]> git.sur5r.net Git - openldap/blob - servers/slapd/back-monitor/init.c
ITS#3353 consolidate slapd globals into a single struct
[openldap] / servers / slapd / back-monitor / init.c
1 /* init.c - initialize monitor backend */
2 /* $OpenLDAP$ */
3 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
4  *
5  * Copyright 2001-2004 The OpenLDAP Foundation.
6  * Portions Copyright 2001-2003 Pierangelo Masarati.
7  * All rights reserved.
8  *
9  * Redistribution and use in source and binary forms, with or without
10  * modification, are permitted only as authorized by the OpenLDAP
11  * Public License.
12  *
13  * A copy of this license is available in file LICENSE in the
14  * top-level directory of the distribution or, alternatively, at
15  * <http://www.OpenLDAP.org/license.html>.
16  */
17 /* ACKNOWLEDGEMENTS:
18  * This work was initially developed by Pierangelo Masarati for inclusion
19  * in OpenLDAP Software.
20  */
21
22 #include "portable.h"
23
24 #include <stdio.h>
25 #include <ac/string.h>
26
27 #include <lutil.h>
28 #include "slap.h"
29 #include "lber_pvt.h"
30 #include "back-monitor.h"
31
32 #undef INTEGRATE_CORE_SCHEMA
33
34 /*
35  * used by many functions to add description to entries
36  */
37 BackendDB *be_monitor = NULL;
38
39 /*
40  * subsystem data
41  */
42 struct monitorsubsys monitor_subsys[] = {
43         { 
44                 SLAPD_MONITOR_BACKEND_NAME, 
45                 BER_BVNULL, BER_BVNULL, BER_BVNULL,
46                 MONITOR_F_PERSISTENT_CH,
47                 monitor_subsys_backend_init,
48                 NULL,   /* update */
49                 NULL,   /* create */
50                 NULL    /* modify */
51         }, { 
52                 SLAPD_MONITOR_CONN_NAME,
53                 BER_BVNULL, BER_BVNULL, BER_BVNULL,
54                 MONITOR_F_VOLATILE_CH,
55                 monitor_subsys_conn_init,
56                 monitor_subsys_conn_update,
57                 monitor_subsys_conn_create,
58                 NULL    /* modify */
59         }, { 
60                 SLAPD_MONITOR_DATABASE_NAME,    
61                 BER_BVNULL, BER_BVNULL, BER_BVNULL,
62                 MONITOR_F_PERSISTENT_CH,
63                 monitor_subsys_database_init,
64                 NULL,   /* update */
65                 NULL,   /* create */
66                 monitor_subsys_database_modify
67         }, { 
68                 SLAPD_MONITOR_LISTENER_NAME,    
69                 BER_BVNULL, BER_BVNULL, BER_BVNULL,
70                 MONITOR_F_PERSISTENT_CH,
71                 monitor_subsys_listener_init,
72                 NULL,   /* update */
73                 NULL,   /* create */
74                 NULL    /* modify */
75         }, { 
76                 SLAPD_MONITOR_LOG_NAME,
77                 BER_BVNULL, BER_BVNULL, BER_BVNULL,
78                 MONITOR_F_NONE,
79                 monitor_subsys_log_init,
80                 NULL,   /* update */
81                 NULL,   /* create */
82                 monitor_subsys_log_modify
83         }, { 
84                 SLAPD_MONITOR_OPS_NAME,
85                 BER_BVNULL, BER_BVNULL, BER_BVNULL,
86                 MONITOR_F_PERSISTENT_CH,
87                 monitor_subsys_ops_init,
88                 monitor_subsys_ops_update,
89                 NULL,   /* create */
90                 NULL,   /* modify */
91         }, { 
92                 SLAPD_MONITOR_OVERLAY_NAME,
93                 BER_BVNULL, BER_BVNULL, BER_BVNULL,
94                 MONITOR_F_PERSISTENT_CH,
95                 monitor_subsys_overlay_init,
96                 NULL,   /* update */
97                 NULL,   /* create */
98                 NULL,   /* modify */
99         }, { 
100                 SLAPD_MONITOR_SASL_NAME,        
101                 BER_BVNULL, BER_BVNULL, BER_BVNULL,
102                 MONITOR_F_NONE,
103                 NULL,   /* init */
104                 NULL,   /* update */
105                 NULL,   /* create */
106                 NULL    /* modify */
107         }, { 
108                 SLAPD_MONITOR_SENT_NAME,
109                 BER_BVNULL, BER_BVNULL, BER_BVNULL,
110                 MONITOR_F_PERSISTENT_CH,
111                 monitor_subsys_sent_init,
112                 monitor_subsys_sent_update,
113                 NULL,   /* create */
114                 NULL,   /* modify */
115         }, { 
116                 SLAPD_MONITOR_THREAD_NAME,      
117                 BER_BVNULL, BER_BVNULL, BER_BVNULL,
118                 MONITOR_F_PERSISTENT_CH,
119                 monitor_subsys_thread_init,
120                 monitor_subsys_thread_update,
121                 NULL,   /* create */
122                 NULL    /* modify */
123         }, { 
124                 SLAPD_MONITOR_TIME_NAME,
125                 BER_BVNULL, BER_BVNULL, BER_BVNULL,
126                 MONITOR_F_PERSISTENT_CH,
127                 monitor_subsys_time_init,
128                 monitor_subsys_time_update,
129                 NULL,   /* create */
130                 NULL,   /* modify */
131         }, { 
132                 SLAPD_MONITOR_TLS_NAME,
133                 BER_BVNULL, BER_BVNULL, BER_BVNULL,
134                 MONITOR_F_NONE,
135                 NULL,   /* init */
136                 NULL,   /* update */
137                 NULL,   /* create */
138                 NULL    /* modify */
139         }, { 
140                 SLAPD_MONITOR_RWW_NAME,
141                 BER_BVNULL, BER_BVNULL, BER_BVNULL,
142                 MONITOR_F_PERSISTENT_CH,
143                 monitor_subsys_rww_init,
144                 monitor_subsys_rww_update,
145                 NULL,   /* create */
146                 NULL    /* modify */
147         }, { NULL }
148 };
149
150 #if SLAPD_MONITOR == SLAPD_MOD_DYNAMIC
151
152 int
153 init_module( int argc, char *argv[] )
154 {
155         BackendInfo bi;
156
157         memset( &bi, '\0', sizeof(bi) );
158         bi.bi_type = "monitor";
159         bi.bi_init = monitor_back_initialize;
160         backend_add( &bi );
161         return 0;
162 }
163
164 #endif /* SLAPD_MONITOR */
165
166 int
167 monitor_back_initialize(
168         BackendInfo     *bi
169 )
170 {
171         static char *controls[] = {
172                 LDAP_CONTROL_MANAGEDSAIT,
173                 LDAP_CONTROL_VALUESRETURNFILTER,
174                 NULL
175         };
176
177         bi->bi_controls = controls;
178
179         bi->bi_init = 0;
180         bi->bi_open = 0;
181         bi->bi_config = monitor_back_config;
182         bi->bi_close = 0;
183         bi->bi_destroy = 0;
184
185         bi->bi_db_init = monitor_back_db_init;
186         bi->bi_db_config = monitor_back_db_config;
187         bi->bi_db_open = monitor_back_db_open;
188         bi->bi_db_close = 0;
189         bi->bi_db_destroy = monitor_back_db_destroy;
190
191         bi->bi_op_bind = monitor_back_bind;
192         bi->bi_op_unbind = 0;
193         bi->bi_op_search = monitor_back_search;
194         bi->bi_op_compare = monitor_back_compare;
195         bi->bi_op_modify = monitor_back_modify;
196         bi->bi_op_modrdn = 0;
197         bi->bi_op_add = 0;
198         bi->bi_op_delete = 0;
199         bi->bi_op_abandon = 0;
200
201         bi->bi_extended = 0;
202
203         bi->bi_entry_release_rw = 0;
204         bi->bi_chk_referrals = 0;
205         bi->bi_operational = monitor_back_operational;
206
207         /*
208          * hooks for slap tools
209          */
210         bi->bi_tool_entry_open = 0;
211         bi->bi_tool_entry_close = 0;
212         bi->bi_tool_entry_first = 0;
213         bi->bi_tool_entry_next = 0;
214         bi->bi_tool_entry_get = 0;
215         bi->bi_tool_entry_put = 0;
216         bi->bi_tool_entry_reindex = 0;
217         bi->bi_tool_sync = 0;
218         bi->bi_tool_dn2id_get = 0;
219         bi->bi_tool_id2entry_get = 0;
220         bi->bi_tool_entry_modify = 0;
221
222         bi->bi_connection_init = 0;
223         bi->bi_connection_destroy = 0;
224
225         return 0;
226 }
227
228 int
229 monitor_back_db_init(
230         BackendDB       *be
231 )
232 {
233         struct monitorinfo      *mi;
234         int                     i, rc;
235         struct berval           dn, ndn;
236         struct berval           bv;
237         const char              *text;
238
239         struct m_s {
240                 char    *name;
241                 char    *schema;
242                 slap_mask_t flags;
243                 int     offset;
244         } moc[] = {
245                 { "monitor", "( 1.3.6.1.4.1.4203.666.3.2 "
246                         "NAME 'monitor' "
247                         "DESC 'OpenLDAP system monitoring' "
248                         "SUP top STRUCTURAL "
249                         "MUST cn "
250                         "MAY ( "
251                                 "description "
252                                 "$ l "
253 #if 0   /* temporarily disabled */
254                                 "$ st "
255                                 "$ street "
256                                 "$ postalAddress "
257                                 "$ postalCode "
258 #endif
259                                 "$ seeAlso "
260                                 "$ labeledURI "
261                                 "$ monitoredInfo "
262                                 "$ managedInfo "
263                                 "$ monitorOverlay "
264                         ") )", SLAP_OC_OPERATIONAL|SLAP_OC_HIDE,
265                         offsetof(struct monitorinfo, mi_oc_monitor) },
266                 { "monitorServer", "( 1.3.6.1.4.1.4203.666.3.7 "
267                         "NAME 'monitorServer' "
268                         "DESC 'Server monitoring root entry' "
269                         "SUP monitor STRUCTURAL )", SLAP_OC_OPERATIONAL|SLAP_OC_HIDE,
270                         offsetof(struct monitorinfo, mi_oc_monitorServer) },
271                 { "monitorContainer", "( 1.3.6.1.4.1.4203.666.3.8 "
272                         "NAME 'monitorContainer' "
273                         "DESC 'monitor container class' "
274                         "SUP monitor STRUCTURAL )", SLAP_OC_OPERATIONAL|SLAP_OC_HIDE,
275                         offsetof(struct monitorinfo, mi_oc_monitorContainer) },
276                 { "monitorCounterObject", "( 1.3.6.1.4.1.4203.666.3.9 "
277                         "NAME 'monitorCounterObject' "
278                         "DESC 'monitor counter class' "
279                         "SUP monitor STRUCTURAL )", SLAP_OC_OPERATIONAL|SLAP_OC_HIDE,
280                         offsetof(struct monitorinfo, mi_oc_monitorCounterObject) },
281                 { "monitorOperation", "( 1.3.6.1.4.1.4203.666.3.10 "
282                         "NAME 'monitorOperation' "
283                         "DESC 'monitor operation class' "
284                         "SUP monitor STRUCTURAL )", SLAP_OC_OPERATIONAL|SLAP_OC_HIDE,
285                         offsetof(struct monitorinfo, mi_oc_monitorOperation) },
286                 { "monitorConnection", "( 1.3.6.1.4.1.4203.666.3.11 "
287                         "NAME 'monitorConnection' "
288                         "DESC 'monitor connection class' "
289                         "SUP monitor STRUCTURAL )", SLAP_OC_OPERATIONAL|SLAP_OC_HIDE,
290                         offsetof(struct monitorinfo, mi_oc_monitorConnection) },
291                 { "managedObject", "( 1.3.6.1.4.1.4203.666.3.12 "
292                         "NAME 'managedObject' "
293                         "DESC 'monitor managed entity class' "
294                         "SUP monitor STRUCTURAL )", SLAP_OC_OPERATIONAL|SLAP_OC_HIDE,
295                         offsetof(struct monitorinfo, mi_oc_managedObject) },
296                 { "monitoredObject", "( 1.3.6.1.4.1.4203.666.3.13 "
297                         "NAME 'monitoredObject' "
298                         "DESC 'monitor monitored entity class' "
299                         "SUP monitor STRUCTURAL )", SLAP_OC_OPERATIONAL|SLAP_OC_HIDE,
300                         offsetof(struct monitorinfo, mi_oc_monitoredObject) },
301                 { NULL, NULL, 0, -1 }
302         }, mat[] = {
303                 { "monitoredInfo", "( 1.3.6.1.4.1.4203.666.1.14 "
304                         "NAME 'monitoredInfo' "
305                         "DESC 'monitored info' "
306                         /* "SUP name " */
307                         "EQUALITY caseIgnoreMatch "
308                         "SUBSTR caseIgnoreSubstringsMatch "
309                         "SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{32768} "
310                         "NO-USER-MODIFICATION "
311                         "USAGE directoryOperation )", SLAP_AT_HIDE,
312                         offsetof(struct monitorinfo, mi_ad_monitoredInfo) },
313                 { "managedInfo", "( 1.3.6.1.4.1.4203.666.1.15 "
314                         "NAME 'managedInfo' "
315                         "DESC 'monitor managed info' "
316                         "SUP name )", SLAP_AT_HIDE,
317                         offsetof(struct monitorinfo, mi_ad_managedInfo) },
318                 { "monitorCounter", "( 1.3.6.1.4.1.4203.666.1.16 "
319                         "NAME 'monitorCounter' "
320                         "DESC 'monitor counter' "
321                         "EQUALITY integerMatch "
322                         "ORDERING integerOrderingMatch "
323                         "SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 "
324                         "NO-USER-MODIFICATION "
325                         "USAGE directoryOperation )", SLAP_AT_HIDE,
326                         offsetof(struct monitorinfo, mi_ad_monitorCounter) },
327                 { "monitorOpCompleted", "( 1.3.6.1.4.1.4203.666.1.17 "
328                         "NAME 'monitorOpCompleted' "
329                         "DESC 'monitor completed operations' "
330                         "SUP monitorCounter "
331                         "NO-USER-MODIFICATION "
332                         "USAGE directoryOperation )", SLAP_AT_FINAL|SLAP_AT_HIDE,
333                         offsetof(struct monitorinfo, mi_ad_monitorOpCompleted) },
334                 { "monitorOpInitiated", "( 1.3.6.1.4.1.4203.666.1.18 "
335                         "NAME 'monitorOpInitiated' "
336                         "DESC 'monitor initiated operations' "
337                         "SUP monitorCounter "
338                         "NO-USER-MODIFICATION "
339                         "USAGE directoryOperation )", SLAP_AT_FINAL|SLAP_AT_HIDE,
340                         offsetof(struct monitorinfo, mi_ad_monitorOpInitiated) },
341                 { "monitorConnectionNumber", "( 1.3.6.1.4.1.4203.666.1.19 "
342                         "NAME 'monitorConnectionNumber' "
343                         "DESC 'monitor connection number' "
344                         "SUP monitorCounter "
345                         "NO-USER-MODIFICATION "
346                         "USAGE directoryOperation )", SLAP_AT_FINAL|SLAP_AT_HIDE,
347                         offsetof(struct monitorinfo, mi_ad_monitorConnectionNumber) },
348                 { "monitorConnectionAuthzDN", "( 1.3.6.1.4.1.4203.666.1.20 "
349                         "NAME 'monitorConnectionAuthzDN' "
350                         "DESC 'monitor connection authorization DN' "
351                         /* "SUP distinguishedName " */
352                         "EQUALITY distinguishedNameMatch "
353                         "SYNTAX 1.3.6.1.4.1.1466.115.121.1.12 "
354                         "NO-USER-MODIFICATION "
355                         "USAGE directoryOperation )", SLAP_AT_FINAL|SLAP_AT_HIDE,
356                         offsetof(struct monitorinfo, mi_ad_monitorConnectionAuthzDN) },
357                 { "monitorConnectionLocalAddress", "( 1.3.6.1.4.1.4203.666.1.21 "
358                         "NAME 'monitorConnectionLocalAddress' "
359                         "DESC 'monitor connection local address' "
360                         "SUP monitoredInfo "
361                         "NO-USER-MODIFICATION "
362                         "USAGE directoryOperation )", SLAP_AT_FINAL|SLAP_AT_HIDE,
363                         offsetof(struct monitorinfo, mi_ad_monitorConnectionLocalAddress) },
364                 { "monitorConnectionPeerAddress", "( 1.3.6.1.4.1.4203.666.1.22 "
365                         "NAME 'monitorConnectionPeerAddress' "
366                         "DESC 'monitor connection peer address' "
367                         "SUP monitoredInfo "
368                         "NO-USER-MODIFICATION "
369                         "USAGE directoryOperation )", SLAP_AT_FINAL|SLAP_AT_HIDE,
370                         offsetof(struct monitorinfo, mi_ad_monitorConnectionPeerAddress) },
371                 { "monitorTimestamp", "( 1.3.6.1.4.1.4203.666.1.24 "
372                         "NAME 'monitorTimestamp' "
373                         "DESC 'monitor timestamp' "
374                         "EQUALITY generalizedTimeMatch "
375                         "ORDERING generalizedTimeOrderingMatch "
376                         "SYNTAX 1.3.6.1.4.1.1466.115.121.1.24 "
377                         "SINGLE-VALUE "
378                         "NO-USER-MODIFICATION "
379                         "USAGE directoryOperation )", SLAP_AT_FINAL|SLAP_AT_HIDE,
380                         offsetof(struct monitorinfo, mi_ad_monitorTimestamp) },
381                 { "monitorOverlay", "( 1.3.6.1.4.1.4203.666.1.27 "
382                         "NAME 'monitorOverlay' "
383                         "DESC 'name of overlays defined for a give database' "
384                         "SUP monitoredInfo "
385                         "NO-USER-MODIFICATION "
386                         "USAGE directoryOperation )", SLAP_AT_HIDE,
387                         offsetof(struct monitorinfo, mi_ad_monitorOverlay) },
388                 { "readOnly", "( 1.3.6.1.4.1.4203.666.1.31 "
389                         "NAME 'readOnly' "
390                         "DESC 'read/write status of a given database' "
391                         "EQUALITY booleanMatch "
392                         "SYNTAX 1.3.6.1.4.1.1466.115.121.1.7 "
393                         "SINGLE-VALUE "
394                         "USAGE directoryOperation )", SLAP_AT_HIDE,
395                         offsetof(struct monitorinfo, mi_ad_readOnly) },
396                 { "restrictedOperation", "( 1.3.6.1.4.1.4203.666.1.32 "
397                         "NAME 'restrictedOperation' "
398                         "DESC 'name of restricted operation for a given database' "
399                         "SUP managedInfo )", SLAP_AT_HIDE,
400                         offsetof(struct monitorinfo, mi_ad_restrictedOperation ) },
401 #ifdef INTEGRATE_CORE_SCHEMA
402                 { NULL, NULL, 0, -1 },  /* description */
403                 { NULL, NULL, 0, -1 },  /* seeAlso */
404                 { NULL, NULL, 0, -1 },  /* l */
405                 { NULL, NULL, 0, -1 },  /* labeledURI */
406 #endif /* INTEGRATE_CORE_SCHEMA */
407                 { NULL, NULL, 0, -1 }
408         }, mat_core[] = {
409                 { "description", "( 2.5.4.13 "
410                         "NAME 'description' "
411                         "DESC 'RFC2256: descriptive information' "
412                         "EQUALITY caseIgnoreMatch "
413                         "SUBSTR caseIgnoreSubstringsMatch "
414                         "SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{1024} )", 0,
415                         offsetof(struct monitorinfo, mi_ad_description) },
416                 { "seeAlso", "( 2.5.4.34 "
417                         "NAME 'seeAlso' "
418                         "DESC 'RFC2256: DN of related object' "
419                         "SUP distinguishedName )", 0,
420                         offsetof(struct monitorinfo, mi_ad_seeAlso) },
421                 { "l", "( 2.5.4.7 "
422                         "NAME ( 'l' 'localityName' ) "
423                         "DESC 'RFC2256: locality which this object resides in' "
424                         "SUP name )", 0,
425                         offsetof(struct monitorinfo, mi_ad_l) },
426                 { "labeledURI", "( 1.3.6.1.4.1.250.1.57 "
427                         "NAME 'labeledURI' "
428                         "DESC 'RFC2079: Uniform Resource Identifier with optional label' "
429                         "EQUALITY caseExactMatch "
430                         "SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )", 0,
431                         offsetof(struct monitorinfo, mi_ad_labeledURI) },
432                 { NULL, NULL, 0, -1 }
433         };
434         
435         /*
436          * database monitor can be defined once only
437          */
438         if ( be_monitor ) {
439                 Debug( LDAP_DEBUG_ANY,
440                         "only one monitor backend is allowed\n", 0, 0, 0 );
441                 return( -1 );
442         }
443         be_monitor = be;
444
445         /* indicate system schema supported */
446         SLAP_BFLAGS(be) |= SLAP_BFLAG_MONITOR;
447
448         dn.bv_val = SLAPD_MONITOR_DN;
449         dn.bv_len = sizeof( SLAPD_MONITOR_DN ) - 1;
450
451         rc = dnNormalize( 0, NULL, NULL, &dn, &ndn, NULL );
452         if( rc != LDAP_SUCCESS ) {
453                 Debug( LDAP_DEBUG_ANY,
454                         "unable to normalize monitor DN \"%s\"\n",
455                         SLAPD_MONITOR_DN, 0, 0 );
456                 return -1;
457         }
458
459         ber_dupbv( &bv, &dn );
460         ber_bvarray_add( &be->be_suffix, &bv );
461         ber_bvarray_add( &be->be_nsuffix, &ndn );
462
463         mi = ( struct monitorinfo * )ch_calloc( sizeof( struct monitorinfo ), 1 );
464         if ( mi == NULL ) {
465                 Debug( LDAP_DEBUG_ANY,
466                         "unable to initialize monitor backend\n", 0, 0, 0 );
467                 return -1;
468         }
469
470         memset( mi, 0, sizeof( struct monitorinfo ) );
471
472         ldap_pvt_thread_mutex_init( &mi->mi_cache_mutex );
473
474         be->be_private = mi;
475         
476 #ifdef INTEGRATE_CORE_SCHEMA
477         /* prepare for schema integration */
478         for ( k = 0; mat[k].name != NULL; k++ );
479 #endif /* INTEGRATE_CORE_SCHEMA */
480
481         for ( i = 0; mat_core[i].name != NULL; i++ ) {
482                 AttributeDescription    **ad;
483                 const char              *text;
484
485                 ad = ((AttributeDescription **)&(((char *)mi)[mat_core[i].offset]));
486                 ad[0] = NULL;
487
488                 switch (slap_str2ad( mat_core[i].name, ad, &text ) ) {
489                 case LDAP_SUCCESS:
490                         break;
491
492 #ifdef INTEGRATE_CORE_SCHEMA
493                 case LDAP_UNDEFINED_TYPE:
494                         mat[k] = mat_core[i];
495                         k++;
496                         break;
497 #endif /* INTEGRATE_CORE_SCHEMA */
498
499                 default:
500                         Debug( LDAP_DEBUG_ANY,
501                                 "monitor_back_db_init: %s: %s\n",
502                                 mat_core[i].name, text, 0 );
503                         return( -1 );
504                 }
505         }
506
507         /* schema integration */
508         for ( i = 0; mat[i].name; i++ ) {
509                 LDAPAttributeType       *at;
510                 int                     code;
511                 const char              *err;
512                 AttributeDescription    **ad;
513
514                 at = ldap_str2attributetype( mat[i].schema, &code,
515                         &err, LDAP_SCHEMA_ALLOW_ALL );
516                 if ( !at ) {
517                         Debug( LDAP_DEBUG_ANY, "monitor_back_db_init: "
518                                 "in AttributeType \"%s\" %s before %s\n",
519                                 mat[i].name, ldap_scherr2str(code), err );
520                         return -1;
521                 }
522
523                 if ( at->at_oid == NULL ) {
524                         Debug( LDAP_DEBUG_ANY, "monitor_back_db_init: "
525                                 "null OID for attributeType \"%s\"\n",
526                                 mat[i].name, 0, 0 );
527                         return -1;
528                 }
529
530                 code = at_add(at, &err);
531                 if ( code ) {
532                         Debug( LDAP_DEBUG_ANY, "monitor_back_db_init: "
533                                 "%s in attributeType \"%s\"\n",
534                                 scherr2str(code), mat[i].name, 0 );
535                         return -1;
536                 }
537                 ldap_memfree(at);
538
539                 ad = ((AttributeDescription **)&(((char *)mi)[mat[i].offset]));
540                 ad[0] = NULL;
541                 if ( slap_str2ad( mat[i].name, ad, &text ) ) {
542                         Debug( LDAP_DEBUG_ANY,
543                                 "monitor_back_db_init: %s\n", text, 0, 0 );
544                         return -1;
545                 }
546
547                 (*ad)->ad_type->sat_flags |= mat[i].flags;
548         }
549
550         for ( i = 0; moc[i].name; i++ ) {
551                 LDAPObjectClass         *oc;
552                 int                     code;
553                 const char              *err;
554                 ObjectClass             *Oc;
555
556                 oc = ldap_str2objectclass(moc[i].schema, &code, &err,
557                                 LDAP_SCHEMA_ALLOW_ALL );
558                 if ( !oc ) {
559                         Debug( LDAP_DEBUG_ANY,
560                                 "unable to parse monitor objectclass \"%s\": "
561                                 "%s before %s\n" , moc[i].name,
562                                 ldap_scherr2str(code), err );
563                         return -1;
564                 }
565
566                 if ( oc->oc_oid == NULL ) {
567                         Debug( LDAP_DEBUG_ANY,
568                                 "objectclass \"%s\" has no OID\n" ,
569                                 moc[i].name, 0, 0 );
570                         return -1;
571                 }
572
573                 code = oc_add(oc, 0, &err);
574                 if ( code ) {
575                         Debug( LDAP_DEBUG_ANY,
576                                 "objectclass \"%s\": %s \"%s\"\n" ,
577                                 moc[i].name, scherr2str(code), err );
578                         return -1;
579                 }
580
581                 ldap_memfree(oc);
582
583                 Oc = oc_find( moc[i].name );
584                 if ( Oc == NULL ) {
585                         Debug( LDAP_DEBUG_ANY, "monitor_back_db_init: "
586                                         "unable to find objectClass %s "
587                                         "(just added)\n", moc[i].name, 0, 0 );
588                         return -1;
589                 }
590
591                 Oc->soc_flags |= moc[i].flags;
592
593                 ((ObjectClass **)&(((char *)mi)[moc[i].offset]))[0] = Oc;
594         }
595
596         return 0;
597 }
598
599 int
600 monitor_back_db_open(
601         BackendDB       *be
602 )
603 {
604         struct monitorinfo      *mi = (struct monitorinfo *)be->be_private;
605         struct monitorsubsys    *ms;
606         Entry                   *e, **ep;
607         struct monitorentrypriv *mp;
608         int                     i;
609         char                    buf[ BACKMONITOR_BUFSIZE ], *end_of_line;
610         struct berval           bv;
611         struct tm               *tms;
612 #ifdef HAVE_GMTIME_R
613         struct tm               tm_buf;
614 #endif
615         static char             tmbuf[ LDAP_LUTIL_GENTIME_BUFSIZE ];
616
617         /*
618          * Start
619          */
620 #ifndef HAVE_GMTIME_R
621         ldap_pvt_thread_mutex_lock( &SLAPD_GLOBAL(gmtime_mutex) );
622 #endif
623 #ifdef HACK_LOCAL_TIME
624 # ifdef HAVE_LOCALTIME_R
625         tms = localtime_r( &SLAPD_GLOBAL(starttime), &tm_buf );
626 # else
627         tms = localtime( &SLAPD_GLOBAL(starttime) );
628 # endif /* HAVE_LOCALTIME_R */
629         lutil_localtime( tmbuf, sizeof(tmbuf), tms, -timezone );
630 #else /* !HACK_LOCAL_TIME */
631 # ifdef HAVE_GMTIME_R
632         tms = gmtime_r( &SLAPD_GLOBAL(starttime), &tm_buf );
633 # else
634         tms = gmtime( &SLAPD_GLOBAL(starttime) );
635 # endif /* HAVE_GMTIME_R */
636         lutil_gentime( tmbuf, sizeof(tmbuf), tms );
637 #endif /* !HACK_LOCAL_TIME */
638 #ifndef HAVE_GMTIME_R
639         ldap_pvt_thread_mutex_unlock( &SLAPD_GLOBAL(gmtime_mutex) );
640 #endif
641
642         mi->mi_startTime.bv_val = tmbuf;
643         mi->mi_startTime.bv_len = strlen( tmbuf );
644
645         if ( BER_BVISEMPTY( &be->be_rootdn ) ) {
646                 BER_BVSTR( &mi->mi_creatorsName, SLAPD_ANONYMOUS );
647         } else {
648                 mi->mi_creatorsName = be->be_rootdn;
649         }
650
651         /*
652          * creates the "cn=Monitor" entry 
653          */
654         snprintf( buf, sizeof( buf ), 
655                 "dn: %s\n"
656                 "objectClass: %s\n"
657                 "structuralObjectClass: %s\n"
658                 "cn: Monitor\n"
659                 "%s: This subtree contains monitoring/managing objects.\n"
660                 "%s: This object contains information about this server.\n"
661 #if 0
662                 "%s: createTimestamp reflects the time this server instance was created.\n"
663                 "%s: modifyTimestamp reflects the time this server instance was last accessed.\n"
664 #endif
665                 "creatorsName: %s\n"
666                 "modifiersName: %s\n"
667                 "createTimestamp: %s\n"
668                 "modifyTimestamp: %s\n",
669                 SLAPD_MONITOR_DN,
670                 mi->mi_oc_monitorServer->soc_cname.bv_val,
671                 mi->mi_oc_monitorServer->soc_cname.bv_val,
672                 mi->mi_ad_description->ad_cname.bv_val,
673                 mi->mi_ad_description->ad_cname.bv_val,
674 #if 0
675                 mi->mi_ad_description->ad_cname.bv_val,
676                 mi->mi_ad_description->ad_cname.bv_val,
677 #endif
678                 mi->mi_creatorsName.bv_val,
679                 mi->mi_creatorsName.bv_val,
680                 mi->mi_startTime.bv_val,
681                 mi->mi_startTime.bv_val );
682
683         e = str2entry( buf );
684         if ( e == NULL) {
685                 Debug( LDAP_DEBUG_ANY,
686                         "unable to create \"%s\" entry\n",
687                         SLAPD_MONITOR_DN, 0, 0 );
688                 return( -1 );
689         }
690
691         bv.bv_val = (char *) Versionstr;
692         end_of_line = strchr( Versionstr, '\n' );
693         if ( end_of_line ) {
694                 bv.bv_len = end_of_line - Versionstr;
695         } else {
696                 bv.bv_len = strlen( Versionstr );
697         }
698
699         if ( attr_merge_normalize_one( e, mi->mi_ad_monitoredInfo,
700                                 &bv, NULL ) ) {
701                 Debug( LDAP_DEBUG_ANY,
702                         "unable to add monitoredInfo to \"%s\" entry\n",
703                         SLAPD_MONITOR_DN, 0, 0 );
704                 return( -1 );
705         }
706
707         if ( mi->mi_l.bv_len ) {
708                 if ( attr_merge_normalize_one( e, mi->mi_ad_l, &mi->mi_l, NULL ) ) {
709                         Debug( LDAP_DEBUG_ANY,
710                                 "unable to add locality to \"%s\" entry\n",
711                                 SLAPD_MONITOR_DN, 0, 0 );
712                         return( -1 );
713                 }
714         }
715
716         mp = ( struct monitorentrypriv * )ch_calloc( sizeof( struct monitorentrypriv ), 1 );
717         e->e_private = ( void * )mp;
718
719         mp->mp_info = NULL;
720         mp->mp_children = NULL;
721         mp->mp_next = NULL;
722
723         ep = &mp->mp_children;
724
725         if ( monitor_cache_add( mi, e ) ) {
726                 Debug( LDAP_DEBUG_ANY,
727                         "unable to add entry \"%s\" to cache\n",
728                         SLAPD_MONITOR_DN, 0, 0 );
729                 return -1;
730         }
731
732         /*      
733          * Create all the subsystem specific entries
734          */
735         for ( i = 0; monitor_subsys[ i ].mss_name != NULL; i++ ) {
736                 int             len = strlen( monitor_subsys[ i ].mss_name );
737                 struct berval   dn;
738                 int             rc;
739
740                 dn.bv_len = len + sizeof( "cn=" ) - 1;
741                 dn.bv_val = ch_calloc( sizeof( char ), dn.bv_len + 1 );
742                 strcpy( dn.bv_val, "cn=" );
743                 strcat( dn.bv_val, monitor_subsys[ i ].mss_name );
744                 rc = dnPretty( NULL, &dn, &monitor_subsys[ i ].mss_rdn, NULL );
745                 free( dn.bv_val );
746                 if ( rc != LDAP_SUCCESS ) {
747                         Debug( LDAP_DEBUG_ANY,
748                                 "monitor RDN \"%s\" is invalid\n", 
749                                 dn.bv_val, 0, 0 );
750                         return( -1 );
751                 }
752
753                 dn.bv_len += sizeof( SLAPD_MONITOR_DN ); /* 1 for the , */
754                 dn.bv_val = ch_malloc( dn.bv_len + 1 );
755                 strcpy( dn.bv_val , monitor_subsys[ i ].mss_rdn.bv_val );
756                 strcat( dn.bv_val, "," SLAPD_MONITOR_DN );
757                 rc = dnPrettyNormal( NULL, &dn, &monitor_subsys[ i ].mss_dn,
758                         &monitor_subsys[ i ].mss_ndn, NULL );
759                 free( dn.bv_val );
760                 if ( rc != LDAP_SUCCESS ) {
761                         Debug( LDAP_DEBUG_ANY,
762                                 "monitor DN \"%s\" is invalid\n", 
763                                 dn.bv_val, 0, 0 );
764                         return( -1 );
765                 }
766
767                 snprintf( buf, sizeof( buf ),
768                                 "dn: %s\n"
769                                 "objectClass: %s\n"
770                                 "structuralObjectClass: %s\n"
771                                 "cn: %s\n"
772                                 "creatorsName: %s\n"
773                                 "modifiersName: %s\n"
774                                 "createTimestamp: %s\n"
775                                 "modifyTimestamp: %s\n",
776                                 monitor_subsys[ i ].mss_dn.bv_val,
777                                 mi->mi_oc_monitorContainer->soc_cname.bv_val,
778                                 mi->mi_oc_monitorContainer->soc_cname.bv_val,
779                                 monitor_subsys[ i ].mss_name,
780                                 mi->mi_creatorsName.bv_val,
781                                 mi->mi_creatorsName.bv_val,
782                                 mi->mi_startTime.bv_val,
783                                 mi->mi_startTime.bv_val );
784                 
785                 e = str2entry( buf );
786                 
787                 if ( e == NULL) {
788                         Debug( LDAP_DEBUG_ANY,
789                                 "unable to create \"%s\" entry\n", 
790                                 monitor_subsys[ i ].mss_dn.bv_val, 0, 0 );
791                         return( -1 );
792                 }
793
794                 mp = ( struct monitorentrypriv * )ch_calloc( sizeof( struct monitorentrypriv ), 1 );
795                 e->e_private = ( void * )mp;
796                 mp->mp_next = NULL;
797                 mp->mp_info = &monitor_subsys[ i ];
798                 mp->mp_children = NULL;
799                 mp->mp_flags = monitor_subsys[ i ].mss_flags;
800
801                 if ( monitor_cache_add( mi, e ) ) {
802                         Debug( LDAP_DEBUG_ANY,
803                                 "unable to add entry \"%s\" to cache\n",
804                                 monitor_subsys[ i ].mss_dn.bv_val, 0, 0 );
805                         return -1;
806                 }
807
808                 *ep = e;
809                 ep = &mp->mp_next;
810         }
811
812         assert( be );
813
814         be->be_private = mi;
815         
816         /*
817          * opens the monitor backend
818          */
819         for ( ms = monitor_subsys; ms->mss_name != NULL; ms++ ) {
820                 if ( ms->mss_init && ( *ms->mss_init )( be ) ) {
821                         return( -1 );
822                 }
823         }
824
825         return( 0 );
826 }
827
828 int
829 monitor_back_config(
830         BackendInfo     *bi,
831         const char      *fname,
832         int             lineno,
833         int             argc,
834         char            **argv
835 )
836 {
837         /*
838          * eventually, will hold backend specific configuration parameters
839          */
840         return SLAP_CONF_UNKNOWN;
841 }
842
843 int
844 monitor_back_db_config(
845         Backend     *be,
846         const char  *fname,
847         int         lineno,
848         int         argc,
849         char        **argv
850 )
851 {
852         struct monitorinfo *mi = (struct monitorinfo *)be->be_private;
853
854         /*
855          * eventually, will hold database specific configuration parameters
856          */
857         if ( strcasecmp( argv[ 0 ], "l" ) == 0 ) {
858                 if ( argc != 2 ) {
859                         return 1;
860                 }
861                 
862                 ber_str2bv( argv[ 1 ], 0, 1, &mi->mi_l );
863
864         } else {
865                 return SLAP_CONF_UNKNOWN;
866         }
867
868         return( 0 );
869 }
870
871 int
872 monitor_back_db_destroy(
873         BackendDB       *be
874 )
875 {
876         /*
877          * FIXME: destroys all the data
878          */
879         return 0;
880 }
881