xref: /titanic_50/usr/src/cmd/itadm/itadm.c (revision 726fad2a65f16c200a03969c29cb5c86c2d427db)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright (c) 2008, 2010, Oracle and/or its affiliates. All rights reserved.
23  */
24 #include <stdlib.h>
25 #include <stdio.h>
26 #include <sys/types.h>
27 #include <sys/stat.h>
28 #include <fcntl.h>
29 #include <unistd.h>
30 #include <errno.h>
31 #include <string.h>
32 #include <getopt.h>
33 #include <strings.h>
34 #include <ctype.h>
35 #include <libnvpair.h>
36 #include <libintl.h>
37 #include <libgen.h>
38 #include <pwd.h>
39 #include <auth_attr.h>
40 #include <secdb.h>
41 #include <libscf.h>
42 #include <limits.h>
43 #include <locale.h>
44 
45 #include <libstmf.h>
46 #include <libiscsit.h>
47 
48 /* what's this used for?? */
49 #define	ITADM_VERSION	"1.0"
50 
51 /* SMF service info */
52 #define	ISCSIT_SVC	"svc:/network/iscsi/target:default"
53 
54 #define	STMF_STALE(ret) {\
55 	if (ret == STMF_ERROR_PROV_DATA_STALE) {\
56 		output_config_error(ret, NULL);\
57 	} else if (ret != 0) {\
58 		output_config_error(ret,\
59 		    gettext("Configuration change failed"));\
60 	}\
61 }
62 
63 #define	ITADM_CHKAUTH(sec) {\
64 	if (!chkauthattr(sec, itadm_uname)) {\
65 		(void) fprintf(stderr,\
66 		    gettext("Error, operation requires authorization %s"),\
67 		    sec);\
68 		(void) fprintf(stderr, "\n");\
69 		return (1);\
70 	}\
71 }
72 
73 
74 static struct option itadm_long[] = {
75 	{"alias",		required_argument,	NULL, 'l'},
76 	{"auth-method",		required_argument,	NULL, 'a'},
77 	{"chap-secret",		no_argument,		NULL, 's'},
78 	{"chap-secret-file",	required_argument,	NULL, 'S'},
79 	{"chap-user",		required_argument,	NULL, 'u'},
80 	{"force",		no_argument,		NULL, 'f'},
81 	{"help",		no_argument,		NULL, 'h'},
82 	{"help",		no_argument,		NULL, '?'},
83 	{"isns",		required_argument,	NULL, 'i'},
84 	{"isns-server",		required_argument,	NULL, 'I'},
85 	{"node-name",		required_argument,	NULL, 'n'},
86 	{"radius-secret",	no_argument,		NULL, 'd'},
87 	{"radius-secret-file",	required_argument,	NULL, 'D'},
88 	{"radius-server",	required_argument,	NULL, 'r'},
89 	{"tpg-tag",		required_argument,	NULL, 't'},
90 	{"verbose",		no_argument,		NULL, 'v'},
91 	{"version",		no_argument,		NULL, 'V'},
92 	{NULL, 0, NULL, 0}
93 };
94 
95 char c_tgt[] = "itadm create-target [-a radius|chap|none|default] [-s] \
96 [-S chap-secret-path] [-u chap-username] [-n target-node-name] \
97 [-l alias] [-t tpg-name[,tpg-name,...]]";
98 
99 static char m_tgt[] = "itadm modify-target [-a radius|chap|none|default] [-s] \
100 [-S chap-secret-path] [-u chap-username] [-n new-target-node-name] \
101 [-l alias] [-t tpg-name[,tpg-name,...]] target-node-name";
102 
103 static char d_tgt[] = "itadm delete-target [-f] target-node-name";
104 
105 static char l_tgt[] = "itadm list-target [-v] [target-node-name]";
106 
107 static char c_tpg[] = "itadm create-tpg tpg-name IP-address[:port] \
108 [IP-address[:port]] [...]";
109 
110 static char l_tpg[] = "itadm list-tpg [-v] [tpg-name]";
111 
112 static char d_tpg[] = "itadm delete-tpg [-f] tpg-name";
113 
114 static char c_ini[] = "itadm create-initiator [-s] [-S chap-secret-path] \
115 [-u chap-username] initiator-node-name";
116 
117 static char m_ini[] = "itadm modify-initiator [-s] [-S chap-secret-path] \
118 [-u chap-username] initiator-node-name";
119 
120 static char l_ini[] = "itadm list-initiator [-v] initiator-node-name";
121 
122 static char d_ini[] = "itadm delete-inititator initiator-node-name";
123 
124 static char m_def[] = "itadm modify-defaults [-a radius|chap|none] \
125 [-r IP-address[:port]] [-d] [-D radius-secret-path] [-i enable|disable] \
126 [-I IP-address[:port][,IP-adddress[:port]]]";
127 
128 static char l_def[] = "itadm list-defaults";
129 
130 
131 /* keep the order of this enum in the same order as the 'subcmds' struct */
132 typedef enum {
133 	CREATE_TGT,
134 	MODIFY_TGT,
135 	DELETE_TGT,
136 	LIST_TGT,
137 	CREATE_TPG,
138 	DELETE_TPG,
139 	LIST_TPG,
140 	CREATE_INI,
141 	MODIFY_INI,
142 	LIST_INI,
143 	DELETE_INI,
144 	MODIFY_DEF,
145 	LIST_DEF,
146 	NULL_SUBCMD	/* must always be last! */
147 } itadm_sub_t;
148 
149 typedef struct {
150 	char		*name;
151 	char		*shortopts;
152 	char		*usemsg;
153 } itadm_subcmds_t;
154 
155 static itadm_subcmds_t	subcmds[] = {
156 	{"create-target", ":a:sS:u:n:l:t:h?", c_tgt},
157 	{"modify-target", ":a:sS:u:n:l:t:h?", m_tgt},
158 	{"delete-target", ":fh?", d_tgt},
159 	{"list-target", ":vh?", l_tgt},
160 	{"create-tpg", ":h?", c_tpg},
161 	{"delete-tpg", ":fh?", d_tpg},
162 	{"list-tpg", ":vh?", l_tpg},
163 	{"create-initiator", ":sS:u:h?", c_ini},
164 	{"modify-initiator", ":sS:u:h?", m_ini},
165 	{"list-initiator", ":vh?", l_ini},
166 	{"delete-initiator", ":h?", d_ini},
167 	{"modify-defaults", ":a:r:dD:i:I:h?", m_def},
168 	{"list-defaults", ":h?", l_def},
169 	{NULL, ":h?", NULL},
170 };
171 
172 /* used for checking if user is authorized */
173 static char *itadm_uname = NULL;
174 
175 /* prototypes */
176 static int
177 itadm_get_password(nvlist_t *nvl, char *key, char *passfile,
178     char *phrase);
179 
180 static int
181 itadm_opt_to_arr(nvlist_t *nvl, char *key, char *opt, uint32_t *num);
182 
183 static int
184 create_target(char *tgt, nvlist_t *proplist);
185 
186 static int
187 modify_target(char *tgt, char *new, nvlist_t *proplist);
188 
189 static int
190 delete_target(char *tgt, boolean_t force);
191 
192 static int
193 list_target(char *tgt, boolean_t verbose, boolean_t script);
194 
195 static int
196 create_tpg(char *tpg, int addrc, char **addrs);
197 
198 static int
199 list_tpg(char *tpg, boolean_t verbose, boolean_t script);
200 
201 static int
202 delete_tpg(char *tpg, boolean_t force);
203 
204 static int
205 modify_initiator(char *ini, nvlist_t *proplist, boolean_t create);
206 
207 static int
208 list_initiator(char *ini, boolean_t verbose, boolean_t script);
209 
210 static int
211 delete_initiator(char *ini);
212 
213 static int
214 modify_defaults(nvlist_t *proplist);
215 
216 static int
217 list_defaults(boolean_t script);
218 
219 static void
220 tag_name_to_num(char *tagname, uint16_t *tagnum);
221 
222 /* prototype from iscsit_common.h */
223 extern int
224 sockaddr_to_str(struct sockaddr_storage *sa, char **addr);
225 
226 static void output_config_error(int error_code, char *msg);
227 
228 int
229 main(int argc, char *argv[])
230 {
231 	int		ret = 0;
232 	int		idx = NULL_SUBCMD;
233 	char		c;
234 	int		newargc = argc;
235 	char		**newargv = NULL;
236 	char		*objp;
237 	int		itind = 0;
238 	nvlist_t	*proplist = NULL;
239 	boolean_t	verbose = B_FALSE;
240 	boolean_t	scripting = B_FALSE;
241 	boolean_t	tbool;
242 	char		*targetname = NULL;
243 	char		*propname;
244 	boolean_t	force = B_FALSE;
245 	struct passwd	*pwd = NULL;
246 	uint32_t	count = 0;
247 	char		*smfstate = NULL;
248 
249 	(void) setlocale(LC_ALL, "");
250 	(void) textdomain(TEXT_DOMAIN);
251 
252 	if (argc < 2) {
253 		ret = 1;
254 		goto usage_error;
255 	}
256 
257 	for (idx = 0; subcmds[idx].name != NULL; idx++) {
258 		if (strcmp(argv[1], subcmds[idx].name) == 0) {
259 			break;
260 		}
261 	}
262 
263 
264 	/* get the caller's user name for subsequent chkauthattr() calls */
265 	pwd = getpwuid(getuid());
266 	if (pwd == NULL) {
267 		(void) fprintf(stderr, "%s\n",
268 		    gettext("Could not determine callers user name"));
269 		return (1);
270 	}
271 
272 	itadm_uname = strdup(pwd->pw_name);
273 
274 	/* increment past command & subcommand */
275 	newargc--;
276 	newargv = &(argv[1]);
277 
278 	ret = nvlist_alloc(&proplist, NV_UNIQUE_NAME, 0);
279 	if (ret != 0) {
280 		ret = errno;
281 		output_config_error(ret, gettext("Could not allocate nvlist"));
282 		ret = 1;
283 		goto usage_error;
284 	}
285 
286 	while ((ret == 0) && (newargv)) {
287 		c = getopt_long(newargc, newargv, subcmds[idx].shortopts,
288 		    itadm_long, &itind);
289 		if (c == -1) {
290 			break;
291 		}
292 
293 		switch (c) {
294 			case 0:
295 				/* flag set by getopt */
296 				break;
297 			case 'a':
298 				ret = nvlist_add_string(proplist,
299 				    "auth", optarg);
300 				break;
301 			case 'd':
302 				ret = itadm_get_password(proplist,
303 				    "radiussecret", NULL,
304 				    gettext("Enter RADIUS secret: "));
305 				break;
306 			case 'D':
307 				ret = itadm_get_password(proplist,
308 				    "radiussecret", optarg, NULL);
309 				break;
310 			case 'f':
311 				force = B_TRUE;
312 				break;
313 			case '?':
314 				/*
315 				 * '?' is returned for both unrecognized
316 				 * options and if explicitly provided on
317 				 * the command line.  The latter should
318 				 * be handled the same as -h.
319 				 */
320 				if (strcmp(newargv[optind-1], "-?") != 0) {
321 					(void) fprintf(stderr,
322 					    gettext("Unrecognized option %s"),
323 					    newargv[optind-1]);
324 					(void) fprintf(stderr, "\n");
325 					ret = 1;
326 				}
327 				goto usage_error;
328 			case 'h':
329 				goto usage_error;
330 			case 'i':
331 				if (strncmp(optarg, "enable", strlen(optarg))
332 				    == 0) {
333 					tbool = B_TRUE;
334 				} else if (strncmp(optarg, "disable",
335 				    strlen(optarg)) == 0) {
336 					tbool = B_FALSE;
337 				} else {
338 					(void) fprintf(stderr, "%s\n",
339 					    gettext("invalid value for -i"));
340 					ret = 1;
341 					break;
342 				}
343 				ret = nvlist_add_boolean_value(proplist,
344 				    "isns", tbool);
345 				break;
346 			case 'I':
347 				/* possibly multi-valued */
348 				ret = itadm_opt_to_arr(proplist,
349 				    "isnsserver", optarg, &count);
350 				if ((ret == 0) && (count > 8)) {
351 					(void) fprintf(stderr, "%s\n",
352 					    gettext(
353 					    "Too many iSNS servers specified, "
354 					    "maximum of 8 allowed"));
355 					ret = 1;
356 				}
357 				break;
358 			case 'l':
359 				ret = nvlist_add_string(proplist,
360 				    "alias", optarg);
361 				break;
362 			case 'n':
363 				targetname = strdup(optarg);
364 				if (targetname == NULL) {
365 					ret = ENOMEM;
366 				}
367 				break;
368 			case 'r':
369 				ret = nvlist_add_string(proplist,
370 				    "radiusserver", optarg);
371 				break;
372 			case 's':
373 				if ((idx == CREATE_TGT) ||
374 				    (idx == MODIFY_TGT)) {
375 					propname = "targetchapsecret";
376 				} else {
377 					propname = "chapsecret";
378 				}
379 				ret = itadm_get_password(proplist,
380 				    propname, NULL,
381 				    gettext("Enter CHAP secret: "));
382 				break;
383 			case 'S':
384 				if ((idx == CREATE_TGT) ||
385 				    (idx == MODIFY_TGT)) {
386 					propname = "targetchapsecret";
387 				} else {
388 					propname = "chapsecret";
389 				}
390 				ret = itadm_get_password(proplist,
391 				    propname, optarg, NULL);
392 				break;
393 			case 't':
394 				/* possibly multi-valued */
395 				ret = itadm_opt_to_arr(proplist,
396 				    "tpg-tag", optarg, NULL);
397 				break;
398 			case 'u':
399 				if ((idx == CREATE_TGT) ||
400 				    (idx == MODIFY_TGT)) {
401 					propname = "targetchapuser";
402 				} else {
403 					propname = "chapuser";
404 				}
405 				ret = nvlist_add_string(proplist,
406 				    propname, optarg);
407 				break;
408 			case 'v':
409 				verbose = B_TRUE;
410 				break;
411 			case ':':
412 				(void) fprintf(stderr,
413 				    gettext("Option %s requires an operand"),
414 				    newargv[optind-1]);
415 				(void) fprintf(stderr, "\n");
416 
417 				/* fall through to default */
418 			default:
419 				ret = 1;
420 				break;
421 		}
422 	}
423 
424 	if (ret != 0) {
425 		goto usage_error;
426 	}
427 
428 	/* after getopt() to allow handling of -h option */
429 	if ((itadm_sub_t)idx == NULL_SUBCMD) {
430 		(void) fprintf(stderr, "%s\n",
431 		    gettext("Error, no subcommand specified"));
432 		ret = 1;
433 		goto usage_error;
434 	}
435 
436 	/*
437 	 * some subcommands take multiple operands, so adjust now that
438 	 * getopt is complete
439 	 */
440 	newargc -= optind;
441 	if (newargc == 0) {
442 		newargv = NULL;
443 		objp = NULL;
444 	} else {
445 		newargv = &(newargv[optind]);
446 		objp = newargv[0];
447 	}
448 
449 	if (objp == NULL) {
450 		switch ((itadm_sub_t)idx) {
451 		case MODIFY_TGT:
452 		case DELETE_TGT:
453 		case CREATE_TPG:
454 		case DELETE_TPG:
455 		case CREATE_INI:
456 		case MODIFY_INI:
457 		case DELETE_INI:
458 			/* These subcommands need at least one operand */
459 			(void) fprintf(stderr,
460 			    gettext("Error, %s requires an operand"),
461 			    subcmds[idx].name);
462 			(void) fprintf(stderr, "\n");
463 
464 			ret = 1;
465 			goto usage_error;
466 		default:
467 			break;
468 		}
469 	}
470 
471 	if (newargc > 1) {
472 		switch ((itadm_sub_t)idx) {
473 		case MODIFY_TGT:
474 		case DELETE_TGT:
475 		case LIST_TGT:
476 		case DELETE_TPG:
477 		case LIST_TPG:
478 		case CREATE_INI:
479 		case MODIFY_INI:
480 		case LIST_INI:
481 		case DELETE_INI:
482 			/* These subcommands should have at most one operand */
483 			(void) fprintf(stderr,
484 			    gettext("Error, %s accepts only a single operand"),
485 			    subcmds[idx].name);
486 			(void) fprintf(stderr, "\n");
487 
488 			ret = 1;
489 			goto usage_error;
490 
491 		default:
492 			break;
493 		}
494 	}
495 
496 	if (newargc > 0) {
497 		switch ((itadm_sub_t)idx) {
498 		case CREATE_TGT:
499 		case MODIFY_DEF:
500 		case LIST_DEF:
501 			/* These subcommands do not support an operand */
502 			(void) fprintf(stderr,
503 			    gettext("Error, %s does not support any operands"),
504 			    subcmds[idx].name);
505 			(void) fprintf(stderr, "\n");
506 
507 			ret = 1;
508 			goto usage_error;
509 
510 		default:
511 			break;
512 		}
513 	}
514 
515 	/*
516 	 * XXX - this should probably get pushed down to the library
517 	 * depending on the decision to allow/disallow configuratoin
518 	 * without the service running.
519 	 */
520 	/*
521 	 * Make sure iSCSI target service is enabled before
522 	 * proceeding.
523 	 */
524 	smfstate = smf_get_state(ISCSIT_SVC);
525 	if (!smfstate ||
526 	    (strcmp(smfstate, SCF_STATE_STRING_ONLINE) != 0)) {
527 		(void) fprintf(stderr, "%s\n",
528 		    gettext("The iSCSI target service must be online "
529 		    "before running this command."));
530 		(void) fprintf(stderr,
531 		    gettext("Use 'svcadm enable -r %s'"), ISCSIT_SVC);
532 		(void) fprintf(stderr, "\n");
533 		(void) fprintf(stderr, "%s\n",
534 		    gettext("to enable the service and its prerequisite "
535 		    "services and/or"));
536 		(void) fprintf(stderr,
537 		    gettext("'svcs -x %s' to determine why it is not online."),
538 		    ISCSIT_SVC);
539 		(void) fprintf(stderr, "\n");
540 
541 		return (1);
542 	}
543 
544 	switch ((itadm_sub_t)idx) {
545 		case CREATE_TGT:
546 			/*
547 			 * OK for targetname to be NULL here.  If the
548 			 * user did not specify a target name,
549 			 * one will be generated.
550 			 */
551 			ret = create_target(targetname, proplist);
552 			break;
553 		case MODIFY_TGT:
554 			ret = modify_target(objp, targetname, proplist);
555 			break;
556 		case DELETE_TGT:
557 			ret = delete_target(objp, force);
558 			break;
559 		case LIST_TGT:
560 			ret = list_target(objp, verbose, scripting);
561 			break;
562 		case CREATE_TPG:
563 			ret = create_tpg(objp, newargc - 1, &(newargv[1]));
564 			break;
565 		case DELETE_TPG:
566 			ret = delete_tpg(objp, force);
567 			break;
568 		case LIST_TPG:
569 			ret = list_tpg(objp, verbose, scripting);
570 			break;
571 		case CREATE_INI:
572 			ret = modify_initiator(objp, proplist, B_TRUE);
573 			break;
574 		case MODIFY_INI:
575 			ret = modify_initiator(objp, proplist, B_FALSE);
576 			break;
577 		case LIST_INI:
578 			ret = list_initiator(objp, verbose, scripting);
579 			break;
580 		case DELETE_INI:
581 			ret = delete_initiator(objp);
582 			break;
583 		case MODIFY_DEF:
584 			ret = modify_defaults(proplist);
585 			break;
586 		case LIST_DEF:
587 			ret = list_defaults(scripting);
588 			break;
589 		default:
590 			ret = 1;
591 			goto usage_error;
592 	}
593 
594 	if (ret != 0) {
595 		(void) fprintf(stderr,
596 		    gettext("itadm %s failed with error %d"),
597 		    subcmds[idx].name, ret);
598 		(void) fprintf(stderr, "\n");
599 	}
600 	return (ret);
601 
602 usage_error:
603 	if (subcmds[idx].name) {
604 		(void) printf("%s\n", gettext(subcmds[idx].usemsg));
605 	} else {
606 		/* overall usage */
607 		(void) printf("%s\n\n", gettext("itadm usage:"));
608 		for (idx = 0; subcmds[idx].name != NULL; idx++) {
609 			if (!subcmds[idx].usemsg) {
610 				continue;
611 			}
612 			(void) printf("\t%s\n", gettext(subcmds[idx].usemsg));
613 		}
614 	}
615 
616 	return (ret);
617 }
618 
619 static int
620 create_target(char *tgt, nvlist_t *proplist)
621 {
622 	int		ret;
623 	it_config_t	*cfg = NULL;
624 	it_tgt_t	*tgtp;
625 	char		**tags = NULL;
626 	uint32_t	count = 0;
627 	nvlist_t	*errlist = NULL;
628 	int		i;
629 	it_tpg_t	*tpg = NULL;
630 	uint16_t	tagid = 0;
631 	it_tpgt_t	*tpgt;
632 	char		*sec = "solaris.smf.modify.stmf";
633 	boolean_t	did_it_config_load = B_FALSE;
634 
635 	ITADM_CHKAUTH(sec);
636 
637 	if (tgt) {
638 		/*
639 		 * Validate target name.
640 		 */
641 		if (!IS_IQN_NAME(tgt) && !IS_EUI_NAME(tgt)) {
642 			(void) fprintf(stderr, gettext("Invalid name %s"),
643 			    tgt);
644 			(void) fprintf(stderr, "\n");
645 			return (EINVAL);
646 		}
647 	}
648 
649 	ret = it_config_load(&cfg);
650 	if (ret != 0) {
651 		output_config_error(ret,
652 		    gettext("Error retrieving iSCSI target configuration"));
653 		goto done;
654 	}
655 
656 	did_it_config_load = B_TRUE;
657 
658 	ret = it_tgt_create(cfg, &tgtp, tgt);
659 	if (ret != 0) {
660 		if (ret == EFAULT) {
661 			(void) fprintf(stderr,
662 			    gettext("Invalid iSCSI name %s"), tgt);
663 			(void) fprintf(stderr, "\n");
664 		} else if (ret == EEXIST) {
665 			(void) fprintf(stderr,
666 			    gettext("iSCSI target %s already configured"),
667 			    tgt);
668 			(void) fprintf(stderr, "\n");
669 		} else if (ret == E2BIG) {
670 			(void) fprintf(stderr,
671 			    gettext("Maximum of %d iSCSI targets"),
672 			    MAX_TARGETS);
673 			(void) fprintf(stderr, "\n");
674 		} else {
675 			output_config_error(ret,
676 			    gettext("Error creating target"));
677 		}
678 
679 		goto done;
680 	}
681 
682 	/* set the target portal group tags */
683 	ret = nvlist_lookup_string_array(proplist, "tpg-tag", &tags,
684 	    &count);
685 
686 	if (ret == ENOENT) {
687 		/* none specified.  is this ok? */
688 		ret = 0;
689 	} else if (ret != 0) {
690 		output_config_error(ret, gettext("Internal error"));
691 		goto done;
692 	}
693 
694 	/* special case, don't set any TPGs */
695 	if (tags && (count == 1) && (strcmp("default", tags[0]) == 0)) {
696 		count = 0;
697 	}
698 
699 	for (i = 0; i < count; i++) {
700 		if (!tags[i]) {
701 			continue;
702 		}
703 
704 		/* see that all referenced groups are already defined */
705 		tpg = cfg->config_tpg_list;
706 		while (tpg != NULL) {
707 			if (strcmp(tags[i], tpg->tpg_name) == 0) {
708 				break;
709 			}
710 
711 			tpg = tpg->tpg_next;
712 		}
713 		if (tpg == NULL) {
714 			(void) fprintf(stderr,
715 			    gettext("Invalid tpg-tag %s, tag not defined"),
716 			    tags[i]);
717 			(void) fprintf(stderr, "\n");
718 			ret = 1;
719 			goto done;
720 		}
721 
722 		/* generate the tag number to use */
723 		tag_name_to_num(tags[i], &tagid);
724 
725 		ret = it_tpgt_create(cfg, tgtp, &tpgt, tags[i], tagid);
726 		if (ret != 0) {
727 			(void) fprintf(stderr, gettext(
728 			    "Could not add target portal group tag %s: "),
729 			    tags[i]);
730 			output_config_error(ret, NULL);
731 			goto done;
732 		}
733 		tagid++;
734 	}
735 
736 	/* remove the tags from the proplist before continuing */
737 	if (tags) {
738 		(void) nvlist_remove_all(proplist, "tpg-tag");
739 	}
740 
741 	ret = it_tgt_setprop(cfg, tgtp, proplist, &errlist);
742 	if (ret != 0) {
743 		(void) fprintf(stderr,
744 		    gettext("Error setting target properties: %d"), ret);
745 		(void) fprintf(stderr, "\n");
746 		if (errlist) {
747 			nvpair_t	*nvp = NULL;
748 			char		*nn;
749 			char		*nv;
750 
751 			while ((nvp = nvlist_next_nvpair(errlist, nvp))
752 			    != NULL) {
753 				nv = NULL;
754 
755 				nn = nvpair_name(nvp);
756 				(void) nvpair_value_string(nvp, &nv);
757 
758 				if (nv != NULL) {
759 					(void) fprintf(stderr, "\t%s: %s\n",
760 					    nn, nv);
761 				}
762 			}
763 
764 			nvlist_free(errlist);
765 		}
766 		goto done;
767 	}
768 
769 	if (ret == 0) {
770 		ret = it_config_commit(cfg);
771 		STMF_STALE(ret);
772 	}
773 
774 done:
775 	if (ret == 0) {
776 		(void) printf(gettext("Target %s successfully created"),
777 		    tgtp->tgt_name);
778 		(void) printf("\n");
779 	}
780 
781 	if (did_it_config_load)
782 		it_config_free(cfg);
783 
784 	return (ret);
785 }
786 
787 int
788 list_target(char *tgt, boolean_t verbose, boolean_t script)
789 {
790 	int		ret;
791 	it_config_t	*cfg;
792 	it_tgt_t	*ptr;
793 	boolean_t	found = B_FALSE;
794 	boolean_t	first = B_TRUE;
795 	boolean_t	first_tag = B_TRUE;
796 	char		*gauth = "none";
797 	char		*galias = "-";
798 	char		*auth;
799 	char		*alias;
800 	char		*chapu;
801 	char		*chaps;
802 	it_tpgt_t	*tagp;
803 	char		*sec = "solaris.smf.read.stmf";
804 	stmfDevid	devid;
805 	stmfSessionList	*sess = NULL;
806 	stmfTargetProperties	props;
807 	char		*state;
808 	int		num_sessions;
809 
810 	ITADM_CHKAUTH(sec);
811 
812 	ret = it_config_load(&cfg);
813 	if (ret != 0) {
814 		output_config_error(ret,
815 		    gettext("Error retrieving iSCSI target configuration"));
816 		return (ret);
817 	}
818 
819 	ptr = cfg->config_tgt_list;
820 
821 	/* grab global defaults for auth, alias */
822 	if (cfg->config_global_properties) {
823 		(void) nvlist_lookup_string(cfg->config_global_properties,
824 		    "alias", &galias);
825 		(void) nvlist_lookup_string(cfg->config_global_properties,
826 		    "auth", &gauth);
827 	}
828 
829 	for (; ptr != NULL; ptr = ptr->tgt_next) {
830 		if (found) {
831 			break;
832 		}
833 
834 		if (tgt) {
835 			/*
836 			 * We do a case-insensitive match in case
837 			 * a non-lower case value got stored.
838 			 */
839 			if (strcasecmp(tgt, ptr->tgt_name) != 0) {
840 				continue;
841 			} else {
842 				found = B_TRUE;
843 			}
844 		}
845 
846 		state = "-";
847 		num_sessions = 0;
848 		sess = NULL;
849 
850 		/*
851 		 * make a best effort to retrieve target status and
852 		 * number of active sessions from STMF.
853 		 */
854 		ret = stmfDevidFromIscsiName(ptr->tgt_name, &devid);
855 		if (ret == STMF_STATUS_SUCCESS) {
856 			ret = stmfGetTargetProperties(&devid, &props);
857 			if (ret == STMF_STATUS_SUCCESS) {
858 				if (props.status == STMF_TARGET_PORT_ONLINE) {
859 					state = "online";
860 				} else {
861 					state = "offline";
862 				}
863 			}
864 		}
865 		if (ret == STMF_STATUS_SUCCESS) {
866 			ret = stmfGetSessionList(&devid, &sess);
867 			if (ret == STMF_STATUS_SUCCESS) {
868 				num_sessions = sess->cnt;
869 				free(sess);
870 			}
871 		}
872 
873 		/* reset ret so we don't return an error */
874 		ret = 0;
875 
876 		if (!script && first) {
877 			(void) printf("%-61s%-9s%-9s\n", "TARGET NAME",
878 			    "STATE", "SESSIONS");
879 			first = B_FALSE;
880 		}
881 
882 		if (!script) {
883 			/*
884 			 * try not to let columns run into each other.
885 			 * Stick a tab after too-long fields.
886 			 * Lengths chosen are for the 'common' cases.
887 			 */
888 			(void) printf("%-61s", ptr->tgt_name);
889 			if (strlen(ptr->tgt_name) > 60) {
890 				(void) printf("\t");
891 			}
892 			(void) printf("%-9s%-9d", state, num_sessions);
893 		} else {
894 			(void) printf("%s\t%s\t%d", ptr->tgt_name,
895 			    state, num_sessions);
896 		}
897 
898 		if (!verbose) {
899 			(void) printf("\n");
900 			continue;
901 		}
902 
903 		auth = gauth;
904 		alias = galias;
905 		chapu = "-";
906 		chaps = "unset";
907 
908 		if (ptr->tgt_properties) {
909 			(void) nvlist_lookup_string(ptr->tgt_properties,
910 			    "auth", &auth);
911 			(void) nvlist_lookup_string(ptr->tgt_properties,
912 			    "alias", &alias);
913 			if (nvlist_exists(ptr->tgt_properties,
914 			    "targetchapsecret")) {
915 				chaps = "set";
916 			}
917 			(void) nvlist_lookup_string(ptr->tgt_properties,
918 			    "targetchapuser", &chapu);
919 		}
920 
921 		if (!script) {
922 			(void) printf("\n\t%-20s\t%s\n\t%-20s\t%s %s\n"
923 			    "\t%-20s\t%s\n\t%-20s\t%s\n\t%-20s\t",
924 			    "alias:", alias, "auth:", auth,
925 			    ((auth == gauth) ? "(defaults)" : ""),
926 			    "targetchapuser:",
927 			    chapu, "targetchapsecret:", chaps, "tpg-tags:");
928 		} else {
929 			(void) printf("\t%s\t%s %s\t%s\t%s\t",
930 			    alias, auth,
931 			    ((auth == gauth) ? "(defaults)" : ""),
932 			    chapu, chaps);
933 		}
934 
935 		first_tag = B_TRUE;
936 		tagp = ptr->tgt_tpgt_list;
937 		for (; tagp != NULL; tagp = tagp->tpgt_next) {
938 			if (!first_tag) {
939 				(void) printf(",");
940 			} else {
941 				first_tag = B_FALSE;
942 			}
943 			(void) printf("%s = %d",
944 			    tagp->tpgt_tpg_name, tagp->tpgt_tag);
945 		}
946 
947 		if (first_tag) {
948 			/* didn't find any */
949 			(void) printf("default");
950 		}
951 
952 		(void) printf("\n");
953 	}
954 
955 	if (tgt && (!found)) {
956 		(void) fprintf(stderr,
957 		    gettext("Target %s not found!"), tgt);
958 		(void) fprintf(stderr, "\n");
959 		ret = 1;
960 	}
961 
962 	it_config_free(cfg);
963 
964 	return (ret);
965 }
966 
967 int
968 delete_target(char *tgt, boolean_t force)
969 {
970 	int		ret;
971 	it_config_t	*cfg;
972 	it_tgt_t	*ptr;
973 	char		*sec = "solaris.smf.modify.stmf";
974 
975 	ITADM_CHKAUTH(sec);
976 
977 	if (!tgt) {
978 		(void) fprintf(stderr, "%s\n",
979 		    gettext("Error, no target specified"));
980 		return (EINVAL);
981 	}
982 
983 	ret = it_config_load(&cfg);
984 	if (ret != 0) {
985 		output_config_error(ret,
986 		    gettext("Error retrieving iSCSI target configuration"));
987 		return (ret);
988 	}
989 
990 	ptr = cfg->config_tgt_list;
991 	while (ptr) {
992 		/*
993 		 * We do a case-insensitive match in case
994 		 * a non-lower case value got stored.
995 		 */
996 		if (strcasecmp(ptr->tgt_name, tgt) == 0) {
997 			break;
998 		}
999 
1000 		ptr = ptr->tgt_next;
1001 	}
1002 
1003 	if (ptr) {
1004 		ret = it_tgt_delete(cfg, ptr, force);
1005 
1006 		if (ret != 0) {
1007 			if (ret == EBUSY) {
1008 				(void) fprintf(stderr,
1009 				    gettext("The target is online or busy. "
1010 				    "Use the -f (force) option, or "
1011 				    "'stmfadm offline-target %s'"), tgt);
1012 				(void) fprintf(stderr, "\n");
1013 			} else {
1014 				output_config_error(ret, gettext(
1015 				    "Error deleting target"));
1016 			}
1017 		}
1018 
1019 		if (ret == 0) {
1020 			ret = it_config_commit(cfg);
1021 			STMF_STALE(ret);
1022 		}
1023 	} else {
1024 		(void) fprintf(stderr,
1025 		    gettext("Target %s not found"), tgt);
1026 		(void) fprintf(stderr, "\n");
1027 		ret = 1;
1028 	}
1029 
1030 	it_config_free(cfg);
1031 
1032 	return (ret);
1033 }
1034 
1035 static int
1036 modify_target(char *tgt, char *newname, nvlist_t *proplist)
1037 {
1038 	int		ret;
1039 	it_config_t	*cfg = NULL;
1040 	it_tgt_t	*ptr = NULL;
1041 	it_tgt_t	*tgtp = NULL;
1042 	char		**tags = NULL;
1043 	uint32_t	count = 0;
1044 	nvlist_t	*errlist = NULL;
1045 	int		i;
1046 	it_tpg_t	*tpg = NULL;
1047 	uint16_t	tagid;
1048 	it_tpgt_t	*tpgt = NULL;
1049 	char		*sec = "solaris.smf.modify.stmf";
1050 	boolean_t	did_it_config_load = B_FALSE;
1051 
1052 	ITADM_CHKAUTH(sec);
1053 
1054 	/* XXX:  Do we need to offline anything here too? */
1055 
1056 	if (!tgt) {
1057 		(void) fprintf(stderr, "%s\n",
1058 		    gettext("Error, no target specified"));
1059 		ret = EINVAL;
1060 		goto done;
1061 	}
1062 
1063 	ret = it_config_load(&cfg);
1064 	if (ret != 0) {
1065 		output_config_error(ret,
1066 		    gettext("Error retrieving iSCSI target configuration"));
1067 		goto done;
1068 	}
1069 
1070 	did_it_config_load = B_TRUE;
1071 
1072 	/*
1073 	 * If newname is specified, ensure it is a valid name.
1074 	 */
1075 	if (newname) {
1076 		if (!validate_iscsi_name(newname)) {
1077 			(void) fprintf(stderr,
1078 			    gettext("Invalid iSCSI name %s"), newname);
1079 			(void) fprintf(stderr, "\n");
1080 			ret = 1;
1081 			goto done;
1082 		}
1083 	}
1084 
1085 	/*
1086 	 * Loop through to verify that the target to be modified truly
1087 	 * exists.  If this target is to be renamed, ensure the new
1088 	 * name is not already in use.
1089 	 */
1090 	ptr = cfg->config_tgt_list;
1091 	while (ptr) {
1092 		/*
1093 		 * Does a target with the new name already exist?
1094 		 */
1095 		if (newname &&
1096 		    (strcasecmp(newname, ptr->tgt_name) == 0)) {
1097 			(void) fprintf(stderr,
1098 			    gettext("A target with name %s already exists"),
1099 			    newname);
1100 			(void) fprintf(stderr, "\n");
1101 			ret = 1;
1102 			goto done;
1103 		}
1104 
1105 		if (strcasecmp(ptr->tgt_name, tgt) == 0) {
1106 			tgtp = ptr;
1107 		}
1108 
1109 		ptr = ptr ->tgt_next;
1110 	}
1111 
1112 	if (!tgtp) {
1113 		(void) fprintf(stderr,
1114 		    gettext("Target %s not found"), tgt);
1115 		(void) fprintf(stderr, "\n");
1116 		ret = EINVAL;
1117 		goto done;
1118 	}
1119 
1120 	/* set the target portal group tags */
1121 	ret = nvlist_lookup_string_array(proplist, "tpg-tag", &tags,
1122 	    &count);
1123 
1124 	if (ret == ENOENT) {
1125 		/* none specified.  is this ok? */
1126 		ret = 0;
1127 	} else if (ret != 0) {
1128 		output_config_error(ret, gettext("Internal error"));
1129 		goto done;
1130 	}
1131 
1132 	/* special case, remove all explicit TPGs, and don't add any */
1133 	if (tags && (count == 1) && (strcmp("default", tags[0]) == 0)) {
1134 		count = 0;
1135 	}
1136 
1137 	for (i = 0; i < count; i++) {
1138 		if (!tags || !tags[i]) {
1139 			continue;
1140 		}
1141 
1142 		/* see that all referenced groups are already defined */
1143 		tpg = cfg->config_tpg_list;
1144 		while (tpg != NULL) {
1145 			if (strcmp(tags[i], tpg->tpg_name) == 0) {
1146 				break;
1147 			}
1148 			tpg = tpg->tpg_next;
1149 		}
1150 		if (tpg == NULL) {
1151 			(void) fprintf(stderr,
1152 			    gettext("Invalid tpg-name %s: not defined"),
1153 			    tags[i]);
1154 			(void) fprintf(stderr, "\n");
1155 			ret = 1;
1156 			goto done;
1157 		}
1158 	}
1159 
1160 	/*
1161 	 * don't recreate tags that are already associated,
1162 	 * remove tags not requested.
1163 	 */
1164 	if (tags) {
1165 		tpgt = tgtp->tgt_tpgt_list;
1166 		while (tpgt) {
1167 			for (i = 0; i < count; i++) {
1168 				if (!tags[i]) {
1169 					continue;
1170 				}
1171 
1172 				if (strcmp(tpgt->tpgt_tpg_name, tags[i])
1173 				    == 0) {
1174 					/* non-null tags will be created */
1175 					tags[i] = NULL;
1176 					break;
1177 				}
1178 			}
1179 			if (i == count) {
1180 				/* one to remove */
1181 				it_tpgt_t	*ptr = tpgt;
1182 
1183 				tpgt = ptr->tpgt_next;
1184 				it_tpgt_delete(cfg, tgtp, ptr);
1185 			} else {
1186 				tpgt = tpgt->tpgt_next;
1187 			}
1188 		}
1189 	}
1190 
1191 	/* see if there are any left to add */
1192 	for (i = 0; i < count; i++) {
1193 		if (!tags || !tags[i]) {
1194 			continue;
1195 		}
1196 
1197 		/* generate the tag number to use */
1198 		tag_name_to_num(tags[i], &tagid);
1199 
1200 		ret = it_tpgt_create(cfg, tgtp, &tpgt, tags[i], tagid);
1201 		if (ret != 0) {
1202 			if (ret == E2BIG) {
1203 				(void) fprintf(stderr, "%s\n",
1204 				    gettext("Error, no portal tag available"));
1205 			} else {
1206 				(void) fprintf(stderr, gettext(
1207 				    "Could not add target portal group"
1208 				    " tag %s: "), tags[i]);
1209 				output_config_error(ret, NULL);
1210 			}
1211 			goto done;
1212 		}
1213 	}
1214 
1215 	/* remove the tags from the proplist before continuing */
1216 	(void) nvlist_remove_all(proplist, "tpg-tag");
1217 
1218 	/*
1219 	 * Rename this target, if requested.  Save the old name in
1220 	 * the property list, so the kernel knows this is a renamed
1221 	 * target, and not a new one.
1222 	 */
1223 	if (newname && (strlen(newname) > 0)) {
1224 		ret = nvlist_add_string(proplist, "oldtargetname",
1225 		    tgtp->tgt_name);
1226 		if (ret != 0) {
1227 			output_config_error(ret,
1228 			    gettext("Error renaming target"));
1229 			goto done;
1230 		}
1231 		(void) strlcpy(tgtp->tgt_name, newname,
1232 		    sizeof (tgtp->tgt_name));
1233 	}
1234 
1235 	ret = it_tgt_setprop(cfg, tgtp, proplist, &errlist);
1236 	if (ret != 0) {
1237 		(void) fprintf(stderr,
1238 		    gettext("Error setting target properties: %d"), ret);
1239 		(void) fprintf(stderr, "\n");
1240 		if (errlist) {
1241 			nvpair_t	*nvp = NULL;
1242 			char		*nn;
1243 			char		*nv;
1244 
1245 			while ((nvp = nvlist_next_nvpair(errlist, nvp))
1246 			    != NULL) {
1247 				nv = NULL;
1248 
1249 				nn = nvpair_name(nvp);
1250 				(void) nvpair_value_string(nvp, &nv);
1251 
1252 				if (nv != NULL) {
1253 					(void) fprintf(stderr, "\t%s: %s\n",
1254 					    nn, nv);
1255 				}
1256 			}
1257 
1258 			nvlist_free(errlist);
1259 		}
1260 		goto done;
1261 	}
1262 
1263 	if (ret == 0) {
1264 		ret = it_config_commit(cfg);
1265 		STMF_STALE(ret);
1266 	}
1267 
1268 done:
1269 	if (ret == 0) {
1270 		(void) printf(gettext("Target %s successfully modified"),
1271 		    tgtp->tgt_name);
1272 		(void) printf("\n");
1273 	}
1274 
1275 	if (did_it_config_load)
1276 		it_config_free(cfg);
1277 
1278 	return (ret);
1279 }
1280 
1281 int
1282 create_tpg(char *tpg, int addrc, char **addrs)
1283 {
1284 	int		ret;
1285 	it_config_t	*cfg;
1286 	it_tpg_t	*tpgp;
1287 	int		count = 0;
1288 	it_portal_t	*ptl;
1289 	char		*sec = "solaris.smf.modify.stmf";
1290 	int 		i = 0;
1291 
1292 	ITADM_CHKAUTH(sec);
1293 
1294 	if (!tpg) {
1295 		(void) fprintf(stderr, "%s\n",
1296 		    gettext("Error, no target portal group specified"));
1297 		return (EINVAL);
1298 	}
1299 
1300 	if (strlen(tpg) > (MAX_TPG_NAMELEN - 1)) {
1301 		(void) fprintf(stderr,
1302 		    gettext("Target Portal Group name must be no longer "
1303 		    "than %d characters"), (MAX_TPG_NAMELEN - 1));
1304 		(void) fprintf(stderr, "\n");
1305 		return (EINVAL);
1306 	}
1307 
1308 	if (!addrs || (addrc <= 0)) {
1309 		(void) fprintf(stderr, "%s\n",
1310 		    gettext("Error, no portal addresses specified"));
1311 		return (EINVAL);
1312 	}
1313 
1314 	ret = it_config_load(&cfg);
1315 	if (ret != 0) {
1316 		output_config_error(ret,
1317 		    gettext("Error retrieving iSCSI target configuration"));
1318 		return (ret);
1319 	}
1320 
1321 	tpgp = cfg->config_tpg_list;
1322 	while (tpgp != NULL) {
1323 		if (strcmp(tpgp->tpg_name, tpg) == 0) {
1324 			(void) fprintf(stderr,
1325 			    gettext("Target Portal Group %s already exists"),
1326 			    tpg);
1327 			(void) fprintf(stderr, "\n");
1328 			it_config_free(cfg);
1329 			return (1);
1330 		}
1331 		tpgp = tpgp->tpg_next;
1332 	}
1333 
1334 	/*
1335 	 * Ensure that the addrs don't contain commas.
1336 	 */
1337 	for (i = 0; i < addrc; i++) {
1338 		if (strchr(addrs[i], ',')) {
1339 			(void) fprintf(stderr,
1340 			    gettext("Bad portal name %s"),
1341 			    addrs[i]);
1342 			(void) fprintf(stderr, "\n");
1343 
1344 			it_config_free(cfg);
1345 			return (EINVAL);
1346 		}
1347 	}
1348 
1349 	/*
1350 	 * Create the portal group and first portal
1351 	 */
1352 	ret = it_tpg_create(cfg, &tpgp, tpg, addrs[count]);
1353 	if (ret != 0) {
1354 		if (ret == EEXIST) {
1355 			(void) fprintf(stderr,
1356 			    gettext("Portal %s already in use"),
1357 			    addrs[count]);
1358 			(void) fprintf(stderr, "\n");
1359 		} else {
1360 			output_config_error(ret, gettext("Could not create the "
1361 			    "target portal group"));
1362 		}
1363 		it_config_free(cfg);
1364 		return (ret);
1365 	}
1366 
1367 	/*
1368 	 * Add the remaining portals
1369 	 */
1370 	for (count = 1; count < addrc; count++) {
1371 		if (!addrs[count]) {
1372 			continue;
1373 		}
1374 
1375 		ret = it_portal_create(cfg, tpgp, &ptl, addrs[count]);
1376 		if (ret != 0) {
1377 			if (ret == EEXIST) {
1378 				(void) fprintf(stderr,
1379 				    gettext("Portal %s already in use"),
1380 				    addrs[count]);
1381 				(void) fprintf(stderr, "\n");
1382 			} else {
1383 				(void) fprintf(stderr,
1384 				    gettext("Error adding portal %s: "),
1385 				    addrs[count]);
1386 				output_config_error(ret, NULL);
1387 				break;
1388 			}
1389 		}
1390 	}
1391 
1392 	if (ret == 0) {
1393 		ret = it_config_commit(cfg);
1394 		STMF_STALE(ret);
1395 	}
1396 
1397 	it_config_free(cfg);
1398 
1399 	return (ret);
1400 }
1401 
1402 static int
1403 list_tpg(char *tpg, boolean_t verbose, boolean_t script)
1404 {
1405 	int		ret;
1406 	it_config_t	*cfg;
1407 	it_tpg_t	*ptr;
1408 	boolean_t	found = B_FALSE;
1409 	it_portal_t	*portal;
1410 	boolean_t	first = B_TRUE;
1411 	boolean_t	first_portal;
1412 	char		*pstr;
1413 	char		*sec = "solaris.smf.read.stmf";
1414 
1415 	ITADM_CHKAUTH(sec);
1416 
1417 	ret = it_config_load(&cfg);
1418 	if (ret != 0) {
1419 		output_config_error(ret,
1420 		    gettext("Error retrieving iSCSI target configuration"));
1421 		return (ret);
1422 	}
1423 
1424 	ptr = cfg->config_tpg_list;
1425 
1426 	for (; ptr != NULL; ptr = ptr->tpg_next) {
1427 		if (found) {
1428 			break;
1429 		}
1430 
1431 		if (tpg) {
1432 			if (strcmp(tpg, ptr->tpg_name) != 0) {
1433 				continue;
1434 			} else {
1435 				found = B_TRUE;
1436 			}
1437 		}
1438 
1439 		if (!script && first) {
1440 			(void) printf("%-30s%-9s\n", "TARGET PORTAL GROUP",
1441 			    "PORTAL COUNT");
1442 			first = B_FALSE;
1443 		}
1444 
1445 		if (!script) {
1446 			(void) printf("%-30s", ptr->tpg_name);
1447 			if (strlen(ptr->tpg_name) > 30) {
1448 				(void) printf("\t");
1449 			}
1450 			(void) printf("%-9d", ptr->tpg_portal_count);
1451 		} else {
1452 			(void) printf("%s\t%d", ptr->tpg_name,
1453 			    ptr->tpg_portal_count);
1454 		}
1455 
1456 		if (!verbose) {
1457 			(void) printf("\n");
1458 			continue;
1459 		}
1460 
1461 		if (!script) {
1462 			(void) printf("\n    portals:");
1463 		}
1464 
1465 		first_portal = B_TRUE;
1466 
1467 		portal = ptr->tpg_portal_list;
1468 		for (; portal != NULL; portal = portal->portal_next) {
1469 			ret = sockaddr_to_str(&(portal->portal_addr), &pstr);
1470 			if (ret != 0) {
1471 				/* invalid addr? */
1472 				continue;
1473 			}
1474 			if (!first_portal) {
1475 				(void) printf(",");
1476 			} else {
1477 				(void) printf("\t");
1478 				first_portal = B_FALSE;
1479 			}
1480 
1481 			(void) printf("%s", pstr);
1482 			free(pstr);
1483 		}
1484 
1485 		if (first_portal) {
1486 			/* none found */
1487 			(void) printf("\t<none>");
1488 		}
1489 
1490 		(void) printf("\n");
1491 	}
1492 
1493 	if (tpg && (!found)) {
1494 		(void) fprintf(stderr,
1495 		    gettext("Target Portal Group %s not found!\n"), tpg);
1496 		(void) fprintf(stderr, "\n");
1497 		ret = 1;
1498 	}
1499 
1500 	it_config_free(cfg);
1501 
1502 	return (ret);
1503 }
1504 
1505 static int
1506 delete_tpg(char *tpg, boolean_t force)
1507 {
1508 	int		ret;
1509 	it_config_t	*cfg;
1510 	it_tpg_t	*ptpg = NULL;
1511 	char		*sec = "solaris.smf.modify.stmf";
1512 
1513 	ITADM_CHKAUTH(sec);
1514 
1515 	if (!tpg) {
1516 		(void) fprintf(stderr, "%s\n",
1517 		    gettext("Error, no target portal group specified"));
1518 		return (EINVAL);
1519 	}
1520 
1521 	ret = it_config_load(&cfg);
1522 	if (ret != 0) {
1523 		output_config_error(ret,
1524 		    gettext("Error retrieving iSCSI target configuration"));
1525 		return (ret);
1526 	}
1527 
1528 	ptpg = cfg->config_tpg_list;
1529 	for (; ptpg != NULL; ptpg = ptpg->tpg_next) {
1530 		if (strcmp(tpg, ptpg->tpg_name) == 0) {
1531 			break;
1532 		}
1533 	}
1534 
1535 	if (!ptpg) {
1536 		(void) fprintf(stderr,
1537 		    gettext("Target portal group %s does not exist"),
1538 		    tpg);
1539 		(void) fprintf(stderr, "\n");
1540 		ret = 1;
1541 	} else {
1542 		ret = it_tpg_delete(cfg, ptpg, force);
1543 		if (ret == EBUSY) {
1544 			(void) fprintf(stderr, "%s\n",
1545 			    gettext(
1546 			    "Target portal group associated with one or more "
1547 			    "targets.  Cannot delete."));
1548 		} else if (ret != 0) {
1549 			output_config_error(ret, gettext("Could not delete "
1550 			    "target portal group"));
1551 		}
1552 
1553 		if (ret == 0) {
1554 			ret = it_config_commit(cfg);
1555 			STMF_STALE(ret);
1556 		}
1557 	}
1558 
1559 	it_config_free(cfg);
1560 
1561 	return (ret);
1562 }
1563 
1564 static int
1565 modify_initiator(char *ini, nvlist_t *proplist, boolean_t create)
1566 {
1567 	int		ret;
1568 	it_config_t	*cfg;
1569 	it_ini_t	*inip;
1570 	nvlist_t	*errlist = NULL;
1571 	nvpair_t	*nvp = NULL;
1572 	char		*sec = "solaris.smf.modify.stmf";
1573 	boolean_t	changed = B_TRUE;
1574 
1575 	ITADM_CHKAUTH(sec);
1576 
1577 	if (!ini) {
1578 		(void) fprintf(stderr, "%s\n",
1579 		    gettext("Error, no initiator specified"));
1580 		return (EINVAL);
1581 	} else if (create) {
1582 		/*
1583 		 * validate input name - what are the rules for EUI
1584 		 * and IQN values?
1585 		 */
1586 		if (!IS_IQN_NAME(ini) && !IS_EUI_NAME(ini)) {
1587 			(void) fprintf(stderr, gettext("Invalid name %s"),
1588 			    ini);
1589 			(void) fprintf(stderr, "\n");
1590 			return (EINVAL);
1591 		}
1592 	}
1593 
1594 	/*
1595 	 * See if any properties were actually specified.
1596 	 */
1597 	if (proplist) {
1598 		nvp = nvlist_next_nvpair(proplist, nvp);
1599 	}
1600 
1601 	if ((nvp == NULL) && !create) {
1602 		changed = B_FALSE;
1603 	}
1604 
1605 	/*
1606 	 * If no properties, and this is really a modify op, verify
1607 	 * that the requested initiator exists, but then don't do anything.
1608 	 * Modifying non-existent is an error; doing nothing to a defined
1609 	 * initiator is not.
1610 	 */
1611 
1612 	ret = it_config_load(&cfg);
1613 	if (ret != 0) {
1614 		output_config_error(ret,
1615 		    gettext("Error retrieving iSCSI target configuration"));
1616 		return (ret);
1617 	}
1618 
1619 	inip = cfg->config_ini_list;
1620 	while (inip) {
1621 		if (strcasecmp(inip->ini_name, ini) == 0) {
1622 			break;
1623 		}
1624 
1625 		inip = inip->ini_next;
1626 	}
1627 
1628 	if (create) {
1629 		if (inip) {
1630 			(void) fprintf(stderr,
1631 			    gettext("Initiator %s already exists"),
1632 			    inip->ini_name);
1633 			(void) fprintf(stderr, "\n");
1634 			ret = EINVAL;
1635 		} else {
1636 			ret = it_ini_create(cfg, &inip, ini);
1637 			if (ret != 0) {
1638 				if (ret == EFAULT) {
1639 					(void) fprintf(stderr,
1640 					    gettext("Invalid iSCSI name %s"),
1641 					    ini);
1642 					(void) fprintf(stderr, "\n");
1643 				} else {
1644 					output_config_error(ret, gettext(
1645 					    "Error creating initiator"));
1646 				}
1647 			}
1648 		}
1649 	} else if (!inip) {
1650 		ret = ENOENT;
1651 		(void) fprintf(stderr,
1652 		    gettext("Error, initiator %s not found"),
1653 		    ini);
1654 		(void) fprintf(stderr, "\n");
1655 	}
1656 
1657 	if ((ret == 0) && nvp) {
1658 		ret = it_ini_setprop(inip, proplist, &errlist);
1659 
1660 		if (ret != 0) {
1661 			(void) fprintf(stderr,
1662 			    gettext("Error setting initiator properties: %d"),
1663 			    ret);
1664 			(void) fprintf(stderr, "\n");
1665 			if (errlist) {
1666 				nvpair_t	*nvp = NULL;
1667 				char		*nn;
1668 				char		*nv;
1669 
1670 				while ((nvp = nvlist_next_nvpair(errlist, nvp))
1671 				    != NULL) {
1672 					nv = NULL;
1673 
1674 					nn = nvpair_name(nvp);
1675 					(void) nvpair_value_string(nvp, &nv);
1676 
1677 					if (nv != NULL) {
1678 						(void) fprintf(stderr,
1679 						    "\t%s: %s\n", nn, nv);
1680 					}
1681 				}
1682 
1683 				nvlist_free(errlist);
1684 			}
1685 		}
1686 	}
1687 
1688 	if ((ret == 0) && changed) {
1689 		ret = it_config_commit(cfg);
1690 		STMF_STALE(ret);
1691 	}
1692 
1693 	it_config_free(cfg);
1694 
1695 	return (ret);
1696 }
1697 
1698 static int
1699 list_initiator(char *ini, boolean_t verbose, boolean_t script) /* ARGSUSED */
1700 {
1701 	int		ret;
1702 	it_config_t	*cfg;
1703 	it_ini_t	*ptr;
1704 	boolean_t	found = B_FALSE;
1705 	boolean_t	first = B_TRUE;
1706 	char		*isecret;
1707 	char		*iuser;
1708 	char		*sec = "solaris.smf.read.stmf";
1709 
1710 	ITADM_CHKAUTH(sec);
1711 
1712 	ret = it_config_load(&cfg);
1713 	if (ret != 0) {
1714 		output_config_error(ret,
1715 		    gettext("Error retrieving iSCSI target configuration"));
1716 		return (ret);
1717 	}
1718 
1719 	ptr = cfg->config_ini_list;
1720 
1721 	for (; ptr != NULL; ptr = ptr->ini_next) {
1722 		isecret = "unset";
1723 		iuser = "<none>";
1724 
1725 		if (found) {
1726 			break;
1727 		}
1728 
1729 		if (ini) {
1730 			if (strcasecmp(ini, ptr->ini_name) != 0) {
1731 				continue;
1732 			} else {
1733 				found = B_TRUE;
1734 			}
1735 		}
1736 
1737 		if (ptr->ini_properties) {
1738 			if (nvlist_exists(ptr->ini_properties, "chapsecret")) {
1739 				isecret = "set";
1740 			}
1741 			(void) nvlist_lookup_string(ptr->ini_properties,
1742 			    "chapuser", &iuser);
1743 
1744 		}
1745 
1746 		/* there's nothing to print for verbose yet */
1747 		if (!script && first) {
1748 			(void) printf("%-61s%-10s%-7s\n", "INITIATOR NAME",
1749 			    "CHAPUSER", "SECRET");
1750 			first = B_FALSE;
1751 		}
1752 
1753 		if (!script) {
1754 			/*
1755 			 * try not to let columns run into each other.
1756 			 * Stick a tab after too-long fields.
1757 			 * Lengths chosen are for the 'common' cases.
1758 			 */
1759 			(void) printf("%-61s", ptr->ini_name);
1760 
1761 			if (strlen(ptr->ini_name) > 60) {
1762 				(void) printf("\t");
1763 			}
1764 
1765 			(void) printf("%-15s", iuser);
1766 			if (strlen(iuser) >= 15) {
1767 				(void) printf("\t");
1768 			}
1769 
1770 			(void) printf("%-4s", isecret);
1771 		} else {
1772 			(void) printf("%s\t%s\t%s", ptr->ini_name,
1773 			    iuser, isecret);
1774 		}
1775 
1776 		(void) printf("\n");
1777 	}
1778 
1779 	if (ini && (!found)) {
1780 		(void) fprintf(stderr,
1781 		    gettext("Initiator %s not found!"), ini);
1782 		(void) fprintf(stderr, "\n");
1783 		ret = 1;
1784 	}
1785 
1786 	it_config_free(cfg);
1787 
1788 	return (ret);
1789 }
1790 
1791 int
1792 delete_initiator(char *ini)
1793 {
1794 	int		ret;
1795 	it_config_t	*cfg;
1796 	it_ini_t	*ptr;
1797 	char		*sec = "solaris.smf.modify.stmf";
1798 
1799 	ITADM_CHKAUTH(sec);
1800 
1801 	if (!ini) {
1802 		(void) fprintf(stderr, "%s\n",
1803 		    gettext("Error, no initiator specified"));
1804 		return (EINVAL);
1805 	}
1806 
1807 	ret = it_config_load(&cfg);
1808 	if (ret != 0) {
1809 		output_config_error(ret,
1810 		    gettext("Error retrieving iSCSI target configuration"));
1811 		return (ret);
1812 	}
1813 
1814 	ptr = cfg->config_ini_list;
1815 	while (ptr) {
1816 		if (strcasecmp(ptr->ini_name, ini) == 0) {
1817 			break;
1818 		}
1819 
1820 		ptr = ptr->ini_next;
1821 	}
1822 
1823 	if (ptr) {
1824 		it_ini_delete(cfg, ptr);
1825 
1826 		ret = it_config_commit(cfg);
1827 		STMF_STALE(ret);
1828 	} else {
1829 		(void) fprintf(stderr,
1830 		    gettext("Initiator %s not found"), ini);
1831 		(void) fprintf(stderr, "\n");
1832 		ret = 1;
1833 	}
1834 
1835 	return (ret);
1836 }
1837 
1838 static int
1839 modify_defaults(nvlist_t *proplist)
1840 {
1841 	int		ret;
1842 	it_config_t	*cfg;
1843 	nvlist_t	*errlist = NULL;
1844 	nvpair_t	*nvp = NULL;
1845 	char		*sec = "solaris.smf.modify.stmf";
1846 
1847 	ITADM_CHKAUTH(sec);
1848 
1849 	if (proplist) {
1850 		/* make sure at least one property is specified */
1851 		nvp = nvlist_next_nvpair(proplist, nvp);
1852 	}
1853 
1854 	if (nvp == NULL) {
1855 		/* empty list */
1856 		(void) fprintf(stderr, "%s\n",
1857 		    gettext("Error, no properties specified"));
1858 		return (EINVAL);
1859 	}
1860 
1861 	ret = it_config_load(&cfg);
1862 	if (ret != 0) {
1863 		output_config_error(ret,
1864 		    gettext("Error retrieving iSCSI target configuration"));
1865 		return (ret);
1866 	}
1867 
1868 	ret = it_config_setprop(cfg, proplist, &errlist);
1869 	if (ret != 0) {
1870 		(void) fprintf(stderr,
1871 		    gettext("Error setting global properties: %d"),
1872 		    ret);
1873 		(void) fprintf(stderr, "\n");
1874 		if (errlist) {
1875 			nvpair_t	*nvp = NULL;
1876 			char		*nn;
1877 			char		*nv;
1878 
1879 			while ((nvp = nvlist_next_nvpair(errlist, nvp))
1880 			    != NULL) {
1881 				nv = NULL;
1882 
1883 				nn = nvpair_name(nvp);
1884 				(void) nvpair_value_string(nvp, &nv);
1885 
1886 				if (nv != NULL) {
1887 					(void) fprintf(stderr, "\t%s: %s\n",
1888 					    nn, nv);
1889 				}
1890 			}
1891 
1892 			nvlist_free(errlist);
1893 		}
1894 	}
1895 
1896 	if (ret == 0) {
1897 		ret = it_config_commit(cfg);
1898 		STMF_STALE(ret);
1899 	}
1900 
1901 	it_config_free(cfg);
1902 
1903 	return (ret);
1904 }
1905 
1906 static int
1907 list_defaults(boolean_t script)
1908 {
1909 	int		ret;
1910 	it_config_t	*cfg;
1911 	nvlist_t	*nvl;
1912 	char		*alias = "<none>";
1913 	char		*auth = "<none>";
1914 	char		*isns = "disabled";
1915 	char		**isvrs = NULL;
1916 	uint32_t	scount = 0;
1917 	char		*rsvr = "<none>";
1918 	char		*rsecret = "unset";
1919 	boolean_t	val = B_FALSE;
1920 	int		i;
1921 	char		*sec = "solaris.smf.read.stmf";
1922 
1923 	ITADM_CHKAUTH(sec);
1924 
1925 	ret = it_config_load(&cfg);
1926 	if (ret != 0) {
1927 		output_config_error(ret,
1928 		    gettext("Error retrieving iSCSI target configuration"));
1929 		return (ret);
1930 	}
1931 
1932 	nvl = cfg->config_global_properties;
1933 
1934 	/* look up all possible options */
1935 	(void) nvlist_lookup_string(nvl, "alias", &alias);
1936 	(void) nvlist_lookup_string(nvl, "auth", &auth);
1937 	(void) nvlist_lookup_boolean_value(nvl, "isns", &val);
1938 	if (val == B_TRUE) {
1939 		isns = "enabled";
1940 	}
1941 	(void) nvlist_lookup_string_array(nvl, "isnsserver", &isvrs,
1942 	    &scount);
1943 	(void) nvlist_lookup_string(nvl, "radiusserver", &rsvr);
1944 	if (nvlist_exists(nvl, "radiussecret")) {
1945 		rsecret = "set";
1946 	}
1947 
1948 	if (!script) {
1949 		(void) printf("%s:\n\n",
1950 		    gettext("iSCSI Target Default Properties"));
1951 	}
1952 
1953 	if (script) {
1954 		(void) printf("%s\t%s\t%s\t%s\t%s\t",
1955 		    alias, auth, rsvr, rsecret, isns);
1956 	} else {
1957 		(void) printf("%-15s\t%s\n%-15s\t%s\n%-15s\t%s\n%-15s\t%s\n"
1958 		    "%-15s\t%s\n%-15s\t",
1959 		    "alias:", alias, "auth:", auth, "radiusserver:",
1960 		    rsvr, "radiussecret:", rsecret, "isns:", isns,
1961 		    "isnsserver:");
1962 	}
1963 
1964 	for (i = 0; i < scount; i++) {
1965 		if (!isvrs || !isvrs[i]) {
1966 			break;
1967 		}
1968 		if (i > 0) {
1969 			(void) printf(",");
1970 		}
1971 		(void) printf("%s", isvrs[i]);
1972 	}
1973 
1974 	if (i == 0) {
1975 		(void) printf("%s", "<none>");
1976 	}
1977 
1978 	(void) printf("\n");
1979 
1980 	it_config_free(cfg);
1981 
1982 	return (0);
1983 }
1984 
1985 static int
1986 itadm_get_password(nvlist_t *nvl, char *key, char *passfile,
1987     char *phrase)
1988 {
1989 	int		ret = 0;
1990 	char		*pass;
1991 	char		buf[1024];
1992 	int		fd;
1993 	struct stat64	sbuf;
1994 	size_t		rd;
1995 
1996 	if (!nvl || !key) {
1997 		return (EINVAL);
1998 	}
1999 
2000 	if (passfile) {
2001 		ret = stat64(passfile, &sbuf);
2002 		if ((ret != 0) || (!S_ISREG(sbuf.st_mode))) {
2003 			(void) fprintf(stderr,
2004 			    gettext("Invalid secret file %s"),
2005 			    passfile);
2006 			(void) fprintf(stderr, "\n");
2007 			return (EBADF);
2008 		}
2009 
2010 		fd = open64(passfile, O_RDONLY);
2011 		if (fd == -1) {
2012 			ret = errno;
2013 			(void) fprintf(stderr,
2014 			    gettext("Could not open secret file %s: "),
2015 			    passfile);
2016 			output_config_error(ret, NULL);
2017 			return (ret);
2018 		}
2019 
2020 		rd = read(fd, buf, sbuf.st_size);
2021 		(void) close(fd);
2022 
2023 		if (rd != sbuf.st_size) {
2024 			ret = EIO;
2025 			(void) fprintf(stderr,
2026 			    gettext("Could not read secret file %s: "),
2027 			    passfile);
2028 			output_config_error(ret, NULL);
2029 			return (ret);
2030 		}
2031 
2032 		/* ensure buf is properly terminated */
2033 		buf[rd] = '\0';
2034 
2035 		/* if last char is a newline, strip it off */
2036 		if (buf[rd - 1] == '\n') {
2037 			buf[rd - 1] = '\0';
2038 		}
2039 
2040 		/* validate length */
2041 		if ((strlen(buf) > 255) || (strlen(buf) < 12)) {
2042 			(void) fprintf(stderr, "%s\n",
2043 			    gettext(
2044 			    "Secret must be between 12 and 255 characters"));
2045 			return (EINVAL);
2046 		}
2047 	} else {
2048 		/* prompt for secret */
2049 		if (!phrase) {
2050 			return (EINVAL);
2051 		}
2052 
2053 		pass = getpassphrase(phrase);
2054 		if (!pass) {
2055 			ret = errno;
2056 			output_config_error(ret,
2057 			    gettext("Could not read secret"));
2058 			return (ret);
2059 		}
2060 
2061 		/* validate length */
2062 		if ((strlen(pass) > 255) || (strlen(pass) < 12)) {
2063 			(void) fprintf(stderr, "%s\n",
2064 			    gettext(
2065 			    "Secret must be between 12 and 255 characters"));
2066 			return (EINVAL);
2067 		}
2068 
2069 		(void) strlcpy(buf, pass, sizeof (buf));
2070 
2071 		/* confirm entered secret */
2072 		pass = getpassphrase(gettext("Re-enter secret: "));
2073 		if (!pass) {
2074 			ret = errno;
2075 			output_config_error(ret,
2076 			    gettext("Could not read secret"));
2077 			return (ret);
2078 		}
2079 
2080 		if (strcmp(buf, pass) != 0) {
2081 			ret = EINVAL;
2082 			(void) fprintf(stderr, "%s\n",
2083 			    gettext("Secret validation failed"));
2084 			return (ret);
2085 		}
2086 
2087 	}
2088 
2089 	ret = nvlist_add_string(nvl, key, buf);
2090 
2091 	return (ret);
2092 }
2093 
2094 static int
2095 itadm_opt_to_arr(nvlist_t *nvl, char *key, char *opt, uint32_t *num)
2096 {
2097 	int		count;
2098 	char		*bufp;
2099 	char		**arr;
2100 
2101 	if (!opt || !key || !nvl) {
2102 		return (EINVAL);
2103 	}
2104 
2105 	bufp = opt;
2106 	count = 1;
2107 
2108 	for (;;) {
2109 		bufp = strchr(bufp, ',');
2110 		if (!bufp) {
2111 			break;
2112 		}
2113 		bufp++;
2114 		count++;
2115 	}
2116 
2117 	arr = calloc(count, sizeof (char *));
2118 	if (!arr) {
2119 		return (ENOMEM);
2120 	}
2121 
2122 	bufp = opt;
2123 	/* set delimiter to comma */
2124 	(void) bufsplit(",", 0, NULL);
2125 
2126 	/* split up that buf! */
2127 	(void) bufsplit(bufp, count, arr);
2128 
2129 	/* if requested, return the number of array members found */
2130 	if (num) {
2131 		*num = count;
2132 	}
2133 
2134 	return (nvlist_add_string_array(nvl, key, arr, count));
2135 }
2136 
2137 static void
2138 tag_name_to_num(char *tagname, uint16_t *tagnum)
2139 {
2140 	ulong_t		id;
2141 	char		*ptr = NULL;
2142 
2143 	if (!tagname || !tagnum) {
2144 		return;
2145 	}
2146 
2147 	*tagnum = 0;
2148 
2149 	id = strtoul(tagname, &ptr, 10);
2150 
2151 	/* Must be entirely numeric and in-range */
2152 	if (ptr && (*ptr != '\0')) {
2153 		return;
2154 	}
2155 
2156 	if ((id <= UINT16_MAX) && (id > 1)) {
2157 		*tagnum = (uint16_t)id;
2158 	}
2159 }
2160 
2161 /*
2162  * Print error messages to stderr for errnos and expected stmf errors.
2163  * This function should generally not be used for cases where the
2164  * calling code can generate a more detailed error message based on
2165  * the contextual knowledge of the meaning of specific errors.
2166  */
2167 static void
2168 output_config_error(int error, char *msg)
2169 {
2170 
2171 	if (msg) {
2172 		(void) fprintf(stderr, "%s: ", msg);
2173 	}
2174 
2175 	if (error & STMF_STATUS_ERROR) {
2176 		switch (error) {
2177 		case STMF_ERROR_PERM:
2178 			(void) fprintf(stderr, "%s",
2179 			    gettext("permission denied"));
2180 			break;
2181 		case STMF_ERROR_BUSY:
2182 			(void) fprintf(stderr, "%s",
2183 			    gettext("resource busy"));
2184 			break;
2185 		case STMF_ERROR_NOMEM:
2186 			(void) fprintf(stderr, "%s",
2187 			    gettext("out of memory"));
2188 			break;
2189 		case STMF_ERROR_SERVICE_NOT_FOUND:
2190 			(void) fprintf(stderr, "%s",
2191 			    gettext("STMF service not found"));
2192 			break;
2193 		case STMF_ERROR_SERVICE_DATA_VERSION:
2194 			(void) fprintf(stderr, "%s",
2195 			    gettext("STMF service version incorrect"));
2196 			break;
2197 		case STMF_ERROR_PROV_DATA_STALE:
2198 			(void) fprintf(stderr, "%s",
2199 			    gettext("Configuration changed during processing. "
2200 			    "Check the configuration, then retry this "
2201 			    "command if appropriate."));
2202 			break;
2203 		default:
2204 			(void) fprintf(stderr, "%s", gettext("unknown error"));
2205 			break;
2206 		}
2207 	} else {
2208 		char buf[80] = "";
2209 
2210 		(void) strerror_r(error, buf, sizeof (buf));
2211 		(void) fprintf(stderr, "%s", buf);
2212 	}
2213 
2214 	(void) fprintf(stderr, "\n");
2215 }
2216