1 /* add.c - ldap ldbm back-end add routine */
4 * Copyright 1998-2003 The OpenLDAP Foundation, All Rights Reserved.
5 * COPYING RESTRICTIONS APPLY, see COPYRIGHT file
12 #include <ac/socket.h>
13 #include <ac/string.h>
16 #include "back-ldbm.h"
17 #include "proto-back-ldbm.h"
24 struct ldbminfo *li = (struct ldbminfo *) op->o_bd->be_private;
28 AttributeDescription *children = slap_schema.si_ad_children;
29 AttributeDescription *entry = slap_schema.si_ad_entry;
30 char textbuf[SLAP_TEXT_BUFLEN];
31 size_t textlen = sizeof textbuf;
32 #ifdef LDBM_SUBENTRIES
37 LDAP_LOG( BACK_LDBM, ENTRY, "ldbm_back_add: %s\n", op->o_req_dn.bv_val, 0, 0 );
39 Debug(LDAP_DEBUG_ARGS, "==> ldbm_back_add: %s\n", op->o_req_dn.bv_val, 0, 0);
42 rs->sr_err = entry_schema_check( op->o_bd, op->oq_add.rs_e, NULL, &rs->sr_text, textbuf, textlen );
44 if ( rs->sr_err != LDAP_SUCCESS ) {
46 LDAP_LOG( BACK_LDBM, ERR,
47 "ldbm_back_add: entry (%s) failed schema check.\n", op->o_req_dn.bv_val, 0, 0 );
49 Debug( LDAP_DEBUG_TRACE, "entry failed schema check: %s\n",
53 send_ldap_result( op, rs );
57 #ifdef LDBM_SUBENTRIES
58 subentry = is_entry_subentry( op->oq_add.rs_e );
61 if ( !access_allowed( op, op->oq_add.rs_e,
62 entry, NULL, ACL_WRITE, NULL ) )
65 LDAP_LOG( BACK_LDBM, ERR,
66 "ldbm_back_add: No write access to entry (%s).\n",
67 op->o_req_dn.bv_val, 0, 0 );
69 Debug( LDAP_DEBUG_TRACE, "no write access to entry\n", 0,
73 send_ldap_error( op, rs, LDAP_INSUFFICIENT_ACCESS,
74 "no write access to entry" );
76 return LDAP_INSUFFICIENT_ACCESS;
79 /* grab giant lock for writing */
80 ldap_pvt_thread_rdwr_wlock(&li->li_giant_rwlock);
82 if ( ( rs->sr_err = dn2id( op->o_bd, &op->o_req_ndn, &id ) ) || id != NOID ) {
83 /* if (rs->sr_err) something bad happened to ldbm cache */
84 ldap_pvt_thread_rdwr_wunlock(&li->li_giant_rwlock);
85 rs->sr_err = rs->sr_err ? LDAP_OTHER : LDAP_ALREADY_EXISTS;
86 send_ldap_result( op, rs );
91 * Get the parent dn and see if the corresponding entry exists.
92 * If the parent does not exist, only allow the "root" user to
96 if ( be_issuffix( op->o_bd, &op->o_req_ndn ) ) {
99 dnParent( &op->o_req_ndn, &pdn );
104 Entry *matched = NULL;
106 /* get parent with writer lock */
107 if ( (p = dn2entry_w( op->o_bd, &pdn, &matched )) == NULL ) {
108 if ( matched != NULL ) {
109 rs->sr_matched = ch_strdup( matched->e_dn );
110 rs->sr_ref = is_entry_referral( matched )
111 ? get_entry_referrals( op, matched )
113 cache_return_entry_r( &li->li_cache, matched );
116 rs->sr_ref = referral_rewrite( default_referral,
117 NULL, &op->o_req_dn, LDAP_SCOPE_DEFAULT );
120 ldap_pvt_thread_rdwr_wunlock(&li->li_giant_rwlock);
123 LDAP_LOG( BACK_LDBM, ERR,
124 "ldbm_back_add: Parent of (%s) does not exist.\n",
125 op->o_req_dn.bv_val, 0, 0 );
127 Debug( LDAP_DEBUG_TRACE, "parent does not exist\n",
131 rs->sr_text = rs->sr_ref ? "parent is referral" : "parent does not exist";
132 rs->sr_err = LDAP_REFERRAL;
133 send_ldap_result( op, rs );
135 ber_bvarray_free( rs->sr_ref );
136 free( (char *)rs->sr_matched );
141 if ( ! access_allowed( op, p,
142 children, NULL, ACL_WRITE, NULL ) )
144 /* free parent and writer lock */
145 cache_return_entry_w( &li->li_cache, p );
146 ldap_pvt_thread_rdwr_wunlock(&li->li_giant_rwlock);
149 LDAP_LOG( BACK_LDBM, ERR,
150 "ldbm_back_add: No write access to parent (%s).\n",
151 op->o_req_dn.bv_val, 0, 0 );
153 Debug( LDAP_DEBUG_TRACE, "no write access to parent\n", 0,
157 send_ldap_error( op, rs, LDAP_INSUFFICIENT_ACCESS,
158 "no write access to parent" );
160 return LDAP_INSUFFICIENT_ACCESS;
163 #ifdef LDBM_SUBENTRIES
164 if ( is_entry_subentry( p )) {
166 LDAP_LOG( OPERATION, DETAIL1,
167 "bdb_add: parent is subentry\n", 0, 0, 0 );
169 Debug( LDAP_DEBUG_TRACE, "bdb_add: parent is subentry\n",
172 rs->sr_err = LDAP_OBJECT_CLASS_VIOLATION;
173 rs->sr_text = "parent is a subentry";
178 if ( is_entry_alias( p ) ) {
179 /* parent is an alias, don't allow add */
181 /* free parent and writer lock */
182 cache_return_entry_w( &li->li_cache, p );
183 ldap_pvt_thread_rdwr_wunlock(&li->li_giant_rwlock);
186 LDAP_LOG(BACK_LDBM, ERR,
187 "ldbm_back_add: Parent is an alias.\n", 0, 0, 0 );
189 Debug( LDAP_DEBUG_TRACE, "parent is alias\n", 0,
194 send_ldap_error( op, rs, LDAP_ALIAS_PROBLEM,
195 "parent is an alias" );
197 return LDAP_ALIAS_PROBLEM;
200 if ( is_entry_referral( p ) ) {
201 /* parent is a referral, don't allow add */
202 rs->sr_matched = ch_strdup( p->e_dn );
203 rs->sr_ref = is_entry_referral( p )
204 ? get_entry_referrals( op, p )
207 /* free parent and writer lock */
208 cache_return_entry_w( &li->li_cache, p );
209 ldap_pvt_thread_rdwr_wunlock(&li->li_giant_rwlock);
212 LDAP_LOG( BACK_LDBM, ERR,
213 "ldbm_back_add: Parent is referral.\n", 0, 0, 0 );
215 Debug( LDAP_DEBUG_TRACE, "parent is referral\n", 0,
218 rs->sr_err = LDAP_REFERRAL;
219 send_ldap_result( op, rs );
221 ber_bvarray_free( rs->sr_ref );
222 free( (char *)rs->sr_matched );
226 #ifdef LDBM_SUBENTRIES
229 /* parent must be an administrative point of the required kind */
234 if( pdn.bv_val != NULL )
236 assert( *pdn.bv_val == '\0' );
239 /* no parent, must be adding entry to root */
240 if ( !be_isroot( op->o_bd, &op->o_ndn ) )
242 if ( be_issuffix( op->o_bd, (struct berval *)&slap_empty_bv ) || be_isupdate( op->o_bd, &op->o_ndn ) ) {
243 p = (Entry *)&slap_entry_root;
245 rs->sr_err = access_allowed( op, p,
246 children, NULL, ACL_WRITE, NULL );
249 if ( ! rs->sr_err ) {
250 ldap_pvt_thread_rdwr_wunlock(&li->li_giant_rwlock);
253 LDAP_LOG( BACK_LDBM, ERR,
254 "ldbm_back_add: No write "
255 "access to parent (\"\").\n", 0, 0, 0 );
257 Debug( LDAP_DEBUG_TRACE,
258 "no write access to parent\n",
262 send_ldap_error( op, rs,
263 LDAP_INSUFFICIENT_ACCESS,
264 "no write access to parent" );
266 return LDAP_INSUFFICIENT_ACCESS;
268 } else if ( !is_entry_glue( op->oq_add.rs_e )) {
269 ldap_pvt_thread_rdwr_wunlock(&li->li_giant_rwlock);
272 LDAP_LOG( BACK_LDBM, ERR,
273 "ldbm_back_add: %s add denied.\n",
274 pdn.bv_val == NULL ? "suffix"
275 : "entry at root", 0, 0 );
277 Debug( LDAP_DEBUG_TRACE, "%s add denied\n",
278 pdn.bv_val == NULL ? "suffix"
279 : "entry at root", 0, 0 );
282 send_ldap_error( op, rs,
283 LDAP_NO_SUCH_OBJECT, NULL );
285 return LDAP_NO_SUCH_OBJECT;
289 #ifdef LDBM_SUBENTRIES
292 LDAP_LOG ( OPERATION, DETAIL1,
293 "bdb_add: no parent, cannot add subentry\n", 0, 0, 0 );
295 Debug( LDAP_DEBUG_TRACE,
296 "bdb_add: no parent, cannot add subentry\n", 0, 0, 0 );
298 rs->sr_err = LDAP_NO_SUCH_OBJECT;
299 rs->sr_text = "no parent, cannot add subentry";
306 if ( next_id( op->o_bd, &op->oq_add.rs_e->e_id ) ) {
308 /* free parent and writer lock */
309 cache_return_entry_w( &li->li_cache, p );
312 ldap_pvt_thread_rdwr_wunlock(&li->li_giant_rwlock);
315 LDAP_LOG( BACK_LDBM, ERR,
316 "ldbm_back_add: next_id failed.\n", 0, 0, 0 );
318 Debug( LDAP_DEBUG_ANY, "ldbm_add: next_id failed\n",
322 send_ldap_error( op, rs, LDAP_OTHER,
323 "next_id add failed" );
329 * Try to add the entry to the cache, assign it a new dnid.
331 rs->sr_err = cache_add_entry_rw(&li->li_cache, op->oq_add.rs_e, CACHE_WRITE_LOCK);
333 if ( rs->sr_err != 0 ) {
335 /* free parent and writer lock */
336 cache_return_entry_w( &li->li_cache, p );
339 ldap_pvt_thread_rdwr_wunlock(&li->li_giant_rwlock);
342 LDAP_LOG( BACK_LDBM, ERR,
343 "ldbm_back_add: cache_add_entry_lock failed.\n", 0, 0, 0 );
345 Debug( LDAP_DEBUG_ANY, "cache_add_entry_lock failed\n", 0, 0,
349 rs->sr_text = rs->sr_err > 0 ? NULL : "cache add failed";
350 rs->sr_err = rs->sr_err > 0 ? LDAP_ALREADY_EXISTS : LDAP_OTHER;
351 send_ldap_result( op, rs );
358 /* attribute indexes */
359 if ( index_entry_add( op, op->oq_add.rs_e ) != LDAP_SUCCESS ) {
361 LDAP_LOG( BACK_LDBM, ERR,
362 "ldbm_back_add: index_entry_add failed.\n", 0, 0, 0 );
364 Debug( LDAP_DEBUG_TRACE, "index_entry_add failed\n", 0,
368 send_ldap_error( op, rs, LDAP_OTHER,
369 "index generation failed" );
375 if ( dn2id_add( op->o_bd, &op->oq_add.rs_e->e_nname, op->oq_add.rs_e->e_id ) != 0 ) {
377 LDAP_LOG( BACK_LDBM, ERR,
378 "ldbm_back_add: dn2id_add failed.\n", 0, 0, 0 );
380 Debug( LDAP_DEBUG_TRACE, "dn2id_add failed\n", 0,
383 /* FIXME: delete attr indices? */
385 send_ldap_error( op, rs, LDAP_OTHER,
386 "DN index generation failed" );
392 if ( id2entry_add( op->o_bd, op->oq_add.rs_e ) != 0 ) {
394 LDAP_LOG( BACK_LDBM, ERR,
395 "ldbm_back_add: id2entry_add failed.\n", 0, 0, 0 );
397 Debug( LDAP_DEBUG_TRACE, "id2entry_add failed\n", 0,
401 /* FIXME: delete attr indices? */
402 (void) dn2id_delete( op->o_bd, &op->oq_add.rs_e->e_nname, op->oq_add.rs_e->e_id );
404 send_ldap_error( op, rs, LDAP_OTHER,
405 "entry store failed" );
410 rs->sr_err = LDAP_SUCCESS;
411 send_ldap_result( op, rs );
413 /* marks the entry as committed, so it is added to the cache;
414 * otherwise it is removed from the cache, but not destroyed;
415 * it will be destroyed by the caller */
416 cache_entry_commit( op->oq_add.rs_e );
420 /* free parent and writer lock */
421 cache_return_entry_w( &li->li_cache, p );
426 * in case of error, writer lock is freed
427 * and entry's private data is destroyed.
428 * otherwise, this is done when entry is released
430 cache_return_entry_w( &li->li_cache, op->oq_add.rs_e );
431 ldap_pvt_thread_rdwr_wunlock(&li->li_giant_rwlock);
434 return( rs->sr_err );