2 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
4 * Copyright 1998-2006 The OpenLDAP Foundation.
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted only as authorized by the OpenLDAP
11 * A copy of this license is available in the file LICENSE in the
12 * top-level directory of the distribution or, alternatively, at
13 * <http://www.OpenLDAP.org/license.html>.
15 /* Portions Copyright 1999, Juan C. Gomez, All rights reserved.
16 * This software is not subject to any license of Silicon Graphics
17 * Inc. or Purdue University.
19 * Redistribution and use in source and binary forms are permitted
20 * without restriction or fee of any kind as long as this notice
23 /* Portions Copyright (c) 1995 Regents of the University of Michigan.
24 * All rights reserved.
26 * Redistribution and use in source and binary forms are permitted
27 * provided that this notice is preserved and that due credit is given
28 * to the University of Michigan at Ann Arbor. The name of the University
29 * may not be used to endorse or promote products derived from this
30 * software without specific prior written permission. This software
31 * is provided ``as is'' without express or implied warranty.
38 #include <ac/socket.h>
39 #include <ac/string.h>
49 struct berval dn = BER_BVNULL;
50 struct berval newrdn = BER_BVNULL;
51 struct berval newSuperior = BER_BVNULL;
54 struct berval pnewSuperior = BER_BVNULL;
56 struct berval nnewSuperior = BER_BVNULL;
60 Debug( LDAP_DEBUG_TRACE, "do_modrdn\n", 0, 0, 0 );
64 * Parse the modrdn request. It looks like this:
66 * ModifyRDNRequest := SEQUENCE {
67 * entry DistinguishedName,
68 * newrdn RelativeDistinguishedName
69 * deleteoldrdn BOOLEAN,
70 * newSuperior [0] LDAPDN OPTIONAL (v3 Only!)
74 if ( ber_scanf( op->o_ber, "{mmb", &dn, &newrdn, &deloldrdn )
77 Debug( LDAP_DEBUG_ANY, "ber_scanf failed\n", 0, 0, 0 );
79 send_ldap_discon( op, rs, LDAP_PROTOCOL_ERROR, "decoding error" );
80 return SLAPD_DISCONNECT;
83 /* Check for newSuperior parameter, if present scan it */
85 if ( ber_peek_tag( op->o_ber, &length ) == LDAP_TAG_NEWSUPERIOR ) {
86 if ( op->o_protocol < LDAP_VERSION3 ) {
87 /* Conection record indicates v2 but field
88 * newSuperior is present: report error.
90 Debug( LDAP_DEBUG_ANY,
91 "modrdn(v2): invalid field newSuperior!\n",
94 send_ldap_discon( op, rs,
95 LDAP_PROTOCOL_ERROR, "newSuperior requires LDAPv3" );
96 rs->sr_err = SLAPD_DISCONNECT;
100 if ( ber_scanf( op->o_ber, "m", &newSuperior )
103 Debug( LDAP_DEBUG_ANY, "ber_scanf(\"m\") failed\n",
106 send_ldap_discon( op, rs,
107 LDAP_PROTOCOL_ERROR, "decoding error" );
108 rs->sr_err = SLAPD_DISCONNECT;
111 op->orr_newSup = &pnewSuperior;
112 op->orr_nnewSup = &nnewSuperior;
115 Debug( LDAP_DEBUG_ARGS,
116 "do_modrdn: dn (%s) newrdn (%s) newsuperior (%s)\n",
117 dn.bv_val, newrdn.bv_val,
118 newSuperior.bv_len ? newSuperior.bv_val : "" );
120 if ( ber_scanf( op->o_ber, /*{*/ "}") == LBER_ERROR ) {
121 Debug( LDAP_DEBUG_ANY, "do_modrdn: ber_scanf failed\n", 0, 0, 0 );
123 send_ldap_discon( op, rs,
124 LDAP_PROTOCOL_ERROR, "decoding error" );
125 rs->sr_err = SLAPD_DISCONNECT;
129 if( get_ctrls( op, rs, 1 ) != LDAP_SUCCESS ) {
130 Debug( LDAP_DEBUG_ANY, "do_modrdn: get_ctrls failed\n", 0, 0, 0 );
132 /* get_ctrls has sent results. Now clean up. */
136 rs->sr_err = dnPrettyNormal( NULL, &dn, &op->o_req_dn, &op->o_req_ndn, op->o_tmpmemctx );
137 if( rs->sr_err != LDAP_SUCCESS ) {
138 Debug( LDAP_DEBUG_ANY,
139 "do_modrdn: invalid dn (%s)\n", dn.bv_val, 0, 0 );
140 send_ldap_error( op, rs, LDAP_INVALID_DN_SYNTAX, "invalid DN" );
144 /* FIXME: should have/use rdnPretty / rdnNormalize routines */
146 rs->sr_err = dnPrettyNormal( NULL, &newrdn, &op->orr_newrdn, &op->orr_nnewrdn, op->o_tmpmemctx );
147 if( rs->sr_err != LDAP_SUCCESS ) {
148 Debug( LDAP_DEBUG_ANY,
149 "do_modrdn: invalid newrdn (%s)\n", newrdn.bv_val, 0, 0 );
150 send_ldap_error( op, rs, LDAP_INVALID_DN_SYNTAX, "invalid new RDN" );
154 if( rdn_validate( &op->orr_newrdn ) != LDAP_SUCCESS ) {
155 Debug( LDAP_DEBUG_ANY, "do_modrdn: invalid rdn (%s)\n",
156 op->orr_newrdn.bv_val, 0, 0 );
158 send_ldap_error( op, rs, LDAP_INVALID_DN_SYNTAX, "invalid new RDN" );
162 if( op->orr_newSup ) {
163 rs->sr_err = dnPrettyNormal( NULL, &newSuperior, &pnewSuperior,
164 &nnewSuperior, op->o_tmpmemctx );
165 if( rs->sr_err != LDAP_SUCCESS ) {
166 Debug( LDAP_DEBUG_ANY,
167 "do_modrdn: invalid newSuperior (%s)\n",
168 newSuperior.bv_val, 0, 0 );
169 send_ldap_error( op, rs, LDAP_INVALID_DN_SYNTAX, "invalid newSuperior" );
174 /* FIXME: temporary? */
175 op->orr_deleteoldrdn = deloldrdn;
177 op->o_bd = frontendDB;
178 rs->sr_err = frontendDB->be_modrdn( op, rs );
181 op->o_tmpfree( op->o_req_dn.bv_val, op->o_tmpmemctx );
182 op->o_tmpfree( op->o_req_ndn.bv_val, op->o_tmpmemctx );
184 op->o_tmpfree( op->orr_newrdn.bv_val, op->o_tmpmemctx );
185 op->o_tmpfree( op->orr_nnewrdn.bv_val, op->o_tmpmemctx );
187 if ( !BER_BVISNULL( &pnewSuperior ) )
188 op->o_tmpfree( pnewSuperior.bv_val, op->o_tmpmemctx );
189 if ( !BER_BVISNULL( &nnewSuperior ) )
190 op->o_tmpfree( nnewSuperior.bv_val, op->o_tmpmemctx );
196 fe_op_modrdn( Operation *op, SlapReply *rs )
198 Backend *newSuperior_be = NULL;
200 struct berval pdn = BER_BVNULL;
201 BackendDB *op_be, *bd = op->o_bd;
203 if( op->o_req_ndn.bv_len == 0 ) {
204 Debug( LDAP_DEBUG_ANY, "do_modrdn: root dse!\n", 0, 0, 0 );
206 send_ldap_error( op, rs, LDAP_UNWILLING_TO_PERFORM,
207 "cannot rename the root DSE" );
210 } else if ( bvmatch( &op->o_req_ndn, &frontendDB->be_schemandn ) ) {
211 Debug( LDAP_DEBUG_ANY, "do_modrdn: subschema subentry: %s (%ld)\n",
212 frontendDB->be_schemandn.bv_val, (long)frontendDB->be_schemandn.bv_len, 0 );
214 send_ldap_error( op, rs, LDAP_UNWILLING_TO_PERFORM,
215 "cannot rename subschema subentry" );
219 Statslog( LDAP_DEBUG_STATS, "%s MODRDN dn=\"%s\"\n",
220 op->o_log_prefix, op->o_req_dn.bv_val, 0, 0, 0 );
222 manageDSAit = get_manageDSAit( op );
225 * We could be serving multiple database backends. Select the
226 * appropriate one, or send a referral to our "referral server"
227 * if we don't hold it.
229 op->o_bd = select_backend( &op->o_req_ndn, manageDSAit, 1 );
230 if ( op->o_bd == NULL ) {
232 rs->sr_ref = referral_rewrite( default_referral,
233 NULL, &op->o_req_dn, LDAP_SCOPE_DEFAULT );
234 if (!rs->sr_ref) rs->sr_ref = default_referral;
236 if ( rs->sr_ref != NULL ) {
237 rs->sr_err = LDAP_REFERRAL;
238 send_ldap_result( op, rs );
240 if (rs->sr_ref != default_referral) ber_bvarray_free( rs->sr_ref );
242 send_ldap_error( op, rs, LDAP_UNWILLING_TO_PERFORM,
243 "no global superior knowledge" );
248 /* If we've got a glued backend, check the real backend */
250 if ( SLAP_GLUE_INSTANCE( op->o_bd )) {
251 op->o_bd = select_backend( &op->o_req_ndn, manageDSAit, 0 );
254 /* check restrictions */
255 if( backend_check_restrictions( op, rs, NULL ) != LDAP_SUCCESS ) {
256 send_ldap_result( op, rs );
260 /* check for referrals */
261 if ( backend_check_referrals( op, rs ) != LDAP_SUCCESS ) {
265 /* Make sure that the entry being changed and the newSuperior are in
266 * the same backend, otherwise we return an error.
268 if( op->orr_newSup ) {
269 newSuperior_be = select_backend( op->orr_nnewSup, 0, 0 );
271 if ( newSuperior_be != op->o_bd ) {
272 /* newSuperior is in different backend */
273 send_ldap_error( op, rs, LDAP_AFFECTS_MULTIPLE_DSAS,
274 "cannot rename between DSAs" );
281 * do the modrdn if 1 && (2 || 3)
282 * 1) there is a modrdn function implemented in this backend;
283 * 2) this backend is master for what it holds;
284 * 3) it's a replica and the dn supplied is the update_ndn.
286 if ( op->o_bd->be_modrdn ) {
287 /* do the update here */
288 int repl_user = be_isupdate( op );
289 #ifndef SLAPD_MULTIMASTER
290 if ( !SLAP_SHADOW(op->o_bd) || repl_user )
291 #endif /* ! SLAPD_MULTIMASTER */
293 slap_callback cb = { NULL, slap_replog_cb, NULL, NULL };
297 #ifdef SLAPD_MULTIMASTER
298 if ( !op->o_bd->be_update_ndn.bv_len || !repl_user )
299 #endif /* SLAPD_MULTIMASTER */
301 cb.sc_next = op->o_callback;
302 op->o_callback = &cb;
304 op->o_bd->be_modrdn( op, rs );
306 if ( op->o_bd->be_delete ) {
307 struct berval org_req_dn = BER_BVNULL;
308 struct berval org_req_ndn = BER_BVNULL;
309 struct berval org_dn = BER_BVNULL;
310 struct berval org_ndn = BER_BVNULL;
313 org_req_dn = op->o_req_dn;
314 org_req_ndn = op->o_req_ndn;
317 org_managedsait = get_manageDSAit( op );
318 op->o_dn = op->o_bd->be_rootdn;
319 op->o_ndn = op->o_bd->be_rootndn;
320 op->o_managedsait = SLAP_CONTROL_NONCRITICAL;
322 while ( rs->sr_err == LDAP_SUCCESS &&
323 op->o_delete_glue_parent ) {
324 op->o_delete_glue_parent = 0;
325 if ( !be_issuffix( op->o_bd, &op->o_req_ndn )) {
326 slap_callback cb = { NULL };
327 cb.sc_response = slap_null_cb;
328 dnParent( &op->o_req_ndn, &pdn );
331 op->o_callback = &cb;
332 op->o_bd->be_delete( op, rs );
337 op->o_managedsait = org_managedsait;
340 op->o_req_dn = org_req_dn;
341 op->o_req_ndn = org_req_ndn;
342 op->o_delete_glue_parent = 0;
345 #ifndef SLAPD_MULTIMASTER
347 BerVarray defref = op->o_bd->be_update_refs
348 ? op->o_bd->be_update_refs : default_referral;
350 if ( defref != NULL ) {
351 rs->sr_ref = referral_rewrite( defref,
352 NULL, &op->o_req_dn, LDAP_SCOPE_DEFAULT );
353 if (!rs->sr_ref) rs->sr_ref = defref;
355 rs->sr_err = LDAP_REFERRAL;
356 send_ldap_result( op, rs );
358 if (rs->sr_ref != defref) ber_bvarray_free( rs->sr_ref );
360 send_ldap_error( op, rs, LDAP_UNWILLING_TO_PERFORM,
361 "shadow context; no update referral" );
363 #endif /* ! SLAPD_MULTIMASTER */
366 send_ldap_error( op, rs, LDAP_UNWILLING_TO_PERFORM,
367 "operation not supported within namingContext" );
382 Modifications **pmod )
384 Modifications *mod = NULL;
388 assert( new_rdn != NULL );
389 assert( !op->orr_deleteoldrdn || old_rdn != NULL );
391 repl_user = be_isupdate( op );
393 /* Add new attribute values to the entry */
394 for ( a_cnt = 0; new_rdn[a_cnt]; a_cnt++ ) {
395 AttributeDescription *desc = NULL;
396 Modifications *mod_tmp;
398 rs->sr_err = slap_bv2ad( &new_rdn[a_cnt]->la_attr, &desc, &rs->sr_text );
400 if ( rs->sr_err != LDAP_SUCCESS ) {
401 Debug( LDAP_DEBUG_TRACE,
402 "slap_modrdn2modlist: %s: %s (new)\n",
404 new_rdn[ a_cnt ]->la_attr.bv_val, 0 );
408 /* ACL check of newly added attrs */
409 if ( op->o_bd && !access_allowed( op, e, desc,
410 &new_rdn[a_cnt]->la_value, ACL_WADD, NULL ) ) {
411 Debug( LDAP_DEBUG_TRACE,
412 "slap_modrdn2modlist: access to attr \"%s\" "
413 "(new) not allowed\n",
414 new_rdn[ a_cnt ]->la_attr.bv_val, 0, 0 );
415 rs->sr_text = "access to naming attributes (new) not allowed";
416 rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
420 /* Apply modification */
421 mod_tmp = ( Modifications * )ch_malloc( sizeof( Modifications )
422 + 4 * sizeof( struct berval ) );
423 mod_tmp->sml_desc = desc;
424 mod_tmp->sml_values = ( BerVarray )( mod_tmp + 1 );
425 mod_tmp->sml_values[0] = new_rdn[a_cnt]->la_value;
426 mod_tmp->sml_values[1].bv_val = NULL;
427 if( desc->ad_type->sat_equality->smr_normalize) {
428 mod_tmp->sml_nvalues = &mod_tmp->sml_values[2];
429 (void) (*desc->ad_type->sat_equality->smr_normalize)(
430 SLAP_MR_EQUALITY|SLAP_MR_VALUE_OF_ASSERTION_SYNTAX,
431 desc->ad_type->sat_syntax,
432 desc->ad_type->sat_equality,
433 &mod_tmp->sml_values[0],
434 &mod_tmp->sml_nvalues[0], NULL );
435 mod_tmp->sml_nvalues[1].bv_val = NULL;
437 mod_tmp->sml_nvalues = NULL;
439 mod_tmp->sml_op = SLAP_MOD_SOFTADD;
440 mod_tmp->sml_flags = SLAP_MOD_INTERNAL;
441 mod_tmp->sml_next = mod;
445 /* Remove old rdn value if required */
446 if ( op->orr_deleteoldrdn ) {
447 for ( d_cnt = 0; old_rdn[d_cnt]; d_cnt++ ) {
448 AttributeDescription *desc = NULL;
449 Modifications *mod_tmp;
451 rs->sr_err = slap_bv2ad( &old_rdn[d_cnt]->la_attr, &desc, &rs->sr_text );
452 if ( rs->sr_err != LDAP_SUCCESS ) {
453 Debug( LDAP_DEBUG_TRACE,
454 "slap_modrdn2modlist: %s: %s (old)\n",
456 old_rdn[d_cnt]->la_attr.bv_val,
461 /* ACL check of old rdn attrs removal */
462 if ( op->o_bd && !access_allowed( op, e, desc,
463 &old_rdn[d_cnt]->la_value, ACL_WDEL,
465 Debug( LDAP_DEBUG_TRACE,
466 "slap_modrdn2modlist: access "
467 "to attr \"%s\" (old) not allowed\n",
468 old_rdn[ d_cnt ]->la_attr.bv_val,
470 rs->sr_text = "access to naming attributes (old) not allowed";
471 rs->sr_err = LDAP_INSUFFICIENT_ACCESS;
475 /* Apply modification */
476 mod_tmp = ( Modifications * )ch_malloc( sizeof( Modifications )
477 + 4 * sizeof ( struct berval ) );
478 mod_tmp->sml_desc = desc;
479 mod_tmp->sml_values = ( BerVarray )(mod_tmp+1);
480 mod_tmp->sml_values[0] = old_rdn[d_cnt]->la_value;
481 mod_tmp->sml_values[1].bv_val = NULL;
482 if( desc->ad_type->sat_equality->smr_normalize) {
483 mod_tmp->sml_nvalues = &mod_tmp->sml_values[2];
484 (void) (*desc->ad_type->sat_equality->smr_normalize)(
485 SLAP_MR_EQUALITY|SLAP_MR_VALUE_OF_ASSERTION_SYNTAX,
486 desc->ad_type->sat_syntax,
487 desc->ad_type->sat_equality,
488 &mod_tmp->sml_values[0],
489 &mod_tmp->sml_nvalues[0], op->o_tmpmemctx );
490 mod_tmp->sml_nvalues[1].bv_val = NULL;
492 mod_tmp->sml_nvalues = NULL;
494 mod_tmp->sml_op = LDAP_MOD_DELETE;
495 mod_tmp->sml_flags = SLAP_MOD_INTERNAL;
496 mod_tmp->sml_next = mod;
503 if ( rs->sr_err == LDAP_SUCCESS && !repl_user ) {
504 slap_mods_opattrs( op, &mod, 1 );
507 /* LDAP v2 supporting correct attribute handling. */
508 if ( rs->sr_err != LDAP_SUCCESS && mod != NULL ) {
510 for ( ; mod; mod = tmp ) {
522 slap_modrdn2mods_free( Modifications *mod )
526 for ( ; mod; mod = tmp ) {
528 /* slap_modrdn2mods does things one way,
529 * slap_mods_opattrs does it differently
531 if ( mod->sml_op != SLAP_MOD_SOFTADD &&
532 mod->sml_op != LDAP_MOD_DELETE )
537 if ( mod->sml_nvalues ) {
538 free( mod->sml_nvalues[0].bv_val );
544 slap_mods_free( mod, 1 );