1 /* init.c - initialize monitor backend */
3 * Copyright 1998-2002 The OpenLDAP Foundation, All Rights Reserved.
4 * COPYING RESTRICTIONS APPLY, see COPYRIGHT file
7 * Copyright 2001, Pierangelo Masarati, All rights reserved. <ando@sys-net.it>
9 * This work has beed deveolped for the OpenLDAP Foundation
10 * in the hope that it may be useful to the Open Source community,
11 * but WITHOUT ANY WARRANTY.
13 * Permission is granted to anyone to use this software for any purpose
14 * on any computer system, and to alter it and redistribute it, subject
15 * to the following restrictions:
17 * 1. The author and SysNet s.n.c. are not responsible for the consequences
18 * of use of this software, no matter how awful, even if they arise from
21 * 2. The origin of this software must not be misrepresented, either by
22 * explicit claim or by omission. Since few users ever read sources,
23 * credits should appear in the documentation.
25 * 3. Altered versions must be plainly marked as such, and must not be
26 * misrepresented as being the original software. Since few users
27 * ever read sources, credits should appear in the documentation.
28 * SysNet s.n.c. cannot be responsible for the consequences of the
31 * 4. This notice may not be removed or altered.
37 #include <ac/string.h>
40 #include "back-monitor.h"
43 * used by many functions to add description to entries
45 AttributeDescription *monitor_ad_desc = NULL;
46 BackendDB *be_monitor = NULL;
51 struct monitorsubsys monitor_subsys[] = {
53 SLAPD_MONITOR_LISTENER, SLAPD_MONITOR_LISTENER_NAME,
54 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
55 MONITOR_F_PERSISTENT_CH,
56 monitor_subsys_listener_init,
61 SLAPD_MONITOR_DATABASE, SLAPD_MONITOR_DATABASE_NAME,
62 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
63 MONITOR_F_PERSISTENT_CH,
64 monitor_subsys_database_init,
69 SLAPD_MONITOR_BACKEND, SLAPD_MONITOR_BACKEND_NAME,
70 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
71 MONITOR_F_PERSISTENT_CH,
72 monitor_subsys_backend_init,
77 SLAPD_MONITOR_THREAD, SLAPD_MONITOR_THREAD_NAME,
78 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
80 monitor_subsys_thread_init,
81 monitor_subsys_thread_update,
85 SLAPD_MONITOR_SASL, SLAPD_MONITOR_SASL_NAME,
86 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
93 SLAPD_MONITOR_TLS, SLAPD_MONITOR_TLS_NAME,
94 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
101 SLAPD_MONITOR_CONN, SLAPD_MONITOR_CONN_NAME,
102 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
103 MONITOR_F_VOLATILE_CH,
104 monitor_subsys_conn_init,
105 monitor_subsys_conn_update,
106 monitor_subsys_conn_create,
109 SLAPD_MONITOR_READW, SLAPD_MONITOR_READW_NAME,
110 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
113 monitor_subsys_readw_update,
117 SLAPD_MONITOR_WRITEW, SLAPD_MONITOR_WRITEW_NAME,
118 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
121 monitor_subsys_writew_update,
125 SLAPD_MONITOR_LOG, SLAPD_MONITOR_LOG_NAME,
126 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
128 monitor_subsys_log_init,
131 monitor_subsys_log_modify
133 SLAPD_MONITOR_OPS, SLAPD_MONITOR_OPS_NAME,
134 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
136 monitor_subsys_ops_init,
137 monitor_subsys_ops_update,
141 SLAPD_MONITOR_SENT, SLAPD_MONITOR_SENT_NAME,
142 { 0L, NULL }, { 0L, NULL }, { 0L, NULL },
144 monitor_subsys_sent_init,
145 monitor_subsys_sent_update,
152 monitor_back_initialize(
156 static char *controls[] = {
157 LDAP_CONTROL_MANAGEDSAIT,
161 bi->bi_controls = controls;
164 bi->bi_open = monitor_back_open;
165 bi->bi_config = monitor_back_config;
169 bi->bi_db_init = monitor_back_db_init;
170 bi->bi_db_config = monitor_back_db_config;
173 bi->bi_db_destroy = monitor_back_db_destroy;
175 bi->bi_op_bind = monitor_back_bind;
176 bi->bi_op_unbind = 0;
177 bi->bi_op_search = monitor_back_search;
178 bi->bi_op_compare = monitor_back_compare;
179 bi->bi_op_modify = monitor_back_modify;
180 bi->bi_op_modrdn = 0;
182 bi->bi_op_delete = 0;
183 bi->bi_op_abandon = 0;
187 bi->bi_entry_release_rw = 0;
188 bi->bi_acl_group = 0;
189 bi->bi_acl_attribute = 0;
190 bi->bi_chk_referrals = 0;
191 bi->bi_operational = monitor_back_operational;
194 * hooks for slap tools
196 bi->bi_tool_entry_open = 0;
197 bi->bi_tool_entry_close = 0;
198 bi->bi_tool_entry_first = 0;
199 bi->bi_tool_entry_next = 0;
200 bi->bi_tool_entry_get = 0;
201 bi->bi_tool_entry_put = 0;
202 bi->bi_tool_entry_reindex = 0;
203 bi->bi_tool_sync = 0;
205 bi->bi_connection_init = 0;
206 bi->bi_connection_destroy = 0;
212 monitor_back_db_init(
216 struct monitorinfo *mi;
218 struct monitorentrypriv *mp;
220 char buf[1024], *end_of_line;
221 struct berval dn, *ndn;
226 * database monitor can be defined once only
230 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
231 "only one monitor backend is allowed\n" ));
233 Debug( LDAP_DEBUG_ANY,
234 "only one monitor backend is allowed\n%s%s%s",
241 /* indicate system schema supported */
242 be->be_flags |= SLAP_BFLAG_MONITOR;
245 dn.bv_val = SLAPD_MONITOR_DN;
246 dn.bv_len = sizeof( SLAPD_MONITOR_DN ) - 1;
248 rc = dnNormalize( NULL, &dn, &ndn );
249 if( rc != LDAP_SUCCESS ) {
251 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
252 "monitor DN \"" SLAPD_MONITOR_DN "\" backend is allowed\n" ));
254 Debug( LDAP_DEBUG_ANY,
255 "monitor DN \"" SLAPD_MONITOR_DN "\" backend is allowed\n",
261 ber_bvecadd( &be->be_suffix, ber_dupbv( NULL, &dn ) );
262 ber_bvecadd( &be->be_nsuffix, ndn );
264 mi = ( struct monitorinfo * )ch_calloc( sizeof( struct monitorinfo ), 1 );
265 ldap_pvt_thread_mutex_init( &mi->mi_cache_mutex );
267 if ( slap_str2ad( "description", &monitor_ad_desc, &text ) ) {
269 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
270 "monitor_back_db_init: %s\n", text ));
272 Debug( LDAP_DEBUG_ANY,
273 "monitor_subsys_backend_init: %s\n%s%s",
280 * Create all the subsystem specific entries
283 for ( i = 0; monitor_subsys[ i ].mss_name != NULL; i++ ) {
284 int len = strlen( monitor_subsys[ i ].mss_name );
288 dn.bv_len = len + sizeof( "cn=" ) - 1;
289 dn.bv_val = ch_calloc( sizeof( char ), dn.bv_len + 1 );
290 strcpy( dn.bv_val, "cn=" );
291 strcat( dn.bv_val, monitor_subsys[ i ].mss_name );
292 rc = dnPretty2( NULL, &dn, &monitor_subsys[ i ].mss_rdn );
294 if ( rc != LDAP_SUCCESS ) {
296 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
297 "monitor RDN \"%s\" is invalid\n",
300 Debug( LDAP_DEBUG_ANY,
301 "monitor RDN \"%s\" is invalid\n",
307 dn.bv_len += sizeof( SLAPD_MONITOR_DN ); /* 1 for the , */
308 dn.bv_val = ch_malloc( dn.bv_len + 1 );
309 strcpy( dn.bv_val , monitor_subsys[ i ].mss_rdn.bv_val );
310 strcat( dn.bv_val, "," SLAPD_MONITOR_DN );
311 rc = dnPrettyNormal( NULL, &dn, &monitor_subsys[ i ].mss_dn,
312 &monitor_subsys[ i ].mss_ndn );
314 if ( rc != LDAP_SUCCESS ) {
316 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
317 "monitor DN \"%s\" is invalid\n",
320 Debug( LDAP_DEBUG_ANY,
321 "monitor DN \"%s\" is invalid\n",
327 snprintf( buf, sizeof( buf ),
329 SLAPD_MONITOR_OBJECTCLASSES
331 monitor_subsys[ i ].mss_dn.bv_val,
332 monitor_subsys[ i ].mss_name );
334 e = str2entry( buf );
338 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
339 "unable to create '%s' entry\n",
340 monitor_subsys[ i ].mss_dn.bv_val ));
342 Debug( LDAP_DEBUG_ANY,
343 "unable to create '%s' entry\n",
344 monitor_subsys[ i ].mss_dn.bv_val, 0, 0 );
349 mp = ( struct monitorentrypriv * )ch_calloc( sizeof( struct monitorentrypriv ), 1 );
350 e->e_private = ( void * )mp;
351 mp->mp_info = &monitor_subsys[ i ];
352 mp->mp_children = NULL;
354 mp->mp_flags = monitor_subsys[ i ].mss_flags;
356 if ( monitor_cache_add( mi, e ) ) {
358 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
359 "unable to add entry '%s' to cache\n",
360 monitor_subsys[ i ].mss_dn.bv_val ));
362 Debug( LDAP_DEBUG_ANY,
363 "unable to add entry '%s' to cache\n",
364 monitor_subsys[ i ].mss_dn.bv_val, 0, 0 );
373 * creates the "cn=Monitor" entry
375 snprintf( buf, sizeof( buf ),
376 "dn: " SLAPD_MONITOR_DN "\n"
378 "objectClass: monitor\n"
379 "objectClass: extensibleObject\n"
380 "structuralObjectClass: monitor\n"
383 e = str2entry( buf );
386 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
387 "unable to create '%s' entry\n",
390 Debug( LDAP_DEBUG_ANY,
391 "unable to create '%s' entry\n%s%s",
392 SLAPD_MONITOR_DN, "", "" );
397 bv[0].bv_val = (char *) Versionstr;
398 end_of_line = strchr( Versionstr, '\n' );
400 bv[0].bv_len = end_of_line - Versionstr;
402 bv[0].bv_len = strlen( Versionstr );
404 if ( attr_merge( e, monitor_ad_desc, bv ) ) {
406 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
407 "unable to add description to '%s' entry\n",
410 Debug( LDAP_DEBUG_ANY,
411 "unable to add description to '%s' entry\n%s%s",
412 SLAPD_MONITOR_DN, "", "" );
417 mp = ( struct monitorentrypriv * )ch_calloc( sizeof( struct monitorentrypriv ), 1 );
418 e->e_private = ( void * )mp;
421 mp->mp_children = e_tmp;
424 if ( monitor_cache_add( mi, e ) ) {
426 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
427 "unable to add entry '%s' to cache\n",
430 Debug( LDAP_DEBUG_ANY,
431 "unable to add entry '%s' to cache\n%s%s",
432 SLAPD_MONITOR_DN, "", "" );
448 struct monitorsubsys *ms;
449 struct berval dn = { sizeof(SLAPD_MONITOR_DN)-1, SLAPD_MONITOR_DN };
454 * adds the monitor backend
456 rc = dnNormalize2( NULL, &dn, &ndn );
457 if( rc != LDAP_SUCCESS ) {
459 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
460 "monitor DN \"" SLAPD_MONITOR_DN "\" is invalid\n" ));
462 Debug( LDAP_DEBUG_ANY,
463 "monitor DN \"" SLAPD_MONITOR_DN "\" is invalid\n",
469 be = select_backend( &ndn , 0, 0 );
474 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
475 "unable to get monitor backend\n" ));
477 Debug( LDAP_DEBUG_ANY,
478 "unable to get monitor backend\n", 0, 0, 0 );
483 for ( ms = monitor_subsys; ms->mss_name != NULL; ms++ ) {
484 if ( ms->mss_init && ( *ms->mss_init )( be ) ) {
502 * eventually, will hold backend specific configuration parameters
508 monitor_back_db_config(
517 LDAP_LOG(( "config", LDAP_DEBUG_NOTICE,
518 "line %d of file '%s' will be ignored\n", lineno, fname ));
520 Debug( LDAP_DEBUG_CONFIG,
521 "line %d of file '%s' will be ignored\n%s", lineno, fname, "" );
527 monitor_back_db_destroy(
532 * FIXME: destroys all the data