]> git.sur5r.net Git - openldap/blobdiff - tests/data/slapd-acl.conf
ITS#3671 must release conn->c_mutex to allow blocked writers to exit
[openldap] / tests / data / slapd-acl.conf
index a5f285a541c03b5f52f360721affb1d18bfc9900..c56586bff17df4c9d78b411005f5ab9576e5e723 100644 (file)
@@ -3,7 +3,7 @@
   kurt Exp $
 ## This work is part of OpenLDAP Software <http://www.openldap.org/>.
 ##
-## Copyright 1998-2003 The OpenLDAP Foundation.
+## Copyright 1998-2005 The OpenLDAP Foundation.
 ## All rights reserved.
 ##
 ## Redistribution and use in source and binary forms, with or without
@@ -14,7 +14,6 @@
 ## top-level directory of the distribution or, alternatively, at
 ## <http://www.OpenLDAP.org/license.html>.
 
-ucdata-path    ./ucdata
 include ./schema/core.schema
 include ./schema/cosine.schema
 include ./schema/inetorgperson.schema
@@ -24,14 +23,22 @@ pidfile     ./testrun/slapd.1.pid
 argsfile    ./testrun/slapd.1.args
 
 # global ACLs
-access to dn.base="" attr=objectClass by users read
-access to * by * read
+#
+# normal installations should protect root dse, cn=monitor, cn=subschema
+#
+
+access         to dn.exact="" attr=objectClass
+               by users read
+access         to *
+               by * read
 
 #mod#modulepath        ../servers/slapd/back-@BACKEND@/
 #mod#moduleload        back_@BACKEND@.la
+#monitormod#modulepath ../servers/slapd/back-monitor/
+#monitormod#moduleload back_monitor.la
 
 #######################################################################
-# ldbm database definitions
+# database definitions
 #######################################################################
 
 database       @BACKEND@
@@ -45,48 +52,55 @@ rootpw              secret
 #bdb#index             objectClass     eq
 #bdb#index             cn,sn,uid       pres,eq,sub
 
-#
-# normal installations should protect root dse, cn=monitor, cn=subschema
-#
-
-access to dn="" by * read
-access to dn.base="" by * read
-
+#access                to attr=objectclass dn.subtree="dc=example,dc=com"
 access         to attr=objectclass
                by * =rsc stop
 
-access         to filter="(objectclass=person)" attr=userpassword dn.subtree=""
+#access                to filter="(objectclass=person)" attr=userpassword dn.subtree="dc=example,dc=com"
+access         to filter="(objectclass=person)" attr=userpassword
                by anonymous auth
-               by self write
+               by self =wx
 
 access         to dn.children="ou=Alumni Association,ou=People,dc=example,dc=com"
                by dn.regex=".+,dc=example,dc=com" +c continue
                by dn.subtree="dc=example,dc=com" +rs continue
+               by dn.children="dc=example,dc=com" +d continue
                by * stop
 
+#access                to attr=member,uniquemember dn.subtree="dc=example,dc=com"
 access         to attr=member,uniquemember
                by dnattr=member selfwrite
                by dnattr=uniquemember selfwrite
                by * read
 
-access to attr=member,uniquemember filter=(mail=*com)
+#access                to attr=member,uniquemember filter="(mail=*com)" dn.subtree="dc=example,dc=com"
+access         to attr=member,uniquemember filter="(mail=*com)"
                by * read
 
-access to filter="(&(objectclass=groupofnames)(objectClass=groupofuniquenames)
- )"
-               by dn.base="cn=Bjorn Jensen,ou=Information Technology Division,ou=People,dc=
- example,dc=com" =sc continue
-               by dn.regex="^cn=Bjorn Jensen,ou=Information Technology Division,ou=People,d
- c=example,dc=com$" +rw stop
+#access                to filter="(|(objectclass=groupofnames)(objectClass=groupofuniquenames))" dn.subtree="dc=example,dc=com"
+access         to filter="(|(objectclass=groupofnames)(objectClass=groupofuniquenames))"
+               by dn.exact="cn=Bjorn Jensen,ou=Information Technology Division,ou=People,dc=example,dc=com" =sc continue
+               by dn.regex="^cn=Bjorn Jensen,ou=Information Technology Division,ou=People,dc=example,dc=com$" +rw stop
                by * break
 
-access         to dn.children="ou=Information Technology Division,ou=People,dc=exampl
- e,dc=com"
-               by group/groupOfUniqueNames/uniqueMember.exact="cn=ITD Staff,ou=Groups,dc=ex
- ample,dc=com" write
+access         to dn.children="ou=Information Technology Division,ou=People,dc=example,dc=com"
+               by group/groupOfUniqueNames/uniqueMember.exact="cn=ITD Staff,ou=Groups,dc=example,dc=com" write
+               by * read
+
+access         to dn.exact="cn=Alumni Assoc Staff,ou=Groups,dc=example,dc=com"
+               by set="[cn=Alumni Assoc Staff,ou=Groups,dc=example,dc=com]/member* & user" write
                by * read
 
-access to filter="(name=X*Y*Z)"
+#access                to filter="(name=X*Y*Z)" dn.subtree="dc=example,dc=com"
+access         to filter="(name=X*Y*Z)"
                by * continue
 
+access         to dn.subtree="ou=Add/Delete,dc=example,dc=com"
+               by dn.exact="cn=Bjorn Jensen,ou=Information Technology Division,ou=People,dc=example,dc=com" add
+               by dn.exact="cn=Barbara Jensen,ou=Information Technology Division,ou=People,dc=example,dc=com" delete
+               by dn.exact="cn=James A Jones 1,ou=Alumni Association,ou=People,dc=example,dc=com" write
+               by * read
+
 # fall into global ACLs
+
+#monitor#database monitor