/* $OpenLDAP$ */ /* This work is part of OpenLDAP Software . * * Copyright 2004-2022 The OpenLDAP Foundation. * Portions Copyright 2004 Pierangelo Masarati. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted only as authorized by the OpenLDAP * Public License. * * A copy of this license is available in file LICENSE in the * top-level directory of the distribution or, alternatively, at * . */ /* ACKNOWLEDGEMENTS: * This work was initially developed by Pierangelo Masarati for inclusion * in OpenLDAP Software. */ #include "portable.h" #include #include #include #include #include #include #include #include #include #include "slapcommon.h" static int print_access( Operation *op, Entry *e, AttributeDescription *desc, struct berval *val, struct berval *nval ) { int rc; slap_mask_t mask; char accessmaskbuf[ACCESSMASK_MAXLEN]; rc = access_allowed_mask( op, e, desc, nval, ACL_AUTH, NULL, &mask ); fprintf( stderr, "%s%s%s: %s\n", desc->ad_cname.bv_val, ( val && !BER_BVISNULL( val ) ) ? "=" : "", ( val && !BER_BVISNULL( val ) ) ? ( desc == slap_schema.si_ad_userPassword ? "****" : val->bv_val ) : "", accessmask2str( mask, accessmaskbuf, 1 ) ); return rc; } int slapacl( int argc, char **argv ) { int rc = EXIT_SUCCESS; const char *progname = "slapacl"; Connection conn = { 0 }; Listener listener; OperationBuffer opbuf; Operation *op = NULL; Entry e = { 0 }, *ep = &e; char *attr = NULL; int doclose = 0; BackendDB *bd; void *thrctx; slap_tool_init( progname, SLAPACL, argc, argv ); if ( !dryrun ) { int i = 0; LDAP_STAILQ_FOREACH( bd, &backendDB, be_next ) { if ( bd != be && backend_startup( bd ) ) { fprintf( stderr, "backend_startup(#%d%s%s) failed\n", i, bd->be_suffix ? ": " : "", bd->be_suffix ? bd->be_suffix[0].bv_val : "" ); rc = 1; goto destroy; } i++; } } argv = &argv[ optind ]; argc -= optind; thrctx = ldap_pvt_thread_pool_context(); connection_fake_init( &conn, &opbuf, thrctx ); op = &opbuf.ob_op; op->o_tmpmemctx = NULL; conn.c_listener = &listener; conn.c_listener_url = listener_url; conn.c_peer_domain = peer_domain; conn.c_peer_name = peer_name; conn.c_sock_name = sock_name; op->o_ssf = ssf; op->o_transport_ssf = transport_ssf; op->o_tls_ssf = tls_ssf; op->o_sasl_ssf = sasl_ssf; if ( !BER_BVISNULL( &authcID ) ) { if ( !BER_BVISNULL( &authcDN ) ) { fprintf( stderr, "both authcID=\"%s\" " "and authcDN=\"%s\" provided\n", authcID.bv_val, authcDN.bv_val ); rc = 1; goto destroy; } rc = slap_sasl_getdn( &conn, op, &authcID, NULL, &authcDN, SLAP_GETDN_AUTHCID ); if ( rc != LDAP_SUCCESS ) { fprintf( stderr, "authcID: <%s> check failed %d (%s)\n", authcID.bv_val, rc, ldap_err2string( rc ) ); rc = 1; goto destroy; } } else if ( !BER_BVISNULL( &authcDN ) ) { struct berval ndn; rc = dnNormalize( 0, NULL, NULL, &authcDN, &ndn, NULL ); if ( rc != LDAP_SUCCESS ) { fprintf( stderr, "autchDN=\"%s\" normalization failed %d (%s)\n", authcDN.bv_val, rc, ldap_err2string( rc ) ); rc = 1; goto destroy; } ch_free( authcDN.bv_val ); authcDN = ndn; } if ( !BER_BVISNULL( &authzID ) ) { if ( !BER_BVISNULL( &authzDN ) ) { fprintf( stderr, "both authzID=\"%s\" " "and authzDN=\"%s\" provided\n", authzID.bv_val, authzDN.bv_val ); rc = 1; goto destroy; } rc = slap_sasl_getdn( &conn, op, &authzID, NULL, &authzDN, SLAP_GETDN_AUTHZID ); if ( rc != LDAP_SUCCESS ) { fprintf( stderr, "authzID: <%s> check failed %d (%s)\n", authzID.bv_val, rc, ldap_err2string( rc ) ); rc = 1; goto destroy; } } else if ( !BER_BVISNULL( &authzDN ) ) { struct berval ndn; rc = dnNormalize( 0, NULL, NULL, &authzDN, &ndn, NULL ); if ( rc != LDAP_SUCCESS ) { fprintf( stderr, "autchDN=\"%s\" normalization failed %d (%s)\n", authzDN.bv_val, rc, ldap_err2string( rc ) ); rc = 1; goto destroy; } ch_free( authzDN.bv_val ); authzDN = ndn; } if ( !BER_BVISNULL( &authcDN ) ) { fprintf( stderr, "authcDN: \"%s\"\n", authcDN.bv_val ); } if ( !BER_BVISNULL( &authzDN ) ) { fprintf( stderr, "authzDN: \"%s\"\n", authzDN.bv_val ); } if ( !BER_BVISNULL( &authzDN ) ) { op->o_dn = authzDN; op->o_ndn = authzDN; if ( !BER_BVISNULL( &authcDN ) ) { op->o_conn->c_dn = authcDN; op->o_conn->c_ndn = authcDN; } else { op->o_conn->c_dn = authzDN; op->o_conn->c_ndn = authzDN; } } else if ( !BER_BVISNULL( &authcDN ) ) { op->o_conn->c_dn = authcDN; op->o_conn->c_ndn = authcDN; op->o_dn = authcDN; op->o_ndn = authcDN; } assert( !BER_BVISNULL( &baseDN ) ); rc = dnPrettyNormal( NULL, &baseDN, &e.e_name, &e.e_nname, NULL ); if ( rc != LDAP_SUCCESS ) { fprintf( stderr, "base=\"%s\" normalization failed %d (%s)\n", baseDN.bv_val, rc, ldap_err2string( rc ) ); rc = 1; goto destroy; } op->o_bd = be; if ( op->o_bd == NULL ) { /* NOTE: if no database could be found (e.g. because * accessing the rootDSE or so), use the frontendDB * rules; might need work */ op->o_bd = frontendDB; } if ( !dryrun ) { ID id; if ( be == NULL ) { fprintf( stderr, "%s: no target database " "has been found for baseDN=\"%s\"; " "you may try with \"-u\" (dry run).\n", baseDN.bv_val, progname ); rc = 1; goto destroy; } if ( !be->be_entry_open || !be->be_entry_close || !be->be_dn2id_get || !be->be_entry_get ) { fprintf( stderr, "%s: target database " "doesn't support necessary operations; " "you may try with \"-u\" (dry run).\n", progname ); rc = 1; goto destroy; } if ( be->be_entry_open( be, 0 ) != 0 ) { fprintf( stderr, "%s: could not open database.\n", progname ); rc = 1; goto destroy; } doclose = 1; id = be->be_dn2id_get( be, &e.e_nname ); if ( id == NOID ) { fprintf( stderr, "%s: unable to fetch ID of DN \"%s\"\n", progname, e.e_nname.bv_val ); rc = 1; goto destroy; } ep = be->be_entry_get( be, id ); if ( ep == NULL ) { fprintf( stderr, "%s: unable to fetch entry \"%s\" (%lu)\n", progname, e.e_nname.bv_val, id ); rc = 1; goto destroy; } if ( argc == 0 ) { Attribute *a; (void)print_access( op, ep, slap_schema.si_ad_entry, NULL, NULL ); (void)print_access( op, ep, slap_schema.si_ad_children, NULL, NULL ); for ( a = ep->e_attrs; a; a = a->a_next ) { int i; for ( i = 0; !BER_BVISNULL( &a->a_nvals[ i ] ); i++ ) { (void)print_access( op, ep, a->a_desc, &a->a_vals[ i ], &a->a_nvals[ i ] ); } } } } for ( ; argc--; argv++ ) { slap_mask_t mask; AttributeDescription *desc = NULL; struct berval val = BER_BVNULL, *valp = NULL; const char *text; char accessmaskbuf[ACCESSMASK_MAXLEN]; char *accessstr; slap_access_t access = ACL_AUTH; if ( attr == NULL ) { attr = argv[ 0 ]; } val.bv_val = strchr( attr, ':' ); if ( val.bv_val != NULL ) { val.bv_val[0] = '\0'; val.bv_val++; val.bv_len = strlen( val.bv_val ); valp = &val; } accessstr = strchr( attr, '/' ); if ( accessstr != NULL ) { int invalid = 0; accessstr[0] = '\0'; accessstr++; access = str2access( accessstr ); switch ( access ) { case ACL_INVALID_ACCESS: fprintf( stderr, "unknown access \"%s\" for attribute \"%s\"\n", accessstr, attr ); invalid = 1; break; case ACL_NONE: fprintf( stderr, "\"none\" not allowed for attribute \"%s\"\n", attr ); invalid = 1; break; default: break; } if ( invalid ) { if ( continuemode ) { continue; } break; } } rc = slap_str2ad( attr, &desc, &text ); if ( rc != LDAP_SUCCESS ) { fprintf( stderr, "slap_str2ad(%s) failed %d (%s)\n", attr, rc, ldap_err2string( rc ) ); if ( continuemode ) { continue; } break; } rc = access_allowed_mask( op, ep, desc, valp, access, NULL, &mask ); if ( accessstr ) { fprintf( stderr, "%s access to %s%s%s: %s\n", accessstr, desc->ad_cname.bv_val, val.bv_val ? "=" : "", val.bv_val ? val.bv_val : "", rc ? "ALLOWED" : "DENIED" ); } else { fprintf( stderr, "%s%s%s: %s\n", desc->ad_cname.bv_val, val.bv_val ? "=" : "", val.bv_val ? val.bv_val : "", accessmask2str( mask, accessmaskbuf, 1 ) ); } rc = 0; attr = NULL; } destroy:; if ( !BER_BVISNULL( &e.e_name ) ) { ber_memfree( e.e_name.bv_val ); } if ( !BER_BVISNULL( &e.e_nname ) ) { ber_memfree( e.e_nname.bv_val ); } if ( !dryrun && be ) { if ( ep && ep != &e ) { be_entry_release_r( op, ep ); } if ( doclose ) { be->be_entry_close( be ); } LDAP_STAILQ_FOREACH( bd, &backendDB, be_next ) { if ( bd != be ) { backend_shutdown( bd ); } } } if ( slap_tool_destroy()) rc = EXIT_FAILURE; return rc; }