]> git.sur5r.net Git - openldap/blobdiff - tests/data/slapd-acl.conf
Rework libldap to not attempt to set LDAP_API_FEATURE_X_OPENLDAP_THREAD_SAFE
[openldap] / tests / data / slapd-acl.conf
index 8254d750df0d1e95473bb85ba0c0b8936502b605..d1e541a3f0e9b832db8d8f2892cb593b72e5e83d 100644 (file)
@@ -2,55 +2,70 @@
 #
 # master slapd config -- for testing
 #
-#include               ./data/slapd.at.conf
-#include               ./data/slapd.oc.conf
+ucdata-path    ./ucdata
 include ./schema/core.schema
-include ./schema/openldap.schema
 include ./schema/cosine.schema
 include ./schema/inetorgperson.schema
-schemacheck    off
+include ./schema/openldap.schema
 pidfile     ./test-db/slapd.pid
 argsfile    ./test-db/slapd.args
 
+# global ACLs
+access to dn.base="" attr=objectClass by users read
+access to * by * read
+
 #######################################################################
 # ldbm database definitions
 #######################################################################
 
-database       ldbm
-cachesize      0
-suffix         "o=University of Michigan, c=US"
+database       @BACKEND@
+#ldbm#cachesize        0
+suffix         "o=University of Michigan,c=US"
 directory      ./test-db
-rootdn         "cn=Manager, o=University of Michigan, c=US"
+rootdn         "cn=Manager,o=University of Michigan,c=US"
 rootpw         secret
-index          cn,sn,uid       pres,eq,approx
-index          default         none
-lastmod                on
-defaultaccess  none
+#ldbm#index            objectClass     eq
+#ldbm#index            cn,sn,uid       pres,eq,sub
+#bdb#index             objectClass     eq
+#bdb#index             cn,sn,uid       pres,eq,sub
 
 #
 # normal installations should protect root dse,
 # cn=monitor, cn=schema, and cn=config
 #
 
+access to dn="" by * read
+access to dn.base="" by * read
+
 access         to attr=objectclass
                by * =rsc stop
 
-access         to filter="objectclass=person" attr=userpassword
+access         to filter="(objectclass=person)" attr=userpassword
                by anonymous auth
                by self write
 
-access         to dn=".*,ou=Alumni Association,ou=People,o=University of Michigan,c=US$"
-               by dn="^$" +x continue
-               by dn=".*,o=University of Michigan,c=US$" +rsc continue
+access         to dn.children="ou=Alumni Association,ou=People,o=University of Michigan,c=US"
+               by dn.regex=".+,o=University of Michigan,c=US" +c continue
+               by dn.subtree="o=University of Michigan,c=US" +rs continue
                by * stop
 
 access         to attr=member
                by dnattr=member selfwrite
                by * read
 
-access         to filter="objectclass=groupofnames"
-               by dn="^cn=Bjorn Jensen,ou=Information Technology Division,ou=People,o=University of Michigan,c=US$" =sc continue
+access         to attr=member filter=(mail=*edu)
+               by * read
+
+access         to filter="(objectclass=groupofnames)"
+               by dn.base="cn=Bjorn Jensen,ou=Information Technology Division,ou=People,o=University of Michigan,c=US" =sc continue
                by dn="^cn=Bjorn Jensen,ou=Information Technology Division,ou=People,o=University of Michigan,c=US$" +rw stop
                by * break
 
-access         to * by * read
+access         to dn.children="ou=Information Technology Division,ou=People,o=University of Michigan,c=US"
+               by group.exact="cn=ITD Staff,ou=Groups,o=University of Michigan,c=US" write
+               by * read
+
+access to filter="(name=X*Y*Z)"
+               by * continue
+
+# fall into global ACLs