| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290 |
- /** BEGIN COPYRIGHT BLOCK
- * This Program is free software; you can redistribute it and/or modify it under
- * the terms of the GNU General Public License as published by the Free Software
- * Foundation; version 2 of the License.
- *
- * This Program is distributed in the hope that it will be useful, but WITHOUT
- * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
- * FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License along with
- * this Program; if not, write to the Free Software Foundation, Inc., 59 Temple
- * Place, Suite 330, Boston, MA 02111-1307 USA.
- *
- * In addition, as a special exception, Red Hat, Inc. gives You the additional
- * right to link the code of this Program with code not covered under the GNU
- * General Public License ("Non-GPL Code") and to distribute linked combinations
- * including the two, subject to the limitations in this paragraph. Non-GPL Code
- * permitted under this exception must only link to the code of this Program
- * through those well defined interfaces identified in the file named EXCEPTION
- * found in the source code files (the "Approved Interfaces"). The files of
- * Non-GPL Code may instantiate templates or use macros or inline functions from
- * the Approved Interfaces without causing the resulting work to be covered by
- * the GNU General Public License. Only Red Hat, Inc. may make changes or
- * additions to the list of Approved Interfaces. You must obey the GNU General
- * Public License in all respects for all of the Program code and other code used
- * in conjunction with the Program except the Non-GPL Code covered by this
- * exception. If you modify this file, you may extend this exception to your
- * version of the file, but you are not obligated to do so. If you do not wish to
- * provide this exception without modification, you must delete this exception
- * statement from your version and license this file solely under the GPL without
- * exception.
- *
- *
- * Copyright (C) 2001 Sun Microsystems, Inc. Used by permission.
- * Copyright (C) 2005 Red Hat, Inc.
- * All rights reserved.
- * END COPYRIGHT BLOCK **/
- #ifdef HAVE_CONFIG_H
- # include <config.h>
- #endif
- /*
- * ptpreop.c - bind pre-operation plugin for Pass Through Authentication
- *
- */
- #include "passthru.h"
- static Slapi_PluginDesc pdesc = { "passthruauth", PLUGIN_MAGIC_VENDOR_STR, PRODUCTTEXT,
- "pass through authentication plugin" };
- /*
- * function prototypes
- */
- static int passthru_bindpreop( Slapi_PBlock *pb );
- static int passthru_bindpreop_start( Slapi_PBlock *pb );
- static int passthru_bindpreop_close( Slapi_PBlock *pb );
- /*
- * Plugin initialization function (which must be listed in the appropriate
- * slapd config file).
- */
- int
- passthruauth_init( Slapi_PBlock *pb )
- {
- PASSTHRU_ASSERT( pb != NULL );
- slapi_log_error( SLAPI_LOG_PLUGIN, PASSTHRU_PLUGIN_SUBSYSTEM,
- "=> passthruauth_init\n" );
- if ( slapi_pblock_set( pb, SLAPI_PLUGIN_VERSION,
- (void *)SLAPI_PLUGIN_VERSION_01 ) != 0
- || slapi_pblock_set( pb, SLAPI_PLUGIN_DESCRIPTION,
- (void *)&pdesc ) != 0
- || slapi_pblock_set( pb, SLAPI_PLUGIN_START_FN,
- (void *)passthru_bindpreop_start ) != 0
- || slapi_pblock_set( pb, SLAPI_PLUGIN_PRE_BIND_FN,
- (void *)passthru_bindpreop ) != 0
- || slapi_pblock_set( pb, SLAPI_PLUGIN_CLOSE_FN,
- (void *)passthru_bindpreop_close ) != 0 ) {
- slapi_log_error( SLAPI_LOG_FATAL, PASSTHRU_PLUGIN_SUBSYSTEM,
- "passthruauth_init failed\n" );
- return( -1 );
- }
- slapi_log_error( SLAPI_LOG_PLUGIN, PASSTHRU_PLUGIN_SUBSYSTEM,
- "<= passthruauth_init succeeded\n" );
- return( 0 );
- }
- /*
- * passthru_bindpreop_start() is called before the directory server
- * is fully up. We parse our configuration and initialize any mutexes, etc.
- */
- static int
- passthru_bindpreop_start( Slapi_PBlock *pb )
- {
- int argc, rc;
- char **argv;
- PASSTHRU_ASSERT( pb != NULL );
- slapi_log_error( SLAPI_LOG_PLUGIN, PASSTHRU_PLUGIN_SUBSYSTEM,
- "=> passthru_bindpreop_start\n" );
- if ( slapi_pblock_get( pb, SLAPI_PLUGIN_ARGC, &argc ) != 0 ||
- slapi_pblock_get( pb, SLAPI_PLUGIN_ARGV, &argv ) != 0 ) {
- slapi_log_error( SLAPI_LOG_FATAL, PASSTHRU_PLUGIN_SUBSYSTEM,
- "unable to get arguments\n" );
- return( -1 );
- }
- if (( rc = passthru_config( argc, argv )) != LDAP_SUCCESS ) {
- slapi_log_error( SLAPI_LOG_FATAL, PASSTHRU_PLUGIN_SUBSYSTEM,
- "configuration failed (%s)\n", ldap_err2string( rc ));
- return( -1 );
- }
- return( 0 );
- }
- /*
- * Called right before the Directory Server shuts down.
- */
- static int
- passthru_bindpreop_close( Slapi_PBlock *pb )
- {
- PASSTHRU_ASSERT( pb != NULL );
- slapi_log_error( SLAPI_LOG_PLUGIN, PASSTHRU_PLUGIN_SUBSYSTEM,
- "=> passthru_bindpreop_close\n" );
- /*
- * close all our open connections.
- * XXXmcs: free any memory, mutexes, etc.
- */
- passthru_close_all_connections( passthru_get_config() );
- return( 0 );
- }
- static int
- passthru_bindpreop( Slapi_PBlock *pb )
- {
- int rc, method, freeresctrls=1;
- char *normbinddn, *matcheddn;
- char *libldap_errmsg, *pr_errmsg, *errmsg;
- PassThruConfig *cfg;
- PassThruServer *srvr;
- struct berval *creds, **urls;
- LDAPControl **reqctrls, **resctrls;
- PASSTHRU_ASSERT( pb != NULL );
- slapi_log_error( SLAPI_LOG_PLUGIN, PASSTHRU_PLUGIN_SUBSYSTEM,
- "=> passthru_bindpreop\n" );
- /*
- * retrieve parameters for bind operation
- */
- if ( slapi_pblock_get( pb, SLAPI_BIND_METHOD, &method ) != 0 ||
- slapi_pblock_get( pb, SLAPI_BIND_TARGET, &normbinddn ) != 0 ||
- slapi_pblock_get( pb, SLAPI_BIND_CREDENTIALS, &creds ) != 0 ) {
- slapi_log_error( SLAPI_LOG_FATAL, PASSTHRU_PLUGIN_SUBSYSTEM,
- "<= not handled (unable to retrieve bind parameters)\n" );
- return( PASSTHRU_OP_NOT_HANDLED );
- }
- if ( normbinddn == NULL ) {
- normbinddn = "";
- }
- /*
- * We only handle simple bind requests that include non-NULL binddn and
- * credentials. Let the Directory Server itself handle everything else.
- */
- if ( method != LDAP_AUTH_SIMPLE || *normbinddn == '\0'
- || creds->bv_len == 0 ) {
- slapi_log_error( SLAPI_LOG_PLUGIN, PASSTHRU_PLUGIN_SUBSYSTEM,
- "<= not handled (not simple bind or NULL dn/credentials)\n" );
- return( PASSTHRU_OP_NOT_HANDLED );
- }
- /*
- * Get pass through authentication configuration.
- */
- cfg = passthru_get_config();
- /*
- * Check to see if the target DN is one we should "pass through" to
- * another server.
- */
- if ( passthru_dn2server( cfg, normbinddn, &srvr ) != LDAP_SUCCESS ) {
- slapi_log_error( SLAPI_LOG_PLUGIN, PASSTHRU_PLUGIN_SUBSYSTEM,
- "<= not handled (not one of our suffixes)\n" );
- return( PASSTHRU_OP_NOT_HANDLED );
- }
- /*
- * We are now committed to handling this bind request.
- * Chain it off to another server.
- */
- matcheddn = errmsg = libldap_errmsg = pr_errmsg = NULL;
- urls = NULL;
- resctrls = NULL;
- if ( slapi_pblock_get( pb, SLAPI_REQCONTROLS, &reqctrls ) != 0 ) {
- rc = LDAP_OPERATIONS_ERROR;
- errmsg = "unable to retrieve bind controls";
- slapi_log_error( SLAPI_LOG_FATAL, PASSTHRU_PLUGIN_SUBSYSTEM, "%s\n",
- errmsg );
- } else {
- int lderrno;
- if (( rc = passthru_simple_bind_s( pb, srvr, PASSTHRU_CONN_TRIES,
- normbinddn, creds, reqctrls, &lderrno, &matcheddn,
- &libldap_errmsg, &urls, &resctrls )) == LDAP_SUCCESS ) {
- rc = lderrno;
- errmsg = libldap_errmsg;
- } else if ( rc != LDAP_USER_CANCELLED ) { /* not abandoned */
- PRErrorCode prerr = PR_GetError();
- pr_errmsg = PR_smprintf( "error %d - %s %s ("
- SLAPI_COMPONENT_NAME_NSPR " error %d - %s)",
- rc, ldap_err2string( rc ), srvr->ptsrvr_url,
- prerr, slapd_pr_strerror(prerr));
- if ( NULL != pr_errmsg ) {
- errmsg = pr_errmsg;
- } else {
- errmsg = ldap_err2string( rc );
- }
- rc = LDAP_OPERATIONS_ERROR;
- }
- }
- /*
- * If bind succeeded, change authentication information associated
- * with this connection.
- */
- if ( rc == LDAP_SUCCESS ) {
- char *ndn = slapi_ch_strdup( normbinddn );
- if (slapi_pblock_set(pb, SLAPI_CONN_DN, ndn) != 0 ||
- slapi_pblock_set(pb, SLAPI_CONN_AUTHMETHOD,
- SLAPD_AUTH_SIMPLE) != 0) {
- slapi_ch_free((void **)&ndn);
- rc = LDAP_OPERATIONS_ERROR;
- errmsg = "unable to set connection DN or AUTHTYPE";
- slapi_log_error( SLAPI_LOG_FATAL, PASSTHRU_PLUGIN_SUBSYSTEM,
- "%s\n", errmsg );
- }
- }
- if ( rc != LDAP_USER_CANCELLED ) { /* not abandoned */
- /*
- * Send a result to our client.
- */
- if ( resctrls != NULL ) {
- (void)slapi_pblock_set( pb, SLAPI_RESCONTROLS, resctrls );
- freeresctrls=0;
- }
- slapi_send_ldap_result( pb, rc, matcheddn, errmsg, 0, urls );
- }
- /*
- * Clean up -- free allocated memory, etc.
- */
- if ( urls != NULL ) {
- passthru_free_bervals( urls );
- }
- if ( libldap_errmsg != NULL ) {
- ldap_memfree( errmsg );
- }
- if ( pr_errmsg != NULL ) {
- PR_smprintf_free( pr_errmsg );
- }
- if ( freeresctrls && (resctrls != NULL) ) {
- ldap_controls_free( resctrls );
- }
- if ( matcheddn != NULL ) {
- ldap_memfree( matcheddn );
- }
-
- slapi_log_error( SLAPI_LOG_PLUGIN, PASSTHRU_PLUGIN_SUBSYSTEM,
- "<= handled (error %d - %s)\n", rc, ldap_err2string( rc ));
- return( PASSTHRU_OP_HANDLED );
- }
|