mirror of
https://git.openldap.org/openldap/openldap.git
synced 2024-12-21 03:10:25 +08:00
1538 lines
37 KiB
C
1538 lines
37 KiB
C
/* unique.c - attribute uniqueness module */
|
|
/* $OpenLDAP$ */
|
|
/* This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
|
*
|
|
* Copyright 2004-2020 The OpenLDAP Foundation.
|
|
* Portions Copyright 2004,2006-2007 Symas Corporation.
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted only as authorized by the OpenLDAP
|
|
* Public License.
|
|
*
|
|
* A copy of this license is available in the file LICENSE in the
|
|
* top-level directory of the distribution or, alternatively, at
|
|
* <http://www.OpenLDAP.org/license.html>.
|
|
*/
|
|
/* ACKNOWLEDGEMENTS:
|
|
* This work was initially developed by Symas Corporation for
|
|
* inclusion in OpenLDAP Software, with subsequent enhancements by
|
|
* Emily Backes at Symas Corporation. This work was sponsored by
|
|
* Hewlett-Packard.
|
|
*/
|
|
|
|
#include "portable.h"
|
|
|
|
#ifdef SLAPD_OVER_UNIQUE
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <ac/string.h>
|
|
#include <ac/socket.h>
|
|
|
|
#include "slap.h"
|
|
#include "config.h"
|
|
|
|
#define UNIQUE_DEFAULT_URI ("ldap:///??sub")
|
|
|
|
static slap_overinst unique;
|
|
|
|
typedef struct unique_attrs_s {
|
|
struct unique_attrs_s *next; /* list of attrs */
|
|
AttributeDescription *attr;
|
|
} unique_attrs;
|
|
|
|
typedef struct unique_domain_uri_s {
|
|
struct unique_domain_uri_s *next;
|
|
struct berval dn;
|
|
struct berval ndn;
|
|
struct berval filter;
|
|
Filter *f;
|
|
struct unique_attrs_s *attrs;
|
|
int scope;
|
|
} unique_domain_uri;
|
|
|
|
typedef struct unique_domain_s {
|
|
struct unique_domain_s *next;
|
|
struct berval domain_spec;
|
|
struct unique_domain_uri_s *uri;
|
|
char ignore; /* polarity of attributes */
|
|
char strict; /* null considered unique too */
|
|
char serial; /* serialize execution */
|
|
} unique_domain;
|
|
|
|
typedef struct unique_data_s {
|
|
struct unique_domain_s *domains;
|
|
struct unique_domain_s *legacy;
|
|
char legacy_strict_set;
|
|
ldap_pvt_thread_mutex_t serial_mutex;
|
|
} unique_data;
|
|
|
|
typedef struct unique_counter_s {
|
|
struct berval *ndn;
|
|
int count;
|
|
} unique_counter;
|
|
|
|
enum {
|
|
UNIQUE_BASE = 1,
|
|
UNIQUE_IGNORE,
|
|
UNIQUE_ATTR,
|
|
UNIQUE_STRICT,
|
|
UNIQUE_URI,
|
|
};
|
|
|
|
static ConfigDriver unique_cf_base;
|
|
static ConfigDriver unique_cf_attrs;
|
|
static ConfigDriver unique_cf_strict;
|
|
static ConfigDriver unique_cf_uri;
|
|
|
|
static ConfigTable uniquecfg[] = {
|
|
{ "unique_base", "basedn", 2, 2, 0, ARG_DN|ARG_MAGIC|UNIQUE_BASE,
|
|
unique_cf_base, "( OLcfgOvAt:10.1 NAME 'olcUniqueBase' "
|
|
"DESC 'Subtree for uniqueness searches' "
|
|
"EQUALITY distinguishedNameMatch "
|
|
"SYNTAX OMsDN SINGLE-VALUE )", NULL, NULL },
|
|
{ "unique_ignore", "attribute...", 2, 0, 0, ARG_MAGIC|UNIQUE_IGNORE,
|
|
unique_cf_attrs, "( OLcfgOvAt:10.2 NAME 'olcUniqueIgnore' "
|
|
"DESC 'Attributes for which uniqueness shall not be enforced' "
|
|
"EQUALITY caseIgnoreMatch "
|
|
"ORDERING caseIgnoreOrderingMatch "
|
|
"SUBSTR caseIgnoreSubstringsMatch "
|
|
"SYNTAX OMsDirectoryString )", NULL, NULL },
|
|
{ "unique_attributes", "attribute...", 2, 0, 0, ARG_MAGIC|UNIQUE_ATTR,
|
|
unique_cf_attrs, "( OLcfgOvAt:10.3 NAME 'olcUniqueAttribute' "
|
|
"DESC 'Attributes for which uniqueness shall be enforced' "
|
|
"EQUALITY caseIgnoreMatch "
|
|
"ORDERING caseIgnoreOrderingMatch "
|
|
"SUBSTR caseIgnoreSubstringsMatch "
|
|
"SYNTAX OMsDirectoryString )", NULL, NULL },
|
|
{ "unique_strict", "on|off", 1, 2, 0, ARG_MAGIC|UNIQUE_STRICT,
|
|
unique_cf_strict, "( OLcfgOvAt:10.4 NAME 'olcUniqueStrict' "
|
|
"DESC 'Enforce uniqueness of null values' "
|
|
"EQUALITY booleanMatch "
|
|
"SYNTAX OMsBoolean SINGLE-VALUE )", NULL, NULL },
|
|
{ "unique_uri", "ldapuri", 2, 3, 0, ARG_MAGIC|UNIQUE_URI,
|
|
unique_cf_uri, "( OLcfgOvAt:10.5 NAME 'olcUniqueURI' "
|
|
"DESC 'List of keywords and LDAP URIs for a uniqueness domain' "
|
|
"EQUALITY caseExactMatch "
|
|
"ORDERING caseExactOrderingMatch "
|
|
"SUBSTR caseExactSubstringsMatch "
|
|
"SYNTAX OMsDirectoryString )", NULL, NULL },
|
|
{ NULL, NULL, 0, 0, 0, ARG_IGNORED }
|
|
};
|
|
|
|
static ConfigOCs uniqueocs[] = {
|
|
{ "( OLcfgOvOc:10.1 "
|
|
"NAME 'olcUniqueConfig' "
|
|
"DESC 'Attribute value uniqueness configuration' "
|
|
"SUP olcOverlayConfig "
|
|
"MAY ( olcUniqueBase $ olcUniqueIgnore $ "
|
|
"olcUniqueAttribute $ olcUniqueStrict $ "
|
|
"olcUniqueURI ) )",
|
|
Cft_Overlay, uniquecfg },
|
|
{ NULL, 0, NULL }
|
|
};
|
|
|
|
static void
|
|
unique_free_domain_uri ( unique_domain_uri *uri )
|
|
{
|
|
unique_domain_uri *next_uri = NULL;
|
|
unique_attrs *attr, *next_attr = NULL;
|
|
|
|
while ( uri ) {
|
|
next_uri = uri->next;
|
|
ch_free ( uri->dn.bv_val );
|
|
ch_free ( uri->ndn.bv_val );
|
|
ch_free ( uri->filter.bv_val );
|
|
filter_free( uri->f );
|
|
attr = uri->attrs;
|
|
while ( attr ) {
|
|
next_attr = attr->next;
|
|
ch_free (attr);
|
|
attr = next_attr;
|
|
}
|
|
ch_free ( uri );
|
|
uri = next_uri;
|
|
}
|
|
}
|
|
|
|
/* free an entire stack of domains */
|
|
static void
|
|
unique_free_domain ( unique_domain *domain )
|
|
{
|
|
unique_domain *next_domain = NULL;
|
|
|
|
while ( domain ) {
|
|
next_domain = domain->next;
|
|
ch_free ( domain->domain_spec.bv_val );
|
|
unique_free_domain_uri ( domain->uri );
|
|
ch_free ( domain );
|
|
domain = next_domain;
|
|
}
|
|
}
|
|
|
|
static int
|
|
unique_new_domain_uri ( unique_domain_uri **urip,
|
|
const LDAPURLDesc *url_desc,
|
|
ConfigArgs *c )
|
|
{
|
|
int i, rc = LDAP_SUCCESS;
|
|
unique_domain_uri *uri;
|
|
struct berval bv = {0, NULL};
|
|
BackendDB *be = (BackendDB *)c->be;
|
|
char ** attr_str;
|
|
AttributeDescription * ad;
|
|
const char * text;
|
|
|
|
uri = ch_calloc ( 1, sizeof ( unique_domain_uri ) );
|
|
|
|
if ( url_desc->lud_host && url_desc->lud_host[0] ) {
|
|
snprintf( c->cr_msg, sizeof( c->cr_msg ),
|
|
"host <%s> not allowed in URI",
|
|
url_desc->lud_host );
|
|
rc = ARG_BAD_CONF;
|
|
goto exit;
|
|
}
|
|
|
|
if ( url_desc->lud_dn && url_desc->lud_dn[0] ) {
|
|
ber_str2bv( url_desc->lud_dn, 0, 0, &bv );
|
|
rc = dnPrettyNormal( NULL,
|
|
&bv,
|
|
&uri->dn,
|
|
&uri->ndn,
|
|
NULL );
|
|
if ( rc != LDAP_SUCCESS ) {
|
|
snprintf( c->cr_msg, sizeof( c->cr_msg ),
|
|
"<%s> invalid DN %d (%s)",
|
|
url_desc->lud_dn, rc, ldap_err2string( rc ));
|
|
rc = ARG_BAD_CONF;
|
|
goto exit;
|
|
}
|
|
|
|
if ( be->be_nsuffix == NULL ) {
|
|
snprintf( c->cr_msg, sizeof( c->cr_msg ),
|
|
"suffix must be set" );
|
|
Debug ( LDAP_DEBUG_CONFIG, "unique config: %s\n",
|
|
c->cr_msg );
|
|
rc = ARG_BAD_CONF;
|
|
goto exit;
|
|
}
|
|
|
|
if ( !dnIsSuffix ( &uri->ndn, &be->be_nsuffix[0] ) ) {
|
|
snprintf( c->cr_msg, sizeof( c->cr_msg ),
|
|
"dn <%s> is not a suffix of backend base dn <%s>",
|
|
uri->dn.bv_val,
|
|
be->be_nsuffix[0].bv_val );
|
|
rc = ARG_BAD_CONF;
|
|
goto exit;
|
|
}
|
|
|
|
if ( BER_BVISNULL( &be->be_rootndn ) || BER_BVISEMPTY( &be->be_rootndn ) ) {
|
|
Debug( LDAP_DEBUG_ANY,
|
|
"slapo-unique needs a rootdn; "
|
|
"backend <%s> has none, YMMV.\n",
|
|
be->be_nsuffix[0].bv_val );
|
|
}
|
|
}
|
|
|
|
attr_str = url_desc->lud_attrs;
|
|
if ( attr_str ) {
|
|
for ( i=0; attr_str[i]; ++i ) {
|
|
unique_attrs * attr;
|
|
ad = NULL;
|
|
if ( slap_str2ad ( attr_str[i], &ad, &text )
|
|
== LDAP_SUCCESS) {
|
|
attr = ch_calloc ( 1,
|
|
sizeof ( unique_attrs ) );
|
|
attr->attr = ad;
|
|
attr->next = uri->attrs;
|
|
uri->attrs = attr;
|
|
} else {
|
|
snprintf( c->cr_msg, sizeof( c->cr_msg ),
|
|
"unique: attribute: %s: %s",
|
|
attr_str[i], text );
|
|
rc = ARG_BAD_CONF;
|
|
goto exit;
|
|
}
|
|
}
|
|
}
|
|
|
|
uri->scope = url_desc->lud_scope;
|
|
if ( !uri->scope ) {
|
|
snprintf( c->cr_msg, sizeof( c->cr_msg ),
|
|
"unique: uri with base scope will always be unique");
|
|
rc = ARG_BAD_CONF;
|
|
goto exit;
|
|
}
|
|
|
|
if (url_desc->lud_filter) {
|
|
char *ptr;
|
|
uri->f = str2filter( url_desc->lud_filter );
|
|
if ( !uri->f ) {
|
|
snprintf( c->cr_msg, sizeof( c->cr_msg ),
|
|
"unique: bad filter");
|
|
rc = ARG_BAD_CONF;
|
|
goto exit;
|
|
}
|
|
/* make sure the strfilter is in normal form (ITS#5581) */
|
|
filter2bv( uri->f, &uri->filter );
|
|
ptr = strstr( uri->filter.bv_val, "(?=" /*)*/ );
|
|
if ( ptr != NULL && ptr <= ( uri->filter.bv_val - STRLENOF( "(?=" /*)*/ ) + uri->filter.bv_len ) )
|
|
{
|
|
snprintf( c->cr_msg, sizeof( c->cr_msg ),
|
|
"unique: bad filter");
|
|
rc = ARG_BAD_CONF;
|
|
goto exit;
|
|
}
|
|
}
|
|
exit:
|
|
uri->next = *urip;
|
|
*urip = uri;
|
|
if ( rc ) {
|
|
Debug ( LDAP_DEBUG_CONFIG|LDAP_DEBUG_NONE,
|
|
"%s: %s\n", c->log, c->cr_msg );
|
|
unique_free_domain_uri ( uri );
|
|
*urip = NULL;
|
|
}
|
|
return rc;
|
|
}
|
|
|
|
static int
|
|
unique_new_domain_uri_basic ( unique_domain_uri **urip,
|
|
ConfigArgs *c )
|
|
{
|
|
LDAPURLDesc *url_desc = NULL;
|
|
int rc;
|
|
|
|
rc = ldap_url_parse ( UNIQUE_DEFAULT_URI, &url_desc );
|
|
if ( rc ) return rc;
|
|
rc = unique_new_domain_uri ( urip, url_desc, c );
|
|
ldap_free_urldesc ( url_desc );
|
|
return rc;
|
|
}
|
|
|
|
/* if *domain is non-null, it's pushed down the stack.
|
|
* note that the entire stack is freed if there is an error,
|
|
* so build added domains in a separate stack before adding them
|
|
*
|
|
* domain_specs look like
|
|
*
|
|
* [strict ][ignore ][serialize ]uri[[ uri]...]
|
|
* e.g. "ldap:///ou=foo,o=bar?uid?sub ldap:///ou=baz,o=bar?uid?sub"
|
|
* "strict ldap:///ou=accounts,o=bar?uid,uidNumber?one"
|
|
* etc
|
|
*
|
|
* so finally strictness is per-domain
|
|
* but so is ignore-state, and that would be better as a per-url thing
|
|
*/
|
|
static int
|
|
unique_new_domain ( unique_domain **domainp,
|
|
char *domain_spec,
|
|
ConfigArgs *c )
|
|
{
|
|
char *uri_start;
|
|
int rc = LDAP_SUCCESS;
|
|
int uri_err = 0;
|
|
unique_domain * domain;
|
|
LDAPURLDesc *url_desc, *url_descs = NULL;
|
|
|
|
Debug(LDAP_DEBUG_TRACE, "==> unique_new_domain <%s>\n",
|
|
domain_spec );
|
|
|
|
domain = ch_calloc ( 1, sizeof (unique_domain) );
|
|
ber_str2bv( domain_spec, 0, 1, &domain->domain_spec );
|
|
|
|
uri_start = domain_spec;
|
|
if ( strncasecmp ( uri_start, "ignore ",
|
|
STRLENOF( "ignore " ) ) == 0 ) {
|
|
domain->ignore = 1;
|
|
uri_start += STRLENOF( "ignore " );
|
|
}
|
|
if ( strncasecmp ( uri_start, "serialize ",
|
|
STRLENOF( "serialize " ) ) == 0 ) {
|
|
domain->serial = 1;
|
|
uri_start += STRLENOF( "serialize " );
|
|
}
|
|
if ( strncasecmp ( uri_start, "strict ",
|
|
STRLENOF( "strict " ) ) == 0 ) {
|
|
domain->strict = 1;
|
|
uri_start += STRLENOF( "strict " );
|
|
if ( !domain->ignore
|
|
&& strncasecmp ( uri_start, "ignore ",
|
|
STRLENOF( "ignore " ) ) == 0 ) {
|
|
domain->ignore = 1;
|
|
uri_start += STRLENOF( "ignore " );
|
|
}
|
|
}
|
|
rc = ldap_url_parselist_ext ( &url_descs, uri_start, " ", 0 );
|
|
if ( rc ) {
|
|
snprintf( c->cr_msg, sizeof( c->cr_msg ),
|
|
"<%s> invalid ldap urilist",
|
|
uri_start );
|
|
rc = ARG_BAD_CONF;
|
|
goto exit;
|
|
}
|
|
|
|
for ( url_desc = url_descs;
|
|
url_desc;
|
|
url_desc = url_desc->lud_next ) {
|
|
rc = unique_new_domain_uri ( &domain->uri,
|
|
url_desc,
|
|
c );
|
|
if ( rc ) {
|
|
rc = ARG_BAD_CONF;
|
|
uri_err = 1;
|
|
goto exit;
|
|
}
|
|
}
|
|
|
|
exit:
|
|
if ( url_descs ) ldap_free_urldesc ( url_descs );
|
|
domain->next = *domainp;
|
|
*domainp = domain;
|
|
if ( rc ) {
|
|
Debug ( LDAP_DEBUG_CONFIG|LDAP_DEBUG_NONE,
|
|
"%s: %s\n", c->log, c->cr_msg );
|
|
unique_free_domain ( domain );
|
|
*domainp = NULL;
|
|
}
|
|
return rc;
|
|
}
|
|
|
|
static int
|
|
unique_cf_base( ConfigArgs *c )
|
|
{
|
|
BackendDB *be = (BackendDB *)c->be;
|
|
slap_overinst *on = (slap_overinst *)c->bi;
|
|
unique_data *private = (unique_data *) on->on_bi.bi_private;
|
|
unique_domain *domains = private->domains;
|
|
unique_domain *legacy = private->legacy;
|
|
int rc = ARG_BAD_CONF;
|
|
|
|
switch ( c->op ) {
|
|
case SLAP_CONFIG_EMIT:
|
|
rc = 0;
|
|
if ( legacy && legacy->uri && legacy->uri->dn.bv_val ) {
|
|
rc = value_add_one ( &c->rvalue_vals,
|
|
&legacy->uri->dn );
|
|
if ( rc ) return rc;
|
|
rc = value_add_one ( &c->rvalue_nvals,
|
|
&legacy->uri->ndn );
|
|
if ( rc ) return rc;
|
|
}
|
|
break;
|
|
case LDAP_MOD_DELETE:
|
|
assert ( legacy && legacy->uri && legacy->uri->dn.bv_val );
|
|
rc = 0;
|
|
ch_free ( legacy->uri->dn.bv_val );
|
|
ch_free ( legacy->uri->ndn.bv_val );
|
|
BER_BVZERO( &legacy->uri->dn );
|
|
BER_BVZERO( &legacy->uri->ndn );
|
|
if ( !legacy->uri->attrs ) {
|
|
unique_free_domain_uri ( legacy->uri );
|
|
legacy->uri = NULL;
|
|
}
|
|
if ( !legacy->uri && !private->legacy_strict_set ) {
|
|
unique_free_domain ( legacy );
|
|
private->legacy = legacy = NULL;
|
|
}
|
|
break;
|
|
case LDAP_MOD_ADD:
|
|
case SLAP_CONFIG_ADD:
|
|
if ( domains ) {
|
|
snprintf( c->cr_msg, sizeof( c->cr_msg ),
|
|
"cannot set legacy attrs when URIs are present" );
|
|
Debug ( LDAP_DEBUG_CONFIG, "unique config: %s\n",
|
|
c->cr_msg );
|
|
rc = ARG_BAD_CONF;
|
|
break;
|
|
}
|
|
if ( be->be_nsuffix == NULL ) {
|
|
snprintf( c->cr_msg, sizeof( c->cr_msg ),
|
|
"suffix must be set" );
|
|
Debug ( LDAP_DEBUG_CONFIG, "unique config: %s\n",
|
|
c->cr_msg );
|
|
rc = ARG_BAD_CONF;
|
|
break;
|
|
}
|
|
if ( !dnIsSuffix ( &c->value_ndn,
|
|
&be->be_nsuffix[0] ) ) {
|
|
snprintf( c->cr_msg, sizeof( c->cr_msg ),
|
|
"dn is not a suffix of backend base" );
|
|
Debug ( LDAP_DEBUG_CONFIG, "unique config: %s\n",
|
|
c->cr_msg );
|
|
rc = ARG_BAD_CONF;
|
|
break;
|
|
}
|
|
if ( !legacy ) {
|
|
unique_new_domain ( &private->legacy,
|
|
UNIQUE_DEFAULT_URI,
|
|
c );
|
|
legacy = private->legacy;
|
|
}
|
|
if ( !legacy->uri )
|
|
unique_new_domain_uri_basic ( &legacy->uri, c );
|
|
ch_free ( legacy->uri->dn.bv_val );
|
|
ch_free ( legacy->uri->ndn.bv_val );
|
|
legacy->uri->dn = c->value_dn;
|
|
legacy->uri->ndn = c->value_ndn;
|
|
rc = 0;
|
|
break;
|
|
default:
|
|
abort();
|
|
}
|
|
|
|
if ( rc ) {
|
|
ch_free( c->value_dn.bv_val );
|
|
BER_BVZERO( &c->value_dn );
|
|
ch_free( c->value_ndn.bv_val );
|
|
BER_BVZERO( &c->value_ndn );
|
|
}
|
|
|
|
return rc;
|
|
}
|
|
|
|
static int
|
|
unique_cf_attrs( ConfigArgs *c )
|
|
{
|
|
slap_overinst *on = (slap_overinst *)c->bi;
|
|
unique_data *private = (unique_data *) on->on_bi.bi_private;
|
|
unique_domain *domains = private->domains;
|
|
unique_domain *legacy = private->legacy;
|
|
unique_attrs *new_attrs = NULL;
|
|
unique_attrs *attr, *next_attr, *reverse_attrs;
|
|
unique_attrs **attrp;
|
|
int rc = ARG_BAD_CONF;
|
|
int i;
|
|
|
|
switch ( c->op ) {
|
|
case SLAP_CONFIG_EMIT:
|
|
if ( legacy
|
|
&& (c->type == UNIQUE_IGNORE) == legacy->ignore
|
|
&& legacy->uri )
|
|
for ( attr = legacy->uri->attrs;
|
|
attr;
|
|
attr = attr->next )
|
|
value_add_one( &c->rvalue_vals,
|
|
&attr->attr->ad_cname );
|
|
rc = 0;
|
|
break;
|
|
case LDAP_MOD_DELETE:
|
|
if ( legacy
|
|
&& (c->type == UNIQUE_IGNORE) == legacy->ignore
|
|
&& legacy->uri
|
|
&& legacy->uri->attrs) {
|
|
if ( c->valx < 0 ) { /* delete all */
|
|
for ( attr = legacy->uri->attrs;
|
|
attr;
|
|
attr = next_attr ) {
|
|
next_attr = attr->next;
|
|
ch_free ( attr );
|
|
}
|
|
legacy->uri->attrs = NULL;
|
|
} else { /* delete by index */
|
|
attrp = &legacy->uri->attrs;
|
|
for ( i=0; i < c->valx; ++i )
|
|
attrp = &(*attrp)->next;
|
|
attr = *attrp;
|
|
*attrp = attr->next;
|
|
ch_free (attr);
|
|
}
|
|
if ( !legacy->uri->attrs
|
|
&& !legacy->uri->dn.bv_val ) {
|
|
unique_free_domain_uri ( legacy->uri );
|
|
legacy->uri = NULL;
|
|
}
|
|
if ( !legacy->uri && !private->legacy_strict_set ) {
|
|
unique_free_domain ( legacy );
|
|
private->legacy = legacy = NULL;
|
|
}
|
|
}
|
|
rc = 0;
|
|
break;
|
|
case LDAP_MOD_ADD:
|
|
case SLAP_CONFIG_ADD:
|
|
if ( domains ) {
|
|
snprintf( c->cr_msg, sizeof( c->cr_msg ),
|
|
"cannot set legacy attrs when URIs are present" );
|
|
Debug ( LDAP_DEBUG_CONFIG, "unique config: %s\n",
|
|
c->cr_msg );
|
|
rc = ARG_BAD_CONF;
|
|
break;
|
|
}
|
|
if ( legacy
|
|
&& legacy->uri
|
|
&& legacy->uri->attrs
|
|
&& (c->type == UNIQUE_IGNORE) != legacy->ignore ) {
|
|
snprintf( c->cr_msg, sizeof( c->cr_msg ),
|
|
"cannot set both attrs and ignore-attrs" );
|
|
Debug ( LDAP_DEBUG_CONFIG, "unique config: %s\n",
|
|
c->cr_msg );
|
|
rc = ARG_BAD_CONF;
|
|
break;
|
|
}
|
|
if ( !legacy ) {
|
|
unique_new_domain ( &private->legacy,
|
|
UNIQUE_DEFAULT_URI,
|
|
c );
|
|
legacy = private->legacy;
|
|
}
|
|
if ( !legacy->uri )
|
|
unique_new_domain_uri_basic ( &legacy->uri, c );
|
|
rc = 0;
|
|
for ( i=1; c->argv[i]; ++i ) {
|
|
AttributeDescription * ad = NULL;
|
|
const char * text;
|
|
if ( slap_str2ad ( c->argv[i], &ad, &text )
|
|
== LDAP_SUCCESS) {
|
|
|
|
attr = ch_calloc ( 1,
|
|
sizeof ( unique_attrs ) );
|
|
attr->attr = ad;
|
|
attr->next = new_attrs;
|
|
new_attrs = attr;
|
|
} else {
|
|
snprintf( c->cr_msg, sizeof( c->cr_msg ),
|
|
"unique: attribute: %s: %s",
|
|
c->argv[i], text );
|
|
for ( attr = new_attrs;
|
|
attr;
|
|
attr=next_attr ) {
|
|
next_attr = attr->next;
|
|
ch_free ( attr );
|
|
}
|
|
rc = ARG_BAD_CONF;
|
|
break;
|
|
}
|
|
}
|
|
if ( rc ) break;
|
|
|
|
/* (nconc legacy->uri->attrs (nreverse new_attrs)) */
|
|
reverse_attrs = NULL;
|
|
for ( attr = new_attrs;
|
|
attr;
|
|
attr = next_attr ) {
|
|
next_attr = attr->next;
|
|
attr->next = reverse_attrs;
|
|
reverse_attrs = attr;
|
|
}
|
|
for ( attrp = &legacy->uri->attrs;
|
|
*attrp;
|
|
attrp = &(*attrp)->next ) ;
|
|
*attrp = reverse_attrs;
|
|
|
|
legacy->ignore = ( c->type == UNIQUE_IGNORE );
|
|
break;
|
|
default:
|
|
abort();
|
|
}
|
|
|
|
if ( rc ) {
|
|
Debug ( LDAP_DEBUG_CONFIG|LDAP_DEBUG_NONE,
|
|
"%s: %s\n", c->log, c->cr_msg );
|
|
}
|
|
return rc;
|
|
}
|
|
|
|
static int
|
|
unique_cf_strict( ConfigArgs *c )
|
|
{
|
|
slap_overinst *on = (slap_overinst *)c->bi;
|
|
unique_data *private = (unique_data *) on->on_bi.bi_private;
|
|
unique_domain *domains = private->domains;
|
|
unique_domain *legacy = private->legacy;
|
|
int rc = ARG_BAD_CONF;
|
|
|
|
switch ( c->op ) {
|
|
case SLAP_CONFIG_EMIT:
|
|
/* We process the boolean manually instead of using
|
|
* ARG_ON_OFF so that we can three-state it;
|
|
* olcUniqueStrict is either TRUE, FALSE, or missing,
|
|
* and missing is necessary to add olcUniqueURIs...
|
|
*/
|
|
if ( private->legacy_strict_set ) {
|
|
struct berval bv = legacy->strict ? slap_true_bv : slap_false_bv;
|
|
value_add_one ( &c->rvalue_vals, &bv );
|
|
}
|
|
rc = 0;
|
|
break;
|
|
case LDAP_MOD_DELETE:
|
|
if ( legacy ) {
|
|
legacy->strict = 0;
|
|
if ( ! legacy->uri ) {
|
|
unique_free_domain ( legacy );
|
|
private->legacy = NULL;
|
|
}
|
|
}
|
|
private->legacy_strict_set = 0;
|
|
rc = 0;
|
|
break;
|
|
case LDAP_MOD_ADD:
|
|
case SLAP_CONFIG_ADD:
|
|
if ( domains ) {
|
|
snprintf( c->cr_msg, sizeof( c->cr_msg ),
|
|
"cannot set legacy attrs when URIs are present" );
|
|
Debug ( LDAP_DEBUG_CONFIG, "unique config: %s\n",
|
|
c->cr_msg );
|
|
rc = ARG_BAD_CONF;
|
|
break;
|
|
}
|
|
if ( ! legacy ) {
|
|
unique_new_domain ( &private->legacy,
|
|
UNIQUE_DEFAULT_URI,
|
|
c );
|
|
legacy = private->legacy;
|
|
}
|
|
/* ... not using ARG_ON_OFF makes this necessary too */
|
|
assert ( c->argc == 2 );
|
|
legacy->strict = (strcasecmp ( c->argv[1], "TRUE" ) == 0);
|
|
private->legacy_strict_set = 1;
|
|
rc = 0;
|
|
break;
|
|
default:
|
|
abort();
|
|
}
|
|
|
|
return rc;
|
|
}
|
|
|
|
static int
|
|
unique_cf_uri( ConfigArgs *c )
|
|
{
|
|
slap_overinst *on = (slap_overinst *)c->bi;
|
|
unique_data *private = (unique_data *) on->on_bi.bi_private;
|
|
unique_domain *domains = private->domains;
|
|
unique_domain *legacy = private->legacy;
|
|
unique_domain *domain = NULL, **domainp = NULL;
|
|
int rc = ARG_BAD_CONF;
|
|
int i;
|
|
|
|
switch ( c->op ) {
|
|
case SLAP_CONFIG_EMIT:
|
|
for ( domain = domains;
|
|
domain;
|
|
domain = domain->next ) {
|
|
rc = value_add_one ( &c->rvalue_vals,
|
|
&domain->domain_spec );
|
|
if ( rc ) break;
|
|
}
|
|
break;
|
|
case LDAP_MOD_DELETE:
|
|
if ( c->valx < 0 ) { /* delete them all! */
|
|
unique_free_domain ( domains );
|
|
private->domains = NULL;
|
|
} else { /* delete just one */
|
|
domainp = &private->domains;
|
|
for ( i=0; i < c->valx && *domainp; ++i )
|
|
domainp = &(*domainp)->next;
|
|
|
|
/* If *domainp is null, we walked off the end
|
|
* of the list. This happens when back-config
|
|
* and the overlay are out-of-sync, like when
|
|
* rejecting changes before ITS#4752 gets
|
|
* fixed.
|
|
*
|
|
* This should never happen, but will appear
|
|
* if you backport this version of
|
|
* slapo-unique without the config-undo fixes
|
|
*
|
|
* test024 Will hit this case in such a
|
|
* situation.
|
|
*/
|
|
assert (*domainp != NULL);
|
|
|
|
domain = *domainp;
|
|
*domainp = domain->next;
|
|
domain->next = NULL;
|
|
unique_free_domain ( domain );
|
|
}
|
|
rc = 0;
|
|
break;
|
|
|
|
case SLAP_CONFIG_ADD: /* fallthru */
|
|
case LDAP_MOD_ADD:
|
|
if ( legacy ) {
|
|
snprintf( c->cr_msg, sizeof( c->cr_msg ),
|
|
"cannot set Uri when legacy attrs are present" );
|
|
Debug ( LDAP_DEBUG_CONFIG, "unique config: %s\n",
|
|
c->cr_msg );
|
|
rc = ARG_BAD_CONF;
|
|
break;
|
|
}
|
|
rc = 0;
|
|
if ( c->line ) rc = unique_new_domain ( &domain, c->line, c );
|
|
else rc = unique_new_domain ( &domain, c->argv[1], c );
|
|
if ( rc ) break;
|
|
assert ( domain->next == NULL );
|
|
for ( domainp = &private->domains;
|
|
*domainp;
|
|
domainp = &(*domainp)->next ) ;
|
|
*domainp = domain;
|
|
|
|
break;
|
|
|
|
default:
|
|
abort ();
|
|
}
|
|
|
|
return rc;
|
|
}
|
|
|
|
/*
|
|
** allocate new unique_data;
|
|
** initialize, copy basedn;
|
|
** store in on_bi.bi_private;
|
|
**
|
|
*/
|
|
|
|
static int
|
|
unique_db_init(
|
|
BackendDB *be,
|
|
ConfigReply *cr
|
|
)
|
|
{
|
|
slap_overinst *on = (slap_overinst *)be->bd_info;
|
|
unique_data *private;
|
|
|
|
Debug(LDAP_DEBUG_TRACE, "==> unique_db_init\n" );
|
|
|
|
private = ch_calloc ( 1, sizeof ( unique_data ) );
|
|
ldap_pvt_thread_mutex_init( &private->serial_mutex );
|
|
on->on_bi.bi_private = private;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
unique_db_destroy(
|
|
BackendDB *be,
|
|
ConfigReply *cr
|
|
)
|
|
{
|
|
slap_overinst *on = (slap_overinst *)be->bd_info;
|
|
unique_data *private = on->on_bi.bi_private;
|
|
|
|
Debug(LDAP_DEBUG_TRACE, "==> unique_db_destroy\n" );
|
|
|
|
if ( private ) {
|
|
unique_domain *domains = private->domains;
|
|
unique_domain *legacy = private->legacy;
|
|
|
|
unique_free_domain ( domains );
|
|
unique_free_domain ( legacy );
|
|
ldap_pvt_thread_mutex_destroy( &private->serial_mutex );
|
|
ch_free ( private );
|
|
on->on_bi.bi_private = NULL;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/*
|
|
** search callback
|
|
** if this is a REP_SEARCH, count++;
|
|
**
|
|
*/
|
|
|
|
static int count_attr_cb(
|
|
Operation *op,
|
|
SlapReply *rs
|
|
)
|
|
{
|
|
unique_counter *uc;
|
|
|
|
/* because you never know */
|
|
if(!op || !rs) return(0);
|
|
|
|
/* Only search entries are interesting */
|
|
if(rs->sr_type != REP_SEARCH) return(0);
|
|
|
|
uc = op->o_callback->sc_private;
|
|
|
|
/* Ignore the current entry */
|
|
if ( dn_match( uc->ndn, &rs->sr_entry->e_nname )) return(0);
|
|
|
|
Debug(LDAP_DEBUG_TRACE, "==> count_attr_cb <%s>\n",
|
|
rs->sr_entry ? rs->sr_entry->e_name.bv_val : "UNKNOWN_DN" );
|
|
|
|
uc->count++;
|
|
|
|
return(0);
|
|
}
|
|
|
|
/* count the length of one attribute ad
|
|
* (and all of its values b)
|
|
* in the proposed filter
|
|
*/
|
|
static int
|
|
count_filter_len(
|
|
unique_domain *domain,
|
|
unique_domain_uri *uri,
|
|
AttributeDescription *ad,
|
|
BerVarray b
|
|
)
|
|
{
|
|
unique_attrs *attr;
|
|
int i;
|
|
int ks = 0;
|
|
|
|
while ( !is_at_operational( ad->ad_type ) ) {
|
|
if ( uri->attrs ) {
|
|
for ( attr = uri->attrs; attr; attr = attr->next ) {
|
|
if ( ad == attr->attr ) {
|
|
break;
|
|
}
|
|
}
|
|
if ( ( domain->ignore && attr )
|
|
|| (!domain->ignore && !attr )) {
|
|
break;
|
|
}
|
|
}
|
|
if ( b && b[0].bv_val ) {
|
|
for (i = 0; b[i].bv_val; i++ ) {
|
|
/* note: make room for filter escaping... */
|
|
ks += ( 3 * b[i].bv_len ) + ad->ad_cname.bv_len + STRLENOF( "(=)" );
|
|
}
|
|
} else if ( domain->strict ) {
|
|
ks += ad->ad_cname.bv_len + STRLENOF( "(=*)" ); /* (attr=*) */
|
|
}
|
|
break;
|
|
}
|
|
|
|
return ks;
|
|
}
|
|
|
|
static char *
|
|
build_filter(
|
|
unique_domain *domain,
|
|
unique_domain_uri *uri,
|
|
AttributeDescription *ad,
|
|
BerVarray b,
|
|
char *kp,
|
|
int ks,
|
|
void *ctx
|
|
)
|
|
{
|
|
unique_attrs *attr;
|
|
int i;
|
|
|
|
while ( !is_at_operational( ad->ad_type ) ) {
|
|
if ( uri->attrs ) {
|
|
for ( attr = uri->attrs; attr; attr = attr->next ) {
|
|
if ( ad == attr->attr ) {
|
|
break;
|
|
}
|
|
}
|
|
if ( ( domain->ignore && attr )
|
|
|| (!domain->ignore && !attr )) {
|
|
break;
|
|
}
|
|
}
|
|
if ( b && b[0].bv_val ) {
|
|
for ( i = 0; b[i].bv_val; i++ ) {
|
|
struct berval bv;
|
|
int len;
|
|
|
|
ldap_bv2escaped_filter_value_x( &b[i], &bv, 1, ctx );
|
|
if (!b[i].bv_len)
|
|
bv.bv_val = b[i].bv_val;
|
|
len = snprintf( kp, ks, "(%s=%s)", ad->ad_cname.bv_val, bv.bv_val );
|
|
assert( len >= 0 && len < ks );
|
|
kp += len;
|
|
if ( bv.bv_val != b[i].bv_val ) {
|
|
ber_memfree_x( bv.bv_val, ctx );
|
|
}
|
|
}
|
|
} else if ( domain->strict ) {
|
|
int len;
|
|
len = snprintf( kp, ks, "(%s=*)", ad->ad_cname.bv_val );
|
|
assert( len >= 0 && len < ks );
|
|
kp += len;
|
|
}
|
|
break;
|
|
}
|
|
return kp;
|
|
}
|
|
|
|
static int
|
|
unique_search(
|
|
Operation *op,
|
|
Operation *nop,
|
|
struct berval * dn,
|
|
int scope,
|
|
SlapReply *rs,
|
|
struct berval *key
|
|
)
|
|
{
|
|
slap_overinst *on = (slap_overinst *) op->o_bd->bd_info;
|
|
SlapReply nrs = { REP_RESULT };
|
|
slap_callback cb = { NULL, NULL, NULL, NULL }; /* XXX */
|
|
unique_counter uq = { NULL, 0 };
|
|
int rc;
|
|
char *errmsg;
|
|
int errmsgsize;
|
|
|
|
Debug(LDAP_DEBUG_TRACE, "==> unique_search %s\n", key->bv_val );
|
|
|
|
nop->ors_filter = str2filter_x(nop, key->bv_val);
|
|
if(nop->ors_filter == NULL) {
|
|
op->o_bd->bd_info = (BackendInfo *) on->on_info;
|
|
send_ldap_error(op, rs, LDAP_OTHER,
|
|
"unique_search invalid filter");
|
|
return(rs->sr_err);
|
|
}
|
|
|
|
nop->ors_filterstr = *key;
|
|
|
|
cb.sc_response = (slap_response*)count_attr_cb;
|
|
cb.sc_private = &uq;
|
|
nop->o_callback = &cb;
|
|
nop->o_tag = LDAP_REQ_SEARCH;
|
|
nop->ors_scope = scope;
|
|
nop->ors_deref = LDAP_DEREF_NEVER;
|
|
nop->ors_limit = NULL;
|
|
nop->ors_slimit = SLAP_NO_LIMIT;
|
|
nop->ors_tlimit = SLAP_NO_LIMIT;
|
|
nop->ors_attrs = slap_anlist_no_attrs;
|
|
nop->ors_attrsonly = 1;
|
|
|
|
uq.ndn = &op->o_req_ndn;
|
|
|
|
nop->o_req_ndn = *dn;
|
|
nop->o_ndn = op->o_bd->be_rootndn;
|
|
|
|
nop->o_bd = on->on_info->oi_origdb;
|
|
rc = nop->o_bd->be_search(nop, &nrs);
|
|
filter_free_x(nop, nop->ors_filter, 1);
|
|
|
|
if(rc != LDAP_SUCCESS && rc != LDAP_NO_SUCH_OBJECT) {
|
|
op->o_bd->bd_info = (BackendInfo *) on->on_info;
|
|
send_ldap_error(op, rs, rc, "unique_search failed");
|
|
rc = rs->sr_err;
|
|
} else if(uq.count) {
|
|
Debug(LDAP_DEBUG_TRACE, "=> unique_search found %d records\n", uq.count );
|
|
|
|
errmsgsize = sizeof("non-unique attributes found with ") + key->bv_len;
|
|
errmsg = op->o_tmpalloc(errmsgsize, op->o_tmpmemctx);
|
|
snprintf( errmsg, errmsgsize, "non-unique attributes found with %s", key->bv_val );
|
|
op->o_bd->bd_info = (BackendInfo *) on->on_info;
|
|
send_ldap_error(op, rs, LDAP_CONSTRAINT_VIOLATION, errmsg);
|
|
op->o_tmpfree(errmsg, op->o_tmpmemctx);
|
|
rc = rs->sr_err;
|
|
} else {
|
|
Debug(LDAP_DEBUG_TRACE, "=> unique_search found no records\n" );
|
|
rc = SLAP_CB_CONTINUE;
|
|
}
|
|
|
|
op->o_tmpfree( key->bv_val, op->o_tmpmemctx );
|
|
|
|
return(rc);
|
|
}
|
|
|
|
static int
|
|
unique_unlock(
|
|
Operation *op,
|
|
SlapReply *rs
|
|
)
|
|
{
|
|
slap_callback *sc = op->o_callback;
|
|
unique_data *private = sc->sc_private;
|
|
|
|
ldap_pvt_thread_mutex_unlock( &private->serial_mutex );
|
|
op->o_callback = sc->sc_next;
|
|
op->o_tmpfree( sc, op->o_tmpmemctx );
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
unique_add(
|
|
Operation *op,
|
|
SlapReply *rs
|
|
)
|
|
{
|
|
slap_overinst *on = (slap_overinst *) op->o_bd->bd_info;
|
|
unique_data *private = (unique_data *) on->on_bi.bi_private;
|
|
unique_domain *domains = private->domains;
|
|
unique_domain *legacy = private->legacy;
|
|
unique_domain *domain;
|
|
Operation nop = *op;
|
|
Attribute *a;
|
|
char *key, *kp;
|
|
struct berval bvkey;
|
|
int rc = SLAP_CB_CONTINUE;
|
|
int locked = 0;
|
|
|
|
Debug(LDAP_DEBUG_TRACE, "==> unique_add <%s>\n",
|
|
op->o_req_dn.bv_val );
|
|
|
|
if ( SLAPD_SYNC_IS_SYNCCONN( op->o_connid ) || (
|
|
get_relax(op) > SLAP_CONTROL_IGNORED
|
|
&& access_allowed( op, op->ora_e,
|
|
slap_schema.si_ad_entry, NULL,
|
|
ACL_MANAGE, NULL ) ) ) {
|
|
return rc;
|
|
}
|
|
|
|
for ( domain = legacy ? legacy : domains;
|
|
domain;
|
|
domain = domain->next )
|
|
{
|
|
unique_domain_uri *uri;
|
|
|
|
for ( uri = domain->uri;
|
|
uri;
|
|
uri = uri->next )
|
|
{
|
|
int len;
|
|
int ks = 0;
|
|
|
|
if ( uri->ndn.bv_val
|
|
&& !dnIsSuffix( &op->o_req_ndn, &uri->ndn ))
|
|
continue;
|
|
|
|
if ( uri->f ) {
|
|
if ( test_filter( NULL, op->ora_e, uri->f )
|
|
== LDAP_COMPARE_FALSE )
|
|
{
|
|
Debug( LDAP_DEBUG_TRACE,
|
|
"==> unique_add_skip<%s>\n",
|
|
op->o_req_dn.bv_val );
|
|
continue;
|
|
}
|
|
}
|
|
|
|
if(!(a = op->ora_e->e_attrs)) {
|
|
op->o_bd->bd_info = (BackendInfo *) on->on_info;
|
|
send_ldap_error(op, rs, LDAP_INVALID_SYNTAX,
|
|
"unique_add() got null op.ora_e.e_attrs");
|
|
rc = rs->sr_err;
|
|
break;
|
|
|
|
} else {
|
|
for(; a; a = a->a_next) {
|
|
ks += count_filter_len ( domain,
|
|
uri,
|
|
a->a_desc,
|
|
a->a_vals);
|
|
}
|
|
}
|
|
|
|
/* skip this domain-uri if it isn't involved */
|
|
if ( !ks ) continue;
|
|
|
|
if ( domain->serial && !locked ) {
|
|
ldap_pvt_thread_mutex_lock( &private->serial_mutex );
|
|
locked = 1;
|
|
}
|
|
|
|
/* terminating NUL */
|
|
ks += sizeof("(|)");
|
|
|
|
if ( uri->filter.bv_val && uri->filter.bv_len )
|
|
ks += uri->filter.bv_len + STRLENOF ("(&)");
|
|
kp = key = op->o_tmpalloc(ks, op->o_tmpmemctx);
|
|
|
|
if ( uri->filter.bv_val && uri->filter.bv_len ) {
|
|
len = snprintf (kp, ks, "(&%s", uri->filter.bv_val);
|
|
assert( len >= 0 && len < ks );
|
|
kp += len;
|
|
}
|
|
len = snprintf(kp, ks - (kp - key), "(|");
|
|
assert( len >= 0 && len < ks - (kp - key) );
|
|
kp += len;
|
|
|
|
for(a = op->ora_e->e_attrs; a; a = a->a_next)
|
|
kp = build_filter(domain,
|
|
uri,
|
|
a->a_desc,
|
|
a->a_vals,
|
|
kp,
|
|
ks - ( kp - key ),
|
|
op->o_tmpmemctx);
|
|
|
|
len = snprintf(kp, ks - (kp - key), ")");
|
|
assert( len >= 0 && len < ks - (kp - key) );
|
|
kp += len;
|
|
if ( uri->filter.bv_val && uri->filter.bv_len ) {
|
|
len = snprintf(kp, ks - (kp - key), ")");
|
|
assert( len >= 0 && len < ks - (kp - key) );
|
|
kp += len;
|
|
}
|
|
bvkey.bv_val = key;
|
|
bvkey.bv_len = kp - key;
|
|
|
|
rc = unique_search ( op,
|
|
&nop,
|
|
uri->ndn.bv_val ?
|
|
&uri->ndn :
|
|
&op->o_bd->be_nsuffix[0],
|
|
uri->scope,
|
|
rs,
|
|
&bvkey);
|
|
|
|
if ( rc != SLAP_CB_CONTINUE ) break;
|
|
}
|
|
if ( rc != SLAP_CB_CONTINUE ) break;
|
|
}
|
|
|
|
if ( locked ) {
|
|
if ( rc != SLAP_CB_CONTINUE ) {
|
|
ldap_pvt_thread_mutex_unlock( &private->serial_mutex );
|
|
} else {
|
|
slap_callback *cb = op->o_tmpcalloc( 1, sizeof(slap_callback), op->o_tmpmemctx );
|
|
cb->sc_cleanup = unique_unlock;
|
|
cb->sc_private = private;
|
|
cb->sc_next = op->o_callback;
|
|
op->o_callback = cb;
|
|
}
|
|
}
|
|
return rc;
|
|
}
|
|
|
|
|
|
static int
|
|
unique_modify(
|
|
Operation *op,
|
|
SlapReply *rs
|
|
)
|
|
{
|
|
slap_overinst *on = (slap_overinst *) op->o_bd->bd_info;
|
|
unique_data *private = (unique_data *) on->on_bi.bi_private;
|
|
unique_domain *domains = private->domains;
|
|
unique_domain *legacy = private->legacy;
|
|
unique_domain *domain;
|
|
Operation nop = *op;
|
|
Modifications *m;
|
|
Entry *e = NULL;
|
|
char *key, *kp;
|
|
struct berval bvkey;
|
|
int rc = SLAP_CB_CONTINUE;
|
|
int locked = 0;
|
|
|
|
Debug(LDAP_DEBUG_TRACE, "==> unique_modify <%s>\n",
|
|
op->o_req_dn.bv_val );
|
|
|
|
if ( !op->orm_modlist ) {
|
|
Debug(LDAP_DEBUG_TRACE, "unique_modify: got empty modify op\n" );
|
|
return rc;
|
|
}
|
|
|
|
if ( SLAPD_SYNC_IS_SYNCCONN( op->o_connid ) || (
|
|
get_relax(op) > SLAP_CONTROL_IGNORED
|
|
&& overlay_entry_get_ov(op, &op->o_req_ndn, NULL, NULL, 0, &e, on) == LDAP_SUCCESS
|
|
&& e
|
|
&& access_allowed( op, e,
|
|
slap_schema.si_ad_entry, NULL,
|
|
ACL_MANAGE, NULL ) ) ) {
|
|
overlay_entry_release_ov( op, e, 0, on );
|
|
return rc;
|
|
}
|
|
if ( e ) {
|
|
overlay_entry_release_ov( op, e, 0, on );
|
|
}
|
|
|
|
for ( domain = legacy ? legacy : domains;
|
|
domain;
|
|
domain = domain->next )
|
|
{
|
|
unique_domain_uri *uri;
|
|
|
|
for ( uri = domain->uri;
|
|
uri;
|
|
uri = uri->next )
|
|
{
|
|
int len;
|
|
int ks = 0;
|
|
|
|
if ( uri->ndn.bv_val
|
|
&& !dnIsSuffix( &op->o_req_ndn, &uri->ndn ))
|
|
continue;
|
|
|
|
for ( m = op->orm_modlist; m; m = m->sml_next)
|
|
if ( (m->sml_op & LDAP_MOD_OP)
|
|
!= LDAP_MOD_DELETE )
|
|
ks += count_filter_len
|
|
( domain,
|
|
uri,
|
|
m->sml_desc,
|
|
m->sml_values);
|
|
|
|
/* skip this domain-uri if it isn't involved */
|
|
if ( !ks ) continue;
|
|
|
|
if ( domain->serial && !locked ) {
|
|
ldap_pvt_thread_mutex_lock( &private->serial_mutex );
|
|
locked = 1;
|
|
}
|
|
|
|
/* terminating NUL */
|
|
ks += sizeof("(|)");
|
|
|
|
if ( uri->filter.bv_val && uri->filter.bv_len )
|
|
ks += uri->filter.bv_len + STRLENOF ("(&)");
|
|
kp = key = op->o_tmpalloc(ks, op->o_tmpmemctx);
|
|
|
|
if ( uri->filter.bv_val && uri->filter.bv_len ) {
|
|
len = snprintf(kp, ks, "(&%s", uri->filter.bv_val);
|
|
assert( len >= 0 && len < ks );
|
|
kp += len;
|
|
}
|
|
len = snprintf(kp, ks - (kp - key), "(|");
|
|
assert( len >= 0 && len < ks - (kp - key) );
|
|
kp += len;
|
|
|
|
for(m = op->orm_modlist; m; m = m->sml_next)
|
|
if ( (m->sml_op & LDAP_MOD_OP)
|
|
!= LDAP_MOD_DELETE )
|
|
kp = build_filter ( domain,
|
|
uri,
|
|
m->sml_desc,
|
|
m->sml_values,
|
|
kp,
|
|
ks - (kp - key),
|
|
op->o_tmpmemctx );
|
|
|
|
len = snprintf(kp, ks - (kp - key), ")");
|
|
assert( len >= 0 && len < ks - (kp - key) );
|
|
kp += len;
|
|
if ( uri->filter.bv_val && uri->filter.bv_len ) {
|
|
len = snprintf (kp, ks - (kp - key), ")");
|
|
assert( len >= 0 && len < ks - (kp - key) );
|
|
kp += len;
|
|
}
|
|
bvkey.bv_val = key;
|
|
bvkey.bv_len = kp - key;
|
|
|
|
rc = unique_search ( op,
|
|
&nop,
|
|
uri->ndn.bv_val ?
|
|
&uri->ndn :
|
|
&op->o_bd->be_nsuffix[0],
|
|
uri->scope,
|
|
rs,
|
|
&bvkey);
|
|
|
|
if ( rc != SLAP_CB_CONTINUE ) break;
|
|
}
|
|
if ( rc != SLAP_CB_CONTINUE ) break;
|
|
}
|
|
|
|
if ( locked ) {
|
|
if ( rc != SLAP_CB_CONTINUE ) {
|
|
ldap_pvt_thread_mutex_unlock( &private->serial_mutex );
|
|
} else {
|
|
slap_callback *cb = op->o_tmpcalloc( 1, sizeof(slap_callback), op->o_tmpmemctx );
|
|
cb->sc_cleanup = unique_unlock;
|
|
cb->sc_private = private;
|
|
cb->sc_next = op->o_callback;
|
|
op->o_callback = cb;
|
|
}
|
|
}
|
|
return rc;
|
|
}
|
|
|
|
|
|
static int
|
|
unique_modrdn(
|
|
Operation *op,
|
|
SlapReply *rs
|
|
)
|
|
{
|
|
slap_overinst *on = (slap_overinst *) op->o_bd->bd_info;
|
|
unique_data *private = (unique_data *) on->on_bi.bi_private;
|
|
unique_domain *domains = private->domains;
|
|
unique_domain *legacy = private->legacy;
|
|
unique_domain *domain;
|
|
Operation nop = *op;
|
|
Entry *e = NULL;
|
|
char *key, *kp;
|
|
struct berval bvkey;
|
|
LDAPRDN newrdn;
|
|
struct berval bv[2];
|
|
int rc = SLAP_CB_CONTINUE;
|
|
int locked = 0;
|
|
|
|
Debug(LDAP_DEBUG_TRACE, "==> unique_modrdn <%s> <%s>\n",
|
|
op->o_req_dn.bv_val, op->orr_newrdn.bv_val );
|
|
|
|
if ( SLAPD_SYNC_IS_SYNCCONN( op->o_connid ) || (
|
|
get_relax(op) > SLAP_CONTROL_IGNORED
|
|
&& overlay_entry_get_ov(op, &op->o_req_ndn, NULL, NULL, 0, &e, on) == LDAP_SUCCESS
|
|
&& e
|
|
&& access_allowed( op, e,
|
|
slap_schema.si_ad_entry, NULL,
|
|
ACL_MANAGE, NULL ) ) ) {
|
|
overlay_entry_release_ov( op, e, 0, on );
|
|
return rc;
|
|
}
|
|
if ( e ) {
|
|
overlay_entry_release_ov( op, e, 0, on );
|
|
}
|
|
|
|
for ( domain = legacy ? legacy : domains;
|
|
domain;
|
|
domain = domain->next )
|
|
{
|
|
unique_domain_uri *uri;
|
|
|
|
for ( uri = domain->uri;
|
|
uri;
|
|
uri = uri->next )
|
|
{
|
|
int i, len;
|
|
int ks = 0;
|
|
|
|
if ( uri->ndn.bv_val
|
|
&& !dnIsSuffix( &op->o_req_ndn, &uri->ndn )
|
|
&& (!op->orr_nnewSup
|
|
|| !dnIsSuffix( op->orr_nnewSup, &uri->ndn )))
|
|
continue;
|
|
|
|
if ( ldap_bv2rdn_x ( &op->oq_modrdn.rs_newrdn,
|
|
&newrdn,
|
|
(char **)&rs->sr_text,
|
|
LDAP_DN_FORMAT_LDAP,
|
|
op->o_tmpmemctx ) ) {
|
|
op->o_bd->bd_info = (BackendInfo *) on->on_info;
|
|
send_ldap_error(op, rs, LDAP_INVALID_SYNTAX,
|
|
"unknown type(s) used in RDN");
|
|
rc = rs->sr_err;
|
|
break;
|
|
}
|
|
|
|
rc = SLAP_CB_CONTINUE;
|
|
for ( i=0; newrdn[i]; i++) {
|
|
AttributeDescription *ad = NULL;
|
|
if ( slap_bv2ad( &newrdn[i]->la_attr, &ad, &rs->sr_text )) {
|
|
ldap_rdnfree_x( newrdn, op->o_tmpmemctx );
|
|
rs->sr_err = LDAP_INVALID_SYNTAX;
|
|
send_ldap_result( op, rs );
|
|
rc = rs->sr_err;
|
|
break;
|
|
}
|
|
newrdn[i]->la_private = ad;
|
|
}
|
|
if ( rc != SLAP_CB_CONTINUE ) break;
|
|
|
|
bv[1].bv_val = NULL;
|
|
bv[1].bv_len = 0;
|
|
|
|
for ( i=0; newrdn[i]; i++ ) {
|
|
bv[0] = newrdn[i]->la_value;
|
|
ks += count_filter_len ( domain,
|
|
uri,
|
|
newrdn[i]->la_private,
|
|
bv);
|
|
}
|
|
|
|
/* skip this domain if it isn't involved */
|
|
if ( !ks ) continue;
|
|
|
|
if ( domain->serial && !locked ) {
|
|
ldap_pvt_thread_mutex_lock( &private->serial_mutex );
|
|
locked = 1;
|
|
}
|
|
|
|
/* terminating NUL */
|
|
ks += sizeof("(|)");
|
|
|
|
if ( uri->filter.bv_val && uri->filter.bv_len )
|
|
ks += uri->filter.bv_len + STRLENOF ("(&)");
|
|
kp = key = op->o_tmpalloc(ks, op->o_tmpmemctx);
|
|
|
|
if ( uri->filter.bv_val && uri->filter.bv_len ) {
|
|
len = snprintf(kp, ks, "(&%s", uri->filter.bv_val);
|
|
assert( len >= 0 && len < ks );
|
|
kp += len;
|
|
}
|
|
len = snprintf(kp, ks - (kp - key), "(|");
|
|
assert( len >= 0 && len < ks - (kp - key) );
|
|
kp += len;
|
|
|
|
for ( i=0; newrdn[i]; i++) {
|
|
bv[0] = newrdn[i]->la_value;
|
|
kp = build_filter ( domain,
|
|
uri,
|
|
newrdn[i]->la_private,
|
|
bv,
|
|
kp,
|
|
ks - (kp - key ),
|
|
op->o_tmpmemctx);
|
|
}
|
|
|
|
len = snprintf(kp, ks - (kp - key), ")");
|
|
assert( len >= 0 && len < ks - (kp - key) );
|
|
kp += len;
|
|
if ( uri->filter.bv_val && uri->filter.bv_len ) {
|
|
len = snprintf (kp, ks - (kp - key), ")");
|
|
assert( len >= 0 && len < ks - (kp - key) );
|
|
kp += len;
|
|
}
|
|
bvkey.bv_val = key;
|
|
bvkey.bv_len = kp - key;
|
|
|
|
rc = unique_search ( op,
|
|
&nop,
|
|
uri->ndn.bv_val ?
|
|
&uri->ndn :
|
|
&op->o_bd->be_nsuffix[0],
|
|
uri->scope,
|
|
rs,
|
|
&bvkey);
|
|
|
|
if ( rc != SLAP_CB_CONTINUE ) break;
|
|
}
|
|
if ( rc != SLAP_CB_CONTINUE ) break;
|
|
}
|
|
|
|
if ( locked ) {
|
|
if ( rc != SLAP_CB_CONTINUE ) {
|
|
ldap_pvt_thread_mutex_unlock( &private->serial_mutex );
|
|
} else {
|
|
slap_callback *cb = op->o_tmpcalloc( 1, sizeof(slap_callback), op->o_tmpmemctx );
|
|
cb->sc_cleanup = unique_unlock;
|
|
cb->sc_private = private;
|
|
cb->sc_next = op->o_callback;
|
|
op->o_callback = cb;
|
|
}
|
|
}
|
|
return rc;
|
|
}
|
|
|
|
/*
|
|
** init_module is last so the symbols resolve "for free" --
|
|
** it expects to be called automagically during dynamic module initialization
|
|
*/
|
|
|
|
int
|
|
unique_initialize()
|
|
{
|
|
int rc;
|
|
|
|
/* statically declared just after the #includes at top */
|
|
memset (&unique, 0, sizeof(unique));
|
|
|
|
unique.on_bi.bi_type = "unique";
|
|
unique.on_bi.bi_flags = SLAPO_BFLAG_SINGLE;
|
|
unique.on_bi.bi_db_init = unique_db_init;
|
|
unique.on_bi.bi_db_destroy = unique_db_destroy;
|
|
unique.on_bi.bi_op_add = unique_add;
|
|
unique.on_bi.bi_op_modify = unique_modify;
|
|
unique.on_bi.bi_op_modrdn = unique_modrdn;
|
|
|
|
unique.on_bi.bi_cf_ocs = uniqueocs;
|
|
rc = config_register_schema( uniquecfg, uniqueocs );
|
|
if ( rc ) return rc;
|
|
|
|
return(overlay_register(&unique));
|
|
}
|
|
|
|
#if SLAPD_OVER_UNIQUE == SLAPD_MOD_DYNAMIC && defined(PIC)
|
|
int init_module(int argc, char *argv[]) {
|
|
return unique_initialize();
|
|
}
|
|
#endif
|
|
|
|
#endif /* SLAPD_OVER_UNIQUE */
|