register.cpp 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853
  1. /** BEGIN COPYRIGHT BLOCK
  2. * This Program is free software; you can redistribute it and/or modify it under
  3. * the terms of the GNU General Public License as published by the Free Software
  4. * Foundation; version 2 of the License.
  5. *
  6. * This Program is distributed in the hope that it will be useful, but WITHOUT
  7. * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
  8. * FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
  9. *
  10. * You should have received a copy of the GNU General Public License along with
  11. * this Program; if not, write to the Free Software Foundation, Inc., 59 Temple
  12. * Place, Suite 330, Boston, MA 02111-1307 USA.
  13. *
  14. * In addition, as a special exception, Red Hat, Inc. gives You the additional
  15. * right to link the code of this Program with code not covered under the GNU
  16. * General Public License ("Non-GPL Code") and to distribute linked combinations
  17. * including the two, subject to the limitations in this paragraph. Non-GPL Code
  18. * permitted under this exception must only link to the code of this Program
  19. * through those well defined interfaces identified in the file named EXCEPTION
  20. * found in the source code files (the "Approved Interfaces"). The files of
  21. * Non-GPL Code may instantiate templates or use macros or inline functions from
  22. * the Approved Interfaces without causing the resulting work to be covered by
  23. * the GNU General Public License. Only Red Hat, Inc. may make changes or
  24. * additions to the list of Approved Interfaces. You must obey the GNU General
  25. * Public License in all respects for all of the Program code and other code used
  26. * in conjunction with the Program except the Non-GPL Code covered by this
  27. * exception. If you modify this file, you may extend this exception to your
  28. * version of the file, but you are not obligated to do so. If you do not wish to
  29. * provide this exception without modification, you must delete this exception
  30. * statement from your version and license this file solely under the GPL without
  31. * exception.
  32. *
  33. *
  34. * Copyright (C) 2001 Sun Microsystems, Inc. Used by permission.
  35. * Copyright (C) 2005 Red Hat, Inc.
  36. * All rights reserved.
  37. * END COPYRIGHT BLOCK **/
  38. /*
  39. * LAS registration interface
  40. */
  41. #include <netsite.h>
  42. #include <plhash.h>
  43. #include <base/systems.h>
  44. #include <base/util.h>
  45. #include <prlog.h>
  46. #include "permhash.h"
  47. #include <libaccess/nserror.h>
  48. #include <libaccess/acl.h>
  49. #include "aclpriv.h"
  50. #include <libaccess/aclproto.h>
  51. #include <libaccess/aclglobal.h>
  52. #include <libaccess/ldapacl.h>
  53. #include "aclcache.h"
  54. #include <libaccess/dbtlibaccess.h>
  55. #include <libaccess/aclerror.h>
  56. /* This is to force aclspace.o into ns-httpd30.dll */
  57. static ACLGlobal_p *link_ACLGlobal = &ACLGlobal;
  58. /* This forces oneeval.o into ns-httpd30.dll */
  59. static ACLDispatchVector_t **link_nsacl_table = &__nsacl_table;
  60. ACLMethod_t ACLMethodDefault = ACL_METHOD_INVALID;
  61. ACLDbType_t ACLDbTypeDefault = ACL_DBTYPE_INVALID;
  62. static char *ACLDatabaseDefault = 0;
  63. ACLDbType_t ACL_DbTypeLdap = ACL_DBTYPE_INVALID;
  64. DbParseFn_t ACLDbParseFnTable[ACL_MAX_DBTYPE];
  65. void
  66. ACL_LasHashInit()
  67. {
  68. int i;
  69. ACLLasEvalHash = PR_NewHashTable(0,
  70. PR_HashString,
  71. PR_CompareStrings,
  72. PR_CompareValues,
  73. &ACLPermAllocOps,
  74. NULL);
  75. PR_ASSERT(ACLLasEvalHash);
  76. ACLLasFlushHash = PR_NewHashTable(0,
  77. PR_HashString,
  78. PR_CompareStrings,
  79. PR_CompareValues,
  80. &ACLPermAllocOps,
  81. NULL);
  82. PR_ASSERT(ACLLasFlushHash);
  83. ACLMethodHash = PR_NewHashTable(ACL_MAX_METHOD,
  84. PR_HashCaseString,
  85. PR_CompareCaseStrings,
  86. PR_CompareValues,
  87. &ACLPermAllocOps,
  88. NULL);
  89. PR_ASSERT(ACLMethodHash);
  90. ACLDbTypeHash = PR_NewHashTable(ACL_MAX_DBTYPE,
  91. PR_HashCaseString,
  92. PR_CompareCaseStrings,
  93. PR_CompareValues,
  94. &ACLPermAllocOps,
  95. NULL);
  96. PR_ASSERT(ACLDbTypeHash);
  97. for (i = 0; i < ACL_MAX_DBTYPE; i++)
  98. ACLDbParseFnTable[i] = 0;
  99. ACLAttrGetterHash = PR_NewHashTable(256,
  100. PR_HashCaseString,
  101. PR_CompareCaseStrings,
  102. PR_CompareValues,
  103. &ACLPermAllocOps,
  104. NULL);
  105. PR_ASSERT(ACLDbTypeHash);
  106. ACLDbNameHash = PR_NewHashTable(0,
  107. PR_HashCaseString,
  108. PR_CompareCaseStrings,
  109. PR_CompareValues,
  110. &ACLPermAllocOps,
  111. ACL_DATABASE_POOL);
  112. PR_ASSERT(ACLDbNameHash);
  113. ACLUserLdbHash = PR_NewHashTable(0,
  114. PR_HashCaseString,
  115. PR_CompareCaseStrings,
  116. PR_CompareValues,
  117. &ACLPermAllocOps,
  118. NULL);
  119. PR_ASSERT(ACLUserLdbHash);
  120. return;
  121. }
  122. void
  123. ACL_LasHashDestroy()
  124. {
  125. if (ACLLasEvalHash) {
  126. PR_HashTableDestroy(ACLLasEvalHash);
  127. ACLLasEvalHash=NULL;
  128. }
  129. if (ACLLasFlushHash) {
  130. PR_HashTableDestroy(ACLLasFlushHash);
  131. ACLLasFlushHash=NULL;
  132. }
  133. }
  134. /* ACL_LasRegister
  135. * INPUT
  136. * errp NSError structure
  137. * attr_name E.g. "ip" or "dns" etc.
  138. * eval_func E.g. LASIpEval
  139. * flush_func Optional - E.g. LASIpFlush or NULL
  140. * OUTPUT
  141. * 0 on success, non-zero on failure
  142. */
  143. NSAPI_PUBLIC int
  144. ACL_LasRegister(NSErr_t *errp, char *attr_name, LASEvalFunc_t eval_func,
  145. LASFlushFunc_t flush_func)
  146. {
  147. if ((!attr_name) || (!eval_func)) return -1;
  148. ACL_CritEnter();
  149. /* See if the function is already registered. If so, report and
  150. * error, but go ahead and replace it.
  151. */
  152. if (PR_HashTableLookup(ACLLasEvalHash, attr_name) != NULL) {
  153. nserrGenerate(errp, ACLERRDUPSYM, ACLERR3900, ACL_Program, 1,
  154. attr_name);
  155. }
  156. /* Put it in the hash tables */
  157. PR_HashTableAdd(ACLLasEvalHash, attr_name, (void *)eval_func);
  158. PR_HashTableAdd(ACLLasFlushHash, attr_name, (void *)flush_func);
  159. ACL_CritExit();
  160. return 0;
  161. }
  162. /* ACL_LasFindEval
  163. * INPUT
  164. * errp NSError pointer
  165. * attr_name E.g. "ip" or "user" etc.
  166. * eval_funcp Where the function pointer is returned. NULL if the
  167. * function isn't registered.
  168. * Must be called in a critical section as ACLEvalHash is a global
  169. * variable.
  170. * OUTPUT
  171. * 0 on success, non-zero on failure
  172. */
  173. NSAPI_PUBLIC int
  174. ACL_LasFindEval(NSErr_t *errp, char *attr_name, LASEvalFunc_t *eval_funcp)
  175. {
  176. PR_ASSERT(attr_name);
  177. if (!attr_name) return -1;
  178. *eval_funcp = (LASEvalFunc_t)PR_HashTableLookup(ACLLasEvalHash, attr_name);
  179. return 0;
  180. }
  181. /* ACL_LasFindFlush
  182. * INPUT
  183. * errp NSError pointer
  184. * attr_name E.g. "ip" or "user" etc.
  185. * eval_funcp Where the function pointer is returned. NULL if the
  186. * function isn't registered.
  187. * OUTPUT
  188. * 0 on success, non-zero on failure
  189. */
  190. NSAPI_PUBLIC int
  191. ACL_LasFindFlush(NSErr_t *errp, char *attr_name, LASFlushFunc_t *flush_funcp)
  192. {
  193. PR_ASSERT(attr_name);
  194. if (!attr_name) return -1;
  195. *flush_funcp = (LASFlushFunc_t)PR_HashTableLookup(ACLLasFlushHash, attr_name);
  196. return 0;
  197. }
  198. /* ACL_MethodRegister
  199. * INPUT
  200. * name Method name string. Can be freed after return.
  201. * OUTPUT
  202. * &t Place to return the Method_t (>0)
  203. * retcode 0 on success, non-zero otherwise
  204. */
  205. int cur_method = 0; /* Use a static counter to generate the numbers */
  206. NSAPI_PUBLIC int
  207. ACL_MethodRegister(NSErr_t *errp, const char *name, ACLMethod_t *t)
  208. {
  209. ACLMethod_t rv;
  210. ACL_CritEnter();
  211. /* See if this is already registered */
  212. rv = (ACLMethod_t) PR_HashTableLookup(ACLMethodHash, name);
  213. if (rv != NULL) {
  214. *t = rv;
  215. ACL_CritExit();
  216. return 0;
  217. }
  218. /* To prevent the hash table from resizing, don't get to 32 entries */
  219. if (cur_method >= (ACL_MAX_METHOD-1)) {
  220. ACL_CritExit();
  221. return -1;
  222. }
  223. /* Put it in the hash table */
  224. rv = PR_HashTableAdd(ACLMethodHash, name, (void *)++cur_method);
  225. *t = (ACLMethod_t) cur_method;
  226. ACL_CritExit();
  227. return 0;
  228. }
  229. NSAPI_PUBLIC int
  230. ACL_MethodFind(NSErr_t *errp, const char *name, ACLMethod_t *t)
  231. {
  232. ACLMethod_t rv;
  233. /* Don't have to get the Critical Section lock 'cause the only danger
  234. * would be if the hash table had to be resized. We created it with
  235. * room for 32 entries before that happens.
  236. */
  237. rv = (ACLMethod_t) PR_HashTableLookup(ACLMethodHash, name);
  238. if (rv != NULL) {
  239. *t = rv;
  240. return 0;
  241. }
  242. return -1;
  243. }
  244. typedef struct HashEnumArg_s {
  245. char **names;
  246. int count;
  247. } HashEnumArg_t;
  248. typedef HashEnumArg_t *HashEnumArg_p;
  249. static int acl_hash_enumerator (PLHashEntry *he, PRIntn i, void *arg)
  250. {
  251. HashEnumArg_t *info = (HashEnumArg_t *)arg;
  252. char **names = info->names;
  253. names[info->count++] = STRDUP((const char *)he->key);
  254. return names[info->count-1] ? 0 : -1;
  255. }
  256. int acl_registered_names(PLHashTable *ht, int count, char ***names)
  257. {
  258. HashEnumArg_t arg;
  259. int rv;
  260. if (count == 0) {
  261. *names = 0;
  262. return 0;
  263. }
  264. arg.names = (char **)MALLOC(count * sizeof(char *));
  265. arg.count = 0;
  266. if (!arg.names) return -1;
  267. rv = PR_HashTableEnumerateEntries(ht, acl_hash_enumerator, &arg);
  268. if (rv >= 0) {
  269. /* success */
  270. *names = arg.names;
  271. }
  272. else {
  273. *names = 0;
  274. }
  275. return rv;
  276. }
  277. NSAPI_PUBLIC int
  278. ACL_MethodNamesGet(NSErr_t *errp, char ***names, int *count)
  279. {
  280. *count = cur_method;
  281. return acl_registered_names (ACLMethodHash, *count, names);
  282. }
  283. NSAPI_PUBLIC int
  284. ACL_MethodNamesFree(NSErr_t *errp, char **names, int count)
  285. {
  286. int i;
  287. if (!names) return 0;
  288. for (i = count-1; i; i--) FREE(names[i]);
  289. FREE(names);
  290. return 0;
  291. }
  292. NSAPI_PUBLIC int
  293. ACL_DbTypeFind(NSErr_t *errp, const char *name, ACLDbType_t *t)
  294. {
  295. ACLDbType_t rv;
  296. /* Don't have to get the Critical Section lock 'cause the only danger
  297. * would be if the hash table had to be resized. We created it with
  298. * room for 32 entries before that happens.
  299. */
  300. rv = (ACLDbType_t) PR_HashTableLookup(ACLDbTypeHash, name);
  301. if (rv != NULL) {
  302. *t = rv;
  303. return 0;
  304. }
  305. return -1;
  306. }
  307. /* ACL_DbTypeRegister
  308. * INPUT
  309. * name DbType name string. Can be freed after return.
  310. * OUTPUT
  311. * &t Place to return the DbType (>0)
  312. * retcode 0 on success, non-zero otherwise
  313. */
  314. int cur_dbtype = 0; /* Use a static counter to generate the numbers */
  315. NSAPI_PUBLIC int
  316. ACL_DbTypeRegister(NSErr_t *errp, const char *name, DbParseFn_t func, ACLDbType_t *t)
  317. {
  318. ACLDbType_t rv;
  319. ACL_CritEnter();
  320. /* See if this is already registered */
  321. rv = (ACLDbType_t) PR_HashTableLookup(ACLDbTypeHash, name);
  322. if (rv != NULL) {
  323. *t = rv;
  324. ACLDbParseFnTable[(int)(PRSize)rv] = func;
  325. ACL_CritExit();
  326. return 0;
  327. }
  328. /* To prevent the hash table from resizing, don't get to 32 entries */
  329. if (cur_dbtype >= (ACL_MAX_DBTYPE-1)) {
  330. ACL_CritExit();
  331. return -1;
  332. }
  333. /* Put it in the hash table */
  334. rv = PR_HashTableAdd(ACLDbTypeHash, name, (void *)++cur_dbtype);
  335. *t = (ACLDbType_t) cur_dbtype;
  336. ACLDbParseFnTable[cur_dbtype] = func;
  337. ACL_CritExit();
  338. return 0;
  339. }
  340. NSAPI_PUBLIC int
  341. ACL_DbTypeIsRegistered (NSErr_t *errp, const ACLDbType_t t)
  342. {
  343. return (0 < ((int)(PRSize)t) && ((int)(PRSize)t) <= cur_dbtype);
  344. }
  345. /* ACL_MethodIsEqual
  346. * RETURNS non-zero if equal.
  347. */
  348. NSAPI_PUBLIC int
  349. ACL_MethodIsEqual(NSErr_t *errp, const ACLMethod_t t1, const ACLMethod_t t2)
  350. {
  351. return (t1 == t2);
  352. }
  353. /* ACL_DbTypeIsEqual
  354. * RETURNS non-zero if equal.
  355. */
  356. NSAPI_PUBLIC int
  357. ACL_DbTypeIsEqual(NSErr_t *errp, const ACLDbType_t t1, const ACLDbType_t t2)
  358. {
  359. return (t1 == t2);
  360. }
  361. /* ACL_MethodNameIsEqual
  362. * Takes a method type and a method name and sees if they match.
  363. * Returns non-zero on match.
  364. */
  365. NSAPI_PUBLIC int
  366. ACL_MethodNameIsEqual(NSErr_t *errp, const ACLMethod_t t1, const char *name)
  367. {
  368. int rv;
  369. ACLMethod_t t2;
  370. rv = ACL_MethodFind(errp, name, &t2);
  371. if (rv)
  372. return (rv);
  373. else
  374. return (t1 == t2);
  375. }
  376. /* ACL_DbTypeNameIsEqual
  377. * Takes a dbtype type and a dbtype name and sees if they match.
  378. * Returns non-zero on match.
  379. */
  380. NSAPI_PUBLIC int
  381. ACL_DbTypeNameIsEqual(NSErr_t *errp, const ACLDbType_t t1, const char *name)
  382. {
  383. int rv;
  384. ACLDbType_t t2;
  385. rv = ACL_DbTypeFind(errp, name, &t2);
  386. if (rv)
  387. return (rv);
  388. else
  389. return (t1 == t2);
  390. }
  391. /* ACL_MethodGetDefault
  392. */
  393. NSAPI_PUBLIC ACLMethod_t
  394. ACL_MethodGetDefault(NSErr_t *errp)
  395. {
  396. return (ACLMethodDefault);
  397. }
  398. /* ACL_MethodSetDefault
  399. */
  400. NSAPI_PUBLIC int
  401. ACL_MethodSetDefault(NSErr_t *errp, const ACLMethod_t t)
  402. {
  403. ACLMethodDefault = t;
  404. return 0;
  405. }
  406. /* ACL_DbTypeGetDefault
  407. */
  408. NSAPI_PUBLIC ACLDbType_t
  409. ACL_DbTypeGetDefault(NSErr_t *errp)
  410. {
  411. return (ACLDbTypeDefault);
  412. }
  413. /* ACL_DbTypeSetDefault
  414. */
  415. NSAPI_PUBLIC int
  416. ACL_DbTypeSetDefault(NSErr_t *errp, ACLDbType_t t)
  417. {
  418. ACLDbTypeDefault = t;
  419. return 0;
  420. }
  421. /* ACL_DatabaseGetDefault
  422. */
  423. NSAPI_PUBLIC const char *
  424. ACL_DatabaseGetDefault(NSErr_t *errp)
  425. {
  426. return (ACLDatabaseDefault);
  427. }
  428. /* ACL_DatabaseSetDefault
  429. */
  430. NSAPI_PUBLIC int
  431. ACL_DatabaseSetDefault(NSErr_t *errp, const char *dbname)
  432. {
  433. ACLDbType_t dbtype;
  434. int rv;
  435. void *db;
  436. if (!dbname || !*dbname) return LAS_EVAL_FAIL;
  437. rv = ACL_DatabaseFind(errp, dbname, &dbtype, &db);
  438. if (rv != LAS_EVAL_TRUE) return -1;
  439. if (ACLDatabaseDefault) pool_free(ACL_DATABASE_POOL, ACLDatabaseDefault);
  440. ACL_DbTypeSetDefault(errp, dbtype);
  441. ACLDatabaseDefault = pool_strdup(ACL_DATABASE_POOL, dbname);
  442. return ACLDatabaseDefault ? 0 : -1;
  443. }
  444. /* ACL_AuthInfoGetMethod
  445. * INPUT
  446. * auth_info A PList of the authentication name/value pairs as
  447. * provided by EvalTestRights to the LAS.
  448. * OUTPUT
  449. * *t The Method number. This can be the default method
  450. number if the auth_info PList doesn't explicitly have a Method entry.
  451. * retcode 0 on success.
  452. */
  453. NSAPI_PUBLIC int
  454. ACL_AuthInfoGetMethod(NSErr_t *errp, PList_t auth_info, ACLMethod_t *t)
  455. {
  456. ACLMethod_t *methodp;
  457. if (!auth_info ||
  458. PListGetValue(auth_info, ACL_ATTR_METHOD_INDEX, (void **)&methodp, NULL) < 0)
  459. {
  460. /* No entry for "method" */
  461. *t = ACLMethodDefault;
  462. } else {
  463. *t = *methodp;
  464. }
  465. return 0;
  466. }
  467. /* ACL_AuthInfoSetMethod
  468. * INPUT
  469. * auth_info A PList of the authentication name/value pairs as
  470. * provided by EvalTestRights to the LAS.
  471. * t The Method number.
  472. * OUTPUT
  473. * retcode 0 on success.
  474. */
  475. NSAPI_PUBLIC int
  476. ACL_AuthInfoSetMethod(NSErr_t *errp, PList_t auth_info, ACLMethod_t t)
  477. {
  478. ACLMethod_t *methodp;
  479. int rv;
  480. if (auth_info) {
  481. rv = PListGetValue(auth_info, ACL_ATTR_METHOD_INDEX, (void **)&methodp,
  482. NULL);
  483. if (rv < 0) {
  484. /* No entry for "method" */
  485. methodp = (ACLMethod_t *)PERM_MALLOC(sizeof(ACLMethod_t));
  486. if (!methodp) return -1;
  487. *methodp = t;
  488. PListInitProp(auth_info, ACL_ATTR_METHOD_INDEX, ACL_ATTR_METHOD, methodp, 0);
  489. }
  490. else {
  491. /* replace the old entry */
  492. if (!methodp) return -1;
  493. *methodp = t;
  494. }
  495. }
  496. else {
  497. return -1;
  498. }
  499. return 0;
  500. }
  501. /* ACL_AuthInfoSetDbname
  502. * INPUT
  503. * auth_info A PList of the authentication name/value pairs as
  504. * provided by EvalTestRights to the LAS.
  505. * dbname Name of the new auth_info database.
  506. * OUTPUT
  507. * retcode 0 on success.
  508. */
  509. NSAPI_PUBLIC int
  510. ACL_AuthInfoSetDbname(NSErr_t *errp, PList_t auth_info, const char *dbname)
  511. {
  512. ACLDbType_t *dbtype = (ACLDbType_t *)PERM_MALLOC(sizeof(ACLDbType_t));
  513. ACLDbType_t *t2;
  514. char *copy;
  515. char *n2;
  516. void *db;
  517. int old1;
  518. int old2;
  519. int rv;
  520. if (!dbtype) {
  521. /* out of memory */
  522. return -1;
  523. }
  524. if (auth_info) {
  525. rv = ACL_DatabaseFind(errp, dbname, dbtype, (void **)&db);
  526. if (rv != LAS_EVAL_TRUE) {
  527. PERM_FREE(dbtype);
  528. return -1;
  529. }
  530. /* Check the existing entry */
  531. old1 = PListGetValue(auth_info, ACL_ATTR_DBTYPE_INDEX, (void **)&t2,
  532. NULL);
  533. old2 = PListGetValue(auth_info, ACL_ATTR_DATABASE_INDEX, (void **)&n2,
  534. NULL);
  535. if (old1 >= 0 && old2 >= 0) {
  536. /* check if the old entry is same */
  537. if (ACL_DbTypeIsEqual(errp, *dbtype, *t2)) {
  538. /* Nothing to do */
  539. PERM_FREE(dbtype);
  540. return 0;
  541. }
  542. }
  543. /* free the old entries */
  544. if (old1 >= 0) {
  545. PListDeleteProp(auth_info, ACL_ATTR_DBTYPE_INDEX, ACL_ATTR_DBTYPE);
  546. PERM_FREE(t2);
  547. }
  548. if (old2 >= 0) {
  549. PListDeleteProp(auth_info, ACL_ATTR_DATABASE_INDEX, ACL_ATTR_DATABASE);
  550. PERM_FREE(n2);
  551. }
  552. /* Create new entries for "dbtype" & "dbname" */
  553. copy = (char *)PERM_STRDUP(dbname);
  554. if (!copy) return -1;
  555. PListInitProp(auth_info, ACL_ATTR_DATABASE_INDEX,
  556. ACL_ATTR_DATABASE, copy, 0);
  557. PListInitProp(auth_info, ACL_ATTR_DBTYPE_INDEX, ACL_ATTR_DBTYPE,
  558. dbtype, 0);
  559. }
  560. else {
  561. return -1;
  562. }
  563. return 0;
  564. }
  565. /* ACL_AuthInfoGetDbType
  566. * INPUT
  567. * auth_info A PList of the authentication name/value pairs as
  568. * provided by EvalTestRights to the LAS.
  569. * OUTPUT
  570. * *t The DbType number. This can be the default dbtype
  571. * number if the auth_info PList doesn't explicitly
  572. * have a DbType entry.
  573. * retcode 0 on success.
  574. */
  575. NSAPI_PUBLIC int
  576. ACL_AuthInfoGetDbType(NSErr_t *errp, PList_t auth_info, ACLDbType_t *t)
  577. {
  578. ACLDbType_t *dbtypep;
  579. if (!auth_info ||
  580. PListGetValue(auth_info, ACL_ATTR_DBTYPE_INDEX, (void **)&dbtypep, NULL) < 0)
  581. {
  582. /* No entry for "dbtype" */
  583. *t = ACLDbTypeDefault;
  584. } else {
  585. *t = *dbtypep;
  586. }
  587. return 0;
  588. }
  589. /* ACL_AuthInfoGetDbname
  590. * INPUT
  591. * auth_info A PList of the authentication name/value pairs as
  592. * provided by EvalTestRights to the LAS.
  593. * OUTPUT
  594. * dbname The database name. This can be the default database
  595. * name if the auth_info PList doesn't explicitly
  596. * have a database entry.
  597. * retcode 0 on success.
  598. */
  599. NSAPI_PUBLIC int
  600. ACL_AuthInfoGetDbname(PList_t auth_info, char **dbname)
  601. {
  602. char *dbstr;
  603. if (!auth_info ||
  604. PListGetValue(auth_info, ACL_ATTR_DATABASE_INDEX, (void **)&dbstr, NULL) < 0)
  605. {
  606. /* No entry for "database" */
  607. dbstr = ACLDatabaseDefault;
  608. }
  609. /* else the value was already set by the PListGetValue call */
  610. *dbname = dbstr;
  611. return 0;
  612. }
  613. NSAPI_PUBLIC DbParseFn_t
  614. ACL_DbTypeParseFn(NSErr_t *errp, const ACLDbType_t dbtype)
  615. {
  616. if (ACL_DbTypeIsRegistered(errp, dbtype))
  617. return ACLDbParseFnTable[(int)(PRSize)dbtype];
  618. else
  619. return 0;
  620. }
  621. /* The hash table is keyed by attribute name, and contains pointers to the
  622. * PRCList headers. These in turn, circularly link a set of AttrGetter_s
  623. * structures.
  624. */
  625. NSAPI_PUBLIC int
  626. ACL_AttrGetterRegister(NSErr_t *errp, const char *attr, ACLAttrGetterFn_t fn,
  627. ACLMethod_t m, ACLDbType_t d, int position, void *arg)
  628. {
  629. ACLAttrGetter_t *getter;
  630. PLHashEntry **hep;
  631. if (position != ACL_AT_FRONT && position != ACL_AT_END) {
  632. return -1;
  633. }
  634. ACL_CritEnter();
  635. hep = PR_HashTableRawLookup(ACLAttrGetterHash, PR_HashCaseString(attr), attr);
  636. /* Now, allocate the current entry */
  637. getter = (ACLAttrGetter_t *)CALLOC(sizeof(ACLAttrGetter_t));
  638. if (getter == NULL) {
  639. ACL_CritExit();
  640. return -1;
  641. }
  642. getter->method = m;
  643. getter->dbtype = d;
  644. getter->fn = fn;
  645. getter->arg = arg;
  646. if (*hep == 0) { /* New entry */
  647. PR_INIT_CLIST(&getter->list);
  648. PR_HashTableAdd(ACLAttrGetterHash, attr, (void *)getter);
  649. }
  650. else {
  651. ACLAttrGetter_t *head = (ACLAttrGetter_t *)((*hep)->value);
  652. PR_INSERT_BEFORE(&getter->list, &head->list);
  653. if (position == ACL_AT_FRONT) {
  654. /* Set new head of list */
  655. (*hep)->value = (void *)getter;
  656. }
  657. }
  658. ACL_CritExit();
  659. return 0;
  660. }
  661. NSAPI_PUBLIC int
  662. ACL_AttrGetterFind(NSErr_t *errp, const char *attr,
  663. ACLAttrGetterList_t *getters)
  664. {
  665. *getters = PR_HashTableLookup(ACLAttrGetterHash, attr);
  666. if (*getters)
  667. return 0;
  668. else
  669. return -1;
  670. }
  671. NSAPI_PUBLIC
  672. ACLAttrGetter_t * ACL_AttrGetterFirst(ACLAttrGetterList_t *getters)
  673. {
  674. ACLAttrGetter_t * first = 0;
  675. if (getters && *getters) {
  676. first = (ACLAttrGetter_t *)(*getters);
  677. }
  678. return first;
  679. }
  680. NSAPI_PUBLIC ACLAttrGetter_t *
  681. ACL_AttrGetterNext(ACLAttrGetterList_t *getters, ACLAttrGetter_t *last)
  682. {
  683. ACLAttrGetter_t *head;
  684. ACLAttrGetter_t *next = 0;
  685. if (getters && *getters && last) {
  686. head = (ACLAttrGetter_t *)(*getters);
  687. if (head) {
  688. /* End of list? */
  689. if (last != (ACLAttrGetter_t *)PR_LIST_TAIL(&head->list)) {
  690. /* No, get next entry */
  691. next = (ACLAttrGetter_t *)PR_NEXT_LINK(&last->list);
  692. }
  693. }
  694. }
  695. return next;
  696. }
  697. int
  698. ACL_RegisterInit ()
  699. {
  700. NSErr_t *errp = 0;
  701. int rv;
  702. /* Register the ldap database */
  703. rv = ACL_DbTypeRegister(errp, ACL_DBTYPE_LDAP, parse_ldap_url, &ACL_DbTypeLdap);
  704. return rv;
  705. }