1/* $OpenLDAP$ */
2/* This work is part of OpenLDAP Software <http://www.openldap.org/>.
3 *
4 * Copyright 1999-2011 The OpenLDAP Foundation.
5 * Portions Copyright 1999 Dmitry Kovalev.
6 * Portions Copyright 2002 Pierangelo Masarati.
7 * Portions Copyright 2004 Mark Adamson.
8 * All rights reserved.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted only as authorized by the OpenLDAP
12 * Public License.
13 *
14 * A copy of this license is available in the file LICENSE in the
15 * top-level directory of the distribution or, alternatively, at
16 * <http://www.OpenLDAP.org/license.html>.
17 */
18/* ACKNOWLEDGEMENTS:
19 * This work was initially developed by Dmitry Kovalev for inclusion
20 * by OpenLDAP Software.  Additional significant contributors include
21 * Pierangelo Masarati and Mark Adamson.
22 */
23
24#include "portable.h"
25
26#include <stdio.h>
27#include <sys/types.h>
28#include "ac/string.h"
29
30#include "lutil.h"
31#include "slap.h"
32#include "proto-sql.h"
33
34#define BACKSQL_DUPLICATE	(-1)
35
36/* NOTE: by default, cannot just compare pointers because
37 * objectClass/attributeType order would be machine-dependent
38 * (and tests would fail!); however, if you don't want to run
39 * tests, or see attributeTypes written in the same order
40 * they are defined, define */
41/* #undef BACKSQL_USE_PTR_CMP */
42
43/*
44 * Uses the pointer to the ObjectClass structure
45 */
46static int
47backsql_cmp_oc( const void *v_m1, const void *v_m2 )
48{
49	const backsql_oc_map_rec	*m1 = v_m1,
50					*m2 = v_m2;
51
52#ifdef BACKSQL_USE_PTR_CMP
53	return SLAP_PTRCMP( m1->bom_oc, m2->bom_oc );
54#else /* ! BACKSQL_USE_PTR_CMP */
55	return ber_bvcmp( &m1->bom_oc->soc_cname, &m2->bom_oc->soc_cname );
56#endif /* ! BACKSQL_USE_PTR_CMP */
57}
58
59static int
60backsql_cmp_oc_id( const void *v_m1, const void *v_m2 )
61{
62	const backsql_oc_map_rec	*m1 = v_m1,
63					*m2 = v_m2;
64
65	return ( m1->bom_id < m2->bom_id ? -1 : ( m1->bom_id > m2->bom_id ? 1 : 0 ) );
66}
67
68/*
69 * Uses the pointer to the AttributeDescription structure
70 */
71static int
72backsql_cmp_attr( const void *v_m1, const void *v_m2 )
73{
74	const backsql_at_map_rec	*m1 = v_m1,
75					*m2 = v_m2;
76
77	if ( slap_ad_is_binary( m1->bam_ad ) || slap_ad_is_binary( m2->bam_ad ) ) {
78#ifdef BACKSQL_USE_PTR_CMP
79		return SLAP_PTRCMP( m1->bam_ad->ad_type, m2->bam_ad->ad_type );
80#else /* ! BACKSQL_USE_PTR_CMP */
81		return ber_bvcmp( &m1->bam_ad->ad_type->sat_cname, &m2->bam_ad->ad_type->sat_cname );
82#endif /* ! BACKSQL_USE_PTR_CMP */
83	}
84
85#ifdef BACKSQL_USE_PTR_CMP
86	return SLAP_PTRCMP( m1->bam_ad, m2->bam_ad );
87#else /* ! BACKSQL_USE_PTR_CMP */
88	return ber_bvcmp( &m1->bam_ad->ad_cname, &m2->bam_ad->ad_cname );
89#endif /* ! BACKSQL_USE_PTR_CMP */
90}
91
92int
93backsql_dup_attr( void *v_m1, void *v_m2 )
94{
95	backsql_at_map_rec		*m1 = v_m1,
96					*m2 = v_m2;
97
98	if ( slap_ad_is_binary( m1->bam_ad ) || slap_ad_is_binary( m2->bam_ad ) ) {
99#ifdef BACKSQL_USE_PTR_CMP
100		assert( m1->bam_ad->ad_type == m2->bam_ad->ad_type );
101#else /* ! BACKSQL_USE_PTR_CMP */
102		assert( ber_bvcmp( &m1->bam_ad->ad_type->sat_cname, &m2->bam_ad->ad_type->sat_cname ) == 0 );
103#endif /* ! BACKSQL_USE_PTR_CMP */
104
105	} else {
106#ifdef BACKSQL_USE_PTR_CMP
107		assert( m1->bam_ad == m2->bam_ad );
108#else /* ! BACKSQL_USE_PTR_CMP */
109		assert( ber_bvcmp( &m1->bam_ad->ad_cname, &m2->bam_ad->ad_cname ) == 0 );
110#endif /* ! BACKSQL_USE_PTR_CMP */
111	}
112
113	/* duplicate definitions of attributeTypes are appended;
114	 * this allows to define multiple rules for the same
115	 * attributeType.  Use with care! */
116	for ( ; m1->bam_next ; m1 = m1->bam_next );
117
118	m1->bam_next = m2;
119	m2->bam_next = NULL;
120
121	return BACKSQL_DUPLICATE;
122}
123
124static int
125backsql_make_attr_query(
126	backsql_info		*bi,
127	backsql_oc_map_rec 	*oc_map,
128	backsql_at_map_rec 	*at_map )
129{
130	struct berbuf	bb = BB_NULL;
131
132	backsql_strfcat_x( &bb, NULL, "lblbbbblblbcbl",
133			(ber_len_t)STRLENOF( "SELECT " ), "SELECT ",
134			&at_map->bam_sel_expr,
135			(ber_len_t)STRLENOF( " " ), " ",
136			&bi->sql_aliasing,
137			&bi->sql_aliasing_quote,
138			&at_map->bam_ad->ad_cname,
139			&bi->sql_aliasing_quote,
140			(ber_len_t)STRLENOF( " FROM " ), " FROM ",
141			&at_map->bam_from_tbls,
142			(ber_len_t)STRLENOF( " WHERE " ), " WHERE ",
143			&oc_map->bom_keytbl,
144			'.',
145			&oc_map->bom_keycol,
146			(ber_len_t)STRLENOF( "=?" ), "=?" );
147
148	if ( !BER_BVISNULL( &at_map->bam_join_where ) ) {
149		backsql_strfcat_x( &bb, NULL, "lb",
150				(ber_len_t)STRLENOF( " AND " ), " AND ",
151				&at_map->bam_join_where );
152	}
153
154	backsql_strfcat_x( &bb, NULL, "lbbb",
155			(ber_len_t)STRLENOF( " ORDER BY " ), " ORDER BY ",
156			&bi->sql_aliasing_quote,
157			&at_map->bam_ad->ad_cname,
158			&bi->sql_aliasing_quote );
159
160	at_map->bam_query = bb.bb_val.bv_val;
161
162#ifdef BACKSQL_COUNTQUERY
163	/* Query to count how many rows will be returned.
164
165	SELECT COUNT(*) FROM <from_tbls> WHERE <keytbl>.<keycol>=?
166		[ AND <join_where> ]
167
168	 */
169	BER_BVZERO( &bb.bb_val );
170	bb.bb_len = 0;
171	backsql_strfcat_x( &bb, NULL, "lblbcbl",
172			(ber_len_t)STRLENOF( "SELECT COUNT(*) FROM " ),
173				"SELECT COUNT(*) FROM ",
174			&at_map->bam_from_tbls,
175			(ber_len_t)STRLENOF( " WHERE " ), " WHERE ",
176			&oc_map->bom_keytbl,
177			'.',
178			&oc_map->bom_keycol,
179			(ber_len_t)STRLENOF( "=?" ), "=?" );
180
181	if ( !BER_BVISNULL( &at_map->bam_join_where ) ) {
182		backsql_strfcat_x( &bb, NULL, "lb",
183				(ber_len_t)STRLENOF( " AND " ), " AND ",
184				&at_map->bam_join_where );
185	}
186
187	at_map->bam_countquery = bb.bb_val.bv_val;
188#endif /* BACKSQL_COUNTQUERY */
189
190	return 0;
191}
192
193static int
194backsql_add_sysmaps( backsql_info *bi, backsql_oc_map_rec *oc_map )
195{
196	backsql_at_map_rec	*at_map;
197	char			s[LDAP_PVT_INTTYPE_CHARS(long)];
198	struct berval		sbv;
199	struct berbuf		bb;
200
201	sbv.bv_val = s;
202	sbv.bv_len = snprintf( s, sizeof( s ), BACKSQL_IDNUMFMT, oc_map->bom_id );
203
204	/* extra objectClasses */
205	at_map = (backsql_at_map_rec *)ch_calloc(1,
206			sizeof( backsql_at_map_rec ) );
207	at_map->bam_ad = slap_schema.si_ad_objectClass;
208	at_map->bam_true_ad = slap_schema.si_ad_objectClass;
209	ber_str2bv( "ldap_entry_objclasses.oc_name", 0, 1,
210			&at_map->bam_sel_expr );
211	ber_str2bv( "ldap_entry_objclasses,ldap_entries", 0, 1,
212			&at_map->bam_from_tbls );
213
214	bb.bb_len = at_map->bam_from_tbls.bv_len + 1;
215	bb.bb_val = at_map->bam_from_tbls;
216	backsql_merge_from_clause( bi, &bb, &oc_map->bom_keytbl );
217	at_map->bam_from_tbls = bb.bb_val;
218
219	BER_BVZERO( &bb.bb_val );
220	bb.bb_len = 0;
221	backsql_strfcat_x( &bb, NULL, "lbcblb",
222			(ber_len_t)STRLENOF( "ldap_entries.id=ldap_entry_objclasses.entry_id AND ldap_entries.keyval=" ),
223				"ldap_entries.id=ldap_entry_objclasses.entry_id AND ldap_entries.keyval=",
224			&oc_map->bom_keytbl,
225			'.',
226			&oc_map->bom_keycol,
227			(ber_len_t)STRLENOF( " and ldap_entries.oc_map_id=" ),
228				" and ldap_entries.oc_map_id=",
229			&sbv );
230	at_map->bam_join_where = bb.bb_val;
231
232	at_map->bam_oc = oc_map->bom_oc;
233
234	at_map->bam_add_proc = NULL;
235	{
236		char	tmp[STRLENOF("INSERT INTO ldap_entry_objclasses "
237			"(entry_id,oc_name) VALUES "
238			"((SELECT id FROM ldap_entries "
239			"WHERE oc_map_id= "
240			"AND keyval=?),?)") + LDAP_PVT_INTTYPE_CHARS(unsigned long)];
241		snprintf( tmp, sizeof(tmp),
242			"INSERT INTO ldap_entry_objclasses "
243			"(entry_id,oc_name) VALUES "
244			"((SELECT id FROM ldap_entries "
245			"WHERE oc_map_id=" BACKSQL_IDNUMFMT " "
246			"AND keyval=?),?)", oc_map->bom_id );
247		at_map->bam_add_proc = ch_strdup( tmp );
248	}
249
250	at_map->bam_delete_proc = NULL;
251	{
252		char	tmp[STRLENOF("DELETE FROM ldap_entry_objclasses "
253			"WHERE entry_id=(SELECT id FROM ldap_entries "
254			"WHERE oc_map_id= "
255			"AND keyval=?) AND oc_name=?") + LDAP_PVT_INTTYPE_CHARS(unsigned long)];
256		snprintf( tmp, sizeof(tmp),
257			"DELETE FROM ldap_entry_objclasses "
258			"WHERE entry_id=(SELECT id FROM ldap_entries "
259			"WHERE oc_map_id=" BACKSQL_IDNUMFMT " "
260			"AND keyval=?) AND oc_name=?",
261			oc_map->bom_id );
262		at_map->bam_delete_proc = ch_strdup( tmp );
263	}
264
265	at_map->bam_param_order = 0;
266	at_map->bam_expect_return = 0;
267	at_map->bam_next = NULL;
268
269	backsql_make_attr_query( bi, oc_map, at_map );
270	if ( avl_insert( &oc_map->bom_attrs, at_map, backsql_cmp_attr, backsql_dup_attr ) == BACKSQL_DUPLICATE ) {
271		Debug( LDAP_DEBUG_TRACE, "backsql_add_sysmaps(): "
272				"duplicate attribute \"%s\" in objectClass \"%s\" map\n",
273				at_map->bam_ad->ad_cname.bv_val,
274				oc_map->bom_oc->soc_cname.bv_val, 0 );
275	}
276
277	/* FIXME: we need to correct the objectClass join_where
278	 * after the attribute query is built */
279	ch_free( at_map->bam_join_where.bv_val );
280	BER_BVZERO( &bb.bb_val );
281	bb.bb_len = 0;
282	backsql_strfcat_x( &bb, NULL, "lbcblb",
283			(ber_len_t)STRLENOF( /* "ldap_entries.id=ldap_entry_objclasses.entry_id AND " */ "ldap_entries.keyval=" ),
284				/* "ldap_entries.id=ldap_entry_objclasses.entry_id AND " */ "ldap_entries.keyval=",
285			&oc_map->bom_keytbl,
286			'.',
287			&oc_map->bom_keycol,
288			(ber_len_t)STRLENOF( " AND ldap_entries.oc_map_id=" ),
289				" AND ldap_entries.oc_map_id=",
290			&sbv );
291	at_map->bam_join_where = bb.bb_val;
292
293	return 1;
294}
295
296struct backsql_attr_schema_info {
297	backsql_info	*bas_bi;
298	SQLHDBC		bas_dbh;
299	SQLHSTMT	bas_sth;
300	backsql_key_t	*bas_oc_id;
301	int		bas_rc;
302};
303
304static int
305backsql_oc_get_attr_mapping( void *v_oc, void *v_bas )
306{
307	RETCODE				rc;
308	BACKSQL_ROW_NTS			at_row;
309	backsql_oc_map_rec		*oc_map = (backsql_oc_map_rec *)v_oc;
310	backsql_at_map_rec		*at_map;
311	struct backsql_attr_schema_info	*bas = (struct backsql_attr_schema_info *)v_bas;
312
313	/* bas->bas_oc_id has been bound to bas->bas_sth */
314	*bas->bas_oc_id = oc_map->bom_id;
315
316	Debug( LDAP_DEBUG_TRACE, "backsql_oc_get_attr_mapping(): "
317		"executing at_query\n"
318		"    \"%s\"\n"
319		"    for objectClass \"%s\"\n"
320		"    with param oc_id=" BACKSQL_IDNUMFMT "\n",
321		bas->bas_bi->sql_at_query,
322		BACKSQL_OC_NAME( oc_map ),
323		*bas->bas_oc_id );
324
325	rc = SQLExecute( bas->bas_sth );
326	if ( rc != SQL_SUCCESS ) {
327		Debug( LDAP_DEBUG_TRACE, "backsql_oc_get_attr_mapping(): "
328			"error executing at_query\n"
329			"    \"%s\"\n"
330			"    for objectClass \"%s\"\n"
331			"    with param oc_id=" BACKSQL_IDNUMFMT "\n",
332			bas->bas_bi->sql_at_query,
333			BACKSQL_OC_NAME( oc_map ),
334			*bas->bas_oc_id );
335		backsql_PrintErrors( bas->bas_bi->sql_db_env,
336				bas->bas_dbh, bas->bas_sth, rc );
337		bas->bas_rc = LDAP_OTHER;
338		return BACKSQL_AVL_STOP;
339	}
340
341	backsql_BindRowAsStrings( bas->bas_sth, &at_row );
342	for ( ; rc = SQLFetch( bas->bas_sth ), BACKSQL_SUCCESS( rc ); ) {
343		const char	*text = NULL;
344		struct berval	bv;
345		struct berbuf	bb = BB_NULL;
346		AttributeDescription *ad = NULL;
347
348		{
349			struct {
350				int idx;
351				char *name;
352			} required[] = {
353				{ 0, "name" },
354				{ 1, "sel_expr" },
355				{ 2, "from" },
356				{ -1, NULL },
357			};
358			int i;
359
360			for ( i = 0; required[ i ].name != NULL; i++ ) {
361				if ( at_row.value_len[ i ] <= 0 ) {
362					Debug( LDAP_DEBUG_ANY,
363						"backsql_oc_get_attr_mapping(): "
364						"required column #%d \"%s\" is empty\n",
365						required[ i ].idx, required[ i ].name, 0 );
366					bas->bas_rc = LDAP_OTHER;
367					return BACKSQL_AVL_STOP;
368				}
369			}
370		}
371
372		{
373			char		buf[ SLAP_TEXT_BUFLEN ];
374
375			snprintf( buf, sizeof( buf ),
376				"attributeType: "
377				"name=\"%s\" "
378				"sel_expr=\"%s\" "
379				"from=\"%s\" "
380				"join_where=\"%s\" "
381				"add_proc=\"%s\" "
382				"delete_proc=\"%s\" "
383				"sel_expr_u=\"%s\"",
384				at_row.cols[ 0 ],
385				at_row.cols[ 1 ],
386				at_row.cols[ 2 ],
387				at_row.cols[ 3 ] ? at_row.cols[ 3 ] : "",
388				at_row.cols[ 4 ] ? at_row.cols[ 4 ] : "",
389				at_row.cols[ 5 ] ? at_row.cols[ 5 ] : "",
390				at_row.cols[ 8 ] ? at_row.cols[ 8 ] : "");
391			Debug( LDAP_DEBUG_TRACE, "%s\n", buf, 0, 0 );
392		}
393
394		rc = slap_str2ad( at_row.cols[ 0 ], &ad, &text );
395		if ( rc != LDAP_SUCCESS ) {
396			Debug( LDAP_DEBUG_TRACE, "backsql_oc_get_attr_mapping(): "
397				"attribute \"%s\" for objectClass \"%s\" "
398				"is not defined in schema: %s\n",
399				at_row.cols[ 0 ],
400				BACKSQL_OC_NAME( oc_map ), text );
401			bas->bas_rc = LDAP_CONSTRAINT_VIOLATION;
402			return BACKSQL_AVL_STOP;
403		}
404		at_map = (backsql_at_map_rec *)ch_calloc( 1,
405				sizeof( backsql_at_map_rec ) );
406		at_map->bam_ad = ad;
407		at_map->bam_true_ad = ad;
408		if ( slap_syntax_is_binary( ad->ad_type->sat_syntax )
409			&& !slap_ad_is_binary( ad ) )
410		{
411			char		buf[ SLAP_TEXT_BUFLEN ];
412			struct berval	bv;
413			const char	*text = NULL;
414
415			bv.bv_val = buf;
416			bv.bv_len = snprintf( buf, sizeof( buf ), "%s;binary",
417				ad->ad_cname.bv_val );
418			at_map->bam_true_ad = NULL;
419			bas->bas_rc = slap_bv2ad( &bv, &at_map->bam_true_ad, &text );
420			if ( bas->bas_rc != LDAP_SUCCESS ) {
421				Debug( LDAP_DEBUG_TRACE, "backsql_oc_get_attr_mapping(): "
422					"unable to fetch attribute \"%s\": %s (%d)\n",
423					buf, text, rc );
424				return BACKSQL_AVL_STOP;
425			}
426		}
427
428		ber_str2bv( at_row.cols[ 1 ], 0, 1, &at_map->bam_sel_expr );
429		if ( at_row.value_len[ 8 ] <= 0 ) {
430			BER_BVZERO( &at_map->bam_sel_expr_u );
431
432		} else {
433			ber_str2bv( at_row.cols[ 8 ], 0, 1,
434					&at_map->bam_sel_expr_u );
435		}
436
437		ber_str2bv( at_row.cols[ 2 ], 0, 0, &bv );
438		backsql_merge_from_clause( bas->bas_bi, &bb, &bv );
439		at_map->bam_from_tbls = bb.bb_val;
440		if ( at_row.value_len[ 3 ] <= 0 ) {
441			BER_BVZERO( &at_map->bam_join_where );
442
443		} else {
444			ber_str2bv( at_row.cols[ 3 ], 0, 1,
445					&at_map->bam_join_where );
446		}
447		at_map->bam_add_proc = NULL;
448		if ( at_row.value_len[ 4 ] > 0 ) {
449			at_map->bam_add_proc = ch_strdup( at_row.cols[ 4 ] );
450		}
451		at_map->bam_delete_proc = NULL;
452		if ( at_row.value_len[ 5 ] > 0 ) {
453			at_map->bam_delete_proc = ch_strdup( at_row.cols[ 5 ] );
454		}
455		if ( lutil_atoix( &at_map->bam_param_order, at_row.cols[ 6 ], 0 ) != 0 ) {
456			/* error */
457		}
458		if ( lutil_atoix( &at_map->bam_expect_return, at_row.cols[ 7 ], 0 ) != 0 ) {
459			/* error */
460		}
461		backsql_make_attr_query( bas->bas_bi, oc_map, at_map );
462		Debug( LDAP_DEBUG_TRACE, "backsql_oc_get_attr_mapping(): "
463			"preconstructed query \"%s\"\n",
464			at_map->bam_query, 0, 0 );
465		at_map->bam_next = NULL;
466		if ( avl_insert( &oc_map->bom_attrs, at_map, backsql_cmp_attr, backsql_dup_attr ) == BACKSQL_DUPLICATE ) {
467			Debug( LDAP_DEBUG_TRACE, "backsql_oc_get_attr_mapping(): "
468					"duplicate attribute \"%s\" "
469					"in objectClass \"%s\" map\n",
470					at_map->bam_ad->ad_cname.bv_val,
471					oc_map->bom_oc->soc_cname.bv_val, 0 );
472		}
473
474		if ( !BER_BVISNULL( &bas->bas_bi->sql_upper_func ) &&
475				BER_BVISNULL( &at_map->bam_sel_expr_u ) )
476		{
477			struct berbuf	bb = BB_NULL;
478
479			backsql_strfcat_x( &bb, NULL, "bcbc",
480					&bas->bas_bi->sql_upper_func,
481					'(' /* ) */ ,
482					&at_map->bam_sel_expr,
483					/* ( */ ')' );
484			at_map->bam_sel_expr_u = bb.bb_val;
485		}
486	}
487	backsql_FreeRow( &at_row );
488	SQLFreeStmt( bas->bas_sth, SQL_CLOSE );
489
490	Debug( LDAP_DEBUG_TRACE, "backsql_load_schema_map(\"%s\"): "
491		"autoadding 'objectClass' and 'ref' mappings\n",
492		BACKSQL_OC_NAME( oc_map ), 0, 0 );
493
494	(void)backsql_add_sysmaps( bas->bas_bi, oc_map );
495
496	return BACKSQL_AVL_CONTINUE;
497}
498
499
500int
501backsql_load_schema_map( backsql_info *bi, SQLHDBC dbh )
502{
503	SQLHSTMT 			sth = SQL_NULL_HSTMT;
504	RETCODE				rc;
505	BACKSQL_ROW_NTS			oc_row;
506	backsql_key_t			oc_id;
507	backsql_oc_map_rec		*oc_map;
508	struct backsql_attr_schema_info	bas;
509
510	int				delete_proc_idx = 5;
511	int				create_hint_idx = delete_proc_idx + 2;
512
513	Debug( LDAP_DEBUG_TRACE, "==>backsql_load_schema_map()\n", 0, 0, 0 );
514
515	/*
516	 * TimesTen : See if the ldap_entries.dn_ru field exists in the schema
517	 */
518	if ( !BACKSQL_DONTCHECK_LDAPINFO_DN_RU( bi ) ) {
519		rc = backsql_Prepare( dbh, &sth,
520				backsql_check_dn_ru_query, 0 );
521		if ( rc == SQL_SUCCESS ) {
522			/* Yes, the field exists */
523			bi->sql_flags |= BSQLF_HAS_LDAPINFO_DN_RU;
524   			Debug( LDAP_DEBUG_TRACE, "ldapinfo.dn_ru field exists "
525				"in the schema\n", 0, 0, 0 );
526		} else {
527			/* No such field exists */
528			bi->sql_flags &= ~BSQLF_HAS_LDAPINFO_DN_RU;
529		}
530
531		SQLFreeStmt( sth, SQL_DROP );
532	}
533
534	Debug( LDAP_DEBUG_TRACE, "backsql_load_schema_map(): oc_query \"%s\"\n",
535			bi->sql_oc_query, 0, 0 );
536
537	rc = backsql_Prepare( dbh, &sth, bi->sql_oc_query, 0 );
538	if ( rc != SQL_SUCCESS ) {
539		Debug( LDAP_DEBUG_TRACE, "backsql_load_schema_map(): "
540			"error preparing oc_query: \"%s\"\n",
541			bi->sql_oc_query, 0, 0 );
542		backsql_PrintErrors( bi->sql_db_env, dbh, sth, rc );
543		return LDAP_OTHER;
544	}
545
546	rc = SQLExecute( sth );
547	if ( rc != SQL_SUCCESS ) {
548		Debug( LDAP_DEBUG_TRACE, "backsql_load_schema_map(): "
549			"error executing oc_query: \n", 0, 0, 0 );
550		backsql_PrintErrors( bi->sql_db_env, dbh, sth, rc );
551		return LDAP_OTHER;
552	}
553
554	backsql_BindRowAsStrings( sth, &oc_row );
555	rc = SQLFetch( sth );
556
557	if ( BACKSQL_CREATE_NEEDS_SELECT( bi ) ) {
558		delete_proc_idx++;
559		create_hint_idx++;
560	}
561
562	for ( ; BACKSQL_SUCCESS( rc ); rc = SQLFetch( sth ) ) {
563		{
564			struct {
565				int idx;
566				char *name;
567			} required[] = {
568				{ 0, "id" },
569				{ 1, "name" },
570				{ 2, "keytbl" },
571				{ 3, "keycol" },
572				{ -1, "expect_return" },
573				{ -1, NULL },
574			};
575			int i;
576
577			required[4].idx = delete_proc_idx + 1;
578
579			for ( i = 0; required[ i ].name != NULL; i++ ) {
580				if ( oc_row.value_len[ required[ i ].idx ] <= 0 ) {
581					Debug( LDAP_DEBUG_ANY,
582						"backsql_load_schema_map(): "
583						"required column #%d \"%s\" is empty\n",
584						required[ i ].idx, required[ i ].name, 0 );
585					return LDAP_OTHER;
586				}
587			}
588		}
589
590		{
591			char		buf[ SLAP_TEXT_BUFLEN ];
592
593			snprintf( buf, sizeof( buf ),
594				"objectClass: "
595				"id=\"%s\" "
596				"name=\"%s\" "
597				"keytbl=\"%s\" "
598				"keycol=\"%s\" "
599				"create_proc=\"%s\" "
600				"create_keyval=\"%s\" "
601				"delete_proc=\"%s\" "
602				"expect_return=\"%s\""
603				"create_hint=\"%s\" ",
604				oc_row.cols[ 0 ],
605				oc_row.cols[ 1 ],
606				oc_row.cols[ 2 ],
607				oc_row.cols[ 3 ],
608				oc_row.cols[ 4 ] ? oc_row.cols[ 4 ] : "",
609				( BACKSQL_CREATE_NEEDS_SELECT( bi ) && oc_row.cols[ 5 ] ) ? oc_row.cols[ 5 ] : "",
610				oc_row.cols[ delete_proc_idx ] ? oc_row.cols[ delete_proc_idx ] : "",
611				oc_row.cols[ delete_proc_idx + 1 ],
612				( ( oc_row.ncols > create_hint_idx ) && oc_row.cols[ create_hint_idx ] ) ? oc_row.cols[ create_hint_idx ] : "" );
613			Debug( LDAP_DEBUG_TRACE, "%s\n", buf, 0, 0 );
614		}
615
616		oc_map = (backsql_oc_map_rec *)ch_calloc( 1,
617				sizeof( backsql_oc_map_rec ) );
618
619		if ( BACKSQL_STR2ID( &oc_map->bom_id, oc_row.cols[ 0 ], 0 ) != 0 ) {
620			Debug( LDAP_DEBUG_TRACE, "backsql_load_schema_map(): "
621				"unable to parse id=\"%s\"\n",
622				oc_row.cols[ 0 ], 0, 0 );
623			return LDAP_OTHER;
624		}
625
626		oc_map->bom_oc = oc_find( oc_row.cols[ 1 ] );
627		if ( oc_map->bom_oc == NULL ) {
628			Debug( LDAP_DEBUG_TRACE, "backsql_load_schema_map(): "
629				"objectClass \"%s\" is not defined in schema\n",
630				oc_row.cols[ 1 ], 0, 0 );
631			return LDAP_OTHER;	/* undefined objectClass ? */
632		}
633
634		ber_str2bv( oc_row.cols[ 2 ], 0, 1, &oc_map->bom_keytbl );
635		ber_str2bv( oc_row.cols[ 3 ], 0, 1, &oc_map->bom_keycol );
636		oc_map->bom_create_proc = ( oc_row.value_len[ 4 ] <= 0 ) ? NULL
637			: ch_strdup( oc_row.cols[ 4 ] );
638
639		if ( BACKSQL_CREATE_NEEDS_SELECT( bi ) ) {
640			oc_map->bom_create_keyval = ( oc_row.value_len[ 5 ] <= 0 )
641				? NULL : ch_strdup( oc_row.cols[ 5 ] );
642		}
643		oc_map->bom_delete_proc = ( oc_row.value_len[ delete_proc_idx ] <= 0 ) ? NULL
644			: ch_strdup( oc_row.cols[ delete_proc_idx ] );
645		if ( lutil_atoix( &oc_map->bom_expect_return, oc_row.cols[ delete_proc_idx + 1 ], 0 ) != 0 ) {
646			Debug( LDAP_DEBUG_TRACE, "backsql_load_schema_map(): "
647				"unable to parse expect_return=\"%s\" for objectClass \"%s\"\n",
648				oc_row.cols[ delete_proc_idx + 1 ], oc_row.cols[ 1 ], 0 );
649			return LDAP_OTHER;
650		}
651
652		if ( ( oc_row.ncols > create_hint_idx ) &&
653				( oc_row.value_len[ create_hint_idx ] > 0 ) )
654		{
655			const char	*text;
656
657			oc_map->bom_create_hint = NULL;
658			rc = slap_str2ad( oc_row.cols[ create_hint_idx ],
659					&oc_map->bom_create_hint, &text );
660			if ( rc != SQL_SUCCESS ) {
661				Debug( LDAP_DEBUG_TRACE, "load_schema_map(): "
662						"error matching "
663						"AttributeDescription %s "
664						"in create_hint: %s (%d)\n",
665						oc_row.cols[ create_hint_idx ],
666						text, rc );
667				backsql_PrintErrors( bi->sql_db_env, dbh,
668						sth, rc );
669				return LDAP_OTHER;
670			}
671		}
672
673		/*
674		 * FIXME: first attempt to check for offending
675		 * instructions in {create|delete}_proc
676		 */
677
678		oc_map->bom_attrs = NULL;
679		if ( avl_insert( &bi->sql_oc_by_oc, oc_map, backsql_cmp_oc, avl_dup_error ) == -1 ) {
680			Debug( LDAP_DEBUG_TRACE, "backsql_load_schema_map(): "
681					"duplicate objectClass \"%s\" in objectClass map\n",
682					oc_map->bom_oc->soc_cname.bv_val, 0, 0 );
683			return LDAP_OTHER;
684		}
685		if ( avl_insert( &bi->sql_oc_by_id, oc_map, backsql_cmp_oc_id, avl_dup_error ) == -1 ) {
686			Debug( LDAP_DEBUG_TRACE, "backsql_load_schema_map(): "
687					"duplicate objectClass \"%s\" in objectClass by ID map\n",
688					oc_map->bom_oc->soc_cname.bv_val, 0, 0 );
689			return LDAP_OTHER;
690		}
691		oc_id = oc_map->bom_id;
692		Debug( LDAP_DEBUG_TRACE, "backsql_load_schema_map(): "
693			"objectClass \"%s\":\n    keytbl=\"%s\" keycol=\"%s\"\n",
694			BACKSQL_OC_NAME( oc_map ),
695			oc_map->bom_keytbl.bv_val, oc_map->bom_keycol.bv_val );
696		if ( oc_map->bom_create_proc ) {
697			Debug( LDAP_DEBUG_TRACE, "    create_proc=\"%s\"\n",
698				oc_map->bom_create_proc, 0, 0 );
699		}
700		if ( oc_map->bom_create_keyval ) {
701			Debug( LDAP_DEBUG_TRACE, "    create_keyval=\"%s\"\n",
702				oc_map->bom_create_keyval, 0, 0 );
703		}
704		if ( oc_map->bom_create_hint ) {
705			Debug( LDAP_DEBUG_TRACE, "    create_hint=\"%s\"\n",
706				oc_map->bom_create_hint->ad_cname.bv_val,
707				0, 0 );
708		}
709		if ( oc_map->bom_delete_proc ) {
710			Debug( LDAP_DEBUG_TRACE, "    delete_proc=\"%s\"\n",
711				oc_map->bom_delete_proc, 0, 0 );
712		}
713		Debug( LDAP_DEBUG_TRACE, "    expect_return: "
714			"add=%d, del=%d; attributes:\n",
715			BACKSQL_IS_ADD( oc_map->bom_expect_return ),
716			BACKSQL_IS_DEL( oc_map->bom_expect_return ), 0 );
717	}
718
719	backsql_FreeRow( &oc_row );
720	SQLFreeStmt( sth, SQL_DROP );
721
722	/* prepare for attribute fetching */
723	Debug( LDAP_DEBUG_TRACE, "backsql_load_schema_map(): at_query \"%s\"\n",
724			bi->sql_at_query, 0, 0 );
725
726	rc = backsql_Prepare( dbh, &sth, bi->sql_at_query, 0 );
727	if ( rc != SQL_SUCCESS ) {
728		Debug( LDAP_DEBUG_TRACE, "backsql_load_schema_map(): "
729			"error preparing at_query: \"%s\"\n",
730			bi->sql_at_query, 0, 0 );
731		backsql_PrintErrors( bi->sql_db_env, dbh, sth, rc );
732		return LDAP_OTHER;
733	}
734
735	rc = backsql_BindParamNumID( sth, 1, SQL_PARAM_INPUT, &oc_id );
736	if ( rc != SQL_SUCCESS ) {
737		Debug( LDAP_DEBUG_TRACE, "backsql_load_schema_map(): "
738			"error binding param \"oc_id\" for at_query\n", 0, 0, 0 );
739		backsql_PrintErrors( bi->sql_db_env, dbh, sth, rc );
740		SQLFreeStmt( sth, SQL_DROP );
741		return LDAP_OTHER;
742	}
743
744	bas.bas_bi = bi;
745	bas.bas_dbh = dbh;
746	bas.bas_sth = sth;
747	bas.bas_oc_id = &oc_id;
748	bas.bas_rc = LDAP_SUCCESS;
749
750	(void)avl_apply( bi->sql_oc_by_oc, backsql_oc_get_attr_mapping,
751			&bas, BACKSQL_AVL_STOP, AVL_INORDER );
752
753	SQLFreeStmt( sth, SQL_DROP );
754
755	bi->sql_flags |= BSQLF_SCHEMA_LOADED;
756
757	Debug( LDAP_DEBUG_TRACE, "<==backsql_load_schema_map()\n", 0, 0, 0 );
758
759	return bas.bas_rc;
760}
761
762backsql_oc_map_rec *
763backsql_oc2oc( backsql_info *bi, ObjectClass *oc )
764{
765	backsql_oc_map_rec	tmp, *res;
766
767#ifdef BACKSQL_TRACE
768	Debug( LDAP_DEBUG_TRACE, "==>backsql_oc2oc(): "
769		"searching for objectclass with name=\"%s\"\n",
770		oc->soc_cname.bv_val, 0, 0 );
771#endif /* BACKSQL_TRACE */
772
773	tmp.bom_oc = oc;
774	res = (backsql_oc_map_rec *)avl_find( bi->sql_oc_by_oc, &tmp, backsql_cmp_oc );
775#ifdef BACKSQL_TRACE
776	if ( res != NULL ) {
777		Debug( LDAP_DEBUG_TRACE, "<==backsql_oc2oc(): "
778			"found name=\"%s\", id=%d\n",
779			BACKSQL_OC_NAME( res ), res->bom_id, 0 );
780	} else {
781		Debug( LDAP_DEBUG_TRACE, "<==backsql_oc2oc(): "
782			"not found\n", 0, 0, 0 );
783	}
784#endif /* BACKSQL_TRACE */
785
786	return res;
787}
788
789backsql_oc_map_rec *
790backsql_name2oc( backsql_info *bi, struct berval *oc_name )
791{
792	backsql_oc_map_rec	tmp, *res;
793
794#ifdef BACKSQL_TRACE
795	Debug( LDAP_DEBUG_TRACE, "==>oc_with_name(): "
796		"searching for objectclass with name=\"%s\"\n",
797		oc_name->bv_val, 0, 0 );
798#endif /* BACKSQL_TRACE */
799
800	tmp.bom_oc = oc_bvfind( oc_name );
801	if ( tmp.bom_oc == NULL ) {
802		return NULL;
803	}
804
805	res = (backsql_oc_map_rec *)avl_find( bi->sql_oc_by_oc, &tmp, backsql_cmp_oc );
806#ifdef BACKSQL_TRACE
807	if ( res != NULL ) {
808		Debug( LDAP_DEBUG_TRACE, "<==oc_with_name(): "
809			"found name=\"%s\", id=%d\n",
810			BACKSQL_OC_NAME( res ), res->bom_id, 0 );
811	} else {
812		Debug( LDAP_DEBUG_TRACE, "<==oc_with_name(): "
813			"not found\n", 0, 0, 0 );
814	}
815#endif /* BACKSQL_TRACE */
816
817	return res;
818}
819
820backsql_oc_map_rec *
821backsql_id2oc( backsql_info *bi, unsigned long id )
822{
823	backsql_oc_map_rec	tmp, *res;
824
825#ifdef BACKSQL_TRACE
826	Debug( LDAP_DEBUG_TRACE, "==>oc_with_id(): "
827		"searching for objectclass with id=%lu\n", id, 0, 0 );
828#endif /* BACKSQL_TRACE */
829
830	tmp.bom_id = id;
831	res = (backsql_oc_map_rec *)avl_find( bi->sql_oc_by_id, &tmp,
832			backsql_cmp_oc_id );
833
834#ifdef BACKSQL_TRACE
835	if ( res != NULL ) {
836		Debug( LDAP_DEBUG_TRACE, "<==oc_with_id(): "
837			"found name=\"%s\", id=%lu\n",
838			BACKSQL_OC_NAME( res ), res->bom_id, 0 );
839	} else {
840		Debug( LDAP_DEBUG_TRACE, "<==oc_with_id(): "
841			"id=%lu not found\n", res->bom_id, 0, 0 );
842	}
843#endif /* BACKSQL_TRACE */
844
845	return res;
846}
847
848backsql_at_map_rec *
849backsql_ad2at( backsql_oc_map_rec* objclass, AttributeDescription *ad )
850{
851	backsql_at_map_rec	tmp = { 0 }, *res;
852
853#ifdef BACKSQL_TRACE
854	Debug( LDAP_DEBUG_TRACE, "==>backsql_ad2at(): "
855		"searching for attribute \"%s\" for objectclass \"%s\"\n",
856		ad->ad_cname.bv_val, BACKSQL_OC_NAME( objclass ), 0 );
857#endif /* BACKSQL_TRACE */
858
859	tmp.bam_ad = ad;
860	res = (backsql_at_map_rec *)avl_find( objclass->bom_attrs, &tmp,
861			backsql_cmp_attr );
862
863#ifdef BACKSQL_TRACE
864	if ( res != NULL ) {
865		Debug( LDAP_DEBUG_TRACE, "<==backsql_ad2at(): "
866			"found name=\"%s\", sel_expr=\"%s\"\n",
867			res->bam_ad->ad_cname.bv_val,
868			res->bam_sel_expr.bv_val, 0 );
869	} else {
870		Debug( LDAP_DEBUG_TRACE, "<==backsql_ad2at(): "
871			"not found\n", 0, 0, 0 );
872	}
873#endif /* BACKSQL_TRACE */
874
875	return res;
876}
877
878/* attributeType inheritance */
879struct supad2at_t {
880	backsql_at_map_rec	**ret;
881	AttributeDescription	*ad;
882	unsigned		n;
883};
884
885#define SUPAD2AT_STOP	(-1)
886
887static int
888supad2at_f( void *v_at, void *v_arg )
889{
890	backsql_at_map_rec	*at = (backsql_at_map_rec *)v_at;
891	struct supad2at_t	*va = (struct supad2at_t *)v_arg;
892
893	if ( is_at_subtype( at->bam_ad->ad_type, va->ad->ad_type ) ) {
894		backsql_at_map_rec	**ret = NULL;
895		unsigned		i;
896
897		/* if already listed, holler! (should never happen) */
898		if ( va->ret ) {
899			for ( i = 0; i < va->n; i++ ) {
900				if ( va->ret[ i ]->bam_ad == at->bam_ad ) {
901					break;
902				}
903			}
904
905			if ( i < va->n ) {
906				return 0;
907			}
908		}
909
910		ret = ch_realloc( va->ret,
911				sizeof( backsql_at_map_rec * ) * ( va->n + 2 ) );
912		if ( ret == NULL ) {
913			ch_free( va->ret );
914			va->ret = NULL;
915			va->n = 0;
916			return SUPAD2AT_STOP;
917		}
918
919		ret[ va->n ] = at;
920		va->n++;
921		ret[ va->n ] = NULL;
922		va->ret = ret;
923	}
924
925	return 0;
926}
927
928/*
929 * stores in *pret a NULL terminated array of pointers
930 * to backsql_at_map_rec whose attributeType is supad->ad_type
931 * or derived from it
932 */
933int
934backsql_supad2at( backsql_oc_map_rec *objclass, AttributeDescription *supad,
935		backsql_at_map_rec ***pret )
936{
937	struct supad2at_t	va = { 0 };
938	int			rc;
939
940	assert( objclass != NULL );
941	assert( supad != NULL );
942	assert( pret != NULL );
943
944	*pret = NULL;
945
946	va.ad = supad;
947
948	rc = avl_apply( objclass->bom_attrs, supad2at_f, &va,
949			SUPAD2AT_STOP, AVL_INORDER );
950	if ( rc == SUPAD2AT_STOP ) {
951		return -1;
952	}
953
954	*pret = va.ret;
955
956	return 0;
957}
958
959static void
960backsql_free_attr( void *v_at )
961{
962	backsql_at_map_rec	*at = v_at;
963
964	Debug( LDAP_DEBUG_TRACE, "==>free_attr(): \"%s\"\n",
965			at->bam_ad->ad_cname.bv_val, 0, 0 );
966	ch_free( at->bam_sel_expr.bv_val );
967	if ( !BER_BVISNULL( &at->bam_from_tbls ) ) {
968		ch_free( at->bam_from_tbls.bv_val );
969	}
970	if ( !BER_BVISNULL( &at->bam_join_where ) ) {
971		ch_free( at->bam_join_where.bv_val );
972	}
973	if ( at->bam_add_proc != NULL ) {
974		ch_free( at->bam_add_proc );
975	}
976	if ( at->bam_delete_proc != NULL ) {
977		ch_free( at->bam_delete_proc );
978	}
979	if ( at->bam_query != NULL ) {
980		ch_free( at->bam_query );
981	}
982
983#ifdef BACKSQL_COUNTQUERY
984	if ( at->bam_countquery != NULL ) {
985		ch_free( at->bam_countquery );
986	}
987#endif /* BACKSQL_COUNTQUERY */
988
989	/* TimesTen */
990	if ( !BER_BVISNULL( &at->bam_sel_expr_u ) ) {
991		ch_free( at->bam_sel_expr_u.bv_val );
992	}
993
994	if ( at->bam_next ) {
995		backsql_free_attr( at->bam_next );
996	}
997
998	ch_free( at );
999
1000	Debug( LDAP_DEBUG_TRACE, "<==free_attr()\n", 0, 0, 0 );
1001}
1002
1003static void
1004backsql_free_oc( void *v_oc )
1005{
1006	backsql_oc_map_rec	*oc = v_oc;
1007
1008	Debug( LDAP_DEBUG_TRACE, "==>free_oc(): \"%s\"\n",
1009			BACKSQL_OC_NAME( oc ), 0, 0 );
1010	avl_free( oc->bom_attrs, backsql_free_attr );
1011	ch_free( oc->bom_keytbl.bv_val );
1012	ch_free( oc->bom_keycol.bv_val );
1013	if ( oc->bom_create_proc != NULL ) {
1014		ch_free( oc->bom_create_proc );
1015	}
1016	if ( oc->bom_create_keyval != NULL ) {
1017		ch_free( oc->bom_create_keyval );
1018	}
1019	if ( oc->bom_delete_proc != NULL ) {
1020		ch_free( oc->bom_delete_proc );
1021	}
1022	ch_free( oc );
1023
1024	Debug( LDAP_DEBUG_TRACE, "<==free_oc()\n", 0, 0, 0 );
1025}
1026
1027int
1028backsql_destroy_schema_map( backsql_info *bi )
1029{
1030	Debug( LDAP_DEBUG_TRACE, "==>destroy_schema_map()\n", 0, 0, 0 );
1031	avl_free( bi->sql_oc_by_oc, 0 );
1032	avl_free( bi->sql_oc_by_id, backsql_free_oc );
1033	Debug( LDAP_DEBUG_TRACE, "<==destroy_schema_map()\n", 0, 0, 0 );
1034	return 0;
1035}
1036
1037