X-Git-Url: https://git.sur5r.net/?a=blobdiff_plain;f=servers%2Fslapd%2Faclparse.c;h=f559ae3e1c7d9f69936e1538072907e7a0738ed1;hb=12d5c6bba210de4a03363567be1c19a37f8e806b;hp=1c8a5bad379e7ed8dff112897c69985f08c88e75;hpb=709ce4fa6c0a8aea66c4b6e15bf42aa3352ad2e2;p=openldap diff --git a/servers/slapd/aclparse.c b/servers/slapd/aclparse.c index 1c8a5bad37..f559ae3e1c 100644 --- a/servers/slapd/aclparse.c +++ b/servers/slapd/aclparse.c @@ -1,8 +1,27 @@ /* aclparse.c - routines to parse and check acl's */ /* $OpenLDAP$ */ -/* - * Copyright 1998-2002 The OpenLDAP Foundation, All Rights Reserved. - * COPYING RESTRICTIONS APPLY, see COPYRIGHT file +/* This work is part of OpenLDAP Software . + * + * Copyright 1998-2003 The OpenLDAP Foundation. + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted only as authorized by the OpenLDAP + * Public License. + * + * A copy of this license is available in the file LICENSE in the + * top-level directory of the distribution or, alternatively, at + * . + */ +/* Portions Copyright (c) 1995 Regents of the University of Michigan. + * All rights reserved. + * + * Redistribution and use in source and binary forms are permitted + * provided that this notice is preserved and that due credit is given + * to the University of Michigan at Ann Arbor. The name of the University + * may not be used to endorse or promote products derived from this + * software without specific prior written permission. This software + * is provided ``as is'' without express or implied warranty. */ #include "portable.h" @@ -17,19 +36,20 @@ #include "slap.h" #include "lber_pvt.h" +#include "lutil.h" static void split(char *line, int splitchar, char **left, char **right); static void access_append(Access **l, Access *a); static void acl_usage(void) LDAP_GCCATTR((noreturn)); -static void acl_regex_normalized_dn(struct berval *pattern); +static void acl_regex_normalized_dn(const char *src, struct berval *pat); #ifdef LDAP_DEBUG static void print_acl(Backend *be, AccessControl *a); static void print_access(Access *b); #endif -static int +static void regtest(const char *fname, int lineno, char *pat) { int e; regex_t re; @@ -79,10 +99,8 @@ regtest(const char *fname, int lineno, char *pat) { "%s: line %d: regular expression \"%s\" bad because of %s\n", fname, lineno, pat, error ); acl_usage(); - return(0); } regfree(&re); - return(1); } void @@ -107,8 +125,8 @@ parse_acl( /* to clause - select which entries are protected */ if ( strcasecmp( argv[i], "to" ) == 0 ) { if ( a != NULL ) { - fprintf( stderr, - "%s: line %d: only one to clause allowed in access line\n", + fprintf( stderr, "%s: line %d: " + "only one to clause allowed in access line\n", fname, lineno ); acl_usage(); } @@ -120,7 +138,9 @@ parse_acl( } if ( strcasecmp( argv[i], "*" ) == 0 ) { - if( a->acl_dn_pat.bv_len != 0 ) { + if( a->acl_dn_pat.bv_len || + ( a->acl_dn_style != ACL_STYLE_REGEX ) ) + { fprintf( stderr, "%s: line %d: dn pattern" " already specified in to clause.\n", @@ -137,14 +157,16 @@ parse_acl( split( left, '.', &left, &style ); if ( right == NULL ) { - fprintf( stderr, - "%s: line %d: missing \"=\" in \"%s\" in to clause\n", + fprintf( stderr, "%s: line %d: " + "missing \"=\" in \"%s\" in to clause\n", fname, lineno, left ); acl_usage(); } if ( strcasecmp( left, "dn" ) == 0 ) { - if( a->acl_dn_pat.bv_len != 0 ) { + if( a->acl_dn_pat.bv_len != 0 || + ( a->acl_dn_style != ACL_STYLE_REGEX ) ) + { fprintf( stderr, "%s: line %d: dn pattern" " already specified in to clause.\n", @@ -152,9 +174,34 @@ parse_acl( acl_usage(); } - if ( style == NULL || *style == '\0' - || strcasecmp( style, "regex" ) == 0 ) + if ( style == NULL || *style == '\0' || + ( strcasecmp( style, "base" ) == 0 ) || + ( strcasecmp( style, "exact" ) == 0 )) { + a->acl_dn_style = ACL_STYLE_BASE; + ber_str2bv( right, 0, 1, &a->acl_dn_pat ); + + } else if ( strcasecmp( style, "one" ) == 0 ) { + a->acl_dn_style = ACL_STYLE_ONE; + ber_str2bv( right, 0, 1, &a->acl_dn_pat ); + + } else if ( strcasecmp( style, "subtree" ) == 0 + || strcasecmp( style, "sub" ) == 0 ) + { + if( *right == '\0' ) { + a->acl_dn_pat.bv_val = ch_strdup( "*" ); + a->acl_dn_pat.bv_len = 1; + + } else { + a->acl_dn_style = ACL_STYLE_SUBTREE; + ber_str2bv( right, 0, 1, &a->acl_dn_pat ); + } + + } else if ( strcasecmp( style, "children" ) == 0 ) { + a->acl_dn_style = ACL_STYLE_CHILDREN; + ber_str2bv( right, 0, 1, &a->acl_dn_pat ); + + } else if ( strcasecmp( style, "regex" ) == 0 ) { a->acl_dn_style = ACL_STYLE_REGEX; if ( *right == '\0' ) { @@ -166,7 +213,7 @@ parse_acl( || strcmp(right, ".*") == 0 || strcmp(right, ".*$") == 0 || strcmp(right, "^.*") == 0 - || strcmp(right, "^.*$$") == 0 + || strcmp(right, "^.*$") == 0 || strcmp(right, ".*$$") == 0 || strcmp(right, "^.*$$") == 0 ) { @@ -174,24 +221,12 @@ parse_acl( a->acl_dn_pat.bv_len = sizeof("*")-1; } else { - a->acl_dn_pat.bv_val = right; - acl_regex_normalized_dn( &a->acl_dn_pat ); + acl_regex_normalized_dn( right, &a->acl_dn_pat ); } - } else if ( strcasecmp( style, "base" ) == 0 ) { - a->acl_dn_style = ACL_STYLE_BASE; - ber_str2bv( right, 0, 1, &a->acl_dn_pat ); - } else if ( strcasecmp( style, "one" ) == 0 ) { - a->acl_dn_style = ACL_STYLE_ONE; - ber_str2bv( right, 0, 1, &a->acl_dn_pat ); - } else if ( strcasecmp( style, "subtree" ) == 0 ) { - a->acl_dn_style = ACL_STYLE_SUBTREE; - ber_str2bv( right, 0, 1, &a->acl_dn_pat ); - } else if ( strcasecmp( style, "children" ) == 0 ) { - a->acl_dn_style = ACL_STYLE_CHILDREN; - ber_str2bv( right, 0, 1, &a->acl_dn_pat ); + } else { - fprintf( stderr, - "%s: line %d: unknown dn style \"%s\" in to clause\n", + fprintf( stderr, "%s: line %d: " + "unknown dn style \"%s\" in to clause\n", fname, lineno, style ); acl_usage(); } @@ -200,8 +235,7 @@ parse_acl( } if ( strcasecmp( left, "filter" ) == 0 ) { - if ( (a->acl_filter = str2filter( - right )) == NULL ) { + if ( (a->acl_filter = str2filter( right )) == NULL ) { fprintf( stderr, "%s: line %d: bad filter \"%s\" in to clause\n", fname, lineno, right ); @@ -217,6 +251,37 @@ parse_acl( fname, lineno, right ); acl_usage(); } + + } else if ( strncasecmp( left, "val", 3 ) == 0 ) { + if ( a->acl_attrval.bv_len ) { + fprintf( stderr, + "%s: line %d: attr val already specified in to clause.\n", + fname, lineno ); + acl_usage(); + } + if ( a->acl_attrs == NULL || a->acl_attrs[1].an_name.bv_val ) { + fprintf( stderr, + "%s: line %d: attr val requires a single attribute.\n", + fname, lineno ); + acl_usage(); + } + ber_str2bv( right, 0, 1, &a->acl_attrval ); + if ( style && strcasecmp( style, "regex" ) == 0 ) { + int e = regcomp( &a->acl_attrval_re, a->acl_attrval.bv_val, + REG_EXTENDED | REG_ICASE | REG_NOSUB ); + if ( e ) { + char buf[512]; + regerror( e, &a->acl_attrval_re, buf, sizeof(buf) ); + fprintf( stderr, "%s: line %d: " + "regular expression \"%s\" bad because of %s\n", + fname, lineno, right, buf ); + acl_usage(); + } + a->acl_attrval_style = ACL_STYLE_REGEX; + } else { + a->acl_attrval_style = ACL_STYLE_BASE; + } + } else { fprintf( stderr, "%s: line %d: expecting got \"%s\"\n", @@ -226,17 +291,25 @@ parse_acl( } if ( a->acl_dn_pat.bv_len != 0 && - strcmp(a->acl_dn_pat.bv_val, "*") == 0) + strcmp(a->acl_dn_pat.bv_val, "*") == 0 ) { free( a->acl_dn_pat.bv_val ); a->acl_dn_pat.bv_val = NULL; a->acl_dn_pat.bv_len = 0; } - if( a->acl_dn_pat.bv_len != 0 ) { + if( a->acl_dn_pat.bv_len != 0 || + ( a->acl_dn_style != ACL_STYLE_REGEX ) ) + { if ( a->acl_dn_style != ACL_STYLE_REGEX ) { struct berval bv; - dnNormalize2( NULL, &a->acl_dn_pat, &bv); + rc = dnNormalize( 0, NULL, NULL, &a->acl_dn_pat, &bv, NULL); + if ( rc != LDAP_SUCCESS ) { + fprintf( stderr, + "%s: line %d: bad DN \"%s\" in to DN clause\n", + fname, lineno, a->acl_dn_pat.bv_val ); + acl_usage(); + } free( a->acl_dn_pat.bv_val ); a->acl_dn_pat = bv; } else { @@ -256,8 +329,8 @@ parse_acl( /* by clause - select who has what access to entries */ } else if ( strcasecmp( argv[i], "by" ) == 0 ) { if ( a == NULL ) { - fprintf( stderr, - "%s: line %d: to clause required before by clause in access line\n", + fprintf( stderr, "%s: line %d: " + "to clause required before by clause in access line\n", fname, lineno ); acl_usage(); } @@ -288,20 +361,27 @@ parse_acl( if ( style ) { split( style, ',', &style, &style_modifier); } - if ( style == NULL || *style == '\0' - || strcasecmp( style, "regex" ) == 0 ) + + if ( style == NULL || *style == '\0' || + strcasecmp( style, "exact" ) == 0 || + strcasecmp( style, "base" ) == 0 ) { - sty = ACL_STYLE_REGEX; - } else if ( strcasecmp( style, "exact" ) == 0 ) { - sty = ACL_STYLE_EXACT; - } else if ( strcasecmp( style, "base" ) == 0 ) { sty = ACL_STYLE_BASE; + } else if ( strcasecmp( style, "one" ) == 0 ) { sty = ACL_STYLE_ONE; - } else if ( strcasecmp( style, "subtree" ) == 0 ) { + + } else if ( strcasecmp( style, "subtree" ) == 0 || + strcasecmp( style, "sub" ) == 0 ) + { sty = ACL_STYLE_SUBTREE; + } else if ( strcasecmp( style, "children" ) == 0 ) { sty = ACL_STYLE_CHILDREN; + + } else if ( strcasecmp( style, "regex" ) == 0 ) { + sty = ACL_STYLE_REGEX; + } else { fprintf( stderr, "%s: line %d: unknown style \"%s\" in by clause\n", @@ -309,28 +389,28 @@ parse_acl( acl_usage(); } - if ( style_modifier && strcasecmp( style_modifier, "expand" ) == 0 ) { + if ( style_modifier && + strcasecmp( style_modifier, "expand" ) == 0 ) + { expand = 1; } if ( strcasecmp( argv[i], "*" ) == 0 ) { bv.bv_val = ch_strdup( "*" ); bv.bv_len = 1; + sty = ACL_STYLE_REGEX; } else if ( strcasecmp( argv[i], "anonymous" ) == 0 ) { - ber_str2bv("anonymous", - sizeof("anonymous")-1, - 1, &bv); + ber_str2bv("anonymous", sizeof("anonymous")-1, 1, &bv); + sty = ACL_STYLE_REGEX; } else if ( strcasecmp( argv[i], "self" ) == 0 ) { - ber_str2bv("self", - sizeof("self")-1, - 1, &bv); + ber_str2bv("self", sizeof("self")-1, 1, &bv); + sty = ACL_STYLE_REGEX; } else if ( strcasecmp( argv[i], "users" ) == 0 ) { - ber_str2bv("users", - sizeof("users")-1, - 1, &bv); + ber_str2bv("users", sizeof("users")-1, 1, &bv); + sty = ACL_STYLE_REGEX; } else if ( strcasecmp( left, "dn" ) == 0 ) { if ( sty == ACL_STYLE_REGEX ) { @@ -373,15 +453,15 @@ parse_acl( 1, &bv); } else { - bv.bv_val = right; - acl_regex_normalized_dn( &bv ); + acl_regex_normalized_dn( right, &bv ); if ( !ber_bvccmp( &bv, '*' ) ) { regtest(fname, lineno, bv.bv_val); } } } else if ( right == NULL || *right == '\0' ) { - fprintf( stderr, - "%s: line %d: missing \"=\" in (or value after) \"%s\" in by clause\n", + fprintf( stderr, "%s: line %d: " + "missing \"=\" in (or value after) \"%s\" " + "in by clause\n", fname, lineno, left ); acl_usage(); @@ -402,7 +482,14 @@ parse_acl( } if ( sty != ACL_STYLE_REGEX && expand == 0 ) { - dnNormalize2(NULL, &bv, &b->a_dn_pat); + rc = dnNormalize(0, NULL, NULL, + &bv, &b->a_dn_pat, NULL); + if ( rc != LDAP_SUCCESS ) { + fprintf( stderr, + "%s: line %d: bad DN \"%s\" in by DN clause\n", + fname, lineno, bv.bv_val ); + acl_usage(); + } free(bv.bv_val); } else { b->a_dn_pat = bv; @@ -450,6 +537,14 @@ parse_acl( acl_usage(); } + if( b->a_dn_at->ad_type->sat_equality == NULL ) { + fprintf( stderr, + "%s: line %d: dnattr \"%s\": " + "inappropriate matching (no EQUALITY)\n", + fname, lineno, right ); + acl_usage(); + } + continue; } @@ -458,15 +553,16 @@ parse_acl( char *value = NULL; if (sty != ACL_STYLE_REGEX && sty != ACL_STYLE_BASE) { - fprintf( stderr, - "%s: line %d: inappropriate style \"%s\" in by clause\n", + fprintf( stderr, "%s: line %d: " + "inappropriate style \"%s\" in by clause\n", fname, lineno, style ); acl_usage(); } if ( right == NULL || right[ 0 ] == '\0' ) { - fprintf( stderr, - "%s: line %d: missing \"=\" in (or value after) \"%s\" in by clause\n", + fprintf( stderr, "%s: line %d: " + "missing \"=\" in (or value after) \"%s\" " + "in by clause\n", fname, lineno, left ); acl_usage(); } @@ -478,27 +574,32 @@ parse_acl( acl_usage(); } - /* format of string is "group/objectClassValue/groupAttrName" */ + /* format of string is + "group/objectClassValue/groupAttrName" */ if ((value = strchr(left, '/')) != NULL) { *value++ = '\0'; - if (*value - && (name = strchr(value, '/')) != NULL) - { + if (*value && (name = strchr(value, '/')) != NULL) { *name++ = '\0'; } } b->a_group_style = sty; if (sty == ACL_STYLE_REGEX) { - bv.bv_val = right; - acl_regex_normalized_dn( &bv ); + acl_regex_normalized_dn( right, &bv ); if ( !ber_bvccmp( &bv, '*' ) ) { regtest(fname, lineno, bv.bv_val); } b->a_group_pat = bv; } else { ber_str2bv( right, 0, 0, &bv ); - dnNormalize2( NULL, &bv, &b->a_group_pat ); + rc = dnNormalize( 0, NULL, NULL, &bv, + &b->a_group_pat, NULL ); + if ( rc != LDAP_SUCCESS ) { + fprintf( stderr, + "%s: line %d: bad DN \"%s\"\n", + fname, lineno, right ); + acl_usage(); + } } if (value && *value) { @@ -568,7 +669,8 @@ parse_acl( if( !is_at_syntax( b->a_group_at->ad_type, SLAPD_DN_SYNTAX ) && !is_at_syntax( b->a_group_at->ad_type, - SLAPD_NAMEUID_SYNTAX ) ) + SLAPD_NAMEUID_SYNTAX ) && + !is_at_subtype( b->a_group_at->ad_type, slap_schema.si_ad_labeledURI->ad_type )) { fprintf( stderr, "%s: line %d: group \"%s\": inappropriate syntax: %s\n", @@ -587,11 +689,12 @@ parse_acl( vals[1].bv_val = NULL; - rc = oc_check_allowed( b->a_group_at->ad_type, vals, NULL ); + rc = oc_check_allowed( b->a_group_at->ad_type, + vals, NULL ); if( rc != 0 ) { - fprintf( stderr, - "%s: line %d: group: \"%s\" not allowed by \"%s\"\n", + fprintf( stderr, "%s: line %d: " + "group: \"%s\" not allowed by \"%s\"\n", fname, lineno, b->a_group_at->ad_cname.bv_val, b->a_group_oc->soc_oid ); @@ -603,30 +706,30 @@ parse_acl( if ( strcasecmp( left, "peername" ) == 0 ) { if (sty != ACL_STYLE_REGEX && sty != ACL_STYLE_BASE) { - fprintf( stderr, - "%s: line %d: inappropriate style \"%s\" in by clause\n", + fprintf( stderr, "%s: line %d: " + "inappropriate style \"%s\" in by clause\n", fname, lineno, style ); acl_usage(); } if ( right == NULL || right[ 0 ] == '\0' ) { - fprintf( stderr, - "%s: line %d: missing \"=\" in (or value after) \"%s\" in by clause\n", + fprintf( stderr, "%s: line %d: " + "missing \"=\" in (or value after) \"%s\" " + "in by clause\n", fname, lineno, left ); acl_usage(); } if( b->a_peername_pat.bv_len ) { - fprintf( stderr, - "%s: line %d: peername pattern already specified.\n", + fprintf( stderr, "%s: line %d: " + "peername pattern already specified.\n", fname, lineno ); acl_usage(); } b->a_peername_style = sty; if (sty == ACL_STYLE_REGEX) { - bv.bv_val = right; - acl_regex_normalized_dn( &bv ); + acl_regex_normalized_dn( right, &bv ); if ( !ber_bvccmp( &bv, '*' ) ) { regtest(fname, lineno, bv.bv_val); } @@ -639,30 +742,30 @@ parse_acl( if ( strcasecmp( left, "sockname" ) == 0 ) { if (sty != ACL_STYLE_REGEX && sty != ACL_STYLE_BASE) { - fprintf( stderr, - "%s: line %d: inappropriate style \"%s\" in by clause\n", + fprintf( stderr, "%s: line %d: " + "inappropriate style \"%s\" in by clause\n", fname, lineno, style ); acl_usage(); } if ( right == NULL || right[ 0 ] == '\0' ) { - fprintf( stderr, - "%s: line %d: missing \"=\" in (or value after) \"%s\" in by clause\n", + fprintf( stderr, "%s: line %d: " + "missing \"=\" in (or value after) \"%s\" " + "in by clause\n", fname, lineno, left ); acl_usage(); } if( b->a_sockname_pat.bv_len ) { - fprintf( stderr, - "%s: line %d: sockname pattern already specified.\n", + fprintf( stderr, "%s: line %d: " + "sockname pattern already specified.\n", fname, lineno ); acl_usage(); } b->a_sockname_style = sty; if (sty == ACL_STYLE_REGEX) { - bv.bv_val = right; - acl_regex_normalized_dn( &bv ); + acl_regex_normalized_dn( right, &bv ); if ( !ber_bvccmp( &bv, '*' ) ) { regtest(fname, lineno, bv.bv_val); } @@ -704,8 +807,7 @@ parse_acl( b->a_domain_style = sty; b->a_domain_expand = expand; if (sty == ACL_STYLE_REGEX) { - bv.bv_val = right; - acl_regex_normalized_dn( &bv ); + acl_regex_normalized_dn( right, &bv ); if ( !ber_bvccmp( &bv, '*' ) ) { regtest(fname, lineno, bv.bv_val); } @@ -740,8 +842,7 @@ parse_acl( b->a_sockurl_style = sty; if (sty == ACL_STYLE_REGEX) { - bv.bv_val = right; - acl_regex_normalized_dn( &bv ); + acl_regex_normalized_dn( right, &bv ); if ( !ber_bvccmp( &bv, '*' ) ) { regtest(fname, lineno, bv.bv_val); } @@ -1092,24 +1193,24 @@ accessmask2str( slap_mask_t mask, char *buf ) if ( ACL_IS_LEVEL( mask ) ) { if ( ACL_LVL_IS_NONE(mask) ) { - ptr = slap_strcopy( ptr, "none" ); + ptr = lutil_strcopy( ptr, "none" ); } else if ( ACL_LVL_IS_AUTH(mask) ) { - ptr = slap_strcopy( ptr, "auth" ); + ptr = lutil_strcopy( ptr, "auth" ); } else if ( ACL_LVL_IS_COMPARE(mask) ) { - ptr = slap_strcopy( ptr, "compare" ); + ptr = lutil_strcopy( ptr, "compare" ); } else if ( ACL_LVL_IS_SEARCH(mask) ) { - ptr = slap_strcopy( ptr, "search" ); + ptr = lutil_strcopy( ptr, "search" ); } else if ( ACL_LVL_IS_READ(mask) ) { - ptr = slap_strcopy( ptr, "read" ); + ptr = lutil_strcopy( ptr, "read" ); } else if ( ACL_LVL_IS_WRITE(mask) ) { - ptr = slap_strcopy( ptr, "write" ); + ptr = lutil_strcopy( ptr, "write" ); } else { - ptr = slap_strcopy( ptr, "unknown" ); + ptr = lutil_strcopy( ptr, "unknown" ); } *ptr++ = '('; @@ -1243,52 +1344,52 @@ str2accessmask( const char *str ) static void acl_usage( void ) { - fprintf( stderr, "\n" + fprintf( stderr, "%s%s\n", " ::= access to " "[ by [ ] ]+ \n" - " ::= * | [dn[.]=] [filter=] [attrs=]\n" - " ::= | , \n" + " ::= * | [dn[.]=] [filter=] [attrs=]\n" + " ::= [val[.