16185db85Sdougm /* 26185db85Sdougm * CDDL HEADER START 36185db85Sdougm * 46185db85Sdougm * The contents of this file are subject to the terms of the 56185db85Sdougm * Common Development and Distribution License (the "License"). 66185db85Sdougm * You may not use this file except in compliance with the License. 76185db85Sdougm * 86185db85Sdougm * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 96185db85Sdougm * or http://www.opensolaris.org/os/licensing. 106185db85Sdougm * See the License for the specific language governing permissions 116185db85Sdougm * and limitations under the License. 126185db85Sdougm * 136185db85Sdougm * When distributing Covered Code, include this CDDL HEADER in each 146185db85Sdougm * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 156185db85Sdougm * If applicable, add the following below this CDDL HEADER, with the 166185db85Sdougm * fields enclosed by brackets "[]" replaced with your own identifying 176185db85Sdougm * information: Portions Copyright [yyyy] [name of copyright owner] 186185db85Sdougm * 196185db85Sdougm * CDDL HEADER END 206185db85Sdougm */ 216185db85Sdougm 226185db85Sdougm /* 23dc20a302Sas200622 * Copyright 2008 Sun Microsystems, Inc. All rights reserved. 246185db85Sdougm * Use is subject to license terms. 256185db85Sdougm */ 266185db85Sdougm 276185db85Sdougm #pragma ident "%Z%%M% %I% %E% SMI" 286185db85Sdougm 296185db85Sdougm /* 306185db85Sdougm * Share control API 316185db85Sdougm */ 326185db85Sdougm #include <stdio.h> 336185db85Sdougm #include <string.h> 346185db85Sdougm #include <ctype.h> 356185db85Sdougm #include <sys/types.h> 366185db85Sdougm #include <sys/stat.h> 37a99982a7Sdougm #include <fcntl.h> 386185db85Sdougm #include <unistd.h> 396185db85Sdougm #include <libxml/parser.h> 406185db85Sdougm #include <libxml/tree.h> 416185db85Sdougm #include "libshare.h" 426185db85Sdougm #include "libshare_impl.h" 436185db85Sdougm #include <libscf.h> 446185db85Sdougm #include "scfutil.h" 456185db85Sdougm #include <ctype.h> 466185db85Sdougm #include <libintl.h> 47549ec3ffSdougm #include <thread.h> 48549ec3ffSdougm #include <synch.h> 496185db85Sdougm 506185db85Sdougm #if _NOT_SMF 516185db85Sdougm #define CONFIG_FILE "/var/tmp/share.cfg" 526185db85Sdougm #define CONFIG_FILE_TMP "/var/tmp/share.cfg.tmp" 536185db85Sdougm #endif 546185db85Sdougm #define TSTAMP(tm) (uint64_t)(((uint64_t)tm.tv_sec << 32) | \ 556185db85Sdougm (tm.tv_nsec & 0xffffffff)) 566185db85Sdougm 57a99982a7Sdougm #define DFS_LOCK_FILE "/etc/dfs/fstypes" 5857b448deSdougm #define SA_STRSIZE 256 /* max string size for names */ 59a99982a7Sdougm 606185db85Sdougm /* 61da6c28aaSamw * internal object type values returned by sa_get_object_type() 62da6c28aaSamw */ 63da6c28aaSamw #define SA_TYPE_UNKNOWN 0 64da6c28aaSamw #define SA_TYPE_GROUP 1 65da6c28aaSamw #define SA_TYPE_SHARE 2 66da6c28aaSamw #define SA_TYPE_RESOURCE 3 67da6c28aaSamw #define SA_TYPE_OPTIONSET 4 68da6c28aaSamw #define SA_TYPE_ALTSPACE 5 69da6c28aaSamw 70da6c28aaSamw /* 716185db85Sdougm * internal data structures 726185db85Sdougm */ 736185db85Sdougm 746185db85Sdougm extern struct sa_proto_plugin *sap_proto_list; 756185db85Sdougm 766185db85Sdougm /* current SMF/SVC repository handle */ 77549ec3ffSdougm extern void getlegacyconfig(sa_handle_t, char *, xmlNodePtr *); 78549ec3ffSdougm extern int gettransients(sa_handle_impl_t, xmlNodePtr *); 796185db85Sdougm extern int sa_valid_property(void *, char *, sa_property_t); 806185db85Sdougm extern char *sa_fstype(char *); 816185db85Sdougm extern int sa_is_share(void *); 82da6c28aaSamw extern int sa_is_resource(void *); 836185db85Sdougm extern ssize_t scf_max_name_len; /* defined in scfutil during initialization */ 846185db85Sdougm extern int sa_group_is_zfs(sa_group_t); 856185db85Sdougm extern int sa_path_is_zfs(char *); 866185db85Sdougm extern int sa_zfs_set_sharenfs(sa_group_t, char *, int); 87da6c28aaSamw extern int sa_zfs_set_sharesmb(sa_group_t, char *, int); 88549ec3ffSdougm extern void update_legacy_config(sa_handle_t); 896185db85Sdougm extern int issubdir(char *, char *); 9057b448deSdougm extern int sa_zfs_init(sa_handle_impl_t); 91549ec3ffSdougm extern void sa_zfs_fini(sa_handle_impl_t); 92a99982a7Sdougm extern void sablocksigs(sigset_t *); 93a99982a7Sdougm extern void saunblocksigs(sigset_t *); 94da6c28aaSamw static sa_group_t sa_get_optionset_parent(sa_optionset_t); 95da6c28aaSamw static char *get_node_attr(void *, char *); 966185db85Sdougm 97549ec3ffSdougm /* 98549ec3ffSdougm * Data structures for finding/managing the document root to access 99549ec3ffSdougm * handle mapping. The list isn't expected to grow very large so a 100549ec3ffSdougm * simple list is acceptable. The purpose is to provide a way to start 101549ec3ffSdougm * with a group or share and find the library handle needed for 102549ec3ffSdougm * various operations. 103549ec3ffSdougm */ 104549ec3ffSdougm mutex_t sa_global_lock; 105549ec3ffSdougm struct doc2handle { 106549ec3ffSdougm struct doc2handle *next; 107549ec3ffSdougm xmlNodePtr root; 108549ec3ffSdougm sa_handle_impl_t handle; 109549ec3ffSdougm }; 110549ec3ffSdougm 11157b448deSdougm /* definitions used in a couple of property functions */ 11257b448deSdougm #define SA_PROP_OP_REMOVE 1 11357b448deSdougm #define SA_PROP_OP_ADD 2 11457b448deSdougm #define SA_PROP_OP_UPDATE 3 11557b448deSdougm 116549ec3ffSdougm static struct doc2handle *sa_global_handles = NULL; 1176185db85Sdougm 1186185db85Sdougm /* helper functions */ 1196185db85Sdougm 120549ec3ffSdougm /* 121549ec3ffSdougm * sa_errorstr(err) 122549ec3ffSdougm * 123549ec3ffSdougm * convert an error value to an error string 124549ec3ffSdougm */ 125549ec3ffSdougm 1266185db85Sdougm char * 1276185db85Sdougm sa_errorstr(int err) 1286185db85Sdougm { 1296185db85Sdougm static char errstr[32]; 1306185db85Sdougm char *ret = NULL; 1316185db85Sdougm 1326185db85Sdougm switch (err) { 1336185db85Sdougm case SA_OK: 13424424a35Sdougm ret = dgettext(TEXT_DOMAIN, "ok"); 1356185db85Sdougm break; 1366185db85Sdougm case SA_NO_SUCH_PATH: 13724424a35Sdougm ret = dgettext(TEXT_DOMAIN, "path doesn't exist"); 1386185db85Sdougm break; 1396185db85Sdougm case SA_NO_MEMORY: 14024424a35Sdougm ret = dgettext(TEXT_DOMAIN, "no memory"); 1416185db85Sdougm break; 1426185db85Sdougm case SA_DUPLICATE_NAME: 14324424a35Sdougm ret = dgettext(TEXT_DOMAIN, "name in use"); 1446185db85Sdougm break; 1456185db85Sdougm case SA_BAD_PATH: 14624424a35Sdougm ret = dgettext(TEXT_DOMAIN, "bad path"); 1476185db85Sdougm break; 1486185db85Sdougm case SA_NO_SUCH_GROUP: 14924424a35Sdougm ret = dgettext(TEXT_DOMAIN, "no such group"); 1506185db85Sdougm break; 1516185db85Sdougm case SA_CONFIG_ERR: 15224424a35Sdougm ret = dgettext(TEXT_DOMAIN, "configuration error"); 1536185db85Sdougm break; 1546185db85Sdougm case SA_SYSTEM_ERR: 15524424a35Sdougm ret = dgettext(TEXT_DOMAIN, "system error"); 1566185db85Sdougm break; 1576185db85Sdougm case SA_SYNTAX_ERR: 15824424a35Sdougm ret = dgettext(TEXT_DOMAIN, "syntax error"); 1596185db85Sdougm break; 1606185db85Sdougm case SA_NO_PERMISSION: 16124424a35Sdougm ret = dgettext(TEXT_DOMAIN, "no permission"); 1626185db85Sdougm break; 1636185db85Sdougm case SA_BUSY: 16424424a35Sdougm ret = dgettext(TEXT_DOMAIN, "busy"); 1656185db85Sdougm break; 1666185db85Sdougm case SA_NO_SUCH_PROP: 16724424a35Sdougm ret = dgettext(TEXT_DOMAIN, "no such property"); 1686185db85Sdougm break; 1696185db85Sdougm case SA_INVALID_NAME: 17024424a35Sdougm ret = dgettext(TEXT_DOMAIN, "invalid name"); 1716185db85Sdougm break; 1726185db85Sdougm case SA_INVALID_PROTOCOL: 17324424a35Sdougm ret = dgettext(TEXT_DOMAIN, "invalid protocol"); 1746185db85Sdougm break; 1756185db85Sdougm case SA_NOT_ALLOWED: 17624424a35Sdougm ret = dgettext(TEXT_DOMAIN, "operation not allowed"); 1776185db85Sdougm break; 1786185db85Sdougm case SA_BAD_VALUE: 17924424a35Sdougm ret = dgettext(TEXT_DOMAIN, "bad property value"); 1806185db85Sdougm break; 1816185db85Sdougm case SA_INVALID_SECURITY: 18224424a35Sdougm ret = dgettext(TEXT_DOMAIN, "invalid security type"); 1836185db85Sdougm break; 1846185db85Sdougm case SA_NO_SUCH_SECURITY: 18524424a35Sdougm ret = dgettext(TEXT_DOMAIN, "security type not found"); 1866185db85Sdougm break; 1876185db85Sdougm case SA_VALUE_CONFLICT: 18824424a35Sdougm ret = dgettext(TEXT_DOMAIN, "property value conflict"); 1896185db85Sdougm break; 1906185db85Sdougm case SA_NOT_IMPLEMENTED: 19124424a35Sdougm ret = dgettext(TEXT_DOMAIN, "not implemented"); 1926185db85Sdougm break; 1936185db85Sdougm case SA_INVALID_PATH: 19424424a35Sdougm ret = dgettext(TEXT_DOMAIN, "invalid path"); 1956185db85Sdougm break; 1966185db85Sdougm case SA_NOT_SUPPORTED: 19724424a35Sdougm ret = dgettext(TEXT_DOMAIN, "operation not supported"); 1986185db85Sdougm break; 1996185db85Sdougm case SA_PROP_SHARE_ONLY: 20024424a35Sdougm ret = dgettext(TEXT_DOMAIN, "property not valid for group"); 2016185db85Sdougm break; 2026185db85Sdougm case SA_NOT_SHARED: 20324424a35Sdougm ret = dgettext(TEXT_DOMAIN, "not shared"); 2046185db85Sdougm break; 205da6c28aaSamw case SA_NO_SUCH_RESOURCE: 206da6c28aaSamw ret = dgettext(TEXT_DOMAIN, "no such resource"); 207da6c28aaSamw break; 208da6c28aaSamw case SA_RESOURCE_REQUIRED: 209da6c28aaSamw ret = dgettext(TEXT_DOMAIN, "resource name required"); 210da6c28aaSamw break; 211da6c28aaSamw case SA_MULTIPLE_ERROR: 212da6c28aaSamw ret = dgettext(TEXT_DOMAIN, "errors from multiple protocols"); 213da6c28aaSamw break; 214da6c28aaSamw case SA_PATH_IS_SUBDIR: 215da6c28aaSamw ret = dgettext(TEXT_DOMAIN, "path is a subpath of share"); 216da6c28aaSamw break; 217da6c28aaSamw case SA_PATH_IS_PARENTDIR: 218da6c28aaSamw ret = dgettext(TEXT_DOMAIN, "path is parent of a share"); 219da6c28aaSamw break; 2206185db85Sdougm default: 2216185db85Sdougm (void) snprintf(errstr, sizeof (errstr), 22224424a35Sdougm dgettext(TEXT_DOMAIN, "unknown %d"), err); 2236185db85Sdougm ret = errstr; 2246185db85Sdougm } 2256185db85Sdougm return (ret); 2266185db85Sdougm } 2276185db85Sdougm 2286185db85Sdougm /* 229549ec3ffSdougm * Document root to active handle mapping functions. These are only 230549ec3ffSdougm * used internally. A mutex is used to prevent access while the list 231549ec3ffSdougm * is changing. In general, the list will be relatively short - one 232549ec3ffSdougm * item per thread that has called sa_init(). 233549ec3ffSdougm */ 234549ec3ffSdougm 235549ec3ffSdougm sa_handle_impl_t 236549ec3ffSdougm get_handle_for_root(xmlNodePtr root) 237549ec3ffSdougm { 238549ec3ffSdougm struct doc2handle *item; 239549ec3ffSdougm 240549ec3ffSdougm (void) mutex_lock(&sa_global_lock); 241549ec3ffSdougm for (item = sa_global_handles; item != NULL; item = item->next) { 242549ec3ffSdougm if (item->root == root) 243549ec3ffSdougm break; 244549ec3ffSdougm } 245549ec3ffSdougm (void) mutex_unlock(&sa_global_lock); 246549ec3ffSdougm if (item != NULL) 247549ec3ffSdougm return (item->handle); 248549ec3ffSdougm return (NULL); 249549ec3ffSdougm } 250549ec3ffSdougm 251549ec3ffSdougm static int 252549ec3ffSdougm add_handle_for_root(xmlNodePtr root, sa_handle_impl_t handle) 253549ec3ffSdougm { 254549ec3ffSdougm struct doc2handle *item; 255549ec3ffSdougm int ret = SA_NO_MEMORY; 256549ec3ffSdougm 257549ec3ffSdougm item = (struct doc2handle *)calloc(sizeof (struct doc2handle), 1); 258549ec3ffSdougm if (item != NULL) { 259549ec3ffSdougm item->root = root; 260549ec3ffSdougm item->handle = handle; 261549ec3ffSdougm (void) mutex_lock(&sa_global_lock); 262549ec3ffSdougm item->next = sa_global_handles; 263549ec3ffSdougm sa_global_handles = item; 264549ec3ffSdougm (void) mutex_unlock(&sa_global_lock); 265549ec3ffSdougm ret = SA_OK; 266549ec3ffSdougm } 267549ec3ffSdougm return (ret); 268549ec3ffSdougm } 269549ec3ffSdougm 270549ec3ffSdougm /* 271549ec3ffSdougm * remove_handle_for_root(root) 272549ec3ffSdougm * 273549ec3ffSdougm * Walks the list of handles and removes the one for this "root" from 274549ec3ffSdougm * the list. It is up to the caller to free the data. 275549ec3ffSdougm */ 276549ec3ffSdougm 277549ec3ffSdougm static void 278549ec3ffSdougm remove_handle_for_root(xmlNodePtr root) 279549ec3ffSdougm { 280549ec3ffSdougm struct doc2handle *item, *prev; 281549ec3ffSdougm 282549ec3ffSdougm (void) mutex_lock(&sa_global_lock); 283549ec3ffSdougm for (prev = NULL, item = sa_global_handles; item != NULL; 284549ec3ffSdougm item = item->next) { 285549ec3ffSdougm if (item->root == root) { 286549ec3ffSdougm /* first in the list */ 28757b448deSdougm if (prev == NULL) 288549ec3ffSdougm sa_global_handles = sa_global_handles->next; 28957b448deSdougm else 290549ec3ffSdougm prev->next = item->next; 291549ec3ffSdougm /* Item is out of the list so free the list structure */ 292549ec3ffSdougm free(item); 293549ec3ffSdougm break; 294549ec3ffSdougm } 295549ec3ffSdougm prev = item; 296549ec3ffSdougm } 297549ec3ffSdougm (void) mutex_unlock(&sa_global_lock); 298549ec3ffSdougm } 299549ec3ffSdougm 300549ec3ffSdougm /* 301549ec3ffSdougm * sa_find_group_handle(sa_group_t group) 302549ec3ffSdougm * 303549ec3ffSdougm * Find the sa_handle_t for the configuration associated with this 304549ec3ffSdougm * group. 305549ec3ffSdougm */ 306549ec3ffSdougm sa_handle_t 307549ec3ffSdougm sa_find_group_handle(sa_group_t group) 308549ec3ffSdougm { 309549ec3ffSdougm xmlNodePtr node = (xmlNodePtr)group; 310549ec3ffSdougm sa_handle_t handle; 311549ec3ffSdougm 312549ec3ffSdougm while (node != NULL) { 313549ec3ffSdougm if (strcmp((char *)(node->name), "sharecfg") == 0) { 314549ec3ffSdougm /* have the root so get the handle */ 315549ec3ffSdougm handle = (sa_handle_t)get_handle_for_root(node); 316549ec3ffSdougm return (handle); 317549ec3ffSdougm } 318549ec3ffSdougm node = node->parent; 319549ec3ffSdougm } 320549ec3ffSdougm return (NULL); 321549ec3ffSdougm } 322549ec3ffSdougm 323549ec3ffSdougm /* 3246185db85Sdougm * set_legacy_timestamp(root, path, timevalue) 3256185db85Sdougm * 3266185db85Sdougm * add the current timestamp value to the configuration for use in 3276185db85Sdougm * determining when to update the legacy files. For SMF, this 3286185db85Sdougm * property is kept in default/operation/legacy_timestamp 3296185db85Sdougm */ 3306185db85Sdougm 3316185db85Sdougm static void 3326185db85Sdougm set_legacy_timestamp(xmlNodePtr root, char *path, uint64_t tval) 3336185db85Sdougm { 3346185db85Sdougm xmlNodePtr node; 3356185db85Sdougm xmlChar *lpath = NULL; 336549ec3ffSdougm sa_handle_impl_t handle; 337549ec3ffSdougm 338549ec3ffSdougm /* Have to have a handle or else we weren't initialized. */ 339549ec3ffSdougm handle = get_handle_for_root(root); 340549ec3ffSdougm if (handle == NULL) 341549ec3ffSdougm return; 3426185db85Sdougm 3436185db85Sdougm for (node = root->xmlChildrenNode; node != NULL; 3446185db85Sdougm node = node->next) { 3456185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"legacy") == 0) { 3466185db85Sdougm /* a possible legacy node for this path */ 3476185db85Sdougm lpath = xmlGetProp(node, (xmlChar *)"path"); 34857b448deSdougm if (lpath != NULL && 34957b448deSdougm xmlStrcmp(lpath, (xmlChar *)path) == 0) { 3506185db85Sdougm xmlFree(lpath); 3516185db85Sdougm break; 3526185db85Sdougm } 3536185db85Sdougm if (lpath != NULL) 3546185db85Sdougm xmlFree(lpath); 3556185db85Sdougm } 3566185db85Sdougm } 3576185db85Sdougm if (node == NULL) { 3586185db85Sdougm /* need to create the first legacy timestamp node */ 3596185db85Sdougm node = xmlNewChild(root, NULL, (xmlChar *)"legacy", NULL); 3606185db85Sdougm } 3616185db85Sdougm if (node != NULL) { 3626185db85Sdougm char tstring[32]; 3636185db85Sdougm int ret; 3646185db85Sdougm 3656185db85Sdougm (void) snprintf(tstring, sizeof (tstring), "%lld", tval); 3666185db85Sdougm xmlSetProp(node, (xmlChar *)"timestamp", (xmlChar *)tstring); 3676185db85Sdougm xmlSetProp(node, (xmlChar *)"path", (xmlChar *)path); 3686185db85Sdougm /* now commit to SMF */ 369549ec3ffSdougm ret = sa_get_instance(handle->scfhandle, "default"); 3706185db85Sdougm if (ret == SA_OK) { 37157b448deSdougm ret = sa_start_transaction(handle->scfhandle, 37257b448deSdougm "operation"); 3736185db85Sdougm if (ret == SA_OK) { 37457b448deSdougm ret = sa_set_property(handle->scfhandle, 37557b448deSdougm "legacy-timestamp", tstring); 3766185db85Sdougm if (ret == SA_OK) { 37757b448deSdougm (void) sa_end_transaction( 37857b448deSdougm handle->scfhandle); 3796185db85Sdougm } else { 380549ec3ffSdougm sa_abort_transaction(handle->scfhandle); 3816185db85Sdougm } 3826185db85Sdougm } 3836185db85Sdougm } 3846185db85Sdougm } 3856185db85Sdougm } 3866185db85Sdougm 3876185db85Sdougm /* 3886185db85Sdougm * is_shared(share) 3896185db85Sdougm * 3906185db85Sdougm * determine if the specified share is currently shared or not. 3916185db85Sdougm */ 3926185db85Sdougm static int 3936185db85Sdougm is_shared(sa_share_t share) 3946185db85Sdougm { 3956185db85Sdougm char *shared; 3966185db85Sdougm int result = 0; /* assume not */ 3976185db85Sdougm 3986185db85Sdougm shared = sa_get_share_attr(share, "shared"); 3996185db85Sdougm if (shared != NULL) { 4006185db85Sdougm if (strcmp(shared, "true") == 0) 4016185db85Sdougm result = 1; 4026185db85Sdougm sa_free_attr_string(shared); 4036185db85Sdougm } 4046185db85Sdougm return (result); 4056185db85Sdougm } 4066185db85Sdougm 4076185db85Sdougm /* 408da6c28aaSamw * excluded_protocol(share, proto) 409da6c28aaSamw * 410da6c28aaSamw * Returns B_TRUE if the specified protocol appears in the "exclude" 411da6c28aaSamw * property. This is used to prevent sharing special case shares 412da6c28aaSamw * (e.g. subdirs when SMB wants a subdir and NFS doesn't. B_FALSE is 413da6c28aaSamw * returned if the protocol isn't in the list. 414da6c28aaSamw */ 415da6c28aaSamw static boolean_t 416da6c28aaSamw excluded_protocol(sa_share_t share, char *proto) 417da6c28aaSamw { 418da6c28aaSamw char *protolist; 419da6c28aaSamw char *str; 420da6c28aaSamw char *token; 421da6c28aaSamw 422da6c28aaSamw protolist = sa_get_share_attr(share, "exclude"); 423da6c28aaSamw if (protolist != NULL) { 424da6c28aaSamw str = protolist; 425da6c28aaSamw while ((token = strtok(str, ",")) != NULL) { 426da6c28aaSamw if (strcmp(token, proto) == 0) { 427da6c28aaSamw sa_free_attr_string(protolist); 428da6c28aaSamw return (B_TRUE); 429da6c28aaSamw } 430da6c28aaSamw str = NULL; 431da6c28aaSamw } 432da6c28aaSamw sa_free_attr_string(protolist); 433da6c28aaSamw } 434da6c28aaSamw return (B_FALSE); 435da6c28aaSamw } 436da6c28aaSamw 437da6c28aaSamw /* 438a99982a7Sdougm * checksubdirgroup(group, newpath, strictness) 439f345c0beSdougm * 440a99982a7Sdougm * check all the specified newpath against all the paths in the 441a99982a7Sdougm * group. This is a helper function for checksubdir to make it easier 442a99982a7Sdougm * to also check ZFS subgroups. 443a99982a7Sdougm * The strictness values mean: 444f345c0beSdougm * SA_CHECK_NORMAL == only check newpath against shares that are active 445f345c0beSdougm * SA_CHECK_STRICT == check newpath against both active shares and those 446f345c0beSdougm * stored in the repository 4476185db85Sdougm */ 4486185db85Sdougm static int 449a99982a7Sdougm checksubdirgroup(sa_group_t group, char *newpath, int strictness) 4506185db85Sdougm { 4516185db85Sdougm sa_share_t share; 452a99982a7Sdougm char *path; 453a99982a7Sdougm int issub = SA_OK; 454da6c28aaSamw int subdir; 455da6c28aaSamw int parent; 456da6c28aaSamw 457da6c28aaSamw if (newpath == NULL) 458da6c28aaSamw return (SA_INVALID_PATH); 4596185db85Sdougm 4606185db85Sdougm for (share = sa_get_share(group, NULL); share != NULL; 4616185db85Sdougm share = sa_get_next_share(share)) { 4626185db85Sdougm /* 4636185db85Sdougm * The original behavior of share never checked 4646185db85Sdougm * against the permanent configuration 4656185db85Sdougm * (/etc/dfs/dfstab). PIT has a number of cases where 4666185db85Sdougm * it depends on this older behavior even though it 4676185db85Sdougm * could be considered incorrect. We may tighten this 4686185db85Sdougm * up in the future. 4696185db85Sdougm */ 470f345c0beSdougm if (strictness == SA_CHECK_NORMAL && !is_shared(share)) 4716185db85Sdougm continue; 4726185db85Sdougm 4736185db85Sdougm path = sa_get_share_attr(share, "path"); 474f345c0beSdougm /* 475f345c0beSdougm * If path is NULL, then a share is in the process of 476f345c0beSdougm * construction or someone has modified the property 477a99982a7Sdougm * group inappropriately. It should be 478a99982a7Sdougm * ignored. issubdir() comes from the original share 479a99982a7Sdougm * implementation and does the difficult part of 480a99982a7Sdougm * checking subdirectories. 481f345c0beSdougm */ 482f345c0beSdougm if (path == NULL) 483f345c0beSdougm continue; 484da6c28aaSamw 485da6c28aaSamw if (strcmp(path, newpath) == 0) { 486da6c28aaSamw issub = SA_INVALID_PATH; 487da6c28aaSamw } else { 488da6c28aaSamw subdir = issubdir(newpath, path); 489da6c28aaSamw parent = issubdir(path, newpath); 490da6c28aaSamw if (subdir || parent) { 4916185db85Sdougm sa_free_attr_string(path); 4926185db85Sdougm path = NULL; 493da6c28aaSamw return (subdir ? 494da6c28aaSamw SA_PATH_IS_SUBDIR : SA_PATH_IS_PARENTDIR); 495da6c28aaSamw } 4966185db85Sdougm } 4976185db85Sdougm sa_free_attr_string(path); 4986185db85Sdougm path = NULL; 4996185db85Sdougm } 500a99982a7Sdougm return (issub); 501a99982a7Sdougm } 502a99982a7Sdougm 503a99982a7Sdougm /* 504a99982a7Sdougm * checksubdir(newpath, strictness) 505a99982a7Sdougm * 506a99982a7Sdougm * checksubdir determines if the specified path (newpath) is a 507a99982a7Sdougm * subdirectory of another share. It calls checksubdirgroup() to do 508a99982a7Sdougm * the complicated work. The strictness parameter determines how 509a99982a7Sdougm * strict a check to make against the path. The strictness values 510a99982a7Sdougm * mean: SA_CHECK_NORMAL == only check newpath against shares that are 511a99982a7Sdougm * active SA_CHECK_STRICT == check newpath against both active shares 512a99982a7Sdougm * and those * stored in the repository 513a99982a7Sdougm */ 514a99982a7Sdougm static int 515549ec3ffSdougm checksubdir(sa_handle_t handle, char *newpath, int strictness) 516a99982a7Sdougm { 517a99982a7Sdougm sa_group_t group; 518da6c28aaSamw int issub = SA_OK; 519a99982a7Sdougm char *path = NULL; 520a99982a7Sdougm 521da6c28aaSamw for (group = sa_get_group(handle, NULL); 522da6c28aaSamw group != NULL && issub == SA_OK; 523da6c28aaSamw group = sa_get_next_group(group)) { 524a99982a7Sdougm if (sa_group_is_zfs(group)) { 525a99982a7Sdougm sa_group_t subgroup; 526a99982a7Sdougm for (subgroup = sa_get_sub_group(group); 527da6c28aaSamw subgroup != NULL && issub == SA_OK; 528a99982a7Sdougm subgroup = sa_get_next_group(subgroup)) 52957b448deSdougm issub = checksubdirgroup(subgroup, newpath, 53057b448deSdougm strictness); 531a99982a7Sdougm } else { 532a99982a7Sdougm issub = checksubdirgroup(group, newpath, strictness); 533a99982a7Sdougm } 5346185db85Sdougm } 5356185db85Sdougm if (path != NULL) 5366185db85Sdougm sa_free_attr_string(path); 5376185db85Sdougm return (issub); 5386185db85Sdougm } 5396185db85Sdougm 5406185db85Sdougm /* 541f345c0beSdougm * validpath(path, strictness) 5426185db85Sdougm * determine if the provided path is valid for a share. It shouldn't 5436185db85Sdougm * be a sub-dir of an already shared path or the parent directory of a 5446185db85Sdougm * share path. 5456185db85Sdougm */ 5466185db85Sdougm static int 547549ec3ffSdougm validpath(sa_handle_t handle, char *path, int strictness) 5486185db85Sdougm { 5496185db85Sdougm int error = SA_OK; 5506185db85Sdougm struct stat st; 5516185db85Sdougm sa_share_t share; 5526185db85Sdougm char *fstype; 5536185db85Sdougm 55457b448deSdougm if (*path != '/') 5556185db85Sdougm return (SA_BAD_PATH); 55657b448deSdougm 5576185db85Sdougm if (stat(path, &st) < 0) { 5586185db85Sdougm error = SA_NO_SUCH_PATH; 5596185db85Sdougm } else { 560549ec3ffSdougm share = sa_find_share(handle, path); 56157b448deSdougm if (share != NULL) 5626185db85Sdougm error = SA_DUPLICATE_NAME; 56357b448deSdougm 5646185db85Sdougm if (error == SA_OK) { 5656185db85Sdougm /* 56657b448deSdougm * check for special case with file system 56757b448deSdougm * that might have restrictions. For now, ZFS 56857b448deSdougm * is the only case since it has its own idea 56957b448deSdougm * of how to configure shares. We do this 57057b448deSdougm * before subdir checking since things like 57157b448deSdougm * ZFS will do that for us. This should also 57257b448deSdougm * be done via plugin interface. 5736185db85Sdougm */ 5746185db85Sdougm fstype = sa_fstype(path); 5756185db85Sdougm if (fstype != NULL && strcmp(fstype, "zfs") == 0) { 576549ec3ffSdougm if (sa_zfs_is_shared(handle, path)) 577a99982a7Sdougm error = SA_INVALID_NAME; 5786185db85Sdougm } 5796185db85Sdougm if (fstype != NULL) 5806185db85Sdougm sa_free_fstype(fstype); 5816185db85Sdougm } 58257b448deSdougm if (error == SA_OK) 583549ec3ffSdougm error = checksubdir(handle, path, strictness); 5846185db85Sdougm } 5856185db85Sdougm return (error); 5866185db85Sdougm } 5876185db85Sdougm 5886185db85Sdougm /* 5896185db85Sdougm * check to see if group/share is persistent. 590da6c28aaSamw * 591da6c28aaSamw * "group" can be either an sa_group_t or an sa_share_t. (void *) 592da6c28aaSamw * works since both thse types are also void *. 5936185db85Sdougm */ 594da6c28aaSamw int 595da6c28aaSamw sa_is_persistent(void *group) 5966185db85Sdougm { 5976185db85Sdougm char *type; 5986185db85Sdougm int persist = 1; 5996185db85Sdougm 600da6c28aaSamw type = sa_get_group_attr((sa_group_t)group, "type"); 6016185db85Sdougm if (type != NULL && strcmp(type, "transient") == 0) 6026185db85Sdougm persist = 0; 6036185db85Sdougm if (type != NULL) 6046185db85Sdougm sa_free_attr_string(type); 6056185db85Sdougm return (persist); 6066185db85Sdougm } 6076185db85Sdougm 6086185db85Sdougm /* 6096185db85Sdougm * sa_valid_group_name(name) 6106185db85Sdougm * 6116185db85Sdougm * check that the "name" contains only valid characters and otherwise 6126185db85Sdougm * fits the required naming conventions. Valid names must start with 6136185db85Sdougm * an alphabetic and the remainder may consist of only alphanumeric 6146185db85Sdougm * plus the '-' and '_' characters. This name limitation comes from 6156185db85Sdougm * inherent limitations in SMF. 6166185db85Sdougm */ 6176185db85Sdougm 6186185db85Sdougm int 6196185db85Sdougm sa_valid_group_name(char *name) 6206185db85Sdougm { 6216185db85Sdougm int ret = 1; 6226185db85Sdougm ssize_t len; 6236185db85Sdougm 6246185db85Sdougm if (name != NULL && isalpha(*name)) { 6256185db85Sdougm char c; 6266185db85Sdougm len = strlen(name); 6276185db85Sdougm if (len < (scf_max_name_len - sizeof ("group:"))) { 6286185db85Sdougm for (c = *name++; c != '\0' && ret != 0; c = *name++) { 6296185db85Sdougm if (!isalnum(c) && c != '-' && c != '_') 6306185db85Sdougm ret = 0; 6316185db85Sdougm } 6326185db85Sdougm } else { 6336185db85Sdougm ret = 0; 6346185db85Sdougm } 6356185db85Sdougm } else { 6366185db85Sdougm ret = 0; 6376185db85Sdougm } 6386185db85Sdougm return (ret); 6396185db85Sdougm } 6406185db85Sdougm 6416185db85Sdougm 6426185db85Sdougm /* 6436185db85Sdougm * is_zfs_group(group) 6446185db85Sdougm * Determine if the specified group is a ZFS sharenfs group 6456185db85Sdougm */ 6466185db85Sdougm static int 6476185db85Sdougm is_zfs_group(sa_group_t group) 6486185db85Sdougm { 6496185db85Sdougm int ret = 0; 6506185db85Sdougm xmlNodePtr parent; 6516185db85Sdougm xmlChar *zfs; 6526185db85Sdougm 65357b448deSdougm if (strcmp((char *)((xmlNodePtr)group)->name, "share") == 0) 6546185db85Sdougm parent = (xmlNodePtr)sa_get_parent_group(group); 65557b448deSdougm else 6566185db85Sdougm parent = (xmlNodePtr)group; 6576185db85Sdougm zfs = xmlGetProp(parent, (xmlChar *)"zfs"); 6586185db85Sdougm if (zfs != NULL) { 6596185db85Sdougm xmlFree(zfs); 6606185db85Sdougm ret = 1; 6616185db85Sdougm } 6626185db85Sdougm return (ret); 6636185db85Sdougm } 6646185db85Sdougm 6656185db85Sdougm /* 666da6c28aaSamw * sa_get_object_type(object) 667da6c28aaSamw * 668da6c28aaSamw * This function returns a numeric value representing the object 669da6c28aaSamw * type. This allows using simpler checks when doing type specific 670da6c28aaSamw * operations. 671da6c28aaSamw */ 672da6c28aaSamw 673da6c28aaSamw static int 674da6c28aaSamw sa_get_object_type(void *object) 675da6c28aaSamw { 676da6c28aaSamw xmlNodePtr node = (xmlNodePtr)object; 677da6c28aaSamw int type; 678da6c28aaSamw 679da6c28aaSamw if (xmlStrcmp(node->name, (xmlChar *)"group") == 0) 680da6c28aaSamw type = SA_TYPE_GROUP; 681da6c28aaSamw else if (xmlStrcmp(node->name, (xmlChar *)"share") == 0) 682da6c28aaSamw type = SA_TYPE_SHARE; 683da6c28aaSamw else if (xmlStrcmp(node->name, (xmlChar *)"resource") == 0) 684da6c28aaSamw type = SA_TYPE_RESOURCE; 685da6c28aaSamw else if (xmlStrcmp(node->name, (xmlChar *)"optionset") == 0) 686da6c28aaSamw type = SA_TYPE_OPTIONSET; 687da6c28aaSamw else if (xmlStrcmp(node->name, (xmlChar *)"security") == 0) 688da6c28aaSamw type = SA_TYPE_ALTSPACE; 689da6c28aaSamw else 690da6c28aaSamw assert(0); 691da6c28aaSamw return (type); 692da6c28aaSamw } 693da6c28aaSamw 694da6c28aaSamw /* 6956185db85Sdougm * sa_optionset_name(optionset, oname, len, id) 6966185db85Sdougm * return the SMF name for the optionset. If id is not NULL, it 6976185db85Sdougm * will have the GUID value for a share and should be used 6986185db85Sdougm * instead of the keyword "optionset" which is used for 6996185db85Sdougm * groups. If the optionset doesn't have a protocol type 7006185db85Sdougm * associated with it, "default" is used. This shouldn't happen 7016185db85Sdougm * at this point but may be desirable in the future if there are 7026185db85Sdougm * protocol independent properties added. The name is returned in 7036185db85Sdougm * oname. 7046185db85Sdougm */ 7056185db85Sdougm 7066185db85Sdougm static int 7076185db85Sdougm sa_optionset_name(sa_optionset_t optionset, char *oname, size_t len, char *id) 7086185db85Sdougm { 7096185db85Sdougm char *proto; 710da6c28aaSamw void *parent; 711da6c28aaSamw int ptype; 7126185db85Sdougm 7136185db85Sdougm if (id == NULL) 7146185db85Sdougm id = "optionset"; 7156185db85Sdougm 716da6c28aaSamw parent = sa_get_optionset_parent(optionset); 717da6c28aaSamw if (parent != NULL) { 718da6c28aaSamw ptype = sa_get_object_type(parent); 7196185db85Sdougm proto = sa_get_optionset_attr(optionset, "type"); 720da6c28aaSamw if (ptype != SA_TYPE_RESOURCE) { 721da6c28aaSamw len = snprintf(oname, len, "%s_%s", id, 722da6c28aaSamw proto ? proto : "default"); 723da6c28aaSamw } else { 724da6c28aaSamw char *index; 725da6c28aaSamw index = get_node_attr((void *)parent, "id"); 726da6c28aaSamw if (index != NULL) 727da6c28aaSamw len = snprintf(oname, len, "%s_%s_%s", id, 728da6c28aaSamw proto ? proto : "default", index); 729da6c28aaSamw else 730da6c28aaSamw len = 0; 731da6c28aaSamw } 7326185db85Sdougm 7336185db85Sdougm if (proto != NULL) 7346185db85Sdougm sa_free_attr_string(proto); 735da6c28aaSamw } else { 736da6c28aaSamw len = 0; 737da6c28aaSamw } 7386185db85Sdougm return (len); 7396185db85Sdougm } 7406185db85Sdougm 7416185db85Sdougm /* 7426185db85Sdougm * sa_security_name(optionset, oname, len, id) 7436185db85Sdougm * 7446185db85Sdougm * return the SMF name for the security. If id is not NULL, it will 7456185db85Sdougm * have the GUID value for a share and should be used instead of the 7466185db85Sdougm * keyword "optionset" which is used for groups. If the optionset 7476185db85Sdougm * doesn't have a protocol type associated with it, "default" is 7486185db85Sdougm * used. This shouldn't happen at this point but may be desirable in 7496185db85Sdougm * the future if there are protocol independent properties added. The 7506185db85Sdougm * name is returned in oname. The security type is also encoded into 7516185db85Sdougm * the name. In the future, this wil *be handled a bit differently. 7526185db85Sdougm */ 7536185db85Sdougm 7546185db85Sdougm static int 7556185db85Sdougm sa_security_name(sa_security_t security, char *oname, size_t len, char *id) 7566185db85Sdougm { 7576185db85Sdougm char *proto; 7586185db85Sdougm char *sectype; 7596185db85Sdougm 7606185db85Sdougm if (id == NULL) 7616185db85Sdougm id = "optionset"; 7626185db85Sdougm 7636185db85Sdougm proto = sa_get_security_attr(security, "type"); 7646185db85Sdougm sectype = sa_get_security_attr(security, "sectype"); 76557b448deSdougm len = snprintf(oname, len, "%s_%s_%s", id, proto ? proto : "default", 7666185db85Sdougm sectype ? sectype : "default"); 7676185db85Sdougm if (proto != NULL) 7686185db85Sdougm sa_free_attr_string(proto); 7696185db85Sdougm if (sectype != NULL) 7706185db85Sdougm sa_free_attr_string(sectype); 7716185db85Sdougm return (len); 7726185db85Sdougm } 7736185db85Sdougm 7746185db85Sdougm /* 77557b448deSdougm * verifydefgroupopts(handle) 77657b448deSdougm * 77757b448deSdougm * Make sure a "default" group exists and has default protocols enabled. 77857b448deSdougm */ 77957b448deSdougm static void 78057b448deSdougm verifydefgroupopts(sa_handle_t handle) 78157b448deSdougm { 78257b448deSdougm sa_group_t defgrp; 78357b448deSdougm sa_optionset_t opt; 784da6c28aaSamw 78557b448deSdougm defgrp = sa_get_group(handle, "default"); 78657b448deSdougm if (defgrp != NULL) { 78757b448deSdougm opt = sa_get_optionset(defgrp, NULL); 78857b448deSdougm /* 78957b448deSdougm * NFS is the default for default group 79057b448deSdougm */ 79157b448deSdougm if (opt == NULL) 79257b448deSdougm opt = sa_create_optionset(defgrp, "nfs"); 79357b448deSdougm } 79457b448deSdougm } 79557b448deSdougm 79657b448deSdougm /* 797f345c0beSdougm * sa_init(init_service) 7986185db85Sdougm * Initialize the API 7996185db85Sdougm * find all the shared objects 8006185db85Sdougm * init the tables with all objects 8016185db85Sdougm * read in the current configuration 8026185db85Sdougm */ 8036185db85Sdougm 80457b448deSdougm #define GETPROP(prop) scf_simple_prop_next_astring(prop) 80557b448deSdougm #define CHECKTSTAMP(st, tval) stat(SA_LEGACY_DFSTAB, &st) >= 0 && \ 80657b448deSdougm tval != TSTAMP(st.st_ctim) 80757b448deSdougm 808549ec3ffSdougm sa_handle_t 8096185db85Sdougm sa_init(int init_service) 8106185db85Sdougm { 8116185db85Sdougm struct stat st; 8126185db85Sdougm int legacy = 0; 8136185db85Sdougm uint64_t tval = 0; 814a99982a7Sdougm int lockfd; 815a99982a7Sdougm sigset_t old; 816a99982a7Sdougm int updatelegacy = B_FALSE; 817a99982a7Sdougm scf_simple_prop_t *prop; 818549ec3ffSdougm sa_handle_impl_t handle; 819549ec3ffSdougm int err; 8206185db85Sdougm 821549ec3ffSdougm handle = calloc(sizeof (struct sa_handle_impl), 1); 822549ec3ffSdougm 823549ec3ffSdougm if (handle != NULL) { 8246185db85Sdougm /* get protocol specific structures */ 8256185db85Sdougm (void) proto_plugin_init(); 8266185db85Sdougm if (init_service & SA_INIT_SHARE_API) { 8276185db85Sdougm /* 82857b448deSdougm * initialize access into libzfs. We use this 82957b448deSdougm * when collecting info about ZFS datasets and 83057b448deSdougm * shares. 8311cea05afSdougm */ 83257b448deSdougm if (sa_zfs_init(handle) == B_FALSE) { 83357b448deSdougm free(handle); 83457b448deSdougm (void) proto_plugin_fini(); 83557b448deSdougm return (NULL); 83657b448deSdougm } 8371cea05afSdougm /* 8386185db85Sdougm * since we want to use SMF, initialize an svc handle 8396185db85Sdougm * and find out what is there. 8406185db85Sdougm */ 841549ec3ffSdougm handle->scfhandle = sa_scf_init(handle); 842549ec3ffSdougm if (handle->scfhandle != NULL) { 843a99982a7Sdougm /* 844a99982a7Sdougm * Need to lock the extraction of the 845a99982a7Sdougm * configuration if the dfstab file has 846a99982a7Sdougm * changed. Lock everything now and release if 847a99982a7Sdougm * not needed. Use a file that isn't being 848a99982a7Sdougm * manipulated by other parts of the system in 849a99982a7Sdougm * order to not interfere with locking. Using 850a99982a7Sdougm * dfstab doesn't work. 851a99982a7Sdougm */ 852a99982a7Sdougm sablocksigs(&old); 853a99982a7Sdougm lockfd = open(DFS_LOCK_FILE, O_RDWR); 854a99982a7Sdougm if (lockfd >= 0) { 855a99982a7Sdougm extern int errno; 856a99982a7Sdougm errno = 0; 857a99982a7Sdougm (void) lockf(lockfd, F_LOCK, 0); 858a99982a7Sdougm /* 85957b448deSdougm * Check whether we are going to need 86057b448deSdougm * to merge any dfstab changes. This 86157b448deSdougm * is done by comparing the value of 86257b448deSdougm * legacy-timestamp with the current 86357b448deSdougm * st_ctim of the file. If they are 86457b448deSdougm * different, an update is needed and 86557b448deSdougm * the file must remain locked until 86657b448deSdougm * the merge is done in order to 86757b448deSdougm * prevent multiple startups from 86857b448deSdougm * changing the SMF repository at the 86957b448deSdougm * same time. The first to get the 87057b448deSdougm * lock will make any changes before 87157b448deSdougm * the others can read the repository. 872a99982a7Sdougm */ 87357b448deSdougm prop = scf_simple_prop_get 87457b448deSdougm (handle->scfhandle->handle, 87557b448deSdougm (const char *)SA_SVC_FMRI_BASE 87657b448deSdougm ":default", "operation", 877a99982a7Sdougm "legacy-timestamp"); 878a99982a7Sdougm if (prop != NULL) { 879a99982a7Sdougm char *i64; 88057b448deSdougm i64 = GETPROP(prop); 88157b448deSdougm if (i64 != NULL) 88257b448deSdougm tval = strtoull(i64, 88357b448deSdougm NULL, 0); 88457b448deSdougm if (CHECKTSTAMP(st, tval)) 885a99982a7Sdougm updatelegacy = B_TRUE; 88657b448deSdougm scf_simple_prop_free(prop); 887a99982a7Sdougm } else { 88857b448deSdougm /* 88957b448deSdougm * We haven't set the 89057b448deSdougm * timestamp before so do it. 89157b448deSdougm */ 892a99982a7Sdougm updatelegacy = B_TRUE; 893a99982a7Sdougm } 894a99982a7Sdougm } 895a99982a7Sdougm if (updatelegacy == B_FALSE) { 896a99982a7Sdougm /* Don't need the lock anymore */ 897a99982a7Sdougm (void) lockf(lockfd, F_ULOCK, 0); 898a99982a7Sdougm (void) close(lockfd); 899a99982a7Sdougm } 9001d1813a7Sdougm 9011d1813a7Sdougm /* 9021d1813a7Sdougm * It is essential that the document tree and 9031d1813a7Sdougm * the internal list of roots to handles be 9041d1813a7Sdougm * setup before anything that might try to 9051d1813a7Sdougm * create a new object is called. The document 9061d1813a7Sdougm * tree is the combination of handle->doc and 9071d1813a7Sdougm * handle->tree. This allows searches, 9081d1813a7Sdougm * etc. when all you have is an object in the 9091d1813a7Sdougm * tree. 9101d1813a7Sdougm */ 9111d1813a7Sdougm handle->doc = xmlNewDoc((xmlChar *)"1.0"); 91257b448deSdougm handle->tree = xmlNewNode(NULL, 91357b448deSdougm (xmlChar *)"sharecfg"); 91457b448deSdougm if (handle->doc != NULL && 91557b448deSdougm handle->tree != NULL) { 91657b448deSdougm xmlDocSetRootElement(handle->doc, 91757b448deSdougm handle->tree); 91857b448deSdougm err = add_handle_for_root(handle->tree, 91957b448deSdougm handle); 9201d1813a7Sdougm if (err == SA_OK) 92157b448deSdougm err = sa_get_config( 92257b448deSdougm handle->scfhandle, 9231d1813a7Sdougm handle->tree, handle); 9241d1813a7Sdougm } else { 9251d1813a7Sdougm if (handle->doc != NULL) 9261d1813a7Sdougm xmlFreeDoc(handle->doc); 9271d1813a7Sdougm if (handle->tree != NULL) 9281d1813a7Sdougm xmlFreeNode(handle->tree); 9291d1813a7Sdougm err = SA_NO_MEMORY; 9301d1813a7Sdougm } 9311d1813a7Sdougm 932a99982a7Sdougm saunblocksigs(&old); 933549ec3ffSdougm 934549ec3ffSdougm if (err != SA_OK) { 935549ec3ffSdougm /* 9361d1813a7Sdougm * If we couldn't add the tree handle 9371d1813a7Sdougm * to the list, then things are going 9381d1813a7Sdougm * to fail badly. Might as well undo 9391d1813a7Sdougm * everything now and fail the 9401d1813a7Sdougm * sa_init(). 941549ec3ffSdougm */ 942549ec3ffSdougm sa_fini(handle); 943549ec3ffSdougm return (NULL); 944549ec3ffSdougm } 945549ec3ffSdougm 9466185db85Sdougm if (tval == 0) { 94757b448deSdougm /* 94857b448deSdougm * first time so make sure 94957b448deSdougm * default is setup 95057b448deSdougm */ 95157b448deSdougm verifydefgroupopts(handle); 9526185db85Sdougm } 9531d1813a7Sdougm 954a99982a7Sdougm if (updatelegacy == B_TRUE) { 955a99982a7Sdougm sablocksigs(&old); 956549ec3ffSdougm getlegacyconfig((sa_handle_t)handle, 957549ec3ffSdougm SA_LEGACY_DFSTAB, &handle->tree); 9586185db85Sdougm if (stat(SA_LEGACY_DFSTAB, &st) >= 0) 959546405c3Sdougm set_legacy_timestamp( 960546405c3Sdougm handle->tree, 9616185db85Sdougm SA_LEGACY_DFSTAB, 9626185db85Sdougm TSTAMP(st.st_ctim)); 963a99982a7Sdougm saunblocksigs(&old); 964546405c3Sdougm /* 965546405c3Sdougm * Safe to unlock now to allow 966546405c3Sdougm * others to run 967546405c3Sdougm */ 968a99982a7Sdougm (void) lockf(lockfd, F_ULOCK, 0); 969a99982a7Sdougm (void) close(lockfd); 9706185db85Sdougm } 971549ec3ffSdougm legacy |= sa_get_zfs_shares(handle, "zfs"); 972549ec3ffSdougm legacy |= gettransients(handle, &handle->tree); 9736185db85Sdougm } 9746185db85Sdougm } 9756185db85Sdougm } 976549ec3ffSdougm return ((sa_handle_t)handle); 9776185db85Sdougm } 9786185db85Sdougm 9796185db85Sdougm /* 980549ec3ffSdougm * sa_fini(handle) 9816185db85Sdougm * Uninitialize the API structures including the configuration 9821cea05afSdougm * data structures and ZFS related data. 9836185db85Sdougm */ 9846185db85Sdougm 9856185db85Sdougm void 986549ec3ffSdougm sa_fini(sa_handle_t handle) 9876185db85Sdougm { 988549ec3ffSdougm sa_handle_impl_t impl_handle = (sa_handle_impl_t)handle; 989549ec3ffSdougm 990549ec3ffSdougm if (impl_handle != NULL) { 991549ec3ffSdougm /* 992549ec3ffSdougm * Free the config trees and any other data structures 993549ec3ffSdougm * used in the handle. 994549ec3ffSdougm */ 995549ec3ffSdougm if (impl_handle->doc != NULL) 996549ec3ffSdougm xmlFreeDoc(impl_handle->doc); 997549ec3ffSdougm sa_scf_fini(impl_handle->scfhandle); 998549ec3ffSdougm sa_zfs_fini(impl_handle); 999549ec3ffSdougm 1000549ec3ffSdougm /* Remove and free the entry in the global list. */ 1001549ec3ffSdougm remove_handle_for_root(impl_handle->tree); 1002549ec3ffSdougm 1003549ec3ffSdougm /* Make sure we free the handle */ 1004549ec3ffSdougm free(impl_handle); 1005549ec3ffSdougm 1006549ec3ffSdougm /* 1007549ec3ffSdougm * If this was the last handle to release, unload the 1008549ec3ffSdougm * plugins that were loaded. 1009549ec3ffSdougm */ 1010549ec3ffSdougm if (sa_global_handles == NULL) 1011549ec3ffSdougm (void) proto_plugin_fini(); 1012549ec3ffSdougm 10136185db85Sdougm } 10146185db85Sdougm } 10156185db85Sdougm 10166185db85Sdougm /* 10176185db85Sdougm * sa_get_protocols(char **protocol) 10186185db85Sdougm * Get array of protocols that are supported 10196185db85Sdougm * Returns pointer to an allocated and NULL terminated 10206185db85Sdougm * array of strings. Caller must free. 10216185db85Sdougm * This really should be determined dynamically. 10226185db85Sdougm * If there aren't any defined, return -1. 10236185db85Sdougm * Use free() to return memory. 10246185db85Sdougm */ 10256185db85Sdougm 10266185db85Sdougm int 10276185db85Sdougm sa_get_protocols(char ***protocols) 10286185db85Sdougm { 10296185db85Sdougm int numproto = -1; 10306185db85Sdougm 10316185db85Sdougm if (protocols != NULL) { 10326185db85Sdougm struct sa_proto_plugin *plug; 10336185db85Sdougm for (numproto = 0, plug = sap_proto_list; plug != NULL; 10346185db85Sdougm plug = plug->plugin_next) { 10356185db85Sdougm numproto++; 10366185db85Sdougm } 10376185db85Sdougm 10386185db85Sdougm *protocols = calloc(numproto + 1, sizeof (char *)); 10396185db85Sdougm if (*protocols != NULL) { 10406185db85Sdougm int ret = 0; 10416185db85Sdougm for (plug = sap_proto_list; plug != NULL; 10426185db85Sdougm plug = plug->plugin_next) { 10436185db85Sdougm /* faking for now */ 104457b448deSdougm (*protocols)[ret++] = 104557b448deSdougm plug->plugin_ops->sa_protocol; 10466185db85Sdougm } 10476185db85Sdougm } else { 10486185db85Sdougm numproto = -1; 10496185db85Sdougm } 10506185db85Sdougm } 10516185db85Sdougm return (numproto); 10526185db85Sdougm } 10536185db85Sdougm 10546185db85Sdougm /* 10556185db85Sdougm * find_group_by_name(node, group) 10566185db85Sdougm * 10576185db85Sdougm * search the XML document subtree specified by node to find the group 10586185db85Sdougm * specified by group. Searching subtree allows subgroups to be 10596185db85Sdougm * searched for. 10606185db85Sdougm */ 10616185db85Sdougm 10626185db85Sdougm static xmlNodePtr 10636185db85Sdougm find_group_by_name(xmlNodePtr node, xmlChar *group) 10646185db85Sdougm { 10656185db85Sdougm xmlChar *name = NULL; 10666185db85Sdougm 10676185db85Sdougm for (node = node->xmlChildrenNode; node != NULL; 10686185db85Sdougm node = node->next) { 10696185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"group") == 0) { 10706185db85Sdougm /* if no groupname, return the first found */ 10716185db85Sdougm if (group == NULL) 10726185db85Sdougm break; 10736185db85Sdougm name = xmlGetProp(node, (xmlChar *)"name"); 107457b448deSdougm if (name != NULL && xmlStrcmp(name, group) == 0) 10756185db85Sdougm break; 10766185db85Sdougm if (name != NULL) { 10776185db85Sdougm xmlFree(name); 10786185db85Sdougm name = NULL; 10796185db85Sdougm } 10806185db85Sdougm } 10816185db85Sdougm } 10826185db85Sdougm if (name != NULL) 10836185db85Sdougm xmlFree(name); 10846185db85Sdougm return (node); 10856185db85Sdougm } 10866185db85Sdougm 10876185db85Sdougm /* 10886185db85Sdougm * sa_get_group(groupname) 10896185db85Sdougm * Return the "group" specified. If groupname is NULL, 10906185db85Sdougm * return the first group of the list of groups. 10916185db85Sdougm */ 10926185db85Sdougm sa_group_t 1093549ec3ffSdougm sa_get_group(sa_handle_t handle, char *groupname) 10946185db85Sdougm { 10956185db85Sdougm xmlNodePtr node = NULL; 10966185db85Sdougm char *subgroup = NULL; 10976185db85Sdougm char *group = NULL; 1098549ec3ffSdougm sa_handle_impl_t impl_handle = (sa_handle_impl_t)handle; 10996185db85Sdougm 1100549ec3ffSdougm if (impl_handle != NULL && impl_handle->tree != NULL) { 11016185db85Sdougm if (groupname != NULL) { 11026185db85Sdougm group = strdup(groupname); 1103a3351425Sdougm if (group != NULL) { 11046185db85Sdougm subgroup = strchr(group, '/'); 11056185db85Sdougm if (subgroup != NULL) 11066185db85Sdougm *subgroup++ = '\0'; 11076185db85Sdougm } 1108a3351425Sdougm } 1109a3351425Sdougm /* 1110a3351425Sdougm * We want to find the, possibly, named group. If 1111a3351425Sdougm * group is not NULL, then lookup the name. If it is 1112a3351425Sdougm * NULL, we only do the find if groupname is also 1113a3351425Sdougm * NULL. This allows lookup of the "first" group in 1114a3351425Sdougm * the internal list. 1115a3351425Sdougm */ 1116a3351425Sdougm if (group != NULL || groupname == NULL) 1117a3351425Sdougm node = find_group_by_name(impl_handle->tree, 1118a3351425Sdougm (xmlChar *)group); 1119a3351425Sdougm 11206185db85Sdougm /* if a subgroup, find it before returning */ 112157b448deSdougm if (subgroup != NULL && node != NULL) 11226185db85Sdougm node = find_group_by_name(node, (xmlChar *)subgroup); 11236185db85Sdougm } 11246185db85Sdougm if (node != NULL && (char *)group != NULL) 1125549ec3ffSdougm (void) sa_get_instance(impl_handle->scfhandle, (char *)group); 11266185db85Sdougm if (group != NULL) 11276185db85Sdougm free(group); 11286185db85Sdougm return ((sa_group_t)(node)); 11296185db85Sdougm } 11306185db85Sdougm 11316185db85Sdougm /* 11326185db85Sdougm * sa_get_next_group(group) 11336185db85Sdougm * Return the "next" group after the specified group from 11346185db85Sdougm * the internal group list. NULL if there are no more. 11356185db85Sdougm */ 11366185db85Sdougm sa_group_t 11376185db85Sdougm sa_get_next_group(sa_group_t group) 11386185db85Sdougm { 11396185db85Sdougm xmlNodePtr ngroup = NULL; 11406185db85Sdougm if (group != NULL) { 11416185db85Sdougm for (ngroup = ((xmlNodePtr)group)->next; ngroup != NULL; 11426185db85Sdougm ngroup = ngroup->next) { 11436185db85Sdougm if (xmlStrcmp(ngroup->name, (xmlChar *)"group") == 0) 11446185db85Sdougm break; 11456185db85Sdougm } 11466185db85Sdougm } 11476185db85Sdougm return ((sa_group_t)ngroup); 11486185db85Sdougm } 11496185db85Sdougm 11506185db85Sdougm /* 11516185db85Sdougm * sa_get_share(group, sharepath) 11526185db85Sdougm * Return the share object for the share specified. The share 11536185db85Sdougm * must be in the specified group. Return NULL if not found. 11546185db85Sdougm */ 11556185db85Sdougm sa_share_t 11566185db85Sdougm sa_get_share(sa_group_t group, char *sharepath) 11576185db85Sdougm { 11586185db85Sdougm xmlNodePtr node = NULL; 11596185db85Sdougm xmlChar *path; 11606185db85Sdougm 11616185db85Sdougm /* 11626185db85Sdougm * For future scalability, this should end up building a cache 11636185db85Sdougm * since it will get called regularly by the mountd and info 11646185db85Sdougm * services. 11656185db85Sdougm */ 11666185db85Sdougm if (group != NULL) { 11676185db85Sdougm for (node = ((xmlNodePtr)group)->children; node != NULL; 11686185db85Sdougm node = node->next) { 11696185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"share") == 0) { 11706185db85Sdougm if (sharepath == NULL) { 11716185db85Sdougm break; 11726185db85Sdougm } else { 11736185db85Sdougm /* is it the correct share? */ 117457b448deSdougm path = xmlGetProp(node, 117557b448deSdougm (xmlChar *)"path"); 11766185db85Sdougm if (path != NULL && 117757b448deSdougm xmlStrcmp(path, 117857b448deSdougm (xmlChar *)sharepath) == 0) { 11796185db85Sdougm xmlFree(path); 11806185db85Sdougm break; 11816185db85Sdougm } 11826185db85Sdougm xmlFree(path); 11836185db85Sdougm } 11846185db85Sdougm } 11856185db85Sdougm } 11866185db85Sdougm } 11876185db85Sdougm return ((sa_share_t)node); 11886185db85Sdougm } 11896185db85Sdougm 11906185db85Sdougm /* 11916185db85Sdougm * sa_get_next_share(share) 11926185db85Sdougm * Return the next share following the specified share 11936185db85Sdougm * from the internal list of shares. Returns NULL if there 11946185db85Sdougm * are no more shares. The list is relative to the same 11956185db85Sdougm * group. 11966185db85Sdougm */ 11976185db85Sdougm sa_share_t 11986185db85Sdougm sa_get_next_share(sa_share_t share) 11996185db85Sdougm { 12006185db85Sdougm xmlNodePtr node = NULL; 12016185db85Sdougm 12026185db85Sdougm if (share != NULL) { 12036185db85Sdougm for (node = ((xmlNodePtr)share)->next; node != NULL; 12046185db85Sdougm node = node->next) { 12056185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"share") == 0) { 12066185db85Sdougm break; 12076185db85Sdougm } 12086185db85Sdougm } 12096185db85Sdougm } 12106185db85Sdougm return ((sa_share_t)node); 12116185db85Sdougm } 12126185db85Sdougm 12136185db85Sdougm /* 12146185db85Sdougm * _sa_get_child_node(node, type) 12156185db85Sdougm * 12166185db85Sdougm * find the child node of the specified node that has "type". This is 12176185db85Sdougm * used to implement several internal functions. 12186185db85Sdougm */ 12196185db85Sdougm 12206185db85Sdougm static xmlNodePtr 12216185db85Sdougm _sa_get_child_node(xmlNodePtr node, xmlChar *type) 12226185db85Sdougm { 12236185db85Sdougm xmlNodePtr child; 12246185db85Sdougm for (child = node->xmlChildrenNode; child != NULL; 12256185db85Sdougm child = child->next) 12266185db85Sdougm if (xmlStrcmp(child->name, type) == 0) 12276185db85Sdougm return (child); 12286185db85Sdougm return ((xmlNodePtr)NULL); 12296185db85Sdougm } 12306185db85Sdougm 12316185db85Sdougm /* 12326185db85Sdougm * find_share(group, path) 12336185db85Sdougm * 12346185db85Sdougm * Search all the shares in the specified group for one that has the 12356185db85Sdougm * specified path. 12366185db85Sdougm */ 12376185db85Sdougm 12386185db85Sdougm static sa_share_t 12396185db85Sdougm find_share(sa_group_t group, char *sharepath) 12406185db85Sdougm { 12416185db85Sdougm sa_share_t share; 12426185db85Sdougm char *path; 12436185db85Sdougm 12446185db85Sdougm for (share = sa_get_share(group, NULL); share != NULL; 12456185db85Sdougm share = sa_get_next_share(share)) { 12466185db85Sdougm path = sa_get_share_attr(share, "path"); 12476185db85Sdougm if (path != NULL && strcmp(path, sharepath) == 0) { 12486185db85Sdougm sa_free_attr_string(path); 12496185db85Sdougm break; 12506185db85Sdougm } 12516185db85Sdougm if (path != NULL) 12526185db85Sdougm sa_free_attr_string(path); 12536185db85Sdougm } 12546185db85Sdougm return (share); 12556185db85Sdougm } 12566185db85Sdougm 12576185db85Sdougm /* 12586185db85Sdougm * sa_get_sub_group(group) 12596185db85Sdougm * 12606185db85Sdougm * Get the first sub-group of group. The sa_get_next_group() function 12616185db85Sdougm * can be used to get the rest. This is currently only used for ZFS 12626185db85Sdougm * sub-groups but could be used to implement a more general mechanism. 12636185db85Sdougm */ 12646185db85Sdougm 12656185db85Sdougm sa_group_t 12666185db85Sdougm sa_get_sub_group(sa_group_t group) 12676185db85Sdougm { 12686185db85Sdougm return ((sa_group_t)_sa_get_child_node((xmlNodePtr)group, 12696185db85Sdougm (xmlChar *)"group")); 12706185db85Sdougm } 12716185db85Sdougm 12726185db85Sdougm /* 12736185db85Sdougm * sa_find_share(sharepath) 12746185db85Sdougm * Finds a share regardless of group. In the future, this 12756185db85Sdougm * function should utilize a cache and hash table of some kind. 12766185db85Sdougm * The current assumption is that a path will only be shared 12776185db85Sdougm * once. In the future, this may change as implementation of 12786185db85Sdougm * resource names comes into being. 12796185db85Sdougm */ 12806185db85Sdougm sa_share_t 1281549ec3ffSdougm sa_find_share(sa_handle_t handle, char *sharepath) 12826185db85Sdougm { 12836185db85Sdougm sa_group_t group; 12846185db85Sdougm sa_group_t zgroup; 12856185db85Sdougm sa_share_t share = NULL; 12866185db85Sdougm int done = 0; 12876185db85Sdougm 1288549ec3ffSdougm for (group = sa_get_group(handle, NULL); group != NULL && !done; 12896185db85Sdougm group = sa_get_next_group(group)) { 12906185db85Sdougm if (is_zfs_group(group)) { 129157b448deSdougm for (zgroup = 129257b448deSdougm (sa_group_t)_sa_get_child_node((xmlNodePtr)group, 12936185db85Sdougm (xmlChar *)"group"); 129457b448deSdougm zgroup != NULL; 129557b448deSdougm zgroup = sa_get_next_group(zgroup)) { 12966185db85Sdougm share = find_share(zgroup, sharepath); 12976185db85Sdougm if (share != NULL) 12986185db85Sdougm break; 12996185db85Sdougm } 13006185db85Sdougm } else { 13016185db85Sdougm share = find_share(group, sharepath); 13026185db85Sdougm } 13036185db85Sdougm if (share != NULL) 13046185db85Sdougm break; 13056185db85Sdougm } 13066185db85Sdougm return (share); 13076185db85Sdougm } 13086185db85Sdougm 13096185db85Sdougm /* 1310f345c0beSdougm * sa_check_path(group, path, strictness) 13116185db85Sdougm * 1312da6c28aaSamw * Check that path is a valid path relative to the group. Currently, 13136185db85Sdougm * we are ignoring the group and checking only the NFS rules. Later, 13146185db85Sdougm * we may want to use the group to then check against the protocols 1315f345c0beSdougm * enabled on the group. The strictness values mean: 1316f345c0beSdougm * SA_CHECK_NORMAL == only check newpath against shares that are active 1317f345c0beSdougm * SA_CHECK_STRICT == check newpath against both active shares and those 1318f345c0beSdougm * stored in the repository 13196185db85Sdougm */ 13206185db85Sdougm 13216185db85Sdougm int 1322f345c0beSdougm sa_check_path(sa_group_t group, char *path, int strictness) 13236185db85Sdougm { 1324549ec3ffSdougm sa_handle_t handle; 1325549ec3ffSdougm 1326549ec3ffSdougm handle = sa_find_group_handle(group); 1327549ec3ffSdougm return (validpath(handle, path, strictness)); 13286185db85Sdougm } 13296185db85Sdougm 13306185db85Sdougm /* 1331da6c28aaSamw * mark_excluded_protos(group, share, flags) 13326185db85Sdougm * 1333da6c28aaSamw * Walk through all the protocols enabled for the group and check to 1334da6c28aaSamw * see if the share has any of them should be in the exclude list 1335da6c28aaSamw * based on the featureset of the protocol. If there are any, add the 1336da6c28aaSamw * "exclude" property to the share. 1337da6c28aaSamw */ 1338da6c28aaSamw static void 1339da6c28aaSamw mark_excluded_protos(sa_group_t group, xmlNodePtr share, uint64_t flags) 1340da6c28aaSamw { 1341da6c28aaSamw sa_optionset_t optionset; 1342da6c28aaSamw char exclude_list[SA_STRSIZE]; 1343da6c28aaSamw char *sep = ""; 1344da6c28aaSamw 1345da6c28aaSamw exclude_list[0] = '\0'; 1346da6c28aaSamw for (optionset = sa_get_optionset(group, NULL); 1347da6c28aaSamw optionset != NULL; 1348da6c28aaSamw optionset = sa_get_next_optionset(optionset)) { 1349da6c28aaSamw char *value; 1350da6c28aaSamw uint64_t features; 1351da6c28aaSamw value = sa_get_optionset_attr(optionset, "type"); 1352da6c28aaSamw if (value == NULL) 1353da6c28aaSamw continue; 1354da6c28aaSamw features = sa_proto_get_featureset(value); 1355da6c28aaSamw sa_free_attr_string(value); 1356da6c28aaSamw if (!(features & flags)) { 1357da6c28aaSamw (void) strlcat(exclude_list, sep, 1358da6c28aaSamw sizeof (exclude_list)); 1359da6c28aaSamw (void) strlcat(exclude_list, value, 1360da6c28aaSamw sizeof (exclude_list)); 1361da6c28aaSamw sep = ","; 1362da6c28aaSamw } 1363da6c28aaSamw } 1364da6c28aaSamw if (exclude_list[0] != '\0') 1365da6c28aaSamw xmlSetProp(share, (xmlChar *)"exclude", 1366da6c28aaSamw (xmlChar *)exclude_list); 1367da6c28aaSamw } 1368da6c28aaSamw 1369da6c28aaSamw /* 1370da6c28aaSamw * get_all_features(group) 1371da6c28aaSamw * 1372da6c28aaSamw * Walk through all the protocols on the group and collect all 1373da6c28aaSamw * possible enabled features. This is the OR of all the featuresets. 1374da6c28aaSamw */ 1375da6c28aaSamw static uint64_t 1376da6c28aaSamw get_all_features(sa_group_t group) 1377da6c28aaSamw { 1378da6c28aaSamw sa_optionset_t optionset; 1379da6c28aaSamw uint64_t features = 0; 1380da6c28aaSamw 1381da6c28aaSamw for (optionset = sa_get_optionset(group, NULL); 1382da6c28aaSamw optionset != NULL; 1383da6c28aaSamw optionset = sa_get_next_optionset(optionset)) { 1384da6c28aaSamw char *value; 1385da6c28aaSamw value = sa_get_optionset_attr(optionset, "type"); 1386da6c28aaSamw if (value == NULL) 1387da6c28aaSamw continue; 1388da6c28aaSamw features |= sa_proto_get_featureset(value); 1389da6c28aaSamw sa_free_attr_string(value); 1390da6c28aaSamw } 1391da6c28aaSamw return (features); 1392da6c28aaSamw } 1393da6c28aaSamw 1394da6c28aaSamw 1395da6c28aaSamw /* 1396da6c28aaSamw * _sa_add_share(group, sharepath, persist, *error, flags) 1397da6c28aaSamw * 1398da6c28aaSamw * Common code for all types of add_share. sa_add_share() is the 13996185db85Sdougm * public API, we also need to be able to do this when parsing legacy 14006185db85Sdougm * files and construction of the internal configuration while 1401da6c28aaSamw * extracting config info from SMF. "flags" indicates if some 1402da6c28aaSamw * protocols need relaxed rules while other don't. These values are 1403da6c28aaSamw * the featureset values defined in libshare.h. 14046185db85Sdougm */ 14056185db85Sdougm 14066185db85Sdougm sa_share_t 1407da6c28aaSamw _sa_add_share(sa_group_t group, char *sharepath, int persist, int *error, 1408da6c28aaSamw uint64_t flags) 14096185db85Sdougm { 14106185db85Sdougm xmlNodePtr node = NULL; 14116185db85Sdougm int err; 14126185db85Sdougm 14136185db85Sdougm err = SA_OK; /* assume success */ 14146185db85Sdougm 141557b448deSdougm node = xmlNewChild((xmlNodePtr)group, NULL, (xmlChar *)"share", NULL); 1416da6c28aaSamw if (node == NULL) { 1417da6c28aaSamw if (error != NULL) 1418da6c28aaSamw *error = SA_NO_MEMORY; 1419da6c28aaSamw return (node); 1420da6c28aaSamw } 1421da6c28aaSamw 14226185db85Sdougm xmlSetProp(node, (xmlChar *)"path", (xmlChar *)sharepath); 142357b448deSdougm xmlSetProp(node, (xmlChar *)"type", 142457b448deSdougm persist ? (xmlChar *)"persist" : (xmlChar *)"transient"); 1425da6c28aaSamw if (flags != 0) 1426da6c28aaSamw mark_excluded_protos(group, node, flags); 14276185db85Sdougm if (persist != SA_SHARE_TRANSIENT) { 14286185db85Sdougm /* 14296185db85Sdougm * persistent shares come in two flavors: SMF and 14306185db85Sdougm * ZFS. Sort this one out based on target group and 1431da6c28aaSamw * path type. Both NFS and SMB are supported. First, 1432da6c28aaSamw * check to see if the protocol is enabled on the 1433da6c28aaSamw * subgroup and then setup the share appropriately. 14346185db85Sdougm */ 143557b448deSdougm if (sa_group_is_zfs(group) && 143657b448deSdougm sa_path_is_zfs(sharepath)) { 1437da6c28aaSamw if (sa_get_optionset(group, "nfs") != NULL) 14386185db85Sdougm err = sa_zfs_set_sharenfs(group, sharepath, 1); 1439da6c28aaSamw else if (sa_get_optionset(group, "smb") != NULL) 1440da6c28aaSamw err = sa_zfs_set_sharesmb(group, sharepath, 1); 14416185db85Sdougm } else { 1442549ec3ffSdougm sa_handle_impl_t impl_handle; 144357b448deSdougm impl_handle = 1444da6c28aaSamw (sa_handle_impl_t)sa_find_group_handle(group); 144557b448deSdougm if (impl_handle != NULL) { 1446da6c28aaSamw err = sa_commit_share(impl_handle->scfhandle, 1447da6c28aaSamw group, (sa_share_t)node); 144857b448deSdougm } else { 1449549ec3ffSdougm err = SA_SYSTEM_ERR; 14506185db85Sdougm } 14516185db85Sdougm } 145257b448deSdougm } 1453da6c28aaSamw if (err == SA_NO_PERMISSION && persist & SA_SHARE_PARSER) 14546185db85Sdougm /* called by the dfstab parser so could be a show */ 14556185db85Sdougm err = SA_OK; 1456da6c28aaSamw 14576185db85Sdougm if (err != SA_OK) { 14586185db85Sdougm /* 14596185db85Sdougm * we couldn't commit to the repository so undo 14606185db85Sdougm * our internal state to reflect reality. 14616185db85Sdougm */ 14626185db85Sdougm xmlUnlinkNode(node); 14636185db85Sdougm xmlFreeNode(node); 14646185db85Sdougm node = NULL; 14656185db85Sdougm } 1466da6c28aaSamw 14676185db85Sdougm if (error != NULL) 14686185db85Sdougm *error = err; 1469da6c28aaSamw 14706185db85Sdougm return (node); 14716185db85Sdougm } 14726185db85Sdougm 14736185db85Sdougm /* 14746185db85Sdougm * sa_add_share(group, sharepath, persist, *error) 14756185db85Sdougm * 14766185db85Sdougm * Add a new share object to the specified group. The share will 14776185db85Sdougm * have the specified sharepath and will only be constructed if 14786185db85Sdougm * it is a valid path to be shared. NULL is returned on error 14796185db85Sdougm * and a detailed error value will be returned via the error 14806185db85Sdougm * pointer. 14816185db85Sdougm */ 14826185db85Sdougm sa_share_t 14836185db85Sdougm sa_add_share(sa_group_t group, char *sharepath, int persist, int *error) 14846185db85Sdougm { 14856185db85Sdougm xmlNodePtr node = NULL; 1486f345c0beSdougm int strictness = SA_CHECK_NORMAL; 1487549ec3ffSdougm sa_handle_t handle; 1488da6c28aaSamw uint64_t special = 0; 1489da6c28aaSamw uint64_t features; 1490f345c0beSdougm 1491f345c0beSdougm /* 1492f345c0beSdougm * If the share is to be permanent, use strict checking so a 1493f345c0beSdougm * bad config doesn't get created. Transient shares only need 1494f345c0beSdougm * to check against the currently active 1495f345c0beSdougm * shares. SA_SHARE_PARSER is a modifier used internally to 1496f345c0beSdougm * indicate that we are being called by the dfstab parser and 1497f345c0beSdougm * that we need strict checking in all cases. Normally persist 1498f345c0beSdougm * is in integer value but SA_SHARE_PARSER may be or'd into 1499f345c0beSdougm * it as an override. 1500f345c0beSdougm */ 1501f345c0beSdougm if (persist & SA_SHARE_PARSER || persist == SA_SHARE_PERMANENT) 1502f345c0beSdougm strictness = SA_CHECK_STRICT; 15036185db85Sdougm 1504549ec3ffSdougm handle = sa_find_group_handle(group); 1505549ec3ffSdougm 1506da6c28aaSamw /* 1507da6c28aaSamw * need to determine if the share is valid. The rules are: 1508da6c28aaSamw * - The path must not already exist 1509da6c28aaSamw * - The path must not be a subdir or parent dir of an 1510da6c28aaSamw * existing path unless at least one protocol allows it. 1511da6c28aaSamw * The sub/parent check is done in sa_check_path(). 1512da6c28aaSamw */ 1513da6c28aaSamw 1514da6c28aaSamw if (sa_find_share(handle, sharepath) == NULL) { 1515da6c28aaSamw *error = sa_check_path(group, sharepath, strictness); 1516da6c28aaSamw features = get_all_features(group); 1517da6c28aaSamw switch (*error) { 1518da6c28aaSamw case SA_PATH_IS_SUBDIR: 1519da6c28aaSamw if (features & SA_FEATURE_ALLOWSUBDIRS) 1520da6c28aaSamw special |= SA_FEATURE_ALLOWSUBDIRS; 1521da6c28aaSamw break; 1522da6c28aaSamw case SA_PATH_IS_PARENTDIR: 1523da6c28aaSamw if (features & SA_FEATURE_ALLOWPARDIRS) 1524da6c28aaSamw special |= SA_FEATURE_ALLOWPARDIRS; 1525da6c28aaSamw break; 15266185db85Sdougm } 1527da6c28aaSamw if (*error == SA_OK || special != SA_FEATURE_NONE) 1528da6c28aaSamw node = _sa_add_share(group, sharepath, persist, 1529da6c28aaSamw error, special); 1530da6c28aaSamw } else { 15316185db85Sdougm *error = SA_DUPLICATE_NAME; 1532da6c28aaSamw } 15336185db85Sdougm 15346185db85Sdougm return ((sa_share_t)node); 15356185db85Sdougm } 15366185db85Sdougm 15376185db85Sdougm /* 15386185db85Sdougm * sa_enable_share(share, protocol) 15396185db85Sdougm * Enable the specified share to the specified protocol. 15406185db85Sdougm * If protocol is NULL, then all protocols. 15416185db85Sdougm */ 15426185db85Sdougm int 15436185db85Sdougm sa_enable_share(sa_share_t share, char *protocol) 15446185db85Sdougm { 15456185db85Sdougm char *sharepath; 15466185db85Sdougm struct stat st; 1547da6c28aaSamw int err = SA_OK; 1548da6c28aaSamw int ret; 15496185db85Sdougm 15506185db85Sdougm sharepath = sa_get_share_attr(share, "path"); 1551da6c28aaSamw if (sharepath == NULL) 1552da6c28aaSamw return (SA_NO_MEMORY); 15536185db85Sdougm if (stat(sharepath, &st) < 0) { 15546185db85Sdougm err = SA_NO_SUCH_PATH; 15556185db85Sdougm } else { 15566185db85Sdougm /* tell the server about the share */ 15576185db85Sdougm if (protocol != NULL) { 1558da6c28aaSamw if (excluded_protocol(share, protocol)) 1559da6c28aaSamw goto done; 1560da6c28aaSamw 15616185db85Sdougm /* lookup protocol specific handler */ 15626185db85Sdougm err = sa_proto_share(protocol, share); 15636185db85Sdougm if (err == SA_OK) 1564da6c28aaSamw (void) sa_set_share_attr(share, 1565da6c28aaSamw "shared", "true"); 15666185db85Sdougm } else { 1567da6c28aaSamw /* Tell all protocols about the share */ 1568da6c28aaSamw sa_group_t group; 1569da6c28aaSamw sa_optionset_t optionset; 1570da6c28aaSamw 1571da6c28aaSamw group = sa_get_parent_group(share); 1572da6c28aaSamw 1573da6c28aaSamw for (optionset = sa_get_optionset(group, NULL); 1574da6c28aaSamw optionset != NULL; 1575da6c28aaSamw optionset = sa_get_next_optionset(optionset)) { 1576da6c28aaSamw char *proto; 1577da6c28aaSamw proto = sa_get_optionset_attr(optionset, 1578da6c28aaSamw "type"); 1579da6c28aaSamw if (proto != NULL) { 1580da6c28aaSamw if (!excluded_protocol(share, proto)) { 1581da6c28aaSamw ret = sa_proto_share(proto, 1582da6c28aaSamw share); 1583da6c28aaSamw if (ret != SA_OK) 1584da6c28aaSamw err = ret; 1585da6c28aaSamw } 1586da6c28aaSamw sa_free_attr_string(proto); 1587da6c28aaSamw } 1588da6c28aaSamw } 15896185db85Sdougm (void) sa_set_share_attr(share, "shared", "true"); 15906185db85Sdougm } 15916185db85Sdougm } 1592da6c28aaSamw done: 15936185db85Sdougm if (sharepath != NULL) 15946185db85Sdougm sa_free_attr_string(sharepath); 15956185db85Sdougm return (err); 15966185db85Sdougm } 15976185db85Sdougm 15986185db85Sdougm /* 15996185db85Sdougm * sa_disable_share(share, protocol) 1600da6c28aaSamw * Disable the specified share to the specified protocol. If 1601da6c28aaSamw * protocol is NULL, then all protocols that are enabled for the 1602da6c28aaSamw * share should be disabled. 16036185db85Sdougm */ 16046185db85Sdougm int 16056185db85Sdougm sa_disable_share(sa_share_t share, char *protocol) 16066185db85Sdougm { 16076185db85Sdougm char *path; 1608da6c28aaSamw int err = SA_OK; 16096185db85Sdougm int ret = SA_OK; 16106185db85Sdougm 16116185db85Sdougm path = sa_get_share_attr(share, "path"); 16126185db85Sdougm 16136185db85Sdougm if (protocol != NULL) { 1614ecd6cf80Smarks ret = sa_proto_unshare(share, protocol, path); 16156185db85Sdougm } else { 16166185db85Sdougm /* need to do all protocols */ 1617da6c28aaSamw sa_group_t group; 1618da6c28aaSamw sa_optionset_t optionset; 1619da6c28aaSamw 1620da6c28aaSamw group = sa_get_parent_group(share); 1621da6c28aaSamw 1622da6c28aaSamw /* Tell all protocols about the share */ 1623da6c28aaSamw for (optionset = sa_get_optionset(group, NULL); 1624da6c28aaSamw optionset != NULL; 1625da6c28aaSamw optionset = sa_get_next_optionset(optionset)) { 1626da6c28aaSamw char *proto; 1627da6c28aaSamw 1628da6c28aaSamw proto = sa_get_optionset_attr(optionset, "type"); 1629da6c28aaSamw if (proto != NULL) { 1630da6c28aaSamw err = sa_proto_unshare(share, proto, path); 1631da6c28aaSamw if (err != SA_OK) 1632da6c28aaSamw ret = err; 1633da6c28aaSamw sa_free_attr_string(proto); 1634da6c28aaSamw } 1635da6c28aaSamw } 16366185db85Sdougm } 16376185db85Sdougm if (ret == SA_OK) 16386185db85Sdougm (void) sa_set_share_attr(share, "shared", NULL); 16396185db85Sdougm if (path != NULL) 16406185db85Sdougm sa_free_attr_string(path); 16416185db85Sdougm return (ret); 16426185db85Sdougm } 16436185db85Sdougm 16446185db85Sdougm /* 16456185db85Sdougm * sa_remove_share(share) 16466185db85Sdougm * 16476185db85Sdougm * remove the specified share from its containing group. 16486185db85Sdougm * Remove from the SMF or ZFS configuration space. 16496185db85Sdougm */ 16506185db85Sdougm 16516185db85Sdougm int 16526185db85Sdougm sa_remove_share(sa_share_t share) 16536185db85Sdougm { 16546185db85Sdougm sa_group_t group; 16556185db85Sdougm int ret = SA_OK; 16566185db85Sdougm char *type; 16576185db85Sdougm int transient = 0; 16586185db85Sdougm char *groupname; 16596185db85Sdougm char *zfs; 16606185db85Sdougm 16616185db85Sdougm type = sa_get_share_attr(share, "type"); 16626185db85Sdougm group = sa_get_parent_group(share); 16636185db85Sdougm zfs = sa_get_group_attr(group, "zfs"); 16646185db85Sdougm groupname = sa_get_group_attr(group, "name"); 16656185db85Sdougm if (type != NULL && strcmp(type, "persist") != 0) 16666185db85Sdougm transient = 1; 16676185db85Sdougm if (type != NULL) 16686185db85Sdougm sa_free_attr_string(type); 16696185db85Sdougm 16706185db85Sdougm /* remove the node from its group then free the memory */ 16716185db85Sdougm 16726185db85Sdougm /* 16736185db85Sdougm * need to test if "busy" 16746185db85Sdougm */ 16756185db85Sdougm /* only do SMF action if permanent */ 16766185db85Sdougm if (!transient || zfs != NULL) { 16776185db85Sdougm /* remove from legacy dfstab as well as possible SMF */ 1678da6c28aaSamw ret = sa_delete_legacy(share, NULL); 16796185db85Sdougm if (ret == SA_OK) { 16806185db85Sdougm if (!sa_group_is_zfs(group)) { 1681549ec3ffSdougm sa_handle_impl_t impl_handle; 168257b448deSdougm impl_handle = (sa_handle_impl_t) 168357b448deSdougm sa_find_group_handle(group); 168457b448deSdougm if (impl_handle != NULL) { 168557b448deSdougm ret = sa_delete_share( 168657b448deSdougm impl_handle->scfhandle, group, 168757b448deSdougm share); 16886185db85Sdougm } else { 168957b448deSdougm ret = SA_SYSTEM_ERR; 169057b448deSdougm } 169157b448deSdougm } else { 169257b448deSdougm char *sharepath = sa_get_share_attr(share, 169357b448deSdougm "path"); 16946185db85Sdougm if (sharepath != NULL) { 169557b448deSdougm ret = sa_zfs_set_sharenfs(group, 169657b448deSdougm sharepath, 0); 16976185db85Sdougm sa_free_attr_string(sharepath); 16986185db85Sdougm } 16996185db85Sdougm } 17006185db85Sdougm } 17016185db85Sdougm } 17026185db85Sdougm if (groupname != NULL) 17036185db85Sdougm sa_free_attr_string(groupname); 17046185db85Sdougm if (zfs != NULL) 17056185db85Sdougm sa_free_attr_string(zfs); 17066185db85Sdougm 17076185db85Sdougm xmlUnlinkNode((xmlNodePtr)share); 17086185db85Sdougm xmlFreeNode((xmlNodePtr)share); 17096185db85Sdougm return (ret); 17106185db85Sdougm } 17116185db85Sdougm 17126185db85Sdougm /* 17136185db85Sdougm * sa_move_share(group, share) 17146185db85Sdougm * 17156185db85Sdougm * move the specified share to the specified group. Update SMF 17166185db85Sdougm * appropriately. 17176185db85Sdougm */ 17186185db85Sdougm 17196185db85Sdougm int 17206185db85Sdougm sa_move_share(sa_group_t group, sa_share_t share) 17216185db85Sdougm { 17226185db85Sdougm sa_group_t oldgroup; 17236185db85Sdougm int ret = SA_OK; 17246185db85Sdougm 17256185db85Sdougm /* remove the node from its group then free the memory */ 17266185db85Sdougm 17276185db85Sdougm oldgroup = sa_get_parent_group(share); 17286185db85Sdougm if (oldgroup != group) { 1729549ec3ffSdougm sa_handle_impl_t impl_handle; 17306185db85Sdougm xmlUnlinkNode((xmlNodePtr)share); 173157b448deSdougm /* 173257b448deSdougm * now that the share isn't in its old group, add to 173357b448deSdougm * the new one 173457b448deSdougm */ 17356185db85Sdougm xmlAddChild((xmlNodePtr)group, (xmlNodePtr)share); 17366185db85Sdougm /* need to deal with SMF */ 1737549ec3ffSdougm impl_handle = (sa_handle_impl_t)sa_find_group_handle(group); 1738549ec3ffSdougm if (impl_handle != NULL) { 17396185db85Sdougm /* 17406185db85Sdougm * need to remove from old group first and then add to 17416185db85Sdougm * new group. Ideally, we would do the other order but 17426185db85Sdougm * need to avoid having the share in two groups at the 17436185db85Sdougm * same time. 17446185db85Sdougm */ 174557b448deSdougm ret = sa_delete_share(impl_handle->scfhandle, oldgroup, 174657b448deSdougm share); 1747549ec3ffSdougm if (ret == SA_OK) 174857b448deSdougm ret = sa_commit_share(impl_handle->scfhandle, 174957b448deSdougm group, share); 1750549ec3ffSdougm } else { 1751549ec3ffSdougm ret = SA_SYSTEM_ERR; 17526185db85Sdougm } 17536185db85Sdougm } 17546185db85Sdougm return (ret); 17556185db85Sdougm } 17566185db85Sdougm 17576185db85Sdougm /* 17586185db85Sdougm * sa_get_parent_group(share) 17596185db85Sdougm * 1760da6c28aaSamw * Return the containing group for the share. If a group was actually 17616185db85Sdougm * passed in, we don't want a parent so return NULL. 17626185db85Sdougm */ 17636185db85Sdougm 17646185db85Sdougm sa_group_t 17656185db85Sdougm sa_get_parent_group(sa_share_t share) 17666185db85Sdougm { 17676185db85Sdougm xmlNodePtr node = NULL; 17686185db85Sdougm if (share != NULL) { 17696185db85Sdougm node = ((xmlNodePtr)share)->parent; 17706185db85Sdougm /* 17716185db85Sdougm * make sure parent is a group and not sharecfg since 17726185db85Sdougm * we may be cheating and passing in a group. 17736185db85Sdougm * Eventually, groups of groups might come into being. 17746185db85Sdougm */ 17756185db85Sdougm if (node == NULL || 17766185db85Sdougm xmlStrcmp(node->name, (xmlChar *)"sharecfg") == 0) 17776185db85Sdougm node = NULL; 17786185db85Sdougm } 17796185db85Sdougm return ((sa_group_t)node); 17806185db85Sdougm } 17816185db85Sdougm 17826185db85Sdougm /* 1783549ec3ffSdougm * _sa_create_group(impl_handle, groupname) 17846185db85Sdougm * 17856185db85Sdougm * Create a group in the document. The caller will need to deal with 17866185db85Sdougm * configuration store and activation. 17876185db85Sdougm */ 17886185db85Sdougm 17896185db85Sdougm sa_group_t 1790549ec3ffSdougm _sa_create_group(sa_handle_impl_t impl_handle, char *groupname) 17916185db85Sdougm { 17926185db85Sdougm xmlNodePtr node = NULL; 17936185db85Sdougm 17946185db85Sdougm if (sa_valid_group_name(groupname)) { 179557b448deSdougm node = xmlNewChild(impl_handle->tree, NULL, (xmlChar *)"group", 179657b448deSdougm NULL); 17976185db85Sdougm if (node != NULL) { 179857b448deSdougm xmlSetProp(node, (xmlChar *)"name", 179957b448deSdougm (xmlChar *)groupname); 180057b448deSdougm xmlSetProp(node, (xmlChar *)"state", 180157b448deSdougm (xmlChar *)"enabled"); 18026185db85Sdougm } 18036185db85Sdougm } 18046185db85Sdougm return ((sa_group_t)node); 18056185db85Sdougm } 18066185db85Sdougm 18076185db85Sdougm /* 18086185db85Sdougm * _sa_create_zfs_group(group, groupname) 18096185db85Sdougm * 18106185db85Sdougm * Create a ZFS subgroup under the specified group. This may 18116185db85Sdougm * eventually form the basis of general sub-groups, but is currently 18126185db85Sdougm * restricted to ZFS. 18136185db85Sdougm */ 18146185db85Sdougm sa_group_t 18156185db85Sdougm _sa_create_zfs_group(sa_group_t group, char *groupname) 18166185db85Sdougm { 18176185db85Sdougm xmlNodePtr node = NULL; 18186185db85Sdougm 181957b448deSdougm node = xmlNewChild((xmlNodePtr)group, NULL, (xmlChar *)"group", NULL); 18206185db85Sdougm if (node != NULL) { 18216185db85Sdougm xmlSetProp(node, (xmlChar *)"name", (xmlChar *)groupname); 18226185db85Sdougm xmlSetProp(node, (xmlChar *)"state", (xmlChar *)"enabled"); 18236185db85Sdougm } 18246185db85Sdougm 18256185db85Sdougm return ((sa_group_t)node); 18266185db85Sdougm } 18276185db85Sdougm 18286185db85Sdougm /* 18296185db85Sdougm * sa_create_group(groupname, *error) 18306185db85Sdougm * 18316185db85Sdougm * Create a new group with groupname. Need to validate that it is a 18326185db85Sdougm * legal name for SMF and the construct the SMF service instance of 18336185db85Sdougm * svc:/network/shares/group to implement the group. All necessary 18346185db85Sdougm * operational properties must be added to the group at this point 18356185db85Sdougm * (via the SMF transaction model). 18366185db85Sdougm */ 18376185db85Sdougm sa_group_t 1838549ec3ffSdougm sa_create_group(sa_handle_t handle, char *groupname, int *error) 18396185db85Sdougm { 18406185db85Sdougm xmlNodePtr node = NULL; 18416185db85Sdougm sa_group_t group; 18426185db85Sdougm int ret; 184357b448deSdougm char rbacstr[SA_STRSIZE]; 1844549ec3ffSdougm sa_handle_impl_t impl_handle = (sa_handle_impl_t)handle; 18456185db85Sdougm 18466185db85Sdougm ret = SA_OK; 18476185db85Sdougm 1848549ec3ffSdougm if (impl_handle == NULL || impl_handle->scfhandle == NULL) { 18496185db85Sdougm ret = SA_SYSTEM_ERR; 18506185db85Sdougm goto err; 18516185db85Sdougm } 18526185db85Sdougm 1853549ec3ffSdougm group = sa_get_group(handle, groupname); 18546185db85Sdougm if (group != NULL) { 18556185db85Sdougm ret = SA_DUPLICATE_NAME; 18566185db85Sdougm } else { 18576185db85Sdougm if (sa_valid_group_name(groupname)) { 1858549ec3ffSdougm node = xmlNewChild(impl_handle->tree, NULL, 18596185db85Sdougm (xmlChar *)"group", NULL); 18606185db85Sdougm if (node != NULL) { 186157b448deSdougm xmlSetProp(node, (xmlChar *)"name", 186257b448deSdougm (xmlChar *)groupname); 18636185db85Sdougm /* default to the group being enabled */ 186457b448deSdougm xmlSetProp(node, (xmlChar *)"state", 186557b448deSdougm (xmlChar *)"enabled"); 186657b448deSdougm ret = sa_create_instance(impl_handle->scfhandle, 186757b448deSdougm groupname); 18686185db85Sdougm if (ret == SA_OK) { 186957b448deSdougm ret = sa_start_transaction( 187057b448deSdougm impl_handle->scfhandle, 1871549ec3ffSdougm "operation"); 18726185db85Sdougm } 18736185db85Sdougm if (ret == SA_OK) { 187457b448deSdougm ret = sa_set_property( 187557b448deSdougm impl_handle->scfhandle, 1876549ec3ffSdougm "state", "enabled"); 18776185db85Sdougm if (ret == SA_OK) { 187857b448deSdougm ret = sa_end_transaction( 187957b448deSdougm impl_handle->scfhandle); 18806185db85Sdougm } else { 188157b448deSdougm sa_abort_transaction( 188257b448deSdougm impl_handle->scfhandle); 18836185db85Sdougm } 18846185db85Sdougm } 18856185db85Sdougm if (ret == SA_OK) { 18866185db85Sdougm /* initialize the RBAC strings */ 188757b448deSdougm ret = sa_start_transaction( 188857b448deSdougm impl_handle->scfhandle, 1889549ec3ffSdougm "general"); 18906185db85Sdougm if (ret == SA_OK) { 189157b448deSdougm (void) snprintf(rbacstr, 189257b448deSdougm sizeof (rbacstr), "%s.%s", 18936185db85Sdougm SA_RBAC_MANAGE, groupname); 189457b448deSdougm ret = sa_set_property( 189557b448deSdougm impl_handle->scfhandle, 18966185db85Sdougm "action_authorization", 18976185db85Sdougm rbacstr); 18986185db85Sdougm } 18996185db85Sdougm if (ret == SA_OK) { 190057b448deSdougm (void) snprintf(rbacstr, 190157b448deSdougm sizeof (rbacstr), "%s.%s", 19026185db85Sdougm SA_RBAC_VALUE, groupname); 190357b448deSdougm ret = sa_set_property( 190457b448deSdougm impl_handle->scfhandle, 19056185db85Sdougm "value_authorization", 19066185db85Sdougm rbacstr); 19076185db85Sdougm } 19086185db85Sdougm if (ret == SA_OK) { 190957b448deSdougm ret = sa_end_transaction( 191057b448deSdougm impl_handle->scfhandle); 19116185db85Sdougm } else { 191257b448deSdougm sa_abort_transaction( 191357b448deSdougm impl_handle->scfhandle); 19146185db85Sdougm } 19156185db85Sdougm } 19166185db85Sdougm if (ret != SA_OK) { 19176185db85Sdougm /* 191857b448deSdougm * Couldn't commit the group 191957b448deSdougm * so we need to undo 192057b448deSdougm * internally. 19216185db85Sdougm */ 19226185db85Sdougm xmlUnlinkNode(node); 19236185db85Sdougm xmlFreeNode(node); 19246185db85Sdougm node = NULL; 19256185db85Sdougm } 19266185db85Sdougm } else { 19276185db85Sdougm ret = SA_NO_MEMORY; 19286185db85Sdougm } 19296185db85Sdougm } else { 19306185db85Sdougm ret = SA_INVALID_NAME; 19316185db85Sdougm } 19326185db85Sdougm } 19336185db85Sdougm err: 19346185db85Sdougm if (error != NULL) 19356185db85Sdougm *error = ret; 19366185db85Sdougm return ((sa_group_t)node); 19376185db85Sdougm } 19386185db85Sdougm 19396185db85Sdougm /* 19406185db85Sdougm * sa_remove_group(group) 19416185db85Sdougm * 19426185db85Sdougm * Remove the specified group. This deletes from the SMF repository. 19436185db85Sdougm * All property groups and properties are removed. 19446185db85Sdougm */ 19456185db85Sdougm 19466185db85Sdougm int 19476185db85Sdougm sa_remove_group(sa_group_t group) 19486185db85Sdougm { 19496185db85Sdougm char *name; 19506185db85Sdougm int ret = SA_OK; 1951549ec3ffSdougm sa_handle_impl_t impl_handle; 19526185db85Sdougm 1953549ec3ffSdougm impl_handle = (sa_handle_impl_t)sa_find_group_handle(group); 1954549ec3ffSdougm if (impl_handle != NULL) { 19556185db85Sdougm name = sa_get_group_attr(group, "name"); 19566185db85Sdougm if (name != NULL) { 1957549ec3ffSdougm ret = sa_delete_instance(impl_handle->scfhandle, name); 19586185db85Sdougm sa_free_attr_string(name); 19596185db85Sdougm } 19606185db85Sdougm xmlUnlinkNode((xmlNodePtr)group); /* make sure unlinked */ 19616185db85Sdougm xmlFreeNode((xmlNodePtr)group); /* now it is gone */ 1962549ec3ffSdougm } else { 1963549ec3ffSdougm ret = SA_SYSTEM_ERR; 1964549ec3ffSdougm } 19656185db85Sdougm return (ret); 19666185db85Sdougm } 19676185db85Sdougm 19686185db85Sdougm /* 19696185db85Sdougm * sa_update_config() 19706185db85Sdougm * 19716185db85Sdougm * Used to update legacy files that need to be updated in bulk 19726185db85Sdougm * Currently, this is a placeholder and will go away in a future 19736185db85Sdougm * release. 19746185db85Sdougm */ 19756185db85Sdougm 19766185db85Sdougm int 1977549ec3ffSdougm sa_update_config(sa_handle_t handle) 19786185db85Sdougm { 19796185db85Sdougm /* 19806185db85Sdougm * do legacy files first so we can tell when they change. 19816185db85Sdougm * This will go away when we start updating individual records 19826185db85Sdougm * rather than the whole file. 19836185db85Sdougm */ 1984549ec3ffSdougm update_legacy_config(handle); 19856185db85Sdougm return (SA_OK); 19866185db85Sdougm } 19876185db85Sdougm 19886185db85Sdougm /* 19896185db85Sdougm * get_node_attr(node, tag) 19906185db85Sdougm * 1991da6c28aaSamw * Get the specified tag(attribute) if it exists on the node. This is 19926185db85Sdougm * used internally by a number of attribute oriented functions. 19936185db85Sdougm */ 19946185db85Sdougm 19956185db85Sdougm static char * 19966185db85Sdougm get_node_attr(void *nodehdl, char *tag) 19976185db85Sdougm { 19986185db85Sdougm xmlNodePtr node = (xmlNodePtr)nodehdl; 19996185db85Sdougm xmlChar *name = NULL; 20006185db85Sdougm 200157b448deSdougm if (node != NULL) 20026185db85Sdougm name = xmlGetProp(node, (xmlChar *)tag); 20036185db85Sdougm return ((char *)name); 20046185db85Sdougm } 20056185db85Sdougm 20066185db85Sdougm /* 20076185db85Sdougm * get_node_attr(node, tag) 20086185db85Sdougm * 2009da6c28aaSamw * Set the specified tag(attribute) to the specified value This is 20106185db85Sdougm * used internally by a number of attribute oriented functions. It 20116185db85Sdougm * doesn't update the repository, only the internal document state. 20126185db85Sdougm */ 20136185db85Sdougm 20146185db85Sdougm void 20156185db85Sdougm set_node_attr(void *nodehdl, char *tag, char *value) 20166185db85Sdougm { 20176185db85Sdougm xmlNodePtr node = (xmlNodePtr)nodehdl; 20186185db85Sdougm if (node != NULL && tag != NULL) { 201957b448deSdougm if (value != NULL) 20206185db85Sdougm xmlSetProp(node, (xmlChar *)tag, (xmlChar *)value); 202157b448deSdougm else 20226185db85Sdougm xmlUnsetProp(node, (xmlChar *)tag); 20236185db85Sdougm } 20246185db85Sdougm } 20256185db85Sdougm 20266185db85Sdougm /* 20276185db85Sdougm * sa_get_group_attr(group, tag) 20286185db85Sdougm * 20296185db85Sdougm * Get the specied attribute, if defined, for the group. 20306185db85Sdougm */ 20316185db85Sdougm 20326185db85Sdougm char * 20336185db85Sdougm sa_get_group_attr(sa_group_t group, char *tag) 20346185db85Sdougm { 20356185db85Sdougm return (get_node_attr((void *)group, tag)); 20366185db85Sdougm } 20376185db85Sdougm 20386185db85Sdougm /* 20396185db85Sdougm * sa_set_group_attr(group, tag, value) 20406185db85Sdougm * 20416185db85Sdougm * set the specified tag/attribute on the group using value as its 20426185db85Sdougm * value. 20436185db85Sdougm * 20446185db85Sdougm * This will result in setting the property in the SMF repository as 20456185db85Sdougm * well as in the internal document. 20466185db85Sdougm */ 20476185db85Sdougm 20486185db85Sdougm int 20496185db85Sdougm sa_set_group_attr(sa_group_t group, char *tag, char *value) 20506185db85Sdougm { 20516185db85Sdougm int ret; 20526185db85Sdougm char *groupname; 2053549ec3ffSdougm sa_handle_impl_t impl_handle; 20546185db85Sdougm 2055da6c28aaSamw /* 2056da6c28aaSamw * ZFS group/subgroup doesn't need the handle so shortcut. 2057da6c28aaSamw */ 2058da6c28aaSamw if (sa_group_is_zfs(group)) { 2059da6c28aaSamw set_node_attr((void *)group, tag, value); 2060da6c28aaSamw return (SA_OK); 2061da6c28aaSamw } 2062da6c28aaSamw 2063549ec3ffSdougm impl_handle = (sa_handle_impl_t)sa_find_group_handle(group); 2064549ec3ffSdougm if (impl_handle != NULL) { 20656185db85Sdougm groupname = sa_get_group_attr(group, "name"); 2066549ec3ffSdougm ret = sa_get_instance(impl_handle->scfhandle, groupname); 20676185db85Sdougm if (ret == SA_OK) { 20686185db85Sdougm set_node_attr((void *)group, tag, value); 206957b448deSdougm ret = sa_start_transaction(impl_handle->scfhandle, 207057b448deSdougm "operation"); 20716185db85Sdougm if (ret == SA_OK) { 207257b448deSdougm ret = sa_set_property(impl_handle->scfhandle, 207357b448deSdougm tag, value); 20746185db85Sdougm if (ret == SA_OK) 2075*573b0c00Sdougm ret = sa_end_transaction( 207657b448deSdougm impl_handle->scfhandle); 207757b448deSdougm else 207857b448deSdougm sa_abort_transaction( 207957b448deSdougm impl_handle->scfhandle); 20806185db85Sdougm } 2081*573b0c00Sdougm if (ret == SA_SYSTEM_ERR) 2082*573b0c00Sdougm ret = SA_NO_PERMISSION; 20836185db85Sdougm } 20846185db85Sdougm if (groupname != NULL) 20856185db85Sdougm sa_free_attr_string(groupname); 2086549ec3ffSdougm } else { 2087549ec3ffSdougm ret = SA_SYSTEM_ERR; 2088549ec3ffSdougm } 20896185db85Sdougm return (ret); 20906185db85Sdougm } 20916185db85Sdougm 20926185db85Sdougm /* 20936185db85Sdougm * sa_get_share_attr(share, tag) 20946185db85Sdougm * 20956185db85Sdougm * Return the value of the tag/attribute set on the specified 20966185db85Sdougm * share. Returns NULL if the tag doesn't exist. 20976185db85Sdougm */ 20986185db85Sdougm 20996185db85Sdougm char * 21006185db85Sdougm sa_get_share_attr(sa_share_t share, char *tag) 21016185db85Sdougm { 21026185db85Sdougm return (get_node_attr((void *)share, tag)); 21036185db85Sdougm } 21046185db85Sdougm 21056185db85Sdougm /* 21066185db85Sdougm * _sa_set_share_description(share, description) 21076185db85Sdougm * 2108da6c28aaSamw * Add a description tag with text contents to the specified share. A 2109da6c28aaSamw * separate XML tag is used rather than a property. This can also be 2110da6c28aaSamw * used with resources. 21116185db85Sdougm */ 21126185db85Sdougm 21136185db85Sdougm xmlNodePtr 2114da6c28aaSamw _sa_set_share_description(void *share, char *content) 21156185db85Sdougm { 21166185db85Sdougm xmlNodePtr node; 211757b448deSdougm node = xmlNewChild((xmlNodePtr)share, NULL, (xmlChar *)"description", 211857b448deSdougm NULL); 21196185db85Sdougm xmlNodeSetContent(node, (xmlChar *)content); 21206185db85Sdougm return (node); 21216185db85Sdougm } 21226185db85Sdougm 21236185db85Sdougm /* 21246185db85Sdougm * sa_set_share_attr(share, tag, value) 21256185db85Sdougm * 21266185db85Sdougm * Set the share attribute specified by tag to the specified value. In 21276185db85Sdougm * the case of "resource", enforce a no duplicates in a group rule. If 21286185db85Sdougm * the share is not transient, commit the changes to the repository 21296185db85Sdougm * else just update the share internally. 21306185db85Sdougm */ 21316185db85Sdougm 21326185db85Sdougm int 21336185db85Sdougm sa_set_share_attr(sa_share_t share, char *tag, char *value) 21346185db85Sdougm { 21356185db85Sdougm sa_group_t group; 21366185db85Sdougm sa_share_t resource; 21376185db85Sdougm int ret = SA_OK; 21386185db85Sdougm 21396185db85Sdougm group = sa_get_parent_group(share); 21406185db85Sdougm 21416185db85Sdougm /* 21426185db85Sdougm * There are some attributes that may have specific 21436185db85Sdougm * restrictions on them. Initially, only "resource" has 21446185db85Sdougm * special meaning that needs to be checked. Only one instance 21456185db85Sdougm * of a resource name may exist within a group. 21466185db85Sdougm */ 21476185db85Sdougm 21486185db85Sdougm if (strcmp(tag, "resource") == 0) { 21496185db85Sdougm resource = sa_get_resource(group, value); 21506185db85Sdougm if (resource != share && resource != NULL) 21516185db85Sdougm ret = SA_DUPLICATE_NAME; 21526185db85Sdougm } 21536185db85Sdougm if (ret == SA_OK) { 21546185db85Sdougm set_node_attr((void *)share, tag, value); 21556185db85Sdougm if (group != NULL) { 21566185db85Sdougm char *type; 21576185db85Sdougm /* we can probably optimize this some */ 21586185db85Sdougm type = sa_get_share_attr(share, "type"); 2159549ec3ffSdougm if (type == NULL || strcmp(type, "transient") != 0) { 2160549ec3ffSdougm sa_handle_impl_t impl_handle; 216157b448deSdougm impl_handle = 216257b448deSdougm (sa_handle_impl_t)sa_find_group_handle( 216357b448deSdougm group); 216457b448deSdougm if (impl_handle != NULL) { 216557b448deSdougm ret = sa_commit_share( 216657b448deSdougm impl_handle->scfhandle, group, 216757b448deSdougm share); 216857b448deSdougm } else { 2169549ec3ffSdougm ret = SA_SYSTEM_ERR; 2170549ec3ffSdougm } 217157b448deSdougm } 21726185db85Sdougm if (type != NULL) 21736185db85Sdougm sa_free_attr_string(type); 21746185db85Sdougm } 21756185db85Sdougm } 21766185db85Sdougm return (ret); 21776185db85Sdougm } 21786185db85Sdougm 21796185db85Sdougm /* 21806185db85Sdougm * sa_get_property_attr(prop, tag) 21816185db85Sdougm * 21826185db85Sdougm * Get the value of the specified property attribute. Standard 21836185db85Sdougm * attributes are "type" and "value". 21846185db85Sdougm */ 21856185db85Sdougm 21866185db85Sdougm char * 21876185db85Sdougm sa_get_property_attr(sa_property_t prop, char *tag) 21886185db85Sdougm { 21896185db85Sdougm return (get_node_attr((void *)prop, tag)); 21906185db85Sdougm } 21916185db85Sdougm 21926185db85Sdougm /* 21936185db85Sdougm * sa_get_optionset_attr(prop, tag) 21946185db85Sdougm * 21956185db85Sdougm * Get the value of the specified property attribute. Standard 21966185db85Sdougm * attribute is "type". 21976185db85Sdougm */ 21986185db85Sdougm 21996185db85Sdougm char * 22006185db85Sdougm sa_get_optionset_attr(sa_property_t optionset, char *tag) 22016185db85Sdougm { 22026185db85Sdougm return (get_node_attr((void *)optionset, tag)); 22036185db85Sdougm 22046185db85Sdougm } 22056185db85Sdougm 22066185db85Sdougm /* 22076185db85Sdougm * sa_set_optionset_attr(optionset, tag, value) 22086185db85Sdougm * 22096185db85Sdougm * Set the specified attribute(tag) to the specified value on the 22106185db85Sdougm * optionset. 22116185db85Sdougm */ 22126185db85Sdougm 22136185db85Sdougm void 22146185db85Sdougm sa_set_optionset_attr(sa_group_t optionset, char *tag, char *value) 22156185db85Sdougm { 22166185db85Sdougm set_node_attr((void *)optionset, tag, value); 22176185db85Sdougm } 22186185db85Sdougm 22196185db85Sdougm /* 22206185db85Sdougm * sa_free_attr_string(string) 22216185db85Sdougm * 22226185db85Sdougm * Free the string that was returned in one of the sa_get_*_attr() 22236185db85Sdougm * functions. 22246185db85Sdougm */ 22256185db85Sdougm 22266185db85Sdougm void 22276185db85Sdougm sa_free_attr_string(char *string) 22286185db85Sdougm { 22296185db85Sdougm xmlFree((xmlChar *)string); 22306185db85Sdougm } 22316185db85Sdougm 22326185db85Sdougm /* 22336185db85Sdougm * sa_get_optionset(group, proto) 22346185db85Sdougm * 22356185db85Sdougm * Return the optionset, if it exists, that is associated with the 22366185db85Sdougm * specified protocol. 22376185db85Sdougm */ 22386185db85Sdougm 22396185db85Sdougm sa_optionset_t 22406185db85Sdougm sa_get_optionset(void *group, char *proto) 22416185db85Sdougm { 22426185db85Sdougm xmlNodePtr node; 22436185db85Sdougm xmlChar *value = NULL; 22446185db85Sdougm 22456185db85Sdougm for (node = ((xmlNodePtr)group)->children; node != NULL; 22466185db85Sdougm node = node->next) { 22476185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"optionset") == 0) { 22486185db85Sdougm value = xmlGetProp(node, (xmlChar *)"type"); 22496185db85Sdougm if (proto != NULL) { 22506185db85Sdougm if (value != NULL && 22516185db85Sdougm xmlStrcmp(value, (xmlChar *)proto) == 0) { 22526185db85Sdougm break; 22536185db85Sdougm } 22546185db85Sdougm if (value != NULL) { 22556185db85Sdougm xmlFree(value); 22566185db85Sdougm value = NULL; 22576185db85Sdougm } 22586185db85Sdougm } else { 22596185db85Sdougm break; 22606185db85Sdougm } 22616185db85Sdougm } 22626185db85Sdougm } 22636185db85Sdougm if (value != NULL) 22646185db85Sdougm xmlFree(value); 22656185db85Sdougm return ((sa_optionset_t)node); 22666185db85Sdougm } 22676185db85Sdougm 22686185db85Sdougm /* 22696185db85Sdougm * sa_get_next_optionset(optionset) 22706185db85Sdougm * 22716185db85Sdougm * Return the next optionset in the group. NULL if this was the last. 22726185db85Sdougm */ 22736185db85Sdougm 22746185db85Sdougm sa_optionset_t 22756185db85Sdougm sa_get_next_optionset(sa_optionset_t optionset) 22766185db85Sdougm { 22776185db85Sdougm xmlNodePtr node; 22786185db85Sdougm 22796185db85Sdougm for (node = ((xmlNodePtr)optionset)->next; node != NULL; 22806185db85Sdougm node = node->next) { 22816185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"optionset") == 0) { 22826185db85Sdougm break; 22836185db85Sdougm } 22846185db85Sdougm } 22856185db85Sdougm return ((sa_optionset_t)node); 22866185db85Sdougm } 22876185db85Sdougm 22886185db85Sdougm /* 22896185db85Sdougm * sa_get_security(group, sectype, proto) 22906185db85Sdougm * 22916185db85Sdougm * Return the security optionset. The internal name is a hold over 22926185db85Sdougm * from the implementation and will be changed before the API is 22936185db85Sdougm * finalized. This is really a named optionset that can be negotiated 22946185db85Sdougm * as a group of properties (like NFS security options). 22956185db85Sdougm */ 22966185db85Sdougm 22976185db85Sdougm sa_security_t 22986185db85Sdougm sa_get_security(sa_group_t group, char *sectype, char *proto) 22996185db85Sdougm { 23006185db85Sdougm xmlNodePtr node; 23016185db85Sdougm xmlChar *value = NULL; 23026185db85Sdougm 23036185db85Sdougm for (node = ((xmlNodePtr)group)->children; node != NULL; 23046185db85Sdougm node = node->next) { 23056185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"security") == 0) { 23066185db85Sdougm if (proto != NULL) { 23076185db85Sdougm value = xmlGetProp(node, (xmlChar *)"type"); 23086185db85Sdougm if (value == NULL || 23096185db85Sdougm (value != NULL && 23106185db85Sdougm xmlStrcmp(value, (xmlChar *)proto) != 0)) { 23116185db85Sdougm /* it doesn't match so continue */ 23126185db85Sdougm xmlFree(value); 23136185db85Sdougm value = NULL; 23146185db85Sdougm continue; 23156185db85Sdougm } 23166185db85Sdougm } 23176185db85Sdougm if (value != NULL) { 23186185db85Sdougm xmlFree(value); 23196185db85Sdougm value = NULL; 23206185db85Sdougm } 23216185db85Sdougm /* potential match */ 23226185db85Sdougm if (sectype != NULL) { 23236185db85Sdougm value = xmlGetProp(node, (xmlChar *)"sectype"); 23246185db85Sdougm if (value != NULL && 23256185db85Sdougm xmlStrcmp(value, (xmlChar *)sectype) == 0) { 23266185db85Sdougm break; 23276185db85Sdougm } 23286185db85Sdougm } else { 23296185db85Sdougm break; 23306185db85Sdougm } 23316185db85Sdougm } 23326185db85Sdougm if (value != NULL) { 23336185db85Sdougm xmlFree(value); 23346185db85Sdougm value = NULL; 23356185db85Sdougm } 23366185db85Sdougm } 23376185db85Sdougm if (value != NULL) 23386185db85Sdougm xmlFree(value); 23396185db85Sdougm return ((sa_security_t)node); 23406185db85Sdougm } 23416185db85Sdougm 23426185db85Sdougm /* 23436185db85Sdougm * sa_get_next_security(security) 23446185db85Sdougm * 23456185db85Sdougm * Get the next security optionset if one exists. 23466185db85Sdougm */ 23476185db85Sdougm 23486185db85Sdougm sa_security_t 23496185db85Sdougm sa_get_next_security(sa_security_t security) 23506185db85Sdougm { 23516185db85Sdougm xmlNodePtr node; 23526185db85Sdougm 23536185db85Sdougm for (node = ((xmlNodePtr)security)->next; node != NULL; 23546185db85Sdougm node = node->next) { 23556185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"security") == 0) { 23566185db85Sdougm break; 23576185db85Sdougm } 23586185db85Sdougm } 23596185db85Sdougm return ((sa_security_t)node); 23606185db85Sdougm } 23616185db85Sdougm 23626185db85Sdougm /* 23636185db85Sdougm * sa_get_property(optionset, prop) 23646185db85Sdougm * 23656185db85Sdougm * Get the property object with the name specified in prop from the 23666185db85Sdougm * optionset. 23676185db85Sdougm */ 23686185db85Sdougm 23696185db85Sdougm sa_property_t 23706185db85Sdougm sa_get_property(sa_optionset_t optionset, char *prop) 23716185db85Sdougm { 23726185db85Sdougm xmlNodePtr node = (xmlNodePtr)optionset; 23736185db85Sdougm xmlChar *value = NULL; 23746185db85Sdougm 23756185db85Sdougm if (optionset == NULL) 23766185db85Sdougm return (NULL); 23776185db85Sdougm 23786185db85Sdougm for (node = node->children; node != NULL; 23796185db85Sdougm node = node->next) { 23806185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"option") == 0) { 23816185db85Sdougm if (prop == NULL) 23826185db85Sdougm break; 23836185db85Sdougm value = xmlGetProp(node, (xmlChar *)"type"); 238457b448deSdougm if (value != NULL && 238557b448deSdougm xmlStrcmp(value, (xmlChar *)prop) == 0) { 23866185db85Sdougm break; 23876185db85Sdougm } 23886185db85Sdougm if (value != NULL) { 23896185db85Sdougm xmlFree(value); 23906185db85Sdougm value = NULL; 23916185db85Sdougm } 23926185db85Sdougm } 23936185db85Sdougm } 23946185db85Sdougm if (value != NULL) 23956185db85Sdougm xmlFree(value); 23966185db85Sdougm if (node != NULL && xmlStrcmp(node->name, (xmlChar *)"option") != 0) { 239757b448deSdougm /* 239857b448deSdougm * avoid a non option node -- it is possible to be a 239957b448deSdougm * text node 240057b448deSdougm */ 24016185db85Sdougm node = NULL; 24026185db85Sdougm } 24036185db85Sdougm return ((sa_property_t)node); 24046185db85Sdougm } 24056185db85Sdougm 24066185db85Sdougm /* 24076185db85Sdougm * sa_get_next_property(property) 24086185db85Sdougm * 24096185db85Sdougm * Get the next property following the specified property. NULL if 24106185db85Sdougm * this was the last. 24116185db85Sdougm */ 24126185db85Sdougm 24136185db85Sdougm sa_property_t 24146185db85Sdougm sa_get_next_property(sa_property_t property) 24156185db85Sdougm { 24166185db85Sdougm xmlNodePtr node; 24176185db85Sdougm 24186185db85Sdougm for (node = ((xmlNodePtr)property)->next; node != NULL; 24196185db85Sdougm node = node->next) { 24206185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"option") == 0) { 24216185db85Sdougm break; 24226185db85Sdougm } 24236185db85Sdougm } 24246185db85Sdougm return ((sa_property_t)node); 24256185db85Sdougm } 24266185db85Sdougm 24276185db85Sdougm /* 24286185db85Sdougm * sa_set_share_description(share, content) 24296185db85Sdougm * 24306185db85Sdougm * Set the description of share to content. 24316185db85Sdougm */ 24326185db85Sdougm 24336185db85Sdougm int 24346185db85Sdougm sa_set_share_description(sa_share_t share, char *content) 24356185db85Sdougm { 24366185db85Sdougm xmlNodePtr node; 24376185db85Sdougm sa_group_t group; 24386185db85Sdougm int ret = SA_OK; 24396185db85Sdougm 24406185db85Sdougm for (node = ((xmlNodePtr)share)->children; node != NULL; 24416185db85Sdougm node = node->next) { 24426185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"description") == 0) { 24436185db85Sdougm break; 24446185db85Sdougm } 24456185db85Sdougm } 24466185db85Sdougm /* no existing description but want to add */ 24476185db85Sdougm if (node == NULL && content != NULL) { 24486185db85Sdougm /* add a description */ 24496185db85Sdougm node = _sa_set_share_description(share, content); 24506185db85Sdougm } else if (node != NULL && content != NULL) { 24516185db85Sdougm /* update a description */ 24526185db85Sdougm xmlNodeSetContent(node, (xmlChar *)content); 24536185db85Sdougm } else if (node != NULL && content == NULL) { 24546185db85Sdougm /* remove an existing description */ 24556185db85Sdougm xmlUnlinkNode(node); 24566185db85Sdougm xmlFreeNode(node); 24576185db85Sdougm } 2458da6c28aaSamw group = sa_get_parent_group(share); 2459da6c28aaSamw if (group != NULL && sa_is_persistent(share)) { 2460549ec3ffSdougm sa_handle_impl_t impl_handle; 2461549ec3ffSdougm impl_handle = (sa_handle_impl_t)sa_find_group_handle(group); 246257b448deSdougm if (impl_handle != NULL) { 246357b448deSdougm ret = sa_commit_share(impl_handle->scfhandle, group, 246457b448deSdougm share); 246557b448deSdougm } else { 2466549ec3ffSdougm ret = SA_SYSTEM_ERR; 2467549ec3ffSdougm } 246857b448deSdougm } 24696185db85Sdougm return (ret); 24706185db85Sdougm } 24716185db85Sdougm 24726185db85Sdougm /* 24736185db85Sdougm * fixproblemchars(string) 24746185db85Sdougm * 24756185db85Sdougm * don't want any newline or tab characters in the text since these 24766185db85Sdougm * could break display of data and legacy file formats. 24776185db85Sdougm */ 24786185db85Sdougm static void 24796185db85Sdougm fixproblemchars(char *str) 24806185db85Sdougm { 24816185db85Sdougm int c; 24826185db85Sdougm for (c = *str; c != '\0'; c = *++str) { 24836185db85Sdougm if (c == '\t' || c == '\n') 24846185db85Sdougm *str = ' '; 24856185db85Sdougm else if (c == '"') 24866185db85Sdougm *str = '\''; 24876185db85Sdougm } 24886185db85Sdougm } 24896185db85Sdougm 24906185db85Sdougm /* 24916185db85Sdougm * sa_get_share_description(share) 24926185db85Sdougm * 24936185db85Sdougm * Return the description text for the specified share if it 24946185db85Sdougm * exists. NULL if no description exists. 24956185db85Sdougm */ 24966185db85Sdougm 24976185db85Sdougm char * 24986185db85Sdougm sa_get_share_description(sa_share_t share) 24996185db85Sdougm { 25006185db85Sdougm xmlChar *description = NULL; 25016185db85Sdougm xmlNodePtr node; 25026185db85Sdougm 25036185db85Sdougm for (node = ((xmlNodePtr)share)->children; node != NULL; 25046185db85Sdougm node = node->next) { 25056185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"description") == 0) { 25066185db85Sdougm break; 25076185db85Sdougm } 25086185db85Sdougm } 25096185db85Sdougm if (node != NULL) { 2510da6c28aaSamw description = xmlNodeGetContent(node); 25116185db85Sdougm fixproblemchars((char *)description); 25126185db85Sdougm } 25136185db85Sdougm return ((char *)description); 25146185db85Sdougm } 25156185db85Sdougm 25166185db85Sdougm /* 25176185db85Sdougm * sa_free(share_description(description) 25186185db85Sdougm * 25196185db85Sdougm * Free the description string. 25206185db85Sdougm */ 25216185db85Sdougm 25226185db85Sdougm void 25236185db85Sdougm sa_free_share_description(char *description) 25246185db85Sdougm { 25256185db85Sdougm xmlFree((xmlChar *)description); 25266185db85Sdougm } 25276185db85Sdougm 25286185db85Sdougm /* 25296185db85Sdougm * sa_create_optionset(group, proto) 25306185db85Sdougm * 25316185db85Sdougm * Create an optionset for the specified protocol in the specied 25326185db85Sdougm * group. This is manifested as a property group within SMF. 25336185db85Sdougm */ 25346185db85Sdougm 25356185db85Sdougm sa_optionset_t 25366185db85Sdougm sa_create_optionset(sa_group_t group, char *proto) 25376185db85Sdougm { 25386185db85Sdougm sa_optionset_t optionset; 25396185db85Sdougm sa_group_t parent = group; 2540da6c28aaSamw sa_share_t share = NULL; 2541da6c28aaSamw int err = SA_OK; 2542da6c28aaSamw char *id = NULL; 25436185db85Sdougm 25446185db85Sdougm optionset = sa_get_optionset(group, proto); 25456185db85Sdougm if (optionset != NULL) { 25466185db85Sdougm /* can't have a duplicate protocol */ 25476185db85Sdougm optionset = NULL; 25486185db85Sdougm } else { 2549da6c28aaSamw /* 2550da6c28aaSamw * Account for resource names being slightly 2551da6c28aaSamw * different. 2552da6c28aaSamw */ 2553da6c28aaSamw if (sa_is_share(group)) { 2554da6c28aaSamw /* 2555da6c28aaSamw * Transient shares do not have an "id" so not an 2556da6c28aaSamw * error to not find one. 2557da6c28aaSamw */ 2558da6c28aaSamw id = sa_get_share_attr((sa_share_t)group, "id"); 2559da6c28aaSamw } else if (sa_is_resource(group)) { 2560da6c28aaSamw share = sa_get_resource_parent( 2561da6c28aaSamw (sa_resource_t)group); 2562da6c28aaSamw id = sa_get_resource_attr(share, "id"); 2563da6c28aaSamw 2564da6c28aaSamw /* id can be NULL if the group is transient (ZFS) */ 2565da6c28aaSamw if (id == NULL && sa_is_persistent(group)) 2566da6c28aaSamw err = SA_NO_MEMORY; 2567da6c28aaSamw } 2568da6c28aaSamw if (err == SA_NO_MEMORY) { 2569da6c28aaSamw /* 2570da6c28aaSamw * Couldn't get the id for the share or 2571da6c28aaSamw * resource. While this could be a 2572da6c28aaSamw * configuration issue, it is most likely an 2573da6c28aaSamw * out of memory. In any case, fail the create. 2574da6c28aaSamw */ 2575da6c28aaSamw return (NULL); 2576da6c28aaSamw } 2577da6c28aaSamw 25786185db85Sdougm optionset = (sa_optionset_t)xmlNewChild((xmlNodePtr)group, 257957b448deSdougm NULL, (xmlChar *)"optionset", NULL); 25806185db85Sdougm /* 25816185db85Sdougm * only put to repository if on a group and we were 25826185db85Sdougm * able to create an optionset. 25836185db85Sdougm */ 25846185db85Sdougm if (optionset != NULL) { 258557b448deSdougm char oname[SA_STRSIZE]; 25866185db85Sdougm char *groupname; 25876185db85Sdougm 2588da6c28aaSamw /* 2589da6c28aaSamw * Need to get parent group in all cases, but also get 2590da6c28aaSamw * the share if this is a resource. 2591da6c28aaSamw */ 2592da6c28aaSamw if (sa_is_share(group)) { 25936185db85Sdougm parent = sa_get_parent_group((sa_share_t)group); 2594da6c28aaSamw } else if (sa_is_resource(group)) { 2595da6c28aaSamw share = sa_get_resource_parent( 2596da6c28aaSamw (sa_resource_t)group); 2597da6c28aaSamw parent = sa_get_parent_group(share); 2598da6c28aaSamw } 25996185db85Sdougm 26006185db85Sdougm sa_set_optionset_attr(optionset, "type", proto); 26016185db85Sdougm 26026185db85Sdougm (void) sa_optionset_name(optionset, oname, 26036185db85Sdougm sizeof (oname), id); 26046185db85Sdougm groupname = sa_get_group_attr(parent, "name"); 2605da6c28aaSamw if (groupname != NULL && sa_is_persistent(group)) { 2606549ec3ffSdougm sa_handle_impl_t impl_handle; 2607da6c28aaSamw impl_handle = 2608da6c28aaSamw (sa_handle_impl_t)sa_find_group_handle( 2609da6c28aaSamw group); 2610549ec3ffSdougm assert(impl_handle != NULL); 2611549ec3ffSdougm if (impl_handle != NULL) { 261257b448deSdougm (void) sa_get_instance( 2613da6c28aaSamw impl_handle->scfhandle, groupname); 261457b448deSdougm (void) sa_create_pgroup( 261557b448deSdougm impl_handle->scfhandle, oname); 26166185db85Sdougm } 2617549ec3ffSdougm } 2618549ec3ffSdougm if (groupname != NULL) 2619549ec3ffSdougm sa_free_attr_string(groupname); 2620da6c28aaSamw } 2621da6c28aaSamw } 2622da6c28aaSamw 26236185db85Sdougm if (id != NULL) 26246185db85Sdougm sa_free_attr_string(id); 26256185db85Sdougm return (optionset); 26266185db85Sdougm } 26276185db85Sdougm 26286185db85Sdougm /* 26296185db85Sdougm * sa_get_property_parent(property) 26306185db85Sdougm * 26316185db85Sdougm * Given a property, return the object it is a property of. This will 26326185db85Sdougm * be an optionset of some type. 26336185db85Sdougm */ 26346185db85Sdougm 26356185db85Sdougm static sa_optionset_t 26366185db85Sdougm sa_get_property_parent(sa_property_t property) 26376185db85Sdougm { 26386185db85Sdougm xmlNodePtr node = NULL; 26396185db85Sdougm 264057b448deSdougm if (property != NULL) 26416185db85Sdougm node = ((xmlNodePtr)property)->parent; 26426185db85Sdougm return ((sa_optionset_t)node); 26436185db85Sdougm } 26446185db85Sdougm 26456185db85Sdougm /* 26466185db85Sdougm * sa_get_optionset_parent(optionset) 26476185db85Sdougm * 26486185db85Sdougm * Return the parent of the specified optionset. This could be a group 26496185db85Sdougm * or a share. 26506185db85Sdougm */ 26516185db85Sdougm 26526185db85Sdougm static sa_group_t 26536185db85Sdougm sa_get_optionset_parent(sa_optionset_t optionset) 26546185db85Sdougm { 26556185db85Sdougm xmlNodePtr node = NULL; 26566185db85Sdougm 265757b448deSdougm if (optionset != NULL) 26586185db85Sdougm node = ((xmlNodePtr)optionset)->parent; 26596185db85Sdougm return ((sa_group_t)node); 26606185db85Sdougm } 26616185db85Sdougm 26626185db85Sdougm /* 26636185db85Sdougm * zfs_needs_update(share) 26646185db85Sdougm * 26656185db85Sdougm * In order to avoid making multiple updates to a ZFS share when 26666185db85Sdougm * setting properties, the share attribute "changed" will be set to 2667da6c28aaSamw * true when a property is added or modified. When done adding 26686185db85Sdougm * properties, we can then detect that an update is needed. We then 26696185db85Sdougm * clear the state here to detect additional changes. 26706185db85Sdougm */ 26716185db85Sdougm 26726185db85Sdougm static int 26736185db85Sdougm zfs_needs_update(sa_share_t share) 26746185db85Sdougm { 26756185db85Sdougm char *attr; 26766185db85Sdougm int result = 0; 26776185db85Sdougm 26786185db85Sdougm attr = sa_get_share_attr(share, "changed"); 26796185db85Sdougm if (attr != NULL) { 26806185db85Sdougm sa_free_attr_string(attr); 26816185db85Sdougm result = 1; 26826185db85Sdougm } 26836185db85Sdougm set_node_attr((void *)share, "changed", NULL); 26846185db85Sdougm return (result); 26856185db85Sdougm } 26866185db85Sdougm 26876185db85Sdougm /* 26886185db85Sdougm * zfs_set_update(share) 26896185db85Sdougm * 26906185db85Sdougm * Set the changed attribute of the share to true. 26916185db85Sdougm */ 26926185db85Sdougm 26936185db85Sdougm static void 26946185db85Sdougm zfs_set_update(sa_share_t share) 26956185db85Sdougm { 26966185db85Sdougm set_node_attr((void *)share, "changed", "true"); 26976185db85Sdougm } 26986185db85Sdougm 26996185db85Sdougm /* 27006185db85Sdougm * sa_commit_properties(optionset, clear) 27016185db85Sdougm * 27026185db85Sdougm * Check if SMF or ZFS config and either update or abort the pending 27036185db85Sdougm * changes. 27046185db85Sdougm */ 27056185db85Sdougm 27066185db85Sdougm int 27076185db85Sdougm sa_commit_properties(sa_optionset_t optionset, int clear) 27086185db85Sdougm { 27096185db85Sdougm sa_group_t group; 27106185db85Sdougm sa_group_t parent; 27116185db85Sdougm int zfs = 0; 27126185db85Sdougm int needsupdate = 0; 27136185db85Sdougm int ret = SA_OK; 2714549ec3ffSdougm sa_handle_impl_t impl_handle; 27156185db85Sdougm 27166185db85Sdougm group = sa_get_optionset_parent(optionset); 27176185db85Sdougm if (group != NULL && (sa_is_share(group) || is_zfs_group(group))) { 27186185db85Sdougm /* only update ZFS if on a share */ 27196185db85Sdougm parent = sa_get_parent_group(group); 27206185db85Sdougm zfs++; 272157b448deSdougm if (parent != NULL && is_zfs_group(parent)) 27226185db85Sdougm needsupdate = zfs_needs_update(group); 272357b448deSdougm else 27246185db85Sdougm zfs = 0; 27256185db85Sdougm } 27266185db85Sdougm if (zfs) { 27276185db85Sdougm if (!clear && needsupdate) 27286185db85Sdougm ret = sa_zfs_update((sa_share_t)group); 27296185db85Sdougm } else { 2730549ec3ffSdougm impl_handle = (sa_handle_impl_t)sa_find_group_handle(group); 2731549ec3ffSdougm if (impl_handle != NULL) { 273257b448deSdougm if (clear) { 273357b448deSdougm (void) sa_abort_transaction( 273457b448deSdougm impl_handle->scfhandle); 273557b448deSdougm } else { 273657b448deSdougm ret = sa_end_transaction( 273757b448deSdougm impl_handle->scfhandle); 273857b448deSdougm } 2739549ec3ffSdougm } else { 2740549ec3ffSdougm ret = SA_SYSTEM_ERR; 2741549ec3ffSdougm } 27426185db85Sdougm } 27436185db85Sdougm return (ret); 27446185db85Sdougm } 27456185db85Sdougm 27466185db85Sdougm /* 27476185db85Sdougm * sa_destroy_optionset(optionset) 27486185db85Sdougm * 2749da6c28aaSamw * Remove the optionset from its group. Update the repository to 27506185db85Sdougm * reflect this change. 27516185db85Sdougm */ 27526185db85Sdougm 27536185db85Sdougm int 27546185db85Sdougm sa_destroy_optionset(sa_optionset_t optionset) 27556185db85Sdougm { 275657b448deSdougm char name[SA_STRSIZE]; 27576185db85Sdougm int len; 27586185db85Sdougm int ret; 27596185db85Sdougm char *id = NULL; 27606185db85Sdougm sa_group_t group; 27616185db85Sdougm int ispersist = 1; 27626185db85Sdougm 27636185db85Sdougm /* now delete the prop group */ 27646185db85Sdougm group = sa_get_optionset_parent(optionset); 2765da6c28aaSamw if (group != NULL) { 2766da6c28aaSamw if (sa_is_resource(group)) { 2767da6c28aaSamw sa_resource_t resource = group; 2768da6c28aaSamw sa_share_t share = sa_get_resource_parent(resource); 2769da6c28aaSamw group = sa_get_parent_group(share); 2770da6c28aaSamw id = sa_get_share_attr(share, "id"); 2771da6c28aaSamw } else if (sa_is_share(group)) { 27726185db85Sdougm id = sa_get_share_attr((sa_share_t)group, "id"); 27736185db85Sdougm } 2774da6c28aaSamw ispersist = sa_is_persistent(group); 2775da6c28aaSamw } 27766185db85Sdougm if (ispersist) { 2777549ec3ffSdougm sa_handle_impl_t impl_handle; 27786185db85Sdougm len = sa_optionset_name(optionset, name, sizeof (name), id); 2779549ec3ffSdougm impl_handle = (sa_handle_impl_t)sa_find_group_handle(group); 2780549ec3ffSdougm if (impl_handle != NULL) { 27816185db85Sdougm if (len > 0) { 278257b448deSdougm ret = sa_delete_pgroup(impl_handle->scfhandle, 278357b448deSdougm name); 2784549ec3ffSdougm } 2785549ec3ffSdougm } else { 2786549ec3ffSdougm ret = SA_SYSTEM_ERR; 27876185db85Sdougm } 27886185db85Sdougm } 27896185db85Sdougm xmlUnlinkNode((xmlNodePtr)optionset); 27906185db85Sdougm xmlFreeNode((xmlNodePtr)optionset); 27916185db85Sdougm if (id != NULL) 27926185db85Sdougm sa_free_attr_string(id); 27936185db85Sdougm return (ret); 27946185db85Sdougm } 27956185db85Sdougm 27966185db85Sdougm /* private to the implementation */ 27976185db85Sdougm int 27986185db85Sdougm _sa_remove_optionset(sa_optionset_t optionset) 27996185db85Sdougm { 28006185db85Sdougm int ret = SA_OK; 28016185db85Sdougm 28026185db85Sdougm xmlUnlinkNode((xmlNodePtr)optionset); 28036185db85Sdougm xmlFreeNode((xmlNodePtr)optionset); 28046185db85Sdougm return (ret); 28056185db85Sdougm } 28066185db85Sdougm 28076185db85Sdougm /* 28086185db85Sdougm * sa_create_security(group, sectype, proto) 28096185db85Sdougm * 28106185db85Sdougm * Create a security optionset (one that has a type name and a 28116185db85Sdougm * proto). Security is left over from a pure NFS implementation. The 28126185db85Sdougm * naming will change in the future when the API is released. 28136185db85Sdougm */ 28146185db85Sdougm sa_security_t 28156185db85Sdougm sa_create_security(sa_group_t group, char *sectype, char *proto) 28166185db85Sdougm { 28176185db85Sdougm sa_security_t security; 28186185db85Sdougm char *id = NULL; 28196185db85Sdougm sa_group_t parent; 28206185db85Sdougm char *groupname = NULL; 28216185db85Sdougm 28226185db85Sdougm if (group != NULL && sa_is_share(group)) { 28236185db85Sdougm id = sa_get_share_attr((sa_share_t)group, "id"); 28246185db85Sdougm parent = sa_get_parent_group(group); 28256185db85Sdougm if (parent != NULL) 28266185db85Sdougm groupname = sa_get_group_attr(parent, "name"); 28276185db85Sdougm } else if (group != NULL) { 28286185db85Sdougm groupname = sa_get_group_attr(group, "name"); 28296185db85Sdougm } 28306185db85Sdougm 28316185db85Sdougm security = sa_get_security(group, sectype, proto); 28326185db85Sdougm if (security != NULL) { 28336185db85Sdougm /* can't have a duplicate security option */ 28346185db85Sdougm security = NULL; 28356185db85Sdougm } else { 28366185db85Sdougm security = (sa_security_t)xmlNewChild((xmlNodePtr)group, 283757b448deSdougm NULL, (xmlChar *)"security", NULL); 28386185db85Sdougm if (security != NULL) { 283957b448deSdougm char oname[SA_STRSIZE]; 28406185db85Sdougm sa_set_security_attr(security, "type", proto); 28416185db85Sdougm 28426185db85Sdougm sa_set_security_attr(security, "sectype", sectype); 28436185db85Sdougm (void) sa_security_name(security, oname, 28446185db85Sdougm sizeof (oname), id); 2845da6c28aaSamw if (groupname != NULL && sa_is_persistent(group)) { 2846549ec3ffSdougm sa_handle_impl_t impl_handle; 2847549ec3ffSdougm impl_handle = 284857b448deSdougm (sa_handle_impl_t)sa_find_group_handle( 284957b448deSdougm group); 2850549ec3ffSdougm if (impl_handle != NULL) { 285157b448deSdougm (void) sa_get_instance( 285257b448deSdougm impl_handle->scfhandle, groupname); 285357b448deSdougm (void) sa_create_pgroup( 285457b448deSdougm impl_handle->scfhandle, oname); 2855549ec3ffSdougm } 28566185db85Sdougm } 28576185db85Sdougm } 28586185db85Sdougm } 28596185db85Sdougm if (groupname != NULL) 28606185db85Sdougm sa_free_attr_string(groupname); 28616185db85Sdougm return (security); 28626185db85Sdougm } 28636185db85Sdougm 28646185db85Sdougm /* 28656185db85Sdougm * sa_destroy_security(security) 28666185db85Sdougm * 28676185db85Sdougm * Remove the specified optionset from the document and the 28686185db85Sdougm * configuration. 28696185db85Sdougm */ 28706185db85Sdougm 28716185db85Sdougm int 28726185db85Sdougm sa_destroy_security(sa_security_t security) 28736185db85Sdougm { 287457b448deSdougm char name[SA_STRSIZE]; 28756185db85Sdougm int len; 28766185db85Sdougm int ret = SA_OK; 28776185db85Sdougm char *id = NULL; 28786185db85Sdougm sa_group_t group; 28796185db85Sdougm int iszfs = 0; 28806185db85Sdougm int ispersist = 1; 28816185db85Sdougm 28826185db85Sdougm group = sa_get_optionset_parent(security); 28836185db85Sdougm 28846185db85Sdougm if (group != NULL) 28856185db85Sdougm iszfs = sa_group_is_zfs(group); 28866185db85Sdougm 28876185db85Sdougm if (group != NULL && !iszfs) { 28886185db85Sdougm if (sa_is_share(group)) 2889da6c28aaSamw ispersist = sa_is_persistent(group); 28906185db85Sdougm id = sa_get_share_attr((sa_share_t)group, "id"); 28916185db85Sdougm } 28926185db85Sdougm if (ispersist) { 28936185db85Sdougm len = sa_security_name(security, name, sizeof (name), id); 28946185db85Sdougm if (!iszfs && len > 0) { 2895549ec3ffSdougm sa_handle_impl_t impl_handle; 289657b448deSdougm impl_handle = 289757b448deSdougm (sa_handle_impl_t)sa_find_group_handle(group); 2898549ec3ffSdougm if (impl_handle != NULL) { 289957b448deSdougm ret = sa_delete_pgroup(impl_handle->scfhandle, 290057b448deSdougm name); 2901549ec3ffSdougm } else { 2902549ec3ffSdougm ret = SA_SYSTEM_ERR; 2903549ec3ffSdougm } 29046185db85Sdougm } 29056185db85Sdougm } 29066185db85Sdougm xmlUnlinkNode((xmlNodePtr)security); 29076185db85Sdougm xmlFreeNode((xmlNodePtr)security); 290857b448deSdougm if (iszfs) 29096185db85Sdougm ret = sa_zfs_update(group); 29106185db85Sdougm if (id != NULL) 29116185db85Sdougm sa_free_attr_string(id); 29126185db85Sdougm return (ret); 29136185db85Sdougm } 29146185db85Sdougm 29156185db85Sdougm /* 29166185db85Sdougm * sa_get_security_attr(optionset, tag) 29176185db85Sdougm * 29186185db85Sdougm * Return the specified attribute value from the optionset. 29196185db85Sdougm */ 29206185db85Sdougm 29216185db85Sdougm char * 29226185db85Sdougm sa_get_security_attr(sa_property_t optionset, char *tag) 29236185db85Sdougm { 29246185db85Sdougm return (get_node_attr((void *)optionset, tag)); 29256185db85Sdougm 29266185db85Sdougm } 29276185db85Sdougm 29286185db85Sdougm /* 29296185db85Sdougm * sa_set_security_attr(optionset, tag, value) 29306185db85Sdougm * 29316185db85Sdougm * Set the optioset attribute specied by tag to the specified value. 29326185db85Sdougm */ 29336185db85Sdougm 29346185db85Sdougm void 29356185db85Sdougm sa_set_security_attr(sa_group_t optionset, char *tag, char *value) 29366185db85Sdougm { 29376185db85Sdougm set_node_attr((void *)optionset, tag, value); 29386185db85Sdougm } 29396185db85Sdougm 29406185db85Sdougm /* 29416185db85Sdougm * is_nodetype(node, type) 29426185db85Sdougm * 29436185db85Sdougm * Check to see if node is of the type specified. 29446185db85Sdougm */ 29456185db85Sdougm 29466185db85Sdougm static int 29476185db85Sdougm is_nodetype(void *node, char *type) 29486185db85Sdougm { 29496185db85Sdougm return (strcmp((char *)((xmlNodePtr)node)->name, type) == 0); 29506185db85Sdougm } 29516185db85Sdougm 295257b448deSdougm /* 295357b448deSdougm * add_or_update() 295457b448deSdougm * 295557b448deSdougm * Add or update a property. Pulled out of sa_set_prop_by_prop for 295657b448deSdougm * readability. 295757b448deSdougm */ 295857b448deSdougm static int 295957b448deSdougm add_or_update(scfutilhandle_t *scf_handle, int type, scf_value_t *value, 296057b448deSdougm scf_transaction_entry_t *entry, char *name, char *valstr) 296157b448deSdougm { 296257b448deSdougm int ret = SA_SYSTEM_ERR; 296357b448deSdougm 296457b448deSdougm if (value != NULL) { 296557b448deSdougm if (type == SA_PROP_OP_ADD) 296657b448deSdougm ret = scf_transaction_property_new(scf_handle->trans, 296757b448deSdougm entry, name, SCF_TYPE_ASTRING); 296857b448deSdougm else 296957b448deSdougm ret = scf_transaction_property_change(scf_handle->trans, 297057b448deSdougm entry, name, SCF_TYPE_ASTRING); 297157b448deSdougm if (ret == 0) { 297257b448deSdougm ret = scf_value_set_astring(value, valstr); 297357b448deSdougm if (ret == 0) 297457b448deSdougm ret = scf_entry_add_value(entry, value); 297557b448deSdougm if (ret == 0) 297657b448deSdougm return (ret); 297757b448deSdougm scf_value_destroy(value); 297857b448deSdougm } else { 297957b448deSdougm scf_entry_destroy(entry); 298057b448deSdougm } 298157b448deSdougm } 298257b448deSdougm return (SA_SYSTEM_ERR); 298357b448deSdougm } 298457b448deSdougm 29856185db85Sdougm /* 29866185db85Sdougm * sa_set_prop_by_prop(optionset, group, prop, type) 29876185db85Sdougm * 29886185db85Sdougm * Add/remove/update the specified property prop into the optionset or 29896185db85Sdougm * share. If a share, sort out which property group based on GUID. In 29906185db85Sdougm * all cases, the appropriate transaction is set (or ZFS share is 29916185db85Sdougm * marked as needing an update) 29926185db85Sdougm */ 29936185db85Sdougm 29946185db85Sdougm static int 29956185db85Sdougm sa_set_prop_by_prop(sa_optionset_t optionset, sa_group_t group, 29966185db85Sdougm sa_property_t prop, int type) 29976185db85Sdougm { 29986185db85Sdougm char *name; 29996185db85Sdougm char *valstr; 30006185db85Sdougm int ret = SA_OK; 30016185db85Sdougm scf_transaction_entry_t *entry; 30026185db85Sdougm scf_value_t *value; 30036185db85Sdougm int opttype; /* 1 == optionset, 0 == security */ 30046185db85Sdougm char *id = NULL; 30056185db85Sdougm int iszfs = 0; 30066185db85Sdougm sa_group_t parent = NULL; 3007da6c28aaSamw sa_share_t share = NULL; 3008549ec3ffSdougm sa_handle_impl_t impl_handle; 3009549ec3ffSdougm scfutilhandle_t *scf_handle; 30106185db85Sdougm 3011da6c28aaSamw if (!sa_is_persistent(group)) { 30126185db85Sdougm /* 30136185db85Sdougm * if the group/share is not persistent we don't need 30146185db85Sdougm * to do anything here 30156185db85Sdougm */ 30166185db85Sdougm return (SA_OK); 30176185db85Sdougm } 3018549ec3ffSdougm impl_handle = (sa_handle_impl_t)sa_find_group_handle(group); 301957b448deSdougm if (impl_handle == NULL || impl_handle->scfhandle == NULL) 3020549ec3ffSdougm return (SA_SYSTEM_ERR); 3021549ec3ffSdougm scf_handle = impl_handle->scfhandle; 30226185db85Sdougm name = sa_get_property_attr(prop, "type"); 30236185db85Sdougm valstr = sa_get_property_attr(prop, "value"); 30246185db85Sdougm entry = scf_entry_create(scf_handle->handle); 30256185db85Sdougm opttype = is_nodetype((void *)optionset, "optionset"); 30266185db85Sdougm 3027da6c28aaSamw /* 3028da6c28aaSamw * Check for share vs. resource since they need slightly 3029da6c28aaSamw * different treatment given the hierarchy. 3030da6c28aaSamw */ 30316185db85Sdougm if (valstr != NULL && entry != NULL) { 30326185db85Sdougm if (sa_is_share(group)) { 30336185db85Sdougm parent = sa_get_parent_group(group); 3034da6c28aaSamw share = (sa_share_t)group; 303557b448deSdougm if (parent != NULL) 30366185db85Sdougm iszfs = is_zfs_group(parent); 3037da6c28aaSamw } else if (sa_is_resource(group)) { 3038da6c28aaSamw share = sa_get_parent_group(group); 3039da6c28aaSamw if (share != NULL) 3040da6c28aaSamw parent = sa_get_parent_group(share); 30416185db85Sdougm } else { 30426185db85Sdougm iszfs = is_zfs_group(group); 30436185db85Sdougm } 30446185db85Sdougm if (!iszfs) { 30456185db85Sdougm if (scf_handle->trans == NULL) { 304657b448deSdougm char oname[SA_STRSIZE]; 30476185db85Sdougm char *groupname = NULL; 3048da6c28aaSamw if (share != NULL) { 3049da6c28aaSamw if (parent != NULL) 305057b448deSdougm groupname = 305157b448deSdougm sa_get_group_attr(parent, 305257b448deSdougm "name"); 3053da6c28aaSamw id = sa_get_share_attr( 3054da6c28aaSamw (sa_share_t)share, "id"); 30556185db85Sdougm } else { 305657b448deSdougm groupname = sa_get_group_attr(group, 305757b448deSdougm "name"); 30586185db85Sdougm } 30596185db85Sdougm if (groupname != NULL) { 306057b448deSdougm ret = sa_get_instance(scf_handle, 306157b448deSdougm groupname); 30626185db85Sdougm sa_free_attr_string(groupname); 30636185db85Sdougm } 30646185db85Sdougm if (opttype) 306557b448deSdougm (void) sa_optionset_name(optionset, 306657b448deSdougm oname, sizeof (oname), id); 30676185db85Sdougm else 306857b448deSdougm (void) sa_security_name(optionset, 306957b448deSdougm oname, sizeof (oname), id); 30706185db85Sdougm ret = sa_start_transaction(scf_handle, oname); 30716185db85Sdougm } 30726185db85Sdougm if (ret == SA_OK) { 30736185db85Sdougm switch (type) { 30746185db85Sdougm case SA_PROP_OP_REMOVE: 3075549ec3ffSdougm ret = scf_transaction_property_delete( 307657b448deSdougm scf_handle->trans, entry, name); 30776185db85Sdougm break; 30786185db85Sdougm case SA_PROP_OP_ADD: 30796185db85Sdougm case SA_PROP_OP_UPDATE: 308057b448deSdougm value = scf_value_create( 308157b448deSdougm scf_handle->handle); 308257b448deSdougm ret = add_or_update(scf_handle, type, 308357b448deSdougm value, entry, name, valstr); 30846185db85Sdougm break; 30856185db85Sdougm } 30866185db85Sdougm } 30876185db85Sdougm } else { 30886185db85Sdougm /* 30896185db85Sdougm * ZFS update. The calling function would have updated 30906185db85Sdougm * the internal XML structure. Just need to flag it as 30916185db85Sdougm * changed for ZFS. 30926185db85Sdougm */ 30936185db85Sdougm zfs_set_update((sa_share_t)group); 30946185db85Sdougm } 30956185db85Sdougm } 30966185db85Sdougm 30976185db85Sdougm if (name != NULL) 30986185db85Sdougm sa_free_attr_string(name); 30996185db85Sdougm if (valstr != NULL) 31006185db85Sdougm sa_free_attr_string(valstr); 31016185db85Sdougm else if (entry != NULL) 31026185db85Sdougm scf_entry_destroy(entry); 31036185db85Sdougm 31046185db85Sdougm if (ret == -1) 31056185db85Sdougm ret = SA_SYSTEM_ERR; 31066185db85Sdougm 31076185db85Sdougm return (ret); 31086185db85Sdougm } 31096185db85Sdougm 31106185db85Sdougm /* 31116185db85Sdougm * sa_create_property(name, value) 31126185db85Sdougm * 31136185db85Sdougm * Create a new property with the specified name and value. 31146185db85Sdougm */ 31156185db85Sdougm 31166185db85Sdougm sa_property_t 31176185db85Sdougm sa_create_property(char *name, char *value) 31186185db85Sdougm { 31196185db85Sdougm xmlNodePtr node; 31206185db85Sdougm 31216185db85Sdougm node = xmlNewNode(NULL, (xmlChar *)"option"); 31226185db85Sdougm if (node != NULL) { 31236185db85Sdougm xmlSetProp(node, (xmlChar *)"type", (xmlChar *)name); 31246185db85Sdougm xmlSetProp(node, (xmlChar *)"value", (xmlChar *)value); 31256185db85Sdougm } 31266185db85Sdougm return ((sa_property_t)node); 31276185db85Sdougm } 31286185db85Sdougm 31296185db85Sdougm /* 31306185db85Sdougm * sa_add_property(object, property) 31316185db85Sdougm * 31326185db85Sdougm * Add the specified property to the object. Issue the appropriate 31336185db85Sdougm * transaction or mark a ZFS object as needing an update. 31346185db85Sdougm */ 31356185db85Sdougm 31366185db85Sdougm int 31376185db85Sdougm sa_add_property(void *object, sa_property_t property) 31386185db85Sdougm { 31396185db85Sdougm int ret = SA_OK; 31406185db85Sdougm sa_group_t parent; 31416185db85Sdougm sa_group_t group; 31426185db85Sdougm char *proto; 31436185db85Sdougm 31446185db85Sdougm proto = sa_get_optionset_attr(object, "type"); 31456185db85Sdougm if (property != NULL) { 314657b448deSdougm if ((ret = sa_valid_property(object, proto, property)) == 314757b448deSdougm SA_OK) { 314857b448deSdougm property = (sa_property_t)xmlAddChild( 314957b448deSdougm (xmlNodePtr)object, (xmlNodePtr)property); 31506185db85Sdougm } else { 31516185db85Sdougm if (proto != NULL) 31526185db85Sdougm sa_free_attr_string(proto); 31536185db85Sdougm return (ret); 31546185db85Sdougm } 31556185db85Sdougm } 31566185db85Sdougm 31576185db85Sdougm if (proto != NULL) 31586185db85Sdougm sa_free_attr_string(proto); 31596185db85Sdougm 31606185db85Sdougm parent = sa_get_parent_group(object); 3161da6c28aaSamw if (!sa_is_persistent(parent)) 31626185db85Sdougm return (ret); 31636185db85Sdougm 3164da6c28aaSamw if (sa_is_resource(parent)) { 3165da6c28aaSamw /* 3166da6c28aaSamw * Resources are children of share. Need to go up two 3167da6c28aaSamw * levels to find the group but the parent needs to be 3168da6c28aaSamw * the share at this point in order to get the "id". 3169da6c28aaSamw */ 3170da6c28aaSamw parent = sa_get_parent_group(parent); 31716185db85Sdougm group = sa_get_parent_group(parent); 3172da6c28aaSamw } else if (sa_is_share(parent)) { 3173da6c28aaSamw group = sa_get_parent_group(parent); 3174da6c28aaSamw } else { 31756185db85Sdougm group = parent; 3176da6c28aaSamw } 31776185db85Sdougm 317857b448deSdougm if (property == NULL) { 31796185db85Sdougm ret = SA_NO_MEMORY; 318057b448deSdougm } else { 318157b448deSdougm char oname[SA_STRSIZE]; 31826185db85Sdougm 31836185db85Sdougm if (!is_zfs_group(group)) { 31846185db85Sdougm char *id = NULL; 3185549ec3ffSdougm sa_handle_impl_t impl_handle; 3186549ec3ffSdougm scfutilhandle_t *scf_handle; 3187549ec3ffSdougm 318857b448deSdougm impl_handle = (sa_handle_impl_t)sa_find_group_handle( 318957b448deSdougm group); 319057b448deSdougm if (impl_handle == NULL || 319157b448deSdougm impl_handle->scfhandle == NULL) 3192549ec3ffSdougm ret = SA_SYSTEM_ERR; 3193549ec3ffSdougm if (ret == SA_OK) { 3194549ec3ffSdougm scf_handle = impl_handle->scfhandle; 31956185db85Sdougm if (sa_is_share((sa_group_t)parent)) { 319657b448deSdougm id = sa_get_share_attr( 319757b448deSdougm (sa_share_t)parent, "id"); 31986185db85Sdougm } 31996185db85Sdougm if (scf_handle->trans == NULL) { 320057b448deSdougm if (is_nodetype(object, "optionset")) { 320157b448deSdougm (void) sa_optionset_name( 320257b448deSdougm (sa_optionset_t)object, 32036185db85Sdougm oname, sizeof (oname), id); 320457b448deSdougm } else { 320557b448deSdougm (void) sa_security_name( 320657b448deSdougm (sa_optionset_t)object, 32076185db85Sdougm oname, sizeof (oname), id); 320857b448deSdougm } 320957b448deSdougm ret = sa_start_transaction(scf_handle, 321057b448deSdougm oname); 32116185db85Sdougm } 32126185db85Sdougm if (ret == SA_OK) { 32136185db85Sdougm char *name; 32146185db85Sdougm char *value; 321557b448deSdougm name = sa_get_property_attr(property, 321657b448deSdougm "type"); 321757b448deSdougm value = sa_get_property_attr(property, 321857b448deSdougm "value"); 32196185db85Sdougm if (name != NULL && value != NULL) { 322057b448deSdougm if (scf_handle->scf_state == 322157b448deSdougm SCH_STATE_INIT) { 322257b448deSdougm ret = sa_set_property( 322357b448deSdougm scf_handle, name, 322457b448deSdougm value); 322557b448deSdougm } 322657b448deSdougm } else { 32276185db85Sdougm ret = SA_CONFIG_ERR; 322857b448deSdougm } 32296185db85Sdougm if (name != NULL) 323057b448deSdougm sa_free_attr_string( 323157b448deSdougm name); 32326185db85Sdougm if (value != NULL) 32336185db85Sdougm sa_free_attr_string(value); 32346185db85Sdougm } 32356185db85Sdougm if (id != NULL) 32366185db85Sdougm sa_free_attr_string(id); 3237549ec3ffSdougm } 32386185db85Sdougm } else { 32396185db85Sdougm /* 324057b448deSdougm * ZFS is a special case. We do want 324157b448deSdougm * to allow editing property/security 324257b448deSdougm * lists since we can have a better 324357b448deSdougm * syntax and we also want to keep 324457b448deSdougm * things consistent when possible. 32456185db85Sdougm * 324657b448deSdougm * Right now, we defer until the 324757b448deSdougm * sa_commit_properties so we can get 324857b448deSdougm * them all at once. We do need to 324957b448deSdougm * mark the share as "changed" 32506185db85Sdougm */ 32516185db85Sdougm zfs_set_update((sa_share_t)parent); 32526185db85Sdougm } 32536185db85Sdougm } 32546185db85Sdougm return (ret); 32556185db85Sdougm } 32566185db85Sdougm 32576185db85Sdougm /* 32586185db85Sdougm * sa_remove_property(property) 32596185db85Sdougm * 32606185db85Sdougm * Remove the specied property from its containing object. Update the 32616185db85Sdougm * repository as appropriate. 32626185db85Sdougm */ 32636185db85Sdougm 32646185db85Sdougm int 32656185db85Sdougm sa_remove_property(sa_property_t property) 32666185db85Sdougm { 32676185db85Sdougm int ret = SA_OK; 32686185db85Sdougm 32696185db85Sdougm if (property != NULL) { 32706185db85Sdougm sa_optionset_t optionset; 32716185db85Sdougm sa_group_t group; 32726185db85Sdougm optionset = sa_get_property_parent(property); 32736185db85Sdougm if (optionset != NULL) { 32746185db85Sdougm group = sa_get_optionset_parent(optionset); 32756185db85Sdougm if (group != NULL) { 327657b448deSdougm ret = sa_set_prop_by_prop(optionset, group, 327757b448deSdougm property, SA_PROP_OP_REMOVE); 32786185db85Sdougm } 32796185db85Sdougm } 32806185db85Sdougm xmlUnlinkNode((xmlNodePtr)property); 32816185db85Sdougm xmlFreeNode((xmlNodePtr)property); 32826185db85Sdougm } else { 32836185db85Sdougm ret = SA_NO_SUCH_PROP; 32846185db85Sdougm } 32856185db85Sdougm return (ret); 32866185db85Sdougm } 32876185db85Sdougm 32886185db85Sdougm /* 32896185db85Sdougm * sa_update_property(property, value) 32906185db85Sdougm * 32916185db85Sdougm * Update the specified property to the new value. If value is NULL, 32926185db85Sdougm * we currently treat this as a remove. 32936185db85Sdougm */ 32946185db85Sdougm 32956185db85Sdougm int 32966185db85Sdougm sa_update_property(sa_property_t property, char *value) 32976185db85Sdougm { 32986185db85Sdougm int ret = SA_OK; 32996185db85Sdougm if (value == NULL) { 33006185db85Sdougm return (sa_remove_property(property)); 33016185db85Sdougm } else { 33026185db85Sdougm sa_optionset_t optionset; 33036185db85Sdougm sa_group_t group; 33046185db85Sdougm set_node_attr((void *)property, "value", value); 33056185db85Sdougm optionset = sa_get_property_parent(property); 33066185db85Sdougm if (optionset != NULL) { 33076185db85Sdougm group = sa_get_optionset_parent(optionset); 33086185db85Sdougm if (group != NULL) { 330957b448deSdougm ret = sa_set_prop_by_prop(optionset, group, 331057b448deSdougm property, SA_PROP_OP_UPDATE); 33116185db85Sdougm } 33126185db85Sdougm } else { 33136185db85Sdougm ret = SA_NO_SUCH_PROP; 33146185db85Sdougm } 33156185db85Sdougm } 33166185db85Sdougm return (ret); 33176185db85Sdougm } 33186185db85Sdougm 33196185db85Sdougm /* 33206185db85Sdougm * sa_get_protocol_property(propset, prop) 33216185db85Sdougm * 33226185db85Sdougm * Get the specified protocol specific property. These are global to 33236185db85Sdougm * the protocol and not specific to a group or share. 33246185db85Sdougm */ 33256185db85Sdougm 33266185db85Sdougm sa_property_t 33276185db85Sdougm sa_get_protocol_property(sa_protocol_properties_t propset, char *prop) 33286185db85Sdougm { 33296185db85Sdougm xmlNodePtr node = (xmlNodePtr)propset; 33306185db85Sdougm xmlChar *value = NULL; 33316185db85Sdougm 33326185db85Sdougm for (node = node->children; node != NULL; 33336185db85Sdougm node = node->next) { 33346185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"option") == 0) { 33356185db85Sdougm if (prop == NULL) 33366185db85Sdougm break; 33376185db85Sdougm value = xmlGetProp(node, (xmlChar *)"type"); 33386185db85Sdougm if (value != NULL && 33396185db85Sdougm xmlStrcasecmp(value, (xmlChar *)prop) == 0) { 33406185db85Sdougm break; 33416185db85Sdougm } 33426185db85Sdougm if (value != NULL) { 33436185db85Sdougm xmlFree(value); 33446185db85Sdougm value = NULL; 33456185db85Sdougm } 33466185db85Sdougm } 33476185db85Sdougm } 33486185db85Sdougm if (value != NULL) 33496185db85Sdougm xmlFree(value); 33506185db85Sdougm if (node != NULL && xmlStrcmp(node->name, (xmlChar *)"option") != 0) { 335157b448deSdougm /* 335257b448deSdougm * avoid a non option node -- it is possible to be a 335357b448deSdougm * text node 335457b448deSdougm */ 33556185db85Sdougm node = NULL; 33566185db85Sdougm } 33576185db85Sdougm return ((sa_property_t)node); 33586185db85Sdougm } 33596185db85Sdougm 33606185db85Sdougm /* 33616185db85Sdougm * sa_get_next_protocol_property(prop) 33626185db85Sdougm * 33636185db85Sdougm * Get the next protocol specific property in the list. 33646185db85Sdougm */ 33656185db85Sdougm 33666185db85Sdougm sa_property_t 33676185db85Sdougm sa_get_next_protocol_property(sa_property_t prop) 33686185db85Sdougm { 33696185db85Sdougm xmlNodePtr node; 33706185db85Sdougm 33716185db85Sdougm for (node = ((xmlNodePtr)prop)->next; node != NULL; 33726185db85Sdougm node = node->next) { 33736185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"option") == 0) { 33746185db85Sdougm break; 33756185db85Sdougm } 33766185db85Sdougm } 33776185db85Sdougm return ((sa_property_t)node); 33786185db85Sdougm } 33796185db85Sdougm 33806185db85Sdougm /* 33816185db85Sdougm * sa_set_protocol_property(prop, value) 33826185db85Sdougm * 33836185db85Sdougm * Set the specified property to have the new value. The protocol 33846185db85Sdougm * specific plugin will then be called to update the property. 33856185db85Sdougm */ 33866185db85Sdougm 33876185db85Sdougm int 33886185db85Sdougm sa_set_protocol_property(sa_property_t prop, char *value) 33896185db85Sdougm { 33906185db85Sdougm sa_protocol_properties_t propset; 33916185db85Sdougm char *proto; 33926185db85Sdougm int ret = SA_INVALID_PROTOCOL; 33936185db85Sdougm 33946185db85Sdougm propset = ((xmlNodePtr)prop)->parent; 33956185db85Sdougm if (propset != NULL) { 33966185db85Sdougm proto = sa_get_optionset_attr(propset, "type"); 33976185db85Sdougm if (proto != NULL) { 33986185db85Sdougm set_node_attr((xmlNodePtr)prop, "value", value); 33996185db85Sdougm ret = sa_proto_set_property(proto, prop); 34003472f5dcSdougm sa_free_attr_string(proto); 34016185db85Sdougm } 34026185db85Sdougm } 34036185db85Sdougm return (ret); 34046185db85Sdougm } 34056185db85Sdougm 34066185db85Sdougm /* 34076185db85Sdougm * sa_add_protocol_property(propset, prop) 34086185db85Sdougm * 3409da6c28aaSamw * Add a new property to the protocol specific property set. 34106185db85Sdougm */ 34116185db85Sdougm 34126185db85Sdougm int 34136185db85Sdougm sa_add_protocol_property(sa_protocol_properties_t propset, sa_property_t prop) 34146185db85Sdougm { 34156185db85Sdougm xmlNodePtr node; 34166185db85Sdougm 34176185db85Sdougm /* should check for legitimacy */ 34186185db85Sdougm node = xmlAddChild((xmlNodePtr)propset, (xmlNodePtr)prop); 34196185db85Sdougm if (node != NULL) 34206185db85Sdougm return (SA_OK); 34216185db85Sdougm return (SA_NO_MEMORY); 34226185db85Sdougm } 34236185db85Sdougm 34246185db85Sdougm /* 34256185db85Sdougm * sa_create_protocol_properties(proto) 34266185db85Sdougm * 3427da6c28aaSamw * Create a protocol specific property set. 34286185db85Sdougm */ 34296185db85Sdougm 34306185db85Sdougm sa_protocol_properties_t 34316185db85Sdougm sa_create_protocol_properties(char *proto) 34326185db85Sdougm { 34336185db85Sdougm xmlNodePtr node; 343457b448deSdougm 34356185db85Sdougm node = xmlNewNode(NULL, (xmlChar *)"propertyset"); 343657b448deSdougm if (node != NULL) 34376185db85Sdougm xmlSetProp(node, (xmlChar *)"type", (xmlChar *)proto); 34386185db85Sdougm return (node); 34396185db85Sdougm } 3440da6c28aaSamw 3441da6c28aaSamw /* 3442da6c28aaSamw * sa_get_share_resource(share, resource) 3443da6c28aaSamw * 3444da6c28aaSamw * Get the named resource from the share, if it exists. If resource is 3445da6c28aaSamw * NULL, get the first resource. 3446da6c28aaSamw */ 3447da6c28aaSamw 3448da6c28aaSamw sa_resource_t 3449da6c28aaSamw sa_get_share_resource(sa_share_t share, char *resource) 3450da6c28aaSamw { 3451da6c28aaSamw xmlNodePtr node = NULL; 3452da6c28aaSamw xmlChar *name; 3453da6c28aaSamw 3454da6c28aaSamw if (share != NULL) { 3455da6c28aaSamw for (node = ((xmlNodePtr)share)->children; node != NULL; 3456da6c28aaSamw node = node->next) { 3457da6c28aaSamw if (xmlStrcmp(node->name, (xmlChar *)"resource") == 0) { 3458da6c28aaSamw if (resource == NULL) { 3459da6c28aaSamw /* 3460da6c28aaSamw * We are looking for the first 3461da6c28aaSamw * resource node and not a names 3462da6c28aaSamw * resource. 3463da6c28aaSamw */ 3464da6c28aaSamw break; 3465da6c28aaSamw } else { 3466da6c28aaSamw /* is it the correct share? */ 3467da6c28aaSamw name = xmlGetProp(node, 3468da6c28aaSamw (xmlChar *)"name"); 3469da6c28aaSamw if (name != NULL && 3470da6c28aaSamw xmlStrcasecmp(name, 3471da6c28aaSamw (xmlChar *)resource) == 0) { 3472da6c28aaSamw xmlFree(name); 3473da6c28aaSamw break; 3474da6c28aaSamw } 3475da6c28aaSamw xmlFree(name); 3476da6c28aaSamw } 3477da6c28aaSamw } 3478da6c28aaSamw } 3479da6c28aaSamw } 3480da6c28aaSamw return ((sa_resource_t)node); 3481da6c28aaSamw } 3482da6c28aaSamw 3483da6c28aaSamw /* 3484da6c28aaSamw * sa_get_next_resource(resource) 3485da6c28aaSamw * Return the next share following the specified share 3486da6c28aaSamw * from the internal list of shares. Returns NULL if there 3487da6c28aaSamw * are no more shares. The list is relative to the same 3488da6c28aaSamw * group. 3489da6c28aaSamw */ 3490da6c28aaSamw sa_share_t 3491da6c28aaSamw sa_get_next_resource(sa_resource_t resource) 3492da6c28aaSamw { 3493da6c28aaSamw xmlNodePtr node = NULL; 3494da6c28aaSamw 3495da6c28aaSamw if (resource != NULL) { 3496da6c28aaSamw for (node = ((xmlNodePtr)resource)->next; node != NULL; 3497da6c28aaSamw node = node->next) { 3498da6c28aaSamw if (xmlStrcmp(node->name, (xmlChar *)"resource") == 0) 3499da6c28aaSamw break; 3500da6c28aaSamw } 3501da6c28aaSamw } 3502da6c28aaSamw return ((sa_share_t)node); 3503da6c28aaSamw } 3504da6c28aaSamw 3505da6c28aaSamw /* 3506da6c28aaSamw * _sa_get_next_resource_index(share) 3507da6c28aaSamw * 3508da6c28aaSamw * get the next resource index number (one greater then current largest) 3509da6c28aaSamw */ 3510da6c28aaSamw 3511da6c28aaSamw static int 3512da6c28aaSamw _sa_get_next_resource_index(sa_share_t share) 3513da6c28aaSamw { 3514da6c28aaSamw sa_resource_t resource; 3515da6c28aaSamw int index = 0; 3516da6c28aaSamw char *id; 3517da6c28aaSamw 3518da6c28aaSamw for (resource = sa_get_share_resource(share, NULL); 3519da6c28aaSamw resource != NULL; 3520da6c28aaSamw resource = sa_get_next_resource(resource)) { 3521da6c28aaSamw id = get_node_attr((void *)resource, "id"); 3522da6c28aaSamw if (id != NULL) { 3523da6c28aaSamw int val; 3524da6c28aaSamw val = atoi(id); 3525da6c28aaSamw if (val > index) 3526da6c28aaSamw index = val; 3527da6c28aaSamw sa_free_attr_string(id); 3528da6c28aaSamw } 3529da6c28aaSamw } 3530da6c28aaSamw return (index + 1); 3531da6c28aaSamw } 3532da6c28aaSamw 3533da6c28aaSamw 3534da6c28aaSamw /* 3535da6c28aaSamw * sa_add_resource(share, resource, persist, &err) 3536da6c28aaSamw * 3537da6c28aaSamw * Adds a new resource name associated with share. The resource name 3538da6c28aaSamw * must be unique in the system and will be case insensitive (eventually). 3539da6c28aaSamw */ 3540da6c28aaSamw 3541da6c28aaSamw sa_resource_t 3542da6c28aaSamw sa_add_resource(sa_share_t share, char *resource, int persist, int *error) 3543da6c28aaSamw { 3544da6c28aaSamw xmlNodePtr node; 3545da6c28aaSamw int err = SA_OK; 3546da6c28aaSamw sa_resource_t res; 3547da6c28aaSamw sa_group_t group; 3548da6c28aaSamw sa_handle_t handle; 3549da6c28aaSamw char istring[8]; /* just big enough for an integer value */ 3550da6c28aaSamw int index; 3551da6c28aaSamw 3552da6c28aaSamw group = sa_get_parent_group(share); 3553da6c28aaSamw handle = sa_find_group_handle(group); 3554da6c28aaSamw res = sa_find_resource(handle, resource); 3555da6c28aaSamw if (res != NULL) { 3556da6c28aaSamw err = SA_DUPLICATE_NAME; 3557da6c28aaSamw res = NULL; 3558da6c28aaSamw } else { 3559da6c28aaSamw node = xmlNewChild((xmlNodePtr)share, NULL, 3560da6c28aaSamw (xmlChar *)"resource", NULL); 3561da6c28aaSamw if (node != NULL) { 3562da6c28aaSamw xmlSetProp(node, (xmlChar *)"name", 3563da6c28aaSamw (xmlChar *)resource); 3564da6c28aaSamw xmlSetProp(node, (xmlChar *)"type", persist ? 3565da6c28aaSamw (xmlChar *)"persist" : (xmlChar *)"transient"); 3566da6c28aaSamw if (persist != SA_SHARE_TRANSIENT) { 3567da6c28aaSamw index = _sa_get_next_resource_index(share); 3568da6c28aaSamw (void) snprintf(istring, sizeof (istring), "%d", 3569da6c28aaSamw index); 3570da6c28aaSamw xmlSetProp(node, (xmlChar *)"id", 3571da6c28aaSamw (xmlChar *)istring); 3572da6c28aaSamw if (!sa_group_is_zfs(group) && 3573da6c28aaSamw sa_is_persistent((sa_group_t)share)) { 3574da6c28aaSamw /* ZFS doesn't use resource names */ 3575da6c28aaSamw sa_handle_impl_t ihandle; 3576da6c28aaSamw ihandle = (sa_handle_impl_t) 3577da6c28aaSamw sa_find_group_handle( 3578da6c28aaSamw group); 3579da6c28aaSamw if (ihandle != NULL) 3580da6c28aaSamw err = sa_commit_share( 3581da6c28aaSamw ihandle->scfhandle, group, 3582da6c28aaSamw share); 3583da6c28aaSamw else 3584da6c28aaSamw err = SA_SYSTEM_ERR; 3585da6c28aaSamw } 3586da6c28aaSamw } 3587da6c28aaSamw } 3588da6c28aaSamw } 3589da6c28aaSamw if (error != NULL) 3590da6c28aaSamw *error = err; 3591da6c28aaSamw return ((sa_resource_t)node); 3592da6c28aaSamw } 3593da6c28aaSamw 3594da6c28aaSamw /* 3595da6c28aaSamw * sa_remove_resource(resource) 3596da6c28aaSamw * 3597da6c28aaSamw * Remove the resource name from the share (and the system) 3598da6c28aaSamw */ 3599da6c28aaSamw 3600da6c28aaSamw int 3601da6c28aaSamw sa_remove_resource(sa_resource_t resource) 3602da6c28aaSamw { 3603da6c28aaSamw sa_share_t share; 3604da6c28aaSamw sa_group_t group; 3605da6c28aaSamw char *type; 3606da6c28aaSamw int ret = SA_OK; 3607da6c28aaSamw int transient = 0; 360855bf511dSas200622 sa_optionset_t opt; 3609da6c28aaSamw 3610da6c28aaSamw share = sa_get_resource_parent(resource); 3611da6c28aaSamw type = sa_get_share_attr(share, "type"); 3612da6c28aaSamw group = sa_get_parent_group(share); 3613da6c28aaSamw 3614da6c28aaSamw 3615da6c28aaSamw if (type != NULL) { 3616da6c28aaSamw if (strcmp(type, "persist") != 0) 3617da6c28aaSamw transient = 1; 3618da6c28aaSamw sa_free_attr_string(type); 3619da6c28aaSamw } 3620da6c28aaSamw 362155bf511dSas200622 /* Disable the resource for all protocols. */ 362255bf511dSas200622 (void) sa_disable_resource(resource, NULL); 362355bf511dSas200622 362455bf511dSas200622 /* Remove any optionsets from the resource. */ 362555bf511dSas200622 for (opt = sa_get_optionset(resource, NULL); 362655bf511dSas200622 opt != NULL; 362755bf511dSas200622 opt = sa_get_next_optionset(opt)) 362855bf511dSas200622 (void) sa_destroy_optionset(opt); 362955bf511dSas200622 3630da6c28aaSamw /* Remove from the share */ 3631da6c28aaSamw xmlUnlinkNode((xmlNode *)resource); 3632da6c28aaSamw xmlFreeNode((xmlNode *)resource); 3633da6c28aaSamw 3634da6c28aaSamw /* only do SMF action if permanent and not ZFS */ 3635da6c28aaSamw if (!transient && !sa_group_is_zfs(group)) { 3636da6c28aaSamw sa_handle_impl_t ihandle; 3637da6c28aaSamw ihandle = (sa_handle_impl_t)sa_find_group_handle(group); 3638da6c28aaSamw if (ihandle != NULL) 3639da6c28aaSamw ret = sa_commit_share(ihandle->scfhandle, group, share); 3640da6c28aaSamw else 3641da6c28aaSamw ret = SA_SYSTEM_ERR; 3642da6c28aaSamw } 3643da6c28aaSamw return (ret); 3644da6c28aaSamw } 3645da6c28aaSamw 3646da6c28aaSamw /* 3647da6c28aaSamw * proto_resource_rename(handle, group, resource, newname) 3648da6c28aaSamw * 3649da6c28aaSamw * Helper function for sa_rename_resource that notifies the protocol 3650da6c28aaSamw * of a resource name change prior to a config repository update. 3651da6c28aaSamw */ 3652da6c28aaSamw static int 3653da6c28aaSamw proto_rename_resource(sa_handle_t handle, sa_group_t group, 3654da6c28aaSamw sa_resource_t resource, char *newname) 3655da6c28aaSamw { 3656da6c28aaSamw sa_optionset_t optionset; 3657da6c28aaSamw int ret = SA_OK; 3658da6c28aaSamw int err; 3659da6c28aaSamw 3660da6c28aaSamw for (optionset = sa_get_optionset(group, NULL); 3661da6c28aaSamw optionset != NULL; 3662da6c28aaSamw optionset = sa_get_next_optionset(optionset)) { 3663da6c28aaSamw char *type; 3664da6c28aaSamw type = sa_get_optionset_attr(optionset, "type"); 3665da6c28aaSamw if (type != NULL) { 3666da6c28aaSamw err = sa_proto_rename_resource(handle, type, resource, 3667da6c28aaSamw newname); 3668da6c28aaSamw if (err != SA_OK) 3669da6c28aaSamw ret = err; 3670da6c28aaSamw sa_free_attr_string(type); 3671da6c28aaSamw } 3672da6c28aaSamw } 3673da6c28aaSamw return (ret); 3674da6c28aaSamw } 3675da6c28aaSamw 3676da6c28aaSamw /* 3677da6c28aaSamw * sa_rename_resource(resource, newname) 3678da6c28aaSamw * 3679da6c28aaSamw * Rename the resource to the new name, if it is unique. 3680da6c28aaSamw */ 3681da6c28aaSamw 3682da6c28aaSamw int 3683da6c28aaSamw sa_rename_resource(sa_resource_t resource, char *newname) 3684da6c28aaSamw { 3685da6c28aaSamw sa_share_t share; 3686da6c28aaSamw sa_group_t group = NULL; 3687da6c28aaSamw sa_resource_t target; 3688da6c28aaSamw int ret = SA_CONFIG_ERR; 3689da6c28aaSamw sa_handle_t handle = NULL; 3690da6c28aaSamw 3691da6c28aaSamw share = sa_get_resource_parent(resource); 3692da6c28aaSamw if (share == NULL) 3693da6c28aaSamw return (ret); 3694da6c28aaSamw 3695da6c28aaSamw group = sa_get_parent_group(share); 3696da6c28aaSamw if (group == NULL) 3697da6c28aaSamw return (ret); 3698da6c28aaSamw 3699da6c28aaSamw handle = (sa_handle_impl_t)sa_find_group_handle(group); 3700da6c28aaSamw if (handle == NULL) 3701da6c28aaSamw return (ret); 3702da6c28aaSamw 3703da6c28aaSamw target = sa_find_resource(handle, newname); 3704da6c28aaSamw if (target != NULL) { 3705da6c28aaSamw ret = SA_DUPLICATE_NAME; 3706da6c28aaSamw } else { 3707da6c28aaSamw /* 3708da6c28aaSamw * Everything appears to be valid at this 3709da6c28aaSamw * point. Change the name of the active share and then 3710da6c28aaSamw * update the share in the appropriate repository. 3711da6c28aaSamw */ 3712da6c28aaSamw ret = proto_rename_resource(handle, group, resource, newname); 3713da6c28aaSamw set_node_attr(resource, "name", newname); 3714da6c28aaSamw if (!sa_group_is_zfs(group) && 3715da6c28aaSamw sa_is_persistent((sa_group_t)share)) { 3716da6c28aaSamw sa_handle_impl_t ihandle = (sa_handle_impl_t)handle; 3717da6c28aaSamw ret = sa_commit_share(ihandle->scfhandle, group, 3718da6c28aaSamw share); 3719da6c28aaSamw } 3720da6c28aaSamw } 3721da6c28aaSamw return (ret); 3722da6c28aaSamw } 3723da6c28aaSamw 3724da6c28aaSamw /* 3725da6c28aaSamw * sa_get_resource_attr(resource, tag) 3726da6c28aaSamw * 3727da6c28aaSamw * Get the named attribute of the resource. "name" and "id" are 3728da6c28aaSamw * currently defined. NULL if tag not defined. 3729da6c28aaSamw */ 3730da6c28aaSamw 3731da6c28aaSamw char * 3732da6c28aaSamw sa_get_resource_attr(sa_resource_t resource, char *tag) 3733da6c28aaSamw { 3734da6c28aaSamw return (get_node_attr((void *)resource, tag)); 3735da6c28aaSamw } 3736da6c28aaSamw 3737da6c28aaSamw /* 3738da6c28aaSamw * sa_set_resource_attr(resource, tag, value) 3739da6c28aaSamw * 3740da6c28aaSamw * Get the named attribute of the resource. "name" and "id" are 3741da6c28aaSamw * currently defined. NULL if tag not defined. Currently we don't do 3742da6c28aaSamw * much, but additional checking may be needed in the future. 3743da6c28aaSamw */ 3744da6c28aaSamw 3745da6c28aaSamw int 3746da6c28aaSamw sa_set_resource_attr(sa_resource_t resource, char *tag, char *value) 3747da6c28aaSamw { 3748da6c28aaSamw set_node_attr((void *)resource, tag, value); 3749da6c28aaSamw return (SA_OK); 3750da6c28aaSamw } 3751da6c28aaSamw 3752da6c28aaSamw /* 3753da6c28aaSamw * sa_get_resource_parent(resource_t) 3754da6c28aaSamw * 3755da6c28aaSamw * Returns the share associated with the resource. 3756da6c28aaSamw */ 3757da6c28aaSamw 3758da6c28aaSamw sa_share_t 3759da6c28aaSamw sa_get_resource_parent(sa_resource_t resource) 3760da6c28aaSamw { 3761da6c28aaSamw sa_share_t share = NULL; 3762da6c28aaSamw 3763da6c28aaSamw if (resource != NULL) 3764da6c28aaSamw share = (sa_share_t)((xmlNodePtr)resource)->parent; 3765da6c28aaSamw return (share); 3766da6c28aaSamw } 3767da6c28aaSamw 3768da6c28aaSamw /* 3769da6c28aaSamw * find_resource(group, name) 3770da6c28aaSamw * 3771da6c28aaSamw * Find the resource within the group. 3772da6c28aaSamw */ 3773da6c28aaSamw 3774da6c28aaSamw static sa_resource_t 3775da6c28aaSamw find_resource(sa_group_t group, char *resname) 3776da6c28aaSamw { 3777da6c28aaSamw sa_share_t share; 3778da6c28aaSamw sa_resource_t resource = NULL; 3779da6c28aaSamw char *name; 3780da6c28aaSamw 3781da6c28aaSamw /* Iterate over all the shares and resources in the group. */ 3782da6c28aaSamw for (share = sa_get_share(group, NULL); 3783da6c28aaSamw share != NULL && resource == NULL; 3784da6c28aaSamw share = sa_get_next_share(share)) { 3785da6c28aaSamw for (resource = sa_get_share_resource(share, NULL); 3786da6c28aaSamw resource != NULL; 3787da6c28aaSamw resource = sa_get_next_resource(resource)) { 3788da6c28aaSamw name = sa_get_resource_attr(resource, "name"); 3789da6c28aaSamw if (name != NULL && xmlStrcasecmp((xmlChar*)name, 3790da6c28aaSamw (xmlChar*)resname) == 0) { 3791da6c28aaSamw sa_free_attr_string(name); 3792da6c28aaSamw break; 3793da6c28aaSamw } 3794da6c28aaSamw if (name != NULL) { 3795da6c28aaSamw sa_free_attr_string(name); 3796da6c28aaSamw } 3797da6c28aaSamw } 3798da6c28aaSamw } 3799da6c28aaSamw return (resource); 3800da6c28aaSamw } 3801da6c28aaSamw 3802da6c28aaSamw /* 3803da6c28aaSamw * sa_find_resource(name) 3804da6c28aaSamw * 3805da6c28aaSamw * Find the named resource in the system. 3806da6c28aaSamw */ 3807da6c28aaSamw 3808da6c28aaSamw sa_resource_t 3809da6c28aaSamw sa_find_resource(sa_handle_t handle, char *name) 3810da6c28aaSamw { 3811da6c28aaSamw sa_group_t group; 3812da6c28aaSamw sa_group_t zgroup; 3813da6c28aaSamw sa_resource_t resource = NULL; 3814da6c28aaSamw 3815da6c28aaSamw /* 3816da6c28aaSamw * Iterate over all groups and zfs subgroups and check for 3817da6c28aaSamw * resource name in them. 3818da6c28aaSamw */ 3819da6c28aaSamw for (group = sa_get_group(handle, NULL); group != NULL; 3820da6c28aaSamw group = sa_get_next_group(group)) { 3821da6c28aaSamw 3822da6c28aaSamw if (is_zfs_group(group)) { 3823da6c28aaSamw for (zgroup = 3824da6c28aaSamw (sa_group_t)_sa_get_child_node((xmlNodePtr)group, 3825da6c28aaSamw (xmlChar *)"group"); 3826da6c28aaSamw zgroup != NULL && resource == NULL; 3827da6c28aaSamw zgroup = sa_get_next_group(zgroup)) { 3828da6c28aaSamw resource = find_resource(zgroup, name); 3829da6c28aaSamw } 3830da6c28aaSamw } else { 3831da6c28aaSamw resource = find_resource(group, name); 3832da6c28aaSamw } 3833da6c28aaSamw if (resource != NULL) 3834da6c28aaSamw break; 3835da6c28aaSamw } 3836da6c28aaSamw return (resource); 3837da6c28aaSamw } 3838da6c28aaSamw 3839da6c28aaSamw /* 3840da6c28aaSamw * sa_get_resource(group, resource) 3841da6c28aaSamw * 3842da6c28aaSamw * Search all the shares in the specified group for a share with a 3843da6c28aaSamw * resource name matching the one specified. 3844da6c28aaSamw * 3845da6c28aaSamw * In the future, it may be advantageous to allow group to be NULL and 3846da6c28aaSamw * search all groups but that isn't needed at present. 3847da6c28aaSamw */ 3848da6c28aaSamw 3849da6c28aaSamw sa_resource_t 3850da6c28aaSamw sa_get_resource(sa_group_t group, char *resource) 3851da6c28aaSamw { 3852da6c28aaSamw sa_share_t share = NULL; 3853da6c28aaSamw sa_resource_t res = NULL; 3854da6c28aaSamw 3855da6c28aaSamw if (resource != NULL) { 3856da6c28aaSamw for (share = sa_get_share(group, NULL); 3857da6c28aaSamw share != NULL && res == NULL; 3858da6c28aaSamw share = sa_get_next_share(share)) { 3859da6c28aaSamw res = sa_get_share_resource(share, resource); 3860da6c28aaSamw } 3861da6c28aaSamw } 3862da6c28aaSamw return (res); 3863da6c28aaSamw } 3864da6c28aaSamw 3865da6c28aaSamw /* 3866da6c28aaSamw * sa_enable_resource, protocol) 3867da6c28aaSamw * Disable the specified share to the specified protocol. 3868da6c28aaSamw * If protocol is NULL, then all protocols. 3869da6c28aaSamw */ 3870da6c28aaSamw int 3871da6c28aaSamw sa_enable_resource(sa_resource_t resource, char *protocol) 3872da6c28aaSamw { 3873da6c28aaSamw int ret = SA_OK; 3874da6c28aaSamw char **protocols; 3875da6c28aaSamw int numproto; 3876da6c28aaSamw 3877da6c28aaSamw if (protocol != NULL) { 3878da6c28aaSamw ret = sa_proto_share_resource(protocol, resource); 3879da6c28aaSamw } else { 3880da6c28aaSamw /* need to do all protocols */ 3881da6c28aaSamw if ((numproto = sa_get_protocols(&protocols)) >= 0) { 3882da6c28aaSamw int i, err; 3883da6c28aaSamw for (i = 0; i < numproto; i++) { 3884da6c28aaSamw err = sa_proto_share_resource( 3885da6c28aaSamw protocols[i], resource); 3886da6c28aaSamw if (err != SA_OK) 3887da6c28aaSamw ret = err; 3888da6c28aaSamw } 3889da6c28aaSamw free(protocols); 3890da6c28aaSamw } 3891da6c28aaSamw } 3892da6c28aaSamw if (ret == SA_OK) 3893da6c28aaSamw (void) sa_set_resource_attr(resource, "shared", NULL); 3894da6c28aaSamw 3895da6c28aaSamw return (ret); 3896da6c28aaSamw } 3897da6c28aaSamw 3898da6c28aaSamw /* 3899da6c28aaSamw * sa_disable_resource(resource, protocol) 3900da6c28aaSamw * 3901da6c28aaSamw * Disable the specified share for the specified protocol. If 3902da6c28aaSamw * protocol is NULL, then all protocols. If the underlying 3903da6c28aaSamw * protocol doesn't implement disable at the resource level, we 3904da6c28aaSamw * disable at the share level. 3905da6c28aaSamw */ 3906da6c28aaSamw int 3907da6c28aaSamw sa_disable_resource(sa_resource_t resource, char *protocol) 3908da6c28aaSamw { 3909da6c28aaSamw int ret = SA_OK; 3910da6c28aaSamw char **protocols; 3911da6c28aaSamw int numproto; 3912da6c28aaSamw 3913da6c28aaSamw if (protocol != NULL) { 3914da6c28aaSamw ret = sa_proto_unshare_resource(protocol, resource); 3915da6c28aaSamw if (ret == SA_NOT_IMPLEMENTED) { 3916da6c28aaSamw sa_share_t parent; 3917da6c28aaSamw /* 3918da6c28aaSamw * The protocol doesn't implement unshare 3919da6c28aaSamw * resource. That implies that resource names are 3920da6c28aaSamw * simple aliases for this protocol so we need to 3921da6c28aaSamw * unshare the share. 3922da6c28aaSamw */ 3923da6c28aaSamw parent = sa_get_resource_parent(resource); 3924da6c28aaSamw if (parent != NULL) 3925da6c28aaSamw ret = sa_disable_share(parent, protocol); 3926da6c28aaSamw else 3927da6c28aaSamw ret = SA_CONFIG_ERR; 3928da6c28aaSamw } 3929da6c28aaSamw } else { 3930da6c28aaSamw /* need to do all protocols */ 3931da6c28aaSamw if ((numproto = sa_get_protocols(&protocols)) >= 0) { 3932da6c28aaSamw int i, err; 3933da6c28aaSamw for (i = 0; i < numproto; i++) { 3934da6c28aaSamw err = sa_proto_unshare_resource(protocols[i], 3935da6c28aaSamw resource); 3936da6c28aaSamw if (err == SA_NOT_SUPPORTED) { 3937da6c28aaSamw sa_share_t parent; 3938da6c28aaSamw parent = sa_get_resource_parent( 3939da6c28aaSamw resource); 3940da6c28aaSamw if (parent != NULL) 3941da6c28aaSamw err = sa_disable_share(parent, 3942da6c28aaSamw protocols[i]); 3943da6c28aaSamw else 3944da6c28aaSamw err = SA_CONFIG_ERR; 3945da6c28aaSamw } 3946da6c28aaSamw if (err != SA_OK) 3947da6c28aaSamw ret = err; 3948da6c28aaSamw } 3949da6c28aaSamw free(protocols); 3950da6c28aaSamw } 3951da6c28aaSamw } 3952da6c28aaSamw if (ret == SA_OK) 3953da6c28aaSamw (void) sa_set_resource_attr(resource, "shared", NULL); 3954da6c28aaSamw 3955da6c28aaSamw return (ret); 3956da6c28aaSamw } 3957da6c28aaSamw 3958da6c28aaSamw /* 3959da6c28aaSamw * sa_set_resource_description(resource, content) 3960da6c28aaSamw * 3961da6c28aaSamw * Set the description of share to content. 3962da6c28aaSamw */ 3963da6c28aaSamw 3964da6c28aaSamw int 3965da6c28aaSamw sa_set_resource_description(sa_resource_t resource, char *content) 3966da6c28aaSamw { 3967da6c28aaSamw xmlNodePtr node; 3968da6c28aaSamw sa_group_t group; 3969da6c28aaSamw sa_share_t share; 3970da6c28aaSamw int ret = SA_OK; 3971da6c28aaSamw 3972da6c28aaSamw for (node = ((xmlNodePtr)resource)->children; 3973da6c28aaSamw node != NULL; 3974da6c28aaSamw node = node->next) { 3975da6c28aaSamw if (xmlStrcmp(node->name, (xmlChar *)"description") == 0) { 3976da6c28aaSamw break; 3977da6c28aaSamw } 3978da6c28aaSamw } 3979da6c28aaSamw 3980da6c28aaSamw /* no existing description but want to add */ 3981da6c28aaSamw if (node == NULL && content != NULL) { 3982da6c28aaSamw /* add a description */ 3983da6c28aaSamw node = _sa_set_share_description(resource, content); 3984da6c28aaSamw } else if (node != NULL && content != NULL) { 3985da6c28aaSamw /* update a description */ 3986da6c28aaSamw xmlNodeSetContent(node, (xmlChar *)content); 3987da6c28aaSamw } else if (node != NULL && content == NULL) { 3988da6c28aaSamw /* remove an existing description */ 3989da6c28aaSamw xmlUnlinkNode(node); 3990da6c28aaSamw xmlFreeNode(node); 3991da6c28aaSamw } 3992da6c28aaSamw share = sa_get_resource_parent(resource); 3993da6c28aaSamw group = sa_get_parent_group(share); 3994da6c28aaSamw if (group != NULL && sa_is_persistent(share)) { 3995da6c28aaSamw sa_handle_impl_t impl_handle; 3996da6c28aaSamw impl_handle = (sa_handle_impl_t)sa_find_group_handle(group); 3997da6c28aaSamw if (impl_handle != NULL) 3998da6c28aaSamw ret = sa_commit_share(impl_handle->scfhandle, 3999da6c28aaSamw group, share); 4000da6c28aaSamw else 4001da6c28aaSamw ret = SA_SYSTEM_ERR; 4002da6c28aaSamw } 4003da6c28aaSamw return (ret); 4004da6c28aaSamw } 4005da6c28aaSamw 4006da6c28aaSamw /* 4007da6c28aaSamw * sa_get_resource_description(share) 4008da6c28aaSamw * 4009da6c28aaSamw * Return the description text for the specified share if it 4010da6c28aaSamw * exists. NULL if no description exists. 4011da6c28aaSamw */ 4012da6c28aaSamw 4013da6c28aaSamw char * 4014da6c28aaSamw sa_get_resource_description(sa_resource_t resource) 4015da6c28aaSamw { 4016da6c28aaSamw xmlChar *description = NULL; 4017da6c28aaSamw xmlNodePtr node; 4018da6c28aaSamw 4019da6c28aaSamw for (node = ((xmlNodePtr)resource)->children; node != NULL; 4020da6c28aaSamw node = node->next) { 4021da6c28aaSamw if (xmlStrcmp(node->name, (xmlChar *)"description") == 0) 4022da6c28aaSamw break; 4023da6c28aaSamw } 4024da6c28aaSamw if (node != NULL) { 4025da6c28aaSamw description = xmlNodeGetContent(node); 4026da6c28aaSamw fixproblemchars((char *)description); 4027da6c28aaSamw } 4028da6c28aaSamw return ((char *)description); 4029da6c28aaSamw } 4030