diff options
Diffstat (limited to 'usr.sbin/ctld/conf.cc')
| -rw-r--r-- | usr.sbin/ctld/conf.cc | 478 |
1 files changed, 478 insertions, 0 deletions
diff --git a/usr.sbin/ctld/conf.cc b/usr.sbin/ctld/conf.cc new file mode 100644 index 000000000000..56a149a58a25 --- /dev/null +++ b/usr.sbin/ctld/conf.cc @@ -0,0 +1,478 @@ +/*- + * SPDX-License-Identifier: BSD-2-Clause + * + * Copyright (c) 2012 The FreeBSD Foundation + * + * This software was developed by Edward Tomasz Napierala under sponsorship + * from the FreeBSD Foundation. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND + * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + * SUCH DAMAGE. + * + */ + +#include <sys/types.h> +#include <assert.h> +#include <stddef.h> +#include <stdint.h> +#include <stdio.h> +#include <stdlib.h> +#include <stdbool.h> +#include <string.h> +#include <cam/scsi/scsi_all.h> + +#include <libutil++.hh> + +#include "conf.h" +#include "ctld.hh" + +static struct conf *conf = NULL; +static struct auth_group *auth_group = NULL; +static struct portal_group *portal_group = NULL; +static struct target *target = NULL; +static struct lun *lun = NULL; + +void +conf_start(struct conf *new_conf) +{ + assert(conf == NULL); + conf = new_conf; +} + +void +conf_finish(void) +{ + auth_group = NULL; + portal_group = NULL; + target = NULL; + lun = NULL; + conf = NULL; +} + +bool +isns_add_server(const char *addr) +{ + return (conf->add_isns(addr)); +} + +void +conf_set_debug(int debug) +{ + conf->set_debug(debug); +} + +void +conf_set_isns_period(int period) +{ + conf->set_isns_period(period); +} + +void +conf_set_isns_timeout(int timeout) +{ + conf->set_isns_timeout(timeout); +} + +void +conf_set_maxproc(int maxproc) +{ + conf->set_maxproc(maxproc); +} + +bool +conf_set_pidfile_path(const char *path) +{ + return (conf->set_pidfile_path(path)); +} + +void +conf_set_timeout(int timeout) +{ + conf->set_timeout(timeout); +} + +bool +auth_group_add_chap(const char *user, const char *secret) +{ + return (auth_group->add_chap(user, secret)); +} + +bool +auth_group_add_chap_mutual(const char *user, const char *secret, + const char *user2, const char *secret2) +{ + return (auth_group->add_chap_mutual(user, secret, user2, secret2)); +} + +bool +auth_group_add_host_address(const char *portal) +{ + return (auth_group->add_host_address(portal)); +} + +bool +auth_group_add_host_nqn(const char *name) +{ + return (auth_group->add_host_nqn(name)); +} + +bool +auth_group_add_initiator_name(const char *name) +{ + return (auth_group->add_initiator_name(name)); +} + +bool +auth_group_add_initiator_portal(const char *portal) +{ + return (auth_group->add_initiator_portal(portal)); +} + +bool +auth_group_set_type(const char *type) +{ + return (auth_group->set_type(type)); +} + +bool +auth_group_start(const char *name) +{ + if (strcmp(name, "default") == 0) + auth_group = conf->define_default_auth_group(); + else + auth_group = conf->add_auth_group(name); + return (auth_group != nullptr); +} + +void +auth_group_finish(void) +{ + auth_group = NULL; +} + +bool +portal_group_start(const char *name) +{ + if (strcmp(name, "default") == 0) + portal_group = conf->define_default_portal_group(); + else + portal_group = conf->add_portal_group(name); + return (portal_group != NULL); +} + +void +portal_group_finish(void) +{ + portal_group = NULL; +} + +bool +portal_group_add_listen(const char *listen, bool iser) +{ + return (portal_group->add_portal(listen, iser ? portal_protocol::ISER : + portal_protocol::ISCSI)); +} + +bool +portal_group_add_option(const char *name, const char *value) +{ + return (portal_group->add_option(name, value)); +} + +bool +portal_group_set_discovery_auth_group(const char *name) +{ + return (portal_group->set_discovery_auth_group(name)); +} + +bool +portal_group_set_dscp(u_int dscp) +{ + return (portal_group->set_dscp(dscp)); +} + +bool +portal_group_set_filter(const char *str) +{ + return (portal_group->set_filter(str)); +} + +void +portal_group_set_foreign(void) +{ + portal_group->set_foreign(); +} + +bool +portal_group_set_offload(const char *offload) +{ + return (portal_group->set_offload(offload)); +} + +bool +portal_group_set_pcp(u_int pcp) +{ + return (portal_group->set_pcp(pcp)); +} + +bool +portal_group_set_redirection(const char *addr) +{ + return (portal_group->set_redirection(addr)); +} + +void +portal_group_set_tag(uint16_t tag) +{ + portal_group->set_tag(tag); +} + +bool +transport_group_start(const char *name) +{ + if (strcmp(name, "default") == 0) + portal_group = conf->define_default_transport_group(); + else + portal_group = conf->add_transport_group(name); + return (portal_group != NULL); +} + +bool +transport_group_add_listen_discovery_tcp(const char *listen) +{ + return portal_group->add_portal(listen, + portal_protocol::NVME_DISCOVERY_TCP); +} + +bool +transport_group_add_listen_tcp(const char *listen) +{ + return portal_group->add_portal(listen, portal_protocol::NVME_TCP); +} + +bool +lun_start(const char *name) +{ + lun = conf->add_lun(name); + return (lun != NULL); +} + +void +lun_finish(void) +{ + lun = NULL; +} + +bool +lun_add_option(const char *name, const char *value) +{ + return (lun->add_option(name, value)); +} + +bool +lun_set_backend(const char *value) +{ + return (lun->set_backend(value)); +} + +bool +lun_set_blocksize(size_t value) +{ + return (lun->set_blocksize(value)); +} + +bool +lun_set_device_type(const char *value) +{ + return (lun->set_device_type(value)); +} + +bool +lun_set_device_id(const char *value) +{ + return (lun->set_device_id(value)); +} + +bool +lun_set_path(const char *value) +{ + return (lun->set_path(value)); +} + +bool +lun_set_serial(const char *value) +{ + return (lun->set_serial(value)); +} + +bool +lun_set_size(uint64_t value) +{ + return (lun->set_size(value)); +} + +bool +lun_set_ctl_lun(uint32_t value) +{ + return (lun->set_ctl_lun(value)); +} + +bool +target_start(const char *name) +{ + target = conf->add_target(name); + return (target != NULL); +} + +void +target_finish(void) +{ + target = NULL; +} + +bool +target_add_chap(const char *user, const char *secret) +{ + return (target->add_chap(user, secret)); +} + +bool +target_add_chap_mutual(const char *user, const char *secret, + const char *user2, const char *secret2) +{ + return (target->add_chap_mutual(user, secret, user2, secret2)); +} + +bool +target_add_initiator_name(const char *name) +{ + return (target->add_initiator_name(name)); +} + +bool +target_add_initiator_portal(const char *addr) +{ + return (target->add_initiator_portal(addr)); +} + +bool +target_add_lun(u_int id, const char *name) +{ + return (target->add_lun(id, name)); +} + +bool +target_add_portal_group(const char *pg_name, const char *ag_name) +{ + return (target->add_portal_group(pg_name, ag_name)); +} + +bool +target_set_alias(const char *alias) +{ + return (target->set_alias(alias)); +} + +bool +target_set_auth_group(const char *name) +{ + return (target->set_auth_group(name)); +} + +bool +target_set_auth_type(const char *type) +{ + return (target->set_auth_type(type)); +} + +bool +target_set_physical_port(const char *pport) +{ + return (target->set_physical_port(pport)); +} + +bool +target_set_redirection(const char *addr) +{ + return (target->set_redirection(addr)); +} + +bool +target_start_lun(u_int id) +{ + lun = target->start_lun(id); + return (lun != nullptr); +} + +bool +controller_start(const char *name) +{ + target = conf->add_controller(name); + return (target != nullptr); +} + +bool +controller_add_host_address(const char *addr) +{ + return (target->add_host_address(addr)); +} + +bool +controller_add_host_nqn(const char *name) +{ + return (target->add_host_nqn(name)); +} + +bool +controller_add_namespace(u_int id, const char *name) +{ + return (target->add_namespace(id, name)); +} + +bool +controller_start_namespace(u_int id) +{ + lun = target->start_namespace(id); + return (lun != nullptr); +} + +bool +parse_conf(const char *path) +{ + freebsd::FILE_up fp(fopen(path, "r")); + if (fp == nullptr) { + log_warn("unable to open configuration file %s", path); + return (false); + } + + bool parsed; + try { + parsed = yyparse_conf(fp.get()); + } catch (std::bad_alloc &) { + log_warnx("failed to allocate memory parsing %s", path); + return (false); + } catch (...) { + log_warnx("unknown exception parsing %s", path); + return (false); + } + + return (parsed); +} |
