]> git.sur5r.net Git - openldap/blobdiff - servers/slapd/back-meta/modrdn.c
Drop unnecessary memset()s
[openldap] / servers / slapd / back-meta / modrdn.c
index a0d7e408ccd443925aa01126eb17465e8dc9f864..f6e27c64902f3d622e1c7363e982eb50825dd366 100644 (file)
@@ -1,7 +1,7 @@
 /* $OpenLDAP$ */
 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
  *
- * Copyright 1999-2005 The OpenLDAP Foundation.
+ * Copyright 1999-2006 The OpenLDAP Foundation.
  * Portions Copyright 2001-2003 Pierangelo Masarati.
  * Portions Copyright 1999-2003 Howard Chu.
  * All rights reserved.
 int
 meta_back_modrdn( Operation *op, SlapReply *rs )
 {
-       struct metainfo         *li = ( struct metainfo * )op->o_bd->be_private;
-       struct metaconn         *lc;
-       int                     rc = 0;
-       int                     candidate = -1;
-       struct berval           mdn = BER_BVNULL,
-                               mnewSuperior = BER_BVNULL;
-       dncookie                dc;
-
-       lc = meta_back_getconn( op, rs, META_OP_REQUIRE_SINGLE,
-                       &op->o_req_ndn, &candidate, LDAP_BACK_SENDERR );
-       if ( !lc ) {
+       metainfo_t      *mi = ( metainfo_t * )op->o_bd->be_private;
+       metatarget_t    *mt;
+       metaconn_t      *mc;
+       int             candidate = -1;
+       struct berval   mdn = BER_BVNULL,
+                       mnewSuperior = BER_BVNULL;
+       dncookie        dc;
+       int             msgid;
+       int             do_retry = 1;
+       LDAPControl     **ctrls = NULL;
+
+       mc = meta_back_getconn( op, rs, &candidate, LDAP_BACK_SENDERR );
+       if ( !mc || !meta_back_dobind( op, rs, mc, LDAP_BACK_SENDERR ) ) {
                return rs->sr_err;
        }
 
-       assert( candidate != META_TARGET_NONE );
-
-       if ( !meta_back_dobind( lc, op, LDAP_BACK_SENDERR ) ) {
-               return rs->sr_err;
-       }
-               
-       if ( !meta_back_is_valid( lc, candidate ) ) {
-               rs->sr_err = LDAP_OTHER;
-               send_ldap_result( op, rs );
-               return rs->sr_err;
-       }
+       assert( mc->mc_conns[ candidate ].msc_ld != NULL );
 
+       mt = mi->mi_targets[ candidate ];
+       dc.target = mt;
        dc.conn = op->o_conn;
        dc.rs = rs;
 
        if ( op->orr_newSup ) {
-               int nsCandidate, version = LDAP_VERSION3;
-
-               nsCandidate = meta_back_select_unique_candidate( li,
-                               op->orr_nnewSup );
-
-               if ( nsCandidate != candidate ) {
-                       /*
-                        * FIXME: one possibility is to delete the entry
-                        * from one target and add it to the other;
-                        * unfortunately we'd need write access to both,
-                        * which is nearly impossible; for administration
-                        * needs, the rootdn of the metadirectory could
-                        * be mapped to an administrative account on each
-                        * target (the binddn?); we'll see.
-                        */
-                       /*
-                        * FIXME: is this the correct return code?
-                        */
+
+               /*
+                * NOTE: the newParent, if defined, must be on the 
+                * same target as the entry to be renamed.  This check
+                * has been anticipated in meta_back_getconn()
+                */
+               /*
+                * FIXME: one possibility is to delete the entry
+                * from one target and add it to the other;
+                * unfortunately we'd need write access to both,
+                * which is nearly impossible; for administration
+                * needs, the rootdn of the metadirectory could
+                * be mapped to an administrative account on each
+                * target (the binddn?); we'll see.
+                */
+               /*
+                * NOTE: we need to port the identity assertion
+                * feature from back-ldap
+                */
+
+               /* needs LDAPv3 */
+               switch ( mt->mt_version ) {
+               case LDAP_VERSION3:
+                       break;
+
+               case 0:
+                       if ( op->o_protocol == 0 || op->o_protocol == LDAP_VERSION3 ) {
+                               break;
+                       }
+                       /* fall thru */
+
+               default:
+                       /* op->o_protocol cannot be anything but LDAPv3,
+                        * otherwise wouldn't be here */
                        rs->sr_err = LDAP_UNWILLING_TO_PERFORM;
-                       rs->sr_text = "cross-target rename not supported";
-                       rc = -1;
+                       send_ldap_result( op, rs );
                        goto cleanup;
                }
-
-               ldap_set_option( lc->mc_conns[ nsCandidate ].msc_ld,
-                               LDAP_OPT_PROTOCOL_VERSION, &version );
-
+               
                /*
                 * Rewrite the new superior, if defined and required
                 */
-               dc.rwmap = &li->targets[ nsCandidate ]->mt_rwmap;
                dc.ctx = "newSuperiorDN";
                if ( ldap_back_dn_massage( &dc, op->orr_newSup, &mnewSuperior ) ) {
-                       rc = -1;
+                       rs->sr_err = LDAP_OTHER;
+                       send_ldap_result( op, rs );
                        goto cleanup;
                }
        }
@@ -105,20 +111,40 @@ meta_back_modrdn( Operation *op, SlapReply *rs )
        /*
         * Rewrite the modrdn dn, if required
         */
-       dc.rwmap = &li->targets[ candidate ]->mt_rwmap;
        dc.ctx = "modrDN";
        if ( ldap_back_dn_massage( &dc, &op->o_req_dn, &mdn ) ) {
-               rc = -1;
+               rs->sr_err = LDAP_OTHER;
+               send_ldap_result( op, rs );
                goto cleanup;
        }
 
-       rc = ldap_rename_s( lc->mc_conns[ candidate ].msc_ld, mdn.bv_val,
-                       op->orr_newrdn.bv_val,
-                       mnewSuperior.bv_val,
-                       op->orr_deleteoldrdn,
-                       op->o_ctrls, NULL ) != LDAP_SUCCESS;
+retry:;
+       ctrls = op->o_ctrls;
+       if ( ldap_back_proxy_authz_ctrl( &mc->mc_conns[ candidate ].msc_bound_ndn,
+               mt->mt_version, &mt->mt_idassert, op, rs, &ctrls ) != LDAP_SUCCESS )
+       {
+               send_ldap_result( op, rs );
+               goto cleanup;
+       }
+
+       rs->sr_err = ldap_rename( mc->mc_conns[ candidate ].msc_ld,
+                       mdn.bv_val, op->orr_newrdn.bv_val,
+                       mnewSuperior.bv_val, op->orr_deleteoldrdn,
+                       ctrls, NULL, &msgid );
+       rs->sr_err = meta_back_op_result( mc, op, rs, candidate, msgid,
+               mt->mt_timeout[ SLAP_OP_MODRDN ], LDAP_BACK_SENDRESULT );
+       if ( rs->sr_err == LDAP_UNAVAILABLE && do_retry ) {
+               do_retry = 0;
+               if ( meta_back_retry( op, rs, &mc, candidate, LDAP_BACK_SENDERR ) ) {
+                       /* if the identity changed, there might be need to re-authz */
+                       (void)ldap_back_proxy_authz_ctrl_free( op, &ctrls );
+                       goto retry;
+               }
+       }
 
 cleanup:;
+       (void)ldap_back_proxy_authz_ctrl_free( op, &ctrls );
+
        if ( mdn.bv_val != op->o_req_dn.bv_val ) {
                free( mdn.bv_val );
                BER_BVZERO( &mdn );
@@ -131,13 +157,10 @@ cleanup:;
                BER_BVZERO( &mnewSuperior );
        }
 
-       if ( rc == 0 ) {
-               return meta_back_op_result( lc, op, rs ) == LDAP_SUCCESS
-                       ? 0 : 1;
-       } /* else */
-
-       send_ldap_result( op, rs );
+       if ( mc ) {
+               meta_back_release_conn( op, mc );
+       }
 
-       return rc;
+       return rs->sr_err;
 }