_values[ i ], &ml->sml_values[ i + 1 ],
911 sizeof( struct berval ) * ( j - i ) );
912 AC_MEMCPY( &ml->sml_nvalues[ i ], &ml->sml_nvalues[ i + 1 ],
913 sizeof( struct berval ) * ( j - i ) );
918 if ( BER_BVISNULL( &ml->sml_nvalues[ 0 ] ) ) {
920 slap_mod_free( &ml->sml_mod, 0 );
936 if ( mmlp != NULL ) {
937 Modifications *ml = *mmlp;
941 op->o_bd->bd_info = (BackendInfo *)on->on_info;
942 rc = be_entry_get_rw( op, &op->o_req_ndn,
943 NULL, NULL, 0, &target );
944 op->o_bd->bd_info = (BackendInfo *)on;
945 if ( rc != LDAP_SUCCESS ) {
946 rc = rs->sr_err = LDAP_NO_SUCH_OBJECT;
947 send_ldap_result( op, rs );
951 switch ( ml->sml_op ) {
952 case LDAP_MOD_DELETE:
953 case SLAP_MOD_SOFTDEL: /* ITS#7487: can be used by syncrepl (in mirror mode?) */
954 if ( ml->sml_nvalues != NULL ) {
955 AccessControlState acl_state = ACL_STATE_INIT;
957 for ( i = 0; !BER_BVISNULL( &ml->sml_nvalues[ i ] ); i++ ) {
960 op->o_bd->bd_info = (BackendInfo *)on->on_info;
961 /* access is checked with the original identity */
962 rc = access_allowed( op, target,
964 &ml->sml_nvalues[ i ],
968 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
970 send_ldap_result( op, rs );
974 rc = be_entry_get_rw( op, &ml->sml_nvalues[ i ],
976 op->o_bd->bd_info = (BackendInfo *)on;
977 if ( rc != LDAP_SUCCESS ) {
978 if ( get_relax( op ) ) {
982 if ( MEMBEROF_DANGLING_ERROR( mo ) ) {
983 rc = rs->sr_err = mo->mo_dangling_err;
984 rs->sr_text = "deleting non-existing object "
986 send_ldap_result( op, rs );
990 if ( MEMBEROF_DANGLING_DROP( mo ) ) {
993 Debug( LDAP_DEBUG_ANY, "%s: memberof_op_modify(\"%s\"): "
994 "memberof=\"%s\" does not exist (stripping...)\n",
995 op->o_log_prefix, op->o_req_ndn.bv_val,
996 ml->sml_nvalues[ i ].bv_val );
998 for ( j = i + 1; !BER_BVISNULL( &ml->sml_nvalues[ j ] ); j++ );
999 ber_memfree( ml->sml_values[ i ].bv_val );
1000 BER_BVZERO( &ml->sml_values[ i ] );
1001 if ( ml->sml_nvalues != ml->sml_values ) {
1002 ber_memfree( ml->sml_nvalues[ i ].bv_val );
1003 BER_BVZERO( &ml->sml_nvalues[ i ] );
1010 AC_MEMCPY( &ml->sml_values[ i ], &ml->sml_values[ i + 1 ],
1011 sizeof( struct berval ) * ( j - i ) );
1012 if ( ml->sml_nvalues != ml->sml_values ) {
1013 AC_MEMCPY( &ml->sml_nvalues[ i ], &ml->sml_nvalues[ i + 1 ],
1014 sizeof( struct berval ) * ( j - i ) );
1022 /* access is checked with the original identity */
1023 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1024 rc = access_allowed( op, e, mo->mo_ad_member,
1027 be_entry_release_r( op, e );
1028 op->o_bd->bd_info = (BackendInfo *)on;
1031 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
1032 rs->sr_text = "insufficient access to object referenced by memberof";
1033 send_ldap_result( op, rs );
1038 if ( BER_BVISNULL( &ml->sml_nvalues[ 0 ] ) ) {
1039 *mmlp = ml->sml_next;
1040 slap_mod_free( &ml->sml_mod, 0 );
1048 case LDAP_MOD_REPLACE:
1050 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1051 /* access is checked with the original identity */
1052 rc = access_allowed( op, target,
1056 op->o_bd->bd_info = (BackendInfo *)on;
1058 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
1060 send_ldap_result( op, rs );
1064 if ( ml->sml_op == LDAP_MOD_DELETE || ml->sml_op == SLAP_MOD_SOFTDEL || !ml->sml_values ) {
1070 case SLAP_MOD_SOFTADD: /* ITS#7487 */
1071 case SLAP_MOD_ADD_IF_NOT_PRESENT: /* ITS#7487 */
1073 AccessControlState acl_state = ACL_STATE_INIT;
1075 for ( i = 0; !BER_BVISNULL( &ml->sml_nvalues[ i ] ); i++ ) {
1078 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1079 /* access is checked with the original identity */
1080 rc = access_allowed( op, target,
1082 &ml->sml_nvalues[ i ],
1086 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
1088 send_ldap_result( op, rs );
1092 /* ITS#6670 Ignore member pointing to this entry */
1093 if ( dn_match( &ml->sml_nvalues[i], &save_ndn ))
1096 rc = be_entry_get_rw( op, &ml->sml_nvalues[ i ],
1097 NULL, NULL, 0, &e );
1098 op->o_bd->bd_info = (BackendInfo *)on;
1099 if ( rc != LDAP_SUCCESS ) {
1100 if ( MEMBEROF_DANGLING_ERROR( mo ) ) {
1101 rc = rs->sr_err = mo->mo_dangling_err;
1102 rs->sr_text = "adding non-existing object "
1104 send_ldap_result( op, rs );
1108 if ( MEMBEROF_DANGLING_DROP( mo ) ) {
1111 Debug( LDAP_DEBUG_ANY, "%s: memberof_op_modify(\"%s\"): "
1112 "memberof=\"%s\" does not exist (stripping...)\n",
1113 op->o_log_prefix, op->o_req_ndn.bv_val,
1114 ml->sml_nvalues[ i ].bv_val );
1116 for ( j = i + 1; !BER_BVISNULL( &ml->sml_nvalues[ j ] ); j++ );
1117 ber_memfree( ml->sml_values[ i ].bv_val );
1118 BER_BVZERO( &ml->sml_values[ i ] );
1119 if ( ml->sml_nvalues != ml->sml_values ) {
1120 ber_memfree( ml->sml_nvalues[ i ].bv_val );
1121 BER_BVZERO( &ml->sml_nvalues[ i ] );
1128 AC_MEMCPY( &ml->sml_values[ i ], &ml->sml_values[ i + 1 ],
1129 sizeof( struct berval ) * ( j - i ) );
1130 if ( ml->sml_nvalues != ml->sml_values ) {
1131 AC_MEMCPY( &ml->sml_nvalues[ i ], &ml->sml_nvalues[ i + 1 ],
1132 sizeof( struct berval ) * ( j - i ) );
1140 /* access is checked with the original identity */
1141 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1142 rc = access_allowed( op, e, mo->mo_ad_member,
1145 be_entry_release_r( op, e );
1146 op->o_bd->bd_info = (BackendInfo *)on;
1149 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
1150 rs->sr_text = "insufficient access to object referenced by memberof";
1151 send_ldap_result( op, rs );
1156 if ( BER_BVISNULL( &ml->sml_nvalues[ 0 ] ) ) {
1157 *mmlp = ml->sml_next;
1158 slap_mod_free( &ml->sml_mod, 0 );
1169 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1170 be_entry_release_r( op, target );
1171 op->o_bd->bd_info = (BackendInfo *)on;
1174 sc = op->o_tmpalloc( sizeof(slap_callback)+sizeof(*mci), op->o_tmpmemctx );
1175 sc->sc_private = sc+1;
1176 sc->sc_response = memberof_res_modify;
1177 sc->sc_cleanup = memberof_cleanup;
1178 mci = sc->sc_private;
1181 mci->memberof = NULL;
1182 mci->what = mcis.what;
1184 if ( save_member ) {
1185 op->o_dn = op->o_bd->be_rootdn;
1186 op->o_ndn = op->o_bd->be_rootndn;
1187 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1188 rc = backend_attribute( op, NULL, &op->o_req_ndn,
1189 mo->mo_ad_member, &mci->member, ACL_READ );
1190 op->o_bd->bd_info = (BackendInfo *)on;
1193 sc->sc_next = op->o_callback;
1194 op->o_callback = sc;
1196 rc = SLAP_CB_CONTINUE;
1200 op->o_ndn = save_ndn;
1201 op->o_bd->bd_info = (BackendInfo *)on;
1207 memberof_op_modrdn( Operation *op, SlapReply *rs )
1209 slap_overinst *on = (slap_overinst *)op->o_bd->bd_info;
1211 memberof_cbinfo_t *mci;
1214 LDAP_SLIST_FOREACH( oex, &op->o_extra, oe_next ) {
1215 if ( oex->oe_key == (void *)&memberof )
1216 return SLAP_CB_CONTINUE;
1219 sc = op->o_tmpalloc( sizeof(slap_callback)+sizeof(*mci), op->o_tmpmemctx );
1220 sc->sc_private = sc+1;
1221 sc->sc_response = memberof_res_modrdn;
1222 sc->sc_cleanup = memberof_cleanup;
1223 mci = sc->sc_private;
1226 mci->memberof = NULL;
1228 sc->sc_next = op->o_callback;
1229 op->o_callback = sc;
1231 return SLAP_CB_CONTINUE;
1235 * response callback that adds memberof values when a group is added.
1238 memberof_res_add( Operation *op, SlapReply *rs )
1240 memberof_cbinfo_t *mci = op->o_callback->sc_private;
1241 slap_overinst *on = mci->on;
1242 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
1246 if ( rs->sr_err != LDAP_SUCCESS ) {
1247 return SLAP_CB_CONTINUE;
1250 if ( MEMBEROF_REVERSE( mo ) ) {
1253 ma = attr_find( op->ora_e->e_attrs, mo->mo_ad_memberof );
1255 /* relax is required to allow to add
1256 * a non-existing member */
1257 op->o_relax = SLAP_CONTROL_CRITICAL;
1259 for ( i = 0; !BER_BVISNULL( &ma->a_nvals[ i ] ); i++ ) {
1261 /* ITS#6670 Ignore member pointing to this entry */
1262 if ( dn_match( &ma->a_nvals[i], &op->o_req_ndn ))
1265 /* the modification is attempted
1266 * with the original identity */
1267 memberof_value_modify( op,
1268 &ma->a_nvals[ i ], mo->mo_ad_member,
1269 NULL, NULL, &op->o_req_dn, &op->o_req_ndn );
1274 if ( is_entry_objectclass_or_sub( op->ora_e, mo->mo_oc_group ) ) {
1277 for ( a = attrs_find( op->ora_e->e_attrs, mo->mo_ad_member );
1279 a = attrs_find( a->a_next, mo->mo_ad_member ) )
1281 for ( i = 0; !BER_BVISNULL( &a->a_nvals[ i ] ); i++ ) {
1282 /* ITS#6670 Ignore member pointing to this entry */
1283 if ( dn_match( &a->a_nvals[i], &op->o_req_ndn ))
1286 memberof_value_modify( op,
1296 return SLAP_CB_CONTINUE;
1300 * response callback that deletes memberof values when a group is deleted.
1303 memberof_res_delete( Operation *op, SlapReply *rs )
1305 memberof_cbinfo_t *mci = op->o_callback->sc_private;
1306 slap_overinst *on = mci->on;
1307 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
1312 if ( rs->sr_err != LDAP_SUCCESS ) {
1313 return SLAP_CB_CONTINUE;
1317 if ( vals != NULL ) {
1318 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1319 memberof_value_modify( op,
1320 &vals[ i ], mo->mo_ad_memberof,
1321 &op->o_req_dn, &op->o_req_ndn,
1326 if ( MEMBEROF_REFINT( mo ) ) {
1327 vals = mci->memberof;
1328 if ( vals != NULL ) {
1329 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1330 memberof_value_modify( op,
1331 &vals[ i ], mo->mo_ad_member,
1332 &op->o_req_dn, &op->o_req_ndn,
1338 return SLAP_CB_CONTINUE;
1342 * response callback that adds/deletes memberof values when a group
1346 memberof_res_modify( Operation *op, SlapReply *rs )
1348 memberof_cbinfo_t *mci = op->o_callback->sc_private;
1349 slap_overinst *on = mci->on;
1350 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
1353 Modifications *ml, *mml = NULL;
1356 if ( rs->sr_err != LDAP_SUCCESS ) {
1357 return SLAP_CB_CONTINUE;
1360 if ( MEMBEROF_REVERSE( mo ) ) {
1361 for ( ml = op->orm_modlist; ml; ml = ml->sml_next ) {
1362 if ( ml->sml_desc == mo->mo_ad_memberof ) {
1369 if ( mml != NULL ) {
1370 BerVarray vals = mml->sml_nvalues;
1372 switch ( mml->sml_op ) {
1373 case LDAP_MOD_DELETE:
1374 case SLAP_MOD_SOFTDEL: /* ITS#7487: can be used by syncrepl (in mirror mode?) */
1375 if ( vals != NULL ) {
1376 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1377 memberof_value_modify( op,
1378 &vals[ i ], mo->mo_ad_member,
1379 &op->o_req_dn, &op->o_req_ndn,
1386 case LDAP_MOD_REPLACE:
1387 /* delete all ... */
1388 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1389 rc = backend_attribute( op, NULL, &op->o_req_ndn,
1390 mo->mo_ad_memberof, &vals, ACL_READ );
1391 op->o_bd->bd_info = (BackendInfo *)on;
1392 if ( rc == LDAP_SUCCESS ) {
1393 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1394 memberof_value_modify( op,
1395 &vals[ i ], mo->mo_ad_member,
1396 &op->o_req_dn, &op->o_req_ndn,
1399 ber_bvarray_free_x( vals, op->o_tmpmemctx );
1402 if ( ml->sml_op == LDAP_MOD_DELETE || !mml->sml_values ) {
1408 case SLAP_MOD_SOFTADD: /* ITS#7487 */
1409 case SLAP_MOD_ADD_IF_NOT_PRESENT: /* ITS#7487 */
1410 assert( vals != NULL );
1412 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1413 memberof_value_modify( op,
1414 &vals[ i ], mo->mo_ad_member,
1416 &op->o_req_dn, &op->o_req_ndn );
1425 if ( mci->what & MEMBEROF_IS_GROUP )
1427 for ( ml = op->orm_modlist; ml; ml = ml->sml_next ) {
1428 if ( ml->sml_desc != mo->mo_ad_member ) {
1432 switch ( ml->sml_op ) {
1433 case LDAP_MOD_DELETE:
1434 case SLAP_MOD_SOFTDEL: /* ITS#7487: can be used by syncrepl (in mirror mode?) */
1435 vals = ml->sml_nvalues;
1436 if ( vals != NULL ) {
1437 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1438 memberof_value_modify( op,
1439 &vals[ i ], mo->mo_ad_memberof,
1440 &op->o_req_dn, &op->o_req_ndn,
1447 case LDAP_MOD_REPLACE:
1450 /* delete all ... */
1451 if ( vals != NULL ) {
1452 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1453 memberof_value_modify( op,
1454 &vals[ i ], mo->mo_ad_memberof,
1455 &op->o_req_dn, &op->o_req_ndn,
1460 if ( ml->sml_op == LDAP_MOD_DELETE || ml->sml_op == SLAP_MOD_SOFTDEL || !ml->sml_values ) {
1466 case SLAP_MOD_SOFTADD: /* ITS#7487 */
1467 case SLAP_MOD_ADD_IF_NOT_PRESENT : /* ITS#7487 */
1468 assert( ml->sml_nvalues != NULL );
1469 vals = ml->sml_nvalues;
1470 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1471 memberof_value_modify( op,
1472 &vals[ i ], mo->mo_ad_memberof,
1474 &op->o_req_dn, &op->o_req_ndn );
1484 return SLAP_CB_CONTINUE;
1488 * response callback that adds/deletes member values when a group member
1492 memberof_res_modrdn( Operation *op, SlapReply *rs )
1494 memberof_cbinfo_t *mci = op->o_callback->sc_private;
1495 slap_overinst *on = mci->on;
1496 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
1498 struct berval newPDN, newDN = BER_BVNULL, newPNDN, newNDN;
1502 struct berval save_dn, save_ndn;
1504 if ( rs->sr_err != LDAP_SUCCESS ) {
1505 return SLAP_CB_CONTINUE;
1508 mci->what = MEMBEROF_IS_GROUP;
1509 if ( MEMBEROF_REFINT( mo ) ) {
1510 mci->what |= MEMBEROF_IS_MEMBER;
1513 if ( op->orr_nnewSup ) {
1514 newPNDN = *op->orr_nnewSup;
1517 dnParent( &op->o_req_ndn, &newPNDN );
1520 build_new_dn( &newNDN, &newPNDN, &op->orr_nnewrdn, op->o_tmpmemctx );
1522 save_dn = op->o_req_dn;
1523 save_ndn = op->o_req_ndn;
1525 op->o_req_dn = newNDN;
1526 op->o_req_ndn = newNDN;
1527 rc = memberof_isGroupOrMember( op, mci );
1528 op->o_req_dn = save_dn;
1529 op->o_req_ndn = save_ndn;
1531 if ( rc != LDAP_SUCCESS || mci->what == MEMBEROF_IS_NONE ) {
1535 if ( op->orr_newSup ) {
1536 newPDN = *op->orr_newSup;
1539 dnParent( &op->o_req_dn, &newPDN );
1542 build_new_dn( &newDN, &newPDN, &op->orr_newrdn, op->o_tmpmemctx );
1544 if ( mci->what & MEMBEROF_IS_GROUP ) {
1545 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1546 rc = backend_attribute( op, NULL, &newNDN,
1547 mo->mo_ad_member, &vals, ACL_READ );
1548 op->o_bd->bd_info = (BackendInfo *)on;
1550 if ( rc == LDAP_SUCCESS ) {
1551 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1552 memberof_value_modify( op,
1553 &vals[ i ], mo->mo_ad_memberof,
1554 &op->o_req_dn, &op->o_req_ndn,
1557 ber_bvarray_free_x( vals, op->o_tmpmemctx );
1561 if ( MEMBEROF_REFINT( mo ) && ( mci->what & MEMBEROF_IS_MEMBER ) ) {
1562 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1563 rc = backend_attribute( op, NULL, &newNDN,
1564 mo->mo_ad_memberof, &vals, ACL_READ );
1565 op->o_bd->bd_info = (BackendInfo *)on;
1567 if ( rc == LDAP_SUCCESS ) {
1568 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1569 memberof_value_modify( op,
1570 &vals[ i ], mo->mo_ad_member,
1571 &op->o_req_dn, &op->o_req_ndn,
1574 ber_bvarray_free_x( vals, op->o_tmpmemctx );
1579 if ( !BER_BVISNULL( &newDN ) ) {
1580 op->o_tmpfree( newDN.bv_val, op->o_tmpmemctx );
1582 op->o_tmpfree( newNDN.bv_val, op->o_tmpmemctx );
1584 return SLAP_CB_CONTINUE;
1593 slap_overinst *on = (slap_overinst *)be->bd_info;
1596 mo = (memberof_t *)ch_calloc( 1, sizeof( memberof_t ) );
1599 mo->mo_dangling_err = LDAP_CONSTRAINT_VIOLATION;
1601 on->on_bi.bi_private = (void *)mo;
1622 static ConfigDriver mo_cf_gen;
1624 #define OID "1.3.6.1.4.1.7136.2.666.4"
1625 #define OIDAT OID ".1.1"
1626 #define OIDCFGAT OID ".1.2"
1627 #define OIDOC OID ".2.1"
1628 #define OIDCFGOC OID ".2.2"
1631 static ConfigTable mo_cfg[] = {
1632 { "memberof-dn", "modifiersName",
1633 2, 2, 0, ARG_MAGIC|ARG_DN|MO_DN, mo_cf_gen,
1634 "( OLcfgOvAt:18.0 NAME 'olcMemberOfDN' "
1635 "DESC 'DN to be used as modifiersName' "
1636 "SYNTAX OMsDN SINGLE-VALUE )",
1639 { "memberof-dangling", "ignore|drop|error",
1640 2, 2, 0, ARG_MAGIC|MO_DANGLING, mo_cf_gen,
1641 "( OLcfgOvAt:18.1 NAME 'olcMemberOfDangling' "
1642 "DESC 'Behavior with respect to dangling members, "
1643 "constrained to ignore, drop, error' "
1644 "SYNTAX OMsDirectoryString SINGLE-VALUE )",
1647 { "memberof-refint", "true|FALSE",
1648 2, 2, 0, ARG_MAGIC|ARG_ON_OFF|MO_REFINT, mo_cf_gen,
1649 "( OLcfgOvAt:18.2 NAME 'olcMemberOfRefInt' "
1650 "DESC 'Take care of referential integrity' "
1651 "SYNTAX OMsBoolean SINGLE-VALUE )",
1654 { "memberof-group-oc", "objectClass",
1655 2, 2, 0, ARG_MAGIC|MO_GROUP_OC, mo_cf_gen,
1656 "( OLcfgOvAt:18.3 NAME 'olcMemberOfGroupOC' "
1657 "DESC 'Group objectClass' "
1658 "SYNTAX OMsDirectoryString SINGLE-VALUE )",
1661 { "memberof-member-ad", "member attribute",
1662 2, 2, 0, ARG_MAGIC|MO_MEMBER_AD, mo_cf_gen,
1663 "( OLcfgOvAt:18.4 NAME 'olcMemberOfMemberAD' "
1664 "DESC 'member attribute' "
1665 "SYNTAX OMsDirectoryString SINGLE-VALUE )",
1668 { "memberof-memberof-ad", "memberOf attribute",
1669 2, 2, 0, ARG_MAGIC|MO_MEMBER_OF_AD, mo_cf_gen,
1670 "( OLcfgOvAt:18.5 NAME 'olcMemberOfMemberOfAD' "
1671 "DESC 'memberOf attribute' "
1672 "SYNTAX OMsDirectoryString SINGLE-VALUE )",
1676 { "memberof-reverse", "true|FALSE",
1677 2, 2, 0, ARG_MAGIC|ARG_ON_OFF|MO_REVERSE, mo_cf_gen,
1678 "( OLcfgOvAt:18.6 NAME 'olcMemberOfReverse' "
1679 "DESC 'Take care of referential integrity "
1680 "also when directly modifying memberOf' "
1681 "SYNTAX OMsBoolean SINGLE-VALUE )",
1685 { "memberof-dangling-error", "error code",
1686 2, 2, 0, ARG_MAGIC|MO_DANGLING_ERROR, mo_cf_gen,
1687 "( OLcfgOvAt:18.7 NAME 'olcMemberOfDanglingError' "
1688 "DESC 'Error code returned in case of dangling back reference' "
1689 "SYNTAX OMsDirectoryString SINGLE-VALUE )",
1692 { NULL, NULL, 0, 0, 0, ARG_IGNORED }
1695 static ConfigOCs mo_ocs[] = {
1696 { "( OLcfgOvOc:18.1 "
1697 "NAME 'olcMemberOf' "
1698 "DESC 'Member-of configuration' "
1699 "SUP olcOverlayConfig "
1702 "$ olcMemberOfDangling "
1703 "$ olcMemberOfDanglingError"
1704 "$ olcMemberOfRefInt "
1705 "$ olcMemberOfGroupOC "
1706 "$ olcMemberOfMemberAD "
1707 "$ olcMemberOfMemberOfAD "
1709 "$ olcMemberOfReverse "
1713 Cft_Overlay, mo_cfg, NULL, NULL },
1717 static slap_verbmasks dangling_mode[] = {
1718 { BER_BVC( "ignore" ), MEMBEROF_NONE },
1719 { BER_BVC( "drop" ), MEMBEROF_FDANGLING_DROP },
1720 { BER_BVC( "error" ), MEMBEROF_FDANGLING_ERROR },
1725 memberof_make_group_filter( memberof_t *mo )
1729 if ( !BER_BVISNULL( &mo->mo_groupFilterstr ) ) {
1730 ch_free( mo->mo_groupFilterstr.bv_val );
1733 mo->mo_groupFilter.f_choice = LDAP_FILTER_EQUALITY;
1734 mo->mo_groupFilter.f_ava = &mo->mo_groupAVA;
1736 mo->mo_groupFilter.f_av_desc = slap_schema.si_ad_objectClass;
1737 mo->mo_groupFilter.f_av_value = mo->mo_oc_group->soc_cname;
1739 mo->mo_groupFilterstr.bv_len = STRLENOF( "(=)" )
1740 + slap_schema.si_ad_objectClass->ad_cname.bv_len
1741 + mo->mo_oc_group->soc_cname.bv_len;
1742 ptr = mo->mo_groupFilterstr.bv_val = ch_malloc( mo->mo_groupFilterstr.bv_len + 1 );
1744 ptr = lutil_strcopy( ptr, slap_schema.si_ad_objectClass->ad_cname.bv_val );
1746 ptr = lutil_strcopy( ptr, mo->mo_oc_group->soc_cname.bv_val );
1754 memberof_make_member_filter( memberof_t *mo )
1758 if ( !BER_BVISNULL( &mo->mo_memberFilterstr ) ) {
1759 ch_free( mo->mo_memberFilterstr.bv_val );
1762 mo->mo_memberFilter.f_choice = LDAP_FILTER_PRESENT;
1763 mo->mo_memberFilter.f_desc = mo->mo_ad_memberof;
1765 mo->mo_memberFilterstr.bv_len = STRLENOF( "(=*)" )
1766 + mo->mo_ad_memberof->ad_cname.bv_len;
1767 ptr = mo->mo_memberFilterstr.bv_val = ch_malloc( mo->mo_memberFilterstr.bv_len + 1 );
1769 ptr = lutil_strcopy( ptr, mo->mo_ad_memberof->ad_cname.bv_val );
1770 ptr = lutil_strcopy( ptr, "=*)" );
1776 mo_cf_gen( ConfigArgs *c )
1778 slap_overinst *on = (slap_overinst *)c->bi;
1779 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
1783 if ( c->op == SLAP_CONFIG_EMIT ) {
1784 struct berval bv = BER_BVNULL;
1788 if ( mo->mo_dn.bv_val != NULL) {
1789 value_add_one( &c->rvalue_vals, &mo->mo_dn );
1790 value_add_one( &c->rvalue_nvals, &mo->mo_ndn );
1795 enum_to_verb( dangling_mode, (mo->mo_flags & MEMBEROF_FDANGLING_MASK), &bv );
1796 if ( BER_BVISNULL( &bv ) ) {
1797 /* there's something wrong... */
1802 value_add_one( &c->rvalue_vals, &bv );
1806 case MO_DANGLING_ERROR:
1807 if ( mo->mo_flags & MEMBEROF_FDANGLING_ERROR ) {
1808 char buf[ SLAP_TEXT_BUFLEN ];
1809 enum_to_verb( slap_ldap_response_code, mo->mo_dangling_err, &bv );
1810 if ( BER_BVISNULL( &bv ) ) {
1811 bv.bv_len = snprintf( buf, sizeof( buf ), "0x%x", mo->mo_dangling_err );
1812 if ( bv.bv_len < sizeof( buf ) ) {
1819 value_add_one( &c->rvalue_vals, &bv );
1826 c->value_int = MEMBEROF_REFINT( mo );
1831 c->value_int = MEMBEROF_REVERSE( mo );
1836 if ( mo->mo_oc_group != NULL ){
1837 value_add_one( &c->rvalue_vals, &mo->mo_oc_group->soc_cname );
1842 if ( mo->mo_ad_member != NULL ){
1843 value_add_one( &c->rvalue_vals, &mo->mo_ad_member->ad_cname );
1847 case MO_MEMBER_OF_AD:
1848 if ( mo->mo_ad_memberof != NULL ){
1849 value_add_one( &c->rvalue_vals, &mo->mo_ad_memberof->ad_cname );
1860 } else if ( c->op == LDAP_MOD_DELETE ) {
1861 return 1; /* FIXME */
1866 if ( !BER_BVISNULL( &mo->mo_dn ) ) {
1867 ber_memfree( mo->mo_dn.bv_val );
1868 ber_memfree( mo->mo_ndn.bv_val );
1870 mo->mo_dn = c->value_dn;
1871 mo->mo_ndn = c->value_ndn;
1875 i = verb_to_mask( c->argv[ 1 ], dangling_mode );
1876 if ( BER_BVISNULL( &dangling_mode[ i ].word ) ) {
1880 mo->mo_flags &= ~MEMBEROF_FDANGLING_MASK;
1881 mo->mo_flags |= dangling_mode[ i ].mask;
1884 case MO_DANGLING_ERROR:
1885 i = verb_to_mask( c->argv[ 1 ], slap_ldap_response_code );
1886 if ( !BER_BVISNULL( &slap_ldap_response_code[ i ].word ) ) {
1887 mo->mo_dangling_err = slap_ldap_response_code[ i ].mask;
1888 } else if ( lutil_atoix( &mo->mo_dangling_err, c->argv[ 1 ], 0 ) ) {
1894 if ( c->value_int ) {
1895 mo->mo_flags |= MEMBEROF_FREFINT;
1898 mo->mo_flags &= ~MEMBEROF_FREFINT;
1904 if ( c->value_int ) {
1905 mo->mo_flags |= MEMBEROF_FREVERSE;
1908 mo->mo_flags &= ~MEMBEROF_FREVERSE;
1914 ObjectClass *oc = NULL;
1916 oc = oc_find( c->argv[ 1 ] );
1918 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1919 "unable to find group objectClass=\"%s\"",
1921 Debug( LDAP_DEBUG_CONFIG, "%s: %s.\n",
1922 c->log, c->cr_msg, 0 );
1926 mo->mo_oc_group = oc;
1927 memberof_make_group_filter( mo );
1930 case MO_MEMBER_AD: {
1931 AttributeDescription *ad = NULL;
1932 const char *text = NULL;
1935 rc = slap_str2ad( c->argv[ 1 ], &ad, &text );
1936 if ( rc != LDAP_SUCCESS ) {
1937 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1938 "unable to find member attribute=\"%s\": %s (%d)",
1939 c->argv[ 1 ], text, rc );
1940 Debug( LDAP_DEBUG_CONFIG, "%s: %s.\n",
1941 c->log, c->cr_msg, 0 );
1945 if ( !is_at_syntax( ad->ad_type, SLAPD_DN_SYNTAX ) /* e.g. "member" */
1946 && !is_at_syntax( ad->ad_type, SLAPD_NAMEUID_SYNTAX ) ) /* e.g. "uniqueMember" */
1948 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1949 "member attribute=\"%s\" must either "
1950 "have DN (%s) or nameUID (%s) syntax",
1951 c->argv[ 1 ], SLAPD_DN_SYNTAX, SLAPD_NAMEUID_SYNTAX );
1952 Debug( LDAP_DEBUG_CONFIG, "%s: %s.\n",
1953 c->log, c->cr_msg, 0 );
1957 mo->mo_ad_member = ad;
1960 case MO_MEMBER_OF_AD: {
1961 AttributeDescription *ad = NULL;
1962 const char *text = NULL;
1965 rc = slap_str2ad( c->argv[ 1 ], &ad, &text );
1966 if ( rc != LDAP_SUCCESS ) {
1967 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1968 "unable to find memberof attribute=\"%s\": %s (%d)",
1969 c->argv[ 1 ], text, rc );
1970 Debug( LDAP_DEBUG_CONFIG, "%s: %s.\n",
1971 c->log, c->cr_msg, 0 );
1975 if ( !is_at_syntax( ad->ad_type, SLAPD_DN_SYNTAX ) /* e.g. "member" */
1976 && !is_at_syntax( ad->ad_type, SLAPD_NAMEUID_SYNTAX ) ) /* e.g. "uniqueMember" */
1978 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1979 "memberof attribute=\"%s\" must either "
1980 "have DN (%s) or nameUID (%s) syntax",
1981 c->argv[ 1 ], SLAPD_DN_SYNTAX, SLAPD_NAMEUID_SYNTAX );
1982 Debug( LDAP_DEBUG_CONFIG, "%s: %s.\n",
1983 c->log, c->cr_msg, 0 );
1987 mo->mo_ad_memberof = ad;
1988 memberof_make_member_filter( mo );
2005 slap_overinst *on = (slap_overinst *)be->bd_info;
2006 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
2009 const char *text = NULL;
2011 if( ! mo->mo_ad_memberof ){
2012 rc = slap_str2ad( SLAPD_MEMBEROF_ATTR, &mo->mo_ad_memberof, &text );
2013 if ( rc != LDAP_SUCCESS ) {
2014 Debug( LDAP_DEBUG_ANY, "memberof_db_open: "
2015 "unable to find attribute=\"%s\": %s (%d)\n",
2016 SLAPD_MEMBEROF_ATTR, text, rc );
2021 if( ! mo->mo_ad_member ){
2022 rc = slap_str2ad( SLAPD_GROUP_ATTR, &mo->mo_ad_member, &text );
2023 if ( rc != LDAP_SUCCESS ) {
2024 Debug( LDAP_DEBUG_ANY, "memberof_db_open: "
2025 "unable to find attribute=\"%s\": %s (%d)\n",
2026 SLAPD_GROUP_ATTR, text, rc );
2031 if( ! mo->mo_oc_group ){
2032 mo->mo_oc_group = oc_find( SLAPD_GROUP_CLASS );
2033 if ( mo->mo_oc_group == NULL ) {
2034 Debug( LDAP_DEBUG_ANY,
2035 "memberof_db_open: "
2036 "unable to find objectClass=\"%s\"\n",
2037 SLAPD_GROUP_CLASS, 0, 0 );
2042 if ( BER_BVISNULL( &mo->mo_dn ) && !BER_BVISNULL( &be->be_rootdn ) ) {
2043 ber_dupbv( &mo->mo_dn, &be->be_rootdn );
2044 ber_dupbv( &mo->mo_ndn, &be->be_rootndn );
2047 if ( BER_BVISNULL( &mo->mo_groupFilterstr ) ) {
2048 memberof_make_group_filter( mo );
2051 if ( BER_BVISNULL( &mo->mo_memberFilterstr ) ) {
2052 memberof_make_member_filter( mo );
2059 memberof_db_destroy(
2063 slap_overinst *on = (slap_overinst *)be->bd_info;
2064 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
2067 if ( !BER_BVISNULL( &mo->mo_dn ) ) {
2068 ber_memfree( mo->mo_dn.bv_val );
2069 ber_memfree( mo->mo_ndn.bv_val );
2072 if ( !BER_BVISNULL( &mo->mo_groupFilterstr ) ) {
2073 ber_memfree( mo->mo_groupFilterstr.bv_val );
2076 if ( !BER_BVISNULL( &mo->mo_memberFilterstr ) ) {
2077 ber_memfree( mo->mo_memberFilterstr.bv_val );
2087 static AttributeDescription *ad_memberOf;
2091 AttributeDescription **adp;
2093 { "( 1.2.840.113556.1.2.102 "
2095 "DESC 'Group that the entry belongs to' "
2096 "SYNTAX '1.3.6.1.4.1.1466.115.121.1.12' "
2097 "EQUALITY distinguishedNameMatch " /* added */
2098 "USAGE dSAOperation " /* added; questioned */
2099 /* "NO-USER-MODIFICATION " */ /* add? */
2100 "X-ORIGIN 'iPlanet Delegated Administrator' )",
2105 #if SLAPD_OVER_MEMBEROF == SLAPD_MOD_DYNAMIC
2107 #endif /* SLAPD_OVER_MEMBEROF == SLAPD_MOD_DYNAMIC */
2109 memberof_initialize( void )
2113 for ( i = 0; as[ i ].desc != NULL; i++ ) {
2114 code = register_at( as[ i ].desc, as[ i ].adp, 0 );
2116 Debug( LDAP_DEBUG_ANY,
2117 "memberof_initialize: register_at #%d failed\n",
2123 memberof.on_bi.bi_type = "memberof";
2125 memberof.on_bi.bi_db_init = memberof_db_init;
2126 memberof.on_bi.bi_db_open = memberof_db_open;
2127 memberof.on_bi.bi_db_destroy = memberof_db_destroy;
2129 memberof.on_bi.bi_op_add = memberof_op_add;
2130 memberof.on_bi.bi_op_delete = memberof_op_delete;
2131 memberof.on_bi.bi_op_modify = memberof_op_modify;
2132 memberof.on_bi.bi_op_modrdn = memberof_op_modrdn;
2134 memberof.on_bi.bi_cf_ocs = mo_ocs;
2136 code = config_register_schema( mo_cfg, mo_ocs );
2137 if ( code ) return code;
2139 return overlay_register( &memberof );
2142 #if SLAPD_OVER_MEMBEROF == SLAPD_MOD_DYNAMIC
2144 init_module( int argc, char *argv[] )
2146 return memberof_initialize();
2148 #endif /* SLAPD_OVER_MEMBEROF == SLAPD_MOD_DYNAMIC */
2150 #endif /* SLAPD_OVER_MEMBEROF */