1 /* init.c - initialize monitor backend */
3 * Copyright 1998-2002 The OpenLDAP Foundation, All Rights Reserved.
4 * COPYING RESTRICTIONS APPLY, see COPYRIGHT file
7 * Copyright 2001, Pierangelo Masarati, All rights reserved. <ando@sys-net.it>
9 * This work has beed deveolped for the OpenLDAP Foundation
10 * in the hope that it may be useful to the Open Source community,
11 * but WITHOUT ANY WARRANTY.
13 * Permission is granted to anyone to use this software for any purpose
14 * on any computer system, and to alter it and redistribute it, subject
15 * to the following restrictions:
17 * 1. The author and SysNet s.n.c. are not responsible for the consequences
18 * of use of this software, no matter how awful, even if they arise from
21 * 2. The origin of this software must not be misrepresented, either by
22 * explicit claim or by omission. Since few users ever read sources,
23 * credits should appear in the documentation.
25 * 3. Altered versions must be plainly marked as such, and must not be
26 * misrepresented as being the original software. Since few users
27 * ever read sources, credits should appear in the documentation.
28 * SysNet s.n.c. cannot be responsible for the consequences of the
31 * 4. This notice may not be removed or altered.
37 #include <ac/string.h>
40 #include "back-monitor.h"
43 * used by many functions to add description to entries
45 AttributeDescription *monitor_ad_desc = NULL;
46 BackendDB *be_monitor = NULL;
51 struct monitorsubsys monitor_subsys[] = {
53 SLAPD_MONITOR_LISTENER, SLAPD_MONITOR_LISTENER_NAME,
54 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
55 MONITOR_F_PERSISTENT_CH,
56 monitor_subsys_listener_init,
61 SLAPD_MONITOR_DATABASE, SLAPD_MONITOR_DATABASE_NAME,
62 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
63 MONITOR_F_PERSISTENT_CH,
64 monitor_subsys_database_init,
69 SLAPD_MONITOR_BACKEND, SLAPD_MONITOR_BACKEND_NAME,
70 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
71 MONITOR_F_PERSISTENT_CH,
72 monitor_subsys_backend_init,
77 SLAPD_MONITOR_THREAD, SLAPD_MONITOR_THREAD_NAME,
78 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
80 monitor_subsys_thread_init,
81 monitor_subsys_thread_update,
85 SLAPD_MONITOR_SASL, SLAPD_MONITOR_SASL_NAME,
86 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
93 SLAPD_MONITOR_TLS, SLAPD_MONITOR_TLS_NAME,
94 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
101 SLAPD_MONITOR_CONN, SLAPD_MONITOR_CONN_NAME,
102 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
103 MONITOR_F_VOLATILE_CH,
104 monitor_subsys_conn_init,
105 monitor_subsys_conn_update,
106 monitor_subsys_conn_create,
109 SLAPD_MONITOR_READW, SLAPD_MONITOR_READW_NAME,
110 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
113 monitor_subsys_readw_update,
117 SLAPD_MONITOR_WRITEW, SLAPD_MONITOR_WRITEW_NAME,
118 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
121 monitor_subsys_writew_update,
125 SLAPD_MONITOR_LOG, SLAPD_MONITOR_LOG_NAME,
126 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
128 monitor_subsys_log_init,
131 monitor_subsys_log_modify
133 SLAPD_MONITOR_OPS, SLAPD_MONITOR_OPS_NAME,
134 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
136 monitor_subsys_ops_init,
137 monitor_subsys_ops_update,
141 SLAPD_MONITOR_SENT, SLAPD_MONITOR_SENT_NAME,
142 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
144 monitor_subsys_sent_init,
145 monitor_subsys_sent_update,
152 monitor_back_initialize(
156 static char *controls[] = {
157 LDAP_CONTROL_MANAGEDSAIT,
161 bi->bi_controls = controls;
164 bi->bi_open = monitor_back_open;
165 bi->bi_config = monitor_back_config;
169 bi->bi_db_init = monitor_back_db_init;
170 bi->bi_db_config = monitor_back_db_config;
173 bi->bi_db_destroy = monitor_back_db_destroy;
175 bi->bi_op_bind = monitor_back_bind;
176 bi->bi_op_unbind = 0;
177 bi->bi_op_search = monitor_back_search;
178 bi->bi_op_compare = monitor_back_compare;
179 bi->bi_op_modify = monitor_back_modify;
180 bi->bi_op_modrdn = 0;
182 bi->bi_op_delete = 0;
183 bi->bi_op_abandon = 0;
187 bi->bi_entry_release_rw = 0;
188 bi->bi_acl_group = 0;
189 bi->bi_acl_attribute = 0;
190 bi->bi_chk_referrals = 0;
191 bi->bi_operational = monitor_back_operational;
194 * hooks for slap tools
196 bi->bi_tool_entry_open = 0;
197 bi->bi_tool_entry_close = 0;
198 bi->bi_tool_entry_first = 0;
199 bi->bi_tool_entry_next = 0;
200 bi->bi_tool_entry_get = 0;
201 bi->bi_tool_entry_put = 0;
202 bi->bi_tool_entry_reindex = 0;
203 bi->bi_tool_sync = 0;
205 bi->bi_connection_init = 0;
206 bi->bi_connection_destroy = 0;
212 monitor_back_db_init(
216 struct monitorinfo *mi;
218 struct monitorentrypriv *mp;
220 char buf[1024], *end_of_line;
221 struct berval dn, *ndn;
226 * database monitor can be defined once only
230 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
231 "only one monitor backend is allowed\n" ));
233 Debug( LDAP_DEBUG_ANY,
234 "only one monitor backend is allowed\n%s%s%s",
242 dn.bv_val = SLAPD_MONITOR_DN;
243 dn.bv_len = sizeof( SLAPD_MONITOR_DN ) - 1;
245 rc = dnNormalize( NULL, &dn, &ndn );
246 if( rc != LDAP_SUCCESS ) {
248 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
249 "monitor DN \"" SLAPD_MONITOR_DN "\" backend is allowed\n" ));
251 Debug( LDAP_DEBUG_ANY,
252 "monitor DN \"" SLAPD_MONITOR_DN "\" backend is allowed\n",
258 ber_bvecadd( &be->be_suffix, ber_dupbv( NULL, &dn ) );
259 ber_bvecadd( &be->be_nsuffix, ndn );
261 mi = ( struct monitorinfo * )ch_calloc( sizeof( struct monitorinfo ), 1 );
262 ldap_pvt_thread_mutex_init( &mi->mi_cache_mutex );
264 if ( slap_str2ad( "description", &monitor_ad_desc, &text ) ) {
266 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
267 "monitor_back_db_init: %s\n", text ));
269 Debug( LDAP_DEBUG_ANY,
270 "monitor_subsys_backend_init: %s\n%s%s",
277 * Create all the subsystem specific entries
280 for ( i = 0; monitor_subsys[ i ].mss_name != NULL; i++ ) {
281 int len = strlen( monitor_subsys[ i ].mss_name );
285 dn.bv_len = len + sizeof( "cn=" ) - 1;
286 dn.bv_val = ch_calloc( sizeof( char ), dn.bv_len + 1 );
287 strcpy( dn.bv_val, "cn=" );
288 strcat( dn.bv_val, monitor_subsys[ i ].mss_name );
289 rc = dnPretty2( NULL, &dn, &monitor_subsys[ i ].mss_rdn );
291 if ( rc != LDAP_SUCCESS ) {
293 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
294 "monitor RDN \"%s\" is invalid\n",
297 Debug( LDAP_DEBUG_ANY,
298 "monitor RDN \"%s\" is invalid\n",
304 dn.bv_len += sizeof( SLAPD_MONITOR_DN ); /* 1 for the , */
305 dn.bv_val = ch_malloc( dn.bv_len + 1 );
306 strcpy( dn.bv_val , monitor_subsys[ i ].mss_rdn.bv_val );
307 strcat( dn.bv_val, "," SLAPD_MONITOR_DN );
308 rc = dnPrettyNormal( NULL, &dn, &monitor_subsys[ i ].mss_dn,
309 &monitor_subsys[ i ].mss_ndn );
311 if ( rc != LDAP_SUCCESS ) {
313 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
314 "monitor DN \"%s\" is invalid\n",
317 Debug( LDAP_DEBUG_ANY,
318 "monitor DN \"%s\" is invalid\n",
324 snprintf( buf, sizeof( buf ),
326 SLAPD_MONITOR_OBJECTCLASSES
328 monitor_subsys[ i ].mss_dn.bv_val,
329 monitor_subsys[ i ].mss_name );
331 e = str2entry( buf );
335 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
336 "unable to create '%s' entry\n",
337 monitor_subsys[ i ].mss_dn.bv_val ));
339 Debug( LDAP_DEBUG_ANY,
340 "unable to create '%s' entry\n",
341 monitor_subsys[ i ].mss_dn.bv_val, 0, 0 );
346 mp = ( struct monitorentrypriv * )ch_calloc( sizeof( struct monitorentrypriv ), 1 );
347 e->e_private = ( void * )mp;
348 mp->mp_info = &monitor_subsys[ i ];
349 mp->mp_children = NULL;
351 mp->mp_flags = monitor_subsys[ i ].mss_flags;
353 if ( monitor_cache_add( mi, e ) ) {
355 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
356 "unable to add entry '%s' to cache\n",
357 monitor_subsys[ i ].mss_dn.bv_val ));
359 Debug( LDAP_DEBUG_ANY,
360 "unable to add entry '%s' to cache\n",
361 monitor_subsys[ i ].mss_dn.bv_val, 0, 0 );
370 * creates the "cn=Monitor" entry
372 snprintf( buf, sizeof( buf ),
373 "dn: " SLAPD_MONITOR_DN "\n"
375 "objectClass: monitor\n"
376 "objectClass: extensibleObject\n"
377 "structuralObjectClass: monitor\n"
380 e = str2entry( buf );
383 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
384 "unable to create '%s' entry\n",
387 Debug( LDAP_DEBUG_ANY,
388 "unable to create '%s' entry\n%s%s",
389 SLAPD_MONITOR_DN, "", "" );
394 bv[0].bv_val = (char *) Versionstr;
395 end_of_line = strchr( Versionstr, '\n' );
397 bv[0].bv_len = end_of_line - Versionstr;
399 bv[0].bv_len = strlen( Versionstr );
401 if ( attr_merge( e, monitor_ad_desc, bv ) ) {
403 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
404 "unable to add description to '%s' entry\n",
407 Debug( LDAP_DEBUG_ANY,
408 "unable to add description to '%s' entry\n%s%s",
409 SLAPD_MONITOR_DN, "", "" );
414 mp = ( struct monitorentrypriv * )ch_calloc( sizeof( struct monitorentrypriv ), 1 );
415 e->e_private = ( void * )mp;
418 mp->mp_children = e_tmp;
421 if ( monitor_cache_add( mi, e ) ) {
423 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
424 "unable to add entry '%s' to cache\n",
427 Debug( LDAP_DEBUG_ANY,
428 "unable to add entry '%s' to cache\n%s%s",
429 SLAPD_MONITOR_DN, "", "" );
445 struct monitorsubsys *ms;
446 struct berval dn = { sizeof(SLAPD_MONITOR_DN)-1, SLAPD_MONITOR_DN };
451 * adds the monitor backend
453 rc = dnNormalize2( NULL, &dn, &ndn );
454 if( rc != LDAP_SUCCESS ) {
456 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
457 "monitor DN \"" SLAPD_MONITOR_DN "\" is invalid\n" ));
459 Debug( LDAP_DEBUG_ANY,
460 "monitor DN \"" SLAPD_MONITOR_DN "\" is invalid\n",
466 be = select_backend( &ndn , 0, 0 );
471 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
472 "unable to get monitor backend\n" ));
474 Debug( LDAP_DEBUG_ANY,
475 "unable to get monitor backend\n", 0, 0, 0 );
480 for ( ms = monitor_subsys; ms->mss_name != NULL; ms++ ) {
481 if ( ms->mss_init && ( *ms->mss_init )( be ) ) {
499 * eventually, will hold backend specific configuration parameters
505 monitor_back_db_config(
514 LDAP_LOG(( "config", LDAP_DEBUG_NOTICE,
515 "line %d of file '%s' will be ignored\n", lineno, fname ));
517 Debug( LDAP_DEBUG_CONFIG,
518 "line %d of file '%s' will be ignored\n%s", lineno, fname, "" );
524 monitor_back_db_destroy(
529 * FIXME: destroys all the data