mirror of
https://git.openldap.org/openldap/openldap.git
synced 2026-01-02 13:09:42 -05:00
1274 lines
34 KiB
C
1274 lines
34 KiB
C
/* monitor.c - monitor asyncmeta backend */
|
|
/* $OpenLDAP$ */
|
|
/* This work is part of OpenLDAP Software <http://www.openldap.org/>.
|
|
* * Copyright 2016-2025 The OpenLDAP Foundation.
|
|
* Portions Copyright 2016 Symas Corporation.
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted only as authorized by the OpenLDAP
|
|
* Public License.
|
|
*
|
|
* A copy of this license is available in the file LICENSE in the
|
|
* top-level directory of the distribution or, alternatively, at
|
|
* <http://www.OpenLDAP.org/license.html>.
|
|
*/
|
|
|
|
/* ACKNOWLEDGEMENTS:
|
|
* This work was developed by Symas Corporation
|
|
* based on back-meta module for inclusion in OpenLDAP Software.
|
|
* This work was sponsored by Ericsson. */
|
|
|
|
|
|
#include "portable.h"
|
|
|
|
#include <stdio.h>
|
|
#include <ac/string.h>
|
|
#include <ac/unistd.h>
|
|
#include <ac/stdlib.h>
|
|
#include <ac/errno.h>
|
|
#include <sys/stat.h>
|
|
#include "lutil.h"
|
|
#include "slap.h"
|
|
#include "../back-ldap/back-ldap.h"
|
|
#include "back-asyncmeta.h"
|
|
|
|
#include "slap-config.h"
|
|
|
|
static ObjectClass *oc_olmAsyncmetaDatabase;
|
|
static ObjectClass *oc_olmAsyncmetaTarget;
|
|
static ObjectClass *oc_olmAsyncmetaConnectionGroup;
|
|
static ObjectClass *oc_olmAsyncmetaTargetConnection;
|
|
|
|
static ObjectClass *oc_monitorContainer;
|
|
static ObjectClass *oc_monitorCounterObject;
|
|
/* Database Attributes */
|
|
static AttributeDescription *ad_olmDbNextConnectionGroup; /*mi_next_conn*/
|
|
/* Target Attributes */
|
|
static AttributeDescription *ad_olmTgtURIList; /* mt_uri */
|
|
static AttributeDescription *ad_olmTgtQuarantined; /*mt_isquarantined*/
|
|
static AttributeDescription *ad_olmTgtConnLastReset; /*msc_reset_time*/
|
|
static AttributeDescription *ad_olmTgtTimeoutOps; /*mt_timeout_ops*/
|
|
/* Connection Group (a_metaconn_t) attributes */
|
|
static AttributeDescription *ad_olmCGID;
|
|
static AttributeDescription *ad_olmCGPendingOps;
|
|
/* individual target connections, one per each target per connection group (a_metasingleconn_t) */
|
|
static AttributeDescription *ad_olmTargetConnLastUseTime; /* msc_time */
|
|
static AttributeDescription *ad_olmTargetConnBoundTime; /* msc_binding_time */
|
|
static AttributeDescription *ad_olmTargetConnResultTime; /* msc_result_time */
|
|
static AttributeDescription *ad_olmTargetConnEstablishedTime; /* msc_established_time */
|
|
static AttributeDescription *ad_olmTargetConnResetTime; /* msc_reset_time */
|
|
static AttributeDescription *ad_olmTargetConnFlags; /* msc_mscflags */
|
|
static AttributeDescription *ad_olmTargetConnURI;
|
|
static AttributeDescription *ad_olmTargetConnPeerAddress;
|
|
|
|
|
|
/* Corresponds to connection flags in back-ldap.h and back-asyncmeta.h */
|
|
static struct {
|
|
unsigned flag;
|
|
struct berval name;
|
|
} s_flag[] = {
|
|
{ LDAP_BACK_FCONN_ISBOUND, BER_BVC( "bound" ) },
|
|
{ LDAP_BACK_FCONN_ISANON, BER_BVC( "anonymous" ) },
|
|
{ LDAP_BACK_FCONN_ISPRIV, BER_BVC( "privileged" ) },
|
|
{ LDAP_BACK_FCONN_ISTLS, BER_BVC( "TLS" ) },
|
|
{ LDAP_BACK_FCONN_BINDING, BER_BVC( "binding" ) },
|
|
{ LDAP_BACK_FCONN_TAINTED, BER_BVC( "tainted" ) },
|
|
{ LDAP_BACK_FCONN_ABANDON, BER_BVC( "abandon" ) },
|
|
{ LDAP_BACK_FCONN_ISIDASR, BER_BVC( "idassert" ) },
|
|
{ LDAP_BACK_FCONN_CACHED, BER_BVC( "cached" ) },
|
|
{ META_BACK_FCONN_INITED, BER_BVC( "initialized" ) },
|
|
{ META_BACK_FCONN_CREATING, BER_BVC( "creating" ) },
|
|
{ META_BACK_FCONN_INVALID, BER_BVC( "invalid" ) },
|
|
{ META_BACK_FCONN_CLOSING, BER_BVC( "closing" ) },
|
|
{ 0 }
|
|
};
|
|
|
|
|
|
/*
|
|
* NOTE: there's some confusion in monitor OID arc;
|
|
* by now, let's consider:
|
|
*
|
|
* Subsystems monitor attributes 1.3.6.1.4.1.4203.666.1.55.0
|
|
* Databases monitor attributes 1.3.6.1.4.1.4203.666.1.55.0.1
|
|
* Asyncmeta database monitor attributes 1.3.6.1.4.1.4203.666.1.55.0.1.4
|
|
*
|
|
* Subsystems monitor objectclasses 1.3.6.1.4.1.4203.666.3.16.0
|
|
* Databases monitor objectclasses 1.3.6.1.4.1.4203.666.3.16.0.1
|
|
* Asyncmeta database monitor objectclasses 1.3.6.1.4.1.4203.666.3.16.0.1.4
|
|
*/
|
|
|
|
static struct {
|
|
char *name;
|
|
char *oid;
|
|
} s_oid[] = {
|
|
{ "olmAsyncmetaAttributes", "olmDatabaseAttributes:4" },
|
|
{ "olmAsyncmetaObjectClasses", "olmDatabaseObjectClasses:4" },
|
|
|
|
{ NULL }
|
|
};
|
|
|
|
static struct {
|
|
char *desc;
|
|
AttributeDescription **ad;
|
|
} s_at[] = {
|
|
{ "( olmAsyncmetaAttributes:1 "
|
|
"NAME ( 'olmDbNextConnectionGroup' ) "
|
|
"DESC 'ID of the next connection group to be used' "
|
|
"SUP monitorCounter "
|
|
"SINGLE-VALUE "
|
|
"NO-USER-MODIFICATION "
|
|
"USAGE dSAOperation )",
|
|
&ad_olmDbNextConnectionGroup },
|
|
{ "( olmAsyncmetaAttributes:2 "
|
|
"NAME ( 'olmTgtURIList' ) "
|
|
"DESC 'List of URIs a target is serving' "
|
|
"SUP monitoredInfo "
|
|
"NO-USER-MODIFICATION "
|
|
"USAGE dSAOperation )",
|
|
&ad_olmTgtURIList },
|
|
{ "( olmAsyncmetaAttributes:3 "
|
|
"NAME ( 'olmTgtQuarantined' ) "
|
|
"DESC 'Is this target quanatined' "
|
|
"EQUALITY booleanMatch "
|
|
"SYNTAX 1.3.6.1.4.1.1466.115.121.1.7 "
|
|
"SINGLE-VALUE "
|
|
"NO-USER-MODIFICATION "
|
|
"USAGE dSAOperation )",
|
|
&ad_olmTgtQuarantined },
|
|
{ "( olmAsyncmetaAttributes:4 "
|
|
"NAME ( 'olmTgtTimeoutOps' ) "
|
|
"DESC 'Total number of timed out operations for this target since it was last quarantined' "
|
|
"SUP monitorCounter "
|
|
"SINGLE-VALUE "
|
|
"NO-USER-MODIFICATION "
|
|
"USAGE dSAOperation )",
|
|
&ad_olmTgtTimeoutOps },
|
|
{ "( olmAsyncmetaAttributes:5 "
|
|
"NAME ( 'olmCGID' ) "
|
|
"DESC 'Connection Group ID' "
|
|
"SUP monitorCounter "
|
|
"SINGLE-VALUE "
|
|
"NO-USER-MODIFICATION "
|
|
"USAGE dSAOperation )",
|
|
&ad_olmCGID },
|
|
{ "( olmAsyncmetaAttributes:6 "
|
|
"NAME ( 'olmCGPendingOps' ) "
|
|
"DESC 'Operations waiting for a result in this connection group queue' "
|
|
"SUP monitorCounter "
|
|
"SINGLE-VALUE "
|
|
"NO-USER-MODIFICATION "
|
|
"USAGE dSAOperation )",
|
|
&ad_olmCGPendingOps },
|
|
{ "( olmAsyncmetaAttributes:7 "
|
|
"NAME ( 'olmTargetConnLastUseTime' ) "
|
|
"DESC 'Time the connection was last used to proxy an operation, 0 if the connection is not established' "
|
|
"EQUALITY integerMatch "
|
|
"SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 "
|
|
"SINGLE-VALUE "
|
|
"NO-USER-MODIFICATION "
|
|
"USAGE dSAOperation )",
|
|
&ad_olmTargetConnLastUseTime },
|
|
{ "( olmAsyncmetaAttributes:8 "
|
|
"NAME ( 'olmTargetConnBoundTime' ) "
|
|
"DESC 'Time the connection was bound, 0 if the connection is not established' "
|
|
"EQUALITY integerMatch "
|
|
"SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 "
|
|
"SINGLE-VALUE "
|
|
"NO-USER-MODIFICATION "
|
|
"USAGE dSAOperation )",
|
|
&ad_olmTargetConnBoundTime },
|
|
{ "( olmAsyncmetaAttributes:9 "
|
|
"NAME ( 'olmTargetConnResultTime' ) "
|
|
"DESC 'Last time a result was received, 0 if the connection is not established' "
|
|
"EQUALITY integerMatch "
|
|
"SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 "
|
|
"SINGLE-VALUE "
|
|
"NO-USER-MODIFICATION "
|
|
"USAGE dSAOperation )",
|
|
&ad_olmTargetConnResultTime },
|
|
{ "( olmAsyncmetaAttributes:10 "
|
|
"NAME ( 'olmTargetConnFlags' ) "
|
|
"DESC 'Target Connection Flags' "
|
|
"SUP monitoredInfo "
|
|
"NO-USER-MODIFICATION "
|
|
"USAGE dSAOperation )",
|
|
&ad_olmTargetConnFlags },
|
|
{ "( olmAsyncmetaAttributes:11 "
|
|
"NAME ( 'olmTargetConnURI' ) "
|
|
"DESC 'Target connection URI' "
|
|
"SUP monitorConnectionPeerAddress "
|
|
"NO-USER-MODIFICATION "
|
|
"USAGE dSAOperation )",
|
|
&ad_olmTargetConnURI },
|
|
{ "( olmAsyncmetaAttributes:12 "
|
|
"NAME ( 'olmTargetConnPeerAddress' ) "
|
|
"DESC 'Target connection peer address' "
|
|
"SUP monitorConnectionPeerAddress "
|
|
"NO-USER-MODIFICATION "
|
|
"USAGE dSAOperation )",
|
|
&ad_olmTargetConnPeerAddress },
|
|
{ "( olmAsyncmetaAttributes:13 "
|
|
"NAME ( 'olmTargetConnEstablishedTime' ) "
|
|
"DESC 'Time the connection was established' "
|
|
"EQUALITY integerMatch "
|
|
"SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 "
|
|
"SINGLE-VALUE "
|
|
"NO-USER-MODIFICATION "
|
|
"USAGE dSAOperation )",
|
|
&ad_olmTargetConnEstablishedTime },
|
|
{ "( olmAsyncmetaAttributes:14 "
|
|
"NAME ( 'olmTargetConnResetTime' ) "
|
|
"DESC 'Last time the connection was reset' "
|
|
"EQUALITY integerMatch "
|
|
"SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 "
|
|
"SINGLE-VALUE "
|
|
"NO-USER-MODIFICATION "
|
|
"USAGE dSAOperation )",
|
|
&ad_olmTargetConnResetTime },
|
|
{ "( olmAsyncmetaAttributes:15 "
|
|
"NAME ( 'olmTgtConnLastReset' ) "
|
|
"DESC 'Last time a connection to this target was reset' "
|
|
"EQUALITY integerMatch "
|
|
"SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 "
|
|
"SINGLE-VALUE "
|
|
"NO-USER-MODIFICATION "
|
|
"USAGE dSAOperation )",
|
|
&ad_olmTgtConnLastReset },
|
|
{ NULL }
|
|
};
|
|
|
|
static struct {
|
|
char *name;
|
|
ObjectClass **oc;
|
|
} s_moc[] = {
|
|
{ "monitorContainer", &oc_monitorContainer },
|
|
{ "monitorCounterObject", &oc_monitorCounterObject },
|
|
|
|
{ NULL }
|
|
};
|
|
|
|
static struct {
|
|
char *desc;
|
|
ObjectClass **oc;
|
|
} s_oc[] = {
|
|
/* augments an existing object, so it must be AUXILIARY */
|
|
{ "( olmAsyncmetaObjectClasses:1 "
|
|
"NAME ( 'olmAsyncmetaDatabase' ) "
|
|
"SUP top AUXILIARY "
|
|
"MAY ( "
|
|
"olmDbNextConnectionGroup "
|
|
") )",
|
|
&oc_olmAsyncmetaDatabase },
|
|
{ "( olmAsyncmetaObjectClasses:2 "
|
|
"NAME ( 'olmAsyncmetaTarget' ) "
|
|
"SUP monitorConnection STRUCTURAL "
|
|
"MAY ( "
|
|
"olmTgtURIList "
|
|
"$ olmTgtQuarantined "
|
|
"$ olmTgtConnLastReset "
|
|
"$ olmTgtTimeoutOps "
|
|
") )",
|
|
&oc_olmAsyncmetaTarget },
|
|
{ "( olmAsyncmetaObjectClasses:3 "
|
|
"NAME ( 'olmAsyncmetaConnectionGroup' ) "
|
|
"SUP monitorConnection STRUCTURAL "
|
|
"MAY ( "
|
|
"olmCGID "
|
|
"$ olmCGPendingOps "
|
|
") )",
|
|
&oc_olmAsyncmetaConnectionGroup },
|
|
{ "( olmAsyncmetaObjectClasses:4 "
|
|
"NAME ( 'olmAsyncmetaTargetConnection' ) "
|
|
"SUP monitorConnection STRUCTURAL "
|
|
"MAY ( "
|
|
"olmTargetConnLastUseTime "
|
|
"$ olmTargetConnBoundTime "
|
|
"$ olmTargetConnResultTime "
|
|
"$ olmTargetConnResetTime "
|
|
"$ olmTargetConnEstablishedTime "
|
|
"$ olmTargetConnFlags "
|
|
"$ olmTargetConnURI "
|
|
"$ olmTargetConnPeerAddress"
|
|
") )",
|
|
&oc_olmAsyncmetaTargetConnection },
|
|
|
|
{ NULL }
|
|
};
|
|
|
|
/* stolen from mdb_monitor_free */
|
|
static int
|
|
asyncmeta_monitor_free(
|
|
Entry *e,
|
|
ObjectClass *oc,
|
|
void **priv )
|
|
{
|
|
struct berval values[ 2 ];
|
|
Modification mod = { 0 };
|
|
|
|
const char *text;
|
|
char textbuf[ SLAP_TEXT_BUFLEN ];
|
|
|
|
int i;
|
|
|
|
/* NOTE: if slap_shutdown != 0, priv might have already been freed */
|
|
*priv = NULL;
|
|
|
|
/* Remove objectClass */
|
|
mod.sm_op = LDAP_MOD_DELETE;
|
|
mod.sm_desc = slap_schema.si_ad_objectClass;
|
|
mod.sm_values = values;
|
|
mod.sm_numvals = 1;
|
|
values[ 0 ] = oc->soc_cname;
|
|
BER_BVZERO( &values[ 1 ] );
|
|
|
|
modify_delete_values( e, &mod, 1, &text,
|
|
textbuf, sizeof( textbuf ) );
|
|
|
|
/* remove attrs */
|
|
mod.sm_values = NULL;
|
|
mod.sm_numvals = 0;
|
|
for ( i = 0; s_at[ i ].desc != NULL; i++ ) {
|
|
mod.sm_desc = *s_at[ i ].ad;
|
|
modify_delete_values( e, &mod, 1, &text,
|
|
textbuf, sizeof( textbuf ) );
|
|
}
|
|
|
|
return SLAP_CB_CONTINUE;
|
|
}
|
|
|
|
|
|
static int
|
|
asyncmeta_back_monitor_subsystem_destroy(
|
|
BackendDB *be,
|
|
monitor_subsys_t *ms)
|
|
{
|
|
free(ms->mss_dn.bv_val);
|
|
BER_BVZERO(&ms->mss_dn);
|
|
|
|
free(ms->mss_ndn.bv_val);
|
|
BER_BVZERO(&ms->mss_ndn);
|
|
|
|
return LDAP_SUCCESS;
|
|
}
|
|
|
|
|
|
/* code stolen from back-ldap, stolen from daemon.c */
|
|
static int
|
|
asyncmeta_back_monitor_conn_peername(
|
|
LDAP *ld,
|
|
struct berval *bv)
|
|
{
|
|
Sockbuf *sockbuf;
|
|
ber_socket_t socket;
|
|
Sockaddr sa;
|
|
socklen_t salen = sizeof(sa);
|
|
const char *peeraddr = NULL;
|
|
/* we assume INET6_ADDRSTRLEN > INET_ADDRSTRLEN */
|
|
char addr[INET6_ADDRSTRLEN];
|
|
#ifdef LDAP_PF_LOCAL
|
|
char peername[MAXPATHLEN + sizeof("PATH=")];
|
|
#elif defined(LDAP_PF_INET6)
|
|
char peername[sizeof("IP=[ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff]:65535")];
|
|
#else /* ! LDAP_PF_LOCAL && ! LDAP_PF_INET6 */
|
|
char peername[sizeof("IP=255.255.255.255:65336")];
|
|
#endif /* LDAP_PF_LOCAL */
|
|
|
|
assert( bv != NULL );
|
|
|
|
ldap_get_option( ld, LDAP_OPT_SOCKBUF, (void **)&sockbuf );
|
|
ber_sockbuf_ctrl( sockbuf, LBER_SB_OPT_GET_FD, &socket );
|
|
getpeername( socket, (struct sockaddr *)&sa, &salen );
|
|
|
|
switch ( sa.sa_addr.sa_family ) {
|
|
#ifdef LDAP_PF_LOCAL
|
|
case AF_LOCAL:
|
|
sprintf( peername, "PATH=%s", sa.sa_un_addr.sun_path );
|
|
break;
|
|
#endif /* LDAP_PF_LOCAL */
|
|
|
|
#ifdef LDAP_PF_INET6
|
|
case AF_INET6:
|
|
if ( IN6_IS_ADDR_V4MAPPED(&sa.sa_in6_addr.sin6_addr) ) {
|
|
#if defined( HAVE_GETADDRINFO ) && defined( HAVE_INET_NTOP )
|
|
peeraddr = inet_ntop( AF_INET,
|
|
((struct in_addr *)&sa.sa_in6_addr.sin6_addr.s6_addr[12]),
|
|
addr, sizeof(addr) );
|
|
#else /* ! HAVE_GETADDRINFO || ! HAVE_INET_NTOP */
|
|
peeraddr = inet_ntoa( *((struct in_addr *)
|
|
&sa.sa_in6_addr.sin6_addr.s6_addr[12]) );
|
|
#endif /* ! HAVE_GETADDRINFO || ! HAVE_INET_NTOP */
|
|
if ( !peeraddr ) peeraddr = SLAP_STRING_UNKNOWN;
|
|
sprintf( peername, "IP=%s:%d", peeraddr,
|
|
(unsigned) ntohs( sa.sa_in6_addr.sin6_port ) );
|
|
} else {
|
|
peeraddr = inet_ntop( AF_INET6,
|
|
&sa.sa_in6_addr.sin6_addr,
|
|
addr, sizeof addr );
|
|
if ( !peeraddr ) peeraddr = SLAP_STRING_UNKNOWN;
|
|
sprintf( peername, "IP=[%s]:%d", peeraddr,
|
|
(unsigned) ntohs( sa.sa_in6_addr.sin6_port ) );
|
|
}
|
|
break;
|
|
#endif /* LDAP_PF_INET6 */
|
|
|
|
case AF_INET: {
|
|
#if defined( HAVE_GETADDRINFO ) && defined( HAVE_INET_NTOP )
|
|
peeraddr = inet_ntop( AF_INET, &sa.sa_in_addr.sin_addr,
|
|
addr, sizeof(addr) );
|
|
#else /* ! HAVE_GETADDRINFO || ! HAVE_INET_NTOP */
|
|
peeraddr = inet_ntoa( sa.sa_in_addr.sin_addr );
|
|
#endif /* ! HAVE_GETADDRINFO || ! HAVE_INET_NTOP */
|
|
if ( !peeraddr ) peeraddr = SLAP_STRING_UNKNOWN;
|
|
sprintf( peername, "IP=%s:%d", peeraddr,
|
|
(unsigned) ntohs( sa.sa_in_addr.sin_port ) );
|
|
} break;
|
|
|
|
default:
|
|
sprintf( peername, SLAP_STRING_UNKNOWN );
|
|
}
|
|
|
|
ber_str2bv( peername, 0, 1, bv );
|
|
return LDAP_SUCCESS;
|
|
}
|
|
|
|
|
|
static int
|
|
asyncmeta_back_monitor_target_conn_update(
|
|
Operation *op,
|
|
SlapReply *rs,
|
|
Entry *e,
|
|
void *priv)
|
|
{
|
|
a_metasingleconn_t *msc = ( a_metasingleconn_t* )priv;
|
|
Attribute *a;
|
|
char buf[ BUFSIZ ];
|
|
struct berval bv;
|
|
char *ptr;
|
|
int i;
|
|
|
|
a = attr_find( e->e_attrs, ad_olmTargetConnLastUseTime );
|
|
assert( a != NULL );
|
|
bv.bv_val = buf;
|
|
bv.bv_len = snprintf( buf, sizeof( buf ), "%lu", msc->msc_time );
|
|
ber_bvreplace( &a->a_vals[ 0 ], &bv );
|
|
|
|
a = attr_find( e->e_attrs, ad_olmTargetConnBoundTime );
|
|
assert( a != NULL );
|
|
bv.bv_val = buf;
|
|
bv.bv_len = snprintf( buf, sizeof( buf ), "%lu", msc->msc_binding_time );
|
|
ber_bvreplace( &a->a_vals[ 0 ], &bv );
|
|
|
|
a = attr_find( e->e_attrs, ad_olmTargetConnResultTime );
|
|
assert( a != NULL );
|
|
bv.bv_val = buf;
|
|
bv.bv_len = snprintf( buf, sizeof( buf ), "%lu", msc->msc_result_time );
|
|
ber_bvreplace( &a->a_vals[ 0 ], &bv );
|
|
|
|
a = attr_find( e->e_attrs, ad_olmTargetConnResetTime );
|
|
assert( a != NULL );
|
|
bv.bv_val = buf;
|
|
bv.bv_len = snprintf( buf, sizeof( buf ), "%lu", msc->msc_reset_time );
|
|
ber_bvreplace( &a->a_vals[ 0 ], &bv );
|
|
|
|
a = attr_find( e->e_attrs, ad_olmTargetConnEstablishedTime );
|
|
assert( a != NULL );
|
|
bv.bv_val = buf;
|
|
bv.bv_len = snprintf( buf, sizeof( buf ), "%lu", msc->msc_established_time );
|
|
ber_bvreplace( &a->a_vals[ 0 ], &bv );
|
|
|
|
a = attr_find( e->e_attrs, ad_olmTargetConnFlags );
|
|
assert( a != NULL );
|
|
bv.bv_val = buf;
|
|
bv.bv_len = 0;
|
|
ptr = bv.bv_val;
|
|
|
|
if ( msc->msc_mscflags == 0 ) {
|
|
bv.bv_len = snprintf( bv.bv_val, sizeof( buf ), "closed" );
|
|
} else {
|
|
for ( i = 0; s_flag[i].flag; i++ ) {
|
|
int len = 0;
|
|
if ( msc->msc_mscflags & s_flag[i].flag ) {
|
|
if ( bv.bv_len == 0 )
|
|
len = snprintf( ptr, sizeof( buf ), "%s", s_flag[i].name.bv_val );
|
|
else
|
|
len = snprintf( ptr, sizeof( buf )-bv.bv_len, ",%s", s_flag[i].name.bv_val );
|
|
bv.bv_len += len;
|
|
ptr += len;
|
|
}
|
|
}
|
|
}
|
|
ber_bvreplace( &a->a_vals[ 0 ], &bv );
|
|
bv.bv_len = 0;
|
|
|
|
if ( msc->msc_ld ) {
|
|
a = attr_find( e->e_attrs, ad_olmTargetConnURI );
|
|
ldap_get_option( msc->msc_ld, LDAP_OPT_URI, &bv.bv_val );
|
|
ptr = strchr( bv.bv_val, ' ' );
|
|
bv.bv_len = ptr ? ptr - bv.bv_val : strlen(bv.bv_val);
|
|
ber_bvreplace( &a->a_vals[ 0 ], &bv );
|
|
ch_free( bv.bv_val );
|
|
|
|
asyncmeta_back_monitor_conn_peername( msc->msc_ld, &bv );
|
|
a = attr_find( e->e_attrs, ad_olmTargetConnPeerAddress );
|
|
ber_bvreplace( &a->a_vals[ 0 ], &bv );
|
|
ch_free( bv.bv_val );
|
|
} else {
|
|
a = attr_find( e->e_attrs, ad_olmTargetConnURI );
|
|
ber_bvreplace( &a->a_vals[ 0 ], &bv );
|
|
a = attr_find( e->e_attrs, ad_olmTargetConnPeerAddress );
|
|
ber_bvreplace( &a->a_vals[ 0 ], &bv );
|
|
}
|
|
|
|
return SLAP_CB_CONTINUE;
|
|
}
|
|
|
|
static int
|
|
asyncmeta_back_monitor_target_conn_free(
|
|
Entry *e,
|
|
void **priv)
|
|
{
|
|
return asyncmeta_monitor_free( e, oc_olmAsyncmetaTargetConnection, priv );
|
|
}
|
|
|
|
static int
|
|
asyncmeta_back_monitor_target_conn_init(
|
|
BackendDB *be,
|
|
monitor_subsys_t *ms,
|
|
Entry *parent,
|
|
a_metaconn_t *mc )
|
|
{
|
|
a_metainfo_t *mi = (a_metainfo_t *) ms->mss_private;
|
|
monitor_extra_t *mbe;
|
|
|
|
Entry *e;
|
|
int rc = 0;
|
|
int i;
|
|
|
|
assert( be != NULL );
|
|
mbe = (monitor_extra_t *) be->bd_info->bi_extra;
|
|
|
|
for ( i = 0; i < mi->mi_ntargets; i++ )
|
|
{
|
|
monitor_callback_t *cb;
|
|
char buf[ BACKMONITOR_BUFSIZE ];
|
|
struct berval conn_rdn;
|
|
Attribute *a, *next;
|
|
struct berval bv = BER_BVC( "0" );
|
|
|
|
snprintf( buf, sizeof( buf ),
|
|
"cn=Target Connection %d", i+1 );
|
|
ber_str2bv( buf, 0, 0, &conn_rdn );
|
|
|
|
e = mbe->entry_stub( &parent->e_name, &parent->e_nname,
|
|
&conn_rdn,
|
|
oc_olmAsyncmetaTargetConnection, NULL, NULL );
|
|
if ( e == NULL ) {
|
|
Debug( LDAP_DEBUG_ANY,
|
|
"asyncmeta_back_monitor_target_conn_init: "
|
|
"unable to create entry \"%s,%s\"\n",
|
|
conn_rdn.bv_val,
|
|
parent->e_nname.bv_val );
|
|
return( -1 );
|
|
}
|
|
|
|
cb = ch_calloc( sizeof( monitor_callback_t ), 1 );
|
|
cb->mc_update = asyncmeta_back_monitor_target_conn_update;
|
|
cb->mc_free = asyncmeta_back_monitor_target_conn_free;
|
|
cb->mc_private = (void *)&mc->mc_conns[i];
|
|
|
|
a = attrs_alloc( 1 + 8 );
|
|
|
|
a->a_desc = slap_schema.si_ad_objectClass;
|
|
attr_valadd( a, &oc_olmAsyncmetaTargetConnection->soc_cname, NULL, 1 );
|
|
next = a->a_next;
|
|
|
|
next->a_desc = ad_olmTargetConnLastUseTime;
|
|
attr_valadd( next, &bv, NULL, 1 );
|
|
next = next->a_next;
|
|
|
|
next->a_desc = ad_olmTargetConnBoundTime;
|
|
attr_valadd( next, &bv, NULL, 1 );
|
|
next = next->a_next;
|
|
|
|
next->a_desc = ad_olmTargetConnResultTime;
|
|
attr_valadd( next, &bv, NULL, 1 );
|
|
next = next->a_next;
|
|
|
|
next->a_desc = ad_olmTargetConnFlags;
|
|
attr_valadd( next, &bv, NULL, 1 );
|
|
next = next->a_next;
|
|
|
|
next->a_desc = ad_olmTargetConnURI;
|
|
attr_valadd( next, &bv, NULL, 1 );
|
|
next = next->a_next;
|
|
|
|
next->a_desc = ad_olmTargetConnPeerAddress;
|
|
attr_valadd( next, &bv, NULL, 1 );
|
|
next = next->a_next;
|
|
|
|
next->a_desc = ad_olmTargetConnResetTime;
|
|
attr_valadd( next, &bv, NULL, 1 );
|
|
next = next->a_next;
|
|
|
|
next->a_desc = ad_olmTargetConnEstablishedTime;
|
|
attr_valadd( next, &bv, NULL, 1 );
|
|
|
|
rc = mbe->register_entry( e, NULL, ms, MONITOR_F_PERSISTENT_CH );
|
|
if ( rc != LDAP_SUCCESS )
|
|
{
|
|
Debug( LDAP_DEBUG_ANY,
|
|
"asyncmeta_back_monitor_target_conn_init: "
|
|
"unable to register entry \"%s\" for monitoring\n",
|
|
e->e_name.bv_val );
|
|
ch_free( cb );
|
|
attrs_free( a );
|
|
entry_free( e );
|
|
break;
|
|
}
|
|
|
|
rc = mbe->register_entry_attrs( &e->e_nname, a, cb,
|
|
NULL, -1, NULL );
|
|
if ( rc != LDAP_SUCCESS )
|
|
{
|
|
Debug( LDAP_DEBUG_ANY,
|
|
"asyncmeta_back_monitor_target_conn_init: "
|
|
"unable to register entry attributes \"%s\" for monitoring\n",
|
|
e->e_name.bv_val );
|
|
}
|
|
attrs_free( a );
|
|
entry_free( e );
|
|
}
|
|
|
|
return rc;
|
|
}
|
|
|
|
static int
|
|
asyncmeta_back_monitor_conn_group_update(
|
|
Operation *op,
|
|
SlapReply *rs,
|
|
Entry *e,
|
|
void *priv)
|
|
{
|
|
a_metaconn_t *mc = ( a_metaconn_t* )priv;
|
|
Attribute *a;
|
|
char buf[ BUFSIZ ];
|
|
struct berval bv;
|
|
|
|
a = attr_find( e->e_attrs, ad_olmCGPendingOps );
|
|
assert( a != NULL );
|
|
bv.bv_val = buf;
|
|
bv.bv_len = snprintf( buf, sizeof( buf ), "%i", mc->pending_ops );
|
|
ber_bvreplace( &a->a_vals[ 0 ], &bv );
|
|
/* FIXME!!! */
|
|
a = attr_find( e->e_attrs, ad_olmCGID );
|
|
assert( a != NULL );
|
|
bv.bv_val = buf;
|
|
bv.bv_len = snprintf( buf, sizeof( buf ), "%i", mc->pending_ops );
|
|
ber_bvreplace( &a->a_vals[ 0 ], &bv );
|
|
|
|
return SLAP_CB_CONTINUE;
|
|
}
|
|
|
|
|
|
static int
|
|
asyncmeta_back_monitor_conn_group_free(
|
|
Entry *e,
|
|
void **priv)
|
|
{
|
|
return asyncmeta_monitor_free( e, oc_olmAsyncmetaConnectionGroup, priv );
|
|
}
|
|
|
|
static int
|
|
asyncmeta_back_monitor_conn_init(
|
|
BackendDB *be,
|
|
monitor_subsys_t *ms )
|
|
{
|
|
a_metainfo_t *mi = (a_metainfo_t *) ms->mss_private;
|
|
monitor_extra_t *mbe;
|
|
|
|
Entry *e, *parent;
|
|
int rc;
|
|
int i;
|
|
|
|
assert( be != NULL );
|
|
mbe = (monitor_extra_t *) be->bd_info->bi_extra;
|
|
|
|
ms->mss_dn = ms->mss_ndn = mi->mi_monitor_info.mi_ndn;
|
|
ms->mss_destroy = asyncmeta_back_monitor_subsystem_destroy;
|
|
|
|
parent = mbe->entry_stub( &ms->mss_dn, &ms->mss_ndn,
|
|
&mi->mi_monitor_info.mi_conn_rdn, oc_monitorContainer, NULL, NULL );
|
|
if ( parent == NULL ) {
|
|
Debug( LDAP_DEBUG_ANY,
|
|
"asyncmeta_back_monitor_conn_init: "
|
|
"unable to create entry \"%s,%s\"\n",
|
|
mi->mi_monitor_info.mi_conn_rdn.bv_val,
|
|
ms->mss_ndn.bv_val );
|
|
return( -1 );
|
|
}
|
|
|
|
ber_dupbv( &ms->mss_dn, &parent->e_name );
|
|
ber_dupbv( &ms->mss_ndn, &parent->e_nname );
|
|
ber_dupbv( &ms->mss_rdn, &mi->mi_monitor_info.mi_conn_rdn );
|
|
|
|
rc = mbe->register_entry( parent, NULL, ms, MONITOR_F_PERSISTENT_CH );
|
|
|
|
for ( i = 0; i < mi->mi_num_conns; i++ )
|
|
{
|
|
monitor_callback_t *cb;
|
|
char buf[ BACKMONITOR_BUFSIZE ];
|
|
struct berval conn_group_rdn;
|
|
Attribute *a, *next;
|
|
struct berval bv = BER_BVC( "0" );
|
|
|
|
snprintf( buf, sizeof( buf ),
|
|
"cn=Connection Group %d", i+1 );
|
|
ber_str2bv( buf, 0, 0, &conn_group_rdn );
|
|
|
|
e = mbe->entry_stub( &parent->e_name, &parent->e_nname,
|
|
&conn_group_rdn,
|
|
oc_olmAsyncmetaConnectionGroup, NULL, NULL );
|
|
if ( e == NULL ) {
|
|
Debug( LDAP_DEBUG_ANY,
|
|
"asyncmeta_back_monitor_conn_init: "
|
|
"unable to create entry \"%s,%s\"\n",
|
|
conn_group_rdn.bv_val,
|
|
parent->e_nname.bv_val );
|
|
return( -1 );
|
|
}
|
|
|
|
cb = ch_calloc( sizeof( monitor_callback_t ), 1 );
|
|
cb->mc_update = asyncmeta_back_monitor_conn_group_update;
|
|
cb->mc_free = asyncmeta_back_monitor_conn_group_free;
|
|
cb->mc_private = (void *)&mi->mi_conns[i];
|
|
cb->mc_next = NULL;
|
|
|
|
a = attrs_alloc( 1 + 2 );
|
|
|
|
a->a_desc = slap_schema.si_ad_objectClass;
|
|
attr_valadd( a, &oc_olmAsyncmetaConnectionGroup->soc_cname, NULL, 1 );
|
|
next = a->a_next;
|
|
|
|
next->a_desc = ad_olmCGID;
|
|
attr_valadd( next, &bv, NULL, 1 );
|
|
next = next->a_next;
|
|
|
|
next->a_desc = ad_olmCGPendingOps;
|
|
attr_valadd( next, &bv, NULL, 1 );
|
|
|
|
rc = mbe->register_entry( e, NULL, ms, MONITOR_F_PERSISTENT_CH );
|
|
if ( rc != LDAP_SUCCESS )
|
|
{
|
|
Debug( LDAP_DEBUG_ANY,
|
|
"asyncmeta_back_monitor_conn_init: "
|
|
"unable to register entry \"%s\" for monitoring\n",
|
|
e->e_name.bv_val );
|
|
ch_free( cb );
|
|
attrs_free( a );
|
|
entry_free( e );
|
|
break;
|
|
}
|
|
|
|
rc = mbe->register_entry_attrs( &e->e_nname, a, cb,
|
|
NULL, -1, NULL );
|
|
if ( rc != LDAP_SUCCESS )
|
|
{
|
|
Debug( LDAP_DEBUG_ANY,
|
|
"asyncmeta_back_monitor_conn_init: "
|
|
"unable to register entry attributes \"%s\" for monitoring\n",
|
|
e->e_name.bv_val );
|
|
}
|
|
|
|
rc = asyncmeta_back_monitor_target_conn_init( be, ms, e, &mi->mi_conns[i] );
|
|
if ( rc != LDAP_SUCCESS )
|
|
{
|
|
ch_free( cb );
|
|
attrs_free( a );
|
|
entry_free( e );
|
|
break;
|
|
}
|
|
attrs_free( a );
|
|
entry_free( e );
|
|
}
|
|
|
|
entry_free( parent );
|
|
|
|
return rc;
|
|
}
|
|
|
|
/*
|
|
* Targets monitoring subsystem:
|
|
* Is target quarantined, last time a connection to it was reset, etc
|
|
*/
|
|
|
|
static int
|
|
asyncmeta_back_monitor_targets_free(
|
|
Entry *e,
|
|
void **priv)
|
|
{
|
|
return asyncmeta_monitor_free( e, oc_olmAsyncmetaTarget, priv );
|
|
}
|
|
|
|
static int
|
|
asyncmeta_back_monitor_targets_update(
|
|
Operation *op,
|
|
SlapReply *rs,
|
|
Entry *e,
|
|
void *priv )
|
|
{
|
|
a_metatarget_t *mt = ( a_metatarget_t* )priv;
|
|
Attribute *a;
|
|
char buf[ BUFSIZ ];
|
|
struct berval bv;
|
|
|
|
a = attr_find( e->e_attrs, ad_olmTgtURIList );
|
|
assert( a != NULL );
|
|
bv.bv_val = buf;
|
|
/* todo mutex*/
|
|
bv.bv_len = snprintf( buf, sizeof( buf ), "%s", mt->mt_uri );
|
|
ber_bvreplace( &a->a_vals[ 0 ], &bv );
|
|
|
|
a = attr_find( e->e_attrs, ad_olmTgtQuarantined );
|
|
assert( a != NULL );
|
|
bv.bv_val = buf;
|
|
if ( mt->mt_isquarantined > 0 ) {
|
|
bv.bv_len = snprintf( buf, sizeof( buf ), "%s", "TRUE" );
|
|
} else {
|
|
bv.bv_len = snprintf( buf, sizeof( buf ), "%s", "FALSE" );
|
|
}
|
|
ber_bvreplace( &a->a_vals[ 0 ], &bv );
|
|
|
|
a = attr_find( e->e_attrs, ad_olmTgtTimeoutOps );
|
|
assert( a != NULL );
|
|
bv.bv_val = buf;
|
|
bv.bv_len = snprintf( buf, sizeof( buf ), "%i", mt->mt_timeout_ops );
|
|
ber_bvreplace( &a->a_vals[ 0 ], &bv );
|
|
|
|
a = attr_find( e->e_attrs, ad_olmTgtConnLastReset );
|
|
assert( a != NULL );
|
|
bv.bv_val = buf;
|
|
bv.bv_len = snprintf( buf, sizeof( buf ), "%lu", mt->msc_reset_time );
|
|
ber_bvreplace( &a->a_vals[ 0 ], &bv );
|
|
|
|
return SLAP_CB_CONTINUE;
|
|
}
|
|
|
|
static int
|
|
asyncmeta_back_monitor_targets_init(
|
|
BackendDB *be,
|
|
monitor_subsys_t *ms )
|
|
{
|
|
a_metainfo_t *mi = (a_metainfo_t *) ms->mss_private;
|
|
monitor_extra_t *mbe;
|
|
Entry *e, *parent;
|
|
int rc;
|
|
int i;
|
|
|
|
assert( be != NULL );
|
|
|
|
mbe = (monitor_extra_t *) be->bd_info->bi_extra;
|
|
|
|
ms->mss_dn = ms->mss_ndn = mi->mi_monitor_info.mi_ndn;
|
|
ms->mss_destroy = asyncmeta_back_monitor_subsystem_destroy;
|
|
|
|
parent = mbe->entry_stub( &ms->mss_dn, &ms->mss_ndn,
|
|
&mi->mi_monitor_info.mi_targets_rdn, oc_monitorContainer, NULL, NULL );
|
|
if ( parent == NULL ) {
|
|
Debug( LDAP_DEBUG_ANY,
|
|
"asyncmeta_back_monitor_targets_init: "
|
|
"unable to create entry \"%s,%s\"\n",
|
|
mi->mi_monitor_info.mi_targets_rdn.bv_val,
|
|
ms->mss_ndn.bv_val );
|
|
return( -1 );
|
|
}
|
|
|
|
ber_dupbv( &ms->mss_dn, &parent->e_name );
|
|
ber_dupbv( &ms->mss_ndn, &parent->e_nname );
|
|
ber_dupbv( &ms->mss_rdn, &mi->mi_monitor_info.mi_conn_rdn );
|
|
|
|
rc = mbe->register_entry( parent, NULL, ms, MONITOR_F_PERSISTENT_CH );
|
|
if ( rc != LDAP_SUCCESS )
|
|
{
|
|
Debug( LDAP_DEBUG_ANY,
|
|
"asyncmeta_back_monitor_target_init: "
|
|
"unable to register entry \"%s\" for monitoring\n",
|
|
parent->e_name.bv_val );
|
|
goto done;
|
|
}
|
|
|
|
for ( i = 0; i < mi->mi_ntargets; i++ )
|
|
{
|
|
monitor_callback_t *cb;
|
|
char buf[ BACKMONITOR_BUFSIZE ];
|
|
struct berval target_rdn;
|
|
Attribute *a, *next;
|
|
struct berval bv = BER_BVC( "0" );
|
|
|
|
snprintf( buf, sizeof( buf ),
|
|
"cn=Target %d", i+1 );
|
|
ber_str2bv( buf, 0, 0, &target_rdn );
|
|
|
|
e = mbe->entry_stub( &parent->e_name, &parent->e_nname,
|
|
&target_rdn,
|
|
oc_olmAsyncmetaTarget, NULL, NULL );
|
|
if ( e == NULL ) {
|
|
Debug( LDAP_DEBUG_ANY,
|
|
"asyncmeta_back_monitor_targets_init: "
|
|
"unable to create entry \"%s,%s\"\n",
|
|
target_rdn.bv_val,
|
|
parent->e_nname.bv_val );
|
|
return( -1 );
|
|
}
|
|
|
|
cb = ch_calloc( sizeof( monitor_callback_t ), 1 );
|
|
cb->mc_update = asyncmeta_back_monitor_targets_update;
|
|
cb->mc_free = asyncmeta_back_monitor_targets_free;
|
|
cb->mc_private = (void *)&mi->mi_targets[i];
|
|
|
|
a = attrs_alloc( 1 + 4 );
|
|
|
|
a->a_desc = slap_schema.si_ad_objectClass;
|
|
attr_valadd( a, &oc_olmAsyncmetaTarget->soc_cname, NULL, 1 );
|
|
next = a->a_next;
|
|
|
|
next->a_desc = ad_olmTgtURIList;
|
|
attr_valadd( next, &bv, NULL, 1 );
|
|
next = next->a_next;
|
|
|
|
next->a_desc = ad_olmTgtQuarantined;
|
|
attr_valadd( next, &bv, NULL, 1 );
|
|
next = next->a_next;
|
|
|
|
next->a_desc = ad_olmTgtConnLastReset;
|
|
attr_valadd( next, &bv, NULL, 1 );
|
|
next = next->a_next;
|
|
|
|
next->a_desc = ad_olmTgtTimeoutOps;
|
|
attr_valadd( next, &bv, NULL, 1 );
|
|
|
|
rc = mbe->register_entry( e, NULL, ms, MONITOR_F_PERSISTENT_CH );
|
|
if ( rc != LDAP_SUCCESS )
|
|
{
|
|
Debug( LDAP_DEBUG_ANY,
|
|
"asyncmeta_back_monitor_targets_init: "
|
|
"unable to register entry \"%s\" for monitoring\n",
|
|
e->e_name.bv_val );
|
|
ch_free( cb );
|
|
attrs_free( a );
|
|
entry_free( e );
|
|
break;
|
|
}
|
|
|
|
rc = mbe->register_entry_attrs( &e->e_nname, a, cb,
|
|
NULL, -1, NULL );
|
|
if ( rc != LDAP_SUCCESS )
|
|
{
|
|
Debug( LDAP_DEBUG_ANY,
|
|
"asyncmeta_back_monitor_targets_init: "
|
|
"unable to register entry attributes \"%s\" for monitoring\n",
|
|
e->e_name.bv_val );
|
|
}
|
|
attrs_free( a );
|
|
entry_free( e );
|
|
}
|
|
|
|
done:
|
|
entry_free( parent );
|
|
|
|
return rc;
|
|
}
|
|
|
|
/*
|
|
* call from within asyncmeta_back_initialize()
|
|
*/
|
|
static int
|
|
asyncmeta_back_monitor_initialize( void )
|
|
{
|
|
int i, code;
|
|
ConfigArgs c;
|
|
char *argv[ 3 ];
|
|
|
|
static int asyncmeta_back_monitor_initialized = 0;
|
|
|
|
/* set to 0 when successfully initialized; otherwise, remember failure */
|
|
static int asyncmeta_back_monitor_initialized_failure = 1;
|
|
|
|
/* register schema here */
|
|
|
|
if ( asyncmeta_back_monitor_initialized++ ) {
|
|
return asyncmeta_back_monitor_initialized_failure;
|
|
}
|
|
|
|
if ( backend_info( "monitor" ) == NULL ) {
|
|
return -1;
|
|
}
|
|
|
|
argv[ 0 ] = "back-asyncmeta monitor";
|
|
c.argv = argv;
|
|
c.argc = 3;
|
|
c.fname = argv[0];
|
|
for ( i = 0; s_oid[ i ].name; i++ ) {
|
|
|
|
argv[ 1 ] = s_oid[ i ].name;
|
|
argv[ 2 ] = s_oid[ i ].oid;
|
|
|
|
if ( parse_oidm( &c, 0, NULL ) != 0 ) {
|
|
Debug( LDAP_DEBUG_ANY,
|
|
"asyncmeta_back_monitor_initialize: unable to add "
|
|
"objectIdentifier \"%s=%s\"\n",
|
|
s_oid[ i ].name, s_oid[ i ].oid );
|
|
return 2;
|
|
}
|
|
}
|
|
|
|
for ( i = 0; s_at[ i ].desc != NULL; i++ ) {
|
|
code = register_at( s_at[ i ].desc, s_at[ i ].ad, 1 );
|
|
if ( code != LDAP_SUCCESS ) {
|
|
Debug( LDAP_DEBUG_ANY,
|
|
"asyncmeta_back_monitor_initialize: register_at failed for attributeType (%s)\n",
|
|
s_at[ i ].desc );
|
|
return 3;
|
|
|
|
} else {
|
|
(*s_at[ i ].ad)->ad_type->sat_flags |= SLAP_AT_HIDE;
|
|
}
|
|
}
|
|
|
|
for ( i = 0; s_oc[ i ].desc != NULL; i++ ) {
|
|
code = register_oc( s_oc[ i ].desc, s_oc[ i ].oc, 1 );
|
|
if ( code != LDAP_SUCCESS ) {
|
|
Debug( LDAP_DEBUG_ANY,
|
|
"asyncmeta_back_monitor_initialize: register_oc failed for objectClass (%s)\n",
|
|
s_oc[ i ].desc );
|
|
return 4;
|
|
|
|
} else {
|
|
(*s_oc[ i ].oc)->soc_flags |= SLAP_OC_HIDE;
|
|
}
|
|
}
|
|
|
|
for ( i = 0; s_moc[ i ].name != NULL; i++ ) {
|
|
*s_moc[i].oc = oc_find( s_moc[ i ].name );
|
|
if ( ! *s_moc[i].oc ) {
|
|
Debug( LDAP_DEBUG_ANY,
|
|
"asyncmeta_back_monitor_initialize: failed to find objectClass (%s)\n",
|
|
s_moc[ i ].name );
|
|
return 5;
|
|
|
|
}
|
|
}
|
|
|
|
return ( asyncmeta_back_monitor_initialized_failure = LDAP_SUCCESS );
|
|
}
|
|
|
|
/*
|
|
* call from within asyncmeta_back_db_init()
|
|
*/
|
|
int
|
|
asyncmeta_back_monitor_db_init( BackendDB *be )
|
|
{
|
|
int rc;
|
|
|
|
rc = asyncmeta_back_monitor_initialize();
|
|
if ( rc != LDAP_SUCCESS ) {
|
|
return rc;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* adapted from mdb_monitor_update */
|
|
static int
|
|
asyncmeta_monitor_db_update(
|
|
Operation *op,
|
|
SlapReply *rs,
|
|
Entry *e,
|
|
void *priv )
|
|
{
|
|
struct a_metainfo_t *mi = (struct a_metainfo_t *) priv;
|
|
Attribute *a;
|
|
char buf[ BUFSIZ ];
|
|
struct berval bv;
|
|
|
|
a = attr_find( e->e_attrs, ad_olmDbNextConnectionGroup );
|
|
assert( a != NULL );
|
|
bv.bv_val = buf;
|
|
bv.bv_len = snprintf( buf, sizeof( buf ), "%i", mi->mi_next_conn+1 );
|
|
ber_bvreplace( &a->a_vals[ 0 ], &bv );
|
|
|
|
return SLAP_CB_CONTINUE;
|
|
}
|
|
|
|
static int
|
|
asyncmeta_monitor_db_free
|
|
(
|
|
Entry *e,
|
|
void **priv )
|
|
{
|
|
return asyncmeta_monitor_free( e, oc_olmAsyncmetaDatabase, priv );
|
|
}
|
|
|
|
/*
|
|
* call from within asyncmeta_back_db_open()
|
|
*/
|
|
int
|
|
asyncmeta_back_monitor_db_open( BackendDB *be )
|
|
{
|
|
a_metainfo_t *mi = (a_metainfo_t *) be->be_private;
|
|
monitor_subsys_t *mss;
|
|
int rc = 0;
|
|
BackendInfo *bi;
|
|
monitor_extra_t *mbe;
|
|
Attribute *a, *next;
|
|
monitor_callback_t *cb;
|
|
|
|
struct berval bv = BER_BVC( "0" );
|
|
|
|
if ( !SLAP_DBMONITORING( be ) ) {
|
|
return 0;
|
|
}
|
|
|
|
/* check if monitor is configured and usable */
|
|
bi = backend_info( "monitor" );
|
|
if ( !bi || !bi->bi_extra ) {
|
|
SLAP_DBFLAGS( be ) ^= SLAP_DBFLAG_MONITORING;
|
|
return 0;
|
|
}
|
|
mbe = bi->bi_extra;
|
|
|
|
/* don't bother if monitor is not configured */
|
|
if ( !mbe->is_configured() ) {
|
|
static int warning = 0;
|
|
|
|
if ( warning++ == 0 ) {
|
|
Debug( LDAP_DEBUG_CONFIG, "back_asyncmeta_monitor_db_open: "
|
|
"monitoring disabled; "
|
|
"configure monitor database to enable\n" );
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
if ( BER_BVISNULL( &mi->mi_monitor_info.mi_ndn ) ) {
|
|
rc = mbe->register_database( be, &mi->mi_monitor_info.mi_ndn );
|
|
if ( rc != 0 ) {
|
|
Debug( LDAP_DEBUG_ANY, "back_asyncmeta_monitor_db_open: "
|
|
"failed to register the database with back-monitor\n" );
|
|
}
|
|
}
|
|
a = attrs_alloc( 2 );
|
|
if ( a == NULL ) {
|
|
return -1;
|
|
}
|
|
|
|
a->a_desc = slap_schema.si_ad_objectClass;
|
|
attr_valadd( a, &oc_olmAsyncmetaDatabase->soc_cname, NULL, 1 );
|
|
next = a->a_next;
|
|
|
|
next->a_desc = ad_olmDbNextConnectionGroup;
|
|
attr_valadd( next, &bv, NULL, 1 );
|
|
|
|
cb = ch_calloc( sizeof( monitor_callback_t ), 1 );
|
|
cb->mc_update = asyncmeta_monitor_db_update;
|
|
cb->mc_free = asyncmeta_monitor_db_free;
|
|
cb->mc_private = (void *)mi;
|
|
|
|
rc = mbe->register_entry_attrs( &mi->mi_monitor_info.mi_ndn, a, cb,
|
|
NULL, -1, NULL );
|
|
attrs_free( a );
|
|
if ( rc != 0 ) {
|
|
Debug( LDAP_DEBUG_ANY, "back_asyncmeta_monitor_db_open: "
|
|
"failed to register entry %s with back-monitor\n",
|
|
mi->mi_monitor_info.mi_ndn.bv_val );
|
|
return rc;
|
|
}
|
|
if ( BER_BVISNULL( &mi->mi_monitor_info.mi_conn_rdn ) ) {
|
|
ber_str2bv( "cn=Connections", 0, 1,
|
|
&mi->mi_monitor_info.mi_conn_rdn );
|
|
}
|
|
if ( BER_BVISNULL( &mi->mi_monitor_info.mi_targets_rdn ) ) {
|
|
ber_str2bv( "cn=Targets", 0, 1,
|
|
&mi->mi_monitor_info.mi_targets_rdn );
|
|
}
|
|
|
|
/* set up the subsystems used to create the targets and
|
|
* connection entries */
|
|
/* unlike back-ldap, these entries are persistent,
|
|
* since asyncmeta maintains the data structures regardless of
|
|
* the ldap connection state */
|
|
|
|
/* this will leak at monitor_db_destroy, but it can't be helped */
|
|
mi->mi_monitor_info.mi_conn_mss = (monitor_subsys_t *)ch_calloc( 1, sizeof( monitor_subsys_t ) );
|
|
/* just for clarity */
|
|
mss = mi->mi_monitor_info.mi_conn_mss;
|
|
mss->mss_name = "back-asyncmeta connections";
|
|
mss->mss_flags = MONITOR_F_PERSISTENT_CH;
|
|
mss->mss_open = asyncmeta_back_monitor_conn_init;
|
|
mss->mss_private = mi;
|
|
|
|
if ( mbe->register_subsys_late( mss ) )
|
|
{
|
|
Debug( LDAP_DEBUG_ANY,
|
|
"back_asyncmeta_monitor_db_open: "
|
|
"failed to register connections subsystem" );
|
|
return -1;
|
|
}
|
|
|
|
mi->mi_monitor_info.mi_targets_mss = (monitor_subsys_t *)ch_calloc( 1, sizeof( monitor_subsys_t ) );
|
|
mss = mi->mi_monitor_info.mi_targets_mss;
|
|
mss->mss_name = "back-asyncmeta targets";
|
|
mss->mss_flags = MONITOR_F_PERSISTENT_CH;
|
|
mss->mss_open = asyncmeta_back_monitor_targets_init;
|
|
mss->mss_private = mi;
|
|
|
|
if ( mbe->register_subsys_late( mss ) )
|
|
{
|
|
Debug( LDAP_DEBUG_ANY,
|
|
"ldap_back_monitor_db_open: "
|
|
"failed to register operation subsystem" );
|
|
return -1;
|
|
}
|
|
|
|
return rc;
|
|
}
|
|
|
|
/*
|
|
* call from within asyncmeta_back_db_close()
|
|
*/
|
|
int
|
|
asyncmeta_back_monitor_db_close( BackendDB *be )
|
|
{
|
|
a_metainfo_t *mi = (a_metainfo_t *) be->be_private;
|
|
int rc = 0;
|
|
if ( mi && !BER_BVISNULL( &mi->mi_monitor_info.mi_ndn ) ) {
|
|
BackendInfo *bi;
|
|
monitor_extra_t *mbe;
|
|
|
|
/* check if monitor is configured and usable */
|
|
bi = backend_info( "monitor" );
|
|
if ( bi && bi->bi_extra ) {
|
|
mbe = bi->bi_extra;
|
|
rc = mbe->unregister_entry( &mi->mi_monitor_info.mi_ndn );
|
|
}
|
|
}
|
|
return rc;
|
|
}
|
|
|
|
/*
|
|
* call from within asyncmeta_back_db_destroy()
|
|
*/
|
|
int
|
|
asyncmeta_back_monitor_db_destroy( BackendDB *be )
|
|
{
|
|
a_metainfo_t *mi = (a_metainfo_t *) be->be_private;
|
|
if ( mi ) {
|
|
if ( mi->mi_monitor_info.mi_targets_rdn.bv_len > 0 ) {
|
|
ch_free( mi->mi_monitor_info.mi_targets_rdn.bv_val );
|
|
}
|
|
if ( mi->mi_monitor_info.mi_conn_rdn.bv_len > 0 ) {
|
|
ch_free( mi->mi_monitor_info.mi_conn_rdn.bv_val );
|
|
}
|
|
}
|
|
return 0;
|
|
}
|