goto return_results;
}
-#ifndef SLAPD_CHILD_MODIFICATION_WITH_ENTRY_ACL
/* check parent for "children" acl */
if ( ! access_allowed( be, conn, op, p,
"children", NULL, ACL_WRITE ) )
"", "" );
goto return_results;
}
-#endif
} else {
/* no parent, must be root to delete */
goto return_results;
}
-#ifndef SLAPD_CHILD_MODIFICATION_WITH_ENTRY_ACL
/* check parent for "children" acl */
if ( ! access_allowed( be, conn, op, p,
"children", NULL, ACL_WRITE ) )
"", "" );
goto return_results;
}
-#endif
p_dn = dn_parent( be, e->e_dn );
"ldbm_back_modrdn: wr to new parent OK np=%p, id=%d\n",
np, np->e_id, 0 );
-#ifndef SLAPD_CHILD_MODIFICATION_WITH_ENTRY_ACL
/* check newSuperior for "children" acl */
if ( !access_allowed( be, conn, op, np, "children", NULL,
ACL_WRITE ) )
"", "" );
goto return_results;
}
-#endif
Debug( LDAP_DEBUG_TRACE,
"ldbm_back_modrdn: wr to new parent's children OK\n",
goto return_results;
}
-#ifndef SLAPD_CHILD_MODIFICATION_WITH_ENTRY_ACL
/* check parent for "children" acl */
if ( ! access_allowed( be, conn, op, p,
"children", NULL, ACL_WRITE ) )
"", "" );
goto return_results;
}
-#endif
} else {
/* no parent, must be root to delete */
goto return_results;
}
-#ifndef SLAPD_CHILD_MODIFICATION_WITH_ENTRY_ACL
/* check parent for "children" acl */
if ( ! access_allowed( be, conn, op, p,
"children", NULL, ACL_WRITE ) )
Debug( LDAP_DEBUG_TRACE,
"ldbm_back_modrdn: wr to children of entry %s OK\n",
p_ndn, 0, 0 );
-#endif
p_dn = dn_parent( be, e->e_dn );
"ldbm_back_modrdn: wr to new parent OK np=%p, id=%d\n",
np, np->e_id, 0 );
-#ifndef SLAPD_CHILD_MODIFICATION_WITH_ENTRY_ACL
/* check newSuperior for "children" acl */
if ( !access_allowed( be, conn, op, np, "children", NULL,
ACL_WRITE ) )
"", "" );
goto return_results;
}
-#endif
Debug( LDAP_DEBUG_TRACE,
"ldbm_back_modrdn: wr to new parent's children OK\n",
}
-
/* Get attribute type and attribute value of our new rdn, we will
* need to add that to our new entry
*/