xref: /titanic_53/usr/src/lib/libshare/common/libshare.c (revision 55bf511df53aad0fdb7eb3fa349f0308cc05234c)
16185db85Sdougm /*
26185db85Sdougm  * CDDL HEADER START
36185db85Sdougm  *
46185db85Sdougm  * The contents of this file are subject to the terms of the
56185db85Sdougm  * Common Development and Distribution License (the "License").
66185db85Sdougm  * You may not use this file except in compliance with the License.
76185db85Sdougm  *
86185db85Sdougm  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
96185db85Sdougm  * or http://www.opensolaris.org/os/licensing.
106185db85Sdougm  * See the License for the specific language governing permissions
116185db85Sdougm  * and limitations under the License.
126185db85Sdougm  *
136185db85Sdougm  * When distributing Covered Code, include this CDDL HEADER in each
146185db85Sdougm  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
156185db85Sdougm  * If applicable, add the following below this CDDL HEADER, with the
166185db85Sdougm  * fields enclosed by brackets "[]" replaced with your own identifying
176185db85Sdougm  * information: Portions Copyright [yyyy] [name of copyright owner]
186185db85Sdougm  *
196185db85Sdougm  * CDDL HEADER END
206185db85Sdougm  */
216185db85Sdougm 
226185db85Sdougm /*
23f345c0beSdougm  * Copyright 2007 Sun Microsystems, Inc.  All rights reserved.
246185db85Sdougm  * Use is subject to license terms.
256185db85Sdougm  */
266185db85Sdougm 
276185db85Sdougm #pragma ident	"%Z%%M%	%I%	%E% SMI"
286185db85Sdougm 
296185db85Sdougm /*
306185db85Sdougm  * Share control API
316185db85Sdougm  */
326185db85Sdougm #include <stdio.h>
336185db85Sdougm #include <string.h>
346185db85Sdougm #include <ctype.h>
356185db85Sdougm #include <sys/types.h>
366185db85Sdougm #include <sys/stat.h>
37a99982a7Sdougm #include <fcntl.h>
386185db85Sdougm #include <unistd.h>
396185db85Sdougm #include <libxml/parser.h>
406185db85Sdougm #include <libxml/tree.h>
416185db85Sdougm #include "libshare.h"
426185db85Sdougm #include "libshare_impl.h"
436185db85Sdougm #include <libscf.h>
446185db85Sdougm #include "scfutil.h"
456185db85Sdougm #include <ctype.h>
466185db85Sdougm #include <libintl.h>
47549ec3ffSdougm #include <thread.h>
48549ec3ffSdougm #include <synch.h>
496185db85Sdougm 
506185db85Sdougm #if _NOT_SMF
516185db85Sdougm #define	CONFIG_FILE	"/var/tmp/share.cfg"
526185db85Sdougm #define	CONFIG_FILE_TMP	"/var/tmp/share.cfg.tmp"
536185db85Sdougm #endif
546185db85Sdougm #define	TSTAMP(tm)	(uint64_t)(((uint64_t)tm.tv_sec << 32) | \
556185db85Sdougm 					(tm.tv_nsec & 0xffffffff))
566185db85Sdougm 
57a99982a7Sdougm #define	DFS_LOCK_FILE	"/etc/dfs/fstypes"
5857b448deSdougm #define	SA_STRSIZE	256	/* max string size for names */
59a99982a7Sdougm 
606185db85Sdougm /*
61da6c28aaSamw  * internal object type values returned by sa_get_object_type()
62da6c28aaSamw  */
63da6c28aaSamw #define	SA_TYPE_UNKNOWN		0
64da6c28aaSamw #define	SA_TYPE_GROUP		1
65da6c28aaSamw #define	SA_TYPE_SHARE		2
66da6c28aaSamw #define	SA_TYPE_RESOURCE	3
67da6c28aaSamw #define	SA_TYPE_OPTIONSET	4
68da6c28aaSamw #define	SA_TYPE_ALTSPACE	5
69da6c28aaSamw 
70da6c28aaSamw /*
716185db85Sdougm  * internal data structures
726185db85Sdougm  */
736185db85Sdougm 
746185db85Sdougm extern struct sa_proto_plugin *sap_proto_list;
756185db85Sdougm 
766185db85Sdougm /* current SMF/SVC repository handle */
77549ec3ffSdougm extern void getlegacyconfig(sa_handle_t, char *, xmlNodePtr *);
78549ec3ffSdougm extern int gettransients(sa_handle_impl_t, xmlNodePtr *);
796185db85Sdougm extern int sa_valid_property(void *, char *, sa_property_t);
806185db85Sdougm extern char *sa_fstype(char *);
816185db85Sdougm extern int sa_is_share(void *);
82da6c28aaSamw extern int sa_is_resource(void *);
836185db85Sdougm extern ssize_t scf_max_name_len; /* defined in scfutil during initialization */
846185db85Sdougm extern int sa_group_is_zfs(sa_group_t);
856185db85Sdougm extern int sa_path_is_zfs(char *);
866185db85Sdougm extern int sa_zfs_set_sharenfs(sa_group_t, char *, int);
87da6c28aaSamw extern int sa_zfs_set_sharesmb(sa_group_t, char *, int);
88549ec3ffSdougm extern void update_legacy_config(sa_handle_t);
896185db85Sdougm extern int issubdir(char *, char *);
9057b448deSdougm extern int sa_zfs_init(sa_handle_impl_t);
91549ec3ffSdougm extern void sa_zfs_fini(sa_handle_impl_t);
92a99982a7Sdougm extern void sablocksigs(sigset_t *);
93a99982a7Sdougm extern void saunblocksigs(sigset_t *);
94da6c28aaSamw static sa_group_t sa_get_optionset_parent(sa_optionset_t);
95da6c28aaSamw static char *get_node_attr(void *, char *);
966185db85Sdougm 
97549ec3ffSdougm /*
98549ec3ffSdougm  * Data structures for finding/managing the document root to access
99549ec3ffSdougm  * handle mapping. The list isn't expected to grow very large so a
100549ec3ffSdougm  * simple list is acceptable. The purpose is to provide a way to start
101549ec3ffSdougm  * with a group or share and find the library handle needed for
102549ec3ffSdougm  * various operations.
103549ec3ffSdougm  */
104549ec3ffSdougm mutex_t sa_global_lock;
105549ec3ffSdougm struct doc2handle {
106549ec3ffSdougm 	struct doc2handle	*next;
107549ec3ffSdougm 	xmlNodePtr		root;
108549ec3ffSdougm 	sa_handle_impl_t	handle;
109549ec3ffSdougm };
110549ec3ffSdougm 
11157b448deSdougm /* definitions used in a couple of property functions */
11257b448deSdougm #define	SA_PROP_OP_REMOVE	1
11357b448deSdougm #define	SA_PROP_OP_ADD		2
11457b448deSdougm #define	SA_PROP_OP_UPDATE	3
11557b448deSdougm 
116549ec3ffSdougm static struct doc2handle *sa_global_handles = NULL;
1176185db85Sdougm 
1186185db85Sdougm /* helper functions */
1196185db85Sdougm 
120549ec3ffSdougm /*
121549ec3ffSdougm  * sa_errorstr(err)
122549ec3ffSdougm  *
123549ec3ffSdougm  * convert an error value to an error string
124549ec3ffSdougm  */
125549ec3ffSdougm 
1266185db85Sdougm char *
1276185db85Sdougm sa_errorstr(int err)
1286185db85Sdougm {
1296185db85Sdougm 	static char errstr[32];
1306185db85Sdougm 	char *ret = NULL;
1316185db85Sdougm 
1326185db85Sdougm 	switch (err) {
1336185db85Sdougm 	case SA_OK:
13424424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "ok");
1356185db85Sdougm 		break;
1366185db85Sdougm 	case SA_NO_SUCH_PATH:
13724424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "path doesn't exist");
1386185db85Sdougm 		break;
1396185db85Sdougm 	case SA_NO_MEMORY:
14024424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "no memory");
1416185db85Sdougm 		break;
1426185db85Sdougm 	case SA_DUPLICATE_NAME:
14324424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "name in use");
1446185db85Sdougm 		break;
1456185db85Sdougm 	case SA_BAD_PATH:
14624424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "bad path");
1476185db85Sdougm 		break;
1486185db85Sdougm 	case SA_NO_SUCH_GROUP:
14924424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "no such group");
1506185db85Sdougm 		break;
1516185db85Sdougm 	case SA_CONFIG_ERR:
15224424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "configuration error");
1536185db85Sdougm 		break;
1546185db85Sdougm 	case SA_SYSTEM_ERR:
15524424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "system error");
1566185db85Sdougm 		break;
1576185db85Sdougm 	case SA_SYNTAX_ERR:
15824424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "syntax error");
1596185db85Sdougm 		break;
1606185db85Sdougm 	case SA_NO_PERMISSION:
16124424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "no permission");
1626185db85Sdougm 		break;
1636185db85Sdougm 	case SA_BUSY:
16424424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "busy");
1656185db85Sdougm 		break;
1666185db85Sdougm 	case SA_NO_SUCH_PROP:
16724424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "no such property");
1686185db85Sdougm 		break;
1696185db85Sdougm 	case SA_INVALID_NAME:
17024424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "invalid name");
1716185db85Sdougm 		break;
1726185db85Sdougm 	case SA_INVALID_PROTOCOL:
17324424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "invalid protocol");
1746185db85Sdougm 		break;
1756185db85Sdougm 	case SA_NOT_ALLOWED:
17624424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "operation not allowed");
1776185db85Sdougm 		break;
1786185db85Sdougm 	case SA_BAD_VALUE:
17924424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "bad property value");
1806185db85Sdougm 		break;
1816185db85Sdougm 	case SA_INVALID_SECURITY:
18224424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "invalid security type");
1836185db85Sdougm 		break;
1846185db85Sdougm 	case SA_NO_SUCH_SECURITY:
18524424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "security type not found");
1866185db85Sdougm 		break;
1876185db85Sdougm 	case SA_VALUE_CONFLICT:
18824424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "property value conflict");
1896185db85Sdougm 		break;
1906185db85Sdougm 	case SA_NOT_IMPLEMENTED:
19124424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "not implemented");
1926185db85Sdougm 		break;
1936185db85Sdougm 	case SA_INVALID_PATH:
19424424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "invalid path");
1956185db85Sdougm 		break;
1966185db85Sdougm 	case SA_NOT_SUPPORTED:
19724424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "operation not supported");
1986185db85Sdougm 		break;
1996185db85Sdougm 	case SA_PROP_SHARE_ONLY:
20024424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "property not valid for group");
2016185db85Sdougm 		break;
2026185db85Sdougm 	case SA_NOT_SHARED:
20324424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "not shared");
2046185db85Sdougm 		break;
205da6c28aaSamw 	case SA_NO_SUCH_RESOURCE:
206da6c28aaSamw 		ret = dgettext(TEXT_DOMAIN, "no such resource");
207da6c28aaSamw 		break;
208da6c28aaSamw 	case SA_RESOURCE_REQUIRED:
209da6c28aaSamw 		ret = dgettext(TEXT_DOMAIN, "resource name required");
210da6c28aaSamw 		break;
211da6c28aaSamw 	case SA_MULTIPLE_ERROR:
212da6c28aaSamw 		ret = dgettext(TEXT_DOMAIN, "errors from multiple protocols");
213da6c28aaSamw 		break;
214da6c28aaSamw 	case SA_PATH_IS_SUBDIR:
215da6c28aaSamw 		ret = dgettext(TEXT_DOMAIN, "path is a subpath of share");
216da6c28aaSamw 		break;
217da6c28aaSamw 	case SA_PATH_IS_PARENTDIR:
218da6c28aaSamw 		ret = dgettext(TEXT_DOMAIN, "path is parent of a share");
219da6c28aaSamw 		break;
220*55bf511dSas200622 	case SA_KRB_KEYTAB_ERR:
221*55bf511dSas200622 		ret = dgettext(TEXT_DOMAIN, "unable to remove the old keys"
222*55bf511dSas200622 		    " from the Kerberos keytab. Please manually remove"
223*55bf511dSas200622 		    " the old keys for your host principal prior to setting"
224*55bf511dSas200622 		    " the ads_domain property");
225*55bf511dSas200622 		break;
226*55bf511dSas200622 	case SA_NO_SERVICE:
227*55bf511dSas200622 		ret = dgettext(TEXT_DOMAIN, "service is not running");
228*55bf511dSas200622 		break;
2296185db85Sdougm 	default:
2306185db85Sdougm 		(void) snprintf(errstr, sizeof (errstr),
23124424a35Sdougm 		    dgettext(TEXT_DOMAIN, "unknown %d"), err);
2326185db85Sdougm 		ret = errstr;
2336185db85Sdougm 	}
2346185db85Sdougm 	return (ret);
2356185db85Sdougm }
2366185db85Sdougm 
2376185db85Sdougm /*
238549ec3ffSdougm  * Document root to active handle mapping functions.  These are only
239549ec3ffSdougm  * used internally. A mutex is used to prevent access while the list
240549ec3ffSdougm  * is changing. In general, the list will be relatively short - one
241549ec3ffSdougm  * item per thread that has called sa_init().
242549ec3ffSdougm  */
243549ec3ffSdougm 
244549ec3ffSdougm sa_handle_impl_t
245549ec3ffSdougm get_handle_for_root(xmlNodePtr root)
246549ec3ffSdougm {
247549ec3ffSdougm 	struct doc2handle *item;
248549ec3ffSdougm 
249549ec3ffSdougm 	(void) mutex_lock(&sa_global_lock);
250549ec3ffSdougm 	for (item = sa_global_handles; item != NULL; item = item->next) {
251549ec3ffSdougm 		if (item->root == root)
252549ec3ffSdougm 			break;
253549ec3ffSdougm 	}
254549ec3ffSdougm 	(void) mutex_unlock(&sa_global_lock);
255549ec3ffSdougm 	if (item != NULL)
256549ec3ffSdougm 		return (item->handle);
257549ec3ffSdougm 	return (NULL);
258549ec3ffSdougm }
259549ec3ffSdougm 
260549ec3ffSdougm static int
261549ec3ffSdougm add_handle_for_root(xmlNodePtr root, sa_handle_impl_t handle)
262549ec3ffSdougm {
263549ec3ffSdougm 	struct doc2handle *item;
264549ec3ffSdougm 	int ret = SA_NO_MEMORY;
265549ec3ffSdougm 
266549ec3ffSdougm 	item = (struct doc2handle *)calloc(sizeof (struct doc2handle), 1);
267549ec3ffSdougm 	if (item != NULL) {
268549ec3ffSdougm 		item->root = root;
269549ec3ffSdougm 		item->handle = handle;
270549ec3ffSdougm 		(void) mutex_lock(&sa_global_lock);
271549ec3ffSdougm 		item->next = sa_global_handles;
272549ec3ffSdougm 		sa_global_handles = item;
273549ec3ffSdougm 		(void) mutex_unlock(&sa_global_lock);
274549ec3ffSdougm 		ret = SA_OK;
275549ec3ffSdougm 	}
276549ec3ffSdougm 	return (ret);
277549ec3ffSdougm }
278549ec3ffSdougm 
279549ec3ffSdougm /*
280549ec3ffSdougm  * remove_handle_for_root(root)
281549ec3ffSdougm  *
282549ec3ffSdougm  * Walks the list of handles and removes the one for this "root" from
283549ec3ffSdougm  * the list. It is up to the caller to free the data.
284549ec3ffSdougm  */
285549ec3ffSdougm 
286549ec3ffSdougm static void
287549ec3ffSdougm remove_handle_for_root(xmlNodePtr root)
288549ec3ffSdougm {
289549ec3ffSdougm 	struct doc2handle *item, *prev;
290549ec3ffSdougm 
291549ec3ffSdougm 	(void) mutex_lock(&sa_global_lock);
292549ec3ffSdougm 	for (prev = NULL, item = sa_global_handles; item != NULL;
293549ec3ffSdougm 	    item = item->next) {
294549ec3ffSdougm 		if (item->root == root) {
295549ec3ffSdougm 			/* first in the list */
29657b448deSdougm 			if (prev == NULL)
297549ec3ffSdougm 				sa_global_handles = sa_global_handles->next;
29857b448deSdougm 			else
299549ec3ffSdougm 				prev->next = item->next;
300549ec3ffSdougm 			/* Item is out of the list so free the list structure */
301549ec3ffSdougm 			free(item);
302549ec3ffSdougm 			break;
303549ec3ffSdougm 		}
304549ec3ffSdougm 		prev = item;
305549ec3ffSdougm 	}
306549ec3ffSdougm 	(void) mutex_unlock(&sa_global_lock);
307549ec3ffSdougm }
308549ec3ffSdougm 
309549ec3ffSdougm /*
310549ec3ffSdougm  * sa_find_group_handle(sa_group_t group)
311549ec3ffSdougm  *
312549ec3ffSdougm  * Find the sa_handle_t for the configuration associated with this
313549ec3ffSdougm  * group.
314549ec3ffSdougm  */
315549ec3ffSdougm sa_handle_t
316549ec3ffSdougm sa_find_group_handle(sa_group_t group)
317549ec3ffSdougm {
318549ec3ffSdougm 	xmlNodePtr node = (xmlNodePtr)group;
319549ec3ffSdougm 	sa_handle_t handle;
320549ec3ffSdougm 
321549ec3ffSdougm 	while (node != NULL) {
322549ec3ffSdougm 		if (strcmp((char *)(node->name), "sharecfg") == 0) {
323549ec3ffSdougm 			/* have the root so get the handle */
324549ec3ffSdougm 			handle = (sa_handle_t)get_handle_for_root(node);
325549ec3ffSdougm 			return (handle);
326549ec3ffSdougm 		}
327549ec3ffSdougm 		node = node->parent;
328549ec3ffSdougm 	}
329549ec3ffSdougm 	return (NULL);
330549ec3ffSdougm }
331549ec3ffSdougm 
332549ec3ffSdougm /*
3336185db85Sdougm  * set_legacy_timestamp(root, path, timevalue)
3346185db85Sdougm  *
3356185db85Sdougm  * add the current timestamp value to the configuration for use in
3366185db85Sdougm  * determining when to update the legacy files.  For SMF, this
3376185db85Sdougm  * property is kept in default/operation/legacy_timestamp
3386185db85Sdougm  */
3396185db85Sdougm 
3406185db85Sdougm static void
3416185db85Sdougm set_legacy_timestamp(xmlNodePtr root, char *path, uint64_t tval)
3426185db85Sdougm {
3436185db85Sdougm 	xmlNodePtr node;
3446185db85Sdougm 	xmlChar *lpath = NULL;
345549ec3ffSdougm 	sa_handle_impl_t handle;
346549ec3ffSdougm 
347549ec3ffSdougm 	/* Have to have a handle or else we weren't initialized. */
348549ec3ffSdougm 	handle = get_handle_for_root(root);
349549ec3ffSdougm 	if (handle == NULL)
350549ec3ffSdougm 		return;
3516185db85Sdougm 
3526185db85Sdougm 	for (node = root->xmlChildrenNode; node != NULL;
3536185db85Sdougm 	    node = node->next) {
3546185db85Sdougm 		if (xmlStrcmp(node->name, (xmlChar *)"legacy") == 0) {
3556185db85Sdougm 			/* a possible legacy node for this path */
3566185db85Sdougm 			lpath = xmlGetProp(node, (xmlChar *)"path");
35757b448deSdougm 			if (lpath != NULL &&
35857b448deSdougm 			    xmlStrcmp(lpath, (xmlChar *)path) == 0) {
3596185db85Sdougm 				xmlFree(lpath);
3606185db85Sdougm 				break;
3616185db85Sdougm 			}
3626185db85Sdougm 			if (lpath != NULL)
3636185db85Sdougm 				xmlFree(lpath);
3646185db85Sdougm 		}
3656185db85Sdougm 	}
3666185db85Sdougm 	if (node == NULL) {
3676185db85Sdougm 		/* need to create the first legacy timestamp node */
3686185db85Sdougm 		node = xmlNewChild(root, NULL, (xmlChar *)"legacy", NULL);
3696185db85Sdougm 	}
3706185db85Sdougm 	if (node != NULL) {
3716185db85Sdougm 		char tstring[32];
3726185db85Sdougm 		int ret;
3736185db85Sdougm 
3746185db85Sdougm 		(void) snprintf(tstring, sizeof (tstring), "%lld", tval);
3756185db85Sdougm 		xmlSetProp(node, (xmlChar *)"timestamp", (xmlChar *)tstring);
3766185db85Sdougm 		xmlSetProp(node, (xmlChar *)"path", (xmlChar *)path);
3776185db85Sdougm 		/* now commit to SMF */
378549ec3ffSdougm 		ret = sa_get_instance(handle->scfhandle, "default");
3796185db85Sdougm 		if (ret == SA_OK) {
38057b448deSdougm 			ret = sa_start_transaction(handle->scfhandle,
38157b448deSdougm 			    "operation");
3826185db85Sdougm 			if (ret == SA_OK) {
38357b448deSdougm 				ret = sa_set_property(handle->scfhandle,
38457b448deSdougm 				    "legacy-timestamp", tstring);
3856185db85Sdougm 				if (ret == SA_OK) {
38657b448deSdougm 					(void) sa_end_transaction(
38757b448deSdougm 					    handle->scfhandle);
3886185db85Sdougm 				} else {
389549ec3ffSdougm 					sa_abort_transaction(handle->scfhandle);
3906185db85Sdougm 				}
3916185db85Sdougm 			}
3926185db85Sdougm 		}
3936185db85Sdougm 	}
3946185db85Sdougm }
3956185db85Sdougm 
3966185db85Sdougm /*
3976185db85Sdougm  * is_shared(share)
3986185db85Sdougm  *
3996185db85Sdougm  * determine if the specified share is currently shared or not.
4006185db85Sdougm  */
4016185db85Sdougm static int
4026185db85Sdougm is_shared(sa_share_t share)
4036185db85Sdougm {
4046185db85Sdougm 	char *shared;
4056185db85Sdougm 	int result = 0; /* assume not */
4066185db85Sdougm 
4076185db85Sdougm 	shared = sa_get_share_attr(share, "shared");
4086185db85Sdougm 	if (shared != NULL) {
4096185db85Sdougm 		if (strcmp(shared, "true") == 0)
4106185db85Sdougm 			result = 1;
4116185db85Sdougm 		sa_free_attr_string(shared);
4126185db85Sdougm 	}
4136185db85Sdougm 	return (result);
4146185db85Sdougm }
4156185db85Sdougm 
4166185db85Sdougm /*
417da6c28aaSamw  * excluded_protocol(share, proto)
418da6c28aaSamw  *
419da6c28aaSamw  * Returns B_TRUE if the specified protocol appears in the "exclude"
420da6c28aaSamw  * property. This is used to prevent sharing special case shares
421da6c28aaSamw  * (e.g. subdirs when SMB wants a subdir and NFS doesn't. B_FALSE is
422da6c28aaSamw  * returned if the protocol isn't in the list.
423da6c28aaSamw  */
424da6c28aaSamw static boolean_t
425da6c28aaSamw excluded_protocol(sa_share_t share, char *proto)
426da6c28aaSamw {
427da6c28aaSamw 	char *protolist;
428da6c28aaSamw 	char *str;
429da6c28aaSamw 	char *token;
430da6c28aaSamw 
431da6c28aaSamw 	protolist = sa_get_share_attr(share, "exclude");
432da6c28aaSamw 	if (protolist != NULL) {
433da6c28aaSamw 		str = protolist;
434da6c28aaSamw 		while ((token = strtok(str, ",")) != NULL) {
435da6c28aaSamw 			if (strcmp(token, proto) == 0) {
436da6c28aaSamw 				sa_free_attr_string(protolist);
437da6c28aaSamw 				return (B_TRUE);
438da6c28aaSamw 			}
439da6c28aaSamw 			str = NULL;
440da6c28aaSamw 		}
441da6c28aaSamw 		sa_free_attr_string(protolist);
442da6c28aaSamw 	}
443da6c28aaSamw 	return (B_FALSE);
444da6c28aaSamw }
445da6c28aaSamw 
446da6c28aaSamw /*
447a99982a7Sdougm  * checksubdirgroup(group, newpath, strictness)
448f345c0beSdougm  *
449a99982a7Sdougm  * check all the specified newpath against all the paths in the
450a99982a7Sdougm  * group. This is a helper function for checksubdir to make it easier
451a99982a7Sdougm  * to also check ZFS subgroups.
452a99982a7Sdougm  * The strictness values mean:
453f345c0beSdougm  * SA_CHECK_NORMAL == only check newpath against shares that are active
454f345c0beSdougm  * SA_CHECK_STRICT == check newpath against both active shares and those
455f345c0beSdougm  *		      stored in the repository
4566185db85Sdougm  */
4576185db85Sdougm static int
458a99982a7Sdougm checksubdirgroup(sa_group_t group, char *newpath, int strictness)
4596185db85Sdougm {
4606185db85Sdougm 	sa_share_t share;
461a99982a7Sdougm 	char *path;
462a99982a7Sdougm 	int issub = SA_OK;
463da6c28aaSamw 	int subdir;
464da6c28aaSamw 	int parent;
465da6c28aaSamw 
466da6c28aaSamw 	if (newpath == NULL)
467da6c28aaSamw 		return (SA_INVALID_PATH);
4686185db85Sdougm 
4696185db85Sdougm 	for (share = sa_get_share(group, NULL); share != NULL;
4706185db85Sdougm 	    share = sa_get_next_share(share)) {
4716185db85Sdougm 		/*
4726185db85Sdougm 		 * The original behavior of share never checked
4736185db85Sdougm 		 * against the permanent configuration
4746185db85Sdougm 		 * (/etc/dfs/dfstab).  PIT has a number of cases where
4756185db85Sdougm 		 * it depends on this older behavior even though it
4766185db85Sdougm 		 * could be considered incorrect.  We may tighten this
4776185db85Sdougm 		 * up in the future.
4786185db85Sdougm 		 */
479f345c0beSdougm 		if (strictness == SA_CHECK_NORMAL && !is_shared(share))
4806185db85Sdougm 			continue;
4816185db85Sdougm 
4826185db85Sdougm 		path = sa_get_share_attr(share, "path");
483f345c0beSdougm 		/*
484f345c0beSdougm 		 * If path is NULL, then a share is in the process of
485f345c0beSdougm 		 * construction or someone has modified the property
486a99982a7Sdougm 		 * group inappropriately. It should be
487a99982a7Sdougm 		 * ignored. issubdir() comes from the original share
488a99982a7Sdougm 		 * implementation and does the difficult part of
489a99982a7Sdougm 		 * checking subdirectories.
490f345c0beSdougm 		 */
491f345c0beSdougm 		if (path == NULL)
492f345c0beSdougm 			continue;
493da6c28aaSamw 
494da6c28aaSamw 		if (strcmp(path, newpath) == 0) {
495da6c28aaSamw 			issub = SA_INVALID_PATH;
496da6c28aaSamw 		} else {
497da6c28aaSamw 			subdir = issubdir(newpath, path);
498da6c28aaSamw 			parent = issubdir(path, newpath);
499da6c28aaSamw 			if (subdir || parent) {
5006185db85Sdougm 				sa_free_attr_string(path);
5016185db85Sdougm 				path = NULL;
502da6c28aaSamw 				return (subdir ?
503da6c28aaSamw 				    SA_PATH_IS_SUBDIR : SA_PATH_IS_PARENTDIR);
504da6c28aaSamw 			}
5056185db85Sdougm 		}
5066185db85Sdougm 		sa_free_attr_string(path);
5076185db85Sdougm 		path = NULL;
5086185db85Sdougm 	}
509a99982a7Sdougm 	return (issub);
510a99982a7Sdougm }
511a99982a7Sdougm 
512a99982a7Sdougm /*
513a99982a7Sdougm  * checksubdir(newpath, strictness)
514a99982a7Sdougm  *
515a99982a7Sdougm  * checksubdir determines if the specified path (newpath) is a
516a99982a7Sdougm  * subdirectory of another share. It calls checksubdirgroup() to do
517a99982a7Sdougm  * the complicated work. The strictness parameter determines how
518a99982a7Sdougm  * strict a check to make against the path. The strictness values
519a99982a7Sdougm  * mean: SA_CHECK_NORMAL == only check newpath against shares that are
520a99982a7Sdougm  * active SA_CHECK_STRICT == check newpath against both active shares
521a99982a7Sdougm  * and those * stored in the repository
522a99982a7Sdougm  */
523a99982a7Sdougm static int
524549ec3ffSdougm checksubdir(sa_handle_t handle, char *newpath, int strictness)
525a99982a7Sdougm {
526a99982a7Sdougm 	sa_group_t group;
527da6c28aaSamw 	int issub = SA_OK;
528a99982a7Sdougm 	char *path = NULL;
529a99982a7Sdougm 
530da6c28aaSamw 	for (group = sa_get_group(handle, NULL);
531da6c28aaSamw 	    group != NULL && issub == SA_OK;
532da6c28aaSamw 	    group = sa_get_next_group(group)) {
533a99982a7Sdougm 		if (sa_group_is_zfs(group)) {
534a99982a7Sdougm 			sa_group_t subgroup;
535a99982a7Sdougm 			for (subgroup = sa_get_sub_group(group);
536da6c28aaSamw 			    subgroup != NULL && issub == SA_OK;
537a99982a7Sdougm 			    subgroup = sa_get_next_group(subgroup))
53857b448deSdougm 				issub = checksubdirgroup(subgroup, newpath,
53957b448deSdougm 				    strictness);
540a99982a7Sdougm 		} else {
541a99982a7Sdougm 			issub = checksubdirgroup(group, newpath, strictness);
542a99982a7Sdougm 		}
5436185db85Sdougm 	}
5446185db85Sdougm 	if (path != NULL)
5456185db85Sdougm 		sa_free_attr_string(path);
5466185db85Sdougm 	return (issub);
5476185db85Sdougm }
5486185db85Sdougm 
5496185db85Sdougm /*
550f345c0beSdougm  * validpath(path, strictness)
5516185db85Sdougm  * determine if the provided path is valid for a share. It shouldn't
5526185db85Sdougm  * be a sub-dir of an already shared path or the parent directory of a
5536185db85Sdougm  * share path.
5546185db85Sdougm  */
5556185db85Sdougm static int
556549ec3ffSdougm validpath(sa_handle_t handle, char *path, int strictness)
5576185db85Sdougm {
5586185db85Sdougm 	int error = SA_OK;
5596185db85Sdougm 	struct stat st;
5606185db85Sdougm 	sa_share_t share;
5616185db85Sdougm 	char *fstype;
5626185db85Sdougm 
56357b448deSdougm 	if (*path != '/')
5646185db85Sdougm 		return (SA_BAD_PATH);
56557b448deSdougm 
5666185db85Sdougm 	if (stat(path, &st) < 0) {
5676185db85Sdougm 		error = SA_NO_SUCH_PATH;
5686185db85Sdougm 	} else {
569549ec3ffSdougm 		share = sa_find_share(handle, path);
57057b448deSdougm 		if (share != NULL)
5716185db85Sdougm 			error = SA_DUPLICATE_NAME;
57257b448deSdougm 
5736185db85Sdougm 		if (error == SA_OK) {
5746185db85Sdougm 			/*
57557b448deSdougm 			 * check for special case with file system
57657b448deSdougm 			 * that might have restrictions.  For now, ZFS
57757b448deSdougm 			 * is the only case since it has its own idea
57857b448deSdougm 			 * of how to configure shares. We do this
57957b448deSdougm 			 * before subdir checking since things like
58057b448deSdougm 			 * ZFS will do that for us. This should also
58157b448deSdougm 			 * be done via plugin interface.
5826185db85Sdougm 			 */
5836185db85Sdougm 			fstype = sa_fstype(path);
5846185db85Sdougm 			if (fstype != NULL && strcmp(fstype, "zfs") == 0) {
585549ec3ffSdougm 				if (sa_zfs_is_shared(handle, path))
586a99982a7Sdougm 					error = SA_INVALID_NAME;
5876185db85Sdougm 			}
5886185db85Sdougm 			if (fstype != NULL)
5896185db85Sdougm 				sa_free_fstype(fstype);
5906185db85Sdougm 		}
59157b448deSdougm 		if (error == SA_OK)
592549ec3ffSdougm 			error = checksubdir(handle, path, strictness);
5936185db85Sdougm 	}
5946185db85Sdougm 	return (error);
5956185db85Sdougm }
5966185db85Sdougm 
5976185db85Sdougm /*
5986185db85Sdougm  * check to see if group/share is persistent.
599da6c28aaSamw  *
600da6c28aaSamw  * "group" can be either an sa_group_t or an sa_share_t. (void *)
601da6c28aaSamw  * works since both thse types are also void *.
6026185db85Sdougm  */
603da6c28aaSamw int
604da6c28aaSamw sa_is_persistent(void *group)
6056185db85Sdougm {
6066185db85Sdougm 	char *type;
6076185db85Sdougm 	int persist = 1;
6086185db85Sdougm 
609da6c28aaSamw 	type = sa_get_group_attr((sa_group_t)group, "type");
6106185db85Sdougm 	if (type != NULL && strcmp(type, "transient") == 0)
6116185db85Sdougm 		persist = 0;
6126185db85Sdougm 	if (type != NULL)
6136185db85Sdougm 		sa_free_attr_string(type);
6146185db85Sdougm 	return (persist);
6156185db85Sdougm }
6166185db85Sdougm 
6176185db85Sdougm /*
6186185db85Sdougm  * sa_valid_group_name(name)
6196185db85Sdougm  *
6206185db85Sdougm  * check that the "name" contains only valid characters and otherwise
6216185db85Sdougm  * fits the required naming conventions. Valid names must start with
6226185db85Sdougm  * an alphabetic and the remainder may consist of only alphanumeric
6236185db85Sdougm  * plus the '-' and '_' characters. This name limitation comes from
6246185db85Sdougm  * inherent limitations in SMF.
6256185db85Sdougm  */
6266185db85Sdougm 
6276185db85Sdougm int
6286185db85Sdougm sa_valid_group_name(char *name)
6296185db85Sdougm {
6306185db85Sdougm 	int ret = 1;
6316185db85Sdougm 	ssize_t len;
6326185db85Sdougm 
6336185db85Sdougm 	if (name != NULL && isalpha(*name)) {
6346185db85Sdougm 		char c;
6356185db85Sdougm 		len = strlen(name);
6366185db85Sdougm 		if (len < (scf_max_name_len - sizeof ("group:"))) {
6376185db85Sdougm 			for (c = *name++; c != '\0' && ret != 0; c = *name++) {
6386185db85Sdougm 				if (!isalnum(c) && c != '-' && c != '_')
6396185db85Sdougm 					ret = 0;
6406185db85Sdougm 			}
6416185db85Sdougm 		} else {
6426185db85Sdougm 			ret = 0;
6436185db85Sdougm 		}
6446185db85Sdougm 	} else {
6456185db85Sdougm 		ret = 0;
6466185db85Sdougm 	}
6476185db85Sdougm 	return (ret);
6486185db85Sdougm }
6496185db85Sdougm 
6506185db85Sdougm 
6516185db85Sdougm /*
6526185db85Sdougm  * is_zfs_group(group)
6536185db85Sdougm  *	Determine if the specified group is a ZFS sharenfs group
6546185db85Sdougm  */
6556185db85Sdougm static int
6566185db85Sdougm is_zfs_group(sa_group_t group)
6576185db85Sdougm {
6586185db85Sdougm 	int ret = 0;
6596185db85Sdougm 	xmlNodePtr parent;
6606185db85Sdougm 	xmlChar *zfs;
6616185db85Sdougm 
66257b448deSdougm 	if (strcmp((char *)((xmlNodePtr)group)->name, "share") == 0)
6636185db85Sdougm 		parent = (xmlNodePtr)sa_get_parent_group(group);
66457b448deSdougm 	else
6656185db85Sdougm 		parent = (xmlNodePtr)group;
6666185db85Sdougm 	zfs = xmlGetProp(parent, (xmlChar *)"zfs");
6676185db85Sdougm 	if (zfs != NULL) {
6686185db85Sdougm 		xmlFree(zfs);
6696185db85Sdougm 		ret = 1;
6706185db85Sdougm 	}
6716185db85Sdougm 	return (ret);
6726185db85Sdougm }
6736185db85Sdougm 
6746185db85Sdougm /*
675da6c28aaSamw  * sa_get_object_type(object)
676da6c28aaSamw  *
677da6c28aaSamw  * This function returns a numeric value representing the object
678da6c28aaSamw  * type. This allows using simpler checks when doing type specific
679da6c28aaSamw  * operations.
680da6c28aaSamw  */
681da6c28aaSamw 
682da6c28aaSamw static int
683da6c28aaSamw sa_get_object_type(void *object)
684da6c28aaSamw {
685da6c28aaSamw 	xmlNodePtr node = (xmlNodePtr)object;
686da6c28aaSamw 	int type;
687da6c28aaSamw 
688da6c28aaSamw 	if (xmlStrcmp(node->name, (xmlChar *)"group") == 0)
689da6c28aaSamw 		type = SA_TYPE_GROUP;
690da6c28aaSamw 	else if (xmlStrcmp(node->name, (xmlChar *)"share") == 0)
691da6c28aaSamw 		type = SA_TYPE_SHARE;
692da6c28aaSamw 	else if (xmlStrcmp(node->name, (xmlChar *)"resource") == 0)
693da6c28aaSamw 		type = SA_TYPE_RESOURCE;
694da6c28aaSamw 	else if (xmlStrcmp(node->name, (xmlChar *)"optionset") == 0)
695da6c28aaSamw 		type = SA_TYPE_OPTIONSET;
696da6c28aaSamw 	else if (xmlStrcmp(node->name, (xmlChar *)"security") == 0)
697da6c28aaSamw 		type = SA_TYPE_ALTSPACE;
698da6c28aaSamw 	else
699da6c28aaSamw 		assert(0);
700da6c28aaSamw 	return (type);
701da6c28aaSamw }
702da6c28aaSamw 
703da6c28aaSamw /*
7046185db85Sdougm  * sa_optionset_name(optionset, oname, len, id)
7056185db85Sdougm  *	return the SMF name for the optionset. If id is not NULL, it
7066185db85Sdougm  *	will have the GUID value for a share and should be used
7076185db85Sdougm  *	instead of the keyword "optionset" which is used for
7086185db85Sdougm  *	groups. If the optionset doesn't have a protocol type
7096185db85Sdougm  *	associated with it, "default" is used. This shouldn't happen
7106185db85Sdougm  *	at this point but may be desirable in the future if there are
7116185db85Sdougm  *	protocol independent properties added. The name is returned in
7126185db85Sdougm  *	oname.
7136185db85Sdougm  */
7146185db85Sdougm 
7156185db85Sdougm static int
7166185db85Sdougm sa_optionset_name(sa_optionset_t optionset, char *oname, size_t len, char *id)
7176185db85Sdougm {
7186185db85Sdougm 	char *proto;
719da6c28aaSamw 	void *parent;
720da6c28aaSamw 	int ptype;
7216185db85Sdougm 
7226185db85Sdougm 	if (id == NULL)
7236185db85Sdougm 		id = "optionset";
7246185db85Sdougm 
725da6c28aaSamw 	parent = sa_get_optionset_parent(optionset);
726da6c28aaSamw 	if (parent != NULL) {
727da6c28aaSamw 		ptype = sa_get_object_type(parent);
7286185db85Sdougm 		proto = sa_get_optionset_attr(optionset, "type");
729da6c28aaSamw 		if (ptype != SA_TYPE_RESOURCE) {
730da6c28aaSamw 			len = snprintf(oname, len, "%s_%s", id,
731da6c28aaSamw 			    proto ? proto : "default");
732da6c28aaSamw 		} else {
733da6c28aaSamw 			char *index;
734da6c28aaSamw 			index = get_node_attr((void *)parent, "id");
735da6c28aaSamw 			if (index != NULL)
736da6c28aaSamw 				len = snprintf(oname, len, "%s_%s_%s", id,
737da6c28aaSamw 				    proto ? proto : "default", index);
738da6c28aaSamw 			else
739da6c28aaSamw 				len = 0;
740da6c28aaSamw 		}
7416185db85Sdougm 
7426185db85Sdougm 		if (proto != NULL)
7436185db85Sdougm 			sa_free_attr_string(proto);
744da6c28aaSamw 	} else {
745da6c28aaSamw 		len = 0;
746da6c28aaSamw 	}
7476185db85Sdougm 	return (len);
7486185db85Sdougm }
7496185db85Sdougm 
7506185db85Sdougm /*
7516185db85Sdougm  * sa_security_name(optionset, oname, len, id)
7526185db85Sdougm  *
7536185db85Sdougm  * return the SMF name for the security. If id is not NULL, it will
7546185db85Sdougm  * have the GUID value for a share and should be used instead of the
7556185db85Sdougm  * keyword "optionset" which is used for groups. If the optionset
7566185db85Sdougm  * doesn't have a protocol type associated with it, "default" is
7576185db85Sdougm  * used. This shouldn't happen at this point but may be desirable in
7586185db85Sdougm  * the future if there are protocol independent properties added. The
7596185db85Sdougm  * name is returned in oname. The security type is also encoded into
7606185db85Sdougm  * the name. In the future, this wil *be handled a bit differently.
7616185db85Sdougm  */
7626185db85Sdougm 
7636185db85Sdougm static int
7646185db85Sdougm sa_security_name(sa_security_t security, char *oname, size_t len, char *id)
7656185db85Sdougm {
7666185db85Sdougm 	char *proto;
7676185db85Sdougm 	char *sectype;
7686185db85Sdougm 
7696185db85Sdougm 	if (id == NULL)
7706185db85Sdougm 		id = "optionset";
7716185db85Sdougm 
7726185db85Sdougm 	proto = sa_get_security_attr(security, "type");
7736185db85Sdougm 	sectype = sa_get_security_attr(security, "sectype");
77457b448deSdougm 	len = snprintf(oname, len, "%s_%s_%s", id, proto ? proto : "default",
7756185db85Sdougm 	    sectype ? sectype : "default");
7766185db85Sdougm 	if (proto != NULL)
7776185db85Sdougm 		sa_free_attr_string(proto);
7786185db85Sdougm 	if (sectype != NULL)
7796185db85Sdougm 		sa_free_attr_string(sectype);
7806185db85Sdougm 	return (len);
7816185db85Sdougm }
7826185db85Sdougm 
7836185db85Sdougm /*
78457b448deSdougm  * verifydefgroupopts(handle)
78557b448deSdougm  *
78657b448deSdougm  * Make sure a "default" group exists and has default protocols enabled.
78757b448deSdougm  */
78857b448deSdougm static void
78957b448deSdougm verifydefgroupopts(sa_handle_t handle)
79057b448deSdougm {
79157b448deSdougm 	sa_group_t defgrp;
79257b448deSdougm 	sa_optionset_t opt;
793da6c28aaSamw 
79457b448deSdougm 	defgrp = sa_get_group(handle, "default");
79557b448deSdougm 	if (defgrp != NULL) {
79657b448deSdougm 		opt = sa_get_optionset(defgrp, NULL);
79757b448deSdougm 		/*
79857b448deSdougm 		 * NFS is the default for default group
79957b448deSdougm 		 */
80057b448deSdougm 		if (opt == NULL)
80157b448deSdougm 			opt = sa_create_optionset(defgrp, "nfs");
80257b448deSdougm 	}
80357b448deSdougm }
80457b448deSdougm 
80557b448deSdougm /*
806f345c0beSdougm  * sa_init(init_service)
8076185db85Sdougm  *	Initialize the API
8086185db85Sdougm  *	find all the shared objects
8096185db85Sdougm  *	init the tables with all objects
8106185db85Sdougm  *	read in the current configuration
8116185db85Sdougm  */
8126185db85Sdougm 
81357b448deSdougm #define	GETPROP(prop)	scf_simple_prop_next_astring(prop)
81457b448deSdougm #define	CHECKTSTAMP(st, tval)	stat(SA_LEGACY_DFSTAB, &st) >= 0 && \
81557b448deSdougm 	tval != TSTAMP(st.st_ctim)
81657b448deSdougm 
817549ec3ffSdougm sa_handle_t
8186185db85Sdougm sa_init(int init_service)
8196185db85Sdougm {
8206185db85Sdougm 	struct stat st;
8216185db85Sdougm 	int legacy = 0;
8226185db85Sdougm 	uint64_t tval = 0;
823a99982a7Sdougm 	int lockfd;
824a99982a7Sdougm 	sigset_t old;
825a99982a7Sdougm 	int updatelegacy = B_FALSE;
826a99982a7Sdougm 	scf_simple_prop_t *prop;
827549ec3ffSdougm 	sa_handle_impl_t handle;
828549ec3ffSdougm 	int err;
8296185db85Sdougm 
830549ec3ffSdougm 	handle = calloc(sizeof (struct sa_handle_impl), 1);
831549ec3ffSdougm 
832549ec3ffSdougm 	if (handle != NULL) {
8336185db85Sdougm 		/* get protocol specific structures */
8346185db85Sdougm 		(void) proto_plugin_init();
8356185db85Sdougm 		if (init_service & SA_INIT_SHARE_API) {
8366185db85Sdougm 			/*
83757b448deSdougm 			 * initialize access into libzfs. We use this
83857b448deSdougm 			 * when collecting info about ZFS datasets and
83957b448deSdougm 			 * shares.
8401cea05afSdougm 			 */
84157b448deSdougm 			if (sa_zfs_init(handle) == B_FALSE) {
84257b448deSdougm 				free(handle);
84357b448deSdougm 				(void) proto_plugin_fini();
84457b448deSdougm 				return (NULL);
84557b448deSdougm 			}
8461cea05afSdougm 			/*
8476185db85Sdougm 			 * since we want to use SMF, initialize an svc handle
8486185db85Sdougm 			 * and find out what is there.
8496185db85Sdougm 			 */
850549ec3ffSdougm 			handle->scfhandle = sa_scf_init(handle);
851549ec3ffSdougm 			if (handle->scfhandle != NULL) {
852a99982a7Sdougm 				/*
853a99982a7Sdougm 				 * Need to lock the extraction of the
854a99982a7Sdougm 				 * configuration if the dfstab file has
855a99982a7Sdougm 				 * changed. Lock everything now and release if
856a99982a7Sdougm 				 * not needed.  Use a file that isn't being
857a99982a7Sdougm 				 * manipulated by other parts of the system in
858a99982a7Sdougm 				 * order to not interfere with locking. Using
859a99982a7Sdougm 				 * dfstab doesn't work.
860a99982a7Sdougm 				 */
861a99982a7Sdougm 				sablocksigs(&old);
862a99982a7Sdougm 				lockfd = open(DFS_LOCK_FILE, O_RDWR);
863a99982a7Sdougm 				if (lockfd >= 0) {
864a99982a7Sdougm 					extern int errno;
865a99982a7Sdougm 					errno = 0;
866a99982a7Sdougm 					(void) lockf(lockfd, F_LOCK, 0);
867a99982a7Sdougm 					/*
86857b448deSdougm 					 * Check whether we are going to need
86957b448deSdougm 					 * to merge any dfstab changes. This
87057b448deSdougm 					 * is done by comparing the value of
87157b448deSdougm 					 * legacy-timestamp with the current
87257b448deSdougm 					 * st_ctim of the file. If they are
87357b448deSdougm 					 * different, an update is needed and
87457b448deSdougm 					 * the file must remain locked until
87557b448deSdougm 					 * the merge is done in order to
87657b448deSdougm 					 * prevent multiple startups from
87757b448deSdougm 					 * changing the SMF repository at the
87857b448deSdougm 					 * same time.  The first to get the
87957b448deSdougm 					 * lock will make any changes before
88057b448deSdougm 					 * the others can read the repository.
881a99982a7Sdougm 					 */
88257b448deSdougm 					prop = scf_simple_prop_get
88357b448deSdougm 					    (handle->scfhandle->handle,
88457b448deSdougm 					    (const char *)SA_SVC_FMRI_BASE
88557b448deSdougm 					    ":default", "operation",
886a99982a7Sdougm 					    "legacy-timestamp");
887a99982a7Sdougm 					if (prop != NULL) {
888a99982a7Sdougm 						char *i64;
88957b448deSdougm 						i64 = GETPROP(prop);
89057b448deSdougm 						if (i64 != NULL)
89157b448deSdougm 							tval = strtoull(i64,
89257b448deSdougm 							    NULL, 0);
89357b448deSdougm 						if (CHECKTSTAMP(st, tval))
894a99982a7Sdougm 							updatelegacy = B_TRUE;
89557b448deSdougm 						scf_simple_prop_free(prop);
896a99982a7Sdougm 					} else {
89757b448deSdougm 						/*
89857b448deSdougm 						 * We haven't set the
89957b448deSdougm 						 * timestamp before so do it.
90057b448deSdougm 						 */
901a99982a7Sdougm 						updatelegacy = B_TRUE;
902a99982a7Sdougm 					}
903a99982a7Sdougm 				}
904a99982a7Sdougm 				if (updatelegacy == B_FALSE) {
905a99982a7Sdougm 					/* Don't need the lock anymore */
906a99982a7Sdougm 					(void) lockf(lockfd, F_ULOCK, 0);
907a99982a7Sdougm 					(void) close(lockfd);
908a99982a7Sdougm 				}
9091d1813a7Sdougm 
9101d1813a7Sdougm 				/*
9111d1813a7Sdougm 				 * It is essential that the document tree and
9121d1813a7Sdougm 				 * the internal list of roots to handles be
9131d1813a7Sdougm 				 * setup before anything that might try to
9141d1813a7Sdougm 				 * create a new object is called. The document
9151d1813a7Sdougm 				 * tree is the combination of handle->doc and
9161d1813a7Sdougm 				 * handle->tree. This allows searches,
9171d1813a7Sdougm 				 * etc. when all you have is an object in the
9181d1813a7Sdougm 				 * tree.
9191d1813a7Sdougm 				 */
9201d1813a7Sdougm 				handle->doc = xmlNewDoc((xmlChar *)"1.0");
92157b448deSdougm 				handle->tree = xmlNewNode(NULL,
92257b448deSdougm 				    (xmlChar *)"sharecfg");
92357b448deSdougm 				if (handle->doc != NULL &&
92457b448deSdougm 				    handle->tree != NULL) {
92557b448deSdougm 					xmlDocSetRootElement(handle->doc,
92657b448deSdougm 					    handle->tree);
92757b448deSdougm 					err = add_handle_for_root(handle->tree,
92857b448deSdougm 					    handle);
9291d1813a7Sdougm 					if (err == SA_OK)
93057b448deSdougm 						err = sa_get_config(
93157b448deSdougm 						    handle->scfhandle,
9321d1813a7Sdougm 						    handle->tree, handle);
9331d1813a7Sdougm 				} else {
9341d1813a7Sdougm 					if (handle->doc != NULL)
9351d1813a7Sdougm 						xmlFreeDoc(handle->doc);
9361d1813a7Sdougm 					if (handle->tree != NULL)
9371d1813a7Sdougm 						xmlFreeNode(handle->tree);
9381d1813a7Sdougm 					err = SA_NO_MEMORY;
9391d1813a7Sdougm 				}
9401d1813a7Sdougm 
941a99982a7Sdougm 				saunblocksigs(&old);
942549ec3ffSdougm 
943549ec3ffSdougm 				if (err != SA_OK) {
944549ec3ffSdougm 					/*
9451d1813a7Sdougm 					 * If we couldn't add the tree handle
9461d1813a7Sdougm 					 * to the list, then things are going
9471d1813a7Sdougm 					 * to fail badly. Might as well undo
9481d1813a7Sdougm 					 * everything now and fail the
9491d1813a7Sdougm 					 * sa_init().
950549ec3ffSdougm 					 */
951549ec3ffSdougm 					sa_fini(handle);
952549ec3ffSdougm 					return (NULL);
953549ec3ffSdougm 				}
954549ec3ffSdougm 
9556185db85Sdougm 				if (tval == 0) {
95657b448deSdougm 					/*
95757b448deSdougm 					 * first time so make sure
95857b448deSdougm 					 * default is setup
95957b448deSdougm 					 */
96057b448deSdougm 					verifydefgroupopts(handle);
9616185db85Sdougm 				}
9621d1813a7Sdougm 
963a99982a7Sdougm 				if (updatelegacy == B_TRUE) {
964a99982a7Sdougm 					sablocksigs(&old);
965549ec3ffSdougm 					getlegacyconfig((sa_handle_t)handle,
966549ec3ffSdougm 					    SA_LEGACY_DFSTAB, &handle->tree);
9676185db85Sdougm 					if (stat(SA_LEGACY_DFSTAB, &st) >= 0)
968546405c3Sdougm 						set_legacy_timestamp(
969546405c3Sdougm 						    handle->tree,
9706185db85Sdougm 						    SA_LEGACY_DFSTAB,
9716185db85Sdougm 						    TSTAMP(st.st_ctim));
972a99982a7Sdougm 					saunblocksigs(&old);
973546405c3Sdougm 					/*
974546405c3Sdougm 					 * Safe to unlock now to allow
975546405c3Sdougm 					 * others to run
976546405c3Sdougm 					 */
977a99982a7Sdougm 					(void) lockf(lockfd, F_ULOCK, 0);
978a99982a7Sdougm 					(void) close(lockfd);
9796185db85Sdougm 				}
980549ec3ffSdougm 				legacy |= sa_get_zfs_shares(handle, "zfs");
981549ec3ffSdougm 				legacy |= gettransients(handle, &handle->tree);
9826185db85Sdougm 			}
9836185db85Sdougm 		}
9846185db85Sdougm 	}
985549ec3ffSdougm 	return ((sa_handle_t)handle);
9866185db85Sdougm }
9876185db85Sdougm 
9886185db85Sdougm /*
989549ec3ffSdougm  * sa_fini(handle)
9906185db85Sdougm  *	Uninitialize the API structures including the configuration
9911cea05afSdougm  *	data structures and ZFS related data.
9926185db85Sdougm  */
9936185db85Sdougm 
9946185db85Sdougm void
995549ec3ffSdougm sa_fini(sa_handle_t handle)
9966185db85Sdougm {
997549ec3ffSdougm 	sa_handle_impl_t impl_handle = (sa_handle_impl_t)handle;
998549ec3ffSdougm 
999549ec3ffSdougm 	if (impl_handle != NULL) {
1000549ec3ffSdougm 		/*
1001549ec3ffSdougm 		 * Free the config trees and any other data structures
1002549ec3ffSdougm 		 * used in the handle.
1003549ec3ffSdougm 		 */
1004549ec3ffSdougm 		if (impl_handle->doc != NULL)
1005549ec3ffSdougm 			xmlFreeDoc(impl_handle->doc);
1006549ec3ffSdougm 		sa_scf_fini(impl_handle->scfhandle);
1007549ec3ffSdougm 		sa_zfs_fini(impl_handle);
1008549ec3ffSdougm 
1009549ec3ffSdougm 		/* Remove and free the entry in the global list. */
1010549ec3ffSdougm 		remove_handle_for_root(impl_handle->tree);
1011549ec3ffSdougm 
1012549ec3ffSdougm 		/* Make sure we free the handle */
1013549ec3ffSdougm 		free(impl_handle);
1014549ec3ffSdougm 
1015549ec3ffSdougm 		/*
1016549ec3ffSdougm 		 * If this was the last handle to release, unload the
1017549ec3ffSdougm 		 * plugins that were loaded.
1018549ec3ffSdougm 		 */
1019549ec3ffSdougm 		if (sa_global_handles == NULL)
1020549ec3ffSdougm 			(void) proto_plugin_fini();
1021549ec3ffSdougm 
10226185db85Sdougm 	}
10236185db85Sdougm }
10246185db85Sdougm 
10256185db85Sdougm /*
10266185db85Sdougm  * sa_get_protocols(char **protocol)
10276185db85Sdougm  *	Get array of protocols that are supported
10286185db85Sdougm  *	Returns pointer to an allocated and NULL terminated
10296185db85Sdougm  *	array of strings.  Caller must free.
10306185db85Sdougm  *	This really should be determined dynamically.
10316185db85Sdougm  *	If there aren't any defined, return -1.
10326185db85Sdougm  *	Use free() to return memory.
10336185db85Sdougm  */
10346185db85Sdougm 
10356185db85Sdougm int
10366185db85Sdougm sa_get_protocols(char ***protocols)
10376185db85Sdougm {
10386185db85Sdougm 	int numproto = -1;
10396185db85Sdougm 
10406185db85Sdougm 	if (protocols != NULL) {
10416185db85Sdougm 		struct sa_proto_plugin *plug;
10426185db85Sdougm 		for (numproto = 0, plug = sap_proto_list; plug != NULL;
10436185db85Sdougm 		    plug = plug->plugin_next) {
10446185db85Sdougm 			numproto++;
10456185db85Sdougm 		}
10466185db85Sdougm 
10476185db85Sdougm 		*protocols = calloc(numproto + 1,  sizeof (char *));
10486185db85Sdougm 		if (*protocols != NULL) {
10496185db85Sdougm 			int ret = 0;
10506185db85Sdougm 			for (plug = sap_proto_list; plug != NULL;
10516185db85Sdougm 			    plug = plug->plugin_next) {
10526185db85Sdougm 				/* faking for now */
105357b448deSdougm 				(*protocols)[ret++] =
105457b448deSdougm 				    plug->plugin_ops->sa_protocol;
10556185db85Sdougm 			}
10566185db85Sdougm 		} else {
10576185db85Sdougm 			numproto = -1;
10586185db85Sdougm 		}
10596185db85Sdougm 	}
10606185db85Sdougm 	return (numproto);
10616185db85Sdougm }
10626185db85Sdougm 
10636185db85Sdougm /*
10646185db85Sdougm  * find_group_by_name(node, group)
10656185db85Sdougm  *
10666185db85Sdougm  * search the XML document subtree specified by node to find the group
10676185db85Sdougm  * specified by group. Searching subtree allows subgroups to be
10686185db85Sdougm  * searched for.
10696185db85Sdougm  */
10706185db85Sdougm 
10716185db85Sdougm static xmlNodePtr
10726185db85Sdougm find_group_by_name(xmlNodePtr node, xmlChar *group)
10736185db85Sdougm {
10746185db85Sdougm 	xmlChar *name = NULL;
10756185db85Sdougm 
10766185db85Sdougm 	for (node = node->xmlChildrenNode; node != NULL;
10776185db85Sdougm 	    node = node->next) {
10786185db85Sdougm 		if (xmlStrcmp(node->name, (xmlChar *)"group") == 0) {
10796185db85Sdougm 			/* if no groupname, return the first found */
10806185db85Sdougm 			if (group == NULL)
10816185db85Sdougm 				break;
10826185db85Sdougm 			name = xmlGetProp(node, (xmlChar *)"name");
108357b448deSdougm 			if (name != NULL && xmlStrcmp(name, group) == 0)
10846185db85Sdougm 				break;
10856185db85Sdougm 			if (name != NULL) {
10866185db85Sdougm 				xmlFree(name);
10876185db85Sdougm 				name = NULL;
10886185db85Sdougm 			}
10896185db85Sdougm 		}
10906185db85Sdougm 	}
10916185db85Sdougm 	if (name != NULL)
10926185db85Sdougm 		xmlFree(name);
10936185db85Sdougm 	return (node);
10946185db85Sdougm }
10956185db85Sdougm 
10966185db85Sdougm /*
10976185db85Sdougm  * sa_get_group(groupname)
10986185db85Sdougm  *	Return the "group" specified.  If groupname is NULL,
10996185db85Sdougm  *	return the first group of the list of groups.
11006185db85Sdougm  */
11016185db85Sdougm sa_group_t
1102549ec3ffSdougm sa_get_group(sa_handle_t handle, char *groupname)
11036185db85Sdougm {
11046185db85Sdougm 	xmlNodePtr node = NULL;
11056185db85Sdougm 	char *subgroup = NULL;
11066185db85Sdougm 	char *group = NULL;
1107549ec3ffSdougm 	sa_handle_impl_t impl_handle = (sa_handle_impl_t)handle;
11086185db85Sdougm 
1109549ec3ffSdougm 	if (impl_handle != NULL && impl_handle->tree != NULL) {
11106185db85Sdougm 		if (groupname != NULL) {
11116185db85Sdougm 			group = strdup(groupname);
1112a3351425Sdougm 			if (group != NULL) {
11136185db85Sdougm 				subgroup = strchr(group, '/');
11146185db85Sdougm 				if (subgroup != NULL)
11156185db85Sdougm 					*subgroup++ = '\0';
11166185db85Sdougm 			}
1117a3351425Sdougm 		}
1118a3351425Sdougm 		/*
1119a3351425Sdougm 		 * We want to find the, possibly, named group. If
1120a3351425Sdougm 		 * group is not NULL, then lookup the name. If it is
1121a3351425Sdougm 		 * NULL, we only do the find if groupname is also
1122a3351425Sdougm 		 * NULL. This allows lookup of the "first" group in
1123a3351425Sdougm 		 * the internal list.
1124a3351425Sdougm 		 */
1125a3351425Sdougm 		if (group != NULL || groupname == NULL)
1126a3351425Sdougm 			node = find_group_by_name(impl_handle->tree,
1127a3351425Sdougm 			    (xmlChar *)group);
1128a3351425Sdougm 
11296185db85Sdougm 		/* if a subgroup, find it before returning */
113057b448deSdougm 		if (subgroup != NULL && node != NULL)
11316185db85Sdougm 			node = find_group_by_name(node, (xmlChar *)subgroup);
11326185db85Sdougm 	}
11336185db85Sdougm 	if (node != NULL && (char *)group != NULL)
1134549ec3ffSdougm 		(void) sa_get_instance(impl_handle->scfhandle, (char *)group);
11356185db85Sdougm 	if (group != NULL)
11366185db85Sdougm 		free(group);
11376185db85Sdougm 	return ((sa_group_t)(node));
11386185db85Sdougm }
11396185db85Sdougm 
11406185db85Sdougm /*
11416185db85Sdougm  * sa_get_next_group(group)
11426185db85Sdougm  *	Return the "next" group after the specified group from
11436185db85Sdougm  *	the internal group list.  NULL if there are no more.
11446185db85Sdougm  */
11456185db85Sdougm sa_group_t
11466185db85Sdougm sa_get_next_group(sa_group_t group)
11476185db85Sdougm {
11486185db85Sdougm 	xmlNodePtr ngroup = NULL;
11496185db85Sdougm 	if (group != NULL) {
11506185db85Sdougm 		for (ngroup = ((xmlNodePtr)group)->next; ngroup != NULL;
11516185db85Sdougm 		    ngroup = ngroup->next) {
11526185db85Sdougm 			if (xmlStrcmp(ngroup->name, (xmlChar *)"group") == 0)
11536185db85Sdougm 				break;
11546185db85Sdougm 		}
11556185db85Sdougm 	}
11566185db85Sdougm 	return ((sa_group_t)ngroup);
11576185db85Sdougm }
11586185db85Sdougm 
11596185db85Sdougm /*
11606185db85Sdougm  * sa_get_share(group, sharepath)
11616185db85Sdougm  *	Return the share object for the share specified. The share
11626185db85Sdougm  *	must be in the specified group.  Return NULL if not found.
11636185db85Sdougm  */
11646185db85Sdougm sa_share_t
11656185db85Sdougm sa_get_share(sa_group_t group, char *sharepath)
11666185db85Sdougm {
11676185db85Sdougm 	xmlNodePtr node = NULL;
11686185db85Sdougm 	xmlChar *path;
11696185db85Sdougm 
11706185db85Sdougm 	/*
11716185db85Sdougm 	 * For future scalability, this should end up building a cache
11726185db85Sdougm 	 * since it will get called regularly by the mountd and info
11736185db85Sdougm 	 * services.
11746185db85Sdougm 	 */
11756185db85Sdougm 	if (group != NULL) {
11766185db85Sdougm 		for (node = ((xmlNodePtr)group)->children; node != NULL;
11776185db85Sdougm 		    node = node->next) {
11786185db85Sdougm 			if (xmlStrcmp(node->name, (xmlChar *)"share") == 0) {
11796185db85Sdougm 				if (sharepath == NULL) {
11806185db85Sdougm 					break;
11816185db85Sdougm 				} else {
11826185db85Sdougm 					/* is it the correct share? */
118357b448deSdougm 					path = xmlGetProp(node,
118457b448deSdougm 					    (xmlChar *)"path");
11856185db85Sdougm 					if (path != NULL &&
118657b448deSdougm 					    xmlStrcmp(path,
118757b448deSdougm 					    (xmlChar *)sharepath) == 0) {
11886185db85Sdougm 						xmlFree(path);
11896185db85Sdougm 						break;
11906185db85Sdougm 					}
11916185db85Sdougm 					xmlFree(path);
11926185db85Sdougm 				}
11936185db85Sdougm 			}
11946185db85Sdougm 		}
11956185db85Sdougm 	}
11966185db85Sdougm 	return ((sa_share_t)node);
11976185db85Sdougm }
11986185db85Sdougm 
11996185db85Sdougm /*
12006185db85Sdougm  * sa_get_next_share(share)
12016185db85Sdougm  *	Return the next share following the specified share
12026185db85Sdougm  *	from the internal list of shares. Returns NULL if there
12036185db85Sdougm  *	are no more shares.  The list is relative to the same
12046185db85Sdougm  *	group.
12056185db85Sdougm  */
12066185db85Sdougm sa_share_t
12076185db85Sdougm sa_get_next_share(sa_share_t share)
12086185db85Sdougm {
12096185db85Sdougm 	xmlNodePtr node = NULL;
12106185db85Sdougm 
12116185db85Sdougm 	if (share != NULL) {
12126185db85Sdougm 		for (node = ((xmlNodePtr)share)->next; node != NULL;
12136185db85Sdougm 		    node = node->next) {
12146185db85Sdougm 			if (xmlStrcmp(node->name, (xmlChar *)"share") == 0) {
12156185db85Sdougm 				break;
12166185db85Sdougm 			}
12176185db85Sdougm 		}
12186185db85Sdougm 	}
12196185db85Sdougm 	return ((sa_share_t)node);
12206185db85Sdougm }
12216185db85Sdougm 
12226185db85Sdougm /*
12236185db85Sdougm  * _sa_get_child_node(node, type)
12246185db85Sdougm  *
12256185db85Sdougm  * find the child node of the specified node that has "type". This is
12266185db85Sdougm  * used to implement several internal functions.
12276185db85Sdougm  */
12286185db85Sdougm 
12296185db85Sdougm static xmlNodePtr
12306185db85Sdougm _sa_get_child_node(xmlNodePtr node, xmlChar *type)
12316185db85Sdougm {
12326185db85Sdougm 	xmlNodePtr child;
12336185db85Sdougm 	for (child = node->xmlChildrenNode; child != NULL;
12346185db85Sdougm 	    child = child->next)
12356185db85Sdougm 		if (xmlStrcmp(child->name, type) == 0)
12366185db85Sdougm 			return (child);
12376185db85Sdougm 	return ((xmlNodePtr)NULL);
12386185db85Sdougm }
12396185db85Sdougm 
12406185db85Sdougm /*
12416185db85Sdougm  *  find_share(group, path)
12426185db85Sdougm  *
12436185db85Sdougm  * Search all the shares in the specified group for one that has the
12446185db85Sdougm  * specified path.
12456185db85Sdougm  */
12466185db85Sdougm 
12476185db85Sdougm static sa_share_t
12486185db85Sdougm find_share(sa_group_t group, char *sharepath)
12496185db85Sdougm {
12506185db85Sdougm 	sa_share_t share;
12516185db85Sdougm 	char *path;
12526185db85Sdougm 
12536185db85Sdougm 	for (share = sa_get_share(group, NULL); share != NULL;
12546185db85Sdougm 	    share = sa_get_next_share(share)) {
12556185db85Sdougm 		path = sa_get_share_attr(share, "path");
12566185db85Sdougm 		if (path != NULL && strcmp(path, sharepath) == 0) {
12576185db85Sdougm 			sa_free_attr_string(path);
12586185db85Sdougm 			break;
12596185db85Sdougm 		}
12606185db85Sdougm 		if (path != NULL)
12616185db85Sdougm 			sa_free_attr_string(path);
12626185db85Sdougm 	}
12636185db85Sdougm 	return (share);
12646185db85Sdougm }
12656185db85Sdougm 
12666185db85Sdougm /*
12676185db85Sdougm  * sa_get_sub_group(group)
12686185db85Sdougm  *
12696185db85Sdougm  * Get the first sub-group of group. The sa_get_next_group() function
12706185db85Sdougm  * can be used to get the rest. This is currently only used for ZFS
12716185db85Sdougm  * sub-groups but could be used to implement a more general mechanism.
12726185db85Sdougm  */
12736185db85Sdougm 
12746185db85Sdougm sa_group_t
12756185db85Sdougm sa_get_sub_group(sa_group_t group)
12766185db85Sdougm {
12776185db85Sdougm 	return ((sa_group_t)_sa_get_child_node((xmlNodePtr)group,
12786185db85Sdougm 	    (xmlChar *)"group"));
12796185db85Sdougm }
12806185db85Sdougm 
12816185db85Sdougm /*
12826185db85Sdougm  * sa_find_share(sharepath)
12836185db85Sdougm  *	Finds a share regardless of group.  In the future, this
12846185db85Sdougm  *	function should utilize a cache and hash table of some kind.
12856185db85Sdougm  *	The current assumption is that a path will only be shared
12866185db85Sdougm  *	once.  In the future, this may change as implementation of
12876185db85Sdougm  *	resource names comes into being.
12886185db85Sdougm  */
12896185db85Sdougm sa_share_t
1290549ec3ffSdougm sa_find_share(sa_handle_t handle, char *sharepath)
12916185db85Sdougm {
12926185db85Sdougm 	sa_group_t group;
12936185db85Sdougm 	sa_group_t zgroup;
12946185db85Sdougm 	sa_share_t share = NULL;
12956185db85Sdougm 	int done = 0;
12966185db85Sdougm 
1297549ec3ffSdougm 	for (group = sa_get_group(handle, NULL); group != NULL && !done;
12986185db85Sdougm 	    group = sa_get_next_group(group)) {
12996185db85Sdougm 		if (is_zfs_group(group)) {
130057b448deSdougm 			for (zgroup =
130157b448deSdougm 			    (sa_group_t)_sa_get_child_node((xmlNodePtr)group,
13026185db85Sdougm 			    (xmlChar *)"group");
130357b448deSdougm 			    zgroup != NULL;
130457b448deSdougm 			    zgroup = sa_get_next_group(zgroup)) {
13056185db85Sdougm 				share = find_share(zgroup, sharepath);
13066185db85Sdougm 				if (share != NULL)
13076185db85Sdougm 					break;
13086185db85Sdougm 			}
13096185db85Sdougm 		} else {
13106185db85Sdougm 			share = find_share(group, sharepath);
13116185db85Sdougm 		}
13126185db85Sdougm 		if (share != NULL)
13136185db85Sdougm 			break;
13146185db85Sdougm 	}
13156185db85Sdougm 	return (share);
13166185db85Sdougm }
13176185db85Sdougm 
13186185db85Sdougm /*
1319f345c0beSdougm  *  sa_check_path(group, path, strictness)
13206185db85Sdougm  *
1321da6c28aaSamw  * Check that path is a valid path relative to the group.  Currently,
13226185db85Sdougm  * we are ignoring the group and checking only the NFS rules. Later,
13236185db85Sdougm  * we may want to use the group to then check against the protocols
1324f345c0beSdougm  * enabled on the group. The strictness values mean:
1325f345c0beSdougm  * SA_CHECK_NORMAL == only check newpath against shares that are active
1326f345c0beSdougm  * SA_CHECK_STRICT == check newpath against both active shares and those
1327f345c0beSdougm  *		      stored in the repository
13286185db85Sdougm  */
13296185db85Sdougm 
13306185db85Sdougm int
1331f345c0beSdougm sa_check_path(sa_group_t group, char *path, int strictness)
13326185db85Sdougm {
1333549ec3ffSdougm 	sa_handle_t handle;
1334549ec3ffSdougm 
1335549ec3ffSdougm 	handle = sa_find_group_handle(group);
1336549ec3ffSdougm 	return (validpath(handle, path, strictness));
13376185db85Sdougm }
13386185db85Sdougm 
13396185db85Sdougm /*
1340da6c28aaSamw  * mark_excluded_protos(group, share, flags)
13416185db85Sdougm  *
1342da6c28aaSamw  * Walk through all the protocols enabled for the group and check to
1343da6c28aaSamw  * see if the share has any of them should be in the exclude list
1344da6c28aaSamw  * based on the featureset of the protocol. If there are any, add the
1345da6c28aaSamw  * "exclude" property to the share.
1346da6c28aaSamw  */
1347da6c28aaSamw static void
1348da6c28aaSamw mark_excluded_protos(sa_group_t group, xmlNodePtr share, uint64_t flags)
1349da6c28aaSamw {
1350da6c28aaSamw 	sa_optionset_t optionset;
1351da6c28aaSamw 	char exclude_list[SA_STRSIZE];
1352da6c28aaSamw 	char *sep = "";
1353da6c28aaSamw 
1354da6c28aaSamw 	exclude_list[0] = '\0';
1355da6c28aaSamw 	for (optionset = sa_get_optionset(group, NULL);
1356da6c28aaSamw 	    optionset != NULL;
1357da6c28aaSamw 	    optionset = sa_get_next_optionset(optionset)) {
1358da6c28aaSamw 		char *value;
1359da6c28aaSamw 		uint64_t features;
1360da6c28aaSamw 		value = sa_get_optionset_attr(optionset, "type");
1361da6c28aaSamw 		if (value == NULL)
1362da6c28aaSamw 			continue;
1363da6c28aaSamw 		features = sa_proto_get_featureset(value);
1364da6c28aaSamw 		sa_free_attr_string(value);
1365da6c28aaSamw 		if (!(features & flags)) {
1366da6c28aaSamw 			(void) strlcat(exclude_list, sep,
1367da6c28aaSamw 			    sizeof (exclude_list));
1368da6c28aaSamw 			(void) strlcat(exclude_list, value,
1369da6c28aaSamw 			    sizeof (exclude_list));
1370da6c28aaSamw 			sep = ",";
1371da6c28aaSamw 		}
1372da6c28aaSamw 	}
1373da6c28aaSamw 	if (exclude_list[0] != '\0')
1374da6c28aaSamw 		xmlSetProp(share, (xmlChar *)"exclude",
1375da6c28aaSamw 		    (xmlChar *)exclude_list);
1376da6c28aaSamw }
1377da6c28aaSamw 
1378da6c28aaSamw /*
1379da6c28aaSamw  * get_all_features(group)
1380da6c28aaSamw  *
1381da6c28aaSamw  * Walk through all the protocols on the group and collect all
1382da6c28aaSamw  * possible enabled features. This is the OR of all the featuresets.
1383da6c28aaSamw  */
1384da6c28aaSamw static uint64_t
1385da6c28aaSamw get_all_features(sa_group_t group)
1386da6c28aaSamw {
1387da6c28aaSamw 	sa_optionset_t optionset;
1388da6c28aaSamw 	uint64_t features = 0;
1389da6c28aaSamw 
1390da6c28aaSamw 	for (optionset = sa_get_optionset(group, NULL);
1391da6c28aaSamw 	    optionset != NULL;
1392da6c28aaSamw 	    optionset = sa_get_next_optionset(optionset)) {
1393da6c28aaSamw 		char *value;
1394da6c28aaSamw 		value = sa_get_optionset_attr(optionset, "type");
1395da6c28aaSamw 		if (value == NULL)
1396da6c28aaSamw 			continue;
1397da6c28aaSamw 		features |= sa_proto_get_featureset(value);
1398da6c28aaSamw 		sa_free_attr_string(value);
1399da6c28aaSamw 	}
1400da6c28aaSamw 	return (features);
1401da6c28aaSamw }
1402da6c28aaSamw 
1403da6c28aaSamw 
1404da6c28aaSamw /*
1405da6c28aaSamw  * _sa_add_share(group, sharepath, persist, *error, flags)
1406da6c28aaSamw  *
1407da6c28aaSamw  * Common code for all types of add_share. sa_add_share() is the
14086185db85Sdougm  * public API, we also need to be able to do this when parsing legacy
14096185db85Sdougm  * files and construction of the internal configuration while
1410da6c28aaSamw  * extracting config info from SMF. "flags" indicates if some
1411da6c28aaSamw  * protocols need relaxed rules while other don't. These values are
1412da6c28aaSamw  * the featureset values defined in libshare.h.
14136185db85Sdougm  */
14146185db85Sdougm 
14156185db85Sdougm sa_share_t
1416da6c28aaSamw _sa_add_share(sa_group_t group, char *sharepath, int persist, int *error,
1417da6c28aaSamw     uint64_t flags)
14186185db85Sdougm {
14196185db85Sdougm 	xmlNodePtr node = NULL;
14206185db85Sdougm 	int err;
14216185db85Sdougm 
14226185db85Sdougm 	err  = SA_OK; /* assume success */
14236185db85Sdougm 
142457b448deSdougm 	node = xmlNewChild((xmlNodePtr)group, NULL, (xmlChar *)"share", NULL);
1425da6c28aaSamw 	if (node == NULL) {
1426da6c28aaSamw 		if (error != NULL)
1427da6c28aaSamw 			*error = SA_NO_MEMORY;
1428da6c28aaSamw 		return (node);
1429da6c28aaSamw 	}
1430da6c28aaSamw 
14316185db85Sdougm 	xmlSetProp(node, (xmlChar *)"path", (xmlChar *)sharepath);
143257b448deSdougm 	xmlSetProp(node, (xmlChar *)"type",
143357b448deSdougm 	    persist ? (xmlChar *)"persist" : (xmlChar *)"transient");
1434da6c28aaSamw 	if (flags != 0)
1435da6c28aaSamw 		mark_excluded_protos(group, node, flags);
14366185db85Sdougm 	if (persist != SA_SHARE_TRANSIENT) {
14376185db85Sdougm 		/*
14386185db85Sdougm 		 * persistent shares come in two flavors: SMF and
14396185db85Sdougm 		 * ZFS. Sort this one out based on target group and
1440da6c28aaSamw 		 * path type. Both NFS and SMB are supported. First,
1441da6c28aaSamw 		 * check to see if the protocol is enabled on the
1442da6c28aaSamw 		 * subgroup and then setup the share appropriately.
14436185db85Sdougm 		 */
144457b448deSdougm 		if (sa_group_is_zfs(group) &&
144557b448deSdougm 		    sa_path_is_zfs(sharepath)) {
1446da6c28aaSamw 			if (sa_get_optionset(group, "nfs") != NULL)
14476185db85Sdougm 				err = sa_zfs_set_sharenfs(group, sharepath, 1);
1448da6c28aaSamw 			else if (sa_get_optionset(group, "smb") != NULL)
1449da6c28aaSamw 				err = sa_zfs_set_sharesmb(group, sharepath, 1);
14506185db85Sdougm 		} else {
1451549ec3ffSdougm 			sa_handle_impl_t impl_handle;
145257b448deSdougm 			impl_handle =
1453da6c28aaSamw 			    (sa_handle_impl_t)sa_find_group_handle(group);
145457b448deSdougm 			if (impl_handle != NULL) {
1455da6c28aaSamw 				err = sa_commit_share(impl_handle->scfhandle,
1456da6c28aaSamw 				    group, (sa_share_t)node);
145757b448deSdougm 			} else {
1458549ec3ffSdougm 				err = SA_SYSTEM_ERR;
14596185db85Sdougm 			}
14606185db85Sdougm 		}
146157b448deSdougm 	}
1462da6c28aaSamw 	if (err == SA_NO_PERMISSION && persist & SA_SHARE_PARSER)
14636185db85Sdougm 		/* called by the dfstab parser so could be a show */
14646185db85Sdougm 		err = SA_OK;
1465da6c28aaSamw 
14666185db85Sdougm 	if (err != SA_OK) {
14676185db85Sdougm 		/*
14686185db85Sdougm 		 * we couldn't commit to the repository so undo
14696185db85Sdougm 		 * our internal state to reflect reality.
14706185db85Sdougm 		 */
14716185db85Sdougm 		xmlUnlinkNode(node);
14726185db85Sdougm 		xmlFreeNode(node);
14736185db85Sdougm 		node = NULL;
14746185db85Sdougm 	}
1475da6c28aaSamw 
14766185db85Sdougm 	if (error != NULL)
14776185db85Sdougm 		*error = err;
1478da6c28aaSamw 
14796185db85Sdougm 	return (node);
14806185db85Sdougm }
14816185db85Sdougm 
14826185db85Sdougm /*
14836185db85Sdougm  * sa_add_share(group, sharepath, persist, *error)
14846185db85Sdougm  *
14856185db85Sdougm  *	Add a new share object to the specified group.  The share will
14866185db85Sdougm  *	have the specified sharepath and will only be constructed if
14876185db85Sdougm  *	it is a valid path to be shared.  NULL is returned on error
14886185db85Sdougm  *	and a detailed error value will be returned via the error
14896185db85Sdougm  *	pointer.
14906185db85Sdougm  */
14916185db85Sdougm sa_share_t
14926185db85Sdougm sa_add_share(sa_group_t group, char *sharepath, int persist, int *error)
14936185db85Sdougm {
14946185db85Sdougm 	xmlNodePtr node = NULL;
1495f345c0beSdougm 	int strictness = SA_CHECK_NORMAL;
1496549ec3ffSdougm 	sa_handle_t handle;
1497da6c28aaSamw 	uint64_t special = 0;
1498da6c28aaSamw 	uint64_t features;
1499f345c0beSdougm 
1500f345c0beSdougm 	/*
1501f345c0beSdougm 	 * If the share is to be permanent, use strict checking so a
1502f345c0beSdougm 	 * bad config doesn't get created. Transient shares only need
1503f345c0beSdougm 	 * to check against the currently active
1504f345c0beSdougm 	 * shares. SA_SHARE_PARSER is a modifier used internally to
1505f345c0beSdougm 	 * indicate that we are being called by the dfstab parser and
1506f345c0beSdougm 	 * that we need strict checking in all cases. Normally persist
1507f345c0beSdougm 	 * is in integer value but SA_SHARE_PARSER may be or'd into
1508f345c0beSdougm 	 * it as an override.
1509f345c0beSdougm 	 */
1510f345c0beSdougm 	if (persist & SA_SHARE_PARSER || persist == SA_SHARE_PERMANENT)
1511f345c0beSdougm 		strictness = SA_CHECK_STRICT;
15126185db85Sdougm 
1513549ec3ffSdougm 	handle = sa_find_group_handle(group);
1514549ec3ffSdougm 
1515da6c28aaSamw 	/*
1516da6c28aaSamw 	 * need to determine if the share is valid. The rules are:
1517da6c28aaSamw 	 *	- The path must not already exist
1518da6c28aaSamw 	 *	- The path must not be a subdir or parent dir of an
1519da6c28aaSamw 	 *	  existing path unless at least one protocol allows it.
1520da6c28aaSamw 	 * The sub/parent check is done in sa_check_path().
1521da6c28aaSamw 	 */
1522da6c28aaSamw 
1523da6c28aaSamw 	if (sa_find_share(handle, sharepath) == NULL) {
1524da6c28aaSamw 		*error = sa_check_path(group, sharepath, strictness);
1525da6c28aaSamw 		features = get_all_features(group);
1526da6c28aaSamw 		switch (*error) {
1527da6c28aaSamw 		case SA_PATH_IS_SUBDIR:
1528da6c28aaSamw 			if (features & SA_FEATURE_ALLOWSUBDIRS)
1529da6c28aaSamw 				special |= SA_FEATURE_ALLOWSUBDIRS;
1530da6c28aaSamw 			break;
1531da6c28aaSamw 		case SA_PATH_IS_PARENTDIR:
1532da6c28aaSamw 			if (features & SA_FEATURE_ALLOWPARDIRS)
1533da6c28aaSamw 				special |= SA_FEATURE_ALLOWPARDIRS;
1534da6c28aaSamw 			break;
15356185db85Sdougm 		}
1536da6c28aaSamw 		if (*error == SA_OK || special != SA_FEATURE_NONE)
1537da6c28aaSamw 			node = _sa_add_share(group, sharepath, persist,
1538da6c28aaSamw 			    error, special);
1539da6c28aaSamw 	} else {
15406185db85Sdougm 		*error = SA_DUPLICATE_NAME;
1541da6c28aaSamw 	}
15426185db85Sdougm 
15436185db85Sdougm 	return ((sa_share_t)node);
15446185db85Sdougm }
15456185db85Sdougm 
15466185db85Sdougm /*
15476185db85Sdougm  * sa_enable_share(share, protocol)
15486185db85Sdougm  *	Enable the specified share to the specified protocol.
15496185db85Sdougm  *	If protocol is NULL, then all protocols.
15506185db85Sdougm  */
15516185db85Sdougm int
15526185db85Sdougm sa_enable_share(sa_share_t share, char *protocol)
15536185db85Sdougm {
15546185db85Sdougm 	char *sharepath;
15556185db85Sdougm 	struct stat st;
1556da6c28aaSamw 	int err = SA_OK;
1557da6c28aaSamw 	int ret;
15586185db85Sdougm 
15596185db85Sdougm 	sharepath = sa_get_share_attr(share, "path");
1560da6c28aaSamw 	if (sharepath == NULL)
1561da6c28aaSamw 		return (SA_NO_MEMORY);
15626185db85Sdougm 	if (stat(sharepath, &st) < 0) {
15636185db85Sdougm 		err = SA_NO_SUCH_PATH;
15646185db85Sdougm 	} else {
15656185db85Sdougm 		/* tell the server about the share */
15666185db85Sdougm 		if (protocol != NULL) {
1567da6c28aaSamw 			if (excluded_protocol(share, protocol))
1568da6c28aaSamw 				goto done;
1569da6c28aaSamw 
15706185db85Sdougm 			/* lookup protocol specific handler */
15716185db85Sdougm 			err = sa_proto_share(protocol, share);
15726185db85Sdougm 			if (err == SA_OK)
1573da6c28aaSamw 				(void) sa_set_share_attr(share,
1574da6c28aaSamw 				    "shared", "true");
15756185db85Sdougm 		} else {
1576da6c28aaSamw 			/* Tell all protocols about the share */
1577da6c28aaSamw 			sa_group_t group;
1578da6c28aaSamw 			sa_optionset_t optionset;
1579da6c28aaSamw 
1580da6c28aaSamw 			group = sa_get_parent_group(share);
1581da6c28aaSamw 
1582da6c28aaSamw 			for (optionset = sa_get_optionset(group, NULL);
1583da6c28aaSamw 			    optionset != NULL;
1584da6c28aaSamw 			    optionset = sa_get_next_optionset(optionset)) {
1585da6c28aaSamw 				char *proto;
1586da6c28aaSamw 				proto = sa_get_optionset_attr(optionset,
1587da6c28aaSamw 				    "type");
1588da6c28aaSamw 				if (proto != NULL) {
1589da6c28aaSamw 					if (!excluded_protocol(share, proto)) {
1590da6c28aaSamw 						ret = sa_proto_share(proto,
1591da6c28aaSamw 						    share);
1592da6c28aaSamw 						if (ret != SA_OK)
1593da6c28aaSamw 							err = ret;
1594da6c28aaSamw 					}
1595da6c28aaSamw 					sa_free_attr_string(proto);
1596da6c28aaSamw 				}
1597da6c28aaSamw 			}
15986185db85Sdougm 			(void) sa_set_share_attr(share, "shared", "true");
15996185db85Sdougm 		}
16006185db85Sdougm 	}
1601da6c28aaSamw done:
16026185db85Sdougm 	if (sharepath != NULL)
16036185db85Sdougm 		sa_free_attr_string(sharepath);
16046185db85Sdougm 	return (err);
16056185db85Sdougm }
16066185db85Sdougm 
16076185db85Sdougm /*
16086185db85Sdougm  * sa_disable_share(share, protocol)
1609da6c28aaSamw  *	Disable the specified share to the specified protocol.  If
1610da6c28aaSamw  *	protocol is NULL, then all protocols that are enabled for the
1611da6c28aaSamw  *	share should be disabled.
16126185db85Sdougm  */
16136185db85Sdougm int
16146185db85Sdougm sa_disable_share(sa_share_t share, char *protocol)
16156185db85Sdougm {
16166185db85Sdougm 	char *path;
1617da6c28aaSamw 	int err = SA_OK;
16186185db85Sdougm 	int ret = SA_OK;
16196185db85Sdougm 
16206185db85Sdougm 	path = sa_get_share_attr(share, "path");
16216185db85Sdougm 
16226185db85Sdougm 	if (protocol != NULL) {
1623ecd6cf80Smarks 		ret = sa_proto_unshare(share, protocol, path);
16246185db85Sdougm 	} else {
16256185db85Sdougm 		/* need to do all protocols */
1626da6c28aaSamw 		sa_group_t group;
1627da6c28aaSamw 		sa_optionset_t optionset;
1628da6c28aaSamw 
1629da6c28aaSamw 		group = sa_get_parent_group(share);
1630da6c28aaSamw 
1631da6c28aaSamw 		/* Tell all protocols about the share */
1632da6c28aaSamw 		for (optionset = sa_get_optionset(group, NULL);
1633da6c28aaSamw 		    optionset != NULL;
1634da6c28aaSamw 		    optionset = sa_get_next_optionset(optionset)) {
1635da6c28aaSamw 			char *proto;
1636da6c28aaSamw 
1637da6c28aaSamw 			proto = sa_get_optionset_attr(optionset, "type");
1638da6c28aaSamw 			if (proto != NULL) {
1639da6c28aaSamw 				err = sa_proto_unshare(share, proto, path);
1640da6c28aaSamw 				if (err != SA_OK)
1641da6c28aaSamw 					ret = err;
1642da6c28aaSamw 				sa_free_attr_string(proto);
1643da6c28aaSamw 			}
1644da6c28aaSamw 		}
16456185db85Sdougm 	}
16466185db85Sdougm 	if (ret == SA_OK)
16476185db85Sdougm 		(void) sa_set_share_attr(share, "shared", NULL);
16486185db85Sdougm 	if (path != NULL)
16496185db85Sdougm 		sa_free_attr_string(path);
16506185db85Sdougm 	return (ret);
16516185db85Sdougm }
16526185db85Sdougm 
16536185db85Sdougm /*
16546185db85Sdougm  * sa_remove_share(share)
16556185db85Sdougm  *
16566185db85Sdougm  * remove the specified share from its containing group.
16576185db85Sdougm  * Remove from the SMF or ZFS configuration space.
16586185db85Sdougm  */
16596185db85Sdougm 
16606185db85Sdougm int
16616185db85Sdougm sa_remove_share(sa_share_t share)
16626185db85Sdougm {
16636185db85Sdougm 	sa_group_t group;
16646185db85Sdougm 	int ret = SA_OK;
16656185db85Sdougm 	char *type;
16666185db85Sdougm 	int transient = 0;
16676185db85Sdougm 	char *groupname;
16686185db85Sdougm 	char *zfs;
16696185db85Sdougm 
16706185db85Sdougm 	type = sa_get_share_attr(share, "type");
16716185db85Sdougm 	group = sa_get_parent_group(share);
16726185db85Sdougm 	zfs = sa_get_group_attr(group, "zfs");
16736185db85Sdougm 	groupname = sa_get_group_attr(group, "name");
16746185db85Sdougm 	if (type != NULL && strcmp(type, "persist") != 0)
16756185db85Sdougm 		transient = 1;
16766185db85Sdougm 	if (type != NULL)
16776185db85Sdougm 		sa_free_attr_string(type);
16786185db85Sdougm 
16796185db85Sdougm 	/* remove the node from its group then free the memory */
16806185db85Sdougm 
16816185db85Sdougm 	/*
16826185db85Sdougm 	 * need to test if "busy"
16836185db85Sdougm 	 */
16846185db85Sdougm 	/* only do SMF action if permanent */
16856185db85Sdougm 	if (!transient || zfs != NULL) {
16866185db85Sdougm 		/* remove from legacy dfstab as well as possible SMF */
1687da6c28aaSamw 		ret = sa_delete_legacy(share, NULL);
16886185db85Sdougm 		if (ret == SA_OK) {
16896185db85Sdougm 			if (!sa_group_is_zfs(group)) {
1690549ec3ffSdougm 				sa_handle_impl_t impl_handle;
169157b448deSdougm 				impl_handle = (sa_handle_impl_t)
169257b448deSdougm 				    sa_find_group_handle(group);
169357b448deSdougm 				if (impl_handle != NULL) {
169457b448deSdougm 					ret = sa_delete_share(
169557b448deSdougm 					    impl_handle->scfhandle, group,
169657b448deSdougm 					    share);
16976185db85Sdougm 				} else {
169857b448deSdougm 					ret = SA_SYSTEM_ERR;
169957b448deSdougm 				}
170057b448deSdougm 			} else {
170157b448deSdougm 				char *sharepath = sa_get_share_attr(share,
170257b448deSdougm 				    "path");
17036185db85Sdougm 				if (sharepath != NULL) {
170457b448deSdougm 					ret = sa_zfs_set_sharenfs(group,
170557b448deSdougm 					    sharepath, 0);
17066185db85Sdougm 					sa_free_attr_string(sharepath);
17076185db85Sdougm 				}
17086185db85Sdougm 			}
17096185db85Sdougm 		}
17106185db85Sdougm 	}
17116185db85Sdougm 	if (groupname != NULL)
17126185db85Sdougm 		sa_free_attr_string(groupname);
17136185db85Sdougm 	if (zfs != NULL)
17146185db85Sdougm 		sa_free_attr_string(zfs);
17156185db85Sdougm 
17166185db85Sdougm 	xmlUnlinkNode((xmlNodePtr)share);
17176185db85Sdougm 	xmlFreeNode((xmlNodePtr)share);
17186185db85Sdougm 	return (ret);
17196185db85Sdougm }
17206185db85Sdougm 
17216185db85Sdougm /*
17226185db85Sdougm  * sa_move_share(group, share)
17236185db85Sdougm  *
17246185db85Sdougm  * move the specified share to the specified group.  Update SMF
17256185db85Sdougm  * appropriately.
17266185db85Sdougm  */
17276185db85Sdougm 
17286185db85Sdougm int
17296185db85Sdougm sa_move_share(sa_group_t group, sa_share_t share)
17306185db85Sdougm {
17316185db85Sdougm 	sa_group_t oldgroup;
17326185db85Sdougm 	int ret = SA_OK;
17336185db85Sdougm 
17346185db85Sdougm 	/* remove the node from its group then free the memory */
17356185db85Sdougm 
17366185db85Sdougm 	oldgroup = sa_get_parent_group(share);
17376185db85Sdougm 	if (oldgroup != group) {
1738549ec3ffSdougm 		sa_handle_impl_t impl_handle;
17396185db85Sdougm 		xmlUnlinkNode((xmlNodePtr)share);
174057b448deSdougm 		/*
174157b448deSdougm 		 * now that the share isn't in its old group, add to
174257b448deSdougm 		 * the new one
174357b448deSdougm 		 */
17446185db85Sdougm 		xmlAddChild((xmlNodePtr)group, (xmlNodePtr)share);
17456185db85Sdougm 		/* need to deal with SMF */
1746549ec3ffSdougm 		impl_handle = (sa_handle_impl_t)sa_find_group_handle(group);
1747549ec3ffSdougm 		if (impl_handle != NULL) {
17486185db85Sdougm 			/*
17496185db85Sdougm 			 * need to remove from old group first and then add to
17506185db85Sdougm 			 * new group. Ideally, we would do the other order but
17516185db85Sdougm 			 * need to avoid having the share in two groups at the
17526185db85Sdougm 			 * same time.
17536185db85Sdougm 			 */
175457b448deSdougm 			ret = sa_delete_share(impl_handle->scfhandle, oldgroup,
175557b448deSdougm 			    share);
1756549ec3ffSdougm 			if (ret == SA_OK)
175757b448deSdougm 				ret = sa_commit_share(impl_handle->scfhandle,
175857b448deSdougm 				    group, share);
1759549ec3ffSdougm 		} else {
1760549ec3ffSdougm 			ret = SA_SYSTEM_ERR;
17616185db85Sdougm 		}
17626185db85Sdougm 	}
17636185db85Sdougm 	return (ret);
17646185db85Sdougm }
17656185db85Sdougm 
17666185db85Sdougm /*
17676185db85Sdougm  * sa_get_parent_group(share)
17686185db85Sdougm  *
1769da6c28aaSamw  * Return the containing group for the share. If a group was actually
17706185db85Sdougm  * passed in, we don't want a parent so return NULL.
17716185db85Sdougm  */
17726185db85Sdougm 
17736185db85Sdougm sa_group_t
17746185db85Sdougm sa_get_parent_group(sa_share_t share)
17756185db85Sdougm {
17766185db85Sdougm 	xmlNodePtr node = NULL;
17776185db85Sdougm 	if (share != NULL) {
17786185db85Sdougm 		node = ((xmlNodePtr)share)->parent;
17796185db85Sdougm 		/*
17806185db85Sdougm 		 * make sure parent is a group and not sharecfg since
17816185db85Sdougm 		 * we may be cheating and passing in a group.
17826185db85Sdougm 		 * Eventually, groups of groups might come into being.
17836185db85Sdougm 		 */
17846185db85Sdougm 		if (node == NULL ||
17856185db85Sdougm 		    xmlStrcmp(node->name, (xmlChar *)"sharecfg") == 0)
17866185db85Sdougm 			node = NULL;
17876185db85Sdougm 	}
17886185db85Sdougm 	return ((sa_group_t)node);
17896185db85Sdougm }
17906185db85Sdougm 
17916185db85Sdougm /*
1792549ec3ffSdougm  * _sa_create_group(impl_handle, groupname)
17936185db85Sdougm  *
17946185db85Sdougm  * Create a group in the document. The caller will need to deal with
17956185db85Sdougm  * configuration store and activation.
17966185db85Sdougm  */
17976185db85Sdougm 
17986185db85Sdougm sa_group_t
1799549ec3ffSdougm _sa_create_group(sa_handle_impl_t impl_handle, char *groupname)
18006185db85Sdougm {
18016185db85Sdougm 	xmlNodePtr node = NULL;
18026185db85Sdougm 
18036185db85Sdougm 	if (sa_valid_group_name(groupname)) {
180457b448deSdougm 		node = xmlNewChild(impl_handle->tree, NULL, (xmlChar *)"group",
180557b448deSdougm 		    NULL);
18066185db85Sdougm 		if (node != NULL) {
180757b448deSdougm 			xmlSetProp(node, (xmlChar *)"name",
180857b448deSdougm 			    (xmlChar *)groupname);
180957b448deSdougm 			xmlSetProp(node, (xmlChar *)"state",
181057b448deSdougm 			    (xmlChar *)"enabled");
18116185db85Sdougm 		}
18126185db85Sdougm 	}
18136185db85Sdougm 	return ((sa_group_t)node);
18146185db85Sdougm }
18156185db85Sdougm 
18166185db85Sdougm /*
18176185db85Sdougm  * _sa_create_zfs_group(group, groupname)
18186185db85Sdougm  *
18196185db85Sdougm  * Create a ZFS subgroup under the specified group. This may
18206185db85Sdougm  * eventually form the basis of general sub-groups, but is currently
18216185db85Sdougm  * restricted to ZFS.
18226185db85Sdougm  */
18236185db85Sdougm sa_group_t
18246185db85Sdougm _sa_create_zfs_group(sa_group_t group, char *groupname)
18256185db85Sdougm {
18266185db85Sdougm 	xmlNodePtr node = NULL;
18276185db85Sdougm 
182857b448deSdougm 	node = xmlNewChild((xmlNodePtr)group, NULL, (xmlChar *)"group", NULL);
18296185db85Sdougm 	if (node != NULL) {
18306185db85Sdougm 		xmlSetProp(node, (xmlChar *)"name", (xmlChar *)groupname);
18316185db85Sdougm 		xmlSetProp(node, (xmlChar *)"state", (xmlChar *)"enabled");
18326185db85Sdougm 	}
18336185db85Sdougm 
18346185db85Sdougm 	return ((sa_group_t)node);
18356185db85Sdougm }
18366185db85Sdougm 
18376185db85Sdougm /*
18386185db85Sdougm  * sa_create_group(groupname, *error)
18396185db85Sdougm  *
18406185db85Sdougm  * Create a new group with groupname.  Need to validate that it is a
18416185db85Sdougm  * legal name for SMF and the construct the SMF service instance of
18426185db85Sdougm  * svc:/network/shares/group to implement the group. All necessary
18436185db85Sdougm  * operational properties must be added to the group at this point
18446185db85Sdougm  * (via the SMF transaction model).
18456185db85Sdougm  */
18466185db85Sdougm sa_group_t
1847549ec3ffSdougm sa_create_group(sa_handle_t handle, char *groupname, int *error)
18486185db85Sdougm {
18496185db85Sdougm 	xmlNodePtr node = NULL;
18506185db85Sdougm 	sa_group_t group;
18516185db85Sdougm 	int ret;
185257b448deSdougm 	char rbacstr[SA_STRSIZE];
1853549ec3ffSdougm 	sa_handle_impl_t impl_handle = (sa_handle_impl_t)handle;
18546185db85Sdougm 
18556185db85Sdougm 	ret = SA_OK;
18566185db85Sdougm 
1857549ec3ffSdougm 	if (impl_handle == NULL || impl_handle->scfhandle == NULL) {
18586185db85Sdougm 		ret = SA_SYSTEM_ERR;
18596185db85Sdougm 		goto err;
18606185db85Sdougm 	}
18616185db85Sdougm 
1862549ec3ffSdougm 	group = sa_get_group(handle, groupname);
18636185db85Sdougm 	if (group != NULL) {
18646185db85Sdougm 		ret = SA_DUPLICATE_NAME;
18656185db85Sdougm 	} else {
18666185db85Sdougm 		if (sa_valid_group_name(groupname)) {
1867549ec3ffSdougm 			node = xmlNewChild(impl_handle->tree, NULL,
18686185db85Sdougm 			    (xmlChar *)"group", NULL);
18696185db85Sdougm 			if (node != NULL) {
187057b448deSdougm 				xmlSetProp(node, (xmlChar *)"name",
187157b448deSdougm 				    (xmlChar *)groupname);
18726185db85Sdougm 				/* default to the group being enabled */
187357b448deSdougm 				xmlSetProp(node, (xmlChar *)"state",
187457b448deSdougm 				    (xmlChar *)"enabled");
187557b448deSdougm 				ret = sa_create_instance(impl_handle->scfhandle,
187657b448deSdougm 				    groupname);
18776185db85Sdougm 				if (ret == SA_OK) {
187857b448deSdougm 					ret = sa_start_transaction(
187957b448deSdougm 					    impl_handle->scfhandle,
1880549ec3ffSdougm 					    "operation");
18816185db85Sdougm 				}
18826185db85Sdougm 				if (ret == SA_OK) {
188357b448deSdougm 					ret = sa_set_property(
188457b448deSdougm 					    impl_handle->scfhandle,
1885549ec3ffSdougm 					    "state", "enabled");
18866185db85Sdougm 					if (ret == SA_OK) {
188757b448deSdougm 						ret = sa_end_transaction(
188857b448deSdougm 						    impl_handle->scfhandle);
18896185db85Sdougm 					} else {
189057b448deSdougm 						sa_abort_transaction(
189157b448deSdougm 						    impl_handle->scfhandle);
18926185db85Sdougm 					}
18936185db85Sdougm 				}
18946185db85Sdougm 				if (ret == SA_OK) {
18956185db85Sdougm 					/* initialize the RBAC strings */
189657b448deSdougm 					ret = sa_start_transaction(
189757b448deSdougm 					    impl_handle->scfhandle,
1898549ec3ffSdougm 					    "general");
18996185db85Sdougm 					if (ret == SA_OK) {
190057b448deSdougm 						(void) snprintf(rbacstr,
190157b448deSdougm 						    sizeof (rbacstr), "%s.%s",
19026185db85Sdougm 						    SA_RBAC_MANAGE, groupname);
190357b448deSdougm 						ret = sa_set_property(
190457b448deSdougm 						    impl_handle->scfhandle,
19056185db85Sdougm 						    "action_authorization",
19066185db85Sdougm 						    rbacstr);
19076185db85Sdougm 					}
19086185db85Sdougm 					if (ret == SA_OK) {
190957b448deSdougm 						(void) snprintf(rbacstr,
191057b448deSdougm 						    sizeof (rbacstr), "%s.%s",
19116185db85Sdougm 						    SA_RBAC_VALUE, groupname);
191257b448deSdougm 						ret = sa_set_property(
191357b448deSdougm 						    impl_handle->scfhandle,
19146185db85Sdougm 						    "value_authorization",
19156185db85Sdougm 						    rbacstr);
19166185db85Sdougm 					}
19176185db85Sdougm 					if (ret == SA_OK) {
191857b448deSdougm 						ret = sa_end_transaction(
191957b448deSdougm 						    impl_handle->scfhandle);
19206185db85Sdougm 					} else {
192157b448deSdougm 						sa_abort_transaction(
192257b448deSdougm 						    impl_handle->scfhandle);
19236185db85Sdougm 					}
19246185db85Sdougm 				}
19256185db85Sdougm 				if (ret != SA_OK) {
19266185db85Sdougm 					/*
192757b448deSdougm 					 * Couldn't commit the group
192857b448deSdougm 					 * so we need to undo
192957b448deSdougm 					 * internally.
19306185db85Sdougm 					 */
19316185db85Sdougm 					xmlUnlinkNode(node);
19326185db85Sdougm 					xmlFreeNode(node);
19336185db85Sdougm 					node = NULL;
19346185db85Sdougm 				}
19356185db85Sdougm 			} else {
19366185db85Sdougm 				ret = SA_NO_MEMORY;
19376185db85Sdougm 			}
19386185db85Sdougm 		} else {
19396185db85Sdougm 			ret = SA_INVALID_NAME;
19406185db85Sdougm 		}
19416185db85Sdougm 	}
19426185db85Sdougm err:
19436185db85Sdougm 	if (error != NULL)
19446185db85Sdougm 		*error = ret;
19456185db85Sdougm 	return ((sa_group_t)node);
19466185db85Sdougm }
19476185db85Sdougm 
19486185db85Sdougm /*
19496185db85Sdougm  * sa_remove_group(group)
19506185db85Sdougm  *
19516185db85Sdougm  * Remove the specified group. This deletes from the SMF repository.
19526185db85Sdougm  * All property groups and properties are removed.
19536185db85Sdougm  */
19546185db85Sdougm 
19556185db85Sdougm int
19566185db85Sdougm sa_remove_group(sa_group_t group)
19576185db85Sdougm {
19586185db85Sdougm 	char *name;
19596185db85Sdougm 	int ret = SA_OK;
1960549ec3ffSdougm 	sa_handle_impl_t impl_handle;
19616185db85Sdougm 
1962549ec3ffSdougm 	impl_handle = (sa_handle_impl_t)sa_find_group_handle(group);
1963549ec3ffSdougm 	if (impl_handle != NULL) {
19646185db85Sdougm 		name = sa_get_group_attr(group, "name");
19656185db85Sdougm 		if (name != NULL) {
1966549ec3ffSdougm 			ret = sa_delete_instance(impl_handle->scfhandle, name);
19676185db85Sdougm 			sa_free_attr_string(name);
19686185db85Sdougm 		}
19696185db85Sdougm 		xmlUnlinkNode((xmlNodePtr)group); /* make sure unlinked */
19706185db85Sdougm 		xmlFreeNode((xmlNodePtr)group);   /* now it is gone */
1971549ec3ffSdougm 	} else {
1972549ec3ffSdougm 		ret = SA_SYSTEM_ERR;
1973549ec3ffSdougm 	}
19746185db85Sdougm 	return (ret);
19756185db85Sdougm }
19766185db85Sdougm 
19776185db85Sdougm /*
19786185db85Sdougm  * sa_update_config()
19796185db85Sdougm  *
19806185db85Sdougm  * Used to update legacy files that need to be updated in bulk
19816185db85Sdougm  * Currently, this is a placeholder and will go away in a future
19826185db85Sdougm  * release.
19836185db85Sdougm  */
19846185db85Sdougm 
19856185db85Sdougm int
1986549ec3ffSdougm sa_update_config(sa_handle_t handle)
19876185db85Sdougm {
19886185db85Sdougm 	/*
19896185db85Sdougm 	 * do legacy files first so we can tell when they change.
19906185db85Sdougm 	 * This will go away when we start updating individual records
19916185db85Sdougm 	 * rather than the whole file.
19926185db85Sdougm 	 */
1993549ec3ffSdougm 	update_legacy_config(handle);
19946185db85Sdougm 	return (SA_OK);
19956185db85Sdougm }
19966185db85Sdougm 
19976185db85Sdougm /*
19986185db85Sdougm  * get_node_attr(node, tag)
19996185db85Sdougm  *
2000da6c28aaSamw  * Get the specified tag(attribute) if it exists on the node.  This is
20016185db85Sdougm  * used internally by a number of attribute oriented functions.
20026185db85Sdougm  */
20036185db85Sdougm 
20046185db85Sdougm static char *
20056185db85Sdougm get_node_attr(void *nodehdl, char *tag)
20066185db85Sdougm {
20076185db85Sdougm 	xmlNodePtr node = (xmlNodePtr)nodehdl;
20086185db85Sdougm 	xmlChar *name = NULL;
20096185db85Sdougm 
201057b448deSdougm 	if (node != NULL)
20116185db85Sdougm 		name = xmlGetProp(node, (xmlChar *)tag);
20126185db85Sdougm 	return ((char *)name);
20136185db85Sdougm }
20146185db85Sdougm 
20156185db85Sdougm /*
20166185db85Sdougm  * get_node_attr(node, tag)
20176185db85Sdougm  *
2018da6c28aaSamw  * Set the specified tag(attribute) to the specified value This is
20196185db85Sdougm  * used internally by a number of attribute oriented functions. It
20206185db85Sdougm  * doesn't update the repository, only the internal document state.
20216185db85Sdougm  */
20226185db85Sdougm 
20236185db85Sdougm void
20246185db85Sdougm set_node_attr(void *nodehdl, char *tag, char *value)
20256185db85Sdougm {
20266185db85Sdougm 	xmlNodePtr node = (xmlNodePtr)nodehdl;
20276185db85Sdougm 	if (node != NULL && tag != NULL) {
202857b448deSdougm 		if (value != NULL)
20296185db85Sdougm 			xmlSetProp(node, (xmlChar *)tag, (xmlChar *)value);
203057b448deSdougm 		else
20316185db85Sdougm 			xmlUnsetProp(node, (xmlChar *)tag);
20326185db85Sdougm 	}
20336185db85Sdougm }
20346185db85Sdougm 
20356185db85Sdougm /*
20366185db85Sdougm  * sa_get_group_attr(group, tag)
20376185db85Sdougm  *
20386185db85Sdougm  * Get the specied attribute, if defined, for the group.
20396185db85Sdougm  */
20406185db85Sdougm 
20416185db85Sdougm char *
20426185db85Sdougm sa_get_group_attr(sa_group_t group, char *tag)
20436185db85Sdougm {
20446185db85Sdougm 	return (get_node_attr((void *)group, tag));
20456185db85Sdougm }
20466185db85Sdougm 
20476185db85Sdougm /*
20486185db85Sdougm  * sa_set_group_attr(group, tag, value)
20496185db85Sdougm  *
20506185db85Sdougm  * set the specified tag/attribute on the group using value as its
20516185db85Sdougm  * value.
20526185db85Sdougm  *
20536185db85Sdougm  * This will result in setting the property in the SMF repository as
20546185db85Sdougm  * well as in the internal document.
20556185db85Sdougm  */
20566185db85Sdougm 
20576185db85Sdougm int
20586185db85Sdougm sa_set_group_attr(sa_group_t group, char *tag, char *value)
20596185db85Sdougm {
20606185db85Sdougm 	int ret;
20616185db85Sdougm 	char *groupname;
2062549ec3ffSdougm 	sa_handle_impl_t impl_handle;
20636185db85Sdougm 
2064da6c28aaSamw 	/*
2065da6c28aaSamw 	 * ZFS group/subgroup doesn't need the handle so shortcut.
2066da6c28aaSamw 	 */
2067da6c28aaSamw 	if (sa_group_is_zfs(group)) {
2068da6c28aaSamw 		set_node_attr((void *)group, tag, value);
2069da6c28aaSamw 		return (SA_OK);
2070da6c28aaSamw 	}
2071da6c28aaSamw 
2072549ec3ffSdougm 	impl_handle = (sa_handle_impl_t)sa_find_group_handle(group);
2073549ec3ffSdougm 	if (impl_handle != NULL) {
20746185db85Sdougm 		groupname = sa_get_group_attr(group, "name");
2075549ec3ffSdougm 		ret = sa_get_instance(impl_handle->scfhandle, groupname);
20766185db85Sdougm 		if (ret == SA_OK) {
20776185db85Sdougm 			set_node_attr((void *)group, tag, value);
207857b448deSdougm 			ret = sa_start_transaction(impl_handle->scfhandle,
207957b448deSdougm 			    "operation");
20806185db85Sdougm 			if (ret == SA_OK) {
208157b448deSdougm 				ret = sa_set_property(impl_handle->scfhandle,
208257b448deSdougm 				    tag, value);
20836185db85Sdougm 				if (ret == SA_OK)
208457b448deSdougm 					(void) sa_end_transaction(
208557b448deSdougm 					    impl_handle->scfhandle);
208657b448deSdougm 				else
208757b448deSdougm 					sa_abort_transaction(
208857b448deSdougm 					    impl_handle->scfhandle);
20896185db85Sdougm 			}
20906185db85Sdougm 		}
20916185db85Sdougm 		if (groupname != NULL)
20926185db85Sdougm 			sa_free_attr_string(groupname);
2093549ec3ffSdougm 	} else {
2094549ec3ffSdougm 		ret = SA_SYSTEM_ERR;
2095549ec3ffSdougm 	}
20966185db85Sdougm 	return (ret);
20976185db85Sdougm }
20986185db85Sdougm 
20996185db85Sdougm /*
21006185db85Sdougm  * sa_get_share_attr(share, tag)
21016185db85Sdougm  *
21026185db85Sdougm  * Return the value of the tag/attribute set on the specified
21036185db85Sdougm  * share. Returns NULL if the tag doesn't exist.
21046185db85Sdougm  */
21056185db85Sdougm 
21066185db85Sdougm char *
21076185db85Sdougm sa_get_share_attr(sa_share_t share, char *tag)
21086185db85Sdougm {
21096185db85Sdougm 	return (get_node_attr((void *)share, tag));
21106185db85Sdougm }
21116185db85Sdougm 
21126185db85Sdougm /*
21136185db85Sdougm  * _sa_set_share_description(share, description)
21146185db85Sdougm  *
2115da6c28aaSamw  * Add a description tag with text contents to the specified share.  A
2116da6c28aaSamw  * separate XML tag is used rather than a property. This can also be
2117da6c28aaSamw  * used with resources.
21186185db85Sdougm  */
21196185db85Sdougm 
21206185db85Sdougm xmlNodePtr
2121da6c28aaSamw _sa_set_share_description(void *share, char *content)
21226185db85Sdougm {
21236185db85Sdougm 	xmlNodePtr node;
212457b448deSdougm 	node = xmlNewChild((xmlNodePtr)share, NULL, (xmlChar *)"description",
212557b448deSdougm 	    NULL);
21266185db85Sdougm 	xmlNodeSetContent(node, (xmlChar *)content);
21276185db85Sdougm 	return (node);
21286185db85Sdougm }
21296185db85Sdougm 
21306185db85Sdougm /*
21316185db85Sdougm  * sa_set_share_attr(share, tag, value)
21326185db85Sdougm  *
21336185db85Sdougm  * Set the share attribute specified by tag to the specified value. In
21346185db85Sdougm  * the case of "resource", enforce a no duplicates in a group rule. If
21356185db85Sdougm  * the share is not transient, commit the changes to the repository
21366185db85Sdougm  * else just update the share internally.
21376185db85Sdougm  */
21386185db85Sdougm 
21396185db85Sdougm int
21406185db85Sdougm sa_set_share_attr(sa_share_t share, char *tag, char *value)
21416185db85Sdougm {
21426185db85Sdougm 	sa_group_t group;
21436185db85Sdougm 	sa_share_t resource;
21446185db85Sdougm 	int ret = SA_OK;
21456185db85Sdougm 
21466185db85Sdougm 	group = sa_get_parent_group(share);
21476185db85Sdougm 
21486185db85Sdougm 	/*
21496185db85Sdougm 	 * There are some attributes that may have specific
21506185db85Sdougm 	 * restrictions on them. Initially, only "resource" has
21516185db85Sdougm 	 * special meaning that needs to be checked. Only one instance
21526185db85Sdougm 	 * of a resource name may exist within a group.
21536185db85Sdougm 	 */
21546185db85Sdougm 
21556185db85Sdougm 	if (strcmp(tag, "resource") == 0) {
21566185db85Sdougm 		resource = sa_get_resource(group, value);
21576185db85Sdougm 		if (resource != share && resource != NULL)
21586185db85Sdougm 			ret = SA_DUPLICATE_NAME;
21596185db85Sdougm 	}
21606185db85Sdougm 	if (ret == SA_OK) {
21616185db85Sdougm 		set_node_attr((void *)share, tag, value);
21626185db85Sdougm 		if (group != NULL) {
21636185db85Sdougm 			char *type;
21646185db85Sdougm 			/* we can probably optimize this some */
21656185db85Sdougm 			type = sa_get_share_attr(share, "type");
2166549ec3ffSdougm 			if (type == NULL || strcmp(type, "transient") != 0) {
2167549ec3ffSdougm 				sa_handle_impl_t impl_handle;
216857b448deSdougm 				impl_handle =
216957b448deSdougm 				    (sa_handle_impl_t)sa_find_group_handle(
217057b448deSdougm 				    group);
217157b448deSdougm 				if (impl_handle != NULL) {
217257b448deSdougm 					ret = sa_commit_share(
217357b448deSdougm 					    impl_handle->scfhandle, group,
217457b448deSdougm 					    share);
217557b448deSdougm 				} else {
2176549ec3ffSdougm 					ret = SA_SYSTEM_ERR;
2177549ec3ffSdougm 				}
217857b448deSdougm 			}
21796185db85Sdougm 			if (type != NULL)
21806185db85Sdougm 				sa_free_attr_string(type);
21816185db85Sdougm 		}
21826185db85Sdougm 	}
21836185db85Sdougm 	return (ret);
21846185db85Sdougm }
21856185db85Sdougm 
21866185db85Sdougm /*
21876185db85Sdougm  * sa_get_property_attr(prop, tag)
21886185db85Sdougm  *
21896185db85Sdougm  * Get the value of the specified property attribute. Standard
21906185db85Sdougm  * attributes are "type" and "value".
21916185db85Sdougm  */
21926185db85Sdougm 
21936185db85Sdougm char *
21946185db85Sdougm sa_get_property_attr(sa_property_t prop, char *tag)
21956185db85Sdougm {
21966185db85Sdougm 	return (get_node_attr((void *)prop, tag));
21976185db85Sdougm }
21986185db85Sdougm 
21996185db85Sdougm /*
22006185db85Sdougm  * sa_get_optionset_attr(prop, tag)
22016185db85Sdougm  *
22026185db85Sdougm  * Get the value of the specified property attribute. Standard
22036185db85Sdougm  * attribute is "type".
22046185db85Sdougm  */
22056185db85Sdougm 
22066185db85Sdougm char *
22076185db85Sdougm sa_get_optionset_attr(sa_property_t optionset, char *tag)
22086185db85Sdougm {
22096185db85Sdougm 	return (get_node_attr((void *)optionset, tag));
22106185db85Sdougm 
22116185db85Sdougm }
22126185db85Sdougm 
22136185db85Sdougm /*
22146185db85Sdougm  * sa_set_optionset_attr(optionset, tag, value)
22156185db85Sdougm  *
22166185db85Sdougm  * Set the specified attribute(tag) to the specified value on the
22176185db85Sdougm  * optionset.
22186185db85Sdougm  */
22196185db85Sdougm 
22206185db85Sdougm void
22216185db85Sdougm sa_set_optionset_attr(sa_group_t optionset, char *tag, char *value)
22226185db85Sdougm {
22236185db85Sdougm 	set_node_attr((void *)optionset, tag, value);
22246185db85Sdougm }
22256185db85Sdougm 
22266185db85Sdougm /*
22276185db85Sdougm  * sa_free_attr_string(string)
22286185db85Sdougm  *
22296185db85Sdougm  * Free the string that was returned in one of the sa_get_*_attr()
22306185db85Sdougm  * functions.
22316185db85Sdougm  */
22326185db85Sdougm 
22336185db85Sdougm void
22346185db85Sdougm sa_free_attr_string(char *string)
22356185db85Sdougm {
22366185db85Sdougm 	xmlFree((xmlChar *)string);
22376185db85Sdougm }
22386185db85Sdougm 
22396185db85Sdougm /*
22406185db85Sdougm  * sa_get_optionset(group, proto)
22416185db85Sdougm  *
22426185db85Sdougm  * Return the optionset, if it exists, that is associated with the
22436185db85Sdougm  * specified protocol.
22446185db85Sdougm  */
22456185db85Sdougm 
22466185db85Sdougm sa_optionset_t
22476185db85Sdougm sa_get_optionset(void *group, char *proto)
22486185db85Sdougm {
22496185db85Sdougm 	xmlNodePtr node;
22506185db85Sdougm 	xmlChar *value = NULL;
22516185db85Sdougm 
22526185db85Sdougm 	for (node = ((xmlNodePtr)group)->children; node != NULL;
22536185db85Sdougm 	    node = node->next) {
22546185db85Sdougm 		if (xmlStrcmp(node->name, (xmlChar *)"optionset") == 0) {
22556185db85Sdougm 			value = xmlGetProp(node, (xmlChar *)"type");
22566185db85Sdougm 			if (proto != NULL) {
22576185db85Sdougm 				if (value != NULL &&
22586185db85Sdougm 				    xmlStrcmp(value, (xmlChar *)proto) == 0) {
22596185db85Sdougm 					break;
22606185db85Sdougm 				}
22616185db85Sdougm 				if (value != NULL) {
22626185db85Sdougm 					xmlFree(value);
22636185db85Sdougm 					value = NULL;
22646185db85Sdougm 				}
22656185db85Sdougm 			} else {
22666185db85Sdougm 				break;
22676185db85Sdougm 			}
22686185db85Sdougm 		}
22696185db85Sdougm 	}
22706185db85Sdougm 	if (value != NULL)
22716185db85Sdougm 		xmlFree(value);
22726185db85Sdougm 	return ((sa_optionset_t)node);
22736185db85Sdougm }
22746185db85Sdougm 
22756185db85Sdougm /*
22766185db85Sdougm  * sa_get_next_optionset(optionset)
22776185db85Sdougm  *
22786185db85Sdougm  * Return the next optionset in the group. NULL if this was the last.
22796185db85Sdougm  */
22806185db85Sdougm 
22816185db85Sdougm sa_optionset_t
22826185db85Sdougm sa_get_next_optionset(sa_optionset_t optionset)
22836185db85Sdougm {
22846185db85Sdougm 	xmlNodePtr node;
22856185db85Sdougm 
22866185db85Sdougm 	for (node = ((xmlNodePtr)optionset)->next; node != NULL;
22876185db85Sdougm 	    node = node->next) {
22886185db85Sdougm 		if (xmlStrcmp(node->name, (xmlChar *)"optionset") == 0) {
22896185db85Sdougm 			break;
22906185db85Sdougm 		}
22916185db85Sdougm 	}
22926185db85Sdougm 	return ((sa_optionset_t)node);
22936185db85Sdougm }
22946185db85Sdougm 
22956185db85Sdougm /*
22966185db85Sdougm  * sa_get_security(group, sectype, proto)
22976185db85Sdougm  *
22986185db85Sdougm  * Return the security optionset. The internal name is a hold over
22996185db85Sdougm  * from the implementation and will be changed before the API is
23006185db85Sdougm  * finalized. This is really a named optionset that can be negotiated
23016185db85Sdougm  * as a group of properties (like NFS security options).
23026185db85Sdougm  */
23036185db85Sdougm 
23046185db85Sdougm sa_security_t
23056185db85Sdougm sa_get_security(sa_group_t group, char *sectype, char *proto)
23066185db85Sdougm {
23076185db85Sdougm 	xmlNodePtr node;
23086185db85Sdougm 	xmlChar *value = NULL;
23096185db85Sdougm 
23106185db85Sdougm 	for (node = ((xmlNodePtr)group)->children; node != NULL;
23116185db85Sdougm 	    node = node->next) {
23126185db85Sdougm 		if (xmlStrcmp(node->name, (xmlChar *)"security") == 0) {
23136185db85Sdougm 			if (proto != NULL) {
23146185db85Sdougm 				value = xmlGetProp(node, (xmlChar *)"type");
23156185db85Sdougm 				if (value == NULL ||
23166185db85Sdougm 				    (value != NULL &&
23176185db85Sdougm 				    xmlStrcmp(value, (xmlChar *)proto) != 0)) {
23186185db85Sdougm 					/* it doesn't match so continue */
23196185db85Sdougm 					xmlFree(value);
23206185db85Sdougm 					value = NULL;
23216185db85Sdougm 					continue;
23226185db85Sdougm 				}
23236185db85Sdougm 			}
23246185db85Sdougm 			if (value != NULL) {
23256185db85Sdougm 				xmlFree(value);
23266185db85Sdougm 				value = NULL;
23276185db85Sdougm 			}
23286185db85Sdougm 			/* potential match */
23296185db85Sdougm 			if (sectype != NULL) {
23306185db85Sdougm 				value = xmlGetProp(node, (xmlChar *)"sectype");
23316185db85Sdougm 				if (value != NULL &&
23326185db85Sdougm 				    xmlStrcmp(value, (xmlChar *)sectype) == 0) {
23336185db85Sdougm 					break;
23346185db85Sdougm 				}
23356185db85Sdougm 			} else {
23366185db85Sdougm 				break;
23376185db85Sdougm 			}
23386185db85Sdougm 		}
23396185db85Sdougm 		if (value != NULL) {
23406185db85Sdougm 			xmlFree(value);
23416185db85Sdougm 			value = NULL;
23426185db85Sdougm 		}
23436185db85Sdougm 	}
23446185db85Sdougm 	if (value != NULL)
23456185db85Sdougm 		xmlFree(value);
23466185db85Sdougm 	return ((sa_security_t)node);
23476185db85Sdougm }
23486185db85Sdougm 
23496185db85Sdougm /*
23506185db85Sdougm  * sa_get_next_security(security)
23516185db85Sdougm  *
23526185db85Sdougm  * Get the next security optionset if one exists.
23536185db85Sdougm  */
23546185db85Sdougm 
23556185db85Sdougm sa_security_t
23566185db85Sdougm sa_get_next_security(sa_security_t security)
23576185db85Sdougm {
23586185db85Sdougm 	xmlNodePtr node;
23596185db85Sdougm 
23606185db85Sdougm 	for (node = ((xmlNodePtr)security)->next; node != NULL;
23616185db85Sdougm 	    node = node->next) {
23626185db85Sdougm 		if (xmlStrcmp(node->name, (xmlChar *)"security") == 0) {
23636185db85Sdougm 			break;
23646185db85Sdougm 		}
23656185db85Sdougm 	}
23666185db85Sdougm 	return ((sa_security_t)node);
23676185db85Sdougm }
23686185db85Sdougm 
23696185db85Sdougm /*
23706185db85Sdougm  * sa_get_property(optionset, prop)
23716185db85Sdougm  *
23726185db85Sdougm  * Get the property object with the name specified in prop from the
23736185db85Sdougm  * optionset.
23746185db85Sdougm  */
23756185db85Sdougm 
23766185db85Sdougm sa_property_t
23776185db85Sdougm sa_get_property(sa_optionset_t optionset, char *prop)
23786185db85Sdougm {
23796185db85Sdougm 	xmlNodePtr node = (xmlNodePtr)optionset;
23806185db85Sdougm 	xmlChar *value = NULL;
23816185db85Sdougm 
23826185db85Sdougm 	if (optionset == NULL)
23836185db85Sdougm 		return (NULL);
23846185db85Sdougm 
23856185db85Sdougm 	for (node = node->children; node != NULL;
23866185db85Sdougm 	    node = node->next) {
23876185db85Sdougm 		if (xmlStrcmp(node->name, (xmlChar *)"option") == 0) {
23886185db85Sdougm 			if (prop == NULL)
23896185db85Sdougm 				break;
23906185db85Sdougm 			value = xmlGetProp(node, (xmlChar *)"type");
239157b448deSdougm 			if (value != NULL &&
239257b448deSdougm 			    xmlStrcmp(value, (xmlChar *)prop) == 0) {
23936185db85Sdougm 				break;
23946185db85Sdougm 			}
23956185db85Sdougm 			if (value != NULL) {
23966185db85Sdougm 				xmlFree(value);
23976185db85Sdougm 				value = NULL;
23986185db85Sdougm 			}
23996185db85Sdougm 		}
24006185db85Sdougm 	}
24016185db85Sdougm 	if (value != NULL)
24026185db85Sdougm 		xmlFree(value);
24036185db85Sdougm 	if (node != NULL && xmlStrcmp(node->name, (xmlChar *)"option") != 0) {
240457b448deSdougm 		/*
240557b448deSdougm 		 * avoid a non option node -- it is possible to be a
240657b448deSdougm 		 * text node
240757b448deSdougm 		 */
24086185db85Sdougm 		node = NULL;
24096185db85Sdougm 	}
24106185db85Sdougm 	return ((sa_property_t)node);
24116185db85Sdougm }
24126185db85Sdougm 
24136185db85Sdougm /*
24146185db85Sdougm  * sa_get_next_property(property)
24156185db85Sdougm  *
24166185db85Sdougm  * Get the next property following the specified property. NULL if
24176185db85Sdougm  * this was the last.
24186185db85Sdougm  */
24196185db85Sdougm 
24206185db85Sdougm sa_property_t
24216185db85Sdougm sa_get_next_property(sa_property_t property)
24226185db85Sdougm {
24236185db85Sdougm 	xmlNodePtr node;
24246185db85Sdougm 
24256185db85Sdougm 	for (node = ((xmlNodePtr)property)->next; node != NULL;
24266185db85Sdougm 	    node = node->next) {
24276185db85Sdougm 		if (xmlStrcmp(node->name, (xmlChar *)"option") == 0) {
24286185db85Sdougm 			break;
24296185db85Sdougm 		}
24306185db85Sdougm 	}
24316185db85Sdougm 	return ((sa_property_t)node);
24326185db85Sdougm }
24336185db85Sdougm 
24346185db85Sdougm /*
24356185db85Sdougm  * sa_set_share_description(share, content)
24366185db85Sdougm  *
24376185db85Sdougm  * Set the description of share to content.
24386185db85Sdougm  */
24396185db85Sdougm 
24406185db85Sdougm int
24416185db85Sdougm sa_set_share_description(sa_share_t share, char *content)
24426185db85Sdougm {
24436185db85Sdougm 	xmlNodePtr node;
24446185db85Sdougm 	sa_group_t group;
24456185db85Sdougm 	int ret = SA_OK;
24466185db85Sdougm 
24476185db85Sdougm 	for (node = ((xmlNodePtr)share)->children; node != NULL;
24486185db85Sdougm 	    node = node->next) {
24496185db85Sdougm 		if (xmlStrcmp(node->name, (xmlChar *)"description") == 0) {
24506185db85Sdougm 			break;
24516185db85Sdougm 		}
24526185db85Sdougm 	}
24536185db85Sdougm 	/* no existing description but want to add */
24546185db85Sdougm 	if (node == NULL && content != NULL) {
24556185db85Sdougm 		/* add a description */
24566185db85Sdougm 		node = _sa_set_share_description(share, content);
24576185db85Sdougm 	} else if (node != NULL && content != NULL) {
24586185db85Sdougm 		/* update a description */
24596185db85Sdougm 		xmlNodeSetContent(node, (xmlChar *)content);
24606185db85Sdougm 	} else if (node != NULL && content == NULL) {
24616185db85Sdougm 		/* remove an existing description */
24626185db85Sdougm 		xmlUnlinkNode(node);
24636185db85Sdougm 		xmlFreeNode(node);
24646185db85Sdougm 	}
2465da6c28aaSamw 	group = sa_get_parent_group(share);
2466da6c28aaSamw 	if (group != NULL && sa_is_persistent(share)) {
2467549ec3ffSdougm 		sa_handle_impl_t impl_handle;
2468549ec3ffSdougm 		impl_handle = (sa_handle_impl_t)sa_find_group_handle(group);
246957b448deSdougm 		if (impl_handle != NULL) {
247057b448deSdougm 			ret = sa_commit_share(impl_handle->scfhandle, group,
247157b448deSdougm 			    share);
247257b448deSdougm 		} else {
2473549ec3ffSdougm 			ret = SA_SYSTEM_ERR;
2474549ec3ffSdougm 		}
247557b448deSdougm 	}
24766185db85Sdougm 	return (ret);
24776185db85Sdougm }
24786185db85Sdougm 
24796185db85Sdougm /*
24806185db85Sdougm  * fixproblemchars(string)
24816185db85Sdougm  *
24826185db85Sdougm  * don't want any newline or tab characters in the text since these
24836185db85Sdougm  * could break display of data and legacy file formats.
24846185db85Sdougm  */
24856185db85Sdougm static void
24866185db85Sdougm fixproblemchars(char *str)
24876185db85Sdougm {
24886185db85Sdougm 	int c;
24896185db85Sdougm 	for (c = *str; c != '\0'; c = *++str) {
24906185db85Sdougm 		if (c == '\t' || c == '\n')
24916185db85Sdougm 			*str = ' ';
24926185db85Sdougm 		else if (c == '"')
24936185db85Sdougm 			*str = '\'';
24946185db85Sdougm 	}
24956185db85Sdougm }
24966185db85Sdougm 
24976185db85Sdougm /*
24986185db85Sdougm  * sa_get_share_description(share)
24996185db85Sdougm  *
25006185db85Sdougm  * Return the description text for the specified share if it
25016185db85Sdougm  * exists. NULL if no description exists.
25026185db85Sdougm  */
25036185db85Sdougm 
25046185db85Sdougm char *
25056185db85Sdougm sa_get_share_description(sa_share_t share)
25066185db85Sdougm {
25076185db85Sdougm 	xmlChar *description = NULL;
25086185db85Sdougm 	xmlNodePtr node;
25096185db85Sdougm 
25106185db85Sdougm 	for (node = ((xmlNodePtr)share)->children; node != NULL;
25116185db85Sdougm 	    node = node->next) {
25126185db85Sdougm 		if (xmlStrcmp(node->name, (xmlChar *)"description") == 0) {
25136185db85Sdougm 			break;
25146185db85Sdougm 		}
25156185db85Sdougm 	}
25166185db85Sdougm 	if (node != NULL) {
2517da6c28aaSamw 		description = xmlNodeGetContent(node);
25186185db85Sdougm 		fixproblemchars((char *)description);
25196185db85Sdougm 	}
25206185db85Sdougm 	return ((char *)description);
25216185db85Sdougm }
25226185db85Sdougm 
25236185db85Sdougm /*
25246185db85Sdougm  * sa_free(share_description(description)
25256185db85Sdougm  *
25266185db85Sdougm  * Free the description string.
25276185db85Sdougm  */
25286185db85Sdougm 
25296185db85Sdougm void
25306185db85Sdougm sa_free_share_description(char *description)
25316185db85Sdougm {
25326185db85Sdougm 	xmlFree((xmlChar *)description);
25336185db85Sdougm }
25346185db85Sdougm 
25356185db85Sdougm /*
25366185db85Sdougm  * sa_create_optionset(group, proto)
25376185db85Sdougm  *
25386185db85Sdougm  * Create an optionset for the specified protocol in the specied
25396185db85Sdougm  * group. This is manifested as a property group within SMF.
25406185db85Sdougm  */
25416185db85Sdougm 
25426185db85Sdougm sa_optionset_t
25436185db85Sdougm sa_create_optionset(sa_group_t group, char *proto)
25446185db85Sdougm {
25456185db85Sdougm 	sa_optionset_t optionset;
25466185db85Sdougm 	sa_group_t parent = group;
2547da6c28aaSamw 	sa_share_t share = NULL;
2548da6c28aaSamw 	int err = SA_OK;
2549da6c28aaSamw 	char *id = NULL;
25506185db85Sdougm 
25516185db85Sdougm 	optionset = sa_get_optionset(group, proto);
25526185db85Sdougm 	if (optionset != NULL) {
25536185db85Sdougm 		/* can't have a duplicate protocol */
25546185db85Sdougm 		optionset = NULL;
25556185db85Sdougm 	} else {
2556da6c28aaSamw 		/*
2557da6c28aaSamw 		 * Account for resource names being slightly
2558da6c28aaSamw 		 * different.
2559da6c28aaSamw 		 */
2560da6c28aaSamw 		if (sa_is_share(group)) {
2561da6c28aaSamw 			/*
2562da6c28aaSamw 			 * Transient shares do not have an "id" so not an
2563da6c28aaSamw 			 * error to not find one.
2564da6c28aaSamw 			 */
2565da6c28aaSamw 			id = sa_get_share_attr((sa_share_t)group, "id");
2566da6c28aaSamw 		} else if (sa_is_resource(group)) {
2567da6c28aaSamw 			share = sa_get_resource_parent(
2568da6c28aaSamw 			    (sa_resource_t)group);
2569da6c28aaSamw 			id = sa_get_resource_attr(share, "id");
2570da6c28aaSamw 
2571da6c28aaSamw 			/* id can be NULL if the group is transient (ZFS) */
2572da6c28aaSamw 			if (id == NULL && sa_is_persistent(group))
2573da6c28aaSamw 				err = SA_NO_MEMORY;
2574da6c28aaSamw 		}
2575da6c28aaSamw 		if (err == SA_NO_MEMORY) {
2576da6c28aaSamw 			/*
2577da6c28aaSamw 			 * Couldn't get the id for the share or
2578da6c28aaSamw 			 * resource. While this could be a
2579da6c28aaSamw 			 * configuration issue, it is most likely an
2580da6c28aaSamw 			 * out of memory. In any case, fail the create.
2581da6c28aaSamw 			 */
2582da6c28aaSamw 			return (NULL);
2583da6c28aaSamw 		}
2584da6c28aaSamw 
25856185db85Sdougm 		optionset = (sa_optionset_t)xmlNewChild((xmlNodePtr)group,
258657b448deSdougm 		    NULL, (xmlChar *)"optionset", NULL);
25876185db85Sdougm 		/*
25886185db85Sdougm 		 * only put to repository if on a group and we were
25896185db85Sdougm 		 * able to create an optionset.
25906185db85Sdougm 		 */
25916185db85Sdougm 		if (optionset != NULL) {
259257b448deSdougm 			char oname[SA_STRSIZE];
25936185db85Sdougm 			char *groupname;
25946185db85Sdougm 
2595da6c28aaSamw 			/*
2596da6c28aaSamw 			 * Need to get parent group in all cases, but also get
2597da6c28aaSamw 			 * the share if this is a resource.
2598da6c28aaSamw 			 */
2599da6c28aaSamw 			if (sa_is_share(group)) {
26006185db85Sdougm 				parent = sa_get_parent_group((sa_share_t)group);
2601da6c28aaSamw 			} else if (sa_is_resource(group)) {
2602da6c28aaSamw 				share = sa_get_resource_parent(
2603da6c28aaSamw 				    (sa_resource_t)group);
2604da6c28aaSamw 				parent = sa_get_parent_group(share);
2605da6c28aaSamw 			}
26066185db85Sdougm 
26076185db85Sdougm 			sa_set_optionset_attr(optionset, "type", proto);
26086185db85Sdougm 
26096185db85Sdougm 			(void) sa_optionset_name(optionset, oname,
26106185db85Sdougm 			    sizeof (oname), id);
26116185db85Sdougm 			groupname = sa_get_group_attr(parent, "name");
2612da6c28aaSamw 			if (groupname != NULL && sa_is_persistent(group)) {
2613549ec3ffSdougm 				sa_handle_impl_t impl_handle;
2614da6c28aaSamw 				impl_handle =
2615da6c28aaSamw 				    (sa_handle_impl_t)sa_find_group_handle(
2616da6c28aaSamw 				    group);
2617549ec3ffSdougm 				assert(impl_handle != NULL);
2618549ec3ffSdougm 				if (impl_handle != NULL) {
261957b448deSdougm 					(void) sa_get_instance(
2620da6c28aaSamw 					    impl_handle->scfhandle, groupname);
262157b448deSdougm 					(void) sa_create_pgroup(
262257b448deSdougm 					    impl_handle->scfhandle, oname);
26236185db85Sdougm 				}
2624549ec3ffSdougm 			}
2625549ec3ffSdougm 			if (groupname != NULL)
2626549ec3ffSdougm 				sa_free_attr_string(groupname);
2627da6c28aaSamw 		}
2628da6c28aaSamw 	}
2629da6c28aaSamw 
26306185db85Sdougm 	if (id != NULL)
26316185db85Sdougm 		sa_free_attr_string(id);
26326185db85Sdougm 	return (optionset);
26336185db85Sdougm }
26346185db85Sdougm 
26356185db85Sdougm /*
26366185db85Sdougm  * sa_get_property_parent(property)
26376185db85Sdougm  *
26386185db85Sdougm  * Given a property, return the object it is a property of. This will
26396185db85Sdougm  * be an optionset of some type.
26406185db85Sdougm  */
26416185db85Sdougm 
26426185db85Sdougm static sa_optionset_t
26436185db85Sdougm sa_get_property_parent(sa_property_t property)
26446185db85Sdougm {
26456185db85Sdougm 	xmlNodePtr node = NULL;
26466185db85Sdougm 
264757b448deSdougm 	if (property != NULL)
26486185db85Sdougm 		node = ((xmlNodePtr)property)->parent;
26496185db85Sdougm 	return ((sa_optionset_t)node);
26506185db85Sdougm }
26516185db85Sdougm 
26526185db85Sdougm /*
26536185db85Sdougm  * sa_get_optionset_parent(optionset)
26546185db85Sdougm  *
26556185db85Sdougm  * Return the parent of the specified optionset. This could be a group
26566185db85Sdougm  * or a share.
26576185db85Sdougm  */
26586185db85Sdougm 
26596185db85Sdougm static sa_group_t
26606185db85Sdougm sa_get_optionset_parent(sa_optionset_t optionset)
26616185db85Sdougm {
26626185db85Sdougm 	xmlNodePtr node = NULL;
26636185db85Sdougm 
266457b448deSdougm 	if (optionset != NULL)
26656185db85Sdougm 		node = ((xmlNodePtr)optionset)->parent;
26666185db85Sdougm 	return ((sa_group_t)node);
26676185db85Sdougm }
26686185db85Sdougm 
26696185db85Sdougm /*
26706185db85Sdougm  * zfs_needs_update(share)
26716185db85Sdougm  *
26726185db85Sdougm  * In order to avoid making multiple updates to a ZFS share when
26736185db85Sdougm  * setting properties, the share attribute "changed" will be set to
2674da6c28aaSamw  * true when a property is added or modified.  When done adding
26756185db85Sdougm  * properties, we can then detect that an update is needed.  We then
26766185db85Sdougm  * clear the state here to detect additional changes.
26776185db85Sdougm  */
26786185db85Sdougm 
26796185db85Sdougm static int
26806185db85Sdougm zfs_needs_update(sa_share_t share)
26816185db85Sdougm {
26826185db85Sdougm 	char *attr;
26836185db85Sdougm 	int result = 0;
26846185db85Sdougm 
26856185db85Sdougm 	attr = sa_get_share_attr(share, "changed");
26866185db85Sdougm 	if (attr != NULL) {
26876185db85Sdougm 		sa_free_attr_string(attr);
26886185db85Sdougm 		result = 1;
26896185db85Sdougm 	}
26906185db85Sdougm 	set_node_attr((void *)share, "changed", NULL);
26916185db85Sdougm 	return (result);
26926185db85Sdougm }
26936185db85Sdougm 
26946185db85Sdougm /*
26956185db85Sdougm  * zfs_set_update(share)
26966185db85Sdougm  *
26976185db85Sdougm  * Set the changed attribute of the share to true.
26986185db85Sdougm  */
26996185db85Sdougm 
27006185db85Sdougm static void
27016185db85Sdougm zfs_set_update(sa_share_t share)
27026185db85Sdougm {
27036185db85Sdougm 	set_node_attr((void *)share, "changed", "true");
27046185db85Sdougm }
27056185db85Sdougm 
27066185db85Sdougm /*
27076185db85Sdougm  * sa_commit_properties(optionset, clear)
27086185db85Sdougm  *
27096185db85Sdougm  * Check if SMF or ZFS config and either update or abort the pending
27106185db85Sdougm  * changes.
27116185db85Sdougm  */
27126185db85Sdougm 
27136185db85Sdougm int
27146185db85Sdougm sa_commit_properties(sa_optionset_t optionset, int clear)
27156185db85Sdougm {
27166185db85Sdougm 	sa_group_t group;
27176185db85Sdougm 	sa_group_t parent;
27186185db85Sdougm 	int zfs = 0;
27196185db85Sdougm 	int needsupdate = 0;
27206185db85Sdougm 	int ret = SA_OK;
2721549ec3ffSdougm 	sa_handle_impl_t impl_handle;
27226185db85Sdougm 
27236185db85Sdougm 	group = sa_get_optionset_parent(optionset);
27246185db85Sdougm 	if (group != NULL && (sa_is_share(group) || is_zfs_group(group))) {
27256185db85Sdougm 		/* only update ZFS if on a share */
27266185db85Sdougm 		parent = sa_get_parent_group(group);
27276185db85Sdougm 		zfs++;
272857b448deSdougm 		if (parent != NULL && is_zfs_group(parent))
27296185db85Sdougm 			needsupdate = zfs_needs_update(group);
273057b448deSdougm 		else
27316185db85Sdougm 			zfs = 0;
27326185db85Sdougm 	}
27336185db85Sdougm 	if (zfs) {
27346185db85Sdougm 		if (!clear && needsupdate)
27356185db85Sdougm 			ret = sa_zfs_update((sa_share_t)group);
27366185db85Sdougm 	} else {
2737549ec3ffSdougm 		impl_handle = (sa_handle_impl_t)sa_find_group_handle(group);
2738549ec3ffSdougm 		if (impl_handle != NULL) {
273957b448deSdougm 			if (clear) {
274057b448deSdougm 				(void) sa_abort_transaction(
274157b448deSdougm 				    impl_handle->scfhandle);
274257b448deSdougm 			} else {
274357b448deSdougm 				ret = sa_end_transaction(
274457b448deSdougm 				    impl_handle->scfhandle);
274557b448deSdougm 			}
2746549ec3ffSdougm 		} else {
2747549ec3ffSdougm 			ret = SA_SYSTEM_ERR;
2748549ec3ffSdougm 		}
27496185db85Sdougm 	}
27506185db85Sdougm 	return (ret);
27516185db85Sdougm }
27526185db85Sdougm 
27536185db85Sdougm /*
27546185db85Sdougm  * sa_destroy_optionset(optionset)
27556185db85Sdougm  *
2756da6c28aaSamw  * Remove the optionset from its group. Update the repository to
27576185db85Sdougm  * reflect this change.
27586185db85Sdougm  */
27596185db85Sdougm 
27606185db85Sdougm int
27616185db85Sdougm sa_destroy_optionset(sa_optionset_t optionset)
27626185db85Sdougm {
276357b448deSdougm 	char name[SA_STRSIZE];
27646185db85Sdougm 	int len;
27656185db85Sdougm 	int ret;
27666185db85Sdougm 	char *id = NULL;
27676185db85Sdougm 	sa_group_t group;
27686185db85Sdougm 	int ispersist = 1;
27696185db85Sdougm 
27706185db85Sdougm 	/* now delete the prop group */
27716185db85Sdougm 	group = sa_get_optionset_parent(optionset);
2772da6c28aaSamw 	if (group != NULL) {
2773da6c28aaSamw 		if (sa_is_resource(group)) {
2774da6c28aaSamw 			sa_resource_t resource = group;
2775da6c28aaSamw 			sa_share_t share = sa_get_resource_parent(resource);
2776da6c28aaSamw 			group = sa_get_parent_group(share);
2777da6c28aaSamw 			id = sa_get_share_attr(share, "id");
2778da6c28aaSamw 		} else if (sa_is_share(group)) {
27796185db85Sdougm 			id = sa_get_share_attr((sa_share_t)group, "id");
27806185db85Sdougm 		}
2781da6c28aaSamw 		ispersist = sa_is_persistent(group);
2782da6c28aaSamw 	}
27836185db85Sdougm 	if (ispersist) {
2784549ec3ffSdougm 		sa_handle_impl_t impl_handle;
27856185db85Sdougm 		len = sa_optionset_name(optionset, name, sizeof (name), id);
2786549ec3ffSdougm 		impl_handle = (sa_handle_impl_t)sa_find_group_handle(group);
2787549ec3ffSdougm 		if (impl_handle != NULL) {
27886185db85Sdougm 			if (len > 0) {
278957b448deSdougm 				ret = sa_delete_pgroup(impl_handle->scfhandle,
279057b448deSdougm 				    name);
2791549ec3ffSdougm 			}
2792549ec3ffSdougm 		} else {
2793549ec3ffSdougm 			ret = SA_SYSTEM_ERR;
27946185db85Sdougm 		}
27956185db85Sdougm 	}
27966185db85Sdougm 	xmlUnlinkNode((xmlNodePtr)optionset);
27976185db85Sdougm 	xmlFreeNode((xmlNodePtr)optionset);
27986185db85Sdougm 	if (id != NULL)
27996185db85Sdougm 		sa_free_attr_string(id);
28006185db85Sdougm 	return (ret);
28016185db85Sdougm }
28026185db85Sdougm 
28036185db85Sdougm /* private to the implementation */
28046185db85Sdougm int
28056185db85Sdougm _sa_remove_optionset(sa_optionset_t optionset)
28066185db85Sdougm {
28076185db85Sdougm 	int ret = SA_OK;
28086185db85Sdougm 
28096185db85Sdougm 	xmlUnlinkNode((xmlNodePtr)optionset);
28106185db85Sdougm 	xmlFreeNode((xmlNodePtr)optionset);
28116185db85Sdougm 	return (ret);
28126185db85Sdougm }
28136185db85Sdougm 
28146185db85Sdougm /*
28156185db85Sdougm  * sa_create_security(group, sectype, proto)
28166185db85Sdougm  *
28176185db85Sdougm  * Create a security optionset (one that has a type name and a
28186185db85Sdougm  * proto). Security is left over from a pure NFS implementation. The
28196185db85Sdougm  * naming will change in the future when the API is released.
28206185db85Sdougm  */
28216185db85Sdougm sa_security_t
28226185db85Sdougm sa_create_security(sa_group_t group, char *sectype, char *proto)
28236185db85Sdougm {
28246185db85Sdougm 	sa_security_t security;
28256185db85Sdougm 	char *id = NULL;
28266185db85Sdougm 	sa_group_t parent;
28276185db85Sdougm 	char *groupname = NULL;
28286185db85Sdougm 
28296185db85Sdougm 	if (group != NULL && sa_is_share(group)) {
28306185db85Sdougm 		id = sa_get_share_attr((sa_share_t)group, "id");
28316185db85Sdougm 		parent = sa_get_parent_group(group);
28326185db85Sdougm 		if (parent != NULL)
28336185db85Sdougm 			groupname = sa_get_group_attr(parent, "name");
28346185db85Sdougm 	} else if (group != NULL) {
28356185db85Sdougm 		groupname = sa_get_group_attr(group, "name");
28366185db85Sdougm 	}
28376185db85Sdougm 
28386185db85Sdougm 	security = sa_get_security(group, sectype, proto);
28396185db85Sdougm 	if (security != NULL) {
28406185db85Sdougm 		/* can't have a duplicate security option */
28416185db85Sdougm 		security = NULL;
28426185db85Sdougm 	} else {
28436185db85Sdougm 		security = (sa_security_t)xmlNewChild((xmlNodePtr)group,
284457b448deSdougm 		    NULL, (xmlChar *)"security", NULL);
28456185db85Sdougm 		if (security != NULL) {
284657b448deSdougm 			char oname[SA_STRSIZE];
28476185db85Sdougm 			sa_set_security_attr(security, "type", proto);
28486185db85Sdougm 
28496185db85Sdougm 			sa_set_security_attr(security, "sectype", sectype);
28506185db85Sdougm 			(void) sa_security_name(security, oname,
28516185db85Sdougm 			    sizeof (oname), id);
2852da6c28aaSamw 			if (groupname != NULL && sa_is_persistent(group)) {
2853549ec3ffSdougm 				sa_handle_impl_t impl_handle;
2854549ec3ffSdougm 				impl_handle =
285557b448deSdougm 				    (sa_handle_impl_t)sa_find_group_handle(
285657b448deSdougm 				    group);
2857549ec3ffSdougm 				if (impl_handle != NULL) {
285857b448deSdougm 					(void) sa_get_instance(
285957b448deSdougm 					    impl_handle->scfhandle, groupname);
286057b448deSdougm 					(void) sa_create_pgroup(
286157b448deSdougm 					    impl_handle->scfhandle, oname);
2862549ec3ffSdougm 				}
28636185db85Sdougm 			}
28646185db85Sdougm 		}
28656185db85Sdougm 	}
28666185db85Sdougm 	if (groupname != NULL)
28676185db85Sdougm 		sa_free_attr_string(groupname);
28686185db85Sdougm 	return (security);
28696185db85Sdougm }
28706185db85Sdougm 
28716185db85Sdougm /*
28726185db85Sdougm  * sa_destroy_security(security)
28736185db85Sdougm  *
28746185db85Sdougm  * Remove the specified optionset from the document and the
28756185db85Sdougm  * configuration.
28766185db85Sdougm  */
28776185db85Sdougm 
28786185db85Sdougm int
28796185db85Sdougm sa_destroy_security(sa_security_t security)
28806185db85Sdougm {
288157b448deSdougm 	char name[SA_STRSIZE];
28826185db85Sdougm 	int len;
28836185db85Sdougm 	int ret = SA_OK;
28846185db85Sdougm 	char *id = NULL;
28856185db85Sdougm 	sa_group_t group;
28866185db85Sdougm 	int iszfs = 0;
28876185db85Sdougm 	int ispersist = 1;
28886185db85Sdougm 
28896185db85Sdougm 	group = sa_get_optionset_parent(security);
28906185db85Sdougm 
28916185db85Sdougm 	if (group != NULL)
28926185db85Sdougm 		iszfs = sa_group_is_zfs(group);
28936185db85Sdougm 
28946185db85Sdougm 	if (group != NULL && !iszfs) {
28956185db85Sdougm 		if (sa_is_share(group))
2896da6c28aaSamw 			ispersist = sa_is_persistent(group);
28976185db85Sdougm 		id = sa_get_share_attr((sa_share_t)group, "id");
28986185db85Sdougm 	}
28996185db85Sdougm 	if (ispersist) {
29006185db85Sdougm 		len = sa_security_name(security, name, sizeof (name), id);
29016185db85Sdougm 		if (!iszfs && len > 0) {
2902549ec3ffSdougm 			sa_handle_impl_t impl_handle;
290357b448deSdougm 			impl_handle =
290457b448deSdougm 			    (sa_handle_impl_t)sa_find_group_handle(group);
2905549ec3ffSdougm 			if (impl_handle != NULL) {
290657b448deSdougm 				ret = sa_delete_pgroup(impl_handle->scfhandle,
290757b448deSdougm 				    name);
2908549ec3ffSdougm 			} else {
2909549ec3ffSdougm 				ret = SA_SYSTEM_ERR;
2910549ec3ffSdougm 			}
29116185db85Sdougm 		}
29126185db85Sdougm 	}
29136185db85Sdougm 	xmlUnlinkNode((xmlNodePtr)security);
29146185db85Sdougm 	xmlFreeNode((xmlNodePtr)security);
291557b448deSdougm 	if (iszfs)
29166185db85Sdougm 		ret = sa_zfs_update(group);
29176185db85Sdougm 	if (id != NULL)
29186185db85Sdougm 		sa_free_attr_string(id);
29196185db85Sdougm 	return (ret);
29206185db85Sdougm }
29216185db85Sdougm 
29226185db85Sdougm /*
29236185db85Sdougm  * sa_get_security_attr(optionset, tag)
29246185db85Sdougm  *
29256185db85Sdougm  * Return the specified attribute value from the optionset.
29266185db85Sdougm  */
29276185db85Sdougm 
29286185db85Sdougm char *
29296185db85Sdougm sa_get_security_attr(sa_property_t optionset, char *tag)
29306185db85Sdougm {
29316185db85Sdougm 	return (get_node_attr((void *)optionset, tag));
29326185db85Sdougm 
29336185db85Sdougm }
29346185db85Sdougm 
29356185db85Sdougm /*
29366185db85Sdougm  * sa_set_security_attr(optionset, tag, value)
29376185db85Sdougm  *
29386185db85Sdougm  * Set the optioset attribute specied by tag to the specified value.
29396185db85Sdougm  */
29406185db85Sdougm 
29416185db85Sdougm void
29426185db85Sdougm sa_set_security_attr(sa_group_t optionset, char *tag, char *value)
29436185db85Sdougm {
29446185db85Sdougm 	set_node_attr((void *)optionset, tag, value);
29456185db85Sdougm }
29466185db85Sdougm 
29476185db85Sdougm /*
29486185db85Sdougm  * is_nodetype(node, type)
29496185db85Sdougm  *
29506185db85Sdougm  * Check to see if node is of the type specified.
29516185db85Sdougm  */
29526185db85Sdougm 
29536185db85Sdougm static int
29546185db85Sdougm is_nodetype(void *node, char *type)
29556185db85Sdougm {
29566185db85Sdougm 	return (strcmp((char *)((xmlNodePtr)node)->name, type) == 0);
29576185db85Sdougm }
29586185db85Sdougm 
295957b448deSdougm /*
296057b448deSdougm  * add_or_update()
296157b448deSdougm  *
296257b448deSdougm  * Add or update a property. Pulled out of sa_set_prop_by_prop for
296357b448deSdougm  * readability.
296457b448deSdougm  */
296557b448deSdougm static int
296657b448deSdougm add_or_update(scfutilhandle_t *scf_handle, int type, scf_value_t *value,
296757b448deSdougm     scf_transaction_entry_t *entry, char *name, char *valstr)
296857b448deSdougm {
296957b448deSdougm 	int ret = SA_SYSTEM_ERR;
297057b448deSdougm 
297157b448deSdougm 	if (value != NULL) {
297257b448deSdougm 		if (type == SA_PROP_OP_ADD)
297357b448deSdougm 			ret = scf_transaction_property_new(scf_handle->trans,
297457b448deSdougm 			    entry, name, SCF_TYPE_ASTRING);
297557b448deSdougm 		else
297657b448deSdougm 			ret = scf_transaction_property_change(scf_handle->trans,
297757b448deSdougm 			    entry, name, SCF_TYPE_ASTRING);
297857b448deSdougm 		if (ret == 0) {
297957b448deSdougm 			ret = scf_value_set_astring(value, valstr);
298057b448deSdougm 			if (ret == 0)
298157b448deSdougm 				ret = scf_entry_add_value(entry, value);
298257b448deSdougm 			if (ret == 0)
298357b448deSdougm 				return (ret);
298457b448deSdougm 			scf_value_destroy(value);
298557b448deSdougm 		} else {
298657b448deSdougm 			scf_entry_destroy(entry);
298757b448deSdougm 		}
298857b448deSdougm 	}
298957b448deSdougm 	return (SA_SYSTEM_ERR);
299057b448deSdougm }
299157b448deSdougm 
29926185db85Sdougm /*
29936185db85Sdougm  * sa_set_prop_by_prop(optionset, group, prop, type)
29946185db85Sdougm  *
29956185db85Sdougm  * Add/remove/update the specified property prop into the optionset or
29966185db85Sdougm  * share. If a share, sort out which property group based on GUID. In
29976185db85Sdougm  * all cases, the appropriate transaction is set (or ZFS share is
29986185db85Sdougm  * marked as needing an update)
29996185db85Sdougm  */
30006185db85Sdougm 
30016185db85Sdougm static int
30026185db85Sdougm sa_set_prop_by_prop(sa_optionset_t optionset, sa_group_t group,
30036185db85Sdougm 			sa_property_t prop, int type)
30046185db85Sdougm {
30056185db85Sdougm 	char *name;
30066185db85Sdougm 	char *valstr;
30076185db85Sdougm 	int ret = SA_OK;
30086185db85Sdougm 	scf_transaction_entry_t *entry;
30096185db85Sdougm 	scf_value_t *value;
30106185db85Sdougm 	int opttype; /* 1 == optionset, 0 == security */
30116185db85Sdougm 	char *id = NULL;
30126185db85Sdougm 	int iszfs = 0;
30136185db85Sdougm 	sa_group_t parent = NULL;
3014da6c28aaSamw 	sa_share_t share = NULL;
3015549ec3ffSdougm 	sa_handle_impl_t impl_handle;
3016549ec3ffSdougm 	scfutilhandle_t  *scf_handle;
30176185db85Sdougm 
3018da6c28aaSamw 	if (!sa_is_persistent(group)) {
30196185db85Sdougm 		/*
30206185db85Sdougm 		 * if the group/share is not persistent we don't need
30216185db85Sdougm 		 * to do anything here
30226185db85Sdougm 		 */
30236185db85Sdougm 		return (SA_OK);
30246185db85Sdougm 	}
3025549ec3ffSdougm 	impl_handle = (sa_handle_impl_t)sa_find_group_handle(group);
302657b448deSdougm 	if (impl_handle == NULL || impl_handle->scfhandle == NULL)
3027549ec3ffSdougm 		return (SA_SYSTEM_ERR);
3028549ec3ffSdougm 	scf_handle = impl_handle->scfhandle;
30296185db85Sdougm 	name = sa_get_property_attr(prop, "type");
30306185db85Sdougm 	valstr = sa_get_property_attr(prop, "value");
30316185db85Sdougm 	entry = scf_entry_create(scf_handle->handle);
30326185db85Sdougm 	opttype = is_nodetype((void *)optionset, "optionset");
30336185db85Sdougm 
3034da6c28aaSamw 	/*
3035da6c28aaSamw 	 * Check for share vs. resource since they need slightly
3036da6c28aaSamw 	 * different treatment given the hierarchy.
3037da6c28aaSamw 	 */
30386185db85Sdougm 	if (valstr != NULL && entry != NULL) {
30396185db85Sdougm 		if (sa_is_share(group)) {
30406185db85Sdougm 			parent = sa_get_parent_group(group);
3041da6c28aaSamw 			share = (sa_share_t)group;
304257b448deSdougm 			if (parent != NULL)
30436185db85Sdougm 				iszfs = is_zfs_group(parent);
3044da6c28aaSamw 		} else if (sa_is_resource(group)) {
3045da6c28aaSamw 			share = sa_get_parent_group(group);
3046da6c28aaSamw 			if (share != NULL)
3047da6c28aaSamw 				parent = sa_get_parent_group(share);
30486185db85Sdougm 		} else {
30496185db85Sdougm 			iszfs = is_zfs_group(group);
30506185db85Sdougm 		}
30516185db85Sdougm 		if (!iszfs) {
30526185db85Sdougm 			if (scf_handle->trans == NULL) {
305357b448deSdougm 				char oname[SA_STRSIZE];
30546185db85Sdougm 				char *groupname = NULL;
3055da6c28aaSamw 				if (share != NULL) {
3056da6c28aaSamw 					if (parent != NULL)
305757b448deSdougm 						groupname =
305857b448deSdougm 						    sa_get_group_attr(parent,
305957b448deSdougm 						    "name");
3060da6c28aaSamw 					id = sa_get_share_attr(
3061da6c28aaSamw 					    (sa_share_t)share, "id");
30626185db85Sdougm 				} else {
306357b448deSdougm 					groupname = sa_get_group_attr(group,
306457b448deSdougm 					    "name");
30656185db85Sdougm 				}
30666185db85Sdougm 				if (groupname != NULL) {
306757b448deSdougm 					ret = sa_get_instance(scf_handle,
306857b448deSdougm 					    groupname);
30696185db85Sdougm 					sa_free_attr_string(groupname);
30706185db85Sdougm 				}
30716185db85Sdougm 				if (opttype)
307257b448deSdougm 					(void) sa_optionset_name(optionset,
307357b448deSdougm 					    oname, sizeof (oname), id);
30746185db85Sdougm 				else
307557b448deSdougm 					(void) sa_security_name(optionset,
307657b448deSdougm 					    oname, sizeof (oname), id);
30776185db85Sdougm 				ret = sa_start_transaction(scf_handle, oname);
30786185db85Sdougm 			}
30796185db85Sdougm 			if (ret == SA_OK) {
30806185db85Sdougm 				switch (type) {
30816185db85Sdougm 				case SA_PROP_OP_REMOVE:
3082549ec3ffSdougm 					ret = scf_transaction_property_delete(
308357b448deSdougm 					    scf_handle->trans, entry, name);
30846185db85Sdougm 					break;
30856185db85Sdougm 				case SA_PROP_OP_ADD:
30866185db85Sdougm 				case SA_PROP_OP_UPDATE:
308757b448deSdougm 					value = scf_value_create(
308857b448deSdougm 					    scf_handle->handle);
308957b448deSdougm 					ret = add_or_update(scf_handle, type,
309057b448deSdougm 					    value, entry, name, valstr);
30916185db85Sdougm 					break;
30926185db85Sdougm 				}
30936185db85Sdougm 			}
30946185db85Sdougm 		} else {
30956185db85Sdougm 			/*
30966185db85Sdougm 			 * ZFS update. The calling function would have updated
30976185db85Sdougm 			 * the internal XML structure. Just need to flag it as
30986185db85Sdougm 			 * changed for ZFS.
30996185db85Sdougm 			 */
31006185db85Sdougm 			zfs_set_update((sa_share_t)group);
31016185db85Sdougm 		}
31026185db85Sdougm 	}
31036185db85Sdougm 
31046185db85Sdougm 	if (name != NULL)
31056185db85Sdougm 		sa_free_attr_string(name);
31066185db85Sdougm 	if (valstr != NULL)
31076185db85Sdougm 		sa_free_attr_string(valstr);
31086185db85Sdougm 	else if (entry != NULL)
31096185db85Sdougm 		scf_entry_destroy(entry);
31106185db85Sdougm 
31116185db85Sdougm 	if (ret == -1)
31126185db85Sdougm 		ret = SA_SYSTEM_ERR;
31136185db85Sdougm 
31146185db85Sdougm 	return (ret);
31156185db85Sdougm }
31166185db85Sdougm 
31176185db85Sdougm /*
31186185db85Sdougm  * sa_create_property(name, value)
31196185db85Sdougm  *
31206185db85Sdougm  * Create a new property with the specified name and value.
31216185db85Sdougm  */
31226185db85Sdougm 
31236185db85Sdougm sa_property_t
31246185db85Sdougm sa_create_property(char *name, char *value)
31256185db85Sdougm {
31266185db85Sdougm 	xmlNodePtr node;
31276185db85Sdougm 
31286185db85Sdougm 	node = xmlNewNode(NULL, (xmlChar *)"option");
31296185db85Sdougm 	if (node != NULL) {
31306185db85Sdougm 		xmlSetProp(node, (xmlChar *)"type", (xmlChar *)name);
31316185db85Sdougm 		xmlSetProp(node, (xmlChar *)"value", (xmlChar *)value);
31326185db85Sdougm 	}
31336185db85Sdougm 	return ((sa_property_t)node);
31346185db85Sdougm }
31356185db85Sdougm 
31366185db85Sdougm /*
31376185db85Sdougm  * sa_add_property(object, property)
31386185db85Sdougm  *
31396185db85Sdougm  * Add the specified property to the object. Issue the appropriate
31406185db85Sdougm  * transaction or mark a ZFS object as needing an update.
31416185db85Sdougm  */
31426185db85Sdougm 
31436185db85Sdougm int
31446185db85Sdougm sa_add_property(void *object, sa_property_t property)
31456185db85Sdougm {
31466185db85Sdougm 	int ret = SA_OK;
31476185db85Sdougm 	sa_group_t parent;
31486185db85Sdougm 	sa_group_t group;
31496185db85Sdougm 	char *proto;
31506185db85Sdougm 
31516185db85Sdougm 	proto = sa_get_optionset_attr(object, "type");
31526185db85Sdougm 	if (property != NULL) {
315357b448deSdougm 		if ((ret = sa_valid_property(object, proto, property)) ==
315457b448deSdougm 		    SA_OK) {
315557b448deSdougm 			property = (sa_property_t)xmlAddChild(
315657b448deSdougm 			    (xmlNodePtr)object, (xmlNodePtr)property);
31576185db85Sdougm 		} else {
31586185db85Sdougm 			if (proto != NULL)
31596185db85Sdougm 				sa_free_attr_string(proto);
31606185db85Sdougm 			return (ret);
31616185db85Sdougm 		}
31626185db85Sdougm 	}
31636185db85Sdougm 
31646185db85Sdougm 	if (proto != NULL)
31656185db85Sdougm 		sa_free_attr_string(proto);
31666185db85Sdougm 
31676185db85Sdougm 	parent = sa_get_parent_group(object);
3168da6c28aaSamw 	if (!sa_is_persistent(parent))
31696185db85Sdougm 		return (ret);
31706185db85Sdougm 
3171da6c28aaSamw 	if (sa_is_resource(parent)) {
3172da6c28aaSamw 		/*
3173da6c28aaSamw 		 * Resources are children of share.  Need to go up two
3174da6c28aaSamw 		 * levels to find the group but the parent needs to be
3175da6c28aaSamw 		 * the share at this point in order to get the "id".
3176da6c28aaSamw 		 */
3177da6c28aaSamw 		parent = sa_get_parent_group(parent);
31786185db85Sdougm 		group = sa_get_parent_group(parent);
3179da6c28aaSamw 	} else if (sa_is_share(parent)) {
3180da6c28aaSamw 		group = sa_get_parent_group(parent);
3181da6c28aaSamw 	} else {
31826185db85Sdougm 		group = parent;
3183da6c28aaSamw 	}
31846185db85Sdougm 
318557b448deSdougm 	if (property == NULL) {
31866185db85Sdougm 		ret = SA_NO_MEMORY;
318757b448deSdougm 	} else {
318857b448deSdougm 		char oname[SA_STRSIZE];
31896185db85Sdougm 
31906185db85Sdougm 		if (!is_zfs_group(group)) {
31916185db85Sdougm 			char *id = NULL;
3192549ec3ffSdougm 			sa_handle_impl_t impl_handle;
3193549ec3ffSdougm 			scfutilhandle_t  *scf_handle;
3194549ec3ffSdougm 
319557b448deSdougm 			impl_handle = (sa_handle_impl_t)sa_find_group_handle(
319657b448deSdougm 			    group);
319757b448deSdougm 			if (impl_handle == NULL ||
319857b448deSdougm 			    impl_handle->scfhandle == NULL)
3199549ec3ffSdougm 				ret = SA_SYSTEM_ERR;
3200549ec3ffSdougm 			if (ret == SA_OK) {
3201549ec3ffSdougm 				scf_handle = impl_handle->scfhandle;
32026185db85Sdougm 				if (sa_is_share((sa_group_t)parent)) {
320357b448deSdougm 					id = sa_get_share_attr(
320457b448deSdougm 					    (sa_share_t)parent, "id");
32056185db85Sdougm 				}
32066185db85Sdougm 				if (scf_handle->trans == NULL) {
320757b448deSdougm 					if (is_nodetype(object, "optionset")) {
320857b448deSdougm 						(void) sa_optionset_name(
320957b448deSdougm 						    (sa_optionset_t)object,
32106185db85Sdougm 						    oname, sizeof (oname), id);
321157b448deSdougm 					} else {
321257b448deSdougm 						(void) sa_security_name(
321357b448deSdougm 						    (sa_optionset_t)object,
32146185db85Sdougm 						    oname, sizeof (oname), id);
321557b448deSdougm 					}
321657b448deSdougm 					ret = sa_start_transaction(scf_handle,
321757b448deSdougm 					    oname);
32186185db85Sdougm 				}
32196185db85Sdougm 				if (ret == SA_OK) {
32206185db85Sdougm 					char *name;
32216185db85Sdougm 					char *value;
322257b448deSdougm 					name = sa_get_property_attr(property,
322357b448deSdougm 					    "type");
322457b448deSdougm 					value = sa_get_property_attr(property,
322557b448deSdougm 					    "value");
32266185db85Sdougm 					if (name != NULL && value != NULL) {
322757b448deSdougm 						if (scf_handle->scf_state ==
322857b448deSdougm 						    SCH_STATE_INIT) {
322957b448deSdougm 							ret = sa_set_property(
323057b448deSdougm 							    scf_handle, name,
323157b448deSdougm 							    value);
323257b448deSdougm 						}
323357b448deSdougm 					} else {
32346185db85Sdougm 						ret = SA_CONFIG_ERR;
323557b448deSdougm 					}
32366185db85Sdougm 					if (name != NULL)
323757b448deSdougm 						sa_free_attr_string(
323857b448deSdougm 						    name);
32396185db85Sdougm 					if (value != NULL)
32406185db85Sdougm 						sa_free_attr_string(value);
32416185db85Sdougm 				}
32426185db85Sdougm 				if (id != NULL)
32436185db85Sdougm 					sa_free_attr_string(id);
3244549ec3ffSdougm 			}
32456185db85Sdougm 		} else {
32466185db85Sdougm 			/*
324757b448deSdougm 			 * ZFS is a special case. We do want
324857b448deSdougm 			 * to allow editing property/security
324957b448deSdougm 			 * lists since we can have a better
325057b448deSdougm 			 * syntax and we also want to keep
325157b448deSdougm 			 * things consistent when possible.
32526185db85Sdougm 			 *
325357b448deSdougm 			 * Right now, we defer until the
325457b448deSdougm 			 * sa_commit_properties so we can get
325557b448deSdougm 			 * them all at once. We do need to
325657b448deSdougm 			 * mark the share as "changed"
32576185db85Sdougm 			 */
32586185db85Sdougm 			zfs_set_update((sa_share_t)parent);
32596185db85Sdougm 		}
32606185db85Sdougm 	}
32616185db85Sdougm 	return (ret);
32626185db85Sdougm }
32636185db85Sdougm 
32646185db85Sdougm /*
32656185db85Sdougm  * sa_remove_property(property)
32666185db85Sdougm  *
32676185db85Sdougm  * Remove the specied property from its containing object. Update the
32686185db85Sdougm  * repository as appropriate.
32696185db85Sdougm  */
32706185db85Sdougm 
32716185db85Sdougm int
32726185db85Sdougm sa_remove_property(sa_property_t property)
32736185db85Sdougm {
32746185db85Sdougm 	int ret = SA_OK;
32756185db85Sdougm 
32766185db85Sdougm 	if (property != NULL) {
32776185db85Sdougm 		sa_optionset_t optionset;
32786185db85Sdougm 		sa_group_t group;
32796185db85Sdougm 		optionset = sa_get_property_parent(property);
32806185db85Sdougm 		if (optionset != NULL) {
32816185db85Sdougm 			group = sa_get_optionset_parent(optionset);
32826185db85Sdougm 			if (group != NULL) {
328357b448deSdougm 				ret = sa_set_prop_by_prop(optionset, group,
328457b448deSdougm 				    property, SA_PROP_OP_REMOVE);
32856185db85Sdougm 			}
32866185db85Sdougm 		}
32876185db85Sdougm 		xmlUnlinkNode((xmlNodePtr)property);
32886185db85Sdougm 		xmlFreeNode((xmlNodePtr)property);
32896185db85Sdougm 	} else {
32906185db85Sdougm 		ret = SA_NO_SUCH_PROP;
32916185db85Sdougm 	}
32926185db85Sdougm 	return (ret);
32936185db85Sdougm }
32946185db85Sdougm 
32956185db85Sdougm /*
32966185db85Sdougm  * sa_update_property(property, value)
32976185db85Sdougm  *
32986185db85Sdougm  * Update the specified property to the new value.  If value is NULL,
32996185db85Sdougm  * we currently treat this as a remove.
33006185db85Sdougm  */
33016185db85Sdougm 
33026185db85Sdougm int
33036185db85Sdougm sa_update_property(sa_property_t property, char *value)
33046185db85Sdougm {
33056185db85Sdougm 	int ret = SA_OK;
33066185db85Sdougm 	if (value == NULL) {
33076185db85Sdougm 		return (sa_remove_property(property));
33086185db85Sdougm 	} else {
33096185db85Sdougm 		sa_optionset_t optionset;
33106185db85Sdougm 		sa_group_t group;
33116185db85Sdougm 		set_node_attr((void *)property, "value", value);
33126185db85Sdougm 		optionset = sa_get_property_parent(property);
33136185db85Sdougm 		if (optionset != NULL) {
33146185db85Sdougm 			group = sa_get_optionset_parent(optionset);
33156185db85Sdougm 			if (group != NULL) {
331657b448deSdougm 				ret = sa_set_prop_by_prop(optionset, group,
331757b448deSdougm 				    property, SA_PROP_OP_UPDATE);
33186185db85Sdougm 			}
33196185db85Sdougm 		} else {
33206185db85Sdougm 			ret = SA_NO_SUCH_PROP;
33216185db85Sdougm 		}
33226185db85Sdougm 	}
33236185db85Sdougm 	return (ret);
33246185db85Sdougm }
33256185db85Sdougm 
33266185db85Sdougm /*
33276185db85Sdougm  * sa_get_protocol_property(propset, prop)
33286185db85Sdougm  *
33296185db85Sdougm  * Get the specified protocol specific property. These are global to
33306185db85Sdougm  * the protocol and not specific to a group or share.
33316185db85Sdougm  */
33326185db85Sdougm 
33336185db85Sdougm sa_property_t
33346185db85Sdougm sa_get_protocol_property(sa_protocol_properties_t propset, char *prop)
33356185db85Sdougm {
33366185db85Sdougm 	xmlNodePtr node = (xmlNodePtr)propset;
33376185db85Sdougm 	xmlChar *value = NULL;
33386185db85Sdougm 
33396185db85Sdougm 	for (node = node->children; node != NULL;
33406185db85Sdougm 	    node = node->next) {
33416185db85Sdougm 		if (xmlStrcmp(node->name, (xmlChar *)"option") == 0) {
33426185db85Sdougm 			if (prop == NULL)
33436185db85Sdougm 				break;
33446185db85Sdougm 			value = xmlGetProp(node, (xmlChar *)"type");
33456185db85Sdougm 			if (value != NULL &&
33466185db85Sdougm 			    xmlStrcasecmp(value, (xmlChar *)prop) == 0) {
33476185db85Sdougm 				break;
33486185db85Sdougm 			}
33496185db85Sdougm 			if (value != NULL) {
33506185db85Sdougm 				xmlFree(value);
33516185db85Sdougm 				value = NULL;
33526185db85Sdougm 			}
33536185db85Sdougm 		}
33546185db85Sdougm 	}
33556185db85Sdougm 	if (value != NULL)
33566185db85Sdougm 		xmlFree(value);
33576185db85Sdougm 	if (node != NULL && xmlStrcmp(node->name, (xmlChar *)"option") != 0) {
335857b448deSdougm 		/*
335957b448deSdougm 		 * avoid a non option node -- it is possible to be a
336057b448deSdougm 		 * text node
336157b448deSdougm 		 */
33626185db85Sdougm 		node = NULL;
33636185db85Sdougm 	}
33646185db85Sdougm 	return ((sa_property_t)node);
33656185db85Sdougm }
33666185db85Sdougm 
33676185db85Sdougm /*
33686185db85Sdougm  * sa_get_next_protocol_property(prop)
33696185db85Sdougm  *
33706185db85Sdougm  * Get the next protocol specific property in the list.
33716185db85Sdougm  */
33726185db85Sdougm 
33736185db85Sdougm sa_property_t
33746185db85Sdougm sa_get_next_protocol_property(sa_property_t prop)
33756185db85Sdougm {
33766185db85Sdougm 	xmlNodePtr node;
33776185db85Sdougm 
33786185db85Sdougm 	for (node = ((xmlNodePtr)prop)->next; node != NULL;
33796185db85Sdougm 	    node = node->next) {
33806185db85Sdougm 		if (xmlStrcmp(node->name, (xmlChar *)"option") == 0) {
33816185db85Sdougm 			break;
33826185db85Sdougm 		}
33836185db85Sdougm 	}
33846185db85Sdougm 	return ((sa_property_t)node);
33856185db85Sdougm }
33866185db85Sdougm 
33876185db85Sdougm /*
33886185db85Sdougm  * sa_set_protocol_property(prop, value)
33896185db85Sdougm  *
33906185db85Sdougm  * Set the specified property to have the new value.  The protocol
33916185db85Sdougm  * specific plugin will then be called to update the property.
33926185db85Sdougm  */
33936185db85Sdougm 
33946185db85Sdougm int
33956185db85Sdougm sa_set_protocol_property(sa_property_t prop, char *value)
33966185db85Sdougm {
33976185db85Sdougm 	sa_protocol_properties_t propset;
33986185db85Sdougm 	char *proto;
33996185db85Sdougm 	int ret = SA_INVALID_PROTOCOL;
34006185db85Sdougm 
34016185db85Sdougm 	propset = ((xmlNodePtr)prop)->parent;
34026185db85Sdougm 	if (propset != NULL) {
34036185db85Sdougm 		proto = sa_get_optionset_attr(propset, "type");
34046185db85Sdougm 		if (proto != NULL) {
34056185db85Sdougm 			set_node_attr((xmlNodePtr)prop, "value", value);
34066185db85Sdougm 			ret = sa_proto_set_property(proto, prop);
34073472f5dcSdougm 			sa_free_attr_string(proto);
34086185db85Sdougm 		}
34096185db85Sdougm 	}
34106185db85Sdougm 	return (ret);
34116185db85Sdougm }
34126185db85Sdougm 
34136185db85Sdougm /*
34146185db85Sdougm  * sa_add_protocol_property(propset, prop)
34156185db85Sdougm  *
3416da6c28aaSamw  * Add a new property to the protocol specific property set.
34176185db85Sdougm  */
34186185db85Sdougm 
34196185db85Sdougm int
34206185db85Sdougm sa_add_protocol_property(sa_protocol_properties_t propset, sa_property_t prop)
34216185db85Sdougm {
34226185db85Sdougm 	xmlNodePtr node;
34236185db85Sdougm 
34246185db85Sdougm 	/* should check for legitimacy */
34256185db85Sdougm 	node = xmlAddChild((xmlNodePtr)propset, (xmlNodePtr)prop);
34266185db85Sdougm 	if (node != NULL)
34276185db85Sdougm 		return (SA_OK);
34286185db85Sdougm 	return (SA_NO_MEMORY);
34296185db85Sdougm }
34306185db85Sdougm 
34316185db85Sdougm /*
34326185db85Sdougm  * sa_create_protocol_properties(proto)
34336185db85Sdougm  *
3434da6c28aaSamw  * Create a protocol specific property set.
34356185db85Sdougm  */
34366185db85Sdougm 
34376185db85Sdougm sa_protocol_properties_t
34386185db85Sdougm sa_create_protocol_properties(char *proto)
34396185db85Sdougm {
34406185db85Sdougm 	xmlNodePtr node;
344157b448deSdougm 
34426185db85Sdougm 	node = xmlNewNode(NULL, (xmlChar *)"propertyset");
344357b448deSdougm 	if (node != NULL)
34446185db85Sdougm 		xmlSetProp(node, (xmlChar *)"type", (xmlChar *)proto);
34456185db85Sdougm 	return (node);
34466185db85Sdougm }
3447da6c28aaSamw 
3448da6c28aaSamw /*
3449da6c28aaSamw  * sa_get_share_resource(share, resource)
3450da6c28aaSamw  *
3451da6c28aaSamw  * Get the named resource from the share, if it exists. If resource is
3452da6c28aaSamw  * NULL, get the first resource.
3453da6c28aaSamw  */
3454da6c28aaSamw 
3455da6c28aaSamw sa_resource_t
3456da6c28aaSamw sa_get_share_resource(sa_share_t share, char *resource)
3457da6c28aaSamw {
3458da6c28aaSamw 	xmlNodePtr node = NULL;
3459da6c28aaSamw 	xmlChar *name;
3460da6c28aaSamw 
3461da6c28aaSamw 	if (share != NULL) {
3462da6c28aaSamw 		for (node = ((xmlNodePtr)share)->children; node != NULL;
3463da6c28aaSamw 		    node = node->next) {
3464da6c28aaSamw 			if (xmlStrcmp(node->name, (xmlChar *)"resource") == 0) {
3465da6c28aaSamw 				if (resource == NULL) {
3466da6c28aaSamw 					/*
3467da6c28aaSamw 					 * We are looking for the first
3468da6c28aaSamw 					 * resource node and not a names
3469da6c28aaSamw 					 * resource.
3470da6c28aaSamw 					 */
3471da6c28aaSamw 					break;
3472da6c28aaSamw 				} else {
3473da6c28aaSamw 					/* is it the correct share? */
3474da6c28aaSamw 					name = xmlGetProp(node,
3475da6c28aaSamw 					    (xmlChar *)"name");
3476da6c28aaSamw 					if (name != NULL &&
3477da6c28aaSamw 					    xmlStrcasecmp(name,
3478da6c28aaSamw 					    (xmlChar *)resource) == 0) {
3479da6c28aaSamw 						xmlFree(name);
3480da6c28aaSamw 						break;
3481da6c28aaSamw 					}
3482da6c28aaSamw 					xmlFree(name);
3483da6c28aaSamw 				}
3484da6c28aaSamw 			}
3485da6c28aaSamw 		}
3486da6c28aaSamw 	}
3487da6c28aaSamw 	return ((sa_resource_t)node);
3488da6c28aaSamw }
3489da6c28aaSamw 
3490da6c28aaSamw /*
3491da6c28aaSamw  * sa_get_next_resource(resource)
3492da6c28aaSamw  *	Return the next share following the specified share
3493da6c28aaSamw  *	from the internal list of shares. Returns NULL if there
3494da6c28aaSamw  *	are no more shares.  The list is relative to the same
3495da6c28aaSamw  *	group.
3496da6c28aaSamw  */
3497da6c28aaSamw sa_share_t
3498da6c28aaSamw sa_get_next_resource(sa_resource_t resource)
3499da6c28aaSamw {
3500da6c28aaSamw 	xmlNodePtr node = NULL;
3501da6c28aaSamw 
3502da6c28aaSamw 	if (resource != NULL) {
3503da6c28aaSamw 		for (node = ((xmlNodePtr)resource)->next; node != NULL;
3504da6c28aaSamw 		    node = node->next) {
3505da6c28aaSamw 			if (xmlStrcmp(node->name, (xmlChar *)"resource") == 0)
3506da6c28aaSamw 				break;
3507da6c28aaSamw 		}
3508da6c28aaSamw 	}
3509da6c28aaSamw 	return ((sa_share_t)node);
3510da6c28aaSamw }
3511da6c28aaSamw 
3512da6c28aaSamw /*
3513da6c28aaSamw  * _sa_get_next_resource_index(share)
3514da6c28aaSamw  *
3515da6c28aaSamw  * get the next resource index number (one greater then current largest)
3516da6c28aaSamw  */
3517da6c28aaSamw 
3518da6c28aaSamw static int
3519da6c28aaSamw _sa_get_next_resource_index(sa_share_t share)
3520da6c28aaSamw {
3521da6c28aaSamw 	sa_resource_t resource;
3522da6c28aaSamw 	int index = 0;
3523da6c28aaSamw 	char *id;
3524da6c28aaSamw 
3525da6c28aaSamw 	for (resource = sa_get_share_resource(share, NULL);
3526da6c28aaSamw 	    resource != NULL;
3527da6c28aaSamw 	    resource = sa_get_next_resource(resource)) {
3528da6c28aaSamw 		id = get_node_attr((void *)resource, "id");
3529da6c28aaSamw 		if (id != NULL) {
3530da6c28aaSamw 			int val;
3531da6c28aaSamw 			val = atoi(id);
3532da6c28aaSamw 			if (val > index)
3533da6c28aaSamw 				index = val;
3534da6c28aaSamw 			sa_free_attr_string(id);
3535da6c28aaSamw 		}
3536da6c28aaSamw 	}
3537da6c28aaSamw 	return (index + 1);
3538da6c28aaSamw }
3539da6c28aaSamw 
3540da6c28aaSamw 
3541da6c28aaSamw /*
3542da6c28aaSamw  * sa_add_resource(share, resource, persist, &err)
3543da6c28aaSamw  *
3544da6c28aaSamw  * Adds a new resource name associated with share. The resource name
3545da6c28aaSamw  * must be unique in the system and will be case insensitive (eventually).
3546da6c28aaSamw  */
3547da6c28aaSamw 
3548da6c28aaSamw sa_resource_t
3549da6c28aaSamw sa_add_resource(sa_share_t share, char *resource, int persist, int *error)
3550da6c28aaSamw {
3551da6c28aaSamw 	xmlNodePtr node;
3552da6c28aaSamw 	int err = SA_OK;
3553da6c28aaSamw 	sa_resource_t res;
3554da6c28aaSamw 	sa_group_t group;
3555da6c28aaSamw 	sa_handle_t handle;
3556da6c28aaSamw 	char istring[8]; /* just big enough for an integer value */
3557da6c28aaSamw 	int index;
3558da6c28aaSamw 
3559da6c28aaSamw 	group = sa_get_parent_group(share);
3560da6c28aaSamw 	handle = sa_find_group_handle(group);
3561da6c28aaSamw 	res = sa_find_resource(handle, resource);
3562da6c28aaSamw 	if (res != NULL) {
3563da6c28aaSamw 		err = SA_DUPLICATE_NAME;
3564da6c28aaSamw 		res = NULL;
3565da6c28aaSamw 	} else {
3566da6c28aaSamw 		node = xmlNewChild((xmlNodePtr)share, NULL,
3567da6c28aaSamw 		    (xmlChar *)"resource", NULL);
3568da6c28aaSamw 		if (node != NULL) {
3569da6c28aaSamw 			xmlSetProp(node, (xmlChar *)"name",
3570da6c28aaSamw 			    (xmlChar *)resource);
3571da6c28aaSamw 			xmlSetProp(node, (xmlChar *)"type", persist ?
3572da6c28aaSamw 			    (xmlChar *)"persist" : (xmlChar *)"transient");
3573da6c28aaSamw 			if (persist != SA_SHARE_TRANSIENT) {
3574da6c28aaSamw 				index = _sa_get_next_resource_index(share);
3575da6c28aaSamw 				(void) snprintf(istring, sizeof (istring), "%d",
3576da6c28aaSamw 				    index);
3577da6c28aaSamw 				xmlSetProp(node, (xmlChar *)"id",
3578da6c28aaSamw 				    (xmlChar *)istring);
3579da6c28aaSamw 				if (!sa_group_is_zfs(group) &&
3580da6c28aaSamw 				    sa_is_persistent((sa_group_t)share)) {
3581da6c28aaSamw 					/* ZFS doesn't use resource names */
3582da6c28aaSamw 					sa_handle_impl_t ihandle;
3583da6c28aaSamw 					ihandle = (sa_handle_impl_t)
3584da6c28aaSamw 					    sa_find_group_handle(
3585da6c28aaSamw 					    group);
3586da6c28aaSamw 					if (ihandle != NULL)
3587da6c28aaSamw 						err = sa_commit_share(
3588da6c28aaSamw 						    ihandle->scfhandle, group,
3589da6c28aaSamw 						    share);
3590da6c28aaSamw 					else
3591da6c28aaSamw 						err = SA_SYSTEM_ERR;
3592da6c28aaSamw 				}
3593da6c28aaSamw 			}
3594da6c28aaSamw 		}
3595da6c28aaSamw 	}
3596da6c28aaSamw 	if (error != NULL)
3597da6c28aaSamw 		*error = err;
3598da6c28aaSamw 	return ((sa_resource_t)node);
3599da6c28aaSamw }
3600da6c28aaSamw 
3601da6c28aaSamw /*
3602da6c28aaSamw  * sa_remove_resource(resource)
3603da6c28aaSamw  *
3604da6c28aaSamw  * Remove the resource name from the share (and the system)
3605da6c28aaSamw  */
3606da6c28aaSamw 
3607da6c28aaSamw int
3608da6c28aaSamw sa_remove_resource(sa_resource_t resource)
3609da6c28aaSamw {
3610da6c28aaSamw 	sa_share_t share;
3611da6c28aaSamw 	sa_group_t group;
3612da6c28aaSamw 	char *type;
3613da6c28aaSamw 	int ret = SA_OK;
3614da6c28aaSamw 	int transient = 0;
3615*55bf511dSas200622 	sa_optionset_t opt;
3616da6c28aaSamw 
3617da6c28aaSamw 	share = sa_get_resource_parent(resource);
3618da6c28aaSamw 	type = sa_get_share_attr(share, "type");
3619da6c28aaSamw 	group = sa_get_parent_group(share);
3620da6c28aaSamw 
3621da6c28aaSamw 
3622da6c28aaSamw 	if (type != NULL) {
3623da6c28aaSamw 		if (strcmp(type, "persist") != 0)
3624da6c28aaSamw 			transient = 1;
3625da6c28aaSamw 		sa_free_attr_string(type);
3626da6c28aaSamw 	}
3627da6c28aaSamw 
3628*55bf511dSas200622 	/* Disable the resource for all protocols. */
3629*55bf511dSas200622 	(void) sa_disable_resource(resource, NULL);
3630*55bf511dSas200622 
3631*55bf511dSas200622 	/* Remove any optionsets from the resource. */
3632*55bf511dSas200622 	for (opt = sa_get_optionset(resource, NULL);
3633*55bf511dSas200622 	    opt != NULL;
3634*55bf511dSas200622 	    opt = sa_get_next_optionset(opt))
3635*55bf511dSas200622 		(void) sa_destroy_optionset(opt);
3636*55bf511dSas200622 
3637da6c28aaSamw 	/* Remove from the share */
3638da6c28aaSamw 	xmlUnlinkNode((xmlNode *)resource);
3639da6c28aaSamw 	xmlFreeNode((xmlNode *)resource);
3640da6c28aaSamw 
3641da6c28aaSamw 	/* only do SMF action if permanent and not ZFS */
3642da6c28aaSamw 	if (!transient && !sa_group_is_zfs(group)) {
3643da6c28aaSamw 		sa_handle_impl_t ihandle;
3644da6c28aaSamw 		ihandle = (sa_handle_impl_t)sa_find_group_handle(group);
3645da6c28aaSamw 		if (ihandle != NULL)
3646da6c28aaSamw 			ret = sa_commit_share(ihandle->scfhandle, group, share);
3647da6c28aaSamw 		else
3648da6c28aaSamw 			ret = SA_SYSTEM_ERR;
3649da6c28aaSamw 	}
3650da6c28aaSamw 	return (ret);
3651da6c28aaSamw }
3652da6c28aaSamw 
3653da6c28aaSamw /*
3654da6c28aaSamw  * proto_resource_rename(handle, group, resource, newname)
3655da6c28aaSamw  *
3656da6c28aaSamw  * Helper function for sa_rename_resource that notifies the protocol
3657da6c28aaSamw  * of a resource name change prior to a config repository update.
3658da6c28aaSamw  */
3659da6c28aaSamw static int
3660da6c28aaSamw proto_rename_resource(sa_handle_t handle, sa_group_t group,
3661da6c28aaSamw     sa_resource_t resource, char *newname)
3662da6c28aaSamw {
3663da6c28aaSamw 	sa_optionset_t optionset;
3664da6c28aaSamw 	int ret = SA_OK;
3665da6c28aaSamw 	int err;
3666da6c28aaSamw 
3667da6c28aaSamw 	for (optionset = sa_get_optionset(group, NULL);
3668da6c28aaSamw 	    optionset != NULL;
3669da6c28aaSamw 	    optionset = sa_get_next_optionset(optionset)) {
3670da6c28aaSamw 		char *type;
3671da6c28aaSamw 		type = sa_get_optionset_attr(optionset, "type");
3672da6c28aaSamw 		if (type != NULL) {
3673da6c28aaSamw 			err = sa_proto_rename_resource(handle, type, resource,
3674da6c28aaSamw 			    newname);
3675da6c28aaSamw 			if (err != SA_OK)
3676da6c28aaSamw 				ret = err;
3677da6c28aaSamw 			sa_free_attr_string(type);
3678da6c28aaSamw 		}
3679da6c28aaSamw 	}
3680da6c28aaSamw 	return (ret);
3681da6c28aaSamw }
3682da6c28aaSamw 
3683da6c28aaSamw /*
3684da6c28aaSamw  * sa_rename_resource(resource, newname)
3685da6c28aaSamw  *
3686da6c28aaSamw  * Rename the resource to the new name, if it is unique.
3687da6c28aaSamw  */
3688da6c28aaSamw 
3689da6c28aaSamw int
3690da6c28aaSamw sa_rename_resource(sa_resource_t resource, char *newname)
3691da6c28aaSamw {
3692da6c28aaSamw 	sa_share_t share;
3693da6c28aaSamw 	sa_group_t group = NULL;
3694da6c28aaSamw 	sa_resource_t target;
3695da6c28aaSamw 	int ret = SA_CONFIG_ERR;
3696da6c28aaSamw 	sa_handle_t handle = NULL;
3697da6c28aaSamw 
3698da6c28aaSamw 	share = sa_get_resource_parent(resource);
3699da6c28aaSamw 	if (share == NULL)
3700da6c28aaSamw 		return (ret);
3701da6c28aaSamw 
3702da6c28aaSamw 	group = sa_get_parent_group(share);
3703da6c28aaSamw 	if (group == NULL)
3704da6c28aaSamw 		return (ret);
3705da6c28aaSamw 
3706da6c28aaSamw 	handle = (sa_handle_impl_t)sa_find_group_handle(group);
3707da6c28aaSamw 	if (handle == NULL)
3708da6c28aaSamw 		return (ret);
3709da6c28aaSamw 
3710da6c28aaSamw 	target = sa_find_resource(handle, newname);
3711da6c28aaSamw 	if (target != NULL) {
3712da6c28aaSamw 		ret = SA_DUPLICATE_NAME;
3713da6c28aaSamw 	} else {
3714da6c28aaSamw 		/*
3715da6c28aaSamw 		 * Everything appears to be valid at this
3716da6c28aaSamw 		 * point. Change the name of the active share and then
3717da6c28aaSamw 		 * update the share in the appropriate repository.
3718da6c28aaSamw 		 */
3719da6c28aaSamw 		ret = proto_rename_resource(handle, group, resource, newname);
3720da6c28aaSamw 		set_node_attr(resource, "name", newname);
3721da6c28aaSamw 		if (!sa_group_is_zfs(group) &&
3722da6c28aaSamw 		    sa_is_persistent((sa_group_t)share)) {
3723da6c28aaSamw 			sa_handle_impl_t ihandle = (sa_handle_impl_t)handle;
3724da6c28aaSamw 			ret = sa_commit_share(ihandle->scfhandle, group,
3725da6c28aaSamw 			    share);
3726da6c28aaSamw 		}
3727da6c28aaSamw 	}
3728da6c28aaSamw 	return (ret);
3729da6c28aaSamw }
3730da6c28aaSamw 
3731da6c28aaSamw /*
3732da6c28aaSamw  * sa_get_resource_attr(resource, tag)
3733da6c28aaSamw  *
3734da6c28aaSamw  * Get the named attribute of the resource. "name" and "id" are
3735da6c28aaSamw  * currently defined.  NULL if tag not defined.
3736da6c28aaSamw  */
3737da6c28aaSamw 
3738da6c28aaSamw char *
3739da6c28aaSamw sa_get_resource_attr(sa_resource_t resource, char *tag)
3740da6c28aaSamw {
3741da6c28aaSamw 	return (get_node_attr((void *)resource, tag));
3742da6c28aaSamw }
3743da6c28aaSamw 
3744da6c28aaSamw /*
3745da6c28aaSamw  * sa_set_resource_attr(resource, tag, value)
3746da6c28aaSamw  *
3747da6c28aaSamw  * Get the named attribute of the resource. "name" and "id" are
3748da6c28aaSamw  * currently defined.  NULL if tag not defined. Currently we don't do
3749da6c28aaSamw  * much, but additional checking may be needed in the future.
3750da6c28aaSamw  */
3751da6c28aaSamw 
3752da6c28aaSamw int
3753da6c28aaSamw sa_set_resource_attr(sa_resource_t resource, char *tag, char *value)
3754da6c28aaSamw {
3755da6c28aaSamw 	set_node_attr((void *)resource, tag, value);
3756da6c28aaSamw 	return (SA_OK);
3757da6c28aaSamw }
3758da6c28aaSamw 
3759da6c28aaSamw /*
3760da6c28aaSamw  * sa_get_resource_parent(resource_t)
3761da6c28aaSamw  *
3762da6c28aaSamw  * Returns the share associated with the resource.
3763da6c28aaSamw  */
3764da6c28aaSamw 
3765da6c28aaSamw sa_share_t
3766da6c28aaSamw sa_get_resource_parent(sa_resource_t resource)
3767da6c28aaSamw {
3768da6c28aaSamw 	sa_share_t share = NULL;
3769da6c28aaSamw 
3770da6c28aaSamw 	if (resource != NULL)
3771da6c28aaSamw 		share = (sa_share_t)((xmlNodePtr)resource)->parent;
3772da6c28aaSamw 	return (share);
3773da6c28aaSamw }
3774da6c28aaSamw 
3775da6c28aaSamw /*
3776da6c28aaSamw  * find_resource(group, name)
3777da6c28aaSamw  *
3778da6c28aaSamw  * Find the resource within the group.
3779da6c28aaSamw  */
3780da6c28aaSamw 
3781da6c28aaSamw static sa_resource_t
3782da6c28aaSamw find_resource(sa_group_t group, char *resname)
3783da6c28aaSamw {
3784da6c28aaSamw 	sa_share_t share;
3785da6c28aaSamw 	sa_resource_t resource = NULL;
3786da6c28aaSamw 	char *name;
3787da6c28aaSamw 
3788da6c28aaSamw 	/* Iterate over all the shares and resources in the group. */
3789da6c28aaSamw 	for (share = sa_get_share(group, NULL);
3790da6c28aaSamw 	    share != NULL && resource == NULL;
3791da6c28aaSamw 	    share = sa_get_next_share(share)) {
3792da6c28aaSamw 		for (resource = sa_get_share_resource(share, NULL);
3793da6c28aaSamw 		    resource != NULL;
3794da6c28aaSamw 		    resource = sa_get_next_resource(resource)) {
3795da6c28aaSamw 			name = sa_get_resource_attr(resource, "name");
3796da6c28aaSamw 			if (name != NULL && xmlStrcasecmp((xmlChar*)name,
3797da6c28aaSamw 			    (xmlChar*)resname) == 0) {
3798da6c28aaSamw 				sa_free_attr_string(name);
3799da6c28aaSamw 				break;
3800da6c28aaSamw 			}
3801da6c28aaSamw 			if (name != NULL) {
3802da6c28aaSamw 				sa_free_attr_string(name);
3803da6c28aaSamw 			}
3804da6c28aaSamw 		}
3805da6c28aaSamw 	}
3806da6c28aaSamw 	return (resource);
3807da6c28aaSamw }
3808da6c28aaSamw 
3809da6c28aaSamw /*
3810da6c28aaSamw  * sa_find_resource(name)
3811da6c28aaSamw  *
3812da6c28aaSamw  * Find the named resource in the system.
3813da6c28aaSamw  */
3814da6c28aaSamw 
3815da6c28aaSamw sa_resource_t
3816da6c28aaSamw sa_find_resource(sa_handle_t handle, char *name)
3817da6c28aaSamw {
3818da6c28aaSamw 	sa_group_t group;
3819da6c28aaSamw 	sa_group_t zgroup;
3820da6c28aaSamw 	sa_resource_t resource = NULL;
3821da6c28aaSamw 
3822da6c28aaSamw 	/*
3823da6c28aaSamw 	 * Iterate over all groups and zfs subgroups and check for
3824da6c28aaSamw 	 * resource name in them.
3825da6c28aaSamw 	 */
3826da6c28aaSamw 	for (group = sa_get_group(handle, NULL); group != NULL;
3827da6c28aaSamw 	    group = sa_get_next_group(group)) {
3828da6c28aaSamw 
3829da6c28aaSamw 		if (is_zfs_group(group)) {
3830da6c28aaSamw 			for (zgroup =
3831da6c28aaSamw 			    (sa_group_t)_sa_get_child_node((xmlNodePtr)group,
3832da6c28aaSamw 			    (xmlChar *)"group");
3833da6c28aaSamw 			    zgroup != NULL && resource == NULL;
3834da6c28aaSamw 			    zgroup = sa_get_next_group(zgroup)) {
3835da6c28aaSamw 				resource = find_resource(zgroup, name);
3836da6c28aaSamw 			}
3837da6c28aaSamw 		} else {
3838da6c28aaSamw 			resource = find_resource(group, name);
3839da6c28aaSamw 		}
3840da6c28aaSamw 		if (resource != NULL)
3841da6c28aaSamw 			break;
3842da6c28aaSamw 	}
3843da6c28aaSamw 	return (resource);
3844da6c28aaSamw }
3845da6c28aaSamw 
3846da6c28aaSamw /*
3847da6c28aaSamw  * sa_get_resource(group, resource)
3848da6c28aaSamw  *
3849da6c28aaSamw  * Search all the shares in the specified group for a share with a
3850da6c28aaSamw  * resource name matching the one specified.
3851da6c28aaSamw  *
3852da6c28aaSamw  * In the future, it may be advantageous to allow group to be NULL and
3853da6c28aaSamw  * search all groups but that isn't needed at present.
3854da6c28aaSamw  */
3855da6c28aaSamw 
3856da6c28aaSamw sa_resource_t
3857da6c28aaSamw sa_get_resource(sa_group_t group, char *resource)
3858da6c28aaSamw {
3859da6c28aaSamw 	sa_share_t share = NULL;
3860da6c28aaSamw 	sa_resource_t res = NULL;
3861da6c28aaSamw 
3862da6c28aaSamw 	if (resource != NULL) {
3863da6c28aaSamw 		for (share = sa_get_share(group, NULL);
3864da6c28aaSamw 		    share != NULL && res == NULL;
3865da6c28aaSamw 		    share = sa_get_next_share(share)) {
3866da6c28aaSamw 			res = sa_get_share_resource(share, resource);
3867da6c28aaSamw 		}
3868da6c28aaSamw 	}
3869da6c28aaSamw 	return (res);
3870da6c28aaSamw }
3871da6c28aaSamw 
3872da6c28aaSamw /*
3873da6c28aaSamw  * sa_enable_resource, protocol)
3874da6c28aaSamw  *	Disable the specified share to the specified protocol.
3875da6c28aaSamw  *	If protocol is NULL, then all protocols.
3876da6c28aaSamw  */
3877da6c28aaSamw int
3878da6c28aaSamw sa_enable_resource(sa_resource_t resource, char *protocol)
3879da6c28aaSamw {
3880da6c28aaSamw 	int ret = SA_OK;
3881da6c28aaSamw 	char **protocols;
3882da6c28aaSamw 	int numproto;
3883da6c28aaSamw 
3884da6c28aaSamw 	if (protocol != NULL) {
3885da6c28aaSamw 		ret = sa_proto_share_resource(protocol, resource);
3886da6c28aaSamw 	} else {
3887da6c28aaSamw 		/* need to do all protocols */
3888da6c28aaSamw 		if ((numproto = sa_get_protocols(&protocols)) >= 0) {
3889da6c28aaSamw 			int i, err;
3890da6c28aaSamw 			for (i = 0; i < numproto; i++) {
3891da6c28aaSamw 				err = sa_proto_share_resource(
3892da6c28aaSamw 				    protocols[i], resource);
3893da6c28aaSamw 				if (err != SA_OK)
3894da6c28aaSamw 					ret = err;
3895da6c28aaSamw 			}
3896da6c28aaSamw 			free(protocols);
3897da6c28aaSamw 		}
3898da6c28aaSamw 	}
3899da6c28aaSamw 	if (ret == SA_OK)
3900da6c28aaSamw 		(void) sa_set_resource_attr(resource, "shared", NULL);
3901da6c28aaSamw 
3902da6c28aaSamw 	return (ret);
3903da6c28aaSamw }
3904da6c28aaSamw 
3905da6c28aaSamw /*
3906da6c28aaSamw  * sa_disable_resource(resource, protocol)
3907da6c28aaSamw  *
3908da6c28aaSamw  *	Disable the specified share for the specified protocol.  If
3909da6c28aaSamw  *	protocol is NULL, then all protocols.  If the underlying
3910da6c28aaSamw  *	protocol doesn't implement disable at the resource level, we
3911da6c28aaSamw  *	disable at the share level.
3912da6c28aaSamw  */
3913da6c28aaSamw int
3914da6c28aaSamw sa_disable_resource(sa_resource_t resource, char *protocol)
3915da6c28aaSamw {
3916da6c28aaSamw 	int ret = SA_OK;
3917da6c28aaSamw 	char **protocols;
3918da6c28aaSamw 	int numproto;
3919da6c28aaSamw 
3920da6c28aaSamw 	if (protocol != NULL) {
3921da6c28aaSamw 		ret = sa_proto_unshare_resource(protocol, resource);
3922da6c28aaSamw 		if (ret == SA_NOT_IMPLEMENTED) {
3923da6c28aaSamw 			sa_share_t parent;
3924da6c28aaSamw 			/*
3925da6c28aaSamw 			 * The protocol doesn't implement unshare
3926da6c28aaSamw 			 * resource. That implies that resource names are
3927da6c28aaSamw 			 * simple aliases for this protocol so we need to
3928da6c28aaSamw 			 * unshare the share.
3929da6c28aaSamw 			 */
3930da6c28aaSamw 			parent = sa_get_resource_parent(resource);
3931da6c28aaSamw 			if (parent != NULL)
3932da6c28aaSamw 				ret = sa_disable_share(parent, protocol);
3933da6c28aaSamw 			else
3934da6c28aaSamw 				ret = SA_CONFIG_ERR;
3935da6c28aaSamw 		}
3936da6c28aaSamw 	} else {
3937da6c28aaSamw 		/* need to do all protocols */
3938da6c28aaSamw 		if ((numproto = sa_get_protocols(&protocols)) >= 0) {
3939da6c28aaSamw 			int i, err;
3940da6c28aaSamw 			for (i = 0; i < numproto; i++) {
3941da6c28aaSamw 				err = sa_proto_unshare_resource(protocols[i],
3942da6c28aaSamw 				    resource);
3943da6c28aaSamw 				if (err == SA_NOT_SUPPORTED) {
3944da6c28aaSamw 					sa_share_t parent;
3945da6c28aaSamw 					parent = sa_get_resource_parent(
3946da6c28aaSamw 					    resource);
3947da6c28aaSamw 					if (parent != NULL)
3948da6c28aaSamw 						err = sa_disable_share(parent,
3949da6c28aaSamw 						    protocols[i]);
3950da6c28aaSamw 					else
3951da6c28aaSamw 						err = SA_CONFIG_ERR;
3952da6c28aaSamw 				}
3953da6c28aaSamw 				if (err != SA_OK)
3954da6c28aaSamw 					ret = err;
3955da6c28aaSamw 			}
3956da6c28aaSamw 			free(protocols);
3957da6c28aaSamw 		}
3958da6c28aaSamw 	}
3959da6c28aaSamw 	if (ret == SA_OK)
3960da6c28aaSamw 		(void) sa_set_resource_attr(resource, "shared", NULL);
3961da6c28aaSamw 
3962da6c28aaSamw 	return (ret);
3963da6c28aaSamw }
3964da6c28aaSamw 
3965da6c28aaSamw /*
3966da6c28aaSamw  * sa_set_resource_description(resource, content)
3967da6c28aaSamw  *
3968da6c28aaSamw  * Set the description of share to content.
3969da6c28aaSamw  */
3970da6c28aaSamw 
3971da6c28aaSamw int
3972da6c28aaSamw sa_set_resource_description(sa_resource_t resource, char *content)
3973da6c28aaSamw {
3974da6c28aaSamw 	xmlNodePtr node;
3975da6c28aaSamw 	sa_group_t group;
3976da6c28aaSamw 	sa_share_t share;
3977da6c28aaSamw 	int ret = SA_OK;
3978da6c28aaSamw 
3979da6c28aaSamw 	for (node = ((xmlNodePtr)resource)->children;
3980da6c28aaSamw 	    node != NULL;
3981da6c28aaSamw 	    node = node->next) {
3982da6c28aaSamw 		if (xmlStrcmp(node->name, (xmlChar *)"description") == 0) {
3983da6c28aaSamw 			break;
3984da6c28aaSamw 		}
3985da6c28aaSamw 	}
3986da6c28aaSamw 
3987da6c28aaSamw 	/* no existing description but want to add */
3988da6c28aaSamw 	if (node == NULL && content != NULL) {
3989da6c28aaSamw 		/* add a description */
3990da6c28aaSamw 		node = _sa_set_share_description(resource, content);
3991da6c28aaSamw 	} else if (node != NULL && content != NULL) {
3992da6c28aaSamw 		/* update a description */
3993da6c28aaSamw 		xmlNodeSetContent(node, (xmlChar *)content);
3994da6c28aaSamw 	} else if (node != NULL && content == NULL) {
3995da6c28aaSamw 		/* remove an existing description */
3996da6c28aaSamw 		xmlUnlinkNode(node);
3997da6c28aaSamw 		xmlFreeNode(node);
3998da6c28aaSamw 	}
3999da6c28aaSamw 	share = sa_get_resource_parent(resource);
4000da6c28aaSamw 	group = sa_get_parent_group(share);
4001da6c28aaSamw 	if (group != NULL && sa_is_persistent(share)) {
4002da6c28aaSamw 		sa_handle_impl_t impl_handle;
4003da6c28aaSamw 		impl_handle = (sa_handle_impl_t)sa_find_group_handle(group);
4004da6c28aaSamw 		if (impl_handle != NULL)
4005da6c28aaSamw 			ret = sa_commit_share(impl_handle->scfhandle,
4006da6c28aaSamw 			    group, share);
4007da6c28aaSamw 		else
4008da6c28aaSamw 			ret = SA_SYSTEM_ERR;
4009da6c28aaSamw 	}
4010da6c28aaSamw 	return (ret);
4011da6c28aaSamw }
4012da6c28aaSamw 
4013da6c28aaSamw /*
4014da6c28aaSamw  * sa_get_resource_description(share)
4015da6c28aaSamw  *
4016da6c28aaSamw  * Return the description text for the specified share if it
4017da6c28aaSamw  * exists. NULL if no description exists.
4018da6c28aaSamw  */
4019da6c28aaSamw 
4020da6c28aaSamw char *
4021da6c28aaSamw sa_get_resource_description(sa_resource_t resource)
4022da6c28aaSamw {
4023da6c28aaSamw 	xmlChar *description = NULL;
4024da6c28aaSamw 	xmlNodePtr node;
4025da6c28aaSamw 
4026da6c28aaSamw 	for (node = ((xmlNodePtr)resource)->children; node != NULL;
4027da6c28aaSamw 	    node = node->next) {
4028da6c28aaSamw 		if (xmlStrcmp(node->name, (xmlChar *)"description") == 0)
4029da6c28aaSamw 			break;
4030da6c28aaSamw 	}
4031da6c28aaSamw 	if (node != NULL) {
4032da6c28aaSamw 		description = xmlNodeGetContent(node);
4033da6c28aaSamw 		fixproblemchars((char *)description);
4034da6c28aaSamw 	}
4035da6c28aaSamw 	return ((char *)description);
4036da6c28aaSamw }
4037