2 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
4 * Copyright 1999-2005 The OpenLDAP Foundation.
5 * Portions Copyright 1999 Dmitry Kovalev.
6 * Portions Copyright 2002 Pierangelo Masarati.
7 * Portions Copyright 2004 Mark Adamson.
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted only as authorized by the OpenLDAP
14 * A copy of this license is available in the file LICENSE in the
15 * top-level directory of the distribution or, alternatively, at
16 * <http://www.OpenLDAP.org/license.html>.
19 * This work was initially developed by Dmitry Kovalev for inclusion
20 * by OpenLDAP Software. Additional significant contributors include
21 * Pierangelo Masarati and Mark Adamson.
27 #include <sys/types.h>
28 #include "ac/string.h"
31 #include "proto-sql.h"
33 #ifdef BACKSQL_ARBITRARY_KEY
34 struct berval backsql_baseObject_bv = BER_BVC( BACKSQL_BASEOBJECT_IDSTR );
35 #endif /* BACKSQL_ARBITRARY_KEY */
38 backsql_free_entryID( Operation *op, backsql_entryID *id, int freeit )
40 backsql_entryID *next;
46 if ( !BER_BVISNULL( &id->eid_ndn ) ) {
47 if ( !BER_BVISNULL( &id->eid_dn )
48 && id->eid_dn.bv_val != id->eid_ndn.bv_val )
50 op->o_tmpfree( id->eid_dn.bv_val, op->o_tmpmemctx );
51 BER_BVZERO( &id->eid_dn );
54 op->o_tmpfree( id->eid_ndn.bv_val, op->o_tmpmemctx );
55 BER_BVZERO( &id->eid_ndn );
58 #ifdef BACKSQL_ARBITRARY_KEY
59 if ( !BER_BVISNULL( &id->eid_id ) ) {
60 op->o_tmpfree( id->eid_id.bv_val, op->o_tmpmemctx );
61 BER_BVZERO( &id->eid_id );
64 if ( !BER_BVISNULL( &id->eid_keyval ) ) {
65 op->o_tmpfree( id->eid_keyval.bv_val, op->o_tmpmemctx );
66 BER_BVZERO( &id->eid_keyval );
68 #endif /* BACKSQL_ARBITRARY_KEY */
71 op->o_tmpfree( id, op->o_tmpmemctx );
78 * NOTE: the dn must be normalized
90 backsql_info *bi = op->o_bd->be_private;
91 SQLHSTMT sth = SQL_NULL_HSTMT;
95 struct berval realndn = BER_BVNULL;
98 char upperdn[ BACKSQL_MAX_DN_LEN + 1 ];
103 * NOTE: id can be NULL; in this case, the function
104 * simply checks whether the DN can be successfully
105 * turned into an ID, returning LDAP_SUCCESS for
106 * positive cases, or the most appropriate error
109 Debug( LDAP_DEBUG_TRACE, "==>backsql_dn2id(\"%s\")%s%s\n",
110 ndn->bv_val, id == NULL ? " (no ID expected)" : "",
111 matched ? " matched expected" : "" );
114 /* NOTE: trap inconsistencies */
115 assert( BER_BVISNULL( &id->eid_ndn ) );
118 if ( ndn->bv_len > BACKSQL_MAX_DN_LEN ) {
119 Debug( LDAP_DEBUG_TRACE,
120 " backsql_dn2id(\"%s\"): DN length=%ld "
121 "exceeds max DN length %d:\n",
122 ndn->bv_val, ndn->bv_len, BACKSQL_MAX_DN_LEN );
126 /* return baseObject if available and matches */
127 /* FIXME: if ndn is already mucked, we cannot check this */
128 if ( bi->sql_baseObject != NULL &&
129 dn_match( ndn, &bi->sql_baseObject->e_nname ) )
132 #ifdef BACKSQL_ARBITRARY_KEY
133 ber_dupbv_x( &id->eid_id, &backsql_baseObject_bv,
135 ber_dupbv_x( &id->eid_keyval, &backsql_baseObject_bv,
137 #else /* ! BACKSQL_ARBITRARY_KEY */
138 id->eid_id = BACKSQL_BASEOBJECT_ID;
139 id->eid_keyval = BACKSQL_BASEOBJECT_KEYVAL;
140 #endif /* ! BACKSQL_ARBITRARY_KEY */
141 id->eid_oc_id = BACKSQL_BASEOBJECT_OC;
143 ber_dupbv_x( &id->eid_ndn, &bi->sql_baseObject->e_nname,
145 ber_dupbv_x( &id->eid_dn, &bi->sql_baseObject->e_name,
155 Debug( LDAP_DEBUG_TRACE, " backsql_dn2id(\"%s\"): id_query \"%s\"\n",
156 ndn->bv_val, bi->sql_id_query, 0 );
157 assert( bi->sql_id_query != NULL );
158 rc = backsql_Prepare( dbh, &sth, bi->sql_id_query, 0 );
159 if ( rc != SQL_SUCCESS ) {
160 Debug( LDAP_DEBUG_TRACE,
161 " backsql_dn2id(\"%s\"): "
162 "error preparing SQL:\n %s",
163 ndn->bv_val, bi->sql_id_query, 0 );
164 backsql_PrintErrors( bi->sql_db_env, dbh, sth, rc );
171 if ( backsql_api_dn2odbc( op, rs, &realndn ) ) {
172 Debug( LDAP_DEBUG_TRACE, " backsql_dn2id(\"%s\"): "
173 "backsql_api_dn2odbc(\"%s\") failed\n",
174 ndn->bv_val, realndn.bv_val, 0 );
180 if ( BACKSQL_HAS_LDAPINFO_DN_RU( bi ) ) {
182 * Prepare an upper cased, byte reversed version
183 * that can be searched using indexes
186 for ( i = 0, j = realndn.bv_len - 1; realndn.bv_val[ i ]; i++, j--)
188 upperdn[ i ] = realndn.bv_val[ j ];
191 ldap_pvt_str2upper( upperdn );
193 Debug( LDAP_DEBUG_TRACE, " backsql_dn2id(\"%s\"): "
195 ndn->bv_val, upperdn, 0 );
196 ber_str2bv( upperdn, 0, 0, &tbbDN );
199 if ( BACKSQL_USE_REVERSE_DN( bi ) ) {
200 AC_MEMCPY( upperdn, realndn.bv_val, realndn.bv_len + 1 );
201 ldap_pvt_str2upper( upperdn );
202 Debug( LDAP_DEBUG_TRACE,
203 " backsql_dn2id(\"%s\"): "
205 ndn->bv_val, upperdn, 0 );
206 ber_str2bv( upperdn, 0, 0, &tbbDN );
213 rc = backsql_BindParamBerVal( sth, 1, SQL_PARAM_INPUT, &tbbDN );
214 if ( rc != SQL_SUCCESS) {
216 Debug( LDAP_DEBUG_TRACE, " backsql_dn2id(\"%s\"): "
217 "error binding dn=\"%s\" parameter:\n",
218 ndn->bv_val, tbbDN.bv_val, 0 );
219 backsql_PrintErrors( bi->sql_db_env, dbh, sth, rc );
224 rc = SQLExecute( sth );
225 if ( rc != SQL_SUCCESS ) {
226 Debug( LDAP_DEBUG_TRACE, " backsql_dn2id(\"%s\"): "
227 "error executing query (\"%s\", \"%s\"):\n",
228 ndn->bv_val, bi->sql_id_query, tbbDN.bv_val );
229 backsql_PrintErrors( bi->sql_db_env, dbh, sth, rc );
234 backsql_BindRowAsStrings( sth, &row );
235 rc = SQLFetch( sth );
236 if ( BACKSQL_SUCCESS( rc ) ) {
237 char buf[ SLAP_TEXT_BUFLEN ];
240 snprintf( buf, sizeof(buf),
241 "id=%s keyval=%s oc_id=%s dn=%s",
242 row.cols[ 0 ], row.cols[ 1 ],
243 row.cols[ 2 ], row.cols[ 3 ] );
244 Debug( LDAP_DEBUG_TRACE,
245 " backsql_dn2id(\"%s\"): %s\n",
246 ndn->bv_val, buf, 0 );
247 #endif /* LDAP_DEBUG */
253 #ifdef BACKSQL_ARBITRARY_KEY
254 ber_str2bv_x( row.cols[ 0 ], 0, 1, &id->eid_id,
256 ber_str2bv_x( row.cols[ 1 ], 0, 1, &id->eid_keyval,
258 #else /* ! BACKSQL_ARBITRARY_KEY */
259 id->eid_id = strtol( row.cols[ 0 ], NULL, 0 );
260 id->eid_keyval = strtol( row.cols[ 1 ], NULL, 0 );
261 #endif /* ! BACKSQL_ARBITRARY_KEY */
262 id->eid_oc_id = strtol( row.cols[ 2 ], NULL, 0 );
264 ber_str2bv( row.cols[ 3 ], 0, 0, &dn );
266 if ( backsql_api_odbc2dn( op, rs, &dn ) ) {
270 res = dnPrettyNormal( NULL, &dn,
271 &id->eid_dn, &id->eid_ndn,
273 if ( res != LDAP_SUCCESS ) {
274 Debug( LDAP_DEBUG_TRACE,
275 " backsql_dn2id(\"%s\"): "
276 "dnPrettyNormal failed (%d: %s)\n",
278 ldap_err2string( res ) );
281 (void)backsql_free_entryID( op, id, 0 );
284 if ( dn.bv_val != row.cols[ 3 ] ) {
293 res = LDAP_NO_SUCH_OBJECT;
295 struct berval pdn = *ndn;
300 rs->sr_matched = NULL;
301 while ( !be_issuffix( op->o_bd, &pdn ) ) {
302 char *matchedDN = NULL;
304 dnParent( &pdn, &pdn );
307 * Empty DN ("") defaults to LDAP_SUCCESS
309 rs->sr_err = backsql_dn2id( op, rs, dbh, &pdn, id, 0, 1 );
310 switch ( rs->sr_err ) {
311 case LDAP_NO_SUCH_OBJECT:
312 /* try another one */
316 matchedDN = pdn.bv_val;
317 /* fail over to next case */
320 rs->sr_err = LDAP_NO_SUCH_OBJECT;
321 rs->sr_matched = matchedDN;
327 backsql_FreeRow( &row );
330 Debug( LDAP_DEBUG_TRACE,
331 "<==backsql_dn2id(\"%s\"): err=%d\n",
332 ndn->bv_val, res, 0 );
333 if ( sth != SQL_NULL_HSTMT ) {
334 SQLFreeStmt( sth, SQL_DROP );
337 if ( !BER_BVISNULL( &realndn ) && realndn.bv_val != ndn->bv_val ) {
338 ch_free( realndn.bv_val );
345 backsql_count_children(
349 unsigned long *nchildren )
351 SQLHSTMT sth = SQL_NULL_HSTMT;
354 int res = LDAP_SUCCESS;
356 Debug( LDAP_DEBUG_TRACE, "==>backsql_count_children(): dn=\"%s\"\n",
359 if ( dn->bv_len > BACKSQL_MAX_DN_LEN ) {
360 Debug( LDAP_DEBUG_TRACE,
361 "backsql_count_children(): DN \"%s\" (%ld bytes) "
362 "exceeds max DN length (%d):\n",
363 dn->bv_val, dn->bv_len, BACKSQL_MAX_DN_LEN );
368 Debug(LDAP_DEBUG_TRACE, "children id query \"%s\"\n",
369 bi->sql_has_children_query, 0, 0);
370 assert( bi->sql_has_children_query != NULL );
371 rc = backsql_Prepare( dbh, &sth, bi->sql_has_children_query, 0 );
372 if ( rc != SQL_SUCCESS ) {
373 Debug( LDAP_DEBUG_TRACE,
374 "backsql_count_children(): error preparing SQL:\n%s",
375 bi->sql_has_children_query, 0, 0);
376 backsql_PrintErrors( bi->sql_db_env, dbh, sth, rc );
377 SQLFreeStmt( sth, SQL_DROP );
381 rc = backsql_BindParamBerVal( sth, 1, SQL_PARAM_INPUT, dn );
382 if ( rc != SQL_SUCCESS) {
384 Debug( LDAP_DEBUG_TRACE, "backsql_count_children(): "
385 "error binding dn=\"%s\" parameter:\n",
387 backsql_PrintErrors( bi->sql_db_env, dbh, sth, rc );
388 SQLFreeStmt( sth, SQL_DROP );
392 rc = SQLExecute( sth );
393 if ( rc != SQL_SUCCESS ) {
394 Debug( LDAP_DEBUG_TRACE, "backsql_count_children(): "
395 "error executing query (\"%s\", \"%s\"):\n",
396 bi->sql_has_children_query, dn->bv_val, 0 );
397 backsql_PrintErrors( bi->sql_db_env, dbh, sth, rc );
398 SQLFreeStmt( sth, SQL_DROP );
402 backsql_BindRowAsStrings( sth, &row );
404 rc = SQLFetch( sth );
405 if ( BACKSQL_SUCCESS( rc ) ) {
408 *nchildren = strtol( row.cols[ 0 ], &end, 0 );
409 if ( end[ 0 ] != '\0' && end[0] != '.' ) {
410 /* FIXME: braindead RDBMSes return
411 * a fractional number from COUNT!
419 backsql_FreeRow( &row );
421 SQLFreeStmt( sth, SQL_DROP );
423 Debug( LDAP_DEBUG_TRACE, "<==backsql_count_children(): %lu\n",
430 backsql_has_children(
435 unsigned long nchildren;
438 rc = backsql_count_children( bi, dbh, dn, &nchildren );
440 if ( rc == LDAP_SUCCESS ) {
441 return nchildren > 0 ? LDAP_COMPARE_TRUE : LDAP_COMPARE_FALSE;
448 backsql_get_attr_vals( void *v_at, void *v_bsi )
450 backsql_at_map_rec *at = v_at;
451 backsql_srch_info *bsi = v_bsi;
452 backsql_info *bi = (backsql_info *)bsi->bsi_op->o_bd->be_private;
454 SQLHSTMT sth = SQL_NULL_HSTMT;
459 #ifdef BACKSQL_COUNTQUERY
461 countsize = sizeof( count ),
464 Attribute *attr = NULL;
466 slap_mr_normalize_func *normfunc = NULL;
467 #endif /* BACKSQL_COUNTQUERY */
468 #ifdef BACKSQL_PRETTY_VALIDATE
469 slap_syntax_validate_func *validate = NULL;
470 slap_syntax_transform_func *pretty = NULL;
471 #endif /* BACKSQL_PRETTY_VALIDATE */
473 assert( at != NULL );
474 assert( bsi != NULL );
476 #ifdef BACKSQL_ARBITRARY_KEY
477 Debug( LDAP_DEBUG_TRACE, "==>backsql_get_attr_vals(): "
478 "oc=\"%s\" attr=\"%s\" keyval=%s\n",
479 BACKSQL_OC_NAME( bsi->bsi_oc ), at->bam_ad->ad_cname.bv_val,
480 bsi->bsi_c_eid->eid_keyval.bv_val );
481 #else /* ! BACKSQL_ARBITRARY_KEY */
482 Debug( LDAP_DEBUG_TRACE, "==>backsql_get_attr_vals(): "
483 "oc=\"%s\" attr=\"%s\" keyval=%ld\n",
484 BACKSQL_OC_NAME( bsi->bsi_oc ), at->bam_ad->ad_cname.bv_val,
485 bsi->bsi_c_eid->eid_keyval );
486 #endif /* ! BACKSQL_ARBITRARY_KEY */
488 #ifdef BACKSQL_PRETTY_VALIDATE
489 validate = at->bam_ad->ad_type->sat_syntax->ssyn_validate;
490 pretty = at->bam_ad->ad_type->sat_syntax->ssyn_pretty;
492 if ( validate == NULL && pretty == NULL ) {
495 #endif /* BACKSQL_PRETTY_VALIDATE */
497 #ifdef BACKSQL_COUNTQUERY
498 if ( at->bam_ad->ad_type->sat_equality ) {
499 normfunc = at->bam_ad->ad_type->sat_equality->smr_normalize;
502 /* Count how many rows will be returned. This avoids memory
503 * fragmentation that can result from loading the values in
504 * one by one and using realloc()
506 rc = backsql_Prepare( bsi->bsi_dbh, &sth, at->bam_countquery, 0 );
507 if ( rc != SQL_SUCCESS ) {
508 Debug( LDAP_DEBUG_TRACE, "backsql_get_attr_vals(): "
509 "error preparing count query: %s\n",
510 at->bam_countquery, 0, 0 );
511 backsql_PrintErrors( bi->sql_db_env, bsi->bsi_dbh, sth, rc );
515 rc = backsql_BindParamID( sth, 1, SQL_PARAM_INPUT,
516 &bsi->bsi_c_eid->eid_keyval );
517 if ( rc != SQL_SUCCESS ) {
518 Debug( LDAP_DEBUG_TRACE, "backsql_get_attr_vals(): "
519 "error binding key value parameter\n", 0, 0, 0 );
520 SQLFreeStmt( sth, SQL_DROP );
524 rc = SQLExecute( sth );
525 if ( ! BACKSQL_SUCCESS( rc ) ) {
526 Debug( LDAP_DEBUG_TRACE, "backsql_get_attr_vals(): "
527 "error executing attribute count query '%s'\n",
528 at->bam_countquery, 0, 0 );
529 backsql_PrintErrors( bi->sql_db_env, bsi->bsi_dbh, sth, rc );
530 SQLFreeStmt( sth, SQL_DROP );
534 SQLBindCol( sth, (SQLUSMALLINT)1, SQL_C_LONG,
536 (SQLINTEGER)sizeof( count ),
539 rc = SQLFetch( sth );
540 if ( rc != SQL_SUCCESS ) {
541 Debug( LDAP_DEBUG_TRACE, "backsql_get_attr_vals(): "
542 "error fetch results of count query: %s\n",
543 at->bam_countquery, 0, 0 );
544 backsql_PrintErrors( bi->sql_db_env, bsi->bsi_dbh, sth, rc );
545 SQLFreeStmt( sth, SQL_DROP );
549 Debug( LDAP_DEBUG_TRACE, "backsql_get_attr_vals(): "
550 "number of values in query: %d\n", count, 0, 0 );
551 SQLFreeStmt( sth, SQL_DROP );
556 attr = attr_find( bsi->bsi_e->e_attrs, at->bam_ad );
557 if ( attr != NULL ) {
560 if ( attr->a_vals != NULL ) {
561 for ( ; !BER_BVISNULL( &attr->a_vals[ oldcount ] ); oldcount++ )
565 tmp = ch_realloc( attr->a_vals, ( oldcount + count + 1 ) * sizeof( struct berval ) );
570 memset( &attr->a_vals[ oldcount ], 0, ( count + 1 ) * sizeof( struct berval ) );
573 tmp = ch_realloc( attr->a_nvals, ( oldcount + count + 1 ) * sizeof( struct berval ) );
578 memset( &attr->a_nvals[ oldcount ], 0, ( count + 1 ) * sizeof( struct berval ) );
581 attr->a_nvals = attr->a_vals;
587 /* Make space for the array of values */
588 attr = (Attribute *) ch_malloc( sizeof( Attribute ) );
589 attr->a_desc = at->bam_ad;
592 attr->a_vals = ch_calloc( count + 1, sizeof( struct berval ) );
593 if ( attr->a_vals == NULL ) {
594 Debug( LDAP_DEBUG_TRACE, "Out of memory!\n", 0,0,0 );
598 memset( attr->a_vals, 0, ( count + 1 ) * sizeof( struct berval ) );
600 attr->a_nvals = ch_calloc( count + 1, sizeof( struct berval ) );
601 if ( attr->a_nvals == NULL ) {
602 ch_free( attr->a_vals );
607 memset( attr->a_nvals, 0, ( count + 1 ) * sizeof( struct berval ) );
611 attr->a_nvals = attr->a_vals;
614 #endif /* BACKSQL_COUNTQUERY */
616 rc = backsql_Prepare( bsi->bsi_dbh, &sth, at->bam_query, 0 );
617 if ( rc != SQL_SUCCESS ) {
618 Debug( LDAP_DEBUG_TRACE, "backsql_get_attr_vals(): "
619 "error preparing query: %s\n", at->bam_query, 0, 0 );
620 backsql_PrintErrors( bi->sql_db_env, bsi->bsi_dbh, sth, rc );
624 rc = backsql_BindParamID( sth, 1, SQL_PARAM_INPUT,
625 &bsi->bsi_c_eid->eid_keyval );
626 if ( rc != SQL_SUCCESS ) {
627 Debug( LDAP_DEBUG_TRACE, "backsql_get_attr_vals(): "
628 "error binding key value parameter\n", 0, 0, 0 );
633 #ifdef BACKSQL_ARBITRARY_KEY
634 Debug( LDAP_DEBUG_TRACE, "backsql_get_attr_vals(): "
635 "query=\"%s\" keyval=%s\n", at->bam_query,
636 bsi->bsi_c_eid->eid_keyval.bv_val, 0 );
637 #else /* !BACKSQL_ARBITRARY_KEY */
638 Debug( LDAP_DEBUG_TRACE, "backsql_get_attr_vals(): "
639 "query=\"%s\" keyval=%d\n", at->bam_query,
640 bsi->bsi_c_eid->eid_keyval, 0 );
641 #endif /* ! BACKSQL_ARBITRARY_KEY */
642 #endif /* BACKSQL_TRACE */
644 rc = SQLExecute( sth );
645 if ( ! BACKSQL_SUCCESS( rc ) ) {
646 Debug( LDAP_DEBUG_TRACE, "backsql_get_attr_vals(): "
647 "error executing attribute query \"%s\"\n",
648 at->bam_query, 0, 0 );
649 backsql_PrintErrors( bi->sql_db_env, bsi->bsi_dbh, sth, rc );
650 SQLFreeStmt( sth, SQL_DROP );
654 backsql_BindRowAsStrings( sth, &row );
655 #ifdef BACKSQL_COUNTQUERY
657 #endif /* BACKSQL_COUNTQUERY */
658 for ( rc = SQLFetch( sth ), k = 0;
659 BACKSQL_SUCCESS( rc );
660 rc = SQLFetch( sth ), k++ )
662 for ( i = 0; i < row.ncols; i++ ) {
664 if ( row.value_len[ i ] > 0 ) {
668 AttributeDescription *ad = NULL;
671 retval = slap_bv2ad( &row.col_names[ i ], &ad, &text );
672 if ( retval != LDAP_SUCCESS ) {
673 Debug( LDAP_DEBUG_ANY,
674 "==>backsql_get_attr_vals(\"%s\"): "
675 "unable to find AttributeDescription %s "
677 bsi->bsi_e->e_name.bv_val,
678 row.col_names[ i ].bv_val, retval );
682 if ( ad != at->bam_ad ) {
683 Debug( LDAP_DEBUG_ANY,
684 "==>backsql_get_attr_vals(\"%s\"): "
685 "column name %s differs from "
686 "AttributeDescription %s\n",
687 bsi->bsi_e->e_name.bv_val,
689 at->bam_ad->ad_cname.bv_val );
692 #endif /* BACKSQL_TRACE */
695 * FIXME: what if a binary
698 ber_str2bv( row.cols[ i ], 0, 0, &bv );
700 #ifdef BACKSQL_PRETTY_VALIDATE
704 retval = pretty( at->bam_ad->ad_type->sat_syntax,
705 &bv, &pbv, bsi->bsi_op->o_tmpmemctx );
709 retval = validate( at->bam_ad->ad_type->sat_syntax,
713 if ( retval != LDAP_SUCCESS ) {
714 char buf[ SLAP_TEXT_BUFLEN ];
716 /* FIXME: we're ignoring invalid values,
717 * but we're accepting the attributes;
718 * should we fail at all? */
719 snprintf( buf, sizeof( buf ),
720 "unable to %s value #%d "
721 "of AttributeDescription %s",
722 pretty ? "prettify" : "validate",
723 at->bam_ad->ad_cname.bv_val,
725 Debug( LDAP_DEBUG_TRACE,
726 "==>backsql_get_attr_vals(\"%s\"): "
728 bsi->bsi_e->e_name.bv_val, buf, retval );
731 #endif /* BACKSQL_PRETTY_VALIDATE */
733 #ifndef BACKSQL_COUNTQUERY
734 (void)backsql_entry_addattr( bsi->bsi_e,
736 bsi->bsi_op->o_tmpmemctx );
738 #else /* BACKSQL_COUNTQUERY */
742 retval = (*normfunc)( SLAP_MR_VALUE_OF_ATTRIBUTE_SYNTAX,
743 at->bam_ad->ad_type->sat_syntax,
744 at->bam_ad->ad_type->sat_equality,
746 bsi->bsi_op->o_tmpmemctx );
748 if ( retval != LDAP_SUCCESS ) {
749 char buf[ SLAP_TEXT_BUFLEN ];
751 /* FIXME: we're ignoring invalid values,
752 * but we're accepting the attributes;
753 * should we fail at all? */
754 snprintf( buf, sizeof( buf ),
755 "unable to normalize value #%d "
756 "of AttributeDescription %s",
757 at->bam_ad->ad_cname.bv_val,
759 Debug( LDAP_DEBUG_TRACE,
760 "==>backsql_get_attr_vals(\"%s\"): "
762 bsi->bsi_e->e_name.bv_val, buf, retval );
764 #ifdef BACKSQL_PRETTY_VALIDATE
766 bsi->bsi_op->o_tmpfree( bv.bv_val,
767 bsi->bsi_op->o_tmpmemctx );
769 #endif /* BACKSQL_PRETTY_VALIDATE */
773 ber_dupbv( &attr->a_nvals[ j ], &nbv );
774 bsi->bsi_op->o_tmpfree( nbv.bv_val,
775 bsi->bsi_op->o_tmpmemctx );
778 ber_dupbv( &attr->a_vals[ j ], &bv );
780 assert( j < oldcount + count );
782 #endif /* BACKSQL_COUNTQUERY */
784 #ifdef BACKSQL_PRETTY_VALIDATE
786 bsi->bsi_op->o_tmpfree( bv.bv_val,
787 bsi->bsi_op->o_tmpmemctx );
789 #endif /* BACKSQL_PRETTY_VALIDATE */
792 Debug( LDAP_DEBUG_TRACE, "prec=%d\n",
793 (int)row.col_prec[ i ], 0, 0 );
796 Debug( LDAP_DEBUG_TRACE, "NULL value "
797 "in this row for attribute \"%s\"\n",
798 row.col_names[ i ].bv_val, 0, 0 );
799 #endif /* BACKSQL_TRACE */
804 #ifdef BACKSQL_COUNTQUERY
805 if ( BER_BVISNULL( &attr->a_vals[ 0 ] ) ) {
806 /* don't leave around attributes with no values */
809 } else if ( append ) {
812 for ( ap = &bsi->bsi_e->e_attrs; (*ap) != NULL; ap = &(*ap)->a_next )
816 #endif /* BACKSQL_COUNTQUERY */
818 backsql_FreeRow( &row );
819 SQLFreeStmt( sth, SQL_DROP );
820 Debug( LDAP_DEBUG_TRACE, "<==backsql_get_attr_vals()\n", 0, 0, 0 );
822 if ( at->bam_next ) {
823 return backsql_get_attr_vals( at->bam_next, v_bsi );
830 backsql_id2entry( backsql_srch_info *bsi, backsql_entryID *eid )
832 Operation *op = bsi->bsi_op;
833 backsql_info *bi = (backsql_info *)op->o_bd->be_private;
837 Debug( LDAP_DEBUG_TRACE, "==>backsql_id2entry()\n", 0, 0, 0 );
839 assert( bsi->bsi_e != NULL );
841 memset( bsi->bsi_e, 0, sizeof( Entry ) );
843 if ( bi->sql_baseObject && BACKSQL_IS_BASEOBJECT_ID( &eid->eid_id ) ) {
846 e = entry_dup( bi->sql_baseObject );
848 return LDAP_NO_MEMORY;
856 ber_dupbv_x( &bsi->bsi_e->e_name, &eid->eid_dn, op->o_tmpmemctx );
857 ber_dupbv_x( &bsi->bsi_e->e_nname, &eid->eid_ndn, op->o_tmpmemctx );
859 bsi->bsi_e->e_attrs = NULL;
860 bsi->bsi_e->e_private = NULL;
862 bsi->bsi_oc = backsql_id2oc( bsi->bsi_op->o_bd->be_private,
864 bsi->bsi_c_eid = eid;
866 #ifndef BACKSQL_ARBITRARY_KEY
868 bsi->bsi_e->e_id = eid->eid_id;
869 #endif /* ! BACKSQL_ARBITRARY_KEY */
871 rc = attr_merge_normalize_one( bsi->bsi_e,
872 slap_schema.si_ad_objectClass,
873 &bsi->bsi_oc->bom_oc->soc_cname,
874 bsi->bsi_op->o_tmpmemctx );
875 if ( rc != LDAP_SUCCESS ) {
876 backsql_entry_clean( op, bsi->bsi_e );
880 if ( bsi->bsi_attrs == NULL || ( bsi->bsi_flags & BSQL_SF_ALL_USER ) )
882 Debug( LDAP_DEBUG_TRACE, "backsql_id2entry(): "
883 "retrieving all attributes\n", 0, 0, 0 );
884 avl_apply( bsi->bsi_oc->bom_attrs, backsql_get_attr_vals,
885 bsi, 0, AVL_INORDER );
888 Debug( LDAP_DEBUG_TRACE, "backsql_id2entry(): "
889 "custom attribute list\n", 0, 0, 0 );
890 for ( i = 0; !BER_BVISNULL( &bsi->bsi_attrs[ i ].an_name ); i++ ) {
891 backsql_at_map_rec **vat;
892 AttributeName *an = &bsi->bsi_attrs[ i ];
895 /* if one of the attributes listed here is
896 * a subtype of another, it must be ignored,
897 * because subtypes are already dealt with
898 * by backsql_supad2at()
900 for ( j = 0; !BER_BVISNULL( &bsi->bsi_attrs[ j ].an_name ); j++ ) {
907 if ( is_at_subtype( an->an_desc->ad_type,
908 bsi->bsi_attrs[ j ].an_desc->ad_type ) )
914 rc = backsql_supad2at( bsi->bsi_oc, an->an_desc, &vat );
915 if ( rc != 0 || vat == NULL ) {
916 Debug( LDAP_DEBUG_TRACE, "backsql_id2entry(): "
917 "attribute \"%s\" is not defined "
918 "for objectlass \"%s\"\n",
920 BACKSQL_OC_NAME( bsi->bsi_oc ), 0 );
924 for ( j = 0; vat[j]; j++ ) {
925 backsql_get_attr_vals( vat[j], bsi );
934 if ( bsi->bsi_flags & BSQL_SF_RETURN_ENTRYUUID ) {
935 Attribute *a_entryUUID,
938 a_entryUUID = backsql_operational_entryUUID( bi, eid );
939 if ( a_entryUUID != NULL ) {
940 for ( ap = &bsi->bsi_e->e_attrs;
942 ap = &(*ap)->a_next );
948 if ( ( bsi->bsi_flags & BSQL_SF_ALL_OPER )
949 || an_find( bsi->bsi_attrs, &AllOper )
950 || an_find( bsi->bsi_attrs, &slap_schema.si_ad_structuralObjectClass->ad_cname ) )
952 if ( BACKSQL_CHECK_SCHEMA( bi ) ) {
954 const char *text = NULL;
955 char textbuf[ 1024 ];
956 size_t textlen = sizeof( textbuf );
960 int rc = LDAP_SUCCESS;
962 a = attr_find( bsi->bsi_e->e_attrs,
963 slap_schema.si_ad_objectClass );
968 bv[ 0 ] = bsi->bsi_oc->bom_oc->soc_cname;
969 BER_BVZERO( &bv[ 1 ] );
973 rc = structural_class( nvals, &soc, NULL,
974 &text, textbuf, textlen );
975 if ( rc != LDAP_SUCCESS ) {
976 Debug( LDAP_DEBUG_TRACE, "backsql_id2entry(%s): "
977 "structural_class() failed %d (%s)\n",
978 bsi->bsi_e->e_name.bv_val,
979 rc, text ? text : "" );
980 backsql_entry_clean( op, bsi->bsi_e );
984 if ( !bvmatch( &soc, &bsi->bsi_oc->bom_oc->soc_cname ) ) {
985 Debug( LDAP_DEBUG_TRACE, "backsql_id2entry(%s): "
986 "computed structuralObjectClass %s "
987 "does not match objectClass %s associated "
989 bsi->bsi_e->e_name.bv_val, soc.bv_val,
990 bsi->bsi_oc->bom_oc->soc_cname.bv_val );
991 backsql_entry_clean( op, bsi->bsi_e );
996 rc = attr_merge_normalize_one( bsi->bsi_e,
997 slap_schema.si_ad_structuralObjectClass,
998 &bsi->bsi_oc->bom_oc->soc_cname,
999 bsi->bsi_op->o_tmpmemctx );
1000 if ( rc != LDAP_SUCCESS ) {
1001 backsql_entry_clean( op, bsi->bsi_e );
1007 Debug( LDAP_DEBUG_TRACE, "<==backsql_id2entry()\n", 0, 0, 0 );
1009 return LDAP_SUCCESS;