16185db85Sdougm /* 26185db85Sdougm * CDDL HEADER START 36185db85Sdougm * 46185db85Sdougm * The contents of this file are subject to the terms of the 56185db85Sdougm * Common Development and Distribution License (the "License"). 66185db85Sdougm * You may not use this file except in compliance with the License. 76185db85Sdougm * 86185db85Sdougm * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 96185db85Sdougm * or http://www.opensolaris.org/os/licensing. 106185db85Sdougm * See the License for the specific language governing permissions 116185db85Sdougm * and limitations under the License. 126185db85Sdougm * 136185db85Sdougm * When distributing Covered Code, include this CDDL HEADER in each 146185db85Sdougm * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 156185db85Sdougm * If applicable, add the following below this CDDL HEADER, with the 166185db85Sdougm * fields enclosed by brackets "[]" replaced with your own identifying 176185db85Sdougm * information: Portions Copyright [yyyy] [name of copyright owner] 186185db85Sdougm * 196185db85Sdougm * CDDL HEADER END 206185db85Sdougm */ 216185db85Sdougm 226185db85Sdougm /* 23f345c0beSdougm * Copyright 2007 Sun Microsystems, Inc. All rights reserved. 246185db85Sdougm * Use is subject to license terms. 256185db85Sdougm */ 266185db85Sdougm 276185db85Sdougm #pragma ident "%Z%%M% %I% %E% SMI" 286185db85Sdougm 296185db85Sdougm /* 306185db85Sdougm * Share control API 316185db85Sdougm */ 326185db85Sdougm #include <stdio.h> 336185db85Sdougm #include <string.h> 346185db85Sdougm #include <ctype.h> 356185db85Sdougm #include <sys/types.h> 366185db85Sdougm #include <sys/stat.h> 376185db85Sdougm #include <unistd.h> 386185db85Sdougm #include <libxml/parser.h> 396185db85Sdougm #include <libxml/tree.h> 406185db85Sdougm #include "libshare.h" 416185db85Sdougm #include "libshare_impl.h" 426185db85Sdougm #include <libscf.h> 436185db85Sdougm #include "scfutil.h" 446185db85Sdougm #include <ctype.h> 456185db85Sdougm #include <libintl.h> 466185db85Sdougm 476185db85Sdougm #if _NOT_SMF 486185db85Sdougm #define CONFIG_FILE "/var/tmp/share.cfg" 496185db85Sdougm #define CONFIG_FILE_TMP "/var/tmp/share.cfg.tmp" 506185db85Sdougm #endif 516185db85Sdougm #define TSTAMP(tm) (uint64_t)(((uint64_t)tm.tv_sec << 32) | \ 526185db85Sdougm (tm.tv_nsec & 0xffffffff)) 536185db85Sdougm 546185db85Sdougm /* 556185db85Sdougm * internal data structures 566185db85Sdougm */ 576185db85Sdougm 586185db85Sdougm static xmlNodePtr sa_config_tree; /* the current config */ 596185db85Sdougm static xmlDocPtr sa_config_doc = NULL; /* current config document */ 606185db85Sdougm extern struct sa_proto_plugin *sap_proto_list; 616185db85Sdougm 626185db85Sdougm /* current SMF/SVC repository handle */ 636185db85Sdougm static scfutilhandle_t *scf_handle = NULL; 646185db85Sdougm extern void getlegacyconfig(char *, xmlNodePtr *); 656185db85Sdougm extern int gettransients(xmlNodePtr *); 666185db85Sdougm extern int sa_valid_property(void *, char *, sa_property_t); 676185db85Sdougm extern char *sa_fstype(char *); 686185db85Sdougm extern int sa_is_share(void *); 696185db85Sdougm extern ssize_t scf_max_name_len; /* defined in scfutil during initialization */ 706185db85Sdougm extern int sa_group_is_zfs(sa_group_t); 716185db85Sdougm extern int sa_path_is_zfs(char *); 726185db85Sdougm extern int sa_zfs_set_sharenfs(sa_group_t, char *, int); 736185db85Sdougm extern void update_legacy_config(void); 746185db85Sdougm extern int issubdir(char *, char *); 751cea05afSdougm extern void sa_zfs_init(void); 761cea05afSdougm extern void sa_zfs_fini(void); 776185db85Sdougm 786185db85Sdougm static int sa_initialized = 0; 796185db85Sdougm 806185db85Sdougm /* helper functions */ 816185db85Sdougm 826185db85Sdougm char * 836185db85Sdougm sa_errorstr(int err) 846185db85Sdougm { 856185db85Sdougm static char errstr[32]; 866185db85Sdougm char *ret = NULL; 876185db85Sdougm 886185db85Sdougm switch (err) { 896185db85Sdougm case SA_OK: 906185db85Sdougm ret = gettext("ok"); 916185db85Sdougm break; 926185db85Sdougm case SA_NO_SUCH_PATH: 936185db85Sdougm ret = gettext("path doesn't exist"); 946185db85Sdougm break; 956185db85Sdougm case SA_NO_MEMORY: 966185db85Sdougm ret = gettext("no memory"); 976185db85Sdougm break; 986185db85Sdougm case SA_DUPLICATE_NAME: 996185db85Sdougm ret = gettext("name in use"); 1006185db85Sdougm break; 1016185db85Sdougm case SA_BAD_PATH: 1026185db85Sdougm ret = gettext("bad path"); 1036185db85Sdougm break; 1046185db85Sdougm case SA_NO_SUCH_GROUP: 1056185db85Sdougm ret = gettext("no such group"); 1066185db85Sdougm break; 1076185db85Sdougm case SA_CONFIG_ERR: 1086185db85Sdougm ret = gettext("configuration error"); 1096185db85Sdougm break; 1106185db85Sdougm case SA_SYSTEM_ERR: 1116185db85Sdougm ret = gettext("system error"); 1126185db85Sdougm break; 1136185db85Sdougm case SA_SYNTAX_ERR: 1146185db85Sdougm ret = gettext("syntax error"); 1156185db85Sdougm break; 1166185db85Sdougm case SA_NO_PERMISSION: 1176185db85Sdougm ret = gettext("no permission"); 1186185db85Sdougm break; 1196185db85Sdougm case SA_BUSY: 1206185db85Sdougm ret = gettext("busy"); 1216185db85Sdougm break; 1226185db85Sdougm case SA_NO_SUCH_PROP: 1236185db85Sdougm ret = gettext("no such property"); 1246185db85Sdougm break; 1256185db85Sdougm case SA_INVALID_NAME: 1266185db85Sdougm ret = gettext("invalid name"); 1276185db85Sdougm break; 1286185db85Sdougm case SA_INVALID_PROTOCOL: 1296185db85Sdougm ret = gettext("invalid protocol"); 1306185db85Sdougm break; 1316185db85Sdougm case SA_NOT_ALLOWED: 1326185db85Sdougm ret = gettext("operation not allowed"); 1336185db85Sdougm break; 1346185db85Sdougm case SA_BAD_VALUE: 1356185db85Sdougm ret = gettext("bad property value"); 1366185db85Sdougm break; 1376185db85Sdougm case SA_INVALID_SECURITY: 1386185db85Sdougm ret = gettext("invalid security type"); 1396185db85Sdougm break; 1406185db85Sdougm case SA_NO_SUCH_SECURITY: 1416185db85Sdougm ret = gettext("security type not found"); 1426185db85Sdougm break; 1436185db85Sdougm case SA_VALUE_CONFLICT: 1446185db85Sdougm ret = gettext("property value conflict"); 1456185db85Sdougm break; 1466185db85Sdougm case SA_NOT_IMPLEMENTED: 1476185db85Sdougm ret = gettext("not implemented"); 1486185db85Sdougm break; 1496185db85Sdougm case SA_INVALID_PATH: 1506185db85Sdougm ret = gettext("invalid path"); 1516185db85Sdougm break; 1526185db85Sdougm case SA_NOT_SUPPORTED: 1536185db85Sdougm ret = gettext("operation not supported"); 1546185db85Sdougm break; 1556185db85Sdougm case SA_PROP_SHARE_ONLY: 1566185db85Sdougm ret = gettext("property not valid for group"); 1576185db85Sdougm break; 1586185db85Sdougm case SA_NOT_SHARED: 1596185db85Sdougm ret = gettext("not shared"); 1606185db85Sdougm break; 1616185db85Sdougm default: 1626185db85Sdougm (void) snprintf(errstr, sizeof (errstr), 1636185db85Sdougm gettext("unknown %d"), err); 1646185db85Sdougm ret = errstr; 1656185db85Sdougm } 1666185db85Sdougm return (ret); 1676185db85Sdougm } 1686185db85Sdougm 1696185db85Sdougm /* 1706185db85Sdougm * get_legacy_timestamp(root, path) 1716185db85Sdougm * gets the timestamp of the last time sharemgr updated the legacy 1726185db85Sdougm * files. This is used to determine if someone has modified them by 1736185db85Sdougm * hand. 1746185db85Sdougm */ 1756185db85Sdougm static uint64_t 1766185db85Sdougm get_legacy_timestamp(xmlNodePtr root, char *path) 1776185db85Sdougm { 1786185db85Sdougm uint64_t tval = 0; 1796185db85Sdougm xmlNodePtr node; 1806185db85Sdougm xmlChar *lpath = NULL; 1816185db85Sdougm xmlChar *timestamp = NULL; 1826185db85Sdougm 1836185db85Sdougm for (node = root->xmlChildrenNode; node != NULL; 1846185db85Sdougm node = node->next) { 1856185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"legacy") == 0) { 1866185db85Sdougm /* a possible legacy node for this path */ 1876185db85Sdougm lpath = xmlGetProp(node, (xmlChar *)"path"); 1886185db85Sdougm if (lpath != NULL && xmlStrcmp(lpath, (xmlChar *)path) == 0) { 1896185db85Sdougm /* now have the node, extract the data */ 1906185db85Sdougm timestamp = xmlGetProp(node, (xmlChar *)"timestamp"); 1916185db85Sdougm if (timestamp != NULL) { 1926185db85Sdougm tval = strtoull((char *)timestamp, NULL, 0); 1936185db85Sdougm break; 1946185db85Sdougm } 1956185db85Sdougm } 1966185db85Sdougm if (lpath != NULL) { 1976185db85Sdougm xmlFree(lpath); 1986185db85Sdougm lpath = NULL; 1996185db85Sdougm } 2006185db85Sdougm } 2016185db85Sdougm } 2026185db85Sdougm if (lpath != NULL) 2036185db85Sdougm xmlFree(lpath); 2046185db85Sdougm if (timestamp != NULL) 2056185db85Sdougm xmlFree(timestamp); 2066185db85Sdougm return (tval); 2076185db85Sdougm } 2086185db85Sdougm 2096185db85Sdougm /* 2106185db85Sdougm * set_legacy_timestamp(root, path, timevalue) 2116185db85Sdougm * 2126185db85Sdougm * add the current timestamp value to the configuration for use in 2136185db85Sdougm * determining when to update the legacy files. For SMF, this 2146185db85Sdougm * property is kept in default/operation/legacy_timestamp 2156185db85Sdougm */ 2166185db85Sdougm 2176185db85Sdougm static void 2186185db85Sdougm set_legacy_timestamp(xmlNodePtr root, char *path, uint64_t tval) 2196185db85Sdougm { 2206185db85Sdougm xmlNodePtr node; 2216185db85Sdougm xmlChar *lpath = NULL; 2226185db85Sdougm 2236185db85Sdougm for (node = root->xmlChildrenNode; node != NULL; 2246185db85Sdougm node = node->next) { 2256185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"legacy") == 0) { 2266185db85Sdougm /* a possible legacy node for this path */ 2276185db85Sdougm lpath = xmlGetProp(node, (xmlChar *)"path"); 2286185db85Sdougm if (lpath != NULL && xmlStrcmp(lpath, (xmlChar *)path) == 0) { 2296185db85Sdougm xmlFree(lpath); 2306185db85Sdougm break; 2316185db85Sdougm } 2326185db85Sdougm if (lpath != NULL) 2336185db85Sdougm xmlFree(lpath); 2346185db85Sdougm } 2356185db85Sdougm } 2366185db85Sdougm if (node == NULL) { 2376185db85Sdougm /* need to create the first legacy timestamp node */ 2386185db85Sdougm node = xmlNewChild(root, NULL, (xmlChar *)"legacy", NULL); 2396185db85Sdougm } 2406185db85Sdougm if (node != NULL) { 2416185db85Sdougm char tstring[32]; 2426185db85Sdougm int ret; 2436185db85Sdougm 2446185db85Sdougm (void) snprintf(tstring, sizeof (tstring), "%lld", tval); 2456185db85Sdougm xmlSetProp(node, (xmlChar *)"timestamp", (xmlChar *)tstring); 2466185db85Sdougm xmlSetProp(node, (xmlChar *)"path", (xmlChar *)path); 2476185db85Sdougm /* now commit to SMF */ 2486185db85Sdougm ret = sa_get_instance(scf_handle, "default"); 2496185db85Sdougm if (ret == SA_OK) { 2506185db85Sdougm ret = sa_start_transaction(scf_handle, "operation"); 2516185db85Sdougm if (ret == SA_OK) { 2526185db85Sdougm ret = sa_set_property(scf_handle, "legacy-timestamp", 2536185db85Sdougm tstring); 2546185db85Sdougm if (ret == SA_OK) { 2556185db85Sdougm (void) sa_end_transaction(scf_handle); 2566185db85Sdougm } else { 2576185db85Sdougm sa_abort_transaction(scf_handle); 2586185db85Sdougm } 2596185db85Sdougm } 2606185db85Sdougm } 2616185db85Sdougm } 2626185db85Sdougm } 2636185db85Sdougm 2646185db85Sdougm /* 2656185db85Sdougm * is_shared(share) 2666185db85Sdougm * 2676185db85Sdougm * determine if the specified share is currently shared or not. 2686185db85Sdougm */ 2696185db85Sdougm static int 2706185db85Sdougm is_shared(sa_share_t share) 2716185db85Sdougm { 2726185db85Sdougm char *shared; 2736185db85Sdougm int result = 0; /* assume not */ 2746185db85Sdougm 2756185db85Sdougm shared = sa_get_share_attr(share, "shared"); 2766185db85Sdougm if (shared != NULL) { 2776185db85Sdougm if (strcmp(shared, "true") == 0) 2786185db85Sdougm result = 1; 2796185db85Sdougm sa_free_attr_string(shared); 2806185db85Sdougm } 2816185db85Sdougm return (result); 2826185db85Sdougm } 2836185db85Sdougm 2846185db85Sdougm /* 285f345c0beSdougm * checksubdir(newpath, strictness) 286f345c0beSdougm * 287f345c0beSdougm * checksubdir determines if the specified path (newpath) is a 288f345c0beSdougm * subdirectory of another share. It calls issubdir() from the old 289f345c0beSdougm * share implementation to do the complicated work. The strictness 290f345c0beSdougm * parameter determines how strict a check to make against the 291f345c0beSdougm * path. The strictness values mean: 292f345c0beSdougm * SA_CHECK_NORMAL == only check newpath against shares that are active 293f345c0beSdougm * SA_CHECK_STRICT == check newpath against both active shares and those 294f345c0beSdougm * stored in the repository 2956185db85Sdougm */ 2966185db85Sdougm static int 297f345c0beSdougm checksubdir(char *newpath, int strictness) 2986185db85Sdougm { 2996185db85Sdougm sa_group_t group; 3006185db85Sdougm sa_share_t share; 3016185db85Sdougm int issub; 3026185db85Sdougm char *path = NULL; 3036185db85Sdougm 3046185db85Sdougm for (issub = 0, group = sa_get_group(NULL); 3056185db85Sdougm group != NULL && !issub; 3066185db85Sdougm group = sa_get_next_group(group)) { 3076185db85Sdougm for (share = sa_get_share(group, NULL); share != NULL; 3086185db85Sdougm share = sa_get_next_share(share)) { 3096185db85Sdougm /* 3106185db85Sdougm * The original behavior of share never checked 3116185db85Sdougm * against the permanent configuration 3126185db85Sdougm * (/etc/dfs/dfstab). PIT has a number of cases where 3136185db85Sdougm * it depends on this older behavior even though it 3146185db85Sdougm * could be considered incorrect. We may tighten this 3156185db85Sdougm * up in the future. 3166185db85Sdougm */ 317f345c0beSdougm if (strictness == SA_CHECK_NORMAL && !is_shared(share)) 3186185db85Sdougm continue; 3196185db85Sdougm 3206185db85Sdougm path = sa_get_share_attr(share, "path"); 321f345c0beSdougm /* 322f345c0beSdougm * If path is NULL, then a share is in the process of 323f345c0beSdougm * construction or someone has modified the property 324f345c0beSdougm * group inappropriately. It should be ignored. 325f345c0beSdougm */ 326f345c0beSdougm if (path == NULL) 327f345c0beSdougm continue; 3286185db85Sdougm if (newpath != NULL && 3296185db85Sdougm (strcmp(path, newpath) == 0 || issubdir(newpath, path) || 3306185db85Sdougm issubdir(path, newpath))) { 3316185db85Sdougm sa_free_attr_string(path); 3326185db85Sdougm path = NULL; 3336185db85Sdougm issub = SA_INVALID_PATH; 3346185db85Sdougm break; 3356185db85Sdougm } 3366185db85Sdougm sa_free_attr_string(path); 3376185db85Sdougm path = NULL; 3386185db85Sdougm } 3396185db85Sdougm } 3406185db85Sdougm if (path != NULL) 3416185db85Sdougm sa_free_attr_string(path); 3426185db85Sdougm return (issub); 3436185db85Sdougm } 3446185db85Sdougm 3456185db85Sdougm /* 346f345c0beSdougm * validpath(path, strictness) 3476185db85Sdougm * determine if the provided path is valid for a share. It shouldn't 3486185db85Sdougm * be a sub-dir of an already shared path or the parent directory of a 3496185db85Sdougm * share path. 3506185db85Sdougm */ 3516185db85Sdougm static int 352f345c0beSdougm validpath(char *path, int strictness) 3536185db85Sdougm { 3546185db85Sdougm int error = SA_OK; 3556185db85Sdougm struct stat st; 3566185db85Sdougm sa_share_t share; 3576185db85Sdougm char *fstype; 3586185db85Sdougm 3596185db85Sdougm if (*path != '/') { 3606185db85Sdougm return (SA_BAD_PATH); 3616185db85Sdougm } 3626185db85Sdougm if (stat(path, &st) < 0) { 3636185db85Sdougm error = SA_NO_SUCH_PATH; 3646185db85Sdougm } else { 3656185db85Sdougm share = sa_find_share(path); 3666185db85Sdougm if (share != NULL) { 3676185db85Sdougm error = SA_DUPLICATE_NAME; 3686185db85Sdougm } 3696185db85Sdougm if (error == SA_OK) { 3706185db85Sdougm /* 3716185db85Sdougm * check for special case with file system that might 3726185db85Sdougm * have restrictions. For now, ZFS is the only case 3736185db85Sdougm * since it has its own idea of how to configure 3746185db85Sdougm * shares. We do this before subdir checking since 3756185db85Sdougm * things like ZFS will do that for us. This should 3766185db85Sdougm * also be done via plugin interface. 3776185db85Sdougm */ 3786185db85Sdougm fstype = sa_fstype(path); 3796185db85Sdougm if (fstype != NULL && strcmp(fstype, "zfs") == 0) { 3806185db85Sdougm if (sa_zfs_is_shared(path)) 3816185db85Sdougm error = SA_DUPLICATE_NAME; 3826185db85Sdougm } 3836185db85Sdougm if (fstype != NULL) 3846185db85Sdougm sa_free_fstype(fstype); 3856185db85Sdougm } 3866185db85Sdougm if (error == SA_OK) { 387f345c0beSdougm error = checksubdir(path, strictness); 3886185db85Sdougm } 3896185db85Sdougm } 3906185db85Sdougm return (error); 3916185db85Sdougm } 3926185db85Sdougm 3936185db85Sdougm /* 3946185db85Sdougm * check to see if group/share is persistent. 3956185db85Sdougm */ 3966185db85Sdougm static int 3976185db85Sdougm is_persistent(sa_group_t group) 3986185db85Sdougm { 3996185db85Sdougm char *type; 4006185db85Sdougm int persist = 1; 4016185db85Sdougm 4026185db85Sdougm type = sa_get_group_attr(group, "type"); 4036185db85Sdougm if (type != NULL && strcmp(type, "transient") == 0) 4046185db85Sdougm persist = 0; 4056185db85Sdougm if (type != NULL) 4066185db85Sdougm sa_free_attr_string(type); 4076185db85Sdougm return (persist); 4086185db85Sdougm } 4096185db85Sdougm 4106185db85Sdougm /* 4116185db85Sdougm * sa_valid_group_name(name) 4126185db85Sdougm * 4136185db85Sdougm * check that the "name" contains only valid characters and otherwise 4146185db85Sdougm * fits the required naming conventions. Valid names must start with 4156185db85Sdougm * an alphabetic and the remainder may consist of only alphanumeric 4166185db85Sdougm * plus the '-' and '_' characters. This name limitation comes from 4176185db85Sdougm * inherent limitations in SMF. 4186185db85Sdougm */ 4196185db85Sdougm 4206185db85Sdougm int 4216185db85Sdougm sa_valid_group_name(char *name) 4226185db85Sdougm { 4236185db85Sdougm int ret = 1; 4246185db85Sdougm ssize_t len; 4256185db85Sdougm 4266185db85Sdougm if (name != NULL && isalpha(*name)) { 4276185db85Sdougm char c; 4286185db85Sdougm len = strlen(name); 4296185db85Sdougm if (len < (scf_max_name_len - sizeof ("group:"))) { 4306185db85Sdougm for (c = *name++; c != '\0' && ret != 0; c = *name++) { 4316185db85Sdougm if (!isalnum(c) && c != '-' && c != '_') 4326185db85Sdougm ret = 0; 4336185db85Sdougm } 4346185db85Sdougm } else { 4356185db85Sdougm ret = 0; 4366185db85Sdougm } 4376185db85Sdougm } else { 4386185db85Sdougm ret = 0; 4396185db85Sdougm } 4406185db85Sdougm return (ret); 4416185db85Sdougm } 4426185db85Sdougm 4436185db85Sdougm 4446185db85Sdougm /* 4456185db85Sdougm * is_zfs_group(group) 4466185db85Sdougm * Determine if the specified group is a ZFS sharenfs group 4476185db85Sdougm */ 4486185db85Sdougm static int 4496185db85Sdougm is_zfs_group(sa_group_t group) 4506185db85Sdougm { 4516185db85Sdougm int ret = 0; 4526185db85Sdougm xmlNodePtr parent; 4536185db85Sdougm xmlChar *zfs; 4546185db85Sdougm 4556185db85Sdougm if (strcmp((char *)((xmlNodePtr)group)->name, "share") == 0) { 4566185db85Sdougm parent = (xmlNodePtr)sa_get_parent_group(group); 4576185db85Sdougm } else { 4586185db85Sdougm parent = (xmlNodePtr)group; 4596185db85Sdougm } 4606185db85Sdougm zfs = xmlGetProp(parent, (xmlChar *)"zfs"); 4616185db85Sdougm if (zfs != NULL) { 4626185db85Sdougm xmlFree(zfs); 4636185db85Sdougm ret = 1; 4646185db85Sdougm } 4656185db85Sdougm return (ret); 4666185db85Sdougm } 4676185db85Sdougm 4686185db85Sdougm /* 4696185db85Sdougm * sa_optionset_name(optionset, oname, len, id) 4706185db85Sdougm * return the SMF name for the optionset. If id is not NULL, it 4716185db85Sdougm * will have the GUID value for a share and should be used 4726185db85Sdougm * instead of the keyword "optionset" which is used for 4736185db85Sdougm * groups. If the optionset doesn't have a protocol type 4746185db85Sdougm * associated with it, "default" is used. This shouldn't happen 4756185db85Sdougm * at this point but may be desirable in the future if there are 4766185db85Sdougm * protocol independent properties added. The name is returned in 4776185db85Sdougm * oname. 4786185db85Sdougm */ 4796185db85Sdougm 4806185db85Sdougm static int 4816185db85Sdougm sa_optionset_name(sa_optionset_t optionset, char *oname, size_t len, char *id) 4826185db85Sdougm { 4836185db85Sdougm char *proto; 4846185db85Sdougm 4856185db85Sdougm if (id == NULL) 4866185db85Sdougm id = "optionset"; 4876185db85Sdougm 4886185db85Sdougm proto = sa_get_optionset_attr(optionset, "type"); 4896185db85Sdougm len = snprintf(oname, len, "%s_%s", id, proto ? proto : "default"); 4906185db85Sdougm 4916185db85Sdougm if (proto != NULL) 4926185db85Sdougm sa_free_attr_string(proto); 4936185db85Sdougm return (len); 4946185db85Sdougm } 4956185db85Sdougm 4966185db85Sdougm /* 4976185db85Sdougm * sa_security_name(optionset, oname, len, id) 4986185db85Sdougm * 4996185db85Sdougm * return the SMF name for the security. If id is not NULL, it will 5006185db85Sdougm * have the GUID value for a share and should be used instead of the 5016185db85Sdougm * keyword "optionset" which is used for groups. If the optionset 5026185db85Sdougm * doesn't have a protocol type associated with it, "default" is 5036185db85Sdougm * used. This shouldn't happen at this point but may be desirable in 5046185db85Sdougm * the future if there are protocol independent properties added. The 5056185db85Sdougm * name is returned in oname. The security type is also encoded into 5066185db85Sdougm * the name. In the future, this wil *be handled a bit differently. 5076185db85Sdougm */ 5086185db85Sdougm 5096185db85Sdougm static int 5106185db85Sdougm sa_security_name(sa_security_t security, char *oname, size_t len, char *id) 5116185db85Sdougm { 5126185db85Sdougm char *proto; 5136185db85Sdougm char *sectype; 5146185db85Sdougm 5156185db85Sdougm if (id == NULL) 5166185db85Sdougm id = "optionset"; 5176185db85Sdougm 5186185db85Sdougm proto = sa_get_security_attr(security, "type"); 5196185db85Sdougm sectype = sa_get_security_attr(security, "sectype"); 5206185db85Sdougm len = snprintf(oname, len, "%s_%s_%s", id, 5216185db85Sdougm proto ? proto : "default", 5226185db85Sdougm sectype ? sectype : "default"); 5236185db85Sdougm if (proto != NULL) 5246185db85Sdougm sa_free_attr_string(proto); 5256185db85Sdougm if (sectype != NULL) 5266185db85Sdougm sa_free_attr_string(sectype); 5276185db85Sdougm return (len); 5286185db85Sdougm } 5296185db85Sdougm 5306185db85Sdougm /* 531f345c0beSdougm * sa_init(init_service) 5326185db85Sdougm * Initialize the API 5336185db85Sdougm * find all the shared objects 5346185db85Sdougm * init the tables with all objects 5356185db85Sdougm * read in the current configuration 5366185db85Sdougm */ 5376185db85Sdougm 5386185db85Sdougm void 5396185db85Sdougm sa_init(int init_service) 5406185db85Sdougm { 5416185db85Sdougm struct stat st; 5426185db85Sdougm int legacy = 0; 5436185db85Sdougm uint64_t tval = 0; 5446185db85Sdougm 5456185db85Sdougm if (!sa_initialized) { 5466185db85Sdougm /* get protocol specific structures */ 5476185db85Sdougm (void) proto_plugin_init(); 5486185db85Sdougm if (init_service & SA_INIT_SHARE_API) { 5496185db85Sdougm /* 5501cea05afSdougm * initialize access into libzfs. We use this when 5511cea05afSdougm * collecting info about ZFS datasets and shares. 5521cea05afSdougm */ 5531cea05afSdougm sa_zfs_init(); 5541cea05afSdougm /* 5556185db85Sdougm * since we want to use SMF, initialize an svc handle 5566185db85Sdougm * and find out what is there. 5576185db85Sdougm */ 5586185db85Sdougm scf_handle = sa_scf_init(); 5596185db85Sdougm if (scf_handle != NULL) { 5606185db85Sdougm (void) sa_get_config(scf_handle, &sa_config_tree, 5616185db85Sdougm &sa_config_doc); 5626185db85Sdougm tval = get_legacy_timestamp(sa_config_tree, 5636185db85Sdougm SA_LEGACY_DFSTAB); 5646185db85Sdougm if (tval == 0) { 5656185db85Sdougm /* first time so make sure default is setup */ 5666185db85Sdougm sa_group_t defgrp; 5676185db85Sdougm sa_optionset_t opt; 5686185db85Sdougm defgrp = sa_get_group("default"); 5696185db85Sdougm if (defgrp != NULL) { 5706185db85Sdougm opt = sa_get_optionset(defgrp, NULL); 5716185db85Sdougm if (opt == NULL) 5726185db85Sdougm /* NFS is the default for default */ 5736185db85Sdougm opt = sa_create_optionset(defgrp, "nfs"); 5746185db85Sdougm } 5756185db85Sdougm } 5766185db85Sdougm if (stat(SA_LEGACY_DFSTAB, &st) >= 0 && 5776185db85Sdougm tval != TSTAMP(st.st_ctim)) { 5786185db85Sdougm getlegacyconfig(SA_LEGACY_DFSTAB, &sa_config_tree); 5796185db85Sdougm if (stat(SA_LEGACY_DFSTAB, &st) >= 0) 5806185db85Sdougm set_legacy_timestamp(sa_config_tree, 5816185db85Sdougm SA_LEGACY_DFSTAB, 5826185db85Sdougm TSTAMP(st.st_ctim)); 5836185db85Sdougm } 5846185db85Sdougm legacy |= sa_get_zfs_shares("zfs"); 5856185db85Sdougm legacy |= gettransients(&sa_config_tree); 5866185db85Sdougm } 5876185db85Sdougm } 5886185db85Sdougm } 5896185db85Sdougm } 5906185db85Sdougm 5916185db85Sdougm /* 5926185db85Sdougm * sa_fini() 5936185db85Sdougm * Uninitialize the API structures including the configuration 5941cea05afSdougm * data structures and ZFS related data. 5956185db85Sdougm */ 5966185db85Sdougm 5976185db85Sdougm void 5986185db85Sdougm sa_fini() 5996185db85Sdougm { 6006185db85Sdougm if (sa_initialized) { 6016185db85Sdougm /* free the config trees */ 6026185db85Sdougm sa_initialized = 0; 6036185db85Sdougm if (sa_config_doc != NULL) 6046185db85Sdougm xmlFreeDoc(sa_config_doc); 6056185db85Sdougm sa_config_tree = NULL; 6066185db85Sdougm sa_config_doc = NULL; 6076185db85Sdougm sa_scf_fini(scf_handle); 6081cea05afSdougm sa_zfs_fini(); 6096185db85Sdougm (void) proto_plugin_init(); 6106185db85Sdougm } 6116185db85Sdougm } 6126185db85Sdougm 6136185db85Sdougm /* 6146185db85Sdougm * sa_get_protocols(char **protocol) 6156185db85Sdougm * Get array of protocols that are supported 6166185db85Sdougm * Returns pointer to an allocated and NULL terminated 6176185db85Sdougm * array of strings. Caller must free. 6186185db85Sdougm * This really should be determined dynamically. 6196185db85Sdougm * If there aren't any defined, return -1. 6206185db85Sdougm * Use free() to return memory. 6216185db85Sdougm */ 6226185db85Sdougm 6236185db85Sdougm int 6246185db85Sdougm sa_get_protocols(char ***protocols) 6256185db85Sdougm { 6266185db85Sdougm int numproto = -1; 6276185db85Sdougm 6286185db85Sdougm if (protocols != NULL) { 6296185db85Sdougm struct sa_proto_plugin *plug; 6306185db85Sdougm for (numproto = 0, plug = sap_proto_list; plug != NULL; 6316185db85Sdougm plug = plug->plugin_next) { 6326185db85Sdougm numproto++; 6336185db85Sdougm } 6346185db85Sdougm 6356185db85Sdougm *protocols = calloc(numproto + 1, sizeof (char *)); 6366185db85Sdougm if (*protocols != NULL) { 6376185db85Sdougm int ret = 0; 6386185db85Sdougm for (plug = sap_proto_list; plug != NULL; 6396185db85Sdougm plug = plug->plugin_next) { 6406185db85Sdougm /* faking for now */ 6416185db85Sdougm (*protocols)[ret++] = plug->plugin_ops->sa_protocol; 6426185db85Sdougm } 6436185db85Sdougm } else { 6446185db85Sdougm numproto = -1; 6456185db85Sdougm } 6466185db85Sdougm } 6476185db85Sdougm return (numproto); 6486185db85Sdougm } 6496185db85Sdougm 6506185db85Sdougm /* 6516185db85Sdougm * find_group_by_name(node, group) 6526185db85Sdougm * 6536185db85Sdougm * search the XML document subtree specified by node to find the group 6546185db85Sdougm * specified by group. Searching subtree allows subgroups to be 6556185db85Sdougm * searched for. 6566185db85Sdougm */ 6576185db85Sdougm 6586185db85Sdougm static xmlNodePtr 6596185db85Sdougm find_group_by_name(xmlNodePtr node, xmlChar *group) 6606185db85Sdougm { 6616185db85Sdougm xmlChar *name = NULL; 6626185db85Sdougm 6636185db85Sdougm for (node = node->xmlChildrenNode; node != NULL; 6646185db85Sdougm node = node->next) { 6656185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"group") == 0) { 6666185db85Sdougm /* if no groupname, return the first found */ 6676185db85Sdougm if (group == NULL) 6686185db85Sdougm break; 6696185db85Sdougm name = xmlGetProp(node, (xmlChar *)"name"); 6706185db85Sdougm if (name != NULL && 6716185db85Sdougm xmlStrcmp(name, group) == 0) { 6726185db85Sdougm break; 6736185db85Sdougm } 6746185db85Sdougm if (name != NULL) { 6756185db85Sdougm xmlFree(name); 6766185db85Sdougm name = NULL; 6776185db85Sdougm } 6786185db85Sdougm } 6796185db85Sdougm } 6806185db85Sdougm if (name != NULL) 6816185db85Sdougm xmlFree(name); 6826185db85Sdougm return (node); 6836185db85Sdougm } 6846185db85Sdougm 6856185db85Sdougm /* 6866185db85Sdougm * sa_get_group(groupname) 6876185db85Sdougm * Return the "group" specified. If groupname is NULL, 6886185db85Sdougm * return the first group of the list of groups. 6896185db85Sdougm */ 6906185db85Sdougm sa_group_t 6916185db85Sdougm sa_get_group(char *groupname) 6926185db85Sdougm { 6936185db85Sdougm xmlNodePtr node = NULL; 6946185db85Sdougm char *subgroup = NULL; 6956185db85Sdougm char *group = NULL; 6966185db85Sdougm 6976185db85Sdougm if (sa_config_tree != NULL) { 6986185db85Sdougm if (groupname != NULL) { 6996185db85Sdougm group = strdup(groupname); 7006185db85Sdougm subgroup = strchr(group, '/'); 7016185db85Sdougm if (subgroup != NULL) 7026185db85Sdougm *subgroup++ = '\0'; 7036185db85Sdougm } 7046185db85Sdougm node = find_group_by_name(sa_config_tree, (xmlChar *)group); 7056185db85Sdougm /* if a subgroup, find it before returning */ 7066185db85Sdougm if (subgroup != NULL && node != NULL) { 7076185db85Sdougm node = find_group_by_name(node, (xmlChar *)subgroup); 7086185db85Sdougm } 7096185db85Sdougm } 7106185db85Sdougm if (node != NULL && (char *)group != NULL) 7116185db85Sdougm (void) sa_get_instance(scf_handle, (char *)group); 7126185db85Sdougm if (group != NULL) 7136185db85Sdougm free(group); 7146185db85Sdougm return ((sa_group_t)(node)); 7156185db85Sdougm } 7166185db85Sdougm 7176185db85Sdougm /* 7186185db85Sdougm * sa_get_next_group(group) 7196185db85Sdougm * Return the "next" group after the specified group from 7206185db85Sdougm * the internal group list. NULL if there are no more. 7216185db85Sdougm */ 7226185db85Sdougm sa_group_t 7236185db85Sdougm sa_get_next_group(sa_group_t group) 7246185db85Sdougm { 7256185db85Sdougm xmlNodePtr ngroup = NULL; 7266185db85Sdougm if (group != NULL) { 7276185db85Sdougm for (ngroup = ((xmlNodePtr)group)->next; ngroup != NULL; 7286185db85Sdougm ngroup = ngroup->next) { 7296185db85Sdougm if (xmlStrcmp(ngroup->name, (xmlChar *)"group") == 0) 7306185db85Sdougm break; 7316185db85Sdougm } 7326185db85Sdougm } 7336185db85Sdougm return ((sa_group_t)ngroup); 7346185db85Sdougm } 7356185db85Sdougm 7366185db85Sdougm /* 7376185db85Sdougm * sa_get_share(group, sharepath) 7386185db85Sdougm * Return the share object for the share specified. The share 7396185db85Sdougm * must be in the specified group. Return NULL if not found. 7406185db85Sdougm */ 7416185db85Sdougm sa_share_t 7426185db85Sdougm sa_get_share(sa_group_t group, char *sharepath) 7436185db85Sdougm { 7446185db85Sdougm xmlNodePtr node = NULL; 7456185db85Sdougm xmlChar *path; 7466185db85Sdougm 7476185db85Sdougm /* 7486185db85Sdougm * For future scalability, this should end up building a cache 7496185db85Sdougm * since it will get called regularly by the mountd and info 7506185db85Sdougm * services. 7516185db85Sdougm */ 7526185db85Sdougm if (group != NULL) { 7536185db85Sdougm for (node = ((xmlNodePtr)group)->children; node != NULL; 7546185db85Sdougm node = node->next) { 7556185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"share") == 0) { 7566185db85Sdougm if (sharepath == NULL) { 7576185db85Sdougm break; 7586185db85Sdougm } else { 7596185db85Sdougm /* is it the correct share? */ 7606185db85Sdougm path = xmlGetProp(node, (xmlChar *)"path"); 7616185db85Sdougm if (path != NULL && 7626185db85Sdougm xmlStrcmp(path, (xmlChar *)sharepath) == 0) { 7636185db85Sdougm xmlFree(path); 7646185db85Sdougm break; 7656185db85Sdougm } 7666185db85Sdougm xmlFree(path); 7676185db85Sdougm } 7686185db85Sdougm } 7696185db85Sdougm } 7706185db85Sdougm } 7716185db85Sdougm return ((sa_share_t)node); 7726185db85Sdougm } 7736185db85Sdougm 7746185db85Sdougm /* 7756185db85Sdougm * sa_get_next_share(share) 7766185db85Sdougm * Return the next share following the specified share 7776185db85Sdougm * from the internal list of shares. Returns NULL if there 7786185db85Sdougm * are no more shares. The list is relative to the same 7796185db85Sdougm * group. 7806185db85Sdougm */ 7816185db85Sdougm sa_share_t 7826185db85Sdougm sa_get_next_share(sa_share_t share) 7836185db85Sdougm { 7846185db85Sdougm xmlNodePtr node = NULL; 7856185db85Sdougm 7866185db85Sdougm if (share != NULL) { 7876185db85Sdougm for (node = ((xmlNodePtr)share)->next; node != NULL; 7886185db85Sdougm node = node->next) { 7896185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"share") == 0) { 7906185db85Sdougm break; 7916185db85Sdougm } 7926185db85Sdougm } 7936185db85Sdougm } 7946185db85Sdougm return ((sa_share_t)node); 7956185db85Sdougm } 7966185db85Sdougm 7976185db85Sdougm /* 7986185db85Sdougm * _sa_get_child_node(node, type) 7996185db85Sdougm * 8006185db85Sdougm * find the child node of the specified node that has "type". This is 8016185db85Sdougm * used to implement several internal functions. 8026185db85Sdougm */ 8036185db85Sdougm 8046185db85Sdougm static xmlNodePtr 8056185db85Sdougm _sa_get_child_node(xmlNodePtr node, xmlChar *type) 8066185db85Sdougm { 8076185db85Sdougm xmlNodePtr child; 8086185db85Sdougm for (child = node->xmlChildrenNode; child != NULL; 8096185db85Sdougm child = child->next) 8106185db85Sdougm if (xmlStrcmp(child->name, type) == 0) 8116185db85Sdougm return (child); 8126185db85Sdougm return ((xmlNodePtr)NULL); 8136185db85Sdougm } 8146185db85Sdougm 8156185db85Sdougm /* 8166185db85Sdougm * find_share(group, path) 8176185db85Sdougm * 8186185db85Sdougm * Search all the shares in the specified group for one that has the 8196185db85Sdougm * specified path. 8206185db85Sdougm */ 8216185db85Sdougm 8226185db85Sdougm static sa_share_t 8236185db85Sdougm find_share(sa_group_t group, char *sharepath) 8246185db85Sdougm { 8256185db85Sdougm sa_share_t share; 8266185db85Sdougm char *path; 8276185db85Sdougm 8286185db85Sdougm for (share = sa_get_share(group, NULL); share != NULL; 8296185db85Sdougm share = sa_get_next_share(share)) { 8306185db85Sdougm path = sa_get_share_attr(share, "path"); 8316185db85Sdougm if (path != NULL && strcmp(path, sharepath) == 0) { 8326185db85Sdougm sa_free_attr_string(path); 8336185db85Sdougm break; 8346185db85Sdougm } 8356185db85Sdougm if (path != NULL) 8366185db85Sdougm sa_free_attr_string(path); 8376185db85Sdougm } 8386185db85Sdougm return (share); 8396185db85Sdougm } 8406185db85Sdougm 8416185db85Sdougm /* 8426185db85Sdougm * sa_get_sub_group(group) 8436185db85Sdougm * 8446185db85Sdougm * Get the first sub-group of group. The sa_get_next_group() function 8456185db85Sdougm * can be used to get the rest. This is currently only used for ZFS 8466185db85Sdougm * sub-groups but could be used to implement a more general mechanism. 8476185db85Sdougm */ 8486185db85Sdougm 8496185db85Sdougm sa_group_t 8506185db85Sdougm sa_get_sub_group(sa_group_t group) 8516185db85Sdougm { 8526185db85Sdougm return ((sa_group_t)_sa_get_child_node((xmlNodePtr)group, 8536185db85Sdougm (xmlChar *)"group")); 8546185db85Sdougm } 8556185db85Sdougm 8566185db85Sdougm /* 8576185db85Sdougm * sa_find_share(sharepath) 8586185db85Sdougm * Finds a share regardless of group. In the future, this 8596185db85Sdougm * function should utilize a cache and hash table of some kind. 8606185db85Sdougm * The current assumption is that a path will only be shared 8616185db85Sdougm * once. In the future, this may change as implementation of 8626185db85Sdougm * resource names comes into being. 8636185db85Sdougm */ 8646185db85Sdougm sa_share_t 8656185db85Sdougm sa_find_share(char *sharepath) 8666185db85Sdougm { 8676185db85Sdougm sa_group_t group; 8686185db85Sdougm sa_group_t zgroup; 8696185db85Sdougm sa_share_t share = NULL; 8706185db85Sdougm int done = 0; 8716185db85Sdougm 8726185db85Sdougm for (group = sa_get_group(NULL); group != NULL && !done; 8736185db85Sdougm group = sa_get_next_group(group)) { 8746185db85Sdougm if (is_zfs_group(group)) { 8756185db85Sdougm for (zgroup = (sa_group_t)_sa_get_child_node((xmlNodePtr)group, 8766185db85Sdougm (xmlChar *)"group"); 8776185db85Sdougm zgroup != NULL; zgroup = sa_get_next_group(zgroup)) { 8786185db85Sdougm share = find_share(zgroup, sharepath); 8796185db85Sdougm if (share != NULL) 8806185db85Sdougm break; 8816185db85Sdougm } 8826185db85Sdougm } else { 8836185db85Sdougm share = find_share(group, sharepath); 8846185db85Sdougm } 8856185db85Sdougm if (share != NULL) 8866185db85Sdougm break; 8876185db85Sdougm } 8886185db85Sdougm return (share); 8896185db85Sdougm } 8906185db85Sdougm 8916185db85Sdougm /* 892f345c0beSdougm * sa_check_path(group, path, strictness) 8936185db85Sdougm * 8946185db85Sdougm * check that path is a valid path relative to the group. Currently, 8956185db85Sdougm * we are ignoring the group and checking only the NFS rules. Later, 8966185db85Sdougm * we may want to use the group to then check against the protocols 897f345c0beSdougm * enabled on the group. The strictness values mean: 898f345c0beSdougm * SA_CHECK_NORMAL == only check newpath against shares that are active 899f345c0beSdougm * SA_CHECK_STRICT == check newpath against both active shares and those 900f345c0beSdougm * stored in the repository 9016185db85Sdougm */ 9026185db85Sdougm 9036185db85Sdougm int 904f345c0beSdougm sa_check_path(sa_group_t group, char *path, int strictness) 9056185db85Sdougm { 9066185db85Sdougm #ifdef lint 9076185db85Sdougm group = group; 9086185db85Sdougm #endif 909f345c0beSdougm return (validpath(path, strictness)); 9106185db85Sdougm } 9116185db85Sdougm 9126185db85Sdougm /* 9136185db85Sdougm * _sa_add_share(group, sharepath, persist, *error) 9146185db85Sdougm * 9156185db85Sdougm * common code for all types of add_share. sa_add_share() is the 9166185db85Sdougm * public API, we also need to be able to do this when parsing legacy 9176185db85Sdougm * files and construction of the internal configuration while 9186185db85Sdougm * extracting config info from SMF. 9196185db85Sdougm */ 9206185db85Sdougm 9216185db85Sdougm sa_share_t 9226185db85Sdougm _sa_add_share(sa_group_t group, char *sharepath, int persist, int *error) 9236185db85Sdougm { 9246185db85Sdougm xmlNodePtr node = NULL; 9256185db85Sdougm int err; 9266185db85Sdougm 9276185db85Sdougm err = SA_OK; /* assume success */ 9286185db85Sdougm 9296185db85Sdougm node = xmlNewChild((xmlNodePtr)group, NULL, 9306185db85Sdougm (xmlChar *)"share", NULL); 9316185db85Sdougm if (node != NULL) { 9326185db85Sdougm xmlSetProp(node, (xmlChar *)"path", (xmlChar *)sharepath); 9336185db85Sdougm xmlSetProp(node, (xmlChar *)"type", persist ? 9346185db85Sdougm (xmlChar *)"persist" : (xmlChar *)"transient"); 9356185db85Sdougm if (persist != SA_SHARE_TRANSIENT) { 9366185db85Sdougm /* 9376185db85Sdougm * persistent shares come in two flavors: SMF and 9386185db85Sdougm * ZFS. Sort this one out based on target group and 9396185db85Sdougm * path type. Currently, only NFS is supported in the 9406185db85Sdougm * ZFS group and it is always on. 9416185db85Sdougm */ 9426185db85Sdougm if (sa_group_is_zfs(group) && sa_path_is_zfs(sharepath)) { 9436185db85Sdougm err = sa_zfs_set_sharenfs(group, sharepath, 1); 9446185db85Sdougm } else { 9456185db85Sdougm err = sa_commit_share(scf_handle, group, 9466185db85Sdougm (sa_share_t)node); 9476185db85Sdougm } 9486185db85Sdougm } 9496185db85Sdougm if (err == SA_NO_PERMISSION && persist & SA_SHARE_PARSER) { 9506185db85Sdougm /* called by the dfstab parser so could be a show */ 9516185db85Sdougm err = SA_OK; 9526185db85Sdougm } 9536185db85Sdougm if (err != SA_OK) { 9546185db85Sdougm /* 9556185db85Sdougm * we couldn't commit to the repository so undo 9566185db85Sdougm * our internal state to reflect reality. 9576185db85Sdougm */ 9586185db85Sdougm xmlUnlinkNode(node); 9596185db85Sdougm xmlFreeNode(node); 9606185db85Sdougm node = NULL; 9616185db85Sdougm } 9626185db85Sdougm } else { 9636185db85Sdougm err = SA_NO_MEMORY; 9646185db85Sdougm } 9656185db85Sdougm if (error != NULL) 9666185db85Sdougm *error = err; 9676185db85Sdougm return (node); 9686185db85Sdougm } 9696185db85Sdougm 9706185db85Sdougm /* 9716185db85Sdougm * sa_add_share(group, sharepath, persist, *error) 9726185db85Sdougm * 9736185db85Sdougm * Add a new share object to the specified group. The share will 9746185db85Sdougm * have the specified sharepath and will only be constructed if 9756185db85Sdougm * it is a valid path to be shared. NULL is returned on error 9766185db85Sdougm * and a detailed error value will be returned via the error 9776185db85Sdougm * pointer. 9786185db85Sdougm */ 9796185db85Sdougm sa_share_t 9806185db85Sdougm sa_add_share(sa_group_t group, char *sharepath, int persist, int *error) 9816185db85Sdougm { 9826185db85Sdougm xmlNodePtr node = NULL; 9836185db85Sdougm sa_share_t dup; 984f345c0beSdougm int strictness = SA_CHECK_NORMAL; 985f345c0beSdougm 986f345c0beSdougm /* 987f345c0beSdougm * If the share is to be permanent, use strict checking so a 988f345c0beSdougm * bad config doesn't get created. Transient shares only need 989f345c0beSdougm * to check against the currently active 990f345c0beSdougm * shares. SA_SHARE_PARSER is a modifier used internally to 991f345c0beSdougm * indicate that we are being called by the dfstab parser and 992f345c0beSdougm * that we need strict checking in all cases. Normally persist 993f345c0beSdougm * is in integer value but SA_SHARE_PARSER may be or'd into 994f345c0beSdougm * it as an override. 995f345c0beSdougm */ 996f345c0beSdougm if (persist & SA_SHARE_PARSER || persist == SA_SHARE_PERMANENT) 997f345c0beSdougm strictness = SA_CHECK_STRICT; 9986185db85Sdougm 9996185db85Sdougm if ((dup = sa_find_share(sharepath)) == NULL && 1000f345c0beSdougm (*error = sa_check_path(group, sharepath, strictness)) == 1001f345c0beSdougm SA_OK) { 10026185db85Sdougm node = _sa_add_share(group, sharepath, persist, error); 10036185db85Sdougm } 10046185db85Sdougm if (dup != NULL) 10056185db85Sdougm *error = SA_DUPLICATE_NAME; 10066185db85Sdougm 10076185db85Sdougm return ((sa_share_t)node); 10086185db85Sdougm } 10096185db85Sdougm 10106185db85Sdougm /* 10116185db85Sdougm * sa_enable_share(share, protocol) 10126185db85Sdougm * Enable the specified share to the specified protocol. 10136185db85Sdougm * If protocol is NULL, then all protocols. 10146185db85Sdougm */ 10156185db85Sdougm int 10166185db85Sdougm sa_enable_share(sa_share_t share, char *protocol) 10176185db85Sdougm { 10186185db85Sdougm char *sharepath; 10196185db85Sdougm struct stat st; 10206185db85Sdougm int err = 0; 10216185db85Sdougm 10226185db85Sdougm sharepath = sa_get_share_attr(share, "path"); 10236185db85Sdougm if (stat(sharepath, &st) < 0) { 10246185db85Sdougm err = SA_NO_SUCH_PATH; 10256185db85Sdougm } else { 10266185db85Sdougm /* tell the server about the share */ 10276185db85Sdougm if (protocol != NULL) { 10286185db85Sdougm /* lookup protocol specific handler */ 10296185db85Sdougm err = sa_proto_share(protocol, share); 10306185db85Sdougm if (err == SA_OK) 10316185db85Sdougm (void) sa_set_share_attr(share, "shared", "true"); 10326185db85Sdougm } else { 10336185db85Sdougm /* tell all protocols */ 10346185db85Sdougm err = sa_proto_share("nfs", share); /* only NFS for now */ 10356185db85Sdougm (void) sa_set_share_attr(share, "shared", "true"); 10366185db85Sdougm } 10376185db85Sdougm } 10386185db85Sdougm if (sharepath != NULL) 10396185db85Sdougm sa_free_attr_string(sharepath); 10406185db85Sdougm return (err); 10416185db85Sdougm } 10426185db85Sdougm 10436185db85Sdougm /* 10446185db85Sdougm * sa_disable_share(share, protocol) 10456185db85Sdougm * Disable the specified share to the specified protocol. 10466185db85Sdougm * If protocol is NULL, then all protocols. 10476185db85Sdougm */ 10486185db85Sdougm int 10496185db85Sdougm sa_disable_share(sa_share_t share, char *protocol) 10506185db85Sdougm { 10516185db85Sdougm char *path; 10526185db85Sdougm char *shared; 10536185db85Sdougm int ret = SA_OK; 10546185db85Sdougm 10556185db85Sdougm path = sa_get_share_attr(share, "path"); 10566185db85Sdougm shared = sa_get_share_attr(share, "shared"); 10576185db85Sdougm 10586185db85Sdougm if (protocol != NULL) { 10596185db85Sdougm ret = sa_proto_unshare(protocol, path); 10606185db85Sdougm } else { 10616185db85Sdougm /* need to do all protocols */ 10626185db85Sdougm ret = sa_proto_unshare("nfs", path); 10636185db85Sdougm } 10646185db85Sdougm if (ret == SA_OK) 10656185db85Sdougm (void) sa_set_share_attr(share, "shared", NULL); 10666185db85Sdougm if (path != NULL) 10676185db85Sdougm sa_free_attr_string(path); 10686185db85Sdougm if (shared != NULL) 10696185db85Sdougm sa_free_attr_string(shared); 10706185db85Sdougm return (ret); 10716185db85Sdougm } 10726185db85Sdougm 10736185db85Sdougm /* 10746185db85Sdougm * sa_remove_share(share) 10756185db85Sdougm * 10766185db85Sdougm * remove the specified share from its containing group. 10776185db85Sdougm * Remove from the SMF or ZFS configuration space. 10786185db85Sdougm */ 10796185db85Sdougm 10806185db85Sdougm int 10816185db85Sdougm sa_remove_share(sa_share_t share) 10826185db85Sdougm { 10836185db85Sdougm sa_group_t group; 10846185db85Sdougm int ret = SA_OK; 10856185db85Sdougm char *type; 10866185db85Sdougm int transient = 0; 10876185db85Sdougm char *groupname; 10886185db85Sdougm char *zfs; 10896185db85Sdougm 10906185db85Sdougm type = sa_get_share_attr(share, "type"); 10916185db85Sdougm group = sa_get_parent_group(share); 10926185db85Sdougm zfs = sa_get_group_attr(group, "zfs"); 10936185db85Sdougm groupname = sa_get_group_attr(group, "name"); 10946185db85Sdougm if (type != NULL && strcmp(type, "persist") != 0) 10956185db85Sdougm transient = 1; 10966185db85Sdougm if (type != NULL) 10976185db85Sdougm sa_free_attr_string(type); 10986185db85Sdougm 10996185db85Sdougm /* remove the node from its group then free the memory */ 11006185db85Sdougm 11016185db85Sdougm /* 11026185db85Sdougm * need to test if "busy" 11036185db85Sdougm */ 11046185db85Sdougm /* only do SMF action if permanent */ 11056185db85Sdougm if (!transient || zfs != NULL) { 11066185db85Sdougm /* remove from legacy dfstab as well as possible SMF */ 11076185db85Sdougm ret = sa_delete_legacy(share); 11086185db85Sdougm if (ret == SA_OK) { 11096185db85Sdougm if (!sa_group_is_zfs(group)) { 11106185db85Sdougm ret = sa_delete_share(scf_handle, group, share); 11116185db85Sdougm } else { 11126185db85Sdougm char *sharepath = sa_get_share_attr(share, "path"); 11136185db85Sdougm if (sharepath != NULL) { 11146185db85Sdougm ret = sa_zfs_set_sharenfs(group, sharepath, 0); 11156185db85Sdougm sa_free_attr_string(sharepath); 11166185db85Sdougm } 11176185db85Sdougm } 11186185db85Sdougm } 11196185db85Sdougm } 11206185db85Sdougm if (groupname != NULL) 11216185db85Sdougm sa_free_attr_string(groupname); 11226185db85Sdougm if (zfs != NULL) 11236185db85Sdougm sa_free_attr_string(zfs); 11246185db85Sdougm 11256185db85Sdougm xmlUnlinkNode((xmlNodePtr)share); 11266185db85Sdougm xmlFreeNode((xmlNodePtr)share); 11276185db85Sdougm return (ret); 11286185db85Sdougm } 11296185db85Sdougm 11306185db85Sdougm /* 11316185db85Sdougm * sa_move_share(group, share) 11326185db85Sdougm * 11336185db85Sdougm * move the specified share to the specified group. Update SMF 11346185db85Sdougm * appropriately. 11356185db85Sdougm */ 11366185db85Sdougm 11376185db85Sdougm int 11386185db85Sdougm sa_move_share(sa_group_t group, sa_share_t share) 11396185db85Sdougm { 11406185db85Sdougm sa_group_t oldgroup; 11416185db85Sdougm int ret = SA_OK; 11426185db85Sdougm 11436185db85Sdougm /* remove the node from its group then free the memory */ 11446185db85Sdougm 11456185db85Sdougm oldgroup = sa_get_parent_group(share); 11466185db85Sdougm if (oldgroup != group) { 11476185db85Sdougm xmlUnlinkNode((xmlNodePtr)share); 11486185db85Sdougm /* now that the share isn't in its old group, add to the new one */ 11496185db85Sdougm xmlAddChild((xmlNodePtr)group, (xmlNodePtr)share); 11506185db85Sdougm /* need to deal with SMF */ 11516185db85Sdougm if (ret == SA_OK) { 11526185db85Sdougm /* 11536185db85Sdougm * need to remove from old group first and then add to 11546185db85Sdougm * new group. Ideally, we would do the other order but 11556185db85Sdougm * need to avoid having the share in two groups at the 11566185db85Sdougm * same time. 11576185db85Sdougm */ 11586185db85Sdougm ret = sa_delete_share(scf_handle, oldgroup, share); 11596185db85Sdougm } 11606185db85Sdougm ret = sa_commit_share(scf_handle, group, share); 11616185db85Sdougm } 11626185db85Sdougm return (ret); 11636185db85Sdougm } 11646185db85Sdougm 11656185db85Sdougm /* 11666185db85Sdougm * sa_get_parent_group(share) 11676185db85Sdougm * 11686185db85Sdougm * Return the containg group for the share. If a group was actually 11696185db85Sdougm * passed in, we don't want a parent so return NULL. 11706185db85Sdougm */ 11716185db85Sdougm 11726185db85Sdougm sa_group_t 11736185db85Sdougm sa_get_parent_group(sa_share_t share) 11746185db85Sdougm { 11756185db85Sdougm xmlNodePtr node = NULL; 11766185db85Sdougm if (share != NULL) { 11776185db85Sdougm node = ((xmlNodePtr)share)->parent; 11786185db85Sdougm /* 11796185db85Sdougm * make sure parent is a group and not sharecfg since 11806185db85Sdougm * we may be cheating and passing in a group. 11816185db85Sdougm * Eventually, groups of groups might come into being. 11826185db85Sdougm */ 11836185db85Sdougm if (node == NULL || 11846185db85Sdougm xmlStrcmp(node->name, (xmlChar *)"sharecfg") == 0) 11856185db85Sdougm node = NULL; 11866185db85Sdougm } 11876185db85Sdougm return ((sa_group_t)node); 11886185db85Sdougm } 11896185db85Sdougm 11906185db85Sdougm /* 11916185db85Sdougm * _sa_create_group(groupname) 11926185db85Sdougm * 11936185db85Sdougm * Create a group in the document. The caller will need to deal with 11946185db85Sdougm * configuration store and activation. 11956185db85Sdougm */ 11966185db85Sdougm 11976185db85Sdougm sa_group_t 11986185db85Sdougm _sa_create_group(char *groupname) 11996185db85Sdougm { 12006185db85Sdougm xmlNodePtr node = NULL; 12016185db85Sdougm 12026185db85Sdougm if (sa_valid_group_name(groupname)) { 12036185db85Sdougm node = xmlNewChild(sa_config_tree, NULL, 12046185db85Sdougm (xmlChar *)"group", NULL); 12056185db85Sdougm if (node != NULL) { 12066185db85Sdougm xmlSetProp(node, (xmlChar *)"name", (xmlChar *)groupname); 12076185db85Sdougm xmlSetProp(node, (xmlChar *)"state", (xmlChar *)"enabled"); 12086185db85Sdougm } 12096185db85Sdougm } 12106185db85Sdougm return ((sa_group_t)node); 12116185db85Sdougm } 12126185db85Sdougm 12136185db85Sdougm /* 12146185db85Sdougm * _sa_create_zfs_group(group, groupname) 12156185db85Sdougm * 12166185db85Sdougm * Create a ZFS subgroup under the specified group. This may 12176185db85Sdougm * eventually form the basis of general sub-groups, but is currently 12186185db85Sdougm * restricted to ZFS. 12196185db85Sdougm */ 12206185db85Sdougm sa_group_t 12216185db85Sdougm _sa_create_zfs_group(sa_group_t group, char *groupname) 12226185db85Sdougm { 12236185db85Sdougm xmlNodePtr node = NULL; 12246185db85Sdougm 12256185db85Sdougm node = xmlNewChild((xmlNodePtr)group, NULL, 12266185db85Sdougm (xmlChar *)"group", NULL); 12276185db85Sdougm if (node != NULL) { 12286185db85Sdougm xmlSetProp(node, (xmlChar *)"name", (xmlChar *)groupname); 12296185db85Sdougm xmlSetProp(node, (xmlChar *)"state", (xmlChar *)"enabled"); 12306185db85Sdougm } 12316185db85Sdougm 12326185db85Sdougm return ((sa_group_t)node); 12336185db85Sdougm } 12346185db85Sdougm 12356185db85Sdougm /* 12366185db85Sdougm * sa_create_group(groupname, *error) 12376185db85Sdougm * 12386185db85Sdougm * Create a new group with groupname. Need to validate that it is a 12396185db85Sdougm * legal name for SMF and the construct the SMF service instance of 12406185db85Sdougm * svc:/network/shares/group to implement the group. All necessary 12416185db85Sdougm * operational properties must be added to the group at this point 12426185db85Sdougm * (via the SMF transaction model). 12436185db85Sdougm */ 12446185db85Sdougm sa_group_t 12456185db85Sdougm sa_create_group(char *groupname, int *error) 12466185db85Sdougm { 12476185db85Sdougm xmlNodePtr node = NULL; 12486185db85Sdougm sa_group_t group; 12496185db85Sdougm int ret; 12506185db85Sdougm char rbacstr[256]; 12516185db85Sdougm 12526185db85Sdougm ret = SA_OK; 12536185db85Sdougm 12546185db85Sdougm if (scf_handle == NULL) { 12556185db85Sdougm ret = SA_SYSTEM_ERR; 12566185db85Sdougm goto err; 12576185db85Sdougm } 12586185db85Sdougm 12596185db85Sdougm group = sa_get_group(groupname); 12606185db85Sdougm if (group != NULL) { 12616185db85Sdougm ret = SA_DUPLICATE_NAME; 12626185db85Sdougm } else { 12636185db85Sdougm if (sa_valid_group_name(groupname)) { 12646185db85Sdougm node = xmlNewChild(sa_config_tree, NULL, 12656185db85Sdougm (xmlChar *)"group", NULL); 12666185db85Sdougm if (node != NULL) { 12676185db85Sdougm xmlSetProp(node, (xmlChar *)"name", (xmlChar *)groupname); 12686185db85Sdougm /* default to the group being enabled */ 12696185db85Sdougm xmlSetProp(node, (xmlChar *)"state", (xmlChar *)"enabled"); 12706185db85Sdougm ret = sa_create_instance(scf_handle, groupname); 12716185db85Sdougm if (ret == SA_OK) { 12726185db85Sdougm ret = sa_start_transaction(scf_handle, "operation"); 12736185db85Sdougm } 12746185db85Sdougm if (ret == SA_OK) { 12756185db85Sdougm ret = sa_set_property(scf_handle, "state", "enabled"); 12766185db85Sdougm if (ret == SA_OK) { 12776185db85Sdougm ret = sa_end_transaction(scf_handle); 12786185db85Sdougm } else { 12796185db85Sdougm sa_abort_transaction(scf_handle); 12806185db85Sdougm } 12816185db85Sdougm } 12826185db85Sdougm if (ret == SA_OK) { 12836185db85Sdougm /* initialize the RBAC strings */ 12846185db85Sdougm ret = sa_start_transaction(scf_handle, "general"); 12856185db85Sdougm if (ret == SA_OK) { 12866185db85Sdougm (void) snprintf(rbacstr, sizeof (rbacstr), "%s.%s", 12876185db85Sdougm SA_RBAC_MANAGE, groupname); 12886185db85Sdougm ret = sa_set_property(scf_handle, 12896185db85Sdougm "action_authorization", 12906185db85Sdougm rbacstr); 12916185db85Sdougm } 12926185db85Sdougm if (ret == SA_OK) { 12936185db85Sdougm (void) snprintf(rbacstr, sizeof (rbacstr), "%s.%s", 12946185db85Sdougm SA_RBAC_VALUE, groupname); 12956185db85Sdougm ret = sa_set_property(scf_handle, 12966185db85Sdougm "value_authorization", 12976185db85Sdougm rbacstr); 12986185db85Sdougm } 12996185db85Sdougm if (ret == SA_OK) { 13006185db85Sdougm ret = sa_end_transaction(scf_handle); 13016185db85Sdougm } else { 13026185db85Sdougm sa_abort_transaction(scf_handle); 13036185db85Sdougm } 13046185db85Sdougm } 13056185db85Sdougm if (ret != SA_OK) { 13066185db85Sdougm /* 13076185db85Sdougm * Couldn't commit the group so we need to 13086185db85Sdougm * undo internally. 13096185db85Sdougm */ 13106185db85Sdougm xmlUnlinkNode(node); 13116185db85Sdougm xmlFreeNode(node); 13126185db85Sdougm node = NULL; 13136185db85Sdougm } 13146185db85Sdougm } else { 13156185db85Sdougm ret = SA_NO_MEMORY; 13166185db85Sdougm } 13176185db85Sdougm } else { 13186185db85Sdougm ret = SA_INVALID_NAME; 13196185db85Sdougm } 13206185db85Sdougm } 13216185db85Sdougm err: 13226185db85Sdougm if (error != NULL) 13236185db85Sdougm *error = ret; 13246185db85Sdougm return ((sa_group_t)node); 13256185db85Sdougm } 13266185db85Sdougm 13276185db85Sdougm /* 13286185db85Sdougm * sa_remove_group(group) 13296185db85Sdougm * 13306185db85Sdougm * Remove the specified group. This deletes from the SMF repository. 13316185db85Sdougm * All property groups and properties are removed. 13326185db85Sdougm */ 13336185db85Sdougm 13346185db85Sdougm int 13356185db85Sdougm sa_remove_group(sa_group_t group) 13366185db85Sdougm { 13376185db85Sdougm char *name; 13386185db85Sdougm int ret = SA_OK; 13396185db85Sdougm 13406185db85Sdougm name = sa_get_group_attr(group, "name"); 13416185db85Sdougm if (name != NULL) { 13426185db85Sdougm ret = sa_delete_instance(scf_handle, name); 13436185db85Sdougm sa_free_attr_string(name); 13446185db85Sdougm } 13456185db85Sdougm xmlUnlinkNode((xmlNodePtr)group); /* make sure unlinked */ 13466185db85Sdougm xmlFreeNode((xmlNodePtr)group); /* now it is gone */ 13476185db85Sdougm return (ret); 13486185db85Sdougm } 13496185db85Sdougm 13506185db85Sdougm /* 13516185db85Sdougm * sa_update_config() 13526185db85Sdougm * 13536185db85Sdougm * Used to update legacy files that need to be updated in bulk 13546185db85Sdougm * Currently, this is a placeholder and will go away in a future 13556185db85Sdougm * release. 13566185db85Sdougm */ 13576185db85Sdougm 13586185db85Sdougm int 13596185db85Sdougm sa_update_config() 13606185db85Sdougm { 13616185db85Sdougm /* 13626185db85Sdougm * do legacy files first so we can tell when they change. 13636185db85Sdougm * This will go away when we start updating individual records 13646185db85Sdougm * rather than the whole file. 13656185db85Sdougm */ 13666185db85Sdougm update_legacy_config(); 13676185db85Sdougm return (SA_OK); 13686185db85Sdougm } 13696185db85Sdougm 13706185db85Sdougm /* 13716185db85Sdougm * get_node_attr(node, tag) 13726185db85Sdougm * 13736185db85Sdougm * Get the speficied tag(attribute) if it exists on the node. This is 13746185db85Sdougm * used internally by a number of attribute oriented functions. 13756185db85Sdougm */ 13766185db85Sdougm 13776185db85Sdougm static char * 13786185db85Sdougm get_node_attr(void *nodehdl, char *tag) 13796185db85Sdougm { 13806185db85Sdougm xmlNodePtr node = (xmlNodePtr)nodehdl; 13816185db85Sdougm xmlChar *name = NULL; 13826185db85Sdougm 13836185db85Sdougm if (node != NULL) { 13846185db85Sdougm name = xmlGetProp(node, (xmlChar *)tag); 13856185db85Sdougm } 13866185db85Sdougm return ((char *)name); 13876185db85Sdougm } 13886185db85Sdougm 13896185db85Sdougm /* 13906185db85Sdougm * get_node_attr(node, tag) 13916185db85Sdougm * 13926185db85Sdougm * Set the speficied tag(attribute) to the specified value This is 13936185db85Sdougm * used internally by a number of attribute oriented functions. It 13946185db85Sdougm * doesn't update the repository, only the internal document state. 13956185db85Sdougm */ 13966185db85Sdougm 13976185db85Sdougm void 13986185db85Sdougm set_node_attr(void *nodehdl, char *tag, char *value) 13996185db85Sdougm { 14006185db85Sdougm xmlNodePtr node = (xmlNodePtr)nodehdl; 14016185db85Sdougm if (node != NULL && tag != NULL) { 14026185db85Sdougm if (value != NULL) { 14036185db85Sdougm xmlSetProp(node, (xmlChar *)tag, (xmlChar *)value); 14046185db85Sdougm } else { 14056185db85Sdougm xmlUnsetProp(node, (xmlChar *)tag); 14066185db85Sdougm } 14076185db85Sdougm } 14086185db85Sdougm } 14096185db85Sdougm 14106185db85Sdougm /* 14116185db85Sdougm * sa_get_group_attr(group, tag) 14126185db85Sdougm * 14136185db85Sdougm * Get the specied attribute, if defined, for the group. 14146185db85Sdougm */ 14156185db85Sdougm 14166185db85Sdougm char * 14176185db85Sdougm sa_get_group_attr(sa_group_t group, char *tag) 14186185db85Sdougm { 14196185db85Sdougm return (get_node_attr((void *)group, tag)); 14206185db85Sdougm } 14216185db85Sdougm 14226185db85Sdougm /* 14236185db85Sdougm * sa_set_group_attr(group, tag, value) 14246185db85Sdougm * 14256185db85Sdougm * set the specified tag/attribute on the group using value as its 14266185db85Sdougm * value. 14276185db85Sdougm * 14286185db85Sdougm * This will result in setting the property in the SMF repository as 14296185db85Sdougm * well as in the internal document. 14306185db85Sdougm */ 14316185db85Sdougm 14326185db85Sdougm int 14336185db85Sdougm sa_set_group_attr(sa_group_t group, char *tag, char *value) 14346185db85Sdougm { 14356185db85Sdougm int ret; 14366185db85Sdougm char *groupname; 14376185db85Sdougm 14386185db85Sdougm groupname = sa_get_group_attr(group, "name"); 14396185db85Sdougm ret = sa_get_instance(scf_handle, groupname); 14406185db85Sdougm if (ret == SA_OK) { 14416185db85Sdougm set_node_attr((void *)group, tag, value); 14426185db85Sdougm ret = sa_start_transaction(scf_handle, "operation"); 14436185db85Sdougm if (ret == SA_OK) { 14446185db85Sdougm ret = sa_set_property(scf_handle, tag, value); 14456185db85Sdougm if (ret == SA_OK) 14466185db85Sdougm (void) sa_end_transaction(scf_handle); 14476185db85Sdougm else { 14486185db85Sdougm sa_abort_transaction(scf_handle); 14496185db85Sdougm } 14506185db85Sdougm } 14516185db85Sdougm } 14526185db85Sdougm if (groupname != NULL) 14536185db85Sdougm sa_free_attr_string(groupname); 14546185db85Sdougm return (ret); 14556185db85Sdougm } 14566185db85Sdougm 14576185db85Sdougm /* 14586185db85Sdougm * sa_get_share_attr(share, tag) 14596185db85Sdougm * 14606185db85Sdougm * Return the value of the tag/attribute set on the specified 14616185db85Sdougm * share. Returns NULL if the tag doesn't exist. 14626185db85Sdougm */ 14636185db85Sdougm 14646185db85Sdougm char * 14656185db85Sdougm sa_get_share_attr(sa_share_t share, char *tag) 14666185db85Sdougm { 14676185db85Sdougm return (get_node_attr((void *)share, tag)); 14686185db85Sdougm } 14696185db85Sdougm 14706185db85Sdougm /* 14716185db85Sdougm * sa_get_resource(group, resource) 14726185db85Sdougm * 14736185db85Sdougm * Search all the shares in the speified group for a share with a 14746185db85Sdougm * resource name matching the one specified. 14756185db85Sdougm * 14766185db85Sdougm * In the future, it may be advantageous to allow group to be NULL and 14776185db85Sdougm * search all groups but that isn't needed at present. 14786185db85Sdougm */ 14796185db85Sdougm 14806185db85Sdougm sa_share_t 14816185db85Sdougm sa_get_resource(sa_group_t group, char *resource) 14826185db85Sdougm { 14836185db85Sdougm sa_share_t share = NULL; 14846185db85Sdougm char *name = NULL; 14856185db85Sdougm 14866185db85Sdougm if (resource != NULL) { 14876185db85Sdougm for (share = sa_get_share(group, NULL); share != NULL; 14886185db85Sdougm share = sa_get_next_share(share)) { 14896185db85Sdougm name = sa_get_share_attr(share, "resource"); 14906185db85Sdougm if (name != NULL) { 14916185db85Sdougm if (strcmp(name, resource) == 0) 14926185db85Sdougm break; 14936185db85Sdougm sa_free_attr_string(name); 14946185db85Sdougm name = NULL; 14956185db85Sdougm } 14966185db85Sdougm } 14976185db85Sdougm if (name != NULL) 14986185db85Sdougm sa_free_attr_string(name); 14996185db85Sdougm } 15006185db85Sdougm return ((sa_share_t)share); 15016185db85Sdougm } 15026185db85Sdougm 15036185db85Sdougm /* 15046185db85Sdougm * _sa_set_share_description(share, description) 15056185db85Sdougm * 15066185db85Sdougm * Add a description tag with text contents to the specified share. 15076185db85Sdougm * A separate XML tag is used rather than a property. 15086185db85Sdougm */ 15096185db85Sdougm 15106185db85Sdougm xmlNodePtr 15116185db85Sdougm _sa_set_share_description(sa_share_t share, char *content) 15126185db85Sdougm { 15136185db85Sdougm xmlNodePtr node; 15146185db85Sdougm node = xmlNewChild((xmlNodePtr)share, 15156185db85Sdougm NULL, (xmlChar *)"description", NULL); 15166185db85Sdougm xmlNodeSetContent(node, (xmlChar *)content); 15176185db85Sdougm return (node); 15186185db85Sdougm } 15196185db85Sdougm 15206185db85Sdougm /* 15216185db85Sdougm * sa_set_share_attr(share, tag, value) 15226185db85Sdougm * 15236185db85Sdougm * Set the share attribute specified by tag to the specified value. In 15246185db85Sdougm * the case of "resource", enforce a no duplicates in a group rule. If 15256185db85Sdougm * the share is not transient, commit the changes to the repository 15266185db85Sdougm * else just update the share internally. 15276185db85Sdougm */ 15286185db85Sdougm 15296185db85Sdougm int 15306185db85Sdougm sa_set_share_attr(sa_share_t share, char *tag, char *value) 15316185db85Sdougm { 15326185db85Sdougm sa_group_t group; 15336185db85Sdougm sa_share_t resource; 15346185db85Sdougm int ret = SA_OK; 15356185db85Sdougm 15366185db85Sdougm group = sa_get_parent_group(share); 15376185db85Sdougm 15386185db85Sdougm /* 15396185db85Sdougm * There are some attributes that may have specific 15406185db85Sdougm * restrictions on them. Initially, only "resource" has 15416185db85Sdougm * special meaning that needs to be checked. Only one instance 15426185db85Sdougm * of a resource name may exist within a group. 15436185db85Sdougm */ 15446185db85Sdougm 15456185db85Sdougm if (strcmp(tag, "resource") == 0) { 15466185db85Sdougm resource = sa_get_resource(group, value); 15476185db85Sdougm if (resource != share && resource != NULL) 15486185db85Sdougm ret = SA_DUPLICATE_NAME; 15496185db85Sdougm } 15506185db85Sdougm if (ret == SA_OK) { 15516185db85Sdougm set_node_attr((void *)share, tag, value); 15526185db85Sdougm if (group != NULL) { 15536185db85Sdougm char *type; 15546185db85Sdougm /* we can probably optimize this some */ 15556185db85Sdougm type = sa_get_share_attr(share, "type"); 15566185db85Sdougm if (type == NULL || strcmp(type, "transient") != 0) 15576185db85Sdougm ret = sa_commit_share(scf_handle, group, share); 15586185db85Sdougm if (type != NULL) 15596185db85Sdougm sa_free_attr_string(type); 15606185db85Sdougm } 15616185db85Sdougm } 15626185db85Sdougm return (ret); 15636185db85Sdougm } 15646185db85Sdougm 15656185db85Sdougm /* 15666185db85Sdougm * sa_get_property_attr(prop, tag) 15676185db85Sdougm * 15686185db85Sdougm * Get the value of the specified property attribute. Standard 15696185db85Sdougm * attributes are "type" and "value". 15706185db85Sdougm */ 15716185db85Sdougm 15726185db85Sdougm char * 15736185db85Sdougm sa_get_property_attr(sa_property_t prop, char *tag) 15746185db85Sdougm { 15756185db85Sdougm return (get_node_attr((void *)prop, tag)); 15766185db85Sdougm } 15776185db85Sdougm 15786185db85Sdougm /* 15796185db85Sdougm * sa_get_optionset_attr(prop, tag) 15806185db85Sdougm * 15816185db85Sdougm * Get the value of the specified property attribute. Standard 15826185db85Sdougm * attribute is "type". 15836185db85Sdougm */ 15846185db85Sdougm 15856185db85Sdougm char * 15866185db85Sdougm sa_get_optionset_attr(sa_property_t optionset, char *tag) 15876185db85Sdougm { 15886185db85Sdougm return (get_node_attr((void *)optionset, tag)); 15896185db85Sdougm 15906185db85Sdougm } 15916185db85Sdougm 15926185db85Sdougm /* 15936185db85Sdougm * sa_set_optionset_attr(optionset, tag, value) 15946185db85Sdougm * 15956185db85Sdougm * Set the specified attribute(tag) to the specified value on the 15966185db85Sdougm * optionset. 15976185db85Sdougm */ 15986185db85Sdougm 15996185db85Sdougm void 16006185db85Sdougm sa_set_optionset_attr(sa_group_t optionset, char *tag, char *value) 16016185db85Sdougm { 16026185db85Sdougm set_node_attr((void *)optionset, tag, value); 16036185db85Sdougm } 16046185db85Sdougm 16056185db85Sdougm /* 16066185db85Sdougm * sa_free_attr_string(string) 16076185db85Sdougm * 16086185db85Sdougm * Free the string that was returned in one of the sa_get_*_attr() 16096185db85Sdougm * functions. 16106185db85Sdougm */ 16116185db85Sdougm 16126185db85Sdougm void 16136185db85Sdougm sa_free_attr_string(char *string) 16146185db85Sdougm { 16156185db85Sdougm xmlFree((xmlChar *)string); 16166185db85Sdougm } 16176185db85Sdougm 16186185db85Sdougm /* 16196185db85Sdougm * sa_get_optionset(group, proto) 16206185db85Sdougm * 16216185db85Sdougm * Return the optionset, if it exists, that is associated with the 16226185db85Sdougm * specified protocol. 16236185db85Sdougm */ 16246185db85Sdougm 16256185db85Sdougm sa_optionset_t 16266185db85Sdougm sa_get_optionset(void *group, char *proto) 16276185db85Sdougm { 16286185db85Sdougm xmlNodePtr node; 16296185db85Sdougm xmlChar *value = NULL; 16306185db85Sdougm 16316185db85Sdougm for (node = ((xmlNodePtr)group)->children; node != NULL; 16326185db85Sdougm node = node->next) { 16336185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"optionset") == 0) { 16346185db85Sdougm value = xmlGetProp(node, (xmlChar *)"type"); 16356185db85Sdougm if (proto != NULL) { 16366185db85Sdougm if (value != NULL && 16376185db85Sdougm xmlStrcmp(value, (xmlChar *)proto) == 0) { 16386185db85Sdougm break; 16396185db85Sdougm } 16406185db85Sdougm if (value != NULL) { 16416185db85Sdougm xmlFree(value); 16426185db85Sdougm value = NULL; 16436185db85Sdougm } 16446185db85Sdougm } else { 16456185db85Sdougm break; 16466185db85Sdougm } 16476185db85Sdougm } 16486185db85Sdougm } 16496185db85Sdougm if (value != NULL) 16506185db85Sdougm xmlFree(value); 16516185db85Sdougm return ((sa_optionset_t)node); 16526185db85Sdougm } 16536185db85Sdougm 16546185db85Sdougm /* 16556185db85Sdougm * sa_get_next_optionset(optionset) 16566185db85Sdougm * 16576185db85Sdougm * Return the next optionset in the group. NULL if this was the last. 16586185db85Sdougm */ 16596185db85Sdougm 16606185db85Sdougm sa_optionset_t 16616185db85Sdougm sa_get_next_optionset(sa_optionset_t optionset) 16626185db85Sdougm { 16636185db85Sdougm xmlNodePtr node; 16646185db85Sdougm 16656185db85Sdougm for (node = ((xmlNodePtr)optionset)->next; node != NULL; 16666185db85Sdougm node = node->next) { 16676185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"optionset") == 0) { 16686185db85Sdougm break; 16696185db85Sdougm } 16706185db85Sdougm } 16716185db85Sdougm return ((sa_optionset_t)node); 16726185db85Sdougm } 16736185db85Sdougm 16746185db85Sdougm /* 16756185db85Sdougm * sa_get_security(group, sectype, proto) 16766185db85Sdougm * 16776185db85Sdougm * Return the security optionset. The internal name is a hold over 16786185db85Sdougm * from the implementation and will be changed before the API is 16796185db85Sdougm * finalized. This is really a named optionset that can be negotiated 16806185db85Sdougm * as a group of properties (like NFS security options). 16816185db85Sdougm */ 16826185db85Sdougm 16836185db85Sdougm sa_security_t 16846185db85Sdougm sa_get_security(sa_group_t group, char *sectype, char *proto) 16856185db85Sdougm { 16866185db85Sdougm xmlNodePtr node; 16876185db85Sdougm xmlChar *value = NULL; 16886185db85Sdougm 16896185db85Sdougm for (node = ((xmlNodePtr)group)->children; node != NULL; 16906185db85Sdougm node = node->next) { 16916185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"security") == 0) { 16926185db85Sdougm if (proto != NULL) { 16936185db85Sdougm value = xmlGetProp(node, (xmlChar *)"type"); 16946185db85Sdougm if (value == NULL || 16956185db85Sdougm (value != NULL && 16966185db85Sdougm xmlStrcmp(value, (xmlChar *)proto) != 0)) { 16976185db85Sdougm /* it doesn't match so continue */ 16986185db85Sdougm xmlFree(value); 16996185db85Sdougm value = NULL; 17006185db85Sdougm continue; 17016185db85Sdougm } 17026185db85Sdougm } 17036185db85Sdougm if (value != NULL) { 17046185db85Sdougm xmlFree(value); 17056185db85Sdougm value = NULL; 17066185db85Sdougm } 17076185db85Sdougm /* potential match */ 17086185db85Sdougm if (sectype != NULL) { 17096185db85Sdougm value = xmlGetProp(node, (xmlChar *)"sectype"); 17106185db85Sdougm if (value != NULL && 17116185db85Sdougm xmlStrcmp(value, (xmlChar *)sectype) == 0) { 17126185db85Sdougm break; 17136185db85Sdougm } 17146185db85Sdougm } else { 17156185db85Sdougm break; 17166185db85Sdougm } 17176185db85Sdougm } 17186185db85Sdougm if (value != NULL) { 17196185db85Sdougm xmlFree(value); 17206185db85Sdougm value = NULL; 17216185db85Sdougm } 17226185db85Sdougm } 17236185db85Sdougm if (value != NULL) 17246185db85Sdougm xmlFree(value); 17256185db85Sdougm return ((sa_security_t)node); 17266185db85Sdougm } 17276185db85Sdougm 17286185db85Sdougm /* 17296185db85Sdougm * sa_get_next_security(security) 17306185db85Sdougm * 17316185db85Sdougm * Get the next security optionset if one exists. 17326185db85Sdougm */ 17336185db85Sdougm 17346185db85Sdougm sa_security_t 17356185db85Sdougm sa_get_next_security(sa_security_t security) 17366185db85Sdougm { 17376185db85Sdougm xmlNodePtr node; 17386185db85Sdougm 17396185db85Sdougm for (node = ((xmlNodePtr)security)->next; node != NULL; 17406185db85Sdougm node = node->next) { 17416185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"security") == 0) { 17426185db85Sdougm break; 17436185db85Sdougm } 17446185db85Sdougm } 17456185db85Sdougm return ((sa_security_t)node); 17466185db85Sdougm } 17476185db85Sdougm 17486185db85Sdougm /* 17496185db85Sdougm * sa_get_property(optionset, prop) 17506185db85Sdougm * 17516185db85Sdougm * Get the property object with the name specified in prop from the 17526185db85Sdougm * optionset. 17536185db85Sdougm */ 17546185db85Sdougm 17556185db85Sdougm sa_property_t 17566185db85Sdougm sa_get_property(sa_optionset_t optionset, char *prop) 17576185db85Sdougm { 17586185db85Sdougm xmlNodePtr node = (xmlNodePtr)optionset; 17596185db85Sdougm xmlChar *value = NULL; 17606185db85Sdougm 17616185db85Sdougm if (optionset == NULL) 17626185db85Sdougm return (NULL); 17636185db85Sdougm 17646185db85Sdougm for (node = node->children; node != NULL; 17656185db85Sdougm node = node->next) { 17666185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"option") == 0) { 17676185db85Sdougm if (prop == NULL) 17686185db85Sdougm break; 17696185db85Sdougm value = xmlGetProp(node, (xmlChar *)"type"); 17706185db85Sdougm if (value != NULL && xmlStrcmp(value, (xmlChar *)prop) == 0) { 17716185db85Sdougm break; 17726185db85Sdougm } 17736185db85Sdougm if (value != NULL) { 17746185db85Sdougm xmlFree(value); 17756185db85Sdougm value = NULL; 17766185db85Sdougm } 17776185db85Sdougm } 17786185db85Sdougm } 17796185db85Sdougm if (value != NULL) 17806185db85Sdougm xmlFree(value); 17816185db85Sdougm if (node != NULL && xmlStrcmp(node->name, (xmlChar *)"option") != 0) { 17826185db85Sdougm /* avoid a non option node -- it is possible to be a text node */ 17836185db85Sdougm node = NULL; 17846185db85Sdougm } 17856185db85Sdougm return ((sa_property_t)node); 17866185db85Sdougm } 17876185db85Sdougm 17886185db85Sdougm /* 17896185db85Sdougm * sa_get_next_property(property) 17906185db85Sdougm * 17916185db85Sdougm * Get the next property following the specified property. NULL if 17926185db85Sdougm * this was the last. 17936185db85Sdougm */ 17946185db85Sdougm 17956185db85Sdougm sa_property_t 17966185db85Sdougm sa_get_next_property(sa_property_t property) 17976185db85Sdougm { 17986185db85Sdougm xmlNodePtr node; 17996185db85Sdougm 18006185db85Sdougm for (node = ((xmlNodePtr)property)->next; node != NULL; 18016185db85Sdougm node = node->next) { 18026185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"option") == 0) { 18036185db85Sdougm break; 18046185db85Sdougm } 18056185db85Sdougm } 18066185db85Sdougm return ((sa_property_t)node); 18076185db85Sdougm } 18086185db85Sdougm 18096185db85Sdougm /* 18106185db85Sdougm * sa_set_share_description(share, content) 18116185db85Sdougm * 18126185db85Sdougm * Set the description of share to content. 18136185db85Sdougm */ 18146185db85Sdougm 18156185db85Sdougm int 18166185db85Sdougm sa_set_share_description(sa_share_t share, char *content) 18176185db85Sdougm { 18186185db85Sdougm xmlNodePtr node; 18196185db85Sdougm sa_group_t group; 18206185db85Sdougm int ret = SA_OK; 18216185db85Sdougm 18226185db85Sdougm for (node = ((xmlNodePtr)share)->children; node != NULL; 18236185db85Sdougm node = node->next) { 18246185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"description") == 0) { 18256185db85Sdougm break; 18266185db85Sdougm } 18276185db85Sdougm } 18286185db85Sdougm group = sa_get_parent_group(share); 18296185db85Sdougm /* no existing description but want to add */ 18306185db85Sdougm if (node == NULL && content != NULL) { 18316185db85Sdougm /* add a description */ 18326185db85Sdougm node = _sa_set_share_description(share, content); 18336185db85Sdougm } else if (node != NULL && content != NULL) { 18346185db85Sdougm /* update a description */ 18356185db85Sdougm xmlNodeSetContent(node, (xmlChar *)content); 18366185db85Sdougm } else if (node != NULL && content == NULL) { 18376185db85Sdougm /* remove an existing description */ 18386185db85Sdougm xmlUnlinkNode(node); 18396185db85Sdougm xmlFreeNode(node); 18406185db85Sdougm } 18416185db85Sdougm if (group != NULL && is_persistent((sa_group_t)share)) 18426185db85Sdougm ret = sa_commit_share(scf_handle, group, share); 18436185db85Sdougm return (ret); 18446185db85Sdougm } 18456185db85Sdougm 18466185db85Sdougm /* 18476185db85Sdougm * fixproblemchars(string) 18486185db85Sdougm * 18496185db85Sdougm * don't want any newline or tab characters in the text since these 18506185db85Sdougm * could break display of data and legacy file formats. 18516185db85Sdougm */ 18526185db85Sdougm static void 18536185db85Sdougm fixproblemchars(char *str) 18546185db85Sdougm { 18556185db85Sdougm int c; 18566185db85Sdougm for (c = *str; c != '\0'; c = *++str) { 18576185db85Sdougm if (c == '\t' || c == '\n') 18586185db85Sdougm *str = ' '; 18596185db85Sdougm else if (c == '"') 18606185db85Sdougm *str = '\''; 18616185db85Sdougm } 18626185db85Sdougm } 18636185db85Sdougm 18646185db85Sdougm /* 18656185db85Sdougm * sa_get_share_description(share) 18666185db85Sdougm * 18676185db85Sdougm * Return the description text for the specified share if it 18686185db85Sdougm * exists. NULL if no description exists. 18696185db85Sdougm */ 18706185db85Sdougm 18716185db85Sdougm char * 18726185db85Sdougm sa_get_share_description(sa_share_t share) 18736185db85Sdougm { 18746185db85Sdougm xmlChar *description = NULL; 18756185db85Sdougm xmlNodePtr node; 18766185db85Sdougm 18776185db85Sdougm for (node = ((xmlNodePtr)share)->children; node != NULL; 18786185db85Sdougm node = node->next) { 18796185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"description") == 0) { 18806185db85Sdougm break; 18816185db85Sdougm } 18826185db85Sdougm } 18836185db85Sdougm if (node != NULL) { 18846185db85Sdougm description = xmlNodeGetContent((xmlNodePtr)share); 18856185db85Sdougm fixproblemchars((char *)description); 18866185db85Sdougm } 18876185db85Sdougm return ((char *)description); 18886185db85Sdougm } 18896185db85Sdougm 18906185db85Sdougm /* 18916185db85Sdougm * sa_free(share_description(description) 18926185db85Sdougm * 18936185db85Sdougm * Free the description string. 18946185db85Sdougm */ 18956185db85Sdougm 18966185db85Sdougm void 18976185db85Sdougm sa_free_share_description(char *description) 18986185db85Sdougm { 18996185db85Sdougm xmlFree((xmlChar *)description); 19006185db85Sdougm } 19016185db85Sdougm 19026185db85Sdougm /* 19036185db85Sdougm * sa_create_optionset(group, proto) 19046185db85Sdougm * 19056185db85Sdougm * Create an optionset for the specified protocol in the specied 19066185db85Sdougm * group. This is manifested as a property group within SMF. 19076185db85Sdougm */ 19086185db85Sdougm 19096185db85Sdougm sa_optionset_t 19106185db85Sdougm sa_create_optionset(sa_group_t group, char *proto) 19116185db85Sdougm { 19126185db85Sdougm sa_optionset_t optionset; 19136185db85Sdougm sa_group_t parent = group; 19146185db85Sdougm 19156185db85Sdougm optionset = sa_get_optionset(group, proto); 19166185db85Sdougm if (optionset != NULL) { 19176185db85Sdougm /* can't have a duplicate protocol */ 19186185db85Sdougm optionset = NULL; 19196185db85Sdougm } else { 19206185db85Sdougm optionset = (sa_optionset_t)xmlNewChild((xmlNodePtr)group, 19216185db85Sdougm NULL, 19226185db85Sdougm (xmlChar *)"optionset", 19236185db85Sdougm NULL); 19246185db85Sdougm /* 19256185db85Sdougm * only put to repository if on a group and we were 19266185db85Sdougm * able to create an optionset. 19276185db85Sdougm */ 19286185db85Sdougm if (optionset != NULL) { 19296185db85Sdougm char oname[256]; 19306185db85Sdougm char *groupname; 19316185db85Sdougm char *id = NULL; 19326185db85Sdougm 19336185db85Sdougm if (sa_is_share(group)) 19346185db85Sdougm parent = sa_get_parent_group((sa_share_t)group); 19356185db85Sdougm 19366185db85Sdougm sa_set_optionset_attr(optionset, "type", proto); 19376185db85Sdougm 19386185db85Sdougm if (sa_is_share(group)) { 19396185db85Sdougm id = sa_get_share_attr((sa_share_t)group, "id"); 19406185db85Sdougm } 19416185db85Sdougm (void) sa_optionset_name(optionset, oname, 19426185db85Sdougm sizeof (oname), id); 19436185db85Sdougm groupname = sa_get_group_attr(parent, "name"); 19446185db85Sdougm if (groupname != NULL && is_persistent(group)) { 19456185db85Sdougm (void) sa_get_instance(scf_handle, groupname); 19466185db85Sdougm sa_free_attr_string(groupname); 19476185db85Sdougm (void) sa_create_pgroup(scf_handle, oname); 19486185db85Sdougm } 19496185db85Sdougm if (id != NULL) 19506185db85Sdougm sa_free_attr_string(id); 19516185db85Sdougm } 19526185db85Sdougm } 19536185db85Sdougm return (optionset); 19546185db85Sdougm } 19556185db85Sdougm 19566185db85Sdougm /* 19576185db85Sdougm * sa_get_property_parent(property) 19586185db85Sdougm * 19596185db85Sdougm * Given a property, return the object it is a property of. This will 19606185db85Sdougm * be an optionset of some type. 19616185db85Sdougm */ 19626185db85Sdougm 19636185db85Sdougm static sa_optionset_t 19646185db85Sdougm sa_get_property_parent(sa_property_t property) 19656185db85Sdougm { 19666185db85Sdougm xmlNodePtr node = NULL; 19676185db85Sdougm 19686185db85Sdougm if (property != NULL) { 19696185db85Sdougm node = ((xmlNodePtr)property)->parent; 19706185db85Sdougm } 19716185db85Sdougm return ((sa_optionset_t)node); 19726185db85Sdougm } 19736185db85Sdougm 19746185db85Sdougm /* 19756185db85Sdougm * sa_get_optionset_parent(optionset) 19766185db85Sdougm * 19776185db85Sdougm * Return the parent of the specified optionset. This could be a group 19786185db85Sdougm * or a share. 19796185db85Sdougm */ 19806185db85Sdougm 19816185db85Sdougm static sa_group_t 19826185db85Sdougm sa_get_optionset_parent(sa_optionset_t optionset) 19836185db85Sdougm { 19846185db85Sdougm xmlNodePtr node = NULL; 19856185db85Sdougm 19866185db85Sdougm if (optionset != NULL) { 19876185db85Sdougm node = ((xmlNodePtr)optionset)->parent; 19886185db85Sdougm } 19896185db85Sdougm return ((sa_group_t)node); 19906185db85Sdougm } 19916185db85Sdougm 19926185db85Sdougm /* 19936185db85Sdougm * zfs_needs_update(share) 19946185db85Sdougm * 19956185db85Sdougm * In order to avoid making multiple updates to a ZFS share when 19966185db85Sdougm * setting properties, the share attribute "changed" will be set to 19976185db85Sdougm * true when a property is added or modifed. When done adding 19986185db85Sdougm * properties, we can then detect that an update is needed. We then 19996185db85Sdougm * clear the state here to detect additional changes. 20006185db85Sdougm */ 20016185db85Sdougm 20026185db85Sdougm static int 20036185db85Sdougm zfs_needs_update(sa_share_t share) 20046185db85Sdougm { 20056185db85Sdougm char *attr; 20066185db85Sdougm int result = 0; 20076185db85Sdougm 20086185db85Sdougm attr = sa_get_share_attr(share, "changed"); 20096185db85Sdougm if (attr != NULL) { 20106185db85Sdougm sa_free_attr_string(attr); 20116185db85Sdougm result = 1; 20126185db85Sdougm } 20136185db85Sdougm set_node_attr((void *)share, "changed", NULL); 20146185db85Sdougm return (result); 20156185db85Sdougm } 20166185db85Sdougm 20176185db85Sdougm /* 20186185db85Sdougm * zfs_set_update(share) 20196185db85Sdougm * 20206185db85Sdougm * Set the changed attribute of the share to true. 20216185db85Sdougm */ 20226185db85Sdougm 20236185db85Sdougm static void 20246185db85Sdougm zfs_set_update(sa_share_t share) 20256185db85Sdougm { 20266185db85Sdougm set_node_attr((void *)share, "changed", "true"); 20276185db85Sdougm } 20286185db85Sdougm 20296185db85Sdougm /* 20306185db85Sdougm * sa_commit_properties(optionset, clear) 20316185db85Sdougm * 20326185db85Sdougm * Check if SMF or ZFS config and either update or abort the pending 20336185db85Sdougm * changes. 20346185db85Sdougm */ 20356185db85Sdougm 20366185db85Sdougm int 20376185db85Sdougm sa_commit_properties(sa_optionset_t optionset, int clear) 20386185db85Sdougm { 20396185db85Sdougm sa_group_t group; 20406185db85Sdougm sa_group_t parent; 20416185db85Sdougm int zfs = 0; 20426185db85Sdougm int needsupdate = 0; 20436185db85Sdougm int ret = SA_OK; 20446185db85Sdougm 20456185db85Sdougm group = sa_get_optionset_parent(optionset); 20466185db85Sdougm if (group != NULL && (sa_is_share(group) || is_zfs_group(group))) { 20476185db85Sdougm /* only update ZFS if on a share */ 20486185db85Sdougm parent = sa_get_parent_group(group); 20496185db85Sdougm zfs++; 20506185db85Sdougm if (parent != NULL && is_zfs_group(parent)) { 20516185db85Sdougm needsupdate = zfs_needs_update(group); 20526185db85Sdougm } else { 20536185db85Sdougm zfs = 0; 20546185db85Sdougm } 20556185db85Sdougm } 20566185db85Sdougm if (zfs) { 20576185db85Sdougm if (!clear && needsupdate) 20586185db85Sdougm ret = sa_zfs_update((sa_share_t)group); 20596185db85Sdougm } else { 20606185db85Sdougm if (clear) 20616185db85Sdougm (void) sa_abort_transaction(scf_handle); 20626185db85Sdougm else 20636185db85Sdougm ret = sa_end_transaction(scf_handle); 20646185db85Sdougm } 20656185db85Sdougm return (ret); 20666185db85Sdougm } 20676185db85Sdougm 20686185db85Sdougm /* 20696185db85Sdougm * sa_destroy_optionset(optionset) 20706185db85Sdougm * 20716185db85Sdougm * Remove the optionset from its group. Update the repostory to 20726185db85Sdougm * reflect this change. 20736185db85Sdougm */ 20746185db85Sdougm 20756185db85Sdougm int 20766185db85Sdougm sa_destroy_optionset(sa_optionset_t optionset) 20776185db85Sdougm { 20786185db85Sdougm char name[256]; 20796185db85Sdougm int len; 20806185db85Sdougm int ret; 20816185db85Sdougm char *id = NULL; 20826185db85Sdougm sa_group_t group; 20836185db85Sdougm int ispersist = 1; 20846185db85Sdougm 20856185db85Sdougm /* now delete the prop group */ 20866185db85Sdougm group = sa_get_optionset_parent(optionset); 20876185db85Sdougm if (group != NULL && sa_is_share(group)) { 20886185db85Sdougm ispersist = is_persistent(group); 20896185db85Sdougm id = sa_get_share_attr((sa_share_t)group, "id"); 20906185db85Sdougm } 20916185db85Sdougm if (ispersist) { 20926185db85Sdougm len = sa_optionset_name(optionset, name, sizeof (name), id); 20936185db85Sdougm if (len > 0) { 20946185db85Sdougm ret = sa_delete_pgroup(scf_handle, name); 20956185db85Sdougm } 20966185db85Sdougm } 20976185db85Sdougm xmlUnlinkNode((xmlNodePtr)optionset); 20986185db85Sdougm xmlFreeNode((xmlNodePtr)optionset); 20996185db85Sdougm if (id != NULL) 21006185db85Sdougm sa_free_attr_string(id); 21016185db85Sdougm return (ret); 21026185db85Sdougm } 21036185db85Sdougm 21046185db85Sdougm /* private to the implementation */ 21056185db85Sdougm int 21066185db85Sdougm _sa_remove_optionset(sa_optionset_t optionset) 21076185db85Sdougm { 21086185db85Sdougm int ret = SA_OK; 21096185db85Sdougm 21106185db85Sdougm xmlUnlinkNode((xmlNodePtr)optionset); 21116185db85Sdougm xmlFreeNode((xmlNodePtr)optionset); 21126185db85Sdougm return (ret); 21136185db85Sdougm } 21146185db85Sdougm 21156185db85Sdougm /* 21166185db85Sdougm * sa_create_security(group, sectype, proto) 21176185db85Sdougm * 21186185db85Sdougm * Create a security optionset (one that has a type name and a 21196185db85Sdougm * proto). Security is left over from a pure NFS implementation. The 21206185db85Sdougm * naming will change in the future when the API is released. 21216185db85Sdougm */ 21226185db85Sdougm sa_security_t 21236185db85Sdougm sa_create_security(sa_group_t group, char *sectype, char *proto) 21246185db85Sdougm { 21256185db85Sdougm sa_security_t security; 21266185db85Sdougm char *id = NULL; 21276185db85Sdougm sa_group_t parent; 21286185db85Sdougm char *groupname = NULL; 21296185db85Sdougm 21306185db85Sdougm if (group != NULL && sa_is_share(group)) { 21316185db85Sdougm id = sa_get_share_attr((sa_share_t)group, "id"); 21326185db85Sdougm parent = sa_get_parent_group(group); 21336185db85Sdougm if (parent != NULL) 21346185db85Sdougm groupname = sa_get_group_attr(parent, "name"); 21356185db85Sdougm } else if (group != NULL) { 21366185db85Sdougm groupname = sa_get_group_attr(group, "name"); 21376185db85Sdougm } 21386185db85Sdougm 21396185db85Sdougm security = sa_get_security(group, sectype, proto); 21406185db85Sdougm if (security != NULL) { 21416185db85Sdougm /* can't have a duplicate security option */ 21426185db85Sdougm security = NULL; 21436185db85Sdougm } else { 21446185db85Sdougm security = (sa_security_t)xmlNewChild((xmlNodePtr)group, 21456185db85Sdougm NULL, 21466185db85Sdougm (xmlChar *)"security", 21476185db85Sdougm NULL); 21486185db85Sdougm if (security != NULL) { 21496185db85Sdougm char oname[256]; 21506185db85Sdougm sa_set_security_attr(security, "type", proto); 21516185db85Sdougm 21526185db85Sdougm sa_set_security_attr(security, "sectype", sectype); 21536185db85Sdougm (void) sa_security_name(security, oname, 21546185db85Sdougm sizeof (oname), id); 21556185db85Sdougm if (groupname != NULL && is_persistent(group)) { 21566185db85Sdougm (void) sa_get_instance(scf_handle, groupname); 21576185db85Sdougm (void) sa_create_pgroup(scf_handle, oname); 21586185db85Sdougm } 21596185db85Sdougm } 21606185db85Sdougm } 21616185db85Sdougm if (groupname != NULL) 21626185db85Sdougm sa_free_attr_string(groupname); 21636185db85Sdougm return (security); 21646185db85Sdougm } 21656185db85Sdougm 21666185db85Sdougm /* 21676185db85Sdougm * sa_destroy_security(security) 21686185db85Sdougm * 21696185db85Sdougm * Remove the specified optionset from the document and the 21706185db85Sdougm * configuration. 21716185db85Sdougm */ 21726185db85Sdougm 21736185db85Sdougm int 21746185db85Sdougm sa_destroy_security(sa_security_t security) 21756185db85Sdougm { 21766185db85Sdougm char name[256]; 21776185db85Sdougm int len; 21786185db85Sdougm int ret = SA_OK; 21796185db85Sdougm char *id = NULL; 21806185db85Sdougm sa_group_t group; 21816185db85Sdougm int iszfs = 0; 21826185db85Sdougm int ispersist = 1; 21836185db85Sdougm 21846185db85Sdougm group = sa_get_optionset_parent(security); 21856185db85Sdougm 21866185db85Sdougm if (group != NULL) 21876185db85Sdougm iszfs = sa_group_is_zfs(group); 21886185db85Sdougm 21896185db85Sdougm if (group != NULL && !iszfs) { 21906185db85Sdougm if (sa_is_share(group)) 21916185db85Sdougm ispersist = is_persistent(group); 21926185db85Sdougm id = sa_get_share_attr((sa_share_t)group, "id"); 21936185db85Sdougm } 21946185db85Sdougm if (ispersist) { 21956185db85Sdougm len = sa_security_name(security, name, sizeof (name), id); 21966185db85Sdougm if (!iszfs && len > 0) { 21976185db85Sdougm ret = sa_delete_pgroup(scf_handle, name); 21986185db85Sdougm } 21996185db85Sdougm } 22006185db85Sdougm xmlUnlinkNode((xmlNodePtr)security); 22016185db85Sdougm xmlFreeNode((xmlNodePtr)security); 22026185db85Sdougm if (iszfs) { 22036185db85Sdougm ret = sa_zfs_update(group); 22046185db85Sdougm } 22056185db85Sdougm if (id != NULL) 22066185db85Sdougm sa_free_attr_string(id); 22076185db85Sdougm return (ret); 22086185db85Sdougm } 22096185db85Sdougm 22106185db85Sdougm /* 22116185db85Sdougm * sa_get_security_attr(optionset, tag) 22126185db85Sdougm * 22136185db85Sdougm * Return the specified attribute value from the optionset. 22146185db85Sdougm */ 22156185db85Sdougm 22166185db85Sdougm char * 22176185db85Sdougm sa_get_security_attr(sa_property_t optionset, char *tag) 22186185db85Sdougm { 22196185db85Sdougm return (get_node_attr((void *)optionset, tag)); 22206185db85Sdougm 22216185db85Sdougm } 22226185db85Sdougm 22236185db85Sdougm /* 22246185db85Sdougm * sa_set_security_attr(optionset, tag, value) 22256185db85Sdougm * 22266185db85Sdougm * Set the optioset attribute specied by tag to the specified value. 22276185db85Sdougm */ 22286185db85Sdougm 22296185db85Sdougm void 22306185db85Sdougm sa_set_security_attr(sa_group_t optionset, char *tag, char *value) 22316185db85Sdougm { 22326185db85Sdougm set_node_attr((void *)optionset, tag, value); 22336185db85Sdougm } 22346185db85Sdougm 22356185db85Sdougm /* 22366185db85Sdougm * is_nodetype(node, type) 22376185db85Sdougm * 22386185db85Sdougm * Check to see if node is of the type specified. 22396185db85Sdougm */ 22406185db85Sdougm 22416185db85Sdougm static int 22426185db85Sdougm is_nodetype(void *node, char *type) 22436185db85Sdougm { 22446185db85Sdougm return (strcmp((char *)((xmlNodePtr)node)->name, type) == 0); 22456185db85Sdougm } 22466185db85Sdougm 22476185db85Sdougm /* 22486185db85Sdougm * sa_set_prop_by_prop(optionset, group, prop, type) 22496185db85Sdougm * 22506185db85Sdougm * Add/remove/update the specified property prop into the optionset or 22516185db85Sdougm * share. If a share, sort out which property group based on GUID. In 22526185db85Sdougm * all cases, the appropriate transaction is set (or ZFS share is 22536185db85Sdougm * marked as needing an update) 22546185db85Sdougm */ 22556185db85Sdougm 22566185db85Sdougm #define SA_PROP_OP_REMOVE 1 22576185db85Sdougm #define SA_PROP_OP_ADD 2 22586185db85Sdougm #define SA_PROP_OP_UPDATE 3 22596185db85Sdougm static int 22606185db85Sdougm sa_set_prop_by_prop(sa_optionset_t optionset, sa_group_t group, 22616185db85Sdougm sa_property_t prop, int type) 22626185db85Sdougm { 22636185db85Sdougm char *name; 22646185db85Sdougm char *valstr; 22656185db85Sdougm int ret = SA_OK; 22666185db85Sdougm scf_transaction_entry_t *entry; 22676185db85Sdougm scf_value_t *value; 22686185db85Sdougm int opttype; /* 1 == optionset, 0 == security */ 22696185db85Sdougm char *id = NULL; 22706185db85Sdougm int iszfs = 0; 22716185db85Sdougm int isshare = 0; 22726185db85Sdougm sa_group_t parent = NULL; 22736185db85Sdougm 22746185db85Sdougm if (!is_persistent(group)) { 22756185db85Sdougm /* 22766185db85Sdougm * if the group/share is not persistent we don't need 22776185db85Sdougm * to do anything here 22786185db85Sdougm */ 22796185db85Sdougm return (SA_OK); 22806185db85Sdougm } 22816185db85Sdougm name = sa_get_property_attr(prop, "type"); 22826185db85Sdougm valstr = sa_get_property_attr(prop, "value"); 22836185db85Sdougm entry = scf_entry_create(scf_handle->handle); 22846185db85Sdougm opttype = is_nodetype((void *)optionset, "optionset"); 22856185db85Sdougm 22866185db85Sdougm if (valstr != NULL && entry != NULL) { 22876185db85Sdougm if (sa_is_share(group)) { 22886185db85Sdougm isshare = 1; 22896185db85Sdougm parent = sa_get_parent_group(group); 22906185db85Sdougm if (parent != NULL) { 22916185db85Sdougm iszfs = is_zfs_group(parent); 22926185db85Sdougm } 22936185db85Sdougm } else { 22946185db85Sdougm iszfs = is_zfs_group(group); 22956185db85Sdougm } 22966185db85Sdougm if (!iszfs) { 22976185db85Sdougm if (scf_handle->trans == NULL) { 22986185db85Sdougm char oname[256]; 22996185db85Sdougm char *groupname = NULL; 23006185db85Sdougm if (isshare) { 23016185db85Sdougm if (parent != NULL) { 23026185db85Sdougm groupname = sa_get_group_attr(parent, "name"); 23036185db85Sdougm } 23046185db85Sdougm id = sa_get_share_attr((sa_share_t)group, "id"); 23056185db85Sdougm } else { 23066185db85Sdougm groupname = sa_get_group_attr(group, "name"); 23076185db85Sdougm } 23086185db85Sdougm if (groupname != NULL) { 23096185db85Sdougm ret = sa_get_instance(scf_handle, groupname); 23106185db85Sdougm sa_free_attr_string(groupname); 23116185db85Sdougm } 23126185db85Sdougm if (opttype) 23136185db85Sdougm (void) sa_optionset_name(optionset, oname, 23146185db85Sdougm sizeof (oname), id); 23156185db85Sdougm else 23166185db85Sdougm (void) sa_security_name(optionset, oname, 23176185db85Sdougm sizeof (oname), id); 23186185db85Sdougm ret = sa_start_transaction(scf_handle, oname); 23196185db85Sdougm } 23206185db85Sdougm if (ret == SA_OK) { 23216185db85Sdougm switch (type) { 23226185db85Sdougm case SA_PROP_OP_REMOVE: 23236185db85Sdougm ret = scf_transaction_property_delete(scf_handle->trans, 23246185db85Sdougm entry, 23256185db85Sdougm name); 23266185db85Sdougm break; 23276185db85Sdougm case SA_PROP_OP_ADD: 23286185db85Sdougm case SA_PROP_OP_UPDATE: 23296185db85Sdougm value = scf_value_create(scf_handle->handle); 23306185db85Sdougm if (value != NULL) { 23316185db85Sdougm if (type == SA_PROP_OP_ADD) 23326185db85Sdougm ret = scf_transaction_property_new( 23336185db85Sdougm scf_handle->trans, 23346185db85Sdougm entry, 23356185db85Sdougm name, 23366185db85Sdougm SCF_TYPE_ASTRING); 23376185db85Sdougm else 23386185db85Sdougm ret = scf_transaction_property_change( 23396185db85Sdougm scf_handle->trans, 23406185db85Sdougm entry, 23416185db85Sdougm name, 23426185db85Sdougm SCF_TYPE_ASTRING); 23436185db85Sdougm if (ret == 0) { 23446185db85Sdougm ret = scf_value_set_astring(value, valstr); 23456185db85Sdougm if (ret == 0) 23466185db85Sdougm ret = scf_entry_add_value(entry, value); 23476185db85Sdougm if (ret != 0) { 23486185db85Sdougm scf_value_destroy(value); 23496185db85Sdougm ret = SA_SYSTEM_ERR; 23506185db85Sdougm } 23516185db85Sdougm } else { 23526185db85Sdougm scf_entry_destroy(entry); 23536185db85Sdougm ret = SA_SYSTEM_ERR; 23546185db85Sdougm } 23556185db85Sdougm break; 23566185db85Sdougm } 23576185db85Sdougm } 23586185db85Sdougm } 23596185db85Sdougm } else { 23606185db85Sdougm /* 23616185db85Sdougm * ZFS update. The calling function would have updated 23626185db85Sdougm * the internal XML structure. Just need to flag it as 23636185db85Sdougm * changed for ZFS. 23646185db85Sdougm */ 23656185db85Sdougm zfs_set_update((sa_share_t)group); 23666185db85Sdougm } 23676185db85Sdougm } 23686185db85Sdougm 23696185db85Sdougm if (name != NULL) 23706185db85Sdougm sa_free_attr_string(name); 23716185db85Sdougm if (valstr != NULL) 23726185db85Sdougm sa_free_attr_string(valstr); 23736185db85Sdougm else if (entry != NULL) 23746185db85Sdougm scf_entry_destroy(entry); 23756185db85Sdougm 23766185db85Sdougm if (ret == -1) 23776185db85Sdougm ret = SA_SYSTEM_ERR; 23786185db85Sdougm 23796185db85Sdougm return (ret); 23806185db85Sdougm } 23816185db85Sdougm 23826185db85Sdougm /* 23836185db85Sdougm * sa_create_property(name, value) 23846185db85Sdougm * 23856185db85Sdougm * Create a new property with the specified name and value. 23866185db85Sdougm */ 23876185db85Sdougm 23886185db85Sdougm sa_property_t 23896185db85Sdougm sa_create_property(char *name, char *value) 23906185db85Sdougm { 23916185db85Sdougm xmlNodePtr node; 23926185db85Sdougm 23936185db85Sdougm node = xmlNewNode(NULL, (xmlChar *)"option"); 23946185db85Sdougm if (node != NULL) { 23956185db85Sdougm xmlSetProp(node, (xmlChar *)"type", (xmlChar *)name); 23966185db85Sdougm xmlSetProp(node, (xmlChar *)"value", (xmlChar *)value); 23976185db85Sdougm } 23986185db85Sdougm return ((sa_property_t)node); 23996185db85Sdougm } 24006185db85Sdougm 24016185db85Sdougm /* 24026185db85Sdougm * sa_add_property(object, property) 24036185db85Sdougm * 24046185db85Sdougm * Add the specified property to the object. Issue the appropriate 24056185db85Sdougm * transaction or mark a ZFS object as needing an update. 24066185db85Sdougm */ 24076185db85Sdougm 24086185db85Sdougm int 24096185db85Sdougm sa_add_property(void *object, sa_property_t property) 24106185db85Sdougm { 24116185db85Sdougm int ret = SA_OK; 24126185db85Sdougm sa_group_t parent; 24136185db85Sdougm sa_group_t group; 24146185db85Sdougm char *proto; 24156185db85Sdougm 24166185db85Sdougm proto = sa_get_optionset_attr(object, "type"); 24176185db85Sdougm if (property != NULL) { 24186185db85Sdougm if ((ret = sa_valid_property(object, proto, property)) == SA_OK) { 24196185db85Sdougm property = (sa_property_t)xmlAddChild((xmlNodePtr)object, 24206185db85Sdougm (xmlNodePtr)property); 24216185db85Sdougm } else { 24226185db85Sdougm if (proto != NULL) 24236185db85Sdougm sa_free_attr_string(proto); 24246185db85Sdougm return (ret); 24256185db85Sdougm } 24266185db85Sdougm } 24276185db85Sdougm 24286185db85Sdougm if (proto != NULL) 24296185db85Sdougm sa_free_attr_string(proto); 24306185db85Sdougm 24316185db85Sdougm parent = sa_get_parent_group(object); 24326185db85Sdougm if (!is_persistent(parent)) { 24336185db85Sdougm return (ret); 24346185db85Sdougm } 24356185db85Sdougm 24366185db85Sdougm if (sa_is_share(parent)) 24376185db85Sdougm group = sa_get_parent_group(parent); 24386185db85Sdougm else 24396185db85Sdougm group = parent; 24406185db85Sdougm 24416185db85Sdougm if (property == NULL) 24426185db85Sdougm ret = SA_NO_MEMORY; 24436185db85Sdougm else { 24446185db85Sdougm char oname[256]; 24456185db85Sdougm 24466185db85Sdougm if (!is_zfs_group(group)) { 24476185db85Sdougm char *id = NULL; 24486185db85Sdougm if (sa_is_share((sa_group_t)parent)) { 24496185db85Sdougm id = sa_get_share_attr((sa_share_t)parent, "id"); 24506185db85Sdougm } 24516185db85Sdougm if (scf_handle->trans == NULL) { 24526185db85Sdougm if (is_nodetype(object, "optionset")) 24536185db85Sdougm (void) sa_optionset_name((sa_optionset_t)object, 24546185db85Sdougm oname, sizeof (oname), id); 24556185db85Sdougm else 24566185db85Sdougm (void) sa_security_name((sa_optionset_t)object, 24576185db85Sdougm oname, sizeof (oname), id); 24586185db85Sdougm ret = sa_start_transaction(scf_handle, oname); 24596185db85Sdougm } 24606185db85Sdougm if (ret == SA_OK) { 24616185db85Sdougm char *name; 24626185db85Sdougm char *value; 24636185db85Sdougm name = sa_get_property_attr(property, "type"); 24646185db85Sdougm value = sa_get_property_attr(property, "value"); 24656185db85Sdougm if (name != NULL && value != NULL) { 24666185db85Sdougm if (scf_handle->scf_state == SCH_STATE_INIT) 24676185db85Sdougm ret = sa_set_property(scf_handle, name, value); 24686185db85Sdougm } else 24696185db85Sdougm ret = SA_CONFIG_ERR; 24706185db85Sdougm if (name != NULL) 24716185db85Sdougm sa_free_attr_string(name); 24726185db85Sdougm if (value != NULL) 24736185db85Sdougm sa_free_attr_string(value); 24746185db85Sdougm } 24756185db85Sdougm if (id != NULL) 24766185db85Sdougm sa_free_attr_string(id); 24776185db85Sdougm } else { 24786185db85Sdougm /* 24796185db85Sdougm * ZFS is a special case. We do want to allow editing 24806185db85Sdougm * property/security lists since we can have a better 24816185db85Sdougm * syntax and we also want to keep things consistent 24826185db85Sdougm * when possible. 24836185db85Sdougm * 24846185db85Sdougm * Right now, we defer until the sa_commit_properties 24856185db85Sdougm * so we can get them all at once. We do need to mark 24866185db85Sdougm * the share as "changed" 24876185db85Sdougm */ 24886185db85Sdougm zfs_set_update((sa_share_t)parent); 24896185db85Sdougm } 24906185db85Sdougm } 24916185db85Sdougm return (ret); 24926185db85Sdougm } 24936185db85Sdougm 24946185db85Sdougm /* 24956185db85Sdougm * sa_remove_property(property) 24966185db85Sdougm * 24976185db85Sdougm * Remove the specied property from its containing object. Update the 24986185db85Sdougm * repository as appropriate. 24996185db85Sdougm */ 25006185db85Sdougm 25016185db85Sdougm int 25026185db85Sdougm sa_remove_property(sa_property_t property) 25036185db85Sdougm { 25046185db85Sdougm int ret = SA_OK; 25056185db85Sdougm 25066185db85Sdougm if (property != NULL) { 25076185db85Sdougm sa_optionset_t optionset; 25086185db85Sdougm sa_group_t group; 25096185db85Sdougm optionset = sa_get_property_parent(property); 25106185db85Sdougm if (optionset != NULL) { 25116185db85Sdougm group = sa_get_optionset_parent(optionset); 25126185db85Sdougm if (group != NULL) { 25136185db85Sdougm ret = sa_set_prop_by_prop(optionset, group, property, 25146185db85Sdougm SA_PROP_OP_REMOVE); 25156185db85Sdougm } 25166185db85Sdougm } 25176185db85Sdougm xmlUnlinkNode((xmlNodePtr)property); 25186185db85Sdougm xmlFreeNode((xmlNodePtr)property); 25196185db85Sdougm } else { 25206185db85Sdougm ret = SA_NO_SUCH_PROP; 25216185db85Sdougm } 25226185db85Sdougm return (ret); 25236185db85Sdougm } 25246185db85Sdougm 25256185db85Sdougm /* 25266185db85Sdougm * sa_update_property(property, value) 25276185db85Sdougm * 25286185db85Sdougm * Update the specified property to the new value. If value is NULL, 25296185db85Sdougm * we currently treat this as a remove. 25306185db85Sdougm */ 25316185db85Sdougm 25326185db85Sdougm int 25336185db85Sdougm sa_update_property(sa_property_t property, char *value) 25346185db85Sdougm { 25356185db85Sdougm int ret = SA_OK; 25366185db85Sdougm if (value == NULL) { 25376185db85Sdougm return (sa_remove_property(property)); 25386185db85Sdougm } else { 25396185db85Sdougm sa_optionset_t optionset; 25406185db85Sdougm sa_group_t group; 25416185db85Sdougm set_node_attr((void *)property, "value", value); 25426185db85Sdougm optionset = sa_get_property_parent(property); 25436185db85Sdougm if (optionset != NULL) { 25446185db85Sdougm group = sa_get_optionset_parent(optionset); 25456185db85Sdougm if (group != NULL) { 25466185db85Sdougm ret = sa_set_prop_by_prop(optionset, group, property, 25476185db85Sdougm SA_PROP_OP_UPDATE); 25486185db85Sdougm } 25496185db85Sdougm } else { 25506185db85Sdougm ret = SA_NO_SUCH_PROP; 25516185db85Sdougm } 25526185db85Sdougm } 25536185db85Sdougm return (ret); 25546185db85Sdougm } 25556185db85Sdougm 25566185db85Sdougm /* 25576185db85Sdougm * _sa_get_next_error(node) 25586185db85Sdougm * 25596185db85Sdougm * Get the next (first if node==NULL) error node in the 25606185db85Sdougm * document. "error" nodes are added if there were syntax errors 25616185db85Sdougm * during parsing of the /etc/dfs/dfstab file. They are preserved in 25626185db85Sdougm * comments and recreated in the doc on the next parse. 25636185db85Sdougm */ 25646185db85Sdougm 25656185db85Sdougm xmlNodePtr 25666185db85Sdougm _sa_get_next_error(xmlNodePtr node) 25676185db85Sdougm { 25686185db85Sdougm if (node == NULL) { 25696185db85Sdougm for (node = sa_config_tree->xmlChildrenNode; 25706185db85Sdougm node != NULL; node = node->next) 25716185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"error") == 0) 25726185db85Sdougm return (node); 25736185db85Sdougm } else { 25746185db85Sdougm for (node = node->next; node != NULL; node = node->next) 25756185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"error") == 0) 25766185db85Sdougm return (node); 25776185db85Sdougm } 25786185db85Sdougm return (node); 25796185db85Sdougm } 25806185db85Sdougm 25816185db85Sdougm /* 25826185db85Sdougm * sa_get_protocol_property(propset, prop) 25836185db85Sdougm * 25846185db85Sdougm * Get the specified protocol specific property. These are global to 25856185db85Sdougm * the protocol and not specific to a group or share. 25866185db85Sdougm */ 25876185db85Sdougm 25886185db85Sdougm sa_property_t 25896185db85Sdougm sa_get_protocol_property(sa_protocol_properties_t propset, char *prop) 25906185db85Sdougm { 25916185db85Sdougm xmlNodePtr node = (xmlNodePtr)propset; 25926185db85Sdougm xmlChar *value = NULL; 25936185db85Sdougm 25946185db85Sdougm for (node = node->children; node != NULL; 25956185db85Sdougm node = node->next) { 25966185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"option") == 0) { 25976185db85Sdougm if (prop == NULL) 25986185db85Sdougm break; 25996185db85Sdougm value = xmlGetProp(node, (xmlChar *)"type"); 26006185db85Sdougm if (value != NULL && 26016185db85Sdougm xmlStrcasecmp(value, (xmlChar *)prop) == 0) { 26026185db85Sdougm break; 26036185db85Sdougm } 26046185db85Sdougm if (value != NULL) { 26056185db85Sdougm xmlFree(value); 26066185db85Sdougm value = NULL; 26076185db85Sdougm } 26086185db85Sdougm } 26096185db85Sdougm } 26106185db85Sdougm if (value != NULL) 26116185db85Sdougm xmlFree(value); 26126185db85Sdougm if (node != NULL && xmlStrcmp(node->name, (xmlChar *)"option") != 0) { 26136185db85Sdougm /* avoid a non option node -- it is possible to be a text node */ 26146185db85Sdougm node = NULL; 26156185db85Sdougm } 26166185db85Sdougm return ((sa_property_t)node); 26176185db85Sdougm } 26186185db85Sdougm 26196185db85Sdougm /* 26206185db85Sdougm * sa_get_next_protocol_property(prop) 26216185db85Sdougm * 26226185db85Sdougm * Get the next protocol specific property in the list. 26236185db85Sdougm */ 26246185db85Sdougm 26256185db85Sdougm sa_property_t 26266185db85Sdougm sa_get_next_protocol_property(sa_property_t prop) 26276185db85Sdougm { 26286185db85Sdougm xmlNodePtr node; 26296185db85Sdougm 26306185db85Sdougm for (node = ((xmlNodePtr)prop)->next; node != NULL; 26316185db85Sdougm node = node->next) { 26326185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"option") == 0) { 26336185db85Sdougm break; 26346185db85Sdougm } 26356185db85Sdougm } 26366185db85Sdougm return ((sa_property_t)node); 26376185db85Sdougm } 26386185db85Sdougm 26396185db85Sdougm /* 26406185db85Sdougm * sa_set_protocol_property(prop, value) 26416185db85Sdougm * 26426185db85Sdougm * Set the specified property to have the new value. The protocol 26436185db85Sdougm * specific plugin will then be called to update the property. 26446185db85Sdougm */ 26456185db85Sdougm 26466185db85Sdougm int 26476185db85Sdougm sa_set_protocol_property(sa_property_t prop, char *value) 26486185db85Sdougm { 26496185db85Sdougm sa_protocol_properties_t propset; 26506185db85Sdougm char *proto; 26516185db85Sdougm int ret = SA_INVALID_PROTOCOL; 26526185db85Sdougm 26536185db85Sdougm propset = ((xmlNodePtr)prop)->parent; 26546185db85Sdougm if (propset != NULL) { 26556185db85Sdougm proto = sa_get_optionset_attr(propset, "type"); 26566185db85Sdougm if (proto != NULL) { 26576185db85Sdougm set_node_attr((xmlNodePtr)prop, "value", value); 26586185db85Sdougm ret = sa_proto_set_property(proto, prop); 2659*3472f5dcSdougm sa_free_attr_string(proto); 26606185db85Sdougm } 26616185db85Sdougm } 26626185db85Sdougm return (ret); 26636185db85Sdougm } 26646185db85Sdougm 26656185db85Sdougm /* 26666185db85Sdougm * sa_add_protocol_property(propset, prop) 26676185db85Sdougm * 26686185db85Sdougm * Add a new property to the protocol sepcific property set. 26696185db85Sdougm */ 26706185db85Sdougm 26716185db85Sdougm int 26726185db85Sdougm sa_add_protocol_property(sa_protocol_properties_t propset, sa_property_t prop) 26736185db85Sdougm { 26746185db85Sdougm xmlNodePtr node; 26756185db85Sdougm 26766185db85Sdougm /* should check for legitimacy */ 26776185db85Sdougm node = xmlAddChild((xmlNodePtr)propset, (xmlNodePtr)prop); 26786185db85Sdougm if (node != NULL) 26796185db85Sdougm return (SA_OK); 26806185db85Sdougm return (SA_NO_MEMORY); 26816185db85Sdougm } 26826185db85Sdougm 26836185db85Sdougm /* 26846185db85Sdougm * sa_create_protocol_properties(proto) 26856185db85Sdougm * 26866185db85Sdougm * Create a protocol specifity property set. 26876185db85Sdougm */ 26886185db85Sdougm 26896185db85Sdougm sa_protocol_properties_t 26906185db85Sdougm sa_create_protocol_properties(char *proto) 26916185db85Sdougm { 26926185db85Sdougm xmlNodePtr node; 26936185db85Sdougm node = xmlNewNode(NULL, (xmlChar *)"propertyset"); 26946185db85Sdougm if (node != NULL) { 26956185db85Sdougm xmlSetProp(node, (xmlChar *)"type", (xmlChar *)proto); 26966185db85Sdougm } 26976185db85Sdougm return (node); 26986185db85Sdougm } 2699