4 Copyright (C) Simo Sorce 2006-2008
5 Copyright (C) Andrew Bartlett <abartlet@samba.org> 2005-2009
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>.
24 * Component: objectClass sorting module
27 * - sort the objectClass attribute into the class
29 * - fix DNs and attributes into 'standard' case
30 * - Add objectCategory and ntSecurityDescriptor defaults
32 * Author: Andrew Bartlett
37 #include "ldb_module.h"
38 #include "dlinklist.h"
39 #include "dsdb/samdb/samdb.h"
40 #include "librpc/ndr/libndr.h"
41 #include "librpc/gen_ndr/ndr_security.h"
42 #include "libcli/security/security.h"
43 #include "auth/auth.h"
44 #include "param/param.h"
45 #include "../libds/common/flags.h"
49 struct ldb_module *module;
50 struct ldb_request *req;
52 struct ldb_reply *search_res;
54 int (*step_fn)(struct oc_context *);
58 struct class_list *prev, *next;
59 const struct dsdb_class *objectclass;
62 static struct oc_context *oc_init_context(struct ldb_module *module,
63 struct ldb_request *req)
65 struct ldb_context *ldb;
66 struct oc_context *ac;
68 ldb = ldb_module_get_ctx(module);
70 ac = talloc_zero(req, struct oc_context);
72 ldb_set_errstring(ldb, "Out of Memory");
82 static int objectclass_do_add(struct oc_context *ac);
84 /* Sort objectClasses into correct order, and validate that all
85 * objectClasses specified actually exist in the schema
88 static int objectclass_sort(struct ldb_module *module,
89 const struct dsdb_schema *schema,
91 struct ldb_message_element *objectclass_element,
92 struct class_list **sorted_out)
94 struct ldb_context *ldb;
97 struct class_list *sorted = NULL, *parent_class = NULL,
98 *subclass = NULL, *unsorted = NULL, *current, *poss_subclass, *poss_parent, *new_parent;
100 ldb = ldb_module_get_ctx(module);
104 * We work on 4 different 'bins' (implemented here as linked lists):
106 * * sorted: the eventual list, in the order we wish to push
107 * into the database. This is the only ordered list.
109 * * parent_class: The current parent class 'bin' we are
110 * trying to find subclasses for
112 * * subclass: The subclasses we have found so far
114 * * unsorted: The remaining objectClasses
116 * The process is a matter of filtering objectClasses up from
117 * unsorted into sorted. Order is irrelevent in the later 3 'bins'.
119 * We start with 'top' (found and promoted to parent_class
120 * initially). Then we find (in unsorted) all the direct
121 * subclasses of 'top'. parent_classes is concatenated onto
122 * the end of 'sorted', and subclass becomes the list in
125 * We then repeat, until we find no more subclasses. Any left
126 * over classes are added to the end.
130 /* Firstly, dump all the objectClass elements into the
131 * unsorted bin, except for 'top', which is special */
132 for (i=0; i < objectclass_element->num_values; i++) {
133 current = talloc(mem_ctx, struct class_list);
136 return LDB_ERR_OPERATIONS_ERROR;
138 current->objectclass = dsdb_class_by_lDAPDisplayName_ldb_val(schema, &objectclass_element->values[i]);
139 if (!current->objectclass) {
140 ldb_asprintf_errstring(ldb, "objectclass %.*s is not a valid objectClass in schema",
141 (int)objectclass_element->values[i].length, (const char *)objectclass_element->values[i].data);
142 /* This looks weird, but windows apparently returns this for invalid objectClass values */
143 return LDB_ERR_NO_SUCH_ATTRIBUTE;
144 } else if (current->objectclass->isDefunct) {
145 ldb_asprintf_errstring(ldb, "objectclass %.*s marked as isDefunct objectClass in schema - not valid for new objects",
146 (int)objectclass_element->values[i].length, (const char *)objectclass_element->values[i].data);
147 /* This looks weird, but windows apparently returns this for invalid objectClass values */
148 return LDB_ERR_NO_SUCH_ATTRIBUTE;
151 /* this is the root of the tree. We will start
152 * looking for subclasses from here */
153 if (ldb_attr_cmp("top", current->objectclass->lDAPDisplayName) == 0) {
154 DLIST_ADD_END(parent_class, current, struct class_list *);
156 DLIST_ADD_END(unsorted, current, struct class_list *);
160 if (parent_class == NULL) {
161 current = talloc(mem_ctx, struct class_list);
162 current->objectclass = dsdb_class_by_lDAPDisplayName(schema, "top");
163 DLIST_ADD_END(parent_class, current, struct class_list *);
166 /* For each object: find parent chain */
167 for (current = unsorted; schema && current; current = current->next) {
168 for (poss_parent = unsorted; poss_parent; poss_parent = poss_parent->next) {
169 if (ldb_attr_cmp(poss_parent->objectclass->lDAPDisplayName, current->objectclass->subClassOf) == 0) {
173 /* If we didn't get to the end of the list, we need to add this parent */
174 if (poss_parent || (ldb_attr_cmp("top", current->objectclass->subClassOf) == 0)) {
178 new_parent = talloc(mem_ctx, struct class_list);
179 new_parent->objectclass = dsdb_class_by_lDAPDisplayName(schema, current->objectclass->subClassOf);
180 DLIST_ADD_END(unsorted, new_parent, struct class_list *);
183 /* DEBUGGING aid: how many layers are we down now? */
187 /* Find all the subclasses of classes in the
188 * parent_classes. Push them onto the subclass list */
190 /* Ensure we don't bother if there are no unsorted entries left */
191 for (current = parent_class; schema && unsorted && current; current = current->next) {
192 /* Walk the list of possible subclasses in unsorted */
193 for (poss_subclass = unsorted; poss_subclass; ) {
194 struct class_list *next;
196 /* Save the next pointer, as the DLIST_ macros will change poss_subclass->next */
197 next = poss_subclass->next;
199 if (ldb_attr_cmp(poss_subclass->objectclass->subClassOf, current->objectclass->lDAPDisplayName) == 0) {
200 DLIST_REMOVE(unsorted, poss_subclass);
201 DLIST_ADD(subclass, poss_subclass);
205 poss_subclass = next;
209 /* Now push the parent_classes as sorted, we are done with
210 these. Add to the END of the list by concatenation */
211 DLIST_CONCATENATE(sorted, parent_class, struct class_list *);
213 /* and now find subclasses of these */
214 parent_class = subclass;
217 /* If we didn't find any subclasses we will fall out
219 } while (parent_class);
222 *sorted_out = sorted;
227 /* If we don't have schema yet, then just merge the lists again */
228 DLIST_CONCATENATE(sorted, unsorted, struct class_list *);
229 *sorted_out = sorted;
233 /* This shouldn't happen, and would break MMC, perhaps there
234 * was no 'top', a conflict in the objectClasses or some other
237 ldb_asprintf_errstring(ldb, "objectclass %s is not a valid objectClass in objectClass chain", unsorted->objectclass->lDAPDisplayName);
238 return LDB_ERR_OBJECT_CLASS_VIOLATION;
241 static int get_search_callback(struct ldb_request *req, struct ldb_reply *ares)
243 struct ldb_context *ldb;
244 struct oc_context *ac;
247 ac = talloc_get_type(req->context, struct oc_context);
248 ldb = ldb_module_get_ctx(ac->module);
251 return ldb_module_done(ac->req, NULL, NULL,
252 LDB_ERR_OPERATIONS_ERROR);
254 if (ares->error != LDB_SUCCESS &&
255 ares->error != LDB_ERR_NO_SUCH_OBJECT) {
256 return ldb_module_done(ac->req, ares->controls,
257 ares->response, ares->error);
260 ldb_reset_err_string(ldb);
262 switch (ares->type) {
263 case LDB_REPLY_ENTRY:
264 if (ac->search_res != NULL) {
265 ldb_set_errstring(ldb, "Too many results");
267 return ldb_module_done(ac->req, NULL, NULL,
268 LDB_ERR_OPERATIONS_ERROR);
271 ac->search_res = talloc_steal(ac, ares);
274 case LDB_REPLY_REFERRAL:
281 ret = ac->step_fn(ac);
282 if (ret != LDB_SUCCESS) {
283 return ldb_module_done(ac->req, NULL, NULL, ret);
291 static int oc_op_callback(struct ldb_request *req, struct ldb_reply *ares)
293 struct oc_context *ac;
295 ac = talloc_get_type(req->context, struct oc_context);
298 return ldb_module_done(ac->req, NULL, NULL,
299 LDB_ERR_OPERATIONS_ERROR);
301 if (ares->error != LDB_SUCCESS) {
302 return ldb_module_done(ac->req, ares->controls,
303 ares->response, ares->error);
306 if (ares->type != LDB_REPLY_DONE) {
308 return ldb_module_done(ac->req, NULL, NULL,
309 LDB_ERR_OPERATIONS_ERROR);
312 return ldb_module_done(ac->req, ares->controls,
313 ares->response, ares->error);
316 /* Fix up the DN to be in the standard form, taking particular care to match the parent DN
318 This should mean that if the parent is:
319 CN=Users,DC=samba,DC=example,DC=com
320 and a proposed child is
321 cn=Admins ,cn=USERS,dc=Samba,dc=example,dc=COM
323 The resulting DN should be:
325 CN=Admins,CN=Users,DC=samba,DC=example,DC=com
328 static int fix_dn(TALLOC_CTX *mem_ctx,
329 struct ldb_dn *newdn, struct ldb_dn *parent_dn,
330 struct ldb_dn **fixed_dn)
332 char *upper_rdn_attr;
333 /* Fix up the DN to be in the standard form, taking particular care to match the parent DN */
334 *fixed_dn = ldb_dn_copy(mem_ctx, parent_dn);
336 /* We need the attribute name in upper case */
337 upper_rdn_attr = strupper_talloc(*fixed_dn,
338 ldb_dn_get_rdn_name(newdn));
339 if (!upper_rdn_attr) {
340 return LDB_ERR_OPERATIONS_ERROR;
343 /* Create a new child */
344 if (ldb_dn_add_child_fmt(*fixed_dn, "X=X") == false) {
345 return LDB_ERR_OPERATIONS_ERROR;
348 /* And replace it with CN=foo (we need the attribute in upper case */
349 return ldb_dn_set_component(*fixed_dn, 0, upper_rdn_attr,
350 *ldb_dn_get_rdn_val(newdn));
353 /* Fix all attribute names to be in the correct case, and check they are all valid per the schema */
354 static int fix_attributes(struct ldb_context *ldb, const struct dsdb_schema *schema, struct ldb_message *msg)
357 for (i=0; i < msg->num_elements; i++) {
358 const struct dsdb_attribute *attribute = dsdb_attribute_by_lDAPDisplayName(schema, msg->elements[i].name);
359 /* Add in a very special case for 'clearTextPassword',
360 * which is used for internal processing only, and is
361 * not presented in the schema */
363 if (strcasecmp(msg->elements[i].name, "clearTextPassword") != 0) {
364 ldb_asprintf_errstring(ldb, "attribute %s is not a valid attribute in schema", msg->elements[i].name);
365 /* Apparently Windows sends exactly this behaviour */
366 return LDB_ERR_NO_SUCH_ATTRIBUTE;
369 msg->elements[i].name = attribute->lDAPDisplayName;
376 static int objectclass_do_add(struct oc_context *ac);
378 static int objectclass_add(struct ldb_module *module, struct ldb_request *req)
380 struct ldb_context *ldb;
381 struct ldb_request *search_req;
382 struct oc_context *ac;
383 struct ldb_dn *parent_dn;
385 static const char * const parent_attrs[] = { "objectGUID", "objectClass", NULL };
387 ldb = ldb_module_get_ctx(module);
389 ldb_debug(ldb, LDB_DEBUG_TRACE, "objectclass_add\n");
391 /* do not manipulate our control entries */
392 if (ldb_dn_is_special(req->op.add.message->dn)) {
393 return ldb_next_request(module, req);
396 /* the objectClass must be specified on add */
397 if (ldb_msg_find_element(req->op.add.message,
398 "objectClass") == NULL) {
399 return LDB_ERR_OBJECT_CLASS_VIOLATION;
402 ac = oc_init_context(module, req);
404 return LDB_ERR_OPERATIONS_ERROR;
407 /* If there isn't a parent, just go on to the add processing */
408 if (ldb_dn_get_comp_num(ac->req->op.add.message->dn) == 1) {
409 return objectclass_do_add(ac);
412 /* get copy of parent DN */
413 parent_dn = ldb_dn_get_parent(ac, ac->req->op.add.message->dn);
414 if (parent_dn == NULL) {
416 return LDB_ERR_OPERATIONS_ERROR;
419 ret = ldb_build_search_req(&search_req, ldb,
420 ac, parent_dn, LDB_SCOPE_BASE,
421 "(objectClass=*)", parent_attrs,
423 ac, get_search_callback,
425 if (ret != LDB_SUCCESS) {
428 talloc_steal(search_req, parent_dn);
430 ac->step_fn = objectclass_do_add;
432 return ldb_next_request(ac->module, search_req);
435 static int objectclass_do_add(struct oc_context *ac)
437 struct ldb_context *ldb;
438 const struct dsdb_schema *schema;
439 struct ldb_request *add_req;
441 struct ldb_message_element *objectclass_element;
442 struct ldb_message *msg;
444 struct class_list *sorted, *current;
447 ldb = ldb_module_get_ctx(ac->module);
448 schema = dsdb_get_schema(ldb);
450 mem_ctx = talloc_new(ac);
451 if (mem_ctx == NULL) {
452 return LDB_ERR_OPERATIONS_ERROR;
455 msg = ldb_msg_copy_shallow(ac, ac->req->op.add.message);
457 /* Check we have a valid parent */
458 if (ac->search_res == NULL) {
459 if (ldb_dn_compare(ldb_get_root_basedn(ldb),
461 /* Allow the tree to be started */
463 /* but don't keep any error string, it's meaningless */
464 ldb_set_errstring(ldb, NULL);
466 ldb_asprintf_errstring(ldb, "objectclass: Cannot add %s, parent does not exist!",
467 ldb_dn_get_linearized(msg->dn));
468 talloc_free(mem_ctx);
469 return LDB_ERR_NO_SUCH_OBJECT;
472 const struct ldb_val *parent_guid;
474 /* Fix up the DN to be in the standard form, taking particular care to match the parent DN */
476 ac->req->op.add.message->dn,
477 ac->search_res->message->dn,
480 if (ret != LDB_SUCCESS) {
481 ldb_asprintf_errstring(ldb, "Could not munge DN %s into normal form",
482 ldb_dn_get_linearized(ac->req->op.add.message->dn));
483 talloc_free(mem_ctx);
487 parent_guid = ldb_msg_find_ldb_val(ac->search_res->message, "objectGUID");
488 if (parent_guid == NULL) {
489 ldb_asprintf_errstring(ldb, "objectclass: Cannot add %s, parent does not have an objectGUID!",
490 ldb_dn_get_linearized(msg->dn));
491 talloc_free(mem_ctx);
492 return LDB_ERR_UNWILLING_TO_PERFORM;
495 ret = ldb_msg_add_steal_value(msg, "parentGUID", discard_const(parent_guid));
496 if (ret != LDB_SUCCESS) {
497 ldb_asprintf_errstring(ldb, "objectclass: Cannot add %s, failed to add parentGUID",
498 ldb_dn_get_linearized(msg->dn));
499 talloc_free(mem_ctx);
500 return LDB_ERR_UNWILLING_TO_PERFORM;
504 ret = fix_attributes(ldb, schema, msg);
505 if (ret != LDB_SUCCESS) {
506 talloc_free(mem_ctx);
510 /* This is now the objectClass list from the database */
511 objectclass_element = ldb_msg_find_element(msg, "objectClass");
513 if (!objectclass_element) {
514 /* Where did it go? bail now... */
515 talloc_free(mem_ctx);
516 return LDB_ERR_OPERATIONS_ERROR;
518 ret = objectclass_sort(ac->module, schema, mem_ctx, objectclass_element, &sorted);
519 if (ret != LDB_SUCCESS) {
520 talloc_free(mem_ctx);
524 ldb_msg_remove_attr(msg, "objectClass");
525 ret = ldb_msg_add_empty(msg, "objectClass", 0, NULL);
527 if (ret != LDB_SUCCESS) {
528 talloc_free(mem_ctx);
532 /* We must completely replace the existing objectClass entry,
533 * because we need it sorted */
535 /* Move from the linked list back into an ldb msg */
536 for (current = sorted; current; current = current->next) {
537 value = talloc_strdup(msg, current->objectclass->lDAPDisplayName);
540 talloc_free(mem_ctx);
541 return LDB_ERR_OPERATIONS_ERROR;
543 ret = ldb_msg_add_string(msg, "objectClass", value);
544 if (ret != LDB_SUCCESS) {
545 ldb_set_errstring(ldb,
546 "objectclass: could not re-add sorted "
547 "objectclass to modify msg");
548 talloc_free(mem_ctx);
551 /* Last one is the critical one */
552 if (!current->next) {
553 struct ldb_message_element *el;
554 int32_t systemFlags = 0;
555 const char *rdn_name = ldb_dn_get_rdn_name(msg->dn);
556 if (current->objectclass->rDNAttID
557 && ldb_attr_cmp(rdn_name, current->objectclass->rDNAttID) != 0) {
558 ldb_asprintf_errstring(ldb,
559 "RDN %s is not correct for most specific structural objectclass %s, should be %s",
560 rdn_name, current->objectclass->lDAPDisplayName, current->objectclass->rDNAttID);
561 return LDB_ERR_NAMING_VIOLATION;
564 if (ac->search_res && ac->search_res->message) {
565 struct ldb_message_element *oc_el
566 = ldb_msg_find_element(ac->search_res->message, "objectClass");
568 bool allowed_class = false;
570 for (i=0; allowed_class == false && oc_el && i < oc_el->num_values; i++) {
571 const struct dsdb_class *sclass;
573 sclass = dsdb_class_by_lDAPDisplayName_ldb_val(schema, &oc_el->values[i]);
575 /* We don't know this class? what is going on? */
578 if (ldb_request_get_control(ac->req, LDB_CONTROL_RELAX_OID)) {
579 for (j=0; sclass->systemPossibleInferiors && sclass->systemPossibleInferiors[j]; j++) {
580 if (ldb_attr_cmp(current->objectclass->lDAPDisplayName, sclass->systemPossibleInferiors[j]) == 0) {
581 allowed_class = true;
586 for (j=0; sclass->systemPossibleInferiors && sclass->systemPossibleInferiors[j]; j++) {
587 if (ldb_attr_cmp(current->objectclass->lDAPDisplayName, sclass->systemPossibleInferiors[j]) == 0) {
588 allowed_class = true;
595 if (!allowed_class) {
596 ldb_asprintf_errstring(ldb, "structural objectClass %s is not a valid child class for %s",
597 current->objectclass->lDAPDisplayName, ldb_dn_get_linearized(ac->search_res->message->dn));
598 return LDB_ERR_NAMING_VIOLATION;
602 if (current->objectclass->systemOnly && !ldb_request_get_control(ac->req, LDB_CONTROL_RELAX_OID)) {
603 ldb_asprintf_errstring(ldb, "objectClass %s is systemOnly, rejecting creation of %s",
604 current->objectclass->lDAPDisplayName, ldb_dn_get_linearized(msg->dn));
605 return LDB_ERR_UNWILLING_TO_PERFORM;
608 if (!ldb_msg_find_element(msg, "objectCategory")) {
609 value = talloc_strdup(msg, current->objectclass->defaultObjectCategory);
612 talloc_free(mem_ctx);
613 return LDB_ERR_OPERATIONS_ERROR;
615 ldb_msg_add_string(msg, "objectCategory", value);
617 if (!ldb_msg_find_element(msg, "showInAdvancedViewOnly") && (current->objectclass->defaultHidingValue == true)) {
618 ldb_msg_add_string(msg, "showInAdvancedViewOnly",
622 /* There are very special rules for systemFlags, see MS-ADTS 3.1.1.5.2.4 */
623 el = ldb_msg_find_element(msg, "systemFlags");
625 systemFlags = ldb_msg_find_attr_as_int(msg, "systemFlags", 0);
628 /* Only these flags may be set by a client, but we can't tell between a client and our provision at this point */
629 /* systemFlags &= ( SYSTEM_FLAG_CONFIG_ALLOW_RENAME | SYSTEM_FLAG_CONFIG_ALLOW_MOVE | SYSTEM_FLAG_CONFIG_LIMITED_MOVE); */
630 ldb_msg_remove_element(msg, el);
633 /* This flag is only allowed on attributeSchema objects */
634 if (ldb_attr_cmp(current->objectclass->lDAPDisplayName, "attributeSchema") == 0) {
635 systemFlags &= ~SYSTEM_FLAG_ATTR_IS_RDN;
638 if (ldb_attr_cmp(current->objectclass->lDAPDisplayName, "server") == 0) {
639 systemFlags |= (int32_t)(SYSTEM_FLAG_DISALLOW_MOVE_ON_DELETE | SYSTEM_FLAG_CONFIG_ALLOW_RENAME | SYSTEM_FLAG_CONFIG_ALLOW_LIMITED_MOVE);
640 } else if (ldb_attr_cmp(current->objectclass->lDAPDisplayName, "site") == 0
641 || ldb_attr_cmp(current->objectclass->lDAPDisplayName, "serverContainer") == 0
642 || ldb_attr_cmp(current->objectclass->lDAPDisplayName, "ntDSDSA") == 0) {
643 systemFlags |= (int32_t)(SYSTEM_FLAG_DISALLOW_MOVE_ON_DELETE);
645 } else if (ldb_attr_cmp(current->objectclass->lDAPDisplayName, "siteLink") == 0
646 || ldb_attr_cmp(current->objectclass->lDAPDisplayName, "siteLinkBridge") == 0
647 || ldb_attr_cmp(current->objectclass->lDAPDisplayName, "nTDSConnection") == 0) {
648 systemFlags |= (int32_t)(SYSTEM_FLAG_CONFIG_ALLOW_RENAME);
651 /* TODO: If parent object is site or subnet, also add (SYSTEM_FLAG_CONFIG_ALLOW_RENAME) */
653 if (el || systemFlags != 0) {
654 samdb_msg_add_int(ldb, msg, msg, "systemFlags", systemFlags);
660 talloc_free(mem_ctx);
661 ret = ldb_msg_sanity_check(ldb, msg);
664 if (ret != LDB_SUCCESS) {
668 ret = ldb_build_add_req(&add_req, ldb, ac,
673 if (ret != LDB_SUCCESS) {
677 /* perform the add */
678 return ldb_next_request(ac->module, add_req);
681 static int oc_modify_callback(struct ldb_request *req,
682 struct ldb_reply *ares);
683 static int objectclass_do_mod(struct oc_context *ac);
685 static int objectclass_modify(struct ldb_module *module, struct ldb_request *req)
687 struct ldb_context *ldb = ldb_module_get_ctx(module);
688 struct ldb_message_element *objectclass_element;
689 struct ldb_message *msg;
690 const struct dsdb_schema *schema = dsdb_get_schema(ldb);
691 struct class_list *sorted, *current;
692 struct ldb_request *down_req;
693 struct oc_context *ac;
698 ldb_debug(ldb, LDB_DEBUG_TRACE, "objectclass_modify\n");
700 /* do not manipulate our control entries */
701 if (ldb_dn_is_special(req->op.mod.message->dn)) {
702 return ldb_next_request(module, req);
705 /* Without schema, there isn't much to do here */
707 return ldb_next_request(module, req);
709 objectclass_element = ldb_msg_find_element(req->op.mod.message, "objectClass");
711 ac = oc_init_context(module, req);
713 return LDB_ERR_OPERATIONS_ERROR;
716 /* If no part of this touches the objectClass, then we don't
717 * need to make any changes. */
719 /* If the only operation is the deletion of the objectClass
720 * then go on with just fixing the attribute case */
721 if (!objectclass_element) {
722 msg = ldb_msg_copy_shallow(ac, req->op.mod.message);
724 return LDB_ERR_OPERATIONS_ERROR;
727 ret = fix_attributes(ldb, schema, msg);
728 if (ret != LDB_SUCCESS) {
732 ret = ldb_build_mod_req(&down_req, ldb, ac,
737 if (ret != LDB_SUCCESS) {
741 /* go on with the call chain */
742 return ldb_next_request(module, down_req);
745 switch (objectclass_element->flags & LDB_FLAG_MOD_MASK) {
746 case LDB_FLAG_MOD_DELETE:
747 if (objectclass_element->num_values == 0) {
748 return LDB_ERR_OBJECT_CLASS_MODS_PROHIBITED;
752 case LDB_FLAG_MOD_REPLACE:
753 mem_ctx = talloc_new(ac);
754 if (mem_ctx == NULL) {
755 return LDB_ERR_OPERATIONS_ERROR;
758 msg = ldb_msg_copy_shallow(ac, req->op.mod.message);
760 talloc_free(mem_ctx);
761 return LDB_ERR_OPERATIONS_ERROR;
764 ret = fix_attributes(ldb, schema, msg);
765 if (ret != LDB_SUCCESS) {
766 talloc_free(mem_ctx);
770 ret = objectclass_sort(module, schema, mem_ctx, objectclass_element, &sorted);
771 if (ret != LDB_SUCCESS) {
772 talloc_free(mem_ctx);
776 /* We must completely replace the existing objectClass entry,
777 * because we need it sorted */
779 ldb_msg_remove_attr(msg, "objectClass");
780 ret = ldb_msg_add_empty(msg, "objectClass", LDB_FLAG_MOD_REPLACE, NULL);
782 if (ret != LDB_SUCCESS) {
783 talloc_free(mem_ctx);
787 /* Move from the linked list back into an ldb msg */
788 for (current = sorted; current; current = current->next) {
789 /* copy the value as this string is on the schema
790 * context and we can't rely on it not changing
791 * before the operation is over */
792 value = talloc_strdup(msg,
793 current->objectclass->lDAPDisplayName);
796 talloc_free(mem_ctx);
797 return LDB_ERR_OPERATIONS_ERROR;
799 ret = ldb_msg_add_string(msg, "objectClass", value);
800 if (ret != LDB_SUCCESS) {
801 ldb_set_errstring(ldb,
802 "objectclass: could not re-add sorted "
803 "objectclass to modify msg");
804 talloc_free(mem_ctx);
809 talloc_free(mem_ctx);
811 ret = ldb_msg_sanity_check(ldb, msg);
812 if (ret != LDB_SUCCESS) {
816 ret = ldb_build_mod_req(&down_req, ldb, ac,
821 if (ret != LDB_SUCCESS) {
825 /* go on with the call chain */
826 return ldb_next_request(module, down_req);
829 /* This isn't the default branch of the switch, but a 'in any
830 * other case'. When a delete isn't for all objectClasses for
834 msg = ldb_msg_copy_shallow(ac, req->op.mod.message);
837 return LDB_ERR_OPERATIONS_ERROR;
840 ret = fix_attributes(ldb, schema, msg);
841 if (ret != LDB_SUCCESS) {
846 ret = ldb_build_mod_req(&down_req, ldb, ac,
849 ac, oc_modify_callback,
851 if (ret != LDB_SUCCESS) {
855 return ldb_next_request(module, down_req);
858 static int oc_modify_callback(struct ldb_request *req, struct ldb_reply *ares)
860 struct ldb_context *ldb;
861 static const char * const attrs[] = { "objectClass", NULL };
862 struct ldb_request *search_req;
863 struct oc_context *ac;
866 ac = talloc_get_type(req->context, struct oc_context);
867 ldb = ldb_module_get_ctx(ac->module);
870 return ldb_module_done(ac->req, NULL, NULL,
871 LDB_ERR_OPERATIONS_ERROR);
873 if (ares->error != LDB_SUCCESS) {
874 return ldb_module_done(ac->req, ares->controls,
875 ares->response, ares->error);
878 if (ares->type != LDB_REPLY_DONE) {
880 return ldb_module_done(ac->req, NULL, NULL,
881 LDB_ERR_OPERATIONS_ERROR);
884 ret = ldb_build_search_req(&search_req, ldb, ac,
885 ac->req->op.mod.message->dn, LDB_SCOPE_BASE,
888 ac, get_search_callback,
890 if (ret != LDB_SUCCESS) {
891 return ldb_module_done(ac->req, NULL, NULL, ret);
894 ac->step_fn = objectclass_do_mod;
896 ret = ldb_next_request(ac->module, search_req);
897 if (ret != LDB_SUCCESS) {
898 return ldb_module_done(ac->req, NULL, NULL, ret);
903 static int objectclass_do_mod(struct oc_context *ac)
905 struct ldb_context *ldb;
906 const struct dsdb_schema *schema;
907 struct ldb_request *mod_req;
909 struct ldb_message_element *objectclass_element;
910 struct ldb_message *msg;
912 struct class_list *sorted, *current;
915 ldb = ldb_module_get_ctx(ac->module);
917 if (ac->search_res == NULL) {
918 return LDB_ERR_OPERATIONS_ERROR;
920 schema = dsdb_get_schema(ldb);
922 mem_ctx = talloc_new(ac);
923 if (mem_ctx == NULL) {
924 return LDB_ERR_OPERATIONS_ERROR;
927 /* use a new message structure */
928 msg = ldb_msg_new(ac);
930 ldb_set_errstring(ldb,
931 "objectclass: could not create new modify msg");
932 talloc_free(mem_ctx);
933 return LDB_ERR_OPERATIONS_ERROR;
936 /* This is now the objectClass list from the database */
937 objectclass_element = ldb_msg_find_element(ac->search_res->message,
939 if (!objectclass_element) {
940 /* Where did it go? bail now... */
941 talloc_free(mem_ctx);
942 return LDB_ERR_OPERATIONS_ERROR;
946 msg->dn = ac->req->op.mod.message->dn;
948 ret = objectclass_sort(ac->module, schema, mem_ctx, objectclass_element, &sorted);
949 if (ret != LDB_SUCCESS) {
953 /* We must completely replace the existing objectClass entry.
954 * We could do a constrained add/del, but we are meant to be
955 * in a transaction... */
957 ret = ldb_msg_add_empty(msg, "objectClass", LDB_FLAG_MOD_REPLACE, NULL);
958 if (ret != LDB_SUCCESS) {
959 ldb_set_errstring(ldb, "objectclass: could not clear objectclass in modify msg");
960 talloc_free(mem_ctx);
964 /* Move from the linked list back into an ldb msg */
965 for (current = sorted; current; current = current->next) {
966 value = talloc_strdup(msg, current->objectclass->lDAPDisplayName);
969 return LDB_ERR_OPERATIONS_ERROR;
971 ret = ldb_msg_add_string(msg, "objectClass", value);
972 if (ret != LDB_SUCCESS) {
973 ldb_set_errstring(ldb, "objectclass: could not re-add sorted objectclass to modify msg");
974 talloc_free(mem_ctx);
979 ret = ldb_msg_sanity_check(ldb, msg);
980 if (ret != LDB_SUCCESS) {
981 talloc_free(mem_ctx);
985 ret = ldb_build_mod_req(&mod_req, ldb, ac,
990 if (ret != LDB_SUCCESS) {
991 talloc_free(mem_ctx);
995 talloc_free(mem_ctx);
996 /* perform the modify */
997 return ldb_next_request(ac->module, mod_req);
1000 static int objectclass_do_rename(struct oc_context *ac);
1002 static int objectclass_rename(struct ldb_module *module, struct ldb_request *req)
1004 static const char * const attrs[] = { "objectGUID", NULL };
1005 struct ldb_context *ldb;
1006 struct ldb_request *search_req;
1007 struct oc_context *ac;
1008 struct ldb_dn *parent_dn;
1011 ldb = ldb_module_get_ctx(module);
1013 ldb_debug(ldb, LDB_DEBUG_TRACE, "objectclass_rename\n");
1015 if (ldb_dn_is_special(req->op.rename.newdn)) { /* do not manipulate our control entries */
1016 return ldb_next_request(module, req);
1019 /* Firstly ensure we are not trying to rename it to be a child of itself */
1020 if ((ldb_dn_compare_base(req->op.rename.olddn, req->op.rename.newdn) == 0)
1021 && (ldb_dn_compare(req->op.rename.olddn, req->op.rename.newdn) != 0)) {
1022 ldb_asprintf_errstring(ldb, "Cannot rename %s to be a child of itself",
1023 ldb_dn_get_linearized(req->op.rename.olddn));
1024 return LDB_ERR_UNWILLING_TO_PERFORM;
1027 ac = oc_init_context(module, req);
1029 return LDB_ERR_OPERATIONS_ERROR;
1032 parent_dn = ldb_dn_get_parent(ac, req->op.rename.newdn);
1033 if (parent_dn == NULL) {
1035 return LDB_ERR_OPERATIONS_ERROR;
1038 /* note that the results of this search are kept and used to
1039 update the parentGUID in objectclass_rename_callback() */
1040 ret = ldb_build_search_req(&search_req, ldb,
1041 ac, parent_dn, LDB_SCOPE_BASE,
1044 ac, get_search_callback,
1046 if (ret != LDB_SUCCESS) {
1050 /* we have to add the show deleted control, as otherwise DRS
1051 deletes will be refused as we will think the target parent
1053 ret = ldb_request_add_control(search_req, LDB_CONTROL_SHOW_DELETED_OID, false, NULL);
1055 if (ret != LDB_SUCCESS) {
1059 ac->step_fn = objectclass_do_rename;
1061 return ldb_next_request(ac->module, search_req);
1065 called after the rename happens.
1066 We now need to fix the parentGUID of the object to be the objectGUID of
1069 static int objectclass_rename_callback(struct ldb_request *req, struct ldb_reply *ares)
1071 struct ldb_context *ldb;
1072 struct oc_context *ac;
1073 const struct ldb_val *parent_guid;
1074 struct ldb_request *mod_req = NULL;
1076 struct ldb_message *msg;
1077 struct ldb_message_element *el = NULL;
1079 ac = talloc_get_type(req->context, struct oc_context);
1080 ldb = ldb_module_get_ctx(ac->module);
1082 /* make sure the rename succeeded */
1084 return ldb_module_done(ac->req, NULL, NULL,
1085 LDB_ERR_OPERATIONS_ERROR);
1087 if (ares->error != LDB_SUCCESS) {
1088 return ldb_module_done(ac->req, ares->controls,
1089 ares->response, ares->error);
1093 /* the ac->search_res should contain the new parents objectGUID */
1094 parent_guid = ldb_msg_find_ldb_val(ac->search_res->message, "objectGUID");
1095 if (parent_guid == NULL) {
1096 ldb_asprintf_errstring(ldb, "objectclass: Cannot rename %s, new parent does not have an objectGUID!",
1097 ldb_dn_get_linearized(ac->req->op.rename.newdn));
1098 return LDB_ERR_UNWILLING_TO_PERFORM;
1102 /* construct the modify message */
1103 msg = ldb_msg_new(ac);
1106 return LDB_ERR_OPERATIONS_ERROR;
1109 msg->dn = ac->req->op.rename.newdn;
1111 ret = ldb_msg_add_value(msg, "parentGUID", parent_guid, &el);
1112 if (ret != LDB_SUCCESS) {
1116 el->flags = LDB_FLAG_MOD_REPLACE;
1118 ret = ldb_build_mod_req(&mod_req, ldb, ac, msg,
1119 NULL, ac, oc_op_callback, req);
1121 return ldb_next_request(ac->module, mod_req);
1124 static int objectclass_do_rename(struct oc_context *ac)
1126 struct ldb_context *ldb;
1127 struct ldb_request *rename_req;
1128 struct ldb_dn *fixed_dn;
1131 ldb = ldb_module_get_ctx(ac->module);
1133 /* Check we have a valid parent */
1134 if (ac->search_res == NULL) {
1135 ldb_asprintf_errstring(ldb, "objectclass: Cannot rename %s, parent does not exist!",
1136 ldb_dn_get_linearized(ac->req->op.rename.newdn));
1137 return LDB_ERR_UNWILLING_TO_PERFORM;
1140 /* Fix up the DN to be in the standard form,
1141 * taking particular care to match the parent DN */
1143 ac->req->op.rename.newdn,
1144 ac->search_res->message->dn,
1146 if (ret != LDB_SUCCESS) {
1150 /* TODO: Check this is a valid child to this parent,
1151 * by reading the allowedChildClasses and
1152 * allowedChildClasssesEffective attributes */
1154 ret = ldb_build_rename_req(&rename_req, ldb, ac,
1155 ac->req->op.rename.olddn, fixed_dn,
1157 ac, objectclass_rename_callback,
1159 if (ret != LDB_SUCCESS) {
1163 /* perform the rename */
1164 return ldb_next_request(ac->module, rename_req);
1167 _PUBLIC_ const struct ldb_module_ops ldb_objectclass_module_ops = {
1168 .name = "objectclass",
1169 .add = objectclass_add,
1170 .modify = objectclass_modify,
1171 .rename = objectclass_rename,