mirror of
https://git.openldap.org/openldap/openldap.git
synced 2024-12-21 03:10:25 +08:00
275 lines
7.4 KiB
C
275 lines
7.4 KiB
C
/* SASL LDAP auxprop implementation
|
|
* Copyright (C) 2002,2003 Howard Chu, All rights reserved. <hyc@symas.com>
|
|
*
|
|
* Permission is granted to anyone to use this software for any purpose
|
|
* on any computer system, and to alter it and redistribute it, subject
|
|
* to the following restrictions:
|
|
*
|
|
* 1. The author is not responsible for the consequences of use of this
|
|
* software, no matter how awful, even if they arise from flaws in it.
|
|
*
|
|
* 2. The origin of this software must not be misrepresented, either by
|
|
* explicit claim or by omission. Since few users ever read sources,
|
|
* credits should appear in the documentation.
|
|
*
|
|
* 3. Altered versions must be plainly marked as such, and must not be
|
|
* misrepresented as being the original software. Since few users
|
|
* ever read sources, credits should appear in the documentation.
|
|
*
|
|
* 4. This notice may not be removed or altered.
|
|
*/
|
|
|
|
#include <config.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include "sasl.h"
|
|
#include "saslutil.h"
|
|
#include "saslplug.h"
|
|
|
|
#include "plugin_common.h"
|
|
|
|
#include <ldap.h>
|
|
|
|
static char ldapdb[] = "ldapdb";
|
|
|
|
typedef struct ldapctx {
|
|
const char *uri; /* URI of LDAP server */
|
|
struct berval id; /* SASL authcid to bind as */
|
|
struct berval pw; /* password for bind */
|
|
struct berval mech; /* SASL mech */
|
|
int use_tls; /* Issue StartTLS request? */
|
|
} ldapctx;
|
|
|
|
typedef struct gluectx {
|
|
ldapctx *lc;
|
|
sasl_server_params_t *lp;
|
|
} gluectx;
|
|
|
|
static int ldapdb_interact(LDAP *ld, unsigned flags __attribute__((unused)),
|
|
void *def, void *inter)
|
|
{
|
|
sasl_interact_t *in = inter;
|
|
gluectx *gc = def;
|
|
struct berval p;
|
|
|
|
for (;in->id != SASL_CB_LIST_END;in++)
|
|
{
|
|
p.bv_val = NULL;
|
|
switch(in->id)
|
|
{
|
|
case SASL_CB_GETREALM:
|
|
ldap_get_option(ld, LDAP_OPT_X_SASL_REALM, &p.bv_val);
|
|
if (p.bv_val) p.bv_len = strlen(p.bv_val);
|
|
break;
|
|
case SASL_CB_AUTHNAME:
|
|
p = gc->lc->id;
|
|
break;
|
|
case SASL_CB_PASS:
|
|
p = gc->lc->pw;
|
|
break;
|
|
}
|
|
if (p.bv_val)
|
|
{
|
|
in->result = p.bv_val;
|
|
in->len = p.bv_len;
|
|
}
|
|
}
|
|
return LDAP_SUCCESS;
|
|
}
|
|
|
|
static void ldapdb_auxprop_lookup(void *glob_context,
|
|
sasl_server_params_t *sparams,
|
|
unsigned flags,
|
|
const char *user,
|
|
unsigned ulen)
|
|
{
|
|
ldapctx *ctx = glob_context;
|
|
int ret, i, n, *aindx;
|
|
const struct propval *pr;
|
|
LDAP *ld = NULL;
|
|
gluectx gc;
|
|
struct berval *dn = NULL, **bvals;
|
|
LDAPMessage *msg, *res;
|
|
char **attrs = NULL, *authzid = NULL;
|
|
LDAPControl c, *ctrl[2];
|
|
|
|
if(!ctx || !sparams || !user) return;
|
|
|
|
pr = sparams->utils->prop_get(sparams->propctx);
|
|
if(!pr) return;
|
|
|
|
/* count how many attrs to fetch */
|
|
for(i = 0, n = 0; pr[i].name; i++) {
|
|
if(pr[i].name[0] == '*' && (flags & SASL_AUXPROP_AUTHZID))
|
|
continue;
|
|
if(pr[i].values && !(flags & SASL_AUXPROP_OVERRIDE))
|
|
continue;
|
|
n++;
|
|
}
|
|
/* nothing to do, bail out */
|
|
if (!n) return;
|
|
|
|
/* alloc an array of attr names for search, and index to the props */
|
|
attrs = sparams->utils->malloc((n+1)*sizeof(char *)*2);
|
|
if (!attrs) return;
|
|
|
|
aindx = (int *)(attrs + n + 1);
|
|
|
|
/* copy attr list */
|
|
for (i=0, n=0; pr[i].name; i++) {
|
|
if(pr[i].name[0] == '*' && (flags & SASL_AUXPROP_AUTHZID))
|
|
continue;
|
|
if(pr[i].values && !(flags & SASL_AUXPROP_OVERRIDE))
|
|
continue;
|
|
attrs[n] = (char *)pr[i].name;
|
|
if (pr[i].name[0] == '*') attrs[n]++;
|
|
aindx[n] = i;
|
|
n++;
|
|
}
|
|
attrs[n] = NULL;
|
|
|
|
if(ldap_initialize(&ld, ctx->uri)) {
|
|
sparams->utils->free(attrs);
|
|
return;
|
|
}
|
|
|
|
authzid = sparams->utils->malloc(ulen + sizeof("u:"));
|
|
if (!authzid) goto done;
|
|
strcpy(authzid, "u:");
|
|
strcpy(authzid+2, user);
|
|
c.ldctl_oid = LDAP_CONTROL_PROXY_AUTHZ;
|
|
c.ldctl_value.bv_val = authzid;
|
|
c.ldctl_value.bv_len = ulen + 2;
|
|
c.ldctl_iscritical = 1;
|
|
|
|
i = LDAP_VERSION3;
|
|
ret = ldap_set_option(ld, LDAP_OPT_PROTOCOL_VERSION, &i);
|
|
|
|
/* If TLS is set and it fails, continue or bail out as requested */
|
|
if (ctx->use_tls && ldap_start_tls_s(ld, NULL, NULL) != LDAP_SUCCESS) {
|
|
if (ctx->use_tls > 1) goto done;
|
|
}
|
|
|
|
gc.lc = ctx;
|
|
gc.lp = sparams;
|
|
ret = ldap_sasl_interactive_bind_s(ld, NULL, ctx->mech.bv_val, NULL, NULL,
|
|
LDAP_SASL_QUIET, ldapdb_interact, &gc);
|
|
if (ret != LDAP_SUCCESS) goto done;
|
|
|
|
ctrl[0] = &c;
|
|
ctrl[1] = NULL;
|
|
ret = ldap_whoami_s(ld, &dn, ctrl, NULL);
|
|
if (ret != LDAP_SUCCESS || !dn) goto done;
|
|
|
|
if (!dn->bv_val || strncmp(dn->bv_val, "dn:", 3)) {
|
|
ber_bvfree(dn);
|
|
goto done;
|
|
}
|
|
c.ldctl_value = *dn;
|
|
ret = ldap_search_ext_s(ld, dn->bv_val+3, LDAP_SCOPE_BASE,
|
|
"(objectclass=*)", attrs, 0, ctrl, NULL, NULL, 1, &res);
|
|
ber_bvfree(dn);
|
|
|
|
if (ret != LDAP_SUCCESS) goto done;
|
|
|
|
for(msg=ldap_first_message(ld, res); msg; msg=ldap_next_message(ld, msg))
|
|
{
|
|
if (ldap_msgtype(msg) != LDAP_RES_SEARCH_ENTRY) continue;
|
|
for (i=0; i<n; i++)
|
|
{
|
|
bvals = ldap_get_values_len(ld, msg, attrs[i]);
|
|
if (!bvals) continue;
|
|
if (pr[aindx[i]].values)
|
|
sparams->utils->prop_erase(sparams->propctx, pr[aindx[i]].name);
|
|
sparams->utils->prop_set(sparams->propctx, pr[aindx[i]].name,
|
|
bvals[0]->bv_val, bvals[0]->bv_len);
|
|
ber_bvecfree(bvals);
|
|
}
|
|
}
|
|
ldap_msgfree(res);
|
|
|
|
done:
|
|
if(authzid) sparams->utils->free(authzid);
|
|
if(attrs) sparams->utils->free(attrs);
|
|
if(ld) ldap_unbind(ld);
|
|
}
|
|
|
|
static void ldapdb_auxprop_free(void *glob_ctx, const sasl_utils_t *utils)
|
|
{
|
|
utils->free(glob_ctx);
|
|
}
|
|
|
|
static sasl_auxprop_plug_t ldapdb_auxprop_plugin = {
|
|
0, /* Features */
|
|
0, /* spare */
|
|
NULL, /* glob_context */
|
|
ldapdb_auxprop_free, /* auxprop_free */
|
|
ldapdb_auxprop_lookup, /* auxprop_lookup */
|
|
ldapdb, /* name */
|
|
NULL /* spare */
|
|
};
|
|
|
|
static int ldapdb_auxprop_plug_init(const sasl_utils_t *utils,
|
|
int max_version,
|
|
int *out_version,
|
|
sasl_auxprop_plug_t **plug,
|
|
const char *plugname __attribute__((unused)))
|
|
{
|
|
ldapctx tmp, *p;
|
|
const char *s;
|
|
unsigned len;
|
|
|
|
if(!out_version || !plug) return SASL_BADPARAM;
|
|
|
|
if(max_version < SASL_AUXPROP_PLUG_VERSION) return SASL_BADVERS;
|
|
|
|
memset(&tmp, 0, sizeof(tmp));
|
|
|
|
utils->getopt(utils->getopt_context, ldapdb, "ldapdb_uri", &tmp.uri, NULL);
|
|
if(!tmp.uri) return SASL_BADPARAM;
|
|
|
|
utils->getopt(utils->getopt_context, ldapdb, "ldapdb_id",
|
|
(const char **)&tmp.id.bv_val, &len);
|
|
tmp.id.bv_len = len;
|
|
utils->getopt(utils->getopt_context, ldapdb, "ldapdb_pw",
|
|
(const char **)&tmp.pw.bv_val, &len);
|
|
tmp.pw.bv_len = len;
|
|
utils->getopt(utils->getopt_context, ldapdb, "ldapdb_mech",
|
|
(const char **)&tmp.mech.bv_val, &len);
|
|
tmp.mech.bv_len = len;
|
|
utils->getopt(utils->getopt_context, ldapdb, "ldapdb_starttls", &s, NULL);
|
|
if (s)
|
|
{
|
|
if (!strcasecmp(s, "demand")) tmp.use_tls = 2;
|
|
else if (!strcasecmp(s, "try")) tmp.use_tls = 1;
|
|
}
|
|
utils->getopt(utils->getopt_context, ldapdb, "ldapdb_rc", &s, &len);
|
|
if (s)
|
|
{
|
|
char *str = utils->malloc(sizeof("LDAPRC=")+len);
|
|
if (!str) return SASL_NOMEM;
|
|
strcpy( str, "LDAPRC=" );
|
|
strcpy( str + sizeof("LDAPRC=")-1, s );
|
|
if (putenv(str))
|
|
{
|
|
utils->free(str);
|
|
return SASL_NOMEM;
|
|
}
|
|
}
|
|
|
|
p = utils->malloc(sizeof(ldapctx));
|
|
if (!p) return SASL_NOMEM;
|
|
*p = tmp;
|
|
ldapdb_auxprop_plugin.glob_context = p;
|
|
|
|
*out_version = SASL_AUXPROP_PLUG_VERSION;
|
|
|
|
*plug = &ldapdb_auxprop_plugin;
|
|
|
|
return SASL_OK;
|
|
}
|
|
|
|
SASL_AUXPROP_PLUG_INIT( ldapdb )
|
|
|