mirror of
https://git.openldap.org/openldap/openldap.git
synced 2025-01-06 10:46:21 +08:00
Added ldapdb_axuprop_store for use with Cyrus SASL 2.1.16+
This commit is contained in:
parent
0bc23d571e
commit
0132af8433
@ -5,10 +5,12 @@ This software is licensed under the terms of the OpenLDAP license.
|
|||||||
|
|
||||||
The file ldapdb.c was written for Cyrus SASL 2.1.3 and OpenLDAP 2.1.3.
|
The file ldapdb.c was written for Cyrus SASL 2.1.3 and OpenLDAP 2.1.3.
|
||||||
Due to various bugs in the Cyrus source you should use Cyrus SASL 2.1.15
|
Due to various bugs in the Cyrus source you should use Cyrus SASL 2.1.15
|
||||||
or newer. The version of ldapdb bundled with OpenLDAP 2.1.22 and older
|
or newer. You need at least Cyrus SASL 2.1.16 to use the auxprop-store
|
||||||
will work with all OpenLDAP releases 2.1.3 and up. The ldapdb in
|
functionality.
|
||||||
OpenLDAP 2.1.23 uses a different LDAP request and requires the server
|
|
||||||
to be 2.1.23 or newer.
|
The version of ldapdb bundled with OpenLDAP 2.1.22 and older will work
|
||||||
|
with all OpenLDAP releases 2.1.3 and up. The ldapdb in OpenLDAP 2.1.23
|
||||||
|
uses a different LDAP request and requires the server to be 2.1.23 or newer.
|
||||||
|
|
||||||
It can be compiled by copying into the Cyrus SASL source tree, in the
|
It can be compiled by copying into the Cyrus SASL source tree, in the
|
||||||
plugins subdirectory. No configuration or build script is provided.
|
plugins subdirectory. No configuration or build script is provided.
|
||||||
|
@ -78,6 +78,70 @@ static int ldapdb_interact(LDAP *ld, unsigned flags __attribute__((unused)),
|
|||||||
return LDAP_SUCCESS;
|
return LDAP_SUCCESS;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
typedef struct connparm {
|
||||||
|
LDAP *ld;
|
||||||
|
LDAPControl c;
|
||||||
|
LDAPControl *ctrl[2];
|
||||||
|
struct berval *dn;
|
||||||
|
} connparm;
|
||||||
|
|
||||||
|
static int ldapdb_connect(ldapctx *ctx, sasl_server_params_t *sparams,
|
||||||
|
const char *user, unsigned ulen, connparm *cp)
|
||||||
|
{
|
||||||
|
int i;
|
||||||
|
gluectx gc;
|
||||||
|
char *authzid;
|
||||||
|
|
||||||
|
if((i=ldap_initialize(&cp->ld, ctx->uri))) {
|
||||||
|
return i;
|
||||||
|
}
|
||||||
|
|
||||||
|
authzid = sparams->utils->malloc(ulen + sizeof("u:"));
|
||||||
|
if (!authzid) {
|
||||||
|
return LDAP_NO_MEMORY;
|
||||||
|
}
|
||||||
|
strcpy(authzid, "u:");
|
||||||
|
strcpy(authzid+2, user);
|
||||||
|
cp->c.ldctl_oid = LDAP_CONTROL_PROXY_AUTHZ;
|
||||||
|
cp->c.ldctl_value.bv_val = authzid;
|
||||||
|
cp->c.ldctl_value.bv_len = ulen + 2;
|
||||||
|
cp->c.ldctl_iscritical = 1;
|
||||||
|
|
||||||
|
i = LDAP_VERSION3;
|
||||||
|
ldap_set_option(cp->ld, LDAP_OPT_PROTOCOL_VERSION, &i);
|
||||||
|
|
||||||
|
/* If TLS is set and it fails, continue or bail out as requested */
|
||||||
|
if (ctx->use_tls && (i=ldap_start_tls_s(cp->ld, NULL, NULL)) != LDAP_SUCCESS
|
||||||
|
&& ctx->use_tls > 1) {
|
||||||
|
sparams->utils->free(authzid);
|
||||||
|
return i;
|
||||||
|
}
|
||||||
|
|
||||||
|
gc.lc = ctx;
|
||||||
|
gc.lp = sparams;
|
||||||
|
i = ldap_sasl_interactive_bind_s(cp->ld, NULL, ctx->mech.bv_val, NULL,
|
||||||
|
NULL, LDAP_SASL_QUIET, ldapdb_interact, &gc);
|
||||||
|
if (i != LDAP_SUCCESS) {
|
||||||
|
sparams->utils->free(authzid);
|
||||||
|
return i;
|
||||||
|
}
|
||||||
|
|
||||||
|
cp->ctrl[0] = &cp->c;
|
||||||
|
cp->ctrl[1] = NULL;
|
||||||
|
i = ldap_whoami_s(cp->ld, &cp->dn, cp->ctrl, NULL);
|
||||||
|
if (i == LDAP_SUCCESS && cp->dn) {
|
||||||
|
if (!cp->dn->bv_val || strncmp(cp->dn->bv_val, "dn:", 3)) {
|
||||||
|
ber_bvfree(cp->dn);
|
||||||
|
cp->dn = NULL;
|
||||||
|
i = LDAP_INVALID_SYNTAX;
|
||||||
|
} else {
|
||||||
|
cp->c.ldctl_value = *(cp->dn);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
sparams->utils->free(authzid);
|
||||||
|
return i;
|
||||||
|
}
|
||||||
|
|
||||||
static void ldapdb_auxprop_lookup(void *glob_context,
|
static void ldapdb_auxprop_lookup(void *glob_context,
|
||||||
sasl_server_params_t *sparams,
|
sasl_server_params_t *sparams,
|
||||||
unsigned flags,
|
unsigned flags,
|
||||||
@ -85,14 +149,12 @@ static void ldapdb_auxprop_lookup(void *glob_context,
|
|||||||
unsigned ulen)
|
unsigned ulen)
|
||||||
{
|
{
|
||||||
ldapctx *ctx = glob_context;
|
ldapctx *ctx = glob_context;
|
||||||
|
connparm cp;
|
||||||
int ret, i, n, *aindx;
|
int ret, i, n, *aindx;
|
||||||
const struct propval *pr;
|
const struct propval *pr;
|
||||||
LDAP *ld = NULL;
|
struct berval **bvals;
|
||||||
gluectx gc;
|
|
||||||
struct berval *dn = NULL, **bvals;
|
|
||||||
LDAPMessage *msg, *res;
|
LDAPMessage *msg, *res;
|
||||||
char **attrs = NULL, *authzid = NULL;
|
char **attrs = NULL;
|
||||||
LDAPControl c, *ctrl[2];
|
|
||||||
|
|
||||||
if(!ctx || !sparams || !user) return;
|
if(!ctx || !sparams || !user) return;
|
||||||
|
|
||||||
@ -128,57 +190,23 @@ static void ldapdb_auxprop_lookup(void *glob_context,
|
|||||||
n++;
|
n++;
|
||||||
}
|
}
|
||||||
attrs[n] = NULL;
|
attrs[n] = NULL;
|
||||||
|
|
||||||
if(ldap_initialize(&ld, ctx->uri)) {
|
if(ldapdb_connect(ctx, sparams, user, ulen, &cp)) {
|
||||||
sparams->utils->free(attrs);
|
goto done;
|
||||||
return;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
authzid = sparams->utils->malloc(ulen + sizeof("u:"));
|
ret = ldap_search_ext_s(cp.ld, cp.dn->bv_val+3, LDAP_SCOPE_BASE,
|
||||||
if (!authzid) goto done;
|
"(objectclass=*)", attrs, 0, cp.ctrl, NULL, NULL, 1, &res);
|
||||||
strcpy(authzid, "u:");
|
ber_bvfree(cp.dn);
|
||||||
strcpy(authzid+2, user);
|
|
||||||
c.ldctl_oid = LDAP_CONTROL_PROXY_AUTHZ;
|
|
||||||
c.ldctl_value.bv_val = authzid;
|
|
||||||
c.ldctl_value.bv_len = ulen + 2;
|
|
||||||
c.ldctl_iscritical = 1;
|
|
||||||
|
|
||||||
i = LDAP_VERSION3;
|
|
||||||
ret = ldap_set_option(ld, LDAP_OPT_PROTOCOL_VERSION, &i);
|
|
||||||
|
|
||||||
/* If TLS is set and it fails, continue or bail out as requested */
|
|
||||||
if (ctx->use_tls && ldap_start_tls_s(ld, NULL, NULL) != LDAP_SUCCESS) {
|
|
||||||
if (ctx->use_tls > 1) goto done;
|
|
||||||
}
|
|
||||||
|
|
||||||
gc.lc = ctx;
|
|
||||||
gc.lp = sparams;
|
|
||||||
ret = ldap_sasl_interactive_bind_s(ld, NULL, ctx->mech.bv_val, NULL, NULL,
|
|
||||||
LDAP_SASL_QUIET, ldapdb_interact, &gc);
|
|
||||||
if (ret != LDAP_SUCCESS) goto done;
|
|
||||||
|
|
||||||
ctrl[0] = &c;
|
|
||||||
ctrl[1] = NULL;
|
|
||||||
ret = ldap_whoami_s(ld, &dn, ctrl, NULL);
|
|
||||||
if (ret != LDAP_SUCCESS || !dn) goto done;
|
|
||||||
|
|
||||||
if (!dn->bv_val || strncmp(dn->bv_val, "dn:", 3)) {
|
|
||||||
ber_bvfree(dn);
|
|
||||||
goto done;
|
|
||||||
}
|
|
||||||
c.ldctl_value = *dn;
|
|
||||||
ret = ldap_search_ext_s(ld, dn->bv_val+3, LDAP_SCOPE_BASE,
|
|
||||||
"(objectclass=*)", attrs, 0, ctrl, NULL, NULL, 1, &res);
|
|
||||||
ber_bvfree(dn);
|
|
||||||
|
|
||||||
if (ret != LDAP_SUCCESS) goto done;
|
if (ret != LDAP_SUCCESS) goto done;
|
||||||
|
|
||||||
for(msg=ldap_first_message(ld, res); msg; msg=ldap_next_message(ld, msg))
|
for(msg=ldap_first_message(cp.ld, res); msg; msg=ldap_next_message(cp.ld, msg))
|
||||||
{
|
{
|
||||||
if (ldap_msgtype(msg) != LDAP_RES_SEARCH_ENTRY) continue;
|
if (ldap_msgtype(msg) != LDAP_RES_SEARCH_ENTRY) continue;
|
||||||
for (i=0; i<n; i++)
|
for (i=0; i<n; i++)
|
||||||
{
|
{
|
||||||
bvals = ldap_get_values_len(ld, msg, attrs[i]);
|
bvals = ldap_get_values_len(cp.ld, msg, attrs[i]);
|
||||||
if (!bvals) continue;
|
if (!bvals) continue;
|
||||||
if (pr[aindx[i]].values)
|
if (pr[aindx[i]].values)
|
||||||
sparams->utils->prop_erase(sparams->propctx, pr[aindx[i]].name);
|
sparams->utils->prop_erase(sparams->propctx, pr[aindx[i]].name);
|
||||||
@ -190,9 +218,60 @@ static void ldapdb_auxprop_lookup(void *glob_context,
|
|||||||
ldap_msgfree(res);
|
ldap_msgfree(res);
|
||||||
|
|
||||||
done:
|
done:
|
||||||
if(authzid) sparams->utils->free(authzid);
|
|
||||||
if(attrs) sparams->utils->free(attrs);
|
if(attrs) sparams->utils->free(attrs);
|
||||||
if(ld) ldap_unbind(ld);
|
if(cp.ld) ldap_unbind(cp.ld);
|
||||||
|
}
|
||||||
|
|
||||||
|
static int ldapdb_auxprop_store(void *glob_context,
|
||||||
|
sasl_server_params_t *sparams,
|
||||||
|
struct propctx *prctx,
|
||||||
|
const char *user,
|
||||||
|
unsigned ulen)
|
||||||
|
{
|
||||||
|
ldapctx *ctx = glob_context;
|
||||||
|
connparm cp;
|
||||||
|
const struct propval *pr;
|
||||||
|
int i, n;
|
||||||
|
LDAPMod **mods;
|
||||||
|
|
||||||
|
/* just checking if we are enabled */
|
||||||
|
if (!prctx) return SASL_OK;
|
||||||
|
|
||||||
|
if (!sparams || !user) return SASL_BADPARAM;
|
||||||
|
|
||||||
|
pr = sparams->utils->prop_get(prctx);
|
||||||
|
if (!pr) return SASL_BADPARAM;
|
||||||
|
|
||||||
|
for (n=0; pr[n].name; n++);
|
||||||
|
if (!n) return SASL_BADPARAM;
|
||||||
|
|
||||||
|
mods = sparams->utils->malloc((n+1) * sizeof(LDAPMod*) + n * sizeof(LDAPMod));
|
||||||
|
if (!mods) return SASL_NOMEM;
|
||||||
|
|
||||||
|
if((i=ldapdb_connect(ctx, sparams, user, ulen, &cp)) == 0) {
|
||||||
|
|
||||||
|
for (i=0; i<n; i++) {
|
||||||
|
mods[i] = (LDAPMod *)((char *)(mods+n+1) + i * sizeof(LDAPMod));
|
||||||
|
mods[i]->mod_op = LDAP_MOD_REPLACE;
|
||||||
|
mods[i]->mod_type = (char *)pr[i].name;
|
||||||
|
mods[i]->mod_values = (char **)pr[i].values;
|
||||||
|
}
|
||||||
|
mods[i] = NULL;
|
||||||
|
|
||||||
|
i = ldap_modify_ext_s(cp.ld, cp.dn->bv_val+3, mods, cp.ctrl, NULL);
|
||||||
|
ber_bvfree(cp.dn);
|
||||||
|
}
|
||||||
|
|
||||||
|
sparams->utils->free(mods);
|
||||||
|
|
||||||
|
if (i) {
|
||||||
|
sparams->utils->seterror(sparams->utils->conn, 0,
|
||||||
|
ldap_err2string(i));
|
||||||
|
if (i == LDAP_NO_MEMORY) i = SASL_NOMEM;
|
||||||
|
else i = SASL_FAIL;
|
||||||
|
}
|
||||||
|
if (cp.ld) ldap_unbind(cp.ld);
|
||||||
|
return i;
|
||||||
}
|
}
|
||||||
|
|
||||||
static void ldapdb_auxprop_free(void *glob_ctx, const sasl_utils_t *utils)
|
static void ldapdb_auxprop_free(void *glob_ctx, const sasl_utils_t *utils)
|
||||||
@ -205,9 +284,9 @@ static sasl_auxprop_plug_t ldapdb_auxprop_plugin = {
|
|||||||
0, /* spare */
|
0, /* spare */
|
||||||
NULL, /* glob_context */
|
NULL, /* glob_context */
|
||||||
ldapdb_auxprop_free, /* auxprop_free */
|
ldapdb_auxprop_free, /* auxprop_free */
|
||||||
ldapdb_auxprop_lookup, /* auxprop_lookup */
|
ldapdb_auxprop_lookup, /* auxprop_lookup */
|
||||||
ldapdb, /* name */
|
ldapdb, /* name */
|
||||||
NULL /* spare */
|
ldapdb_auxprop_store /* spare if <2.1.16*/
|
||||||
};
|
};
|
||||||
|
|
||||||
static int ldapdb_auxprop_plug_init(const sasl_utils_t *utils,
|
static int ldapdb_auxprop_plug_init(const sasl_utils_t *utils,
|
||||||
|
Loading…
Reference in New Issue
Block a user