]> git.sur5r.net Git - openldap/blobdiff - tests/data/slapd-acl.conf
Rework libldap to not attempt to set LDAP_API_FEATURE_X_OPENLDAP_THREAD_SAFE
[openldap] / tests / data / slapd-acl.conf
index 80dd2b65940aa7c3d1699a1e3d49a8b8fd4ea756..d1e541a3f0e9b832db8d8f2892cb593b72e5e83d 100644 (file)
@@ -1,38 +1,71 @@
+# $OpenLDAP$
 #
 # master slapd config -- for testing
 #
-include                ./data/slapd.at.conf
-include                ./data/slapd.oc.conf
-schemacheck    off
+ucdata-path    ./ucdata
+include ./schema/core.schema
+include ./schema/cosine.schema
+include ./schema/inetorgperson.schema
+include ./schema/openldap.schema
 pidfile     ./test-db/slapd.pid
 argsfile    ./test-db/slapd.args
 
+# global ACLs
+access to dn.base="" attr=objectClass by users read
+access to * by * read
+
 #######################################################################
 # ldbm database definitions
 #######################################################################
 
-database       ldbm
-suffix         "o=University of Michigan, c=US"
+database       @BACKEND@
+#ldbm#cachesize        0
+suffix         "o=University of Michigan,c=US"
 directory      ./test-db
-rootdn         "cn=Manager, o=University of Michigan, c=US"
+rootdn         "cn=Manager,o=University of Michigan,c=US"
 rootpw         secret
-index          cn,sn,uid       pres,eq,approx
-index          default         none
-lastmod                on
-defaultaccess  none
+#ldbm#index            objectClass     eq
+#ldbm#index            cn,sn,uid       pres,eq,sub
+#bdb#index             objectClass     eq
+#bdb#index             cn,sn,uid       pres,eq,sub
+
+#
+# normal installations should protect root dse,
+# cn=monitor, cn=schema, and cn=config
+#
+
+access to dn="" by * read
+access to dn.base="" by * read
+
 access         to attr=objectclass
-               by * read
-access         to attr=userpassword
+               by * =rsc stop
+
+access         to filter="(objectclass=person)" attr=userpassword
+               by anonymous auth
                by self write
-               by * compare
-access         to dn=".*,ou=Alumni Association,ou=People,o=University of Michigan,c=US"
-               by dn=".*,o=University of Michigan,c=US"
-               read
-               by * none
+
+access         to dn.children="ou=Alumni Association,ou=People,o=University of Michigan,c=US"
+               by dn.regex=".+,o=University of Michigan,c=US" +c continue
+               by dn.subtree="o=University of Michigan,c=US" +rs continue
+               by * stop
+
 access         to attr=member
                by dnattr=member selfwrite
                by * read
-access         to filter="objectclass=rfc822mailgroup"
-               by dn="Bjorn Jensen,ou=Information Technology Division,ou=People,o=University of Michigan,c=US" write
+
+access         to attr=member filter=(mail=*edu)
+               by * read
+
+access         to filter="(objectclass=groupofnames)"
+               by dn.base="cn=Bjorn Jensen,ou=Information Technology Division,ou=People,o=University of Michigan,c=US" =sc continue
+               by dn="^cn=Bjorn Jensen,ou=Information Technology Division,ou=People,o=University of Michigan,c=US$" +rw stop
+               by * break
+
+access         to dn.children="ou=Information Technology Division,ou=People,o=University of Michigan,c=US"
+               by group.exact="cn=ITD Staff,ou=Groups,o=University of Michigan,c=US" write
                by * read
-access         to * by * read
+
+access to filter="(name=X*Y*Z)"
+               by * continue
+
+# fall into global ACLs