1 /* init.c - initialize monitor backend */
3 * Copyright 1998-2002 The OpenLDAP Foundation, All Rights Reserved.
4 * COPYING RESTRICTIONS APPLY, see COPYRIGHT file
7 * Copyright 2001, Pierangelo Masarati, All rights reserved. <ando@sys-net.it>
9 * This work has beed deveolped for the OpenLDAP Foundation
10 * in the hope that it may be useful to the Open Source community,
11 * but WITHOUT ANY WARRANTY.
13 * Permission is granted to anyone to use this software for any purpose
14 * on any computer system, and to alter it and redistribute it, subject
15 * to the following restrictions:
17 * 1. The author and SysNet s.n.c. are not responsible for the consequences
18 * of use of this software, no matter how awful, even if they arise from
21 * 2. The origin of this software must not be misrepresented, either by
22 * explicit claim or by omission. Since few users ever read sources,
23 * credits should appear in the documentation.
25 * 3. Altered versions must be plainly marked as such, and must not be
26 * misrepresented as being the original software. Since few users
27 * ever read sources, credits should appear in the documentation.
28 * SysNet s.n.c. cannot be responsible for the consequences of the
31 * 4. This notice may not be removed or altered.
37 #include <ac/string.h>
40 #include "back-monitor.h"
43 * used by many functions to add description to entries
45 AttributeDescription *monitor_ad_desc = NULL;
50 struct monitorsubsys monitor_subsys[] = {
52 SLAPD_MONITOR_LISTENER, SLAPD_MONITOR_LISTENER_NAME,
53 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
60 SLAPD_MONITOR_DATABASE, SLAPD_MONITOR_DATABASE_NAME,
61 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
62 MONITOR_F_PERSISTENT_CH,
63 monitor_subsys_database_init,
68 SLAPD_MONITOR_BACKEND, SLAPD_MONITOR_BACKEND_NAME,
69 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
70 MONITOR_F_PERSISTENT_CH,
71 monitor_subsys_backend_init,
76 SLAPD_MONITOR_THREAD, SLAPD_MONITOR_THREAD_NAME,
77 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
79 monitor_subsys_thread_init,
80 monitor_subsys_thread_update,
84 SLAPD_MONITOR_SASL, SLAPD_MONITOR_SASL_NAME,
85 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
92 SLAPD_MONITOR_TLS, SLAPD_MONITOR_TLS_NAME,
93 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
100 SLAPD_MONITOR_CONN, SLAPD_MONITOR_CONN_NAME,
101 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
102 MONITOR_F_VOLATILE_CH,
103 monitor_subsys_conn_init,
104 monitor_subsys_conn_update,
105 monitor_subsys_conn_create,
108 SLAPD_MONITOR_READW, SLAPD_MONITOR_READW_NAME,
109 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
112 monitor_subsys_readw_update,
116 SLAPD_MONITOR_WRITEW, SLAPD_MONITOR_WRITEW_NAME,
117 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
120 monitor_subsys_writew_update,
124 SLAPD_MONITOR_LOG, SLAPD_MONITOR_LOG_NAME,
125 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
127 monitor_subsys_log_init,
130 monitor_subsys_log_modify
132 SLAPD_MONITOR_OPS, SLAPD_MONITOR_OPS_NAME,
133 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
135 monitor_subsys_ops_init,
136 monitor_subsys_ops_update,
140 SLAPD_MONITOR_SENT, SLAPD_MONITOR_SENT_NAME,
141 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
143 monitor_subsys_sent_init,
144 monitor_subsys_sent_update,
151 monitor_back_initialize(
155 static char *controls[] = {
156 LDAP_CONTROL_MANAGEDSAIT,
160 bi->bi_controls = controls;
163 bi->bi_open = monitor_back_open;
164 bi->bi_config = monitor_back_config;
168 bi->bi_db_init = monitor_back_db_init;
169 bi->bi_db_config = monitor_back_db_config;
172 bi->bi_db_destroy = monitor_back_db_destroy;
174 bi->bi_op_bind = monitor_back_bind;
175 bi->bi_op_unbind = 0;
176 bi->bi_op_search = monitor_back_search;
177 bi->bi_op_compare = monitor_back_compare;
178 bi->bi_op_modify = monitor_back_modify;
179 bi->bi_op_modrdn = 0;
181 bi->bi_op_delete = 0;
182 bi->bi_op_abandon = 0;
186 bi->bi_entry_release_rw = 0;
187 bi->bi_acl_group = 0;
188 bi->bi_acl_attribute = 0;
189 bi->bi_chk_referrals = 0;
190 bi->bi_operational = monitor_back_operational;
193 * hooks for slap tools
195 bi->bi_tool_entry_open = 0;
196 bi->bi_tool_entry_close = 0;
197 bi->bi_tool_entry_first = 0;
198 bi->bi_tool_entry_next = 0;
199 bi->bi_tool_entry_get = 0;
200 bi->bi_tool_entry_put = 0;
201 bi->bi_tool_entry_reindex = 0;
202 bi->bi_tool_sync = 0;
204 bi->bi_connection_init = 0;
205 bi->bi_connection_destroy = 0;
211 monitor_back_db_init(
215 struct monitorinfo *mi;
217 struct monitorentrypriv *mp;
219 char buf[1024], *end_of_line;
220 struct berval dn, *ndn;
225 * database monitor can be defined once only
227 static int monitor_defined = 0;
229 if ( monitor_defined ) {
231 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
232 "only one monitor backend is allowed\n" ));
234 Debug( LDAP_DEBUG_ANY,
235 "only one monitor backend is allowed\n%s%s%s",
243 dn.bv_val = SLAPD_MONITOR_DN;
244 dn.bv_len = sizeof( SLAPD_MONITOR_DN ) - 1;
246 rc = dnNormalize( NULL, &dn, &ndn );
247 if( rc != LDAP_SUCCESS ) {
249 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
250 "monitor DN \"" SLAPD_MONITOR_DN "\" backend is allowed\n" ));
252 Debug( LDAP_DEBUG_ANY,
253 "monitor DN \"" SLAPD_MONITOR_DN "\" backend is allowed\n",
259 ber_bvecadd( &be->be_suffix, ber_bvdup( &dn ) );
260 ber_bvecadd( &be->be_nsuffix, ndn );
262 mi = ( struct monitorinfo * )ch_calloc( sizeof( struct monitorinfo ), 1 );
263 ldap_pvt_thread_mutex_init( &mi->mi_cache_mutex );
265 if ( slap_str2ad( "description", &monitor_ad_desc, &text ) ) {
267 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
268 "monitor_back_db_init: %s\n", text ));
270 Debug( LDAP_DEBUG_ANY,
271 "monitor_subsys_backend_init: %s\n%s%s",
278 * Create all the subsystem specific entries
281 for ( i = 0; monitor_subsys[ i ].mss_name != NULL; i++ ) {
282 int len = strlen( monitor_subsys[ i ].mss_name );
286 dn.bv_len = len + sizeof( "cn=" ) - 1;
287 dn.bv_val = ch_calloc( sizeof( char ), dn.bv_len + 1 );
288 strcpy( dn.bv_val, "cn=" );
289 strcat( dn.bv_val, monitor_subsys[ i ].mss_name );
290 rc = dnPretty2( NULL, &dn, &monitor_subsys[ i ].mss_rdn );
292 if ( rc != LDAP_SUCCESS ) {
294 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
295 "monitor RDN \"%s\" is invalid\n",
298 Debug( LDAP_DEBUG_ANY,
299 "monitor RDN \"%s\" is invalid\n",
305 dn.bv_len += sizeof( SLAPD_MONITOR_DN ); /* 1 for the , */
306 dn.bv_val = ch_malloc( dn.bv_len + 1 );
307 strcpy( dn.bv_val , monitor_subsys[ i ].mss_rdn.bv_val );
308 strcat( dn.bv_val, "," SLAPD_MONITOR_DN );
309 rc = dnPrettyNormal( NULL, &dn, &monitor_subsys[ i ].mss_dn,
310 &monitor_subsys[ i ].mss_ndn );
312 if ( rc != LDAP_SUCCESS ) {
314 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
315 "monitor DN \"%s\" is invalid\n",
318 Debug( LDAP_DEBUG_ANY,
319 "monitor DN \"%s\" is invalid\n",
325 snprintf( buf, sizeof( buf ),
328 "objectClass: LDAPsubEntry\n"
329 #ifdef SLAPD_MONITORSUBENTRY
330 "objectClass: monitorSubEntry\n"
331 #else /* !SLAPD_MONITORSUBENTRY */
332 "objectClass: extensibleObject\n"
333 #endif /* !SLAPD_MONITORSUBENTRY */
335 monitor_subsys[ i ].mss_dn.bv_val,
336 monitor_subsys[ i ].mss_name );
338 e = str2entry( buf );
342 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
343 "unable to create '%s' entry\n",
344 monitor_subsys[ i ].mss_dn.bv_val ));
346 Debug( LDAP_DEBUG_ANY,
347 "unable to create '%s' entry\n",
348 monitor_subsys[ i ].mss_dn.bv_val, 0, 0 );
353 mp = ( struct monitorentrypriv * )ch_calloc( sizeof( struct monitorentrypriv ), 1 );
354 e->e_private = ( void * )mp;
355 mp->mp_info = &monitor_subsys[ i ];
356 mp->mp_children = NULL;
358 mp->mp_flags = monitor_subsys[ i ].mss_flags;
360 if ( monitor_cache_add( mi, e ) ) {
362 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
363 "unable to add entry '%s' to cache\n",
364 monitor_subsys[ i ].mss_dn.bv_val ));
366 Debug( LDAP_DEBUG_ANY,
367 "unable to add entry '%s' to cache\n",
368 monitor_subsys[ i ].mss_dn.bv_val, 0, 0 );
377 * creates the "cn=Monitor" entry
379 snprintf( buf, sizeof( buf ),
380 "dn: " SLAPD_MONITOR_DN "\n"
382 "objectClass: LDAPsubEntry\n"
383 #ifdef SLAPD_MONITORSUBENTRY
384 "objectClass: monitorSubEntry\n"
385 #else /* !SLAPD_MONITORSUBENTRY */
386 "objectClass: extensibleObject\n"
387 #endif /* !SLAPD_MONITORSUBENTRY */
390 e = str2entry( buf );
393 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
394 "unable to create '%s' entry\n",
397 Debug( LDAP_DEBUG_ANY,
398 "unable to create '%s' entry\n%s%s",
399 SLAPD_MONITOR_DN, "", "" );
404 bv[0].bv_val = (char *) Versionstr;
405 end_of_line = strchr( Versionstr, '\n' );
407 bv[0].bv_len = end_of_line - Versionstr;
409 bv[0].bv_len = strlen( Versionstr );
411 if ( attr_merge( e, monitor_ad_desc, bv ) ) {
413 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
414 "unable to add description to '%s' entry\n",
417 Debug( LDAP_DEBUG_ANY,
418 "unable to add description to '%s' entry\n%s%s",
419 SLAPD_MONITOR_DN, "", "" );
424 mp = ( struct monitorentrypriv * )ch_calloc( sizeof( struct monitorentrypriv ), 1 );
425 e->e_private = ( void * )mp;
428 mp->mp_children = e_tmp;
431 if ( monitor_cache_add( mi, e ) ) {
433 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
434 "unable to add entry '%s' to cache\n",
437 Debug( LDAP_DEBUG_ANY,
438 "unable to add entry '%s' to cache\n%s%s",
439 SLAPD_MONITOR_DN, "", "" );
455 struct monitorsubsys *ms;
456 struct berval dn = { sizeof(SLAPD_MONITOR_DN)-1, SLAPD_MONITOR_DN };
461 * adds the monitor backend
463 rc = dnNormalize2( NULL, &dn, &ndn );
464 if( rc != LDAP_SUCCESS ) {
466 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
467 "monitor DN \"" SLAPD_MONITOR_DN "\" is invalid\n" ));
469 Debug( LDAP_DEBUG_ANY,
470 "monitor DN \"" SLAPD_MONITOR_DN "\" is invalid\n",
476 be = select_backend( &ndn , 0, 0 );
481 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
482 "unable to get monitor backend\n" ));
484 Debug( LDAP_DEBUG_ANY,
485 "unable to get monitor backend\n", 0, 0, 0 );
490 for ( ms = monitor_subsys; ms->mss_name != NULL; ms++ ) {
491 if ( ms->mss_init && ( *ms->mss_init )( be ) ) {
509 * eventually, will hold backend specific configuration parameters
515 monitor_back_db_config(
524 LDAP_LOG(( "config", LDAP_DEBUG_NOTICE,
525 "line %d of file '%s' will be ignored\n", lineno, fname ));
527 Debug( LDAP_DEBUG_CONFIG,
528 "line %d of file '%s' will be ignored\n%s", lineno, fname, "" );
534 monitor_back_db_destroy(
539 * FIXME: destroys all the data