1 /* memberof.c - back-reference for group membership */
3 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
5 * Copyright 2005-2007 Pierangelo Masarati <ando@sys-net.it>
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted only as authorized by the OpenLDAP
12 * A copy of this license is available in the file LICENSE in the
13 * top-level directory of the distribution or, alternatively, at
14 * <http://www.OpenLDAP.org/license.html>.
17 * This work was initially developed by Pierangelo Masarati for inclusion
18 * in OpenLDAP Software, sponsored by SysNet s.r.l.
23 #ifdef SLAPD_OVER_MEMBEROF
27 #include "ac/string.h"
28 #include "ac/socket.h"
37 * GROUP a group object (an entry with GROUP_OC
39 * MEMBER a member object (an entry whose DN is
40 * listed as MEMBER_AT value of a GROUP)
41 * GROUP_OC the objectClass of the group object
42 * (default: groupOfNames)
43 * MEMBER_AT the membership attribute, DN-valued;
44 * note: nameAndOptionalUID is tolerated
45 * as soon as the optionalUID is absent
47 * MEMBER_OF reverse membership attribute
51 * - if the entry that is being added is a GROUP,
52 * the MEMBER_AT defined as values of the add operation
53 * get the MEMBER_OF value directly from the request.
55 * if configured to do so, the MEMBER objects do not exist,
56 * and no relax control is issued, either:
58 * - drop non-existing members
59 * (by default: don't muck with values)
61 * - if (configured to do so,) the referenced GROUP exists,
62 * the relax control is set and the user has
63 * "manage" privileges, allow to add MEMBER_OF values to
67 * - if the entry being modified is a GROUP_OC and the
68 * MEMBER_AT attribute is modified, the MEMBER_OF value
69 * of the (existing) MEMBER_AT entries that are affected
70 * is modified according to the request:
71 * - if a MEMBER is removed from the group,
72 * delete the corresponding MEMBER_OF
73 * - if a MEMBER is added to a group,
74 * add the corresponding MEMBER_OF
76 * We need to determine, from the database, if it is
77 * a GROUP_OC, and we need to check, from the
78 * modification list, if the MEMBER_AT attribute is being
79 * affected, and what MEMBER_AT values are affected.
81 * if configured to do so, the entries corresponding to
82 * the MEMBER_AT values do not exist, and no relax control
85 * - drop non-existing members
86 * (by default: don't muck with values)
88 * - if configured to do so, the referenced GROUP exists,
89 * (the relax control is set) and the user has
90 * "manage" privileges, allow to add MEMBER_OF values to
91 * generic entries; the change is NOT automatically reflected
92 * in the MEMBER attribute of the GROUP referenced
93 * by the value of MEMBER_OF; a separate modification,
94 * with or without relax control, needs to be performed.
97 * - if the entry being renamed is a GROUP, the MEMBER_OF
98 * value of the (existing) MEMBER objects is modified
99 * accordingly based on the newDN of the GROUP.
101 * We need to determine, from the database, if it is
102 * a GROUP; the list of MEMBER objects is obtained from
105 * Non-existing MEMBER objects are ignored, since the
106 * MEMBER_AT is not being addressed by the operation.
108 * - if the entry being renamed has the MEMBER_OF attribute,
109 * the corresponding MEMBER value must be modified in the
110 * respective group entries.
114 * - if the entry being deleted is a GROUP, the (existing)
115 * MEMBER objects are modified accordingly; a copy of the
116 * values of the MEMBER_AT is saved and, if the delete
117 * succeeds, the MEMBER_OF value of the (existing) MEMBER
118 * objects is deleted.
120 * We need to determine, from the database, if it is
123 * Non-existing MEMBER objects are ignored, since the entry
126 * - if the entry being deleted has the MEMBER_OF attribute,
127 * the corresponding value of the MEMBER_AT must be deleted
128 * from the respective GROUP entries.
131 #define SLAPD_MEMBEROF_ATTR "memberOf"
133 static slap_overinst memberof;
135 typedef struct memberof_t {
137 struct berval mo_ndn;
139 ObjectClass *mo_oc_group;
140 AttributeDescription *mo_ad_member;
141 AttributeDescription *mo_ad_memberof;
143 struct berval mo_groupFilterstr;
144 AttributeAssertion mo_groupAVA;
145 Filter mo_groupFilter;
147 struct berval mo_memberFilterstr;
148 Filter mo_memberFilter;
151 #define MEMBEROF_NONE 0x00U
152 #define MEMBEROF_FDANGLING_DROP 0x01U
153 #define MEMBEROF_FDANGLING_ERROR 0x02U
154 #define MEMBEROF_FDANGLING_MASK (MEMBEROF_FDANGLING_DROP|MEMBEROF_FDANGLING_ERROR)
155 #define MEMBEROF_FREFINT 0x04U
156 #define MEMBEROF_FREVERSE 0x08U
158 ber_int_t mo_dangling_err;
160 #define MEMBEROF_CHK(mo,f) \
161 (((mo)->mo_flags & (f)) == (f))
162 #define MEMBEROF_DANGLING_CHECK(mo) \
163 ((mo)->mo_flags & MEMBEROF_FDANGLING_MASK)
164 #define MEMBEROF_DANGLING_DROP(mo) \
165 MEMBEROF_CHK((mo),MEMBEROF_FDANGLING_DROP)
166 #define MEMBEROF_DANGLING_ERROR(mo) \
167 MEMBEROF_CHK((mo),MEMBEROF_FDANGLING_ERROR)
168 #define MEMBEROF_REFINT(mo) \
169 MEMBEROF_CHK((mo),MEMBEROF_FREFINT)
170 #define MEMBEROF_REVERSE(mo) \
171 MEMBEROF_CHK((mo),MEMBEROF_FREVERSE)
174 typedef enum memberof_is_t {
175 MEMBEROF_IS_NONE = 0x00,
176 MEMBEROF_IS_GROUP = 0x01,
177 MEMBEROF_IS_MEMBER = 0x02,
178 MEMBEROF_IS_BOTH = (MEMBEROF_IS_GROUP|MEMBEROF_IS_MEMBER)
181 typedef struct memberof_cookie_t {
182 AttributeDescription *ad;
187 typedef struct memberof_cbinfo_t {
195 memberof_isGroupOrMember_cb( Operation *op, SlapReply *rs )
197 if ( rs->sr_type == REP_SEARCH ) {
198 memberof_cookie_t *mc;
200 mc = (memberof_cookie_t *)op->o_callback->sc_private;
208 * callback for internal search that saves the member attribute values
209 * of groups being deleted.
212 memberof_saveMember_cb( Operation *op, SlapReply *rs )
214 if ( rs->sr_type == REP_SEARCH ) {
215 memberof_cookie_t *mc;
218 mc = (memberof_cookie_t *)op->o_callback->sc_private;
221 assert( rs->sr_entry != NULL );
222 assert( rs->sr_entry->e_attrs != NULL );
224 a = attr_find( rs->sr_entry->e_attrs, mc->ad );
226 ber_bvarray_dup_x( &mc->vals, a->a_nvals, op->o_tmpmemctx );
229 if ( a && attr_find( a->a_next, mc->ad ) != NULL ) {
230 Debug( LDAP_DEBUG_ANY,
231 "%s: memberof_saveMember_cb(\"%s\"): "
232 "more than one occurrence of \"%s\" "
235 rs->sr_entry->e_name.bv_val,
236 mc->ad->ad_cname.bv_val );
244 * the delete hook performs an internal search that saves the member
245 * attribute values of groups being deleted.
248 memberof_isGroupOrMember( Operation *op, memberof_cbinfo_t *mci )
250 slap_overinst *on = mci->on;
251 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
254 SlapReply rs2 = { REP_RESULT };
255 slap_callback cb = { 0 };
256 BackendInfo *bi = op->o_bd->bd_info;
257 AttributeName an[ 2 ];
259 memberof_is_t iswhat = MEMBEROF_IS_NONE;
260 memberof_cookie_t mc;
262 assert( mci->what != MEMBEROF_IS_NONE );
265 if ( op->o_tag == LDAP_REQ_DELETE ) {
266 cb.sc_response = memberof_saveMember_cb;
269 cb.sc_response = memberof_isGroupOrMember_cb;
272 op2.o_tag = LDAP_REQ_SEARCH;
273 op2.o_callback = &cb;
274 op2.o_dn = op->o_bd->be_rootdn;
275 op2.o_ndn = op->o_bd->be_rootndn;
277 op2.ors_scope = LDAP_SCOPE_BASE;
278 op2.ors_deref = LDAP_DEREF_NEVER;
279 BER_BVZERO( &an[ 1 ].an_name );
281 op2.ors_attrsonly = 0;
282 op2.ors_limit = NULL;
284 op2.ors_tlimit = SLAP_NO_LIMIT;
286 if ( mci->what & MEMBEROF_IS_GROUP ) {
287 mc.ad = mo->mo_ad_member;
290 an[ 0 ].an_desc = mo->mo_ad_member;
291 an[ 0 ].an_name = an[ 0 ].an_desc->ad_cname;
292 op2.ors_filterstr = mo->mo_groupFilterstr;
293 op2.ors_filter = &mo->mo_groupFilter;
295 op2.o_bd->bd_info = (BackendInfo *)on->on_info;
296 (void)op->o_bd->be_search( &op2, &rs2 );
297 op2.o_bd->bd_info = bi;
300 iswhat |= MEMBEROF_IS_GROUP;
301 if ( mc.vals ) mci->member = mc.vals;
306 if ( mci->what & MEMBEROF_IS_MEMBER ) {
307 mc.ad = mo->mo_ad_memberof;
310 an[ 0 ].an_desc = mo->mo_ad_memberof;
311 an[ 0 ].an_name = an[ 0 ].an_desc->ad_cname;
312 op2.ors_filterstr = mo->mo_memberFilterstr;
313 op2.ors_filter = &mo->mo_memberFilter;
315 op2.o_bd->bd_info = (BackendInfo *)on->on_info;
316 (void)op->o_bd->be_search( &op2, &rs2 );
317 op2.o_bd->bd_info = bi;
320 iswhat |= MEMBEROF_IS_MEMBER;
321 if ( mc.vals ) mci->memberof = mc.vals;
332 * response callback that adds memberof values when a group is modified.
335 memberof_value_modify(
339 AttributeDescription *ad,
340 struct berval *old_dn,
341 struct berval *old_ndn,
342 struct berval *new_dn,
343 struct berval *new_ndn )
345 memberof_cbinfo_t *mci = op->o_callback->sc_private;
346 slap_overinst *on = mci->on;
347 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
350 SlapReply rs2 = { REP_RESULT };
351 slap_callback cb = { NULL, slap_null_cb, NULL, NULL };
352 Modifications mod[ 2 ] = { { { 0 } } }, *ml;
353 struct berval values[ 4 ], nvalues[ 4 ];
356 op2.o_tag = LDAP_REQ_MODIFY;
359 op2.o_req_ndn = *ndn;
361 op2.o_callback = &cb;
362 op2.o_dn = op->o_bd->be_rootdn;
363 op2.o_ndn = op->o_bd->be_rootndn;
364 op2.orm_modlist = NULL;
366 if ( !BER_BVISNULL( &mo->mo_ndn ) ) {
369 ml->sml_values = &values[ 0 ];
370 ml->sml_values[ 0 ] = mo->mo_dn;
371 BER_BVZERO( &ml->sml_values[ 1 ] );
372 ml->sml_nvalues = &nvalues[ 0 ];
373 ml->sml_nvalues[ 0 ] = mo->mo_ndn;
374 BER_BVZERO( &ml->sml_nvalues[ 1 ] );
375 ml->sml_desc = slap_schema.si_ad_modifiersName;
376 ml->sml_type = ml->sml_desc->ad_cname;
377 ml->sml_op = LDAP_MOD_REPLACE;
378 ml->sml_flags = SLAP_MOD_INTERNAL;
379 ml->sml_next = op2.orm_modlist;
380 op2.orm_modlist = ml;
387 ml->sml_values = &values[ 2 ];
388 BER_BVZERO( &ml->sml_values[ 1 ] );
389 ml->sml_nvalues = &nvalues[ 2 ];
390 BER_BVZERO( &ml->sml_nvalues[ 1 ] );
392 ml->sml_type = ml->sml_desc->ad_cname;
393 ml->sml_flags = SLAP_MOD_INTERNAL;
394 ml->sml_next = op2.orm_modlist;
395 op2.orm_modlist = ml;
396 op2.orm_no_opattrs = 0;
398 if ( new_ndn != NULL ) {
399 assert( !BER_BVISNULL( new_dn ) );
400 assert( !BER_BVISNULL( new_ndn ) );
403 ml->sml_op = LDAP_MOD_ADD;
405 ml->sml_values[ 0 ] = *new_dn;
406 ml->sml_nvalues[ 0 ] = *new_ndn;
408 (void)op->o_bd->be_modify( &op2, &rs2 );
409 if ( rs2.sr_err != LDAP_SUCCESS ) {
410 char buf[ SLAP_TEXT_BUFLEN ];
411 snprintf( buf, sizeof( buf ),
412 "memberof_value_modify %s=\"%s\" failed err=%d text=%s",
413 ad->ad_cname.bv_val, new_dn->bv_val, rs2.sr_err,
414 rs2.sr_text ? rs2.sr_text : "" );
415 Debug( LDAP_DEBUG_ANY, "%s: %s\n",
416 op->o_log_prefix, buf, 0 );
419 assert( op2.orm_modlist == &mod[ mcnt ] );
420 assert( mcnt == 0 || op2.orm_modlist->sml_next == &mod[ 0 ] );
421 ml = op2.orm_modlist->sml_next;
423 assert( ml == &mod[ 0 ] );
427 slap_mods_free( ml, 1 );
430 mod[ 0 ].sml_next = NULL;
433 if ( old_ndn != NULL ) {
434 assert( !BER_BVISNULL( old_dn ) );
435 assert( !BER_BVISNULL( old_ndn ) );
438 ml->sml_op = LDAP_MOD_DELETE;
440 ml->sml_values[ 0 ] = *old_dn;
441 ml->sml_nvalues[ 0 ] = *old_ndn;
443 (void)op->o_bd->be_modify( &op2, &rs2 );
444 if ( rs2.sr_err != LDAP_SUCCESS ) {
445 char buf[ SLAP_TEXT_BUFLEN ];
446 snprintf( buf, sizeof( buf ),
447 "memberof_value_modify %s=\"%s\" failed err=%d text=%s",
448 ad->ad_cname.bv_val, old_dn->bv_val, rs2.sr_err,
449 rs2.sr_text ? rs2.sr_text : "" );
450 Debug( LDAP_DEBUG_ANY, "%s: %s\n",
451 op->o_log_prefix, buf, 0 );
454 assert( op2.orm_modlist == &mod[ mcnt ] );
455 ml = op2.orm_modlist->sml_next;
457 assert( ml == &mod[ 0 ] );
461 slap_mods_free( ml, 1 );
465 /* FIXME: if old_group_ndn doesn't exist, both delete __and__
466 * add will fail; better split in two operations, although
467 * not optimal in terms of performance. At least it would
468 * move towards self-repairing capabilities. */
474 memberof_cleanup( Operation *op, SlapReply *rs )
476 slap_callback *sc = op->o_callback;
477 memberof_cbinfo_t *mci = sc->sc_private;
479 op->o_callback = sc->sc_next;
481 ber_bvarray_free_x( mci->memberof, op->o_tmpmemctx );
483 ber_bvarray_free_x( mci->member, op->o_tmpmemctx );
484 op->o_tmpfree( sc, op->o_tmpmemctx );
488 static int memberof_res_add( Operation *op, SlapReply *rs );
489 static int memberof_res_delete( Operation *op, SlapReply *rs );
490 static int memberof_res_modify( Operation *op, SlapReply *rs );
491 static int memberof_res_modrdn( Operation *op, SlapReply *rs );
494 memberof_op_add( Operation *op, SlapReply *rs )
496 slap_overinst *on = (slap_overinst *)op->o_bd->bd_info;
497 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
499 Attribute **ap, **map = NULL;
500 int rc = SLAP_CB_CONTINUE;
502 struct berval save_dn, save_ndn;
504 memberof_cbinfo_t *mci;
506 if ( op->ora_e->e_attrs == NULL ) {
507 /* FIXME: global overlay; need to deal with */
508 Debug( LDAP_DEBUG_ANY, "%s: memberof_op_add(\"%s\"): "
509 "consistency checks not implemented when overlay "
510 "is instantiated as global.\n",
511 op->o_log_prefix, op->o_req_dn.bv_val, 0 );
512 return SLAP_CB_CONTINUE;
515 if ( MEMBEROF_REVERSE( mo ) ) {
516 for ( ap = &op->ora_e->e_attrs; *ap; ap = &(*ap)->a_next ) {
519 if ( a->a_desc == mo->mo_ad_memberof ) {
527 save_ndn = op->o_ndn;
529 if ( MEMBEROF_DANGLING_CHECK( mo )
531 && is_entry_objectclass_or_sub( op->ora_e, mo->mo_oc_group ) )
533 op->o_dn = op->o_bd->be_rootdn;
534 op->o_ndn = op->o_bd->be_rootndn;
535 op->o_bd->bd_info = (BackendInfo *)on->on_info;
537 for ( ap = &op->ora_e->e_attrs; *ap; ) {
540 if ( !is_ad_subtype( a->a_desc, mo->mo_ad_member ) ) {
545 assert( a->a_nvals != NULL );
547 for ( i = 0; !BER_BVISNULL( &a->a_nvals[ i ] ); i++ ) {
550 rc = be_entry_get_rw( op, &a->a_nvals[ i ],
552 if ( rc == LDAP_SUCCESS ) {
553 be_entry_release_r( op, e );
557 if ( MEMBEROF_DANGLING_ERROR( mo ) ) {
558 rc = rs->sr_err = mo->mo_dangling_err;
559 rs->sr_text = "adding non-existing object "
561 send_ldap_result( op, rs );
565 if ( MEMBEROF_DANGLING_DROP( mo ) ) {
568 Debug( LDAP_DEBUG_ANY, "%s: memberof_op_add(\"%s\"): "
569 "member=\"%s\" does not exist (stripping...)\n",
570 op->o_log_prefix, op->ora_e->e_name.bv_val,
571 a->a_vals[ i ].bv_val );
573 for ( j = i + 1; !BER_BVISNULL( &a->a_nvals[ j ] ); j++ );
574 ber_memfree( a->a_vals[ i ].bv_val );
575 BER_BVZERO( &a->a_vals[ i ] );
576 if ( a->a_nvals != a->a_vals ) {
577 ber_memfree( a->a_nvals[ i ].bv_val );
578 BER_BVZERO( &a->a_nvals[ i ] );
584 AC_MEMCPY( &a->a_vals[ i ], &a->a_vals[ i + 1 ],
585 sizeof( struct berval ) * ( j - i ) );
586 if ( a->a_nvals != a->a_vals ) {
587 AC_MEMCPY( &a->a_nvals[ i ], &a->a_nvals[ i + 1 ],
588 sizeof( struct berval ) * ( j - i ) );
594 /* If all values have been removed,
595 * remove the attribute itself. */
596 if ( BER_BVISNULL( &a->a_nvals[ 0 ] ) ) {
605 op->o_ndn = save_ndn;
606 op->o_bd->bd_info = (BackendInfo *)on;
611 AccessControlState acl_state = ACL_STATE_INIT;
613 for ( i = 0; !BER_BVISNULL( &a->a_nvals[ i ] ); i++ ) {
616 op->o_bd->bd_info = (BackendInfo *)on->on_info;
617 /* access is checked with the original identity */
618 rc = access_allowed( op, op->ora_e, mo->mo_ad_memberof,
619 &a->a_nvals[ i ], ACL_WADD,
622 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
624 send_ldap_result( op, rs );
627 rc = be_entry_get_rw( op, &a->a_nvals[ i ],
629 op->o_bd->bd_info = (BackendInfo *)on;
630 if ( rc != LDAP_SUCCESS ) {
631 if ( get_relax( op ) ) {
635 if ( MEMBEROF_DANGLING_ERROR( mo ) ) {
636 rc = rs->sr_err = mo->mo_dangling_err;
637 rs->sr_text = "adding non-existing object "
639 send_ldap_result( op, rs );
643 if ( MEMBEROF_DANGLING_DROP( mo ) ) {
646 Debug( LDAP_DEBUG_ANY, "%s: memberof_op_add(\"%s\"): "
647 "memberof=\"%s\" does not exist (stripping...)\n",
648 op->o_log_prefix, op->ora_e->e_name.bv_val,
649 a->a_nvals[ i ].bv_val );
651 for ( j = i + 1; !BER_BVISNULL( &a->a_nvals[ j ] ); j++ );
652 ber_memfree( a->a_vals[ i ].bv_val );
653 BER_BVZERO( &a->a_vals[ i ] );
654 if ( a->a_nvals != a->a_vals ) {
655 ber_memfree( a->a_nvals[ i ].bv_val );
656 BER_BVZERO( &a->a_nvals[ i ] );
662 AC_MEMCPY( &a->a_vals[ i ], &a->a_vals[ i + 1 ],
663 sizeof( struct berval ) * ( j - i ) );
664 if ( a->a_nvals != a->a_vals ) {
665 AC_MEMCPY( &a->a_nvals[ i ], &a->a_nvals[ i + 1 ],
666 sizeof( struct berval ) * ( j - i ) );
674 /* access is checked with the original identity */
675 op->o_bd->bd_info = (BackendInfo *)on->on_info;
676 rc = access_allowed( op, e, mo->mo_ad_member,
677 &op->o_req_ndn, ACL_WADD, NULL );
678 be_entry_release_r( op, e );
679 op->o_bd->bd_info = (BackendInfo *)on;
682 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
683 rs->sr_text = "insufficient access to object referenced by memberof";
684 send_ldap_result( op, rs );
689 if ( BER_BVISNULL( &a->a_nvals[ 0 ] ) ) {
695 rc = SLAP_CB_CONTINUE;
697 sc = op->o_tmpalloc( sizeof(slap_callback)+sizeof(*mci), op->o_tmpmemctx );
698 sc->sc_private = sc+1;
699 sc->sc_response = memberof_res_add;
700 sc->sc_cleanup = memberof_cleanup;
701 mci = sc->sc_private;
704 mci->memberof = NULL;
705 sc->sc_next = op->o_callback;
710 op->o_ndn = save_ndn;
711 op->o_bd->bd_info = (BackendInfo *)on;
717 memberof_op_delete( Operation *op, SlapReply *rs )
719 slap_overinst *on = (slap_overinst *)op->o_bd->bd_info;
720 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
723 memberof_cbinfo_t *mci;
726 sc = op->o_tmpalloc( sizeof(slap_callback)+sizeof(*mci), op->o_tmpmemctx );
727 sc->sc_private = sc+1;
728 sc->sc_response = memberof_res_delete;
729 sc->sc_cleanup = memberof_cleanup;
730 mci = sc->sc_private;
733 mci->memberof = NULL;
734 mci->what = MEMBEROF_IS_GROUP;
735 if ( MEMBEROF_REFINT( mo ) ) {
736 mci->what = MEMBEROF_IS_BOTH;
739 memberof_isGroupOrMember( op, mci );
741 sc->sc_next = op->o_callback;
744 return SLAP_CB_CONTINUE;
748 memberof_op_modify( Operation *op, SlapReply *rs )
750 slap_overinst *on = (slap_overinst *)op->o_bd->bd_info;
751 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
753 Modifications **mlp, **mmlp = NULL;
754 int rc = SLAP_CB_CONTINUE, save_member = 0;
755 struct berval save_dn, save_ndn;
757 memberof_cbinfo_t *mci, mcis;
759 if ( MEMBEROF_REVERSE( mo ) ) {
760 for ( mlp = &op->orm_modlist; *mlp; mlp = &(*mlp)->sml_next ) {
761 Modifications *ml = *mlp;
763 if ( ml->sml_desc == mo->mo_ad_memberof ) {
771 save_ndn = op->o_ndn;
773 mcis.what = MEMBEROF_IS_GROUP;
775 if ( memberof_isGroupOrMember( op, &mcis ) == LDAP_SUCCESS
776 && ( mcis.what & MEMBEROF_IS_GROUP ) )
780 for ( ml = op->orm_modlist; ml; ml = ml->sml_next ) {
781 if ( ml->sml_desc == mo->mo_ad_member ) {
782 switch ( ml->sml_op ) {
783 case LDAP_MOD_DELETE:
784 case LDAP_MOD_REPLACE:
792 if ( MEMBEROF_DANGLING_CHECK( mo )
793 && !get_relax( op ) )
795 op->o_dn = op->o_bd->be_rootdn;
796 op->o_ndn = op->o_bd->be_rootndn;
797 op->o_bd->bd_info = (BackendInfo *)on->on_info;
799 assert( op->orm_modlist != NULL );
801 for ( mlp = &op->orm_modlist; *mlp; ) {
802 Modifications *ml = *mlp;
805 if ( !is_ad_subtype( ml->sml_desc, mo->mo_ad_member ) ) {
810 switch ( ml->sml_op ) {
811 case LDAP_MOD_DELETE:
812 /* we don't care about cancellations: if the value
813 * exists, fine; if it doesn't, we let the underlying
814 * database fail as appropriate; */
818 case LDAP_MOD_REPLACE:
819 /* Handle this just like a delete (see above) */
820 if ( !ml->sml_values ) {
826 /* NOTE: right now, the attributeType we use
827 * for member must have a normalized value */
828 assert( ml->sml_nvalues != NULL );
830 for ( i = 0; !BER_BVISNULL( &ml->sml_nvalues[ i ] ); i++ ) {
834 if ( be_entry_get_rw( op, &ml->sml_nvalues[ i ],
835 NULL, NULL, 0, &e ) == LDAP_SUCCESS )
837 be_entry_release_r( op, e );
841 if ( MEMBEROF_DANGLING_ERROR( mo ) ) {
842 rc = rs->sr_err = mo->mo_dangling_err;
843 rs->sr_text = "adding non-existing object "
845 send_ldap_result( op, rs );
849 if ( MEMBEROF_DANGLING_DROP( mo ) ) {
852 Debug( LDAP_DEBUG_ANY, "%s: memberof_op_modify(\"%s\"): "
853 "member=\"%s\" does not exist (stripping...)\n",
854 op->o_log_prefix, op->o_req_dn.bv_val,
855 ml->sml_nvalues[ i ].bv_val );
857 for ( j = i + 1; !BER_BVISNULL( &ml->sml_nvalues[ j ] ); j++ );
858 ber_memfree( ml->sml_values[ i ].bv_val );
859 BER_BVZERO( &ml->sml_values[ i ] );
860 ber_memfree( ml->sml_nvalues[ i ].bv_val );
861 BER_BVZERO( &ml->sml_nvalues[ i ] );
867 AC_MEMCPY( &ml->sml_values[ i ], &ml->sml_values[ i + 1 ],
868 sizeof( struct berval ) * ( j - i ) );
869 AC_MEMCPY( &ml->sml_nvalues[ i ], &ml->sml_nvalues[ i + 1 ],
870 sizeof( struct berval ) * ( j - i ) );
875 if ( BER_BVISNULL( &ml->sml_nvalues[ 0 ] ) ) {
877 slap_mod_free( &ml->sml_mod, 0 );
893 if ( mmlp != NULL ) {
894 Modifications *ml = *mmlp;
898 op->o_bd->bd_info = (BackendInfo *)on->on_info;
899 rc = be_entry_get_rw( op, &op->o_req_ndn,
900 NULL, NULL, 0, &target );
901 op->o_bd->bd_info = (BackendInfo *)on;
902 if ( rc != LDAP_SUCCESS ) {
903 rc = rs->sr_err = LDAP_NO_SUCH_OBJECT;
904 send_ldap_result( op, rs );
908 switch ( ml->sml_op ) {
909 case LDAP_MOD_DELETE:
910 if ( ml->sml_nvalues != NULL ) {
911 AccessControlState acl_state = ACL_STATE_INIT;
913 for ( i = 0; !BER_BVISNULL( &ml->sml_nvalues[ i ] ); i++ ) {
916 op->o_bd->bd_info = (BackendInfo *)on->on_info;
917 /* access is checked with the original identity */
918 rc = access_allowed( op, target,
920 &ml->sml_nvalues[ i ],
924 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
926 send_ldap_result( op, rs );
930 rc = be_entry_get_rw( op, &ml->sml_nvalues[ i ],
932 op->o_bd->bd_info = (BackendInfo *)on;
933 if ( rc != LDAP_SUCCESS ) {
934 if ( get_relax( op ) ) {
938 if ( MEMBEROF_DANGLING_ERROR( mo ) ) {
939 rc = rs->sr_err = mo->mo_dangling_err;
940 rs->sr_text = "deleting non-existing object "
942 send_ldap_result( op, rs );
946 if ( MEMBEROF_DANGLING_DROP( mo ) ) {
949 Debug( LDAP_DEBUG_ANY, "%s: memberof_op_modify(\"%s\"): "
950 "memberof=\"%s\" does not exist (stripping...)\n",
951 op->o_log_prefix, op->o_req_ndn.bv_val,
952 ml->sml_nvalues[ i ].bv_val );
954 for ( j = i + 1; !BER_BVISNULL( &ml->sml_nvalues[ j ] ); j++ );
955 ber_memfree( ml->sml_values[ i ].bv_val );
956 BER_BVZERO( &ml->sml_values[ i ] );
957 if ( ml->sml_nvalues != ml->sml_values ) {
958 ber_memfree( ml->sml_nvalues[ i ].bv_val );
959 BER_BVZERO( &ml->sml_nvalues[ i ] );
966 AC_MEMCPY( &ml->sml_values[ i ], &ml->sml_values[ i + 1 ],
967 sizeof( struct berval ) * ( j - i ) );
968 if ( ml->sml_nvalues != ml->sml_values ) {
969 AC_MEMCPY( &ml->sml_nvalues[ i ], &ml->sml_nvalues[ i + 1 ],
970 sizeof( struct berval ) * ( j - i ) );
978 /* access is checked with the original identity */
979 op->o_bd->bd_info = (BackendInfo *)on->on_info;
980 rc = access_allowed( op, e, mo->mo_ad_member,
983 be_entry_release_r( op, e );
984 op->o_bd->bd_info = (BackendInfo *)on;
987 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
988 rs->sr_text = "insufficient access to object referenced by memberof";
989 send_ldap_result( op, rs );
994 if ( BER_BVISNULL( &ml->sml_nvalues[ 0 ] ) ) {
995 *mmlp = ml->sml_next;
996 slap_mod_free( &ml->sml_mod, 0 );
1004 case LDAP_MOD_REPLACE:
1006 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1007 /* access is checked with the original identity */
1008 rc = access_allowed( op, target,
1012 op->o_bd->bd_info = (BackendInfo *)on;
1014 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
1016 send_ldap_result( op, rs );
1020 if ( ml->sml_op == LDAP_MOD_DELETE || !ml->sml_values ) {
1025 case LDAP_MOD_ADD: {
1026 AccessControlState acl_state = ACL_STATE_INIT;
1028 for ( i = 0; !BER_BVISNULL( &ml->sml_nvalues[ i ] ); i++ ) {
1031 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1032 /* access is checked with the original identity */
1033 rc = access_allowed( op, target,
1035 &ml->sml_nvalues[ i ],
1039 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
1041 send_ldap_result( op, rs );
1045 rc = be_entry_get_rw( op, &ml->sml_nvalues[ i ],
1046 NULL, NULL, 0, &e );
1047 op->o_bd->bd_info = (BackendInfo *)on;
1048 if ( rc != LDAP_SUCCESS ) {
1049 if ( MEMBEROF_DANGLING_ERROR( mo ) ) {
1050 rc = rs->sr_err = mo->mo_dangling_err;
1051 rs->sr_text = "adding non-existing object "
1053 send_ldap_result( op, rs );
1057 if ( MEMBEROF_DANGLING_DROP( mo ) ) {
1060 Debug( LDAP_DEBUG_ANY, "%s: memberof_op_modify(\"%s\"): "
1061 "memberof=\"%s\" does not exist (stripping...)\n",
1062 op->o_log_prefix, op->o_req_ndn.bv_val,
1063 ml->sml_nvalues[ i ].bv_val );
1065 for ( j = i + 1; !BER_BVISNULL( &ml->sml_nvalues[ j ] ); j++ );
1066 ber_memfree( ml->sml_values[ i ].bv_val );
1067 BER_BVZERO( &ml->sml_values[ i ] );
1068 if ( ml->sml_nvalues != ml->sml_values ) {
1069 ber_memfree( ml->sml_nvalues[ i ].bv_val );
1070 BER_BVZERO( &ml->sml_nvalues[ i ] );
1077 AC_MEMCPY( &ml->sml_values[ i ], &ml->sml_values[ i + 1 ],
1078 sizeof( struct berval ) * ( j - i ) );
1079 if ( ml->sml_nvalues != ml->sml_values ) {
1080 AC_MEMCPY( &ml->sml_nvalues[ i ], &ml->sml_nvalues[ i + 1 ],
1081 sizeof( struct berval ) * ( j - i ) );
1089 /* access is checked with the original identity */
1090 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1091 rc = access_allowed( op, e, mo->mo_ad_member,
1094 be_entry_release_r( op, e );
1095 op->o_bd->bd_info = (BackendInfo *)on;
1098 rc = rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
1099 rs->sr_text = "insufficient access to object referenced by memberof";
1100 send_ldap_result( op, rs );
1105 if ( BER_BVISNULL( &ml->sml_nvalues[ 0 ] ) ) {
1106 *mmlp = ml->sml_next;
1107 slap_mod_free( &ml->sml_mod, 0 );
1118 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1119 be_entry_release_r( op, target );
1120 op->o_bd->bd_info = (BackendInfo *)on;
1123 sc = op->o_tmpalloc( sizeof(slap_callback)+sizeof(*mci), op->o_tmpmemctx );
1124 sc->sc_private = sc+1;
1125 sc->sc_response = memberof_res_modify;
1126 sc->sc_cleanup = memberof_cleanup;
1127 mci = sc->sc_private;
1130 mci->memberof = NULL;
1131 mci->what = mcis.what;
1133 if ( save_member ) {
1134 op->o_dn = op->o_bd->be_rootdn;
1135 op->o_ndn = op->o_bd->be_rootndn;
1136 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1137 rc = backend_attribute( op, NULL, &op->o_req_ndn,
1138 mo->mo_ad_member, &mci->member, ACL_READ );
1139 op->o_bd->bd_info = (BackendInfo *)on;
1142 sc->sc_next = op->o_callback;
1143 op->o_callback = sc;
1145 rc = SLAP_CB_CONTINUE;
1149 op->o_ndn = save_ndn;
1150 op->o_bd->bd_info = (BackendInfo *)on;
1156 memberof_op_modrdn( Operation *op, SlapReply *rs )
1158 slap_overinst *on = (slap_overinst *)op->o_bd->bd_info;
1160 memberof_cbinfo_t *mci;
1162 sc = op->o_tmpalloc( sizeof(slap_callback)+sizeof(*mci), op->o_tmpmemctx );
1163 sc->sc_private = sc+1;
1164 sc->sc_response = memberof_res_modrdn;
1165 sc->sc_cleanup = memberof_cleanup;
1166 mci = sc->sc_private;
1169 mci->memberof = NULL;
1171 sc->sc_next = op->o_callback;
1172 op->o_callback = sc;
1174 return SLAP_CB_CONTINUE;
1178 * response callback that adds memberof values when a group is added.
1181 memberof_res_add( Operation *op, SlapReply *rs )
1183 memberof_cbinfo_t *mci = op->o_callback->sc_private;
1184 slap_overinst *on = mci->on;
1185 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
1189 if ( rs->sr_err != LDAP_SUCCESS ) {
1190 return SLAP_CB_CONTINUE;
1193 if ( MEMBEROF_REVERSE( mo ) ) {
1196 ma = attr_find( op->ora_e->e_attrs, mo->mo_ad_memberof );
1198 char relax = op->o_relax;
1200 /* relax is required to allow to add
1201 * a non-existing member */
1202 op->o_relax = SLAP_CONTROL_CRITICAL;
1204 for ( i = 0; !BER_BVISNULL( &ma->a_nvals[ i ] ); i++ ) {
1206 /* the modification is attempted
1207 * with the original identity */
1208 (void)memberof_value_modify( op, rs,
1209 &ma->a_nvals[ i ], mo->mo_ad_member,
1210 NULL, NULL, &op->o_req_dn, &op->o_req_ndn );
1215 if ( is_entry_objectclass_or_sub( op->ora_e, mo->mo_oc_group ) ) {
1218 for ( a = attrs_find( op->ora_e->e_attrs, mo->mo_ad_member );
1220 a = attrs_find( a->a_next, mo->mo_ad_member ) )
1222 for ( i = 0; !BER_BVISNULL( &a->a_nvals[ i ] ); i++ ) {
1223 (void)memberof_value_modify( op, rs,
1233 return SLAP_CB_CONTINUE;
1237 * response callback that deletes memberof values when a group is deleted.
1240 memberof_res_delete( Operation *op, SlapReply *rs )
1242 memberof_cbinfo_t *mci = op->o_callback->sc_private;
1243 slap_overinst *on = mci->on;
1244 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
1249 if ( rs->sr_err != LDAP_SUCCESS ) {
1250 return SLAP_CB_CONTINUE;
1254 if ( vals != NULL ) {
1255 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1256 (void)memberof_value_modify( op, rs,
1257 &vals[ i ], mo->mo_ad_memberof,
1258 &op->o_req_dn, &op->o_req_ndn,
1263 if ( MEMBEROF_REFINT( mo ) ) {
1264 vals = mci->memberof;
1265 if ( vals != NULL ) {
1266 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1267 (void)memberof_value_modify( op, rs,
1268 &vals[ i ], mo->mo_ad_member,
1269 &op->o_req_dn, &op->o_req_ndn,
1275 return SLAP_CB_CONTINUE;
1279 * response callback that adds/deletes memberof values when a group
1283 memberof_res_modify( Operation *op, SlapReply *rs )
1285 memberof_cbinfo_t *mci = op->o_callback->sc_private;
1286 slap_overinst *on = mci->on;
1287 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
1290 Modifications *ml, *mml = NULL;
1293 if ( rs->sr_err != LDAP_SUCCESS ) {
1294 return SLAP_CB_CONTINUE;
1297 if ( MEMBEROF_REVERSE( mo ) ) {
1298 for ( ml = op->orm_modlist; ml; ml = ml->sml_next ) {
1299 if ( ml->sml_desc == mo->mo_ad_memberof ) {
1306 if ( mml != NULL ) {
1307 BerVarray vals = mml->sml_nvalues;
1309 switch ( mml->sml_op ) {
1310 case LDAP_MOD_DELETE:
1311 if ( vals != NULL ) {
1312 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1313 memberof_value_modify( op, rs,
1314 &vals[ i ], mo->mo_ad_member,
1315 &op->o_req_dn, &op->o_req_ndn,
1322 case LDAP_MOD_REPLACE:
1323 /* delete all ... */
1324 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1325 rc = backend_attribute( op, NULL, &op->o_req_ndn,
1326 mo->mo_ad_memberof, &vals, ACL_READ );
1327 op->o_bd->bd_info = (BackendInfo *)on;
1328 if ( rc == LDAP_SUCCESS ) {
1329 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1330 (void)memberof_value_modify( op, rs,
1331 &vals[ i ], mo->mo_ad_member,
1332 &op->o_req_dn, &op->o_req_ndn,
1335 ber_bvarray_free_x( vals, op->o_tmpmemctx );
1338 if ( ml->sml_op == LDAP_MOD_DELETE || !mml->sml_values ) {
1344 assert( vals != NULL );
1346 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1347 memberof_value_modify( op, rs,
1348 &vals[ i ], mo->mo_ad_member,
1350 &op->o_req_dn, &op->o_req_ndn );
1359 if ( mci->what & MEMBEROF_IS_GROUP )
1361 for ( ml = op->orm_modlist; ml; ml = ml->sml_next ) {
1362 if ( ml->sml_desc != mo->mo_ad_member ) {
1366 switch ( ml->sml_op ) {
1367 case LDAP_MOD_DELETE:
1368 vals = ml->sml_nvalues;
1369 if ( vals != NULL ) {
1370 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1371 memberof_value_modify( op, rs,
1372 &vals[ i ], mo->mo_ad_memberof,
1373 &op->o_req_dn, &op->o_req_ndn,
1380 case LDAP_MOD_REPLACE:
1383 /* delete all ... */
1384 if ( vals != NULL ) {
1385 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1386 (void)memberof_value_modify( op, rs,
1387 &vals[ i ], mo->mo_ad_memberof,
1388 &op->o_req_dn, &op->o_req_ndn,
1393 if ( ml->sml_op == LDAP_MOD_DELETE || !ml->sml_values ) {
1399 assert( ml->sml_nvalues != NULL );
1400 vals = ml->sml_nvalues;
1401 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1402 memberof_value_modify( op, rs,
1403 &vals[ i ], mo->mo_ad_memberof,
1405 &op->o_req_dn, &op->o_req_ndn );
1415 return SLAP_CB_CONTINUE;
1419 * response callback that adds/deletes member values when a group member
1423 memberof_res_modrdn( Operation *op, SlapReply *rs )
1425 memberof_cbinfo_t *mci = op->o_callback->sc_private;
1426 slap_overinst *on = mci->on;
1427 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
1429 struct berval newPDN, newDN = BER_BVNULL, newPNDN, newNDN;
1433 struct berval save_dn, save_ndn;
1435 if ( rs->sr_err != LDAP_SUCCESS ) {
1436 return SLAP_CB_CONTINUE;
1439 mci->what = MEMBEROF_IS_GROUP;
1440 if ( MEMBEROF_REFINT( mo ) ) {
1441 mci->what |= MEMBEROF_IS_MEMBER;
1444 if ( op->orr_nnewSup ) {
1445 newPNDN = *op->orr_nnewSup;
1448 dnParent( &op->o_req_ndn, &newPNDN );
1451 build_new_dn( &newNDN, &newPNDN, &op->orr_nnewrdn, op->o_tmpmemctx );
1453 save_dn = op->o_req_dn;
1454 save_ndn = op->o_req_ndn;
1456 op->o_req_dn = newNDN;
1457 op->o_req_ndn = newNDN;
1458 rc = memberof_isGroupOrMember( op, mci );
1459 op->o_req_dn = save_dn;
1460 op->o_req_ndn = save_ndn;
1462 if ( rc != LDAP_SUCCESS || mci->what == MEMBEROF_IS_NONE ) {
1466 if ( op->orr_newSup ) {
1467 newPDN = *op->orr_newSup;
1470 dnParent( &op->o_req_dn, &newPDN );
1473 build_new_dn( &newDN, &newPDN, &op->orr_newrdn, op->o_tmpmemctx );
1475 if ( mci->what & MEMBEROF_IS_GROUP ) {
1476 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1477 rc = backend_attribute( op, NULL, &newNDN,
1478 mo->mo_ad_member, &vals, ACL_READ );
1479 op->o_bd->bd_info = (BackendInfo *)on;
1481 if ( rc == LDAP_SUCCESS ) {
1482 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1483 (void)memberof_value_modify( op, rs,
1484 &vals[ i ], mo->mo_ad_memberof,
1485 &op->o_req_dn, &op->o_req_ndn,
1488 ber_bvarray_free_x( vals, op->o_tmpmemctx );
1492 if ( MEMBEROF_REFINT( mo ) && ( mci->what & MEMBEROF_IS_MEMBER ) ) {
1493 op->o_bd->bd_info = (BackendInfo *)on->on_info;
1494 rc = backend_attribute( op, NULL, &newNDN,
1495 mo->mo_ad_memberof, &vals, ACL_READ );
1496 op->o_bd->bd_info = (BackendInfo *)on;
1498 if ( rc == LDAP_SUCCESS ) {
1499 for ( i = 0; !BER_BVISNULL( &vals[ i ] ); i++ ) {
1500 (void)memberof_value_modify( op, rs,
1501 &vals[ i ], mo->mo_ad_member,
1502 &op->o_req_dn, &op->o_req_ndn,
1505 ber_bvarray_free_x( vals, op->o_tmpmemctx );
1510 if ( !BER_BVISNULL( &newDN ) ) {
1511 op->o_tmpfree( newDN.bv_val, op->o_tmpmemctx );
1513 op->o_tmpfree( newNDN.bv_val, op->o_tmpmemctx );
1515 return SLAP_CB_CONTINUE;
1524 slap_overinst *on = (slap_overinst *)be->bd_info;
1527 mo = (memberof_t *)ch_calloc( 1, sizeof( memberof_t ) );
1530 mo->mo_dangling_err = LDAP_CONSTRAINT_VIOLATION;
1532 on->on_bi.bi_private = (void *)mo;
1553 static ConfigDriver mo_cf_gen;
1555 #define OID "1.3.6.1.4.1.7136.2.666.4"
1556 #define OIDAT OID ".1.1"
1557 #define OIDCFGAT OID ".1.2"
1558 #define OIDOC OID ".2.1"
1559 #define OIDCFGOC OID ".2.2"
1562 static ConfigTable mo_cfg[] = {
1563 { "memberof-dn", "modifiersName",
1564 2, 2, 0, ARG_MAGIC|ARG_DN|MO_DN, mo_cf_gen,
1565 "( OLcfgOvAt:18.0 NAME 'olcMemberOfDN' "
1566 "DESC 'DN to be used as modifiersName' "
1567 "SYNTAX OMsDN SINGLE-VALUE )",
1570 { "memberof-dangling", "ignore|drop|error",
1571 2, 2, 0, ARG_MAGIC|MO_DANGLING, mo_cf_gen,
1572 "( OLcfgOvAt:18.1 NAME 'olcMemberOfDangling' "
1573 "DESC 'Behavior with respect to dangling members, "
1574 "constrained to ignore, drop, error' "
1575 "SYNTAX OMsDirectoryString SINGLE-VALUE )",
1578 { "memberof-refint", "true|FALSE",
1579 2, 2, 0, ARG_MAGIC|ARG_ON_OFF|MO_REFINT, mo_cf_gen,
1580 "( OLcfgOvAt:18.2 NAME 'olcMemberOfRefInt' "
1581 "DESC 'Take care of referential integrity' "
1582 "SYNTAX OMsBoolean SINGLE-VALUE )",
1585 { "memberof-group-oc", "objectClass",
1586 2, 2, 0, ARG_MAGIC|MO_GROUP_OC, mo_cf_gen,
1587 "( OLcfgOvAt:18.3 NAME 'olcMemberOfGroupOC' "
1588 "DESC 'Group objectClass' "
1589 "SYNTAX OMsDirectoryString SINGLE-VALUE )",
1592 { "memberof-member-ad", "member attribute",
1593 2, 2, 0, ARG_MAGIC|MO_MEMBER_AD, mo_cf_gen,
1594 "( OLcfgOvAt:18.4 NAME 'olcMemberOfMemberAD' "
1595 "DESC 'member attribute' "
1596 "SYNTAX OMsDirectoryString SINGLE-VALUE )",
1599 { "memberof-memberof-ad", "memberOf attribute",
1600 2, 2, 0, ARG_MAGIC|MO_MEMBER_OF_AD, mo_cf_gen,
1601 "( OLcfgOvAt:18.5 NAME 'olcMemberOfMemberOfAD' "
1602 "DESC 'memberOf attribute' "
1603 "SYNTAX OMsDirectoryString SINGLE-VALUE )",
1607 { "memberof-reverse", "true|FALSE",
1608 2, 2, 0, ARG_MAGIC|ARG_ON_OFF|MO_REVERSE, mo_cf_gen,
1609 "( OLcfgOvAt:18.6 NAME 'olcMemberOfReverse' "
1610 "DESC 'Take care of referential integrity "
1611 "also when directly modifying memberOf' "
1612 "SYNTAX OMsBoolean SINGLE-VALUE )",
1616 { "memberof-dangling-error", "error code",
1617 2, 2, 0, ARG_MAGIC|MO_DANGLING_ERROR, mo_cf_gen,
1618 "( OLcfgOvAt:18.7 NAME 'olcMemberOfDanglingError' "
1619 "DESC 'Error code returned in case of dangling back reference' "
1620 "SYNTAX OMsDirectoryString SINGLE-VALUE )",
1623 { NULL, NULL, 0, 0, 0, ARG_IGNORED }
1626 static ConfigOCs mo_ocs[] = {
1627 { "( OLcfgOvOc:18.1 "
1628 "NAME 'olcMemberOf' "
1629 "DESC 'Member-of configuration' "
1630 "SUP olcOverlayConfig "
1633 "$ olcMemberOfDangling "
1634 "$ olcMemberOfDanglingError"
1635 "$ olcMemberOfRefInt "
1636 "$ olcMemberOfGroupOC "
1637 "$ olcMemberOfMemberAD "
1638 "$ olcMemberOfMemberOfAD "
1640 "$ olcMemberOfReverse "
1644 Cft_Overlay, mo_cfg, NULL, NULL },
1648 static slap_verbmasks dangling_mode[] = {
1649 { BER_BVC( "ignore" ), MEMBEROF_NONE },
1650 { BER_BVC( "drop" ), MEMBEROF_FDANGLING_DROP },
1651 { BER_BVC( "error" ), MEMBEROF_FDANGLING_ERROR },
1656 memberof_make_group_filter( memberof_t *mo )
1660 if ( !BER_BVISNULL( &mo->mo_groupFilterstr ) ) {
1661 ch_free( mo->mo_groupFilterstr.bv_val );
1664 mo->mo_groupFilter.f_choice = LDAP_FILTER_EQUALITY;
1665 mo->mo_groupFilter.f_ava = &mo->mo_groupAVA;
1667 mo->mo_groupFilter.f_av_desc = slap_schema.si_ad_objectClass;
1668 mo->mo_groupFilter.f_av_value = mo->mo_oc_group->soc_cname;
1670 mo->mo_groupFilterstr.bv_len = STRLENOF( "(=)" )
1671 + slap_schema.si_ad_objectClass->ad_cname.bv_len
1672 + mo->mo_oc_group->soc_cname.bv_len;
1673 ptr = mo->mo_groupFilterstr.bv_val = ch_malloc( mo->mo_groupFilterstr.bv_len + 1 );
1675 ptr = lutil_strcopy( ptr, slap_schema.si_ad_objectClass->ad_cname.bv_val );
1677 ptr = lutil_strcopy( ptr, mo->mo_oc_group->soc_cname.bv_val );
1685 memberof_make_member_filter( memberof_t *mo )
1689 if ( !BER_BVISNULL( &mo->mo_memberFilterstr ) ) {
1690 ch_free( mo->mo_memberFilterstr.bv_val );
1693 mo->mo_memberFilter.f_choice = LDAP_FILTER_PRESENT;
1694 mo->mo_memberFilter.f_desc = mo->mo_ad_memberof;
1696 mo->mo_memberFilterstr.bv_len = STRLENOF( "(=*)" )
1697 + mo->mo_ad_memberof->ad_cname.bv_len;
1698 ptr = mo->mo_memberFilterstr.bv_val = ch_malloc( mo->mo_memberFilterstr.bv_len + 1 );
1700 ptr = lutil_strcopy( ptr, mo->mo_ad_memberof->ad_cname.bv_val );
1701 ptr = lutil_strcopy( ptr, "=*)" );
1707 mo_cf_gen( ConfigArgs *c )
1709 slap_overinst *on = (slap_overinst *)c->bi;
1710 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
1714 if ( c->op == SLAP_CONFIG_EMIT ) {
1715 struct berval bv = BER_BVNULL;
1719 if ( mo->mo_dn.bv_val != NULL) {
1720 value_add_one( &c->rvalue_vals, &mo->mo_dn );
1721 value_add_one( &c->rvalue_nvals, &mo->mo_ndn );
1726 enum_to_verb( dangling_mode, (mo->mo_flags & MEMBEROF_FDANGLING_MASK), &bv );
1727 if ( BER_BVISNULL( &bv ) ) {
1728 /* there's something wrong... */
1733 value_add_one( &c->rvalue_vals, &bv );
1737 case MO_DANGLING_ERROR:
1738 if ( mo->mo_flags & MEMBEROF_FDANGLING_ERROR ) {
1739 char buf[ SLAP_TEXT_BUFLEN ];
1740 enum_to_verb( slap_ldap_response_code, mo->mo_dangling_err, &bv );
1741 if ( BER_BVISNULL( &bv ) ) {
1742 bv.bv_len = snprintf( buf, sizeof( buf ), "0x%x", mo->mo_dangling_err );
1743 if ( bv.bv_len < sizeof( buf ) ) {
1750 value_add_one( &c->rvalue_vals, &bv );
1757 c->value_int = MEMBEROF_REFINT( mo );
1762 c->value_int = MEMBEROF_REVERSE( mo );
1767 if ( mo->mo_oc_group != NULL ){
1768 value_add_one( &c->rvalue_vals, &mo->mo_oc_group->soc_cname );
1773 if ( mo->mo_ad_member != NULL ){
1774 value_add_one( &c->rvalue_vals, &mo->mo_ad_member->ad_cname );
1778 case MO_MEMBER_OF_AD:
1779 if ( mo->mo_ad_memberof != NULL ){
1780 value_add_one( &c->rvalue_vals, &mo->mo_ad_memberof->ad_cname );
1791 } else if ( c->op == LDAP_MOD_DELETE ) {
1792 return 1; /* FIXME */
1797 if ( !BER_BVISNULL( &mo->mo_dn ) ) {
1798 ber_memfree( mo->mo_dn.bv_val );
1799 ber_memfree( mo->mo_ndn.bv_val );
1801 mo->mo_dn = c->value_dn;
1802 mo->mo_ndn = c->value_ndn;
1806 i = verb_to_mask( c->argv[ 1 ], dangling_mode );
1807 if ( BER_BVISNULL( &dangling_mode[ i ].word ) ) {
1811 mo->mo_flags &= ~MEMBEROF_FDANGLING_MASK;
1812 mo->mo_flags |= dangling_mode[ i ].mask;
1815 case MO_DANGLING_ERROR:
1816 i = verb_to_mask( c->argv[ 1 ], slap_ldap_response_code );
1817 if ( !BER_BVISNULL( &slap_ldap_response_code[ i ].word ) ) {
1818 mo->mo_dangling_err = slap_ldap_response_code[ i ].mask;
1819 } else if ( lutil_atoix( &mo->mo_dangling_err, c->argv[ 1 ], 0 ) ) {
1825 if ( c->value_int ) {
1826 mo->mo_flags |= MEMBEROF_FREFINT;
1829 mo->mo_flags &= ~MEMBEROF_FREFINT;
1835 if ( c->value_int ) {
1836 mo->mo_flags |= MEMBEROF_FREVERSE;
1839 mo->mo_flags &= ~MEMBEROF_FREVERSE;
1845 ObjectClass *oc = NULL;
1847 oc = oc_find( c->argv[ 1 ] );
1849 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1850 "unable to find group objectClass=\"%s\"",
1852 Debug( LDAP_DEBUG_CONFIG, "%s: %s.\n",
1853 c->log, c->cr_msg, 0 );
1857 mo->mo_oc_group = oc;
1858 memberof_make_group_filter( mo );
1861 case MO_MEMBER_AD: {
1862 AttributeDescription *ad = NULL;
1863 const char *text = NULL;
1866 rc = slap_str2ad( c->argv[ 1 ], &ad, &text );
1867 if ( rc != LDAP_SUCCESS ) {
1868 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1869 "unable to find member attribute=\"%s\": %s (%d)",
1870 c->argv[ 1 ], text, rc );
1871 Debug( LDAP_DEBUG_CONFIG, "%s: %s.\n",
1872 c->log, c->cr_msg, 0 );
1876 if ( !is_at_syntax( ad->ad_type, SLAPD_DN_SYNTAX ) /* e.g. "member" */
1877 && !is_at_syntax( ad->ad_type, SLAPD_NAMEUID_SYNTAX ) ) /* e.g. "uniqueMember" */
1879 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1880 "member attribute=\"%s\" must either "
1881 "have DN (%s) or nameUID (%s) syntax",
1882 c->argv[ 1 ], SLAPD_DN_SYNTAX, SLAPD_NAMEUID_SYNTAX );
1883 Debug( LDAP_DEBUG_CONFIG, "%s: %s.\n",
1884 c->log, c->cr_msg, 0 );
1888 mo->mo_ad_member = ad;
1891 case MO_MEMBER_OF_AD: {
1892 AttributeDescription *ad = NULL;
1893 const char *text = NULL;
1896 rc = slap_str2ad( c->argv[ 1 ], &ad, &text );
1897 if ( rc != LDAP_SUCCESS ) {
1898 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1899 "unable to find memberof attribute=\"%s\": %s (%d)",
1900 c->argv[ 1 ], text, rc );
1901 Debug( LDAP_DEBUG_CONFIG, "%s: %s.\n",
1902 c->log, c->cr_msg, 0 );
1906 if ( !is_at_syntax( ad->ad_type, SLAPD_DN_SYNTAX ) /* e.g. "member" */
1907 && !is_at_syntax( ad->ad_type, SLAPD_NAMEUID_SYNTAX ) ) /* e.g. "uniqueMember" */
1909 snprintf( c->cr_msg, sizeof( c->cr_msg ),
1910 "memberof attribute=\"%s\" must either "
1911 "have DN (%s) or nameUID (%s) syntax",
1912 c->argv[ 1 ], SLAPD_DN_SYNTAX, SLAPD_NAMEUID_SYNTAX );
1913 Debug( LDAP_DEBUG_CONFIG, "%s: %s.\n",
1914 c->log, c->cr_msg, 0 );
1918 mo->mo_ad_memberof = ad;
1919 memberof_make_member_filter( mo );
1936 slap_overinst *on = (slap_overinst *)be->bd_info;
1937 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
1940 const char *text = NULL;
1942 if( ! mo->mo_ad_memberof ){
1943 rc = slap_str2ad( SLAPD_MEMBEROF_ATTR, &mo->mo_ad_memberof, &text );
1944 if ( rc != LDAP_SUCCESS ) {
1945 Debug( LDAP_DEBUG_ANY, "memberof_db_open: "
1946 "unable to find attribute=\"%s\": %s (%d)\n",
1947 SLAPD_MEMBEROF_ATTR, text, rc );
1952 if( ! mo->mo_ad_member ){
1953 rc = slap_str2ad( SLAPD_GROUP_ATTR, &mo->mo_ad_member, &text );
1954 if ( rc != LDAP_SUCCESS ) {
1955 Debug( LDAP_DEBUG_ANY, "memberof_db_open: "
1956 "unable to find attribute=\"%s\": %s (%d)\n",
1957 SLAPD_GROUP_ATTR, text, rc );
1962 if( ! mo->mo_oc_group ){
1963 mo->mo_oc_group = oc_find( SLAPD_GROUP_CLASS );
1964 if ( mo->mo_oc_group == NULL ) {
1965 Debug( LDAP_DEBUG_ANY,
1966 "memberof_db_open: "
1967 "unable to find objectClass=\"%s\"\n",
1968 SLAPD_GROUP_CLASS, 0, 0 );
1973 if ( BER_BVISNULL( &mo->mo_dn ) && !BER_BVISNULL( &be->be_rootdn ) ) {
1974 ber_dupbv( &mo->mo_dn, &be->be_rootdn );
1975 ber_dupbv( &mo->mo_ndn, &be->be_rootndn );
1978 if ( BER_BVISNULL( &mo->mo_groupFilterstr ) ) {
1979 memberof_make_group_filter( mo );
1982 if ( BER_BVISNULL( &mo->mo_memberFilterstr ) ) {
1983 memberof_make_member_filter( mo );
1990 memberof_db_destroy(
1994 slap_overinst *on = (slap_overinst *)be->bd_info;
1995 memberof_t *mo = (memberof_t *)on->on_bi.bi_private;
1998 if ( !BER_BVISNULL( &mo->mo_dn ) ) {
1999 ber_memfree( mo->mo_dn.bv_val );
2000 ber_memfree( mo->mo_ndn.bv_val );
2003 if ( !BER_BVISNULL( &mo->mo_groupFilterstr ) ) {
2004 ber_memfree( mo->mo_groupFilterstr.bv_val );
2007 if ( !BER_BVISNULL( &mo->mo_memberFilterstr ) ) {
2008 ber_memfree( mo->mo_memberFilterstr.bv_val );
2018 static AttributeDescription *ad_memberOf;
2022 AttributeDescription **adp;
2024 { "( 1.2.840.113556.1.2.102 "
2026 "DESC 'Group that the entry belongs to' "
2027 "SYNTAX '1.3.6.1.4.1.1466.115.121.1.12' "
2028 "EQUALITY distinguishedNameMatch " /* added */
2029 "USAGE dSAOperation " /* added; questioned */
2030 /* "NO-USER-MODIFICATION " */ /* add? */
2031 "X-ORIGIN 'iPlanet Delegated Administrator' )",
2036 #if SLAPD_OVER_MEMBEROF == SLAPD_MOD_DYNAMIC
2038 #endif /* SLAPD_OVER_MEMBEROF == SLAPD_MOD_DYNAMIC */
2040 memberof_initialize( void )
2044 for ( i = 0; as[ i ].desc != NULL; i++ ) {
2045 code = register_at( as[ i ].desc, as[ i ].adp, 0 );
2047 Debug( LDAP_DEBUG_ANY,
2048 "memberof_initialize: register_at #%d failed\n",
2054 memberof.on_bi.bi_type = "memberof";
2056 memberof.on_bi.bi_db_init = memberof_db_init;
2057 memberof.on_bi.bi_db_open = memberof_db_open;
2058 memberof.on_bi.bi_db_destroy = memberof_db_destroy;
2060 memberof.on_bi.bi_op_add = memberof_op_add;
2061 memberof.on_bi.bi_op_delete = memberof_op_delete;
2062 memberof.on_bi.bi_op_modify = memberof_op_modify;
2063 memberof.on_bi.bi_op_modrdn = memberof_op_modrdn;
2065 memberof.on_bi.bi_cf_ocs = mo_ocs;
2067 code = config_register_schema( mo_cfg, mo_ocs );
2068 if ( code ) return code;
2070 return overlay_register( &memberof );
2073 #if SLAPD_OVER_MEMBEROF == SLAPD_MOD_DYNAMIC
2075 init_module( int argc, char *argv[] )
2077 return memberof_initialize();
2079 #endif /* SLAPD_OVER_MEMBEROF == SLAPD_MOD_DYNAMIC */
2081 #endif /* SLAPD_OVER_MEMBEROF */