1 /* log.c - deal with log subsystem */
3 /* This work is part of OpenLDAP Software <http://www.openldap.org/>.
5 * Copyright 2001-2003 The OpenLDAP Foundation.
6 * Portions Copyright 2001-2003 Pierangelo Masarati.
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted only as authorized by the OpenLDAP
13 * A copy of this license is available in file LICENSE in the
14 * top-level directory of the distribution or, alternatively, at
15 * <http://www.OpenLDAP.org/license.html>.
18 * This work was initially developed by Pierangelo Masarati for inclusion
19 * in OpenLDAP Software.
26 #include <ac/string.h>
32 #include "back-monitor.h"
37 ldap_pvt_thread_mutex_t monitor_log_mutex;
44 { LDAP_DEBUG_TRACE, BER_BVC("Trace"), { 0, NULL } },
45 { LDAP_DEBUG_PACKETS, BER_BVC("Packets"), { 0, NULL } },
46 { LDAP_DEBUG_ARGS, BER_BVC("Args"), { 0, NULL } },
47 { LDAP_DEBUG_CONNS, BER_BVC("Conns"), { 0, NULL } },
48 { LDAP_DEBUG_BER, BER_BVC("BER"), { 0, NULL } },
49 { LDAP_DEBUG_FILTER, BER_BVC("Filter"), { 0, NULL } },
50 { LDAP_DEBUG_CONFIG, BER_BVC("Config"), { 0, NULL } }, /* useless */
51 { LDAP_DEBUG_ACL, BER_BVC("ACL"), { 0, NULL } },
52 { LDAP_DEBUG_STATS, BER_BVC("Stats"), { 0, NULL } },
53 { LDAP_DEBUG_STATS2, BER_BVC("Stats2"), { 0, NULL } },
54 { LDAP_DEBUG_SHELL, BER_BVC("Shell"), { 0, NULL } },
55 { LDAP_DEBUG_PARSE, BER_BVC("Parse"), { 0, NULL } },
56 { LDAP_DEBUG_CACHE, BER_BVC("Cache"), { 0, NULL } },
57 { LDAP_DEBUG_INDEX, BER_BVC("Index"), { 0, NULL } },
58 { 0, { 0, NULL }, { 0, NULL } }
61 static int loglevel2int( struct berval *l );
62 static int int2loglevel( int n );
64 static int add_values( Entry *e, Modification *mod, int *newlevel );
65 static int delete_values( Entry *e, Modification *mod, int *newlevel );
66 static int replace_values( Entry *e, Modification *mod, int *newlevel );
69 * initializes log subentry
72 monitor_subsys_log_init(
76 struct monitorinfo *mi;
79 struct berval desc[] = {
80 BER_BVC("This entry allows to set the log level runtime."),
81 BER_BVC("Set the attribute 'managedInfo' to the desired log levels."),
85 ldap_pvt_thread_mutex_init( &monitor_log_mutex );
87 mi = ( struct monitorinfo * )be->be_private;
89 if ( monitor_cache_get( mi, &monitor_subsys[SLAPD_MONITOR_LOG].mss_ndn,
92 LDAP_LOG( OPERATION, CRIT,
93 "monitor_subsys_log_init: "
94 "unable to get entry '%s'\n",
95 monitor_subsys[SLAPD_MONITOR_LOG].mss_ndn.bv_val, 0, 0 );
97 Debug( LDAP_DEBUG_ANY,
98 "monitor_subsys_log_init: "
99 "unable to get entry '%s'\n%s%s",
100 monitor_subsys[SLAPD_MONITOR_LOG].mss_ndn.bv_val,
106 /* initialize the debug level(s) */
107 for ( i = 0; int_2_level[ i ].i != 0; i++ ) {
109 if ( mi->mi_ad_managedInfo->ad_type->sat_equality->smr_normalize ) {
112 rc = (*mi->mi_ad_managedInfo->ad_type->sat_equality->smr_normalize)(
113 SLAP_MR_VALUE_OF_ATTRIBUTE_SYNTAX,
114 mi->mi_ad_managedInfo->ad_type->sat_syntax,
115 mi->mi_ad_managedInfo->ad_type->sat_equality,
117 &int_2_level[ i ].n, NULL );
123 if ( int_2_level[ i ].i & ldap_syslog ) {
124 attr_merge_one( e, mi->mi_ad_managedInfo,
126 &int_2_level[ i ].n );
130 attr_merge( e, mi->mi_ad_description, desc, NULL );
132 monitor_cache_release( mi, e );
138 monitor_subsys_log_modify(
143 struct monitorinfo *mi = (struct monitorinfo *)op->o_bd->be_private;
145 int newlevel = ldap_syslog;
146 Attribute *save_attrs;
147 Modifications *modlist = op->oq_modify.rs_modlist;
150 ldap_pvt_thread_mutex_lock( &monitor_log_mutex );
152 save_attrs = e->e_attrs;
153 e->e_attrs = attrs_dup( e->e_attrs );
155 for ( ml = modlist; ml != NULL; ml = ml->sml_next ) {
156 Modification *mod = &ml->sml_mod;
159 * accept all operational attributes
161 if ( is_at_operational( mod->sm_desc->ad_type ) ) {
162 ( void ) attr_delete( &e->e_attrs, mod->sm_desc );
163 rc = attr_merge( e, mod->sm_desc, mod->sm_bvalues,
172 * only the monitor description attribute can be modified
174 } else if ( mod->sm_desc != mi->mi_ad_managedInfo) {
175 rc = LDAP_UNWILLING_TO_PERFORM;
179 switch ( mod->sm_op ) {
181 rc = add_values( e, mod, &newlevel );
184 case LDAP_MOD_DELETE:
185 rc = delete_values( e, mod, &newlevel );
188 case LDAP_MOD_REPLACE:
189 rc = replace_values( e, mod, &newlevel );
197 if ( rc != LDAP_SUCCESS ) {
202 /* set the new debug level */
203 if ( rc == LDAP_SUCCESS ) {
205 static char textbuf[ BACKMONITOR_BUFSIZE ];
207 /* check for abandon */
208 if ( op->o_abandon ) {
214 /* check that the entry still obeys the schema */
215 rc = entry_schema_check( be_monitor, e, save_attrs,
216 &text, textbuf, sizeof( textbuf ) );
217 if ( rc != LDAP_SUCCESS ) {
222 * Do we need to protect this with a mutex?
224 ldap_syslog = newlevel;
226 #if 0 /* debug rather than log */
227 slap_debug = newlevel;
228 lutil_set_debug_level( "slapd", slap_debug );
229 ber_set_option(NULL, LBER_OPT_DEBUG_LEVEL, &slap_debug);
230 ldap_set_option(NULL, LDAP_OPT_DEBUG_LEVEL, &slap_debug);
231 ldif_debug = slap_debug;
236 if ( rc == LDAP_SUCCESS ) {
237 attrs_free( save_attrs );
240 attrs_free( e->e_attrs );
241 e->e_attrs = save_attrs;
244 ldap_pvt_thread_mutex_unlock( &monitor_log_mutex );
250 loglevel2int( struct berval *l )
254 for ( i = 0; int_2_level[ i ].i != 0; i++ ) {
255 if ( l->bv_len != int_2_level[ i ].s.bv_len ) {
259 if ( strcasecmp( l->bv_val, int_2_level[ i ].s.bv_val ) == 0 ) {
260 return int_2_level[ i ].i;
268 int2loglevel( int n )
272 for ( i = 0; int_2_level[ i ].i != 0; i++ ) {
273 if ( int_2_level[ i ].i == n ) {
282 check_constraints( Modification *mod, int *newlevel )
286 for ( i = 0; mod->sm_bvalues && mod->sm_bvalues[i].bv_val != NULL; i++ ) {
289 l = loglevel2int( &mod->sm_bvalues[i] );
291 return LDAP_CONSTRAINT_VIOLATION;
294 if ( ( l = int2loglevel( l ) ) == -1 ) {
298 assert( int_2_level[ l ].s.bv_len
299 == mod->sm_bvalues[i].bv_len );
301 AC_MEMCPY( mod->sm_bvalues[i].bv_val,
302 int_2_level[ l ].s.bv_val,
303 int_2_level[ l ].s.bv_len );
305 AC_MEMCPY( mod->sm_nvalues[i].bv_val,
306 int_2_level[ l ].n.bv_val,
307 int_2_level[ l ].n.bv_len );
316 add_values( Entry *e, Modification *mod, int *newlevel )
320 MatchingRule *mr = mod->sm_desc->ad_type->sat_equality;
322 rc = check_constraints( mod, newlevel );
323 if ( rc != LDAP_SUCCESS ) {
327 a = attr_find( e->e_attrs, mod->sm_desc );
330 /* "description" SHOULD have appropriate rules ... */
331 if ( mr == NULL || !mr->smr_match ) {
332 return LDAP_INAPPROPRIATE_MATCHING;
335 for ( i = 0; mod->sm_bvalues[i].bv_val != NULL; i++ ) {
338 const char *text = NULL;
339 struct berval asserted;
341 rc = asserted_value_validate_normalize(
342 mod->sm_desc, mr, SLAP_MR_EQUALITY,
343 &mod->sm_bvalues[i], &asserted, &text, NULL );
345 if ( rc != LDAP_SUCCESS ) {
349 for ( j = 0; a->a_vals[j].bv_val != NULL; j++ ) {
351 int rc = value_match( &match, mod->sm_desc, mr,
353 &a->a_vals[j], &asserted, &text );
355 if ( rc == LDAP_SUCCESS && match == 0 ) {
356 free( asserted.bv_val );
357 return LDAP_TYPE_OR_VALUE_EXISTS;
361 free( asserted.bv_val );
366 rc = attr_merge( e, mod->sm_desc, mod->sm_bvalues, mod->sm_nvalues );
367 if ( rc != LDAP_SUCCESS ) {
368 /* this should return result of attr_mergeit */
376 delete_values( Entry *e, Modification *mod, int *newlevel )
378 int i, j, k, found, rc, nl = 0;
380 MatchingRule *mr = mod->sm_desc->ad_type->sat_equality;
382 rc = check_constraints( mod, &nl );
383 if ( rc != LDAP_SUCCESS ) {
389 /* delete the entire attribute */
390 if ( mod->sm_bvalues == NULL ) {
391 int rc = attr_delete( &e->e_attrs, mod->sm_desc );
394 rc = LDAP_NO_SUCH_ATTRIBUTE;
402 if ( mr == NULL || !mr->smr_match ) {
403 /* disallow specific attributes from being deleted if
404 * no equality rule */
405 return LDAP_INAPPROPRIATE_MATCHING;
408 /* delete specific values - find the attribute first */
409 if ( (a = attr_find( e->e_attrs, mod->sm_desc )) == NULL ) {
410 return( LDAP_NO_SUCH_ATTRIBUTE );
413 /* find each value to delete */
414 for ( i = 0; mod->sm_bvalues[i].bv_val != NULL; i++ ) {
416 const char *text = NULL;
418 struct berval asserted;
420 rc = asserted_value_validate_normalize(
421 mod->sm_desc, mr, SLAP_MR_EQUALITY,
422 &mod->sm_bvalues[i], &asserted, &text, NULL );
424 if( rc != LDAP_SUCCESS ) return rc;
427 for ( j = 0; a->a_vals[j].bv_val != NULL; j++ ) {
429 int rc = value_match( &match, mod->sm_desc, mr,
431 &a->a_vals[j], &asserted, &text );
433 if( rc == LDAP_SUCCESS && match != 0 ) {
437 /* found a matching value */
441 free( a->a_vals[j].bv_val );
442 for ( k = j + 1; a->a_vals[k].bv_val != NULL; k++ ) {
443 a->a_vals[k - 1] = a->a_vals[k];
445 a->a_vals[k - 1].bv_val = NULL;
450 free( asserted.bv_val );
452 /* looked through them all w/o finding it */
454 return LDAP_NO_SUCH_ATTRIBUTE;
458 /* if no values remain, delete the entire attribute */
459 if ( a->a_vals[0].bv_val == NULL ) {
460 /* should already be zero */
463 if ( attr_delete( &e->e_attrs, mod->sm_desc ) ) {
464 return LDAP_NO_SUCH_ATTRIBUTE;
472 replace_values( Entry *e, Modification *mod, int *newlevel )
477 rc = check_constraints( mod, newlevel );
478 if ( rc != LDAP_SUCCESS ) {
482 rc = attr_delete( &e->e_attrs, mod->sm_desc );
484 if ( rc != LDAP_SUCCESS && rc != LDAP_NO_SUCH_ATTRIBUTE ) {
488 if ( mod->sm_bvalues != NULL ) {
489 rc = attr_merge( e, mod->sm_desc, mod->sm_bvalues,
491 if ( rc != LDAP_SUCCESS ) {