2 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
4 * Copyright 1999-2013 The OpenLDAP Foundation.
5 * Portions Copyright 1999 Dmitry Kovalev.
6 * Portions Copyright 2002 Pierangelo Masarati.
7 * Portions Copyright 2004 Mark Adamson.
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted only as authorized by the OpenLDAP
14 * A copy of this license is available in the file LICENSE in the
15 * top-level directory of the distribution or, alternatively, at
16 * <http://www.OpenLDAP.org/license.html>.
19 * This work was initially developed by Dmitry Kovalev for inclusion
20 * by OpenLDAP Software. Additional significant contributors include
21 * Pierangelo Masarati and Mark Adamson.
27 #include <sys/types.h>
28 #include "ac/string.h"
32 #include "proto-sql.h"
34 #ifdef BACKSQL_ARBITRARY_KEY
35 struct berval backsql_baseObject_bv = BER_BVC( BACKSQL_BASEOBJECT_IDSTR );
36 #endif /* BACKSQL_ARBITRARY_KEY */
39 backsql_entryID_dup( backsql_entryID *src, void *ctx )
43 if ( src == NULL ) return NULL;
45 dst = slap_sl_calloc( 1, sizeof( backsql_entryID ), ctx );
46 ber_dupbv_x( &dst->eid_ndn, &src->eid_ndn, ctx );
47 if ( src->eid_dn.bv_val == src->eid_ndn.bv_val ) {
48 dst->eid_dn = dst->eid_ndn;
50 ber_dupbv_x( &dst->eid_dn, &src->eid_dn, ctx );
53 #ifdef BACKSQL_ARBITRARY_KEY
54 ber_dupbv_x( &dst->eid_id, &src->eid_id, ctx );
55 ber_dupbv_x( &dst->eid_keyval, &src->eid_keyval, ctx );
56 #else /* ! BACKSQL_ARBITRARY_KEY */
57 dst->eid_id = src->eid_id;
58 dst->eid_keyval = src->eid_keyval;
59 #endif /* ! BACKSQL_ARBITRARY_KEY */
61 dst->eid_oc = src->eid_oc;
62 dst->eid_oc_id = src->eid_oc_id;
68 backsql_free_entryID( backsql_entryID *id, int freeit, void *ctx )
70 backsql_entryID *next;
76 if ( !BER_BVISNULL( &id->eid_ndn ) ) {
77 if ( !BER_BVISNULL( &id->eid_dn )
78 && id->eid_dn.bv_val != id->eid_ndn.bv_val )
80 slap_sl_free( id->eid_dn.bv_val, ctx );
81 BER_BVZERO( &id->eid_dn );
84 slap_sl_free( id->eid_ndn.bv_val, ctx );
85 BER_BVZERO( &id->eid_ndn );
88 #ifdef BACKSQL_ARBITRARY_KEY
89 if ( !BER_BVISNULL( &id->eid_id ) ) {
90 slap_sl_free( id->eid_id.bv_val, ctx );
91 BER_BVZERO( &id->eid_id );
94 if ( !BER_BVISNULL( &id->eid_keyval ) ) {
95 slap_sl_free( id->eid_keyval.bv_val, ctx );
96 BER_BVZERO( &id->eid_keyval );
98 #endif /* BACKSQL_ARBITRARY_KEY */
101 slap_sl_free( id, ctx );
108 * NOTE: the dn must be normalized
120 backsql_info *bi = op->o_bd->be_private;
121 SQLHSTMT sth = SQL_NULL_HSTMT;
122 BACKSQL_ROW_NTS row = { 0 };
125 struct berval realndn = BER_BVNULL;
128 char upperdn[ BACKSQL_MAX_DN_LEN + 1 ];
133 * NOTE: id can be NULL; in this case, the function
134 * simply checks whether the DN can be successfully
135 * turned into an ID, returning LDAP_SUCCESS for
136 * positive cases, or the most appropriate error
139 Debug( LDAP_DEBUG_TRACE, "==>backsql_dn2id(\"%s\")%s%s\n",
140 ndn->bv_val, id == NULL ? " (no ID expected)" : "",
141 matched ? " matched expected" : "" );
144 /* NOTE: trap inconsistencies */
145 assert( BER_BVISNULL( &id->eid_ndn ) );
148 if ( ndn->bv_len > BACKSQL_MAX_DN_LEN ) {
149 Debug( LDAP_DEBUG_TRACE,
150 " backsql_dn2id(\"%s\"): DN length=%ld "
151 "exceeds max DN length %d:\n",
152 ndn->bv_val, ndn->bv_len, BACKSQL_MAX_DN_LEN );
156 /* return baseObject if available and matches */
157 /* FIXME: if ndn is already mucked, we cannot check this */
158 if ( bi->sql_baseObject != NULL &&
159 dn_match( ndn, &bi->sql_baseObject->e_nname ) )
162 #ifdef BACKSQL_ARBITRARY_KEY
163 ber_dupbv_x( &id->eid_id, &backsql_baseObject_bv,
165 ber_dupbv_x( &id->eid_keyval, &backsql_baseObject_bv,
167 #else /* ! BACKSQL_ARBITRARY_KEY */
168 id->eid_id = BACKSQL_BASEOBJECT_ID;
169 id->eid_keyval = BACKSQL_BASEOBJECT_KEYVAL;
170 #endif /* ! BACKSQL_ARBITRARY_KEY */
171 id->eid_oc_id = BACKSQL_BASEOBJECT_OC;
173 ber_dupbv_x( &id->eid_ndn, &bi->sql_baseObject->e_nname,
175 ber_dupbv_x( &id->eid_dn, &bi->sql_baseObject->e_name,
185 assert( bi->sql_id_query != NULL );
186 Debug( LDAP_DEBUG_TRACE, " backsql_dn2id(\"%s\"): id_query \"%s\"\n",
187 ndn->bv_val, bi->sql_id_query, 0 );
188 rc = backsql_Prepare( dbh, &sth, bi->sql_id_query, 0 );
189 if ( rc != SQL_SUCCESS ) {
190 Debug( LDAP_DEBUG_TRACE,
191 " backsql_dn2id(\"%s\"): "
192 "error preparing SQL:\n %s",
193 ndn->bv_val, bi->sql_id_query, 0 );
194 backsql_PrintErrors( bi->sql_db_env, dbh, sth, rc );
201 if ( backsql_api_dn2odbc( op, rs, &realndn ) ) {
202 Debug( LDAP_DEBUG_TRACE, " backsql_dn2id(\"%s\"): "
203 "backsql_api_dn2odbc(\"%s\") failed\n",
204 ndn->bv_val, realndn.bv_val, 0 );
210 if ( BACKSQL_HAS_LDAPINFO_DN_RU( bi ) ) {
212 * Prepare an upper cased, byte reversed version
213 * that can be searched using indexes
216 for ( i = 0, j = realndn.bv_len - 1; realndn.bv_val[ i ]; i++, j--)
218 upperdn[ i ] = realndn.bv_val[ j ];
221 ldap_pvt_str2upper( upperdn );
223 Debug( LDAP_DEBUG_TRACE, " backsql_dn2id(\"%s\"): "
225 ndn->bv_val, upperdn, 0 );
226 ber_str2bv( upperdn, 0, 0, &tbbDN );
229 if ( BACKSQL_USE_REVERSE_DN( bi ) ) {
230 AC_MEMCPY( upperdn, realndn.bv_val, realndn.bv_len + 1 );
231 ldap_pvt_str2upper( upperdn );
232 Debug( LDAP_DEBUG_TRACE,
233 " backsql_dn2id(\"%s\"): "
235 ndn->bv_val, upperdn, 0 );
236 ber_str2bv( upperdn, 0, 0, &tbbDN );
243 rc = backsql_BindParamBerVal( sth, 1, SQL_PARAM_INPUT, &tbbDN );
244 if ( rc != SQL_SUCCESS) {
246 Debug( LDAP_DEBUG_TRACE, " backsql_dn2id(\"%s\"): "
247 "error binding dn=\"%s\" parameter:\n",
248 ndn->bv_val, tbbDN.bv_val, 0 );
249 backsql_PrintErrors( bi->sql_db_env, dbh, sth, rc );
254 rc = SQLExecute( sth );
255 if ( rc != SQL_SUCCESS ) {
256 Debug( LDAP_DEBUG_TRACE, " backsql_dn2id(\"%s\"): "
257 "error executing query (\"%s\", \"%s\"):\n",
258 ndn->bv_val, bi->sql_id_query, tbbDN.bv_val );
259 backsql_PrintErrors( bi->sql_db_env, dbh, sth, rc );
264 backsql_BindRowAsStrings_x( sth, &row, op->o_tmpmemctx );
265 rc = SQLFetch( sth );
266 if ( BACKSQL_SUCCESS( rc ) ) {
267 char buf[ SLAP_TEXT_BUFLEN ];
270 snprintf( buf, sizeof(buf),
271 "id=%s keyval=%s oc_id=%s dn=%s",
272 row.cols[ 0 ], row.cols[ 1 ],
273 row.cols[ 2 ], row.cols[ 3 ] );
274 Debug( LDAP_DEBUG_TRACE,
275 " backsql_dn2id(\"%s\"): %s\n",
276 ndn->bv_val, buf, 0 );
277 #endif /* LDAP_DEBUG */
285 #ifdef BACKSQL_ARBITRARY_KEY
286 ber_str2bv_x( row.cols[ 0 ], 0, 1, &id->eid_id,
288 ber_str2bv_x( row.cols[ 1 ], 0, 1, &id->eid_keyval,
290 #else /* ! BACKSQL_ARBITRARY_KEY */
291 if ( BACKSQL_STR2ID( &id->eid_id, row.cols[ 0 ], 0 ) != 0 ) {
295 if ( BACKSQL_STR2ID( &id->eid_keyval, row.cols[ 1 ], 0 ) != 0 ) {
299 #endif /* ! BACKSQL_ARBITRARY_KEY */
300 if ( BACKSQL_STR2ID( &id->eid_oc_id, row.cols[ 2 ], 0 ) != 0 ) {
305 ber_str2bv( row.cols[ 3 ], 0, 0, &dn );
307 if ( backsql_api_odbc2dn( op, rs, &dn ) ) {
312 res = dnPrettyNormal( NULL, &dn,
313 &id->eid_dn, &id->eid_ndn,
315 if ( res != LDAP_SUCCESS ) {
316 Debug( LDAP_DEBUG_TRACE,
317 " backsql_dn2id(\"%s\"): "
318 "dnPrettyNormal failed (%d: %s)\n",
320 ldap_err2string( res ) );
323 (void)backsql_free_entryID( id, 0, op->o_tmpmemctx );
326 if ( dn.bv_val != row.cols[ 3 ] ) {
332 res = LDAP_NO_SUCH_OBJECT;
334 struct berval pdn = *ndn;
339 rs->sr_matched = NULL;
340 while ( !be_issuffix( op->o_bd, &pdn ) ) {
341 char *matchedDN = NULL;
343 dnParent( &pdn, &pdn );
346 * Empty DN ("") defaults to LDAP_SUCCESS
348 rs->sr_err = backsql_dn2id( op, rs, dbh, &pdn, id, 0, 1 );
349 switch ( rs->sr_err ) {
350 case LDAP_NO_SUCH_OBJECT:
351 /* try another one */
355 matchedDN = pdn.bv_val;
356 /* fail over to next case */
359 rs->sr_err = LDAP_NO_SUCH_OBJECT;
360 rs->sr_matched = matchedDN;
368 backsql_FreeRow_x( &row, op->o_tmpmemctx );
370 Debug( LDAP_DEBUG_TRACE,
371 "<==backsql_dn2id(\"%s\"): err=%d\n",
372 ndn->bv_val, res, 0 );
373 if ( sth != SQL_NULL_HSTMT ) {
374 SQLFreeStmt( sth, SQL_DROP );
377 if ( !BER_BVISNULL( &realndn ) && realndn.bv_val != ndn->bv_val ) {
378 ch_free( realndn.bv_val );
385 backsql_count_children(
389 unsigned long *nchildren )
391 backsql_info *bi = (backsql_info *)op->o_bd->be_private;
392 SQLHSTMT sth = SQL_NULL_HSTMT;
395 int res = LDAP_SUCCESS;
397 Debug( LDAP_DEBUG_TRACE, "==>backsql_count_children(): dn=\"%s\"\n",
400 if ( dn->bv_len > BACKSQL_MAX_DN_LEN ) {
401 Debug( LDAP_DEBUG_TRACE,
402 "backsql_count_children(): DN \"%s\" (%ld bytes) "
403 "exceeds max DN length (%d):\n",
404 dn->bv_val, dn->bv_len, BACKSQL_MAX_DN_LEN );
409 assert( bi->sql_has_children_query != NULL );
410 Debug(LDAP_DEBUG_TRACE, "children id query \"%s\"\n",
411 bi->sql_has_children_query, 0, 0);
412 rc = backsql_Prepare( dbh, &sth, bi->sql_has_children_query, 0 );
413 if ( rc != SQL_SUCCESS ) {
414 Debug( LDAP_DEBUG_TRACE,
415 "backsql_count_children(): error preparing SQL:\n%s",
416 bi->sql_has_children_query, 0, 0);
417 backsql_PrintErrors( bi->sql_db_env, dbh, sth, rc );
418 SQLFreeStmt( sth, SQL_DROP );
422 rc = backsql_BindParamBerVal( sth, 1, SQL_PARAM_INPUT, dn );
423 if ( rc != SQL_SUCCESS) {
425 Debug( LDAP_DEBUG_TRACE, "backsql_count_children(): "
426 "error binding dn=\"%s\" parameter:\n",
428 backsql_PrintErrors( bi->sql_db_env, dbh, sth, rc );
429 SQLFreeStmt( sth, SQL_DROP );
433 rc = SQLExecute( sth );
434 if ( rc != SQL_SUCCESS ) {
435 Debug( LDAP_DEBUG_TRACE, "backsql_count_children(): "
436 "error executing query (\"%s\", \"%s\"):\n",
437 bi->sql_has_children_query, dn->bv_val, 0 );
438 backsql_PrintErrors( bi->sql_db_env, dbh, sth, rc );
439 SQLFreeStmt( sth, SQL_DROP );
443 backsql_BindRowAsStrings_x( sth, &row, op->o_tmpmemctx );
445 rc = SQLFetch( sth );
446 if ( BACKSQL_SUCCESS( rc ) ) {
449 *nchildren = strtol( row.cols[ 0 ], &end, 0 );
450 if ( end == row.cols[ 0 ] ) {
454 switch ( end[ 0 ] ) {
461 /* FIXME: braindead RDBMSes return
462 * a fractional number from COUNT!
464 if ( lutil_atoul( &ul, end + 1 ) != 0 || ul != 0 ) {
477 backsql_FreeRow_x( &row, op->o_tmpmemctx );
479 SQLFreeStmt( sth, SQL_DROP );
481 Debug( LDAP_DEBUG_TRACE, "<==backsql_count_children(): %lu\n",
488 backsql_has_children(
493 unsigned long nchildren;
496 rc = backsql_count_children( op, dbh, dn, &nchildren );
498 if ( rc == LDAP_SUCCESS ) {
499 return nchildren > 0 ? LDAP_COMPARE_TRUE : LDAP_COMPARE_FALSE;
506 backsql_get_attr_vals( void *v_at, void *v_bsi )
508 backsql_at_map_rec *at = v_at;
509 backsql_srch_info *bsi = v_bsi;
512 SQLHSTMT sth = SQL_NULL_HSTMT;
518 #ifdef BACKSQL_COUNTQUERY
522 SQLLEN countsize = sizeof( count );
523 Attribute *attr = NULL;
525 slap_mr_normalize_func *normfunc = NULL;
526 #endif /* BACKSQL_COUNTQUERY */
527 #ifdef BACKSQL_PRETTY_VALIDATE
528 slap_syntax_validate_func *validate = NULL;
529 slap_syntax_transform_func *pretty = NULL;
530 #endif /* BACKSQL_PRETTY_VALIDATE */
532 assert( at != NULL );
533 assert( bsi != NULL );
534 Debug( LDAP_DEBUG_TRACE, "==>backsql_get_attr_vals(): "
535 "oc=\"%s\" attr=\"%s\" keyval=" BACKSQL_IDFMT "\n",
536 BACKSQL_OC_NAME( bsi->bsi_oc ), at->bam_ad->ad_cname.bv_val,
537 BACKSQL_IDARG(bsi->bsi_c_eid->eid_keyval) );
539 bi = (backsql_info *)bsi->bsi_op->o_bd->be_private;
541 #ifdef BACKSQL_PRETTY_VALIDATE
542 validate = at->bam_true_ad->ad_type->sat_syntax->ssyn_validate;
543 pretty = at->bam_true_ad->ad_type->sat_syntax->ssyn_pretty;
545 if ( validate == NULL && pretty == NULL ) {
548 #endif /* BACKSQL_PRETTY_VALIDATE */
550 #ifdef BACKSQL_COUNTQUERY
551 if ( at->bam_true_ad->ad_type->sat_equality ) {
552 normfunc = at->bam_true_ad->ad_type->sat_equality->smr_normalize;
555 /* Count how many rows will be returned. This avoids memory
556 * fragmentation that can result from loading the values in
557 * one by one and using realloc()
559 rc = backsql_Prepare( bsi->bsi_dbh, &sth, at->bam_countquery, 0 );
560 if ( rc != SQL_SUCCESS ) {
561 Debug( LDAP_DEBUG_TRACE, "backsql_get_attr_vals(): "
562 "error preparing count query: %s\n",
563 at->bam_countquery, 0, 0 );
564 backsql_PrintErrors( bi->sql_db_env, bsi->bsi_dbh, sth, rc );
568 rc = backsql_BindParamID( sth, 1, SQL_PARAM_INPUT,
569 &bsi->bsi_c_eid->eid_keyval );
570 if ( rc != SQL_SUCCESS ) {
571 Debug( LDAP_DEBUG_TRACE, "backsql_get_attr_vals(): "
572 "error binding key value parameter\n", 0, 0, 0 );
573 SQLFreeStmt( sth, SQL_DROP );
577 rc = SQLExecute( sth );
578 if ( ! BACKSQL_SUCCESS( rc ) ) {
579 Debug( LDAP_DEBUG_TRACE, "backsql_get_attr_vals(): "
580 "error executing attribute count query '%s'\n",
581 at->bam_countquery, 0, 0 );
582 backsql_PrintErrors( bi->sql_db_env, bsi->bsi_dbh, sth, rc );
583 SQLFreeStmt( sth, SQL_DROP );
587 SQLBindCol( sth, (SQLUSMALLINT)1, SQL_C_LONG,
589 (SQLINTEGER)sizeof( count ),
592 rc = SQLFetch( sth );
593 if ( rc != SQL_SUCCESS ) {
594 Debug( LDAP_DEBUG_TRACE, "backsql_get_attr_vals(): "
595 "error fetch results of count query: %s\n",
596 at->bam_countquery, 0, 0 );
597 backsql_PrintErrors( bi->sql_db_env, bsi->bsi_dbh, sth, rc );
598 SQLFreeStmt( sth, SQL_DROP );
602 Debug( LDAP_DEBUG_TRACE, "backsql_get_attr_vals(): "
603 "number of values in query: %u\n", count, 0, 0 );
604 SQLFreeStmt( sth, SQL_DROP );
609 attr = attr_find( bsi->bsi_e->e_attrs, at->bam_true_ad );
610 if ( attr != NULL ) {
613 if ( attr->a_vals != NULL ) {
614 oldcount = attr->a_numvals;
617 tmp = ch_realloc( attr->a_vals, ( oldcount + count + 1 ) * sizeof( struct berval ) );
622 memset( &attr->a_vals[ oldcount ], 0, ( count + 1 ) * sizeof( struct berval ) );
625 tmp = ch_realloc( attr->a_nvals, ( oldcount + count + 1 ) * sizeof( struct berval ) );
630 memset( &attr->a_nvals[ oldcount ], 0, ( count + 1 ) * sizeof( struct berval ) );
633 attr->a_nvals = attr->a_vals;
635 attr->a_numvals += count;
640 /* Make space for the array of values */
641 attr = attr_alloc( at->bam_true_ad );
642 attr->a_numvals = count;
643 attr->a_vals = ch_calloc( count + 1, sizeof( struct berval ) );
644 if ( attr->a_vals == NULL ) {
645 Debug( LDAP_DEBUG_TRACE, "Out of memory!\n", 0,0,0 );
650 attr->a_nvals = ch_calloc( count + 1, sizeof( struct berval ) );
651 if ( attr->a_nvals == NULL ) {
652 ch_free( attr->a_vals );
659 attr->a_nvals = attr->a_vals;
662 #endif /* BACKSQL_COUNTQUERY */
664 rc = backsql_Prepare( bsi->bsi_dbh, &sth, at->bam_query, 0 );
665 if ( rc != SQL_SUCCESS ) {
666 Debug( LDAP_DEBUG_TRACE, "backsql_get_attr_vals(): "
667 "error preparing query: %s\n", at->bam_query, 0, 0 );
668 backsql_PrintErrors( bi->sql_db_env, bsi->bsi_dbh, sth, rc );
669 #ifdef BACKSQL_COUNTQUERY
673 #endif /* BACKSQL_COUNTQUERY */
677 rc = backsql_BindParamID( sth, 1, SQL_PARAM_INPUT,
678 &bsi->bsi_c_eid->eid_keyval );
679 if ( rc != SQL_SUCCESS ) {
680 Debug( LDAP_DEBUG_TRACE, "backsql_get_attr_vals(): "
681 "error binding key value parameter\n", 0, 0, 0 );
682 #ifdef BACKSQL_COUNTQUERY
686 #endif /* BACKSQL_COUNTQUERY */
691 Debug( LDAP_DEBUG_TRACE, "backsql_get_attr_vals(): "
692 "query=\"%s\" keyval=" BACKSQL_IDFMT "\n", at->bam_query,
693 BACKSQL_IDARG(bsi->bsi_c_eid->eid_keyval), 0 );
694 #endif /* BACKSQL_TRACE */
696 rc = SQLExecute( sth );
697 if ( ! BACKSQL_SUCCESS( rc ) ) {
698 Debug( LDAP_DEBUG_TRACE, "backsql_get_attr_vals(): "
699 "error executing attribute query \"%s\"\n",
700 at->bam_query, 0, 0 );
701 backsql_PrintErrors( bi->sql_db_env, bsi->bsi_dbh, sth, rc );
702 SQLFreeStmt( sth, SQL_DROP );
703 #ifdef BACKSQL_COUNTQUERY
707 #endif /* BACKSQL_COUNTQUERY */
711 backsql_BindRowAsStrings_x( sth, &row, bsi->bsi_op->o_tmpmemctx );
712 #ifdef BACKSQL_COUNTQUERY
714 #endif /* BACKSQL_COUNTQUERY */
715 for ( rc = SQLFetch( sth ), k = 0;
716 BACKSQL_SUCCESS( rc );
717 rc = SQLFetch( sth ), k++ )
719 for ( i = 0; i < (unsigned long)row.ncols; i++ ) {
721 if ( row.value_len[ i ] > 0 ) {
725 AttributeDescription *ad = NULL;
728 retval = slap_bv2ad( &row.col_names[ i ], &ad, &text );
729 if ( retval != LDAP_SUCCESS ) {
730 Debug( LDAP_DEBUG_ANY,
731 "==>backsql_get_attr_vals(\"%s\"): "
732 "unable to find AttributeDescription %s "
734 bsi->bsi_e->e_name.bv_val,
735 row.col_names[ i ].bv_val, retval );
740 if ( ad != at->bam_ad ) {
741 Debug( LDAP_DEBUG_ANY,
742 "==>backsql_get_attr_vals(\"%s\"): "
743 "column name %s differs from "
744 "AttributeDescription %s\n",
745 bsi->bsi_e->e_name.bv_val,
747 at->bam_ad->ad_cname.bv_val );
751 #endif /* BACKSQL_TRACE */
753 /* ITS#3386, ITS#3113 - 20070308
754 * If a binary is fetched?
755 * must use the actual size read
758 if ( BACKSQL_IS_BINARY( row.col_type[ i ] ) ) {
760 Debug( LDAP_DEBUG_ANY,
761 "==>backsql_get_attr_vals(\"%s\"): "
762 "column name %s: data is binary; "
763 "using database size %ld\n",
764 bsi->bsi_e->e_name.bv_val,
766 row.value_len[ i ] );
767 #endif /* BACKSQL_TRACE */
768 bv.bv_val = row.cols[ i ];
769 bv.bv_len = row.value_len[ i ];
772 ber_str2bv( row.cols[ i ], 0, 0, &bv );
775 #ifdef BACKSQL_PRETTY_VALIDATE
779 retval = pretty( at->bam_true_ad->ad_type->sat_syntax,
780 &bv, &pbv, bsi->bsi_op->o_tmpmemctx );
784 retval = validate( at->bam_true_ad->ad_type->sat_syntax,
788 if ( retval != LDAP_SUCCESS ) {
789 char buf[ SLAP_TEXT_BUFLEN ];
791 /* FIXME: we're ignoring invalid values,
792 * but we're accepting the attributes;
793 * should we fail at all? */
794 snprintf( buf, sizeof( buf ),
795 "unable to %s value #%lu "
796 "of AttributeDescription %s",
797 pretty ? "prettify" : "validate",
799 at->bam_ad->ad_cname.bv_val );
800 Debug( LDAP_DEBUG_TRACE,
801 "==>backsql_get_attr_vals(\"%s\"): "
803 bsi->bsi_e->e_name.bv_val, buf, retval );
806 #endif /* BACKSQL_PRETTY_VALIDATE */
808 #ifndef BACKSQL_COUNTQUERY
809 (void)backsql_entry_addattr( bsi->bsi_e,
810 at->bam_true_ad, &bv,
811 bsi->bsi_op->o_tmpmemctx );
813 #else /* BACKSQL_COUNTQUERY */
817 retval = (*normfunc)( SLAP_MR_VALUE_OF_ATTRIBUTE_SYNTAX,
818 at->bam_true_ad->ad_type->sat_syntax,
819 at->bam_true_ad->ad_type->sat_equality,
821 bsi->bsi_op->o_tmpmemctx );
823 if ( retval != LDAP_SUCCESS ) {
824 char buf[ SLAP_TEXT_BUFLEN ];
826 /* FIXME: we're ignoring invalid values,
827 * but we're accepting the attributes;
828 * should we fail at all? */
829 snprintf( buf, sizeof( buf ),
830 "unable to normalize value #%lu "
831 "of AttributeDescription %s",
833 at->bam_ad->ad_cname.bv_val );
834 Debug( LDAP_DEBUG_TRACE,
835 "==>backsql_get_attr_vals(\"%s\"): "
837 bsi->bsi_e->e_name.bv_val, buf, retval );
839 #ifdef BACKSQL_PRETTY_VALIDATE
841 bsi->bsi_op->o_tmpfree( bv.bv_val,
842 bsi->bsi_op->o_tmpmemctx );
844 #endif /* BACKSQL_PRETTY_VALIDATE */
848 ber_dupbv( &attr->a_nvals[ j ], &nbv );
849 bsi->bsi_op->o_tmpfree( nbv.bv_val,
850 bsi->bsi_op->o_tmpmemctx );
853 ber_dupbv( &attr->a_vals[ j ], &bv );
855 assert( j < oldcount + count );
857 #endif /* BACKSQL_COUNTQUERY */
859 #ifdef BACKSQL_PRETTY_VALIDATE
861 bsi->bsi_op->o_tmpfree( bv.bv_val,
862 bsi->bsi_op->o_tmpmemctx );
864 #endif /* BACKSQL_PRETTY_VALIDATE */
867 Debug( LDAP_DEBUG_TRACE, "prec=%d\n",
868 (int)row.col_prec[ i ], 0, 0 );
871 Debug( LDAP_DEBUG_TRACE, "NULL value "
872 "in this row for attribute \"%s\"\n",
873 row.col_names[ i ].bv_val, 0, 0 );
874 #endif /* BACKSQL_TRACE */
879 #ifdef BACKSQL_COUNTQUERY
880 if ( BER_BVISNULL( &attr->a_vals[ 0 ] ) ) {
881 /* don't leave around attributes with no values */
884 } else if ( append ) {
887 for ( ap = &bsi->bsi_e->e_attrs; (*ap) != NULL; ap = &(*ap)->a_next )
891 #endif /* BACKSQL_COUNTQUERY */
893 SQLFreeStmt( sth, SQL_DROP );
894 Debug( LDAP_DEBUG_TRACE, "<==backsql_get_attr_vals()\n", 0, 0, 0 );
896 if ( at->bam_next ) {
897 res = backsql_get_attr_vals( at->bam_next, v_bsi );
904 #endif /* BACKSQL_TRACE */
905 backsql_FreeRow_x( &row, bsi->bsi_op->o_tmpmemctx );
911 backsql_id2entry( backsql_srch_info *bsi, backsql_entryID *eid )
913 Operation *op = bsi->bsi_op;
914 backsql_info *bi = (backsql_info *)op->o_bd->be_private;
918 Debug( LDAP_DEBUG_TRACE, "==>backsql_id2entry()\n", 0, 0, 0 );
920 assert( bsi->bsi_e != NULL );
922 memset( bsi->bsi_e, 0, sizeof( Entry ) );
924 if ( bi->sql_baseObject && BACKSQL_IS_BASEOBJECT_ID( &eid->eid_id ) ) {
925 (void)entry_dup2( bsi->bsi_e, bi->sql_baseObject );
929 bsi->bsi_e->e_attrs = NULL;
930 bsi->bsi_e->e_private = NULL;
932 if ( eid->eid_oc == NULL ) {
933 eid->eid_oc = backsql_id2oc( bsi->bsi_op->o_bd->be_private,
935 if ( eid->eid_oc == NULL ) {
936 Debug( LDAP_DEBUG_TRACE,
937 "backsql_id2entry(): unable to fetch objectClass with id=" BACKSQL_IDNUMFMT " for entry id=" BACKSQL_IDFMT " dn=\"%s\"\n",
938 eid->eid_oc_id, BACKSQL_IDARG(eid->eid_id),
939 eid->eid_dn.bv_val );
943 bsi->bsi_oc = eid->eid_oc;
944 bsi->bsi_c_eid = eid;
946 ber_dupbv_x( &bsi->bsi_e->e_name, &eid->eid_dn, op->o_tmpmemctx );
947 ber_dupbv_x( &bsi->bsi_e->e_nname, &eid->eid_ndn, op->o_tmpmemctx );
949 #ifndef BACKSQL_ARBITRARY_KEY
951 bsi->bsi_e->e_id = eid->eid_id;
952 #endif /* ! BACKSQL_ARBITRARY_KEY */
954 rc = attr_merge_normalize_one( bsi->bsi_e,
955 slap_schema.si_ad_objectClass,
956 &bsi->bsi_oc->bom_oc->soc_cname,
957 bsi->bsi_op->o_tmpmemctx );
958 if ( rc != LDAP_SUCCESS ) {
959 backsql_entry_clean( op, bsi->bsi_e );
963 if ( bsi->bsi_attrs == NULL || ( bsi->bsi_flags & BSQL_SF_ALL_USER ) )
965 Debug( LDAP_DEBUG_TRACE, "backsql_id2entry(): "
966 "retrieving all attributes\n", 0, 0, 0 );
967 avl_apply( bsi->bsi_oc->bom_attrs, backsql_get_attr_vals,
968 bsi, 0, AVL_INORDER );
971 Debug( LDAP_DEBUG_TRACE, "backsql_id2entry(): "
972 "custom attribute list\n", 0, 0, 0 );
973 for ( i = 0; !BER_BVISNULL( &bsi->bsi_attrs[ i ].an_name ); i++ ) {
974 backsql_at_map_rec **vat;
975 AttributeName *an = &bsi->bsi_attrs[ i ];
978 /* if one of the attributes listed here is
979 * a subtype of another, it must be ignored,
980 * because subtypes are already dealt with
981 * by backsql_supad2at()
983 for ( j = 0; !BER_BVISNULL( &bsi->bsi_attrs[ j ].an_name ); j++ ) {
990 if ( is_at_subtype( an->an_desc->ad_type,
991 bsi->bsi_attrs[ j ].an_desc->ad_type ) )
997 rc = backsql_supad2at( bsi->bsi_oc, an->an_desc, &vat );
998 if ( rc != 0 || vat == NULL ) {
999 Debug( LDAP_DEBUG_TRACE, "backsql_id2entry(): "
1000 "attribute \"%s\" is not defined "
1001 "for objectlass \"%s\"\n",
1003 BACKSQL_OC_NAME( bsi->bsi_oc ), 0 );
1007 for ( j = 0; vat[j]; j++ ) {
1008 backsql_get_attr_vals( vat[j], bsi );
1017 if ( bsi->bsi_flags & BSQL_SF_RETURN_ENTRYUUID ) {
1018 Attribute *a_entryUUID,
1021 a_entryUUID = backsql_operational_entryUUID( bi, eid );
1022 if ( a_entryUUID != NULL ) {
1023 for ( ap = &bsi->bsi_e->e_attrs;
1025 ap = &(*ap)->a_next );
1031 if ( ( bsi->bsi_flags & BSQL_SF_ALL_OPER )
1032 || an_find( bsi->bsi_attrs, slap_bv_all_operational_attrs )
1033 || an_find( bsi->bsi_attrs, &slap_schema.si_ad_structuralObjectClass->ad_cname ) )
1035 ObjectClass *soc = NULL;
1037 if ( BACKSQL_CHECK_SCHEMA( bi ) ) {
1039 const char *text = NULL;
1040 char textbuf[ 1024 ];
1041 size_t textlen = sizeof( textbuf );
1042 struct berval bv[ 2 ],
1044 int rc = LDAP_SUCCESS;
1046 a = attr_find( bsi->bsi_e->e_attrs,
1047 slap_schema.si_ad_objectClass );
1052 bv[ 0 ] = bsi->bsi_oc->bom_oc->soc_cname;
1053 BER_BVZERO( &bv[ 1 ] );
1057 rc = structural_class( nvals, &soc, NULL,
1058 &text, textbuf, textlen, op->o_tmpmemctx );
1059 if ( rc != LDAP_SUCCESS ) {
1060 Debug( LDAP_DEBUG_TRACE, "backsql_id2entry(%s): "
1061 "structural_class() failed %d (%s)\n",
1062 bsi->bsi_e->e_name.bv_val,
1063 rc, text ? text : "" );
1064 backsql_entry_clean( op, bsi->bsi_e );
1068 if ( !bvmatch( &soc->soc_cname, &bsi->bsi_oc->bom_oc->soc_cname ) ) {
1069 if ( !is_object_subclass( bsi->bsi_oc->bom_oc, soc ) ) {
1070 Debug( LDAP_DEBUG_TRACE, "backsql_id2entry(%s): "
1071 "computed structuralObjectClass %s "
1072 "does not match objectClass %s associated "
1074 bsi->bsi_e->e_name.bv_val, soc->soc_cname.bv_val,
1075 bsi->bsi_oc->bom_oc->soc_cname.bv_val );
1076 backsql_entry_clean( op, bsi->bsi_e );
1080 Debug( LDAP_DEBUG_TRACE, "backsql_id2entry(%s): "
1081 "computed structuralObjectClass %s "
1082 "is subclass of objectClass %s associated "
1084 bsi->bsi_e->e_name.bv_val, soc->soc_cname.bv_val,
1085 bsi->bsi_oc->bom_oc->soc_cname.bv_val );
1089 soc = bsi->bsi_oc->bom_oc;
1092 rc = attr_merge_normalize_one( bsi->bsi_e,
1093 slap_schema.si_ad_structuralObjectClass,
1095 bsi->bsi_op->o_tmpmemctx );
1096 if ( rc != LDAP_SUCCESS ) {
1097 backsql_entry_clean( op, bsi->bsi_e );
1103 Debug( LDAP_DEBUG_TRACE, "<==backsql_id2entry()\n", 0, 0, 0 );
1105 return LDAP_SUCCESS;