2 ldb database library - ildap backend
4 Copyright (C) Andrew Tridgell 2005
6 ** NOTE! The following LGPL license applies to the ldb
7 ** library. This does NOT imply that all of Samba is released
10 This library is free software; you can redistribute it and/or
11 modify it under the terms of the GNU Lesser General Public
12 License as published by the Free Software Foundation; either
13 version 2 of the License, or (at your option) any later version.
15 This library is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
18 Lesser General Public License for more details.
20 You should have received a copy of the GNU Lesser General Public
21 License along with this library; if not, write to the Free Software
22 Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
26 This is a ldb backend for the internal ldap client library in
27 Samba4. By using this backend we are independent of a system ldap
33 #include "ldb/include/ldb.h"
34 #include "ldb/include/ldb_private.h"
35 #include "ldb/include/ldb_errors.h"
36 #include "libcli/ldap/ldap.h"
37 #include "libcli/ldap/ldap_client.h"
38 #include "lib/cmdline/popt_common.h"
39 #include "auth/auth.h"
42 struct ldap_connection *ldap;
43 struct ldb_message *rootDSE;
44 struct ldb_context *ldb;
49 map an ildap NTSTATUS to a ldb error code
51 static int ildb_map_error(struct ildb_private *ildb, NTSTATUS status)
53 if (NT_STATUS_IS_OK(status)) {
56 talloc_free(ildb->ldb->err_string);
57 ildb->ldb->err_string = talloc_strdup(ildb, ldap_errstr(ildb->ldap, status));
58 if (NT_STATUS_IS_LDAP(status)) {
59 return NT_STATUS_LDAP_CODE(status);
61 return LDB_ERR_OPERATIONS_ERROR;
67 static int ildb_rename(struct ldb_module *module, const struct ldb_dn *olddn, const struct ldb_dn *newdn)
69 TALLOC_CTX *local_ctx;
70 struct ildb_private *ildb = module->private_data;
73 char *newrdn, *parentdn;
76 /* ignore ltdb specials */
77 if (ldb_dn_is_special(olddn) || ldb_dn_is_special(newdn)) {
81 local_ctx = talloc_named(ildb, 0, "ildb_rename local context");
82 if (local_ctx == NULL) {
83 ret = LDB_ERR_OPERATIONS_ERROR;
87 old_dn = ldb_dn_linearize(local_ctx, olddn);
89 ret = LDB_ERR_INVALID_DN_SYNTAX;
93 newrdn = talloc_asprintf(local_ctx, "%s=%s",
94 newdn->components[0].name,
95 ldb_dn_escape_value(ildb, newdn->components[0].value));
97 ret = LDB_ERR_OPERATIONS_ERROR;
101 parentdn = ldb_dn_linearize(local_ctx, ldb_dn_get_parent(ildb, newdn));
102 if (parentdn == NULL) {
103 ret = LDB_ERR_INVALID_DN_SYNTAX;
107 status = ildap_rename(ildb->ldap, old_dn, newrdn, parentdn, True);
108 ret = ildb_map_error(ildb, status);
111 talloc_free(local_ctx);
118 static int ildb_delete(struct ldb_module *module, const struct ldb_dn *dn)
120 struct ildb_private *ildb = module->private_data;
125 /* ignore ltdb specials */
126 if (ldb_dn_is_special(dn)) {
130 del_dn = ldb_dn_linearize(ildb, dn);
131 if (del_dn == NULL) {
132 return LDB_ERR_INVALID_DN_SYNTAX;
135 status = ildap_delete(ildb->ldap, del_dn);
136 ret = ildb_map_error(ildb, status);
144 static void ildb_rootdse(struct ldb_module *module);
147 search for matching records using a ldb_parse_tree
149 static int ildb_search_bytree(struct ldb_module *module, const struct ldb_dn *base,
150 enum ldb_scope scope, struct ldb_parse_tree *tree,
151 const char * const *attrs, struct ldb_message ***res)
153 struct ildb_private *ildb = module->private_data;
155 struct ldap_message **ldapres, *msg;
159 if (scope == LDB_SCOPE_DEFAULT) {
160 scope = LDB_SCOPE_SUBTREE;
164 if (ildb->rootDSE == NULL) {
165 ildb_rootdse(module);
167 if (ildb->rootDSE != NULL) {
168 search_base = talloc_strdup(ildb,
169 ldb_msg_find_string(ildb->rootDSE,
170 "defaultNamingContext", ""));
172 search_base = talloc_strdup(ildb, "");
175 search_base = ldb_dn_linearize(ildb, base);
177 if (search_base == NULL) {
178 ldb_set_errstring(module, talloc_asprintf(module, "Unable to determine baseDN"));
182 ldb_set_errstring(module, talloc_asprintf(module, "Invalid expression parse tree"));
186 status = ildap_search_bytree(ildb->ldap, search_base, scope, tree, attrs,
188 talloc_free(search_base);
189 if (!NT_STATUS_IS_OK(status)) {
190 ildb_map_error(ildb, status);
194 count = ildap_count_entries(ildb->ldap, ldapres);
195 if (count == -1 || count == 0) {
196 talloc_free(ldapres);
200 (*res) = talloc_array(ildb, struct ldb_message *, count+1);
202 talloc_free(ldapres);
208 /* loop over all messages */
209 for (i=0;i<count;i++) {
210 struct ldap_SearchResEntry *search;
213 search = &msg->r.SearchResultEntry;
215 (*res)[i] = talloc(*res, struct ldb_message);
221 (*res)[i]->dn = ldb_dn_explode((*res)[i], search->dn);
222 if ((*res)[i]->dn == NULL) {
225 (*res)[i]->num_elements = search->num_attributes;
226 (*res)[i]->elements = talloc_steal((*res)[i], search->attributes);
227 (*res)[i]->private_data = NULL;
230 talloc_free(ldapres);
235 if (*res) talloc_free(*res);
241 convert a ldb_message structure to a list of ldap_mod structures
242 ready for ildap_add() or ildap_modify()
244 static struct ldap_mod **ildb_msg_to_mods(struct ldb_context *ldb,
245 const struct ldb_message *msg, int use_flags)
247 struct ldap_mod **mods;
251 /* allocate maximum number of elements needed */
252 mods = talloc_array(ldb, struct ldap_mod *, msg->num_elements+1);
259 for (i=0;i<msg->num_elements;i++) {
260 const struct ldb_message_element *el = &msg->elements[i];
262 mods[num_mods] = talloc(ldb, struct ldap_mod);
263 if (!mods[num_mods]) {
266 mods[num_mods+1] = NULL;
267 mods[num_mods]->type = 0;
268 mods[num_mods]->attrib = *el;
270 switch (el->flags & LDB_FLAG_MOD_MASK) {
271 case LDB_FLAG_MOD_ADD:
272 mods[num_mods]->type = LDAP_MODIFY_ADD;
274 case LDB_FLAG_MOD_DELETE:
275 mods[num_mods]->type = LDAP_MODIFY_DELETE;
277 case LDB_FLAG_MOD_REPLACE:
278 mods[num_mods]->type = LDAP_MODIFY_REPLACE;
296 static int ildb_add(struct ldb_module *module, const struct ldb_message *msg)
298 struct ldb_context *ldb = module->ldb;
299 struct ildb_private *ildb = module->private_data;
300 struct ldap_mod **mods;
305 /* ignore ltdb specials */
306 if (ldb_dn_is_special(msg->dn)) {
310 mods = ildb_msg_to_mods(ldb, msg, 0);
312 return LDB_ERR_OPERATIONS_ERROR;
315 dn = ldb_dn_linearize(mods, msg->dn);
318 return LDB_ERR_INVALID_DN_SYNTAX;
321 status = ildap_add(ildb->ldap, dn, mods);
322 ret = ildb_map_error(ildb, status);
333 static int ildb_modify(struct ldb_module *module, const struct ldb_message *msg)
335 struct ldb_context *ldb = module->ldb;
336 struct ildb_private *ildb = module->private_data;
337 struct ldap_mod **mods;
342 /* ignore ltdb specials */
343 if (ldb_dn_is_special(msg->dn)) {
347 mods = ildb_msg_to_mods(ldb, msg, 1);
349 return LDB_ERR_OPERATIONS_ERROR;
352 dn = ldb_dn_linearize(mods, msg->dn);
355 return LDB_ERR_INVALID_DN_SYNTAX;
358 status = ildap_modify(ildb->ldap, dn, mods);
359 ret = ildb_map_error(ildb, status);
366 static int ildb_start_trans(struct ldb_module *module)
368 /* TODO implement a local locking mechanism here */
373 static int ildb_end_trans(struct ldb_module *module)
375 /* TODO implement a local transaction mechanism here */
380 static int ildb_del_trans(struct ldb_module *module)
382 /* TODO implement a local locking mechanism here */
387 static const struct ldb_module_ops ildb_ops = {
389 .search_bytree = ildb_search_bytree,
390 .add_record = ildb_add,
391 .modify_record = ildb_modify,
392 .delete_record = ildb_delete,
393 .rename_record = ildb_rename,
394 .start_transaction = ildb_start_trans,
395 .end_transaction = ildb_end_trans,
396 .del_transaction = ildb_del_trans
403 static void ildb_rootdse(struct ldb_module *module)
405 struct ildb_private *ildb = module->private_data;
406 struct ldb_message **res = NULL;
407 struct ldb_dn *empty_dn = ldb_dn_new(ildb);
409 ret = ildb_search_bytree(module, empty_dn, LDB_SCOPE_BASE,
410 ldb_parse_tree(empty_dn, "dn=dc=rootDSE"),
413 ildb->rootDSE = talloc_steal(ildb, res[0]);
415 if (ret != -1) talloc_free(res);
416 talloc_free(empty_dn);
421 connect to the database
423 int ildb_connect(struct ldb_context *ldb, const char *url,
424 unsigned int flags, const char *options[])
426 struct ildb_private *ildb = NULL;
428 struct cli_credentials *creds;
430 ildb = talloc(ldb, struct ildb_private);
436 ildb->rootDSE = NULL;
439 ildb->ldap = ldap_new_connection(ildb, ldb_get_opaque(ldb, "EventContext"));
445 status = ldap_connect(ildb->ldap, url);
446 if (!NT_STATUS_IS_OK(status)) {
447 ldb_debug(ldb, LDB_DEBUG_ERROR, "Failed to connect to ldap URL '%s' - %s\n",
448 url, ldap_errstr(ildb->ldap, status));
452 ldb->modules = talloc(ldb, struct ldb_module);
457 ldb->modules->ldb = ldb;
458 ldb->modules->prev = ldb->modules->next = NULL;
459 ldb->modules->private_data = ildb;
460 ldb->modules->ops = &ildb_ops;
462 /* caller can optionally setup credentials using the opaque token 'credentials' */
463 creds = talloc_get_type(ldb_get_opaque(ldb, "credentials"), struct cli_credentials);
465 struct auth_session_info *session_info = talloc_get_type(ldb_get_opaque(ldb, "sessionInfo"), struct auth_session_info);
466 if (session_info && session_info->credentials) {
467 creds = session_info->credentials;
469 creds = cmdline_credentials;
473 if (creds != NULL && cli_credentials_authentication_requested(creds)) {
474 status = ldap_bind_sasl(ildb->ldap, creds);
475 if (!NT_STATUS_IS_OK(status)) {
476 ldb_debug(ldb, LDB_DEBUG_ERROR, "Failed to bind - %s\n",
477 ldap_errstr(ildb->ldap, status));
486 ldb->modules->private_data = NULL;