package ldap
import (
"log"
"net"
"4a.si/asn1-ber"
)
func HandleAddRequest(req *ber.Packet, boundDN string, fns map[string]Adder, conn net.Conn) (resultCode LDAPResultCode) {
if len(req.Children) != 2 {
return LDAPResultProtocolError
}
var ok bool
addReq := AddRequest{}
addReq.dn, ok = req.Children[0].Value.(string)
if !ok {
return LDAPResultProtocolError
}
addReq.attributes = []Attribute{}
for _, attr := range req.Children[1].Children {
if len(attr.Children) != 2 {
return LDAPResultProtocolError
}
a := Attribute{}
a.attrType, ok = attr.Children[0].Value.(string)
if !ok {
return LDAPResultProtocolError
}
a.attrVals = []string{}
for _, val := range attr.Children[1].Children {
v, ok := val.Value.(string)
if !ok {
return LDAPResultProtocolError
}
a.attrVals = append(a.attrVals, v)
}
addReq.attributes = append(addReq.attributes, a)
}
fnNames := []string{}
for k := range fns {
fnNames = append(fnNames, k)
}
fn := routeFunc(boundDN, fnNames)
resultCode, err := fns[fn].Add(boundDN, addReq, conn)
if err != nil {
log.Printf("AddFn Error %s", err.Error())
return LDAPResultOperationsError
}
return resultCode
}
func HandleDeleteRequest(req *ber.Packet, boundDN string, fns map[string]Deleter, conn net.Conn) (resultCode LDAPResultCode) {
deleteDN := ber.DecodeString(req.Data.Bytes())
fnNames := []string{}
for k := range fns {
fnNames = append(fnNames, k)
}
fn := routeFunc(boundDN, fnNames)
resultCode, err := fns[fn].Delete(boundDN, deleteDN, conn)
if err != nil {
log.Printf("DeleteFn Error %s", err.Error())
return LDAPResultOperationsError
}
return resultCode
}
func HandleModifyRequest(req *ber.Packet, boundDN string, fns map[string]Modifier, conn net.Conn) (resultCode LDAPResultCode) {
if len(req.Children) != 2 {
return LDAPResultProtocolError
}
var ok bool
modReq := ModifyRequest{}
modReq.Dn, ok = req.Children[0].Value.(string)
if !ok {
return LDAPResultProtocolError
}
for _, change := range req.Children[1].Children {
if len(change.Children) != 2 {
return LDAPResultProtocolError
}
attr := PartialAttribute{}
attrs := change.Children[1].Children
if len(attrs) != 2 {
return LDAPResultProtocolError
}
attr.AttrType, ok = attrs[0].Value.(string)
if !ok {
return LDAPResultProtocolError
}
for _, val := range attrs[1].Children {
v, ok := val.Value.(string)
if !ok {
return LDAPResultProtocolError
}
attr.AttrVals = append(attr.AttrVals, v)
}
op, ok := change.Children[0].Value.(uint64)
if !ok {
return LDAPResultProtocolError
}
switch op {
default:
log.Printf("Unrecognized Modify attribute %d", op)
return LDAPResultProtocolError
case AddAttribute:
modReq.Add(attr.AttrType, attr.AttrVals)
case DeleteAttribute:
modReq.Delete(attr.AttrType, attr.AttrVals)
case ReplaceAttribute:
modReq.Replace(attr.AttrType, attr.AttrVals)
}
}
fnNames := []string{}
for k := range fns {
fnNames = append(fnNames, k)
}
fn := routeFunc(boundDN, fnNames)
resultCode, err := fns[fn].Modify(boundDN, modReq, conn)
if err != nil {
log.Printf("ModifyFn Error %s", err.Error())
return LDAPResultOperationsError
}
return resultCode
}
func HandleCompareRequest(req *ber.Packet, boundDN string, fns map[string]Comparer, conn net.Conn) (resultCode LDAPResultCode) {
if len(req.Children) != 2 {
return LDAPResultProtocolError
}
var ok bool
compReq := CompareRequest{}
compReq.dn, ok = req.Children[0].Value.(string)
if !ok {
return LDAPResultProtocolError
}
ava := req.Children[1]
if len(ava.Children) != 2 {
return LDAPResultProtocolError
}
attr, ok := ava.Children[0].Value.(string)
if !ok {
return LDAPResultProtocolError
}
val, ok := ava.Children[1].Value.(string)
if !ok {
return LDAPResultProtocolError
}
compReq.ava = []AttributeValueAssertion{AttributeValueAssertion{attr, val}}
fnNames := []string{}
for k := range fns {
fnNames = append(fnNames, k)
}
fn := routeFunc(boundDN, fnNames)
resultCode, err := fns[fn].Compare(boundDN, compReq, conn)
if err != nil {
log.Printf("CompareFn Error %s", err.Error())
return LDAPResultOperationsError
}
return resultCode
}
func HandleExtendedRequest(req *ber.Packet, boundDN string, fns map[string]Extender, conn net.Conn) (resultCode LDAPResultCode) {
if len(req.Children) != 1 && len(req.Children) != 2 {
return LDAPResultProtocolError
}
name := ber.DecodeString(req.Children[0].Data.Bytes())
var val string
if len(req.Children) == 2 {
val = ber.DecodeString(req.Children[1].Data.Bytes())
}
extReq := ExtendedRequest{name, val}
fnNames := []string{}
for k := range fns {
fnNames = append(fnNames, k)
}
fn := routeFunc(boundDN, fnNames)
resultCode, err := fns[fn].Extended(boundDN, extReq, conn)
if err != nil {
log.Printf("ExtendedFn Error %s", err.Error())
return LDAPResultOperationsError
}
return resultCode
}
func HandleAbandonRequest(req *ber.Packet, boundDN string, fns map[string]Abandoner, conn net.Conn) error {
fnNames := []string{}
for k := range fns {
fnNames = append(fnNames, k)
}
fn := routeFunc(boundDN, fnNames)
err := fns[fn].Abandon(boundDN, conn)
return err
}
func HandleModifyDNRequest(req *ber.Packet, boundDN string, fns map[string]ModifyDNr, conn net.Conn) (resultCode LDAPResultCode) {
if len(req.Children) != 3 && len(req.Children) != 4 {
return LDAPResultProtocolError
}
var ok bool
mdnReq := ModifyDNRequest{}
mdnReq.dn, ok = req.Children[0].Value.(string)
if !ok {
return LDAPResultProtocolError
}
mdnReq.newrdn, ok = req.Children[1].Value.(string)
if !ok {
return LDAPResultProtocolError
}
mdnReq.deleteoldrdn, ok = req.Children[2].Value.(bool)
if !ok {
return LDAPResultProtocolError
}
if len(req.Children) == 4 {
mdnReq.newSuperior, ok = req.Children[3].Value.(string)
if !ok {
return LDAPResultProtocolError
}
}
fnNames := []string{}
for k := range fns {
fnNames = append(fnNames, k)
}
fn := routeFunc(boundDN, fnNames)
resultCode, err := fns[fn].ModifyDN(boundDN, mdnReq, conn)
if err != nil {
log.Printf("ModifyDN Error %s", err.Error())
return LDAPResultOperationsError
}
return resultCode
}