Skip to content
GitLab
Explore
Sign in
Register
Primary navigation
Search or go to…
Project
O
OpenLDAP
Manage
Activity
Members
Labels
Plan
Wiki
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Locked files
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Releases
Package registry
Container registry
Model registry
Operate
Environments
Terraform modules
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Code review analytics
Insights
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Christopher Ng
OpenLDAP
Commits
08e3b010
Commit
08e3b010
authored
25 years ago
by
Kurt Zeilenga
Browse files
Options
Downloads
Patches
Plain Diff
Move oc_check_allowed() next to oc_check_required() in preparation for
rewrite.
parent
10fdd7ff
Branches
Branches containing commit
Tags
Tags containing commit
No related merge requests found
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
servers/slapd/schema.c
+109
-108
109 additions, 108 deletions
servers/slapd/schema.c
with
109 additions
and
108 deletions
servers/slapd/schema.c
+
109
−
108
View file @
08e3b010
...
...
@@ -138,114 +138,6 @@ oc_check_required( Entry *e, char *ocname )
return
(
NULL
);
}
#ifdef SLAPD_SCHEMA_COMPAT
/* these shouldn't be hardcoded */
static
char
*
oc_op_usermod_attrs
[]
=
{
/*
* these are operational attributes which are
* not defined as NO-USER_MODIFICATION and
* which slapd supports modification of.
*
* Currently none.
* Likely candidate, "aci"
*/
NULL
};
static
char
*
oc_op_attrs
[]
=
{
/*
* these are operational attributes
* most could be user modifiable
*/
"objectClasses"
,
"attributeTypes"
,
"matchingRules"
,
"matchingRuleUse"
,
"dITStructureRules"
,
"dITContentRules"
,
"nameForms"
,
"ldapSyntaxes"
,
"namingContexts"
,
"supportedExtension"
,
"supportedControl"
,
"supportedSASLMechanisms"
,
"supportedLDAPversion"
,
"supportedACIMechanisms"
,
"subschemaSubentry"
,
/* NO USER MOD */
NULL
};
/* this list should be extensible */
static
char
*
oc_op_no_usermod_attrs
[]
=
{
/*
* Operational and 'no user modification' attributes
* which are STORED in the directory server.
*/
/* RFC2252, 3.2.1 */
"creatorsName"
,
"createTimestamp"
,
"modifiersName"
,
"modifyTimestamp"
,
NULL
};
#endif
/*
* check to see if attribute is 'operational' or not.
*/
int
oc_check_op_attr
(
const
char
*
type
)
{
#ifndef SLAPD_SCHEMA_NOT_COMPAT
return
charray_inlist
(
oc_op_attrs
,
type
)
||
charray_inlist
(
oc_op_usermod_attrs
,
type
)
||
charray_inlist
(
oc_op_no_usermod_attrs
,
type
);
#else
AttributeType
*
at
=
at_find
(
type
);
if
(
at
==
NULL
)
return
0
;
return
at
->
sat_usage
!=
LDAP_SCHEMA_USER_APPLICATIONS
;
#endif
}
/*
* check to see if attribute can be user modified or not.
*/
int
oc_check_op_usermod_attr
(
const
char
*
type
)
{
#ifdef SLAPD_SCHEMA_COMPAT
return
charray_inlist
(
oc_op_usermod_attrs
,
type
);
#else
/* not (yet) in schema */
return
0
;
#endif
}
/*
* check to see if attribute is 'no user modification' or not.
*/
int
oc_check_op_no_usermod_attr
(
const
char
*
type
)
{
#ifdef SLAPD_SCHEMA_COMPAT
return
charray_inlist
(
oc_op_no_usermod_attrs
,
type
);
#else
AttributeType
*
at
=
at_find
(
type
);
if
(
at
==
NULL
)
return
0
;
return
at
->
sat_no_user_mod
;
#endif
}
static
int
oc_check_allowed
(
char
*
type
,
struct
berval
**
ocl
)
{
...
...
@@ -359,6 +251,115 @@ oc_check_allowed( char *type, struct berval **ocl )
return
(
1
);
}
#ifdef SLAPD_SCHEMA_COMPAT
/* these shouldn't be hardcoded */
static
char
*
oc_op_usermod_attrs
[]
=
{
/*
* these are operational attributes which are
* not defined as NO-USER_MODIFICATION and
* which slapd supports modification of.
*
* Currently none.
* Likely candidate, "aci"
*/
NULL
};
static
char
*
oc_op_attrs
[]
=
{
/*
* these are operational attributes
* most could be user modifiable
*/
"objectClasses"
,
"attributeTypes"
,
"matchingRules"
,
"matchingRuleUse"
,
"dITStructureRules"
,
"dITContentRules"
,
"nameForms"
,
"ldapSyntaxes"
,
"namingContexts"
,
"supportedExtension"
,
"supportedControl"
,
"supportedSASLMechanisms"
,
"supportedLDAPversion"
,
"supportedACIMechanisms"
,
"subschemaSubentry"
,
/* NO USER MOD */
NULL
};
/* this list should be extensible */
static
char
*
oc_op_no_usermod_attrs
[]
=
{
/*
* Operational and 'no user modification' attributes
* which are STORED in the directory server.
*/
/* RFC2252, 3.2.1 */
"creatorsName"
,
"createTimestamp"
,
"modifiersName"
,
"modifyTimestamp"
,
NULL
};
#endif
/*
* check to see if attribute is 'operational' or not.
*/
int
oc_check_op_attr
(
const
char
*
type
)
{
#ifndef SLAPD_SCHEMA_NOT_COMPAT
return
charray_inlist
(
oc_op_attrs
,
type
)
||
charray_inlist
(
oc_op_usermod_attrs
,
type
)
||
charray_inlist
(
oc_op_no_usermod_attrs
,
type
);
#else
AttributeType
*
at
=
at_find
(
type
);
if
(
at
==
NULL
)
return
0
;
return
at
->
sat_usage
!=
LDAP_SCHEMA_USER_APPLICATIONS
;
#endif
}
/*
* check to see if attribute can be user modified or not.
*/
int
oc_check_op_usermod_attr
(
const
char
*
type
)
{
#ifdef SLAPD_SCHEMA_COMPAT
return
charray_inlist
(
oc_op_usermod_attrs
,
type
);
#else
/* not (yet) in schema */
return
0
;
#endif
}
/*
* check to see if attribute is 'no user modification' or not.
*/
int
oc_check_op_no_usermod_attr
(
const
char
*
type
)
{
#ifdef SLAPD_SCHEMA_COMPAT
return
charray_inlist
(
oc_op_no_usermod_attrs
,
type
);
#else
AttributeType
*
at
=
at_find
(
type
);
if
(
at
==
NULL
)
return
0
;
return
at
->
sat_no_user_mod
;
#endif
}
struct
oindexrec
{
char
*
oir_name
;
ObjectClass
*
oir_oc
;
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment