X-Git-Url: https://git.sur5r.net/?a=blobdiff_plain;f=servers%2Fslapd%2Foc.c;h=3301a702bb9567b6d39104ff3e789793b3a49b83;hb=27cb98d28d60b1f258ea12852b22bfdfec6380f6;hp=7163f1aa5f025eb2504e9e251c5563cd548230e6;hpb=2b71d70f2f43259b062a2fcfe33acd5a23a333a9;p=openldap diff --git a/servers/slapd/oc.c b/servers/slapd/oc.c index 7163f1aa5f..3301a702bb 100644 --- a/servers/slapd/oc.c +++ b/servers/slapd/oc.c @@ -25,8 +25,14 @@ int is_object_subclass( if( sub == NULL || sup == NULL ) return 0; #if 1 +#ifdef NEW_LOGGING + LDAP_LOG ( OPERATION, ARGS, + "is_object_subclass(%s,%s) %d\n", + sup->soc_oid, sub->soc_oid, sup == sub ); +#else Debug( LDAP_DEBUG_TRACE, "is_object_subclass(%s,%s) %d\n", sup->soc_oid, sub->soc_oid, sup == sub ); +#endif #endif if( sup == sub ) { @@ -61,7 +67,7 @@ int is_entry_objectclass( } if( set_flags && ( e->e_ocflags & SLAP_OC__END )) { - return (e->e_ocflags & oc->soc_flags); + return (e->e_ocflags & oc->soc_flags) ? 1 : 0; } /* @@ -72,10 +78,10 @@ int is_entry_objectclass( if( attr == NULL ) { /* no objectClass attribute */ #ifdef NEW_LOGGING - LDAP_LOG(( "operation", LDAP_LEVEL_ERR, "is_entry_objectclass: " - "dn(%s), oid (%s), no objectClass attribute.\n", - e->e_dn == NULL ? "" : e->e_dn, - oc->soc_oclass.oc_oid )); + LDAP_LOG( OPERATION, ERR, + "is_entry_objectclass: dn(%s), oid (%s), no objectClass " + "attribute.\n", e->e_dn == NULL ? "" : e->e_dn, + oc->soc_oclass.oc_oid, 0 ); #else Debug( LDAP_DEBUG_ANY, "is_entry_objectclass(\"%s\", \"%s\") " "no objectClass attribute\n", @@ -163,6 +169,7 @@ static int oc_create_required( ObjectClass *soc, char **attrs, + int *op, const char **err ) { char **attrs1; @@ -178,6 +185,9 @@ oc_create_required( *err = *attrs1; return SLAP_SCHERR_ATTR_NOT_FOUND; } + + if( is_at_operational( sat )) (*op)++; + if ( at_find_in_list(sat, soc->soc_required) < 0) { if ( at_append_to_list(sat, &soc->soc_required) ) { *err = *attrs1; @@ -201,6 +211,7 @@ static int oc_create_allowed( ObjectClass *soc, char **attrs, + int *op, const char **err ) { char **attrs1; @@ -214,6 +225,9 @@ oc_create_allowed( *err = *attrs1; return SLAP_SCHERR_ATTR_NOT_FOUND; } + + if( is_at_operational( sat )) (*op)++; + if ( at_find_in_list(sat, soc->soc_required) < 0 && at_find_in_list(sat, soc->soc_allowed) < 0 ) { if ( at_append_to_list(sat, &soc->soc_allowed) ) { @@ -231,6 +245,7 @@ static int oc_add_sups( ObjectClass *soc, char **sups, + int *op, const char **err ) { int code; @@ -271,19 +286,22 @@ oc_add_sups( && soc1->soc_kind != LDAP_SCHEMA_ABSTRACT ) { *err = *sups1; - return SLAP_SCHERR_CLASS_BAD_USAGE; + return SLAP_SCHERR_CLASS_BAD_SUP; } - if ( add_sups ) + if( soc->soc_flags & SLAP_OC_OPERATIONAL ) (*op)++; + + if ( add_sups ) { soc->soc_sups[nsups] = soc1; + } - code = oc_add_sups( soc, soc1->soc_sup_oids, err ); + code = oc_add_sups( soc, soc1->soc_sup_oids, op, err ); if ( code ) return code; - code = oc_create_required( soc, soc1->soc_at_oids_must, err ); + code = oc_create_required( soc, soc1->soc_at_oids_must, op, err ); if ( code ) return code; - code = oc_create_allowed( soc, soc1->soc_at_oids_may, err ); + code = oc_create_allowed( soc, soc1->soc_at_oids_may, op, err ); if ( code ) return code; nsups++; @@ -342,7 +360,7 @@ oc_insert( { *err = soc->soc_oid; ldap_memfree(oir); - return SLAP_SCHERR_DUP_CLASS; + return SLAP_SCHERR_CLASS_DUP; } /* FIX: temporal consistency check */ @@ -366,7 +384,7 @@ oc_insert( { *err = *names; ldap_memfree(oir); - return SLAP_SCHERR_DUP_CLASS; + return SLAP_SCHERR_CLASS_DUP; } /* FIX: temporal consistency check */ @@ -382,11 +400,13 @@ oc_insert( int oc_add( LDAPObjectClass *oc, + int user, const char **err ) { ObjectClass *soc; int code; + int op = 0; if ( oc->oc_names != NULL ) { int i; @@ -414,58 +434,37 @@ oc_add( soc = (ObjectClass *) ch_calloc( 1, sizeof(ObjectClass) ); AC_MEMCPY( &soc->soc_oclass, oc, sizeof(LDAPObjectClass) ); + if( oc->oc_names != NULL ) { + soc->soc_cname.bv_val = soc->soc_names[0]; + } else { + soc->soc_cname.bv_val = soc->soc_oid; + } + soc->soc_cname.bv_len = strlen( soc->soc_cname.bv_val ); + if( soc->soc_sup_oids == NULL && soc->soc_kind == LDAP_SCHEMA_STRUCTURAL ) { /* structural object classes implicitly inherit from 'top' */ static char *top_oids[] = { SLAPD_TOP_OID, NULL }; - code = oc_add_sups( soc, top_oids, err ); + code = oc_add_sups( soc, top_oids, &op, err ); } else { - code = oc_add_sups( soc, soc->soc_sup_oids, err ); + code = oc_add_sups( soc, soc->soc_sup_oids, &op, err ); } if ( code != 0 ) return code; - code = oc_create_required( soc, soc->soc_at_oids_must, err ); + code = oc_create_required( soc, soc->soc_at_oids_must, &op, err ); if ( code != 0 ) return code; - code = oc_create_allowed( soc, soc->soc_at_oids_may, err ); + code = oc_create_allowed( soc, soc->soc_at_oids_may, &op, err ); if ( code != 0 ) return code; + if( user && op ) return SLAP_SCHERR_CLASS_BAD_SUP; + code = oc_insert(soc,err); return code; } -#ifdef LDAP_DEBUG - -static void -oc_print( ObjectClass *oc ) -{ - int i; - const char *mid; - - printf( "objectclass %s\n", ldap_objectclass2name( &oc->soc_oclass ) ); - if ( oc->soc_required != NULL ) { - mid = "\trequires "; - for ( i = 0; oc->soc_required[i] != NULL; i++, mid = "," ) - printf( "%s%s", mid, - ldap_attributetype2name( &oc->soc_required[i]->sat_atype ) ); - printf( "\n" ); - } - if ( oc->soc_allowed != NULL ) { - mid = "\tallows "; - for ( i = 0; oc->soc_allowed[i] != NULL; i++, mid = "," ) - printf( "%s%s", mid, - ldap_attributetype2name( &oc->soc_allowed[i]->sat_atype ) ); - printf( "\n" ); - } -} - -#endif - - -#if defined( SLAPD_SCHEMA_DN ) - int oc_schema_info( Entry *e ) { @@ -477,9 +476,12 @@ oc_schema_info( Entry *e ) vals[1].bv_val = NULL; for ( oc = oc_list; oc; oc = oc->soc_next ) { + if( oc->soc_flags & SLAP_OC_HIDE ) continue; + if ( ldap_objectclass2bv( &oc->soc_oclass, vals ) == NULL ) { return -1; } + #if 0 Debug( LDAP_DEBUG_TRACE, "Merging oc [%ld] %s\n", (long) vals[0].bv_len, vals[0].bv_val, 0 ); @@ -489,5 +491,3 @@ oc_schema_info( Entry *e ) } return 0; } - -#endif