summaryrefslogtreecommitdiffstats
path: root/server_modify.go
diff options
context:
space:
mode:
authorned <ned@appliedtrust.com>2014-11-23 20:03:05 +0100
committerned <ned@appliedtrust.com>2014-11-23 20:03:05 +0100
commitc43d537d5bb0eeb491153b00cdefcb54a6178187 (patch)
tree45187fde4a720d3f53d13ec45ac4fea8e27356e4 /server_modify.go
parentLDAP server support (diff)
downloadldap-c43d537d5bb0eeb491153b00cdefcb54a6178187.tar
ldap-c43d537d5bb0eeb491153b00cdefcb54a6178187.tar.gz
ldap-c43d537d5bb0eeb491153b00cdefcb54a6178187.tar.bz2
ldap-c43d537d5bb0eeb491153b00cdefcb54a6178187.tar.lz
ldap-c43d537d5bb0eeb491153b00cdefcb54a6178187.tar.xz
ldap-c43d537d5bb0eeb491153b00cdefcb54a6178187.tar.zst
ldap-c43d537d5bb0eeb491153b00cdefcb54a6178187.zip
Diffstat (limited to '')
-rw-r--r--server_modify.go231
1 files changed, 231 insertions, 0 deletions
diff --git a/server_modify.go b/server_modify.go
new file mode 100644
index 0000000..0dca219
--- /dev/null
+++ b/server_modify.go
@@ -0,0 +1,231 @@
+package ldap
+
+import (
+ "github.com/nmcclain/asn1-ber"
+ "log"
+ "net"
+)
+
+func HandleAddRequest(req *ber.Packet, boundDN string, fns map[string]Adder, conn net.Conn) (resultCode LDAPResultCode) {
+ if len(req.Children) != 2 {
+ return LDAPResultProtocolError
+ }
+ var ok bool
+ addReq := AddRequest{}
+ addReq.dn, ok = req.Children[0].Value.(string)
+ if !ok {
+ return LDAPResultProtocolError
+ }
+ addReq.attributes = []Attribute{}
+ for _, attr := range req.Children[1].Children {
+ if len(attr.Children) != 2 {
+ return LDAPResultProtocolError
+ }
+
+ a := Attribute{}
+ a.attrType, ok = attr.Children[0].Value.(string)
+ if !ok {
+ return LDAPResultProtocolError
+ }
+ a.attrVals = []string{}
+ for _, val := range attr.Children[1].Children {
+ v, ok := val.Value.(string)
+ if !ok {
+ return LDAPResultProtocolError
+ }
+ a.attrVals = append(a.attrVals, v)
+ }
+ addReq.attributes = append(addReq.attributes, a)
+ }
+ fnNames := []string{}
+ for k := range fns {
+ fnNames = append(fnNames, k)
+ }
+ fn := routeFunc(boundDN, fnNames)
+ resultCode, err := fns[fn].Add(boundDN, addReq, conn)
+ if err != nil {
+ log.Printf("AddFn Error %s", err.Error())
+ return LDAPResultOperationsError
+ }
+ return resultCode
+}
+
+func HandleDeleteRequest(req *ber.Packet, boundDN string, fns map[string]Deleter, conn net.Conn) (resultCode LDAPResultCode) {
+ deleteDN := ber.DecodeString(req.Data.Bytes())
+ fnNames := []string{}
+ for k := range fns {
+ fnNames = append(fnNames, k)
+ }
+ fn := routeFunc(boundDN, fnNames)
+ resultCode, err := fns[fn].Delete(boundDN, deleteDN, conn)
+ if err != nil {
+ log.Printf("DeleteFn Error %s", err.Error())
+ return LDAPResultOperationsError
+ }
+ return resultCode
+}
+
+func HandleModifyRequest(req *ber.Packet, boundDN string, fns map[string]Modifier, conn net.Conn) (resultCode LDAPResultCode) {
+ if len(req.Children) != 2 {
+ return LDAPResultProtocolError
+ }
+ var ok bool
+ modReq := ModifyRequest{}
+ modReq.dn, ok = req.Children[0].Value.(string)
+ if !ok {
+ return LDAPResultProtocolError
+ }
+ for _, change := range req.Children[1].Children {
+ if len(change.Children) != 2 {
+ return LDAPResultProtocolError
+ }
+ attr := PartialAttribute{}
+ attrs := change.Children[1].Children
+ if len(attrs) != 2 {
+ return LDAPResultProtocolError
+ }
+ attr.attrType, ok = attrs[0].Value.(string)
+ if !ok {
+ return LDAPResultProtocolError
+ }
+ for _, val := range attrs[1].Children {
+ v, ok := val.Value.(string)
+ if !ok {
+ return LDAPResultProtocolError
+ }
+ attr.attrVals = append(attr.attrVals, v)
+ }
+ op, ok := change.Children[0].Value.(uint64)
+ if !ok {
+ return LDAPResultProtocolError
+ }
+ switch op {
+ default:
+ log.Printf("Unrecognized Modify attribute %d", op)
+ return LDAPResultProtocolError
+ case AddAttribute:
+ modReq.Add(attr.attrType, attr.attrVals)
+ case DeleteAttribute:
+ modReq.Delete(attr.attrType, attr.attrVals)
+ case ReplaceAttribute:
+ modReq.Replace(attr.attrType, attr.attrVals)
+ }
+ }
+ fnNames := []string{}
+ for k := range fns {
+ fnNames = append(fnNames, k)
+ }
+ fn := routeFunc(boundDN, fnNames)
+ resultCode, err := fns[fn].Modify(boundDN, modReq, conn)
+ if err != nil {
+ log.Printf("ModifyFn Error %s", err.Error())
+ return LDAPResultOperationsError
+ }
+ return resultCode
+}
+
+func HandleCompareRequest(req *ber.Packet, boundDN string, fns map[string]Comparer, conn net.Conn) (resultCode LDAPResultCode) {
+ if len(req.Children) != 2 {
+ return LDAPResultProtocolError
+ }
+ var ok bool
+ compReq := CompareRequest{}
+ compReq.dn, ok = req.Children[0].Value.(string)
+ if !ok {
+ return LDAPResultProtocolError
+ }
+ ava := req.Children[1]
+ if len(ava.Children) != 2 {
+ return LDAPResultProtocolError
+ }
+ attr, ok := ava.Children[0].Value.(string)
+ if !ok {
+ return LDAPResultProtocolError
+ }
+ val, ok := ava.Children[1].Value.(string)
+ if !ok {
+ return LDAPResultProtocolError
+ }
+ compReq.ava = []AttributeValueAssertion{AttributeValueAssertion{attr, val}}
+ fnNames := []string{}
+ for k := range fns {
+ fnNames = append(fnNames, k)
+ }
+ fn := routeFunc(boundDN, fnNames)
+ resultCode, err := fns[fn].Compare(boundDN, compReq, conn)
+ if err != nil {
+ log.Printf("CompareFn Error %s", err.Error())
+ return LDAPResultOperationsError
+ }
+ return resultCode
+}
+
+func HandleExtendedRequest(req *ber.Packet, boundDN string, fns map[string]Extender, conn net.Conn) (resultCode LDAPResultCode) {
+ if len(req.Children) != 1 && len(req.Children) != 2 {
+ return LDAPResultProtocolError
+ }
+ name := ber.DecodeString(req.Children[0].Data.Bytes())
+ var val string
+ if len(req.Children) == 2 {
+ val = ber.DecodeString(req.Children[1].Data.Bytes())
+ }
+ extReq := ExtendedRequest{name, val}
+ fnNames := []string{}
+ for k := range fns {
+ fnNames = append(fnNames, k)
+ }
+ fn := routeFunc(boundDN, fnNames)
+ resultCode, err := fns[fn].Extended(boundDN, extReq, conn)
+ if err != nil {
+ log.Printf("ExtendedFn Error %s", err.Error())
+ return LDAPResultOperationsError
+ }
+ return resultCode
+}
+
+func HandleAbandonRequest(req *ber.Packet, boundDN string, fns map[string]Abandoner, conn net.Conn) error {
+ fnNames := []string{}
+ for k := range fns {
+ fnNames = append(fnNames, k)
+ }
+ fn := routeFunc(boundDN, fnNames)
+ err := fns[fn].Abandon(boundDN, conn)
+ return err
+}
+
+func HandleModifyDNRequest(req *ber.Packet, boundDN string, fns map[string]ModifyDNr, conn net.Conn) (resultCode LDAPResultCode) {
+ if len(req.Children) != 3 && len(req.Children) != 4 {
+ return LDAPResultProtocolError
+ }
+ var ok bool
+ mdnReq := ModifyDNRequest{}
+ mdnReq.dn, ok = req.Children[0].Value.(string)
+ if !ok {
+ return LDAPResultProtocolError
+ }
+ mdnReq.newrdn, ok = req.Children[1].Value.(string)
+ if !ok {
+ return LDAPResultProtocolError
+ }
+ mdnReq.deleteoldrdn, ok = req.Children[2].Value.(bool)
+ if !ok {
+ return LDAPResultProtocolError
+ }
+ if len(req.Children) == 4 {
+ mdnReq.newSuperior, ok = req.Children[3].Value.(string)
+ if !ok {
+ return LDAPResultProtocolError
+ }
+ }
+ fnNames := []string{}
+ for k := range fns {
+ fnNames = append(fnNames, k)
+ }
+ fn := routeFunc(boundDN, fnNames)
+ resultCode, err := fns[fn].ModifyDN(boundDN, mdnReq, conn)
+ if err != nil {
+ log.Printf("ModifyDN Error %s", err.Error())
+ return LDAPResultOperationsError
+ }
+ return resultCode
+}