]> git.sur5r.net Git - openldap/blobdiff - servers/slapd/modify.c
Sync with HEAD
[openldap] / servers / slapd / modify.c
index 1b707e175fce811be156a6d973f0436bc6a699ef..77b0d5013a2a630dd7fc6559227788b7b3ae77dd 100644 (file)
@@ -1,7 +1,7 @@
 /* $OpenLDAP$ */
 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
  *
- * Copyright 1998-2004 The OpenLDAP Foundation.
+ * Copyright 1998-2005 The OpenLDAP Foundation.
  * All rights reserved.
  *
  * Redistribution and use in source and binary forms, with or without
@@ -31,7 +31,6 @@
 #include <ac/string.h>
 #include <ac/time.h>
 
-#include "ldap_pvt.h"
 #include "slap.h"
 #ifdef LDAP_SLAPI
 #include "slapi/slapi.h"
@@ -51,6 +50,8 @@ do_modify(
        Modifications   *modlist = NULL;
        Modifications   **modtail = &modlist;
        int             increment = 0;
+       char            textbuf[ SLAP_TEXT_BUFLEN ];
+       size_t          textlen = sizeof( textbuf );
 
        Debug( LDAP_DEBUG_TRACE, "do_modify\n", 0, 0, 0 );
 
@@ -185,7 +186,15 @@ do_modify(
                goto cleanup;
        }
 
-       /* FIXME: temporary */
+       rs->sr_err = slap_mods_check( modlist, &rs->sr_text,
+               textbuf, textlen, NULL );
+
+       if ( rs->sr_err != LDAP_SUCCESS ) {
+               send_ldap_result( op, rs );
+               goto cleanup;
+       }
+
+       /* FIXME: needs review */
        op->orm_modlist = modlist;
        op->orm_increment = increment;
 
@@ -197,7 +206,7 @@ cleanup:
 
        op->o_tmpfree( op->o_req_dn.bv_val, op->o_tmpmemctx );
        op->o_tmpfree( op->o_req_ndn.bv_val, op->o_tmpmemctx );
-       if ( modlist != NULL ) slap_mods_free( modlist );
+       if ( op->orm_modlist != NULL ) slap_mods_free( op->orm_modlist );
 
        return rs->sr_err;
 }
@@ -215,6 +224,10 @@ fe_op_modify( Operation *op, SlapReply *rs )
        LDAPMod         **modv = NULL;
 #endif
        int             increment = op->orm_increment;
+       int             rc = 0;
+       BackendDB *op_be;
+       char            textbuf[ SLAP_TEXT_BUFLEN ];
+       size_t          textlen = sizeof( textbuf );
        
        if( op->o_req_ndn.bv_len == 0 ) {
                Debug( LDAP_DEBUG_ANY, "do_modify: root dse!\n", 0, 0, 0 );
@@ -260,20 +273,20 @@ fe_op_modify( Operation *op, SlapReply *rs )
                char abuf[BUFSIZ/2], *ptr = abuf;
                int len = 0;
 
-               Statslog( LDAP_DEBUG_STATS, "conn=%lu op=%lu MOD dn=\"%s\"\n",
-                       op->o_connid, op->o_opid, op->o_req_dn.bv_val, 0, 0 );
+               Statslog( LDAP_DEBUG_STATS, "%s MOD dn=\"%s\"\n",
+                       op->o_log_prefix, op->o_req_dn.bv_val, 0, 0, 0 );
 
                for ( tmp = modlist; tmp != NULL; tmp = tmp->sml_next ) {
                        if (len + 1 + tmp->sml_type.bv_len > sizeof(abuf)) {
-                               Statslog( LDAP_DEBUG_STATS, "conn=%lu op=%lu MOD attr=%s\n",
-                                   op->o_connid, op->o_opid, abuf, 0, 0 );
+                               Statslog( LDAP_DEBUG_STATS, "%s MOD attr=%s\n",
+                                   op->o_log_prefix, abuf, 0, 0, 0 );
 
-                       len = 0;
+                               len = 0;
                                ptr = abuf;
 
                                if( 1 + tmp->sml_type.bv_len > sizeof(abuf)) {
-                                       Statslog( LDAP_DEBUG_STATS, "conn=%lu op=%lu MOD attr=%s\n",
-                                               op->o_connid, op->o_opid, tmp->sml_type.bv_val, 0, 0 );
+                                       Statslog( LDAP_DEBUG_STATS, "%s MOD attr=%s\n",
+                                               op->o_log_prefix, tmp->sml_type.bv_val, 0, 0, 0 );
                                        continue;
                                }
                        }
@@ -285,8 +298,8 @@ fe_op_modify( Operation *op, SlapReply *rs )
                        len += tmp->sml_type.bv_len;
                }
                if (len) {
-                       Statslog( LDAP_DEBUG_STATS, "conn=%lu op=%lu MOD attr=%s\n",
-                               op->o_connid, op->o_opid, abuf, 0, 0 );
+                       Statslog( LDAP_DEBUG_STATS, "%s MOD attr=%s\n",
+                               op->o_log_prefix, abuf, 0, 0, 0 );
                }
        }
 #endif /* LDAP_DEBUG */
@@ -298,7 +311,7 @@ fe_op_modify( Operation *op, SlapReply *rs )
         * appropriate one, or send a referral to our "referral server"
         * if we don't hold it.
         */
-       op->o_bd = select_backend( &op->o_req_ndn, manageDSAit, 0 );
+       op->o_bd = select_backend( &op->o_req_ndn, manageDSAit, 1 );
        if ( op->o_bd == NULL ) {
                rs->sr_ref = referral_rewrite( default_referral,
                        NULL, &op->o_req_dn, LDAP_SCOPE_DEFAULT );
@@ -306,16 +319,26 @@ fe_op_modify( Operation *op, SlapReply *rs )
 
                if (rs->sr_ref != NULL ) {
                        rs->sr_err = LDAP_REFERRAL;
+                       op->o_bd = frontendDB;
                        send_ldap_result( op, rs );
+                       op->o_bd = NULL;
 
                        if (rs->sr_ref != default_referral) ber_bvarray_free( rs->sr_ref );
                } else {
+                       op->o_bd = frontendDB;
                        send_ldap_error( op, rs, LDAP_UNWILLING_TO_PERFORM,
                                "no global superior knowledge" );
+                       op->o_bd = NULL;
                }
                goto cleanup;
        }
 
+       /* If we've got a glued backend, check the real backend */
+       op_be = op->o_bd;
+       if ( SLAP_GLUE_INSTANCE( op->o_bd )) {
+               op->o_bd = select_backend( &op->o_req_ndn, manageDSAit, 0 );
+       }
+
        /* check restrictions */
        if( backend_check_restrictions( op, rs, NULL ) != LDAP_SUCCESS ) {
                send_ldap_result( op, rs );
@@ -327,6 +350,15 @@ fe_op_modify( Operation *op, SlapReply *rs )
                goto cleanup;
        }
 
+       {
+               rs->sr_err = slap_mods_obsolete_check( op, modlist,
+                       &rs->sr_text, textbuf, textlen );
+               if ( rs->sr_err != LDAP_SUCCESS ) {
+                       send_ldap_result( op, rs );
+                       goto cleanup;
+               }
+       }
+
        /* check for modify/increment support */
        if( increment && !SLAP_INCREMENT( op->o_bd ) ) {
                send_ldap_error( op, rs, LDAP_UNWILLING_TO_PERFORM,
@@ -405,17 +437,18 @@ fe_op_modify( Operation *op, SlapReply *rs )
                if ( !SLAP_SHADOW(op->o_bd) || repl_user )
 #endif
                {
-                       int update = op->o_bd->be_update_ndn.bv_len;
-                       char textbuf[SLAP_TEXT_BUFLEN];
-                       size_t textlen = sizeof textbuf;
-                       slap_callback cb = { NULL, slap_replog_cb, NULL, NULL };
+                       int             update = !BER_BVISEMPTY( &op->o_bd->be_update_ndn );
+                       slap_callback   cb = { NULL, slap_replog_cb, NULL, NULL };
 
-                       rs->sr_err = slap_mods_check( modlist, update, &rs->sr_text,
-                               textbuf, textlen, NULL );
+                       op->o_bd = op_be;
 
-                       if( rs->sr_err != LDAP_SUCCESS ) {
-                               send_ldap_result( op, rs );
-                               goto cleanup;
+                       if ( !update ) {
+                               rs->sr_err = slap_mods_no_user_mod_check( op, modlist,
+                                       &rs->sr_text, textbuf, textlen );
+                               if ( rs->sr_err != LDAP_SUCCESS ) {
+                                       send_ldap_result( op, rs );
+                                       goto cleanup;
+                               }
                        }
 
                        if ( !repl_user ) {
@@ -439,7 +472,8 @@ fe_op_modify( Operation *op, SlapReply *rs )
                        if ( !repl_user )
 #endif
                        {
-                               /* but we log only the ones not from a replicator user */
+                               /* but multimaster slapd logs only the ones 
+                                * not from a replicator user */
                                cb.sc_next = op->o_callback;
                                op->o_callback = &cb;
                        }
@@ -454,12 +488,17 @@ fe_op_modify( Operation *op, SlapReply *rs )
                                rs->sr_ref = referral_rewrite( defref,
                                        NULL, &op->o_req_dn,
                                        LDAP_SCOPE_DEFAULT );
-                               if (!rs->sr_ref) rs->sr_ref = defref;
+                               if ( rs->sr_ref == NULL ) {
+                                       /* FIXME: must duplicate, because
+                                        * overlays may muck with it */
+                                       rs->sr_ref = defref;
+                               }
                                rs->sr_err = LDAP_REFERRAL;
                                send_ldap_result( op, rs );
-                               if (rs->sr_ref != defref) {
+                               if ( rs->sr_ref != defref ) {
                                        ber_bvarray_free( rs->sr_ref );
                                }
+
                        } else {
                                send_ldap_error( op, rs, LDAP_UNWILLING_TO_PERFORM,
                                        "shadow context; no update referral" );
@@ -488,12 +527,83 @@ cleanup:;
        return rs->sr_err;
 }
 
+/*
+ * Obsolete constraint checking.
+ */
+int
+slap_mods_obsolete_check(
+       Operation *op,
+       Modifications *ml,
+       const char **text,
+       char *textbuf,
+       size_t textlen )
+{
+       if( get_manageDIT( op ) ) return LDAP_SUCCESS;
+
+       for ( ; ml != NULL; ml = ml->sml_next ) {
+               if ( is_at_obsolete( ml->sml_desc->ad_type ) &&
+                       (( ml->sml_op != LDAP_MOD_REPLACE &&
+                               ml->sml_op != LDAP_MOD_DELETE ) ||
+                                       ml->sml_values != NULL ))
+               {
+                       /*
+                        * attribute is obsolete,
+                        * only allow replace/delete with no values
+                        */
+                       snprintf( textbuf, textlen,
+                               "%s: attribute is obsolete",
+                               ml->sml_type.bv_val );
+                       *text = textbuf;
+                       return LDAP_CONSTRAINT_VIOLATION;
+               }
+       }
+
+       return LDAP_SUCCESS;
+}
+
+/*
+ * No-user-modification constraint checking.
+ */
+int
+slap_mods_no_user_mod_check(
+       Operation *op,
+       Modifications *ml,
+       const char **text,
+       char *textbuf,
+       size_t textlen )
+{
+       for ( ; ml != NULL; ml = ml->sml_next ) {
+               if ( !is_at_no_user_mod( ml->sml_desc->ad_type ) ) continue;
+
+               if( get_manageDIT( op )) {
+                       if ( ml->sml_desc->ad_type->sat_flags & SLAP_AT_MANAGEABLE ) {
+                               continue;
+                       }
+
+                       /* attribute not manageable */
+                       snprintf( textbuf, textlen,
+                               "%s: no-user-modification attribute not manageable",
+                               ml->sml_type.bv_val );
+
+               } else {
+                       /* user modification disallowed */
+                       snprintf( textbuf, textlen,
+                               "%s: no user modification allowed",
+                               ml->sml_type.bv_val );
+               }
+
+               *text = textbuf;
+               return LDAP_CONSTRAINT_VIOLATION;
+       }
+
+       return LDAP_SUCCESS;
+}
+
 /*
  * Do basic attribute type checking and syntax validation.
  */
 int slap_mods_check(
        Modifications *ml,
-       int update,
        const char **text,
        char *textbuf,
        size_t textlen,
@@ -547,15 +657,7 @@ int slap_mods_check(
                        return LDAP_UNDEFINED_TYPE;
                }
 
-               if (!update && is_at_no_user_mod( ad->ad_type )) {
-                       /* user modification disallowed */
-                       snprintf( textbuf, textlen,
-                               "%s: no user modification allowed",
-                               ml->sml_type.bv_val );
-                       *text = textbuf;
-                       return LDAP_CONSTRAINT_VIOLATION;
-               }
-
+#if 0
                if ( is_at_obsolete( ad->ad_type ) &&
                        (( ml->sml_op != LDAP_MOD_REPLACE &&
                                ml->sml_op != LDAP_MOD_DELETE ) ||
@@ -571,6 +673,7 @@ int slap_mods_check(
                        *text = textbuf;
                        return LDAP_CONSTRAINT_VIOLATION;
                }
+#endif
 
                if ( ml->sml_op == LDAP_MOD_INCREMENT &&
 #ifdef SLAPD_REAL_SYNTAX
@@ -686,59 +789,37 @@ int slap_mods_check(
                                ml->sml_nvalues[nvals].bv_len = 0;
                        }
 
-                       if( nvals ) {
-                               /* check for duplicates */
-                               int             i, j;
+                       /* check for duplicates, but ignore Deletes.
+                        */
+                       if( nvals > 1 && ml->sml_op != LDAP_MOD_DELETE ) {
+                               int             i, j, rc, match;
                                MatchingRule *mr = ad->ad_type->sat_equality;
 
-                               /* check if the values we're adding already exist */
-                               if( mr == NULL || !mr->smr_match ) {
-                                       for ( i = 1; ml->sml_values[i].bv_val != NULL; i++ ) {
-                                               /* test asserted values against themselves */
-                                               for( j = 0; j < i; j++ ) {
-                                                       if ( bvmatch( &ml->sml_values[i],
-                                                               &ml->sml_values[j] ) )
-                                                       {
-                                                               /* value exists already */
-                                                               snprintf( textbuf, textlen,
-                                                                       "%s: value #%d provided more than once",
-                                                                       ml->sml_desc->ad_cname.bv_val, j );
-                                                               *text = textbuf;
-                                                               return LDAP_TYPE_OR_VALUE_EXISTS;
-                                                       }
-                                               }
-                                       }
-
-                               } else {
-                                       int rc;
-                                       int match;
-
-                                       for ( i = 1; ml->sml_values[i].bv_val != NULL; i++ ) {
-                                               /* test asserted values against themselves */
-                                               for( j = 0; j < i; j++ ) {
-                                                       rc = value_match( &match, ml->sml_desc, mr,
-                                                               SLAP_MR_EQUALITY
-                                                                       | SLAP_MR_VALUE_OF_ATTRIBUTE_SYNTAX
-                                                                       | SLAP_MR_ASSERTED_VALUE_NORMALIZED_MATCH
-                                                                       | SLAP_MR_ATTRIBUTE_VALUE_NORMALIZED_MATCH,
-                                                               ml->sml_nvalues
-                                                                       ? &ml->sml_nvalues[i]
-                                                                       : &ml->sml_values[i],
-                                                               ml->sml_nvalues
-                                                                       ? &ml->sml_nvalues[j]
-                                                                       : &ml->sml_values[j],
-                                                               text );
-                                                       if ( rc == LDAP_SUCCESS && match == 0 ) {
-                                                               /* value exists already */
-                                                               snprintf( textbuf, textlen,
-                                                                       "%s: value #%d provided more than once",
-                                                                       ml->sml_desc->ad_cname.bv_val, j );
-                                                               *text = textbuf;
-                                                               return LDAP_TYPE_OR_VALUE_EXISTS;
-
-                                                       } else if ( rc != LDAP_SUCCESS ) {
-                                                               return rc;
-                                                       }
+                               for ( i = 1; i < nvals ; i++ ) {
+                                       /* test asserted values against themselves */
+                                       for( j = 0; j < i; j++ ) {
+                                               rc = ordered_value_match( &match, ml->sml_desc, mr,
+                                                       SLAP_MR_EQUALITY
+                                                               | SLAP_MR_VALUE_OF_ATTRIBUTE_SYNTAX
+                                                               | SLAP_MR_ASSERTED_VALUE_NORMALIZED_MATCH
+                                                               | SLAP_MR_ATTRIBUTE_VALUE_NORMALIZED_MATCH,
+                                                       ml->sml_nvalues
+                                                               ? &ml->sml_nvalues[i]
+                                                               : &ml->sml_values[i],
+                                                       ml->sml_nvalues
+                                                               ? &ml->sml_nvalues[j]
+                                                               : &ml->sml_values[j],
+                                                       text );
+                                               if ( rc == LDAP_SUCCESS && match == 0 ) {
+                                                       /* value exists already */
+                                                       snprintf( textbuf, textlen,
+                                                               "%s: value #%d provided more than once",
+                                                               ml->sml_desc->ad_cname.bv_val, j );
+                                                       *text = textbuf;
+                                                       return LDAP_TYPE_OR_VALUE_EXISTS;
+
+                                               } else if ( rc != LDAP_SUCCESS ) {
+                                                       return rc;
                                                }
                                        }
                                }
@@ -806,7 +887,7 @@ int slap_mods_opattrs(
        if( op->o_tag == LDAP_REQ_ADD ) {
                struct berval tmpval;
 
-               if( global_schemacheck ) {
+               {
                        int rc = mods_structural_class( mods, &tmpval,
                                text, textbuf, textlen );
                        if( rc != LDAP_SUCCESS ) return rc;