xref: /titanic_53/usr/src/lib/libshare/common/libshare.c (revision 573b0c00a1ee520c3f6938dda8d693236f37ae60)
16185db85Sdougm /*
26185db85Sdougm  * CDDL HEADER START
36185db85Sdougm  *
46185db85Sdougm  * The contents of this file are subject to the terms of the
56185db85Sdougm  * Common Development and Distribution License (the "License").
66185db85Sdougm  * You may not use this file except in compliance with the License.
76185db85Sdougm  *
86185db85Sdougm  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
96185db85Sdougm  * or http://www.opensolaris.org/os/licensing.
106185db85Sdougm  * See the License for the specific language governing permissions
116185db85Sdougm  * and limitations under the License.
126185db85Sdougm  *
136185db85Sdougm  * When distributing Covered Code, include this CDDL HEADER in each
146185db85Sdougm  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
156185db85Sdougm  * If applicable, add the following below this CDDL HEADER, with the
166185db85Sdougm  * fields enclosed by brackets "[]" replaced with your own identifying
176185db85Sdougm  * information: Portions Copyright [yyyy] [name of copyright owner]
186185db85Sdougm  *
196185db85Sdougm  * CDDL HEADER END
206185db85Sdougm  */
216185db85Sdougm 
226185db85Sdougm /*
23dc20a302Sas200622  * Copyright 2008 Sun Microsystems, Inc.  All rights reserved.
246185db85Sdougm  * Use is subject to license terms.
256185db85Sdougm  */
266185db85Sdougm 
276185db85Sdougm #pragma ident	"%Z%%M%	%I%	%E% SMI"
286185db85Sdougm 
296185db85Sdougm /*
306185db85Sdougm  * Share control API
316185db85Sdougm  */
326185db85Sdougm #include <stdio.h>
336185db85Sdougm #include <string.h>
346185db85Sdougm #include <ctype.h>
356185db85Sdougm #include <sys/types.h>
366185db85Sdougm #include <sys/stat.h>
37a99982a7Sdougm #include <fcntl.h>
386185db85Sdougm #include <unistd.h>
396185db85Sdougm #include <libxml/parser.h>
406185db85Sdougm #include <libxml/tree.h>
416185db85Sdougm #include "libshare.h"
426185db85Sdougm #include "libshare_impl.h"
436185db85Sdougm #include <libscf.h>
446185db85Sdougm #include "scfutil.h"
456185db85Sdougm #include <ctype.h>
466185db85Sdougm #include <libintl.h>
47549ec3ffSdougm #include <thread.h>
48549ec3ffSdougm #include <synch.h>
496185db85Sdougm 
506185db85Sdougm #if _NOT_SMF
516185db85Sdougm #define	CONFIG_FILE	"/var/tmp/share.cfg"
526185db85Sdougm #define	CONFIG_FILE_TMP	"/var/tmp/share.cfg.tmp"
536185db85Sdougm #endif
546185db85Sdougm #define	TSTAMP(tm)	(uint64_t)(((uint64_t)tm.tv_sec << 32) | \
556185db85Sdougm 					(tm.tv_nsec & 0xffffffff))
566185db85Sdougm 
57a99982a7Sdougm #define	DFS_LOCK_FILE	"/etc/dfs/fstypes"
5857b448deSdougm #define	SA_STRSIZE	256	/* max string size for names */
59a99982a7Sdougm 
606185db85Sdougm /*
61da6c28aaSamw  * internal object type values returned by sa_get_object_type()
62da6c28aaSamw  */
63da6c28aaSamw #define	SA_TYPE_UNKNOWN		0
64da6c28aaSamw #define	SA_TYPE_GROUP		1
65da6c28aaSamw #define	SA_TYPE_SHARE		2
66da6c28aaSamw #define	SA_TYPE_RESOURCE	3
67da6c28aaSamw #define	SA_TYPE_OPTIONSET	4
68da6c28aaSamw #define	SA_TYPE_ALTSPACE	5
69da6c28aaSamw 
70da6c28aaSamw /*
716185db85Sdougm  * internal data structures
726185db85Sdougm  */
736185db85Sdougm 
746185db85Sdougm extern struct sa_proto_plugin *sap_proto_list;
756185db85Sdougm 
766185db85Sdougm /* current SMF/SVC repository handle */
77549ec3ffSdougm extern void getlegacyconfig(sa_handle_t, char *, xmlNodePtr *);
78549ec3ffSdougm extern int gettransients(sa_handle_impl_t, xmlNodePtr *);
796185db85Sdougm extern int sa_valid_property(void *, char *, sa_property_t);
806185db85Sdougm extern char *sa_fstype(char *);
816185db85Sdougm extern int sa_is_share(void *);
82da6c28aaSamw extern int sa_is_resource(void *);
836185db85Sdougm extern ssize_t scf_max_name_len; /* defined in scfutil during initialization */
846185db85Sdougm extern int sa_group_is_zfs(sa_group_t);
856185db85Sdougm extern int sa_path_is_zfs(char *);
866185db85Sdougm extern int sa_zfs_set_sharenfs(sa_group_t, char *, int);
87da6c28aaSamw extern int sa_zfs_set_sharesmb(sa_group_t, char *, int);
88549ec3ffSdougm extern void update_legacy_config(sa_handle_t);
896185db85Sdougm extern int issubdir(char *, char *);
9057b448deSdougm extern int sa_zfs_init(sa_handle_impl_t);
91549ec3ffSdougm extern void sa_zfs_fini(sa_handle_impl_t);
92a99982a7Sdougm extern void sablocksigs(sigset_t *);
93a99982a7Sdougm extern void saunblocksigs(sigset_t *);
94da6c28aaSamw static sa_group_t sa_get_optionset_parent(sa_optionset_t);
95da6c28aaSamw static char *get_node_attr(void *, char *);
966185db85Sdougm 
97549ec3ffSdougm /*
98549ec3ffSdougm  * Data structures for finding/managing the document root to access
99549ec3ffSdougm  * handle mapping. The list isn't expected to grow very large so a
100549ec3ffSdougm  * simple list is acceptable. The purpose is to provide a way to start
101549ec3ffSdougm  * with a group or share and find the library handle needed for
102549ec3ffSdougm  * various operations.
103549ec3ffSdougm  */
104549ec3ffSdougm mutex_t sa_global_lock;
105549ec3ffSdougm struct doc2handle {
106549ec3ffSdougm 	struct doc2handle	*next;
107549ec3ffSdougm 	xmlNodePtr		root;
108549ec3ffSdougm 	sa_handle_impl_t	handle;
109549ec3ffSdougm };
110549ec3ffSdougm 
11157b448deSdougm /* definitions used in a couple of property functions */
11257b448deSdougm #define	SA_PROP_OP_REMOVE	1
11357b448deSdougm #define	SA_PROP_OP_ADD		2
11457b448deSdougm #define	SA_PROP_OP_UPDATE	3
11557b448deSdougm 
116549ec3ffSdougm static struct doc2handle *sa_global_handles = NULL;
1176185db85Sdougm 
1186185db85Sdougm /* helper functions */
1196185db85Sdougm 
120549ec3ffSdougm /*
121549ec3ffSdougm  * sa_errorstr(err)
122549ec3ffSdougm  *
123549ec3ffSdougm  * convert an error value to an error string
124549ec3ffSdougm  */
125549ec3ffSdougm 
1266185db85Sdougm char *
1276185db85Sdougm sa_errorstr(int err)
1286185db85Sdougm {
1296185db85Sdougm 	static char errstr[32];
1306185db85Sdougm 	char *ret = NULL;
1316185db85Sdougm 
1326185db85Sdougm 	switch (err) {
1336185db85Sdougm 	case SA_OK:
13424424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "ok");
1356185db85Sdougm 		break;
1366185db85Sdougm 	case SA_NO_SUCH_PATH:
13724424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "path doesn't exist");
1386185db85Sdougm 		break;
1396185db85Sdougm 	case SA_NO_MEMORY:
14024424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "no memory");
1416185db85Sdougm 		break;
1426185db85Sdougm 	case SA_DUPLICATE_NAME:
14324424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "name in use");
1446185db85Sdougm 		break;
1456185db85Sdougm 	case SA_BAD_PATH:
14624424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "bad path");
1476185db85Sdougm 		break;
1486185db85Sdougm 	case SA_NO_SUCH_GROUP:
14924424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "no such group");
1506185db85Sdougm 		break;
1516185db85Sdougm 	case SA_CONFIG_ERR:
15224424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "configuration error");
1536185db85Sdougm 		break;
1546185db85Sdougm 	case SA_SYSTEM_ERR:
15524424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "system error");
1566185db85Sdougm 		break;
1576185db85Sdougm 	case SA_SYNTAX_ERR:
15824424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "syntax error");
1596185db85Sdougm 		break;
1606185db85Sdougm 	case SA_NO_PERMISSION:
16124424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "no permission");
1626185db85Sdougm 		break;
1636185db85Sdougm 	case SA_BUSY:
16424424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "busy");
1656185db85Sdougm 		break;
1666185db85Sdougm 	case SA_NO_SUCH_PROP:
16724424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "no such property");
1686185db85Sdougm 		break;
1696185db85Sdougm 	case SA_INVALID_NAME:
17024424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "invalid name");
1716185db85Sdougm 		break;
1726185db85Sdougm 	case SA_INVALID_PROTOCOL:
17324424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "invalid protocol");
1746185db85Sdougm 		break;
1756185db85Sdougm 	case SA_NOT_ALLOWED:
17624424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "operation not allowed");
1776185db85Sdougm 		break;
1786185db85Sdougm 	case SA_BAD_VALUE:
17924424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "bad property value");
1806185db85Sdougm 		break;
1816185db85Sdougm 	case SA_INVALID_SECURITY:
18224424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "invalid security type");
1836185db85Sdougm 		break;
1846185db85Sdougm 	case SA_NO_SUCH_SECURITY:
18524424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "security type not found");
1866185db85Sdougm 		break;
1876185db85Sdougm 	case SA_VALUE_CONFLICT:
18824424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "property value conflict");
1896185db85Sdougm 		break;
1906185db85Sdougm 	case SA_NOT_IMPLEMENTED:
19124424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "not implemented");
1926185db85Sdougm 		break;
1936185db85Sdougm 	case SA_INVALID_PATH:
19424424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "invalid path");
1956185db85Sdougm 		break;
1966185db85Sdougm 	case SA_NOT_SUPPORTED:
19724424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "operation not supported");
1986185db85Sdougm 		break;
1996185db85Sdougm 	case SA_PROP_SHARE_ONLY:
20024424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "property not valid for group");
2016185db85Sdougm 		break;
2026185db85Sdougm 	case SA_NOT_SHARED:
20324424a35Sdougm 		ret = dgettext(TEXT_DOMAIN, "not shared");
2046185db85Sdougm 		break;
205da6c28aaSamw 	case SA_NO_SUCH_RESOURCE:
206da6c28aaSamw 		ret = dgettext(TEXT_DOMAIN, "no such resource");
207da6c28aaSamw 		break;
208da6c28aaSamw 	case SA_RESOURCE_REQUIRED:
209da6c28aaSamw 		ret = dgettext(TEXT_DOMAIN, "resource name required");
210da6c28aaSamw 		break;
211da6c28aaSamw 	case SA_MULTIPLE_ERROR:
212da6c28aaSamw 		ret = dgettext(TEXT_DOMAIN, "errors from multiple protocols");
213da6c28aaSamw 		break;
214da6c28aaSamw 	case SA_PATH_IS_SUBDIR:
215da6c28aaSamw 		ret = dgettext(TEXT_DOMAIN, "path is a subpath of share");
216da6c28aaSamw 		break;
217da6c28aaSamw 	case SA_PATH_IS_PARENTDIR:
218da6c28aaSamw 		ret = dgettext(TEXT_DOMAIN, "path is parent of a share");
219da6c28aaSamw 		break;
2206185db85Sdougm 	default:
2216185db85Sdougm 		(void) snprintf(errstr, sizeof (errstr),
22224424a35Sdougm 		    dgettext(TEXT_DOMAIN, "unknown %d"), err);
2236185db85Sdougm 		ret = errstr;
2246185db85Sdougm 	}
2256185db85Sdougm 	return (ret);
2266185db85Sdougm }
2276185db85Sdougm 
2286185db85Sdougm /*
229549ec3ffSdougm  * Document root to active handle mapping functions.  These are only
230549ec3ffSdougm  * used internally. A mutex is used to prevent access while the list
231549ec3ffSdougm  * is changing. In general, the list will be relatively short - one
232549ec3ffSdougm  * item per thread that has called sa_init().
233549ec3ffSdougm  */
234549ec3ffSdougm 
235549ec3ffSdougm sa_handle_impl_t
236549ec3ffSdougm get_handle_for_root(xmlNodePtr root)
237549ec3ffSdougm {
238549ec3ffSdougm 	struct doc2handle *item;
239549ec3ffSdougm 
240549ec3ffSdougm 	(void) mutex_lock(&sa_global_lock);
241549ec3ffSdougm 	for (item = sa_global_handles; item != NULL; item = item->next) {
242549ec3ffSdougm 		if (item->root == root)
243549ec3ffSdougm 			break;
244549ec3ffSdougm 	}
245549ec3ffSdougm 	(void) mutex_unlock(&sa_global_lock);
246549ec3ffSdougm 	if (item != NULL)
247549ec3ffSdougm 		return (item->handle);
248549ec3ffSdougm 	return (NULL);
249549ec3ffSdougm }
250549ec3ffSdougm 
251549ec3ffSdougm static int
252549ec3ffSdougm add_handle_for_root(xmlNodePtr root, sa_handle_impl_t handle)
253549ec3ffSdougm {
254549ec3ffSdougm 	struct doc2handle *item;
255549ec3ffSdougm 	int ret = SA_NO_MEMORY;
256549ec3ffSdougm 
257549ec3ffSdougm 	item = (struct doc2handle *)calloc(sizeof (struct doc2handle), 1);
258549ec3ffSdougm 	if (item != NULL) {
259549ec3ffSdougm 		item->root = root;
260549ec3ffSdougm 		item->handle = handle;
261549ec3ffSdougm 		(void) mutex_lock(&sa_global_lock);
262549ec3ffSdougm 		item->next = sa_global_handles;
263549ec3ffSdougm 		sa_global_handles = item;
264549ec3ffSdougm 		(void) mutex_unlock(&sa_global_lock);
265549ec3ffSdougm 		ret = SA_OK;
266549ec3ffSdougm 	}
267549ec3ffSdougm 	return (ret);
268549ec3ffSdougm }
269549ec3ffSdougm 
270549ec3ffSdougm /*
271549ec3ffSdougm  * remove_handle_for_root(root)
272549ec3ffSdougm  *
273549ec3ffSdougm  * Walks the list of handles and removes the one for this "root" from
274549ec3ffSdougm  * the list. It is up to the caller to free the data.
275549ec3ffSdougm  */
276549ec3ffSdougm 
277549ec3ffSdougm static void
278549ec3ffSdougm remove_handle_for_root(xmlNodePtr root)
279549ec3ffSdougm {
280549ec3ffSdougm 	struct doc2handle *item, *prev;
281549ec3ffSdougm 
282549ec3ffSdougm 	(void) mutex_lock(&sa_global_lock);
283549ec3ffSdougm 	for (prev = NULL, item = sa_global_handles; item != NULL;
284549ec3ffSdougm 	    item = item->next) {
285549ec3ffSdougm 		if (item->root == root) {
286549ec3ffSdougm 			/* first in the list */
28757b448deSdougm 			if (prev == NULL)
288549ec3ffSdougm 				sa_global_handles = sa_global_handles->next;
28957b448deSdougm 			else
290549ec3ffSdougm 				prev->next = item->next;
291549ec3ffSdougm 			/* Item is out of the list so free the list structure */
292549ec3ffSdougm 			free(item);
293549ec3ffSdougm 			break;
294549ec3ffSdougm 		}
295549ec3ffSdougm 		prev = item;
296549ec3ffSdougm 	}
297549ec3ffSdougm 	(void) mutex_unlock(&sa_global_lock);
298549ec3ffSdougm }
299549ec3ffSdougm 
300549ec3ffSdougm /*
301549ec3ffSdougm  * sa_find_group_handle(sa_group_t group)
302549ec3ffSdougm  *
303549ec3ffSdougm  * Find the sa_handle_t for the configuration associated with this
304549ec3ffSdougm  * group.
305549ec3ffSdougm  */
306549ec3ffSdougm sa_handle_t
307549ec3ffSdougm sa_find_group_handle(sa_group_t group)
308549ec3ffSdougm {
309549ec3ffSdougm 	xmlNodePtr node = (xmlNodePtr)group;
310549ec3ffSdougm 	sa_handle_t handle;
311549ec3ffSdougm 
312549ec3ffSdougm 	while (node != NULL) {
313549ec3ffSdougm 		if (strcmp((char *)(node->name), "sharecfg") == 0) {
314549ec3ffSdougm 			/* have the root so get the handle */
315549ec3ffSdougm 			handle = (sa_handle_t)get_handle_for_root(node);
316549ec3ffSdougm 			return (handle);
317549ec3ffSdougm 		}
318549ec3ffSdougm 		node = node->parent;
319549ec3ffSdougm 	}
320549ec3ffSdougm 	return (NULL);
321549ec3ffSdougm }
322549ec3ffSdougm 
323549ec3ffSdougm /*
3246185db85Sdougm  * set_legacy_timestamp(root, path, timevalue)
3256185db85Sdougm  *
3266185db85Sdougm  * add the current timestamp value to the configuration for use in
3276185db85Sdougm  * determining when to update the legacy files.  For SMF, this
3286185db85Sdougm  * property is kept in default/operation/legacy_timestamp
3296185db85Sdougm  */
3306185db85Sdougm 
3316185db85Sdougm static void
3326185db85Sdougm set_legacy_timestamp(xmlNodePtr root, char *path, uint64_t tval)
3336185db85Sdougm {
3346185db85Sdougm 	xmlNodePtr node;
3356185db85Sdougm 	xmlChar *lpath = NULL;
336549ec3ffSdougm 	sa_handle_impl_t handle;
337549ec3ffSdougm 
338549ec3ffSdougm 	/* Have to have a handle or else we weren't initialized. */
339549ec3ffSdougm 	handle = get_handle_for_root(root);
340549ec3ffSdougm 	if (handle == NULL)
341549ec3ffSdougm 		return;
3426185db85Sdougm 
3436185db85Sdougm 	for (node = root->xmlChildrenNode; node != NULL;
3446185db85Sdougm 	    node = node->next) {
3456185db85Sdougm 		if (xmlStrcmp(node->name, (xmlChar *)"legacy") == 0) {
3466185db85Sdougm 			/* a possible legacy node for this path */
3476185db85Sdougm 			lpath = xmlGetProp(node, (xmlChar *)"path");
34857b448deSdougm 			if (lpath != NULL &&
34957b448deSdougm 			    xmlStrcmp(lpath, (xmlChar *)path) == 0) {
3506185db85Sdougm 				xmlFree(lpath);
3516185db85Sdougm 				break;
3526185db85Sdougm 			}
3536185db85Sdougm 			if (lpath != NULL)
3546185db85Sdougm 				xmlFree(lpath);
3556185db85Sdougm 		}
3566185db85Sdougm 	}
3576185db85Sdougm 	if (node == NULL) {
3586185db85Sdougm 		/* need to create the first legacy timestamp node */
3596185db85Sdougm 		node = xmlNewChild(root, NULL, (xmlChar *)"legacy", NULL);
3606185db85Sdougm 	}
3616185db85Sdougm 	if (node != NULL) {
3626185db85Sdougm 		char tstring[32];
3636185db85Sdougm 		int ret;
3646185db85Sdougm 
3656185db85Sdougm 		(void) snprintf(tstring, sizeof (tstring), "%lld", tval);
3666185db85Sdougm 		xmlSetProp(node, (xmlChar *)"timestamp", (xmlChar *)tstring);
3676185db85Sdougm 		xmlSetProp(node, (xmlChar *)"path", (xmlChar *)path);
3686185db85Sdougm 		/* now commit to SMF */
369549ec3ffSdougm 		ret = sa_get_instance(handle->scfhandle, "default");
3706185db85Sdougm 		if (ret == SA_OK) {
37157b448deSdougm 			ret = sa_start_transaction(handle->scfhandle,
37257b448deSdougm 			    "operation");
3736185db85Sdougm 			if (ret == SA_OK) {
37457b448deSdougm 				ret = sa_set_property(handle->scfhandle,
37557b448deSdougm 				    "legacy-timestamp", tstring);
3766185db85Sdougm 				if (ret == SA_OK) {
37757b448deSdougm 					(void) sa_end_transaction(
37857b448deSdougm 					    handle->scfhandle);
3796185db85Sdougm 				} else {
380549ec3ffSdougm 					sa_abort_transaction(handle->scfhandle);
3816185db85Sdougm 				}
3826185db85Sdougm 			}
3836185db85Sdougm 		}
3846185db85Sdougm 	}
3856185db85Sdougm }
3866185db85Sdougm 
3876185db85Sdougm /*
3886185db85Sdougm  * is_shared(share)
3896185db85Sdougm  *
3906185db85Sdougm  * determine if the specified share is currently shared or not.
3916185db85Sdougm  */
3926185db85Sdougm static int
3936185db85Sdougm is_shared(sa_share_t share)
3946185db85Sdougm {
3956185db85Sdougm 	char *shared;
3966185db85Sdougm 	int result = 0; /* assume not */
3976185db85Sdougm 
3986185db85Sdougm 	shared = sa_get_share_attr(share, "shared");
3996185db85Sdougm 	if (shared != NULL) {
4006185db85Sdougm 		if (strcmp(shared, "true") == 0)
4016185db85Sdougm 			result = 1;
4026185db85Sdougm 		sa_free_attr_string(shared);
4036185db85Sdougm 	}
4046185db85Sdougm 	return (result);
4056185db85Sdougm }
4066185db85Sdougm 
4076185db85Sdougm /*
408da6c28aaSamw  * excluded_protocol(share, proto)
409da6c28aaSamw  *
410da6c28aaSamw  * Returns B_TRUE if the specified protocol appears in the "exclude"
411da6c28aaSamw  * property. This is used to prevent sharing special case shares
412da6c28aaSamw  * (e.g. subdirs when SMB wants a subdir and NFS doesn't. B_FALSE is
413da6c28aaSamw  * returned if the protocol isn't in the list.
414da6c28aaSamw  */
415da6c28aaSamw static boolean_t
416da6c28aaSamw excluded_protocol(sa_share_t share, char *proto)
417da6c28aaSamw {
418da6c28aaSamw 	char *protolist;
419da6c28aaSamw 	char *str;
420da6c28aaSamw 	char *token;
421da6c28aaSamw 
422da6c28aaSamw 	protolist = sa_get_share_attr(share, "exclude");
423da6c28aaSamw 	if (protolist != NULL) {
424da6c28aaSamw 		str = protolist;
425da6c28aaSamw 		while ((token = strtok(str, ",")) != NULL) {
426da6c28aaSamw 			if (strcmp(token, proto) == 0) {
427da6c28aaSamw 				sa_free_attr_string(protolist);
428da6c28aaSamw 				return (B_TRUE);
429da6c28aaSamw 			}
430da6c28aaSamw 			str = NULL;
431da6c28aaSamw 		}
432da6c28aaSamw 		sa_free_attr_string(protolist);
433da6c28aaSamw 	}
434da6c28aaSamw 	return (B_FALSE);
435da6c28aaSamw }
436da6c28aaSamw 
437da6c28aaSamw /*
438a99982a7Sdougm  * checksubdirgroup(group, newpath, strictness)
439f345c0beSdougm  *
440a99982a7Sdougm  * check all the specified newpath against all the paths in the
441a99982a7Sdougm  * group. This is a helper function for checksubdir to make it easier
442a99982a7Sdougm  * to also check ZFS subgroups.
443a99982a7Sdougm  * The strictness values mean:
444f345c0beSdougm  * SA_CHECK_NORMAL == only check newpath against shares that are active
445f345c0beSdougm  * SA_CHECK_STRICT == check newpath against both active shares and those
446f345c0beSdougm  *		      stored in the repository
4476185db85Sdougm  */
4486185db85Sdougm static int
449a99982a7Sdougm checksubdirgroup(sa_group_t group, char *newpath, int strictness)
4506185db85Sdougm {
4516185db85Sdougm 	sa_share_t share;
452a99982a7Sdougm 	char *path;
453a99982a7Sdougm 	int issub = SA_OK;
454da6c28aaSamw 	int subdir;
455da6c28aaSamw 	int parent;
456da6c28aaSamw 
457da6c28aaSamw 	if (newpath == NULL)
458da6c28aaSamw 		return (SA_INVALID_PATH);
4596185db85Sdougm 
4606185db85Sdougm 	for (share = sa_get_share(group, NULL); share != NULL;
4616185db85Sdougm 	    share = sa_get_next_share(share)) {
4626185db85Sdougm 		/*
4636185db85Sdougm 		 * The original behavior of share never checked
4646185db85Sdougm 		 * against the permanent configuration
4656185db85Sdougm 		 * (/etc/dfs/dfstab).  PIT has a number of cases where
4666185db85Sdougm 		 * it depends on this older behavior even though it
4676185db85Sdougm 		 * could be considered incorrect.  We may tighten this
4686185db85Sdougm 		 * up in the future.
4696185db85Sdougm 		 */
470f345c0beSdougm 		if (strictness == SA_CHECK_NORMAL && !is_shared(share))
4716185db85Sdougm 			continue;
4726185db85Sdougm 
4736185db85Sdougm 		path = sa_get_share_attr(share, "path");
474f345c0beSdougm 		/*
475f345c0beSdougm 		 * If path is NULL, then a share is in the process of
476f345c0beSdougm 		 * construction or someone has modified the property
477a99982a7Sdougm 		 * group inappropriately. It should be
478a99982a7Sdougm 		 * ignored. issubdir() comes from the original share
479a99982a7Sdougm 		 * implementation and does the difficult part of
480a99982a7Sdougm 		 * checking subdirectories.
481f345c0beSdougm 		 */
482f345c0beSdougm 		if (path == NULL)
483f345c0beSdougm 			continue;
484da6c28aaSamw 
485da6c28aaSamw 		if (strcmp(path, newpath) == 0) {
486da6c28aaSamw 			issub = SA_INVALID_PATH;
487da6c28aaSamw 		} else {
488da6c28aaSamw 			subdir = issubdir(newpath, path);
489da6c28aaSamw 			parent = issubdir(path, newpath);
490da6c28aaSamw 			if (subdir || parent) {
4916185db85Sdougm 				sa_free_attr_string(path);
4926185db85Sdougm 				path = NULL;
493da6c28aaSamw 				return (subdir ?
494da6c28aaSamw 				    SA_PATH_IS_SUBDIR : SA_PATH_IS_PARENTDIR);
495da6c28aaSamw 			}
4966185db85Sdougm 		}
4976185db85Sdougm 		sa_free_attr_string(path);
4986185db85Sdougm 		path = NULL;
4996185db85Sdougm 	}
500a99982a7Sdougm 	return (issub);
501a99982a7Sdougm }
502a99982a7Sdougm 
503a99982a7Sdougm /*
504a99982a7Sdougm  * checksubdir(newpath, strictness)
505a99982a7Sdougm  *
506a99982a7Sdougm  * checksubdir determines if the specified path (newpath) is a
507a99982a7Sdougm  * subdirectory of another share. It calls checksubdirgroup() to do
508a99982a7Sdougm  * the complicated work. The strictness parameter determines how
509a99982a7Sdougm  * strict a check to make against the path. The strictness values
510a99982a7Sdougm  * mean: SA_CHECK_NORMAL == only check newpath against shares that are
511a99982a7Sdougm  * active SA_CHECK_STRICT == check newpath against both active shares
512a99982a7Sdougm  * and those * stored in the repository
513a99982a7Sdougm  */
514a99982a7Sdougm static int
515549ec3ffSdougm checksubdir(sa_handle_t handle, char *newpath, int strictness)
516a99982a7Sdougm {
517a99982a7Sdougm 	sa_group_t group;
518da6c28aaSamw 	int issub = SA_OK;
519a99982a7Sdougm 	char *path = NULL;
520a99982a7Sdougm 
521da6c28aaSamw 	for (group = sa_get_group(handle, NULL);
522da6c28aaSamw 	    group != NULL && issub == SA_OK;
523da6c28aaSamw 	    group = sa_get_next_group(group)) {
524a99982a7Sdougm 		if (sa_group_is_zfs(group)) {
525a99982a7Sdougm 			sa_group_t subgroup;
526a99982a7Sdougm 			for (subgroup = sa_get_sub_group(group);
527da6c28aaSamw 			    subgroup != NULL && issub == SA_OK;
528a99982a7Sdougm 			    subgroup = sa_get_next_group(subgroup))
52957b448deSdougm 				issub = checksubdirgroup(subgroup, newpath,
53057b448deSdougm 				    strictness);
531a99982a7Sdougm 		} else {
532a99982a7Sdougm 			issub = checksubdirgroup(group, newpath, strictness);
533a99982a7Sdougm 		}
5346185db85Sdougm 	}
5356185db85Sdougm 	if (path != NULL)
5366185db85Sdougm 		sa_free_attr_string(path);
5376185db85Sdougm 	return (issub);
5386185db85Sdougm }
5396185db85Sdougm 
5406185db85Sdougm /*
541f345c0beSdougm  * validpath(path, strictness)
5426185db85Sdougm  * determine if the provided path is valid for a share. It shouldn't
5436185db85Sdougm  * be a sub-dir of an already shared path or the parent directory of a
5446185db85Sdougm  * share path.
5456185db85Sdougm  */
5466185db85Sdougm static int
547549ec3ffSdougm validpath(sa_handle_t handle, char *path, int strictness)
5486185db85Sdougm {
5496185db85Sdougm 	int error = SA_OK;
5506185db85Sdougm 	struct stat st;
5516185db85Sdougm 	sa_share_t share;
5526185db85Sdougm 	char *fstype;
5536185db85Sdougm 
55457b448deSdougm 	if (*path != '/')
5556185db85Sdougm 		return (SA_BAD_PATH);
55657b448deSdougm 
5576185db85Sdougm 	if (stat(path, &st) < 0) {
5586185db85Sdougm 		error = SA_NO_SUCH_PATH;
5596185db85Sdougm 	} else {
560549ec3ffSdougm 		share = sa_find_share(handle, path);
56157b448deSdougm 		if (share != NULL)
5626185db85Sdougm 			error = SA_DUPLICATE_NAME;
56357b448deSdougm 
5646185db85Sdougm 		if (error == SA_OK) {
5656185db85Sdougm 			/*
56657b448deSdougm 			 * check for special case with file system
56757b448deSdougm 			 * that might have restrictions.  For now, ZFS
56857b448deSdougm 			 * is the only case since it has its own idea
56957b448deSdougm 			 * of how to configure shares. We do this
57057b448deSdougm 			 * before subdir checking since things like
57157b448deSdougm 			 * ZFS will do that for us. This should also
57257b448deSdougm 			 * be done via plugin interface.
5736185db85Sdougm 			 */
5746185db85Sdougm 			fstype = sa_fstype(path);
5756185db85Sdougm 			if (fstype != NULL && strcmp(fstype, "zfs") == 0) {
576549ec3ffSdougm 				if (sa_zfs_is_shared(handle, path))
577a99982a7Sdougm 					error = SA_INVALID_NAME;
5786185db85Sdougm 			}
5796185db85Sdougm 			if (fstype != NULL)
5806185db85Sdougm 				sa_free_fstype(fstype);
5816185db85Sdougm 		}
58257b448deSdougm 		if (error == SA_OK)
583549ec3ffSdougm 			error = checksubdir(handle, path, strictness);
5846185db85Sdougm 	}
5856185db85Sdougm 	return (error);
5866185db85Sdougm }
5876185db85Sdougm 
5886185db85Sdougm /*
5896185db85Sdougm  * check to see if group/share is persistent.
590da6c28aaSamw  *
591da6c28aaSamw  * "group" can be either an sa_group_t or an sa_share_t. (void *)
592da6c28aaSamw  * works since both thse types are also void *.
5936185db85Sdougm  */
594da6c28aaSamw int
595da6c28aaSamw sa_is_persistent(void *group)
5966185db85Sdougm {
5976185db85Sdougm 	char *type;
5986185db85Sdougm 	int persist = 1;
5996185db85Sdougm 
600da6c28aaSamw 	type = sa_get_group_attr((sa_group_t)group, "type");
6016185db85Sdougm 	if (type != NULL && strcmp(type, "transient") == 0)
6026185db85Sdougm 		persist = 0;
6036185db85Sdougm 	if (type != NULL)
6046185db85Sdougm 		sa_free_attr_string(type);
6056185db85Sdougm 	return (persist);
6066185db85Sdougm }
6076185db85Sdougm 
6086185db85Sdougm /*
6096185db85Sdougm  * sa_valid_group_name(name)
6106185db85Sdougm  *
6116185db85Sdougm  * check that the "name" contains only valid characters and otherwise
6126185db85Sdougm  * fits the required naming conventions. Valid names must start with
6136185db85Sdougm  * an alphabetic and the remainder may consist of only alphanumeric
6146185db85Sdougm  * plus the '-' and '_' characters. This name limitation comes from
6156185db85Sdougm  * inherent limitations in SMF.
6166185db85Sdougm  */
6176185db85Sdougm 
6186185db85Sdougm int
6196185db85Sdougm sa_valid_group_name(char *name)
6206185db85Sdougm {
6216185db85Sdougm 	int ret = 1;
6226185db85Sdougm 	ssize_t len;
6236185db85Sdougm 
6246185db85Sdougm 	if (name != NULL && isalpha(*name)) {
6256185db85Sdougm 		char c;
6266185db85Sdougm 		len = strlen(name);
6276185db85Sdougm 		if (len < (scf_max_name_len - sizeof ("group:"))) {
6286185db85Sdougm 			for (c = *name++; c != '\0' && ret != 0; c = *name++) {
6296185db85Sdougm 				if (!isalnum(c) && c != '-' && c != '_')
6306185db85Sdougm 					ret = 0;
6316185db85Sdougm 			}
6326185db85Sdougm 		} else {
6336185db85Sdougm 			ret = 0;
6346185db85Sdougm 		}
6356185db85Sdougm 	} else {
6366185db85Sdougm 		ret = 0;
6376185db85Sdougm 	}
6386185db85Sdougm 	return (ret);
6396185db85Sdougm }
6406185db85Sdougm 
6416185db85Sdougm 
6426185db85Sdougm /*
6436185db85Sdougm  * is_zfs_group(group)
6446185db85Sdougm  *	Determine if the specified group is a ZFS sharenfs group
6456185db85Sdougm  */
6466185db85Sdougm static int
6476185db85Sdougm is_zfs_group(sa_group_t group)
6486185db85Sdougm {
6496185db85Sdougm 	int ret = 0;
6506185db85Sdougm 	xmlNodePtr parent;
6516185db85Sdougm 	xmlChar *zfs;
6526185db85Sdougm 
65357b448deSdougm 	if (strcmp((char *)((xmlNodePtr)group)->name, "share") == 0)
6546185db85Sdougm 		parent = (xmlNodePtr)sa_get_parent_group(group);
65557b448deSdougm 	else
6566185db85Sdougm 		parent = (xmlNodePtr)group;
6576185db85Sdougm 	zfs = xmlGetProp(parent, (xmlChar *)"zfs");
6586185db85Sdougm 	if (zfs != NULL) {
6596185db85Sdougm 		xmlFree(zfs);
6606185db85Sdougm 		ret = 1;
6616185db85Sdougm 	}
6626185db85Sdougm 	return (ret);
6636185db85Sdougm }
6646185db85Sdougm 
6656185db85Sdougm /*
666da6c28aaSamw  * sa_get_object_type(object)
667da6c28aaSamw  *
668da6c28aaSamw  * This function returns a numeric value representing the object
669da6c28aaSamw  * type. This allows using simpler checks when doing type specific
670da6c28aaSamw  * operations.
671da6c28aaSamw  */
672da6c28aaSamw 
673da6c28aaSamw static int
674da6c28aaSamw sa_get_object_type(void *object)
675da6c28aaSamw {
676da6c28aaSamw 	xmlNodePtr node = (xmlNodePtr)object;
677da6c28aaSamw 	int type;
678da6c28aaSamw 
679da6c28aaSamw 	if (xmlStrcmp(node->name, (xmlChar *)"group") == 0)
680da6c28aaSamw 		type = SA_TYPE_GROUP;
681da6c28aaSamw 	else if (xmlStrcmp(node->name, (xmlChar *)"share") == 0)
682da6c28aaSamw 		type = SA_TYPE_SHARE;
683da6c28aaSamw 	else if (xmlStrcmp(node->name, (xmlChar *)"resource") == 0)
684da6c28aaSamw 		type = SA_TYPE_RESOURCE;
685da6c28aaSamw 	else if (xmlStrcmp(node->name, (xmlChar *)"optionset") == 0)
686da6c28aaSamw 		type = SA_TYPE_OPTIONSET;
687da6c28aaSamw 	else if (xmlStrcmp(node->name, (xmlChar *)"security") == 0)
688da6c28aaSamw 		type = SA_TYPE_ALTSPACE;
689da6c28aaSamw 	else
690da6c28aaSamw 		assert(0);
691da6c28aaSamw 	return (type);
692da6c28aaSamw }
693da6c28aaSamw 
694da6c28aaSamw /*
6956185db85Sdougm  * sa_optionset_name(optionset, oname, len, id)
6966185db85Sdougm  *	return the SMF name for the optionset. If id is not NULL, it
6976185db85Sdougm  *	will have the GUID value for a share and should be used
6986185db85Sdougm  *	instead of the keyword "optionset" which is used for
6996185db85Sdougm  *	groups. If the optionset doesn't have a protocol type
7006185db85Sdougm  *	associated with it, "default" is used. This shouldn't happen
7016185db85Sdougm  *	at this point but may be desirable in the future if there are
7026185db85Sdougm  *	protocol independent properties added. The name is returned in
7036185db85Sdougm  *	oname.
7046185db85Sdougm  */
7056185db85Sdougm 
7066185db85Sdougm static int
7076185db85Sdougm sa_optionset_name(sa_optionset_t optionset, char *oname, size_t len, char *id)
7086185db85Sdougm {
7096185db85Sdougm 	char *proto;
710da6c28aaSamw 	void *parent;
711da6c28aaSamw 	int ptype;
7126185db85Sdougm 
7136185db85Sdougm 	if (id == NULL)
7146185db85Sdougm 		id = "optionset";
7156185db85Sdougm 
716da6c28aaSamw 	parent = sa_get_optionset_parent(optionset);
717da6c28aaSamw 	if (parent != NULL) {
718da6c28aaSamw 		ptype = sa_get_object_type(parent);
7196185db85Sdougm 		proto = sa_get_optionset_attr(optionset, "type");
720da6c28aaSamw 		if (ptype != SA_TYPE_RESOURCE) {
721da6c28aaSamw 			len = snprintf(oname, len, "%s_%s", id,
722da6c28aaSamw 			    proto ? proto : "default");
723da6c28aaSamw 		} else {
724da6c28aaSamw 			char *index;
725da6c28aaSamw 			index = get_node_attr((void *)parent, "id");
726da6c28aaSamw 			if (index != NULL)
727da6c28aaSamw 				len = snprintf(oname, len, "%s_%s_%s", id,
728da6c28aaSamw 				    proto ? proto : "default", index);
729da6c28aaSamw 			else
730da6c28aaSamw 				len = 0;
731da6c28aaSamw 		}
7326185db85Sdougm 
7336185db85Sdougm 		if (proto != NULL)
7346185db85Sdougm 			sa_free_attr_string(proto);
735da6c28aaSamw 	} else {
736da6c28aaSamw 		len = 0;
737da6c28aaSamw 	}
7386185db85Sdougm 	return (len);
7396185db85Sdougm }
7406185db85Sdougm 
7416185db85Sdougm /*
7426185db85Sdougm  * sa_security_name(optionset, oname, len, id)
7436185db85Sdougm  *
7446185db85Sdougm  * return the SMF name for the security. If id is not NULL, it will
7456185db85Sdougm  * have the GUID value for a share and should be used instead of the
7466185db85Sdougm  * keyword "optionset" which is used for groups. If the optionset
7476185db85Sdougm  * doesn't have a protocol type associated with it, "default" is
7486185db85Sdougm  * used. This shouldn't happen at this point but may be desirable in
7496185db85Sdougm  * the future if there are protocol independent properties added. The
7506185db85Sdougm  * name is returned in oname. The security type is also encoded into
7516185db85Sdougm  * the name. In the future, this wil *be handled a bit differently.
7526185db85Sdougm  */
7536185db85Sdougm 
7546185db85Sdougm static int
7556185db85Sdougm sa_security_name(sa_security_t security, char *oname, size_t len, char *id)
7566185db85Sdougm {
7576185db85Sdougm 	char *proto;
7586185db85Sdougm 	char *sectype;
7596185db85Sdougm 
7606185db85Sdougm 	if (id == NULL)
7616185db85Sdougm 		id = "optionset";
7626185db85Sdougm 
7636185db85Sdougm 	proto = sa_get_security_attr(security, "type");
7646185db85Sdougm 	sectype = sa_get_security_attr(security, "sectype");
76557b448deSdougm 	len = snprintf(oname, len, "%s_%s_%s", id, proto ? proto : "default",
7666185db85Sdougm 	    sectype ? sectype : "default");
7676185db85Sdougm 	if (proto != NULL)
7686185db85Sdougm 		sa_free_attr_string(proto);
7696185db85Sdougm 	if (sectype != NULL)
7706185db85Sdougm 		sa_free_attr_string(sectype);
7716185db85Sdougm 	return (len);
7726185db85Sdougm }
7736185db85Sdougm 
7746185db85Sdougm /*
77557b448deSdougm  * verifydefgroupopts(handle)
77657b448deSdougm  *
77757b448deSdougm  * Make sure a "default" group exists and has default protocols enabled.
77857b448deSdougm  */
77957b448deSdougm static void
78057b448deSdougm verifydefgroupopts(sa_handle_t handle)
78157b448deSdougm {
78257b448deSdougm 	sa_group_t defgrp;
78357b448deSdougm 	sa_optionset_t opt;
784da6c28aaSamw 
78557b448deSdougm 	defgrp = sa_get_group(handle, "default");
78657b448deSdougm 	if (defgrp != NULL) {
78757b448deSdougm 		opt = sa_get_optionset(defgrp, NULL);
78857b448deSdougm 		/*
78957b448deSdougm 		 * NFS is the default for default group
79057b448deSdougm 		 */
79157b448deSdougm 		if (opt == NULL)
79257b448deSdougm 			opt = sa_create_optionset(defgrp, "nfs");
79357b448deSdougm 	}
79457b448deSdougm }
79557b448deSdougm 
79657b448deSdougm /*
797f345c0beSdougm  * sa_init(init_service)
7986185db85Sdougm  *	Initialize the API
7996185db85Sdougm  *	find all the shared objects
8006185db85Sdougm  *	init the tables with all objects
8016185db85Sdougm  *	read in the current configuration
8026185db85Sdougm  */
8036185db85Sdougm 
80457b448deSdougm #define	GETPROP(prop)	scf_simple_prop_next_astring(prop)
80557b448deSdougm #define	CHECKTSTAMP(st, tval)	stat(SA_LEGACY_DFSTAB, &st) >= 0 && \
80657b448deSdougm 	tval != TSTAMP(st.st_ctim)
80757b448deSdougm 
808549ec3ffSdougm sa_handle_t
8096185db85Sdougm sa_init(int init_service)
8106185db85Sdougm {
8116185db85Sdougm 	struct stat st;
8126185db85Sdougm 	int legacy = 0;
8136185db85Sdougm 	uint64_t tval = 0;
814a99982a7Sdougm 	int lockfd;
815a99982a7Sdougm 	sigset_t old;
816a99982a7Sdougm 	int updatelegacy = B_FALSE;
817a99982a7Sdougm 	scf_simple_prop_t *prop;
818549ec3ffSdougm 	sa_handle_impl_t handle;
819549ec3ffSdougm 	int err;
8206185db85Sdougm 
821549ec3ffSdougm 	handle = calloc(sizeof (struct sa_handle_impl), 1);
822549ec3ffSdougm 
823549ec3ffSdougm 	if (handle != NULL) {
8246185db85Sdougm 		/* get protocol specific structures */
8256185db85Sdougm 		(void) proto_plugin_init();
8266185db85Sdougm 		if (init_service & SA_INIT_SHARE_API) {
8276185db85Sdougm 			/*
82857b448deSdougm 			 * initialize access into libzfs. We use this
82957b448deSdougm 			 * when collecting info about ZFS datasets and
83057b448deSdougm 			 * shares.
8311cea05afSdougm 			 */
83257b448deSdougm 			if (sa_zfs_init(handle) == B_FALSE) {
83357b448deSdougm 				free(handle);
83457b448deSdougm 				(void) proto_plugin_fini();
83557b448deSdougm 				return (NULL);
83657b448deSdougm 			}
8371cea05afSdougm 			/*
8386185db85Sdougm 			 * since we want to use SMF, initialize an svc handle
8396185db85Sdougm 			 * and find out what is there.
8406185db85Sdougm 			 */
841549ec3ffSdougm 			handle->scfhandle = sa_scf_init(handle);
842549ec3ffSdougm 			if (handle->scfhandle != NULL) {
843a99982a7Sdougm 				/*
844a99982a7Sdougm 				 * Need to lock the extraction of the
845a99982a7Sdougm 				 * configuration if the dfstab file has
846a99982a7Sdougm 				 * changed. Lock everything now and release if
847a99982a7Sdougm 				 * not needed.  Use a file that isn't being
848a99982a7Sdougm 				 * manipulated by other parts of the system in
849a99982a7Sdougm 				 * order to not interfere with locking. Using
850a99982a7Sdougm 				 * dfstab doesn't work.
851a99982a7Sdougm 				 */
852a99982a7Sdougm 				sablocksigs(&old);
853a99982a7Sdougm 				lockfd = open(DFS_LOCK_FILE, O_RDWR);
854a99982a7Sdougm 				if (lockfd >= 0) {
855a99982a7Sdougm 					extern int errno;
856a99982a7Sdougm 					errno = 0;
857a99982a7Sdougm 					(void) lockf(lockfd, F_LOCK, 0);
858a99982a7Sdougm 					/*
85957b448deSdougm 					 * Check whether we are going to need
86057b448deSdougm 					 * to merge any dfstab changes. This
86157b448deSdougm 					 * is done by comparing the value of
86257b448deSdougm 					 * legacy-timestamp with the current
86357b448deSdougm 					 * st_ctim of the file. If they are
86457b448deSdougm 					 * different, an update is needed and
86557b448deSdougm 					 * the file must remain locked until
86657b448deSdougm 					 * the merge is done in order to
86757b448deSdougm 					 * prevent multiple startups from
86857b448deSdougm 					 * changing the SMF repository at the
86957b448deSdougm 					 * same time.  The first to get the
87057b448deSdougm 					 * lock will make any changes before
87157b448deSdougm 					 * the others can read the repository.
872a99982a7Sdougm 					 */
87357b448deSdougm 					prop = scf_simple_prop_get
87457b448deSdougm 					    (handle->scfhandle->handle,
87557b448deSdougm 					    (const char *)SA_SVC_FMRI_BASE
87657b448deSdougm 					    ":default", "operation",
877a99982a7Sdougm 					    "legacy-timestamp");
878a99982a7Sdougm 					if (prop != NULL) {
879a99982a7Sdougm 						char *i64;
88057b448deSdougm 						i64 = GETPROP(prop);
88157b448deSdougm 						if (i64 != NULL)
88257b448deSdougm 							tval = strtoull(i64,
88357b448deSdougm 							    NULL, 0);
88457b448deSdougm 						if (CHECKTSTAMP(st, tval))
885a99982a7Sdougm 							updatelegacy = B_TRUE;
88657b448deSdougm 						scf_simple_prop_free(prop);
887a99982a7Sdougm 					} else {
88857b448deSdougm 						/*
88957b448deSdougm 						 * We haven't set the
89057b448deSdougm 						 * timestamp before so do it.
89157b448deSdougm 						 */
892a99982a7Sdougm 						updatelegacy = B_TRUE;
893a99982a7Sdougm 					}
894a99982a7Sdougm 				}
895a99982a7Sdougm 				if (updatelegacy == B_FALSE) {
896a99982a7Sdougm 					/* Don't need the lock anymore */
897a99982a7Sdougm 					(void) lockf(lockfd, F_ULOCK, 0);
898a99982a7Sdougm 					(void) close(lockfd);
899a99982a7Sdougm 				}
9001d1813a7Sdougm 
9011d1813a7Sdougm 				/*
9021d1813a7Sdougm 				 * It is essential that the document tree and
9031d1813a7Sdougm 				 * the internal list of roots to handles be
9041d1813a7Sdougm 				 * setup before anything that might try to
9051d1813a7Sdougm 				 * create a new object is called. The document
9061d1813a7Sdougm 				 * tree is the combination of handle->doc and
9071d1813a7Sdougm 				 * handle->tree. This allows searches,
9081d1813a7Sdougm 				 * etc. when all you have is an object in the
9091d1813a7Sdougm 				 * tree.
9101d1813a7Sdougm 				 */
9111d1813a7Sdougm 				handle->doc = xmlNewDoc((xmlChar *)"1.0");
91257b448deSdougm 				handle->tree = xmlNewNode(NULL,
91357b448deSdougm 				    (xmlChar *)"sharecfg");
91457b448deSdougm 				if (handle->doc != NULL &&
91557b448deSdougm 				    handle->tree != NULL) {
91657b448deSdougm 					xmlDocSetRootElement(handle->doc,
91757b448deSdougm 					    handle->tree);
91857b448deSdougm 					err = add_handle_for_root(handle->tree,
91957b448deSdougm 					    handle);
9201d1813a7Sdougm 					if (err == SA_OK)
92157b448deSdougm 						err = sa_get_config(
92257b448deSdougm 						    handle->scfhandle,
9231d1813a7Sdougm 						    handle->tree, handle);
9241d1813a7Sdougm 				} else {
9251d1813a7Sdougm 					if (handle->doc != NULL)
9261d1813a7Sdougm 						xmlFreeDoc(handle->doc);
9271d1813a7Sdougm 					if (handle->tree != NULL)
9281d1813a7Sdougm 						xmlFreeNode(handle->tree);
9291d1813a7Sdougm 					err = SA_NO_MEMORY;
9301d1813a7Sdougm 				}
9311d1813a7Sdougm 
932a99982a7Sdougm 				saunblocksigs(&old);
933549ec3ffSdougm 
934549ec3ffSdougm 				if (err != SA_OK) {
935549ec3ffSdougm 					/*
9361d1813a7Sdougm 					 * If we couldn't add the tree handle
9371d1813a7Sdougm 					 * to the list, then things are going
9381d1813a7Sdougm 					 * to fail badly. Might as well undo
9391d1813a7Sdougm 					 * everything now and fail the
9401d1813a7Sdougm 					 * sa_init().
941549ec3ffSdougm 					 */
942549ec3ffSdougm 					sa_fini(handle);
943549ec3ffSdougm 					return (NULL);
944549ec3ffSdougm 				}
945549ec3ffSdougm 
9466185db85Sdougm 				if (tval == 0) {
94757b448deSdougm 					/*
94857b448deSdougm 					 * first time so make sure
94957b448deSdougm 					 * default is setup
95057b448deSdougm 					 */
95157b448deSdougm 					verifydefgroupopts(handle);
9526185db85Sdougm 				}
9531d1813a7Sdougm 
954a99982a7Sdougm 				if (updatelegacy == B_TRUE) {
955a99982a7Sdougm 					sablocksigs(&old);
956549ec3ffSdougm 					getlegacyconfig((sa_handle_t)handle,
957549ec3ffSdougm 					    SA_LEGACY_DFSTAB, &handle->tree);
9586185db85Sdougm 					if (stat(SA_LEGACY_DFSTAB, &st) >= 0)
959546405c3Sdougm 						set_legacy_timestamp(
960546405c3Sdougm 						    handle->tree,
9616185db85Sdougm 						    SA_LEGACY_DFSTAB,
9626185db85Sdougm 						    TSTAMP(st.st_ctim));
963a99982a7Sdougm 					saunblocksigs(&old);
964546405c3Sdougm 					/*
965546405c3Sdougm 					 * Safe to unlock now to allow
966546405c3Sdougm 					 * others to run
967546405c3Sdougm 					 */
968a99982a7Sdougm 					(void) lockf(lockfd, F_ULOCK, 0);
969a99982a7Sdougm 					(void) close(lockfd);
9706185db85Sdougm 				}
971549ec3ffSdougm 				legacy |= sa_get_zfs_shares(handle, "zfs");
972549ec3ffSdougm 				legacy |= gettransients(handle, &handle->tree);
9736185db85Sdougm 			}
9746185db85Sdougm 		}
9756185db85Sdougm 	}
976549ec3ffSdougm 	return ((sa_handle_t)handle);
9776185db85Sdougm }
9786185db85Sdougm 
9796185db85Sdougm /*
980549ec3ffSdougm  * sa_fini(handle)
9816185db85Sdougm  *	Uninitialize the API structures including the configuration
9821cea05afSdougm  *	data structures and ZFS related data.
9836185db85Sdougm  */
9846185db85Sdougm 
9856185db85Sdougm void
986549ec3ffSdougm sa_fini(sa_handle_t handle)
9876185db85Sdougm {
988549ec3ffSdougm 	sa_handle_impl_t impl_handle = (sa_handle_impl_t)handle;
989549ec3ffSdougm 
990549ec3ffSdougm 	if (impl_handle != NULL) {
991549ec3ffSdougm 		/*
992549ec3ffSdougm 		 * Free the config trees and any other data structures
993549ec3ffSdougm 		 * used in the handle.
994549ec3ffSdougm 		 */
995549ec3ffSdougm 		if (impl_handle->doc != NULL)
996549ec3ffSdougm 			xmlFreeDoc(impl_handle->doc);
997549ec3ffSdougm 		sa_scf_fini(impl_handle->scfhandle);
998549ec3ffSdougm 		sa_zfs_fini(impl_handle);
999549ec3ffSdougm 
1000549ec3ffSdougm 		/* Remove and free the entry in the global list. */
1001549ec3ffSdougm 		remove_handle_for_root(impl_handle->tree);
1002549ec3ffSdougm 
1003549ec3ffSdougm 		/* Make sure we free the handle */
1004549ec3ffSdougm 		free(impl_handle);
1005549ec3ffSdougm 
1006549ec3ffSdougm 		/*
1007549ec3ffSdougm 		 * If this was the last handle to release, unload the
1008549ec3ffSdougm 		 * plugins that were loaded.
1009549ec3ffSdougm 		 */
1010549ec3ffSdougm 		if (sa_global_handles == NULL)
1011549ec3ffSdougm 			(void) proto_plugin_fini();
1012549ec3ffSdougm 
10136185db85Sdougm 	}
10146185db85Sdougm }
10156185db85Sdougm 
10166185db85Sdougm /*
10176185db85Sdougm  * sa_get_protocols(char **protocol)
10186185db85Sdougm  *	Get array of protocols that are supported
10196185db85Sdougm  *	Returns pointer to an allocated and NULL terminated
10206185db85Sdougm  *	array of strings.  Caller must free.
10216185db85Sdougm  *	This really should be determined dynamically.
10226185db85Sdougm  *	If there aren't any defined, return -1.
10236185db85Sdougm  *	Use free() to return memory.
10246185db85Sdougm  */
10256185db85Sdougm 
10266185db85Sdougm int
10276185db85Sdougm sa_get_protocols(char ***protocols)
10286185db85Sdougm {
10296185db85Sdougm 	int numproto = -1;
10306185db85Sdougm 
10316185db85Sdougm 	if (protocols != NULL) {
10326185db85Sdougm 		struct sa_proto_plugin *plug;
10336185db85Sdougm 		for (numproto = 0, plug = sap_proto_list; plug != NULL;
10346185db85Sdougm 		    plug = plug->plugin_next) {
10356185db85Sdougm 			numproto++;
10366185db85Sdougm 		}
10376185db85Sdougm 
10386185db85Sdougm 		*protocols = calloc(numproto + 1,  sizeof (char *));
10396185db85Sdougm 		if (*protocols != NULL) {
10406185db85Sdougm 			int ret = 0;
10416185db85Sdougm 			for (plug = sap_proto_list; plug != NULL;
10426185db85Sdougm 			    plug = plug->plugin_next) {
10436185db85Sdougm 				/* faking for now */
104457b448deSdougm 				(*protocols)[ret++] =
104557b448deSdougm 				    plug->plugin_ops->sa_protocol;
10466185db85Sdougm 			}
10476185db85Sdougm 		} else {
10486185db85Sdougm 			numproto = -1;
10496185db85Sdougm 		}
10506185db85Sdougm 	}
10516185db85Sdougm 	return (numproto);
10526185db85Sdougm }
10536185db85Sdougm 
10546185db85Sdougm /*
10556185db85Sdougm  * find_group_by_name(node, group)
10566185db85Sdougm  *
10576185db85Sdougm  * search the XML document subtree specified by node to find the group
10586185db85Sdougm  * specified by group. Searching subtree allows subgroups to be
10596185db85Sdougm  * searched for.
10606185db85Sdougm  */
10616185db85Sdougm 
10626185db85Sdougm static xmlNodePtr
10636185db85Sdougm find_group_by_name(xmlNodePtr node, xmlChar *group)
10646185db85Sdougm {
10656185db85Sdougm 	xmlChar *name = NULL;
10666185db85Sdougm 
10676185db85Sdougm 	for (node = node->xmlChildrenNode; node != NULL;
10686185db85Sdougm 	    node = node->next) {
10696185db85Sdougm 		if (xmlStrcmp(node->name, (xmlChar *)"group") == 0) {
10706185db85Sdougm 			/* if no groupname, return the first found */
10716185db85Sdougm 			if (group == NULL)
10726185db85Sdougm 				break;
10736185db85Sdougm 			name = xmlGetProp(node, (xmlChar *)"name");
107457b448deSdougm 			if (name != NULL && xmlStrcmp(name, group) == 0)
10756185db85Sdougm 				break;
10766185db85Sdougm 			if (name != NULL) {
10776185db85Sdougm 				xmlFree(name);
10786185db85Sdougm 				name = NULL;
10796185db85Sdougm 			}
10806185db85Sdougm 		}
10816185db85Sdougm 	}
10826185db85Sdougm 	if (name != NULL)
10836185db85Sdougm 		xmlFree(name);
10846185db85Sdougm 	return (node);
10856185db85Sdougm }
10866185db85Sdougm 
10876185db85Sdougm /*
10886185db85Sdougm  * sa_get_group(groupname)
10896185db85Sdougm  *	Return the "group" specified.  If groupname is NULL,
10906185db85Sdougm  *	return the first group of the list of groups.
10916185db85Sdougm  */
10926185db85Sdougm sa_group_t
1093549ec3ffSdougm sa_get_group(sa_handle_t handle, char *groupname)
10946185db85Sdougm {
10956185db85Sdougm 	xmlNodePtr node = NULL;
10966185db85Sdougm 	char *subgroup = NULL;
10976185db85Sdougm 	char *group = NULL;
1098549ec3ffSdougm 	sa_handle_impl_t impl_handle = (sa_handle_impl_t)handle;
10996185db85Sdougm 
1100549ec3ffSdougm 	if (impl_handle != NULL && impl_handle->tree != NULL) {
11016185db85Sdougm 		if (groupname != NULL) {
11026185db85Sdougm 			group = strdup(groupname);
1103a3351425Sdougm 			if (group != NULL) {
11046185db85Sdougm 				subgroup = strchr(group, '/');
11056185db85Sdougm 				if (subgroup != NULL)
11066185db85Sdougm 					*subgroup++ = '\0';
11076185db85Sdougm 			}
1108a3351425Sdougm 		}
1109a3351425Sdougm 		/*
1110a3351425Sdougm 		 * We want to find the, possibly, named group. If
1111a3351425Sdougm 		 * group is not NULL, then lookup the name. If it is
1112a3351425Sdougm 		 * NULL, we only do the find if groupname is also
1113a3351425Sdougm 		 * NULL. This allows lookup of the "first" group in
1114a3351425Sdougm 		 * the internal list.
1115a3351425Sdougm 		 */
1116a3351425Sdougm 		if (group != NULL || groupname == NULL)
1117a3351425Sdougm 			node = find_group_by_name(impl_handle->tree,
1118a3351425Sdougm 			    (xmlChar *)group);
1119a3351425Sdougm 
11206185db85Sdougm 		/* if a subgroup, find it before returning */
112157b448deSdougm 		if (subgroup != NULL && node != NULL)
11226185db85Sdougm 			node = find_group_by_name(node, (xmlChar *)subgroup);
11236185db85Sdougm 	}
11246185db85Sdougm 	if (node != NULL && (char *)group != NULL)
1125549ec3ffSdougm 		(void) sa_get_instance(impl_handle->scfhandle, (char *)group);
11266185db85Sdougm 	if (group != NULL)
11276185db85Sdougm 		free(group);
11286185db85Sdougm 	return ((sa_group_t)(node));
11296185db85Sdougm }
11306185db85Sdougm 
11316185db85Sdougm /*
11326185db85Sdougm  * sa_get_next_group(group)
11336185db85Sdougm  *	Return the "next" group after the specified group from
11346185db85Sdougm  *	the internal group list.  NULL if there are no more.
11356185db85Sdougm  */
11366185db85Sdougm sa_group_t
11376185db85Sdougm sa_get_next_group(sa_group_t group)
11386185db85Sdougm {
11396185db85Sdougm 	xmlNodePtr ngroup = NULL;
11406185db85Sdougm 	if (group != NULL) {
11416185db85Sdougm 		for (ngroup = ((xmlNodePtr)group)->next; ngroup != NULL;
11426185db85Sdougm 		    ngroup = ngroup->next) {
11436185db85Sdougm 			if (xmlStrcmp(ngroup->name, (xmlChar *)"group") == 0)
11446185db85Sdougm 				break;
11456185db85Sdougm 		}
11466185db85Sdougm 	}
11476185db85Sdougm 	return ((sa_group_t)ngroup);
11486185db85Sdougm }
11496185db85Sdougm 
11506185db85Sdougm /*
11516185db85Sdougm  * sa_get_share(group, sharepath)
11526185db85Sdougm  *	Return the share object for the share specified. The share
11536185db85Sdougm  *	must be in the specified group.  Return NULL if not found.
11546185db85Sdougm  */
11556185db85Sdougm sa_share_t
11566185db85Sdougm sa_get_share(sa_group_t group, char *sharepath)
11576185db85Sdougm {
11586185db85Sdougm 	xmlNodePtr node = NULL;
11596185db85Sdougm 	xmlChar *path;
11606185db85Sdougm 
11616185db85Sdougm 	/*
11626185db85Sdougm 	 * For future scalability, this should end up building a cache
11636185db85Sdougm 	 * since it will get called regularly by the mountd and info
11646185db85Sdougm 	 * services.
11656185db85Sdougm 	 */
11666185db85Sdougm 	if (group != NULL) {
11676185db85Sdougm 		for (node = ((xmlNodePtr)group)->children; node != NULL;
11686185db85Sdougm 		    node = node->next) {
11696185db85Sdougm 			if (xmlStrcmp(node->name, (xmlChar *)"share") == 0) {
11706185db85Sdougm 				if (sharepath == NULL) {
11716185db85Sdougm 					break;
11726185db85Sdougm 				} else {
11736185db85Sdougm 					/* is it the correct share? */
117457b448deSdougm 					path = xmlGetProp(node,
117557b448deSdougm 					    (xmlChar *)"path");
11766185db85Sdougm 					if (path != NULL &&
117757b448deSdougm 					    xmlStrcmp(path,
117857b448deSdougm 					    (xmlChar *)sharepath) == 0) {
11796185db85Sdougm 						xmlFree(path);
11806185db85Sdougm 						break;
11816185db85Sdougm 					}
11826185db85Sdougm 					xmlFree(path);
11836185db85Sdougm 				}
11846185db85Sdougm 			}
11856185db85Sdougm 		}
11866185db85Sdougm 	}
11876185db85Sdougm 	return ((sa_share_t)node);
11886185db85Sdougm }
11896185db85Sdougm 
11906185db85Sdougm /*
11916185db85Sdougm  * sa_get_next_share(share)
11926185db85Sdougm  *	Return the next share following the specified share
11936185db85Sdougm  *	from the internal list of shares. Returns NULL if there
11946185db85Sdougm  *	are no more shares.  The list is relative to the same
11956185db85Sdougm  *	group.
11966185db85Sdougm  */
11976185db85Sdougm sa_share_t
11986185db85Sdougm sa_get_next_share(sa_share_t share)
11996185db85Sdougm {
12006185db85Sdougm 	xmlNodePtr node = NULL;
12016185db85Sdougm 
12026185db85Sdougm 	if (share != NULL) {
12036185db85Sdougm 		for (node = ((xmlNodePtr)share)->next; node != NULL;
12046185db85Sdougm 		    node = node->next) {
12056185db85Sdougm 			if (xmlStrcmp(node->name, (xmlChar *)"share") == 0) {
12066185db85Sdougm 				break;
12076185db85Sdougm 			}
12086185db85Sdougm 		}
12096185db85Sdougm 	}
12106185db85Sdougm 	return ((sa_share_t)node);
12116185db85Sdougm }
12126185db85Sdougm 
12136185db85Sdougm /*
12146185db85Sdougm  * _sa_get_child_node(node, type)
12156185db85Sdougm  *
12166185db85Sdougm  * find the child node of the specified node that has "type". This is
12176185db85Sdougm  * used to implement several internal functions.
12186185db85Sdougm  */
12196185db85Sdougm 
12206185db85Sdougm static xmlNodePtr
12216185db85Sdougm _sa_get_child_node(xmlNodePtr node, xmlChar *type)
12226185db85Sdougm {
12236185db85Sdougm 	xmlNodePtr child;
12246185db85Sdougm 	for (child = node->xmlChildrenNode; child != NULL;
12256185db85Sdougm 	    child = child->next)
12266185db85Sdougm 		if (xmlStrcmp(child->name, type) == 0)
12276185db85Sdougm 			return (child);
12286185db85Sdougm 	return ((xmlNodePtr)NULL);
12296185db85Sdougm }
12306185db85Sdougm 
12316185db85Sdougm /*
12326185db85Sdougm  *  find_share(group, path)
12336185db85Sdougm  *
12346185db85Sdougm  * Search all the shares in the specified group for one that has the
12356185db85Sdougm  * specified path.
12366185db85Sdougm  */
12376185db85Sdougm 
12386185db85Sdougm static sa_share_t
12396185db85Sdougm find_share(sa_group_t group, char *sharepath)
12406185db85Sdougm {
12416185db85Sdougm 	sa_share_t share;
12426185db85Sdougm 	char *path;
12436185db85Sdougm 
12446185db85Sdougm 	for (share = sa_get_share(group, NULL); share != NULL;
12456185db85Sdougm 	    share = sa_get_next_share(share)) {
12466185db85Sdougm 		path = sa_get_share_attr(share, "path");
12476185db85Sdougm 		if (path != NULL && strcmp(path, sharepath) == 0) {
12486185db85Sdougm 			sa_free_attr_string(path);
12496185db85Sdougm 			break;
12506185db85Sdougm 		}
12516185db85Sdougm 		if (path != NULL)
12526185db85Sdougm 			sa_free_attr_string(path);
12536185db85Sdougm 	}
12546185db85Sdougm 	return (share);
12556185db85Sdougm }
12566185db85Sdougm 
12576185db85Sdougm /*
12586185db85Sdougm  * sa_get_sub_group(group)
12596185db85Sdougm  *
12606185db85Sdougm  * Get the first sub-group of group. The sa_get_next_group() function
12616185db85Sdougm  * can be used to get the rest. This is currently only used for ZFS
12626185db85Sdougm  * sub-groups but could be used to implement a more general mechanism.
12636185db85Sdougm  */
12646185db85Sdougm 
12656185db85Sdougm sa_group_t
12666185db85Sdougm sa_get_sub_group(sa_group_t group)
12676185db85Sdougm {
12686185db85Sdougm 	return ((sa_group_t)_sa_get_child_node((xmlNodePtr)group,
12696185db85Sdougm 	    (xmlChar *)"group"));
12706185db85Sdougm }
12716185db85Sdougm 
12726185db85Sdougm /*
12736185db85Sdougm  * sa_find_share(sharepath)
12746185db85Sdougm  *	Finds a share regardless of group.  In the future, this
12756185db85Sdougm  *	function should utilize a cache and hash table of some kind.
12766185db85Sdougm  *	The current assumption is that a path will only be shared
12776185db85Sdougm  *	once.  In the future, this may change as implementation of
12786185db85Sdougm  *	resource names comes into being.
12796185db85Sdougm  */
12806185db85Sdougm sa_share_t
1281549ec3ffSdougm sa_find_share(sa_handle_t handle, char *sharepath)
12826185db85Sdougm {
12836185db85Sdougm 	sa_group_t group;
12846185db85Sdougm 	sa_group_t zgroup;
12856185db85Sdougm 	sa_share_t share = NULL;
12866185db85Sdougm 	int done = 0;
12876185db85Sdougm 
1288549ec3ffSdougm 	for (group = sa_get_group(handle, NULL); group != NULL && !done;
12896185db85Sdougm 	    group = sa_get_next_group(group)) {
12906185db85Sdougm 		if (is_zfs_group(group)) {
129157b448deSdougm 			for (zgroup =
129257b448deSdougm 			    (sa_group_t)_sa_get_child_node((xmlNodePtr)group,
12936185db85Sdougm 			    (xmlChar *)"group");
129457b448deSdougm 			    zgroup != NULL;
129557b448deSdougm 			    zgroup = sa_get_next_group(zgroup)) {
12966185db85Sdougm 				share = find_share(zgroup, sharepath);
12976185db85Sdougm 				if (share != NULL)
12986185db85Sdougm 					break;
12996185db85Sdougm 			}
13006185db85Sdougm 		} else {
13016185db85Sdougm 			share = find_share(group, sharepath);
13026185db85Sdougm 		}
13036185db85Sdougm 		if (share != NULL)
13046185db85Sdougm 			break;
13056185db85Sdougm 	}
13066185db85Sdougm 	return (share);
13076185db85Sdougm }
13086185db85Sdougm 
13096185db85Sdougm /*
1310f345c0beSdougm  *  sa_check_path(group, path, strictness)
13116185db85Sdougm  *
1312da6c28aaSamw  * Check that path is a valid path relative to the group.  Currently,
13136185db85Sdougm  * we are ignoring the group and checking only the NFS rules. Later,
13146185db85Sdougm  * we may want to use the group to then check against the protocols
1315f345c0beSdougm  * enabled on the group. The strictness values mean:
1316f345c0beSdougm  * SA_CHECK_NORMAL == only check newpath against shares that are active
1317f345c0beSdougm  * SA_CHECK_STRICT == check newpath against both active shares and those
1318f345c0beSdougm  *		      stored in the repository
13196185db85Sdougm  */
13206185db85Sdougm 
13216185db85Sdougm int
1322f345c0beSdougm sa_check_path(sa_group_t group, char *path, int strictness)
13236185db85Sdougm {
1324549ec3ffSdougm 	sa_handle_t handle;
1325549ec3ffSdougm 
1326549ec3ffSdougm 	handle = sa_find_group_handle(group);
1327549ec3ffSdougm 	return (validpath(handle, path, strictness));
13286185db85Sdougm }
13296185db85Sdougm 
13306185db85Sdougm /*
1331da6c28aaSamw  * mark_excluded_protos(group, share, flags)
13326185db85Sdougm  *
1333da6c28aaSamw  * Walk through all the protocols enabled for the group and check to
1334da6c28aaSamw  * see if the share has any of them should be in the exclude list
1335da6c28aaSamw  * based on the featureset of the protocol. If there are any, add the
1336da6c28aaSamw  * "exclude" property to the share.
1337da6c28aaSamw  */
1338da6c28aaSamw static void
1339da6c28aaSamw mark_excluded_protos(sa_group_t group, xmlNodePtr share, uint64_t flags)
1340da6c28aaSamw {
1341da6c28aaSamw 	sa_optionset_t optionset;
1342da6c28aaSamw 	char exclude_list[SA_STRSIZE];
1343da6c28aaSamw 	char *sep = "";
1344da6c28aaSamw 
1345da6c28aaSamw 	exclude_list[0] = '\0';
1346da6c28aaSamw 	for (optionset = sa_get_optionset(group, NULL);
1347da6c28aaSamw 	    optionset != NULL;
1348da6c28aaSamw 	    optionset = sa_get_next_optionset(optionset)) {
1349da6c28aaSamw 		char *value;
1350da6c28aaSamw 		uint64_t features;
1351da6c28aaSamw 		value = sa_get_optionset_attr(optionset, "type");
1352da6c28aaSamw 		if (value == NULL)
1353da6c28aaSamw 			continue;
1354da6c28aaSamw 		features = sa_proto_get_featureset(value);
1355da6c28aaSamw 		sa_free_attr_string(value);
1356da6c28aaSamw 		if (!(features & flags)) {
1357da6c28aaSamw 			(void) strlcat(exclude_list, sep,
1358da6c28aaSamw 			    sizeof (exclude_list));
1359da6c28aaSamw 			(void) strlcat(exclude_list, value,
1360da6c28aaSamw 			    sizeof (exclude_list));
1361da6c28aaSamw 			sep = ",";
1362da6c28aaSamw 		}
1363da6c28aaSamw 	}
1364da6c28aaSamw 	if (exclude_list[0] != '\0')
1365da6c28aaSamw 		xmlSetProp(share, (xmlChar *)"exclude",
1366da6c28aaSamw 		    (xmlChar *)exclude_list);
1367da6c28aaSamw }
1368da6c28aaSamw 
1369da6c28aaSamw /*
1370da6c28aaSamw  * get_all_features(group)
1371da6c28aaSamw  *
1372da6c28aaSamw  * Walk through all the protocols on the group and collect all
1373da6c28aaSamw  * possible enabled features. This is the OR of all the featuresets.
1374da6c28aaSamw  */
1375da6c28aaSamw static uint64_t
1376da6c28aaSamw get_all_features(sa_group_t group)
1377da6c28aaSamw {
1378da6c28aaSamw 	sa_optionset_t optionset;
1379da6c28aaSamw 	uint64_t features = 0;
1380da6c28aaSamw 
1381da6c28aaSamw 	for (optionset = sa_get_optionset(group, NULL);
1382da6c28aaSamw 	    optionset != NULL;
1383da6c28aaSamw 	    optionset = sa_get_next_optionset(optionset)) {
1384da6c28aaSamw 		char *value;
1385da6c28aaSamw 		value = sa_get_optionset_attr(optionset, "type");
1386da6c28aaSamw 		if (value == NULL)
1387da6c28aaSamw 			continue;
1388da6c28aaSamw 		features |= sa_proto_get_featureset(value);
1389da6c28aaSamw 		sa_free_attr_string(value);
1390da6c28aaSamw 	}
1391da6c28aaSamw 	return (features);
1392da6c28aaSamw }
1393da6c28aaSamw 
1394da6c28aaSamw 
1395da6c28aaSamw /*
1396da6c28aaSamw  * _sa_add_share(group, sharepath, persist, *error, flags)
1397da6c28aaSamw  *
1398da6c28aaSamw  * Common code for all types of add_share. sa_add_share() is the
13996185db85Sdougm  * public API, we also need to be able to do this when parsing legacy
14006185db85Sdougm  * files and construction of the internal configuration while
1401da6c28aaSamw  * extracting config info from SMF. "flags" indicates if some
1402da6c28aaSamw  * protocols need relaxed rules while other don't. These values are
1403da6c28aaSamw  * the featureset values defined in libshare.h.
14046185db85Sdougm  */
14056185db85Sdougm 
14066185db85Sdougm sa_share_t
1407da6c28aaSamw _sa_add_share(sa_group_t group, char *sharepath, int persist, int *error,
1408da6c28aaSamw     uint64_t flags)
14096185db85Sdougm {
14106185db85Sdougm 	xmlNodePtr node = NULL;
14116185db85Sdougm 	int err;
14126185db85Sdougm 
14136185db85Sdougm 	err  = SA_OK; /* assume success */
14146185db85Sdougm 
141557b448deSdougm 	node = xmlNewChild((xmlNodePtr)group, NULL, (xmlChar *)"share", NULL);
1416da6c28aaSamw 	if (node == NULL) {
1417da6c28aaSamw 		if (error != NULL)
1418da6c28aaSamw 			*error = SA_NO_MEMORY;
1419da6c28aaSamw 		return (node);
1420da6c28aaSamw 	}
1421da6c28aaSamw 
14226185db85Sdougm 	xmlSetProp(node, (xmlChar *)"path", (xmlChar *)sharepath);
142357b448deSdougm 	xmlSetProp(node, (xmlChar *)"type",
142457b448deSdougm 	    persist ? (xmlChar *)"persist" : (xmlChar *)"transient");
1425da6c28aaSamw 	if (flags != 0)
1426da6c28aaSamw 		mark_excluded_protos(group, node, flags);
14276185db85Sdougm 	if (persist != SA_SHARE_TRANSIENT) {
14286185db85Sdougm 		/*
14296185db85Sdougm 		 * persistent shares come in two flavors: SMF and
14306185db85Sdougm 		 * ZFS. Sort this one out based on target group and
1431da6c28aaSamw 		 * path type. Both NFS and SMB are supported. First,
1432da6c28aaSamw 		 * check to see if the protocol is enabled on the
1433da6c28aaSamw 		 * subgroup and then setup the share appropriately.
14346185db85Sdougm 		 */
143557b448deSdougm 		if (sa_group_is_zfs(group) &&
143657b448deSdougm 		    sa_path_is_zfs(sharepath)) {
1437da6c28aaSamw 			if (sa_get_optionset(group, "nfs") != NULL)
14386185db85Sdougm 				err = sa_zfs_set_sharenfs(group, sharepath, 1);
1439da6c28aaSamw 			else if (sa_get_optionset(group, "smb") != NULL)
1440da6c28aaSamw 				err = sa_zfs_set_sharesmb(group, sharepath, 1);
14416185db85Sdougm 		} else {
1442549ec3ffSdougm 			sa_handle_impl_t impl_handle;
144357b448deSdougm 			impl_handle =
1444da6c28aaSamw 			    (sa_handle_impl_t)sa_find_group_handle(group);
144557b448deSdougm 			if (impl_handle != NULL) {
1446da6c28aaSamw 				err = sa_commit_share(impl_handle->scfhandle,
1447da6c28aaSamw 				    group, (sa_share_t)node);
144857b448deSdougm 			} else {
1449549ec3ffSdougm 				err = SA_SYSTEM_ERR;
14506185db85Sdougm 			}
14516185db85Sdougm 		}
145257b448deSdougm 	}
1453da6c28aaSamw 	if (err == SA_NO_PERMISSION && persist & SA_SHARE_PARSER)
14546185db85Sdougm 		/* called by the dfstab parser so could be a show */
14556185db85Sdougm 		err = SA_OK;
1456da6c28aaSamw 
14576185db85Sdougm 	if (err != SA_OK) {
14586185db85Sdougm 		/*
14596185db85Sdougm 		 * we couldn't commit to the repository so undo
14606185db85Sdougm 		 * our internal state to reflect reality.
14616185db85Sdougm 		 */
14626185db85Sdougm 		xmlUnlinkNode(node);
14636185db85Sdougm 		xmlFreeNode(node);
14646185db85Sdougm 		node = NULL;
14656185db85Sdougm 	}
1466da6c28aaSamw 
14676185db85Sdougm 	if (error != NULL)
14686185db85Sdougm 		*error = err;
1469da6c28aaSamw 
14706185db85Sdougm 	return (node);
14716185db85Sdougm }
14726185db85Sdougm 
14736185db85Sdougm /*
14746185db85Sdougm  * sa_add_share(group, sharepath, persist, *error)
14756185db85Sdougm  *
14766185db85Sdougm  *	Add a new share object to the specified group.  The share will
14776185db85Sdougm  *	have the specified sharepath and will only be constructed if
14786185db85Sdougm  *	it is a valid path to be shared.  NULL is returned on error
14796185db85Sdougm  *	and a detailed error value will be returned via the error
14806185db85Sdougm  *	pointer.
14816185db85Sdougm  */
14826185db85Sdougm sa_share_t
14836185db85Sdougm sa_add_share(sa_group_t group, char *sharepath, int persist, int *error)
14846185db85Sdougm {
14856185db85Sdougm 	xmlNodePtr node = NULL;
1486f345c0beSdougm 	int strictness = SA_CHECK_NORMAL;
1487549ec3ffSdougm 	sa_handle_t handle;
1488da6c28aaSamw 	uint64_t special = 0;
1489da6c28aaSamw 	uint64_t features;
1490f345c0beSdougm 
1491f345c0beSdougm 	/*
1492f345c0beSdougm 	 * If the share is to be permanent, use strict checking so a
1493f345c0beSdougm 	 * bad config doesn't get created. Transient shares only need
1494f345c0beSdougm 	 * to check against the currently active
1495f345c0beSdougm 	 * shares. SA_SHARE_PARSER is a modifier used internally to
1496f345c0beSdougm 	 * indicate that we are being called by the dfstab parser and
1497f345c0beSdougm 	 * that we need strict checking in all cases. Normally persist
1498f345c0beSdougm 	 * is in integer value but SA_SHARE_PARSER may be or'd into
1499f345c0beSdougm 	 * it as an override.
1500f345c0beSdougm 	 */
1501f345c0beSdougm 	if (persist & SA_SHARE_PARSER || persist == SA_SHARE_PERMANENT)
1502f345c0beSdougm 		strictness = SA_CHECK_STRICT;
15036185db85Sdougm 
1504549ec3ffSdougm 	handle = sa_find_group_handle(group);
1505549ec3ffSdougm 
1506da6c28aaSamw 	/*
1507da6c28aaSamw 	 * need to determine if the share is valid. The rules are:
1508da6c28aaSamw 	 *	- The path must not already exist
1509da6c28aaSamw 	 *	- The path must not be a subdir or parent dir of an
1510da6c28aaSamw 	 *	  existing path unless at least one protocol allows it.
1511da6c28aaSamw 	 * The sub/parent check is done in sa_check_path().
1512da6c28aaSamw 	 */
1513da6c28aaSamw 
1514da6c28aaSamw 	if (sa_find_share(handle, sharepath) == NULL) {
1515da6c28aaSamw 		*error = sa_check_path(group, sharepath, strictness);
1516da6c28aaSamw 		features = get_all_features(group);
1517da6c28aaSamw 		switch (*error) {
1518da6c28aaSamw 		case SA_PATH_IS_SUBDIR:
1519da6c28aaSamw 			if (features & SA_FEATURE_ALLOWSUBDIRS)
1520da6c28aaSamw 				special |= SA_FEATURE_ALLOWSUBDIRS;
1521da6c28aaSamw 			break;
1522da6c28aaSamw 		case SA_PATH_IS_PARENTDIR:
1523da6c28aaSamw 			if (features & SA_FEATURE_ALLOWPARDIRS)
1524da6c28aaSamw 				special |= SA_FEATURE_ALLOWPARDIRS;
1525da6c28aaSamw 			break;
15266185db85Sdougm 		}
1527da6c28aaSamw 		if (*error == SA_OK || special != SA_FEATURE_NONE)
1528da6c28aaSamw 			node = _sa_add_share(group, sharepath, persist,
1529da6c28aaSamw 			    error, special);
1530da6c28aaSamw 	} else {
15316185db85Sdougm 		*error = SA_DUPLICATE_NAME;
1532da6c28aaSamw 	}
15336185db85Sdougm 
15346185db85Sdougm 	return ((sa_share_t)node);
15356185db85Sdougm }
15366185db85Sdougm 
15376185db85Sdougm /*
15386185db85Sdougm  * sa_enable_share(share, protocol)
15396185db85Sdougm  *	Enable the specified share to the specified protocol.
15406185db85Sdougm  *	If protocol is NULL, then all protocols.
15416185db85Sdougm  */
15426185db85Sdougm int
15436185db85Sdougm sa_enable_share(sa_share_t share, char *protocol)
15446185db85Sdougm {
15456185db85Sdougm 	char *sharepath;
15466185db85Sdougm 	struct stat st;
1547da6c28aaSamw 	int err = SA_OK;
1548da6c28aaSamw 	int ret;
15496185db85Sdougm 
15506185db85Sdougm 	sharepath = sa_get_share_attr(share, "path");
1551da6c28aaSamw 	if (sharepath == NULL)
1552da6c28aaSamw 		return (SA_NO_MEMORY);
15536185db85Sdougm 	if (stat(sharepath, &st) < 0) {
15546185db85Sdougm 		err = SA_NO_SUCH_PATH;
15556185db85Sdougm 	} else {
15566185db85Sdougm 		/* tell the server about the share */
15576185db85Sdougm 		if (protocol != NULL) {
1558da6c28aaSamw 			if (excluded_protocol(share, protocol))
1559da6c28aaSamw 				goto done;
1560da6c28aaSamw 
15616185db85Sdougm 			/* lookup protocol specific handler */
15626185db85Sdougm 			err = sa_proto_share(protocol, share);
15636185db85Sdougm 			if (err == SA_OK)
1564da6c28aaSamw 				(void) sa_set_share_attr(share,
1565da6c28aaSamw 				    "shared", "true");
15666185db85Sdougm 		} else {
1567da6c28aaSamw 			/* Tell all protocols about the share */
1568da6c28aaSamw 			sa_group_t group;
1569da6c28aaSamw 			sa_optionset_t optionset;
1570da6c28aaSamw 
1571da6c28aaSamw 			group = sa_get_parent_group(share);
1572da6c28aaSamw 
1573da6c28aaSamw 			for (optionset = sa_get_optionset(group, NULL);
1574da6c28aaSamw 			    optionset != NULL;
1575da6c28aaSamw 			    optionset = sa_get_next_optionset(optionset)) {
1576da6c28aaSamw 				char *proto;
1577da6c28aaSamw 				proto = sa_get_optionset_attr(optionset,
1578da6c28aaSamw 				    "type");
1579da6c28aaSamw 				if (proto != NULL) {
1580da6c28aaSamw 					if (!excluded_protocol(share, proto)) {
1581da6c28aaSamw 						ret = sa_proto_share(proto,
1582da6c28aaSamw 						    share);
1583da6c28aaSamw 						if (ret != SA_OK)
1584da6c28aaSamw 							err = ret;
1585da6c28aaSamw 					}
1586da6c28aaSamw 					sa_free_attr_string(proto);
1587da6c28aaSamw 				}
1588da6c28aaSamw 			}
15896185db85Sdougm 			(void) sa_set_share_attr(share, "shared", "true");
15906185db85Sdougm 		}
15916185db85Sdougm 	}
1592da6c28aaSamw done:
15936185db85Sdougm 	if (sharepath != NULL)
15946185db85Sdougm 		sa_free_attr_string(sharepath);
15956185db85Sdougm 	return (err);
15966185db85Sdougm }
15976185db85Sdougm 
15986185db85Sdougm /*
15996185db85Sdougm  * sa_disable_share(share, protocol)
1600da6c28aaSamw  *	Disable the specified share to the specified protocol.  If
1601da6c28aaSamw  *	protocol is NULL, then all protocols that are enabled for the
1602da6c28aaSamw  *	share should be disabled.
16036185db85Sdougm  */
16046185db85Sdougm int
16056185db85Sdougm sa_disable_share(sa_share_t share, char *protocol)
16066185db85Sdougm {
16076185db85Sdougm 	char *path;
1608da6c28aaSamw 	int err = SA_OK;
16096185db85Sdougm 	int ret = SA_OK;
16106185db85Sdougm 
16116185db85Sdougm 	path = sa_get_share_attr(share, "path");
16126185db85Sdougm 
16136185db85Sdougm 	if (protocol != NULL) {
1614ecd6cf80Smarks 		ret = sa_proto_unshare(share, protocol, path);
16156185db85Sdougm 	} else {
16166185db85Sdougm 		/* need to do all protocols */
1617da6c28aaSamw 		sa_group_t group;
1618da6c28aaSamw 		sa_optionset_t optionset;
1619da6c28aaSamw 
1620da6c28aaSamw 		group = sa_get_parent_group(share);
1621da6c28aaSamw 
1622da6c28aaSamw 		/* Tell all protocols about the share */
1623da6c28aaSamw 		for (optionset = sa_get_optionset(group, NULL);
1624da6c28aaSamw 		    optionset != NULL;
1625da6c28aaSamw 		    optionset = sa_get_next_optionset(optionset)) {
1626da6c28aaSamw 			char *proto;
1627da6c28aaSamw 
1628da6c28aaSamw 			proto = sa_get_optionset_attr(optionset, "type");
1629da6c28aaSamw 			if (proto != NULL) {
1630da6c28aaSamw 				err = sa_proto_unshare(share, proto, path);
1631da6c28aaSamw 				if (err != SA_OK)
1632da6c28aaSamw 					ret = err;
1633da6c28aaSamw 				sa_free_attr_string(proto);
1634da6c28aaSamw 			}
1635da6c28aaSamw 		}
16366185db85Sdougm 	}
16376185db85Sdougm 	if (ret == SA_OK)
16386185db85Sdougm 		(void) sa_set_share_attr(share, "shared", NULL);
16396185db85Sdougm 	if (path != NULL)
16406185db85Sdougm 		sa_free_attr_string(path);
16416185db85Sdougm 	return (ret);
16426185db85Sdougm }
16436185db85Sdougm 
16446185db85Sdougm /*
16456185db85Sdougm  * sa_remove_share(share)
16466185db85Sdougm  *
16476185db85Sdougm  * remove the specified share from its containing group.
16486185db85Sdougm  * Remove from the SMF or ZFS configuration space.
16496185db85Sdougm  */
16506185db85Sdougm 
16516185db85Sdougm int
16526185db85Sdougm sa_remove_share(sa_share_t share)
16536185db85Sdougm {
16546185db85Sdougm 	sa_group_t group;
16556185db85Sdougm 	int ret = SA_OK;
16566185db85Sdougm 	char *type;
16576185db85Sdougm 	int transient = 0;
16586185db85Sdougm 	char *groupname;
16596185db85Sdougm 	char *zfs;
16606185db85Sdougm 
16616185db85Sdougm 	type = sa_get_share_attr(share, "type");
16626185db85Sdougm 	group = sa_get_parent_group(share);
16636185db85Sdougm 	zfs = sa_get_group_attr(group, "zfs");
16646185db85Sdougm 	groupname = sa_get_group_attr(group, "name");
16656185db85Sdougm 	if (type != NULL && strcmp(type, "persist") != 0)
16666185db85Sdougm 		transient = 1;
16676185db85Sdougm 	if (type != NULL)
16686185db85Sdougm 		sa_free_attr_string(type);
16696185db85Sdougm 
16706185db85Sdougm 	/* remove the node from its group then free the memory */
16716185db85Sdougm 
16726185db85Sdougm 	/*
16736185db85Sdougm 	 * need to test if "busy"
16746185db85Sdougm 	 */
16756185db85Sdougm 	/* only do SMF action if permanent */
16766185db85Sdougm 	if (!transient || zfs != NULL) {
16776185db85Sdougm 		/* remove from legacy dfstab as well as possible SMF */
1678da6c28aaSamw 		ret = sa_delete_legacy(share, NULL);
16796185db85Sdougm 		if (ret == SA_OK) {
16806185db85Sdougm 			if (!sa_group_is_zfs(group)) {
1681549ec3ffSdougm 				sa_handle_impl_t impl_handle;
168257b448deSdougm 				impl_handle = (sa_handle_impl_t)
168357b448deSdougm 				    sa_find_group_handle(group);
168457b448deSdougm 				if (impl_handle != NULL) {
168557b448deSdougm 					ret = sa_delete_share(
168657b448deSdougm 					    impl_handle->scfhandle, group,
168757b448deSdougm 					    share);
16886185db85Sdougm 				} else {
168957b448deSdougm 					ret = SA_SYSTEM_ERR;
169057b448deSdougm 				}
169157b448deSdougm 			} else {
169257b448deSdougm 				char *sharepath = sa_get_share_attr(share,
169357b448deSdougm 				    "path");
16946185db85Sdougm 				if (sharepath != NULL) {
169557b448deSdougm 					ret = sa_zfs_set_sharenfs(group,
169657b448deSdougm 					    sharepath, 0);
16976185db85Sdougm 					sa_free_attr_string(sharepath);
16986185db85Sdougm 				}
16996185db85Sdougm 			}
17006185db85Sdougm 		}
17016185db85Sdougm 	}
17026185db85Sdougm 	if (groupname != NULL)
17036185db85Sdougm 		sa_free_attr_string(groupname);
17046185db85Sdougm 	if (zfs != NULL)
17056185db85Sdougm 		sa_free_attr_string(zfs);
17066185db85Sdougm 
17076185db85Sdougm 	xmlUnlinkNode((xmlNodePtr)share);
17086185db85Sdougm 	xmlFreeNode((xmlNodePtr)share);
17096185db85Sdougm 	return (ret);
17106185db85Sdougm }
17116185db85Sdougm 
17126185db85Sdougm /*
17136185db85Sdougm  * sa_move_share(group, share)
17146185db85Sdougm  *
17156185db85Sdougm  * move the specified share to the specified group.  Update SMF
17166185db85Sdougm  * appropriately.
17176185db85Sdougm  */
17186185db85Sdougm 
17196185db85Sdougm int
17206185db85Sdougm sa_move_share(sa_group_t group, sa_share_t share)
17216185db85Sdougm {
17226185db85Sdougm 	sa_group_t oldgroup;
17236185db85Sdougm 	int ret = SA_OK;
17246185db85Sdougm 
17256185db85Sdougm 	/* remove the node from its group then free the memory */
17266185db85Sdougm 
17276185db85Sdougm 	oldgroup = sa_get_parent_group(share);
17286185db85Sdougm 	if (oldgroup != group) {
1729549ec3ffSdougm 		sa_handle_impl_t impl_handle;
17306185db85Sdougm 		xmlUnlinkNode((xmlNodePtr)share);
173157b448deSdougm 		/*
173257b448deSdougm 		 * now that the share isn't in its old group, add to
173357b448deSdougm 		 * the new one
173457b448deSdougm 		 */
17356185db85Sdougm 		xmlAddChild((xmlNodePtr)group, (xmlNodePtr)share);
17366185db85Sdougm 		/* need to deal with SMF */
1737549ec3ffSdougm 		impl_handle = (sa_handle_impl_t)sa_find_group_handle(group);
1738549ec3ffSdougm 		if (impl_handle != NULL) {
17396185db85Sdougm 			/*
17406185db85Sdougm 			 * need to remove from old group first and then add to
17416185db85Sdougm 			 * new group. Ideally, we would do the other order but
17426185db85Sdougm 			 * need to avoid having the share in two groups at the
17436185db85Sdougm 			 * same time.
17446185db85Sdougm 			 */
174557b448deSdougm 			ret = sa_delete_share(impl_handle->scfhandle, oldgroup,
174657b448deSdougm 			    share);
1747549ec3ffSdougm 			if (ret == SA_OK)
174857b448deSdougm 				ret = sa_commit_share(impl_handle->scfhandle,
174957b448deSdougm 				    group, share);
1750549ec3ffSdougm 		} else {
1751549ec3ffSdougm 			ret = SA_SYSTEM_ERR;
17526185db85Sdougm 		}
17536185db85Sdougm 	}
17546185db85Sdougm 	return (ret);
17556185db85Sdougm }
17566185db85Sdougm 
17576185db85Sdougm /*
17586185db85Sdougm  * sa_get_parent_group(share)
17596185db85Sdougm  *
1760da6c28aaSamw  * Return the containing group for the share. If a group was actually
17616185db85Sdougm  * passed in, we don't want a parent so return NULL.
17626185db85Sdougm  */
17636185db85Sdougm 
17646185db85Sdougm sa_group_t
17656185db85Sdougm sa_get_parent_group(sa_share_t share)
17666185db85Sdougm {
17676185db85Sdougm 	xmlNodePtr node = NULL;
17686185db85Sdougm 	if (share != NULL) {
17696185db85Sdougm 		node = ((xmlNodePtr)share)->parent;
17706185db85Sdougm 		/*
17716185db85Sdougm 		 * make sure parent is a group and not sharecfg since
17726185db85Sdougm 		 * we may be cheating and passing in a group.
17736185db85Sdougm 		 * Eventually, groups of groups might come into being.
17746185db85Sdougm 		 */
17756185db85Sdougm 		if (node == NULL ||
17766185db85Sdougm 		    xmlStrcmp(node->name, (xmlChar *)"sharecfg") == 0)
17776185db85Sdougm 			node = NULL;
17786185db85Sdougm 	}
17796185db85Sdougm 	return ((sa_group_t)node);
17806185db85Sdougm }
17816185db85Sdougm 
17826185db85Sdougm /*
1783549ec3ffSdougm  * _sa_create_group(impl_handle, groupname)
17846185db85Sdougm  *
17856185db85Sdougm  * Create a group in the document. The caller will need to deal with
17866185db85Sdougm  * configuration store and activation.
17876185db85Sdougm  */
17886185db85Sdougm 
17896185db85Sdougm sa_group_t
1790549ec3ffSdougm _sa_create_group(sa_handle_impl_t impl_handle, char *groupname)
17916185db85Sdougm {
17926185db85Sdougm 	xmlNodePtr node = NULL;
17936185db85Sdougm 
17946185db85Sdougm 	if (sa_valid_group_name(groupname)) {
179557b448deSdougm 		node = xmlNewChild(impl_handle->tree, NULL, (xmlChar *)"group",
179657b448deSdougm 		    NULL);
17976185db85Sdougm 		if (node != NULL) {
179857b448deSdougm 			xmlSetProp(node, (xmlChar *)"name",
179957b448deSdougm 			    (xmlChar *)groupname);
180057b448deSdougm 			xmlSetProp(node, (xmlChar *)"state",
180157b448deSdougm 			    (xmlChar *)"enabled");
18026185db85Sdougm 		}
18036185db85Sdougm 	}
18046185db85Sdougm 	return ((sa_group_t)node);
18056185db85Sdougm }
18066185db85Sdougm 
18076185db85Sdougm /*
18086185db85Sdougm  * _sa_create_zfs_group(group, groupname)
18096185db85Sdougm  *
18106185db85Sdougm  * Create a ZFS subgroup under the specified group. This may
18116185db85Sdougm  * eventually form the basis of general sub-groups, but is currently
18126185db85Sdougm  * restricted to ZFS.
18136185db85Sdougm  */
18146185db85Sdougm sa_group_t
18156185db85Sdougm _sa_create_zfs_group(sa_group_t group, char *groupname)
18166185db85Sdougm {
18176185db85Sdougm 	xmlNodePtr node = NULL;
18186185db85Sdougm 
181957b448deSdougm 	node = xmlNewChild((xmlNodePtr)group, NULL, (xmlChar *)"group", NULL);
18206185db85Sdougm 	if (node != NULL) {
18216185db85Sdougm 		xmlSetProp(node, (xmlChar *)"name", (xmlChar *)groupname);
18226185db85Sdougm 		xmlSetProp(node, (xmlChar *)"state", (xmlChar *)"enabled");
18236185db85Sdougm 	}
18246185db85Sdougm 
18256185db85Sdougm 	return ((sa_group_t)node);
18266185db85Sdougm }
18276185db85Sdougm 
18286185db85Sdougm /*
18296185db85Sdougm  * sa_create_group(groupname, *error)
18306185db85Sdougm  *
18316185db85Sdougm  * Create a new group with groupname.  Need to validate that it is a
18326185db85Sdougm  * legal name for SMF and the construct the SMF service instance of
18336185db85Sdougm  * svc:/network/shares/group to implement the group. All necessary
18346185db85Sdougm  * operational properties must be added to the group at this point
18356185db85Sdougm  * (via the SMF transaction model).
18366185db85Sdougm  */
18376185db85Sdougm sa_group_t
1838549ec3ffSdougm sa_create_group(sa_handle_t handle, char *groupname, int *error)
18396185db85Sdougm {
18406185db85Sdougm 	xmlNodePtr node = NULL;
18416185db85Sdougm 	sa_group_t group;
18426185db85Sdougm 	int ret;
184357b448deSdougm 	char rbacstr[SA_STRSIZE];
1844549ec3ffSdougm 	sa_handle_impl_t impl_handle = (sa_handle_impl_t)handle;
18456185db85Sdougm 
18466185db85Sdougm 	ret = SA_OK;
18476185db85Sdougm 
1848549ec3ffSdougm 	if (impl_handle == NULL || impl_handle->scfhandle == NULL) {
18496185db85Sdougm 		ret = SA_SYSTEM_ERR;
18506185db85Sdougm 		goto err;
18516185db85Sdougm 	}
18526185db85Sdougm 
1853549ec3ffSdougm 	group = sa_get_group(handle, groupname);
18546185db85Sdougm 	if (group != NULL) {
18556185db85Sdougm 		ret = SA_DUPLICATE_NAME;
18566185db85Sdougm 	} else {
18576185db85Sdougm 		if (sa_valid_group_name(groupname)) {
1858549ec3ffSdougm 			node = xmlNewChild(impl_handle->tree, NULL,
18596185db85Sdougm 			    (xmlChar *)"group", NULL);
18606185db85Sdougm 			if (node != NULL) {
186157b448deSdougm 				xmlSetProp(node, (xmlChar *)"name",
186257b448deSdougm 				    (xmlChar *)groupname);
18636185db85Sdougm 				/* default to the group being enabled */
186457b448deSdougm 				xmlSetProp(node, (xmlChar *)"state",
186557b448deSdougm 				    (xmlChar *)"enabled");
186657b448deSdougm 				ret = sa_create_instance(impl_handle->scfhandle,
186757b448deSdougm 				    groupname);
18686185db85Sdougm 				if (ret == SA_OK) {
186957b448deSdougm 					ret = sa_start_transaction(
187057b448deSdougm 					    impl_handle->scfhandle,
1871549ec3ffSdougm 					    "operation");
18726185db85Sdougm 				}
18736185db85Sdougm 				if (ret == SA_OK) {
187457b448deSdougm 					ret = sa_set_property(
187557b448deSdougm 					    impl_handle->scfhandle,
1876549ec3ffSdougm 					    "state", "enabled");
18776185db85Sdougm 					if (ret == SA_OK) {
187857b448deSdougm 						ret = sa_end_transaction(
187957b448deSdougm 						    impl_handle->scfhandle);
18806185db85Sdougm 					} else {
188157b448deSdougm 						sa_abort_transaction(
188257b448deSdougm 						    impl_handle->scfhandle);
18836185db85Sdougm 					}
18846185db85Sdougm 				}
18856185db85Sdougm 				if (ret == SA_OK) {
18866185db85Sdougm 					/* initialize the RBAC strings */
188757b448deSdougm 					ret = sa_start_transaction(
188857b448deSdougm 					    impl_handle->scfhandle,
1889549ec3ffSdougm 					    "general");
18906185db85Sdougm 					if (ret == SA_OK) {
189157b448deSdougm 						(void) snprintf(rbacstr,
189257b448deSdougm 						    sizeof (rbacstr), "%s.%s",
18936185db85Sdougm 						    SA_RBAC_MANAGE, groupname);
189457b448deSdougm 						ret = sa_set_property(
189557b448deSdougm 						    impl_handle->scfhandle,
18966185db85Sdougm 						    "action_authorization",
18976185db85Sdougm 						    rbacstr);
18986185db85Sdougm 					}
18996185db85Sdougm 					if (ret == SA_OK) {
190057b448deSdougm 						(void) snprintf(rbacstr,
190157b448deSdougm 						    sizeof (rbacstr), "%s.%s",
19026185db85Sdougm 						    SA_RBAC_VALUE, groupname);
190357b448deSdougm 						ret = sa_set_property(
190457b448deSdougm 						    impl_handle->scfhandle,
19056185db85Sdougm 						    "value_authorization",
19066185db85Sdougm 						    rbacstr);
19076185db85Sdougm 					}
19086185db85Sdougm 					if (ret == SA_OK) {
190957b448deSdougm 						ret = sa_end_transaction(
191057b448deSdougm 						    impl_handle->scfhandle);
19116185db85Sdougm 					} else {
191257b448deSdougm 						sa_abort_transaction(
191357b448deSdougm 						    impl_handle->scfhandle);
19146185db85Sdougm 					}
19156185db85Sdougm 				}
19166185db85Sdougm 				if (ret != SA_OK) {
19176185db85Sdougm 					/*
191857b448deSdougm 					 * Couldn't commit the group
191957b448deSdougm 					 * so we need to undo
192057b448deSdougm 					 * internally.
19216185db85Sdougm 					 */
19226185db85Sdougm 					xmlUnlinkNode(node);
19236185db85Sdougm 					xmlFreeNode(node);
19246185db85Sdougm 					node = NULL;
19256185db85Sdougm 				}
19266185db85Sdougm 			} else {
19276185db85Sdougm 				ret = SA_NO_MEMORY;
19286185db85Sdougm 			}
19296185db85Sdougm 		} else {
19306185db85Sdougm 			ret = SA_INVALID_NAME;
19316185db85Sdougm 		}
19326185db85Sdougm 	}
19336185db85Sdougm err:
19346185db85Sdougm 	if (error != NULL)
19356185db85Sdougm 		*error = ret;
19366185db85Sdougm 	return ((sa_group_t)node);
19376185db85Sdougm }
19386185db85Sdougm 
19396185db85Sdougm /*
19406185db85Sdougm  * sa_remove_group(group)
19416185db85Sdougm  *
19426185db85Sdougm  * Remove the specified group. This deletes from the SMF repository.
19436185db85Sdougm  * All property groups and properties are removed.
19446185db85Sdougm  */
19456185db85Sdougm 
19466185db85Sdougm int
19476185db85Sdougm sa_remove_group(sa_group_t group)
19486185db85Sdougm {
19496185db85Sdougm 	char *name;
19506185db85Sdougm 	int ret = SA_OK;
1951549ec3ffSdougm 	sa_handle_impl_t impl_handle;
19526185db85Sdougm 
1953549ec3ffSdougm 	impl_handle = (sa_handle_impl_t)sa_find_group_handle(group);
1954549ec3ffSdougm 	if (impl_handle != NULL) {
19556185db85Sdougm 		name = sa_get_group_attr(group, "name");
19566185db85Sdougm 		if (name != NULL) {
1957549ec3ffSdougm 			ret = sa_delete_instance(impl_handle->scfhandle, name);
19586185db85Sdougm 			sa_free_attr_string(name);
19596185db85Sdougm 		}
19606185db85Sdougm 		xmlUnlinkNode((xmlNodePtr)group); /* make sure unlinked */
19616185db85Sdougm 		xmlFreeNode((xmlNodePtr)group);   /* now it is gone */
1962549ec3ffSdougm 	} else {
1963549ec3ffSdougm 		ret = SA_SYSTEM_ERR;
1964549ec3ffSdougm 	}
19656185db85Sdougm 	return (ret);
19666185db85Sdougm }
19676185db85Sdougm 
19686185db85Sdougm /*
19696185db85Sdougm  * sa_update_config()
19706185db85Sdougm  *
19716185db85Sdougm  * Used to update legacy files that need to be updated in bulk
19726185db85Sdougm  * Currently, this is a placeholder and will go away in a future
19736185db85Sdougm  * release.
19746185db85Sdougm  */
19756185db85Sdougm 
19766185db85Sdougm int
1977549ec3ffSdougm sa_update_config(sa_handle_t handle)
19786185db85Sdougm {
19796185db85Sdougm 	/*
19806185db85Sdougm 	 * do legacy files first so we can tell when they change.
19816185db85Sdougm 	 * This will go away when we start updating individual records
19826185db85Sdougm 	 * rather than the whole file.
19836185db85Sdougm 	 */
1984549ec3ffSdougm 	update_legacy_config(handle);
19856185db85Sdougm 	return (SA_OK);
19866185db85Sdougm }
19876185db85Sdougm 
19886185db85Sdougm /*
19896185db85Sdougm  * get_node_attr(node, tag)
19906185db85Sdougm  *
1991da6c28aaSamw  * Get the specified tag(attribute) if it exists on the node.  This is
19926185db85Sdougm  * used internally by a number of attribute oriented functions.
19936185db85Sdougm  */
19946185db85Sdougm 
19956185db85Sdougm static char *
19966185db85Sdougm get_node_attr(void *nodehdl, char *tag)
19976185db85Sdougm {
19986185db85Sdougm 	xmlNodePtr node = (xmlNodePtr)nodehdl;
19996185db85Sdougm 	xmlChar *name = NULL;
20006185db85Sdougm 
200157b448deSdougm 	if (node != NULL)
20026185db85Sdougm 		name = xmlGetProp(node, (xmlChar *)tag);
20036185db85Sdougm 	return ((char *)name);
20046185db85Sdougm }
20056185db85Sdougm 
20066185db85Sdougm /*
20076185db85Sdougm  * get_node_attr(node, tag)
20086185db85Sdougm  *
2009da6c28aaSamw  * Set the specified tag(attribute) to the specified value This is
20106185db85Sdougm  * used internally by a number of attribute oriented functions. It
20116185db85Sdougm  * doesn't update the repository, only the internal document state.
20126185db85Sdougm  */
20136185db85Sdougm 
20146185db85Sdougm void
20156185db85Sdougm set_node_attr(void *nodehdl, char *tag, char *value)
20166185db85Sdougm {
20176185db85Sdougm 	xmlNodePtr node = (xmlNodePtr)nodehdl;
20186185db85Sdougm 	if (node != NULL && tag != NULL) {
201957b448deSdougm 		if (value != NULL)
20206185db85Sdougm 			xmlSetProp(node, (xmlChar *)tag, (xmlChar *)value);
202157b448deSdougm 		else
20226185db85Sdougm 			xmlUnsetProp(node, (xmlChar *)tag);
20236185db85Sdougm 	}
20246185db85Sdougm }
20256185db85Sdougm 
20266185db85Sdougm /*
20276185db85Sdougm  * sa_get_group_attr(group, tag)
20286185db85Sdougm  *
20296185db85Sdougm  * Get the specied attribute, if defined, for the group.
20306185db85Sdougm  */
20316185db85Sdougm 
20326185db85Sdougm char *
20336185db85Sdougm sa_get_group_attr(sa_group_t group, char *tag)
20346185db85Sdougm {
20356185db85Sdougm 	return (get_node_attr((void *)group, tag));
20366185db85Sdougm }
20376185db85Sdougm 
20386185db85Sdougm /*
20396185db85Sdougm  * sa_set_group_attr(group, tag, value)
20406185db85Sdougm  *
20416185db85Sdougm  * set the specified tag/attribute on the group using value as its
20426185db85Sdougm  * value.
20436185db85Sdougm  *
20446185db85Sdougm  * This will result in setting the property in the SMF repository as
20456185db85Sdougm  * well as in the internal document.
20466185db85Sdougm  */
20476185db85Sdougm 
20486185db85Sdougm int
20496185db85Sdougm sa_set_group_attr(sa_group_t group, char *tag, char *value)
20506185db85Sdougm {
20516185db85Sdougm 	int ret;
20526185db85Sdougm 	char *groupname;
2053549ec3ffSdougm 	sa_handle_impl_t impl_handle;
20546185db85Sdougm 
2055da6c28aaSamw 	/*
2056da6c28aaSamw 	 * ZFS group/subgroup doesn't need the handle so shortcut.
2057da6c28aaSamw 	 */
2058da6c28aaSamw 	if (sa_group_is_zfs(group)) {
2059da6c28aaSamw 		set_node_attr((void *)group, tag, value);
2060da6c28aaSamw 		return (SA_OK);
2061da6c28aaSamw 	}
2062da6c28aaSamw 
2063549ec3ffSdougm 	impl_handle = (sa_handle_impl_t)sa_find_group_handle(group);
2064549ec3ffSdougm 	if (impl_handle != NULL) {
20656185db85Sdougm 		groupname = sa_get_group_attr(group, "name");
2066549ec3ffSdougm 		ret = sa_get_instance(impl_handle->scfhandle, groupname);
20676185db85Sdougm 		if (ret == SA_OK) {
20686185db85Sdougm 			set_node_attr((void *)group, tag, value);
206957b448deSdougm 			ret = sa_start_transaction(impl_handle->scfhandle,
207057b448deSdougm 			    "operation");
20716185db85Sdougm 			if (ret == SA_OK) {
207257b448deSdougm 				ret = sa_set_property(impl_handle->scfhandle,
207357b448deSdougm 				    tag, value);
20746185db85Sdougm 				if (ret == SA_OK)
2075*573b0c00Sdougm 					ret = sa_end_transaction(
207657b448deSdougm 					    impl_handle->scfhandle);
207757b448deSdougm 				else
207857b448deSdougm 					sa_abort_transaction(
207957b448deSdougm 					    impl_handle->scfhandle);
20806185db85Sdougm 			}
2081*573b0c00Sdougm 			if (ret == SA_SYSTEM_ERR)
2082*573b0c00Sdougm 				ret = SA_NO_PERMISSION;
20836185db85Sdougm 		}
20846185db85Sdougm 		if (groupname != NULL)
20856185db85Sdougm 			sa_free_attr_string(groupname);
2086549ec3ffSdougm 	} else {
2087549ec3ffSdougm 		ret = SA_SYSTEM_ERR;
2088549ec3ffSdougm 	}
20896185db85Sdougm 	return (ret);
20906185db85Sdougm }
20916185db85Sdougm 
20926185db85Sdougm /*
20936185db85Sdougm  * sa_get_share_attr(share, tag)
20946185db85Sdougm  *
20956185db85Sdougm  * Return the value of the tag/attribute set on the specified
20966185db85Sdougm  * share. Returns NULL if the tag doesn't exist.
20976185db85Sdougm  */
20986185db85Sdougm 
20996185db85Sdougm char *
21006185db85Sdougm sa_get_share_attr(sa_share_t share, char *tag)
21016185db85Sdougm {
21026185db85Sdougm 	return (get_node_attr((void *)share, tag));
21036185db85Sdougm }
21046185db85Sdougm 
21056185db85Sdougm /*
21066185db85Sdougm  * _sa_set_share_description(share, description)
21076185db85Sdougm  *
2108da6c28aaSamw  * Add a description tag with text contents to the specified share.  A
2109da6c28aaSamw  * separate XML tag is used rather than a property. This can also be
2110da6c28aaSamw  * used with resources.
21116185db85Sdougm  */
21126185db85Sdougm 
21136185db85Sdougm xmlNodePtr
2114da6c28aaSamw _sa_set_share_description(void *share, char *content)
21156185db85Sdougm {
21166185db85Sdougm 	xmlNodePtr node;
211757b448deSdougm 	node = xmlNewChild((xmlNodePtr)share, NULL, (xmlChar *)"description",
211857b448deSdougm 	    NULL);
21196185db85Sdougm 	xmlNodeSetContent(node, (xmlChar *)content);
21206185db85Sdougm 	return (node);
21216185db85Sdougm }
21226185db85Sdougm 
21236185db85Sdougm /*
21246185db85Sdougm  * sa_set_share_attr(share, tag, value)
21256185db85Sdougm  *
21266185db85Sdougm  * Set the share attribute specified by tag to the specified value. In
21276185db85Sdougm  * the case of "resource", enforce a no duplicates in a group rule. If
21286185db85Sdougm  * the share is not transient, commit the changes to the repository
21296185db85Sdougm  * else just update the share internally.
21306185db85Sdougm  */
21316185db85Sdougm 
21326185db85Sdougm int
21336185db85Sdougm sa_set_share_attr(sa_share_t share, char *tag, char *value)
21346185db85Sdougm {
21356185db85Sdougm 	sa_group_t group;
21366185db85Sdougm 	sa_share_t resource;
21376185db85Sdougm 	int ret = SA_OK;
21386185db85Sdougm 
21396185db85Sdougm 	group = sa_get_parent_group(share);
21406185db85Sdougm 
21416185db85Sdougm 	/*
21426185db85Sdougm 	 * There are some attributes that may have specific
21436185db85Sdougm 	 * restrictions on them. Initially, only "resource" has
21446185db85Sdougm 	 * special meaning that needs to be checked. Only one instance
21456185db85Sdougm 	 * of a resource name may exist within a group.
21466185db85Sdougm 	 */
21476185db85Sdougm 
21486185db85Sdougm 	if (strcmp(tag, "resource") == 0) {
21496185db85Sdougm 		resource = sa_get_resource(group, value);
21506185db85Sdougm 		if (resource != share && resource != NULL)
21516185db85Sdougm 			ret = SA_DUPLICATE_NAME;
21526185db85Sdougm 	}
21536185db85Sdougm 	if (ret == SA_OK) {
21546185db85Sdougm 		set_node_attr((void *)share, tag, value);
21556185db85Sdougm 		if (group != NULL) {
21566185db85Sdougm 			char *type;
21576185db85Sdougm 			/* we can probably optimize this some */
21586185db85Sdougm 			type = sa_get_share_attr(share, "type");
2159549ec3ffSdougm 			if (type == NULL || strcmp(type, "transient") != 0) {
2160549ec3ffSdougm 				sa_handle_impl_t impl_handle;
216157b448deSdougm 				impl_handle =
216257b448deSdougm 				    (sa_handle_impl_t)sa_find_group_handle(
216357b448deSdougm 				    group);
216457b448deSdougm 				if (impl_handle != NULL) {
216557b448deSdougm 					ret = sa_commit_share(
216657b448deSdougm 					    impl_handle->scfhandle, group,
216757b448deSdougm 					    share);
216857b448deSdougm 				} else {
2169549ec3ffSdougm 					ret = SA_SYSTEM_ERR;
2170549ec3ffSdougm 				}
217157b448deSdougm 			}
21726185db85Sdougm 			if (type != NULL)
21736185db85Sdougm 				sa_free_attr_string(type);
21746185db85Sdougm 		}
21756185db85Sdougm 	}
21766185db85Sdougm 	return (ret);
21776185db85Sdougm }
21786185db85Sdougm 
21796185db85Sdougm /*
21806185db85Sdougm  * sa_get_property_attr(prop, tag)
21816185db85Sdougm  *
21826185db85Sdougm  * Get the value of the specified property attribute. Standard
21836185db85Sdougm  * attributes are "type" and "value".
21846185db85Sdougm  */
21856185db85Sdougm 
21866185db85Sdougm char *
21876185db85Sdougm sa_get_property_attr(sa_property_t prop, char *tag)
21886185db85Sdougm {
21896185db85Sdougm 	return (get_node_attr((void *)prop, tag));
21906185db85Sdougm }
21916185db85Sdougm 
21926185db85Sdougm /*
21936185db85Sdougm  * sa_get_optionset_attr(prop, tag)
21946185db85Sdougm  *
21956185db85Sdougm  * Get the value of the specified property attribute. Standard
21966185db85Sdougm  * attribute is "type".
21976185db85Sdougm  */
21986185db85Sdougm 
21996185db85Sdougm char *
22006185db85Sdougm sa_get_optionset_attr(sa_property_t optionset, char *tag)
22016185db85Sdougm {
22026185db85Sdougm 	return (get_node_attr((void *)optionset, tag));
22036185db85Sdougm 
22046185db85Sdougm }
22056185db85Sdougm 
22066185db85Sdougm /*
22076185db85Sdougm  * sa_set_optionset_attr(optionset, tag, value)
22086185db85Sdougm  *
22096185db85Sdougm  * Set the specified attribute(tag) to the specified value on the
22106185db85Sdougm  * optionset.
22116185db85Sdougm  */
22126185db85Sdougm 
22136185db85Sdougm void
22146185db85Sdougm sa_set_optionset_attr(sa_group_t optionset, char *tag, char *value)
22156185db85Sdougm {
22166185db85Sdougm 	set_node_attr((void *)optionset, tag, value);
22176185db85Sdougm }
22186185db85Sdougm 
22196185db85Sdougm /*
22206185db85Sdougm  * sa_free_attr_string(string)
22216185db85Sdougm  *
22226185db85Sdougm  * Free the string that was returned in one of the sa_get_*_attr()
22236185db85Sdougm  * functions.
22246185db85Sdougm  */
22256185db85Sdougm 
22266185db85Sdougm void
22276185db85Sdougm sa_free_attr_string(char *string)
22286185db85Sdougm {
22296185db85Sdougm 	xmlFree((xmlChar *)string);
22306185db85Sdougm }
22316185db85Sdougm 
22326185db85Sdougm /*
22336185db85Sdougm  * sa_get_optionset(group, proto)
22346185db85Sdougm  *
22356185db85Sdougm  * Return the optionset, if it exists, that is associated with the
22366185db85Sdougm  * specified protocol.
22376185db85Sdougm  */
22386185db85Sdougm 
22396185db85Sdougm sa_optionset_t
22406185db85Sdougm sa_get_optionset(void *group, char *proto)
22416185db85Sdougm {
22426185db85Sdougm 	xmlNodePtr node;
22436185db85Sdougm 	xmlChar *value = NULL;
22446185db85Sdougm 
22456185db85Sdougm 	for (node = ((xmlNodePtr)group)->children; node != NULL;
22466185db85Sdougm 	    node = node->next) {
22476185db85Sdougm 		if (xmlStrcmp(node->name, (xmlChar *)"optionset") == 0) {
22486185db85Sdougm 			value = xmlGetProp(node, (xmlChar *)"type");
22496185db85Sdougm 			if (proto != NULL) {
22506185db85Sdougm 				if (value != NULL &&
22516185db85Sdougm 				    xmlStrcmp(value, (xmlChar *)proto) == 0) {
22526185db85Sdougm 					break;
22536185db85Sdougm 				}
22546185db85Sdougm 				if (value != NULL) {
22556185db85Sdougm 					xmlFree(value);
22566185db85Sdougm 					value = NULL;
22576185db85Sdougm 				}
22586185db85Sdougm 			} else {
22596185db85Sdougm 				break;
22606185db85Sdougm 			}
22616185db85Sdougm 		}
22626185db85Sdougm 	}
22636185db85Sdougm 	if (value != NULL)
22646185db85Sdougm 		xmlFree(value);
22656185db85Sdougm 	return ((sa_optionset_t)node);
22666185db85Sdougm }
22676185db85Sdougm 
22686185db85Sdougm /*
22696185db85Sdougm  * sa_get_next_optionset(optionset)
22706185db85Sdougm  *
22716185db85Sdougm  * Return the next optionset in the group. NULL if this was the last.
22726185db85Sdougm  */
22736185db85Sdougm 
22746185db85Sdougm sa_optionset_t
22756185db85Sdougm sa_get_next_optionset(sa_optionset_t optionset)
22766185db85Sdougm {
22776185db85Sdougm 	xmlNodePtr node;
22786185db85Sdougm 
22796185db85Sdougm 	for (node = ((xmlNodePtr)optionset)->next; node != NULL;
22806185db85Sdougm 	    node = node->next) {
22816185db85Sdougm 		if (xmlStrcmp(node->name, (xmlChar *)"optionset") == 0) {
22826185db85Sdougm 			break;
22836185db85Sdougm 		}
22846185db85Sdougm 	}
22856185db85Sdougm 	return ((sa_optionset_t)node);
22866185db85Sdougm }
22876185db85Sdougm 
22886185db85Sdougm /*
22896185db85Sdougm  * sa_get_security(group, sectype, proto)
22906185db85Sdougm  *
22916185db85Sdougm  * Return the security optionset. The internal name is a hold over
22926185db85Sdougm  * from the implementation and will be changed before the API is
22936185db85Sdougm  * finalized. This is really a named optionset that can be negotiated
22946185db85Sdougm  * as a group of properties (like NFS security options).
22956185db85Sdougm  */
22966185db85Sdougm 
22976185db85Sdougm sa_security_t
22986185db85Sdougm sa_get_security(sa_group_t group, char *sectype, char *proto)
22996185db85Sdougm {
23006185db85Sdougm 	xmlNodePtr node;
23016185db85Sdougm 	xmlChar *value = NULL;
23026185db85Sdougm 
23036185db85Sdougm 	for (node = ((xmlNodePtr)group)->children; node != NULL;
23046185db85Sdougm 	    node = node->next) {
23056185db85Sdougm 		if (xmlStrcmp(node->name, (xmlChar *)"security") == 0) {
23066185db85Sdougm 			if (proto != NULL) {
23076185db85Sdougm 				value = xmlGetProp(node, (xmlChar *)"type");
23086185db85Sdougm 				if (value == NULL ||
23096185db85Sdougm 				    (value != NULL &&
23106185db85Sdougm 				    xmlStrcmp(value, (xmlChar *)proto) != 0)) {
23116185db85Sdougm 					/* it doesn't match so continue */
23126185db85Sdougm 					xmlFree(value);
23136185db85Sdougm 					value = NULL;
23146185db85Sdougm 					continue;
23156185db85Sdougm 				}
23166185db85Sdougm 			}
23176185db85Sdougm 			if (value != NULL) {
23186185db85Sdougm 				xmlFree(value);
23196185db85Sdougm 				value = NULL;
23206185db85Sdougm 			}
23216185db85Sdougm 			/* potential match */
23226185db85Sdougm 			if (sectype != NULL) {
23236185db85Sdougm 				value = xmlGetProp(node, (xmlChar *)"sectype");
23246185db85Sdougm 				if (value != NULL &&
23256185db85Sdougm 				    xmlStrcmp(value, (xmlChar *)sectype) == 0) {
23266185db85Sdougm 					break;
23276185db85Sdougm 				}
23286185db85Sdougm 			} else {
23296185db85Sdougm 				break;
23306185db85Sdougm 			}
23316185db85Sdougm 		}
23326185db85Sdougm 		if (value != NULL) {
23336185db85Sdougm 			xmlFree(value);
23346185db85Sdougm 			value = NULL;
23356185db85Sdougm 		}
23366185db85Sdougm 	}
23376185db85Sdougm 	if (value != NULL)
23386185db85Sdougm 		xmlFree(value);
23396185db85Sdougm 	return ((sa_security_t)node);
23406185db85Sdougm }
23416185db85Sdougm 
23426185db85Sdougm /*
23436185db85Sdougm  * sa_get_next_security(security)
23446185db85Sdougm  *
23456185db85Sdougm  * Get the next security optionset if one exists.
23466185db85Sdougm  */
23476185db85Sdougm 
23486185db85Sdougm sa_security_t
23496185db85Sdougm sa_get_next_security(sa_security_t security)
23506185db85Sdougm {
23516185db85Sdougm 	xmlNodePtr node;
23526185db85Sdougm 
23536185db85Sdougm 	for (node = ((xmlNodePtr)security)->next; node != NULL;
23546185db85Sdougm 	    node = node->next) {
23556185db85Sdougm 		if (xmlStrcmp(node->name, (xmlChar *)"security") == 0) {
23566185db85Sdougm 			break;
23576185db85Sdougm 		}
23586185db85Sdougm 	}
23596185db85Sdougm 	return ((sa_security_t)node);
23606185db85Sdougm }
23616185db85Sdougm 
23626185db85Sdougm /*
23636185db85Sdougm  * sa_get_property(optionset, prop)
23646185db85Sdougm  *
23656185db85Sdougm  * Get the property object with the name specified in prop from the
23666185db85Sdougm  * optionset.
23676185db85Sdougm  */
23686185db85Sdougm 
23696185db85Sdougm sa_property_t
23706185db85Sdougm sa_get_property(sa_optionset_t optionset, char *prop)
23716185db85Sdougm {
23726185db85Sdougm 	xmlNodePtr node = (xmlNodePtr)optionset;
23736185db85Sdougm 	xmlChar *value = NULL;
23746185db85Sdougm 
23756185db85Sdougm 	if (optionset == NULL)
23766185db85Sdougm 		return (NULL);
23776185db85Sdougm 
23786185db85Sdougm 	for (node = node->children; node != NULL;
23796185db85Sdougm 	    node = node->next) {
23806185db85Sdougm 		if (xmlStrcmp(node->name, (xmlChar *)"option") == 0) {
23816185db85Sdougm 			if (prop == NULL)
23826185db85Sdougm 				break;
23836185db85Sdougm 			value = xmlGetProp(node, (xmlChar *)"type");
238457b448deSdougm 			if (value != NULL &&
238557b448deSdougm 			    xmlStrcmp(value, (xmlChar *)prop) == 0) {
23866185db85Sdougm 				break;
23876185db85Sdougm 			}
23886185db85Sdougm 			if (value != NULL) {
23896185db85Sdougm 				xmlFree(value);
23906185db85Sdougm 				value = NULL;
23916185db85Sdougm 			}
23926185db85Sdougm 		}
23936185db85Sdougm 	}
23946185db85Sdougm 	if (value != NULL)
23956185db85Sdougm 		xmlFree(value);
23966185db85Sdougm 	if (node != NULL && xmlStrcmp(node->name, (xmlChar *)"option") != 0) {
239757b448deSdougm 		/*
239857b448deSdougm 		 * avoid a non option node -- it is possible to be a
239957b448deSdougm 		 * text node
240057b448deSdougm 		 */
24016185db85Sdougm 		node = NULL;
24026185db85Sdougm 	}
24036185db85Sdougm 	return ((sa_property_t)node);
24046185db85Sdougm }
24056185db85Sdougm 
24066185db85Sdougm /*
24076185db85Sdougm  * sa_get_next_property(property)
24086185db85Sdougm  *
24096185db85Sdougm  * Get the next property following the specified property. NULL if
24106185db85Sdougm  * this was the last.
24116185db85Sdougm  */
24126185db85Sdougm 
24136185db85Sdougm sa_property_t
24146185db85Sdougm sa_get_next_property(sa_property_t property)
24156185db85Sdougm {
24166185db85Sdougm 	xmlNodePtr node;
24176185db85Sdougm 
24186185db85Sdougm 	for (node = ((xmlNodePtr)property)->next; node != NULL;
24196185db85Sdougm 	    node = node->next) {
24206185db85Sdougm 		if (xmlStrcmp(node->name, (xmlChar *)"option") == 0) {
24216185db85Sdougm 			break;
24226185db85Sdougm 		}
24236185db85Sdougm 	}
24246185db85Sdougm 	return ((sa_property_t)node);
24256185db85Sdougm }
24266185db85Sdougm 
24276185db85Sdougm /*
24286185db85Sdougm  * sa_set_share_description(share, content)
24296185db85Sdougm  *
24306185db85Sdougm  * Set the description of share to content.
24316185db85Sdougm  */
24326185db85Sdougm 
24336185db85Sdougm int
24346185db85Sdougm sa_set_share_description(sa_share_t share, char *content)
24356185db85Sdougm {
24366185db85Sdougm 	xmlNodePtr node;
24376185db85Sdougm 	sa_group_t group;
24386185db85Sdougm 	int ret = SA_OK;
24396185db85Sdougm 
24406185db85Sdougm 	for (node = ((xmlNodePtr)share)->children; node != NULL;
24416185db85Sdougm 	    node = node->next) {
24426185db85Sdougm 		if (xmlStrcmp(node->name, (xmlChar *)"description") == 0) {
24436185db85Sdougm 			break;
24446185db85Sdougm 		}
24456185db85Sdougm 	}
24466185db85Sdougm 	/* no existing description but want to add */
24476185db85Sdougm 	if (node == NULL && content != NULL) {
24486185db85Sdougm 		/* add a description */
24496185db85Sdougm 		node = _sa_set_share_description(share, content);
24506185db85Sdougm 	} else if (node != NULL && content != NULL) {
24516185db85Sdougm 		/* update a description */
24526185db85Sdougm 		xmlNodeSetContent(node, (xmlChar *)content);
24536185db85Sdougm 	} else if (node != NULL && content == NULL) {
24546185db85Sdougm 		/* remove an existing description */
24556185db85Sdougm 		xmlUnlinkNode(node);
24566185db85Sdougm 		xmlFreeNode(node);
24576185db85Sdougm 	}
2458da6c28aaSamw 	group = sa_get_parent_group(share);
2459da6c28aaSamw 	if (group != NULL && sa_is_persistent(share)) {
2460549ec3ffSdougm 		sa_handle_impl_t impl_handle;
2461549ec3ffSdougm 		impl_handle = (sa_handle_impl_t)sa_find_group_handle(group);
246257b448deSdougm 		if (impl_handle != NULL) {
246357b448deSdougm 			ret = sa_commit_share(impl_handle->scfhandle, group,
246457b448deSdougm 			    share);
246557b448deSdougm 		} else {
2466549ec3ffSdougm 			ret = SA_SYSTEM_ERR;
2467549ec3ffSdougm 		}
246857b448deSdougm 	}
24696185db85Sdougm 	return (ret);
24706185db85Sdougm }
24716185db85Sdougm 
24726185db85Sdougm /*
24736185db85Sdougm  * fixproblemchars(string)
24746185db85Sdougm  *
24756185db85Sdougm  * don't want any newline or tab characters in the text since these
24766185db85Sdougm  * could break display of data and legacy file formats.
24776185db85Sdougm  */
24786185db85Sdougm static void
24796185db85Sdougm fixproblemchars(char *str)
24806185db85Sdougm {
24816185db85Sdougm 	int c;
24826185db85Sdougm 	for (c = *str; c != '\0'; c = *++str) {
24836185db85Sdougm 		if (c == '\t' || c == '\n')
24846185db85Sdougm 			*str = ' ';
24856185db85Sdougm 		else if (c == '"')
24866185db85Sdougm 			*str = '\'';
24876185db85Sdougm 	}
24886185db85Sdougm }
24896185db85Sdougm 
24906185db85Sdougm /*
24916185db85Sdougm  * sa_get_share_description(share)
24926185db85Sdougm  *
24936185db85Sdougm  * Return the description text for the specified share if it
24946185db85Sdougm  * exists. NULL if no description exists.
24956185db85Sdougm  */
24966185db85Sdougm 
24976185db85Sdougm char *
24986185db85Sdougm sa_get_share_description(sa_share_t share)
24996185db85Sdougm {
25006185db85Sdougm 	xmlChar *description = NULL;
25016185db85Sdougm 	xmlNodePtr node;
25026185db85Sdougm 
25036185db85Sdougm 	for (node = ((xmlNodePtr)share)->children; node != NULL;
25046185db85Sdougm 	    node = node->next) {
25056185db85Sdougm 		if (xmlStrcmp(node->name, (xmlChar *)"description") == 0) {
25066185db85Sdougm 			break;
25076185db85Sdougm 		}
25086185db85Sdougm 	}
25096185db85Sdougm 	if (node != NULL) {
2510da6c28aaSamw 		description = xmlNodeGetContent(node);
25116185db85Sdougm 		fixproblemchars((char *)description);
25126185db85Sdougm 	}
25136185db85Sdougm 	return ((char *)description);
25146185db85Sdougm }
25156185db85Sdougm 
25166185db85Sdougm /*
25176185db85Sdougm  * sa_free(share_description(description)
25186185db85Sdougm  *
25196185db85Sdougm  * Free the description string.
25206185db85Sdougm  */
25216185db85Sdougm 
25226185db85Sdougm void
25236185db85Sdougm sa_free_share_description(char *description)
25246185db85Sdougm {
25256185db85Sdougm 	xmlFree((xmlChar *)description);
25266185db85Sdougm }
25276185db85Sdougm 
25286185db85Sdougm /*
25296185db85Sdougm  * sa_create_optionset(group, proto)
25306185db85Sdougm  *
25316185db85Sdougm  * Create an optionset for the specified protocol in the specied
25326185db85Sdougm  * group. This is manifested as a property group within SMF.
25336185db85Sdougm  */
25346185db85Sdougm 
25356185db85Sdougm sa_optionset_t
25366185db85Sdougm sa_create_optionset(sa_group_t group, char *proto)
25376185db85Sdougm {
25386185db85Sdougm 	sa_optionset_t optionset;
25396185db85Sdougm 	sa_group_t parent = group;
2540da6c28aaSamw 	sa_share_t share = NULL;
2541da6c28aaSamw 	int err = SA_OK;
2542da6c28aaSamw 	char *id = NULL;
25436185db85Sdougm 
25446185db85Sdougm 	optionset = sa_get_optionset(group, proto);
25456185db85Sdougm 	if (optionset != NULL) {
25466185db85Sdougm 		/* can't have a duplicate protocol */
25476185db85Sdougm 		optionset = NULL;
25486185db85Sdougm 	} else {
2549da6c28aaSamw 		/*
2550da6c28aaSamw 		 * Account for resource names being slightly
2551da6c28aaSamw 		 * different.
2552da6c28aaSamw 		 */
2553da6c28aaSamw 		if (sa_is_share(group)) {
2554da6c28aaSamw 			/*
2555da6c28aaSamw 			 * Transient shares do not have an "id" so not an
2556da6c28aaSamw 			 * error to not find one.
2557da6c28aaSamw 			 */
2558da6c28aaSamw 			id = sa_get_share_attr((sa_share_t)group, "id");
2559da6c28aaSamw 		} else if (sa_is_resource(group)) {
2560da6c28aaSamw 			share = sa_get_resource_parent(
2561da6c28aaSamw 			    (sa_resource_t)group);
2562da6c28aaSamw 			id = sa_get_resource_attr(share, "id");
2563da6c28aaSamw 
2564da6c28aaSamw 			/* id can be NULL if the group is transient (ZFS) */
2565da6c28aaSamw 			if (id == NULL && sa_is_persistent(group))
2566da6c28aaSamw 				err = SA_NO_MEMORY;
2567da6c28aaSamw 		}
2568da6c28aaSamw 		if (err == SA_NO_MEMORY) {
2569da6c28aaSamw 			/*
2570da6c28aaSamw 			 * Couldn't get the id for the share or
2571da6c28aaSamw 			 * resource. While this could be a
2572da6c28aaSamw 			 * configuration issue, it is most likely an
2573da6c28aaSamw 			 * out of memory. In any case, fail the create.
2574da6c28aaSamw 			 */
2575da6c28aaSamw 			return (NULL);
2576da6c28aaSamw 		}
2577da6c28aaSamw 
25786185db85Sdougm 		optionset = (sa_optionset_t)xmlNewChild((xmlNodePtr)group,
257957b448deSdougm 		    NULL, (xmlChar *)"optionset", NULL);
25806185db85Sdougm 		/*
25816185db85Sdougm 		 * only put to repository if on a group and we were
25826185db85Sdougm 		 * able to create an optionset.
25836185db85Sdougm 		 */
25846185db85Sdougm 		if (optionset != NULL) {
258557b448deSdougm 			char oname[SA_STRSIZE];
25866185db85Sdougm 			char *groupname;
25876185db85Sdougm 
2588da6c28aaSamw 			/*
2589da6c28aaSamw 			 * Need to get parent group in all cases, but also get
2590da6c28aaSamw 			 * the share if this is a resource.
2591da6c28aaSamw 			 */
2592da6c28aaSamw 			if (sa_is_share(group)) {
25936185db85Sdougm 				parent = sa_get_parent_group((sa_share_t)group);
2594da6c28aaSamw 			} else if (sa_is_resource(group)) {
2595da6c28aaSamw 				share = sa_get_resource_parent(
2596da6c28aaSamw 				    (sa_resource_t)group);
2597da6c28aaSamw 				parent = sa_get_parent_group(share);
2598da6c28aaSamw 			}
25996185db85Sdougm 
26006185db85Sdougm 			sa_set_optionset_attr(optionset, "type", proto);
26016185db85Sdougm 
26026185db85Sdougm 			(void) sa_optionset_name(optionset, oname,
26036185db85Sdougm 			    sizeof (oname), id);
26046185db85Sdougm 			groupname = sa_get_group_attr(parent, "name");
2605da6c28aaSamw 			if (groupname != NULL && sa_is_persistent(group)) {
2606549ec3ffSdougm 				sa_handle_impl_t impl_handle;
2607da6c28aaSamw 				impl_handle =
2608da6c28aaSamw 				    (sa_handle_impl_t)sa_find_group_handle(
2609da6c28aaSamw 				    group);
2610549ec3ffSdougm 				assert(impl_handle != NULL);
2611549ec3ffSdougm 				if (impl_handle != NULL) {
261257b448deSdougm 					(void) sa_get_instance(
2613da6c28aaSamw 					    impl_handle->scfhandle, groupname);
261457b448deSdougm 					(void) sa_create_pgroup(
261557b448deSdougm 					    impl_handle->scfhandle, oname);
26166185db85Sdougm 				}
2617549ec3ffSdougm 			}
2618549ec3ffSdougm 			if (groupname != NULL)
2619549ec3ffSdougm 				sa_free_attr_string(groupname);
2620da6c28aaSamw 		}
2621da6c28aaSamw 	}
2622da6c28aaSamw 
26236185db85Sdougm 	if (id != NULL)
26246185db85Sdougm 		sa_free_attr_string(id);
26256185db85Sdougm 	return (optionset);
26266185db85Sdougm }
26276185db85Sdougm 
26286185db85Sdougm /*
26296185db85Sdougm  * sa_get_property_parent(property)
26306185db85Sdougm  *
26316185db85Sdougm  * Given a property, return the object it is a property of. This will
26326185db85Sdougm  * be an optionset of some type.
26336185db85Sdougm  */
26346185db85Sdougm 
26356185db85Sdougm static sa_optionset_t
26366185db85Sdougm sa_get_property_parent(sa_property_t property)
26376185db85Sdougm {
26386185db85Sdougm 	xmlNodePtr node = NULL;
26396185db85Sdougm 
264057b448deSdougm 	if (property != NULL)
26416185db85Sdougm 		node = ((xmlNodePtr)property)->parent;
26426185db85Sdougm 	return ((sa_optionset_t)node);
26436185db85Sdougm }
26446185db85Sdougm 
26456185db85Sdougm /*
26466185db85Sdougm  * sa_get_optionset_parent(optionset)
26476185db85Sdougm  *
26486185db85Sdougm  * Return the parent of the specified optionset. This could be a group
26496185db85Sdougm  * or a share.
26506185db85Sdougm  */
26516185db85Sdougm 
26526185db85Sdougm static sa_group_t
26536185db85Sdougm sa_get_optionset_parent(sa_optionset_t optionset)
26546185db85Sdougm {
26556185db85Sdougm 	xmlNodePtr node = NULL;
26566185db85Sdougm 
265757b448deSdougm 	if (optionset != NULL)
26586185db85Sdougm 		node = ((xmlNodePtr)optionset)->parent;
26596185db85Sdougm 	return ((sa_group_t)node);
26606185db85Sdougm }
26616185db85Sdougm 
26626185db85Sdougm /*
26636185db85Sdougm  * zfs_needs_update(share)
26646185db85Sdougm  *
26656185db85Sdougm  * In order to avoid making multiple updates to a ZFS share when
26666185db85Sdougm  * setting properties, the share attribute "changed" will be set to
2667da6c28aaSamw  * true when a property is added or modified.  When done adding
26686185db85Sdougm  * properties, we can then detect that an update is needed.  We then
26696185db85Sdougm  * clear the state here to detect additional changes.
26706185db85Sdougm  */
26716185db85Sdougm 
26726185db85Sdougm static int
26736185db85Sdougm zfs_needs_update(sa_share_t share)
26746185db85Sdougm {
26756185db85Sdougm 	char *attr;
26766185db85Sdougm 	int result = 0;
26776185db85Sdougm 
26786185db85Sdougm 	attr = sa_get_share_attr(share, "changed");
26796185db85Sdougm 	if (attr != NULL) {
26806185db85Sdougm 		sa_free_attr_string(attr);
26816185db85Sdougm 		result = 1;
26826185db85Sdougm 	}
26836185db85Sdougm 	set_node_attr((void *)share, "changed", NULL);
26846185db85Sdougm 	return (result);
26856185db85Sdougm }
26866185db85Sdougm 
26876185db85Sdougm /*
26886185db85Sdougm  * zfs_set_update(share)
26896185db85Sdougm  *
26906185db85Sdougm  * Set the changed attribute of the share to true.
26916185db85Sdougm  */
26926185db85Sdougm 
26936185db85Sdougm static void
26946185db85Sdougm zfs_set_update(sa_share_t share)
26956185db85Sdougm {
26966185db85Sdougm 	set_node_attr((void *)share, "changed", "true");
26976185db85Sdougm }
26986185db85Sdougm 
26996185db85Sdougm /*
27006185db85Sdougm  * sa_commit_properties(optionset, clear)
27016185db85Sdougm  *
27026185db85Sdougm  * Check if SMF or ZFS config and either update or abort the pending
27036185db85Sdougm  * changes.
27046185db85Sdougm  */
27056185db85Sdougm 
27066185db85Sdougm int
27076185db85Sdougm sa_commit_properties(sa_optionset_t optionset, int clear)
27086185db85Sdougm {
27096185db85Sdougm 	sa_group_t group;
27106185db85Sdougm 	sa_group_t parent;
27116185db85Sdougm 	int zfs = 0;
27126185db85Sdougm 	int needsupdate = 0;
27136185db85Sdougm 	int ret = SA_OK;
2714549ec3ffSdougm 	sa_handle_impl_t impl_handle;
27156185db85Sdougm 
27166185db85Sdougm 	group = sa_get_optionset_parent(optionset);
27176185db85Sdougm 	if (group != NULL && (sa_is_share(group) || is_zfs_group(group))) {
27186185db85Sdougm 		/* only update ZFS if on a share */
27196185db85Sdougm 		parent = sa_get_parent_group(group);
27206185db85Sdougm 		zfs++;
272157b448deSdougm 		if (parent != NULL && is_zfs_group(parent))
27226185db85Sdougm 			needsupdate = zfs_needs_update(group);
272357b448deSdougm 		else
27246185db85Sdougm 			zfs = 0;
27256185db85Sdougm 	}
27266185db85Sdougm 	if (zfs) {
27276185db85Sdougm 		if (!clear && needsupdate)
27286185db85Sdougm 			ret = sa_zfs_update((sa_share_t)group);
27296185db85Sdougm 	} else {
2730549ec3ffSdougm 		impl_handle = (sa_handle_impl_t)sa_find_group_handle(group);
2731549ec3ffSdougm 		if (impl_handle != NULL) {
273257b448deSdougm 			if (clear) {
273357b448deSdougm 				(void) sa_abort_transaction(
273457b448deSdougm 				    impl_handle->scfhandle);
273557b448deSdougm 			} else {
273657b448deSdougm 				ret = sa_end_transaction(
273757b448deSdougm 				    impl_handle->scfhandle);
273857b448deSdougm 			}
2739549ec3ffSdougm 		} else {
2740549ec3ffSdougm 			ret = SA_SYSTEM_ERR;
2741549ec3ffSdougm 		}
27426185db85Sdougm 	}
27436185db85Sdougm 	return (ret);
27446185db85Sdougm }
27456185db85Sdougm 
27466185db85Sdougm /*
27476185db85Sdougm  * sa_destroy_optionset(optionset)
27486185db85Sdougm  *
2749da6c28aaSamw  * Remove the optionset from its group. Update the repository to
27506185db85Sdougm  * reflect this change.
27516185db85Sdougm  */
27526185db85Sdougm 
27536185db85Sdougm int
27546185db85Sdougm sa_destroy_optionset(sa_optionset_t optionset)
27556185db85Sdougm {
275657b448deSdougm 	char name[SA_STRSIZE];
27576185db85Sdougm 	int len;
27586185db85Sdougm 	int ret;
27596185db85Sdougm 	char *id = NULL;
27606185db85Sdougm 	sa_group_t group;
27616185db85Sdougm 	int ispersist = 1;
27626185db85Sdougm 
27636185db85Sdougm 	/* now delete the prop group */
27646185db85Sdougm 	group = sa_get_optionset_parent(optionset);
2765da6c28aaSamw 	if (group != NULL) {
2766da6c28aaSamw 		if (sa_is_resource(group)) {
2767da6c28aaSamw 			sa_resource_t resource = group;
2768da6c28aaSamw 			sa_share_t share = sa_get_resource_parent(resource);
2769da6c28aaSamw 			group = sa_get_parent_group(share);
2770da6c28aaSamw 			id = sa_get_share_attr(share, "id");
2771da6c28aaSamw 		} else if (sa_is_share(group)) {
27726185db85Sdougm 			id = sa_get_share_attr((sa_share_t)group, "id");
27736185db85Sdougm 		}
2774da6c28aaSamw 		ispersist = sa_is_persistent(group);
2775da6c28aaSamw 	}
27766185db85Sdougm 	if (ispersist) {
2777549ec3ffSdougm 		sa_handle_impl_t impl_handle;
27786185db85Sdougm 		len = sa_optionset_name(optionset, name, sizeof (name), id);
2779549ec3ffSdougm 		impl_handle = (sa_handle_impl_t)sa_find_group_handle(group);
2780549ec3ffSdougm 		if (impl_handle != NULL) {
27816185db85Sdougm 			if (len > 0) {
278257b448deSdougm 				ret = sa_delete_pgroup(impl_handle->scfhandle,
278357b448deSdougm 				    name);
2784549ec3ffSdougm 			}
2785549ec3ffSdougm 		} else {
2786549ec3ffSdougm 			ret = SA_SYSTEM_ERR;
27876185db85Sdougm 		}
27886185db85Sdougm 	}
27896185db85Sdougm 	xmlUnlinkNode((xmlNodePtr)optionset);
27906185db85Sdougm 	xmlFreeNode((xmlNodePtr)optionset);
27916185db85Sdougm 	if (id != NULL)
27926185db85Sdougm 		sa_free_attr_string(id);
27936185db85Sdougm 	return (ret);
27946185db85Sdougm }
27956185db85Sdougm 
27966185db85Sdougm /* private to the implementation */
27976185db85Sdougm int
27986185db85Sdougm _sa_remove_optionset(sa_optionset_t optionset)
27996185db85Sdougm {
28006185db85Sdougm 	int ret = SA_OK;
28016185db85Sdougm 
28026185db85Sdougm 	xmlUnlinkNode((xmlNodePtr)optionset);
28036185db85Sdougm 	xmlFreeNode((xmlNodePtr)optionset);
28046185db85Sdougm 	return (ret);
28056185db85Sdougm }
28066185db85Sdougm 
28076185db85Sdougm /*
28086185db85Sdougm  * sa_create_security(group, sectype, proto)
28096185db85Sdougm  *
28106185db85Sdougm  * Create a security optionset (one that has a type name and a
28116185db85Sdougm  * proto). Security is left over from a pure NFS implementation. The
28126185db85Sdougm  * naming will change in the future when the API is released.
28136185db85Sdougm  */
28146185db85Sdougm sa_security_t
28156185db85Sdougm sa_create_security(sa_group_t group, char *sectype, char *proto)
28166185db85Sdougm {
28176185db85Sdougm 	sa_security_t security;
28186185db85Sdougm 	char *id = NULL;
28196185db85Sdougm 	sa_group_t parent;
28206185db85Sdougm 	char *groupname = NULL;
28216185db85Sdougm 
28226185db85Sdougm 	if (group != NULL && sa_is_share(group)) {
28236185db85Sdougm 		id = sa_get_share_attr((sa_share_t)group, "id");
28246185db85Sdougm 		parent = sa_get_parent_group(group);
28256185db85Sdougm 		if (parent != NULL)
28266185db85Sdougm 			groupname = sa_get_group_attr(parent, "name");
28276185db85Sdougm 	} else if (group != NULL) {
28286185db85Sdougm 		groupname = sa_get_group_attr(group, "name");
28296185db85Sdougm 	}
28306185db85Sdougm 
28316185db85Sdougm 	security = sa_get_security(group, sectype, proto);
28326185db85Sdougm 	if (security != NULL) {
28336185db85Sdougm 		/* can't have a duplicate security option */
28346185db85Sdougm 		security = NULL;
28356185db85Sdougm 	} else {
28366185db85Sdougm 		security = (sa_security_t)xmlNewChild((xmlNodePtr)group,
283757b448deSdougm 		    NULL, (xmlChar *)"security", NULL);
28386185db85Sdougm 		if (security != NULL) {
283957b448deSdougm 			char oname[SA_STRSIZE];
28406185db85Sdougm 			sa_set_security_attr(security, "type", proto);
28416185db85Sdougm 
28426185db85Sdougm 			sa_set_security_attr(security, "sectype", sectype);
28436185db85Sdougm 			(void) sa_security_name(security, oname,
28446185db85Sdougm 			    sizeof (oname), id);
2845da6c28aaSamw 			if (groupname != NULL && sa_is_persistent(group)) {
2846549ec3ffSdougm 				sa_handle_impl_t impl_handle;
2847549ec3ffSdougm 				impl_handle =
284857b448deSdougm 				    (sa_handle_impl_t)sa_find_group_handle(
284957b448deSdougm 				    group);
2850549ec3ffSdougm 				if (impl_handle != NULL) {
285157b448deSdougm 					(void) sa_get_instance(
285257b448deSdougm 					    impl_handle->scfhandle, groupname);
285357b448deSdougm 					(void) sa_create_pgroup(
285457b448deSdougm 					    impl_handle->scfhandle, oname);
2855549ec3ffSdougm 				}
28566185db85Sdougm 			}
28576185db85Sdougm 		}
28586185db85Sdougm 	}
28596185db85Sdougm 	if (groupname != NULL)
28606185db85Sdougm 		sa_free_attr_string(groupname);
28616185db85Sdougm 	return (security);
28626185db85Sdougm }
28636185db85Sdougm 
28646185db85Sdougm /*
28656185db85Sdougm  * sa_destroy_security(security)
28666185db85Sdougm  *
28676185db85Sdougm  * Remove the specified optionset from the document and the
28686185db85Sdougm  * configuration.
28696185db85Sdougm  */
28706185db85Sdougm 
28716185db85Sdougm int
28726185db85Sdougm sa_destroy_security(sa_security_t security)
28736185db85Sdougm {
287457b448deSdougm 	char name[SA_STRSIZE];
28756185db85Sdougm 	int len;
28766185db85Sdougm 	int ret = SA_OK;
28776185db85Sdougm 	char *id = NULL;
28786185db85Sdougm 	sa_group_t group;
28796185db85Sdougm 	int iszfs = 0;
28806185db85Sdougm 	int ispersist = 1;
28816185db85Sdougm 
28826185db85Sdougm 	group = sa_get_optionset_parent(security);
28836185db85Sdougm 
28846185db85Sdougm 	if (group != NULL)
28856185db85Sdougm 		iszfs = sa_group_is_zfs(group);
28866185db85Sdougm 
28876185db85Sdougm 	if (group != NULL && !iszfs) {
28886185db85Sdougm 		if (sa_is_share(group))
2889da6c28aaSamw 			ispersist = sa_is_persistent(group);
28906185db85Sdougm 		id = sa_get_share_attr((sa_share_t)group, "id");
28916185db85Sdougm 	}
28926185db85Sdougm 	if (ispersist) {
28936185db85Sdougm 		len = sa_security_name(security, name, sizeof (name), id);
28946185db85Sdougm 		if (!iszfs && len > 0) {
2895549ec3ffSdougm 			sa_handle_impl_t impl_handle;
289657b448deSdougm 			impl_handle =
289757b448deSdougm 			    (sa_handle_impl_t)sa_find_group_handle(group);
2898549ec3ffSdougm 			if (impl_handle != NULL) {
289957b448deSdougm 				ret = sa_delete_pgroup(impl_handle->scfhandle,
290057b448deSdougm 				    name);
2901549ec3ffSdougm 			} else {
2902549ec3ffSdougm 				ret = SA_SYSTEM_ERR;
2903549ec3ffSdougm 			}
29046185db85Sdougm 		}
29056185db85Sdougm 	}
29066185db85Sdougm 	xmlUnlinkNode((xmlNodePtr)security);
29076185db85Sdougm 	xmlFreeNode((xmlNodePtr)security);
290857b448deSdougm 	if (iszfs)
29096185db85Sdougm 		ret = sa_zfs_update(group);
29106185db85Sdougm 	if (id != NULL)
29116185db85Sdougm 		sa_free_attr_string(id);
29126185db85Sdougm 	return (ret);
29136185db85Sdougm }
29146185db85Sdougm 
29156185db85Sdougm /*
29166185db85Sdougm  * sa_get_security_attr(optionset, tag)
29176185db85Sdougm  *
29186185db85Sdougm  * Return the specified attribute value from the optionset.
29196185db85Sdougm  */
29206185db85Sdougm 
29216185db85Sdougm char *
29226185db85Sdougm sa_get_security_attr(sa_property_t optionset, char *tag)
29236185db85Sdougm {
29246185db85Sdougm 	return (get_node_attr((void *)optionset, tag));
29256185db85Sdougm 
29266185db85Sdougm }
29276185db85Sdougm 
29286185db85Sdougm /*
29296185db85Sdougm  * sa_set_security_attr(optionset, tag, value)
29306185db85Sdougm  *
29316185db85Sdougm  * Set the optioset attribute specied by tag to the specified value.
29326185db85Sdougm  */
29336185db85Sdougm 
29346185db85Sdougm void
29356185db85Sdougm sa_set_security_attr(sa_group_t optionset, char *tag, char *value)
29366185db85Sdougm {
29376185db85Sdougm 	set_node_attr((void *)optionset, tag, value);
29386185db85Sdougm }
29396185db85Sdougm 
29406185db85Sdougm /*
29416185db85Sdougm  * is_nodetype(node, type)
29426185db85Sdougm  *
29436185db85Sdougm  * Check to see if node is of the type specified.
29446185db85Sdougm  */
29456185db85Sdougm 
29466185db85Sdougm static int
29476185db85Sdougm is_nodetype(void *node, char *type)
29486185db85Sdougm {
29496185db85Sdougm 	return (strcmp((char *)((xmlNodePtr)node)->name, type) == 0);
29506185db85Sdougm }
29516185db85Sdougm 
295257b448deSdougm /*
295357b448deSdougm  * add_or_update()
295457b448deSdougm  *
295557b448deSdougm  * Add or update a property. Pulled out of sa_set_prop_by_prop for
295657b448deSdougm  * readability.
295757b448deSdougm  */
295857b448deSdougm static int
295957b448deSdougm add_or_update(scfutilhandle_t *scf_handle, int type, scf_value_t *value,
296057b448deSdougm     scf_transaction_entry_t *entry, char *name, char *valstr)
296157b448deSdougm {
296257b448deSdougm 	int ret = SA_SYSTEM_ERR;
296357b448deSdougm 
296457b448deSdougm 	if (value != NULL) {
296557b448deSdougm 		if (type == SA_PROP_OP_ADD)
296657b448deSdougm 			ret = scf_transaction_property_new(scf_handle->trans,
296757b448deSdougm 			    entry, name, SCF_TYPE_ASTRING);
296857b448deSdougm 		else
296957b448deSdougm 			ret = scf_transaction_property_change(scf_handle->trans,
297057b448deSdougm 			    entry, name, SCF_TYPE_ASTRING);
297157b448deSdougm 		if (ret == 0) {
297257b448deSdougm 			ret = scf_value_set_astring(value, valstr);
297357b448deSdougm 			if (ret == 0)
297457b448deSdougm 				ret = scf_entry_add_value(entry, value);
297557b448deSdougm 			if (ret == 0)
297657b448deSdougm 				return (ret);
297757b448deSdougm 			scf_value_destroy(value);
297857b448deSdougm 		} else {
297957b448deSdougm 			scf_entry_destroy(entry);
298057b448deSdougm 		}
298157b448deSdougm 	}
298257b448deSdougm 	return (SA_SYSTEM_ERR);
298357b448deSdougm }
298457b448deSdougm 
29856185db85Sdougm /*
29866185db85Sdougm  * sa_set_prop_by_prop(optionset, group, prop, type)
29876185db85Sdougm  *
29886185db85Sdougm  * Add/remove/update the specified property prop into the optionset or
29896185db85Sdougm  * share. If a share, sort out which property group based on GUID. In
29906185db85Sdougm  * all cases, the appropriate transaction is set (or ZFS share is
29916185db85Sdougm  * marked as needing an update)
29926185db85Sdougm  */
29936185db85Sdougm 
29946185db85Sdougm static int
29956185db85Sdougm sa_set_prop_by_prop(sa_optionset_t optionset, sa_group_t group,
29966185db85Sdougm 			sa_property_t prop, int type)
29976185db85Sdougm {
29986185db85Sdougm 	char *name;
29996185db85Sdougm 	char *valstr;
30006185db85Sdougm 	int ret = SA_OK;
30016185db85Sdougm 	scf_transaction_entry_t *entry;
30026185db85Sdougm 	scf_value_t *value;
30036185db85Sdougm 	int opttype; /* 1 == optionset, 0 == security */
30046185db85Sdougm 	char *id = NULL;
30056185db85Sdougm 	int iszfs = 0;
30066185db85Sdougm 	sa_group_t parent = NULL;
3007da6c28aaSamw 	sa_share_t share = NULL;
3008549ec3ffSdougm 	sa_handle_impl_t impl_handle;
3009549ec3ffSdougm 	scfutilhandle_t  *scf_handle;
30106185db85Sdougm 
3011da6c28aaSamw 	if (!sa_is_persistent(group)) {
30126185db85Sdougm 		/*
30136185db85Sdougm 		 * if the group/share is not persistent we don't need
30146185db85Sdougm 		 * to do anything here
30156185db85Sdougm 		 */
30166185db85Sdougm 		return (SA_OK);
30176185db85Sdougm 	}
3018549ec3ffSdougm 	impl_handle = (sa_handle_impl_t)sa_find_group_handle(group);
301957b448deSdougm 	if (impl_handle == NULL || impl_handle->scfhandle == NULL)
3020549ec3ffSdougm 		return (SA_SYSTEM_ERR);
3021549ec3ffSdougm 	scf_handle = impl_handle->scfhandle;
30226185db85Sdougm 	name = sa_get_property_attr(prop, "type");
30236185db85Sdougm 	valstr = sa_get_property_attr(prop, "value");
30246185db85Sdougm 	entry = scf_entry_create(scf_handle->handle);
30256185db85Sdougm 	opttype = is_nodetype((void *)optionset, "optionset");
30266185db85Sdougm 
3027da6c28aaSamw 	/*
3028da6c28aaSamw 	 * Check for share vs. resource since they need slightly
3029da6c28aaSamw 	 * different treatment given the hierarchy.
3030da6c28aaSamw 	 */
30316185db85Sdougm 	if (valstr != NULL && entry != NULL) {
30326185db85Sdougm 		if (sa_is_share(group)) {
30336185db85Sdougm 			parent = sa_get_parent_group(group);
3034da6c28aaSamw 			share = (sa_share_t)group;
303557b448deSdougm 			if (parent != NULL)
30366185db85Sdougm 				iszfs = is_zfs_group(parent);
3037da6c28aaSamw 		} else if (sa_is_resource(group)) {
3038da6c28aaSamw 			share = sa_get_parent_group(group);
3039da6c28aaSamw 			if (share != NULL)
3040da6c28aaSamw 				parent = sa_get_parent_group(share);
30416185db85Sdougm 		} else {
30426185db85Sdougm 			iszfs = is_zfs_group(group);
30436185db85Sdougm 		}
30446185db85Sdougm 		if (!iszfs) {
30456185db85Sdougm 			if (scf_handle->trans == NULL) {
304657b448deSdougm 				char oname[SA_STRSIZE];
30476185db85Sdougm 				char *groupname = NULL;
3048da6c28aaSamw 				if (share != NULL) {
3049da6c28aaSamw 					if (parent != NULL)
305057b448deSdougm 						groupname =
305157b448deSdougm 						    sa_get_group_attr(parent,
305257b448deSdougm 						    "name");
3053da6c28aaSamw 					id = sa_get_share_attr(
3054da6c28aaSamw 					    (sa_share_t)share, "id");
30556185db85Sdougm 				} else {
305657b448deSdougm 					groupname = sa_get_group_attr(group,
305757b448deSdougm 					    "name");
30586185db85Sdougm 				}
30596185db85Sdougm 				if (groupname != NULL) {
306057b448deSdougm 					ret = sa_get_instance(scf_handle,
306157b448deSdougm 					    groupname);
30626185db85Sdougm 					sa_free_attr_string(groupname);
30636185db85Sdougm 				}
30646185db85Sdougm 				if (opttype)
306557b448deSdougm 					(void) sa_optionset_name(optionset,
306657b448deSdougm 					    oname, sizeof (oname), id);
30676185db85Sdougm 				else
306857b448deSdougm 					(void) sa_security_name(optionset,
306957b448deSdougm 					    oname, sizeof (oname), id);
30706185db85Sdougm 				ret = sa_start_transaction(scf_handle, oname);
30716185db85Sdougm 			}
30726185db85Sdougm 			if (ret == SA_OK) {
30736185db85Sdougm 				switch (type) {
30746185db85Sdougm 				case SA_PROP_OP_REMOVE:
3075549ec3ffSdougm 					ret = scf_transaction_property_delete(
307657b448deSdougm 					    scf_handle->trans, entry, name);
30776185db85Sdougm 					break;
30786185db85Sdougm 				case SA_PROP_OP_ADD:
30796185db85Sdougm 				case SA_PROP_OP_UPDATE:
308057b448deSdougm 					value = scf_value_create(
308157b448deSdougm 					    scf_handle->handle);
308257b448deSdougm 					ret = add_or_update(scf_handle, type,
308357b448deSdougm 					    value, entry, name, valstr);
30846185db85Sdougm 					break;
30856185db85Sdougm 				}
30866185db85Sdougm 			}
30876185db85Sdougm 		} else {
30886185db85Sdougm 			/*
30896185db85Sdougm 			 * ZFS update. The calling function would have updated
30906185db85Sdougm 			 * the internal XML structure. Just need to flag it as
30916185db85Sdougm 			 * changed for ZFS.
30926185db85Sdougm 			 */
30936185db85Sdougm 			zfs_set_update((sa_share_t)group);
30946185db85Sdougm 		}
30956185db85Sdougm 	}
30966185db85Sdougm 
30976185db85Sdougm 	if (name != NULL)
30986185db85Sdougm 		sa_free_attr_string(name);
30996185db85Sdougm 	if (valstr != NULL)
31006185db85Sdougm 		sa_free_attr_string(valstr);
31016185db85Sdougm 	else if (entry != NULL)
31026185db85Sdougm 		scf_entry_destroy(entry);
31036185db85Sdougm 
31046185db85Sdougm 	if (ret == -1)
31056185db85Sdougm 		ret = SA_SYSTEM_ERR;
31066185db85Sdougm 
31076185db85Sdougm 	return (ret);
31086185db85Sdougm }
31096185db85Sdougm 
31106185db85Sdougm /*
31116185db85Sdougm  * sa_create_property(name, value)
31126185db85Sdougm  *
31136185db85Sdougm  * Create a new property with the specified name and value.
31146185db85Sdougm  */
31156185db85Sdougm 
31166185db85Sdougm sa_property_t
31176185db85Sdougm sa_create_property(char *name, char *value)
31186185db85Sdougm {
31196185db85Sdougm 	xmlNodePtr node;
31206185db85Sdougm 
31216185db85Sdougm 	node = xmlNewNode(NULL, (xmlChar *)"option");
31226185db85Sdougm 	if (node != NULL) {
31236185db85Sdougm 		xmlSetProp(node, (xmlChar *)"type", (xmlChar *)name);
31246185db85Sdougm 		xmlSetProp(node, (xmlChar *)"value", (xmlChar *)value);
31256185db85Sdougm 	}
31266185db85Sdougm 	return ((sa_property_t)node);
31276185db85Sdougm }
31286185db85Sdougm 
31296185db85Sdougm /*
31306185db85Sdougm  * sa_add_property(object, property)
31316185db85Sdougm  *
31326185db85Sdougm  * Add the specified property to the object. Issue the appropriate
31336185db85Sdougm  * transaction or mark a ZFS object as needing an update.
31346185db85Sdougm  */
31356185db85Sdougm 
31366185db85Sdougm int
31376185db85Sdougm sa_add_property(void *object, sa_property_t property)
31386185db85Sdougm {
31396185db85Sdougm 	int ret = SA_OK;
31406185db85Sdougm 	sa_group_t parent;
31416185db85Sdougm 	sa_group_t group;
31426185db85Sdougm 	char *proto;
31436185db85Sdougm 
31446185db85Sdougm 	proto = sa_get_optionset_attr(object, "type");
31456185db85Sdougm 	if (property != NULL) {
314657b448deSdougm 		if ((ret = sa_valid_property(object, proto, property)) ==
314757b448deSdougm 		    SA_OK) {
314857b448deSdougm 			property = (sa_property_t)xmlAddChild(
314957b448deSdougm 			    (xmlNodePtr)object, (xmlNodePtr)property);
31506185db85Sdougm 		} else {
31516185db85Sdougm 			if (proto != NULL)
31526185db85Sdougm 				sa_free_attr_string(proto);
31536185db85Sdougm 			return (ret);
31546185db85Sdougm 		}
31556185db85Sdougm 	}
31566185db85Sdougm 
31576185db85Sdougm 	if (proto != NULL)
31586185db85Sdougm 		sa_free_attr_string(proto);
31596185db85Sdougm 
31606185db85Sdougm 	parent = sa_get_parent_group(object);
3161da6c28aaSamw 	if (!sa_is_persistent(parent))
31626185db85Sdougm 		return (ret);
31636185db85Sdougm 
3164da6c28aaSamw 	if (sa_is_resource(parent)) {
3165da6c28aaSamw 		/*
3166da6c28aaSamw 		 * Resources are children of share.  Need to go up two
3167da6c28aaSamw 		 * levels to find the group but the parent needs to be
3168da6c28aaSamw 		 * the share at this point in order to get the "id".
3169da6c28aaSamw 		 */
3170da6c28aaSamw 		parent = sa_get_parent_group(parent);
31716185db85Sdougm 		group = sa_get_parent_group(parent);
3172da6c28aaSamw 	} else if (sa_is_share(parent)) {
3173da6c28aaSamw 		group = sa_get_parent_group(parent);
3174da6c28aaSamw 	} else {
31756185db85Sdougm 		group = parent;
3176da6c28aaSamw 	}
31776185db85Sdougm 
317857b448deSdougm 	if (property == NULL) {
31796185db85Sdougm 		ret = SA_NO_MEMORY;
318057b448deSdougm 	} else {
318157b448deSdougm 		char oname[SA_STRSIZE];
31826185db85Sdougm 
31836185db85Sdougm 		if (!is_zfs_group(group)) {
31846185db85Sdougm 			char *id = NULL;
3185549ec3ffSdougm 			sa_handle_impl_t impl_handle;
3186549ec3ffSdougm 			scfutilhandle_t  *scf_handle;
3187549ec3ffSdougm 
318857b448deSdougm 			impl_handle = (sa_handle_impl_t)sa_find_group_handle(
318957b448deSdougm 			    group);
319057b448deSdougm 			if (impl_handle == NULL ||
319157b448deSdougm 			    impl_handle->scfhandle == NULL)
3192549ec3ffSdougm 				ret = SA_SYSTEM_ERR;
3193549ec3ffSdougm 			if (ret == SA_OK) {
3194549ec3ffSdougm 				scf_handle = impl_handle->scfhandle;
31956185db85Sdougm 				if (sa_is_share((sa_group_t)parent)) {
319657b448deSdougm 					id = sa_get_share_attr(
319757b448deSdougm 					    (sa_share_t)parent, "id");
31986185db85Sdougm 				}
31996185db85Sdougm 				if (scf_handle->trans == NULL) {
320057b448deSdougm 					if (is_nodetype(object, "optionset")) {
320157b448deSdougm 						(void) sa_optionset_name(
320257b448deSdougm 						    (sa_optionset_t)object,
32036185db85Sdougm 						    oname, sizeof (oname), id);
320457b448deSdougm 					} else {
320557b448deSdougm 						(void) sa_security_name(
320657b448deSdougm 						    (sa_optionset_t)object,
32076185db85Sdougm 						    oname, sizeof (oname), id);
320857b448deSdougm 					}
320957b448deSdougm 					ret = sa_start_transaction(scf_handle,
321057b448deSdougm 					    oname);
32116185db85Sdougm 				}
32126185db85Sdougm 				if (ret == SA_OK) {
32136185db85Sdougm 					char *name;
32146185db85Sdougm 					char *value;
321557b448deSdougm 					name = sa_get_property_attr(property,
321657b448deSdougm 					    "type");
321757b448deSdougm 					value = sa_get_property_attr(property,
321857b448deSdougm 					    "value");
32196185db85Sdougm 					if (name != NULL && value != NULL) {
322057b448deSdougm 						if (scf_handle->scf_state ==
322157b448deSdougm 						    SCH_STATE_INIT) {
322257b448deSdougm 							ret = sa_set_property(
322357b448deSdougm 							    scf_handle, name,
322457b448deSdougm 							    value);
322557b448deSdougm 						}
322657b448deSdougm 					} else {
32276185db85Sdougm 						ret = SA_CONFIG_ERR;
322857b448deSdougm 					}
32296185db85Sdougm 					if (name != NULL)
323057b448deSdougm 						sa_free_attr_string(
323157b448deSdougm 						    name);
32326185db85Sdougm 					if (value != NULL)
32336185db85Sdougm 						sa_free_attr_string(value);
32346185db85Sdougm 				}
32356185db85Sdougm 				if (id != NULL)
32366185db85Sdougm 					sa_free_attr_string(id);
3237549ec3ffSdougm 			}
32386185db85Sdougm 		} else {
32396185db85Sdougm 			/*
324057b448deSdougm 			 * ZFS is a special case. We do want
324157b448deSdougm 			 * to allow editing property/security
324257b448deSdougm 			 * lists since we can have a better
324357b448deSdougm 			 * syntax and we also want to keep
324457b448deSdougm 			 * things consistent when possible.
32456185db85Sdougm 			 *
324657b448deSdougm 			 * Right now, we defer until the
324757b448deSdougm 			 * sa_commit_properties so we can get
324857b448deSdougm 			 * them all at once. We do need to
324957b448deSdougm 			 * mark the share as "changed"
32506185db85Sdougm 			 */
32516185db85Sdougm 			zfs_set_update((sa_share_t)parent);
32526185db85Sdougm 		}
32536185db85Sdougm 	}
32546185db85Sdougm 	return (ret);
32556185db85Sdougm }
32566185db85Sdougm 
32576185db85Sdougm /*
32586185db85Sdougm  * sa_remove_property(property)
32596185db85Sdougm  *
32606185db85Sdougm  * Remove the specied property from its containing object. Update the
32616185db85Sdougm  * repository as appropriate.
32626185db85Sdougm  */
32636185db85Sdougm 
32646185db85Sdougm int
32656185db85Sdougm sa_remove_property(sa_property_t property)
32666185db85Sdougm {
32676185db85Sdougm 	int ret = SA_OK;
32686185db85Sdougm 
32696185db85Sdougm 	if (property != NULL) {
32706185db85Sdougm 		sa_optionset_t optionset;
32716185db85Sdougm 		sa_group_t group;
32726185db85Sdougm 		optionset = sa_get_property_parent(property);
32736185db85Sdougm 		if (optionset != NULL) {
32746185db85Sdougm 			group = sa_get_optionset_parent(optionset);
32756185db85Sdougm 			if (group != NULL) {
327657b448deSdougm 				ret = sa_set_prop_by_prop(optionset, group,
327757b448deSdougm 				    property, SA_PROP_OP_REMOVE);
32786185db85Sdougm 			}
32796185db85Sdougm 		}
32806185db85Sdougm 		xmlUnlinkNode((xmlNodePtr)property);
32816185db85Sdougm 		xmlFreeNode((xmlNodePtr)property);
32826185db85Sdougm 	} else {
32836185db85Sdougm 		ret = SA_NO_SUCH_PROP;
32846185db85Sdougm 	}
32856185db85Sdougm 	return (ret);
32866185db85Sdougm }
32876185db85Sdougm 
32886185db85Sdougm /*
32896185db85Sdougm  * sa_update_property(property, value)
32906185db85Sdougm  *
32916185db85Sdougm  * Update the specified property to the new value.  If value is NULL,
32926185db85Sdougm  * we currently treat this as a remove.
32936185db85Sdougm  */
32946185db85Sdougm 
32956185db85Sdougm int
32966185db85Sdougm sa_update_property(sa_property_t property, char *value)
32976185db85Sdougm {
32986185db85Sdougm 	int ret = SA_OK;
32996185db85Sdougm 	if (value == NULL) {
33006185db85Sdougm 		return (sa_remove_property(property));
33016185db85Sdougm 	} else {
33026185db85Sdougm 		sa_optionset_t optionset;
33036185db85Sdougm 		sa_group_t group;
33046185db85Sdougm 		set_node_attr((void *)property, "value", value);
33056185db85Sdougm 		optionset = sa_get_property_parent(property);
33066185db85Sdougm 		if (optionset != NULL) {
33076185db85Sdougm 			group = sa_get_optionset_parent(optionset);
33086185db85Sdougm 			if (group != NULL) {
330957b448deSdougm 				ret = sa_set_prop_by_prop(optionset, group,
331057b448deSdougm 				    property, SA_PROP_OP_UPDATE);
33116185db85Sdougm 			}
33126185db85Sdougm 		} else {
33136185db85Sdougm 			ret = SA_NO_SUCH_PROP;
33146185db85Sdougm 		}
33156185db85Sdougm 	}
33166185db85Sdougm 	return (ret);
33176185db85Sdougm }
33186185db85Sdougm 
33196185db85Sdougm /*
33206185db85Sdougm  * sa_get_protocol_property(propset, prop)
33216185db85Sdougm  *
33226185db85Sdougm  * Get the specified protocol specific property. These are global to
33236185db85Sdougm  * the protocol and not specific to a group or share.
33246185db85Sdougm  */
33256185db85Sdougm 
33266185db85Sdougm sa_property_t
33276185db85Sdougm sa_get_protocol_property(sa_protocol_properties_t propset, char *prop)
33286185db85Sdougm {
33296185db85Sdougm 	xmlNodePtr node = (xmlNodePtr)propset;
33306185db85Sdougm 	xmlChar *value = NULL;
33316185db85Sdougm 
33326185db85Sdougm 	for (node = node->children; node != NULL;
33336185db85Sdougm 	    node = node->next) {
33346185db85Sdougm 		if (xmlStrcmp(node->name, (xmlChar *)"option") == 0) {
33356185db85Sdougm 			if (prop == NULL)
33366185db85Sdougm 				break;
33376185db85Sdougm 			value = xmlGetProp(node, (xmlChar *)"type");
33386185db85Sdougm 			if (value != NULL &&
33396185db85Sdougm 			    xmlStrcasecmp(value, (xmlChar *)prop) == 0) {
33406185db85Sdougm 				break;
33416185db85Sdougm 			}
33426185db85Sdougm 			if (value != NULL) {
33436185db85Sdougm 				xmlFree(value);
33446185db85Sdougm 				value = NULL;
33456185db85Sdougm 			}
33466185db85Sdougm 		}
33476185db85Sdougm 	}
33486185db85Sdougm 	if (value != NULL)
33496185db85Sdougm 		xmlFree(value);
33506185db85Sdougm 	if (node != NULL && xmlStrcmp(node->name, (xmlChar *)"option") != 0) {
335157b448deSdougm 		/*
335257b448deSdougm 		 * avoid a non option node -- it is possible to be a
335357b448deSdougm 		 * text node
335457b448deSdougm 		 */
33556185db85Sdougm 		node = NULL;
33566185db85Sdougm 	}
33576185db85Sdougm 	return ((sa_property_t)node);
33586185db85Sdougm }
33596185db85Sdougm 
33606185db85Sdougm /*
33616185db85Sdougm  * sa_get_next_protocol_property(prop)
33626185db85Sdougm  *
33636185db85Sdougm  * Get the next protocol specific property in the list.
33646185db85Sdougm  */
33656185db85Sdougm 
33666185db85Sdougm sa_property_t
33676185db85Sdougm sa_get_next_protocol_property(sa_property_t prop)
33686185db85Sdougm {
33696185db85Sdougm 	xmlNodePtr node;
33706185db85Sdougm 
33716185db85Sdougm 	for (node = ((xmlNodePtr)prop)->next; node != NULL;
33726185db85Sdougm 	    node = node->next) {
33736185db85Sdougm 		if (xmlStrcmp(node->name, (xmlChar *)"option") == 0) {
33746185db85Sdougm 			break;
33756185db85Sdougm 		}
33766185db85Sdougm 	}
33776185db85Sdougm 	return ((sa_property_t)node);
33786185db85Sdougm }
33796185db85Sdougm 
33806185db85Sdougm /*
33816185db85Sdougm  * sa_set_protocol_property(prop, value)
33826185db85Sdougm  *
33836185db85Sdougm  * Set the specified property to have the new value.  The protocol
33846185db85Sdougm  * specific plugin will then be called to update the property.
33856185db85Sdougm  */
33866185db85Sdougm 
33876185db85Sdougm int
33886185db85Sdougm sa_set_protocol_property(sa_property_t prop, char *value)
33896185db85Sdougm {
33906185db85Sdougm 	sa_protocol_properties_t propset;
33916185db85Sdougm 	char *proto;
33926185db85Sdougm 	int ret = SA_INVALID_PROTOCOL;
33936185db85Sdougm 
33946185db85Sdougm 	propset = ((xmlNodePtr)prop)->parent;
33956185db85Sdougm 	if (propset != NULL) {
33966185db85Sdougm 		proto = sa_get_optionset_attr(propset, "type");
33976185db85Sdougm 		if (proto != NULL) {
33986185db85Sdougm 			set_node_attr((xmlNodePtr)prop, "value", value);
33996185db85Sdougm 			ret = sa_proto_set_property(proto, prop);
34003472f5dcSdougm 			sa_free_attr_string(proto);
34016185db85Sdougm 		}
34026185db85Sdougm 	}
34036185db85Sdougm 	return (ret);
34046185db85Sdougm }
34056185db85Sdougm 
34066185db85Sdougm /*
34076185db85Sdougm  * sa_add_protocol_property(propset, prop)
34086185db85Sdougm  *
3409da6c28aaSamw  * Add a new property to the protocol specific property set.
34106185db85Sdougm  */
34116185db85Sdougm 
34126185db85Sdougm int
34136185db85Sdougm sa_add_protocol_property(sa_protocol_properties_t propset, sa_property_t prop)
34146185db85Sdougm {
34156185db85Sdougm 	xmlNodePtr node;
34166185db85Sdougm 
34176185db85Sdougm 	/* should check for legitimacy */
34186185db85Sdougm 	node = xmlAddChild((xmlNodePtr)propset, (xmlNodePtr)prop);
34196185db85Sdougm 	if (node != NULL)
34206185db85Sdougm 		return (SA_OK);
34216185db85Sdougm 	return (SA_NO_MEMORY);
34226185db85Sdougm }
34236185db85Sdougm 
34246185db85Sdougm /*
34256185db85Sdougm  * sa_create_protocol_properties(proto)
34266185db85Sdougm  *
3427da6c28aaSamw  * Create a protocol specific property set.
34286185db85Sdougm  */
34296185db85Sdougm 
34306185db85Sdougm sa_protocol_properties_t
34316185db85Sdougm sa_create_protocol_properties(char *proto)
34326185db85Sdougm {
34336185db85Sdougm 	xmlNodePtr node;
343457b448deSdougm 
34356185db85Sdougm 	node = xmlNewNode(NULL, (xmlChar *)"propertyset");
343657b448deSdougm 	if (node != NULL)
34376185db85Sdougm 		xmlSetProp(node, (xmlChar *)"type", (xmlChar *)proto);
34386185db85Sdougm 	return (node);
34396185db85Sdougm }
3440da6c28aaSamw 
3441da6c28aaSamw /*
3442da6c28aaSamw  * sa_get_share_resource(share, resource)
3443da6c28aaSamw  *
3444da6c28aaSamw  * Get the named resource from the share, if it exists. If resource is
3445da6c28aaSamw  * NULL, get the first resource.
3446da6c28aaSamw  */
3447da6c28aaSamw 
3448da6c28aaSamw sa_resource_t
3449da6c28aaSamw sa_get_share_resource(sa_share_t share, char *resource)
3450da6c28aaSamw {
3451da6c28aaSamw 	xmlNodePtr node = NULL;
3452da6c28aaSamw 	xmlChar *name;
3453da6c28aaSamw 
3454da6c28aaSamw 	if (share != NULL) {
3455da6c28aaSamw 		for (node = ((xmlNodePtr)share)->children; node != NULL;
3456da6c28aaSamw 		    node = node->next) {
3457da6c28aaSamw 			if (xmlStrcmp(node->name, (xmlChar *)"resource") == 0) {
3458da6c28aaSamw 				if (resource == NULL) {
3459da6c28aaSamw 					/*
3460da6c28aaSamw 					 * We are looking for the first
3461da6c28aaSamw 					 * resource node and not a names
3462da6c28aaSamw 					 * resource.
3463da6c28aaSamw 					 */
3464da6c28aaSamw 					break;
3465da6c28aaSamw 				} else {
3466da6c28aaSamw 					/* is it the correct share? */
3467da6c28aaSamw 					name = xmlGetProp(node,
3468da6c28aaSamw 					    (xmlChar *)"name");
3469da6c28aaSamw 					if (name != NULL &&
3470da6c28aaSamw 					    xmlStrcasecmp(name,
3471da6c28aaSamw 					    (xmlChar *)resource) == 0) {
3472da6c28aaSamw 						xmlFree(name);
3473da6c28aaSamw 						break;
3474da6c28aaSamw 					}
3475da6c28aaSamw 					xmlFree(name);
3476da6c28aaSamw 				}
3477da6c28aaSamw 			}
3478da6c28aaSamw 		}
3479da6c28aaSamw 	}
3480da6c28aaSamw 	return ((sa_resource_t)node);
3481da6c28aaSamw }
3482da6c28aaSamw 
3483da6c28aaSamw /*
3484da6c28aaSamw  * sa_get_next_resource(resource)
3485da6c28aaSamw  *	Return the next share following the specified share
3486da6c28aaSamw  *	from the internal list of shares. Returns NULL if there
3487da6c28aaSamw  *	are no more shares.  The list is relative to the same
3488da6c28aaSamw  *	group.
3489da6c28aaSamw  */
3490da6c28aaSamw sa_share_t
3491da6c28aaSamw sa_get_next_resource(sa_resource_t resource)
3492da6c28aaSamw {
3493da6c28aaSamw 	xmlNodePtr node = NULL;
3494da6c28aaSamw 
3495da6c28aaSamw 	if (resource != NULL) {
3496da6c28aaSamw 		for (node = ((xmlNodePtr)resource)->next; node != NULL;
3497da6c28aaSamw 		    node = node->next) {
3498da6c28aaSamw 			if (xmlStrcmp(node->name, (xmlChar *)"resource") == 0)
3499da6c28aaSamw 				break;
3500da6c28aaSamw 		}
3501da6c28aaSamw 	}
3502da6c28aaSamw 	return ((sa_share_t)node);
3503da6c28aaSamw }
3504da6c28aaSamw 
3505da6c28aaSamw /*
3506da6c28aaSamw  * _sa_get_next_resource_index(share)
3507da6c28aaSamw  *
3508da6c28aaSamw  * get the next resource index number (one greater then current largest)
3509da6c28aaSamw  */
3510da6c28aaSamw 
3511da6c28aaSamw static int
3512da6c28aaSamw _sa_get_next_resource_index(sa_share_t share)
3513da6c28aaSamw {
3514da6c28aaSamw 	sa_resource_t resource;
3515da6c28aaSamw 	int index = 0;
3516da6c28aaSamw 	char *id;
3517da6c28aaSamw 
3518da6c28aaSamw 	for (resource = sa_get_share_resource(share, NULL);
3519da6c28aaSamw 	    resource != NULL;
3520da6c28aaSamw 	    resource = sa_get_next_resource(resource)) {
3521da6c28aaSamw 		id = get_node_attr((void *)resource, "id");
3522da6c28aaSamw 		if (id != NULL) {
3523da6c28aaSamw 			int val;
3524da6c28aaSamw 			val = atoi(id);
3525da6c28aaSamw 			if (val > index)
3526da6c28aaSamw 				index = val;
3527da6c28aaSamw 			sa_free_attr_string(id);
3528da6c28aaSamw 		}
3529da6c28aaSamw 	}
3530da6c28aaSamw 	return (index + 1);
3531da6c28aaSamw }
3532da6c28aaSamw 
3533da6c28aaSamw 
3534da6c28aaSamw /*
3535da6c28aaSamw  * sa_add_resource(share, resource, persist, &err)
3536da6c28aaSamw  *
3537da6c28aaSamw  * Adds a new resource name associated with share. The resource name
3538da6c28aaSamw  * must be unique in the system and will be case insensitive (eventually).
3539da6c28aaSamw  */
3540da6c28aaSamw 
3541da6c28aaSamw sa_resource_t
3542da6c28aaSamw sa_add_resource(sa_share_t share, char *resource, int persist, int *error)
3543da6c28aaSamw {
3544da6c28aaSamw 	xmlNodePtr node;
3545da6c28aaSamw 	int err = SA_OK;
3546da6c28aaSamw 	sa_resource_t res;
3547da6c28aaSamw 	sa_group_t group;
3548da6c28aaSamw 	sa_handle_t handle;
3549da6c28aaSamw 	char istring[8]; /* just big enough for an integer value */
3550da6c28aaSamw 	int index;
3551da6c28aaSamw 
3552da6c28aaSamw 	group = sa_get_parent_group(share);
3553da6c28aaSamw 	handle = sa_find_group_handle(group);
3554da6c28aaSamw 	res = sa_find_resource(handle, resource);
3555da6c28aaSamw 	if (res != NULL) {
3556da6c28aaSamw 		err = SA_DUPLICATE_NAME;
3557da6c28aaSamw 		res = NULL;
3558da6c28aaSamw 	} else {
3559da6c28aaSamw 		node = xmlNewChild((xmlNodePtr)share, NULL,
3560da6c28aaSamw 		    (xmlChar *)"resource", NULL);
3561da6c28aaSamw 		if (node != NULL) {
3562da6c28aaSamw 			xmlSetProp(node, (xmlChar *)"name",
3563da6c28aaSamw 			    (xmlChar *)resource);
3564da6c28aaSamw 			xmlSetProp(node, (xmlChar *)"type", persist ?
3565da6c28aaSamw 			    (xmlChar *)"persist" : (xmlChar *)"transient");
3566da6c28aaSamw 			if (persist != SA_SHARE_TRANSIENT) {
3567da6c28aaSamw 				index = _sa_get_next_resource_index(share);
3568da6c28aaSamw 				(void) snprintf(istring, sizeof (istring), "%d",
3569da6c28aaSamw 				    index);
3570da6c28aaSamw 				xmlSetProp(node, (xmlChar *)"id",
3571da6c28aaSamw 				    (xmlChar *)istring);
3572da6c28aaSamw 				if (!sa_group_is_zfs(group) &&
3573da6c28aaSamw 				    sa_is_persistent((sa_group_t)share)) {
3574da6c28aaSamw 					/* ZFS doesn't use resource names */
3575da6c28aaSamw 					sa_handle_impl_t ihandle;
3576da6c28aaSamw 					ihandle = (sa_handle_impl_t)
3577da6c28aaSamw 					    sa_find_group_handle(
3578da6c28aaSamw 					    group);
3579da6c28aaSamw 					if (ihandle != NULL)
3580da6c28aaSamw 						err = sa_commit_share(
3581da6c28aaSamw 						    ihandle->scfhandle, group,
3582da6c28aaSamw 						    share);
3583da6c28aaSamw 					else
3584da6c28aaSamw 						err = SA_SYSTEM_ERR;
3585da6c28aaSamw 				}
3586da6c28aaSamw 			}
3587da6c28aaSamw 		}
3588da6c28aaSamw 	}
3589da6c28aaSamw 	if (error != NULL)
3590da6c28aaSamw 		*error = err;
3591da6c28aaSamw 	return ((sa_resource_t)node);
3592da6c28aaSamw }
3593da6c28aaSamw 
3594da6c28aaSamw /*
3595da6c28aaSamw  * sa_remove_resource(resource)
3596da6c28aaSamw  *
3597da6c28aaSamw  * Remove the resource name from the share (and the system)
3598da6c28aaSamw  */
3599da6c28aaSamw 
3600da6c28aaSamw int
3601da6c28aaSamw sa_remove_resource(sa_resource_t resource)
3602da6c28aaSamw {
3603da6c28aaSamw 	sa_share_t share;
3604da6c28aaSamw 	sa_group_t group;
3605da6c28aaSamw 	char *type;
3606da6c28aaSamw 	int ret = SA_OK;
3607da6c28aaSamw 	int transient = 0;
360855bf511dSas200622 	sa_optionset_t opt;
3609da6c28aaSamw 
3610da6c28aaSamw 	share = sa_get_resource_parent(resource);
3611da6c28aaSamw 	type = sa_get_share_attr(share, "type");
3612da6c28aaSamw 	group = sa_get_parent_group(share);
3613da6c28aaSamw 
3614da6c28aaSamw 
3615da6c28aaSamw 	if (type != NULL) {
3616da6c28aaSamw 		if (strcmp(type, "persist") != 0)
3617da6c28aaSamw 			transient = 1;
3618da6c28aaSamw 		sa_free_attr_string(type);
3619da6c28aaSamw 	}
3620da6c28aaSamw 
362155bf511dSas200622 	/* Disable the resource for all protocols. */
362255bf511dSas200622 	(void) sa_disable_resource(resource, NULL);
362355bf511dSas200622 
362455bf511dSas200622 	/* Remove any optionsets from the resource. */
362555bf511dSas200622 	for (opt = sa_get_optionset(resource, NULL);
362655bf511dSas200622 	    opt != NULL;
362755bf511dSas200622 	    opt = sa_get_next_optionset(opt))
362855bf511dSas200622 		(void) sa_destroy_optionset(opt);
362955bf511dSas200622 
3630da6c28aaSamw 	/* Remove from the share */
3631da6c28aaSamw 	xmlUnlinkNode((xmlNode *)resource);
3632da6c28aaSamw 	xmlFreeNode((xmlNode *)resource);
3633da6c28aaSamw 
3634da6c28aaSamw 	/* only do SMF action if permanent and not ZFS */
3635da6c28aaSamw 	if (!transient && !sa_group_is_zfs(group)) {
3636da6c28aaSamw 		sa_handle_impl_t ihandle;
3637da6c28aaSamw 		ihandle = (sa_handle_impl_t)sa_find_group_handle(group);
3638da6c28aaSamw 		if (ihandle != NULL)
3639da6c28aaSamw 			ret = sa_commit_share(ihandle->scfhandle, group, share);
3640da6c28aaSamw 		else
3641da6c28aaSamw 			ret = SA_SYSTEM_ERR;
3642da6c28aaSamw 	}
3643da6c28aaSamw 	return (ret);
3644da6c28aaSamw }
3645da6c28aaSamw 
3646da6c28aaSamw /*
3647da6c28aaSamw  * proto_resource_rename(handle, group, resource, newname)
3648da6c28aaSamw  *
3649da6c28aaSamw  * Helper function for sa_rename_resource that notifies the protocol
3650da6c28aaSamw  * of a resource name change prior to a config repository update.
3651da6c28aaSamw  */
3652da6c28aaSamw static int
3653da6c28aaSamw proto_rename_resource(sa_handle_t handle, sa_group_t group,
3654da6c28aaSamw     sa_resource_t resource, char *newname)
3655da6c28aaSamw {
3656da6c28aaSamw 	sa_optionset_t optionset;
3657da6c28aaSamw 	int ret = SA_OK;
3658da6c28aaSamw 	int err;
3659da6c28aaSamw 
3660da6c28aaSamw 	for (optionset = sa_get_optionset(group, NULL);
3661da6c28aaSamw 	    optionset != NULL;
3662da6c28aaSamw 	    optionset = sa_get_next_optionset(optionset)) {
3663da6c28aaSamw 		char *type;
3664da6c28aaSamw 		type = sa_get_optionset_attr(optionset, "type");
3665da6c28aaSamw 		if (type != NULL) {
3666da6c28aaSamw 			err = sa_proto_rename_resource(handle, type, resource,
3667da6c28aaSamw 			    newname);
3668da6c28aaSamw 			if (err != SA_OK)
3669da6c28aaSamw 				ret = err;
3670da6c28aaSamw 			sa_free_attr_string(type);
3671da6c28aaSamw 		}
3672da6c28aaSamw 	}
3673da6c28aaSamw 	return (ret);
3674da6c28aaSamw }
3675da6c28aaSamw 
3676da6c28aaSamw /*
3677da6c28aaSamw  * sa_rename_resource(resource, newname)
3678da6c28aaSamw  *
3679da6c28aaSamw  * Rename the resource to the new name, if it is unique.
3680da6c28aaSamw  */
3681da6c28aaSamw 
3682da6c28aaSamw int
3683da6c28aaSamw sa_rename_resource(sa_resource_t resource, char *newname)
3684da6c28aaSamw {
3685da6c28aaSamw 	sa_share_t share;
3686da6c28aaSamw 	sa_group_t group = NULL;
3687da6c28aaSamw 	sa_resource_t target;
3688da6c28aaSamw 	int ret = SA_CONFIG_ERR;
3689da6c28aaSamw 	sa_handle_t handle = NULL;
3690da6c28aaSamw 
3691da6c28aaSamw 	share = sa_get_resource_parent(resource);
3692da6c28aaSamw 	if (share == NULL)
3693da6c28aaSamw 		return (ret);
3694da6c28aaSamw 
3695da6c28aaSamw 	group = sa_get_parent_group(share);
3696da6c28aaSamw 	if (group == NULL)
3697da6c28aaSamw 		return (ret);
3698da6c28aaSamw 
3699da6c28aaSamw 	handle = (sa_handle_impl_t)sa_find_group_handle(group);
3700da6c28aaSamw 	if (handle == NULL)
3701da6c28aaSamw 		return (ret);
3702da6c28aaSamw 
3703da6c28aaSamw 	target = sa_find_resource(handle, newname);
3704da6c28aaSamw 	if (target != NULL) {
3705da6c28aaSamw 		ret = SA_DUPLICATE_NAME;
3706da6c28aaSamw 	} else {
3707da6c28aaSamw 		/*
3708da6c28aaSamw 		 * Everything appears to be valid at this
3709da6c28aaSamw 		 * point. Change the name of the active share and then
3710da6c28aaSamw 		 * update the share in the appropriate repository.
3711da6c28aaSamw 		 */
3712da6c28aaSamw 		ret = proto_rename_resource(handle, group, resource, newname);
3713da6c28aaSamw 		set_node_attr(resource, "name", newname);
3714da6c28aaSamw 		if (!sa_group_is_zfs(group) &&
3715da6c28aaSamw 		    sa_is_persistent((sa_group_t)share)) {
3716da6c28aaSamw 			sa_handle_impl_t ihandle = (sa_handle_impl_t)handle;
3717da6c28aaSamw 			ret = sa_commit_share(ihandle->scfhandle, group,
3718da6c28aaSamw 			    share);
3719da6c28aaSamw 		}
3720da6c28aaSamw 	}
3721da6c28aaSamw 	return (ret);
3722da6c28aaSamw }
3723da6c28aaSamw 
3724da6c28aaSamw /*
3725da6c28aaSamw  * sa_get_resource_attr(resource, tag)
3726da6c28aaSamw  *
3727da6c28aaSamw  * Get the named attribute of the resource. "name" and "id" are
3728da6c28aaSamw  * currently defined.  NULL if tag not defined.
3729da6c28aaSamw  */
3730da6c28aaSamw 
3731da6c28aaSamw char *
3732da6c28aaSamw sa_get_resource_attr(sa_resource_t resource, char *tag)
3733da6c28aaSamw {
3734da6c28aaSamw 	return (get_node_attr((void *)resource, tag));
3735da6c28aaSamw }
3736da6c28aaSamw 
3737da6c28aaSamw /*
3738da6c28aaSamw  * sa_set_resource_attr(resource, tag, value)
3739da6c28aaSamw  *
3740da6c28aaSamw  * Get the named attribute of the resource. "name" and "id" are
3741da6c28aaSamw  * currently defined.  NULL if tag not defined. Currently we don't do
3742da6c28aaSamw  * much, but additional checking may be needed in the future.
3743da6c28aaSamw  */
3744da6c28aaSamw 
3745da6c28aaSamw int
3746da6c28aaSamw sa_set_resource_attr(sa_resource_t resource, char *tag, char *value)
3747da6c28aaSamw {
3748da6c28aaSamw 	set_node_attr((void *)resource, tag, value);
3749da6c28aaSamw 	return (SA_OK);
3750da6c28aaSamw }
3751da6c28aaSamw 
3752da6c28aaSamw /*
3753da6c28aaSamw  * sa_get_resource_parent(resource_t)
3754da6c28aaSamw  *
3755da6c28aaSamw  * Returns the share associated with the resource.
3756da6c28aaSamw  */
3757da6c28aaSamw 
3758da6c28aaSamw sa_share_t
3759da6c28aaSamw sa_get_resource_parent(sa_resource_t resource)
3760da6c28aaSamw {
3761da6c28aaSamw 	sa_share_t share = NULL;
3762da6c28aaSamw 
3763da6c28aaSamw 	if (resource != NULL)
3764da6c28aaSamw 		share = (sa_share_t)((xmlNodePtr)resource)->parent;
3765da6c28aaSamw 	return (share);
3766da6c28aaSamw }
3767da6c28aaSamw 
3768da6c28aaSamw /*
3769da6c28aaSamw  * find_resource(group, name)
3770da6c28aaSamw  *
3771da6c28aaSamw  * Find the resource within the group.
3772da6c28aaSamw  */
3773da6c28aaSamw 
3774da6c28aaSamw static sa_resource_t
3775da6c28aaSamw find_resource(sa_group_t group, char *resname)
3776da6c28aaSamw {
3777da6c28aaSamw 	sa_share_t share;
3778da6c28aaSamw 	sa_resource_t resource = NULL;
3779da6c28aaSamw 	char *name;
3780da6c28aaSamw 
3781da6c28aaSamw 	/* Iterate over all the shares and resources in the group. */
3782da6c28aaSamw 	for (share = sa_get_share(group, NULL);
3783da6c28aaSamw 	    share != NULL && resource == NULL;
3784da6c28aaSamw 	    share = sa_get_next_share(share)) {
3785da6c28aaSamw 		for (resource = sa_get_share_resource(share, NULL);
3786da6c28aaSamw 		    resource != NULL;
3787da6c28aaSamw 		    resource = sa_get_next_resource(resource)) {
3788da6c28aaSamw 			name = sa_get_resource_attr(resource, "name");
3789da6c28aaSamw 			if (name != NULL && xmlStrcasecmp((xmlChar*)name,
3790da6c28aaSamw 			    (xmlChar*)resname) == 0) {
3791da6c28aaSamw 				sa_free_attr_string(name);
3792da6c28aaSamw 				break;
3793da6c28aaSamw 			}
3794da6c28aaSamw 			if (name != NULL) {
3795da6c28aaSamw 				sa_free_attr_string(name);
3796da6c28aaSamw 			}
3797da6c28aaSamw 		}
3798da6c28aaSamw 	}
3799da6c28aaSamw 	return (resource);
3800da6c28aaSamw }
3801da6c28aaSamw 
3802da6c28aaSamw /*
3803da6c28aaSamw  * sa_find_resource(name)
3804da6c28aaSamw  *
3805da6c28aaSamw  * Find the named resource in the system.
3806da6c28aaSamw  */
3807da6c28aaSamw 
3808da6c28aaSamw sa_resource_t
3809da6c28aaSamw sa_find_resource(sa_handle_t handle, char *name)
3810da6c28aaSamw {
3811da6c28aaSamw 	sa_group_t group;
3812da6c28aaSamw 	sa_group_t zgroup;
3813da6c28aaSamw 	sa_resource_t resource = NULL;
3814da6c28aaSamw 
3815da6c28aaSamw 	/*
3816da6c28aaSamw 	 * Iterate over all groups and zfs subgroups and check for
3817da6c28aaSamw 	 * resource name in them.
3818da6c28aaSamw 	 */
3819da6c28aaSamw 	for (group = sa_get_group(handle, NULL); group != NULL;
3820da6c28aaSamw 	    group = sa_get_next_group(group)) {
3821da6c28aaSamw 
3822da6c28aaSamw 		if (is_zfs_group(group)) {
3823da6c28aaSamw 			for (zgroup =
3824da6c28aaSamw 			    (sa_group_t)_sa_get_child_node((xmlNodePtr)group,
3825da6c28aaSamw 			    (xmlChar *)"group");
3826da6c28aaSamw 			    zgroup != NULL && resource == NULL;
3827da6c28aaSamw 			    zgroup = sa_get_next_group(zgroup)) {
3828da6c28aaSamw 				resource = find_resource(zgroup, name);
3829da6c28aaSamw 			}
3830da6c28aaSamw 		} else {
3831da6c28aaSamw 			resource = find_resource(group, name);
3832da6c28aaSamw 		}
3833da6c28aaSamw 		if (resource != NULL)
3834da6c28aaSamw 			break;
3835da6c28aaSamw 	}
3836da6c28aaSamw 	return (resource);
3837da6c28aaSamw }
3838da6c28aaSamw 
3839da6c28aaSamw /*
3840da6c28aaSamw  * sa_get_resource(group, resource)
3841da6c28aaSamw  *
3842da6c28aaSamw  * Search all the shares in the specified group for a share with a
3843da6c28aaSamw  * resource name matching the one specified.
3844da6c28aaSamw  *
3845da6c28aaSamw  * In the future, it may be advantageous to allow group to be NULL and
3846da6c28aaSamw  * search all groups but that isn't needed at present.
3847da6c28aaSamw  */
3848da6c28aaSamw 
3849da6c28aaSamw sa_resource_t
3850da6c28aaSamw sa_get_resource(sa_group_t group, char *resource)
3851da6c28aaSamw {
3852da6c28aaSamw 	sa_share_t share = NULL;
3853da6c28aaSamw 	sa_resource_t res = NULL;
3854da6c28aaSamw 
3855da6c28aaSamw 	if (resource != NULL) {
3856da6c28aaSamw 		for (share = sa_get_share(group, NULL);
3857da6c28aaSamw 		    share != NULL && res == NULL;
3858da6c28aaSamw 		    share = sa_get_next_share(share)) {
3859da6c28aaSamw 			res = sa_get_share_resource(share, resource);
3860da6c28aaSamw 		}
3861da6c28aaSamw 	}
3862da6c28aaSamw 	return (res);
3863da6c28aaSamw }
3864da6c28aaSamw 
3865da6c28aaSamw /*
3866da6c28aaSamw  * sa_enable_resource, protocol)
3867da6c28aaSamw  *	Disable the specified share to the specified protocol.
3868da6c28aaSamw  *	If protocol is NULL, then all protocols.
3869da6c28aaSamw  */
3870da6c28aaSamw int
3871da6c28aaSamw sa_enable_resource(sa_resource_t resource, char *protocol)
3872da6c28aaSamw {
3873da6c28aaSamw 	int ret = SA_OK;
3874da6c28aaSamw 	char **protocols;
3875da6c28aaSamw 	int numproto;
3876da6c28aaSamw 
3877da6c28aaSamw 	if (protocol != NULL) {
3878da6c28aaSamw 		ret = sa_proto_share_resource(protocol, resource);
3879da6c28aaSamw 	} else {
3880da6c28aaSamw 		/* need to do all protocols */
3881da6c28aaSamw 		if ((numproto = sa_get_protocols(&protocols)) >= 0) {
3882da6c28aaSamw 			int i, err;
3883da6c28aaSamw 			for (i = 0; i < numproto; i++) {
3884da6c28aaSamw 				err = sa_proto_share_resource(
3885da6c28aaSamw 				    protocols[i], resource);
3886da6c28aaSamw 				if (err != SA_OK)
3887da6c28aaSamw 					ret = err;
3888da6c28aaSamw 			}
3889da6c28aaSamw 			free(protocols);
3890da6c28aaSamw 		}
3891da6c28aaSamw 	}
3892da6c28aaSamw 	if (ret == SA_OK)
3893da6c28aaSamw 		(void) sa_set_resource_attr(resource, "shared", NULL);
3894da6c28aaSamw 
3895da6c28aaSamw 	return (ret);
3896da6c28aaSamw }
3897da6c28aaSamw 
3898da6c28aaSamw /*
3899da6c28aaSamw  * sa_disable_resource(resource, protocol)
3900da6c28aaSamw  *
3901da6c28aaSamw  *	Disable the specified share for the specified protocol.  If
3902da6c28aaSamw  *	protocol is NULL, then all protocols.  If the underlying
3903da6c28aaSamw  *	protocol doesn't implement disable at the resource level, we
3904da6c28aaSamw  *	disable at the share level.
3905da6c28aaSamw  */
3906da6c28aaSamw int
3907da6c28aaSamw sa_disable_resource(sa_resource_t resource, char *protocol)
3908da6c28aaSamw {
3909da6c28aaSamw 	int ret = SA_OK;
3910da6c28aaSamw 	char **protocols;
3911da6c28aaSamw 	int numproto;
3912da6c28aaSamw 
3913da6c28aaSamw 	if (protocol != NULL) {
3914da6c28aaSamw 		ret = sa_proto_unshare_resource(protocol, resource);
3915da6c28aaSamw 		if (ret == SA_NOT_IMPLEMENTED) {
3916da6c28aaSamw 			sa_share_t parent;
3917da6c28aaSamw 			/*
3918da6c28aaSamw 			 * The protocol doesn't implement unshare
3919da6c28aaSamw 			 * resource. That implies that resource names are
3920da6c28aaSamw 			 * simple aliases for this protocol so we need to
3921da6c28aaSamw 			 * unshare the share.
3922da6c28aaSamw 			 */
3923da6c28aaSamw 			parent = sa_get_resource_parent(resource);
3924da6c28aaSamw 			if (parent != NULL)
3925da6c28aaSamw 				ret = sa_disable_share(parent, protocol);
3926da6c28aaSamw 			else
3927da6c28aaSamw 				ret = SA_CONFIG_ERR;
3928da6c28aaSamw 		}
3929da6c28aaSamw 	} else {
3930da6c28aaSamw 		/* need to do all protocols */
3931da6c28aaSamw 		if ((numproto = sa_get_protocols(&protocols)) >= 0) {
3932da6c28aaSamw 			int i, err;
3933da6c28aaSamw 			for (i = 0; i < numproto; i++) {
3934da6c28aaSamw 				err = sa_proto_unshare_resource(protocols[i],
3935da6c28aaSamw 				    resource);
3936da6c28aaSamw 				if (err == SA_NOT_SUPPORTED) {
3937da6c28aaSamw 					sa_share_t parent;
3938da6c28aaSamw 					parent = sa_get_resource_parent(
3939da6c28aaSamw 					    resource);
3940da6c28aaSamw 					if (parent != NULL)
3941da6c28aaSamw 						err = sa_disable_share(parent,
3942da6c28aaSamw 						    protocols[i]);
3943da6c28aaSamw 					else
3944da6c28aaSamw 						err = SA_CONFIG_ERR;
3945da6c28aaSamw 				}
3946da6c28aaSamw 				if (err != SA_OK)
3947da6c28aaSamw 					ret = err;
3948da6c28aaSamw 			}
3949da6c28aaSamw 			free(protocols);
3950da6c28aaSamw 		}
3951da6c28aaSamw 	}
3952da6c28aaSamw 	if (ret == SA_OK)
3953da6c28aaSamw 		(void) sa_set_resource_attr(resource, "shared", NULL);
3954da6c28aaSamw 
3955da6c28aaSamw 	return (ret);
3956da6c28aaSamw }
3957da6c28aaSamw 
3958da6c28aaSamw /*
3959da6c28aaSamw  * sa_set_resource_description(resource, content)
3960da6c28aaSamw  *
3961da6c28aaSamw  * Set the description of share to content.
3962da6c28aaSamw  */
3963da6c28aaSamw 
3964da6c28aaSamw int
3965da6c28aaSamw sa_set_resource_description(sa_resource_t resource, char *content)
3966da6c28aaSamw {
3967da6c28aaSamw 	xmlNodePtr node;
3968da6c28aaSamw 	sa_group_t group;
3969da6c28aaSamw 	sa_share_t share;
3970da6c28aaSamw 	int ret = SA_OK;
3971da6c28aaSamw 
3972da6c28aaSamw 	for (node = ((xmlNodePtr)resource)->children;
3973da6c28aaSamw 	    node != NULL;
3974da6c28aaSamw 	    node = node->next) {
3975da6c28aaSamw 		if (xmlStrcmp(node->name, (xmlChar *)"description") == 0) {
3976da6c28aaSamw 			break;
3977da6c28aaSamw 		}
3978da6c28aaSamw 	}
3979da6c28aaSamw 
3980da6c28aaSamw 	/* no existing description but want to add */
3981da6c28aaSamw 	if (node == NULL && content != NULL) {
3982da6c28aaSamw 		/* add a description */
3983da6c28aaSamw 		node = _sa_set_share_description(resource, content);
3984da6c28aaSamw 	} else if (node != NULL && content != NULL) {
3985da6c28aaSamw 		/* update a description */
3986da6c28aaSamw 		xmlNodeSetContent(node, (xmlChar *)content);
3987da6c28aaSamw 	} else if (node != NULL && content == NULL) {
3988da6c28aaSamw 		/* remove an existing description */
3989da6c28aaSamw 		xmlUnlinkNode(node);
3990da6c28aaSamw 		xmlFreeNode(node);
3991da6c28aaSamw 	}
3992da6c28aaSamw 	share = sa_get_resource_parent(resource);
3993da6c28aaSamw 	group = sa_get_parent_group(share);
3994da6c28aaSamw 	if (group != NULL && sa_is_persistent(share)) {
3995da6c28aaSamw 		sa_handle_impl_t impl_handle;
3996da6c28aaSamw 		impl_handle = (sa_handle_impl_t)sa_find_group_handle(group);
3997da6c28aaSamw 		if (impl_handle != NULL)
3998da6c28aaSamw 			ret = sa_commit_share(impl_handle->scfhandle,
3999da6c28aaSamw 			    group, share);
4000da6c28aaSamw 		else
4001da6c28aaSamw 			ret = SA_SYSTEM_ERR;
4002da6c28aaSamw 	}
4003da6c28aaSamw 	return (ret);
4004da6c28aaSamw }
4005da6c28aaSamw 
4006da6c28aaSamw /*
4007da6c28aaSamw  * sa_get_resource_description(share)
4008da6c28aaSamw  *
4009da6c28aaSamw  * Return the description text for the specified share if it
4010da6c28aaSamw  * exists. NULL if no description exists.
4011da6c28aaSamw  */
4012da6c28aaSamw 
4013da6c28aaSamw char *
4014da6c28aaSamw sa_get_resource_description(sa_resource_t resource)
4015da6c28aaSamw {
4016da6c28aaSamw 	xmlChar *description = NULL;
4017da6c28aaSamw 	xmlNodePtr node;
4018da6c28aaSamw 
4019da6c28aaSamw 	for (node = ((xmlNodePtr)resource)->children; node != NULL;
4020da6c28aaSamw 	    node = node->next) {
4021da6c28aaSamw 		if (xmlStrcmp(node->name, (xmlChar *)"description") == 0)
4022da6c28aaSamw 			break;
4023da6c28aaSamw 	}
4024da6c28aaSamw 	if (node != NULL) {
4025da6c28aaSamw 		description = xmlNodeGetContent(node);
4026da6c28aaSamw 		fixproblemchars((char *)description);
4027da6c28aaSamw 	}
4028da6c28aaSamw 	return ((char *)description);
4029da6c28aaSamw }
4030