diff options
author | Andrew Bartlett <abartlet@samba.org> | 2009-11-05 17:04:10 +1100 |
---|---|---|
committer | Andrew Bartlett <abartlet@samba.org> | 2009-11-12 16:34:04 +1100 |
commit | f0d43e9e562bfd7c254a9b2446fb11f85186b45e (patch) | |
tree | 08c4a939a51fa0625e3d99302eec1847f729ecb8 /source4/dsdb/samdb | |
parent | 973197cd9ded571ff02996cb5c133435a35976c5 (diff) | |
download | samba-f0d43e9e562bfd7c254a9b2446fb11f85186b45e.tar.gz samba-f0d43e9e562bfd7c254a9b2446fb11f85186b45e.tar.bz2 samba-f0d43e9e562bfd7c254a9b2446fb11f85186b45e.zip |
s4:dsdb Use new dsdb_dn code in LDB modules and Samba4 schema
This converts the code from using the binary DN code in ldb_dn to
using a special Samba-specfic wrapper around ldb_dn.
We also use the dsdb_dn code for DN+Binary and DN+String comparisons
(changed from treating them as Binary blobs)
Andrew Bartlett
Diffstat (limited to 'source4/dsdb/samdb')
-rw-r--r-- | source4/dsdb/samdb/ldb_modules/extended_dn_out.c | 36 | ||||
-rw-r--r-- | source4/dsdb/samdb/ldb_modules/extended_dn_store.c | 81 |
2 files changed, 72 insertions, 45 deletions
diff --git a/source4/dsdb/samdb/ldb_modules/extended_dn_out.c b/source4/dsdb/samdb/ldb_modules/extended_dn_out.c index cbbf8c6078..c4ddf6781f 100644 --- a/source4/dsdb/samdb/ldb_modules/extended_dn_out.c +++ b/source4/dsdb/samdb/ldb_modules/extended_dn_out.c @@ -2,7 +2,7 @@ ldb database library Copyright (C) Simo Sorce 2005-2008 - Copyright (C) Andrew Bartlett <abartlet@samba.org> 2007-2008 + Copyright (C) Andrew Bartlett <abartlet@samba.org> 2007-2009 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by @@ -420,21 +420,30 @@ static int extended_callback(struct ldb_request *req, struct ldb_reply *ares, } /* Look to see if this attributeSyntax is a DN */ - if (strcmp(attribute->attributeSyntax_oid, "2.5.5.1") != 0 && - strcmp(attribute->attributeSyntax_oid, "2.5.5.7") != 0) { + if (dsdb_dn_oid_to_format(attribute->syntax->ldap_oid) == DSDB_INVALID_DN) { continue; } for (j = 0; j < msg->elements[i].num_values; j++) { const char *dn_str; - struct ldb_dn *dn = ldb_dn_from_ldb_val(ac, ldb_module_get_ctx(ac->module), &msg->elements[i].values[j]); - if (!dn || !ldb_dn_validate(dn)) { + struct ldb_dn *dn; + struct dsdb_dn *dsdb_dn = NULL; + struct ldb_val *plain_dn = &msg->elements[i].values[j]; + dsdb_dn = dsdb_dn_parse(msg, ldb_module_get_ctx(ac->module), plain_dn, attribute->syntax->ldap_oid); + + if (!dsdb_dn || !ldb_dn_validate(dsdb_dn->dn)) { + ldb_asprintf_errstring(ldb_module_get_ctx(ac->module), + "could not parse %.*s as a %s DN", (int)plain_dn->length, plain_dn->data, + attribute->syntax->ldap_oid); + talloc_free(dsdb_dn); return ldb_module_done(ac->req, NULL, NULL, LDB_ERR_INVALID_DN_SYNTAX); } + dn = dsdb_dn->dn; if (p->normalise) { ret = fix_dn(dn); if (ret != LDB_SUCCESS) { + talloc_free(dsdb_dn); return ldb_module_done(ac->req, NULL, NULL, ret); } } @@ -453,24 +462,26 @@ static int extended_callback(struct ldb_request *req, struct ldb_reply *ares, msg->elements[i].name, &msg->elements[i].values[j]); if (ret != LDB_SUCCESS) { + talloc_free(dsdb_dn); return ldb_module_done(ac->req, NULL, NULL, ret); } } if (!ac->inject) { - dn_str = talloc_steal(msg->elements[i].values, - ldb_dn_get_linearized(dn)); + dn_str = dsdb_dn_get_linearized(msg->elements[i].values, + dsdb_dn); } else { - dn_str = talloc_steal(msg->elements[i].values, - ldb_dn_get_extended_linearized(msg->elements[i].values, - dn, ac->extended_type)); + dn_str = dsdb_dn_get_extended_linearized(msg->elements[i].values, + dsdb_dn, ac->extended_type); } + if (!dn_str) { ldb_oom(ldb_module_get_ctx(ac->module)); + talloc_free(dsdb_dn); return ldb_module_done(ac->req, NULL, NULL, LDB_ERR_OPERATIONS_ERROR); } msg->elements[i].values[j] = data_blob_string_const(dn_str); - talloc_free(dn); + talloc_free(dsdb_dn); } } return ldb_module_send_entry(ac->req, msg, ares->controls); @@ -717,8 +728,7 @@ static int extended_dn_out_dereference_init(struct ldb_module *module, const cha } for (cur = schema->attributes; cur; cur = cur->next) { - if (strcmp(cur->syntax->attributeSyntax_oid, "2.5.5.1") != 0 && - strcmp(cur->syntax->attributeSyntax_oid, "2.5.5.7") != 0) { + if (dsdb_dn_oid_to_format(cur->syntax->ldap_oid) == DSDB_INVALID_DN) { continue; } dereference_control->dereference diff --git a/source4/dsdb/samdb/ldb_modules/extended_dn_store.c b/source4/dsdb/samdb/ldb_modules/extended_dn_store.c index 122a9bb2b7..ef8532c82a 100644 --- a/source4/dsdb/samdb/ldb_modules/extended_dn_store.c +++ b/source4/dsdb/samdb/ldb_modules/extended_dn_store.c @@ -2,7 +2,7 @@ ldb database library Copyright (C) Simo Sorce 2005-2008 - Copyright (C) Andrew Bartlett <abartlet@samba.org> 2007-2008 + Copyright (C) Andrew Bartlett <abartlet@samba.org> 2007-2009 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by @@ -47,7 +47,7 @@ struct extended_dn_replace_list { struct extended_dn_replace_list *next; - struct ldb_dn *dn; + struct dsdb_dn *dsdb_dn; TALLOC_CTX *mem_ctx; struct ldb_val *replace_dn; struct extended_dn_context *ac; @@ -157,12 +157,20 @@ static int extended_replace_dn(struct ldb_request *req, struct ldb_reply *ares) * search. We can't check, as it could be an extended * DN, so a module below will resolve it */ struct ldb_dn *dn = ares->message->dn; - - /* Replace the DN with the extended version of the DN - * (ie, add SID and GUID) */ - *os->replace_dn = data_blob_string_const( - ldb_dn_get_extended_linearized(os->mem_ctx, - dn, 1)); + + /* Rebuild with the string or binary 'extra part' the + * DN may have had as a prefix */ + struct dsdb_dn *dsdb_dn = dsdb_dn_construct(ares, dn, + os->dsdb_dn->extra_part, + os->dsdb_dn->oid); + if (dsdb_dn) { + /* Replace the DN with the extended version of the DN + * (ie, add SID and GUID) */ + *os->replace_dn = data_blob_string_const( + dsdb_dn_get_extended_linearized(os->mem_ctx, + dsdb_dn, 1)); + talloc_free(dsdb_dn); + } if (os->replace_dn->data == NULL) { return ldb_module_done(os->ac->req, NULL, NULL, LDB_ERR_OPERATIONS_ERROR); @@ -209,7 +217,9 @@ static int extended_replace_dn(struct ldb_request *req, struct ldb_reply *ares) static int extended_store_replace(struct extended_dn_context *ac, TALLOC_CTX *callback_mem_ctx, - struct ldb_val *plain_dn) + struct ldb_val *plain_dn, + bool is_delete, + const char *oid) { int ret; struct extended_dn_replace_list *os; @@ -228,14 +238,25 @@ static int extended_store_replace(struct extended_dn_context *ac, os->mem_ctx = callback_mem_ctx; - os->dn = ldb_dn_from_ldb_val(os, ldb_module_get_ctx(ac->module), plain_dn); - if (!os->dn || !ldb_dn_validate(os->dn)) { + os->dsdb_dn = dsdb_dn_parse(os, ldb_module_get_ctx(ac->module), plain_dn, oid); + if (!os->dsdb_dn || !ldb_dn_validate(os->dsdb_dn->dn)) { talloc_free(os); ldb_asprintf_errstring(ldb_module_get_ctx(ac->module), - "could not parse %.*s as a DN", (int)plain_dn->length, plain_dn->data); + "could not parse %.*s as a %s DN", (int)plain_dn->length, plain_dn->data, + oid); return LDB_ERR_INVALID_DN_SYNTAX; } + if (is_delete && !ldb_dn_has_extended(os->dsdb_dn->dn)) { + /* NO need to figure this DN out, this element is + * going to be deleted anyway, and becuase it's not + * extended, we have enough information to do the + * delete */ + talloc_free(os); + return LDB_SUCCESS; + } + + os->replace_dn = plain_dn; /* The search request here might happen to be for an @@ -243,7 +264,7 @@ static int extended_store_replace(struct extended_dn_context *ac, * module in the stack will convert this into a normal DN for * processing */ ret = ldb_build_search_req(&os->search_req, - ldb_module_get_ctx(ac->module), os, os->dn, LDB_SCOPE_BASE, NULL, + ldb_module_get_ctx(ac->module), os, os->dsdb_dn->dn, LDB_SCOPE_BASE, NULL, attrs, NULL, os, extended_replace_dn, ac->req); @@ -302,9 +323,8 @@ static int extended_dn_add(struct ldb_module *module, struct ldb_request *req) continue; } - /* We only setup an extended DN GUID on these particular DN objects */ - if (strcmp(schema_attr->attributeSyntax_oid, "2.5.5.1") != 0 && - strcmp(schema_attr->attributeSyntax_oid, "2.5.5.7") != 0) { + /* We only setup an extended DN GUID on DN elements */ + if (dsdb_dn_oid_to_format(schema_attr->syntax->ldap_oid) == DSDB_INVALID_DN) { continue; } @@ -324,14 +344,15 @@ static int extended_dn_add(struct ldb_module *module, struct ldb_request *req) /* Re-calculate el */ el = &ac->new_req->op.add.message->elements[i]; for (j = 0; j < el->num_values; j++) { - ret = extended_store_replace(ac, ac->new_req->op.add.message->elements, &el->values[j]); + ret = extended_store_replace(ac, ac->new_req->op.add.message->elements, &el->values[j], + false, schema_attr->syntax->ldap_oid); if (ret != LDB_SUCCESS) { return ret; } } } - /* if DNs were set continue */ + /* if no DNs were set continue */ if (ac->ops == NULL) { talloc_free(ac); return ldb_next_request(module, req); @@ -377,11 +398,10 @@ static int extended_dn_modify(struct ldb_module *module, struct ldb_request *req } /* We only setup an extended DN GUID on these particular DN objects */ - if (strcmp(schema_attr->attributeSyntax_oid, "2.5.5.1") != 0 && - strcmp(schema_attr->attributeSyntax_oid, "2.5.5.7") != 0) { + if (dsdb_dn_oid_to_format(schema_attr->syntax->ldap_oid) == DSDB_INVALID_DN) { continue; } - + /* Before we setup a procedure to modify the incoming message, we must copy it */ if (!ac->new_req) { struct ldb_message *msg = ldb_msg_copy(ac, req->op.mod.message); @@ -399,17 +419,14 @@ static int extended_dn_modify(struct ldb_module *module, struct ldb_request *req el = &ac->new_req->op.mod.message->elements[i]; /* For each value being added, we need to setup the lookups to fill in the extended DN */ for (j = 0; j < el->num_values; j++) { - struct ldb_dn *dn = ldb_dn_from_ldb_val(ac, ldb_module_get_ctx(module), &el->values[j]); - if (!dn || !ldb_dn_validate(dn)) { - ldb_asprintf_errstring(ldb_module_get_ctx(module), - "could not parse attribute %s as a DN", el->name); - return LDB_ERR_INVALID_DN_SYNTAX; - } - if (((el->flags & LDB_FLAG_MOD_MASK) == LDB_FLAG_MOD_DELETE) && !ldb_dn_has_extended(dn)) { - /* NO need to figure this DN out, it's going to be deleted anyway */ - continue; - } - ret = extended_store_replace(ac, req->op.mod.message->elements, &el->values[j]); + /* If we are just going to delete this + * element, only do a lookup if + * extended_store_replace determines it's an + * input of an extended DN */ + bool is_delete = ((el->flags & LDB_FLAG_MOD_MASK) == LDB_FLAG_MOD_DELETE); + + ret = extended_store_replace(ac, req->op.mod.message->elements, &el->values[j], + is_delete, schema_attr->syntax->ldap_oid); if (ret != LDB_SUCCESS) { return ret; } |