xref: /illumos-gate/usr/src/cmd/svc/svccfg/svccfg_engine.c (revision dd72704bd9e794056c558153663c739e2012d721)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 
22 /*
23  *  Copyright (c) 2004, 2010, Oracle and/or its affiliates. All rights reserved.
24  */
25 
26 
27 /*
28  * svccfg(1) interpreter and command execution engine.
29  */
30 
31 #include <sys/mman.h>
32 #include <sys/stat.h>
33 #include <sys/types.h>
34 #include <assert.h>
35 #include <errno.h>
36 #include <fcntl.h>
37 #include <libintl.h>
38 #include <libtecla.h>
39 #include <md5.h>
40 #include <string.h>
41 #include <stdlib.h>
42 #include <unistd.h>
43 
44 #include "manifest_find.h"
45 #include "manifest_hash.h"
46 #include "svccfg.h"
47 
48 #define	MS_PER_US		1000
49 
50 engine_state_t *est;
51 
52 /*
53  * Replacement lex(1) character retrieval routines.
54  */
55 int
56 engine_cmd_getc(engine_state_t *E)
57 {
58 	if (E->sc_cmd_file != NULL)
59 		return (getc(E->sc_cmd_file));
60 
61 	if (E->sc_cmd_flags & SC_CMD_EOF)
62 		return (EOF);
63 
64 	if (E->sc_cmd_bufoff < E->sc_cmd_bufsz)
65 		return (*(E->sc_cmd_buf + E->sc_cmd_bufoff++));
66 
67 	if (!(E->sc_cmd_flags & SC_CMD_IACTIVE)) {
68 		E->sc_cmd_flags |= SC_CMD_EOF;
69 
70 		return (EOF);
71 	} else {
72 #ifdef NATIVE_BUILD
73 		return (EOF);
74 #else
75 		extern int parens;
76 
77 		if (parens <= 0) {
78 			E->sc_cmd_flags |= SC_CMD_EOF;
79 			return (EOF);
80 		}
81 
82 		for (;;) {
83 			E->sc_cmd_buf = gl_get_line(E->sc_gl, "> ", NULL, -1);
84 			if (E->sc_cmd_buf != NULL)
85 				break;
86 
87 			switch (gl_return_status(E->sc_gl)) {
88 			case GLR_SIGNAL:
89 				gl_abandon_line(E->sc_gl);
90 				continue;
91 
92 			case GLR_EOF:
93 				E->sc_cmd_flags |= SC_CMD_EOF;
94 				return (EOF);
95 
96 			case GLR_ERROR:
97 				uu_die(gettext("Error reading terminal: %s.\n"),
98 				    gl_error_message(E->sc_gl, NULL, 0));
99 				/* NOTREACHED */
100 
101 			default:
102 #ifndef NDEBUG
103 				(void) fprintf(stderr, "%s:%d: gl_get_line() "
104 				    "returned unexpected value %d.\n", __FILE__,
105 				    __LINE__, gl_return_status(E->sc_gl));
106 #endif
107 				abort();
108 			}
109 		}
110 
111 		E->sc_cmd_bufsz = strlen(E->sc_cmd_buf);
112 		E->sc_cmd_bufoff = 1;
113 
114 		return (E->sc_cmd_buf[0]);
115 #endif	/* NATIVE_BUILD */
116 	}
117 }
118 
119 int
120 engine_cmd_ungetc(engine_state_t *E, char c)
121 {
122 	if (E->sc_cmd_file != NULL)
123 		return (ungetc(c, E->sc_cmd_file));
124 
125 	if (E->sc_cmd_buf != NULL)
126 		*(E->sc_cmd_buf + --E->sc_cmd_bufoff) = c;
127 
128 	return (c);
129 }
130 
131 /*ARGSUSED*/
132 void
133 engine_cmd_nputs(engine_state_t *E, char *c, size_t n)
134 {
135 	/* our lexer shouldn't need this state */
136 	exit(11);
137 }
138 
139 int
140 engine_exec(char *cmd)
141 {
142 	est->sc_cmd_buf = cmd;
143 	est->sc_cmd_bufsz = strlen(cmd) + 1;
144 	est->sc_cmd_bufoff = 0;
145 
146 	(void) yyparse();
147 
148 	return (0);
149 }
150 
151 #ifndef NATIVE_BUILD
152 /* ARGSUSED */
153 static
154 CPL_CHECK_FN(check_xml)
155 {
156 	const char *ext;
157 
158 	if (strlen(pathname) < 4)
159 		return (0);
160 
161 	ext = pathname + strlen(pathname) - 4;
162 
163 	return (strcmp(ext, ".xml") == 0 ? 1 : 0);
164 }
165 
166 static const char * const whitespace = " \t";
167 
168 static
169 CPL_MATCH_FN(complete_single_xml_file_arg)
170 {
171 	const char *arg1 = data;
172 	int arg1end_i, ret;
173 	CplFileConf *cfc;
174 
175 	arg1end_i = arg1 + strcspn(arg1, whitespace) - line;
176 	if (arg1end_i < word_end)
177 		return (0);
178 
179 	cfc = new_CplFileConf();
180 	if (cfc == NULL) {
181 		cpl_record_error(cpl, "Out of memory.");
182 		return (1);
183 	}
184 
185 	cfc_set_check_fn(cfc, check_xml, NULL);
186 
187 	ret = cpl_file_completions(cpl, cfc, line, word_end);
188 
189 	(void) del_CplFileConf(cfc);
190 	return (ret);
191 }
192 
193 static struct cmd_info {
194 	const char	*name;
195 	uint32_t	flags;
196 	CplMatchFn	*complete_args_f;
197 } cmds[] = {
198 	{ "validate", CS_GLOBAL, complete_single_xml_file_arg },
199 	{ "import", CS_GLOBAL, complete_single_xml_file_arg },
200 	{ "cleanup", CS_GLOBAL, NULL},
201 	{ "export", CS_GLOBAL, NULL },
202 	{ "archive", CS_GLOBAL, NULL },
203 	{ "apply", CS_GLOBAL, complete_single_xml_file_arg },
204 	{ "extract", CS_GLOBAL, NULL },
205 	{ "repository", CS_GLOBAL, NULL },
206 	{ "inventory", CS_GLOBAL, complete_single_xml_file_arg },
207 	{ "set", CS_GLOBAL, NULL },
208 	{ "end", CS_GLOBAL, NULL },
209 	{ "exit", CS_GLOBAL, NULL },
210 	{ "quit", CS_GLOBAL, NULL },
211 	{ "help", CS_GLOBAL, NULL },
212 	{ "delete", CS_GLOBAL, NULL },
213 	{ "select", CS_GLOBAL, complete_select },
214 	{ "unselect", CS_SVC | CS_INST | CS_SNAP, NULL },
215 	{ "list", CS_SCOPE | CS_SVC | CS_SNAP, NULL },
216 	{ "add", CS_SCOPE | CS_SVC, NULL },
217 	{ "listpg", CS_SVC | CS_INST | CS_SNAP, NULL },
218 	{ "addpg", CS_SVC | CS_INST, NULL },
219 	{ "delpg", CS_SVC | CS_INST, NULL },
220 	{ "delhash", CS_GLOBAL, complete_single_xml_file_arg },
221 	{ "listprop", CS_SVC | CS_INST | CS_SNAP, NULL },
222 	{ "setprop", CS_SVC | CS_INST, NULL },
223 	{ "delprop", CS_SVC | CS_INST, NULL },
224 	{ "editprop", CS_SVC | CS_INST, NULL },
225 	{ "describe", CS_SVC | CS_INST | CS_SNAP, NULL },
226 	{ "listsnap", CS_INST | CS_SNAP, NULL },
227 	{ "selectsnap", CS_INST | CS_SNAP, NULL },
228 	{ "revert", CS_INST | CS_SNAP, NULL },
229 	{ "refresh", CS_INST, NULL },
230 	{ NULL }
231 };
232 
233 int
234 add_cmd_matches(WordCompletion *cpl, const char *line, int word_end,
235     uint32_t scope)
236 {
237 	int word_start, err;
238 	size_t len;
239 	const char *bol;
240 	struct cmd_info *cip;
241 
242 	word_start = strspn(line, whitespace);
243 	len = word_end - word_start;
244 	bol = line + word_end - len;
245 
246 	for (cip = cmds; cip->name != NULL; ++cip) {
247 		if ((cip->flags & scope) == 0)
248 			continue;
249 
250 		if (strncmp(cip->name, bol, len) == 0) {
251 			err = cpl_add_completion(cpl, line, word_start,
252 			    word_end, cip->name + len, "", " ");
253 			if (err != 0)
254 				return (err);
255 		}
256 	}
257 
258 	return (0);
259 }
260 
261 /*
262  * Suggest completions.  We must first determine if the cursor is in command
263  * position or in argument position.  If the former, complete_command() finds
264  * matching commands.  If the latter, we tail-call the command-specific
265  * argument-completion routine in the cmds table.
266  */
267 /* ARGSUSED */
268 static
269 CPL_MATCH_FN(complete)
270 {
271 	const char *arg0, *arg1;
272 	size_t arg0len;
273 	struct cmd_info *cip;
274 
275 	arg0 = line + strspn(line, whitespace);
276 	arg0len = strcspn(arg0, whitespace);
277 	if ((arg0 + arg0len) - line >= word_end ||
278 	    (arg0[arg0len] != ' ' && arg0[arg0len] != '\t'))
279 		return (complete_command(cpl, (void *)arg0, line, word_end));
280 
281 	arg1 = arg0 + arg0len;
282 	arg1 += strspn(arg1, whitespace);
283 
284 	for (cip = cmds; cip->name != NULL; ++cip) {
285 		if (strlen(cip->name) != arg0len)
286 			continue;
287 
288 		if (strncmp(cip->name, arg0, arg0len) != 0)
289 			continue;
290 
291 		if (cip->complete_args_f == NULL)
292 			break;
293 
294 		return (cip->complete_args_f(cpl, (void *)arg1, line,
295 		    word_end));
296 	}
297 
298 	return (0);
299 }
300 #endif	/* NATIVE_BUILD */
301 
302 int
303 engine_interp()
304 {
305 #ifdef NATIVE_BUILD
306 	uu_die("native build does not support interactive mode.");
307 #else
308 	char *selfmri;
309 	size_t sfsz;
310 	int r;
311 
312 	extern int parens;
313 
314 	(void) sigset(SIGINT, SIG_IGN);
315 
316 	est->sc_gl = new_GetLine(512, 8000);
317 	if (est->sc_gl == NULL)
318 		uu_die(gettext("Out of memory.\n"));
319 
320 	/* The longest string is "[snapname]fmri[:instname]> ". */
321 	sfsz = 1 + max_scf_name_len + 1 + max_scf_fmri_len + 2 +
322 	    max_scf_name_len + 1 + 2 + 1;
323 	selfmri = safe_malloc(sfsz);
324 
325 	r = gl_customize_completion(est->sc_gl, NULL, complete);
326 	assert(r == 0);
327 
328 	for (;;) {
329 		lscf_get_selection_str(selfmri, sfsz - 2);
330 		(void) strcat(selfmri, "> ");
331 		est->sc_cmd_buf = gl_get_line(est->sc_gl, selfmri, NULL, -1);
332 
333 		if (est->sc_cmd_buf == NULL) {
334 			switch (gl_return_status(est->sc_gl)) {
335 			case GLR_SIGNAL:
336 				gl_abandon_line(est->sc_gl);
337 				continue;
338 
339 			case GLR_EOF:
340 				break;
341 
342 			case GLR_ERROR:
343 				uu_die(gettext("Error reading terminal: %s.\n"),
344 				    gl_error_message(est->sc_gl, NULL, 0));
345 				/* NOTREACHED */
346 
347 			default:
348 #ifndef NDEBUG
349 				(void) fprintf(stderr, "%s:%d: gl_get_line() "
350 				    "returned unexpected value %d.\n", __FILE__,
351 				    __LINE__, gl_return_status(est->sc_gl));
352 #endif
353 				abort();
354 			}
355 
356 			break;
357 		}
358 
359 		parens = 0;
360 		est->sc_cmd_bufsz = strlen(est->sc_cmd_buf);
361 		est->sc_cmd_bufoff = 0;
362 		est->sc_cmd_flags = SC_CMD_IACTIVE;
363 
364 		(void) yyparse();
365 	}
366 
367 	free(selfmri);
368 	est->sc_gl = del_GetLine(est->sc_gl);	/* returns NULL */
369 
370 #endif	/* NATIVE_BUILD */
371 	return (0);
372 }
373 
374 int
375 engine_source(const char *name, boolean_t dont_exit)
376 {
377 	engine_state_t *old = est;
378 	struct stat st;
379 	int ret;
380 
381 	est = uu_zalloc(sizeof (engine_state_t));
382 
383 	/* first, copy the stuff set up in engine_init */
384 	est->sc_repo_pid = old->sc_repo_pid;
385 	if (old->sc_repo_filename != NULL)
386 		est->sc_repo_filename = safe_strdup(old->sc_repo_filename);
387 	if (old->sc_repo_doordir != NULL)
388 		est->sc_repo_doordir = safe_strdup(old->sc_repo_doordir);
389 	if (old->sc_repo_doorname != NULL)
390 		est->sc_repo_doorname = safe_strdup(old->sc_repo_doorname);
391 	if (old->sc_repo_server != NULL)
392 		est->sc_repo_server = safe_strdup(old->sc_repo_server);
393 
394 	/* set up the new guy */
395 	est->sc_cmd_lineno = 1;
396 
397 	if (dont_exit)
398 		est->sc_cmd_flags |= SC_CMD_DONT_EXIT;
399 
400 	if (strcmp(name, "-") == 0) {
401 		est->sc_cmd_file = stdin;
402 		est->sc_cmd_filename = "<stdin>";
403 	} else {
404 		errno = 0;
405 		est->sc_cmd_filename = name;
406 		est->sc_cmd_file = fopen(name, "r");
407 		if (est->sc_cmd_file == NULL) {
408 			if (errno == 0)
409 				semerr(gettext("No free stdio streams.\n"));
410 			else
411 				semerr(gettext("Could not open %s"), name);
412 
413 			ret = -1;
414 			goto fail;
415 		}
416 
417 		do {
418 			ret = fstat(fileno(est->sc_cmd_file), &st);
419 		} while (ret != 0 && errno == EINTR);
420 		if (ret != 0) {
421 			(void) fclose(est->sc_cmd_file);
422 			est->sc_cmd_file = NULL;	/* for semerr() */
423 
424 			semerr(gettext("Could not stat %s"), name);
425 
426 			ret = -1;
427 			goto fail;
428 		}
429 
430 		if (!S_ISREG(st.st_mode)) {
431 			(void) fclose(est->sc_cmd_file);
432 			est->sc_cmd_file = NULL;	/* for semerr() */
433 
434 			semerr(gettext("%s is not a regular file.\n"), name);
435 
436 			ret = -1;
437 			goto fail;
438 		}
439 	}
440 
441 	(void) yyparse();
442 
443 	if (est->sc_cmd_file != stdin)
444 		(void) fclose(est->sc_cmd_file);
445 
446 	ret = 0;
447 
448 fail:
449 	if (est->sc_repo_pid != old->sc_repo_pid)
450 		lscf_cleanup();		/* clean up any new repository */
451 
452 	if (est->sc_repo_filename != NULL)
453 		free((void *)est->sc_repo_filename);
454 	if (est->sc_repo_doordir != NULL)
455 		free((void *)est->sc_repo_doordir);
456 	if (est->sc_repo_doorname != NULL)
457 		free((void *)est->sc_repo_doorname);
458 	if (est->sc_repo_server != NULL)
459 		free((void *)est->sc_repo_server);
460 	free(est);
461 
462 	est = old;
463 
464 	return (ret);
465 }
466 
467 /*
468  * Initialize svccfg state.  We recognize four environment variables:
469  *
470  * SVCCFG_REPOSITORY	Create a private instance of svc.configd(8) to answer
471  *			requests for the specified repository file.
472  * SVCCFG_DOOR_PATH	Directory for door creation.
473  *
474  * SVCCFG_DOOR		Rendezvous via an alternative repository door.
475  *
476  * SVCCFG_CONFIGD_PATH	Resolvable path to alternative svc.configd(8) binary.
477  */
478 void
479 engine_init()
480 {
481 	const char *cp;
482 
483 	est = uu_zalloc(sizeof (engine_state_t));
484 
485 	est->sc_cmd_lineno = 1;
486 	est->sc_repo_pid = -1;
487 
488 	cp = getenv("SVCCFG_REPOSITORY");
489 	est->sc_repo_filename = cp ? safe_strdup(cp) : NULL;
490 
491 	cp = getenv("SVCCFG_DOOR_PATH");
492 	est->sc_repo_doordir = cp ? cp : "/var/run";
493 
494 	cp = getenv("SVCCFG_DOOR");
495 	if (cp != NULL) {
496 		if (est->sc_repo_filename != NULL) {
497 			uu_warn(gettext("SVCCFG_DOOR unused when "
498 			    "SVCCFG_REPOSITORY specified\n"));
499 		} else {
500 			est->sc_repo_doorname = safe_strdup(cp);
501 		}
502 	}
503 
504 	cp = getenv("SVCCFG_CONFIGD_PATH");
505 	est->sc_repo_server = cp ? cp : "/lib/svc/bin/svc.configd";
506 
507 	est->sc_miss_type = B_FALSE;
508 	est->sc_in_emi = 0;
509 	cp = getenv("SMF_FMRI");
510 	if ((cp != NULL) && (strcmp(cp, SCF_INSTANCE_EMI) == 0))
511 		est->sc_in_emi = 1;
512 
513 	cp = smf_get_state(SCF_INSTANCE_FS_MINIMAL);
514 	if (cp && (strcmp(cp, SCF_STATE_STRING_ONLINE) == 0))
515 		est->sc_fs_minimal = B_TRUE;
516 	free((void *) cp);
517 }
518 
519 static int
520 import_manifest_file(manifest_info_t *info, boolean_t validate, FILE *pout,
521     uint_t flags)
522 {
523 	bundle_t *b;
524 	tmpl_errors_t *errs;
525 	const char *file;
526 	tmpl_validate_status_t vr;
527 
528 	file = info->mi_path;
529 
530 	/* Load the manifest */
531 	b = internal_bundle_new();
532 
533 	if (lxml_get_bundle_file(b, file, SVCCFG_OP_IMPORT) != 0) {
534 		internal_bundle_free(b);
535 		return (-1);
536 	}
537 
538 	/* Validate */
539 	if ((vr = tmpl_validate_bundle(b, &errs)) != TVS_SUCCESS) {
540 		char *prefix;
541 
542 		if ((validate == 0) || (vr == TVS_WARN)) {
543 			prefix = gettext("Warning: ");
544 		} else {
545 			prefix = "";
546 		}
547 		tmpl_errors_print(stderr, errs, prefix);
548 		if (validate && (vr != TVS_WARN)) {
549 			tmpl_errors_destroy(errs);
550 			semerr(gettext("Import of %s failed.\n"),
551 			    info->mi_path);
552 			if (pout != NULL) {
553 				(void) fprintf(pout, gettext("WARNING: svccfg "
554 				    "import of %s failed.\n"), info->mi_path);
555 			}
556 
557 			return (-1);
558 		}
559 	}
560 	tmpl_errors_destroy(errs);
561 
562 	/* Import */
563 	if (lscf_bundle_import(b, file, flags) != 0) {
564 		internal_bundle_free(b);
565 		semerr(gettext("Import of %s failed.\n"), info->mi_path);
566 		if (pout != NULL) {
567 			(void) fprintf(pout, gettext("WARNING: svccfg import "
568 			    "of %s failed.\n"), info->mi_path);
569 		}
570 		return (-1);
571 	}
572 
573 	internal_bundle_free(b);
574 
575 	if (info->mi_prop) {
576 		char *errstr;
577 
578 		if (mhash_store_entry(g_hndl, info->mi_prop, file,
579 		    info->mi_hash, APPLY_NONE, &errstr)) {
580 			if (errstr)
581 				semerr(gettext("Could not store hash for %s. "
582 				    "%s\n"), info->mi_path, errstr);
583 			else
584 				semerr(gettext("Unknown error from "
585 				    "mhash_store_entry() for %s\n"),
586 				    info->mi_path);
587 		}
588 
589 	}
590 
591 	return (0);
592 }
593 
594 /*
595  * Return values:
596  *	1	No manifests need to be imported.
597  *	0	Success
598  *	-1	Error
599  *	-2	Syntax error
600  */
601 int
602 engine_import(uu_list_t *args)
603 {
604 	int argc, i, o;
605 	int dont_exit;
606 	int failed_manifests;
607 	int total_manifests;
608 	char *file;
609 	char **argv = NULL;
610 	string_list_t *slp;
611 	boolean_t validate = B_FALSE;
612 	uint_t flags = SCI_GENERALLAST;
613 	int dirarg = 0;
614 	int isdir;
615 	int rc = -1;
616 	struct stat sb;
617 	char **paths;
618 	manifest_info_t ***manifest_sets = NULL;
619 	manifest_info_t **manifests;
620 	char *progress_file = NULL;
621 	FILE *progress_out = NULL;
622 	int progress_count;
623 	int back_count;
624 	int count;
625 	int fm_flags;
626 
627 	argc = uu_list_numnodes(args);
628 	if (argc < 1)
629 		return (-2);
630 
631 	argv = calloc(argc + 1, sizeof (char *));
632 	if (argv == NULL)
633 		uu_die(gettext("Out of memory.\n"));
634 
635 	for (slp = uu_list_first(args), i = 0;
636 	    slp != NULL;
637 	    slp = uu_list_next(args, slp), ++i)
638 		argv[i] = slp->str;
639 
640 	argv[i] = NULL;
641 
642 	opterr = 0;
643 	optind = 0;				/* Remember, no argv[0]. */
644 	for (;;) {
645 		o = getopt(argc, argv, "np:V");
646 		if (o == -1)
647 			break;
648 
649 		switch (o) {
650 		case 'n':
651 			flags |= SCI_NOREFRESH;
652 			break;
653 
654 		case 'p':
655 			progress_file = optarg;
656 			break;
657 
658 		case 'V':
659 			validate = B_TRUE;
660 			break;
661 
662 		case '?':
663 			free(argv);
664 			return (-2);
665 
666 		default:
667 			bad_error("getopt", o);
668 		}
669 	}
670 
671 	argc -= optind;
672 	if (argc < 1) {
673 		free(argv);
674 		return (-2);
675 	}
676 
677 	/* Open device for progress messages */
678 	if (progress_file != NULL) {
679 		if (strcmp(progress_file, "-") == 0) {
680 			progress_out = stdout;
681 		} else {
682 			progress_out = fopen(progress_file, "w");
683 			if (progress_out == NULL) {
684 				semerr(gettext("Unable to open %s for "
685 				    "progress reporting.  %s\n"),
686 				    progress_file, strerror(errno));
687 				goto out;
688 			}
689 			setbuf(progress_out, NULL);
690 		}
691 	}
692 
693 	paths = argv+optind;
694 	manifest_sets = safe_malloc(argc * sizeof (*manifest_sets));
695 
696 	/* If we're in interactive mode, force strict validation. */
697 	if (est->sc_cmd_flags & SC_CMD_IACTIVE)
698 		validate = B_TRUE;
699 
700 	lscf_prep_hndl();
701 
702 	/* Determine which manifests must be imported. */
703 
704 	total_manifests = 0;
705 	for (i = 0; i < argc; i++) {
706 		file = *(paths + i);
707 		fm_flags = CHECKHASH;
708 
709 		/* Determine if argument is a directory or file. */
710 		if (stat(file, &sb) == -1) {
711 			semerr(gettext("Unable to stat file %s.  %s\n"), file,
712 			    strerror(errno));
713 			goto out;
714 		}
715 		if (sb.st_mode & S_IFDIR) {
716 			fm_flags |= CHECKEXT;
717 			dirarg = 1;
718 			isdir = 1;
719 		} else if (sb.st_mode & S_IFREG) {
720 			isdir = 0;
721 		} else {
722 			semerr(gettext("%s is not a directory or regular "
723 			    "file\n"), file);
724 			goto out;
725 		}
726 
727 		/* Get list of manifests that we should import for this path. */
728 		if ((count = find_manifests(g_hndl, file, &manifests,
729 		    fm_flags)) < 0) {
730 			if (isdir) {
731 				semerr(gettext("Could not hash directory %s\n"),
732 				    file);
733 			} else {
734 				semerr(gettext("Could not hash file %s\n"),
735 				    file);
736 			}
737 			free_manifest_array(manifests);
738 			goto out;
739 		}
740 		total_manifests += count;
741 		manifest_sets[i] = manifests;
742 	}
743 
744 	if (total_manifests == 0) {
745 		/* No manifests to process. */
746 		if (g_verbose) {
747 			warn(gettext("No changes were necessary\n"));
748 		}
749 		rc = 1;
750 		goto out;
751 	}
752 
753 	/*
754 	 * If we're processing more than one file, we don't want to exit if
755 	 * we encounter an error.  We should go ahead and process all of
756 	 * the manifests.
757 	 */
758 	dont_exit = est->sc_cmd_flags & SC_CMD_DONT_EXIT;
759 	if (total_manifests > 1)
760 		est->sc_cmd_flags |= SC_CMD_DONT_EXIT;
761 
762 	if (progress_out != NULL)
763 		(void) fprintf(progress_out,
764 		    "Loading smf(7) service descriptions: ");
765 
766 	failed_manifests = 0;
767 	progress_count = 0;
768 	for (i = 0; i < argc; i++) {
769 		manifests = manifest_sets[i];
770 		if (manifests == NULL)
771 			continue;
772 		for (; *manifests != NULL; manifests++) {
773 			progress_count++;
774 			if (progress_out != NULL) {
775 				back_count = fprintf(progress_out, "%d/%d",
776 				    progress_count, total_manifests);
777 				while (back_count-- > 0) {
778 					(void) fputc('\b', progress_out);
779 				}
780 			}
781 			if (import_manifest_file(*manifests, validate,
782 			    progress_out, flags) != 0) {
783 				failed_manifests++;
784 			}
785 		}
786 	}
787 	if (progress_out != NULL)
788 		(void) fputc('\n', progress_out);
789 
790 	if ((total_manifests > 1) && (dont_exit == 0))
791 		est->sc_cmd_flags &= ~SC_CMD_DONT_EXIT;
792 
793 	if (dirarg && total_manifests > 0) {
794 		char *msg;
795 
796 		msg = "Loaded %d smf(7) service descriptions\n";
797 		warn(gettext(msg), progress_count);
798 
799 		if (failed_manifests) {
800 			msg = "%d smf(7) service descriptions failed to load\n";
801 			warn(gettext(msg), failed_manifests);
802 		}
803 	}
804 
805 	if (failed_manifests > 0)
806 		goto out;
807 
808 	if (g_verbose)
809 		warn(gettext("Successful import.\n"));
810 	rc = 0;
811 
812 out:
813 	if ((progress_out != NULL) && (progress_out != stdout))
814 		(void) fclose(progress_out);
815 	free(argv);
816 	if (manifest_sets != NULL) {
817 		for (i = 0; i < argc; i++) {
818 			free_manifest_array(manifest_sets[i]);
819 		}
820 		free(manifest_sets);
821 	}
822 	return (rc);
823 }
824 
825 /*
826  * Walk each service and get its manifest file.
827  *
828  * If the file exists check instance support, and cleanup any
829  * stale instances.
830  *
831  * If the file doesn't exist tear down the service and/or instances
832  * that are no longer supported by files.
833  */
834 int
835 engine_cleanup(int flags)
836 {
837 	boolean_t		activity = B_TRUE;
838 	int			dont_exit;
839 	int			r = -1;
840 
841 	lscf_prep_hndl();
842 
843 	if (flags == 1) {
844 		activity = B_FALSE;
845 	}
846 
847 	dont_exit = est->sc_cmd_flags & SC_CMD_DONT_EXIT;
848 	est->sc_cmd_flags |= SC_CMD_DONT_EXIT;
849 
850 	if (scf_walk_fmri(g_hndl, 0, NULL, SCF_WALK_SERVICE|SCF_WALK_NOINSTANCE,
851 	    lscf_service_cleanup, (void *)activity, NULL,
852 	    uu_warn) == SCF_SUCCESS)
853 		r = 0;
854 
855 	if (dont_exit == 0)
856 		est->sc_cmd_flags &= ~SC_CMD_DONT_EXIT;
857 
858 	(void) lscf_hash_cleanup();
859 
860 	return (r);
861 }
862 
863 static int
864 apply_profile(manifest_info_t *info, int apply_changes)
865 {
866 	bundle_t *b = internal_bundle_new();
867 
868 	if (lxml_get_bundle_file(b, info->mi_path, SVCCFG_OP_APPLY) != 0) {
869 		internal_bundle_free(b);
870 		return (-1);
871 	}
872 
873 	if (!apply_changes) {	/* we don't want to apply, just test */
874 		internal_bundle_free(b);
875 		return (0);
876 	}
877 
878 	if (lscf_bundle_apply(b, info->mi_path) != 0) {
879 		internal_bundle_free(b);
880 		return (-1);
881 	}
882 
883 	internal_bundle_free(b);
884 
885 	if (info->mi_prop) {
886 		apply_action_t apply;
887 		char *errstr;
888 
889 		apply = (est->sc_in_emi == 1) ? APPLY_LATE : APPLY_NONE;
890 		if (mhash_store_entry(g_hndl, info->mi_prop, info->mi_path,
891 		    info->mi_hash, apply, &errstr)) {
892 			semerr(errstr);
893 		}
894 	}
895 
896 	return (0);
897 }
898 
899 int
900 engine_apply(const char *file, int apply_changes)
901 {
902 	int rc = 0;
903 	int isdir;
904 	int dont_exit;
905 	int profile_count;
906 	int fm_flags;
907 	struct stat sb;
908 	manifest_info_t **profiles = NULL;
909 	manifest_info_t **entry;
910 	manifest_info_t *pfile;
911 
912 	lscf_prep_hndl();
913 
914 	/* Determine which profile(s) must be applied. */
915 
916 	profile_count = 0;
917 	fm_flags = BUNDLE_PROF | CHECKHASH;
918 
919 	/* Determine if argument is a directory or file. */
920 	if (stat(file, &sb) == -1) {
921 		semerr(gettext("Unable to stat file %s.  %s\n"), file,
922 		    strerror(errno));
923 		rc = -1;
924 		goto out;
925 	}
926 
927 	if (sb.st_mode & S_IFDIR) {
928 		fm_flags |= CHECKEXT;
929 		isdir = 1;
930 	} else if (sb.st_mode & S_IFREG) {
931 		isdir = 0;
932 	} else {
933 		semerr(gettext("%s is not a directory or regular "
934 		    "file\n"), file);
935 		rc = -1;
936 		goto out;
937 	}
938 
939 	/* Get list of profiles to be applied. */
940 	if ((profile_count = find_manifests(g_hndl, file, &profiles,
941 	    fm_flags)) < 0) {
942 
943 		if (isdir) {
944 			semerr(gettext("Could not hash directory %s\n"), file);
945 		} else {
946 			semerr(gettext("Could not hash file %s\n"), file);
947 		}
948 		rc = -1;
949 		goto out;
950 	}
951 
952 	if (profile_count == 0) {
953 		/* No profiles to process. */
954 		if (g_verbose) {
955 			warn(gettext("No changes were necessary\n"));
956 		}
957 		goto out;
958 	}
959 
960 	/*
961 	 * We don't want to exit if we encounter an error.  We should go ahead
962 	 * and process all of the profiles.
963 	 */
964 	dont_exit = est->sc_cmd_flags & SC_CMD_DONT_EXIT;
965 	est->sc_cmd_flags |= SC_CMD_DONT_EXIT;
966 
967 	for (entry = profiles; *entry != NULL; entry++) {
968 		pfile = *entry;
969 
970 		if (apply_profile(pfile, apply_changes) == 0) {
971 			if (g_verbose) {
972 				warn(gettext("Successfully applied: %s\n"),
973 				    pfile->mi_path);
974 			}
975 		} else {
976 			warn(gettext("WARNING: Failed to apply %s\n"),
977 			    pfile->mi_path);
978 			rc = -1;
979 		}
980 	}
981 
982 	if (dont_exit == 0)
983 		est->sc_cmd_flags &= ~SC_CMD_DONT_EXIT;
984 
985 	/* exit(1) appropriately if any profile failed to be applied. */
986 	if ((rc == -1) &&
987 	    (est->sc_cmd_flags & (SC_CMD_IACTIVE | SC_CMD_DONT_EXIT)) == 0) {
988 		free_manifest_array(profiles);
989 		exit(1);
990 	}
991 
992 out:
993 	free_manifest_array(profiles);
994 	return (rc);
995 }
996 
997 int
998 engine_restore(const char *file)
999 {
1000 	bundle_t *b;
1001 
1002 	lscf_prep_hndl();
1003 
1004 	b = internal_bundle_new();
1005 
1006 	if (lxml_get_bundle_file(b, file, SVCCFG_OP_RESTORE) != 0) {
1007 		internal_bundle_free(b);
1008 		return (-1);
1009 	}
1010 
1011 	if (lscf_bundle_import(b, file, SCI_NOSNAP) != 0) {
1012 		internal_bundle_free(b);
1013 		return (-1);
1014 	}
1015 
1016 	internal_bundle_free(b);
1017 
1018 	return (0);
1019 }
1020 
1021 int
1022 engine_set(uu_list_t *args)
1023 {
1024 	uu_list_walk_t *walk;
1025 	string_list_t *slp;
1026 
1027 	if (uu_list_first(args) == NULL) {
1028 		/* Display current options. */
1029 		if (!g_verbose)
1030 			(void) fputs("no", stdout);
1031 		(void) puts("verbose");
1032 
1033 		return (0);
1034 	}
1035 
1036 	walk = uu_list_walk_start(args, UU_DEFAULT);
1037 	if (walk == NULL)
1038 		uu_die(gettext("Couldn't read arguments"));
1039 
1040 	/* Use getopt? */
1041 	for (slp = uu_list_walk_next(walk);
1042 	    slp != NULL;
1043 	    slp = uu_list_walk_next(walk)) {
1044 		if (slp->str[0] == '-') {
1045 			char *op;
1046 
1047 			for (op = &slp->str[1]; *op != '\0'; ++op) {
1048 				switch (*op) {
1049 				case 'v':
1050 					g_verbose = 1;
1051 					break;
1052 
1053 				case 'V':
1054 					g_verbose = 0;
1055 					break;
1056 
1057 				default:
1058 					warn(gettext("Unknown option -%c.\n"),
1059 					    *op);
1060 				}
1061 			}
1062 		} else {
1063 			warn(gettext("No non-flag arguments defined.\n"));
1064 		}
1065 	}
1066 
1067 	return (0);
1068 }
1069 
1070 void
1071 help(int com)
1072 {
1073 	int i;
1074 
1075 	if (com == 0) {
1076 		warn(gettext("General commands:	 help set repository end\n"
1077 		    "Manifest commands:	 inventory validate import export "
1078 		    "archive\n"
1079 		    "Profile commands:	 apply extract\n"
1080 		    "Entity commands:	 list select unselect add delete "
1081 		    "describe\n"
1082 		    "Snapshot commands:	 listsnap selectsnap revert\n"
1083 		    "Instance commands:	 refresh\n"
1084 		    "Property group commands: listpg addpg delpg\n"
1085 		    "Property commands:	 listprop setprop delprop editprop\n"
1086 		    "Property value commands: addpropvalue delpropvalue "
1087 		    "setenv unsetenv\n"
1088 		    "Notification parameters: "
1089 		    "listnotify setnotify delnotify\n"));
1090 		return;
1091 	}
1092 
1093 	for (i = 0; help_messages[i].message != NULL; ++i) {
1094 		if (help_messages[i].token == com) {
1095 			warn(gettext("Usage: %s\n"),
1096 			    gettext(help_messages[i].message));
1097 			return;
1098 		}
1099 	}
1100 
1101 	warn(gettext("Unknown command.\n"));
1102 }
1103