4 Copyright (C) Simo Sorce 2006-2008
5 Copyright (C) Andrew Bartlett <abartlet@samba.org> 2005-2009
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>.
24 * Component: objectClass sorting module
27 * - sort the objectClass attribute into the class
29 * - fix DNs and attributes into 'standard' case
30 * - Add objectCategory and ntSecurityDescriptor defaults
32 * Author: Andrew Bartlett
37 #include "ldb_module.h"
38 #include "dlinklist.h"
39 #include "dsdb/samdb/samdb.h"
40 #include "librpc/ndr/libndr.h"
41 #include "librpc/gen_ndr/ndr_security.h"
42 #include "libcli/security/security.h"
43 #include "auth/auth.h"
44 #include "param/param.h"
45 #include "../libds/common/flags.h"
49 struct ldb_module *module;
50 struct ldb_request *req;
52 struct ldb_reply *search_res;
54 int (*step_fn)(struct oc_context *);
58 struct class_list *prev, *next;
59 const struct dsdb_class *objectclass;
62 static struct oc_context *oc_init_context(struct ldb_module *module,
63 struct ldb_request *req)
65 struct ldb_context *ldb;
66 struct oc_context *ac;
68 ldb = ldb_module_get_ctx(module);
70 ac = talloc_zero(req, struct oc_context);
72 ldb_set_errstring(ldb, "Out of Memory");
82 static int objectclass_do_add(struct oc_context *ac);
84 /* Sort objectClasses into correct order, and validate that all
85 * objectClasses specified actually exist in the schema
88 static int objectclass_sort(struct ldb_module *module,
89 const struct dsdb_schema *schema,
91 struct ldb_message_element *objectclass_element,
92 struct class_list **sorted_out)
94 struct ldb_context *ldb;
97 struct class_list *sorted = NULL, *parent_class = NULL,
98 *subclass = NULL, *unsorted = NULL, *current, *poss_subclass, *poss_parent, *new_parent;
100 ldb = ldb_module_get_ctx(module);
104 * We work on 4 different 'bins' (implemented here as linked lists):
106 * * sorted: the eventual list, in the order we wish to push
107 * into the database. This is the only ordered list.
109 * * parent_class: The current parent class 'bin' we are
110 * trying to find subclasses for
112 * * subclass: The subclasses we have found so far
114 * * unsorted: The remaining objectClasses
116 * The process is a matter of filtering objectClasses up from
117 * unsorted into sorted. Order is irrelevent in the later 3 'bins'.
119 * We start with 'top' (found and promoted to parent_class
120 * initially). Then we find (in unsorted) all the direct
121 * subclasses of 'top'. parent_classes is concatenated onto
122 * the end of 'sorted', and subclass becomes the list in
125 * We then repeat, until we find no more subclasses. Any left
126 * over classes are added to the end.
130 /* Firstly, dump all the objectClass elements into the
131 * unsorted bin, except for 'top', which is special */
132 for (i=0; i < objectclass_element->num_values; i++) {
133 current = talloc(mem_ctx, struct class_list);
136 return LDB_ERR_OPERATIONS_ERROR;
138 current->objectclass = dsdb_class_by_lDAPDisplayName_ldb_val(schema, &objectclass_element->values[i]);
139 if (!current->objectclass) {
140 ldb_asprintf_errstring(ldb, "objectclass %.*s is not a valid objectClass in schema",
141 (int)objectclass_element->values[i].length, (const char *)objectclass_element->values[i].data);
142 /* This looks weird, but windows apparently returns this for invalid objectClass values */
143 return LDB_ERR_NO_SUCH_ATTRIBUTE;
144 } else if (current->objectclass->isDefunct) {
145 ldb_asprintf_errstring(ldb, "objectclass %.*s marked as isDefunct objectClass in schema - not valid for new objects",
146 (int)objectclass_element->values[i].length, (const char *)objectclass_element->values[i].data);
147 /* This looks weird, but windows apparently returns this for invalid objectClass values */
148 return LDB_ERR_NO_SUCH_ATTRIBUTE;
151 /* this is the root of the tree. We will start
152 * looking for subclasses from here */
153 if (ldb_attr_cmp("top", current->objectclass->lDAPDisplayName) == 0) {
154 DLIST_ADD_END(parent_class, current, struct class_list *);
156 DLIST_ADD_END(unsorted, current, struct class_list *);
160 if (parent_class == NULL) {
161 current = talloc(mem_ctx, struct class_list);
162 current->objectclass = dsdb_class_by_lDAPDisplayName(schema, "top");
163 DLIST_ADD_END(parent_class, current, struct class_list *);
166 /* For each object: find parent chain */
167 for (current = unsorted; schema && current; current = current->next) {
168 for (poss_parent = unsorted; poss_parent; poss_parent = poss_parent->next) {
169 if (ldb_attr_cmp(poss_parent->objectclass->lDAPDisplayName, current->objectclass->subClassOf) == 0) {
173 /* If we didn't get to the end of the list, we need to add this parent */
174 if (poss_parent || (ldb_attr_cmp("top", current->objectclass->subClassOf) == 0)) {
178 new_parent = talloc(mem_ctx, struct class_list);
179 new_parent->objectclass = dsdb_class_by_lDAPDisplayName(schema, current->objectclass->subClassOf);
180 DLIST_ADD_END(unsorted, new_parent, struct class_list *);
183 /* DEBUGGING aid: how many layers are we down now? */
187 /* Find all the subclasses of classes in the
188 * parent_classes. Push them onto the subclass list */
190 /* Ensure we don't bother if there are no unsorted entries left */
191 for (current = parent_class; schema && unsorted && current; current = current->next) {
192 /* Walk the list of possible subclasses in unsorted */
193 for (poss_subclass = unsorted; poss_subclass; ) {
194 struct class_list *next;
196 /* Save the next pointer, as the DLIST_ macros will change poss_subclass->next */
197 next = poss_subclass->next;
199 if (ldb_attr_cmp(poss_subclass->objectclass->subClassOf, current->objectclass->lDAPDisplayName) == 0) {
200 DLIST_REMOVE(unsorted, poss_subclass);
201 DLIST_ADD(subclass, poss_subclass);
205 poss_subclass = next;
209 /* Now push the parent_classes as sorted, we are done with
210 these. Add to the END of the list by concatenation */
211 DLIST_CONCATENATE(sorted, parent_class, struct class_list *);
213 /* and now find subclasses of these */
214 parent_class = subclass;
217 /* If we didn't find any subclasses we will fall out
219 } while (parent_class);
222 *sorted_out = sorted;
227 /* If we don't have schema yet, then just merge the lists again */
228 DLIST_CONCATENATE(sorted, unsorted, struct class_list *);
229 *sorted_out = sorted;
233 /* This shouldn't happen, and would break MMC, perhaps there
234 * was no 'top', a conflict in the objectClasses or some other
237 ldb_asprintf_errstring(ldb, "objectclass %s is not a valid objectClass in objectClass chain", unsorted->objectclass->lDAPDisplayName);
238 return LDB_ERR_OBJECT_CLASS_VIOLATION;
241 static int get_search_callback(struct ldb_request *req, struct ldb_reply *ares)
243 struct ldb_context *ldb;
244 struct oc_context *ac;
247 ac = talloc_get_type(req->context, struct oc_context);
248 ldb = ldb_module_get_ctx(ac->module);
251 return ldb_module_done(ac->req, NULL, NULL,
252 LDB_ERR_OPERATIONS_ERROR);
254 if (ares->error != LDB_SUCCESS &&
255 ares->error != LDB_ERR_NO_SUCH_OBJECT) {
256 return ldb_module_done(ac->req, ares->controls,
257 ares->response, ares->error);
260 ldb_reset_err_string(ldb);
262 switch (ares->type) {
263 case LDB_REPLY_ENTRY:
264 if (ac->search_res != NULL) {
265 ldb_set_errstring(ldb, "Too many results");
267 return ldb_module_done(ac->req, NULL, NULL,
268 LDB_ERR_OPERATIONS_ERROR);
271 ac->search_res = talloc_steal(ac, ares);
274 case LDB_REPLY_REFERRAL:
281 ret = ac->step_fn(ac);
282 if (ret != LDB_SUCCESS) {
283 return ldb_module_done(ac->req, NULL, NULL, ret);
291 static int oc_op_callback(struct ldb_request *req, struct ldb_reply *ares)
293 struct oc_context *ac;
295 ac = talloc_get_type(req->context, struct oc_context);
298 return ldb_module_done(ac->req, NULL, NULL,
299 LDB_ERR_OPERATIONS_ERROR);
301 if (ares->error != LDB_SUCCESS) {
302 return ldb_module_done(ac->req, ares->controls,
303 ares->response, ares->error);
306 if (ares->type != LDB_REPLY_DONE) {
308 return ldb_module_done(ac->req, NULL, NULL,
309 LDB_ERR_OPERATIONS_ERROR);
312 return ldb_module_done(ac->req, ares->controls,
313 ares->response, ares->error);
316 /* Fix up the DN to be in the standard form, taking particular care to match the parent DN
318 This should mean that if the parent is:
319 CN=Users,DC=samba,DC=example,DC=com
320 and a proposed child is
321 cn=Admins ,cn=USERS,dc=Samba,dc=example,dc=COM
323 The resulting DN should be:
325 CN=Admins,CN=Users,DC=samba,DC=example,DC=com
328 static int fix_dn(TALLOC_CTX *mem_ctx,
329 struct ldb_dn *newdn, struct ldb_dn *parent_dn,
330 struct ldb_dn **fixed_dn)
332 char *upper_rdn_attr;
333 const struct ldb_val *rdn_val;
335 /* Fix up the DN to be in the standard form, taking particular care to match the parent DN */
336 *fixed_dn = ldb_dn_copy(mem_ctx, parent_dn);
338 /* We need the attribute name in upper case */
339 upper_rdn_attr = strupper_talloc(*fixed_dn,
340 ldb_dn_get_rdn_name(newdn));
341 if (!upper_rdn_attr) {
342 return LDB_ERR_OPERATIONS_ERROR;
345 /* Create a new child */
346 if (ldb_dn_add_child_fmt(*fixed_dn, "X=X") == false) {
347 return LDB_ERR_OPERATIONS_ERROR;
350 /* AD doesn't allow the rDN to be longer than 64 characters */
351 rdn_val = ldb_dn_get_rdn_val(newdn);
352 if (!rdn_val || rdn_val->length > 64) {
353 DEBUG(2,(__location__ ": rDN longer than 64 limit for '%s'\n", ldb_dn_get_linearized(newdn)));
354 return LDB_ERR_CONSTRAINT_VIOLATION;
357 /* And replace it with CN=foo (we need the attribute in upper case */
358 return ldb_dn_set_component(*fixed_dn, 0, upper_rdn_attr, *rdn_val);
361 /* Fix all attribute names to be in the correct case, and check they are all valid per the schema */
362 static int fix_attributes(struct ldb_context *ldb, const struct dsdb_schema *schema, struct ldb_message *msg)
365 for (i=0; i < msg->num_elements; i++) {
366 const struct dsdb_attribute *attribute = dsdb_attribute_by_lDAPDisplayName(schema, msg->elements[i].name);
367 /* Add in a very special case for 'clearTextPassword',
368 * which is used for internal processing only, and is
369 * not presented in the schema */
371 if (strcasecmp(msg->elements[i].name, "clearTextPassword") != 0) {
372 ldb_asprintf_errstring(ldb, "attribute %s is not a valid attribute in schema", msg->elements[i].name);
373 /* Apparently Windows sends exactly this behaviour */
374 return LDB_ERR_NO_SUCH_ATTRIBUTE;
377 msg->elements[i].name = attribute->lDAPDisplayName;
384 static int objectclass_do_add(struct oc_context *ac);
386 static int objectclass_add(struct ldb_module *module, struct ldb_request *req)
388 struct ldb_context *ldb;
389 struct ldb_request *search_req;
390 struct oc_context *ac;
391 struct ldb_dn *parent_dn;
393 static const char * const parent_attrs[] = { "objectGUID", "objectClass", NULL };
395 ldb = ldb_module_get_ctx(module);
397 ldb_debug(ldb, LDB_DEBUG_TRACE, "objectclass_add\n");
399 /* do not manipulate our control entries */
400 if (ldb_dn_is_special(req->op.add.message->dn)) {
401 return ldb_next_request(module, req);
404 /* the objectClass must be specified on add */
405 if (ldb_msg_find_element(req->op.add.message,
406 "objectClass") == NULL) {
407 return LDB_ERR_OBJECT_CLASS_VIOLATION;
410 ac = oc_init_context(module, req);
412 return LDB_ERR_OPERATIONS_ERROR;
415 /* If there isn't a parent, just go on to the add processing */
416 if (ldb_dn_get_comp_num(ac->req->op.add.message->dn) == 1) {
417 return objectclass_do_add(ac);
420 /* get copy of parent DN */
421 parent_dn = ldb_dn_get_parent(ac, ac->req->op.add.message->dn);
422 if (parent_dn == NULL) {
424 return LDB_ERR_OPERATIONS_ERROR;
427 ret = ldb_build_search_req(&search_req, ldb,
428 ac, parent_dn, LDB_SCOPE_BASE,
429 "(objectClass=*)", parent_attrs,
431 ac, get_search_callback,
433 if (ret != LDB_SUCCESS) {
436 talloc_steal(search_req, parent_dn);
438 ac->step_fn = objectclass_do_add;
440 return ldb_next_request(ac->module, search_req);
443 static int objectclass_do_add(struct oc_context *ac)
445 struct ldb_context *ldb;
446 const struct dsdb_schema *schema;
447 struct ldb_request *add_req;
449 struct ldb_message_element *objectclass_element;
450 struct ldb_message *msg;
452 struct class_list *sorted, *current;
455 ldb = ldb_module_get_ctx(ac->module);
456 schema = dsdb_get_schema(ldb);
458 mem_ctx = talloc_new(ac);
459 if (mem_ctx == NULL) {
460 return LDB_ERR_OPERATIONS_ERROR;
463 msg = ldb_msg_copy_shallow(ac, ac->req->op.add.message);
465 /* Check we have a valid parent */
466 if (ac->search_res == NULL) {
467 if (ldb_dn_compare(ldb_get_root_basedn(ldb),
469 /* Allow the tree to be started */
471 /* but don't keep any error string, it's meaningless */
472 ldb_set_errstring(ldb, NULL);
474 ldb_asprintf_errstring(ldb, "objectclass: Cannot add %s, parent does not exist!",
475 ldb_dn_get_linearized(msg->dn));
476 talloc_free(mem_ctx);
477 return LDB_ERR_NO_SUCH_OBJECT;
480 const struct ldb_val *parent_guid;
482 /* Fix up the DN to be in the standard form, taking particular care to match the parent DN */
484 ac->req->op.add.message->dn,
485 ac->search_res->message->dn,
488 if (ret != LDB_SUCCESS) {
489 ldb_asprintf_errstring(ldb, "Could not munge DN %s into normal form",
490 ldb_dn_get_linearized(ac->req->op.add.message->dn));
491 talloc_free(mem_ctx);
495 parent_guid = ldb_msg_find_ldb_val(ac->search_res->message, "objectGUID");
496 if (parent_guid == NULL) {
497 ldb_asprintf_errstring(ldb, "objectclass: Cannot add %s, parent does not have an objectGUID!",
498 ldb_dn_get_linearized(msg->dn));
499 talloc_free(mem_ctx);
500 return LDB_ERR_UNWILLING_TO_PERFORM;
503 ret = ldb_msg_add_steal_value(msg, "parentGUID", discard_const(parent_guid));
504 if (ret != LDB_SUCCESS) {
505 ldb_asprintf_errstring(ldb, "objectclass: Cannot add %s, failed to add parentGUID",
506 ldb_dn_get_linearized(msg->dn));
507 talloc_free(mem_ctx);
508 return LDB_ERR_UNWILLING_TO_PERFORM;
512 ret = fix_attributes(ldb, schema, msg);
513 if (ret != LDB_SUCCESS) {
514 talloc_free(mem_ctx);
518 /* This is now the objectClass list from the database */
519 objectclass_element = ldb_msg_find_element(msg, "objectClass");
521 if (!objectclass_element) {
522 /* Where did it go? bail now... */
523 talloc_free(mem_ctx);
524 return LDB_ERR_OPERATIONS_ERROR;
526 ret = objectclass_sort(ac->module, schema, mem_ctx, objectclass_element, &sorted);
527 if (ret != LDB_SUCCESS) {
528 talloc_free(mem_ctx);
532 ldb_msg_remove_attr(msg, "objectClass");
533 ret = ldb_msg_add_empty(msg, "objectClass", 0, NULL);
535 if (ret != LDB_SUCCESS) {
536 talloc_free(mem_ctx);
540 /* We must completely replace the existing objectClass entry,
541 * because we need it sorted */
543 /* Move from the linked list back into an ldb msg */
544 for (current = sorted; current; current = current->next) {
545 value = talloc_strdup(msg, current->objectclass->lDAPDisplayName);
548 talloc_free(mem_ctx);
549 return LDB_ERR_OPERATIONS_ERROR;
551 ret = ldb_msg_add_string(msg, "objectClass", value);
552 if (ret != LDB_SUCCESS) {
553 ldb_set_errstring(ldb,
554 "objectclass: could not re-add sorted "
555 "objectclass to modify msg");
556 talloc_free(mem_ctx);
559 /* Last one is the critical one */
560 if (!current->next) {
561 struct ldb_message_element *el;
562 int32_t systemFlags = 0;
563 const char *rdn_name = ldb_dn_get_rdn_name(msg->dn);
564 if (current->objectclass->rDNAttID
565 && ldb_attr_cmp(rdn_name, current->objectclass->rDNAttID) != 0) {
566 ldb_asprintf_errstring(ldb,
567 "RDN %s is not correct for most specific structural objectclass %s, should be %s",
568 rdn_name, current->objectclass->lDAPDisplayName, current->objectclass->rDNAttID);
569 return LDB_ERR_NAMING_VIOLATION;
572 if (ac->search_res && ac->search_res->message) {
573 struct ldb_message_element *oc_el
574 = ldb_msg_find_element(ac->search_res->message, "objectClass");
576 bool allowed_class = false;
578 for (i=0; allowed_class == false && oc_el && i < oc_el->num_values; i++) {
579 const struct dsdb_class *sclass;
581 sclass = dsdb_class_by_lDAPDisplayName_ldb_val(schema, &oc_el->values[i]);
583 /* We don't know this class? what is going on? */
586 if (ldb_request_get_control(ac->req, LDB_CONTROL_RELAX_OID)) {
587 for (j=0; sclass->systemPossibleInferiors && sclass->systemPossibleInferiors[j]; j++) {
588 if (ldb_attr_cmp(current->objectclass->lDAPDisplayName, sclass->systemPossibleInferiors[j]) == 0) {
589 allowed_class = true;
594 for (j=0; sclass->systemPossibleInferiors && sclass->systemPossibleInferiors[j]; j++) {
595 if (ldb_attr_cmp(current->objectclass->lDAPDisplayName, sclass->systemPossibleInferiors[j]) == 0) {
596 allowed_class = true;
603 if (!allowed_class) {
604 ldb_asprintf_errstring(ldb, "structural objectClass %s is not a valid child class for %s",
605 current->objectclass->lDAPDisplayName, ldb_dn_get_linearized(ac->search_res->message->dn));
606 return LDB_ERR_NAMING_VIOLATION;
610 if (current->objectclass->systemOnly && !ldb_request_get_control(ac->req, LDB_CONTROL_RELAX_OID)) {
611 ldb_asprintf_errstring(ldb, "objectClass %s is systemOnly, rejecting creation of %s",
612 current->objectclass->lDAPDisplayName, ldb_dn_get_linearized(msg->dn));
613 return LDB_ERR_UNWILLING_TO_PERFORM;
616 if (!ldb_msg_find_element(msg, "objectCategory")) {
617 value = talloc_strdup(msg, current->objectclass->defaultObjectCategory);
620 talloc_free(mem_ctx);
621 return LDB_ERR_OPERATIONS_ERROR;
623 ldb_msg_add_string(msg, "objectCategory", value);
625 if (!ldb_msg_find_element(msg, "showInAdvancedViewOnly") && (current->objectclass->defaultHidingValue == true)) {
626 ldb_msg_add_string(msg, "showInAdvancedViewOnly",
630 /* There are very special rules for systemFlags, see MS-ADTS 3.1.1.5.2.4 */
631 el = ldb_msg_find_element(msg, "systemFlags");
633 systemFlags = ldb_msg_find_attr_as_int(msg, "systemFlags", 0);
636 /* Only these flags may be set by a client, but we can't tell between a client and our provision at this point */
637 /* systemFlags &= ( SYSTEM_FLAG_CONFIG_ALLOW_RENAME | SYSTEM_FLAG_CONFIG_ALLOW_MOVE | SYSTEM_FLAG_CONFIG_LIMITED_MOVE); */
638 ldb_msg_remove_element(msg, el);
641 /* This flag is only allowed on attributeSchema objects */
642 if (ldb_attr_cmp(current->objectclass->lDAPDisplayName, "attributeSchema") == 0) {
643 systemFlags &= ~SYSTEM_FLAG_ATTR_IS_RDN;
646 if (ldb_attr_cmp(current->objectclass->lDAPDisplayName, "server") == 0) {
647 systemFlags |= (int32_t)(SYSTEM_FLAG_DISALLOW_MOVE_ON_DELETE | SYSTEM_FLAG_CONFIG_ALLOW_RENAME | SYSTEM_FLAG_CONFIG_ALLOW_LIMITED_MOVE);
648 } else if (ldb_attr_cmp(current->objectclass->lDAPDisplayName, "site") == 0
649 || ldb_attr_cmp(current->objectclass->lDAPDisplayName, "serverContainer") == 0
650 || ldb_attr_cmp(current->objectclass->lDAPDisplayName, "ntDSDSA") == 0) {
651 systemFlags |= (int32_t)(SYSTEM_FLAG_DISALLOW_MOVE_ON_DELETE);
653 } else if (ldb_attr_cmp(current->objectclass->lDAPDisplayName, "siteLink") == 0
654 || ldb_attr_cmp(current->objectclass->lDAPDisplayName, "siteLinkBridge") == 0
655 || ldb_attr_cmp(current->objectclass->lDAPDisplayName, "nTDSConnection") == 0) {
656 systemFlags |= (int32_t)(SYSTEM_FLAG_CONFIG_ALLOW_RENAME);
659 /* TODO: If parent object is site or subnet, also add (SYSTEM_FLAG_CONFIG_ALLOW_RENAME) */
661 if (el || systemFlags != 0) {
662 samdb_msg_add_int(ldb, msg, msg, "systemFlags", systemFlags);
668 talloc_free(mem_ctx);
669 ret = ldb_msg_sanity_check(ldb, msg);
672 if (ret != LDB_SUCCESS) {
676 ret = ldb_build_add_req(&add_req, ldb, ac,
681 if (ret != LDB_SUCCESS) {
685 /* perform the add */
686 return ldb_next_request(ac->module, add_req);
689 static int oc_modify_callback(struct ldb_request *req,
690 struct ldb_reply *ares);
691 static int objectclass_do_mod(struct oc_context *ac);
693 static int objectclass_modify(struct ldb_module *module, struct ldb_request *req)
695 struct ldb_context *ldb = ldb_module_get_ctx(module);
696 struct ldb_message_element *objectclass_element;
697 struct ldb_message *msg;
698 const struct dsdb_schema *schema = dsdb_get_schema(ldb);
699 struct class_list *sorted, *current;
700 struct ldb_request *down_req;
701 struct oc_context *ac;
706 ldb_debug(ldb, LDB_DEBUG_TRACE, "objectclass_modify\n");
708 /* do not manipulate our control entries */
709 if (ldb_dn_is_special(req->op.mod.message->dn)) {
710 return ldb_next_request(module, req);
713 /* Without schema, there isn't much to do here */
715 return ldb_next_request(module, req);
718 /* As with the "real" AD we don't accept empty messages */
719 if (req->op.mod.message->num_elements == 0) {
720 ldb_set_errstring(ldb, "objectclass: modify message must have "
721 "elements/attributes!");
722 return LDB_ERR_UNWILLING_TO_PERFORM;
725 ac = oc_init_context(module, req);
727 return LDB_ERR_OPERATIONS_ERROR;
730 /* If no part of this touches the objectClass, then we don't
731 * need to make any changes. */
732 objectclass_element = ldb_msg_find_element(req->op.mod.message, "objectClass");
734 /* If the only operation is the deletion of the objectClass
735 * then go on with just fixing the attribute case */
736 if (!objectclass_element) {
737 msg = ldb_msg_copy_shallow(ac, req->op.mod.message);
739 return LDB_ERR_OPERATIONS_ERROR;
742 ret = fix_attributes(ldb, schema, msg);
743 if (ret != LDB_SUCCESS) {
747 ret = ldb_build_mod_req(&down_req, ldb, ac,
752 if (ret != LDB_SUCCESS) {
756 /* go on with the call chain */
757 return ldb_next_request(module, down_req);
760 switch (objectclass_element->flags & LDB_FLAG_MOD_MASK) {
761 case LDB_FLAG_MOD_DELETE:
762 if (objectclass_element->num_values == 0) {
763 return LDB_ERR_OBJECT_CLASS_MODS_PROHIBITED;
767 case LDB_FLAG_MOD_REPLACE:
768 mem_ctx = talloc_new(ac);
769 if (mem_ctx == NULL) {
770 return LDB_ERR_OPERATIONS_ERROR;
773 msg = ldb_msg_copy_shallow(ac, req->op.mod.message);
775 talloc_free(mem_ctx);
776 return LDB_ERR_OPERATIONS_ERROR;
779 ret = fix_attributes(ldb, schema, msg);
780 if (ret != LDB_SUCCESS) {
781 talloc_free(mem_ctx);
785 ret = objectclass_sort(module, schema, mem_ctx, objectclass_element, &sorted);
786 if (ret != LDB_SUCCESS) {
787 talloc_free(mem_ctx);
791 /* We must completely replace the existing objectClass entry,
792 * because we need it sorted */
794 ldb_msg_remove_attr(msg, "objectClass");
795 ret = ldb_msg_add_empty(msg, "objectClass", LDB_FLAG_MOD_REPLACE, NULL);
797 if (ret != LDB_SUCCESS) {
798 talloc_free(mem_ctx);
802 /* Move from the linked list back into an ldb msg */
803 for (current = sorted; current; current = current->next) {
804 /* copy the value as this string is on the schema
805 * context and we can't rely on it not changing
806 * before the operation is over */
807 value = talloc_strdup(msg,
808 current->objectclass->lDAPDisplayName);
811 talloc_free(mem_ctx);
812 return LDB_ERR_OPERATIONS_ERROR;
814 ret = ldb_msg_add_string(msg, "objectClass", value);
815 if (ret != LDB_SUCCESS) {
816 ldb_set_errstring(ldb,
817 "objectclass: could not re-add sorted "
818 "objectclass to modify msg");
819 talloc_free(mem_ctx);
824 talloc_free(mem_ctx);
826 ret = ldb_msg_sanity_check(ldb, msg);
827 if (ret != LDB_SUCCESS) {
831 ret = ldb_build_mod_req(&down_req, ldb, ac,
836 if (ret != LDB_SUCCESS) {
840 /* go on with the call chain */
841 return ldb_next_request(module, down_req);
844 /* This isn't the default branch of the switch, but a 'in any
845 * other case'. When a delete isn't for all objectClasses for
849 msg = ldb_msg_copy_shallow(ac, req->op.mod.message);
852 return LDB_ERR_OPERATIONS_ERROR;
855 ret = fix_attributes(ldb, schema, msg);
856 if (ret != LDB_SUCCESS) {
861 ret = ldb_build_mod_req(&down_req, ldb, ac,
864 ac, oc_modify_callback,
866 if (ret != LDB_SUCCESS) {
870 return ldb_next_request(module, down_req);
873 static int oc_modify_callback(struct ldb_request *req, struct ldb_reply *ares)
875 struct ldb_context *ldb;
876 static const char * const attrs[] = { "objectClass", NULL };
877 struct ldb_request *search_req;
878 struct oc_context *ac;
881 ac = talloc_get_type(req->context, struct oc_context);
882 ldb = ldb_module_get_ctx(ac->module);
885 return ldb_module_done(ac->req, NULL, NULL,
886 LDB_ERR_OPERATIONS_ERROR);
888 if (ares->error != LDB_SUCCESS) {
889 return ldb_module_done(ac->req, ares->controls,
890 ares->response, ares->error);
893 if (ares->type != LDB_REPLY_DONE) {
895 return ldb_module_done(ac->req, NULL, NULL,
896 LDB_ERR_OPERATIONS_ERROR);
901 ret = ldb_build_search_req(&search_req, ldb, ac,
902 ac->req->op.mod.message->dn, LDB_SCOPE_BASE,
905 ac, get_search_callback,
907 if (ret != LDB_SUCCESS) {
908 return ldb_module_done(ac->req, NULL, NULL, ret);
911 ac->step_fn = objectclass_do_mod;
913 ret = ldb_next_request(ac->module, search_req);
914 if (ret != LDB_SUCCESS) {
915 return ldb_module_done(ac->req, NULL, NULL, ret);
920 static int objectclass_do_mod(struct oc_context *ac)
922 struct ldb_context *ldb;
923 const struct dsdb_schema *schema;
924 struct ldb_request *mod_req;
926 struct ldb_message_element *objectclass_element;
927 struct ldb_message *msg;
929 struct class_list *sorted, *current;
932 ldb = ldb_module_get_ctx(ac->module);
934 if (ac->search_res == NULL) {
935 return LDB_ERR_OPERATIONS_ERROR;
937 schema = dsdb_get_schema(ldb);
939 mem_ctx = talloc_new(ac);
940 if (mem_ctx == NULL) {
941 return LDB_ERR_OPERATIONS_ERROR;
944 /* use a new message structure */
945 msg = ldb_msg_new(ac);
947 ldb_set_errstring(ldb,
948 "objectclass: could not create new modify msg");
949 talloc_free(mem_ctx);
950 return LDB_ERR_OPERATIONS_ERROR;
953 /* This is now the objectClass list from the database */
954 objectclass_element = ldb_msg_find_element(ac->search_res->message,
956 if (!objectclass_element) {
957 /* Where did it go? bail now... */
958 talloc_free(mem_ctx);
959 return LDB_ERR_OPERATIONS_ERROR;
963 msg->dn = ac->req->op.mod.message->dn;
965 ret = objectclass_sort(ac->module, schema, mem_ctx, objectclass_element, &sorted);
966 if (ret != LDB_SUCCESS) {
970 /* We must completely replace the existing objectClass entry.
971 * We could do a constrained add/del, but we are meant to be
972 * in a transaction... */
974 ret = ldb_msg_add_empty(msg, "objectClass", LDB_FLAG_MOD_REPLACE, NULL);
975 if (ret != LDB_SUCCESS) {
976 ldb_set_errstring(ldb, "objectclass: could not clear objectclass in modify msg");
977 talloc_free(mem_ctx);
981 /* Move from the linked list back into an ldb msg */
982 for (current = sorted; current; current = current->next) {
983 value = talloc_strdup(msg, current->objectclass->lDAPDisplayName);
986 return LDB_ERR_OPERATIONS_ERROR;
988 ret = ldb_msg_add_string(msg, "objectClass", value);
989 if (ret != LDB_SUCCESS) {
990 ldb_set_errstring(ldb, "objectclass: could not re-add sorted objectclass to modify msg");
991 talloc_free(mem_ctx);
996 ret = ldb_msg_sanity_check(ldb, msg);
997 if (ret != LDB_SUCCESS) {
998 talloc_free(mem_ctx);
1002 ret = ldb_build_mod_req(&mod_req, ldb, ac,
1007 if (ret != LDB_SUCCESS) {
1008 talloc_free(mem_ctx);
1012 talloc_free(mem_ctx);
1013 /* perform the modify */
1014 return ldb_next_request(ac->module, mod_req);
1017 static int objectclass_do_rename(struct oc_context *ac);
1019 static int objectclass_rename(struct ldb_module *module, struct ldb_request *req)
1021 static const char * const attrs[] = { "objectGUID", NULL };
1022 struct ldb_context *ldb;
1023 struct ldb_request *search_req;
1024 struct oc_context *ac;
1025 struct ldb_dn *parent_dn;
1028 ldb = ldb_module_get_ctx(module);
1030 ldb_debug(ldb, LDB_DEBUG_TRACE, "objectclass_rename\n");
1032 if (ldb_dn_is_special(req->op.rename.newdn)) { /* do not manipulate our control entries */
1033 return ldb_next_request(module, req);
1036 /* Firstly ensure we are not trying to rename it to be a child of itself */
1037 if ((ldb_dn_compare_base(req->op.rename.olddn, req->op.rename.newdn) == 0)
1038 && (ldb_dn_compare(req->op.rename.olddn, req->op.rename.newdn) != 0)) {
1039 ldb_asprintf_errstring(ldb, "Cannot rename %s to be a child of itself",
1040 ldb_dn_get_linearized(req->op.rename.olddn));
1041 return LDB_ERR_UNWILLING_TO_PERFORM;
1044 ac = oc_init_context(module, req);
1046 return LDB_ERR_OPERATIONS_ERROR;
1049 parent_dn = ldb_dn_get_parent(ac, req->op.rename.newdn);
1050 if (parent_dn == NULL) {
1052 return LDB_ERR_OPERATIONS_ERROR;
1055 /* note that the results of this search are kept and used to
1056 update the parentGUID in objectclass_rename_callback() */
1057 ret = ldb_build_search_req(&search_req, ldb,
1058 ac, parent_dn, LDB_SCOPE_BASE,
1061 ac, get_search_callback,
1063 if (ret != LDB_SUCCESS) {
1067 /* we have to add the show deleted control, as otherwise DRS
1068 deletes will be refused as we will think the target parent
1070 ret = ldb_request_add_control(search_req, LDB_CONTROL_SHOW_DELETED_OID, false, NULL);
1072 if (ret != LDB_SUCCESS) {
1076 ac->step_fn = objectclass_do_rename;
1078 return ldb_next_request(ac->module, search_req);
1082 called after the rename happens.
1083 We now need to fix the parentGUID of the object to be the objectGUID of
1086 static int objectclass_rename_callback(struct ldb_request *req, struct ldb_reply *ares)
1088 struct ldb_context *ldb;
1089 struct oc_context *ac;
1090 const struct ldb_val *parent_guid;
1091 struct ldb_request *mod_req = NULL;
1093 struct ldb_message *msg;
1094 struct ldb_message_element *el = NULL;
1096 ac = talloc_get_type(req->context, struct oc_context);
1097 ldb = ldb_module_get_ctx(ac->module);
1099 /* make sure the rename succeeded */
1101 return ldb_module_done(ac->req, NULL, NULL,
1102 LDB_ERR_OPERATIONS_ERROR);
1104 if (ares->error != LDB_SUCCESS) {
1105 return ldb_module_done(ac->req, ares->controls,
1106 ares->response, ares->error);
1111 /* the ac->search_res should contain the new parents objectGUID */
1112 parent_guid = ldb_msg_find_ldb_val(ac->search_res->message, "objectGUID");
1113 if (parent_guid == NULL) {
1114 ldb_asprintf_errstring(ldb, "objectclass: Cannot rename %s, new parent does not have an objectGUID!",
1115 ldb_dn_get_linearized(ac->req->op.rename.newdn));
1116 return LDB_ERR_UNWILLING_TO_PERFORM;
1120 /* construct the modify message */
1121 msg = ldb_msg_new(ac);
1124 return LDB_ERR_OPERATIONS_ERROR;
1127 msg->dn = ac->req->op.rename.newdn;
1129 ret = ldb_msg_add_value(msg, "parentGUID", parent_guid, &el);
1130 if (ret != LDB_SUCCESS) {
1134 el->flags = LDB_FLAG_MOD_REPLACE;
1136 ret = ldb_build_mod_req(&mod_req, ldb, ac, msg,
1137 NULL, ac, oc_op_callback, req);
1139 return ldb_next_request(ac->module, mod_req);
1142 static int objectclass_do_rename(struct oc_context *ac)
1144 struct ldb_context *ldb;
1145 struct ldb_request *rename_req;
1146 struct ldb_dn *fixed_dn;
1149 ldb = ldb_module_get_ctx(ac->module);
1151 /* Check we have a valid parent */
1152 if (ac->search_res == NULL) {
1153 ldb_asprintf_errstring(ldb, "objectclass: Cannot rename %s, parent does not exist!",
1154 ldb_dn_get_linearized(ac->req->op.rename.newdn));
1155 return LDB_ERR_UNWILLING_TO_PERFORM;
1158 /* Fix up the DN to be in the standard form,
1159 * taking particular care to match the parent DN */
1161 ac->req->op.rename.newdn,
1162 ac->search_res->message->dn,
1164 if (ret != LDB_SUCCESS) {
1168 /* TODO: Check this is a valid child to this parent,
1169 * by reading the allowedChildClasses and
1170 * allowedChildClasssesEffective attributes */
1172 ret = ldb_build_rename_req(&rename_req, ldb, ac,
1173 ac->req->op.rename.olddn, fixed_dn,
1175 ac, objectclass_rename_callback,
1177 if (ret != LDB_SUCCESS) {
1181 /* perform the rename */
1182 return ldb_next_request(ac->module, rename_req);
1185 _PUBLIC_ const struct ldb_module_ops ldb_objectclass_module_ops = {
1186 .name = "objectclass",
1187 .add = objectclass_add,
1188 .modify = objectclass_modify,
1189 .rename = objectclass_rename,