]> git.sur5r.net Git - openldap/blobdiff - servers/slapd/sasl.c
Plug leak
[openldap] / servers / slapd / sasl.c
index 756522bde5e74b8028117050782205f7b3aa4bab..0b3288d2c44f779c68da6321e2578cac7a6f3231 100644 (file)
 
 #include "slap.h"
 
+#ifdef ENABLE_REWRITE
+#include <rewrite.h>
+#endif
+
 #ifdef HAVE_CYRUS_SASL
 # ifdef HAVE_SASL_SASL_H
 #  include <sasl/sasl.h>
@@ -322,7 +326,7 @@ slap_auxprop_lookup(
 
                cb.sc_private = &sl;
 
-               op.o_bd = select_backend( &op.o_req_ndn, 0, 1 );
+               op.o_bd = select_backend( &op.o_req_ndn, 1 );
 
                if ( op.o_bd ) {
                        /* For rootdn, see if we can use the rootpw */
@@ -436,7 +440,7 @@ slap_auxprop_store(
        }
        if (!conn || !op.o_req_ndn.bv_val) return SASL_BADPARAM;
 
-       op.o_bd = select_backend( &op.o_req_ndn, 0, 1 );
+       op.o_bd = select_backend( &op.o_req_ndn, 1 );
 
        if ( !op.o_bd || !op.o_bd->be_modify ) return SASL_FAIL;
                
@@ -451,6 +455,7 @@ slap_auxprop_store(
                mod->sml_op = LDAP_MOD_REPLACE;
                mod->sml_flags = 0;
                ber_str2bv( pr[i].name, 0, 0, &mod->sml_type );
+               mod->sml_numvals = pr[i].nvalues;
                mod->sml_values = (struct berval *)ch_malloc( (pr[i].nvalues + 1) *
                        sizeof(struct berval));
                for (j=0; j<pr[i].nvalues; j++) {
@@ -606,6 +611,7 @@ slap_sasl_canonicalize(
         */
        if ( flags == SASL_CU_AUTHID && !auxvals[SLAP_SASL_PROP_AUTHZ].values ) {
                conn->c_sasl_dn.bv_val = (char *) in;
+               conn->c_sasl_dn.bv_len = 0;
        } else if ( flags == SASL_CU_AUTHZID && conn->c_sasl_dn.bv_val ) {
                rc = strcmp( in, conn->c_sasl_dn.bv_val );
                conn->c_sasl_dn.bv_val = NULL;
@@ -620,13 +626,13 @@ slap_sasl_canonicalize(
        if ( rc != LDAP_SUCCESS ) {
                sasl_seterror( sconn, 0, ldap_err2string( rc ) );
                return SASL_NOAUTHZ;
-       }               
+       }
 
        names[0] = slap_propnames[which];
        names[1] = NULL;
 
        prop_set( props, names[0], (char *)&dn, sizeof( dn ) );
-               
+
        Debug( LDAP_DEBUG_ARGS, "SASL Canonicalize [conn=%ld]: %s=\"%s\"\n",
                conn ? conn->c_connid : -1, names[0]+1,
                dn.bv_val ? dn.bv_val : "<EMPTY>" );
@@ -717,9 +723,9 @@ slap_sasl_authorize(
 ok:
        if (conn->c_sasl_bindop) {
                Statslog( LDAP_DEBUG_STATS,
-                       "conn=%lu op=%lu BIND authcid=\"%s\" authzid=\"%s\"\n",
-                       conn->c_connid, conn->c_sasl_bindop->o_opid
-                       auth_identity, requested_user, 0);
+                       "%s BIND authcid=\"%s\" authzid=\"%s\"\n",
+                       conn->c_sasl_bindop->o_log_prefix
+                       auth_identity, requested_user, 0, 0 );
        }
 
        Debug( LDAP_DEBUG_TRACE, "SASL Authorize [conn=%ld]: "
@@ -821,9 +827,9 @@ ok:
 
        if ( conn->c_sasl_bindop ) {
                Statslog( LDAP_DEBUG_STATS,
-                       "conn=%lu op=%lu BIND authcid=\"%s\" authzid=\"%s\"\n",
-                       conn->c_connid, conn->c_sasl_bindop->o_opid
-                       authcid, authzid ? authzid : "", 0);
+                       "%s BIND authcid=\"%s\" authzid=\"%s\"\n",
+                       conn->c_sasl_bindop->o_log_prefix
+                       authcid, authzid ? authzid : "", 0, 0 );
        }
 
        *errstr = NULL;
@@ -950,6 +956,231 @@ static int chk_sasl(
 
 #endif /* HAVE_CYRUS_SASL */
 
+#ifdef ENABLE_REWRITE
+
+typedef struct slapd_map_data {
+       struct berval base;
+       struct berval filter;
+       AttributeName attrs[2];
+       int scope;
+} slapd_map_data;
+
+static void *
+slapd_rw_config( const char *fname, int lineno, int argc, char **argv )
+{
+       slapd_map_data *ret = NULL;
+       LDAPURLDesc *lud = NULL;
+       char *uri;
+       AttributeDescription *ad = NULL;
+       int rc, flen = 0;
+       struct berval dn, ndn;
+
+       if ( argc != 1 ) {
+               Debug( LDAP_DEBUG_ANY,
+                       "[%s:%d] slapd map needs URI\n",
+                       fname, lineno, 0 );
+        return NULL;
+       }
+
+       uri = argv[0];
+       if ( strncasecmp( uri, "uri=", STRLENOF( "uri=" ) ) == 0 ) {
+               uri += STRLENOF( "uri=" );
+       }
+
+       if ( ldap_url_parse( uri, &lud ) != LDAP_URL_SUCCESS ) {
+               Debug( LDAP_DEBUG_ANY,
+                       "[%s:%d] illegal URI '%s'\n",
+                       fname, lineno, uri );
+        return NULL;
+       }
+
+       if ( strcasecmp( lud->lud_scheme, "ldap" )) {
+               Debug( LDAP_DEBUG_ANY,
+                       "[%s:%d] illegal URI scheme '%s'\n",
+                       fname, lineno, lud->lud_scheme );
+               goto done;
+       }
+
+       if (( lud->lud_host && lud->lud_host[0] ) || lud->lud_exts
+               || !lud->lud_dn ) {
+               Debug( LDAP_DEBUG_ANY,
+                       "[%s:%d] illegal URI '%s'\n",
+                       fname, lineno, uri );
+               goto done;
+       }
+
+       if ( lud->lud_attrs ) {
+               if ( lud->lud_attrs[1] ) {
+                       Debug( LDAP_DEBUG_ANY,
+                               "[%s:%d] only one attribute allowed in URI\n",
+                               fname, lineno, 0 );
+                       goto done;
+               }
+               if ( strcasecmp( lud->lud_attrs[0], "dn" ) &&
+                       strcasecmp( lud->lud_attrs[0], "entryDN" )) {
+                       const char *text;
+                       rc = slap_str2ad( lud->lud_attrs[0], &ad, &text );
+                       if ( rc )
+                               goto done;
+               }
+       }
+       ber_str2bv( lud->lud_dn, 0, 0, &dn );
+       if ( dnNormalize( 0, NULL, NULL, &dn, &ndn, NULL ))
+               goto done;
+
+       if ( lud->lud_filter ) {
+               flen = strlen( lud->lud_filter ) + 1;
+       }
+       ret = ch_malloc( sizeof( slapd_map_data ) + flen );
+       ret->base = ndn;
+       if ( flen ) {
+               ret->filter.bv_val = (char *)(ret+1);
+               ret->filter.bv_len = flen - 1;
+               strcpy( ret->filter.bv_val, lud->lud_filter );
+       } else {
+               BER_BVZERO( &ret->filter );
+       }
+       ret->scope = lud->lud_scope;
+       if ( ad ) {
+               ret->attrs[0].an_name = ad->ad_cname;
+       } else {
+               BER_BVZERO( &ret->attrs[0].an_name );
+       }
+       ret->attrs[0].an_desc = ad;
+       BER_BVZERO( &ret->attrs[1].an_name );
+done:
+       ldap_free_urldesc( lud );
+       return ret;
+}
+
+struct slapd_rw_info {
+       slapd_map_data *si_data;
+       struct berval si_val;
+};
+
+static int
+slapd_rw_cb( Operation *op, SlapReply *rs )
+{
+       if ( rs->sr_type == REP_SEARCH ) {
+               struct slapd_rw_info *si = op->o_callback->sc_private;
+
+               if ( si->si_data->attrs[0].an_desc ) {
+                       Attribute *a;
+
+                       a = attr_find( rs->sr_entry->e_attrs,
+                               si->si_data->attrs[0].an_desc );
+                       if ( a ) {
+                               ber_dupbv( &si->si_val, a->a_vals );
+                       }
+               } else {
+                       ber_dupbv( &si->si_val, &rs->sr_entry->e_name );
+               }
+       }
+       return LDAP_SUCCESS;
+}
+
+static int
+slapd_rw_apply( void *private, const char *filter, struct berval *val )
+{
+       slapd_map_data *sl = private;
+       slap_callback cb = { NULL };
+       Connection conn = {0};
+       OperationBuffer opbuf;
+       Operation *op;
+       void *thrctx;
+       SlapReply rs = {REP_RESULT};
+       struct slapd_rw_info si;
+       char *ptr;
+       int rc;
+
+       thrctx = ldap_pvt_thread_pool_context();
+       connection_fake_init2( &conn, &opbuf, thrctx, 0 );
+       op = &opbuf.ob_op;
+
+       op->o_tag = LDAP_REQ_SEARCH;
+       op->o_req_dn = op->o_req_ndn = sl->base;
+       op->o_bd = select_backend( &op->o_req_ndn, 1 );
+       if ( !op->o_bd ) {
+               return REWRITE_ERR;
+       }
+       si.si_data = sl;
+       BER_BVZERO( &si.si_val );
+       op->ors_scope = sl->scope;
+       op->ors_deref = LDAP_DEREF_NEVER;
+       op->ors_slimit = 1;
+       op->ors_tlimit = SLAP_NO_LIMIT;
+       if ( sl->attrs[0].an_desc ) {
+               op->ors_attrs = sl->attrs;
+       } else {
+               op->ors_attrs = slap_anlist_no_attrs;
+       }
+       if ( filter ) {
+               rc = strlen( filter );
+       } else {
+               rc = 0;
+       }
+       rc += sl->filter.bv_len;
+       ptr = op->ors_filterstr.bv_val = op->o_tmpalloc( rc + 1, op->o_tmpmemctx );
+       if ( sl->filter.bv_len ) {
+               ptr = lutil_strcopy( ptr, sl->filter.bv_val );
+       } else {
+               *ptr = '\0';
+       }
+       if ( filter ) {
+               strcpy( ptr, filter );
+       }
+       op->ors_filter = str2filter_x( op, op->ors_filterstr.bv_val );
+       if ( !op->ors_filter ) {
+               op->o_tmpfree( op->ors_filterstr.bv_val, op->o_tmpmemctx );
+               return REWRITE_ERR;
+       }
+
+       op->ors_attrsonly = 0;
+       op->o_dn = op->o_bd->be_rootdn;
+       op->o_ndn = op->o_bd->be_rootndn;
+       op->o_do_not_cache = 1;
+
+       cb.sc_response = slapd_rw_cb;
+       cb.sc_private = &si;
+       op->o_callback = &cb;
+
+       rc = op->o_bd->be_search( op, &rs );
+       if ( rc == LDAP_SUCCESS && !BER_BVISNULL( &si.si_val )) {
+               *val = si.si_val;
+               rc = REWRITE_SUCCESS;
+       } else {
+               if ( !BER_BVISNULL( &si.si_val )) {
+                       ch_free( si.si_val.bv_val );
+               }
+               rc = REWRITE_ERR;
+       }
+       filter_free_x( op, op->ors_filter );
+       op->o_tmpfree( op->ors_filterstr.bv_val, op->o_tmpmemctx );
+       return rc;
+}
+
+static int
+slapd_rw_destroy( void *private )
+{
+       slapd_map_data *md = private;
+
+       assert( private != NULL );
+
+       ch_free( md->base.bv_val );
+       ch_free( md->filter.bv_val );
+       ch_free( md );
+
+       return 0;
+}
+
+static const rewrite_mapper slapd_mapper = {
+       "slapd",
+       slapd_rw_config,
+       slapd_rw_apply,
+       slapd_rw_destroy
+};
+#endif
+
 int slap_sasl_init( void )
 {
 #ifdef HAVE_CYRUS_SASL
@@ -958,7 +1189,13 @@ int slap_sasl_init( void )
                { SASL_CB_LOG, &slap_sasl_log, NULL },
                { SASL_CB_LIST_END, NULL, NULL }
        };
+#endif
 
+#ifdef ENABLE_REWRITE
+       rewrite_mapper_register( &slapd_mapper );
+#endif
+
+#ifdef HAVE_CYRUS_SASL
 #ifdef HAVE_SASL_VERSION
        /* stringify the version number, sasl.h doesn't do it for us */
 #define        VSTR0(maj, min, pat)    #maj "." #min "." #pat
@@ -974,8 +1211,8 @@ int slap_sasl_init( void )
                sprintf( version, "%u.%d.%d", (unsigned)rc >> 24, (rc >> 16) & 0xff,
                        rc & 0xffff );
                Debug( LDAP_DEBUG_ANY, "slap_sasl_init: SASL library version mismatch:"
-                       " expected " SASL_VERSION_STRING ","
-                       " got %s\n", version, 0, 0 );
+                       " expected %s, got %s\n",
+                       SASL_VERSION_STRING, version, 0 );
                return -1;
        }
 #endif
@@ -1053,16 +1290,16 @@ static char *
 slap_sasl_peer2ipport( struct berval *peer )
 {
        int             isv6 = 0;
-       char            *ipport,
-                       *p = &peer->bv_val[ STRLENOF( "IP=" ) ];
+       char            *ipport, *p,
+                       *addr = &peer->bv_val[ STRLENOF( "IP=" ) ];
        ber_len_t       plen = peer->bv_len - STRLENOF( "IP=" );
 
        /* IPv6? */
-       if ( p[0] == '[' ) {
+       if ( addr[0] == '[' ) {
                isv6 = 1;
                plen--;
        }
-       ipport = ch_strdup( &p[isv6] );
+       ipport = ch_strdup( &addr[isv6] );
 
        /* Convert IPv6/IPv4 addresses to address;port syntax. */
        p = strrchr( ipport, ':' );
@@ -1076,8 +1313,8 @@ slap_sasl_peer2ipport( struct berval *peer )
        } else if ( isv6 ) {
                /* trim ']' */
                plen--;
-               assert( p[plen] == ']' );
-               p[plen] = '\0';
+               assert( addr[plen] == ']' );
+               addr[plen] = '\0';
        }
 
        return ipport;
@@ -1138,10 +1375,6 @@ int slap_sasl_open( Connection *conn, int reopen )
 
        conn->c_sasl_layers = 0;
 
-       if( global_host == NULL ) {
-               global_host = ldap_pvt_get_fqdn( NULL );
-       }
-
        /* create new SASL context */
 #if SASL_VERSION_MAJOR >= 2
        if ( conn->c_sock_name.bv_len != 0 &&
@@ -1215,12 +1448,13 @@ int slap_sasl_external(
 #if SASL_VERSION_MAJOR >= 2
        int sc;
        sasl_conn_t *ctx = conn->c_sasl_authctx;
+       sasl_ssf_t sasl_ssf = ssf;
 
        if ( ctx == NULL ) {
                return LDAP_UNAVAILABLE;
        }
 
-       sc = sasl_setprop( ctx, SASL_SSF_EXTERNAL, &ssf );
+       sc = sasl_setprop( ctx, SASL_SSF_EXTERNAL, &sasl_ssf );
 
        if ( sc != SASL_OK ) {
                return LDAP_OTHER;
@@ -1389,7 +1623,7 @@ int slap_sasl_bind( Operation *op, SlapReply *rs )
        if ( !op->o_conn->c_sasl_bind_in_progress ) {
                /* If we already authenticated once, must use a new context */
                if ( op->o_conn->c_sasl_done ) {
-                       slap_ssf_t ssf = 0;
+                       sasl_ssf_t ssf = 0;
                        const char *authid = NULL;
 #if SASL_VERSION_MAJOR >= 2
                        sasl_getprop( ctx, SASL_SSF_EXTERNAL, (void *)&ssf );
@@ -1479,6 +1713,9 @@ int slap_sasl_bind( Operation *op, SlapReply *rs )
                send_ldap_sasl( op, rs );
 
        } else {
+               if ( op->o_conn->c_sasl_dn.bv_len )
+                       ch_free( op->o_conn->c_sasl_dn.bv_val );
+               BER_BVZERO( &op->o_conn->c_sasl_dn );
 #if SASL_VERSION_MAJOR >= 2
                rs->sr_text = sasl_errdetail( ctx );
 #endif