openldap/clients/tools/ldapwhoami.c

171 lines
3.1 KiB
C
Raw Normal View History

2002-01-29 05:24:40 +08:00
/* $OpenLDAP$ */
/*
* Copyright 1998-2002 The OpenLDAP Foundation, All Rights Reserved.
* COPYING RESTRICTIONS APPLY, see COPYRIGHT file
*/
#include "portable.h"
#include <stdio.h>
#include <ac/stdlib.h>
#include <ac/ctype.h>
#include <ac/socket.h>
#include <ac/string.h>
#include <ac/time.h>
#include <ac/unistd.h>
#include <ldap.h>
#include "lutil.h"
2002-01-29 05:24:40 +08:00
#include "lutil_ldap.h"
#include "ldap_defaults.h"
#include "common.h"
2002-01-29 05:24:40 +08:00
void
usage( void )
2002-01-29 05:24:40 +08:00
{
fprintf(stderr,
"Issue LDAP Who am I? operation to request user's authzid\n\n"
"usage: %s [options]\n"
, prog);
tool_common_usage();
2002-01-29 05:24:40 +08:00
exit( EXIT_FAILURE );
}
const char options[] = "Cd:D:e:h:H:InO:p:QR:U:vw:WxX:y:Y:Z";
2002-01-29 05:24:40 +08:00
int
handle_private_option( int i )
{
switch ( i ) {
#if 0
char *control, *cvalue;
int crit;
case 'E': /* whoami controls */
if( version == LDAP_VERSION2 ) {
fprintf( stderr, "%s: -E incompatible with LDAPv%d\n",
prog, version );
exit( EXIT_FAILURE );
}
/* should be extended to support comma separated list of
* [!]key[=value] parameters, e.g. -E !foo,bar=567
*/
crit = 0;
cvalue = NULL;
if( optarg[0] == '!' ) {
crit = 1;
optarg++;
}
control = strdup( optarg );
if ( (cvalue = strchr( control, '=' )) != NULL ) {
*cvalue++ = '\0';
}
fprintf( stderr, "Invalid whoami control name: %s\n", control );
usage();
#endif
default:
return 0;
}
return 1;
}
2002-08-30 13:43:47 +08:00
int
main( int argc, char *argv[] )
{
int rc;
char *user = NULL;
2002-01-29 05:24:40 +08:00
LDAP *ld = NULL;
2002-01-29 05:24:40 +08:00
char *matcheddn = NULL, *text = NULL, **refs = NULL;
char *retoid = NULL;
struct berval *retdata = NULL;
2002-01-29 05:24:40 +08:00
prog = lutil_progname( "ldapwhoami", argc, argv );
2002-01-29 05:24:40 +08:00
/* LDAPv3 only */
version = LDAP_VERSION3;
2002-01-29 05:24:40 +08:00
tool_args( argc, argv );
2002-01-29 05:24:40 +08:00
if( argc - optind > 1 ) {
usage();
2002-01-29 05:24:40 +08:00
} else if ( argc - optind == 1 ) {
user = strdup( argv[optind] );
} else {
user = NULL;
}
Patch: 'ldapmodify -y file' reads password from file (ITS#2031) ================ Written by Hallvard B. Furuseth and placed into the public domain. This software is not subject to any license of the University of Oslo. ================ Adapted by Kurt Zeilenga for inclusion in OpenLDAP. My comments are marked with enclosed with square brackets (e.g. [Kurt's comment] below. ================ If I run ldapmodify & co from a script, I don't want to use '-W password' because the password shows up in the output of 'ps' for everyone, and I can't pipe the password to 'ldapmodify -w' because -w uses getpassphrase() which reads from the tty instead of stdin. So I added '-y file' which reads the password from file. The programs exit if the file cannot be read. [Complete contents of file is used as password. Use: echo -n "secret" > password to create a file with "secret" as the password. The -n avoids adding a newline (which would invalidate the password). Note that echo is a builtin and hence its arguments are not visible to 'ps'.] I changed ldapmodify, ldapmodrdn, ldapdelete, ldapsearch, ldapcompare. I did not bother to change ldappasswd and ldapwhoami, because they prompt for many passwords. [I fixed up ldapwhoami.] Rerun autoconf after applying this patch. [Done.] Note: I do not know if Windows NT has fstat(), so I set HAVE_FSTAT to undef in portable.nt. (fstat() is used to warn if the file is publicly readable or writeable.) [I used fstat() to set the buffer size to read.] [Note: using the contents of a file extends the tools to support passwords which could not normally be provided using getpassphrase() or via the command line.] Hallvard B. Furuseth <h.b.furuseth@usit.uio.no>, Aug 2002. [Kurt D. Zeilenga <kurt@openldap.org>, Aug 2002.]
2002-08-24 13:47:17 +08:00
if ( pw_file || want_bindpw ) {
if ( pw_file ) {
rc = lutil_get_filed_password( pw_file, &passwd );
if( rc ) return EXIT_FAILURE;
} else {
passwd.bv_val = getpassphrase( "Enter LDAP Password: " );
passwd.bv_len = passwd.bv_val ? strlen( passwd.bv_val ) : 0;
2002-01-29 05:24:40 +08:00
}
}
ld = tool_conn_setup( 0, 0 );
2002-01-29 05:24:40 +08:00
tool_bind( ld );
2002-01-29 05:24:40 +08:00
if ( not ) {
rc = LDAP_SUCCESS;
goto skip;
}
if ( authzid || manageDSAit || noop )
tool_server_controls( ld, NULL, 0 );
rc = ldap_whoami_s( ld, &retdata, NULL, NULL );
2002-01-29 05:24:40 +08:00
if( retdata != NULL ) {
if( retdata->bv_len == 0 ) {
printf("anonymous\n" );
} else {
printf("%s\n", retdata->bv_val );
}
}
2002-11-28 11:14:54 +08:00
if( verbose || ( rc != LDAP_SUCCESS ) || matcheddn || text || refs ) {
printf( "Result: %s (%d)\n", ldap_err2string( rc ), rc );
2002-01-29 05:24:40 +08:00
if( text && *text ) {
printf( "Additional info: %s\n", text );
}
if( matcheddn && *matcheddn ) {
printf( "Matched DN: %s\n", matcheddn );
}
if( refs ) {
int i;
for( i=0; refs[i]; i++ ) {
printf("Referral: %s\n", refs[i] );
}
}
}
ber_memfree( text );
ber_memfree( matcheddn );
ber_memvfree( (void **) refs );
ber_memfree( retoid );
ber_bvfree( retdata );
skip:
/* disconnect from server */
ldap_unbind (ld);
2002-11-28 11:14:54 +08:00
return rc == LDAP_SUCCESS ? EXIT_SUCCESS : EXIT_FAILURE;
2002-01-29 05:24:40 +08:00
}