ctdb-common: Fix memory leak in run_proc
[samba.git] / lib / ldb-samba / ldb_matching_rules.c
blob0754e7e066be3df2ca98613a992ccca061320154
1 /*
2 Unix SMB/CIFS implementation.
4 ldb database library - Extended match rules
6 Copyright (C) 2014 Samuel Cabrero <samuelcabrero@kernevil.me>
7 Copyright (C) Andrew Bartlett <abartlet@samba.org>
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
23 #include "includes.h"
24 #include <ldb_module.h>
25 #include "dsdb/samdb/samdb.h"
26 #include "ldb_matching_rules.h"
27 #include "libcli/security/security.h"
28 #include "dsdb/common/util.h"
29 #include "librpc/gen_ndr/ndr_dnsp.h"
31 static int ldb_eval_transitive_filter_helper(TALLOC_CTX *mem_ctx,
32 struct ldb_context *ldb,
33 const char *attr,
34 const struct dsdb_dn *dn_to_match,
35 const char *dn_oid,
36 struct dsdb_dn *to_visit,
37 struct dsdb_dn ***visited,
38 unsigned int *visited_count,
39 bool *matched)
41 TALLOC_CTX *tmp_ctx;
42 int ret, i, j;
43 struct ldb_result *res;
44 struct ldb_message *msg;
45 struct ldb_message_element *el;
46 const char *attrs[] = { attr, NULL };
48 tmp_ctx = talloc_new(mem_ctx);
49 if (tmp_ctx == NULL) {
50 return LDB_ERR_OPERATIONS_ERROR;
54 * Fetch the entry to_visit
56 * NOTE: This is a new LDB search from the TOP of the module
57 * stack. This means that this search runs the whole stack
58 * from top to bottom.
60 * This may seem to be in-efficient, but it is also the only
61 * way to ensure that the ACLs for this search are applied
62 * correctly.
64 * Note also that we don't have the original request
65 * here, so we can not apply controls or timeouts here.
67 ret = dsdb_search_dn(ldb, tmp_ctx, &res, to_visit->dn, attrs, 0);
68 if (ret != LDB_SUCCESS) {
69 talloc_free(tmp_ctx);
70 return ret;
72 if (res->count != 1) {
73 talloc_free(tmp_ctx);
74 return LDB_ERR_OPERATIONS_ERROR;
76 msg = res->msgs[0];
78 /* Fetch the attribute to match from the entry being visited */
79 el = ldb_msg_find_element(msg, attr);
80 if (el == NULL) {
81 /* This entry does not have the attribute to match */
82 talloc_free(tmp_ctx);
83 *matched = false;
84 return LDB_SUCCESS;
88 * If the value to match is present in the attribute values of the
89 * current entry being visited, set matched to true and return OK
91 for (i=0; i<el->num_values; i++) {
92 struct dsdb_dn *dn;
93 dn = dsdb_dn_parse(tmp_ctx, ldb, &el->values[i], dn_oid);
94 if (dn == NULL) {
95 talloc_free(tmp_ctx);
96 *matched = false;
97 return LDB_ERR_INVALID_DN_SYNTAX;
100 if (ldb_dn_compare(dn_to_match->dn, dn->dn) == 0) {
101 talloc_free(tmp_ctx);
102 *matched = true;
103 return LDB_SUCCESS;
108 * If arrived here, the value to match is not in the values of the
109 * entry being visited. Add the entry being visited (to_visit)
110 * to the visited array. The array is (re)allocated in the parent
111 * memory context.
113 if (visited == NULL) {
114 return LDB_ERR_OPERATIONS_ERROR;
115 } else if (*visited == NULL) {
116 *visited = talloc_array(mem_ctx, struct dsdb_dn *, 1);
117 if (*visited == NULL) {
118 talloc_free(tmp_ctx);
119 return LDB_ERR_OPERATIONS_ERROR;
121 (*visited)[0] = to_visit;
122 (*visited_count) = 1;
123 } else {
124 *visited = talloc_realloc(mem_ctx, *visited, struct dsdb_dn *,
125 (*visited_count) + 1);
126 if (*visited == NULL) {
127 talloc_free(tmp_ctx);
128 return LDB_ERR_OPERATIONS_ERROR;
130 (*visited)[(*visited_count)] = to_visit;
131 (*visited_count)++;
135 * steal to_visit into visited array context, as it has to live until
136 * the array is freed.
138 talloc_steal(*visited, to_visit);
141 * Iterate over the values of the attribute of the entry being
142 * visited (to_visit) and follow them, calling this function
143 * recursively.
144 * If the value is in the visited array, skip it.
145 * Otherwise, follow the link and visit it.
147 for (i=0; i<el->num_values; i++) {
148 struct dsdb_dn *next_to_visit;
149 bool skip = false;
151 next_to_visit = dsdb_dn_parse(tmp_ctx, ldb, &el->values[i], dn_oid);
152 if (next_to_visit == NULL) {
153 talloc_free(tmp_ctx);
154 *matched = false;
155 return LDB_ERR_INVALID_DN_SYNTAX;
159 * If the value is already in the visited array, skip it.
160 * Note the last element of the array is ignored because it is
161 * the current entry DN.
163 for (j=0; j < (*visited_count) - 1; j++) {
164 struct dsdb_dn *visited_dn = (*visited)[j];
165 if (ldb_dn_compare(visited_dn->dn,
166 next_to_visit->dn) == 0) {
167 skip = true;
168 break;
171 if (skip) {
172 talloc_free(next_to_visit);
173 continue;
176 /* If the value is not in the visited array, evaluate it */
177 ret = ldb_eval_transitive_filter_helper(tmp_ctx, ldb, attr,
178 dn_to_match, dn_oid,
179 next_to_visit,
180 visited, visited_count,
181 matched);
182 if (ret != LDB_SUCCESS) {
183 talloc_free(tmp_ctx);
184 return ret;
186 if (*matched) {
187 talloc_free(tmp_ctx);
188 return LDB_SUCCESS;
192 talloc_free(tmp_ctx);
193 *matched = false;
194 return LDB_SUCCESS;
198 * This function parses the linked attribute value to match, whose syntax
199 * will be one of the different DN syntaxes, into a ldb_dn struct.
201 static int ldb_eval_transitive_filter(TALLOC_CTX *mem_ctx,
202 struct ldb_context *ldb,
203 const char *attr,
204 const struct ldb_val *value_to_match,
205 struct dsdb_dn *current_object_dn,
206 bool *matched)
208 const struct dsdb_schema *schema;
209 const struct dsdb_attribute *schema_attr;
210 struct dsdb_dn *dn_to_match;
211 const char *dn_oid;
212 unsigned int count;
213 struct dsdb_dn **visited = NULL;
215 schema = dsdb_get_schema(ldb, mem_ctx);
216 if (schema == NULL) {
217 return LDB_ERR_OPERATIONS_ERROR;
220 schema_attr = dsdb_attribute_by_lDAPDisplayName(schema, attr);
221 if (schema_attr == NULL) {
222 return LDB_ERR_NO_SUCH_ATTRIBUTE;
225 /* This is the DN syntax of the attribute being matched */
226 dn_oid = schema_attr->syntax->ldap_oid;
229 * Build a ldb_dn struct holding the value to match, which is the
230 * value entered in the search filter
232 dn_to_match = dsdb_dn_parse(mem_ctx, ldb, value_to_match, dn_oid);
233 if (dn_to_match == NULL) {
234 *matched = false;
235 return LDB_SUCCESS;
238 return ldb_eval_transitive_filter_helper(mem_ctx, ldb, attr,
239 dn_to_match, dn_oid,
240 current_object_dn,
241 &visited, &count, matched);
245 * This rule provides recursive search of a link attribute
247 * Documented in [MS-ADTS] section 3.1.1.3.4.4.3 LDAP_MATCHING_RULE_TRANSITIVE_EVAL
248 * This allows a search filter such as:
250 * member:1.2.840.113556.1.4.1941:=cn=user,cn=users,dc=samba,dc=example,dc=com
252 * This searches not only the member attribute, but also any member
253 * attributes that point at an object with this member in them. All the
254 * various DN syntax types are supported, not just plain DNs.
257 static int ldb_comparator_trans(struct ldb_context *ldb,
258 const char *oid,
259 const struct ldb_message *msg,
260 const char *attribute_to_match,
261 const struct ldb_val *value_to_match,
262 bool *matched)
264 const struct dsdb_schema *schema;
265 const struct dsdb_attribute *schema_attr;
266 struct ldb_dn *msg_dn;
267 struct dsdb_dn *dsdb_msg_dn;
268 TALLOC_CTX *tmp_ctx;
269 int ret;
271 tmp_ctx = talloc_new(ldb);
272 if (tmp_ctx == NULL) {
273 return LDB_ERR_OPERATIONS_ERROR;
277 * If the target attribute to match is not a linked attribute, then
278 * the filter evaluates to undefined
280 schema = dsdb_get_schema(ldb, tmp_ctx);
281 if (schema == NULL) {
282 talloc_free(tmp_ctx);
283 return LDB_ERR_OPERATIONS_ERROR;
286 schema_attr = dsdb_attribute_by_lDAPDisplayName(schema, attribute_to_match);
287 if (schema_attr == NULL) {
288 talloc_free(tmp_ctx);
289 return LDB_ERR_NO_SUCH_ATTRIBUTE;
293 * This extended match filter is only valid for linked attributes,
294 * following the MS definition (the schema attribute has a linkID
295 * defined). See dochelp request 114111212024789 on cifs-protocols
296 * mailing list.
298 if (schema_attr->linkID == 0) {
299 *matched = false;
300 talloc_free(tmp_ctx);
301 return LDB_SUCCESS;
304 /* Duplicate original msg dn as the msg must not be modified */
305 msg_dn = ldb_dn_copy(tmp_ctx, msg->dn);
306 if (msg_dn == NULL) {
307 talloc_free(tmp_ctx);
308 return LDB_ERR_OPERATIONS_ERROR;
312 * Build a dsdb dn from the message copied DN, which should be a plain
313 * DN syntax.
315 dsdb_msg_dn = dsdb_dn_construct(tmp_ctx, msg_dn, data_blob_null,
316 LDB_SYNTAX_DN);
317 if (dsdb_msg_dn == NULL) {
318 *matched = false;
319 return LDB_ERR_INVALID_DN_SYNTAX;
322 ret = ldb_eval_transitive_filter(tmp_ctx, ldb,
323 attribute_to_match,
324 value_to_match,
325 dsdb_msg_dn, matched);
326 talloc_free(tmp_ctx);
327 return ret;
332 * This rule provides match of a dns object with expired records.
334 * This allows a search filter such as:
336 * dnsRecord:1.3.6.1.4.1.7165.4.5.3:=131139216000000000
338 * This allows the caller to find records that should become a DNS
339 * tomestone, despite that information being deep within an NDR packed
340 * object
342 static int dsdb_match_for_dns_to_tombstone_time(struct ldb_context *ldb,
343 const char *oid,
344 const struct ldb_message *msg,
345 const char *attribute_to_match,
346 const struct ldb_val *value_to_match,
347 bool *matched)
349 TALLOC_CTX *tmp_ctx;
350 unsigned int i;
351 struct ldb_message_element *el = NULL;
352 struct auth_session_info *session_info = NULL;
353 uint64_t tombstone_time;
354 struct dnsp_DnssrvRpcRecord *rec = NULL;
355 enum ndr_err_code err;
356 *matched = false;
358 /* Needs to be dnsRecord, no match otherwise */
359 if (ldb_attr_cmp(attribute_to_match, "dnsRecord") != 0) {
360 return LDB_SUCCESS;
363 el = ldb_msg_find_element(msg, attribute_to_match);
364 if (el == NULL) {
365 return LDB_SUCCESS;
368 session_info = talloc_get_type(ldb_get_opaque(ldb, "sessionInfo"),
369 struct auth_session_info);
370 if (session_info == NULL) {
371 return ldb_oom(ldb);
373 if (security_session_user_level(session_info, NULL)
374 != SECURITY_SYSTEM) {
376 DBG_ERR("unauthorised access\n");
377 return LDB_ERR_INSUFFICIENT_ACCESS_RIGHTS;
380 /* Just check we don't allow the caller to fill our stack */
381 if (value_to_match->length >= 64) {
382 DBG_ERR("Invalid timestamp passed\n");
383 return LDB_ERR_INVALID_ATTRIBUTE_SYNTAX;
384 } else {
385 char *p = NULL;
386 int error = 0;
387 char s[value_to_match->length+1];
389 memcpy(s, value_to_match->data, value_to_match->length);
390 s[value_to_match->length] = 0;
391 if (s[0] == '\0' || s[0] == '-') {
392 DBG_ERR("Empty timestamp passed\n");
393 return LDB_ERR_INVALID_ATTRIBUTE_SYNTAX;
395 tombstone_time = strtoull_err(s, &p, 10, &error);
396 if (error != 0 || *p != '\0') {
397 DBG_ERR("Invalid timestamp string passed\n");
398 return LDB_ERR_INVALID_ATTRIBUTE_SYNTAX;
402 tmp_ctx = talloc_new(ldb);
403 if (tmp_ctx == NULL) {
404 return ldb_oom(ldb);
407 for (i = 0; i < el->num_values; i++) {
408 rec = talloc_zero(tmp_ctx, struct dnsp_DnssrvRpcRecord);
409 if (rec == NULL) {
410 TALLOC_FREE(tmp_ctx);
411 return ldb_oom(ldb);
413 err = ndr_pull_struct_blob(
414 &(el->values[i]),
415 tmp_ctx,
416 rec,
417 (ndr_pull_flags_fn_t)ndr_pull_dnsp_DnssrvRpcRecord);
418 if (!NDR_ERR_CODE_IS_SUCCESS(err)){
419 DBG_ERR("Failed to pull dns rec blob.\n");
420 TALLOC_FREE(tmp_ctx);
421 return LDB_ERR_OPERATIONS_ERROR;
424 if (rec->wType == DNS_TYPE_SOA || rec->wType == DNS_TYPE_NS) {
425 TALLOC_FREE(tmp_ctx);
426 continue;
429 if (rec->wType == DNS_TYPE_TOMBSTONE) {
430 TALLOC_FREE(tmp_ctx);
431 continue;
433 if (rec->dwTimeStamp == 0) {
434 TALLOC_FREE(tmp_ctx);
435 continue;
437 if (rec->dwTimeStamp > tombstone_time) {
438 TALLOC_FREE(tmp_ctx);
439 continue;
442 *matched = true;
443 break;
446 TALLOC_FREE(tmp_ctx);
447 return LDB_SUCCESS;
452 * This rule provides match of a link attribute against a 'should be expunged' criteria
454 * This allows a search filter such as:
456 * member:1.3.6.1.4.1.7165.4.5.2:=131139216000000000
458 * This searches the member attribute, but also any member attributes
459 * that are deleted and should be expunged after the specified NTTIME
460 * time.
463 static int dsdb_match_for_expunge(struct ldb_context *ldb,
464 const char *oid,
465 const struct ldb_message *msg,
466 const char *attribute_to_match,
467 const struct ldb_val *value_to_match,
468 bool *matched)
470 const struct dsdb_schema *schema;
471 const struct dsdb_attribute *schema_attr;
472 TALLOC_CTX *tmp_ctx;
473 unsigned int i;
474 struct ldb_message_element *el;
475 struct auth_session_info *session_info;
476 uint64_t tombstone_time;
477 *matched = false;
479 el = ldb_msg_find_element(msg, attribute_to_match);
480 if (el == NULL) {
481 return LDB_SUCCESS;
484 session_info
485 = talloc_get_type(ldb_get_opaque(ldb, DSDB_SESSION_INFO),
486 struct auth_session_info);
487 if (security_session_user_level(session_info, NULL) != SECURITY_SYSTEM) {
488 return LDB_ERR_INSUFFICIENT_ACCESS_RIGHTS;
492 * If the target attribute to match is not a linked attribute, then
493 * the filter evaluates to undefined
495 schema = dsdb_get_schema(ldb, NULL);
496 if (schema == NULL) {
497 return LDB_ERR_OPERATIONS_ERROR;
500 /* TODO this is O(log n) per attribute */
501 schema_attr = dsdb_attribute_by_lDAPDisplayName(schema, attribute_to_match);
502 if (schema_attr == NULL) {
503 return LDB_ERR_NO_SUCH_ATTRIBUTE;
507 * This extended match filter is only valid for forward linked attributes.
509 if (schema_attr->linkID == 0 || (schema_attr->linkID & 1) == 1) {
510 return LDB_ERR_NO_SUCH_ATTRIBUTE;
513 /* Just check we don't allow the caller to fill our stack */
514 if (value_to_match->length >=64) {
515 return LDB_ERR_INVALID_ATTRIBUTE_SYNTAX;
516 } else {
517 char *p = NULL;
518 int error = 0;
519 char s[value_to_match->length+1];
521 memcpy(s, value_to_match->data, value_to_match->length);
522 s[value_to_match->length] = 0;
523 if (s[0] == '\0' || s[0] == '-') {
524 return LDB_ERR_INVALID_ATTRIBUTE_SYNTAX;
526 tombstone_time = strtoull_err(s, &p, 10, &error);
527 if (error != 0 || *p != '\0') {
528 return LDB_ERR_INVALID_ATTRIBUTE_SYNTAX;
532 tmp_ctx = talloc_new(ldb);
533 if (tmp_ctx == NULL) {
534 return LDB_ERR_OPERATIONS_ERROR;
537 for (i = 0; i < el->num_values; i++) {
538 NTSTATUS status;
539 struct dsdb_dn *dn;
540 uint64_t rmd_changetime;
541 if (dsdb_dn_is_deleted_val(&el->values[i]) == false) {
542 continue;
545 dn = dsdb_dn_parse(tmp_ctx, ldb, &el->values[i],
546 schema_attr->syntax->ldap_oid);
547 if (dn == NULL) {
548 DEBUG(1, ("Error: Failed to parse linked attribute blob of %s.\n", el->name));
549 continue;
552 status = dsdb_get_extended_dn_uint64(dn->dn, &rmd_changetime,
553 "RMD_CHANGETIME");
554 if (!NT_STATUS_IS_OK(status)) {
555 DEBUG(1, ("Error: RMD_CHANGETIME is missing on a forward link.\n"));
556 continue;
559 if (rmd_changetime > tombstone_time) {
560 continue;
563 *matched = true;
564 break;
566 talloc_free(tmp_ctx);
567 return LDB_SUCCESS;
571 int ldb_register_samba_matching_rules(struct ldb_context *ldb)
573 struct ldb_extended_match_rule *transitive_eval = NULL,
574 *match_for_expunge = NULL,
575 *match_for_dns_to_tombstone_time = NULL;
576 int ret;
578 transitive_eval = talloc_zero(ldb, struct ldb_extended_match_rule);
579 transitive_eval->oid = SAMBA_LDAP_MATCH_RULE_TRANSITIVE_EVAL;
580 transitive_eval->callback = ldb_comparator_trans;
581 ret = ldb_register_extended_match_rule(ldb, transitive_eval);
582 if (ret != LDB_SUCCESS) {
583 talloc_free(transitive_eval);
584 return ret;
587 match_for_expunge = talloc_zero(ldb, struct ldb_extended_match_rule);
588 match_for_expunge->oid = DSDB_MATCH_FOR_EXPUNGE;
589 match_for_expunge->callback = dsdb_match_for_expunge;
590 ret = ldb_register_extended_match_rule(ldb, match_for_expunge);
591 if (ret != LDB_SUCCESS) {
592 talloc_free(match_for_expunge);
593 return ret;
596 match_for_dns_to_tombstone_time = talloc_zero(
597 ldb,
598 struct ldb_extended_match_rule);
599 match_for_dns_to_tombstone_time->oid = DSDB_MATCH_FOR_DNS_TO_TOMBSTONE_TIME;
600 match_for_dns_to_tombstone_time->callback
601 = dsdb_match_for_dns_to_tombstone_time;
602 ret = ldb_register_extended_match_rule(ldb,
603 match_for_dns_to_tombstone_time);
604 if (ret != LDB_SUCCESS) {
605 TALLOC_FREE(match_for_dns_to_tombstone_time);
606 return ret;
609 return LDB_SUCCESS;