16185db85Sdougm /* 26185db85Sdougm * CDDL HEADER START 36185db85Sdougm * 46185db85Sdougm * The contents of this file are subject to the terms of the 56185db85Sdougm * Common Development and Distribution License (the "License"). 66185db85Sdougm * You may not use this file except in compliance with the License. 76185db85Sdougm * 86185db85Sdougm * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 96185db85Sdougm * or http://www.opensolaris.org/os/licensing. 106185db85Sdougm * See the License for the specific language governing permissions 116185db85Sdougm * and limitations under the License. 126185db85Sdougm * 136185db85Sdougm * When distributing Covered Code, include this CDDL HEADER in each 146185db85Sdougm * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 156185db85Sdougm * If applicable, add the following below this CDDL HEADER, with the 166185db85Sdougm * fields enclosed by brackets "[]" replaced with your own identifying 176185db85Sdougm * information: Portions Copyright [yyyy] [name of copyright owner] 186185db85Sdougm * 196185db85Sdougm * CDDL HEADER END 206185db85Sdougm */ 216185db85Sdougm 226185db85Sdougm /* 23f345c0beSdougm * Copyright 2007 Sun Microsystems, Inc. All rights reserved. 246185db85Sdougm * Use is subject to license terms. 256185db85Sdougm */ 266185db85Sdougm 276185db85Sdougm #pragma ident "%Z%%M% %I% %E% SMI" 286185db85Sdougm 296185db85Sdougm /* 306185db85Sdougm * Share control API 316185db85Sdougm */ 326185db85Sdougm #include <stdio.h> 336185db85Sdougm #include <string.h> 346185db85Sdougm #include <ctype.h> 356185db85Sdougm #include <sys/types.h> 366185db85Sdougm #include <sys/stat.h> 37a99982a7Sdougm #include <fcntl.h> 386185db85Sdougm #include <unistd.h> 396185db85Sdougm #include <libxml/parser.h> 406185db85Sdougm #include <libxml/tree.h> 416185db85Sdougm #include "libshare.h" 426185db85Sdougm #include "libshare_impl.h" 436185db85Sdougm #include <libscf.h> 446185db85Sdougm #include "scfutil.h" 456185db85Sdougm #include <ctype.h> 466185db85Sdougm #include <libintl.h> 47549ec3ffSdougm #include <thread.h> 48549ec3ffSdougm #include <synch.h> 496185db85Sdougm 506185db85Sdougm #if _NOT_SMF 516185db85Sdougm #define CONFIG_FILE "/var/tmp/share.cfg" 526185db85Sdougm #define CONFIG_FILE_TMP "/var/tmp/share.cfg.tmp" 536185db85Sdougm #endif 546185db85Sdougm #define TSTAMP(tm) (uint64_t)(((uint64_t)tm.tv_sec << 32) | \ 556185db85Sdougm (tm.tv_nsec & 0xffffffff)) 566185db85Sdougm 57a99982a7Sdougm #define DFS_LOCK_FILE "/etc/dfs/fstypes" 5857b448deSdougm #define SA_STRSIZE 256 /* max string size for names */ 59a99982a7Sdougm 606185db85Sdougm /* 616185db85Sdougm * internal data structures 626185db85Sdougm */ 636185db85Sdougm 646185db85Sdougm extern struct sa_proto_plugin *sap_proto_list; 656185db85Sdougm 666185db85Sdougm /* current SMF/SVC repository handle */ 67549ec3ffSdougm extern void getlegacyconfig(sa_handle_t, char *, xmlNodePtr *); 68549ec3ffSdougm extern int gettransients(sa_handle_impl_t, xmlNodePtr *); 696185db85Sdougm extern int sa_valid_property(void *, char *, sa_property_t); 706185db85Sdougm extern char *sa_fstype(char *); 716185db85Sdougm extern int sa_is_share(void *); 726185db85Sdougm extern ssize_t scf_max_name_len; /* defined in scfutil during initialization */ 736185db85Sdougm extern int sa_group_is_zfs(sa_group_t); 746185db85Sdougm extern int sa_path_is_zfs(char *); 756185db85Sdougm extern int sa_zfs_set_sharenfs(sa_group_t, char *, int); 76549ec3ffSdougm extern void update_legacy_config(sa_handle_t); 776185db85Sdougm extern int issubdir(char *, char *); 7857b448deSdougm extern int sa_zfs_init(sa_handle_impl_t); 79549ec3ffSdougm extern void sa_zfs_fini(sa_handle_impl_t); 80a99982a7Sdougm extern void sablocksigs(sigset_t *); 81a99982a7Sdougm extern void saunblocksigs(sigset_t *); 826185db85Sdougm 83549ec3ffSdougm /* 84549ec3ffSdougm * Data structures for finding/managing the document root to access 85549ec3ffSdougm * handle mapping. The list isn't expected to grow very large so a 86549ec3ffSdougm * simple list is acceptable. The purpose is to provide a way to start 87549ec3ffSdougm * with a group or share and find the library handle needed for 88549ec3ffSdougm * various operations. 89549ec3ffSdougm */ 90549ec3ffSdougm mutex_t sa_global_lock; 91549ec3ffSdougm struct doc2handle { 92549ec3ffSdougm struct doc2handle *next; 93549ec3ffSdougm xmlNodePtr root; 94549ec3ffSdougm sa_handle_impl_t handle; 95549ec3ffSdougm }; 96549ec3ffSdougm 9757b448deSdougm /* definitions used in a couple of property functions */ 9857b448deSdougm #define SA_PROP_OP_REMOVE 1 9957b448deSdougm #define SA_PROP_OP_ADD 2 10057b448deSdougm #define SA_PROP_OP_UPDATE 3 10157b448deSdougm 102549ec3ffSdougm static struct doc2handle *sa_global_handles = NULL; 1036185db85Sdougm 1046185db85Sdougm /* helper functions */ 1056185db85Sdougm 106549ec3ffSdougm /* 107549ec3ffSdougm * sa_errorstr(err) 108549ec3ffSdougm * 109549ec3ffSdougm * convert an error value to an error string 110549ec3ffSdougm */ 111549ec3ffSdougm 1126185db85Sdougm char * 1136185db85Sdougm sa_errorstr(int err) 1146185db85Sdougm { 1156185db85Sdougm static char errstr[32]; 1166185db85Sdougm char *ret = NULL; 1176185db85Sdougm 1186185db85Sdougm switch (err) { 1196185db85Sdougm case SA_OK: 12024424a35Sdougm ret = dgettext(TEXT_DOMAIN, "ok"); 1216185db85Sdougm break; 1226185db85Sdougm case SA_NO_SUCH_PATH: 12324424a35Sdougm ret = dgettext(TEXT_DOMAIN, "path doesn't exist"); 1246185db85Sdougm break; 1256185db85Sdougm case SA_NO_MEMORY: 12624424a35Sdougm ret = dgettext(TEXT_DOMAIN, "no memory"); 1276185db85Sdougm break; 1286185db85Sdougm case SA_DUPLICATE_NAME: 12924424a35Sdougm ret = dgettext(TEXT_DOMAIN, "name in use"); 1306185db85Sdougm break; 1316185db85Sdougm case SA_BAD_PATH: 13224424a35Sdougm ret = dgettext(TEXT_DOMAIN, "bad path"); 1336185db85Sdougm break; 1346185db85Sdougm case SA_NO_SUCH_GROUP: 13524424a35Sdougm ret = dgettext(TEXT_DOMAIN, "no such group"); 1366185db85Sdougm break; 1376185db85Sdougm case SA_CONFIG_ERR: 13824424a35Sdougm ret = dgettext(TEXT_DOMAIN, "configuration error"); 1396185db85Sdougm break; 1406185db85Sdougm case SA_SYSTEM_ERR: 14124424a35Sdougm ret = dgettext(TEXT_DOMAIN, "system error"); 1426185db85Sdougm break; 1436185db85Sdougm case SA_SYNTAX_ERR: 14424424a35Sdougm ret = dgettext(TEXT_DOMAIN, "syntax error"); 1456185db85Sdougm break; 1466185db85Sdougm case SA_NO_PERMISSION: 14724424a35Sdougm ret = dgettext(TEXT_DOMAIN, "no permission"); 1486185db85Sdougm break; 1496185db85Sdougm case SA_BUSY: 15024424a35Sdougm ret = dgettext(TEXT_DOMAIN, "busy"); 1516185db85Sdougm break; 1526185db85Sdougm case SA_NO_SUCH_PROP: 15324424a35Sdougm ret = dgettext(TEXT_DOMAIN, "no such property"); 1546185db85Sdougm break; 1556185db85Sdougm case SA_INVALID_NAME: 15624424a35Sdougm ret = dgettext(TEXT_DOMAIN, "invalid name"); 1576185db85Sdougm break; 1586185db85Sdougm case SA_INVALID_PROTOCOL: 15924424a35Sdougm ret = dgettext(TEXT_DOMAIN, "invalid protocol"); 1606185db85Sdougm break; 1616185db85Sdougm case SA_NOT_ALLOWED: 16224424a35Sdougm ret = dgettext(TEXT_DOMAIN, "operation not allowed"); 1636185db85Sdougm break; 1646185db85Sdougm case SA_BAD_VALUE: 16524424a35Sdougm ret = dgettext(TEXT_DOMAIN, "bad property value"); 1666185db85Sdougm break; 1676185db85Sdougm case SA_INVALID_SECURITY: 16824424a35Sdougm ret = dgettext(TEXT_DOMAIN, "invalid security type"); 1696185db85Sdougm break; 1706185db85Sdougm case SA_NO_SUCH_SECURITY: 17124424a35Sdougm ret = dgettext(TEXT_DOMAIN, "security type not found"); 1726185db85Sdougm break; 1736185db85Sdougm case SA_VALUE_CONFLICT: 17424424a35Sdougm ret = dgettext(TEXT_DOMAIN, "property value conflict"); 1756185db85Sdougm break; 1766185db85Sdougm case SA_NOT_IMPLEMENTED: 17724424a35Sdougm ret = dgettext(TEXT_DOMAIN, "not implemented"); 1786185db85Sdougm break; 1796185db85Sdougm case SA_INVALID_PATH: 18024424a35Sdougm ret = dgettext(TEXT_DOMAIN, "invalid path"); 1816185db85Sdougm break; 1826185db85Sdougm case SA_NOT_SUPPORTED: 18324424a35Sdougm ret = dgettext(TEXT_DOMAIN, "operation not supported"); 1846185db85Sdougm break; 1856185db85Sdougm case SA_PROP_SHARE_ONLY: 18624424a35Sdougm ret = dgettext(TEXT_DOMAIN, "property not valid for group"); 1876185db85Sdougm break; 1886185db85Sdougm case SA_NOT_SHARED: 18924424a35Sdougm ret = dgettext(TEXT_DOMAIN, "not shared"); 1906185db85Sdougm break; 1916185db85Sdougm default: 1926185db85Sdougm (void) snprintf(errstr, sizeof (errstr), 19324424a35Sdougm dgettext(TEXT_DOMAIN, "unknown %d"), err); 1946185db85Sdougm ret = errstr; 1956185db85Sdougm } 1966185db85Sdougm return (ret); 1976185db85Sdougm } 1986185db85Sdougm 1996185db85Sdougm /* 200549ec3ffSdougm * Document root to active handle mapping functions. These are only 201549ec3ffSdougm * used internally. A mutex is used to prevent access while the list 202549ec3ffSdougm * is changing. In general, the list will be relatively short - one 203549ec3ffSdougm * item per thread that has called sa_init(). 204549ec3ffSdougm */ 205549ec3ffSdougm 206549ec3ffSdougm sa_handle_impl_t 207549ec3ffSdougm get_handle_for_root(xmlNodePtr root) 208549ec3ffSdougm { 209549ec3ffSdougm struct doc2handle *item; 210549ec3ffSdougm 211549ec3ffSdougm (void) mutex_lock(&sa_global_lock); 212549ec3ffSdougm for (item = sa_global_handles; item != NULL; item = item->next) { 213549ec3ffSdougm if (item->root == root) 214549ec3ffSdougm break; 215549ec3ffSdougm } 216549ec3ffSdougm (void) mutex_unlock(&sa_global_lock); 217549ec3ffSdougm if (item != NULL) 218549ec3ffSdougm return (item->handle); 219549ec3ffSdougm return (NULL); 220549ec3ffSdougm } 221549ec3ffSdougm 222549ec3ffSdougm static int 223549ec3ffSdougm add_handle_for_root(xmlNodePtr root, sa_handle_impl_t handle) 224549ec3ffSdougm { 225549ec3ffSdougm struct doc2handle *item; 226549ec3ffSdougm int ret = SA_NO_MEMORY; 227549ec3ffSdougm 228549ec3ffSdougm item = (struct doc2handle *)calloc(sizeof (struct doc2handle), 1); 229549ec3ffSdougm if (item != NULL) { 230549ec3ffSdougm item->root = root; 231549ec3ffSdougm item->handle = handle; 232549ec3ffSdougm (void) mutex_lock(&sa_global_lock); 233549ec3ffSdougm item->next = sa_global_handles; 234549ec3ffSdougm sa_global_handles = item; 235549ec3ffSdougm (void) mutex_unlock(&sa_global_lock); 236549ec3ffSdougm ret = SA_OK; 237549ec3ffSdougm } 238549ec3ffSdougm return (ret); 239549ec3ffSdougm } 240549ec3ffSdougm 241549ec3ffSdougm /* 242549ec3ffSdougm * remove_handle_for_root(root) 243549ec3ffSdougm * 244549ec3ffSdougm * Walks the list of handles and removes the one for this "root" from 245549ec3ffSdougm * the list. It is up to the caller to free the data. 246549ec3ffSdougm */ 247549ec3ffSdougm 248549ec3ffSdougm static void 249549ec3ffSdougm remove_handle_for_root(xmlNodePtr root) 250549ec3ffSdougm { 251549ec3ffSdougm struct doc2handle *item, *prev; 252549ec3ffSdougm 253549ec3ffSdougm (void) mutex_lock(&sa_global_lock); 254549ec3ffSdougm for (prev = NULL, item = sa_global_handles; item != NULL; 255549ec3ffSdougm item = item->next) { 256549ec3ffSdougm if (item->root == root) { 257549ec3ffSdougm /* first in the list */ 25857b448deSdougm if (prev == NULL) 259549ec3ffSdougm sa_global_handles = sa_global_handles->next; 26057b448deSdougm else 261549ec3ffSdougm prev->next = item->next; 262549ec3ffSdougm /* Item is out of the list so free the list structure */ 263549ec3ffSdougm free(item); 264549ec3ffSdougm break; 265549ec3ffSdougm } 266549ec3ffSdougm prev = item; 267549ec3ffSdougm } 268549ec3ffSdougm (void) mutex_unlock(&sa_global_lock); 269549ec3ffSdougm } 270549ec3ffSdougm 271549ec3ffSdougm /* 272549ec3ffSdougm * sa_find_group_handle(sa_group_t group) 273549ec3ffSdougm * 274549ec3ffSdougm * Find the sa_handle_t for the configuration associated with this 275549ec3ffSdougm * group. 276549ec3ffSdougm */ 277549ec3ffSdougm sa_handle_t 278549ec3ffSdougm sa_find_group_handle(sa_group_t group) 279549ec3ffSdougm { 280549ec3ffSdougm xmlNodePtr node = (xmlNodePtr)group; 281549ec3ffSdougm sa_handle_t handle; 282549ec3ffSdougm 283549ec3ffSdougm while (node != NULL) { 284549ec3ffSdougm if (strcmp((char *)(node->name), "sharecfg") == 0) { 285549ec3ffSdougm /* have the root so get the handle */ 286549ec3ffSdougm handle = (sa_handle_t)get_handle_for_root(node); 287549ec3ffSdougm return (handle); 288549ec3ffSdougm } 289549ec3ffSdougm node = node->parent; 290549ec3ffSdougm } 291549ec3ffSdougm return (NULL); 292549ec3ffSdougm } 293549ec3ffSdougm 294549ec3ffSdougm /* 2956185db85Sdougm * set_legacy_timestamp(root, path, timevalue) 2966185db85Sdougm * 2976185db85Sdougm * add the current timestamp value to the configuration for use in 2986185db85Sdougm * determining when to update the legacy files. For SMF, this 2996185db85Sdougm * property is kept in default/operation/legacy_timestamp 3006185db85Sdougm */ 3016185db85Sdougm 3026185db85Sdougm static void 3036185db85Sdougm set_legacy_timestamp(xmlNodePtr root, char *path, uint64_t tval) 3046185db85Sdougm { 3056185db85Sdougm xmlNodePtr node; 3066185db85Sdougm xmlChar *lpath = NULL; 307549ec3ffSdougm sa_handle_impl_t handle; 308549ec3ffSdougm 309549ec3ffSdougm /* Have to have a handle or else we weren't initialized. */ 310549ec3ffSdougm handle = get_handle_for_root(root); 311549ec3ffSdougm if (handle == NULL) 312549ec3ffSdougm return; 3136185db85Sdougm 3146185db85Sdougm for (node = root->xmlChildrenNode; node != NULL; 3156185db85Sdougm node = node->next) { 3166185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"legacy") == 0) { 3176185db85Sdougm /* a possible legacy node for this path */ 3186185db85Sdougm lpath = xmlGetProp(node, (xmlChar *)"path"); 31957b448deSdougm if (lpath != NULL && 32057b448deSdougm xmlStrcmp(lpath, (xmlChar *)path) == 0) { 3216185db85Sdougm xmlFree(lpath); 3226185db85Sdougm break; 3236185db85Sdougm } 3246185db85Sdougm if (lpath != NULL) 3256185db85Sdougm xmlFree(lpath); 3266185db85Sdougm } 3276185db85Sdougm } 3286185db85Sdougm if (node == NULL) { 3296185db85Sdougm /* need to create the first legacy timestamp node */ 3306185db85Sdougm node = xmlNewChild(root, NULL, (xmlChar *)"legacy", NULL); 3316185db85Sdougm } 3326185db85Sdougm if (node != NULL) { 3336185db85Sdougm char tstring[32]; 3346185db85Sdougm int ret; 3356185db85Sdougm 3366185db85Sdougm (void) snprintf(tstring, sizeof (tstring), "%lld", tval); 3376185db85Sdougm xmlSetProp(node, (xmlChar *)"timestamp", (xmlChar *)tstring); 3386185db85Sdougm xmlSetProp(node, (xmlChar *)"path", (xmlChar *)path); 3396185db85Sdougm /* now commit to SMF */ 340549ec3ffSdougm ret = sa_get_instance(handle->scfhandle, "default"); 3416185db85Sdougm if (ret == SA_OK) { 34257b448deSdougm ret = sa_start_transaction(handle->scfhandle, 34357b448deSdougm "operation"); 3446185db85Sdougm if (ret == SA_OK) { 34557b448deSdougm ret = sa_set_property(handle->scfhandle, 34657b448deSdougm "legacy-timestamp", tstring); 3476185db85Sdougm if (ret == SA_OK) { 34857b448deSdougm (void) sa_end_transaction( 34957b448deSdougm handle->scfhandle); 3506185db85Sdougm } else { 351549ec3ffSdougm sa_abort_transaction(handle->scfhandle); 3526185db85Sdougm } 3536185db85Sdougm } 3546185db85Sdougm } 3556185db85Sdougm } 3566185db85Sdougm } 3576185db85Sdougm 3586185db85Sdougm /* 3596185db85Sdougm * is_shared(share) 3606185db85Sdougm * 3616185db85Sdougm * determine if the specified share is currently shared or not. 3626185db85Sdougm */ 3636185db85Sdougm static int 3646185db85Sdougm is_shared(sa_share_t share) 3656185db85Sdougm { 3666185db85Sdougm char *shared; 3676185db85Sdougm int result = 0; /* assume not */ 3686185db85Sdougm 3696185db85Sdougm shared = sa_get_share_attr(share, "shared"); 3706185db85Sdougm if (shared != NULL) { 3716185db85Sdougm if (strcmp(shared, "true") == 0) 3726185db85Sdougm result = 1; 3736185db85Sdougm sa_free_attr_string(shared); 3746185db85Sdougm } 3756185db85Sdougm return (result); 3766185db85Sdougm } 3776185db85Sdougm 3786185db85Sdougm /* 379a99982a7Sdougm * checksubdirgroup(group, newpath, strictness) 380f345c0beSdougm * 381a99982a7Sdougm * check all the specified newpath against all the paths in the 382a99982a7Sdougm * group. This is a helper function for checksubdir to make it easier 383a99982a7Sdougm * to also check ZFS subgroups. 384a99982a7Sdougm * The strictness values mean: 385f345c0beSdougm * SA_CHECK_NORMAL == only check newpath against shares that are active 386f345c0beSdougm * SA_CHECK_STRICT == check newpath against both active shares and those 387f345c0beSdougm * stored in the repository 3886185db85Sdougm */ 3896185db85Sdougm static int 390a99982a7Sdougm checksubdirgroup(sa_group_t group, char *newpath, int strictness) 3916185db85Sdougm { 3926185db85Sdougm sa_share_t share; 393a99982a7Sdougm char *path; 394a99982a7Sdougm int issub = SA_OK; 3956185db85Sdougm 3966185db85Sdougm for (share = sa_get_share(group, NULL); share != NULL; 3976185db85Sdougm share = sa_get_next_share(share)) { 3986185db85Sdougm /* 3996185db85Sdougm * The original behavior of share never checked 4006185db85Sdougm * against the permanent configuration 4016185db85Sdougm * (/etc/dfs/dfstab). PIT has a number of cases where 4026185db85Sdougm * it depends on this older behavior even though it 4036185db85Sdougm * could be considered incorrect. We may tighten this 4046185db85Sdougm * up in the future. 4056185db85Sdougm */ 406f345c0beSdougm if (strictness == SA_CHECK_NORMAL && !is_shared(share)) 4076185db85Sdougm continue; 4086185db85Sdougm 4096185db85Sdougm path = sa_get_share_attr(share, "path"); 410f345c0beSdougm /* 411f345c0beSdougm * If path is NULL, then a share is in the process of 412f345c0beSdougm * construction or someone has modified the property 413a99982a7Sdougm * group inappropriately. It should be 414a99982a7Sdougm * ignored. issubdir() comes from the original share 415a99982a7Sdougm * implementation and does the difficult part of 416a99982a7Sdougm * checking subdirectories. 417f345c0beSdougm */ 418f345c0beSdougm if (path == NULL) 419f345c0beSdougm continue; 4206185db85Sdougm if (newpath != NULL && 4216185db85Sdougm (strcmp(path, newpath) == 0 || issubdir(newpath, path) || 4226185db85Sdougm issubdir(path, newpath))) { 4236185db85Sdougm sa_free_attr_string(path); 4246185db85Sdougm path = NULL; 4256185db85Sdougm issub = SA_INVALID_PATH; 4266185db85Sdougm break; 4276185db85Sdougm } 4286185db85Sdougm sa_free_attr_string(path); 4296185db85Sdougm path = NULL; 4306185db85Sdougm } 431a99982a7Sdougm return (issub); 432a99982a7Sdougm } 433a99982a7Sdougm 434a99982a7Sdougm /* 435a99982a7Sdougm * checksubdir(newpath, strictness) 436a99982a7Sdougm * 437a99982a7Sdougm * checksubdir determines if the specified path (newpath) is a 438a99982a7Sdougm * subdirectory of another share. It calls checksubdirgroup() to do 439a99982a7Sdougm * the complicated work. The strictness parameter determines how 440a99982a7Sdougm * strict a check to make against the path. The strictness values 441a99982a7Sdougm * mean: SA_CHECK_NORMAL == only check newpath against shares that are 442a99982a7Sdougm * active SA_CHECK_STRICT == check newpath against both active shares 443a99982a7Sdougm * and those * stored in the repository 444a99982a7Sdougm */ 445a99982a7Sdougm static int 446549ec3ffSdougm checksubdir(sa_handle_t handle, char *newpath, int strictness) 447a99982a7Sdougm { 448a99982a7Sdougm sa_group_t group; 449a99982a7Sdougm int issub; 450a99982a7Sdougm char *path = NULL; 451a99982a7Sdougm 452549ec3ffSdougm for (issub = 0, group = sa_get_group(handle, NULL); 45357b448deSdougm group != NULL && !issub; group = sa_get_next_group(group)) { 454a99982a7Sdougm if (sa_group_is_zfs(group)) { 455a99982a7Sdougm sa_group_t subgroup; 456a99982a7Sdougm for (subgroup = sa_get_sub_group(group); 457a99982a7Sdougm subgroup != NULL && !issub; 458a99982a7Sdougm subgroup = sa_get_next_group(subgroup)) 45957b448deSdougm issub = checksubdirgroup(subgroup, newpath, 46057b448deSdougm strictness); 461a99982a7Sdougm } else { 462a99982a7Sdougm issub = checksubdirgroup(group, newpath, strictness); 463a99982a7Sdougm } 4646185db85Sdougm } 4656185db85Sdougm if (path != NULL) 4666185db85Sdougm sa_free_attr_string(path); 4676185db85Sdougm return (issub); 4686185db85Sdougm } 4696185db85Sdougm 4706185db85Sdougm /* 471f345c0beSdougm * validpath(path, strictness) 4726185db85Sdougm * determine if the provided path is valid for a share. It shouldn't 4736185db85Sdougm * be a sub-dir of an already shared path or the parent directory of a 4746185db85Sdougm * share path. 4756185db85Sdougm */ 4766185db85Sdougm static int 477549ec3ffSdougm validpath(sa_handle_t handle, char *path, int strictness) 4786185db85Sdougm { 4796185db85Sdougm int error = SA_OK; 4806185db85Sdougm struct stat st; 4816185db85Sdougm sa_share_t share; 4826185db85Sdougm char *fstype; 4836185db85Sdougm 48457b448deSdougm if (*path != '/') 4856185db85Sdougm return (SA_BAD_PATH); 48657b448deSdougm 4876185db85Sdougm if (stat(path, &st) < 0) { 4886185db85Sdougm error = SA_NO_SUCH_PATH; 4896185db85Sdougm } else { 490549ec3ffSdougm share = sa_find_share(handle, path); 49157b448deSdougm if (share != NULL) 4926185db85Sdougm error = SA_DUPLICATE_NAME; 49357b448deSdougm 4946185db85Sdougm if (error == SA_OK) { 4956185db85Sdougm /* 49657b448deSdougm * check for special case with file system 49757b448deSdougm * that might have restrictions. For now, ZFS 49857b448deSdougm * is the only case since it has its own idea 49957b448deSdougm * of how to configure shares. We do this 50057b448deSdougm * before subdir checking since things like 50157b448deSdougm * ZFS will do that for us. This should also 50257b448deSdougm * be done via plugin interface. 5036185db85Sdougm */ 5046185db85Sdougm fstype = sa_fstype(path); 5056185db85Sdougm if (fstype != NULL && strcmp(fstype, "zfs") == 0) { 506549ec3ffSdougm if (sa_zfs_is_shared(handle, path)) 507a99982a7Sdougm error = SA_INVALID_NAME; 5086185db85Sdougm } 5096185db85Sdougm if (fstype != NULL) 5106185db85Sdougm sa_free_fstype(fstype); 5116185db85Sdougm } 51257b448deSdougm if (error == SA_OK) 513549ec3ffSdougm error = checksubdir(handle, path, strictness); 5146185db85Sdougm } 5156185db85Sdougm return (error); 5166185db85Sdougm } 5176185db85Sdougm 5186185db85Sdougm /* 5196185db85Sdougm * check to see if group/share is persistent. 5206185db85Sdougm */ 5216185db85Sdougm static int 5226185db85Sdougm is_persistent(sa_group_t group) 5236185db85Sdougm { 5246185db85Sdougm char *type; 5256185db85Sdougm int persist = 1; 5266185db85Sdougm 5276185db85Sdougm type = sa_get_group_attr(group, "type"); 5286185db85Sdougm if (type != NULL && strcmp(type, "transient") == 0) 5296185db85Sdougm persist = 0; 5306185db85Sdougm if (type != NULL) 5316185db85Sdougm sa_free_attr_string(type); 5326185db85Sdougm return (persist); 5336185db85Sdougm } 5346185db85Sdougm 5356185db85Sdougm /* 5366185db85Sdougm * sa_valid_group_name(name) 5376185db85Sdougm * 5386185db85Sdougm * check that the "name" contains only valid characters and otherwise 5396185db85Sdougm * fits the required naming conventions. Valid names must start with 5406185db85Sdougm * an alphabetic and the remainder may consist of only alphanumeric 5416185db85Sdougm * plus the '-' and '_' characters. This name limitation comes from 5426185db85Sdougm * inherent limitations in SMF. 5436185db85Sdougm */ 5446185db85Sdougm 5456185db85Sdougm int 5466185db85Sdougm sa_valid_group_name(char *name) 5476185db85Sdougm { 5486185db85Sdougm int ret = 1; 5496185db85Sdougm ssize_t len; 5506185db85Sdougm 5516185db85Sdougm if (name != NULL && isalpha(*name)) { 5526185db85Sdougm char c; 5536185db85Sdougm len = strlen(name); 5546185db85Sdougm if (len < (scf_max_name_len - sizeof ("group:"))) { 5556185db85Sdougm for (c = *name++; c != '\0' && ret != 0; c = *name++) { 5566185db85Sdougm if (!isalnum(c) && c != '-' && c != '_') 5576185db85Sdougm ret = 0; 5586185db85Sdougm } 5596185db85Sdougm } else { 5606185db85Sdougm ret = 0; 5616185db85Sdougm } 5626185db85Sdougm } else { 5636185db85Sdougm ret = 0; 5646185db85Sdougm } 5656185db85Sdougm return (ret); 5666185db85Sdougm } 5676185db85Sdougm 5686185db85Sdougm 5696185db85Sdougm /* 5706185db85Sdougm * is_zfs_group(group) 5716185db85Sdougm * Determine if the specified group is a ZFS sharenfs group 5726185db85Sdougm */ 5736185db85Sdougm static int 5746185db85Sdougm is_zfs_group(sa_group_t group) 5756185db85Sdougm { 5766185db85Sdougm int ret = 0; 5776185db85Sdougm xmlNodePtr parent; 5786185db85Sdougm xmlChar *zfs; 5796185db85Sdougm 58057b448deSdougm if (strcmp((char *)((xmlNodePtr)group)->name, "share") == 0) 5816185db85Sdougm parent = (xmlNodePtr)sa_get_parent_group(group); 58257b448deSdougm else 5836185db85Sdougm parent = (xmlNodePtr)group; 5846185db85Sdougm zfs = xmlGetProp(parent, (xmlChar *)"zfs"); 5856185db85Sdougm if (zfs != NULL) { 5866185db85Sdougm xmlFree(zfs); 5876185db85Sdougm ret = 1; 5886185db85Sdougm } 5896185db85Sdougm return (ret); 5906185db85Sdougm } 5916185db85Sdougm 5926185db85Sdougm /* 5936185db85Sdougm * sa_optionset_name(optionset, oname, len, id) 5946185db85Sdougm * return the SMF name for the optionset. If id is not NULL, it 5956185db85Sdougm * will have the GUID value for a share and should be used 5966185db85Sdougm * instead of the keyword "optionset" which is used for 5976185db85Sdougm * groups. If the optionset doesn't have a protocol type 5986185db85Sdougm * associated with it, "default" is used. This shouldn't happen 5996185db85Sdougm * at this point but may be desirable in the future if there are 6006185db85Sdougm * protocol independent properties added. The name is returned in 6016185db85Sdougm * oname. 6026185db85Sdougm */ 6036185db85Sdougm 6046185db85Sdougm static int 6056185db85Sdougm sa_optionset_name(sa_optionset_t optionset, char *oname, size_t len, char *id) 6066185db85Sdougm { 6076185db85Sdougm char *proto; 6086185db85Sdougm 6096185db85Sdougm if (id == NULL) 6106185db85Sdougm id = "optionset"; 6116185db85Sdougm 6126185db85Sdougm proto = sa_get_optionset_attr(optionset, "type"); 6136185db85Sdougm len = snprintf(oname, len, "%s_%s", id, proto ? proto : "default"); 6146185db85Sdougm 6156185db85Sdougm if (proto != NULL) 6166185db85Sdougm sa_free_attr_string(proto); 6176185db85Sdougm return (len); 6186185db85Sdougm } 6196185db85Sdougm 6206185db85Sdougm /* 6216185db85Sdougm * sa_security_name(optionset, oname, len, id) 6226185db85Sdougm * 6236185db85Sdougm * return the SMF name for the security. If id is not NULL, it will 6246185db85Sdougm * have the GUID value for a share and should be used instead of the 6256185db85Sdougm * keyword "optionset" which is used for groups. If the optionset 6266185db85Sdougm * doesn't have a protocol type associated with it, "default" is 6276185db85Sdougm * used. This shouldn't happen at this point but may be desirable in 6286185db85Sdougm * the future if there are protocol independent properties added. The 6296185db85Sdougm * name is returned in oname. The security type is also encoded into 6306185db85Sdougm * the name. In the future, this wil *be handled a bit differently. 6316185db85Sdougm */ 6326185db85Sdougm 6336185db85Sdougm static int 6346185db85Sdougm sa_security_name(sa_security_t security, char *oname, size_t len, char *id) 6356185db85Sdougm { 6366185db85Sdougm char *proto; 6376185db85Sdougm char *sectype; 6386185db85Sdougm 6396185db85Sdougm if (id == NULL) 6406185db85Sdougm id = "optionset"; 6416185db85Sdougm 6426185db85Sdougm proto = sa_get_security_attr(security, "type"); 6436185db85Sdougm sectype = sa_get_security_attr(security, "sectype"); 64457b448deSdougm len = snprintf(oname, len, "%s_%s_%s", id, proto ? proto : "default", 6456185db85Sdougm sectype ? sectype : "default"); 6466185db85Sdougm if (proto != NULL) 6476185db85Sdougm sa_free_attr_string(proto); 6486185db85Sdougm if (sectype != NULL) 6496185db85Sdougm sa_free_attr_string(sectype); 6506185db85Sdougm return (len); 6516185db85Sdougm } 6526185db85Sdougm 6536185db85Sdougm /* 65457b448deSdougm * verifydefgroupopts(handle) 65557b448deSdougm * 65657b448deSdougm * Make sure a "default" group exists and has default protocols enabled. 65757b448deSdougm */ 65857b448deSdougm static void 65957b448deSdougm verifydefgroupopts(sa_handle_t handle) 66057b448deSdougm { 66157b448deSdougm sa_group_t defgrp; 66257b448deSdougm sa_optionset_t opt; 66357b448deSdougm defgrp = sa_get_group(handle, "default"); 66457b448deSdougm if (defgrp != NULL) { 66557b448deSdougm opt = sa_get_optionset(defgrp, NULL); 66657b448deSdougm /* 66757b448deSdougm * NFS is the default for default group 66857b448deSdougm */ 66957b448deSdougm if (opt == NULL) 67057b448deSdougm opt = sa_create_optionset(defgrp, "nfs"); 67157b448deSdougm } 67257b448deSdougm } 67357b448deSdougm 67457b448deSdougm /* 675f345c0beSdougm * sa_init(init_service) 6766185db85Sdougm * Initialize the API 6776185db85Sdougm * find all the shared objects 6786185db85Sdougm * init the tables with all objects 6796185db85Sdougm * read in the current configuration 6806185db85Sdougm */ 6816185db85Sdougm 68257b448deSdougm #define GETPROP(prop) scf_simple_prop_next_astring(prop) 68357b448deSdougm #define CHECKTSTAMP(st, tval) stat(SA_LEGACY_DFSTAB, &st) >= 0 && \ 68457b448deSdougm tval != TSTAMP(st.st_ctim) 68557b448deSdougm 686549ec3ffSdougm sa_handle_t 6876185db85Sdougm sa_init(int init_service) 6886185db85Sdougm { 6896185db85Sdougm struct stat st; 6906185db85Sdougm int legacy = 0; 6916185db85Sdougm uint64_t tval = 0; 692a99982a7Sdougm int lockfd; 693a99982a7Sdougm sigset_t old; 694a99982a7Sdougm int updatelegacy = B_FALSE; 695a99982a7Sdougm scf_simple_prop_t *prop; 696549ec3ffSdougm sa_handle_impl_t handle; 697549ec3ffSdougm int err; 6986185db85Sdougm 699549ec3ffSdougm handle = calloc(sizeof (struct sa_handle_impl), 1); 700549ec3ffSdougm 701549ec3ffSdougm if (handle != NULL) { 7026185db85Sdougm /* get protocol specific structures */ 7036185db85Sdougm (void) proto_plugin_init(); 7046185db85Sdougm if (init_service & SA_INIT_SHARE_API) { 7056185db85Sdougm /* 70657b448deSdougm * initialize access into libzfs. We use this 70757b448deSdougm * when collecting info about ZFS datasets and 70857b448deSdougm * shares. 7091cea05afSdougm */ 71057b448deSdougm if (sa_zfs_init(handle) == B_FALSE) { 71157b448deSdougm free(handle); 71257b448deSdougm (void) proto_plugin_fini(); 71357b448deSdougm return (NULL); 71457b448deSdougm } 7151cea05afSdougm /* 7166185db85Sdougm * since we want to use SMF, initialize an svc handle 7176185db85Sdougm * and find out what is there. 7186185db85Sdougm */ 719549ec3ffSdougm handle->scfhandle = sa_scf_init(handle); 720549ec3ffSdougm if (handle->scfhandle != NULL) { 721a99982a7Sdougm /* 722a99982a7Sdougm * Need to lock the extraction of the 723a99982a7Sdougm * configuration if the dfstab file has 724a99982a7Sdougm * changed. Lock everything now and release if 725a99982a7Sdougm * not needed. Use a file that isn't being 726a99982a7Sdougm * manipulated by other parts of the system in 727a99982a7Sdougm * order to not interfere with locking. Using 728a99982a7Sdougm * dfstab doesn't work. 729a99982a7Sdougm */ 730a99982a7Sdougm sablocksigs(&old); 731a99982a7Sdougm lockfd = open(DFS_LOCK_FILE, O_RDWR); 732a99982a7Sdougm if (lockfd >= 0) { 733a99982a7Sdougm extern int errno; 734a99982a7Sdougm errno = 0; 735a99982a7Sdougm (void) lockf(lockfd, F_LOCK, 0); 736a99982a7Sdougm /* 73757b448deSdougm * Check whether we are going to need 73857b448deSdougm * to merge any dfstab changes. This 73957b448deSdougm * is done by comparing the value of 74057b448deSdougm * legacy-timestamp with the current 74157b448deSdougm * st_ctim of the file. If they are 74257b448deSdougm * different, an update is needed and 74357b448deSdougm * the file must remain locked until 74457b448deSdougm * the merge is done in order to 74557b448deSdougm * prevent multiple startups from 74657b448deSdougm * changing the SMF repository at the 74757b448deSdougm * same time. The first to get the 74857b448deSdougm * lock will make any changes before 74957b448deSdougm * the others can read the repository. 750a99982a7Sdougm */ 75157b448deSdougm prop = scf_simple_prop_get 75257b448deSdougm (handle->scfhandle->handle, 75357b448deSdougm (const char *)SA_SVC_FMRI_BASE 75457b448deSdougm ":default", "operation", 755a99982a7Sdougm "legacy-timestamp"); 756a99982a7Sdougm if (prop != NULL) { 757a99982a7Sdougm char *i64; 75857b448deSdougm i64 = GETPROP(prop); 75957b448deSdougm if (i64 != NULL) 76057b448deSdougm tval = strtoull(i64, 76157b448deSdougm NULL, 0); 76257b448deSdougm if (CHECKTSTAMP(st, tval)) 763a99982a7Sdougm updatelegacy = B_TRUE; 76457b448deSdougm scf_simple_prop_free(prop); 765a99982a7Sdougm } else { 76657b448deSdougm /* 76757b448deSdougm * We haven't set the 76857b448deSdougm * timestamp before so do it. 76957b448deSdougm */ 770a99982a7Sdougm updatelegacy = B_TRUE; 771a99982a7Sdougm } 772a99982a7Sdougm } 773a99982a7Sdougm if (updatelegacy == B_FALSE) { 774a99982a7Sdougm /* Don't need the lock anymore */ 775a99982a7Sdougm (void) lockf(lockfd, F_ULOCK, 0); 776a99982a7Sdougm (void) close(lockfd); 777a99982a7Sdougm } 7781d1813a7Sdougm 7791d1813a7Sdougm /* 7801d1813a7Sdougm * It is essential that the document tree and 7811d1813a7Sdougm * the internal list of roots to handles be 7821d1813a7Sdougm * setup before anything that might try to 7831d1813a7Sdougm * create a new object is called. The document 7841d1813a7Sdougm * tree is the combination of handle->doc and 7851d1813a7Sdougm * handle->tree. This allows searches, 7861d1813a7Sdougm * etc. when all you have is an object in the 7871d1813a7Sdougm * tree. 7881d1813a7Sdougm */ 7891d1813a7Sdougm handle->doc = xmlNewDoc((xmlChar *)"1.0"); 79057b448deSdougm handle->tree = xmlNewNode(NULL, 79157b448deSdougm (xmlChar *)"sharecfg"); 79257b448deSdougm if (handle->doc != NULL && 79357b448deSdougm handle->tree != NULL) { 79457b448deSdougm xmlDocSetRootElement(handle->doc, 79557b448deSdougm handle->tree); 79657b448deSdougm err = add_handle_for_root(handle->tree, 79757b448deSdougm handle); 7981d1813a7Sdougm if (err == SA_OK) 79957b448deSdougm err = sa_get_config( 80057b448deSdougm handle->scfhandle, 8011d1813a7Sdougm handle->tree, handle); 8021d1813a7Sdougm } else { 8031d1813a7Sdougm if (handle->doc != NULL) 8041d1813a7Sdougm xmlFreeDoc(handle->doc); 8051d1813a7Sdougm if (handle->tree != NULL) 8061d1813a7Sdougm xmlFreeNode(handle->tree); 8071d1813a7Sdougm err = SA_NO_MEMORY; 8081d1813a7Sdougm } 8091d1813a7Sdougm 810a99982a7Sdougm saunblocksigs(&old); 811549ec3ffSdougm 812549ec3ffSdougm if (err != SA_OK) { 813549ec3ffSdougm /* 8141d1813a7Sdougm * If we couldn't add the tree handle 8151d1813a7Sdougm * to the list, then things are going 8161d1813a7Sdougm * to fail badly. Might as well undo 8171d1813a7Sdougm * everything now and fail the 8181d1813a7Sdougm * sa_init(). 819549ec3ffSdougm */ 820549ec3ffSdougm sa_fini(handle); 821549ec3ffSdougm return (NULL); 822549ec3ffSdougm } 823549ec3ffSdougm 8246185db85Sdougm if (tval == 0) { 82557b448deSdougm /* 82657b448deSdougm * first time so make sure 82757b448deSdougm * default is setup 82857b448deSdougm */ 82957b448deSdougm verifydefgroupopts(handle); 8306185db85Sdougm } 8311d1813a7Sdougm 832a99982a7Sdougm if (updatelegacy == B_TRUE) { 833a99982a7Sdougm sablocksigs(&old); 834549ec3ffSdougm getlegacyconfig((sa_handle_t)handle, 835549ec3ffSdougm SA_LEGACY_DFSTAB, &handle->tree); 8366185db85Sdougm if (stat(SA_LEGACY_DFSTAB, &st) >= 0) 837549ec3ffSdougm set_legacy_timestamp(handle->tree, 8386185db85Sdougm SA_LEGACY_DFSTAB, 8396185db85Sdougm TSTAMP(st.st_ctim)); 840a99982a7Sdougm saunblocksigs(&old); 841a99982a7Sdougm /* Safe to unlock now to allow others to run */ 842a99982a7Sdougm (void) lockf(lockfd, F_ULOCK, 0); 843a99982a7Sdougm (void) close(lockfd); 8446185db85Sdougm } 845549ec3ffSdougm legacy |= sa_get_zfs_shares(handle, "zfs"); 846549ec3ffSdougm legacy |= gettransients(handle, &handle->tree); 8476185db85Sdougm } 8486185db85Sdougm } 8496185db85Sdougm } 850549ec3ffSdougm return ((sa_handle_t)handle); 8516185db85Sdougm } 8526185db85Sdougm 8536185db85Sdougm /* 854549ec3ffSdougm * sa_fini(handle) 8556185db85Sdougm * Uninitialize the API structures including the configuration 8561cea05afSdougm * data structures and ZFS related data. 8576185db85Sdougm */ 8586185db85Sdougm 8596185db85Sdougm void 860549ec3ffSdougm sa_fini(sa_handle_t handle) 8616185db85Sdougm { 862549ec3ffSdougm sa_handle_impl_t impl_handle = (sa_handle_impl_t)handle; 863549ec3ffSdougm 864549ec3ffSdougm if (impl_handle != NULL) { 865549ec3ffSdougm /* 866549ec3ffSdougm * Free the config trees and any other data structures 867549ec3ffSdougm * used in the handle. 868549ec3ffSdougm */ 869549ec3ffSdougm if (impl_handle->doc != NULL) 870549ec3ffSdougm xmlFreeDoc(impl_handle->doc); 871549ec3ffSdougm sa_scf_fini(impl_handle->scfhandle); 872549ec3ffSdougm sa_zfs_fini(impl_handle); 873549ec3ffSdougm 874549ec3ffSdougm /* Remove and free the entry in the global list. */ 875549ec3ffSdougm remove_handle_for_root(impl_handle->tree); 876549ec3ffSdougm 877549ec3ffSdougm /* Make sure we free the handle */ 878549ec3ffSdougm free(impl_handle); 879549ec3ffSdougm 880549ec3ffSdougm /* 881549ec3ffSdougm * If this was the last handle to release, unload the 882549ec3ffSdougm * plugins that were loaded. 883549ec3ffSdougm */ 884549ec3ffSdougm if (sa_global_handles == NULL) 885549ec3ffSdougm (void) proto_plugin_fini(); 886549ec3ffSdougm 8876185db85Sdougm } 8886185db85Sdougm } 8896185db85Sdougm 8906185db85Sdougm /* 8916185db85Sdougm * sa_get_protocols(char **protocol) 8926185db85Sdougm * Get array of protocols that are supported 8936185db85Sdougm * Returns pointer to an allocated and NULL terminated 8946185db85Sdougm * array of strings. Caller must free. 8956185db85Sdougm * This really should be determined dynamically. 8966185db85Sdougm * If there aren't any defined, return -1. 8976185db85Sdougm * Use free() to return memory. 8986185db85Sdougm */ 8996185db85Sdougm 9006185db85Sdougm int 9016185db85Sdougm sa_get_protocols(char ***protocols) 9026185db85Sdougm { 9036185db85Sdougm int numproto = -1; 9046185db85Sdougm 9056185db85Sdougm if (protocols != NULL) { 9066185db85Sdougm struct sa_proto_plugin *plug; 9076185db85Sdougm for (numproto = 0, plug = sap_proto_list; plug != NULL; 9086185db85Sdougm plug = plug->plugin_next) { 9096185db85Sdougm numproto++; 9106185db85Sdougm } 9116185db85Sdougm 9126185db85Sdougm *protocols = calloc(numproto + 1, sizeof (char *)); 9136185db85Sdougm if (*protocols != NULL) { 9146185db85Sdougm int ret = 0; 9156185db85Sdougm for (plug = sap_proto_list; plug != NULL; 9166185db85Sdougm plug = plug->plugin_next) { 9176185db85Sdougm /* faking for now */ 91857b448deSdougm (*protocols)[ret++] = 91957b448deSdougm plug->plugin_ops->sa_protocol; 9206185db85Sdougm } 9216185db85Sdougm } else { 9226185db85Sdougm numproto = -1; 9236185db85Sdougm } 9246185db85Sdougm } 9256185db85Sdougm return (numproto); 9266185db85Sdougm } 9276185db85Sdougm 9286185db85Sdougm /* 9296185db85Sdougm * find_group_by_name(node, group) 9306185db85Sdougm * 9316185db85Sdougm * search the XML document subtree specified by node to find the group 9326185db85Sdougm * specified by group. Searching subtree allows subgroups to be 9336185db85Sdougm * searched for. 9346185db85Sdougm */ 9356185db85Sdougm 9366185db85Sdougm static xmlNodePtr 9376185db85Sdougm find_group_by_name(xmlNodePtr node, xmlChar *group) 9386185db85Sdougm { 9396185db85Sdougm xmlChar *name = NULL; 9406185db85Sdougm 9416185db85Sdougm for (node = node->xmlChildrenNode; node != NULL; 9426185db85Sdougm node = node->next) { 9436185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"group") == 0) { 9446185db85Sdougm /* if no groupname, return the first found */ 9456185db85Sdougm if (group == NULL) 9466185db85Sdougm break; 9476185db85Sdougm name = xmlGetProp(node, (xmlChar *)"name"); 94857b448deSdougm if (name != NULL && xmlStrcmp(name, group) == 0) 9496185db85Sdougm break; 9506185db85Sdougm if (name != NULL) { 9516185db85Sdougm xmlFree(name); 9526185db85Sdougm name = NULL; 9536185db85Sdougm } 9546185db85Sdougm } 9556185db85Sdougm } 9566185db85Sdougm if (name != NULL) 9576185db85Sdougm xmlFree(name); 9586185db85Sdougm return (node); 9596185db85Sdougm } 9606185db85Sdougm 9616185db85Sdougm /* 9626185db85Sdougm * sa_get_group(groupname) 9636185db85Sdougm * Return the "group" specified. If groupname is NULL, 9646185db85Sdougm * return the first group of the list of groups. 9656185db85Sdougm */ 9666185db85Sdougm sa_group_t 967549ec3ffSdougm sa_get_group(sa_handle_t handle, char *groupname) 9686185db85Sdougm { 9696185db85Sdougm xmlNodePtr node = NULL; 9706185db85Sdougm char *subgroup = NULL; 9716185db85Sdougm char *group = NULL; 972549ec3ffSdougm sa_handle_impl_t impl_handle = (sa_handle_impl_t)handle; 9736185db85Sdougm 974549ec3ffSdougm if (impl_handle != NULL && impl_handle->tree != NULL) { 9756185db85Sdougm if (groupname != NULL) { 9766185db85Sdougm group = strdup(groupname); 977*a3351425Sdougm if (group != NULL) { 9786185db85Sdougm subgroup = strchr(group, '/'); 9796185db85Sdougm if (subgroup != NULL) 9806185db85Sdougm *subgroup++ = '\0'; 9816185db85Sdougm } 982*a3351425Sdougm } 983*a3351425Sdougm /* 984*a3351425Sdougm * We want to find the, possibly, named group. If 985*a3351425Sdougm * group is not NULL, then lookup the name. If it is 986*a3351425Sdougm * NULL, we only do the find if groupname is also 987*a3351425Sdougm * NULL. This allows lookup of the "first" group in 988*a3351425Sdougm * the internal list. 989*a3351425Sdougm */ 990*a3351425Sdougm if (group != NULL || groupname == NULL) 991*a3351425Sdougm node = find_group_by_name(impl_handle->tree, 992*a3351425Sdougm (xmlChar *)group); 993*a3351425Sdougm 9946185db85Sdougm /* if a subgroup, find it before returning */ 99557b448deSdougm if (subgroup != NULL && node != NULL) 9966185db85Sdougm node = find_group_by_name(node, (xmlChar *)subgroup); 9976185db85Sdougm } 9986185db85Sdougm if (node != NULL && (char *)group != NULL) 999549ec3ffSdougm (void) sa_get_instance(impl_handle->scfhandle, (char *)group); 10006185db85Sdougm if (group != NULL) 10016185db85Sdougm free(group); 10026185db85Sdougm return ((sa_group_t)(node)); 10036185db85Sdougm } 10046185db85Sdougm 10056185db85Sdougm /* 10066185db85Sdougm * sa_get_next_group(group) 10076185db85Sdougm * Return the "next" group after the specified group from 10086185db85Sdougm * the internal group list. NULL if there are no more. 10096185db85Sdougm */ 10106185db85Sdougm sa_group_t 10116185db85Sdougm sa_get_next_group(sa_group_t group) 10126185db85Sdougm { 10136185db85Sdougm xmlNodePtr ngroup = NULL; 10146185db85Sdougm if (group != NULL) { 10156185db85Sdougm for (ngroup = ((xmlNodePtr)group)->next; ngroup != NULL; 10166185db85Sdougm ngroup = ngroup->next) { 10176185db85Sdougm if (xmlStrcmp(ngroup->name, (xmlChar *)"group") == 0) 10186185db85Sdougm break; 10196185db85Sdougm } 10206185db85Sdougm } 10216185db85Sdougm return ((sa_group_t)ngroup); 10226185db85Sdougm } 10236185db85Sdougm 10246185db85Sdougm /* 10256185db85Sdougm * sa_get_share(group, sharepath) 10266185db85Sdougm * Return the share object for the share specified. The share 10276185db85Sdougm * must be in the specified group. Return NULL if not found. 10286185db85Sdougm */ 10296185db85Sdougm sa_share_t 10306185db85Sdougm sa_get_share(sa_group_t group, char *sharepath) 10316185db85Sdougm { 10326185db85Sdougm xmlNodePtr node = NULL; 10336185db85Sdougm xmlChar *path; 10346185db85Sdougm 10356185db85Sdougm /* 10366185db85Sdougm * For future scalability, this should end up building a cache 10376185db85Sdougm * since it will get called regularly by the mountd and info 10386185db85Sdougm * services. 10396185db85Sdougm */ 10406185db85Sdougm if (group != NULL) { 10416185db85Sdougm for (node = ((xmlNodePtr)group)->children; node != NULL; 10426185db85Sdougm node = node->next) { 10436185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"share") == 0) { 10446185db85Sdougm if (sharepath == NULL) { 10456185db85Sdougm break; 10466185db85Sdougm } else { 10476185db85Sdougm /* is it the correct share? */ 104857b448deSdougm path = xmlGetProp(node, 104957b448deSdougm (xmlChar *)"path"); 10506185db85Sdougm if (path != NULL && 105157b448deSdougm xmlStrcmp(path, 105257b448deSdougm (xmlChar *)sharepath) == 0) { 10536185db85Sdougm xmlFree(path); 10546185db85Sdougm break; 10556185db85Sdougm } 10566185db85Sdougm xmlFree(path); 10576185db85Sdougm } 10586185db85Sdougm } 10596185db85Sdougm } 10606185db85Sdougm } 10616185db85Sdougm return ((sa_share_t)node); 10626185db85Sdougm } 10636185db85Sdougm 10646185db85Sdougm /* 10656185db85Sdougm * sa_get_next_share(share) 10666185db85Sdougm * Return the next share following the specified share 10676185db85Sdougm * from the internal list of shares. Returns NULL if there 10686185db85Sdougm * are no more shares. The list is relative to the same 10696185db85Sdougm * group. 10706185db85Sdougm */ 10716185db85Sdougm sa_share_t 10726185db85Sdougm sa_get_next_share(sa_share_t share) 10736185db85Sdougm { 10746185db85Sdougm xmlNodePtr node = NULL; 10756185db85Sdougm 10766185db85Sdougm if (share != NULL) { 10776185db85Sdougm for (node = ((xmlNodePtr)share)->next; node != NULL; 10786185db85Sdougm node = node->next) { 10796185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"share") == 0) { 10806185db85Sdougm break; 10816185db85Sdougm } 10826185db85Sdougm } 10836185db85Sdougm } 10846185db85Sdougm return ((sa_share_t)node); 10856185db85Sdougm } 10866185db85Sdougm 10876185db85Sdougm /* 10886185db85Sdougm * _sa_get_child_node(node, type) 10896185db85Sdougm * 10906185db85Sdougm * find the child node of the specified node that has "type". This is 10916185db85Sdougm * used to implement several internal functions. 10926185db85Sdougm */ 10936185db85Sdougm 10946185db85Sdougm static xmlNodePtr 10956185db85Sdougm _sa_get_child_node(xmlNodePtr node, xmlChar *type) 10966185db85Sdougm { 10976185db85Sdougm xmlNodePtr child; 10986185db85Sdougm for (child = node->xmlChildrenNode; child != NULL; 10996185db85Sdougm child = child->next) 11006185db85Sdougm if (xmlStrcmp(child->name, type) == 0) 11016185db85Sdougm return (child); 11026185db85Sdougm return ((xmlNodePtr)NULL); 11036185db85Sdougm } 11046185db85Sdougm 11056185db85Sdougm /* 11066185db85Sdougm * find_share(group, path) 11076185db85Sdougm * 11086185db85Sdougm * Search all the shares in the specified group for one that has the 11096185db85Sdougm * specified path. 11106185db85Sdougm */ 11116185db85Sdougm 11126185db85Sdougm static sa_share_t 11136185db85Sdougm find_share(sa_group_t group, char *sharepath) 11146185db85Sdougm { 11156185db85Sdougm sa_share_t share; 11166185db85Sdougm char *path; 11176185db85Sdougm 11186185db85Sdougm for (share = sa_get_share(group, NULL); share != NULL; 11196185db85Sdougm share = sa_get_next_share(share)) { 11206185db85Sdougm path = sa_get_share_attr(share, "path"); 11216185db85Sdougm if (path != NULL && strcmp(path, sharepath) == 0) { 11226185db85Sdougm sa_free_attr_string(path); 11236185db85Sdougm break; 11246185db85Sdougm } 11256185db85Sdougm if (path != NULL) 11266185db85Sdougm sa_free_attr_string(path); 11276185db85Sdougm } 11286185db85Sdougm return (share); 11296185db85Sdougm } 11306185db85Sdougm 11316185db85Sdougm /* 11326185db85Sdougm * sa_get_sub_group(group) 11336185db85Sdougm * 11346185db85Sdougm * Get the first sub-group of group. The sa_get_next_group() function 11356185db85Sdougm * can be used to get the rest. This is currently only used for ZFS 11366185db85Sdougm * sub-groups but could be used to implement a more general mechanism. 11376185db85Sdougm */ 11386185db85Sdougm 11396185db85Sdougm sa_group_t 11406185db85Sdougm sa_get_sub_group(sa_group_t group) 11416185db85Sdougm { 11426185db85Sdougm return ((sa_group_t)_sa_get_child_node((xmlNodePtr)group, 11436185db85Sdougm (xmlChar *)"group")); 11446185db85Sdougm } 11456185db85Sdougm 11466185db85Sdougm /* 11476185db85Sdougm * sa_find_share(sharepath) 11486185db85Sdougm * Finds a share regardless of group. In the future, this 11496185db85Sdougm * function should utilize a cache and hash table of some kind. 11506185db85Sdougm * The current assumption is that a path will only be shared 11516185db85Sdougm * once. In the future, this may change as implementation of 11526185db85Sdougm * resource names comes into being. 11536185db85Sdougm */ 11546185db85Sdougm sa_share_t 1155549ec3ffSdougm sa_find_share(sa_handle_t handle, char *sharepath) 11566185db85Sdougm { 11576185db85Sdougm sa_group_t group; 11586185db85Sdougm sa_group_t zgroup; 11596185db85Sdougm sa_share_t share = NULL; 11606185db85Sdougm int done = 0; 11616185db85Sdougm 1162549ec3ffSdougm for (group = sa_get_group(handle, NULL); group != NULL && !done; 11636185db85Sdougm group = sa_get_next_group(group)) { 11646185db85Sdougm if (is_zfs_group(group)) { 116557b448deSdougm for (zgroup = 116657b448deSdougm (sa_group_t)_sa_get_child_node((xmlNodePtr)group, 11676185db85Sdougm (xmlChar *)"group"); 116857b448deSdougm zgroup != NULL; 116957b448deSdougm zgroup = sa_get_next_group(zgroup)) { 11706185db85Sdougm share = find_share(zgroup, sharepath); 11716185db85Sdougm if (share != NULL) 11726185db85Sdougm break; 11736185db85Sdougm } 11746185db85Sdougm } else { 11756185db85Sdougm share = find_share(group, sharepath); 11766185db85Sdougm } 11776185db85Sdougm if (share != NULL) 11786185db85Sdougm break; 11796185db85Sdougm } 11806185db85Sdougm return (share); 11816185db85Sdougm } 11826185db85Sdougm 11836185db85Sdougm /* 1184f345c0beSdougm * sa_check_path(group, path, strictness) 11856185db85Sdougm * 11866185db85Sdougm * check that path is a valid path relative to the group. Currently, 11876185db85Sdougm * we are ignoring the group and checking only the NFS rules. Later, 11886185db85Sdougm * we may want to use the group to then check against the protocols 1189f345c0beSdougm * enabled on the group. The strictness values mean: 1190f345c0beSdougm * SA_CHECK_NORMAL == only check newpath against shares that are active 1191f345c0beSdougm * SA_CHECK_STRICT == check newpath against both active shares and those 1192f345c0beSdougm * stored in the repository 11936185db85Sdougm */ 11946185db85Sdougm 11956185db85Sdougm int 1196f345c0beSdougm sa_check_path(sa_group_t group, char *path, int strictness) 11976185db85Sdougm { 1198549ec3ffSdougm sa_handle_t handle; 1199549ec3ffSdougm 1200549ec3ffSdougm handle = sa_find_group_handle(group); 1201549ec3ffSdougm return (validpath(handle, path, strictness)); 12026185db85Sdougm } 12036185db85Sdougm 12046185db85Sdougm /* 12056185db85Sdougm * _sa_add_share(group, sharepath, persist, *error) 12066185db85Sdougm * 12076185db85Sdougm * common code for all types of add_share. sa_add_share() is the 12086185db85Sdougm * public API, we also need to be able to do this when parsing legacy 12096185db85Sdougm * files and construction of the internal configuration while 12106185db85Sdougm * extracting config info from SMF. 12116185db85Sdougm */ 12126185db85Sdougm 12136185db85Sdougm sa_share_t 12146185db85Sdougm _sa_add_share(sa_group_t group, char *sharepath, int persist, int *error) 12156185db85Sdougm { 12166185db85Sdougm xmlNodePtr node = NULL; 12176185db85Sdougm int err; 12186185db85Sdougm 12196185db85Sdougm err = SA_OK; /* assume success */ 12206185db85Sdougm 122157b448deSdougm node = xmlNewChild((xmlNodePtr)group, NULL, (xmlChar *)"share", NULL); 12226185db85Sdougm if (node != NULL) { 12236185db85Sdougm xmlSetProp(node, (xmlChar *)"path", (xmlChar *)sharepath); 122457b448deSdougm xmlSetProp(node, (xmlChar *)"type", 122557b448deSdougm persist ? (xmlChar *)"persist" : (xmlChar *)"transient"); 12266185db85Sdougm if (persist != SA_SHARE_TRANSIENT) { 12276185db85Sdougm /* 12286185db85Sdougm * persistent shares come in two flavors: SMF and 12296185db85Sdougm * ZFS. Sort this one out based on target group and 12306185db85Sdougm * path type. Currently, only NFS is supported in the 12316185db85Sdougm * ZFS group and it is always on. 12326185db85Sdougm */ 123357b448deSdougm if (sa_group_is_zfs(group) && 123457b448deSdougm sa_path_is_zfs(sharepath)) { 12356185db85Sdougm err = sa_zfs_set_sharenfs(group, sharepath, 1); 12366185db85Sdougm } else { 1237549ec3ffSdougm sa_handle_impl_t impl_handle; 123857b448deSdougm impl_handle = 123957b448deSdougm (sa_handle_impl_t)sa_find_group_handle( 124057b448deSdougm group); 124157b448deSdougm if (impl_handle != NULL) { 124257b448deSdougm err = sa_commit_share( 124357b448deSdougm impl_handle->scfhandle, group, 12446185db85Sdougm (sa_share_t)node); 124557b448deSdougm } else { 1246549ec3ffSdougm err = SA_SYSTEM_ERR; 12476185db85Sdougm } 12486185db85Sdougm } 124957b448deSdougm } 12506185db85Sdougm if (err == SA_NO_PERMISSION && persist & SA_SHARE_PARSER) { 12516185db85Sdougm /* called by the dfstab parser so could be a show */ 12526185db85Sdougm err = SA_OK; 12536185db85Sdougm } 12546185db85Sdougm if (err != SA_OK) { 12556185db85Sdougm /* 12566185db85Sdougm * we couldn't commit to the repository so undo 12576185db85Sdougm * our internal state to reflect reality. 12586185db85Sdougm */ 12596185db85Sdougm xmlUnlinkNode(node); 12606185db85Sdougm xmlFreeNode(node); 12616185db85Sdougm node = NULL; 12626185db85Sdougm } 12636185db85Sdougm } else { 12646185db85Sdougm err = SA_NO_MEMORY; 12656185db85Sdougm } 12666185db85Sdougm if (error != NULL) 12676185db85Sdougm *error = err; 12686185db85Sdougm return (node); 12696185db85Sdougm } 12706185db85Sdougm 12716185db85Sdougm /* 12726185db85Sdougm * sa_add_share(group, sharepath, persist, *error) 12736185db85Sdougm * 12746185db85Sdougm * Add a new share object to the specified group. The share will 12756185db85Sdougm * have the specified sharepath and will only be constructed if 12766185db85Sdougm * it is a valid path to be shared. NULL is returned on error 12776185db85Sdougm * and a detailed error value will be returned via the error 12786185db85Sdougm * pointer. 12796185db85Sdougm */ 12806185db85Sdougm sa_share_t 12816185db85Sdougm sa_add_share(sa_group_t group, char *sharepath, int persist, int *error) 12826185db85Sdougm { 12836185db85Sdougm xmlNodePtr node = NULL; 12846185db85Sdougm sa_share_t dup; 1285f345c0beSdougm int strictness = SA_CHECK_NORMAL; 1286549ec3ffSdougm sa_handle_t handle; 1287f345c0beSdougm 1288f345c0beSdougm /* 1289f345c0beSdougm * If the share is to be permanent, use strict checking so a 1290f345c0beSdougm * bad config doesn't get created. Transient shares only need 1291f345c0beSdougm * to check against the currently active 1292f345c0beSdougm * shares. SA_SHARE_PARSER is a modifier used internally to 1293f345c0beSdougm * indicate that we are being called by the dfstab parser and 1294f345c0beSdougm * that we need strict checking in all cases. Normally persist 1295f345c0beSdougm * is in integer value but SA_SHARE_PARSER may be or'd into 1296f345c0beSdougm * it as an override. 1297f345c0beSdougm */ 1298f345c0beSdougm if (persist & SA_SHARE_PARSER || persist == SA_SHARE_PERMANENT) 1299f345c0beSdougm strictness = SA_CHECK_STRICT; 13006185db85Sdougm 1301549ec3ffSdougm handle = sa_find_group_handle(group); 1302549ec3ffSdougm 1303549ec3ffSdougm if ((dup = sa_find_share(handle, sharepath)) == NULL && 130457b448deSdougm (*error = sa_check_path(group, sharepath, strictness)) == SA_OK) { 13056185db85Sdougm node = _sa_add_share(group, sharepath, persist, error); 13066185db85Sdougm } 13076185db85Sdougm if (dup != NULL) 13086185db85Sdougm *error = SA_DUPLICATE_NAME; 13096185db85Sdougm 13106185db85Sdougm return ((sa_share_t)node); 13116185db85Sdougm } 13126185db85Sdougm 13136185db85Sdougm /* 13146185db85Sdougm * sa_enable_share(share, protocol) 13156185db85Sdougm * Enable the specified share to the specified protocol. 13166185db85Sdougm * If protocol is NULL, then all protocols. 13176185db85Sdougm */ 13186185db85Sdougm int 13196185db85Sdougm sa_enable_share(sa_share_t share, char *protocol) 13206185db85Sdougm { 13216185db85Sdougm char *sharepath; 13226185db85Sdougm struct stat st; 13236185db85Sdougm int err = 0; 13246185db85Sdougm 13256185db85Sdougm sharepath = sa_get_share_attr(share, "path"); 13266185db85Sdougm if (stat(sharepath, &st) < 0) { 13276185db85Sdougm err = SA_NO_SUCH_PATH; 13286185db85Sdougm } else { 13296185db85Sdougm /* tell the server about the share */ 13306185db85Sdougm if (protocol != NULL) { 13316185db85Sdougm /* lookup protocol specific handler */ 13326185db85Sdougm err = sa_proto_share(protocol, share); 13336185db85Sdougm if (err == SA_OK) 133457b448deSdougm (void) sa_set_share_attr(share, "shared", 133557b448deSdougm "true"); 13366185db85Sdougm } else { 133757b448deSdougm /* 133857b448deSdougm * Tell all protocols. Only NFS for now but 133957b448deSdougm * SMB is coming. 134057b448deSdougm */ 134157b448deSdougm err = sa_proto_share("nfs", share); 13426185db85Sdougm (void) sa_set_share_attr(share, "shared", "true"); 13436185db85Sdougm } 13446185db85Sdougm } 13456185db85Sdougm if (sharepath != NULL) 13466185db85Sdougm sa_free_attr_string(sharepath); 13476185db85Sdougm return (err); 13486185db85Sdougm } 13496185db85Sdougm 13506185db85Sdougm /* 13516185db85Sdougm * sa_disable_share(share, protocol) 13526185db85Sdougm * Disable the specified share to the specified protocol. 13536185db85Sdougm * If protocol is NULL, then all protocols. 13546185db85Sdougm */ 13556185db85Sdougm int 13566185db85Sdougm sa_disable_share(sa_share_t share, char *protocol) 13576185db85Sdougm { 13586185db85Sdougm char *path; 13596185db85Sdougm char *shared; 13606185db85Sdougm int ret = SA_OK; 13616185db85Sdougm 13626185db85Sdougm path = sa_get_share_attr(share, "path"); 13636185db85Sdougm shared = sa_get_share_attr(share, "shared"); 13646185db85Sdougm 13656185db85Sdougm if (protocol != NULL) { 13666185db85Sdougm ret = sa_proto_unshare(protocol, path); 13676185db85Sdougm } else { 13686185db85Sdougm /* need to do all protocols */ 13696185db85Sdougm ret = sa_proto_unshare("nfs", path); 13706185db85Sdougm } 13716185db85Sdougm if (ret == SA_OK) 13726185db85Sdougm (void) sa_set_share_attr(share, "shared", NULL); 13736185db85Sdougm if (path != NULL) 13746185db85Sdougm sa_free_attr_string(path); 13756185db85Sdougm if (shared != NULL) 13766185db85Sdougm sa_free_attr_string(shared); 13776185db85Sdougm return (ret); 13786185db85Sdougm } 13796185db85Sdougm 13806185db85Sdougm /* 13816185db85Sdougm * sa_remove_share(share) 13826185db85Sdougm * 13836185db85Sdougm * remove the specified share from its containing group. 13846185db85Sdougm * Remove from the SMF or ZFS configuration space. 13856185db85Sdougm */ 13866185db85Sdougm 13876185db85Sdougm int 13886185db85Sdougm sa_remove_share(sa_share_t share) 13896185db85Sdougm { 13906185db85Sdougm sa_group_t group; 13916185db85Sdougm int ret = SA_OK; 13926185db85Sdougm char *type; 13936185db85Sdougm int transient = 0; 13946185db85Sdougm char *groupname; 13956185db85Sdougm char *zfs; 13966185db85Sdougm 13976185db85Sdougm type = sa_get_share_attr(share, "type"); 13986185db85Sdougm group = sa_get_parent_group(share); 13996185db85Sdougm zfs = sa_get_group_attr(group, "zfs"); 14006185db85Sdougm groupname = sa_get_group_attr(group, "name"); 14016185db85Sdougm if (type != NULL && strcmp(type, "persist") != 0) 14026185db85Sdougm transient = 1; 14036185db85Sdougm if (type != NULL) 14046185db85Sdougm sa_free_attr_string(type); 14056185db85Sdougm 14066185db85Sdougm /* remove the node from its group then free the memory */ 14076185db85Sdougm 14086185db85Sdougm /* 14096185db85Sdougm * need to test if "busy" 14106185db85Sdougm */ 14116185db85Sdougm /* only do SMF action if permanent */ 14126185db85Sdougm if (!transient || zfs != NULL) { 14136185db85Sdougm /* remove from legacy dfstab as well as possible SMF */ 14146185db85Sdougm ret = sa_delete_legacy(share); 14156185db85Sdougm if (ret == SA_OK) { 14166185db85Sdougm if (!sa_group_is_zfs(group)) { 1417549ec3ffSdougm sa_handle_impl_t impl_handle; 141857b448deSdougm impl_handle = (sa_handle_impl_t) 141957b448deSdougm sa_find_group_handle(group); 142057b448deSdougm if (impl_handle != NULL) { 142157b448deSdougm ret = sa_delete_share( 142257b448deSdougm impl_handle->scfhandle, group, 142357b448deSdougm share); 14246185db85Sdougm } else { 142557b448deSdougm ret = SA_SYSTEM_ERR; 142657b448deSdougm } 142757b448deSdougm } else { 142857b448deSdougm char *sharepath = sa_get_share_attr(share, 142957b448deSdougm "path"); 14306185db85Sdougm if (sharepath != NULL) { 143157b448deSdougm ret = sa_zfs_set_sharenfs(group, 143257b448deSdougm sharepath, 0); 14336185db85Sdougm sa_free_attr_string(sharepath); 14346185db85Sdougm } 14356185db85Sdougm } 14366185db85Sdougm } 14376185db85Sdougm } 14386185db85Sdougm if (groupname != NULL) 14396185db85Sdougm sa_free_attr_string(groupname); 14406185db85Sdougm if (zfs != NULL) 14416185db85Sdougm sa_free_attr_string(zfs); 14426185db85Sdougm 14436185db85Sdougm xmlUnlinkNode((xmlNodePtr)share); 14446185db85Sdougm xmlFreeNode((xmlNodePtr)share); 14456185db85Sdougm return (ret); 14466185db85Sdougm } 14476185db85Sdougm 14486185db85Sdougm /* 14496185db85Sdougm * sa_move_share(group, share) 14506185db85Sdougm * 14516185db85Sdougm * move the specified share to the specified group. Update SMF 14526185db85Sdougm * appropriately. 14536185db85Sdougm */ 14546185db85Sdougm 14556185db85Sdougm int 14566185db85Sdougm sa_move_share(sa_group_t group, sa_share_t share) 14576185db85Sdougm { 14586185db85Sdougm sa_group_t oldgroup; 14596185db85Sdougm int ret = SA_OK; 14606185db85Sdougm 14616185db85Sdougm /* remove the node from its group then free the memory */ 14626185db85Sdougm 14636185db85Sdougm oldgroup = sa_get_parent_group(share); 14646185db85Sdougm if (oldgroup != group) { 1465549ec3ffSdougm sa_handle_impl_t impl_handle; 14666185db85Sdougm xmlUnlinkNode((xmlNodePtr)share); 146757b448deSdougm /* 146857b448deSdougm * now that the share isn't in its old group, add to 146957b448deSdougm * the new one 147057b448deSdougm */ 14716185db85Sdougm xmlAddChild((xmlNodePtr)group, (xmlNodePtr)share); 14726185db85Sdougm /* need to deal with SMF */ 1473549ec3ffSdougm impl_handle = (sa_handle_impl_t)sa_find_group_handle(group); 1474549ec3ffSdougm if (impl_handle != NULL) { 14756185db85Sdougm /* 14766185db85Sdougm * need to remove from old group first and then add to 14776185db85Sdougm * new group. Ideally, we would do the other order but 14786185db85Sdougm * need to avoid having the share in two groups at the 14796185db85Sdougm * same time. 14806185db85Sdougm */ 148157b448deSdougm ret = sa_delete_share(impl_handle->scfhandle, oldgroup, 148257b448deSdougm share); 1483549ec3ffSdougm if (ret == SA_OK) 148457b448deSdougm ret = sa_commit_share(impl_handle->scfhandle, 148557b448deSdougm group, share); 1486549ec3ffSdougm } else { 1487549ec3ffSdougm ret = SA_SYSTEM_ERR; 14886185db85Sdougm } 14896185db85Sdougm } 14906185db85Sdougm return (ret); 14916185db85Sdougm } 14926185db85Sdougm 14936185db85Sdougm /* 14946185db85Sdougm * sa_get_parent_group(share) 14956185db85Sdougm * 14966185db85Sdougm * Return the containg group for the share. If a group was actually 14976185db85Sdougm * passed in, we don't want a parent so return NULL. 14986185db85Sdougm */ 14996185db85Sdougm 15006185db85Sdougm sa_group_t 15016185db85Sdougm sa_get_parent_group(sa_share_t share) 15026185db85Sdougm { 15036185db85Sdougm xmlNodePtr node = NULL; 15046185db85Sdougm if (share != NULL) { 15056185db85Sdougm node = ((xmlNodePtr)share)->parent; 15066185db85Sdougm /* 15076185db85Sdougm * make sure parent is a group and not sharecfg since 15086185db85Sdougm * we may be cheating and passing in a group. 15096185db85Sdougm * Eventually, groups of groups might come into being. 15106185db85Sdougm */ 15116185db85Sdougm if (node == NULL || 15126185db85Sdougm xmlStrcmp(node->name, (xmlChar *)"sharecfg") == 0) 15136185db85Sdougm node = NULL; 15146185db85Sdougm } 15156185db85Sdougm return ((sa_group_t)node); 15166185db85Sdougm } 15176185db85Sdougm 15186185db85Sdougm /* 1519549ec3ffSdougm * _sa_create_group(impl_handle, groupname) 15206185db85Sdougm * 15216185db85Sdougm * Create a group in the document. The caller will need to deal with 15226185db85Sdougm * configuration store and activation. 15236185db85Sdougm */ 15246185db85Sdougm 15256185db85Sdougm sa_group_t 1526549ec3ffSdougm _sa_create_group(sa_handle_impl_t impl_handle, char *groupname) 15276185db85Sdougm { 15286185db85Sdougm xmlNodePtr node = NULL; 15296185db85Sdougm 15306185db85Sdougm if (sa_valid_group_name(groupname)) { 153157b448deSdougm node = xmlNewChild(impl_handle->tree, NULL, (xmlChar *)"group", 153257b448deSdougm NULL); 15336185db85Sdougm if (node != NULL) { 153457b448deSdougm xmlSetProp(node, (xmlChar *)"name", 153557b448deSdougm (xmlChar *)groupname); 153657b448deSdougm xmlSetProp(node, (xmlChar *)"state", 153757b448deSdougm (xmlChar *)"enabled"); 15386185db85Sdougm } 15396185db85Sdougm } 15406185db85Sdougm return ((sa_group_t)node); 15416185db85Sdougm } 15426185db85Sdougm 15436185db85Sdougm /* 15446185db85Sdougm * _sa_create_zfs_group(group, groupname) 15456185db85Sdougm * 15466185db85Sdougm * Create a ZFS subgroup under the specified group. This may 15476185db85Sdougm * eventually form the basis of general sub-groups, but is currently 15486185db85Sdougm * restricted to ZFS. 15496185db85Sdougm */ 15506185db85Sdougm sa_group_t 15516185db85Sdougm _sa_create_zfs_group(sa_group_t group, char *groupname) 15526185db85Sdougm { 15536185db85Sdougm xmlNodePtr node = NULL; 15546185db85Sdougm 155557b448deSdougm node = xmlNewChild((xmlNodePtr)group, NULL, (xmlChar *)"group", NULL); 15566185db85Sdougm if (node != NULL) { 15576185db85Sdougm xmlSetProp(node, (xmlChar *)"name", (xmlChar *)groupname); 15586185db85Sdougm xmlSetProp(node, (xmlChar *)"state", (xmlChar *)"enabled"); 15596185db85Sdougm } 15606185db85Sdougm 15616185db85Sdougm return ((sa_group_t)node); 15626185db85Sdougm } 15636185db85Sdougm 15646185db85Sdougm /* 15656185db85Sdougm * sa_create_group(groupname, *error) 15666185db85Sdougm * 15676185db85Sdougm * Create a new group with groupname. Need to validate that it is a 15686185db85Sdougm * legal name for SMF and the construct the SMF service instance of 15696185db85Sdougm * svc:/network/shares/group to implement the group. All necessary 15706185db85Sdougm * operational properties must be added to the group at this point 15716185db85Sdougm * (via the SMF transaction model). 15726185db85Sdougm */ 15736185db85Sdougm sa_group_t 1574549ec3ffSdougm sa_create_group(sa_handle_t handle, char *groupname, int *error) 15756185db85Sdougm { 15766185db85Sdougm xmlNodePtr node = NULL; 15776185db85Sdougm sa_group_t group; 15786185db85Sdougm int ret; 157957b448deSdougm char rbacstr[SA_STRSIZE]; 1580549ec3ffSdougm sa_handle_impl_t impl_handle = (sa_handle_impl_t)handle; 15816185db85Sdougm 15826185db85Sdougm ret = SA_OK; 15836185db85Sdougm 1584549ec3ffSdougm if (impl_handle == NULL || impl_handle->scfhandle == NULL) { 15856185db85Sdougm ret = SA_SYSTEM_ERR; 15866185db85Sdougm goto err; 15876185db85Sdougm } 15886185db85Sdougm 1589549ec3ffSdougm group = sa_get_group(handle, groupname); 15906185db85Sdougm if (group != NULL) { 15916185db85Sdougm ret = SA_DUPLICATE_NAME; 15926185db85Sdougm } else { 15936185db85Sdougm if (sa_valid_group_name(groupname)) { 1594549ec3ffSdougm node = xmlNewChild(impl_handle->tree, NULL, 15956185db85Sdougm (xmlChar *)"group", NULL); 15966185db85Sdougm if (node != NULL) { 159757b448deSdougm xmlSetProp(node, (xmlChar *)"name", 159857b448deSdougm (xmlChar *)groupname); 15996185db85Sdougm /* default to the group being enabled */ 160057b448deSdougm xmlSetProp(node, (xmlChar *)"state", 160157b448deSdougm (xmlChar *)"enabled"); 160257b448deSdougm ret = sa_create_instance(impl_handle->scfhandle, 160357b448deSdougm groupname); 16046185db85Sdougm if (ret == SA_OK) { 160557b448deSdougm ret = sa_start_transaction( 160657b448deSdougm impl_handle->scfhandle, 1607549ec3ffSdougm "operation"); 16086185db85Sdougm } 16096185db85Sdougm if (ret == SA_OK) { 161057b448deSdougm ret = sa_set_property( 161157b448deSdougm impl_handle->scfhandle, 1612549ec3ffSdougm "state", "enabled"); 16136185db85Sdougm if (ret == SA_OK) { 161457b448deSdougm ret = sa_end_transaction( 161557b448deSdougm impl_handle->scfhandle); 16166185db85Sdougm } else { 161757b448deSdougm sa_abort_transaction( 161857b448deSdougm impl_handle->scfhandle); 16196185db85Sdougm } 16206185db85Sdougm } 16216185db85Sdougm if (ret == SA_OK) { 16226185db85Sdougm /* initialize the RBAC strings */ 162357b448deSdougm ret = sa_start_transaction( 162457b448deSdougm impl_handle->scfhandle, 1625549ec3ffSdougm "general"); 16266185db85Sdougm if (ret == SA_OK) { 162757b448deSdougm (void) snprintf(rbacstr, 162857b448deSdougm sizeof (rbacstr), "%s.%s", 16296185db85Sdougm SA_RBAC_MANAGE, groupname); 163057b448deSdougm ret = sa_set_property( 163157b448deSdougm impl_handle->scfhandle, 16326185db85Sdougm "action_authorization", 16336185db85Sdougm rbacstr); 16346185db85Sdougm } 16356185db85Sdougm if (ret == SA_OK) { 163657b448deSdougm (void) snprintf(rbacstr, 163757b448deSdougm sizeof (rbacstr), "%s.%s", 16386185db85Sdougm SA_RBAC_VALUE, groupname); 163957b448deSdougm ret = sa_set_property( 164057b448deSdougm impl_handle->scfhandle, 16416185db85Sdougm "value_authorization", 16426185db85Sdougm rbacstr); 16436185db85Sdougm } 16446185db85Sdougm if (ret == SA_OK) { 164557b448deSdougm ret = sa_end_transaction( 164657b448deSdougm impl_handle->scfhandle); 16476185db85Sdougm } else { 164857b448deSdougm sa_abort_transaction( 164957b448deSdougm impl_handle->scfhandle); 16506185db85Sdougm } 16516185db85Sdougm } 16526185db85Sdougm if (ret != SA_OK) { 16536185db85Sdougm /* 165457b448deSdougm * Couldn't commit the group 165557b448deSdougm * so we need to undo 165657b448deSdougm * internally. 16576185db85Sdougm */ 16586185db85Sdougm xmlUnlinkNode(node); 16596185db85Sdougm xmlFreeNode(node); 16606185db85Sdougm node = NULL; 16616185db85Sdougm } 16626185db85Sdougm } else { 16636185db85Sdougm ret = SA_NO_MEMORY; 16646185db85Sdougm } 16656185db85Sdougm } else { 16666185db85Sdougm ret = SA_INVALID_NAME; 16676185db85Sdougm } 16686185db85Sdougm } 16696185db85Sdougm err: 16706185db85Sdougm if (error != NULL) 16716185db85Sdougm *error = ret; 16726185db85Sdougm return ((sa_group_t)node); 16736185db85Sdougm } 16746185db85Sdougm 16756185db85Sdougm /* 16766185db85Sdougm * sa_remove_group(group) 16776185db85Sdougm * 16786185db85Sdougm * Remove the specified group. This deletes from the SMF repository. 16796185db85Sdougm * All property groups and properties are removed. 16806185db85Sdougm */ 16816185db85Sdougm 16826185db85Sdougm int 16836185db85Sdougm sa_remove_group(sa_group_t group) 16846185db85Sdougm { 16856185db85Sdougm char *name; 16866185db85Sdougm int ret = SA_OK; 1687549ec3ffSdougm sa_handle_impl_t impl_handle; 16886185db85Sdougm 1689549ec3ffSdougm impl_handle = (sa_handle_impl_t)sa_find_group_handle(group); 1690549ec3ffSdougm if (impl_handle != NULL) { 16916185db85Sdougm name = sa_get_group_attr(group, "name"); 16926185db85Sdougm if (name != NULL) { 1693549ec3ffSdougm ret = sa_delete_instance(impl_handle->scfhandle, name); 16946185db85Sdougm sa_free_attr_string(name); 16956185db85Sdougm } 16966185db85Sdougm xmlUnlinkNode((xmlNodePtr)group); /* make sure unlinked */ 16976185db85Sdougm xmlFreeNode((xmlNodePtr)group); /* now it is gone */ 1698549ec3ffSdougm } else { 1699549ec3ffSdougm ret = SA_SYSTEM_ERR; 1700549ec3ffSdougm } 17016185db85Sdougm return (ret); 17026185db85Sdougm } 17036185db85Sdougm 17046185db85Sdougm /* 17056185db85Sdougm * sa_update_config() 17066185db85Sdougm * 17076185db85Sdougm * Used to update legacy files that need to be updated in bulk 17086185db85Sdougm * Currently, this is a placeholder and will go away in a future 17096185db85Sdougm * release. 17106185db85Sdougm */ 17116185db85Sdougm 17126185db85Sdougm int 1713549ec3ffSdougm sa_update_config(sa_handle_t handle) 17146185db85Sdougm { 17156185db85Sdougm /* 17166185db85Sdougm * do legacy files first so we can tell when they change. 17176185db85Sdougm * This will go away when we start updating individual records 17186185db85Sdougm * rather than the whole file. 17196185db85Sdougm */ 1720549ec3ffSdougm update_legacy_config(handle); 17216185db85Sdougm return (SA_OK); 17226185db85Sdougm } 17236185db85Sdougm 17246185db85Sdougm /* 17256185db85Sdougm * get_node_attr(node, tag) 17266185db85Sdougm * 17276185db85Sdougm * Get the speficied tag(attribute) if it exists on the node. This is 17286185db85Sdougm * used internally by a number of attribute oriented functions. 17296185db85Sdougm */ 17306185db85Sdougm 17316185db85Sdougm static char * 17326185db85Sdougm get_node_attr(void *nodehdl, char *tag) 17336185db85Sdougm { 17346185db85Sdougm xmlNodePtr node = (xmlNodePtr)nodehdl; 17356185db85Sdougm xmlChar *name = NULL; 17366185db85Sdougm 173757b448deSdougm if (node != NULL) 17386185db85Sdougm name = xmlGetProp(node, (xmlChar *)tag); 17396185db85Sdougm return ((char *)name); 17406185db85Sdougm } 17416185db85Sdougm 17426185db85Sdougm /* 17436185db85Sdougm * get_node_attr(node, tag) 17446185db85Sdougm * 17456185db85Sdougm * Set the speficied tag(attribute) to the specified value This is 17466185db85Sdougm * used internally by a number of attribute oriented functions. It 17476185db85Sdougm * doesn't update the repository, only the internal document state. 17486185db85Sdougm */ 17496185db85Sdougm 17506185db85Sdougm void 17516185db85Sdougm set_node_attr(void *nodehdl, char *tag, char *value) 17526185db85Sdougm { 17536185db85Sdougm xmlNodePtr node = (xmlNodePtr)nodehdl; 17546185db85Sdougm if (node != NULL && tag != NULL) { 175557b448deSdougm if (value != NULL) 17566185db85Sdougm xmlSetProp(node, (xmlChar *)tag, (xmlChar *)value); 175757b448deSdougm else 17586185db85Sdougm xmlUnsetProp(node, (xmlChar *)tag); 17596185db85Sdougm } 17606185db85Sdougm } 17616185db85Sdougm 17626185db85Sdougm /* 17636185db85Sdougm * sa_get_group_attr(group, tag) 17646185db85Sdougm * 17656185db85Sdougm * Get the specied attribute, if defined, for the group. 17666185db85Sdougm */ 17676185db85Sdougm 17686185db85Sdougm char * 17696185db85Sdougm sa_get_group_attr(sa_group_t group, char *tag) 17706185db85Sdougm { 17716185db85Sdougm return (get_node_attr((void *)group, tag)); 17726185db85Sdougm } 17736185db85Sdougm 17746185db85Sdougm /* 17756185db85Sdougm * sa_set_group_attr(group, tag, value) 17766185db85Sdougm * 17776185db85Sdougm * set the specified tag/attribute on the group using value as its 17786185db85Sdougm * value. 17796185db85Sdougm * 17806185db85Sdougm * This will result in setting the property in the SMF repository as 17816185db85Sdougm * well as in the internal document. 17826185db85Sdougm */ 17836185db85Sdougm 17846185db85Sdougm int 17856185db85Sdougm sa_set_group_attr(sa_group_t group, char *tag, char *value) 17866185db85Sdougm { 17876185db85Sdougm int ret; 17886185db85Sdougm char *groupname; 1789549ec3ffSdougm sa_handle_impl_t impl_handle; 17906185db85Sdougm 1791549ec3ffSdougm impl_handle = (sa_handle_impl_t)sa_find_group_handle(group); 1792549ec3ffSdougm if (impl_handle != NULL) { 17936185db85Sdougm groupname = sa_get_group_attr(group, "name"); 1794549ec3ffSdougm ret = sa_get_instance(impl_handle->scfhandle, groupname); 17956185db85Sdougm if (ret == SA_OK) { 17966185db85Sdougm set_node_attr((void *)group, tag, value); 179757b448deSdougm ret = sa_start_transaction(impl_handle->scfhandle, 179857b448deSdougm "operation"); 17996185db85Sdougm if (ret == SA_OK) { 180057b448deSdougm ret = sa_set_property(impl_handle->scfhandle, 180157b448deSdougm tag, value); 18026185db85Sdougm if (ret == SA_OK) 180357b448deSdougm (void) sa_end_transaction( 180457b448deSdougm impl_handle->scfhandle); 180557b448deSdougm else 180657b448deSdougm sa_abort_transaction( 180757b448deSdougm impl_handle->scfhandle); 18086185db85Sdougm } 18096185db85Sdougm } 18106185db85Sdougm if (groupname != NULL) 18116185db85Sdougm sa_free_attr_string(groupname); 1812549ec3ffSdougm } else { 1813549ec3ffSdougm ret = SA_SYSTEM_ERR; 1814549ec3ffSdougm } 18156185db85Sdougm return (ret); 18166185db85Sdougm } 18176185db85Sdougm 18186185db85Sdougm /* 18196185db85Sdougm * sa_get_share_attr(share, tag) 18206185db85Sdougm * 18216185db85Sdougm * Return the value of the tag/attribute set on the specified 18226185db85Sdougm * share. Returns NULL if the tag doesn't exist. 18236185db85Sdougm */ 18246185db85Sdougm 18256185db85Sdougm char * 18266185db85Sdougm sa_get_share_attr(sa_share_t share, char *tag) 18276185db85Sdougm { 18286185db85Sdougm return (get_node_attr((void *)share, tag)); 18296185db85Sdougm } 18306185db85Sdougm 18316185db85Sdougm /* 18326185db85Sdougm * sa_get_resource(group, resource) 18336185db85Sdougm * 18346185db85Sdougm * Search all the shares in the speified group for a share with a 18356185db85Sdougm * resource name matching the one specified. 18366185db85Sdougm * 18376185db85Sdougm * In the future, it may be advantageous to allow group to be NULL and 18386185db85Sdougm * search all groups but that isn't needed at present. 18396185db85Sdougm */ 18406185db85Sdougm 18416185db85Sdougm sa_share_t 18426185db85Sdougm sa_get_resource(sa_group_t group, char *resource) 18436185db85Sdougm { 18446185db85Sdougm sa_share_t share = NULL; 18456185db85Sdougm char *name = NULL; 18466185db85Sdougm 18476185db85Sdougm if (resource != NULL) { 18486185db85Sdougm for (share = sa_get_share(group, NULL); share != NULL; 18496185db85Sdougm share = sa_get_next_share(share)) { 18506185db85Sdougm name = sa_get_share_attr(share, "resource"); 18516185db85Sdougm if (name != NULL) { 18526185db85Sdougm if (strcmp(name, resource) == 0) 18536185db85Sdougm break; 18546185db85Sdougm sa_free_attr_string(name); 18556185db85Sdougm name = NULL; 18566185db85Sdougm } 18576185db85Sdougm } 18586185db85Sdougm if (name != NULL) 18596185db85Sdougm sa_free_attr_string(name); 18606185db85Sdougm } 18616185db85Sdougm return ((sa_share_t)share); 18626185db85Sdougm } 18636185db85Sdougm 18646185db85Sdougm /* 18656185db85Sdougm * _sa_set_share_description(share, description) 18666185db85Sdougm * 18676185db85Sdougm * Add a description tag with text contents to the specified share. 18686185db85Sdougm * A separate XML tag is used rather than a property. 18696185db85Sdougm */ 18706185db85Sdougm 18716185db85Sdougm xmlNodePtr 18726185db85Sdougm _sa_set_share_description(sa_share_t share, char *content) 18736185db85Sdougm { 18746185db85Sdougm xmlNodePtr node; 187557b448deSdougm node = xmlNewChild((xmlNodePtr)share, NULL, (xmlChar *)"description", 187657b448deSdougm NULL); 18776185db85Sdougm xmlNodeSetContent(node, (xmlChar *)content); 18786185db85Sdougm return (node); 18796185db85Sdougm } 18806185db85Sdougm 18816185db85Sdougm /* 18826185db85Sdougm * sa_set_share_attr(share, tag, value) 18836185db85Sdougm * 18846185db85Sdougm * Set the share attribute specified by tag to the specified value. In 18856185db85Sdougm * the case of "resource", enforce a no duplicates in a group rule. If 18866185db85Sdougm * the share is not transient, commit the changes to the repository 18876185db85Sdougm * else just update the share internally. 18886185db85Sdougm */ 18896185db85Sdougm 18906185db85Sdougm int 18916185db85Sdougm sa_set_share_attr(sa_share_t share, char *tag, char *value) 18926185db85Sdougm { 18936185db85Sdougm sa_group_t group; 18946185db85Sdougm sa_share_t resource; 18956185db85Sdougm int ret = SA_OK; 18966185db85Sdougm 18976185db85Sdougm group = sa_get_parent_group(share); 18986185db85Sdougm 18996185db85Sdougm /* 19006185db85Sdougm * There are some attributes that may have specific 19016185db85Sdougm * restrictions on them. Initially, only "resource" has 19026185db85Sdougm * special meaning that needs to be checked. Only one instance 19036185db85Sdougm * of a resource name may exist within a group. 19046185db85Sdougm */ 19056185db85Sdougm 19066185db85Sdougm if (strcmp(tag, "resource") == 0) { 19076185db85Sdougm resource = sa_get_resource(group, value); 19086185db85Sdougm if (resource != share && resource != NULL) 19096185db85Sdougm ret = SA_DUPLICATE_NAME; 19106185db85Sdougm } 19116185db85Sdougm if (ret == SA_OK) { 19126185db85Sdougm set_node_attr((void *)share, tag, value); 19136185db85Sdougm if (group != NULL) { 19146185db85Sdougm char *type; 19156185db85Sdougm /* we can probably optimize this some */ 19166185db85Sdougm type = sa_get_share_attr(share, "type"); 1917549ec3ffSdougm if (type == NULL || strcmp(type, "transient") != 0) { 1918549ec3ffSdougm sa_handle_impl_t impl_handle; 191957b448deSdougm impl_handle = 192057b448deSdougm (sa_handle_impl_t)sa_find_group_handle( 192157b448deSdougm group); 192257b448deSdougm if (impl_handle != NULL) { 192357b448deSdougm ret = sa_commit_share( 192457b448deSdougm impl_handle->scfhandle, group, 192557b448deSdougm share); 192657b448deSdougm } else { 1927549ec3ffSdougm ret = SA_SYSTEM_ERR; 1928549ec3ffSdougm } 192957b448deSdougm } 19306185db85Sdougm if (type != NULL) 19316185db85Sdougm sa_free_attr_string(type); 19326185db85Sdougm } 19336185db85Sdougm } 19346185db85Sdougm return (ret); 19356185db85Sdougm } 19366185db85Sdougm 19376185db85Sdougm /* 19386185db85Sdougm * sa_get_property_attr(prop, tag) 19396185db85Sdougm * 19406185db85Sdougm * Get the value of the specified property attribute. Standard 19416185db85Sdougm * attributes are "type" and "value". 19426185db85Sdougm */ 19436185db85Sdougm 19446185db85Sdougm char * 19456185db85Sdougm sa_get_property_attr(sa_property_t prop, char *tag) 19466185db85Sdougm { 19476185db85Sdougm return (get_node_attr((void *)prop, tag)); 19486185db85Sdougm } 19496185db85Sdougm 19506185db85Sdougm /* 19516185db85Sdougm * sa_get_optionset_attr(prop, tag) 19526185db85Sdougm * 19536185db85Sdougm * Get the value of the specified property attribute. Standard 19546185db85Sdougm * attribute is "type". 19556185db85Sdougm */ 19566185db85Sdougm 19576185db85Sdougm char * 19586185db85Sdougm sa_get_optionset_attr(sa_property_t optionset, char *tag) 19596185db85Sdougm { 19606185db85Sdougm return (get_node_attr((void *)optionset, tag)); 19616185db85Sdougm 19626185db85Sdougm } 19636185db85Sdougm 19646185db85Sdougm /* 19656185db85Sdougm * sa_set_optionset_attr(optionset, tag, value) 19666185db85Sdougm * 19676185db85Sdougm * Set the specified attribute(tag) to the specified value on the 19686185db85Sdougm * optionset. 19696185db85Sdougm */ 19706185db85Sdougm 19716185db85Sdougm void 19726185db85Sdougm sa_set_optionset_attr(sa_group_t optionset, char *tag, char *value) 19736185db85Sdougm { 19746185db85Sdougm set_node_attr((void *)optionset, tag, value); 19756185db85Sdougm } 19766185db85Sdougm 19776185db85Sdougm /* 19786185db85Sdougm * sa_free_attr_string(string) 19796185db85Sdougm * 19806185db85Sdougm * Free the string that was returned in one of the sa_get_*_attr() 19816185db85Sdougm * functions. 19826185db85Sdougm */ 19836185db85Sdougm 19846185db85Sdougm void 19856185db85Sdougm sa_free_attr_string(char *string) 19866185db85Sdougm { 19876185db85Sdougm xmlFree((xmlChar *)string); 19886185db85Sdougm } 19896185db85Sdougm 19906185db85Sdougm /* 19916185db85Sdougm * sa_get_optionset(group, proto) 19926185db85Sdougm * 19936185db85Sdougm * Return the optionset, if it exists, that is associated with the 19946185db85Sdougm * specified protocol. 19956185db85Sdougm */ 19966185db85Sdougm 19976185db85Sdougm sa_optionset_t 19986185db85Sdougm sa_get_optionset(void *group, char *proto) 19996185db85Sdougm { 20006185db85Sdougm xmlNodePtr node; 20016185db85Sdougm xmlChar *value = NULL; 20026185db85Sdougm 20036185db85Sdougm for (node = ((xmlNodePtr)group)->children; node != NULL; 20046185db85Sdougm node = node->next) { 20056185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"optionset") == 0) { 20066185db85Sdougm value = xmlGetProp(node, (xmlChar *)"type"); 20076185db85Sdougm if (proto != NULL) { 20086185db85Sdougm if (value != NULL && 20096185db85Sdougm xmlStrcmp(value, (xmlChar *)proto) == 0) { 20106185db85Sdougm break; 20116185db85Sdougm } 20126185db85Sdougm if (value != NULL) { 20136185db85Sdougm xmlFree(value); 20146185db85Sdougm value = NULL; 20156185db85Sdougm } 20166185db85Sdougm } else { 20176185db85Sdougm break; 20186185db85Sdougm } 20196185db85Sdougm } 20206185db85Sdougm } 20216185db85Sdougm if (value != NULL) 20226185db85Sdougm xmlFree(value); 20236185db85Sdougm return ((sa_optionset_t)node); 20246185db85Sdougm } 20256185db85Sdougm 20266185db85Sdougm /* 20276185db85Sdougm * sa_get_next_optionset(optionset) 20286185db85Sdougm * 20296185db85Sdougm * Return the next optionset in the group. NULL if this was the last. 20306185db85Sdougm */ 20316185db85Sdougm 20326185db85Sdougm sa_optionset_t 20336185db85Sdougm sa_get_next_optionset(sa_optionset_t optionset) 20346185db85Sdougm { 20356185db85Sdougm xmlNodePtr node; 20366185db85Sdougm 20376185db85Sdougm for (node = ((xmlNodePtr)optionset)->next; node != NULL; 20386185db85Sdougm node = node->next) { 20396185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"optionset") == 0) { 20406185db85Sdougm break; 20416185db85Sdougm } 20426185db85Sdougm } 20436185db85Sdougm return ((sa_optionset_t)node); 20446185db85Sdougm } 20456185db85Sdougm 20466185db85Sdougm /* 20476185db85Sdougm * sa_get_security(group, sectype, proto) 20486185db85Sdougm * 20496185db85Sdougm * Return the security optionset. The internal name is a hold over 20506185db85Sdougm * from the implementation and will be changed before the API is 20516185db85Sdougm * finalized. This is really a named optionset that can be negotiated 20526185db85Sdougm * as a group of properties (like NFS security options). 20536185db85Sdougm */ 20546185db85Sdougm 20556185db85Sdougm sa_security_t 20566185db85Sdougm sa_get_security(sa_group_t group, char *sectype, char *proto) 20576185db85Sdougm { 20586185db85Sdougm xmlNodePtr node; 20596185db85Sdougm xmlChar *value = NULL; 20606185db85Sdougm 20616185db85Sdougm for (node = ((xmlNodePtr)group)->children; node != NULL; 20626185db85Sdougm node = node->next) { 20636185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"security") == 0) { 20646185db85Sdougm if (proto != NULL) { 20656185db85Sdougm value = xmlGetProp(node, (xmlChar *)"type"); 20666185db85Sdougm if (value == NULL || 20676185db85Sdougm (value != NULL && 20686185db85Sdougm xmlStrcmp(value, (xmlChar *)proto) != 0)) { 20696185db85Sdougm /* it doesn't match so continue */ 20706185db85Sdougm xmlFree(value); 20716185db85Sdougm value = NULL; 20726185db85Sdougm continue; 20736185db85Sdougm } 20746185db85Sdougm } 20756185db85Sdougm if (value != NULL) { 20766185db85Sdougm xmlFree(value); 20776185db85Sdougm value = NULL; 20786185db85Sdougm } 20796185db85Sdougm /* potential match */ 20806185db85Sdougm if (sectype != NULL) { 20816185db85Sdougm value = xmlGetProp(node, (xmlChar *)"sectype"); 20826185db85Sdougm if (value != NULL && 20836185db85Sdougm xmlStrcmp(value, (xmlChar *)sectype) == 0) { 20846185db85Sdougm break; 20856185db85Sdougm } 20866185db85Sdougm } else { 20876185db85Sdougm break; 20886185db85Sdougm } 20896185db85Sdougm } 20906185db85Sdougm if (value != NULL) { 20916185db85Sdougm xmlFree(value); 20926185db85Sdougm value = NULL; 20936185db85Sdougm } 20946185db85Sdougm } 20956185db85Sdougm if (value != NULL) 20966185db85Sdougm xmlFree(value); 20976185db85Sdougm return ((sa_security_t)node); 20986185db85Sdougm } 20996185db85Sdougm 21006185db85Sdougm /* 21016185db85Sdougm * sa_get_next_security(security) 21026185db85Sdougm * 21036185db85Sdougm * Get the next security optionset if one exists. 21046185db85Sdougm */ 21056185db85Sdougm 21066185db85Sdougm sa_security_t 21076185db85Sdougm sa_get_next_security(sa_security_t security) 21086185db85Sdougm { 21096185db85Sdougm xmlNodePtr node; 21106185db85Sdougm 21116185db85Sdougm for (node = ((xmlNodePtr)security)->next; node != NULL; 21126185db85Sdougm node = node->next) { 21136185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"security") == 0) { 21146185db85Sdougm break; 21156185db85Sdougm } 21166185db85Sdougm } 21176185db85Sdougm return ((sa_security_t)node); 21186185db85Sdougm } 21196185db85Sdougm 21206185db85Sdougm /* 21216185db85Sdougm * sa_get_property(optionset, prop) 21226185db85Sdougm * 21236185db85Sdougm * Get the property object with the name specified in prop from the 21246185db85Sdougm * optionset. 21256185db85Sdougm */ 21266185db85Sdougm 21276185db85Sdougm sa_property_t 21286185db85Sdougm sa_get_property(sa_optionset_t optionset, char *prop) 21296185db85Sdougm { 21306185db85Sdougm xmlNodePtr node = (xmlNodePtr)optionset; 21316185db85Sdougm xmlChar *value = NULL; 21326185db85Sdougm 21336185db85Sdougm if (optionset == NULL) 21346185db85Sdougm return (NULL); 21356185db85Sdougm 21366185db85Sdougm for (node = node->children; node != NULL; 21376185db85Sdougm node = node->next) { 21386185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"option") == 0) { 21396185db85Sdougm if (prop == NULL) 21406185db85Sdougm break; 21416185db85Sdougm value = xmlGetProp(node, (xmlChar *)"type"); 214257b448deSdougm if (value != NULL && 214357b448deSdougm xmlStrcmp(value, (xmlChar *)prop) == 0) { 21446185db85Sdougm break; 21456185db85Sdougm } 21466185db85Sdougm if (value != NULL) { 21476185db85Sdougm xmlFree(value); 21486185db85Sdougm value = NULL; 21496185db85Sdougm } 21506185db85Sdougm } 21516185db85Sdougm } 21526185db85Sdougm if (value != NULL) 21536185db85Sdougm xmlFree(value); 21546185db85Sdougm if (node != NULL && xmlStrcmp(node->name, (xmlChar *)"option") != 0) { 215557b448deSdougm /* 215657b448deSdougm * avoid a non option node -- it is possible to be a 215757b448deSdougm * text node 215857b448deSdougm */ 21596185db85Sdougm node = NULL; 21606185db85Sdougm } 21616185db85Sdougm return ((sa_property_t)node); 21626185db85Sdougm } 21636185db85Sdougm 21646185db85Sdougm /* 21656185db85Sdougm * sa_get_next_property(property) 21666185db85Sdougm * 21676185db85Sdougm * Get the next property following the specified property. NULL if 21686185db85Sdougm * this was the last. 21696185db85Sdougm */ 21706185db85Sdougm 21716185db85Sdougm sa_property_t 21726185db85Sdougm sa_get_next_property(sa_property_t property) 21736185db85Sdougm { 21746185db85Sdougm xmlNodePtr node; 21756185db85Sdougm 21766185db85Sdougm for (node = ((xmlNodePtr)property)->next; node != NULL; 21776185db85Sdougm node = node->next) { 21786185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"option") == 0) { 21796185db85Sdougm break; 21806185db85Sdougm } 21816185db85Sdougm } 21826185db85Sdougm return ((sa_property_t)node); 21836185db85Sdougm } 21846185db85Sdougm 21856185db85Sdougm /* 21866185db85Sdougm * sa_set_share_description(share, content) 21876185db85Sdougm * 21886185db85Sdougm * Set the description of share to content. 21896185db85Sdougm */ 21906185db85Sdougm 21916185db85Sdougm int 21926185db85Sdougm sa_set_share_description(sa_share_t share, char *content) 21936185db85Sdougm { 21946185db85Sdougm xmlNodePtr node; 21956185db85Sdougm sa_group_t group; 21966185db85Sdougm int ret = SA_OK; 21976185db85Sdougm 21986185db85Sdougm for (node = ((xmlNodePtr)share)->children; node != NULL; 21996185db85Sdougm node = node->next) { 22006185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"description") == 0) { 22016185db85Sdougm break; 22026185db85Sdougm } 22036185db85Sdougm } 22046185db85Sdougm group = sa_get_parent_group(share); 22056185db85Sdougm /* no existing description but want to add */ 22066185db85Sdougm if (node == NULL && content != NULL) { 22076185db85Sdougm /* add a description */ 22086185db85Sdougm node = _sa_set_share_description(share, content); 22096185db85Sdougm } else if (node != NULL && content != NULL) { 22106185db85Sdougm /* update a description */ 22116185db85Sdougm xmlNodeSetContent(node, (xmlChar *)content); 22126185db85Sdougm } else if (node != NULL && content == NULL) { 22136185db85Sdougm /* remove an existing description */ 22146185db85Sdougm xmlUnlinkNode(node); 22156185db85Sdougm xmlFreeNode(node); 22166185db85Sdougm } 2217549ec3ffSdougm if (group != NULL && is_persistent((sa_group_t)share)) { 2218549ec3ffSdougm sa_handle_impl_t impl_handle; 2219549ec3ffSdougm impl_handle = (sa_handle_impl_t)sa_find_group_handle(group); 222057b448deSdougm if (impl_handle != NULL) { 222157b448deSdougm ret = sa_commit_share(impl_handle->scfhandle, group, 222257b448deSdougm share); 222357b448deSdougm } else { 2224549ec3ffSdougm ret = SA_SYSTEM_ERR; 2225549ec3ffSdougm } 222657b448deSdougm } 22276185db85Sdougm return (ret); 22286185db85Sdougm } 22296185db85Sdougm 22306185db85Sdougm /* 22316185db85Sdougm * fixproblemchars(string) 22326185db85Sdougm * 22336185db85Sdougm * don't want any newline or tab characters in the text since these 22346185db85Sdougm * could break display of data and legacy file formats. 22356185db85Sdougm */ 22366185db85Sdougm static void 22376185db85Sdougm fixproblemchars(char *str) 22386185db85Sdougm { 22396185db85Sdougm int c; 22406185db85Sdougm for (c = *str; c != '\0'; c = *++str) { 22416185db85Sdougm if (c == '\t' || c == '\n') 22426185db85Sdougm *str = ' '; 22436185db85Sdougm else if (c == '"') 22446185db85Sdougm *str = '\''; 22456185db85Sdougm } 22466185db85Sdougm } 22476185db85Sdougm 22486185db85Sdougm /* 22496185db85Sdougm * sa_get_share_description(share) 22506185db85Sdougm * 22516185db85Sdougm * Return the description text for the specified share if it 22526185db85Sdougm * exists. NULL if no description exists. 22536185db85Sdougm */ 22546185db85Sdougm 22556185db85Sdougm char * 22566185db85Sdougm sa_get_share_description(sa_share_t share) 22576185db85Sdougm { 22586185db85Sdougm xmlChar *description = NULL; 22596185db85Sdougm xmlNodePtr node; 22606185db85Sdougm 22616185db85Sdougm for (node = ((xmlNodePtr)share)->children; node != NULL; 22626185db85Sdougm node = node->next) { 22636185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"description") == 0) { 22646185db85Sdougm break; 22656185db85Sdougm } 22666185db85Sdougm } 22676185db85Sdougm if (node != NULL) { 22686185db85Sdougm description = xmlNodeGetContent((xmlNodePtr)share); 22696185db85Sdougm fixproblemchars((char *)description); 22706185db85Sdougm } 22716185db85Sdougm return ((char *)description); 22726185db85Sdougm } 22736185db85Sdougm 22746185db85Sdougm /* 22756185db85Sdougm * sa_free(share_description(description) 22766185db85Sdougm * 22776185db85Sdougm * Free the description string. 22786185db85Sdougm */ 22796185db85Sdougm 22806185db85Sdougm void 22816185db85Sdougm sa_free_share_description(char *description) 22826185db85Sdougm { 22836185db85Sdougm xmlFree((xmlChar *)description); 22846185db85Sdougm } 22856185db85Sdougm 22866185db85Sdougm /* 22876185db85Sdougm * sa_create_optionset(group, proto) 22886185db85Sdougm * 22896185db85Sdougm * Create an optionset for the specified protocol in the specied 22906185db85Sdougm * group. This is manifested as a property group within SMF. 22916185db85Sdougm */ 22926185db85Sdougm 22936185db85Sdougm sa_optionset_t 22946185db85Sdougm sa_create_optionset(sa_group_t group, char *proto) 22956185db85Sdougm { 22966185db85Sdougm sa_optionset_t optionset; 22976185db85Sdougm sa_group_t parent = group; 22986185db85Sdougm 22996185db85Sdougm optionset = sa_get_optionset(group, proto); 23006185db85Sdougm if (optionset != NULL) { 23016185db85Sdougm /* can't have a duplicate protocol */ 23026185db85Sdougm optionset = NULL; 23036185db85Sdougm } else { 23046185db85Sdougm optionset = (sa_optionset_t)xmlNewChild((xmlNodePtr)group, 230557b448deSdougm NULL, (xmlChar *)"optionset", NULL); 23066185db85Sdougm /* 23076185db85Sdougm * only put to repository if on a group and we were 23086185db85Sdougm * able to create an optionset. 23096185db85Sdougm */ 23106185db85Sdougm if (optionset != NULL) { 231157b448deSdougm char oname[SA_STRSIZE]; 23126185db85Sdougm char *groupname; 23136185db85Sdougm char *id = NULL; 23146185db85Sdougm 23156185db85Sdougm if (sa_is_share(group)) 23166185db85Sdougm parent = sa_get_parent_group((sa_share_t)group); 23176185db85Sdougm 23186185db85Sdougm sa_set_optionset_attr(optionset, "type", proto); 23196185db85Sdougm 23206185db85Sdougm if (sa_is_share(group)) { 23216185db85Sdougm id = sa_get_share_attr((sa_share_t)group, "id"); 23226185db85Sdougm } 23236185db85Sdougm (void) sa_optionset_name(optionset, oname, 23246185db85Sdougm sizeof (oname), id); 23256185db85Sdougm groupname = sa_get_group_attr(parent, "name"); 23266185db85Sdougm if (groupname != NULL && is_persistent(group)) { 2327549ec3ffSdougm sa_handle_impl_t impl_handle; 232857b448deSdougm impl_handle = (sa_handle_impl_t) 232957b448deSdougm sa_find_group_handle(group); 2330549ec3ffSdougm assert(impl_handle != NULL); 2331549ec3ffSdougm if (impl_handle != NULL) { 233257b448deSdougm (void) sa_get_instance( 233357b448deSdougm impl_handle->scfhandle, 2334549ec3ffSdougm groupname); 233557b448deSdougm (void) sa_create_pgroup( 233657b448deSdougm impl_handle->scfhandle, oname); 23376185db85Sdougm } 2338549ec3ffSdougm } 2339549ec3ffSdougm if (groupname != NULL) 2340549ec3ffSdougm sa_free_attr_string(groupname); 23416185db85Sdougm if (id != NULL) 23426185db85Sdougm sa_free_attr_string(id); 23436185db85Sdougm } 23446185db85Sdougm } 23456185db85Sdougm return (optionset); 23466185db85Sdougm } 23476185db85Sdougm 23486185db85Sdougm /* 23496185db85Sdougm * sa_get_property_parent(property) 23506185db85Sdougm * 23516185db85Sdougm * Given a property, return the object it is a property of. This will 23526185db85Sdougm * be an optionset of some type. 23536185db85Sdougm */ 23546185db85Sdougm 23556185db85Sdougm static sa_optionset_t 23566185db85Sdougm sa_get_property_parent(sa_property_t property) 23576185db85Sdougm { 23586185db85Sdougm xmlNodePtr node = NULL; 23596185db85Sdougm 236057b448deSdougm if (property != NULL) 23616185db85Sdougm node = ((xmlNodePtr)property)->parent; 23626185db85Sdougm return ((sa_optionset_t)node); 23636185db85Sdougm } 23646185db85Sdougm 23656185db85Sdougm /* 23666185db85Sdougm * sa_get_optionset_parent(optionset) 23676185db85Sdougm * 23686185db85Sdougm * Return the parent of the specified optionset. This could be a group 23696185db85Sdougm * or a share. 23706185db85Sdougm */ 23716185db85Sdougm 23726185db85Sdougm static sa_group_t 23736185db85Sdougm sa_get_optionset_parent(sa_optionset_t optionset) 23746185db85Sdougm { 23756185db85Sdougm xmlNodePtr node = NULL; 23766185db85Sdougm 237757b448deSdougm if (optionset != NULL) 23786185db85Sdougm node = ((xmlNodePtr)optionset)->parent; 23796185db85Sdougm return ((sa_group_t)node); 23806185db85Sdougm } 23816185db85Sdougm 23826185db85Sdougm /* 23836185db85Sdougm * zfs_needs_update(share) 23846185db85Sdougm * 23856185db85Sdougm * In order to avoid making multiple updates to a ZFS share when 23866185db85Sdougm * setting properties, the share attribute "changed" will be set to 23876185db85Sdougm * true when a property is added or modifed. When done adding 23886185db85Sdougm * properties, we can then detect that an update is needed. We then 23896185db85Sdougm * clear the state here to detect additional changes. 23906185db85Sdougm */ 23916185db85Sdougm 23926185db85Sdougm static int 23936185db85Sdougm zfs_needs_update(sa_share_t share) 23946185db85Sdougm { 23956185db85Sdougm char *attr; 23966185db85Sdougm int result = 0; 23976185db85Sdougm 23986185db85Sdougm attr = sa_get_share_attr(share, "changed"); 23996185db85Sdougm if (attr != NULL) { 24006185db85Sdougm sa_free_attr_string(attr); 24016185db85Sdougm result = 1; 24026185db85Sdougm } 24036185db85Sdougm set_node_attr((void *)share, "changed", NULL); 24046185db85Sdougm return (result); 24056185db85Sdougm } 24066185db85Sdougm 24076185db85Sdougm /* 24086185db85Sdougm * zfs_set_update(share) 24096185db85Sdougm * 24106185db85Sdougm * Set the changed attribute of the share to true. 24116185db85Sdougm */ 24126185db85Sdougm 24136185db85Sdougm static void 24146185db85Sdougm zfs_set_update(sa_share_t share) 24156185db85Sdougm { 24166185db85Sdougm set_node_attr((void *)share, "changed", "true"); 24176185db85Sdougm } 24186185db85Sdougm 24196185db85Sdougm /* 24206185db85Sdougm * sa_commit_properties(optionset, clear) 24216185db85Sdougm * 24226185db85Sdougm * Check if SMF or ZFS config and either update or abort the pending 24236185db85Sdougm * changes. 24246185db85Sdougm */ 24256185db85Sdougm 24266185db85Sdougm int 24276185db85Sdougm sa_commit_properties(sa_optionset_t optionset, int clear) 24286185db85Sdougm { 24296185db85Sdougm sa_group_t group; 24306185db85Sdougm sa_group_t parent; 24316185db85Sdougm int zfs = 0; 24326185db85Sdougm int needsupdate = 0; 24336185db85Sdougm int ret = SA_OK; 2434549ec3ffSdougm sa_handle_impl_t impl_handle; 24356185db85Sdougm 24366185db85Sdougm group = sa_get_optionset_parent(optionset); 24376185db85Sdougm if (group != NULL && (sa_is_share(group) || is_zfs_group(group))) { 24386185db85Sdougm /* only update ZFS if on a share */ 24396185db85Sdougm parent = sa_get_parent_group(group); 24406185db85Sdougm zfs++; 244157b448deSdougm if (parent != NULL && is_zfs_group(parent)) 24426185db85Sdougm needsupdate = zfs_needs_update(group); 244357b448deSdougm else 24446185db85Sdougm zfs = 0; 24456185db85Sdougm } 24466185db85Sdougm if (zfs) { 24476185db85Sdougm if (!clear && needsupdate) 24486185db85Sdougm ret = sa_zfs_update((sa_share_t)group); 24496185db85Sdougm } else { 2450549ec3ffSdougm impl_handle = (sa_handle_impl_t)sa_find_group_handle(group); 2451549ec3ffSdougm if (impl_handle != NULL) { 245257b448deSdougm if (clear) { 245357b448deSdougm (void) sa_abort_transaction( 245457b448deSdougm impl_handle->scfhandle); 245557b448deSdougm } else { 245657b448deSdougm ret = sa_end_transaction( 245757b448deSdougm impl_handle->scfhandle); 245857b448deSdougm } 2459549ec3ffSdougm } else { 2460549ec3ffSdougm ret = SA_SYSTEM_ERR; 2461549ec3ffSdougm } 24626185db85Sdougm } 24636185db85Sdougm return (ret); 24646185db85Sdougm } 24656185db85Sdougm 24666185db85Sdougm /* 24676185db85Sdougm * sa_destroy_optionset(optionset) 24686185db85Sdougm * 24696185db85Sdougm * Remove the optionset from its group. Update the repostory to 24706185db85Sdougm * reflect this change. 24716185db85Sdougm */ 24726185db85Sdougm 24736185db85Sdougm int 24746185db85Sdougm sa_destroy_optionset(sa_optionset_t optionset) 24756185db85Sdougm { 247657b448deSdougm char name[SA_STRSIZE]; 24776185db85Sdougm int len; 24786185db85Sdougm int ret; 24796185db85Sdougm char *id = NULL; 24806185db85Sdougm sa_group_t group; 24816185db85Sdougm int ispersist = 1; 24826185db85Sdougm 24836185db85Sdougm /* now delete the prop group */ 24846185db85Sdougm group = sa_get_optionset_parent(optionset); 24856185db85Sdougm if (group != NULL && sa_is_share(group)) { 24866185db85Sdougm ispersist = is_persistent(group); 24876185db85Sdougm id = sa_get_share_attr((sa_share_t)group, "id"); 24886185db85Sdougm } 24896185db85Sdougm if (ispersist) { 2490549ec3ffSdougm sa_handle_impl_t impl_handle; 24916185db85Sdougm len = sa_optionset_name(optionset, name, sizeof (name), id); 2492549ec3ffSdougm impl_handle = (sa_handle_impl_t)sa_find_group_handle(group); 2493549ec3ffSdougm if (impl_handle != NULL) { 24946185db85Sdougm if (len > 0) { 249557b448deSdougm ret = sa_delete_pgroup(impl_handle->scfhandle, 249657b448deSdougm name); 2497549ec3ffSdougm } 2498549ec3ffSdougm } else { 2499549ec3ffSdougm ret = SA_SYSTEM_ERR; 25006185db85Sdougm } 25016185db85Sdougm } 25026185db85Sdougm xmlUnlinkNode((xmlNodePtr)optionset); 25036185db85Sdougm xmlFreeNode((xmlNodePtr)optionset); 25046185db85Sdougm if (id != NULL) 25056185db85Sdougm sa_free_attr_string(id); 25066185db85Sdougm return (ret); 25076185db85Sdougm } 25086185db85Sdougm 25096185db85Sdougm /* private to the implementation */ 25106185db85Sdougm int 25116185db85Sdougm _sa_remove_optionset(sa_optionset_t optionset) 25126185db85Sdougm { 25136185db85Sdougm int ret = SA_OK; 25146185db85Sdougm 25156185db85Sdougm xmlUnlinkNode((xmlNodePtr)optionset); 25166185db85Sdougm xmlFreeNode((xmlNodePtr)optionset); 25176185db85Sdougm return (ret); 25186185db85Sdougm } 25196185db85Sdougm 25206185db85Sdougm /* 25216185db85Sdougm * sa_create_security(group, sectype, proto) 25226185db85Sdougm * 25236185db85Sdougm * Create a security optionset (one that has a type name and a 25246185db85Sdougm * proto). Security is left over from a pure NFS implementation. The 25256185db85Sdougm * naming will change in the future when the API is released. 25266185db85Sdougm */ 25276185db85Sdougm sa_security_t 25286185db85Sdougm sa_create_security(sa_group_t group, char *sectype, char *proto) 25296185db85Sdougm { 25306185db85Sdougm sa_security_t security; 25316185db85Sdougm char *id = NULL; 25326185db85Sdougm sa_group_t parent; 25336185db85Sdougm char *groupname = NULL; 25346185db85Sdougm 25356185db85Sdougm if (group != NULL && sa_is_share(group)) { 25366185db85Sdougm id = sa_get_share_attr((sa_share_t)group, "id"); 25376185db85Sdougm parent = sa_get_parent_group(group); 25386185db85Sdougm if (parent != NULL) 25396185db85Sdougm groupname = sa_get_group_attr(parent, "name"); 25406185db85Sdougm } else if (group != NULL) { 25416185db85Sdougm groupname = sa_get_group_attr(group, "name"); 25426185db85Sdougm } 25436185db85Sdougm 25446185db85Sdougm security = sa_get_security(group, sectype, proto); 25456185db85Sdougm if (security != NULL) { 25466185db85Sdougm /* can't have a duplicate security option */ 25476185db85Sdougm security = NULL; 25486185db85Sdougm } else { 25496185db85Sdougm security = (sa_security_t)xmlNewChild((xmlNodePtr)group, 255057b448deSdougm NULL, (xmlChar *)"security", NULL); 25516185db85Sdougm if (security != NULL) { 255257b448deSdougm char oname[SA_STRSIZE]; 25536185db85Sdougm sa_set_security_attr(security, "type", proto); 25546185db85Sdougm 25556185db85Sdougm sa_set_security_attr(security, "sectype", sectype); 25566185db85Sdougm (void) sa_security_name(security, oname, 25576185db85Sdougm sizeof (oname), id); 25586185db85Sdougm if (groupname != NULL && is_persistent(group)) { 2559549ec3ffSdougm sa_handle_impl_t impl_handle; 2560549ec3ffSdougm impl_handle = 256157b448deSdougm (sa_handle_impl_t)sa_find_group_handle( 256257b448deSdougm group); 2563549ec3ffSdougm if (impl_handle != NULL) { 256457b448deSdougm (void) sa_get_instance( 256557b448deSdougm impl_handle->scfhandle, groupname); 256657b448deSdougm (void) sa_create_pgroup( 256757b448deSdougm impl_handle->scfhandle, oname); 2568549ec3ffSdougm } 25696185db85Sdougm } 25706185db85Sdougm } 25716185db85Sdougm } 25726185db85Sdougm if (groupname != NULL) 25736185db85Sdougm sa_free_attr_string(groupname); 25746185db85Sdougm return (security); 25756185db85Sdougm } 25766185db85Sdougm 25776185db85Sdougm /* 25786185db85Sdougm * sa_destroy_security(security) 25796185db85Sdougm * 25806185db85Sdougm * Remove the specified optionset from the document and the 25816185db85Sdougm * configuration. 25826185db85Sdougm */ 25836185db85Sdougm 25846185db85Sdougm int 25856185db85Sdougm sa_destroy_security(sa_security_t security) 25866185db85Sdougm { 258757b448deSdougm char name[SA_STRSIZE]; 25886185db85Sdougm int len; 25896185db85Sdougm int ret = SA_OK; 25906185db85Sdougm char *id = NULL; 25916185db85Sdougm sa_group_t group; 25926185db85Sdougm int iszfs = 0; 25936185db85Sdougm int ispersist = 1; 25946185db85Sdougm 25956185db85Sdougm group = sa_get_optionset_parent(security); 25966185db85Sdougm 25976185db85Sdougm if (group != NULL) 25986185db85Sdougm iszfs = sa_group_is_zfs(group); 25996185db85Sdougm 26006185db85Sdougm if (group != NULL && !iszfs) { 26016185db85Sdougm if (sa_is_share(group)) 26026185db85Sdougm ispersist = is_persistent(group); 26036185db85Sdougm id = sa_get_share_attr((sa_share_t)group, "id"); 26046185db85Sdougm } 26056185db85Sdougm if (ispersist) { 26066185db85Sdougm len = sa_security_name(security, name, sizeof (name), id); 26076185db85Sdougm if (!iszfs && len > 0) { 2608549ec3ffSdougm sa_handle_impl_t impl_handle; 260957b448deSdougm impl_handle = 261057b448deSdougm (sa_handle_impl_t)sa_find_group_handle(group); 2611549ec3ffSdougm if (impl_handle != NULL) { 261257b448deSdougm ret = sa_delete_pgroup(impl_handle->scfhandle, 261357b448deSdougm name); 2614549ec3ffSdougm } else { 2615549ec3ffSdougm ret = SA_SYSTEM_ERR; 2616549ec3ffSdougm } 26176185db85Sdougm } 26186185db85Sdougm } 26196185db85Sdougm xmlUnlinkNode((xmlNodePtr)security); 26206185db85Sdougm xmlFreeNode((xmlNodePtr)security); 262157b448deSdougm if (iszfs) 26226185db85Sdougm ret = sa_zfs_update(group); 26236185db85Sdougm if (id != NULL) 26246185db85Sdougm sa_free_attr_string(id); 26256185db85Sdougm return (ret); 26266185db85Sdougm } 26276185db85Sdougm 26286185db85Sdougm /* 26296185db85Sdougm * sa_get_security_attr(optionset, tag) 26306185db85Sdougm * 26316185db85Sdougm * Return the specified attribute value from the optionset. 26326185db85Sdougm */ 26336185db85Sdougm 26346185db85Sdougm char * 26356185db85Sdougm sa_get_security_attr(sa_property_t optionset, char *tag) 26366185db85Sdougm { 26376185db85Sdougm return (get_node_attr((void *)optionset, tag)); 26386185db85Sdougm 26396185db85Sdougm } 26406185db85Sdougm 26416185db85Sdougm /* 26426185db85Sdougm * sa_set_security_attr(optionset, tag, value) 26436185db85Sdougm * 26446185db85Sdougm * Set the optioset attribute specied by tag to the specified value. 26456185db85Sdougm */ 26466185db85Sdougm 26476185db85Sdougm void 26486185db85Sdougm sa_set_security_attr(sa_group_t optionset, char *tag, char *value) 26496185db85Sdougm { 26506185db85Sdougm set_node_attr((void *)optionset, tag, value); 26516185db85Sdougm } 26526185db85Sdougm 26536185db85Sdougm /* 26546185db85Sdougm * is_nodetype(node, type) 26556185db85Sdougm * 26566185db85Sdougm * Check to see if node is of the type specified. 26576185db85Sdougm */ 26586185db85Sdougm 26596185db85Sdougm static int 26606185db85Sdougm is_nodetype(void *node, char *type) 26616185db85Sdougm { 26626185db85Sdougm return (strcmp((char *)((xmlNodePtr)node)->name, type) == 0); 26636185db85Sdougm } 26646185db85Sdougm 266557b448deSdougm 266657b448deSdougm /* 266757b448deSdougm * add_or_update() 266857b448deSdougm * 266957b448deSdougm * Add or update a property. Pulled out of sa_set_prop_by_prop for 267057b448deSdougm * readability. 267157b448deSdougm */ 267257b448deSdougm static int 267357b448deSdougm add_or_update(scfutilhandle_t *scf_handle, int type, scf_value_t *value, 267457b448deSdougm scf_transaction_entry_t *entry, char *name, char *valstr) 267557b448deSdougm { 267657b448deSdougm int ret = SA_SYSTEM_ERR; 267757b448deSdougm 267857b448deSdougm if (value != NULL) { 267957b448deSdougm if (type == SA_PROP_OP_ADD) 268057b448deSdougm ret = scf_transaction_property_new(scf_handle->trans, 268157b448deSdougm entry, name, SCF_TYPE_ASTRING); 268257b448deSdougm else 268357b448deSdougm ret = scf_transaction_property_change(scf_handle->trans, 268457b448deSdougm entry, name, SCF_TYPE_ASTRING); 268557b448deSdougm if (ret == 0) { 268657b448deSdougm ret = scf_value_set_astring(value, valstr); 268757b448deSdougm if (ret == 0) 268857b448deSdougm ret = scf_entry_add_value(entry, value); 268957b448deSdougm if (ret == 0) 269057b448deSdougm return (ret); 269157b448deSdougm scf_value_destroy(value); 269257b448deSdougm } else { 269357b448deSdougm scf_entry_destroy(entry); 269457b448deSdougm } 269557b448deSdougm } 269657b448deSdougm return (SA_SYSTEM_ERR); 269757b448deSdougm } 269857b448deSdougm 26996185db85Sdougm /* 27006185db85Sdougm * sa_set_prop_by_prop(optionset, group, prop, type) 27016185db85Sdougm * 27026185db85Sdougm * Add/remove/update the specified property prop into the optionset or 27036185db85Sdougm * share. If a share, sort out which property group based on GUID. In 27046185db85Sdougm * all cases, the appropriate transaction is set (or ZFS share is 27056185db85Sdougm * marked as needing an update) 27066185db85Sdougm */ 27076185db85Sdougm 27086185db85Sdougm static int 27096185db85Sdougm sa_set_prop_by_prop(sa_optionset_t optionset, sa_group_t group, 27106185db85Sdougm sa_property_t prop, int type) 27116185db85Sdougm { 27126185db85Sdougm char *name; 27136185db85Sdougm char *valstr; 27146185db85Sdougm int ret = SA_OK; 27156185db85Sdougm scf_transaction_entry_t *entry; 27166185db85Sdougm scf_value_t *value; 27176185db85Sdougm int opttype; /* 1 == optionset, 0 == security */ 27186185db85Sdougm char *id = NULL; 27196185db85Sdougm int iszfs = 0; 27206185db85Sdougm int isshare = 0; 27216185db85Sdougm sa_group_t parent = NULL; 2722549ec3ffSdougm sa_handle_impl_t impl_handle; 2723549ec3ffSdougm scfutilhandle_t *scf_handle; 27246185db85Sdougm 27256185db85Sdougm if (!is_persistent(group)) { 27266185db85Sdougm /* 27276185db85Sdougm * if the group/share is not persistent we don't need 27286185db85Sdougm * to do anything here 27296185db85Sdougm */ 27306185db85Sdougm return (SA_OK); 27316185db85Sdougm } 2732549ec3ffSdougm impl_handle = (sa_handle_impl_t)sa_find_group_handle(group); 273357b448deSdougm if (impl_handle == NULL || impl_handle->scfhandle == NULL) 2734549ec3ffSdougm return (SA_SYSTEM_ERR); 2735549ec3ffSdougm scf_handle = impl_handle->scfhandle; 27366185db85Sdougm name = sa_get_property_attr(prop, "type"); 27376185db85Sdougm valstr = sa_get_property_attr(prop, "value"); 27386185db85Sdougm entry = scf_entry_create(scf_handle->handle); 27396185db85Sdougm opttype = is_nodetype((void *)optionset, "optionset"); 27406185db85Sdougm 27416185db85Sdougm if (valstr != NULL && entry != NULL) { 27426185db85Sdougm if (sa_is_share(group)) { 27436185db85Sdougm isshare = 1; 27446185db85Sdougm parent = sa_get_parent_group(group); 274557b448deSdougm if (parent != NULL) 27466185db85Sdougm iszfs = is_zfs_group(parent); 27476185db85Sdougm } else { 27486185db85Sdougm iszfs = is_zfs_group(group); 27496185db85Sdougm } 27506185db85Sdougm if (!iszfs) { 27516185db85Sdougm if (scf_handle->trans == NULL) { 275257b448deSdougm char oname[SA_STRSIZE]; 27536185db85Sdougm char *groupname = NULL; 27546185db85Sdougm if (isshare) { 27556185db85Sdougm if (parent != NULL) { 275657b448deSdougm groupname = 275757b448deSdougm sa_get_group_attr(parent, 275857b448deSdougm "name"); 27596185db85Sdougm } 276057b448deSdougm id = 276157b448deSdougm sa_get_share_attr((sa_share_t)group, 276257b448deSdougm "id"); 27636185db85Sdougm } else { 276457b448deSdougm groupname = sa_get_group_attr(group, 276557b448deSdougm "name"); 27666185db85Sdougm } 27676185db85Sdougm if (groupname != NULL) { 276857b448deSdougm ret = sa_get_instance(scf_handle, 276957b448deSdougm groupname); 27706185db85Sdougm sa_free_attr_string(groupname); 27716185db85Sdougm } 27726185db85Sdougm if (opttype) 277357b448deSdougm (void) sa_optionset_name(optionset, 277457b448deSdougm oname, sizeof (oname), id); 27756185db85Sdougm else 277657b448deSdougm (void) sa_security_name(optionset, 277757b448deSdougm oname, sizeof (oname), id); 27786185db85Sdougm ret = sa_start_transaction(scf_handle, oname); 27796185db85Sdougm } 27806185db85Sdougm if (ret == SA_OK) { 27816185db85Sdougm switch (type) { 27826185db85Sdougm case SA_PROP_OP_REMOVE: 2783549ec3ffSdougm ret = scf_transaction_property_delete( 278457b448deSdougm scf_handle->trans, entry, name); 27856185db85Sdougm break; 27866185db85Sdougm case SA_PROP_OP_ADD: 27876185db85Sdougm case SA_PROP_OP_UPDATE: 278857b448deSdougm value = scf_value_create( 278957b448deSdougm scf_handle->handle); 279057b448deSdougm ret = add_or_update(scf_handle, type, 279157b448deSdougm value, entry, name, valstr); 27926185db85Sdougm break; 27936185db85Sdougm } 27946185db85Sdougm } 27956185db85Sdougm } else { 27966185db85Sdougm /* 27976185db85Sdougm * ZFS update. The calling function would have updated 27986185db85Sdougm * the internal XML structure. Just need to flag it as 27996185db85Sdougm * changed for ZFS. 28006185db85Sdougm */ 28016185db85Sdougm zfs_set_update((sa_share_t)group); 28026185db85Sdougm } 28036185db85Sdougm } 28046185db85Sdougm 28056185db85Sdougm if (name != NULL) 28066185db85Sdougm sa_free_attr_string(name); 28076185db85Sdougm if (valstr != NULL) 28086185db85Sdougm sa_free_attr_string(valstr); 28096185db85Sdougm else if (entry != NULL) 28106185db85Sdougm scf_entry_destroy(entry); 28116185db85Sdougm 28126185db85Sdougm if (ret == -1) 28136185db85Sdougm ret = SA_SYSTEM_ERR; 28146185db85Sdougm 28156185db85Sdougm return (ret); 28166185db85Sdougm } 28176185db85Sdougm 28186185db85Sdougm /* 28196185db85Sdougm * sa_create_property(name, value) 28206185db85Sdougm * 28216185db85Sdougm * Create a new property with the specified name and value. 28226185db85Sdougm */ 28236185db85Sdougm 28246185db85Sdougm sa_property_t 28256185db85Sdougm sa_create_property(char *name, char *value) 28266185db85Sdougm { 28276185db85Sdougm xmlNodePtr node; 28286185db85Sdougm 28296185db85Sdougm node = xmlNewNode(NULL, (xmlChar *)"option"); 28306185db85Sdougm if (node != NULL) { 28316185db85Sdougm xmlSetProp(node, (xmlChar *)"type", (xmlChar *)name); 28326185db85Sdougm xmlSetProp(node, (xmlChar *)"value", (xmlChar *)value); 28336185db85Sdougm } 28346185db85Sdougm return ((sa_property_t)node); 28356185db85Sdougm } 28366185db85Sdougm 28376185db85Sdougm /* 28386185db85Sdougm * sa_add_property(object, property) 28396185db85Sdougm * 28406185db85Sdougm * Add the specified property to the object. Issue the appropriate 28416185db85Sdougm * transaction or mark a ZFS object as needing an update. 28426185db85Sdougm */ 28436185db85Sdougm 28446185db85Sdougm int 28456185db85Sdougm sa_add_property(void *object, sa_property_t property) 28466185db85Sdougm { 28476185db85Sdougm int ret = SA_OK; 28486185db85Sdougm sa_group_t parent; 28496185db85Sdougm sa_group_t group; 28506185db85Sdougm char *proto; 28516185db85Sdougm 28526185db85Sdougm proto = sa_get_optionset_attr(object, "type"); 28536185db85Sdougm if (property != NULL) { 285457b448deSdougm if ((ret = sa_valid_property(object, proto, property)) == 285557b448deSdougm SA_OK) { 285657b448deSdougm property = (sa_property_t)xmlAddChild( 285757b448deSdougm (xmlNodePtr)object, (xmlNodePtr)property); 28586185db85Sdougm } else { 28596185db85Sdougm if (proto != NULL) 28606185db85Sdougm sa_free_attr_string(proto); 28616185db85Sdougm return (ret); 28626185db85Sdougm } 28636185db85Sdougm } 28646185db85Sdougm 28656185db85Sdougm if (proto != NULL) 28666185db85Sdougm sa_free_attr_string(proto); 28676185db85Sdougm 28686185db85Sdougm parent = sa_get_parent_group(object); 28696185db85Sdougm if (!is_persistent(parent)) { 28706185db85Sdougm return (ret); 28716185db85Sdougm } 28726185db85Sdougm 28736185db85Sdougm if (sa_is_share(parent)) 28746185db85Sdougm group = sa_get_parent_group(parent); 28756185db85Sdougm else 28766185db85Sdougm group = parent; 28776185db85Sdougm 287857b448deSdougm if (property == NULL) { 28796185db85Sdougm ret = SA_NO_MEMORY; 288057b448deSdougm } else { 288157b448deSdougm char oname[SA_STRSIZE]; 28826185db85Sdougm 28836185db85Sdougm if (!is_zfs_group(group)) { 28846185db85Sdougm char *id = NULL; 2885549ec3ffSdougm sa_handle_impl_t impl_handle; 2886549ec3ffSdougm scfutilhandle_t *scf_handle; 2887549ec3ffSdougm 288857b448deSdougm impl_handle = (sa_handle_impl_t)sa_find_group_handle( 288957b448deSdougm group); 289057b448deSdougm if (impl_handle == NULL || 289157b448deSdougm impl_handle->scfhandle == NULL) 2892549ec3ffSdougm ret = SA_SYSTEM_ERR; 2893549ec3ffSdougm if (ret == SA_OK) { 2894549ec3ffSdougm scf_handle = impl_handle->scfhandle; 28956185db85Sdougm if (sa_is_share((sa_group_t)parent)) { 289657b448deSdougm id = sa_get_share_attr( 289757b448deSdougm (sa_share_t)parent, "id"); 28986185db85Sdougm } 28996185db85Sdougm if (scf_handle->trans == NULL) { 290057b448deSdougm if (is_nodetype(object, "optionset")) { 290157b448deSdougm (void) sa_optionset_name( 290257b448deSdougm (sa_optionset_t)object, 29036185db85Sdougm oname, sizeof (oname), id); 290457b448deSdougm } else { 290557b448deSdougm (void) sa_security_name( 290657b448deSdougm (sa_optionset_t)object, 29076185db85Sdougm oname, sizeof (oname), id); 290857b448deSdougm } 290957b448deSdougm ret = sa_start_transaction(scf_handle, 291057b448deSdougm oname); 29116185db85Sdougm } 29126185db85Sdougm if (ret == SA_OK) { 29136185db85Sdougm char *name; 29146185db85Sdougm char *value; 291557b448deSdougm name = sa_get_property_attr(property, 291657b448deSdougm "type"); 291757b448deSdougm value = sa_get_property_attr(property, 291857b448deSdougm "value"); 29196185db85Sdougm if (name != NULL && value != NULL) { 292057b448deSdougm if (scf_handle->scf_state == 292157b448deSdougm SCH_STATE_INIT) { 292257b448deSdougm ret = sa_set_property( 292357b448deSdougm scf_handle, name, 292457b448deSdougm value); 292557b448deSdougm } 292657b448deSdougm } else { 29276185db85Sdougm ret = SA_CONFIG_ERR; 292857b448deSdougm } 29296185db85Sdougm if (name != NULL) 293057b448deSdougm sa_free_attr_string( 293157b448deSdougm name); 29326185db85Sdougm if (value != NULL) 29336185db85Sdougm sa_free_attr_string(value); 29346185db85Sdougm } 29356185db85Sdougm if (id != NULL) 29366185db85Sdougm sa_free_attr_string(id); 2937549ec3ffSdougm } 29386185db85Sdougm } else { 29396185db85Sdougm /* 294057b448deSdougm * ZFS is a special case. We do want 294157b448deSdougm * to allow editing property/security 294257b448deSdougm * lists since we can have a better 294357b448deSdougm * syntax and we also want to keep 294457b448deSdougm * things consistent when possible. 29456185db85Sdougm * 294657b448deSdougm * Right now, we defer until the 294757b448deSdougm * sa_commit_properties so we can get 294857b448deSdougm * them all at once. We do need to 294957b448deSdougm * mark the share as "changed" 29506185db85Sdougm */ 29516185db85Sdougm zfs_set_update((sa_share_t)parent); 29526185db85Sdougm } 29536185db85Sdougm } 29546185db85Sdougm return (ret); 29556185db85Sdougm } 29566185db85Sdougm 29576185db85Sdougm /* 29586185db85Sdougm * sa_remove_property(property) 29596185db85Sdougm * 29606185db85Sdougm * Remove the specied property from its containing object. Update the 29616185db85Sdougm * repository as appropriate. 29626185db85Sdougm */ 29636185db85Sdougm 29646185db85Sdougm int 29656185db85Sdougm sa_remove_property(sa_property_t property) 29666185db85Sdougm { 29676185db85Sdougm int ret = SA_OK; 29686185db85Sdougm 29696185db85Sdougm if (property != NULL) { 29706185db85Sdougm sa_optionset_t optionset; 29716185db85Sdougm sa_group_t group; 29726185db85Sdougm optionset = sa_get_property_parent(property); 29736185db85Sdougm if (optionset != NULL) { 29746185db85Sdougm group = sa_get_optionset_parent(optionset); 29756185db85Sdougm if (group != NULL) { 297657b448deSdougm ret = sa_set_prop_by_prop(optionset, group, 297757b448deSdougm property, SA_PROP_OP_REMOVE); 29786185db85Sdougm } 29796185db85Sdougm } 29806185db85Sdougm xmlUnlinkNode((xmlNodePtr)property); 29816185db85Sdougm xmlFreeNode((xmlNodePtr)property); 29826185db85Sdougm } else { 29836185db85Sdougm ret = SA_NO_SUCH_PROP; 29846185db85Sdougm } 29856185db85Sdougm return (ret); 29866185db85Sdougm } 29876185db85Sdougm 29886185db85Sdougm /* 29896185db85Sdougm * sa_update_property(property, value) 29906185db85Sdougm * 29916185db85Sdougm * Update the specified property to the new value. If value is NULL, 29926185db85Sdougm * we currently treat this as a remove. 29936185db85Sdougm */ 29946185db85Sdougm 29956185db85Sdougm int 29966185db85Sdougm sa_update_property(sa_property_t property, char *value) 29976185db85Sdougm { 29986185db85Sdougm int ret = SA_OK; 29996185db85Sdougm if (value == NULL) { 30006185db85Sdougm return (sa_remove_property(property)); 30016185db85Sdougm } else { 30026185db85Sdougm sa_optionset_t optionset; 30036185db85Sdougm sa_group_t group; 30046185db85Sdougm set_node_attr((void *)property, "value", value); 30056185db85Sdougm optionset = sa_get_property_parent(property); 30066185db85Sdougm if (optionset != NULL) { 30076185db85Sdougm group = sa_get_optionset_parent(optionset); 30086185db85Sdougm if (group != NULL) { 300957b448deSdougm ret = sa_set_prop_by_prop(optionset, group, 301057b448deSdougm property, SA_PROP_OP_UPDATE); 30116185db85Sdougm } 30126185db85Sdougm } else { 30136185db85Sdougm ret = SA_NO_SUCH_PROP; 30146185db85Sdougm } 30156185db85Sdougm } 30166185db85Sdougm return (ret); 30176185db85Sdougm } 30186185db85Sdougm 30196185db85Sdougm /* 30206185db85Sdougm * sa_get_protocol_property(propset, prop) 30216185db85Sdougm * 30226185db85Sdougm * Get the specified protocol specific property. These are global to 30236185db85Sdougm * the protocol and not specific to a group or share. 30246185db85Sdougm */ 30256185db85Sdougm 30266185db85Sdougm sa_property_t 30276185db85Sdougm sa_get_protocol_property(sa_protocol_properties_t propset, char *prop) 30286185db85Sdougm { 30296185db85Sdougm xmlNodePtr node = (xmlNodePtr)propset; 30306185db85Sdougm xmlChar *value = NULL; 30316185db85Sdougm 30326185db85Sdougm for (node = node->children; node != NULL; 30336185db85Sdougm node = node->next) { 30346185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"option") == 0) { 30356185db85Sdougm if (prop == NULL) 30366185db85Sdougm break; 30376185db85Sdougm value = xmlGetProp(node, (xmlChar *)"type"); 30386185db85Sdougm if (value != NULL && 30396185db85Sdougm xmlStrcasecmp(value, (xmlChar *)prop) == 0) { 30406185db85Sdougm break; 30416185db85Sdougm } 30426185db85Sdougm if (value != NULL) { 30436185db85Sdougm xmlFree(value); 30446185db85Sdougm value = NULL; 30456185db85Sdougm } 30466185db85Sdougm } 30476185db85Sdougm } 30486185db85Sdougm if (value != NULL) 30496185db85Sdougm xmlFree(value); 30506185db85Sdougm if (node != NULL && xmlStrcmp(node->name, (xmlChar *)"option") != 0) { 305157b448deSdougm /* 305257b448deSdougm * avoid a non option node -- it is possible to be a 305357b448deSdougm * text node 305457b448deSdougm */ 30556185db85Sdougm node = NULL; 30566185db85Sdougm } 30576185db85Sdougm return ((sa_property_t)node); 30586185db85Sdougm } 30596185db85Sdougm 30606185db85Sdougm /* 30616185db85Sdougm * sa_get_next_protocol_property(prop) 30626185db85Sdougm * 30636185db85Sdougm * Get the next protocol specific property in the list. 30646185db85Sdougm */ 30656185db85Sdougm 30666185db85Sdougm sa_property_t 30676185db85Sdougm sa_get_next_protocol_property(sa_property_t prop) 30686185db85Sdougm { 30696185db85Sdougm xmlNodePtr node; 30706185db85Sdougm 30716185db85Sdougm for (node = ((xmlNodePtr)prop)->next; node != NULL; 30726185db85Sdougm node = node->next) { 30736185db85Sdougm if (xmlStrcmp(node->name, (xmlChar *)"option") == 0) { 30746185db85Sdougm break; 30756185db85Sdougm } 30766185db85Sdougm } 30776185db85Sdougm return ((sa_property_t)node); 30786185db85Sdougm } 30796185db85Sdougm 30806185db85Sdougm /* 30816185db85Sdougm * sa_set_protocol_property(prop, value) 30826185db85Sdougm * 30836185db85Sdougm * Set the specified property to have the new value. The protocol 30846185db85Sdougm * specific plugin will then be called to update the property. 30856185db85Sdougm */ 30866185db85Sdougm 30876185db85Sdougm int 30886185db85Sdougm sa_set_protocol_property(sa_property_t prop, char *value) 30896185db85Sdougm { 30906185db85Sdougm sa_protocol_properties_t propset; 30916185db85Sdougm char *proto; 30926185db85Sdougm int ret = SA_INVALID_PROTOCOL; 30936185db85Sdougm 30946185db85Sdougm propset = ((xmlNodePtr)prop)->parent; 30956185db85Sdougm if (propset != NULL) { 30966185db85Sdougm proto = sa_get_optionset_attr(propset, "type"); 30976185db85Sdougm if (proto != NULL) { 30986185db85Sdougm set_node_attr((xmlNodePtr)prop, "value", value); 30996185db85Sdougm ret = sa_proto_set_property(proto, prop); 31003472f5dcSdougm sa_free_attr_string(proto); 31016185db85Sdougm } 31026185db85Sdougm } 31036185db85Sdougm return (ret); 31046185db85Sdougm } 31056185db85Sdougm 31066185db85Sdougm /* 31076185db85Sdougm * sa_add_protocol_property(propset, prop) 31086185db85Sdougm * 31096185db85Sdougm * Add a new property to the protocol sepcific property set. 31106185db85Sdougm */ 31116185db85Sdougm 31126185db85Sdougm int 31136185db85Sdougm sa_add_protocol_property(sa_protocol_properties_t propset, sa_property_t prop) 31146185db85Sdougm { 31156185db85Sdougm xmlNodePtr node; 31166185db85Sdougm 31176185db85Sdougm /* should check for legitimacy */ 31186185db85Sdougm node = xmlAddChild((xmlNodePtr)propset, (xmlNodePtr)prop); 31196185db85Sdougm if (node != NULL) 31206185db85Sdougm return (SA_OK); 31216185db85Sdougm return (SA_NO_MEMORY); 31226185db85Sdougm } 31236185db85Sdougm 31246185db85Sdougm /* 31256185db85Sdougm * sa_create_protocol_properties(proto) 31266185db85Sdougm * 31276185db85Sdougm * Create a protocol specifity property set. 31286185db85Sdougm */ 31296185db85Sdougm 31306185db85Sdougm sa_protocol_properties_t 31316185db85Sdougm sa_create_protocol_properties(char *proto) 31326185db85Sdougm { 31336185db85Sdougm xmlNodePtr node; 313457b448deSdougm 31356185db85Sdougm node = xmlNewNode(NULL, (xmlChar *)"propertyset"); 313657b448deSdougm if (node != NULL) 31376185db85Sdougm xmlSetProp(node, (xmlChar *)"type", (xmlChar *)proto); 31386185db85Sdougm return (node); 31396185db85Sdougm } 3140