blob: 4d75e75077ae8f66472f3c24f5e6b75c57c4201e [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*
*/
package org.apache.directory.server.core.partition.impl.btree.jdbm;
import jdbm.RecordManager;
import jdbm.helper.MRU;
import jdbm.recman.BaseRecordManager;
import jdbm.recman.CacheRecordManager;
import org.apache.directory.server.core.entry.DefaultServerAttribute;
import org.apache.directory.server.core.entry.DefaultServerEntry;
import org.apache.directory.server.core.entry.ServerAttribute;
import org.apache.directory.server.core.entry.ServerEntry;
import org.apache.directory.server.core.entry.ServerEntryUtils;
import org.apache.directory.server.core.entry.ServerStringValue;
import org.apache.directory.server.core.partition.Oid;
import org.apache.directory.server.core.partition.impl.btree.Index;
import org.apache.directory.server.core.partition.impl.btree.IndexAssertion;
import org.apache.directory.server.core.partition.impl.btree.IndexAssertionEnumeration;
import org.apache.directory.server.core.partition.impl.btree.IndexNotFoundException;
import org.apache.directory.server.core.partition.impl.btree.IndexRecord;
import org.apache.directory.server.schema.registries.AttributeTypeRegistry;
import org.apache.directory.server.schema.registries.OidRegistry;
import org.apache.directory.server.schema.registries.Registries;
import org.apache.directory.shared.ldap.constants.SchemaConstants;
import org.apache.directory.shared.ldap.entry.EntryAttribute;
import org.apache.directory.shared.ldap.entry.Modification;
import org.apache.directory.shared.ldap.entry.ModificationOperation;
import org.apache.directory.shared.ldap.entry.Value;
import org.apache.directory.shared.ldap.exception.LdapNameNotFoundException;
import org.apache.directory.shared.ldap.exception.LdapSchemaViolationException;
import org.apache.directory.shared.ldap.message.ResultCodeEnum;
import org.apache.directory.shared.ldap.name.AttributeTypeAndValue;
import org.apache.directory.shared.ldap.name.LdapDN;
import org.apache.directory.shared.ldap.name.Rdn;
import org.apache.directory.shared.ldap.schema.AttributeType;
import org.apache.directory.shared.ldap.util.NamespaceTools;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import javax.naming.NamingEnumeration;
import javax.naming.NamingException;
import java.io.File;
import java.io.IOException;
import java.util.ArrayList;
import java.util.HashMap;
import java.util.HashSet;
import java.util.Iterator;
import java.util.List;
import java.util.Map;
import java.util.Set;
public class JdbmStore
{
/** static logger */
private static final Logger LOG = LoggerFactory.getLogger( JdbmStore.class );
/** The default cache size is set to 10 000 objects */
private static final int DEFAULT_CACHE_SIZE = 10000;
/** the JDBM record manager used by this database */
private RecordManager recMan;
/** the normalized suffix DN of this backend database */
private LdapDN normSuffix;
/** the user provided suffix DN of this backend database */
private LdapDN upSuffix;
/** the working directory to use for files */
private File workingDirectory;
/** the master table storing entries by primary key */
private JdbmMasterTable master;
/** a map of attributeType numeric ids to user userIndices */
private Map<String, JdbmIndex> userIndices = new HashMap<String, JdbmIndex>();
/** a map of attributeType numeric ids to system userIndices */
private Map<String, JdbmIndex> systemIndices = new HashMap<String, JdbmIndex>();
/** true if initialized */
private boolean initialized;
/** true if we sync disks on every write operation */
private boolean isSyncOnWrite = true;
/** the normalized distinguished name index */
private JdbmIndex ndnIdx;
/** the user provided distinguished name index */
private JdbmIndex updnIdx;
/** the attribute existance index */
private JdbmIndex existanceIdx;
/** the parent child relationship index */
private JdbmIndex hierarchyIdx;
/** the one level scope alias index */
private JdbmIndex oneAliasIdx;
/** the subtree scope alias index */
private JdbmIndex subAliasIdx;
/** a system index on aliasedObjectName attribute */
private JdbmIndex aliasIdx;
/** Two static declaration to avoid lookup all over the code */
private static AttributeType OBJECT_CLASS_AT;
private static AttributeType ALIASED_OBJECT_NAME_AT;
/** A pointer on the global registries */
private Registries registries;
/** A pointer on the AT registry */
private AttributeTypeRegistry attributeTypeRegistry;
/** A pointer on the OID registry */
private OidRegistry oidRegistry;
// ------------------------------------------------------------------------
// C O N S T R U C T O R S
// ------------------------------------------------------------------------
/**
* Creates a store based on JDBM B+Trees.
*/
public JdbmStore()
{
}
// -----------------------------------------------------------------------
// C O N F I G U R A T I O N M E T H O D S
// -----------------------------------------------------------------------
private ServerEntry contextEntry;
private String suffixDn;
private boolean enableOptimizer;
private int cacheSize = DEFAULT_CACHE_SIZE;
private String name;
private void protect( String property )
{
if ( initialized )
{
throw new IllegalStateException( "Cannot set jdbm store property " + property + " after initialization." );
}
}
public void setWorkingDirectory( File workingDirectory )
{
protect( "workingDirectory" );
this.workingDirectory = workingDirectory;
}
public File getWorkingDirectory()
{
return workingDirectory;
}
public void setUserIndices( Set<JdbmIndex> userIndices )
{
protect( "userIndices" );
for ( JdbmIndex index : userIndices )
{
this.userIndices.put( index.getAttributeId(), index );
}
}
public Set<JdbmIndex> getUserIndices()
{
return new HashSet<JdbmIndex>( userIndices.values() );
}
public void setContextEntry( ServerEntry contextEntry )
{
protect( "contextEntry" );
this.contextEntry = contextEntry;
}
public ServerEntry getContextEntry()
{
return contextEntry;
}
public void setSuffixDn( String suffixDn )
{
protect( "suffixDn" );
this.suffixDn = suffixDn;
}
public String getSuffixDn()
{
return suffixDn;
}
public void setSyncOnWrite( boolean isSyncOnWrite )
{
protect( "syncOnWrite" );
this.isSyncOnWrite = isSyncOnWrite;
}
public boolean isSyncOnWrite()
{
return isSyncOnWrite;
}
public void setEnableOptimizer( boolean enableOptimizer )
{
protect( "enableOptimizer" );
this.enableOptimizer = enableOptimizer;
}
public boolean isEnableOptimizer()
{
return enableOptimizer;
}
public void setCacheSize( int cacheSize )
{
protect( "cacheSize" );
this.cacheSize = cacheSize;
}
public int getCacheSize()
{
return cacheSize;
}
public void setName( String name )
{
protect( "name" );
this.name = name;
}
public String getName()
{
return name;
}
// -----------------------------------------------------------------------
// E N D C O N F I G U R A T I O N M E T H O D S
// -----------------------------------------------------------------------
/**
* Initialize the JDBM storage system.
*
* @param oidRegistry an OID registry to resolve numeric identifiers from names
* @param attributeTypeRegistry an attributeType specification registry to lookup type specs
* @throws NamingException on failure to create proper database files
*/
public synchronized void init( Registries registries ) throws NamingException
{
this.registries = registries;
this.oidRegistry = registries.getOidRegistry();
this.attributeTypeRegistry = registries.getAttributeTypeRegistry();
OBJECT_CLASS_AT = attributeTypeRegistry.lookup( SchemaConstants.OBJECT_CLASS_AT );
ALIASED_OBJECT_NAME_AT = attributeTypeRegistry.lookup( SchemaConstants.ALIASED_OBJECT_NAME_AT );
this.upSuffix = new LdapDN( suffixDn );
this.normSuffix = LdapDN.normalize( upSuffix, attributeTypeRegistry.getNormalizerMapping() );
workingDirectory.mkdirs();
try
{
// First, check if the file storing the data exists
String path = workingDirectory.getPath() + File.separator + "master";
BaseRecordManager base = new BaseRecordManager( path );
base.disableTransactions();
if ( cacheSize < 0 )
{
cacheSize = DEFAULT_CACHE_SIZE;
if ( LOG.isDebugEnabled() )
{
LOG.debug( "Using the default entry cache size of {} for {} partition", cacheSize, name );
}
}
else
{
if ( LOG.isDebugEnabled() )
{
LOG.debug( "Using the custom configured cache size of {} for {} partition", cacheSize, name );
}
}
// Now, create the entry cache for this partition
recMan = new CacheRecordManager( base, new MRU( cacheSize ) );
}
catch ( IOException e )
{
NamingException ne = new NamingException( "Could not initialize RecordManager" );
ne.setRootCause( e );
throw ne;
}
// Create the master table (the table wcontaining all the entries)
master = new JdbmMasterTable( recMan, registries );
// -------------------------------------------------------------------
// Initializes the user and system indices
// -------------------------------------------------------------------
setupSystemIndices();
setupUserIndices();
contextEntry.getDn().normalize( attributeTypeRegistry.getNormalizerMapping() );
initSuffixEntry3( suffixDn, contextEntry );
// We are done !
initialized = true;
}
private void setupSystemIndices() throws NamingException
{
if ( systemIndices.size() > 0 )
{
HashMap<String, JdbmIndex> tmp = new HashMap<String, JdbmIndex>();
for ( JdbmIndex index : systemIndices.values() )
{
String oid = oidRegistry.getOid( index.getAttributeId() );
tmp.put( oid, index );
index.init( attributeTypeRegistry.lookup( oid ), workingDirectory );
}
systemIndices = tmp;
}
if ( ndnIdx == null )
{
ndnIdx = new JdbmIndex();
ndnIdx.setAttributeId( Oid.NDN );
systemIndices.put( Oid.NDN, ndnIdx );
ndnIdx.init( attributeTypeRegistry.lookup( Oid.NDN ), workingDirectory );
}
if ( updnIdx == null )
{
updnIdx = new JdbmIndex();
updnIdx.setAttributeId( Oid.UPDN );
systemIndices.put( Oid.UPDN, updnIdx );
updnIdx.init( attributeTypeRegistry.lookup( Oid.UPDN ), workingDirectory );
}
if ( existanceIdx == null )
{
existanceIdx = new JdbmIndex();
existanceIdx.setAttributeId( Oid.EXISTANCE );
systemIndices.put( Oid.EXISTANCE, existanceIdx );
existanceIdx.init( attributeTypeRegistry.lookup( Oid.EXISTANCE ), workingDirectory );
}
if ( hierarchyIdx == null )
{
hierarchyIdx = new JdbmIndex();
hierarchyIdx.setAttributeId( Oid.HIERARCHY );
systemIndices.put( Oid.HIERARCHY, hierarchyIdx );
hierarchyIdx.init( attributeTypeRegistry.lookup( Oid.HIERARCHY ), workingDirectory );
}
if ( oneAliasIdx == null )
{
oneAliasIdx = new JdbmIndex();
oneAliasIdx.setAttributeId( Oid.ONEALIAS );
systemIndices.put( Oid.ONEALIAS, oneAliasIdx );
oneAliasIdx.init( attributeTypeRegistry.lookup( Oid.ONEALIAS ), workingDirectory );
}
if ( subAliasIdx == null )
{
subAliasIdx = new JdbmIndex();
subAliasIdx.setAttributeId( Oid.SUBALIAS );
systemIndices.put( Oid.SUBALIAS, subAliasIdx );
subAliasIdx.init( attributeTypeRegistry.lookup( Oid.SUBALIAS ), workingDirectory );
}
if ( aliasIdx == null )
{
aliasIdx = new JdbmIndex();
aliasIdx.setAttributeId( Oid.ALIAS );
systemIndices.put( Oid.ALIAS, aliasIdx );
aliasIdx.init( attributeTypeRegistry.lookup( Oid.ALIAS ), workingDirectory );
}
}
private void setupUserIndices() throws NamingException
{
if ( userIndices != null && userIndices.size() > 0 )
{
HashMap<String, JdbmIndex> tmp = new HashMap<String, JdbmIndex>();
for ( JdbmIndex index : userIndices.values() )
{
String oid = oidRegistry.getOid( index.getAttributeId() );
tmp.put( oid, index );
index.init( attributeTypeRegistry.lookup( oid ), workingDirectory );
}
userIndices = tmp;
}
else
{
userIndices = new HashMap<String, JdbmIndex>();
}
}
/**
* Called last (4th) to check if the suffix entry has been created on disk,
* and if not it is created.
*
* @param suffix the suffix for the store
* @param entry the root entry of the store
* @throws NamingException on failure to add the root entry
*/
protected void initSuffixEntry3( String suffix, ServerEntry entry ) throws NamingException
{
// add entry for context, if it does not exist
ServerEntry suffixOnDisk = getSuffixEntry();
if ( suffixOnDisk == null )
{
LdapDN dn = new LdapDN( suffix );
LdapDN normalizedSuffix = LdapDN.normalize( dn, attributeTypeRegistry.getNormalizerMapping() );
add( normalizedSuffix, entry );
}
}
/**
* Close the parttion : we have to close all the userIndices and the master table.
*/
public synchronized void destroy()
{
LOG.debug( "destroy() called on store for {}", this.suffixDn );
if ( !initialized )
{
return;
}
List<JdbmIndex> array = new ArrayList<JdbmIndex>();
array.addAll( userIndices.values() );
if ( null != ndnIdx )
{
array.add( ndnIdx );
}
if ( null != updnIdx )
{
array.add( updnIdx );
}
if ( null != aliasIdx )
{
array.add( aliasIdx );
}
if ( null != oneAliasIdx )
{
array.add( oneAliasIdx );
}
if ( null != subAliasIdx )
{
array.add( subAliasIdx );
}
if ( null != hierarchyIdx )
{
array.add( hierarchyIdx );
}
if ( null != existanceIdx )
{
array.add( existanceIdx );
}
for ( JdbmIndex index : array )
{
try
{
index.close();
LOG.debug( "Closed {} index for {} partition.", index.getAttributeId(), suffixDn );
}
catch ( Throwable t )
{
LOG.error( "Failed to close an index.", t );
}
}
try
{
master.close();
LOG.debug( "Closed master table for {} partition.", suffixDn );
}
catch ( Throwable t )
{
LOG.error( "Failed to close the master.", t );
}
try
{
recMan.close();
LOG.debug( "Closed record manager for {} partition.", suffixDn );
}
catch ( Throwable t )
{
LOG.error( "Failed to close the record manager", t );
}
initialized = false;
}
/**
* Gets whether the store is initialized.
*
* @return true if the partition store is initialized
*/
public boolean isInitialized()
{
return initialized;
}
/**
* This method is called when the synch thread is waking up, to write
* the modified data.
*
* @throws NamingException on failures to sync to disk
*/
public synchronized void sync() throws NamingException
{
if ( !initialized )
{
return;
}
List<Index> array = new ArrayList<Index>();
array.addAll( userIndices.values() );
array.add( ndnIdx );
array.add( updnIdx );
array.add( aliasIdx );
array.add( oneAliasIdx );
array.add( subAliasIdx );
array.add( hierarchyIdx );
array.add( existanceIdx );
// Sync all user defined userIndices
for ( Index idx : array )
{
idx.sync();
}
master.sync();
try
{
recMan.commit();
}
catch ( Throwable t )
{
throw ( NamingException ) new NamingException( "Failed to commit changes to the record manager." )
.initCause( t );
}
}
// ------------------------------------------------------------------------
// I N D E X M E T H O D S
// ------------------------------------------------------------------------
public void addIndex( JdbmIndex index ) throws NamingException
{
userIndices.put( index.getAttributeId(), index );
}
public JdbmIndex getExistanceIndex()
{
return existanceIdx;
}
public void setExistanceIndex( JdbmIndex index ) throws NamingException
{
protect( "existanceIndex" );
existanceIdx = index;
systemIndices.put( index.getAttributeId(), existanceIdx );
}
public JdbmIndex getHierarchyIndex()
{
return hierarchyIdx;
}
public void setHierarchyIndex( JdbmIndex index ) throws NamingException
{
protect( "hierarchyIndex" );
hierarchyIdx = index;
systemIndices.put( index.getAttributeId(), hierarchyIdx );
}
public JdbmIndex getAliasIndex()
{
return aliasIdx;
}
public void setAliasIndex( JdbmIndex index ) throws NamingException
{
protect( "aliasIndex" );
aliasIdx = index;
systemIndices.put( index.getAttributeId(), aliasIdx );
}
public JdbmIndex getOneAliasIndex()
{
return oneAliasIdx;
}
public void setOneAliasIndex( JdbmIndex index ) throws NamingException
{
protect( "oneAliasIndex" );
oneAliasIdx = index;
systemIndices.put( index.getAttributeId(), oneAliasIdx );
}
public JdbmIndex getSubAliasIndex()
{
return subAliasIdx;
}
public void setSubAliasIndex( JdbmIndex index ) throws NamingException
{
protect( "subAliasIndex" );
subAliasIdx = index;
systemIndices.put( index.getAttributeId(), subAliasIdx );
}
public JdbmIndex getUpdnIndex()
{
return updnIdx;
}
public void setUpdnIndex( JdbmIndex index ) throws NamingException
{
protect( "updnIndex" );
updnIdx = index;
systemIndices.put( index.getAttributeId(), updnIdx );
}
public JdbmIndex getNdnIndex()
{
return ndnIdx;
}
public void setNdnIndex( JdbmIndex index ) throws NamingException
{
protect( "ndnIndex" );
ndnIdx = index;
systemIndices.put( index.getAttributeId(), ndnIdx );
}
public Iterator<String> userIndices()
{
return userIndices.keySet().iterator();
}
public Iterator<String> systemIndices()
{
return systemIndices.keySet().iterator();
}
public boolean hasUserIndexOn( String id ) throws NamingException
{
return userIndices.containsKey( oidRegistry.getOid( id ) );
}
public boolean hasSystemIndexOn( String id ) throws NamingException
{
return systemIndices.containsKey( oidRegistry.getOid( id ) );
}
public JdbmIndex getUserIndex( String id ) throws IndexNotFoundException
{
try
{
id = oidRegistry.getOid( id );
}
catch ( NamingException e )
{
LOG.error( "Failed to identify OID for: " + id, e );
throw new IndexNotFoundException( "Failed to identify OID for: " + id, id, e );
}
if ( userIndices.containsKey( id ) )
{
return userIndices.get( id );
}
else
{
String name;
try
{
name = oidRegistry.getPrimaryName( id );
}
catch ( NamingException e )
{
String msg = "Failed to resolve primary name for " + id + " in user index lookup";
LOG.error( msg, e );
throw new IndexNotFoundException( msg, id, e );
}
throw new IndexNotFoundException( "A user index on attribute " + id + " (" + name + ") does not exist!" );
}
}
public JdbmIndex getSystemIndex( String id ) throws IndexNotFoundException
{
try
{
id = oidRegistry.getOid( id );
}
catch ( NamingException e )
{
LOG.error( "Failed to identify OID for: " + id, e );
throw new IndexNotFoundException( "Failed to identify OID for: " + id, id, e );
}
if ( systemIndices.containsKey( id ) )
{
return systemIndices.get( id );
}
else
{
String name;
try
{
name = oidRegistry.getPrimaryName( id );
}
catch ( NamingException e )
{
String msg = "Failed to resolve primary name for " + id + " in user index lookup";
LOG.error( msg, e );
throw new IndexNotFoundException( msg, id, e );
}
throw new IndexNotFoundException( "A system index on attribute " + id + " (" + name + ") does not exist!" );
}
}
public Long getEntryId( String dn ) throws NamingException
{
return ndnIdx.forwardLookup( dn );
}
public String getEntryDn( Long id ) throws NamingException
{
return ( String ) ndnIdx.reverseLookup( id );
}
public Long getParentId( String dn ) throws NamingException
{
Long childId = ndnIdx.forwardLookup( dn );
return ( Long ) hierarchyIdx.reverseLookup( childId );
}
public Long getParentId( Long childId ) throws NamingException
{
return ( Long ) hierarchyIdx.reverseLookup( childId );
}
public String getEntryUpdn( Long id ) throws NamingException
{
return ( String ) updnIdx.reverseLookup( id );
}
public String getEntryUpdn( String dn ) throws NamingException
{
Long id = ndnIdx.forwardLookup( dn );
return ( String ) updnIdx.reverseLookup( id );
}
public int count() throws NamingException
{
return master.count();
}
/**
* Removes the index entries for an alias before the entry is deleted from
* the master table.
*
* @todo Optimize this by walking the hierarchy index instead of the name
* @param aliasId the id of the alias entry in the master table
* @throws NamingException if we cannot delete the userIndices
*/
private void dropAliasIndices( Long aliasId ) throws NamingException
{
String targetDn = ( String ) aliasIdx.reverseLookup( aliasId );
Long targetId = getEntryId( targetDn );
String aliasDn = getEntryDn( aliasId );
LdapDN ancestorDn = ( LdapDN ) new LdapDN( aliasDn ).getPrefix( 1 );
Long ancestorId = getEntryId( ancestorDn.toString() );
/*
* We cannot just drop all tuples in the one level and subtree userIndices
* linking baseIds to the targetId. If more than one alias refers to
* the target then droping all tuples with a value of targetId would
* make all other aliases to the target inconsistent.
*
* We need to walk up the path of alias ancestors until we reach the
* upSuffix, deleting each ( ancestorId, targetId ) tuple in the
* subtree scope alias. We only need to do this for the direct parent
* of the alias on the one level subtree.
*/
oneAliasIdx.drop( ancestorId, targetId );
subAliasIdx.drop( ancestorId, targetId );
while ( !ancestorDn.equals( normSuffix ) )
{
ancestorDn = ( LdapDN ) ancestorDn.getPrefix( 1 );
ancestorId = getEntryId( ancestorDn.toString() );
subAliasIdx.drop( ancestorId, targetId );
}
// Drops all alias tuples pointing to the id of the alias to be deleted
aliasIdx.drop( aliasId );
}
/**
* Adds userIndices for an aliasEntry to be added to the database while checking
* for constrained alias constructs like alias cycles and chaining.
*
* @param aliasDn normalized distinguished name for the alias entry
* @param aliasTarget the user provided aliased entry dn as a string
* @param aliasId the id of alias entry to add
* @throws NamingException if index addition fails, of the alias is not
* allowed due to chaining or cycle formation.
*/
private void addAliasIndices( Long aliasId, LdapDN aliasDn, String aliasTarget ) throws NamingException
{
LdapDN normalizedAliasTargetDn; // Name value of aliasedObjectName
Long targetId; // Id of the aliasedObjectName
LdapDN ancestorDn; // Name of an alias entry relative
Long ancestorId; // Id of an alias entry relative
// Access aliasedObjectName, normalize it and generate the Name
normalizedAliasTargetDn = new LdapDN( aliasTarget );
normalizedAliasTargetDn.normalize( attributeTypeRegistry.getNormalizerMapping() );
/*
* Check For Cycles
*
* Before wasting time to lookup more values we check using the target
* dn to see if we have the possible formation of an alias cycle. This
* happens when the alias refers back to a target that is also a
* relative of the alias entry. For detection we test if the aliased
* entry Dn starts with the target Dn. If it does then we know the
* aliased target is a relative and we have a perspecitive cycle.
*/
if ( aliasDn.startsWith( normalizedAliasTargetDn ) )
{
if ( aliasDn.equals( normalizedAliasTargetDn ) )
{
throw new NamingException( "[36] aliasDereferencingProblem - " + "attempt to create alias to itself." );
}
throw new NamingException( "[36] aliasDereferencingProblem - "
+ "attempt to create alias with cycle to relative " + aliasTarget
+ " not allowed from descendent alias " + aliasDn );
}
/*
* Check For Aliases External To Naming Context
*
* id may be null but the alias may be to a valid entry in
* another namingContext. Such aliases are not allowed and we
* need to point it out to the user instead of saying the target
* does not exist when it potentially could outside of this upSuffix.
*/
if ( !normalizedAliasTargetDn.startsWith( normSuffix ) )
{
// Complain specifically about aliases to outside naming contexts
throw new NamingException( "[36] aliasDereferencingProblem -"
+ " the alias points to an entry outside of the " + upSuffix.getUpName()
+ " namingContext to an object whose existance cannot be" + " determined." );
}
// L O O K U P T A R G E T I D
targetId = ndnIdx.forwardLookup( normalizedAliasTargetDn.toNormName() );
/*
* Check For Target Existance
*
* We do not allow the creation of inconsistant aliases. Aliases should
* not be broken links. If the target does not exist we start screaming
*/
if ( null == targetId )
{
// Complain about target not existing
throw new NamingException( "[33] aliasProblem - "
+ "the alias when dereferenced would not name a known object "
+ "the aliasedObjectName must be set to a valid existing " + "entry." );
}
/*
* Detect Direct Alias Chain Creation
*
* Rather than resusitate the target to test if it is an alias and fail
* due to chaing creation we use the alias index to determine if the
* target is an alias. Hence if the alias we are about to create points
* to another alias as its target in the aliasedObjectName attribute,
* then we have a situation where an alias chain is being created.
* Alias chaining is not allowed so we throw and exception.
*/
if ( null != aliasIdx.reverseLookup( targetId ) )
{
// Complain about illegal alias chain
throw new NamingException( "[36] aliasDereferencingProblem -"
+ " the alias points to another alias. Alias chaining is" + " not supported by this backend." );
}
// Add the alias to the simple alias index
aliasIdx.add( normalizedAliasTargetDn.getNormName(), aliasId );
/*
* Handle One Level Scope Alias Index
*
* The first relative is special with respect to the one level alias
* index. If the target is not a sibling of the alias then we add the
* index entry maping the parent's id to the aliased target id.
*/
ancestorDn = ( LdapDN ) aliasDn.clone();
ancestorDn.remove( aliasDn.size() - 1 );
ancestorId = getEntryId( ancestorDn.toNormName() );
if ( !NamespaceTools.isSibling( normalizedAliasTargetDn, aliasDn ) )
{
oneAliasIdx.add( ancestorId, targetId );
}
/*
* Handle Sub Level Scope Alias Index
*
* Walk the list of relatives from the parents up to the upSuffix, testing
* to see if the alias' target is a descendant of the relative. If the
* alias target is not a descentant of the relative it extends the scope
* and is added to the sub tree scope alias index. The upSuffix node is
* ignored since everything is under its scope. The first loop
* iteration shall handle the parents.
*/
while ( !ancestorDn.equals( normSuffix ) && null != ancestorId )
{
if ( !NamespaceTools.isDescendant( ancestorDn, normalizedAliasTargetDn ) )
{
subAliasIdx.add( ancestorId, targetId );
}
ancestorDn.remove( ancestorDn.size() - 1 );
ancestorId = getEntryId( ancestorDn.toNormName() );
}
}
public void add( LdapDN normName, ServerEntry entry ) throws NamingException
{
Long id;
Long parentId;
id = master.getNextId();
//
// Suffix entry cannot have a parent since it is the root so it is
// capped off using the zero value which no entry can have since
// entry sequences start at 1.
//
LdapDN parentDn = null;
if ( normName.equals( normSuffix ) )
{
parentId = 0L;
}
else
{
parentDn = ( LdapDN ) normName.clone();
parentDn.remove( parentDn.size() - 1 );
parentId = getEntryId( parentDn.toString() );
}
// don't keep going if we cannot find the parent Id
if ( parentId == null )
{
throw new LdapNameNotFoundException( "Id for parent '" + parentDn + "' not found!" );
}
EntryAttribute objectClass = entry.get( OBJECT_CLASS_AT );
if ( objectClass == null )
{
String msg = "Entry " + normName.getUpName() + " contains no objectClass attribute: " + entry;
throw new LdapSchemaViolationException( msg, ResultCodeEnum.OBJECT_CLASS_VIOLATION );
}
// Start adding the system userIndices
// Why bother doing a lookup if this is not an alias.
if ( objectClass.contains( SchemaConstants.ALIAS_OC ) )
{
EntryAttribute aliasAttr = entry.get( ALIASED_OBJECT_NAME_AT );
addAliasIndices( id, normName, aliasAttr.getString() );
}
if ( !Character.isDigit( normName.toNormName().charAt( 0 ) ) )
{
throw new IllegalStateException( "Not a normalized name: " + normName.toNormName() );
}
ndnIdx.add( normName.toNormName(), id );
updnIdx.add( normName.getUpName(), id );
hierarchyIdx.add( parentId, id );
// Now work on the user defined userIndices
for ( EntryAttribute attribute : entry )
{
String attributeOid = ( ( ServerAttribute ) attribute ).getAttributeType().getOid();
if ( hasUserIndexOn( attributeOid ) )
{
Index idx = getUserIndex( attributeOid );
// here lookup by attributeId is ok since we got attributeId from
// the entry via the enumeration - it's in there as is for sure
for ( Value<?> value : attribute )
{
idx.add( value.get(), id );
}
// Adds only those attributes that are indexed
existanceIdx.add( attributeOid, id );
}
}
master.put( entry, id );
if ( isSyncOnWrite )
{
sync();
}
}
public ServerEntry lookup( Long id ) throws NamingException
{
return master.get( id );
}
public void delete( Long id ) throws NamingException
{
ServerEntry entry = lookup( id );
Long parentId = getParentId( id );
EntryAttribute objectClass = entry.get( OBJECT_CLASS_AT );
if ( objectClass.contains( SchemaConstants.ALIAS_OC ) )
{
dropAliasIndices( id );
}
ndnIdx.drop( id );
updnIdx.drop( id );
hierarchyIdx.drop( id );
// Remove parent's reference to entry only if entry is not the upSuffix
if ( !parentId.equals( 0L ) )
{
hierarchyIdx.drop( parentId, id );
}
for ( EntryAttribute attribute : entry )
{
String attributeOid = ( ( ServerAttribute ) attribute ).getAttributeType().getOid();
if ( hasUserIndexOn( attributeOid ) )
{
Index index = getUserIndex( attributeOid );
// here lookup by attributeId is ok since we got attributeId from
// the entry via the enumeration - it's in there as is for sure
for ( Value<?> value : attribute )
{
index.drop( value, id );
}
existanceIdx.drop( attributeOid, id );
}
}
master.delete( id );
if ( isSyncOnWrite )
{
sync();
}
}
public NamingEnumeration<?> list( Long id ) throws NamingException
{
return hierarchyIdx.listIndices( id );
}
public int getChildCount( Long id ) throws NamingException
{
return hierarchyIdx.count( id );
}
public LdapDN getSuffix()
{
return normSuffix;
}
public LdapDN getUpSuffix()
{
return upSuffix;
}
public ServerEntry getSuffixEntry() throws NamingException
{
Long id = getEntryId( normSuffix.toNormName() );
if ( null == id )
{
return null;
}
return lookup( id );
}
public void setProperty( String propertyName, String propertyValue ) throws NamingException
{
master.setProperty( propertyName, propertyValue );
}
public String getProperty( String propertyName ) throws NamingException
{
return master.getProperty( propertyName );
}
public ServerEntry getIndices( Long id ) throws NamingException
{
ServerEntry attributes = new DefaultServerEntry( registries );
// Get the distinguishedName to id mapping
attributes.put( "_nDn", getEntryDn( id ) );
attributes.put( "_upDn", getEntryUpdn( id ) );
attributes.put( "_parent", getParentId( id ).toString() );
// Get all standard index attribute to value mappings
for ( Index index : this.userIndices.values() )
{
NamingEnumeration<IndexRecord> list = index.listReverseIndices( id );
while ( list.hasMore() )
{
IndexRecord rec = list.next();
Object val = rec.getIndexKey();
String attrId = index.getAttribute().getName();
EntryAttribute attr = attributes.get( attrId );
if ( attr == null )
{
attr = new DefaultServerAttribute( attributeTypeRegistry.lookup( attrId ) );
}
if ( val instanceof String )
{
attr.add( ( String ) val );
}
else
{
attr.add( ( byte[] ) val );
}
attributes.put( attr );
}
}
// Get all existance mappings for this id creating a special key
// that looks like so 'existance[attribute]' and the value is set to id
NamingEnumeration<IndexRecord> list = existanceIdx.listReverseIndices( id );
StringBuffer val = new StringBuffer();
while ( list.hasMore() )
{
IndexRecord rec = list.next();
val.append( "_existance[" );
val.append( rec.getIndexKey() );
val.append( "]" );
String valStr = val.toString();
EntryAttribute attr = attributes.get( valStr );
if ( attr == null )
{
attr = new DefaultServerAttribute( attributeTypeRegistry.lookup( valStr ) );
}
Object idRec = rec.getEntryId();
if ( idRec instanceof String )
{
attr.add( ( String ) idRec );
}
else
{
attr.add( ( byte[] ) idRec );
}
attributes.put( attr );
val.setLength( 0 );
}
// Get all parent child mappings for this entry as the parent using the
// key 'child' with many entries following it.
list = hierarchyIdx.listIndices( id );
EntryAttribute childAttr = new DefaultServerAttribute( attributeTypeRegistry.lookup( "_child" ) );
attributes.put( childAttr );
while ( list.hasMore() )
{
IndexRecord rec = ( IndexRecord ) list.next();
Object idRec = rec.getEntryId();
if ( idRec instanceof String )
{
childAttr.add( ( String ) idRec );
}
else
{
childAttr.add( ( byte[] ) idRec );
}
}
return attributes;
}
/**
* Adds a set of attribute values while affecting the appropriate userIndices.
* The entry is not persisted: it is only changed in anticipation for a put
* into the master table.
*
* @param id the primary key of the entry
* @param entry the entry to alter
* @param mods the attribute and values to add
* @throws NamingException if index alteration or attribute addition
* fails.
*/
private void add( Long id, ServerEntry entry, EntryAttribute mods ) throws NamingException
{
String modsOid = oidRegistry.getOid( mods.getId() );
if ( hasUserIndexOn( modsOid ) )
{
Index idx = getUserIndex( modsOid );
idx.add( ServerEntryUtils.toAttributeImpl( mods ), id );
// If the attr didn't exist for this id add it to existance index
if ( !existanceIdx.hasValue( modsOid, id ) )
{
existanceIdx.add( modsOid, id );
}
}
// add all the values in mods to the same attribute in the entry
AttributeType type = attributeTypeRegistry.lookup( modsOid );
for ( Value<?> value : mods )
{
entry.add( type, value );
}
if ( modsOid.equals( oidRegistry.getOid( SchemaConstants.ALIASED_OBJECT_NAME_AT ) ) )
{
String ndnStr = ( String ) ndnIdx.reverseLookup( id );
addAliasIndices( id, new LdapDN( ndnStr ), mods.getString() );
}
}
/**
* Completely removes the set of values for an attribute having the values
* supplied while affecting the appropriate userIndices. The entry is not
* persisted: it is only changed in anticipation for a put into the master
* table. Note that an empty attribute w/o values will remove all the
* values within the entry where as an attribute w/ values will remove those
* attribute values it contains.
*
* @param id the primary key of the entry
* @param entry the entry to alter
* @param mods the attribute and its values to delete
* @throws NamingException if index alteration or attribute modification
* fails.
*/
private void remove( Long id, ServerEntry entry, EntryAttribute mods ) throws NamingException
{
String modsOid = oidRegistry.getOid( mods.getId() );
if ( hasUserIndexOn( modsOid ) )
{
Index idx = getUserIndex( modsOid );
idx.drop( ServerEntryUtils.toAttributeImpl( mods ), id );
/*
* If no attribute values exist for this entryId in the index then
* we remove the existance index entry for the removed attribute.
*/
if ( null == idx.reverseLookup( id ) )
{
existanceIdx.drop( modsOid, id );
}
}
AttributeType attrType = attributeTypeRegistry.lookup( modsOid );
/*
* If there are no attribute values in the modifications then this
* implies the compelete removal of the attribute from the entry. Else
* we remove individual attribute values from the entry in mods one
* at a time.
*/
if ( mods.size() == 0 )
{
entry.removeAttributes( attrType );
}
else
{
EntryAttribute entryAttr = entry.get( attrType );
for ( Value<?> value : mods )
{
if ( value instanceof ServerStringValue )
{
entryAttr.remove( ( String ) value.get() );
}
else
{
entryAttr.remove( ( byte[] ) value.get() );
}
}
// if nothing is left just remove empty attribute
if ( entryAttr.size() == 0 )
{
entry.removeAttributes( entryAttr.getId() );
}
}
// Aliases->single valued comp/partial attr removal is not relevant here
if ( modsOid.equals( oidRegistry.getOid( SchemaConstants.ALIASED_OBJECT_NAME_AT ) ) )
{
dropAliasIndices( id );
}
}
/**
* Completely replaces the existing set of values for an attribute with the
* modified values supplied affecting the appropriate userIndices. The entry
* is not persisted: it is only changed in anticipation for a put into the
* master table.
*
* @param id the primary key of the entry
* @param entry the entry to alter
* @param mods the replacement attribute and values
* @throws NamingException if index alteration or attribute modification
* fails.
*/
private void replace( Long id, ServerEntry entry, EntryAttribute mods ) throws NamingException
{
String modsOid = oidRegistry.getOid( mods.getId() );
if ( hasUserIndexOn( modsOid ) )
{
Index idx = getUserIndex( modsOid );
// Drop all existing attribute value index entries and add new ones
idx.drop( id );
idx.add( ServerEntryUtils.toAttributeImpl( mods ), id );
/*
* If no attribute values exist for this entryId in the index then
* we remove the existance index entry for the removed attribute.
*/
if ( null == idx.reverseLookup( id ) )
{
existanceIdx.drop( modsOid, id );
}
}
String aliasAttributeOid = oidRegistry.getOid( SchemaConstants.ALIASED_OBJECT_NAME_AT );
if ( modsOid.equals( aliasAttributeOid ) )
{
dropAliasIndices( id );
}
// replaces old attributes with new modified ones if they exist
if ( mods.size() > 0 )
{
entry.put( mods );
}
else
// removes old attributes if new replacements do not exist
{
entry.remove( mods );
}
if ( modsOid.equals( aliasAttributeOid ) && mods.size() > 0 )
{
String ndnStr = ( String ) ndnIdx.reverseLookup( id );
addAliasIndices( id, new LdapDN( ndnStr ), mods.getString() );
}
}
public void modify( LdapDN dn, ModificationOperation modOp, ServerEntry mods ) throws NamingException
{
NamingEnumeration<String> attrs;
Long id = getEntryId( dn.toString() );
ServerEntry entry = master.get( id );
for ( AttributeType attributeType : mods.getAttributeTypes() )
{
EntryAttribute attr = mods.get( attributeType );
switch ( modOp )
{
case ADD_ATTRIBUTE:
add( id, entry, attr );
break;
case REMOVE_ATTRIBUTE:
remove( id, entry, attr );
break;
case REPLACE_ATTRIBUTE:
replace( id, entry, attr );
break;
default:
throw new NamingException( "Unidentified modification operation" );
}
}
master.put( entry, id );
if ( isSyncOnWrite )
{
sync();
}
}
public void modify( LdapDN dn, List<Modification> mods ) throws NamingException
{
Long id = getEntryId( dn.toString() );
ServerEntry entry = master.get( id );
for ( Modification mod : mods )
{
ServerAttribute attrMods = ( ServerAttribute ) mod.getAttribute();
switch ( mod.getOperation() )
{
case ADD_ATTRIBUTE:
add( id, entry, attrMods );
break;
case REMOVE_ATTRIBUTE:
remove( id, entry, attrMods );
break;
case REPLACE_ATTRIBUTE:
replace( id, entry, attrMods );
break;
default:
throw new NamingException( "Unidentified modification operation" );
}
}
master.put( entry, id );
if ( isSyncOnWrite )
{
sync();
}
}
/**
* Changes the relative distinguished name of an entry specified by a
* distinguished name with the optional removal of the old Rdn attribute
* value from the entry. Name changes propagate down as dn changes to the
* descendants of the entry where the Rdn changed.
*
* An Rdn change operation does not change parent child relationships. It
* merely propagates a name change at a point in the DIT where the Rdn is
* changed. The change propagates down the subtree rooted at the
* distinguished name specified.
*
* @param dn the normalized distinguished name of the entry to alter
* @param newRdn the new Rdn to set
* @param deleteOldRdn whether or not to remove the old Rdn attr/val
* @throws NamingException if there are any errors propagating the name
* changes.
*/
public void rename( LdapDN dn, Rdn newRdn, boolean deleteOldRdn ) throws NamingException
{
Long id = getEntryId( dn.getNormName() );
ServerEntry entry = lookup( id );
LdapDN updn = entry.getDn();
/*
* H A N D L E N E W R D N
* ====================================================================
* Add the new Rdn attribute to the entry. If an index exists on the
* new Rdn attribute we add the index for this attribute value pair.
* Also we make sure that the existance index shows the existance of the
* new Rdn attribute within this entry.
*/
for ( AttributeTypeAndValue newAtav : newRdn )
{
String newNormType = newAtav.getNormType();
String newNormValue = ( String ) newAtav.getNormValue();
AttributeType newRdnAttrType = attributeTypeRegistry.lookup( newNormType );
entry.add( newRdnAttrType, ( String ) newAtav.getUpValue() );
if ( hasUserIndexOn( newNormType ) )
{
Index idx = getUserIndex( newNormType );
idx.add( newNormValue, id );
// Make sure the altered entry shows the existance of the new attrib
if ( !existanceIdx.hasValue( newNormType, id ) )
{
existanceIdx.add( newNormType, id );
}
}
}
/*
* H A N D L E O L D R D N
* ====================================================================
* If the old Rdn is to be removed we need to get the attribute and
* value for it. Keep in mind the old Rdn need not be based on the
* same attr as the new one. We remove the Rdn value from the entry
* and remove the value/id tuple from the index on the old Rdn attr
* if any. We also test if the delete of the old Rdn index tuple
* removed all the attribute values of the old Rdn using a reverse
* lookup. If so that means we blew away the last value of the old
* Rdn attribute. In this case we need to remove the attrName/id
* tuple from the existance index.
*
* We only remove an ATAV of the old Rdn if it is not included in the
* new Rdn.
*/
if ( deleteOldRdn )
{
Rdn oldRdn = updn.getRdn();
for ( AttributeTypeAndValue oldAtav : oldRdn )
{
// check if the new ATAV is part of the old Rdn
// if that is the case we do not remove the ATAV
boolean mustRemove = true;
for ( AttributeTypeAndValue newAtav : newRdn )
{
if ( oldAtav.equals( newAtav ) )
{
mustRemove = false;
break;
}
}
if ( mustRemove )
{
String oldNormType = oldAtav.getNormType();
String oldNormValue = ( String ) oldAtav.getNormValue();
AttributeType oldRdnAttrType = attributeTypeRegistry.lookup( oldNormType );
entry.remove( oldRdnAttrType, oldNormValue );
if ( hasUserIndexOn( oldNormType ) )
{
Index idx = getUserIndex( oldNormType );
idx.drop( oldNormValue, id );
/*
* If there is no value for id in this index due to our
* drop above we remove the oldRdnAttr from the existance idx
*/
if ( null == idx.reverseLookup( id ) )
{
existanceIdx.drop( oldNormType, id );
}
}
}
}
}
/*
* H A N D L E D N C H A N G E
* ====================================================================
* 1) Build the new user defined distinguished name
* - clone / copy old updn
* - remove old upRdn from copy
* - add the new upRdn to the copy
* 2) Make call to recursive modifyDn method to change the names of the
* entry and its descendants
*/
LdapDN newUpdn = ( LdapDN ) updn.clone(); // copy da old updn
newUpdn.remove( newUpdn.size() - 1 ); // remove old upRdn
newUpdn.add( newRdn.getUpName() ); // add da new upRdn
// gotta normalize cuz this thang is cloned and not normalized by default
newUpdn.normalize( attributeTypeRegistry.getNormalizerMapping() );
modifyDn( id, newUpdn, false ); // propagate dn changes
// Update the current entry
entry.setDn( newUpdn );
master.put( entry, id );
if ( isSyncOnWrite )
{
sync();
}
}
/*
* The move operation severs a child from a parent creating a new parent
* child relationship. As a consequence the relationships between the
* old ancestors of the child and its descendants change. A descendant is
*
*/
/**
* Recursively modifies the distinguished name of an entry and the names of
* its descendants calling itself in the recursion.
*
* @param id the primary key of the entry
* @param updn User provided distinguished name to set as the new DN
* @param isMove whether or not the name change is due to a move operation
* which affects alias userIndices.
* @throws NamingException if something goes wrong
*/
private void modifyDn( Long id, LdapDN updn, boolean isMove ) throws NamingException
{
String aliasTarget;
// Now we can handle the appropriate name userIndices for all cases
ndnIdx.drop( id );
if ( !updn.isNormalized() )
{
updn.normalize( attributeTypeRegistry.getNormalizerMapping() );
}
ndnIdx.add( ndnIdx.getNormalized( updn.toNormName() ), id );
updnIdx.drop( id );
updnIdx.add( updn.getUpName(), id );
/*
* Read Alias Index Tuples
*
* If this is a name change due to a move operation then the one and
* subtree userIndices for aliases were purged before the aliases were
* moved. Now we must add them for each alias entry we have moved.
*
* aliasTarget is used as a marker to tell us if we're moving an
* alias. If it is null then the moved entry is not an alias.
*/
if ( isMove )
{
aliasTarget = ( String ) aliasIdx.reverseLookup( id );
if ( null != aliasTarget )
{
addAliasIndices( id, new LdapDN( getEntryDn( id ) ), aliasTarget );
}
}
NamingEnumeration children = list( id );
while ( children.hasMore() )
{
// Get the child and its id
IndexRecord rec = ( IndexRecord ) children.next();
Long childId = ( Long ) rec.getEntryId();
/*
* Calculate the Dn for the child's new name by copying the parents
* new name and adding the child's old upRdn to new name as its Rdn
*/
LdapDN childUpdn = ( LdapDN ) updn.clone();
LdapDN oldUpdn = new LdapDN( getEntryUpdn( childId ) );
String rdn = oldUpdn.get( oldUpdn.size() - 1 );
LdapDN rdnDN = new LdapDN( rdn );
rdnDN.normalize( attributeTypeRegistry.getNormalizerMapping() );
childUpdn.add( rdnDN.getRdn() );
// Modify the child
ServerEntry entry = lookup( childId );
entry.setDn( childUpdn );
master.put( childId, entry );
// Recursively change the names of the children below
modifyDn( childId, childUpdn, isMove );
}
}
public void move( LdapDN oldChildDn, LdapDN newParentDn, Rdn newRdn, boolean deleteOldRdn ) throws NamingException
{
Long childId = getEntryId( oldChildDn.toString() );
rename( oldChildDn, newRdn, deleteOldRdn );
move( oldChildDn, childId, newParentDn );
if ( isSyncOnWrite )
{
sync();
}
}
public void move( LdapDN oldChildDn, LdapDN newParentDn ) throws NamingException
{
Long childId = getEntryId( oldChildDn.toString() );
move( oldChildDn, childId, newParentDn );
if ( isSyncOnWrite )
{
sync();
}
}
/**
* Moves an entry under a new parent. The operation causes a shift in the
* parent child relationships between the old parent, new parent and the
* child moved. All other descendant entries under the child never change
* their direct parent child relationships. Hence after the parent child
* relationship changes are broken at the old parent and set at the new
* parent a modifyDn operation is conducted to handle name changes
* propagating down through the moved child and its descendants.
*
* @param oldChildDn the normalized dn of the child to be moved
* @param childId the id of the child being moved
* @param newParentDn the normalized dn of the new parent for the child
* @throws NamingException if something goes wrong
*/
private void move( LdapDN oldChildDn, Long childId, LdapDN newParentDn ) throws NamingException
{
// Get the child and the new parent to be entries and Ids
Long newParentId = getEntryId( newParentDn.toString() );
Long oldParentId = getParentId( childId );
/*
* All aliases including and below oldChildDn, will be affected by
* the move operation with respect to one and subtree userIndices since
* their relationship to ancestors above oldChildDn will be
* destroyed. For each alias below and including oldChildDn we will
* drop the index tuples mapping ancestor ids above oldChildDn to the
* respective target ids of the aliases.
*/
dropMovedAliasIndices( oldChildDn );
/*
* Drop the old parent child relationship and add the new one
* Set the new parent id for the child replacing the old parent id
*/
hierarchyIdx.drop( oldParentId, childId );
hierarchyIdx.add( newParentId, childId );
/*
* Build the new user provided DN (updn) for the child using the child's
* user provided RDN & the new parent's UPDN. Basically add the child's
* UpRdn String to the tail of the new parent's Updn Name.
*/
LdapDN childUpdn = new LdapDN( getEntryUpdn( childId ) );
String childRdn = childUpdn.get( childUpdn.size() - 1 );
LdapDN newUpdn = new LdapDN( getEntryUpdn( newParentId ) );
newUpdn.add( newUpdn.size(), childRdn );
// Call the modifyDn operation with the new updn
modifyDn( childId, newUpdn, true );
}
/**
* For all aliases including and under the moved base, this method removes
* one and subtree alias index tuples for old ancestors above the moved base
* that will no longer be ancestors after the move.
*
* @param movedBase the base at which the move occured - the moved node
* @throws NamingException if system userIndices fail
*/
private void dropMovedAliasIndices( final LdapDN movedBase ) throws NamingException
{
// Find all the aliases from movedBase down
IndexAssertion isBaseDescendant = new IndexAssertion()
{
public boolean assertCandidate( IndexRecord rec ) throws NamingException
{
String dn = getEntryDn( ( Long ) rec.getEntryId() );
return dn.endsWith( movedBase.toString() );
}
};
Long movedBaseId = getEntryId( movedBase.toString() );
if ( aliasIdx.reverseLookup( movedBaseId ) != null )
{
dropAliasIndices( movedBaseId, movedBase );
}
NamingEnumeration<IndexRecord> aliases = new IndexAssertionEnumeration( aliasIdx.listIndices( movedBase
.toString(), true ), isBaseDescendant );
while ( aliases.hasMore() )
{
IndexRecord entry = aliases.next();
dropAliasIndices( ( Long ) entry.getEntryId(), movedBase );
}
}
/**
* For the alias id all ancestor one and subtree alias tuples are moved
* above the moved base.
*
* @param aliasId the id of the alias
* @param movedBase the base where the move occured
* @throws NamingException if userIndices fail
*/
private void dropAliasIndices( Long aliasId, LdapDN movedBase ) throws NamingException
{
String targetDn = ( String ) aliasIdx.reverseLookup( aliasId );
Long targetId = getEntryId( targetDn );
String aliasDn = getEntryDn( aliasId );
/*
* Start droping index tuples with the first ancestor right above the
* moved base. This is the first ancestor effected by the move.
*/
LdapDN ancestorDn = ( LdapDN ) movedBase.getPrefix( 1 );
Long ancestorId = getEntryId( ancestorDn.toString() );
/*
* We cannot just drop all tuples in the one level and subtree userIndices
* linking baseIds to the targetId. If more than one alias refers to
* the target then droping all tuples with a value of targetId would
* make all other aliases to the target inconsistent.
*
* We need to walk up the path of alias ancestors right above the moved
* base until we reach the upSuffix, deleting each ( ancestorId,
* targetId ) tuple in the subtree scope alias. We only need to do
* this for the direct parent of the alias on the one level subtree if
* the moved base is the alias.
*/
if ( aliasDn.equals( movedBase.toString() ) )
{
oneAliasIdx.drop( ancestorId, targetId );
}
subAliasIdx.drop( ancestorId, targetId );
while ( !ancestorDn.equals( upSuffix ) )
{
ancestorDn = ( LdapDN ) ancestorDn.getPrefix( 1 );
ancestorId = getEntryId( ancestorDn.toString() );
subAliasIdx.drop( ancestorId, targetId );
}
}
public void initRegistries( Registries registries )
{
this.attributeTypeRegistry = registries.getAttributeTypeRegistry();
this.oidRegistry = registries.getOidRegistry();
}
}