xref: /titanic_50/usr/src/cmd/svc/svccfg/svccfg_engine.c (revision 3c112a2b34403220c06c3e2fcac403358cfba168)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 
22 /*
23  *  Copyright (c) 2004, 2010, Oracle and/or its affiliates. All rights reserved.
24  */
25 
26 
27 /*
28  * svccfg(1) interpreter and command execution engine.
29  */
30 
31 #include <sys/mman.h>
32 #include <sys/stat.h>
33 #include <sys/types.h>
34 #include <assert.h>
35 #include <errno.h>
36 #include <fcntl.h>
37 #include <libintl.h>
38 #include <libtecla.h>
39 #include <md5.h>
40 #include <string.h>
41 #include <stdlib.h>
42 #include <unistd.h>
43 
44 #include "manifest_find.h"
45 #include "manifest_hash.h"
46 #include "svccfg.h"
47 
48 #define	MS_PER_US		1000
49 
50 engine_state_t *est;
51 
52 /*
53  * Replacement lex(1) character retrieval routines.
54  */
55 int
56 engine_cmd_getc(engine_state_t *E)
57 {
58 	if (E->sc_cmd_file != NULL)
59 		return (getc(E->sc_cmd_file));
60 
61 	if (E->sc_cmd_flags & SC_CMD_EOF)
62 		return (EOF);
63 
64 	if (E->sc_cmd_bufoff < E->sc_cmd_bufsz)
65 		return (*(E->sc_cmd_buf + E->sc_cmd_bufoff++));
66 
67 	if (!(E->sc_cmd_flags & SC_CMD_IACTIVE)) {
68 		E->sc_cmd_flags |= SC_CMD_EOF;
69 
70 		return (EOF);
71 	} else {
72 #ifdef NATIVE_BUILD
73 		return (EOF);
74 #else
75 		extern int parens;
76 
77 		if (parens <= 0) {
78 			E->sc_cmd_flags |= SC_CMD_EOF;
79 			return (EOF);
80 		}
81 
82 		for (;;) {
83 			E->sc_cmd_buf = gl_get_line(E->sc_gl, "> ", NULL, -1);
84 			if (E->sc_cmd_buf != NULL)
85 				break;
86 
87 			switch (gl_return_status(E->sc_gl)) {
88 			case GLR_SIGNAL:
89 				gl_abandon_line(E->sc_gl);
90 				continue;
91 
92 			case GLR_EOF:
93 				E->sc_cmd_flags |= SC_CMD_EOF;
94 				return (EOF);
95 
96 			case GLR_ERROR:
97 				uu_die(gettext("Error reading terminal: %s.\n"),
98 				    gl_error_message(E->sc_gl, NULL, 0));
99 				/* NOTREACHED */
100 
101 			default:
102 #ifndef NDEBUG
103 				(void) fprintf(stderr, "%s:%d: gl_get_line() "
104 				    "returned unexpected value %d.\n", __FILE__,
105 				    __LINE__, gl_return_status(E->sc_gl));
106 #endif
107 				abort();
108 			}
109 		}
110 
111 		E->sc_cmd_bufsz = strlen(E->sc_cmd_buf);
112 		E->sc_cmd_bufoff = 1;
113 
114 		return (E->sc_cmd_buf[0]);
115 #endif	/* NATIVE_BUILD */
116 	}
117 }
118 
119 int
120 engine_cmd_ungetc(engine_state_t *E, char c)
121 {
122 	if (E->sc_cmd_file != NULL)
123 		return (ungetc(c, E->sc_cmd_file));
124 
125 	if (E->sc_cmd_buf != NULL)
126 		*(E->sc_cmd_buf + --E->sc_cmd_bufoff) = c;
127 
128 	return (c);
129 }
130 
131 /*ARGSUSED*/
132 void
133 engine_cmd_nputs(engine_state_t *E, char *c, size_t n)
134 {
135 	/* our lexer shouldn't need this state */
136 	exit(11);
137 }
138 
139 int
140 engine_exec(char *cmd)
141 {
142 	est->sc_cmd_buf = cmd;
143 	est->sc_cmd_bufsz = strlen(cmd) + 1;
144 	est->sc_cmd_bufoff = 0;
145 
146 	(void) yyparse();
147 
148 	return (0);
149 }
150 
151 #ifndef NATIVE_BUILD
152 /* ARGSUSED */
153 static
154 CPL_CHECK_FN(check_xml)
155 {
156 	const char *ext;
157 
158 	if (strlen(pathname) < 4)
159 		return (0);
160 
161 	ext = pathname + strlen(pathname) - 4;
162 
163 	return (strcmp(ext, ".xml") == 0 ? 1 : 0);
164 }
165 
166 static const char * const whitespace = " \t";
167 
168 static
169 CPL_MATCH_FN(complete_single_xml_file_arg)
170 {
171 	const char *arg1 = data;
172 	int arg1end_i, ret;
173 	CplFileConf *cfc;
174 
175 	arg1end_i = arg1 + strcspn(arg1, whitespace) - line;
176 	if (arg1end_i < word_end)
177 		return (0);
178 
179 	cfc = new_CplFileConf();
180 	if (cfc == NULL) {
181 		cpl_record_error(cpl, "Out of memory.");
182 		return (1);
183 	}
184 
185 	cfc_set_check_fn(cfc, check_xml, NULL);
186 
187 	ret = cpl_file_completions(cpl, cfc, line, word_end);
188 
189 	(void) del_CplFileConf(cfc);
190 	return (ret);
191 }
192 
193 static struct cmd_info {
194 	const char	*name;
195 	uint32_t	flags;
196 	CplMatchFn	*complete_args_f;
197 } cmds[] = {
198 	{ "validate", CS_GLOBAL, complete_single_xml_file_arg },
199 	{ "import", CS_GLOBAL, complete_single_xml_file_arg },
200 	{ "cleanup", CS_GLOBAL, NULL},
201 	{ "export", CS_GLOBAL, NULL },
202 	{ "archive", CS_GLOBAL, NULL },
203 	{ "apply", CS_GLOBAL, complete_single_xml_file_arg },
204 	{ "extract", CS_GLOBAL, NULL },
205 	{ "repository", CS_GLOBAL, NULL },
206 	{ "inventory", CS_GLOBAL, complete_single_xml_file_arg },
207 	{ "set", CS_GLOBAL, NULL },
208 	{ "end", CS_GLOBAL, NULL },
209 	{ "exit", CS_GLOBAL, NULL },
210 	{ "quit", CS_GLOBAL, NULL },
211 	{ "help", CS_GLOBAL, NULL },
212 	{ "delete", CS_GLOBAL, NULL },
213 	{ "select", CS_GLOBAL, complete_select },
214 	{ "unselect", CS_SVC | CS_INST | CS_SNAP, NULL },
215 	{ "list", CS_SCOPE | CS_SVC | CS_SNAP, NULL },
216 	{ "add", CS_SCOPE | CS_SVC, NULL },
217 	{ "listpg", CS_SVC | CS_INST | CS_SNAP, NULL },
218 	{ "addpg", CS_SVC | CS_INST, NULL },
219 	{ "delpg", CS_SVC | CS_INST, NULL },
220 	{ "delhash", CS_GLOBAL, complete_single_xml_file_arg },
221 	{ "listprop", CS_SVC | CS_INST | CS_SNAP, NULL },
222 	{ "setprop", CS_SVC | CS_INST, NULL },
223 	{ "delprop", CS_SVC | CS_INST, NULL },
224 	{ "editprop", CS_SVC | CS_INST, NULL },
225 	{ "describe", CS_SVC | CS_INST | CS_SNAP, NULL },
226 	{ "listsnap", CS_INST | CS_SNAP, NULL },
227 	{ "selectsnap", CS_INST | CS_SNAP, NULL },
228 	{ "revert", CS_INST | CS_SNAP, NULL },
229 	{ "refresh", CS_INST, NULL },
230 	{ NULL }
231 };
232 
233 int
234 add_cmd_matches(WordCompletion *cpl, const char *line, int word_end,
235     uint32_t scope)
236 {
237 	int word_start, err;
238 	size_t len;
239 	const char *bol;
240 	struct cmd_info *cip;
241 
242 	word_start = strspn(line, whitespace);
243 	len = word_end - word_start;
244 	bol = line + word_end - len;
245 
246 	for (cip = cmds; cip->name != NULL; ++cip) {
247 		if ((cip->flags & scope) == 0)
248 			continue;
249 
250 		if (strncmp(cip->name, bol, len) == 0) {
251 			err = cpl_add_completion(cpl, line, word_start,
252 			    word_end, cip->name + len, "", " ");
253 			if (err != 0)
254 				return (err);
255 		}
256 	}
257 
258 	return (0);
259 }
260 
261 /*
262  * Suggest completions.  We must first determine if the cursor is in command
263  * position or in argument position.  If the former, complete_command() finds
264  * matching commands.  If the latter, we tail-call the command-specific
265  * argument-completion routine in the cmds table.
266  */
267 /* ARGSUSED */
268 static
269 CPL_MATCH_FN(complete)
270 {
271 	const char *arg0, *arg1;
272 	size_t arg0len;
273 	struct cmd_info *cip;
274 
275 	arg0 = line + strspn(line, whitespace);
276 	arg0len = strcspn(arg0, whitespace);
277 	if ((arg0 + arg0len) - line >= word_end ||
278 	    (arg0[arg0len] != ' ' && arg0[arg0len] != '\t'))
279 		return (complete_command(cpl, (void *)arg0, line, word_end));
280 
281 	arg1 = arg0 + arg0len;
282 	arg1 += strspn(arg1, whitespace);
283 
284 	for (cip = cmds; cip->name != NULL; ++cip) {
285 		if (strlen(cip->name) != arg0len)
286 			continue;
287 
288 		if (strncmp(cip->name, arg0, arg0len) != 0)
289 			continue;
290 
291 		if (cip->complete_args_f == NULL)
292 			break;
293 
294 		return (cip->complete_args_f(cpl, (void *)arg1, line,
295 		    word_end));
296 	}
297 
298 	return (0);
299 }
300 #endif	/* NATIVE_BUILD */
301 
302 int
303 engine_interp()
304 {
305 #ifdef NATIVE_BUILD
306 	uu_die("native build does not support interactive mode.");
307 #else
308 	char *selfmri;
309 	size_t sfsz;
310 	int r;
311 
312 	extern int parens;
313 
314 	(void) sigset(SIGINT, SIG_IGN);
315 
316 	est->sc_gl = new_GetLine(512, 8000);
317 	if (est->sc_gl == NULL)
318 		uu_die(gettext("Out of memory.\n"));
319 
320 	/* The longest string is "[snapname]fmri[:instname]> ". */
321 	sfsz = 1 + max_scf_name_len + 1 + max_scf_fmri_len + 2 +
322 	    max_scf_name_len + 1 + 2 + 1;
323 	selfmri = safe_malloc(sfsz);
324 
325 	r = gl_customize_completion(est->sc_gl, NULL, complete);
326 	assert(r == 0);
327 
328 	for (;;) {
329 		lscf_get_selection_str(selfmri, sfsz - 2);
330 		(void) strcat(selfmri, "> ");
331 		est->sc_cmd_buf = gl_get_line(est->sc_gl, selfmri, NULL, -1);
332 
333 		if (est->sc_cmd_buf == NULL) {
334 			switch (gl_return_status(est->sc_gl)) {
335 			case GLR_SIGNAL:
336 				gl_abandon_line(est->sc_gl);
337 				continue;
338 
339 			case GLR_EOF:
340 				break;
341 
342 			case GLR_ERROR:
343 				uu_die(gettext("Error reading terminal: %s.\n"),
344 				    gl_error_message(est->sc_gl, NULL, 0));
345 				/* NOTREACHED */
346 
347 			default:
348 #ifndef NDEBUG
349 				(void) fprintf(stderr, "%s:%d: gl_get_line() "
350 				    "returned unexpected value %d.\n", __FILE__,
351 				    __LINE__, gl_return_status(est->sc_gl));
352 #endif
353 				abort();
354 			}
355 
356 			break;
357 		}
358 
359 		parens = 0;
360 		est->sc_cmd_bufsz = strlen(est->sc_cmd_buf);
361 		est->sc_cmd_bufoff = 0;
362 		est->sc_cmd_flags = SC_CMD_IACTIVE;
363 
364 		(void) yyparse();
365 	}
366 
367 	free(selfmri);
368 	est->sc_gl = del_GetLine(est->sc_gl);	/* returns NULL */
369 
370 #endif	/* NATIVE_BUILD */
371 	return (0);
372 }
373 
374 int
375 engine_source(const char *name, boolean_t dont_exit)
376 {
377 	engine_state_t *old = est;
378 	struct stat st;
379 	int ret;
380 
381 	est = uu_zalloc(sizeof (engine_state_t));
382 
383 	/* first, copy the stuff set up in engine_init */
384 	est->sc_repo_pid = old->sc_repo_pid;
385 	if (old->sc_repo_filename != NULL)
386 		est->sc_repo_filename = safe_strdup(old->sc_repo_filename);
387 	if (old->sc_repo_doordir != NULL)
388 		est->sc_repo_doordir = safe_strdup(old->sc_repo_doordir);
389 	if (old->sc_repo_doorname != NULL)
390 		est->sc_repo_doorname = safe_strdup(old->sc_repo_doorname);
391 	if (old->sc_repo_server != NULL)
392 		est->sc_repo_server = safe_strdup(old->sc_repo_server);
393 
394 	/* set up the new guy */
395 	est->sc_cmd_lineno = 1;
396 
397 	if (dont_exit)
398 		est->sc_cmd_flags |= SC_CMD_DONT_EXIT;
399 
400 	if (strcmp(name, "-") == 0) {
401 		est->sc_cmd_file = stdin;
402 		est->sc_cmd_filename = "<stdin>";
403 	} else {
404 		errno = 0;
405 		est->sc_cmd_filename = name;
406 		est->sc_cmd_file = fopen(name, "r");
407 		if (est->sc_cmd_file == NULL) {
408 			if (errno == 0)
409 				semerr(gettext("No free stdio streams.\n"));
410 			else
411 				semerr(gettext("Could not open %s"), name);
412 
413 			ret = -1;
414 			goto fail;
415 		}
416 
417 		do {
418 			ret = fstat(fileno(est->sc_cmd_file), &st);
419 		} while (ret != 0 && errno == EINTR);
420 		if (ret != 0) {
421 			(void) fclose(est->sc_cmd_file);
422 			est->sc_cmd_file = NULL;	/* for semerr() */
423 
424 			semerr(gettext("Could not stat %s"), name);
425 
426 			ret = -1;
427 			goto fail;
428 		}
429 
430 		if (!S_ISREG(st.st_mode)) {
431 			(void) fclose(est->sc_cmd_file);
432 			est->sc_cmd_file = NULL;	/* for semerr() */
433 
434 			semerr(gettext("%s is not a regular file.\n"), name);
435 
436 			ret = -1;
437 			goto fail;
438 		}
439 	}
440 
441 	(void) yyparse();
442 
443 	if (est->sc_cmd_file != stdin)
444 		(void) fclose(est->sc_cmd_file);
445 
446 	ret = 0;
447 
448 fail:
449 	if (est->sc_repo_pid != old->sc_repo_pid)
450 		lscf_cleanup();		/* clean up any new repository */
451 
452 	if (est->sc_repo_filename != NULL)
453 		free((void *)est->sc_repo_filename);
454 	if (est->sc_repo_doordir != NULL)
455 		free((void *)est->sc_repo_doordir);
456 	if (est->sc_repo_doorname != NULL)
457 		free((void *)est->sc_repo_doorname);
458 	if (est->sc_repo_server != NULL)
459 		free((void *)est->sc_repo_server);
460 	free(est);
461 
462 	est = old;
463 
464 	return (ret);
465 }
466 
467 /*
468  * Initialize svccfg state.  We recognize four environment variables:
469  *
470  * SVCCFG_REPOSITORY	Create a private instance of svc.configd(1M) to answer
471  *			requests for the specified repository file.
472  * SVCCFG_DOOR_PATH	Directory for door creation.
473  *
474  * SVCCFG_DOOR		Rendezvous via an alternative repository door.
475  *
476  * SVCCFG_CONFIGD_PATH	Resolvable path to alternative svc.configd(1M) binary.
477  */
478 void
479 engine_init()
480 {
481 	const char *cp;
482 
483 	est = uu_zalloc(sizeof (engine_state_t));
484 
485 	est->sc_cmd_lineno = 1;
486 	est->sc_repo_pid = -1;
487 
488 	cp = getenv("SVCCFG_REPOSITORY");
489 	est->sc_repo_filename = cp ? safe_strdup(cp) : NULL;
490 
491 	cp = getenv("SVCCFG_DOOR_PATH");
492 	est->sc_repo_doordir = cp ? cp : "/var/run";
493 
494 	cp = getenv("SVCCFG_DOOR");
495 	if (cp != NULL) {
496 		if (est->sc_repo_filename != NULL) {
497 			uu_warn(gettext("SVCCFG_DOOR unused when "
498 			    "SVCCFG_REPOSITORY specified\n"));
499 		} else {
500 			est->sc_repo_doorname = safe_strdup(cp);
501 		}
502 	}
503 
504 	cp = getenv("SVCCFG_CONFIGD_PATH");
505 	est->sc_repo_server = cp ? cp : "/lib/svc/bin/svc.configd";
506 
507 	est->sc_miss_type = B_FALSE;
508 	est->sc_in_emi = 0;
509 	cp = getenv("SMF_FMRI");
510 	if ((cp != NULL) && (strcmp(cp, SCF_INSTANCE_EMI) == 0))
511 		est->sc_in_emi = 1;
512 
513 	cp = smf_get_state(SCF_INSTANCE_FS_MINIMAL);
514 	if (cp && (strcmp(cp, SCF_STATE_STRING_ONLINE) == 0))
515 		est->sc_fs_minimal = B_TRUE;
516 	free((void *) cp);
517 }
518 
519 static int
520 import_manifest_file(manifest_info_t *info, boolean_t validate, FILE *pout,
521     uint_t flags)
522 {
523 	bundle_t *b;
524 	tmpl_errors_t *errs;
525 	const char *file;
526 	tmpl_validate_status_t vr;
527 
528 	file = info->mi_path;
529 
530 	/* Load the manifest */
531 	b = internal_bundle_new();
532 
533 	if (lxml_get_bundle_file(b, file, SVCCFG_OP_IMPORT) != 0) {
534 		internal_bundle_free(b);
535 		return (-1);
536 	}
537 
538 	/* Validate */
539 	if ((vr = tmpl_validate_bundle(b, &errs)) != TVS_SUCCESS) {
540 		char *prefix;
541 
542 		if ((validate == 0) || (vr == TVS_WARN)) {
543 			prefix = gettext("Warning: ");
544 		} else {
545 			prefix = "";
546 		}
547 		tmpl_errors_print(stderr, errs, prefix);
548 		if (validate && (vr != TVS_WARN)) {
549 			tmpl_errors_destroy(errs);
550 			semerr(gettext("Import of %s failed.\n"),
551 			    info->mi_path);
552 			if (pout != NULL) {
553 				(void) fprintf(pout, gettext("WARNING: svccfg "
554 				    "import of %s failed.\n"), info->mi_path);
555 			}
556 
557 			return (-1);
558 		}
559 	}
560 	tmpl_errors_destroy(errs);
561 
562 	/* Import */
563 	if (lscf_bundle_import(b, file, flags) != 0) {
564 		internal_bundle_free(b);
565 		semerr(gettext("Import of %s failed.\n"), info->mi_path);
566 		if (pout != NULL) {
567 			(void) fprintf(pout, gettext("WARNING: svccfg import "
568 			    "of %s failed.\n"), info->mi_path);
569 		}
570 		return (-1);
571 	}
572 
573 	internal_bundle_free(b);
574 
575 	if (info->mi_prop) {
576 		char *errstr;
577 
578 		if (mhash_store_entry(g_hndl, info->mi_prop, file,
579 		    info->mi_hash, APPLY_NONE, &errstr)) {
580 			if (errstr)
581 				semerr(gettext("Could not store hash for %s. "
582 				    "%s\n"), info->mi_path, errstr);
583 			else
584 				semerr(gettext("Unknown error from "
585 				    "mhash_store_entry() for %s\n"),
586 				    info->mi_path);
587 		}
588 
589 	}
590 
591 	return (0);
592 }
593 
594 /*
595  * Return values:
596  *	1	No manifests need to be imported.
597  *	0	Success
598  *	-1	Error
599  *	-2	Syntax error
600  */
601 int
602 engine_import(uu_list_t *args)
603 {
604 	int argc, i, o;
605 	int dont_exit;
606 	int failed_manifests;
607 	int total_manifests;
608 	char *file;
609 	char **argv = NULL;
610 	string_list_t *slp;
611 	boolean_t validate = B_FALSE;
612 	uint_t flags = SCI_GENERALLAST;
613 	int dirarg = 0;
614 	int isdir;
615 	int rc = -1;
616 	struct stat sb;
617 	char **paths;
618 	manifest_info_t ***manifest_sets = NULL;
619 	manifest_info_t **manifests;
620 	char *progress_file = NULL;
621 	FILE *progress_out = NULL;
622 	int progress_count;
623 	int back_count;
624 	int count;
625 	int fm_flags;
626 
627 	argc = uu_list_numnodes(args);
628 	if (argc < 1)
629 		return (-2);
630 
631 	argv = calloc(argc + 1, sizeof (char *));
632 	if (argv == NULL)
633 		uu_die(gettext("Out of memory.\n"));
634 
635 	for (slp = uu_list_first(args), i = 0;
636 	    slp != NULL;
637 	    slp = uu_list_next(args, slp), ++i)
638 		argv[i] = slp->str;
639 
640 	argv[i] = NULL;
641 
642 	opterr = 0;
643 	optind = 0;				/* Remember, no argv[0]. */
644 	for (;;) {
645 		o = getopt(argc, argv, "np:V");
646 		if (o == -1)
647 			break;
648 
649 		switch (o) {
650 		case 'n':
651 			flags |= SCI_NOREFRESH;
652 			break;
653 
654 		case 'p':
655 			progress_file = optarg;
656 			break;
657 
658 		case 'V':
659 			validate = B_TRUE;
660 			break;
661 
662 		case '?':
663 			free(argv);
664 			return (-2);
665 
666 		default:
667 			bad_error("getopt", o);
668 		}
669 	}
670 
671 	argc -= optind;
672 	if (argc < 1) {
673 		free(argv);
674 		return (-2);
675 	}
676 
677 	/* Open device for progress messages */
678 	if (progress_file != NULL) {
679 		if (strcmp(progress_file, "-") == 0) {
680 			progress_out = stdout;
681 		} else {
682 			progress_out = fopen(progress_file, "w");
683 			if (progress_out == NULL) {
684 				semerr(gettext("Unable to open %s for "
685 				    "progress reporting.  %s\n"),
686 				    progress_file, strerror(errno));
687 				goto out;
688 			}
689 			setbuf(progress_out, NULL);
690 		}
691 	}
692 
693 	paths = argv+optind;
694 	manifest_sets = safe_malloc(argc * sizeof (*manifest_sets));
695 
696 	/* If we're in interactive mode, force strict validation. */
697 	if (est->sc_cmd_flags & SC_CMD_IACTIVE)
698 		validate = B_TRUE;
699 
700 	lscf_prep_hndl();
701 
702 	/* Determine which manifests must be imported. */
703 
704 	total_manifests = 0;
705 	for (i = 0; i < argc; i++) {
706 		file = *(paths + i);
707 		fm_flags = CHECKHASH;
708 
709 		/* Determine if argument is a directory or file. */
710 		if (stat(file, &sb) == -1) {
711 			semerr(gettext("Unable to stat file %s.  %s\n"), file,
712 			    strerror(errno));
713 			goto out;
714 		}
715 		if (sb.st_mode & S_IFDIR) {
716 			fm_flags |= CHECKEXT;
717 			dirarg = 1;
718 			isdir = 1;
719 		} else if (sb.st_mode & S_IFREG) {
720 			isdir = 0;
721 		} else {
722 			semerr(gettext("%s is not a directory or regular "
723 			    "file\n"), file);
724 			goto out;
725 		}
726 
727 		/* Get list of manifests that we should import for this path. */
728 		if ((count = find_manifests(file, &manifests, fm_flags)) < 0) {
729 			if (isdir) {
730 				semerr(gettext("Could not hash directory %s\n"),
731 				    file);
732 			} else {
733 				semerr(gettext("Could not hash file %s\n"),
734 				    file);
735 			}
736 			free_manifest_array(manifests);
737 			goto out;
738 		}
739 		total_manifests += count;
740 		manifest_sets[i] = manifests;
741 	}
742 
743 	if (total_manifests == 0) {
744 		/* No manifests to process. */
745 		if (g_verbose) {
746 			warn(gettext("No changes were necessary\n"));
747 		}
748 		rc = 1;
749 		goto out;
750 	}
751 
752 	/*
753 	 * If we're processing more than one file, we don't want to exit if
754 	 * we encounter an error.  We should go ahead and process all of
755 	 * the manifests.
756 	 */
757 	dont_exit = est->sc_cmd_flags & SC_CMD_DONT_EXIT;
758 	if (total_manifests > 1)
759 		est->sc_cmd_flags |= SC_CMD_DONT_EXIT;
760 
761 	if (progress_out != NULL)
762 		(void) fprintf(progress_out,
763 		    "Loading smf(5) service descriptions: ");
764 
765 	failed_manifests = 0;
766 	progress_count = 0;
767 	for (i = 0; i < argc; i++) {
768 		manifests = manifest_sets[i];
769 		if (manifests == NULL)
770 			continue;
771 		for (; *manifests != NULL; manifests++) {
772 			progress_count++;
773 			if (progress_out != NULL) {
774 				back_count = fprintf(progress_out, "%d/%d",
775 				    progress_count, total_manifests);
776 				while (back_count-- > 0) {
777 					(void) fputc('\b', progress_out);
778 				}
779 			}
780 			if (import_manifest_file(*manifests, validate,
781 			    progress_out, flags) != 0) {
782 				failed_manifests++;
783 			}
784 		}
785 	}
786 	if (progress_out != NULL)
787 		(void) fputc('\n', progress_out);
788 
789 	if ((total_manifests > 1) && (dont_exit == 0))
790 		est->sc_cmd_flags &= ~SC_CMD_DONT_EXIT;
791 
792 	if (dirarg && total_manifests > 0) {
793 		char *msg;
794 
795 		msg = "Loaded %d smf(5) service descriptions\n";
796 		warn(gettext(msg), progress_count);
797 
798 		if (failed_manifests) {
799 			msg = "%d smf(5) service descriptions failed to load\n";
800 			warn(gettext(msg), failed_manifests);
801 		}
802 	}
803 
804 	if (failed_manifests > 0)
805 		goto out;
806 
807 	if (g_verbose)
808 		warn(gettext("Successful import.\n"));
809 	rc = 0;
810 
811 out:
812 	if ((progress_out != NULL) && (progress_out != stdout))
813 		(void) fclose(progress_out);
814 	free(argv);
815 	if (manifest_sets != NULL) {
816 		for (i = 0; i < argc; i++) {
817 			free_manifest_array(manifest_sets[i]);
818 		}
819 		free(manifest_sets);
820 	}
821 	return (rc);
822 }
823 
824 /*
825  * Walk each service and get its manifest file.
826  *
827  * If the file exists check instance support, and cleanup any
828  * stale instances.
829  *
830  * If the file doesn't exist tear down the service and/or instances
831  * that are no longer supported by files.
832  */
833 int
834 engine_cleanup(int flags)
835 {
836 	boolean_t		activity = B_TRUE;
837 	int			r = -1;
838 
839 	lscf_prep_hndl();
840 
841 	if (flags == 1) {
842 		activity = B_FALSE;
843 	}
844 
845 	if (scf_walk_fmri(g_hndl, 0, NULL, SCF_WALK_SERVICE|SCF_WALK_NOINSTANCE,
846 	    lscf_service_cleanup, (void *)activity, NULL,
847 	    uu_warn) == SCF_SUCCESS)
848 		r = 0;
849 
850 	(void) lscf_hash_cleanup();
851 
852 	return (r);
853 }
854 
855 static int
856 apply_profile(manifest_info_t *info, int apply_changes)
857 {
858 	bundle_t *b = internal_bundle_new();
859 
860 	if (lxml_get_bundle_file(b, info->mi_path, SVCCFG_OP_APPLY) != 0) {
861 		internal_bundle_free(b);
862 		return (-1);
863 	}
864 
865 	if (!apply_changes) {	/* we don't want to apply, just test */
866 		internal_bundle_free(b);
867 		return (0);
868 	}
869 
870 	if (lscf_bundle_apply(b, info->mi_path) != 0) {
871 		internal_bundle_free(b);
872 		return (-1);
873 	}
874 
875 	internal_bundle_free(b);
876 
877 	if (info->mi_prop) {
878 		apply_action_t apply;
879 		char *errstr;
880 
881 		apply = (est->sc_in_emi == 1) ? APPLY_LATE : APPLY_NONE;
882 		if (mhash_store_entry(g_hndl, info->mi_prop, info->mi_path,
883 		    info->mi_hash, apply, &errstr)) {
884 			semerr(errstr);
885 		}
886 	}
887 
888 	return (0);
889 }
890 
891 int
892 engine_apply(const char *file, int apply_changes)
893 {
894 	int rc = 0;
895 	int isdir;
896 	int dont_exit;
897 	int profile_count;
898 	int fm_flags;
899 	struct stat sb;
900 	manifest_info_t **profiles = NULL;
901 	manifest_info_t **entry;
902 	manifest_info_t *pfile;
903 
904 	lscf_prep_hndl();
905 
906 	/* Determine which profile(s) must be applied. */
907 
908 	profile_count = 0;
909 	fm_flags = BUNDLE_PROF | CHECKHASH;
910 
911 	/* Determine if argument is a directory or file. */
912 	if (stat(file, &sb) == -1) {
913 		semerr(gettext("Unable to stat file %s.  %s\n"), file,
914 		    strerror(errno));
915 		rc = -1;
916 		goto out;
917 	}
918 
919 	if (sb.st_mode & S_IFDIR) {
920 		fm_flags |= CHECKEXT;
921 		isdir = 1;
922 	} else if (sb.st_mode & S_IFREG) {
923 		isdir = 0;
924 	} else {
925 		semerr(gettext("%s is not a directory or regular "
926 		    "file\n"), file);
927 		rc = -1;
928 		goto out;
929 	}
930 
931 	/* Get list of profiles to be applied. */
932 	if ((profile_count = find_manifests(file, &profiles, fm_flags)) < 0) {
933 		if (isdir) {
934 			semerr(gettext("Could not hash directory %s\n"), file);
935 		} else {
936 			semerr(gettext("Could not hash file %s\n"), file);
937 		}
938 		rc = -1;
939 		goto out;
940 	}
941 
942 	if (profile_count == 0) {
943 		/* No profiles to process. */
944 		if (g_verbose) {
945 			warn(gettext("No changes were necessary\n"));
946 		}
947 		goto out;
948 	}
949 
950 	/*
951 	 * We don't want to exit if we encounter an error.  We should go ahead
952 	 * and process all of the profiles.
953 	 */
954 	dont_exit = est->sc_cmd_flags & SC_CMD_DONT_EXIT;
955 	est->sc_cmd_flags |= SC_CMD_DONT_EXIT;
956 
957 	for (entry = profiles; *entry != NULL; entry++) {
958 		pfile = *entry;
959 
960 		if (apply_profile(pfile, apply_changes) == 0) {
961 			if (g_verbose) {
962 				warn(gettext("Successfully applied: %s\n"),
963 				    pfile->mi_path);
964 			}
965 		} else {
966 			warn(gettext("WARNING: Failed to apply %s\n"),
967 			    pfile->mi_path);
968 			rc = -1;
969 		}
970 	}
971 
972 	if (dont_exit == 0)
973 		est->sc_cmd_flags &= ~SC_CMD_DONT_EXIT;
974 
975 	/* exit(1) appropriately if any profile failed to be applied. */
976 	if ((rc == -1) &&
977 	    (est->sc_cmd_flags & (SC_CMD_IACTIVE | SC_CMD_DONT_EXIT)) == 0) {
978 		free_manifest_array(profiles);
979 		exit(1);
980 	}
981 
982 out:
983 	free_manifest_array(profiles);
984 	return (rc);
985 }
986 
987 int
988 engine_restore(const char *file)
989 {
990 	bundle_t *b;
991 
992 	lscf_prep_hndl();
993 
994 	b = internal_bundle_new();
995 
996 	if (lxml_get_bundle_file(b, file, SVCCFG_OP_RESTORE) != 0) {
997 		internal_bundle_free(b);
998 		return (-1);
999 	}
1000 
1001 	if (lscf_bundle_import(b, file, SCI_NOSNAP) != 0) {
1002 		internal_bundle_free(b);
1003 		return (-1);
1004 	}
1005 
1006 	internal_bundle_free(b);
1007 
1008 	return (0);
1009 }
1010 
1011 int
1012 engine_set(uu_list_t *args)
1013 {
1014 	uu_list_walk_t *walk;
1015 	string_list_t *slp;
1016 
1017 	if (uu_list_first(args) == NULL) {
1018 		/* Display current options. */
1019 		if (!g_verbose)
1020 			(void) fputs("no", stdout);
1021 		(void) puts("verbose");
1022 
1023 		return (0);
1024 	}
1025 
1026 	walk = uu_list_walk_start(args, UU_DEFAULT);
1027 	if (walk == NULL)
1028 		uu_die(gettext("Couldn't read arguments"));
1029 
1030 	/* Use getopt? */
1031 	for (slp = uu_list_walk_next(walk);
1032 	    slp != NULL;
1033 	    slp = uu_list_walk_next(walk)) {
1034 		if (slp->str[0] == '-') {
1035 			char *op;
1036 
1037 			for (op = &slp->str[1]; *op != '\0'; ++op) {
1038 				switch (*op) {
1039 				case 'v':
1040 					g_verbose = 1;
1041 					break;
1042 
1043 				case 'V':
1044 					g_verbose = 0;
1045 					break;
1046 
1047 				default:
1048 					warn(gettext("Unknown option -%c.\n"),
1049 					    *op);
1050 				}
1051 			}
1052 		} else {
1053 			warn(gettext("No non-flag arguments defined.\n"));
1054 		}
1055 	}
1056 
1057 	return (0);
1058 }
1059 
1060 void
1061 help(int com)
1062 {
1063 	int i;
1064 
1065 	if (com == 0) {
1066 		warn(gettext("General commands:	 help set repository end\n"
1067 		    "Manifest commands:	 inventory validate import export "
1068 		    "archive\n"
1069 		    "Profile commands:	 apply extract\n"
1070 		    "Entity commands:	 list select unselect add delete "
1071 		    "describe\n"
1072 		    "Snapshot commands:	 listsnap selectsnap revert\n"
1073 		    "Instance commands:	 refresh\n"
1074 		    "Property group commands: listpg addpg delpg\n"
1075 		    "Property commands:	 listprop setprop delprop editprop\n"
1076 		    "Property value commands: addpropvalue delpropvalue "
1077 		    "setenv unsetenv\n"));
1078 		return;
1079 	}
1080 
1081 	for (i = 0; help_messages[i].message != NULL; ++i) {
1082 		if (help_messages[i].token == com) {
1083 			warn(gettext("Usage: %s\n"),
1084 			    gettext(help_messages[i].message));
1085 			return;
1086 		}
1087 	}
1088 
1089 	warn(gettext("Unknown command.\n"));
1090 }
1091