16185db85Sdougm /* 26185db85Sdougm * CDDL HEADER START 36185db85Sdougm * 46185db85Sdougm * The contents of this file are subject to the terms of the 56185db85Sdougm * Common Development and Distribution License (the "License"). 66185db85Sdougm * You may not use this file except in compliance with the License. 76185db85Sdougm * 86185db85Sdougm * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 96185db85Sdougm * or http://www.opensolaris.org/os/licensing. 106185db85Sdougm * See the License for the specific language governing permissions 116185db85Sdougm * and limitations under the License. 126185db85Sdougm * 136185db85Sdougm * When distributing Covered Code, include this CDDL HEADER in each 146185db85Sdougm * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 156185db85Sdougm * If applicable, add the following below this CDDL HEADER, with the 166185db85Sdougm * fields enclosed by brackets "[]" replaced with your own identifying 176185db85Sdougm * information: Portions Copyright [yyyy] [name of copyright owner] 186185db85Sdougm * 196185db85Sdougm * CDDL HEADER END 206185db85Sdougm */ 216185db85Sdougm 226185db85Sdougm /* 236185db85Sdougm * Copyright 2006 Sun Microsystems, Inc. All rights reserved. 246185db85Sdougm * Use is subject to license terms. 256185db85Sdougm */ 266185db85Sdougm 276185db85Sdougm #pragma ident "%Z%%M% %I% %E% SMI" 286185db85Sdougm 296185db85Sdougm /* 306185db85Sdougm * Share control API 316185db85Sdougm */ 326185db85Sdougm #include <stdio.h> 336185db85Sdougm #include <string.h> 346185db85Sdougm #include <ctype.h> 356185db85Sdougm #include <sys/types.h> 366185db85Sdougm #include <sys/stat.h> 376185db85Sdougm #include <unistd.h> 386185db85Sdougm #include <libxml/parser.h> 396185db85Sdougm #include <libxml/tree.h> 406185db85Sdougm #include "libshare.h" 416185db85Sdougm #include "libshare_impl.h" 426185db85Sdougm #include <libscf.h> 436185db85Sdougm #include "scfutil.h" 446185db85Sdougm #include <ctype.h> 456185db85Sdougm #include <libintl.h> 466185db85Sdougm 476185db85Sdougm #if _NOT_SMF 486185db85Sdougm #define CONFIG_FILE "/var/tmp/share.cfg" 496185db85Sdougm #define CONFIG_FILE_TMP "/var/tmp/share.cfg.tmp" 506185db85Sdougm #endif 516185db85Sdougm #define TSTAMP(tm) (uint64_t)(((uint64_t)tm.tv_sec << 32) | \ 526185db85Sdougm (tm.tv_nsec & 0xffffffff)) 536185db85Sdougm 546185db85Sdougm /* 556185db85Sdougm * internal data structures 566185db85Sdougm */ 576185db85Sdougm 586185db85Sdougm static xmlNodePtr sa_config_tree; /* the current config */ 596185db85Sdougm static xmlDocPtr sa_config_doc = NULL; /* current config document */ 606185db85Sdougm extern struct sa_proto_plugin *sap_proto_list; 616185db85Sdougm 626185db85Sdougm /* current SMF/SVC repository handle */ 636185db85Sdougm static scfutilhandle_t *scf_handle = NULL; 646185db85Sdougm extern void getlegacyconfig(char *, xmlNodePtr *); 656185db85Sdougm extern int gettransients(xmlNodePtr *); 666185db85Sdougm extern int sa_valid_property(void *, char *, sa_property_t); 676185db85Sdougm extern char *sa_fstype(char *); 686185db85Sdougm extern int sa_is_share(void *); 696185db85Sdougm extern ssize_t scf_max_name_len; /* defined in scfutil during initialization */ 706185db85Sdougm extern int sa_group_is_zfs(sa_group_t); 716185db85Sdougm extern int sa_path_is_zfs(char *); 726185db85Sdougm extern int sa_zfs_set_sharenfs(sa_group_t, char *, int); 736185db85Sdougm extern void update_legacy_config(void); 746185db85Sdougm extern int issubdir(char *, char *); 75*1cea05afSdougm extern void sa_zfs_init(void); 76*1cea05afSdougm extern void sa_zfs_fini(void); 776185db85Sdougm 786185db85Sdougm static int sa_initialized = 0; 796185db85Sdougm 806185db85Sdougm /* helper functions */ 816185db85Sdougm 826185db85Sdougm char * 836185db85Sdougm sa_errorstr(int err) 846185db85Sdougm { 856185db85Sdougm static char errstr[32]; 866185db85Sdougm char *ret = NULL; 876185db85Sdougm 886185db85Sdougm switch (err) { 896185db85Sdougm case SA_OK: 906185db85Sdougm ret = gettext("ok"); 916185db85Sdougm break; 926185db85Sdougm case SA_NO_SUCH_PATH: 936185db85Sdougm ret = gettext("path doesn't exist"); 946185db85Sdougm break; 956185db85Sdougm case SA_NO_MEMORY: 966185db85Sdougm ret = gettext("no memory"); 976185db85Sdougm break; 986185db85Sdougm case SA_DUPLICATE_NAME: 996185db85Sdougm ret = gettext("name in use"); 1006185db85Sdougm break; 1016185db85Sdougm case SA_BAD_PATH: 1026185db85Sdougm ret = gettext("bad path"); 1036185db85Sdougm break; 1046185db85Sdougm case SA_NO_SUCH_GROUP: 1056185db85Sdougm ret = gettext("no such group"); 1066185db85Sdougm break; 1076185db85Sdougm case SA_CONFIG_ERR: 1086185db85Sdougm ret = gettext("configuration error"); 1096185db85Sdougm break; 1106185db85Sdougm case SA_SYSTEM_ERR: 1116185db85Sdougm ret = gettext("system error"); 1126185db85Sdougm break; 1136185db85Sdougm case SA_SYNTAX_ERR: 1146185db85Sdougm ret = gettext("syntax error"); 1156185db85Sdougm break; 1166185db85Sdougm case SA_NO_PERMISSION: 1176185db85Sdougm ret = gettext("no permission"); 1186185db85Sdougm break; 1196185db85Sdougm case SA_BUSY: 1206185db85Sdougm ret = gettext("busy"); 1216185db85Sdougm break; 1226185db85Sdougm case SA_NO_SUCH_PROP: 1236185db85Sdougm ret = gettext("no such property"); 1246185db85Sdougm break; 1256185db85Sdougm case SA_INVALID_NAME: 1266185db85Sdougm ret = gettext("invalid name"); 1276185db85Sdougm break; 1286185db85Sdougm case SA_INVALID_PROTOCOL: 1296185db85Sdougm ret = gettext("invalid protocol"); 1306185db85Sdougm break; 1316185db85Sdougm case SA_NOT_ALLOWED: 1326185db85Sdougm ret = gettext("operation not allowed"); 1336185db85Sdougm break; 1346185db85Sdougm case SA_BAD_VALUE: 1356185db85Sdougm ret = gettext("bad property value"); 1366185db85Sdougm break; 1376185db85Sdougm case SA_INVALID_SECURITY: 1386185db85Sdougm ret = gettext("invalid security type"); 1396185db85Sdougm break; 1406185db85Sdougm case SA_NO_SUCH_SECURITY: 1416185db85Sdougm ret = gettext("security type not found"); 1426185db85Sdougm break; 1436185db85Sdougm case SA_VALUE_CONFLICT: 1446185db85Sdougm ret = gettext("property value conflict"); 1456185db85Sdougm break; 1466185db85Sdougm case SA_NOT_IMPLEMENTED: 1476185db85Sdougm ret = gettext("not implemented"); 1486185db85Sdougm break; 1496185db85Sdougm case SA_INVALID_PATH: 1506185db85Sdougm ret = gettext("invalid path"); 1516185db85Sdougm break; 1526185db85Sdougm case SA_NOT_SUPPORTED: 1536185db85Sdougm ret = gettext("operation not supported"); 1546185db85Sdougm break; 1556185db85Sdougm case SA_PROP_SHARE_ONLY: 1566185db85Sdougm ret = gettext("property not valid for group"); 1576185db85Sdougm break; 1586185db85Sdougm case SA_NOT_SHARED: 1596185db85Sdougm ret = gettext("not shared"); 1606185db85Sdougm break; 1616185db85Sdougm default: 1626185db85Sdougm (void) snprintf(errstr, sizeof (errstr), 1636185db85Sdougm gettext("unknown %d"), err); 1646185db85Sdougm ret = errstr; 1656185db85Sdougm } 1666185db85Sdougm return (ret); 1676185db85Sdougm } 1686185db85Sdougm 1696185db85Sdougm /* 1706185db85Sdougm * get_legacy_timestamp(root, path) 1716185db85Sdougm * gets the timestamp of the last time sharemgr updated the legacy 1726185db85Sdougm * files. This is used to determine if someone has modified them by 1736185db85Sdougm * hand. 1746185db85Sdougm */ 1756185db85Sdougm static uint64_t 1766185db85Sdougm get_legacy_timestamp(xmlNodePtr root, char *path) 1776185db85Sdougm { 1786185db85Sdougm uint64_t tval = 0; 1796185db85Sdougm xmlNodePtr node; 1806185db85Sdougm xmlChar *lpath = NULL; 1816185db85Sdougm xmlChar *timestamp = NULL; 1826185db85Sdougm 1836185db85Sdougm for (node = root->xmlChildrenNode; node != NULL; 1846185db85Sdougm node = node->next) { 1856185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"legacy") == 0) { 1866185db85Sdougm /* a possible legacy node for this path */ 1876185db85Sdougm lpath = xmlGetProp(node, (xmlChar *)"path"); 1886185db85Sdougm if (lpath != NULL && xmlStrcmp(lpath, (xmlChar *)path) == 0) { 1896185db85Sdougm /* now have the node, extract the data */ 1906185db85Sdougm timestamp = xmlGetProp(node, (xmlChar *)"timestamp"); 1916185db85Sdougm if (timestamp != NULL) { 1926185db85Sdougm tval = strtoull((char *)timestamp, NULL, 0); 1936185db85Sdougm break; 1946185db85Sdougm } 1956185db85Sdougm } 1966185db85Sdougm if (lpath != NULL) { 1976185db85Sdougm xmlFree(lpath); 1986185db85Sdougm lpath = NULL; 1996185db85Sdougm } 2006185db85Sdougm } 2016185db85Sdougm } 2026185db85Sdougm if (lpath != NULL) 2036185db85Sdougm xmlFree(lpath); 2046185db85Sdougm if (timestamp != NULL) 2056185db85Sdougm xmlFree(timestamp); 2066185db85Sdougm return (tval); 2076185db85Sdougm } 2086185db85Sdougm 2096185db85Sdougm /* 2106185db85Sdougm * set_legacy_timestamp(root, path, timevalue) 2116185db85Sdougm * 2126185db85Sdougm * add the current timestamp value to the configuration for use in 2136185db85Sdougm * determining when to update the legacy files. For SMF, this 2146185db85Sdougm * property is kept in default/operation/legacy_timestamp 2156185db85Sdougm */ 2166185db85Sdougm 2176185db85Sdougm static void 2186185db85Sdougm set_legacy_timestamp(xmlNodePtr root, char *path, uint64_t tval) 2196185db85Sdougm { 2206185db85Sdougm xmlNodePtr node; 2216185db85Sdougm xmlChar *lpath = NULL; 2226185db85Sdougm 2236185db85Sdougm for (node = root->xmlChildrenNode; node != NULL; 2246185db85Sdougm node = node->next) { 2256185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"legacy") == 0) { 2266185db85Sdougm /* a possible legacy node for this path */ 2276185db85Sdougm lpath = xmlGetProp(node, (xmlChar *)"path"); 2286185db85Sdougm if (lpath != NULL && xmlStrcmp(lpath, (xmlChar *)path) == 0) { 2296185db85Sdougm xmlFree(lpath); 2306185db85Sdougm break; 2316185db85Sdougm } 2326185db85Sdougm if (lpath != NULL) 2336185db85Sdougm xmlFree(lpath); 2346185db85Sdougm } 2356185db85Sdougm } 2366185db85Sdougm if (node == NULL) { 2376185db85Sdougm /* need to create the first legacy timestamp node */ 2386185db85Sdougm node = xmlNewChild(root, NULL, (xmlChar *)"legacy", NULL); 2396185db85Sdougm } 2406185db85Sdougm if (node != NULL) { 2416185db85Sdougm char tstring[32]; 2426185db85Sdougm int ret; 2436185db85Sdougm 2446185db85Sdougm (void) snprintf(tstring, sizeof (tstring), "%lld", tval); 2456185db85Sdougm xmlSetProp(node, (xmlChar *)"timestamp", (xmlChar *)tstring); 2466185db85Sdougm xmlSetProp(node, (xmlChar *)"path", (xmlChar *)path); 2476185db85Sdougm /* now commit to SMF */ 2486185db85Sdougm ret = sa_get_instance(scf_handle, "default"); 2496185db85Sdougm if (ret == SA_OK) { 2506185db85Sdougm ret = sa_start_transaction(scf_handle, "operation"); 2516185db85Sdougm if (ret == SA_OK) { 2526185db85Sdougm ret = sa_set_property(scf_handle, "legacy-timestamp", 2536185db85Sdougm tstring); 2546185db85Sdougm if (ret == SA_OK) { 2556185db85Sdougm (void) sa_end_transaction(scf_handle); 2566185db85Sdougm } else { 2576185db85Sdougm sa_abort_transaction(scf_handle); 2586185db85Sdougm } 2596185db85Sdougm } 2606185db85Sdougm } 2616185db85Sdougm } 2626185db85Sdougm } 2636185db85Sdougm 2646185db85Sdougm /* 2656185db85Sdougm * is_shared(share) 2666185db85Sdougm * 2676185db85Sdougm * determine if the specified share is currently shared or not. 2686185db85Sdougm */ 2696185db85Sdougm static int 2706185db85Sdougm is_shared(sa_share_t share) 2716185db85Sdougm { 2726185db85Sdougm char *shared; 2736185db85Sdougm int result = 0; /* assume not */ 2746185db85Sdougm 2756185db85Sdougm shared = sa_get_share_attr(share, "shared"); 2766185db85Sdougm if (shared != NULL) { 2776185db85Sdougm if (strcmp(shared, "true") == 0) 2786185db85Sdougm result = 1; 2796185db85Sdougm sa_free_attr_string(shared); 2806185db85Sdougm } 2816185db85Sdougm return (result); 2826185db85Sdougm } 2836185db85Sdougm 2846185db85Sdougm /* 2856185db85Sdougm * checksubdir determines if the specified path is a subdirectory of 2866185db85Sdougm * another share. It calls issubdir() from the old share 2876185db85Sdougm * implementation to do the complicated work. 2886185db85Sdougm */ 2896185db85Sdougm static int 2906185db85Sdougm checksubdir(char *newpath) 2916185db85Sdougm { 2926185db85Sdougm sa_group_t group; 2936185db85Sdougm sa_share_t share; 2946185db85Sdougm int issub; 2956185db85Sdougm char *path = NULL; 2966185db85Sdougm 2976185db85Sdougm for (issub = 0, group = sa_get_group(NULL); 2986185db85Sdougm group != NULL && !issub; 2996185db85Sdougm group = sa_get_next_group(group)) { 3006185db85Sdougm for (share = sa_get_share(group, NULL); share != NULL; 3016185db85Sdougm share = sa_get_next_share(share)) { 3026185db85Sdougm /* 3036185db85Sdougm * The original behavior of share never checked 3046185db85Sdougm * against the permanent configuration 3056185db85Sdougm * (/etc/dfs/dfstab). PIT has a number of cases where 3066185db85Sdougm * it depends on this older behavior even though it 3076185db85Sdougm * could be considered incorrect. We may tighten this 3086185db85Sdougm * up in the future. 3096185db85Sdougm */ 3106185db85Sdougm if (!is_shared(share)) 3116185db85Sdougm continue; 3126185db85Sdougm 3136185db85Sdougm path = sa_get_share_attr(share, "path"); 3146185db85Sdougm if (newpath != NULL && 3156185db85Sdougm (strcmp(path, newpath) == 0 || issubdir(newpath, path) || 3166185db85Sdougm issubdir(path, newpath))) { 3176185db85Sdougm sa_free_attr_string(path); 3186185db85Sdougm path = NULL; 3196185db85Sdougm issub = SA_INVALID_PATH; 3206185db85Sdougm break; 3216185db85Sdougm } 3226185db85Sdougm sa_free_attr_string(path); 3236185db85Sdougm path = NULL; 3246185db85Sdougm } 3256185db85Sdougm } 3266185db85Sdougm if (path != NULL) 3276185db85Sdougm sa_free_attr_string(path); 3286185db85Sdougm return (issub); 3296185db85Sdougm } 3306185db85Sdougm 3316185db85Sdougm /* 3326185db85Sdougm * validpath(path) 3336185db85Sdougm * determine if the provided path is valid for a share. It shouldn't 3346185db85Sdougm * be a sub-dir of an already shared path or the parent directory of a 3356185db85Sdougm * share path. 3366185db85Sdougm */ 3376185db85Sdougm static int 3386185db85Sdougm validpath(char *path) 3396185db85Sdougm { 3406185db85Sdougm int error = SA_OK; 3416185db85Sdougm struct stat st; 3426185db85Sdougm sa_share_t share; 3436185db85Sdougm char *fstype; 3446185db85Sdougm 3456185db85Sdougm if (*path != '/') { 3466185db85Sdougm return (SA_BAD_PATH); 3476185db85Sdougm } 3486185db85Sdougm if (stat(path, &st) < 0) { 3496185db85Sdougm error = SA_NO_SUCH_PATH; 3506185db85Sdougm } else { 3516185db85Sdougm share = sa_find_share(path); 3526185db85Sdougm if (share != NULL) { 3536185db85Sdougm error = SA_DUPLICATE_NAME; 3546185db85Sdougm } 3556185db85Sdougm if (error == SA_OK) { 3566185db85Sdougm /* 3576185db85Sdougm * check for special case with file system that might 3586185db85Sdougm * have restrictions. For now, ZFS is the only case 3596185db85Sdougm * since it has its own idea of how to configure 3606185db85Sdougm * shares. We do this before subdir checking since 3616185db85Sdougm * things like ZFS will do that for us. This should 3626185db85Sdougm * also be done via plugin interface. 3636185db85Sdougm */ 3646185db85Sdougm fstype = sa_fstype(path); 3656185db85Sdougm if (fstype != NULL && strcmp(fstype, "zfs") == 0) { 3666185db85Sdougm if (sa_zfs_is_shared(path)) 3676185db85Sdougm error = SA_DUPLICATE_NAME; 3686185db85Sdougm } 3696185db85Sdougm if (fstype != NULL) 3706185db85Sdougm sa_free_fstype(fstype); 3716185db85Sdougm } 3726185db85Sdougm if (error == SA_OK) { 3736185db85Sdougm error = checksubdir(path); 3746185db85Sdougm } 3756185db85Sdougm } 3766185db85Sdougm return (error); 3776185db85Sdougm } 3786185db85Sdougm 3796185db85Sdougm /* 3806185db85Sdougm * check to see if group/share is persistent. 3816185db85Sdougm */ 3826185db85Sdougm static int 3836185db85Sdougm is_persistent(sa_group_t group) 3846185db85Sdougm { 3856185db85Sdougm char *type; 3866185db85Sdougm int persist = 1; 3876185db85Sdougm 3886185db85Sdougm type = sa_get_group_attr(group, "type"); 3896185db85Sdougm if (type != NULL && strcmp(type, "transient") == 0) 3906185db85Sdougm persist = 0; 3916185db85Sdougm if (type != NULL) 3926185db85Sdougm sa_free_attr_string(type); 3936185db85Sdougm return (persist); 3946185db85Sdougm } 3956185db85Sdougm 3966185db85Sdougm /* 3976185db85Sdougm * sa_valid_group_name(name) 3986185db85Sdougm * 3996185db85Sdougm * check that the "name" contains only valid characters and otherwise 4006185db85Sdougm * fits the required naming conventions. Valid names must start with 4016185db85Sdougm * an alphabetic and the remainder may consist of only alphanumeric 4026185db85Sdougm * plus the '-' and '_' characters. This name limitation comes from 4036185db85Sdougm * inherent limitations in SMF. 4046185db85Sdougm */ 4056185db85Sdougm 4066185db85Sdougm int 4076185db85Sdougm sa_valid_group_name(char *name) 4086185db85Sdougm { 4096185db85Sdougm int ret = 1; 4106185db85Sdougm ssize_t len; 4116185db85Sdougm 4126185db85Sdougm if (name != NULL && isalpha(*name)) { 4136185db85Sdougm char c; 4146185db85Sdougm len = strlen(name); 4156185db85Sdougm if (len < (scf_max_name_len - sizeof ("group:"))) { 4166185db85Sdougm for (c = *name++; c != '\0' && ret != 0; c = *name++) { 4176185db85Sdougm if (!isalnum(c) && c != '-' && c != '_') 4186185db85Sdougm ret = 0; 4196185db85Sdougm } 4206185db85Sdougm } else { 4216185db85Sdougm ret = 0; 4226185db85Sdougm } 4236185db85Sdougm } else { 4246185db85Sdougm ret = 0; 4256185db85Sdougm } 4266185db85Sdougm return (ret); 4276185db85Sdougm } 4286185db85Sdougm 4296185db85Sdougm 4306185db85Sdougm /* 4316185db85Sdougm * is_zfs_group(group) 4326185db85Sdougm * Determine if the specified group is a ZFS sharenfs group 4336185db85Sdougm */ 4346185db85Sdougm static int 4356185db85Sdougm is_zfs_group(sa_group_t group) 4366185db85Sdougm { 4376185db85Sdougm int ret = 0; 4386185db85Sdougm xmlNodePtr parent; 4396185db85Sdougm xmlChar *zfs; 4406185db85Sdougm 4416185db85Sdougm if (strcmp((char *)((xmlNodePtr)group)->name, "share") == 0) { 4426185db85Sdougm parent = (xmlNodePtr)sa_get_parent_group(group); 4436185db85Sdougm } else { 4446185db85Sdougm parent = (xmlNodePtr)group; 4456185db85Sdougm } 4466185db85Sdougm zfs = xmlGetProp(parent, (xmlChar *)"zfs"); 4476185db85Sdougm if (zfs != NULL) { 4486185db85Sdougm xmlFree(zfs); 4496185db85Sdougm ret = 1; 4506185db85Sdougm } 4516185db85Sdougm return (ret); 4526185db85Sdougm } 4536185db85Sdougm 4546185db85Sdougm /* 4556185db85Sdougm * sa_optionset_name(optionset, oname, len, id) 4566185db85Sdougm * return the SMF name for the optionset. If id is not NULL, it 4576185db85Sdougm * will have the GUID value for a share and should be used 4586185db85Sdougm * instead of the keyword "optionset" which is used for 4596185db85Sdougm * groups. If the optionset doesn't have a protocol type 4606185db85Sdougm * associated with it, "default" is used. This shouldn't happen 4616185db85Sdougm * at this point but may be desirable in the future if there are 4626185db85Sdougm * protocol independent properties added. The name is returned in 4636185db85Sdougm * oname. 4646185db85Sdougm */ 4656185db85Sdougm 4666185db85Sdougm static int 4676185db85Sdougm sa_optionset_name(sa_optionset_t optionset, char *oname, size_t len, char *id) 4686185db85Sdougm { 4696185db85Sdougm char *proto; 4706185db85Sdougm 4716185db85Sdougm if (id == NULL) 4726185db85Sdougm id = "optionset"; 4736185db85Sdougm 4746185db85Sdougm proto = sa_get_optionset_attr(optionset, "type"); 4756185db85Sdougm len = snprintf(oname, len, "%s_%s", id, proto ? proto : "default"); 4766185db85Sdougm 4776185db85Sdougm if (proto != NULL) 4786185db85Sdougm sa_free_attr_string(proto); 4796185db85Sdougm return (len); 4806185db85Sdougm } 4816185db85Sdougm 4826185db85Sdougm /* 4836185db85Sdougm * sa_security_name(optionset, oname, len, id) 4846185db85Sdougm * 4856185db85Sdougm * return the SMF name for the security. If id is not NULL, it will 4866185db85Sdougm * have the GUID value for a share and should be used instead of the 4876185db85Sdougm * keyword "optionset" which is used for groups. If the optionset 4886185db85Sdougm * doesn't have a protocol type associated with it, "default" is 4896185db85Sdougm * used. This shouldn't happen at this point but may be desirable in 4906185db85Sdougm * the future if there are protocol independent properties added. The 4916185db85Sdougm * name is returned in oname. The security type is also encoded into 4926185db85Sdougm * the name. In the future, this wil *be handled a bit differently. 4936185db85Sdougm */ 4946185db85Sdougm 4956185db85Sdougm static int 4966185db85Sdougm sa_security_name(sa_security_t security, char *oname, size_t len, char *id) 4976185db85Sdougm { 4986185db85Sdougm char *proto; 4996185db85Sdougm char *sectype; 5006185db85Sdougm 5016185db85Sdougm if (id == NULL) 5026185db85Sdougm id = "optionset"; 5036185db85Sdougm 5046185db85Sdougm proto = sa_get_security_attr(security, "type"); 5056185db85Sdougm sectype = sa_get_security_attr(security, "sectype"); 5066185db85Sdougm len = snprintf(oname, len, "%s_%s_%s", id, 5076185db85Sdougm proto ? proto : "default", 5086185db85Sdougm sectype ? sectype : "default"); 5096185db85Sdougm if (proto != NULL) 5106185db85Sdougm sa_free_attr_string(proto); 5116185db85Sdougm if (sectype != NULL) 5126185db85Sdougm sa_free_attr_string(sectype); 5136185db85Sdougm return (len); 5146185db85Sdougm } 5156185db85Sdougm 5166185db85Sdougm /* 5176185db85Sdougm * sa_init() 5186185db85Sdougm * Initialize the API 5196185db85Sdougm * find all the shared objects 5206185db85Sdougm * init the tables with all objects 5216185db85Sdougm * read in the current configuration 5226185db85Sdougm */ 5236185db85Sdougm 5246185db85Sdougm void 5256185db85Sdougm sa_init(int init_service) 5266185db85Sdougm { 5276185db85Sdougm struct stat st; 5286185db85Sdougm int legacy = 0; 5296185db85Sdougm uint64_t tval = 0; 5306185db85Sdougm 5316185db85Sdougm if (!sa_initialized) { 5326185db85Sdougm /* get protocol specific structures */ 5336185db85Sdougm (void) proto_plugin_init(); 5346185db85Sdougm if (init_service & SA_INIT_SHARE_API) { 5356185db85Sdougm /* 536*1cea05afSdougm * initialize access into libzfs. We use this when 537*1cea05afSdougm * collecting info about ZFS datasets and shares. 538*1cea05afSdougm */ 539*1cea05afSdougm sa_zfs_init(); 540*1cea05afSdougm /* 5416185db85Sdougm * since we want to use SMF, initialize an svc handle 5426185db85Sdougm * and find out what is there. 5436185db85Sdougm */ 5446185db85Sdougm scf_handle = sa_scf_init(); 5456185db85Sdougm if (scf_handle != NULL) { 5466185db85Sdougm (void) sa_get_config(scf_handle, &sa_config_tree, 5476185db85Sdougm &sa_config_doc); 5486185db85Sdougm tval = get_legacy_timestamp(sa_config_tree, 5496185db85Sdougm SA_LEGACY_DFSTAB); 5506185db85Sdougm if (tval == 0) { 5516185db85Sdougm /* first time so make sure default is setup */ 5526185db85Sdougm sa_group_t defgrp; 5536185db85Sdougm sa_optionset_t opt; 5546185db85Sdougm defgrp = sa_get_group("default"); 5556185db85Sdougm if (defgrp != NULL) { 5566185db85Sdougm opt = sa_get_optionset(defgrp, NULL); 5576185db85Sdougm if (opt == NULL) 5586185db85Sdougm /* NFS is the default for default */ 5596185db85Sdougm opt = sa_create_optionset(defgrp, "nfs"); 5606185db85Sdougm } 5616185db85Sdougm } 5626185db85Sdougm if (stat(SA_LEGACY_DFSTAB, &st) >= 0 && 5636185db85Sdougm tval != TSTAMP(st.st_ctim)) { 5646185db85Sdougm getlegacyconfig(SA_LEGACY_DFSTAB, &sa_config_tree); 5656185db85Sdougm if (stat(SA_LEGACY_DFSTAB, &st) >= 0) 5666185db85Sdougm set_legacy_timestamp(sa_config_tree, 5676185db85Sdougm SA_LEGACY_DFSTAB, 5686185db85Sdougm TSTAMP(st.st_ctim)); 5696185db85Sdougm } 5706185db85Sdougm legacy |= sa_get_zfs_shares("zfs"); 5716185db85Sdougm legacy |= gettransients(&sa_config_tree); 5726185db85Sdougm } 5736185db85Sdougm } 5746185db85Sdougm } 5756185db85Sdougm } 5766185db85Sdougm 5776185db85Sdougm /* 5786185db85Sdougm * sa_fini() 5796185db85Sdougm * Uninitialize the API structures including the configuration 580*1cea05afSdougm * data structures and ZFS related data. 5816185db85Sdougm */ 5826185db85Sdougm 5836185db85Sdougm void 5846185db85Sdougm sa_fini() 5856185db85Sdougm { 5866185db85Sdougm if (sa_initialized) { 5876185db85Sdougm /* free the config trees */ 5886185db85Sdougm sa_initialized = 0; 5896185db85Sdougm if (sa_config_doc != NULL) 5906185db85Sdougm xmlFreeDoc(sa_config_doc); 5916185db85Sdougm sa_config_tree = NULL; 5926185db85Sdougm sa_config_doc = NULL; 5936185db85Sdougm sa_scf_fini(scf_handle); 594*1cea05afSdougm sa_zfs_fini(); 5956185db85Sdougm (void) proto_plugin_init(); 5966185db85Sdougm } 5976185db85Sdougm } 5986185db85Sdougm 5996185db85Sdougm /* 6006185db85Sdougm * sa_get_protocols(char **protocol) 6016185db85Sdougm * Get array of protocols that are supported 6026185db85Sdougm * Returns pointer to an allocated and NULL terminated 6036185db85Sdougm * array of strings. Caller must free. 6046185db85Sdougm * This really should be determined dynamically. 6056185db85Sdougm * If there aren't any defined, return -1. 6066185db85Sdougm * Use free() to return memory. 6076185db85Sdougm */ 6086185db85Sdougm 6096185db85Sdougm int 6106185db85Sdougm sa_get_protocols(char ***protocols) 6116185db85Sdougm { 6126185db85Sdougm int numproto = -1; 6136185db85Sdougm 6146185db85Sdougm if (protocols != NULL) { 6156185db85Sdougm struct sa_proto_plugin *plug; 6166185db85Sdougm for (numproto = 0, plug = sap_proto_list; plug != NULL; 6176185db85Sdougm plug = plug->plugin_next) { 6186185db85Sdougm numproto++; 6196185db85Sdougm } 6206185db85Sdougm 6216185db85Sdougm *protocols = calloc(numproto + 1, sizeof (char *)); 6226185db85Sdougm if (*protocols != NULL) { 6236185db85Sdougm int ret = 0; 6246185db85Sdougm for (plug = sap_proto_list; plug != NULL; 6256185db85Sdougm plug = plug->plugin_next) { 6266185db85Sdougm /* faking for now */ 6276185db85Sdougm (*protocols)[ret++] = plug->plugin_ops->sa_protocol; 6286185db85Sdougm } 6296185db85Sdougm } else { 6306185db85Sdougm numproto = -1; 6316185db85Sdougm } 6326185db85Sdougm } 6336185db85Sdougm return (numproto); 6346185db85Sdougm } 6356185db85Sdougm 6366185db85Sdougm /* 6376185db85Sdougm * find_group_by_name(node, group) 6386185db85Sdougm * 6396185db85Sdougm * search the XML document subtree specified by node to find the group 6406185db85Sdougm * specified by group. Searching subtree allows subgroups to be 6416185db85Sdougm * searched for. 6426185db85Sdougm */ 6436185db85Sdougm 6446185db85Sdougm static xmlNodePtr 6456185db85Sdougm find_group_by_name(xmlNodePtr node, xmlChar *group) 6466185db85Sdougm { 6476185db85Sdougm xmlChar *name = NULL; 6486185db85Sdougm 6496185db85Sdougm for (node = node->xmlChildrenNode; node != NULL; 6506185db85Sdougm node = node->next) { 6516185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"group") == 0) { 6526185db85Sdougm /* if no groupname, return the first found */ 6536185db85Sdougm if (group == NULL) 6546185db85Sdougm break; 6556185db85Sdougm name = xmlGetProp(node, (xmlChar *)"name"); 6566185db85Sdougm if (name != NULL && 6576185db85Sdougm xmlStrcmp(name, group) == 0) { 6586185db85Sdougm break; 6596185db85Sdougm } 6606185db85Sdougm if (name != NULL) { 6616185db85Sdougm xmlFree(name); 6626185db85Sdougm name = NULL; 6636185db85Sdougm } 6646185db85Sdougm } 6656185db85Sdougm } 6666185db85Sdougm if (name != NULL) 6676185db85Sdougm xmlFree(name); 6686185db85Sdougm return (node); 6696185db85Sdougm } 6706185db85Sdougm 6716185db85Sdougm /* 6726185db85Sdougm * sa_get_group(groupname) 6736185db85Sdougm * Return the "group" specified. If groupname is NULL, 6746185db85Sdougm * return the first group of the list of groups. 6756185db85Sdougm */ 6766185db85Sdougm sa_group_t 6776185db85Sdougm sa_get_group(char *groupname) 6786185db85Sdougm { 6796185db85Sdougm xmlNodePtr node = NULL; 6806185db85Sdougm char *subgroup = NULL; 6816185db85Sdougm char *group = NULL; 6826185db85Sdougm 6836185db85Sdougm if (sa_config_tree != NULL) { 6846185db85Sdougm if (groupname != NULL) { 6856185db85Sdougm group = strdup(groupname); 6866185db85Sdougm subgroup = strchr(group, '/'); 6876185db85Sdougm if (subgroup != NULL) 6886185db85Sdougm *subgroup++ = '\0'; 6896185db85Sdougm } 6906185db85Sdougm node = find_group_by_name(sa_config_tree, (xmlChar *)group); 6916185db85Sdougm /* if a subgroup, find it before returning */ 6926185db85Sdougm if (subgroup != NULL && node != NULL) { 6936185db85Sdougm node = find_group_by_name(node, (xmlChar *)subgroup); 6946185db85Sdougm } 6956185db85Sdougm } 6966185db85Sdougm if (node != NULL && (char *)group != NULL) 6976185db85Sdougm (void) sa_get_instance(scf_handle, (char *)group); 6986185db85Sdougm if (group != NULL) 6996185db85Sdougm free(group); 7006185db85Sdougm return ((sa_group_t)(node)); 7016185db85Sdougm } 7026185db85Sdougm 7036185db85Sdougm /* 7046185db85Sdougm * sa_get_next_group(group) 7056185db85Sdougm * Return the "next" group after the specified group from 7066185db85Sdougm * the internal group list. NULL if there are no more. 7076185db85Sdougm */ 7086185db85Sdougm sa_group_t 7096185db85Sdougm sa_get_next_group(sa_group_t group) 7106185db85Sdougm { 7116185db85Sdougm xmlNodePtr ngroup = NULL; 7126185db85Sdougm if (group != NULL) { 7136185db85Sdougm for (ngroup = ((xmlNodePtr)group)->next; ngroup != NULL; 7146185db85Sdougm ngroup = ngroup->next) { 7156185db85Sdougm if (xmlStrcmp(ngroup->name, (xmlChar *)"group") == 0) 7166185db85Sdougm break; 7176185db85Sdougm } 7186185db85Sdougm } 7196185db85Sdougm return ((sa_group_t)ngroup); 7206185db85Sdougm } 7216185db85Sdougm 7226185db85Sdougm /* 7236185db85Sdougm * sa_get_share(group, sharepath) 7246185db85Sdougm * Return the share object for the share specified. The share 7256185db85Sdougm * must be in the specified group. Return NULL if not found. 7266185db85Sdougm */ 7276185db85Sdougm sa_share_t 7286185db85Sdougm sa_get_share(sa_group_t group, char *sharepath) 7296185db85Sdougm { 7306185db85Sdougm xmlNodePtr node = NULL; 7316185db85Sdougm xmlChar *path; 7326185db85Sdougm 7336185db85Sdougm /* 7346185db85Sdougm * For future scalability, this should end up building a cache 7356185db85Sdougm * since it will get called regularly by the mountd and info 7366185db85Sdougm * services. 7376185db85Sdougm */ 7386185db85Sdougm if (group != NULL) { 7396185db85Sdougm for (node = ((xmlNodePtr)group)->children; node != NULL; 7406185db85Sdougm node = node->next) { 7416185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"share") == 0) { 7426185db85Sdougm if (sharepath == NULL) { 7436185db85Sdougm break; 7446185db85Sdougm } else { 7456185db85Sdougm /* is it the correct share? */ 7466185db85Sdougm path = xmlGetProp(node, (xmlChar *)"path"); 7476185db85Sdougm if (path != NULL && 7486185db85Sdougm xmlStrcmp(path, (xmlChar *)sharepath) == 0) { 7496185db85Sdougm xmlFree(path); 7506185db85Sdougm break; 7516185db85Sdougm } 7526185db85Sdougm xmlFree(path); 7536185db85Sdougm } 7546185db85Sdougm } 7556185db85Sdougm } 7566185db85Sdougm } 7576185db85Sdougm return ((sa_share_t)node); 7586185db85Sdougm } 7596185db85Sdougm 7606185db85Sdougm /* 7616185db85Sdougm * sa_get_next_share(share) 7626185db85Sdougm * Return the next share following the specified share 7636185db85Sdougm * from the internal list of shares. Returns NULL if there 7646185db85Sdougm * are no more shares. The list is relative to the same 7656185db85Sdougm * group. 7666185db85Sdougm */ 7676185db85Sdougm sa_share_t 7686185db85Sdougm sa_get_next_share(sa_share_t share) 7696185db85Sdougm { 7706185db85Sdougm xmlNodePtr node = NULL; 7716185db85Sdougm 7726185db85Sdougm if (share != NULL) { 7736185db85Sdougm for (node = ((xmlNodePtr)share)->next; node != NULL; 7746185db85Sdougm node = node->next) { 7756185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"share") == 0) { 7766185db85Sdougm break; 7776185db85Sdougm } 7786185db85Sdougm } 7796185db85Sdougm } 7806185db85Sdougm return ((sa_share_t)node); 7816185db85Sdougm } 7826185db85Sdougm 7836185db85Sdougm /* 7846185db85Sdougm * _sa_get_child_node(node, type) 7856185db85Sdougm * 7866185db85Sdougm * find the child node of the specified node that has "type". This is 7876185db85Sdougm * used to implement several internal functions. 7886185db85Sdougm */ 7896185db85Sdougm 7906185db85Sdougm static xmlNodePtr 7916185db85Sdougm _sa_get_child_node(xmlNodePtr node, xmlChar *type) 7926185db85Sdougm { 7936185db85Sdougm xmlNodePtr child; 7946185db85Sdougm for (child = node->xmlChildrenNode; child != NULL; 7956185db85Sdougm child = child->next) 7966185db85Sdougm if (xmlStrcmp(child->name, type) == 0) 7976185db85Sdougm return (child); 7986185db85Sdougm return ((xmlNodePtr)NULL); 7996185db85Sdougm } 8006185db85Sdougm 8016185db85Sdougm /* 8026185db85Sdougm * find_share(group, path) 8036185db85Sdougm * 8046185db85Sdougm * Search all the shares in the specified group for one that has the 8056185db85Sdougm * specified path. 8066185db85Sdougm */ 8076185db85Sdougm 8086185db85Sdougm static sa_share_t 8096185db85Sdougm find_share(sa_group_t group, char *sharepath) 8106185db85Sdougm { 8116185db85Sdougm sa_share_t share; 8126185db85Sdougm char *path; 8136185db85Sdougm 8146185db85Sdougm for (share = sa_get_share(group, NULL); share != NULL; 8156185db85Sdougm share = sa_get_next_share(share)) { 8166185db85Sdougm path = sa_get_share_attr(share, "path"); 8176185db85Sdougm if (path != NULL && strcmp(path, sharepath) == 0) { 8186185db85Sdougm sa_free_attr_string(path); 8196185db85Sdougm break; 8206185db85Sdougm } 8216185db85Sdougm if (path != NULL) 8226185db85Sdougm sa_free_attr_string(path); 8236185db85Sdougm } 8246185db85Sdougm return (share); 8256185db85Sdougm } 8266185db85Sdougm 8276185db85Sdougm /* 8286185db85Sdougm * sa_get_sub_group(group) 8296185db85Sdougm * 8306185db85Sdougm * Get the first sub-group of group. The sa_get_next_group() function 8316185db85Sdougm * can be used to get the rest. This is currently only used for ZFS 8326185db85Sdougm * sub-groups but could be used to implement a more general mechanism. 8336185db85Sdougm */ 8346185db85Sdougm 8356185db85Sdougm sa_group_t 8366185db85Sdougm sa_get_sub_group(sa_group_t group) 8376185db85Sdougm { 8386185db85Sdougm return ((sa_group_t)_sa_get_child_node((xmlNodePtr)group, 8396185db85Sdougm (xmlChar *)"group")); 8406185db85Sdougm } 8416185db85Sdougm 8426185db85Sdougm /* 8436185db85Sdougm * sa_find_share(sharepath) 8446185db85Sdougm * Finds a share regardless of group. In the future, this 8456185db85Sdougm * function should utilize a cache and hash table of some kind. 8466185db85Sdougm * The current assumption is that a path will only be shared 8476185db85Sdougm * once. In the future, this may change as implementation of 8486185db85Sdougm * resource names comes into being. 8496185db85Sdougm */ 8506185db85Sdougm sa_share_t 8516185db85Sdougm sa_find_share(char *sharepath) 8526185db85Sdougm { 8536185db85Sdougm sa_group_t group; 8546185db85Sdougm sa_group_t zgroup; 8556185db85Sdougm sa_share_t share = NULL; 8566185db85Sdougm int done = 0; 8576185db85Sdougm 8586185db85Sdougm for (group = sa_get_group(NULL); group != NULL && !done; 8596185db85Sdougm group = sa_get_next_group(group)) { 8606185db85Sdougm if (is_zfs_group(group)) { 8616185db85Sdougm for (zgroup = (sa_group_t)_sa_get_child_node((xmlNodePtr)group, 8626185db85Sdougm (xmlChar *)"group"); 8636185db85Sdougm zgroup != NULL; zgroup = sa_get_next_group(zgroup)) { 8646185db85Sdougm share = find_share(zgroup, sharepath); 8656185db85Sdougm if (share != NULL) 8666185db85Sdougm break; 8676185db85Sdougm } 8686185db85Sdougm } else { 8696185db85Sdougm share = find_share(group, sharepath); 8706185db85Sdougm } 8716185db85Sdougm if (share != NULL) 8726185db85Sdougm break; 8736185db85Sdougm } 8746185db85Sdougm return (share); 8756185db85Sdougm } 8766185db85Sdougm 8776185db85Sdougm /* 8786185db85Sdougm * sa_check_path(group, path) 8796185db85Sdougm * 8806185db85Sdougm * check that path is a valid path relative to the group. Currently, 8816185db85Sdougm * we are ignoring the group and checking only the NFS rules. Later, 8826185db85Sdougm * we may want to use the group to then check against the protocols 8836185db85Sdougm * enabled on the group. 8846185db85Sdougm */ 8856185db85Sdougm 8866185db85Sdougm int 8876185db85Sdougm sa_check_path(sa_group_t group, char *path) 8886185db85Sdougm { 8896185db85Sdougm #ifdef lint 8906185db85Sdougm group = group; 8916185db85Sdougm #endif 8926185db85Sdougm return (validpath(path)); 8936185db85Sdougm } 8946185db85Sdougm 8956185db85Sdougm /* 8966185db85Sdougm * _sa_add_share(group, sharepath, persist, *error) 8976185db85Sdougm * 8986185db85Sdougm * common code for all types of add_share. sa_add_share() is the 8996185db85Sdougm * public API, we also need to be able to do this when parsing legacy 9006185db85Sdougm * files and construction of the internal configuration while 9016185db85Sdougm * extracting config info from SMF. 9026185db85Sdougm */ 9036185db85Sdougm 9046185db85Sdougm sa_share_t 9056185db85Sdougm _sa_add_share(sa_group_t group, char *sharepath, int persist, int *error) 9066185db85Sdougm { 9076185db85Sdougm xmlNodePtr node = NULL; 9086185db85Sdougm int err; 9096185db85Sdougm 9106185db85Sdougm err = SA_OK; /* assume success */ 9116185db85Sdougm 9126185db85Sdougm node = xmlNewChild((xmlNodePtr)group, NULL, 9136185db85Sdougm (xmlChar *)"share", NULL); 9146185db85Sdougm if (node != NULL) { 9156185db85Sdougm xmlSetProp(node, (xmlChar *)"path", (xmlChar *)sharepath); 9166185db85Sdougm xmlSetProp(node, (xmlChar *)"type", persist ? 9176185db85Sdougm (xmlChar *)"persist" : (xmlChar *)"transient"); 9186185db85Sdougm if (persist != SA_SHARE_TRANSIENT) { 9196185db85Sdougm /* 9206185db85Sdougm * persistent shares come in two flavors: SMF and 9216185db85Sdougm * ZFS. Sort this one out based on target group and 9226185db85Sdougm * path type. Currently, only NFS is supported in the 9236185db85Sdougm * ZFS group and it is always on. 9246185db85Sdougm */ 9256185db85Sdougm if (sa_group_is_zfs(group) && sa_path_is_zfs(sharepath)) { 9266185db85Sdougm err = sa_zfs_set_sharenfs(group, sharepath, 1); 9276185db85Sdougm } else { 9286185db85Sdougm err = sa_commit_share(scf_handle, group, 9296185db85Sdougm (sa_share_t)node); 9306185db85Sdougm } 9316185db85Sdougm } 9326185db85Sdougm if (err == SA_NO_PERMISSION && persist & SA_SHARE_PARSER) { 9336185db85Sdougm /* called by the dfstab parser so could be a show */ 9346185db85Sdougm err = SA_OK; 9356185db85Sdougm } 9366185db85Sdougm if (err != SA_OK) { 9376185db85Sdougm /* 9386185db85Sdougm * we couldn't commit to the repository so undo 9396185db85Sdougm * our internal state to reflect reality. 9406185db85Sdougm */ 9416185db85Sdougm xmlUnlinkNode(node); 9426185db85Sdougm xmlFreeNode(node); 9436185db85Sdougm node = NULL; 9446185db85Sdougm } 9456185db85Sdougm } else { 9466185db85Sdougm err = SA_NO_MEMORY; 9476185db85Sdougm } 9486185db85Sdougm if (error != NULL) 9496185db85Sdougm *error = err; 9506185db85Sdougm return (node); 9516185db85Sdougm } 9526185db85Sdougm 9536185db85Sdougm /* 9546185db85Sdougm * sa_add_share(group, sharepath, persist, *error) 9556185db85Sdougm * 9566185db85Sdougm * Add a new share object to the specified group. The share will 9576185db85Sdougm * have the specified sharepath and will only be constructed if 9586185db85Sdougm * it is a valid path to be shared. NULL is returned on error 9596185db85Sdougm * and a detailed error value will be returned via the error 9606185db85Sdougm * pointer. 9616185db85Sdougm */ 9626185db85Sdougm sa_share_t 9636185db85Sdougm sa_add_share(sa_group_t group, char *sharepath, int persist, int *error) 9646185db85Sdougm { 9656185db85Sdougm xmlNodePtr node = NULL; 9666185db85Sdougm sa_share_t dup; 9676185db85Sdougm 9686185db85Sdougm if ((dup = sa_find_share(sharepath)) == NULL && 9696185db85Sdougm (*error = sa_check_path(group, sharepath)) == SA_OK) { 9706185db85Sdougm node = _sa_add_share(group, sharepath, persist, error); 9716185db85Sdougm } 9726185db85Sdougm if (dup != NULL) 9736185db85Sdougm *error = SA_DUPLICATE_NAME; 9746185db85Sdougm 9756185db85Sdougm return ((sa_share_t)node); 9766185db85Sdougm } 9776185db85Sdougm 9786185db85Sdougm /* 9796185db85Sdougm * sa_enable_share(share, protocol) 9806185db85Sdougm * Enable the specified share to the specified protocol. 9816185db85Sdougm * If protocol is NULL, then all protocols. 9826185db85Sdougm */ 9836185db85Sdougm int 9846185db85Sdougm sa_enable_share(sa_share_t share, char *protocol) 9856185db85Sdougm { 9866185db85Sdougm char *sharepath; 9876185db85Sdougm struct stat st; 9886185db85Sdougm int err = 0; 9896185db85Sdougm 9906185db85Sdougm sharepath = sa_get_share_attr(share, "path"); 9916185db85Sdougm if (stat(sharepath, &st) < 0) { 9926185db85Sdougm err = SA_NO_SUCH_PATH; 9936185db85Sdougm } else { 9946185db85Sdougm /* tell the server about the share */ 9956185db85Sdougm if (protocol != NULL) { 9966185db85Sdougm /* lookup protocol specific handler */ 9976185db85Sdougm err = sa_proto_share(protocol, share); 9986185db85Sdougm if (err == SA_OK) 9996185db85Sdougm (void) sa_set_share_attr(share, "shared", "true"); 10006185db85Sdougm } else { 10016185db85Sdougm /* tell all protocols */ 10026185db85Sdougm err = sa_proto_share("nfs", share); /* only NFS for now */ 10036185db85Sdougm (void) sa_set_share_attr(share, "shared", "true"); 10046185db85Sdougm } 10056185db85Sdougm } 10066185db85Sdougm if (sharepath != NULL) 10076185db85Sdougm sa_free_attr_string(sharepath); 10086185db85Sdougm return (err); 10096185db85Sdougm } 10106185db85Sdougm 10116185db85Sdougm /* 10126185db85Sdougm * sa_disable_share(share, protocol) 10136185db85Sdougm * Disable the specified share to the specified protocol. 10146185db85Sdougm * If protocol is NULL, then all protocols. 10156185db85Sdougm */ 10166185db85Sdougm int 10176185db85Sdougm sa_disable_share(sa_share_t share, char *protocol) 10186185db85Sdougm { 10196185db85Sdougm char *path; 10206185db85Sdougm char *shared; 10216185db85Sdougm int ret = SA_OK; 10226185db85Sdougm 10236185db85Sdougm path = sa_get_share_attr(share, "path"); 10246185db85Sdougm shared = sa_get_share_attr(share, "shared"); 10256185db85Sdougm 10266185db85Sdougm if (protocol != NULL) { 10276185db85Sdougm ret = sa_proto_unshare(protocol, path); 10286185db85Sdougm } else { 10296185db85Sdougm /* need to do all protocols */ 10306185db85Sdougm ret = sa_proto_unshare("nfs", path); 10316185db85Sdougm } 10326185db85Sdougm if (ret == SA_OK) 10336185db85Sdougm (void) sa_set_share_attr(share, "shared", NULL); 10346185db85Sdougm if (path != NULL) 10356185db85Sdougm sa_free_attr_string(path); 10366185db85Sdougm if (shared != NULL) 10376185db85Sdougm sa_free_attr_string(shared); 10386185db85Sdougm return (ret); 10396185db85Sdougm } 10406185db85Sdougm 10416185db85Sdougm /* 10426185db85Sdougm * sa_remove_share(share) 10436185db85Sdougm * 10446185db85Sdougm * remove the specified share from its containing group. 10456185db85Sdougm * Remove from the SMF or ZFS configuration space. 10466185db85Sdougm */ 10476185db85Sdougm 10486185db85Sdougm int 10496185db85Sdougm sa_remove_share(sa_share_t share) 10506185db85Sdougm { 10516185db85Sdougm sa_group_t group; 10526185db85Sdougm int ret = SA_OK; 10536185db85Sdougm char *type; 10546185db85Sdougm int transient = 0; 10556185db85Sdougm char *groupname; 10566185db85Sdougm char *zfs; 10576185db85Sdougm 10586185db85Sdougm type = sa_get_share_attr(share, "type"); 10596185db85Sdougm group = sa_get_parent_group(share); 10606185db85Sdougm zfs = sa_get_group_attr(group, "zfs"); 10616185db85Sdougm groupname = sa_get_group_attr(group, "name"); 10626185db85Sdougm if (type != NULL && strcmp(type, "persist") != 0) 10636185db85Sdougm transient = 1; 10646185db85Sdougm if (type != NULL) 10656185db85Sdougm sa_free_attr_string(type); 10666185db85Sdougm 10676185db85Sdougm /* remove the node from its group then free the memory */ 10686185db85Sdougm 10696185db85Sdougm /* 10706185db85Sdougm * need to test if "busy" 10716185db85Sdougm */ 10726185db85Sdougm /* only do SMF action if permanent */ 10736185db85Sdougm if (!transient || zfs != NULL) { 10746185db85Sdougm /* remove from legacy dfstab as well as possible SMF */ 10756185db85Sdougm ret = sa_delete_legacy(share); 10766185db85Sdougm if (ret == SA_OK) { 10776185db85Sdougm if (!sa_group_is_zfs(group)) { 10786185db85Sdougm ret = sa_delete_share(scf_handle, group, share); 10796185db85Sdougm } else { 10806185db85Sdougm char *sharepath = sa_get_share_attr(share, "path"); 10816185db85Sdougm if (sharepath != NULL) { 10826185db85Sdougm ret = sa_zfs_set_sharenfs(group, sharepath, 0); 10836185db85Sdougm sa_free_attr_string(sharepath); 10846185db85Sdougm } 10856185db85Sdougm } 10866185db85Sdougm } 10876185db85Sdougm } 10886185db85Sdougm if (groupname != NULL) 10896185db85Sdougm sa_free_attr_string(groupname); 10906185db85Sdougm if (zfs != NULL) 10916185db85Sdougm sa_free_attr_string(zfs); 10926185db85Sdougm 10936185db85Sdougm xmlUnlinkNode((xmlNodePtr)share); 10946185db85Sdougm xmlFreeNode((xmlNodePtr)share); 10956185db85Sdougm return (ret); 10966185db85Sdougm } 10976185db85Sdougm 10986185db85Sdougm /* 10996185db85Sdougm * sa_move_share(group, share) 11006185db85Sdougm * 11016185db85Sdougm * move the specified share to the specified group. Update SMF 11026185db85Sdougm * appropriately. 11036185db85Sdougm */ 11046185db85Sdougm 11056185db85Sdougm int 11066185db85Sdougm sa_move_share(sa_group_t group, sa_share_t share) 11076185db85Sdougm { 11086185db85Sdougm sa_group_t oldgroup; 11096185db85Sdougm int ret = SA_OK; 11106185db85Sdougm 11116185db85Sdougm /* remove the node from its group then free the memory */ 11126185db85Sdougm 11136185db85Sdougm oldgroup = sa_get_parent_group(share); 11146185db85Sdougm if (oldgroup != group) { 11156185db85Sdougm xmlUnlinkNode((xmlNodePtr)share); 11166185db85Sdougm /* now that the share isn't in its old group, add to the new one */ 11176185db85Sdougm xmlAddChild((xmlNodePtr)group, (xmlNodePtr)share); 11186185db85Sdougm /* need to deal with SMF */ 11196185db85Sdougm if (ret == SA_OK) { 11206185db85Sdougm /* 11216185db85Sdougm * need to remove from old group first and then add to 11226185db85Sdougm * new group. Ideally, we would do the other order but 11236185db85Sdougm * need to avoid having the share in two groups at the 11246185db85Sdougm * same time. 11256185db85Sdougm */ 11266185db85Sdougm ret = sa_delete_share(scf_handle, oldgroup, share); 11276185db85Sdougm } 11286185db85Sdougm ret = sa_commit_share(scf_handle, group, share); 11296185db85Sdougm } 11306185db85Sdougm return (ret); 11316185db85Sdougm } 11326185db85Sdougm 11336185db85Sdougm /* 11346185db85Sdougm * sa_get_parent_group(share) 11356185db85Sdougm * 11366185db85Sdougm * Return the containg group for the share. If a group was actually 11376185db85Sdougm * passed in, we don't want a parent so return NULL. 11386185db85Sdougm */ 11396185db85Sdougm 11406185db85Sdougm sa_group_t 11416185db85Sdougm sa_get_parent_group(sa_share_t share) 11426185db85Sdougm { 11436185db85Sdougm xmlNodePtr node = NULL; 11446185db85Sdougm if (share != NULL) { 11456185db85Sdougm node = ((xmlNodePtr)share)->parent; 11466185db85Sdougm /* 11476185db85Sdougm * make sure parent is a group and not sharecfg since 11486185db85Sdougm * we may be cheating and passing in a group. 11496185db85Sdougm * Eventually, groups of groups might come into being. 11506185db85Sdougm */ 11516185db85Sdougm if (node == NULL || 11526185db85Sdougm xmlStrcmp(node->name, (xmlChar *)"sharecfg") == 0) 11536185db85Sdougm node = NULL; 11546185db85Sdougm } 11556185db85Sdougm return ((sa_group_t)node); 11566185db85Sdougm } 11576185db85Sdougm 11586185db85Sdougm /* 11596185db85Sdougm * _sa_create_group(groupname) 11606185db85Sdougm * 11616185db85Sdougm * Create a group in the document. The caller will need to deal with 11626185db85Sdougm * configuration store and activation. 11636185db85Sdougm */ 11646185db85Sdougm 11656185db85Sdougm sa_group_t 11666185db85Sdougm _sa_create_group(char *groupname) 11676185db85Sdougm { 11686185db85Sdougm xmlNodePtr node = NULL; 11696185db85Sdougm 11706185db85Sdougm if (sa_valid_group_name(groupname)) { 11716185db85Sdougm node = xmlNewChild(sa_config_tree, NULL, 11726185db85Sdougm (xmlChar *)"group", NULL); 11736185db85Sdougm if (node != NULL) { 11746185db85Sdougm xmlSetProp(node, (xmlChar *)"name", (xmlChar *)groupname); 11756185db85Sdougm xmlSetProp(node, (xmlChar *)"state", (xmlChar *)"enabled"); 11766185db85Sdougm } 11776185db85Sdougm } 11786185db85Sdougm return ((sa_group_t)node); 11796185db85Sdougm } 11806185db85Sdougm 11816185db85Sdougm /* 11826185db85Sdougm * _sa_create_zfs_group(group, groupname) 11836185db85Sdougm * 11846185db85Sdougm * Create a ZFS subgroup under the specified group. This may 11856185db85Sdougm * eventually form the basis of general sub-groups, but is currently 11866185db85Sdougm * restricted to ZFS. 11876185db85Sdougm */ 11886185db85Sdougm sa_group_t 11896185db85Sdougm _sa_create_zfs_group(sa_group_t group, char *groupname) 11906185db85Sdougm { 11916185db85Sdougm xmlNodePtr node = NULL; 11926185db85Sdougm 11936185db85Sdougm node = xmlNewChild((xmlNodePtr)group, NULL, 11946185db85Sdougm (xmlChar *)"group", NULL); 11956185db85Sdougm if (node != NULL) { 11966185db85Sdougm xmlSetProp(node, (xmlChar *)"name", (xmlChar *)groupname); 11976185db85Sdougm xmlSetProp(node, (xmlChar *)"state", (xmlChar *)"enabled"); 11986185db85Sdougm } 11996185db85Sdougm 12006185db85Sdougm return ((sa_group_t)node); 12016185db85Sdougm } 12026185db85Sdougm 12036185db85Sdougm /* 12046185db85Sdougm * sa_create_group(groupname, *error) 12056185db85Sdougm * 12066185db85Sdougm * Create a new group with groupname. Need to validate that it is a 12076185db85Sdougm * legal name for SMF and the construct the SMF service instance of 12086185db85Sdougm * svc:/network/shares/group to implement the group. All necessary 12096185db85Sdougm * operational properties must be added to the group at this point 12106185db85Sdougm * (via the SMF transaction model). 12116185db85Sdougm */ 12126185db85Sdougm sa_group_t 12136185db85Sdougm sa_create_group(char *groupname, int *error) 12146185db85Sdougm { 12156185db85Sdougm xmlNodePtr node = NULL; 12166185db85Sdougm sa_group_t group; 12176185db85Sdougm int ret; 12186185db85Sdougm char rbacstr[256]; 12196185db85Sdougm 12206185db85Sdougm ret = SA_OK; 12216185db85Sdougm 12226185db85Sdougm if (scf_handle == NULL) { 12236185db85Sdougm ret = SA_SYSTEM_ERR; 12246185db85Sdougm goto err; 12256185db85Sdougm } 12266185db85Sdougm 12276185db85Sdougm group = sa_get_group(groupname); 12286185db85Sdougm if (group != NULL) { 12296185db85Sdougm ret = SA_DUPLICATE_NAME; 12306185db85Sdougm } else { 12316185db85Sdougm if (sa_valid_group_name(groupname)) { 12326185db85Sdougm node = xmlNewChild(sa_config_tree, NULL, 12336185db85Sdougm (xmlChar *)"group", NULL); 12346185db85Sdougm if (node != NULL) { 12356185db85Sdougm xmlSetProp(node, (xmlChar *)"name", (xmlChar *)groupname); 12366185db85Sdougm /* default to the group being enabled */ 12376185db85Sdougm xmlSetProp(node, (xmlChar *)"state", (xmlChar *)"enabled"); 12386185db85Sdougm ret = sa_create_instance(scf_handle, groupname); 12396185db85Sdougm if (ret == SA_OK) { 12406185db85Sdougm ret = sa_start_transaction(scf_handle, "operation"); 12416185db85Sdougm } 12426185db85Sdougm if (ret == SA_OK) { 12436185db85Sdougm ret = sa_set_property(scf_handle, "state", "enabled"); 12446185db85Sdougm if (ret == SA_OK) { 12456185db85Sdougm ret = sa_end_transaction(scf_handle); 12466185db85Sdougm } else { 12476185db85Sdougm sa_abort_transaction(scf_handle); 12486185db85Sdougm } 12496185db85Sdougm } 12506185db85Sdougm if (ret == SA_OK) { 12516185db85Sdougm /* initialize the RBAC strings */ 12526185db85Sdougm ret = sa_start_transaction(scf_handle, "general"); 12536185db85Sdougm if (ret == SA_OK) { 12546185db85Sdougm (void) snprintf(rbacstr, sizeof (rbacstr), "%s.%s", 12556185db85Sdougm SA_RBAC_MANAGE, groupname); 12566185db85Sdougm ret = sa_set_property(scf_handle, 12576185db85Sdougm "action_authorization", 12586185db85Sdougm rbacstr); 12596185db85Sdougm } 12606185db85Sdougm if (ret == SA_OK) { 12616185db85Sdougm (void) snprintf(rbacstr, sizeof (rbacstr), "%s.%s", 12626185db85Sdougm SA_RBAC_VALUE, groupname); 12636185db85Sdougm ret = sa_set_property(scf_handle, 12646185db85Sdougm "value_authorization", 12656185db85Sdougm rbacstr); 12666185db85Sdougm } 12676185db85Sdougm if (ret == SA_OK) { 12686185db85Sdougm ret = sa_end_transaction(scf_handle); 12696185db85Sdougm } else { 12706185db85Sdougm sa_abort_transaction(scf_handle); 12716185db85Sdougm } 12726185db85Sdougm } 12736185db85Sdougm if (ret != SA_OK) { 12746185db85Sdougm /* 12756185db85Sdougm * Couldn't commit the group so we need to 12766185db85Sdougm * undo internally. 12776185db85Sdougm */ 12786185db85Sdougm xmlUnlinkNode(node); 12796185db85Sdougm xmlFreeNode(node); 12806185db85Sdougm node = NULL; 12816185db85Sdougm } 12826185db85Sdougm } else { 12836185db85Sdougm ret = SA_NO_MEMORY; 12846185db85Sdougm } 12856185db85Sdougm } else { 12866185db85Sdougm ret = SA_INVALID_NAME; 12876185db85Sdougm } 12886185db85Sdougm } 12896185db85Sdougm err: 12906185db85Sdougm if (error != NULL) 12916185db85Sdougm *error = ret; 12926185db85Sdougm return ((sa_group_t)node); 12936185db85Sdougm } 12946185db85Sdougm 12956185db85Sdougm /* 12966185db85Sdougm * sa_remove_group(group) 12976185db85Sdougm * 12986185db85Sdougm * Remove the specified group. This deletes from the SMF repository. 12996185db85Sdougm * All property groups and properties are removed. 13006185db85Sdougm */ 13016185db85Sdougm 13026185db85Sdougm int 13036185db85Sdougm sa_remove_group(sa_group_t group) 13046185db85Sdougm { 13056185db85Sdougm char *name; 13066185db85Sdougm int ret = SA_OK; 13076185db85Sdougm 13086185db85Sdougm name = sa_get_group_attr(group, "name"); 13096185db85Sdougm if (name != NULL) { 13106185db85Sdougm ret = sa_delete_instance(scf_handle, name); 13116185db85Sdougm sa_free_attr_string(name); 13126185db85Sdougm } 13136185db85Sdougm xmlUnlinkNode((xmlNodePtr)group); /* make sure unlinked */ 13146185db85Sdougm xmlFreeNode((xmlNodePtr)group); /* now it is gone */ 13156185db85Sdougm return (ret); 13166185db85Sdougm } 13176185db85Sdougm 13186185db85Sdougm /* 13196185db85Sdougm * sa_update_config() 13206185db85Sdougm * 13216185db85Sdougm * Used to update legacy files that need to be updated in bulk 13226185db85Sdougm * Currently, this is a placeholder and will go away in a future 13236185db85Sdougm * release. 13246185db85Sdougm */ 13256185db85Sdougm 13266185db85Sdougm int 13276185db85Sdougm sa_update_config() 13286185db85Sdougm { 13296185db85Sdougm struct stat st; 13306185db85Sdougm 13316185db85Sdougm /* 13326185db85Sdougm * do legacy files first so we can tell when they change. 13336185db85Sdougm * This will go away when we start updating individual records 13346185db85Sdougm * rather than the whole file. 13356185db85Sdougm */ 13366185db85Sdougm update_legacy_config(); 13376185db85Sdougm /* update legacy timestamp */ 13386185db85Sdougm if (stat(SA_LEGACY_DFSTAB, &st) >= 0) { 13396185db85Sdougm set_legacy_timestamp(sa_config_tree, SA_LEGACY_DFSTAB, 13406185db85Sdougm TSTAMP(st.st_ctim)); 13416185db85Sdougm } 13426185db85Sdougm return (SA_OK); 13436185db85Sdougm } 13446185db85Sdougm 13456185db85Sdougm /* 13466185db85Sdougm * get_node_attr(node, tag) 13476185db85Sdougm * 13486185db85Sdougm * Get the speficied tag(attribute) if it exists on the node. This is 13496185db85Sdougm * used internally by a number of attribute oriented functions. 13506185db85Sdougm */ 13516185db85Sdougm 13526185db85Sdougm static char * 13536185db85Sdougm get_node_attr(void *nodehdl, char *tag) 13546185db85Sdougm { 13556185db85Sdougm xmlNodePtr node = (xmlNodePtr)nodehdl; 13566185db85Sdougm xmlChar *name = NULL; 13576185db85Sdougm 13586185db85Sdougm if (node != NULL) { 13596185db85Sdougm name = xmlGetProp(node, (xmlChar *)tag); 13606185db85Sdougm } 13616185db85Sdougm return ((char *)name); 13626185db85Sdougm } 13636185db85Sdougm 13646185db85Sdougm /* 13656185db85Sdougm * get_node_attr(node, tag) 13666185db85Sdougm * 13676185db85Sdougm * Set the speficied tag(attribute) to the specified value This is 13686185db85Sdougm * used internally by a number of attribute oriented functions. It 13696185db85Sdougm * doesn't update the repository, only the internal document state. 13706185db85Sdougm */ 13716185db85Sdougm 13726185db85Sdougm void 13736185db85Sdougm set_node_attr(void *nodehdl, char *tag, char *value) 13746185db85Sdougm { 13756185db85Sdougm xmlNodePtr node = (xmlNodePtr)nodehdl; 13766185db85Sdougm if (node != NULL && tag != NULL) { 13776185db85Sdougm if (value != NULL) { 13786185db85Sdougm xmlSetProp(node, (xmlChar *)tag, (xmlChar *)value); 13796185db85Sdougm } else { 13806185db85Sdougm xmlUnsetProp(node, (xmlChar *)tag); 13816185db85Sdougm } 13826185db85Sdougm } 13836185db85Sdougm } 13846185db85Sdougm 13856185db85Sdougm /* 13866185db85Sdougm * sa_get_group_attr(group, tag) 13876185db85Sdougm * 13886185db85Sdougm * Get the specied attribute, if defined, for the group. 13896185db85Sdougm */ 13906185db85Sdougm 13916185db85Sdougm char * 13926185db85Sdougm sa_get_group_attr(sa_group_t group, char *tag) 13936185db85Sdougm { 13946185db85Sdougm return (get_node_attr((void *)group, tag)); 13956185db85Sdougm } 13966185db85Sdougm 13976185db85Sdougm /* 13986185db85Sdougm * sa_set_group_attr(group, tag, value) 13996185db85Sdougm * 14006185db85Sdougm * set the specified tag/attribute on the group using value as its 14016185db85Sdougm * value. 14026185db85Sdougm * 14036185db85Sdougm * This will result in setting the property in the SMF repository as 14046185db85Sdougm * well as in the internal document. 14056185db85Sdougm */ 14066185db85Sdougm 14076185db85Sdougm int 14086185db85Sdougm sa_set_group_attr(sa_group_t group, char *tag, char *value) 14096185db85Sdougm { 14106185db85Sdougm int ret; 14116185db85Sdougm char *groupname; 14126185db85Sdougm 14136185db85Sdougm groupname = sa_get_group_attr(group, "name"); 14146185db85Sdougm ret = sa_get_instance(scf_handle, groupname); 14156185db85Sdougm if (ret == SA_OK) { 14166185db85Sdougm set_node_attr((void *)group, tag, value); 14176185db85Sdougm ret = sa_start_transaction(scf_handle, "operation"); 14186185db85Sdougm if (ret == SA_OK) { 14196185db85Sdougm ret = sa_set_property(scf_handle, tag, value); 14206185db85Sdougm if (ret == SA_OK) 14216185db85Sdougm (void) sa_end_transaction(scf_handle); 14226185db85Sdougm else { 14236185db85Sdougm sa_abort_transaction(scf_handle); 14246185db85Sdougm } 14256185db85Sdougm } 14266185db85Sdougm } 14276185db85Sdougm if (groupname != NULL) 14286185db85Sdougm sa_free_attr_string(groupname); 14296185db85Sdougm return (ret); 14306185db85Sdougm } 14316185db85Sdougm 14326185db85Sdougm /* 14336185db85Sdougm * sa_get_share_attr(share, tag) 14346185db85Sdougm * 14356185db85Sdougm * Return the value of the tag/attribute set on the specified 14366185db85Sdougm * share. Returns NULL if the tag doesn't exist. 14376185db85Sdougm */ 14386185db85Sdougm 14396185db85Sdougm char * 14406185db85Sdougm sa_get_share_attr(sa_share_t share, char *tag) 14416185db85Sdougm { 14426185db85Sdougm return (get_node_attr((void *)share, tag)); 14436185db85Sdougm } 14446185db85Sdougm 14456185db85Sdougm /* 14466185db85Sdougm * sa_get_resource(group, resource) 14476185db85Sdougm * 14486185db85Sdougm * Search all the shares in the speified group for a share with a 14496185db85Sdougm * resource name matching the one specified. 14506185db85Sdougm * 14516185db85Sdougm * In the future, it may be advantageous to allow group to be NULL and 14526185db85Sdougm * search all groups but that isn't needed at present. 14536185db85Sdougm */ 14546185db85Sdougm 14556185db85Sdougm sa_share_t 14566185db85Sdougm sa_get_resource(sa_group_t group, char *resource) 14576185db85Sdougm { 14586185db85Sdougm sa_share_t share = NULL; 14596185db85Sdougm char *name = NULL; 14606185db85Sdougm 14616185db85Sdougm if (resource != NULL) { 14626185db85Sdougm for (share = sa_get_share(group, NULL); share != NULL; 14636185db85Sdougm share = sa_get_next_share(share)) { 14646185db85Sdougm name = sa_get_share_attr(share, "resource"); 14656185db85Sdougm if (name != NULL) { 14666185db85Sdougm if (strcmp(name, resource) == 0) 14676185db85Sdougm break; 14686185db85Sdougm sa_free_attr_string(name); 14696185db85Sdougm name = NULL; 14706185db85Sdougm } 14716185db85Sdougm } 14726185db85Sdougm if (name != NULL) 14736185db85Sdougm sa_free_attr_string(name); 14746185db85Sdougm } 14756185db85Sdougm return ((sa_share_t)share); 14766185db85Sdougm } 14776185db85Sdougm 14786185db85Sdougm /* 14796185db85Sdougm * _sa_set_share_description(share, description) 14806185db85Sdougm * 14816185db85Sdougm * Add a description tag with text contents to the specified share. 14826185db85Sdougm * A separate XML tag is used rather than a property. 14836185db85Sdougm */ 14846185db85Sdougm 14856185db85Sdougm xmlNodePtr 14866185db85Sdougm _sa_set_share_description(sa_share_t share, char *content) 14876185db85Sdougm { 14886185db85Sdougm xmlNodePtr node; 14896185db85Sdougm node = xmlNewChild((xmlNodePtr)share, 14906185db85Sdougm NULL, (xmlChar *)"description", NULL); 14916185db85Sdougm xmlNodeSetContent(node, (xmlChar *)content); 14926185db85Sdougm return (node); 14936185db85Sdougm } 14946185db85Sdougm 14956185db85Sdougm /* 14966185db85Sdougm * sa_set_share_attr(share, tag, value) 14976185db85Sdougm * 14986185db85Sdougm * Set the share attribute specified by tag to the specified value. In 14996185db85Sdougm * the case of "resource", enforce a no duplicates in a group rule. If 15006185db85Sdougm * the share is not transient, commit the changes to the repository 15016185db85Sdougm * else just update the share internally. 15026185db85Sdougm */ 15036185db85Sdougm 15046185db85Sdougm int 15056185db85Sdougm sa_set_share_attr(sa_share_t share, char *tag, char *value) 15066185db85Sdougm { 15076185db85Sdougm sa_group_t group; 15086185db85Sdougm sa_share_t resource; 15096185db85Sdougm int ret = SA_OK; 15106185db85Sdougm 15116185db85Sdougm group = sa_get_parent_group(share); 15126185db85Sdougm 15136185db85Sdougm /* 15146185db85Sdougm * There are some attributes that may have specific 15156185db85Sdougm * restrictions on them. Initially, only "resource" has 15166185db85Sdougm * special meaning that needs to be checked. Only one instance 15176185db85Sdougm * of a resource name may exist within a group. 15186185db85Sdougm */ 15196185db85Sdougm 15206185db85Sdougm if (strcmp(tag, "resource") == 0) { 15216185db85Sdougm resource = sa_get_resource(group, value); 15226185db85Sdougm if (resource != share && resource != NULL) 15236185db85Sdougm ret = SA_DUPLICATE_NAME; 15246185db85Sdougm } 15256185db85Sdougm if (ret == SA_OK) { 15266185db85Sdougm set_node_attr((void *)share, tag, value); 15276185db85Sdougm if (group != NULL) { 15286185db85Sdougm char *type; 15296185db85Sdougm /* we can probably optimize this some */ 15306185db85Sdougm type = sa_get_share_attr(share, "type"); 15316185db85Sdougm if (type == NULL || strcmp(type, "transient") != 0) 15326185db85Sdougm ret = sa_commit_share(scf_handle, group, share); 15336185db85Sdougm if (type != NULL) 15346185db85Sdougm sa_free_attr_string(type); 15356185db85Sdougm } 15366185db85Sdougm } 15376185db85Sdougm return (ret); 15386185db85Sdougm } 15396185db85Sdougm 15406185db85Sdougm /* 15416185db85Sdougm * sa_get_property_attr(prop, tag) 15426185db85Sdougm * 15436185db85Sdougm * Get the value of the specified property attribute. Standard 15446185db85Sdougm * attributes are "type" and "value". 15456185db85Sdougm */ 15466185db85Sdougm 15476185db85Sdougm char * 15486185db85Sdougm sa_get_property_attr(sa_property_t prop, char *tag) 15496185db85Sdougm { 15506185db85Sdougm return (get_node_attr((void *)prop, tag)); 15516185db85Sdougm } 15526185db85Sdougm 15536185db85Sdougm /* 15546185db85Sdougm * sa_get_optionset_attr(prop, tag) 15556185db85Sdougm * 15566185db85Sdougm * Get the value of the specified property attribute. Standard 15576185db85Sdougm * attribute is "type". 15586185db85Sdougm */ 15596185db85Sdougm 15606185db85Sdougm char * 15616185db85Sdougm sa_get_optionset_attr(sa_property_t optionset, char *tag) 15626185db85Sdougm { 15636185db85Sdougm return (get_node_attr((void *)optionset, tag)); 15646185db85Sdougm 15656185db85Sdougm } 15666185db85Sdougm 15676185db85Sdougm /* 15686185db85Sdougm * sa_set_optionset_attr(optionset, tag, value) 15696185db85Sdougm * 15706185db85Sdougm * Set the specified attribute(tag) to the specified value on the 15716185db85Sdougm * optionset. 15726185db85Sdougm */ 15736185db85Sdougm 15746185db85Sdougm void 15756185db85Sdougm sa_set_optionset_attr(sa_group_t optionset, char *tag, char *value) 15766185db85Sdougm { 15776185db85Sdougm set_node_attr((void *)optionset, tag, value); 15786185db85Sdougm } 15796185db85Sdougm 15806185db85Sdougm /* 15816185db85Sdougm * sa_free_attr_string(string) 15826185db85Sdougm * 15836185db85Sdougm * Free the string that was returned in one of the sa_get_*_attr() 15846185db85Sdougm * functions. 15856185db85Sdougm */ 15866185db85Sdougm 15876185db85Sdougm void 15886185db85Sdougm sa_free_attr_string(char *string) 15896185db85Sdougm { 15906185db85Sdougm xmlFree((xmlChar *)string); 15916185db85Sdougm } 15926185db85Sdougm 15936185db85Sdougm /* 15946185db85Sdougm * sa_get_optionset(group, proto) 15956185db85Sdougm * 15966185db85Sdougm * Return the optionset, if it exists, that is associated with the 15976185db85Sdougm * specified protocol. 15986185db85Sdougm */ 15996185db85Sdougm 16006185db85Sdougm sa_optionset_t 16016185db85Sdougm sa_get_optionset(void *group, char *proto) 16026185db85Sdougm { 16036185db85Sdougm xmlNodePtr node; 16046185db85Sdougm xmlChar *value = NULL; 16056185db85Sdougm 16066185db85Sdougm for (node = ((xmlNodePtr)group)->children; node != NULL; 16076185db85Sdougm node = node->next) { 16086185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"optionset") == 0) { 16096185db85Sdougm value = xmlGetProp(node, (xmlChar *)"type"); 16106185db85Sdougm if (proto != NULL) { 16116185db85Sdougm if (value != NULL && 16126185db85Sdougm xmlStrcmp(value, (xmlChar *)proto) == 0) { 16136185db85Sdougm break; 16146185db85Sdougm } 16156185db85Sdougm if (value != NULL) { 16166185db85Sdougm xmlFree(value); 16176185db85Sdougm value = NULL; 16186185db85Sdougm } 16196185db85Sdougm } else { 16206185db85Sdougm break; 16216185db85Sdougm } 16226185db85Sdougm } 16236185db85Sdougm } 16246185db85Sdougm if (value != NULL) 16256185db85Sdougm xmlFree(value); 16266185db85Sdougm return ((sa_optionset_t)node); 16276185db85Sdougm } 16286185db85Sdougm 16296185db85Sdougm /* 16306185db85Sdougm * sa_get_next_optionset(optionset) 16316185db85Sdougm * 16326185db85Sdougm * Return the next optionset in the group. NULL if this was the last. 16336185db85Sdougm */ 16346185db85Sdougm 16356185db85Sdougm sa_optionset_t 16366185db85Sdougm sa_get_next_optionset(sa_optionset_t optionset) 16376185db85Sdougm { 16386185db85Sdougm xmlNodePtr node; 16396185db85Sdougm 16406185db85Sdougm for (node = ((xmlNodePtr)optionset)->next; node != NULL; 16416185db85Sdougm node = node->next) { 16426185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"optionset") == 0) { 16436185db85Sdougm break; 16446185db85Sdougm } 16456185db85Sdougm } 16466185db85Sdougm return ((sa_optionset_t)node); 16476185db85Sdougm } 16486185db85Sdougm 16496185db85Sdougm /* 16506185db85Sdougm * sa_get_security(group, sectype, proto) 16516185db85Sdougm * 16526185db85Sdougm * Return the security optionset. The internal name is a hold over 16536185db85Sdougm * from the implementation and will be changed before the API is 16546185db85Sdougm * finalized. This is really a named optionset that can be negotiated 16556185db85Sdougm * as a group of properties (like NFS security options). 16566185db85Sdougm */ 16576185db85Sdougm 16586185db85Sdougm sa_security_t 16596185db85Sdougm sa_get_security(sa_group_t group, char *sectype, char *proto) 16606185db85Sdougm { 16616185db85Sdougm xmlNodePtr node; 16626185db85Sdougm xmlChar *value = NULL; 16636185db85Sdougm 16646185db85Sdougm for (node = ((xmlNodePtr)group)->children; node != NULL; 16656185db85Sdougm node = node->next) { 16666185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"security") == 0) { 16676185db85Sdougm if (proto != NULL) { 16686185db85Sdougm value = xmlGetProp(node, (xmlChar *)"type"); 16696185db85Sdougm if (value == NULL || 16706185db85Sdougm (value != NULL && 16716185db85Sdougm xmlStrcmp(value, (xmlChar *)proto) != 0)) { 16726185db85Sdougm /* it doesn't match so continue */ 16736185db85Sdougm xmlFree(value); 16746185db85Sdougm value = NULL; 16756185db85Sdougm continue; 16766185db85Sdougm } 16776185db85Sdougm } 16786185db85Sdougm if (value != NULL) { 16796185db85Sdougm xmlFree(value); 16806185db85Sdougm value = NULL; 16816185db85Sdougm } 16826185db85Sdougm /* potential match */ 16836185db85Sdougm if (sectype != NULL) { 16846185db85Sdougm value = xmlGetProp(node, (xmlChar *)"sectype"); 16856185db85Sdougm if (value != NULL && 16866185db85Sdougm xmlStrcmp(value, (xmlChar *)sectype) == 0) { 16876185db85Sdougm break; 16886185db85Sdougm } 16896185db85Sdougm } else { 16906185db85Sdougm break; 16916185db85Sdougm } 16926185db85Sdougm } 16936185db85Sdougm if (value != NULL) { 16946185db85Sdougm xmlFree(value); 16956185db85Sdougm value = NULL; 16966185db85Sdougm } 16976185db85Sdougm } 16986185db85Sdougm if (value != NULL) 16996185db85Sdougm xmlFree(value); 17006185db85Sdougm return ((sa_security_t)node); 17016185db85Sdougm } 17026185db85Sdougm 17036185db85Sdougm /* 17046185db85Sdougm * sa_get_next_security(security) 17056185db85Sdougm * 17066185db85Sdougm * Get the next security optionset if one exists. 17076185db85Sdougm */ 17086185db85Sdougm 17096185db85Sdougm sa_security_t 17106185db85Sdougm sa_get_next_security(sa_security_t security) 17116185db85Sdougm { 17126185db85Sdougm xmlNodePtr node; 17136185db85Sdougm 17146185db85Sdougm for (node = ((xmlNodePtr)security)->next; node != NULL; 17156185db85Sdougm node = node->next) { 17166185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"security") == 0) { 17176185db85Sdougm break; 17186185db85Sdougm } 17196185db85Sdougm } 17206185db85Sdougm return ((sa_security_t)node); 17216185db85Sdougm } 17226185db85Sdougm 17236185db85Sdougm /* 17246185db85Sdougm * sa_get_property(optionset, prop) 17256185db85Sdougm * 17266185db85Sdougm * Get the property object with the name specified in prop from the 17276185db85Sdougm * optionset. 17286185db85Sdougm */ 17296185db85Sdougm 17306185db85Sdougm sa_property_t 17316185db85Sdougm sa_get_property(sa_optionset_t optionset, char *prop) 17326185db85Sdougm { 17336185db85Sdougm xmlNodePtr node = (xmlNodePtr)optionset; 17346185db85Sdougm xmlChar *value = NULL; 17356185db85Sdougm 17366185db85Sdougm if (optionset == NULL) 17376185db85Sdougm return (NULL); 17386185db85Sdougm 17396185db85Sdougm for (node = node->children; node != NULL; 17406185db85Sdougm node = node->next) { 17416185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"option") == 0) { 17426185db85Sdougm if (prop == NULL) 17436185db85Sdougm break; 17446185db85Sdougm value = xmlGetProp(node, (xmlChar *)"type"); 17456185db85Sdougm if (value != NULL && xmlStrcmp(value, (xmlChar *)prop) == 0) { 17466185db85Sdougm break; 17476185db85Sdougm } 17486185db85Sdougm if (value != NULL) { 17496185db85Sdougm xmlFree(value); 17506185db85Sdougm value = NULL; 17516185db85Sdougm } 17526185db85Sdougm } 17536185db85Sdougm } 17546185db85Sdougm if (value != NULL) 17556185db85Sdougm xmlFree(value); 17566185db85Sdougm if (node != NULL && xmlStrcmp(node->name, (xmlChar *)"option") != 0) { 17576185db85Sdougm /* avoid a non option node -- it is possible to be a text node */ 17586185db85Sdougm node = NULL; 17596185db85Sdougm } 17606185db85Sdougm return ((sa_property_t)node); 17616185db85Sdougm } 17626185db85Sdougm 17636185db85Sdougm /* 17646185db85Sdougm * sa_get_next_property(property) 17656185db85Sdougm * 17666185db85Sdougm * Get the next property following the specified property. NULL if 17676185db85Sdougm * this was the last. 17686185db85Sdougm */ 17696185db85Sdougm 17706185db85Sdougm sa_property_t 17716185db85Sdougm sa_get_next_property(sa_property_t property) 17726185db85Sdougm { 17736185db85Sdougm xmlNodePtr node; 17746185db85Sdougm 17756185db85Sdougm for (node = ((xmlNodePtr)property)->next; node != NULL; 17766185db85Sdougm node = node->next) { 17776185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"option") == 0) { 17786185db85Sdougm break; 17796185db85Sdougm } 17806185db85Sdougm } 17816185db85Sdougm return ((sa_property_t)node); 17826185db85Sdougm } 17836185db85Sdougm 17846185db85Sdougm /* 17856185db85Sdougm * sa_set_share_description(share, content) 17866185db85Sdougm * 17876185db85Sdougm * Set the description of share to content. 17886185db85Sdougm */ 17896185db85Sdougm 17906185db85Sdougm int 17916185db85Sdougm sa_set_share_description(sa_share_t share, char *content) 17926185db85Sdougm { 17936185db85Sdougm xmlNodePtr node; 17946185db85Sdougm sa_group_t group; 17956185db85Sdougm int ret = SA_OK; 17966185db85Sdougm 17976185db85Sdougm for (node = ((xmlNodePtr)share)->children; node != NULL; 17986185db85Sdougm node = node->next) { 17996185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"description") == 0) { 18006185db85Sdougm break; 18016185db85Sdougm } 18026185db85Sdougm } 18036185db85Sdougm group = sa_get_parent_group(share); 18046185db85Sdougm /* no existing description but want to add */ 18056185db85Sdougm if (node == NULL && content != NULL) { 18066185db85Sdougm /* add a description */ 18076185db85Sdougm node = _sa_set_share_description(share, content); 18086185db85Sdougm } else if (node != NULL && content != NULL) { 18096185db85Sdougm /* update a description */ 18106185db85Sdougm xmlNodeSetContent(node, (xmlChar *)content); 18116185db85Sdougm } else if (node != NULL && content == NULL) { 18126185db85Sdougm /* remove an existing description */ 18136185db85Sdougm xmlUnlinkNode(node); 18146185db85Sdougm xmlFreeNode(node); 18156185db85Sdougm } 18166185db85Sdougm if (group != NULL && is_persistent((sa_group_t)share)) 18176185db85Sdougm ret = sa_commit_share(scf_handle, group, share); 18186185db85Sdougm return (ret); 18196185db85Sdougm } 18206185db85Sdougm 18216185db85Sdougm /* 18226185db85Sdougm * fixproblemchars(string) 18236185db85Sdougm * 18246185db85Sdougm * don't want any newline or tab characters in the text since these 18256185db85Sdougm * could break display of data and legacy file formats. 18266185db85Sdougm */ 18276185db85Sdougm static void 18286185db85Sdougm fixproblemchars(char *str) 18296185db85Sdougm { 18306185db85Sdougm int c; 18316185db85Sdougm for (c = *str; c != '\0'; c = *++str) { 18326185db85Sdougm if (c == '\t' || c == '\n') 18336185db85Sdougm *str = ' '; 18346185db85Sdougm else if (c == '"') 18356185db85Sdougm *str = '\''; 18366185db85Sdougm } 18376185db85Sdougm } 18386185db85Sdougm 18396185db85Sdougm /* 18406185db85Sdougm * sa_get_share_description(share) 18416185db85Sdougm * 18426185db85Sdougm * Return the description text for the specified share if it 18436185db85Sdougm * exists. NULL if no description exists. 18446185db85Sdougm */ 18456185db85Sdougm 18466185db85Sdougm char * 18476185db85Sdougm sa_get_share_description(sa_share_t share) 18486185db85Sdougm { 18496185db85Sdougm xmlChar *description = NULL; 18506185db85Sdougm xmlNodePtr node; 18516185db85Sdougm 18526185db85Sdougm for (node = ((xmlNodePtr)share)->children; node != NULL; 18536185db85Sdougm node = node->next) { 18546185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"description") == 0) { 18556185db85Sdougm break; 18566185db85Sdougm } 18576185db85Sdougm } 18586185db85Sdougm if (node != NULL) { 18596185db85Sdougm description = xmlNodeGetContent((xmlNodePtr)share); 18606185db85Sdougm fixproblemchars((char *)description); 18616185db85Sdougm } 18626185db85Sdougm return ((char *)description); 18636185db85Sdougm } 18646185db85Sdougm 18656185db85Sdougm /* 18666185db85Sdougm * sa_free(share_description(description) 18676185db85Sdougm * 18686185db85Sdougm * Free the description string. 18696185db85Sdougm */ 18706185db85Sdougm 18716185db85Sdougm void 18726185db85Sdougm sa_free_share_description(char *description) 18736185db85Sdougm { 18746185db85Sdougm xmlFree((xmlChar *)description); 18756185db85Sdougm } 18766185db85Sdougm 18776185db85Sdougm /* 18786185db85Sdougm * sa_create_optionset(group, proto) 18796185db85Sdougm * 18806185db85Sdougm * Create an optionset for the specified protocol in the specied 18816185db85Sdougm * group. This is manifested as a property group within SMF. 18826185db85Sdougm */ 18836185db85Sdougm 18846185db85Sdougm sa_optionset_t 18856185db85Sdougm sa_create_optionset(sa_group_t group, char *proto) 18866185db85Sdougm { 18876185db85Sdougm sa_optionset_t optionset; 18886185db85Sdougm sa_group_t parent = group; 18896185db85Sdougm 18906185db85Sdougm optionset = sa_get_optionset(group, proto); 18916185db85Sdougm if (optionset != NULL) { 18926185db85Sdougm /* can't have a duplicate protocol */ 18936185db85Sdougm optionset = NULL; 18946185db85Sdougm } else { 18956185db85Sdougm optionset = (sa_optionset_t)xmlNewChild((xmlNodePtr)group, 18966185db85Sdougm NULL, 18976185db85Sdougm (xmlChar *)"optionset", 18986185db85Sdougm NULL); 18996185db85Sdougm /* 19006185db85Sdougm * only put to repository if on a group and we were 19016185db85Sdougm * able to create an optionset. 19026185db85Sdougm */ 19036185db85Sdougm if (optionset != NULL) { 19046185db85Sdougm char oname[256]; 19056185db85Sdougm char *groupname; 19066185db85Sdougm char *id = NULL; 19076185db85Sdougm 19086185db85Sdougm if (sa_is_share(group)) 19096185db85Sdougm parent = sa_get_parent_group((sa_share_t)group); 19106185db85Sdougm 19116185db85Sdougm sa_set_optionset_attr(optionset, "type", proto); 19126185db85Sdougm 19136185db85Sdougm if (sa_is_share(group)) { 19146185db85Sdougm id = sa_get_share_attr((sa_share_t)group, "id"); 19156185db85Sdougm } 19166185db85Sdougm (void) sa_optionset_name(optionset, oname, 19176185db85Sdougm sizeof (oname), id); 19186185db85Sdougm groupname = sa_get_group_attr(parent, "name"); 19196185db85Sdougm if (groupname != NULL && is_persistent(group)) { 19206185db85Sdougm (void) sa_get_instance(scf_handle, groupname); 19216185db85Sdougm sa_free_attr_string(groupname); 19226185db85Sdougm (void) sa_create_pgroup(scf_handle, oname); 19236185db85Sdougm } 19246185db85Sdougm if (id != NULL) 19256185db85Sdougm sa_free_attr_string(id); 19266185db85Sdougm } 19276185db85Sdougm } 19286185db85Sdougm return (optionset); 19296185db85Sdougm } 19306185db85Sdougm 19316185db85Sdougm /* 19326185db85Sdougm * sa_get_property_parent(property) 19336185db85Sdougm * 19346185db85Sdougm * Given a property, return the object it is a property of. This will 19356185db85Sdougm * be an optionset of some type. 19366185db85Sdougm */ 19376185db85Sdougm 19386185db85Sdougm static sa_optionset_t 19396185db85Sdougm sa_get_property_parent(sa_property_t property) 19406185db85Sdougm { 19416185db85Sdougm xmlNodePtr node = NULL; 19426185db85Sdougm 19436185db85Sdougm if (property != NULL) { 19446185db85Sdougm node = ((xmlNodePtr)property)->parent; 19456185db85Sdougm } 19466185db85Sdougm return ((sa_optionset_t)node); 19476185db85Sdougm } 19486185db85Sdougm 19496185db85Sdougm /* 19506185db85Sdougm * sa_get_optionset_parent(optionset) 19516185db85Sdougm * 19526185db85Sdougm * Return the parent of the specified optionset. This could be a group 19536185db85Sdougm * or a share. 19546185db85Sdougm */ 19556185db85Sdougm 19566185db85Sdougm static sa_group_t 19576185db85Sdougm sa_get_optionset_parent(sa_optionset_t optionset) 19586185db85Sdougm { 19596185db85Sdougm xmlNodePtr node = NULL; 19606185db85Sdougm 19616185db85Sdougm if (optionset != NULL) { 19626185db85Sdougm node = ((xmlNodePtr)optionset)->parent; 19636185db85Sdougm } 19646185db85Sdougm return ((sa_group_t)node); 19656185db85Sdougm } 19666185db85Sdougm 19676185db85Sdougm /* 19686185db85Sdougm * zfs_needs_update(share) 19696185db85Sdougm * 19706185db85Sdougm * In order to avoid making multiple updates to a ZFS share when 19716185db85Sdougm * setting properties, the share attribute "changed" will be set to 19726185db85Sdougm * true when a property is added or modifed. When done adding 19736185db85Sdougm * properties, we can then detect that an update is needed. We then 19746185db85Sdougm * clear the state here to detect additional changes. 19756185db85Sdougm */ 19766185db85Sdougm 19776185db85Sdougm static int 19786185db85Sdougm zfs_needs_update(sa_share_t share) 19796185db85Sdougm { 19806185db85Sdougm char *attr; 19816185db85Sdougm int result = 0; 19826185db85Sdougm 19836185db85Sdougm attr = sa_get_share_attr(share, "changed"); 19846185db85Sdougm if (attr != NULL) { 19856185db85Sdougm sa_free_attr_string(attr); 19866185db85Sdougm result = 1; 19876185db85Sdougm } 19886185db85Sdougm set_node_attr((void *)share, "changed", NULL); 19896185db85Sdougm return (result); 19906185db85Sdougm } 19916185db85Sdougm 19926185db85Sdougm /* 19936185db85Sdougm * zfs_set_update(share) 19946185db85Sdougm * 19956185db85Sdougm * Set the changed attribute of the share to true. 19966185db85Sdougm */ 19976185db85Sdougm 19986185db85Sdougm static void 19996185db85Sdougm zfs_set_update(sa_share_t share) 20006185db85Sdougm { 20016185db85Sdougm set_node_attr((void *)share, "changed", "true"); 20026185db85Sdougm } 20036185db85Sdougm 20046185db85Sdougm /* 20056185db85Sdougm * sa_commit_properties(optionset, clear) 20066185db85Sdougm * 20076185db85Sdougm * Check if SMF or ZFS config and either update or abort the pending 20086185db85Sdougm * changes. 20096185db85Sdougm */ 20106185db85Sdougm 20116185db85Sdougm int 20126185db85Sdougm sa_commit_properties(sa_optionset_t optionset, int clear) 20136185db85Sdougm { 20146185db85Sdougm sa_group_t group; 20156185db85Sdougm sa_group_t parent; 20166185db85Sdougm int zfs = 0; 20176185db85Sdougm int needsupdate = 0; 20186185db85Sdougm int ret = SA_OK; 20196185db85Sdougm 20206185db85Sdougm group = sa_get_optionset_parent(optionset); 20216185db85Sdougm if (group != NULL && (sa_is_share(group) || is_zfs_group(group))) { 20226185db85Sdougm /* only update ZFS if on a share */ 20236185db85Sdougm parent = sa_get_parent_group(group); 20246185db85Sdougm zfs++; 20256185db85Sdougm if (parent != NULL && is_zfs_group(parent)) { 20266185db85Sdougm needsupdate = zfs_needs_update(group); 20276185db85Sdougm } else { 20286185db85Sdougm zfs = 0; 20296185db85Sdougm } 20306185db85Sdougm } 20316185db85Sdougm if (zfs) { 20326185db85Sdougm if (!clear && needsupdate) 20336185db85Sdougm ret = sa_zfs_update((sa_share_t)group); 20346185db85Sdougm } else { 20356185db85Sdougm if (clear) 20366185db85Sdougm (void) sa_abort_transaction(scf_handle); 20376185db85Sdougm else 20386185db85Sdougm ret = sa_end_transaction(scf_handle); 20396185db85Sdougm } 20406185db85Sdougm return (ret); 20416185db85Sdougm } 20426185db85Sdougm 20436185db85Sdougm /* 20446185db85Sdougm * sa_destroy_optionset(optionset) 20456185db85Sdougm * 20466185db85Sdougm * Remove the optionset from its group. Update the repostory to 20476185db85Sdougm * reflect this change. 20486185db85Sdougm */ 20496185db85Sdougm 20506185db85Sdougm int 20516185db85Sdougm sa_destroy_optionset(sa_optionset_t optionset) 20526185db85Sdougm { 20536185db85Sdougm char name[256]; 20546185db85Sdougm int len; 20556185db85Sdougm int ret; 20566185db85Sdougm char *id = NULL; 20576185db85Sdougm sa_group_t group; 20586185db85Sdougm int ispersist = 1; 20596185db85Sdougm 20606185db85Sdougm /* now delete the prop group */ 20616185db85Sdougm group = sa_get_optionset_parent(optionset); 20626185db85Sdougm if (group != NULL && sa_is_share(group)) { 20636185db85Sdougm ispersist = is_persistent(group); 20646185db85Sdougm id = sa_get_share_attr((sa_share_t)group, "id"); 20656185db85Sdougm } 20666185db85Sdougm if (ispersist) { 20676185db85Sdougm len = sa_optionset_name(optionset, name, sizeof (name), id); 20686185db85Sdougm if (len > 0) { 20696185db85Sdougm ret = sa_delete_pgroup(scf_handle, name); 20706185db85Sdougm } 20716185db85Sdougm } 20726185db85Sdougm xmlUnlinkNode((xmlNodePtr)optionset); 20736185db85Sdougm xmlFreeNode((xmlNodePtr)optionset); 20746185db85Sdougm if (id != NULL) 20756185db85Sdougm sa_free_attr_string(id); 20766185db85Sdougm return (ret); 20776185db85Sdougm } 20786185db85Sdougm 20796185db85Sdougm /* private to the implementation */ 20806185db85Sdougm int 20816185db85Sdougm _sa_remove_optionset(sa_optionset_t optionset) 20826185db85Sdougm { 20836185db85Sdougm int ret = SA_OK; 20846185db85Sdougm 20856185db85Sdougm xmlUnlinkNode((xmlNodePtr)optionset); 20866185db85Sdougm xmlFreeNode((xmlNodePtr)optionset); 20876185db85Sdougm return (ret); 20886185db85Sdougm } 20896185db85Sdougm 20906185db85Sdougm /* 20916185db85Sdougm * sa_create_security(group, sectype, proto) 20926185db85Sdougm * 20936185db85Sdougm * Create a security optionset (one that has a type name and a 20946185db85Sdougm * proto). Security is left over from a pure NFS implementation. The 20956185db85Sdougm * naming will change in the future when the API is released. 20966185db85Sdougm */ 20976185db85Sdougm sa_security_t 20986185db85Sdougm sa_create_security(sa_group_t group, char *sectype, char *proto) 20996185db85Sdougm { 21006185db85Sdougm sa_security_t security; 21016185db85Sdougm char *id = NULL; 21026185db85Sdougm sa_group_t parent; 21036185db85Sdougm char *groupname = NULL; 21046185db85Sdougm 21056185db85Sdougm if (group != NULL && sa_is_share(group)) { 21066185db85Sdougm id = sa_get_share_attr((sa_share_t)group, "id"); 21076185db85Sdougm parent = sa_get_parent_group(group); 21086185db85Sdougm if (parent != NULL) 21096185db85Sdougm groupname = sa_get_group_attr(parent, "name"); 21106185db85Sdougm } else if (group != NULL) { 21116185db85Sdougm groupname = sa_get_group_attr(group, "name"); 21126185db85Sdougm } 21136185db85Sdougm 21146185db85Sdougm security = sa_get_security(group, sectype, proto); 21156185db85Sdougm if (security != NULL) { 21166185db85Sdougm /* can't have a duplicate security option */ 21176185db85Sdougm security = NULL; 21186185db85Sdougm } else { 21196185db85Sdougm security = (sa_security_t)xmlNewChild((xmlNodePtr)group, 21206185db85Sdougm NULL, 21216185db85Sdougm (xmlChar *)"security", 21226185db85Sdougm NULL); 21236185db85Sdougm if (security != NULL) { 21246185db85Sdougm char oname[256]; 21256185db85Sdougm sa_set_security_attr(security, "type", proto); 21266185db85Sdougm 21276185db85Sdougm sa_set_security_attr(security, "sectype", sectype); 21286185db85Sdougm (void) sa_security_name(security, oname, 21296185db85Sdougm sizeof (oname), id); 21306185db85Sdougm if (groupname != NULL && is_persistent(group)) { 21316185db85Sdougm (void) sa_get_instance(scf_handle, groupname); 21326185db85Sdougm (void) sa_create_pgroup(scf_handle, oname); 21336185db85Sdougm } 21346185db85Sdougm } 21356185db85Sdougm } 21366185db85Sdougm if (groupname != NULL) 21376185db85Sdougm sa_free_attr_string(groupname); 21386185db85Sdougm return (security); 21396185db85Sdougm } 21406185db85Sdougm 21416185db85Sdougm /* 21426185db85Sdougm * sa_destroy_security(security) 21436185db85Sdougm * 21446185db85Sdougm * Remove the specified optionset from the document and the 21456185db85Sdougm * configuration. 21466185db85Sdougm */ 21476185db85Sdougm 21486185db85Sdougm int 21496185db85Sdougm sa_destroy_security(sa_security_t security) 21506185db85Sdougm { 21516185db85Sdougm char name[256]; 21526185db85Sdougm int len; 21536185db85Sdougm int ret = SA_OK; 21546185db85Sdougm char *id = NULL; 21556185db85Sdougm sa_group_t group; 21566185db85Sdougm int iszfs = 0; 21576185db85Sdougm int ispersist = 1; 21586185db85Sdougm 21596185db85Sdougm group = sa_get_optionset_parent(security); 21606185db85Sdougm 21616185db85Sdougm if (group != NULL) 21626185db85Sdougm iszfs = sa_group_is_zfs(group); 21636185db85Sdougm 21646185db85Sdougm if (group != NULL && !iszfs) { 21656185db85Sdougm if (sa_is_share(group)) 21666185db85Sdougm ispersist = is_persistent(group); 21676185db85Sdougm id = sa_get_share_attr((sa_share_t)group, "id"); 21686185db85Sdougm } 21696185db85Sdougm if (ispersist) { 21706185db85Sdougm len = sa_security_name(security, name, sizeof (name), id); 21716185db85Sdougm if (!iszfs && len > 0) { 21726185db85Sdougm ret = sa_delete_pgroup(scf_handle, name); 21736185db85Sdougm } 21746185db85Sdougm } 21756185db85Sdougm xmlUnlinkNode((xmlNodePtr)security); 21766185db85Sdougm xmlFreeNode((xmlNodePtr)security); 21776185db85Sdougm if (iszfs) { 21786185db85Sdougm ret = sa_zfs_update(group); 21796185db85Sdougm } 21806185db85Sdougm if (id != NULL) 21816185db85Sdougm sa_free_attr_string(id); 21826185db85Sdougm return (ret); 21836185db85Sdougm } 21846185db85Sdougm 21856185db85Sdougm /* 21866185db85Sdougm * sa_get_security_attr(optionset, tag) 21876185db85Sdougm * 21886185db85Sdougm * Return the specified attribute value from the optionset. 21896185db85Sdougm */ 21906185db85Sdougm 21916185db85Sdougm char * 21926185db85Sdougm sa_get_security_attr(sa_property_t optionset, char *tag) 21936185db85Sdougm { 21946185db85Sdougm return (get_node_attr((void *)optionset, tag)); 21956185db85Sdougm 21966185db85Sdougm } 21976185db85Sdougm 21986185db85Sdougm /* 21996185db85Sdougm * sa_set_security_attr(optionset, tag, value) 22006185db85Sdougm * 22016185db85Sdougm * Set the optioset attribute specied by tag to the specified value. 22026185db85Sdougm */ 22036185db85Sdougm 22046185db85Sdougm void 22056185db85Sdougm sa_set_security_attr(sa_group_t optionset, char *tag, char *value) 22066185db85Sdougm { 22076185db85Sdougm set_node_attr((void *)optionset, tag, value); 22086185db85Sdougm } 22096185db85Sdougm 22106185db85Sdougm /* 22116185db85Sdougm * is_nodetype(node, type) 22126185db85Sdougm * 22136185db85Sdougm * Check to see if node is of the type specified. 22146185db85Sdougm */ 22156185db85Sdougm 22166185db85Sdougm static int 22176185db85Sdougm is_nodetype(void *node, char *type) 22186185db85Sdougm { 22196185db85Sdougm return (strcmp((char *)((xmlNodePtr)node)->name, type) == 0); 22206185db85Sdougm } 22216185db85Sdougm 22226185db85Sdougm /* 22236185db85Sdougm * sa_set_prop_by_prop(optionset, group, prop, type) 22246185db85Sdougm * 22256185db85Sdougm * Add/remove/update the specified property prop into the optionset or 22266185db85Sdougm * share. If a share, sort out which property group based on GUID. In 22276185db85Sdougm * all cases, the appropriate transaction is set (or ZFS share is 22286185db85Sdougm * marked as needing an update) 22296185db85Sdougm */ 22306185db85Sdougm 22316185db85Sdougm #define SA_PROP_OP_REMOVE 1 22326185db85Sdougm #define SA_PROP_OP_ADD 2 22336185db85Sdougm #define SA_PROP_OP_UPDATE 3 22346185db85Sdougm static int 22356185db85Sdougm sa_set_prop_by_prop(sa_optionset_t optionset, sa_group_t group, 22366185db85Sdougm sa_property_t prop, int type) 22376185db85Sdougm { 22386185db85Sdougm char *name; 22396185db85Sdougm char *valstr; 22406185db85Sdougm int ret = SA_OK; 22416185db85Sdougm scf_transaction_entry_t *entry; 22426185db85Sdougm scf_value_t *value; 22436185db85Sdougm int opttype; /* 1 == optionset, 0 == security */ 22446185db85Sdougm char *id = NULL; 22456185db85Sdougm int iszfs = 0; 22466185db85Sdougm int isshare = 0; 22476185db85Sdougm sa_group_t parent = NULL; 22486185db85Sdougm 22496185db85Sdougm if (!is_persistent(group)) { 22506185db85Sdougm /* 22516185db85Sdougm * if the group/share is not persistent we don't need 22526185db85Sdougm * to do anything here 22536185db85Sdougm */ 22546185db85Sdougm return (SA_OK); 22556185db85Sdougm } 22566185db85Sdougm name = sa_get_property_attr(prop, "type"); 22576185db85Sdougm valstr = sa_get_property_attr(prop, "value"); 22586185db85Sdougm entry = scf_entry_create(scf_handle->handle); 22596185db85Sdougm opttype = is_nodetype((void *)optionset, "optionset"); 22606185db85Sdougm 22616185db85Sdougm if (valstr != NULL && entry != NULL) { 22626185db85Sdougm if (sa_is_share(group)) { 22636185db85Sdougm isshare = 1; 22646185db85Sdougm parent = sa_get_parent_group(group); 22656185db85Sdougm if (parent != NULL) { 22666185db85Sdougm iszfs = is_zfs_group(parent); 22676185db85Sdougm } 22686185db85Sdougm } else { 22696185db85Sdougm iszfs = is_zfs_group(group); 22706185db85Sdougm } 22716185db85Sdougm if (!iszfs) { 22726185db85Sdougm if (scf_handle->trans == NULL) { 22736185db85Sdougm char oname[256]; 22746185db85Sdougm char *groupname = NULL; 22756185db85Sdougm if (isshare) { 22766185db85Sdougm if (parent != NULL) { 22776185db85Sdougm groupname = sa_get_group_attr(parent, "name"); 22786185db85Sdougm } 22796185db85Sdougm id = sa_get_share_attr((sa_share_t)group, "id"); 22806185db85Sdougm } else { 22816185db85Sdougm groupname = sa_get_group_attr(group, "name"); 22826185db85Sdougm } 22836185db85Sdougm if (groupname != NULL) { 22846185db85Sdougm ret = sa_get_instance(scf_handle, groupname); 22856185db85Sdougm sa_free_attr_string(groupname); 22866185db85Sdougm } 22876185db85Sdougm if (opttype) 22886185db85Sdougm (void) sa_optionset_name(optionset, oname, 22896185db85Sdougm sizeof (oname), id); 22906185db85Sdougm else 22916185db85Sdougm (void) sa_security_name(optionset, oname, 22926185db85Sdougm sizeof (oname), id); 22936185db85Sdougm ret = sa_start_transaction(scf_handle, oname); 22946185db85Sdougm } 22956185db85Sdougm if (ret == SA_OK) { 22966185db85Sdougm switch (type) { 22976185db85Sdougm case SA_PROP_OP_REMOVE: 22986185db85Sdougm ret = scf_transaction_property_delete(scf_handle->trans, 22996185db85Sdougm entry, 23006185db85Sdougm name); 23016185db85Sdougm break; 23026185db85Sdougm case SA_PROP_OP_ADD: 23036185db85Sdougm case SA_PROP_OP_UPDATE: 23046185db85Sdougm value = scf_value_create(scf_handle->handle); 23056185db85Sdougm if (value != NULL) { 23066185db85Sdougm if (type == SA_PROP_OP_ADD) 23076185db85Sdougm ret = scf_transaction_property_new( 23086185db85Sdougm scf_handle->trans, 23096185db85Sdougm entry, 23106185db85Sdougm name, 23116185db85Sdougm SCF_TYPE_ASTRING); 23126185db85Sdougm else 23136185db85Sdougm ret = scf_transaction_property_change( 23146185db85Sdougm scf_handle->trans, 23156185db85Sdougm entry, 23166185db85Sdougm name, 23176185db85Sdougm SCF_TYPE_ASTRING); 23186185db85Sdougm if (ret == 0) { 23196185db85Sdougm ret = scf_value_set_astring(value, valstr); 23206185db85Sdougm if (ret == 0) 23216185db85Sdougm ret = scf_entry_add_value(entry, value); 23226185db85Sdougm if (ret != 0) { 23236185db85Sdougm scf_value_destroy(value); 23246185db85Sdougm ret = SA_SYSTEM_ERR; 23256185db85Sdougm } 23266185db85Sdougm } else { 23276185db85Sdougm scf_entry_destroy(entry); 23286185db85Sdougm ret = SA_SYSTEM_ERR; 23296185db85Sdougm } 23306185db85Sdougm break; 23316185db85Sdougm } 23326185db85Sdougm } 23336185db85Sdougm } 23346185db85Sdougm } else { 23356185db85Sdougm /* 23366185db85Sdougm * ZFS update. The calling function would have updated 23376185db85Sdougm * the internal XML structure. Just need to flag it as 23386185db85Sdougm * changed for ZFS. 23396185db85Sdougm */ 23406185db85Sdougm zfs_set_update((sa_share_t)group); 23416185db85Sdougm } 23426185db85Sdougm } 23436185db85Sdougm 23446185db85Sdougm if (name != NULL) 23456185db85Sdougm sa_free_attr_string(name); 23466185db85Sdougm if (valstr != NULL) 23476185db85Sdougm sa_free_attr_string(valstr); 23486185db85Sdougm else if (entry != NULL) 23496185db85Sdougm scf_entry_destroy(entry); 23506185db85Sdougm 23516185db85Sdougm if (ret == -1) 23526185db85Sdougm ret = SA_SYSTEM_ERR; 23536185db85Sdougm 23546185db85Sdougm return (ret); 23556185db85Sdougm } 23566185db85Sdougm 23576185db85Sdougm /* 23586185db85Sdougm * sa_create_property(name, value) 23596185db85Sdougm * 23606185db85Sdougm * Create a new property with the specified name and value. 23616185db85Sdougm */ 23626185db85Sdougm 23636185db85Sdougm sa_property_t 23646185db85Sdougm sa_create_property(char *name, char *value) 23656185db85Sdougm { 23666185db85Sdougm xmlNodePtr node; 23676185db85Sdougm 23686185db85Sdougm node = xmlNewNode(NULL, (xmlChar *)"option"); 23696185db85Sdougm if (node != NULL) { 23706185db85Sdougm xmlSetProp(node, (xmlChar *)"type", (xmlChar *)name); 23716185db85Sdougm xmlSetProp(node, (xmlChar *)"value", (xmlChar *)value); 23726185db85Sdougm } 23736185db85Sdougm return ((sa_property_t)node); 23746185db85Sdougm } 23756185db85Sdougm 23766185db85Sdougm /* 23776185db85Sdougm * sa_add_property(object, property) 23786185db85Sdougm * 23796185db85Sdougm * Add the specified property to the object. Issue the appropriate 23806185db85Sdougm * transaction or mark a ZFS object as needing an update. 23816185db85Sdougm */ 23826185db85Sdougm 23836185db85Sdougm int 23846185db85Sdougm sa_add_property(void *object, sa_property_t property) 23856185db85Sdougm { 23866185db85Sdougm int ret = SA_OK; 23876185db85Sdougm sa_group_t parent; 23886185db85Sdougm sa_group_t group; 23896185db85Sdougm char *proto; 23906185db85Sdougm 23916185db85Sdougm proto = sa_get_optionset_attr(object, "type"); 23926185db85Sdougm if (property != NULL) { 23936185db85Sdougm if ((ret = sa_valid_property(object, proto, property)) == SA_OK) { 23946185db85Sdougm property = (sa_property_t)xmlAddChild((xmlNodePtr)object, 23956185db85Sdougm (xmlNodePtr)property); 23966185db85Sdougm } else { 23976185db85Sdougm if (proto != NULL) 23986185db85Sdougm sa_free_attr_string(proto); 23996185db85Sdougm return (ret); 24006185db85Sdougm } 24016185db85Sdougm } 24026185db85Sdougm 24036185db85Sdougm if (proto != NULL) 24046185db85Sdougm sa_free_attr_string(proto); 24056185db85Sdougm 24066185db85Sdougm parent = sa_get_parent_group(object); 24076185db85Sdougm if (!is_persistent(parent)) { 24086185db85Sdougm return (ret); 24096185db85Sdougm } 24106185db85Sdougm 24116185db85Sdougm if (sa_is_share(parent)) 24126185db85Sdougm group = sa_get_parent_group(parent); 24136185db85Sdougm else 24146185db85Sdougm group = parent; 24156185db85Sdougm 24166185db85Sdougm if (property == NULL) 24176185db85Sdougm ret = SA_NO_MEMORY; 24186185db85Sdougm else { 24196185db85Sdougm char oname[256]; 24206185db85Sdougm 24216185db85Sdougm if (!is_zfs_group(group)) { 24226185db85Sdougm char *id = NULL; 24236185db85Sdougm if (sa_is_share((sa_group_t)parent)) { 24246185db85Sdougm id = sa_get_share_attr((sa_share_t)parent, "id"); 24256185db85Sdougm } 24266185db85Sdougm if (scf_handle->trans == NULL) { 24276185db85Sdougm if (is_nodetype(object, "optionset")) 24286185db85Sdougm (void) sa_optionset_name((sa_optionset_t)object, 24296185db85Sdougm oname, sizeof (oname), id); 24306185db85Sdougm else 24316185db85Sdougm (void) sa_security_name((sa_optionset_t)object, 24326185db85Sdougm oname, sizeof (oname), id); 24336185db85Sdougm ret = sa_start_transaction(scf_handle, oname); 24346185db85Sdougm } 24356185db85Sdougm if (ret == SA_OK) { 24366185db85Sdougm char *name; 24376185db85Sdougm char *value; 24386185db85Sdougm name = sa_get_property_attr(property, "type"); 24396185db85Sdougm value = sa_get_property_attr(property, "value"); 24406185db85Sdougm if (name != NULL && value != NULL) { 24416185db85Sdougm if (scf_handle->scf_state == SCH_STATE_INIT) 24426185db85Sdougm ret = sa_set_property(scf_handle, name, value); 24436185db85Sdougm } else 24446185db85Sdougm ret = SA_CONFIG_ERR; 24456185db85Sdougm if (name != NULL) 24466185db85Sdougm sa_free_attr_string(name); 24476185db85Sdougm if (value != NULL) 24486185db85Sdougm sa_free_attr_string(value); 24496185db85Sdougm } 24506185db85Sdougm if (id != NULL) 24516185db85Sdougm sa_free_attr_string(id); 24526185db85Sdougm } else { 24536185db85Sdougm /* 24546185db85Sdougm * ZFS is a special case. We do want to allow editing 24556185db85Sdougm * property/security lists since we can have a better 24566185db85Sdougm * syntax and we also want to keep things consistent 24576185db85Sdougm * when possible. 24586185db85Sdougm * 24596185db85Sdougm * Right now, we defer until the sa_commit_properties 24606185db85Sdougm * so we can get them all at once. We do need to mark 24616185db85Sdougm * the share as "changed" 24626185db85Sdougm */ 24636185db85Sdougm zfs_set_update((sa_share_t)parent); 24646185db85Sdougm } 24656185db85Sdougm } 24666185db85Sdougm return (ret); 24676185db85Sdougm } 24686185db85Sdougm 24696185db85Sdougm /* 24706185db85Sdougm * sa_remove_property(property) 24716185db85Sdougm * 24726185db85Sdougm * Remove the specied property from its containing object. Update the 24736185db85Sdougm * repository as appropriate. 24746185db85Sdougm */ 24756185db85Sdougm 24766185db85Sdougm int 24776185db85Sdougm sa_remove_property(sa_property_t property) 24786185db85Sdougm { 24796185db85Sdougm int ret = SA_OK; 24806185db85Sdougm 24816185db85Sdougm if (property != NULL) { 24826185db85Sdougm sa_optionset_t optionset; 24836185db85Sdougm sa_group_t group; 24846185db85Sdougm optionset = sa_get_property_parent(property); 24856185db85Sdougm if (optionset != NULL) { 24866185db85Sdougm group = sa_get_optionset_parent(optionset); 24876185db85Sdougm if (group != NULL) { 24886185db85Sdougm ret = sa_set_prop_by_prop(optionset, group, property, 24896185db85Sdougm SA_PROP_OP_REMOVE); 24906185db85Sdougm } 24916185db85Sdougm } 24926185db85Sdougm xmlUnlinkNode((xmlNodePtr)property); 24936185db85Sdougm xmlFreeNode((xmlNodePtr)property); 24946185db85Sdougm } else { 24956185db85Sdougm ret = SA_NO_SUCH_PROP; 24966185db85Sdougm } 24976185db85Sdougm return (ret); 24986185db85Sdougm } 24996185db85Sdougm 25006185db85Sdougm /* 25016185db85Sdougm * sa_update_property(property, value) 25026185db85Sdougm * 25036185db85Sdougm * Update the specified property to the new value. If value is NULL, 25046185db85Sdougm * we currently treat this as a remove. 25056185db85Sdougm */ 25066185db85Sdougm 25076185db85Sdougm int 25086185db85Sdougm sa_update_property(sa_property_t property, char *value) 25096185db85Sdougm { 25106185db85Sdougm int ret = SA_OK; 25116185db85Sdougm if (value == NULL) { 25126185db85Sdougm return (sa_remove_property(property)); 25136185db85Sdougm } else { 25146185db85Sdougm sa_optionset_t optionset; 25156185db85Sdougm sa_group_t group; 25166185db85Sdougm set_node_attr((void *)property, "value", value); 25176185db85Sdougm optionset = sa_get_property_parent(property); 25186185db85Sdougm if (optionset != NULL) { 25196185db85Sdougm group = sa_get_optionset_parent(optionset); 25206185db85Sdougm if (group != NULL) { 25216185db85Sdougm ret = sa_set_prop_by_prop(optionset, group, property, 25226185db85Sdougm SA_PROP_OP_UPDATE); 25236185db85Sdougm } 25246185db85Sdougm } else { 25256185db85Sdougm ret = SA_NO_SUCH_PROP; 25266185db85Sdougm } 25276185db85Sdougm } 25286185db85Sdougm return (ret); 25296185db85Sdougm } 25306185db85Sdougm 25316185db85Sdougm /* 25326185db85Sdougm * _sa_get_next_error(node) 25336185db85Sdougm * 25346185db85Sdougm * Get the next (first if node==NULL) error node in the 25356185db85Sdougm * document. "error" nodes are added if there were syntax errors 25366185db85Sdougm * during parsing of the /etc/dfs/dfstab file. They are preserved in 25376185db85Sdougm * comments and recreated in the doc on the next parse. 25386185db85Sdougm */ 25396185db85Sdougm 25406185db85Sdougm xmlNodePtr 25416185db85Sdougm _sa_get_next_error(xmlNodePtr node) 25426185db85Sdougm { 25436185db85Sdougm if (node == NULL) { 25446185db85Sdougm for (node = sa_config_tree->xmlChildrenNode; 25456185db85Sdougm node != NULL; node = node->next) 25466185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"error") == 0) 25476185db85Sdougm return (node); 25486185db85Sdougm } else { 25496185db85Sdougm for (node = node->next; node != NULL; node = node->next) 25506185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"error") == 0) 25516185db85Sdougm return (node); 25526185db85Sdougm } 25536185db85Sdougm return (node); 25546185db85Sdougm } 25556185db85Sdougm 25566185db85Sdougm /* 25576185db85Sdougm * sa_get_protocol_property(propset, prop) 25586185db85Sdougm * 25596185db85Sdougm * Get the specified protocol specific property. These are global to 25606185db85Sdougm * the protocol and not specific to a group or share. 25616185db85Sdougm */ 25626185db85Sdougm 25636185db85Sdougm sa_property_t 25646185db85Sdougm sa_get_protocol_property(sa_protocol_properties_t propset, char *prop) 25656185db85Sdougm { 25666185db85Sdougm xmlNodePtr node = (xmlNodePtr)propset; 25676185db85Sdougm xmlChar *value = NULL; 25686185db85Sdougm 25696185db85Sdougm for (node = node->children; node != NULL; 25706185db85Sdougm node = node->next) { 25716185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"option") == 0) { 25726185db85Sdougm if (prop == NULL) 25736185db85Sdougm break; 25746185db85Sdougm value = xmlGetProp(node, (xmlChar *)"type"); 25756185db85Sdougm if (value != NULL && 25766185db85Sdougm xmlStrcasecmp(value, (xmlChar *)prop) == 0) { 25776185db85Sdougm break; 25786185db85Sdougm } 25796185db85Sdougm if (value != NULL) { 25806185db85Sdougm xmlFree(value); 25816185db85Sdougm value = NULL; 25826185db85Sdougm } 25836185db85Sdougm } 25846185db85Sdougm } 25856185db85Sdougm if (value != NULL) 25866185db85Sdougm xmlFree(value); 25876185db85Sdougm if (node != NULL && xmlStrcmp(node->name, (xmlChar *)"option") != 0) { 25886185db85Sdougm /* avoid a non option node -- it is possible to be a text node */ 25896185db85Sdougm node = NULL; 25906185db85Sdougm } 25916185db85Sdougm return ((sa_property_t)node); 25926185db85Sdougm } 25936185db85Sdougm 25946185db85Sdougm /* 25956185db85Sdougm * sa_get_next_protocol_property(prop) 25966185db85Sdougm * 25976185db85Sdougm * Get the next protocol specific property in the list. 25986185db85Sdougm */ 25996185db85Sdougm 26006185db85Sdougm sa_property_t 26016185db85Sdougm sa_get_next_protocol_property(sa_property_t prop) 26026185db85Sdougm { 26036185db85Sdougm xmlNodePtr node; 26046185db85Sdougm 26056185db85Sdougm for (node = ((xmlNodePtr)prop)->next; node != NULL; 26066185db85Sdougm node = node->next) { 26076185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"option") == 0) { 26086185db85Sdougm break; 26096185db85Sdougm } 26106185db85Sdougm } 26116185db85Sdougm return ((sa_property_t)node); 26126185db85Sdougm } 26136185db85Sdougm 26146185db85Sdougm /* 26156185db85Sdougm * sa_set_protocol_property(prop, value) 26166185db85Sdougm * 26176185db85Sdougm * Set the specified property to have the new value. The protocol 26186185db85Sdougm * specific plugin will then be called to update the property. 26196185db85Sdougm */ 26206185db85Sdougm 26216185db85Sdougm int 26226185db85Sdougm sa_set_protocol_property(sa_property_t prop, char *value) 26236185db85Sdougm { 26246185db85Sdougm sa_protocol_properties_t propset; 26256185db85Sdougm char *proto; 26266185db85Sdougm int ret = SA_INVALID_PROTOCOL; 26276185db85Sdougm 26286185db85Sdougm propset = ((xmlNodePtr)prop)->parent; 26296185db85Sdougm if (propset != NULL) { 26306185db85Sdougm proto = sa_get_optionset_attr(propset, "type"); 26316185db85Sdougm if (proto != NULL) { 26326185db85Sdougm set_node_attr((xmlNodePtr)prop, "value", value); 26336185db85Sdougm ret = sa_proto_set_property(proto, prop); 26346185db85Sdougm sa_free_attr_string(prop); 26356185db85Sdougm } 26366185db85Sdougm } 26376185db85Sdougm return (ret); 26386185db85Sdougm } 26396185db85Sdougm 26406185db85Sdougm /* 26416185db85Sdougm * sa_add_protocol_property(propset, prop) 26426185db85Sdougm * 26436185db85Sdougm * Add a new property to the protocol sepcific property set. 26446185db85Sdougm */ 26456185db85Sdougm 26466185db85Sdougm int 26476185db85Sdougm sa_add_protocol_property(sa_protocol_properties_t propset, sa_property_t prop) 26486185db85Sdougm { 26496185db85Sdougm xmlNodePtr node; 26506185db85Sdougm 26516185db85Sdougm /* should check for legitimacy */ 26526185db85Sdougm node = xmlAddChild((xmlNodePtr)propset, (xmlNodePtr)prop); 26536185db85Sdougm if (node != NULL) 26546185db85Sdougm return (SA_OK); 26556185db85Sdougm return (SA_NO_MEMORY); 26566185db85Sdougm } 26576185db85Sdougm 26586185db85Sdougm /* 26596185db85Sdougm * sa_create_protocol_properties(proto) 26606185db85Sdougm * 26616185db85Sdougm * Create a protocol specifity property set. 26626185db85Sdougm */ 26636185db85Sdougm 26646185db85Sdougm sa_protocol_properties_t 26656185db85Sdougm sa_create_protocol_properties(char *proto) 26666185db85Sdougm { 26676185db85Sdougm xmlNodePtr node; 26686185db85Sdougm node = xmlNewNode(NULL, (xmlChar *)"propertyset"); 26696185db85Sdougm if (node != NULL) { 26706185db85Sdougm xmlSetProp(node, (xmlChar *)"type", (xmlChar *)proto); 26716185db85Sdougm } 26726185db85Sdougm return (node); 26736185db85Sdougm } 2674