]> git.sur5r.net Git - openldap/blob - servers/slapd/modrdn.c
Don't bother setting up threads if there are no indexed attrs
[openldap] / servers / slapd / modrdn.c
1 /* $OpenLDAP$ */
2 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
3  *
4  * Copyright 1998-2006 The OpenLDAP Foundation.
5  * All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted only as authorized by the OpenLDAP
9  * Public License.
10  *
11  * A copy of this license is available in the file LICENSE in the
12  * top-level directory of the distribution or, alternatively, at
13  * <http://www.OpenLDAP.org/license.html>.
14  */
15 /* Portions Copyright 1999, Juan C. Gomez, All rights reserved.
16  * This software is not subject to any license of Silicon Graphics 
17  * Inc. or Purdue University.
18  *
19  * Redistribution and use in source and binary forms are permitted
20  * without restriction or fee of any kind as long as this notice
21  * is preserved.
22  */
23 /* Portions Copyright (c) 1995 Regents of the University of Michigan.
24  * All rights reserved.
25  *
26  * Redistribution and use in source and binary forms are permitted
27  * provided that this notice is preserved and that due credit is given
28  * to the University of Michigan at Ann Arbor. The name of the University
29  * may not be used to endorse or promote products derived from this
30  * software without specific prior written permission. This software
31  * is provided ``as is'' without express or implied warranty.
32  */
33
34 #include "portable.h"
35
36 #include <stdio.h>
37
38 #include <ac/socket.h>
39 #include <ac/string.h>
40
41 #include "slap.h"
42
43 int
44 do_modrdn(
45     Operation   *op,
46     SlapReply   *rs
47 )
48 {
49         struct berval   dn = BER_BVNULL;
50         struct berval   newrdn = BER_BVNULL;
51         struct berval   newSuperior = BER_BVNULL;
52         ber_int_t       deloldrdn;
53
54         struct berval pnewSuperior = BER_BVNULL;
55
56         struct berval nnewSuperior = BER_BVNULL;
57
58         ber_len_t       length;
59
60         Debug( LDAP_DEBUG_TRACE, "do_modrdn\n", 0, 0, 0 );
61
62
63         /*
64          * Parse the modrdn request.  It looks like this:
65          *
66          *      ModifyRDNRequest := SEQUENCE {
67          *              entry   DistinguishedName,
68          *              newrdn  RelativeDistinguishedName
69          *              deleteoldrdn    BOOLEAN,
70          *              newSuperior     [0] LDAPDN OPTIONAL (v3 Only!)
71          *      }
72          */
73
74         if ( ber_scanf( op->o_ber, "{mmb", &dn, &newrdn, &deloldrdn )
75             == LBER_ERROR )
76         {
77                 Debug( LDAP_DEBUG_ANY, "ber_scanf failed\n", 0, 0, 0 );
78
79                 send_ldap_discon( op, rs, LDAP_PROTOCOL_ERROR, "decoding error" );
80                 return SLAPD_DISCONNECT;
81         }
82
83         /* Check for newSuperior parameter, if present scan it */
84
85         if ( ber_peek_tag( op->o_ber, &length ) == LDAP_TAG_NEWSUPERIOR ) {
86                 if ( op->o_protocol < LDAP_VERSION3 ) {
87                         /* Conection record indicates v2 but field 
88                          * newSuperior is present: report error.
89                          */
90                         Debug( LDAP_DEBUG_ANY,
91                             "modrdn(v2): invalid field newSuperior!\n",
92                             0, 0, 0 );
93
94                         send_ldap_discon( op, rs,
95                                 LDAP_PROTOCOL_ERROR, "newSuperior requires LDAPv3" );
96                         rs->sr_err = SLAPD_DISCONNECT;
97                         goto cleanup;
98                 }
99
100                 if ( ber_scanf( op->o_ber, "m", &newSuperior ) 
101                      == LBER_ERROR ) {
102
103                         Debug( LDAP_DEBUG_ANY, "ber_scanf(\"m\") failed\n",
104                                 0, 0, 0 );
105
106                         send_ldap_discon( op, rs,
107                                 LDAP_PROTOCOL_ERROR, "decoding error" );
108                         rs->sr_err = SLAPD_DISCONNECT;
109                         goto cleanup;
110                 }
111                 op->orr_newSup = &pnewSuperior;
112                 op->orr_nnewSup = &nnewSuperior;
113         }
114
115         Debug( LDAP_DEBUG_ARGS,
116             "do_modrdn: dn (%s) newrdn (%s) newsuperior (%s)\n",
117                 dn.bv_val, newrdn.bv_val,
118                 newSuperior.bv_len ? newSuperior.bv_val : "" );
119
120         if ( ber_scanf( op->o_ber, /*{*/ "}") == LBER_ERROR ) {
121                 Debug( LDAP_DEBUG_ANY, "do_modrdn: ber_scanf failed\n", 0, 0, 0 );
122
123                 send_ldap_discon( op, rs,
124                         LDAP_PROTOCOL_ERROR, "decoding error" );
125                 rs->sr_err = SLAPD_DISCONNECT;
126                 goto cleanup;
127         }
128
129         if( get_ctrls( op, rs, 1 ) != LDAP_SUCCESS ) {
130                 Debug( LDAP_DEBUG_ANY, "do_modrdn: get_ctrls failed\n", 0, 0, 0 );
131
132                 /* get_ctrls has sent results.  Now clean up. */
133                 goto cleanup;
134         } 
135
136         rs->sr_err = dnPrettyNormal( NULL, &dn, &op->o_req_dn, &op->o_req_ndn, op->o_tmpmemctx );
137         if( rs->sr_err != LDAP_SUCCESS ) {
138                 Debug( LDAP_DEBUG_ANY,
139                         "do_modrdn: invalid dn (%s)\n", dn.bv_val, 0, 0 );
140                 send_ldap_error( op, rs, LDAP_INVALID_DN_SYNTAX, "invalid DN" );
141                 goto cleanup;
142         }
143
144         /* FIXME: should have/use rdnPretty / rdnNormalize routines */
145
146         rs->sr_err = dnPrettyNormal( NULL, &newrdn, &op->orr_newrdn, &op->orr_nnewrdn, op->o_tmpmemctx );
147         if( rs->sr_err != LDAP_SUCCESS ) {
148                 Debug( LDAP_DEBUG_ANY,
149                         "do_modrdn: invalid newrdn (%s)\n", newrdn.bv_val, 0, 0 );
150                 send_ldap_error( op, rs, LDAP_INVALID_DN_SYNTAX, "invalid new RDN" );
151                 goto cleanup;
152         }
153
154         if( rdn_validate( &op->orr_newrdn ) != LDAP_SUCCESS ) {
155                 Debug( LDAP_DEBUG_ANY, "do_modrdn: invalid rdn (%s)\n",
156                         op->orr_newrdn.bv_val, 0, 0 );
157
158                 send_ldap_error( op, rs, LDAP_INVALID_DN_SYNTAX, "invalid new RDN" );
159                 goto cleanup;
160         }
161
162         if( op->orr_newSup ) {
163                 rs->sr_err = dnPrettyNormal( NULL, &newSuperior, &pnewSuperior,
164                         &nnewSuperior, op->o_tmpmemctx );
165                 if( rs->sr_err != LDAP_SUCCESS ) {
166                         Debug( LDAP_DEBUG_ANY,
167                                 "do_modrdn: invalid newSuperior (%s)\n",
168                                 newSuperior.bv_val, 0, 0 );
169                         send_ldap_error( op, rs, LDAP_INVALID_DN_SYNTAX, "invalid newSuperior" );
170                         goto cleanup;
171                 }
172         }
173
174         /* FIXME: temporary? */
175         op->orr_deleteoldrdn = deloldrdn;
176
177         op->o_bd = frontendDB;
178         rs->sr_err = frontendDB->be_modrdn( op, rs );
179
180 cleanup:
181         op->o_tmpfree( op->o_req_dn.bv_val, op->o_tmpmemctx );
182         op->o_tmpfree( op->o_req_ndn.bv_val, op->o_tmpmemctx );
183
184         op->o_tmpfree( op->orr_newrdn.bv_val, op->o_tmpmemctx );        
185         op->o_tmpfree( op->orr_nnewrdn.bv_val, op->o_tmpmemctx );       
186
187         if ( !BER_BVISNULL( &pnewSuperior ) ) 
188                 op->o_tmpfree( pnewSuperior.bv_val, op->o_tmpmemctx );
189         if ( !BER_BVISNULL( &nnewSuperior ) )
190                 op->o_tmpfree( nnewSuperior.bv_val, op->o_tmpmemctx );
191
192         return rs->sr_err;
193 }
194
195 int
196 fe_op_modrdn( Operation *op, SlapReply *rs )
197 {
198         Backend         *newSuperior_be = NULL;
199         int             manageDSAit;
200         struct berval   pdn = BER_BVNULL;
201         BackendDB *op_be, *bd = op->o_bd;
202         
203         if( op->o_req_ndn.bv_len == 0 ) {
204                 Debug( LDAP_DEBUG_ANY, "do_modrdn: root dse!\n", 0, 0, 0 );
205
206                 send_ldap_error( op, rs, LDAP_UNWILLING_TO_PERFORM,
207                         "cannot rename the root DSE" );
208                 goto cleanup;
209
210         } else if ( bvmatch( &op->o_req_ndn, &frontendDB->be_schemandn ) ) {
211                 Debug( LDAP_DEBUG_ANY, "do_modrdn: subschema subentry: %s (%ld)\n",
212                         frontendDB->be_schemandn.bv_val, (long)frontendDB->be_schemandn.bv_len, 0 );
213
214                 send_ldap_error( op, rs, LDAP_UNWILLING_TO_PERFORM,
215                         "cannot rename subschema subentry" );
216                 goto cleanup;
217         }
218
219         Statslog( LDAP_DEBUG_STATS, "%s MODRDN dn=\"%s\"\n",
220             op->o_log_prefix, op->o_req_dn.bv_val, 0, 0, 0 );
221
222         manageDSAit = get_manageDSAit( op );
223
224         /*
225          * We could be serving multiple database backends.  Select the
226          * appropriate one, or send a referral to our "referral server"
227          * if we don't hold it.
228          */
229         op->o_bd = select_backend( &op->o_req_ndn, manageDSAit, 1 );
230         if ( op->o_bd == NULL ) {
231                 op->o_bd = bd;
232                 rs->sr_ref = referral_rewrite( default_referral,
233                         NULL, &op->o_req_dn, LDAP_SCOPE_DEFAULT );
234                 if (!rs->sr_ref) rs->sr_ref = default_referral;
235
236                 if ( rs->sr_ref != NULL ) {
237                         rs->sr_err = LDAP_REFERRAL;
238                         send_ldap_result( op, rs );
239
240                         if (rs->sr_ref != default_referral) ber_bvarray_free( rs->sr_ref );
241                 } else {
242                         send_ldap_error( op, rs, LDAP_UNWILLING_TO_PERFORM,
243                                 "no global superior knowledge" );
244                 }
245                 goto cleanup;
246         }
247
248         /* If we've got a glued backend, check the real backend */
249         op_be = op->o_bd;
250         if ( SLAP_GLUE_INSTANCE( op->o_bd )) {
251                 op->o_bd = select_backend( &op->o_req_ndn, manageDSAit, 0 );
252         }
253
254         /* check restrictions */
255         if( backend_check_restrictions( op, rs, NULL ) != LDAP_SUCCESS ) {
256                 send_ldap_result( op, rs );
257                 goto cleanup;
258         }
259
260         /* check for referrals */
261         if ( backend_check_referrals( op, rs ) != LDAP_SUCCESS ) {
262                 goto cleanup;
263         }
264
265         /* Make sure that the entry being changed and the newSuperior are in 
266          * the same backend, otherwise we return an error.
267          */
268         if( op->orr_newSup ) {
269                 newSuperior_be = select_backend( op->orr_nnewSup, 0, 0 );
270
271                 if ( newSuperior_be != op->o_bd ) {
272                         /* newSuperior is in different backend */
273                         send_ldap_error( op, rs, LDAP_AFFECTS_MULTIPLE_DSAS,
274                                 "cannot rename between DSAs" );
275
276                         goto cleanup;
277                 }
278         }
279
280         /*
281          * do the modrdn if 1 && (2 || 3)
282          * 1) there is a modrdn function implemented in this backend;
283          * 2) this backend is master for what it holds;
284          * 3) it's a replica and the dn supplied is the update_ndn.
285          */
286         if ( op->o_bd->be_modrdn ) {
287                 /* do the update here */
288                 int repl_user = be_isupdate( op );
289 #ifndef SLAPD_MULTIMASTER
290                 if ( !SLAP_SHADOW(op->o_bd) || repl_user )
291 #endif /* ! SLAPD_MULTIMASTER */
292                 {
293                         slap_callback cb = { NULL, slap_replog_cb, NULL, NULL };
294
295                         op->o_bd = op_be;
296
297 #ifdef SLAPD_MULTIMASTER
298                         if ( !op->o_bd->be_update_ndn.bv_len || !repl_user )
299 #endif /* SLAPD_MULTIMASTER */
300                         {
301                                 cb.sc_next = op->o_callback;
302                                 op->o_callback = &cb;
303                         }
304                         op->o_bd->be_modrdn( op, rs );
305
306                         if ( op->o_bd->be_delete ) {
307                                 struct berval   org_req_dn = BER_BVNULL;
308                                 struct berval   org_req_ndn = BER_BVNULL;
309                                 struct berval   org_dn = BER_BVNULL;
310                                 struct berval   org_ndn = BER_BVNULL;
311                                 int             org_managedsait;
312
313                                 org_req_dn = op->o_req_dn;
314                                 org_req_ndn = op->o_req_ndn;
315                                 org_dn = op->o_dn;
316                                 org_ndn = op->o_ndn;
317                                 org_managedsait = get_manageDSAit( op );
318                                 op->o_dn = op->o_bd->be_rootdn;
319                                 op->o_ndn = op->o_bd->be_rootndn;
320                                 op->o_managedsait = SLAP_CONTROL_NONCRITICAL;
321
322                                 while ( rs->sr_err == LDAP_SUCCESS &&
323                                                 op->o_delete_glue_parent ) {
324                                         op->o_delete_glue_parent = 0;
325                                         if ( !be_issuffix( op->o_bd, &op->o_req_ndn )) {
326                                                 slap_callback cb = { NULL };
327                                                 cb.sc_response = slap_null_cb;
328                                                 dnParent( &op->o_req_ndn, &pdn );
329                                                 op->o_req_dn = pdn;
330                                                 op->o_req_ndn = pdn;
331                                                 op->o_callback = &cb;
332                                                 op->o_bd->be_delete( op, rs );
333                                         } else {
334                                                 break;
335                                         }
336                                 }
337                                 op->o_managedsait = org_managedsait;
338                                 op->o_dn = org_dn;
339                                 op->o_ndn = org_ndn;
340                                 op->o_req_dn = org_req_dn;
341                                 op->o_req_ndn = org_req_ndn;
342                                 op->o_delete_glue_parent = 0;
343                         }
344
345 #ifndef SLAPD_MULTIMASTER
346                 } else {
347                         BerVarray defref = op->o_bd->be_update_refs
348                                 ? op->o_bd->be_update_refs : default_referral;
349
350                         if ( defref != NULL ) {
351                                 rs->sr_ref = referral_rewrite( defref,
352                                         NULL, &op->o_req_dn, LDAP_SCOPE_DEFAULT );
353                                 if (!rs->sr_ref) rs->sr_ref = defref;
354
355                                 rs->sr_err = LDAP_REFERRAL;
356                                 send_ldap_result( op, rs );
357
358                                 if (rs->sr_ref != defref) ber_bvarray_free( rs->sr_ref );
359                         } else {
360                                 send_ldap_error( op, rs, LDAP_UNWILLING_TO_PERFORM,
361                                         "shadow context; no update referral" );
362                         }
363 #endif /* ! SLAPD_MULTIMASTER */
364                 }
365         } else {
366                 send_ldap_error( op, rs, LDAP_UNWILLING_TO_PERFORM,
367                         "operation not supported within namingContext" );
368         }
369
370 cleanup:;
371         op->o_bd = bd;
372         return rs->sr_err;
373 }
374
375 int
376 slap_modrdn2mods(
377         Operation       *op,
378         SlapReply       *rs,
379         Entry           *e,
380         LDAPRDN         old_rdn,
381         LDAPRDN         new_rdn,
382         Modifications   **pmod )
383 {
384         Modifications   *mod = NULL;
385         int             a_cnt, d_cnt;
386         int repl_user;
387
388         assert( new_rdn != NULL );
389         assert( !op->orr_deleteoldrdn || old_rdn != NULL );
390
391         repl_user = be_isupdate( op );
392
393         /* Add new attribute values to the entry */
394         for ( a_cnt = 0; new_rdn[a_cnt]; a_cnt++ ) {
395                 AttributeDescription    *desc = NULL;
396                 Modifications           *mod_tmp;
397
398                 rs->sr_err = slap_bv2ad( &new_rdn[a_cnt]->la_attr, &desc, &rs->sr_text );
399
400                 if ( rs->sr_err != LDAP_SUCCESS ) {
401                         Debug( LDAP_DEBUG_TRACE,
402                                 "slap_modrdn2modlist: %s: %s (new)\n",
403                                 rs->sr_text, 
404                                 new_rdn[ a_cnt ]->la_attr.bv_val, 0 );
405                         goto done;              
406                 }
407
408                 /* ACL check of newly added attrs */
409                 if ( op->o_bd && !access_allowed( op, e, desc,
410                         &new_rdn[a_cnt]->la_value, ACL_WADD, NULL ) ) {
411                         Debug( LDAP_DEBUG_TRACE,
412                                 "slap_modrdn2modlist: access to attr \"%s\" "
413                                 "(new) not allowed\n", 
414                                 new_rdn[ a_cnt ]->la_attr.bv_val, 0, 0 );
415                         rs->sr_text = "access to naming attributes (new) not allowed";
416                         rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
417                         goto done;
418                 }
419
420                 /* Apply modification */
421                 mod_tmp = ( Modifications * )ch_malloc( sizeof( Modifications )
422                         + 4 * sizeof( struct berval ) );
423                 mod_tmp->sml_desc = desc;
424                 mod_tmp->sml_values = ( BerVarray )( mod_tmp + 1 );
425                 mod_tmp->sml_values[0] = new_rdn[a_cnt]->la_value;
426                 mod_tmp->sml_values[1].bv_val = NULL;
427                 if( desc->ad_type->sat_equality->smr_normalize) {
428                         mod_tmp->sml_nvalues = &mod_tmp->sml_values[2];
429                         (void) (*desc->ad_type->sat_equality->smr_normalize)(
430                                 SLAP_MR_EQUALITY|SLAP_MR_VALUE_OF_ASSERTION_SYNTAX,
431                                 desc->ad_type->sat_syntax,
432                                 desc->ad_type->sat_equality,
433                                 &mod_tmp->sml_values[0],
434                                 &mod_tmp->sml_nvalues[0], NULL );
435                         mod_tmp->sml_nvalues[1].bv_val = NULL;
436                 } else {
437                         mod_tmp->sml_nvalues = NULL;
438                 }
439                 mod_tmp->sml_op = SLAP_MOD_SOFTADD;
440                 mod_tmp->sml_flags = SLAP_MOD_INTERNAL;
441                 mod_tmp->sml_next = mod;
442                 mod = mod_tmp;
443         }
444
445         /* Remove old rdn value if required */
446         if ( op->orr_deleteoldrdn ) {
447                 for ( d_cnt = 0; old_rdn[d_cnt]; d_cnt++ ) {
448                         AttributeDescription    *desc = NULL;
449                         Modifications           *mod_tmp;
450
451                         rs->sr_err = slap_bv2ad( &old_rdn[d_cnt]->la_attr, &desc, &rs->sr_text );
452                         if ( rs->sr_err != LDAP_SUCCESS ) {
453                                 Debug( LDAP_DEBUG_TRACE,
454                                         "slap_modrdn2modlist: %s: %s (old)\n",
455                                         rs->sr_text, 
456                                         old_rdn[d_cnt]->la_attr.bv_val, 
457                                         0 );
458                                 goto done;              
459                         }
460
461                         /* ACL check of old rdn attrs removal */
462                         if ( op->o_bd && !access_allowed( op, e, desc,
463                                 &old_rdn[d_cnt]->la_value, ACL_WDEL, 
464                                 NULL ) ) {
465                                 Debug( LDAP_DEBUG_TRACE,
466                                         "slap_modrdn2modlist: access "
467                                         "to attr \"%s\" (old) not allowed\n", 
468                                         old_rdn[ d_cnt ]->la_attr.bv_val,
469                                         0, 0 );
470                                 rs->sr_text = "access to naming attributes (old) not allowed";
471                                 rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
472                                 goto done;
473                         }
474
475                         /* Apply modification */
476                         mod_tmp = ( Modifications * )ch_malloc( sizeof( Modifications )
477                                 + 4 * sizeof ( struct berval ) );
478                         mod_tmp->sml_desc = desc;
479                         mod_tmp->sml_values = ( BerVarray )(mod_tmp+1);
480                         mod_tmp->sml_values[0] = old_rdn[d_cnt]->la_value;
481                         mod_tmp->sml_values[1].bv_val = NULL;
482                         if( desc->ad_type->sat_equality->smr_normalize) {
483                                 mod_tmp->sml_nvalues = &mod_tmp->sml_values[2];
484                                 (void) (*desc->ad_type->sat_equality->smr_normalize)(
485                                         SLAP_MR_EQUALITY|SLAP_MR_VALUE_OF_ASSERTION_SYNTAX,
486                                         desc->ad_type->sat_syntax,
487                                         desc->ad_type->sat_equality,
488                                         &mod_tmp->sml_values[0],
489                                         &mod_tmp->sml_nvalues[0], op->o_tmpmemctx );
490                                 mod_tmp->sml_nvalues[1].bv_val = NULL;
491                         } else {
492                                 mod_tmp->sml_nvalues = NULL;
493                         }
494                         mod_tmp->sml_op = LDAP_MOD_DELETE;
495                         mod_tmp->sml_flags = SLAP_MOD_INTERNAL;
496                         mod_tmp->sml_next = mod;
497                         mod = mod_tmp;
498                 }
499         }
500         
501 done:
502
503         if ( rs->sr_err == LDAP_SUCCESS && !repl_user ) {
504                 slap_mods_opattrs( op, &mod, 1 );
505         }
506
507         /* LDAP v2 supporting correct attribute handling. */
508         if ( rs->sr_err != LDAP_SUCCESS && mod != NULL ) {
509                 Modifications *tmp;
510                 for ( ; mod; mod = tmp ) {
511                         tmp = mod->sml_next;
512                         ch_free( mod );
513                 }
514         }
515
516         *pmod = mod;
517
518         return rs->sr_err;
519 }
520
521 void
522 slap_modrdn2mods_free( Modifications *mod )
523 {
524         Modifications *tmp;
525
526         for ( ; mod; mod = tmp ) {
527                 tmp = mod->sml_next;
528                 /* slap_modrdn2mods does things one way,
529                  * slap_mods_opattrs does it differently
530                  */
531                 if ( mod->sml_op != SLAP_MOD_SOFTADD &&
532                         mod->sml_op != LDAP_MOD_DELETE )
533                 {
534                         break;
535                 }
536
537                 if ( mod->sml_nvalues ) {
538                         free( mod->sml_nvalues[0].bv_val );
539                 }
540
541                 free( mod );
542         }
543
544         slap_mods_free( mod, 1 );
545 }
546