]> git.sur5r.net Git - openldap/blobdiff - tests/data/slapd-acl.conf
ITS#3671 must release conn->c_mutex to allow blocked writers to exit
[openldap] / tests / data / slapd-acl.conf
index 9356ab9b4feafe26a0b1fa895c4b930a6d2f91b1..c56586bff17df4c9d78b411005f5ab9576e5e723 100644 (file)
@@ -3,7 +3,7 @@
   kurt Exp $
 ## This work is part of OpenLDAP Software <http://www.openldap.org/>.
 ##
-## Copyright 1998-2003 The OpenLDAP Foundation.
+## Copyright 1998-2005 The OpenLDAP Foundation.
 ## All rights reserved.
 ##
 ## Redistribution and use in source and binary forms, with or without
@@ -14,7 +14,6 @@
 ## top-level directory of the distribution or, alternatively, at
 ## <http://www.OpenLDAP.org/license.html>.
 
-ucdata-path    ./ucdata
 include ./schema/core.schema
 include ./schema/cosine.schema
 include ./schema/inetorgperson.schema
@@ -24,14 +23,22 @@ pidfile     ./testrun/slapd.1.pid
 argsfile    ./testrun/slapd.1.args
 
 # global ACLs
-access to dn.exact="" attr=objectClass by users read
-access to * by * read
+#
+# normal installations should protect root dse, cn=monitor, cn=subschema
+#
+
+access         to dn.exact="" attr=objectClass
+               by users read
+access         to *
+               by * read
 
 #mod#modulepath        ../servers/slapd/back-@BACKEND@/
 #mod#moduleload        back_@BACKEND@.la
+#monitormod#modulepath ../servers/slapd/back-monitor/
+#monitormod#moduleload back_monitor.la
 
 #######################################################################
-# ldbm database definitions
+# database definitions
 #######################################################################
 
 database       @BACKEND@
@@ -45,35 +52,33 @@ rootpw              secret
 #bdb#index             objectClass     eq
 #bdb#index             cn,sn,uid       pres,eq,sub
 
-#
-# normal installations should protect root dse, cn=monitor, cn=subschema
-#
-
-# these are equivalent
-access to dn="" by * read
-access to dn.exact="" by * read
-
+#access                to attr=objectclass dn.subtree="dc=example,dc=com"
 access         to attr=objectclass
                by * =rsc stop
 
-access         to filter="(objectclass=person)" attr=userpassword dn.subtree=""
+#access                to filter="(objectclass=person)" attr=userpassword dn.subtree="dc=example,dc=com"
+access         to filter="(objectclass=person)" attr=userpassword
                by anonymous auth
                by self =wx
 
 access         to dn.children="ou=Alumni Association,ou=People,dc=example,dc=com"
                by dn.regex=".+,dc=example,dc=com" +c continue
                by dn.subtree="dc=example,dc=com" +rs continue
+               by dn.children="dc=example,dc=com" +d continue
                by * stop
 
+#access                to attr=member,uniquemember dn.subtree="dc=example,dc=com"
 access         to attr=member,uniquemember
                by dnattr=member selfwrite
                by dnattr=uniquemember selfwrite
                by * read
 
-access to attr=member,uniquemember filter="(mail=*com)"
+#access                to attr=member,uniquemember filter="(mail=*com)" dn.subtree="dc=example,dc=com"
+access         to attr=member,uniquemember filter="(mail=*com)"
                by * read
 
-access to filter="(&(objectclass=groupofnames)(objectClass=groupofuniquenames))"
+#access                to filter="(|(objectclass=groupofnames)(objectClass=groupofuniquenames))" dn.subtree="dc=example,dc=com"
+access         to filter="(|(objectclass=groupofnames)(objectClass=groupofuniquenames))"
                by dn.exact="cn=Bjorn Jensen,ou=Information Technology Division,ou=People,dc=example,dc=com" =sc continue
                by dn.regex="^cn=Bjorn Jensen,ou=Information Technology Division,ou=People,dc=example,dc=com$" +rw stop
                by * break
@@ -82,7 +87,20 @@ access               to dn.children="ou=Information Technology Division,ou=People,dc=example,
                by group/groupOfUniqueNames/uniqueMember.exact="cn=ITD Staff,ou=Groups,dc=example,dc=com" write
                by * read
 
-access to filter="(name=X*Y*Z)"
+access         to dn.exact="cn=Alumni Assoc Staff,ou=Groups,dc=example,dc=com"
+               by set="[cn=Alumni Assoc Staff,ou=Groups,dc=example,dc=com]/member* & user" write
+               by * read
+
+#access                to filter="(name=X*Y*Z)" dn.subtree="dc=example,dc=com"
+access         to filter="(name=X*Y*Z)"
                by * continue
 
+access         to dn.subtree="ou=Add/Delete,dc=example,dc=com"
+               by dn.exact="cn=Bjorn Jensen,ou=Information Technology Division,ou=People,dc=example,dc=com" add
+               by dn.exact="cn=Barbara Jensen,ou=Information Technology Division,ou=People,dc=example,dc=com" delete
+               by dn.exact="cn=James A Jones 1,ou=Alumni Association,ou=People,dc=example,dc=com" write
+               by * read
+
 # fall into global ACLs
+
+#monitor#database monitor