xref: /titanic_53/usr/src/lib/libshare/common/libshare.c (revision 1d1813a7a7c570174c2b6adc372045307b266117)
16185db85Sdougm /*
26185db85Sdougm  * CDDL HEADER START
36185db85Sdougm  *
46185db85Sdougm  * The contents of this file are subject to the terms of the
56185db85Sdougm  * Common Development and Distribution License (the "License").
66185db85Sdougm  * You may not use this file except in compliance with the License.
76185db85Sdougm  *
86185db85Sdougm  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
96185db85Sdougm  * or http://www.opensolaris.org/os/licensing.
106185db85Sdougm  * See the License for the specific language governing permissions
116185db85Sdougm  * and limitations under the License.
126185db85Sdougm  *
136185db85Sdougm  * When distributing Covered Code, include this CDDL HEADER in each
146185db85Sdougm  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
156185db85Sdougm  * If applicable, add the following below this CDDL HEADER, with the
166185db85Sdougm  * fields enclosed by brackets "[]" replaced with your own identifying
176185db85Sdougm  * information: Portions Copyright [yyyy] [name of copyright owner]
186185db85Sdougm  *
196185db85Sdougm  * CDDL HEADER END
206185db85Sdougm  */
216185db85Sdougm 
226185db85Sdougm /*
23f345c0beSdougm  * Copyright 2007 Sun Microsystems, Inc.  All rights reserved.
246185db85Sdougm  * Use is subject to license terms.
256185db85Sdougm  */
266185db85Sdougm 
276185db85Sdougm #pragma ident	"%Z%%M%	%I%	%E% SMI"
286185db85Sdougm 
296185db85Sdougm /*
306185db85Sdougm  * Share control API
316185db85Sdougm  */
326185db85Sdougm #include <stdio.h>
336185db85Sdougm #include <string.h>
346185db85Sdougm #include <ctype.h>
356185db85Sdougm #include <sys/types.h>
366185db85Sdougm #include <sys/stat.h>
37a99982a7Sdougm #include <fcntl.h>
386185db85Sdougm #include <unistd.h>
396185db85Sdougm #include <libxml/parser.h>
406185db85Sdougm #include <libxml/tree.h>
416185db85Sdougm #include "libshare.h"
426185db85Sdougm #include "libshare_impl.h"
436185db85Sdougm #include <libscf.h>
446185db85Sdougm #include "scfutil.h"
456185db85Sdougm #include <ctype.h>
466185db85Sdougm #include <libintl.h>
47549ec3ffSdougm #include <thread.h>
48549ec3ffSdougm #include <synch.h>
496185db85Sdougm 
506185db85Sdougm #if _NOT_SMF
516185db85Sdougm #define	CONFIG_FILE	"/var/tmp/share.cfg"
526185db85Sdougm #define	CONFIG_FILE_TMP	"/var/tmp/share.cfg.tmp"
536185db85Sdougm #endif
546185db85Sdougm #define	TSTAMP(tm)	(uint64_t)(((uint64_t)tm.tv_sec << 32) | \
556185db85Sdougm 					(tm.tv_nsec & 0xffffffff))
566185db85Sdougm 
57a99982a7Sdougm #define	DFS_LOCK_FILE	"/etc/dfs/fstypes"
58a99982a7Sdougm 
596185db85Sdougm /*
606185db85Sdougm  * internal data structures
616185db85Sdougm  */
626185db85Sdougm 
636185db85Sdougm extern struct sa_proto_plugin *sap_proto_list;
646185db85Sdougm 
656185db85Sdougm /* current SMF/SVC repository handle */
66549ec3ffSdougm extern void getlegacyconfig(sa_handle_t, char *, xmlNodePtr *);
67549ec3ffSdougm extern int gettransients(sa_handle_impl_t, xmlNodePtr *);
686185db85Sdougm extern int sa_valid_property(void *, char *, sa_property_t);
696185db85Sdougm extern char *sa_fstype(char *);
706185db85Sdougm extern int sa_is_share(void *);
716185db85Sdougm extern ssize_t scf_max_name_len; /* defined in scfutil during initialization */
726185db85Sdougm extern int sa_group_is_zfs(sa_group_t);
736185db85Sdougm extern int sa_path_is_zfs(char *);
746185db85Sdougm extern int sa_zfs_set_sharenfs(sa_group_t, char *, int);
75549ec3ffSdougm extern void update_legacy_config(sa_handle_t);
766185db85Sdougm extern int issubdir(char *, char *);
77549ec3ffSdougm extern void sa_zfs_init(sa_handle_impl_t);
78549ec3ffSdougm extern void sa_zfs_fini(sa_handle_impl_t);
79a99982a7Sdougm extern void sablocksigs(sigset_t *);
80a99982a7Sdougm extern void saunblocksigs(sigset_t *);
816185db85Sdougm 
82549ec3ffSdougm /*
83549ec3ffSdougm  * Data structures for finding/managing the document root to access
84549ec3ffSdougm  * handle mapping. The list isn't expected to grow very large so a
85549ec3ffSdougm  * simple list is acceptable. The purpose is to provide a way to start
86549ec3ffSdougm  * with a group or share and find the library handle needed for
87549ec3ffSdougm  * various operations.
88549ec3ffSdougm  */
89549ec3ffSdougm mutex_t sa_global_lock;
90549ec3ffSdougm struct doc2handle {
91549ec3ffSdougm 	struct doc2handle	*next;
92549ec3ffSdougm 	xmlNodePtr		root;
93549ec3ffSdougm 	sa_handle_impl_t	handle;
94549ec3ffSdougm };
95549ec3ffSdougm 
96549ec3ffSdougm static struct doc2handle *sa_global_handles = NULL;
976185db85Sdougm 
986185db85Sdougm /* helper functions */
996185db85Sdougm 
100549ec3ffSdougm /*
101549ec3ffSdougm  * sa_errorstr(err)
102549ec3ffSdougm  *
103549ec3ffSdougm  * convert an error value to an error string
104549ec3ffSdougm  */
105549ec3ffSdougm 
1066185db85Sdougm char *
1076185db85Sdougm sa_errorstr(int err)
1086185db85Sdougm {
1096185db85Sdougm 	static char errstr[32];
1106185db85Sdougm 	char *ret = NULL;
1116185db85Sdougm 
1126185db85Sdougm 	switch (err) {
1136185db85Sdougm 	case SA_OK:
11424424a35Sdougm 	    ret = dgettext(TEXT_DOMAIN, "ok");
1156185db85Sdougm 	    break;
1166185db85Sdougm 	case SA_NO_SUCH_PATH:
11724424a35Sdougm 	    ret = dgettext(TEXT_DOMAIN, "path doesn't exist");
1186185db85Sdougm 	    break;
1196185db85Sdougm 	case SA_NO_MEMORY:
12024424a35Sdougm 	    ret = dgettext(TEXT_DOMAIN, "no memory");
1216185db85Sdougm 	    break;
1226185db85Sdougm 	case SA_DUPLICATE_NAME:
12324424a35Sdougm 	    ret = dgettext(TEXT_DOMAIN, "name in use");
1246185db85Sdougm 	    break;
1256185db85Sdougm 	case SA_BAD_PATH:
12624424a35Sdougm 	    ret = dgettext(TEXT_DOMAIN, "bad path");
1276185db85Sdougm 	    break;
1286185db85Sdougm 	case SA_NO_SUCH_GROUP:
12924424a35Sdougm 	    ret = dgettext(TEXT_DOMAIN, "no such group");
1306185db85Sdougm 	    break;
1316185db85Sdougm 	case SA_CONFIG_ERR:
13224424a35Sdougm 	    ret = dgettext(TEXT_DOMAIN, "configuration error");
1336185db85Sdougm 	    break;
1346185db85Sdougm 	case SA_SYSTEM_ERR:
13524424a35Sdougm 	    ret = dgettext(TEXT_DOMAIN, "system error");
1366185db85Sdougm 	    break;
1376185db85Sdougm 	case SA_SYNTAX_ERR:
13824424a35Sdougm 	    ret = dgettext(TEXT_DOMAIN, "syntax error");
1396185db85Sdougm 	    break;
1406185db85Sdougm 	case SA_NO_PERMISSION:
14124424a35Sdougm 	    ret = dgettext(TEXT_DOMAIN, "no permission");
1426185db85Sdougm 	    break;
1436185db85Sdougm 	case SA_BUSY:
14424424a35Sdougm 	    ret = dgettext(TEXT_DOMAIN, "busy");
1456185db85Sdougm 	    break;
1466185db85Sdougm 	case SA_NO_SUCH_PROP:
14724424a35Sdougm 	    ret = dgettext(TEXT_DOMAIN, "no such property");
1486185db85Sdougm 	    break;
1496185db85Sdougm 	case SA_INVALID_NAME:
15024424a35Sdougm 	    ret = dgettext(TEXT_DOMAIN, "invalid name");
1516185db85Sdougm 	    break;
1526185db85Sdougm 	case SA_INVALID_PROTOCOL:
15324424a35Sdougm 	    ret = dgettext(TEXT_DOMAIN, "invalid protocol");
1546185db85Sdougm 	    break;
1556185db85Sdougm 	case SA_NOT_ALLOWED:
15624424a35Sdougm 	    ret = dgettext(TEXT_DOMAIN, "operation not allowed");
1576185db85Sdougm 	    break;
1586185db85Sdougm 	case SA_BAD_VALUE:
15924424a35Sdougm 	    ret = dgettext(TEXT_DOMAIN, "bad property value");
1606185db85Sdougm 	    break;
1616185db85Sdougm 	case SA_INVALID_SECURITY:
16224424a35Sdougm 	    ret = dgettext(TEXT_DOMAIN, "invalid security type");
1636185db85Sdougm 	    break;
1646185db85Sdougm 	case SA_NO_SUCH_SECURITY:
16524424a35Sdougm 	    ret = dgettext(TEXT_DOMAIN, "security type not found");
1666185db85Sdougm 	    break;
1676185db85Sdougm 	case SA_VALUE_CONFLICT:
16824424a35Sdougm 	    ret = dgettext(TEXT_DOMAIN, "property value conflict");
1696185db85Sdougm 	    break;
1706185db85Sdougm 	case SA_NOT_IMPLEMENTED:
17124424a35Sdougm 	    ret = dgettext(TEXT_DOMAIN, "not implemented");
1726185db85Sdougm 	    break;
1736185db85Sdougm 	case SA_INVALID_PATH:
17424424a35Sdougm 	    ret = dgettext(TEXT_DOMAIN, "invalid path");
1756185db85Sdougm 	    break;
1766185db85Sdougm 	case SA_NOT_SUPPORTED:
17724424a35Sdougm 	    ret = dgettext(TEXT_DOMAIN, "operation not supported");
1786185db85Sdougm 	    break;
1796185db85Sdougm 	case SA_PROP_SHARE_ONLY:
18024424a35Sdougm 	    ret = dgettext(TEXT_DOMAIN, "property not valid for group");
1816185db85Sdougm 	    break;
1826185db85Sdougm 	case SA_NOT_SHARED:
18324424a35Sdougm 	    ret = dgettext(TEXT_DOMAIN, "not shared");
1846185db85Sdougm 	    break;
1856185db85Sdougm 	default:
1866185db85Sdougm 	    (void) snprintf(errstr, sizeof (errstr),
18724424a35Sdougm 				dgettext(TEXT_DOMAIN, "unknown %d"), err);
1886185db85Sdougm 	    ret = errstr;
1896185db85Sdougm 	}
1906185db85Sdougm 	return (ret);
1916185db85Sdougm }
1926185db85Sdougm 
1936185db85Sdougm /*
194549ec3ffSdougm  * Document root to active handle mapping functions.  These are only
195549ec3ffSdougm  * used internally. A mutex is used to prevent access while the list
196549ec3ffSdougm  * is changing. In general, the list will be relatively short - one
197549ec3ffSdougm  * item per thread that has called sa_init().
198549ec3ffSdougm  */
199549ec3ffSdougm 
200549ec3ffSdougm sa_handle_impl_t
201549ec3ffSdougm get_handle_for_root(xmlNodePtr root)
202549ec3ffSdougm {
203549ec3ffSdougm 	struct doc2handle *item;
204549ec3ffSdougm 
205549ec3ffSdougm 	(void) mutex_lock(&sa_global_lock);
206549ec3ffSdougm 	for (item = sa_global_handles; item != NULL; item = item->next) {
207549ec3ffSdougm 	    if (item->root == root)
208549ec3ffSdougm 		break;
209549ec3ffSdougm 	}
210549ec3ffSdougm 	(void) mutex_unlock(&sa_global_lock);
211549ec3ffSdougm 	if (item != NULL)
212549ec3ffSdougm 	    return (item->handle);
213549ec3ffSdougm 	return (NULL);
214549ec3ffSdougm }
215549ec3ffSdougm 
216549ec3ffSdougm static int
217549ec3ffSdougm add_handle_for_root(xmlNodePtr root, sa_handle_impl_t handle)
218549ec3ffSdougm {
219549ec3ffSdougm 	struct doc2handle *item;
220549ec3ffSdougm 	int ret = SA_NO_MEMORY;
221549ec3ffSdougm 
222549ec3ffSdougm 	item = (struct doc2handle *)calloc(sizeof (struct doc2handle), 1);
223549ec3ffSdougm 	if (item != NULL) {
224549ec3ffSdougm 	    item->root = root;
225549ec3ffSdougm 	    item->handle = handle;
226549ec3ffSdougm 	    (void) mutex_lock(&sa_global_lock);
227549ec3ffSdougm 	    item->next = sa_global_handles;
228549ec3ffSdougm 	    sa_global_handles = item;
229549ec3ffSdougm 	    (void) mutex_unlock(&sa_global_lock);
230549ec3ffSdougm 	    ret = SA_OK;
231549ec3ffSdougm 	}
232549ec3ffSdougm 	return (ret);
233549ec3ffSdougm }
234549ec3ffSdougm 
235549ec3ffSdougm /*
236549ec3ffSdougm  * remove_handle_for_root(root)
237549ec3ffSdougm  *
238549ec3ffSdougm  * Walks the list of handles and removes the one for this "root" from
239549ec3ffSdougm  * the list. It is up to the caller to free the data.
240549ec3ffSdougm  */
241549ec3ffSdougm 
242549ec3ffSdougm static void
243549ec3ffSdougm remove_handle_for_root(xmlNodePtr root)
244549ec3ffSdougm {
245549ec3ffSdougm 	struct doc2handle *item, *prev;
246549ec3ffSdougm 
247549ec3ffSdougm 	(void) mutex_lock(&sa_global_lock);
248549ec3ffSdougm 	for (prev = NULL, item = sa_global_handles; item != NULL;
249549ec3ffSdougm 		item = item->next) {
250549ec3ffSdougm 	    if (item->root == root) {
251549ec3ffSdougm 		if (prev == NULL) {
252549ec3ffSdougm 		    /* first in the list */
253549ec3ffSdougm 		    sa_global_handles = sa_global_handles->next;
254549ec3ffSdougm 		} else {
255549ec3ffSdougm 		    prev->next = item->next;
256549ec3ffSdougm 		}
257549ec3ffSdougm 		/* Item is out of the list so free the list structure */
258549ec3ffSdougm 		free(item);
259549ec3ffSdougm 		break;
260549ec3ffSdougm 	    }
261549ec3ffSdougm 	    prev = item;
262549ec3ffSdougm 	}
263549ec3ffSdougm 	(void) mutex_unlock(&sa_global_lock);
264549ec3ffSdougm }
265549ec3ffSdougm 
266549ec3ffSdougm /*
267549ec3ffSdougm  * sa_find_group_handle(sa_group_t group)
268549ec3ffSdougm  *
269549ec3ffSdougm  * Find the sa_handle_t for the configuration associated with this
270549ec3ffSdougm  * group.
271549ec3ffSdougm  */
272549ec3ffSdougm sa_handle_t
273549ec3ffSdougm sa_find_group_handle(sa_group_t group)
274549ec3ffSdougm {
275549ec3ffSdougm 	xmlNodePtr node = (xmlNodePtr)group;
276549ec3ffSdougm 	sa_handle_t handle;
277549ec3ffSdougm 
278549ec3ffSdougm 	while (node != NULL) {
279549ec3ffSdougm 	    if (strcmp((char *)(node->name), "sharecfg") == 0) {
280549ec3ffSdougm 		/* have the root so get the handle */
281549ec3ffSdougm 		handle = (sa_handle_t)get_handle_for_root(node);
282549ec3ffSdougm 		return (handle);
283549ec3ffSdougm 	    }
284549ec3ffSdougm 	    node = node->parent;
285549ec3ffSdougm 	}
286549ec3ffSdougm 	return (NULL);
287549ec3ffSdougm }
288549ec3ffSdougm 
289549ec3ffSdougm /*
2906185db85Sdougm  * set_legacy_timestamp(root, path, timevalue)
2916185db85Sdougm  *
2926185db85Sdougm  * add the current timestamp value to the configuration for use in
2936185db85Sdougm  * determining when to update the legacy files.  For SMF, this
2946185db85Sdougm  * property is kept in default/operation/legacy_timestamp
2956185db85Sdougm  */
2966185db85Sdougm 
2976185db85Sdougm static void
2986185db85Sdougm set_legacy_timestamp(xmlNodePtr root, char *path, uint64_t tval)
2996185db85Sdougm {
3006185db85Sdougm 	xmlNodePtr node;
3016185db85Sdougm 	xmlChar *lpath = NULL;
302549ec3ffSdougm 	sa_handle_impl_t handle;
303549ec3ffSdougm 
304549ec3ffSdougm 	/* Have to have a handle or else we weren't initialized. */
305549ec3ffSdougm 	handle = get_handle_for_root(root);
306549ec3ffSdougm 	if (handle == NULL)
307549ec3ffSdougm 	    return;
3086185db85Sdougm 
3096185db85Sdougm 	for (node = root->xmlChildrenNode; node != NULL;
3106185db85Sdougm 		node = node->next) {
3116185db85Sdougm 	    if (xmlStrcmp(node->name, (xmlChar *)"legacy") == 0) {
3126185db85Sdougm 		/* a possible legacy node for this path */
3136185db85Sdougm 		lpath = xmlGetProp(node, (xmlChar *)"path");
3146185db85Sdougm 		if (lpath != NULL && xmlStrcmp(lpath, (xmlChar *)path) == 0) {
3156185db85Sdougm 		    xmlFree(lpath);
3166185db85Sdougm 		    break;
3176185db85Sdougm 		}
3186185db85Sdougm 		if (lpath != NULL)
3196185db85Sdougm 		    xmlFree(lpath);
3206185db85Sdougm 	    }
3216185db85Sdougm 	}
3226185db85Sdougm 	if (node == NULL) {
3236185db85Sdougm 	    /* need to create the first legacy timestamp node */
3246185db85Sdougm 	    node = xmlNewChild(root, NULL, (xmlChar *)"legacy", NULL);
3256185db85Sdougm 	}
3266185db85Sdougm 	if (node != NULL) {
3276185db85Sdougm 	    char tstring[32];
3286185db85Sdougm 	    int ret;
3296185db85Sdougm 
3306185db85Sdougm 	    (void) snprintf(tstring, sizeof (tstring), "%lld", tval);
3316185db85Sdougm 	    xmlSetProp(node, (xmlChar *)"timestamp", (xmlChar *)tstring);
3326185db85Sdougm 	    xmlSetProp(node, (xmlChar *)"path", (xmlChar *)path);
3336185db85Sdougm 	    /* now commit to SMF */
334549ec3ffSdougm 	    ret = sa_get_instance(handle->scfhandle, "default");
3356185db85Sdougm 	    if (ret == SA_OK) {
336549ec3ffSdougm 		ret = sa_start_transaction(handle->scfhandle, "operation");
3376185db85Sdougm 		if (ret == SA_OK) {
338549ec3ffSdougm 		    ret = sa_set_property(handle->scfhandle, "legacy-timestamp",
3396185db85Sdougm 					    tstring);
3406185db85Sdougm 		    if (ret == SA_OK) {
341549ec3ffSdougm 			(void) sa_end_transaction(handle->scfhandle);
3426185db85Sdougm 		    } else {
343549ec3ffSdougm 			sa_abort_transaction(handle->scfhandle);
3446185db85Sdougm 		    }
3456185db85Sdougm 		}
3466185db85Sdougm 	    }
3476185db85Sdougm 	}
3486185db85Sdougm }
3496185db85Sdougm 
3506185db85Sdougm /*
3516185db85Sdougm  * is_shared(share)
3526185db85Sdougm  *
3536185db85Sdougm  * determine if the specified share is currently shared or not.
3546185db85Sdougm  */
3556185db85Sdougm static int
3566185db85Sdougm is_shared(sa_share_t share)
3576185db85Sdougm {
3586185db85Sdougm 	char *shared;
3596185db85Sdougm 	int result = 0; /* assume not */
3606185db85Sdougm 
3616185db85Sdougm 	shared = sa_get_share_attr(share, "shared");
3626185db85Sdougm 	if (shared != NULL) {
3636185db85Sdougm 	    if (strcmp(shared, "true") == 0)
3646185db85Sdougm 		result = 1;
3656185db85Sdougm 	    sa_free_attr_string(shared);
3666185db85Sdougm 	}
3676185db85Sdougm 	return (result);
3686185db85Sdougm }
3696185db85Sdougm 
3706185db85Sdougm /*
371a99982a7Sdougm  * checksubdirgroup(group, newpath, strictness)
372f345c0beSdougm  *
373a99982a7Sdougm  * check all the specified newpath against all the paths in the
374a99982a7Sdougm  * group. This is a helper function for checksubdir to make it easier
375a99982a7Sdougm  * to also check ZFS subgroups.
376a99982a7Sdougm  * The strictness values mean:
377f345c0beSdougm  * SA_CHECK_NORMAL == only check newpath against shares that are active
378f345c0beSdougm  * SA_CHECK_STRICT == check newpath against both active shares and those
379f345c0beSdougm  *		      stored in the repository
3806185db85Sdougm  */
3816185db85Sdougm static int
382a99982a7Sdougm checksubdirgroup(sa_group_t group, char *newpath, int strictness)
3836185db85Sdougm {
3846185db85Sdougm 	sa_share_t share;
385a99982a7Sdougm 	char *path;
386a99982a7Sdougm 	int issub = SA_OK;
3876185db85Sdougm 
3886185db85Sdougm 	for (share = sa_get_share(group, NULL); share != NULL;
3896185db85Sdougm 	    share = sa_get_next_share(share)) {
3906185db85Sdougm 		/*
3916185db85Sdougm 		 * The original behavior of share never checked
3926185db85Sdougm 		 * against the permanent configuration
3936185db85Sdougm 		 * (/etc/dfs/dfstab).  PIT has a number of cases where
3946185db85Sdougm 		 * it depends on this older behavior even though it
3956185db85Sdougm 		 * could be considered incorrect.  We may tighten this
3966185db85Sdougm 		 * up in the future.
3976185db85Sdougm 		 */
398f345c0beSdougm 	    if (strictness == SA_CHECK_NORMAL && !is_shared(share))
3996185db85Sdougm 		continue;
4006185db85Sdougm 
4016185db85Sdougm 	    path = sa_get_share_attr(share, "path");
402f345c0beSdougm 		/*
403f345c0beSdougm 		 * If path is NULL, then a share is in the process of
404f345c0beSdougm 		 * construction or someone has modified the property
405a99982a7Sdougm 		 * group inappropriately. It should be
406a99982a7Sdougm 		 * ignored. issubdir() comes from the original share
407a99982a7Sdougm 		 * implementation and does the difficult part of
408a99982a7Sdougm 		 * checking subdirectories.
409f345c0beSdougm 		 */
410f345c0beSdougm 	    if (path == NULL)
411f345c0beSdougm 		continue;
4126185db85Sdougm 	    if (newpath != NULL &&
4136185db85Sdougm 		(strcmp(path, newpath) == 0 || issubdir(newpath, path) ||
4146185db85Sdougm 		issubdir(path, newpath))) {
4156185db85Sdougm 		sa_free_attr_string(path);
4166185db85Sdougm 		path = NULL;
4176185db85Sdougm 		issub = SA_INVALID_PATH;
4186185db85Sdougm 		break;
4196185db85Sdougm 	    }
4206185db85Sdougm 	    sa_free_attr_string(path);
4216185db85Sdougm 	    path = NULL;
4226185db85Sdougm 	}
423a99982a7Sdougm 	return (issub);
424a99982a7Sdougm }
425a99982a7Sdougm 
426a99982a7Sdougm /*
427a99982a7Sdougm  * checksubdir(newpath, strictness)
428a99982a7Sdougm  *
429a99982a7Sdougm  * checksubdir determines if the specified path (newpath) is a
430a99982a7Sdougm  * subdirectory of another share. It calls checksubdirgroup() to do
431a99982a7Sdougm  * the complicated work. The strictness parameter determines how
432a99982a7Sdougm  * strict a check to make against the path. The strictness values
433a99982a7Sdougm  * mean: SA_CHECK_NORMAL == only check newpath against shares that are
434a99982a7Sdougm  * active SA_CHECK_STRICT == check newpath against both active shares
435a99982a7Sdougm  * and those * stored in the repository
436a99982a7Sdougm  */
437a99982a7Sdougm static int
438549ec3ffSdougm checksubdir(sa_handle_t handle, char *newpath, int strictness)
439a99982a7Sdougm {
440a99982a7Sdougm 	sa_group_t group;
441a99982a7Sdougm 	int issub;
442a99982a7Sdougm 	char *path = NULL;
443a99982a7Sdougm 
444549ec3ffSdougm 	for (issub = 0, group = sa_get_group(handle, NULL);
445a99982a7Sdougm 		group != NULL && !issub;
446a99982a7Sdougm 		group = sa_get_next_group(group)) {
447a99982a7Sdougm 	    if (sa_group_is_zfs(group)) {
448a99982a7Sdougm 		sa_group_t subgroup;
449a99982a7Sdougm 		for (subgroup = sa_get_sub_group(group);
450a99982a7Sdougm 		    subgroup != NULL && !issub;
451a99982a7Sdougm 		    subgroup = sa_get_next_group(subgroup))
452a99982a7Sdougm 		    issub = checksubdirgroup(subgroup, newpath, strictness);
453a99982a7Sdougm 	    } else {
454a99982a7Sdougm 		issub = checksubdirgroup(group, newpath, strictness);
455a99982a7Sdougm 	    }
4566185db85Sdougm 	}
4576185db85Sdougm 	if (path != NULL)
4586185db85Sdougm 	    sa_free_attr_string(path);
4596185db85Sdougm 	return (issub);
4606185db85Sdougm }
4616185db85Sdougm 
4626185db85Sdougm /*
463f345c0beSdougm  * validpath(path, strictness)
4646185db85Sdougm  * determine if the provided path is valid for a share. It shouldn't
4656185db85Sdougm  * be a sub-dir of an already shared path or the parent directory of a
4666185db85Sdougm  * share path.
4676185db85Sdougm  */
4686185db85Sdougm static int
469549ec3ffSdougm validpath(sa_handle_t handle, char *path, int strictness)
4706185db85Sdougm {
4716185db85Sdougm 	int error = SA_OK;
4726185db85Sdougm 	struct stat st;
4736185db85Sdougm 	sa_share_t share;
4746185db85Sdougm 	char *fstype;
4756185db85Sdougm 
4766185db85Sdougm 	if (*path != '/') {
4776185db85Sdougm 	    return (SA_BAD_PATH);
4786185db85Sdougm 	}
4796185db85Sdougm 	if (stat(path, &st) < 0) {
4806185db85Sdougm 	    error = SA_NO_SUCH_PATH;
4816185db85Sdougm 	} else {
482549ec3ffSdougm 	    share = sa_find_share(handle, path);
4836185db85Sdougm 	    if (share != NULL) {
4846185db85Sdougm 		error = SA_DUPLICATE_NAME;
4856185db85Sdougm 	    }
4866185db85Sdougm 	    if (error == SA_OK) {
4876185db85Sdougm 		/*
4886185db85Sdougm 		 * check for special case with file system that might
4896185db85Sdougm 		 * have restrictions.  For now, ZFS is the only case
4906185db85Sdougm 		 * since it has its own idea of how to configure
4916185db85Sdougm 		 * shares. We do this before subdir checking since
4926185db85Sdougm 		 * things like ZFS will do that for us. This should
4936185db85Sdougm 		 * also be done via plugin interface.
4946185db85Sdougm 		 */
4956185db85Sdougm 		fstype = sa_fstype(path);
4966185db85Sdougm 		if (fstype != NULL && strcmp(fstype, "zfs") == 0) {
497549ec3ffSdougm 		    if (sa_zfs_is_shared(handle, path))
498a99982a7Sdougm 			error = SA_INVALID_NAME;
4996185db85Sdougm 		}
5006185db85Sdougm 		if (fstype != NULL)
5016185db85Sdougm 		    sa_free_fstype(fstype);
5026185db85Sdougm 	    }
5036185db85Sdougm 	    if (error == SA_OK) {
504549ec3ffSdougm 		error = checksubdir(handle, path, strictness);
5056185db85Sdougm 	    }
5066185db85Sdougm 	}
5076185db85Sdougm 	return (error);
5086185db85Sdougm }
5096185db85Sdougm 
5106185db85Sdougm /*
5116185db85Sdougm  * check to see if group/share is persistent.
5126185db85Sdougm  */
5136185db85Sdougm static int
5146185db85Sdougm is_persistent(sa_group_t group)
5156185db85Sdougm {
5166185db85Sdougm 	char *type;
5176185db85Sdougm 	int persist = 1;
5186185db85Sdougm 
5196185db85Sdougm 	type = sa_get_group_attr(group, "type");
5206185db85Sdougm 	if (type != NULL && strcmp(type, "transient") == 0)
5216185db85Sdougm 	    persist = 0;
5226185db85Sdougm 	if (type != NULL)
5236185db85Sdougm 	    sa_free_attr_string(type);
5246185db85Sdougm 	return (persist);
5256185db85Sdougm }
5266185db85Sdougm 
5276185db85Sdougm /*
5286185db85Sdougm  * sa_valid_group_name(name)
5296185db85Sdougm  *
5306185db85Sdougm  * check that the "name" contains only valid characters and otherwise
5316185db85Sdougm  * fits the required naming conventions. Valid names must start with
5326185db85Sdougm  * an alphabetic and the remainder may consist of only alphanumeric
5336185db85Sdougm  * plus the '-' and '_' characters. This name limitation comes from
5346185db85Sdougm  * inherent limitations in SMF.
5356185db85Sdougm  */
5366185db85Sdougm 
5376185db85Sdougm int
5386185db85Sdougm sa_valid_group_name(char *name)
5396185db85Sdougm {
5406185db85Sdougm 	int ret = 1;
5416185db85Sdougm 	ssize_t len;
5426185db85Sdougm 
5436185db85Sdougm 	if (name != NULL && isalpha(*name)) {
5446185db85Sdougm 	    char c;
5456185db85Sdougm 	    len = strlen(name);
5466185db85Sdougm 	    if (len < (scf_max_name_len - sizeof ("group:"))) {
5476185db85Sdougm 		for (c = *name++; c != '\0' && ret != 0; c = *name++) {
5486185db85Sdougm 		    if (!isalnum(c) && c != '-' && c != '_')
5496185db85Sdougm 			ret = 0;
5506185db85Sdougm 		}
5516185db85Sdougm 	    } else {
5526185db85Sdougm 		ret = 0;
5536185db85Sdougm 	    }
5546185db85Sdougm 	} else {
5556185db85Sdougm 	    ret = 0;
5566185db85Sdougm 	}
5576185db85Sdougm 	return (ret);
5586185db85Sdougm }
5596185db85Sdougm 
5606185db85Sdougm 
5616185db85Sdougm /*
5626185db85Sdougm  * is_zfs_group(group)
5636185db85Sdougm  *	Determine if the specified group is a ZFS sharenfs group
5646185db85Sdougm  */
5656185db85Sdougm static int
5666185db85Sdougm is_zfs_group(sa_group_t group)
5676185db85Sdougm {
5686185db85Sdougm 	int ret = 0;
5696185db85Sdougm 	xmlNodePtr parent;
5706185db85Sdougm 	xmlChar *zfs;
5716185db85Sdougm 
5726185db85Sdougm 	if (strcmp((char *)((xmlNodePtr)group)->name, "share") == 0) {
5736185db85Sdougm 	    parent = (xmlNodePtr)sa_get_parent_group(group);
5746185db85Sdougm 	} else {
5756185db85Sdougm 	    parent = (xmlNodePtr)group;
5766185db85Sdougm 	}
5776185db85Sdougm 	zfs = xmlGetProp(parent, (xmlChar *)"zfs");
5786185db85Sdougm 	if (zfs != NULL) {
5796185db85Sdougm 	    xmlFree(zfs);
5806185db85Sdougm 	    ret = 1;
5816185db85Sdougm 	}
5826185db85Sdougm 	return (ret);
5836185db85Sdougm }
5846185db85Sdougm 
5856185db85Sdougm /*
5866185db85Sdougm  * sa_optionset_name(optionset, oname, len, id)
5876185db85Sdougm  *	return the SMF name for the optionset. If id is not NULL, it
5886185db85Sdougm  *	will have the GUID value for a share and should be used
5896185db85Sdougm  *	instead of the keyword "optionset" which is used for
5906185db85Sdougm  *	groups. If the optionset doesn't have a protocol type
5916185db85Sdougm  *	associated with it, "default" is used. This shouldn't happen
5926185db85Sdougm  *	at this point but may be desirable in the future if there are
5936185db85Sdougm  *	protocol independent properties added. The name is returned in
5946185db85Sdougm  *	oname.
5956185db85Sdougm  */
5966185db85Sdougm 
5976185db85Sdougm static int
5986185db85Sdougm sa_optionset_name(sa_optionset_t optionset, char *oname, size_t len, char *id)
5996185db85Sdougm {
6006185db85Sdougm 	char *proto;
6016185db85Sdougm 
6026185db85Sdougm 	if (id == NULL)
6036185db85Sdougm 	    id = "optionset";
6046185db85Sdougm 
6056185db85Sdougm 	proto = sa_get_optionset_attr(optionset, "type");
6066185db85Sdougm 	len = snprintf(oname, len, "%s_%s", id, proto ? proto : "default");
6076185db85Sdougm 
6086185db85Sdougm 	if (proto != NULL)
6096185db85Sdougm 	    sa_free_attr_string(proto);
6106185db85Sdougm 	return (len);
6116185db85Sdougm }
6126185db85Sdougm 
6136185db85Sdougm /*
6146185db85Sdougm  * sa_security_name(optionset, oname, len, id)
6156185db85Sdougm  *
6166185db85Sdougm  * return the SMF name for the security. If id is not NULL, it will
6176185db85Sdougm  * have the GUID value for a share and should be used instead of the
6186185db85Sdougm  * keyword "optionset" which is used for groups. If the optionset
6196185db85Sdougm  * doesn't have a protocol type associated with it, "default" is
6206185db85Sdougm  * used. This shouldn't happen at this point but may be desirable in
6216185db85Sdougm  * the future if there are protocol independent properties added. The
6226185db85Sdougm  * name is returned in oname. The security type is also encoded into
6236185db85Sdougm  * the name. In the future, this wil *be handled a bit differently.
6246185db85Sdougm  */
6256185db85Sdougm 
6266185db85Sdougm static int
6276185db85Sdougm sa_security_name(sa_security_t security, char *oname, size_t len, char *id)
6286185db85Sdougm {
6296185db85Sdougm 	char *proto;
6306185db85Sdougm 	char *sectype;
6316185db85Sdougm 
6326185db85Sdougm 	if (id == NULL)
6336185db85Sdougm 	    id = "optionset";
6346185db85Sdougm 
6356185db85Sdougm 	proto = sa_get_security_attr(security, "type");
6366185db85Sdougm 	sectype = sa_get_security_attr(security, "sectype");
6376185db85Sdougm 	len = snprintf(oname, len, "%s_%s_%s", id,
6386185db85Sdougm 			    proto ? proto : "default",
6396185db85Sdougm 			    sectype ? sectype : "default");
6406185db85Sdougm 	if (proto != NULL)
6416185db85Sdougm 	    sa_free_attr_string(proto);
6426185db85Sdougm 	if (sectype != NULL)
6436185db85Sdougm 	    sa_free_attr_string(sectype);
6446185db85Sdougm 	return (len);
6456185db85Sdougm }
6466185db85Sdougm 
6476185db85Sdougm /*
648f345c0beSdougm  * sa_init(init_service)
6496185db85Sdougm  *	Initialize the API
6506185db85Sdougm  *	find all the shared objects
6516185db85Sdougm  *	init the tables with all objects
6526185db85Sdougm  *	read in the current configuration
6536185db85Sdougm  */
6546185db85Sdougm 
655549ec3ffSdougm sa_handle_t
6566185db85Sdougm sa_init(int init_service)
6576185db85Sdougm {
6586185db85Sdougm 	struct stat st;
6596185db85Sdougm 	int legacy = 0;
6606185db85Sdougm 	uint64_t tval = 0;
661a99982a7Sdougm 	int lockfd;
662a99982a7Sdougm 	sigset_t old;
663a99982a7Sdougm 	int updatelegacy = B_FALSE;
664a99982a7Sdougm 	scf_simple_prop_t *prop;
665549ec3ffSdougm 	sa_handle_impl_t handle;
666549ec3ffSdougm 	int err;
6676185db85Sdougm 
668549ec3ffSdougm 	handle = calloc(sizeof (struct sa_handle_impl), 1);
669549ec3ffSdougm 
670549ec3ffSdougm 	if (handle != NULL) {
6716185db85Sdougm 	    /* get protocol specific structures */
6726185db85Sdougm 	    (void) proto_plugin_init();
6736185db85Sdougm 	    if (init_service & SA_INIT_SHARE_API) {
6746185db85Sdougm 		/*
6751cea05afSdougm 		 * initialize access into libzfs. We use this when
6761cea05afSdougm 		 * collecting info about ZFS datasets and shares.
6771cea05afSdougm 		 */
678549ec3ffSdougm 		sa_zfs_init(handle);
6791cea05afSdougm 		/*
6806185db85Sdougm 		 * since we want to use SMF, initialize an svc handle
6816185db85Sdougm 		 * and find out what is there.
6826185db85Sdougm 		 */
683549ec3ffSdougm 		handle->scfhandle = sa_scf_init(handle);
684549ec3ffSdougm 		if (handle->scfhandle != NULL) {
685a99982a7Sdougm 			/*
686a99982a7Sdougm 			 * Need to lock the extraction of the
687a99982a7Sdougm 			 * configuration if the dfstab file has
688a99982a7Sdougm 			 * changed. Lock everything now and release if
689a99982a7Sdougm 			 * not needed.  Use a file that isn't being
690a99982a7Sdougm 			 * manipulated by other parts of the system in
691a99982a7Sdougm 			 * order to not interfere with locking. Using
692a99982a7Sdougm 			 * dfstab doesn't work.
693a99982a7Sdougm 			 */
694a99982a7Sdougm 		    sablocksigs(&old);
695a99982a7Sdougm 		    lockfd = open(DFS_LOCK_FILE, O_RDWR);
696a99982a7Sdougm 		    if (lockfd >= 0) {
697a99982a7Sdougm 			extern int errno;
698a99982a7Sdougm 			errno = 0;
699a99982a7Sdougm 			(void) lockf(lockfd, F_LOCK, 0);
700a99982a7Sdougm 			/*
701a99982a7Sdougm 			 * Check whether we are going to need to merge
702a99982a7Sdougm 			 * any dfstab changes. This is done by
703a99982a7Sdougm 			 * comparing the value of legacy-timestamp
704a99982a7Sdougm 			 * with the current st_ctim of the file. If
705a99982a7Sdougm 			 * they are different, an update is needed and
706a99982a7Sdougm 			 * the file must remain locked until the merge
707a99982a7Sdougm 			 * is done in order to prevent multiple
708a99982a7Sdougm 			 * startups from changing the SMF repository
709a99982a7Sdougm 			 * at the same time.  The first to get the
710a99982a7Sdougm 			 * lock will make any changes before the
711a99982a7Sdougm 			 * others can read the repository.
712a99982a7Sdougm 			 */
713549ec3ffSdougm 			prop = scf_simple_prop_get(handle->scfhandle->handle,
714a99982a7Sdougm 						(const char *)
715a99982a7Sdougm 						    SA_SVC_FMRI_BASE ":default",
716a99982a7Sdougm 						"operation",
717a99982a7Sdougm 						"legacy-timestamp");
718a99982a7Sdougm 			if (prop != NULL) {
719a99982a7Sdougm 			    char *i64;
720a99982a7Sdougm 			    i64 = scf_simple_prop_next_astring(prop);
721a99982a7Sdougm 			    if (i64 != NULL) {
722a99982a7Sdougm 				tval = strtoull(i64, NULL, 0);
723a99982a7Sdougm 			    }
724a99982a7Sdougm 			    if (stat(SA_LEGACY_DFSTAB, &st) >= 0 &&
725a99982a7Sdougm 				tval != TSTAMP(st.st_ctim)) {
726a99982a7Sdougm 				updatelegacy = B_TRUE;
727a99982a7Sdougm 			    }
728a99982a7Sdougm 			} else {
729a99982a7Sdougm 			    /* We haven't set the timestamp before so do it. */
730a99982a7Sdougm 			    updatelegacy = B_TRUE;
731a99982a7Sdougm 			}
732a99982a7Sdougm 		    }
733a99982a7Sdougm 		    if (updatelegacy == B_FALSE) {
734a99982a7Sdougm 			/* Don't need the lock anymore */
735a99982a7Sdougm 			(void) lockf(lockfd, F_ULOCK, 0);
736a99982a7Sdougm 			(void) close(lockfd);
737a99982a7Sdougm 		    }
738*1d1813a7Sdougm 
739*1d1813a7Sdougm 		/*
740*1d1813a7Sdougm 		 * It is essential that the document tree and
741*1d1813a7Sdougm 		 * the internal list of roots to handles be
742*1d1813a7Sdougm 		 * setup before anything that might try to
743*1d1813a7Sdougm 		 * create a new object is called. The document
744*1d1813a7Sdougm 		 * tree is the combination of handle->doc and
745*1d1813a7Sdougm 		 * handle->tree. This allows searches,
746*1d1813a7Sdougm 		 * etc. when all you have is an object in the
747*1d1813a7Sdougm 		 * tree.
748*1d1813a7Sdougm 		 */
749*1d1813a7Sdougm 		    handle->doc = xmlNewDoc((xmlChar *)"1.0");
750*1d1813a7Sdougm 		    handle->tree = xmlNewNode(NULL, (xmlChar *)"sharecfg");
751*1d1813a7Sdougm 		    if (handle->doc != NULL && handle->tree != NULL) {
752*1d1813a7Sdougm 			xmlDocSetRootElement(handle->doc, handle->tree);
753549ec3ffSdougm 			err = add_handle_for_root(handle->tree, handle);
754*1d1813a7Sdougm 			if (err == SA_OK)
755*1d1813a7Sdougm 			    err = sa_get_config(handle->scfhandle,
756*1d1813a7Sdougm 						    handle->tree, handle);
757*1d1813a7Sdougm 		    } else {
758*1d1813a7Sdougm 			if (handle->doc != NULL)
759*1d1813a7Sdougm 			    xmlFreeDoc(handle->doc);
760*1d1813a7Sdougm 			if (handle->tree != NULL)
761*1d1813a7Sdougm 			    xmlFreeNode(handle->tree);
762*1d1813a7Sdougm 			err = SA_NO_MEMORY;
763*1d1813a7Sdougm 		    }
764*1d1813a7Sdougm 
765a99982a7Sdougm 		    saunblocksigs(&old);
766549ec3ffSdougm 
767549ec3ffSdougm 		    if (err != SA_OK) {
768549ec3ffSdougm 			/*
769*1d1813a7Sdougm 			 * If we couldn't add the tree handle
770*1d1813a7Sdougm 			 * to the list, then things are going
771*1d1813a7Sdougm 			 * to fail badly. Might as well undo
772*1d1813a7Sdougm 			 * everything now and fail the
773*1d1813a7Sdougm 			 * sa_init().
774549ec3ffSdougm 			 */
775549ec3ffSdougm 			sa_fini(handle);
776549ec3ffSdougm 			return (NULL);
777549ec3ffSdougm 		    }
778549ec3ffSdougm 
7796185db85Sdougm 		    if (tval == 0) {
7806185db85Sdougm 			/* first time so make sure default is setup */
7816185db85Sdougm 			sa_group_t defgrp;
7826185db85Sdougm 			sa_optionset_t opt;
783549ec3ffSdougm 			defgrp = sa_get_group(handle, "default");
7846185db85Sdougm 			if (defgrp != NULL) {
7856185db85Sdougm 			    opt = sa_get_optionset(defgrp, NULL);
7866185db85Sdougm 			    if (opt == NULL)
7876185db85Sdougm 				/* NFS is the default for default */
7886185db85Sdougm 				opt = sa_create_optionset(defgrp, "nfs");
7896185db85Sdougm 			}
7906185db85Sdougm 		    }
791*1d1813a7Sdougm 
792a99982a7Sdougm 		    if (updatelegacy == B_TRUE) {
793a99982a7Sdougm 			sablocksigs(&old);
794549ec3ffSdougm 			getlegacyconfig((sa_handle_t)handle,
795549ec3ffSdougm 					    SA_LEGACY_DFSTAB, &handle->tree);
7966185db85Sdougm 			if (stat(SA_LEGACY_DFSTAB, &st) >= 0)
797549ec3ffSdougm 			    set_legacy_timestamp(handle->tree,
7986185db85Sdougm 						SA_LEGACY_DFSTAB,
7996185db85Sdougm 						TSTAMP(st.st_ctim));
800a99982a7Sdougm 			saunblocksigs(&old);
801a99982a7Sdougm 			/* Safe to unlock now to allow others to run */
802a99982a7Sdougm 			(void) lockf(lockfd, F_ULOCK, 0);
803a99982a7Sdougm 			(void) close(lockfd);
8046185db85Sdougm 		    }
805549ec3ffSdougm 		    legacy |= sa_get_zfs_shares(handle, "zfs");
806549ec3ffSdougm 		    legacy |= gettransients(handle, &handle->tree);
8076185db85Sdougm 		}
8086185db85Sdougm 	    }
8096185db85Sdougm 	}
810549ec3ffSdougm 	return ((sa_handle_t)handle);
8116185db85Sdougm }
8126185db85Sdougm 
8136185db85Sdougm /*
814549ec3ffSdougm  * sa_fini(handle)
8156185db85Sdougm  *	Uninitialize the API structures including the configuration
8161cea05afSdougm  *	data structures and ZFS related data.
8176185db85Sdougm  */
8186185db85Sdougm 
8196185db85Sdougm void
820549ec3ffSdougm sa_fini(sa_handle_t handle)
8216185db85Sdougm {
822549ec3ffSdougm 	sa_handle_impl_t impl_handle = (sa_handle_impl_t)handle;
823549ec3ffSdougm 
824549ec3ffSdougm 	if (impl_handle != NULL) {
825549ec3ffSdougm 		/*
826549ec3ffSdougm 		 * Free the config trees and any other data structures
827549ec3ffSdougm 		 * used in the handle.
828549ec3ffSdougm 		 */
829549ec3ffSdougm 		if (impl_handle->doc != NULL)
830549ec3ffSdougm 			xmlFreeDoc(impl_handle->doc);
831549ec3ffSdougm 		sa_scf_fini(impl_handle->scfhandle);
832549ec3ffSdougm 		sa_zfs_fini(impl_handle);
833549ec3ffSdougm 
834549ec3ffSdougm 		/* Remove and free the entry in the global list. */
835549ec3ffSdougm 		remove_handle_for_root(impl_handle->tree);
836549ec3ffSdougm 
837549ec3ffSdougm 		/* Make sure we free the handle */
838549ec3ffSdougm 		free(impl_handle);
839549ec3ffSdougm 
840549ec3ffSdougm 		/*
841549ec3ffSdougm 		 * If this was the last handle to release, unload the
842549ec3ffSdougm 		 * plugins that were loaded.
843549ec3ffSdougm 		 */
844549ec3ffSdougm 		if (sa_global_handles == NULL)
845549ec3ffSdougm 		    (void) proto_plugin_fini();
846549ec3ffSdougm 
8476185db85Sdougm 	}
8486185db85Sdougm }
8496185db85Sdougm 
8506185db85Sdougm /*
8516185db85Sdougm  * sa_get_protocols(char **protocol)
8526185db85Sdougm  *	Get array of protocols that are supported
8536185db85Sdougm  *	Returns pointer to an allocated and NULL terminated
8546185db85Sdougm  *	array of strings.  Caller must free.
8556185db85Sdougm  *	This really should be determined dynamically.
8566185db85Sdougm  *	If there aren't any defined, return -1.
8576185db85Sdougm  *	Use free() to return memory.
8586185db85Sdougm  */
8596185db85Sdougm 
8606185db85Sdougm int
8616185db85Sdougm sa_get_protocols(char ***protocols)
8626185db85Sdougm {
8636185db85Sdougm 	int numproto = -1;
8646185db85Sdougm 
8656185db85Sdougm 	if (protocols != NULL) {
8666185db85Sdougm 	    struct sa_proto_plugin *plug;
8676185db85Sdougm 	    for (numproto = 0, plug = sap_proto_list; plug != NULL;
8686185db85Sdougm 		plug = plug->plugin_next) {
8696185db85Sdougm 		numproto++;
8706185db85Sdougm 	    }
8716185db85Sdougm 
8726185db85Sdougm 	    *protocols = calloc(numproto + 1,  sizeof (char *));
8736185db85Sdougm 	    if (*protocols != NULL) {
8746185db85Sdougm 		int ret = 0;
8756185db85Sdougm 		for (plug = sap_proto_list; plug != NULL;
8766185db85Sdougm 		    plug = plug->plugin_next) {
8776185db85Sdougm 		    /* faking for now */
8786185db85Sdougm 		    (*protocols)[ret++] = plug->plugin_ops->sa_protocol;
8796185db85Sdougm 		}
8806185db85Sdougm 	    } else {
8816185db85Sdougm 		numproto = -1;
8826185db85Sdougm 	    }
8836185db85Sdougm 	}
8846185db85Sdougm 	return (numproto);
8856185db85Sdougm }
8866185db85Sdougm 
8876185db85Sdougm /*
8886185db85Sdougm  * find_group_by_name(node, group)
8896185db85Sdougm  *
8906185db85Sdougm  * search the XML document subtree specified by node to find the group
8916185db85Sdougm  * specified by group. Searching subtree allows subgroups to be
8926185db85Sdougm  * searched for.
8936185db85Sdougm  */
8946185db85Sdougm 
8956185db85Sdougm static xmlNodePtr
8966185db85Sdougm find_group_by_name(xmlNodePtr node, xmlChar *group)
8976185db85Sdougm {
8986185db85Sdougm 	xmlChar *name = NULL;
8996185db85Sdougm 
9006185db85Sdougm 	for (node = node->xmlChildrenNode; node != NULL;
9016185db85Sdougm 	    node = node->next) {
9026185db85Sdougm 	    if (xmlStrcmp(node->name, (xmlChar *)"group") == 0) {
9036185db85Sdougm 		/* if no groupname, return the first found */
9046185db85Sdougm 		if (group == NULL)
9056185db85Sdougm 		    break;
9066185db85Sdougm 		name = xmlGetProp(node, (xmlChar *)"name");
9076185db85Sdougm 		if (name != NULL &&
9086185db85Sdougm 		    xmlStrcmp(name, group) == 0) {
9096185db85Sdougm 		    break;
9106185db85Sdougm 		}
9116185db85Sdougm 		if (name != NULL) {
9126185db85Sdougm 		    xmlFree(name);
9136185db85Sdougm 		    name = NULL;
9146185db85Sdougm 		}
9156185db85Sdougm 	    }
9166185db85Sdougm 	}
9176185db85Sdougm 	if (name != NULL)
9186185db85Sdougm 	    xmlFree(name);
9196185db85Sdougm 	return (node);
9206185db85Sdougm }
9216185db85Sdougm 
9226185db85Sdougm /*
9236185db85Sdougm  * sa_get_group(groupname)
9246185db85Sdougm  *	Return the "group" specified.  If groupname is NULL,
9256185db85Sdougm  *	return the first group of the list of groups.
9266185db85Sdougm  */
9276185db85Sdougm sa_group_t
928549ec3ffSdougm sa_get_group(sa_handle_t handle, char *groupname)
9296185db85Sdougm {
9306185db85Sdougm 	xmlNodePtr node = NULL;
9316185db85Sdougm 	char *subgroup = NULL;
9326185db85Sdougm 	char *group = NULL;
933549ec3ffSdougm 	sa_handle_impl_t impl_handle = (sa_handle_impl_t)handle;
9346185db85Sdougm 
935549ec3ffSdougm 	if (impl_handle != NULL && impl_handle->tree != NULL) {
9366185db85Sdougm 	    if (groupname != NULL) {
9376185db85Sdougm 		group = strdup(groupname);
9386185db85Sdougm 		subgroup = strchr(group, '/');
9396185db85Sdougm 		if (subgroup != NULL)
9406185db85Sdougm 		    *subgroup++ = '\0';
9416185db85Sdougm 	    }
942549ec3ffSdougm 	    node = find_group_by_name(impl_handle->tree, (xmlChar *)group);
9436185db85Sdougm 	    /* if a subgroup, find it before returning */
9446185db85Sdougm 	    if (subgroup != NULL && node != NULL) {
9456185db85Sdougm 		node = find_group_by_name(node, (xmlChar *)subgroup);
9466185db85Sdougm 	    }
9476185db85Sdougm 	}
9486185db85Sdougm 	if (node != NULL && (char *)group != NULL)
949549ec3ffSdougm 	    (void) sa_get_instance(impl_handle->scfhandle, (char *)group);
9506185db85Sdougm 	if (group != NULL)
9516185db85Sdougm 	    free(group);
9526185db85Sdougm 	return ((sa_group_t)(node));
9536185db85Sdougm }
9546185db85Sdougm 
9556185db85Sdougm /*
9566185db85Sdougm  * sa_get_next_group(group)
9576185db85Sdougm  *	Return the "next" group after the specified group from
9586185db85Sdougm  *	the internal group list.  NULL if there are no more.
9596185db85Sdougm  */
9606185db85Sdougm sa_group_t
9616185db85Sdougm sa_get_next_group(sa_group_t group)
9626185db85Sdougm {
9636185db85Sdougm 	xmlNodePtr ngroup = NULL;
9646185db85Sdougm 	if (group != NULL) {
9656185db85Sdougm 	    for (ngroup = ((xmlNodePtr)group)->next; ngroup != NULL;
9666185db85Sdougm 		    ngroup = ngroup->next) {
9676185db85Sdougm 		if (xmlStrcmp(ngroup->name, (xmlChar *)"group") == 0)
9686185db85Sdougm 		    break;
9696185db85Sdougm 	    }
9706185db85Sdougm 	}
9716185db85Sdougm 	return ((sa_group_t)ngroup);
9726185db85Sdougm }
9736185db85Sdougm 
9746185db85Sdougm /*
9756185db85Sdougm  * sa_get_share(group, sharepath)
9766185db85Sdougm  *	Return the share object for the share specified. The share
9776185db85Sdougm  *	must be in the specified group.  Return NULL if not found.
9786185db85Sdougm  */
9796185db85Sdougm sa_share_t
9806185db85Sdougm sa_get_share(sa_group_t group, char *sharepath)
9816185db85Sdougm {
9826185db85Sdougm 	xmlNodePtr node = NULL;
9836185db85Sdougm 	xmlChar *path;
9846185db85Sdougm 
9856185db85Sdougm 	/*
9866185db85Sdougm 	 * For future scalability, this should end up building a cache
9876185db85Sdougm 	 * since it will get called regularly by the mountd and info
9886185db85Sdougm 	 * services.
9896185db85Sdougm 	 */
9906185db85Sdougm 	if (group != NULL) {
9916185db85Sdougm 	    for (node = ((xmlNodePtr)group)->children; node != NULL;
9926185db85Sdougm 		    node = node->next) {
9936185db85Sdougm 		if (xmlStrcmp(node->name, (xmlChar *)"share") == 0) {
9946185db85Sdougm 			if (sharepath == NULL) {
9956185db85Sdougm 				break;
9966185db85Sdougm 			} else {
9976185db85Sdougm 				/* is it the correct share? */
9986185db85Sdougm 			    path = xmlGetProp(node, (xmlChar *)"path");
9996185db85Sdougm 			    if (path != NULL &&
10006185db85Sdougm 				xmlStrcmp(path, (xmlChar *)sharepath) == 0) {
10016185db85Sdougm 				xmlFree(path);
10026185db85Sdougm 				break;
10036185db85Sdougm 			    }
10046185db85Sdougm 			    xmlFree(path);
10056185db85Sdougm 			}
10066185db85Sdougm 		}
10076185db85Sdougm 	    }
10086185db85Sdougm 	}
10096185db85Sdougm 	return ((sa_share_t)node);
10106185db85Sdougm }
10116185db85Sdougm 
10126185db85Sdougm /*
10136185db85Sdougm  * sa_get_next_share(share)
10146185db85Sdougm  *	Return the next share following the specified share
10156185db85Sdougm  *	from the internal list of shares. Returns NULL if there
10166185db85Sdougm  *	are no more shares.  The list is relative to the same
10176185db85Sdougm  *	group.
10186185db85Sdougm  */
10196185db85Sdougm sa_share_t
10206185db85Sdougm sa_get_next_share(sa_share_t share)
10216185db85Sdougm {
10226185db85Sdougm 	xmlNodePtr node = NULL;
10236185db85Sdougm 
10246185db85Sdougm 	if (share != NULL) {
10256185db85Sdougm 	    for (node = ((xmlNodePtr)share)->next; node != NULL;
10266185db85Sdougm 		    node = node->next) {
10276185db85Sdougm 		if (xmlStrcmp(node->name, (xmlChar *)"share") == 0) {
10286185db85Sdougm 			break;
10296185db85Sdougm 		}
10306185db85Sdougm 	    }
10316185db85Sdougm 	}
10326185db85Sdougm 	return ((sa_share_t)node);
10336185db85Sdougm }
10346185db85Sdougm 
10356185db85Sdougm /*
10366185db85Sdougm  * _sa_get_child_node(node, type)
10376185db85Sdougm  *
10386185db85Sdougm  * find the child node of the specified node that has "type". This is
10396185db85Sdougm  * used to implement several internal functions.
10406185db85Sdougm  */
10416185db85Sdougm 
10426185db85Sdougm static xmlNodePtr
10436185db85Sdougm _sa_get_child_node(xmlNodePtr node, xmlChar *type)
10446185db85Sdougm {
10456185db85Sdougm 	xmlNodePtr child;
10466185db85Sdougm 	for (child = node->xmlChildrenNode; child != NULL;
10476185db85Sdougm 	    child = child->next)
10486185db85Sdougm 	    if (xmlStrcmp(child->name, type) == 0)
10496185db85Sdougm 		return (child);
10506185db85Sdougm 	return ((xmlNodePtr)NULL);
10516185db85Sdougm }
10526185db85Sdougm 
10536185db85Sdougm /*
10546185db85Sdougm  *  find_share(group, path)
10556185db85Sdougm  *
10566185db85Sdougm  * Search all the shares in the specified group for one that has the
10576185db85Sdougm  * specified path.
10586185db85Sdougm  */
10596185db85Sdougm 
10606185db85Sdougm static sa_share_t
10616185db85Sdougm find_share(sa_group_t group, char *sharepath)
10626185db85Sdougm {
10636185db85Sdougm 	sa_share_t share;
10646185db85Sdougm 	char *path;
10656185db85Sdougm 
10666185db85Sdougm 	for (share = sa_get_share(group, NULL); share != NULL;
10676185db85Sdougm 	    share = sa_get_next_share(share)) {
10686185db85Sdougm 	    path = sa_get_share_attr(share, "path");
10696185db85Sdougm 	    if (path != NULL && strcmp(path, sharepath) == 0) {
10706185db85Sdougm 		sa_free_attr_string(path);
10716185db85Sdougm 		break;
10726185db85Sdougm 	    }
10736185db85Sdougm 	    if (path != NULL)
10746185db85Sdougm 		sa_free_attr_string(path);
10756185db85Sdougm 	}
10766185db85Sdougm 	return (share);
10776185db85Sdougm }
10786185db85Sdougm 
10796185db85Sdougm /*
10806185db85Sdougm  * sa_get_sub_group(group)
10816185db85Sdougm  *
10826185db85Sdougm  * Get the first sub-group of group. The sa_get_next_group() function
10836185db85Sdougm  * can be used to get the rest. This is currently only used for ZFS
10846185db85Sdougm  * sub-groups but could be used to implement a more general mechanism.
10856185db85Sdougm  */
10866185db85Sdougm 
10876185db85Sdougm sa_group_t
10886185db85Sdougm sa_get_sub_group(sa_group_t group)
10896185db85Sdougm {
10906185db85Sdougm 	return ((sa_group_t)_sa_get_child_node((xmlNodePtr)group,
10916185db85Sdougm 					    (xmlChar *)"group"));
10926185db85Sdougm }
10936185db85Sdougm 
10946185db85Sdougm /*
10956185db85Sdougm  * sa_find_share(sharepath)
10966185db85Sdougm  *	Finds a share regardless of group.  In the future, this
10976185db85Sdougm  *	function should utilize a cache and hash table of some kind.
10986185db85Sdougm  *	The current assumption is that a path will only be shared
10996185db85Sdougm  *	once.  In the future, this may change as implementation of
11006185db85Sdougm  *	resource names comes into being.
11016185db85Sdougm  */
11026185db85Sdougm sa_share_t
1103549ec3ffSdougm sa_find_share(sa_handle_t handle, char *sharepath)
11046185db85Sdougm {
11056185db85Sdougm 	sa_group_t group;
11066185db85Sdougm 	sa_group_t zgroup;
11076185db85Sdougm 	sa_share_t share = NULL;
11086185db85Sdougm 	int done = 0;
11096185db85Sdougm 
1110549ec3ffSdougm 	for (group = sa_get_group(handle, NULL); group != NULL && !done;
11116185db85Sdougm 		group = sa_get_next_group(group)) {
11126185db85Sdougm 	    if (is_zfs_group(group)) {
11136185db85Sdougm 		for (zgroup = (sa_group_t)_sa_get_child_node((xmlNodePtr)group,
11146185db85Sdougm 							(xmlChar *)"group");
11156185db85Sdougm 		    zgroup != NULL; zgroup = sa_get_next_group(zgroup)) {
11166185db85Sdougm 		    share = find_share(zgroup, sharepath);
11176185db85Sdougm 		    if (share != NULL)
11186185db85Sdougm 			break;
11196185db85Sdougm 		}
11206185db85Sdougm 	    } else {
11216185db85Sdougm 		share = find_share(group, sharepath);
11226185db85Sdougm 	    }
11236185db85Sdougm 	    if (share != NULL)
11246185db85Sdougm 		break;
11256185db85Sdougm 	}
11266185db85Sdougm 	return (share);
11276185db85Sdougm }
11286185db85Sdougm 
11296185db85Sdougm /*
1130f345c0beSdougm  *  sa_check_path(group, path, strictness)
11316185db85Sdougm  *
11326185db85Sdougm  * check that path is a valid path relative to the group.  Currently,
11336185db85Sdougm  * we are ignoring the group and checking only the NFS rules. Later,
11346185db85Sdougm  * we may want to use the group to then check against the protocols
1135f345c0beSdougm  * enabled on the group. The strictness values mean:
1136f345c0beSdougm  * SA_CHECK_NORMAL == only check newpath against shares that are active
1137f345c0beSdougm  * SA_CHECK_STRICT == check newpath against both active shares and those
1138f345c0beSdougm  *		      stored in the repository
11396185db85Sdougm  */
11406185db85Sdougm 
11416185db85Sdougm int
1142f345c0beSdougm sa_check_path(sa_group_t group, char *path, int strictness)
11436185db85Sdougm {
1144549ec3ffSdougm 	sa_handle_t handle;
1145549ec3ffSdougm 
1146549ec3ffSdougm 	handle = sa_find_group_handle(group);
1147549ec3ffSdougm 	return (validpath(handle, path, strictness));
11486185db85Sdougm }
11496185db85Sdougm 
11506185db85Sdougm /*
11516185db85Sdougm  * _sa_add_share(group, sharepath, persist, *error)
11526185db85Sdougm  *
11536185db85Sdougm  * common code for all types of add_share. sa_add_share() is the
11546185db85Sdougm  * public API, we also need to be able to do this when parsing legacy
11556185db85Sdougm  * files and construction of the internal configuration while
11566185db85Sdougm  * extracting config info from SMF.
11576185db85Sdougm  */
11586185db85Sdougm 
11596185db85Sdougm sa_share_t
11606185db85Sdougm _sa_add_share(sa_group_t group, char *sharepath, int persist, int *error)
11616185db85Sdougm {
11626185db85Sdougm 	xmlNodePtr node = NULL;
11636185db85Sdougm 	int err;
11646185db85Sdougm 
11656185db85Sdougm 	err  = SA_OK; /* assume success */
11666185db85Sdougm 
11676185db85Sdougm 	node = xmlNewChild((xmlNodePtr)group, NULL,
11686185db85Sdougm 				(xmlChar *)"share", NULL);
11696185db85Sdougm 	if (node != NULL) {
11706185db85Sdougm 	    xmlSetProp(node, (xmlChar *)"path", (xmlChar *)sharepath);
11716185db85Sdougm 	    xmlSetProp(node, (xmlChar *)"type", persist ?
11726185db85Sdougm 			(xmlChar *)"persist" : (xmlChar *)"transient");
11736185db85Sdougm 	    if (persist != SA_SHARE_TRANSIENT) {
11746185db85Sdougm 		/*
11756185db85Sdougm 		 * persistent shares come in two flavors: SMF and
11766185db85Sdougm 		 * ZFS. Sort this one out based on target group and
11776185db85Sdougm 		 * path type. Currently, only NFS is supported in the
11786185db85Sdougm 		 * ZFS group and it is always on.
11796185db85Sdougm 		 */
11806185db85Sdougm 		if (sa_group_is_zfs(group) && sa_path_is_zfs(sharepath)) {
11816185db85Sdougm 		    err = sa_zfs_set_sharenfs(group, sharepath, 1);
11826185db85Sdougm 		} else {
1183549ec3ffSdougm 		    sa_handle_impl_t impl_handle;
1184549ec3ffSdougm 		    impl_handle = (sa_handle_impl_t)sa_find_group_handle(group);
1185549ec3ffSdougm 		    if (impl_handle != NULL)
1186549ec3ffSdougm 			err = sa_commit_share(impl_handle->scfhandle, group,
11876185db85Sdougm 						(sa_share_t)node);
1188549ec3ffSdougm 		    else
1189549ec3ffSdougm 			err = SA_SYSTEM_ERR;
11906185db85Sdougm 		}
11916185db85Sdougm 	    }
11926185db85Sdougm 	    if (err == SA_NO_PERMISSION && persist & SA_SHARE_PARSER) {
11936185db85Sdougm 		/* called by the dfstab parser so could be a show */
11946185db85Sdougm 		err = SA_OK;
11956185db85Sdougm 	    }
11966185db85Sdougm 	    if (err != SA_OK) {
11976185db85Sdougm 		/*
11986185db85Sdougm 		 * we couldn't commit to the repository so undo
11996185db85Sdougm 		 * our internal state to reflect reality.
12006185db85Sdougm 		 */
12016185db85Sdougm 		xmlUnlinkNode(node);
12026185db85Sdougm 		xmlFreeNode(node);
12036185db85Sdougm 		node = NULL;
12046185db85Sdougm 	    }
12056185db85Sdougm 	} else {
12066185db85Sdougm 	    err = SA_NO_MEMORY;
12076185db85Sdougm 	}
12086185db85Sdougm 	if (error != NULL)
12096185db85Sdougm 	    *error = err;
12106185db85Sdougm 	return (node);
12116185db85Sdougm }
12126185db85Sdougm 
12136185db85Sdougm /*
12146185db85Sdougm  * sa_add_share(group, sharepath, persist, *error)
12156185db85Sdougm  *
12166185db85Sdougm  *	Add a new share object to the specified group.  The share will
12176185db85Sdougm  *	have the specified sharepath and will only be constructed if
12186185db85Sdougm  *	it is a valid path to be shared.  NULL is returned on error
12196185db85Sdougm  *	and a detailed error value will be returned via the error
12206185db85Sdougm  *	pointer.
12216185db85Sdougm  */
12226185db85Sdougm sa_share_t
12236185db85Sdougm sa_add_share(sa_group_t group, char *sharepath, int persist, int *error)
12246185db85Sdougm {
12256185db85Sdougm 	xmlNodePtr node = NULL;
12266185db85Sdougm 	sa_share_t dup;
1227f345c0beSdougm 	int strictness = SA_CHECK_NORMAL;
1228549ec3ffSdougm 	sa_handle_t handle;
1229f345c0beSdougm 
1230f345c0beSdougm 	/*
1231f345c0beSdougm 	 * If the share is to be permanent, use strict checking so a
1232f345c0beSdougm 	 * bad config doesn't get created. Transient shares only need
1233f345c0beSdougm 	 * to check against the currently active
1234f345c0beSdougm 	 * shares. SA_SHARE_PARSER is a modifier used internally to
1235f345c0beSdougm 	 * indicate that we are being called by the dfstab parser and
1236f345c0beSdougm 	 * that we need strict checking in all cases. Normally persist
1237f345c0beSdougm 	 * is in integer value but SA_SHARE_PARSER may be or'd into
1238f345c0beSdougm 	 * it as an override.
1239f345c0beSdougm 	 */
1240f345c0beSdougm 	if (persist & SA_SHARE_PARSER || persist == SA_SHARE_PERMANENT)
1241f345c0beSdougm 	    strictness = SA_CHECK_STRICT;
12426185db85Sdougm 
1243549ec3ffSdougm 	handle = sa_find_group_handle(group);
1244549ec3ffSdougm 
1245549ec3ffSdougm 	if ((dup = sa_find_share(handle, sharepath)) == NULL &&
1246f345c0beSdougm 		(*error = sa_check_path(group, sharepath, strictness)) ==
1247f345c0beSdougm 			SA_OK) {
12486185db85Sdougm 	    node = _sa_add_share(group, sharepath, persist, error);
12496185db85Sdougm 	}
12506185db85Sdougm 	if (dup != NULL)
12516185db85Sdougm 	    *error = SA_DUPLICATE_NAME;
12526185db85Sdougm 
12536185db85Sdougm 	return ((sa_share_t)node);
12546185db85Sdougm }
12556185db85Sdougm 
12566185db85Sdougm /*
12576185db85Sdougm  * sa_enable_share(share, protocol)
12586185db85Sdougm  *	Enable the specified share to the specified protocol.
12596185db85Sdougm  *	If protocol is NULL, then all protocols.
12606185db85Sdougm  */
12616185db85Sdougm int
12626185db85Sdougm sa_enable_share(sa_share_t share, char *protocol)
12636185db85Sdougm {
12646185db85Sdougm 	char *sharepath;
12656185db85Sdougm 	struct stat st;
12666185db85Sdougm 	int err = 0;
12676185db85Sdougm 
12686185db85Sdougm 	sharepath = sa_get_share_attr(share, "path");
12696185db85Sdougm 	if (stat(sharepath, &st) < 0) {
12706185db85Sdougm 	    err = SA_NO_SUCH_PATH;
12716185db85Sdougm 	} else {
12726185db85Sdougm 	    /* tell the server about the share */
12736185db85Sdougm 	    if (protocol != NULL) {
12746185db85Sdougm 		/* lookup protocol specific handler */
12756185db85Sdougm 		err = sa_proto_share(protocol, share);
12766185db85Sdougm 		if (err == SA_OK)
12776185db85Sdougm 		    (void) sa_set_share_attr(share, "shared", "true");
12786185db85Sdougm 	    } else {
12796185db85Sdougm 		/* tell all protocols */
12806185db85Sdougm 		err = sa_proto_share("nfs", share); /* only NFS for now */
12816185db85Sdougm 		(void) sa_set_share_attr(share, "shared", "true");
12826185db85Sdougm 	    }
12836185db85Sdougm 	}
12846185db85Sdougm 	if (sharepath != NULL)
12856185db85Sdougm 	    sa_free_attr_string(sharepath);
12866185db85Sdougm 	return (err);
12876185db85Sdougm }
12886185db85Sdougm 
12896185db85Sdougm /*
12906185db85Sdougm  * sa_disable_share(share, protocol)
12916185db85Sdougm  *	Disable the specified share to the specified protocol.
12926185db85Sdougm  *	If protocol is NULL, then all protocols.
12936185db85Sdougm  */
12946185db85Sdougm int
12956185db85Sdougm sa_disable_share(sa_share_t share, char *protocol)
12966185db85Sdougm {
12976185db85Sdougm 	char *path;
12986185db85Sdougm 	char *shared;
12996185db85Sdougm 	int ret = SA_OK;
13006185db85Sdougm 
13016185db85Sdougm 	path = sa_get_share_attr(share, "path");
13026185db85Sdougm 	shared = sa_get_share_attr(share, "shared");
13036185db85Sdougm 
13046185db85Sdougm 	if (protocol != NULL) {
13056185db85Sdougm 	    ret = sa_proto_unshare(protocol, path);
13066185db85Sdougm 	} else {
13076185db85Sdougm 	    /* need to do all protocols */
13086185db85Sdougm 	    ret = sa_proto_unshare("nfs", path);
13096185db85Sdougm 	}
13106185db85Sdougm 	if (ret == SA_OK)
13116185db85Sdougm 		(void) sa_set_share_attr(share, "shared", NULL);
13126185db85Sdougm 	if (path != NULL)
13136185db85Sdougm 	    sa_free_attr_string(path);
13146185db85Sdougm 	if (shared != NULL)
13156185db85Sdougm 	    sa_free_attr_string(shared);
13166185db85Sdougm 	return (ret);
13176185db85Sdougm }
13186185db85Sdougm 
13196185db85Sdougm /*
13206185db85Sdougm  * sa_remove_share(share)
13216185db85Sdougm  *
13226185db85Sdougm  * remove the specified share from its containing group.
13236185db85Sdougm  * Remove from the SMF or ZFS configuration space.
13246185db85Sdougm  */
13256185db85Sdougm 
13266185db85Sdougm int
13276185db85Sdougm sa_remove_share(sa_share_t share)
13286185db85Sdougm {
13296185db85Sdougm 	sa_group_t group;
13306185db85Sdougm 	int ret = SA_OK;
13316185db85Sdougm 	char *type;
13326185db85Sdougm 	int transient = 0;
13336185db85Sdougm 	char *groupname;
13346185db85Sdougm 	char *zfs;
13356185db85Sdougm 
13366185db85Sdougm 	type = sa_get_share_attr(share, "type");
13376185db85Sdougm 	group = sa_get_parent_group(share);
13386185db85Sdougm 	zfs = sa_get_group_attr(group, "zfs");
13396185db85Sdougm 	groupname = sa_get_group_attr(group, "name");
13406185db85Sdougm 	if (type != NULL && strcmp(type, "persist") != 0)
13416185db85Sdougm 	    transient = 1;
13426185db85Sdougm 	if (type != NULL)
13436185db85Sdougm 	    sa_free_attr_string(type);
13446185db85Sdougm 
13456185db85Sdougm 	/* remove the node from its group then free the memory */
13466185db85Sdougm 
13476185db85Sdougm 	/*
13486185db85Sdougm 	 * need to test if "busy"
13496185db85Sdougm 	 */
13506185db85Sdougm 	/* only do SMF action if permanent */
13516185db85Sdougm 	if (!transient || zfs != NULL) {
13526185db85Sdougm 	    /* remove from legacy dfstab as well as possible SMF */
13536185db85Sdougm 	    ret = sa_delete_legacy(share);
13546185db85Sdougm 	    if (ret == SA_OK) {
13556185db85Sdougm 		if (!sa_group_is_zfs(group)) {
1356549ec3ffSdougm 		    sa_handle_impl_t impl_handle;
1357549ec3ffSdougm 		    impl_handle = (sa_handle_impl_t)sa_find_group_handle(group);
1358549ec3ffSdougm 		    if (impl_handle != NULL)
1359549ec3ffSdougm 			ret = sa_delete_share(impl_handle->scfhandle,
1360549ec3ffSdougm 						group, share);
1361549ec3ffSdougm 		    else
1362549ec3ffSdougm 			ret = SA_SYSTEM_ERR;
13636185db85Sdougm 		} else {
13646185db85Sdougm 		    char *sharepath = sa_get_share_attr(share, "path");
13656185db85Sdougm 		    if (sharepath != NULL) {
13666185db85Sdougm 			ret = sa_zfs_set_sharenfs(group, sharepath, 0);
13676185db85Sdougm 			sa_free_attr_string(sharepath);
13686185db85Sdougm 		    }
13696185db85Sdougm 		}
13706185db85Sdougm 	    }
13716185db85Sdougm 	}
13726185db85Sdougm 	if (groupname != NULL)
13736185db85Sdougm 	    sa_free_attr_string(groupname);
13746185db85Sdougm 	if (zfs != NULL)
13756185db85Sdougm 	    sa_free_attr_string(zfs);
13766185db85Sdougm 
13776185db85Sdougm 	xmlUnlinkNode((xmlNodePtr)share);
13786185db85Sdougm 	xmlFreeNode((xmlNodePtr)share);
13796185db85Sdougm 	return (ret);
13806185db85Sdougm }
13816185db85Sdougm 
13826185db85Sdougm /*
13836185db85Sdougm  * sa_move_share(group, share)
13846185db85Sdougm  *
13856185db85Sdougm  * move the specified share to the specified group.  Update SMF
13866185db85Sdougm  * appropriately.
13876185db85Sdougm  */
13886185db85Sdougm 
13896185db85Sdougm int
13906185db85Sdougm sa_move_share(sa_group_t group, sa_share_t share)
13916185db85Sdougm {
13926185db85Sdougm 	sa_group_t oldgroup;
13936185db85Sdougm 	int ret = SA_OK;
13946185db85Sdougm 
13956185db85Sdougm 	/* remove the node from its group then free the memory */
13966185db85Sdougm 
13976185db85Sdougm 	oldgroup = sa_get_parent_group(share);
13986185db85Sdougm 	if (oldgroup != group) {
1399549ec3ffSdougm 	    sa_handle_impl_t impl_handle;
14006185db85Sdougm 	    xmlUnlinkNode((xmlNodePtr)share);
14016185db85Sdougm 	    /* now that the share isn't in its old group, add to the new one */
14026185db85Sdougm 	    xmlAddChild((xmlNodePtr)group, (xmlNodePtr)share);
14036185db85Sdougm 	    /* need to deal with SMF */
1404549ec3ffSdougm 	    impl_handle = (sa_handle_impl_t)sa_find_group_handle(group);
1405549ec3ffSdougm 	    if (impl_handle != NULL) {
14066185db85Sdougm 		/*
14076185db85Sdougm 		 * need to remove from old group first and then add to
14086185db85Sdougm 		 * new group. Ideally, we would do the other order but
14096185db85Sdougm 		 * need to avoid having the share in two groups at the
14106185db85Sdougm 		 * same time.
14116185db85Sdougm 		 */
1412549ec3ffSdougm 		ret = sa_delete_share(impl_handle->scfhandle, oldgroup, share);
1413549ec3ffSdougm 		if (ret == SA_OK)
1414549ec3ffSdougm 		    ret = sa_commit_share(impl_handle->scfhandle, group, share);
1415549ec3ffSdougm 	    } else {
1416549ec3ffSdougm 		ret = SA_SYSTEM_ERR;
14176185db85Sdougm 	    }
14186185db85Sdougm 	}
14196185db85Sdougm 	return (ret);
14206185db85Sdougm }
14216185db85Sdougm 
14226185db85Sdougm /*
14236185db85Sdougm  * sa_get_parent_group(share)
14246185db85Sdougm  *
14256185db85Sdougm  * Return the containg group for the share. If a group was actually
14266185db85Sdougm  * passed in, we don't want a parent so return NULL.
14276185db85Sdougm  */
14286185db85Sdougm 
14296185db85Sdougm sa_group_t
14306185db85Sdougm sa_get_parent_group(sa_share_t share)
14316185db85Sdougm {
14326185db85Sdougm 	xmlNodePtr node = NULL;
14336185db85Sdougm 	if (share != NULL) {
14346185db85Sdougm 	    node = ((xmlNodePtr)share)->parent;
14356185db85Sdougm 		/*
14366185db85Sdougm 		 * make sure parent is a group and not sharecfg since
14376185db85Sdougm 		 * we may be cheating and passing in a group.
14386185db85Sdougm 		 * Eventually, groups of groups might come into being.
14396185db85Sdougm 		 */
14406185db85Sdougm 	    if (node == NULL ||
14416185db85Sdougm 		xmlStrcmp(node->name, (xmlChar *)"sharecfg") == 0)
14426185db85Sdougm 		node = NULL;
14436185db85Sdougm 	}
14446185db85Sdougm 	return ((sa_group_t)node);
14456185db85Sdougm }
14466185db85Sdougm 
14476185db85Sdougm /*
1448549ec3ffSdougm  * _sa_create_group(impl_handle, groupname)
14496185db85Sdougm  *
14506185db85Sdougm  * Create a group in the document. The caller will need to deal with
14516185db85Sdougm  * configuration store and activation.
14526185db85Sdougm  */
14536185db85Sdougm 
14546185db85Sdougm sa_group_t
1455549ec3ffSdougm _sa_create_group(sa_handle_impl_t impl_handle, char *groupname)
14566185db85Sdougm {
14576185db85Sdougm 	xmlNodePtr node = NULL;
14586185db85Sdougm 
14596185db85Sdougm 	if (sa_valid_group_name(groupname)) {
1460549ec3ffSdougm 	    node = xmlNewChild(impl_handle->tree, NULL,
14616185db85Sdougm 				(xmlChar *)"group", NULL);
14626185db85Sdougm 	    if (node != NULL) {
14636185db85Sdougm 		xmlSetProp(node, (xmlChar *)"name", (xmlChar *)groupname);
14646185db85Sdougm 		xmlSetProp(node, (xmlChar *)"state", (xmlChar *)"enabled");
14656185db85Sdougm 	    }
14666185db85Sdougm 	}
14676185db85Sdougm 	return ((sa_group_t)node);
14686185db85Sdougm }
14696185db85Sdougm 
14706185db85Sdougm /*
14716185db85Sdougm  * _sa_create_zfs_group(group, groupname)
14726185db85Sdougm  *
14736185db85Sdougm  * Create a ZFS subgroup under the specified group. This may
14746185db85Sdougm  * eventually form the basis of general sub-groups, but is currently
14756185db85Sdougm  * restricted to ZFS.
14766185db85Sdougm  */
14776185db85Sdougm sa_group_t
14786185db85Sdougm _sa_create_zfs_group(sa_group_t group, char *groupname)
14796185db85Sdougm {
14806185db85Sdougm 	xmlNodePtr node = NULL;
14816185db85Sdougm 
14826185db85Sdougm 	node = xmlNewChild((xmlNodePtr)group, NULL,
14836185db85Sdougm 				(xmlChar *)"group", NULL);
14846185db85Sdougm 	if (node != NULL) {
14856185db85Sdougm 		xmlSetProp(node, (xmlChar *)"name", (xmlChar *)groupname);
14866185db85Sdougm 		xmlSetProp(node, (xmlChar *)"state", (xmlChar *)"enabled");
14876185db85Sdougm 	}
14886185db85Sdougm 
14896185db85Sdougm 	return ((sa_group_t)node);
14906185db85Sdougm }
14916185db85Sdougm 
14926185db85Sdougm /*
14936185db85Sdougm  * sa_create_group(groupname, *error)
14946185db85Sdougm  *
14956185db85Sdougm  * Create a new group with groupname.  Need to validate that it is a
14966185db85Sdougm  * legal name for SMF and the construct the SMF service instance of
14976185db85Sdougm  * svc:/network/shares/group to implement the group. All necessary
14986185db85Sdougm  * operational properties must be added to the group at this point
14996185db85Sdougm  * (via the SMF transaction model).
15006185db85Sdougm  */
15016185db85Sdougm sa_group_t
1502549ec3ffSdougm sa_create_group(sa_handle_t handle, char *groupname, int *error)
15036185db85Sdougm {
15046185db85Sdougm 	xmlNodePtr node = NULL;
15056185db85Sdougm 	sa_group_t group;
15066185db85Sdougm 	int ret;
15076185db85Sdougm 	char rbacstr[256];
1508549ec3ffSdougm 	sa_handle_impl_t impl_handle = (sa_handle_impl_t)handle;
15096185db85Sdougm 
15106185db85Sdougm 	ret = SA_OK;
15116185db85Sdougm 
1512549ec3ffSdougm 	if (impl_handle == NULL || impl_handle->scfhandle == NULL) {
15136185db85Sdougm 	    ret = SA_SYSTEM_ERR;
15146185db85Sdougm 	    goto err;
15156185db85Sdougm 	}
15166185db85Sdougm 
1517549ec3ffSdougm 	group = sa_get_group(handle, groupname);
15186185db85Sdougm 	if (group != NULL) {
15196185db85Sdougm 	    ret = SA_DUPLICATE_NAME;
15206185db85Sdougm 	} else {
15216185db85Sdougm 	    if (sa_valid_group_name(groupname)) {
1522549ec3ffSdougm 		node = xmlNewChild(impl_handle->tree, NULL,
15236185db85Sdougm 				    (xmlChar *)"group", NULL);
15246185db85Sdougm 		if (node != NULL) {
15256185db85Sdougm 		    xmlSetProp(node, (xmlChar *)"name", (xmlChar *)groupname);
15266185db85Sdougm 		    /* default to the group being enabled */
15276185db85Sdougm 		    xmlSetProp(node, (xmlChar *)"state", (xmlChar *)"enabled");
1528549ec3ffSdougm 		    ret = sa_create_instance(impl_handle->scfhandle, groupname);
15296185db85Sdougm 		    if (ret == SA_OK) {
1530549ec3ffSdougm 			ret = sa_start_transaction(impl_handle->scfhandle,
1531549ec3ffSdougm 							"operation");
15326185db85Sdougm 		    }
15336185db85Sdougm 		    if (ret == SA_OK) {
1534549ec3ffSdougm 			ret = sa_set_property(impl_handle->scfhandle,
1535549ec3ffSdougm 						"state", "enabled");
15366185db85Sdougm 			if (ret == SA_OK) {
1537549ec3ffSdougm 			    ret = sa_end_transaction(impl_handle->scfhandle);
15386185db85Sdougm 			} else {
1539549ec3ffSdougm 			    sa_abort_transaction(impl_handle->scfhandle);
15406185db85Sdougm 			}
15416185db85Sdougm 		    }
15426185db85Sdougm 		    if (ret == SA_OK) {
15436185db85Sdougm 			/* initialize the RBAC strings */
1544549ec3ffSdougm 			ret = sa_start_transaction(impl_handle->scfhandle,
1545549ec3ffSdougm 							"general");
15466185db85Sdougm 			if (ret == SA_OK) {
15476185db85Sdougm 			    (void) snprintf(rbacstr, sizeof (rbacstr), "%s.%s",
15486185db85Sdougm 					SA_RBAC_MANAGE, groupname);
1549549ec3ffSdougm 			    ret = sa_set_property(impl_handle->scfhandle,
15506185db85Sdougm 						    "action_authorization",
15516185db85Sdougm 						    rbacstr);
15526185db85Sdougm 			}
15536185db85Sdougm 			if (ret == SA_OK) {
15546185db85Sdougm 			    (void) snprintf(rbacstr, sizeof (rbacstr), "%s.%s",
15556185db85Sdougm 					SA_RBAC_VALUE, groupname);
1556549ec3ffSdougm 			    ret = sa_set_property(impl_handle->scfhandle,
15576185db85Sdougm 						    "value_authorization",
15586185db85Sdougm 						    rbacstr);
15596185db85Sdougm 			}
15606185db85Sdougm 			if (ret == SA_OK) {
1561549ec3ffSdougm 			    ret = sa_end_transaction(impl_handle->scfhandle);
15626185db85Sdougm 			} else {
1563549ec3ffSdougm 			    sa_abort_transaction(impl_handle->scfhandle);
15646185db85Sdougm 			}
15656185db85Sdougm 		    }
15666185db85Sdougm 		    if (ret != SA_OK) {
15676185db85Sdougm 			/*
15686185db85Sdougm 			 * Couldn't commit the group so we need to
15696185db85Sdougm 			 * undo internally.
15706185db85Sdougm 			 */
15716185db85Sdougm 			xmlUnlinkNode(node);
15726185db85Sdougm 			xmlFreeNode(node);
15736185db85Sdougm 			node = NULL;
15746185db85Sdougm 		    }
15756185db85Sdougm 		} else {
15766185db85Sdougm 		    ret = SA_NO_MEMORY;
15776185db85Sdougm 		}
15786185db85Sdougm 	    } else {
15796185db85Sdougm 		ret = SA_INVALID_NAME;
15806185db85Sdougm 	    }
15816185db85Sdougm 	}
15826185db85Sdougm err:
15836185db85Sdougm 	if (error != NULL)
15846185db85Sdougm 	    *error = ret;
15856185db85Sdougm 	return ((sa_group_t)node);
15866185db85Sdougm }
15876185db85Sdougm 
15886185db85Sdougm /*
15896185db85Sdougm  * sa_remove_group(group)
15906185db85Sdougm  *
15916185db85Sdougm  * Remove the specified group. This deletes from the SMF repository.
15926185db85Sdougm  * All property groups and properties are removed.
15936185db85Sdougm  */
15946185db85Sdougm 
15956185db85Sdougm int
15966185db85Sdougm sa_remove_group(sa_group_t group)
15976185db85Sdougm {
15986185db85Sdougm 	char *name;
15996185db85Sdougm 	int ret = SA_OK;
1600549ec3ffSdougm 	sa_handle_impl_t impl_handle;
16016185db85Sdougm 
1602549ec3ffSdougm 	impl_handle = (sa_handle_impl_t)sa_find_group_handle(group);
1603549ec3ffSdougm 	if (impl_handle != NULL) {
16046185db85Sdougm 	    name = sa_get_group_attr(group, "name");
16056185db85Sdougm 	    if (name != NULL) {
1606549ec3ffSdougm 		ret = sa_delete_instance(impl_handle->scfhandle, name);
16076185db85Sdougm 		sa_free_attr_string(name);
16086185db85Sdougm 	    }
16096185db85Sdougm 	    xmlUnlinkNode((xmlNodePtr)group); /* make sure unlinked */
16106185db85Sdougm 	    xmlFreeNode((xmlNodePtr)group);   /* now it is gone */
1611549ec3ffSdougm 	} else {
1612549ec3ffSdougm 	    ret = SA_SYSTEM_ERR;
1613549ec3ffSdougm 	}
16146185db85Sdougm 	return (ret);
16156185db85Sdougm }
16166185db85Sdougm 
16176185db85Sdougm /*
16186185db85Sdougm  * sa_update_config()
16196185db85Sdougm  *
16206185db85Sdougm  * Used to update legacy files that need to be updated in bulk
16216185db85Sdougm  * Currently, this is a placeholder and will go away in a future
16226185db85Sdougm  * release.
16236185db85Sdougm  */
16246185db85Sdougm 
16256185db85Sdougm int
1626549ec3ffSdougm sa_update_config(sa_handle_t handle)
16276185db85Sdougm {
16286185db85Sdougm 	/*
16296185db85Sdougm 	 * do legacy files first so we can tell when they change.
16306185db85Sdougm 	 * This will go away when we start updating individual records
16316185db85Sdougm 	 * rather than the whole file.
16326185db85Sdougm 	 */
1633549ec3ffSdougm 	update_legacy_config(handle);
16346185db85Sdougm 	return (SA_OK);
16356185db85Sdougm }
16366185db85Sdougm 
16376185db85Sdougm /*
16386185db85Sdougm  * get_node_attr(node, tag)
16396185db85Sdougm  *
16406185db85Sdougm  * Get the speficied tag(attribute) if it exists on the node.  This is
16416185db85Sdougm  * used internally by a number of attribute oriented functions.
16426185db85Sdougm  */
16436185db85Sdougm 
16446185db85Sdougm static char *
16456185db85Sdougm get_node_attr(void *nodehdl, char *tag)
16466185db85Sdougm {
16476185db85Sdougm 	xmlNodePtr node = (xmlNodePtr)nodehdl;
16486185db85Sdougm 	xmlChar *name = NULL;
16496185db85Sdougm 
16506185db85Sdougm 	if (node != NULL) {
16516185db85Sdougm 		name = xmlGetProp(node, (xmlChar *)tag);
16526185db85Sdougm 	}
16536185db85Sdougm 	return ((char *)name);
16546185db85Sdougm }
16556185db85Sdougm 
16566185db85Sdougm /*
16576185db85Sdougm  * get_node_attr(node, tag)
16586185db85Sdougm  *
16596185db85Sdougm  * Set the speficied tag(attribute) to the specified value This is
16606185db85Sdougm  * used internally by a number of attribute oriented functions. It
16616185db85Sdougm  * doesn't update the repository, only the internal document state.
16626185db85Sdougm  */
16636185db85Sdougm 
16646185db85Sdougm void
16656185db85Sdougm set_node_attr(void *nodehdl, char *tag, char *value)
16666185db85Sdougm {
16676185db85Sdougm 	xmlNodePtr node = (xmlNodePtr)nodehdl;
16686185db85Sdougm 	if (node != NULL && tag != NULL) {
16696185db85Sdougm 		if (value != NULL) {
16706185db85Sdougm 			xmlSetProp(node, (xmlChar *)tag, (xmlChar *)value);
16716185db85Sdougm 		} else {
16726185db85Sdougm 			xmlUnsetProp(node, (xmlChar *)tag);
16736185db85Sdougm 		}
16746185db85Sdougm 	}
16756185db85Sdougm }
16766185db85Sdougm 
16776185db85Sdougm /*
16786185db85Sdougm  * sa_get_group_attr(group, tag)
16796185db85Sdougm  *
16806185db85Sdougm  * Get the specied attribute, if defined, for the group.
16816185db85Sdougm  */
16826185db85Sdougm 
16836185db85Sdougm char *
16846185db85Sdougm sa_get_group_attr(sa_group_t group, char *tag)
16856185db85Sdougm {
16866185db85Sdougm 	return (get_node_attr((void *)group, tag));
16876185db85Sdougm }
16886185db85Sdougm 
16896185db85Sdougm /*
16906185db85Sdougm  * sa_set_group_attr(group, tag, value)
16916185db85Sdougm  *
16926185db85Sdougm  * set the specified tag/attribute on the group using value as its
16936185db85Sdougm  * value.
16946185db85Sdougm  *
16956185db85Sdougm  * This will result in setting the property in the SMF repository as
16966185db85Sdougm  * well as in the internal document.
16976185db85Sdougm  */
16986185db85Sdougm 
16996185db85Sdougm int
17006185db85Sdougm sa_set_group_attr(sa_group_t group, char *tag, char *value)
17016185db85Sdougm {
17026185db85Sdougm 	int ret;
17036185db85Sdougm 	char *groupname;
1704549ec3ffSdougm 	sa_handle_impl_t impl_handle;
17056185db85Sdougm 
1706549ec3ffSdougm 	impl_handle = (sa_handle_impl_t)sa_find_group_handle(group);
1707549ec3ffSdougm 	if (impl_handle != NULL) {
17086185db85Sdougm 	    groupname = sa_get_group_attr(group, "name");
1709549ec3ffSdougm 	    ret = sa_get_instance(impl_handle->scfhandle, groupname);
17106185db85Sdougm 	    if (ret == SA_OK) {
17116185db85Sdougm 		set_node_attr((void *)group, tag, value);
1712549ec3ffSdougm 		ret = sa_start_transaction(impl_handle->scfhandle, "operation");
17136185db85Sdougm 		if (ret == SA_OK) {
1714549ec3ffSdougm 		    ret = sa_set_property(impl_handle->scfhandle, tag, value);
17156185db85Sdougm 		    if (ret == SA_OK)
1716549ec3ffSdougm 			(void) sa_end_transaction(impl_handle->scfhandle);
17176185db85Sdougm 		    else {
1718549ec3ffSdougm 			sa_abort_transaction(impl_handle->scfhandle);
17196185db85Sdougm 		    }
17206185db85Sdougm 		}
17216185db85Sdougm 	    }
17226185db85Sdougm 	    if (groupname != NULL)
17236185db85Sdougm 		sa_free_attr_string(groupname);
1724549ec3ffSdougm 	} else {
1725549ec3ffSdougm 	    ret = SA_SYSTEM_ERR;
1726549ec3ffSdougm 	}
17276185db85Sdougm 	return (ret);
17286185db85Sdougm }
17296185db85Sdougm 
17306185db85Sdougm /*
17316185db85Sdougm  * sa_get_share_attr(share, tag)
17326185db85Sdougm  *
17336185db85Sdougm  * Return the value of the tag/attribute set on the specified
17346185db85Sdougm  * share. Returns NULL if the tag doesn't exist.
17356185db85Sdougm  */
17366185db85Sdougm 
17376185db85Sdougm char *
17386185db85Sdougm sa_get_share_attr(sa_share_t share, char *tag)
17396185db85Sdougm {
17406185db85Sdougm 	return (get_node_attr((void *)share, tag));
17416185db85Sdougm }
17426185db85Sdougm 
17436185db85Sdougm /*
17446185db85Sdougm  * sa_get_resource(group, resource)
17456185db85Sdougm  *
17466185db85Sdougm  * Search all the shares in the speified group for a share with a
17476185db85Sdougm  * resource name matching the one specified.
17486185db85Sdougm  *
17496185db85Sdougm  * In the future, it may be advantageous to allow group to be NULL and
17506185db85Sdougm  * search all groups but that isn't needed at present.
17516185db85Sdougm  */
17526185db85Sdougm 
17536185db85Sdougm sa_share_t
17546185db85Sdougm sa_get_resource(sa_group_t group, char *resource)
17556185db85Sdougm {
17566185db85Sdougm 	sa_share_t share = NULL;
17576185db85Sdougm 	char *name = NULL;
17586185db85Sdougm 
17596185db85Sdougm 	if (resource != NULL) {
17606185db85Sdougm 	    for (share = sa_get_share(group, NULL); share != NULL;
17616185db85Sdougm 		share = sa_get_next_share(share)) {
17626185db85Sdougm 		name = sa_get_share_attr(share, "resource");
17636185db85Sdougm 		if (name != NULL) {
17646185db85Sdougm 		    if (strcmp(name, resource) == 0)
17656185db85Sdougm 			break;
17666185db85Sdougm 		    sa_free_attr_string(name);
17676185db85Sdougm 		    name = NULL;
17686185db85Sdougm 		}
17696185db85Sdougm 	    }
17706185db85Sdougm 	    if (name != NULL)
17716185db85Sdougm 		sa_free_attr_string(name);
17726185db85Sdougm 	}
17736185db85Sdougm 	return ((sa_share_t)share);
17746185db85Sdougm }
17756185db85Sdougm 
17766185db85Sdougm /*
17776185db85Sdougm  * _sa_set_share_description(share, description)
17786185db85Sdougm  *
17796185db85Sdougm  * Add a description tag with text contents to the specified share.
17806185db85Sdougm  * A separate XML tag is used rather than a property.
17816185db85Sdougm  */
17826185db85Sdougm 
17836185db85Sdougm xmlNodePtr
17846185db85Sdougm _sa_set_share_description(sa_share_t share, char *content)
17856185db85Sdougm {
17866185db85Sdougm 	xmlNodePtr node;
17876185db85Sdougm 	node = xmlNewChild((xmlNodePtr)share,
17886185db85Sdougm 			    NULL, (xmlChar *)"description", NULL);
17896185db85Sdougm 	xmlNodeSetContent(node, (xmlChar *)content);
17906185db85Sdougm 	return (node);
17916185db85Sdougm }
17926185db85Sdougm 
17936185db85Sdougm /*
17946185db85Sdougm  * sa_set_share_attr(share, tag, value)
17956185db85Sdougm  *
17966185db85Sdougm  * Set the share attribute specified by tag to the specified value. In
17976185db85Sdougm  * the case of "resource", enforce a no duplicates in a group rule. If
17986185db85Sdougm  * the share is not transient, commit the changes to the repository
17996185db85Sdougm  * else just update the share internally.
18006185db85Sdougm  */
18016185db85Sdougm 
18026185db85Sdougm int
18036185db85Sdougm sa_set_share_attr(sa_share_t share, char *tag, char *value)
18046185db85Sdougm {
18056185db85Sdougm 	sa_group_t group;
18066185db85Sdougm 	sa_share_t resource;
18076185db85Sdougm 	int ret = SA_OK;
18086185db85Sdougm 
18096185db85Sdougm 	group = sa_get_parent_group(share);
18106185db85Sdougm 
18116185db85Sdougm 	/*
18126185db85Sdougm 	 * There are some attributes that may have specific
18136185db85Sdougm 	 * restrictions on them. Initially, only "resource" has
18146185db85Sdougm 	 * special meaning that needs to be checked. Only one instance
18156185db85Sdougm 	 * of a resource name may exist within a group.
18166185db85Sdougm 	 */
18176185db85Sdougm 
18186185db85Sdougm 	if (strcmp(tag, "resource") == 0) {
18196185db85Sdougm 	    resource = sa_get_resource(group, value);
18206185db85Sdougm 	    if (resource != share && resource != NULL)
18216185db85Sdougm 		ret = SA_DUPLICATE_NAME;
18226185db85Sdougm 	}
18236185db85Sdougm 	if (ret == SA_OK) {
18246185db85Sdougm 	    set_node_attr((void *)share, tag, value);
18256185db85Sdougm 	    if (group != NULL) {
18266185db85Sdougm 		char *type;
18276185db85Sdougm 		/* we can probably optimize this some */
18286185db85Sdougm 		type = sa_get_share_attr(share, "type");
1829549ec3ffSdougm 		if (type == NULL || strcmp(type, "transient") != 0) {
1830549ec3ffSdougm 		    sa_handle_impl_t impl_handle;
1831549ec3ffSdougm 		    impl_handle = (sa_handle_impl_t)sa_find_group_handle(group);
1832549ec3ffSdougm 		    if (impl_handle != NULL)
1833549ec3ffSdougm 			ret = sa_commit_share(impl_handle->scfhandle,
1834549ec3ffSdougm 						group, share);
1835549ec3ffSdougm 		    else
1836549ec3ffSdougm 			ret = SA_SYSTEM_ERR;
1837549ec3ffSdougm 		}
18386185db85Sdougm 		if (type != NULL)
18396185db85Sdougm 		    sa_free_attr_string(type);
18406185db85Sdougm 	    }
18416185db85Sdougm 	}
18426185db85Sdougm 	return (ret);
18436185db85Sdougm }
18446185db85Sdougm 
18456185db85Sdougm /*
18466185db85Sdougm  * sa_get_property_attr(prop, tag)
18476185db85Sdougm  *
18486185db85Sdougm  * Get the value of the specified property attribute. Standard
18496185db85Sdougm  * attributes are "type" and "value".
18506185db85Sdougm  */
18516185db85Sdougm 
18526185db85Sdougm char *
18536185db85Sdougm sa_get_property_attr(sa_property_t prop, char *tag)
18546185db85Sdougm {
18556185db85Sdougm 	return (get_node_attr((void *)prop, tag));
18566185db85Sdougm }
18576185db85Sdougm 
18586185db85Sdougm /*
18596185db85Sdougm  * sa_get_optionset_attr(prop, tag)
18606185db85Sdougm  *
18616185db85Sdougm  * Get the value of the specified property attribute. Standard
18626185db85Sdougm  * attribute is "type".
18636185db85Sdougm  */
18646185db85Sdougm 
18656185db85Sdougm char *
18666185db85Sdougm sa_get_optionset_attr(sa_property_t optionset, char *tag)
18676185db85Sdougm {
18686185db85Sdougm 	return (get_node_attr((void *)optionset, tag));
18696185db85Sdougm 
18706185db85Sdougm }
18716185db85Sdougm 
18726185db85Sdougm /*
18736185db85Sdougm  * sa_set_optionset_attr(optionset, tag, value)
18746185db85Sdougm  *
18756185db85Sdougm  * Set the specified attribute(tag) to the specified value on the
18766185db85Sdougm  * optionset.
18776185db85Sdougm  */
18786185db85Sdougm 
18796185db85Sdougm void
18806185db85Sdougm sa_set_optionset_attr(sa_group_t optionset, char *tag, char *value)
18816185db85Sdougm {
18826185db85Sdougm 	set_node_attr((void *)optionset, tag, value);
18836185db85Sdougm }
18846185db85Sdougm 
18856185db85Sdougm /*
18866185db85Sdougm  * sa_free_attr_string(string)
18876185db85Sdougm  *
18886185db85Sdougm  * Free the string that was returned in one of the sa_get_*_attr()
18896185db85Sdougm  * functions.
18906185db85Sdougm  */
18916185db85Sdougm 
18926185db85Sdougm void
18936185db85Sdougm sa_free_attr_string(char *string)
18946185db85Sdougm {
18956185db85Sdougm 	xmlFree((xmlChar *)string);
18966185db85Sdougm }
18976185db85Sdougm 
18986185db85Sdougm /*
18996185db85Sdougm  * sa_get_optionset(group, proto)
19006185db85Sdougm  *
19016185db85Sdougm  * Return the optionset, if it exists, that is associated with the
19026185db85Sdougm  * specified protocol.
19036185db85Sdougm  */
19046185db85Sdougm 
19056185db85Sdougm sa_optionset_t
19066185db85Sdougm sa_get_optionset(void *group, char *proto)
19076185db85Sdougm {
19086185db85Sdougm 	xmlNodePtr node;
19096185db85Sdougm 	xmlChar *value = NULL;
19106185db85Sdougm 
19116185db85Sdougm 	for (node = ((xmlNodePtr)group)->children; node != NULL;
19126185db85Sdougm 		node = node->next) {
19136185db85Sdougm 		if (xmlStrcmp(node->name, (xmlChar *)"optionset") == 0) {
19146185db85Sdougm 		    value = xmlGetProp(node, (xmlChar *)"type");
19156185db85Sdougm 		    if (proto != NULL) {
19166185db85Sdougm 			if (value != NULL &&
19176185db85Sdougm 			    xmlStrcmp(value, (xmlChar *)proto) == 0) {
19186185db85Sdougm 			    break;
19196185db85Sdougm 			}
19206185db85Sdougm 			if (value != NULL) {
19216185db85Sdougm 			    xmlFree(value);
19226185db85Sdougm 			    value = NULL;
19236185db85Sdougm 			}
19246185db85Sdougm 		    } else {
19256185db85Sdougm 			break;
19266185db85Sdougm 		    }
19276185db85Sdougm 		}
19286185db85Sdougm 	}
19296185db85Sdougm 	if (value != NULL)
19306185db85Sdougm 	    xmlFree(value);
19316185db85Sdougm 	return ((sa_optionset_t)node);
19326185db85Sdougm }
19336185db85Sdougm 
19346185db85Sdougm /*
19356185db85Sdougm  * sa_get_next_optionset(optionset)
19366185db85Sdougm  *
19376185db85Sdougm  * Return the next optionset in the group. NULL if this was the last.
19386185db85Sdougm  */
19396185db85Sdougm 
19406185db85Sdougm sa_optionset_t
19416185db85Sdougm sa_get_next_optionset(sa_optionset_t optionset)
19426185db85Sdougm {
19436185db85Sdougm 	xmlNodePtr node;
19446185db85Sdougm 
19456185db85Sdougm 	for (node = ((xmlNodePtr)optionset)->next; node != NULL;
19466185db85Sdougm 		node = node->next) {
19476185db85Sdougm 		if (xmlStrcmp(node->name, (xmlChar *)"optionset") == 0) {
19486185db85Sdougm 			break;
19496185db85Sdougm 		}
19506185db85Sdougm 	}
19516185db85Sdougm 	return ((sa_optionset_t)node);
19526185db85Sdougm }
19536185db85Sdougm 
19546185db85Sdougm /*
19556185db85Sdougm  * sa_get_security(group, sectype, proto)
19566185db85Sdougm  *
19576185db85Sdougm  * Return the security optionset. The internal name is a hold over
19586185db85Sdougm  * from the implementation and will be changed before the API is
19596185db85Sdougm  * finalized. This is really a named optionset that can be negotiated
19606185db85Sdougm  * as a group of properties (like NFS security options).
19616185db85Sdougm  */
19626185db85Sdougm 
19636185db85Sdougm sa_security_t
19646185db85Sdougm sa_get_security(sa_group_t group, char *sectype, char *proto)
19656185db85Sdougm {
19666185db85Sdougm 	xmlNodePtr node;
19676185db85Sdougm 	xmlChar *value = NULL;
19686185db85Sdougm 
19696185db85Sdougm 	for (node = ((xmlNodePtr)group)->children; node != NULL;
19706185db85Sdougm 		node = node->next) {
19716185db85Sdougm 	    if (xmlStrcmp(node->name, (xmlChar *)"security") == 0) {
19726185db85Sdougm 		if (proto != NULL) {
19736185db85Sdougm 		    value = xmlGetProp(node, (xmlChar *)"type");
19746185db85Sdougm 		    if (value == NULL ||
19756185db85Sdougm 			(value != NULL &&
19766185db85Sdougm 			xmlStrcmp(value, (xmlChar *)proto) != 0)) {
19776185db85Sdougm 			/* it doesn't match so continue */
19786185db85Sdougm 			xmlFree(value);
19796185db85Sdougm 			value = NULL;
19806185db85Sdougm 			continue;
19816185db85Sdougm 		    }
19826185db85Sdougm 		}
19836185db85Sdougm 		if (value != NULL) {
19846185db85Sdougm 		    xmlFree(value);
19856185db85Sdougm 		    value = NULL;
19866185db85Sdougm 		}
19876185db85Sdougm 		/* potential match */
19886185db85Sdougm 		if (sectype != NULL) {
19896185db85Sdougm 		    value = xmlGetProp(node, (xmlChar *)"sectype");
19906185db85Sdougm 		    if (value != NULL &&
19916185db85Sdougm 			xmlStrcmp(value, (xmlChar *)sectype) == 0) {
19926185db85Sdougm 			break;
19936185db85Sdougm 		    }
19946185db85Sdougm 		} else {
19956185db85Sdougm 		    break;
19966185db85Sdougm 		}
19976185db85Sdougm 	    }
19986185db85Sdougm 	    if (value != NULL) {
19996185db85Sdougm 		xmlFree(value);
20006185db85Sdougm 		value = NULL;
20016185db85Sdougm 	    }
20026185db85Sdougm 	}
20036185db85Sdougm 	if (value != NULL)
20046185db85Sdougm 	    xmlFree(value);
20056185db85Sdougm 	return ((sa_security_t)node);
20066185db85Sdougm }
20076185db85Sdougm 
20086185db85Sdougm /*
20096185db85Sdougm  * sa_get_next_security(security)
20106185db85Sdougm  *
20116185db85Sdougm  * Get the next security optionset if one exists.
20126185db85Sdougm  */
20136185db85Sdougm 
20146185db85Sdougm sa_security_t
20156185db85Sdougm sa_get_next_security(sa_security_t security)
20166185db85Sdougm {
20176185db85Sdougm 	xmlNodePtr node;
20186185db85Sdougm 
20196185db85Sdougm 	for (node = ((xmlNodePtr)security)->next; node != NULL;
20206185db85Sdougm 		node = node->next) {
20216185db85Sdougm 		if (xmlStrcmp(node->name, (xmlChar *)"security") == 0) {
20226185db85Sdougm 			break;
20236185db85Sdougm 		}
20246185db85Sdougm 	}
20256185db85Sdougm 	return ((sa_security_t)node);
20266185db85Sdougm }
20276185db85Sdougm 
20286185db85Sdougm /*
20296185db85Sdougm  * sa_get_property(optionset, prop)
20306185db85Sdougm  *
20316185db85Sdougm  * Get the property object with the name specified in prop from the
20326185db85Sdougm  * optionset.
20336185db85Sdougm  */
20346185db85Sdougm 
20356185db85Sdougm sa_property_t
20366185db85Sdougm sa_get_property(sa_optionset_t optionset, char *prop)
20376185db85Sdougm {
20386185db85Sdougm 	xmlNodePtr node = (xmlNodePtr)optionset;
20396185db85Sdougm 	xmlChar *value = NULL;
20406185db85Sdougm 
20416185db85Sdougm 	if (optionset == NULL)
20426185db85Sdougm 	    return (NULL);
20436185db85Sdougm 
20446185db85Sdougm 	for (node = node->children; node != NULL;
20456185db85Sdougm 		node = node->next) {
20466185db85Sdougm 	    if (xmlStrcmp(node->name, (xmlChar *)"option") == 0) {
20476185db85Sdougm 		if (prop == NULL)
20486185db85Sdougm 		    break;
20496185db85Sdougm 		value = xmlGetProp(node, (xmlChar *)"type");
20506185db85Sdougm 		if (value != NULL && xmlStrcmp(value, (xmlChar *)prop) == 0) {
20516185db85Sdougm 		    break;
20526185db85Sdougm 		}
20536185db85Sdougm 		if (value != NULL) {
20546185db85Sdougm 		    xmlFree(value);
20556185db85Sdougm 		    value = NULL;
20566185db85Sdougm 		}
20576185db85Sdougm 	    }
20586185db85Sdougm 	}
20596185db85Sdougm 	if (value != NULL)
20606185db85Sdougm 		xmlFree(value);
20616185db85Sdougm 	if (node != NULL && xmlStrcmp(node->name, (xmlChar *)"option") != 0) {
20626185db85Sdougm 	    /* avoid a non option node -- it is possible to be a text node */
20636185db85Sdougm 	    node = NULL;
20646185db85Sdougm 	}
20656185db85Sdougm 	return ((sa_property_t)node);
20666185db85Sdougm }
20676185db85Sdougm 
20686185db85Sdougm /*
20696185db85Sdougm  * sa_get_next_property(property)
20706185db85Sdougm  *
20716185db85Sdougm  * Get the next property following the specified property. NULL if
20726185db85Sdougm  * this was the last.
20736185db85Sdougm  */
20746185db85Sdougm 
20756185db85Sdougm sa_property_t
20766185db85Sdougm sa_get_next_property(sa_property_t property)
20776185db85Sdougm {
20786185db85Sdougm 	xmlNodePtr node;
20796185db85Sdougm 
20806185db85Sdougm 	for (node = ((xmlNodePtr)property)->next; node != NULL;
20816185db85Sdougm 		node = node->next) {
20826185db85Sdougm 		if (xmlStrcmp(node->name, (xmlChar *)"option") == 0) {
20836185db85Sdougm 			break;
20846185db85Sdougm 		}
20856185db85Sdougm 	}
20866185db85Sdougm 	return ((sa_property_t)node);
20876185db85Sdougm }
20886185db85Sdougm 
20896185db85Sdougm /*
20906185db85Sdougm  * sa_set_share_description(share, content)
20916185db85Sdougm  *
20926185db85Sdougm  * Set the description of share to content.
20936185db85Sdougm  */
20946185db85Sdougm 
20956185db85Sdougm int
20966185db85Sdougm sa_set_share_description(sa_share_t share, char *content)
20976185db85Sdougm {
20986185db85Sdougm 	xmlNodePtr node;
20996185db85Sdougm 	sa_group_t group;
21006185db85Sdougm 	int ret = SA_OK;
21016185db85Sdougm 
21026185db85Sdougm 	for (node = ((xmlNodePtr)share)->children; node != NULL;
21036185db85Sdougm 		node = node->next) {
21046185db85Sdougm 		if (xmlStrcmp(node->name, (xmlChar *)"description") == 0) {
21056185db85Sdougm 			break;
21066185db85Sdougm 		}
21076185db85Sdougm 	}
21086185db85Sdougm 	group = sa_get_parent_group(share);
21096185db85Sdougm 	/* no existing description but want to add */
21106185db85Sdougm 	if (node == NULL && content != NULL) {
21116185db85Sdougm 		/* add a description */
21126185db85Sdougm 	    node = _sa_set_share_description(share, content);
21136185db85Sdougm 	} else if (node != NULL && content != NULL) {
21146185db85Sdougm 		/* update a description */
21156185db85Sdougm 		xmlNodeSetContent(node, (xmlChar *)content);
21166185db85Sdougm 	} else if (node != NULL && content == NULL) {
21176185db85Sdougm 		/* remove an existing description */
21186185db85Sdougm 		xmlUnlinkNode(node);
21196185db85Sdougm 		xmlFreeNode(node);
21206185db85Sdougm 	}
2121549ec3ffSdougm 	if (group != NULL && is_persistent((sa_group_t)share)) {
2122549ec3ffSdougm 	    sa_handle_impl_t impl_handle;
2123549ec3ffSdougm 	    impl_handle = (sa_handle_impl_t)sa_find_group_handle(group);
2124549ec3ffSdougm 	    if (impl_handle != NULL)
2125549ec3ffSdougm 		ret = sa_commit_share(impl_handle->scfhandle, group, share);
2126549ec3ffSdougm 	    else
2127549ec3ffSdougm 		ret = SA_SYSTEM_ERR;
2128549ec3ffSdougm 	}
21296185db85Sdougm 	return (ret);
21306185db85Sdougm }
21316185db85Sdougm 
21326185db85Sdougm /*
21336185db85Sdougm  * fixproblemchars(string)
21346185db85Sdougm  *
21356185db85Sdougm  * don't want any newline or tab characters in the text since these
21366185db85Sdougm  * could break display of data and legacy file formats.
21376185db85Sdougm  */
21386185db85Sdougm static void
21396185db85Sdougm fixproblemchars(char *str)
21406185db85Sdougm {
21416185db85Sdougm 	int c;
21426185db85Sdougm 	for (c = *str; c != '\0'; c = *++str) {
21436185db85Sdougm 	    if (c == '\t' || c == '\n')
21446185db85Sdougm 		*str = ' ';
21456185db85Sdougm 	    else if (c == '"')
21466185db85Sdougm 		*str = '\'';
21476185db85Sdougm 	}
21486185db85Sdougm }
21496185db85Sdougm 
21506185db85Sdougm /*
21516185db85Sdougm  * sa_get_share_description(share)
21526185db85Sdougm  *
21536185db85Sdougm  * Return the description text for the specified share if it
21546185db85Sdougm  * exists. NULL if no description exists.
21556185db85Sdougm  */
21566185db85Sdougm 
21576185db85Sdougm char *
21586185db85Sdougm sa_get_share_description(sa_share_t share)
21596185db85Sdougm {
21606185db85Sdougm 	xmlChar *description = NULL;
21616185db85Sdougm 	xmlNodePtr node;
21626185db85Sdougm 
21636185db85Sdougm 	for (node = ((xmlNodePtr)share)->children; node != NULL;
21646185db85Sdougm 		node = node->next) {
21656185db85Sdougm 	    if (xmlStrcmp(node->name, (xmlChar *)"description") == 0) {
21666185db85Sdougm 		break;
21676185db85Sdougm 	    }
21686185db85Sdougm 	}
21696185db85Sdougm 	if (node != NULL) {
21706185db85Sdougm 	    description = xmlNodeGetContent((xmlNodePtr)share);
21716185db85Sdougm 	    fixproblemchars((char *)description);
21726185db85Sdougm 	}
21736185db85Sdougm 	return ((char *)description);
21746185db85Sdougm }
21756185db85Sdougm 
21766185db85Sdougm /*
21776185db85Sdougm  * sa_free(share_description(description)
21786185db85Sdougm  *
21796185db85Sdougm  * Free the description string.
21806185db85Sdougm  */
21816185db85Sdougm 
21826185db85Sdougm void
21836185db85Sdougm sa_free_share_description(char *description)
21846185db85Sdougm {
21856185db85Sdougm 	xmlFree((xmlChar *)description);
21866185db85Sdougm }
21876185db85Sdougm 
21886185db85Sdougm /*
21896185db85Sdougm  * sa_create_optionset(group, proto)
21906185db85Sdougm  *
21916185db85Sdougm  * Create an optionset for the specified protocol in the specied
21926185db85Sdougm  * group. This is manifested as a property group within SMF.
21936185db85Sdougm  */
21946185db85Sdougm 
21956185db85Sdougm sa_optionset_t
21966185db85Sdougm sa_create_optionset(sa_group_t group, char *proto)
21976185db85Sdougm {
21986185db85Sdougm 	sa_optionset_t optionset;
21996185db85Sdougm 	sa_group_t parent = group;
22006185db85Sdougm 
22016185db85Sdougm 	optionset = sa_get_optionset(group, proto);
22026185db85Sdougm 	if (optionset != NULL) {
22036185db85Sdougm 		/* can't have a duplicate protocol */
22046185db85Sdougm 	    optionset = NULL;
22056185db85Sdougm 	} else {
22066185db85Sdougm 	    optionset = (sa_optionset_t)xmlNewChild((xmlNodePtr)group,
22076185db85Sdougm 						    NULL,
22086185db85Sdougm 						    (xmlChar *)"optionset",
22096185db85Sdougm 						    NULL);
22106185db85Sdougm 		/*
22116185db85Sdougm 		 * only put to repository if on a group and we were
22126185db85Sdougm 		 * able to create an optionset.
22136185db85Sdougm 		 */
22146185db85Sdougm 	    if (optionset != NULL) {
22156185db85Sdougm 		char oname[256];
22166185db85Sdougm 		char *groupname;
22176185db85Sdougm 		char *id = NULL;
22186185db85Sdougm 
22196185db85Sdougm 		if (sa_is_share(group))
22206185db85Sdougm 		    parent = sa_get_parent_group((sa_share_t)group);
22216185db85Sdougm 
22226185db85Sdougm 		sa_set_optionset_attr(optionset, "type", proto);
22236185db85Sdougm 
22246185db85Sdougm 		if (sa_is_share(group)) {
22256185db85Sdougm 			id = sa_get_share_attr((sa_share_t)group, "id");
22266185db85Sdougm 		}
22276185db85Sdougm 		(void) sa_optionset_name(optionset, oname,
22286185db85Sdougm 					sizeof (oname), id);
22296185db85Sdougm 		groupname = sa_get_group_attr(parent, "name");
22306185db85Sdougm 		if (groupname != NULL && is_persistent(group)) {
2231549ec3ffSdougm 		    sa_handle_impl_t impl_handle;
2232549ec3ffSdougm 		    impl_handle = (sa_handle_impl_t)sa_find_group_handle(group);
2233549ec3ffSdougm 		    assert(impl_handle != NULL);
2234549ec3ffSdougm 		    if (impl_handle != NULL) {
2235549ec3ffSdougm 			(void) sa_get_instance(impl_handle->scfhandle,
2236549ec3ffSdougm 						groupname);
2237549ec3ffSdougm 			(void) sa_create_pgroup(impl_handle->scfhandle, oname);
22386185db85Sdougm 		    }
2239549ec3ffSdougm 		}
2240549ec3ffSdougm 		if (groupname != NULL)
2241549ec3ffSdougm 		    sa_free_attr_string(groupname);
22426185db85Sdougm 		if (id != NULL)
22436185db85Sdougm 		    sa_free_attr_string(id);
22446185db85Sdougm 	    }
22456185db85Sdougm 	}
22466185db85Sdougm 	return (optionset);
22476185db85Sdougm }
22486185db85Sdougm 
22496185db85Sdougm /*
22506185db85Sdougm  * sa_get_property_parent(property)
22516185db85Sdougm  *
22526185db85Sdougm  * Given a property, return the object it is a property of. This will
22536185db85Sdougm  * be an optionset of some type.
22546185db85Sdougm  */
22556185db85Sdougm 
22566185db85Sdougm static sa_optionset_t
22576185db85Sdougm sa_get_property_parent(sa_property_t property)
22586185db85Sdougm {
22596185db85Sdougm 	xmlNodePtr node = NULL;
22606185db85Sdougm 
22616185db85Sdougm 	if (property != NULL) {
22626185db85Sdougm 	    node = ((xmlNodePtr)property)->parent;
22636185db85Sdougm 	}
22646185db85Sdougm 	return ((sa_optionset_t)node);
22656185db85Sdougm }
22666185db85Sdougm 
22676185db85Sdougm /*
22686185db85Sdougm  * sa_get_optionset_parent(optionset)
22696185db85Sdougm  *
22706185db85Sdougm  * Return the parent of the specified optionset. This could be a group
22716185db85Sdougm  * or a share.
22726185db85Sdougm  */
22736185db85Sdougm 
22746185db85Sdougm static sa_group_t
22756185db85Sdougm sa_get_optionset_parent(sa_optionset_t optionset)
22766185db85Sdougm {
22776185db85Sdougm 	xmlNodePtr node = NULL;
22786185db85Sdougm 
22796185db85Sdougm 	if (optionset != NULL) {
22806185db85Sdougm 	    node = ((xmlNodePtr)optionset)->parent;
22816185db85Sdougm 	}
22826185db85Sdougm 	return ((sa_group_t)node);
22836185db85Sdougm }
22846185db85Sdougm 
22856185db85Sdougm /*
22866185db85Sdougm  * zfs_needs_update(share)
22876185db85Sdougm  *
22886185db85Sdougm  * In order to avoid making multiple updates to a ZFS share when
22896185db85Sdougm  * setting properties, the share attribute "changed" will be set to
22906185db85Sdougm  * true when a property is added or modifed.  When done adding
22916185db85Sdougm  * properties, we can then detect that an update is needed.  We then
22926185db85Sdougm  * clear the state here to detect additional changes.
22936185db85Sdougm  */
22946185db85Sdougm 
22956185db85Sdougm static int
22966185db85Sdougm zfs_needs_update(sa_share_t share)
22976185db85Sdougm {
22986185db85Sdougm 	char *attr;
22996185db85Sdougm 	int result = 0;
23006185db85Sdougm 
23016185db85Sdougm 	attr = sa_get_share_attr(share, "changed");
23026185db85Sdougm 	if (attr != NULL) {
23036185db85Sdougm 	    sa_free_attr_string(attr);
23046185db85Sdougm 		result = 1;
23056185db85Sdougm 	}
23066185db85Sdougm 	set_node_attr((void *)share, "changed", NULL);
23076185db85Sdougm 	return (result);
23086185db85Sdougm }
23096185db85Sdougm 
23106185db85Sdougm /*
23116185db85Sdougm  * zfs_set_update(share)
23126185db85Sdougm  *
23136185db85Sdougm  * Set the changed attribute of the share to true.
23146185db85Sdougm  */
23156185db85Sdougm 
23166185db85Sdougm static void
23176185db85Sdougm zfs_set_update(sa_share_t share)
23186185db85Sdougm {
23196185db85Sdougm 	set_node_attr((void *)share, "changed", "true");
23206185db85Sdougm }
23216185db85Sdougm 
23226185db85Sdougm /*
23236185db85Sdougm  * sa_commit_properties(optionset, clear)
23246185db85Sdougm  *
23256185db85Sdougm  * Check if SMF or ZFS config and either update or abort the pending
23266185db85Sdougm  * changes.
23276185db85Sdougm  */
23286185db85Sdougm 
23296185db85Sdougm int
23306185db85Sdougm sa_commit_properties(sa_optionset_t optionset, int clear)
23316185db85Sdougm {
23326185db85Sdougm 	sa_group_t group;
23336185db85Sdougm 	sa_group_t parent;
23346185db85Sdougm 	int zfs = 0;
23356185db85Sdougm 	int needsupdate = 0;
23366185db85Sdougm 	int ret = SA_OK;
2337549ec3ffSdougm 	sa_handle_impl_t impl_handle;
23386185db85Sdougm 
23396185db85Sdougm 	group = sa_get_optionset_parent(optionset);
23406185db85Sdougm 	if (group != NULL && (sa_is_share(group) || is_zfs_group(group))) {
23416185db85Sdougm 	    /* only update ZFS if on a share */
23426185db85Sdougm 	    parent = sa_get_parent_group(group);
23436185db85Sdougm 	    zfs++;
23446185db85Sdougm 	    if (parent != NULL && is_zfs_group(parent)) {
23456185db85Sdougm 		needsupdate = zfs_needs_update(group);
23466185db85Sdougm 	    } else {
23476185db85Sdougm 		zfs = 0;
23486185db85Sdougm 	    }
23496185db85Sdougm 	}
23506185db85Sdougm 	if (zfs) {
23516185db85Sdougm 	    if (!clear && needsupdate)
23526185db85Sdougm 		ret = sa_zfs_update((sa_share_t)group);
23536185db85Sdougm 	} else {
2354549ec3ffSdougm 	    impl_handle = (sa_handle_impl_t)sa_find_group_handle(group);
2355549ec3ffSdougm 	    if (impl_handle != NULL) {
23566185db85Sdougm 		if (clear)
2357549ec3ffSdougm 		    (void) sa_abort_transaction(impl_handle->scfhandle);
23586185db85Sdougm 		else
2359549ec3ffSdougm 		    ret = sa_end_transaction(impl_handle->scfhandle);
2360549ec3ffSdougm 	    } else {
2361549ec3ffSdougm 		ret = SA_SYSTEM_ERR;
2362549ec3ffSdougm 	    }
23636185db85Sdougm 	}
23646185db85Sdougm 	return (ret);
23656185db85Sdougm }
23666185db85Sdougm 
23676185db85Sdougm /*
23686185db85Sdougm  * sa_destroy_optionset(optionset)
23696185db85Sdougm  *
23706185db85Sdougm  * Remove the optionset from its group. Update the repostory to
23716185db85Sdougm  * reflect this change.
23726185db85Sdougm  */
23736185db85Sdougm 
23746185db85Sdougm int
23756185db85Sdougm sa_destroy_optionset(sa_optionset_t optionset)
23766185db85Sdougm {
23776185db85Sdougm 	char name[256];
23786185db85Sdougm 	int len;
23796185db85Sdougm 	int ret;
23806185db85Sdougm 	char *id = NULL;
23816185db85Sdougm 	sa_group_t group;
23826185db85Sdougm 	int ispersist = 1;
23836185db85Sdougm 
23846185db85Sdougm 	/* now delete the prop group */
23856185db85Sdougm 	group = sa_get_optionset_parent(optionset);
23866185db85Sdougm 	if (group != NULL && sa_is_share(group)) {
23876185db85Sdougm 	    ispersist = is_persistent(group);
23886185db85Sdougm 	    id = sa_get_share_attr((sa_share_t)group, "id");
23896185db85Sdougm 	}
23906185db85Sdougm 	if (ispersist) {
2391549ec3ffSdougm 	    sa_handle_impl_t impl_handle;
23926185db85Sdougm 	    len = sa_optionset_name(optionset, name, sizeof (name), id);
2393549ec3ffSdougm 	    impl_handle = (sa_handle_impl_t)sa_find_group_handle(group);
2394549ec3ffSdougm 	    if (impl_handle != NULL) {
23956185db85Sdougm 		if (len > 0) {
2396549ec3ffSdougm 		    ret = sa_delete_pgroup(impl_handle->scfhandle, name);
2397549ec3ffSdougm 		}
2398549ec3ffSdougm 	    } else {
2399549ec3ffSdougm 		ret = SA_SYSTEM_ERR;
24006185db85Sdougm 	    }
24016185db85Sdougm 	}
24026185db85Sdougm 	xmlUnlinkNode((xmlNodePtr)optionset);
24036185db85Sdougm 	xmlFreeNode((xmlNodePtr)optionset);
24046185db85Sdougm 	if (id != NULL)
24056185db85Sdougm 	    sa_free_attr_string(id);
24066185db85Sdougm 	return (ret);
24076185db85Sdougm }
24086185db85Sdougm 
24096185db85Sdougm /* private to the implementation */
24106185db85Sdougm int
24116185db85Sdougm _sa_remove_optionset(sa_optionset_t optionset)
24126185db85Sdougm {
24136185db85Sdougm 	int ret = SA_OK;
24146185db85Sdougm 
24156185db85Sdougm 	xmlUnlinkNode((xmlNodePtr)optionset);
24166185db85Sdougm 	xmlFreeNode((xmlNodePtr)optionset);
24176185db85Sdougm 	return (ret);
24186185db85Sdougm }
24196185db85Sdougm 
24206185db85Sdougm /*
24216185db85Sdougm  * sa_create_security(group, sectype, proto)
24226185db85Sdougm  *
24236185db85Sdougm  * Create a security optionset (one that has a type name and a
24246185db85Sdougm  * proto). Security is left over from a pure NFS implementation. The
24256185db85Sdougm  * naming will change in the future when the API is released.
24266185db85Sdougm  */
24276185db85Sdougm sa_security_t
24286185db85Sdougm sa_create_security(sa_group_t group, char *sectype, char *proto)
24296185db85Sdougm {
24306185db85Sdougm 	sa_security_t security;
24316185db85Sdougm 	char *id = NULL;
24326185db85Sdougm 	sa_group_t parent;
24336185db85Sdougm 	char *groupname = NULL;
24346185db85Sdougm 
24356185db85Sdougm 	if (group != NULL && sa_is_share(group)) {
24366185db85Sdougm 	    id = sa_get_share_attr((sa_share_t)group, "id");
24376185db85Sdougm 	    parent = sa_get_parent_group(group);
24386185db85Sdougm 	    if (parent != NULL)
24396185db85Sdougm 		groupname = sa_get_group_attr(parent, "name");
24406185db85Sdougm 	} else if (group != NULL) {
24416185db85Sdougm 	    groupname = sa_get_group_attr(group, "name");
24426185db85Sdougm 	}
24436185db85Sdougm 
24446185db85Sdougm 	security = sa_get_security(group, sectype, proto);
24456185db85Sdougm 	if (security != NULL) {
24466185db85Sdougm 		/* can't have a duplicate security option */
24476185db85Sdougm 		security = NULL;
24486185db85Sdougm 	} else {
24496185db85Sdougm 		security = (sa_security_t)xmlNewChild((xmlNodePtr)group,
24506185db85Sdougm 							NULL,
24516185db85Sdougm 							(xmlChar *)"security",
24526185db85Sdougm 							NULL);
24536185db85Sdougm 		if (security != NULL) {
24546185db85Sdougm 			char oname[256];
24556185db85Sdougm 			sa_set_security_attr(security, "type", proto);
24566185db85Sdougm 
24576185db85Sdougm 			sa_set_security_attr(security, "sectype", sectype);
24586185db85Sdougm 			(void) sa_security_name(security, oname,
24596185db85Sdougm 						sizeof (oname), id);
24606185db85Sdougm 			if (groupname != NULL && is_persistent(group)) {
2461549ec3ffSdougm 			    sa_handle_impl_t impl_handle;
2462549ec3ffSdougm 			    impl_handle =
2463549ec3ffSdougm 				(sa_handle_impl_t)sa_find_group_handle(group);
2464549ec3ffSdougm 			    if (impl_handle != NULL) {
2465549ec3ffSdougm 				(void) sa_get_instance(impl_handle->scfhandle,
2466549ec3ffSdougm 							groupname);
2467549ec3ffSdougm 				(void) sa_create_pgroup(impl_handle->scfhandle,
2468549ec3ffSdougm 							oname);
2469549ec3ffSdougm 			    }
24706185db85Sdougm 			}
24716185db85Sdougm 		}
24726185db85Sdougm 	}
24736185db85Sdougm 	if (groupname != NULL)
24746185db85Sdougm 	    sa_free_attr_string(groupname);
24756185db85Sdougm 	return (security);
24766185db85Sdougm }
24776185db85Sdougm 
24786185db85Sdougm /*
24796185db85Sdougm  * sa_destroy_security(security)
24806185db85Sdougm  *
24816185db85Sdougm  * Remove the specified optionset from the document and the
24826185db85Sdougm  * configuration.
24836185db85Sdougm  */
24846185db85Sdougm 
24856185db85Sdougm int
24866185db85Sdougm sa_destroy_security(sa_security_t security)
24876185db85Sdougm {
24886185db85Sdougm 	char name[256];
24896185db85Sdougm 	int len;
24906185db85Sdougm 	int ret = SA_OK;
24916185db85Sdougm 	char *id = NULL;
24926185db85Sdougm 	sa_group_t group;
24936185db85Sdougm 	int iszfs = 0;
24946185db85Sdougm 	int ispersist = 1;
24956185db85Sdougm 
24966185db85Sdougm 	group = sa_get_optionset_parent(security);
24976185db85Sdougm 
24986185db85Sdougm 	if (group != NULL)
24996185db85Sdougm 	    iszfs = sa_group_is_zfs(group);
25006185db85Sdougm 
25016185db85Sdougm 	if (group != NULL && !iszfs) {
25026185db85Sdougm 	    if (sa_is_share(group))
25036185db85Sdougm 		ispersist = is_persistent(group);
25046185db85Sdougm 	    id = sa_get_share_attr((sa_share_t)group, "id");
25056185db85Sdougm 	}
25066185db85Sdougm 	if (ispersist) {
25076185db85Sdougm 	    len = sa_security_name(security, name, sizeof (name), id);
25086185db85Sdougm 	    if (!iszfs && len > 0) {
2509549ec3ffSdougm 		sa_handle_impl_t impl_handle;
2510549ec3ffSdougm 		impl_handle = (sa_handle_impl_t)sa_find_group_handle(group);
2511549ec3ffSdougm 		if (impl_handle != NULL) {
2512549ec3ffSdougm 		    ret = sa_delete_pgroup(impl_handle->scfhandle, name);
2513549ec3ffSdougm 		} else {
2514549ec3ffSdougm 		    ret = SA_SYSTEM_ERR;
2515549ec3ffSdougm 		}
25166185db85Sdougm 	    }
25176185db85Sdougm 	}
25186185db85Sdougm 	xmlUnlinkNode((xmlNodePtr)security);
25196185db85Sdougm 	xmlFreeNode((xmlNodePtr)security);
25206185db85Sdougm 	if (iszfs) {
25216185db85Sdougm 	    ret = sa_zfs_update(group);
25226185db85Sdougm 	}
25236185db85Sdougm 	if (id != NULL)
25246185db85Sdougm 	    sa_free_attr_string(id);
25256185db85Sdougm 	return (ret);
25266185db85Sdougm }
25276185db85Sdougm 
25286185db85Sdougm /*
25296185db85Sdougm  * sa_get_security_attr(optionset, tag)
25306185db85Sdougm  *
25316185db85Sdougm  * Return the specified attribute value from the optionset.
25326185db85Sdougm  */
25336185db85Sdougm 
25346185db85Sdougm char *
25356185db85Sdougm sa_get_security_attr(sa_property_t optionset, char *tag)
25366185db85Sdougm {
25376185db85Sdougm 	return (get_node_attr((void *)optionset, tag));
25386185db85Sdougm 
25396185db85Sdougm }
25406185db85Sdougm 
25416185db85Sdougm /*
25426185db85Sdougm  * sa_set_security_attr(optionset, tag, value)
25436185db85Sdougm  *
25446185db85Sdougm  * Set the optioset attribute specied by tag to the specified value.
25456185db85Sdougm  */
25466185db85Sdougm 
25476185db85Sdougm void
25486185db85Sdougm sa_set_security_attr(sa_group_t optionset, char *tag, char *value)
25496185db85Sdougm {
25506185db85Sdougm 	set_node_attr((void *)optionset, tag, value);
25516185db85Sdougm }
25526185db85Sdougm 
25536185db85Sdougm /*
25546185db85Sdougm  * is_nodetype(node, type)
25556185db85Sdougm  *
25566185db85Sdougm  * Check to see if node is of the type specified.
25576185db85Sdougm  */
25586185db85Sdougm 
25596185db85Sdougm static int
25606185db85Sdougm is_nodetype(void *node, char *type)
25616185db85Sdougm {
25626185db85Sdougm 	return (strcmp((char *)((xmlNodePtr)node)->name, type) == 0);
25636185db85Sdougm }
25646185db85Sdougm 
25656185db85Sdougm /*
25666185db85Sdougm  * sa_set_prop_by_prop(optionset, group, prop, type)
25676185db85Sdougm  *
25686185db85Sdougm  * Add/remove/update the specified property prop into the optionset or
25696185db85Sdougm  * share. If a share, sort out which property group based on GUID. In
25706185db85Sdougm  * all cases, the appropriate transaction is set (or ZFS share is
25716185db85Sdougm  * marked as needing an update)
25726185db85Sdougm  */
25736185db85Sdougm 
25746185db85Sdougm #define	SA_PROP_OP_REMOVE	1
25756185db85Sdougm #define	SA_PROP_OP_ADD		2
25766185db85Sdougm #define	SA_PROP_OP_UPDATE	3
25776185db85Sdougm static int
25786185db85Sdougm sa_set_prop_by_prop(sa_optionset_t optionset, sa_group_t group,
25796185db85Sdougm 			sa_property_t prop, int type)
25806185db85Sdougm {
25816185db85Sdougm 	char *name;
25826185db85Sdougm 	char *valstr;
25836185db85Sdougm 	int ret = SA_OK;
25846185db85Sdougm 	scf_transaction_entry_t *entry;
25856185db85Sdougm 	scf_value_t *value;
25866185db85Sdougm 	int opttype; /* 1 == optionset, 0 == security */
25876185db85Sdougm 	char *id = NULL;
25886185db85Sdougm 	int iszfs = 0;
25896185db85Sdougm 	int isshare = 0;
25906185db85Sdougm 	sa_group_t parent = NULL;
2591549ec3ffSdougm 	sa_handle_impl_t impl_handle;
2592549ec3ffSdougm 	scfutilhandle_t  *scf_handle;
25936185db85Sdougm 
25946185db85Sdougm 	if (!is_persistent(group)) {
25956185db85Sdougm 		/*
25966185db85Sdougm 		 * if the group/share is not persistent we don't need
25976185db85Sdougm 		 * to do anything here
25986185db85Sdougm 		 */
25996185db85Sdougm 	    return (SA_OK);
26006185db85Sdougm 	}
2601549ec3ffSdougm 	impl_handle = (sa_handle_impl_t)sa_find_group_handle(group);
2602549ec3ffSdougm 	if (impl_handle == NULL || impl_handle->scfhandle == NULL) {
2603549ec3ffSdougm 	    return (SA_SYSTEM_ERR);
2604549ec3ffSdougm 	}
2605549ec3ffSdougm 	scf_handle = impl_handle->scfhandle;
26066185db85Sdougm 	name = sa_get_property_attr(prop, "type");
26076185db85Sdougm 	valstr = sa_get_property_attr(prop, "value");
26086185db85Sdougm 	entry = scf_entry_create(scf_handle->handle);
26096185db85Sdougm 	opttype = is_nodetype((void *)optionset, "optionset");
26106185db85Sdougm 
26116185db85Sdougm 	if (valstr != NULL && entry != NULL) {
26126185db85Sdougm 	    if (sa_is_share(group)) {
26136185db85Sdougm 		isshare = 1;
26146185db85Sdougm 		parent = sa_get_parent_group(group);
26156185db85Sdougm 		if (parent != NULL) {
26166185db85Sdougm 		    iszfs = is_zfs_group(parent);
26176185db85Sdougm 		}
26186185db85Sdougm 	    } else {
26196185db85Sdougm 		iszfs = is_zfs_group(group);
26206185db85Sdougm 	    }
26216185db85Sdougm 	    if (!iszfs) {
26226185db85Sdougm 		    if (scf_handle->trans == NULL) {
26236185db85Sdougm 			char oname[256];
26246185db85Sdougm 			char *groupname = NULL;
26256185db85Sdougm 			if (isshare) {
26266185db85Sdougm 			    if (parent != NULL) {
26276185db85Sdougm 				groupname = sa_get_group_attr(parent, "name");
26286185db85Sdougm 			    }
26296185db85Sdougm 			    id = sa_get_share_attr((sa_share_t)group, "id");
26306185db85Sdougm 			} else {
26316185db85Sdougm 			    groupname = sa_get_group_attr(group, "name");
26326185db85Sdougm 			}
26336185db85Sdougm 			if (groupname != NULL) {
26346185db85Sdougm 			    ret = sa_get_instance(scf_handle, groupname);
26356185db85Sdougm 			    sa_free_attr_string(groupname);
26366185db85Sdougm 			}
26376185db85Sdougm 			if (opttype)
26386185db85Sdougm 			    (void) sa_optionset_name(optionset, oname,
26396185db85Sdougm 							sizeof (oname), id);
26406185db85Sdougm 			else
26416185db85Sdougm 			    (void) sa_security_name(optionset, oname,
26426185db85Sdougm 							sizeof (oname), id);
26436185db85Sdougm 			ret = sa_start_transaction(scf_handle, oname);
26446185db85Sdougm 		    }
26456185db85Sdougm 		    if (ret == SA_OK) {
26466185db85Sdougm 			switch (type) {
26476185db85Sdougm 			case SA_PROP_OP_REMOVE:
2648549ec3ffSdougm 			    ret = scf_transaction_property_delete(
2649549ec3ffSdougm 							scf_handle->trans,
2650549ec3ffSdougm 							entry, name);
26516185db85Sdougm 			    break;
26526185db85Sdougm 			case SA_PROP_OP_ADD:
26536185db85Sdougm 			case SA_PROP_OP_UPDATE:
26546185db85Sdougm 			    value = scf_value_create(scf_handle->handle);
26556185db85Sdougm 			    if (value != NULL) {
26566185db85Sdougm 				if (type == SA_PROP_OP_ADD)
26576185db85Sdougm 				    ret = scf_transaction_property_new(
26586185db85Sdougm 							scf_handle->trans,
26596185db85Sdougm 							entry,
26606185db85Sdougm 							name,
26616185db85Sdougm 							SCF_TYPE_ASTRING);
26626185db85Sdougm 				else
26636185db85Sdougm 				    ret = scf_transaction_property_change(
26646185db85Sdougm 							scf_handle->trans,
26656185db85Sdougm 							entry,
26666185db85Sdougm 							name,
26676185db85Sdougm 							SCF_TYPE_ASTRING);
26686185db85Sdougm 				if (ret == 0) {
26696185db85Sdougm 				    ret = scf_value_set_astring(value, valstr);
26706185db85Sdougm 				    if (ret == 0)
26716185db85Sdougm 					ret = scf_entry_add_value(entry, value);
26726185db85Sdougm 				    if (ret != 0) {
26736185db85Sdougm 					scf_value_destroy(value);
26746185db85Sdougm 					ret = SA_SYSTEM_ERR;
26756185db85Sdougm 				    }
26766185db85Sdougm 				} else {
26776185db85Sdougm 				    scf_entry_destroy(entry);
26786185db85Sdougm 				    ret = SA_SYSTEM_ERR;
26796185db85Sdougm 				}
26806185db85Sdougm 				break;
26816185db85Sdougm 			    }
26826185db85Sdougm 			}
26836185db85Sdougm 		    }
26846185db85Sdougm 	    } else {
26856185db85Sdougm 		/*
26866185db85Sdougm 		 * ZFS update. The calling function would have updated
26876185db85Sdougm 		 * the internal XML structure. Just need to flag it as
26886185db85Sdougm 		 * changed for ZFS.
26896185db85Sdougm 		 */
26906185db85Sdougm 		zfs_set_update((sa_share_t)group);
26916185db85Sdougm 	    }
26926185db85Sdougm 	}
26936185db85Sdougm 
26946185db85Sdougm 	if (name != NULL)
26956185db85Sdougm 	    sa_free_attr_string(name);
26966185db85Sdougm 	if (valstr != NULL)
26976185db85Sdougm 	    sa_free_attr_string(valstr);
26986185db85Sdougm 	else if (entry != NULL)
26996185db85Sdougm 	    scf_entry_destroy(entry);
27006185db85Sdougm 
27016185db85Sdougm 	if (ret == -1)
27026185db85Sdougm 	    ret = SA_SYSTEM_ERR;
27036185db85Sdougm 
27046185db85Sdougm 	return (ret);
27056185db85Sdougm }
27066185db85Sdougm 
27076185db85Sdougm /*
27086185db85Sdougm  * sa_create_property(name, value)
27096185db85Sdougm  *
27106185db85Sdougm  * Create a new property with the specified name and value.
27116185db85Sdougm  */
27126185db85Sdougm 
27136185db85Sdougm sa_property_t
27146185db85Sdougm sa_create_property(char *name, char *value)
27156185db85Sdougm {
27166185db85Sdougm 	xmlNodePtr node;
27176185db85Sdougm 
27186185db85Sdougm 	node = xmlNewNode(NULL, (xmlChar *)"option");
27196185db85Sdougm 	if (node != NULL) {
27206185db85Sdougm 		xmlSetProp(node, (xmlChar *)"type", (xmlChar *)name);
27216185db85Sdougm 		xmlSetProp(node, (xmlChar *)"value", (xmlChar *)value);
27226185db85Sdougm 	}
27236185db85Sdougm 	return ((sa_property_t)node);
27246185db85Sdougm }
27256185db85Sdougm 
27266185db85Sdougm /*
27276185db85Sdougm  * sa_add_property(object, property)
27286185db85Sdougm  *
27296185db85Sdougm  * Add the specified property to the object. Issue the appropriate
27306185db85Sdougm  * transaction or mark a ZFS object as needing an update.
27316185db85Sdougm  */
27326185db85Sdougm 
27336185db85Sdougm int
27346185db85Sdougm sa_add_property(void *object, sa_property_t property)
27356185db85Sdougm {
27366185db85Sdougm 	int ret = SA_OK;
27376185db85Sdougm 	sa_group_t parent;
27386185db85Sdougm 	sa_group_t group;
27396185db85Sdougm 	char *proto;
27406185db85Sdougm 
27416185db85Sdougm 	proto = sa_get_optionset_attr(object, "type");
27426185db85Sdougm 	if (property != NULL) {
27436185db85Sdougm 	    if ((ret = sa_valid_property(object, proto, property)) == SA_OK) {
27446185db85Sdougm 		property = (sa_property_t)xmlAddChild((xmlNodePtr)object,
27456185db85Sdougm 							(xmlNodePtr)property);
27466185db85Sdougm 	    } else {
27476185db85Sdougm 		if (proto != NULL)
27486185db85Sdougm 		    sa_free_attr_string(proto);
27496185db85Sdougm 		return (ret);
27506185db85Sdougm 	    }
27516185db85Sdougm 	}
27526185db85Sdougm 
27536185db85Sdougm 	if (proto != NULL)
27546185db85Sdougm 	    sa_free_attr_string(proto);
27556185db85Sdougm 
27566185db85Sdougm 	parent = sa_get_parent_group(object);
27576185db85Sdougm 	if (!is_persistent(parent)) {
27586185db85Sdougm 	    return (ret);
27596185db85Sdougm 	}
27606185db85Sdougm 
27616185db85Sdougm 	if (sa_is_share(parent))
27626185db85Sdougm 	    group = sa_get_parent_group(parent);
27636185db85Sdougm 	else
27646185db85Sdougm 	    group = parent;
27656185db85Sdougm 
27666185db85Sdougm 	if (property == NULL)
27676185db85Sdougm 	    ret = SA_NO_MEMORY;
27686185db85Sdougm 	else {
27696185db85Sdougm 	    char oname[256];
27706185db85Sdougm 
27716185db85Sdougm 	    if (!is_zfs_group(group)) {
27726185db85Sdougm 		char *id = NULL;
2773549ec3ffSdougm 		sa_handle_impl_t impl_handle;
2774549ec3ffSdougm 		scfutilhandle_t  *scf_handle;
2775549ec3ffSdougm 
2776549ec3ffSdougm 		impl_handle = (sa_handle_impl_t)sa_find_group_handle(group);
2777549ec3ffSdougm 		if (impl_handle == NULL || impl_handle->scfhandle == NULL)
2778549ec3ffSdougm 		    ret = SA_SYSTEM_ERR;
2779549ec3ffSdougm 		if (ret == SA_OK) {
2780549ec3ffSdougm 		    scf_handle = impl_handle->scfhandle;
27816185db85Sdougm 		    if (sa_is_share((sa_group_t)parent)) {
27826185db85Sdougm 			id = sa_get_share_attr((sa_share_t)parent, "id");
27836185db85Sdougm 		    }
27846185db85Sdougm 		    if (scf_handle->trans == NULL) {
27856185db85Sdougm 			if (is_nodetype(object, "optionset"))
27866185db85Sdougm 			    (void) sa_optionset_name((sa_optionset_t)object,
27876185db85Sdougm 					    oname, sizeof (oname), id);
27886185db85Sdougm 			else
27896185db85Sdougm 			    (void) sa_security_name((sa_optionset_t)object,
27906185db85Sdougm 					    oname, sizeof (oname), id);
27916185db85Sdougm 			ret = sa_start_transaction(scf_handle, oname);
27926185db85Sdougm 		    }
27936185db85Sdougm 		    if (ret == SA_OK) {
27946185db85Sdougm 			char *name;
27956185db85Sdougm 			char *value;
27966185db85Sdougm 			name = sa_get_property_attr(property, "type");
27976185db85Sdougm 			value = sa_get_property_attr(property, "value");
27986185db85Sdougm 			if (name != NULL && value != NULL) {
27996185db85Sdougm 			    if (scf_handle->scf_state == SCH_STATE_INIT)
28006185db85Sdougm 				ret = sa_set_property(scf_handle, name, value);
28016185db85Sdougm 			} else
28026185db85Sdougm 			    ret = SA_CONFIG_ERR;
28036185db85Sdougm 			if (name != NULL)
28046185db85Sdougm 			    sa_free_attr_string(name);
28056185db85Sdougm 			if (value != NULL)
28066185db85Sdougm 			    sa_free_attr_string(value);
28076185db85Sdougm 		    }
28086185db85Sdougm 		    if (id != NULL)
28096185db85Sdougm 			sa_free_attr_string(id);
2810549ec3ffSdougm 		}
28116185db85Sdougm 	    } else {
28126185db85Sdougm 		/*
28136185db85Sdougm 		 * ZFS is a special case. We do want to allow editing
28146185db85Sdougm 		 * property/security lists since we can have a better
28156185db85Sdougm 		 * syntax and we also want to keep things consistent
28166185db85Sdougm 		 * when possible.
28176185db85Sdougm 		 *
28186185db85Sdougm 		 * Right now, we defer until the sa_commit_properties
28196185db85Sdougm 		 * so we can get them all at once. We do need to mark
28206185db85Sdougm 		 * the share as "changed"
28216185db85Sdougm 		 */
28226185db85Sdougm 		zfs_set_update((sa_share_t)parent);
28236185db85Sdougm 	    }
28246185db85Sdougm 	}
28256185db85Sdougm 	return (ret);
28266185db85Sdougm }
28276185db85Sdougm 
28286185db85Sdougm /*
28296185db85Sdougm  * sa_remove_property(property)
28306185db85Sdougm  *
28316185db85Sdougm  * Remove the specied property from its containing object. Update the
28326185db85Sdougm  * repository as appropriate.
28336185db85Sdougm  */
28346185db85Sdougm 
28356185db85Sdougm int
28366185db85Sdougm sa_remove_property(sa_property_t property)
28376185db85Sdougm {
28386185db85Sdougm 	int ret = SA_OK;
28396185db85Sdougm 
28406185db85Sdougm 	if (property != NULL) {
28416185db85Sdougm 		sa_optionset_t optionset;
28426185db85Sdougm 		sa_group_t group;
28436185db85Sdougm 		optionset = sa_get_property_parent(property);
28446185db85Sdougm 		if (optionset != NULL) {
28456185db85Sdougm 		    group = sa_get_optionset_parent(optionset);
28466185db85Sdougm 		    if (group != NULL) {
28476185db85Sdougm 			ret = sa_set_prop_by_prop(optionset, group, property,
28486185db85Sdougm 					    SA_PROP_OP_REMOVE);
28496185db85Sdougm 		    }
28506185db85Sdougm 		}
28516185db85Sdougm 		xmlUnlinkNode((xmlNodePtr)property);
28526185db85Sdougm 		xmlFreeNode((xmlNodePtr)property);
28536185db85Sdougm 	} else {
28546185db85Sdougm 	    ret = SA_NO_SUCH_PROP;
28556185db85Sdougm 	}
28566185db85Sdougm 	return (ret);
28576185db85Sdougm }
28586185db85Sdougm 
28596185db85Sdougm /*
28606185db85Sdougm  * sa_update_property(property, value)
28616185db85Sdougm  *
28626185db85Sdougm  * Update the specified property to the new value.  If value is NULL,
28636185db85Sdougm  * we currently treat this as a remove.
28646185db85Sdougm  */
28656185db85Sdougm 
28666185db85Sdougm int
28676185db85Sdougm sa_update_property(sa_property_t property, char *value)
28686185db85Sdougm {
28696185db85Sdougm 	int ret = SA_OK;
28706185db85Sdougm 	if (value == NULL) {
28716185db85Sdougm 		return (sa_remove_property(property));
28726185db85Sdougm 	} else {
28736185db85Sdougm 		sa_optionset_t optionset;
28746185db85Sdougm 		sa_group_t group;
28756185db85Sdougm 		set_node_attr((void *)property, "value", value);
28766185db85Sdougm 		optionset = sa_get_property_parent(property);
28776185db85Sdougm 		if (optionset != NULL) {
28786185db85Sdougm 		    group = sa_get_optionset_parent(optionset);
28796185db85Sdougm 		    if (group != NULL) {
28806185db85Sdougm 			ret = sa_set_prop_by_prop(optionset, group, property,
28816185db85Sdougm 					    SA_PROP_OP_UPDATE);
28826185db85Sdougm 		    }
28836185db85Sdougm 		} else {
28846185db85Sdougm 		    ret = SA_NO_SUCH_PROP;
28856185db85Sdougm 		}
28866185db85Sdougm 	}
28876185db85Sdougm 	return (ret);
28886185db85Sdougm }
28896185db85Sdougm 
28906185db85Sdougm /*
28916185db85Sdougm  * sa_get_protocol_property(propset, prop)
28926185db85Sdougm  *
28936185db85Sdougm  * Get the specified protocol specific property. These are global to
28946185db85Sdougm  * the protocol and not specific to a group or share.
28956185db85Sdougm  */
28966185db85Sdougm 
28976185db85Sdougm sa_property_t
28986185db85Sdougm sa_get_protocol_property(sa_protocol_properties_t propset, char *prop)
28996185db85Sdougm {
29006185db85Sdougm 	xmlNodePtr node = (xmlNodePtr)propset;
29016185db85Sdougm 	xmlChar *value = NULL;
29026185db85Sdougm 
29036185db85Sdougm 	for (node = node->children; node != NULL;
29046185db85Sdougm 		node = node->next) {
29056185db85Sdougm 	    if (xmlStrcmp(node->name, (xmlChar *)"option") == 0) {
29066185db85Sdougm 		if (prop == NULL)
29076185db85Sdougm 		    break;
29086185db85Sdougm 		value = xmlGetProp(node, (xmlChar *)"type");
29096185db85Sdougm 		if (value != NULL &&
29106185db85Sdougm 		    xmlStrcasecmp(value, (xmlChar *)prop) == 0) {
29116185db85Sdougm 		    break;
29126185db85Sdougm 		}
29136185db85Sdougm 		if (value != NULL) {
29146185db85Sdougm 		    xmlFree(value);
29156185db85Sdougm 		    value = NULL;
29166185db85Sdougm 		}
29176185db85Sdougm 	    }
29186185db85Sdougm 	}
29196185db85Sdougm 	if (value != NULL)
29206185db85Sdougm 		xmlFree(value);
29216185db85Sdougm 	if (node != NULL && xmlStrcmp(node->name, (xmlChar *)"option") != 0) {
29226185db85Sdougm 	    /* avoid a non option node -- it is possible to be a text node */
29236185db85Sdougm 	    node = NULL;
29246185db85Sdougm 	}
29256185db85Sdougm 	return ((sa_property_t)node);
29266185db85Sdougm }
29276185db85Sdougm 
29286185db85Sdougm /*
29296185db85Sdougm  * sa_get_next_protocol_property(prop)
29306185db85Sdougm  *
29316185db85Sdougm  * Get the next protocol specific property in the list.
29326185db85Sdougm  */
29336185db85Sdougm 
29346185db85Sdougm sa_property_t
29356185db85Sdougm sa_get_next_protocol_property(sa_property_t prop)
29366185db85Sdougm {
29376185db85Sdougm 	xmlNodePtr node;
29386185db85Sdougm 
29396185db85Sdougm 	for (node = ((xmlNodePtr)prop)->next; node != NULL;
29406185db85Sdougm 		node = node->next) {
29416185db85Sdougm 		if (xmlStrcmp(node->name, (xmlChar *)"option") == 0) {
29426185db85Sdougm 			break;
29436185db85Sdougm 		}
29446185db85Sdougm 	}
29456185db85Sdougm 	return ((sa_property_t)node);
29466185db85Sdougm }
29476185db85Sdougm 
29486185db85Sdougm /*
29496185db85Sdougm  * sa_set_protocol_property(prop, value)
29506185db85Sdougm  *
29516185db85Sdougm  * Set the specified property to have the new value.  The protocol
29526185db85Sdougm  * specific plugin will then be called to update the property.
29536185db85Sdougm  */
29546185db85Sdougm 
29556185db85Sdougm int
29566185db85Sdougm sa_set_protocol_property(sa_property_t prop, char *value)
29576185db85Sdougm {
29586185db85Sdougm 	sa_protocol_properties_t propset;
29596185db85Sdougm 	char *proto;
29606185db85Sdougm 	int ret = SA_INVALID_PROTOCOL;
29616185db85Sdougm 
29626185db85Sdougm 	propset = ((xmlNodePtr)prop)->parent;
29636185db85Sdougm 	if (propset != NULL) {
29646185db85Sdougm 	    proto = sa_get_optionset_attr(propset, "type");
29656185db85Sdougm 	    if (proto != NULL) {
29666185db85Sdougm 		set_node_attr((xmlNodePtr)prop, "value", value);
29676185db85Sdougm 		ret = sa_proto_set_property(proto, prop);
29683472f5dcSdougm 		sa_free_attr_string(proto);
29696185db85Sdougm 	    }
29706185db85Sdougm 	}
29716185db85Sdougm 	return (ret);
29726185db85Sdougm }
29736185db85Sdougm 
29746185db85Sdougm /*
29756185db85Sdougm  * sa_add_protocol_property(propset, prop)
29766185db85Sdougm  *
29776185db85Sdougm  * Add a new property to the protocol sepcific property set.
29786185db85Sdougm  */
29796185db85Sdougm 
29806185db85Sdougm int
29816185db85Sdougm sa_add_protocol_property(sa_protocol_properties_t propset, sa_property_t prop)
29826185db85Sdougm {
29836185db85Sdougm 	xmlNodePtr node;
29846185db85Sdougm 
29856185db85Sdougm 	/* should check for legitimacy */
29866185db85Sdougm 	node = xmlAddChild((xmlNodePtr)propset, (xmlNodePtr)prop);
29876185db85Sdougm 	if (node != NULL)
29886185db85Sdougm 	    return (SA_OK);
29896185db85Sdougm 	return (SA_NO_MEMORY);
29906185db85Sdougm }
29916185db85Sdougm 
29926185db85Sdougm /*
29936185db85Sdougm  * sa_create_protocol_properties(proto)
29946185db85Sdougm  *
29956185db85Sdougm  * Create a protocol specifity property set.
29966185db85Sdougm  */
29976185db85Sdougm 
29986185db85Sdougm sa_protocol_properties_t
29996185db85Sdougm sa_create_protocol_properties(char *proto)
30006185db85Sdougm {
30016185db85Sdougm 	xmlNodePtr node;
30026185db85Sdougm 	node = xmlNewNode(NULL, (xmlChar *)"propertyset");
30036185db85Sdougm 	if (node != NULL) {
30046185db85Sdougm 	    xmlSetProp(node, (xmlChar *)"type", (xmlChar *)proto);
30056185db85Sdougm 	}
30066185db85Sdougm 	return (node);
30076185db85Sdougm }
3008