1 /* log.c - deal with log subsystem */
3 * Copyright 1998-2000 The OpenLDAP Foundation, All Rights Reserved.
4 * COPYING RESTRICTIONS APPLY, see COPYRIGHT file
7 * Copyright 2001 The OpenLDAP Foundation, All Rights Reserved.
8 * COPYING RESTRICTIONS APPLY, see COPYRIGHT file
10 * Copyright 2001, Pierangelo Masarati, All rights reserved. <ando@sys-net.it>
12 * This work has beed deveolped for the OpenLDAP Foundation
13 * in the hope that it may be useful to the Open Source community,
14 * but WITHOUT ANY WARRANTY.
16 * Permission is granted to anyone to use this software for any purpose
17 * on any computer system, and to alter it and redistribute it, subject
18 * to the following restrictions:
20 * 1. The author and SysNet s.n.c. are not responsible for the consequences
21 * of use of this software, no matter how awful, even if they arise from
24 * 2. The origin of this software must not be misrepresented, either by
25 * explicit claim or by omission. Since few users ever read sources,
26 * credits should appear in the documentation.
28 * 3. Altered versions must be plainly marked as such, and must not be
29 * misrepresented as being the original software. Since few users
30 * ever read sources, credits should appear in the documentation.
31 * SysNet s.n.c. cannot be responsible for the consequences of the
34 * 4. This notice may not be removed or altered.
41 #include <ac/string.h>
46 #include "back-monitor.h"
51 ldap_pvt_thread_mutex_t monitor_log_mutex;
57 { LDAP_DEBUG_TRACE, "Trace" },
58 { LDAP_DEBUG_PACKETS, "Packets" },
59 { LDAP_DEBUG_ARGS, "Args" },
60 { LDAP_DEBUG_CONNS, "Conns" },
61 { LDAP_DEBUG_BER, "BER" },
62 { LDAP_DEBUG_FILTER, "Filter" },
63 { LDAP_DEBUG_CONFIG, "Config" }, /* useless */
64 { LDAP_DEBUG_ACL, "ACL" },
65 { LDAP_DEBUG_STATS, "Stats" },
66 { LDAP_DEBUG_STATS2, "Stats2" },
67 { LDAP_DEBUG_SHELL, "Shell" },
68 { LDAP_DEBUG_PARSE, "Parse" },
69 { LDAP_DEBUG_CACHE, "Cache" },
70 { LDAP_DEBUG_INDEX, "Index" },
74 static int loglevel2int( const char *str );
75 static const char * int2loglevel( int n );
77 static int add_values( Entry *e, Modification *mod, int *newlevel );
78 static int delete_values( Entry *e, Modification *mod, int *newlevel );
79 static int replace_values( Entry *e, Modification *mod, int *newlevel );
82 * initializes log subentry
85 monitor_subsys_log_init(
89 struct monitorinfo *mi;
92 struct monitorentrypriv *mp;
93 struct berval val, *bv[2] = { &val, NULL };
95 ldap_pvt_thread_mutex_init( &monitor_log_mutex );
97 mi = ( struct monitorinfo * )be->be_private;
99 if ( monitor_cache_get( mi, monitor_subsys[SLAPD_MONITOR_LOG].mss_ndn,
102 LDAP_LOG(( "operation", LDAP_LEVEL_CRIT,
103 "monitor_subsys_log_init: "
104 "unable to get entry '%s'\n",
105 monitor_subsys[SLAPD_MONITOR_LOG].mss_ndn ));
107 Debug( LDAP_DEBUG_ANY,
108 "monitor_subsys_log_init: "
109 "unable to get entry '%s'\n%s%s",
110 monitor_subsys[SLAPD_MONITOR_LOG].mss_ndn,
116 /* initialize the debug level */
117 for ( i = 0; int_2_level[ i ].i != 0; i++ ) {
118 if ( int_2_level[ i ].i & ldap_syslog ) {
119 val.bv_val = ( char * )int_2_level[ i ].s;
120 val.bv_len = strlen( val.bv_val );
122 attr_merge( e, monitor_ad_desc, bv );
126 monitor_cache_release( mi, e );
132 monitor_subsys_log_modify(
133 struct monitorinfo *mi,
135 Modifications *modlist
139 int newlevel = ldap_syslog;
140 Attribute *save_attrs;
143 ldap_pvt_thread_mutex_lock( &monitor_log_mutex );
145 save_attrs = e->e_attrs;
146 e->e_attrs = attrs_dup( e->e_attrs );
148 for ( ml = modlist; ml != NULL; ml = ml->sml_next ) {
149 Modification *mod = &ml->sml_mod;
152 * Operational attributes
155 if ( mod->sm_desc == slap_schema.si_ad_modifyTimestamp
156 || mod->sm_desc == slap_schema.si_ad_modifiersName ) {
157 ( void ) attr_delete( &e->e_attrs, mod->sm_desc );
158 rc = attr_merge( e, mod->sm_desc, mod->sm_bvalues );
166 * unhandled operational attributes
168 } else if ( is_at_operational( mod->sm_desc->ad_type ) ) {
172 if ( is_at_operational( mod->sm_desc->ad_type ) ) {
173 ( void ) attr_delete( &e->e_attrs, mod->sm_desc );
174 rc = attr_merge( e, mod->sm_desc, mod->sm_bvalues );
183 * only the monitor description attribute can be modified
185 } else if ( mod->sm_desc != monitor_ad_desc ) {
186 rc = LDAP_UNWILLING_TO_PERFORM;
190 switch ( mod->sm_op ) {
192 rc = add_values( e, mod, &newlevel );
195 case LDAP_MOD_DELETE:
196 rc = delete_values( e, mod, &newlevel );
199 case LDAP_MOD_REPLACE:
200 rc = replace_values( e, mod, &newlevel );
204 rc = LDAP_OPERATIONS_ERROR;
208 if ( rc != LDAP_SUCCESS ) {
213 /* set the new debug level */
214 if ( rc == LDAP_SUCCESS ) {
216 static char textbuf[1024];
219 /* check for abandon */
220 ldap_pvt_thread_mutex_lock( &op->o_abandonmutex );
221 if ( op->o_abandon ) {
222 ldap_pvt_thread_mutex_unlock( &op->o_abandonmutex );
229 /* check that the entry still obeys the schema */
230 rc = entry_schema_check( e, save_attrs, &text, textbuf,
232 if ( rc != LDAP_SUCCESS ) {
236 ldap_syslog = newlevel;
239 slap_debug = newlevel;
240 lutil_set_debug_level( "slapd", slap_debug );
241 ber_set_option(NULL, LBER_OPT_DEBUG_LEVEL, &slap_debug);
242 ldap_set_option(NULL, LDAP_OPT_DEBUG_LEVEL, &slap_debug);
243 ldif_debug = slap_debug;
248 if ( rc == LDAP_SUCCESS ) {
249 attrs_free( save_attrs );
252 attrs_free( e->e_attrs );
253 e->e_attrs = save_attrs;
256 ldap_pvt_thread_mutex_unlock( &monitor_log_mutex );
262 loglevel2int( const char *str )
266 for ( i = 0; int_2_level[ i ].i != 0; i++ ) {
267 if ( strcasecmp( str, int_2_level[ i ].s ) == 0 ) {
268 return int_2_level[ i ].i;
276 int2loglevel( int n )
280 for ( i = 0; int_2_level[ i ].i != 0; i++ ) {
281 if ( int_2_level[ i ].i == n ) {
282 return int_2_level[ i ].s;
290 check_constraints( Modification *mod, int *newlevel )
294 for ( i = 0; mod->sm_bvalues && mod->sm_bvalues[i] != NULL; i++ ) {
298 l = loglevel2int( mod->sm_bvalues[i]->bv_val );
300 return LDAP_CONSTRAINT_VIOLATION;
303 s = int2loglevel( l );
305 assert( len == mod->sm_bvalues[i]->bv_len );
307 AC_MEMCPY( mod->sm_bvalues[i]->bv_val, s, len );
316 add_values( Entry *e, Modification *mod, int *newlevel )
320 MatchingRule *mr = mod->sm_desc->ad_type->sat_equality;
322 rc = check_constraints( mod, newlevel );
323 if ( rc != LDAP_SUCCESS ) {
327 a = attr_find( e->e_attrs, mod->sm_desc );
331 /* "description" SHOULD have appropriate rules ... */
332 if ( mr == NULL || !mr->smr_match ) {
333 return LDAP_INAPPROPRIATE_MATCHING;
336 for ( i = 0; mod->sm_bvalues[i] != NULL; i++ ) {
339 const char *text = NULL;
340 struct berval *asserted;
342 rc = value_normalize( mod->sm_desc,
348 if ( rc != LDAP_SUCCESS ) {
352 for ( j = 0; a->a_vals[j] != NULL; j++ ) {
354 int rc = value_match( &match, mod->sm_desc, mr,
355 SLAP_MR_VALUE_SYNTAX_MATCH,
356 a->a_vals[j], asserted, &text );
358 if ( rc == LDAP_SUCCESS && match == 0 ) {
359 ber_bvfree( asserted );
360 return LDAP_TYPE_OR_VALUE_EXISTS;
364 ber_bvfree( asserted );
369 if ( attr_merge( e, mod->sm_desc, mod->sm_bvalues ) != 0 ) {
370 /* this should return result return of attr_merge */
378 delete_values( Entry *e, Modification *mod, int *newlevel )
380 int i, j, k, found, rc, nl = 0;
382 char *desc = mod->sm_desc->ad_cname.bv_val;
383 MatchingRule *mr = mod->sm_desc->ad_type->sat_equality;
385 rc = check_constraints( mod, &nl );
386 if ( rc != LDAP_SUCCESS ) {
392 /* delete the entire attribute */
393 if ( mod->sm_bvalues == NULL ) {
394 int rc = attr_delete( &e->e_attrs, mod->sm_desc );
397 rc = LDAP_NO_SUCH_ATTRIBUTE;
405 if ( mr == NULL || !mr->smr_match ) {
406 /* disallow specific attributes from being deleted if
407 * no equality rule */
408 return LDAP_INAPPROPRIATE_MATCHING;
411 /* delete specific values - find the attribute first */
412 if ( (a = attr_find( e->e_attrs, mod->sm_desc )) == NULL ) {
413 return( LDAP_NO_SUCH_ATTRIBUTE );
416 /* find each value to delete */
417 for ( i = 0; mod->sm_bvalues[i] != NULL; i++ ) {
419 const char *text = NULL;
421 struct berval *asserted;
423 rc = value_normalize( mod->sm_desc,
429 if( rc != LDAP_SUCCESS ) return rc;
432 for ( j = 0; a->a_vals[j] != NULL; j++ ) {
434 int rc = value_match( &match, mod->sm_desc, mr,
435 SLAP_MR_VALUE_SYNTAX_MATCH,
436 a->a_vals[j], asserted, &text );
438 if( rc == LDAP_SUCCESS && match != 0 ) {
442 /* found a matching value */
446 ber_bvfree( a->a_vals[j] );
447 for ( k = j + 1; a->a_vals[k] != NULL; k++ ) {
448 a->a_vals[k - 1] = a->a_vals[k];
450 a->a_vals[k - 1] = NULL;
455 ber_bvfree( asserted );
457 /* looked through them all w/o finding it */
459 return LDAP_NO_SUCH_ATTRIBUTE;
463 /* if no values remain, delete the entire attribute */
464 if ( a->a_vals[0] == NULL ) {
465 /* should already be zero */
468 if ( attr_delete( &e->e_attrs, mod->sm_desc ) ) {
469 return LDAP_NO_SUCH_ATTRIBUTE;
477 replace_values( Entry *e, Modification *mod, int *newlevel )
482 rc = check_constraints( mod, newlevel );
483 if ( rc != LDAP_SUCCESS ) {
487 rc = attr_delete( &e->e_attrs, mod->sm_desc );
489 if ( rc != LDAP_SUCCESS && rc != LDAP_NO_SUCH_ATTRIBUTE ) {
493 if ( mod->sm_bvalues != NULL &&
494 attr_merge( e, mod->sm_desc, mod->sm_bvalues ) != 0 ) {