1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 22 /* 23 * Copyright 2009 Sun Microsystems, Inc. All rights reserved. 24 * Use is subject to license terms. 25 */ 26 27 28 #include <alloca.h> 29 #include <assert.h> 30 #include <ctype.h> 31 #include <door.h> 32 #include <errno.h> 33 #include <fcntl.h> 34 #include <fnmatch.h> 35 #include <inttypes.h> 36 #include <libintl.h> 37 #include <libscf.h> 38 #include <libscf_priv.h> 39 #include <libtecla.h> 40 #include <libuutil.h> 41 #include <limits.h> 42 #include <locale.h> 43 #include <stdarg.h> 44 #include <string.h> 45 #include <strings.h> 46 #include <unistd.h> 47 #include <wait.h> 48 49 #include <libxml/tree.h> 50 51 #include <sys/param.h> 52 53 #include "svccfg.h" 54 #include "manifest_hash.h" 55 56 /* The colon namespaces in each entity (each followed by a newline). */ 57 #define COLON_NAMESPACES ":properties\n" 58 59 #define TEMP_FILE_PATTERN "/tmp/svccfg-XXXXXX" 60 61 /* These are characters which the lexer requires to be in double-quotes. */ 62 #define CHARS_TO_QUOTE " \t\n\\>=\"()" 63 64 #define HASH_SIZE 16 65 #define HASH_SVC "smf/manifest" 66 #define HASH_PG_TYPE "framework" 67 #define HASH_PG_FLAGS 0 68 #define HASH_PROP "md5sum" 69 70 /* 71 * Indentation used in the output of the describe subcommand. 72 */ 73 #define TMPL_VALUE_INDENT " " 74 #define TMPL_INDENT " " 75 #define TMPL_INDENT_2X " " 76 #define TMPL_CHOICE_INDENT " " 77 78 /* 79 * These are the classes of elements which may appear as children of service 80 * or instance elements in XML manifests. 81 */ 82 struct entity_elts { 83 xmlNodePtr create_default_instance; 84 xmlNodePtr single_instance; 85 xmlNodePtr restarter; 86 xmlNodePtr dependencies; 87 xmlNodePtr dependents; 88 xmlNodePtr method_context; 89 xmlNodePtr exec_methods; 90 xmlNodePtr property_groups; 91 xmlNodePtr instances; 92 xmlNodePtr stability; 93 xmlNodePtr template; 94 }; 95 96 /* 97 * Likewise for property_group elements. 98 */ 99 struct pg_elts { 100 xmlNodePtr stability; 101 xmlNodePtr propvals; 102 xmlNodePtr properties; 103 }; 104 105 /* 106 * Likewise for template elements. 107 */ 108 struct template_elts { 109 xmlNodePtr common_name; 110 xmlNodePtr description; 111 xmlNodePtr documentation; 112 }; 113 114 /* 115 * This structure is for snaplevel lists. They are convenient because libscf 116 * only allows traversing snaplevels in one direction. 117 */ 118 struct snaplevel { 119 uu_list_node_t list_node; 120 scf_snaplevel_t *sl; 121 }; 122 123 /* 124 * This is used for communication between lscf_service_export and 125 * export_callback. 126 */ 127 struct export_args { 128 const char *filename; 129 int flags; 130 }; 131 132 const char * const scf_pg_general = SCF_PG_GENERAL; 133 const char * const scf_group_framework = SCF_GROUP_FRAMEWORK; 134 const char * const scf_property_enabled = SCF_PROPERTY_ENABLED; 135 const char * const scf_property_external = "external"; 136 137 const char * const snap_initial = "initial"; 138 const char * const snap_lastimport = "last-import"; 139 const char * const snap_previous = "previous"; 140 const char * const snap_running = "running"; 141 142 scf_handle_t *g_hndl = NULL; /* only valid after lscf_prep_hndl() */ 143 144 ssize_t max_scf_fmri_len; 145 ssize_t max_scf_name_len; 146 ssize_t max_scf_pg_type_len; 147 ssize_t max_scf_value_len; 148 static size_t max_scf_len; 149 150 static scf_scope_t *cur_scope; 151 static scf_service_t *cur_svc = NULL; 152 static scf_instance_t *cur_inst = NULL; 153 static scf_snapshot_t *cur_snap = NULL; 154 static scf_snaplevel_t *cur_level = NULL; 155 156 static uu_list_pool_t *snaplevel_pool; 157 /* cur_levels is the snaplevels of cur_snap, from least specific to most. */ 158 static uu_list_t *cur_levels; 159 static struct snaplevel *cur_elt; /* cur_elt->sl == cur_level */ 160 161 static FILE *tempfile = NULL; 162 static char tempfilename[sizeof (TEMP_FILE_PATTERN)] = ""; 163 164 static const char *emsg_entity_not_selected; 165 static const char *emsg_permission_denied; 166 static const char *emsg_create_xml; 167 static const char *emsg_cant_modify_snapshots; 168 static const char *emsg_read_only; 169 static const char *emsg_deleted; 170 static const char *emsg_invalid_pg_name; 171 static const char *emsg_invalid_prop_name; 172 static const char *emsg_no_such_pg; 173 static const char *emsg_fmri_invalid_pg_name; 174 static const char *emsg_fmri_invalid_pg_name_type; 175 static const char *emsg_pg_added; 176 static const char *emsg_pg_changed; 177 static const char *emsg_pg_deleted; 178 static const char *emsg_pg_mod_perm; 179 static const char *emsg_pg_add_perm; 180 static const char *emsg_pg_del_perm; 181 static const char *emsg_snap_perm; 182 static const char *emsg_dpt_dangling; 183 static const char *emsg_dpt_no_dep; 184 185 static int li_only; 186 static int no_refresh = 0; 187 188 /* import globals, to minimize allocations */ 189 static scf_scope_t *imp_scope = NULL; 190 static scf_service_t *imp_svc = NULL, *imp_tsvc = NULL; 191 static scf_instance_t *imp_inst = NULL, *imp_tinst = NULL; 192 static scf_snapshot_t *imp_snap = NULL, *imp_lisnap = NULL, *imp_tlisnap = NULL; 193 static scf_snapshot_t *imp_rsnap = NULL; 194 static scf_snaplevel_t *imp_snpl = NULL, *imp_rsnpl = NULL; 195 static scf_propertygroup_t *imp_pg = NULL, *imp_pg2 = NULL; 196 static scf_property_t *imp_prop = NULL; 197 static scf_iter_t *imp_iter = NULL; 198 static scf_iter_t *imp_rpg_iter = NULL; 199 static scf_iter_t *imp_up_iter = NULL; 200 static scf_transaction_t *imp_tx = NULL; /* always reset this */ 201 static char *imp_str = NULL; 202 static size_t imp_str_sz; 203 static char *imp_tsname = NULL; 204 static char *imp_fe1 = NULL; /* for fmri_equal() */ 205 static char *imp_fe2 = NULL; 206 static uu_list_t *imp_deleted_dpts = NULL; /* pgroup_t's to refresh */ 207 208 /* upgrade_dependents() globals */ 209 static scf_instance_t *ud_inst = NULL; 210 static scf_snaplevel_t *ud_snpl = NULL; 211 static scf_propertygroup_t *ud_pg = NULL; 212 static scf_propertygroup_t *ud_cur_depts_pg = NULL; 213 static scf_propertygroup_t *ud_run_dpts_pg = NULL; 214 static int ud_run_dpts_pg_set = 0; 215 static scf_property_t *ud_prop = NULL; 216 static scf_property_t *ud_dpt_prop = NULL; 217 static scf_value_t *ud_val = NULL; 218 static scf_iter_t *ud_iter = NULL, *ud_iter2 = NULL; 219 static scf_transaction_t *ud_tx = NULL; 220 static char *ud_ctarg = NULL; 221 static char *ud_oldtarg = NULL; 222 static char *ud_name = NULL; 223 224 /* export globals */ 225 static scf_instance_t *exp_inst; 226 static scf_propertygroup_t *exp_pg; 227 static scf_property_t *exp_prop; 228 static scf_value_t *exp_val; 229 static scf_iter_t *exp_inst_iter, *exp_pg_iter, *exp_prop_iter, *exp_val_iter; 230 static char *exp_str; 231 static size_t exp_str_sz; 232 233 static void scfdie_lineno(int lineno) __NORETURN; 234 235 static char *start_method_names[] = { 236 "start", 237 "inetd_start", 238 NULL 239 }; 240 241 static void 242 safe_printf(const char *fmt, ...) 243 { 244 va_list va; 245 246 va_start(va, fmt); 247 if (vprintf(fmt, va) < 0) 248 uu_die(gettext("Error writing to stdout")); 249 va_end(va); 250 } 251 252 /* 253 * For unexpected libscf errors. 254 */ 255 #ifdef NDEBUG 256 257 static void scfdie(void) __NORETURN; 258 259 static void 260 scfdie(void) 261 { 262 scf_error_t err = scf_error(); 263 264 if (err == SCF_ERROR_CONNECTION_BROKEN) 265 uu_die(gettext("Repository connection broken. Exiting.\n")); 266 267 uu_die(gettext("Unexpected fatal libscf error: %s. Exiting.\n"), 268 scf_strerror(err)); 269 } 270 271 #else 272 273 #define scfdie() scfdie_lineno(__LINE__) 274 275 static void 276 scfdie_lineno(int lineno) 277 { 278 scf_error_t err = scf_error(); 279 280 if (err == SCF_ERROR_CONNECTION_BROKEN) 281 uu_die(gettext("Repository connection broken. Exiting.\n")); 282 283 uu_die(gettext("Unexpected libscf error on line %d of " __FILE__ 284 ": %s.\n"), lineno, scf_strerror(err)); 285 } 286 287 #endif 288 289 static void 290 scfwarn(void) 291 { 292 warn(gettext("Unexpected libscf error: %s.\n"), 293 scf_strerror(scf_error())); 294 } 295 296 /* 297 * Clear a field of a structure. 298 */ 299 static int 300 clear_int(void *a, void *b) 301 { 302 /* LINTED */ 303 *(int *)((char *)a + (size_t)b) = 0; 304 305 return (UU_WALK_NEXT); 306 } 307 308 static int 309 scferror2errno(scf_error_t err) 310 { 311 switch (err) { 312 case SCF_ERROR_BACKEND_ACCESS: 313 return (EACCES); 314 315 case SCF_ERROR_BACKEND_READONLY: 316 return (EROFS); 317 318 case SCF_ERROR_CONNECTION_BROKEN: 319 return (ECONNABORTED); 320 321 case SCF_ERROR_CONSTRAINT_VIOLATED: 322 case SCF_ERROR_INVALID_ARGUMENT: 323 return (EINVAL); 324 325 case SCF_ERROR_DELETED: 326 return (ECANCELED); 327 328 case SCF_ERROR_EXISTS: 329 return (EEXIST); 330 331 case SCF_ERROR_NO_MEMORY: 332 return (ENOMEM); 333 334 case SCF_ERROR_NO_RESOURCES: 335 return (ENOSPC); 336 337 case SCF_ERROR_NOT_FOUND: 338 return (ENOENT); 339 340 case SCF_ERROR_PERMISSION_DENIED: 341 return (EPERM); 342 343 default: 344 #ifndef NDEBUG 345 (void) fprintf(stderr, "%s:%d: Unknown libscf error %d.\n", 346 __FILE__, __LINE__, err); 347 #else 348 (void) fprintf(stderr, "Unknown libscf error %d.\n", err); 349 #endif 350 abort(); 351 /* NOTREACHED */ 352 } 353 } 354 355 static int 356 entity_get_pg(void *ent, int issvc, const char *name, 357 scf_propertygroup_t *pg) 358 { 359 if (issvc) 360 return (scf_service_get_pg(ent, name, pg)); 361 else 362 return (scf_instance_get_pg(ent, name, pg)); 363 } 364 365 static void 366 entity_destroy(void *ent, int issvc) 367 { 368 if (issvc) 369 scf_service_destroy(ent); 370 else 371 scf_instance_destroy(ent); 372 } 373 374 static int 375 get_pg(const char *pg_name, scf_propertygroup_t *pg) 376 { 377 int ret; 378 379 if (cur_level != NULL) 380 ret = scf_snaplevel_get_pg(cur_level, pg_name, pg); 381 else if (cur_inst != NULL) 382 ret = scf_instance_get_pg(cur_inst, pg_name, pg); 383 else 384 ret = scf_service_get_pg(cur_svc, pg_name, pg); 385 386 return (ret); 387 } 388 389 /* 390 * Find a snaplevel in a snapshot. If get_svc is true, find the service 391 * snaplevel. Otherwise find the instance snaplevel. 392 * 393 * Returns 394 * 0 - success 395 * ECONNABORTED - repository connection broken 396 * ECANCELED - instance containing snap was deleted 397 * ENOENT - snap has no snaplevels 398 * - requested snaplevel not found 399 */ 400 static int 401 get_snaplevel(scf_snapshot_t *snap, int get_svc, scf_snaplevel_t *snpl) 402 { 403 if (scf_snapshot_get_base_snaplevel(snap, snpl) != 0) { 404 switch (scf_error()) { 405 case SCF_ERROR_CONNECTION_BROKEN: 406 case SCF_ERROR_DELETED: 407 case SCF_ERROR_NOT_FOUND: 408 return (scferror2errno(scf_error())); 409 410 case SCF_ERROR_HANDLE_MISMATCH: 411 case SCF_ERROR_NOT_BOUND: 412 case SCF_ERROR_NOT_SET: 413 default: 414 bad_error("scf_snapshot_get_base_snaplevel", 415 scf_error()); 416 } 417 } 418 419 for (;;) { 420 ssize_t ssz; 421 422 ssz = scf_snaplevel_get_instance_name(snpl, NULL, 0); 423 if (ssz >= 0) { 424 if (!get_svc) 425 return (0); 426 } else { 427 switch (scf_error()) { 428 case SCF_ERROR_CONSTRAINT_VIOLATED: 429 if (get_svc) 430 return (0); 431 break; 432 433 case SCF_ERROR_DELETED: 434 case SCF_ERROR_CONNECTION_BROKEN: 435 return (scferror2errno(scf_error())); 436 437 case SCF_ERROR_NOT_SET: 438 case SCF_ERROR_NOT_BOUND: 439 default: 440 bad_error("scf_snaplevel_get_instance_name", 441 scf_error()); 442 } 443 } 444 445 if (scf_snaplevel_get_next_snaplevel(snpl, snpl) != 0) { 446 switch (scf_error()) { 447 case SCF_ERROR_NOT_FOUND: 448 case SCF_ERROR_CONNECTION_BROKEN: 449 case SCF_ERROR_DELETED: 450 return (scferror2errno(scf_error())); 451 452 case SCF_ERROR_HANDLE_MISMATCH: 453 case SCF_ERROR_NOT_BOUND: 454 case SCF_ERROR_NOT_SET: 455 case SCF_ERROR_INVALID_ARGUMENT: 456 default: 457 bad_error("scf_snaplevel_get_next_snaplevel", 458 scf_error()); 459 } 460 } 461 } 462 } 463 464 /* 465 * If issvc is 0, take ent to be a pointer to an scf_instance_t. If it has 466 * a running snapshot, and that snapshot has an instance snaplevel, set pg to 467 * the property group named name in it. If it doesn't have a running 468 * snapshot, set pg to the instance's current property group named name. 469 * 470 * If issvc is nonzero, take ent to be a pointer to an scf_service_t, and walk 471 * its instances. If one has a running snapshot with a service snaplevel, set 472 * pg to the property group named name in it. If no such snaplevel could be 473 * found, set pg to the service's current property group named name. 474 * 475 * iter, inst, snap, and snpl are required scratch objects. 476 * 477 * Returns 478 * 0 - success 479 * ECONNABORTED - repository connection broken 480 * ECANCELED - ent was deleted 481 * ENOENT - no such property group 482 * EINVAL - name is an invalid property group name 483 * EBADF - found running snapshot is missing a snaplevel 484 */ 485 static int 486 entity_get_running_pg(void *ent, int issvc, const char *name, 487 scf_propertygroup_t *pg, scf_iter_t *iter, scf_instance_t *inst, 488 scf_snapshot_t *snap, scf_snaplevel_t *snpl) 489 { 490 int r; 491 492 if (issvc) { 493 /* Search for an instance with a running snapshot. */ 494 if (scf_iter_service_instances(iter, ent) != 0) { 495 switch (scf_error()) { 496 case SCF_ERROR_DELETED: 497 case SCF_ERROR_CONNECTION_BROKEN: 498 return (scferror2errno(scf_error())); 499 500 case SCF_ERROR_NOT_SET: 501 case SCF_ERROR_NOT_BOUND: 502 case SCF_ERROR_HANDLE_MISMATCH: 503 default: 504 bad_error("scf_iter_service_instances", 505 scf_error()); 506 } 507 } 508 509 for (;;) { 510 r = scf_iter_next_instance(iter, inst); 511 if (r == 0) { 512 if (scf_service_get_pg(ent, name, pg) == 0) 513 return (0); 514 515 switch (scf_error()) { 516 case SCF_ERROR_DELETED: 517 case SCF_ERROR_NOT_FOUND: 518 case SCF_ERROR_INVALID_ARGUMENT: 519 case SCF_ERROR_CONNECTION_BROKEN: 520 return (scferror2errno(scf_error())); 521 522 case SCF_ERROR_NOT_BOUND: 523 case SCF_ERROR_HANDLE_MISMATCH: 524 case SCF_ERROR_NOT_SET: 525 default: 526 bad_error("scf_service_get_pg", 527 scf_error()); 528 } 529 } 530 if (r != 1) { 531 switch (scf_error()) { 532 case SCF_ERROR_DELETED: 533 case SCF_ERROR_CONNECTION_BROKEN: 534 return (scferror2errno(scf_error())); 535 536 case SCF_ERROR_INVALID_ARGUMENT: 537 case SCF_ERROR_NOT_SET: 538 case SCF_ERROR_NOT_BOUND: 539 case SCF_ERROR_HANDLE_MISMATCH: 540 default: 541 bad_error("scf_iter_next_instance", 542 scf_error()); 543 } 544 } 545 546 if (scf_instance_get_snapshot(inst, snap_running, 547 snap) == 0) 548 break; 549 550 switch (scf_error()) { 551 case SCF_ERROR_NOT_FOUND: 552 case SCF_ERROR_DELETED: 553 continue; 554 555 case SCF_ERROR_CONNECTION_BROKEN: 556 return (ECONNABORTED); 557 558 case SCF_ERROR_HANDLE_MISMATCH: 559 case SCF_ERROR_INVALID_ARGUMENT: 560 case SCF_ERROR_NOT_SET: 561 case SCF_ERROR_NOT_BOUND: 562 default: 563 bad_error("scf_instance_get_snapshot", 564 scf_error()); 565 } 566 } 567 } else { 568 if (scf_instance_get_snapshot(ent, snap_running, snap) != 0) { 569 switch (scf_error()) { 570 case SCF_ERROR_NOT_FOUND: 571 break; 572 573 case SCF_ERROR_DELETED: 574 case SCF_ERROR_CONNECTION_BROKEN: 575 return (scferror2errno(scf_error())); 576 577 case SCF_ERROR_NOT_BOUND: 578 case SCF_ERROR_HANDLE_MISMATCH: 579 case SCF_ERROR_INVALID_ARGUMENT: 580 case SCF_ERROR_NOT_SET: 581 default: 582 bad_error("scf_instance_get_snapshot", 583 scf_error()); 584 } 585 586 if (scf_instance_get_pg(ent, name, pg) == 0) 587 return (0); 588 589 switch (scf_error()) { 590 case SCF_ERROR_DELETED: 591 case SCF_ERROR_NOT_FOUND: 592 case SCF_ERROR_INVALID_ARGUMENT: 593 case SCF_ERROR_CONNECTION_BROKEN: 594 return (scferror2errno(scf_error())); 595 596 case SCF_ERROR_NOT_BOUND: 597 case SCF_ERROR_HANDLE_MISMATCH: 598 case SCF_ERROR_NOT_SET: 599 default: 600 bad_error("scf_instance_get_pg", scf_error()); 601 } 602 } 603 } 604 605 r = get_snaplevel(snap, issvc, snpl); 606 switch (r) { 607 case 0: 608 break; 609 610 case ECONNABORTED: 611 case ECANCELED: 612 return (r); 613 614 case ENOENT: 615 return (EBADF); 616 617 default: 618 bad_error("get_snaplevel", r); 619 } 620 621 if (scf_snaplevel_get_pg(snpl, name, pg) == 0) 622 return (0); 623 624 switch (scf_error()) { 625 case SCF_ERROR_DELETED: 626 case SCF_ERROR_INVALID_ARGUMENT: 627 case SCF_ERROR_CONNECTION_BROKEN: 628 case SCF_ERROR_NOT_FOUND: 629 return (scferror2errno(scf_error())); 630 631 case SCF_ERROR_NOT_BOUND: 632 case SCF_ERROR_HANDLE_MISMATCH: 633 case SCF_ERROR_NOT_SET: 634 default: 635 bad_error("scf_snaplevel_get_pg", scf_error()); 636 /* NOTREACHED */ 637 } 638 } 639 640 641 /* 642 * To be registered with atexit(). 643 */ 644 static void 645 remove_tempfile(void) 646 { 647 int ret; 648 649 if (tempfile != NULL) { 650 if (fclose(tempfile) == EOF) 651 warn(gettext("Could not close temporary file")); 652 tempfile = NULL; 653 } 654 655 if (tempfilename[0] != '\0') { 656 do { 657 ret = remove(tempfilename); 658 } while (ret == -1 && errno == EINTR); 659 if (ret == -1) 660 warn(gettext("Could not remove temporary file")); 661 tempfilename[0] = '\0'; 662 } 663 } 664 665 /* 666 * Launch private svc.configd(1M) for manipulating alternate repositories. 667 */ 668 static void 669 start_private_repository(engine_state_t *est) 670 { 671 int fd, stat; 672 struct door_info info; 673 pid_t pid; 674 675 /* 676 * 1. Create a temporary file for the door. 677 */ 678 if (est->sc_repo_doorname != NULL) 679 free((void *)est->sc_repo_doorname); 680 681 est->sc_repo_doorname = tempnam(est->sc_repo_doordir, "scfdr"); 682 if (est->sc_repo_doorname == NULL) 683 uu_die(gettext("Could not acquire temporary filename")); 684 685 fd = open(est->sc_repo_doorname, O_CREAT | O_EXCL | O_RDWR, 0600); 686 if (fd < 0) 687 uu_die(gettext("Could not create temporary file for " 688 "repository server")); 689 690 (void) close(fd); 691 692 /* 693 * 2. Launch a configd with that door, using the specified 694 * repository. 695 */ 696 if ((est->sc_repo_pid = fork()) == 0) { 697 (void) execlp(est->sc_repo_server, est->sc_repo_server, "-p", 698 "-d", est->sc_repo_doorname, "-r", est->sc_repo_filename, 699 NULL); 700 uu_die(gettext("Could not execute %s"), est->sc_repo_server); 701 } else if (est->sc_repo_pid == -1) 702 uu_die(gettext("Attempt to fork failed")); 703 704 do { 705 pid = waitpid(est->sc_repo_pid, &stat, 0); 706 } while (pid == -1 && errno == EINTR); 707 708 if (pid == -1) 709 uu_die(gettext("Could not waitpid() for repository server")); 710 711 if (!WIFEXITED(stat)) { 712 uu_die(gettext("Repository server failed (status %d).\n"), 713 stat); 714 } else if (WEXITSTATUS(stat) != 0) { 715 uu_die(gettext("Repository server failed (exit %d).\n"), 716 WEXITSTATUS(stat)); 717 } 718 719 /* 720 * See if it was successful by checking if the door is a door. 721 */ 722 723 fd = open(est->sc_repo_doorname, O_RDWR); 724 if (fd < 0) 725 uu_die(gettext("Could not open door \"%s\""), 726 est->sc_repo_doorname); 727 728 if (door_info(fd, &info) < 0) 729 uu_die(gettext("Unexpected door_info() error")); 730 731 if (close(fd) == -1) 732 warn(gettext("Could not close repository door"), 733 strerror(errno)); 734 735 est->sc_repo_pid = info.di_target; 736 } 737 738 void 739 lscf_cleanup(void) 740 { 741 /* 742 * In the case where we've launched a private svc.configd(1M) 743 * instance, we must terminate our child and remove the temporary 744 * rendezvous point. 745 */ 746 if (est->sc_repo_pid > 0) { 747 (void) kill(est->sc_repo_pid, SIGTERM); 748 (void) waitpid(est->sc_repo_pid, NULL, 0); 749 (void) unlink(est->sc_repo_doorname); 750 751 est->sc_repo_pid = 0; 752 } 753 } 754 755 void 756 unselect_cursnap(void) 757 { 758 void *cookie; 759 760 cur_level = NULL; 761 762 cookie = NULL; 763 while ((cur_elt = uu_list_teardown(cur_levels, &cookie)) != NULL) { 764 scf_snaplevel_destroy(cur_elt->sl); 765 free(cur_elt); 766 } 767 768 scf_snapshot_destroy(cur_snap); 769 cur_snap = NULL; 770 } 771 772 void 773 lscf_prep_hndl(void) 774 { 775 if (g_hndl != NULL) 776 return; 777 778 g_hndl = scf_handle_create(SCF_VERSION); 779 if (g_hndl == NULL) 780 scfdie(); 781 782 if (est->sc_repo_filename != NULL) 783 start_private_repository(est); 784 785 if (est->sc_repo_doorname != NULL) { 786 scf_value_t *repo_value; 787 int ret; 788 789 repo_value = scf_value_create(g_hndl); 790 if (repo_value == NULL) 791 scfdie(); 792 793 ret = scf_value_set_astring(repo_value, est->sc_repo_doorname); 794 assert(ret == SCF_SUCCESS); 795 796 if (scf_handle_decorate(g_hndl, "door_path", repo_value) != 797 SCF_SUCCESS) 798 scfdie(); 799 800 scf_value_destroy(repo_value); 801 } 802 803 if (scf_handle_bind(g_hndl) != 0) 804 uu_die(gettext("Could not connect to repository server: %s.\n"), 805 scf_strerror(scf_error())); 806 807 cur_scope = scf_scope_create(g_hndl); 808 if (cur_scope == NULL) 809 scfdie(); 810 811 if (scf_handle_get_local_scope(g_hndl, cur_scope) != 0) 812 scfdie(); 813 } 814 815 static void 816 repository_teardown(void) 817 { 818 if (g_hndl != NULL) { 819 if (cur_snap != NULL) 820 unselect_cursnap(); 821 scf_instance_destroy(cur_inst); 822 scf_service_destroy(cur_svc); 823 scf_scope_destroy(cur_scope); 824 scf_handle_destroy(g_hndl); 825 cur_inst = NULL; 826 cur_svc = NULL; 827 cur_scope = NULL; 828 g_hndl = NULL; 829 lscf_cleanup(); 830 } 831 } 832 833 void 834 lscf_set_repository(const char *repfile, int force) 835 { 836 repository_teardown(); 837 838 if (est->sc_repo_filename != NULL) { 839 free((void *)est->sc_repo_filename); 840 est->sc_repo_filename = NULL; 841 } 842 843 if ((force == 0) && (access(repfile, R_OK) != 0)) { 844 /* 845 * Repository file does not exist 846 * or has no read permission. 847 */ 848 warn(gettext("Cannot access \"%s\": %s\n"), 849 repfile, strerror(errno)); 850 } else { 851 est->sc_repo_filename = safe_strdup(repfile); 852 } 853 854 lscf_prep_hndl(); 855 } 856 857 void 858 lscf_init() 859 { 860 if ((max_scf_fmri_len = scf_limit(SCF_LIMIT_MAX_FMRI_LENGTH)) < 0 || 861 (max_scf_name_len = scf_limit(SCF_LIMIT_MAX_NAME_LENGTH)) < 0 || 862 (max_scf_pg_type_len = scf_limit(SCF_LIMIT_MAX_PG_TYPE_LENGTH)) < 863 0 || 864 (max_scf_value_len = scf_limit(SCF_LIMIT_MAX_VALUE_LENGTH)) < 0) 865 scfdie(); 866 867 max_scf_len = max_scf_fmri_len; 868 if (max_scf_name_len > max_scf_len) 869 max_scf_len = max_scf_name_len; 870 if (max_scf_pg_type_len > max_scf_len) 871 max_scf_len = max_scf_pg_type_len; 872 if (max_scf_value_len > max_scf_len) 873 max_scf_len = max_scf_value_len; 874 875 if (atexit(remove_tempfile) != 0) 876 uu_die(gettext("Could not register atexit() function")); 877 878 emsg_entity_not_selected = gettext("An entity is not selected.\n"); 879 emsg_permission_denied = gettext("Permission denied.\n"); 880 emsg_create_xml = gettext("Could not create XML node.\n"); 881 emsg_cant_modify_snapshots = gettext("Cannot modify snapshots.\n"); 882 emsg_read_only = gettext("Backend read-only.\n"); 883 emsg_deleted = gettext("Current selection has been deleted.\n"); 884 emsg_invalid_pg_name = 885 gettext("Invalid property group name \"%s\".\n"); 886 emsg_invalid_prop_name = gettext("Invalid property name \"%s\".\n"); 887 emsg_no_such_pg = gettext("No such property group \"%s\".\n"); 888 emsg_fmri_invalid_pg_name = gettext("Service %s has property group " 889 "with invalid name \"%s\".\n"); 890 emsg_fmri_invalid_pg_name_type = gettext("Service %s has property " 891 "group with invalid name \"%s\" or type \"%s\".\n"); 892 emsg_pg_added = gettext("%s changed unexpectedly " 893 "(property group \"%s\" added).\n"); 894 emsg_pg_changed = gettext("%s changed unexpectedly " 895 "(property group \"%s\" changed).\n"); 896 emsg_pg_deleted = gettext("%s changed unexpectedly " 897 "(property group \"%s\" or an ancestor was deleted).\n"); 898 emsg_pg_mod_perm = gettext("Could not modify property group \"%s\" " 899 "in %s (permission denied).\n"); 900 emsg_pg_add_perm = gettext("Could not create property group \"%s\" " 901 "in %s (permission denied).\n"); 902 emsg_pg_del_perm = gettext("Could not delete property group \"%s\" " 903 "in %s (permission denied).\n"); 904 emsg_snap_perm = gettext("Could not take \"%s\" snapshot of %s " 905 "(permission denied).\n"); 906 emsg_dpt_dangling = gettext("Conflict upgrading %s (not importing " 907 "new dependent \"%s\" because it already exists). Warning: The " 908 "current dependent's target (%s) does not exist.\n"); 909 emsg_dpt_no_dep = gettext("Conflict upgrading %s (not importing new " 910 "dependent \"%s\" because it already exists). Warning: The " 911 "current dependent's target (%s) does not have a dependency named " 912 "\"%s\" as expected.\n"); 913 914 string_pool = uu_list_pool_create("strings", sizeof (string_list_t), 915 offsetof(string_list_t, node), NULL, 0); 916 snaplevel_pool = uu_list_pool_create("snaplevels", 917 sizeof (struct snaplevel), offsetof(struct snaplevel, list_node), 918 NULL, 0); 919 } 920 921 922 static const char * 923 prop_to_typestr(const scf_property_t *prop) 924 { 925 scf_type_t ty; 926 927 if (scf_property_type(prop, &ty) != SCF_SUCCESS) 928 scfdie(); 929 930 return (scf_type_to_string(ty)); 931 } 932 933 static scf_type_t 934 string_to_type(const char *type) 935 { 936 size_t len = strlen(type); 937 char *buf; 938 939 if (len == 0 || type[len - 1] != ':') 940 return (SCF_TYPE_INVALID); 941 942 buf = (char *)alloca(len + 1); 943 (void) strlcpy(buf, type, len + 1); 944 buf[len - 1] = 0; 945 946 return (scf_string_to_type(buf)); 947 } 948 949 static scf_value_t * 950 string_to_value(const char *str, scf_type_t ty, boolean_t require_quotes) 951 { 952 scf_value_t *v; 953 char *dup, *nstr; 954 size_t len; 955 956 v = scf_value_create(g_hndl); 957 if (v == NULL) 958 scfdie(); 959 960 len = strlen(str); 961 if (require_quotes && 962 (len < 2 || str[0] != '\"' || str[len - 1] != '\"')) { 963 semerr(gettext("Multiple string values or string values " 964 "with spaces must be quoted with '\"'.\n")); 965 scf_value_destroy(v); 966 return (NULL); 967 } 968 969 nstr = dup = safe_strdup(str); 970 if (dup[0] == '\"') { 971 /* 972 * Strip out the first and the last quote. 973 */ 974 dup[len - 1] = '\0'; 975 nstr = dup + 1; 976 } 977 978 if (scf_value_set_from_string(v, ty, (const char *)nstr) != 0) { 979 assert(scf_error() == SCF_ERROR_INVALID_ARGUMENT); 980 semerr(gettext("Invalid \"%s\" value \"%s\".\n"), 981 scf_type_to_string(ty), nstr); 982 scf_value_destroy(v); 983 v = NULL; 984 } 985 free(dup); 986 return (v); 987 } 988 989 /* 990 * Print str to strm, quoting double-quotes and backslashes with backslashes. 991 * Optionally append a comment prefix ('#') to newlines ('\n'). 992 */ 993 static int 994 quote_and_print(const char *str, FILE *strm, int commentnl) 995 { 996 const char *cp; 997 998 for (cp = str; *cp != '\0'; ++cp) { 999 if (*cp == '"' || *cp == '\\') 1000 (void) putc('\\', strm); 1001 1002 (void) putc(*cp, strm); 1003 1004 if (commentnl && *cp == '\n') { 1005 (void) putc('#', strm); 1006 } 1007 } 1008 1009 return (ferror(strm)); 1010 } 1011 1012 /* 1013 * These wrappers around lowlevel functions provide consistent error checking 1014 * and warnings. 1015 */ 1016 static int 1017 pg_get_prop(scf_propertygroup_t *pg, const char *propname, scf_property_t *prop) 1018 { 1019 if (scf_pg_get_property(pg, propname, prop) == SCF_SUCCESS) 1020 return (0); 1021 1022 if (scf_error() != SCF_ERROR_NOT_FOUND) 1023 scfdie(); 1024 1025 if (g_verbose) { 1026 ssize_t len; 1027 char *fmri; 1028 1029 len = scf_pg_to_fmri(pg, NULL, 0); 1030 if (len < 0) 1031 scfdie(); 1032 1033 fmri = safe_malloc(len + 1); 1034 1035 if (scf_pg_to_fmri(pg, fmri, len + 1) < 0) 1036 scfdie(); 1037 1038 warn(gettext("Expected property %s of property group %s is " 1039 "missing.\n"), propname, fmri); 1040 1041 free(fmri); 1042 } 1043 1044 return (-1); 1045 } 1046 1047 static int 1048 prop_check_type(scf_property_t *prop, scf_type_t ty) 1049 { 1050 scf_type_t pty; 1051 1052 if (scf_property_type(prop, &pty) != SCF_SUCCESS) 1053 scfdie(); 1054 1055 if (ty == pty) 1056 return (0); 1057 1058 if (g_verbose) { 1059 ssize_t len; 1060 char *fmri; 1061 const char *tystr; 1062 1063 len = scf_property_to_fmri(prop, NULL, 0); 1064 if (len < 0) 1065 scfdie(); 1066 1067 fmri = safe_malloc(len + 1); 1068 1069 if (scf_property_to_fmri(prop, fmri, len + 1) < 0) 1070 scfdie(); 1071 1072 tystr = scf_type_to_string(ty); 1073 if (tystr == NULL) 1074 tystr = "?"; 1075 1076 warn(gettext("Property %s is not of expected type %s.\n"), 1077 fmri, tystr); 1078 1079 free(fmri); 1080 } 1081 1082 return (-1); 1083 } 1084 1085 static int 1086 prop_get_val(scf_property_t *prop, scf_value_t *val) 1087 { 1088 scf_error_t err; 1089 1090 if (scf_property_get_value(prop, val) == SCF_SUCCESS) 1091 return (0); 1092 1093 err = scf_error(); 1094 1095 if (err != SCF_ERROR_NOT_FOUND && 1096 err != SCF_ERROR_CONSTRAINT_VIOLATED && 1097 err != SCF_ERROR_PERMISSION_DENIED) 1098 scfdie(); 1099 1100 if (g_verbose) { 1101 ssize_t len; 1102 char *fmri, *emsg; 1103 1104 len = scf_property_to_fmri(prop, NULL, 0); 1105 if (len < 0) 1106 scfdie(); 1107 1108 fmri = safe_malloc(len + 1); 1109 1110 if (scf_property_to_fmri(prop, fmri, len + 1) < 0) 1111 scfdie(); 1112 1113 if (err == SCF_ERROR_NOT_FOUND) 1114 emsg = gettext("Property %s has no values; expected " 1115 "one.\n"); 1116 else if (err == SCF_ERROR_CONSTRAINT_VIOLATED) 1117 emsg = gettext("Property %s has multiple values; " 1118 "expected one.\n"); 1119 else 1120 emsg = gettext("No permission to read property %s.\n"); 1121 1122 warn(emsg, fmri); 1123 1124 free(fmri); 1125 } 1126 1127 return (-1); 1128 } 1129 1130 1131 static boolean_t 1132 snaplevel_is_instance(const scf_snaplevel_t *level) 1133 { 1134 if (scf_snaplevel_get_instance_name(level, NULL, 0) < 0) { 1135 if (scf_error() != SCF_ERROR_CONSTRAINT_VIOLATED) 1136 scfdie(); 1137 return (0); 1138 } else { 1139 return (1); 1140 } 1141 } 1142 1143 /* 1144 * Decode FMRI into a service or instance, and put the result in *ep. If 1145 * memory cannot be allocated, return SCF_ERROR_NO_MEMORY. If the FMRI is 1146 * invalid, return SCF_ERROR_INVALID_ARGUMENT. If the FMRI does not specify 1147 * an entity, return SCF_ERROR_CONSTRAINT_VIOLATED. If the entity cannot be 1148 * found, return SCF_ERROR_NOT_FOUND. Otherwise return SCF_ERROR_NONE, point 1149 * *ep to a valid scf_service_t or scf_instance_t, and set *isservice to 1150 * whether *ep is a service. 1151 */ 1152 static scf_error_t 1153 fmri_to_entity(scf_handle_t *h, const char *fmri, void **ep, int *isservice) 1154 { 1155 char *fmri_copy; 1156 const char *sstr, *istr, *pgstr; 1157 scf_service_t *svc; 1158 scf_instance_t *inst; 1159 1160 fmri_copy = strdup(fmri); 1161 if (fmri_copy == NULL) 1162 return (SCF_ERROR_NO_MEMORY); 1163 1164 if (scf_parse_svc_fmri(fmri_copy, NULL, &sstr, &istr, &pgstr, NULL) != 1165 SCF_SUCCESS) { 1166 free(fmri_copy); 1167 return (SCF_ERROR_INVALID_ARGUMENT); 1168 } 1169 1170 free(fmri_copy); 1171 1172 if (sstr == NULL || pgstr != NULL) 1173 return (SCF_ERROR_CONSTRAINT_VIOLATED); 1174 1175 if (istr == NULL) { 1176 svc = scf_service_create(h); 1177 if (svc == NULL) 1178 return (SCF_ERROR_NO_MEMORY); 1179 1180 if (scf_handle_decode_fmri(h, fmri, NULL, svc, NULL, NULL, NULL, 1181 SCF_DECODE_FMRI_EXACT) != SCF_SUCCESS) { 1182 if (scf_error() != SCF_ERROR_NOT_FOUND) 1183 scfdie(); 1184 1185 return (SCF_ERROR_NOT_FOUND); 1186 } 1187 1188 *ep = svc; 1189 *isservice = 1; 1190 } else { 1191 inst = scf_instance_create(h); 1192 if (inst == NULL) 1193 return (SCF_ERROR_NO_MEMORY); 1194 1195 if (scf_handle_decode_fmri(h, fmri, NULL, NULL, inst, NULL, 1196 NULL, SCF_DECODE_FMRI_EXACT) != SCF_SUCCESS) { 1197 if (scf_error() != SCF_ERROR_NOT_FOUND) 1198 scfdie(); 1199 1200 return (SCF_ERROR_NOT_FOUND); 1201 } 1202 1203 *ep = inst; 1204 *isservice = 0; 1205 } 1206 1207 return (SCF_ERROR_NONE); 1208 } 1209 1210 /* 1211 * Create the entity named by fmri. Place a pointer to its libscf handle in 1212 * *ep, and set or clear *isservicep if it is a service or an instance. 1213 * Returns 1214 * SCF_ERROR_NONE - success 1215 * SCF_ERROR_NO_MEMORY - scf_*_create() failed 1216 * SCF_ERROR_INVALID_ARGUMENT - fmri is invalid 1217 * SCF_ERROR_CONSTRAINT_VIOLATED - fmri is not a service or instance 1218 * SCF_ERROR_NOT_FOUND - no such scope 1219 * SCF_ERROR_PERMISSION_DENIED 1220 * SCF_ERROR_BACKEND_READONLY 1221 * SCF_ERROR_BACKEND_ACCESS 1222 */ 1223 static scf_error_t 1224 create_entity(scf_handle_t *h, const char *fmri, void **ep, int *isservicep) 1225 { 1226 char *fmri_copy; 1227 const char *scstr, *sstr, *istr, *pgstr; 1228 scf_scope_t *scope = NULL; 1229 scf_service_t *svc = NULL; 1230 scf_instance_t *inst = NULL; 1231 scf_error_t scfe; 1232 1233 fmri_copy = safe_strdup(fmri); 1234 1235 if (scf_parse_svc_fmri(fmri_copy, &scstr, &sstr, &istr, &pgstr, NULL) != 1236 0) { 1237 free(fmri_copy); 1238 return (SCF_ERROR_INVALID_ARGUMENT); 1239 } 1240 1241 if (scstr == NULL || sstr == NULL || pgstr != NULL) { 1242 free(fmri_copy); 1243 return (SCF_ERROR_CONSTRAINT_VIOLATED); 1244 } 1245 1246 *ep = NULL; 1247 1248 if ((scope = scf_scope_create(h)) == NULL || 1249 (svc = scf_service_create(h)) == NULL || 1250 (inst = scf_instance_create(h)) == NULL) { 1251 scfe = SCF_ERROR_NO_MEMORY; 1252 goto out; 1253 } 1254 1255 get_scope: 1256 if (scf_handle_get_scope(h, scstr, scope) != 0) { 1257 switch (scf_error()) { 1258 case SCF_ERROR_CONNECTION_BROKEN: 1259 scfdie(); 1260 /* NOTREACHED */ 1261 1262 case SCF_ERROR_NOT_FOUND: 1263 scfe = SCF_ERROR_NOT_FOUND; 1264 goto out; 1265 1266 case SCF_ERROR_HANDLE_MISMATCH: 1267 case SCF_ERROR_NOT_BOUND: 1268 case SCF_ERROR_INVALID_ARGUMENT: 1269 default: 1270 bad_error("scf_handle_get_scope", scf_error()); 1271 } 1272 } 1273 1274 get_svc: 1275 if (scf_scope_get_service(scope, sstr, svc) != 0) { 1276 switch (scf_error()) { 1277 case SCF_ERROR_CONNECTION_BROKEN: 1278 scfdie(); 1279 /* NOTREACHED */ 1280 1281 case SCF_ERROR_DELETED: 1282 goto get_scope; 1283 1284 case SCF_ERROR_NOT_FOUND: 1285 break; 1286 1287 case SCF_ERROR_HANDLE_MISMATCH: 1288 case SCF_ERROR_INVALID_ARGUMENT: 1289 case SCF_ERROR_NOT_BOUND: 1290 case SCF_ERROR_NOT_SET: 1291 default: 1292 bad_error("scf_scope_get_service", scf_error()); 1293 } 1294 1295 if (scf_scope_add_service(scope, sstr, svc) != 0) { 1296 switch (scf_error()) { 1297 case SCF_ERROR_CONNECTION_BROKEN: 1298 scfdie(); 1299 /* NOTREACHED */ 1300 1301 case SCF_ERROR_DELETED: 1302 goto get_scope; 1303 1304 case SCF_ERROR_PERMISSION_DENIED: 1305 case SCF_ERROR_BACKEND_READONLY: 1306 case SCF_ERROR_BACKEND_ACCESS: 1307 scfe = scf_error(); 1308 goto out; 1309 1310 case SCF_ERROR_HANDLE_MISMATCH: 1311 case SCF_ERROR_INVALID_ARGUMENT: 1312 case SCF_ERROR_NOT_BOUND: 1313 case SCF_ERROR_NOT_SET: 1314 default: 1315 bad_error("scf_scope_get_service", scf_error()); 1316 } 1317 } 1318 } 1319 1320 if (istr == NULL) { 1321 scfe = SCF_ERROR_NONE; 1322 *ep = svc; 1323 *isservicep = 1; 1324 goto out; 1325 } 1326 1327 get_inst: 1328 if (scf_service_get_instance(svc, istr, inst) != 0) { 1329 switch (scf_error()) { 1330 case SCF_ERROR_CONNECTION_BROKEN: 1331 scfdie(); 1332 /* NOTREACHED */ 1333 1334 case SCF_ERROR_DELETED: 1335 goto get_svc; 1336 1337 case SCF_ERROR_NOT_FOUND: 1338 break; 1339 1340 case SCF_ERROR_HANDLE_MISMATCH: 1341 case SCF_ERROR_INVALID_ARGUMENT: 1342 case SCF_ERROR_NOT_BOUND: 1343 case SCF_ERROR_NOT_SET: 1344 default: 1345 bad_error("scf_service_get_instance", scf_error()); 1346 } 1347 1348 if (scf_service_add_instance(svc, istr, inst) != 0) { 1349 switch (scf_error()) { 1350 case SCF_ERROR_CONNECTION_BROKEN: 1351 scfdie(); 1352 /* NOTREACHED */ 1353 1354 case SCF_ERROR_DELETED: 1355 goto get_svc; 1356 1357 case SCF_ERROR_PERMISSION_DENIED: 1358 case SCF_ERROR_BACKEND_READONLY: 1359 case SCF_ERROR_BACKEND_ACCESS: 1360 scfe = scf_error(); 1361 goto out; 1362 1363 case SCF_ERROR_HANDLE_MISMATCH: 1364 case SCF_ERROR_INVALID_ARGUMENT: 1365 case SCF_ERROR_NOT_BOUND: 1366 case SCF_ERROR_NOT_SET: 1367 default: 1368 bad_error("scf_service_add_instance", 1369 scf_error()); 1370 } 1371 } 1372 } 1373 1374 scfe = SCF_ERROR_NONE; 1375 *ep = inst; 1376 *isservicep = 0; 1377 1378 out: 1379 if (*ep != inst) 1380 scf_instance_destroy(inst); 1381 if (*ep != svc) 1382 scf_service_destroy(svc); 1383 scf_scope_destroy(scope); 1384 free(fmri_copy); 1385 return (scfe); 1386 } 1387 1388 /* 1389 * Create or update a snapshot of inst. snap is a required scratch object. 1390 * 1391 * Returns 1392 * 0 - success 1393 * ECONNABORTED - repository connection broken 1394 * EPERM - permission denied 1395 * ENOSPC - configd is out of resources 1396 * ECANCELED - inst was deleted 1397 * -1 - unknown libscf error (message printed) 1398 */ 1399 static int 1400 take_snap(scf_instance_t *inst, const char *name, scf_snapshot_t *snap) 1401 { 1402 again: 1403 if (scf_instance_get_snapshot(inst, name, snap) == 0) { 1404 if (_scf_snapshot_take_attach(inst, snap) != 0) { 1405 switch (scf_error()) { 1406 case SCF_ERROR_CONNECTION_BROKEN: 1407 case SCF_ERROR_PERMISSION_DENIED: 1408 case SCF_ERROR_NO_RESOURCES: 1409 return (scferror2errno(scf_error())); 1410 1411 case SCF_ERROR_NOT_SET: 1412 case SCF_ERROR_INVALID_ARGUMENT: 1413 default: 1414 bad_error("_scf_snapshot_take_attach", 1415 scf_error()); 1416 } 1417 } 1418 } else { 1419 switch (scf_error()) { 1420 case SCF_ERROR_NOT_FOUND: 1421 break; 1422 1423 case SCF_ERROR_DELETED: 1424 case SCF_ERROR_CONNECTION_BROKEN: 1425 return (scferror2errno(scf_error())); 1426 1427 case SCF_ERROR_HANDLE_MISMATCH: 1428 case SCF_ERROR_NOT_BOUND: 1429 case SCF_ERROR_INVALID_ARGUMENT: 1430 case SCF_ERROR_NOT_SET: 1431 default: 1432 bad_error("scf_instance_get_snapshot", scf_error()); 1433 } 1434 1435 if (_scf_snapshot_take_new(inst, name, snap) != 0) { 1436 switch (scf_error()) { 1437 case SCF_ERROR_EXISTS: 1438 goto again; 1439 1440 case SCF_ERROR_CONNECTION_BROKEN: 1441 case SCF_ERROR_NO_RESOURCES: 1442 case SCF_ERROR_PERMISSION_DENIED: 1443 return (scferror2errno(scf_error())); 1444 1445 default: 1446 scfwarn(); 1447 return (-1); 1448 1449 case SCF_ERROR_NOT_SET: 1450 case SCF_ERROR_INTERNAL: 1451 case SCF_ERROR_INVALID_ARGUMENT: 1452 case SCF_ERROR_HANDLE_MISMATCH: 1453 bad_error("_scf_snapshot_take_new", 1454 scf_error()); 1455 } 1456 } 1457 } 1458 1459 return (0); 1460 } 1461 1462 static int 1463 refresh_running_snapshot(void *entity) 1464 { 1465 scf_snapshot_t *snap; 1466 int r; 1467 1468 if ((snap = scf_snapshot_create(g_hndl)) == NULL) 1469 scfdie(); 1470 r = take_snap(entity, snap_running, snap); 1471 scf_snapshot_destroy(snap); 1472 1473 return (r); 1474 } 1475 1476 /* 1477 * Refresh entity. If isservice is zero, take entity to be an scf_instance_t *. 1478 * Otherwise take entity to be an scf_service_t * and refresh all of its child 1479 * instances. fmri is used for messages. inst, iter, and name_buf are used 1480 * for scratch space. Returns 1481 * 0 - success 1482 * ECONNABORTED - repository connection broken 1483 * ECANCELED - entity was deleted 1484 * EACCES - backend denied access 1485 * EPERM - permission denied 1486 * ENOSPC - repository server out of resources 1487 * -1 - _smf_refresh_instance_i() failed. scf_error() should be set. 1488 */ 1489 static int 1490 refresh_entity(int isservice, void *entity, const char *fmri, 1491 scf_instance_t *inst, scf_iter_t *iter, char *name_buf) 1492 { 1493 scf_error_t scfe; 1494 int r; 1495 1496 if (!isservice) { 1497 if (est->sc_repo_filename == NULL && 1498 est->sc_repo_doorname == NULL) { 1499 if (_smf_refresh_instance_i(entity) == 0) { 1500 if (g_verbose) 1501 warn(gettext("Refreshed %s.\n"), fmri); 1502 return (0); 1503 } 1504 1505 switch (scf_error()) { 1506 case SCF_ERROR_BACKEND_ACCESS: 1507 return (EACCES); 1508 1509 case SCF_ERROR_PERMISSION_DENIED: 1510 return (EPERM); 1511 1512 default: 1513 return (-1); 1514 } 1515 } else { 1516 r = refresh_running_snapshot(entity); 1517 switch (r) { 1518 case 0: 1519 break; 1520 1521 case ECONNABORTED: 1522 case ECANCELED: 1523 case EPERM: 1524 case ENOSPC: 1525 break; 1526 1527 default: 1528 bad_error("refresh_running_snapshot", 1529 scf_error()); 1530 } 1531 1532 return (r); 1533 } 1534 } 1535 1536 if (scf_iter_service_instances(iter, entity) != 0) { 1537 switch (scf_error()) { 1538 case SCF_ERROR_CONNECTION_BROKEN: 1539 return (ECONNABORTED); 1540 1541 case SCF_ERROR_DELETED: 1542 return (ECANCELED); 1543 1544 case SCF_ERROR_HANDLE_MISMATCH: 1545 case SCF_ERROR_NOT_BOUND: 1546 case SCF_ERROR_NOT_SET: 1547 default: 1548 bad_error("scf_iter_service_instances", scf_error()); 1549 } 1550 } 1551 1552 for (;;) { 1553 r = scf_iter_next_instance(iter, inst); 1554 if (r == 0) 1555 break; 1556 if (r != 1) { 1557 switch (scf_error()) { 1558 case SCF_ERROR_CONNECTION_BROKEN: 1559 return (ECONNABORTED); 1560 1561 case SCF_ERROR_DELETED: 1562 return (ECANCELED); 1563 1564 case SCF_ERROR_HANDLE_MISMATCH: 1565 case SCF_ERROR_NOT_BOUND: 1566 case SCF_ERROR_NOT_SET: 1567 case SCF_ERROR_INVALID_ARGUMENT: 1568 default: 1569 bad_error("scf_iter_next_instance", 1570 scf_error()); 1571 } 1572 } 1573 1574 if (est->sc_repo_filename != NULL || 1575 est->sc_repo_doorname != NULL) { 1576 r = refresh_running_snapshot(inst); 1577 switch (r) { 1578 case 0: 1579 continue; 1580 1581 case ECONNABORTED: 1582 case ECANCELED: 1583 case EPERM: 1584 case ENOSPC: 1585 break; 1586 default: 1587 bad_error("refresh_running_snapshot", 1588 scf_error()); 1589 } 1590 1591 return (r); 1592 1593 } 1594 1595 if (_smf_refresh_instance_i(inst) == 0) { 1596 if (g_verbose) { 1597 if (scf_instance_get_name(inst, name_buf, 1598 max_scf_name_len + 1) < 0) 1599 (void) strcpy(name_buf, "?"); 1600 1601 warn(gettext("Refreshed %s:%s.\n"), 1602 fmri, name_buf); 1603 } 1604 } else { 1605 if (scf_error() != SCF_ERROR_BACKEND_ACCESS || 1606 g_verbose) { 1607 scfe = scf_error(); 1608 1609 if (scf_instance_to_fmri(inst, name_buf, 1610 max_scf_name_len + 1) < 0) 1611 (void) strcpy(name_buf, "?"); 1612 1613 warn(gettext( 1614 "Refresh of %s:%s failed: %s.\n"), fmri, 1615 name_buf, scf_strerror(scfe)); 1616 } 1617 } 1618 } 1619 1620 return (0); 1621 } 1622 1623 static void 1624 private_refresh(void) 1625 { 1626 scf_instance_t *pinst = NULL; 1627 scf_iter_t *piter = NULL; 1628 ssize_t fmrilen; 1629 size_t bufsz; 1630 char *fmribuf; 1631 void *ent; 1632 int issvc; 1633 int r; 1634 1635 if (est->sc_repo_filename == NULL && est->sc_repo_doorname == NULL) 1636 return; 1637 1638 assert(cur_svc != NULL); 1639 1640 bufsz = max_scf_fmri_len + 1; 1641 fmribuf = safe_malloc(bufsz); 1642 if (cur_inst) { 1643 issvc = 0; 1644 ent = cur_inst; 1645 fmrilen = scf_instance_to_fmri(ent, fmribuf, bufsz); 1646 } else { 1647 issvc = 1; 1648 ent = cur_svc; 1649 fmrilen = scf_service_to_fmri(ent, fmribuf, bufsz); 1650 if ((pinst = scf_instance_create(g_hndl)) == NULL) 1651 scfdie(); 1652 1653 if ((piter = scf_iter_create(g_hndl)) == NULL) 1654 scfdie(); 1655 } 1656 if (fmrilen < 0) { 1657 free(fmribuf); 1658 if (scf_error() != SCF_ERROR_DELETED) 1659 scfdie(); 1660 1661 warn(emsg_deleted); 1662 return; 1663 } 1664 assert(fmrilen < bufsz); 1665 1666 r = refresh_entity(issvc, ent, fmribuf, pinst, piter, NULL); 1667 switch (r) { 1668 case 0: 1669 break; 1670 1671 case ECONNABORTED: 1672 warn(gettext("Could not refresh %s " 1673 "(repository connection broken).\n"), fmribuf); 1674 break; 1675 1676 case ECANCELED: 1677 warn(emsg_deleted); 1678 break; 1679 1680 case EPERM: 1681 warn(gettext("Could not refresh %s " 1682 "(permission denied).\n"), fmribuf); 1683 break; 1684 1685 case ENOSPC: 1686 warn(gettext("Could not refresh %s " 1687 "(repository server out of resources).\n"), 1688 fmribuf); 1689 break; 1690 1691 case EACCES: 1692 default: 1693 bad_error("refresh_entity", scf_error()); 1694 } 1695 1696 if (issvc) { 1697 scf_instance_destroy(pinst); 1698 scf_iter_destroy(piter); 1699 } 1700 1701 free(fmribuf); 1702 } 1703 1704 1705 static int 1706 stash_scferror_err(scf_callback_t *cbp, scf_error_t err) 1707 { 1708 cbp->sc_err = scferror2errno(err); 1709 return (UU_WALK_ERROR); 1710 } 1711 1712 static int 1713 stash_scferror(scf_callback_t *cbp) 1714 { 1715 return (stash_scferror_err(cbp, scf_error())); 1716 } 1717 1718 /* 1719 * Import. These functions import a bundle into the repository. 1720 */ 1721 1722 /* 1723 * Add a transaction entry to lcbdata->sc_trans for this property_t. Uses 1724 * sc_handle, sc_trans, and sc_flags (SCI_NOENABLED) in lcbdata. On success, 1725 * returns UU_WALK_NEXT. On error returns UU_WALK_ERROR and sets 1726 * lcbdata->sc_err to 1727 * ENOMEM - out of memory 1728 * ECONNABORTED - repository connection broken 1729 * ECANCELED - sc_trans's property group was deleted 1730 * EINVAL - p's name is invalid (error printed) 1731 * - p has an invalid value (error printed) 1732 */ 1733 static int 1734 lscf_property_import(void *v, void *pvt) 1735 { 1736 property_t *p = v; 1737 scf_callback_t *lcbdata = pvt; 1738 value_t *vp; 1739 scf_transaction_t *trans = lcbdata->sc_trans; 1740 scf_transaction_entry_t *entr; 1741 scf_value_t *val; 1742 scf_type_t tp; 1743 1744 if ((lcbdata->sc_flags & SCI_NOENABLED || 1745 lcbdata->sc_flags & SCI_DELAYENABLE) && 1746 strcmp(p->sc_property_name, SCF_PROPERTY_ENABLED) == 0) { 1747 lcbdata->sc_enable = p; 1748 return (UU_WALK_NEXT); 1749 } 1750 1751 entr = scf_entry_create(lcbdata->sc_handle); 1752 if (entr == NULL) { 1753 switch (scf_error()) { 1754 case SCF_ERROR_NO_MEMORY: 1755 return (stash_scferror(lcbdata)); 1756 1757 case SCF_ERROR_INVALID_ARGUMENT: 1758 default: 1759 bad_error("scf_entry_create", scf_error()); 1760 } 1761 } 1762 1763 tp = p->sc_value_type; 1764 1765 if (scf_transaction_property_new(trans, entr, 1766 p->sc_property_name, tp) != 0) { 1767 switch (scf_error()) { 1768 case SCF_ERROR_INVALID_ARGUMENT: 1769 semerr(emsg_invalid_prop_name, p->sc_property_name); 1770 scf_entry_destroy(entr); 1771 return (stash_scferror(lcbdata)); 1772 1773 case SCF_ERROR_EXISTS: 1774 break; 1775 1776 case SCF_ERROR_DELETED: 1777 case SCF_ERROR_CONNECTION_BROKEN: 1778 scf_entry_destroy(entr); 1779 return (stash_scferror(lcbdata)); 1780 1781 case SCF_ERROR_NOT_BOUND: 1782 case SCF_ERROR_HANDLE_MISMATCH: 1783 case SCF_ERROR_NOT_SET: 1784 default: 1785 bad_error("scf_transaction_property_new", scf_error()); 1786 } 1787 1788 if (scf_transaction_property_change_type(trans, entr, 1789 p->sc_property_name, tp) != 0) { 1790 switch (scf_error()) { 1791 case SCF_ERROR_DELETED: 1792 case SCF_ERROR_CONNECTION_BROKEN: 1793 scf_entry_destroy(entr); 1794 return (stash_scferror(lcbdata)); 1795 1796 case SCF_ERROR_INVALID_ARGUMENT: 1797 semerr(emsg_invalid_prop_name, 1798 p->sc_property_name); 1799 scf_entry_destroy(entr); 1800 return (stash_scferror(lcbdata)); 1801 1802 case SCF_ERROR_NOT_FOUND: 1803 case SCF_ERROR_NOT_SET: 1804 case SCF_ERROR_HANDLE_MISMATCH: 1805 case SCF_ERROR_NOT_BOUND: 1806 default: 1807 bad_error( 1808 "scf_transaction_property_change_type", 1809 scf_error()); 1810 } 1811 } 1812 } 1813 1814 for (vp = uu_list_first(p->sc_property_values); 1815 vp != NULL; 1816 vp = uu_list_next(p->sc_property_values, vp)) { 1817 val = scf_value_create(g_hndl); 1818 if (val == NULL) { 1819 switch (scf_error()) { 1820 case SCF_ERROR_NO_MEMORY: 1821 return (stash_scferror(lcbdata)); 1822 1823 case SCF_ERROR_INVALID_ARGUMENT: 1824 default: 1825 bad_error("scf_value_create", scf_error()); 1826 } 1827 } 1828 1829 switch (tp) { 1830 case SCF_TYPE_BOOLEAN: 1831 scf_value_set_boolean(val, vp->sc_u.sc_count); 1832 break; 1833 case SCF_TYPE_COUNT: 1834 scf_value_set_count(val, vp->sc_u.sc_count); 1835 break; 1836 case SCF_TYPE_INTEGER: 1837 scf_value_set_integer(val, vp->sc_u.sc_integer); 1838 break; 1839 default: 1840 assert(vp->sc_u.sc_string != NULL); 1841 if (scf_value_set_from_string(val, tp, 1842 vp->sc_u.sc_string) != 0) { 1843 if (scf_error() != SCF_ERROR_INVALID_ARGUMENT) 1844 bad_error("scf_value_set_from_string", 1845 scf_error()); 1846 1847 warn(gettext("Value \"%s\" is not a valid " 1848 "%s.\n"), vp->sc_u.sc_string, 1849 scf_type_to_string(tp)); 1850 scf_value_destroy(val); 1851 return (stash_scferror(lcbdata)); 1852 } 1853 break; 1854 } 1855 1856 if (scf_entry_add_value(entr, val) != 0) 1857 bad_error("scf_entry_add_value", scf_error()); 1858 } 1859 1860 return (UU_WALK_NEXT); 1861 } 1862 1863 /* 1864 * Import a pgroup_t into the repository. Uses sc_handle, sc_parent, 1865 * sc_service, sc_flags (SCI_GENERALLAST, SCI_FORCE, & SCI_KEEP), 1866 * sc_source_fmri, and sc_target_fmri in lcbdata, and uses imp_pg and imp_tx. 1867 * On success, returns UU_WALK_NEXT. On error returns UU_WALK_ERROR and sets 1868 * lcbdata->sc_err to 1869 * ECONNABORTED - repository connection broken 1870 * ENOMEM - out of memory 1871 * ENOSPC - svc.configd is out of resources 1872 * ECANCELED - sc_parent was deleted 1873 * EPERM - could not create property group (permission denied) (error printed) 1874 * - could not modify property group (permission denied) (error printed) 1875 * - could not delete property group (permission denied) (error printed) 1876 * EROFS - could not create property group (repository is read-only) 1877 * - could not delete property group (repository is read-only) 1878 * EACCES - could not create property group (backend access denied) 1879 * - could not delete property group (backend access denied) 1880 * EEXIST - could not create property group (already exists) 1881 * EINVAL - invalid property group name (error printed) 1882 * - invalid property name (error printed) 1883 * - invalid value (error printed) 1884 * EBUSY - new property group deleted (error printed) 1885 * - new property group changed (error printed) 1886 * - property group added (error printed) 1887 * - property group deleted (error printed) 1888 */ 1889 static int 1890 entity_pgroup_import(void *v, void *pvt) 1891 { 1892 pgroup_t *p = v; 1893 scf_callback_t cbdata; 1894 scf_callback_t *lcbdata = pvt; 1895 void *ent = lcbdata->sc_parent; 1896 int issvc = lcbdata->sc_service; 1897 int r; 1898 1899 const char * const pg_changed = gettext("%s changed unexpectedly " 1900 "(new property group \"%s\" changed).\n"); 1901 1902 /* Never import deleted property groups. */ 1903 if (p->sc_pgroup_delete) 1904 return (UU_WALK_NEXT); 1905 1906 if (!issvc && (lcbdata->sc_flags & SCI_GENERALLAST) && 1907 strcmp(p->sc_pgroup_name, SCF_PG_GENERAL) == 0) { 1908 lcbdata->sc_general = p; 1909 return (UU_WALK_NEXT); 1910 } 1911 1912 add_pg: 1913 if (issvc) 1914 r = scf_service_add_pg(ent, p->sc_pgroup_name, 1915 p->sc_pgroup_type, p->sc_pgroup_flags, imp_pg); 1916 else 1917 r = scf_instance_add_pg(ent, p->sc_pgroup_name, 1918 p->sc_pgroup_type, p->sc_pgroup_flags, imp_pg); 1919 if (r != 0) { 1920 switch (scf_error()) { 1921 case SCF_ERROR_DELETED: 1922 case SCF_ERROR_CONNECTION_BROKEN: 1923 case SCF_ERROR_BACKEND_READONLY: 1924 case SCF_ERROR_BACKEND_ACCESS: 1925 case SCF_ERROR_NO_RESOURCES: 1926 return (stash_scferror(lcbdata)); 1927 1928 case SCF_ERROR_EXISTS: 1929 if (lcbdata->sc_flags & SCI_FORCE) 1930 break; 1931 return (stash_scferror(lcbdata)); 1932 1933 case SCF_ERROR_INVALID_ARGUMENT: 1934 warn(emsg_fmri_invalid_pg_name_type, 1935 lcbdata->sc_source_fmri, 1936 p->sc_pgroup_name, p->sc_pgroup_type); 1937 return (stash_scferror(lcbdata)); 1938 1939 case SCF_ERROR_PERMISSION_DENIED: 1940 warn(emsg_pg_add_perm, p->sc_pgroup_name, 1941 lcbdata->sc_target_fmri); 1942 return (stash_scferror(lcbdata)); 1943 1944 case SCF_ERROR_NOT_BOUND: 1945 case SCF_ERROR_HANDLE_MISMATCH: 1946 case SCF_ERROR_NOT_SET: 1947 default: 1948 bad_error("scf_service_add_pg", scf_error()); 1949 } 1950 1951 if (entity_get_pg(ent, issvc, p->sc_pgroup_name, imp_pg) != 0) { 1952 switch (scf_error()) { 1953 case SCF_ERROR_CONNECTION_BROKEN: 1954 case SCF_ERROR_DELETED: 1955 return (stash_scferror(lcbdata)); 1956 1957 case SCF_ERROR_INVALID_ARGUMENT: 1958 warn(emsg_fmri_invalid_pg_name, 1959 lcbdata->sc_source_fmri, 1960 p->sc_pgroup_name); 1961 return (stash_scferror(lcbdata)); 1962 1963 case SCF_ERROR_NOT_FOUND: 1964 warn(emsg_pg_deleted, lcbdata->sc_target_fmri, 1965 p->sc_pgroup_name); 1966 lcbdata->sc_err = EBUSY; 1967 return (UU_WALK_ERROR); 1968 1969 case SCF_ERROR_NOT_BOUND: 1970 case SCF_ERROR_HANDLE_MISMATCH: 1971 case SCF_ERROR_NOT_SET: 1972 default: 1973 bad_error("entity_get_pg", scf_error()); 1974 } 1975 } 1976 1977 if (lcbdata->sc_flags & SCI_KEEP) 1978 goto props; 1979 1980 if (scf_pg_delete(imp_pg) != 0) { 1981 switch (scf_error()) { 1982 case SCF_ERROR_DELETED: 1983 warn(emsg_pg_deleted, lcbdata->sc_target_fmri, 1984 p->sc_pgroup_name); 1985 lcbdata->sc_err = EBUSY; 1986 return (UU_WALK_ERROR); 1987 1988 case SCF_ERROR_PERMISSION_DENIED: 1989 warn(emsg_pg_del_perm, p->sc_pgroup_name, 1990 lcbdata->sc_target_fmri); 1991 return (stash_scferror(lcbdata)); 1992 1993 case SCF_ERROR_BACKEND_READONLY: 1994 case SCF_ERROR_BACKEND_ACCESS: 1995 case SCF_ERROR_CONNECTION_BROKEN: 1996 return (stash_scferror(lcbdata)); 1997 1998 case SCF_ERROR_NOT_SET: 1999 default: 2000 bad_error("scf_pg_delete", scf_error()); 2001 } 2002 } 2003 2004 goto add_pg; 2005 } 2006 2007 props: 2008 2009 /* 2010 * Add properties to property group, if any. 2011 */ 2012 cbdata.sc_handle = lcbdata->sc_handle; 2013 cbdata.sc_parent = imp_pg; 2014 cbdata.sc_flags = lcbdata->sc_flags; 2015 cbdata.sc_trans = imp_tx; 2016 cbdata.sc_enable = NULL; 2017 2018 if (scf_transaction_start(imp_tx, imp_pg) != 0) { 2019 switch (scf_error()) { 2020 case SCF_ERROR_BACKEND_ACCESS: 2021 case SCF_ERROR_BACKEND_READONLY: 2022 case SCF_ERROR_CONNECTION_BROKEN: 2023 return (stash_scferror(lcbdata)); 2024 2025 case SCF_ERROR_DELETED: 2026 warn(pg_changed, lcbdata->sc_target_fmri, 2027 p->sc_pgroup_name); 2028 lcbdata->sc_err = EBUSY; 2029 return (UU_WALK_ERROR); 2030 2031 case SCF_ERROR_PERMISSION_DENIED: 2032 warn(emsg_pg_mod_perm, p->sc_pgroup_name, 2033 lcbdata->sc_target_fmri); 2034 return (stash_scferror(lcbdata)); 2035 2036 case SCF_ERROR_NOT_BOUND: 2037 case SCF_ERROR_NOT_SET: 2038 case SCF_ERROR_IN_USE: 2039 case SCF_ERROR_HANDLE_MISMATCH: 2040 default: 2041 bad_error("scf_transaction_start", scf_error()); 2042 } 2043 } 2044 2045 if (uu_list_walk(p->sc_pgroup_props, lscf_property_import, &cbdata, 2046 UU_DEFAULT) != 0) { 2047 if (uu_error() != UU_ERROR_CALLBACK_FAILED) 2048 bad_error("uu_list_walk", uu_error()); 2049 scf_transaction_reset(imp_tx); 2050 2051 lcbdata->sc_err = cbdata.sc_err; 2052 if (cbdata.sc_err == ECANCELED) { 2053 warn(pg_changed, lcbdata->sc_target_fmri, 2054 p->sc_pgroup_name); 2055 lcbdata->sc_err = EBUSY; 2056 } 2057 return (UU_WALK_ERROR); 2058 } 2059 2060 if ((lcbdata->sc_flags & SCI_DELAYENABLE) && cbdata.sc_enable) { 2061 cbdata.sc_flags = cbdata.sc_flags & (~SCI_DELAYENABLE); 2062 2063 /* 2064 * take the snapshot running snapshot then 2065 * import the stored general/enable property 2066 */ 2067 r = take_snap(ent, snap_running, imp_rsnap); 2068 switch (r) { 2069 case 0: 2070 break; 2071 2072 case ECONNABORTED: 2073 warn(gettext("Could not take %s snapshot on import " 2074 "(repository connection broken).\n"), 2075 snap_running); 2076 lcbdata->sc_err = r; 2077 return (UU_WALK_ERROR); 2078 case ECANCELED: 2079 warn(emsg_deleted); 2080 lcbdata->sc_err = r; 2081 return (UU_WALK_ERROR); 2082 2083 case EPERM: 2084 warn(gettext("Could not take %s snapshot " 2085 "(permission denied).\n"), snap_running); 2086 lcbdata->sc_err = r; 2087 return (UU_WALK_ERROR); 2088 2089 case ENOSPC: 2090 warn(gettext("Could not take %s snapshot" 2091 "(repository server out of resources).\n"), 2092 snap_running); 2093 lcbdata->sc_err = r; 2094 return (UU_WALK_ERROR); 2095 2096 default: 2097 bad_error("take_snap", r); 2098 } 2099 2100 r = lscf_property_import(cbdata.sc_enable, &cbdata); 2101 if (r != UU_WALK_NEXT) { 2102 if (r != UU_WALK_ERROR) 2103 bad_error("lscf_property_import", r); 2104 return (EINVAL); 2105 } 2106 } 2107 2108 r = scf_transaction_commit(imp_tx); 2109 switch (r) { 2110 case 1: 2111 r = UU_WALK_NEXT; 2112 break; 2113 2114 case 0: 2115 warn(pg_changed, lcbdata->sc_target_fmri, p->sc_pgroup_name); 2116 lcbdata->sc_err = EBUSY; 2117 r = UU_WALK_ERROR; 2118 break; 2119 2120 case -1: 2121 switch (scf_error()) { 2122 case SCF_ERROR_BACKEND_READONLY: 2123 case SCF_ERROR_BACKEND_ACCESS: 2124 case SCF_ERROR_CONNECTION_BROKEN: 2125 case SCF_ERROR_NO_RESOURCES: 2126 r = stash_scferror(lcbdata); 2127 break; 2128 2129 case SCF_ERROR_DELETED: 2130 warn(emsg_pg_deleted, lcbdata->sc_target_fmri, 2131 p->sc_pgroup_name); 2132 lcbdata->sc_err = EBUSY; 2133 r = UU_WALK_ERROR; 2134 break; 2135 2136 case SCF_ERROR_PERMISSION_DENIED: 2137 warn(emsg_pg_mod_perm, p->sc_pgroup_name, 2138 lcbdata->sc_target_fmri); 2139 r = stash_scferror(lcbdata); 2140 break; 2141 2142 case SCF_ERROR_NOT_SET: 2143 case SCF_ERROR_INVALID_ARGUMENT: 2144 case SCF_ERROR_NOT_BOUND: 2145 default: 2146 bad_error("scf_transaction_commit", scf_error()); 2147 } 2148 break; 2149 2150 default: 2151 bad_error("scf_transaction_commit", r); 2152 } 2153 2154 scf_transaction_destroy_children(imp_tx); 2155 2156 return (r); 2157 } 2158 2159 /* 2160 * Returns 2161 * 0 - success 2162 * ECONNABORTED - repository connection broken 2163 * ENOMEM - out of memory 2164 * ENOSPC - svc.configd is out of resources 2165 * ECANCELED - inst was deleted 2166 * EPERM - could not create property group (permission denied) (error printed) 2167 * - could not modify property group (permission denied) (error printed) 2168 * EROFS - could not create property group (repository is read-only) 2169 * EACCES - could not create property group (backend access denied) 2170 * EEXIST - could not create property group (already exists) 2171 * EINVAL - invalid property group name (error printed) 2172 * - invalid property name (error printed) 2173 * - invalid value (error printed) 2174 * EBUSY - new property group changed (error printed) 2175 */ 2176 static int 2177 lscf_import_service_pgs(scf_service_t *svc, const char *target_fmri, 2178 const entity_t *isvc, int flags) 2179 { 2180 scf_callback_t cbdata; 2181 2182 cbdata.sc_handle = scf_service_handle(svc); 2183 cbdata.sc_parent = svc; 2184 cbdata.sc_service = 1; 2185 cbdata.sc_general = 0; 2186 cbdata.sc_enable = 0; 2187 cbdata.sc_flags = flags; 2188 cbdata.sc_source_fmri = isvc->sc_fmri; 2189 cbdata.sc_target_fmri = target_fmri; 2190 2191 if (uu_list_walk(isvc->sc_pgroups, entity_pgroup_import, &cbdata, 2192 UU_DEFAULT) != 0) { 2193 if (uu_error() != UU_ERROR_CALLBACK_FAILED) 2194 bad_error("uu_list_walk", uu_error()); 2195 2196 return (cbdata.sc_err); 2197 } 2198 2199 return (0); 2200 } 2201 2202 /* 2203 * Returns 2204 * 0 - success 2205 * ECONNABORTED - repository connection broken 2206 * ENOMEM - out of memory 2207 * ENOSPC - svc.configd is out of resources 2208 * ECANCELED - inst was deleted 2209 * EPERM - could not create property group (permission denied) (error printed) 2210 * - could not modify property group (permission denied) (error printed) 2211 * EROFS - could not create property group (repository is read-only) 2212 * EACCES - could not create property group (backend access denied) 2213 * EEXIST - could not create property group (already exists) 2214 * EINVAL - invalid property group name (error printed) 2215 * - invalid property name (error printed) 2216 * - invalid value (error printed) 2217 * EBUSY - new property group changed (error printed) 2218 */ 2219 static int 2220 lscf_import_instance_pgs(scf_instance_t *inst, const char *target_fmri, 2221 const entity_t *iinst, int flags) 2222 { 2223 scf_callback_t cbdata; 2224 2225 cbdata.sc_handle = scf_instance_handle(inst); 2226 cbdata.sc_parent = inst; 2227 cbdata.sc_service = 0; 2228 cbdata.sc_general = NULL; 2229 cbdata.sc_enable = NULL; 2230 cbdata.sc_flags = flags; 2231 cbdata.sc_source_fmri = iinst->sc_fmri; 2232 cbdata.sc_target_fmri = target_fmri; 2233 2234 if (uu_list_walk(iinst->sc_pgroups, entity_pgroup_import, &cbdata, 2235 UU_DEFAULT) != 0) { 2236 if (uu_error() != UU_ERROR_CALLBACK_FAILED) 2237 bad_error("uu_list_walk", uu_error()); 2238 2239 return (cbdata.sc_err); 2240 } 2241 2242 if ((flags & SCI_GENERALLAST) && cbdata.sc_general) { 2243 cbdata.sc_flags = flags & (~SCI_GENERALLAST); 2244 /* 2245 * If importing with the SCI_NOENABLED flag then 2246 * skip the delay, but if not then add the delay 2247 * of the enable property. 2248 */ 2249 if (!(cbdata.sc_flags & SCI_NOENABLED)) { 2250 cbdata.sc_flags |= SCI_DELAYENABLE; 2251 } 2252 2253 if (entity_pgroup_import(cbdata.sc_general, &cbdata) 2254 != UU_WALK_NEXT) 2255 return (cbdata.sc_err); 2256 } 2257 2258 return (0); 2259 } 2260 2261 /* 2262 * Report the reasons why we can't upgrade pg2 to pg1. 2263 */ 2264 static void 2265 report_pg_diffs(const pgroup_t *pg1, const pgroup_t *pg2, const char *fmri, 2266 int new) 2267 { 2268 property_t *p1, *p2; 2269 2270 assert(strcmp(pg1->sc_pgroup_name, pg2->sc_pgroup_name) == 0); 2271 2272 if (!pg_attrs_equal(pg1, pg2, fmri, new)) 2273 return; 2274 2275 for (p1 = uu_list_first(pg1->sc_pgroup_props); 2276 p1 != NULL; 2277 p1 = uu_list_next(pg1->sc_pgroup_props, p1)) { 2278 p2 = uu_list_find(pg2->sc_pgroup_props, p1, NULL, NULL); 2279 if (p2 != NULL) { 2280 (void) prop_equal(p1, p2, fmri, pg1->sc_pgroup_name, 2281 new); 2282 continue; 2283 } 2284 2285 if (new) 2286 warn(gettext("Conflict upgrading %s (new property " 2287 "group \"%s\" is missing property \"%s\").\n"), 2288 fmri, pg1->sc_pgroup_name, p1->sc_property_name); 2289 else 2290 warn(gettext("Conflict upgrading %s (property " 2291 "\"%s/%s\" is missing).\n"), fmri, 2292 pg1->sc_pgroup_name, p1->sc_property_name); 2293 } 2294 2295 /* 2296 * Since pg1 should be from the manifest, any properties in pg2 which 2297 * aren't in pg1 shouldn't be reported as conflicts. 2298 */ 2299 } 2300 2301 /* 2302 * Add transaction entries to tx which will upgrade cur's pg according to old 2303 * & new. 2304 * 2305 * Returns 2306 * 0 - success 2307 * EINVAL - new has a property with an invalid name or value (message emitted) 2308 * ENOMEM - out of memory 2309 */ 2310 static int 2311 add_upgrade_entries(scf_transaction_t *tx, pgroup_t *old, pgroup_t *new, 2312 pgroup_t *cur, int speak, const char *fmri) 2313 { 2314 property_t *p, *new_p, *cur_p; 2315 scf_transaction_entry_t *e; 2316 int r; 2317 int is_general; 2318 int is_protected; 2319 2320 if (uu_list_walk(new->sc_pgroup_props, clear_int, 2321 (void *)offsetof(property_t, sc_seen), UU_DEFAULT) != 0) 2322 bad_error("uu_list_walk", uu_error()); 2323 2324 is_general = strcmp(old->sc_pgroup_name, SCF_PG_GENERAL) == 0; 2325 2326 for (p = uu_list_first(old->sc_pgroup_props); 2327 p != NULL; 2328 p = uu_list_next(old->sc_pgroup_props, p)) { 2329 /* p is a property in the old property group. */ 2330 2331 /* Protect live properties. */ 2332 is_protected = 0; 2333 if (is_general) { 2334 if (strcmp(p->sc_property_name, SCF_PROPERTY_ENABLED) == 2335 0 || 2336 strcmp(p->sc_property_name, 2337 SCF_PROPERTY_RESTARTER) == 0) 2338 is_protected = 1; 2339 } 2340 2341 /* Look for the same property in the new properties. */ 2342 new_p = uu_list_find(new->sc_pgroup_props, p, NULL, NULL); 2343 if (new_p != NULL) { 2344 new_p->sc_seen = 1; 2345 2346 /* 2347 * If the new property is the same as the old, don't do 2348 * anything (leave any user customizations). 2349 */ 2350 if (prop_equal(p, new_p, NULL, NULL, 0)) 2351 continue; 2352 2353 if (new_p->sc_property_override) 2354 goto upgrade; 2355 } 2356 2357 cur_p = uu_list_find(cur->sc_pgroup_props, p, NULL, NULL); 2358 if (cur_p == NULL) { 2359 /* 2360 * p has been deleted from the repository. If we were 2361 * going to delete it anyway, do nothing. Otherwise 2362 * report a conflict. 2363 */ 2364 if (new_p == NULL) 2365 continue; 2366 2367 if (is_protected) 2368 continue; 2369 2370 warn(gettext("Conflict upgrading %s " 2371 "(property \"%s/%s\" is missing).\n"), fmri, 2372 old->sc_pgroup_name, p->sc_property_name); 2373 continue; 2374 } 2375 2376 if (!prop_equal(p, cur_p, NULL, NULL, 0)) { 2377 /* 2378 * Conflict. Don't warn if the property is already the 2379 * way we want it, though. 2380 */ 2381 if (is_protected) 2382 continue; 2383 2384 if (new_p == NULL) 2385 (void) prop_equal(p, cur_p, fmri, 2386 old->sc_pgroup_name, 0); 2387 else 2388 (void) prop_equal(cur_p, new_p, fmri, 2389 old->sc_pgroup_name, 0); 2390 continue; 2391 } 2392 2393 if (is_protected) { 2394 if (speak) 2395 warn(gettext("%s: Refusing to upgrade " 2396 "\"%s/%s\" (live property).\n"), fmri, 2397 old->sc_pgroup_name, p->sc_property_name); 2398 continue; 2399 } 2400 2401 upgrade: 2402 /* p hasn't been customized in the repository. Upgrade it. */ 2403 if (new_p == NULL) { 2404 /* p was deleted. Delete from cur if unchanged. */ 2405 if (speak) 2406 warn(gettext( 2407 "%s: Deleting property \"%s/%s\".\n"), 2408 fmri, old->sc_pgroup_name, 2409 p->sc_property_name); 2410 2411 e = scf_entry_create(g_hndl); 2412 if (e == NULL) 2413 return (ENOMEM); 2414 2415 if (scf_transaction_property_delete(tx, e, 2416 p->sc_property_name) != 0) { 2417 switch (scf_error()) { 2418 case SCF_ERROR_DELETED: 2419 scf_entry_destroy(e); 2420 return (ECANCELED); 2421 2422 case SCF_ERROR_CONNECTION_BROKEN: 2423 scf_entry_destroy(e); 2424 return (ECONNABORTED); 2425 2426 case SCF_ERROR_NOT_FOUND: 2427 /* 2428 * This can happen if cur is from the 2429 * running snapshot (and it differs 2430 * from the live properties). 2431 */ 2432 scf_entry_destroy(e); 2433 break; 2434 2435 case SCF_ERROR_HANDLE_MISMATCH: 2436 case SCF_ERROR_NOT_BOUND: 2437 case SCF_ERROR_NOT_SET: 2438 case SCF_ERROR_INVALID_ARGUMENT: 2439 default: 2440 bad_error( 2441 "scf_transaction_property_delete", 2442 scf_error()); 2443 } 2444 } 2445 } else { 2446 scf_callback_t ctx; 2447 2448 if (speak) 2449 warn(gettext( 2450 "%s: Upgrading property \"%s/%s\".\n"), 2451 fmri, old->sc_pgroup_name, 2452 p->sc_property_name); 2453 2454 ctx.sc_handle = g_hndl; 2455 ctx.sc_trans = tx; 2456 ctx.sc_flags = 0; 2457 2458 r = lscf_property_import(new_p, &ctx); 2459 if (r != UU_WALK_NEXT) { 2460 if (r != UU_WALK_ERROR) 2461 bad_error("lscf_property_import", r); 2462 return (EINVAL); 2463 } 2464 } 2465 } 2466 2467 /* Go over the properties which were added. */ 2468 for (new_p = uu_list_first(new->sc_pgroup_props); 2469 new_p != NULL; 2470 new_p = uu_list_next(new->sc_pgroup_props, new_p)) { 2471 if (new_p->sc_seen) 2472 continue; 2473 2474 /* This is a new property. */ 2475 cur_p = uu_list_find(cur->sc_pgroup_props, new_p, NULL, NULL); 2476 if (cur_p == NULL) { 2477 scf_callback_t ctx; 2478 2479 ctx.sc_handle = g_hndl; 2480 ctx.sc_trans = tx; 2481 ctx.sc_flags = 0; 2482 2483 r = lscf_property_import(new_p, &ctx); 2484 if (r != UU_WALK_NEXT) { 2485 if (r != UU_WALK_ERROR) 2486 bad_error("lscf_property_import", r); 2487 return (EINVAL); 2488 } 2489 continue; 2490 } 2491 2492 /* 2493 * Report a conflict if the new property differs from the 2494 * current one. Unless it's general/enabled, since that's 2495 * never in the last-import snapshot. 2496 */ 2497 if (strcmp(new_p->sc_property_name, SCF_PROPERTY_ENABLED) == 2498 0 && 2499 strcmp(cur->sc_pgroup_name, SCF_PG_GENERAL) == 0) 2500 continue; 2501 2502 (void) prop_equal(cur_p, new_p, fmri, old->sc_pgroup_name, 1); 2503 } 2504 2505 return (0); 2506 } 2507 2508 /* 2509 * Upgrade pg according to old & new. 2510 * 2511 * Returns 2512 * 0 - success 2513 * ECONNABORTED - repository connection broken 2514 * ENOMEM - out of memory 2515 * ENOSPC - svc.configd is out of resources 2516 * ECANCELED - pg was deleted 2517 * EPERM - couldn't modify pg (permission denied) 2518 * EROFS - couldn't modify pg (backend read-only) 2519 * EACCES - couldn't modify pg (backend access denied) 2520 * EINVAL - new has a property with invalid name or value (error printed) 2521 * EBUSY - pg changed unexpectedly 2522 */ 2523 static int 2524 upgrade_pg(scf_propertygroup_t *pg, pgroup_t *cur, pgroup_t *old, 2525 pgroup_t *new, int speak, const char *fmri) 2526 { 2527 int r; 2528 2529 if (scf_transaction_start(imp_tx, pg) != 0) { 2530 switch (scf_error()) { 2531 case SCF_ERROR_CONNECTION_BROKEN: 2532 case SCF_ERROR_DELETED: 2533 case SCF_ERROR_PERMISSION_DENIED: 2534 case SCF_ERROR_BACKEND_READONLY: 2535 case SCF_ERROR_BACKEND_ACCESS: 2536 return (scferror2errno(scf_error())); 2537 2538 case SCF_ERROR_HANDLE_MISMATCH: 2539 case SCF_ERROR_IN_USE: 2540 case SCF_ERROR_NOT_BOUND: 2541 case SCF_ERROR_NOT_SET: 2542 default: 2543 bad_error("scf_transaction_start", scf_error()); 2544 } 2545 } 2546 2547 r = add_upgrade_entries(imp_tx, old, new, cur, speak, fmri); 2548 switch (r) { 2549 case 0: 2550 break; 2551 2552 case EINVAL: 2553 case ENOMEM: 2554 scf_transaction_destroy_children(imp_tx); 2555 return (r); 2556 2557 default: 2558 bad_error("add_upgrade_entries", r); 2559 } 2560 2561 r = scf_transaction_commit(imp_tx); 2562 2563 scf_transaction_destroy_children(imp_tx); 2564 2565 switch (r) { 2566 case 1: 2567 break; 2568 2569 case 0: 2570 return (EBUSY); 2571 2572 case -1: 2573 switch (scf_error()) { 2574 case SCF_ERROR_CONNECTION_BROKEN: 2575 case SCF_ERROR_NO_RESOURCES: 2576 case SCF_ERROR_PERMISSION_DENIED: 2577 case SCF_ERROR_BACKEND_READONLY: 2578 case SCF_ERROR_BACKEND_ACCESS: 2579 case SCF_ERROR_DELETED: 2580 return (scferror2errno(scf_error())); 2581 2582 case SCF_ERROR_NOT_BOUND: 2583 case SCF_ERROR_INVALID_ARGUMENT: 2584 case SCF_ERROR_NOT_SET: 2585 default: 2586 bad_error("scf_transaction_commit", scf_error()); 2587 } 2588 2589 default: 2590 bad_error("scf_transaction_commit", r); 2591 } 2592 2593 return (0); 2594 } 2595 2596 /* 2597 * Compares two entity FMRIs. Returns 2598 * 2599 * 1 - equal 2600 * 0 - not equal 2601 * -1 - f1 is invalid or not an entity 2602 * -2 - f2 is invalid or not an entity 2603 */ 2604 static int 2605 fmri_equal(const char *f1, const char *f2) 2606 { 2607 int r; 2608 const char *s1, *i1, *pg1; 2609 const char *s2, *i2, *pg2; 2610 2611 if (strlcpy(imp_fe1, f1, max_scf_fmri_len + 1) >= max_scf_fmri_len + 1) 2612 return (-1); 2613 if (scf_parse_svc_fmri(imp_fe1, NULL, &s1, &i1, &pg1, NULL) != 0) 2614 return (-1); 2615 2616 if (s1 == NULL || pg1 != NULL) 2617 return (-1); 2618 2619 if (strlcpy(imp_fe2, f2, max_scf_fmri_len + 1) >= max_scf_fmri_len + 1) 2620 return (-2); 2621 if (scf_parse_svc_fmri(imp_fe2, NULL, &s2, &i2, &pg2, NULL) != 0) 2622 return (-2); 2623 2624 if (s2 == NULL || pg2 != NULL) 2625 return (-2); 2626 2627 r = strcmp(s1, s2); 2628 if (r != 0) 2629 return (0); 2630 2631 if (i1 == NULL && i2 == NULL) 2632 return (1); 2633 2634 if (i1 == NULL || i2 == NULL) 2635 return (0); 2636 2637 return (strcmp(i1, i2) == 0); 2638 } 2639 2640 /* 2641 * Import a dependent by creating a dependency property group in the dependent 2642 * entity. If lcbdata->sc_trans is set, assume it's been started on the 2643 * dependents pg, and add an entry to create a new property for this 2644 * dependent. Uses sc_handle, sc_trans, and sc_fmri in lcbdata. 2645 * 2646 * On success, returns UU_WALK_NEXT. On error, returns UU_WALK_ERROR and sets 2647 * lcbdata->sc_err to 2648 * ECONNABORTED - repository connection broken 2649 * ENOMEM - out of memory 2650 * ENOSPC - configd is out of resources 2651 * EINVAL - target is invalid (error printed) 2652 * - target is not an entity (error printed) 2653 * - dependent has invalid name (error printed) 2654 * - invalid property name (error printed) 2655 * - invalid value (error printed) 2656 * - scope of target does not exist (error printed) 2657 * EPERM - couldn't create target (permission denied) (error printed) 2658 * - couldn't create dependency pg (permission denied) (error printed) 2659 * - couldn't modify dependency pg (permission denied) (error printed) 2660 * EROFS - couldn't create target (repository read-only) 2661 * - couldn't create dependency pg (repository read-only) 2662 * EACCES - couldn't create target (backend access denied) 2663 * - couldn't create dependency pg (backend access denied) 2664 * ECANCELED - sc_trans's pg was deleted 2665 * EALREADY - property for dependent already exists in sc_trans's pg 2666 * EEXIST - dependency pg already exists in target (error printed) 2667 * EBUSY - target deleted (error printed) 2668 * - property group changed during import (error printed) 2669 */ 2670 static int 2671 lscf_dependent_import(void *a1, void *pvt) 2672 { 2673 pgroup_t *pgrp = a1; 2674 scf_callback_t *lcbdata = pvt; 2675 2676 int isservice; 2677 int ret; 2678 scf_transaction_entry_t *e; 2679 scf_value_t *val; 2680 scf_callback_t dependent_cbdata; 2681 scf_error_t scfe; 2682 2683 /* 2684 * Decode the FMRI into dependent_cbdata->sc_parent. Do it here so if 2685 * it's invalid, we fail before modifying the repository. 2686 */ 2687 scfe = fmri_to_entity(lcbdata->sc_handle, pgrp->sc_pgroup_fmri, 2688 &dependent_cbdata.sc_parent, &isservice); 2689 switch (scfe) { 2690 case SCF_ERROR_NONE: 2691 break; 2692 2693 case SCF_ERROR_NO_MEMORY: 2694 return (stash_scferror_err(lcbdata, scfe)); 2695 2696 case SCF_ERROR_INVALID_ARGUMENT: 2697 semerr(gettext("The FMRI for the \"%s\" dependent is " 2698 "invalid.\n"), pgrp->sc_pgroup_name); 2699 return (stash_scferror_err(lcbdata, scfe)); 2700 2701 case SCF_ERROR_CONSTRAINT_VIOLATED: 2702 semerr(gettext("The FMRI \"%s\" for the \"%s\" dependent " 2703 "specifies neither a service nor an instance.\n"), 2704 pgrp->sc_pgroup_fmri, pgrp->sc_pgroup_name); 2705 return (stash_scferror_err(lcbdata, scfe)); 2706 2707 case SCF_ERROR_NOT_FOUND: 2708 scfe = create_entity(lcbdata->sc_handle, pgrp->sc_pgroup_fmri, 2709 &dependent_cbdata.sc_parent, &isservice); 2710 switch (scfe) { 2711 case SCF_ERROR_NONE: 2712 break; 2713 2714 case SCF_ERROR_NO_MEMORY: 2715 case SCF_ERROR_BACKEND_READONLY: 2716 case SCF_ERROR_BACKEND_ACCESS: 2717 return (stash_scferror_err(lcbdata, scfe)); 2718 2719 case SCF_ERROR_NOT_FOUND: 2720 semerr(gettext("The scope in FMRI \"%s\" for the " 2721 "\"%s\" dependent does not exist.\n"), 2722 pgrp->sc_pgroup_fmri, pgrp->sc_pgroup_name); 2723 lcbdata->sc_err = EINVAL; 2724 return (UU_WALK_ERROR); 2725 2726 case SCF_ERROR_PERMISSION_DENIED: 2727 warn(gettext( 2728 "Could not create %s (permission denied).\n"), 2729 pgrp->sc_pgroup_fmri); 2730 return (stash_scferror_err(lcbdata, scfe)); 2731 2732 case SCF_ERROR_INVALID_ARGUMENT: 2733 case SCF_ERROR_CONSTRAINT_VIOLATED: 2734 default: 2735 bad_error("create_entity", scfe); 2736 } 2737 break; 2738 2739 default: 2740 bad_error("fmri_to_entity", scfe); 2741 } 2742 2743 if (lcbdata->sc_trans != NULL) { 2744 e = scf_entry_create(lcbdata->sc_handle); 2745 if (e == NULL) { 2746 if (scf_error() != SCF_ERROR_NO_MEMORY) 2747 bad_error("scf_entry_create", scf_error()); 2748 2749 entity_destroy(dependent_cbdata.sc_parent, isservice); 2750 return (stash_scferror(lcbdata)); 2751 } 2752 2753 if (scf_transaction_property_new(lcbdata->sc_trans, e, 2754 pgrp->sc_pgroup_name, SCF_TYPE_FMRI) != 0) { 2755 switch (scf_error()) { 2756 case SCF_ERROR_INVALID_ARGUMENT: 2757 warn(gettext("Dependent of %s has invalid name " 2758 "\"%s\".\n"), pgrp->sc_parent->sc_fmri, 2759 pgrp->sc_pgroup_name); 2760 /* FALLTHROUGH */ 2761 2762 case SCF_ERROR_DELETED: 2763 case SCF_ERROR_CONNECTION_BROKEN: 2764 scf_entry_destroy(e); 2765 entity_destroy(dependent_cbdata.sc_parent, 2766 isservice); 2767 return (stash_scferror(lcbdata)); 2768 2769 case SCF_ERROR_EXISTS: 2770 scf_entry_destroy(e); 2771 entity_destroy(dependent_cbdata.sc_parent, 2772 isservice); 2773 lcbdata->sc_err = EALREADY; 2774 return (UU_WALK_ERROR); 2775 2776 case SCF_ERROR_NOT_BOUND: 2777 case SCF_ERROR_HANDLE_MISMATCH: 2778 case SCF_ERROR_NOT_SET: 2779 default: 2780 bad_error("scf_transaction_property_new", 2781 scf_error()); 2782 } 2783 } 2784 2785 val = scf_value_create(lcbdata->sc_handle); 2786 if (val == NULL) { 2787 if (scf_error() != SCF_ERROR_NO_MEMORY) 2788 bad_error("scf_value_create", scf_error()); 2789 2790 entity_destroy(dependent_cbdata.sc_parent, isservice); 2791 return (stash_scferror(lcbdata)); 2792 } 2793 2794 if (scf_value_set_from_string(val, SCF_TYPE_FMRI, 2795 pgrp->sc_pgroup_fmri) != 0) 2796 /* invalid should have been caught above */ 2797 bad_error("scf_value_set_from_string", scf_error()); 2798 2799 if (scf_entry_add_value(e, val) != 0) 2800 bad_error("scf_entry_add_value", scf_error()); 2801 } 2802 2803 /* Add the property group to the target entity. */ 2804 2805 dependent_cbdata.sc_handle = lcbdata->sc_handle; 2806 dependent_cbdata.sc_flags = 0; 2807 dependent_cbdata.sc_source_fmri = lcbdata->sc_source_fmri; 2808 dependent_cbdata.sc_target_fmri = pgrp->sc_pgroup_fmri; 2809 2810 ret = entity_pgroup_import(pgrp, &dependent_cbdata); 2811 2812 entity_destroy(dependent_cbdata.sc_parent, isservice); 2813 2814 if (ret == UU_WALK_NEXT) 2815 return (ret); 2816 2817 if (ret != UU_WALK_ERROR) 2818 bad_error("entity_pgroup_import", ret); 2819 2820 switch (dependent_cbdata.sc_err) { 2821 case ECANCELED: 2822 warn(gettext("%s deleted unexpectedly.\n"), 2823 pgrp->sc_pgroup_fmri); 2824 lcbdata->sc_err = EBUSY; 2825 break; 2826 2827 case EEXIST: 2828 warn(gettext("Could not create \"%s\" dependency in %s " 2829 "(already exists).\n"), pgrp->sc_pgroup_name, 2830 pgrp->sc_pgroup_fmri); 2831 /* FALLTHROUGH */ 2832 2833 default: 2834 lcbdata->sc_err = dependent_cbdata.sc_err; 2835 } 2836 2837 return (UU_WALK_ERROR); 2838 } 2839 2840 static int upgrade_dependent(const scf_property_t *, const entity_t *, 2841 const scf_snaplevel_t *, scf_transaction_t *); 2842 static int handle_dependent_conflict(const entity_t *, const scf_property_t *, 2843 const pgroup_t *); 2844 2845 /* 2846 * Upgrade uncustomized dependents of ent to those specified in ient. Read 2847 * the current dependent targets from running (the snaplevel of a running 2848 * snapshot which corresponds to ient) if not NULL (ent, an scf_service_t * or 2849 * scf_instance_t * according to ient, otherwise). Draw the ancestral 2850 * dependent targets and dependency properties from li_dpts_pg (the 2851 * "dependents" property group in snpl) and snpl (the snaplevel which 2852 * corresponds to ent in a last-import snapshot). If li_dpts_pg is NULL, then 2853 * snpl doesn't have a "dependents" property group, and any dependents in ient 2854 * are new. 2855 * 2856 * Returns 2857 * 0 - success 2858 * ECONNABORTED - repository connection broken 2859 * ENOMEM - out of memory 2860 * ENOSPC - configd is out of resources 2861 * ECANCELED - ent was deleted 2862 * ENODEV - the entity containing li_dpts_pg was deleted 2863 * EPERM - could not modify dependents pg (permission denied) (error printed) 2864 * - couldn't upgrade dependent (permission denied) (error printed) 2865 * - couldn't create dependent (permission denied) (error printed) 2866 * EROFS - could not modify dependents pg (repository read-only) 2867 * - couldn't upgrade dependent (repository read-only) 2868 * - couldn't create dependent (repository read-only) 2869 * EACCES - could not modify dependents pg (backend access denied) 2870 * - could not upgrade dependent (backend access denied) 2871 * - could not create dependent (backend access denied) 2872 * EBUSY - "dependents" pg of ent added, changed, or deleted (error printed) 2873 * - dependent target deleted (error printed) 2874 * - dependent pg changed (error printed) 2875 * EINVAL - new dependent is invalid (error printed) 2876 * EBADF - snpl is corrupt (error printed) 2877 * - snpl has corrupt pg (error printed) 2878 * - dependency pg in target is corrupt (error printed) 2879 * - target has corrupt snapshot (error printed) 2880 * EEXIST - dependency pg already existed in target service (error printed) 2881 */ 2882 static int 2883 upgrade_dependents(const scf_propertygroup_t *li_dpts_pg, 2884 const scf_snaplevel_t *snpl, const entity_t *ient, 2885 const scf_snaplevel_t *running, void *ent) 2886 { 2887 pgroup_t *new_dpt_pgroup; 2888 scf_callback_t cbdata; 2889 int r, unseen, tx_started = 0; 2890 int have_cur_depts; 2891 2892 const char * const dependents = "dependents"; 2893 2894 const int issvc = (ient->sc_etype == SVCCFG_SERVICE_OBJECT); 2895 2896 if (li_dpts_pg == NULL && uu_list_numnodes(ient->sc_dependents) == 0) 2897 /* Nothing to do. */ 2898 return (0); 2899 2900 /* Fetch the current version of the "dependents" property group. */ 2901 have_cur_depts = 1; 2902 if (entity_get_pg(ent, issvc, dependents, ud_cur_depts_pg) != 0) { 2903 switch (scf_error()) { 2904 case SCF_ERROR_NOT_FOUND: 2905 break; 2906 2907 case SCF_ERROR_DELETED: 2908 case SCF_ERROR_CONNECTION_BROKEN: 2909 return (scferror2errno(scf_error())); 2910 2911 case SCF_ERROR_NOT_SET: 2912 case SCF_ERROR_INVALID_ARGUMENT: 2913 case SCF_ERROR_HANDLE_MISMATCH: 2914 case SCF_ERROR_NOT_BOUND: 2915 default: 2916 bad_error("entity_get_pg", scf_error()); 2917 } 2918 2919 have_cur_depts = 0; 2920 } 2921 2922 /* Fetch the running version of the "dependents" property group. */ 2923 ud_run_dpts_pg_set = 0; 2924 if (running != NULL) 2925 r = scf_snaplevel_get_pg(running, dependents, ud_run_dpts_pg); 2926 else 2927 r = entity_get_pg(ent, issvc, dependents, ud_run_dpts_pg); 2928 if (r == 0) { 2929 ud_run_dpts_pg_set = 1; 2930 } else { 2931 switch (scf_error()) { 2932 case SCF_ERROR_NOT_FOUND: 2933 break; 2934 2935 case SCF_ERROR_DELETED: 2936 case SCF_ERROR_CONNECTION_BROKEN: 2937 return (scferror2errno(scf_error())); 2938 2939 case SCF_ERROR_NOT_SET: 2940 case SCF_ERROR_INVALID_ARGUMENT: 2941 case SCF_ERROR_HANDLE_MISMATCH: 2942 case SCF_ERROR_NOT_BOUND: 2943 default: 2944 bad_error(running ? "scf_snaplevel_get_pg" : 2945 "entity_get_pg", scf_error()); 2946 } 2947 } 2948 2949 /* 2950 * Clear the seen fields of the dependents, so we can tell which ones 2951 * are new. 2952 */ 2953 if (uu_list_walk(ient->sc_dependents, clear_int, 2954 (void *)offsetof(pgroup_t, sc_pgroup_seen), UU_DEFAULT) != 0) 2955 bad_error("uu_list_walk", uu_error()); 2956 2957 if (li_dpts_pg != NULL) { 2958 /* 2959 * Each property in li_dpts_pg represents a dependent tag in 2960 * the old manifest. For each, call upgrade_dependent(), 2961 * which will change ud_cur_depts_pg or dependencies in other 2962 * services as appropriate. Note (a) that changes to 2963 * ud_cur_depts_pg are accumulated in ud_tx so they can all be 2964 * made en masse, and (b) it's ok if the entity doesn't have 2965 * a current version of the "dependents" property group, 2966 * because we'll just consider all dependents as customized 2967 * (by being deleted). 2968 */ 2969 2970 if (scf_iter_pg_properties(ud_iter, li_dpts_pg) != 0) { 2971 switch (scf_error()) { 2972 case SCF_ERROR_DELETED: 2973 return (ENODEV); 2974 2975 case SCF_ERROR_CONNECTION_BROKEN: 2976 return (ECONNABORTED); 2977 2978 case SCF_ERROR_HANDLE_MISMATCH: 2979 case SCF_ERROR_NOT_BOUND: 2980 case SCF_ERROR_NOT_SET: 2981 default: 2982 bad_error("scf_iter_pg_properties", 2983 scf_error()); 2984 } 2985 } 2986 2987 if (have_cur_depts && 2988 scf_transaction_start(ud_tx, ud_cur_depts_pg) != 0) { 2989 switch (scf_error()) { 2990 case SCF_ERROR_BACKEND_ACCESS: 2991 case SCF_ERROR_BACKEND_READONLY: 2992 case SCF_ERROR_CONNECTION_BROKEN: 2993 return (scferror2errno(scf_error())); 2994 2995 case SCF_ERROR_DELETED: 2996 warn(emsg_pg_deleted, ient->sc_fmri, 2997 dependents); 2998 return (EBUSY); 2999 3000 case SCF_ERROR_PERMISSION_DENIED: 3001 warn(emsg_pg_mod_perm, dependents, 3002 ient->sc_fmri); 3003 return (scferror2errno(scf_error())); 3004 3005 case SCF_ERROR_HANDLE_MISMATCH: 3006 case SCF_ERROR_IN_USE: 3007 case SCF_ERROR_NOT_BOUND: 3008 case SCF_ERROR_NOT_SET: 3009 default: 3010 bad_error("scf_transaction_start", scf_error()); 3011 } 3012 } 3013 tx_started = have_cur_depts; 3014 3015 for (;;) { 3016 r = scf_iter_next_property(ud_iter, ud_dpt_prop); 3017 if (r == 0) 3018 break; 3019 if (r == 1) { 3020 r = upgrade_dependent(ud_dpt_prop, ient, snpl, 3021 tx_started ? ud_tx : NULL); 3022 switch (r) { 3023 case 0: 3024 continue; 3025 3026 case ECONNABORTED: 3027 case ENOMEM: 3028 case ENOSPC: 3029 case EBADF: 3030 case EBUSY: 3031 case EINVAL: 3032 case EPERM: 3033 case EROFS: 3034 case EACCES: 3035 case EEXIST: 3036 break; 3037 3038 case ECANCELED: 3039 r = ENODEV; 3040 break; 3041 3042 default: 3043 bad_error("upgrade_dependent", r); 3044 } 3045 3046 if (tx_started) 3047 scf_transaction_destroy_children(ud_tx); 3048 return (r); 3049 } 3050 if (r != -1) 3051 bad_error("scf_iter_next_property", r); 3052 3053 switch (scf_error()) { 3054 case SCF_ERROR_DELETED: 3055 r = ENODEV; 3056 break; 3057 3058 case SCF_ERROR_CONNECTION_BROKEN: 3059 r = ECONNABORTED; 3060 break; 3061 3062 case SCF_ERROR_NOT_SET: 3063 case SCF_ERROR_INVALID_ARGUMENT: 3064 case SCF_ERROR_NOT_BOUND: 3065 case SCF_ERROR_HANDLE_MISMATCH: 3066 default: 3067 bad_error("scf_iter_next_property", 3068 scf_error()); 3069 } 3070 3071 if (tx_started) 3072 scf_transaction_destroy_children(ud_tx); 3073 return (r); 3074 } 3075 } 3076 3077 /* import unseen dependents */ 3078 unseen = 0; 3079 for (new_dpt_pgroup = uu_list_first(ient->sc_dependents); 3080 new_dpt_pgroup != NULL; 3081 new_dpt_pgroup = uu_list_next(ient->sc_dependents, 3082 new_dpt_pgroup)) { 3083 if (!new_dpt_pgroup->sc_pgroup_seen) { 3084 unseen = 1; 3085 break; 3086 } 3087 } 3088 3089 /* If there are none, exit early. */ 3090 if (unseen == 0) 3091 goto commit; 3092 3093 /* Set up for lscf_dependent_import() */ 3094 cbdata.sc_handle = g_hndl; 3095 cbdata.sc_parent = ent; 3096 cbdata.sc_service = issvc; 3097 cbdata.sc_flags = 0; 3098 3099 if (!have_cur_depts) { 3100 /* 3101 * We have new dependents to import, so we need a "dependents" 3102 * property group. 3103 */ 3104 if (issvc) 3105 r = scf_service_add_pg(ent, dependents, 3106 SCF_GROUP_FRAMEWORK, 0, ud_cur_depts_pg); 3107 else 3108 r = scf_instance_add_pg(ent, dependents, 3109 SCF_GROUP_FRAMEWORK, 0, ud_cur_depts_pg); 3110 if (r != 0) { 3111 switch (scf_error()) { 3112 case SCF_ERROR_DELETED: 3113 case SCF_ERROR_CONNECTION_BROKEN: 3114 case SCF_ERROR_BACKEND_READONLY: 3115 case SCF_ERROR_BACKEND_ACCESS: 3116 case SCF_ERROR_NO_RESOURCES: 3117 return (scferror2errno(scf_error())); 3118 3119 case SCF_ERROR_EXISTS: 3120 warn(emsg_pg_added, ient->sc_fmri, dependents); 3121 return (EBUSY); 3122 3123 case SCF_ERROR_PERMISSION_DENIED: 3124 warn(emsg_pg_add_perm, dependents, 3125 ient->sc_fmri); 3126 return (scferror2errno(scf_error())); 3127 3128 case SCF_ERROR_NOT_BOUND: 3129 case SCF_ERROR_HANDLE_MISMATCH: 3130 case SCF_ERROR_INVALID_ARGUMENT: 3131 case SCF_ERROR_NOT_SET: 3132 default: 3133 bad_error("scf_service_add_pg", scf_error()); 3134 } 3135 } 3136 } 3137 3138 cbdata.sc_trans = ud_tx; 3139 3140 if (!tx_started && scf_transaction_start(ud_tx, ud_cur_depts_pg) != 0) { 3141 switch (scf_error()) { 3142 case SCF_ERROR_CONNECTION_BROKEN: 3143 case SCF_ERROR_BACKEND_ACCESS: 3144 case SCF_ERROR_BACKEND_READONLY: 3145 return (scferror2errno(scf_error())); 3146 3147 case SCF_ERROR_DELETED: 3148 warn(emsg_pg_deleted, ient->sc_fmri, dependents); 3149 return (EBUSY); 3150 3151 case SCF_ERROR_PERMISSION_DENIED: 3152 warn(emsg_pg_mod_perm, dependents, ient->sc_fmri); 3153 return (scferror2errno(scf_error())); 3154 3155 case SCF_ERROR_HANDLE_MISMATCH: 3156 case SCF_ERROR_IN_USE: 3157 case SCF_ERROR_NOT_BOUND: 3158 case SCF_ERROR_NOT_SET: 3159 default: 3160 bad_error("scf_transaction_start", scf_error()); 3161 } 3162 } 3163 tx_started = 1; 3164 3165 for (new_dpt_pgroup = uu_list_first(ient->sc_dependents); 3166 new_dpt_pgroup != NULL; 3167 new_dpt_pgroup = uu_list_next(ient->sc_dependents, 3168 new_dpt_pgroup)) { 3169 if (new_dpt_pgroup->sc_pgroup_seen) 3170 continue; 3171 3172 if (ud_run_dpts_pg_set) { 3173 /* 3174 * If the dependent is already there, then we have 3175 * a conflict. 3176 */ 3177 if (scf_pg_get_property(ud_run_dpts_pg, 3178 new_dpt_pgroup->sc_pgroup_name, ud_prop) == 0) { 3179 r = handle_dependent_conflict(ient, ud_prop, 3180 new_dpt_pgroup); 3181 switch (r) { 3182 case 0: 3183 continue; 3184 3185 case ECONNABORTED: 3186 case ENOMEM: 3187 case EBUSY: 3188 case EBADF: 3189 case EINVAL: 3190 scf_transaction_destroy_children(ud_tx); 3191 return (r); 3192 3193 default: 3194 bad_error("handle_dependent_conflict", 3195 r); 3196 } 3197 } else { 3198 switch (scf_error()) { 3199 case SCF_ERROR_NOT_FOUND: 3200 break; 3201 3202 case SCF_ERROR_INVALID_ARGUMENT: 3203 warn(emsg_fmri_invalid_pg_name, 3204 ient->sc_fmri, 3205 new_dpt_pgroup->sc_pgroup_name); 3206 scf_transaction_destroy_children(ud_tx); 3207 return (EINVAL); 3208 3209 case SCF_ERROR_DELETED: 3210 warn(emsg_pg_deleted, ient->sc_fmri, 3211 new_dpt_pgroup->sc_pgroup_name); 3212 scf_transaction_destroy_children(ud_tx); 3213 return (EBUSY); 3214 3215 case SCF_ERROR_CONNECTION_BROKEN: 3216 scf_transaction_destroy_children(ud_tx); 3217 return (ECONNABORTED); 3218 3219 case SCF_ERROR_NOT_BOUND: 3220 case SCF_ERROR_HANDLE_MISMATCH: 3221 case SCF_ERROR_NOT_SET: 3222 default: 3223 bad_error("scf_pg_get_property", 3224 scf_error()); 3225 } 3226 } 3227 } 3228 3229 r = lscf_dependent_import(new_dpt_pgroup, &cbdata); 3230 if (r != UU_WALK_NEXT) { 3231 if (r != UU_WALK_ERROR) 3232 bad_error("lscf_dependent_import", r); 3233 3234 if (cbdata.sc_err == EALREADY) { 3235 /* Collisions were handled preemptively. */ 3236 bad_error("lscf_dependent_import", 3237 cbdata.sc_err); 3238 } 3239 3240 scf_transaction_destroy_children(ud_tx); 3241 return (cbdata.sc_err); 3242 } 3243 } 3244 3245 commit: 3246 if (!tx_started) 3247 return (0); 3248 3249 r = scf_transaction_commit(ud_tx); 3250 3251 scf_transaction_destroy_children(ud_tx); 3252 3253 switch (r) { 3254 case 1: 3255 return (0); 3256 3257 case 0: 3258 warn(emsg_pg_changed, ient->sc_fmri, dependents); 3259 return (EBUSY); 3260 3261 case -1: 3262 break; 3263 3264 default: 3265 bad_error("scf_transaction_commit", r); 3266 } 3267 3268 switch (scf_error()) { 3269 case SCF_ERROR_CONNECTION_BROKEN: 3270 case SCF_ERROR_BACKEND_READONLY: 3271 case SCF_ERROR_BACKEND_ACCESS: 3272 case SCF_ERROR_NO_RESOURCES: 3273 return (scferror2errno(scf_error())); 3274 3275 case SCF_ERROR_DELETED: 3276 warn(emsg_pg_deleted, ient->sc_fmri, dependents); 3277 return (EBUSY); 3278 3279 case SCF_ERROR_PERMISSION_DENIED: 3280 warn(emsg_pg_mod_perm, dependents, ient->sc_fmri); 3281 return (scferror2errno(scf_error())); 3282 3283 case SCF_ERROR_NOT_BOUND: 3284 case SCF_ERROR_INVALID_ARGUMENT: 3285 case SCF_ERROR_NOT_SET: 3286 default: 3287 bad_error("scf_transaction_destroy", scf_error()); 3288 /* NOTREACHED */ 3289 } 3290 } 3291 3292 /* 3293 * Used to add the manifests to the list of currently supported manifests. 3294 * We could modify the existing manifest list removing entries if the files 3295 * don't exist. 3296 * 3297 * Get the old list and the new file name 3298 * If the new file name is in the list return 3299 * If not then add the file to the list. 3300 * As we process the list check to see if the files in the old list exist 3301 * if not then remove the file from the list. 3302 * Commit the list of manifest file names. 3303 * 3304 */ 3305 static int 3306 upgrade_manifestfiles(pgroup_t *pg, const entity_t *ient, 3307 const scf_snaplevel_t *running, void *ent) 3308 { 3309 scf_propertygroup_t *ud_mfsts_pg = NULL; 3310 scf_property_t *ud_prop = NULL; 3311 scf_iter_t *ud_prop_iter; 3312 scf_value_t *fname_value; 3313 scf_callback_t cbdata; 3314 pgroup_t *mfst_pgroup; 3315 property_t *mfst_prop; 3316 property_t *old_prop; 3317 char *pname = malloc(MAXPATHLEN); 3318 char *fval; 3319 char *old_pname; 3320 char *old_fval; 3321 int no_upgrade_pg; 3322 int mfst_seen; 3323 int r; 3324 3325 const int issvc = (ient->sc_etype == SVCCFG_SERVICE_OBJECT); 3326 3327 /* 3328 * This should always be the service base on the code 3329 * path, and the fact that the manifests pg is a service 3330 * level property group only. 3331 */ 3332 ud_mfsts_pg = scf_pg_create(g_hndl); 3333 ud_prop = scf_property_create(g_hndl); 3334 ud_prop_iter = scf_iter_create(g_hndl); 3335 fname_value = scf_value_create(g_hndl); 3336 3337 /* Fetch the "manifests" property group */ 3338 no_upgrade_pg = 0; 3339 r = entity_get_pg(ent, issvc, SCF_PG_MANIFESTFILES, 3340 ud_mfsts_pg); 3341 if (r != 0) { 3342 switch (scf_error()) { 3343 case SCF_ERROR_NOT_FOUND: 3344 no_upgrade_pg = 1; 3345 break; 3346 3347 case SCF_ERROR_DELETED: 3348 case SCF_ERROR_CONNECTION_BROKEN: 3349 return (scferror2errno(scf_error())); 3350 3351 case SCF_ERROR_NOT_SET: 3352 case SCF_ERROR_INVALID_ARGUMENT: 3353 case SCF_ERROR_HANDLE_MISMATCH: 3354 case SCF_ERROR_NOT_BOUND: 3355 default: 3356 bad_error(running ? "scf_snaplevel_get_pg" : 3357 "entity_get_pg", scf_error()); 3358 } 3359 } 3360 3361 if (no_upgrade_pg) { 3362 cbdata.sc_handle = g_hndl; 3363 cbdata.sc_parent = ent; 3364 cbdata.sc_service = issvc; 3365 cbdata.sc_flags = SCI_FORCE; 3366 cbdata.sc_source_fmri = ient->sc_fmri; 3367 cbdata.sc_target_fmri = ient->sc_fmri; 3368 3369 if (entity_pgroup_import(pg, &cbdata) != UU_WALK_NEXT) 3370 return (cbdata.sc_err); 3371 3372 return (0); 3373 } 3374 3375 /* Fetch the new manifests property group */ 3376 for (mfst_pgroup = uu_list_first(ient->sc_pgroups); 3377 mfst_pgroup != NULL; 3378 mfst_pgroup = uu_list_next(ient->sc_pgroups, mfst_pgroup)) { 3379 if (strcmp(mfst_pgroup->sc_pgroup_name, 3380 SCF_PG_MANIFESTFILES) == 0) 3381 break; 3382 } 3383 3384 if ((r = scf_iter_pg_properties(ud_prop_iter, ud_mfsts_pg)) != 3385 SCF_SUCCESS) 3386 return (-1); 3387 3388 while ((r = scf_iter_next_property(ud_prop_iter, ud_prop)) == 1) { 3389 mfst_seen = 0; 3390 if (scf_property_get_name(ud_prop, pname, MAXPATHLEN) < 0) 3391 continue; 3392 3393 for (mfst_prop = uu_list_first(mfst_pgroup->sc_pgroup_props); 3394 mfst_prop != NULL; 3395 mfst_prop = uu_list_next(mfst_pgroup->sc_pgroup_props, 3396 mfst_prop)) { 3397 if (strcmp(mfst_prop->sc_property_name, pname) == 0) { 3398 mfst_seen = 1; 3399 } 3400 } 3401 3402 /* 3403 * If the manifest is not seen then add it to the new mfst 3404 * property list to get proccessed into the repo. 3405 */ 3406 if (mfst_seen == 0) { 3407 fval = malloc(MAXPATHLEN); 3408 3409 /* 3410 * If we cannot get the value then there is no 3411 * reason to attempt to attach the value to 3412 * the property group 3413 */ 3414 if (fval != NULL && 3415 prop_get_val(ud_prop, fname_value) == 0 && 3416 scf_value_get_astring(fname_value, fval, 3417 MAXPATHLEN) != -1) { 3418 /* 3419 * First check to see if the manifest is there 3420 * if not then there is no need to add it. 3421 */ 3422 if (access(fval, F_OK) == -1) { 3423 free(fval); 3424 continue; 3425 } 3426 3427 old_pname = safe_strdup(pname); 3428 old_fval = safe_strdup(fval); 3429 old_prop = internal_property_create(old_pname, 3430 SCF_TYPE_ASTRING, 1, old_fval); 3431 3432 /* 3433 * Already checked to see if the property exists 3434 * in the group, and it does not. 3435 */ 3436 (void) internal_attach_property(mfst_pgroup, 3437 old_prop); 3438 } 3439 } 3440 } 3441 3442 cbdata.sc_handle = g_hndl; 3443 cbdata.sc_parent = ent; 3444 cbdata.sc_service = issvc; 3445 cbdata.sc_flags = SCI_FORCE; 3446 cbdata.sc_source_fmri = ient->sc_fmri; 3447 cbdata.sc_target_fmri = ient->sc_fmri; 3448 3449 if (entity_pgroup_import(mfst_pgroup, &cbdata) != UU_WALK_NEXT) 3450 return (cbdata.sc_err); 3451 3452 return (r); 3453 } 3454 3455 /* 3456 * prop is taken to be a property in the "dependents" property group of snpl, 3457 * which is taken to be the snaplevel of a last-import snapshot corresponding 3458 * to ient. If prop is a valid dependents property, upgrade the dependent it 3459 * represents according to the repository & ient. If ud_run_dpts_pg_set is 3460 * true, then ud_run_dpts_pg is taken to be the "dependents" property group 3461 * of the entity ient represents (possibly in the running snapshot). If it 3462 * needs to be changed, an entry will be added to tx, if not NULL. 3463 * 3464 * Returns 3465 * 0 - success 3466 * ECONNABORTED - repository connection broken 3467 * ENOMEM - out of memory 3468 * ENOSPC - configd was out of resources 3469 * ECANCELED - snpl's entity was deleted 3470 * EINVAL - dependent target is invalid (error printed) 3471 * - dependent is invalid (error printed) 3472 * EBADF - snpl is corrupt (error printed) 3473 * - snpl has corrupt pg (error printed) 3474 * - dependency pg in target is corrupt (error printed) 3475 * - running snapshot in dependent is missing snaplevel (error printed) 3476 * EPERM - couldn't delete dependency pg (permission denied) (error printed) 3477 * - couldn't create dependent (permission denied) (error printed) 3478 * - couldn't modify dependent pg (permission denied) (error printed) 3479 * EROFS - couldn't delete dependency pg (repository read-only) 3480 * - couldn't create dependent (repository read-only) 3481 * EACCES - couldn't delete dependency pg (backend access denied) 3482 * - couldn't create dependent (backend access denied) 3483 * EBUSY - ud_run_dpts_pg was deleted (error printed) 3484 * - tx's pg was deleted (error printed) 3485 * - dependent pg was changed or deleted (error printed) 3486 * EEXIST - dependency pg already exists in new target (error printed) 3487 */ 3488 static int 3489 upgrade_dependent(const scf_property_t *prop, const entity_t *ient, 3490 const scf_snaplevel_t *snpl, scf_transaction_t *tx) 3491 { 3492 pgroup_t pgrp; 3493 scf_type_t ty; 3494 pgroup_t *new_dpt_pgroup; 3495 pgroup_t *old_dpt_pgroup = NULL; 3496 pgroup_t *current_pg; 3497 scf_callback_t cbdata; 3498 int tissvc; 3499 void *target_ent; 3500 scf_error_t serr; 3501 int r; 3502 scf_transaction_entry_t *ent; 3503 3504 const char * const cf_inval = gettext("Conflict upgrading %s " 3505 "(dependent \"%s\" has invalid dependents property).\n"); 3506 const char * const cf_missing = gettext("Conflict upgrading %s " 3507 "(dependent \"%s\" is missing).\n"); 3508 const char * const cf_newdpg = gettext("Conflict upgrading %s " 3509 "(dependent \"%s\" has new dependency property group).\n"); 3510 const char * const cf_newtarg = gettext("Conflict upgrading %s " 3511 "(dependent \"%s\" has new target).\n"); 3512 const char * const li_corrupt = 3513 gettext("%s: \"last-import\" snapshot is corrupt.\n"); 3514 const char * const upgrading = 3515 gettext("%s: Upgrading dependent \"%s\".\n"); 3516 const char * const r_no_lvl = gettext("%s: \"running\" snapshot is " 3517 "corrupt (missing snaplevel).\n"); 3518 3519 if (scf_property_type(prop, &ty) != 0) { 3520 switch (scf_error()) { 3521 case SCF_ERROR_DELETED: 3522 case SCF_ERROR_CONNECTION_BROKEN: 3523 return (scferror2errno(scf_error())); 3524 3525 case SCF_ERROR_NOT_BOUND: 3526 case SCF_ERROR_NOT_SET: 3527 default: 3528 bad_error("scf_property_type", scf_error()); 3529 } 3530 } 3531 3532 if (!(ty == SCF_TYPE_FMRI || ty == SCF_TYPE_ASTRING)) { 3533 warn(li_corrupt, ient->sc_fmri); 3534 return (EBADF); 3535 } 3536 3537 /* 3538 * prop represents a dependent in the old manifest. It is named after 3539 * the dependent. 3540 */ 3541 if (scf_property_get_name(prop, ud_name, max_scf_name_len + 1) < 0) { 3542 switch (scf_error()) { 3543 case SCF_ERROR_DELETED: 3544 case SCF_ERROR_CONNECTION_BROKEN: 3545 return (scferror2errno(scf_error())); 3546 3547 case SCF_ERROR_NOT_BOUND: 3548 case SCF_ERROR_NOT_SET: 3549 default: 3550 bad_error("scf_property_get_name", scf_error()); 3551 } 3552 } 3553 3554 /* See if it's in the new manifest. */ 3555 pgrp.sc_pgroup_name = ud_name; 3556 new_dpt_pgroup = 3557 uu_list_find(ient->sc_dependents, &pgrp, NULL, UU_DEFAULT); 3558 3559 /* If it's not, delete it... if it hasn't been customized. */ 3560 if (new_dpt_pgroup == NULL) { 3561 pgroup_t *dpt; 3562 3563 if (!ud_run_dpts_pg_set) 3564 return (0); 3565 3566 if (scf_property_get_value(prop, ud_val) != 0) { 3567 switch (scf_error()) { 3568 case SCF_ERROR_NOT_FOUND: 3569 case SCF_ERROR_CONSTRAINT_VIOLATED: 3570 warn(li_corrupt, ient->sc_fmri); 3571 return (EBADF); 3572 3573 case SCF_ERROR_DELETED: 3574 case SCF_ERROR_CONNECTION_BROKEN: 3575 return (scferror2errno(scf_error())); 3576 3577 case SCF_ERROR_HANDLE_MISMATCH: 3578 case SCF_ERROR_NOT_BOUND: 3579 case SCF_ERROR_NOT_SET: 3580 case SCF_ERROR_PERMISSION_DENIED: 3581 default: 3582 bad_error("scf_property_get_value", 3583 scf_error()); 3584 } 3585 } 3586 3587 if (scf_value_get_as_string(ud_val, ud_oldtarg, 3588 max_scf_value_len + 1) < 0) 3589 bad_error("scf_value_get_as_string", scf_error()); 3590 3591 if (scf_pg_get_property(ud_run_dpts_pg, ud_name, ud_prop) != 3592 0) { 3593 switch (scf_error()) { 3594 case SCF_ERROR_NOT_FOUND: 3595 return (0); 3596 3597 case SCF_ERROR_CONNECTION_BROKEN: 3598 return (scferror2errno(scf_error())); 3599 3600 case SCF_ERROR_DELETED: 3601 warn(emsg_pg_deleted, ient->sc_fmri, 3602 "dependents"); 3603 return (EBUSY); 3604 3605 case SCF_ERROR_INVALID_ARGUMENT: 3606 case SCF_ERROR_NOT_BOUND: 3607 case SCF_ERROR_HANDLE_MISMATCH: 3608 case SCF_ERROR_NOT_SET: 3609 default: 3610 bad_error("scf_pg_get_property", scf_error()); 3611 } 3612 } 3613 if (scf_property_get_value(ud_prop, ud_val) != 0) { 3614 switch (scf_error()) { 3615 case SCF_ERROR_NOT_FOUND: 3616 case SCF_ERROR_CONSTRAINT_VIOLATED: 3617 warn(cf_inval, ient->sc_fmri, ud_name); 3618 return (0); 3619 3620 case SCF_ERROR_DELETED: 3621 case SCF_ERROR_CONNECTION_BROKEN: 3622 return (scferror2errno(scf_error())); 3623 3624 case SCF_ERROR_HANDLE_MISMATCH: 3625 case SCF_ERROR_NOT_BOUND: 3626 case SCF_ERROR_NOT_SET: 3627 case SCF_ERROR_PERMISSION_DENIED: 3628 default: 3629 bad_error("scf_property_get_value", 3630 scf_error()); 3631 } 3632 } 3633 3634 ty = scf_value_type(ud_val); 3635 assert(ty != SCF_TYPE_INVALID); 3636 if (!(ty == SCF_TYPE_FMRI || ty == SCF_TYPE_ASTRING)) { 3637 warn(cf_inval, ient->sc_fmri, ud_name); 3638 return (0); 3639 } 3640 3641 if (scf_value_get_as_string(ud_val, ud_ctarg, 3642 max_scf_value_len + 1) < 0) 3643 bad_error("scf_value_get_as_string", scf_error()); 3644 3645 r = fmri_equal(ud_ctarg, ud_oldtarg); 3646 switch (r) { 3647 case 1: 3648 break; 3649 3650 case 0: 3651 case -1: /* warn? */ 3652 warn(cf_newtarg, ient->sc_fmri, ud_name); 3653 return (0); 3654 3655 case -2: 3656 warn(li_corrupt, ient->sc_fmri); 3657 return (EBADF); 3658 3659 default: 3660 bad_error("fmri_equal", r); 3661 } 3662 3663 if (scf_snaplevel_get_pg(snpl, ud_name, ud_pg) != 0) { 3664 switch (scf_error()) { 3665 case SCF_ERROR_NOT_FOUND: 3666 warn(li_corrupt, ient->sc_fmri); 3667 return (EBADF); 3668 3669 case SCF_ERROR_DELETED: 3670 case SCF_ERROR_CONNECTION_BROKEN: 3671 return (scferror2errno(scf_error())); 3672 3673 case SCF_ERROR_NOT_BOUND: 3674 case SCF_ERROR_HANDLE_MISMATCH: 3675 case SCF_ERROR_INVALID_ARGUMENT: 3676 case SCF_ERROR_NOT_SET: 3677 default: 3678 bad_error("scf_snaplevel_get_pg", scf_error()); 3679 } 3680 } 3681 3682 r = load_pg(ud_pg, &old_dpt_pgroup, ient->sc_fmri, 3683 snap_lastimport); 3684 switch (r) { 3685 case 0: 3686 break; 3687 3688 case ECANCELED: 3689 case ECONNABORTED: 3690 case ENOMEM: 3691 case EBADF: 3692 return (r); 3693 3694 case EACCES: 3695 default: 3696 bad_error("load_pg", r); 3697 } 3698 3699 serr = fmri_to_entity(g_hndl, ud_ctarg, &target_ent, &tissvc); 3700 switch (serr) { 3701 case SCF_ERROR_NONE: 3702 break; 3703 3704 case SCF_ERROR_NO_MEMORY: 3705 internal_pgroup_free(old_dpt_pgroup); 3706 return (ENOMEM); 3707 3708 case SCF_ERROR_NOT_FOUND: 3709 internal_pgroup_free(old_dpt_pgroup); 3710 goto delprop; 3711 3712 case SCF_ERROR_CONSTRAINT_VIOLATED: /* caught above */ 3713 case SCF_ERROR_INVALID_ARGUMENT: /* caught above */ 3714 default: 3715 bad_error("fmri_to_entity", serr); 3716 } 3717 3718 r = entity_get_running_pg(target_ent, tissvc, ud_name, 3719 ud_pg, ud_iter2, ud_inst, imp_snap, ud_snpl); 3720 switch (r) { 3721 case 0: 3722 break; 3723 3724 case ECONNABORTED: 3725 internal_pgroup_free(old_dpt_pgroup); 3726 return (r); 3727 3728 case ECANCELED: 3729 case ENOENT: 3730 internal_pgroup_free(old_dpt_pgroup); 3731 goto delprop; 3732 3733 case EBADF: 3734 warn(r_no_lvl, ud_ctarg); 3735 internal_pgroup_free(old_dpt_pgroup); 3736 return (r); 3737 3738 case EINVAL: 3739 default: 3740 bad_error("entity_get_running_pg", r); 3741 } 3742 3743 /* load it */ 3744 r = load_pg(ud_pg, ¤t_pg, ud_ctarg, NULL); 3745 switch (r) { 3746 case 0: 3747 break; 3748 3749 case ECANCELED: 3750 internal_pgroup_free(old_dpt_pgroup); 3751 goto delprop; 3752 3753 case ECONNABORTED: 3754 case ENOMEM: 3755 case EBADF: 3756 internal_pgroup_free(old_dpt_pgroup); 3757 return (r); 3758 3759 case EACCES: 3760 default: 3761 bad_error("load_pg", r); 3762 } 3763 3764 /* compare property groups */ 3765 if (!pg_equal(old_dpt_pgroup, current_pg)) { 3766 warn(cf_newdpg, ient->sc_fmri, ud_name); 3767 internal_pgroup_free(old_dpt_pgroup); 3768 internal_pgroup_free(current_pg); 3769 return (0); 3770 } 3771 3772 internal_pgroup_free(old_dpt_pgroup); 3773 internal_pgroup_free(current_pg); 3774 3775 if (g_verbose) 3776 warn(gettext("%s: Deleting dependent \"%s\".\n"), 3777 ient->sc_fmri, ud_name); 3778 3779 if (entity_get_pg(target_ent, tissvc, ud_name, ud_pg) != 0) { 3780 switch (scf_error()) { 3781 case SCF_ERROR_NOT_FOUND: 3782 case SCF_ERROR_DELETED: 3783 internal_pgroup_free(old_dpt_pgroup); 3784 goto delprop; 3785 3786 case SCF_ERROR_CONNECTION_BROKEN: 3787 internal_pgroup_free(old_dpt_pgroup); 3788 return (ECONNABORTED); 3789 3790 case SCF_ERROR_NOT_SET: 3791 case SCF_ERROR_INVALID_ARGUMENT: 3792 case SCF_ERROR_HANDLE_MISMATCH: 3793 case SCF_ERROR_NOT_BOUND: 3794 default: 3795 bad_error("entity_get_pg", scf_error()); 3796 } 3797 } 3798 3799 if (scf_pg_delete(ud_pg) != 0) { 3800 switch (scf_error()) { 3801 case SCF_ERROR_DELETED: 3802 break; 3803 3804 case SCF_ERROR_CONNECTION_BROKEN: 3805 case SCF_ERROR_BACKEND_READONLY: 3806 case SCF_ERROR_BACKEND_ACCESS: 3807 return (scferror2errno(scf_error())); 3808 3809 case SCF_ERROR_PERMISSION_DENIED: 3810 warn(emsg_pg_del_perm, ud_name, ient->sc_fmri); 3811 return (scferror2errno(scf_error())); 3812 3813 case SCF_ERROR_NOT_SET: 3814 default: 3815 bad_error("scf_pg_delete", scf_error()); 3816 } 3817 } 3818 3819 /* 3820 * This service was changed, so it must be refreshed. But 3821 * since it's not mentioned in the new manifest, we have to 3822 * record its FMRI here for use later. We record the name 3823 * & the entity (via sc_parent) in case we need to print error 3824 * messages during the refresh. 3825 */ 3826 dpt = internal_pgroup_new(); 3827 if (dpt == NULL) 3828 return (ENOMEM); 3829 dpt->sc_pgroup_name = strdup(ud_name); 3830 dpt->sc_pgroup_fmri = strdup(ud_ctarg); 3831 if (dpt->sc_pgroup_name == NULL || dpt->sc_pgroup_fmri == NULL) 3832 return (ENOMEM); 3833 dpt->sc_parent = (entity_t *)ient; 3834 if (uu_list_insert_after(imp_deleted_dpts, NULL, dpt) != 0) 3835 uu_die(gettext("libuutil error: %s\n"), 3836 uu_strerror(uu_error())); 3837 3838 delprop: 3839 if (tx == NULL) 3840 return (0); 3841 3842 ent = scf_entry_create(g_hndl); 3843 if (ent == NULL) 3844 return (ENOMEM); 3845 3846 if (scf_transaction_property_delete(tx, ent, ud_name) != 0) { 3847 scf_entry_destroy(ent); 3848 switch (scf_error()) { 3849 case SCF_ERROR_DELETED: 3850 warn(emsg_pg_deleted, ient->sc_fmri, 3851 "dependents"); 3852 return (EBUSY); 3853 3854 case SCF_ERROR_CONNECTION_BROKEN: 3855 return (scferror2errno(scf_error())); 3856 3857 case SCF_ERROR_NOT_FOUND: 3858 break; 3859 3860 case SCF_ERROR_HANDLE_MISMATCH: 3861 case SCF_ERROR_NOT_BOUND: 3862 case SCF_ERROR_INVALID_ARGUMENT: 3863 case SCF_ERROR_NOT_SET: 3864 default: 3865 bad_error("scf_transaction_property_delete", 3866 scf_error()); 3867 } 3868 } 3869 3870 return (0); 3871 } 3872 3873 new_dpt_pgroup->sc_pgroup_seen = 1; 3874 3875 /* 3876 * Decide whether the dependent has changed in the manifest. 3877 */ 3878 /* Compare the target. */ 3879 if (scf_property_get_value(prop, ud_val) != 0) { 3880 switch (scf_error()) { 3881 case SCF_ERROR_NOT_FOUND: 3882 case SCF_ERROR_CONSTRAINT_VIOLATED: 3883 warn(li_corrupt, ient->sc_fmri); 3884 return (EBADF); 3885 3886 case SCF_ERROR_DELETED: 3887 case SCF_ERROR_CONNECTION_BROKEN: 3888 return (scferror2errno(scf_error())); 3889 3890 case SCF_ERROR_HANDLE_MISMATCH: 3891 case SCF_ERROR_NOT_BOUND: 3892 case SCF_ERROR_NOT_SET: 3893 case SCF_ERROR_PERMISSION_DENIED: 3894 default: 3895 bad_error("scf_property_get_value", scf_error()); 3896 } 3897 } 3898 3899 if (scf_value_get_as_string(ud_val, ud_oldtarg, max_scf_value_len + 1) < 3900 0) 3901 bad_error("scf_value_get_as_string", scf_error()); 3902 3903 r = fmri_equal(ud_oldtarg, new_dpt_pgroup->sc_pgroup_fmri); 3904 switch (r) { 3905 case 0: 3906 break; 3907 3908 case 1: 3909 /* Compare the dependency pgs. */ 3910 if (scf_snaplevel_get_pg(snpl, ud_name, ud_pg) != 0) { 3911 switch (scf_error()) { 3912 case SCF_ERROR_NOT_FOUND: 3913 warn(li_corrupt, ient->sc_fmri); 3914 return (EBADF); 3915 3916 case SCF_ERROR_DELETED: 3917 case SCF_ERROR_CONNECTION_BROKEN: 3918 return (scferror2errno(scf_error())); 3919 3920 case SCF_ERROR_NOT_BOUND: 3921 case SCF_ERROR_HANDLE_MISMATCH: 3922 case SCF_ERROR_INVALID_ARGUMENT: 3923 case SCF_ERROR_NOT_SET: 3924 default: 3925 bad_error("scf_snaplevel_get_pg", scf_error()); 3926 } 3927 } 3928 3929 r = load_pg(ud_pg, &old_dpt_pgroup, ient->sc_fmri, 3930 snap_lastimport); 3931 switch (r) { 3932 case 0: 3933 break; 3934 3935 case ECANCELED: 3936 case ECONNABORTED: 3937 case ENOMEM: 3938 case EBADF: 3939 return (r); 3940 3941 case EACCES: 3942 default: 3943 bad_error("load_pg", r); 3944 } 3945 3946 if (pg_equal(old_dpt_pgroup, new_dpt_pgroup)) { 3947 /* no change, leave customizations */ 3948 internal_pgroup_free(old_dpt_pgroup); 3949 return (0); 3950 } 3951 break; 3952 3953 case -1: 3954 warn(li_corrupt, ient->sc_fmri); 3955 return (EBADF); 3956 3957 case -2: 3958 warn(gettext("Dependent \"%s\" has invalid target \"%s\".\n"), 3959 ud_name, new_dpt_pgroup->sc_pgroup_fmri); 3960 return (EINVAL); 3961 3962 default: 3963 bad_error("fmri_equal", r); 3964 } 3965 3966 /* 3967 * The dependent has changed in the manifest. Upgrade the current 3968 * properties if they haven't been customized. 3969 */ 3970 3971 /* 3972 * If new_dpt_pgroup->sc_override, then act as though the property 3973 * group hasn't been customized. 3974 */ 3975 if (new_dpt_pgroup->sc_pgroup_override) 3976 goto nocust; 3977 3978 if (!ud_run_dpts_pg_set) { 3979 warn(cf_missing, ient->sc_fmri, ud_name); 3980 r = 0; 3981 goto out; 3982 } else if (scf_pg_get_property(ud_run_dpts_pg, ud_name, ud_prop) != 0) { 3983 switch (scf_error()) { 3984 case SCF_ERROR_NOT_FOUND: 3985 warn(cf_missing, ient->sc_fmri, ud_name); 3986 r = 0; 3987 goto out; 3988 3989 case SCF_ERROR_CONNECTION_BROKEN: 3990 r = scferror2errno(scf_error()); 3991 goto out; 3992 3993 case SCF_ERROR_DELETED: 3994 warn(emsg_pg_deleted, ient->sc_fmri, "dependents"); 3995 r = EBUSY; 3996 goto out; 3997 3998 case SCF_ERROR_INVALID_ARGUMENT: 3999 case SCF_ERROR_NOT_BOUND: 4000 case SCF_ERROR_HANDLE_MISMATCH: 4001 case SCF_ERROR_NOT_SET: 4002 default: 4003 bad_error("scf_pg_get_property", scf_error()); 4004 } 4005 } 4006 4007 if (scf_property_get_value(ud_prop, ud_val) != 0) { 4008 switch (scf_error()) { 4009 case SCF_ERROR_NOT_FOUND: 4010 case SCF_ERROR_CONSTRAINT_VIOLATED: 4011 warn(cf_inval, ient->sc_fmri, ud_name); 4012 r = 0; 4013 goto out; 4014 4015 case SCF_ERROR_DELETED: 4016 case SCF_ERROR_CONNECTION_BROKEN: 4017 r = scferror2errno(scf_error()); 4018 goto out; 4019 4020 case SCF_ERROR_HANDLE_MISMATCH: 4021 case SCF_ERROR_NOT_BOUND: 4022 case SCF_ERROR_NOT_SET: 4023 case SCF_ERROR_PERMISSION_DENIED: 4024 default: 4025 bad_error("scf_property_get_value", scf_error()); 4026 } 4027 } 4028 4029 ty = scf_value_type(ud_val); 4030 assert(ty != SCF_TYPE_INVALID); 4031 if (!(ty == SCF_TYPE_FMRI || ty == SCF_TYPE_ASTRING)) { 4032 warn(cf_inval, ient->sc_fmri, ud_name); 4033 r = 0; 4034 goto out; 4035 } 4036 if (scf_value_get_as_string(ud_val, ud_ctarg, max_scf_value_len + 1) < 4037 0) 4038 bad_error("scf_value_get_as_string", scf_error()); 4039 4040 r = fmri_equal(ud_ctarg, ud_oldtarg); 4041 if (r == -1) { 4042 warn(cf_inval, ient->sc_fmri, ud_name); 4043 r = 0; 4044 goto out; 4045 } else if (r == -2) { 4046 warn(li_corrupt, ient->sc_fmri); 4047 r = EBADF; 4048 goto out; 4049 } else if (r == 0) { 4050 /* 4051 * Target has been changed. Only abort now if it's been 4052 * changed to something other than what's in the manifest. 4053 */ 4054 r = fmri_equal(ud_ctarg, new_dpt_pgroup->sc_pgroup_fmri); 4055 if (r == -1) { 4056 warn(cf_inval, ient->sc_fmri, ud_name); 4057 r = 0; 4058 goto out; 4059 } else if (r == 0) { 4060 warn(cf_newtarg, ient->sc_fmri, ud_name); 4061 r = 0; 4062 goto out; 4063 } else if (r != 1) { 4064 /* invalid sc_pgroup_fmri caught above */ 4065 bad_error("fmri_equal", r); 4066 } 4067 4068 /* 4069 * Fetch the current dependency pg. If it's what the manifest 4070 * says, then no problem. 4071 */ 4072 serr = fmri_to_entity(g_hndl, ud_ctarg, &target_ent, &tissvc); 4073 switch (serr) { 4074 case SCF_ERROR_NONE: 4075 break; 4076 4077 case SCF_ERROR_NOT_FOUND: 4078 warn(cf_missing, ient->sc_fmri, ud_name); 4079 r = 0; 4080 goto out; 4081 4082 case SCF_ERROR_NO_MEMORY: 4083 r = ENOMEM; 4084 goto out; 4085 4086 case SCF_ERROR_CONSTRAINT_VIOLATED: 4087 case SCF_ERROR_INVALID_ARGUMENT: 4088 default: 4089 bad_error("fmri_to_entity", serr); 4090 } 4091 4092 r = entity_get_running_pg(target_ent, tissvc, ud_name, 4093 ud_pg, ud_iter2, ud_inst, imp_snap, ud_snpl); 4094 switch (r) { 4095 case 0: 4096 break; 4097 4098 case ECONNABORTED: 4099 goto out; 4100 4101 case ECANCELED: 4102 case ENOENT: 4103 warn(cf_missing, ient->sc_fmri, ud_name); 4104 r = 0; 4105 goto out; 4106 4107 case EBADF: 4108 warn(r_no_lvl, ud_ctarg); 4109 goto out; 4110 4111 case EINVAL: 4112 default: 4113 bad_error("entity_get_running_pg", r); 4114 } 4115 4116 r = load_pg(ud_pg, ¤t_pg, ud_ctarg, NULL); 4117 switch (r) { 4118 case 0: 4119 break; 4120 4121 case ECANCELED: 4122 warn(cf_missing, ient->sc_fmri, ud_name); 4123 r = 0; 4124 goto out; 4125 4126 case ECONNABORTED: 4127 case ENOMEM: 4128 case EBADF: 4129 goto out; 4130 4131 case EACCES: 4132 default: 4133 bad_error("load_pg", r); 4134 } 4135 4136 if (!pg_equal(current_pg, new_dpt_pgroup)) 4137 warn(cf_newdpg, ient->sc_fmri, ud_name); 4138 internal_pgroup_free(current_pg); 4139 r = 0; 4140 goto out; 4141 } else if (r != 1) { 4142 bad_error("fmri_equal", r); 4143 } 4144 4145 nocust: 4146 /* 4147 * Target has not been customized. Check the dependency property 4148 * group. 4149 */ 4150 4151 if (old_dpt_pgroup == NULL) { 4152 if (scf_snaplevel_get_pg(snpl, new_dpt_pgroup->sc_pgroup_name, 4153 ud_pg) != 0) { 4154 switch (scf_error()) { 4155 case SCF_ERROR_NOT_FOUND: 4156 warn(li_corrupt, ient->sc_fmri); 4157 return (EBADF); 4158 4159 case SCF_ERROR_DELETED: 4160 case SCF_ERROR_CONNECTION_BROKEN: 4161 return (scferror2errno(scf_error())); 4162 4163 case SCF_ERROR_NOT_BOUND: 4164 case SCF_ERROR_HANDLE_MISMATCH: 4165 case SCF_ERROR_INVALID_ARGUMENT: 4166 case SCF_ERROR_NOT_SET: 4167 default: 4168 bad_error("scf_snaplevel_get_pg", scf_error()); 4169 } 4170 } 4171 4172 r = load_pg(ud_pg, &old_dpt_pgroup, ient->sc_fmri, 4173 snap_lastimport); 4174 switch (r) { 4175 case 0: 4176 break; 4177 4178 case ECANCELED: 4179 case ECONNABORTED: 4180 case ENOMEM: 4181 case EBADF: 4182 return (r); 4183 4184 case EACCES: 4185 default: 4186 bad_error("load_pg", r); 4187 } 4188 } 4189 4190 serr = fmri_to_entity(g_hndl, ud_ctarg, &target_ent, &tissvc); 4191 switch (serr) { 4192 case SCF_ERROR_NONE: 4193 break; 4194 4195 case SCF_ERROR_NOT_FOUND: 4196 warn(cf_missing, ient->sc_fmri, ud_name); 4197 r = 0; 4198 goto out; 4199 4200 case SCF_ERROR_NO_MEMORY: 4201 r = ENOMEM; 4202 goto out; 4203 4204 case SCF_ERROR_CONSTRAINT_VIOLATED: 4205 case SCF_ERROR_INVALID_ARGUMENT: 4206 default: 4207 bad_error("fmri_to_entity", serr); 4208 } 4209 4210 r = entity_get_running_pg(target_ent, tissvc, ud_name, ud_pg, 4211 ud_iter2, ud_inst, imp_snap, ud_snpl); 4212 switch (r) { 4213 case 0: 4214 break; 4215 4216 case ECONNABORTED: 4217 goto out; 4218 4219 case ECANCELED: 4220 case ENOENT: 4221 warn(cf_missing, ient->sc_fmri, ud_name); 4222 r = 0; 4223 goto out; 4224 4225 case EBADF: 4226 warn(r_no_lvl, ud_ctarg); 4227 goto out; 4228 4229 case EINVAL: 4230 default: 4231 bad_error("entity_get_running_pg", r); 4232 } 4233 4234 r = load_pg(ud_pg, ¤t_pg, ud_ctarg, NULL); 4235 switch (r) { 4236 case 0: 4237 break; 4238 4239 case ECANCELED: 4240 warn(cf_missing, ient->sc_fmri, ud_name); 4241 goto out; 4242 4243 case ECONNABORTED: 4244 case ENOMEM: 4245 case EBADF: 4246 goto out; 4247 4248 case EACCES: 4249 default: 4250 bad_error("load_pg", r); 4251 } 4252 4253 if (!pg_equal(current_pg, old_dpt_pgroup)) { 4254 if (!pg_equal(current_pg, new_dpt_pgroup)) 4255 warn(cf_newdpg, ient->sc_fmri, ud_name); 4256 internal_pgroup_free(current_pg); 4257 r = 0; 4258 goto out; 4259 } 4260 4261 /* Uncustomized. Upgrade. */ 4262 4263 r = fmri_equal(new_dpt_pgroup->sc_pgroup_fmri, ud_oldtarg); 4264 switch (r) { 4265 case 1: 4266 if (pg_equal(current_pg, new_dpt_pgroup)) { 4267 /* Already upgraded. */ 4268 internal_pgroup_free(current_pg); 4269 r = 0; 4270 goto out; 4271 } 4272 4273 internal_pgroup_free(current_pg); 4274 4275 /* upgrade current_pg */ 4276 if (entity_get_pg(target_ent, tissvc, ud_name, ud_pg) != 0) { 4277 switch (scf_error()) { 4278 case SCF_ERROR_CONNECTION_BROKEN: 4279 r = scferror2errno(scf_error()); 4280 goto out; 4281 4282 case SCF_ERROR_DELETED: 4283 warn(cf_missing, ient->sc_fmri, ud_name); 4284 r = 0; 4285 goto out; 4286 4287 case SCF_ERROR_NOT_FOUND: 4288 break; 4289 4290 case SCF_ERROR_INVALID_ARGUMENT: 4291 case SCF_ERROR_NOT_BOUND: 4292 case SCF_ERROR_NOT_SET: 4293 case SCF_ERROR_HANDLE_MISMATCH: 4294 default: 4295 bad_error("entity_get_pg", scf_error()); 4296 } 4297 4298 if (tissvc) 4299 r = scf_service_add_pg(target_ent, ud_name, 4300 SCF_GROUP_DEPENDENCY, 0, ud_pg); 4301 else 4302 r = scf_instance_add_pg(target_ent, ud_name, 4303 SCF_GROUP_DEPENDENCY, 0, ud_pg); 4304 if (r != 0) { 4305 switch (scf_error()) { 4306 case SCF_ERROR_CONNECTION_BROKEN: 4307 case SCF_ERROR_NO_RESOURCES: 4308 case SCF_ERROR_BACKEND_READONLY: 4309 case SCF_ERROR_BACKEND_ACCESS: 4310 r = scferror2errno(scf_error()); 4311 goto out; 4312 4313 case SCF_ERROR_DELETED: 4314 warn(cf_missing, ient->sc_fmri, 4315 ud_name); 4316 r = 0; 4317 goto out; 4318 4319 case SCF_ERROR_PERMISSION_DENIED: 4320 warn(emsg_pg_deleted, ud_ctarg, 4321 ud_name); 4322 r = EPERM; 4323 goto out; 4324 4325 case SCF_ERROR_EXISTS: 4326 warn(emsg_pg_added, ud_ctarg, ud_name); 4327 r = EBUSY; 4328 goto out; 4329 4330 case SCF_ERROR_NOT_BOUND: 4331 case SCF_ERROR_HANDLE_MISMATCH: 4332 case SCF_ERROR_INVALID_ARGUMENT: 4333 case SCF_ERROR_NOT_SET: 4334 default: 4335 bad_error("entity_add_pg", scf_error()); 4336 } 4337 } 4338 } 4339 4340 r = load_pg(ud_pg, ¤t_pg, ud_ctarg, NULL); 4341 switch (r) { 4342 case 0: 4343 break; 4344 4345 case ECANCELED: 4346 warn(cf_missing, ient->sc_fmri, ud_name); 4347 goto out; 4348 4349 case ECONNABORTED: 4350 case ENOMEM: 4351 case EBADF: 4352 goto out; 4353 4354 case EACCES: 4355 default: 4356 bad_error("load_pg", r); 4357 } 4358 4359 if (g_verbose) 4360 warn(upgrading, ient->sc_fmri, ud_name); 4361 4362 r = upgrade_pg(ud_pg, current_pg, old_dpt_pgroup, 4363 new_dpt_pgroup, 0, ient->sc_fmri); 4364 switch (r) { 4365 case 0: 4366 break; 4367 4368 case ECANCELED: 4369 warn(emsg_pg_deleted, ud_ctarg, ud_name); 4370 r = EBUSY; 4371 goto out; 4372 4373 case EPERM: 4374 warn(emsg_pg_mod_perm, ud_name, ud_ctarg); 4375 goto out; 4376 4377 case EBUSY: 4378 warn(emsg_pg_changed, ud_ctarg, ud_name); 4379 goto out; 4380 4381 case ECONNABORTED: 4382 case ENOMEM: 4383 case ENOSPC: 4384 case EROFS: 4385 case EACCES: 4386 case EINVAL: 4387 goto out; 4388 4389 default: 4390 bad_error("upgrade_pg", r); 4391 } 4392 break; 4393 4394 case 0: { 4395 scf_transaction_entry_t *ent; 4396 scf_value_t *val; 4397 4398 internal_pgroup_free(current_pg); 4399 4400 /* delete old pg */ 4401 if (g_verbose) 4402 warn(upgrading, ient->sc_fmri, ud_name); 4403 4404 if (entity_get_pg(target_ent, tissvc, ud_name, ud_pg) != 0) { 4405 switch (scf_error()) { 4406 case SCF_ERROR_CONNECTION_BROKEN: 4407 r = scferror2errno(scf_error()); 4408 goto out; 4409 4410 case SCF_ERROR_DELETED: 4411 warn(cf_missing, ient->sc_fmri, ud_name); 4412 r = 0; 4413 goto out; 4414 4415 case SCF_ERROR_NOT_FOUND: 4416 break; 4417 4418 case SCF_ERROR_INVALID_ARGUMENT: 4419 case SCF_ERROR_NOT_BOUND: 4420 case SCF_ERROR_NOT_SET: 4421 case SCF_ERROR_HANDLE_MISMATCH: 4422 default: 4423 bad_error("entity_get_pg", scf_error()); 4424 } 4425 } else if (scf_pg_delete(ud_pg) != 0) { 4426 switch (scf_error()) { 4427 case SCF_ERROR_DELETED: 4428 break; 4429 4430 case SCF_ERROR_CONNECTION_BROKEN: 4431 case SCF_ERROR_BACKEND_READONLY: 4432 case SCF_ERROR_BACKEND_ACCESS: 4433 r = scferror2errno(scf_error()); 4434 goto out; 4435 4436 case SCF_ERROR_PERMISSION_DENIED: 4437 warn(emsg_pg_del_perm, ud_name, ient->sc_fmri); 4438 r = scferror2errno(scf_error()); 4439 goto out; 4440 4441 case SCF_ERROR_NOT_SET: 4442 default: 4443 bad_error("scf_pg_delete", scf_error()); 4444 } 4445 } 4446 4447 /* import new one */ 4448 cbdata.sc_handle = g_hndl; 4449 cbdata.sc_trans = NULL; /* handled below */ 4450 4451 r = lscf_dependent_import(new_dpt_pgroup, &cbdata); 4452 if (r != UU_WALK_NEXT) { 4453 if (r != UU_WALK_ERROR) 4454 bad_error("lscf_dependent_import", r); 4455 4456 r = cbdata.sc_err; 4457 goto out; 4458 } 4459 4460 if (tx == NULL) 4461 break; 4462 4463 if ((ent = scf_entry_create(g_hndl)) == NULL || 4464 (val = scf_value_create(g_hndl)) == NULL) { 4465 if (scf_error() == SCF_ERROR_NO_MEMORY) 4466 return (ENOMEM); 4467 4468 bad_error("scf_entry_create", scf_error()); 4469 } 4470 4471 if (scf_transaction_property_change_type(tx, ent, ud_name, 4472 SCF_TYPE_FMRI) != 0) { 4473 switch (scf_error()) { 4474 case SCF_ERROR_CONNECTION_BROKEN: 4475 r = scferror2errno(scf_error()); 4476 goto out; 4477 4478 case SCF_ERROR_DELETED: 4479 warn(emsg_pg_deleted, ient->sc_fmri, 4480 "dependents"); 4481 r = EBUSY; 4482 goto out; 4483 4484 case SCF_ERROR_NOT_FOUND: 4485 break; 4486 4487 case SCF_ERROR_NOT_BOUND: 4488 case SCF_ERROR_HANDLE_MISMATCH: 4489 case SCF_ERROR_INVALID_ARGUMENT: 4490 case SCF_ERROR_NOT_SET: 4491 default: 4492 bad_error("scf_transaction_property_" 4493 "change_type", scf_error()); 4494 } 4495 4496 if (scf_transaction_property_new(tx, ent, ud_name, 4497 SCF_TYPE_FMRI) != 0) { 4498 switch (scf_error()) { 4499 case SCF_ERROR_CONNECTION_BROKEN: 4500 r = scferror2errno(scf_error()); 4501 goto out; 4502 4503 case SCF_ERROR_DELETED: 4504 warn(emsg_pg_deleted, ient->sc_fmri, 4505 "dependents"); 4506 r = EBUSY; 4507 goto out; 4508 4509 case SCF_ERROR_EXISTS: 4510 warn(emsg_pg_changed, ient->sc_fmri, 4511 "dependents"); 4512 r = EBUSY; 4513 goto out; 4514 4515 case SCF_ERROR_INVALID_ARGUMENT: 4516 case SCF_ERROR_HANDLE_MISMATCH: 4517 case SCF_ERROR_NOT_BOUND: 4518 case SCF_ERROR_NOT_SET: 4519 default: 4520 bad_error("scf_transaction_property_" 4521 "new", scf_error()); 4522 } 4523 } 4524 } 4525 4526 if (scf_value_set_from_string(val, SCF_TYPE_FMRI, 4527 new_dpt_pgroup->sc_pgroup_fmri) != 0) 4528 /* invalid sc_pgroup_fmri caught above */ 4529 bad_error("scf_value_set_from_string", 4530 scf_error()); 4531 4532 if (scf_entry_add_value(ent, val) != 0) 4533 bad_error("scf_entry_add_value", scf_error()); 4534 break; 4535 } 4536 4537 case -2: 4538 warn(li_corrupt, ient->sc_fmri); 4539 internal_pgroup_free(current_pg); 4540 r = EBADF; 4541 goto out; 4542 4543 case -1: 4544 default: 4545 /* invalid sc_pgroup_fmri caught above */ 4546 bad_error("fmri_equal", r); 4547 } 4548 4549 r = 0; 4550 4551 out: 4552 if (old_dpt_pgroup != NULL) 4553 internal_pgroup_free(old_dpt_pgroup); 4554 4555 return (r); 4556 } 4557 4558 /* 4559 * new_dpt_pgroup was in the manifest but not the last-import snapshot, so we 4560 * would import it, except it seems to exist in the service anyway. Compare 4561 * the existent dependent with the one we would import, and report any 4562 * differences (if there are none, be silent). prop is the property which 4563 * represents the existent dependent (in the dependents property group) in the 4564 * entity corresponding to ient. 4565 * 4566 * Returns 4567 * 0 - success (Sort of. At least, we can continue importing.) 4568 * ECONNABORTED - repository connection broken 4569 * EBUSY - ancestor of prop was deleted (error printed) 4570 * ENOMEM - out of memory 4571 * EBADF - corrupt property group (error printed) 4572 * EINVAL - new_dpt_pgroup has invalid target (error printed) 4573 */ 4574 static int 4575 handle_dependent_conflict(const entity_t * const ient, 4576 const scf_property_t * const prop, const pgroup_t * const new_dpt_pgroup) 4577 { 4578 int r; 4579 scf_type_t ty; 4580 scf_error_t scfe; 4581 void *tptr; 4582 int tissvc; 4583 pgroup_t *pgroup; 4584 4585 if (scf_property_get_value(prop, ud_val) != 0) { 4586 switch (scf_error()) { 4587 case SCF_ERROR_CONNECTION_BROKEN: 4588 return (scferror2errno(scf_error())); 4589 4590 case SCF_ERROR_DELETED: 4591 warn(emsg_pg_deleted, ient->sc_fmri, 4592 new_dpt_pgroup->sc_pgroup_name); 4593 return (EBUSY); 4594 4595 case SCF_ERROR_CONSTRAINT_VIOLATED: 4596 case SCF_ERROR_NOT_FOUND: 4597 warn(gettext("Conflict upgrading %s (not importing " 4598 "dependent \"%s\" because it already exists.) " 4599 "Warning: The \"%s/%2$s\" property has more or " 4600 "fewer than one value)).\n"), ient->sc_fmri, 4601 new_dpt_pgroup->sc_pgroup_name, "dependents"); 4602 return (0); 4603 4604 case SCF_ERROR_HANDLE_MISMATCH: 4605 case SCF_ERROR_NOT_BOUND: 4606 case SCF_ERROR_NOT_SET: 4607 case SCF_ERROR_PERMISSION_DENIED: 4608 default: 4609 bad_error("scf_property_get_value", 4610 scf_error()); 4611 } 4612 } 4613 4614 ty = scf_value_type(ud_val); 4615 assert(ty != SCF_TYPE_INVALID); 4616 if (!(ty == SCF_TYPE_FMRI || ty == SCF_TYPE_ASTRING)) { 4617 warn(gettext("Conflict upgrading %s (not importing dependent " 4618 "\"%s\" because it already exists). Warning: The " 4619 "\"%s/%s\" property has unexpected type \"%s\")).\n"), 4620 ient->sc_fmri, new_dpt_pgroup->sc_pgroup_name, 4621 scf_type_to_string(ty), "dependents"); 4622 return (0); 4623 } 4624 4625 if (scf_value_get_as_string(ud_val, ud_ctarg, max_scf_value_len + 1) < 4626 0) 4627 bad_error("scf_value_get_as_string", scf_error()); 4628 4629 r = fmri_equal(ud_ctarg, new_dpt_pgroup->sc_pgroup_fmri); 4630 switch (r) { 4631 case 0: 4632 warn(gettext("Conflict upgrading %s (not importing dependent " 4633 "\"%s\" (target \"%s\") because it already exists with " 4634 "target \"%s\").\n"), ient->sc_fmri, 4635 new_dpt_pgroup->sc_pgroup_name, 4636 new_dpt_pgroup->sc_pgroup_fmri, ud_ctarg); 4637 return (0); 4638 4639 case 1: 4640 break; 4641 4642 case -1: 4643 warn(gettext("Conflict upgrading %s (not importing dependent " 4644 "\"%s\" because it already exists). Warning: The current " 4645 "dependent's target (%s) is invalid.\n"), ient->sc_fmri, 4646 new_dpt_pgroup->sc_pgroup_name, ud_ctarg); 4647 return (0); 4648 4649 case -2: 4650 warn(gettext("Dependent \"%s\" of %s has invalid target " 4651 "\"%s\".\n"), new_dpt_pgroup->sc_pgroup_name, ient->sc_fmri, 4652 new_dpt_pgroup->sc_pgroup_fmri); 4653 return (EINVAL); 4654 4655 default: 4656 bad_error("fmri_equal", r); 4657 } 4658 4659 /* compare dependency pgs in target */ 4660 scfe = fmri_to_entity(g_hndl, ud_ctarg, &tptr, &tissvc); 4661 switch (scfe) { 4662 case SCF_ERROR_NONE: 4663 break; 4664 4665 case SCF_ERROR_NO_MEMORY: 4666 return (ENOMEM); 4667 4668 case SCF_ERROR_NOT_FOUND: 4669 warn(emsg_dpt_dangling, ient->sc_fmri, 4670 new_dpt_pgroup->sc_pgroup_name, ud_ctarg); 4671 return (0); 4672 4673 case SCF_ERROR_CONSTRAINT_VIOLATED: 4674 case SCF_ERROR_INVALID_ARGUMENT: 4675 default: 4676 bad_error("fmri_to_entity", scfe); 4677 } 4678 4679 r = entity_get_running_pg(tptr, tissvc, new_dpt_pgroup->sc_pgroup_name, 4680 ud_pg, ud_iter, ud_inst, imp_snap, ud_snpl); 4681 switch (r) { 4682 case 0: 4683 break; 4684 4685 case ECONNABORTED: 4686 return (r); 4687 4688 case ECANCELED: 4689 warn(emsg_dpt_dangling, ient->sc_fmri, 4690 new_dpt_pgroup->sc_pgroup_name, ud_ctarg); 4691 return (0); 4692 4693 case EBADF: 4694 if (tissvc) 4695 warn(gettext("%s has an instance with a \"%s\" " 4696 "snapshot which is missing a snaplevel.\n"), 4697 ud_ctarg, "running"); 4698 else 4699 warn(gettext("%s has a \"%s\" snapshot which is " 4700 "missing a snaplevel.\n"), ud_ctarg, "running"); 4701 /* FALLTHROUGH */ 4702 4703 case ENOENT: 4704 warn(emsg_dpt_no_dep, ient->sc_fmri, 4705 new_dpt_pgroup->sc_pgroup_name, ud_ctarg, 4706 new_dpt_pgroup->sc_pgroup_name); 4707 return (0); 4708 4709 case EINVAL: 4710 default: 4711 bad_error("entity_get_running_pg", r); 4712 } 4713 4714 pgroup = internal_pgroup_new(); 4715 if (pgroup == NULL) 4716 return (ENOMEM); 4717 4718 r = load_pg(ud_pg, &pgroup, ud_ctarg, NULL); 4719 switch (r) { 4720 case 0: 4721 break; 4722 4723 case ECONNABORTED: 4724 case EBADF: 4725 case ENOMEM: 4726 internal_pgroup_free(pgroup); 4727 return (r); 4728 4729 case ECANCELED: 4730 warn(emsg_dpt_no_dep, ient->sc_fmri, 4731 new_dpt_pgroup->sc_pgroup_name, ud_ctarg, 4732 new_dpt_pgroup->sc_pgroup_name); 4733 internal_pgroup_free(pgroup); 4734 return (0); 4735 4736 case EACCES: 4737 default: 4738 bad_error("load_pg", r); 4739 } 4740 4741 /* report differences */ 4742 report_pg_diffs(new_dpt_pgroup, pgroup, ud_ctarg, 1); 4743 internal_pgroup_free(pgroup); 4744 return (0); 4745 } 4746 4747 /* 4748 * lipg is a property group in the last-import snapshot of ent, which is an 4749 * scf_service_t or an scf_instance_t (according to ient). If lipg is not in 4750 * ient's pgroups, delete it from ent if it hasn't been customized. If it is 4751 * in ents's property groups, compare and upgrade ent appropriately. 4752 * 4753 * Returns 4754 * 0 - success 4755 * ECONNABORTED - repository connection broken 4756 * ENOMEM - out of memory 4757 * ENOSPC - configd is out of resources 4758 * EINVAL - ient has invalid dependent (error printed) 4759 * - ient has invalid pgroup_t (error printed) 4760 * ECANCELED - ent has been deleted 4761 * ENODEV - entity containing lipg has been deleted 4762 * - entity containing running has been deleted 4763 * EPERM - could not delete pg (permission denied) (error printed) 4764 * - couldn't upgrade dependents (permission denied) (error printed) 4765 * - couldn't import pg (permission denied) (error printed) 4766 * - couldn't upgrade pg (permission denied) (error printed) 4767 * EROFS - could not delete pg (repository read-only) 4768 * - couldn't upgrade dependents (repository read-only) 4769 * - couldn't import pg (repository read-only) 4770 * - couldn't upgrade pg (repository read-only) 4771 * EACCES - could not delete pg (backend access denied) 4772 * - couldn't upgrade dependents (backend access denied) 4773 * - couldn't import pg (backend access denied) 4774 * - couldn't upgrade pg (backend access denied) 4775 * - couldn't read property (backend access denied) 4776 * EBUSY - property group was added (error printed) 4777 * - property group was deleted (error printed) 4778 * - property group changed (error printed) 4779 * - "dependents" pg was added, changed, or deleted (error printed) 4780 * - dependent target deleted (error printed) 4781 * - dependent pg changed (error printed) 4782 * EBADF - imp_snpl is corrupt (error printed) 4783 * - ent has bad pg (error printed) 4784 * EEXIST - dependent collision in target service (error printed) 4785 */ 4786 static int 4787 process_old_pg(const scf_propertygroup_t *lipg, entity_t *ient, void *ent, 4788 const scf_snaplevel_t *running) 4789 { 4790 int r; 4791 pgroup_t *mpg, *lipg_i, *curpg_i, pgrp; 4792 scf_callback_t cbdata; 4793 4794 const char * const cf_pg_missing = 4795 gettext("Conflict upgrading %s (property group %s is missing)\n"); 4796 const char * const deleting = 4797 gettext("%s: Deleting property group \"%s\".\n"); 4798 4799 const int issvc = (ient->sc_etype == SVCCFG_SERVICE_OBJECT); 4800 4801 /* Skip dependent property groups. */ 4802 if (scf_pg_get_type(lipg, imp_str, imp_str_sz) < 0) { 4803 switch (scf_error()) { 4804 case SCF_ERROR_DELETED: 4805 return (ENODEV); 4806 4807 case SCF_ERROR_CONNECTION_BROKEN: 4808 return (ECONNABORTED); 4809 4810 case SCF_ERROR_NOT_SET: 4811 case SCF_ERROR_NOT_BOUND: 4812 default: 4813 bad_error("scf_pg_get_type", scf_error()); 4814 } 4815 } 4816 4817 if (strcmp(imp_str, SCF_GROUP_DEPENDENCY) == 0) { 4818 if (scf_pg_get_property(lipg, "external", NULL) == 0) 4819 return (0); 4820 4821 switch (scf_error()) { 4822 case SCF_ERROR_NOT_FOUND: 4823 break; 4824 4825 case SCF_ERROR_CONNECTION_BROKEN: 4826 return (ECONNABORTED); 4827 4828 case SCF_ERROR_DELETED: 4829 return (ENODEV); 4830 4831 case SCF_ERROR_INVALID_ARGUMENT: 4832 case SCF_ERROR_NOT_BOUND: 4833 case SCF_ERROR_HANDLE_MISMATCH: 4834 case SCF_ERROR_NOT_SET: 4835 default: 4836 bad_error("scf_pg_get_property", scf_error()); 4837 } 4838 } 4839 4840 /* lookup pg in new properties */ 4841 if (scf_pg_get_name(lipg, imp_str, imp_str_sz) < 0) { 4842 switch (scf_error()) { 4843 case SCF_ERROR_DELETED: 4844 return (ENODEV); 4845 4846 case SCF_ERROR_CONNECTION_BROKEN: 4847 return (ECONNABORTED); 4848 4849 case SCF_ERROR_NOT_SET: 4850 case SCF_ERROR_NOT_BOUND: 4851 default: 4852 bad_error("scf_pg_get_name", scf_error()); 4853 } 4854 } 4855 4856 pgrp.sc_pgroup_name = imp_str; 4857 mpg = uu_list_find(ient->sc_pgroups, &pgrp, NULL, NULL); 4858 4859 if (mpg != NULL) 4860 mpg->sc_pgroup_seen = 1; 4861 4862 /* Special handling for dependents */ 4863 if (strcmp(imp_str, "dependents") == 0) 4864 return (upgrade_dependents(lipg, imp_snpl, ient, running, ent)); 4865 4866 if (strcmp(imp_str, SCF_PG_MANIFESTFILES) == 0) 4867 return (upgrade_manifestfiles(NULL, ient, running, ent)); 4868 4869 if (mpg == NULL || mpg->sc_pgroup_delete) { 4870 /* property group was deleted from manifest */ 4871 if (entity_get_pg(ent, issvc, imp_str, imp_pg2) != 0) { 4872 switch (scf_error()) { 4873 case SCF_ERROR_NOT_FOUND: 4874 return (0); 4875 4876 case SCF_ERROR_DELETED: 4877 case SCF_ERROR_CONNECTION_BROKEN: 4878 return (scferror2errno(scf_error())); 4879 4880 case SCF_ERROR_INVALID_ARGUMENT: 4881 case SCF_ERROR_HANDLE_MISMATCH: 4882 case SCF_ERROR_NOT_BOUND: 4883 case SCF_ERROR_NOT_SET: 4884 default: 4885 bad_error("entity_get_pg", scf_error()); 4886 } 4887 } 4888 4889 if (mpg != NULL && mpg->sc_pgroup_delete) { 4890 if (g_verbose) 4891 warn(deleting, ient->sc_fmri, imp_str); 4892 if (scf_pg_delete(imp_pg2) == 0) 4893 return (0); 4894 4895 switch (scf_error()) { 4896 case SCF_ERROR_DELETED: 4897 return (0); 4898 4899 case SCF_ERROR_CONNECTION_BROKEN: 4900 case SCF_ERROR_BACKEND_READONLY: 4901 case SCF_ERROR_BACKEND_ACCESS: 4902 return (scferror2errno(scf_error())); 4903 4904 case SCF_ERROR_PERMISSION_DENIED: 4905 warn(emsg_pg_del_perm, imp_str, ient->sc_fmri); 4906 return (scferror2errno(scf_error())); 4907 4908 case SCF_ERROR_NOT_SET: 4909 default: 4910 bad_error("scf_pg_delete", scf_error()); 4911 } 4912 } 4913 4914 r = load_pg(lipg, &lipg_i, ient->sc_fmri, snap_lastimport); 4915 switch (r) { 4916 case 0: 4917 break; 4918 4919 case ECANCELED: 4920 return (ENODEV); 4921 4922 case ECONNABORTED: 4923 case ENOMEM: 4924 case EBADF: 4925 case EACCES: 4926 return (r); 4927 4928 default: 4929 bad_error("load_pg", r); 4930 } 4931 4932 r = load_pg(imp_pg2, &curpg_i, ient->sc_fmri, NULL); 4933 switch (r) { 4934 case 0: 4935 break; 4936 4937 case ECANCELED: 4938 case ECONNABORTED: 4939 case ENOMEM: 4940 case EBADF: 4941 case EACCES: 4942 internal_pgroup_free(lipg_i); 4943 return (r); 4944 4945 default: 4946 bad_error("load_pg", r); 4947 } 4948 4949 if (pg_equal(lipg_i, curpg_i)) { 4950 if (g_verbose) 4951 warn(deleting, ient->sc_fmri, imp_str); 4952 if (scf_pg_delete(imp_pg2) != 0) { 4953 switch (scf_error()) { 4954 case SCF_ERROR_DELETED: 4955 break; 4956 4957 case SCF_ERROR_CONNECTION_BROKEN: 4958 internal_pgroup_free(lipg_i); 4959 internal_pgroup_free(curpg_i); 4960 return (ECONNABORTED); 4961 4962 case SCF_ERROR_NOT_SET: 4963 case SCF_ERROR_NOT_BOUND: 4964 default: 4965 bad_error("scf_pg_delete", scf_error()); 4966 } 4967 } 4968 } else { 4969 report_pg_diffs(lipg_i, curpg_i, ient->sc_fmri, 0); 4970 } 4971 4972 internal_pgroup_free(lipg_i); 4973 internal_pgroup_free(curpg_i); 4974 4975 return (0); 4976 } 4977 4978 /* 4979 * Only dependent pgs can have override set, and we skipped those 4980 * above. 4981 */ 4982 assert(!mpg->sc_pgroup_override); 4983 4984 /* compare */ 4985 r = load_pg(lipg, &lipg_i, ient->sc_fmri, snap_lastimport); 4986 switch (r) { 4987 case 0: 4988 break; 4989 4990 case ECANCELED: 4991 return (ENODEV); 4992 4993 case ECONNABORTED: 4994 case EBADF: 4995 case ENOMEM: 4996 case EACCES: 4997 return (r); 4998 4999 default: 5000 bad_error("load_pg", r); 5001 } 5002 5003 if (pg_equal(mpg, lipg_i)) { 5004 /* The manifest pg has not changed. Move on. */ 5005 r = 0; 5006 goto out; 5007 } 5008 5009 /* upgrade current properties according to lipg & mpg */ 5010 if (running != NULL) 5011 r = scf_snaplevel_get_pg(running, imp_str, imp_pg2); 5012 else 5013 r = entity_get_pg(ent, issvc, imp_str, imp_pg2); 5014 if (r != 0) { 5015 switch (scf_error()) { 5016 case SCF_ERROR_CONNECTION_BROKEN: 5017 r = scferror2errno(scf_error()); 5018 goto out; 5019 5020 case SCF_ERROR_DELETED: 5021 if (running != NULL) 5022 r = ENODEV; 5023 else 5024 r = ECANCELED; 5025 goto out; 5026 5027 case SCF_ERROR_NOT_FOUND: 5028 break; 5029 5030 case SCF_ERROR_INVALID_ARGUMENT: 5031 case SCF_ERROR_HANDLE_MISMATCH: 5032 case SCF_ERROR_NOT_BOUND: 5033 case SCF_ERROR_NOT_SET: 5034 default: 5035 bad_error("entity_get_pg", scf_error()); 5036 } 5037 5038 warn(cf_pg_missing, ient->sc_fmri, imp_str); 5039 5040 r = 0; 5041 goto out; 5042 } 5043 5044 r = load_pg_attrs(imp_pg2, &curpg_i); 5045 switch (r) { 5046 case 0: 5047 break; 5048 5049 case ECANCELED: 5050 warn(cf_pg_missing, ient->sc_fmri, imp_str); 5051 r = 0; 5052 goto out; 5053 5054 case ECONNABORTED: 5055 case ENOMEM: 5056 goto out; 5057 5058 default: 5059 bad_error("load_pg_attrs", r); 5060 } 5061 5062 if (!pg_attrs_equal(lipg_i, curpg_i, NULL, 0)) { 5063 (void) pg_attrs_equal(curpg_i, mpg, ient->sc_fmri, 0); 5064 internal_pgroup_free(curpg_i); 5065 r = 0; 5066 goto out; 5067 } 5068 5069 internal_pgroup_free(curpg_i); 5070 5071 r = load_pg(imp_pg2, &curpg_i, ient->sc_fmri, NULL); 5072 switch (r) { 5073 case 0: 5074 break; 5075 5076 case ECANCELED: 5077 warn(cf_pg_missing, ient->sc_fmri, imp_str); 5078 r = 0; 5079 goto out; 5080 5081 case ECONNABORTED: 5082 case EBADF: 5083 case ENOMEM: 5084 case EACCES: 5085 goto out; 5086 5087 default: 5088 bad_error("load_pg", r); 5089 } 5090 5091 if (pg_equal(lipg_i, curpg_i) && 5092 !pg_attrs_equal(lipg_i, mpg, NULL, 0)) { 5093 int do_delete = 1; 5094 5095 if (g_verbose) 5096 warn(gettext("%s: Upgrading property group \"%s\".\n"), 5097 ient->sc_fmri, mpg->sc_pgroup_name); 5098 5099 internal_pgroup_free(curpg_i); 5100 5101 if (running != NULL && 5102 entity_get_pg(ent, issvc, imp_str, imp_pg2) != 0) { 5103 switch (scf_error()) { 5104 case SCF_ERROR_DELETED: 5105 r = ECANCELED; 5106 goto out; 5107 5108 case SCF_ERROR_NOT_FOUND: 5109 do_delete = 0; 5110 break; 5111 5112 case SCF_ERROR_CONNECTION_BROKEN: 5113 r = scferror2errno(scf_error()); 5114 goto out; 5115 5116 case SCF_ERROR_HANDLE_MISMATCH: 5117 case SCF_ERROR_INVALID_ARGUMENT: 5118 case SCF_ERROR_NOT_SET: 5119 case SCF_ERROR_NOT_BOUND: 5120 default: 5121 bad_error("entity_get_pg", scf_error()); 5122 } 5123 } 5124 5125 if (do_delete && scf_pg_delete(imp_pg2) != 0) { 5126 switch (scf_error()) { 5127 case SCF_ERROR_DELETED: 5128 break; 5129 5130 case SCF_ERROR_CONNECTION_BROKEN: 5131 case SCF_ERROR_BACKEND_READONLY: 5132 case SCF_ERROR_BACKEND_ACCESS: 5133 r = scferror2errno(scf_error()); 5134 goto out; 5135 5136 case SCF_ERROR_PERMISSION_DENIED: 5137 warn(emsg_pg_del_perm, mpg->sc_pgroup_name, 5138 ient->sc_fmri); 5139 r = scferror2errno(scf_error()); 5140 goto out; 5141 5142 case SCF_ERROR_NOT_SET: 5143 case SCF_ERROR_NOT_BOUND: 5144 default: 5145 bad_error("scf_pg_delete", scf_error()); 5146 } 5147 } 5148 5149 cbdata.sc_handle = g_hndl; 5150 cbdata.sc_parent = ent; 5151 cbdata.sc_service = issvc; 5152 cbdata.sc_flags = 0; 5153 cbdata.sc_source_fmri = ient->sc_fmri; 5154 cbdata.sc_target_fmri = ient->sc_fmri; 5155 5156 r = entity_pgroup_import(mpg, &cbdata); 5157 switch (r) { 5158 case UU_WALK_NEXT: 5159 r = 0; 5160 goto out; 5161 5162 case UU_WALK_ERROR: 5163 if (cbdata.sc_err == EEXIST) { 5164 warn(emsg_pg_added, ient->sc_fmri, 5165 mpg->sc_pgroup_name); 5166 r = EBUSY; 5167 } else { 5168 r = cbdata.sc_err; 5169 } 5170 goto out; 5171 5172 default: 5173 bad_error("entity_pgroup_import", r); 5174 } 5175 } 5176 5177 if (running != NULL && 5178 entity_get_pg(ent, issvc, imp_str, imp_pg2) != 0) { 5179 switch (scf_error()) { 5180 case SCF_ERROR_CONNECTION_BROKEN: 5181 case SCF_ERROR_DELETED: 5182 r = scferror2errno(scf_error()); 5183 goto out; 5184 5185 case SCF_ERROR_NOT_FOUND: 5186 break; 5187 5188 case SCF_ERROR_HANDLE_MISMATCH: 5189 case SCF_ERROR_INVALID_ARGUMENT: 5190 case SCF_ERROR_NOT_SET: 5191 case SCF_ERROR_NOT_BOUND: 5192 default: 5193 bad_error("entity_get_pg", scf_error()); 5194 } 5195 5196 cbdata.sc_handle = g_hndl; 5197 cbdata.sc_parent = ent; 5198 cbdata.sc_service = issvc; 5199 cbdata.sc_flags = SCI_FORCE; 5200 cbdata.sc_source_fmri = ient->sc_fmri; 5201 cbdata.sc_target_fmri = ient->sc_fmri; 5202 5203 r = entity_pgroup_import(mpg, &cbdata); 5204 switch (r) { 5205 case UU_WALK_NEXT: 5206 r = 0; 5207 goto out; 5208 5209 case UU_WALK_ERROR: 5210 if (cbdata.sc_err == EEXIST) { 5211 warn(emsg_pg_added, ient->sc_fmri, 5212 mpg->sc_pgroup_name); 5213 r = EBUSY; 5214 } else { 5215 r = cbdata.sc_err; 5216 } 5217 goto out; 5218 5219 default: 5220 bad_error("entity_pgroup_import", r); 5221 } 5222 } 5223 5224 r = upgrade_pg(imp_pg2, curpg_i, lipg_i, mpg, g_verbose, ient->sc_fmri); 5225 internal_pgroup_free(curpg_i); 5226 switch (r) { 5227 case 0: 5228 ient->sc_import_state = IMPORT_PROP_BEGUN; 5229 break; 5230 5231 case ECANCELED: 5232 warn(emsg_pg_deleted, ient->sc_fmri, mpg->sc_pgroup_name); 5233 r = EBUSY; 5234 break; 5235 5236 case EPERM: 5237 warn(emsg_pg_mod_perm, mpg->sc_pgroup_name, ient->sc_fmri); 5238 break; 5239 5240 case EBUSY: 5241 warn(emsg_pg_changed, ient->sc_fmri, mpg->sc_pgroup_name); 5242 break; 5243 5244 case ECONNABORTED: 5245 case ENOMEM: 5246 case ENOSPC: 5247 case EROFS: 5248 case EACCES: 5249 case EINVAL: 5250 break; 5251 5252 default: 5253 bad_error("upgrade_pg", r); 5254 } 5255 5256 out: 5257 internal_pgroup_free(lipg_i); 5258 return (r); 5259 } 5260 5261 /* 5262 * Upgrade the properties of ent according to snpl & ient. 5263 * 5264 * Returns 5265 * 0 - success 5266 * ECONNABORTED - repository connection broken 5267 * ENOMEM - out of memory 5268 * ENOSPC - configd is out of resources 5269 * ECANCELED - ent was deleted 5270 * ENODEV - entity containing snpl was deleted 5271 * - entity containing running was deleted 5272 * EBADF - imp_snpl is corrupt (error printed) 5273 * - ent has corrupt pg (error printed) 5274 * - dependent has corrupt pg (error printed) 5275 * - dependent target has a corrupt snapshot (error printed) 5276 * EBUSY - pg was added, changed, or deleted (error printed) 5277 * - dependent target was deleted (error printed) 5278 * - dependent pg changed (error printed) 5279 * EINVAL - invalid property group name (error printed) 5280 * - invalid property name (error printed) 5281 * - invalid value (error printed) 5282 * - ient has invalid pgroup or dependent (error printed) 5283 * EPERM - could not create property group (permission denied) (error printed) 5284 * - could not modify property group (permission denied) (error printed) 5285 * - couldn't delete, upgrade, or import pg or dependent (error printed) 5286 * EROFS - could not create property group (repository read-only) 5287 * - couldn't delete, upgrade, or import pg or dependent 5288 * EACCES - could not create property group (backend access denied) 5289 * - couldn't delete, upgrade, or import pg or dependent 5290 * EEXIST - dependent collision in target service (error printed) 5291 */ 5292 static int 5293 upgrade_props(void *ent, scf_snaplevel_t *running, scf_snaplevel_t *snpl, 5294 entity_t *ient) 5295 { 5296 pgroup_t *pg, *rpg; 5297 int r; 5298 uu_list_t *pgs = ient->sc_pgroups; 5299 5300 const int issvc = (ient->sc_etype == SVCCFG_SERVICE_OBJECT); 5301 5302 /* clear sc_sceen for pgs */ 5303 if (uu_list_walk(pgs, clear_int, 5304 (void *)offsetof(pgroup_t, sc_pgroup_seen), UU_DEFAULT) != 0) 5305 bad_error("uu_list_walk", uu_error()); 5306 5307 if (scf_iter_snaplevel_pgs(imp_up_iter, snpl) != 0) { 5308 switch (scf_error()) { 5309 case SCF_ERROR_DELETED: 5310 return (ENODEV); 5311 5312 case SCF_ERROR_CONNECTION_BROKEN: 5313 return (ECONNABORTED); 5314 5315 case SCF_ERROR_NOT_SET: 5316 case SCF_ERROR_NOT_BOUND: 5317 case SCF_ERROR_HANDLE_MISMATCH: 5318 default: 5319 bad_error("scf_iter_snaplevel_pgs", scf_error()); 5320 } 5321 } 5322 5323 for (;;) { 5324 r = scf_iter_next_pg(imp_up_iter, imp_pg); 5325 if (r == 0) 5326 break; 5327 if (r == 1) { 5328 r = process_old_pg(imp_pg, ient, ent, running); 5329 switch (r) { 5330 case 0: 5331 break; 5332 5333 case ECONNABORTED: 5334 case ENOMEM: 5335 case ENOSPC: 5336 case ECANCELED: 5337 case ENODEV: 5338 case EPERM: 5339 case EROFS: 5340 case EACCES: 5341 case EBADF: 5342 case EBUSY: 5343 case EINVAL: 5344 case EEXIST: 5345 return (r); 5346 5347 default: 5348 bad_error("process_old_pg", r); 5349 } 5350 continue; 5351 } 5352 if (r != -1) 5353 bad_error("scf_iter_next_pg", r); 5354 5355 switch (scf_error()) { 5356 case SCF_ERROR_DELETED: 5357 return (ENODEV); 5358 5359 case SCF_ERROR_CONNECTION_BROKEN: 5360 return (ECONNABORTED); 5361 5362 case SCF_ERROR_HANDLE_MISMATCH: 5363 case SCF_ERROR_NOT_BOUND: 5364 case SCF_ERROR_NOT_SET: 5365 case SCF_ERROR_INVALID_ARGUMENT: 5366 default: 5367 bad_error("scf_iter_next_pg", scf_error()); 5368 } 5369 } 5370 5371 for (pg = uu_list_first(pgs); pg != NULL; pg = uu_list_next(pgs, pg)) { 5372 if (pg->sc_pgroup_seen) 5373 continue; 5374 5375 /* pg is new */ 5376 5377 if (strcmp(pg->sc_pgroup_name, "dependents") == 0) { 5378 r = upgrade_dependents(NULL, imp_snpl, ient, running, 5379 ent); 5380 switch (r) { 5381 case 0: 5382 break; 5383 5384 case ECONNABORTED: 5385 case ENOMEM: 5386 case ENOSPC: 5387 case ECANCELED: 5388 case ENODEV: 5389 case EBADF: 5390 case EBUSY: 5391 case EINVAL: 5392 case EPERM: 5393 case EROFS: 5394 case EACCES: 5395 case EEXIST: 5396 return (r); 5397 5398 default: 5399 bad_error("upgrade_dependents", r); 5400 } 5401 continue; 5402 } 5403 5404 if (strcmp(pg->sc_pgroup_name, SCF_PG_MANIFESTFILES) == 0) { 5405 r = upgrade_manifestfiles(pg, ient, running, ent); 5406 switch (r) { 5407 case 0: 5408 break; 5409 5410 case ECONNABORTED: 5411 case ENOMEM: 5412 case ENOSPC: 5413 case ECANCELED: 5414 case ENODEV: 5415 case EBADF: 5416 case EBUSY: 5417 case EINVAL: 5418 case EPERM: 5419 case EROFS: 5420 case EACCES: 5421 case EEXIST: 5422 return (r); 5423 5424 default: 5425 bad_error("upgrade_manifestfiles", r); 5426 } 5427 continue; 5428 } 5429 5430 if (running != NULL) { 5431 r = scf_snaplevel_get_pg(running, pg->sc_pgroup_name, 5432 imp_pg); 5433 } else { 5434 r = entity_get_pg(ent, issvc, pg->sc_pgroup_name, 5435 imp_pg); 5436 } 5437 if (r != 0) { 5438 scf_callback_t cbdata; 5439 5440 switch (scf_error()) { 5441 case SCF_ERROR_NOT_FOUND: 5442 break; 5443 5444 case SCF_ERROR_CONNECTION_BROKEN: 5445 return (scferror2errno(scf_error())); 5446 5447 case SCF_ERROR_DELETED: 5448 if (running != NULL) 5449 return (ENODEV); 5450 else 5451 return (scferror2errno(scf_error())); 5452 5453 case SCF_ERROR_INVALID_ARGUMENT: 5454 warn(emsg_fmri_invalid_pg_name, ient->sc_fmri, 5455 pg->sc_pgroup_name); 5456 return (EINVAL); 5457 5458 case SCF_ERROR_NOT_SET: 5459 case SCF_ERROR_HANDLE_MISMATCH: 5460 case SCF_ERROR_NOT_BOUND: 5461 default: 5462 bad_error("entity_get_pg", scf_error()); 5463 } 5464 5465 /* User doesn't have pg, so import it. */ 5466 5467 cbdata.sc_handle = g_hndl; 5468 cbdata.sc_parent = ent; 5469 cbdata.sc_service = issvc; 5470 cbdata.sc_flags = SCI_FORCE; 5471 cbdata.sc_source_fmri = ient->sc_fmri; 5472 cbdata.sc_target_fmri = ient->sc_fmri; 5473 5474 r = entity_pgroup_import(pg, &cbdata); 5475 switch (r) { 5476 case UU_WALK_NEXT: 5477 ient->sc_import_state = IMPORT_PROP_BEGUN; 5478 continue; 5479 5480 case UU_WALK_ERROR: 5481 if (cbdata.sc_err == EEXIST) { 5482 warn(emsg_pg_added, ient->sc_fmri, 5483 pg->sc_pgroup_name); 5484 return (EBUSY); 5485 } 5486 return (cbdata.sc_err); 5487 5488 default: 5489 bad_error("entity_pgroup_import", r); 5490 } 5491 } 5492 5493 /* report differences between pg & current */ 5494 r = load_pg(imp_pg, &rpg, ient->sc_fmri, NULL); 5495 switch (r) { 5496 case 0: 5497 break; 5498 5499 case ECANCELED: 5500 warn(emsg_pg_deleted, ient->sc_fmri, 5501 pg->sc_pgroup_name); 5502 return (EBUSY); 5503 5504 case ECONNABORTED: 5505 case EBADF: 5506 case ENOMEM: 5507 case EACCES: 5508 return (r); 5509 5510 default: 5511 bad_error("load_pg", r); 5512 } 5513 report_pg_diffs(pg, rpg, ient->sc_fmri, 1); 5514 internal_pgroup_free(rpg); 5515 rpg = NULL; 5516 } 5517 5518 return (0); 5519 } 5520 5521 /* 5522 * Import an instance. If it doesn't exist, create it. If it has 5523 * a last-import snapshot, upgrade its properties. Finish by updating its 5524 * last-import snapshot. If it doesn't have a last-import snapshot then it 5525 * could have been created for a dependent tag in another manifest. Import the 5526 * new properties. If there's a conflict, don't override, like now? 5527 * 5528 * On success, returns UU_WALK_NEXT. On error returns UU_WALK_ERROR and sets 5529 * lcbdata->sc_err to 5530 * ECONNABORTED - repository connection broken 5531 * ENOMEM - out of memory 5532 * ENOSPC - svc.configd is out of resources 5533 * EEXIST - dependency collision in dependent service (error printed) 5534 * EPERM - couldn't create temporary instance (permission denied) 5535 * - couldn't import into temporary instance (permission denied) 5536 * - couldn't take snapshot (permission denied) 5537 * - couldn't upgrade properties (permission denied) 5538 * - couldn't import properties (permission denied) 5539 * - couldn't import dependents (permission denied) 5540 * EROFS - couldn't create temporary instance (repository read-only) 5541 * - couldn't import into temporary instance (repository read-only) 5542 * - couldn't upgrade properties (repository read-only) 5543 * - couldn't import properties (repository read-only) 5544 * - couldn't import dependents (repository read-only) 5545 * EACCES - couldn't create temporary instance (backend access denied) 5546 * - couldn't import into temporary instance (backend access denied) 5547 * - couldn't upgrade properties (backend access denied) 5548 * - couldn't import properties (backend access denied) 5549 * - couldn't import dependents (backend access denied) 5550 * EINVAL - invalid instance name (error printed) 5551 * - invalid pgroup_t's (error printed) 5552 * - invalid dependents (error printed) 5553 * EBUSY - temporary service deleted (error printed) 5554 * - temporary instance deleted (error printed) 5555 * - temporary instance changed (error printed) 5556 * - temporary instance already exists (error printed) 5557 * - instance deleted (error printed) 5558 * EBADF - instance has corrupt last-import snapshot (error printed) 5559 * - instance is corrupt (error printed) 5560 * - dependent has corrupt pg (error printed) 5561 * - dependent target has a corrupt snapshot (error printed) 5562 * -1 - unknown libscf error (error printed) 5563 */ 5564 static int 5565 lscf_instance_import(void *v, void *pvt) 5566 { 5567 entity_t *inst = v; 5568 scf_callback_t ctx; 5569 scf_callback_t *lcbdata = pvt; 5570 scf_service_t *rsvc = lcbdata->sc_parent; 5571 int r; 5572 scf_snaplevel_t *running; 5573 int flags = lcbdata->sc_flags; 5574 5575 const char * const emsg_tdel = 5576 gettext("Temporary instance svc:/%s:%s was deleted.\n"); 5577 const char * const emsg_tchg = gettext("Temporary instance svc:/%s:%s " 5578 "changed unexpectedly.\n"); 5579 const char * const emsg_del = gettext("%s changed unexpectedly " 5580 "(instance \"%s\" was deleted.)\n"); 5581 const char * const emsg_badsnap = gettext( 5582 "\"%s\" snapshot of %s is corrupt (missing a snaplevel).\n"); 5583 5584 /* 5585 * prepare last-import snapshot: 5586 * create temporary instance (service was precreated) 5587 * populate with properties from bundle 5588 * take snapshot 5589 */ 5590 if (scf_service_add_instance(imp_tsvc, inst->sc_name, imp_tinst) != 0) { 5591 switch (scf_error()) { 5592 case SCF_ERROR_CONNECTION_BROKEN: 5593 case SCF_ERROR_NO_RESOURCES: 5594 case SCF_ERROR_BACKEND_READONLY: 5595 case SCF_ERROR_BACKEND_ACCESS: 5596 return (stash_scferror(lcbdata)); 5597 5598 case SCF_ERROR_EXISTS: 5599 warn(gettext("Temporary service svc:/%s " 5600 "changed unexpectedly (instance \"%s\" added).\n"), 5601 imp_tsname, inst->sc_name); 5602 lcbdata->sc_err = EBUSY; 5603 return (UU_WALK_ERROR); 5604 5605 case SCF_ERROR_DELETED: 5606 warn(gettext("Temporary service svc:/%s " 5607 "was deleted unexpectedly.\n"), imp_tsname); 5608 lcbdata->sc_err = EBUSY; 5609 return (UU_WALK_ERROR); 5610 5611 case SCF_ERROR_INVALID_ARGUMENT: 5612 warn(gettext("Invalid instance name \"%s\".\n"), 5613 inst->sc_name); 5614 return (stash_scferror(lcbdata)); 5615 5616 case SCF_ERROR_PERMISSION_DENIED: 5617 warn(gettext("Could not create temporary instance " 5618 "\"%s\" in svc:/%s (permission denied).\n"), 5619 inst->sc_name, imp_tsname); 5620 return (stash_scferror(lcbdata)); 5621 5622 case SCF_ERROR_HANDLE_MISMATCH: 5623 case SCF_ERROR_NOT_BOUND: 5624 case SCF_ERROR_NOT_SET: 5625 default: 5626 bad_error("scf_service_add_instance", scf_error()); 5627 } 5628 } 5629 5630 r = snprintf(imp_str, imp_str_sz, "svc:/%s:%s", imp_tsname, 5631 inst->sc_name); 5632 if (r < 0) 5633 bad_error("snprintf", errno); 5634 5635 r = lscf_import_instance_pgs(imp_tinst, imp_str, inst, 5636 lcbdata->sc_flags | SCI_NOENABLED); 5637 switch (r) { 5638 case 0: 5639 break; 5640 5641 case ECANCELED: 5642 warn(emsg_tdel, imp_tsname, inst->sc_name); 5643 lcbdata->sc_err = EBUSY; 5644 r = UU_WALK_ERROR; 5645 goto deltemp; 5646 5647 case EEXIST: 5648 warn(emsg_tchg, imp_tsname, inst->sc_name); 5649 lcbdata->sc_err = EBUSY; 5650 r = UU_WALK_ERROR; 5651 goto deltemp; 5652 5653 case ECONNABORTED: 5654 goto connaborted; 5655 5656 case ENOMEM: 5657 case ENOSPC: 5658 case EPERM: 5659 case EROFS: 5660 case EACCES: 5661 case EINVAL: 5662 case EBUSY: 5663 lcbdata->sc_err = r; 5664 r = UU_WALK_ERROR; 5665 goto deltemp; 5666 5667 default: 5668 bad_error("lscf_import_instance_pgs", r); 5669 } 5670 5671 r = snprintf(imp_str, imp_str_sz, "svc:/%s:%s", imp_tsname, 5672 inst->sc_name); 5673 if (r < 0) 5674 bad_error("snprintf", errno); 5675 5676 ctx.sc_handle = lcbdata->sc_handle; 5677 ctx.sc_parent = imp_tinst; 5678 ctx.sc_service = 0; 5679 ctx.sc_source_fmri = inst->sc_fmri; 5680 ctx.sc_target_fmri = imp_str; 5681 if (uu_list_walk(inst->sc_dependents, entity_pgroup_import, &ctx, 5682 UU_DEFAULT) != 0) { 5683 if (uu_error() != UU_ERROR_CALLBACK_FAILED) 5684 bad_error("uu_list_walk", uu_error()); 5685 5686 switch (ctx.sc_err) { 5687 case ECONNABORTED: 5688 goto connaborted; 5689 5690 case ECANCELED: 5691 warn(emsg_tdel, imp_tsname, inst->sc_name); 5692 lcbdata->sc_err = EBUSY; 5693 break; 5694 5695 case EEXIST: 5696 warn(emsg_tchg, imp_tsname, inst->sc_name); 5697 lcbdata->sc_err = EBUSY; 5698 break; 5699 5700 default: 5701 lcbdata->sc_err = ctx.sc_err; 5702 } 5703 r = UU_WALK_ERROR; 5704 goto deltemp; 5705 } 5706 5707 if (_scf_snapshot_take_new_named(imp_tinst, inst->sc_parent->sc_name, 5708 inst->sc_name, snap_lastimport, imp_tlisnap) != 0) { 5709 switch (scf_error()) { 5710 case SCF_ERROR_CONNECTION_BROKEN: 5711 goto connaborted; 5712 5713 case SCF_ERROR_NO_RESOURCES: 5714 r = stash_scferror(lcbdata); 5715 goto deltemp; 5716 5717 case SCF_ERROR_EXISTS: 5718 warn(emsg_tchg, imp_tsname, inst->sc_name); 5719 lcbdata->sc_err = EBUSY; 5720 r = UU_WALK_ERROR; 5721 goto deltemp; 5722 5723 case SCF_ERROR_PERMISSION_DENIED: 5724 warn(gettext("Could not take \"%s\" snapshot of %s " 5725 "(permission denied).\n"), snap_lastimport, 5726 imp_str); 5727 r = stash_scferror(lcbdata); 5728 goto deltemp; 5729 5730 default: 5731 scfwarn(); 5732 lcbdata->sc_err = -1; 5733 r = UU_WALK_ERROR; 5734 goto deltemp; 5735 5736 case SCF_ERROR_HANDLE_MISMATCH: 5737 case SCF_ERROR_INVALID_ARGUMENT: 5738 case SCF_ERROR_NOT_SET: 5739 bad_error("_scf_snapshot_take_new_named", scf_error()); 5740 } 5741 } 5742 5743 if (lcbdata->sc_flags & SCI_FRESH) 5744 goto fresh; 5745 5746 if (scf_service_get_instance(rsvc, inst->sc_name, imp_inst) == 0) { 5747 if (scf_instance_get_snapshot(imp_inst, snap_lastimport, 5748 imp_lisnap) != 0) { 5749 switch (scf_error()) { 5750 case SCF_ERROR_DELETED: 5751 warn(emsg_del, inst->sc_parent->sc_fmri, 5752 inst->sc_name); 5753 lcbdata->sc_err = EBUSY; 5754 r = UU_WALK_ERROR; 5755 goto deltemp; 5756 5757 case SCF_ERROR_NOT_FOUND: 5758 flags |= SCI_FORCE; 5759 goto nosnap; 5760 5761 case SCF_ERROR_CONNECTION_BROKEN: 5762 goto connaborted; 5763 5764 case SCF_ERROR_INVALID_ARGUMENT: 5765 case SCF_ERROR_HANDLE_MISMATCH: 5766 case SCF_ERROR_NOT_BOUND: 5767 case SCF_ERROR_NOT_SET: 5768 default: 5769 bad_error("scf_instance_get_snapshot", 5770 scf_error()); 5771 } 5772 } 5773 5774 /* upgrade */ 5775 5776 /* 5777 * compare new properties with last-import properties 5778 * upgrade current properties 5779 */ 5780 /* clear sc_sceen for pgs */ 5781 if (uu_list_walk(inst->sc_pgroups, clear_int, 5782 (void *)offsetof(pgroup_t, sc_pgroup_seen), UU_DEFAULT) != 5783 0) 5784 bad_error("uu_list_walk", uu_error()); 5785 5786 r = get_snaplevel(imp_lisnap, 0, imp_snpl); 5787 switch (r) { 5788 case 0: 5789 break; 5790 5791 case ECONNABORTED: 5792 goto connaborted; 5793 5794 case ECANCELED: 5795 warn(emsg_del, inst->sc_parent->sc_fmri, inst->sc_name); 5796 lcbdata->sc_err = EBUSY; 5797 r = UU_WALK_ERROR; 5798 goto deltemp; 5799 5800 case ENOENT: 5801 warn(emsg_badsnap, snap_lastimport, inst->sc_fmri); 5802 lcbdata->sc_err = EBADF; 5803 r = UU_WALK_ERROR; 5804 goto deltemp; 5805 5806 default: 5807 bad_error("get_snaplevel", r); 5808 } 5809 5810 if (scf_instance_get_snapshot(imp_inst, snap_running, 5811 imp_rsnap) != 0) { 5812 switch (scf_error()) { 5813 case SCF_ERROR_DELETED: 5814 warn(emsg_del, inst->sc_parent->sc_fmri, 5815 inst->sc_name); 5816 lcbdata->sc_err = EBUSY; 5817 r = UU_WALK_ERROR; 5818 goto deltemp; 5819 5820 case SCF_ERROR_NOT_FOUND: 5821 break; 5822 5823 case SCF_ERROR_CONNECTION_BROKEN: 5824 goto connaborted; 5825 5826 case SCF_ERROR_INVALID_ARGUMENT: 5827 case SCF_ERROR_HANDLE_MISMATCH: 5828 case SCF_ERROR_NOT_BOUND: 5829 case SCF_ERROR_NOT_SET: 5830 default: 5831 bad_error("scf_instance_get_snapshot", 5832 scf_error()); 5833 } 5834 5835 running = NULL; 5836 } else { 5837 r = get_snaplevel(imp_rsnap, 0, imp_rsnpl); 5838 switch (r) { 5839 case 0: 5840 running = imp_rsnpl; 5841 break; 5842 5843 case ECONNABORTED: 5844 goto connaborted; 5845 5846 case ECANCELED: 5847 warn(emsg_del, inst->sc_parent->sc_fmri, 5848 inst->sc_name); 5849 lcbdata->sc_err = EBUSY; 5850 r = UU_WALK_ERROR; 5851 goto deltemp; 5852 5853 case ENOENT: 5854 warn(emsg_badsnap, snap_running, inst->sc_fmri); 5855 lcbdata->sc_err = EBADF; 5856 r = UU_WALK_ERROR; 5857 goto deltemp; 5858 5859 default: 5860 bad_error("get_snaplevel", r); 5861 } 5862 } 5863 5864 r = upgrade_props(imp_inst, running, imp_snpl, inst); 5865 switch (r) { 5866 case 0: 5867 break; 5868 5869 case ECANCELED: 5870 case ENODEV: 5871 warn(emsg_del, inst->sc_parent->sc_fmri, inst->sc_name); 5872 lcbdata->sc_err = EBUSY; 5873 r = UU_WALK_ERROR; 5874 goto deltemp; 5875 5876 case ECONNABORTED: 5877 goto connaborted; 5878 5879 case ENOMEM: 5880 case ENOSPC: 5881 case EBADF: 5882 case EBUSY: 5883 case EINVAL: 5884 case EPERM: 5885 case EROFS: 5886 case EACCES: 5887 case EEXIST: 5888 lcbdata->sc_err = r; 5889 r = UU_WALK_ERROR; 5890 goto deltemp; 5891 5892 default: 5893 bad_error("upgrade_props", r); 5894 } 5895 5896 inst->sc_import_state = IMPORT_PROP_DONE; 5897 } else { 5898 switch (scf_error()) { 5899 case SCF_ERROR_CONNECTION_BROKEN: 5900 goto connaborted; 5901 5902 case SCF_ERROR_NOT_FOUND: 5903 break; 5904 5905 case SCF_ERROR_INVALID_ARGUMENT: /* caught above */ 5906 case SCF_ERROR_HANDLE_MISMATCH: 5907 case SCF_ERROR_NOT_BOUND: 5908 case SCF_ERROR_NOT_SET: 5909 default: 5910 bad_error("scf_service_get_instance", scf_error()); 5911 } 5912 5913 fresh: 5914 /* create instance */ 5915 if (scf_service_add_instance(rsvc, inst->sc_name, 5916 imp_inst) != 0) { 5917 switch (scf_error()) { 5918 case SCF_ERROR_CONNECTION_BROKEN: 5919 goto connaborted; 5920 5921 case SCF_ERROR_NO_RESOURCES: 5922 case SCF_ERROR_BACKEND_READONLY: 5923 case SCF_ERROR_BACKEND_ACCESS: 5924 r = stash_scferror(lcbdata); 5925 goto deltemp; 5926 5927 case SCF_ERROR_EXISTS: 5928 warn(gettext("%s changed unexpectedly " 5929 "(instance \"%s\" added).\n"), 5930 inst->sc_parent->sc_fmri, inst->sc_name); 5931 lcbdata->sc_err = EBUSY; 5932 r = UU_WALK_ERROR; 5933 goto deltemp; 5934 5935 case SCF_ERROR_PERMISSION_DENIED: 5936 warn(gettext("Could not create \"%s\" instance " 5937 "in %s (permission denied).\n"), 5938 inst->sc_name, inst->sc_parent->sc_fmri); 5939 r = stash_scferror(lcbdata); 5940 goto deltemp; 5941 5942 case SCF_ERROR_INVALID_ARGUMENT: /* caught above */ 5943 case SCF_ERROR_HANDLE_MISMATCH: 5944 case SCF_ERROR_NOT_BOUND: 5945 case SCF_ERROR_NOT_SET: 5946 default: 5947 bad_error("scf_service_add_instance", 5948 scf_error()); 5949 } 5950 } 5951 5952 nosnap: 5953 /* 5954 * Create a last-import snapshot to serve as an attachment 5955 * point for the real one from the temporary instance. Since 5956 * the contents is irrelevant, take it now, while the instance 5957 * is empty, to minimize svc.configd's work. 5958 */ 5959 if (_scf_snapshot_take_new(imp_inst, snap_lastimport, 5960 imp_lisnap) != 0) { 5961 switch (scf_error()) { 5962 case SCF_ERROR_CONNECTION_BROKEN: 5963 goto connaborted; 5964 5965 case SCF_ERROR_NO_RESOURCES: 5966 r = stash_scferror(lcbdata); 5967 goto deltemp; 5968 5969 case SCF_ERROR_EXISTS: 5970 warn(gettext("%s changed unexpectedly " 5971 "(snapshot \"%s\" added).\n"), 5972 inst->sc_fmri, snap_lastimport); 5973 lcbdata->sc_err = EBUSY; 5974 r = UU_WALK_ERROR; 5975 goto deltemp; 5976 5977 case SCF_ERROR_PERMISSION_DENIED: 5978 warn(gettext("Could not take \"%s\" snapshot " 5979 "of %s (permission denied).\n"), 5980 snap_lastimport, inst->sc_fmri); 5981 r = stash_scferror(lcbdata); 5982 goto deltemp; 5983 5984 default: 5985 scfwarn(); 5986 lcbdata->sc_err = -1; 5987 r = UU_WALK_ERROR; 5988 goto deltemp; 5989 5990 case SCF_ERROR_NOT_SET: 5991 case SCF_ERROR_INTERNAL: 5992 case SCF_ERROR_INVALID_ARGUMENT: 5993 case SCF_ERROR_HANDLE_MISMATCH: 5994 bad_error("_scf_snapshot_take_new", 5995 scf_error()); 5996 } 5997 } 5998 5999 if (li_only) 6000 goto lionly; 6001 6002 inst->sc_import_state = IMPORT_PROP_BEGUN; 6003 6004 r = lscf_import_instance_pgs(imp_inst, inst->sc_fmri, inst, 6005 flags); 6006 switch (r) { 6007 case 0: 6008 break; 6009 6010 case ECONNABORTED: 6011 goto connaborted; 6012 6013 case ECANCELED: 6014 warn(gettext("%s changed unexpectedly " 6015 "(instance \"%s\" deleted).\n"), 6016 inst->sc_parent->sc_fmri, inst->sc_name); 6017 lcbdata->sc_err = EBUSY; 6018 r = UU_WALK_ERROR; 6019 goto deltemp; 6020 6021 case EEXIST: 6022 warn(gettext("%s changed unexpectedly " 6023 "(property group added).\n"), inst->sc_fmri); 6024 lcbdata->sc_err = EBUSY; 6025 r = UU_WALK_ERROR; 6026 goto deltemp; 6027 6028 default: 6029 lcbdata->sc_err = r; 6030 r = UU_WALK_ERROR; 6031 goto deltemp; 6032 6033 case EINVAL: /* caught above */ 6034 bad_error("lscf_import_instance_pgs", r); 6035 } 6036 6037 ctx.sc_parent = imp_inst; 6038 ctx.sc_service = 0; 6039 ctx.sc_trans = NULL; 6040 if (uu_list_walk(inst->sc_dependents, lscf_dependent_import, 6041 &ctx, UU_DEFAULT) != 0) { 6042 if (uu_error() != UU_ERROR_CALLBACK_FAILED) 6043 bad_error("uu_list_walk", uu_error()); 6044 6045 if (ctx.sc_err == ECONNABORTED) 6046 goto connaborted; 6047 lcbdata->sc_err = ctx.sc_err; 6048 r = UU_WALK_ERROR; 6049 goto deltemp; 6050 } 6051 6052 inst->sc_import_state = IMPORT_PROP_DONE; 6053 6054 if (g_verbose) 6055 warn(gettext("Taking \"%s\" snapshot for %s.\n"), 6056 snap_initial, inst->sc_fmri); 6057 r = take_snap(imp_inst, snap_initial, imp_snap); 6058 switch (r) { 6059 case 0: 6060 break; 6061 6062 case ECONNABORTED: 6063 goto connaborted; 6064 6065 case ENOSPC: 6066 case -1: 6067 lcbdata->sc_err = r; 6068 r = UU_WALK_ERROR; 6069 goto deltemp; 6070 6071 case ECANCELED: 6072 warn(gettext("%s changed unexpectedly " 6073 "(instance %s deleted).\n"), 6074 inst->sc_parent->sc_fmri, inst->sc_name); 6075 lcbdata->sc_err = r; 6076 r = UU_WALK_ERROR; 6077 goto deltemp; 6078 6079 case EPERM: 6080 warn(emsg_snap_perm, snap_initial, inst->sc_fmri); 6081 lcbdata->sc_err = r; 6082 r = UU_WALK_ERROR; 6083 goto deltemp; 6084 6085 default: 6086 bad_error("take_snap", r); 6087 } 6088 } 6089 6090 lionly: 6091 if (lcbdata->sc_flags & SCI_NOSNAP) 6092 goto deltemp; 6093 6094 /* transfer snapshot from temporary instance */ 6095 if (g_verbose) 6096 warn(gettext("Taking \"%s\" snapshot for %s.\n"), 6097 snap_lastimport, inst->sc_fmri); 6098 if (_scf_snapshot_attach(imp_tlisnap, imp_lisnap) != 0) { 6099 switch (scf_error()) { 6100 case SCF_ERROR_CONNECTION_BROKEN: 6101 goto connaborted; 6102 6103 case SCF_ERROR_NO_RESOURCES: 6104 r = stash_scferror(lcbdata); 6105 goto deltemp; 6106 6107 case SCF_ERROR_PERMISSION_DENIED: 6108 warn(gettext("Could not take \"%s\" snapshot for %s " 6109 "(permission denied).\n"), snap_lastimport, 6110 inst->sc_fmri); 6111 r = stash_scferror(lcbdata); 6112 goto deltemp; 6113 6114 case SCF_ERROR_NOT_SET: 6115 case SCF_ERROR_HANDLE_MISMATCH: 6116 default: 6117 bad_error("_scf_snapshot_attach", scf_error()); 6118 } 6119 } 6120 6121 inst->sc_import_state = IMPORT_COMPLETE; 6122 6123 r = UU_WALK_NEXT; 6124 6125 deltemp: 6126 /* delete temporary instance */ 6127 if (scf_instance_delete(imp_tinst) != 0) { 6128 switch (scf_error()) { 6129 case SCF_ERROR_DELETED: 6130 break; 6131 6132 case SCF_ERROR_CONNECTION_BROKEN: 6133 goto connaborted; 6134 6135 case SCF_ERROR_NOT_SET: 6136 case SCF_ERROR_NOT_BOUND: 6137 default: 6138 bad_error("scf_instance_delete", scf_error()); 6139 } 6140 } 6141 6142 return (r); 6143 6144 connaborted: 6145 warn(gettext("Could not delete svc:/%s:%s " 6146 "(repository connection broken).\n"), imp_tsname, inst->sc_name); 6147 lcbdata->sc_err = ECONNABORTED; 6148 return (UU_WALK_ERROR); 6149 } 6150 6151 /* 6152 * If the service is missing, create it, import its properties, and import the 6153 * instances. Since the service is brand new, it should be empty, and if we 6154 * run into any existing entities (SCF_ERROR_EXISTS), abort. 6155 * 6156 * If the service exists, we want to upgrade its properties and import the 6157 * instances. Upgrade requires a last-import snapshot, though, which are 6158 * children of instances, so first we'll have to go through the instances 6159 * looking for a last-import snapshot. If we don't find one then we'll just 6160 * override-import the service properties (but don't delete existing 6161 * properties: another service might have declared us as a dependent). Before 6162 * we change anything, though, we want to take the previous snapshots. We 6163 * also give lscf_instance_import() a leg up on taking last-import snapshots 6164 * by importing the manifest's service properties into a temporary service. 6165 * 6166 * On success, returns UU_WALK_NEXT. On failure, returns UU_WALK_ERROR and 6167 * sets lcbdata->sc_err to 6168 * ECONNABORTED - repository connection broken 6169 * ENOMEM - out of memory 6170 * ENOSPC - svc.configd is out of resources 6171 * EPERM - couldn't create temporary service (error printed) 6172 * - couldn't import into temp service (error printed) 6173 * - couldn't create service (error printed) 6174 * - couldn't import dependent (error printed) 6175 * - couldn't take snapshot (error printed) 6176 * - couldn't create instance (error printed) 6177 * - couldn't create, modify, or delete pg (error printed) 6178 * - couldn't create, modify, or delete dependent (error printed) 6179 * - couldn't import instance (error printed) 6180 * EROFS - couldn't create temporary service (repository read-only) 6181 * - couldn't import into temporary service (repository read-only) 6182 * - couldn't create service (repository read-only) 6183 * - couldn't import dependent (repository read-only) 6184 * - couldn't create instance (repository read-only) 6185 * - couldn't create, modify, or delete pg or dependent 6186 * - couldn't import instance (repository read-only) 6187 * EACCES - couldn't create temporary service (backend access denied) 6188 * - couldn't import into temporary service (backend access denied) 6189 * - couldn't create service (backend access denied) 6190 * - couldn't import dependent (backend access denied) 6191 * - couldn't create instance (backend access denied) 6192 * - couldn't create, modify, or delete pg or dependent 6193 * - couldn't import instance (backend access denied) 6194 * EINVAL - service name is invalid (error printed) 6195 * - service name is too long (error printed) 6196 * - s has invalid pgroup (error printed) 6197 * - s has invalid dependent (error printed) 6198 * - instance name is invalid (error printed) 6199 * - instance entity_t is invalid (error printed) 6200 * EEXIST - couldn't create temporary service (already exists) (error printed) 6201 * - couldn't import dependent (dependency pg already exists) (printed) 6202 * - dependency collision in dependent service (error printed) 6203 * EBUSY - temporary service deleted (error printed) 6204 * - property group added to temporary service (error printed) 6205 * - new property group changed or was deleted (error printed) 6206 * - service was added unexpectedly (error printed) 6207 * - service was deleted unexpectedly (error printed) 6208 * - property group added to new service (error printed) 6209 * - instance added unexpectedly (error printed) 6210 * - instance deleted unexpectedly (error printed) 6211 * - dependent service deleted unexpectedly (error printed) 6212 * - pg was added, changed, or deleted (error printed) 6213 * - dependent pg changed (error printed) 6214 * - temporary instance added, changed, or deleted (error printed) 6215 * EBADF - a last-import snapshot is corrupt (error printed) 6216 * - the service is corrupt (error printed) 6217 * - a dependent is corrupt (error printed) 6218 * - an instance is corrupt (error printed) 6219 * - an instance has a corrupt last-import snapshot (error printed) 6220 * - dependent target has a corrupt snapshot (error printed) 6221 * -1 - unknown libscf error (error printed) 6222 */ 6223 static int 6224 lscf_service_import(void *v, void *pvt) 6225 { 6226 entity_t *s = v; 6227 scf_callback_t cbdata; 6228 scf_callback_t *lcbdata = pvt; 6229 scf_scope_t *scope = lcbdata->sc_parent; 6230 entity_t *inst, linst; 6231 int r; 6232 int fresh = 0; 6233 scf_snaplevel_t *running; 6234 int have_ge; 6235 6236 const char * const ts_deleted = gettext("Temporary service svc:/%s " 6237 "was deleted unexpectedly.\n"); 6238 const char * const ts_pg_added = gettext("Temporary service svc:/%s " 6239 "changed unexpectedly (property group added).\n"); 6240 const char * const s_deleted = 6241 gettext("%s was deleted unexpectedly.\n"); 6242 const char * const i_deleted = 6243 gettext("%s changed unexpectedly (instance \"%s\" deleted).\n"); 6244 const char * const badsnap = gettext("\"%s\" snapshot of svc:/%s:%s " 6245 "is corrupt (missing service snaplevel).\n"); 6246 6247 /* Validate the service name */ 6248 if (scf_scope_get_service(scope, s->sc_name, imp_svc) != 0) { 6249 switch (scf_error()) { 6250 case SCF_ERROR_CONNECTION_BROKEN: 6251 return (stash_scferror(lcbdata)); 6252 6253 case SCF_ERROR_INVALID_ARGUMENT: 6254 warn(gettext("\"%s\" is an invalid service name. " 6255 "Cannot import.\n"), s->sc_name); 6256 return (stash_scferror(lcbdata)); 6257 6258 case SCF_ERROR_NOT_FOUND: 6259 break; 6260 6261 case SCF_ERROR_HANDLE_MISMATCH: 6262 case SCF_ERROR_NOT_BOUND: 6263 case SCF_ERROR_NOT_SET: 6264 default: 6265 bad_error("scf_scope_get_service", scf_error()); 6266 } 6267 } 6268 6269 /* create temporary service */ 6270 /* 6271 * the size of the buffer was reduced to max_scf_name_len to prevent 6272 * hitting bug 6681151. After the bug fix, the size of the buffer 6273 * should be restored to its original value (max_scf_name_len +1) 6274 */ 6275 r = snprintf(imp_tsname, max_scf_name_len, "TEMP/%s", s->sc_name); 6276 if (r < 0) 6277 bad_error("snprintf", errno); 6278 if (r > max_scf_name_len) { 6279 warn(gettext( 6280 "Service name \"%s\" is too long. Cannot import.\n"), 6281 s->sc_name); 6282 lcbdata->sc_err = EINVAL; 6283 return (UU_WALK_ERROR); 6284 } 6285 6286 if (scf_scope_add_service(imp_scope, imp_tsname, imp_tsvc) != 0) { 6287 switch (scf_error()) { 6288 case SCF_ERROR_CONNECTION_BROKEN: 6289 case SCF_ERROR_NO_RESOURCES: 6290 case SCF_ERROR_BACKEND_READONLY: 6291 case SCF_ERROR_BACKEND_ACCESS: 6292 return (stash_scferror(lcbdata)); 6293 6294 case SCF_ERROR_EXISTS: 6295 warn(gettext( 6296 "Temporary service \"%s\" must be deleted before " 6297 "this manifest can be imported.\n"), imp_tsname); 6298 return (stash_scferror(lcbdata)); 6299 6300 case SCF_ERROR_PERMISSION_DENIED: 6301 warn(gettext("Could not create temporary service " 6302 "\"%s\" (permission denied).\n"), imp_tsname); 6303 return (stash_scferror(lcbdata)); 6304 6305 case SCF_ERROR_INVALID_ARGUMENT: 6306 case SCF_ERROR_HANDLE_MISMATCH: 6307 case SCF_ERROR_NOT_BOUND: 6308 case SCF_ERROR_NOT_SET: 6309 default: 6310 bad_error("scf_scope_add_service", scf_error()); 6311 } 6312 } 6313 6314 r = snprintf(imp_str, imp_str_sz, "svc:/%s", imp_tsname); 6315 if (r < 0) 6316 bad_error("snprintf", errno); 6317 6318 cbdata.sc_handle = lcbdata->sc_handle; 6319 cbdata.sc_parent = imp_tsvc; 6320 cbdata.sc_service = 1; 6321 cbdata.sc_source_fmri = s->sc_fmri; 6322 cbdata.sc_target_fmri = imp_str; 6323 cbdata.sc_flags = 0; 6324 6325 if (uu_list_walk(s->sc_pgroups, entity_pgroup_import, &cbdata, 6326 UU_DEFAULT) != 0) { 6327 if (uu_error() != UU_ERROR_CALLBACK_FAILED) 6328 bad_error("uu_list_walk", uu_error()); 6329 6330 lcbdata->sc_err = cbdata.sc_err; 6331 switch (cbdata.sc_err) { 6332 case ECONNABORTED: 6333 goto connaborted; 6334 6335 case ECANCELED: 6336 warn(ts_deleted, imp_tsname); 6337 lcbdata->sc_err = EBUSY; 6338 return (UU_WALK_ERROR); 6339 6340 case EEXIST: 6341 warn(ts_pg_added, imp_tsname); 6342 lcbdata->sc_err = EBUSY; 6343 return (UU_WALK_ERROR); 6344 } 6345 6346 r = UU_WALK_ERROR; 6347 goto deltemp; 6348 } 6349 6350 if (uu_list_walk(s->sc_dependents, entity_pgroup_import, &cbdata, 6351 UU_DEFAULT) != 0) { 6352 if (uu_error() != UU_ERROR_CALLBACK_FAILED) 6353 bad_error("uu_list_walk", uu_error()); 6354 6355 lcbdata->sc_err = cbdata.sc_err; 6356 switch (cbdata.sc_err) { 6357 case ECONNABORTED: 6358 goto connaborted; 6359 6360 case ECANCELED: 6361 warn(ts_deleted, imp_tsname); 6362 lcbdata->sc_err = EBUSY; 6363 return (UU_WALK_ERROR); 6364 6365 case EEXIST: 6366 warn(ts_pg_added, imp_tsname); 6367 lcbdata->sc_err = EBUSY; 6368 return (UU_WALK_ERROR); 6369 } 6370 6371 r = UU_WALK_ERROR; 6372 goto deltemp; 6373 } 6374 6375 if (scf_scope_get_service(scope, s->sc_name, imp_svc) != 0) { 6376 switch (scf_error()) { 6377 case SCF_ERROR_NOT_FOUND: 6378 break; 6379 6380 case SCF_ERROR_CONNECTION_BROKEN: 6381 goto connaborted; 6382 6383 case SCF_ERROR_INVALID_ARGUMENT: 6384 case SCF_ERROR_HANDLE_MISMATCH: 6385 case SCF_ERROR_NOT_BOUND: 6386 case SCF_ERROR_NOT_SET: 6387 default: 6388 bad_error("scf_scope_get_service", scf_error()); 6389 } 6390 6391 if (scf_scope_add_service(scope, s->sc_name, imp_svc) != 0) { 6392 switch (scf_error()) { 6393 case SCF_ERROR_CONNECTION_BROKEN: 6394 goto connaborted; 6395 6396 case SCF_ERROR_NO_RESOURCES: 6397 case SCF_ERROR_BACKEND_READONLY: 6398 case SCF_ERROR_BACKEND_ACCESS: 6399 r = stash_scferror(lcbdata); 6400 goto deltemp; 6401 6402 case SCF_ERROR_EXISTS: 6403 warn(gettext("Scope \"%s\" changed unexpectedly" 6404 " (service \"%s\" added).\n"), 6405 SCF_SCOPE_LOCAL, s->sc_name); 6406 lcbdata->sc_err = EBUSY; 6407 goto deltemp; 6408 6409 case SCF_ERROR_PERMISSION_DENIED: 6410 warn(gettext("Could not create service \"%s\" " 6411 "(permission denied).\n"), s->sc_name); 6412 goto deltemp; 6413 6414 case SCF_ERROR_INVALID_ARGUMENT: 6415 case SCF_ERROR_HANDLE_MISMATCH: 6416 case SCF_ERROR_NOT_BOUND: 6417 case SCF_ERROR_NOT_SET: 6418 default: 6419 bad_error("scf_scope_add_service", scf_error()); 6420 } 6421 } 6422 6423 s->sc_import_state = IMPORT_PROP_BEGUN; 6424 6425 /* import service properties */ 6426 cbdata.sc_handle = lcbdata->sc_handle; 6427 cbdata.sc_parent = imp_svc; 6428 cbdata.sc_service = 1; 6429 cbdata.sc_flags = lcbdata->sc_flags; 6430 cbdata.sc_source_fmri = s->sc_fmri; 6431 cbdata.sc_target_fmri = s->sc_fmri; 6432 6433 if (uu_list_walk(s->sc_pgroups, entity_pgroup_import, 6434 &cbdata, UU_DEFAULT) != 0) { 6435 if (uu_error() != UU_ERROR_CALLBACK_FAILED) 6436 bad_error("uu_list_walk", uu_error()); 6437 6438 lcbdata->sc_err = cbdata.sc_err; 6439 switch (cbdata.sc_err) { 6440 case ECONNABORTED: 6441 goto connaborted; 6442 6443 case ECANCELED: 6444 warn(s_deleted, s->sc_fmri); 6445 lcbdata->sc_err = EBUSY; 6446 return (UU_WALK_ERROR); 6447 6448 case EEXIST: 6449 warn(gettext("%s changed unexpectedly " 6450 "(property group added).\n"), s->sc_fmri); 6451 lcbdata->sc_err = EBUSY; 6452 return (UU_WALK_ERROR); 6453 6454 case EINVAL: 6455 /* caught above */ 6456 bad_error("entity_pgroup_import", 6457 cbdata.sc_err); 6458 } 6459 6460 r = UU_WALK_ERROR; 6461 goto deltemp; 6462 } 6463 6464 cbdata.sc_trans = NULL; 6465 if (uu_list_walk(s->sc_dependents, lscf_dependent_import, 6466 &cbdata, UU_DEFAULT) != 0) { 6467 if (uu_error() != UU_ERROR_CALLBACK_FAILED) 6468 bad_error("uu_list_walk", uu_error()); 6469 6470 lcbdata->sc_err = cbdata.sc_err; 6471 if (cbdata.sc_err == ECONNABORTED) 6472 goto connaborted; 6473 r = UU_WALK_ERROR; 6474 goto deltemp; 6475 } 6476 6477 s->sc_import_state = IMPORT_PROP_DONE; 6478 6479 /* 6480 * This is a new service, so we can't take previous snapshots 6481 * or upgrade service properties. 6482 */ 6483 fresh = 1; 6484 goto instances; 6485 } 6486 6487 /* Clear sc_seen for the instances. */ 6488 if (uu_list_walk(s->sc_u.sc_service.sc_service_instances, clear_int, 6489 (void *)offsetof(entity_t, sc_seen), UU_DEFAULT) != 0) 6490 bad_error("uu_list_walk", uu_error()); 6491 6492 /* 6493 * Take previous snapshots for all instances. Even for ones not 6494 * mentioned in the bundle, since we might change their service 6495 * properties. 6496 */ 6497 if (scf_iter_service_instances(imp_iter, imp_svc) != 0) { 6498 switch (scf_error()) { 6499 case SCF_ERROR_CONNECTION_BROKEN: 6500 goto connaborted; 6501 6502 case SCF_ERROR_DELETED: 6503 warn(s_deleted, s->sc_fmri); 6504 lcbdata->sc_err = EBUSY; 6505 r = UU_WALK_ERROR; 6506 goto deltemp; 6507 6508 case SCF_ERROR_HANDLE_MISMATCH: 6509 case SCF_ERROR_NOT_BOUND: 6510 case SCF_ERROR_NOT_SET: 6511 default: 6512 bad_error("scf_iter_service_instances", scf_error()); 6513 } 6514 } 6515 6516 for (;;) { 6517 r = scf_iter_next_instance(imp_iter, imp_inst); 6518 if (r == 0) 6519 break; 6520 if (r != 1) { 6521 switch (scf_error()) { 6522 case SCF_ERROR_DELETED: 6523 warn(s_deleted, s->sc_fmri); 6524 lcbdata->sc_err = EBUSY; 6525 r = UU_WALK_ERROR; 6526 goto deltemp; 6527 6528 case SCF_ERROR_CONNECTION_BROKEN: 6529 goto connaborted; 6530 6531 case SCF_ERROR_NOT_BOUND: 6532 case SCF_ERROR_HANDLE_MISMATCH: 6533 case SCF_ERROR_INVALID_ARGUMENT: 6534 case SCF_ERROR_NOT_SET: 6535 default: 6536 bad_error("scf_iter_next_instance", 6537 scf_error()); 6538 } 6539 } 6540 6541 if (scf_instance_get_name(imp_inst, imp_str, imp_str_sz) < 0) { 6542 switch (scf_error()) { 6543 case SCF_ERROR_DELETED: 6544 continue; 6545 6546 case SCF_ERROR_CONNECTION_BROKEN: 6547 goto connaborted; 6548 6549 case SCF_ERROR_NOT_SET: 6550 case SCF_ERROR_NOT_BOUND: 6551 default: 6552 bad_error("scf_instance_get_name", scf_error()); 6553 } 6554 } 6555 6556 if (g_verbose) 6557 warn(gettext( 6558 "Taking \"%s\" snapshot for svc:/%s:%s.\n"), 6559 snap_previous, s->sc_name, imp_str); 6560 6561 r = take_snap(imp_inst, snap_previous, imp_snap); 6562 switch (r) { 6563 case 0: 6564 break; 6565 6566 case ECANCELED: 6567 continue; 6568 6569 case ECONNABORTED: 6570 goto connaborted; 6571 6572 case EPERM: 6573 warn(gettext("Could not take \"%s\" snapshot of " 6574 "svc:/%s:%s (permission denied).\n"), 6575 snap_previous, s->sc_name, imp_str); 6576 lcbdata->sc_err = r; 6577 return (UU_WALK_ERROR); 6578 6579 case ENOSPC: 6580 case -1: 6581 lcbdata->sc_err = r; 6582 r = UU_WALK_ERROR; 6583 goto deltemp; 6584 6585 default: 6586 bad_error("take_snap", r); 6587 } 6588 6589 linst.sc_name = imp_str; 6590 inst = uu_list_find(s->sc_u.sc_service.sc_service_instances, 6591 &linst, NULL, NULL); 6592 if (inst != NULL) { 6593 inst->sc_import_state = IMPORT_PREVIOUS; 6594 inst->sc_seen = 1; 6595 } 6596 } 6597 6598 /* 6599 * Create the new instances and take previous snapshots of 6600 * them. This is not necessary, but it maximizes data preservation. 6601 */ 6602 for (inst = uu_list_first(s->sc_u.sc_service.sc_service_instances); 6603 inst != NULL; 6604 inst = uu_list_next(s->sc_u.sc_service.sc_service_instances, 6605 inst)) { 6606 if (inst->sc_seen) 6607 continue; 6608 6609 if (scf_service_add_instance(imp_svc, inst->sc_name, 6610 imp_inst) != 0) { 6611 switch (scf_error()) { 6612 case SCF_ERROR_CONNECTION_BROKEN: 6613 goto connaborted; 6614 6615 case SCF_ERROR_BACKEND_READONLY: 6616 case SCF_ERROR_BACKEND_ACCESS: 6617 case SCF_ERROR_NO_RESOURCES: 6618 r = stash_scferror(lcbdata); 6619 goto deltemp; 6620 6621 case SCF_ERROR_EXISTS: 6622 warn(gettext("%s changed unexpectedly " 6623 "(instance \"%s\" added).\n"), s->sc_fmri, 6624 inst->sc_name); 6625 lcbdata->sc_err = EBUSY; 6626 r = UU_WALK_ERROR; 6627 goto deltemp; 6628 6629 case SCF_ERROR_INVALID_ARGUMENT: 6630 warn(gettext("Service \"%s\" has instance with " 6631 "invalid name \"%s\".\n"), s->sc_name, 6632 inst->sc_name); 6633 r = stash_scferror(lcbdata); 6634 goto deltemp; 6635 6636 case SCF_ERROR_PERMISSION_DENIED: 6637 warn(gettext("Could not create instance \"%s\" " 6638 "in %s (permission denied).\n"), 6639 inst->sc_name, s->sc_fmri); 6640 r = stash_scferror(lcbdata); 6641 goto deltemp; 6642 6643 case SCF_ERROR_HANDLE_MISMATCH: 6644 case SCF_ERROR_NOT_BOUND: 6645 case SCF_ERROR_NOT_SET: 6646 default: 6647 bad_error("scf_service_add_instance", 6648 scf_error()); 6649 } 6650 } 6651 6652 if (g_verbose) 6653 warn(gettext("Taking \"%s\" snapshot for " 6654 "new service %s.\n"), snap_previous, inst->sc_fmri); 6655 r = take_snap(imp_inst, snap_previous, imp_snap); 6656 switch (r) { 6657 case 0: 6658 break; 6659 6660 case ECANCELED: 6661 warn(i_deleted, s->sc_fmri, inst->sc_name); 6662 lcbdata->sc_err = EBUSY; 6663 r = UU_WALK_ERROR; 6664 goto deltemp; 6665 6666 case ECONNABORTED: 6667 goto connaborted; 6668 6669 case EPERM: 6670 warn(emsg_snap_perm, snap_previous, inst->sc_fmri); 6671 lcbdata->sc_err = r; 6672 r = UU_WALK_ERROR; 6673 goto deltemp; 6674 6675 case ENOSPC: 6676 case -1: 6677 r = UU_WALK_ERROR; 6678 goto deltemp; 6679 6680 default: 6681 bad_error("take_snap", r); 6682 } 6683 } 6684 6685 s->sc_import_state = IMPORT_PREVIOUS; 6686 6687 /* 6688 * Upgrade service properties, if we can find a last-import snapshot. 6689 * Any will do because we don't support different service properties 6690 * in different manifests, so all snaplevels of the service in all of 6691 * the last-import snapshots of the instances should be the same. 6692 */ 6693 if (scf_iter_service_instances(imp_iter, imp_svc) != 0) { 6694 switch (scf_error()) { 6695 case SCF_ERROR_CONNECTION_BROKEN: 6696 goto connaborted; 6697 6698 case SCF_ERROR_DELETED: 6699 warn(s_deleted, s->sc_fmri); 6700 lcbdata->sc_err = EBUSY; 6701 r = UU_WALK_ERROR; 6702 goto deltemp; 6703 6704 case SCF_ERROR_HANDLE_MISMATCH: 6705 case SCF_ERROR_NOT_BOUND: 6706 case SCF_ERROR_NOT_SET: 6707 default: 6708 bad_error("scf_iter_service_instances", scf_error()); 6709 } 6710 } 6711 6712 have_ge = 0; 6713 li_only = 0; 6714 6715 for (;;) { 6716 r = scf_iter_next_instance(imp_iter, imp_inst); 6717 if (r == -1) { 6718 switch (scf_error()) { 6719 case SCF_ERROR_DELETED: 6720 warn(s_deleted, s->sc_fmri); 6721 lcbdata->sc_err = EBUSY; 6722 r = UU_WALK_ERROR; 6723 goto deltemp; 6724 6725 case SCF_ERROR_CONNECTION_BROKEN: 6726 goto connaborted; 6727 6728 case SCF_ERROR_NOT_BOUND: 6729 case SCF_ERROR_HANDLE_MISMATCH: 6730 case SCF_ERROR_INVALID_ARGUMENT: 6731 case SCF_ERROR_NOT_SET: 6732 default: 6733 bad_error("scf_iter_next_instance", 6734 scf_error()); 6735 } 6736 } 6737 6738 if (r == 0) { 6739 /* 6740 * Didn't find any last-import snapshots. Override- 6741 * import the properties. Unless one of the instances 6742 * has a general/enabled property, in which case we're 6743 * probably running a last-import-capable svccfg for 6744 * the first time, and we should only take the 6745 * last-import snapshot. 6746 */ 6747 if (have_ge) { 6748 li_only = 1; 6749 no_refresh = 1; 6750 break; 6751 } 6752 6753 s->sc_import_state = IMPORT_PROP_BEGUN; 6754 6755 cbdata.sc_handle = g_hndl; 6756 cbdata.sc_parent = imp_svc; 6757 cbdata.sc_service = 1; 6758 cbdata.sc_flags = SCI_FORCE; 6759 cbdata.sc_source_fmri = s->sc_fmri; 6760 cbdata.sc_target_fmri = s->sc_fmri; 6761 if (uu_list_walk(s->sc_pgroups, entity_pgroup_import, 6762 &cbdata, UU_DEFAULT) != 0) { 6763 if (uu_error() != UU_ERROR_CALLBACK_FAILED) 6764 bad_error("uu_list_walk", uu_error()); 6765 lcbdata->sc_err = cbdata.sc_err; 6766 switch (cbdata.sc_err) { 6767 case ECONNABORTED: 6768 goto connaborted; 6769 6770 case ECANCELED: 6771 warn(s_deleted, s->sc_fmri); 6772 lcbdata->sc_err = EBUSY; 6773 break; 6774 6775 case EINVAL: /* caught above */ 6776 case EEXIST: 6777 bad_error("entity_pgroup_import", 6778 cbdata.sc_err); 6779 } 6780 6781 r = UU_WALK_ERROR; 6782 goto deltemp; 6783 } 6784 6785 cbdata.sc_trans = NULL; 6786 if (uu_list_walk(s->sc_dependents, 6787 lscf_dependent_import, &cbdata, UU_DEFAULT) != 0) { 6788 if (uu_error() != UU_ERROR_CALLBACK_FAILED) 6789 bad_error("uu_list_walk", uu_error()); 6790 lcbdata->sc_err = cbdata.sc_err; 6791 if (cbdata.sc_err == ECONNABORTED) 6792 goto connaborted; 6793 r = UU_WALK_ERROR; 6794 goto deltemp; 6795 } 6796 break; 6797 } 6798 6799 if (scf_instance_get_snapshot(imp_inst, snap_lastimport, 6800 imp_snap) != 0) { 6801 switch (scf_error()) { 6802 case SCF_ERROR_DELETED: 6803 continue; 6804 6805 case SCF_ERROR_NOT_FOUND: 6806 break; 6807 6808 case SCF_ERROR_CONNECTION_BROKEN: 6809 goto connaborted; 6810 6811 case SCF_ERROR_HANDLE_MISMATCH: 6812 case SCF_ERROR_NOT_BOUND: 6813 case SCF_ERROR_INVALID_ARGUMENT: 6814 case SCF_ERROR_NOT_SET: 6815 default: 6816 bad_error("scf_instance_get_snapshot", 6817 scf_error()); 6818 } 6819 6820 if (have_ge) 6821 continue; 6822 6823 /* 6824 * Check for a general/enabled property. This is how 6825 * we tell whether to import if there turn out to be 6826 * no last-import snapshots. 6827 */ 6828 if (scf_instance_get_pg(imp_inst, SCF_PG_GENERAL, 6829 imp_pg) == 0) { 6830 if (scf_pg_get_property(imp_pg, 6831 SCF_PROPERTY_ENABLED, imp_prop) == 0) { 6832 have_ge = 1; 6833 } else { 6834 switch (scf_error()) { 6835 case SCF_ERROR_DELETED: 6836 case SCF_ERROR_NOT_FOUND: 6837 continue; 6838 6839 case SCF_ERROR_INVALID_ARGUMENT: 6840 case SCF_ERROR_HANDLE_MISMATCH: 6841 case SCF_ERROR_CONNECTION_BROKEN: 6842 case SCF_ERROR_NOT_BOUND: 6843 case SCF_ERROR_NOT_SET: 6844 default: 6845 bad_error("scf_pg_get_property", 6846 scf_error()); 6847 } 6848 } 6849 } else { 6850 switch (scf_error()) { 6851 case SCF_ERROR_DELETED: 6852 case SCF_ERROR_NOT_FOUND: 6853 continue; 6854 6855 case SCF_ERROR_CONNECTION_BROKEN: 6856 goto connaborted; 6857 6858 case SCF_ERROR_NOT_BOUND: 6859 case SCF_ERROR_NOT_SET: 6860 case SCF_ERROR_INVALID_ARGUMENT: 6861 case SCF_ERROR_HANDLE_MISMATCH: 6862 default: 6863 bad_error("scf_instance_get_pg", 6864 scf_error()); 6865 } 6866 } 6867 continue; 6868 } 6869 6870 /* find service snaplevel */ 6871 r = get_snaplevel(imp_snap, 1, imp_snpl); 6872 switch (r) { 6873 case 0: 6874 break; 6875 6876 case ECONNABORTED: 6877 goto connaborted; 6878 6879 case ECANCELED: 6880 continue; 6881 6882 case ENOENT: 6883 if (scf_instance_get_name(imp_inst, imp_str, 6884 imp_str_sz) < 0) 6885 (void) strcpy(imp_str, "?"); 6886 warn(badsnap, snap_lastimport, s->sc_name, imp_str); 6887 lcbdata->sc_err = EBADF; 6888 r = UU_WALK_ERROR; 6889 goto deltemp; 6890 6891 default: 6892 bad_error("get_snaplevel", r); 6893 } 6894 6895 if (scf_instance_get_snapshot(imp_inst, snap_running, 6896 imp_rsnap) != 0) { 6897 switch (scf_error()) { 6898 case SCF_ERROR_DELETED: 6899 continue; 6900 6901 case SCF_ERROR_NOT_FOUND: 6902 break; 6903 6904 case SCF_ERROR_CONNECTION_BROKEN: 6905 goto connaborted; 6906 6907 case SCF_ERROR_INVALID_ARGUMENT: 6908 case SCF_ERROR_HANDLE_MISMATCH: 6909 case SCF_ERROR_NOT_BOUND: 6910 case SCF_ERROR_NOT_SET: 6911 default: 6912 bad_error("scf_instance_get_snapshot", 6913 scf_error()); 6914 } 6915 running = NULL; 6916 } else { 6917 r = get_snaplevel(imp_rsnap, 1, imp_rsnpl); 6918 switch (r) { 6919 case 0: 6920 running = imp_rsnpl; 6921 break; 6922 6923 case ECONNABORTED: 6924 goto connaborted; 6925 6926 case ECANCELED: 6927 continue; 6928 6929 case ENOENT: 6930 if (scf_instance_get_name(imp_inst, imp_str, 6931 imp_str_sz) < 0) 6932 (void) strcpy(imp_str, "?"); 6933 warn(badsnap, snap_running, s->sc_name, 6934 imp_str); 6935 lcbdata->sc_err = EBADF; 6936 r = UU_WALK_ERROR; 6937 goto deltemp; 6938 6939 default: 6940 bad_error("get_snaplevel", r); 6941 } 6942 } 6943 6944 if (g_verbose) { 6945 if (scf_instance_get_name(imp_inst, imp_str, 6946 imp_str_sz) < 0) 6947 (void) strcpy(imp_str, "?"); 6948 warn(gettext("Upgrading properties of %s according to " 6949 "instance \"%s\".\n"), s->sc_fmri, imp_str); 6950 } 6951 6952 /* upgrade service properties */ 6953 r = upgrade_props(imp_svc, running, imp_snpl, s); 6954 if (r == 0) 6955 break; 6956 6957 switch (r) { 6958 case ECONNABORTED: 6959 goto connaborted; 6960 6961 case ECANCELED: 6962 warn(s_deleted, s->sc_fmri); 6963 lcbdata->sc_err = EBUSY; 6964 break; 6965 6966 case ENODEV: 6967 if (scf_instance_get_name(imp_inst, imp_str, 6968 imp_str_sz) < 0) 6969 (void) strcpy(imp_str, "?"); 6970 warn(i_deleted, s->sc_fmri, imp_str); 6971 lcbdata->sc_err = EBUSY; 6972 break; 6973 6974 default: 6975 lcbdata->sc_err = r; 6976 } 6977 6978 r = UU_WALK_ERROR; 6979 goto deltemp; 6980 } 6981 6982 s->sc_import_state = IMPORT_PROP_DONE; 6983 6984 instances: 6985 /* import instances */ 6986 cbdata.sc_handle = lcbdata->sc_handle; 6987 cbdata.sc_parent = imp_svc; 6988 cbdata.sc_service = 1; 6989 cbdata.sc_flags = lcbdata->sc_flags | (fresh ? SCI_FRESH : 0); 6990 cbdata.sc_general = NULL; 6991 6992 if (uu_list_walk(s->sc_u.sc_service.sc_service_instances, 6993 lscf_instance_import, &cbdata, UU_DEFAULT) != 0) { 6994 if (uu_error() != UU_ERROR_CALLBACK_FAILED) 6995 bad_error("uu_list_walk", uu_error()); 6996 6997 lcbdata->sc_err = cbdata.sc_err; 6998 if (cbdata.sc_err == ECONNABORTED) 6999 goto connaborted; 7000 r = UU_WALK_ERROR; 7001 goto deltemp; 7002 } 7003 7004 s->sc_import_state = IMPORT_COMPLETE; 7005 r = UU_WALK_NEXT; 7006 7007 deltemp: 7008 /* delete temporary service */ 7009 if (scf_service_delete(imp_tsvc) != 0) { 7010 switch (scf_error()) { 7011 case SCF_ERROR_DELETED: 7012 break; 7013 7014 case SCF_ERROR_CONNECTION_BROKEN: 7015 goto connaborted; 7016 7017 case SCF_ERROR_EXISTS: 7018 warn(gettext( 7019 "Could not delete svc:/%s (instances exist).\n"), 7020 imp_tsname); 7021 break; 7022 7023 case SCF_ERROR_NOT_SET: 7024 case SCF_ERROR_NOT_BOUND: 7025 default: 7026 bad_error("scf_service_delete", scf_error()); 7027 } 7028 } 7029 7030 return (r); 7031 7032 connaborted: 7033 warn(gettext("Could not delete svc:/%s " 7034 "(repository connection broken).\n"), imp_tsname); 7035 lcbdata->sc_err = ECONNABORTED; 7036 return (UU_WALK_ERROR); 7037 } 7038 7039 static const char * 7040 import_progress(int st) 7041 { 7042 switch (st) { 7043 case 0: 7044 return (gettext("not reached.")); 7045 7046 case IMPORT_PREVIOUS: 7047 return (gettext("previous snapshot taken.")); 7048 7049 case IMPORT_PROP_BEGUN: 7050 return (gettext("some properties imported.")); 7051 7052 case IMPORT_PROP_DONE: 7053 return (gettext("properties imported.")); 7054 7055 case IMPORT_COMPLETE: 7056 return (gettext("imported.")); 7057 7058 case IMPORT_REFRESHED: 7059 return (gettext("refresh requested.")); 7060 7061 default: 7062 #ifndef NDEBUG 7063 (void) fprintf(stderr, "%s:%d: Unknown entity state %d.\n", 7064 __FILE__, __LINE__, st); 7065 #endif 7066 abort(); 7067 /* NOTREACHED */ 7068 } 7069 } 7070 7071 /* 7072 * Returns 7073 * 0 - success 7074 * - fmri wasn't found (error printed) 7075 * - entity was deleted (error printed) 7076 * - backend denied access (error printed) 7077 * ENOMEM - out of memory (error printed) 7078 * ECONNABORTED - repository connection broken (error printed) 7079 * EPERM - permission denied (error printed) 7080 * -1 - unknown libscf error (error printed) 7081 */ 7082 static int 7083 imp_refresh_fmri(const char *fmri, const char *name, const char *d_fmri) 7084 { 7085 scf_error_t serr; 7086 void *ent; 7087 int issvc; 7088 int r; 7089 7090 const char *deleted = gettext("Could not refresh %s (deleted).\n"); 7091 const char *dpt_deleted = gettext("Could not refresh %s " 7092 "(dependent \"%s\" of %s) (deleted).\n"); 7093 7094 serr = fmri_to_entity(g_hndl, fmri, &ent, &issvc); 7095 switch (serr) { 7096 case SCF_ERROR_NONE: 7097 break; 7098 7099 case SCF_ERROR_NO_MEMORY: 7100 if (name == NULL) 7101 warn(gettext("Could not refresh %s (out of memory).\n"), 7102 fmri); 7103 else 7104 warn(gettext("Could not refresh %s " 7105 "(dependent \"%s\" of %s) (out of memory).\n"), 7106 fmri, name, d_fmri); 7107 return (ENOMEM); 7108 7109 case SCF_ERROR_NOT_FOUND: 7110 if (name == NULL) 7111 warn(deleted, fmri); 7112 else 7113 warn(dpt_deleted, fmri, name, d_fmri); 7114 return (0); 7115 7116 case SCF_ERROR_INVALID_ARGUMENT: 7117 case SCF_ERROR_CONSTRAINT_VIOLATED: 7118 default: 7119 bad_error("fmri_to_entity", serr); 7120 } 7121 7122 r = refresh_entity(issvc, ent, fmri, imp_inst, imp_iter, imp_str); 7123 switch (r) { 7124 case 0: 7125 break; 7126 7127 case ECONNABORTED: 7128 if (name != NULL) 7129 warn(gettext("Could not refresh %s " 7130 "(dependent \"%s\" of %s) " 7131 "(repository connection broken).\n"), fmri, name, 7132 d_fmri); 7133 return (r); 7134 7135 case ECANCELED: 7136 if (name == NULL) 7137 warn(deleted, fmri); 7138 else 7139 warn(dpt_deleted, fmri, name, d_fmri); 7140 return (0); 7141 7142 case EACCES: 7143 if (!g_verbose) 7144 return (0); 7145 if (name == NULL) 7146 warn(gettext("Could not refresh %s " 7147 "(backend access denied).\n"), fmri); 7148 else 7149 warn(gettext("Could not refresh %s " 7150 "(dependent \"%s\" of %s) " 7151 "(backend access denied).\n"), fmri, name, d_fmri); 7152 return (0); 7153 7154 case EPERM: 7155 if (name == NULL) 7156 warn(gettext("Could not refresh %s " 7157 "(permission denied).\n"), fmri); 7158 else 7159 warn(gettext("Could not refresh %s " 7160 "(dependent \"%s\" of %s) " 7161 "(permission denied).\n"), fmri, name, d_fmri); 7162 return (r); 7163 7164 case ENOSPC: 7165 if (name == NULL) 7166 warn(gettext("Could not refresh %s " 7167 "(repository server out of resources).\n"), 7168 fmri); 7169 else 7170 warn(gettext("Could not refresh %s " 7171 "(dependent \"%s\" of %s) " 7172 "(repository server out of resources).\n"), 7173 fmri, name, d_fmri); 7174 return (r); 7175 7176 case -1: 7177 scfwarn(); 7178 return (r); 7179 7180 default: 7181 bad_error("refresh_entity", r); 7182 } 7183 7184 if (issvc) 7185 scf_service_destroy(ent); 7186 else 7187 scf_instance_destroy(ent); 7188 7189 return (0); 7190 } 7191 7192 int 7193 lscf_bundle_import(bundle_t *bndl, const char *filename, uint_t flags) 7194 { 7195 scf_callback_t cbdata; 7196 int result = 0; 7197 entity_t *svc, *inst; 7198 uu_list_t *insts; 7199 int r; 7200 pgroup_t *old_dpt; 7201 void *cookie; 7202 int annotation_set = 0; 7203 7204 const char * const emsg_nomem = gettext("Out of memory.\n"); 7205 const char * const emsg_nores = 7206 gettext("svc.configd is out of resources.\n"); 7207 7208 lscf_prep_hndl(); 7209 7210 imp_str_sz = ((max_scf_name_len > max_scf_fmri_len) ? 7211 max_scf_name_len : max_scf_fmri_len) + 1; 7212 7213 if ((imp_scope = scf_scope_create(g_hndl)) == NULL || 7214 (imp_svc = scf_service_create(g_hndl)) == NULL || 7215 (imp_tsvc = scf_service_create(g_hndl)) == NULL || 7216 (imp_inst = scf_instance_create(g_hndl)) == NULL || 7217 (imp_tinst = scf_instance_create(g_hndl)) == NULL || 7218 (imp_snap = scf_snapshot_create(g_hndl)) == NULL || 7219 (imp_lisnap = scf_snapshot_create(g_hndl)) == NULL || 7220 (imp_tlisnap = scf_snapshot_create(g_hndl)) == NULL || 7221 (imp_rsnap = scf_snapshot_create(g_hndl)) == NULL || 7222 (imp_snpl = scf_snaplevel_create(g_hndl)) == NULL || 7223 (imp_rsnpl = scf_snaplevel_create(g_hndl)) == NULL || 7224 (imp_pg = scf_pg_create(g_hndl)) == NULL || 7225 (imp_pg2 = scf_pg_create(g_hndl)) == NULL || 7226 (imp_prop = scf_property_create(g_hndl)) == NULL || 7227 (imp_iter = scf_iter_create(g_hndl)) == NULL || 7228 (imp_rpg_iter = scf_iter_create(g_hndl)) == NULL || 7229 (imp_up_iter = scf_iter_create(g_hndl)) == NULL || 7230 (imp_tx = scf_transaction_create(g_hndl)) == NULL || 7231 (imp_str = malloc(imp_str_sz)) == NULL || 7232 (imp_tsname = malloc(max_scf_name_len + 1)) == NULL || 7233 (imp_fe1 = malloc(max_scf_fmri_len + 1)) == NULL || 7234 (imp_fe2 = malloc(max_scf_fmri_len + 1)) == NULL || 7235 (imp_deleted_dpts = uu_list_create(string_pool, NULL, 0)) == NULL || 7236 (ud_inst = scf_instance_create(g_hndl)) == NULL || 7237 (ud_snpl = scf_snaplevel_create(g_hndl)) == NULL || 7238 (ud_pg = scf_pg_create(g_hndl)) == NULL || 7239 (ud_cur_depts_pg = scf_pg_create(g_hndl)) == NULL || 7240 (ud_run_dpts_pg = scf_pg_create(g_hndl)) == NULL || 7241 (ud_prop = scf_property_create(g_hndl)) == NULL || 7242 (ud_dpt_prop = scf_property_create(g_hndl)) == NULL || 7243 (ud_val = scf_value_create(g_hndl)) == NULL || 7244 (ud_iter = scf_iter_create(g_hndl)) == NULL || 7245 (ud_iter2 = scf_iter_create(g_hndl)) == NULL || 7246 (ud_tx = scf_transaction_create(g_hndl)) == NULL || 7247 (ud_ctarg = malloc(max_scf_value_len + 1)) == NULL || 7248 (ud_oldtarg = malloc(max_scf_value_len + 1)) == NULL || 7249 (ud_name = malloc(max_scf_name_len + 1)) == NULL) { 7250 if (scf_error() == SCF_ERROR_NO_RESOURCES) 7251 warn(emsg_nores); 7252 else 7253 warn(emsg_nomem); 7254 result = -1; 7255 goto out; 7256 } 7257 7258 r = load_init(); 7259 switch (r) { 7260 case 0: 7261 break; 7262 7263 case ENOMEM: 7264 warn(emsg_nomem); 7265 result = -1; 7266 goto out; 7267 7268 default: 7269 bad_error("load_init", r); 7270 } 7271 7272 if (scf_handle_get_scope(g_hndl, SCF_SCOPE_LOCAL, imp_scope) != 0) { 7273 switch (scf_error()) { 7274 case SCF_ERROR_CONNECTION_BROKEN: 7275 warn(gettext("Repository connection broken.\n")); 7276 repository_teardown(); 7277 result = -1; 7278 goto out; 7279 7280 case SCF_ERROR_NOT_FOUND: 7281 case SCF_ERROR_INVALID_ARGUMENT: 7282 case SCF_ERROR_NOT_BOUND: 7283 case SCF_ERROR_HANDLE_MISMATCH: 7284 default: 7285 bad_error("scf_handle_get_scope", scf_error()); 7286 } 7287 } 7288 7289 /* Set up the auditing annotation. */ 7290 if (_scf_set_annotation(g_hndl, "svccfg import", filename) == 0) { 7291 annotation_set = 1; 7292 } else { 7293 switch (scf_error()) { 7294 case SCF_ERROR_CONNECTION_BROKEN: 7295 warn(gettext("Repository connection broken.\n")); 7296 repository_teardown(); 7297 result = -1; 7298 goto out; 7299 7300 case SCF_ERROR_INVALID_ARGUMENT: 7301 case SCF_ERROR_NOT_BOUND: 7302 case SCF_ERROR_NO_RESOURCES: 7303 case SCF_ERROR_INTERNAL: 7304 bad_error("_scf_set_annotation", scf_error()); 7305 /* NOTREACHED */ 7306 7307 default: 7308 /* 7309 * Do not terminate import because of inability to 7310 * generate annotation audit event. 7311 */ 7312 warn(gettext("_scf_set_annotation() unexpectedly " 7313 "failed with return code of %d\n"), scf_error()); 7314 break; 7315 } 7316 } 7317 7318 /* 7319 * Clear the sc_import_state's of all services & instances so we can 7320 * report how far we got if we fail. 7321 */ 7322 for (svc = uu_list_first(bndl->sc_bundle_services); 7323 svc != NULL; 7324 svc = uu_list_next(bndl->sc_bundle_services, svc)) { 7325 svc->sc_import_state = 0; 7326 7327 if (uu_list_walk(svc->sc_u.sc_service.sc_service_instances, 7328 clear_int, (void *)offsetof(entity_t, sc_import_state), 7329 UU_DEFAULT) != 0) 7330 bad_error("uu_list_walk", uu_error()); 7331 } 7332 7333 cbdata.sc_handle = g_hndl; 7334 cbdata.sc_parent = imp_scope; 7335 cbdata.sc_flags = flags; 7336 cbdata.sc_general = NULL; 7337 7338 if (uu_list_walk(bndl->sc_bundle_services, lscf_service_import, 7339 &cbdata, UU_DEFAULT) == 0) { 7340 /* Success. Refresh everything. */ 7341 7342 if (flags & SCI_NOREFRESH || no_refresh) { 7343 result = 0; 7344 goto out; 7345 } 7346 7347 for (svc = uu_list_first(bndl->sc_bundle_services); 7348 svc != NULL; 7349 svc = uu_list_next(bndl->sc_bundle_services, svc)) { 7350 pgroup_t *dpt; 7351 7352 insts = svc->sc_u.sc_service.sc_service_instances; 7353 7354 for (inst = uu_list_first(insts); 7355 inst != NULL; 7356 inst = uu_list_next(insts, inst)) { 7357 r = imp_refresh_fmri(inst->sc_fmri, NULL, NULL); 7358 switch (r) { 7359 case 0: 7360 break; 7361 7362 case ENOMEM: 7363 case ECONNABORTED: 7364 case EPERM: 7365 case -1: 7366 goto progress; 7367 7368 default: 7369 bad_error("imp_refresh_fmri", r); 7370 } 7371 7372 inst->sc_import_state = IMPORT_REFRESHED; 7373 7374 for (dpt = uu_list_first(inst->sc_dependents); 7375 dpt != NULL; 7376 dpt = uu_list_next(inst->sc_dependents, 7377 dpt)) 7378 if (imp_refresh_fmri( 7379 dpt->sc_pgroup_fmri, 7380 dpt->sc_pgroup_name, 7381 inst->sc_fmri) != 0) 7382 goto progress; 7383 } 7384 7385 for (dpt = uu_list_first(svc->sc_dependents); 7386 dpt != NULL; 7387 dpt = uu_list_next(svc->sc_dependents, dpt)) 7388 if (imp_refresh_fmri(dpt->sc_pgroup_fmri, 7389 dpt->sc_pgroup_name, svc->sc_fmri) != 0) 7390 goto progress; 7391 } 7392 7393 for (old_dpt = uu_list_first(imp_deleted_dpts); 7394 old_dpt != NULL; 7395 old_dpt = uu_list_next(imp_deleted_dpts, old_dpt)) 7396 if (imp_refresh_fmri(old_dpt->sc_pgroup_fmri, 7397 old_dpt->sc_pgroup_name, 7398 old_dpt->sc_parent->sc_fmri) != 0) 7399 goto progress; 7400 7401 result = 0; 7402 goto out; 7403 } 7404 7405 if (uu_error() != UU_ERROR_CALLBACK_FAILED) 7406 bad_error("uu_list_walk", uu_error()); 7407 7408 printerr: 7409 /* If the error hasn't been printed yet, do so here. */ 7410 switch (cbdata.sc_err) { 7411 case ECONNABORTED: 7412 warn(gettext("Repository connection broken.\n")); 7413 break; 7414 7415 case ENOMEM: 7416 warn(emsg_nomem); 7417 break; 7418 7419 case ENOSPC: 7420 warn(emsg_nores); 7421 break; 7422 7423 case EROFS: 7424 warn(gettext("Repository is read-only.\n")); 7425 break; 7426 7427 case EACCES: 7428 warn(gettext("Repository backend denied access.\n")); 7429 break; 7430 7431 case EPERM: 7432 case EINVAL: 7433 case EEXIST: 7434 case EBUSY: 7435 case EBADF: 7436 case -1: 7437 break; 7438 7439 default: 7440 bad_error("lscf_service_import", cbdata.sc_err); 7441 } 7442 7443 progress: 7444 warn(gettext("Import of %s failed. Progress:\n"), filename); 7445 7446 for (svc = uu_list_first(bndl->sc_bundle_services); 7447 svc != NULL; 7448 svc = uu_list_next(bndl->sc_bundle_services, svc)) { 7449 insts = svc->sc_u.sc_service.sc_service_instances; 7450 7451 warn(gettext(" Service \"%s\": %s\n"), svc->sc_name, 7452 import_progress(svc->sc_import_state)); 7453 7454 for (inst = uu_list_first(insts); 7455 inst != NULL; 7456 inst = uu_list_next(insts, inst)) 7457 warn(gettext(" Instance \"%s\": %s\n"), 7458 inst->sc_name, 7459 import_progress(inst->sc_import_state)); 7460 } 7461 7462 if (cbdata.sc_err == ECONNABORTED) 7463 repository_teardown(); 7464 7465 7466 result = -1; 7467 7468 out: 7469 if (annotation_set != 0) { 7470 /* Turn off annotation. It is no longer needed. */ 7471 (void) _scf_set_annotation(g_hndl, NULL, NULL); 7472 } 7473 load_fini(); 7474 7475 free(ud_ctarg); 7476 free(ud_oldtarg); 7477 free(ud_name); 7478 ud_ctarg = ud_oldtarg = ud_name = NULL; 7479 7480 scf_transaction_destroy(ud_tx); 7481 ud_tx = NULL; 7482 scf_iter_destroy(ud_iter); 7483 scf_iter_destroy(ud_iter2); 7484 ud_iter = ud_iter2 = NULL; 7485 scf_value_destroy(ud_val); 7486 ud_val = NULL; 7487 scf_property_destroy(ud_prop); 7488 scf_property_destroy(ud_dpt_prop); 7489 ud_prop = ud_dpt_prop = NULL; 7490 scf_pg_destroy(ud_pg); 7491 scf_pg_destroy(ud_cur_depts_pg); 7492 scf_pg_destroy(ud_run_dpts_pg); 7493 ud_pg = ud_cur_depts_pg = ud_run_dpts_pg = NULL; 7494 scf_snaplevel_destroy(ud_snpl); 7495 ud_snpl = NULL; 7496 scf_instance_destroy(ud_inst); 7497 ud_inst = NULL; 7498 7499 free(imp_str); 7500 free(imp_tsname); 7501 free(imp_fe1); 7502 free(imp_fe2); 7503 imp_str = imp_tsname = imp_fe1 = imp_fe2 = NULL; 7504 7505 cookie = NULL; 7506 while ((old_dpt = uu_list_teardown(imp_deleted_dpts, &cookie)) != 7507 NULL) { 7508 free((char *)old_dpt->sc_pgroup_name); 7509 free((char *)old_dpt->sc_pgroup_fmri); 7510 internal_pgroup_free(old_dpt); 7511 } 7512 uu_list_destroy(imp_deleted_dpts); 7513 7514 scf_transaction_destroy(imp_tx); 7515 imp_tx = NULL; 7516 scf_iter_destroy(imp_iter); 7517 scf_iter_destroy(imp_rpg_iter); 7518 scf_iter_destroy(imp_up_iter); 7519 imp_iter = imp_rpg_iter = imp_up_iter = NULL; 7520 scf_property_destroy(imp_prop); 7521 imp_prop = NULL; 7522 scf_pg_destroy(imp_pg); 7523 scf_pg_destroy(imp_pg2); 7524 imp_pg = imp_pg2 = NULL; 7525 scf_snaplevel_destroy(imp_snpl); 7526 scf_snaplevel_destroy(imp_rsnpl); 7527 imp_snpl = imp_rsnpl = NULL; 7528 scf_snapshot_destroy(imp_snap); 7529 scf_snapshot_destroy(imp_lisnap); 7530 scf_snapshot_destroy(imp_tlisnap); 7531 scf_snapshot_destroy(imp_rsnap); 7532 imp_snap = imp_lisnap = imp_tlisnap = imp_rsnap = NULL; 7533 scf_instance_destroy(imp_inst); 7534 scf_instance_destroy(imp_tinst); 7535 imp_inst = imp_tinst = NULL; 7536 scf_service_destroy(imp_svc); 7537 scf_service_destroy(imp_tsvc); 7538 imp_svc = imp_tsvc = NULL; 7539 scf_scope_destroy(imp_scope); 7540 imp_scope = NULL; 7541 7542 return (result); 7543 } 7544 7545 /* 7546 * _lscf_import_err() summarize the error handling returned by 7547 * lscf_import_{instance | service}_pgs 7548 * Return values are: 7549 * IMPORT_NEXT 7550 * IMPORT_OUT 7551 * IMPORT_BAD 7552 */ 7553 7554 #define IMPORT_BAD -1 7555 #define IMPORT_NEXT 0 7556 #define IMPORT_OUT 1 7557 7558 static int 7559 _lscf_import_err(int err, const char *fmri) 7560 { 7561 switch (err) { 7562 case 0: 7563 if (g_verbose) 7564 warn(gettext("%s updated.\n"), fmri); 7565 return (IMPORT_NEXT); 7566 7567 case ECONNABORTED: 7568 warn(gettext("Could not update %s " 7569 "(repository connection broken).\n"), fmri); 7570 return (IMPORT_OUT); 7571 7572 case ENOMEM: 7573 warn(gettext("Could not update %s (out of memory).\n"), fmri); 7574 return (IMPORT_OUT); 7575 7576 case ENOSPC: 7577 warn(gettext("Could not update %s " 7578 "(repository server out of resources).\n"), fmri); 7579 return (IMPORT_OUT); 7580 7581 case ECANCELED: 7582 warn(gettext( 7583 "Could not update %s (deleted).\n"), fmri); 7584 return (IMPORT_NEXT); 7585 7586 case EPERM: 7587 case EINVAL: 7588 case EBUSY: 7589 return (IMPORT_NEXT); 7590 7591 case EROFS: 7592 warn(gettext("Could not update %s (repository read-only).\n"), 7593 fmri); 7594 return (IMPORT_OUT); 7595 7596 case EACCES: 7597 warn(gettext("Could not update %s " 7598 "(backend access denied).\n"), fmri); 7599 return (IMPORT_NEXT); 7600 7601 case EEXIST: 7602 default: 7603 return (IMPORT_BAD); 7604 } 7605 7606 /*NOTREACHED*/ 7607 } 7608 7609 /* 7610 * Returns 7611 * 0 - success 7612 * -1 - lscf_import_instance_pgs() failed. 7613 */ 7614 int 7615 lscf_bundle_apply(bundle_t *bndl, const char *file) 7616 { 7617 entity_t *svc, *inst; 7618 scf_scope_t *rscope; 7619 scf_service_t *rsvc; 7620 scf_instance_t *rinst; 7621 scf_iter_t *iter; 7622 int annotation_set = 0; 7623 int r; 7624 7625 lscf_prep_hndl(); 7626 7627 if ((rscope = scf_scope_create(g_hndl)) == NULL || 7628 (rsvc = scf_service_create(g_hndl)) == NULL || 7629 (rinst = scf_instance_create(g_hndl)) == NULL || 7630 (iter = scf_iter_create(g_hndl)) == NULL || 7631 (imp_pg = scf_pg_create(g_hndl)) == NULL || 7632 (imp_tx = scf_transaction_create(g_hndl)) == NULL) 7633 scfdie(); 7634 7635 if (scf_handle_get_scope(g_hndl, SCF_SCOPE_LOCAL, rscope) != 0) 7636 scfdie(); 7637 7638 /* 7639 * Set the strings to be used for the security audit annotation 7640 * event. 7641 */ 7642 if (_scf_set_annotation(g_hndl, "svccfg apply", file) == 0) { 7643 annotation_set = 1; 7644 } else { 7645 switch (scf_error()) { 7646 case SCF_ERROR_CONNECTION_BROKEN: 7647 warn(gettext("Repository connection broken.\n")); 7648 goto out; 7649 7650 case SCF_ERROR_INVALID_ARGUMENT: 7651 case SCF_ERROR_NOT_BOUND: 7652 case SCF_ERROR_NO_RESOURCES: 7653 case SCF_ERROR_INTERNAL: 7654 bad_error("_scf_set_annotation", scf_error()); 7655 /* NOTREACHED */ 7656 7657 default: 7658 /* 7659 * Do not abort apply operation because of 7660 * inability to create annotation audit event. 7661 */ 7662 warn(gettext("_scf_set_annotation() unexpectedly " 7663 "failed with return code of %d\n"), scf_error()); 7664 break; 7665 } 7666 } 7667 7668 for (svc = uu_list_first(bndl->sc_bundle_services); 7669 svc != NULL; 7670 svc = uu_list_next(bndl->sc_bundle_services, svc)) { 7671 int refresh = 0; 7672 7673 if (scf_scope_get_service(rscope, svc->sc_name, rsvc) != 0) { 7674 switch (scf_error()) { 7675 case SCF_ERROR_NOT_FOUND: 7676 if (g_verbose) 7677 warn(gettext("Ignoring nonexistent " 7678 "service %s.\n"), svc->sc_name); 7679 continue; 7680 7681 default: 7682 scfdie(); 7683 } 7684 } 7685 7686 /* 7687 * if we have pgs in the profile, we need to refresh ALL 7688 * instances of the service 7689 */ 7690 if (uu_list_numnodes(svc->sc_pgroups) != 0) { 7691 refresh = 1; 7692 r = lscf_import_service_pgs(rsvc, svc->sc_fmri, svc, 7693 SCI_FORCE | SCI_KEEP); 7694 switch (_lscf_import_err(r, svc->sc_fmri)) { 7695 case IMPORT_NEXT: 7696 break; 7697 7698 case IMPORT_OUT: 7699 goto out; 7700 7701 case IMPORT_BAD: 7702 default: 7703 bad_error("lscf_import_service_pgs", r); 7704 } 7705 } 7706 7707 for (inst = uu_list_first( 7708 svc->sc_u.sc_service.sc_service_instances); 7709 inst != NULL; 7710 inst = uu_list_next( 7711 svc->sc_u.sc_service.sc_service_instances, inst)) { 7712 if (scf_service_get_instance(rsvc, inst->sc_name, 7713 rinst) != 0) { 7714 switch (scf_error()) { 7715 case SCF_ERROR_NOT_FOUND: 7716 if (g_verbose) 7717 warn(gettext("Ignoring " 7718 "nonexistant instance " 7719 "%s:%s.\n"), 7720 inst->sc_parent->sc_name, 7721 inst->sc_name); 7722 continue; 7723 7724 default: 7725 scfdie(); 7726 } 7727 } 7728 7729 r = lscf_import_instance_pgs(rinst, inst->sc_fmri, inst, 7730 SCI_FORCE | SCI_KEEP); 7731 switch (_lscf_import_err(r, inst->sc_fmri)) { 7732 case IMPORT_NEXT: 7733 break; 7734 7735 case IMPORT_OUT: 7736 goto out; 7737 7738 case IMPORT_BAD: 7739 default: 7740 bad_error("lscf_import_instance_pgs", r); 7741 } 7742 7743 /* refresh only if there is no pgs in the service */ 7744 if (refresh == 0) 7745 (void) refresh_entity(0, rinst, inst->sc_fmri, 7746 NULL, NULL, NULL); 7747 } 7748 7749 if (refresh == 1) { 7750 char *name_buf = safe_malloc(max_scf_name_len + 1); 7751 7752 (void) refresh_entity(1, rsvc, svc->sc_name, rinst, 7753 iter, name_buf); 7754 free(name_buf); 7755 } 7756 } 7757 7758 out: 7759 if (annotation_set) { 7760 /* Remove security audit annotation strings. */ 7761 (void) _scf_set_annotation(g_hndl, NULL, NULL); 7762 } 7763 7764 scf_transaction_destroy(imp_tx); 7765 imp_tx = NULL; 7766 scf_pg_destroy(imp_pg); 7767 imp_pg = NULL; 7768 7769 scf_iter_destroy(iter); 7770 scf_instance_destroy(rinst); 7771 scf_service_destroy(rsvc); 7772 scf_scope_destroy(rscope); 7773 return (0); 7774 } 7775 7776 7777 /* 7778 * Export. These functions create and output an XML tree of a service 7779 * description from the repository. This is largely the inverse of 7780 * lxml_get_bundle() in svccfg_xml.c, but with some kickers: 7781 * 7782 * - We must include any properties which are not represented specifically by 7783 * a service manifest, e.g., properties created by an admin post-import. To 7784 * do so we'll iterate through all properties and deal with each 7785 * apropriately. 7786 * 7787 * - Children of services and instances must must be in the order set by the 7788 * DTD, but we iterate over the properties in undefined order. The elements 7789 * are not easily (or efficiently) sortable by name. Since there's a fixed 7790 * number of classes of them, however, we'll keep the classes separate and 7791 * assemble them in order. 7792 */ 7793 7794 /* 7795 * Convenience function to handle xmlSetProp errors (and type casting). 7796 */ 7797 static void 7798 safe_setprop(xmlNodePtr n, const char *name, const char *val) 7799 { 7800 if (xmlSetProp(n, (const xmlChar *)name, (const xmlChar *)val) == NULL) 7801 uu_die(gettext("Could not set XML property.\n")); 7802 } 7803 7804 /* 7805 * Convenience function to set an XML attribute to the single value of an 7806 * astring property. If the value happens to be the default, don't set the 7807 * attribute. "dval" should be the default value supplied by the DTD, or 7808 * NULL for no default. 7809 */ 7810 static int 7811 set_attr_from_prop_default(scf_property_t *prop, xmlNodePtr n, 7812 const char *name, const char *dval) 7813 { 7814 scf_value_t *val; 7815 ssize_t len; 7816 char *str; 7817 7818 val = scf_value_create(g_hndl); 7819 if (val == NULL) 7820 scfdie(); 7821 7822 if (prop_get_val(prop, val) != 0) { 7823 scf_value_destroy(val); 7824 return (-1); 7825 } 7826 7827 len = scf_value_get_as_string(val, NULL, 0); 7828 if (len < 0) 7829 scfdie(); 7830 7831 str = safe_malloc(len + 1); 7832 7833 if (scf_value_get_as_string(val, str, len + 1) < 0) 7834 scfdie(); 7835 7836 scf_value_destroy(val); 7837 7838 if (dval == NULL || strcmp(str, dval) != 0) 7839 safe_setprop(n, name, str); 7840 7841 free(str); 7842 7843 return (0); 7844 } 7845 7846 /* 7847 * As above, but the attribute is always set. 7848 */ 7849 static int 7850 set_attr_from_prop(scf_property_t *prop, xmlNodePtr n, const char *name) 7851 { 7852 return (set_attr_from_prop_default(prop, n, name, NULL)); 7853 } 7854 7855 /* 7856 * Dump the given document onto f, with "'s replaced by ''s. 7857 */ 7858 static int 7859 write_service_bundle(xmlDocPtr doc, FILE *f) 7860 { 7861 xmlChar *mem; 7862 int sz, i; 7863 7864 mem = NULL; 7865 xmlDocDumpFormatMemory(doc, &mem, &sz, 1); 7866 7867 if (mem == NULL) { 7868 semerr(gettext("Could not dump XML tree.\n")); 7869 return (-1); 7870 } 7871 7872 /* 7873 * Fortunately libxml produces " instead of ", so we can blindly 7874 * replace all " with '. Cursed libxml2! Why must you #ifdef out the 7875 * ' code?! 7876 */ 7877 for (i = 0; i < sz; ++i) { 7878 char c = (char)mem[i]; 7879 7880 if (c == '"') 7881 (void) fputc('\'', f); 7882 else if (c == '\'') 7883 (void) fwrite("'", sizeof ("'") - 1, 1, f); 7884 else 7885 (void) fputc(c, f); 7886 } 7887 7888 return (0); 7889 } 7890 7891 /* 7892 * Create the DOM elements in elts necessary to (generically) represent prop 7893 * (i.e., a property or propval element). If the name of the property is 7894 * known, it should be passed as name_arg. Otherwise, pass NULL. 7895 */ 7896 static void 7897 export_property(scf_property_t *prop, const char *name_arg, 7898 struct pg_elts *elts, int flags) 7899 { 7900 const char *type; 7901 scf_error_t err = 0; 7902 xmlNodePtr pnode, lnode; 7903 char *lnname; 7904 int ret; 7905 7906 /* name */ 7907 if (name_arg != NULL) { 7908 (void) strcpy(exp_str, name_arg); 7909 } else { 7910 if (scf_property_get_name(prop, exp_str, exp_str_sz) < 0) 7911 scfdie(); 7912 } 7913 7914 /* type */ 7915 type = prop_to_typestr(prop); 7916 if (type == NULL) 7917 uu_die(gettext("Can't export property %s: unknown type.\n"), 7918 exp_str); 7919 7920 /* If we're exporting values, and there's just one, export it here. */ 7921 if (!(flags & SCE_ALL_VALUES)) 7922 goto empty; 7923 7924 if (scf_property_get_value(prop, exp_val) == SCF_SUCCESS) { 7925 xmlNodePtr n; 7926 7927 /* Single value, so use propval */ 7928 n = xmlNewNode(NULL, (xmlChar *)"propval"); 7929 if (n == NULL) 7930 uu_die(emsg_create_xml); 7931 7932 safe_setprop(n, name_attr, exp_str); 7933 safe_setprop(n, type_attr, type); 7934 7935 if (scf_value_get_as_string(exp_val, exp_str, exp_str_sz) < 0) 7936 scfdie(); 7937 safe_setprop(n, value_attr, exp_str); 7938 7939 if (elts->propvals == NULL) 7940 elts->propvals = n; 7941 else 7942 (void) xmlAddSibling(elts->propvals, n); 7943 7944 return; 7945 } 7946 7947 err = scf_error(); 7948 7949 if (err == SCF_ERROR_PERMISSION_DENIED) { 7950 semerr(emsg_permission_denied); 7951 return; 7952 } 7953 7954 if (err != SCF_ERROR_CONSTRAINT_VIOLATED && 7955 err != SCF_ERROR_NOT_FOUND && 7956 err != SCF_ERROR_PERMISSION_DENIED) 7957 scfdie(); 7958 7959 empty: 7960 /* Multiple (or no) values, so use property */ 7961 pnode = xmlNewNode(NULL, (xmlChar *)"property"); 7962 if (pnode == NULL) 7963 uu_die(emsg_create_xml); 7964 7965 safe_setprop(pnode, name_attr, exp_str); 7966 safe_setprop(pnode, type_attr, type); 7967 7968 if (err == SCF_ERROR_CONSTRAINT_VIOLATED) { 7969 lnname = uu_msprintf("%s_list", type); 7970 if (lnname == NULL) 7971 uu_die(gettext("Could not create string")); 7972 7973 lnode = xmlNewChild(pnode, NULL, (xmlChar *)lnname, NULL); 7974 if (lnode == NULL) 7975 uu_die(emsg_create_xml); 7976 7977 uu_free(lnname); 7978 7979 if (scf_iter_property_values(exp_val_iter, prop) != SCF_SUCCESS) 7980 scfdie(); 7981 7982 while ((ret = scf_iter_next_value(exp_val_iter, exp_val)) == 7983 1) { 7984 xmlNodePtr vn; 7985 7986 vn = xmlNewChild(lnode, NULL, (xmlChar *)"value_node", 7987 NULL); 7988 if (vn == NULL) 7989 uu_die(emsg_create_xml); 7990 7991 if (scf_value_get_as_string(exp_val, exp_str, 7992 exp_str_sz) < 0) 7993 scfdie(); 7994 safe_setprop(vn, value_attr, exp_str); 7995 } 7996 if (ret != 0) 7997 scfdie(); 7998 } 7999 8000 if (elts->properties == NULL) 8001 elts->properties = pnode; 8002 else 8003 (void) xmlAddSibling(elts->properties, pnode); 8004 } 8005 8006 /* 8007 * Add a property_group element for this property group to elts. 8008 */ 8009 static void 8010 export_pg(scf_propertygroup_t *pg, struct entity_elts *eelts, int flags) 8011 { 8012 xmlNodePtr n; 8013 struct pg_elts elts; 8014 int ret; 8015 boolean_t read_protected; 8016 8017 n = xmlNewNode(NULL, (xmlChar *)"property_group"); 8018 8019 /* name */ 8020 if (scf_pg_get_name(pg, exp_str, max_scf_name_len + 1) < 0) 8021 scfdie(); 8022 safe_setprop(n, name_attr, exp_str); 8023 8024 /* type */ 8025 if (scf_pg_get_type(pg, exp_str, exp_str_sz) < 0) 8026 scfdie(); 8027 safe_setprop(n, type_attr, exp_str); 8028 8029 /* properties */ 8030 if (scf_iter_pg_properties(exp_prop_iter, pg) != SCF_SUCCESS) 8031 scfdie(); 8032 8033 (void) memset(&elts, 0, sizeof (elts)); 8034 8035 /* 8036 * If this property group is not read protected, we always want to 8037 * output all the values. Otherwise, we only output the values if the 8038 * caller set SCE_ALL_VALUES (i.e., the user gave us export/archive -a). 8039 */ 8040 if (_scf_pg_is_read_protected(pg, &read_protected) != SCF_SUCCESS) 8041 scfdie(); 8042 8043 if (!read_protected) 8044 flags |= SCE_ALL_VALUES; 8045 8046 while ((ret = scf_iter_next_property(exp_prop_iter, exp_prop)) == 1) { 8047 if (scf_property_get_name(exp_prop, exp_str, exp_str_sz) < 0) 8048 scfdie(); 8049 8050 if (strcmp(exp_str, SCF_PROPERTY_STABILITY) == 0) { 8051 xmlNodePtr m; 8052 8053 m = xmlNewNode(NULL, (xmlChar *)"stability"); 8054 if (m == NULL) 8055 uu_die(emsg_create_xml); 8056 8057 if (set_attr_from_prop(exp_prop, m, value_attr) == 0) { 8058 elts.stability = m; 8059 continue; 8060 } 8061 8062 xmlFreeNode(m); 8063 } 8064 8065 export_property(exp_prop, NULL, &elts, flags); 8066 } 8067 if (ret == -1) 8068 scfdie(); 8069 8070 (void) xmlAddChild(n, elts.stability); 8071 (void) xmlAddChildList(n, elts.propvals); 8072 (void) xmlAddChildList(n, elts.properties); 8073 8074 if (eelts->property_groups == NULL) 8075 eelts->property_groups = n; 8076 else 8077 (void) xmlAddSibling(eelts->property_groups, n); 8078 } 8079 8080 /* 8081 * Create an XML node representing the dependency described by the given 8082 * property group and put it in eelts. Unless the dependency is not valid, in 8083 * which case create a generic property_group element which represents it and 8084 * put it in eelts. 8085 */ 8086 static void 8087 export_dependency(scf_propertygroup_t *pg, struct entity_elts *eelts) 8088 { 8089 xmlNodePtr n; 8090 int err = 0, ret; 8091 struct pg_elts elts; 8092 8093 n = xmlNewNode(NULL, (xmlChar *)"dependency"); 8094 if (n == NULL) 8095 uu_die(emsg_create_xml); 8096 8097 /* 8098 * If the external flag is present, skip this dependency because it 8099 * should have been created by another manifest. 8100 */ 8101 if (scf_pg_get_property(pg, scf_property_external, exp_prop) == 0) { 8102 if (prop_check_type(exp_prop, SCF_TYPE_BOOLEAN) == 0 && 8103 prop_get_val(exp_prop, exp_val) == 0) { 8104 uint8_t b; 8105 8106 if (scf_value_get_boolean(exp_val, &b) != SCF_SUCCESS) 8107 scfdie(); 8108 8109 if (b) 8110 return; 8111 } 8112 } else if (scf_error() != SCF_ERROR_NOT_FOUND) 8113 scfdie(); 8114 8115 /* Get the required attributes. */ 8116 8117 /* name */ 8118 if (scf_pg_get_name(pg, exp_str, max_scf_name_len + 1) < 0) 8119 scfdie(); 8120 safe_setprop(n, name_attr, exp_str); 8121 8122 /* grouping */ 8123 if (pg_get_prop(pg, SCF_PROPERTY_GROUPING, exp_prop) != 0 || 8124 set_attr_from_prop(exp_prop, n, "grouping") != 0) 8125 err = 1; 8126 8127 /* restart_on */ 8128 if (pg_get_prop(pg, SCF_PROPERTY_RESTART_ON, exp_prop) != 0 || 8129 set_attr_from_prop(exp_prop, n, "restart_on") != 0) 8130 err = 1; 8131 8132 /* type */ 8133 if (pg_get_prop(pg, SCF_PROPERTY_TYPE, exp_prop) != 0 || 8134 set_attr_from_prop(exp_prop, n, type_attr) != 0) 8135 err = 1; 8136 8137 /* 8138 * entities: Not required, but if we create no children, it will be 8139 * created as empty on import, so fail if it's missing. 8140 */ 8141 if (pg_get_prop(pg, SCF_PROPERTY_ENTITIES, exp_prop) == 0 && 8142 prop_check_type(exp_prop, SCF_TYPE_FMRI) == 0) { 8143 scf_iter_t *eiter; 8144 int ret2; 8145 8146 eiter = scf_iter_create(g_hndl); 8147 if (eiter == NULL) 8148 scfdie(); 8149 8150 if (scf_iter_property_values(eiter, exp_prop) != SCF_SUCCESS) 8151 scfdie(); 8152 8153 while ((ret2 = scf_iter_next_value(eiter, exp_val)) == 1) { 8154 xmlNodePtr ch; 8155 8156 if (scf_value_get_astring(exp_val, exp_str, 8157 exp_str_sz) < 0) 8158 scfdie(); 8159 8160 /* 8161 * service_fmri's must be first, so we can add them 8162 * here. 8163 */ 8164 ch = xmlNewChild(n, NULL, (xmlChar *)"service_fmri", 8165 NULL); 8166 if (ch == NULL) 8167 uu_die(emsg_create_xml); 8168 8169 safe_setprop(ch, value_attr, exp_str); 8170 } 8171 if (ret2 == -1) 8172 scfdie(); 8173 8174 scf_iter_destroy(eiter); 8175 } else 8176 err = 1; 8177 8178 if (err) { 8179 xmlFreeNode(n); 8180 8181 export_pg(pg, eelts, 0); 8182 8183 return; 8184 } 8185 8186 /* Iterate through the properties & handle each. */ 8187 if (scf_iter_pg_properties(exp_prop_iter, pg) != SCF_SUCCESS) 8188 scfdie(); 8189 8190 (void) memset(&elts, 0, sizeof (elts)); 8191 8192 while ((ret = scf_iter_next_property(exp_prop_iter, exp_prop)) == 1) { 8193 if (scf_property_get_name(exp_prop, exp_str, exp_str_sz) < 0) 8194 scfdie(); 8195 8196 if (strcmp(exp_str, SCF_PROPERTY_GROUPING) == 0 || 8197 strcmp(exp_str, SCF_PROPERTY_RESTART_ON) == 0 || 8198 strcmp(exp_str, SCF_PROPERTY_TYPE) == 0 || 8199 strcmp(exp_str, SCF_PROPERTY_ENTITIES) == 0) { 8200 continue; 8201 } else if (strcmp(exp_str, SCF_PROPERTY_STABILITY) == 0) { 8202 xmlNodePtr m; 8203 8204 m = xmlNewNode(NULL, (xmlChar *)"stability"); 8205 if (m == NULL) 8206 uu_die(emsg_create_xml); 8207 8208 if (set_attr_from_prop(exp_prop, m, value_attr) == 0) { 8209 elts.stability = m; 8210 continue; 8211 } 8212 8213 xmlFreeNode(m); 8214 } 8215 8216 export_property(exp_prop, exp_str, &elts, 0); 8217 } 8218 if (ret == -1) 8219 scfdie(); 8220 8221 (void) xmlAddChild(n, elts.stability); 8222 (void) xmlAddChildList(n, elts.propvals); 8223 (void) xmlAddChildList(n, elts.properties); 8224 8225 if (eelts->dependencies == NULL) 8226 eelts->dependencies = n; 8227 else 8228 (void) xmlAddSibling(eelts->dependencies, n); 8229 } 8230 8231 static xmlNodePtr 8232 export_method_environment(scf_propertygroup_t *pg) 8233 { 8234 xmlNodePtr env; 8235 int ret; 8236 int children = 0; 8237 8238 if (scf_pg_get_property(pg, SCF_PROPERTY_ENVIRONMENT, NULL) != 0) 8239 return (NULL); 8240 8241 env = xmlNewNode(NULL, (xmlChar *)"method_environment"); 8242 if (env == NULL) 8243 uu_die(emsg_create_xml); 8244 8245 if (pg_get_prop(pg, SCF_PROPERTY_ENVIRONMENT, exp_prop) != 0) 8246 scfdie(); 8247 8248 if (scf_iter_property_values(exp_val_iter, exp_prop) != SCF_SUCCESS) 8249 scfdie(); 8250 8251 while ((ret = scf_iter_next_value(exp_val_iter, exp_val)) == 1) { 8252 xmlNodePtr ev; 8253 char *cp; 8254 8255 if (scf_value_get_as_string(exp_val, exp_str, exp_str_sz) < 0) 8256 scfdie(); 8257 8258 if ((cp = strchr(exp_str, '=')) == NULL || cp == exp_str) { 8259 warn(gettext("Invalid environment variable \"%s\".\n"), 8260 exp_str); 8261 continue; 8262 } else if (strncmp(exp_str, "SMF_", 4) == 0) { 8263 warn(gettext("Invalid environment variable \"%s\"; " 8264 "\"SMF_\" prefix is reserved.\n"), exp_str); 8265 continue; 8266 } 8267 8268 *cp = '\0'; 8269 cp++; 8270 8271 ev = xmlNewChild(env, NULL, (xmlChar *)"envvar", NULL); 8272 if (ev == NULL) 8273 uu_die(emsg_create_xml); 8274 8275 safe_setprop(ev, name_attr, exp_str); 8276 safe_setprop(ev, value_attr, cp); 8277 children++; 8278 } 8279 8280 if (ret != 0) 8281 scfdie(); 8282 8283 if (children == 0) { 8284 xmlFreeNode(env); 8285 return (NULL); 8286 } 8287 8288 return (env); 8289 } 8290 8291 /* 8292 * As above, but for a method property group. 8293 */ 8294 static void 8295 export_method(scf_propertygroup_t *pg, struct entity_elts *eelts) 8296 { 8297 xmlNodePtr n, env; 8298 char *str; 8299 int err = 0, nonenv, ret; 8300 uint8_t use_profile; 8301 struct pg_elts elts; 8302 xmlNodePtr ctxt = NULL; 8303 8304 n = xmlNewNode(NULL, (xmlChar *)"exec_method"); 8305 8306 /* Get the required attributes. */ 8307 8308 /* name */ 8309 if (scf_pg_get_name(pg, exp_str, max_scf_name_len + 1) < 0) 8310 scfdie(); 8311 safe_setprop(n, name_attr, exp_str); 8312 8313 /* type */ 8314 if (pg_get_prop(pg, SCF_PROPERTY_TYPE, exp_prop) != 0 || 8315 set_attr_from_prop(exp_prop, n, type_attr) != 0) 8316 err = 1; 8317 8318 /* exec */ 8319 if (pg_get_prop(pg, SCF_PROPERTY_EXEC, exp_prop) != 0 || 8320 set_attr_from_prop(exp_prop, n, "exec") != 0) 8321 err = 1; 8322 8323 /* timeout */ 8324 if (pg_get_prop(pg, SCF_PROPERTY_TIMEOUT, exp_prop) == 0 && 8325 prop_check_type(exp_prop, SCF_TYPE_COUNT) == 0 && 8326 prop_get_val(exp_prop, exp_val) == 0) { 8327 uint64_t c; 8328 8329 if (scf_value_get_count(exp_val, &c) != SCF_SUCCESS) 8330 scfdie(); 8331 8332 str = uu_msprintf("%llu", c); 8333 if (str == NULL) 8334 uu_die(gettext("Could not create string")); 8335 8336 safe_setprop(n, "timeout_seconds", str); 8337 free(str); 8338 } else 8339 err = 1; 8340 8341 if (err) { 8342 xmlFreeNode(n); 8343 8344 export_pg(pg, eelts, 0); 8345 8346 return; 8347 } 8348 8349 8350 /* 8351 * If we're going to have a method_context child, we need to know 8352 * before we iterate through the properties. Since method_context's 8353 * are optional, we don't want to complain about any properties 8354 * missing if none of them are there. Thus we can't use the 8355 * convenience functions. 8356 */ 8357 nonenv = 8358 scf_pg_get_property(pg, SCF_PROPERTY_WORKING_DIRECTORY, NULL) == 8359 SCF_SUCCESS || 8360 scf_pg_get_property(pg, SCF_PROPERTY_PROJECT, NULL) == 8361 SCF_SUCCESS || 8362 scf_pg_get_property(pg, SCF_PROPERTY_RESOURCE_POOL, NULL) == 8363 SCF_SUCCESS || 8364 scf_pg_get_property(pg, SCF_PROPERTY_USE_PROFILE, NULL) == 8365 SCF_SUCCESS; 8366 8367 if (nonenv) { 8368 ctxt = xmlNewNode(NULL, (xmlChar *)"method_context"); 8369 if (ctxt == NULL) 8370 uu_die(emsg_create_xml); 8371 8372 if (pg_get_prop(pg, SCF_PROPERTY_WORKING_DIRECTORY, exp_prop) == 8373 0 && 8374 set_attr_from_prop_default(exp_prop, ctxt, 8375 "working_directory", ":default") != 0) 8376 err = 1; 8377 8378 if (pg_get_prop(pg, SCF_PROPERTY_PROJECT, exp_prop) == 0 && 8379 set_attr_from_prop_default(exp_prop, ctxt, "project", 8380 ":default") != 0) 8381 err = 1; 8382 8383 if (pg_get_prop(pg, SCF_PROPERTY_RESOURCE_POOL, exp_prop) == 8384 0 && 8385 set_attr_from_prop_default(exp_prop, ctxt, 8386 "resource_pool", ":default") != 0) 8387 err = 1; 8388 /* 8389 * We only want to complain about profile or credential 8390 * properties if we will use them. To determine that we must 8391 * examine USE_PROFILE. 8392 */ 8393 if (pg_get_prop(pg, SCF_PROPERTY_USE_PROFILE, exp_prop) == 0 && 8394 prop_check_type(exp_prop, SCF_TYPE_BOOLEAN) == 0 && 8395 prop_get_val(exp_prop, exp_val) == 0) { 8396 if (scf_value_get_boolean(exp_val, &use_profile) != 8397 SCF_SUCCESS) { 8398 scfdie(); 8399 } 8400 8401 if (use_profile) { 8402 xmlNodePtr prof; 8403 8404 prof = xmlNewChild(ctxt, NULL, 8405 (xmlChar *)"method_profile", NULL); 8406 if (prof == NULL) 8407 uu_die(emsg_create_xml); 8408 8409 if (pg_get_prop(pg, SCF_PROPERTY_PROFILE, 8410 exp_prop) != 0 || 8411 set_attr_from_prop(exp_prop, prof, 8412 name_attr) != 0) 8413 err = 1; 8414 } else { 8415 xmlNodePtr cred; 8416 8417 cred = xmlNewChild(ctxt, NULL, 8418 (xmlChar *)"method_credential", NULL); 8419 if (cred == NULL) 8420 uu_die(emsg_create_xml); 8421 8422 if (pg_get_prop(pg, SCF_PROPERTY_USER, 8423 exp_prop) != 0 || 8424 set_attr_from_prop(exp_prop, cred, 8425 "user") != 0) { 8426 err = 1; 8427 } 8428 8429 if (pg_get_prop(pg, SCF_PROPERTY_GROUP, 8430 exp_prop) == 0 && 8431 set_attr_from_prop_default(exp_prop, cred, 8432 "group", ":default") != 0) 8433 err = 1; 8434 8435 if (pg_get_prop(pg, SCF_PROPERTY_SUPP_GROUPS, 8436 exp_prop) == 0 && 8437 set_attr_from_prop_default(exp_prop, cred, 8438 "supp_groups", ":default") != 0) 8439 err = 1; 8440 8441 if (pg_get_prop(pg, SCF_PROPERTY_PRIVILEGES, 8442 exp_prop) == 0 && 8443 set_attr_from_prop_default(exp_prop, cred, 8444 "privileges", ":default") != 0) 8445 err = 1; 8446 8447 if (pg_get_prop(pg, 8448 SCF_PROPERTY_LIMIT_PRIVILEGES, 8449 exp_prop) == 0 && 8450 set_attr_from_prop_default(exp_prop, cred, 8451 "limit_privileges", ":default") != 0) 8452 err = 1; 8453 } 8454 } 8455 } 8456 8457 if ((env = export_method_environment(pg)) != NULL) { 8458 if (ctxt == NULL) { 8459 ctxt = xmlNewNode(NULL, (xmlChar *)"method_context"); 8460 if (ctxt == NULL) 8461 uu_die(emsg_create_xml); 8462 } 8463 (void) xmlAddChild(ctxt, env); 8464 } 8465 8466 if (env != NULL || (nonenv && err == 0)) 8467 (void) xmlAddChild(n, ctxt); 8468 else 8469 xmlFreeNode(ctxt); 8470 8471 nonenv = (err == 0); 8472 8473 if (scf_iter_pg_properties(exp_prop_iter, pg) != SCF_SUCCESS) 8474 scfdie(); 8475 8476 (void) memset(&elts, 0, sizeof (elts)); 8477 8478 while ((ret = scf_iter_next_property(exp_prop_iter, exp_prop)) == 1) { 8479 if (scf_property_get_name(exp_prop, exp_str, exp_str_sz) < 0) 8480 scfdie(); 8481 8482 if (strcmp(exp_str, SCF_PROPERTY_TYPE) == 0 || 8483 strcmp(exp_str, SCF_PROPERTY_EXEC) == 0 || 8484 strcmp(exp_str, SCF_PROPERTY_TIMEOUT) == 0) { 8485 continue; 8486 } else if (strcmp(exp_str, SCF_PROPERTY_STABILITY) == 0) { 8487 xmlNodePtr m; 8488 8489 m = xmlNewNode(NULL, (xmlChar *)"stability"); 8490 if (m == NULL) 8491 uu_die(emsg_create_xml); 8492 8493 if (set_attr_from_prop(exp_prop, m, value_attr) == 0) { 8494 elts.stability = m; 8495 continue; 8496 } 8497 8498 xmlFreeNode(m); 8499 } else if (strcmp(exp_str, SCF_PROPERTY_WORKING_DIRECTORY) == 8500 0 || 8501 strcmp(exp_str, SCF_PROPERTY_PROJECT) == 0 || 8502 strcmp(exp_str, SCF_PROPERTY_RESOURCE_POOL) == 0 || 8503 strcmp(exp_str, SCF_PROPERTY_USE_PROFILE) == 0) { 8504 if (nonenv) 8505 continue; 8506 } else if (strcmp(exp_str, SCF_PROPERTY_USER) == 0 || 8507 strcmp(exp_str, SCF_PROPERTY_GROUP) == 0 || 8508 strcmp(exp_str, SCF_PROPERTY_SUPP_GROUPS) == 0 || 8509 strcmp(exp_str, SCF_PROPERTY_PRIVILEGES) == 0 || 8510 strcmp(exp_str, SCF_PROPERTY_LIMIT_PRIVILEGES) == 0) { 8511 if (nonenv && !use_profile) 8512 continue; 8513 } else if (strcmp(exp_str, SCF_PROPERTY_PROFILE) == 0) { 8514 if (nonenv && use_profile) 8515 continue; 8516 } else if (strcmp(exp_str, SCF_PROPERTY_ENVIRONMENT) == 0) { 8517 if (env != NULL) 8518 continue; 8519 } 8520 8521 export_property(exp_prop, exp_str, &elts, 0); 8522 } 8523 if (ret == -1) 8524 scfdie(); 8525 8526 (void) xmlAddChild(n, elts.stability); 8527 (void) xmlAddChildList(n, elts.propvals); 8528 (void) xmlAddChildList(n, elts.properties); 8529 8530 if (eelts->exec_methods == NULL) 8531 eelts->exec_methods = n; 8532 else 8533 (void) xmlAddSibling(eelts->exec_methods, n); 8534 } 8535 8536 static void 8537 export_pg_elts(struct pg_elts *elts, const char *name, const char *type, 8538 struct entity_elts *eelts) 8539 { 8540 xmlNodePtr pgnode; 8541 8542 pgnode = xmlNewNode(NULL, (xmlChar *)"property_group"); 8543 if (pgnode == NULL) 8544 uu_die(emsg_create_xml); 8545 8546 safe_setprop(pgnode, name_attr, name); 8547 safe_setprop(pgnode, type_attr, type); 8548 8549 (void) xmlAddChildList(pgnode, elts->propvals); 8550 (void) xmlAddChildList(pgnode, elts->properties); 8551 8552 if (eelts->property_groups == NULL) 8553 eelts->property_groups = pgnode; 8554 else 8555 (void) xmlAddSibling(eelts->property_groups, pgnode); 8556 } 8557 8558 /* 8559 * Process the general property group for a service. This is the one with the 8560 * goodies. 8561 */ 8562 static void 8563 export_svc_general(scf_propertygroup_t *pg, struct entity_elts *selts) 8564 { 8565 struct pg_elts elts; 8566 int ret; 8567 8568 /* 8569 * In case there are properties which don't correspond to child 8570 * entities of the service entity, we'll set up a pg_elts structure to 8571 * put them in. 8572 */ 8573 (void) memset(&elts, 0, sizeof (elts)); 8574 8575 /* Walk the properties, looking for special ones. */ 8576 if (scf_iter_pg_properties(exp_prop_iter, pg) != SCF_SUCCESS) 8577 scfdie(); 8578 8579 while ((ret = scf_iter_next_property(exp_prop_iter, exp_prop)) == 1) { 8580 if (scf_property_get_name(exp_prop, exp_str, exp_str_sz) < 0) 8581 scfdie(); 8582 8583 if (strcmp(exp_str, SCF_PROPERTY_SINGLE_INSTANCE) == 0) { 8584 if (prop_check_type(exp_prop, SCF_TYPE_BOOLEAN) == 0 && 8585 prop_get_val(exp_prop, exp_val) == 0) { 8586 uint8_t b; 8587 8588 if (scf_value_get_boolean(exp_val, &b) != 8589 SCF_SUCCESS) 8590 scfdie(); 8591 8592 if (b) { 8593 selts->single_instance = 8594 xmlNewNode(NULL, 8595 (xmlChar *)"single_instance"); 8596 if (selts->single_instance == NULL) 8597 uu_die(emsg_create_xml); 8598 } 8599 8600 continue; 8601 } 8602 } else if (strcmp(exp_str, SCF_PROPERTY_RESTARTER) == 0) { 8603 xmlNodePtr rnode, sfnode; 8604 8605 rnode = xmlNewNode(NULL, (xmlChar *)"restarter"); 8606 if (rnode == NULL) 8607 uu_die(emsg_create_xml); 8608 8609 sfnode = xmlNewChild(rnode, NULL, 8610 (xmlChar *)"service_fmri", NULL); 8611 if (sfnode == NULL) 8612 uu_die(emsg_create_xml); 8613 8614 if (set_attr_from_prop(exp_prop, sfnode, 8615 value_attr) == 0) { 8616 selts->restarter = rnode; 8617 continue; 8618 } 8619 8620 xmlFreeNode(rnode); 8621 } else if (strcmp(exp_str, SCF_PROPERTY_ENTITY_STABILITY) == 8622 0) { 8623 xmlNodePtr s; 8624 8625 s = xmlNewNode(NULL, (xmlChar *)"stability"); 8626 if (s == NULL) 8627 uu_die(emsg_create_xml); 8628 8629 if (set_attr_from_prop(exp_prop, s, value_attr) == 0) { 8630 selts->stability = s; 8631 continue; 8632 } 8633 8634 xmlFreeNode(s); 8635 } 8636 8637 export_property(exp_prop, exp_str, &elts, 0); 8638 } 8639 if (ret == -1) 8640 scfdie(); 8641 8642 if (elts.propvals != NULL || elts.properties != NULL) 8643 export_pg_elts(&elts, scf_pg_general, scf_group_framework, 8644 selts); 8645 } 8646 8647 static void 8648 export_method_context(scf_propertygroup_t *pg, struct entity_elts *elts) 8649 { 8650 xmlNodePtr n, prof, cred, env; 8651 uint8_t use_profile; 8652 int ret, err = 0; 8653 8654 n = xmlNewNode(NULL, (xmlChar *)"method_context"); 8655 8656 env = export_method_environment(pg); 8657 8658 /* Need to know whether we'll use a profile or not. */ 8659 if (pg_get_prop(pg, SCF_PROPERTY_USE_PROFILE, exp_prop) == 0 && 8660 prop_check_type(exp_prop, SCF_TYPE_BOOLEAN) == 0 && 8661 prop_get_val(exp_prop, exp_val) == 0) { 8662 if (scf_value_get_boolean(exp_val, &use_profile) != SCF_SUCCESS) 8663 scfdie(); 8664 8665 if (use_profile) 8666 prof = 8667 xmlNewChild(n, NULL, (xmlChar *)"method_profile", 8668 NULL); 8669 else 8670 cred = 8671 xmlNewChild(n, NULL, (xmlChar *)"method_credential", 8672 NULL); 8673 } 8674 8675 if (env != NULL) 8676 (void) xmlAddChild(n, env); 8677 8678 if (scf_iter_pg_properties(exp_prop_iter, pg) != SCF_SUCCESS) 8679 scfdie(); 8680 8681 while ((ret = scf_iter_next_property(exp_prop_iter, exp_prop)) == 1) { 8682 if (scf_property_get_name(exp_prop, exp_str, exp_str_sz) < 0) 8683 scfdie(); 8684 8685 if (strcmp(exp_str, SCF_PROPERTY_WORKING_DIRECTORY) == 0) { 8686 if (set_attr_from_prop(exp_prop, n, 8687 "working_directory") != 0) 8688 err = 1; 8689 } else if (strcmp(exp_str, SCF_PROPERTY_PROJECT) == 0) { 8690 if (set_attr_from_prop(exp_prop, n, "project") != 0) 8691 err = 1; 8692 } else if (strcmp(exp_str, SCF_PROPERTY_RESOURCE_POOL) == 0) { 8693 if (set_attr_from_prop(exp_prop, n, 8694 "resource_pool") != 0) 8695 err = 1; 8696 } else if (strcmp(exp_str, SCF_PROPERTY_USE_PROFILE) == 0) { 8697 /* EMPTY */ 8698 } else if (strcmp(exp_str, SCF_PROPERTY_USER) == 0) { 8699 if (use_profile || 8700 set_attr_from_prop(exp_prop, cred, "user") != 0) 8701 err = 1; 8702 } else if (strcmp(exp_str, SCF_PROPERTY_GROUP) == 0) { 8703 if (use_profile || 8704 set_attr_from_prop(exp_prop, cred, "group") != 0) 8705 err = 1; 8706 } else if (strcmp(exp_str, SCF_PROPERTY_SUPP_GROUPS) == 0) { 8707 if (use_profile || set_attr_from_prop(exp_prop, cred, 8708 "supp_groups") != 0) 8709 err = 1; 8710 } else if (strcmp(exp_str, SCF_PROPERTY_PRIVILEGES) == 0) { 8711 if (use_profile || set_attr_from_prop(exp_prop, cred, 8712 "privileges") != 0) 8713 err = 1; 8714 } else if (strcmp(exp_str, SCF_PROPERTY_LIMIT_PRIVILEGES) == 8715 0) { 8716 if (use_profile || set_attr_from_prop(exp_prop, cred, 8717 "limit_privileges") != 0) 8718 err = 1; 8719 } else if (strcmp(exp_str, SCF_PROPERTY_PROFILE) == 0) { 8720 if (!use_profile || set_attr_from_prop(exp_prop, 8721 prof, name_attr) != 0) 8722 err = 1; 8723 } else { 8724 /* Can't have generic properties in method_context's */ 8725 err = 1; 8726 } 8727 } 8728 if (ret == -1) 8729 scfdie(); 8730 8731 if (err && env == NULL) { 8732 xmlFreeNode(n); 8733 export_pg(pg, elts, 0); 8734 return; 8735 } 8736 8737 elts->method_context = n; 8738 } 8739 8740 /* 8741 * Given a dependency property group in the tfmri entity (target fmri), return 8742 * a dependent element which represents it. 8743 */ 8744 static xmlNodePtr 8745 export_dependent(scf_propertygroup_t *pg, const char *name, const char *tfmri) 8746 { 8747 uint8_t b; 8748 xmlNodePtr n, sf; 8749 int err = 0, ret; 8750 struct pg_elts pgelts; 8751 8752 /* 8753 * If external isn't set to true then exporting the service will 8754 * export this as a normal dependency, so we should stop to avoid 8755 * duplication. 8756 */ 8757 if (scf_pg_get_property(pg, scf_property_external, exp_prop) != 0 || 8758 scf_property_get_value(exp_prop, exp_val) != 0 || 8759 scf_value_get_boolean(exp_val, &b) != 0 || !b) { 8760 if (g_verbose) { 8761 warn(gettext("Dependent \"%s\" cannot be exported " 8762 "properly because the \"%s\" property of the " 8763 "\"%s\" dependency of %s is not set to true.\n"), 8764 name, scf_property_external, name, tfmri); 8765 } 8766 8767 return (NULL); 8768 } 8769 8770 n = xmlNewNode(NULL, (xmlChar *)"dependent"); 8771 if (n == NULL) 8772 uu_die(emsg_create_xml); 8773 8774 safe_setprop(n, name_attr, name); 8775 8776 /* Get the required attributes */ 8777 if (pg_get_prop(pg, SCF_PROPERTY_RESTART_ON, exp_prop) != 0 || 8778 set_attr_from_prop(exp_prop, n, "restart_on") != 0) 8779 err = 1; 8780 8781 if (pg_get_prop(pg, SCF_PROPERTY_GROUPING, exp_prop) != 0 || 8782 set_attr_from_prop(exp_prop, n, "grouping") != 0) 8783 err = 1; 8784 8785 if (pg_get_prop(pg, SCF_PROPERTY_ENTITIES, exp_prop) == 0 && 8786 prop_check_type(exp_prop, SCF_TYPE_FMRI) == 0 && 8787 prop_get_val(exp_prop, exp_val) == 0) { 8788 /* EMPTY */ 8789 } else 8790 err = 1; 8791 8792 if (err) { 8793 xmlFreeNode(n); 8794 return (NULL); 8795 } 8796 8797 sf = xmlNewChild(n, NULL, (xmlChar *)"service_fmri", NULL); 8798 if (sf == NULL) 8799 uu_die(emsg_create_xml); 8800 8801 safe_setprop(sf, value_attr, tfmri); 8802 8803 /* 8804 * Now add elements for the other properties. 8805 */ 8806 if (scf_iter_pg_properties(exp_prop_iter, pg) != SCF_SUCCESS) 8807 scfdie(); 8808 8809 (void) memset(&pgelts, 0, sizeof (pgelts)); 8810 8811 while ((ret = scf_iter_next_property(exp_prop_iter, exp_prop)) == 1) { 8812 if (scf_property_get_name(exp_prop, exp_str, exp_str_sz) < 0) 8813 scfdie(); 8814 8815 if (strcmp(exp_str, scf_property_external) == 0 || 8816 strcmp(exp_str, SCF_PROPERTY_RESTART_ON) == 0 || 8817 strcmp(exp_str, SCF_PROPERTY_GROUPING) == 0 || 8818 strcmp(exp_str, SCF_PROPERTY_ENTITIES) == 0) { 8819 continue; 8820 } else if (strcmp(exp_str, SCF_PROPERTY_TYPE) == 0) { 8821 if (prop_check_type(exp_prop, SCF_TYPE_ASTRING) == 0 && 8822 prop_get_val(exp_prop, exp_val) == 0) { 8823 char type[sizeof ("service") + 1]; 8824 8825 if (scf_value_get_astring(exp_val, type, 8826 sizeof (type)) < 0) 8827 scfdie(); 8828 8829 if (strcmp(type, "service") == 0) 8830 continue; 8831 } 8832 } else if (strcmp(exp_str, SCF_PROPERTY_STABILITY) == 0) { 8833 xmlNodePtr s; 8834 8835 s = xmlNewNode(NULL, (xmlChar *)"stability"); 8836 if (s == NULL) 8837 uu_die(emsg_create_xml); 8838 8839 if (set_attr_from_prop(exp_prop, s, value_attr) == 0) { 8840 pgelts.stability = s; 8841 continue; 8842 } 8843 8844 xmlFreeNode(s); 8845 } 8846 8847 export_property(exp_prop, exp_str, &pgelts, 0); 8848 } 8849 if (ret == -1) 8850 scfdie(); 8851 8852 (void) xmlAddChild(n, pgelts.stability); 8853 (void) xmlAddChildList(n, pgelts.propvals); 8854 (void) xmlAddChildList(n, pgelts.properties); 8855 8856 return (n); 8857 } 8858 8859 static void 8860 export_dependents(scf_propertygroup_t *pg, struct entity_elts *eelts) 8861 { 8862 scf_propertygroup_t *opg; 8863 scf_iter_t *iter; 8864 char *type, *fmri; 8865 int ret; 8866 struct pg_elts pgelts; 8867 xmlNodePtr n; 8868 scf_error_t serr; 8869 8870 if ((opg = scf_pg_create(g_hndl)) == NULL || 8871 (iter = scf_iter_create(g_hndl)) == NULL) 8872 scfdie(); 8873 8874 /* Can't use exp_prop_iter due to export_dependent(). */ 8875 if (scf_iter_pg_properties(iter, pg) != SCF_SUCCESS) 8876 scfdie(); 8877 8878 type = safe_malloc(max_scf_pg_type_len + 1); 8879 8880 /* Get an extra byte so we can tell if values are too long. */ 8881 fmri = safe_malloc(max_scf_fmri_len + 2); 8882 8883 (void) memset(&pgelts, 0, sizeof (pgelts)); 8884 8885 while ((ret = scf_iter_next_property(iter, exp_prop)) == 1) { 8886 void *entity; 8887 int isservice; 8888 scf_type_t ty; 8889 8890 if (scf_property_type(exp_prop, &ty) != SCF_SUCCESS) 8891 scfdie(); 8892 8893 if ((ty != SCF_TYPE_ASTRING && 8894 prop_check_type(exp_prop, SCF_TYPE_FMRI) != 0) || 8895 prop_get_val(exp_prop, exp_val) != 0) { 8896 export_property(exp_prop, NULL, &pgelts, 0); 8897 continue; 8898 } 8899 8900 if (scf_property_get_name(exp_prop, exp_str, exp_str_sz) < 0) 8901 scfdie(); 8902 8903 if (scf_value_get_astring(exp_val, fmri, 8904 max_scf_fmri_len + 2) < 0) 8905 scfdie(); 8906 8907 /* Look for a dependency group in the target fmri. */ 8908 serr = fmri_to_entity(g_hndl, fmri, &entity, &isservice); 8909 switch (serr) { 8910 case SCF_ERROR_NONE: 8911 break; 8912 8913 case SCF_ERROR_NO_MEMORY: 8914 uu_die(gettext("Out of memory.\n")); 8915 /* NOTREACHED */ 8916 8917 case SCF_ERROR_INVALID_ARGUMENT: 8918 if (g_verbose) { 8919 if (scf_property_to_fmri(exp_prop, fmri, 8920 max_scf_fmri_len + 2) < 0) 8921 scfdie(); 8922 8923 warn(gettext("The value of %s is not a valid " 8924 "FMRI.\n"), fmri); 8925 } 8926 8927 export_property(exp_prop, exp_str, &pgelts, 0); 8928 continue; 8929 8930 case SCF_ERROR_CONSTRAINT_VIOLATED: 8931 if (g_verbose) { 8932 if (scf_property_to_fmri(exp_prop, fmri, 8933 max_scf_fmri_len + 2) < 0) 8934 scfdie(); 8935 8936 warn(gettext("The value of %s does not specify " 8937 "a service or an instance.\n"), fmri); 8938 } 8939 8940 export_property(exp_prop, exp_str, &pgelts, 0); 8941 continue; 8942 8943 case SCF_ERROR_NOT_FOUND: 8944 if (g_verbose) { 8945 if (scf_property_to_fmri(exp_prop, fmri, 8946 max_scf_fmri_len + 2) < 0) 8947 scfdie(); 8948 8949 warn(gettext("The entity specified by %s does " 8950 "not exist.\n"), fmri); 8951 } 8952 8953 export_property(exp_prop, exp_str, &pgelts, 0); 8954 continue; 8955 8956 default: 8957 #ifndef NDEBUG 8958 (void) fprintf(stderr, "%s:%d: %s() failed with " 8959 "unexpected error %d.\n", __FILE__, __LINE__, 8960 "fmri_to_entity", serr); 8961 #endif 8962 abort(); 8963 } 8964 8965 if (entity_get_pg(entity, isservice, exp_str, opg) != 0) { 8966 if (scf_error() != SCF_ERROR_NOT_FOUND) 8967 scfdie(); 8968 8969 warn(gettext("Entity %s is missing dependency property " 8970 "group %s.\n"), fmri, exp_str); 8971 8972 export_property(exp_prop, NULL, &pgelts, 0); 8973 continue; 8974 } 8975 8976 if (scf_pg_get_type(opg, type, max_scf_pg_type_len + 1) < 0) 8977 scfdie(); 8978 8979 if (strcmp(type, SCF_GROUP_DEPENDENCY) != 0) { 8980 if (scf_pg_to_fmri(opg, fmri, max_scf_fmri_len + 2) < 0) 8981 scfdie(); 8982 8983 warn(gettext("Property group %s is not of " 8984 "expected type %s.\n"), fmri, SCF_GROUP_DEPENDENCY); 8985 8986 export_property(exp_prop, NULL, &pgelts, 0); 8987 continue; 8988 } 8989 8990 n = export_dependent(opg, exp_str, fmri); 8991 if (n == NULL) 8992 export_property(exp_prop, exp_str, &pgelts, 0); 8993 else { 8994 if (eelts->dependents == NULL) 8995 eelts->dependents = n; 8996 else 8997 (void) xmlAddSibling(eelts->dependents, 8998 n); 8999 } 9000 } 9001 if (ret == -1) 9002 scfdie(); 9003 9004 free(fmri); 9005 free(type); 9006 9007 scf_iter_destroy(iter); 9008 scf_pg_destroy(opg); 9009 9010 if (pgelts.propvals != NULL || pgelts.properties != NULL) 9011 export_pg_elts(&pgelts, SCF_PG_DEPENDENTS, scf_group_framework, 9012 eelts); 9013 } 9014 9015 static void 9016 make_node(xmlNodePtr *nodep, const char *name) 9017 { 9018 if (*nodep == NULL) { 9019 *nodep = xmlNewNode(NULL, (xmlChar *)name); 9020 if (*nodep == NULL) 9021 uu_die(emsg_create_xml); 9022 } 9023 } 9024 9025 static xmlNodePtr 9026 export_tm_loctext(scf_propertygroup_t *pg, const char *parname) 9027 { 9028 int ret; 9029 xmlNodePtr parent = NULL; 9030 xmlNodePtr loctext = NULL; 9031 9032 if (scf_iter_pg_properties(exp_prop_iter, pg) != SCF_SUCCESS) 9033 scfdie(); 9034 9035 while ((ret = scf_iter_next_property(exp_prop_iter, exp_prop)) == 1) { 9036 if (prop_check_type(exp_prop, SCF_TYPE_USTRING) != 0 || 9037 prop_get_val(exp_prop, exp_val) != 0) 9038 continue; 9039 9040 if (scf_value_get_ustring(exp_val, exp_str, exp_str_sz) < 0) 9041 scfdie(); 9042 9043 make_node(&parent, parname); 9044 loctext = xmlNewTextChild(parent, NULL, (xmlChar *)"loctext", 9045 (xmlChar *)exp_str); 9046 if (loctext == NULL) 9047 uu_die(emsg_create_xml); 9048 9049 if (scf_property_get_name(exp_prop, exp_str, exp_str_sz) < 0) 9050 scfdie(); 9051 9052 safe_setprop(loctext, "xml:lang", exp_str); 9053 } 9054 9055 if (ret == -1) 9056 scfdie(); 9057 9058 return (parent); 9059 } 9060 9061 static xmlNodePtr 9062 export_tm_manpage(scf_propertygroup_t *pg) 9063 { 9064 xmlNodePtr manpage = xmlNewNode(NULL, (xmlChar *)"manpage"); 9065 if (manpage == NULL) 9066 uu_die(emsg_create_xml); 9067 9068 if (pg_get_prop(pg, SCF_PROPERTY_TM_TITLE, exp_prop) != 0 || 9069 set_attr_from_prop(exp_prop, manpage, "title") != 0 || 9070 pg_get_prop(pg, SCF_PROPERTY_TM_SECTION, exp_prop) != 0 || 9071 set_attr_from_prop(exp_prop, manpage, "section") != 0) { 9072 xmlFreeNode(manpage); 9073 return (NULL); 9074 } 9075 9076 if (pg_get_prop(pg, SCF_PROPERTY_TM_MANPATH, exp_prop) == 0) 9077 (void) set_attr_from_prop_default(exp_prop, 9078 manpage, "manpath", ":default"); 9079 9080 return (manpage); 9081 } 9082 9083 static xmlNodePtr 9084 export_tm_doc_link(scf_propertygroup_t *pg) 9085 { 9086 xmlNodePtr doc_link = xmlNewNode(NULL, (xmlChar *)"doc_link"); 9087 if (doc_link == NULL) 9088 uu_die(emsg_create_xml); 9089 9090 if (pg_get_prop(pg, SCF_PROPERTY_TM_NAME, exp_prop) != 0 || 9091 set_attr_from_prop(exp_prop, doc_link, "name") != 0 || 9092 pg_get_prop(pg, SCF_PROPERTY_TM_URI, exp_prop) != 0 || 9093 set_attr_from_prop(exp_prop, doc_link, "uri") != 0) { 9094 xmlFreeNode(doc_link); 9095 return (NULL); 9096 } 9097 return (doc_link); 9098 } 9099 9100 /* 9101 * Process template information for a service or instances. 9102 */ 9103 static void 9104 export_template(scf_propertygroup_t *pg, struct entity_elts *elts, 9105 struct template_elts *telts) 9106 { 9107 size_t mansz = strlen(SCF_PG_TM_MAN_PREFIX); 9108 size_t docsz = strlen(SCF_PG_TM_DOC_PREFIX); 9109 xmlNodePtr child = NULL; 9110 9111 if (scf_pg_get_name(pg, exp_str, exp_str_sz) < 0) 9112 scfdie(); 9113 9114 if (strcmp(exp_str, SCF_PG_TM_COMMON_NAME) == 0) { 9115 telts->common_name = export_tm_loctext(pg, "common_name"); 9116 if (telts->common_name == NULL) 9117 export_pg(pg, elts, 0); 9118 return; 9119 } else if (strcmp(exp_str, SCF_PG_TM_DESCRIPTION) == 0) { 9120 telts->description = export_tm_loctext(pg, "description"); 9121 if (telts->description == NULL) 9122 export_pg(pg, elts, 0); 9123 return; 9124 } 9125 9126 if (strncmp(exp_str, SCF_PG_TM_MAN_PREFIX, mansz) == 0) { 9127 child = export_tm_manpage(pg); 9128 } else if (strncmp(exp_str, SCF_PG_TM_DOC_PREFIX, docsz) == 0) { 9129 child = export_tm_doc_link(pg); 9130 } 9131 9132 if (child != NULL) { 9133 make_node(&telts->documentation, "documentation"); 9134 (void) xmlAddChild(telts->documentation, child); 9135 } else { 9136 export_pg(pg, elts, 0); 9137 } 9138 } 9139 9140 /* 9141 * Process the general property group for an instance. 9142 */ 9143 static void 9144 export_inst_general(scf_propertygroup_t *pg, xmlNodePtr inode, 9145 struct entity_elts *elts) 9146 { 9147 uint8_t enabled; 9148 struct pg_elts pgelts; 9149 int ret; 9150 9151 /* enabled */ 9152 if (pg_get_prop(pg, scf_property_enabled, exp_prop) == 0 && 9153 prop_check_type(exp_prop, SCF_TYPE_BOOLEAN) == 0 && 9154 prop_get_val(exp_prop, exp_val) == 0) { 9155 if (scf_value_get_boolean(exp_val, &enabled) != SCF_SUCCESS) 9156 scfdie(); 9157 } else { 9158 enabled = 0; 9159 } 9160 9161 safe_setprop(inode, enabled_attr, enabled ? true : false); 9162 9163 if (scf_iter_pg_properties(exp_prop_iter, pg) != SCF_SUCCESS) 9164 scfdie(); 9165 9166 (void) memset(&pgelts, 0, sizeof (pgelts)); 9167 9168 while ((ret = scf_iter_next_property(exp_prop_iter, exp_prop)) == 1) { 9169 if (scf_property_get_name(exp_prop, exp_str, exp_str_sz) < 0) 9170 scfdie(); 9171 9172 if (strcmp(exp_str, scf_property_enabled) == 0) { 9173 continue; 9174 } else if (strcmp(exp_str, SCF_PROPERTY_RESTARTER) == 0) { 9175 xmlNodePtr rnode, sfnode; 9176 9177 rnode = xmlNewNode(NULL, (xmlChar *)"restarter"); 9178 if (rnode == NULL) 9179 uu_die(emsg_create_xml); 9180 9181 sfnode = xmlNewChild(rnode, NULL, 9182 (xmlChar *)"service_fmri", NULL); 9183 if (sfnode == NULL) 9184 uu_die(emsg_create_xml); 9185 9186 if (set_attr_from_prop(exp_prop, sfnode, 9187 value_attr) == 0) { 9188 elts->restarter = rnode; 9189 continue; 9190 } 9191 9192 xmlFreeNode(rnode); 9193 } 9194 9195 export_property(exp_prop, exp_str, &pgelts, 0); 9196 } 9197 if (ret == -1) 9198 scfdie(); 9199 9200 if (pgelts.propvals != NULL || pgelts.properties != NULL) 9201 export_pg_elts(&pgelts, scf_pg_general, scf_group_framework, 9202 elts); 9203 } 9204 9205 /* 9206 * Put an instance element for the given instance into selts. 9207 */ 9208 static void 9209 export_instance(scf_instance_t *inst, struct entity_elts *selts, int flags) 9210 { 9211 xmlNodePtr n; 9212 boolean_t isdefault; 9213 struct entity_elts elts; 9214 struct template_elts template_elts; 9215 int ret; 9216 9217 n = xmlNewNode(NULL, (xmlChar *)"instance"); 9218 if (n == NULL) 9219 uu_die(emsg_create_xml); 9220 9221 /* name */ 9222 if (scf_instance_get_name(inst, exp_str, exp_str_sz) < 0) 9223 scfdie(); 9224 safe_setprop(n, name_attr, exp_str); 9225 isdefault = strcmp(exp_str, "default") == 0; 9226 9227 /* check existance of general pg (since general/enabled is required) */ 9228 if (scf_instance_get_pg(inst, scf_pg_general, exp_pg) != SCF_SUCCESS) { 9229 if (scf_error() != SCF_ERROR_NOT_FOUND) 9230 scfdie(); 9231 9232 if (g_verbose) { 9233 if (scf_instance_to_fmri(inst, exp_str, exp_str_sz) < 0) 9234 scfdie(); 9235 9236 warn(gettext("Instance %s has no general property " 9237 "group; it will be marked disabled.\n"), exp_str); 9238 } 9239 9240 safe_setprop(n, enabled_attr, false); 9241 } else if (scf_pg_get_type(exp_pg, exp_str, exp_str_sz) < 0 || 9242 strcmp(exp_str, scf_group_framework) != 0) { 9243 if (g_verbose) { 9244 if (scf_pg_to_fmri(exp_pg, exp_str, exp_str_sz) < 0) 9245 scfdie(); 9246 9247 warn(gettext("Property group %s is not of type " 9248 "framework; the instance will be marked " 9249 "disabled.\n"), exp_str); 9250 } 9251 9252 safe_setprop(n, enabled_attr, false); 9253 } 9254 9255 /* property groups */ 9256 if (scf_iter_instance_pgs(exp_pg_iter, inst) < 0) 9257 scfdie(); 9258 9259 (void) memset(&elts, 0, sizeof (elts)); 9260 (void) memset(&template_elts, 0, sizeof (template_elts)); 9261 9262 while ((ret = scf_iter_next_pg(exp_pg_iter, exp_pg)) == 1) { 9263 uint32_t pgflags; 9264 9265 if (scf_pg_get_flags(exp_pg, &pgflags) != 0) 9266 scfdie(); 9267 9268 if (pgflags & SCF_PG_FLAG_NONPERSISTENT) 9269 continue; 9270 9271 if (scf_pg_get_type(exp_pg, exp_str, exp_str_sz) < 0) 9272 scfdie(); 9273 9274 if (strcmp(exp_str, SCF_GROUP_DEPENDENCY) == 0) { 9275 export_dependency(exp_pg, &elts); 9276 continue; 9277 } else if (strcmp(exp_str, SCF_GROUP_METHOD) == 0) { 9278 export_method(exp_pg, &elts); 9279 continue; 9280 } else if (strcmp(exp_str, scf_group_framework) == 0) { 9281 if (scf_pg_get_name(exp_pg, exp_str, 9282 max_scf_name_len + 1) < 0) 9283 scfdie(); 9284 9285 if (strcmp(exp_str, scf_pg_general) == 0) { 9286 export_inst_general(exp_pg, n, &elts); 9287 continue; 9288 } else if (strcmp(exp_str, SCF_PG_METHOD_CONTEXT) == 9289 0) { 9290 export_method_context(exp_pg, &elts); 9291 continue; 9292 } else if (strcmp(exp_str, SCF_PG_DEPENDENTS) == 0) { 9293 export_dependents(exp_pg, &elts); 9294 continue; 9295 } 9296 } else if (strcmp(exp_str, SCF_GROUP_TEMPLATE) == 0) { 9297 export_template(exp_pg, &elts, &template_elts); 9298 continue; 9299 } 9300 9301 /* Ordinary pg. */ 9302 export_pg(exp_pg, &elts, flags); 9303 } 9304 if (ret == -1) 9305 scfdie(); 9306 9307 if (template_elts.common_name != NULL) { 9308 elts.template = xmlNewNode(NULL, (xmlChar *)"template"); 9309 (void) xmlAddChild(elts.template, template_elts.common_name); 9310 (void) xmlAddChild(elts.template, template_elts.description); 9311 (void) xmlAddChild(elts.template, template_elts.documentation); 9312 } else { 9313 xmlFreeNode(template_elts.description); 9314 xmlFreeNode(template_elts.documentation); 9315 } 9316 9317 if (isdefault && elts.restarter == NULL && 9318 elts.dependencies == NULL && elts.method_context == NULL && 9319 elts.exec_methods == NULL && elts.property_groups == NULL && 9320 elts.template == NULL) { 9321 xmlChar *eval; 9322 9323 /* This is a default instance */ 9324 eval = xmlGetProp(n, (xmlChar *)enabled_attr); 9325 9326 xmlFreeNode(n); 9327 9328 n = xmlNewNode(NULL, (xmlChar *)"create_default_instance"); 9329 if (n == NULL) 9330 uu_die(emsg_create_xml); 9331 9332 safe_setprop(n, enabled_attr, (char *)eval); 9333 xmlFree(eval); 9334 9335 selts->create_default_instance = n; 9336 } else { 9337 /* Assemble the children in order. */ 9338 (void) xmlAddChild(n, elts.restarter); 9339 (void) xmlAddChildList(n, elts.dependencies); 9340 (void) xmlAddChildList(n, elts.dependents); 9341 (void) xmlAddChild(n, elts.method_context); 9342 (void) xmlAddChildList(n, elts.exec_methods); 9343 (void) xmlAddChildList(n, elts.property_groups); 9344 (void) xmlAddChild(n, elts.template); 9345 9346 if (selts->instances == NULL) 9347 selts->instances = n; 9348 else 9349 (void) xmlAddSibling(selts->instances, n); 9350 } 9351 } 9352 9353 /* 9354 * Return a service element for the given service. 9355 */ 9356 static xmlNodePtr 9357 export_service(scf_service_t *svc, int flags) 9358 { 9359 xmlNodePtr snode; 9360 struct entity_elts elts; 9361 struct template_elts template_elts; 9362 int ret; 9363 9364 snode = xmlNewNode(NULL, (xmlChar *)"service"); 9365 if (snode == NULL) 9366 uu_die(emsg_create_xml); 9367 9368 /* Get & set name attribute */ 9369 if (scf_service_get_name(svc, exp_str, max_scf_name_len + 1) < 0) 9370 scfdie(); 9371 safe_setprop(snode, name_attr, exp_str); 9372 9373 safe_setprop(snode, type_attr, "service"); 9374 safe_setprop(snode, "version", "0"); 9375 9376 /* Acquire child elements. */ 9377 if (scf_iter_service_pgs(exp_pg_iter, svc) != SCF_SUCCESS) 9378 scfdie(); 9379 9380 (void) memset(&elts, 0, sizeof (elts)); 9381 (void) memset(&template_elts, 0, sizeof (template_elts)); 9382 9383 while ((ret = scf_iter_next_pg(exp_pg_iter, exp_pg)) == 1) { 9384 uint32_t pgflags; 9385 9386 if (scf_pg_get_flags(exp_pg, &pgflags) != 0) 9387 scfdie(); 9388 9389 if (pgflags & SCF_PG_FLAG_NONPERSISTENT) 9390 continue; 9391 9392 if (scf_pg_get_type(exp_pg, exp_str, exp_str_sz) < 0) 9393 scfdie(); 9394 9395 if (strcmp(exp_str, SCF_GROUP_DEPENDENCY) == 0) { 9396 export_dependency(exp_pg, &elts); 9397 continue; 9398 } else if (strcmp(exp_str, SCF_GROUP_METHOD) == 0) { 9399 export_method(exp_pg, &elts); 9400 continue; 9401 } else if (strcmp(exp_str, scf_group_framework) == 0) { 9402 if (scf_pg_get_name(exp_pg, exp_str, 9403 max_scf_name_len + 1) < 0) 9404 scfdie(); 9405 9406 if (strcmp(exp_str, scf_pg_general) == 0) { 9407 export_svc_general(exp_pg, &elts); 9408 continue; 9409 } else if (strcmp(exp_str, SCF_PG_METHOD_CONTEXT) == 9410 0) { 9411 export_method_context(exp_pg, &elts); 9412 continue; 9413 } else if (strcmp(exp_str, SCF_PG_DEPENDENTS) == 0) { 9414 export_dependents(exp_pg, &elts); 9415 continue; 9416 } else if (strcmp(exp_str, SCF_PG_MANIFESTFILES) == 0) { 9417 continue; 9418 } 9419 } else if (strcmp(exp_str, SCF_GROUP_TEMPLATE) == 0) { 9420 export_template(exp_pg, &elts, &template_elts); 9421 continue; 9422 } 9423 9424 export_pg(exp_pg, &elts, flags); 9425 } 9426 if (ret == -1) 9427 scfdie(); 9428 9429 if (template_elts.common_name != NULL) { 9430 elts.template = xmlNewNode(NULL, (xmlChar *)"template"); 9431 (void) xmlAddChild(elts.template, template_elts.common_name); 9432 (void) xmlAddChild(elts.template, template_elts.description); 9433 (void) xmlAddChild(elts.template, template_elts.documentation); 9434 } else { 9435 xmlFreeNode(template_elts.description); 9436 xmlFreeNode(template_elts.documentation); 9437 } 9438 9439 /* Iterate instances */ 9440 if (scf_iter_service_instances(exp_inst_iter, svc) != SCF_SUCCESS) 9441 scfdie(); 9442 9443 while ((ret = scf_iter_next_instance(exp_inst_iter, exp_inst)) == 1) 9444 export_instance(exp_inst, &elts, flags); 9445 if (ret == -1) 9446 scfdie(); 9447 9448 /* Now add all of the accumulated elements in order. */ 9449 (void) xmlAddChild(snode, elts.create_default_instance); 9450 (void) xmlAddChild(snode, elts.single_instance); 9451 (void) xmlAddChild(snode, elts.restarter); 9452 (void) xmlAddChildList(snode, elts.dependencies); 9453 (void) xmlAddChildList(snode, elts.dependents); 9454 (void) xmlAddChild(snode, elts.method_context); 9455 (void) xmlAddChildList(snode, elts.exec_methods); 9456 (void) xmlAddChildList(snode, elts.property_groups); 9457 (void) xmlAddChildList(snode, elts.instances); 9458 (void) xmlAddChild(snode, elts.stability); 9459 (void) xmlAddChild(snode, elts.template); 9460 9461 return (snode); 9462 } 9463 9464 static int 9465 export_callback(void *data, scf_walkinfo_t *wip) 9466 { 9467 FILE *f; 9468 xmlDocPtr doc; 9469 xmlNodePtr sb; 9470 int result; 9471 struct export_args *argsp = (struct export_args *)data; 9472 9473 if ((exp_inst = scf_instance_create(g_hndl)) == NULL || 9474 (exp_pg = scf_pg_create(g_hndl)) == NULL || 9475 (exp_prop = scf_property_create(g_hndl)) == NULL || 9476 (exp_val = scf_value_create(g_hndl)) == NULL || 9477 (exp_inst_iter = scf_iter_create(g_hndl)) == NULL || 9478 (exp_pg_iter = scf_iter_create(g_hndl)) == NULL || 9479 (exp_prop_iter = scf_iter_create(g_hndl)) == NULL || 9480 (exp_val_iter = scf_iter_create(g_hndl)) == NULL) 9481 scfdie(); 9482 9483 exp_str_sz = max_scf_len + 1; 9484 exp_str = safe_malloc(exp_str_sz); 9485 9486 if (argsp->filename != NULL) { 9487 errno = 0; 9488 f = fopen(argsp->filename, "wb"); 9489 if (f == NULL) { 9490 if (errno == 0) 9491 uu_die(gettext("Could not open \"%s\": no free " 9492 "stdio streams.\n"), argsp->filename); 9493 else 9494 uu_die(gettext("Could not open \"%s\""), 9495 argsp->filename); 9496 } 9497 } else 9498 f = stdout; 9499 9500 doc = xmlNewDoc((xmlChar *)"1.0"); 9501 if (doc == NULL) 9502 uu_die(gettext("Could not create XML document.\n")); 9503 9504 if (xmlCreateIntSubset(doc, (xmlChar *)"service_bundle", NULL, 9505 (xmlChar *)MANIFEST_DTD_PATH) == NULL) 9506 uu_die(emsg_create_xml); 9507 9508 sb = xmlNewNode(NULL, (xmlChar *)"service_bundle"); 9509 if (sb == NULL) 9510 uu_die(emsg_create_xml); 9511 safe_setprop(sb, type_attr, "manifest"); 9512 safe_setprop(sb, name_attr, "export"); 9513 (void) xmlAddSibling(doc->children, sb); 9514 9515 (void) xmlAddChild(sb, export_service(wip->svc, argsp->flags)); 9516 9517 result = write_service_bundle(doc, f); 9518 9519 free(exp_str); 9520 scf_iter_destroy(exp_val_iter); 9521 scf_iter_destroy(exp_prop_iter); 9522 scf_iter_destroy(exp_pg_iter); 9523 scf_iter_destroy(exp_inst_iter); 9524 scf_value_destroy(exp_val); 9525 scf_property_destroy(exp_prop); 9526 scf_pg_destroy(exp_pg); 9527 scf_instance_destroy(exp_inst); 9528 9529 xmlFreeDoc(doc); 9530 9531 if (f != stdout) 9532 (void) fclose(f); 9533 9534 return (result); 9535 } 9536 9537 /* 9538 * Get the service named by fmri, build an XML tree which represents it, and 9539 * dump it into filename (or stdout if filename is NULL). 9540 */ 9541 int 9542 lscf_service_export(char *fmri, const char *filename, int flags) 9543 { 9544 struct export_args args; 9545 int ret, err; 9546 9547 lscf_prep_hndl(); 9548 9549 bzero(&args, sizeof (args)); 9550 args.filename = filename; 9551 args.flags = flags; 9552 9553 err = 0; 9554 if ((ret = scf_walk_fmri(g_hndl, 1, (char **)&fmri, 9555 SCF_WALK_SERVICE | SCF_WALK_NOINSTANCE, export_callback, 9556 &args, &err, semerr)) != 0) { 9557 if (ret != -1) 9558 semerr(gettext("Failed to walk instances: %s\n"), 9559 scf_strerror(ret)); 9560 return (-1); 9561 } 9562 9563 /* 9564 * Error message has already been printed. 9565 */ 9566 if (err != 0) 9567 return (-1); 9568 9569 return (0); 9570 } 9571 9572 9573 /* 9574 * Archive 9575 */ 9576 9577 static xmlNodePtr 9578 make_archive(int flags) 9579 { 9580 xmlNodePtr sb; 9581 scf_scope_t *scope; 9582 scf_service_t *svc; 9583 scf_iter_t *iter; 9584 int r; 9585 9586 if ((scope = scf_scope_create(g_hndl)) == NULL || 9587 (svc = scf_service_create(g_hndl)) == NULL || 9588 (iter = scf_iter_create(g_hndl)) == NULL || 9589 (exp_inst = scf_instance_create(g_hndl)) == NULL || 9590 (exp_pg = scf_pg_create(g_hndl)) == NULL || 9591 (exp_prop = scf_property_create(g_hndl)) == NULL || 9592 (exp_val = scf_value_create(g_hndl)) == NULL || 9593 (exp_inst_iter = scf_iter_create(g_hndl)) == NULL || 9594 (exp_pg_iter = scf_iter_create(g_hndl)) == NULL || 9595 (exp_prop_iter = scf_iter_create(g_hndl)) == NULL || 9596 (exp_val_iter = scf_iter_create(g_hndl)) == NULL) 9597 scfdie(); 9598 9599 exp_str_sz = max_scf_len + 1; 9600 exp_str = safe_malloc(exp_str_sz); 9601 9602 sb = xmlNewNode(NULL, (xmlChar *)"service_bundle"); 9603 if (sb == NULL) 9604 uu_die(emsg_create_xml); 9605 safe_setprop(sb, type_attr, "archive"); 9606 safe_setprop(sb, name_attr, "none"); 9607 9608 if (scf_handle_get_scope(g_hndl, SCF_SCOPE_LOCAL, scope) != 0) 9609 scfdie(); 9610 if (scf_iter_scope_services(iter, scope) != 0) 9611 scfdie(); 9612 9613 for (;;) { 9614 r = scf_iter_next_service(iter, svc); 9615 if (r == 0) 9616 break; 9617 if (r != 1) 9618 scfdie(); 9619 9620 if (scf_service_get_name(svc, exp_str, 9621 max_scf_name_len + 1) < 0) 9622 scfdie(); 9623 9624 if (strcmp(exp_str, SCF_LEGACY_SERVICE) == 0) 9625 continue; 9626 9627 xmlAddChild(sb, export_service(svc, flags)); 9628 } 9629 9630 free(exp_str); 9631 9632 scf_iter_destroy(exp_val_iter); 9633 scf_iter_destroy(exp_prop_iter); 9634 scf_iter_destroy(exp_pg_iter); 9635 scf_iter_destroy(exp_inst_iter); 9636 scf_value_destroy(exp_val); 9637 scf_property_destroy(exp_prop); 9638 scf_pg_destroy(exp_pg); 9639 scf_instance_destroy(exp_inst); 9640 scf_iter_destroy(iter); 9641 scf_service_destroy(svc); 9642 scf_scope_destroy(scope); 9643 9644 return (sb); 9645 } 9646 9647 int 9648 lscf_archive(const char *filename, int flags) 9649 { 9650 FILE *f; 9651 xmlDocPtr doc; 9652 int result; 9653 9654 lscf_prep_hndl(); 9655 9656 if (filename != NULL) { 9657 errno = 0; 9658 f = fopen(filename, "wb"); 9659 if (f == NULL) { 9660 if (errno == 0) 9661 uu_die(gettext("Could not open \"%s\": no free " 9662 "stdio streams.\n"), filename); 9663 else 9664 uu_die(gettext("Could not open \"%s\""), 9665 filename); 9666 } 9667 } else 9668 f = stdout; 9669 9670 doc = xmlNewDoc((xmlChar *)"1.0"); 9671 if (doc == NULL) 9672 uu_die(gettext("Could not create XML document.\n")); 9673 9674 if (xmlCreateIntSubset(doc, (xmlChar *)"service_bundle", NULL, 9675 (xmlChar *)MANIFEST_DTD_PATH) == NULL) 9676 uu_die(emsg_create_xml); 9677 9678 (void) xmlAddSibling(doc->children, make_archive(flags)); 9679 9680 result = write_service_bundle(doc, f); 9681 9682 xmlFreeDoc(doc); 9683 9684 if (f != stdout) 9685 (void) fclose(f); 9686 9687 return (result); 9688 } 9689 9690 9691 /* 9692 * "Extract" a profile. 9693 */ 9694 int 9695 lscf_profile_extract(const char *filename) 9696 { 9697 FILE *f; 9698 xmlDocPtr doc; 9699 xmlNodePtr sb, snode, inode; 9700 scf_scope_t *scope; 9701 scf_service_t *svc; 9702 scf_instance_t *inst; 9703 scf_propertygroup_t *pg; 9704 scf_property_t *prop; 9705 scf_value_t *val; 9706 scf_iter_t *siter, *iiter; 9707 int r, s; 9708 char *namebuf; 9709 uint8_t b; 9710 int result; 9711 9712 lscf_prep_hndl(); 9713 9714 if (filename != NULL) { 9715 errno = 0; 9716 f = fopen(filename, "wb"); 9717 if (f == NULL) { 9718 if (errno == 0) 9719 uu_die(gettext("Could not open \"%s\": no " 9720 "free stdio streams.\n"), filename); 9721 else 9722 uu_die(gettext("Could not open \"%s\""), 9723 filename); 9724 } 9725 } else 9726 f = stdout; 9727 9728 doc = xmlNewDoc((xmlChar *)"1.0"); 9729 if (doc == NULL) 9730 uu_die(gettext("Could not create XML document.\n")); 9731 9732 if (xmlCreateIntSubset(doc, (xmlChar *)"service_bundle", NULL, 9733 (xmlChar *)MANIFEST_DTD_PATH) == NULL) 9734 uu_die(emsg_create_xml); 9735 9736 sb = xmlNewNode(NULL, (xmlChar *)"service_bundle"); 9737 if (sb == NULL) 9738 uu_die(emsg_create_xml); 9739 safe_setprop(sb, type_attr, "profile"); 9740 safe_setprop(sb, name_attr, "extract"); 9741 (void) xmlAddSibling(doc->children, sb); 9742 9743 if ((scope = scf_scope_create(g_hndl)) == NULL || 9744 (svc = scf_service_create(g_hndl)) == NULL || 9745 (inst = scf_instance_create(g_hndl)) == NULL || 9746 (pg = scf_pg_create(g_hndl)) == NULL || 9747 (prop = scf_property_create(g_hndl)) == NULL || 9748 (val = scf_value_create(g_hndl)) == NULL || 9749 (siter = scf_iter_create(g_hndl)) == NULL || 9750 (iiter = scf_iter_create(g_hndl)) == NULL) 9751 scfdie(); 9752 9753 if (scf_handle_get_local_scope(g_hndl, scope) != SCF_SUCCESS) 9754 scfdie(); 9755 9756 if (scf_iter_scope_services(siter, scope) != SCF_SUCCESS) 9757 scfdie(); 9758 9759 namebuf = safe_malloc(max_scf_name_len + 1); 9760 9761 while ((r = scf_iter_next_service(siter, svc)) == 1) { 9762 if (scf_iter_service_instances(iiter, svc) != SCF_SUCCESS) 9763 scfdie(); 9764 9765 snode = xmlNewNode(NULL, (xmlChar *)"service"); 9766 if (snode == NULL) 9767 uu_die(emsg_create_xml); 9768 9769 if (scf_service_get_name(svc, namebuf, max_scf_name_len + 1) < 9770 0) 9771 scfdie(); 9772 9773 safe_setprop(snode, name_attr, namebuf); 9774 9775 safe_setprop(snode, type_attr, "service"); 9776 safe_setprop(snode, "version", "0"); 9777 9778 while ((s = scf_iter_next_instance(iiter, inst)) == 1) { 9779 if (scf_instance_get_pg(inst, scf_pg_general, pg) != 9780 SCF_SUCCESS) { 9781 if (scf_error() != SCF_ERROR_NOT_FOUND) 9782 scfdie(); 9783 9784 if (g_verbose) { 9785 ssize_t len; 9786 char *fmri; 9787 9788 len = 9789 scf_instance_to_fmri(inst, NULL, 0); 9790 if (len < 0) 9791 scfdie(); 9792 9793 fmri = safe_malloc(len + 1); 9794 9795 if (scf_instance_to_fmri(inst, fmri, 9796 len + 1) < 0) 9797 scfdie(); 9798 9799 warn("Instance %s has no \"%s\" " 9800 "property group.\n", fmri, 9801 scf_pg_general); 9802 9803 free(fmri); 9804 } 9805 9806 continue; 9807 } 9808 9809 if (pg_get_prop(pg, scf_property_enabled, prop) != 0 || 9810 prop_check_type(prop, SCF_TYPE_BOOLEAN) != 0 || 9811 prop_get_val(prop, val) != 0) 9812 continue; 9813 9814 inode = xmlNewChild(snode, NULL, (xmlChar *)"instance", 9815 NULL); 9816 if (inode == NULL) 9817 uu_die(emsg_create_xml); 9818 9819 if (scf_instance_get_name(inst, namebuf, 9820 max_scf_name_len + 1) < 0) 9821 scfdie(); 9822 9823 safe_setprop(inode, name_attr, namebuf); 9824 9825 if (scf_value_get_boolean(val, &b) != SCF_SUCCESS) 9826 scfdie(); 9827 9828 safe_setprop(inode, enabled_attr, b ? true : false); 9829 } 9830 if (s < 0) 9831 scfdie(); 9832 9833 if (snode->children != NULL) 9834 xmlAddChild(sb, snode); 9835 else 9836 xmlFreeNode(snode); 9837 } 9838 if (r < 0) 9839 scfdie(); 9840 9841 free(namebuf); 9842 9843 result = write_service_bundle(doc, f); 9844 9845 xmlFreeDoc(doc); 9846 9847 if (f != stdout) 9848 (void) fclose(f); 9849 9850 return (result); 9851 } 9852 9853 9854 /* 9855 * Entity manipulation commands 9856 */ 9857 9858 /* 9859 * Entity selection. If no entity is selected, then the current scope is in 9860 * cur_scope, and cur_svc and cur_inst are NULL. When a service is selected, 9861 * only cur_inst is NULL, and when an instance is selected, none are NULL. 9862 * When the snaplevel of a snapshot is selected, cur_level, cur_snap, and 9863 * cur_inst will be non-NULL. 9864 */ 9865 9866 /* Returns 1 if maybe absolute fmri, 0 on success (dies on failure) */ 9867 static int 9868 select_inst(const char *name) 9869 { 9870 scf_instance_t *inst; 9871 scf_error_t err; 9872 9873 assert(cur_svc != NULL); 9874 9875 inst = scf_instance_create(g_hndl); 9876 if (inst == NULL) 9877 scfdie(); 9878 9879 if (scf_service_get_instance(cur_svc, name, inst) == SCF_SUCCESS) { 9880 cur_inst = inst; 9881 return (0); 9882 } 9883 9884 err = scf_error(); 9885 if (err != SCF_ERROR_NOT_FOUND && err != SCF_ERROR_INVALID_ARGUMENT) 9886 scfdie(); 9887 9888 scf_instance_destroy(inst); 9889 return (1); 9890 } 9891 9892 /* Returns as above. */ 9893 static int 9894 select_svc(const char *name) 9895 { 9896 scf_service_t *svc; 9897 scf_error_t err; 9898 9899 assert(cur_scope != NULL); 9900 9901 svc = scf_service_create(g_hndl); 9902 if (svc == NULL) 9903 scfdie(); 9904 9905 if (scf_scope_get_service(cur_scope, name, svc) == SCF_SUCCESS) { 9906 cur_svc = svc; 9907 return (0); 9908 } 9909 9910 err = scf_error(); 9911 if (err != SCF_ERROR_NOT_FOUND && err != SCF_ERROR_INVALID_ARGUMENT) 9912 scfdie(); 9913 9914 scf_service_destroy(svc); 9915 return (1); 9916 } 9917 9918 /* ARGSUSED */ 9919 static int 9920 select_callback(void *unused, scf_walkinfo_t *wip) 9921 { 9922 scf_instance_t *inst; 9923 scf_service_t *svc; 9924 scf_scope_t *scope; 9925 9926 if (wip->inst != NULL) { 9927 if ((scope = scf_scope_create(g_hndl)) == NULL || 9928 (svc = scf_service_create(g_hndl)) == NULL || 9929 (inst = scf_instance_create(g_hndl)) == NULL) 9930 scfdie(); 9931 9932 if (scf_handle_decode_fmri(g_hndl, wip->fmri, scope, svc, 9933 inst, NULL, NULL, SCF_DECODE_FMRI_EXACT) != SCF_SUCCESS) 9934 scfdie(); 9935 } else { 9936 assert(wip->svc != NULL); 9937 9938 if ((scope = scf_scope_create(g_hndl)) == NULL || 9939 (svc = scf_service_create(g_hndl)) == NULL) 9940 scfdie(); 9941 9942 if (scf_handle_decode_fmri(g_hndl, wip->fmri, scope, svc, 9943 NULL, NULL, NULL, SCF_DECODE_FMRI_EXACT) != SCF_SUCCESS) 9944 scfdie(); 9945 9946 inst = NULL; 9947 } 9948 9949 /* Clear out the current selection */ 9950 assert(cur_scope != NULL); 9951 scf_scope_destroy(cur_scope); 9952 scf_service_destroy(cur_svc); 9953 scf_instance_destroy(cur_inst); 9954 9955 cur_scope = scope; 9956 cur_svc = svc; 9957 cur_inst = inst; 9958 9959 return (0); 9960 } 9961 9962 static int 9963 validate_callback(void *fmri_p, scf_walkinfo_t *wip) 9964 { 9965 char **fmri = fmri_p; 9966 9967 *fmri = strdup(wip->fmri); 9968 if (*fmri == NULL) 9969 uu_die(gettext("Out of memory.\n")); 9970 9971 return (0); 9972 } 9973 9974 /* 9975 * validate [fmri] 9976 * Perform the validation of an FMRI instance. 9977 */ 9978 void 9979 lscf_validate_fmri(const char *fmri) 9980 { 9981 int ret = 0; 9982 size_t inst_sz; 9983 char *inst_fmri = NULL; 9984 scf_tmpl_errors_t *errs = NULL; 9985 char *snapbuf = NULL; 9986 9987 lscf_prep_hndl(); 9988 9989 if (fmri == NULL) { 9990 inst_sz = max_scf_fmri_len + 1; 9991 inst_fmri = safe_malloc(inst_sz); 9992 9993 if (cur_snap != NULL) { 9994 snapbuf = safe_malloc(max_scf_name_len + 1); 9995 if (scf_snapshot_get_name(cur_snap, snapbuf, 9996 max_scf_name_len + 1) < 0) 9997 scfdie(); 9998 } 9999 if (cur_inst == NULL) { 10000 semerr(gettext("No instance selected\n")); 10001 goto cleanup; 10002 } else if (scf_instance_to_fmri(cur_inst, inst_fmri, 10003 inst_sz) >= inst_sz) { 10004 /* sanity check. Should never get here */ 10005 uu_die(gettext("Unexpected error! file %s, line %d\n"), 10006 __FILE__, __LINE__); 10007 } 10008 } else { 10009 scf_error_t scf_err; 10010 int err = 0; 10011 10012 if ((scf_err = scf_walk_fmri(g_hndl, 1, (char **)&fmri, 0, 10013 validate_callback, &inst_fmri, &err, semerr)) != 0) { 10014 uu_warn("Failed to walk instances: %s\n", 10015 scf_strerror(scf_err)); 10016 goto cleanup; 10017 } 10018 if (err != 0) { 10019 /* error message displayed by scf_walk_fmri */ 10020 goto cleanup; 10021 } 10022 } 10023 10024 ret = scf_tmpl_validate_fmri(g_hndl, inst_fmri, snapbuf, &errs, 10025 SCF_TMPL_VALIDATE_FLAG_CURRENT); 10026 if (ret == -1) { 10027 if (scf_error() == SCF_ERROR_TEMPLATE_INVALID) { 10028 warn(gettext("Template data for %s is invalid. " 10029 "Consider reverting to a previous snapshot or " 10030 "restoring original configuration.\n"), inst_fmri); 10031 } else { 10032 uu_warn("%s: %s\n", 10033 gettext("Error validating the instance"), 10034 scf_strerror(scf_error())); 10035 } 10036 } else if (ret == 1 && errs != NULL) { 10037 scf_tmpl_error_t *err = NULL; 10038 char *msg; 10039 size_t len = 256; /* initial error buffer size */ 10040 int flag = (est->sc_cmd_flags & SC_CMD_IACTIVE) ? 10041 SCF_TMPL_STRERROR_HUMAN : 0; 10042 10043 msg = safe_malloc(len); 10044 10045 while ((err = scf_tmpl_next_error(errs)) != NULL) { 10046 int ret; 10047 10048 if ((ret = scf_tmpl_strerror(err, msg, len, 10049 flag)) >= len) { 10050 len = ret + 1; 10051 msg = realloc(msg, len); 10052 if (msg == NULL) 10053 uu_die(gettext( 10054 "Out of memory.\n")); 10055 (void) scf_tmpl_strerror(err, msg, len, 10056 flag); 10057 } 10058 (void) fprintf(stderr, "%s\n", msg); 10059 } 10060 if (msg != NULL) 10061 free(msg); 10062 } 10063 if (errs != NULL) 10064 scf_tmpl_errors_destroy(errs); 10065 10066 cleanup: 10067 free(inst_fmri); 10068 free(snapbuf); 10069 } 10070 10071 static void 10072 lscf_validate_file(const char *filename) 10073 { 10074 tmpl_errors_t *errs; 10075 10076 bundle_t *b = internal_bundle_new(); 10077 if (lxml_get_bundle_file(b, filename, SVCCFG_OP_IMPORT) == 0) { 10078 if (tmpl_validate_bundle(b, &errs) != TVS_SUCCESS) { 10079 tmpl_errors_print(stderr, errs, ""); 10080 semerr(gettext("Validation failed.\n")); 10081 } 10082 tmpl_errors_destroy(errs); 10083 } 10084 (void) internal_bundle_free(b); 10085 } 10086 10087 /* 10088 * validate [fmri|file] 10089 */ 10090 void 10091 lscf_validate(const char *arg) 10092 { 10093 const char *str; 10094 10095 if (strncmp(arg, SCF_FMRI_FILE_PREFIX, 10096 sizeof (SCF_FMRI_FILE_PREFIX) - 1) == 0) { 10097 str = arg + sizeof (SCF_FMRI_FILE_PREFIX) - 1; 10098 lscf_validate_file(str); 10099 } else if (strncmp(arg, SCF_FMRI_SVC_PREFIX, 10100 sizeof (SCF_FMRI_SVC_PREFIX) - 1) == 0) { 10101 str = arg + sizeof (SCF_FMRI_SVC_PREFIX) - 1; 10102 lscf_validate_fmri(str); 10103 } else if (access(arg, R_OK | F_OK) == 0) { 10104 lscf_validate_file(arg); 10105 } else { 10106 lscf_validate_fmri(arg); 10107 } 10108 } 10109 10110 void 10111 lscf_select(const char *fmri) 10112 { 10113 int ret, err; 10114 10115 lscf_prep_hndl(); 10116 10117 if (cur_snap != NULL) { 10118 struct snaplevel *elt; 10119 char *buf; 10120 10121 /* Error unless name is that of the next level. */ 10122 elt = uu_list_next(cur_levels, cur_elt); 10123 if (elt == NULL) { 10124 semerr(gettext("No children.\n")); 10125 return; 10126 } 10127 10128 buf = safe_malloc(max_scf_name_len + 1); 10129 10130 if (scf_snaplevel_get_instance_name(elt->sl, buf, 10131 max_scf_name_len + 1) < 0) 10132 scfdie(); 10133 10134 if (strcmp(buf, fmri) != 0) { 10135 semerr(gettext("No such child.\n")); 10136 free(buf); 10137 return; 10138 } 10139 10140 free(buf); 10141 10142 cur_elt = elt; 10143 cur_level = elt->sl; 10144 return; 10145 } 10146 10147 /* 10148 * Special case for 'svc:', which takes the user to the scope level. 10149 */ 10150 if (strcmp(fmri, "svc:") == 0) { 10151 scf_instance_destroy(cur_inst); 10152 scf_service_destroy(cur_svc); 10153 cur_inst = NULL; 10154 cur_svc = NULL; 10155 return; 10156 } 10157 10158 /* 10159 * Special case for ':properties'. This appears as part of 'list' but 10160 * can't be selected. Give a more helpful error message in this case. 10161 */ 10162 if (strcmp(fmri, ":properties") == 0) { 10163 semerr(gettext(":properties is not an entity. Try 'listprop' " 10164 "to list properties.\n")); 10165 return; 10166 } 10167 10168 /* 10169 * First try the argument as relative to the current selection. 10170 */ 10171 if (cur_inst != NULL) { 10172 /* EMPTY */; 10173 } else if (cur_svc != NULL) { 10174 if (select_inst(fmri) != 1) 10175 return; 10176 } else { 10177 if (select_svc(fmri) != 1) 10178 return; 10179 } 10180 10181 err = 0; 10182 if ((ret = scf_walk_fmri(g_hndl, 1, (char **)&fmri, SCF_WALK_SERVICE, 10183 select_callback, NULL, &err, semerr)) != 0) { 10184 semerr(gettext("Failed to walk instances: %s\n"), 10185 scf_strerror(ret)); 10186 } 10187 } 10188 10189 void 10190 lscf_unselect(void) 10191 { 10192 lscf_prep_hndl(); 10193 10194 if (cur_snap != NULL) { 10195 struct snaplevel *elt; 10196 10197 elt = uu_list_prev(cur_levels, cur_elt); 10198 if (elt == NULL) { 10199 semerr(gettext("No parent levels.\n")); 10200 } else { 10201 cur_elt = elt; 10202 cur_level = elt->sl; 10203 } 10204 } else if (cur_inst != NULL) { 10205 scf_instance_destroy(cur_inst); 10206 cur_inst = NULL; 10207 } else if (cur_svc != NULL) { 10208 scf_service_destroy(cur_svc); 10209 cur_svc = NULL; 10210 } else { 10211 semerr(gettext("Cannot unselect at scope level.\n")); 10212 } 10213 } 10214 10215 /* 10216 * Return the FMRI of the current selection, for the prompt. 10217 */ 10218 void 10219 lscf_get_selection_str(char *buf, size_t bufsz) 10220 { 10221 char *cp; 10222 ssize_t fmrilen, szret; 10223 boolean_t deleted = B_FALSE; 10224 10225 if (g_hndl == NULL) { 10226 (void) strlcpy(buf, "svc:", bufsz); 10227 return; 10228 } 10229 10230 if (cur_level != NULL) { 10231 assert(cur_snap != NULL); 10232 10233 /* [ snapshot ] FMRI [: instance ] */ 10234 assert(bufsz >= 1 + max_scf_name_len + 1 + max_scf_fmri_len 10235 + 2 + max_scf_name_len + 1 + 1); 10236 10237 buf[0] = '['; 10238 10239 szret = scf_snapshot_get_name(cur_snap, buf + 1, 10240 max_scf_name_len + 1); 10241 if (szret < 0) { 10242 if (scf_error() != SCF_ERROR_DELETED) 10243 scfdie(); 10244 10245 goto snap_deleted; 10246 } 10247 10248 (void) strcat(buf, "]svc:/"); 10249 10250 cp = strchr(buf, '\0'); 10251 10252 szret = scf_snaplevel_get_service_name(cur_level, cp, 10253 max_scf_name_len + 1); 10254 if (szret < 0) { 10255 if (scf_error() != SCF_ERROR_DELETED) 10256 scfdie(); 10257 10258 goto snap_deleted; 10259 } 10260 10261 cp = strchr(cp, '\0'); 10262 10263 if (snaplevel_is_instance(cur_level)) { 10264 *cp++ = ':'; 10265 10266 if (scf_snaplevel_get_instance_name(cur_level, cp, 10267 max_scf_name_len + 1) < 0) { 10268 if (scf_error() != SCF_ERROR_DELETED) 10269 scfdie(); 10270 10271 goto snap_deleted; 10272 } 10273 } else { 10274 *cp++ = '['; 10275 *cp++ = ':'; 10276 10277 if (scf_instance_get_name(cur_inst, cp, 10278 max_scf_name_len + 1) < 0) { 10279 if (scf_error() != SCF_ERROR_DELETED) 10280 scfdie(); 10281 10282 goto snap_deleted; 10283 } 10284 10285 (void) strcat(buf, "]"); 10286 } 10287 10288 return; 10289 10290 snap_deleted: 10291 deleted = B_TRUE; 10292 free(buf); 10293 unselect_cursnap(); 10294 } 10295 10296 assert(cur_snap == NULL); 10297 10298 if (cur_inst != NULL) { 10299 assert(cur_svc != NULL); 10300 assert(cur_scope != NULL); 10301 10302 fmrilen = scf_instance_to_fmri(cur_inst, buf, bufsz); 10303 if (fmrilen >= 0) { 10304 assert(fmrilen < bufsz); 10305 if (deleted) 10306 warn(emsg_deleted); 10307 return; 10308 } 10309 10310 if (scf_error() != SCF_ERROR_DELETED) 10311 scfdie(); 10312 10313 deleted = B_TRUE; 10314 10315 scf_instance_destroy(cur_inst); 10316 cur_inst = NULL; 10317 } 10318 10319 if (cur_svc != NULL) { 10320 assert(cur_scope != NULL); 10321 10322 szret = scf_service_to_fmri(cur_svc, buf, bufsz); 10323 if (szret >= 0) { 10324 assert(szret < bufsz); 10325 if (deleted) 10326 warn(emsg_deleted); 10327 return; 10328 } 10329 10330 if (scf_error() != SCF_ERROR_DELETED) 10331 scfdie(); 10332 10333 deleted = B_TRUE; 10334 scf_service_destroy(cur_svc); 10335 cur_svc = NULL; 10336 } 10337 10338 assert(cur_scope != NULL); 10339 fmrilen = scf_scope_to_fmri(cur_scope, buf, bufsz); 10340 10341 if (fmrilen < 0) 10342 scfdie(); 10343 10344 assert(fmrilen < bufsz); 10345 if (deleted) 10346 warn(emsg_deleted); 10347 } 10348 10349 /* 10350 * Entity listing. Entities and colon namespaces (e.g., :properties and 10351 * :statistics) are listed for the current selection. 10352 */ 10353 void 10354 lscf_list(const char *pattern) 10355 { 10356 scf_iter_t *iter; 10357 char *buf; 10358 int ret; 10359 10360 lscf_prep_hndl(); 10361 10362 if (cur_level != NULL) { 10363 struct snaplevel *elt; 10364 10365 (void) fputs(COLON_NAMESPACES, stdout); 10366 10367 elt = uu_list_next(cur_levels, cur_elt); 10368 if (elt == NULL) 10369 return; 10370 10371 /* 10372 * For now, we know that the next level is an instance. But 10373 * if we ever have multiple scopes, this could be complicated. 10374 */ 10375 buf = safe_malloc(max_scf_name_len + 1); 10376 if (scf_snaplevel_get_instance_name(elt->sl, buf, 10377 max_scf_name_len + 1) >= 0) { 10378 (void) puts(buf); 10379 } else { 10380 if (scf_error() != SCF_ERROR_DELETED) 10381 scfdie(); 10382 } 10383 10384 free(buf); 10385 10386 return; 10387 } 10388 10389 if (cur_inst != NULL) { 10390 (void) fputs(COLON_NAMESPACES, stdout); 10391 return; 10392 } 10393 10394 iter = scf_iter_create(g_hndl); 10395 if (iter == NULL) 10396 scfdie(); 10397 10398 buf = safe_malloc(max_scf_name_len + 1); 10399 10400 if (cur_svc != NULL) { 10401 /* List the instances in this service. */ 10402 scf_instance_t *inst; 10403 10404 inst = scf_instance_create(g_hndl); 10405 if (inst == NULL) 10406 scfdie(); 10407 10408 if (scf_iter_service_instances(iter, cur_svc) == 0) { 10409 safe_printf(COLON_NAMESPACES); 10410 10411 for (;;) { 10412 ret = scf_iter_next_instance(iter, inst); 10413 if (ret == 0) 10414 break; 10415 if (ret != 1) { 10416 if (scf_error() != SCF_ERROR_DELETED) 10417 scfdie(); 10418 10419 break; 10420 } 10421 10422 if (scf_instance_get_name(inst, buf, 10423 max_scf_name_len + 1) >= 0) { 10424 if (pattern == NULL || 10425 fnmatch(pattern, buf, 0) == 0) 10426 (void) puts(buf); 10427 } else { 10428 if (scf_error() != SCF_ERROR_DELETED) 10429 scfdie(); 10430 } 10431 } 10432 } else { 10433 if (scf_error() != SCF_ERROR_DELETED) 10434 scfdie(); 10435 } 10436 10437 scf_instance_destroy(inst); 10438 } else { 10439 /* List the services in this scope. */ 10440 scf_service_t *svc; 10441 10442 assert(cur_scope != NULL); 10443 10444 svc = scf_service_create(g_hndl); 10445 if (svc == NULL) 10446 scfdie(); 10447 10448 if (scf_iter_scope_services(iter, cur_scope) != SCF_SUCCESS) 10449 scfdie(); 10450 10451 for (;;) { 10452 ret = scf_iter_next_service(iter, svc); 10453 if (ret == 0) 10454 break; 10455 if (ret != 1) 10456 scfdie(); 10457 10458 if (scf_service_get_name(svc, buf, 10459 max_scf_name_len + 1) >= 0) { 10460 if (pattern == NULL || 10461 fnmatch(pattern, buf, 0) == 0) 10462 safe_printf("%s\n", buf); 10463 } else { 10464 if (scf_error() != SCF_ERROR_DELETED) 10465 scfdie(); 10466 } 10467 } 10468 10469 scf_service_destroy(svc); 10470 } 10471 10472 free(buf); 10473 scf_iter_destroy(iter); 10474 } 10475 10476 /* 10477 * Entity addition. Creates an empty entity in the current selection. 10478 */ 10479 void 10480 lscf_add(const char *name) 10481 { 10482 lscf_prep_hndl(); 10483 10484 if (cur_snap != NULL) { 10485 semerr(emsg_cant_modify_snapshots); 10486 } else if (cur_inst != NULL) { 10487 semerr(gettext("Cannot add entities to an instance.\n")); 10488 } else if (cur_svc != NULL) { 10489 10490 if (scf_service_add_instance(cur_svc, name, NULL) != 10491 SCF_SUCCESS) { 10492 switch (scf_error()) { 10493 case SCF_ERROR_INVALID_ARGUMENT: 10494 semerr(gettext("Invalid name.\n")); 10495 break; 10496 10497 case SCF_ERROR_EXISTS: 10498 semerr(gettext("Instance already exists.\n")); 10499 break; 10500 10501 case SCF_ERROR_PERMISSION_DENIED: 10502 semerr(emsg_permission_denied); 10503 break; 10504 10505 default: 10506 scfdie(); 10507 } 10508 } 10509 } else { 10510 assert(cur_scope != NULL); 10511 10512 if (scf_scope_add_service(cur_scope, name, NULL) != 10513 SCF_SUCCESS) { 10514 switch (scf_error()) { 10515 case SCF_ERROR_INVALID_ARGUMENT: 10516 semerr(gettext("Invalid name.\n")); 10517 break; 10518 10519 case SCF_ERROR_EXISTS: 10520 semerr(gettext("Service already exists.\n")); 10521 break; 10522 10523 case SCF_ERROR_PERMISSION_DENIED: 10524 semerr(emsg_permission_denied); 10525 break; 10526 10527 case SCF_ERROR_BACKEND_READONLY: 10528 semerr(emsg_read_only); 10529 break; 10530 10531 default: 10532 scfdie(); 10533 } 10534 } 10535 } 10536 } 10537 10538 /* return 1 if the entity has no persistent pgs, else return 0 */ 10539 static int 10540 entity_has_no_pgs(void *ent, int isservice) 10541 { 10542 scf_iter_t *iter = NULL; 10543 scf_propertygroup_t *pg = NULL; 10544 uint32_t flags; 10545 int err; 10546 int ret = 1; 10547 10548 if ((iter = scf_iter_create(g_hndl)) == NULL || 10549 (pg = scf_pg_create(g_hndl)) == NULL) 10550 scfdie(); 10551 10552 if (isservice) { 10553 if (scf_iter_service_pgs(iter, (scf_service_t *)ent) < 0) 10554 scfdie(); 10555 } else { 10556 if (scf_iter_instance_pgs(iter, (scf_instance_t *)ent) < 0) 10557 scfdie(); 10558 } 10559 10560 while ((err = scf_iter_next_pg(iter, pg)) == 1) { 10561 if (scf_pg_get_flags(pg, &flags) != 0) 10562 scfdie(); 10563 10564 /* skip nonpersistent pgs */ 10565 if (flags & SCF_PG_FLAG_NONPERSISTENT) 10566 continue; 10567 10568 ret = 0; 10569 break; 10570 } 10571 10572 if (err == -1) 10573 scfdie(); 10574 10575 scf_pg_destroy(pg); 10576 scf_iter_destroy(iter); 10577 10578 return (ret); 10579 } 10580 10581 /* return 1 if the service has no instances, else return 0 */ 10582 static int 10583 svc_has_no_insts(scf_service_t *svc) 10584 { 10585 scf_instance_t *inst; 10586 scf_iter_t *iter; 10587 int r; 10588 int ret = 1; 10589 10590 if ((inst = scf_instance_create(g_hndl)) == NULL || 10591 (iter = scf_iter_create(g_hndl)) == NULL) 10592 scfdie(); 10593 10594 if (scf_iter_service_instances(iter, svc) != 0) 10595 scfdie(); 10596 10597 r = scf_iter_next_instance(iter, inst); 10598 if (r == 1) { 10599 ret = 0; 10600 } else if (r == 0) { 10601 ret = 1; 10602 } else if (r == -1) { 10603 scfdie(); 10604 } else { 10605 bad_error("scf_iter_next_instance", r); 10606 } 10607 10608 scf_iter_destroy(iter); 10609 scf_instance_destroy(inst); 10610 10611 return (ret); 10612 } 10613 10614 /* 10615 * Entity deletion. 10616 */ 10617 10618 /* 10619 * Delete the property group <fmri>/:properties/<name>. Returns 10620 * SCF_ERROR_NONE on success (or if the entity is not found), 10621 * SCF_ERROR_INVALID_ARGUMENT if the fmri is bad, SCF_ERROR_TYPE_MISMATCH if 10622 * the pg is the wrong type, or SCF_ERROR_PERMISSION_DENIED if permission was 10623 * denied. 10624 */ 10625 static scf_error_t 10626 delete_dependency_pg(const char *fmri, const char *name) 10627 { 10628 void *entity = NULL; 10629 int isservice; 10630 scf_propertygroup_t *pg = NULL; 10631 scf_error_t result; 10632 char *pgty; 10633 scf_service_t *svc = NULL; 10634 scf_instance_t *inst = NULL; 10635 scf_iter_t *iter = NULL; 10636 char *name_buf = NULL; 10637 10638 result = fmri_to_entity(g_hndl, fmri, &entity, &isservice); 10639 switch (result) { 10640 case SCF_ERROR_NONE: 10641 break; 10642 10643 case SCF_ERROR_NO_MEMORY: 10644 uu_die(gettext("Out of memory.\n")); 10645 /* NOTREACHED */ 10646 10647 case SCF_ERROR_INVALID_ARGUMENT: 10648 case SCF_ERROR_CONSTRAINT_VIOLATED: 10649 return (SCF_ERROR_INVALID_ARGUMENT); 10650 10651 case SCF_ERROR_NOT_FOUND: 10652 result = SCF_ERROR_NONE; 10653 goto out; 10654 10655 default: 10656 bad_error("fmri_to_entity", result); 10657 } 10658 10659 pg = scf_pg_create(g_hndl); 10660 if (pg == NULL) 10661 scfdie(); 10662 10663 if (entity_get_pg(entity, isservice, name, pg) != 0) { 10664 if (scf_error() != SCF_ERROR_NOT_FOUND) 10665 scfdie(); 10666 10667 result = SCF_ERROR_NONE; 10668 goto out; 10669 } 10670 10671 pgty = safe_malloc(max_scf_pg_type_len + 1); 10672 10673 if (scf_pg_get_type(pg, pgty, max_scf_pg_type_len + 1) < 0) 10674 scfdie(); 10675 10676 if (strcmp(pgty, SCF_GROUP_DEPENDENCY) != 0) { 10677 result = SCF_ERROR_TYPE_MISMATCH; 10678 free(pgty); 10679 goto out; 10680 } 10681 10682 free(pgty); 10683 10684 if (scf_pg_delete(pg) != 0) { 10685 result = scf_error(); 10686 if (result != SCF_ERROR_PERMISSION_DENIED) 10687 scfdie(); 10688 goto out; 10689 } 10690 10691 /* 10692 * We have to handle the case where we've just deleted the last 10693 * property group of a "dummy" entity (instance or service). 10694 * A "dummy" entity is an entity only present to hold an 10695 * external dependency. 10696 * So, in the case we deleted the last property group then we 10697 * can also delete the entity. If the entity is an instance then 10698 * we must verify if this was the last instance for the service 10699 * and if it is, we can also delete the service if it doesn't 10700 * have any property group either. 10701 */ 10702 10703 result = SCF_ERROR_NONE; 10704 10705 if (isservice) { 10706 svc = (scf_service_t *)entity; 10707 10708 if ((inst = scf_instance_create(g_hndl)) == NULL || 10709 (iter = scf_iter_create(g_hndl)) == NULL) 10710 scfdie(); 10711 10712 name_buf = safe_malloc(max_scf_name_len + 1); 10713 } else { 10714 inst = (scf_instance_t *)entity; 10715 } 10716 10717 /* 10718 * If the entity is an instance and we've just deleted its last 10719 * property group then we should delete it. 10720 */ 10721 if (!isservice && entity_has_no_pgs(entity, isservice)) { 10722 /* find the service before deleting the inst. - needed later */ 10723 if ((svc = scf_service_create(g_hndl)) == NULL) 10724 scfdie(); 10725 10726 if (scf_instance_get_parent(inst, svc) != 0) 10727 scfdie(); 10728 10729 /* delete the instance */ 10730 if (scf_instance_delete(inst) != 0) { 10731 if (scf_error() != SCF_ERROR_PERMISSION_DENIED) 10732 scfdie(); 10733 10734 result = SCF_ERROR_PERMISSION_DENIED; 10735 goto out; 10736 } 10737 /* no need to refresh the instance */ 10738 inst = NULL; 10739 } 10740 10741 /* 10742 * If the service has no more instances and pgs or we just deleted the 10743 * last instance and the service doesn't have anymore propery groups 10744 * then the service should be deleted. 10745 */ 10746 if (svc != NULL && 10747 svc_has_no_insts(svc) && 10748 entity_has_no_pgs((void *)svc, 1)) { 10749 if (scf_service_delete(svc) == 0) { 10750 if (isservice) { 10751 /* no need to refresh the service */ 10752 svc = NULL; 10753 } 10754 10755 goto out; 10756 } 10757 10758 if (scf_error() != SCF_ERROR_PERMISSION_DENIED) 10759 scfdie(); 10760 10761 result = SCF_ERROR_PERMISSION_DENIED; 10762 } 10763 10764 /* if the entity has not been deleted, refresh it */ 10765 if ((isservice && svc != NULL) || (!isservice && inst != NULL)) { 10766 (void) refresh_entity(isservice, entity, fmri, inst, iter, 10767 name_buf); 10768 } 10769 10770 out: 10771 if (isservice && (inst != NULL && iter != NULL)) { 10772 free(name_buf); 10773 scf_iter_destroy(iter); 10774 scf_instance_destroy(inst); 10775 } 10776 10777 if (!isservice && svc != NULL) { 10778 scf_service_destroy(svc); 10779 } 10780 10781 scf_pg_destroy(pg); 10782 if (entity != NULL) 10783 entity_destroy(entity, isservice); 10784 10785 return (result); 10786 } 10787 10788 static int 10789 delete_dependents(scf_propertygroup_t *pg) 10790 { 10791 char *pgty, *name, *fmri; 10792 scf_property_t *prop; 10793 scf_value_t *val; 10794 scf_iter_t *iter; 10795 int r; 10796 scf_error_t err; 10797 10798 /* Verify that the pg has the correct type. */ 10799 pgty = safe_malloc(max_scf_pg_type_len + 1); 10800 if (scf_pg_get_type(pg, pgty, max_scf_pg_type_len + 1) < 0) 10801 scfdie(); 10802 10803 if (strcmp(pgty, scf_group_framework) != 0) { 10804 if (g_verbose) { 10805 fmri = safe_malloc(max_scf_fmri_len + 1); 10806 if (scf_pg_to_fmri(pg, fmri, max_scf_fmri_len + 1) < 0) 10807 scfdie(); 10808 10809 warn(gettext("Property group %s is not of expected " 10810 "type %s.\n"), fmri, scf_group_framework); 10811 10812 free(fmri); 10813 } 10814 10815 free(pgty); 10816 return (-1); 10817 } 10818 10819 free(pgty); 10820 10821 /* map delete_dependency_pg onto the properties. */ 10822 if ((prop = scf_property_create(g_hndl)) == NULL || 10823 (val = scf_value_create(g_hndl)) == NULL || 10824 (iter = scf_iter_create(g_hndl)) == NULL) 10825 scfdie(); 10826 10827 if (scf_iter_pg_properties(iter, pg) != SCF_SUCCESS) 10828 scfdie(); 10829 10830 name = safe_malloc(max_scf_name_len + 1); 10831 fmri = safe_malloc(max_scf_fmri_len + 2); 10832 10833 while ((r = scf_iter_next_property(iter, prop)) == 1) { 10834 scf_type_t ty; 10835 10836 if (scf_property_get_name(prop, name, max_scf_name_len + 1) < 0) 10837 scfdie(); 10838 10839 if (scf_property_type(prop, &ty) != SCF_SUCCESS) 10840 scfdie(); 10841 10842 if ((ty != SCF_TYPE_ASTRING && 10843 prop_check_type(prop, SCF_TYPE_FMRI) != 0) || 10844 prop_get_val(prop, val) != 0) 10845 continue; 10846 10847 if (scf_value_get_astring(val, fmri, max_scf_fmri_len + 2) < 0) 10848 scfdie(); 10849 10850 err = delete_dependency_pg(fmri, name); 10851 if (err == SCF_ERROR_INVALID_ARGUMENT && g_verbose) { 10852 if (scf_property_to_fmri(prop, fmri, 10853 max_scf_fmri_len + 2) < 0) 10854 scfdie(); 10855 10856 warn(gettext("Value of %s is not a valid FMRI.\n"), 10857 fmri); 10858 } else if (err == SCF_ERROR_TYPE_MISMATCH && g_verbose) { 10859 warn(gettext("Property group \"%s\" of entity \"%s\" " 10860 "does not have dependency type.\n"), name, fmri); 10861 } else if (err == SCF_ERROR_PERMISSION_DENIED && g_verbose) { 10862 warn(gettext("Could not delete property group \"%s\" " 10863 "of entity \"%s\" (permission denied).\n"), name, 10864 fmri); 10865 } 10866 } 10867 if (r == -1) 10868 scfdie(); 10869 10870 scf_value_destroy(val); 10871 scf_property_destroy(prop); 10872 10873 return (0); 10874 } 10875 10876 /* 10877 * Returns 1 if the instance may be running, and 0 otherwise. 10878 */ 10879 static int 10880 inst_is_running(scf_instance_t *inst) 10881 { 10882 scf_propertygroup_t *pg; 10883 scf_property_t *prop; 10884 scf_value_t *val; 10885 char buf[MAX_SCF_STATE_STRING_SZ]; 10886 int ret = 0; 10887 ssize_t szret; 10888 10889 if ((pg = scf_pg_create(g_hndl)) == NULL || 10890 (prop = scf_property_create(g_hndl)) == NULL || 10891 (val = scf_value_create(g_hndl)) == NULL) 10892 scfdie(); 10893 10894 if (scf_instance_get_pg(inst, SCF_PG_RESTARTER, pg) != SCF_SUCCESS) { 10895 if (scf_error() != SCF_ERROR_NOT_FOUND) 10896 scfdie(); 10897 goto out; 10898 } 10899 10900 if (pg_get_prop(pg, SCF_PROPERTY_STATE, prop) != 0 || 10901 prop_check_type(prop, SCF_TYPE_ASTRING) != 0 || 10902 prop_get_val(prop, val) != 0) 10903 goto out; 10904 10905 szret = scf_value_get_astring(val, buf, sizeof (buf)); 10906 assert(szret >= 0); 10907 10908 ret = (strcmp(buf, SCF_STATE_STRING_ONLINE) == 0 || 10909 strcmp(buf, SCF_STATE_STRING_DEGRADED) == 0) ? 1 : 0; 10910 10911 out: 10912 scf_value_destroy(val); 10913 scf_property_destroy(prop); 10914 scf_pg_destroy(pg); 10915 return (ret); 10916 } 10917 10918 static uint8_t 10919 pg_is_external_dependency(scf_propertygroup_t *pg) 10920 { 10921 char *type; 10922 scf_value_t *val; 10923 scf_property_t *prop; 10924 uint8_t b = B_FALSE; 10925 10926 type = safe_malloc(max_scf_pg_type_len + 1); 10927 10928 if (scf_pg_get_type(pg, type, max_scf_pg_type_len + 1) < 0) 10929 scfdie(); 10930 10931 if ((prop = scf_property_create(g_hndl)) == NULL || 10932 (val = scf_value_create(g_hndl)) == NULL) 10933 scfdie(); 10934 10935 if (strcmp(type, SCF_GROUP_DEPENDENCY) == 0) { 10936 if (pg_get_prop(pg, scf_property_external, prop) == 0) { 10937 if (scf_property_get_value(prop, val) != 0) 10938 scfdie(); 10939 if (scf_value_get_boolean(val, &b) != 0) 10940 scfdie(); 10941 } 10942 } 10943 10944 free(type); 10945 (void) scf_value_destroy(val); 10946 (void) scf_property_destroy(prop); 10947 10948 return (b); 10949 } 10950 10951 #define DELETE_FAILURE -1 10952 #define DELETE_SUCCESS_NOEXTDEPS 0 10953 #define DELETE_SUCCESS_EXTDEPS 1 10954 10955 /* 10956 * lscf_instance_delete() deletes an instance. Before calling 10957 * scf_instance_delete(), though, we make sure the instance isn't 10958 * running and delete dependencies in other entities which the instance 10959 * declared as "dependents". If there are dependencies which were 10960 * created for other entities, then instead of deleting the instance we 10961 * make it "empty" by deleting all other property groups and all 10962 * snapshots. 10963 * 10964 * lscf_instance_delete() verifies that there is no external dependency pgs 10965 * before suppressing the instance. If there is, then we must not remove them 10966 * now in case the instance is re-created otherwise the dependencies would be 10967 * lost. The external dependency pgs will be removed if the dependencies are 10968 * removed. 10969 * 10970 * Returns: 10971 * DELETE_FAILURE on failure 10972 * DELETE_SUCCESS_NOEXTDEPS on success - no external dependencies 10973 * DELETE_SUCCESS_EXTDEPS on success - external dependencies 10974 */ 10975 static int 10976 lscf_instance_delete(scf_instance_t *inst, int force) 10977 { 10978 scf_propertygroup_t *pg; 10979 scf_snapshot_t *snap; 10980 scf_iter_t *iter; 10981 int err; 10982 int external = 0; 10983 10984 /* If we're not forcing and the instance is running, refuse. */ 10985 if (!force && inst_is_running(inst)) { 10986 char *fmri; 10987 10988 fmri = safe_malloc(max_scf_fmri_len + 1); 10989 10990 if (scf_instance_to_fmri(inst, fmri, max_scf_fmri_len + 1) < 0) 10991 scfdie(); 10992 10993 semerr(gettext("Instance %s may be running. " 10994 "Use delete -f if it is not.\n"), fmri); 10995 10996 free(fmri); 10997 return (DELETE_FAILURE); 10998 } 10999 11000 pg = scf_pg_create(g_hndl); 11001 if (pg == NULL) 11002 scfdie(); 11003 11004 if (scf_instance_get_pg(inst, SCF_PG_DEPENDENTS, pg) == 0) 11005 (void) delete_dependents(pg); 11006 else if (scf_error() != SCF_ERROR_NOT_FOUND) 11007 scfdie(); 11008 11009 scf_pg_destroy(pg); 11010 11011 /* 11012 * If the instance has some external dependencies then we must 11013 * keep them in case the instance is reimported otherwise the 11014 * dependencies would be lost on reimport. 11015 */ 11016 if ((iter = scf_iter_create(g_hndl)) == NULL || 11017 (pg = scf_pg_create(g_hndl)) == NULL) 11018 scfdie(); 11019 11020 if (scf_iter_instance_pgs(iter, inst) < 0) 11021 scfdie(); 11022 11023 while ((err = scf_iter_next_pg(iter, pg)) == 1) { 11024 if (pg_is_external_dependency(pg)) { 11025 external = 1; 11026 continue; 11027 } 11028 11029 if (scf_pg_delete(pg) != 0) { 11030 if (scf_error() != SCF_ERROR_PERMISSION_DENIED) 11031 scfdie(); 11032 else { 11033 semerr(emsg_permission_denied); 11034 11035 (void) scf_iter_destroy(iter); 11036 (void) scf_pg_destroy(pg); 11037 return (DELETE_FAILURE); 11038 } 11039 } 11040 } 11041 11042 if (err == -1) 11043 scfdie(); 11044 11045 (void) scf_iter_destroy(iter); 11046 (void) scf_pg_destroy(pg); 11047 11048 if (external) { 11049 /* 11050 * All the pgs have been deleted for the instance except 11051 * the ones holding the external dependencies. 11052 * For the job to be complete, we must also delete the 11053 * snapshots associated with the instance. 11054 */ 11055 if ((snap = scf_snapshot_create((scf_handle_t *)g_hndl)) == 11056 NULL) 11057 scfdie(); 11058 if ((iter = scf_iter_create((scf_handle_t *)g_hndl)) == NULL) 11059 scfdie(); 11060 11061 if (scf_iter_instance_snapshots(iter, inst) == -1) 11062 scfdie(); 11063 11064 while ((err = scf_iter_next_snapshot(iter, snap)) == 1) { 11065 if (_scf_snapshot_delete(snap) != 0) { 11066 if (scf_error() != SCF_ERROR_PERMISSION_DENIED) 11067 scfdie(); 11068 11069 semerr(emsg_permission_denied); 11070 11071 (void) scf_iter_destroy(iter); 11072 (void) scf_snapshot_destroy(snap); 11073 return (DELETE_FAILURE); 11074 } 11075 } 11076 11077 if (err == -1) 11078 scfdie(); 11079 11080 (void) scf_iter_destroy(iter); 11081 (void) scf_snapshot_destroy(snap); 11082 return (DELETE_SUCCESS_EXTDEPS); 11083 } 11084 11085 if (scf_instance_delete(inst) != 0) { 11086 if (scf_error() != SCF_ERROR_PERMISSION_DENIED) 11087 scfdie(); 11088 11089 semerr(emsg_permission_denied); 11090 11091 return (DELETE_FAILURE); 11092 } 11093 11094 return (DELETE_SUCCESS_NOEXTDEPS); 11095 } 11096 11097 /* 11098 * lscf_service_delete() deletes a service. Before calling 11099 * scf_service_delete(), though, we call lscf_instance_delete() for 11100 * each of the instances and delete dependencies in other entities 11101 * which were created as "dependents" of this service. If there are 11102 * dependencies which were created for other entities, then we delete 11103 * all other property groups in the service and leave it as "empty". 11104 * 11105 * lscf_service_delete() verifies that there is no external dependency 11106 * pgs at the instance & service level before suppressing the service. 11107 * If there is, then we must not remove them now in case the service 11108 * is re-imported otherwise the dependencies would be lost. The external 11109 * dependency pgs will be removed if the dependencies are removed. 11110 * 11111 * Returns: 11112 * DELETE_FAILURE on failure 11113 * DELETE_SUCCESS_NOEXTDEPS on success - no external dependencies 11114 * DELETE_SUCCESS_EXTDEPS on success - external dependencies 11115 */ 11116 static int 11117 lscf_service_delete(scf_service_t *svc, int force) 11118 { 11119 int r; 11120 scf_instance_t *inst; 11121 scf_propertygroup_t *pg; 11122 scf_iter_t *iter; 11123 int ret; 11124 int external = 0; 11125 11126 if ((inst = scf_instance_create(g_hndl)) == NULL || 11127 (pg = scf_pg_create(g_hndl)) == NULL || 11128 (iter = scf_iter_create(g_hndl)) == NULL) 11129 scfdie(); 11130 11131 if (scf_iter_service_instances(iter, svc) != 0) 11132 scfdie(); 11133 11134 for (r = scf_iter_next_instance(iter, inst); 11135 r == 1; 11136 r = scf_iter_next_instance(iter, inst)) { 11137 11138 ret = lscf_instance_delete(inst, force); 11139 if (ret == DELETE_FAILURE) { 11140 scf_iter_destroy(iter); 11141 scf_pg_destroy(pg); 11142 scf_instance_destroy(inst); 11143 return (DELETE_FAILURE); 11144 } 11145 11146 /* 11147 * Record the fact that there is some external dependencies 11148 * at the instance level. 11149 */ 11150 if (ret == DELETE_SUCCESS_EXTDEPS) 11151 external |= 1; 11152 } 11153 11154 if (r != 0) 11155 scfdie(); 11156 11157 /* Delete dependency property groups in dependent services. */ 11158 if (scf_service_get_pg(svc, SCF_PG_DEPENDENTS, pg) == 0) 11159 (void) delete_dependents(pg); 11160 else if (scf_error() != SCF_ERROR_NOT_FOUND) 11161 scfdie(); 11162 11163 scf_iter_destroy(iter); 11164 scf_pg_destroy(pg); 11165 scf_instance_destroy(inst); 11166 11167 /* 11168 * If the service has some external dependencies then we don't 11169 * want to remove them in case the service is re-imported. 11170 */ 11171 if ((pg = scf_pg_create(g_hndl)) == NULL || 11172 (iter = scf_iter_create(g_hndl)) == NULL) 11173 scfdie(); 11174 11175 if (scf_iter_service_pgs(iter, svc) < 0) 11176 scfdie(); 11177 11178 while ((r = scf_iter_next_pg(iter, pg)) == 1) { 11179 if (pg_is_external_dependency(pg)) { 11180 external |= 2; 11181 continue; 11182 } 11183 11184 if (scf_pg_delete(pg) != 0) { 11185 if (scf_error() != SCF_ERROR_PERMISSION_DENIED) 11186 scfdie(); 11187 else { 11188 semerr(emsg_permission_denied); 11189 11190 (void) scf_iter_destroy(iter); 11191 (void) scf_pg_destroy(pg); 11192 return (DELETE_FAILURE); 11193 } 11194 } 11195 } 11196 11197 if (r == -1) 11198 scfdie(); 11199 11200 (void) scf_iter_destroy(iter); 11201 (void) scf_pg_destroy(pg); 11202 11203 if (external != 0) 11204 return (DELETE_SUCCESS_EXTDEPS); 11205 11206 if (scf_service_delete(svc) == 0) 11207 return (DELETE_SUCCESS_NOEXTDEPS); 11208 11209 if (scf_error() != SCF_ERROR_PERMISSION_DENIED) 11210 scfdie(); 11211 11212 semerr(emsg_permission_denied); 11213 return (DELETE_FAILURE); 11214 } 11215 11216 static int 11217 delete_callback(void *data, scf_walkinfo_t *wip) 11218 { 11219 int force = (int)data; 11220 11221 if (wip->inst != NULL) 11222 (void) lscf_instance_delete(wip->inst, force); 11223 else 11224 (void) lscf_service_delete(wip->svc, force); 11225 11226 return (0); 11227 } 11228 11229 void 11230 lscf_delete(const char *fmri, int force) 11231 { 11232 scf_service_t *svc; 11233 scf_instance_t *inst; 11234 int ret; 11235 11236 lscf_prep_hndl(); 11237 11238 if (cur_snap != NULL) { 11239 if (!snaplevel_is_instance(cur_level)) { 11240 char *buf; 11241 11242 buf = safe_malloc(max_scf_name_len + 1); 11243 if (scf_instance_get_name(cur_inst, buf, 11244 max_scf_name_len + 1) >= 0) { 11245 if (strcmp(buf, fmri) == 0) { 11246 semerr(emsg_cant_modify_snapshots); 11247 free(buf); 11248 return; 11249 } 11250 } else if (scf_error() != SCF_ERROR_DELETED) { 11251 scfdie(); 11252 } 11253 free(buf); 11254 } 11255 } else if (cur_inst != NULL) { 11256 /* EMPTY */; 11257 } else if (cur_svc != NULL) { 11258 inst = scf_instance_create(g_hndl); 11259 if (inst == NULL) 11260 scfdie(); 11261 11262 if (scf_service_get_instance(cur_svc, fmri, inst) == 11263 SCF_SUCCESS) { 11264 (void) lscf_instance_delete(inst, force); 11265 scf_instance_destroy(inst); 11266 return; 11267 } 11268 11269 if (scf_error() != SCF_ERROR_NOT_FOUND && 11270 scf_error() != SCF_ERROR_INVALID_ARGUMENT) 11271 scfdie(); 11272 11273 scf_instance_destroy(inst); 11274 } else { 11275 assert(cur_scope != NULL); 11276 11277 svc = scf_service_create(g_hndl); 11278 if (svc == NULL) 11279 scfdie(); 11280 11281 if (scf_scope_get_service(cur_scope, fmri, svc) == 11282 SCF_SUCCESS) { 11283 (void) lscf_service_delete(svc, force); 11284 scf_service_destroy(svc); 11285 return; 11286 } 11287 11288 if (scf_error() != SCF_ERROR_NOT_FOUND && 11289 scf_error() != SCF_ERROR_INVALID_ARGUMENT) 11290 scfdie(); 11291 11292 scf_service_destroy(svc); 11293 } 11294 11295 /* 11296 * Match FMRI to entity. 11297 */ 11298 if ((ret = scf_walk_fmri(g_hndl, 1, (char **)&fmri, SCF_WALK_SERVICE, 11299 delete_callback, (void *)force, NULL, semerr)) != 0) { 11300 semerr(gettext("Failed to walk instances: %s\n"), 11301 scf_strerror(ret)); 11302 } 11303 } 11304 11305 11306 11307 /* 11308 * :properties commands. These all end with "pg" or "prop" and generally 11309 * operate on the currently selected entity. 11310 */ 11311 11312 /* 11313 * Property listing. List the property groups, properties, their types and 11314 * their values for the currently selected entity. 11315 */ 11316 static void 11317 list_pg_info(const scf_propertygroup_t *pg, const char *name, size_t namewidth) 11318 { 11319 char *buf; 11320 uint32_t flags; 11321 11322 buf = safe_malloc(max_scf_pg_type_len + 1); 11323 11324 if (scf_pg_get_type(pg, buf, max_scf_pg_type_len + 1) < 0) 11325 scfdie(); 11326 11327 if (scf_pg_get_flags(pg, &flags) != SCF_SUCCESS) 11328 scfdie(); 11329 11330 safe_printf("%-*s %s", namewidth, name, buf); 11331 11332 if (flags & SCF_PG_FLAG_NONPERSISTENT) 11333 safe_printf("\tNONPERSISTENT"); 11334 11335 safe_printf("\n"); 11336 11337 free(buf); 11338 } 11339 11340 static boolean_t 11341 prop_has_multiple_values(const scf_property_t *prop, scf_value_t *val) 11342 { 11343 if (scf_property_get_value(prop, val) == 0) { 11344 return (B_FALSE); 11345 } else { 11346 switch (scf_error()) { 11347 case SCF_ERROR_NOT_FOUND: 11348 return (B_FALSE); 11349 case SCF_ERROR_PERMISSION_DENIED: 11350 case SCF_ERROR_CONSTRAINT_VIOLATED: 11351 return (B_TRUE); 11352 default: 11353 scfdie(); 11354 /*NOTREACHED*/ 11355 } 11356 } 11357 } 11358 11359 static void 11360 list_prop_info(const scf_property_t *prop, const char *name, size_t len) 11361 { 11362 scf_iter_t *iter; 11363 scf_value_t *val; 11364 const char *type; 11365 int multiple_strings = 0; 11366 int ret; 11367 11368 if ((iter = scf_iter_create(g_hndl)) == NULL || 11369 (val = scf_value_create(g_hndl)) == NULL) 11370 scfdie(); 11371 11372 type = prop_to_typestr(prop); 11373 assert(type != NULL); 11374 11375 safe_printf("%-*s %-7s ", len, name, type); 11376 11377 if (prop_has_multiple_values(prop, val) && 11378 (scf_value_type(val) == SCF_TYPE_ASTRING || 11379 scf_value_type(val) == SCF_TYPE_USTRING)) 11380 multiple_strings = 1; 11381 11382 if (scf_iter_property_values(iter, prop) != SCF_SUCCESS) 11383 scfdie(); 11384 11385 while ((ret = scf_iter_next_value(iter, val)) == 1) { 11386 char *buf; 11387 ssize_t vlen, szret; 11388 11389 vlen = scf_value_get_as_string(val, NULL, 0); 11390 if (vlen < 0) 11391 scfdie(); 11392 11393 buf = safe_malloc(vlen + 1); 11394 11395 szret = scf_value_get_as_string(val, buf, vlen + 1); 11396 if (szret < 0) 11397 scfdie(); 11398 assert(szret <= vlen); 11399 11400 /* This is to be human-readable, so don't use CHARS_TO_QUOTE */ 11401 if (multiple_strings || strpbrk(buf, " \t\n\"()") != NULL) { 11402 safe_printf(" \""); 11403 (void) quote_and_print(buf, stdout, 0); 11404 (void) putchar('"'); 11405 if (ferror(stdout)) { 11406 (void) putchar('\n'); 11407 uu_die(gettext("Error writing to stdout.\n")); 11408 } 11409 } else { 11410 safe_printf(" %s", buf); 11411 } 11412 11413 free(buf); 11414 } 11415 if (ret != 0 && scf_error() != SCF_ERROR_PERMISSION_DENIED) 11416 scfdie(); 11417 11418 if (putchar('\n') != '\n') 11419 uu_die(gettext("Could not output newline")); 11420 } 11421 11422 /* 11423 * Outputs template property group info for the describe subcommand. 11424 * If 'templates' == 2, verbose output is printed in the format expected 11425 * for describe -v, which includes all templates fields. If pg is 11426 * not NULL, we're describing the template data, not an existing property 11427 * group, and formatting should be appropriate for describe -t. 11428 */ 11429 static void 11430 list_pg_tmpl(scf_pg_tmpl_t *pgt, scf_propertygroup_t *pg, int templates) 11431 { 11432 char *buf; 11433 uint8_t required; 11434 scf_property_t *stability_prop; 11435 scf_value_t *stability_val; 11436 11437 if (templates == 0) 11438 return; 11439 11440 if ((stability_prop = scf_property_create(g_hndl)) == NULL || 11441 (stability_val = scf_value_create(g_hndl)) == NULL) 11442 scfdie(); 11443 11444 if (templates == 2 && pg != NULL) { 11445 if (scf_pg_get_property(pg, SCF_PROPERTY_STABILITY, 11446 stability_prop) == 0) { 11447 if (prop_check_type(stability_prop, 11448 SCF_TYPE_ASTRING) == 0 && 11449 prop_get_val(stability_prop, stability_val) == 0) { 11450 char *stability; 11451 11452 stability = safe_malloc(max_scf_value_len + 1); 11453 11454 if (scf_value_get_astring(stability_val, 11455 stability, max_scf_value_len + 1) == -1 && 11456 scf_error() != SCF_ERROR_NOT_FOUND) 11457 scfdie(); 11458 11459 safe_printf("%s%s: %s\n", TMPL_INDENT, 11460 gettext("stability"), stability); 11461 11462 free(stability); 11463 } 11464 } else if (scf_error() != SCF_ERROR_NOT_FOUND) 11465 scfdie(); 11466 } 11467 11468 scf_property_destroy(stability_prop); 11469 scf_value_destroy(stability_val); 11470 11471 if (pgt == NULL) 11472 return; 11473 11474 if (pg == NULL || templates == 2) { 11475 /* print type info only if scf_tmpl_pg_name succeeds */ 11476 if (scf_tmpl_pg_name(pgt, &buf) != -1) { 11477 if (pg != NULL) 11478 safe_printf("%s", TMPL_INDENT); 11479 safe_printf("%s: ", gettext("name")); 11480 safe_printf("%s\n", buf); 11481 free(buf); 11482 } 11483 11484 /* print type info only if scf_tmpl_pg_type succeeds */ 11485 if (scf_tmpl_pg_type(pgt, &buf) != -1) { 11486 if (pg != NULL) 11487 safe_printf("%s", TMPL_INDENT); 11488 safe_printf("%s: ", gettext("type")); 11489 safe_printf("%s\n", buf); 11490 free(buf); 11491 } 11492 } 11493 11494 if (templates == 2 && scf_tmpl_pg_required(pgt, &required) == 0) 11495 safe_printf("%s%s: %s\n", TMPL_INDENT, gettext("required"), 11496 required ? "true" : "false"); 11497 11498 if (templates == 2 && scf_tmpl_pg_target(pgt, &buf) > 0) { 11499 safe_printf("%s%s: %s\n", TMPL_INDENT, gettext("target"), 11500 buf); 11501 free(buf); 11502 } 11503 11504 if (templates == 2 && scf_tmpl_pg_common_name(pgt, NULL, &buf) > 0) { 11505 safe_printf("%s%s: %s\n", TMPL_INDENT, gettext("common name"), 11506 buf); 11507 free(buf); 11508 } 11509 11510 if (scf_tmpl_pg_description(pgt, NULL, &buf) > 0) { 11511 if (templates == 2) 11512 safe_printf("%s%s: %s\n", TMPL_INDENT, 11513 gettext("description"), buf); 11514 else 11515 safe_printf("%s%s\n", TMPL_INDENT, buf); 11516 free(buf); 11517 } 11518 11519 } 11520 11521 /* 11522 * With as_value set to true, indent as appropriate for the value level. 11523 * If false, indent to appropriate level for inclusion in constraint 11524 * or choice printout. 11525 */ 11526 static void 11527 print_template_value_details(scf_prop_tmpl_t *prt, const char *val_buf, 11528 int as_value) 11529 { 11530 char *buf; 11531 11532 if (scf_tmpl_value_common_name(prt, NULL, val_buf, &buf) > 0) { 11533 if (as_value == 0) 11534 safe_printf("%s", TMPL_CHOICE_INDENT); 11535 else 11536 safe_printf("%s", TMPL_INDENT); 11537 safe_printf("%s: %s\n", gettext("value common name"), buf); 11538 free(buf); 11539 } 11540 11541 if (scf_tmpl_value_description(prt, NULL, val_buf, &buf) > 0) { 11542 if (as_value == 0) 11543 safe_printf("%s", TMPL_CHOICE_INDENT); 11544 else 11545 safe_printf("%s", TMPL_INDENT); 11546 safe_printf("%s: %s\n", gettext("value description"), buf); 11547 free(buf); 11548 } 11549 } 11550 11551 static void 11552 print_template_value(scf_prop_tmpl_t *prt, const char *val_buf) 11553 { 11554 safe_printf("%s%s: ", TMPL_VALUE_INDENT, gettext("value")); 11555 /* This is to be human-readable, so don't use CHARS_TO_QUOTE */ 11556 safe_printf("%s\n", val_buf); 11557 11558 print_template_value_details(prt, val_buf, 1); 11559 } 11560 11561 static void 11562 print_template_constraints(scf_prop_tmpl_t *prt, int verbose) 11563 { 11564 int i, printed = 0; 11565 scf_values_t values; 11566 scf_count_ranges_t c_ranges; 11567 scf_int_ranges_t i_ranges; 11568 11569 printed = 0; 11570 i = 0; 11571 if (scf_tmpl_value_name_constraints(prt, &values) == 0) { 11572 safe_printf("%s%s:\n", TMPL_VALUE_INDENT, 11573 gettext("value constraints")); 11574 printed++; 11575 for (i = 0; i < values.value_count; ++i) { 11576 safe_printf("%s%s: %s\n", TMPL_INDENT, 11577 gettext("value name"), values.values_as_strings[i]); 11578 if (verbose == 1) 11579 print_template_value_details(prt, 11580 values.values_as_strings[i], 0); 11581 } 11582 11583 scf_values_destroy(&values); 11584 } 11585 11586 if (scf_tmpl_value_count_range_constraints(prt, &c_ranges) == 0) { 11587 if (printed++ == 0) 11588 safe_printf("%s%s:\n", TMPL_VALUE_INDENT, 11589 gettext("value constraints")); 11590 for (i = 0; i < c_ranges.scr_num_ranges; ++i) { 11591 safe_printf("%s%s: %llu to %llu\n", TMPL_INDENT, 11592 gettext("range"), c_ranges.scr_min[i], 11593 c_ranges.scr_max[i]); 11594 } 11595 scf_count_ranges_destroy(&c_ranges); 11596 } else if (scf_error() == SCF_ERROR_CONSTRAINT_VIOLATED && 11597 scf_tmpl_value_int_range_constraints(prt, &i_ranges) == 0) { 11598 if (printed++ == 0) 11599 safe_printf("%s%s:\n", TMPL_VALUE_INDENT, 11600 gettext("value constraints")); 11601 for (i = 0; i < i_ranges.sir_num_ranges; ++i) { 11602 safe_printf("%s%s: %lld to %lld\n", TMPL_INDENT, 11603 gettext("range"), i_ranges.sir_min[i], 11604 i_ranges.sir_max[i]); 11605 } 11606 scf_int_ranges_destroy(&i_ranges); 11607 } 11608 } 11609 11610 static void 11611 print_template_choices(scf_prop_tmpl_t *prt, int verbose) 11612 { 11613 int i = 0, printed = 0; 11614 scf_values_t values; 11615 scf_count_ranges_t c_ranges; 11616 scf_int_ranges_t i_ranges; 11617 11618 printed = 0; 11619 if (scf_tmpl_value_name_choices(prt, &values) == 0) { 11620 safe_printf("%s%s:\n", TMPL_VALUE_INDENT, 11621 gettext("value constraints")); 11622 printed++; 11623 for (i = 0; i < values.value_count; i++) { 11624 safe_printf("%s%s: %s\n", TMPL_INDENT, 11625 gettext("value name"), values.values_as_strings[i]); 11626 if (verbose == 1) 11627 print_template_value_details(prt, 11628 values.values_as_strings[i], 0); 11629 } 11630 11631 scf_values_destroy(&values); 11632 } 11633 11634 if (scf_tmpl_value_count_range_choices(prt, &c_ranges) == 0) { 11635 for (i = 0; i < c_ranges.scr_num_ranges; ++i) { 11636 if (printed++ == 0) 11637 safe_printf("%s%s:\n", TMPL_VALUE_INDENT, 11638 gettext("value choices")); 11639 safe_printf("%s%s: %llu to %llu\n", TMPL_INDENT, 11640 gettext("range"), c_ranges.scr_min[i], 11641 c_ranges.scr_max[i]); 11642 } 11643 scf_count_ranges_destroy(&c_ranges); 11644 } else if (scf_error() == SCF_ERROR_CONSTRAINT_VIOLATED && 11645 scf_tmpl_value_int_range_choices(prt, &i_ranges) == 0) { 11646 for (i = 0; i < i_ranges.sir_num_ranges; ++i) { 11647 if (printed++ == 0) 11648 safe_printf("%s%s:\n", TMPL_VALUE_INDENT, 11649 gettext("value choices")); 11650 safe_printf("%s%s: %lld to %lld\n", TMPL_INDENT, 11651 gettext("range"), i_ranges.sir_min[i], 11652 i_ranges.sir_max[i]); 11653 } 11654 scf_int_ranges_destroy(&i_ranges); 11655 } 11656 } 11657 11658 static void 11659 list_values_by_template(scf_prop_tmpl_t *prt) 11660 { 11661 print_template_constraints(prt, 1); 11662 print_template_choices(prt, 1); 11663 } 11664 11665 static void 11666 list_values_tmpl(scf_prop_tmpl_t *prt, scf_property_t *prop) 11667 { 11668 char *val_buf; 11669 scf_iter_t *iter; 11670 scf_value_t *val; 11671 int ret; 11672 11673 if ((iter = scf_iter_create(g_hndl)) == NULL || 11674 (val = scf_value_create(g_hndl)) == NULL) 11675 scfdie(); 11676 11677 if (scf_iter_property_values(iter, prop) != SCF_SUCCESS) 11678 scfdie(); 11679 11680 val_buf = safe_malloc(max_scf_value_len + 1); 11681 11682 while ((ret = scf_iter_next_value(iter, val)) == 1) { 11683 if (scf_value_get_as_string(val, val_buf, 11684 max_scf_value_len + 1) < 0) 11685 scfdie(); 11686 11687 print_template_value(prt, val_buf); 11688 } 11689 if (ret != 0 && scf_error() != SCF_ERROR_PERMISSION_DENIED) 11690 scfdie(); 11691 free(val_buf); 11692 11693 print_template_constraints(prt, 0); 11694 print_template_choices(prt, 0); 11695 11696 } 11697 11698 /* 11699 * Outputs property info for the describe subcommand 11700 * Verbose output if templates == 2, -v option of svccfg describe 11701 * Displays template data if prop is not NULL, -t option of svccfg describe 11702 */ 11703 static void 11704 list_prop_tmpl(scf_prop_tmpl_t *prt, scf_property_t *prop, int templates) 11705 { 11706 char *buf; 11707 uint8_t u_buf; 11708 int i; 11709 uint64_t min, max; 11710 scf_values_t values; 11711 11712 if (prt == NULL || templates == 0) 11713 return; 11714 11715 if (prop == NULL) { 11716 safe_printf("%s%s: ", TMPL_VALUE_INDENT, gettext("name")); 11717 if (scf_tmpl_prop_name(prt, &buf) > 0) { 11718 safe_printf("%s\n", buf); 11719 free(buf); 11720 } else 11721 safe_printf("(%s)\n", gettext("any")); 11722 } 11723 11724 if (prop == NULL || templates == 2) { 11725 if (prop != NULL) 11726 safe_printf("%s", TMPL_INDENT); 11727 else 11728 safe_printf("%s", TMPL_VALUE_INDENT); 11729 safe_printf("%s: ", gettext("type")); 11730 if ((buf = _scf_read_tmpl_prop_type_as_string(prt)) != NULL) { 11731 safe_printf("%s\n", buf); 11732 free(buf); 11733 } else 11734 safe_printf("(%s)\n", gettext("any")); 11735 } 11736 11737 if (templates == 2 && scf_tmpl_prop_required(prt, &u_buf) == 0) 11738 safe_printf("%s%s: %s\n", TMPL_INDENT, gettext("required"), 11739 u_buf ? "true" : "false"); 11740 11741 if (templates == 2 && scf_tmpl_prop_common_name(prt, NULL, &buf) > 0) { 11742 safe_printf("%s%s: %s\n", TMPL_INDENT, gettext("common name"), 11743 buf); 11744 free(buf); 11745 } 11746 11747 if (templates == 2 && scf_tmpl_prop_units(prt, NULL, &buf) > 0) { 11748 safe_printf("%s%s: %s\n", TMPL_INDENT, gettext("units"), 11749 buf); 11750 free(buf); 11751 } 11752 11753 if (scf_tmpl_prop_description(prt, NULL, &buf) > 0) { 11754 safe_printf("%s%s\n", TMPL_INDENT, buf); 11755 free(buf); 11756 } 11757 11758 if (templates == 2 && scf_tmpl_prop_visibility(prt, &u_buf) == 0) 11759 safe_printf("%s%s: %s\n", TMPL_INDENT, gettext("visibility"), 11760 scf_tmpl_visibility_to_string(u_buf)); 11761 11762 if (templates == 2 && scf_tmpl_prop_cardinality(prt, &min, &max) == 0) { 11763 safe_printf("%s%s: %" PRIu64 "\n", TMPL_INDENT, 11764 gettext("minimum number of values"), min); 11765 if (max == ULLONG_MAX) { 11766 safe_printf("%s%s: %s\n", TMPL_INDENT, 11767 gettext("maximum number of values"), 11768 gettext("unlimited")); 11769 } else { 11770 safe_printf("%s%s: %" PRIu64 "\n", TMPL_INDENT, 11771 gettext("maximum number of values"), max); 11772 } 11773 } 11774 11775 if (templates == 2 && scf_tmpl_prop_internal_seps(prt, &values) == 0) { 11776 for (i = 0; i < values.value_count; i++) { 11777 if (i == 0) { 11778 safe_printf("%s%s:", TMPL_INDENT, 11779 gettext("internal separators")); 11780 } 11781 safe_printf(" \"%s\"", values.values_as_strings[i]); 11782 } 11783 safe_printf("\n"); 11784 } 11785 11786 if (templates != 2) 11787 return; 11788 11789 if (prop != NULL) 11790 list_values_tmpl(prt, prop); 11791 else 11792 list_values_by_template(prt); 11793 } 11794 11795 static char * 11796 read_astring(scf_propertygroup_t *pg, const char *prop_name) 11797 { 11798 char *rv; 11799 11800 rv = _scf_read_single_astring_from_pg(pg, prop_name); 11801 if (rv == NULL) { 11802 switch (scf_error()) { 11803 case SCF_ERROR_NOT_FOUND: 11804 break; 11805 default: 11806 scfdie(); 11807 } 11808 } 11809 return (rv); 11810 } 11811 11812 static void 11813 display_documentation(scf_iter_t *iter, scf_propertygroup_t *pg) 11814 { 11815 size_t doc_len; 11816 size_t man_len; 11817 char *pg_name; 11818 char *text = NULL; 11819 int rv; 11820 11821 doc_len = strlen(SCF_PG_TM_DOC_PREFIX); 11822 man_len = strlen(SCF_PG_TM_MAN_PREFIX); 11823 pg_name = safe_malloc(max_scf_name_len + 1); 11824 while ((rv = scf_iter_next_pg(iter, pg)) == 1) { 11825 if (scf_pg_get_name(pg, pg_name, max_scf_name_len + 1) == -1) { 11826 scfdie(); 11827 } 11828 if (strncmp(pg_name, SCF_PG_TM_DOC_PREFIX, doc_len) == 0) { 11829 /* Display doc_link and and uri */ 11830 safe_printf("%s%s:\n", TMPL_INDENT, 11831 gettext("doc_link")); 11832 text = read_astring(pg, SCF_PROPERTY_TM_NAME); 11833 if (text != NULL) { 11834 safe_printf("%s%s%s: %s\n", TMPL_INDENT, 11835 TMPL_INDENT, gettext("name"), text); 11836 uu_free(text); 11837 } 11838 text = read_astring(pg, SCF_PROPERTY_TM_URI); 11839 if (text != NULL) { 11840 safe_printf("%s%s: %s\n", TMPL_INDENT_2X, 11841 gettext("uri"), text); 11842 uu_free(text); 11843 } 11844 } else if (strncmp(pg_name, SCF_PG_TM_MAN_PREFIX, 11845 man_len) == 0) { 11846 /* Display manpage title, section and path */ 11847 safe_printf("%s%s:\n", TMPL_INDENT, 11848 gettext("manpage")); 11849 text = read_astring(pg, SCF_PROPERTY_TM_TITLE); 11850 if (text != NULL) { 11851 safe_printf("%s%s%s: %s\n", TMPL_INDENT, 11852 TMPL_INDENT, gettext("title"), text); 11853 uu_free(text); 11854 } 11855 text = read_astring(pg, SCF_PROPERTY_TM_SECTION); 11856 if (text != NULL) { 11857 safe_printf("%s%s%s: %s\n", TMPL_INDENT, 11858 TMPL_INDENT, gettext("section"), text); 11859 uu_free(text); 11860 } 11861 text = read_astring(pg, SCF_PROPERTY_TM_MANPATH); 11862 if (text != NULL) { 11863 safe_printf("%s%s%s: %s\n", TMPL_INDENT, 11864 TMPL_INDENT, gettext("manpath"), text); 11865 uu_free(text); 11866 } 11867 } 11868 } 11869 if (rv == -1) 11870 scfdie(); 11871 11872 done: 11873 free(pg_name); 11874 } 11875 11876 static void 11877 list_entity_tmpl(int templates) 11878 { 11879 char *common_name = NULL; 11880 char *description = NULL; 11881 char *locale = NULL; 11882 scf_iter_t *iter; 11883 scf_propertygroup_t *pg; 11884 scf_property_t *prop; 11885 int r; 11886 scf_value_t *val; 11887 11888 if ((pg = scf_pg_create(g_hndl)) == NULL || 11889 (prop = scf_property_create(g_hndl)) == NULL || 11890 (val = scf_value_create(g_hndl)) == NULL || 11891 (iter = scf_iter_create(g_hndl)) == NULL) 11892 scfdie(); 11893 11894 locale = setlocale(LC_MESSAGES, NULL); 11895 11896 if (get_pg(SCF_PG_TM_COMMON_NAME, pg) == 0) { 11897 common_name = safe_malloc(max_scf_value_len + 1); 11898 11899 /* Try both the current locale and the "C" locale. */ 11900 if (scf_pg_get_property(pg, locale, prop) == 0 || 11901 (scf_error() == SCF_ERROR_NOT_FOUND && 11902 scf_pg_get_property(pg, "C", prop) == 0)) { 11903 if (prop_get_val(prop, val) == 0 && 11904 scf_value_get_ustring(val, common_name, 11905 max_scf_value_len + 1) != -1) { 11906 safe_printf("%s%s: %s\n", TMPL_INDENT, 11907 gettext("common name"), common_name); 11908 } 11909 } 11910 } 11911 11912 /* 11913 * Do description, manpages, and doc links if templates == 2. 11914 */ 11915 if (templates == 2) { 11916 /* Get the description. */ 11917 if (get_pg(SCF_PG_TM_DESCRIPTION, pg) == 0) { 11918 description = safe_malloc(max_scf_value_len + 1); 11919 11920 /* Try both the current locale and the "C" locale. */ 11921 if (scf_pg_get_property(pg, locale, prop) == 0 || 11922 (scf_error() == SCF_ERROR_NOT_FOUND && 11923 scf_pg_get_property(pg, "C", prop) == 0)) { 11924 if (prop_get_val(prop, val) == 0 && 11925 scf_value_get_ustring(val, description, 11926 max_scf_value_len + 1) != -1) { 11927 safe_printf("%s%s: %s\n", TMPL_INDENT, 11928 gettext("description"), 11929 description); 11930 } 11931 } 11932 } 11933 11934 /* Process doc_link & manpage elements. */ 11935 if (cur_level != NULL) { 11936 r = scf_iter_snaplevel_pgs_typed(iter, cur_level, 11937 SCF_GROUP_TEMPLATE); 11938 } else if (cur_inst != NULL) { 11939 r = scf_iter_instance_pgs_typed(iter, cur_inst, 11940 SCF_GROUP_TEMPLATE); 11941 } else { 11942 r = scf_iter_service_pgs_typed(iter, cur_svc, 11943 SCF_GROUP_TEMPLATE); 11944 } 11945 if (r == 0) { 11946 display_documentation(iter, pg); 11947 } 11948 } 11949 11950 free(common_name); 11951 free(description); 11952 scf_pg_destroy(pg); 11953 scf_property_destroy(prop); 11954 scf_value_destroy(val); 11955 scf_iter_destroy(iter); 11956 } 11957 11958 static void 11959 listtmpl(const char *pattern, int templates) 11960 { 11961 scf_pg_tmpl_t *pgt; 11962 scf_prop_tmpl_t *prt; 11963 char *snapbuf = NULL; 11964 char *fmribuf; 11965 char *pg_name = NULL, *prop_name = NULL; 11966 ssize_t prop_name_size; 11967 char *qual_prop_name; 11968 char *search_name; 11969 int listed = 0; 11970 11971 if ((pgt = scf_tmpl_pg_create(g_hndl)) == NULL || 11972 (prt = scf_tmpl_prop_create(g_hndl)) == NULL) 11973 scfdie(); 11974 11975 fmribuf = safe_malloc(max_scf_name_len + 1); 11976 qual_prop_name = safe_malloc(max_scf_name_len + 1); 11977 11978 if (cur_snap != NULL) { 11979 snapbuf = safe_malloc(max_scf_name_len + 1); 11980 if (scf_snapshot_get_name(cur_snap, snapbuf, 11981 max_scf_name_len + 1) < 0) 11982 scfdie(); 11983 } 11984 11985 if (cur_inst != NULL) { 11986 if (scf_instance_to_fmri(cur_inst, fmribuf, 11987 max_scf_name_len + 1) < 0) 11988 scfdie(); 11989 } else if (cur_svc != NULL) { 11990 if (scf_service_to_fmri(cur_svc, fmribuf, 11991 max_scf_name_len + 1) < 0) 11992 scfdie(); 11993 } else 11994 abort(); 11995 11996 /* If pattern is specified, we want to list only those items. */ 11997 while (scf_tmpl_iter_pgs(pgt, fmribuf, snapbuf, NULL, NULL) == 1) { 11998 listed = 0; 11999 if (pattern == NULL || (scf_tmpl_pg_name(pgt, &pg_name) > 0 && 12000 fnmatch(pattern, pg_name, 0) == 0)) { 12001 list_pg_tmpl(pgt, NULL, templates); 12002 listed++; 12003 } 12004 12005 scf_tmpl_prop_reset(prt); 12006 12007 while (scf_tmpl_iter_props(pgt, prt, NULL) == 0) { 12008 search_name = NULL; 12009 prop_name_size = scf_tmpl_prop_name(prt, &prop_name); 12010 if ((prop_name_size > 0) && (pg_name != NULL)) { 12011 if (snprintf(qual_prop_name, 12012 max_scf_name_len + 1, "%s/%s", 12013 pg_name, prop_name) >= 12014 max_scf_name_len + 1) { 12015 prop_name_size = -1; 12016 } else { 12017 search_name = qual_prop_name; 12018 } 12019 } 12020 if (listed > 0 || pattern == NULL || 12021 (prop_name_size > 0 && 12022 fnmatch(pattern, search_name, 12023 FNM_PATHNAME) == 0)) 12024 list_prop_tmpl(prt, NULL, templates); 12025 if (prop_name != NULL) { 12026 free(prop_name); 12027 prop_name = NULL; 12028 } 12029 } 12030 if (pg_name != NULL) { 12031 free(pg_name); 12032 pg_name = NULL; 12033 } 12034 } 12035 12036 scf_tmpl_prop_destroy(prt); 12037 scf_tmpl_pg_destroy(pgt); 12038 free(snapbuf); 12039 free(fmribuf); 12040 free(qual_prop_name); 12041 } 12042 12043 static void 12044 listprop(const char *pattern, int only_pgs, int templates) 12045 { 12046 scf_propertygroup_t *pg; 12047 scf_property_t *prop; 12048 scf_iter_t *iter, *piter; 12049 char *pgnbuf, *prnbuf, *ppnbuf; 12050 scf_pg_tmpl_t *pgt, *pgtp; 12051 scf_prop_tmpl_t *prt; 12052 12053 void **objects; 12054 char **names; 12055 void **tmpls; 12056 int allocd, i; 12057 12058 int ret; 12059 ssize_t pgnlen, prnlen, szret; 12060 size_t max_len = 0; 12061 12062 if (cur_svc == NULL && cur_inst == NULL) { 12063 semerr(emsg_entity_not_selected); 12064 return; 12065 } 12066 12067 if ((pg = scf_pg_create(g_hndl)) == NULL || 12068 (prop = scf_property_create(g_hndl)) == NULL || 12069 (iter = scf_iter_create(g_hndl)) == NULL || 12070 (piter = scf_iter_create(g_hndl)) == NULL || 12071 (prt = scf_tmpl_prop_create(g_hndl)) == NULL || 12072 (pgt = scf_tmpl_pg_create(g_hndl)) == NULL) 12073 scfdie(); 12074 12075 prnbuf = safe_malloc(max_scf_name_len + 1); 12076 12077 if (cur_level != NULL) 12078 ret = scf_iter_snaplevel_pgs(iter, cur_level); 12079 else if (cur_inst != NULL) 12080 ret = scf_iter_instance_pgs(iter, cur_inst); 12081 else 12082 ret = scf_iter_service_pgs(iter, cur_svc); 12083 if (ret != 0) { 12084 return; 12085 } 12086 12087 /* 12088 * We want to only list items which match pattern, and we want the 12089 * second column to line up, so during the first pass we'll save 12090 * matching items, their names, and their templates in objects, 12091 * names, and tmpls, computing the maximum name length as we go, 12092 * and then we'll print them out. 12093 * 12094 * Note: We always keep an extra slot available so the array can be 12095 * NULL-terminated. 12096 */ 12097 i = 0; 12098 allocd = 1; 12099 objects = safe_malloc(sizeof (*objects)); 12100 names = safe_malloc(sizeof (*names)); 12101 tmpls = safe_malloc(sizeof (*tmpls)); 12102 12103 while ((ret = scf_iter_next_pg(iter, pg)) == 1) { 12104 int new_pg = 0; 12105 int print_props = 0; 12106 pgtp = NULL; 12107 12108 pgnlen = scf_pg_get_name(pg, NULL, 0); 12109 if (pgnlen < 0) 12110 scfdie(); 12111 12112 pgnbuf = safe_malloc(pgnlen + 1); 12113 12114 szret = scf_pg_get_name(pg, pgnbuf, pgnlen + 1); 12115 if (szret < 0) 12116 scfdie(); 12117 assert(szret <= pgnlen); 12118 12119 if (scf_tmpl_get_by_pg(pg, pgt, NULL) == -1) { 12120 if (scf_error() != SCF_ERROR_NOT_FOUND) 12121 scfdie(); 12122 pgtp = NULL; 12123 } else { 12124 pgtp = pgt; 12125 } 12126 12127 if (pattern == NULL || 12128 fnmatch(pattern, pgnbuf, 0) == 0) { 12129 if (i+1 >= allocd) { 12130 allocd *= 2; 12131 objects = realloc(objects, 12132 sizeof (*objects) * allocd); 12133 names = 12134 realloc(names, sizeof (*names) * allocd); 12135 tmpls = realloc(tmpls, 12136 sizeof (*tmpls) * allocd); 12137 if (objects == NULL || names == NULL || 12138 tmpls == NULL) 12139 uu_die(gettext("Out of memory")); 12140 } 12141 objects[i] = pg; 12142 names[i] = pgnbuf; 12143 12144 if (pgtp == NULL) 12145 tmpls[i] = NULL; 12146 else 12147 tmpls[i] = pgt; 12148 12149 ++i; 12150 12151 if (pgnlen > max_len) 12152 max_len = pgnlen; 12153 12154 new_pg = 1; 12155 print_props = 1; 12156 } 12157 12158 if (only_pgs) { 12159 if (new_pg) { 12160 pg = scf_pg_create(g_hndl); 12161 if (pg == NULL) 12162 scfdie(); 12163 pgt = scf_tmpl_pg_create(g_hndl); 12164 if (pgt == NULL) 12165 scfdie(); 12166 } else 12167 free(pgnbuf); 12168 12169 continue; 12170 } 12171 12172 if (scf_iter_pg_properties(piter, pg) != SCF_SUCCESS) 12173 scfdie(); 12174 12175 while ((ret = scf_iter_next_property(piter, prop)) == 1) { 12176 prnlen = scf_property_get_name(prop, prnbuf, 12177 max_scf_name_len + 1); 12178 if (prnlen < 0) 12179 scfdie(); 12180 12181 /* Will prepend the property group name and a slash. */ 12182 prnlen += pgnlen + 1; 12183 12184 ppnbuf = safe_malloc(prnlen + 1); 12185 12186 if (snprintf(ppnbuf, prnlen + 1, "%s/%s", pgnbuf, 12187 prnbuf) < 0) 12188 uu_die("snprintf"); 12189 12190 if (pattern == NULL || print_props == 1 || 12191 fnmatch(pattern, ppnbuf, 0) == 0) { 12192 if (i+1 >= allocd) { 12193 allocd *= 2; 12194 objects = realloc(objects, 12195 sizeof (*objects) * allocd); 12196 names = realloc(names, 12197 sizeof (*names) * allocd); 12198 tmpls = realloc(tmpls, 12199 sizeof (*tmpls) * allocd); 12200 if (objects == NULL || names == NULL || 12201 tmpls == NULL) 12202 uu_die(gettext( 12203 "Out of memory")); 12204 } 12205 12206 objects[i] = prop; 12207 names[i] = ppnbuf; 12208 12209 if (pgtp != NULL) { 12210 if (scf_tmpl_get_by_prop(pgt, prnbuf, 12211 prt, NULL) < 0) { 12212 if (scf_error() != 12213 SCF_ERROR_NOT_FOUND) 12214 scfdie(); 12215 tmpls[i] = NULL; 12216 } else { 12217 tmpls[i] = prt; 12218 } 12219 } else { 12220 tmpls[i] = NULL; 12221 } 12222 12223 ++i; 12224 12225 if (prnlen > max_len) 12226 max_len = prnlen; 12227 12228 prop = scf_property_create(g_hndl); 12229 prt = scf_tmpl_prop_create(g_hndl); 12230 } else { 12231 free(ppnbuf); 12232 } 12233 } 12234 12235 if (new_pg) { 12236 pg = scf_pg_create(g_hndl); 12237 if (pg == NULL) 12238 scfdie(); 12239 pgt = scf_tmpl_pg_create(g_hndl); 12240 if (pgt == NULL) 12241 scfdie(); 12242 } else 12243 free(pgnbuf); 12244 } 12245 if (ret != 0) 12246 scfdie(); 12247 12248 objects[i] = NULL; 12249 12250 scf_pg_destroy(pg); 12251 scf_tmpl_pg_destroy(pgt); 12252 scf_property_destroy(prop); 12253 scf_tmpl_prop_destroy(prt); 12254 12255 for (i = 0; objects[i] != NULL; ++i) { 12256 if (strchr(names[i], '/') == NULL) { 12257 /* property group */ 12258 pg = (scf_propertygroup_t *)objects[i]; 12259 pgt = (scf_pg_tmpl_t *)tmpls[i]; 12260 list_pg_info(pg, names[i], max_len); 12261 list_pg_tmpl(pgt, pg, templates); 12262 free(names[i]); 12263 scf_pg_destroy(pg); 12264 if (pgt != NULL) 12265 scf_tmpl_pg_destroy(pgt); 12266 } else { 12267 /* property */ 12268 prop = (scf_property_t *)objects[i]; 12269 prt = (scf_prop_tmpl_t *)tmpls[i]; 12270 list_prop_info(prop, names[i], max_len); 12271 list_prop_tmpl(prt, prop, templates); 12272 free(names[i]); 12273 scf_property_destroy(prop); 12274 if (prt != NULL) 12275 scf_tmpl_prop_destroy(prt); 12276 } 12277 } 12278 12279 free(names); 12280 free(objects); 12281 free(tmpls); 12282 } 12283 12284 void 12285 lscf_listpg(const char *pattern) 12286 { 12287 lscf_prep_hndl(); 12288 12289 listprop(pattern, 1, 0); 12290 } 12291 12292 /* 12293 * Property group and property creation, setting, and deletion. setprop (and 12294 * its alias, addprop) can either create a property group of a given type, or 12295 * it can create or set a property to a given type and list of values. 12296 */ 12297 void 12298 lscf_addpg(const char *name, const char *type, const char *flags) 12299 { 12300 scf_propertygroup_t *pg; 12301 int ret; 12302 uint32_t flgs = 0; 12303 const char *cp; 12304 12305 12306 lscf_prep_hndl(); 12307 12308 if (cur_snap != NULL) { 12309 semerr(emsg_cant_modify_snapshots); 12310 return; 12311 } 12312 12313 if (cur_inst == NULL && cur_svc == NULL) { 12314 semerr(emsg_entity_not_selected); 12315 return; 12316 } 12317 12318 if (flags != NULL) { 12319 for (cp = flags; *cp != '\0'; ++cp) { 12320 switch (*cp) { 12321 case 'P': 12322 flgs |= SCF_PG_FLAG_NONPERSISTENT; 12323 break; 12324 12325 case 'p': 12326 flgs &= ~SCF_PG_FLAG_NONPERSISTENT; 12327 break; 12328 12329 default: 12330 semerr(gettext("Invalid property group flag " 12331 "%c."), *cp); 12332 return; 12333 } 12334 } 12335 } 12336 12337 pg = scf_pg_create(g_hndl); 12338 if (pg == NULL) 12339 scfdie(); 12340 12341 if (cur_inst != NULL) 12342 ret = scf_instance_add_pg(cur_inst, name, type, flgs, pg); 12343 else 12344 ret = scf_service_add_pg(cur_svc, name, type, flgs, pg); 12345 12346 if (ret != SCF_SUCCESS) { 12347 switch (scf_error()) { 12348 case SCF_ERROR_INVALID_ARGUMENT: 12349 semerr(gettext("Name, type, or flags are invalid.\n")); 12350 break; 12351 12352 case SCF_ERROR_EXISTS: 12353 semerr(gettext("Property group already exists.\n")); 12354 break; 12355 12356 case SCF_ERROR_PERMISSION_DENIED: 12357 semerr(emsg_permission_denied); 12358 break; 12359 12360 case SCF_ERROR_BACKEND_ACCESS: 12361 semerr(gettext("Backend refused access.\n")); 12362 break; 12363 12364 default: 12365 scfdie(); 12366 } 12367 } 12368 12369 scf_pg_destroy(pg); 12370 12371 private_refresh(); 12372 } 12373 12374 void 12375 lscf_delpg(char *name) 12376 { 12377 lscf_prep_hndl(); 12378 12379 if (cur_snap != NULL) { 12380 semerr(emsg_cant_modify_snapshots); 12381 return; 12382 } 12383 12384 if (cur_inst == NULL && cur_svc == NULL) { 12385 semerr(emsg_entity_not_selected); 12386 return; 12387 } 12388 12389 if (strchr(name, '/') != NULL) { 12390 semerr(emsg_invalid_pg_name, name); 12391 return; 12392 } 12393 12394 lscf_delprop(name); 12395 } 12396 12397 /* 12398 * scf_delhash() is used to remove the property group related to the 12399 * hash entry for a specific manifest in the repository. pgname will be 12400 * constructed from the location of the manifest file. If deathrow isn't 0, 12401 * manifest file doesn't need to exist (manifest string will be used as 12402 * an absolute path). 12403 */ 12404 void 12405 lscf_delhash(char *manifest, int deathrow) 12406 { 12407 char *pgname; 12408 12409 if (cur_snap != NULL || 12410 cur_inst != NULL || cur_svc != NULL) { 12411 warn(gettext("error, an entity is selected\n")); 12412 return; 12413 } 12414 12415 /* select smf/manifest */ 12416 lscf_select("smf/manifest"); 12417 /* 12418 * Translate the manifest file name to property name. In the deathrow 12419 * case, the manifest file does not need to exist. 12420 */ 12421 pgname = mhash_filename_to_propname(manifest, 12422 deathrow ? B_TRUE : B_FALSE); 12423 if (pgname == NULL) { 12424 warn(gettext("cannot resolve pathname for %s\n"), manifest); 12425 return; 12426 } 12427 /* delete the hash property name */ 12428 lscf_delpg(pgname); 12429 } 12430 12431 void 12432 lscf_listprop(const char *pattern) 12433 { 12434 lscf_prep_hndl(); 12435 12436 listprop(pattern, 0, 0); 12437 } 12438 12439 int 12440 lscf_setprop(const char *pgname, const char *type, const char *value, 12441 const uu_list_t *values) 12442 { 12443 scf_type_t ty, current_ty; 12444 scf_service_t *svc; 12445 scf_propertygroup_t *pg, *parent_pg; 12446 scf_property_t *prop, *parent_prop; 12447 scf_pg_tmpl_t *pgt; 12448 scf_prop_tmpl_t *prt; 12449 int ret, result = 0; 12450 scf_transaction_t *tx; 12451 scf_transaction_entry_t *e; 12452 scf_value_t *v; 12453 uu_list_walk_t *walk; 12454 string_list_t *sp; 12455 char *propname; 12456 int req_quotes = 0; 12457 12458 lscf_prep_hndl(); 12459 12460 if ((e = scf_entry_create(g_hndl)) == NULL || 12461 (svc = scf_service_create(g_hndl)) == NULL || 12462 (parent_pg = scf_pg_create(g_hndl)) == NULL || 12463 (pg = scf_pg_create(g_hndl)) == NULL || 12464 (parent_prop = scf_property_create(g_hndl)) == NULL || 12465 (prop = scf_property_create(g_hndl)) == NULL || 12466 (pgt = scf_tmpl_pg_create(g_hndl)) == NULL || 12467 (prt = scf_tmpl_prop_create(g_hndl)) == NULL || 12468 (tx = scf_transaction_create(g_hndl)) == NULL) 12469 scfdie(); 12470 12471 if (cur_snap != NULL) { 12472 semerr(emsg_cant_modify_snapshots); 12473 goto fail; 12474 } 12475 12476 if (cur_inst == NULL && cur_svc == NULL) { 12477 semerr(emsg_entity_not_selected); 12478 goto fail; 12479 } 12480 12481 propname = strchr(pgname, '/'); 12482 if (propname == NULL) { 12483 semerr(gettext("Property names must contain a `/'.\n")); 12484 goto fail; 12485 } 12486 12487 *propname = '\0'; 12488 ++propname; 12489 12490 if (type != NULL) { 12491 ty = string_to_type(type); 12492 if (ty == SCF_TYPE_INVALID) { 12493 semerr(gettext("Unknown type \"%s\".\n"), type); 12494 goto fail; 12495 } 12496 } 12497 12498 if (cur_inst != NULL) 12499 ret = scf_instance_get_pg(cur_inst, pgname, pg); 12500 else 12501 ret = scf_service_get_pg(cur_svc, pgname, pg); 12502 if (ret != SCF_SUCCESS) { 12503 switch (scf_error()) { 12504 case SCF_ERROR_NOT_FOUND: 12505 semerr(emsg_no_such_pg, pgname); 12506 goto fail; 12507 12508 case SCF_ERROR_INVALID_ARGUMENT: 12509 semerr(emsg_invalid_pg_name, pgname); 12510 goto fail; 12511 12512 default: 12513 scfdie(); 12514 break; 12515 } 12516 } 12517 12518 do { 12519 if (scf_pg_update(pg) == -1) 12520 scfdie(); 12521 if (scf_transaction_start(tx, pg) != SCF_SUCCESS) { 12522 if (scf_error() != SCF_ERROR_PERMISSION_DENIED) 12523 scfdie(); 12524 12525 semerr(emsg_permission_denied); 12526 goto fail; 12527 } 12528 12529 ret = scf_pg_get_property(pg, propname, prop); 12530 if (ret == SCF_SUCCESS) { 12531 if (scf_property_type(prop, ¤t_ty) != SCF_SUCCESS) 12532 scfdie(); 12533 12534 if (type == NULL) 12535 ty = current_ty; 12536 if (scf_transaction_property_change_type(tx, e, 12537 propname, ty) == -1) 12538 scfdie(); 12539 12540 } else if (scf_error() == SCF_ERROR_NOT_FOUND) { 12541 /* Infer the type, if possible. */ 12542 if (type == NULL) { 12543 /* 12544 * First check if we're an instance and the 12545 * property is set on the service. 12546 */ 12547 if (cur_inst != NULL && 12548 scf_instance_get_parent(cur_inst, 12549 svc) == 0 && 12550 scf_service_get_pg(cur_svc, pgname, 12551 parent_pg) == 0 && 12552 scf_pg_get_property(parent_pg, propname, 12553 parent_prop) == 0 && 12554 scf_property_type(parent_prop, 12555 ¤t_ty) == 0) { 12556 ty = current_ty; 12557 12558 /* Then check for a type set in a template. */ 12559 } else if (scf_tmpl_get_by_pg(pg, pgt, 12560 NULL) == 0 && 12561 scf_tmpl_get_by_prop(pgt, propname, prt, 12562 NULL) == 0 && 12563 scf_tmpl_prop_type(prt, ¤t_ty) == 0) { 12564 ty = current_ty; 12565 12566 /* If type can't be inferred, fail. */ 12567 } else { 12568 semerr(gettext("Type required for new " 12569 "properties.\n")); 12570 goto fail; 12571 } 12572 } 12573 if (scf_transaction_property_new(tx, e, propname, 12574 ty) == -1) 12575 scfdie(); 12576 } else if (scf_error() == SCF_ERROR_INVALID_ARGUMENT) { 12577 semerr(emsg_invalid_prop_name, propname); 12578 goto fail; 12579 } else { 12580 scfdie(); 12581 } 12582 12583 if (ty == SCF_TYPE_ASTRING || ty == SCF_TYPE_USTRING) 12584 req_quotes = 1; 12585 12586 if (value != NULL) { 12587 v = string_to_value(value, ty, 0); 12588 12589 if (v == NULL) 12590 goto fail; 12591 12592 ret = scf_entry_add_value(e, v); 12593 assert(ret == SCF_SUCCESS); 12594 } else { 12595 assert(values != NULL); 12596 12597 walk = uu_list_walk_start((uu_list_t *)values, 12598 UU_DEFAULT); 12599 if (walk == NULL) 12600 uu_die(gettext("Could not walk list")); 12601 12602 for (sp = uu_list_walk_next(walk); sp != NULL; 12603 sp = uu_list_walk_next(walk)) { 12604 v = string_to_value(sp->str, ty, req_quotes); 12605 12606 if (v == NULL) { 12607 scf_entry_destroy_children(e); 12608 goto fail; 12609 } 12610 12611 ret = scf_entry_add_value(e, v); 12612 assert(ret == SCF_SUCCESS); 12613 } 12614 uu_list_walk_end(walk); 12615 } 12616 result = scf_transaction_commit(tx); 12617 12618 scf_transaction_reset(tx); 12619 scf_entry_destroy_children(e); 12620 } while (result == 0); 12621 12622 if (result < 0) { 12623 if (scf_error() != SCF_ERROR_PERMISSION_DENIED) 12624 scfdie(); 12625 12626 semerr(emsg_permission_denied); 12627 goto fail; 12628 } 12629 12630 ret = 0; 12631 12632 private_refresh(); 12633 12634 goto cleanup; 12635 12636 fail: 12637 ret = -1; 12638 12639 cleanup: 12640 scf_transaction_destroy(tx); 12641 scf_entry_destroy(e); 12642 scf_service_destroy(svc); 12643 scf_pg_destroy(parent_pg); 12644 scf_pg_destroy(pg); 12645 scf_property_destroy(parent_prop); 12646 scf_property_destroy(prop); 12647 scf_tmpl_pg_destroy(pgt); 12648 scf_tmpl_prop_destroy(prt); 12649 12650 return (ret); 12651 } 12652 12653 void 12654 lscf_delprop(char *pgn) 12655 { 12656 char *slash, *pn; 12657 scf_propertygroup_t *pg; 12658 scf_transaction_t *tx; 12659 scf_transaction_entry_t *e; 12660 int ret; 12661 12662 12663 lscf_prep_hndl(); 12664 12665 if (cur_snap != NULL) { 12666 semerr(emsg_cant_modify_snapshots); 12667 return; 12668 } 12669 12670 if (cur_inst == NULL && cur_svc == NULL) { 12671 semerr(emsg_entity_not_selected); 12672 return; 12673 } 12674 12675 pg = scf_pg_create(g_hndl); 12676 if (pg == NULL) 12677 scfdie(); 12678 12679 slash = strchr(pgn, '/'); 12680 if (slash == NULL) { 12681 pn = NULL; 12682 } else { 12683 *slash = '\0'; 12684 pn = slash + 1; 12685 } 12686 12687 if (cur_inst != NULL) 12688 ret = scf_instance_get_pg(cur_inst, pgn, pg); 12689 else 12690 ret = scf_service_get_pg(cur_svc, pgn, pg); 12691 if (ret != SCF_SUCCESS) { 12692 switch (scf_error()) { 12693 case SCF_ERROR_NOT_FOUND: 12694 semerr(emsg_no_such_pg, pgn); 12695 break; 12696 12697 case SCF_ERROR_INVALID_ARGUMENT: 12698 semerr(emsg_invalid_pg_name, pgn); 12699 break; 12700 12701 default: 12702 scfdie(); 12703 } 12704 12705 scf_pg_destroy(pg); 12706 12707 return; 12708 } 12709 12710 if (pn == NULL) { 12711 /* Try to delete the property group. */ 12712 if (scf_pg_delete(pg) != SCF_SUCCESS) { 12713 if (scf_error() != SCF_ERROR_PERMISSION_DENIED) 12714 scfdie(); 12715 12716 semerr(emsg_permission_denied); 12717 } else { 12718 private_refresh(); 12719 } 12720 12721 scf_pg_destroy(pg); 12722 return; 12723 } 12724 12725 e = scf_entry_create(g_hndl); 12726 tx = scf_transaction_create(g_hndl); 12727 12728 do { 12729 if (scf_pg_update(pg) == -1) 12730 scfdie(); 12731 if (scf_transaction_start(tx, pg) != SCF_SUCCESS) { 12732 if (scf_error() != SCF_ERROR_PERMISSION_DENIED) 12733 scfdie(); 12734 12735 semerr(emsg_permission_denied); 12736 break; 12737 } 12738 12739 if (scf_transaction_property_delete(tx, e, pn) != SCF_SUCCESS) { 12740 if (scf_error() == SCF_ERROR_NOT_FOUND) { 12741 semerr(gettext("No such property %s/%s.\n"), 12742 pgn, pn); 12743 break; 12744 } else if (scf_error() == SCF_ERROR_INVALID_ARGUMENT) { 12745 semerr(emsg_invalid_prop_name, pn); 12746 break; 12747 } else { 12748 scfdie(); 12749 } 12750 } 12751 12752 ret = scf_transaction_commit(tx); 12753 12754 if (ret == 0) 12755 scf_transaction_reset(tx); 12756 } while (ret == 0); 12757 12758 if (ret < 0) { 12759 if (scf_error() != SCF_ERROR_PERMISSION_DENIED) 12760 scfdie(); 12761 12762 semerr(emsg_permission_denied); 12763 } else { 12764 private_refresh(); 12765 } 12766 12767 scf_transaction_destroy(tx); 12768 scf_entry_destroy(e); 12769 scf_pg_destroy(pg); 12770 } 12771 12772 /* 12773 * Property editing. 12774 */ 12775 12776 static int 12777 write_edit_script(FILE *strm) 12778 { 12779 char *fmribuf; 12780 ssize_t fmrilen; 12781 12782 scf_propertygroup_t *pg; 12783 scf_property_t *prop; 12784 scf_value_t *val; 12785 scf_type_t ty; 12786 int ret, result = 0; 12787 scf_iter_t *iter, *piter, *viter; 12788 char *buf, *tybuf, *pname; 12789 const char *emsg_write_error; 12790 12791 12792 emsg_write_error = gettext("Error writing temoprary file: %s.\n"); 12793 12794 12795 /* select fmri */ 12796 if (cur_inst != NULL) { 12797 fmrilen = scf_instance_to_fmri(cur_inst, NULL, 0); 12798 if (fmrilen < 0) 12799 scfdie(); 12800 fmribuf = safe_malloc(fmrilen + 1); 12801 if (scf_instance_to_fmri(cur_inst, fmribuf, fmrilen + 1) < 0) 12802 scfdie(); 12803 } else { 12804 assert(cur_svc != NULL); 12805 fmrilen = scf_service_to_fmri(cur_svc, NULL, 0); 12806 if (fmrilen < 0) 12807 scfdie(); 12808 fmribuf = safe_malloc(fmrilen + 1); 12809 if (scf_service_to_fmri(cur_svc, fmribuf, fmrilen + 1) < 0) 12810 scfdie(); 12811 } 12812 12813 if (fprintf(strm, "select %s\n\n", fmribuf) < 0) { 12814 warn(emsg_write_error, strerror(errno)); 12815 free(fmribuf); 12816 return (-1); 12817 } 12818 12819 free(fmribuf); 12820 12821 12822 if ((pg = scf_pg_create(g_hndl)) == NULL || 12823 (prop = scf_property_create(g_hndl)) == NULL || 12824 (val = scf_value_create(g_hndl)) == NULL || 12825 (iter = scf_iter_create(g_hndl)) == NULL || 12826 (piter = scf_iter_create(g_hndl)) == NULL || 12827 (viter = scf_iter_create(g_hndl)) == NULL) 12828 scfdie(); 12829 12830 buf = safe_malloc(max_scf_name_len + 1); 12831 tybuf = safe_malloc(max_scf_pg_type_len + 1); 12832 pname = safe_malloc(max_scf_name_len + 1); 12833 12834 if (cur_inst != NULL) 12835 ret = scf_iter_instance_pgs(iter, cur_inst); 12836 else 12837 ret = scf_iter_service_pgs(iter, cur_svc); 12838 if (ret != SCF_SUCCESS) 12839 scfdie(); 12840 12841 while ((ret = scf_iter_next_pg(iter, pg)) == 1) { 12842 int ret2; 12843 12844 /* 12845 * # delprop pg 12846 * # addpg pg type 12847 */ 12848 if (scf_pg_get_name(pg, buf, max_scf_name_len + 1) < 0) 12849 scfdie(); 12850 12851 if (scf_pg_get_type(pg, tybuf, max_scf_pg_type_len + 1) < 0) 12852 scfdie(); 12853 12854 if (fprintf(strm, "# Property group \"%s\"\n" 12855 "# delprop %s\n" 12856 "# addpg %s %s\n", buf, buf, buf, tybuf) < 0) { 12857 warn(emsg_write_error, strerror(errno)); 12858 result = -1; 12859 goto out; 12860 } 12861 12862 /* # setprop pg/prop = (values) */ 12863 12864 if (scf_iter_pg_properties(piter, pg) != SCF_SUCCESS) 12865 scfdie(); 12866 12867 while ((ret2 = scf_iter_next_property(piter, prop)) == 1) { 12868 int first = 1; 12869 int ret3; 12870 int multiple; 12871 int is_str; 12872 scf_type_t bty; 12873 12874 if (scf_property_get_name(prop, pname, 12875 max_scf_name_len + 1) < 0) 12876 scfdie(); 12877 12878 if (scf_property_type(prop, &ty) != 0) 12879 scfdie(); 12880 12881 multiple = prop_has_multiple_values(prop, val); 12882 12883 if (fprintf(strm, "# setprop %s/%s = %s: %s", buf, 12884 pname, scf_type_to_string(ty), multiple ? "(" : "") 12885 < 0) { 12886 warn(emsg_write_error, strerror(errno)); 12887 result = -1; 12888 goto out; 12889 } 12890 12891 (void) scf_type_base_type(ty, &bty); 12892 is_str = (bty == SCF_TYPE_ASTRING); 12893 12894 if (scf_iter_property_values(viter, prop) != 12895 SCF_SUCCESS) 12896 scfdie(); 12897 12898 while ((ret3 = scf_iter_next_value(viter, val)) == 1) { 12899 char *buf; 12900 ssize_t buflen; 12901 12902 buflen = scf_value_get_as_string(val, NULL, 0); 12903 if (buflen < 0) 12904 scfdie(); 12905 12906 buf = safe_malloc(buflen + 1); 12907 12908 if (scf_value_get_as_string(val, buf, 12909 buflen + 1) < 0) 12910 scfdie(); 12911 12912 if (first) 12913 first = 0; 12914 else { 12915 if (putc(' ', strm) != ' ') { 12916 warn(emsg_write_error, 12917 strerror(errno)); 12918 result = -1; 12919 goto out; 12920 } 12921 } 12922 12923 if ((is_str && multiple) || 12924 strpbrk(buf, CHARS_TO_QUOTE) != NULL) { 12925 (void) putc('"', strm); 12926 (void) quote_and_print(buf, strm, 1); 12927 (void) putc('"', strm); 12928 12929 if (ferror(strm)) { 12930 warn(emsg_write_error, 12931 strerror(errno)); 12932 result = -1; 12933 goto out; 12934 } 12935 } else { 12936 if (fprintf(strm, "%s", buf) < 0) { 12937 warn(emsg_write_error, 12938 strerror(errno)); 12939 result = -1; 12940 goto out; 12941 } 12942 } 12943 12944 free(buf); 12945 } 12946 if (ret3 < 0 && 12947 scf_error() != SCF_ERROR_PERMISSION_DENIED) 12948 scfdie(); 12949 12950 /* Write closing paren if mult-value property */ 12951 if ((multiple && putc(')', strm) == EOF) || 12952 12953 /* Write final newline */ 12954 fputc('\n', strm) == EOF) { 12955 warn(emsg_write_error, strerror(errno)); 12956 result = -1; 12957 goto out; 12958 } 12959 } 12960 if (ret2 < 0) 12961 scfdie(); 12962 12963 if (fputc('\n', strm) == EOF) { 12964 warn(emsg_write_error, strerror(errno)); 12965 result = -1; 12966 goto out; 12967 } 12968 } 12969 if (ret < 0) 12970 scfdie(); 12971 12972 out: 12973 free(pname); 12974 free(tybuf); 12975 free(buf); 12976 scf_iter_destroy(viter); 12977 scf_iter_destroy(piter); 12978 scf_iter_destroy(iter); 12979 scf_value_destroy(val); 12980 scf_property_destroy(prop); 12981 scf_pg_destroy(pg); 12982 12983 if (result == 0) { 12984 if (fflush(strm) != 0) { 12985 warn(emsg_write_error, strerror(errno)); 12986 return (-1); 12987 } 12988 } 12989 12990 return (result); 12991 } 12992 12993 int 12994 lscf_editprop() 12995 { 12996 char *buf, *editor; 12997 size_t bufsz; 12998 int tmpfd; 12999 char tempname[] = TEMP_FILE_PATTERN; 13000 13001 lscf_prep_hndl(); 13002 13003 if (cur_snap != NULL) { 13004 semerr(emsg_cant_modify_snapshots); 13005 return (-1); 13006 } 13007 13008 if (cur_svc == NULL && cur_inst == NULL) { 13009 semerr(emsg_entity_not_selected); 13010 return (-1); 13011 } 13012 13013 tmpfd = mkstemp(tempname); 13014 if (tmpfd == -1) { 13015 semerr(gettext("Could not create temporary file.\n")); 13016 return (-1); 13017 } 13018 13019 (void) strcpy(tempfilename, tempname); 13020 13021 tempfile = fdopen(tmpfd, "r+"); 13022 if (tempfile == NULL) { 13023 warn(gettext("Could not create temporary file.\n")); 13024 if (close(tmpfd) == -1) 13025 warn(gettext("Could not close temporary file: %s.\n"), 13026 strerror(errno)); 13027 13028 remove_tempfile(); 13029 13030 return (-1); 13031 } 13032 13033 if (write_edit_script(tempfile) == -1) { 13034 remove_tempfile(); 13035 return (-1); 13036 } 13037 13038 editor = getenv("EDITOR"); 13039 if (editor == NULL) 13040 editor = "vi"; 13041 13042 bufsz = strlen(editor) + 1 + strlen(tempname) + 1; 13043 buf = safe_malloc(bufsz); 13044 13045 if (snprintf(buf, bufsz, "%s %s", editor, tempname) < 0) 13046 uu_die(gettext("Error creating editor command")); 13047 13048 if (system(buf) == -1) { 13049 semerr(gettext("Could not launch editor %s: %s\n"), editor, 13050 strerror(errno)); 13051 free(buf); 13052 remove_tempfile(); 13053 return (-1); 13054 } 13055 13056 free(buf); 13057 13058 (void) engine_source(tempname, est->sc_cmd_flags & SC_CMD_IACTIVE); 13059 13060 remove_tempfile(); 13061 13062 return (0); 13063 } 13064 13065 static void 13066 add_string(uu_list_t *strlist, const char *str) 13067 { 13068 string_list_t *elem; 13069 elem = safe_malloc(sizeof (*elem)); 13070 uu_list_node_init(elem, &elem->node, string_pool); 13071 elem->str = safe_strdup(str); 13072 if (uu_list_append(strlist, elem) != 0) 13073 uu_die(gettext("libuutil error: %s\n"), 13074 uu_strerror(uu_error())); 13075 } 13076 13077 /* 13078 * Get all property values that don't match the given glob pattern, 13079 * if a pattern is specified. 13080 */ 13081 static void 13082 get_prop_values(scf_property_t *prop, uu_list_t *values, 13083 const char *pattern) 13084 { 13085 scf_iter_t *iter; 13086 scf_value_t *val; 13087 int ret; 13088 13089 if ((iter = scf_iter_create(g_hndl)) == NULL || 13090 (val = scf_value_create(g_hndl)) == NULL) 13091 scfdie(); 13092 13093 if (scf_iter_property_values(iter, prop) != 0) 13094 scfdie(); 13095 13096 while ((ret = scf_iter_next_value(iter, val)) == 1) { 13097 char *buf; 13098 ssize_t vlen, szret; 13099 13100 vlen = scf_value_get_as_string(val, NULL, 0); 13101 if (vlen < 0) 13102 scfdie(); 13103 13104 buf = safe_malloc(vlen + 1); 13105 13106 szret = scf_value_get_as_string(val, buf, vlen + 1); 13107 if (szret < 0) 13108 scfdie(); 13109 assert(szret <= vlen); 13110 13111 if (pattern == NULL || fnmatch(pattern, buf, 0) != 0) 13112 add_string(values, buf); 13113 13114 free(buf); 13115 } 13116 13117 if (ret == -1) 13118 scfdie(); 13119 13120 scf_value_destroy(val); 13121 scf_iter_destroy(iter); 13122 } 13123 13124 static int 13125 lscf_setpropvalue(const char *pgname, const char *type, 13126 const char *arg, int isadd, int isnotfoundok) 13127 { 13128 scf_type_t ty; 13129 scf_propertygroup_t *pg; 13130 scf_property_t *prop; 13131 int ret, result = 0; 13132 scf_transaction_t *tx; 13133 scf_transaction_entry_t *e; 13134 scf_value_t *v; 13135 string_list_t *sp; 13136 char *propname; 13137 uu_list_t *values; 13138 uu_list_walk_t *walk; 13139 void *cookie = NULL; 13140 char *pattern = NULL; 13141 13142 lscf_prep_hndl(); 13143 13144 if ((values = uu_list_create(string_pool, NULL, 0)) == NULL) 13145 uu_die(gettext("Could not create property list: %s\n"), 13146 uu_strerror(uu_error())); 13147 13148 if (!isadd) 13149 pattern = safe_strdup(arg); 13150 13151 if ((e = scf_entry_create(g_hndl)) == NULL || 13152 (pg = scf_pg_create(g_hndl)) == NULL || 13153 (prop = scf_property_create(g_hndl)) == NULL || 13154 (tx = scf_transaction_create(g_hndl)) == NULL) 13155 scfdie(); 13156 13157 if (cur_snap != NULL) { 13158 semerr(emsg_cant_modify_snapshots); 13159 goto fail; 13160 } 13161 13162 if (cur_inst == NULL && cur_svc == NULL) { 13163 semerr(emsg_entity_not_selected); 13164 goto fail; 13165 } 13166 13167 propname = strchr(pgname, '/'); 13168 if (propname == NULL) { 13169 semerr(gettext("Property names must contain a `/'.\n")); 13170 goto fail; 13171 } 13172 13173 *propname = '\0'; 13174 ++propname; 13175 13176 if (type != NULL) { 13177 ty = string_to_type(type); 13178 if (ty == SCF_TYPE_INVALID) { 13179 semerr(gettext("Unknown type \"%s\".\n"), type); 13180 goto fail; 13181 } 13182 } 13183 13184 if (cur_inst != NULL) 13185 ret = scf_instance_get_pg(cur_inst, pgname, pg); 13186 else 13187 ret = scf_service_get_pg(cur_svc, pgname, pg); 13188 if (ret != 0) { 13189 switch (scf_error()) { 13190 case SCF_ERROR_NOT_FOUND: 13191 if (isnotfoundok) { 13192 result = 0; 13193 } else { 13194 semerr(emsg_no_such_pg, pgname); 13195 result = -1; 13196 } 13197 goto out; 13198 13199 case SCF_ERROR_INVALID_ARGUMENT: 13200 semerr(emsg_invalid_pg_name, pgname); 13201 goto fail; 13202 13203 default: 13204 scfdie(); 13205 } 13206 } 13207 13208 do { 13209 if (scf_pg_update(pg) == -1) 13210 scfdie(); 13211 if (scf_transaction_start(tx, pg) != 0) { 13212 if (scf_error() != SCF_ERROR_PERMISSION_DENIED) 13213 scfdie(); 13214 13215 semerr(emsg_permission_denied); 13216 goto fail; 13217 } 13218 13219 ret = scf_pg_get_property(pg, propname, prop); 13220 if (ret == 0) { 13221 scf_type_t ptype; 13222 char *pat = pattern; 13223 13224 if (scf_property_type(prop, &ptype) != 0) 13225 scfdie(); 13226 13227 if (isadd) { 13228 if (type != NULL && ptype != ty) { 13229 semerr(gettext("Property \"%s\" is not " 13230 "of type \"%s\".\n"), propname, 13231 type); 13232 goto fail; 13233 } 13234 13235 pat = NULL; 13236 } else { 13237 size_t len = strlen(pat); 13238 if (len > 0 && pat[len - 1] == '\"') 13239 pat[len - 1] = '\0'; 13240 if (len > 0 && pat[0] == '\"') 13241 pat++; 13242 } 13243 13244 ty = ptype; 13245 13246 get_prop_values(prop, values, pat); 13247 13248 if (isadd) 13249 add_string(values, arg); 13250 13251 if (scf_transaction_property_change(tx, e, 13252 propname, ty) == -1) 13253 scfdie(); 13254 } else if (scf_error() == SCF_ERROR_NOT_FOUND) { 13255 if (isadd) { 13256 if (type == NULL) { 13257 semerr(gettext("Type required " 13258 "for new properties.\n")); 13259 goto fail; 13260 } 13261 13262 add_string(values, arg); 13263 13264 if (scf_transaction_property_new(tx, e, 13265 propname, ty) == -1) 13266 scfdie(); 13267 } else if (isnotfoundok) { 13268 result = 0; 13269 goto out; 13270 } else { 13271 semerr(gettext("No such property %s/%s.\n"), 13272 pgname, propname); 13273 result = -1; 13274 goto out; 13275 } 13276 } else if (scf_error() == SCF_ERROR_INVALID_ARGUMENT) { 13277 semerr(emsg_invalid_prop_name, propname); 13278 goto fail; 13279 } else { 13280 scfdie(); 13281 } 13282 13283 walk = uu_list_walk_start(values, UU_DEFAULT); 13284 if (walk == NULL) 13285 uu_die(gettext("Could not walk property list.\n")); 13286 13287 for (sp = uu_list_walk_next(walk); sp != NULL; 13288 sp = uu_list_walk_next(walk)) { 13289 v = string_to_value(sp->str, ty, 0); 13290 13291 if (v == NULL) { 13292 scf_entry_destroy_children(e); 13293 goto fail; 13294 } 13295 ret = scf_entry_add_value(e, v); 13296 assert(ret == 0); 13297 } 13298 uu_list_walk_end(walk); 13299 13300 result = scf_transaction_commit(tx); 13301 13302 scf_transaction_reset(tx); 13303 scf_entry_destroy_children(e); 13304 } while (result == 0); 13305 13306 if (result < 0) { 13307 if (scf_error() != SCF_ERROR_PERMISSION_DENIED) 13308 scfdie(); 13309 13310 semerr(emsg_permission_denied); 13311 goto fail; 13312 } 13313 13314 result = 0; 13315 13316 private_refresh(); 13317 13318 out: 13319 scf_transaction_destroy(tx); 13320 scf_entry_destroy(e); 13321 scf_pg_destroy(pg); 13322 scf_property_destroy(prop); 13323 free(pattern); 13324 13325 while ((sp = uu_list_teardown(values, &cookie)) != NULL) { 13326 free(sp->str); 13327 free(sp); 13328 } 13329 13330 uu_list_destroy(values); 13331 13332 return (result); 13333 13334 fail: 13335 result = -1; 13336 goto out; 13337 } 13338 13339 int 13340 lscf_addpropvalue(const char *pgname, const char *type, const char *value) 13341 { 13342 return (lscf_setpropvalue(pgname, type, value, 1, 0)); 13343 } 13344 13345 int 13346 lscf_delpropvalue(const char *pgname, const char *pattern, int isnotfoundok) 13347 { 13348 return (lscf_setpropvalue(pgname, NULL, pattern, 0, isnotfoundok)); 13349 } 13350 13351 /* 13352 * Look for a standard start method, first in the instance (if any), 13353 * then the service. 13354 */ 13355 static const char * 13356 start_method_name(int *in_instance) 13357 { 13358 scf_propertygroup_t *pg; 13359 char **p; 13360 int ret; 13361 scf_instance_t *inst = cur_inst; 13362 13363 if ((pg = scf_pg_create(g_hndl)) == NULL) 13364 scfdie(); 13365 13366 again: 13367 for (p = start_method_names; *p != NULL; p++) { 13368 if (inst != NULL) 13369 ret = scf_instance_get_pg(inst, *p, pg); 13370 else 13371 ret = scf_service_get_pg(cur_svc, *p, pg); 13372 13373 if (ret == 0) { 13374 size_t bufsz = strlen(SCF_GROUP_METHOD) + 1; 13375 char *buf = safe_malloc(bufsz); 13376 13377 if ((ret = scf_pg_get_type(pg, buf, bufsz)) < 0) { 13378 free(buf); 13379 continue; 13380 } 13381 if (strcmp(buf, SCF_GROUP_METHOD) != 0) { 13382 free(buf); 13383 continue; 13384 } 13385 13386 free(buf); 13387 *in_instance = (inst != NULL); 13388 scf_pg_destroy(pg); 13389 return (*p); 13390 } 13391 13392 if (scf_error() == SCF_ERROR_NOT_FOUND) 13393 continue; 13394 13395 scfdie(); 13396 } 13397 13398 if (inst != NULL) { 13399 inst = NULL; 13400 goto again; 13401 } 13402 13403 scf_pg_destroy(pg); 13404 return (NULL); 13405 } 13406 13407 static int 13408 addpg(const char *name, const char *type) 13409 { 13410 scf_propertygroup_t *pg; 13411 int ret; 13412 13413 pg = scf_pg_create(g_hndl); 13414 if (pg == NULL) 13415 scfdie(); 13416 13417 if (cur_inst != NULL) 13418 ret = scf_instance_add_pg(cur_inst, name, type, 0, pg); 13419 else 13420 ret = scf_service_add_pg(cur_svc, name, type, 0, pg); 13421 13422 if (ret != 0) { 13423 switch (scf_error()) { 13424 case SCF_ERROR_EXISTS: 13425 ret = 0; 13426 break; 13427 13428 case SCF_ERROR_PERMISSION_DENIED: 13429 semerr(emsg_permission_denied); 13430 break; 13431 13432 default: 13433 scfdie(); 13434 } 13435 } 13436 13437 scf_pg_destroy(pg); 13438 return (ret); 13439 } 13440 13441 int 13442 lscf_setenv(uu_list_t *args, int isunset) 13443 { 13444 int ret = 0; 13445 size_t i; 13446 int argc; 13447 char **argv = NULL; 13448 string_list_t *slp; 13449 char *pattern; 13450 char *prop; 13451 int do_service = 0; 13452 int do_instance = 0; 13453 const char *method = NULL; 13454 const char *name = NULL; 13455 const char *value = NULL; 13456 scf_instance_t *saved_cur_inst = cur_inst; 13457 13458 lscf_prep_hndl(); 13459 13460 argc = uu_list_numnodes(args); 13461 if (argc < 1) 13462 goto usage; 13463 13464 argv = calloc(argc + 1, sizeof (char *)); 13465 if (argv == NULL) 13466 uu_die(gettext("Out of memory.\n")); 13467 13468 for (slp = uu_list_first(args), i = 0; 13469 slp != NULL; 13470 slp = uu_list_next(args, slp), ++i) 13471 argv[i] = slp->str; 13472 13473 argv[i] = NULL; 13474 13475 opterr = 0; 13476 optind = 0; 13477 for (;;) { 13478 ret = getopt(argc, argv, "sim:"); 13479 if (ret == -1) 13480 break; 13481 13482 switch (ret) { 13483 case 's': 13484 do_service = 1; 13485 cur_inst = NULL; 13486 break; 13487 13488 case 'i': 13489 do_instance = 1; 13490 break; 13491 13492 case 'm': 13493 method = optarg; 13494 break; 13495 13496 case '?': 13497 goto usage; 13498 13499 default: 13500 bad_error("getopt", ret); 13501 } 13502 } 13503 13504 argc -= optind; 13505 if ((do_service && do_instance) || 13506 (isunset && argc != 1) || 13507 (!isunset && argc != 2)) 13508 goto usage; 13509 13510 name = argv[optind]; 13511 if (!isunset) 13512 value = argv[optind + 1]; 13513 13514 if (cur_snap != NULL) { 13515 semerr(emsg_cant_modify_snapshots); 13516 ret = -1; 13517 goto out; 13518 } 13519 13520 if (cur_inst == NULL && cur_svc == NULL) { 13521 semerr(emsg_entity_not_selected); 13522 ret = -1; 13523 goto out; 13524 } 13525 13526 if (do_instance && cur_inst == NULL) { 13527 semerr(gettext("No instance is selected.\n")); 13528 ret = -1; 13529 goto out; 13530 } 13531 13532 if (do_service && cur_svc == NULL) { 13533 semerr(gettext("No service is selected.\n")); 13534 ret = -1; 13535 goto out; 13536 } 13537 13538 if (method == NULL) { 13539 if (do_instance || do_service) { 13540 method = "method_context"; 13541 if (!isunset) { 13542 ret = addpg("method_context", 13543 SCF_GROUP_FRAMEWORK); 13544 if (ret != 0) 13545 goto out; 13546 } 13547 } else { 13548 int in_instance; 13549 method = start_method_name(&in_instance); 13550 if (method == NULL) { 13551 semerr(gettext( 13552 "Couldn't find start method; please " 13553 "specify a method with '-m'.\n")); 13554 ret = -1; 13555 goto out; 13556 } 13557 if (!in_instance) 13558 cur_inst = NULL; 13559 } 13560 } else { 13561 scf_propertygroup_t *pg; 13562 size_t bufsz; 13563 char *buf; 13564 int ret; 13565 13566 if ((pg = scf_pg_create(g_hndl)) == NULL) 13567 scfdie(); 13568 13569 if (cur_inst != NULL) 13570 ret = scf_instance_get_pg(cur_inst, method, pg); 13571 else 13572 ret = scf_service_get_pg(cur_svc, method, pg); 13573 13574 if (ret != 0) { 13575 scf_pg_destroy(pg); 13576 switch (scf_error()) { 13577 case SCF_ERROR_NOT_FOUND: 13578 semerr(gettext("Couldn't find the method " 13579 "\"%s\".\n"), method); 13580 goto out; 13581 13582 case SCF_ERROR_INVALID_ARGUMENT: 13583 semerr(gettext("Invalid method name \"%s\".\n"), 13584 method); 13585 goto out; 13586 13587 default: 13588 scfdie(); 13589 } 13590 } 13591 13592 bufsz = strlen(SCF_GROUP_METHOD) + 1; 13593 buf = safe_malloc(bufsz); 13594 13595 if (scf_pg_get_type(pg, buf, bufsz) < 0 || 13596 strcmp(buf, SCF_GROUP_METHOD) != 0) { 13597 semerr(gettext("Property group \"%s\" is not of type " 13598 "\"method\".\n"), method); 13599 ret = -1; 13600 free(buf); 13601 scf_pg_destroy(pg); 13602 goto out; 13603 } 13604 13605 free(buf); 13606 scf_pg_destroy(pg); 13607 } 13608 13609 prop = uu_msprintf("%s/environment", method); 13610 pattern = uu_msprintf("%s=*", name); 13611 13612 if (prop == NULL || pattern == NULL) 13613 uu_die(gettext("Out of memory.\n")); 13614 13615 ret = lscf_delpropvalue(prop, pattern, !isunset); 13616 13617 if (ret == 0 && !isunset) { 13618 uu_free(pattern); 13619 uu_free(prop); 13620 prop = uu_msprintf("%s/environment", method); 13621 pattern = uu_msprintf("%s=%s", name, value); 13622 if (prop == NULL || pattern == NULL) 13623 uu_die(gettext("Out of memory.\n")); 13624 ret = lscf_addpropvalue(prop, "astring:", pattern); 13625 } 13626 uu_free(pattern); 13627 uu_free(prop); 13628 13629 out: 13630 cur_inst = saved_cur_inst; 13631 13632 free(argv); 13633 return (ret); 13634 usage: 13635 ret = -2; 13636 goto out; 13637 } 13638 13639 /* 13640 * Snapshot commands 13641 */ 13642 13643 void 13644 lscf_listsnap() 13645 { 13646 scf_snapshot_t *snap; 13647 scf_iter_t *iter; 13648 char *nb; 13649 int r; 13650 13651 lscf_prep_hndl(); 13652 13653 if (cur_inst == NULL) { 13654 semerr(gettext("Instance not selected.\n")); 13655 return; 13656 } 13657 13658 if ((snap = scf_snapshot_create(g_hndl)) == NULL || 13659 (iter = scf_iter_create(g_hndl)) == NULL) 13660 scfdie(); 13661 13662 if (scf_iter_instance_snapshots(iter, cur_inst) != SCF_SUCCESS) 13663 scfdie(); 13664 13665 nb = safe_malloc(max_scf_name_len + 1); 13666 13667 while ((r = scf_iter_next_snapshot(iter, snap)) == 1) { 13668 if (scf_snapshot_get_name(snap, nb, max_scf_name_len + 1) < 0) 13669 scfdie(); 13670 13671 (void) puts(nb); 13672 } 13673 if (r < 0) 13674 scfdie(); 13675 13676 free(nb); 13677 scf_iter_destroy(iter); 13678 scf_snapshot_destroy(snap); 13679 } 13680 13681 void 13682 lscf_selectsnap(const char *name) 13683 { 13684 scf_snapshot_t *snap; 13685 scf_snaplevel_t *level; 13686 13687 lscf_prep_hndl(); 13688 13689 if (cur_inst == NULL) { 13690 semerr(gettext("Instance not selected.\n")); 13691 return; 13692 } 13693 13694 if (cur_snap != NULL) { 13695 if (name != NULL) { 13696 char *cur_snap_name; 13697 boolean_t nochange; 13698 13699 cur_snap_name = safe_malloc(max_scf_name_len + 1); 13700 13701 if (scf_snapshot_get_name(cur_snap, cur_snap_name, 13702 max_scf_name_len + 1) < 0) 13703 scfdie(); 13704 13705 nochange = strcmp(name, cur_snap_name) == 0; 13706 13707 free(cur_snap_name); 13708 13709 if (nochange) 13710 return; 13711 } 13712 13713 unselect_cursnap(); 13714 } 13715 13716 if (name == NULL) 13717 return; 13718 13719 if ((snap = scf_snapshot_create(g_hndl)) == NULL || 13720 (level = scf_snaplevel_create(g_hndl)) == NULL) 13721 scfdie(); 13722 13723 if (scf_instance_get_snapshot(cur_inst, name, snap) != 13724 SCF_SUCCESS) { 13725 switch (scf_error()) { 13726 case SCF_ERROR_INVALID_ARGUMENT: 13727 semerr(gettext("Invalid name \"%s\".\n"), name); 13728 break; 13729 13730 case SCF_ERROR_NOT_FOUND: 13731 semerr(gettext("No such snapshot \"%s\".\n"), name); 13732 break; 13733 13734 default: 13735 scfdie(); 13736 } 13737 13738 scf_snaplevel_destroy(level); 13739 scf_snapshot_destroy(snap); 13740 return; 13741 } 13742 13743 /* Load the snaplevels into our list. */ 13744 cur_levels = uu_list_create(snaplevel_pool, NULL, 0); 13745 if (cur_levels == NULL) 13746 uu_die(gettext("Could not create list: %s\n"), 13747 uu_strerror(uu_error())); 13748 13749 if (scf_snapshot_get_base_snaplevel(snap, level) != SCF_SUCCESS) { 13750 if (scf_error() != SCF_ERROR_NOT_FOUND) 13751 scfdie(); 13752 13753 semerr(gettext("Snapshot has no snaplevels.\n")); 13754 13755 scf_snaplevel_destroy(level); 13756 scf_snapshot_destroy(snap); 13757 return; 13758 } 13759 13760 cur_snap = snap; 13761 13762 for (;;) { 13763 cur_elt = safe_malloc(sizeof (*cur_elt)); 13764 uu_list_node_init(cur_elt, &cur_elt->list_node, 13765 snaplevel_pool); 13766 cur_elt->sl = level; 13767 if (uu_list_insert_after(cur_levels, NULL, cur_elt) != 0) 13768 uu_die(gettext("libuutil error: %s\n"), 13769 uu_strerror(uu_error())); 13770 13771 level = scf_snaplevel_create(g_hndl); 13772 if (level == NULL) 13773 scfdie(); 13774 13775 if (scf_snaplevel_get_next_snaplevel(cur_elt->sl, 13776 level) != SCF_SUCCESS) { 13777 if (scf_error() != SCF_ERROR_NOT_FOUND) 13778 scfdie(); 13779 13780 scf_snaplevel_destroy(level); 13781 break; 13782 } 13783 } 13784 13785 cur_elt = uu_list_last(cur_levels); 13786 cur_level = cur_elt->sl; 13787 } 13788 13789 /* 13790 * Copies the properties & values in src to dst. Assumes src won't change. 13791 * Returns -1 if permission is denied, -2 if another transaction interrupts, 13792 * and 0 on success. 13793 * 13794 * If enabled is 0 or 1, its value is used for the SCF_PROPERTY_ENABLED 13795 * property, if it is copied and has type boolean. (See comment in 13796 * lscf_revert()). 13797 */ 13798 static int 13799 pg_copy(const scf_propertygroup_t *src, scf_propertygroup_t *dst, 13800 uint8_t enabled) 13801 { 13802 scf_transaction_t *tx; 13803 scf_iter_t *iter, *viter; 13804 scf_property_t *prop; 13805 scf_value_t *v; 13806 char *nbuf; 13807 int r; 13808 13809 tx = scf_transaction_create(g_hndl); 13810 if (tx == NULL) 13811 scfdie(); 13812 13813 if (scf_transaction_start(tx, dst) != SCF_SUCCESS) { 13814 if (scf_error() != SCF_ERROR_PERMISSION_DENIED) 13815 scfdie(); 13816 13817 scf_transaction_destroy(tx); 13818 13819 return (-1); 13820 } 13821 13822 if ((iter = scf_iter_create(g_hndl)) == NULL || 13823 (prop = scf_property_create(g_hndl)) == NULL || 13824 (viter = scf_iter_create(g_hndl)) == NULL) 13825 scfdie(); 13826 13827 nbuf = safe_malloc(max_scf_name_len + 1); 13828 13829 if (scf_iter_pg_properties(iter, src) != SCF_SUCCESS) 13830 scfdie(); 13831 13832 for (;;) { 13833 scf_transaction_entry_t *e; 13834 scf_type_t ty; 13835 13836 r = scf_iter_next_property(iter, prop); 13837 if (r == -1) 13838 scfdie(); 13839 if (r == 0) 13840 break; 13841 13842 e = scf_entry_create(g_hndl); 13843 if (e == NULL) 13844 scfdie(); 13845 13846 if (scf_property_type(prop, &ty) != SCF_SUCCESS) 13847 scfdie(); 13848 13849 if (scf_property_get_name(prop, nbuf, max_scf_name_len + 1) < 0) 13850 scfdie(); 13851 13852 if (scf_transaction_property_new(tx, e, nbuf, 13853 ty) != SCF_SUCCESS) 13854 scfdie(); 13855 13856 if ((enabled == 0 || enabled == 1) && 13857 strcmp(nbuf, scf_property_enabled) == 0 && 13858 ty == SCF_TYPE_BOOLEAN) { 13859 v = scf_value_create(g_hndl); 13860 if (v == NULL) 13861 scfdie(); 13862 13863 scf_value_set_boolean(v, enabled); 13864 13865 if (scf_entry_add_value(e, v) != 0) 13866 scfdie(); 13867 } else { 13868 if (scf_iter_property_values(viter, prop) != 0) 13869 scfdie(); 13870 13871 for (;;) { 13872 v = scf_value_create(g_hndl); 13873 if (v == NULL) 13874 scfdie(); 13875 13876 r = scf_iter_next_value(viter, v); 13877 if (r == -1) 13878 scfdie(); 13879 if (r == 0) { 13880 scf_value_destroy(v); 13881 break; 13882 } 13883 13884 if (scf_entry_add_value(e, v) != SCF_SUCCESS) 13885 scfdie(); 13886 } 13887 } 13888 } 13889 13890 free(nbuf); 13891 scf_iter_destroy(viter); 13892 scf_property_destroy(prop); 13893 scf_iter_destroy(iter); 13894 13895 r = scf_transaction_commit(tx); 13896 if (r == -1 && scf_error() != SCF_ERROR_PERMISSION_DENIED) 13897 scfdie(); 13898 13899 scf_transaction_destroy_children(tx); 13900 scf_transaction_destroy(tx); 13901 13902 switch (r) { 13903 case 1: return (0); 13904 case 0: return (-2); 13905 case -1: return (-1); 13906 13907 default: 13908 abort(); 13909 } 13910 13911 /* NOTREACHED */ 13912 } 13913 13914 void 13915 lscf_revert(const char *snapname) 13916 { 13917 scf_snapshot_t *snap, *prev; 13918 scf_snaplevel_t *level, *nlevel; 13919 scf_iter_t *iter; 13920 scf_propertygroup_t *pg, *npg; 13921 scf_property_t *prop; 13922 scf_value_t *val; 13923 char *nbuf, *tbuf; 13924 uint8_t enabled; 13925 13926 lscf_prep_hndl(); 13927 13928 if (cur_inst == NULL) { 13929 semerr(gettext("Instance not selected.\n")); 13930 return; 13931 } 13932 13933 if (snapname != NULL) { 13934 snap = scf_snapshot_create(g_hndl); 13935 if (snap == NULL) 13936 scfdie(); 13937 13938 if (scf_instance_get_snapshot(cur_inst, snapname, snap) != 13939 SCF_SUCCESS) { 13940 switch (scf_error()) { 13941 case SCF_ERROR_INVALID_ARGUMENT: 13942 semerr(gettext("Invalid snapshot name " 13943 "\"%s\".\n"), snapname); 13944 break; 13945 13946 case SCF_ERROR_NOT_FOUND: 13947 semerr(gettext("No such snapshot.\n")); 13948 break; 13949 13950 default: 13951 scfdie(); 13952 } 13953 13954 scf_snapshot_destroy(snap); 13955 return; 13956 } 13957 } else { 13958 if (cur_snap != NULL) { 13959 snap = cur_snap; 13960 } else { 13961 semerr(gettext("No snapshot selected.\n")); 13962 return; 13963 } 13964 } 13965 13966 if ((prev = scf_snapshot_create(g_hndl)) == NULL || 13967 (level = scf_snaplevel_create(g_hndl)) == NULL || 13968 (iter = scf_iter_create(g_hndl)) == NULL || 13969 (pg = scf_pg_create(g_hndl)) == NULL || 13970 (npg = scf_pg_create(g_hndl)) == NULL || 13971 (prop = scf_property_create(g_hndl)) == NULL || 13972 (val = scf_value_create(g_hndl)) == NULL) 13973 scfdie(); 13974 13975 nbuf = safe_malloc(max_scf_name_len + 1); 13976 tbuf = safe_malloc(max_scf_pg_type_len + 1); 13977 13978 /* Take the "previous" snapshot before we blow away the properties. */ 13979 if (scf_instance_get_snapshot(cur_inst, snap_previous, prev) == 0) { 13980 if (_scf_snapshot_take_attach(cur_inst, prev) != 0) 13981 scfdie(); 13982 } else { 13983 if (scf_error() != SCF_ERROR_NOT_FOUND) 13984 scfdie(); 13985 13986 if (_scf_snapshot_take_new(cur_inst, snap_previous, prev) != 0) 13987 scfdie(); 13988 } 13989 13990 /* Save general/enabled, since we're probably going to replace it. */ 13991 enabled = 2; 13992 if (scf_instance_get_pg(cur_inst, scf_pg_general, pg) == 0 && 13993 scf_pg_get_property(pg, scf_property_enabled, prop) == 0 && 13994 scf_property_get_value(prop, val) == 0) 13995 (void) scf_value_get_boolean(val, &enabled); 13996 13997 if (scf_snapshot_get_base_snaplevel(snap, level) != SCF_SUCCESS) { 13998 if (scf_error() != SCF_ERROR_NOT_FOUND) 13999 scfdie(); 14000 14001 goto out; 14002 } 14003 14004 for (;;) { 14005 boolean_t isinst; 14006 uint32_t flags; 14007 int r; 14008 14009 /* Clear the properties from the corresponding entity. */ 14010 isinst = snaplevel_is_instance(level); 14011 14012 if (!isinst) 14013 r = scf_iter_service_pgs(iter, cur_svc); 14014 else 14015 r = scf_iter_instance_pgs(iter, cur_inst); 14016 if (r != SCF_SUCCESS) 14017 scfdie(); 14018 14019 while ((r = scf_iter_next_pg(iter, pg)) == 1) { 14020 if (scf_pg_get_flags(pg, &flags) != SCF_SUCCESS) 14021 scfdie(); 14022 14023 /* Skip nonpersistent pgs. */ 14024 if (flags & SCF_PG_FLAG_NONPERSISTENT) 14025 continue; 14026 14027 if (scf_pg_delete(pg) != SCF_SUCCESS) { 14028 if (scf_error() != SCF_ERROR_PERMISSION_DENIED) 14029 scfdie(); 14030 14031 semerr(emsg_permission_denied); 14032 goto out; 14033 } 14034 } 14035 if (r == -1) 14036 scfdie(); 14037 14038 /* Copy the properties to the corresponding entity. */ 14039 if (scf_iter_snaplevel_pgs(iter, level) != SCF_SUCCESS) 14040 scfdie(); 14041 14042 while ((r = scf_iter_next_pg(iter, pg)) == 1) { 14043 if (scf_pg_get_name(pg, nbuf, max_scf_name_len + 1) < 0) 14044 scfdie(); 14045 14046 if (scf_pg_get_type(pg, tbuf, max_scf_pg_type_len + 1) < 14047 0) 14048 scfdie(); 14049 14050 if (scf_pg_get_flags(pg, &flags) != SCF_SUCCESS) 14051 scfdie(); 14052 14053 if (!isinst) 14054 r = scf_service_add_pg(cur_svc, nbuf, tbuf, 14055 flags, npg); 14056 else 14057 r = scf_instance_add_pg(cur_inst, nbuf, tbuf, 14058 flags, npg); 14059 if (r != SCF_SUCCESS) { 14060 if (scf_error() != SCF_ERROR_PERMISSION_DENIED) 14061 scfdie(); 14062 14063 semerr(emsg_permission_denied); 14064 goto out; 14065 } 14066 14067 if ((enabled == 0 || enabled == 1) && 14068 strcmp(nbuf, scf_pg_general) == 0) 14069 r = pg_copy(pg, npg, enabled); 14070 else 14071 r = pg_copy(pg, npg, 2); 14072 14073 switch (r) { 14074 case 0: 14075 break; 14076 14077 case -1: 14078 semerr(emsg_permission_denied); 14079 goto out; 14080 14081 case -2: 14082 semerr(gettext( 14083 "Interrupted by another change.\n")); 14084 goto out; 14085 14086 default: 14087 abort(); 14088 } 14089 } 14090 if (r == -1) 14091 scfdie(); 14092 14093 /* Get next level. */ 14094 nlevel = scf_snaplevel_create(g_hndl); 14095 if (nlevel == NULL) 14096 scfdie(); 14097 14098 if (scf_snaplevel_get_next_snaplevel(level, nlevel) != 14099 SCF_SUCCESS) { 14100 if (scf_error() != SCF_ERROR_NOT_FOUND) 14101 scfdie(); 14102 14103 scf_snaplevel_destroy(nlevel); 14104 break; 14105 } 14106 14107 scf_snaplevel_destroy(level); 14108 level = nlevel; 14109 } 14110 14111 if (snapname == NULL) { 14112 lscf_selectsnap(NULL); 14113 snap = NULL; /* cur_snap has been destroyed */ 14114 } 14115 14116 out: 14117 free(tbuf); 14118 free(nbuf); 14119 scf_value_destroy(val); 14120 scf_property_destroy(prop); 14121 scf_pg_destroy(npg); 14122 scf_pg_destroy(pg); 14123 scf_iter_destroy(iter); 14124 scf_snaplevel_destroy(level); 14125 scf_snapshot_destroy(prev); 14126 if (snap != cur_snap) 14127 scf_snapshot_destroy(snap); 14128 } 14129 14130 void 14131 lscf_refresh(void) 14132 { 14133 ssize_t fmrilen; 14134 size_t bufsz; 14135 char *fmribuf; 14136 int r; 14137 14138 lscf_prep_hndl(); 14139 14140 if (cur_inst == NULL) { 14141 semerr(gettext("Instance not selected.\n")); 14142 return; 14143 } 14144 14145 bufsz = max_scf_fmri_len + 1; 14146 fmribuf = safe_malloc(bufsz); 14147 fmrilen = scf_instance_to_fmri(cur_inst, fmribuf, bufsz); 14148 if (fmrilen < 0) { 14149 free(fmribuf); 14150 if (scf_error() != SCF_ERROR_DELETED) 14151 scfdie(); 14152 scf_instance_destroy(cur_inst); 14153 cur_inst = NULL; 14154 warn(emsg_deleted); 14155 return; 14156 } 14157 assert(fmrilen < bufsz); 14158 14159 r = refresh_entity(0, cur_inst, fmribuf, NULL, NULL, NULL); 14160 switch (r) { 14161 case 0: 14162 break; 14163 14164 case ECONNABORTED: 14165 warn(gettext("Could not refresh %s " 14166 "(repository connection broken).\n"), fmribuf); 14167 break; 14168 14169 case ECANCELED: 14170 warn(emsg_deleted); 14171 break; 14172 14173 case EPERM: 14174 warn(gettext("Could not refresh %s " 14175 "(permission denied).\n"), fmribuf); 14176 break; 14177 14178 case ENOSPC: 14179 warn(gettext("Could not refresh %s " 14180 "(repository server out of resources).\n"), 14181 fmribuf); 14182 break; 14183 14184 case EACCES: 14185 default: 14186 bad_error("refresh_entity", scf_error()); 14187 } 14188 14189 free(fmribuf); 14190 } 14191 14192 /* 14193 * describe [-v] [-t] [pg/prop] 14194 */ 14195 int 14196 lscf_describe(uu_list_t *args, int hasargs) 14197 { 14198 int ret = 0; 14199 size_t i; 14200 int argc; 14201 char **argv = NULL; 14202 string_list_t *slp; 14203 int do_verbose = 0; 14204 int do_templates = 0; 14205 char *pattern = NULL; 14206 14207 lscf_prep_hndl(); 14208 14209 if (hasargs != 0) { 14210 argc = uu_list_numnodes(args); 14211 if (argc < 1) 14212 goto usage; 14213 14214 argv = calloc(argc + 1, sizeof (char *)); 14215 if (argv == NULL) 14216 uu_die(gettext("Out of memory.\n")); 14217 14218 for (slp = uu_list_first(args), i = 0; 14219 slp != NULL; 14220 slp = uu_list_next(args, slp), ++i) 14221 argv[i] = slp->str; 14222 14223 argv[i] = NULL; 14224 14225 /* 14226 * We start optind = 0 because our list of arguments 14227 * starts at argv[0] 14228 */ 14229 optind = 0; 14230 opterr = 0; 14231 for (;;) { 14232 ret = getopt(argc, argv, "vt"); 14233 if (ret == -1) 14234 break; 14235 14236 switch (ret) { 14237 case 'v': 14238 do_verbose = 1; 14239 break; 14240 14241 case 't': 14242 do_templates = 1; 14243 break; 14244 14245 case '?': 14246 goto usage; 14247 14248 default: 14249 bad_error("getopt", ret); 14250 } 14251 } 14252 14253 pattern = argv[optind]; 14254 } 14255 14256 if (cur_inst == NULL && cur_svc == NULL) { 14257 semerr(emsg_entity_not_selected); 14258 ret = -1; 14259 goto out; 14260 } 14261 14262 /* 14263 * list_entity_tmpl(), listprop() and listtmpl() produce verbose 14264 * output if their last parameter is set to 2. Less information is 14265 * produced if the parameter is set to 1. 14266 */ 14267 if (pattern == NULL) { 14268 if (do_verbose == 1) 14269 list_entity_tmpl(2); 14270 else 14271 list_entity_tmpl(1); 14272 } 14273 14274 if (do_templates == 0) { 14275 if (do_verbose == 1) 14276 listprop(pattern, 0, 2); 14277 else 14278 listprop(pattern, 0, 1); 14279 } else { 14280 if (do_verbose == 1) 14281 listtmpl(pattern, 2); 14282 else 14283 listtmpl(pattern, 1); 14284 } 14285 14286 ret = 0; 14287 out: 14288 if (argv != NULL) 14289 free(argv); 14290 return (ret); 14291 usage: 14292 ret = -2; 14293 goto out; 14294 } 14295 14296 #ifndef NATIVE_BUILD 14297 /* ARGSUSED */ 14298 CPL_MATCH_FN(complete_select) 14299 { 14300 const char *arg0, *arg1, *arg1end; 14301 int word_start, err = 0, r; 14302 size_t len; 14303 char *buf; 14304 14305 lscf_prep_hndl(); 14306 14307 arg0 = line + strspn(line, " \t"); 14308 assert(strncmp(arg0, "select", sizeof ("select") - 1) == 0); 14309 14310 arg1 = arg0 + sizeof ("select") - 1; 14311 arg1 += strspn(arg1, " \t"); 14312 word_start = arg1 - line; 14313 14314 arg1end = arg1 + strcspn(arg1, " \t"); 14315 if (arg1end < line + word_end) 14316 return (0); 14317 14318 len = line + word_end - arg1; 14319 14320 buf = safe_malloc(max_scf_name_len + 1); 14321 14322 if (cur_snap != NULL) { 14323 return (0); 14324 } else if (cur_inst != NULL) { 14325 return (0); 14326 } else if (cur_svc != NULL) { 14327 scf_instance_t *inst; 14328 scf_iter_t *iter; 14329 14330 if ((inst = scf_instance_create(g_hndl)) == NULL || 14331 (iter = scf_iter_create(g_hndl)) == NULL) 14332 scfdie(); 14333 14334 if (scf_iter_service_instances(iter, cur_svc) != 0) 14335 scfdie(); 14336 14337 for (;;) { 14338 r = scf_iter_next_instance(iter, inst); 14339 if (r == 0) 14340 break; 14341 if (r != 1) 14342 scfdie(); 14343 14344 if (scf_instance_get_name(inst, buf, 14345 max_scf_name_len + 1) < 0) 14346 scfdie(); 14347 14348 if (strncmp(buf, arg1, len) == 0) { 14349 err = cpl_add_completion(cpl, line, word_start, 14350 word_end, buf + len, "", " "); 14351 if (err != 0) 14352 break; 14353 } 14354 } 14355 14356 scf_iter_destroy(iter); 14357 scf_instance_destroy(inst); 14358 14359 return (err); 14360 } else { 14361 scf_service_t *svc; 14362 scf_iter_t *iter; 14363 14364 assert(cur_scope != NULL); 14365 14366 if ((svc = scf_service_create(g_hndl)) == NULL || 14367 (iter = scf_iter_create(g_hndl)) == NULL) 14368 scfdie(); 14369 14370 if (scf_iter_scope_services(iter, cur_scope) != 0) 14371 scfdie(); 14372 14373 for (;;) { 14374 r = scf_iter_next_service(iter, svc); 14375 if (r == 0) 14376 break; 14377 if (r != 1) 14378 scfdie(); 14379 14380 if (scf_service_get_name(svc, buf, 14381 max_scf_name_len + 1) < 0) 14382 scfdie(); 14383 14384 if (strncmp(buf, arg1, len) == 0) { 14385 err = cpl_add_completion(cpl, line, word_start, 14386 word_end, buf + len, "", " "); 14387 if (err != 0) 14388 break; 14389 } 14390 } 14391 14392 scf_iter_destroy(iter); 14393 scf_service_destroy(svc); 14394 14395 return (err); 14396 } 14397 } 14398 14399 /* ARGSUSED */ 14400 CPL_MATCH_FN(complete_command) 14401 { 14402 uint32_t scope = 0; 14403 14404 if (cur_snap != NULL) 14405 scope = CS_SNAP; 14406 else if (cur_inst != NULL) 14407 scope = CS_INST; 14408 else if (cur_svc != NULL) 14409 scope = CS_SVC; 14410 else 14411 scope = CS_SCOPE; 14412 14413 return (scope ? add_cmd_matches(cpl, line, word_end, scope) : 0); 14414 } 14415 #endif /* NATIVE_BUILD */ 14416