refint.c 26.8 KB
Newer Older
1
2
3
4
/* refint.c - referential integrity module */
/* $OpenLDAP$ */
/* This work is part of OpenLDAP Software <http://www.openldap.org/>.
 *
Quanah Gibson-Mount's avatar
Quanah Gibson-Mount committed
5
 * Copyright 2004-2021 The OpenLDAP Foundation.
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
 * Portions Copyright 2004 Symas Corporation.
 * All rights reserved.
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted only as authorized by the OpenLDAP
 * Public License.
 *
 * A copy of this license is available in the file LICENSE in the
 * top-level directory of the distribution or, alternatively, at
 * <http://www.OpenLDAP.org/license.html>.
 */
/* ACKNOWLEDGEMENTS:
 * This work was initially developed by Symas Corp. for inclusion in
 * OpenLDAP Software.  This work was sponsored by Hewlett-Packard.
 */

#include "portable.h"

/* This module maintains referential integrity for a set of
 * DN-valued attributes by searching for all references to a given
 * DN whenever the DN is changed or its entry is deleted, and making
 * the appropriate update.
 *
29
30
 * Updates are performed using the database rootdn in a separate task
 * to allow the original operation to complete immediately.
31
32
33
34
35
36
37
38
39
40
 */

#ifdef SLAPD_OVER_REFINT

#include <stdio.h>

#include <ac/string.h>
#include <ac/socket.h>

#include "slap.h"
41
#include "slap-config.h"
42
#include "ldap_rq.h"
43
44
45

static slap_overinst refint;

46
47
48
49
/* The DN to use in the ModifiersName for all refint updates */
static BerValue refint_dn = BER_BVC("cn=Referential Integrity Overlay");
static BerValue refint_ndn = BER_BVC("cn=referential integrity overlay");

50
typedef struct refint_attrs_s {
51
52
53
54
55
56
	struct refint_attrs_s	*next;
	AttributeDescription	*attr;
	BerVarray		old_vals;
	BerVarray		old_nvals;
	BerVarray		new_vals;
	BerVarray		new_nvals;
57
	int				ra_numvals;
58
	int				dont_empty;
59
60
61
62
63
} refint_attrs;

typedef struct dependents_s {
	struct dependents_s *next;
	BerValue dn;				/* target dn */
64
65
	BerValue ndn;
	refint_attrs *attrs;
66
67
} dependent_data;

68
69
70
71
72
73
74
75
76
typedef struct refint_q {
	struct refint_q *next;
	struct refint_data_s *rdata;
	dependent_data *attrs;		/* entries and attrs returned from callback */
	BackendDB *db;
	BerValue olddn;
	BerValue oldndn;
	BerValue newdn;
	BerValue newndn;
77
	int do_sub;
78
79
} refint_q;

80
81
typedef struct refint_data_s {
	struct refint_attrs_s *attrs;	/* list of known attrs */
82
	BerValue dn;				/* basedn in parent, */
83
84
	BerValue nothing;			/* the nothing value, if needed */
	BerValue nnothing;			/* normalized nothingness */
85
86
	BerValue refint_dn;			/* modifier's name */
	BerValue refint_ndn;			/* normalized modifier's name */
87
88
89
	struct re_s *qtask;
	refint_q *qhead;
	refint_q *qtail;
90
	BackendDB *db;
91
	ldap_pvt_thread_mutex_t qmutex;
92
93
} refint_data;

94
95
96
97
98
typedef struct refint_pre_s {
	slap_overinst *on;
	int do_sub;
} refint_pre;

99
100
#define	RUNQ_INTERVAL	36000	/* a long time */

101
102
static MatchingRule	*mr_dnSubtreeMatch;

103
104
enum {
	REFINT_ATTRS = 1,
105
106
	REFINT_NOTHING,
	REFINT_MODIFIERSNAME
107
108
109
110
111
112
113
114
115
};

static ConfigDriver refint_cf_gen;

static ConfigTable refintcfg[] = {
	{ "refint_attributes", "attribute...", 2, 0, 0,
	  ARG_MAGIC|REFINT_ATTRS, refint_cf_gen,
	  "( OLcfgOvAt:11.1 NAME 'olcRefintAttribute' "
	  "DESC 'Attributes for referential integrity' "
116
	  "EQUALITY caseIgnoreMatch "
117
118
	  "SYNTAX OMsDirectoryString )", NULL, NULL },
	{ "refint_nothing", "string", 2, 2, 0,
119
	  ARG_DN|ARG_QUOTE|ARG_MAGIC|REFINT_NOTHING, refint_cf_gen,
120
121
	  "( OLcfgOvAt:11.2 NAME 'olcRefintNothing' "
	  "DESC 'Replacement DN to supply when needed' "
122
	  "EQUALITY distinguishedNameMatch "
123
	  "SYNTAX OMsDN SINGLE-VALUE )", NULL, NULL },
124
	{ "refint_modifiersName", "DN", 2, 2, 0,
125
	  ARG_DN|ARG_QUOTE|ARG_MAGIC|REFINT_MODIFIERSNAME, refint_cf_gen,
126
127
	  "( OLcfgOvAt:11.3 NAME 'olcRefintModifiersName' "
	  "DESC 'The DN to use as modifiersName' "
128
	  "EQUALITY distinguishedNameMatch "
129
	  "SYNTAX OMsDN SINGLE-VALUE )", NULL, NULL },
130
131
132
133
134
135
136
137
	{ NULL, NULL, 0, 0, 0, ARG_IGNORED }
};

static ConfigOCs refintocs[] = {
	{ "( OLcfgOvOc:11.1 "
	  "NAME 'olcRefintConfig' "
	  "DESC 'Referential integrity configuration' "
	  "SUP olcOverlayConfig "
138
139
140
141
	  "MAY ( olcRefintAttribute "
		"$ olcRefintNothing "
		"$ olcRefintModifiersName "
	  ") )",
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
	  Cft_Overlay, refintcfg },
	{ NULL, 0, NULL }
};

static int
refint_cf_gen(ConfigArgs *c)
{
	slap_overinst *on = (slap_overinst *)c->bi;
	refint_data *dd = (refint_data *)on->on_bi.bi_private;
	refint_attrs *ip, *pip, **pipp = NULL;
	AttributeDescription *ad;
	const char *text;
	int rc = ARG_BAD_CONF;
	int i;

	switch ( c->op ) {
	case SLAP_CONFIG_EMIT:
		switch ( c->type ) {
		case REFINT_ATTRS:
			ip = dd->attrs;
			while ( ip ) {
				value_add_one( &c->rvalue_vals,
					       &ip->attr->ad_cname );
				ip = ip->next;
			}
			rc = 0;
			break;
		case REFINT_NOTHING:
			if ( !BER_BVISEMPTY( &dd->nothing )) {
				rc = value_add_one( &c->rvalue_vals,
						    &dd->nothing );
				if ( rc ) return rc;
				rc = value_add_one( &c->rvalue_nvals,
						    &dd->nnothing );
				return rc;
			}
			rc = 0;
			break;
180
181
182
183
184
185
186
187
188
189
190
		case REFINT_MODIFIERSNAME:
			if ( !BER_BVISEMPTY( &dd->refint_dn )) {
				rc = value_add_one( &c->rvalue_vals,
						    &dd->refint_dn );
				if ( rc ) return rc;
				rc = value_add_one( &c->rvalue_nvals,
						    &dd->refint_ndn );
				return rc;
			}
			rc = 0;
			break;
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
		default:
			abort ();
		}
		break;
	case LDAP_MOD_DELETE:
		switch ( c->type ) {
		case REFINT_ATTRS:
			pipp = &dd->attrs;
			if ( c->valx < 0 ) {
				ip = *pipp;
				*pipp = NULL;
				while ( ip ) {
					pip = ip;
					ip = ip->next;
					ch_free ( pip );
				}
			} else {
				/* delete from linked list */
				for ( i=0; i < c->valx; ++i ) {
					pipp = &(*pipp)->next;
				}
				ip = *pipp;
				*pipp = (*pipp)->next;

				/* AttributeDescriptions are global so
				 * shouldn't be freed here... */
				ch_free ( ip );
			}
			rc = 0;
			break;
		case REFINT_NOTHING:
222
223
224
225
			ch_free( dd->nothing.bv_val );
			ch_free( dd->nnothing.bv_val );
			BER_BVZERO( &dd->nothing );
			BER_BVZERO( &dd->nnothing );
226
227
			rc = 0;
			break;
228
		case REFINT_MODIFIERSNAME:
229
230
231
232
			ch_free( dd->refint_dn.bv_val );
			ch_free( dd->refint_ndn.bv_val );
			BER_BVZERO( &dd->refint_dn );
			BER_BVZERO( &dd->refint_ndn );
233
234
			rc = 0;
			break;
235
236
237
238
239
		default:
			abort ();
		}
		break;
	case SLAP_CONFIG_ADD:
Josh Soref's avatar
Josh Soref committed
240
		/* fallthru to LDAP_MOD_ADD */
241
242
243
244
	case LDAP_MOD_ADD:
		switch ( c->type ) {
		case REFINT_ATTRS:
			rc = 0;
245
246
247
248
249
250
251
252
253
254
255
			if ( c->op != SLAP_CONFIG_ADD && c->argc > 2 ) {
				/* We wouldn't know how to delete these values later */
				snprintf( c->cr_msg, sizeof( c->cr_msg ),
					"Please insert multiple names as separate %s values",
					c->argv[0] );
				Debug( LDAP_DEBUG_CONFIG|LDAP_DEBUG_NONE,
					"%s: %s\n", c->log, c->cr_msg );
				rc = LDAP_INVALID_SYNTAX;
				break;
			}

256
257
258
259
260
261
262
			for ( i=1; i < c->argc; ++i ) {
				ad = NULL;
				if ( slap_str2ad ( c->argv[i], &ad, &text )
				     == LDAP_SUCCESS) {
					ip = ch_malloc (
						sizeof ( refint_attrs ) );
					ip->attr = ad;
263
264
265
266
267

					for ( pipp = &dd->attrs; *pipp; pipp = &(*pipp)->next )
						/* Get to the end */ ;
					ip->next = *pipp;
					*pipp = ip;
268
				} else {
269
					snprintf( c->cr_msg, sizeof( c->cr_msg ),
270
271
						"%s <%s>: %s", c->argv[0], c->argv[i], text );
					Debug ( LDAP_DEBUG_CONFIG|LDAP_DEBUG_NONE,
272
						"%s: %s\n", c->log, c->cr_msg );
273
274
275
276
277
					rc = ARG_BAD_CONF;
				}
			}
			break;
		case REFINT_NOTHING:
278
279
280
281
282
283
284
285
286
			if ( !BER_BVISNULL( &c->value_ndn )) {
				ch_free ( dd->nothing.bv_val );
				ch_free ( dd->nnothing.bv_val );
				dd->nothing = c->value_dn;
				dd->nnothing = c->value_ndn;
				rc = 0;
			} else {
				rc = ARG_BAD_CONF;
			}
287
			break;
288
		case REFINT_MODIFIERSNAME:
289
			if ( !BER_BVISNULL( &c->value_ndn )) {
290
291
				ch_free( dd->refint_dn.bv_val );
				ch_free( dd->refint_ndn.bv_val );
292
293
294
295
296
297
				dd->refint_dn = c->value_dn;
				dd->refint_ndn = c->value_ndn;
				rc = 0;
			} else {
				rc = ARG_BAD_CONF;
			}
298
			break;
299
300
301
302
303
304
305
306
307
308
309
		default:
			abort ();
		}
		break;
	default:
		abort ();
	}

	return rc;
}

310
311
312
313
314
315
316
317
/*
** allocate new refint_data;
** store in on_bi.bi_private;
**
*/

static int
refint_db_init(
318
	BackendDB	*be,
319
	ConfigReply	*cr
320
321
322
)
{
	slap_overinst *on = (slap_overinst *)be->bd_info;
323
	refint_data *id = ch_calloc(1,sizeof(refint_data));
324

325
	on->on_bi.bi_private = id;
326
	ldap_pvt_thread_mutex_init( &id->qmutex );
327
328
329
330
	return(0);
}

static int
331
refint_db_destroy(
332
	BackendDB	*be,
333
	ConfigReply	*cr
334
335
)
{
336
	slap_overinst *on = (slap_overinst *)be->bd_info;
337

338
	if ( on->on_bi.bi_private ) {
339
		refint_data *id = on->on_bi.bi_private;
340
341
		refint_attrs *ii, *ij;

342
		on->on_bi.bi_private = NULL;
343
		ldap_pvt_thread_mutex_destroy( &id->qmutex );
344
345
346
347
348
349
350
351
352
353
354

		for(ii = id->attrs; ii; ii = ij) {
			ij = ii->next;
			ch_free(ii);
		}

		ch_free( id->nothing.bv_val );
		BER_BVZERO( &id->nothing );
		ch_free( id->nnothing.bv_val );
		BER_BVZERO( &id->nnothing );

355
		ch_free( id );
356
357
358
359
360
	}
	return(0);
}

/*
361
** initialize, copy basedn if not already set
362
363
364
365
366
**
*/

static int
refint_open(
367
	BackendDB *be,
368
	ConfigReply *cr
369
370
371
372
)
{
	slap_overinst *on	= (slap_overinst *)be->bd_info;
	refint_data *id	= on->on_bi.bi_private;
373
374
375
376
377
378

	if ( BER_BVISNULL( &id->dn )) {
		if ( BER_BVISNULL( &be->be_nsuffix[0] ))
			return -1;
		ber_dupbv( &id->dn, &be->be_nsuffix[0] );
	}
379
380
381
382
	if ( BER_BVISNULL( &id->refint_dn ) ) {
		ber_dupbv( &id->refint_dn, &refint_dn );
		ber_dupbv( &id->refint_ndn, &refint_ndn );
	}
383
384
385
386
387
388
389
390
391
392
393

	/*
	** find the backend that matches our configured basedn;
	** make sure it exists and has search and modify methods;
	**
	*/

	if ( on->on_info->oi_origdb != frontendDB ) {
		BackendDB *db = select_backend(&id->dn, 1);

		if ( db ) {
Howard Chu's avatar
Howard Chu committed
394
395
396
397
398
399
			BackendInfo *bi;
			if ( db == be )
				bi = on->on_info->oi_orig;
			else
				bi = db->bd_info;
			if ( !bi->bi_op_search || !bi->bi_op_modify ) {
400
				Debug( LDAP_DEBUG_CONFIG,
401
					"refint_response: backend missing search and/or modify\n" );
402
403
404
405
406
407
				return -1;
			}
			id->db = db;
		} else {
			Debug( LDAP_DEBUG_CONFIG,
				"refint_response: no backend for our baseDN %s??\n",
408
				id->dn.bv_val );
409
410
411
			return -1;
		}
	}
412
413
414
415
416
417
	return(0);
}


/*
** free our basedn;
418
** free our refintdn
419
420
421
422
423
**
*/

static int
refint_close(
424
	BackendDB *be,
425
	ConfigReply *cr
426
427
428
429
)
{
	slap_overinst *on	= (slap_overinst *) be->bd_info;
	refint_data *id	= on->on_bi.bi_private;
Pierangelo Masarati's avatar
Pierangelo Masarati committed
430
431
432

	ch_free( id->dn.bv_val );
	BER_BVZERO( &id->dn );
433
434
435
436
	ch_free( id->refint_dn.bv_val );
	BER_BVZERO( &id->refint_dn );
	ch_free( id->refint_ndn.bv_val );
	BER_BVZERO( &id->refint_ndn );
437
438
439
440
441

	return(0);
}

/*
442
443
** search callback
** generates a list of Attributes from search results
444
445
446
*/

static int
447
refint_search_cb(
448
449
450
451
452
453
	Operation *op,
	SlapReply *rs
)
{
	Attribute *a;
	BerVarray b = NULL;
454
455
456
	refint_q *rq = op->o_callback->sc_private;
	refint_data *dd = rq->rdata;
	refint_attrs *ia, *da = dd->attrs, *na;
457
	dependent_data *ip;
458
459
	int i;

460
	Debug(LDAP_DEBUG_TRACE, "refint_search_cb <%s>\n",
461
		rs->sr_entry ? rs->sr_entry->e_name.bv_val : "NOTHING" );
462
463
464
465
466
467
468

	if (rs->sr_type != REP_SEARCH || !rs->sr_entry) return(0);

	/*
	** foreach configured attribute type:
	**	if this attr exists in the search result,
	**	and it has a value matching the target:
469
	**		allocate an attr;
470
471
	**		save/build DNs of any subordinate matches;
	**		handle special case: found exact + subordinate match;
472
	**		handle olcRefintNothing;
473
474
475
	**
	*/

476
477
478
479
480
481
	ip = op->o_tmpalloc(sizeof(dependent_data), op->o_tmpmemctx );
	ber_dupbv_x( &ip->dn, &rs->sr_entry->e_name, op->o_tmpmemctx );
	ber_dupbv_x( &ip->ndn, &rs->sr_entry->e_nname, op->o_tmpmemctx );
	ip->next = rq->attrs;
	rq->attrs = ip;
	ip->attrs = NULL;
482
	for(ia = da; ia; ia = ia->next) {
483
		if ( (a = attr_find(rs->sr_entry->e_attrs, ia->attr) ) ) {
484
			int exact = -1, is_exact;
485
486
487

			na = NULL;

488
489
			/* Are we doing subtree matching or simple equality? */
			if ( rq->do_sub ) {
490
491
			for(i = 0, b = a->a_nvals; b[i].bv_val; i++) {
				if(dnIsSuffix(&b[i], &rq->oldndn)) {
492
493
494
495
496
497
498
499
					is_exact = b[i].bv_len == rq->oldndn.bv_len;

					/* Paranoia: skip buggy duplicate exact match,
					 * it would break ra_numvals
					 */
					if ( is_exact && exact >= 0 )
						continue;

500
501
502
503
504
505
506
507
508
509
					/* first match? create structure */
					if ( na == NULL ) {
						na = op->o_tmpcalloc( 1,
							sizeof( refint_attrs ),
							op->o_tmpmemctx );
						na->next = ip->attrs;
						ip->attrs = na;
						na->attr = ia->attr;
					}

510
					na->ra_numvals++;
511

512
513
514
					if ( is_exact ) {
						/* Exact match: refint_repair will deduce the DNs */
						exact = i;
515

516
517
518
					} else {
						/* Subordinate match */
						struct berval	newsub, newdn, olddn, oldndn;
519

520
						/* Save old DN */
521
522
						ber_dupbv_x( &olddn, &a->a_vals[i], op->o_tmpmemctx );
						ber_bvarray_add_x( &na->old_vals, &olddn, op->o_tmpmemctx );
523

524
525
						ber_dupbv_x( &oldndn, &a->a_nvals[i], op->o_tmpmemctx );
						ber_bvarray_add_x( &na->old_nvals, &oldndn, op->o_tmpmemctx );
526

527
528
529
530
						if ( BER_BVISEMPTY( &rq->newdn ) )
							continue;

						/* Rename subordinate match: Build new DN */
531
532
533
534
535
536
537
538
539
540
						newsub = a->a_vals[i];
						newsub.bv_len -= rq->olddn.bv_len + 1;
						build_new_dn( &newdn, &rq->newdn, &newsub, op->o_tmpmemctx );
						ber_bvarray_add_x( &na->new_vals, &newdn, op->o_tmpmemctx );

						newsub = a->a_nvals[i];
						newsub.bv_len -= rq->oldndn.bv_len + 1;
						build_new_dn( &newdn, &rq->newndn, &newsub, op->o_tmpmemctx );
						ber_bvarray_add_x( &na->new_nvals, &newdn, op->o_tmpmemctx );
					}
541
542
				}
			}
543

544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
			/* If we got both subordinate and exact match,
			 * refint_repair won't special-case the exact match */
			if ( exact >= 0 && na->old_vals ) {
				struct berval	dn;

				ber_dupbv_x( &dn, &a->a_vals[exact], op->o_tmpmemctx );
				ber_bvarray_add_x( &na->old_vals, &dn, op->o_tmpmemctx );
				ber_dupbv_x( &dn, &a->a_nvals[exact], op->o_tmpmemctx );
				ber_bvarray_add_x( &na->old_nvals, &dn, op->o_tmpmemctx );

				if ( !BER_BVISEMPTY( &rq->newdn ) ) {
					ber_dupbv_x( &dn, &rq->newdn, op->o_tmpmemctx );
					ber_bvarray_add_x( &na->new_vals, &dn, op->o_tmpmemctx );
					ber_dupbv_x( &dn, &rq->newndn, op->o_tmpmemctx );
					ber_bvarray_add_x( &na->new_nvals, &dn, op->o_tmpmemctx );
559
				}
560
			}
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
			} else {
				/* entry has no children, just equality matching */
				is_exact = attr_valfind( a,
					SLAP_MR_EQUALITY|SLAP_MR_ASSERTED_VALUE_NORMALIZED_MATCH|
					SLAP_MR_ATTRIBUTE_VALUE_NORMALIZED_MATCH, &rq->oldndn, &i, NULL );
				if ( is_exact == LDAP_SUCCESS ) {
					na = op->o_tmpcalloc( 1,
						sizeof( refint_attrs ),
						op->o_tmpmemctx );
					na->next = ip->attrs;
					ip->attrs = na;
					na->attr = ia->attr;
					na->ra_numvals = 1;
				}
			}
576

577
			/* Deleting/replacing all values and a nothing DN is configured? */
578
			if ( na && na->ra_numvals == a->a_numvals && !BER_BVISNULL(&dd->nothing) )
579
				na->dont_empty = 1;
580

581
582
			Debug( LDAP_DEBUG_TRACE, "refint_search_cb: %s: %s (#%d)\n",
				a->a_desc->ad_cname.bv_val, rq->olddn.bv_val, i );
583
		}
584
	}
585

586
587
588
	return(0);
}

589
590
591
592
593
594
static int
refint_repair(
	Operation	*op,
	refint_data	*id,
	refint_q	*rq )
{
595
	dependent_data	*dp;
596
	SlapReply		rs = {REP_RESULT};
Howard Chu's avatar
Howard Chu committed
597
	Operation		op2;
598
	unsigned long	opid;
599
	int		rc;
600
	int	cache;
601
602
603
604
605
606

	op->o_callback->sc_response = refint_search_cb;
	op->o_req_dn = op->o_bd->be_suffix[ 0 ];
	op->o_req_ndn = op->o_bd->be_nsuffix[ 0 ];
	op->o_dn = op->o_bd->be_rootdn;
	op->o_ndn = op->o_bd->be_rootndn;
607
608
	cache = op->o_do_not_cache;
	op->o_do_not_cache = 1;
609
610

	/* search */
611
	rc = op->o_bd->be_search( op, &rs );
612
	op->o_do_not_cache = cache;
613
614
615
616

	if ( rc != LDAP_SUCCESS ) {
		Debug( LDAP_DEBUG_TRACE,
			"refint_repair: search failed: %d\n",
617
			rc );
Howard Chu's avatar
Howard Chu committed
618
		return rc;
619
620
621
622
623
	}

	/* safety? paranoid just in case */
	if ( op->o_callback->sc_private == NULL ) {
		Debug( LDAP_DEBUG_TRACE,
624
			"refint_repair: callback wiped out sc_private?!\n" );
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
		return 0;
	}

	/* Set up the Modify requests */
	op->o_callback->sc_response = &slap_null_cb;

	/*
	 * [our search callback builds a list of attrs]
	 * foreach attr:
	 *	make sure its dn has a backend;
	 *	build Modification* chain;
	 *	call the backend modify function;
	 *
	 */

Howard Chu's avatar
Howard Chu committed
640
	opid = op->o_opid;
Howard Chu's avatar
Howard Chu committed
641
	op2 = *op;
642
	for ( dp = rq->attrs; dp; dp = dp->next ) {
643
		SlapReply	rs2 = {REP_RESULT};
644
		refint_attrs	*ra;
645
		Modifications	*m;
646

647
648
		if ( dp->attrs == NULL ) continue; /* TODO: Is this needed? */

649
650
651
652
		op2.o_bd = select_backend( &dp->ndn, 1 );
		if ( !op2.o_bd ) {
			Debug( LDAP_DEBUG_TRACE,
				"refint_repair: no backend for DN %s!\n",
653
				dp->dn.bv_val );
654
			continue;
655
		}
Howard Chu's avatar
Howard Chu committed
656
657
658
659
660
661
662
		op2.o_tag = LDAP_REQ_MODIFY;
		op2.orm_modlist = NULL;
		op2.o_req_dn	= dp->dn;
		op2.o_req_ndn	= dp->ndn;
		/* Internal ops, never replicate these */
		op2.orm_no_opattrs = 1;
		op2.o_dont_replicate = 1;
663
		op2.o_opid = 0;
664

665
666
		/* Set our ModifiersName */
		if ( SLAP_LASTMOD( op->o_bd ) ) {
667
668
669
670
671
672
673
674
675
676
677
678
679
				m = op2.o_tmpalloc( sizeof(Modifications) +
					4*sizeof(BerValue), op2.o_tmpmemctx );
				m->sml_next = op2.orm_modlist;
				op2.orm_modlist = m;
				m->sml_op = LDAP_MOD_REPLACE;
				m->sml_flags = SLAP_MOD_INTERNAL;
				m->sml_desc = slap_schema.si_ad_modifiersName;
				m->sml_type = m->sml_desc->ad_cname;
				m->sml_numvals = 1;
				m->sml_values = (BerVarray)(m+1);
				m->sml_nvalues = m->sml_values+2;
				BER_BVZERO( &m->sml_values[1] );
				BER_BVZERO( &m->sml_nvalues[1] );
680
681
				m->sml_values[0] = id->refint_dn;
				m->sml_nvalues[0] = id->refint_ndn;
682
683
684
685
		}

		for ( ra = dp->attrs; ra; ra = ra->next ) {
			size_t	len;
686
687
688

			/* Add values */
			if ( ra->dont_empty || !BER_BVISEMPTY( &rq->newdn ) ) {
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
				len = sizeof(Modifications);

				if ( ra->new_vals == NULL ) {
					len += 4*sizeof(BerValue);
				}

				m = op2.o_tmpalloc( len, op2.o_tmpmemctx );
				m->sml_next = op2.orm_modlist;
				op2.orm_modlist = m;
				m->sml_op = LDAP_MOD_ADD;
				m->sml_flags = 0;
				m->sml_desc = ra->attr;
				m->sml_type = ra->attr->ad_cname;
				if ( ra->new_vals == NULL ) {
					m->sml_values = (BerVarray)(m+1);
					m->sml_nvalues = m->sml_values+2;
					BER_BVZERO( &m->sml_values[1] );
					BER_BVZERO( &m->sml_nvalues[1] );
					m->sml_numvals = 1;
					if ( BER_BVISEMPTY( &rq->newdn ) ) {
						m->sml_values[0] = id->nothing;
						m->sml_nvalues[0] = id->nnothing;
					} else {
						m->sml_values[0] = rq->newdn;
						m->sml_nvalues[0] = rq->newndn;
					}
				} else {
					m->sml_values = ra->new_vals;
					m->sml_nvalues = ra->new_nvals;
					m->sml_numvals = ra->ra_numvals;
				}
			}

722
			/* Delete values */
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
			len = sizeof(Modifications);
			if ( ra->old_vals == NULL ) {
				len += 4*sizeof(BerValue);
			}
			m = op2.o_tmpalloc( len, op2.o_tmpmemctx );
			m->sml_next = op2.orm_modlist;
			op2.orm_modlist = m;
			m->sml_op = LDAP_MOD_DELETE;
			m->sml_flags = 0;
			m->sml_desc = ra->attr;
			m->sml_type = ra->attr->ad_cname;
			if ( ra->old_vals == NULL ) {
				m->sml_numvals = 1;
				m->sml_values = (BerVarray)(m+1);
				m->sml_nvalues = m->sml_values+2;
				m->sml_values[0] = rq->olddn;
				m->sml_nvalues[0] = rq->oldndn;
				BER_BVZERO( &m->sml_values[1] );
				BER_BVZERO( &m->sml_nvalues[1] );
			} else {
				m->sml_values = ra->old_vals;
				m->sml_nvalues = ra->old_nvals;
				m->sml_numvals = ra->ra_numvals;
			}
		}

		op2.o_dn = op2.o_bd->be_rootdn;
		op2.o_ndn = op2.o_bd->be_rootndn;
751
752
		rc = op2.o_bd->be_modify( &op2, &rs2 );
		if ( rc != LDAP_SUCCESS ) {
753
754
			Debug( LDAP_DEBUG_TRACE,
				"refint_repair: dependent modify failed: %d\n",
755
				rs2.sr_err );
756
757
758
759
760
761
762
		}

		while ( ( m = op2.orm_modlist ) ) {
			op2.orm_modlist = m->sml_next;
			op2.o_tmpfree( m, op2.o_tmpmemctx );
		}
	}
763
	op2.o_opid = opid;
764
765
766
767

	return 0;
}

768
769
static void *
refint_qtask( void *ctx, void *arg )
770
{
771
772
773
774
775
776
777
778
	struct re_s *rtask = arg;
	refint_data *id = rtask->arg;
	Connection conn = {0};
	OperationBuffer opbuf;
	Operation *op;
	slap_callback cb = { NULL, NULL, NULL, NULL };
	Filter ftop, *fptr;
	refint_q *rq;
779
	refint_attrs *ip;
Howard Chu's avatar
Howard Chu committed
780
	int pausing = 0, rc = 0;
781

782
783
	connection_fake_init( &conn, &opbuf, ctx );
	op = &opbuf.ob_op;
784
785

	/*
786
787
788
789
790
791
	** build a search filter for all configured attributes;
	** populate our Operation;
	** pass our data (attr list, dn) to backend via sc_private;
	** call the backend search function;
	** nb: (|(one=thing)) is valid, but do smart formatting anyway;
	** nb: 16 is arbitrarily a dozen or so extra bytes;
792
793
794
	**
	*/

795
796
797
798
799
	ftop.f_choice = LDAP_FILTER_OR;
	ftop.f_next = NULL;
	ftop.f_or = NULL;
	op->ors_filter = &ftop;
	for(ip = id->attrs; ip; ip = ip->next) {
800
		/* this filter can be either EQUALITY or EXT */
801
802
803
804
		fptr = op->o_tmpcalloc( sizeof(Filter) + sizeof(MatchingRuleAssertion),
			1, op->o_tmpmemctx );
		fptr->f_mra = (MatchingRuleAssertion *)(fptr+1);
		fptr->f_mr_rule = mr_dnSubtreeMatch;
805
		fptr->f_mr_rule_text = mr_dnSubtreeMatch->smr_bvoid;
806
807
		fptr->f_mr_desc = ip->attr;
		fptr->f_mr_dnattrs = 0;
808
809
810
811
812
		fptr->f_next = ftop.f_or;
		ftop.f_or = fptr;
	}

	for (;;) {
813
814
815
		dependent_data	*dp, *dp_next;
		refint_attrs *ra, *ra_next;

Howard Chu's avatar
Howard Chu committed
816
817
818
819
820
		if ( ldap_pvt_thread_pool_pausing( &connection_pool ) > 0 ) {
			pausing = 1;
			break;
		}

821
822
823
824
825
826
827
828
829
830
831
832
		/* Dequeue an op */
		ldap_pvt_thread_mutex_lock( &id->qmutex );
		rq = id->qhead;
		if ( rq ) {
			id->qhead = rq->next;
			if ( !id->qhead )
				id->qtail = NULL;
		}
		ldap_pvt_thread_mutex_unlock( &id->qmutex );
		if ( !rq )
			break;

833
		for (fptr = ftop.f_or; fptr; fptr = fptr->f_next ) {
834
			fptr->f_mr_value = rq->oldndn;
835
836
837
838
839
840
841
			/* Use (attr:dnSubtreeMatch:=value) to catch subtree rename
			 * and subtree delete where supported */
			if (rq->do_sub)
				fptr->f_choice = LDAP_FILTER_EXT;
			else
				fptr->f_choice = LDAP_FILTER_EQUALITY;
		}
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858

		filter2bv_x( op, op->ors_filter, &op->ors_filterstr );

		/* callback gets the searched dn instead */
		cb.sc_private	= rq;
		cb.sc_response	= refint_search_cb;
		op->o_callback	= &cb;
		op->o_tag	= LDAP_REQ_SEARCH;
		op->ors_scope	= LDAP_SCOPE_SUBTREE;
		op->ors_deref	= LDAP_DEREF_NEVER;
		op->ors_limit   = NULL;
		op->ors_slimit	= SLAP_NO_LIMIT;
		op->ors_tlimit	= SLAP_NO_LIMIT;

		/* no attrs! */
		op->ors_attrs = slap_anlist_no_attrs;

859
		slap_op_time( &op->o_time, &op->o_tincr );
860

861
862
		if ( rq->db != NULL ) {
			op->o_bd = rq->db;
Howard Chu's avatar
Howard Chu committed
863
			rc = refint_repair( op, id, rq );
864

865
866
		} else {
			BackendDB	*be;
867

868
869
870
871
			LDAP_STAILQ_FOREACH( be, &backendDB, be_next ) {
				/* we may want to skip cn=config */
				if ( be == LDAP_STAILQ_FIRST(&backendDB) ) {
					continue;
872
				}
873

874
875
				if ( be->be_search && be->be_modify ) {
					op->o_bd = be;
Howard Chu's avatar
Howard Chu committed
876
					rc = refint_repair( op, id, rq );
877
				}
878
			}
879
		}
880

881
882
883
884
885
886
887
888
889
890
891
892
893
894
		for ( dp = rq->attrs; dp; dp = dp_next ) {
			dp_next = dp->next;
			for ( ra = dp->attrs; ra; ra = ra_next ) {
				ra_next = ra->next;
				ber_bvarray_free_x( ra->new_nvals, op->o_tmpmemctx );
				ber_bvarray_free_x( ra->new_vals, op->o_tmpmemctx );
				ber_bvarray_free_x( ra->old_nvals, op->o_tmpmemctx );
				ber_bvarray_free_x( ra->old_vals, op->o_tmpmemctx );
				op->o_tmpfree( ra, op->o_tmpmemctx );
			}
			op->o_tmpfree( dp->ndn.bv_val, op->o_tmpmemctx );
			op->o_tmpfree( dp->dn.bv_val, op->o_tmpmemctx );
			op->o_tmpfree( dp, op->o_tmpmemctx );
		}
Howard Chu's avatar
Howard Chu committed
895
		op->o_tmpfree( op->ors_filterstr.bv_val, op->o_tmpmemctx );
Howard Chu's avatar
Howard Chu committed
896
897
898
899
900
901
902
903
904
905
906
		if ( rc == LDAP_BUSY ) {
			pausing = 1;
			/* re-queue this op */
			ldap_pvt_thread_mutex_lock( &id->qmutex );
			rq->next = id->qhead;
			id->qhead = rq;
			if ( !id->qtail )
				id->qtail = rq;
			ldap_pvt_thread_mutex_unlock( &id->qmutex );
			break;
		}
907

908
909
910
911
912
913
914
		if ( !BER_BVISNULL( &rq->newndn )) {
			ch_free( rq->newndn.bv_val );
			ch_free( rq->newdn.bv_val );
		}
		ch_free( rq->oldndn.bv_val );
		ch_free( rq->olddn.bv_val );
		ch_free( rq );
915
916
	}

917
918
919
920
921
922
923
	/* free filter */
	for ( fptr = ftop.f_or; fptr; ) {
		Filter *f_next = fptr->f_next;
		op->o_tmpfree( fptr, op->o_tmpmemctx );
		fptr = f_next;
	}

924
925
926
	/* wait until we get explicitly scheduled again */
	ldap_pvt_thread_mutex_lock( &slapd_rq.rq_mutex );
	ldap_pvt_runqueue_stoptask( &slapd_rq, id->qtask );
Howard Chu's avatar
Howard Chu committed
927
928
929
930
931
932
933
934
	if ( pausing ) {
		/* try to run again as soon as the pause is done */
		id->qtask->interval.tv_sec = 0;
		ldap_pvt_runqueue_resched( &slapd_rq, id->qtask, 0 );
		id->qtask->interval.tv_sec = RUNQ_INTERVAL;
	} else {
		ldap_pvt_runqueue_resched( &slapd_rq,id->qtask, 1 );
	}
935
	ldap_pvt_thread_mutex_unlock( &slapd_rq.rq_mutex );
936

937
938
	return NULL;
}
939
940
941
942
943
944
945
946
947
948
949
950

/*
** refint_response
** search for matching records and modify them
*/

static int
refint_response(
	Operation *op,
	SlapReply *rs
)
{
951
952
953
	refint_pre *rp;
	slap_overinst *on;
	refint_data *id;
954
955
	refint_q *rq;
	refint_attrs *ip;
956
957
958
959
960
961

	/* If the main op failed or is not a Delete or ModRdn, ignore it */
	if (( op->o_tag != LDAP_REQ_DELETE && op->o_tag != LDAP_REQ_MODRDN ) ||
		rs->sr_err != LDAP_SUCCESS )
		return SLAP_CB_CONTINUE;

962
963
964
	rp = op->o_callback->sc_private;
	on = rp->on;
	id = on->on_bi.bi_private;
965

966
967
968
	rq = ch_calloc( 1, sizeof( refint_q ));
	ber_dupbv( &rq->olddn, &op->o_req_dn );
	ber_dupbv( &rq->oldndn, &op->o_req_ndn );
969
	rq->db = id->db;
970
	rq->rdata = id;
971
	rq->do_sub = rp->do_sub;
972

973
	if ( op->o_tag == LDAP_REQ_MODRDN ) {
974
975
		ber_dupbv( &rq->newdn, &op->orr_newDN );
		ber_dupbv( &rq->newndn, &op->orr_nnewDN );
976
977
	}

978
979
980
981
982
	ldap_pvt_thread_mutex_lock( &id->qmutex );
	if ( id->qtail ) {
		id->qtail->next = rq;
	} else {
		id->qhead = rq;
983
	}
984
985
986
987
988
989
990
991
992
993
994
995
996
997
	id->qtail = rq;
	ldap_pvt_thread_mutex_unlock( &id->qmutex );

	ldap_pvt_thread_mutex_lock( &slapd_rq.rq_mutex );
	if ( !id->qtask ) {
		id->qtask = ldap_pvt_runqueue_insert( &slapd_rq, RUNQ_INTERVAL,
			refint_qtask, id, "refint_qtask",
			op->o_bd->be_suffix[0].bv_val );
	} else {
		if ( !ldap_pvt_runqueue_isrunning( &slapd_rq, id->qtask ) &&
			!id->qtask->next_sched.tv_sec ) {
			id->qtask->interval.tv_sec = 0;
			ldap_pvt_runqueue_resched( &slapd_rq, id->qtask, 0 );
			id->qtask->interval.tv_sec = RUNQ_INTERVAL;
998
999
		}
	}
1000
	ldap_pvt_thread_mutex_unlock( &slapd_rq.rq_mutex );
For faster browsing, not all history is shown. View entire blame