]> git.sur5r.net Git - openldap/blob - servers/slapd/back-monitor/init.c
add overlay subsystem and connect it to databases
[openldap] / servers / slapd / back-monitor / init.c
1 /* init.c - initialize monitor backend */
2 /* $OpenLDAP$ */
3 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
4  *
5  * Copyright 2001-2004 The OpenLDAP Foundation.
6  * Portions Copyright 2001-2003 Pierangelo Masarati.
7  * All rights reserved.
8  *
9  * Redistribution and use in source and binary forms, with or without
10  * modification, are permitted only as authorized by the OpenLDAP
11  * Public License.
12  *
13  * A copy of this license is available in file LICENSE in the
14  * top-level directory of the distribution or, alternatively, at
15  * <http://www.OpenLDAP.org/license.html>.
16  */
17 /* ACKNOWLEDGEMENTS:
18  * This work was initially developed by Pierangelo Masarati for inclusion
19  * in OpenLDAP Software.
20  */
21
22 #include "portable.h"
23
24 #include <stdio.h>
25 #include <ac/string.h>
26
27 #include <lutil.h>
28 #include "slap.h"
29 #include "lber_pvt.h"
30 #include "back-monitor.h"
31
32 #undef INTEGRATE_CORE_SCHEMA
33
34 /*
35  * used by many functions to add description to entries
36  */
37 BackendDB *be_monitor = NULL;
38
39 /*
40  * subsystem data
41  */
42 struct monitorsubsys monitor_subsys[] = {
43         { 
44                 SLAPD_MONITOR_LISTENER, SLAPD_MONITOR_LISTENER_NAME,    
45                 BER_BVNULL, BER_BVNULL, BER_BVNULL,
46                 MONITOR_F_PERSISTENT_CH,
47                 monitor_subsys_listener_init,
48                 NULL,   /* update */
49                 NULL,   /* create */
50                 NULL    /* modify */
51         }, { 
52                 SLAPD_MONITOR_DATABASE, SLAPD_MONITOR_DATABASE_NAME,    
53                 BER_BVNULL, BER_BVNULL, BER_BVNULL,
54                 MONITOR_F_PERSISTENT_CH,
55                 monitor_subsys_database_init,
56                 NULL,   /* update */
57                 NULL,   /* create */
58                 NULL    /* modify */
59         }, { 
60                 SLAPD_MONITOR_BACKEND, SLAPD_MONITOR_BACKEND_NAME, 
61                 BER_BVNULL, BER_BVNULL, BER_BVNULL,
62                 MONITOR_F_PERSISTENT_CH,
63                 monitor_subsys_backend_init,
64                 NULL,   /* update */
65                 NULL,   /* create */
66                 NULL    /* modify */
67         }, { 
68                 SLAPD_MONITOR_THREAD, SLAPD_MONITOR_THREAD_NAME,        
69                 BER_BVNULL, BER_BVNULL, BER_BVNULL,
70                 MONITOR_F_NONE,
71                 monitor_subsys_thread_init,
72                 monitor_subsys_thread_update,
73                 NULL,   /* create */
74                 NULL    /* modify */
75         }, { 
76                 SLAPD_MONITOR_SASL, SLAPD_MONITOR_SASL_NAME,    
77                 BER_BVNULL, BER_BVNULL, BER_BVNULL,
78                 MONITOR_F_NONE,
79                 NULL,   /* init */
80                 NULL,   /* update */
81                 NULL,   /* create */
82                 NULL    /* modify */
83         }, { 
84                 SLAPD_MONITOR_TLS, SLAPD_MONITOR_TLS_NAME,
85                 BER_BVNULL, BER_BVNULL, BER_BVNULL,
86                 MONITOR_F_NONE,
87                 NULL,   /* init */
88                 NULL,   /* update */
89                 NULL,   /* create */
90                 NULL    /* modify */
91         }, { 
92                 SLAPD_MONITOR_CONN, SLAPD_MONITOR_CONN_NAME,
93                 BER_BVNULL, BER_BVNULL, BER_BVNULL,
94                 MONITOR_F_VOLATILE_CH,
95                 monitor_subsys_conn_init,
96                 monitor_subsys_conn_update,
97                 monitor_subsys_conn_create,
98                 NULL    /* modify */
99         }, { 
100                 SLAPD_MONITOR_RWW, SLAPD_MONITOR_RWW_NAME,
101                 BER_BVNULL, BER_BVNULL, BER_BVNULL,
102                 MONITOR_F_PERSISTENT_CH,
103                 monitor_subsys_rww_init,
104                 monitor_subsys_rww_update,
105                 NULL,   /* create */
106                 NULL    /* modify */
107         }, { 
108                 SLAPD_MONITOR_LOG, SLAPD_MONITOR_LOG_NAME,
109                 BER_BVNULL, BER_BVNULL, BER_BVNULL,
110                 MONITOR_F_NONE,
111                 monitor_subsys_log_init,
112                 NULL,   /* update */
113                 NULL,   /* create */
114                 monitor_subsys_log_modify
115         }, { 
116                 SLAPD_MONITOR_OPS, SLAPD_MONITOR_OPS_NAME,
117                 BER_BVNULL, BER_BVNULL, BER_BVNULL,
118                 MONITOR_F_PERSISTENT_CH,
119                 monitor_subsys_ops_init,
120                 monitor_subsys_ops_update,
121                 NULL,   /* create */
122                 NULL,   /* modify */
123         }, { 
124                 SLAPD_MONITOR_SENT, SLAPD_MONITOR_SENT_NAME,
125                 BER_BVNULL, BER_BVNULL, BER_BVNULL,
126                 MONITOR_F_PERSISTENT_CH,
127                 monitor_subsys_sent_init,
128                 monitor_subsys_sent_update,
129                 NULL,   /* create */
130                 NULL,   /* modify */
131         }, { 
132                 SLAPD_MONITOR_TIME, SLAPD_MONITOR_TIME_NAME,
133                 BER_BVNULL, BER_BVNULL, BER_BVNULL,
134                 MONITOR_F_PERSISTENT_CH,
135                 monitor_subsys_time_init,
136                 monitor_subsys_time_update,
137                 NULL,   /* create */
138                 NULL,   /* modify */
139         }, { 
140                 SLAPD_MONITOR_OVERLAY, SLAPD_MONITOR_OVERLAY_NAME,
141                 BER_BVNULL, BER_BVNULL, BER_BVNULL,
142                 MONITOR_F_PERSISTENT_CH,
143                 monitor_subsys_overlay_init,
144                 NULL,   /* update */
145                 NULL,   /* create */
146                 NULL,   /* modify */
147         }, { -1, NULL }
148 };
149
150 #ifdef SLAPD_MONITOR_DYNAMIC
151
152 int
153 init_module( int argc, char *argv[] )
154 {
155         BackendInfo bi;
156
157         memset( &bi, '\0', sizeof(bi) );
158         bi.bi_type = "monitor";
159         bi.bi_init = monitor_back_initialize;
160         backend_add( &bi );
161         return 0;
162 }
163
164 #endif /* SLAPD_MONITOR_DYNAMIC */
165
166 int
167 monitor_back_initialize(
168         BackendInfo     *bi
169 )
170 {
171         static char *controls[] = {
172                 LDAP_CONTROL_MANAGEDSAIT,
173                 LDAP_CONTROL_VALUESRETURNFILTER,
174                 NULL
175         };
176
177         bi->bi_controls = controls;
178
179         bi->bi_init = 0;
180         bi->bi_open = 0;
181         bi->bi_config = monitor_back_config;
182         bi->bi_close = 0;
183         bi->bi_destroy = 0;
184
185         bi->bi_db_init = monitor_back_db_init;
186         bi->bi_db_config = monitor_back_db_config;
187         bi->bi_db_open = monitor_back_db_open;
188         bi->bi_db_close = 0;
189         bi->bi_db_destroy = monitor_back_db_destroy;
190
191         bi->bi_op_bind = monitor_back_bind;
192         bi->bi_op_unbind = 0;
193         bi->bi_op_search = monitor_back_search;
194         bi->bi_op_compare = monitor_back_compare;
195         bi->bi_op_modify = monitor_back_modify;
196         bi->bi_op_modrdn = 0;
197         bi->bi_op_add = 0;
198         bi->bi_op_delete = 0;
199         bi->bi_op_abandon = 0;
200
201         bi->bi_extended = 0;
202
203         bi->bi_entry_release_rw = 0;
204         bi->bi_chk_referrals = 0;
205         bi->bi_operational = monitor_back_operational;
206
207         /*
208          * hooks for slap tools
209          */
210         bi->bi_tool_entry_open = 0;
211         bi->bi_tool_entry_close = 0;
212         bi->bi_tool_entry_first = 0;
213         bi->bi_tool_entry_next = 0;
214         bi->bi_tool_entry_get = 0;
215         bi->bi_tool_entry_put = 0;
216         bi->bi_tool_entry_reindex = 0;
217         bi->bi_tool_sync = 0;
218         bi->bi_tool_dn2id_get = 0;
219         bi->bi_tool_id2entry_get = 0;
220         bi->bi_tool_entry_modify = 0;
221
222         bi->bi_connection_init = 0;
223         bi->bi_connection_destroy = 0;
224
225         return 0;
226 }
227
228 int
229 monitor_back_db_init(
230         BackendDB       *be
231 )
232 {
233         struct monitorinfo      *mi;
234         int                     rc;
235         struct berval           dn, ndn;
236         struct berval           bv;
237
238         /*
239          * database monitor can be defined once only
240          */
241         if ( be_monitor ) {
242 #ifdef NEW_LOGGING
243                 LDAP_LOG( OPERATION, CRIT,
244                         "only one monitor backend is allowed\n", 0, 0, 0);
245 #else
246                 Debug( LDAP_DEBUG_ANY,
247                         "only one monitor backend is allowed\n", 0, 0, 0 );
248 #endif
249                 return( -1 );
250         }
251         be_monitor = be;
252
253         /* indicate system schema supported */
254         be->be_flags |= SLAP_BFLAG_MONITOR;
255
256         dn.bv_val = SLAPD_MONITOR_DN;
257         dn.bv_len = sizeof( SLAPD_MONITOR_DN ) - 1;
258
259         rc = dnNormalize( 0, NULL, NULL, &dn, &ndn, NULL );
260         if( rc != LDAP_SUCCESS ) {
261 #ifdef NEW_LOGGING
262                 LDAP_LOG( OPERATION, CRIT,
263                         "unable to normalize monitor DN \"%s\"\n",
264                         SLAPD_MONITOR_DN, 0, 0 );
265 #else
266                 Debug( LDAP_DEBUG_ANY,
267                         "unable to normalize monitor DN \"%s\"\n",
268                         SLAPD_MONITOR_DN, 0, 0 );
269 #endif
270                 return -1;
271         }
272
273         ber_dupbv( &bv, &dn );
274         ber_bvarray_add( &be->be_suffix, &bv );
275         ber_bvarray_add( &be->be_nsuffix, &ndn );
276
277         mi = ( struct monitorinfo * )ch_calloc( sizeof( struct monitorinfo ), 1 );
278         if ( mi == NULL ) {
279 #ifdef NEW_LOGGING
280                 LDAP_LOG( OPERATION, CRIT,
281                         "unable to initialize monitor backend\n", 0, 0, 0 );
282 #else
283                 Debug( LDAP_DEBUG_ANY,
284                         "unable to initialize monitor backend\n", 0, 0, 0 );
285 #endif
286                 return -1;
287         }
288
289         memset( mi, 0, sizeof( struct monitorinfo ) );
290
291         ldap_pvt_thread_mutex_init( &mi->mi_cache_mutex );
292
293         be->be_private = mi;
294         
295         return 0;
296 }
297
298 int
299 monitor_back_db_open(
300         BackendDB       *be
301 )
302 {
303         struct monitorinfo      *mi = (struct monitorinfo *)be->be_private;
304         struct monitorsubsys    *ms;
305         Entry                   *e, *e_tmp;
306         struct monitorentrypriv *mp;
307         int                     i, k;
308         char                    buf[ BACKMONITOR_BUFSIZE ], *end_of_line;
309         const char              *text;
310         struct berval           bv;
311         struct m_s {
312                 char    *name;
313                 char    *schema;
314                 slap_mask_t flags;
315                 int     offset;
316         } moc[] = {
317                 { "monitor", "( 1.3.6.1.4.1.4203.666.3.2 "
318                         "NAME 'monitor' "
319                         "DESC 'OpenLDAP system monitoring' "
320                         "SUP top STRUCTURAL "
321                         "MUST cn "
322                         "MAY ( "
323                                 "description "
324                                 "$ l "
325 #if 0   /* temporarily disabled */
326                                 "$ st "
327                                 "$ street "
328                                 "$ postalAddress "
329                                 "$ postalCode "
330 #endif
331                                 "$ seeAlso "
332                                 "$ monitoredInfo "
333                                 "$ managedInfo "
334                                 "$ monitorOverlay "
335                         ") )", SLAP_OC_OPERATIONAL|SLAP_OC_HIDE,
336                         offsetof(struct monitorinfo, mi_oc_monitor) },
337                 { "monitorServer", "( 1.3.6.1.4.1.4203.666.3.7 "
338                         "NAME 'monitorServer' "
339                         "DESC 'Server monitoring root entry' "
340                         "SUP monitor STRUCTURAL )", SLAP_OC_OPERATIONAL|SLAP_OC_HIDE,
341                         offsetof(struct monitorinfo, mi_oc_monitorServer) },
342                 { "monitorContainer", "( 1.3.6.1.4.1.4203.666.3.8 "
343                         "NAME 'monitorContainer' "
344                         "DESC 'monitor container class' "
345                         "SUP monitor STRUCTURAL )", SLAP_OC_OPERATIONAL|SLAP_OC_HIDE,
346                         offsetof(struct monitorinfo, mi_oc_monitorContainer) },
347                 { "monitorCounterObject", "( 1.3.6.1.4.1.4203.666.3.9 "
348                         "NAME 'monitorCounterObject' "
349                         "DESC 'monitor counter class' "
350                         "SUP monitor STRUCTURAL )", SLAP_OC_OPERATIONAL|SLAP_OC_HIDE,
351                         offsetof(struct monitorinfo, mi_oc_monitorCounterObject) },
352                 { "monitorOperation", "( 1.3.6.1.4.1.4203.666.3.10 "
353                         "NAME 'monitorOperation' "
354                         "DESC 'monitor operation class' "
355                         "SUP monitor STRUCTURAL )", SLAP_OC_OPERATIONAL|SLAP_OC_HIDE,
356                         offsetof(struct monitorinfo, mi_oc_monitorOperation) },
357                 { "monitorConnection", "( 1.3.6.1.4.1.4203.666.3.11 "
358                         "NAME 'monitorConnection' "
359                         "DESC 'monitor connection class' "
360                         "SUP monitor STRUCTURAL )", SLAP_OC_OPERATIONAL|SLAP_OC_HIDE,
361                         offsetof(struct monitorinfo, mi_oc_monitorConnection) },
362                 { "managedObject", "( 1.3.6.1.4.1.4203.666.3.12 "
363                         "NAME 'managedObject' "
364                         "DESC 'monitor managed entity class' "
365                         "SUP monitor STRUCTURAL )", SLAP_OC_OPERATIONAL|SLAP_OC_HIDE,
366                         offsetof(struct monitorinfo, mi_oc_managedObject) },
367                 { "monitoredObject", "( 1.3.6.1.4.1.4203.666.3.13 "
368                         "NAME 'monitoredObject' "
369                         "DESC 'monitor monitored entity class' "
370                         "SUP monitor STRUCTURAL )", SLAP_OC_OPERATIONAL|SLAP_OC_HIDE,
371                         offsetof(struct monitorinfo, mi_oc_monitoredObject) },
372                 { NULL, NULL, 0, -1 }
373         }, mat[] = {
374                 { "monitoredInfo", "( 1.3.6.1.4.1.4203.666.1.14 "
375                         "NAME 'monitoredInfo' "
376                         "DESC 'monitored info' "
377                         /* "SUP name " */
378                         "EQUALITY caseIgnoreMatch "
379                         "SUBSTR caseIgnoreSubstringsMatch "
380                         "SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{32768} "
381                         "NO-USER-MODIFICATION "
382                         "USAGE directoryOperation )", SLAP_AT_HIDE,
383                         offsetof(struct monitorinfo, mi_ad_monitoredInfo) },
384                 { "managedInfo", "( 1.3.6.1.4.1.4203.666.1.15 "
385                         "NAME 'managedInfo' "
386                         "DESC 'monitor managed info' "
387                         "SUP name )", SLAP_AT_HIDE,
388                         offsetof(struct monitorinfo, mi_ad_managedInfo) },
389                 { "monitorCounter", "( 1.3.6.1.4.1.4203.666.1.16 "
390                         "NAME 'monitorCounter' "
391                         "DESC 'monitor counter' "
392                         "EQUALITY integerMatch "
393                         "ORDERING integerOrderingMatch "
394                         "SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 "
395                         "NO-USER-MODIFICATION "
396                         "USAGE directoryOperation )", SLAP_AT_HIDE,
397                         offsetof(struct monitorinfo, mi_ad_monitorCounter) },
398                 { "monitorOpCompleted", "( 1.3.6.1.4.1.4203.666.1.17 "
399                         "NAME 'monitorOpCompleted' "
400                         "DESC 'monitor completed operations' "
401                         "SUP monitorCounter "
402                         "NO-USER-MODIFICATION "
403                         "USAGE directoryOperation )", SLAP_AT_FINAL|SLAP_AT_HIDE,
404                         offsetof(struct monitorinfo, mi_ad_monitorOpCompleted) },
405                 { "monitorOpInitiated", "( 1.3.6.1.4.1.4203.666.1.18 "
406                         "NAME 'monitorOpInitiated' "
407                         "DESC 'monitor initiated operations' "
408                         "SUP monitorCounter "
409                         "NO-USER-MODIFICATION "
410                         "USAGE directoryOperation )", SLAP_AT_FINAL|SLAP_AT_HIDE,
411                         offsetof(struct monitorinfo, mi_ad_monitorOpInitiated) },
412                 { "monitorConnectionNumber", "( 1.3.6.1.4.1.4203.666.1.19 "
413                         "NAME 'monitorConnectionNumber' "
414                         "DESC 'monitor connection number' "
415                         "SUP monitorCounter "
416                         "NO-USER-MODIFICATION "
417                         "USAGE directoryOperation )", SLAP_AT_FINAL|SLAP_AT_HIDE,
418                         offsetof(struct monitorinfo, mi_ad_monitorConnectionNumber) },
419                 { "monitorConnectionAuthzDN", "( 1.3.6.1.4.1.4203.666.1.20 "
420                         "NAME 'monitorConnectionAuthzDN' "
421                         "DESC 'monitor connection authorization DN' "
422                         /* "SUP distinguishedName " */
423                         "EQUALITY distinguishedNameMatch "
424                         "SYNTAX 1.3.6.1.4.1.1466.115.121.1.12 "
425                         "NO-USER-MODIFICATION "
426                         "USAGE directoryOperation )", SLAP_AT_FINAL|SLAP_AT_HIDE,
427                         offsetof(struct monitorinfo, mi_ad_monitorConnectionAuthzDN) },
428                 { "monitorConnectionLocalAddress", "( 1.3.6.1.4.1.4203.666.1.21 "
429                         "NAME 'monitorConnectionLocalAddress' "
430                         "DESC 'monitor connection local address' "
431                         "SUP monitoredInfo "
432                         "NO-USER-MODIFICATION "
433                         "USAGE directoryOperation )", SLAP_AT_FINAL|SLAP_AT_HIDE,
434                         offsetof(struct monitorinfo, mi_ad_monitorConnectionLocalAddress) },
435                 { "monitorConnectionPeerAddress", "( 1.3.6.1.4.1.4203.666.1.22 "
436                         "NAME 'monitorConnectionPeerAddress' "
437                         "DESC 'monitor connection peer address' "
438                         "SUP monitoredInfo "
439                         "NO-USER-MODIFICATION "
440                         "USAGE directoryOperation )", SLAP_AT_FINAL|SLAP_AT_HIDE,
441                         offsetof(struct monitorinfo, mi_ad_monitorConnectionPeerAddress) },
442                 { "monitorTimestamp", "( 1.3.6.1.4.1.4203.666.1.24 "
443                         "NAME 'monitorTimestamp' "
444                         "DESC 'monitor timestamp' "
445                         "EQUALITY generalizedTimeMatch "
446                         "ORDERING generalizedTimeOrderingMatch "
447                         "SYNTAX 1.3.6.1.4.1.1466.115.121.1.24 "
448                         "SINGLE-VALUE "
449                         "NO-USER-MODIFICATION "
450                         "USAGE directoryOperation )", SLAP_AT_FINAL|SLAP_AT_HIDE,
451                         offsetof(struct monitorinfo, mi_ad_monitorTimestamp) },
452                 { "monitorOverlay", "( 1.3.6.1.4.1.4203.666.1.27 "
453                         "NAME 'monitorOverlay' "
454                         "DESC 'name of overlays defined for a give database' "
455                         "SUP monitoredInfo "
456                         "NO-USER-MODIFICATION "
457                         "USAGE directoryOperation )", SLAP_AT_HIDE,
458                         offsetof(struct monitorinfo, mi_ad_monitorOverlay) },
459 #ifdef INTEGRATE_CORE_SCHEMA
460                 { NULL, NULL, 0, -1 },  /* description */
461                 { NULL, NULL, 0, -1 },  /* seeAlso */
462                 { NULL, NULL, 0, -1 },  /* l */
463 #endif /* INTEGRATE_CORE_SCHEMA */
464                 { NULL, NULL, 0, -1 }
465         }, mat_core[] = {
466                 { "description", "( 2.5.4.13 "
467                         "NAME 'description' "
468                         "DESC 'RFC2256: descriptive information' "
469                         "EQUALITY caseIgnoreMatch "
470                         "SUBSTR caseIgnoreSubstringsMatch "
471                         "SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{1024} )", 0,
472                         offsetof(struct monitorinfo, mi_ad_description) },
473                 { "seeAlso", "( 2.5.4.34 "
474                         "NAME 'seeAlso' "
475                         "DESC 'RFC2256: DN of related object' "
476                         "SUP distinguishedName )", 0,
477                         offsetof(struct monitorinfo, mi_ad_seeAlso) },
478                 { "l", "( 2.5.4.7 "
479                         "NAME ( 'l' 'localityName' ) "
480                         "DESC 'RFC2256: locality which this object resides in' "
481                         "SUP name )", 0,
482                         offsetof(struct monitorinfo, mi_ad_l) },
483                 { NULL, NULL, 0, -1 }
484         };
485         
486         struct tm               *tms;
487 #ifdef HAVE_GMTIME_R
488         struct tm               tm_buf;
489 #endif
490         static char             tmbuf[ LDAP_LUTIL_GENTIME_BUFSIZE ];
491
492         /*
493          * Start
494          */
495 #ifndef HAVE_GMTIME_R
496         ldap_pvt_thread_mutex_lock( &gmtime_mutex );
497 #endif
498 #ifdef HACK_LOCAL_TIME
499 # ifdef HAVE_LOCALTIME_R
500         tms = localtime_r( &starttime, &tm_buf );
501 # else
502         tms = localtime( &starttime );
503 # endif /* HAVE_LOCALTIME_R */
504         lutil_localtime( tmbuf, sizeof(tmbuf), tms, -timezone );
505 #else /* !HACK_LOCAL_TIME */
506 # ifdef HAVE_GMTIME_R
507         tms = gmtime_r( &starttime, &tm_buf );
508 # else
509         tms = gmtime( &starttime );
510 # endif /* HAVE_GMTIME_R */
511         lutil_gentime( tmbuf, sizeof(tmbuf), tms );
512 #endif /* !HACK_LOCAL_TIME */
513 #ifndef HAVE_GMTIME_R
514         ldap_pvt_thread_mutex_unlock( &gmtime_mutex );
515 #endif
516
517         mi->mi_startTime.bv_val = tmbuf;
518         mi->mi_startTime.bv_len = strlen( tmbuf );
519
520 #ifdef INTEGRATE_CORE_SCHEMA
521         /* prepare for schema integration */
522         for ( k = 0; mat[k].name != NULL; k++ );
523 #endif /* INTEGRATE_CORE_SCHEMA */
524
525         for ( i = 0; mat_core[i].name != NULL; i++ ) {
526                 AttributeDescription    **ad;
527                 const char              *text;
528
529                 ad = ((AttributeDescription **)&(((char *)mi)[mat_core[i].offset]));
530                 ad[0] = NULL;
531
532                 switch (slap_str2ad( mat_core[i].name, ad, &text ) ) {
533                 case LDAP_SUCCESS:
534                         break;
535
536 #ifdef INTEGRATE_CORE_SCHEMA
537                 case LDAP_UNDEFINED_TYPE:
538                         mat[k] = mat_core[i];
539                         k++;
540                         break;
541 #endif /* INTEGRATE_CORE_SCHEMA */
542
543                 default:
544 #ifdef NEW_LOGGING
545                         LDAP_LOG( OPERATION, CRIT,
546                                 "monitor_back_db_init: %s: %s\n",
547                                 mat_core[i].name, text, 0 );
548 #else
549                         Debug( LDAP_DEBUG_ANY,
550                                 "monitor_back_db_init: %s: %s\n",
551                                 mat_core[i].name, text, 0 );
552 #endif
553                         return( -1 );
554                 }
555         }
556
557         /* schema integration */
558         for ( i = 0; mat[i].name; i++ ) {
559                 LDAPAttributeType       *at;
560                 int                     code;
561                 const char              *err;
562                 AttributeDescription    **ad;
563
564                 at = ldap_str2attributetype( mat[i].schema, &code,
565                         &err, LDAP_SCHEMA_ALLOW_ALL );
566                 if ( !at ) {
567 #ifdef NEW_LOGGING
568                         LDAP_LOG( OPERATION, CRIT, "monitor_back_db_init: "
569                                 "in AttributeType '%s' %s before %s\n",
570                                 mat[i].name, ldap_scherr2str(code), err );
571 #else
572                         Debug( LDAP_DEBUG_ANY, "monitor_back_db_init: "
573                                 "in AttributeType '%s' %s before %s\n",
574                                 mat[i].name, ldap_scherr2str(code), err );
575 #endif
576                         return -1;
577                 }
578
579                 if ( at->at_oid == NULL ) {
580 #ifdef NEW_LOGGING
581                         LDAP_LOG( OPERATION, CRIT, "monitor_back_db_init: "
582                                 "null OID for attributeType '%s'\n",
583                                 mat[i].name, 0, 0 );
584 #else
585                         Debug( LDAP_DEBUG_ANY, "monitor_back_db_init: "
586                                 "null OID for attributeType '%s'\n",
587                                 mat[i].name, 0, 0 );
588 #endif
589                         return -1;
590                 }
591
592                 code = at_add(at, &err);
593                 if ( code ) {
594 #ifdef NEW_LOGGING
595                         LDAP_LOG( OPERATION, CRIT, "monitor_back_db_init: "
596                                 "%s in attributeType '%s'\n",
597                                 scherr2str(code), mat[i].name, 0 );
598 #else
599                         Debug( LDAP_DEBUG_ANY, "monitor_back_db_init: "
600                                 "%s in attributeType '%s'\n",
601                                 scherr2str(code), mat[i].name, 0 );
602 #endif
603                         return -1;
604                 }
605                 ldap_memfree(at);
606
607                 ad = ((AttributeDescription **)&(((char *)mi)[mat[i].offset]));
608                 ad[0] = NULL;
609                 if ( slap_str2ad( mat[i].name, ad, &text ) ) {
610 #ifdef NEW_LOGGING
611                         LDAP_LOG( OPERATION, CRIT,
612                                 "monitor_back_db_init: %s\n", text, 0, 0 );
613 #else
614                         Debug( LDAP_DEBUG_ANY,
615                                 "monitor_back_db_init: %s\n", text, 0, 0 );
616 #endif
617                         return -1;
618                 }
619
620                 (*ad)->ad_type->sat_flags |= mat[i].flags;
621         }
622
623         for ( i = 0; moc[i].name; i++ ) {
624                 LDAPObjectClass         *oc;
625                 int                     code;
626                 const char              *err;
627                 ObjectClass             *Oc;
628
629                 oc = ldap_str2objectclass(moc[i].schema, &code, &err,
630                                 LDAP_SCHEMA_ALLOW_ALL );
631                 if ( !oc ) {
632 #ifdef NEW_LOGGING
633                         LDAP_LOG( OPERATION, CRIT,
634                                 "unable to parse monitor objectclass '%s': "
635                                 "%s before %s\n" , moc[i].name,
636                                 ldap_scherr2str(code), err );
637 #else
638                         Debug( LDAP_DEBUG_ANY,
639                                 "unable to parse monitor objectclass '%s': "
640                                 "%s before %s\n" , moc[i].name,
641                                 ldap_scherr2str(code), err );
642 #endif
643                         return -1;
644                 }
645
646                 if ( oc->oc_oid == NULL ) {
647 #ifdef NEW_LOGGING
648                         LDAP_LOG( OPERATION, CRIT,
649                                 "objectclass '%s' has no OID\n" ,
650                                 moc[i].name, 0, 0 );
651 #else
652                         Debug( LDAP_DEBUG_ANY,
653                                 "objectclass '%s' has no OID\n" ,
654                                 moc[i].name, 0, 0 );
655 #endif
656                         return -1;
657                 }
658
659                 code = oc_add(oc, 0, &err);
660                 if ( code ) {
661 #ifdef NEW_LOGGING
662                         LDAP_LOG( OPERATION, CRIT,
663                                 "objectclass '%s': %s \"%s\"\n" ,
664                                 moc[i].name, scherr2str(code), err );
665 #else
666                         Debug( LDAP_DEBUG_ANY,
667                                 "objectclass '%s': %s \"%s\"\n" ,
668                                 moc[i].name, scherr2str(code), err );
669 #endif
670                         return -1;
671                 }
672
673                 ldap_memfree(oc);
674
675                 Oc = oc_find( moc[i].name );
676                 if ( Oc == NULL ) {
677 #ifdef NEW_LOGGING
678                         LDAP_LOG( OPERATION, CRIT, "monitor_back_db_init: "
679                                         "unable to find objectClass %s "
680                                         "(just added)\n", moc[i].name, 0, 0 );
681 #else
682                         Debug( LDAP_DEBUG_ANY, "monitor_back_db_init: "
683                                         "unable to find objectClass %s "
684                                         "(just added)\n", moc[i].name, 0, 0 );
685 #endif
686                         return -1;
687                 }
688
689                 Oc->soc_flags |= moc[i].flags;
690
691                 ((ObjectClass **)&(((char *)mi)[moc[i].offset]))[0] = Oc;
692         }
693
694         /*      
695          * Create all the subsystem specific entries
696          */
697         e_tmp = NULL;
698         for ( i = 0; monitor_subsys[ i ].mss_name != NULL; i++ ) {
699                 int             len = strlen( monitor_subsys[ i ].mss_name );
700                 struct berval   dn;
701                 int             rc;
702
703                 dn.bv_len = len + sizeof( "cn=" ) - 1;
704                 dn.bv_val = ch_calloc( sizeof( char ), dn.bv_len + 1 );
705                 strcpy( dn.bv_val, "cn=" );
706                 strcat( dn.bv_val, monitor_subsys[ i ].mss_name );
707                 rc = dnPretty( NULL, &dn, &monitor_subsys[ i ].mss_rdn, NULL );
708                 free( dn.bv_val );
709                 if ( rc != LDAP_SUCCESS ) {
710 #ifdef NEW_LOGGING
711                         LDAP_LOG( OPERATION, CRIT,
712                                 "monitor RDN \"%s\" is invalid\n", 
713                                 dn.bv_val, 0, 0 );
714 #else
715                         Debug( LDAP_DEBUG_ANY,
716                                 "monitor RDN \"%s\" is invalid\n", 
717                                 dn.bv_val, 0, 0 );
718 #endif
719                         return( -1 );
720                 }
721
722                 dn.bv_len += sizeof( SLAPD_MONITOR_DN ); /* 1 for the , */
723                 dn.bv_val = ch_malloc( dn.bv_len + 1 );
724                 strcpy( dn.bv_val , monitor_subsys[ i ].mss_rdn.bv_val );
725                 strcat( dn.bv_val, "," SLAPD_MONITOR_DN );
726                 rc = dnPrettyNormal( NULL, &dn, &monitor_subsys[ i ].mss_dn,
727                         &monitor_subsys[ i ].mss_ndn, NULL );
728                 free( dn.bv_val );
729                 if ( rc != LDAP_SUCCESS ) {
730 #ifdef NEW_LOGGING
731                         LDAP_LOG( OPERATION, CRIT,
732                                 "monitor DN \"%s\" is invalid\n", 
733                                 dn.bv_val, 0, 0 );
734 #else
735                         Debug( LDAP_DEBUG_ANY,
736                                 "monitor DN \"%s\" is invalid\n", 
737                                 dn.bv_val, 0, 0 );
738 #endif
739                         return( -1 );
740                 }
741
742                 snprintf( buf, sizeof( buf ),
743                                 "dn: %s\n"
744                                 "objectClass: %s\n"
745                                 "structuralObjectClass: %s\n"
746                                 "cn: %s\n"
747                                 "createTimestamp: %s\n"
748                                 "modifyTimestamp: %s\n",
749                                 monitor_subsys[ i ].mss_dn.bv_val,
750                                 mi->mi_oc_monitorContainer->soc_cname.bv_val,
751                                 mi->mi_oc_monitorContainer->soc_cname.bv_val,
752                                 monitor_subsys[ i ].mss_name,
753                                 mi->mi_startTime.bv_val,
754                                 mi->mi_startTime.bv_val );
755                 
756                 e = str2entry( buf );
757                 
758                 if ( e == NULL) {
759 #ifdef NEW_LOGGING
760                         LDAP_LOG( OPERATION, CRIT,
761                                 "unable to create '%s' entry\n", 
762                                 monitor_subsys[ i ].mss_dn.bv_val, 0, 0 );
763 #else
764                         Debug( LDAP_DEBUG_ANY,
765                                 "unable to create '%s' entry\n", 
766                                 monitor_subsys[ i ].mss_dn.bv_val, 0, 0 );
767 #endif
768                         return( -1 );
769                 }
770
771                 mp = ( struct monitorentrypriv * )ch_calloc( sizeof( struct monitorentrypriv ), 1 );
772                 e->e_private = ( void * )mp;
773                 mp->mp_info = &monitor_subsys[ i ];
774                 mp->mp_children = NULL;
775                 mp->mp_next = e_tmp;
776                 mp->mp_flags = monitor_subsys[ i ].mss_flags;
777
778                 if ( monitor_cache_add( mi, e ) ) {
779 #ifdef NEW_LOGGING
780                         LDAP_LOG( OPERATION, CRIT,
781                                 "unable to add entry '%s' to cache\n",
782                                 monitor_subsys[ i ].mss_dn.bv_val, 0, 0 );
783 #else
784                         Debug( LDAP_DEBUG_ANY,
785                                 "unable to add entry '%s' to cache\n",
786                                 monitor_subsys[ i ].mss_dn.bv_val, 0, 0 );
787 #endif
788                         return -1;
789                 }
790
791                 e_tmp = e;
792         }
793
794         /*
795          * creates the "cn=Monitor" entry 
796          */
797         snprintf( buf, sizeof( buf ), 
798                 "dn: %s\n"
799                 "objectClass: %s\n"
800                 "structuralObjectClass: %s\n"
801                 "cn: Monitor\n"
802                 "%s: This subtree contains monitoring/managing objects.\n"
803                 "%s: This object contains information about this server.\n"
804 #if 0
805                 "%s: createTimestamp reflects the time this server instance was created.\n"
806                 "%s: modifyTimestamp reflects the time this server instance was last accessed.\n"
807 #endif
808                 "createTimestamp: %s\n"
809                 "modifyTimestamp: %s\n",
810                 SLAPD_MONITOR_DN,
811                 mi->mi_oc_monitorServer->soc_cname.bv_val,
812                 mi->mi_oc_monitorServer->soc_cname.bv_val,
813                 mi->mi_ad_description->ad_cname.bv_val,
814                 mi->mi_ad_description->ad_cname.bv_val,
815 #if 0
816                 mi->mi_ad_description->ad_cname.bv_val,
817                 mi->mi_ad_description->ad_cname.bv_val,
818 #endif
819                 mi->mi_startTime.bv_val,
820                 mi->mi_startTime.bv_val );
821
822         e = str2entry( buf );
823         if ( e == NULL) {
824 #ifdef NEW_LOGGING
825                 LDAP_LOG( OPERATION, CRIT,
826                         "unable to create '%s' entry\n",
827                         SLAPD_MONITOR_DN, 0, 0 );
828 #else
829                 Debug( LDAP_DEBUG_ANY,
830                         "unable to create '%s' entry\n",
831                         SLAPD_MONITOR_DN, 0, 0 );
832 #endif
833                 return( -1 );
834         }
835
836         bv.bv_val = (char *) Versionstr;
837         end_of_line = strchr( Versionstr, '\n' );
838         if ( end_of_line ) {
839                 bv.bv_len = end_of_line - Versionstr;
840         } else {
841                 bv.bv_len = strlen( Versionstr );
842         }
843
844         if ( attr_merge_normalize_one( e, mi->mi_ad_monitoredInfo,
845                                 &bv, NULL ) ) {
846 #ifdef NEW_LOGGING
847                 LDAP_LOG( OPERATION, CRIT,
848                         "unable to add monitoredInfo to '%s' entry\n",
849                         SLAPD_MONITOR_DN, 0, 0 );
850 #else
851                 Debug( LDAP_DEBUG_ANY,
852                         "unable to add monitoredInfo to '%s' entry\n",
853                         SLAPD_MONITOR_DN, 0, 0 );
854 #endif
855                 return( -1 );
856         }
857
858         if ( mi->mi_l.bv_len ) {
859                 if ( attr_merge_normalize_one( e, mi->mi_ad_l, &mi->mi_l, NULL ) ) {
860 #ifdef NEW_LOGGING
861                         LDAP_LOG( OPERATION, CRIT,
862                                 "unable to add locality to '%s' entry\n",
863                                 SLAPD_MONITOR_DN, 0, 0 );
864 #else
865                         Debug( LDAP_DEBUG_ANY,
866                                 "unable to add locality to '%s' entry\n",
867                                 SLAPD_MONITOR_DN, 0, 0 );
868 #endif
869                         return( -1 );
870                 }
871         }
872
873         mp = ( struct monitorentrypriv * )ch_calloc( sizeof( struct monitorentrypriv ), 1 );
874         e->e_private = ( void * )mp;
875
876         mp->mp_info = NULL;
877         mp->mp_children = e_tmp;
878         mp->mp_next = NULL;
879
880         if ( monitor_cache_add( mi, e ) ) {
881 #ifdef NEW_LOGGING
882                 LDAP_LOG( OPERATION, CRIT,
883                         "unable to add entry '%s' to cache\n",
884                         SLAPD_MONITOR_DN, 0, 0 );
885 #else
886                 Debug( LDAP_DEBUG_ANY,
887                         "unable to add entry '%s' to cache\n",
888                         SLAPD_MONITOR_DN, 0, 0 );
889 #endif
890                 return -1;
891         }
892
893         be->be_private = mi;
894         
895         assert( be );
896
897         /*
898          * opens the monitor backend
899          */
900         for ( ms = monitor_subsys; ms->mss_name != NULL; ms++ ) {
901                 if ( ms->mss_init && ( *ms->mss_init )( be ) ) {
902                         return( -1 );
903                 }
904         }
905
906         return( 0 );
907 }
908
909 int
910 monitor_back_config(
911         BackendInfo     *bi,
912         const char      *fname,
913         int             lineno,
914         int             argc,
915         char            **argv
916 )
917 {
918         /*
919          * eventually, will hold backend specific configuration parameters
920          */
921         return SLAP_CONF_UNKNOWN;
922 }
923
924 int
925 monitor_back_db_config(
926         Backend     *be,
927         const char  *fname,
928         int         lineno,
929         int         argc,
930         char        **argv
931 )
932 {
933         struct monitorinfo *mi = (struct monitorinfo *)be->be_private;
934
935         /*
936          * eventually, will hold database specific configuration parameters
937          */
938         if ( strcasecmp( argv[ 0 ], "l" ) == 0 ) {
939                 if ( argc != 2 ) {
940                         return 1;
941                 }
942                 
943                 ber_str2bv( argv[ 1 ], 0, 1, &mi->mi_l );
944
945         } else {
946                 return SLAP_CONF_UNKNOWN;
947         }
948
949         return( 0 );
950 }
951
952 int
953 monitor_back_db_destroy(
954         BackendDB       *be
955 )
956 {
957         /*
958          * FIXME: destroys all the data
959          */
960         return 0;
961 }
962