From b527294153be3b79563c82c66102adc0004736c0 Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Mon, 15 Apr 2024 19:54:12 +0200 Subject: Adding upstream version 2.6.7+dfsg. Signed-off-by: Daniel Baumann --- servers/slapd/back-null/null.c | 472 +++++++++++++++++++++++++++++++++++++++++ 1 file changed, 472 insertions(+) create mode 100644 servers/slapd/back-null/null.c (limited to 'servers/slapd/back-null/null.c') diff --git a/servers/slapd/back-null/null.c b/servers/slapd/back-null/null.c new file mode 100644 index 0000000..c8d3292 --- /dev/null +++ b/servers/slapd/back-null/null.c @@ -0,0 +1,472 @@ +/* null.c - the null backend */ +/* $OpenLDAP$ */ +/* This work is part of OpenLDAP Software . + * + * Copyright 2002-2022 The OpenLDAP Foundation. + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted only as authorized by the OpenLDAP + * Public License. + * + * A copy of this license is available in the file LICENSE in the + * top-level directory of the distribution or, alternatively, at + * . + */ +/* ACKNOWLEDGEMENTS: + * This work was originally developed by Hallvard Furuseth for inclusion + * in OpenLDAP Software. + */ + +#include "portable.h" + +#include +#include + +#include "slap.h" +#include "slap-config.h" + +typedef struct null_info { + int ni_bind_allowed; + int ni_dosearch; + ID ni_nextid; + Entry *ni_entry; +} null_info; + +static ConfigTable nullcfg[] = { + { "bind", "true|FALSE", 1, 2, 0, ARG_ON_OFF|ARG_OFFSET, + (void *)offsetof(null_info, ni_bind_allowed), + "( OLcfgDbAt:8.1 NAME 'olcDbBindAllowed' " + "DESC 'Allow binds to this database' " + "EQUALITY booleanMatch " + "SYNTAX OMsBoolean SINGLE-VALUE )", NULL, NULL }, + { "dosearch", "true|FALSE", 1, 2, 0, ARG_ON_OFF|ARG_OFFSET, + (void *)offsetof(null_info, ni_dosearch), + "( OLcfgDbAt:8.2 NAME 'olcDbDoSearch' " + "DESC 'Return an entry on searches' " + "EQUALITY booleanMatch " + "SYNTAX OMsBoolean SINGLE-VALUE )", NULL, NULL }, + { NULL, NULL, 0, 0, 0, ARG_IGNORED, + NULL, NULL, NULL, NULL } +}; + +static ConfigOCs nullocs[] = { + { "( OLcfgDbOc:8.1 " + "NAME 'olcNullConfig' " + "DESC 'Null backend configuration' " + "SUP olcDatabaseConfig " + "MAY ( olcDbBindAllowed $ olcDbDoSearch ) )", + Cft_Database, nullcfg }, + { NULL, 0, NULL } +}; + + +static int +null_back_db_open( BackendDB *be, ConfigReply *cr ) +{ + struct null_info *ni = (struct null_info *) be->be_private; + struct berval bv[2]; + AttributeDescription *ad = NULL; + const char *text; + Entry *e; + + if ( ni->ni_dosearch ) { + e = entry_alloc(); + ber_dupbv( &e->e_name, &be->be_suffix[0] ); + ber_dupbv( &e->e_nname, &be->be_nsuffix[0] ); + + dnRdn( &e->e_nname, &bv[0] ); + bv[1].bv_val = strchr(bv[0].bv_val, '=') + 1; + bv[1].bv_len = bv[0].bv_len - (bv[1].bv_val - + bv[0].bv_val); + bv[0].bv_len -= bv[1].bv_len + 1; + slap_bv2ad( &bv[0], &ad, &text ); + attr_merge_one( e, ad, &bv[1], NULL ); + + ber_str2bv("extensibleObject", 0, 0, &bv[0]); + attr_merge_one( e, slap_schema.si_ad_objectClass, &bv[0], NULL); + ni->ni_entry = e; + } + return 0; +} + +/* LDAP operations */ + +static int +null_back_bind( Operation *op, SlapReply *rs ) +{ + struct null_info *ni = (struct null_info *) op->o_bd->be_private; + + if ( ni->ni_bind_allowed || be_isroot_pw( op ) ) { + /* front end will send result on success (0) */ + return LDAP_SUCCESS; + } + + rs->sr_err = LDAP_INVALID_CREDENTIALS; + send_ldap_result( op, rs ); + + return rs->sr_err; +} + + +static int +null_back_respond( Operation *op, SlapReply *rs, int rc ) +{ + LDAPControl ctrl[SLAP_MAX_RESPONSE_CONTROLS], *ctrls[SLAP_MAX_RESPONSE_CONTROLS]; + int c = 0; + + BerElementBuffer ps_berbuf; + BerElement *ps_ber = NULL; + LDAPControl **preread_ctrl = NULL, + **postread_ctrl = NULL; + + rs->sr_err = LDAP_OTHER; + + /* this comes first, as in case of assertion failure + * any further processing must stop */ + if ( get_assert( op ) ) { + rs->sr_err = LDAP_ASSERTION_FAILED; + goto respond; + } + + if ( op->o_preread ) { + Entry e = { 0 }; + + switch ( op->o_tag ) { + case LDAP_REQ_MODIFY: + case LDAP_REQ_RENAME: + case LDAP_REQ_DELETE: + e.e_name = op->o_req_dn; + e.e_nname = op->o_req_ndn; + + preread_ctrl = &ctrls[c]; + *preread_ctrl = NULL; + + if ( slap_read_controls( op, rs, &e, + &slap_pre_read_bv, preread_ctrl ) ) + { + preread_ctrl = NULL; + + Debug( LDAP_DEBUG_TRACE, + "<=- null_back_respond: pre-read " + "failed!\n" ); + + if ( op->o_preread & SLAP_CONTROL_CRITICAL ) { + /* FIXME: is it correct to abort + * operation if control fails? */ + goto respond; + } + + } else { + c++; + } + break; + } + } + + if ( op->o_postread ) { + Entry e = { 0 }; + + switch ( op->o_tag ) { + case LDAP_REQ_ADD: + case LDAP_REQ_MODIFY: + case LDAP_REQ_RENAME: + if ( op->o_tag == LDAP_REQ_ADD ) { + e.e_name = op->ora_e->e_name; + e.e_nname = op->ora_e->e_nname; + + } else { + e.e_name = op->o_req_dn; + e.e_nname = op->o_req_ndn; + } + + postread_ctrl = &ctrls[c]; + *postread_ctrl = NULL; + + if ( slap_read_controls( op, rs, &e, + &slap_post_read_bv, postread_ctrl ) ) + { + postread_ctrl = NULL; + + Debug( LDAP_DEBUG_TRACE, + "<=- null_back_respond: post-read " + "failed!\n" ); + + if ( op->o_postread & SLAP_CONTROL_CRITICAL ) { + /* FIXME: is it correct to abort + * operation if control fails? */ + goto respond; + } + + } else { + c++; + } + break; + } + } + + if ( op->o_noop ) { + switch ( op->o_tag ) { + case LDAP_REQ_ADD: + case LDAP_REQ_MODIFY: + case LDAP_REQ_RENAME: + case LDAP_REQ_DELETE: + case LDAP_REQ_EXTENDED: + rc = LDAP_X_NO_OPERATION; + break; + } + } + + if ( get_pagedresults( op ) > SLAP_CONTROL_IGNORED ) { + struct berval cookie = BER_BVC( "" ); + + /* should not be here... */ + assert( op->o_tag == LDAP_REQ_SEARCH ); + + ctrl[c].ldctl_oid = LDAP_CONTROL_PAGEDRESULTS; + ctrl[c].ldctl_iscritical = 0; + + ps_ber = (BerElement *)&ps_berbuf; + ber_init2( ps_ber, NULL, LBER_USE_DER ); + + /* return size of 0 -- no estimate */ + ber_printf( ps_ber, "{iO}", 0, &cookie ); + + if ( ber_flatten2( ps_ber, &ctrl[c].ldctl_value, 0 ) == -1 ) { + goto done; + } + + ctrls[c] = &ctrl[c]; + c++; + } + + /* terminate controls array */ + ctrls[c] = NULL; + rs->sr_ctrls = ctrls; + rs->sr_err = rc; + +respond:; + send_ldap_result( op, rs ); + rs->sr_ctrls = NULL; + +done:; + if ( ps_ber != NULL ) { + (void) ber_free_buf( ps_ber ); + } + + if( preread_ctrl != NULL && (*preread_ctrl) != NULL ) { + slap_sl_free( (*preread_ctrl)->ldctl_value.bv_val, op->o_tmpmemctx ); + slap_sl_free( *preread_ctrl, op->o_tmpmemctx ); + } + + if( postread_ctrl != NULL && (*postread_ctrl) != NULL ) { + slap_sl_free( (*postread_ctrl)->ldctl_value.bv_val, op->o_tmpmemctx ); + slap_sl_free( *postread_ctrl, op->o_tmpmemctx ); + } + + return rs->sr_err; +} + +/* add, delete, modify, modrdn, search */ +static int +null_back_success( Operation *op, SlapReply *rs ) +{ + return null_back_respond( op, rs, LDAP_SUCCESS ); +} + +/* compare */ +static int +null_back_false( Operation *op, SlapReply *rs ) +{ + return null_back_respond( op, rs, LDAP_COMPARE_FALSE ); +} + +static int +null_back_search( Operation *op, SlapReply *rs ) +{ + struct null_info *ni = (struct null_info *) op->o_bd->be_private; + + if ( ni->ni_entry ) { + rs->sr_entry = ni->ni_entry; + rs->sr_flags = 0; + + rs->sr_attrs = op->ors_attrs; + rs->sr_operational_attrs = NULL; + send_search_entry( op, rs ); + } + return null_back_respond( op, rs, LDAP_SUCCESS ); +} + +/* for overlays */ +static int +null_back_entry_get( + Operation *op, + struct berval *ndn, + ObjectClass *oc, + AttributeDescription *at, + int rw, + Entry **ent ) +{ + /* don't admit the object isn't there */ + return oc || at ? LDAP_NO_SUCH_ATTRIBUTE : LDAP_BUSY; +} + +static int +null_back_entry_release( + Operation *op, + Entry *e, + int rw ) +{ + /* we reuse our entry, don't free it */ + return 0; +} + +/* Slap tools */ + +static int +null_tool_entry_open( BackendDB *be, int mode ) +{ + return 0; +} + +static int +null_tool_entry_close( BackendDB *be ) +{ + assert( be != NULL ); + return 0; +} + +static ID +null_tool_entry_first_x( BackendDB *be, struct berval *base, int scope, Filter *f ) +{ + return NOID; +} + +static ID +null_tool_entry_next( BackendDB *be ) +{ + return NOID; +} + +static Entry * +null_tool_entry_get( BackendDB *be, ID id ) +{ + assert( slapMode & SLAP_TOOL_MODE ); + return NULL; +} + +static ID +null_tool_entry_put( BackendDB *be, Entry *e, struct berval *text ) +{ + assert( slapMode & SLAP_TOOL_MODE ); + assert( text != NULL ); + assert( text->bv_val != NULL ); + assert( text->bv_val[0] == '\0' ); /* overconservative? */ + + e->e_id = ((struct null_info *) be->be_private)->ni_nextid++; + return e->e_id; +} + + +/* Setup */ + +static int +null_back_db_init( BackendDB *be, ConfigReply *cr ) +{ + struct null_info *ni = ch_calloc( 1, sizeof(struct null_info) ); + ni->ni_bind_allowed = 0; + ni->ni_nextid = 1; + be->be_private = ni; + be->be_cf_ocs = be->bd_info->bi_cf_ocs; + return 0; +} + +static int +null_back_db_destroy( Backend *be, ConfigReply *cr ) +{ + struct null_info *ni = be->be_private; + + if ( ni->ni_entry ) { + entry_free( ni->ni_entry ); + ni->ni_entry = NULL; + } + free( be->be_private ); + return 0; +} + + +int +null_back_initialize( BackendInfo *bi ) +{ + static char *controls[] = { + LDAP_CONTROL_ASSERT, + LDAP_CONTROL_MANAGEDSAIT, + LDAP_CONTROL_NOOP, + LDAP_CONTROL_PAGEDRESULTS, + LDAP_CONTROL_SUBENTRIES, + LDAP_CONTROL_PRE_READ, + LDAP_CONTROL_POST_READ, + LDAP_CONTROL_X_PERMISSIVE_MODIFY, + NULL + }; + + Debug( LDAP_DEBUG_TRACE, + "null_back_initialize: initialize null backend\n" ); + + bi->bi_flags |= + SLAP_BFLAG_INCREMENT | + SLAP_BFLAG_SUBENTRIES | + SLAP_BFLAG_ALIASES | + SLAP_BFLAG_REFERRALS; + + bi->bi_controls = controls; + + bi->bi_open = 0; + bi->bi_close = 0; + bi->bi_config = 0; + bi->bi_destroy = 0; + + bi->bi_db_init = null_back_db_init; + bi->bi_db_config = config_generic_wrapper; + bi->bi_db_open = null_back_db_open; + bi->bi_db_close = 0; + bi->bi_db_destroy = null_back_db_destroy; + + bi->bi_op_bind = null_back_bind; + bi->bi_op_unbind = 0; + bi->bi_op_search = null_back_search; + bi->bi_op_compare = null_back_false; + bi->bi_op_modify = null_back_success; + bi->bi_op_modrdn = null_back_success; + bi->bi_op_add = null_back_success; + bi->bi_op_delete = null_back_success; + bi->bi_op_abandon = 0; + + bi->bi_extended = 0; + + bi->bi_chk_referrals = 0; + + bi->bi_connection_init = 0; + bi->bi_connection_destroy = 0; + + bi->bi_entry_get_rw = null_back_entry_get; + bi->bi_entry_release_rw = null_back_entry_release; + + bi->bi_tool_entry_open = null_tool_entry_open; + bi->bi_tool_entry_close = null_tool_entry_close; + bi->bi_tool_entry_first = backend_tool_entry_first; + bi->bi_tool_entry_first_x = null_tool_entry_first_x; + bi->bi_tool_entry_next = null_tool_entry_next; + bi->bi_tool_entry_get = null_tool_entry_get; + bi->bi_tool_entry_put = null_tool_entry_put; + + bi->bi_cf_ocs = nullocs; + return config_register_schema( nullcfg, nullocs ); +} + +#if SLAPD_NULL == SLAPD_MOD_DYNAMIC + +/* conditionally define the init_module() function */ +SLAP_BACKEND_INIT_MODULE( null ) + +#endif /* SLAPD_NULL == SLAPD_MOD_DYNAMIC */ -- cgit v1.2.3