16185db85Sdougm /* 26185db85Sdougm * CDDL HEADER START 36185db85Sdougm * 46185db85Sdougm * The contents of this file are subject to the terms of the 56185db85Sdougm * Common Development and Distribution License (the "License"). 66185db85Sdougm * You may not use this file except in compliance with the License. 76185db85Sdougm * 86185db85Sdougm * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 96185db85Sdougm * or http://www.opensolaris.org/os/licensing. 106185db85Sdougm * See the License for the specific language governing permissions 116185db85Sdougm * and limitations under the License. 126185db85Sdougm * 136185db85Sdougm * When distributing Covered Code, include this CDDL HEADER in each 146185db85Sdougm * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 156185db85Sdougm * If applicable, add the following below this CDDL HEADER, with the 166185db85Sdougm * fields enclosed by brackets "[]" replaced with your own identifying 176185db85Sdougm * information: Portions Copyright [yyyy] [name of copyright owner] 186185db85Sdougm * 196185db85Sdougm * CDDL HEADER END 206185db85Sdougm */ 216185db85Sdougm 226185db85Sdougm /* 23f345c0beSdougm * Copyright 2007 Sun Microsystems, Inc. All rights reserved. 246185db85Sdougm * Use is subject to license terms. 256185db85Sdougm */ 266185db85Sdougm 276185db85Sdougm #pragma ident "%Z%%M% %I% %E% SMI" 286185db85Sdougm 296185db85Sdougm /* 306185db85Sdougm * Share control API 316185db85Sdougm */ 326185db85Sdougm #include <stdio.h> 336185db85Sdougm #include <string.h> 346185db85Sdougm #include <ctype.h> 356185db85Sdougm #include <sys/types.h> 366185db85Sdougm #include <sys/stat.h> 37a99982a7Sdougm #include <fcntl.h> 386185db85Sdougm #include <unistd.h> 396185db85Sdougm #include <libxml/parser.h> 406185db85Sdougm #include <libxml/tree.h> 416185db85Sdougm #include "libshare.h" 426185db85Sdougm #include "libshare_impl.h" 436185db85Sdougm #include <libscf.h> 446185db85Sdougm #include "scfutil.h" 456185db85Sdougm #include <ctype.h> 466185db85Sdougm #include <libintl.h> 47549ec3ffSdougm #include <thread.h> 48549ec3ffSdougm #include <synch.h> 496185db85Sdougm 506185db85Sdougm #if _NOT_SMF 516185db85Sdougm #define CONFIG_FILE "/var/tmp/share.cfg" 526185db85Sdougm #define CONFIG_FILE_TMP "/var/tmp/share.cfg.tmp" 536185db85Sdougm #endif 546185db85Sdougm #define TSTAMP(tm) (uint64_t)(((uint64_t)tm.tv_sec << 32) | \ 556185db85Sdougm (tm.tv_nsec & 0xffffffff)) 566185db85Sdougm 57a99982a7Sdougm #define DFS_LOCK_FILE "/etc/dfs/fstypes" 5857b448deSdougm #define SA_STRSIZE 256 /* max string size for names */ 59a99982a7Sdougm 606185db85Sdougm /* 61da6c28aaSamw * internal object type values returned by sa_get_object_type() 62da6c28aaSamw */ 63da6c28aaSamw #define SA_TYPE_UNKNOWN 0 64da6c28aaSamw #define SA_TYPE_GROUP 1 65da6c28aaSamw #define SA_TYPE_SHARE 2 66da6c28aaSamw #define SA_TYPE_RESOURCE 3 67da6c28aaSamw #define SA_TYPE_OPTIONSET 4 68da6c28aaSamw #define SA_TYPE_ALTSPACE 5 69da6c28aaSamw 70da6c28aaSamw /* 716185db85Sdougm * internal data structures 726185db85Sdougm */ 736185db85Sdougm 746185db85Sdougm extern struct sa_proto_plugin *sap_proto_list; 756185db85Sdougm 766185db85Sdougm /* current SMF/SVC repository handle */ 77549ec3ffSdougm extern void getlegacyconfig(sa_handle_t, char *, xmlNodePtr *); 78549ec3ffSdougm extern int gettransients(sa_handle_impl_t, xmlNodePtr *); 796185db85Sdougm extern int sa_valid_property(void *, char *, sa_property_t); 806185db85Sdougm extern char *sa_fstype(char *); 816185db85Sdougm extern int sa_is_share(void *); 82da6c28aaSamw extern int sa_is_resource(void *); 836185db85Sdougm extern ssize_t scf_max_name_len; /* defined in scfutil during initialization */ 846185db85Sdougm extern int sa_group_is_zfs(sa_group_t); 856185db85Sdougm extern int sa_path_is_zfs(char *); 866185db85Sdougm extern int sa_zfs_set_sharenfs(sa_group_t, char *, int); 87da6c28aaSamw extern int sa_zfs_set_sharesmb(sa_group_t, char *, int); 88549ec3ffSdougm extern void update_legacy_config(sa_handle_t); 896185db85Sdougm extern int issubdir(char *, char *); 9057b448deSdougm extern int sa_zfs_init(sa_handle_impl_t); 91549ec3ffSdougm extern void sa_zfs_fini(sa_handle_impl_t); 92a99982a7Sdougm extern void sablocksigs(sigset_t *); 93a99982a7Sdougm extern void saunblocksigs(sigset_t *); 94da6c28aaSamw static sa_group_t sa_get_optionset_parent(sa_optionset_t); 95da6c28aaSamw static char *get_node_attr(void *, char *); 966185db85Sdougm 97549ec3ffSdougm /* 98549ec3ffSdougm * Data structures for finding/managing the document root to access 99549ec3ffSdougm * handle mapping. The list isn't expected to grow very large so a 100549ec3ffSdougm * simple list is acceptable. The purpose is to provide a way to start 101549ec3ffSdougm * with a group or share and find the library handle needed for 102549ec3ffSdougm * various operations. 103549ec3ffSdougm */ 104549ec3ffSdougm mutex_t sa_global_lock; 105549ec3ffSdougm struct doc2handle { 106549ec3ffSdougm struct doc2handle *next; 107549ec3ffSdougm xmlNodePtr root; 108549ec3ffSdougm sa_handle_impl_t handle; 109549ec3ffSdougm }; 110549ec3ffSdougm 11157b448deSdougm /* definitions used in a couple of property functions */ 11257b448deSdougm #define SA_PROP_OP_REMOVE 1 11357b448deSdougm #define SA_PROP_OP_ADD 2 11457b448deSdougm #define SA_PROP_OP_UPDATE 3 11557b448deSdougm 116549ec3ffSdougm static struct doc2handle *sa_global_handles = NULL; 1176185db85Sdougm 1186185db85Sdougm /* helper functions */ 1196185db85Sdougm 120549ec3ffSdougm /* 121549ec3ffSdougm * sa_errorstr(err) 122549ec3ffSdougm * 123549ec3ffSdougm * convert an error value to an error string 124549ec3ffSdougm */ 125549ec3ffSdougm 1266185db85Sdougm char * 1276185db85Sdougm sa_errorstr(int err) 1286185db85Sdougm { 1296185db85Sdougm static char errstr[32]; 1306185db85Sdougm char *ret = NULL; 1316185db85Sdougm 1326185db85Sdougm switch (err) { 1336185db85Sdougm case SA_OK: 13424424a35Sdougm ret = dgettext(TEXT_DOMAIN, "ok"); 1356185db85Sdougm break; 1366185db85Sdougm case SA_NO_SUCH_PATH: 13724424a35Sdougm ret = dgettext(TEXT_DOMAIN, "path doesn't exist"); 1386185db85Sdougm break; 1396185db85Sdougm case SA_NO_MEMORY: 14024424a35Sdougm ret = dgettext(TEXT_DOMAIN, "no memory"); 1416185db85Sdougm break; 1426185db85Sdougm case SA_DUPLICATE_NAME: 14324424a35Sdougm ret = dgettext(TEXT_DOMAIN, "name in use"); 1446185db85Sdougm break; 1456185db85Sdougm case SA_BAD_PATH: 14624424a35Sdougm ret = dgettext(TEXT_DOMAIN, "bad path"); 1476185db85Sdougm break; 1486185db85Sdougm case SA_NO_SUCH_GROUP: 14924424a35Sdougm ret = dgettext(TEXT_DOMAIN, "no such group"); 1506185db85Sdougm break; 1516185db85Sdougm case SA_CONFIG_ERR: 15224424a35Sdougm ret = dgettext(TEXT_DOMAIN, "configuration error"); 1536185db85Sdougm break; 1546185db85Sdougm case SA_SYSTEM_ERR: 15524424a35Sdougm ret = dgettext(TEXT_DOMAIN, "system error"); 1566185db85Sdougm break; 1576185db85Sdougm case SA_SYNTAX_ERR: 15824424a35Sdougm ret = dgettext(TEXT_DOMAIN, "syntax error"); 1596185db85Sdougm break; 1606185db85Sdougm case SA_NO_PERMISSION: 16124424a35Sdougm ret = dgettext(TEXT_DOMAIN, "no permission"); 1626185db85Sdougm break; 1636185db85Sdougm case SA_BUSY: 16424424a35Sdougm ret = dgettext(TEXT_DOMAIN, "busy"); 1656185db85Sdougm break; 1666185db85Sdougm case SA_NO_SUCH_PROP: 16724424a35Sdougm ret = dgettext(TEXT_DOMAIN, "no such property"); 1686185db85Sdougm break; 1696185db85Sdougm case SA_INVALID_NAME: 17024424a35Sdougm ret = dgettext(TEXT_DOMAIN, "invalid name"); 1716185db85Sdougm break; 1726185db85Sdougm case SA_INVALID_PROTOCOL: 17324424a35Sdougm ret = dgettext(TEXT_DOMAIN, "invalid protocol"); 1746185db85Sdougm break; 1756185db85Sdougm case SA_NOT_ALLOWED: 17624424a35Sdougm ret = dgettext(TEXT_DOMAIN, "operation not allowed"); 1776185db85Sdougm break; 1786185db85Sdougm case SA_BAD_VALUE: 17924424a35Sdougm ret = dgettext(TEXT_DOMAIN, "bad property value"); 1806185db85Sdougm break; 1816185db85Sdougm case SA_INVALID_SECURITY: 18224424a35Sdougm ret = dgettext(TEXT_DOMAIN, "invalid security type"); 1836185db85Sdougm break; 1846185db85Sdougm case SA_NO_SUCH_SECURITY: 18524424a35Sdougm ret = dgettext(TEXT_DOMAIN, "security type not found"); 1866185db85Sdougm break; 1876185db85Sdougm case SA_VALUE_CONFLICT: 18824424a35Sdougm ret = dgettext(TEXT_DOMAIN, "property value conflict"); 1896185db85Sdougm break; 1906185db85Sdougm case SA_NOT_IMPLEMENTED: 19124424a35Sdougm ret = dgettext(TEXT_DOMAIN, "not implemented"); 1926185db85Sdougm break; 1936185db85Sdougm case SA_INVALID_PATH: 19424424a35Sdougm ret = dgettext(TEXT_DOMAIN, "invalid path"); 1956185db85Sdougm break; 1966185db85Sdougm case SA_NOT_SUPPORTED: 19724424a35Sdougm ret = dgettext(TEXT_DOMAIN, "operation not supported"); 1986185db85Sdougm break; 1996185db85Sdougm case SA_PROP_SHARE_ONLY: 20024424a35Sdougm ret = dgettext(TEXT_DOMAIN, "property not valid for group"); 2016185db85Sdougm break; 2026185db85Sdougm case SA_NOT_SHARED: 20324424a35Sdougm ret = dgettext(TEXT_DOMAIN, "not shared"); 2046185db85Sdougm break; 205da6c28aaSamw case SA_NO_SUCH_RESOURCE: 206da6c28aaSamw ret = dgettext(TEXT_DOMAIN, "no such resource"); 207da6c28aaSamw break; 208da6c28aaSamw case SA_RESOURCE_REQUIRED: 209da6c28aaSamw ret = dgettext(TEXT_DOMAIN, "resource name required"); 210da6c28aaSamw break; 211da6c28aaSamw case SA_MULTIPLE_ERROR: 212da6c28aaSamw ret = dgettext(TEXT_DOMAIN, "errors from multiple protocols"); 213da6c28aaSamw break; 214da6c28aaSamw case SA_PATH_IS_SUBDIR: 215da6c28aaSamw ret = dgettext(TEXT_DOMAIN, "path is a subpath of share"); 216da6c28aaSamw break; 217da6c28aaSamw case SA_PATH_IS_PARENTDIR: 218da6c28aaSamw ret = dgettext(TEXT_DOMAIN, "path is parent of a share"); 219da6c28aaSamw break; 220*55bf511dSas200622 case SA_KRB_KEYTAB_ERR: 221*55bf511dSas200622 ret = dgettext(TEXT_DOMAIN, "unable to remove the old keys" 222*55bf511dSas200622 " from the Kerberos keytab. Please manually remove" 223*55bf511dSas200622 " the old keys for your host principal prior to setting" 224*55bf511dSas200622 " the ads_domain property"); 225*55bf511dSas200622 break; 226*55bf511dSas200622 case SA_NO_SERVICE: 227*55bf511dSas200622 ret = dgettext(TEXT_DOMAIN, "service is not running"); 228*55bf511dSas200622 break; 2296185db85Sdougm default: 2306185db85Sdougm (void) snprintf(errstr, sizeof (errstr), 23124424a35Sdougm dgettext(TEXT_DOMAIN, "unknown %d"), err); 2326185db85Sdougm ret = errstr; 2336185db85Sdougm } 2346185db85Sdougm return (ret); 2356185db85Sdougm } 2366185db85Sdougm 2376185db85Sdougm /* 238549ec3ffSdougm * Document root to active handle mapping functions. These are only 239549ec3ffSdougm * used internally. A mutex is used to prevent access while the list 240549ec3ffSdougm * is changing. In general, the list will be relatively short - one 241549ec3ffSdougm * item per thread that has called sa_init(). 242549ec3ffSdougm */ 243549ec3ffSdougm 244549ec3ffSdougm sa_handle_impl_t 245549ec3ffSdougm get_handle_for_root(xmlNodePtr root) 246549ec3ffSdougm { 247549ec3ffSdougm struct doc2handle *item; 248549ec3ffSdougm 249549ec3ffSdougm (void) mutex_lock(&sa_global_lock); 250549ec3ffSdougm for (item = sa_global_handles; item != NULL; item = item->next) { 251549ec3ffSdougm if (item->root == root) 252549ec3ffSdougm break; 253549ec3ffSdougm } 254549ec3ffSdougm (void) mutex_unlock(&sa_global_lock); 255549ec3ffSdougm if (item != NULL) 256549ec3ffSdougm return (item->handle); 257549ec3ffSdougm return (NULL); 258549ec3ffSdougm } 259549ec3ffSdougm 260549ec3ffSdougm static int 261549ec3ffSdougm add_handle_for_root(xmlNodePtr root, sa_handle_impl_t handle) 262549ec3ffSdougm { 263549ec3ffSdougm struct doc2handle *item; 264549ec3ffSdougm int ret = SA_NO_MEMORY; 265549ec3ffSdougm 266549ec3ffSdougm item = (struct doc2handle *)calloc(sizeof (struct doc2handle), 1); 267549ec3ffSdougm if (item != NULL) { 268549ec3ffSdougm item->root = root; 269549ec3ffSdougm item->handle = handle; 270549ec3ffSdougm (void) mutex_lock(&sa_global_lock); 271549ec3ffSdougm item->next = sa_global_handles; 272549ec3ffSdougm sa_global_handles = item; 273549ec3ffSdougm (void) mutex_unlock(&sa_global_lock); 274549ec3ffSdougm ret = SA_OK; 275549ec3ffSdougm } 276549ec3ffSdougm return (ret); 277549ec3ffSdougm } 278549ec3ffSdougm 279549ec3ffSdougm /* 280549ec3ffSdougm * remove_handle_for_root(root) 281549ec3ffSdougm * 282549ec3ffSdougm * Walks the list of handles and removes the one for this "root" from 283549ec3ffSdougm * the list. It is up to the caller to free the data. 284549ec3ffSdougm */ 285549ec3ffSdougm 286549ec3ffSdougm static void 287549ec3ffSdougm remove_handle_for_root(xmlNodePtr root) 288549ec3ffSdougm { 289549ec3ffSdougm struct doc2handle *item, *prev; 290549ec3ffSdougm 291549ec3ffSdougm (void) mutex_lock(&sa_global_lock); 292549ec3ffSdougm for (prev = NULL, item = sa_global_handles; item != NULL; 293549ec3ffSdougm item = item->next) { 294549ec3ffSdougm if (item->root == root) { 295549ec3ffSdougm /* first in the list */ 29657b448deSdougm if (prev == NULL) 297549ec3ffSdougm sa_global_handles = sa_global_handles->next; 29857b448deSdougm else 299549ec3ffSdougm prev->next = item->next; 300549ec3ffSdougm /* Item is out of the list so free the list structure */ 301549ec3ffSdougm free(item); 302549ec3ffSdougm break; 303549ec3ffSdougm } 304549ec3ffSdougm prev = item; 305549ec3ffSdougm } 306549ec3ffSdougm (void) mutex_unlock(&sa_global_lock); 307549ec3ffSdougm } 308549ec3ffSdougm 309549ec3ffSdougm /* 310549ec3ffSdougm * sa_find_group_handle(sa_group_t group) 311549ec3ffSdougm * 312549ec3ffSdougm * Find the sa_handle_t for the configuration associated with this 313549ec3ffSdougm * group. 314549ec3ffSdougm */ 315549ec3ffSdougm sa_handle_t 316549ec3ffSdougm sa_find_group_handle(sa_group_t group) 317549ec3ffSdougm { 318549ec3ffSdougm xmlNodePtr node = (xmlNodePtr)group; 319549ec3ffSdougm sa_handle_t handle; 320549ec3ffSdougm 321549ec3ffSdougm while (node != NULL) { 322549ec3ffSdougm if (strcmp((char *)(node->name), "sharecfg") == 0) { 323549ec3ffSdougm /* have the root so get the handle */ 324549ec3ffSdougm handle = (sa_handle_t)get_handle_for_root(node); 325549ec3ffSdougm return (handle); 326549ec3ffSdougm } 327549ec3ffSdougm node = node->parent; 328549ec3ffSdougm } 329549ec3ffSdougm return (NULL); 330549ec3ffSdougm } 331549ec3ffSdougm 332549ec3ffSdougm /* 3336185db85Sdougm * set_legacy_timestamp(root, path, timevalue) 3346185db85Sdougm * 3356185db85Sdougm * add the current timestamp value to the configuration for use in 3366185db85Sdougm * determining when to update the legacy files. For SMF, this 3376185db85Sdougm * property is kept in default/operation/legacy_timestamp 3386185db85Sdougm */ 3396185db85Sdougm 3406185db85Sdougm static void 3416185db85Sdougm set_legacy_timestamp(xmlNodePtr root, char *path, uint64_t tval) 3426185db85Sdougm { 3436185db85Sdougm xmlNodePtr node; 3446185db85Sdougm xmlChar *lpath = NULL; 345549ec3ffSdougm sa_handle_impl_t handle; 346549ec3ffSdougm 347549ec3ffSdougm /* Have to have a handle or else we weren't initialized. */ 348549ec3ffSdougm handle = get_handle_for_root(root); 349549ec3ffSdougm if (handle == NULL) 350549ec3ffSdougm return; 3516185db85Sdougm 3526185db85Sdougm for (node = root->xmlChildrenNode; node != NULL; 3536185db85Sdougm node = node->next) { 3546185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"legacy") == 0) { 3556185db85Sdougm /* a possible legacy node for this path */ 3566185db85Sdougm lpath = xmlGetProp(node, (xmlChar *)"path"); 35757b448deSdougm if (lpath != NULL && 35857b448deSdougm xmlStrcmp(lpath, (xmlChar *)path) == 0) { 3596185db85Sdougm xmlFree(lpath); 3606185db85Sdougm break; 3616185db85Sdougm } 3626185db85Sdougm if (lpath != NULL) 3636185db85Sdougm xmlFree(lpath); 3646185db85Sdougm } 3656185db85Sdougm } 3666185db85Sdougm if (node == NULL) { 3676185db85Sdougm /* need to create the first legacy timestamp node */ 3686185db85Sdougm node = xmlNewChild(root, NULL, (xmlChar *)"legacy", NULL); 3696185db85Sdougm } 3706185db85Sdougm if (node != NULL) { 3716185db85Sdougm char tstring[32]; 3726185db85Sdougm int ret; 3736185db85Sdougm 3746185db85Sdougm (void) snprintf(tstring, sizeof (tstring), "%lld", tval); 3756185db85Sdougm xmlSetProp(node, (xmlChar *)"timestamp", (xmlChar *)tstring); 3766185db85Sdougm xmlSetProp(node, (xmlChar *)"path", (xmlChar *)path); 3776185db85Sdougm /* now commit to SMF */ 378549ec3ffSdougm ret = sa_get_instance(handle->scfhandle, "default"); 3796185db85Sdougm if (ret == SA_OK) { 38057b448deSdougm ret = sa_start_transaction(handle->scfhandle, 38157b448deSdougm "operation"); 3826185db85Sdougm if (ret == SA_OK) { 38357b448deSdougm ret = sa_set_property(handle->scfhandle, 38457b448deSdougm "legacy-timestamp", tstring); 3856185db85Sdougm if (ret == SA_OK) { 38657b448deSdougm (void) sa_end_transaction( 38757b448deSdougm handle->scfhandle); 3886185db85Sdougm } else { 389549ec3ffSdougm sa_abort_transaction(handle->scfhandle); 3906185db85Sdougm } 3916185db85Sdougm } 3926185db85Sdougm } 3936185db85Sdougm } 3946185db85Sdougm } 3956185db85Sdougm 3966185db85Sdougm /* 3976185db85Sdougm * is_shared(share) 3986185db85Sdougm * 3996185db85Sdougm * determine if the specified share is currently shared or not. 4006185db85Sdougm */ 4016185db85Sdougm static int 4026185db85Sdougm is_shared(sa_share_t share) 4036185db85Sdougm { 4046185db85Sdougm char *shared; 4056185db85Sdougm int result = 0; /* assume not */ 4066185db85Sdougm 4076185db85Sdougm shared = sa_get_share_attr(share, "shared"); 4086185db85Sdougm if (shared != NULL) { 4096185db85Sdougm if (strcmp(shared, "true") == 0) 4106185db85Sdougm result = 1; 4116185db85Sdougm sa_free_attr_string(shared); 4126185db85Sdougm } 4136185db85Sdougm return (result); 4146185db85Sdougm } 4156185db85Sdougm 4166185db85Sdougm /* 417da6c28aaSamw * excluded_protocol(share, proto) 418da6c28aaSamw * 419da6c28aaSamw * Returns B_TRUE if the specified protocol appears in the "exclude" 420da6c28aaSamw * property. This is used to prevent sharing special case shares 421da6c28aaSamw * (e.g. subdirs when SMB wants a subdir and NFS doesn't. B_FALSE is 422da6c28aaSamw * returned if the protocol isn't in the list. 423da6c28aaSamw */ 424da6c28aaSamw static boolean_t 425da6c28aaSamw excluded_protocol(sa_share_t share, char *proto) 426da6c28aaSamw { 427da6c28aaSamw char *protolist; 428da6c28aaSamw char *str; 429da6c28aaSamw char *token; 430da6c28aaSamw 431da6c28aaSamw protolist = sa_get_share_attr(share, "exclude"); 432da6c28aaSamw if (protolist != NULL) { 433da6c28aaSamw str = protolist; 434da6c28aaSamw while ((token = strtok(str, ",")) != NULL) { 435da6c28aaSamw if (strcmp(token, proto) == 0) { 436da6c28aaSamw sa_free_attr_string(protolist); 437da6c28aaSamw return (B_TRUE); 438da6c28aaSamw } 439da6c28aaSamw str = NULL; 440da6c28aaSamw } 441da6c28aaSamw sa_free_attr_string(protolist); 442da6c28aaSamw } 443da6c28aaSamw return (B_FALSE); 444da6c28aaSamw } 445da6c28aaSamw 446da6c28aaSamw /* 447a99982a7Sdougm * checksubdirgroup(group, newpath, strictness) 448f345c0beSdougm * 449a99982a7Sdougm * check all the specified newpath against all the paths in the 450a99982a7Sdougm * group. This is a helper function for checksubdir to make it easier 451a99982a7Sdougm * to also check ZFS subgroups. 452a99982a7Sdougm * The strictness values mean: 453f345c0beSdougm * SA_CHECK_NORMAL == only check newpath against shares that are active 454f345c0beSdougm * SA_CHECK_STRICT == check newpath against both active shares and those 455f345c0beSdougm * stored in the repository 4566185db85Sdougm */ 4576185db85Sdougm static int 458a99982a7Sdougm checksubdirgroup(sa_group_t group, char *newpath, int strictness) 4596185db85Sdougm { 4606185db85Sdougm sa_share_t share; 461a99982a7Sdougm char *path; 462a99982a7Sdougm int issub = SA_OK; 463da6c28aaSamw int subdir; 464da6c28aaSamw int parent; 465da6c28aaSamw 466da6c28aaSamw if (newpath == NULL) 467da6c28aaSamw return (SA_INVALID_PATH); 4686185db85Sdougm 4696185db85Sdougm for (share = sa_get_share(group, NULL); share != NULL; 4706185db85Sdougm share = sa_get_next_share(share)) { 4716185db85Sdougm /* 4726185db85Sdougm * The original behavior of share never checked 4736185db85Sdougm * against the permanent configuration 4746185db85Sdougm * (/etc/dfs/dfstab). PIT has a number of cases where 4756185db85Sdougm * it depends on this older behavior even though it 4766185db85Sdougm * could be considered incorrect. We may tighten this 4776185db85Sdougm * up in the future. 4786185db85Sdougm */ 479f345c0beSdougm if (strictness == SA_CHECK_NORMAL && !is_shared(share)) 4806185db85Sdougm continue; 4816185db85Sdougm 4826185db85Sdougm path = sa_get_share_attr(share, "path"); 483f345c0beSdougm /* 484f345c0beSdougm * If path is NULL, then a share is in the process of 485f345c0beSdougm * construction or someone has modified the property 486a99982a7Sdougm * group inappropriately. It should be 487a99982a7Sdougm * ignored. issubdir() comes from the original share 488a99982a7Sdougm * implementation and does the difficult part of 489a99982a7Sdougm * checking subdirectories. 490f345c0beSdougm */ 491f345c0beSdougm if (path == NULL) 492f345c0beSdougm continue; 493da6c28aaSamw 494da6c28aaSamw if (strcmp(path, newpath) == 0) { 495da6c28aaSamw issub = SA_INVALID_PATH; 496da6c28aaSamw } else { 497da6c28aaSamw subdir = issubdir(newpath, path); 498da6c28aaSamw parent = issubdir(path, newpath); 499da6c28aaSamw if (subdir || parent) { 5006185db85Sdougm sa_free_attr_string(path); 5016185db85Sdougm path = NULL; 502da6c28aaSamw return (subdir ? 503da6c28aaSamw SA_PATH_IS_SUBDIR : SA_PATH_IS_PARENTDIR); 504da6c28aaSamw } 5056185db85Sdougm } 5066185db85Sdougm sa_free_attr_string(path); 5076185db85Sdougm path = NULL; 5086185db85Sdougm } 509a99982a7Sdougm return (issub); 510a99982a7Sdougm } 511a99982a7Sdougm 512a99982a7Sdougm /* 513a99982a7Sdougm * checksubdir(newpath, strictness) 514a99982a7Sdougm * 515a99982a7Sdougm * checksubdir determines if the specified path (newpath) is a 516a99982a7Sdougm * subdirectory of another share. It calls checksubdirgroup() to do 517a99982a7Sdougm * the complicated work. The strictness parameter determines how 518a99982a7Sdougm * strict a check to make against the path. The strictness values 519a99982a7Sdougm * mean: SA_CHECK_NORMAL == only check newpath against shares that are 520a99982a7Sdougm * active SA_CHECK_STRICT == check newpath against both active shares 521a99982a7Sdougm * and those * stored in the repository 522a99982a7Sdougm */ 523a99982a7Sdougm static int 524549ec3ffSdougm checksubdir(sa_handle_t handle, char *newpath, int strictness) 525a99982a7Sdougm { 526a99982a7Sdougm sa_group_t group; 527da6c28aaSamw int issub = SA_OK; 528a99982a7Sdougm char *path = NULL; 529a99982a7Sdougm 530da6c28aaSamw for (group = sa_get_group(handle, NULL); 531da6c28aaSamw group != NULL && issub == SA_OK; 532da6c28aaSamw group = sa_get_next_group(group)) { 533a99982a7Sdougm if (sa_group_is_zfs(group)) { 534a99982a7Sdougm sa_group_t subgroup; 535a99982a7Sdougm for (subgroup = sa_get_sub_group(group); 536da6c28aaSamw subgroup != NULL && issub == SA_OK; 537a99982a7Sdougm subgroup = sa_get_next_group(subgroup)) 53857b448deSdougm issub = checksubdirgroup(subgroup, newpath, 53957b448deSdougm strictness); 540a99982a7Sdougm } else { 541a99982a7Sdougm issub = checksubdirgroup(group, newpath, strictness); 542a99982a7Sdougm } 5436185db85Sdougm } 5446185db85Sdougm if (path != NULL) 5456185db85Sdougm sa_free_attr_string(path); 5466185db85Sdougm return (issub); 5476185db85Sdougm } 5486185db85Sdougm 5496185db85Sdougm /* 550f345c0beSdougm * validpath(path, strictness) 5516185db85Sdougm * determine if the provided path is valid for a share. It shouldn't 5526185db85Sdougm * be a sub-dir of an already shared path or the parent directory of a 5536185db85Sdougm * share path. 5546185db85Sdougm */ 5556185db85Sdougm static int 556549ec3ffSdougm validpath(sa_handle_t handle, char *path, int strictness) 5576185db85Sdougm { 5586185db85Sdougm int error = SA_OK; 5596185db85Sdougm struct stat st; 5606185db85Sdougm sa_share_t share; 5616185db85Sdougm char *fstype; 5626185db85Sdougm 56357b448deSdougm if (*path != '/') 5646185db85Sdougm return (SA_BAD_PATH); 56557b448deSdougm 5666185db85Sdougm if (stat(path, &st) < 0) { 5676185db85Sdougm error = SA_NO_SUCH_PATH; 5686185db85Sdougm } else { 569549ec3ffSdougm share = sa_find_share(handle, path); 57057b448deSdougm if (share != NULL) 5716185db85Sdougm error = SA_DUPLICATE_NAME; 57257b448deSdougm 5736185db85Sdougm if (error == SA_OK) { 5746185db85Sdougm /* 57557b448deSdougm * check for special case with file system 57657b448deSdougm * that might have restrictions. For now, ZFS 57757b448deSdougm * is the only case since it has its own idea 57857b448deSdougm * of how to configure shares. We do this 57957b448deSdougm * before subdir checking since things like 58057b448deSdougm * ZFS will do that for us. This should also 58157b448deSdougm * be done via plugin interface. 5826185db85Sdougm */ 5836185db85Sdougm fstype = sa_fstype(path); 5846185db85Sdougm if (fstype != NULL && strcmp(fstype, "zfs") == 0) { 585549ec3ffSdougm if (sa_zfs_is_shared(handle, path)) 586a99982a7Sdougm error = SA_INVALID_NAME; 5876185db85Sdougm } 5886185db85Sdougm if (fstype != NULL) 5896185db85Sdougm sa_free_fstype(fstype); 5906185db85Sdougm } 59157b448deSdougm if (error == SA_OK) 592549ec3ffSdougm error = checksubdir(handle, path, strictness); 5936185db85Sdougm } 5946185db85Sdougm return (error); 5956185db85Sdougm } 5966185db85Sdougm 5976185db85Sdougm /* 5986185db85Sdougm * check to see if group/share is persistent. 599da6c28aaSamw * 600da6c28aaSamw * "group" can be either an sa_group_t or an sa_share_t. (void *) 601da6c28aaSamw * works since both thse types are also void *. 6026185db85Sdougm */ 603da6c28aaSamw int 604da6c28aaSamw sa_is_persistent(void *group) 6056185db85Sdougm { 6066185db85Sdougm char *type; 6076185db85Sdougm int persist = 1; 6086185db85Sdougm 609da6c28aaSamw type = sa_get_group_attr((sa_group_t)group, "type"); 6106185db85Sdougm if (type != NULL && strcmp(type, "transient") == 0) 6116185db85Sdougm persist = 0; 6126185db85Sdougm if (type != NULL) 6136185db85Sdougm sa_free_attr_string(type); 6146185db85Sdougm return (persist); 6156185db85Sdougm } 6166185db85Sdougm 6176185db85Sdougm /* 6186185db85Sdougm * sa_valid_group_name(name) 6196185db85Sdougm * 6206185db85Sdougm * check that the "name" contains only valid characters and otherwise 6216185db85Sdougm * fits the required naming conventions. Valid names must start with 6226185db85Sdougm * an alphabetic and the remainder may consist of only alphanumeric 6236185db85Sdougm * plus the '-' and '_' characters. This name limitation comes from 6246185db85Sdougm * inherent limitations in SMF. 6256185db85Sdougm */ 6266185db85Sdougm 6276185db85Sdougm int 6286185db85Sdougm sa_valid_group_name(char *name) 6296185db85Sdougm { 6306185db85Sdougm int ret = 1; 6316185db85Sdougm ssize_t len; 6326185db85Sdougm 6336185db85Sdougm if (name != NULL && isalpha(*name)) { 6346185db85Sdougm char c; 6356185db85Sdougm len = strlen(name); 6366185db85Sdougm if (len < (scf_max_name_len - sizeof ("group:"))) { 6376185db85Sdougm for (c = *name++; c != '\0' && ret != 0; c = *name++) { 6386185db85Sdougm if (!isalnum(c) && c != '-' && c != '_') 6396185db85Sdougm ret = 0; 6406185db85Sdougm } 6416185db85Sdougm } else { 6426185db85Sdougm ret = 0; 6436185db85Sdougm } 6446185db85Sdougm } else { 6456185db85Sdougm ret = 0; 6466185db85Sdougm } 6476185db85Sdougm return (ret); 6486185db85Sdougm } 6496185db85Sdougm 6506185db85Sdougm 6516185db85Sdougm /* 6526185db85Sdougm * is_zfs_group(group) 6536185db85Sdougm * Determine if the specified group is a ZFS sharenfs group 6546185db85Sdougm */ 6556185db85Sdougm static int 6566185db85Sdougm is_zfs_group(sa_group_t group) 6576185db85Sdougm { 6586185db85Sdougm int ret = 0; 6596185db85Sdougm xmlNodePtr parent; 6606185db85Sdougm xmlChar *zfs; 6616185db85Sdougm 66257b448deSdougm if (strcmp((char *)((xmlNodePtr)group)->name, "share") == 0) 6636185db85Sdougm parent = (xmlNodePtr)sa_get_parent_group(group); 66457b448deSdougm else 6656185db85Sdougm parent = (xmlNodePtr)group; 6666185db85Sdougm zfs = xmlGetProp(parent, (xmlChar *)"zfs"); 6676185db85Sdougm if (zfs != NULL) { 6686185db85Sdougm xmlFree(zfs); 6696185db85Sdougm ret = 1; 6706185db85Sdougm } 6716185db85Sdougm return (ret); 6726185db85Sdougm } 6736185db85Sdougm 6746185db85Sdougm /* 675da6c28aaSamw * sa_get_object_type(object) 676da6c28aaSamw * 677da6c28aaSamw * This function returns a numeric value representing the object 678da6c28aaSamw * type. This allows using simpler checks when doing type specific 679da6c28aaSamw * operations. 680da6c28aaSamw */ 681da6c28aaSamw 682da6c28aaSamw static int 683da6c28aaSamw sa_get_object_type(void *object) 684da6c28aaSamw { 685da6c28aaSamw xmlNodePtr node = (xmlNodePtr)object; 686da6c28aaSamw int type; 687da6c28aaSamw 688da6c28aaSamw if (xmlStrcmp(node->name, (xmlChar *)"group") == 0) 689da6c28aaSamw type = SA_TYPE_GROUP; 690da6c28aaSamw else if (xmlStrcmp(node->name, (xmlChar *)"share") == 0) 691da6c28aaSamw type = SA_TYPE_SHARE; 692da6c28aaSamw else if (xmlStrcmp(node->name, (xmlChar *)"resource") == 0) 693da6c28aaSamw type = SA_TYPE_RESOURCE; 694da6c28aaSamw else if (xmlStrcmp(node->name, (xmlChar *)"optionset") == 0) 695da6c28aaSamw type = SA_TYPE_OPTIONSET; 696da6c28aaSamw else if (xmlStrcmp(node->name, (xmlChar *)"security") == 0) 697da6c28aaSamw type = SA_TYPE_ALTSPACE; 698da6c28aaSamw else 699da6c28aaSamw assert(0); 700da6c28aaSamw return (type); 701da6c28aaSamw } 702da6c28aaSamw 703da6c28aaSamw /* 7046185db85Sdougm * sa_optionset_name(optionset, oname, len, id) 7056185db85Sdougm * return the SMF name for the optionset. If id is not NULL, it 7066185db85Sdougm * will have the GUID value for a share and should be used 7076185db85Sdougm * instead of the keyword "optionset" which is used for 7086185db85Sdougm * groups. If the optionset doesn't have a protocol type 7096185db85Sdougm * associated with it, "default" is used. This shouldn't happen 7106185db85Sdougm * at this point but may be desirable in the future if there are 7116185db85Sdougm * protocol independent properties added. The name is returned in 7126185db85Sdougm * oname. 7136185db85Sdougm */ 7146185db85Sdougm 7156185db85Sdougm static int 7166185db85Sdougm sa_optionset_name(sa_optionset_t optionset, char *oname, size_t len, char *id) 7176185db85Sdougm { 7186185db85Sdougm char *proto; 719da6c28aaSamw void *parent; 720da6c28aaSamw int ptype; 7216185db85Sdougm 7226185db85Sdougm if (id == NULL) 7236185db85Sdougm id = "optionset"; 7246185db85Sdougm 725da6c28aaSamw parent = sa_get_optionset_parent(optionset); 726da6c28aaSamw if (parent != NULL) { 727da6c28aaSamw ptype = sa_get_object_type(parent); 7286185db85Sdougm proto = sa_get_optionset_attr(optionset, "type"); 729da6c28aaSamw if (ptype != SA_TYPE_RESOURCE) { 730da6c28aaSamw len = snprintf(oname, len, "%s_%s", id, 731da6c28aaSamw proto ? proto : "default"); 732da6c28aaSamw } else { 733da6c28aaSamw char *index; 734da6c28aaSamw index = get_node_attr((void *)parent, "id"); 735da6c28aaSamw if (index != NULL) 736da6c28aaSamw len = snprintf(oname, len, "%s_%s_%s", id, 737da6c28aaSamw proto ? proto : "default", index); 738da6c28aaSamw else 739da6c28aaSamw len = 0; 740da6c28aaSamw } 7416185db85Sdougm 7426185db85Sdougm if (proto != NULL) 7436185db85Sdougm sa_free_attr_string(proto); 744da6c28aaSamw } else { 745da6c28aaSamw len = 0; 746da6c28aaSamw } 7476185db85Sdougm return (len); 7486185db85Sdougm } 7496185db85Sdougm 7506185db85Sdougm /* 7516185db85Sdougm * sa_security_name(optionset, oname, len, id) 7526185db85Sdougm * 7536185db85Sdougm * return the SMF name for the security. If id is not NULL, it will 7546185db85Sdougm * have the GUID value for a share and should be used instead of the 7556185db85Sdougm * keyword "optionset" which is used for groups. If the optionset 7566185db85Sdougm * doesn't have a protocol type associated with it, "default" is 7576185db85Sdougm * used. This shouldn't happen at this point but may be desirable in 7586185db85Sdougm * the future if there are protocol independent properties added. The 7596185db85Sdougm * name is returned in oname. The security type is also encoded into 7606185db85Sdougm * the name. In the future, this wil *be handled a bit differently. 7616185db85Sdougm */ 7626185db85Sdougm 7636185db85Sdougm static int 7646185db85Sdougm sa_security_name(sa_security_t security, char *oname, size_t len, char *id) 7656185db85Sdougm { 7666185db85Sdougm char *proto; 7676185db85Sdougm char *sectype; 7686185db85Sdougm 7696185db85Sdougm if (id == NULL) 7706185db85Sdougm id = "optionset"; 7716185db85Sdougm 7726185db85Sdougm proto = sa_get_security_attr(security, "type"); 7736185db85Sdougm sectype = sa_get_security_attr(security, "sectype"); 77457b448deSdougm len = snprintf(oname, len, "%s_%s_%s", id, proto ? proto : "default", 7756185db85Sdougm sectype ? sectype : "default"); 7766185db85Sdougm if (proto != NULL) 7776185db85Sdougm sa_free_attr_string(proto); 7786185db85Sdougm if (sectype != NULL) 7796185db85Sdougm sa_free_attr_string(sectype); 7806185db85Sdougm return (len); 7816185db85Sdougm } 7826185db85Sdougm 7836185db85Sdougm /* 78457b448deSdougm * verifydefgroupopts(handle) 78557b448deSdougm * 78657b448deSdougm * Make sure a "default" group exists and has default protocols enabled. 78757b448deSdougm */ 78857b448deSdougm static void 78957b448deSdougm verifydefgroupopts(sa_handle_t handle) 79057b448deSdougm { 79157b448deSdougm sa_group_t defgrp; 79257b448deSdougm sa_optionset_t opt; 793da6c28aaSamw 79457b448deSdougm defgrp = sa_get_group(handle, "default"); 79557b448deSdougm if (defgrp != NULL) { 79657b448deSdougm opt = sa_get_optionset(defgrp, NULL); 79757b448deSdougm /* 79857b448deSdougm * NFS is the default for default group 79957b448deSdougm */ 80057b448deSdougm if (opt == NULL) 80157b448deSdougm opt = sa_create_optionset(defgrp, "nfs"); 80257b448deSdougm } 80357b448deSdougm } 80457b448deSdougm 80557b448deSdougm /* 806f345c0beSdougm * sa_init(init_service) 8076185db85Sdougm * Initialize the API 8086185db85Sdougm * find all the shared objects 8096185db85Sdougm * init the tables with all objects 8106185db85Sdougm * read in the current configuration 8116185db85Sdougm */ 8126185db85Sdougm 81357b448deSdougm #define GETPROP(prop) scf_simple_prop_next_astring(prop) 81457b448deSdougm #define CHECKTSTAMP(st, tval) stat(SA_LEGACY_DFSTAB, &st) >= 0 && \ 81557b448deSdougm tval != TSTAMP(st.st_ctim) 81657b448deSdougm 817549ec3ffSdougm sa_handle_t 8186185db85Sdougm sa_init(int init_service) 8196185db85Sdougm { 8206185db85Sdougm struct stat st; 8216185db85Sdougm int legacy = 0; 8226185db85Sdougm uint64_t tval = 0; 823a99982a7Sdougm int lockfd; 824a99982a7Sdougm sigset_t old; 825a99982a7Sdougm int updatelegacy = B_FALSE; 826a99982a7Sdougm scf_simple_prop_t *prop; 827549ec3ffSdougm sa_handle_impl_t handle; 828549ec3ffSdougm int err; 8296185db85Sdougm 830549ec3ffSdougm handle = calloc(sizeof (struct sa_handle_impl), 1); 831549ec3ffSdougm 832549ec3ffSdougm if (handle != NULL) { 8336185db85Sdougm /* get protocol specific structures */ 8346185db85Sdougm (void) proto_plugin_init(); 8356185db85Sdougm if (init_service & SA_INIT_SHARE_API) { 8366185db85Sdougm /* 83757b448deSdougm * initialize access into libzfs. We use this 83857b448deSdougm * when collecting info about ZFS datasets and 83957b448deSdougm * shares. 8401cea05afSdougm */ 84157b448deSdougm if (sa_zfs_init(handle) == B_FALSE) { 84257b448deSdougm free(handle); 84357b448deSdougm (void) proto_plugin_fini(); 84457b448deSdougm return (NULL); 84557b448deSdougm } 8461cea05afSdougm /* 8476185db85Sdougm * since we want to use SMF, initialize an svc handle 8486185db85Sdougm * and find out what is there. 8496185db85Sdougm */ 850549ec3ffSdougm handle->scfhandle = sa_scf_init(handle); 851549ec3ffSdougm if (handle->scfhandle != NULL) { 852a99982a7Sdougm /* 853a99982a7Sdougm * Need to lock the extraction of the 854a99982a7Sdougm * configuration if the dfstab file has 855a99982a7Sdougm * changed. Lock everything now and release if 856a99982a7Sdougm * not needed. Use a file that isn't being 857a99982a7Sdougm * manipulated by other parts of the system in 858a99982a7Sdougm * order to not interfere with locking. Using 859a99982a7Sdougm * dfstab doesn't work. 860a99982a7Sdougm */ 861a99982a7Sdougm sablocksigs(&old); 862a99982a7Sdougm lockfd = open(DFS_LOCK_FILE, O_RDWR); 863a99982a7Sdougm if (lockfd >= 0) { 864a99982a7Sdougm extern int errno; 865a99982a7Sdougm errno = 0; 866a99982a7Sdougm (void) lockf(lockfd, F_LOCK, 0); 867a99982a7Sdougm /* 86857b448deSdougm * Check whether we are going to need 86957b448deSdougm * to merge any dfstab changes. This 87057b448deSdougm * is done by comparing the value of 87157b448deSdougm * legacy-timestamp with the current 87257b448deSdougm * st_ctim of the file. If they are 87357b448deSdougm * different, an update is needed and 87457b448deSdougm * the file must remain locked until 87557b448deSdougm * the merge is done in order to 87657b448deSdougm * prevent multiple startups from 87757b448deSdougm * changing the SMF repository at the 87857b448deSdougm * same time. The first to get the 87957b448deSdougm * lock will make any changes before 88057b448deSdougm * the others can read the repository. 881a99982a7Sdougm */ 88257b448deSdougm prop = scf_simple_prop_get 88357b448deSdougm (handle->scfhandle->handle, 88457b448deSdougm (const char *)SA_SVC_FMRI_BASE 88557b448deSdougm ":default", "operation", 886a99982a7Sdougm "legacy-timestamp"); 887a99982a7Sdougm if (prop != NULL) { 888a99982a7Sdougm char *i64; 88957b448deSdougm i64 = GETPROP(prop); 89057b448deSdougm if (i64 != NULL) 89157b448deSdougm tval = strtoull(i64, 89257b448deSdougm NULL, 0); 89357b448deSdougm if (CHECKTSTAMP(st, tval)) 894a99982a7Sdougm updatelegacy = B_TRUE; 89557b448deSdougm scf_simple_prop_free(prop); 896a99982a7Sdougm } else { 89757b448deSdougm /* 89857b448deSdougm * We haven't set the 89957b448deSdougm * timestamp before so do it. 90057b448deSdougm */ 901a99982a7Sdougm updatelegacy = B_TRUE; 902a99982a7Sdougm } 903a99982a7Sdougm } 904a99982a7Sdougm if (updatelegacy == B_FALSE) { 905a99982a7Sdougm /* Don't need the lock anymore */ 906a99982a7Sdougm (void) lockf(lockfd, F_ULOCK, 0); 907a99982a7Sdougm (void) close(lockfd); 908a99982a7Sdougm } 9091d1813a7Sdougm 9101d1813a7Sdougm /* 9111d1813a7Sdougm * It is essential that the document tree and 9121d1813a7Sdougm * the internal list of roots to handles be 9131d1813a7Sdougm * setup before anything that might try to 9141d1813a7Sdougm * create a new object is called. The document 9151d1813a7Sdougm * tree is the combination of handle->doc and 9161d1813a7Sdougm * handle->tree. This allows searches, 9171d1813a7Sdougm * etc. when all you have is an object in the 9181d1813a7Sdougm * tree. 9191d1813a7Sdougm */ 9201d1813a7Sdougm handle->doc = xmlNewDoc((xmlChar *)"1.0"); 92157b448deSdougm handle->tree = xmlNewNode(NULL, 92257b448deSdougm (xmlChar *)"sharecfg"); 92357b448deSdougm if (handle->doc != NULL && 92457b448deSdougm handle->tree != NULL) { 92557b448deSdougm xmlDocSetRootElement(handle->doc, 92657b448deSdougm handle->tree); 92757b448deSdougm err = add_handle_for_root(handle->tree, 92857b448deSdougm handle); 9291d1813a7Sdougm if (err == SA_OK) 93057b448deSdougm err = sa_get_config( 93157b448deSdougm handle->scfhandle, 9321d1813a7Sdougm handle->tree, handle); 9331d1813a7Sdougm } else { 9341d1813a7Sdougm if (handle->doc != NULL) 9351d1813a7Sdougm xmlFreeDoc(handle->doc); 9361d1813a7Sdougm if (handle->tree != NULL) 9371d1813a7Sdougm xmlFreeNode(handle->tree); 9381d1813a7Sdougm err = SA_NO_MEMORY; 9391d1813a7Sdougm } 9401d1813a7Sdougm 941a99982a7Sdougm saunblocksigs(&old); 942549ec3ffSdougm 943549ec3ffSdougm if (err != SA_OK) { 944549ec3ffSdougm /* 9451d1813a7Sdougm * If we couldn't add the tree handle 9461d1813a7Sdougm * to the list, then things are going 9471d1813a7Sdougm * to fail badly. Might as well undo 9481d1813a7Sdougm * everything now and fail the 9491d1813a7Sdougm * sa_init(). 950549ec3ffSdougm */ 951549ec3ffSdougm sa_fini(handle); 952549ec3ffSdougm return (NULL); 953549ec3ffSdougm } 954549ec3ffSdougm 9556185db85Sdougm if (tval == 0) { 95657b448deSdougm /* 95757b448deSdougm * first time so make sure 95857b448deSdougm * default is setup 95957b448deSdougm */ 96057b448deSdougm verifydefgroupopts(handle); 9616185db85Sdougm } 9621d1813a7Sdougm 963a99982a7Sdougm if (updatelegacy == B_TRUE) { 964a99982a7Sdougm sablocksigs(&old); 965549ec3ffSdougm getlegacyconfig((sa_handle_t)handle, 966549ec3ffSdougm SA_LEGACY_DFSTAB, &handle->tree); 9676185db85Sdougm if (stat(SA_LEGACY_DFSTAB, &st) >= 0) 968546405c3Sdougm set_legacy_timestamp( 969546405c3Sdougm handle->tree, 9706185db85Sdougm SA_LEGACY_DFSTAB, 9716185db85Sdougm TSTAMP(st.st_ctim)); 972a99982a7Sdougm saunblocksigs(&old); 973546405c3Sdougm /* 974546405c3Sdougm * Safe to unlock now to allow 975546405c3Sdougm * others to run 976546405c3Sdougm */ 977a99982a7Sdougm (void) lockf(lockfd, F_ULOCK, 0); 978a99982a7Sdougm (void) close(lockfd); 9796185db85Sdougm } 980549ec3ffSdougm legacy |= sa_get_zfs_shares(handle, "zfs"); 981549ec3ffSdougm legacy |= gettransients(handle, &handle->tree); 9826185db85Sdougm } 9836185db85Sdougm } 9846185db85Sdougm } 985549ec3ffSdougm return ((sa_handle_t)handle); 9866185db85Sdougm } 9876185db85Sdougm 9886185db85Sdougm /* 989549ec3ffSdougm * sa_fini(handle) 9906185db85Sdougm * Uninitialize the API structures including the configuration 9911cea05afSdougm * data structures and ZFS related data. 9926185db85Sdougm */ 9936185db85Sdougm 9946185db85Sdougm void 995549ec3ffSdougm sa_fini(sa_handle_t handle) 9966185db85Sdougm { 997549ec3ffSdougm sa_handle_impl_t impl_handle = (sa_handle_impl_t)handle; 998549ec3ffSdougm 999549ec3ffSdougm if (impl_handle != NULL) { 1000549ec3ffSdougm /* 1001549ec3ffSdougm * Free the config trees and any other data structures 1002549ec3ffSdougm * used in the handle. 1003549ec3ffSdougm */ 1004549ec3ffSdougm if (impl_handle->doc != NULL) 1005549ec3ffSdougm xmlFreeDoc(impl_handle->doc); 1006549ec3ffSdougm sa_scf_fini(impl_handle->scfhandle); 1007549ec3ffSdougm sa_zfs_fini(impl_handle); 1008549ec3ffSdougm 1009549ec3ffSdougm /* Remove and free the entry in the global list. */ 1010549ec3ffSdougm remove_handle_for_root(impl_handle->tree); 1011549ec3ffSdougm 1012549ec3ffSdougm /* Make sure we free the handle */ 1013549ec3ffSdougm free(impl_handle); 1014549ec3ffSdougm 1015549ec3ffSdougm /* 1016549ec3ffSdougm * If this was the last handle to release, unload the 1017549ec3ffSdougm * plugins that were loaded. 1018549ec3ffSdougm */ 1019549ec3ffSdougm if (sa_global_handles == NULL) 1020549ec3ffSdougm (void) proto_plugin_fini(); 1021549ec3ffSdougm 10226185db85Sdougm } 10236185db85Sdougm } 10246185db85Sdougm 10256185db85Sdougm /* 10266185db85Sdougm * sa_get_protocols(char **protocol) 10276185db85Sdougm * Get array of protocols that are supported 10286185db85Sdougm * Returns pointer to an allocated and NULL terminated 10296185db85Sdougm * array of strings. Caller must free. 10306185db85Sdougm * This really should be determined dynamically. 10316185db85Sdougm * If there aren't any defined, return -1. 10326185db85Sdougm * Use free() to return memory. 10336185db85Sdougm */ 10346185db85Sdougm 10356185db85Sdougm int 10366185db85Sdougm sa_get_protocols(char ***protocols) 10376185db85Sdougm { 10386185db85Sdougm int numproto = -1; 10396185db85Sdougm 10406185db85Sdougm if (protocols != NULL) { 10416185db85Sdougm struct sa_proto_plugin *plug; 10426185db85Sdougm for (numproto = 0, plug = sap_proto_list; plug != NULL; 10436185db85Sdougm plug = plug->plugin_next) { 10446185db85Sdougm numproto++; 10456185db85Sdougm } 10466185db85Sdougm 10476185db85Sdougm *protocols = calloc(numproto + 1, sizeof (char *)); 10486185db85Sdougm if (*protocols != NULL) { 10496185db85Sdougm int ret = 0; 10506185db85Sdougm for (plug = sap_proto_list; plug != NULL; 10516185db85Sdougm plug = plug->plugin_next) { 10526185db85Sdougm /* faking for now */ 105357b448deSdougm (*protocols)[ret++] = 105457b448deSdougm plug->plugin_ops->sa_protocol; 10556185db85Sdougm } 10566185db85Sdougm } else { 10576185db85Sdougm numproto = -1; 10586185db85Sdougm } 10596185db85Sdougm } 10606185db85Sdougm return (numproto); 10616185db85Sdougm } 10626185db85Sdougm 10636185db85Sdougm /* 10646185db85Sdougm * find_group_by_name(node, group) 10656185db85Sdougm * 10666185db85Sdougm * search the XML document subtree specified by node to find the group 10676185db85Sdougm * specified by group. Searching subtree allows subgroups to be 10686185db85Sdougm * searched for. 10696185db85Sdougm */ 10706185db85Sdougm 10716185db85Sdougm static xmlNodePtr 10726185db85Sdougm find_group_by_name(xmlNodePtr node, xmlChar *group) 10736185db85Sdougm { 10746185db85Sdougm xmlChar *name = NULL; 10756185db85Sdougm 10766185db85Sdougm for (node = node->xmlChildrenNode; node != NULL; 10776185db85Sdougm node = node->next) { 10786185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"group") == 0) { 10796185db85Sdougm /* if no groupname, return the first found */ 10806185db85Sdougm if (group == NULL) 10816185db85Sdougm break; 10826185db85Sdougm name = xmlGetProp(node, (xmlChar *)"name"); 108357b448deSdougm if (name != NULL && xmlStrcmp(name, group) == 0) 10846185db85Sdougm break; 10856185db85Sdougm if (name != NULL) { 10866185db85Sdougm xmlFree(name); 10876185db85Sdougm name = NULL; 10886185db85Sdougm } 10896185db85Sdougm } 10906185db85Sdougm } 10916185db85Sdougm if (name != NULL) 10926185db85Sdougm xmlFree(name); 10936185db85Sdougm return (node); 10946185db85Sdougm } 10956185db85Sdougm 10966185db85Sdougm /* 10976185db85Sdougm * sa_get_group(groupname) 10986185db85Sdougm * Return the "group" specified. If groupname is NULL, 10996185db85Sdougm * return the first group of the list of groups. 11006185db85Sdougm */ 11016185db85Sdougm sa_group_t 1102549ec3ffSdougm sa_get_group(sa_handle_t handle, char *groupname) 11036185db85Sdougm { 11046185db85Sdougm xmlNodePtr node = NULL; 11056185db85Sdougm char *subgroup = NULL; 11066185db85Sdougm char *group = NULL; 1107549ec3ffSdougm sa_handle_impl_t impl_handle = (sa_handle_impl_t)handle; 11086185db85Sdougm 1109549ec3ffSdougm if (impl_handle != NULL && impl_handle->tree != NULL) { 11106185db85Sdougm if (groupname != NULL) { 11116185db85Sdougm group = strdup(groupname); 1112a3351425Sdougm if (group != NULL) { 11136185db85Sdougm subgroup = strchr(group, '/'); 11146185db85Sdougm if (subgroup != NULL) 11156185db85Sdougm *subgroup++ = '\0'; 11166185db85Sdougm } 1117a3351425Sdougm } 1118a3351425Sdougm /* 1119a3351425Sdougm * We want to find the, possibly, named group. If 1120a3351425Sdougm * group is not NULL, then lookup the name. If it is 1121a3351425Sdougm * NULL, we only do the find if groupname is also 1122a3351425Sdougm * NULL. This allows lookup of the "first" group in 1123a3351425Sdougm * the internal list. 1124a3351425Sdougm */ 1125a3351425Sdougm if (group != NULL || groupname == NULL) 1126a3351425Sdougm node = find_group_by_name(impl_handle->tree, 1127a3351425Sdougm (xmlChar *)group); 1128a3351425Sdougm 11296185db85Sdougm /* if a subgroup, find it before returning */ 113057b448deSdougm if (subgroup != NULL && node != NULL) 11316185db85Sdougm node = find_group_by_name(node, (xmlChar *)subgroup); 11326185db85Sdougm } 11336185db85Sdougm if (node != NULL && (char *)group != NULL) 1134549ec3ffSdougm (void) sa_get_instance(impl_handle->scfhandle, (char *)group); 11356185db85Sdougm if (group != NULL) 11366185db85Sdougm free(group); 11376185db85Sdougm return ((sa_group_t)(node)); 11386185db85Sdougm } 11396185db85Sdougm 11406185db85Sdougm /* 11416185db85Sdougm * sa_get_next_group(group) 11426185db85Sdougm * Return the "next" group after the specified group from 11436185db85Sdougm * the internal group list. NULL if there are no more. 11446185db85Sdougm */ 11456185db85Sdougm sa_group_t 11466185db85Sdougm sa_get_next_group(sa_group_t group) 11476185db85Sdougm { 11486185db85Sdougm xmlNodePtr ngroup = NULL; 11496185db85Sdougm if (group != NULL) { 11506185db85Sdougm for (ngroup = ((xmlNodePtr)group)->next; ngroup != NULL; 11516185db85Sdougm ngroup = ngroup->next) { 11526185db85Sdougm if (xmlStrcmp(ngroup->name, (xmlChar *)"group") == 0) 11536185db85Sdougm break; 11546185db85Sdougm } 11556185db85Sdougm } 11566185db85Sdougm return ((sa_group_t)ngroup); 11576185db85Sdougm } 11586185db85Sdougm 11596185db85Sdougm /* 11606185db85Sdougm * sa_get_share(group, sharepath) 11616185db85Sdougm * Return the share object for the share specified. The share 11626185db85Sdougm * must be in the specified group. Return NULL if not found. 11636185db85Sdougm */ 11646185db85Sdougm sa_share_t 11656185db85Sdougm sa_get_share(sa_group_t group, char *sharepath) 11666185db85Sdougm { 11676185db85Sdougm xmlNodePtr node = NULL; 11686185db85Sdougm xmlChar *path; 11696185db85Sdougm 11706185db85Sdougm /* 11716185db85Sdougm * For future scalability, this should end up building a cache 11726185db85Sdougm * since it will get called regularly by the mountd and info 11736185db85Sdougm * services. 11746185db85Sdougm */ 11756185db85Sdougm if (group != NULL) { 11766185db85Sdougm for (node = ((xmlNodePtr)group)->children; node != NULL; 11776185db85Sdougm node = node->next) { 11786185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"share") == 0) { 11796185db85Sdougm if (sharepath == NULL) { 11806185db85Sdougm break; 11816185db85Sdougm } else { 11826185db85Sdougm /* is it the correct share? */ 118357b448deSdougm path = xmlGetProp(node, 118457b448deSdougm (xmlChar *)"path"); 11856185db85Sdougm if (path != NULL && 118657b448deSdougm xmlStrcmp(path, 118757b448deSdougm (xmlChar *)sharepath) == 0) { 11886185db85Sdougm xmlFree(path); 11896185db85Sdougm break; 11906185db85Sdougm } 11916185db85Sdougm xmlFree(path); 11926185db85Sdougm } 11936185db85Sdougm } 11946185db85Sdougm } 11956185db85Sdougm } 11966185db85Sdougm return ((sa_share_t)node); 11976185db85Sdougm } 11986185db85Sdougm 11996185db85Sdougm /* 12006185db85Sdougm * sa_get_next_share(share) 12016185db85Sdougm * Return the next share following the specified share 12026185db85Sdougm * from the internal list of shares. Returns NULL if there 12036185db85Sdougm * are no more shares. The list is relative to the same 12046185db85Sdougm * group. 12056185db85Sdougm */ 12066185db85Sdougm sa_share_t 12076185db85Sdougm sa_get_next_share(sa_share_t share) 12086185db85Sdougm { 12096185db85Sdougm xmlNodePtr node = NULL; 12106185db85Sdougm 12116185db85Sdougm if (share != NULL) { 12126185db85Sdougm for (node = ((xmlNodePtr)share)->next; node != NULL; 12136185db85Sdougm node = node->next) { 12146185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"share") == 0) { 12156185db85Sdougm break; 12166185db85Sdougm } 12176185db85Sdougm } 12186185db85Sdougm } 12196185db85Sdougm return ((sa_share_t)node); 12206185db85Sdougm } 12216185db85Sdougm 12226185db85Sdougm /* 12236185db85Sdougm * _sa_get_child_node(node, type) 12246185db85Sdougm * 12256185db85Sdougm * find the child node of the specified node that has "type". This is 12266185db85Sdougm * used to implement several internal functions. 12276185db85Sdougm */ 12286185db85Sdougm 12296185db85Sdougm static xmlNodePtr 12306185db85Sdougm _sa_get_child_node(xmlNodePtr node, xmlChar *type) 12316185db85Sdougm { 12326185db85Sdougm xmlNodePtr child; 12336185db85Sdougm for (child = node->xmlChildrenNode; child != NULL; 12346185db85Sdougm child = child->next) 12356185db85Sdougm if (xmlStrcmp(child->name, type) == 0) 12366185db85Sdougm return (child); 12376185db85Sdougm return ((xmlNodePtr)NULL); 12386185db85Sdougm } 12396185db85Sdougm 12406185db85Sdougm /* 12416185db85Sdougm * find_share(group, path) 12426185db85Sdougm * 12436185db85Sdougm * Search all the shares in the specified group for one that has the 12446185db85Sdougm * specified path. 12456185db85Sdougm */ 12466185db85Sdougm 12476185db85Sdougm static sa_share_t 12486185db85Sdougm find_share(sa_group_t group, char *sharepath) 12496185db85Sdougm { 12506185db85Sdougm sa_share_t share; 12516185db85Sdougm char *path; 12526185db85Sdougm 12536185db85Sdougm for (share = sa_get_share(group, NULL); share != NULL; 12546185db85Sdougm share = sa_get_next_share(share)) { 12556185db85Sdougm path = sa_get_share_attr(share, "path"); 12566185db85Sdougm if (path != NULL && strcmp(path, sharepath) == 0) { 12576185db85Sdougm sa_free_attr_string(path); 12586185db85Sdougm break; 12596185db85Sdougm } 12606185db85Sdougm if (path != NULL) 12616185db85Sdougm sa_free_attr_string(path); 12626185db85Sdougm } 12636185db85Sdougm return (share); 12646185db85Sdougm } 12656185db85Sdougm 12666185db85Sdougm /* 12676185db85Sdougm * sa_get_sub_group(group) 12686185db85Sdougm * 12696185db85Sdougm * Get the first sub-group of group. The sa_get_next_group() function 12706185db85Sdougm * can be used to get the rest. This is currently only used for ZFS 12716185db85Sdougm * sub-groups but could be used to implement a more general mechanism. 12726185db85Sdougm */ 12736185db85Sdougm 12746185db85Sdougm sa_group_t 12756185db85Sdougm sa_get_sub_group(sa_group_t group) 12766185db85Sdougm { 12776185db85Sdougm return ((sa_group_t)_sa_get_child_node((xmlNodePtr)group, 12786185db85Sdougm (xmlChar *)"group")); 12796185db85Sdougm } 12806185db85Sdougm 12816185db85Sdougm /* 12826185db85Sdougm * sa_find_share(sharepath) 12836185db85Sdougm * Finds a share regardless of group. In the future, this 12846185db85Sdougm * function should utilize a cache and hash table of some kind. 12856185db85Sdougm * The current assumption is that a path will only be shared 12866185db85Sdougm * once. In the future, this may change as implementation of 12876185db85Sdougm * resource names comes into being. 12886185db85Sdougm */ 12896185db85Sdougm sa_share_t 1290549ec3ffSdougm sa_find_share(sa_handle_t handle, char *sharepath) 12916185db85Sdougm { 12926185db85Sdougm sa_group_t group; 12936185db85Sdougm sa_group_t zgroup; 12946185db85Sdougm sa_share_t share = NULL; 12956185db85Sdougm int done = 0; 12966185db85Sdougm 1297549ec3ffSdougm for (group = sa_get_group(handle, NULL); group != NULL && !done; 12986185db85Sdougm group = sa_get_next_group(group)) { 12996185db85Sdougm if (is_zfs_group(group)) { 130057b448deSdougm for (zgroup = 130157b448deSdougm (sa_group_t)_sa_get_child_node((xmlNodePtr)group, 13026185db85Sdougm (xmlChar *)"group"); 130357b448deSdougm zgroup != NULL; 130457b448deSdougm zgroup = sa_get_next_group(zgroup)) { 13056185db85Sdougm share = find_share(zgroup, sharepath); 13066185db85Sdougm if (share != NULL) 13076185db85Sdougm break; 13086185db85Sdougm } 13096185db85Sdougm } else { 13106185db85Sdougm share = find_share(group, sharepath); 13116185db85Sdougm } 13126185db85Sdougm if (share != NULL) 13136185db85Sdougm break; 13146185db85Sdougm } 13156185db85Sdougm return (share); 13166185db85Sdougm } 13176185db85Sdougm 13186185db85Sdougm /* 1319f345c0beSdougm * sa_check_path(group, path, strictness) 13206185db85Sdougm * 1321da6c28aaSamw * Check that path is a valid path relative to the group. Currently, 13226185db85Sdougm * we are ignoring the group and checking only the NFS rules. Later, 13236185db85Sdougm * we may want to use the group to then check against the protocols 1324f345c0beSdougm * enabled on the group. The strictness values mean: 1325f345c0beSdougm * SA_CHECK_NORMAL == only check newpath against shares that are active 1326f345c0beSdougm * SA_CHECK_STRICT == check newpath against both active shares and those 1327f345c0beSdougm * stored in the repository 13286185db85Sdougm */ 13296185db85Sdougm 13306185db85Sdougm int 1331f345c0beSdougm sa_check_path(sa_group_t group, char *path, int strictness) 13326185db85Sdougm { 1333549ec3ffSdougm sa_handle_t handle; 1334549ec3ffSdougm 1335549ec3ffSdougm handle = sa_find_group_handle(group); 1336549ec3ffSdougm return (validpath(handle, path, strictness)); 13376185db85Sdougm } 13386185db85Sdougm 13396185db85Sdougm /* 1340da6c28aaSamw * mark_excluded_protos(group, share, flags) 13416185db85Sdougm * 1342da6c28aaSamw * Walk through all the protocols enabled for the group and check to 1343da6c28aaSamw * see if the share has any of them should be in the exclude list 1344da6c28aaSamw * based on the featureset of the protocol. If there are any, add the 1345da6c28aaSamw * "exclude" property to the share. 1346da6c28aaSamw */ 1347da6c28aaSamw static void 1348da6c28aaSamw mark_excluded_protos(sa_group_t group, xmlNodePtr share, uint64_t flags) 1349da6c28aaSamw { 1350da6c28aaSamw sa_optionset_t optionset; 1351da6c28aaSamw char exclude_list[SA_STRSIZE]; 1352da6c28aaSamw char *sep = ""; 1353da6c28aaSamw 1354da6c28aaSamw exclude_list[0] = '\0'; 1355da6c28aaSamw for (optionset = sa_get_optionset(group, NULL); 1356da6c28aaSamw optionset != NULL; 1357da6c28aaSamw optionset = sa_get_next_optionset(optionset)) { 1358da6c28aaSamw char *value; 1359da6c28aaSamw uint64_t features; 1360da6c28aaSamw value = sa_get_optionset_attr(optionset, "type"); 1361da6c28aaSamw if (value == NULL) 1362da6c28aaSamw continue; 1363da6c28aaSamw features = sa_proto_get_featureset(value); 1364da6c28aaSamw sa_free_attr_string(value); 1365da6c28aaSamw if (!(features & flags)) { 1366da6c28aaSamw (void) strlcat(exclude_list, sep, 1367da6c28aaSamw sizeof (exclude_list)); 1368da6c28aaSamw (void) strlcat(exclude_list, value, 1369da6c28aaSamw sizeof (exclude_list)); 1370da6c28aaSamw sep = ","; 1371da6c28aaSamw } 1372da6c28aaSamw } 1373da6c28aaSamw if (exclude_list[0] != '\0') 1374da6c28aaSamw xmlSetProp(share, (xmlChar *)"exclude", 1375da6c28aaSamw (xmlChar *)exclude_list); 1376da6c28aaSamw } 1377da6c28aaSamw 1378da6c28aaSamw /* 1379da6c28aaSamw * get_all_features(group) 1380da6c28aaSamw * 1381da6c28aaSamw * Walk through all the protocols on the group and collect all 1382da6c28aaSamw * possible enabled features. This is the OR of all the featuresets. 1383da6c28aaSamw */ 1384da6c28aaSamw static uint64_t 1385da6c28aaSamw get_all_features(sa_group_t group) 1386da6c28aaSamw { 1387da6c28aaSamw sa_optionset_t optionset; 1388da6c28aaSamw uint64_t features = 0; 1389da6c28aaSamw 1390da6c28aaSamw for (optionset = sa_get_optionset(group, NULL); 1391da6c28aaSamw optionset != NULL; 1392da6c28aaSamw optionset = sa_get_next_optionset(optionset)) { 1393da6c28aaSamw char *value; 1394da6c28aaSamw value = sa_get_optionset_attr(optionset, "type"); 1395da6c28aaSamw if (value == NULL) 1396da6c28aaSamw continue; 1397da6c28aaSamw features |= sa_proto_get_featureset(value); 1398da6c28aaSamw sa_free_attr_string(value); 1399da6c28aaSamw } 1400da6c28aaSamw return (features); 1401da6c28aaSamw } 1402da6c28aaSamw 1403da6c28aaSamw 1404da6c28aaSamw /* 1405da6c28aaSamw * _sa_add_share(group, sharepath, persist, *error, flags) 1406da6c28aaSamw * 1407da6c28aaSamw * Common code for all types of add_share. sa_add_share() is the 14086185db85Sdougm * public API, we also need to be able to do this when parsing legacy 14096185db85Sdougm * files and construction of the internal configuration while 1410da6c28aaSamw * extracting config info from SMF. "flags" indicates if some 1411da6c28aaSamw * protocols need relaxed rules while other don't. These values are 1412da6c28aaSamw * the featureset values defined in libshare.h. 14136185db85Sdougm */ 14146185db85Sdougm 14156185db85Sdougm sa_share_t 1416da6c28aaSamw _sa_add_share(sa_group_t group, char *sharepath, int persist, int *error, 1417da6c28aaSamw uint64_t flags) 14186185db85Sdougm { 14196185db85Sdougm xmlNodePtr node = NULL; 14206185db85Sdougm int err; 14216185db85Sdougm 14226185db85Sdougm err = SA_OK; /* assume success */ 14236185db85Sdougm 142457b448deSdougm node = xmlNewChild((xmlNodePtr)group, NULL, (xmlChar *)"share", NULL); 1425da6c28aaSamw if (node == NULL) { 1426da6c28aaSamw if (error != NULL) 1427da6c28aaSamw *error = SA_NO_MEMORY; 1428da6c28aaSamw return (node); 1429da6c28aaSamw } 1430da6c28aaSamw 14316185db85Sdougm xmlSetProp(node, (xmlChar *)"path", (xmlChar *)sharepath); 143257b448deSdougm xmlSetProp(node, (xmlChar *)"type", 143357b448deSdougm persist ? (xmlChar *)"persist" : (xmlChar *)"transient"); 1434da6c28aaSamw if (flags != 0) 1435da6c28aaSamw mark_excluded_protos(group, node, flags); 14366185db85Sdougm if (persist != SA_SHARE_TRANSIENT) { 14376185db85Sdougm /* 14386185db85Sdougm * persistent shares come in two flavors: SMF and 14396185db85Sdougm * ZFS. Sort this one out based on target group and 1440da6c28aaSamw * path type. Both NFS and SMB are supported. First, 1441da6c28aaSamw * check to see if the protocol is enabled on the 1442da6c28aaSamw * subgroup and then setup the share appropriately. 14436185db85Sdougm */ 144457b448deSdougm if (sa_group_is_zfs(group) && 144557b448deSdougm sa_path_is_zfs(sharepath)) { 1446da6c28aaSamw if (sa_get_optionset(group, "nfs") != NULL) 14476185db85Sdougm err = sa_zfs_set_sharenfs(group, sharepath, 1); 1448da6c28aaSamw else if (sa_get_optionset(group, "smb") != NULL) 1449da6c28aaSamw err = sa_zfs_set_sharesmb(group, sharepath, 1); 14506185db85Sdougm } else { 1451549ec3ffSdougm sa_handle_impl_t impl_handle; 145257b448deSdougm impl_handle = 1453da6c28aaSamw (sa_handle_impl_t)sa_find_group_handle(group); 145457b448deSdougm if (impl_handle != NULL) { 1455da6c28aaSamw err = sa_commit_share(impl_handle->scfhandle, 1456da6c28aaSamw group, (sa_share_t)node); 145757b448deSdougm } else { 1458549ec3ffSdougm err = SA_SYSTEM_ERR; 14596185db85Sdougm } 14606185db85Sdougm } 146157b448deSdougm } 1462da6c28aaSamw if (err == SA_NO_PERMISSION && persist & SA_SHARE_PARSER) 14636185db85Sdougm /* called by the dfstab parser so could be a show */ 14646185db85Sdougm err = SA_OK; 1465da6c28aaSamw 14666185db85Sdougm if (err != SA_OK) { 14676185db85Sdougm /* 14686185db85Sdougm * we couldn't commit to the repository so undo 14696185db85Sdougm * our internal state to reflect reality. 14706185db85Sdougm */ 14716185db85Sdougm xmlUnlinkNode(node); 14726185db85Sdougm xmlFreeNode(node); 14736185db85Sdougm node = NULL; 14746185db85Sdougm } 1475da6c28aaSamw 14766185db85Sdougm if (error != NULL) 14776185db85Sdougm *error = err; 1478da6c28aaSamw 14796185db85Sdougm return (node); 14806185db85Sdougm } 14816185db85Sdougm 14826185db85Sdougm /* 14836185db85Sdougm * sa_add_share(group, sharepath, persist, *error) 14846185db85Sdougm * 14856185db85Sdougm * Add a new share object to the specified group. The share will 14866185db85Sdougm * have the specified sharepath and will only be constructed if 14876185db85Sdougm * it is a valid path to be shared. NULL is returned on error 14886185db85Sdougm * and a detailed error value will be returned via the error 14896185db85Sdougm * pointer. 14906185db85Sdougm */ 14916185db85Sdougm sa_share_t 14926185db85Sdougm sa_add_share(sa_group_t group, char *sharepath, int persist, int *error) 14936185db85Sdougm { 14946185db85Sdougm xmlNodePtr node = NULL; 1495f345c0beSdougm int strictness = SA_CHECK_NORMAL; 1496549ec3ffSdougm sa_handle_t handle; 1497da6c28aaSamw uint64_t special = 0; 1498da6c28aaSamw uint64_t features; 1499f345c0beSdougm 1500f345c0beSdougm /* 1501f345c0beSdougm * If the share is to be permanent, use strict checking so a 1502f345c0beSdougm * bad config doesn't get created. Transient shares only need 1503f345c0beSdougm * to check against the currently active 1504f345c0beSdougm * shares. SA_SHARE_PARSER is a modifier used internally to 1505f345c0beSdougm * indicate that we are being called by the dfstab parser and 1506f345c0beSdougm * that we need strict checking in all cases. Normally persist 1507f345c0beSdougm * is in integer value but SA_SHARE_PARSER may be or'd into 1508f345c0beSdougm * it as an override. 1509f345c0beSdougm */ 1510f345c0beSdougm if (persist & SA_SHARE_PARSER || persist == SA_SHARE_PERMANENT) 1511f345c0beSdougm strictness = SA_CHECK_STRICT; 15126185db85Sdougm 1513549ec3ffSdougm handle = sa_find_group_handle(group); 1514549ec3ffSdougm 1515da6c28aaSamw /* 1516da6c28aaSamw * need to determine if the share is valid. The rules are: 1517da6c28aaSamw * - The path must not already exist 1518da6c28aaSamw * - The path must not be a subdir or parent dir of an 1519da6c28aaSamw * existing path unless at least one protocol allows it. 1520da6c28aaSamw * The sub/parent check is done in sa_check_path(). 1521da6c28aaSamw */ 1522da6c28aaSamw 1523da6c28aaSamw if (sa_find_share(handle, sharepath) == NULL) { 1524da6c28aaSamw *error = sa_check_path(group, sharepath, strictness); 1525da6c28aaSamw features = get_all_features(group); 1526da6c28aaSamw switch (*error) { 1527da6c28aaSamw case SA_PATH_IS_SUBDIR: 1528da6c28aaSamw if (features & SA_FEATURE_ALLOWSUBDIRS) 1529da6c28aaSamw special |= SA_FEATURE_ALLOWSUBDIRS; 1530da6c28aaSamw break; 1531da6c28aaSamw case SA_PATH_IS_PARENTDIR: 1532da6c28aaSamw if (features & SA_FEATURE_ALLOWPARDIRS) 1533da6c28aaSamw special |= SA_FEATURE_ALLOWPARDIRS; 1534da6c28aaSamw break; 15356185db85Sdougm } 1536da6c28aaSamw if (*error == SA_OK || special != SA_FEATURE_NONE) 1537da6c28aaSamw node = _sa_add_share(group, sharepath, persist, 1538da6c28aaSamw error, special); 1539da6c28aaSamw } else { 15406185db85Sdougm *error = SA_DUPLICATE_NAME; 1541da6c28aaSamw } 15426185db85Sdougm 15436185db85Sdougm return ((sa_share_t)node); 15446185db85Sdougm } 15456185db85Sdougm 15466185db85Sdougm /* 15476185db85Sdougm * sa_enable_share(share, protocol) 15486185db85Sdougm * Enable the specified share to the specified protocol. 15496185db85Sdougm * If protocol is NULL, then all protocols. 15506185db85Sdougm */ 15516185db85Sdougm int 15526185db85Sdougm sa_enable_share(sa_share_t share, char *protocol) 15536185db85Sdougm { 15546185db85Sdougm char *sharepath; 15556185db85Sdougm struct stat st; 1556da6c28aaSamw int err = SA_OK; 1557da6c28aaSamw int ret; 15586185db85Sdougm 15596185db85Sdougm sharepath = sa_get_share_attr(share, "path"); 1560da6c28aaSamw if (sharepath == NULL) 1561da6c28aaSamw return (SA_NO_MEMORY); 15626185db85Sdougm if (stat(sharepath, &st) < 0) { 15636185db85Sdougm err = SA_NO_SUCH_PATH; 15646185db85Sdougm } else { 15656185db85Sdougm /* tell the server about the share */ 15666185db85Sdougm if (protocol != NULL) { 1567da6c28aaSamw if (excluded_protocol(share, protocol)) 1568da6c28aaSamw goto done; 1569da6c28aaSamw 15706185db85Sdougm /* lookup protocol specific handler */ 15716185db85Sdougm err = sa_proto_share(protocol, share); 15726185db85Sdougm if (err == SA_OK) 1573da6c28aaSamw (void) sa_set_share_attr(share, 1574da6c28aaSamw "shared", "true"); 15756185db85Sdougm } else { 1576da6c28aaSamw /* Tell all protocols about the share */ 1577da6c28aaSamw sa_group_t group; 1578da6c28aaSamw sa_optionset_t optionset; 1579da6c28aaSamw 1580da6c28aaSamw group = sa_get_parent_group(share); 1581da6c28aaSamw 1582da6c28aaSamw for (optionset = sa_get_optionset(group, NULL); 1583da6c28aaSamw optionset != NULL; 1584da6c28aaSamw optionset = sa_get_next_optionset(optionset)) { 1585da6c28aaSamw char *proto; 1586da6c28aaSamw proto = sa_get_optionset_attr(optionset, 1587da6c28aaSamw "type"); 1588da6c28aaSamw if (proto != NULL) { 1589da6c28aaSamw if (!excluded_protocol(share, proto)) { 1590da6c28aaSamw ret = sa_proto_share(proto, 1591da6c28aaSamw share); 1592da6c28aaSamw if (ret != SA_OK) 1593da6c28aaSamw err = ret; 1594da6c28aaSamw } 1595da6c28aaSamw sa_free_attr_string(proto); 1596da6c28aaSamw } 1597da6c28aaSamw } 15986185db85Sdougm (void) sa_set_share_attr(share, "shared", "true"); 15996185db85Sdougm } 16006185db85Sdougm } 1601da6c28aaSamw done: 16026185db85Sdougm if (sharepath != NULL) 16036185db85Sdougm sa_free_attr_string(sharepath); 16046185db85Sdougm return (err); 16056185db85Sdougm } 16066185db85Sdougm 16076185db85Sdougm /* 16086185db85Sdougm * sa_disable_share(share, protocol) 1609da6c28aaSamw * Disable the specified share to the specified protocol. If 1610da6c28aaSamw * protocol is NULL, then all protocols that are enabled for the 1611da6c28aaSamw * share should be disabled. 16126185db85Sdougm */ 16136185db85Sdougm int 16146185db85Sdougm sa_disable_share(sa_share_t share, char *protocol) 16156185db85Sdougm { 16166185db85Sdougm char *path; 1617da6c28aaSamw int err = SA_OK; 16186185db85Sdougm int ret = SA_OK; 16196185db85Sdougm 16206185db85Sdougm path = sa_get_share_attr(share, "path"); 16216185db85Sdougm 16226185db85Sdougm if (protocol != NULL) { 1623ecd6cf80Smarks ret = sa_proto_unshare(share, protocol, path); 16246185db85Sdougm } else { 16256185db85Sdougm /* need to do all protocols */ 1626da6c28aaSamw sa_group_t group; 1627da6c28aaSamw sa_optionset_t optionset; 1628da6c28aaSamw 1629da6c28aaSamw group = sa_get_parent_group(share); 1630da6c28aaSamw 1631da6c28aaSamw /* Tell all protocols about the share */ 1632da6c28aaSamw for (optionset = sa_get_optionset(group, NULL); 1633da6c28aaSamw optionset != NULL; 1634da6c28aaSamw optionset = sa_get_next_optionset(optionset)) { 1635da6c28aaSamw char *proto; 1636da6c28aaSamw 1637da6c28aaSamw proto = sa_get_optionset_attr(optionset, "type"); 1638da6c28aaSamw if (proto != NULL) { 1639da6c28aaSamw err = sa_proto_unshare(share, proto, path); 1640da6c28aaSamw if (err != SA_OK) 1641da6c28aaSamw ret = err; 1642da6c28aaSamw sa_free_attr_string(proto); 1643da6c28aaSamw } 1644da6c28aaSamw } 16456185db85Sdougm } 16466185db85Sdougm if (ret == SA_OK) 16476185db85Sdougm (void) sa_set_share_attr(share, "shared", NULL); 16486185db85Sdougm if (path != NULL) 16496185db85Sdougm sa_free_attr_string(path); 16506185db85Sdougm return (ret); 16516185db85Sdougm } 16526185db85Sdougm 16536185db85Sdougm /* 16546185db85Sdougm * sa_remove_share(share) 16556185db85Sdougm * 16566185db85Sdougm * remove the specified share from its containing group. 16576185db85Sdougm * Remove from the SMF or ZFS configuration space. 16586185db85Sdougm */ 16596185db85Sdougm 16606185db85Sdougm int 16616185db85Sdougm sa_remove_share(sa_share_t share) 16626185db85Sdougm { 16636185db85Sdougm sa_group_t group; 16646185db85Sdougm int ret = SA_OK; 16656185db85Sdougm char *type; 16666185db85Sdougm int transient = 0; 16676185db85Sdougm char *groupname; 16686185db85Sdougm char *zfs; 16696185db85Sdougm 16706185db85Sdougm type = sa_get_share_attr(share, "type"); 16716185db85Sdougm group = sa_get_parent_group(share); 16726185db85Sdougm zfs = sa_get_group_attr(group, "zfs"); 16736185db85Sdougm groupname = sa_get_group_attr(group, "name"); 16746185db85Sdougm if (type != NULL && strcmp(type, "persist") != 0) 16756185db85Sdougm transient = 1; 16766185db85Sdougm if (type != NULL) 16776185db85Sdougm sa_free_attr_string(type); 16786185db85Sdougm 16796185db85Sdougm /* remove the node from its group then free the memory */ 16806185db85Sdougm 16816185db85Sdougm /* 16826185db85Sdougm * need to test if "busy" 16836185db85Sdougm */ 16846185db85Sdougm /* only do SMF action if permanent */ 16856185db85Sdougm if (!transient || zfs != NULL) { 16866185db85Sdougm /* remove from legacy dfstab as well as possible SMF */ 1687da6c28aaSamw ret = sa_delete_legacy(share, NULL); 16886185db85Sdougm if (ret == SA_OK) { 16896185db85Sdougm if (!sa_group_is_zfs(group)) { 1690549ec3ffSdougm sa_handle_impl_t impl_handle; 169157b448deSdougm impl_handle = (sa_handle_impl_t) 169257b448deSdougm sa_find_group_handle(group); 169357b448deSdougm if (impl_handle != NULL) { 169457b448deSdougm ret = sa_delete_share( 169557b448deSdougm impl_handle->scfhandle, group, 169657b448deSdougm share); 16976185db85Sdougm } else { 169857b448deSdougm ret = SA_SYSTEM_ERR; 169957b448deSdougm } 170057b448deSdougm } else { 170157b448deSdougm char *sharepath = sa_get_share_attr(share, 170257b448deSdougm "path"); 17036185db85Sdougm if (sharepath != NULL) { 170457b448deSdougm ret = sa_zfs_set_sharenfs(group, 170557b448deSdougm sharepath, 0); 17066185db85Sdougm sa_free_attr_string(sharepath); 17076185db85Sdougm } 17086185db85Sdougm } 17096185db85Sdougm } 17106185db85Sdougm } 17116185db85Sdougm if (groupname != NULL) 17126185db85Sdougm sa_free_attr_string(groupname); 17136185db85Sdougm if (zfs != NULL) 17146185db85Sdougm sa_free_attr_string(zfs); 17156185db85Sdougm 17166185db85Sdougm xmlUnlinkNode((xmlNodePtr)share); 17176185db85Sdougm xmlFreeNode((xmlNodePtr)share); 17186185db85Sdougm return (ret); 17196185db85Sdougm } 17206185db85Sdougm 17216185db85Sdougm /* 17226185db85Sdougm * sa_move_share(group, share) 17236185db85Sdougm * 17246185db85Sdougm * move the specified share to the specified group. Update SMF 17256185db85Sdougm * appropriately. 17266185db85Sdougm */ 17276185db85Sdougm 17286185db85Sdougm int 17296185db85Sdougm sa_move_share(sa_group_t group, sa_share_t share) 17306185db85Sdougm { 17316185db85Sdougm sa_group_t oldgroup; 17326185db85Sdougm int ret = SA_OK; 17336185db85Sdougm 17346185db85Sdougm /* remove the node from its group then free the memory */ 17356185db85Sdougm 17366185db85Sdougm oldgroup = sa_get_parent_group(share); 17376185db85Sdougm if (oldgroup != group) { 1738549ec3ffSdougm sa_handle_impl_t impl_handle; 17396185db85Sdougm xmlUnlinkNode((xmlNodePtr)share); 174057b448deSdougm /* 174157b448deSdougm * now that the share isn't in its old group, add to 174257b448deSdougm * the new one 174357b448deSdougm */ 17446185db85Sdougm xmlAddChild((xmlNodePtr)group, (xmlNodePtr)share); 17456185db85Sdougm /* need to deal with SMF */ 1746549ec3ffSdougm impl_handle = (sa_handle_impl_t)sa_find_group_handle(group); 1747549ec3ffSdougm if (impl_handle != NULL) { 17486185db85Sdougm /* 17496185db85Sdougm * need to remove from old group first and then add to 17506185db85Sdougm * new group. Ideally, we would do the other order but 17516185db85Sdougm * need to avoid having the share in two groups at the 17526185db85Sdougm * same time. 17536185db85Sdougm */ 175457b448deSdougm ret = sa_delete_share(impl_handle->scfhandle, oldgroup, 175557b448deSdougm share); 1756549ec3ffSdougm if (ret == SA_OK) 175757b448deSdougm ret = sa_commit_share(impl_handle->scfhandle, 175857b448deSdougm group, share); 1759549ec3ffSdougm } else { 1760549ec3ffSdougm ret = SA_SYSTEM_ERR; 17616185db85Sdougm } 17626185db85Sdougm } 17636185db85Sdougm return (ret); 17646185db85Sdougm } 17656185db85Sdougm 17666185db85Sdougm /* 17676185db85Sdougm * sa_get_parent_group(share) 17686185db85Sdougm * 1769da6c28aaSamw * Return the containing group for the share. If a group was actually 17706185db85Sdougm * passed in, we don't want a parent so return NULL. 17716185db85Sdougm */ 17726185db85Sdougm 17736185db85Sdougm sa_group_t 17746185db85Sdougm sa_get_parent_group(sa_share_t share) 17756185db85Sdougm { 17766185db85Sdougm xmlNodePtr node = NULL; 17776185db85Sdougm if (share != NULL) { 17786185db85Sdougm node = ((xmlNodePtr)share)->parent; 17796185db85Sdougm /* 17806185db85Sdougm * make sure parent is a group and not sharecfg since 17816185db85Sdougm * we may be cheating and passing in a group. 17826185db85Sdougm * Eventually, groups of groups might come into being. 17836185db85Sdougm */ 17846185db85Sdougm if (node == NULL || 17856185db85Sdougm xmlStrcmp(node->name, (xmlChar *)"sharecfg") == 0) 17866185db85Sdougm node = NULL; 17876185db85Sdougm } 17886185db85Sdougm return ((sa_group_t)node); 17896185db85Sdougm } 17906185db85Sdougm 17916185db85Sdougm /* 1792549ec3ffSdougm * _sa_create_group(impl_handle, groupname) 17936185db85Sdougm * 17946185db85Sdougm * Create a group in the document. The caller will need to deal with 17956185db85Sdougm * configuration store and activation. 17966185db85Sdougm */ 17976185db85Sdougm 17986185db85Sdougm sa_group_t 1799549ec3ffSdougm _sa_create_group(sa_handle_impl_t impl_handle, char *groupname) 18006185db85Sdougm { 18016185db85Sdougm xmlNodePtr node = NULL; 18026185db85Sdougm 18036185db85Sdougm if (sa_valid_group_name(groupname)) { 180457b448deSdougm node = xmlNewChild(impl_handle->tree, NULL, (xmlChar *)"group", 180557b448deSdougm NULL); 18066185db85Sdougm if (node != NULL) { 180757b448deSdougm xmlSetProp(node, (xmlChar *)"name", 180857b448deSdougm (xmlChar *)groupname); 180957b448deSdougm xmlSetProp(node, (xmlChar *)"state", 181057b448deSdougm (xmlChar *)"enabled"); 18116185db85Sdougm } 18126185db85Sdougm } 18136185db85Sdougm return ((sa_group_t)node); 18146185db85Sdougm } 18156185db85Sdougm 18166185db85Sdougm /* 18176185db85Sdougm * _sa_create_zfs_group(group, groupname) 18186185db85Sdougm * 18196185db85Sdougm * Create a ZFS subgroup under the specified group. This may 18206185db85Sdougm * eventually form the basis of general sub-groups, but is currently 18216185db85Sdougm * restricted to ZFS. 18226185db85Sdougm */ 18236185db85Sdougm sa_group_t 18246185db85Sdougm _sa_create_zfs_group(sa_group_t group, char *groupname) 18256185db85Sdougm { 18266185db85Sdougm xmlNodePtr node = NULL; 18276185db85Sdougm 182857b448deSdougm node = xmlNewChild((xmlNodePtr)group, NULL, (xmlChar *)"group", NULL); 18296185db85Sdougm if (node != NULL) { 18306185db85Sdougm xmlSetProp(node, (xmlChar *)"name", (xmlChar *)groupname); 18316185db85Sdougm xmlSetProp(node, (xmlChar *)"state", (xmlChar *)"enabled"); 18326185db85Sdougm } 18336185db85Sdougm 18346185db85Sdougm return ((sa_group_t)node); 18356185db85Sdougm } 18366185db85Sdougm 18376185db85Sdougm /* 18386185db85Sdougm * sa_create_group(groupname, *error) 18396185db85Sdougm * 18406185db85Sdougm * Create a new group with groupname. Need to validate that it is a 18416185db85Sdougm * legal name for SMF and the construct the SMF service instance of 18426185db85Sdougm * svc:/network/shares/group to implement the group. All necessary 18436185db85Sdougm * operational properties must be added to the group at this point 18446185db85Sdougm * (via the SMF transaction model). 18456185db85Sdougm */ 18466185db85Sdougm sa_group_t 1847549ec3ffSdougm sa_create_group(sa_handle_t handle, char *groupname, int *error) 18486185db85Sdougm { 18496185db85Sdougm xmlNodePtr node = NULL; 18506185db85Sdougm sa_group_t group; 18516185db85Sdougm int ret; 185257b448deSdougm char rbacstr[SA_STRSIZE]; 1853549ec3ffSdougm sa_handle_impl_t impl_handle = (sa_handle_impl_t)handle; 18546185db85Sdougm 18556185db85Sdougm ret = SA_OK; 18566185db85Sdougm 1857549ec3ffSdougm if (impl_handle == NULL || impl_handle->scfhandle == NULL) { 18586185db85Sdougm ret = SA_SYSTEM_ERR; 18596185db85Sdougm goto err; 18606185db85Sdougm } 18616185db85Sdougm 1862549ec3ffSdougm group = sa_get_group(handle, groupname); 18636185db85Sdougm if (group != NULL) { 18646185db85Sdougm ret = SA_DUPLICATE_NAME; 18656185db85Sdougm } else { 18666185db85Sdougm if (sa_valid_group_name(groupname)) { 1867549ec3ffSdougm node = xmlNewChild(impl_handle->tree, NULL, 18686185db85Sdougm (xmlChar *)"group", NULL); 18696185db85Sdougm if (node != NULL) { 187057b448deSdougm xmlSetProp(node, (xmlChar *)"name", 187157b448deSdougm (xmlChar *)groupname); 18726185db85Sdougm /* default to the group being enabled */ 187357b448deSdougm xmlSetProp(node, (xmlChar *)"state", 187457b448deSdougm (xmlChar *)"enabled"); 187557b448deSdougm ret = sa_create_instance(impl_handle->scfhandle, 187657b448deSdougm groupname); 18776185db85Sdougm if (ret == SA_OK) { 187857b448deSdougm ret = sa_start_transaction( 187957b448deSdougm impl_handle->scfhandle, 1880549ec3ffSdougm "operation"); 18816185db85Sdougm } 18826185db85Sdougm if (ret == SA_OK) { 188357b448deSdougm ret = sa_set_property( 188457b448deSdougm impl_handle->scfhandle, 1885549ec3ffSdougm "state", "enabled"); 18866185db85Sdougm if (ret == SA_OK) { 188757b448deSdougm ret = sa_end_transaction( 188857b448deSdougm impl_handle->scfhandle); 18896185db85Sdougm } else { 189057b448deSdougm sa_abort_transaction( 189157b448deSdougm impl_handle->scfhandle); 18926185db85Sdougm } 18936185db85Sdougm } 18946185db85Sdougm if (ret == SA_OK) { 18956185db85Sdougm /* initialize the RBAC strings */ 189657b448deSdougm ret = sa_start_transaction( 189757b448deSdougm impl_handle->scfhandle, 1898549ec3ffSdougm "general"); 18996185db85Sdougm if (ret == SA_OK) { 190057b448deSdougm (void) snprintf(rbacstr, 190157b448deSdougm sizeof (rbacstr), "%s.%s", 19026185db85Sdougm SA_RBAC_MANAGE, groupname); 190357b448deSdougm ret = sa_set_property( 190457b448deSdougm impl_handle->scfhandle, 19056185db85Sdougm "action_authorization", 19066185db85Sdougm rbacstr); 19076185db85Sdougm } 19086185db85Sdougm if (ret == SA_OK) { 190957b448deSdougm (void) snprintf(rbacstr, 191057b448deSdougm sizeof (rbacstr), "%s.%s", 19116185db85Sdougm SA_RBAC_VALUE, groupname); 191257b448deSdougm ret = sa_set_property( 191357b448deSdougm impl_handle->scfhandle, 19146185db85Sdougm "value_authorization", 19156185db85Sdougm rbacstr); 19166185db85Sdougm } 19176185db85Sdougm if (ret == SA_OK) { 191857b448deSdougm ret = sa_end_transaction( 191957b448deSdougm impl_handle->scfhandle); 19206185db85Sdougm } else { 192157b448deSdougm sa_abort_transaction( 192257b448deSdougm impl_handle->scfhandle); 19236185db85Sdougm } 19246185db85Sdougm } 19256185db85Sdougm if (ret != SA_OK) { 19266185db85Sdougm /* 192757b448deSdougm * Couldn't commit the group 192857b448deSdougm * so we need to undo 192957b448deSdougm * internally. 19306185db85Sdougm */ 19316185db85Sdougm xmlUnlinkNode(node); 19326185db85Sdougm xmlFreeNode(node); 19336185db85Sdougm node = NULL; 19346185db85Sdougm } 19356185db85Sdougm } else { 19366185db85Sdougm ret = SA_NO_MEMORY; 19376185db85Sdougm } 19386185db85Sdougm } else { 19396185db85Sdougm ret = SA_INVALID_NAME; 19406185db85Sdougm } 19416185db85Sdougm } 19426185db85Sdougm err: 19436185db85Sdougm if (error != NULL) 19446185db85Sdougm *error = ret; 19456185db85Sdougm return ((sa_group_t)node); 19466185db85Sdougm } 19476185db85Sdougm 19486185db85Sdougm /* 19496185db85Sdougm * sa_remove_group(group) 19506185db85Sdougm * 19516185db85Sdougm * Remove the specified group. This deletes from the SMF repository. 19526185db85Sdougm * All property groups and properties are removed. 19536185db85Sdougm */ 19546185db85Sdougm 19556185db85Sdougm int 19566185db85Sdougm sa_remove_group(sa_group_t group) 19576185db85Sdougm { 19586185db85Sdougm char *name; 19596185db85Sdougm int ret = SA_OK; 1960549ec3ffSdougm sa_handle_impl_t impl_handle; 19616185db85Sdougm 1962549ec3ffSdougm impl_handle = (sa_handle_impl_t)sa_find_group_handle(group); 1963549ec3ffSdougm if (impl_handle != NULL) { 19646185db85Sdougm name = sa_get_group_attr(group, "name"); 19656185db85Sdougm if (name != NULL) { 1966549ec3ffSdougm ret = sa_delete_instance(impl_handle->scfhandle, name); 19676185db85Sdougm sa_free_attr_string(name); 19686185db85Sdougm } 19696185db85Sdougm xmlUnlinkNode((xmlNodePtr)group); /* make sure unlinked */ 19706185db85Sdougm xmlFreeNode((xmlNodePtr)group); /* now it is gone */ 1971549ec3ffSdougm } else { 1972549ec3ffSdougm ret = SA_SYSTEM_ERR; 1973549ec3ffSdougm } 19746185db85Sdougm return (ret); 19756185db85Sdougm } 19766185db85Sdougm 19776185db85Sdougm /* 19786185db85Sdougm * sa_update_config() 19796185db85Sdougm * 19806185db85Sdougm * Used to update legacy files that need to be updated in bulk 19816185db85Sdougm * Currently, this is a placeholder and will go away in a future 19826185db85Sdougm * release. 19836185db85Sdougm */ 19846185db85Sdougm 19856185db85Sdougm int 1986549ec3ffSdougm sa_update_config(sa_handle_t handle) 19876185db85Sdougm { 19886185db85Sdougm /* 19896185db85Sdougm * do legacy files first so we can tell when they change. 19906185db85Sdougm * This will go away when we start updating individual records 19916185db85Sdougm * rather than the whole file. 19926185db85Sdougm */ 1993549ec3ffSdougm update_legacy_config(handle); 19946185db85Sdougm return (SA_OK); 19956185db85Sdougm } 19966185db85Sdougm 19976185db85Sdougm /* 19986185db85Sdougm * get_node_attr(node, tag) 19996185db85Sdougm * 2000da6c28aaSamw * Get the specified tag(attribute) if it exists on the node. This is 20016185db85Sdougm * used internally by a number of attribute oriented functions. 20026185db85Sdougm */ 20036185db85Sdougm 20046185db85Sdougm static char * 20056185db85Sdougm get_node_attr(void *nodehdl, char *tag) 20066185db85Sdougm { 20076185db85Sdougm xmlNodePtr node = (xmlNodePtr)nodehdl; 20086185db85Sdougm xmlChar *name = NULL; 20096185db85Sdougm 201057b448deSdougm if (node != NULL) 20116185db85Sdougm name = xmlGetProp(node, (xmlChar *)tag); 20126185db85Sdougm return ((char *)name); 20136185db85Sdougm } 20146185db85Sdougm 20156185db85Sdougm /* 20166185db85Sdougm * get_node_attr(node, tag) 20176185db85Sdougm * 2018da6c28aaSamw * Set the specified tag(attribute) to the specified value This is 20196185db85Sdougm * used internally by a number of attribute oriented functions. It 20206185db85Sdougm * doesn't update the repository, only the internal document state. 20216185db85Sdougm */ 20226185db85Sdougm 20236185db85Sdougm void 20246185db85Sdougm set_node_attr(void *nodehdl, char *tag, char *value) 20256185db85Sdougm { 20266185db85Sdougm xmlNodePtr node = (xmlNodePtr)nodehdl; 20276185db85Sdougm if (node != NULL && tag != NULL) { 202857b448deSdougm if (value != NULL) 20296185db85Sdougm xmlSetProp(node, (xmlChar *)tag, (xmlChar *)value); 203057b448deSdougm else 20316185db85Sdougm xmlUnsetProp(node, (xmlChar *)tag); 20326185db85Sdougm } 20336185db85Sdougm } 20346185db85Sdougm 20356185db85Sdougm /* 20366185db85Sdougm * sa_get_group_attr(group, tag) 20376185db85Sdougm * 20386185db85Sdougm * Get the specied attribute, if defined, for the group. 20396185db85Sdougm */ 20406185db85Sdougm 20416185db85Sdougm char * 20426185db85Sdougm sa_get_group_attr(sa_group_t group, char *tag) 20436185db85Sdougm { 20446185db85Sdougm return (get_node_attr((void *)group, tag)); 20456185db85Sdougm } 20466185db85Sdougm 20476185db85Sdougm /* 20486185db85Sdougm * sa_set_group_attr(group, tag, value) 20496185db85Sdougm * 20506185db85Sdougm * set the specified tag/attribute on the group using value as its 20516185db85Sdougm * value. 20526185db85Sdougm * 20536185db85Sdougm * This will result in setting the property in the SMF repository as 20546185db85Sdougm * well as in the internal document. 20556185db85Sdougm */ 20566185db85Sdougm 20576185db85Sdougm int 20586185db85Sdougm sa_set_group_attr(sa_group_t group, char *tag, char *value) 20596185db85Sdougm { 20606185db85Sdougm int ret; 20616185db85Sdougm char *groupname; 2062549ec3ffSdougm sa_handle_impl_t impl_handle; 20636185db85Sdougm 2064da6c28aaSamw /* 2065da6c28aaSamw * ZFS group/subgroup doesn't need the handle so shortcut. 2066da6c28aaSamw */ 2067da6c28aaSamw if (sa_group_is_zfs(group)) { 2068da6c28aaSamw set_node_attr((void *)group, tag, value); 2069da6c28aaSamw return (SA_OK); 2070da6c28aaSamw } 2071da6c28aaSamw 2072549ec3ffSdougm impl_handle = (sa_handle_impl_t)sa_find_group_handle(group); 2073549ec3ffSdougm if (impl_handle != NULL) { 20746185db85Sdougm groupname = sa_get_group_attr(group, "name"); 2075549ec3ffSdougm ret = sa_get_instance(impl_handle->scfhandle, groupname); 20766185db85Sdougm if (ret == SA_OK) { 20776185db85Sdougm set_node_attr((void *)group, tag, value); 207857b448deSdougm ret = sa_start_transaction(impl_handle->scfhandle, 207957b448deSdougm "operation"); 20806185db85Sdougm if (ret == SA_OK) { 208157b448deSdougm ret = sa_set_property(impl_handle->scfhandle, 208257b448deSdougm tag, value); 20836185db85Sdougm if (ret == SA_OK) 208457b448deSdougm (void) sa_end_transaction( 208557b448deSdougm impl_handle->scfhandle); 208657b448deSdougm else 208757b448deSdougm sa_abort_transaction( 208857b448deSdougm impl_handle->scfhandle); 20896185db85Sdougm } 20906185db85Sdougm } 20916185db85Sdougm if (groupname != NULL) 20926185db85Sdougm sa_free_attr_string(groupname); 2093549ec3ffSdougm } else { 2094549ec3ffSdougm ret = SA_SYSTEM_ERR; 2095549ec3ffSdougm } 20966185db85Sdougm return (ret); 20976185db85Sdougm } 20986185db85Sdougm 20996185db85Sdougm /* 21006185db85Sdougm * sa_get_share_attr(share, tag) 21016185db85Sdougm * 21026185db85Sdougm * Return the value of the tag/attribute set on the specified 21036185db85Sdougm * share. Returns NULL if the tag doesn't exist. 21046185db85Sdougm */ 21056185db85Sdougm 21066185db85Sdougm char * 21076185db85Sdougm sa_get_share_attr(sa_share_t share, char *tag) 21086185db85Sdougm { 21096185db85Sdougm return (get_node_attr((void *)share, tag)); 21106185db85Sdougm } 21116185db85Sdougm 21126185db85Sdougm /* 21136185db85Sdougm * _sa_set_share_description(share, description) 21146185db85Sdougm * 2115da6c28aaSamw * Add a description tag with text contents to the specified share. A 2116da6c28aaSamw * separate XML tag is used rather than a property. This can also be 2117da6c28aaSamw * used with resources. 21186185db85Sdougm */ 21196185db85Sdougm 21206185db85Sdougm xmlNodePtr 2121da6c28aaSamw _sa_set_share_description(void *share, char *content) 21226185db85Sdougm { 21236185db85Sdougm xmlNodePtr node; 212457b448deSdougm node = xmlNewChild((xmlNodePtr)share, NULL, (xmlChar *)"description", 212557b448deSdougm NULL); 21266185db85Sdougm xmlNodeSetContent(node, (xmlChar *)content); 21276185db85Sdougm return (node); 21286185db85Sdougm } 21296185db85Sdougm 21306185db85Sdougm /* 21316185db85Sdougm * sa_set_share_attr(share, tag, value) 21326185db85Sdougm * 21336185db85Sdougm * Set the share attribute specified by tag to the specified value. In 21346185db85Sdougm * the case of "resource", enforce a no duplicates in a group rule. If 21356185db85Sdougm * the share is not transient, commit the changes to the repository 21366185db85Sdougm * else just update the share internally. 21376185db85Sdougm */ 21386185db85Sdougm 21396185db85Sdougm int 21406185db85Sdougm sa_set_share_attr(sa_share_t share, char *tag, char *value) 21416185db85Sdougm { 21426185db85Sdougm sa_group_t group; 21436185db85Sdougm sa_share_t resource; 21446185db85Sdougm int ret = SA_OK; 21456185db85Sdougm 21466185db85Sdougm group = sa_get_parent_group(share); 21476185db85Sdougm 21486185db85Sdougm /* 21496185db85Sdougm * There are some attributes that may have specific 21506185db85Sdougm * restrictions on them. Initially, only "resource" has 21516185db85Sdougm * special meaning that needs to be checked. Only one instance 21526185db85Sdougm * of a resource name may exist within a group. 21536185db85Sdougm */ 21546185db85Sdougm 21556185db85Sdougm if (strcmp(tag, "resource") == 0) { 21566185db85Sdougm resource = sa_get_resource(group, value); 21576185db85Sdougm if (resource != share && resource != NULL) 21586185db85Sdougm ret = SA_DUPLICATE_NAME; 21596185db85Sdougm } 21606185db85Sdougm if (ret == SA_OK) { 21616185db85Sdougm set_node_attr((void *)share, tag, value); 21626185db85Sdougm if (group != NULL) { 21636185db85Sdougm char *type; 21646185db85Sdougm /* we can probably optimize this some */ 21656185db85Sdougm type = sa_get_share_attr(share, "type"); 2166549ec3ffSdougm if (type == NULL || strcmp(type, "transient") != 0) { 2167549ec3ffSdougm sa_handle_impl_t impl_handle; 216857b448deSdougm impl_handle = 216957b448deSdougm (sa_handle_impl_t)sa_find_group_handle( 217057b448deSdougm group); 217157b448deSdougm if (impl_handle != NULL) { 217257b448deSdougm ret = sa_commit_share( 217357b448deSdougm impl_handle->scfhandle, group, 217457b448deSdougm share); 217557b448deSdougm } else { 2176549ec3ffSdougm ret = SA_SYSTEM_ERR; 2177549ec3ffSdougm } 217857b448deSdougm } 21796185db85Sdougm if (type != NULL) 21806185db85Sdougm sa_free_attr_string(type); 21816185db85Sdougm } 21826185db85Sdougm } 21836185db85Sdougm return (ret); 21846185db85Sdougm } 21856185db85Sdougm 21866185db85Sdougm /* 21876185db85Sdougm * sa_get_property_attr(prop, tag) 21886185db85Sdougm * 21896185db85Sdougm * Get the value of the specified property attribute. Standard 21906185db85Sdougm * attributes are "type" and "value". 21916185db85Sdougm */ 21926185db85Sdougm 21936185db85Sdougm char * 21946185db85Sdougm sa_get_property_attr(sa_property_t prop, char *tag) 21956185db85Sdougm { 21966185db85Sdougm return (get_node_attr((void *)prop, tag)); 21976185db85Sdougm } 21986185db85Sdougm 21996185db85Sdougm /* 22006185db85Sdougm * sa_get_optionset_attr(prop, tag) 22016185db85Sdougm * 22026185db85Sdougm * Get the value of the specified property attribute. Standard 22036185db85Sdougm * attribute is "type". 22046185db85Sdougm */ 22056185db85Sdougm 22066185db85Sdougm char * 22076185db85Sdougm sa_get_optionset_attr(sa_property_t optionset, char *tag) 22086185db85Sdougm { 22096185db85Sdougm return (get_node_attr((void *)optionset, tag)); 22106185db85Sdougm 22116185db85Sdougm } 22126185db85Sdougm 22136185db85Sdougm /* 22146185db85Sdougm * sa_set_optionset_attr(optionset, tag, value) 22156185db85Sdougm * 22166185db85Sdougm * Set the specified attribute(tag) to the specified value on the 22176185db85Sdougm * optionset. 22186185db85Sdougm */ 22196185db85Sdougm 22206185db85Sdougm void 22216185db85Sdougm sa_set_optionset_attr(sa_group_t optionset, char *tag, char *value) 22226185db85Sdougm { 22236185db85Sdougm set_node_attr((void *)optionset, tag, value); 22246185db85Sdougm } 22256185db85Sdougm 22266185db85Sdougm /* 22276185db85Sdougm * sa_free_attr_string(string) 22286185db85Sdougm * 22296185db85Sdougm * Free the string that was returned in one of the sa_get_*_attr() 22306185db85Sdougm * functions. 22316185db85Sdougm */ 22326185db85Sdougm 22336185db85Sdougm void 22346185db85Sdougm sa_free_attr_string(char *string) 22356185db85Sdougm { 22366185db85Sdougm xmlFree((xmlChar *)string); 22376185db85Sdougm } 22386185db85Sdougm 22396185db85Sdougm /* 22406185db85Sdougm * sa_get_optionset(group, proto) 22416185db85Sdougm * 22426185db85Sdougm * Return the optionset, if it exists, that is associated with the 22436185db85Sdougm * specified protocol. 22446185db85Sdougm */ 22456185db85Sdougm 22466185db85Sdougm sa_optionset_t 22476185db85Sdougm sa_get_optionset(void *group, char *proto) 22486185db85Sdougm { 22496185db85Sdougm xmlNodePtr node; 22506185db85Sdougm xmlChar *value = NULL; 22516185db85Sdougm 22526185db85Sdougm for (node = ((xmlNodePtr)group)->children; node != NULL; 22536185db85Sdougm node = node->next) { 22546185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"optionset") == 0) { 22556185db85Sdougm value = xmlGetProp(node, (xmlChar *)"type"); 22566185db85Sdougm if (proto != NULL) { 22576185db85Sdougm if (value != NULL && 22586185db85Sdougm xmlStrcmp(value, (xmlChar *)proto) == 0) { 22596185db85Sdougm break; 22606185db85Sdougm } 22616185db85Sdougm if (value != NULL) { 22626185db85Sdougm xmlFree(value); 22636185db85Sdougm value = NULL; 22646185db85Sdougm } 22656185db85Sdougm } else { 22666185db85Sdougm break; 22676185db85Sdougm } 22686185db85Sdougm } 22696185db85Sdougm } 22706185db85Sdougm if (value != NULL) 22716185db85Sdougm xmlFree(value); 22726185db85Sdougm return ((sa_optionset_t)node); 22736185db85Sdougm } 22746185db85Sdougm 22756185db85Sdougm /* 22766185db85Sdougm * sa_get_next_optionset(optionset) 22776185db85Sdougm * 22786185db85Sdougm * Return the next optionset in the group. NULL if this was the last. 22796185db85Sdougm */ 22806185db85Sdougm 22816185db85Sdougm sa_optionset_t 22826185db85Sdougm sa_get_next_optionset(sa_optionset_t optionset) 22836185db85Sdougm { 22846185db85Sdougm xmlNodePtr node; 22856185db85Sdougm 22866185db85Sdougm for (node = ((xmlNodePtr)optionset)->next; node != NULL; 22876185db85Sdougm node = node->next) { 22886185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"optionset") == 0) { 22896185db85Sdougm break; 22906185db85Sdougm } 22916185db85Sdougm } 22926185db85Sdougm return ((sa_optionset_t)node); 22936185db85Sdougm } 22946185db85Sdougm 22956185db85Sdougm /* 22966185db85Sdougm * sa_get_security(group, sectype, proto) 22976185db85Sdougm * 22986185db85Sdougm * Return the security optionset. The internal name is a hold over 22996185db85Sdougm * from the implementation and will be changed before the API is 23006185db85Sdougm * finalized. This is really a named optionset that can be negotiated 23016185db85Sdougm * as a group of properties (like NFS security options). 23026185db85Sdougm */ 23036185db85Sdougm 23046185db85Sdougm sa_security_t 23056185db85Sdougm sa_get_security(sa_group_t group, char *sectype, char *proto) 23066185db85Sdougm { 23076185db85Sdougm xmlNodePtr node; 23086185db85Sdougm xmlChar *value = NULL; 23096185db85Sdougm 23106185db85Sdougm for (node = ((xmlNodePtr)group)->children; node != NULL; 23116185db85Sdougm node = node->next) { 23126185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"security") == 0) { 23136185db85Sdougm if (proto != NULL) { 23146185db85Sdougm value = xmlGetProp(node, (xmlChar *)"type"); 23156185db85Sdougm if (value == NULL || 23166185db85Sdougm (value != NULL && 23176185db85Sdougm xmlStrcmp(value, (xmlChar *)proto) != 0)) { 23186185db85Sdougm /* it doesn't match so continue */ 23196185db85Sdougm xmlFree(value); 23206185db85Sdougm value = NULL; 23216185db85Sdougm continue; 23226185db85Sdougm } 23236185db85Sdougm } 23246185db85Sdougm if (value != NULL) { 23256185db85Sdougm xmlFree(value); 23266185db85Sdougm value = NULL; 23276185db85Sdougm } 23286185db85Sdougm /* potential match */ 23296185db85Sdougm if (sectype != NULL) { 23306185db85Sdougm value = xmlGetProp(node, (xmlChar *)"sectype"); 23316185db85Sdougm if (value != NULL && 23326185db85Sdougm xmlStrcmp(value, (xmlChar *)sectype) == 0) { 23336185db85Sdougm break; 23346185db85Sdougm } 23356185db85Sdougm } else { 23366185db85Sdougm break; 23376185db85Sdougm } 23386185db85Sdougm } 23396185db85Sdougm if (value != NULL) { 23406185db85Sdougm xmlFree(value); 23416185db85Sdougm value = NULL; 23426185db85Sdougm } 23436185db85Sdougm } 23446185db85Sdougm if (value != NULL) 23456185db85Sdougm xmlFree(value); 23466185db85Sdougm return ((sa_security_t)node); 23476185db85Sdougm } 23486185db85Sdougm 23496185db85Sdougm /* 23506185db85Sdougm * sa_get_next_security(security) 23516185db85Sdougm * 23526185db85Sdougm * Get the next security optionset if one exists. 23536185db85Sdougm */ 23546185db85Sdougm 23556185db85Sdougm sa_security_t 23566185db85Sdougm sa_get_next_security(sa_security_t security) 23576185db85Sdougm { 23586185db85Sdougm xmlNodePtr node; 23596185db85Sdougm 23606185db85Sdougm for (node = ((xmlNodePtr)security)->next; node != NULL; 23616185db85Sdougm node = node->next) { 23626185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"security") == 0) { 23636185db85Sdougm break; 23646185db85Sdougm } 23656185db85Sdougm } 23666185db85Sdougm return ((sa_security_t)node); 23676185db85Sdougm } 23686185db85Sdougm 23696185db85Sdougm /* 23706185db85Sdougm * sa_get_property(optionset, prop) 23716185db85Sdougm * 23726185db85Sdougm * Get the property object with the name specified in prop from the 23736185db85Sdougm * optionset. 23746185db85Sdougm */ 23756185db85Sdougm 23766185db85Sdougm sa_property_t 23776185db85Sdougm sa_get_property(sa_optionset_t optionset, char *prop) 23786185db85Sdougm { 23796185db85Sdougm xmlNodePtr node = (xmlNodePtr)optionset; 23806185db85Sdougm xmlChar *value = NULL; 23816185db85Sdougm 23826185db85Sdougm if (optionset == NULL) 23836185db85Sdougm return (NULL); 23846185db85Sdougm 23856185db85Sdougm for (node = node->children; node != NULL; 23866185db85Sdougm node = node->next) { 23876185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"option") == 0) { 23886185db85Sdougm if (prop == NULL) 23896185db85Sdougm break; 23906185db85Sdougm value = xmlGetProp(node, (xmlChar *)"type"); 239157b448deSdougm if (value != NULL && 239257b448deSdougm xmlStrcmp(value, (xmlChar *)prop) == 0) { 23936185db85Sdougm break; 23946185db85Sdougm } 23956185db85Sdougm if (value != NULL) { 23966185db85Sdougm xmlFree(value); 23976185db85Sdougm value = NULL; 23986185db85Sdougm } 23996185db85Sdougm } 24006185db85Sdougm } 24016185db85Sdougm if (value != NULL) 24026185db85Sdougm xmlFree(value); 24036185db85Sdougm if (node != NULL && xmlStrcmp(node->name, (xmlChar *)"option") != 0) { 240457b448deSdougm /* 240557b448deSdougm * avoid a non option node -- it is possible to be a 240657b448deSdougm * text node 240757b448deSdougm */ 24086185db85Sdougm node = NULL; 24096185db85Sdougm } 24106185db85Sdougm return ((sa_property_t)node); 24116185db85Sdougm } 24126185db85Sdougm 24136185db85Sdougm /* 24146185db85Sdougm * sa_get_next_property(property) 24156185db85Sdougm * 24166185db85Sdougm * Get the next property following the specified property. NULL if 24176185db85Sdougm * this was the last. 24186185db85Sdougm */ 24196185db85Sdougm 24206185db85Sdougm sa_property_t 24216185db85Sdougm sa_get_next_property(sa_property_t property) 24226185db85Sdougm { 24236185db85Sdougm xmlNodePtr node; 24246185db85Sdougm 24256185db85Sdougm for (node = ((xmlNodePtr)property)->next; node != NULL; 24266185db85Sdougm node = node->next) { 24276185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"option") == 0) { 24286185db85Sdougm break; 24296185db85Sdougm } 24306185db85Sdougm } 24316185db85Sdougm return ((sa_property_t)node); 24326185db85Sdougm } 24336185db85Sdougm 24346185db85Sdougm /* 24356185db85Sdougm * sa_set_share_description(share, content) 24366185db85Sdougm * 24376185db85Sdougm * Set the description of share to content. 24386185db85Sdougm */ 24396185db85Sdougm 24406185db85Sdougm int 24416185db85Sdougm sa_set_share_description(sa_share_t share, char *content) 24426185db85Sdougm { 24436185db85Sdougm xmlNodePtr node; 24446185db85Sdougm sa_group_t group; 24456185db85Sdougm int ret = SA_OK; 24466185db85Sdougm 24476185db85Sdougm for (node = ((xmlNodePtr)share)->children; node != NULL; 24486185db85Sdougm node = node->next) { 24496185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"description") == 0) { 24506185db85Sdougm break; 24516185db85Sdougm } 24526185db85Sdougm } 24536185db85Sdougm /* no existing description but want to add */ 24546185db85Sdougm if (node == NULL && content != NULL) { 24556185db85Sdougm /* add a description */ 24566185db85Sdougm node = _sa_set_share_description(share, content); 24576185db85Sdougm } else if (node != NULL && content != NULL) { 24586185db85Sdougm /* update a description */ 24596185db85Sdougm xmlNodeSetContent(node, (xmlChar *)content); 24606185db85Sdougm } else if (node != NULL && content == NULL) { 24616185db85Sdougm /* remove an existing description */ 24626185db85Sdougm xmlUnlinkNode(node); 24636185db85Sdougm xmlFreeNode(node); 24646185db85Sdougm } 2465da6c28aaSamw group = sa_get_parent_group(share); 2466da6c28aaSamw if (group != NULL && sa_is_persistent(share)) { 2467549ec3ffSdougm sa_handle_impl_t impl_handle; 2468549ec3ffSdougm impl_handle = (sa_handle_impl_t)sa_find_group_handle(group); 246957b448deSdougm if (impl_handle != NULL) { 247057b448deSdougm ret = sa_commit_share(impl_handle->scfhandle, group, 247157b448deSdougm share); 247257b448deSdougm } else { 2473549ec3ffSdougm ret = SA_SYSTEM_ERR; 2474549ec3ffSdougm } 247557b448deSdougm } 24766185db85Sdougm return (ret); 24776185db85Sdougm } 24786185db85Sdougm 24796185db85Sdougm /* 24806185db85Sdougm * fixproblemchars(string) 24816185db85Sdougm * 24826185db85Sdougm * don't want any newline or tab characters in the text since these 24836185db85Sdougm * could break display of data and legacy file formats. 24846185db85Sdougm */ 24856185db85Sdougm static void 24866185db85Sdougm fixproblemchars(char *str) 24876185db85Sdougm { 24886185db85Sdougm int c; 24896185db85Sdougm for (c = *str; c != '\0'; c = *++str) { 24906185db85Sdougm if (c == '\t' || c == '\n') 24916185db85Sdougm *str = ' '; 24926185db85Sdougm else if (c == '"') 24936185db85Sdougm *str = '\''; 24946185db85Sdougm } 24956185db85Sdougm } 24966185db85Sdougm 24976185db85Sdougm /* 24986185db85Sdougm * sa_get_share_description(share) 24996185db85Sdougm * 25006185db85Sdougm * Return the description text for the specified share if it 25016185db85Sdougm * exists. NULL if no description exists. 25026185db85Sdougm */ 25036185db85Sdougm 25046185db85Sdougm char * 25056185db85Sdougm sa_get_share_description(sa_share_t share) 25066185db85Sdougm { 25076185db85Sdougm xmlChar *description = NULL; 25086185db85Sdougm xmlNodePtr node; 25096185db85Sdougm 25106185db85Sdougm for (node = ((xmlNodePtr)share)->children; node != NULL; 25116185db85Sdougm node = node->next) { 25126185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"description") == 0) { 25136185db85Sdougm break; 25146185db85Sdougm } 25156185db85Sdougm } 25166185db85Sdougm if (node != NULL) { 2517da6c28aaSamw description = xmlNodeGetContent(node); 25186185db85Sdougm fixproblemchars((char *)description); 25196185db85Sdougm } 25206185db85Sdougm return ((char *)description); 25216185db85Sdougm } 25226185db85Sdougm 25236185db85Sdougm /* 25246185db85Sdougm * sa_free(share_description(description) 25256185db85Sdougm * 25266185db85Sdougm * Free the description string. 25276185db85Sdougm */ 25286185db85Sdougm 25296185db85Sdougm void 25306185db85Sdougm sa_free_share_description(char *description) 25316185db85Sdougm { 25326185db85Sdougm xmlFree((xmlChar *)description); 25336185db85Sdougm } 25346185db85Sdougm 25356185db85Sdougm /* 25366185db85Sdougm * sa_create_optionset(group, proto) 25376185db85Sdougm * 25386185db85Sdougm * Create an optionset for the specified protocol in the specied 25396185db85Sdougm * group. This is manifested as a property group within SMF. 25406185db85Sdougm */ 25416185db85Sdougm 25426185db85Sdougm sa_optionset_t 25436185db85Sdougm sa_create_optionset(sa_group_t group, char *proto) 25446185db85Sdougm { 25456185db85Sdougm sa_optionset_t optionset; 25466185db85Sdougm sa_group_t parent = group; 2547da6c28aaSamw sa_share_t share = NULL; 2548da6c28aaSamw int err = SA_OK; 2549da6c28aaSamw char *id = NULL; 25506185db85Sdougm 25516185db85Sdougm optionset = sa_get_optionset(group, proto); 25526185db85Sdougm if (optionset != NULL) { 25536185db85Sdougm /* can't have a duplicate protocol */ 25546185db85Sdougm optionset = NULL; 25556185db85Sdougm } else { 2556da6c28aaSamw /* 2557da6c28aaSamw * Account for resource names being slightly 2558da6c28aaSamw * different. 2559da6c28aaSamw */ 2560da6c28aaSamw if (sa_is_share(group)) { 2561da6c28aaSamw /* 2562da6c28aaSamw * Transient shares do not have an "id" so not an 2563da6c28aaSamw * error to not find one. 2564da6c28aaSamw */ 2565da6c28aaSamw id = sa_get_share_attr((sa_share_t)group, "id"); 2566da6c28aaSamw } else if (sa_is_resource(group)) { 2567da6c28aaSamw share = sa_get_resource_parent( 2568da6c28aaSamw (sa_resource_t)group); 2569da6c28aaSamw id = sa_get_resource_attr(share, "id"); 2570da6c28aaSamw 2571da6c28aaSamw /* id can be NULL if the group is transient (ZFS) */ 2572da6c28aaSamw if (id == NULL && sa_is_persistent(group)) 2573da6c28aaSamw err = SA_NO_MEMORY; 2574da6c28aaSamw } 2575da6c28aaSamw if (err == SA_NO_MEMORY) { 2576da6c28aaSamw /* 2577da6c28aaSamw * Couldn't get the id for the share or 2578da6c28aaSamw * resource. While this could be a 2579da6c28aaSamw * configuration issue, it is most likely an 2580da6c28aaSamw * out of memory. In any case, fail the create. 2581da6c28aaSamw */ 2582da6c28aaSamw return (NULL); 2583da6c28aaSamw } 2584da6c28aaSamw 25856185db85Sdougm optionset = (sa_optionset_t)xmlNewChild((xmlNodePtr)group, 258657b448deSdougm NULL, (xmlChar *)"optionset", NULL); 25876185db85Sdougm /* 25886185db85Sdougm * only put to repository if on a group and we were 25896185db85Sdougm * able to create an optionset. 25906185db85Sdougm */ 25916185db85Sdougm if (optionset != NULL) { 259257b448deSdougm char oname[SA_STRSIZE]; 25936185db85Sdougm char *groupname; 25946185db85Sdougm 2595da6c28aaSamw /* 2596da6c28aaSamw * Need to get parent group in all cases, but also get 2597da6c28aaSamw * the share if this is a resource. 2598da6c28aaSamw */ 2599da6c28aaSamw if (sa_is_share(group)) { 26006185db85Sdougm parent = sa_get_parent_group((sa_share_t)group); 2601da6c28aaSamw } else if (sa_is_resource(group)) { 2602da6c28aaSamw share = sa_get_resource_parent( 2603da6c28aaSamw (sa_resource_t)group); 2604da6c28aaSamw parent = sa_get_parent_group(share); 2605da6c28aaSamw } 26066185db85Sdougm 26076185db85Sdougm sa_set_optionset_attr(optionset, "type", proto); 26086185db85Sdougm 26096185db85Sdougm (void) sa_optionset_name(optionset, oname, 26106185db85Sdougm sizeof (oname), id); 26116185db85Sdougm groupname = sa_get_group_attr(parent, "name"); 2612da6c28aaSamw if (groupname != NULL && sa_is_persistent(group)) { 2613549ec3ffSdougm sa_handle_impl_t impl_handle; 2614da6c28aaSamw impl_handle = 2615da6c28aaSamw (sa_handle_impl_t)sa_find_group_handle( 2616da6c28aaSamw group); 2617549ec3ffSdougm assert(impl_handle != NULL); 2618549ec3ffSdougm if (impl_handle != NULL) { 261957b448deSdougm (void) sa_get_instance( 2620da6c28aaSamw impl_handle->scfhandle, groupname); 262157b448deSdougm (void) sa_create_pgroup( 262257b448deSdougm impl_handle->scfhandle, oname); 26236185db85Sdougm } 2624549ec3ffSdougm } 2625549ec3ffSdougm if (groupname != NULL) 2626549ec3ffSdougm sa_free_attr_string(groupname); 2627da6c28aaSamw } 2628da6c28aaSamw } 2629da6c28aaSamw 26306185db85Sdougm if (id != NULL) 26316185db85Sdougm sa_free_attr_string(id); 26326185db85Sdougm return (optionset); 26336185db85Sdougm } 26346185db85Sdougm 26356185db85Sdougm /* 26366185db85Sdougm * sa_get_property_parent(property) 26376185db85Sdougm * 26386185db85Sdougm * Given a property, return the object it is a property of. This will 26396185db85Sdougm * be an optionset of some type. 26406185db85Sdougm */ 26416185db85Sdougm 26426185db85Sdougm static sa_optionset_t 26436185db85Sdougm sa_get_property_parent(sa_property_t property) 26446185db85Sdougm { 26456185db85Sdougm xmlNodePtr node = NULL; 26466185db85Sdougm 264757b448deSdougm if (property != NULL) 26486185db85Sdougm node = ((xmlNodePtr)property)->parent; 26496185db85Sdougm return ((sa_optionset_t)node); 26506185db85Sdougm } 26516185db85Sdougm 26526185db85Sdougm /* 26536185db85Sdougm * sa_get_optionset_parent(optionset) 26546185db85Sdougm * 26556185db85Sdougm * Return the parent of the specified optionset. This could be a group 26566185db85Sdougm * or a share. 26576185db85Sdougm */ 26586185db85Sdougm 26596185db85Sdougm static sa_group_t 26606185db85Sdougm sa_get_optionset_parent(sa_optionset_t optionset) 26616185db85Sdougm { 26626185db85Sdougm xmlNodePtr node = NULL; 26636185db85Sdougm 266457b448deSdougm if (optionset != NULL) 26656185db85Sdougm node = ((xmlNodePtr)optionset)->parent; 26666185db85Sdougm return ((sa_group_t)node); 26676185db85Sdougm } 26686185db85Sdougm 26696185db85Sdougm /* 26706185db85Sdougm * zfs_needs_update(share) 26716185db85Sdougm * 26726185db85Sdougm * In order to avoid making multiple updates to a ZFS share when 26736185db85Sdougm * setting properties, the share attribute "changed" will be set to 2674da6c28aaSamw * true when a property is added or modified. When done adding 26756185db85Sdougm * properties, we can then detect that an update is needed. We then 26766185db85Sdougm * clear the state here to detect additional changes. 26776185db85Sdougm */ 26786185db85Sdougm 26796185db85Sdougm static int 26806185db85Sdougm zfs_needs_update(sa_share_t share) 26816185db85Sdougm { 26826185db85Sdougm char *attr; 26836185db85Sdougm int result = 0; 26846185db85Sdougm 26856185db85Sdougm attr = sa_get_share_attr(share, "changed"); 26866185db85Sdougm if (attr != NULL) { 26876185db85Sdougm sa_free_attr_string(attr); 26886185db85Sdougm result = 1; 26896185db85Sdougm } 26906185db85Sdougm set_node_attr((void *)share, "changed", NULL); 26916185db85Sdougm return (result); 26926185db85Sdougm } 26936185db85Sdougm 26946185db85Sdougm /* 26956185db85Sdougm * zfs_set_update(share) 26966185db85Sdougm * 26976185db85Sdougm * Set the changed attribute of the share to true. 26986185db85Sdougm */ 26996185db85Sdougm 27006185db85Sdougm static void 27016185db85Sdougm zfs_set_update(sa_share_t share) 27026185db85Sdougm { 27036185db85Sdougm set_node_attr((void *)share, "changed", "true"); 27046185db85Sdougm } 27056185db85Sdougm 27066185db85Sdougm /* 27076185db85Sdougm * sa_commit_properties(optionset, clear) 27086185db85Sdougm * 27096185db85Sdougm * Check if SMF or ZFS config and either update or abort the pending 27106185db85Sdougm * changes. 27116185db85Sdougm */ 27126185db85Sdougm 27136185db85Sdougm int 27146185db85Sdougm sa_commit_properties(sa_optionset_t optionset, int clear) 27156185db85Sdougm { 27166185db85Sdougm sa_group_t group; 27176185db85Sdougm sa_group_t parent; 27186185db85Sdougm int zfs = 0; 27196185db85Sdougm int needsupdate = 0; 27206185db85Sdougm int ret = SA_OK; 2721549ec3ffSdougm sa_handle_impl_t impl_handle; 27226185db85Sdougm 27236185db85Sdougm group = sa_get_optionset_parent(optionset); 27246185db85Sdougm if (group != NULL && (sa_is_share(group) || is_zfs_group(group))) { 27256185db85Sdougm /* only update ZFS if on a share */ 27266185db85Sdougm parent = sa_get_parent_group(group); 27276185db85Sdougm zfs++; 272857b448deSdougm if (parent != NULL && is_zfs_group(parent)) 27296185db85Sdougm needsupdate = zfs_needs_update(group); 273057b448deSdougm else 27316185db85Sdougm zfs = 0; 27326185db85Sdougm } 27336185db85Sdougm if (zfs) { 27346185db85Sdougm if (!clear && needsupdate) 27356185db85Sdougm ret = sa_zfs_update((sa_share_t)group); 27366185db85Sdougm } else { 2737549ec3ffSdougm impl_handle = (sa_handle_impl_t)sa_find_group_handle(group); 2738549ec3ffSdougm if (impl_handle != NULL) { 273957b448deSdougm if (clear) { 274057b448deSdougm (void) sa_abort_transaction( 274157b448deSdougm impl_handle->scfhandle); 274257b448deSdougm } else { 274357b448deSdougm ret = sa_end_transaction( 274457b448deSdougm impl_handle->scfhandle); 274557b448deSdougm } 2746549ec3ffSdougm } else { 2747549ec3ffSdougm ret = SA_SYSTEM_ERR; 2748549ec3ffSdougm } 27496185db85Sdougm } 27506185db85Sdougm return (ret); 27516185db85Sdougm } 27526185db85Sdougm 27536185db85Sdougm /* 27546185db85Sdougm * sa_destroy_optionset(optionset) 27556185db85Sdougm * 2756da6c28aaSamw * Remove the optionset from its group. Update the repository to 27576185db85Sdougm * reflect this change. 27586185db85Sdougm */ 27596185db85Sdougm 27606185db85Sdougm int 27616185db85Sdougm sa_destroy_optionset(sa_optionset_t optionset) 27626185db85Sdougm { 276357b448deSdougm char name[SA_STRSIZE]; 27646185db85Sdougm int len; 27656185db85Sdougm int ret; 27666185db85Sdougm char *id = NULL; 27676185db85Sdougm sa_group_t group; 27686185db85Sdougm int ispersist = 1; 27696185db85Sdougm 27706185db85Sdougm /* now delete the prop group */ 27716185db85Sdougm group = sa_get_optionset_parent(optionset); 2772da6c28aaSamw if (group != NULL) { 2773da6c28aaSamw if (sa_is_resource(group)) { 2774da6c28aaSamw sa_resource_t resource = group; 2775da6c28aaSamw sa_share_t share = sa_get_resource_parent(resource); 2776da6c28aaSamw group = sa_get_parent_group(share); 2777da6c28aaSamw id = sa_get_share_attr(share, "id"); 2778da6c28aaSamw } else if (sa_is_share(group)) { 27796185db85Sdougm id = sa_get_share_attr((sa_share_t)group, "id"); 27806185db85Sdougm } 2781da6c28aaSamw ispersist = sa_is_persistent(group); 2782da6c28aaSamw } 27836185db85Sdougm if (ispersist) { 2784549ec3ffSdougm sa_handle_impl_t impl_handle; 27856185db85Sdougm len = sa_optionset_name(optionset, name, sizeof (name), id); 2786549ec3ffSdougm impl_handle = (sa_handle_impl_t)sa_find_group_handle(group); 2787549ec3ffSdougm if (impl_handle != NULL) { 27886185db85Sdougm if (len > 0) { 278957b448deSdougm ret = sa_delete_pgroup(impl_handle->scfhandle, 279057b448deSdougm name); 2791549ec3ffSdougm } 2792549ec3ffSdougm } else { 2793549ec3ffSdougm ret = SA_SYSTEM_ERR; 27946185db85Sdougm } 27956185db85Sdougm } 27966185db85Sdougm xmlUnlinkNode((xmlNodePtr)optionset); 27976185db85Sdougm xmlFreeNode((xmlNodePtr)optionset); 27986185db85Sdougm if (id != NULL) 27996185db85Sdougm sa_free_attr_string(id); 28006185db85Sdougm return (ret); 28016185db85Sdougm } 28026185db85Sdougm 28036185db85Sdougm /* private to the implementation */ 28046185db85Sdougm int 28056185db85Sdougm _sa_remove_optionset(sa_optionset_t optionset) 28066185db85Sdougm { 28076185db85Sdougm int ret = SA_OK; 28086185db85Sdougm 28096185db85Sdougm xmlUnlinkNode((xmlNodePtr)optionset); 28106185db85Sdougm xmlFreeNode((xmlNodePtr)optionset); 28116185db85Sdougm return (ret); 28126185db85Sdougm } 28136185db85Sdougm 28146185db85Sdougm /* 28156185db85Sdougm * sa_create_security(group, sectype, proto) 28166185db85Sdougm * 28176185db85Sdougm * Create a security optionset (one that has a type name and a 28186185db85Sdougm * proto). Security is left over from a pure NFS implementation. The 28196185db85Sdougm * naming will change in the future when the API is released. 28206185db85Sdougm */ 28216185db85Sdougm sa_security_t 28226185db85Sdougm sa_create_security(sa_group_t group, char *sectype, char *proto) 28236185db85Sdougm { 28246185db85Sdougm sa_security_t security; 28256185db85Sdougm char *id = NULL; 28266185db85Sdougm sa_group_t parent; 28276185db85Sdougm char *groupname = NULL; 28286185db85Sdougm 28296185db85Sdougm if (group != NULL && sa_is_share(group)) { 28306185db85Sdougm id = sa_get_share_attr((sa_share_t)group, "id"); 28316185db85Sdougm parent = sa_get_parent_group(group); 28326185db85Sdougm if (parent != NULL) 28336185db85Sdougm groupname = sa_get_group_attr(parent, "name"); 28346185db85Sdougm } else if (group != NULL) { 28356185db85Sdougm groupname = sa_get_group_attr(group, "name"); 28366185db85Sdougm } 28376185db85Sdougm 28386185db85Sdougm security = sa_get_security(group, sectype, proto); 28396185db85Sdougm if (security != NULL) { 28406185db85Sdougm /* can't have a duplicate security option */ 28416185db85Sdougm security = NULL; 28426185db85Sdougm } else { 28436185db85Sdougm security = (sa_security_t)xmlNewChild((xmlNodePtr)group, 284457b448deSdougm NULL, (xmlChar *)"security", NULL); 28456185db85Sdougm if (security != NULL) { 284657b448deSdougm char oname[SA_STRSIZE]; 28476185db85Sdougm sa_set_security_attr(security, "type", proto); 28486185db85Sdougm 28496185db85Sdougm sa_set_security_attr(security, "sectype", sectype); 28506185db85Sdougm (void) sa_security_name(security, oname, 28516185db85Sdougm sizeof (oname), id); 2852da6c28aaSamw if (groupname != NULL && sa_is_persistent(group)) { 2853549ec3ffSdougm sa_handle_impl_t impl_handle; 2854549ec3ffSdougm impl_handle = 285557b448deSdougm (sa_handle_impl_t)sa_find_group_handle( 285657b448deSdougm group); 2857549ec3ffSdougm if (impl_handle != NULL) { 285857b448deSdougm (void) sa_get_instance( 285957b448deSdougm impl_handle->scfhandle, groupname); 286057b448deSdougm (void) sa_create_pgroup( 286157b448deSdougm impl_handle->scfhandle, oname); 2862549ec3ffSdougm } 28636185db85Sdougm } 28646185db85Sdougm } 28656185db85Sdougm } 28666185db85Sdougm if (groupname != NULL) 28676185db85Sdougm sa_free_attr_string(groupname); 28686185db85Sdougm return (security); 28696185db85Sdougm } 28706185db85Sdougm 28716185db85Sdougm /* 28726185db85Sdougm * sa_destroy_security(security) 28736185db85Sdougm * 28746185db85Sdougm * Remove the specified optionset from the document and the 28756185db85Sdougm * configuration. 28766185db85Sdougm */ 28776185db85Sdougm 28786185db85Sdougm int 28796185db85Sdougm sa_destroy_security(sa_security_t security) 28806185db85Sdougm { 288157b448deSdougm char name[SA_STRSIZE]; 28826185db85Sdougm int len; 28836185db85Sdougm int ret = SA_OK; 28846185db85Sdougm char *id = NULL; 28856185db85Sdougm sa_group_t group; 28866185db85Sdougm int iszfs = 0; 28876185db85Sdougm int ispersist = 1; 28886185db85Sdougm 28896185db85Sdougm group = sa_get_optionset_parent(security); 28906185db85Sdougm 28916185db85Sdougm if (group != NULL) 28926185db85Sdougm iszfs = sa_group_is_zfs(group); 28936185db85Sdougm 28946185db85Sdougm if (group != NULL && !iszfs) { 28956185db85Sdougm if (sa_is_share(group)) 2896da6c28aaSamw ispersist = sa_is_persistent(group); 28976185db85Sdougm id = sa_get_share_attr((sa_share_t)group, "id"); 28986185db85Sdougm } 28996185db85Sdougm if (ispersist) { 29006185db85Sdougm len = sa_security_name(security, name, sizeof (name), id); 29016185db85Sdougm if (!iszfs && len > 0) { 2902549ec3ffSdougm sa_handle_impl_t impl_handle; 290357b448deSdougm impl_handle = 290457b448deSdougm (sa_handle_impl_t)sa_find_group_handle(group); 2905549ec3ffSdougm if (impl_handle != NULL) { 290657b448deSdougm ret = sa_delete_pgroup(impl_handle->scfhandle, 290757b448deSdougm name); 2908549ec3ffSdougm } else { 2909549ec3ffSdougm ret = SA_SYSTEM_ERR; 2910549ec3ffSdougm } 29116185db85Sdougm } 29126185db85Sdougm } 29136185db85Sdougm xmlUnlinkNode((xmlNodePtr)security); 29146185db85Sdougm xmlFreeNode((xmlNodePtr)security); 291557b448deSdougm if (iszfs) 29166185db85Sdougm ret = sa_zfs_update(group); 29176185db85Sdougm if (id != NULL) 29186185db85Sdougm sa_free_attr_string(id); 29196185db85Sdougm return (ret); 29206185db85Sdougm } 29216185db85Sdougm 29226185db85Sdougm /* 29236185db85Sdougm * sa_get_security_attr(optionset, tag) 29246185db85Sdougm * 29256185db85Sdougm * Return the specified attribute value from the optionset. 29266185db85Sdougm */ 29276185db85Sdougm 29286185db85Sdougm char * 29296185db85Sdougm sa_get_security_attr(sa_property_t optionset, char *tag) 29306185db85Sdougm { 29316185db85Sdougm return (get_node_attr((void *)optionset, tag)); 29326185db85Sdougm 29336185db85Sdougm } 29346185db85Sdougm 29356185db85Sdougm /* 29366185db85Sdougm * sa_set_security_attr(optionset, tag, value) 29376185db85Sdougm * 29386185db85Sdougm * Set the optioset attribute specied by tag to the specified value. 29396185db85Sdougm */ 29406185db85Sdougm 29416185db85Sdougm void 29426185db85Sdougm sa_set_security_attr(sa_group_t optionset, char *tag, char *value) 29436185db85Sdougm { 29446185db85Sdougm set_node_attr((void *)optionset, tag, value); 29456185db85Sdougm } 29466185db85Sdougm 29476185db85Sdougm /* 29486185db85Sdougm * is_nodetype(node, type) 29496185db85Sdougm * 29506185db85Sdougm * Check to see if node is of the type specified. 29516185db85Sdougm */ 29526185db85Sdougm 29536185db85Sdougm static int 29546185db85Sdougm is_nodetype(void *node, char *type) 29556185db85Sdougm { 29566185db85Sdougm return (strcmp((char *)((xmlNodePtr)node)->name, type) == 0); 29576185db85Sdougm } 29586185db85Sdougm 295957b448deSdougm /* 296057b448deSdougm * add_or_update() 296157b448deSdougm * 296257b448deSdougm * Add or update a property. Pulled out of sa_set_prop_by_prop for 296357b448deSdougm * readability. 296457b448deSdougm */ 296557b448deSdougm static int 296657b448deSdougm add_or_update(scfutilhandle_t *scf_handle, int type, scf_value_t *value, 296757b448deSdougm scf_transaction_entry_t *entry, char *name, char *valstr) 296857b448deSdougm { 296957b448deSdougm int ret = SA_SYSTEM_ERR; 297057b448deSdougm 297157b448deSdougm if (value != NULL) { 297257b448deSdougm if (type == SA_PROP_OP_ADD) 297357b448deSdougm ret = scf_transaction_property_new(scf_handle->trans, 297457b448deSdougm entry, name, SCF_TYPE_ASTRING); 297557b448deSdougm else 297657b448deSdougm ret = scf_transaction_property_change(scf_handle->trans, 297757b448deSdougm entry, name, SCF_TYPE_ASTRING); 297857b448deSdougm if (ret == 0) { 297957b448deSdougm ret = scf_value_set_astring(value, valstr); 298057b448deSdougm if (ret == 0) 298157b448deSdougm ret = scf_entry_add_value(entry, value); 298257b448deSdougm if (ret == 0) 298357b448deSdougm return (ret); 298457b448deSdougm scf_value_destroy(value); 298557b448deSdougm } else { 298657b448deSdougm scf_entry_destroy(entry); 298757b448deSdougm } 298857b448deSdougm } 298957b448deSdougm return (SA_SYSTEM_ERR); 299057b448deSdougm } 299157b448deSdougm 29926185db85Sdougm /* 29936185db85Sdougm * sa_set_prop_by_prop(optionset, group, prop, type) 29946185db85Sdougm * 29956185db85Sdougm * Add/remove/update the specified property prop into the optionset or 29966185db85Sdougm * share. If a share, sort out which property group based on GUID. In 29976185db85Sdougm * all cases, the appropriate transaction is set (or ZFS share is 29986185db85Sdougm * marked as needing an update) 29996185db85Sdougm */ 30006185db85Sdougm 30016185db85Sdougm static int 30026185db85Sdougm sa_set_prop_by_prop(sa_optionset_t optionset, sa_group_t group, 30036185db85Sdougm sa_property_t prop, int type) 30046185db85Sdougm { 30056185db85Sdougm char *name; 30066185db85Sdougm char *valstr; 30076185db85Sdougm int ret = SA_OK; 30086185db85Sdougm scf_transaction_entry_t *entry; 30096185db85Sdougm scf_value_t *value; 30106185db85Sdougm int opttype; /* 1 == optionset, 0 == security */ 30116185db85Sdougm char *id = NULL; 30126185db85Sdougm int iszfs = 0; 30136185db85Sdougm sa_group_t parent = NULL; 3014da6c28aaSamw sa_share_t share = NULL; 3015549ec3ffSdougm sa_handle_impl_t impl_handle; 3016549ec3ffSdougm scfutilhandle_t *scf_handle; 30176185db85Sdougm 3018da6c28aaSamw if (!sa_is_persistent(group)) { 30196185db85Sdougm /* 30206185db85Sdougm * if the group/share is not persistent we don't need 30216185db85Sdougm * to do anything here 30226185db85Sdougm */ 30236185db85Sdougm return (SA_OK); 30246185db85Sdougm } 3025549ec3ffSdougm impl_handle = (sa_handle_impl_t)sa_find_group_handle(group); 302657b448deSdougm if (impl_handle == NULL || impl_handle->scfhandle == NULL) 3027549ec3ffSdougm return (SA_SYSTEM_ERR); 3028549ec3ffSdougm scf_handle = impl_handle->scfhandle; 30296185db85Sdougm name = sa_get_property_attr(prop, "type"); 30306185db85Sdougm valstr = sa_get_property_attr(prop, "value"); 30316185db85Sdougm entry = scf_entry_create(scf_handle->handle); 30326185db85Sdougm opttype = is_nodetype((void *)optionset, "optionset"); 30336185db85Sdougm 3034da6c28aaSamw /* 3035da6c28aaSamw * Check for share vs. resource since they need slightly 3036da6c28aaSamw * different treatment given the hierarchy. 3037da6c28aaSamw */ 30386185db85Sdougm if (valstr != NULL && entry != NULL) { 30396185db85Sdougm if (sa_is_share(group)) { 30406185db85Sdougm parent = sa_get_parent_group(group); 3041da6c28aaSamw share = (sa_share_t)group; 304257b448deSdougm if (parent != NULL) 30436185db85Sdougm iszfs = is_zfs_group(parent); 3044da6c28aaSamw } else if (sa_is_resource(group)) { 3045da6c28aaSamw share = sa_get_parent_group(group); 3046da6c28aaSamw if (share != NULL) 3047da6c28aaSamw parent = sa_get_parent_group(share); 30486185db85Sdougm } else { 30496185db85Sdougm iszfs = is_zfs_group(group); 30506185db85Sdougm } 30516185db85Sdougm if (!iszfs) { 30526185db85Sdougm if (scf_handle->trans == NULL) { 305357b448deSdougm char oname[SA_STRSIZE]; 30546185db85Sdougm char *groupname = NULL; 3055da6c28aaSamw if (share != NULL) { 3056da6c28aaSamw if (parent != NULL) 305757b448deSdougm groupname = 305857b448deSdougm sa_get_group_attr(parent, 305957b448deSdougm "name"); 3060da6c28aaSamw id = sa_get_share_attr( 3061da6c28aaSamw (sa_share_t)share, "id"); 30626185db85Sdougm } else { 306357b448deSdougm groupname = sa_get_group_attr(group, 306457b448deSdougm "name"); 30656185db85Sdougm } 30666185db85Sdougm if (groupname != NULL) { 306757b448deSdougm ret = sa_get_instance(scf_handle, 306857b448deSdougm groupname); 30696185db85Sdougm sa_free_attr_string(groupname); 30706185db85Sdougm } 30716185db85Sdougm if (opttype) 307257b448deSdougm (void) sa_optionset_name(optionset, 307357b448deSdougm oname, sizeof (oname), id); 30746185db85Sdougm else 307557b448deSdougm (void) sa_security_name(optionset, 307657b448deSdougm oname, sizeof (oname), id); 30776185db85Sdougm ret = sa_start_transaction(scf_handle, oname); 30786185db85Sdougm } 30796185db85Sdougm if (ret == SA_OK) { 30806185db85Sdougm switch (type) { 30816185db85Sdougm case SA_PROP_OP_REMOVE: 3082549ec3ffSdougm ret = scf_transaction_property_delete( 308357b448deSdougm scf_handle->trans, entry, name); 30846185db85Sdougm break; 30856185db85Sdougm case SA_PROP_OP_ADD: 30866185db85Sdougm case SA_PROP_OP_UPDATE: 308757b448deSdougm value = scf_value_create( 308857b448deSdougm scf_handle->handle); 308957b448deSdougm ret = add_or_update(scf_handle, type, 309057b448deSdougm value, entry, name, valstr); 30916185db85Sdougm break; 30926185db85Sdougm } 30936185db85Sdougm } 30946185db85Sdougm } else { 30956185db85Sdougm /* 30966185db85Sdougm * ZFS update. The calling function would have updated 30976185db85Sdougm * the internal XML structure. Just need to flag it as 30986185db85Sdougm * changed for ZFS. 30996185db85Sdougm */ 31006185db85Sdougm zfs_set_update((sa_share_t)group); 31016185db85Sdougm } 31026185db85Sdougm } 31036185db85Sdougm 31046185db85Sdougm if (name != NULL) 31056185db85Sdougm sa_free_attr_string(name); 31066185db85Sdougm if (valstr != NULL) 31076185db85Sdougm sa_free_attr_string(valstr); 31086185db85Sdougm else if (entry != NULL) 31096185db85Sdougm scf_entry_destroy(entry); 31106185db85Sdougm 31116185db85Sdougm if (ret == -1) 31126185db85Sdougm ret = SA_SYSTEM_ERR; 31136185db85Sdougm 31146185db85Sdougm return (ret); 31156185db85Sdougm } 31166185db85Sdougm 31176185db85Sdougm /* 31186185db85Sdougm * sa_create_property(name, value) 31196185db85Sdougm * 31206185db85Sdougm * Create a new property with the specified name and value. 31216185db85Sdougm */ 31226185db85Sdougm 31236185db85Sdougm sa_property_t 31246185db85Sdougm sa_create_property(char *name, char *value) 31256185db85Sdougm { 31266185db85Sdougm xmlNodePtr node; 31276185db85Sdougm 31286185db85Sdougm node = xmlNewNode(NULL, (xmlChar *)"option"); 31296185db85Sdougm if (node != NULL) { 31306185db85Sdougm xmlSetProp(node, (xmlChar *)"type", (xmlChar *)name); 31316185db85Sdougm xmlSetProp(node, (xmlChar *)"value", (xmlChar *)value); 31326185db85Sdougm } 31336185db85Sdougm return ((sa_property_t)node); 31346185db85Sdougm } 31356185db85Sdougm 31366185db85Sdougm /* 31376185db85Sdougm * sa_add_property(object, property) 31386185db85Sdougm * 31396185db85Sdougm * Add the specified property to the object. Issue the appropriate 31406185db85Sdougm * transaction or mark a ZFS object as needing an update. 31416185db85Sdougm */ 31426185db85Sdougm 31436185db85Sdougm int 31446185db85Sdougm sa_add_property(void *object, sa_property_t property) 31456185db85Sdougm { 31466185db85Sdougm int ret = SA_OK; 31476185db85Sdougm sa_group_t parent; 31486185db85Sdougm sa_group_t group; 31496185db85Sdougm char *proto; 31506185db85Sdougm 31516185db85Sdougm proto = sa_get_optionset_attr(object, "type"); 31526185db85Sdougm if (property != NULL) { 315357b448deSdougm if ((ret = sa_valid_property(object, proto, property)) == 315457b448deSdougm SA_OK) { 315557b448deSdougm property = (sa_property_t)xmlAddChild( 315657b448deSdougm (xmlNodePtr)object, (xmlNodePtr)property); 31576185db85Sdougm } else { 31586185db85Sdougm if (proto != NULL) 31596185db85Sdougm sa_free_attr_string(proto); 31606185db85Sdougm return (ret); 31616185db85Sdougm } 31626185db85Sdougm } 31636185db85Sdougm 31646185db85Sdougm if (proto != NULL) 31656185db85Sdougm sa_free_attr_string(proto); 31666185db85Sdougm 31676185db85Sdougm parent = sa_get_parent_group(object); 3168da6c28aaSamw if (!sa_is_persistent(parent)) 31696185db85Sdougm return (ret); 31706185db85Sdougm 3171da6c28aaSamw if (sa_is_resource(parent)) { 3172da6c28aaSamw /* 3173da6c28aaSamw * Resources are children of share. Need to go up two 3174da6c28aaSamw * levels to find the group but the parent needs to be 3175da6c28aaSamw * the share at this point in order to get the "id". 3176da6c28aaSamw */ 3177da6c28aaSamw parent = sa_get_parent_group(parent); 31786185db85Sdougm group = sa_get_parent_group(parent); 3179da6c28aaSamw } else if (sa_is_share(parent)) { 3180da6c28aaSamw group = sa_get_parent_group(parent); 3181da6c28aaSamw } else { 31826185db85Sdougm group = parent; 3183da6c28aaSamw } 31846185db85Sdougm 318557b448deSdougm if (property == NULL) { 31866185db85Sdougm ret = SA_NO_MEMORY; 318757b448deSdougm } else { 318857b448deSdougm char oname[SA_STRSIZE]; 31896185db85Sdougm 31906185db85Sdougm if (!is_zfs_group(group)) { 31916185db85Sdougm char *id = NULL; 3192549ec3ffSdougm sa_handle_impl_t impl_handle; 3193549ec3ffSdougm scfutilhandle_t *scf_handle; 3194549ec3ffSdougm 319557b448deSdougm impl_handle = (sa_handle_impl_t)sa_find_group_handle( 319657b448deSdougm group); 319757b448deSdougm if (impl_handle == NULL || 319857b448deSdougm impl_handle->scfhandle == NULL) 3199549ec3ffSdougm ret = SA_SYSTEM_ERR; 3200549ec3ffSdougm if (ret == SA_OK) { 3201549ec3ffSdougm scf_handle = impl_handle->scfhandle; 32026185db85Sdougm if (sa_is_share((sa_group_t)parent)) { 320357b448deSdougm id = sa_get_share_attr( 320457b448deSdougm (sa_share_t)parent, "id"); 32056185db85Sdougm } 32066185db85Sdougm if (scf_handle->trans == NULL) { 320757b448deSdougm if (is_nodetype(object, "optionset")) { 320857b448deSdougm (void) sa_optionset_name( 320957b448deSdougm (sa_optionset_t)object, 32106185db85Sdougm oname, sizeof (oname), id); 321157b448deSdougm } else { 321257b448deSdougm (void) sa_security_name( 321357b448deSdougm (sa_optionset_t)object, 32146185db85Sdougm oname, sizeof (oname), id); 321557b448deSdougm } 321657b448deSdougm ret = sa_start_transaction(scf_handle, 321757b448deSdougm oname); 32186185db85Sdougm } 32196185db85Sdougm if (ret == SA_OK) { 32206185db85Sdougm char *name; 32216185db85Sdougm char *value; 322257b448deSdougm name = sa_get_property_attr(property, 322357b448deSdougm "type"); 322457b448deSdougm value = sa_get_property_attr(property, 322557b448deSdougm "value"); 32266185db85Sdougm if (name != NULL && value != NULL) { 322757b448deSdougm if (scf_handle->scf_state == 322857b448deSdougm SCH_STATE_INIT) { 322957b448deSdougm ret = sa_set_property( 323057b448deSdougm scf_handle, name, 323157b448deSdougm value); 323257b448deSdougm } 323357b448deSdougm } else { 32346185db85Sdougm ret = SA_CONFIG_ERR; 323557b448deSdougm } 32366185db85Sdougm if (name != NULL) 323757b448deSdougm sa_free_attr_string( 323857b448deSdougm name); 32396185db85Sdougm if (value != NULL) 32406185db85Sdougm sa_free_attr_string(value); 32416185db85Sdougm } 32426185db85Sdougm if (id != NULL) 32436185db85Sdougm sa_free_attr_string(id); 3244549ec3ffSdougm } 32456185db85Sdougm } else { 32466185db85Sdougm /* 324757b448deSdougm * ZFS is a special case. We do want 324857b448deSdougm * to allow editing property/security 324957b448deSdougm * lists since we can have a better 325057b448deSdougm * syntax and we also want to keep 325157b448deSdougm * things consistent when possible. 32526185db85Sdougm * 325357b448deSdougm * Right now, we defer until the 325457b448deSdougm * sa_commit_properties so we can get 325557b448deSdougm * them all at once. We do need to 325657b448deSdougm * mark the share as "changed" 32576185db85Sdougm */ 32586185db85Sdougm zfs_set_update((sa_share_t)parent); 32596185db85Sdougm } 32606185db85Sdougm } 32616185db85Sdougm return (ret); 32626185db85Sdougm } 32636185db85Sdougm 32646185db85Sdougm /* 32656185db85Sdougm * sa_remove_property(property) 32666185db85Sdougm * 32676185db85Sdougm * Remove the specied property from its containing object. Update the 32686185db85Sdougm * repository as appropriate. 32696185db85Sdougm */ 32706185db85Sdougm 32716185db85Sdougm int 32726185db85Sdougm sa_remove_property(sa_property_t property) 32736185db85Sdougm { 32746185db85Sdougm int ret = SA_OK; 32756185db85Sdougm 32766185db85Sdougm if (property != NULL) { 32776185db85Sdougm sa_optionset_t optionset; 32786185db85Sdougm sa_group_t group; 32796185db85Sdougm optionset = sa_get_property_parent(property); 32806185db85Sdougm if (optionset != NULL) { 32816185db85Sdougm group = sa_get_optionset_parent(optionset); 32826185db85Sdougm if (group != NULL) { 328357b448deSdougm ret = sa_set_prop_by_prop(optionset, group, 328457b448deSdougm property, SA_PROP_OP_REMOVE); 32856185db85Sdougm } 32866185db85Sdougm } 32876185db85Sdougm xmlUnlinkNode((xmlNodePtr)property); 32886185db85Sdougm xmlFreeNode((xmlNodePtr)property); 32896185db85Sdougm } else { 32906185db85Sdougm ret = SA_NO_SUCH_PROP; 32916185db85Sdougm } 32926185db85Sdougm return (ret); 32936185db85Sdougm } 32946185db85Sdougm 32956185db85Sdougm /* 32966185db85Sdougm * sa_update_property(property, value) 32976185db85Sdougm * 32986185db85Sdougm * Update the specified property to the new value. If value is NULL, 32996185db85Sdougm * we currently treat this as a remove. 33006185db85Sdougm */ 33016185db85Sdougm 33026185db85Sdougm int 33036185db85Sdougm sa_update_property(sa_property_t property, char *value) 33046185db85Sdougm { 33056185db85Sdougm int ret = SA_OK; 33066185db85Sdougm if (value == NULL) { 33076185db85Sdougm return (sa_remove_property(property)); 33086185db85Sdougm } else { 33096185db85Sdougm sa_optionset_t optionset; 33106185db85Sdougm sa_group_t group; 33116185db85Sdougm set_node_attr((void *)property, "value", value); 33126185db85Sdougm optionset = sa_get_property_parent(property); 33136185db85Sdougm if (optionset != NULL) { 33146185db85Sdougm group = sa_get_optionset_parent(optionset); 33156185db85Sdougm if (group != NULL) { 331657b448deSdougm ret = sa_set_prop_by_prop(optionset, group, 331757b448deSdougm property, SA_PROP_OP_UPDATE); 33186185db85Sdougm } 33196185db85Sdougm } else { 33206185db85Sdougm ret = SA_NO_SUCH_PROP; 33216185db85Sdougm } 33226185db85Sdougm } 33236185db85Sdougm return (ret); 33246185db85Sdougm } 33256185db85Sdougm 33266185db85Sdougm /* 33276185db85Sdougm * sa_get_protocol_property(propset, prop) 33286185db85Sdougm * 33296185db85Sdougm * Get the specified protocol specific property. These are global to 33306185db85Sdougm * the protocol and not specific to a group or share. 33316185db85Sdougm */ 33326185db85Sdougm 33336185db85Sdougm sa_property_t 33346185db85Sdougm sa_get_protocol_property(sa_protocol_properties_t propset, char *prop) 33356185db85Sdougm { 33366185db85Sdougm xmlNodePtr node = (xmlNodePtr)propset; 33376185db85Sdougm xmlChar *value = NULL; 33386185db85Sdougm 33396185db85Sdougm for (node = node->children; node != NULL; 33406185db85Sdougm node = node->next) { 33416185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"option") == 0) { 33426185db85Sdougm if (prop == NULL) 33436185db85Sdougm break; 33446185db85Sdougm value = xmlGetProp(node, (xmlChar *)"type"); 33456185db85Sdougm if (value != NULL && 33466185db85Sdougm xmlStrcasecmp(value, (xmlChar *)prop) == 0) { 33476185db85Sdougm break; 33486185db85Sdougm } 33496185db85Sdougm if (value != NULL) { 33506185db85Sdougm xmlFree(value); 33516185db85Sdougm value = NULL; 33526185db85Sdougm } 33536185db85Sdougm } 33546185db85Sdougm } 33556185db85Sdougm if (value != NULL) 33566185db85Sdougm xmlFree(value); 33576185db85Sdougm if (node != NULL && xmlStrcmp(node->name, (xmlChar *)"option") != 0) { 335857b448deSdougm /* 335957b448deSdougm * avoid a non option node -- it is possible to be a 336057b448deSdougm * text node 336157b448deSdougm */ 33626185db85Sdougm node = NULL; 33636185db85Sdougm } 33646185db85Sdougm return ((sa_property_t)node); 33656185db85Sdougm } 33666185db85Sdougm 33676185db85Sdougm /* 33686185db85Sdougm * sa_get_next_protocol_property(prop) 33696185db85Sdougm * 33706185db85Sdougm * Get the next protocol specific property in the list. 33716185db85Sdougm */ 33726185db85Sdougm 33736185db85Sdougm sa_property_t 33746185db85Sdougm sa_get_next_protocol_property(sa_property_t prop) 33756185db85Sdougm { 33766185db85Sdougm xmlNodePtr node; 33776185db85Sdougm 33786185db85Sdougm for (node = ((xmlNodePtr)prop)->next; node != NULL; 33796185db85Sdougm node = node->next) { 33806185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"option") == 0) { 33816185db85Sdougm break; 33826185db85Sdougm } 33836185db85Sdougm } 33846185db85Sdougm return ((sa_property_t)node); 33856185db85Sdougm } 33866185db85Sdougm 33876185db85Sdougm /* 33886185db85Sdougm * sa_set_protocol_property(prop, value) 33896185db85Sdougm * 33906185db85Sdougm * Set the specified property to have the new value. The protocol 33916185db85Sdougm * specific plugin will then be called to update the property. 33926185db85Sdougm */ 33936185db85Sdougm 33946185db85Sdougm int 33956185db85Sdougm sa_set_protocol_property(sa_property_t prop, char *value) 33966185db85Sdougm { 33976185db85Sdougm sa_protocol_properties_t propset; 33986185db85Sdougm char *proto; 33996185db85Sdougm int ret = SA_INVALID_PROTOCOL; 34006185db85Sdougm 34016185db85Sdougm propset = ((xmlNodePtr)prop)->parent; 34026185db85Sdougm if (propset != NULL) { 34036185db85Sdougm proto = sa_get_optionset_attr(propset, "type"); 34046185db85Sdougm if (proto != NULL) { 34056185db85Sdougm set_node_attr((xmlNodePtr)prop, "value", value); 34066185db85Sdougm ret = sa_proto_set_property(proto, prop); 34073472f5dcSdougm sa_free_attr_string(proto); 34086185db85Sdougm } 34096185db85Sdougm } 34106185db85Sdougm return (ret); 34116185db85Sdougm } 34126185db85Sdougm 34136185db85Sdougm /* 34146185db85Sdougm * sa_add_protocol_property(propset, prop) 34156185db85Sdougm * 3416da6c28aaSamw * Add a new property to the protocol specific property set. 34176185db85Sdougm */ 34186185db85Sdougm 34196185db85Sdougm int 34206185db85Sdougm sa_add_protocol_property(sa_protocol_properties_t propset, sa_property_t prop) 34216185db85Sdougm { 34226185db85Sdougm xmlNodePtr node; 34236185db85Sdougm 34246185db85Sdougm /* should check for legitimacy */ 34256185db85Sdougm node = xmlAddChild((xmlNodePtr)propset, (xmlNodePtr)prop); 34266185db85Sdougm if (node != NULL) 34276185db85Sdougm return (SA_OK); 34286185db85Sdougm return (SA_NO_MEMORY); 34296185db85Sdougm } 34306185db85Sdougm 34316185db85Sdougm /* 34326185db85Sdougm * sa_create_protocol_properties(proto) 34336185db85Sdougm * 3434da6c28aaSamw * Create a protocol specific property set. 34356185db85Sdougm */ 34366185db85Sdougm 34376185db85Sdougm sa_protocol_properties_t 34386185db85Sdougm sa_create_protocol_properties(char *proto) 34396185db85Sdougm { 34406185db85Sdougm xmlNodePtr node; 344157b448deSdougm 34426185db85Sdougm node = xmlNewNode(NULL, (xmlChar *)"propertyset"); 344357b448deSdougm if (node != NULL) 34446185db85Sdougm xmlSetProp(node, (xmlChar *)"type", (xmlChar *)proto); 34456185db85Sdougm return (node); 34466185db85Sdougm } 3447da6c28aaSamw 3448da6c28aaSamw /* 3449da6c28aaSamw * sa_get_share_resource(share, resource) 3450da6c28aaSamw * 3451da6c28aaSamw * Get the named resource from the share, if it exists. If resource is 3452da6c28aaSamw * NULL, get the first resource. 3453da6c28aaSamw */ 3454da6c28aaSamw 3455da6c28aaSamw sa_resource_t 3456da6c28aaSamw sa_get_share_resource(sa_share_t share, char *resource) 3457da6c28aaSamw { 3458da6c28aaSamw xmlNodePtr node = NULL; 3459da6c28aaSamw xmlChar *name; 3460da6c28aaSamw 3461da6c28aaSamw if (share != NULL) { 3462da6c28aaSamw for (node = ((xmlNodePtr)share)->children; node != NULL; 3463da6c28aaSamw node = node->next) { 3464da6c28aaSamw if (xmlStrcmp(node->name, (xmlChar *)"resource") == 0) { 3465da6c28aaSamw if (resource == NULL) { 3466da6c28aaSamw /* 3467da6c28aaSamw * We are looking for the first 3468da6c28aaSamw * resource node and not a names 3469da6c28aaSamw * resource. 3470da6c28aaSamw */ 3471da6c28aaSamw break; 3472da6c28aaSamw } else { 3473da6c28aaSamw /* is it the correct share? */ 3474da6c28aaSamw name = xmlGetProp(node, 3475da6c28aaSamw (xmlChar *)"name"); 3476da6c28aaSamw if (name != NULL && 3477da6c28aaSamw xmlStrcasecmp(name, 3478da6c28aaSamw (xmlChar *)resource) == 0) { 3479da6c28aaSamw xmlFree(name); 3480da6c28aaSamw break; 3481da6c28aaSamw } 3482da6c28aaSamw xmlFree(name); 3483da6c28aaSamw } 3484da6c28aaSamw } 3485da6c28aaSamw } 3486da6c28aaSamw } 3487da6c28aaSamw return ((sa_resource_t)node); 3488da6c28aaSamw } 3489da6c28aaSamw 3490da6c28aaSamw /* 3491da6c28aaSamw * sa_get_next_resource(resource) 3492da6c28aaSamw * Return the next share following the specified share 3493da6c28aaSamw * from the internal list of shares. Returns NULL if there 3494da6c28aaSamw * are no more shares. The list is relative to the same 3495da6c28aaSamw * group. 3496da6c28aaSamw */ 3497da6c28aaSamw sa_share_t 3498da6c28aaSamw sa_get_next_resource(sa_resource_t resource) 3499da6c28aaSamw { 3500da6c28aaSamw xmlNodePtr node = NULL; 3501da6c28aaSamw 3502da6c28aaSamw if (resource != NULL) { 3503da6c28aaSamw for (node = ((xmlNodePtr)resource)->next; node != NULL; 3504da6c28aaSamw node = node->next) { 3505da6c28aaSamw if (xmlStrcmp(node->name, (xmlChar *)"resource") == 0) 3506da6c28aaSamw break; 3507da6c28aaSamw } 3508da6c28aaSamw } 3509da6c28aaSamw return ((sa_share_t)node); 3510da6c28aaSamw } 3511da6c28aaSamw 3512da6c28aaSamw /* 3513da6c28aaSamw * _sa_get_next_resource_index(share) 3514da6c28aaSamw * 3515da6c28aaSamw * get the next resource index number (one greater then current largest) 3516da6c28aaSamw */ 3517da6c28aaSamw 3518da6c28aaSamw static int 3519da6c28aaSamw _sa_get_next_resource_index(sa_share_t share) 3520da6c28aaSamw { 3521da6c28aaSamw sa_resource_t resource; 3522da6c28aaSamw int index = 0; 3523da6c28aaSamw char *id; 3524da6c28aaSamw 3525da6c28aaSamw for (resource = sa_get_share_resource(share, NULL); 3526da6c28aaSamw resource != NULL; 3527da6c28aaSamw resource = sa_get_next_resource(resource)) { 3528da6c28aaSamw id = get_node_attr((void *)resource, "id"); 3529da6c28aaSamw if (id != NULL) { 3530da6c28aaSamw int val; 3531da6c28aaSamw val = atoi(id); 3532da6c28aaSamw if (val > index) 3533da6c28aaSamw index = val; 3534da6c28aaSamw sa_free_attr_string(id); 3535da6c28aaSamw } 3536da6c28aaSamw } 3537da6c28aaSamw return (index + 1); 3538da6c28aaSamw } 3539da6c28aaSamw 3540da6c28aaSamw 3541da6c28aaSamw /* 3542da6c28aaSamw * sa_add_resource(share, resource, persist, &err) 3543da6c28aaSamw * 3544da6c28aaSamw * Adds a new resource name associated with share. The resource name 3545da6c28aaSamw * must be unique in the system and will be case insensitive (eventually). 3546da6c28aaSamw */ 3547da6c28aaSamw 3548da6c28aaSamw sa_resource_t 3549da6c28aaSamw sa_add_resource(sa_share_t share, char *resource, int persist, int *error) 3550da6c28aaSamw { 3551da6c28aaSamw xmlNodePtr node; 3552da6c28aaSamw int err = SA_OK; 3553da6c28aaSamw sa_resource_t res; 3554da6c28aaSamw sa_group_t group; 3555da6c28aaSamw sa_handle_t handle; 3556da6c28aaSamw char istring[8]; /* just big enough for an integer value */ 3557da6c28aaSamw int index; 3558da6c28aaSamw 3559da6c28aaSamw group = sa_get_parent_group(share); 3560da6c28aaSamw handle = sa_find_group_handle(group); 3561da6c28aaSamw res = sa_find_resource(handle, resource); 3562da6c28aaSamw if (res != NULL) { 3563da6c28aaSamw err = SA_DUPLICATE_NAME; 3564da6c28aaSamw res = NULL; 3565da6c28aaSamw } else { 3566da6c28aaSamw node = xmlNewChild((xmlNodePtr)share, NULL, 3567da6c28aaSamw (xmlChar *)"resource", NULL); 3568da6c28aaSamw if (node != NULL) { 3569da6c28aaSamw xmlSetProp(node, (xmlChar *)"name", 3570da6c28aaSamw (xmlChar *)resource); 3571da6c28aaSamw xmlSetProp(node, (xmlChar *)"type", persist ? 3572da6c28aaSamw (xmlChar *)"persist" : (xmlChar *)"transient"); 3573da6c28aaSamw if (persist != SA_SHARE_TRANSIENT) { 3574da6c28aaSamw index = _sa_get_next_resource_index(share); 3575da6c28aaSamw (void) snprintf(istring, sizeof (istring), "%d", 3576da6c28aaSamw index); 3577da6c28aaSamw xmlSetProp(node, (xmlChar *)"id", 3578da6c28aaSamw (xmlChar *)istring); 3579da6c28aaSamw if (!sa_group_is_zfs(group) && 3580da6c28aaSamw sa_is_persistent((sa_group_t)share)) { 3581da6c28aaSamw /* ZFS doesn't use resource names */ 3582da6c28aaSamw sa_handle_impl_t ihandle; 3583da6c28aaSamw ihandle = (sa_handle_impl_t) 3584da6c28aaSamw sa_find_group_handle( 3585da6c28aaSamw group); 3586da6c28aaSamw if (ihandle != NULL) 3587da6c28aaSamw err = sa_commit_share( 3588da6c28aaSamw ihandle->scfhandle, group, 3589da6c28aaSamw share); 3590da6c28aaSamw else 3591da6c28aaSamw err = SA_SYSTEM_ERR; 3592da6c28aaSamw } 3593da6c28aaSamw } 3594da6c28aaSamw } 3595da6c28aaSamw } 3596da6c28aaSamw if (error != NULL) 3597da6c28aaSamw *error = err; 3598da6c28aaSamw return ((sa_resource_t)node); 3599da6c28aaSamw } 3600da6c28aaSamw 3601da6c28aaSamw /* 3602da6c28aaSamw * sa_remove_resource(resource) 3603da6c28aaSamw * 3604da6c28aaSamw * Remove the resource name from the share (and the system) 3605da6c28aaSamw */ 3606da6c28aaSamw 3607da6c28aaSamw int 3608da6c28aaSamw sa_remove_resource(sa_resource_t resource) 3609da6c28aaSamw { 3610da6c28aaSamw sa_share_t share; 3611da6c28aaSamw sa_group_t group; 3612da6c28aaSamw char *type; 3613da6c28aaSamw int ret = SA_OK; 3614da6c28aaSamw int transient = 0; 3615*55bf511dSas200622 sa_optionset_t opt; 3616da6c28aaSamw 3617da6c28aaSamw share = sa_get_resource_parent(resource); 3618da6c28aaSamw type = sa_get_share_attr(share, "type"); 3619da6c28aaSamw group = sa_get_parent_group(share); 3620da6c28aaSamw 3621da6c28aaSamw 3622da6c28aaSamw if (type != NULL) { 3623da6c28aaSamw if (strcmp(type, "persist") != 0) 3624da6c28aaSamw transient = 1; 3625da6c28aaSamw sa_free_attr_string(type); 3626da6c28aaSamw } 3627da6c28aaSamw 3628*55bf511dSas200622 /* Disable the resource for all protocols. */ 3629*55bf511dSas200622 (void) sa_disable_resource(resource, NULL); 3630*55bf511dSas200622 3631*55bf511dSas200622 /* Remove any optionsets from the resource. */ 3632*55bf511dSas200622 for (opt = sa_get_optionset(resource, NULL); 3633*55bf511dSas200622 opt != NULL; 3634*55bf511dSas200622 opt = sa_get_next_optionset(opt)) 3635*55bf511dSas200622 (void) sa_destroy_optionset(opt); 3636*55bf511dSas200622 3637da6c28aaSamw /* Remove from the share */ 3638da6c28aaSamw xmlUnlinkNode((xmlNode *)resource); 3639da6c28aaSamw xmlFreeNode((xmlNode *)resource); 3640da6c28aaSamw 3641da6c28aaSamw /* only do SMF action if permanent and not ZFS */ 3642da6c28aaSamw if (!transient && !sa_group_is_zfs(group)) { 3643da6c28aaSamw sa_handle_impl_t ihandle; 3644da6c28aaSamw ihandle = (sa_handle_impl_t)sa_find_group_handle(group); 3645da6c28aaSamw if (ihandle != NULL) 3646da6c28aaSamw ret = sa_commit_share(ihandle->scfhandle, group, share); 3647da6c28aaSamw else 3648da6c28aaSamw ret = SA_SYSTEM_ERR; 3649da6c28aaSamw } 3650da6c28aaSamw return (ret); 3651da6c28aaSamw } 3652da6c28aaSamw 3653da6c28aaSamw /* 3654da6c28aaSamw * proto_resource_rename(handle, group, resource, newname) 3655da6c28aaSamw * 3656da6c28aaSamw * Helper function for sa_rename_resource that notifies the protocol 3657da6c28aaSamw * of a resource name change prior to a config repository update. 3658da6c28aaSamw */ 3659da6c28aaSamw static int 3660da6c28aaSamw proto_rename_resource(sa_handle_t handle, sa_group_t group, 3661da6c28aaSamw sa_resource_t resource, char *newname) 3662da6c28aaSamw { 3663da6c28aaSamw sa_optionset_t optionset; 3664da6c28aaSamw int ret = SA_OK; 3665da6c28aaSamw int err; 3666da6c28aaSamw 3667da6c28aaSamw for (optionset = sa_get_optionset(group, NULL); 3668da6c28aaSamw optionset != NULL; 3669da6c28aaSamw optionset = sa_get_next_optionset(optionset)) { 3670da6c28aaSamw char *type; 3671da6c28aaSamw type = sa_get_optionset_attr(optionset, "type"); 3672da6c28aaSamw if (type != NULL) { 3673da6c28aaSamw err = sa_proto_rename_resource(handle, type, resource, 3674da6c28aaSamw newname); 3675da6c28aaSamw if (err != SA_OK) 3676da6c28aaSamw ret = err; 3677da6c28aaSamw sa_free_attr_string(type); 3678da6c28aaSamw } 3679da6c28aaSamw } 3680da6c28aaSamw return (ret); 3681da6c28aaSamw } 3682da6c28aaSamw 3683da6c28aaSamw /* 3684da6c28aaSamw * sa_rename_resource(resource, newname) 3685da6c28aaSamw * 3686da6c28aaSamw * Rename the resource to the new name, if it is unique. 3687da6c28aaSamw */ 3688da6c28aaSamw 3689da6c28aaSamw int 3690da6c28aaSamw sa_rename_resource(sa_resource_t resource, char *newname) 3691da6c28aaSamw { 3692da6c28aaSamw sa_share_t share; 3693da6c28aaSamw sa_group_t group = NULL; 3694da6c28aaSamw sa_resource_t target; 3695da6c28aaSamw int ret = SA_CONFIG_ERR; 3696da6c28aaSamw sa_handle_t handle = NULL; 3697da6c28aaSamw 3698da6c28aaSamw share = sa_get_resource_parent(resource); 3699da6c28aaSamw if (share == NULL) 3700da6c28aaSamw return (ret); 3701da6c28aaSamw 3702da6c28aaSamw group = sa_get_parent_group(share); 3703da6c28aaSamw if (group == NULL) 3704da6c28aaSamw return (ret); 3705da6c28aaSamw 3706da6c28aaSamw handle = (sa_handle_impl_t)sa_find_group_handle(group); 3707da6c28aaSamw if (handle == NULL) 3708da6c28aaSamw return (ret); 3709da6c28aaSamw 3710da6c28aaSamw target = sa_find_resource(handle, newname); 3711da6c28aaSamw if (target != NULL) { 3712da6c28aaSamw ret = SA_DUPLICATE_NAME; 3713da6c28aaSamw } else { 3714da6c28aaSamw /* 3715da6c28aaSamw * Everything appears to be valid at this 3716da6c28aaSamw * point. Change the name of the active share and then 3717da6c28aaSamw * update the share in the appropriate repository. 3718da6c28aaSamw */ 3719da6c28aaSamw ret = proto_rename_resource(handle, group, resource, newname); 3720da6c28aaSamw set_node_attr(resource, "name", newname); 3721da6c28aaSamw if (!sa_group_is_zfs(group) && 3722da6c28aaSamw sa_is_persistent((sa_group_t)share)) { 3723da6c28aaSamw sa_handle_impl_t ihandle = (sa_handle_impl_t)handle; 3724da6c28aaSamw ret = sa_commit_share(ihandle->scfhandle, group, 3725da6c28aaSamw share); 3726da6c28aaSamw } 3727da6c28aaSamw } 3728da6c28aaSamw return (ret); 3729da6c28aaSamw } 3730da6c28aaSamw 3731da6c28aaSamw /* 3732da6c28aaSamw * sa_get_resource_attr(resource, tag) 3733da6c28aaSamw * 3734da6c28aaSamw * Get the named attribute of the resource. "name" and "id" are 3735da6c28aaSamw * currently defined. NULL if tag not defined. 3736da6c28aaSamw */ 3737da6c28aaSamw 3738da6c28aaSamw char * 3739da6c28aaSamw sa_get_resource_attr(sa_resource_t resource, char *tag) 3740da6c28aaSamw { 3741da6c28aaSamw return (get_node_attr((void *)resource, tag)); 3742da6c28aaSamw } 3743da6c28aaSamw 3744da6c28aaSamw /* 3745da6c28aaSamw * sa_set_resource_attr(resource, tag, value) 3746da6c28aaSamw * 3747da6c28aaSamw * Get the named attribute of the resource. "name" and "id" are 3748da6c28aaSamw * currently defined. NULL if tag not defined. Currently we don't do 3749da6c28aaSamw * much, but additional checking may be needed in the future. 3750da6c28aaSamw */ 3751da6c28aaSamw 3752da6c28aaSamw int 3753da6c28aaSamw sa_set_resource_attr(sa_resource_t resource, char *tag, char *value) 3754da6c28aaSamw { 3755da6c28aaSamw set_node_attr((void *)resource, tag, value); 3756da6c28aaSamw return (SA_OK); 3757da6c28aaSamw } 3758da6c28aaSamw 3759da6c28aaSamw /* 3760da6c28aaSamw * sa_get_resource_parent(resource_t) 3761da6c28aaSamw * 3762da6c28aaSamw * Returns the share associated with the resource. 3763da6c28aaSamw */ 3764da6c28aaSamw 3765da6c28aaSamw sa_share_t 3766da6c28aaSamw sa_get_resource_parent(sa_resource_t resource) 3767da6c28aaSamw { 3768da6c28aaSamw sa_share_t share = NULL; 3769da6c28aaSamw 3770da6c28aaSamw if (resource != NULL) 3771da6c28aaSamw share = (sa_share_t)((xmlNodePtr)resource)->parent; 3772da6c28aaSamw return (share); 3773da6c28aaSamw } 3774da6c28aaSamw 3775da6c28aaSamw /* 3776da6c28aaSamw * find_resource(group, name) 3777da6c28aaSamw * 3778da6c28aaSamw * Find the resource within the group. 3779da6c28aaSamw */ 3780da6c28aaSamw 3781da6c28aaSamw static sa_resource_t 3782da6c28aaSamw find_resource(sa_group_t group, char *resname) 3783da6c28aaSamw { 3784da6c28aaSamw sa_share_t share; 3785da6c28aaSamw sa_resource_t resource = NULL; 3786da6c28aaSamw char *name; 3787da6c28aaSamw 3788da6c28aaSamw /* Iterate over all the shares and resources in the group. */ 3789da6c28aaSamw for (share = sa_get_share(group, NULL); 3790da6c28aaSamw share != NULL && resource == NULL; 3791da6c28aaSamw share = sa_get_next_share(share)) { 3792da6c28aaSamw for (resource = sa_get_share_resource(share, NULL); 3793da6c28aaSamw resource != NULL; 3794da6c28aaSamw resource = sa_get_next_resource(resource)) { 3795da6c28aaSamw name = sa_get_resource_attr(resource, "name"); 3796da6c28aaSamw if (name != NULL && xmlStrcasecmp((xmlChar*)name, 3797da6c28aaSamw (xmlChar*)resname) == 0) { 3798da6c28aaSamw sa_free_attr_string(name); 3799da6c28aaSamw break; 3800da6c28aaSamw } 3801da6c28aaSamw if (name != NULL) { 3802da6c28aaSamw sa_free_attr_string(name); 3803da6c28aaSamw } 3804da6c28aaSamw } 3805da6c28aaSamw } 3806da6c28aaSamw return (resource); 3807da6c28aaSamw } 3808da6c28aaSamw 3809da6c28aaSamw /* 3810da6c28aaSamw * sa_find_resource(name) 3811da6c28aaSamw * 3812da6c28aaSamw * Find the named resource in the system. 3813da6c28aaSamw */ 3814da6c28aaSamw 3815da6c28aaSamw sa_resource_t 3816da6c28aaSamw sa_find_resource(sa_handle_t handle, char *name) 3817da6c28aaSamw { 3818da6c28aaSamw sa_group_t group; 3819da6c28aaSamw sa_group_t zgroup; 3820da6c28aaSamw sa_resource_t resource = NULL; 3821da6c28aaSamw 3822da6c28aaSamw /* 3823da6c28aaSamw * Iterate over all groups and zfs subgroups and check for 3824da6c28aaSamw * resource name in them. 3825da6c28aaSamw */ 3826da6c28aaSamw for (group = sa_get_group(handle, NULL); group != NULL; 3827da6c28aaSamw group = sa_get_next_group(group)) { 3828da6c28aaSamw 3829da6c28aaSamw if (is_zfs_group(group)) { 3830da6c28aaSamw for (zgroup = 3831da6c28aaSamw (sa_group_t)_sa_get_child_node((xmlNodePtr)group, 3832da6c28aaSamw (xmlChar *)"group"); 3833da6c28aaSamw zgroup != NULL && resource == NULL; 3834da6c28aaSamw zgroup = sa_get_next_group(zgroup)) { 3835da6c28aaSamw resource = find_resource(zgroup, name); 3836da6c28aaSamw } 3837da6c28aaSamw } else { 3838da6c28aaSamw resource = find_resource(group, name); 3839da6c28aaSamw } 3840da6c28aaSamw if (resource != NULL) 3841da6c28aaSamw break; 3842da6c28aaSamw } 3843da6c28aaSamw return (resource); 3844da6c28aaSamw } 3845da6c28aaSamw 3846da6c28aaSamw /* 3847da6c28aaSamw * sa_get_resource(group, resource) 3848da6c28aaSamw * 3849da6c28aaSamw * Search all the shares in the specified group for a share with a 3850da6c28aaSamw * resource name matching the one specified. 3851da6c28aaSamw * 3852da6c28aaSamw * In the future, it may be advantageous to allow group to be NULL and 3853da6c28aaSamw * search all groups but that isn't needed at present. 3854da6c28aaSamw */ 3855da6c28aaSamw 3856da6c28aaSamw sa_resource_t 3857da6c28aaSamw sa_get_resource(sa_group_t group, char *resource) 3858da6c28aaSamw { 3859da6c28aaSamw sa_share_t share = NULL; 3860da6c28aaSamw sa_resource_t res = NULL; 3861da6c28aaSamw 3862da6c28aaSamw if (resource != NULL) { 3863da6c28aaSamw for (share = sa_get_share(group, NULL); 3864da6c28aaSamw share != NULL && res == NULL; 3865da6c28aaSamw share = sa_get_next_share(share)) { 3866da6c28aaSamw res = sa_get_share_resource(share, resource); 3867da6c28aaSamw } 3868da6c28aaSamw } 3869da6c28aaSamw return (res); 3870da6c28aaSamw } 3871da6c28aaSamw 3872da6c28aaSamw /* 3873da6c28aaSamw * sa_enable_resource, protocol) 3874da6c28aaSamw * Disable the specified share to the specified protocol. 3875da6c28aaSamw * If protocol is NULL, then all protocols. 3876da6c28aaSamw */ 3877da6c28aaSamw int 3878da6c28aaSamw sa_enable_resource(sa_resource_t resource, char *protocol) 3879da6c28aaSamw { 3880da6c28aaSamw int ret = SA_OK; 3881da6c28aaSamw char **protocols; 3882da6c28aaSamw int numproto; 3883da6c28aaSamw 3884da6c28aaSamw if (protocol != NULL) { 3885da6c28aaSamw ret = sa_proto_share_resource(protocol, resource); 3886da6c28aaSamw } else { 3887da6c28aaSamw /* need to do all protocols */ 3888da6c28aaSamw if ((numproto = sa_get_protocols(&protocols)) >= 0) { 3889da6c28aaSamw int i, err; 3890da6c28aaSamw for (i = 0; i < numproto; i++) { 3891da6c28aaSamw err = sa_proto_share_resource( 3892da6c28aaSamw protocols[i], resource); 3893da6c28aaSamw if (err != SA_OK) 3894da6c28aaSamw ret = err; 3895da6c28aaSamw } 3896da6c28aaSamw free(protocols); 3897da6c28aaSamw } 3898da6c28aaSamw } 3899da6c28aaSamw if (ret == SA_OK) 3900da6c28aaSamw (void) sa_set_resource_attr(resource, "shared", NULL); 3901da6c28aaSamw 3902da6c28aaSamw return (ret); 3903da6c28aaSamw } 3904da6c28aaSamw 3905da6c28aaSamw /* 3906da6c28aaSamw * sa_disable_resource(resource, protocol) 3907da6c28aaSamw * 3908da6c28aaSamw * Disable the specified share for the specified protocol. If 3909da6c28aaSamw * protocol is NULL, then all protocols. If the underlying 3910da6c28aaSamw * protocol doesn't implement disable at the resource level, we 3911da6c28aaSamw * disable at the share level. 3912da6c28aaSamw */ 3913da6c28aaSamw int 3914da6c28aaSamw sa_disable_resource(sa_resource_t resource, char *protocol) 3915da6c28aaSamw { 3916da6c28aaSamw int ret = SA_OK; 3917da6c28aaSamw char **protocols; 3918da6c28aaSamw int numproto; 3919da6c28aaSamw 3920da6c28aaSamw if (protocol != NULL) { 3921da6c28aaSamw ret = sa_proto_unshare_resource(protocol, resource); 3922da6c28aaSamw if (ret == SA_NOT_IMPLEMENTED) { 3923da6c28aaSamw sa_share_t parent; 3924da6c28aaSamw /* 3925da6c28aaSamw * The protocol doesn't implement unshare 3926da6c28aaSamw * resource. That implies that resource names are 3927da6c28aaSamw * simple aliases for this protocol so we need to 3928da6c28aaSamw * unshare the share. 3929da6c28aaSamw */ 3930da6c28aaSamw parent = sa_get_resource_parent(resource); 3931da6c28aaSamw if (parent != NULL) 3932da6c28aaSamw ret = sa_disable_share(parent, protocol); 3933da6c28aaSamw else 3934da6c28aaSamw ret = SA_CONFIG_ERR; 3935da6c28aaSamw } 3936da6c28aaSamw } else { 3937da6c28aaSamw /* need to do all protocols */ 3938da6c28aaSamw if ((numproto = sa_get_protocols(&protocols)) >= 0) { 3939da6c28aaSamw int i, err; 3940da6c28aaSamw for (i = 0; i < numproto; i++) { 3941da6c28aaSamw err = sa_proto_unshare_resource(protocols[i], 3942da6c28aaSamw resource); 3943da6c28aaSamw if (err == SA_NOT_SUPPORTED) { 3944da6c28aaSamw sa_share_t parent; 3945da6c28aaSamw parent = sa_get_resource_parent( 3946da6c28aaSamw resource); 3947da6c28aaSamw if (parent != NULL) 3948da6c28aaSamw err = sa_disable_share(parent, 3949da6c28aaSamw protocols[i]); 3950da6c28aaSamw else 3951da6c28aaSamw err = SA_CONFIG_ERR; 3952da6c28aaSamw } 3953da6c28aaSamw if (err != SA_OK) 3954da6c28aaSamw ret = err; 3955da6c28aaSamw } 3956da6c28aaSamw free(protocols); 3957da6c28aaSamw } 3958da6c28aaSamw } 3959da6c28aaSamw if (ret == SA_OK) 3960da6c28aaSamw (void) sa_set_resource_attr(resource, "shared", NULL); 3961da6c28aaSamw 3962da6c28aaSamw return (ret); 3963da6c28aaSamw } 3964da6c28aaSamw 3965da6c28aaSamw /* 3966da6c28aaSamw * sa_set_resource_description(resource, content) 3967da6c28aaSamw * 3968da6c28aaSamw * Set the description of share to content. 3969da6c28aaSamw */ 3970da6c28aaSamw 3971da6c28aaSamw int 3972da6c28aaSamw sa_set_resource_description(sa_resource_t resource, char *content) 3973da6c28aaSamw { 3974da6c28aaSamw xmlNodePtr node; 3975da6c28aaSamw sa_group_t group; 3976da6c28aaSamw sa_share_t share; 3977da6c28aaSamw int ret = SA_OK; 3978da6c28aaSamw 3979da6c28aaSamw for (node = ((xmlNodePtr)resource)->children; 3980da6c28aaSamw node != NULL; 3981da6c28aaSamw node = node->next) { 3982da6c28aaSamw if (xmlStrcmp(node->name, (xmlChar *)"description") == 0) { 3983da6c28aaSamw break; 3984da6c28aaSamw } 3985da6c28aaSamw } 3986da6c28aaSamw 3987da6c28aaSamw /* no existing description but want to add */ 3988da6c28aaSamw if (node == NULL && content != NULL) { 3989da6c28aaSamw /* add a description */ 3990da6c28aaSamw node = _sa_set_share_description(resource, content); 3991da6c28aaSamw } else if (node != NULL && content != NULL) { 3992da6c28aaSamw /* update a description */ 3993da6c28aaSamw xmlNodeSetContent(node, (xmlChar *)content); 3994da6c28aaSamw } else if (node != NULL && content == NULL) { 3995da6c28aaSamw /* remove an existing description */ 3996da6c28aaSamw xmlUnlinkNode(node); 3997da6c28aaSamw xmlFreeNode(node); 3998da6c28aaSamw } 3999da6c28aaSamw share = sa_get_resource_parent(resource); 4000da6c28aaSamw group = sa_get_parent_group(share); 4001da6c28aaSamw if (group != NULL && sa_is_persistent(share)) { 4002da6c28aaSamw sa_handle_impl_t impl_handle; 4003da6c28aaSamw impl_handle = (sa_handle_impl_t)sa_find_group_handle(group); 4004da6c28aaSamw if (impl_handle != NULL) 4005da6c28aaSamw ret = sa_commit_share(impl_handle->scfhandle, 4006da6c28aaSamw group, share); 4007da6c28aaSamw else 4008da6c28aaSamw ret = SA_SYSTEM_ERR; 4009da6c28aaSamw } 4010da6c28aaSamw return (ret); 4011da6c28aaSamw } 4012da6c28aaSamw 4013da6c28aaSamw /* 4014da6c28aaSamw * sa_get_resource_description(share) 4015da6c28aaSamw * 4016da6c28aaSamw * Return the description text for the specified share if it 4017da6c28aaSamw * exists. NULL if no description exists. 4018da6c28aaSamw */ 4019da6c28aaSamw 4020da6c28aaSamw char * 4021da6c28aaSamw sa_get_resource_description(sa_resource_t resource) 4022da6c28aaSamw { 4023da6c28aaSamw xmlChar *description = NULL; 4024da6c28aaSamw xmlNodePtr node; 4025da6c28aaSamw 4026da6c28aaSamw for (node = ((xmlNodePtr)resource)->children; node != NULL; 4027da6c28aaSamw node = node->next) { 4028da6c28aaSamw if (xmlStrcmp(node->name, (xmlChar *)"description") == 0) 4029da6c28aaSamw break; 4030da6c28aaSamw } 4031da6c28aaSamw if (node != NULL) { 4032da6c28aaSamw description = xmlNodeGetContent(node); 4033da6c28aaSamw fixproblemchars((char *)description); 4034da6c28aaSamw } 4035da6c28aaSamw return ((char *)description); 4036da6c28aaSamw } 4037