X-Git-Url: https://git.sur5r.net/?a=blobdiff_plain;f=servers%2Fslapd%2Fmodify.c;h=77b0d5013a2a630dd7fc6559227788b7b3ae77dd;hb=021443bd5d355b8171dcbe4650c67507b9e1b83b;hp=f388f2e37432fa25069cb83efe0475a5200f456e;hpb=84918362df7dc04c4f81dd83529fe38490a8bced;p=openldap diff --git a/servers/slapd/modify.c b/servers/slapd/modify.c index f388f2e374..77b0d5013a 100644 --- a/servers/slapd/modify.c +++ b/servers/slapd/modify.c @@ -1,10 +1,18 @@ /* $OpenLDAP$ */ -/* - * Copyright 1998-2003 The OpenLDAP Foundation, All Rights Reserved. - * COPYING RESTRICTIONS APPLY, see COPYRIGHT file +/* This work is part of OpenLDAP Software . + * + * Copyright 1998-2005 The OpenLDAP Foundation. + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted only as authorized by the OpenLDAP + * Public License. + * + * A copy of this license is available in the file LICENSE in the + * top-level directory of the distribution or, alternatively, at + * . */ -/* - * Copyright (c) 1995 Regents of the University of Michigan. +/* Portions Copyright (c) 1995 Regents of the University of Michigan. * All rights reserved. * * Redistribution and use in source and binary forms are permitted @@ -16,7 +24,6 @@ */ #include "portable.h" -#include "slapi_common.h" #include @@ -24,48 +31,29 @@ #include #include -#include "lutil.h" - -#include "ldap_pvt.h" #include "slap.h" -#include "slapi.h" - #ifdef LDAP_SLAPI -static LDAPMod **Modifications2LDAPMods (Modifications **modlist); -static Modifications *LDAPMods2Modifications (LDAPMod **mods); -static void FreeLDAPMods (LDAPMod **mods); -#endif /* LDAP_SLAPI */ +#include "slapi/slapi.h" +#endif +#include "lutil.h" + int do_modify( - Connection *conn, - Operation *op ) + Operation *op, + SlapReply *rs ) { - struct berval dn = { 0, NULL }; - struct berval pdn = { 0, NULL }; - struct berval ndn = { 0, NULL }; + struct berval dn = BER_BVNULL; char *last; ber_tag_t tag; ber_len_t len; Modifications *modlist = NULL; Modifications **modtail = &modlist; -#ifdef LDAP_SLAPI - LDAPMod **modv = NULL; -#endif -#ifdef LDAP_DEBUG - Modifications *tmp; -#endif - Backend *be; - int rc; - const char *text; - int manageDSAit; - Slapi_PBlock *pb = op->o_pb; + int increment = 0; + char textbuf[ SLAP_TEXT_BUFLEN ]; + size_t textlen = sizeof( textbuf ); -#ifdef NEW_LOGGING - LDAP_LOG( OPERATION, ENTRY, "do_modify: enter\n", 0, 0, 0 ); -#else Debug( LDAP_DEBUG_TRACE, "do_modify\n", 0, 0, 0 ); -#endif /* * Parse the modify request. It looks like this: @@ -87,26 +75,15 @@ do_modify( */ if ( ber_scanf( op->o_ber, "{m" /*}*/, &dn ) == LBER_ERROR ) { -#ifdef NEW_LOGGING - LDAP_LOG( OPERATION, ERR, "do_modify: ber_scanf failed\n", 0, 0, 0 ); -#else Debug( LDAP_DEBUG_ANY, "do_modify: ber_scanf failed\n", 0, 0, 0 ); -#endif - send_ldap_disconnect( conn, op, - LDAP_PROTOCOL_ERROR, "decoding error" ); + send_ldap_discon( op, rs, LDAP_PROTOCOL_ERROR, "decoding error" ); return SLAPD_DISCONNECT; } -#ifdef NEW_LOGGING - LDAP_LOG( OPERATION, ARGS, "do_modify: dn (%s)\n", dn.bv_val, 0, 0 ); -#else Debug( LDAP_DEBUG_ARGS, "do_modify: dn (%s)\n", dn.bv_val, 0, 0 ); -#endif - /* collect modifications & save for later */ - for ( tag = ber_first_element( op->o_ber, &len, &last ); tag != LBER_DEFAULT; tag = ber_next_element( op->o_ber, &len, last ) ) @@ -114,42 +91,35 @@ do_modify( ber_int_t mop; Modifications tmp, *mod; + tmp.sml_nvalues = NULL; if ( ber_scanf( op->o_ber, "{i{m[W]}}", &mop, - &tmp.sml_type, &tmp.sml_bvalues ) - == LBER_ERROR ) + &tmp.sml_type, &tmp.sml_values ) == LBER_ERROR ) { - send_ldap_disconnect( conn, op, - LDAP_PROTOCOL_ERROR, "decoding modlist error" ); - rc = SLAPD_DISCONNECT; + send_ldap_discon( op, rs, LDAP_PROTOCOL_ERROR, + "decoding modlist error" ); + rs->sr_err = SLAPD_DISCONNECT; goto cleanup; } mod = (Modifications *) ch_malloc( sizeof(Modifications) ); mod->sml_op = mop; mod->sml_type = tmp.sml_type; - mod->sml_bvalues = tmp.sml_bvalues; + mod->sml_values = tmp.sml_values; + mod->sml_nvalues = NULL; mod->sml_desc = NULL; mod->sml_next = NULL; *modtail = mod; switch( mop ) { case LDAP_MOD_ADD: - if ( mod->sml_bvalues == NULL ) { -#ifdef NEW_LOGGING - LDAP_LOG( OPERATION, ERR, - "do_modify: modify/add operation (%ld) requires values\n", - (long)mop, 0, 0 ); -#else + if ( mod->sml_values == NULL ) { Debug( LDAP_DEBUG_ANY, "do_modify: modify/add operation (%ld) requires values\n", (long) mop, 0, 0 ); -#endif - send_ldap_result( conn, op, LDAP_PROTOCOL_ERROR, - NULL, "modify/add operation requires values", - NULL, NULL ); - rc = LDAP_PROTOCOL_ERROR; + send_ldap_error( op, rs, LDAP_PROTOCOL_ERROR, + "modify/add operation requires values" ); goto cleanup; } @@ -159,19 +129,40 @@ do_modify( case LDAP_MOD_REPLACE: break; + case LDAP_MOD_INCREMENT: + if( op->o_protocol >= LDAP_VERSION3 ) { + increment++; + if ( mod->sml_values == NULL ) { + Debug( LDAP_DEBUG_ANY, "do_modify: " + "modify/increment operation (%ld) requires value\n", + (long) mop, 0, 0 ); + + send_ldap_error( op, rs, LDAP_PROTOCOL_ERROR, + "modify/increment operation requires value" ); + goto cleanup; + } + + if( mod->sml_values[1].bv_val ) { + Debug( LDAP_DEBUG_ANY, "do_modify: modify/increment " + "operation (%ld) requires single value\n", + (long) mop, 0, 0 ); + + send_ldap_error( op, rs, LDAP_PROTOCOL_ERROR, + "modify/increment operation requires single value" ); + goto cleanup; + } + + break; + } + /* fall thru */ + default: { -#ifdef NEW_LOGGING - LDAP_LOG( OPERATION, ERR, - "do_modify: invalid modify operation (%ld)\n", (long)mop, 0, 0 ); -#else Debug( LDAP_DEBUG_ANY, - "do_modify: invalid modify operation (%ld)\n", + "do_modify: unrecognized modify operation (%ld)\n", (long) mop, 0, 0 ); -#endif - send_ldap_result( conn, op, LDAP_PROTOCOL_ERROR, - NULL, "unrecognized modify operation", NULL, NULL ); - rc = LDAP_PROTOCOL_ERROR; + send_ldap_error( op, rs, LDAP_PROTOCOL_ERROR, + "unrecognized modify operation" ); goto cleanup; } } @@ -180,116 +171,124 @@ do_modify( } *modtail = NULL; - if( (rc = get_ctrls( conn, op, 1 )) != LDAP_SUCCESS ) { -#ifdef NEW_LOGGING - LDAP_LOG( OPERATION, ERR, "do_modify: get_ctrls failed\n", 0, 0, 0 ); -#else + if( get_ctrls( op, rs, 1 ) != LDAP_SUCCESS ) { Debug( LDAP_DEBUG_ANY, "do_modify: get_ctrls failed\n", 0, 0, 0 ); -#endif goto cleanup; } - rc = dnPrettyNormal( NULL, &dn, &pdn, &ndn ); - if( rc != LDAP_SUCCESS ) { -#ifdef NEW_LOGGING - LDAP_LOG( OPERATION, INFO, "do_modify: conn %d invalid dn (%s)\n", - conn->c_connid, dn.bv_val, 0 ); -#else + rs->sr_err = dnPrettyNormal( NULL, &dn, &op->o_req_dn, &op->o_req_ndn, + op->o_tmpmemctx ); + if( rs->sr_err != LDAP_SUCCESS ) { Debug( LDAP_DEBUG_ANY, "do_modify: invalid dn (%s)\n", dn.bv_val, 0, 0 ); -#endif - send_ldap_result( conn, op, rc = LDAP_INVALID_DN_SYNTAX, NULL, - "invalid DN", NULL, NULL ); + send_ldap_error( op, rs, LDAP_INVALID_DN_SYNTAX, "invalid DN" ); goto cleanup; } - if( ndn.bv_len == 0 ) { -#ifdef NEW_LOGGING - LDAP_LOG( OPERATION, ERR, - "do_modify: attempt to modify root DSE.\n",0, 0, 0 ); -#else - Debug( LDAP_DEBUG_ANY, "do_modify: root dse!\n", 0, 0, 0 ); + rs->sr_err = slap_mods_check( modlist, &rs->sr_text, + textbuf, textlen, NULL ); + + if ( rs->sr_err != LDAP_SUCCESS ) { + send_ldap_result( op, rs ); + goto cleanup; + } + + /* FIXME: needs review */ + op->orm_modlist = modlist; + op->orm_increment = increment; + + op->o_bd = frontendDB; + rs->sr_err = frontendDB->be_modify( op, rs ); + +cleanup: + slap_graduate_commit_csn( op ); + + op->o_tmpfree( op->o_req_dn.bv_val, op->o_tmpmemctx ); + op->o_tmpfree( op->o_req_ndn.bv_val, op->o_tmpmemctx ); + if ( op->orm_modlist != NULL ) slap_mods_free( op->orm_modlist ); + + return rs->sr_err; +} + +int +fe_op_modify( Operation *op, SlapReply *rs ) +{ +#ifdef LDAP_DEBUG + Modifications *tmp; +#endif + int manageDSAit; + Modifications *modlist = op->orm_modlist; + Modifications **modtail = &modlist; +#ifdef LDAP_SLAPI + LDAPMod **modv = NULL; #endif + int increment = op->orm_increment; + int rc = 0; + BackendDB *op_be; + char textbuf[ SLAP_TEXT_BUFLEN ]; + size_t textlen = sizeof( textbuf ); + + if( op->o_req_ndn.bv_len == 0 ) { + Debug( LDAP_DEBUG_ANY, "do_modify: root dse!\n", 0, 0, 0 ); - send_ldap_result( conn, op, rc = LDAP_UNWILLING_TO_PERFORM, - NULL, "modify upon the root DSE not supported", NULL, NULL ); + send_ldap_error( op, rs, LDAP_UNWILLING_TO_PERFORM, + "modify upon the root DSE not supported" ); goto cleanup; - } else if ( bvmatch( &ndn, &global_schemandn ) ) { -#ifdef NEW_LOGGING - LDAP_LOG( OPERATION, ERR, - "do_modify: attempt to modify subschema subentry.\n" , 0, 0, 0 ); -#else + } else if ( bvmatch( &op->o_req_ndn, &frontendDB->be_schemandn ) ) { Debug( LDAP_DEBUG_ANY, "do_modify: subschema subentry!\n", 0, 0, 0 ); -#endif - send_ldap_result( conn, op, rc = LDAP_UNWILLING_TO_PERFORM, - NULL, "modification of subschema subentry not supported", - NULL, NULL ); + send_ldap_error( op, rs, LDAP_UNWILLING_TO_PERFORM, + "modification of subschema subentry not supported" ); goto cleanup; } #ifdef LDAP_DEBUG -#ifdef NEW_LOGGING - LDAP_LOG( OPERATION, DETAIL1, "do_modify: modifications:\n", 0, 0, 0 ); -#else Debug( LDAP_DEBUG_ARGS, "modifications:\n", 0, 0, 0 ); -#endif for ( tmp = modlist; tmp != NULL; tmp = tmp->sml_next ) { -#ifdef NEW_LOGGING - LDAP_LOG( OPERATION, DETAIL1, "\t%s: %s\n", - tmp->sml_op == LDAP_MOD_ADD ? - "add" : (tmp->sml_op == LDAP_MOD_DELETE ? - "delete" : "replace"), tmp->sml_type.bv_val, 0 ); - - if ( tmp->sml_bvalues == NULL ) { - LDAP_LOG( OPERATION, DETAIL1, "\t\tno values", 0, 0, 0 ); - } else if ( tmp->sml_bvalues[0].bv_val == NULL ) { - LDAP_LOG( OPERATION, DETAIL1, "\t\tzero values", 0, 0, 0 ); - } else if ( tmp->sml_bvalues[1].bv_val == NULL ) { - LDAP_LOG( OPERATION, DETAIL1, "\t\tone value", 0, 0, 0 ); - } else { - LDAP_LOG( OPERATION, DETAIL1, "\t\tmultiple values", 0, 0, 0 ); - } - -#else Debug( LDAP_DEBUG_ARGS, "\t%s: %s\n", - tmp->sml_op == LDAP_MOD_ADD - ? "add" : (tmp->sml_op == LDAP_MOD_DELETE - ? "delete" : "replace"), tmp->sml_type.bv_val, 0 ); + tmp->sml_op == LDAP_MOD_ADD ? "add" : + (tmp->sml_op == LDAP_MOD_INCREMENT ? "increment" : + (tmp->sml_op == LDAP_MOD_DELETE ? "delete" : + "replace")), tmp->sml_type.bv_val, 0 ); - if ( tmp->sml_bvalues == NULL ) { + if ( tmp->sml_values == NULL ) { Debug( LDAP_DEBUG_ARGS, "%s\n", "\t\tno values", NULL, NULL ); - } else if ( tmp->sml_bvalues[0].bv_val == NULL ) { + } else if ( tmp->sml_values[0].bv_val == NULL ) { Debug( LDAP_DEBUG_ARGS, "%s\n", "\t\tzero values", NULL, NULL ); - } else if ( tmp->sml_bvalues[1].bv_val == NULL ) { + } else if ( tmp->sml_values[1].bv_val == NULL ) { Debug( LDAP_DEBUG_ARGS, "%s, length %ld\n", - "\t\tone value", (long) tmp->sml_bvalues[0].bv_len, NULL ); + "\t\tone value", (long) tmp->sml_values[0].bv_len, NULL ); } else { Debug( LDAP_DEBUG_ARGS, "%s\n", "\t\tmultiple values", NULL, NULL ); } -#endif } -#endif if ( StatslogTest( LDAP_DEBUG_STATS ) ) { char abuf[BUFSIZ/2], *ptr = abuf; int len = 0; - Statslog( LDAP_DEBUG_STATS, "conn=%lu op=%lu MOD dn=\"%s\"\n", - op->o_connid, op->o_opid, dn.bv_val, 0, 0 ); + Statslog( LDAP_DEBUG_STATS, "%s MOD dn=\"%s\"\n", + op->o_log_prefix, op->o_req_dn.bv_val, 0, 0, 0 ); for ( tmp = modlist; tmp != NULL; tmp = tmp->sml_next ) { if (len + 1 + tmp->sml_type.bv_len > sizeof(abuf)) { - Statslog( LDAP_DEBUG_STATS, "conn=%lu op=%lu MOD attr=%s\n", - op->o_connid, op->o_opid, abuf, 0, 0 ); + Statslog( LDAP_DEBUG_STATS, "%s MOD attr=%s\n", + op->o_log_prefix, abuf, 0, 0, 0 ); + len = 0; ptr = abuf; + + if( 1 + tmp->sml_type.bv_len > sizeof(abuf)) { + Statslog( LDAP_DEBUG_STATS, "%s MOD attr=%s\n", + op->o_log_prefix, tmp->sml_type.bv_val, 0, 0, 0 ); + continue; + } } if (len) { *ptr++ = ' '; @@ -299,10 +298,11 @@ do_modify( len += tmp->sml_type.bv_len; } if (len) { - Statslog( LDAP_DEBUG_STATS, "conn=%lu op=%lu MOD attr=%s\n", - op->o_connid, op->o_opid, abuf, 0, 0 ); + Statslog( LDAP_DEBUG_STATS, "%s MOD attr=%s\n", + op->o_log_prefix, abuf, 0, 0, 0 ); } } +#endif /* LDAP_DEBUG */ manageDSAit = get_manageDSAit( op ); @@ -311,74 +311,113 @@ do_modify( * appropriate one, or send a referral to our "referral server" * if we don't hold it. */ - if ( (be = select_backend( &ndn, manageDSAit, 0 )) == NULL ) { - BerVarray ref = referral_rewrite( default_referral, - NULL, &pdn, LDAP_SCOPE_DEFAULT ); - - send_ldap_result( conn, op, rc = LDAP_REFERRAL, - NULL, NULL, ref ? ref : default_referral, NULL ); - - ber_bvarray_free( ref ); + op->o_bd = select_backend( &op->o_req_ndn, manageDSAit, 1 ); + if ( op->o_bd == NULL ) { + rs->sr_ref = referral_rewrite( default_referral, + NULL, &op->o_req_dn, LDAP_SCOPE_DEFAULT ); + if (!rs->sr_ref) rs->sr_ref = default_referral; + + if (rs->sr_ref != NULL ) { + rs->sr_err = LDAP_REFERRAL; + op->o_bd = frontendDB; + send_ldap_result( op, rs ); + op->o_bd = NULL; + + if (rs->sr_ref != default_referral) ber_bvarray_free( rs->sr_ref ); + } else { + op->o_bd = frontendDB; + send_ldap_error( op, rs, LDAP_UNWILLING_TO_PERFORM, + "no global superior knowledge" ); + op->o_bd = NULL; + } goto cleanup; } + /* If we've got a glued backend, check the real backend */ + op_be = op->o_bd; + if ( SLAP_GLUE_INSTANCE( op->o_bd )) { + op->o_bd = select_backend( &op->o_req_ndn, manageDSAit, 0 ); + } + /* check restrictions */ - rc = backend_check_restrictions( be, conn, op, NULL, &text ) ; - if( rc != LDAP_SUCCESS ) { - send_ldap_result( conn, op, rc, - NULL, text, NULL, NULL ); + if( backend_check_restrictions( op, rs, NULL ) != LDAP_SUCCESS ) { + send_ldap_result( op, rs ); goto cleanup; } /* check for referrals */ - rc = backend_check_referrals( be, conn, op, &pdn, &ndn ); - if ( rc != LDAP_SUCCESS ) { + if( backend_check_referrals( op, rs ) != LDAP_SUCCESS ) { goto cleanup; } - /* deref suffix alias if appropriate */ - suffix_alias( be, &ndn ); + { + rs->sr_err = slap_mods_obsolete_check( op, modlist, + &rs->sr_text, textbuf, textlen ); + if ( rs->sr_err != LDAP_SUCCESS ) { + send_ldap_result( op, rs ); + goto cleanup; + } + } + + /* check for modify/increment support */ + if( increment && !SLAP_INCREMENT( op->o_bd ) ) { + send_ldap_error( op, rs, LDAP_UNWILLING_TO_PERFORM, + "modify/increment not supported in context" ); + } #if defined( LDAP_SLAPI ) - slapi_x_backend_set_pb( pb, be ); - slapi_x_connection_set_pb( pb, conn ); - slapi_x_operation_set_pb( pb, op ); - slapi_pblock_set( pb, SLAPI_MODIFY_TARGET, (void *)dn.bv_val ); - slapi_pblock_set( pb, SLAPI_MANAGEDSAIT, (void *)(1) ); - modv = Modifications2LDAPMods( &modlist ); - slapi_pblock_set( pb, SLAPI_MODIFY_MODS, (void *)modv ); - - rc = doPluginFNs( be, SLAPI_PLUGIN_PRE_MODIFY_FN, pb ); - if ( rc != 0 ) { +#define pb op->o_pb + if ( pb ) { + slapi_int_pblock_set_operation( pb, op ); + slapi_pblock_set( pb, SLAPI_MODIFY_TARGET, (void *)op->o_req_dn.bv_val ); + slapi_pblock_set( pb, SLAPI_MANAGEDSAIT, (void *)manageDSAit ); + modv = slapi_int_modifications2ldapmods( &modlist ); + slapi_pblock_set( pb, SLAPI_MODIFY_MODS, (void *)modv ); + + rs->sr_err = slapi_int_call_plugins( op->o_bd, + SLAPI_PLUGIN_PRE_MODIFY_FN, pb ); + /* - * A preoperation plugin failure will abort the - * entire operation. + * It's possible that the preoperation plugin changed the + * modification array, so we need to convert it back to + * a Modification list. + * + * Calling slapi_int_modifications2ldapmods() destroyed modlist so + * we don't need to free it. */ -#ifdef NEW_LOGGING - LDAP_LOG( OPERATION, INFO, "do_modify: modify preoperation plugin " - "failed\n", 0, 0, 0 ); -#else - Debug(LDAP_DEBUG_TRACE, "do_modify: modify preoperation plugin failed.\n", + slapi_pblock_get( pb, SLAPI_MODIFY_MODS, (void **)&modv ); + modlist = slapi_int_ldapmods2modifications( modv ); + + if ( rs->sr_err < 0 ) { + /* + * A preoperation plugin failure will abort the + * entire operation. + */ + Debug(LDAP_DEBUG_TRACE, + "do_modify: modify preoperation plugin failed.\n", 0, 0, 0); -#endif - if ( slapi_pblock_get( pb, SLAPI_RESULT_CODE, (void *)&rc ) != 0) { - rc = LDAP_OPERATIONS_ERROR; + if ( ( slapi_pblock_get( op->o_pb, SLAPI_RESULT_CODE, + (void *)&rs->sr_err ) != 0 ) || rs->sr_err == LDAP_SUCCESS ) + { + rs->sr_err = LDAP_OTHER; + } + slapi_int_free_ldapmods( modv ); + modv = NULL; + goto cleanup; } - ldap_mods_free( modv, 1 ); - modv = NULL; - goto cleanup; } /* - * It's possible that the preoperation plugin changed the - * modification array, so we need to convert it back to - * a Modification list. + * NB: it is valid for the plugin to return no modifications + * (for example, a plugin might store some attributes elsewhere + * and remove them from the modification list; if only those + * attribute types were included in the modification request, + * then slapi_int_ldapmods2modifications() above will return + * NULL). * - * Calling Modifications2LDAPMods() destroyed modlist so - * we don't need to free it. + * However, the post-operation plugin should still be + * called. */ - slapi_pblock_get( pb, SLAPI_MODIFY_MODS, (void **)&modv ); - modlist = LDAPMods2Modifications( modv ); #endif /* defined( LDAP_SLAPI ) */ /* @@ -387,28 +426,29 @@ do_modify( * 2) this backend is master for what it holds; * 3) it's a replica and the dn supplied is the update_ndn. */ - if ( be->be_modify ) { + if ( op->o_bd->be_modify ) { /* do the update here */ - int repl_user = be_isupdate( be, &op->o_ndn ); -#ifndef SLAPD_MULTIMASTER + int repl_user = be_isupdate( op ); + /* Multimaster slapd does not have to check for replicator dn * because it accepts each modify request */ - if ( !be->be_update_ndn.bv_len || repl_user ) +#ifndef SLAPD_MULTIMASTER + if ( !SLAP_SHADOW(op->o_bd) || repl_user ) #endif { - int update = be->be_update_ndn.bv_len; - const char *text; - char textbuf[SLAP_TEXT_BUFLEN]; - size_t textlen = sizeof textbuf; + int update = !BER_BVISEMPTY( &op->o_bd->be_update_ndn ); + slap_callback cb = { NULL, slap_replog_cb, NULL, NULL }; - rc = slap_mods_check( modlist, update, &text, - textbuf, textlen ); + op->o_bd = op_be; - if( rc != LDAP_SUCCESS ) { - send_ldap_result( conn, op, rc, - NULL, text, NULL, NULL ); - goto cleanup; + if ( !update ) { + rs->sr_err = slap_mods_no_user_mod_check( op, modlist, + &rs->sr_text, textbuf, textlen ); + if ( rs->sr_err != LDAP_SUCCESS ) { + send_ldap_result( op, rs ); + goto cleanup; + } } if ( !repl_user ) { @@ -419,65 +459,144 @@ do_modify( /* empty */ } - rc = slap_mods_opattrs( be, op, modlist, modtail, &text, - textbuf, textlen ); - if( rc != LDAP_SUCCESS ) { - send_ldap_result( conn, op, rc, - NULL, text, - NULL, NULL ); + rs->sr_err = slap_mods_opattrs( op, modlist, modtail, + &rs->sr_text, textbuf, textlen, 1 ); + if( rs->sr_err != LDAP_SUCCESS ) { + send_ldap_result( op, rs ); goto cleanup; } } - if ( (*be->be_modify)( be, conn, op, &pdn, &ndn, modlist ) == 0 + op->orm_modlist = modlist; #ifdef SLAPD_MULTIMASTER - && !repl_user + if ( !repl_user ) #endif - ) { - /* but we log only the ones not from a replicator user */ - replog( be, op, &pdn, &ndn, modlist ); + { + /* but multimaster slapd logs only the ones + * not from a replicator user */ + cb.sc_next = op->o_callback; + op->o_callback = &cb; } + op->o_bd->be_modify( op, rs ); #ifndef SLAPD_MULTIMASTER /* send a referral */ } else { - BerVarray defref = be->be_update_refs - ? be->be_update_refs : default_referral; - BerVarray ref = referral_rewrite( defref, - NULL, &pdn, LDAP_SCOPE_DEFAULT ); - - send_ldap_result( conn, op, rc = LDAP_REFERRAL, NULL, NULL, - ref ? ref : defref, NULL ); + BerVarray defref = op->o_bd->be_update_refs + ? op->o_bd->be_update_refs : default_referral; + if ( defref != NULL ) { + rs->sr_ref = referral_rewrite( defref, + NULL, &op->o_req_dn, + LDAP_SCOPE_DEFAULT ); + if ( rs->sr_ref == NULL ) { + /* FIXME: must duplicate, because + * overlays may muck with it */ + rs->sr_ref = defref; + } + rs->sr_err = LDAP_REFERRAL; + send_ldap_result( op, rs ); + if ( rs->sr_ref != defref ) { + ber_bvarray_free( rs->sr_ref ); + } - ber_bvarray_free( ref ); + } else { + send_ldap_error( op, rs, LDAP_UNWILLING_TO_PERFORM, + "shadow context; no update referral" ); + } #endif } } else { - send_ldap_result( conn, op, rc = LDAP_UNWILLING_TO_PERFORM, - NULL, "operation not supported within namingContext", - NULL, NULL ); + send_ldap_error( op, rs, LDAP_UNWILLING_TO_PERFORM, + "operation not supported within namingContext" ); } #if defined( LDAP_SLAPI ) - if ( doPluginFNs( be, SLAPI_PLUGIN_POST_MODIFY_FN, pb ) != 0 ) { -#ifdef NEW_LOGGING - LDAP_LOG( OPERATION, INFO, "do_modify: modify postoperation plugins " - "failed\n", 0, 0, 0 ); -#else - Debug(LDAP_DEBUG_TRACE, "do_modify: modify postoperation plugins " - "failed.\n", 0, 0, 0); -#endif + if ( pb != NULL && slapi_int_call_plugins( op->o_bd, + SLAPI_PLUGIN_POST_MODIFY_FN, pb ) < 0 ) + { + Debug(LDAP_DEBUG_TRACE, + "do_modify: modify postoperation plugins failed.\n", 0, 0, 0); } #endif /* defined( LDAP_SLAPI ) */ -cleanup: - free( pdn.bv_val ); - free( ndn.bv_val ); - if ( modlist != NULL ) slap_mods_free( modlist ); +cleanup:; #if defined( LDAP_SLAPI ) - if ( modv != NULL ) FreeLDAPMods( modv ); + if ( modv != NULL ) slapi_int_free_ldapmods( modv ); #endif - return rc; + + return rs->sr_err; +} + +/* + * Obsolete constraint checking. + */ +int +slap_mods_obsolete_check( + Operation *op, + Modifications *ml, + const char **text, + char *textbuf, + size_t textlen ) +{ + if( get_manageDIT( op ) ) return LDAP_SUCCESS; + + for ( ; ml != NULL; ml = ml->sml_next ) { + if ( is_at_obsolete( ml->sml_desc->ad_type ) && + (( ml->sml_op != LDAP_MOD_REPLACE && + ml->sml_op != LDAP_MOD_DELETE ) || + ml->sml_values != NULL )) + { + /* + * attribute is obsolete, + * only allow replace/delete with no values + */ + snprintf( textbuf, textlen, + "%s: attribute is obsolete", + ml->sml_type.bv_val ); + *text = textbuf; + return LDAP_CONSTRAINT_VIOLATION; + } + } + + return LDAP_SUCCESS; +} + +/* + * No-user-modification constraint checking. + */ +int +slap_mods_no_user_mod_check( + Operation *op, + Modifications *ml, + const char **text, + char *textbuf, + size_t textlen ) +{ + for ( ; ml != NULL; ml = ml->sml_next ) { + if ( !is_at_no_user_mod( ml->sml_desc->ad_type ) ) continue; + + if( get_manageDIT( op )) { + if ( ml->sml_desc->ad_type->sat_flags & SLAP_AT_MANAGEABLE ) { + continue; + } + + /* attribute not manageable */ + snprintf( textbuf, textlen, + "%s: no-user-modification attribute not manageable", + ml->sml_type.bv_val ); + + } else { + /* user modification disallowed */ + snprintf( textbuf, textlen, + "%s: no user modification allowed", + ml->sml_type.bv_val ); + } + + *text = textbuf; + return LDAP_CONSTRAINT_VIOLATION; + } + + return LDAP_SUCCESS; } /* @@ -485,10 +604,10 @@ cleanup: */ int slap_mods_check( Modifications *ml, - int update, const char **text, char *textbuf, - size_t textlen ) + size_t textlen, + void *ctx ) { int rc; @@ -521,7 +640,7 @@ int slap_mods_check( if( !slap_syntax_is_binary( ad->ad_type->sat_syntax ) && slap_ad_is_binary( ad )) { - /* attribute requires binary transfer */ + /* attribute does not require binary transfer */ snprintf( textbuf, textlen, "%s: disallows ;binary transfer", ml->sml_type.bv_val ); @@ -538,24 +657,35 @@ int slap_mods_check( return LDAP_UNDEFINED_TYPE; } - if (!update && is_at_no_user_mod( ad->ad_type )) { - /* user modification disallowed */ +#if 0 + if ( is_at_obsolete( ad->ad_type ) && + (( ml->sml_op != LDAP_MOD_REPLACE && + ml->sml_op != LDAP_MOD_DELETE ) || + ml->sml_values != NULL )) + { + /* + * attribute is obsolete, + * only allow replace/delete with no values + */ snprintf( textbuf, textlen, - "%s: no user modification allowed", + "%s: attribute is obsolete", ml->sml_type.bv_val ); *text = textbuf; return LDAP_CONSTRAINT_VIOLATION; } +#endif - if ( is_at_obsolete( ad->ad_type ) && - ( ml->sml_op == LDAP_MOD_ADD || ml->sml_bvalues != NULL ) ) + if ( ml->sml_op == LDAP_MOD_INCREMENT && +#ifdef SLAPD_REAL_SYNTAX + !is_at_syntax( ad->ad_type, SLAPD_REAL_SYNTAX ) && +#endif + !is_at_syntax( ad->ad_type, SLAPD_INTEGER_SYNTAX ) ) { /* - * attribute is obsolete, - * only allow replace/delete with no values + * attribute values must be INTEGER or REAL */ snprintf( textbuf, textlen, - "%s: attribute is obsolete", + "%s: attribute syntax inappropriate for increment", ml->sml_type.bv_val ); *text = textbuf; return LDAP_CONSTRAINT_VIOLATION; @@ -564,7 +694,7 @@ int slap_mods_check( /* * check values */ - if( ml->sml_bvalues != NULL ) { + if( ml->sml_values != NULL ) { ber_len_t nvals; slap_syntax_validate_func *validate = ad->ad_type->sat_syntax->ssyn_validate; @@ -585,14 +715,14 @@ int slap_mods_check( * check that each value is valid per syntax * and pretty if appropriate */ - for( nvals = 0; ml->sml_bvalues[nvals].bv_val; nvals++ ) { + for( nvals = 0; ml->sml_values[nvals].bv_val; nvals++ ) { struct berval pval; if( pretty ) { rc = pretty( ad->ad_type->sat_syntax, - &ml->sml_bvalues[nvals], &pval ); + &ml->sml_values[nvals], &pval, ctx ); } else { rc = validate( ad->ad_type->sat_syntax, - &ml->sml_bvalues[nvals] ); + &ml->sml_values[nvals] ); } if( rc != 0 ) { @@ -604,8 +734,8 @@ int slap_mods_check( } if( pretty ) { - ber_memfree( ml->sml_bvalues[nvals].bv_val ); - ml->sml_bvalues[nvals] = pval; + ber_memfree_x( ml->sml_values[nvals].bv_val, ctx ); + ml->sml_values[nvals] = pval; } } @@ -613,15 +743,88 @@ int slap_mods_check( * a rough single value check... an additional check is needed * to catch add of single value to existing single valued attribute */ - if( ( ml->sml_op == LDAP_MOD_ADD || ml->sml_op == LDAP_MOD_REPLACE ) + if ((ml->sml_op == LDAP_MOD_ADD || ml->sml_op == LDAP_MOD_REPLACE) && nvals > 1 && is_at_single_value( ad->ad_type )) { snprintf( textbuf, textlen, - "%s: multiple value provided", + "%s: multiple values provided", ml->sml_type.bv_val ); *text = textbuf; return LDAP_CONSTRAINT_VIOLATION; } + + /* if the type has a normalizer, generate the + * normalized values. otherwise leave them NULL. + * + * this is different from the rule for attributes + * in an entry - in an attribute list, the normalized + * value is set equal to the non-normalized value + * when there is no normalizer. + */ + if( nvals && ad->ad_type->sat_equality && + ad->ad_type->sat_equality->smr_normalize ) + { + ml->sml_nvalues = ber_memalloc_x( + (nvals+1)*sizeof(struct berval), ctx ); + + for( nvals = 0; ml->sml_values[nvals].bv_val; nvals++ ) { + rc = ad->ad_type->sat_equality->smr_normalize( + SLAP_MR_VALUE_OF_ATTRIBUTE_SYNTAX, + ad->ad_type->sat_syntax, + ad->ad_type->sat_equality, + &ml->sml_values[nvals], &ml->sml_nvalues[nvals], ctx ); + if( rc ) { + Debug( LDAP_DEBUG_ANY, + "<= str2entry NULL (ssyn_normalize %d)\n", + rc, 0, 0 ); + snprintf( textbuf, textlen, + "%s: value #%ld normalization failed", + ml->sml_type.bv_val, (long) nvals ); + *text = textbuf; + return rc; + } + } + + ml->sml_nvalues[nvals].bv_val = NULL; + ml->sml_nvalues[nvals].bv_len = 0; + } + + /* check for duplicates, but ignore Deletes. + */ + if( nvals > 1 && ml->sml_op != LDAP_MOD_DELETE ) { + int i, j, rc, match; + MatchingRule *mr = ad->ad_type->sat_equality; + + for ( i = 1; i < nvals ; i++ ) { + /* test asserted values against themselves */ + for( j = 0; j < i; j++ ) { + rc = ordered_value_match( &match, ml->sml_desc, mr, + SLAP_MR_EQUALITY + | SLAP_MR_VALUE_OF_ATTRIBUTE_SYNTAX + | SLAP_MR_ASSERTED_VALUE_NORMALIZED_MATCH + | SLAP_MR_ATTRIBUTE_VALUE_NORMALIZED_MATCH, + ml->sml_nvalues + ? &ml->sml_nvalues[i] + : &ml->sml_values[i], + ml->sml_nvalues + ? &ml->sml_nvalues[j] + : &ml->sml_values[j], + text ); + if ( rc == LDAP_SUCCESS && match == 0 ) { + /* value exists already */ + snprintf( textbuf, textlen, + "%s: value #%d provided more than once", + ml->sml_desc->ad_cname.bv_val, j ); + *text = textbuf; + return LDAP_TYPE_OR_VALUE_EXISTS; + + } else if ( rc != LDAP_SUCCESS ) { + return rc; + } + } + } + } + } } @@ -629,14 +832,15 @@ int slap_mods_check( } int slap_mods_opattrs( - Backend *be, Operation *op, Modifications *mods, Modifications **modtail, const char **text, - char *textbuf, size_t textlen ) + char *textbuf, size_t textlen, + int manage_ctxcsn ) { struct berval name, timestamp, csn; + struct berval nname; char timebuf[ LDAP_LUTIL_GENTIME_BUFSIZE ]; char csnbuf[ LDAP_LUTIL_CSNSTR_BUFSIZE ]; Modifications *mod; @@ -647,52 +851,68 @@ int slap_mods_opattrs( assert( modtail != NULL ); assert( *modtail == NULL ); - if( SLAP_LASTMOD(be) ) { + if ( SLAP_LASTMOD( op->o_bd )) { struct tm *ltm; +#ifdef HAVE_GMTIME_R + struct tm ltm_buf; +#endif time_t now = slap_get_time(); +#ifdef HAVE_GMTIME_R + ltm = gmtime_r( &now, <m_buf ); +#else ldap_pvt_thread_mutex_lock( &gmtime_mutex ); ltm = gmtime( &now ); +#endif /* HAVE_GMTIME_R */ lutil_gentime( timebuf, sizeof(timebuf), ltm ); - csn.bv_len = lutil_csnstr( csnbuf, sizeof( csnbuf ), 0, 0 ); + slap_get_csn( op, csnbuf, sizeof(csnbuf), &csn, manage_ctxcsn ); + +#ifndef HAVE_GMTIME_R ldap_pvt_thread_mutex_unlock( &gmtime_mutex ); - csn.bv_val = csnbuf; +#endif timestamp.bv_val = timebuf; timestamp.bv_len = strlen(timebuf); if( op->o_dn.bv_len == 0 ) { - name.bv_val = SLAPD_ANONYMOUS; - name.bv_len = sizeof(SLAPD_ANONYMOUS)-1; + BER_BVSTR( &name, SLAPD_ANONYMOUS ); + nname = name; } else { name = op->o_dn; + nname = op->o_ndn; } } if( op->o_tag == LDAP_REQ_ADD ) { struct berval tmpval; - if( global_schemacheck ) { + { int rc = mods_structural_class( mods, &tmpval, text, textbuf, textlen ); - if( rc != LDAP_SUCCESS ) { - return rc; - } + if( rc != LDAP_SUCCESS ) return rc; mod = (Modifications *) ch_malloc( sizeof( Modifications ) ); mod->sml_op = mop; mod->sml_type.bv_val = NULL; mod->sml_desc = slap_schema.si_ad_structuralObjectClass; - mod->sml_bvalues = (BerVarray) ch_malloc( 2 * sizeof( struct berval ) ); - ber_dupbv( &mod->sml_bvalues[0], &tmpval ); - mod->sml_bvalues[1].bv_val = NULL; - assert( mod->sml_bvalues[0].bv_val ); + mod->sml_values = + (BerVarray) ch_malloc( 2 * sizeof( struct berval ) ); + ber_dupbv( &mod->sml_values[0], &tmpval ); + mod->sml_values[1].bv_len = 0; + mod->sml_values[1].bv_val = NULL; + assert( mod->sml_values[0].bv_val ); + mod->sml_nvalues = + (BerVarray) ch_malloc( 2 * sizeof( struct berval ) ); + ber_dupbv( &mod->sml_nvalues[0], &tmpval ); + mod->sml_nvalues[1].bv_len = 0; + mod->sml_nvalues[1].bv_val = NULL; + assert( mod->sml_nvalues[0].bv_val ); *modtail = mod; modtail = &mod->sml_next; } - if( SLAP_LASTMOD(be) ) { + if ( SLAP_LASTMOD( op->o_bd )) { char uuidbuf[ LDAP_LUTIL_UUIDSTR_BUFSIZE ]; tmpval.bv_len = lutil_uuidstr( uuidbuf, sizeof( uuidbuf ) ); @@ -702,10 +922,21 @@ int slap_mods_opattrs( mod->sml_op = mop; mod->sml_type.bv_val = NULL; mod->sml_desc = slap_schema.si_ad_entryUUID; - mod->sml_bvalues = (BerVarray) ch_malloc( 2 * sizeof( struct berval ) ); - ber_dupbv( &mod->sml_bvalues[0], &tmpval ); - mod->sml_bvalues[1].bv_val = NULL; - assert( mod->sml_bvalues[0].bv_val ); + mod->sml_values = + (BerVarray) ch_malloc( 2 * sizeof( struct berval ) ); + ber_dupbv( &mod->sml_values[0], &tmpval ); + mod->sml_values[1].bv_len = 0; + mod->sml_values[1].bv_val = NULL; + assert( mod->sml_values[0].bv_val ); + mod->sml_nvalues = + (BerVarray) ch_malloc( 2 * sizeof( struct berval ) ); + (*mod->sml_desc->ad_type->sat_equality->smr_normalize)( + SLAP_MR_VALUE_OF_ATTRIBUTE_SYNTAX, + mod->sml_desc->ad_type->sat_syntax, + mod->sml_desc->ad_type->sat_equality, + mod->sml_values, mod->sml_nvalues, NULL ); + mod->sml_nvalues[1].bv_len = 0; + mod->sml_nvalues[1].bv_val = NULL; *modtail = mod; modtail = &mod->sml_next; @@ -713,10 +944,18 @@ int slap_mods_opattrs( mod->sml_op = mop; mod->sml_type.bv_val = NULL; mod->sml_desc = slap_schema.si_ad_creatorsName; - mod->sml_bvalues = (BerVarray) ch_malloc( 2 * sizeof( struct berval ) ); - ber_dupbv( &mod->sml_bvalues[0], &name ); - mod->sml_bvalues[1].bv_val = NULL; - assert( mod->sml_bvalues[0].bv_val ); + mod->sml_values = + (BerVarray) ch_malloc( 2 * sizeof( struct berval ) ); + ber_dupbv( &mod->sml_values[0], &name ); + mod->sml_values[1].bv_len = 0; + mod->sml_values[1].bv_val = NULL; + assert( mod->sml_values[0].bv_val ); + mod->sml_nvalues = + (BerVarray) ch_malloc( 2 * sizeof( struct berval ) ); + ber_dupbv( &mod->sml_nvalues[0], &nname ); + mod->sml_nvalues[1].bv_len = 0; + mod->sml_nvalues[1].bv_val = NULL; + assert( mod->sml_nvalues[0].bv_val ); *modtail = mod; modtail = &mod->sml_next; @@ -724,24 +963,29 @@ int slap_mods_opattrs( mod->sml_op = mop; mod->sml_type.bv_val = NULL; mod->sml_desc = slap_schema.si_ad_createTimestamp; - mod->sml_bvalues = (BerVarray) ch_malloc( 2 * sizeof( struct berval ) ); - ber_dupbv( &mod->sml_bvalues[0], ×tamp ); - mod->sml_bvalues[1].bv_val = NULL; - assert( mod->sml_bvalues[0].bv_val ); + mod->sml_values = + (BerVarray) ch_malloc( 2 * sizeof( struct berval ) ); + ber_dupbv( &mod->sml_values[0], ×tamp ); + mod->sml_values[1].bv_len = 0; + mod->sml_values[1].bv_val = NULL; + assert( mod->sml_values[0].bv_val ); + mod->sml_nvalues = NULL; *modtail = mod; modtail = &mod->sml_next; } } - if( SLAP_LASTMOD(be) ) { + if ( SLAP_LASTMOD( op->o_bd )) { mod = (Modifications *) ch_malloc( sizeof( Modifications ) ); mod->sml_op = mop; mod->sml_type.bv_val = NULL; mod->sml_desc = slap_schema.si_ad_entryCSN; - mod->sml_bvalues = (BerVarray) ch_malloc( 2 * sizeof( struct berval ) ); - ber_dupbv( &mod->sml_bvalues[0], &csn ); - mod->sml_bvalues[1].bv_val = NULL; - assert( mod->sml_bvalues[0].bv_val ); + mod->sml_values = (BerVarray) ch_malloc( 2 * sizeof( struct berval ) ); + ber_dupbv( &mod->sml_values[0], &csn ); + mod->sml_values[1].bv_len = 0; + mod->sml_values[1].bv_val = NULL; + assert( mod->sml_values[0].bv_val ); + mod->sml_nvalues = NULL; *modtail = mod; modtail = &mod->sml_next; @@ -749,10 +993,17 @@ int slap_mods_opattrs( mod->sml_op = mop; mod->sml_type.bv_val = NULL; mod->sml_desc = slap_schema.si_ad_modifiersName; - mod->sml_bvalues = (BerVarray) ch_malloc( 2 * sizeof( struct berval ) ); - ber_dupbv( &mod->sml_bvalues[0], &name ); - mod->sml_bvalues[1].bv_val = NULL; - assert( mod->sml_bvalues[0].bv_val ); + mod->sml_values = (BerVarray) ch_malloc( 2 * sizeof( struct berval ) ); + ber_dupbv( &mod->sml_values[0], &name ); + mod->sml_values[1].bv_len = 0; + mod->sml_values[1].bv_val = NULL; + assert( mod->sml_values[0].bv_val ); + mod->sml_nvalues = + (BerVarray) ch_malloc( 2 * sizeof( struct berval ) ); + ber_dupbv( &mod->sml_nvalues[0], &nname ); + mod->sml_nvalues[1].bv_len = 0; + mod->sml_nvalues[1].bv_val = NULL; + assert( mod->sml_nvalues[0].bv_val ); *modtail = mod; modtail = &mod->sml_next; @@ -760,10 +1011,12 @@ int slap_mods_opattrs( mod->sml_op = mop; mod->sml_type.bv_val = NULL; mod->sml_desc = slap_schema.si_ad_modifyTimestamp; - mod->sml_bvalues = (BerVarray) ch_malloc( 2 * sizeof( struct berval ) ); - ber_dupbv( &mod->sml_bvalues[0], ×tamp ); - mod->sml_bvalues[1].bv_val = NULL; - assert( mod->sml_bvalues[0].bv_val ); + mod->sml_values = (BerVarray) ch_malloc( 2 * sizeof( struct berval ) ); + ber_dupbv( &mod->sml_values[0], ×tamp ); + mod->sml_values[1].bv_len = 0; + mod->sml_values[1].bv_val = NULL; + assert( mod->sml_values[0].bv_val ); + mod->sml_nvalues = NULL; *modtail = mod; modtail = &mod->sml_next; } @@ -772,150 +1025,3 @@ int slap_mods_opattrs( return LDAP_SUCCESS; } -#ifdef LDAP_SLAPI -/* - * Synthesise an LDAPMod array from a Modifications list to pass - * to SLAPI. This synthesis is destructive and as such the - * Modifications list may not be used after calling this - * function. - * - * This function must also be called before slap_mods_check(). - */ -static LDAPMod **Modifications2LDAPMods(Modifications **pmodlist) -{ - Modifications *ml, *modlist; - LDAPMod **mods, *modp; - int i, j; - - modlist = *pmodlist; - - for( i = 0, ml = modlist; ml != NULL; i++, ml = ml->sml_next ) - ; - - mods = (LDAPMod **)ch_malloc( (i + 1) * sizeof(LDAPMod *) ); - - for( i = 0, ml = modlist; ml != NULL; ml = ml->sml_next ) { - modp = mods[i]; - modp->mod_op = ml->sml_op | LDAP_MOD_BVALUES; - - /* Take ownership of original type. */ - modp->mod_type = ml->sml_type.bv_val; - ml->sml_type.bv_val = NULL; - - if ( ml->sml_bvalues != NULL ) { - for( j = 0; ml->sml_bvalues[j].bv_val != NULL; j++ ) - ; - modp->mod_bvalues = (struct berval **)ch_malloc( (j + 1) * - sizeof(struct berval *) ); - for( j = 0; ml->sml_bvalues[j].bv_val != NULL; j++ ) { - /* Take ownership of original values. */ - modp->mod_bvalues[j]->bv_len = ml->sml_bvalues[j].bv_len; - modp->mod_bvalues[j]->bv_val = ml->sml_bvalues[j].bv_val; - ml->sml_bvalues[j].bv_len = 0; - ml->sml_bvalues[j].bv_val = NULL; - } - modp->mod_bvalues[j] = NULL; - } else { - modp->mod_bvalues = NULL; - } - i++; - } - - mods[i] = NULL; - - slap_mods_free( modlist ); - *pmodlist = NULL; - - return mods; -} - -/* - * Convert a potentially modified array of LDAPMods back to a - * Modification list. - * - * The returned Modification list contains pointers into the - * LDAPMods array; the latter MUST be freed with FreeLDAPMods() - * (see below). - */ -static Modifications *LDAPMods2Modifications (LDAPMod **mods) -{ - Modifications *modlist, **modtail; - LDAPMod **modp; - - modtail = &modlist; - - for( modp = mods; *modp != NULL; modp++ ) { - Modifications *mod; - int i; - char **p; - struct berval **bvp; - - mod = (Modifications *) ch_malloc( sizeof(Modifications) ); - mod->sml_op = (*modp)->mod_op & (~LDAP_MOD_BVALUES); - mod->sml_type.bv_val = (*modp)->mod_type; - mod->sml_type.bv_len = strlen( mod->sml_type.bv_val ); - mod->sml_desc = NULL; - mod->sml_next = NULL; - - if ( (*modp)->mod_op & LDAP_MOD_BVALUES ) { - for( i = 0, bvp = (*modp)->mod_bvalues; *bvp != NULL; bvp++, i++ ) - ; - } else { - for( i = 0, p = (*modp)->mod_values; *p != NULL; p++, i++ ) - ; - } - - mod->sml_bvalues = (BerVarray) ch_malloc( (i + 1) * sizeof(struct berval) ); - - /* NB: This implicitly trusts a plugin to return valid modifications. */ - if ( (*modp)->mod_op & LDAP_MOD_BVALUES ) { - for( i = 0, bvp = (*modp)->mod_bvalues; *bvp != NULL; bvp++, i++ ) { - mod->sml_bvalues[i].bv_val = (*bvp)->bv_val; - mod->sml_bvalues[i].bv_len = (*bvp)->bv_len; - } - } else { - for( i = 0, p = (*modp)->mod_values; *p != NULL; p++, i++ ) { - mod->sml_bvalues[i].bv_val = *p; - mod->sml_bvalues[i].bv_len = strlen( *p ); - } - } - mod->sml_bvalues[i].bv_val = NULL; - - *modtail = mod; - modtail = &mod->sml_next; - } - - return modlist; -} - -/* - * This function only frees the parts of the mods array that - * are not shared with the Modification list that was created - * by LDAPMods2Modifications. - * - */ -static void FreeLDAPMods (LDAPMod **mods) -{ - int i; - - if (mods == NULL) - return; - - for ( i = 0; mods[i] != NULL; i++ ) { - /* - * Don't free values themselves; they're owned by the - * Modification list. Do free the containing array. - */ - if ( mods[i]->mod_op & LDAP_MOD_BVALUES ) { - ch_free( mods[i]->mod_bvalues ); - } else { - ch_free( mods[i]->mod_values ); - } - /* Don't free type, for same reasons. */ - ch_free( mods[i] ); - } - ch_free( mods ); -} - -#endif /* LDAP_SLAPI */ -