mirror of
https://git.openldap.org/openldap/openldap.git
synced 2024-12-27 03:20:22 +08:00
370 lines
10 KiB
C
370 lines
10 KiB
C
/* modify.c - modify request handler for back-asyncmeta */
|
|
/* $OpenLDAP$ */
|
|
/* This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
|
*
|
|
* Copyright 2016 The OpenLDAP Foundation.
|
|
* Portions Copyright 2016 Symas Corporation.
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted only as authorized by the OpenLDAP
|
|
* Public License.
|
|
*
|
|
* A copy of this license is available in the file LICENSE in the
|
|
* top-level directory of the distribution or, alternatively, at
|
|
* <http://www.OpenLDAP.org/license.html>.
|
|
*/
|
|
|
|
/* ACKNOWLEDGEMENTS:
|
|
* This work was developed by Symas Corporation
|
|
* based on back-meta module for inclusion in OpenLDAP Software.
|
|
* This work was sponsored by Ericsson. */
|
|
|
|
#include "portable.h"
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <ac/string.h>
|
|
#include <ac/socket.h>
|
|
|
|
#include "slap.h"
|
|
#include "../back-ldap/back-ldap.h"
|
|
#include "back-asyncmeta.h"
|
|
#include "../../../libraries/liblber/lber-int.h"
|
|
#include "../../../libraries/libldap/ldap-int.h"
|
|
|
|
meta_search_candidate_t
|
|
asyncmeta_back_modify_start(Operation *op,
|
|
SlapReply *rs,
|
|
a_metaconn_t *mc,
|
|
bm_context_t *bc,
|
|
int candidate)
|
|
{
|
|
int i, isupdate, rc = 0, nretries = 1;
|
|
a_dncookie dc;
|
|
a_metainfo_t *mi = mc->mc_info;
|
|
a_metatarget_t *mt = mi->mi_targets[ candidate ];
|
|
LDAPMod **modv = NULL;
|
|
LDAPMod *mods = NULL;
|
|
struct berval mdn;
|
|
Modifications *ml;
|
|
struct berval mapped;
|
|
meta_search_candidate_t retcode = META_SEARCH_CANDIDATE;
|
|
BerElement *ber = NULL;
|
|
a_metasingleconn_t *msc = &mc->mc_conns[ candidate ];
|
|
SlapReply *candidates = bc->candidates;
|
|
ber_int_t msgid;
|
|
LDAPControl **ctrls = NULL;
|
|
|
|
/*
|
|
* Rewrite the modify dn, if needed
|
|
*/
|
|
dc.target = mt;
|
|
dc.conn = op->o_conn;
|
|
dc.rs = rs;
|
|
dc.ctx = "modifyDN";
|
|
|
|
switch ( asyncmeta_dn_massage( &dc, &op->o_req_dn, &mdn ) )
|
|
{
|
|
case LDAP_SUCCESS:
|
|
break;
|
|
case LDAP_UNWILLING_TO_PERFORM:
|
|
rs->sr_err = LDAP_UNWILLING_TO_PERFORM;
|
|
rs->sr_text = "Operation not allowed";
|
|
retcode = META_SEARCH_ERR;
|
|
goto doreturn;
|
|
default:
|
|
rs->sr_err = LDAP_NO_SUCH_OBJECT;
|
|
retcode = META_SEARCH_NOT_CANDIDATE;
|
|
goto doreturn;
|
|
}
|
|
|
|
for ( i = 0, ml = op->orm_modlist; ml; i++ ,ml = ml->sml_next )
|
|
;
|
|
|
|
mods = ch_malloc( sizeof( LDAPMod )*i );
|
|
if ( mods == NULL ) {
|
|
rs->sr_err = LDAP_OTHER;
|
|
retcode = META_SEARCH_ERR;
|
|
goto doreturn;
|
|
}
|
|
modv = ( LDAPMod ** )ch_malloc( ( i + 1 )*sizeof( LDAPMod * ) );
|
|
if ( modv == NULL ) {
|
|
rs->sr_err = LDAP_OTHER;
|
|
retcode = META_SEARCH_ERR;
|
|
goto doreturn;
|
|
}
|
|
|
|
dc.ctx = "modifyAttrDN";
|
|
isupdate = be_shadow_update( op );
|
|
for ( i = 0, ml = op->orm_modlist; ml; ml = ml->sml_next ) {
|
|
int j, is_oc = 0;
|
|
|
|
if ( !isupdate && !get_relax( op ) && ml->sml_desc->ad_type->sat_no_user_mod )
|
|
{
|
|
continue;
|
|
}
|
|
|
|
if ( ml->sml_desc == slap_schema.si_ad_objectClass
|
|
|| ml->sml_desc == slap_schema.si_ad_structuralObjectClass )
|
|
{
|
|
is_oc = 1;
|
|
mapped = ml->sml_desc->ad_cname;
|
|
|
|
} else {
|
|
asyncmeta_map( &mt->mt_rwmap.rwm_at,
|
|
&ml->sml_desc->ad_cname, &mapped,
|
|
BACKLDAP_MAP );
|
|
if ( BER_BVISNULL( &mapped ) || BER_BVISEMPTY( &mapped ) ) {
|
|
continue;
|
|
}
|
|
}
|
|
|
|
modv[ i ] = &mods[ i ];
|
|
mods[ i ].mod_op = ml->sml_op | LDAP_MOD_BVALUES;
|
|
mods[ i ].mod_type = mapped.bv_val;
|
|
|
|
/*
|
|
* FIXME: dn-valued attrs should be rewritten
|
|
* to allow their use in ACLs at the back-ldap
|
|
* level.
|
|
*/
|
|
if ( ml->sml_values != NULL ) {
|
|
if ( is_oc ) {
|
|
for ( j = 0; !BER_BVISNULL( &ml->sml_values[ j ] ); j++ )
|
|
;
|
|
mods[ i ].mod_bvalues =
|
|
(struct berval **)ch_malloc( ( j + 1 ) *
|
|
sizeof( struct berval * ) );
|
|
for ( j = 0; !BER_BVISNULL( &ml->sml_values[ j ] ); ) {
|
|
struct ldapmapping *mapping;
|
|
|
|
asyncmeta_mapping( &mt->mt_rwmap.rwm_oc,
|
|
&ml->sml_values[ j ], &mapping, BACKLDAP_MAP );
|
|
|
|
if ( mapping == NULL ) {
|
|
if ( mt->mt_rwmap.rwm_oc.drop_missing ) {
|
|
continue;
|
|
}
|
|
mods[ i ].mod_bvalues[ j ] = &ml->sml_values[ j ];
|
|
|
|
} else {
|
|
mods[ i ].mod_bvalues[ j ] = &mapping->dst;
|
|
}
|
|
j++;
|
|
}
|
|
mods[ i ].mod_bvalues[ j ] = NULL;
|
|
|
|
} else {
|
|
if ( ml->sml_desc->ad_type->sat_syntax ==
|
|
slap_schema.si_syn_distinguishedName )
|
|
{
|
|
( void )asyncmeta_dnattr_rewrite( &dc, ml->sml_values );
|
|
if ( ml->sml_values == NULL ) {
|
|
continue;
|
|
}
|
|
}
|
|
|
|
for ( j = 0; !BER_BVISNULL( &ml->sml_values[ j ] ); j++ )
|
|
;
|
|
mods[ i ].mod_bvalues =
|
|
(struct berval **)ch_malloc( ( j + 1 ) *
|
|
sizeof( struct berval * ) );
|
|
for ( j = 0; !BER_BVISNULL( &ml->sml_values[ j ] ); j++ ) {
|
|
mods[ i ].mod_bvalues[ j ] = &ml->sml_values[ j ];
|
|
}
|
|
mods[ i ].mod_bvalues[ j ] = NULL;
|
|
}
|
|
|
|
} else {
|
|
mods[ i ].mod_bvalues = NULL;
|
|
}
|
|
|
|
i++;
|
|
}
|
|
modv[ i ] = 0;
|
|
|
|
retry:;
|
|
ctrls = op->o_ctrls;
|
|
if ( asyncmeta_controls_add( op, rs, mc, candidate, &ctrls ) != LDAP_SUCCESS )
|
|
{
|
|
candidates[ candidate ].sr_msgid = META_MSGID_IGNORE;
|
|
retcode = META_SEARCH_ERR;
|
|
goto done;
|
|
}
|
|
|
|
ber = ldap_build_modify_req( msc->msc_ld, mdn.bv_val, modv, ctrls, NULL, &msgid);
|
|
if (ber) {
|
|
candidates[ candidate ].sr_msgid = msgid;
|
|
rc = ldap_send_initial_request( msc->msc_ld, LDAP_REQ_MODIFY,
|
|
mdn.bv_val, ber, msgid );
|
|
if (rc == msgid)
|
|
rc = LDAP_SUCCESS;
|
|
else
|
|
rc = LDAP_SERVER_DOWN;
|
|
|
|
switch ( rc ) {
|
|
case LDAP_SUCCESS:
|
|
retcode = META_SEARCH_CANDIDATE;
|
|
asyncmeta_set_msc_time(msc);
|
|
break;
|
|
|
|
case LDAP_SERVER_DOWN:
|
|
ldap_pvt_thread_mutex_lock( &mc->mc_om_mutex);
|
|
asyncmeta_clear_one_msc(NULL, mc, candidate);
|
|
ldap_pvt_thread_mutex_unlock( &mc->mc_om_mutex);
|
|
if ( nretries && asyncmeta_retry( op, rs, &mc, candidate, LDAP_BACK_DONTSEND ) ) {
|
|
nretries = 0;
|
|
/* if the identity changed, there might be need to re-authz */
|
|
(void)mi->mi_ldap_extra->controls_free( op, rs, &ctrls );
|
|
goto retry;
|
|
}
|
|
|
|
default:
|
|
candidates[ candidate ].sr_msgid = META_MSGID_IGNORE;
|
|
retcode = META_SEARCH_ERR;
|
|
}
|
|
}
|
|
|
|
done:
|
|
(void)mi->mi_ldap_extra->controls_free( op, rs, &ctrls );
|
|
|
|
if ( mdn.bv_val != op->o_req_dn.bv_val ) {
|
|
free( mdn.bv_val );
|
|
BER_BVZERO( &mdn );
|
|
}
|
|
if ( modv != NULL ) {
|
|
for ( i = 0; modv[ i ]; i++ ) {
|
|
free( modv[ i ]->mod_bvalues );
|
|
}
|
|
}
|
|
free( mods );
|
|
free( modv );
|
|
|
|
doreturn:;
|
|
Debug( LDAP_DEBUG_TRACE, "%s <<< asyncmeta_back_modify_start[%p]=%d\n", op->o_log_prefix, msc, candidates[candidate].sr_msgid );
|
|
return retcode;
|
|
}
|
|
|
|
int
|
|
asyncmeta_back_modify( Operation *op, SlapReply *rs )
|
|
{
|
|
a_metainfo_t *mi = ( a_metainfo_t * )op->o_bd->be_private;
|
|
a_metatarget_t *mt;
|
|
a_metaconn_t *mc;
|
|
int rc, candidate = -1;
|
|
OperationBuffer opbuf;
|
|
bm_context_t *bc;
|
|
SlapReply *candidates;
|
|
slap_callback *cb = op->o_callback;
|
|
|
|
Debug(LDAP_DEBUG_ARGS, "==> asyncmeta_back_modify: %s\n",
|
|
op->o_req_dn.bv_val, 0, 0 );
|
|
|
|
asyncmeta_new_bm_context(op, rs, &bc, mi->mi_ntargets );
|
|
if (bc == NULL) {
|
|
rs->sr_err = LDAP_OTHER;
|
|
asyncmeta_sender_error(op, rs, cb);
|
|
return rs->sr_err;
|
|
}
|
|
|
|
candidates = bc->candidates;
|
|
mc = asyncmeta_getconn( op, rs, candidates, &candidate, LDAP_BACK_DONTSEND, 0);
|
|
if ( !mc || rs->sr_err != LDAP_SUCCESS) {
|
|
asyncmeta_sender_error(op, rs, cb);
|
|
asyncmeta_clear_bm_context(bc);
|
|
return rs->sr_err;
|
|
}
|
|
|
|
mt = mi->mi_targets[ candidate ];
|
|
bc->timeout = mt->mt_timeout[ SLAP_OP_MODIFY ];
|
|
bc->retrying = LDAP_BACK_RETRYING;
|
|
bc->sendok = ( LDAP_BACK_SENDRESULT | bc->retrying );
|
|
bc->stoptime = op->o_time + bc->timeout;
|
|
|
|
ldap_pvt_thread_mutex_lock( &mc->mc_om_mutex);
|
|
rc = asyncmeta_add_message_queue(mc, bc);
|
|
ldap_pvt_thread_mutex_unlock( &mc->mc_om_mutex);
|
|
|
|
if (rc != LDAP_SUCCESS) {
|
|
rs->sr_err = LDAP_BUSY;
|
|
rs->sr_text = "Maximum pending ops limit exceeded";
|
|
asyncmeta_clear_bm_context(bc);
|
|
asyncmeta_sender_error(op, rs, cb);
|
|
goto finish;
|
|
}
|
|
|
|
rc = asyncmeta_dobind_init_with_retry(op, rs, bc, mc, candidate);
|
|
switch (rc)
|
|
{
|
|
case META_SEARCH_CANDIDATE:
|
|
/* target is already bound, just send the request */
|
|
Debug( LDAP_DEBUG_TRACE, "%s asyncmeta_back_modify: "
|
|
"cnd=\"%ld\"\n", op->o_log_prefix, candidate , 0);
|
|
|
|
rc = asyncmeta_back_modify_start( op, rs, mc, bc, candidate);
|
|
if (rc == META_SEARCH_ERR) {
|
|
ldap_pvt_thread_mutex_lock( &mc->mc_om_mutex);
|
|
asyncmeta_drop_bc(mc, bc);
|
|
ldap_pvt_thread_mutex_unlock( &mc->mc_om_mutex);
|
|
asyncmeta_sender_error(op, rs, cb);
|
|
asyncmeta_clear_bm_context(bc);
|
|
goto finish;
|
|
|
|
}
|
|
break;
|
|
case META_SEARCH_NOT_CANDIDATE:
|
|
Debug( LDAP_DEBUG_TRACE, "%s asyncmeta_back_modify: NOT_CANDIDATE "
|
|
"cnd=\"%ld\"\n", op->o_log_prefix, candidate , 0);
|
|
candidates[ candidate ].sr_msgid = META_MSGID_IGNORE;
|
|
ldap_pvt_thread_mutex_lock( &mc->mc_om_mutex);
|
|
asyncmeta_drop_bc(mc, bc);
|
|
ldap_pvt_thread_mutex_unlock( &mc->mc_om_mutex);
|
|
asyncmeta_sender_error(op, rs, cb);
|
|
asyncmeta_clear_bm_context(bc);
|
|
goto finish;
|
|
|
|
case META_SEARCH_NEED_BIND:
|
|
case META_SEARCH_CONNECTING:
|
|
Debug( LDAP_DEBUG_TRACE, "%s asyncmeta_back_modify: NEED_BIND "
|
|
"cnd=\"%ld\" %p\n", op->o_log_prefix, candidate , &mc->mc_conns[candidate]);
|
|
rc = asyncmeta_dobind_init(op, rs, bc, mc, candidate);
|
|
if (rc == META_SEARCH_ERR) {
|
|
ldap_pvt_thread_mutex_lock( &mc->mc_om_mutex);
|
|
asyncmeta_drop_bc(mc, bc);
|
|
ldap_pvt_thread_mutex_unlock( &mc->mc_om_mutex);
|
|
asyncmeta_sender_error(op, rs, cb);
|
|
asyncmeta_clear_bm_context(bc);
|
|
goto finish;
|
|
}
|
|
break;
|
|
case META_SEARCH_BINDING:
|
|
Debug( LDAP_DEBUG_TRACE, "%s asyncmeta_back_modify: BINDING "
|
|
"cnd=\"%ld\" %p\n", op->o_log_prefix, candidate , &mc->mc_conns[candidate]);
|
|
/* Todo add the context to the message queue but do not send the request
|
|
the receiver must send this when we are done binding */
|
|
/* question - how would do receiver know to which targets??? */
|
|
break;
|
|
|
|
case META_SEARCH_ERR:
|
|
Debug( LDAP_DEBUG_TRACE, "%s asyncmeta_back_modify: ERR "
|
|
"cnd=\"%ldd\"\n", op->o_log_prefix, candidate , 0);
|
|
candidates[ candidate ].sr_msgid = META_MSGID_IGNORE;
|
|
candidates[ candidate ].sr_type = REP_RESULT;
|
|
ldap_pvt_thread_mutex_lock( &mc->mc_om_mutex);
|
|
asyncmeta_drop_bc(mc, bc);
|
|
ldap_pvt_thread_mutex_unlock( &mc->mc_om_mutex);
|
|
asyncmeta_sender_error(op, rs, cb);
|
|
asyncmeta_clear_bm_context(bc);
|
|
goto finish;
|
|
default:
|
|
assert( 0 );
|
|
break;
|
|
}
|
|
ldap_pvt_thread_mutex_lock( &mc->mc_om_mutex);
|
|
asyncmeta_start_one_listener(mc, candidates, candidate);
|
|
ldap_pvt_thread_mutex_unlock( &mc->mc_om_mutex);
|
|
finish:
|
|
return rs->sr_err;
|
|
}
|