| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284 |
- /** BEGIN COPYRIGHT BLOCK
- * This Program is free software; you can redistribute it and/or modify it under
- * the terms of the GNU General Public License as published by the Free Software
- * Foundation; version 2 of the License.
- *
- * This Program is distributed in the hope that it will be useful, but WITHOUT
- * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
- * FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License along with
- * this Program; if not, write to the Free Software Foundation, Inc., 59 Temple
- * Place, Suite 330, Boston, MA 02111-1307 USA.
- *
- * In addition, as a special exception, Red Hat, Inc. gives You the additional
- * right to link the code of this Program with code not covered under the GNU
- * General Public License ("Non-GPL Code") and to distribute linked combinations
- * including the two, subject to the limitations in this paragraph. Non-GPL Code
- * permitted under this exception must only link to the code of this Program
- * through those well defined interfaces identified in the file named EXCEPTION
- * found in the source code files (the "Approved Interfaces"). The files of
- * Non-GPL Code may instantiate templates or use macros or inline functions from
- * the Approved Interfaces without causing the resulting work to be covered by
- * the GNU General Public License. Only Red Hat, Inc. may make changes or
- * additions to the list of Approved Interfaces. You must obey the GNU General
- * Public License in all respects for all of the Program code and other code used
- * in conjunction with the Program except the Non-GPL Code covered by this
- * exception. If you modify this file, you may extend this exception to your
- * version of the file, but you are not obligated to do so. If you do not wish to
- * provide this exception without modification, you must delete this exception
- * statement from your version and license this file solely under the GPL without
- * exception.
- *
- *
- * Copyright (C) 2001 Sun Microsystems, Inc. Used by permission.
- * Copyright (C) 2005 Red Hat, Inc.
- * All rights reserved.
- * END COPYRIGHT BLOCK **/
- /************************************************************
- testbind.c
- This source file provides an example of a pre-operation plug-in
- function that handles authentication.
- Note that the Directory Server front-end handles bind
- operations requested by the root DN. The server does not
- invoke your plug-in function if the client is authenicating
- as the root DN.
- To test this plug-in function, stop the server, edit the dse.ldif file
- (in the <server_root>/slapd-<server_id>/config directory)
- and add the following lines before restarting the server :
- dn: cn=Test Bind,cn=plugins,cn=config
- objectClass: top
- objectClass: nsSlapdPlugin
- objectClass: extensibleObject
- cn: Test Bind
- nsslapd-pluginPath: <server_root>/plugins/slapd/slapi/examples/libtest-plugin.so
- nsslapd-pluginInitfunc: testbind_init
- nsslapd-pluginType: preoperation
- nsslapd-pluginEnabled: on
- nsslapd-plugin-depends-on-type: database
- nsslapd-pluginId: test-bind
- ************************************************************/
- #include <stdio.h>
- #include <string.h>
- #include "slapi-plugin.h"
- Slapi_PluginDesc bindpdesc = { "test-bind", "Fedora Project", "1.0.2",
- "sample bind pre-operation plugin" };
- static Slapi_ComponentId *plugin_id = NULL;
- /* Pre-operation plug-in function */
- int
- test_bind( Slapi_PBlock *pb )
- {
- char *dn, *attrs[2] = { SLAPI_USERPWD_ATTR, NULL };
- int method, rc = LDAP_SUCCESS;
- struct berval *credentials;
- struct berval **pwvals;
- Slapi_DN *sdn = NULL;
- Slapi_Entry *e = NULL;
- Slapi_Attr *attr = NULL;
- /* Log a message to the server error log. */
- slapi_log_error( SLAPI_LOG_PLUGIN, "test_bind",
- "Pre-operation bind function called.\n" );
- /* Gets parameters available when processing an LDAP bind
- operation. */
- if ( slapi_pblock_get( pb, SLAPI_BIND_TARGET, &dn ) != 0 ||
- slapi_pblock_get( pb, SLAPI_BIND_METHOD, &method ) != 0 ||
- slapi_pblock_get( pb, SLAPI_BIND_CREDENTIALS, &credentials ) != 0 ) {
- slapi_log_error( SLAPI_LOG_PLUGIN, "test_bind",
- "Could not get parameters for bind operation\n" );
- slapi_send_ldap_result( pb, LDAP_OPERATIONS_ERROR,
- NULL, NULL, 0, NULL );
- return( 1 );
- }
- /* Check the authentication method */
- switch( method ) {
- case LDAP_AUTH_SIMPLE:
- /* First, get the entry specified by the DN. */
- sdn = slapi_sdn_new_dn_byref( dn );
- rc = slapi_search_internal_get_entry( sdn, attrs, &e,
- plugin_id );
- slapi_sdn_free( &sdn );
- if ( rc != LDAP_SUCCESS ) {
- slapi_log_error( SLAPI_LOG_PLUGIN, "test_bind",
- "Could not find entry %s (error %d)\n",
- dn, rc );
- break;
- }
- /* Next, check credentials against the userpassword attribute
- of that entry. */
- if ( e != NULL ) {
- Slapi_Value *credval, **pwvals;
- int i, hint, valcount;
-
- if ( slapi_entry_attr_find( e, SLAPI_USERPWD_ATTR,
- &attr ) != 0 || slapi_attr_get_numvalues( attr,
- &valcount ) != 0 ) {
- slapi_log_error( SLAPI_LOG_PLUGIN, "test_bind",
- "Entry has no %s attribute values\n",
- SLAPI_USERPWD_ATTR );
- rc = LDAP_INAPPROPRIATE_AUTH;
- break;
- }
- credval = slapi_value_new_berval( credentials );
- pwvals = (Slapi_Value **)slapi_ch_calloc( valcount,
- sizeof( Slapi_Value * ));
- i = 0;
- for ( hint = slapi_attr_first_value( attr, &pwvals[i] );
- hint != -1; hint = slapi_attr_next_value( attr,
- hint, &pwvals[i] )) {
- ++i;
- }
- if ( slapi_pw_find_sv( pwvals, credval ) != 0 ) {
- slapi_log_error( SLAPI_LOG_PLUGIN, "test_bind",
- "Credentials are not correct\n" );
- rc = LDAP_INVALID_CREDENTIALS;
- }
- slapi_value_free( &credval );
- slapi_ch_free( (void **)&pwvals );
- if ( LDAP_SUCCESS != rc ) {
- break;
- }
- } else {
- /* This should not happen. The previous section of code
- already checks for this case. */
- slapi_log_error( SLAPI_LOG_PLUGIN, "test_bind",
- "Could find entry for %s\n", dn );
- rc = LDAP_NO_SUCH_OBJECT;
- break;
- }
- /* Set the DN and authentication method for the connection. */
- if ( slapi_pblock_set( pb, SLAPI_CONN_DN,
- slapi_ch_strdup( dn ) ) != 0 ||
- slapi_pblock_set( pb, SLAPI_CONN_AUTHMETHOD,
- SLAPD_AUTH_SIMPLE ) != 0 ) {
- slapi_log_error( SLAPI_LOG_PLUGIN, "test_bind",
- "Failed to set DN and method for connection\n" );
- rc = LDAP_OPERATIONS_ERROR;
- break;
- }
- /* Send a "success" result code back to the client. */
- slapi_log_error( SLAPI_LOG_PLUGIN, "test_bind",
- "Authenticated: %s\n", dn );
- rc = LDAP_SUCCESS;
- break;
- /* If NONE is specified, the client is requesting to bind anonymously.
- Normally, this case should be handled by the server's front-end
- before it calls this plug-in function. Just in case this does
- get through to the plug-in function, you can handle this by
- sending a successful result code back to the client and returning
- 1.
- */
- case LDAP_AUTH_NONE:
- slapi_log_error( SLAPI_LOG_PLUGIN, "test_bind",
- "Authenticating anonymously\n" );
- rc = LDAP_SUCCESS;
- break;
- /* This plug-in does not support any other method of authentication */
- case LDAP_AUTH_SASL:
- default:
- slapi_log_error( SLAPI_LOG_PLUGIN, "test_bind",
- "Unsupported authentication method requested: %d\n",
- method );
- rc = LDAP_AUTH_METHOD_NOT_SUPPORTED;
- break;
- }
- slapi_send_ldap_result( pb, rc, NULL, NULL, 0, NULL );
- return( 1 );
- }
- /* Pre-operation plug-in function */
- int
- test_search( Slapi_PBlock *pb )
- {
- char *reqdn;
- /* Log a message to the server error log. */
- slapi_log_error( SLAPI_LOG_PLUGIN, "test_search",
- "Pre-operation search function called.\n" );
- /* Get requestor of search operation. This is not critical
- to performing the search (this plug-in just serves as
- confirmation that the bind plug-in works), so return 0
- if this fails. */
- if ( slapi_pblock_get( pb, SLAPI_REQUESTOR_DN, &reqdn ) != 0 ) {
- slapi_log_error( SLAPI_LOG_PLUGIN, "test_search",
- "Could not get requestor parameter for search operation\n" );
- return( 0 );
- }
- /* Indicate who is requesting the search */
- if ( reqdn != NULL && *reqdn != '\0' ) {
- slapi_log_error( SLAPI_LOG_PLUGIN, "test_search",
- "Search requested by %s\n", reqdn );
- } else {
- slapi_log_error( SLAPI_LOG_PLUGIN, "test_search",
- "Search requested by anonymous client\n" );
- }
- return( 0 );
- }
- /* Initialization function */
- #ifdef _WIN32
- __declspec(dllexport)
- #endif
- int
- testbind_init( Slapi_PBlock *pb )
- {
- /* Retrieve and save the plugin identity to later pass to
- internal operations */
- if ( slapi_pblock_get( pb, SLAPI_PLUGIN_IDENTITY, &plugin_id ) != 0 ) {
- slapi_log_error( SLAPI_LOG_PLUGIN, "testbind_init",
- "Failed to retrieve SLAPI_PLUGIN_IDENTITY\n" );
- return( -1 );
- }
- /* Register the pre-operation bind function and specify
- the server plug-in version. */
- if ( slapi_pblock_set( pb, SLAPI_PLUGIN_VERSION,
- SLAPI_PLUGIN_VERSION_01 ) != 0 ||
- slapi_pblock_set( pb, SLAPI_PLUGIN_DESCRIPTION,
- (void *)&bindpdesc ) != 0 ||
- slapi_pblock_set( pb, SLAPI_PLUGIN_PRE_BIND_FN,
- (void *) test_bind ) != 0 ||
- slapi_pblock_set( pb, SLAPI_PLUGIN_PRE_SEARCH_FN,
- (void *) test_search ) != 0 ) {
- slapi_log_error( SLAPI_LOG_PLUGIN, "testbind_init",
- "Failed to set version and functions\n" );
- return( -1 );
- }
- return( 0 );
- }
|