1 /* log.c - deal with log subsystem */
3 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
5 * Copyright 2001-2005 The OpenLDAP Foundation.
6 * Portions Copyright 2001-2003 Pierangelo Masarati.
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted only as authorized by the OpenLDAP
13 * A copy of this license is available in file LICENSE in the
14 * top-level directory of the distribution or, alternatively, at
15 * <http://www.OpenLDAP.org/license.html>.
18 * This work was initially developed by Pierangelo Masarati for inclusion
19 * in OpenLDAP Software.
26 #include <ac/string.h>
32 #include "back-monitor.h"
35 monitor_subsys_log_destroy(
37 monitor_subsys_t *ms );
40 monitor_subsys_log_modify(
48 ldap_pvt_thread_mutex_t monitor_log_mutex;
55 { LDAP_DEBUG_TRACE, BER_BVC("Trace"), BER_BVNULL },
56 { LDAP_DEBUG_PACKETS, BER_BVC("Packets"), BER_BVNULL },
57 { LDAP_DEBUG_ARGS, BER_BVC("Args"), BER_BVNULL },
58 { LDAP_DEBUG_CONNS, BER_BVC("Conns"), BER_BVNULL },
59 { LDAP_DEBUG_BER, BER_BVC("BER"), BER_BVNULL },
60 { LDAP_DEBUG_FILTER, BER_BVC("Filter"), BER_BVNULL },
61 { LDAP_DEBUG_CONFIG, BER_BVC("Config"), BER_BVNULL }, /* useless */
62 { LDAP_DEBUG_ACL, BER_BVC("ACL"), BER_BVNULL },
63 { LDAP_DEBUG_STATS, BER_BVC("Stats"), BER_BVNULL },
64 { LDAP_DEBUG_STATS2, BER_BVC("Stats2"), BER_BVNULL },
65 { LDAP_DEBUG_SHELL, BER_BVC("Shell"), BER_BVNULL },
66 { LDAP_DEBUG_PARSE, BER_BVC("Parse"), BER_BVNULL },
67 { LDAP_DEBUG_CACHE, BER_BVC("Cache"), BER_BVNULL },
68 { LDAP_DEBUG_INDEX, BER_BVC("Index"), BER_BVNULL },
69 { 0, BER_BVNULL, BER_BVNULL }
72 static int loglevel2int( struct berval *l );
73 static int int2loglevel( int n );
75 static int add_values( Entry *e, Modification *mod, int *newlevel );
76 static int delete_values( Entry *e, Modification *mod, int *newlevel );
77 static int replace_values( Entry *e, Modification *mod, int *newlevel );
80 * initializes log subentry
83 monitor_subsys_log_init(
85 monitor_subsys_t *ms )
91 ms->mss_destroy = monitor_subsys_log_destroy;
92 ms->mss_modify = monitor_subsys_log_modify;
94 ldap_pvt_thread_mutex_init( &monitor_log_mutex );
96 mi = ( monitor_info_t * )be->be_private;
98 if ( monitor_cache_get( mi, &ms->mss_ndn,
100 Debug( LDAP_DEBUG_ANY,
101 "monitor_subsys_log_init: "
102 "unable to get entry \"%s\"\n",
103 ms->mss_ndn.bv_val, 0, 0 );
107 /* initialize the debug level(s) */
108 for ( i = 0; int_2_level[ i ].i != 0; i++ ) {
109 if ( mi->mi_ad_managedInfo->ad_type->sat_equality->smr_normalize ) {
112 rc = (*mi->mi_ad_managedInfo->ad_type->sat_equality->smr_normalize)(
113 SLAP_MR_VALUE_OF_ATTRIBUTE_SYNTAX,
114 mi->mi_ad_managedInfo->ad_type->sat_syntax,
115 mi->mi_ad_managedInfo->ad_type->sat_equality,
117 &int_2_level[ i ].n, NULL );
123 if ( int_2_level[ i ].i & ldap_syslog ) {
124 attr_merge_one( e, mi->mi_ad_managedInfo,
126 &int_2_level[ i ].n );
130 monitor_cache_release( mi, e );
136 monitor_subsys_log_destroy(
138 monitor_subsys_t *ms )
142 for ( i = 0; int_2_level[ i ].i != 0; i++ ) {
143 if ( !BER_BVISNULL( &int_2_level[ i ].n ) ) {
144 ch_free( int_2_level[ i ].n.bv_val );
152 monitor_subsys_log_modify(
157 monitor_info_t *mi = ( monitor_info_t * )op->o_bd->be_private;
159 int newlevel = ldap_syslog;
160 Attribute *save_attrs;
161 Modifications *modlist = op->oq_modify.rs_modlist;
164 ldap_pvt_thread_mutex_lock( &monitor_log_mutex );
166 save_attrs = e->e_attrs;
167 e->e_attrs = attrs_dup( e->e_attrs );
169 for ( ml = modlist; ml != NULL; ml = ml->sml_next ) {
170 Modification *mod = &ml->sml_mod;
173 * accept all operational attributes;
174 * this includes modifersName and modifyTimestamp
177 if ( is_at_operational( mod->sm_desc->ad_type ) ) {
178 ( void ) attr_delete( &e->e_attrs, mod->sm_desc );
179 rc = rs->sr_err = attr_merge( e, mod->sm_desc, mod->sm_values, mod->sm_nvalues );
180 if ( rc != LDAP_SUCCESS ) {
186 * only the "managedInfo" attribute can be modified
188 } else if ( mod->sm_desc != mi->mi_ad_managedInfo ) {
189 rc = rs->sr_err = LDAP_UNWILLING_TO_PERFORM;
193 switch ( mod->sm_op ) {
195 rc = add_values( e, mod, &newlevel );
198 case LDAP_MOD_DELETE:
199 rc = delete_values( e, mod, &newlevel );
202 case LDAP_MOD_REPLACE:
203 rc = replace_values( e, mod, &newlevel );
211 if ( rc != LDAP_SUCCESS ) {
217 /* set the new debug level */
218 if ( rc == LDAP_SUCCESS ) {
220 static char textbuf[ BACKMONITOR_BUFSIZE ];
222 /* check for abandon */
223 if ( op->o_abandon ) {
224 rc = rs->sr_err = SLAPD_ABANDON;
229 /* check that the entry still obeys the schema */
230 rc = entry_schema_check( op, e, save_attrs, 0,
231 &text, textbuf, sizeof( textbuf ) );
232 if ( rc != LDAP_SUCCESS ) {
238 * Do we need to protect this with a mutex?
240 ldap_syslog = newlevel;
242 #if 0 /* debug rather than log */
243 slap_debug = newlevel;
244 lutil_set_debug_level( "slapd", slap_debug );
245 ber_set_option(NULL, LBER_OPT_DEBUG_LEVEL, &slap_debug);
246 ldap_set_option(NULL, LDAP_OPT_DEBUG_LEVEL, &slap_debug);
247 ldif_debug = slap_debug;
252 if ( rc == LDAP_SUCCESS ) {
253 attrs_free( save_attrs );
256 attrs_free( e->e_attrs );
257 e->e_attrs = save_attrs;
260 ldap_pvt_thread_mutex_unlock( &monitor_log_mutex );
262 if ( rc == LDAP_SUCCESS ) {
263 rc = SLAP_CB_CONTINUE;
270 loglevel2int( struct berval *l )
274 for ( i = 0; int_2_level[ i ].i != 0; i++ ) {
275 if ( l->bv_len != int_2_level[ i ].s.bv_len ) {
279 if ( strcasecmp( l->bv_val, int_2_level[ i ].s.bv_val ) == 0 ) {
280 return int_2_level[ i ].i;
288 int2loglevel( int n )
292 for ( i = 0; int_2_level[ i ].i != 0; i++ ) {
293 if ( int_2_level[ i ].i == n ) {
302 check_constraints( Modification *mod, int *newlevel )
306 for ( i = 0; mod->sm_values && !BER_BVISNULL( &mod->sm_values[ i ] ); i++ ) {
309 l = loglevel2int( &mod->sm_values[ i ] );
311 return LDAP_CONSTRAINT_VIOLATION;
314 if ( ( l = int2loglevel( l ) ) == -1 ) {
318 assert( int_2_level[ l ].s.bv_len
319 == mod->sm_values[ i ].bv_len );
321 AC_MEMCPY( mod->sm_values[ i ].bv_val,
322 int_2_level[ l ].s.bv_val,
323 int_2_level[ l ].s.bv_len );
325 AC_MEMCPY( mod->sm_nvalues[ i ].bv_val,
326 int_2_level[ l ].n.bv_val,
327 int_2_level[ l ].n.bv_len );
336 add_values( Entry *e, Modification *mod, int *newlevel )
340 MatchingRule *mr = mod->sm_desc->ad_type->sat_equality;
342 rc = check_constraints( mod, newlevel );
343 if ( rc != LDAP_SUCCESS ) {
347 a = attr_find( e->e_attrs, mod->sm_desc );
350 /* "managedInfo" SHOULD have appropriate rules ... */
351 if ( mr == NULL || !mr->smr_match ) {
352 return LDAP_INAPPROPRIATE_MATCHING;
355 for ( i = 0; !BER_BVISNULL( &mod->sm_values[ i ] ); i++ ) {
358 const char *text = NULL;
359 struct berval asserted;
361 rc = asserted_value_validate_normalize(
362 mod->sm_desc, mr, SLAP_MR_EQUALITY,
363 &mod->sm_values[ i ], &asserted, &text, NULL );
365 if ( rc != LDAP_SUCCESS ) {
369 for ( j = 0; !BER_BVISNULL( &a->a_vals[ j ] ); j++ ) {
371 int rc = value_match( &match, mod->sm_desc, mr,
372 0, &a->a_vals[ j ], &asserted, &text );
374 if ( rc == LDAP_SUCCESS && match == 0 ) {
375 free( asserted.bv_val );
376 return LDAP_TYPE_OR_VALUE_EXISTS;
380 free( asserted.bv_val );
385 rc = attr_merge( e, mod->sm_desc, mod->sm_values, mod->sm_nvalues );
386 if ( rc != LDAP_SUCCESS ) {
387 /* this should return result of attr_mergeit */
395 delete_values( Entry *e, Modification *mod, int *newlevel )
397 int i, j, k, found, rc, nl = 0;
399 MatchingRule *mr = mod->sm_desc->ad_type->sat_equality;
401 rc = check_constraints( mod, &nl );
402 if ( rc != LDAP_SUCCESS ) {
408 /* delete the entire attribute */
409 if ( mod->sm_values == NULL ) {
410 int rc = attr_delete( &e->e_attrs, mod->sm_desc );
413 rc = LDAP_NO_SUCH_ATTRIBUTE;
421 if ( mr == NULL || !mr->smr_match ) {
422 /* disallow specific attributes from being deleted if
423 * no equality rule */
424 return LDAP_INAPPROPRIATE_MATCHING;
427 /* delete specific values - find the attribute first */
428 if ( (a = attr_find( e->e_attrs, mod->sm_desc )) == NULL ) {
429 return( LDAP_NO_SUCH_ATTRIBUTE );
432 /* find each value to delete */
433 for ( i = 0; !BER_BVISNULL( &mod->sm_values[ i ] ); i++ ) {
435 const char *text = NULL;
437 struct berval asserted;
439 rc = asserted_value_validate_normalize(
440 mod->sm_desc, mr, SLAP_MR_EQUALITY,
441 &mod->sm_values[ i ], &asserted, &text, NULL );
443 if( rc != LDAP_SUCCESS ) return rc;
446 for ( j = 0; !BER_BVISNULL( &a->a_vals[ j ] ); j++ ) {
448 int rc = value_match( &match, mod->sm_desc, mr,
450 &a->a_vals[ j ], &asserted, &text );
452 if( rc == LDAP_SUCCESS && match != 0 ) {
456 /* found a matching value */
460 free( a->a_vals[ j ].bv_val );
461 for ( k = j + 1; !BER_BVISNULL( &a->a_vals[ k ] ); k++ ) {
462 a->a_vals[ k - 1 ] = a->a_vals[ k ];
464 BER_BVZERO( &a->a_vals[ k - 1 ] );
469 free( asserted.bv_val );
471 /* looked through them all w/o finding it */
473 return LDAP_NO_SUCH_ATTRIBUTE;
477 /* if no values remain, delete the entire attribute */
478 if ( BER_BVISNULL( &a->a_vals[ 0 ] ) ) {
479 /* should already be zero */
482 if ( attr_delete( &e->e_attrs, mod->sm_desc ) ) {
483 return LDAP_NO_SUCH_ATTRIBUTE;
491 replace_values( Entry *e, Modification *mod, int *newlevel )
496 rc = check_constraints( mod, newlevel );
497 if ( rc != LDAP_SUCCESS ) {
501 rc = attr_delete( &e->e_attrs, mod->sm_desc );
503 if ( rc != LDAP_SUCCESS && rc != LDAP_NO_SUCH_ATTRIBUTE ) {
507 if ( mod->sm_values != NULL ) {
508 rc = attr_merge( e, mod->sm_desc, mod->sm_values, mod->sm_nvalues );
509 if ( rc != LDAP_SUCCESS ) {