1 /* modrdn.c - ldbm backend modrdn routine */
4 * Copyright 1998-2002 The OpenLDAP Foundation, All Rights Reserved.
5 * COPYING RESTRICTIONS APPLY, see COPYRIGHT file
9 * LDAP v3 newSuperior support. Add new rdn as an attribute.
10 * (Full support for v2 also used software/ideas contributed
11 * by Roy Hooper rhooper@cyberus.ca, thanks to him for his
14 * Copyright 1999, Juan C. Gomez, All rights reserved.
15 * This software is not subject to any license of Silicon Graphics
16 * Inc. or Purdue University.
18 * Redistribution and use in source and binary forms are permitted
19 * without restriction or fee of any kind as long as this notice
28 #include <ac/string.h>
29 #include <ac/socket.h>
32 #include "back-ldbm.h"
33 #include "proto-back-ldbm.h"
42 struct berval *newrdn,
43 struct berval *nnewrdn,
45 struct berval *newSuperior,
46 struct berval *nnewSuperior
49 AttributeDescription *children = slap_schema.si_ad_children;
50 struct ldbminfo *li = (struct ldbminfo *) be->be_private;
51 struct berval p_dn, p_ndn;
52 struct berval new_dn = { 0, NULL}, new_ndn = { 0, NULL };
57 #define CAN_ROLLBACK -1
58 #define MUST_DESTROY 1
59 int rc = CAN_ROLLBACK;
62 const char *text = NULL;
63 char textbuf[SLAP_TEXT_BUFLEN];
64 size_t textlen = sizeof textbuf;
65 /* Added to support LDAP v2 correctly (deleteoldrdn thing) */
69 /* Added to support newSuperior */
70 Entry *np = NULL; /* newSuperior Entry */
71 struct berval *np_ndn = NULL; /* newSuperior ndn */
72 struct berval *new_parent_dn = NULL; /* np_dn, p_dn, or NULL */
73 /* Used to interface with ldbm_modify_internal() */
74 Modifications *mod = NULL; /* Used to delete old/add new rdn */
75 int manageDSAit = get_manageDSAit( op );
78 LDAP_LOG(( "backend", LDAP_LEVEL_ENTRY,
79 "ldbm_back_modrdn: dn: %s newSuperior=%s\n",
80 dn->bv_len ? dn->bv_val : "NULL",
81 ( newSuperior && newSuperior->bv_len )
82 ? newSuperior->bv_val : "NULL" ));
84 Debug( LDAP_DEBUG_TRACE,
85 "==>ldbm_back_modrdn: dn: %s newSuperior=%s\n",
86 dn->bv_len ? dn->bv_val : "NULL",
87 ( newSuperior && newSuperior->bv_len )
88 ? newSuperior->bv_val : "NULL", 0 );
91 /* get entry with writer lock */
92 if ( (e = dn2entry_w( be, ndn, &matched )) == NULL ) {
93 char* matched_dn = NULL;
96 if( matched != NULL ) {
97 matched_dn = strdup( matched->e_dn );
98 refs = is_entry_referral( matched )
99 ? get_entry_referrals( be, conn, op, matched )
101 cache_return_entry_r( &li->li_cache, matched );
103 refs = referral_rewrite( default_referral,
104 NULL, dn, LDAP_SCOPE_DEFAULT );
107 send_ldap_result( conn, op, LDAP_REFERRAL,
108 matched_dn, NULL, refs, NULL );
110 if ( refs ) bvarray_free( refs );
116 if (!manageDSAit && is_entry_referral( e ) ) {
117 /* parent is a referral, don't allow add */
118 /* parent is an alias, don't allow add */
119 BVarray refs = get_entry_referrals( be,
123 LDAP_LOG(( "backend", LDAP_LEVEL_INFO,
124 "ldbm_back_modrdn: entry %s is a referral\n", e->e_dn ));
126 Debug( LDAP_DEBUG_TRACE, "entry %s is referral\n", e->e_dn,
130 send_ldap_result( conn, op, LDAP_REFERRAL,
131 e->e_dn, NULL, refs, NULL );
133 if ( refs ) bvarray_free( refs );
137 if ( has_children( be, e ) ) {
139 LDAP_LOG(( "backend", LDAP_LEVEL_INFO,
140 "ldbm_back_modrdn: entry %s has children\n", e->e_dn ));
142 Debug( LDAP_DEBUG_TRACE, "entry %s has children\n", e->e_dn,
146 send_ldap_result( conn, op, LDAP_NOT_ALLOWED_ON_NONLEAF,
147 NULL, "subtree rename not supported", NULL, NULL );
151 p_ndn.bv_val = dn_parent( be, e->e_ndn );
153 p_ndn.bv_len = e->e_nname.bv_len - (p_ndn.bv_val - e->e_ndn);
157 if ( p_ndn.bv_len != 0 ) {
158 /* Make sure parent entry exist and we can write its
162 if( (p = dn2entry_w( be, &p_ndn, NULL )) == NULL) {
164 LDAP_LOG(( "backend", LDAP_LEVEL_INFO,
165 "ldbm_back_modrdn: parent of %s does not exist\n", e->e_ndn ));
167 Debug( LDAP_DEBUG_TRACE, "parent does not exist\n",
171 send_ldap_result( conn, op, LDAP_OTHER,
172 NULL, "parent entry does not exist", NULL, NULL );
177 /* check parent for "children" acl */
178 if ( ! access_allowed( be, conn, op, p,
179 children, NULL, ACL_WRITE ) )
182 LDAP_LOG(( "backend", LDAP_LEVEL_INFO,
183 "ldbm_back_modrdn: no access to parent of (%s)\n", e->e_dn ));
185 Debug( LDAP_DEBUG_TRACE, "no access to parent\n", 0,
189 send_ldap_result( conn, op, LDAP_INSUFFICIENT_ACCESS,
190 NULL, NULL, NULL, NULL );
195 LDAP_LOG(( "backend", LDAP_LEVEL_DETAIL1,
196 "ldbm_back_modrdn: wr to children of entry %s OK\n",
199 Debug( LDAP_DEBUG_TRACE,
200 "ldbm_back_modrdn: wr to children of entry %s OK\n",
201 p_ndn.bv_val, 0, 0 );
204 p_dn.bv_val = dn_parent( be, e->e_dn );
206 p_dn.bv_len = e->e_name.bv_len - (p_dn.bv_val - e->e_dn);
211 LDAP_LOG(( "backend", LDAP_LEVEL_DETAIL1,
212 "ldbm_back_modrdn: parent dn=%s\n", p_dn.bv_val ));
214 Debug( LDAP_DEBUG_TRACE, "ldbm_back_modrdn: parent dn=%s\n",
219 /* no parent, must be root to modify rdn */
220 isroot = be_isroot( be, &op->o_ndn );
222 if ( be_issuffix( be, "" ) || be_isupdate( be, &op->o_ndn ) ) {
223 p = (Entry *)&slap_entry_root;
225 rc = access_allowed( be, conn, op, p,
226 children, NULL, ACL_WRITE );
229 /* check parent for "children" acl */
232 LDAP_LOG(( "backend", LDAP_LEVEL_ERR,
233 "ldbm_back_modrdn: no access "
234 "to parent \"\"\n" ));
236 Debug( LDAP_DEBUG_TRACE,
237 "<=- ldbm_back_modrdn: no "
238 "access to parent\n", 0, 0, 0 );
241 send_ldap_result( conn, op,
242 LDAP_INSUFFICIENT_ACCESS,
243 NULL, NULL, NULL, NULL );
249 LDAP_LOG(( "backend", LDAP_LEVEL_ERR,
250 "ldbm_back_modrdn: (%s) has no "
251 "parent & not a root.\n", dn ));
253 Debug( LDAP_DEBUG_TRACE,
254 "<=- ldbm_back_modrdn: no parent & "
255 "not root\n", 0, 0, 0);
258 send_ldap_result( conn, op,
259 LDAP_INSUFFICIENT_ACCESS,
260 NULL, NULL, NULL, NULL );
265 ldap_pvt_thread_mutex_lock(&li->li_root_mutex);
269 LDAP_LOG(( "backend", LDAP_LEVEL_INFO,
270 "ldbm_back_modrdn: (%s) no parent, locked root.\n", e->e_dn ));
272 Debug( LDAP_DEBUG_TRACE,
273 "ldbm_back_modrdn: no parent, locked root\n",
278 new_parent_dn = &p_dn; /* New Parent unless newSuperior given */
280 if ( newSuperior != NULL ) {
282 LDAP_LOG(( "backend", LDAP_LEVEL_DETAIL1,
283 "ldbm_back_modrdn: new parent \"%s\" requested\n",
284 newSuperior->bv_val ));
286 Debug( LDAP_DEBUG_TRACE,
287 "ldbm_back_modrdn: new parent \"%s\" requested...\n",
288 newSuperior->bv_val, 0, 0 );
291 np_ndn = nnewSuperior;
293 /* newSuperior == oldParent? */
294 if ( p_ndn.bv_len == np_ndn->bv_len &&
295 strcmp( p_ndn.bv_val, np_ndn->bv_val ) == 0 ) {
297 LDAP_LOG(( "backend", LDAP_LEVEL_INFO, "ldbm_back_modrdn: "
298 "new parent\"%s\" seems to be the same as the "
299 "old parent \"%s\"\n",
300 newSuperior->bv_val, p_dn.bv_val ));
302 Debug( LDAP_DEBUG_TRACE, "ldbm_back_modrdn: "
303 "new parent\"%s\" seems to be the same as the "
304 "old parent \"%s\"\n",
305 newSuperior->bv_val, p_dn.bv_val, 0 );
308 newSuperior = NULL; /* ignore newSuperior */
312 if ( newSuperior != NULL ) {
313 /* newSuperior == entry being moved?, if so ==> ERROR */
314 /* Get Entry with dn=newSuperior. Does newSuperior exist? */
316 if ( nnewSuperior->bv_len ) {
317 if( (np = dn2entry_w( be, np_ndn, NULL )) == NULL) {
319 LDAP_LOG(( "backend", LDAP_LEVEL_ERR,
320 "ldbm_back_modrdn: newSup(ndn=%s) not found.\n", np_ndn->bv_val ));
322 Debug( LDAP_DEBUG_TRACE,
323 "ldbm_back_modrdn: newSup(ndn=%s) not here!\n",
324 np_ndn->bv_val, 0, 0);
327 send_ldap_result( conn, op, LDAP_OTHER,
328 NULL, "newSuperior not found", NULL, NULL );
333 LDAP_LOG(( "backend", LDAP_LEVEL_DETAIL1,
334 "ldbm_back_modrdn: wr to new parent OK np=%p, id=%ld\n",
337 Debug( LDAP_DEBUG_TRACE,
338 "ldbm_back_modrdn: wr to new parent OK np=%p, id=%ld\n",
342 /* check newSuperior for "children" acl */
343 if ( !access_allowed( be, conn, op, np, children, NULL,
347 LDAP_LOG(( "backend", LDAP_LEVEL_INFO,
348 "ldbm_back_modrdn: no wr to newSup children.\n" ));
350 Debug( LDAP_DEBUG_TRACE,
351 "ldbm_back_modrdn: no wr to newSup children\n",
355 send_ldap_result( conn, op, LDAP_INSUFFICIENT_ACCESS,
356 NULL, NULL, NULL, NULL );
360 if ( is_entry_alias( np ) ) {
361 /* parent is an alias, don't allow add */
363 LDAP_LOG(( "backend", LDAP_LEVEL_INFO,
364 "ldbm_back_modrdn: entry (%s) is an alias.\n", np->e_dn ));
366 Debug( LDAP_DEBUG_TRACE, "entry is alias\n", 0, 0, 0 );
370 send_ldap_result( conn, op, LDAP_ALIAS_PROBLEM,
371 NULL, "newSuperior is an alias", NULL, NULL );
376 if ( is_entry_referral( np ) ) {
377 /* parent is a referral, don't allow add */
379 LDAP_LOG(( "backend", LDAP_LEVEL_INFO,
380 "ldbm_back_modrdn: entry (%s) is a referral\n",
383 Debug( LDAP_DEBUG_TRACE, "entry (%s) is referral\n",
387 send_ldap_result( conn, op, LDAP_OPERATIONS_ERROR,
388 NULL, "newSuperior is a referral", NULL, NULL );
395 /* no parent, must be root to modify newSuperior */
396 if ( isroot == -1 ) {
397 isroot = be_isroot( be, &op->o_ndn );
401 if ( be_issuffix( be, "" ) || be_isupdate( be, &op->o_ndn ) ) {
402 np = (Entry *)&slap_entry_root;
404 rc = access_allowed( be, conn, op, np,
405 children, NULL, ACL_WRITE );
408 /* check parent for "children" acl */
411 LDAP_LOG(( "backend", LDAP_LEVEL_ERR,
412 "ldbm_back_modrdn: no access "
413 "to new superior \"\"\n" ));
415 Debug( LDAP_DEBUG_TRACE,
416 "<=- ldbm_back_modrdn: no "
417 "access to new superior\n", 0, 0, 0 );
420 send_ldap_result( conn, op,
421 LDAP_INSUFFICIENT_ACCESS,
422 NULL, NULL, NULL, NULL );
428 LDAP_LOG(( "backend", LDAP_LEVEL_ERR,
429 "ldbm_back_modrdn: \"\" "
430 "not allowed as new superior\n" ));
432 Debug( LDAP_DEBUG_TRACE,
433 "<=- ldbm_back_modrdn: \"\" "
434 "not allowed as new superior\n",
438 send_ldap_result( conn, op,
439 LDAP_INSUFFICIENT_ACCESS,
440 NULL, NULL, NULL, NULL );
447 LDAP_LOG(( "backend", LDAP_LEVEL_DETAIL1,
448 "ldbm_back_modrdn: wr to new parent's children OK.\n" ));
450 Debug( LDAP_DEBUG_TRACE,
451 "ldbm_back_modrdn: wr to new parent's children OK\n",
455 new_parent_dn = newSuperior;
458 /* Build target dn and make sure target entry doesn't exist already. */
459 build_new_dn( &new_dn, new_parent_dn, newrdn );
460 dnNormalize2( NULL, &new_dn, &new_ndn );
463 LDAP_LOG(( "backend", LDAP_LEVEL_DETAIL1,
464 "ldbm_back_modrdn: new ndn=%s\n", new_ndn.bv_val ));
466 Debug( LDAP_DEBUG_TRACE, "ldbm_back_modrdn: new ndn=%s\n",
467 new_ndn.bv_val, 0, 0 );
470 /* check for abandon */
471 ldap_pvt_thread_mutex_lock( &op->o_abandonmutex );
472 if ( op->o_abandon ) {
473 ldap_pvt_thread_mutex_unlock( &op->o_abandonmutex );
477 ldap_pvt_thread_mutex_unlock( &op->o_abandonmutex );
478 if ( ( rc_id = dn2id ( be, &new_ndn, &id ) ) || id != NOID ) {
479 /* if (rc_id) something bad happened to ldbm cache */
480 send_ldap_result( conn, op,
481 rc_id ? LDAP_OPERATIONS_ERROR : LDAP_ALREADY_EXISTS,
482 NULL, NULL, NULL, NULL );
487 LDAP_LOG(( "backend", LDAP_LEVEL_INFO,
488 "ldbm_back_modrdn: new ndn (%s) does not exist\n", new_ndn.bv_val ));
490 Debug( LDAP_DEBUG_TRACE,
491 "ldbm_back_modrdn: new ndn=%s does not exist\n",
492 new_ndn.bv_val, 0, 0 );
496 /* Get attribute types and values of our new rdn, we will
497 * need to add that to our new entry
499 if ( ldap_str2rdn( newrdn->bv_val, &new_rdn, (char **)&text,
500 LDAP_DN_FORMAT_LDAP ) )
503 LDAP_LOG(( "backend", LDAP_LEVEL_INFO,
504 "ldbm_back_modrdn: can't figure out type(s)/value(s) of newrdn\n" ));
506 Debug( LDAP_DEBUG_TRACE,
507 "ldbm_back_modrdn: can't figure out type(s)/value(s) of newrdn\n",
511 send_ldap_result( conn, op, LDAP_OPERATIONS_ERROR,
512 NULL, "unable to parse type(s)/value(s) used in RDN", NULL, NULL );
517 LDAP_LOG(( "backend", LDAP_LEVEL_DETAIL1,
518 "ldbm_back_modrdn: new_rdn_type=\"%s\", new_rdn_val=\"%s\"\n",
519 new_rdn[0][0]->la_attr.bv_val, new_rdn[0][0]->la_value.bv_val ));
521 Debug( LDAP_DEBUG_TRACE,
522 "ldbm_back_modrdn: new_rdn_type=\"%s\", new_rdn_val=\"%s\"\n",
523 new_rdn[0][0]->la_attr.bv_val, new_rdn[0][0]->la_value.bv_val, 0 );
526 /* Retrieve the old rdn from the entry's dn */
527 if ( ldap_str2rdn( dn->bv_val, &old_rdn, (char **)&text,
528 LDAP_DN_FORMAT_LDAP ) )
531 LDAP_LOG(( "backend", LDAP_LEVEL_INFO,
532 "ldbm_back_modrdn: can't figure out the old_rdn type(s)/value(s).\n" ));
534 Debug( LDAP_DEBUG_TRACE,
535 "ldbm_back_modrdn: can't figure out the old_rdn type(s)/value(s)\n",
539 send_ldap_result( conn, op, LDAP_OTHER,
540 NULL, "unable to parse type(s)/value(s) used in RDN from old DN", NULL, NULL );
545 if ( newSuperior == NULL
546 && charray_strcasecmp( (const char **)old_rdn_types, (const char **)new_rdn_types ) != 0 )
548 /* Not a big deal but we may say something */
550 LDAP_LOG(( "backend", LDAP_LEVEL_INFO,
551 "ldbm_back_modrdn: old_rdn_type=%s new_rdn_type=%s\n",
552 old_rdn_types[0], new_rdn_types[0] ));
554 Debug( LDAP_DEBUG_TRACE,
555 "ldbm_back_modrdn: old_rdn_type=%s, new_rdn_type=%s!\n",
556 old_rdn_types[0], new_rdn_types[0], 0 );
562 LDAP_LOG(( "backend", LDAP_LEVEL_DETAIL1,
563 "ldbm_back_modrdn: DN_X500\n" ));
565 Debug( LDAP_DEBUG_TRACE, "ldbm_back_modrdn: DN_X500\n",
570 for ( a_cnt = 0; new_rdn[0][a_cnt]; a_cnt++ ) {
572 AttributeDescription *desc = NULL;
573 Modifications *mod_tmp;
575 rc = slap_bv2ad( &new_rdn[0][a_cnt]->la_attr, &desc, &text );
577 if ( rc != LDAP_SUCCESS ) {
579 LDAP_LOG(( "backend", LDAP_LEVEL_INFO,
580 "ldbm_back_modrdn: slap_bv2ad error: %s (%s)\n",
581 text, new_rdn[0][a_cnt]->la_attr.bv_val ));
583 Debug( LDAP_DEBUG_TRACE,
584 "ldbm_back_modrdn: %s: %s (new)\n",
585 text, new_rdn[0][a_cnt]->la_attr.bv_val, 0 );
588 send_ldap_result( conn, op, rc,
589 NULL, text, NULL, NULL );
594 if ( ! access_allowed( be, conn, op, e,
595 desc, &new_rdn[0][a_cnt]->la_value, ACL_WRITE ) ) {
597 LDAP_LOG(( "backend", LDAP_LEVEL_INFO,
598 "ldbm_back_modrdn: access "
599 "not allowed to attr \"%s\"\n",
600 new_rdn[0][a_cnt]->la_attr.bv_val ));
602 Debug( LDAP_DEBUG_TRACE,
603 "ldbm_back_modrdn: access not allowed "
604 "to attr \"%s\"\n%s%s",
605 new_rdn[0][a_cnt]->la_attr.bv_val, "", "" );
607 send_ldap_result( conn, op,
608 LDAP_INSUFFICIENT_ACCESS,
609 NULL, NULL, NULL, NULL );
614 mod_tmp = (Modifications *)ch_malloc( sizeof( Modifications )
615 + 2 * sizeof( struct berval ) );
616 mod_tmp->sml_desc = desc;
617 mod_tmp->sml_bvalues = (BVarray)( mod_tmp + 1 );
618 mod_tmp->sml_bvalues[0] = new_rdn[0][a_cnt]->la_value;
619 mod_tmp->sml_bvalues[1].bv_val = NULL;
620 mod_tmp->sml_op = SLAP_MOD_SOFTADD;
621 mod_tmp->sml_next = mod;
625 /* Remove old rdn value if required */
626 if ( deleteoldrdn ) {
627 /* Get value of old rdn */
628 if ( old_rdn == NULL ) {
630 LDAP_LOG(( "backend", LDAP_LEVEL_INFO,
631 "ldbm_back_modrdn: can't figure out old RDN value(s) from old RDN\n" ));
633 Debug( LDAP_DEBUG_TRACE,
634 "ldbm_back_modrdn: can't figure out oldRDN value(s) from old RDN\n",
638 send_ldap_result( conn, op, LDAP_OTHER,
639 NULL, "could not parse value(s) from old RDN", NULL, NULL );
643 for ( d_cnt = 0; old_rdn[0][d_cnt]; d_cnt++ ) {
645 AttributeDescription *desc = NULL;
646 Modifications *mod_tmp;
648 rc = slap_bv2ad( &old_rdn[0][d_cnt]->la_attr, &desc, &text );
650 if ( rc != LDAP_SUCCESS ) {
652 LDAP_LOG(( "backend", LDAP_LEVEL_INFO,
653 "ldbm_back_modrdn: %s: %s (old)\n",
654 text, old_rdn[0][d_cnt]->la_attr.bv_val ));
656 Debug( LDAP_DEBUG_TRACE,
657 "ldbm_back_modrdn: %s: %s (old)\n",
658 text, old_rdn[0][d_cnt]->la_attr.bv_val, 0 );
661 send_ldap_result( conn, op, rc,
662 NULL, text, NULL, NULL );
667 if ( ! access_allowed( be, conn, op, e,
668 desc, &old_rdn[0][d_cnt]->la_value, ACL_WRITE ) ) {
670 LDAP_LOG(( "backend", LDAP_LEVEL_INFO,
671 "ldbm_back_modrdn: access "
672 "not allowed to attr \"%s\"\n",
673 old_rdn[0][d_cnt]->la_attr.bv_val ));
675 Debug( LDAP_DEBUG_TRACE,
676 "ldbm_back_modrdn: access not allowed "
677 "to attr \"%s\"\n%s%s",
678 old_rdn[0][d_cnt]->la_attr.bv_val, "", "" );
680 send_ldap_result( conn, op,
681 LDAP_INSUFFICIENT_ACCESS,
682 NULL, NULL, NULL, NULL );
687 /* Remove old value of rdn as an attribute. */
688 mod_tmp = (Modifications *)ch_malloc( sizeof( Modifications )
689 + 2 * sizeof( struct berval ) );
690 mod_tmp->sml_desc = desc;
691 mod_tmp->sml_bvalues = (BVarray)(mod_tmp+1);
692 mod_tmp->sml_bvalues[0] = old_rdn[0][d_cnt]->la_value;
693 mod_tmp->sml_bvalues[1].bv_val = NULL;
694 mod_tmp->sml_op = LDAP_MOD_DELETE;
695 mod_tmp->sml_next = mod;
699 LDAP_LOG(( "backend", LDAP_LEVEL_DETAIL1,
700 "ldbm_back_modrdn: removing old_rdn_val=%s\n", old_rdn[0][d_cnt]->la_value.bv_val ));
702 Debug( LDAP_DEBUG_TRACE,
703 "ldbm_back_modrdn: removing old_rdn_val=%s\n",
704 old_rdn[0][d_cnt]->la_value.bv_val, 0, 0 );
710 /* check for abandon */
711 ldap_pvt_thread_mutex_lock( &op->o_abandonmutex );
712 if ( op->o_abandon ) {
713 ldap_pvt_thread_mutex_unlock( &op->o_abandonmutex );
716 ldap_pvt_thread_mutex_unlock( &op->o_abandonmutex );
719 if ( dn2id_delete( be, &e->e_nname, e->e_id ) != 0 ) {
720 send_ldap_result( conn, op, LDAP_OTHER,
721 NULL, "DN index delete fail", NULL, NULL );
725 (void) cache_delete_entry( &li->li_cache, e );
728 /* XXX: there is no going back! */
733 e->e_nname = new_ndn;
734 new_dn.bv_val = NULL;
735 new_ndn.bv_val = NULL;
738 if ( dn2id_add( be, &e->e_nname, e->e_id ) != 0 ) {
739 send_ldap_result( conn, op, LDAP_OTHER,
740 NULL, "DN index add failed", NULL, NULL );
744 /* modify memory copy of entry */
745 rc = ldbm_modify_internal( be, conn, op, dn->bv_val, &mod[0], e,
746 &text, textbuf, textlen );
748 if( rc != LDAP_SUCCESS ) {
749 if( rc != SLAPD_ABANDON ) {
750 send_ldap_result( conn, op, rc,
751 NULL, text, NULL, NULL );
754 /* here we may try to delete the newly added dn */
755 if ( dn2id_delete( be, &e->e_nname, e->e_id ) != 0 ) {
756 /* we already are in trouble ... */
763 (void) cache_update_entry( &li->li_cache, e );
765 /* NOTE: after this you must not free new_dn or new_ndn!
766 * They are used by cache.
770 if ( id2entry_add( be, e ) != 0 ) {
771 send_ldap_result( conn, op, LDAP_OTHER,
772 NULL, "entry update failed", NULL, NULL );
776 send_ldap_result( conn, op, LDAP_SUCCESS,
777 NULL, NULL, NULL, NULL );
779 cache_entry_commit( e );
782 if( new_dn.bv_val != NULL ) free( new_dn.bv_val );
783 if( new_ndn.bv_val != NULL ) free( new_ndn.bv_val );
785 /* LDAP v2 supporting correct attribute handling. */
786 if( new_rdn ) ldap_rdnfree( new_rdn );
787 if( old_rdn ) ldap_rdnfree( old_rdn );
791 for (; mod; mod = tmp ) {
797 /* LDAP v3 Support */
799 /* free new parent and writer lock */
800 cache_return_entry_w( &li->li_cache, np );
804 /* free parent and writer lock */
805 cache_return_entry_w( &li->li_cache, p );
809 /* release root writer lock */
810 ldap_pvt_thread_mutex_unlock(&li->li_root_mutex);
813 /* free entry and writer lock */
814 cache_return_entry_w( &li->li_cache, e );
815 if ( rc == MUST_DESTROY ) {
816 /* if rc == MUST_DESTROY the entry is uncached
817 * and its private data is destroyed;
818 * the entry must be freed */