diff options
Diffstat (limited to 'ldap/clients/dsgw/domodify.c')
-rw-r--r-- | ldap/clients/dsgw/domodify.c | 1254 |
1 files changed, 1254 insertions, 0 deletions
diff --git a/ldap/clients/dsgw/domodify.c b/ldap/clients/dsgw/domodify.c new file mode 100644 index 00000000..5535311e --- /dev/null +++ b/ldap/clients/dsgw/domodify.c @@ -0,0 +1,1254 @@ +/** + * PROPRIETARY/CONFIDENTIAL. Use of this product is subject to + * license terms. Copyright © 2001 Sun Microsystems, Inc. + * Some preexisting portions Copyright © 2001 Netscape Communications Corp. + * All rights reserved. + */ +/* + * domodify.c -- LDAP modify CGI handler -- HTTP gateway + * + * Copyright (c) 1996 Netscape Communications Corp. + * All rights reserved. + */ + +#include "dsgw.h" +#include "dbtdsgw.h" + +#define DSGW_CHANGETYPE_UNKNOWN 0 +#define DSGW_CHANGETYPE_MODIFY 1 +#define DSGW_CHANGETYPE_ADD 2 +#define DSGW_CHANGETYPE_DELETE 3 +#define DSGW_CHANGETYPE_MODRDN 4 + +static void post_request(); +static int entry_modify_or_add( LDAP *ld, char *dn, int add, int *pwdchangedp ); +static int entry_delete( LDAP *ld, char *dn ); +static int entry_modrdn( LDAP *ld, char *dn, char *newrdn, int deleteoldrdn ); +static int gather_passwd_changes( char *dn, LDAPMod ***pmodsp, + int adding_entry, int *pwdchangedp ); +static void modify_error( int lderr, char *lderrtxt ); +static void addmodifyop( LDAPMod ***pmodsp, int modop, char *attr, + char *value, int vlen ); +static void remove_modifyops( LDAPMod **pmods, char *attr ); +static int starts_with( char *s, char *startswith ); +static char **post2multilinevals( char *postedval ); +static char **post2vals( char *postedval ); +static int require_oldpasswd( char *modifydn ); +static char *dsgw_processdomainid( LDAP *ld, char *dn, char *attr, char *val, int len); +static int value_is_unique( LDAP *ld, char *dn, char *attr, char *value ); +static LDAPDomainIdStatus +dsgw_checkdomain_uniqueness( LDAP *ld, char *attr, char *val, int len); +static int verbose = 0; +static int quiet = 0; +static int display_results_inline = 0; + + +int main( argc, argv, env ) + int argc; + char *argv[]; +#ifdef DSGW_DEBUG + char *env[]; +#endif +{ + + (void)dsgw_init( argc, argv, DSGW_METHOD_POST ); + dsgw_send_header(); + +#ifdef DSGW_DEBUG + dsgw_logstringarray( "env", env ); +#endif + + post_request(); + + exit( 0 ); +} + + +static void +post_request() +{ + LDAP *ld; + int rc, changetype, dnlen, i, passwd_changed, discard_authcreds; + char *s, *encodeddn, *dn, *newrdn, *changedesc, **rdns, **oldrdns, + *jscomp, *entry_name, *new_name, *success_msg; + char *old_dn; + char buf[ 256 ]; +#if 0 + FILE *genfp; +#endif + + passwd_changed = discard_authcreds = 0; + s = dsgw_get_cgi_var( "changetype", DSGW_CGIVAR_REQUIRED ); + changedesc = XP_GetClientStr(DBT_Editing_); + + if ( strcasecmp( s, "modify" ) == 0 ) { + changetype = DSGW_CHANGETYPE_MODIFY; + } else if ( strcasecmp( s, "add" ) == 0 ) { + changetype = DSGW_CHANGETYPE_ADD; + changedesc = XP_GetClientStr(DBT_Adding_); + } else if ( strcasecmp( s, "delete" ) == 0 ) { + changetype = DSGW_CHANGETYPE_DELETE; + changedesc = XP_GetClientStr(DBT_Deleting_); + } else if ( strcasecmp( s, "modrdn" ) == 0 ) { + changetype = DSGW_CHANGETYPE_MODRDN; + changedesc = XP_GetClientStr(DBT_Renaming_); + } else { + changetype = DSGW_CHANGETYPE_UNKNOWN; + } + + encodeddn = dsgw_get_cgi_var( "dn", DSGW_CGIVAR_REQUIRED ); + + /* undo extra level of escaping on DN */ + dn = dsgw_ch_strdup( encodeddn ); + dsgw_form_unescape( dn ); + old_dn = dn; + + quiet = dsgw_get_boolean_var( "quiet", DSGW_CGIVAR_OPTIONAL, 0 ); + +#if 0 + /* + * If the "genscreen" form variable is set, it is the name of a + * genscreen-compatible HTML template to display the domodify results + * within. We replace the "DS_LAST_OP_INFO" directive with our own + * "domodify" output. Presence of "genscreen" also turns on quiet mode. + */ + if (( s = dsgw_get_cgi_var( "genscreen", DSGW_CGIVAR_OPTIONAL )) != NULL && + dsgw_genscreen_begin( s, &genfp, DRCT_DS_LAST_OP_INFO, 0 ) == 0 ) { + quiet = display_results_inline = 1; + } +#endif + + verbose = dsgw_get_boolean_var( "verbose", DSGW_CGIVAR_OPTIONAL, 0 ); + if ( verbose ) { + quiet = 0; /* verbose overrides quiet */ + } + + if ( dsgw_init_ldap( &ld, NULL, 0, 0) != DSGW_BOUND_ASUSER ) { + dsgw_emitf( XP_GetClientStr(DBT_warningNoAuthenticationContinuin_) ); + } + + if ( !quiet ) { + PR_snprintf( buf, 256, + XP_GetClientStr(DBT_SDirectoryEntry_), changedesc ); + dsgw_html_begin( buf, 1 ); + } else { + dsgw_html_begin( NULL, 0 ); + } + + dsgw_emits( "\n<FONT SIZE=+1>\n" ); + + rdns = ldap_explode_dn( dn, 1 ); + if ( rdns == NULL || rdns[ 0 ] == NULL ) { + entry_name = dn; + } else { + entry_name = dsgw_ch_strdup( rdns[ 0 ] ); + } + new_name = success_msg = ""; + dsgw_emitf( "%s <B>%s</B>...\n</FONT>\n\n", changedesc, entry_name ); + if ( rdns != NULL ) { + ldap_value_free( rdns ); + } + + if ( verbose ) { + dsgw_emitf( XP_GetClientStr(DBT_PreEntryDnSPrePN_), dn ); + } + + /* + * For end-user CGIs under admin server, if we're talking to a local DB, + * then there's no access control, and therefore we need to disallow + * people from changing entries other than their own. Do that check right + * here. + */ + if ( gc->gc_enduser && gc->gc_localdbconf != NULL ) { + char *bdn; + (void)dsgw_get_adm_identity( ld, NULL, &bdn, NULL, DSGW_ERROPT_EXIT ); + /* Make sure DN we're bound as matches the DN being modified */ + if ( dsgw_dn_cmp( dn, bdn ) == 0 ) { + /* Not the same - generate an error and bail out */ + dsgw_error( DSGW_ERR_LOCALDB_PERMISSION_DENIED, NULL, + DSGW_ERROPT_EXIT, 0, NULL ); + } + } + + rc = LDAP_SUCCESS; + switch( changetype ) { + case DSGW_CHANGETYPE_MODIFY: + if ( dsgw_get_boolean_var( "changed_DN", DSGW_CGIVAR_OPTIONAL, 0 )) { + /* Collect all the inputs named "replace_DN_attr", where + attr is an LDAP attribute type. Construct an AVA from + each such input, and combine the AVAs to form newrdn. + */ + auto int i = 0; + auto char *varname, *val; + auto size_t newrdn_len; + newrdn = NULL; + while ( (varname = dsgw_next_cgi_var( &i, &val )) != NULL) { + if ( starts_with( varname, "replace_" )) { + auto char* attr = varname; + auto int is_rdn = 0; + { + auto char* p; + while (( p = strchr( attr, '_' )) != NULL ) { + attr = p + 1; + if ( starts_with( attr, "DN_" )) { + is_rdn = 1; + } /* ignore any other prefixes */ + } + } + if (is_rdn && strlen(val) > 0) { + auto const size_t attrlen = strlen (attr); + auto const size_t val_len = strlen (val); + auto const size_t ava_len = attrlen + 1 + val_len; + auto char* ava; + if (newrdn == NULL) { + ava = newrdn = dsgw_ch_malloc (ava_len + 1); + newrdn_len = ava_len; + } else { + newrdn = dsgw_ch_realloc (newrdn, newrdn_len + ava_len + 2); + memcpy (newrdn + newrdn_len, "+", 1); + ava = newrdn + newrdn_len + 1; + newrdn_len += (ava_len + 1); + } + memcpy (ava, attr, attrlen); + memcpy (ava + attrlen, "=", 1); + memcpy (ava + attrlen + 1, val, val_len + 1); + } + } + free (varname); + } + if (newrdn) goto continue_modrdn; + /* else failed to compute newrdn */ + } + break; + case DSGW_CHANGETYPE_MODRDN: + newrdn = dsgw_get_cgi_var( "newrdn", DSGW_CGIVAR_REQUIRED ); + continue_modrdn: + dsgw_remove_leading_and_trailing_spaces( &newrdn ); + rc = entry_modrdn( ld, dn, newrdn, dsgw_get_boolean_var( "deleteoldrdn", + DSGW_CGIVAR_OPTIONAL, 0 )); + + if ( rc == LDAP_SUCCESS ) { + + /* construct the new DN so we can insert correct "edit" link */ + if (( oldrdns = ldap_explode_dn( dn, 0 )) == NULL ) { + dsgw_error( DSGW_ERR_NOMEMORY, NULL, DSGW_ERROPT_EXIT, + 0, NULL ); + } + + dnlen = strlen( newrdn ) + 1; /* room for "," */ + for ( i = 1; oldrdns[ i ] != NULL; ++i ) { + dnlen += ( 1 + strlen( oldrdns[ i ] )); + } + dn = dsgw_ch_malloc( dnlen + 1 ); + *dn = '\0'; + strcat( dn, newrdn ); + for ( i = 1; oldrdns[ i ] != NULL; ++i ) { + strcat( dn, "," ); + strcat( dn, oldrdns[ i ] ); + } + ldap_value_free( oldrdns ); + free( encodeddn ); + encodeddn = dsgw_strdup_escaped( dn ); + + success_msg = XP_GetClientStr(DBT_renamedBSBToBSB_); + if (( rdns = ldap_explode_rdn( newrdn, 1 )) == NULL + || rdns[ 0 ] == NULL ) { + new_name = newrdn; + } else { + new_name = dsgw_ch_strdup (rdns[ 0 ]); + ldap_value_free( rdns ); + } + } + break; + default: + break; + } + + switch( changetype ) { + case DSGW_CHANGETYPE_MODIFY: + if (rc != LDAP_SUCCESS) break; + case DSGW_CHANGETYPE_ADD: + rc = entry_modify_or_add( ld, dn, changetype == DSGW_CHANGETYPE_ADD, + &passwd_changed ); + if ( changetype == DSGW_CHANGETYPE_MODIFY ) { + success_msg = XP_GetClientStr(DBT_changesToBSBHaveBeenSaved_); + } else { + success_msg = XP_GetClientStr(DBT_BSBHasBeenAdded_); + } + break; + case DSGW_CHANGETYPE_DELETE: + rc = entry_delete( ld, dn ); + success_msg = XP_GetClientStr(DBT_BSBHasBeenDeleted_); + break; + case DSGW_CHANGETYPE_MODRDN: + break; + default: + rc = LDAP_PARAM_ERROR; + } + + /* + * If we are not running under the admin. server AND the operation + * succeeded and the user is bound as the entry they just changed, + * AND one of these conditions is true: + * 1. we changed the password + * 2. we did a modrdn + * 3. we deleted the entry + * then the auth. credentials should be discarded. If we do discard, we + * print an informative message for the user. + */ + if ( !gc->gc_admserv && rc == LDAP_SUCCESS && + ( changetype == DSGW_CHANGETYPE_DELETE || dn != old_dn || + ( changetype == DSGW_CHANGETYPE_MODIFY && passwd_changed )) && + dsgw_bound_as_dn( old_dn, 0 )) { + char *authck; + + /* first, remove the cookie from the cookie database (ignore errors) */ + if (( authck = dsgw_get_auth_cookie()) != NULL ) { + (void)dsgw_delcookie( authck ); + } + + /* output JavaScript to clear the cookie in the user's browser */ + dsgw_emits( "<SCRIPT LANGUAGE=\"JavaScript\">\n" ); + dsgw_emits( "<!-- Hide from non-JavaScript browsers\n" ); + dsgw_emitf( "document.cookie = '%s=%s; path=/'\n", + DSGW_AUTHCKNAME, DSGW_UNAUTHSTR ); + dsgw_emits( "// End Hiding -->\n</SCRIPT>\n" ); + dsgw_emitf( XP_GetClientStr(DBT_PBNoteBBecauseYouSTheEntryYouWer_), + ( changetype == DSGW_CHANGETYPE_DELETE ) ? XP_GetClientStr(DBT_deleted_) : + ( dn != old_dn ) ? XP_GetClientStr(DBT_renamed_) : + XP_GetClientStr(DBT_changedThePasswordOf_) ); + } + + if ( rc == LDAP_SUCCESS ) { + /* + * check for "completion_javascript" form var and + * execute it if present. + */ + jscomp = dsgw_get_cgi_var( "completion_javascript", + DSGW_CGIVAR_OPTIONAL ); + if ( jscomp != NULL ) { + char *entry_name_js; + char *new_name_js; + + entry_name_js = dsgw_escape_quotes( entry_name ); + new_name_js = dsgw_escape_quotes( new_name ); + dsgw_emits( "<SCRIPT LANGUAGE=\"JavaScript\">\n" ); + dsgw_emits( "dsmodify_info = '" ); + dsgw_emitf( success_msg, entry_name_js, new_name_js ); + dsgw_emits( "';\n" ); + dsgw_emitf( "dsmodify_dn = '%s';\n", + ( changetype == DSGW_CHANGETYPE_DELETE ) ? "": + encodeddn ); + dsgw_emitf( "eval('%s');\n", jscomp ); + dsgw_emits( "</SCRIPT>\n" ); + } + } else { + jscomp = NULL; + } + + if (( jscomp == NULL || changetype == DSGW_CHANGETYPE_DELETE ) + && !gc->gc_admserv ) { + dsgw_form_begin( NULL, NULL ); + dsgw_emits( "\n<CENTER><TABLE border=2 width=\"100%\"><TR>\n" ); + /* + * Show framed button. If the modify succeeded, it is "Close". + * If the modify failed, it is "Go Back." + */ + dsgw_emits( "<TD WIDTH=\"100%\" ALIGN=\"center\">\n" ); + if ( rc == LDAP_SUCCESS ) { + dsgw_emitf( "<INPUT TYPE=\"button\" VALUE=\"%s\" " + "onClick=\"parent.close()\">\n", + XP_GetClientStr(DBT_closeWindow_) ); + } else { + dsgw_emitf( "<INPUT TYPE=\"button\" VALUE=\"%s\" " + "onClick=\"history.back()\">\n", + XP_GetClientStr(DBT_goBack_) ); + } + dsgw_emits( "\n</TABLE></CENTER></FORM>\n" ); + } + +#if 0 + if ( display_results_inline && genfp != NULL ) { + dsgw_emits( "<HR>\n" ); + dsgw_genscreen_continue( &genfp, NULL, 0 ); + } else if ( !quiet ) { + dsgw_html_end(); + } +#else + if ( !quiet ) { + dsgw_html_end(); + } +#endif + ldap_unbind( ld ); + if (old_dn != dn) free ( old_dn ); + free( dn ); +} + +static int +entry_modify_or_add( LDAP *ld, char *dn, int add, int *pwdchangedp ) +{ + int lderr, i, j, opoffset, modop, mls, unique, unchanged_count; + char *varname, *varvalue, *retval, *attr, *p, **vals, **unchanged_attrs; + char *userid = NULL, *oc_ntuser = NULL; + char userdomainid[512]; + + char *groupname = NULL; + char groupdomainid[512]; + + LDAPMod **pmods; + + int msgid; + LDAPMessage *res = NULL; + char *errmsg = NULL; + + memset( userdomainid, 0, sizeof( userdomainid )); + memset( groupdomainid, 0, sizeof( groupdomainid )); + + pmods = NULL; + unchanged_attrs = NULL; + unchanged_count = 0; + + /* + * Gather up password changes (if present in CGI POST) + */ + if (( lderr = gather_passwd_changes( dn, &pmods, add, pwdchangedp )) + != LDAP_SUCCESS ) { + return( lderr ); + } + + if ( verbose ) { + dsgw_emitf( "<PRE>\n" ); + } + + /* + * Gather up other changes: each attribute value is POSTed in a variable + * named: + * add_[unique_]ATTR + * replace_[unique_][DN_]ATTR + * or delete_[unique_]ATTR + * + * where ATTR is the LDAP attribute name and "unique_" is optional (if + * present, we check to make sure the value is not in use before accepting + * a replace or add). + * + * Additionally, if a variable name changed_ATTR is POSTed and its value + * is not "true", it is assumed that no values have changed for that + * ATTRibute. If no "changed_ATTR" variable is POSTed, we assume that + * ATTR has in fact changed. + */ + i = 0; + while (( varname = dsgw_next_cgi_var( &i, &varvalue )) != NULL ) { + if ( varvalue != NULL && *varvalue == '\0' ) { + varvalue = NULL; + } else { + dsgw_remove_leading_and_trailing_spaces( &varvalue ); + } + + opoffset = -1; + if ( starts_with( varname, "add_" )) { + modop = LDAP_MOD_ADD; + opoffset = 4; + } else if ( starts_with( varname, "replace_" )) { + modop = LDAP_MOD_REPLACE; + opoffset = 8; + attr = varname + opoffset; + if( strcasecmp( DSGW_ATTRTYPE_NTUSERDOMAINID, attr) == 0) { + if( varvalue) { + if( !userid ) + userid = strdup( varvalue ); + else + strcpy( userdomainid, varvalue ); + } + } + if( strcasecmp( DSGW_ATTRTYPE_NTGROUPDOMAINID, attr) == 0) { + if( varvalue) { + if( !groupname ) + groupname = strdup( varvalue ); + else + strcpy( groupdomainid, varvalue ); + } + } + } else if ( starts_with( varname, "delete_" )) { + modop = LDAP_MOD_DELETE; + opoffset = 7; + } else if ( !strcmp( varname, "changed_DN" )) { + /* ignore it */ + } else if ( starts_with( varname, "changed_" )) { + attr = varname + 8; + if ( verbose && strcasecmp( varvalue, "true" ) == 0 ) { + dsgw_emitf( XP_GetClientStr(DBT_attributeSWasChangedBrN_), attr ); + } + if ( varvalue != NULL && strcasecmp( varvalue, "true" ) != 0 ) { + unchanged_attrs = (char **)dsgw_ch_realloc( unchanged_attrs, + ( 2 + unchanged_count ) * sizeof( char * )); + unchanged_attrs[ unchanged_count++ ] = dsgw_ch_strdup( attr ); + unchanged_attrs[ unchanged_count ] = NULL; + + if ( pmods != NULL ) { + remove_modifyops( pmods, attr ); + } + } + } else if ( starts_with( varname, "replace_" )) { + modop = LDAP_MOD_REPLACE; + opoffset = 8; + attr = varname + opoffset; + if( strcasecmp( DSGW_ATTRTYPE_USERID, attr) == 0) + if( varvalue) + userid = strdup( varvalue ); + if( strcasecmp( DSGW_ATTRTYPE_NTUSERDOMAINID, attr) == 0) + if( varvalue) + strcpy( userdomainid, varvalue ); + if( strcasecmp( DSGW_ATTRTYPE_NTGROUPNAME, attr) == 0) + if( varvalue) + groupname = strdup( varvalue ); + if( strcasecmp( DSGW_ATTRTYPE_NTGROUPDOMAINID, attr) == 0) + if( varvalue) + strcpy( groupdomainid, varvalue ); + } + + if ( opoffset >= 0 ) { + attr = varname + opoffset; + mls = 0; + unique = 0; + while (( p = strchr( attr, '_' )) != NULL ) { + if ( starts_with( attr, "mls_" )) { + mls = 1; + } else if ( starts_with( attr, "unique_" )) { + unique = 1; + } /* ignore any other prefixes */ + attr = p + 1; + } + + for ( j = 0; j < unchanged_count; ++j ) { + if ( strcasecmp( unchanged_attrs[ j ], attr ) == 0 ) { + break; + } + } + + if ( j >= unchanged_count ) { + if ( varvalue == NULL || *varvalue == '\0' ) { + vals = NULL; + varvalue = NULL; + } else { + varvalue = dsgw_ch_strdup( varvalue ); + if ( mls ) { + vals = post2multilinevals( varvalue ); + } else { + vals = post2vals( varvalue ); + } + } + if ( vals == NULL ) { + if ( modop != LDAP_MOD_ADD ) { + addmodifyop( &pmods, modop, attr, NULL, 0 ); + } + } else { + for ( j = 0; vals[ j ] != NULL; ++j ) { + if ( unique && modop != LDAP_MOD_DELETE && ( lderr = + value_is_unique( ld, dn, attr, vals[ j ] )) != + LDAP_SUCCESS ) { + return( lderr ); + } + if( strcasecmp( DSGW_OC_NTUSER, varvalue) == 0 && + modop == LDAP_MOD_ADD ) { + oc_ntuser = strdup( vals[ j ] ); + } + + if( strcasecmp( DSGW_ATTRTYPE_NTUSERDOMAINID, attr) == 0) { + if( modop == LDAP_MOD_ADD ) { + if( userid == NULL ) { + userid = strdup( vals[ j ] ); + break; + } else { + memset( userdomainid, 0, sizeof( userdomainid )); + PR_snprintf( userdomainid, 512, "%s%c%s", + vals[ j ], DSGW_NTDOMAINID_SEP, userid ); + if( dsgw_checkdomain_uniqueness( ld, attr, + userdomainid, strlen( userdomainid ) ) != + LDAPDomainIdStatus_Unique) { + dsgw_error( DSGW_ERR_DOMAINID_NOTUNIQUE, + NULL, 0, 0, NULL ); + return(LDAP_PARAM_ERROR); + } else { + /* don't free here because this is freed elsewhere */ + /* + free( vals[ j ] ); + */ + vals[ j ] = strdup( userdomainid ); + } + } + } else { + if(( retval = dsgw_processdomainid( ld, dn, attr, + vals[ j ], strlen( vals[ j ] ))) != 0) { + vals[ j ] = retval; + } + } + } + + if( strcasecmp( DSGW_ATTRTYPE_NTGROUPDOMAINID, attr) == 0) { + if( modop == LDAP_MOD_ADD ) { + if( groupname == NULL ) { + groupname = strdup( vals[ j ] ); + break; + } else { + memset( groupdomainid, 0, sizeof( groupdomainid )); + PR_snprintf( groupdomainid, 512, "%s%c%s", + vals[ j ], DSGW_NTDOMAINID_SEP, groupname ); + if( dsgw_checkdomain_uniqueness( ld, attr, + groupdomainid, strlen( groupdomainid ) ) != + LDAPDomainIdStatus_Unique) { + dsgw_error( DSGW_ERR_DOMAINID_NOTUNIQUE, + NULL, 0, 0, NULL ); + return(LDAP_PARAM_ERROR); + } else { + /* don't free here because this is freed elsewhere */ + /* + free( vals[ j ] ); + */ + vals[ j ] = strdup( groupdomainid ); + } + } + } else { + if(( retval = dsgw_processdomainid( ld, dn, attr, + vals[ j ], strlen( vals[ j ] ))) != 0) { + vals[ j ] = retval; + } + } + } + addmodifyop( &pmods, modop, attr, vals[ j ], + strlen( vals[ j ] )); + } + free( vals ); + } + if ( varvalue != NULL ) { + free( varvalue ); + } + } + } + + free( varname ); + } + + if( oc_ntuser != NULL && + ((strlen( userdomainid ) == 0) || userid == NULL )) { + dsgw_error( DSGW_ERR_USERID_DOMAINID_REQUIRED, NULL, 0, 0, NULL ); + return(LDAP_PARAM_ERROR); + } + + if( strlen( userdomainid ) > 0 && userid == NULL ) { + dsgw_error( DSGW_ERR_USERID_REQUIRED, NULL, 0, 0, NULL ); + return(LDAP_PARAM_ERROR); + } + + if( strlen( userdomainid ) > 0 && userid && + strlen( userid ) > MAX_NTUSERID_LEN) { + dsgw_error( DSGW_ERR_USERID_MAXLEN_EXCEEDED, NULL, 0, 0, NULL ); + return(LDAP_PARAM_ERROR); + } + + if ( verbose && pmods != NULL ) { + int j, notascii; + unsigned long k; + struct berval *bvp; + + for ( i = 0; pmods[ i ] != NULL; ++i ) { + modop = pmods[ i ]->mod_op & ~LDAP_MOD_BVALUES; + dsgw_emitf( "%s %s:\n", modop == LDAP_MOD_REPLACE ? + "replace" : modop == LDAP_MOD_ADD ? + "add" : "delete", pmods[ i ]->mod_type ); + if ( pmods[ i ]->mod_bvalues != NULL ) { + for ( j = 0; pmods[ i ]->mod_bvalues[ j ] != NULL; ++j ) { + bvp = pmods[ i ]->mod_bvalues[ j ]; + notascii = 0; + for ( k = 0; k < bvp->bv_len; ++k ) { + if ( !isascii( bvp->bv_val[ k ] )) { + notascii = 1; + break; + } + } + if ( notascii ) { + dsgw_emitf( XP_GetClientStr(DBT_TnotAsciiLdBytesN_), bvp->bv_len ); + } else { + dsgw_emitf( "\t\"%s\"\n", bvp->bv_val ); + } + } + } + } + } + + if ( verbose ) { + dsgw_emitf( "</PRE>\n" ); + fflush( stdout ); + } + + dsgw_emitf( "<FONT SIZE=+1>\n" ); + + /* + * apply the changes using LDAP + */ + if ( pmods == NULL ) { + if ( add ) { + dsgw_emits( XP_GetClientStr(DBT_noValuesWereEnteredPleaseTryAgai_) ); + lderr = LDAP_PARAM_ERROR; + } else { /* no changes -- just report success */ + lderr = LDAP_SUCCESS; + if ( !quiet ) { + dsgw_emitf( XP_GetClientStr(DBT_PSuccessfullyEditedEntryYourChan_) ); + } + } + } else { + if ( !quiet ) { + dsgw_emitf( XP_GetClientStr(DBT_PSendingSToTheDirectoryServerN_), + add ? XP_GetClientStr(DBT_information_) : XP_GetClientStr(DBT_changes_)); + fflush( stdout ); + } + + if ( add ) { + lderr = ldap_add_ext( ld, dn, pmods, NULL, NULL, &msgid ); + } else { + lderr = ldap_modify_ext( ld, dn, pmods, NULL, NULL, &msgid ); + } + + if( lderr == LDAP_SUCCESS ) { + if(( lderr = ldap_result( ld, msgid, 1, (struct timeval *)NULL, &res )) == -1 ) { + lderr = ldap_get_lderrno( ld, NULL, &errmsg ); + modify_error( lderr, errmsg ); + } else { + lderr = ldap_result2error( ld, res, 1 ); + if ( lderr == LDAP_SUCCESS ) { + if ( !quiet ) { + if ( add ) { + dsgw_emitf( XP_GetClientStr(DBT_PSuccessfullyAddedEntryN_) ); + } else { + dsgw_emitf( XP_GetClientStr(DBT_PSuccessfullyEditedEntryYourChan_) ); + } + } + } else { + (void)ldap_get_lderrno( ld, NULL, &errmsg ); + modify_error( lderr, errmsg ); + + /* Do some checks for password policy infractions. */ + if( lderr == LDAP_CONSTRAINT_VIOLATION ) { + if( errmsg && strstr( errmsg, "invalid password syntax" ) ) + dsgw_emitf( "<BR>(%s)", XP_GetClientStr(DBT_InvalidPasswordSyntax_) ); + else if( errmsg && strstr( errmsg, "password in history" ) ) + dsgw_emitf( "<BR>(%s)", XP_GetClientStr(DBT_PasswordInHistory_) ); + } + } + } + } else { + (void)ldap_get_lderrno( ld, NULL, &errmsg ); + modify_error( lderr, errmsg ); + } + + ldap_mods_free( pmods, 1 ); + } + + dsgw_emitf( "</FONT>\n" ); + return( lderr ); +} + + +static int +entry_delete( LDAP *ld, char *dn ) +{ + int lderr; + char *errmsg = NULL; + + dsgw_emitf( "<FONT SIZE=+1>\n" ); + if (( lderr = ldap_delete_s( ld, dn )) == LDAP_SUCCESS ) { + if ( !quiet ) { + dsgw_emitf( XP_GetClientStr(DBT_PSuccessfullyDeletedEntryN_) ); + } + } else { + (void)ldap_get_lderrno( ld, NULL, &errmsg ); + modify_error( lderr, errmsg ); + } + + dsgw_emitf( "</FONT>\n" ); + return( lderr ); +} + + +static int +entry_modrdn( LDAP *ld, char *dn, char *newrdn, int deleteoldrdn ) +{ + int lderr; + char *errmsg = NULL; + + if ( verbose ) { + dsgw_emitf( XP_GetClientStr(DBT_PreTheNewNameForTheEntryIsSNPreH_), + newrdn ); + } + + dsgw_emitf( "<FONT SIZE=+1>\n" ); + if (( lderr = ldap_modrdn2_s( ld, dn, newrdn, deleteoldrdn )) + == LDAP_SUCCESS ) { + if ( !quiet ) { + dsgw_emitf( XP_GetClientStr(DBT_PSuccessfullyRenamedEntryN_) ); + } + } else { + (void)ldap_get_lderrno( ld, NULL, &errmsg ); + modify_error( lderr, errmsg ); + } + + dsgw_emitf( "</FONT>\n" ); + return( lderr ); +} + + +static int +gather_passwd_changes( char *dn, LDAPMod ***pmodsp, int adding_entry, + int *pwdchangedp ) +{ + int lderr, lockpasswd; + char *bindpasswd, *newpasswd, *newpasswdconfirm, *errstring; + + lockpasswd = dsgw_get_boolean_var( "lockpasswd", 0, 0 ); + if ( lockpasswd ) { + /* + * the userPassword attribute to a special value that no password + * submitted by a user can ever match. + */ + time_t curtime; + struct tm *gmtp; + char *tstr; + + /* get string representation of current GMT time */ + curtime = time( NULL ); + gmtp = gmtime( &curtime ); + tstr = asctime( gmtp ); + + /* remove trailing newline */ + tstr[ strlen( tstr ) - 1 ] = '\0'; + + /* allocate room for "{crypt}LOCKED [" + tstr + " GMT]" + zero byte */ + newpasswd = dsgw_ch_malloc( 15 + strlen( tstr ) + 5 + 1 ); + sprintf( newpasswd, XP_GetClientStr(DBT_CryptLockedSGmt_), tstr ); + + } else if (( newpasswd = dsgw_get_cgi_var( "newpasswd", + DSGW_CGIVAR_OPTIONAL )) == NULL ) { + return( LDAP_SUCCESS ); /* not setting password -- nothing to do */ + } + + lderr = LDAP_PARAM_ERROR; /* pessimistic */ + + if ( !adding_entry && ( bindpasswd = dsgw_get_cgi_var( "passwd", + DSGW_CGIVAR_OPTIONAL )) == NULL && require_oldpasswd( dn )) { + errstring = XP_GetClientStr(DBT_youMustProvideTheOldPassword_); + } else if ( !lockpasswd && + (( newpasswdconfirm = dsgw_get_cgi_var( "newpasswdconfirm", + DSGW_CGIVAR_OPTIONAL )) == NULL || strcmp( newpasswd, + newpasswdconfirm ) != 0 )) { + errstring = XP_GetClientStr(DBT_theNewAndConfirmingPasswordsDoNo_); + } else { + addmodifyop( pmodsp, adding_entry ? LDAP_MOD_ADD : LDAP_MOD_REPLACE, + DSGW_ATTRTYPE_USERPASSWORD, newpasswd, strlen( newpasswd )); + *pwdchangedp = 1; + lderr = LDAP_SUCCESS; + } + + if ( lderr != LDAP_SUCCESS ) { + dsgw_emitf( "<FONT SIZE=+1>\n%s\n</FONT>\n", errstring ); + } + + return( lderr ); +} + + +static void +modify_error( int lderr, char *lderrtxt ) +{ + dsgw_error( DSGW_ERR_LDAPGENERAL, dsgw_ldaperr2string( lderr ), + ( display_results_inline ? DSGW_ERROPT_INLINE : 0 ), + lderr, lderrtxt ); +} + + +/* + * this "addmodifyop" routine is lifted with minor changes from + * ldap/tools/ldapmodify.c + */ +static void +addmodifyop( LDAPMod ***pmodsp, int modop, char *attr, char *value, int vlen ) +{ + LDAPMod **pmods; + int i, j; + struct berval *bvp; + + if ( attr == NULL || *attr == '\0' ) { + return; + } + + pmods = *pmodsp; + modop |= LDAP_MOD_BVALUES; + + i = 0; + if ( pmods != NULL ) { + for ( ; pmods[ i ] != NULL && pmods[ i ]->mod_type != NULL; ++i ) { + if ( strcasecmp( pmods[ i ]->mod_type, attr ) == 0 && + pmods[ i ]->mod_op == modop ) { + break; + } + } + } + + if ( pmods == NULL || pmods[ i ] == NULL ) { + pmods = (LDAPMod **)dsgw_ch_realloc( pmods, (i + 2) * + sizeof( LDAPMod * )); + *pmodsp = pmods; + pmods[ i + 1 ] = NULL; + pmods[ i ] = (LDAPMod *)dsgw_ch_malloc( sizeof( LDAPMod )); + memset( pmods[ i ], 0, sizeof( LDAPMod )); + pmods[ i ]->mod_op = modop; + pmods[ i ]->mod_type = dsgw_ch_strdup( attr ); + } + + if ( value != NULL ) { + j = 0; + if ( pmods[ i ]->mod_bvalues != NULL ) { + for ( ; pmods[ i ]->mod_bvalues[ j ] != NULL; ++j ) { + ; + } + } + pmods[ i ]->mod_bvalues = + (struct berval **)dsgw_ch_realloc( pmods[ i ]->mod_bvalues, + (j + 2) * sizeof( struct berval * )); + pmods[ i ]->mod_bvalues[ j + 1 ] = NULL; + bvp = (struct berval *)dsgw_ch_malloc( sizeof( struct berval )); + pmods[ i ]->mod_bvalues[ j ] = bvp; + + bvp->bv_len = vlen; + bvp->bv_val = (char *)dsgw_ch_malloc( vlen + 1 ); + memcpy( bvp->bv_val, value, vlen ); + bvp->bv_val[ vlen ] = '\0'; + } +} + + +/* remove all modify ops that refer to "attr" */ +static void +remove_modifyops( LDAPMod **pmods, char *attr ) +{ + int i, found_attr; + + if ( pmods == NULL ) { + return; + } + + do { + found_attr = 0; + for ( i = 0 ; pmods[ i ] != NULL; ++i ) { + if ( strcasecmp( pmods[ i ]->mod_type, attr ) == 0 ) { + found_attr = 1; + break; + } + } + + if ( found_attr ) { + if ( pmods[ i ]->mod_bvalues != NULL ) { + ber_bvecfree( pmods[ i ]->mod_bvalues ); + } + free( pmods[ i ] ); + + for ( ; pmods[ i + 1 ] != NULL; ++i ) { + pmods[ i ] = pmods[ i + 1 ]; + } + pmods[ i ] = NULL; + } + + } while ( found_attr ); +} + + +static int +starts_with( char *s, char *startswith ) +{ + int len; + + len = strlen( startswith ); + return ( strlen( s ) > len && strncmp( s, startswith, len ) == 0 ); +} + + +/* + * there is one value in "postedval" but newlines must be changed to "$", + * '$' characters must be changed to \24, and '\' chars. changed to \5C + */ +static char ** +post2multilinevals( char *postedval ) +{ + int specials; + char *p, *r, **vals; + + vals = dsgw_ch_malloc( 2 * sizeof( char * )); + vals[ 1 ] = NULL; + + specials = 0; + for ( p = postedval; *p != '\0'; ++p ) { + if ( *p == '$' || *p == '\\' || *p == '\n' || *p == '\r') { + ++specials; + } + } + + /* allocate enough room to handle any necessary escaping */ + r = vals[ 0 ] = dsgw_ch_malloc( 2 * specials + strlen( postedval ) + 1 ); + + /* copy and escape as appropriate */ + for ( p = postedval; *p != '\0'; ++p ) { + if ( *p == '\n' || *p == '\r' ) { /* change to "$" */ + *r++ = '$'; + if ( *(p+1) != '\0' && *(p+1) != *p && + ( *(p+1) == '\n' || *(p+1) == '\r' )) { + ++p; /* skip next char. if sequence is "\r\n" or "\n\r" */ + } + } else if ( *p == '$' ) { /* change to "\24" */ + *r++ = '\\'; + *r++ = '2'; + *r++ = '4'; + } else { + *r++ = *p; + if ( *p == '\\' ) { /* change to "\5C" */ + *r++ = '5'; + *r++ = 'C'; + } + } + } + + *r = '\0'; + + return( vals ); +} + + +/* values are delimited by newlines, preceded by optional carriage returns */ +static char ** +post2vals( char *postedval ) +{ + int count, len; + char *p, *q, **vals; + + vals = NULL; + + count = 0; + for ( p = postedval; p != NULL && *p != '\0'; p = q ) { + /* skip any leading CRs or NLs */ + while (( *p == '\n' || *p == '\r' ) && *p != '\0' ) { + ++p; + } + if ( *p == '\0' ) { + break; + } + + /* find end of this line */ + if (( q = strchr( p, '\n' )) != NULL ) { + *q++ = '\0'; + } + + /* remove CR, if any */ + len = strlen( p ) - 1; + if ( p[ len ] == '\r' ) { + p[ len ] = '\0'; + } + + /* add to values array */ + vals = dsgw_ch_realloc( vals, ( count + 2 ) * sizeof( char * )); + vals[ count++ ] = p; + } + vals[ count ] = NULL; + + return( vals ); +} + + +/* + * Determine if we should insist that the old password for the entry + * we are modifying (modifydn) be POSTed. The rule we use is simply + * this: if the binddn and modifydn are the same, require the old + * password. This allows directory admins. to reset passwords while + * preventing normal users from having their password changed if they + * just happen to walk away from their computer for a while when they + * are authenticated to the gateway. + */ +static int +require_oldpasswd( char *modifydn ) +{ + return( dsgw_bound_as_dn( modifydn, 1 )); +} + + +/* + * search directory to find out if an attribute value is unique. If the + * value doesn't already exist or if it exists only in the same entry we + * are changing, we return LDAP_SUCCESS. If it does exist, we return + * LDAP_TYPE_OR_VALUE_EXISTS. If some other error occurs, we return another + * LDAP error code. + */ +static int +value_is_unique( LDAP *ld, char *dn, char *attr, char *value ) +{ + int rc, count; + char *attrs[2], *buf, *tmpdn, *attrdesc, *errmsg = NULL; + LDAPMessage *res, *e; + + /* allocate room for "(attr=value)" filter */ + buf = dsgw_ch_malloc( strlen( attr ) + strlen( value ) + 4 ); + sprintf( buf, "(%s=%s)", attr, value ); + + attrs[ 0 ] = attr; + attrs[ 1 ] = NULL; + + rc = ldap_search_s( ld, gc->gc_ldapsearchbase, LDAP_SCOPE_SUBTREE, + buf, attrs, 1, &res ); + free( buf ); + + if ( rc != LDAP_SUCCESS || res == NULL ) { + (void)ldap_get_lderrno( ld, NULL, &errmsg ); + modify_error( rc, errmsg ); + return( rc ); + } + + if (( count = ldap_count_entries( ld, res )) == 0 ) { + rc = LDAP_SUCCESS; + } else if ( count > 1 ) { + rc = LDAP_TYPE_OR_VALUE_EXISTS; + } else { /* found one entry: see if it is the entry we are modifying */ + if (( e = ldap_first_entry( ld, res )) == NULL || + ( tmpdn = ldap_get_dn( ld, e )) == NULL ) { + rc = ldap_get_lderrno( ld, NULL, NULL ); + } else if ( dsgw_dn_cmp( dn, tmpdn ) != 0 ) { + rc = LDAP_SUCCESS; /* same entry */ + } else { + rc = LDAP_TYPE_OR_VALUE_EXISTS; + } + } + + ldap_msgfree( res ); + + if ( rc == LDAP_TYPE_OR_VALUE_EXISTS ) { + buf = dsgw_ch_malloc( strlen( attr ) + 6 ); /* room for "desc_" */ + sprintf( buf, "desc_%s", attr ); + if (( attrdesc = dsgw_get_cgi_var( buf, DSGW_CGIVAR_OPTIONAL )) + == NULL ) { + attrdesc = attr; + } + free( buf ); + + dsgw_emits( "\n<FONT SIZE=+1>\n" ); + dsgw_emitf( XP_GetClientStr(DBT_BrTheSBSBIsAlreadyInUsePleaseCho_), attrdesc, value ); + dsgw_emits( "\n</FONT>\n" ); + } + + return( rc ); +} + + +/* + * Check that the domain:userid is unique in the directory. + */ +static LDAPDomainIdStatus +dsgw_checkdomain_uniqueness( LDAP *ld, char *attr, char *val, int len) +{ + int rc, count; + LDAPMessage *msgp = NULL; + char filter[256]; + + if( val == NULL ) + return LDAPDomainIdStatus_NullId; + + if( strcasecmp( attr, DSGW_ATTRTYPE_NTUSERDOMAINID ) == 0 ) { + PR_snprintf( filter, 256, "%s=%s", DSGW_ATTRTYPE_NTUSERDOMAINID, val ); + } else if ( strcasecmp( attr, DSGW_ATTRTYPE_NTGROUPDOMAINID ) == 0 ) { + PR_snprintf( filter, 256, "%s=%s", DSGW_ATTRTYPE_NTGROUPDOMAINID, val ); + } else { + return LDAPDomainIdStatus_NullAttr; + } + + if (( rc = ldap_search_s( ld, gc->gc_ldapsearchbase, LDAP_SCOPE_SUBTREE, + filter, NULL, 0, &msgp )) == LDAP_SUCCESS) { + count = (msgp == NULL) ? 0 : ldap_count_entries( ld, msgp ); + if ( count > 0 ) { + return LDAPDomainIdStatus_Nonunique; + } else { + return LDAPDomainIdStatus_Unique; + } + } else { + return LDAPDomainIdStatus_Nonunique; + } +} + + +/* + * Add the current value of uid in the entry to the ntdomain id before + * further processing of the domain id. + */ +static char * +dsgw_processdomainid( LDAP *ld, char *dn, char *attr, char *val, int len) +{ + int rc, count; + LDAPMessage *msgp = NULL; + LDAPMessage *entry; + char **attrlist, *attrs[ 2 ]; + char *value, *newval; + char *pch, **vals; + + if( strcasecmp( attr, DSGW_ATTRTYPE_NTUSERDOMAINID ) != 0 && + strcasecmp( attr, DSGW_ATTRTYPE_NTGROUPDOMAINID ) != 0 ) + return( NULL ); + + attrs[ 0 ] = NULL; + attrs[ 1 ] = NULL; + attrlist = attrs; + + if(( rc = ldap_search_s( ld, dn, LDAP_SCOPE_BASE, "(objectclass=*)", attrlist, + 0, &msgp )) != LDAP_SUCCESS && rc != LDAP_NO_SUCH_OBJECT) + { + return( NULL ); + } + + count = (msgp == NULL) ? 0 : ldap_count_entries( ld, msgp ); + + if( count > 0 ) + { + entry = ldap_first_entry( ld, msgp ); + if( entry ) + { + + if(( vals = ldap_get_values( ld, entry, + strcasecmp( attr, DSGW_ATTRTYPE_NTUSERDOMAINID )? + DSGW_ATTRTYPE_NTGROUPDOMAINID : + DSGW_ATTRTYPE_NTUSERDOMAINID )) != NULL) + { + if( vals[0] != NULL ) + { + value = dsgw_ch_strdup( vals[0] ); + newval = dsgw_ch_malloc( len + strlen( value ) +1 ); + strcpy( newval, val ); + pch = strchr( value, DSGW_NTDOMAINID_SEP ); + if( pch ) + { + strcat( newval, pch ); + return( newval ); + } + } + } + } + } + return NULL; +} + + + + + + + + + + + + + + + + + |