Removed now useless calls to String.valueOf() on arguments of Logger.*(...).
| | |
| | | ] |
| | | } |
| | | |
| | | LOG_ISTRACEENABLED_TRACEEXCEPTION = { |
| | | LOGGER_TOSTRING = { |
| | | :dirs => JAVA_DIRS, |
| | | :extensions => ["java"], |
| | | :replacements => |
| | | [ |
| | | # Need to fix removing the last parentheses |
| | | /(logger\.\s*(trace|debug|warn|info|error)\s*\([^;]*)\s*String\s*\.\s*valueOf\s*\(/m, |
| | | /([A-Z0-9_]+\s*\.\s*get\s*\([^;]*)\.toString\(\)/m, |
| | | '\1', |
| | | ] |
| | | } |
| | | |
| | | LOGGER_STRING_VALUEOF = { |
| | | :dirs => JAVA_DIRS, |
| | | :extensions => ["java"], |
| | | :replacements => |
| | | [ |
| | | # Need to fix removing the last parentheses |
| | | /(logger\.\s*(trace|debug|warn|info|error)\s*\([^;]*)\s*String\s*\.\s*valueOf\s*\(/m, |
| | | '\1', |
| | | ] |
| | | } |
| | | |
| | | LOGGER_ISTRACEENABLED_TRACEEXCEPTION = { |
| | | :dirs => JAVA_DIRS, |
| | | :extensions => ["java"], |
| | | :replacements => |
| | |
| | | } |
| | | |
| | | # List of replacements to run |
| | | REPLACEMENTS = [ MSG_ARGN_STRING_VALUEOF ] |
| | | REPLACEMENTS = [ LOGGER_STRING_VALUEOF ] |
| | | #REPLACEMENTS = [ MESSAGES, TYPES, DN_TYPES, EXCEPTIONS, LOGGERS, I18N_LOGGERS ] |
| | | |
| | | |
| | |
| | | */ |
| | | package org.opends.server.admin; |
| | | |
| | | |
| | | |
| | | import static org.opends.messages.AdminMessages.*; |
| | | import static org.opends.server.util.StaticUtils.*; |
| | | import static org.forgerock.util.Reject.*; |
| | | |
| | | import java.util.Collection; |
| | |
| | | import org.opends.server.types.ConfigChangeResult; |
| | | import org.opends.server.types.DN; |
| | | import org.opends.server.types.ResultCode; |
| | | import org.opends.server.util.StaticUtils; |
| | | |
| | | |
| | | |
| | | /** |
| | | * Aggregation property definition. |
| | |
| | | } catch (ConfigException e) { |
| | | // The condition could not be evaluated. |
| | | logger.traceException(e); |
| | | |
| | | logger.error(ERR_REFINT_UNABLE_TO_EVALUATE_TARGET_CONDITION, mo |
| | | .getManagedObjectDefinition().getUserFriendlyName(), String |
| | | .valueOf(mo.getDN()), StaticUtils.getExceptionMessage(e)); |
| | | logger.error(ERR_REFINT_UNABLE_TO_EVALUATE_TARGET_CONDITION, |
| | | mo.getManagedObjectDefinition().getUserFriendlyName(), mo.getDN(), getExceptionMessage(e)); |
| | | unacceptableReasons.add(message); |
| | | return false; |
| | | } |
| | |
| | | if (!extensionsPath.exists()) { |
| | | // The extensions directory does not exist. This is not a |
| | | // critical problem. |
| | | logger.error(ERR_ADMIN_NO_EXTENSIONS_DIR, String.valueOf(extensionsPath)); |
| | | logger.error(ERR_ADMIN_NO_EXTENSIONS_DIR, extensionsPath); |
| | | return; |
| | | } |
| | | |
| | |
| | | && !operation.getClientConnection().hasPrivilege( |
| | | Privilege.MODIFY_ACL, operation)) |
| | | { |
| | | logger.debug(INFO_ACI_MODIFY_FAILED_PRIVILEGE, String.valueOf(container |
| | | .getResourceDN()), String.valueOf(container.getClientDN())); |
| | | logger.debug(INFO_ACI_MODIFY_FAILED_PRIVILEGE, container.getResourceDN(), container.getClientDN()); |
| | | return false; |
| | | } |
| | | // This access check handles the case where all attributes of this |
| | |
| | | final Lock entryLock = LockManager.lockRead(superiorDN); |
| | | if (entryLock == null) |
| | | { |
| | | logger.warn(WARN_ACI_HANDLER_CANNOT_LOCK_NEW_SUPERIOR_USER, String |
| | | .valueOf(superiorDN)); |
| | | logger.warn(WARN_ACI_HANDLER_CANNOT_LOCK_NEW_SUPERIOR_USER, superiorDN); |
| | | return false; |
| | | } |
| | | |
| | |
| | | { |
| | | aciListenerMgr.logMsgsSetLockDownMode(failedACIMsgs); |
| | | } |
| | | logger.debug(INFO_ACI_ADD_LIST_ACIS, Integer.toString(validAcis), |
| | | String.valueOf(baseDN)); |
| | | logger.debug(INFO_ACI_ADD_LIST_ACIS, validAcis, baseDN); |
| | | } |
| | | } |
| | | catch (Exception e) |
| | |
| | | if (!operation.getClientConnection().hasPrivilege( |
| | | Privilege.MODIFY_ACL, operation)) |
| | | { |
| | | logger.debug(INFO_ACI_ADD_FAILED_PRIVILEGE, String.valueOf(entry.getName()), String.valueOf(clientDN)); |
| | | logger.debug(INFO_ACI_ADD_FAILED_PRIVILEGE, entry.getName(), clientDN); |
| | | return false; |
| | | } |
| | | List<Attribute> attributeList = |
| | |
| | | //This should never happen since only a copy of the |
| | | //ACI with a new DN is being made. Log a message if it does and |
| | | //keep going. |
| | | logger.warn(WARN_ACI_ADD_LIST_FAILED_DECODE, aci, String.valueOf(relocateDN), ex.getMessage()); |
| | | logger.warn(WARN_ACI_ADD_LIST_FAILED_DECODE, aci, relocateDN, ex.getMessage()); |
| | | } |
| | | } |
| | | tempAciList.put(relocateDN, acis); |
| | |
| | | } |
| | | if (!internalSearch.getSearchEntries().isEmpty()) |
| | | { |
| | | int validAcis = |
| | | aciList.addAci(internalSearch.getSearchEntries(), |
| | | failedACIMsgs); |
| | | int validAcis = aciList.addAci(internalSearch.getSearchEntries(), failedACIMsgs); |
| | | if (!failedACIMsgs.isEmpty()) |
| | | logMsgsSetLockDownMode(failedACIMsgs); |
| | | logger.debug(INFO_ACI_ADD_LIST_ACIS, Integer.toString(validAcis), |
| | | String.valueOf(baseDN)); |
| | | logger.debug(INFO_ACI_ADD_LIST_ACIS, validAcis, baseDN); |
| | | } |
| | | } |
| | | } |
| | |
| | | Backend backend = DirectoryServer.getBackend(baseDN); |
| | | if (backend == null) |
| | | { |
| | | logger.warn(WARN_ROOTDSE_NO_BACKEND_FOR_SUBORDINATE_BASE, String.valueOf(baseDN)); |
| | | logger.warn(WARN_ROOTDSE_NO_BACKEND_FOR_SUBORDINATE_BASE, baseDN); |
| | | } |
| | | else |
| | | { |
| | |
| | | |
| | | // This method should never be used to get anything other than the root DSE. |
| | | // If we got here, then that appears to be the case, so log a message. |
| | | logger.warn(WARN_ROOTDSE_GET_ENTRY_NONROOT, String.valueOf(entryDN)); |
| | | logger.warn(WARN_ROOTDSE_GET_ENTRY_NONROOT, entryDN); |
| | | |
| | | |
| | | // Go ahead and check the subordinate backends to see if we can find the |
| | |
| | | toLowerCase(ruleName)); |
| | | if(rule == null) |
| | | { |
| | | logger.error(ERR_CONFIG_INDEX_TYPE_NEEDS_VALID_MATCHING_RULE, String.valueOf(attrType),ruleName); |
| | | logger.error(ERR_CONFIG_INDEX_TYPE_NEEDS_VALID_MATCHING_RULE, attrType, ruleName); |
| | | continue; |
| | | } |
| | | Map<String,Index> indexMap = new HashMap<String,Index>(); |
| | |
| | | toLowerCase(ruleName)); |
| | | if(rule == null) |
| | | { |
| | | logger.error(ERR_CONFIG_INDEX_TYPE_NEEDS_VALID_MATCHING_RULE, String.valueOf(attrType),ruleName); |
| | | logger.error(ERR_CONFIG_INDEX_TYPE_NEEDS_VALID_MATCHING_RULE, attrType, ruleName); |
| | | continue; |
| | | } |
| | | validRules.add(rule); |
| | |
| | | |
| | | Arrays.sort(logFiles); |
| | | |
| | | logger.info(NOTE_JEB_BACKUP_CLEANER_ACTIVITY, String.valueOf(logFiles.length)); |
| | | logger.info(NOTE_JEB_BACKUP_CLEANER_ACTIVITY, logFiles.length); |
| | | } |
| | | else |
| | | { |
| | |
| | | int cpus = Runtime.getRuntime().availableProcessors(); |
| | | value = Integer.valueOf(Math.max(24, cpus * 2)); |
| | | |
| | | logger.debug(INFO_ERGONOMIC_SIZING_OF_JE_CLEANER_THREADS, String |
| | | .valueOf(cfg.dn().rdn().getAttributeValue(0)), |
| | | (Number) value); |
| | | logger.debug(INFO_ERGONOMIC_SIZING_OF_JE_CLEANER_THREADS, |
| | | cfg.dn().rdn().getAttributeValue(0), (Number) value); |
| | | } |
| | | else if (attrName.equals(ATTR_NUM_LOCK_TABLES) |
| | | && value == null) |
| | |
| | | BigInteger tmp = BigInteger.valueOf((cleaners + workers) * 2); |
| | | value = tmp.nextProbablePrime(); |
| | | |
| | | logger.debug(INFO_ERGONOMIC_SIZING_OF_JE_LOCK_TABLES, String |
| | | .valueOf(cfg.dn().rdn().getAttributeValue(0)), |
| | | (Number) value); |
| | | logger.debug(INFO_ERGONOMIC_SIZING_OF_JE_LOCK_TABLES, cfg.dn().rdn().getAttributeValue(0), (Number) value); |
| | | } |
| | | |
| | | return String.valueOf(value); |
| | |
| | | |
| | | logger.trace("Error normalizing values of attribute %s in " + |
| | | "entry <%s>: %s.%n", |
| | | attrIndex.getAttributeType().toString(), |
| | | entry.getName().toString(), |
| | | String.valueOf(e.getMessageObject())); |
| | | attrIndex.getAttributeType(), entry.getName(), e.getMessageObject()); |
| | | } |
| | | } |
| | | } |
| | |
| | | |
| | | logger.trace("Error checking entry %s against filter or " + |
| | | "base DN for VLV index %s: %s", |
| | | entry.getName().toString(), |
| | | vlvIndex.getName(), |
| | | String.valueOf(e.getMessageObject())); |
| | | entry.getName(), vlvIndex.getName(), e.getMessageObject()); |
| | | } |
| | | errorCount++; |
| | | } |
| | |
| | | DatabaseEntry data = new DatabaseEntry(); |
| | | LockMode lockMode = LockMode.DEFAULT; |
| | | OperationStatus status; |
| | | logger.info(NOTE_JEB_IMPORT_MIGRATION_START, "excluded", String |
| | | .valueOf(suffix.getBaseDN())); |
| | | logger.info(NOTE_JEB_IMPORT_MIGRATION_START, "excluded", suffix.getBaseDN()); |
| | | Cursor cursor = |
| | | entryContainer.getDN2ID().openCursor(null, |
| | | CursorConfig.READ_COMMITTED); |
| | |
| | | DatabaseEntry data = new DatabaseEntry(); |
| | | LockMode lockMode = LockMode.DEFAULT; |
| | | OperationStatus status; |
| | | logger.info(NOTE_JEB_IMPORT_MIGRATION_START, "existing", String |
| | | .valueOf(suffix.getBaseDN())); |
| | | logger.info(NOTE_JEB_IMPORT_MIGRATION_START, "existing", suffix.getBaseDN()); |
| | | Cursor cursor = entryContainer.getDN2ID().openCursor(null, null); |
| | | try |
| | | { |
| | |
| | | |
| | | taskState = TaskState.STOPPED_BY_ERROR; |
| | | |
| | | logger.error(ERR_TASK_EXECUTE_FAILED, String.valueOf(taskEntry.getName()), stackTraceToSingleLineString(e)); |
| | | logger.error(ERR_TASK_EXECUTE_FAILED, taskEntry.getName(), stackTraceToSingleLineString(e)); |
| | | } |
| | | |
| | | return taskState; |
| | |
| | | DN parentDN = entryDN.getParentDNInSuffix(); |
| | | if (parentDN == null) |
| | | { |
| | | logger.error(ERR_TASKSCHED_ENTRY_HAS_NO_PARENT, String.valueOf(entryDN), |
| | | String.valueOf(taskBackend.getTaskRootDN())); |
| | | logger.error(ERR_TASKSCHED_ENTRY_HAS_NO_PARENT, entryDN, taskBackend.getTaskRootDN()); |
| | | } |
| | | else if (parentDN.equals(taskBackend.getScheduledTasksParentDN())) |
| | | { |
| | |
| | | String id = task.getTaskID(); |
| | | if (tasks.containsKey(id)) |
| | | { |
| | | logger.warn(WARN_TASKSCHED_DUPLICATE_TASK_ID, String.valueOf(id)); |
| | | logger.warn(WARN_TASKSCHED_DUPLICATE_TASK_ID, id); |
| | | } |
| | | else |
| | | { |
| | |
| | | catch (DirectoryException de) |
| | | { |
| | | logger.traceException(de); |
| | | |
| | | logger.error(ERR_TASKSCHED_CANNOT_SCHEDULE_TASK_FROM_ENTRY, |
| | | String.valueOf(entryDN), de.getMessageObject()); |
| | | logger.error(ERR_TASKSCHED_CANNOT_SCHEDULE_TASK_FROM_ENTRY, entryDN, de.getMessageObject()); |
| | | } |
| | | } |
| | | else if (parentDN.equals(taskBackend.getRecurringTasksParentDN())) |
| | |
| | | catch (DirectoryException de) |
| | | { |
| | | logger.traceException(de); |
| | | |
| | | logger.error( |
| | | ERR_TASKSCHED_CANNOT_SCHEDULE_RECURRING_TASK_FROM_ENTRY, |
| | | String.valueOf(entryDN), de.getMessageObject()); |
| | | logger.error(ERR_TASKSCHED_CANNOT_SCHEDULE_RECURRING_TASK_FROM_ENTRY, entryDN, de.getMessageObject()); |
| | | } |
| | | } |
| | | else |
| | | { |
| | | logger.error(ERR_TASKSCHED_INVALID_TASK_ENTRY_DN, String.valueOf(entryDN), backingFilePath); |
| | | logger.error(ERR_TASKSCHED_INVALID_TASK_ENTRY_DN, entryDN, backingFilePath); |
| | | } |
| | | } |
| | | } |
| | |
| | | logger.traceException(e); |
| | | |
| | | Task task = getAssociatedTask(); |
| | | |
| | | logger.error(ERR_TASK_EXECUTE_FAILED, String.valueOf(task.getTaskEntry().getName()), |
| | | stackTraceToSingleLineString(e)); |
| | | logger.error(ERR_TASK_EXECUTE_FAILED, task.getTaskEntry().getName(), stackTraceToSingleLineString(e)); |
| | | task.setTaskState(TaskState.STOPPED_BY_ERROR); |
| | | } |
| | | |
| | |
| | | } catch (Exception e) |
| | | { |
| | | logger.traceException(e); |
| | | |
| | | logger.error(ERR_CONFIG_JMX_CANNOT_REGISTER_MBEAN, configEntryDN, String.valueOf(e)); |
| | | logger.error(ERR_CONFIG_JMX_CANNOT_REGISTER_MBEAN, configEntryDN, e); |
| | | } |
| | | return nameStr ; |
| | | } |
| | |
| | | catch (Exception e) |
| | | { |
| | | logger.traceException(e); |
| | | logger.error(ERR_CONFIG_JMX_CANNOT_REGISTER_MBEAN, configEntryDN, String.valueOf(e)); |
| | | logger.error(ERR_CONFIG_JMX_CANNOT_REGISTER_MBEAN, configEntryDN, e); |
| | | } |
| | | } |
| | | } |
| | |
| | | } |
| | | catch (DirectoryException de) |
| | | { |
| | | logger.warn(WARN_CONFIG_SCHEMA_SYNTAX_CONFLICTING_SYNTAX, String |
| | | .valueOf(syntaxConfiguration.dn()), de.getMessageObject()); |
| | | logger.warn(WARN_CONFIG_SCHEMA_SYNTAX_CONFLICTING_SYNTAX, syntaxConfiguration.dn(), de.getMessageObject()); |
| | | continue; |
| | | } |
| | | } |
| | |
| | | // then log an error and skip it. |
| | | if (DirectoryServer.hasBackend(backendCfg.getBackendId())) |
| | | { |
| | | logger.warn(WARN_CONFIG_BACKEND_DUPLICATE_BACKEND_ID, backendID, String.valueOf(backendDN)); |
| | | logger.warn(WARN_CONFIG_BACKEND_DUPLICATE_BACKEND_ID, backendID, backendDN); |
| | | continue; |
| | | } |
| | | |
| | |
| | | catch (Exception e) |
| | | { |
| | | logger.traceException(e); |
| | | |
| | | logger.error(ERR_CONFIG_BACKEND_CANNOT_INSTANTIATE, String.valueOf(className), String.valueOf(backendDN), |
| | | stackTraceToSingleLineString(e)); |
| | | logger.error(ERR_CONFIG_BACKEND_CANNOT_INSTANTIATE, className, backendDN, stackTraceToSingleLineString(e)); |
| | | continue; |
| | | } |
| | | |
| | |
| | | StringBuilder failureReason = new StringBuilder(); |
| | | if (! LockFileManager.acquireSharedLock(lockFile, failureReason)) |
| | | { |
| | | logger.error(ERR_CONFIG_BACKEND_CANNOT_ACQUIRE_SHARED_LOCK, backendID, String.valueOf(failureReason)); |
| | | logger.error(ERR_CONFIG_BACKEND_CANNOT_ACQUIRE_SHARED_LOCK, backendID, failureReason); |
| | | // FIXME -- Do we need to send an admin alert? |
| | | continue; |
| | | } |
| | |
| | | catch (Exception e) |
| | | { |
| | | logger.traceException(e); |
| | | |
| | | logger.error(ERR_CONFIG_BACKEND_CANNOT_ACQUIRE_SHARED_LOCK, backendID, stackTraceToSingleLineString(e)); |
| | | // FIXME -- Do we need to send an admin alert? |
| | | continue; |
| | |
| | | catch (Exception e) |
| | | { |
| | | logger.traceException(e); |
| | | |
| | | logger.error(ERR_CONFIG_BACKEND_CANNOT_INITIALIZE, String.valueOf(className), String.valueOf(backendDN), |
| | | stackTraceToSingleLineString(e)); |
| | | logger.error(ERR_CONFIG_BACKEND_CANNOT_INITIALIZE, className, backendDN, stackTraceToSingleLineString(e)); |
| | | |
| | | try |
| | | { |
| | |
| | | StringBuilder failureReason = new StringBuilder(); |
| | | if (! LockFileManager.releaseLock(lockFile, failureReason)) |
| | | { |
| | | logger.warn(WARN_CONFIG_BACKEND_CANNOT_RELEASE_SHARED_LOCK, backendID, String.valueOf(failureReason)); |
| | | logger.warn(WARN_CONFIG_BACKEND_CANNOT_RELEASE_SHARED_LOCK, backendID, failureReason); |
| | | // FIXME -- Do we need to send an admin alert? |
| | | } |
| | | } |
| | |
| | | } |
| | | else |
| | | { |
| | | // The backend is explicitly disabled. Log a mild warning and |
| | | // continue. |
| | | logger.debug(INFO_CONFIG_BACKEND_DISABLED, String.valueOf(backendDN)); |
| | | // The backend is explicitly disabled. Log a mild warning and continue. |
| | | logger.debug(INFO_CONFIG_BACKEND_DISABLED, backendDN); |
| | | } |
| | | } |
| | | } |
| | |
| | | StringBuilder failureReason = new StringBuilder(); |
| | | if (! LockFileManager.releaseLock(lockFile, failureReason)) |
| | | { |
| | | logger.warn(WARN_CONFIG_BACKEND_CANNOT_RELEASE_SHARED_LOCK, |
| | | backend.getBackendID(), String.valueOf(failureReason)); |
| | | logger.warn(WARN_CONFIG_BACKEND_CANNOT_RELEASE_SHARED_LOCK, backend.getBackendID(), failureReason); |
| | | // FIXME -- Do we need to send an admin alert? |
| | | } |
| | | } |
| | | catch (Exception e2) |
| | | { |
| | | logger.traceException(e2); |
| | | |
| | | logger.warn(WARN_CONFIG_BACKEND_CANNOT_RELEASE_SHARED_LOCK, backend |
| | | .getBackendID(), stackTraceToSingleLineString(e2)); |
| | | // FIXME -- Do we need to send an admin alert? |
| | |
| | | StringBuilder failureReason = new StringBuilder(); |
| | | if (! LockFileManager.releaseLock(lockFile, failureReason)) |
| | | { |
| | | logger.warn(WARN_CONFIG_BACKEND_CANNOT_RELEASE_SHARED_LOCK, backendID, String.valueOf(failureReason)); |
| | | logger.warn(WARN_CONFIG_BACKEND_CANNOT_RELEASE_SHARED_LOCK, backendID, failureReason); |
| | | // FIXME -- Do we need to send an admin alert? |
| | | } |
| | | } |
| | | catch (Exception e2) |
| | | { |
| | | logger.traceException(e2); |
| | | |
| | | logger.warn(WARN_CONFIG_BACKEND_CANNOT_RELEASE_SHARED_LOCK, backendID, stackTraceToSingleLineString(e2)); |
| | | // FIXME -- Do we need to send an admin alert? |
| | | } |
| | |
| | | StringBuilder failureReason = new StringBuilder(); |
| | | if (! LockFileManager.releaseLock(lockFile, failureReason)) |
| | | { |
| | | logger.warn(WARN_CONFIG_BACKEND_CANNOT_RELEASE_SHARED_LOCK, backend |
| | | .getBackendID(), String.valueOf(failureReason)); |
| | | logger.warn(WARN_CONFIG_BACKEND_CANNOT_RELEASE_SHARED_LOCK, backend.getBackendID(), failureReason); |
| | | // FIXME -- Do we need to send an admin alert? |
| | | } |
| | | } |
| | | catch (Exception e2) |
| | | { |
| | | logger.traceException(e2); |
| | | |
| | | logger.warn(WARN_CONFIG_BACKEND_CANNOT_RELEASE_SHARED_LOCK, backend |
| | | .getBackendID(), stackTraceToSingleLineString(e2)); |
| | | // FIXME -- Do we need to send an admin alert? |
| | |
| | | StringBuilder failureReason = new StringBuilder(); |
| | | if (! LockFileManager.releaseLock(lockFile, failureReason)) |
| | | { |
| | | logger.warn(WARN_SHUTDOWN_CANNOT_RELEASE_SHARED_BACKEND_LOCK, |
| | | backend.getBackendID(), String.valueOf(failureReason)); |
| | | logger.warn(WARN_SHUTDOWN_CANNOT_RELEASE_SHARED_BACKEND_LOCK, backend.getBackendID(), failureReason); |
| | | // FIXME -- Do we need to send an admin alert? |
| | | } |
| | | } |
| | |
| | | } |
| | | catch (DirectoryException de) |
| | | { |
| | | logger.warn(WARN_CONFIG_SCHEMA_MR_CONFLICTING_MR, String |
| | | .valueOf(mrConfiguration.dn()), de.getMessageObject()); |
| | | logger.warn(WARN_CONFIG_SCHEMA_MR_CONFLICTING_MR, mrConfiguration.dn(), de.getMessageObject()); |
| | | continue; |
| | | } |
| | | } |
| | |
| | | { |
| | | // Just log a message instead of failing the server initialization. |
| | | // This will allow the administrator to fix any problems. |
| | | logger.error(ERR_CONFIG_PWPOLICY_INVALID_POLICY_CONFIG, String.valueOf(subentry.getDN()), |
| | | stackTraceToSingleLineString(e)); |
| | | logger.error(ERR_CONFIG_PWPOLICY_INVALID_POLICY_CONFIG, subentry.getDN(), stackTraceToSingleLineString(e)); |
| | | } |
| | | } |
| | | } |
| | |
| | | ResultCode resultCode = searchOperation.getResultCode(); |
| | | if (resultCode != ResultCode.SUCCESS) |
| | | { |
| | | logger.debug(INFO_TRUSTSTORESYNC_ADMIN_SUFFIX_SEARCH_FAILED, String.valueOf(adminSuffixDN), |
| | | searchOperation.getErrorMessage().toString()); |
| | | logger.debug(INFO_TRUSTSTORESYNC_ADMIN_SUFFIX_SEARCH_FAILED, adminSuffixDN, |
| | | searchOperation.getErrorMessage()); |
| | | } |
| | | |
| | | for (SearchResultEntry searchEntry : searchOperation.getSearchEntries()) |
| | |
| | | |
| | | if (delOperation.getResultCode() != ResultCode.SUCCESS) |
| | | { |
| | | logger.debug(INFO_TRUSTSTORESYNC_DELETE_FAILED, String.valueOf(dstDN), |
| | | String.valueOf(delOperation.getErrorMessage())); |
| | | logger.debug(INFO_TRUSTSTORESYNC_DELETE_FAILED, dstDN, delOperation.getErrorMessage()); |
| | | } |
| | | } |
| | | |
| | |
| | | AddOperation addOperation = conn.processAdd(addEntry); |
| | | if (addOperation.getResultCode() != ResultCode.SUCCESS) |
| | | { |
| | | logger.debug(INFO_TRUSTSTORESYNC_ADD_FAILED, String.valueOf(dstDN), |
| | | String.valueOf(addOperation.getErrorMessage())); |
| | | logger.debug(INFO_TRUSTSTORESYNC_ADD_FAILED, dstDN, addOperation.getErrorMessage()); |
| | | } |
| | | } |
| | | |
| | |
| | | |
| | | if (resultCode != ResultCode.SUCCESS) |
| | | { |
| | | logger.error(ERR_CONFIG_CHANGE_RESULT_ERROR, String.valueOf(className), String.valueOf(methodName), |
| | | String.valueOf(entryDN), String.valueOf(resultCode), |
| | | adminActionRequired, messageBuffer.toString()); |
| | | logger.error(ERR_CONFIG_CHANGE_RESULT_ERROR, className, methodName, |
| | | entryDN, resultCode, adminActionRequired, messageBuffer); |
| | | } |
| | | else if (adminActionRequired) |
| | | { |
| | | logger.warn(WARN_CONFIG_CHANGE_RESULT_ACTION_REQUIRED, String.valueOf(className), String.valueOf(methodName), |
| | | String.valueOf(entryDN), messageBuffer.toString()); |
| | | logger.warn(WARN_CONFIG_CHANGE_RESULT_ACTION_REQUIRED, className, methodName, entryDN, messageBuffer); |
| | | } |
| | | else if (messageBuffer.length() > 0) |
| | | { |
| | | logger.debug(INFO_CONFIG_CHANGE_RESULT_MESSAGES, String.valueOf(className), String.valueOf(methodName), |
| | | String.valueOf(entryDN), messageBuffer.toString()); |
| | | logger.debug(INFO_CONFIG_CHANGE_RESULT_MESSAGES, className, methodName, entryDN, messageBuffer); |
| | | } |
| | | } |
| | | |
| | |
| | | { |
| | | logger.traceException(de); |
| | | logger.error(ERR_DYNAMICGROUP_CANNOT_DECODE_MEMBERURL, v.getValue(), |
| | | String.valueOf(groupEntry.getName()), de.getMessageObject()); |
| | | groupEntry.getName(), de.getMessageObject()); |
| | | } |
| | | } |
| | | } |
| | |
| | | { |
| | | if (resultCode == ResultCode.NO_SUCH_OBJECT) |
| | | { |
| | | logger.warn(WARN_DYNAMICGROUP_NONEXISTENT_BASE_DN, String.valueOf(baseDNs[searchCounter]), |
| | | String.valueOf(memberList.getDynamicGroupDN())); |
| | | logger.warn(WARN_DYNAMICGROUP_NONEXISTENT_BASE_DN, baseDNs[searchCounter], |
| | | memberList.getDynamicGroupDN()); |
| | | continue; |
| | | } |
| | | else |
| | |
| | | { |
| | | logger.trace( |
| | | "An error occurred while trying to update the LDAP PTA " |
| | | + "cached password for user %s: %s", userEntry.getName() |
| | | .toString(), String.valueOf(internalModify |
| | | .getErrorMessage())); |
| | | + "cached password for user %s: %s", |
| | | userEntry.getName(), internalModify.getErrorMessage()); |
| | | } |
| | | } |
| | | |
| | |
| | | catch (Exception e) |
| | | { |
| | | logger.traceException(e); |
| | | logger.error(ERR_PWSCHEME_CANNOT_BASE64_DECODE_STORED_PASSWORD, storedPassword, String.valueOf(e)); |
| | | logger.error(ERR_PWSCHEME_CANNOT_BASE64_DECODE_STORED_PASSWORD, storedPassword, e); |
| | | return false; |
| | | } |
| | | |
| | |
| | | catch (Exception e) |
| | | { |
| | | logger.traceException(e); |
| | | |
| | | logger.error(ERR_CONFIG_WORK_QUEUE_CANNOT_CREATE_MONITOR, String |
| | | .valueOf(ParallelWorkQueueMonitor.class), String.valueOf(e)); |
| | | logger.error(ERR_CONFIG_WORK_QUEUE_CANNOT_CREATE_MONITOR, ParallelWorkQueueMonitor.class, e); |
| | | } |
| | | } |
| | | |
| | |
| | | { |
| | | logger.trace( |
| | | "Uncaught exception in worker thread while processing " + |
| | | "operation %s: %s", String.valueOf(operation), t); |
| | | "operation %s: %s", operation, t); |
| | | |
| | | logger.traceException(t); |
| | | } |
| | |
| | | catch (Exception e) |
| | | { |
| | | logger.traceException(e); |
| | | logger.error(ERR_PWSCHEME_CANNOT_BASE64_DECODE_STORED_PASSWORD, storedPassword, String.valueOf(e)); |
| | | logger.error(ERR_PWSCHEME_CANNOT_BASE64_DECODE_STORED_PASSWORD, storedPassword, e); |
| | | return false; |
| | | } |
| | | |
| | |
| | | catch (Exception e) |
| | | { |
| | | logger.traceException(e); |
| | | logger.error(ERR_PWSCHEME_CANNOT_BASE64_DECODE_STORED_PASSWORD, storedPassword, String.valueOf(e)); |
| | | logger.error(ERR_PWSCHEME_CANNOT_BASE64_DECODE_STORED_PASSWORD, storedPassword, e); |
| | | return false; |
| | | } |
| | | |
| | |
| | | catch (Exception e) |
| | | { |
| | | logger.traceException(e); |
| | | logger.error(ERR_PWSCHEME_CANNOT_BASE64_DECODE_STORED_PASSWORD, storedPassword, String.valueOf(e)); |
| | | logger.error(ERR_PWSCHEME_CANNOT_BASE64_DECODE_STORED_PASSWORD, storedPassword, e); |
| | | return false; |
| | | } |
| | | |
| | |
| | | catch (Exception e) |
| | | { |
| | | logger.traceException(e); |
| | | logger.error(ERR_PWSCHEME_CANNOT_BASE64_DECODE_STORED_PASSWORD, storedPassword, String.valueOf(e)); |
| | | logger.error(ERR_PWSCHEME_CANNOT_BASE64_DECODE_STORED_PASSWORD, storedPassword, e); |
| | | return false; |
| | | } |
| | | |
| | |
| | | catch (Exception e) |
| | | { |
| | | logger.traceException(e); |
| | | logger.error(ERR_PWSCHEME_CANNOT_BASE64_DECODE_STORED_PASSWORD, storedPassword, String.valueOf(e)); |
| | | logger.error(ERR_PWSCHEME_CANNOT_BASE64_DECODE_STORED_PASSWORD, storedPassword, e); |
| | | return false; |
| | | } |
| | | |
| | |
| | | catch (DirectoryException de) |
| | | { |
| | | logger.traceException(de); |
| | | |
| | | logger.error(ERR_STATICGROUP_CANNOT_DECODE_MEMBER_VALUE_AS_DN, v.getValue(), |
| | | someMemberAttributeType.getNameOrOID(), |
| | | String.valueOf(groupEntry.getName()), |
| | | de.getMessageObject()); |
| | | someMemberAttributeType.getNameOrOID(), groupEntry.getName(), de.getMessageObject()); |
| | | } |
| | | } |
| | | } |
| | |
| | | catch (Exception e) |
| | | { |
| | | logger.traceException(e); |
| | | |
| | | logger.error(ERR_CONFIG_WORK_QUEUE_CANNOT_CREATE_MONITOR, String.valueOf(TraditionalWorkQueueMonitor.class), |
| | | String.valueOf(e)); |
| | | logger.error(ERR_CONFIG_WORK_QUEUE_CANNOT_CREATE_MONITOR, TraditionalWorkQueueMonitor.class, e); |
| | | } |
| | | } |
| | | finally |
| | |
| | | { |
| | | logger.trace( |
| | | "Uncaught exception in worker thread while processing " + |
| | | "operation %s: %s", String.valueOf(operation), t); |
| | | |
| | | "operation %s: %s", operation, t); |
| | | logger.traceException(t); |
| | | } |
| | | |
| | |
| | | .getAuthenticationPolicy(policyDN); |
| | | if (authPolicy == null) |
| | | { |
| | | logger.warn(WARN_PLUGIN_PWIMPORT_NO_SUCH_POLICY, String |
| | | .valueOf(entry.getName()), String.valueOf(policyDN)); |
| | | logger.warn(WARN_PLUGIN_PWIMPORT_NO_SUCH_POLICY, entry.getName(), policyDN); |
| | | } |
| | | else if (authPolicy.isPasswordPolicy()) |
| | | { |
| | |
| | | } |
| | | catch (DirectoryException de) |
| | | { |
| | | logger.warn(WARN_PLUGIN_PWIMPORT_CANNOT_DECODE_POLICY_DN, String |
| | | .valueOf(entry.getName()), de.getMessageObject()); |
| | | logger.warn(WARN_PLUGIN_PWIMPORT_CANNOT_DECODE_POLICY_DN, entry.getName(), de.getMessageObject()); |
| | | break policyLoop; |
| | | } |
| | | } |
| | |
| | | logger.traceException(e); |
| | | |
| | | logger.error(ERR_PLUGIN_PWPIMPORT_ERROR_ENCODING_PASSWORD, |
| | | policy.getPasswordAttribute().getNameOrOID(), String |
| | | .valueOf(entry.getName()), |
| | | policy.getPasswordAttribute().getNameOrOID(), entry.getName(), |
| | | stackTraceToSingleLineString(e)); |
| | | gotError = true; |
| | | break; |
| | |
| | | logger.traceException(e); |
| | | |
| | | logger.error(ERR_PLUGIN_PWPIMPORT_ERROR_ENCODING_PASSWORD, |
| | | policy.getPasswordAttribute().getNameOrOID(), String |
| | | .valueOf(entry.getName()), |
| | | policy.getPasswordAttribute().getNameOrOID(), entry.getName(), |
| | | stackTraceToSingleLineString(e)); |
| | | gotError = true; |
| | | break; |
| | |
| | | catch (Exception e) |
| | | { |
| | | logger.traceException(e); |
| | | |
| | | logger.error(ERR_PLUGIN_PWPIMPORT_ERROR_ENCODING_PASSWORD, t |
| | | .getNameOrOID(), String.valueOf(entry.getName()), |
| | | stackTraceToSingleLineString(e)); |
| | | logger.error(ERR_PLUGIN_PWPIMPORT_ERROR_ENCODING_PASSWORD, |
| | | t.getNameOrOID(), entry.getName(), stackTraceToSingleLineString(e)); |
| | | gotError = true; |
| | | break; |
| | | } |
| | |
| | | catch (Exception e) |
| | | { |
| | | logger.traceException(e); |
| | | |
| | | logger.error(ERR_PLUGIN_PWPIMPORT_ERROR_ENCODING_PASSWORD, t |
| | | .getNameOrOID(), String.valueOf(entry.getName()), |
| | | stackTraceToSingleLineString(e)); |
| | | logger.error(ERR_PLUGIN_PWPIMPORT_ERROR_ENCODING_PASSWORD, |
| | | t.getNameOrOID(), entry.getName(), stackTraceToSingleLineString(e)); |
| | | gotError = true; |
| | | break; |
| | | } |
| | |
| | | { |
| | | logger.traceException(e); |
| | | |
| | | logger.error(ERR_PLUGIN_PROFILER_CANNOT_WRITE_PROFILE_DATA, String.valueOf(configEntryDN), filename, |
| | | logger.error(ERR_PLUGIN_PROFILER_CANNOT_WRITE_PROFILE_DATA, configEntryDN, filename, |
| | | stackTraceToSingleLineString(e)); |
| | | } |
| | | } |
| | |
| | | changeRecord = reader.readChangeRecord(false); |
| | | if (logger.isTraceEnabled()) |
| | | { |
| | | logger.trace("Read change record entry " + |
| | | String.valueOf(changeRecord)); |
| | | logger.trace("Read change record entry %s", changeRecord); |
| | | } |
| | | } |
| | | catch (LDIFException le) |
| | |
| | | |
| | | if(logger.isTraceEnabled()) |
| | | { |
| | | logger.trace( |
| | | String.format("READ ASN.1 BOOLEAN(type=0x%x, length=%d, value=%s)", |
| | | peekType, peekLength, String.valueOf(readByte != 0x00))); |
| | | logger.trace("READ ASN.1 BOOLEAN(type=0x%x, length=%d, value=%s)", |
| | | peekType, peekLength, readByte != 0x00); |
| | | } |
| | | |
| | | state = ELEMENT_READ_STATE_NEED_TYPE; |
| | |
| | | |
| | | if(logger.isTraceEnabled()) |
| | | { |
| | | logger.trace( |
| | | String.format("WRITE ASN.1 BOOLEAN(type=0x%x, length=%d, value=%s)", |
| | | type, 1, String.valueOf(booleanValue))); |
| | | logger.trace("WRITE ASN.1 BOOLEAN(type=0x%x, length=%d, value=%s)", |
| | | type, 1, booleanValue); |
| | | } |
| | | return this; |
| | | } |
| | |
| | | if (ldapVersion == 2) |
| | | { |
| | | logger.error(ERR_LDAPV2_SKIPPING_SEARCH_REFERENCE, getConnectionID(), |
| | | searchOperation.getOperationID(), String |
| | | .valueOf(searchReference)); |
| | | searchOperation.getOperationID(), searchReference); |
| | | return false; |
| | | } |
| | | |
| | |
| | | final Lock schemaLock = LockManager.lockWrite(schemaDN); |
| | | if (schemaLock == null) |
| | | { |
| | | logger.error(ERR_TASK_ADDSCHEMAFILE_CANNOT_LOCK_SCHEMA, String.valueOf(schemaDN)); |
| | | logger.error(ERR_TASK_ADDSCHEMAFILE_CANNOT_LOCK_SCHEMA, schemaDN); |
| | | return TaskState.STOPPED_BY_ERROR; |
| | | } |
| | | |
| | |
| | | catch (ConfigException ce) |
| | | { |
| | | logger.traceException(ce); |
| | | |
| | | logger.error(ERR_TASK_ADDSCHEMAFILE_ERROR_LOADING_SCHEMA_FILE, String |
| | | .valueOf(schemaFile), ce.getMessage()); |
| | | logger.error(ERR_TASK_ADDSCHEMAFILE_ERROR_LOADING_SCHEMA_FILE, schemaFile, ce.getMessage()); |
| | | return TaskState.STOPPED_BY_ERROR; |
| | | } |
| | | catch (InitializationException ie) |
| | | { |
| | | logger.traceException(ie); |
| | | |
| | | logger.error(ERR_TASK_ADDSCHEMAFILE_ERROR_LOADING_SCHEMA_FILE, String |
| | | .valueOf(schemaFile), ie.getMessage()); |
| | | logger.error(ERR_TASK_ADDSCHEMAFILE_ERROR_LOADING_SCHEMA_FILE, schemaFile, ie.getMessage()); |
| | | return TaskState.STOPPED_BY_ERROR; |
| | | } |
| | | } |
| | |
| | | StringBuilder failureReason = new StringBuilder(); |
| | | if (! LockFileManager.acquireSharedLock(lockFile, failureReason)) |
| | | { |
| | | logger.error(ERR_BACKUPDB_CANNOT_LOCK_BACKEND, b.getBackendID(), String.valueOf(failureReason)); |
| | | logger.error(ERR_BACKUPDB_CANNOT_LOCK_BACKEND, b.getBackendID(), failureReason); |
| | | return false; |
| | | } |
| | | } |
| | |
| | | StringBuilder failureReason = new StringBuilder(); |
| | | if (! LockFileManager.releaseLock(lockFile, failureReason)) |
| | | { |
| | | logger.warn(WARN_BACKUPDB_CANNOT_UNLOCK_BACKEND, b.getBackendID(), String.valueOf(failureReason)); |
| | | logger.warn(WARN_BACKUPDB_CANNOT_UNLOCK_BACKEND, b.getBackendID(), failureReason); |
| | | return false; |
| | | } |
| | | } |
| | |
| | | // terminate it. |
| | | if (clientConnection == null) |
| | | { |
| | | logger.error(ERR_TASK_DISCONNECT_NO_SUCH_CONNECTION, String.valueOf(connectionID)); |
| | | logger.error(ERR_TASK_DISCONNECT_NO_SUCH_CONNECTION, connectionID); |
| | | |
| | | return TaskState.COMPLETED_WITH_ERRORS; |
| | | } |
| | |
| | | StringBuilder failureReason = new StringBuilder(); |
| | | if (! LockFileManager.acquireSharedLock(lockFile, failureReason)) |
| | | { |
| | | logger.error(ERR_LDIFEXPORT_CANNOT_LOCK_BACKEND, backend.getBackendID(), String.valueOf(failureReason)); |
| | | logger.error(ERR_LDIFEXPORT_CANNOT_LOCK_BACKEND, backend.getBackendID(), failureReason); |
| | | return TaskState.STOPPED_BY_ERROR; |
| | | } |
| | | } |
| | |
| | | StringBuilder failureReason = new StringBuilder(); |
| | | if (! LockFileManager.releaseLock(lockFile, failureReason)) |
| | | { |
| | | logger.warn(WARN_LDIFEXPORT_CANNOT_UNLOCK_BACKEND, backend.getBackendID(), String.valueOf(failureReason)); |
| | | logger.warn(WARN_LDIFEXPORT_CANNOT_UNLOCK_BACKEND, backend.getBackendID(), failureReason); |
| | | return TaskState.COMPLETED_WITH_ERRORS; |
| | | } |
| | | } |
| | |
| | | StringBuilder failureReason = new StringBuilder(); |
| | | if (! LockFileManager.acquireExclusiveLock(lockFile, failureReason)) |
| | | { |
| | | logger.error(ERR_LDIFIMPORT_CANNOT_LOCK_BACKEND, backend.getBackendID(), String.valueOf(failureReason)); |
| | | logger.error(ERR_LDIFIMPORT_CANNOT_LOCK_BACKEND, backend.getBackendID(), failureReason); |
| | | return TaskState.STOPPED_BY_ERROR; |
| | | } |
| | | } |
| | |
| | | StringBuilder failureReason = new StringBuilder(); |
| | | if (! LockFileManager.releaseLock(lockFile, failureReason)) |
| | | { |
| | | logger.warn(WARN_LDIFIMPORT_CANNOT_UNLOCK_BACKEND, backend.getBackendID(), String.valueOf(failureReason)); |
| | | logger.warn(WARN_LDIFIMPORT_CANNOT_UNLOCK_BACKEND, backend.getBackendID(), failureReason); |
| | | return TaskState.COMPLETED_WITH_ERRORS; |
| | | } |
| | | } |
| | |
| | | logger.traceException(e); |
| | | |
| | | // This log will go to the task log message |
| | | logger.error(ERR_TASK_EXECUTE_FAILED, String.valueOf(getTaskEntryDN()), stackTraceToSingleLineString(e)); |
| | | logger.error(ERR_TASK_EXECUTE_FAILED, getTaskEntryDN(), stackTraceToSingleLineString(e)); |
| | | |
| | | return TaskState.STOPPED_BY_ERROR; |
| | | } |
| | |
| | | { |
| | | if (!LockFileManager.acquireExclusiveLock(lockFile, failureReason)) |
| | | { |
| | | logger.error(ERR_REBUILDINDEX_CANNOT_EXCLUSIVE_LOCK_BACKEND, backend |
| | | .getBackendID(), String.valueOf(failureReason)); |
| | | logger.error(ERR_REBUILDINDEX_CANNOT_EXCLUSIVE_LOCK_BACKEND, backend.getBackendID(), failureReason); |
| | | return TaskState.STOPPED_BY_ERROR; |
| | | } |
| | | } |
| | |
| | | { |
| | | if (!LockFileManager.acquireSharedLock(lockFile, failureReason)) |
| | | { |
| | | logger.error(ERR_REBUILDINDEX_CANNOT_SHARED_LOCK_BACKEND, backend |
| | | .getBackendID(), String.valueOf(failureReason)); |
| | | logger.error(ERR_REBUILDINDEX_CANNOT_SHARED_LOCK_BACKEND, backend.getBackendID(), failureReason); |
| | | return TaskState.STOPPED_BY_ERROR; |
| | | } |
| | | } |
| | |
| | | failureReason = new StringBuilder(); |
| | | if (!LockFileManager.releaseLock(lockFile, failureReason)) |
| | | { |
| | | logger.warn(WARN_REBUILDINDEX_CANNOT_UNLOCK_BACKEND, backend |
| | | .getBackendID(), String.valueOf(failureReason)); |
| | | logger.warn(WARN_REBUILDINDEX_CANNOT_UNLOCK_BACKEND, backend.getBackendID(), failureReason); |
| | | returnCode = TaskState.COMPLETED_WITH_ERRORS; |
| | | } |
| | | } |
| | |
| | | StringBuilder failureReason = new StringBuilder(); |
| | | if (! LockFileManager.acquireExclusiveLock(lockFile, failureReason)) |
| | | { |
| | | logger.error(ERR_RESTOREDB_CANNOT_LOCK_BACKEND, backend.getBackendID(), String.valueOf(failureReason)); |
| | | logger.error(ERR_RESTOREDB_CANNOT_LOCK_BACKEND, backend.getBackendID(), failureReason); |
| | | return false; |
| | | } |
| | | } |
| | |
| | | StringBuilder failureReason = new StringBuilder(); |
| | | if (! LockFileManager.releaseLock(lockFile, failureReason)) |
| | | { |
| | | logger.warn(WARN_RESTOREDB_CANNOT_UNLOCK_BACKEND, backend.getBackendID(), String.valueOf(failureReason)); |
| | | logger.warn(WARN_RESTOREDB_CANNOT_UNLOCK_BACKEND, backend.getBackendID(), failureReason); |
| | | return false; |
| | | } |
| | | } |
| | |
| | | } |
| | | catch (Exception e) |
| | | { |
| | | logger.error(ERR_RESTOREDB_CANNOT_READ_BACKUP_DIRECTORY, String.valueOf(backupDirectory), getExceptionMessage(e)); |
| | | logger.error(ERR_RESTOREDB_CANNOT_READ_BACKUP_DIRECTORY, backupDirectory, getExceptionMessage(e)); |
| | | return TaskState.STOPPED_BY_ERROR; |
| | | } |
| | | |
| | |
| | | BackupInfo backupInfo = backupDir.getBackupInfo(backupID); |
| | | if (backupInfo == null) |
| | | { |
| | | logger.error(ERR_RESTOREDB_INVALID_BACKUP_ID, backupID, String.valueOf(backupDirectory)); |
| | | logger.error(ERR_RESTOREDB_INVALID_BACKUP_ID, backupID, backupDirectory); |
| | | return TaskState.STOPPED_BY_ERROR; |
| | | } |
| | | } |
| | |
| | | BackupInfo latestBackup = backupDir.getLatestBackup(); |
| | | if (latestBackup == null) |
| | | { |
| | | logger.error(ERR_RESTOREDB_NO_BACKUPS_IN_DIRECTORY, String.valueOf(backupDirectory)); |
| | | logger.error(ERR_RESTOREDB_NO_BACKUPS_IN_DIRECTORY, backupDirectory); |
| | | return TaskState.STOPPED_BY_ERROR; |
| | | } |
| | | else |
| | |
| | | catch (ConfigException e) |
| | | { |
| | | logger.traceException(e); |
| | | logger.error(ERR_RESTOREDB_NO_BACKENDS_FOR_DN, String.valueOf(backupDirectory), configEntryDN); |
| | | logger.error(ERR_RESTOREDB_NO_BACKENDS_FOR_DN, backupDirectory, configEntryDN); |
| | | return TaskState.STOPPED_BY_ERROR; |
| | | } |
| | | |
| | |
| | | } |
| | | catch (ConfigException ce) |
| | | { |
| | | logger.error(ERR_CANNOT_DETERMINE_BACKEND_ID, String.valueOf(configEntry.getDN()), ce.getMessage()); |
| | | logger.error(ERR_CANNOT_DETERMINE_BACKEND_ID, configEntry.getDN(), ce.getMessage()); |
| | | return null; |
| | | } |
| | | catch (Exception e) |
| | | { |
| | | logger.error(ERR_CANNOT_DETERMINE_BACKEND_ID, String.valueOf(configEntry.getDN()), getExceptionMessage(e)); |
| | | logger.error(ERR_CANNOT_DETERMINE_BACKEND_ID, configEntry.getDN(), getExceptionMessage(e)); |
| | | return null; |
| | | } |
| | | } |
| | |
| | | } |
| | | catch (ConfigException ce) |
| | | { |
| | | logger.error(ERR_CANNOT_DETERMINE_BACKEND_ID, String.valueOf(configEntry.getDN()), ce.getMessage()); |
| | | logger.error(ERR_CANNOT_DETERMINE_BACKEND_ID, configEntry.getDN(), ce.getMessage()); |
| | | continue; |
| | | } |
| | | catch (Exception e) |
| | | { |
| | | logger.error(ERR_CANNOT_DETERMINE_BACKEND_ID, String.valueOf(configEntry.getDN()), getExceptionMessage(e)); |
| | | logger.error(ERR_CANNOT_DETERMINE_BACKEND_ID, configEntry.getDN(), getExceptionMessage(e)); |
| | | continue; |
| | | } |
| | | |
| | |
| | | StringBuilder failureReason = new StringBuilder(); |
| | | if (! LockFileManager.acquireSharedLock(lockFile, failureReason)) |
| | | { |
| | | logger.error(ERR_BACKUPDB_CANNOT_LOCK_BACKEND, b.getBackendID(), String.valueOf(failureReason)); |
| | | logger.error(ERR_BACKUPDB_CANNOT_LOCK_BACKEND, b.getBackendID(), failureReason); |
| | | errorsEncountered = true; |
| | | continue; |
| | | } |
| | |
| | | StringBuilder failureReason = new StringBuilder(); |
| | | if (! LockFileManager.releaseLock(lockFile, failureReason)) |
| | | { |
| | | logger.warn(WARN_BACKUPDB_CANNOT_UNLOCK_BACKEND, b.getBackendID(), String.valueOf(failureReason)); |
| | | logger.warn(WARN_BACKUPDB_CANNOT_UNLOCK_BACKEND, b.getBackendID(), failureReason); |
| | | } |
| | | } |
| | | catch (Exception e) |
| | |
| | | StringBuilder failureReason = new StringBuilder(); |
| | | if (! LockFileManager.releaseLock(lockFile, failureReason)) |
| | | { |
| | | logger.warn(WARN_BACKUPDB_CANNOT_UNLOCK_BACKEND, b.getBackendID(), String.valueOf(failureReason)); |
| | | logger.warn(WARN_BACKUPDB_CANNOT_UNLOCK_BACKEND, b.getBackendID(), failureReason); |
| | | } |
| | | } |
| | | catch (Exception e2) |
| | |
| | | StringBuilder failureReason = new StringBuilder(); |
| | | if (! LockFileManager.releaseLock(lockFile, failureReason)) |
| | | { |
| | | logger.warn(WARN_BACKUPDB_CANNOT_UNLOCK_BACKEND, b.getBackendID(), String.valueOf(failureReason)); |
| | | logger.warn(WARN_BACKUPDB_CANNOT_UNLOCK_BACKEND, b.getBackendID(), failureReason); |
| | | } |
| | | } |
| | | catch (Exception e2) |
| | |
| | | StringBuilder failureReason = new StringBuilder(); |
| | | if (! LockFileManager.releaseLock(lockFile, failureReason)) |
| | | { |
| | | logger.warn(WARN_BACKUPDB_CANNOT_UNLOCK_BACKEND, b.getBackendID(), String.valueOf(failureReason)); |
| | | logger.warn(WARN_BACKUPDB_CANNOT_UNLOCK_BACKEND, b.getBackendID(), failureReason); |
| | | } |
| | | } |
| | | catch (Exception e2) |
| | |
| | | StringBuilder failureReason = new StringBuilder(); |
| | | if (! LockFileManager.releaseLock(lockFile, failureReason)) |
| | | { |
| | | logger.warn(WARN_BACKUPDB_CANNOT_UNLOCK_BACKEND, b.getBackendID(), String.valueOf(failureReason)); |
| | | logger.warn(WARN_BACKUPDB_CANNOT_UNLOCK_BACKEND, b.getBackendID(), failureReason); |
| | | } |
| | | } |
| | | catch (Exception e) |
| | |
| | | StringBuilder failureReason = new StringBuilder(); |
| | | if (! LockFileManager.releaseLock(lockFile, failureReason)) |
| | | { |
| | | logger.warn(WARN_BACKUPDB_CANNOT_UNLOCK_BACKEND, b.getBackendID(), String.valueOf(failureReason)); |
| | | logger.warn(WARN_BACKUPDB_CANNOT_UNLOCK_BACKEND, b.getBackendID(), failureReason); |
| | | } |
| | | } |
| | | catch (Exception e2) |
| | |
| | | StringBuilder failureReason = new StringBuilder(); |
| | | if (! LockFileManager.releaseLock(lockFile, failureReason)) |
| | | { |
| | | logger.warn(WARN_BACKUPDB_CANNOT_UNLOCK_BACKEND, b.getBackendID(), String.valueOf(failureReason)); |
| | | logger.warn(WARN_BACKUPDB_CANNOT_UNLOCK_BACKEND, b.getBackendID(), failureReason); |
| | | errorsEncountered = true; |
| | | } |
| | | } |
| | |
| | | } |
| | | catch (ConfigException ce) |
| | | { |
| | | logger.error(ERR_CANNOT_DETERMINE_BACKEND_ID, String.valueOf(configEntry |
| | | .getDN()), ce.getMessage()); |
| | | logger.error(ERR_CANNOT_DETERMINE_BACKEND_ID, configEntry.getDN(), ce.getMessage()); |
| | | return 1; |
| | | } |
| | | catch (Exception e) |
| | | { |
| | | logger.error(ERR_CANNOT_DETERMINE_BACKEND_ID, String.valueOf(configEntry |
| | | .getDN()), getExceptionMessage(e)); |
| | | logger.error(ERR_CANNOT_DETERMINE_BACKEND_ID, configEntry.getDN(), getExceptionMessage(e)); |
| | | return 1; |
| | | } |
| | | |
| | |
| | | } |
| | | catch (ConfigException ce) |
| | | { |
| | | logger.error(ERR_CANNOT_DETERMINE_BACKEND_CLASS, String.valueOf(configEntry |
| | | .getDN()), ce.getMessage()); |
| | | logger.error(ERR_CANNOT_DETERMINE_BACKEND_CLASS, configEntry.getDN(), ce.getMessage()); |
| | | return 1; |
| | | } |
| | | catch (Exception e) |
| | | { |
| | | logger.error(ERR_CANNOT_DETERMINE_BACKEND_CLASS, String.valueOf(configEntry |
| | | .getDN()), getExceptionMessage(e)); |
| | | logger.error(ERR_CANNOT_DETERMINE_BACKEND_CLASS, configEntry.getDN(), getExceptionMessage(e)); |
| | | return 1; |
| | | } |
| | | |
| | |
| | | } |
| | | catch (Exception e) |
| | | { |
| | | logger.error(ERR_CANNOT_LOAD_BACKEND_CLASS, backendClassName, String |
| | | .valueOf(configEntry.getDN()), getExceptionMessage(e)); |
| | | logger.error(ERR_CANNOT_LOAD_BACKEND_CLASS, backendClassName, configEntry.getDN(), getExceptionMessage(e)); |
| | | return 1; |
| | | } |
| | | |
| | |
| | | } |
| | | catch (Exception e) |
| | | { |
| | | logger.error(ERR_CANNOT_INSTANTIATE_BACKEND_CLASS, backendClassName, String |
| | | .valueOf(configEntry.getDN()), getExceptionMessage(e)); |
| | | logger.error(ERR_CANNOT_INSTANTIATE_BACKEND_CLASS, |
| | | backendClassName, configEntry.getDN(), getExceptionMessage(e)); |
| | | return 1; |
| | | } |
| | | |
| | |
| | | (DNConfigAttribute) configEntry.getConfigAttribute(baseDNStub); |
| | | if (baseDNAttr == null) |
| | | { |
| | | logger.error(ERR_NO_BASES_FOR_BACKEND, String.valueOf(configEntry.getDN())); |
| | | logger.error(ERR_NO_BASES_FOR_BACKEND, configEntry.getDN()); |
| | | } |
| | | else |
| | | { |
| | |
| | | } |
| | | catch (Exception e) |
| | | { |
| | | logger.error(ERR_CANNOT_DETERMINE_BASES_FOR_BACKEND, String |
| | | .valueOf(configEntry.getDN()), getExceptionMessage(e)); |
| | | logger.error(ERR_CANNOT_DETERMINE_BASES_FOR_BACKEND, configEntry.getDN(), getExceptionMessage(e)); |
| | | return 1; |
| | | } |
| | | |
| | |
| | | backend = (Backend) backendClass.newInstance(); |
| | | } catch (Exception e) { |
| | | logger.traceException(e); |
| | | logger.error(ERR_CONFIG_BACKEND_CANNOT_INSTANTIATE, String.valueOf(className), |
| | | String.valueOf(backendCfg.dn()), |
| | | logger.error(ERR_CONFIG_BACKEND_CANNOT_INSTANTIATE, className, backendCfg.dn(), |
| | | stackTraceToSingleLineString(e)); |
| | | continue; |
| | | } |
| | |
| | | backend.initializeBackend(); |
| | | } catch (Exception e) { |
| | | logger.traceException(e); |
| | | logger.error(ERR_CONFIG_BACKEND_CANNOT_INITIALIZE, String.valueOf(className), |
| | | String.valueOf(backendCfg.dn()), |
| | | logger.error(ERR_CONFIG_BACKEND_CANNOT_INITIALIZE, className, backendCfg.dn(), |
| | | stackTraceToSingleLineString(e)); |
| | | } |
| | | try { |
| | |
| | | StringBuilder failureReason = new StringBuilder(); |
| | | if (! LockFileManager.acquireSharedLock(lockFile, failureReason)) |
| | | { |
| | | logger.error(ERR_LDIFEXPORT_CANNOT_LOCK_BACKEND, backend.getBackendID(), String.valueOf(failureReason)); |
| | | logger.error(ERR_LDIFEXPORT_CANNOT_LOCK_BACKEND, backend.getBackendID(), failureReason); |
| | | return 1; |
| | | } |
| | | } |
| | |
| | | StringBuilder failureReason = new StringBuilder(); |
| | | if (! LockFileManager.releaseLock(lockFile, failureReason)) |
| | | { |
| | | logger.warn(WARN_LDIFEXPORT_CANNOT_UNLOCK_BACKEND, backend.getBackendID(), String.valueOf(failureReason)); |
| | | logger.warn(WARN_LDIFEXPORT_CANNOT_UNLOCK_BACKEND, backend.getBackendID(), failureReason); |
| | | } |
| | | } |
| | | catch (Exception e) |
| | |
| | | StringBuilder failureReason = new StringBuilder(); |
| | | if (! LockFileManager.acquireExclusiveLock(lockFile, failureReason)) |
| | | { |
| | | logger.error(ERR_LDIFIMPORT_CANNOT_LOCK_BACKEND, backend.getBackendID(), String.valueOf(failureReason)); |
| | | logger.error(ERR_LDIFIMPORT_CANNOT_LOCK_BACKEND, backend.getBackendID(), failureReason); |
| | | return 1; |
| | | } |
| | | } |
| | |
| | | StringBuilder failureReason = new StringBuilder(); |
| | | if (! LockFileManager.releaseLock(lockFile, failureReason)) |
| | | { |
| | | logger.warn(WARN_LDIFIMPORT_CANNOT_UNLOCK_BACKEND, backend.getBackendID(), String.valueOf(failureReason)); |
| | | logger.warn(WARN_LDIFIMPORT_CANNOT_UNLOCK_BACKEND, backend.getBackendID(), failureReason); |
| | | retCode = 1; |
| | | } |
| | | } |
| | |
| | | final StringBuilder failureReason = new StringBuilder(); |
| | | if (!LockFileManager.acquireExclusiveLock(lockFile, failureReason)) |
| | | { |
| | | logger.error(ERR_REBUILDINDEX_CANNOT_EXCLUSIVE_LOCK_BACKEND, backend |
| | | .getBackendID(), String.valueOf(failureReason)); |
| | | logger.error(ERR_REBUILDINDEX_CANNOT_EXCLUSIVE_LOCK_BACKEND, backend.getBackendID(), failureReason); |
| | | return 1; |
| | | } |
| | | } |
| | |
| | | StringBuilder failureReason = new StringBuilder(); |
| | | if (! LockFileManager.acquireExclusiveLock(lockFile, failureReason)) |
| | | { |
| | | logger.error(ERR_RESTOREDB_CANNOT_LOCK_BACKEND, backend.getBackendID(), String.valueOf(failureReason)); |
| | | logger.error(ERR_RESTOREDB_CANNOT_LOCK_BACKEND, backend.getBackendID(), failureReason); |
| | | return 1; |
| | | } |
| | | } |
| | |
| | | StringBuilder failureReason = new StringBuilder(); |
| | | if (! LockFileManager.releaseLock(lockFile, failureReason)) |
| | | { |
| | | logger.warn(WARN_RESTOREDB_CANNOT_UNLOCK_BACKEND, backend.getBackendID(), String.valueOf(failureReason)); |
| | | logger.warn(WARN_RESTOREDB_CANNOT_UNLOCK_BACKEND, backend.getBackendID(), failureReason); |
| | | } |
| | | } |
| | | catch (Exception e) |
| | |
| | | StringBuilder failureReason = new StringBuilder(); |
| | | if (! LockFileManager.acquireSharedLock(lockFile, failureReason)) |
| | | { |
| | | logger.error(ERR_VERIFYINDEX_CANNOT_LOCK_BACKEND, backend.getBackendID(), String.valueOf(failureReason)); |
| | | logger.error(ERR_VERIFYINDEX_CANNOT_LOCK_BACKEND, backend.getBackendID(), failureReason); |
| | | return 1; |
| | | } |
| | | } |
| | |
| | | StringBuilder failureReason = new StringBuilder(); |
| | | if (! LockFileManager.releaseLock(lockFile, failureReason)) |
| | | { |
| | | logger.warn(WARN_VERIFYINDEX_CANNOT_UNLOCK_BACKEND, backend.getBackendID(), String.valueOf(failureReason)); |
| | | logger.warn(WARN_VERIFYINDEX_CANNOT_UNLOCK_BACKEND, backend.getBackendID(), failureReason); |
| | | } |
| | | } |
| | | catch (Exception e) |
| | |
| | | { |
| | | if (logger.isTraceEnabled()) |
| | | { |
| | | logger.trace( |
| | | "Skipping entry %s because of the export " + |
| | | "configuration.", String.valueOf(dn)); |
| | | logger.trace("Skipping entry %s because of the export configuration.", dn); |
| | | } |
| | | return false; |
| | | } |
| | |
| | | { |
| | | if (logger.isTraceEnabled()) |
| | | { |
| | | logger.trace( |
| | | "Skipping objectclasses for entry %s because of " + |
| | | "the export configuration.", String.valueOf(dn)); |
| | | logger.trace("Skipping objectclasses for entry %s because of the export configuration.", dn); |
| | | } |
| | | } |
| | | |
| | |
| | | { |
| | | logger.trace( |
| | | "Skipping all operational attributes for entry %s " + |
| | | "because of the export configuration.", |
| | | String.valueOf(dn)); |
| | | "because of the export configuration.", dn); |
| | | } |
| | | } |
| | | |
| | |
| | | if (logger.isTraceEnabled()) |
| | | { |
| | | logger.trace("Skipping %s attribute %s for entry %s " |
| | | + "because of the export configuration.", attributeType, attrType |
| | | .getNameOrOID(), String.valueOf(dn)); |
| | | + "because of the export configuration.", attributeType, attrType.getNameOrOID(), dn); |
| | | } |
| | | } |
| | | } |
| | |
| | | } |
| | | catch (CertificateExpiredException cee) |
| | | { |
| | | logger.error(ERR_EXPCHECK_TRUSTMGR_CLIENT_CERT_EXPIRED, c |
| | | .getSubjectDN().getName(), String.valueOf(c.getNotAfter())); |
| | | |
| | | logger.error(ERR_EXPCHECK_TRUSTMGR_CLIENT_CERT_EXPIRED, |
| | | c.getSubjectDN().getName(), c.getNotAfter()); |
| | | throw cee; |
| | | } |
| | | catch (CertificateNotYetValidException cnyve) |
| | | { |
| | | logger.error(ERR_EXPCHECK_TRUSTMGR_CLIENT_CERT_NOT_YET_VALID, c |
| | | .getSubjectDN().getName(), String.valueOf(c.getNotBefore())); |
| | | |
| | | logger.error(ERR_EXPCHECK_TRUSTMGR_CLIENT_CERT_NOT_YET_VALID, |
| | | c.getSubjectDN().getName(), c.getNotBefore()); |
| | | throw cnyve; |
| | | } |
| | | } |
| | |
| | | } |
| | | catch (CertificateExpiredException cee) |
| | | { |
| | | logger.error(ERR_EXPCHECK_TRUSTMGR_SERVER_CERT_EXPIRED, c |
| | | .getSubjectDN().getName(), String.valueOf(c.getNotAfter())); |
| | | |
| | | logger.error(ERR_EXPCHECK_TRUSTMGR_SERVER_CERT_EXPIRED, |
| | | c.getSubjectDN().getName(), c.getNotAfter()); |
| | | throw cee; |
| | | } |
| | | catch (CertificateNotYetValidException cnyve) |
| | | { |
| | | logger.error(ERR_EXPCHECK_TRUSTMGR_SERVER_CERT_NOT_YET_VALID, c |
| | | .getSubjectDN().getName(), String.valueOf(c.getNotBefore())); |
| | | |
| | | logger.error(ERR_EXPCHECK_TRUSTMGR_SERVER_CERT_NOT_YET_VALID, |
| | | c.getSubjectDN().getName(), c.getNotBefore()); |
| | | throw cnyve; |
| | | } |
| | | } |
| | |
| | | catch (Exception e) |
| | | { |
| | | logger.traceException(e); |
| | | logger.error(cannotProcessAttributeMessage.get(v.getValue(), |
| | | String.valueOf(userEntry.getName()))); |
| | | logger.error(cannotProcessAttributeMessage.get(v.getValue(), userEntry.getName())); |
| | | } |
| | | } |
| | | else if (a.size() > 1) |
| | | { |
| | | logger.error(nonUniqueAttributeMessage.get(String |
| | | .valueOf(userEntry.getName()))); |
| | | logger.error(nonUniqueAttributeMessage.get(userEntry.getName())); |
| | | } |
| | | } |
| | | return null; |