r5976: SIDs can't have more then 5 subauths (caught by [validate] and
[amitay/samba.git] / source4 / lib / cmdline / popt_common.c
1 /* 
2    Unix SMB/CIFS implementation.
3    Common popt routines
4
5    Copyright (C) Tim Potter 2001,2002
6    Copyright (C) Jelmer Vernooij 2002,2003,2005
7
8    This program is free software; you can redistribute it and/or modify
9    it under the terms of the GNU General Public License as published by
10    the Free Software Foundation; either version 2 of the License, or
11    (at your option) any later version.
12    
13    This program is distributed in the hope that it will be useful,
14    but WITHOUT ANY WARRANTY; without even the implied warranty of
15    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
16    GNU General Public License for more details.
17    
18    You should have received a copy of the GNU General Public License
19    along with this program; if not, write to the Free Software
20    Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
21 */
22
23 #include "includes.h"
24 #include "version.h"
25 #include "dynconfig.h"
26 #include "system/filesys.h"
27 #include "system/passwd.h"
28 #include "lib/cmdline/popt_common.h"
29
30 /* Handle command line options:
31  *              -d,--debuglevel 
32  *              -s,--configfile 
33  *              -O,--socket-options 
34  *              -V,--version
35  *              -l,--log-base
36  *              -n,--netbios-name
37  *              -W,--workgroup
38  *              -i,--scope
39  */
40
41 enum {OPT_OPTION=1,OPT_LEAK_REPORT,OPT_LEAK_REPORT_FULL};
42
43 struct cli_credentials *cmdline_credentials = NULL;
44
45 static void popt_common_callback(poptContext con, 
46                            enum poptCallbackReason reason,
47                            const struct poptOption *opt,
48                            const char *arg, const void *data)
49 {
50         const char *pname;
51         
52         /* Find out basename of current program */
53         pname = strrchr_m(poptGetInvocationName(con),'/');
54
55         if (!pname)
56                 pname = poptGetInvocationName(con);
57         else 
58                 pname++;
59
60         if (reason == POPT_CALLBACK_REASON_PRE) {
61                 char *logfile = talloc_asprintf(NULL, "%s/log.%s", dyn_LOGFILEBASE, pname);
62                 lp_set_cmdline("log file", logfile);
63                 talloc_free(logfile);
64                 return;
65         }
66
67         switch(opt->val) {
68         case 'd':
69                 lp_set_cmdline("log level", arg);
70                 break;
71
72         case 'V':
73                 printf( "Version %s\n", SAMBA_VERSION_STRING );
74                 exit(0);
75                 break;
76
77         case 'O':
78                 if (arg) {
79                         lp_set_cmdline("socket options", arg);
80                 }
81                 break;
82
83         case 's':
84                 if (arg) {
85                         pstrcpy(dyn_CONFIGFILE, arg);
86                 }
87                 break;
88
89         case 'l':
90                 if (arg) {
91                         char *logfile = talloc_asprintf(NULL, "%s/log.%s", arg, pname);
92                         lp_set_cmdline("log file", logfile);
93                         talloc_free(logfile);
94                 }
95                 break;
96                 
97         case 'W':
98                 lp_set_cmdline("workgroup", arg);
99                 break;
100                 
101         case 'n':
102                 lp_set_cmdline("netbios name", arg);
103                 break;
104                 
105         case 'i':
106                 lp_set_cmdline("netbios scope", arg);
107                 break;
108
109         case 'm':
110                 lp_set_cmdline("max protocol", arg);
111                 break;
112
113         case 'R':
114                 lp_set_cmdline("name resolve order", arg);
115                 break;
116
117         case OPT_OPTION:
118                 if (!lp_set_option(arg)) {
119                         fprintf(stderr, "Error setting option '%s'\n", arg);
120                         exit(1);
121                 }
122                 break;
123
124         case OPT_LEAK_REPORT:
125                 talloc_enable_leak_report();
126                 break;
127
128         case OPT_LEAK_REPORT_FULL:
129                 talloc_enable_leak_report_full();
130                 break;
131         }
132 }
133
134 struct poptOption popt_common_connection[] = {
135         { NULL, 0, POPT_ARG_CALLBACK, popt_common_callback },
136         { "name-resolve", 'R', POPT_ARG_STRING, NULL, 'R', "Use these name resolution services only", "NAME-RESOLVE-ORDER" },
137         { "socket-options", 'O', POPT_ARG_STRING, NULL, 'O', "socket options to use", "SOCKETOPTIONS" },
138         { "netbiosname", 'n', POPT_ARG_STRING, NULL, 'n', "Primary netbios name", "NETBIOSNAME" },
139         { "workgroup", 'W', POPT_ARG_STRING, NULL, 'W', "Set the workgroup name", "WORKGROUP" },
140         { "scope", 'i', POPT_ARG_STRING, NULL, 'i', "Use this Netbios scope", "SCOPE" },
141         { "maxprotocol", 'm', POPT_ARG_STRING, NULL, 'm', "Set max protocol level", "MAXPROTOCOL" },
142         POPT_TABLEEND
143 };
144
145 struct poptOption popt_common_samba[] = {
146         { NULL, 0, POPT_ARG_CALLBACK|POPT_CBFLAG_PRE, popt_common_callback },
147         { "debuglevel",   'd', POPT_ARG_STRING, NULL, 'd', "Set debug level", "DEBUGLEVEL" },
148         { "configfile",   's', POPT_ARG_STRING, NULL, 's', "Use alternative configuration file", "CONFIGFILE" },
149         { "option",         0, POPT_ARG_STRING, NULL, OPT_OPTION, "Set smb.conf option from command line", "name=value" },
150         { "log-basename", 'l', POPT_ARG_STRING, NULL, 'l', "Basename for log/debug files", "LOGFILEBASE" },
151         { "leak-report",     0, POPT_ARG_NONE, NULL, OPT_LEAK_REPORT, "enable talloc leak reporting on exit", NULL },   
152         { "leak-report-full",0, POPT_ARG_NONE, NULL, OPT_LEAK_REPORT_FULL, "enable full talloc leak reporting on exit", NULL },
153         POPT_TABLEEND
154 };
155
156 struct poptOption popt_common_version[] = {
157         { NULL, 0, POPT_ARG_CALLBACK, popt_common_callback },
158         { "version", 'V', POPT_ARG_NONE, NULL, 'V', "Print version" },
159         POPT_TABLEEND
160 };
161
162 /* Handle command line options:
163  *              -U,--user
164  *              -A,--authentication-file
165  *              -k,--use-kerberos
166  *              -N,--no-pass
167  *              -S,--signing
168  *      -P --machine-pass
169  */
170
171
172 static BOOL dont_ask = False;
173
174 static void popt_common_credentials_callback(poptContext con, 
175                                                 enum poptCallbackReason reason,
176                                                 const struct poptOption *opt,
177                                                 const char *arg, const void *data)
178 {
179         if (reason == POPT_CALLBACK_REASON_PRE) {
180                 cmdline_credentials = cli_credentials_init(talloc_autofree_context());
181                 return;
182         }
183         
184         if (reason == POPT_CALLBACK_REASON_POST) {
185                 cli_credentials_guess(cmdline_credentials);
186
187                 if (!dont_ask) {
188                         cli_credentials_set_cmdline_callbacks(cmdline_credentials);
189                 }
190                 return;
191         }
192
193         switch(opt->val) {
194         case 'U':
195                 {
196                         char *lp;
197
198                         cli_credentials_parse_string(cmdline_credentials, arg, CRED_SPECIFIED);
199
200                         if ((lp=strchr_m(arg,'%'))) {
201                                 memset(lp,0,strlen(cmdline_credentials->password));
202                         }
203                 }
204                 break;
205
206         case 'A':
207                 cli_credentials_parse_file(cmdline_credentials, arg, CRED_SPECIFIED);
208                 break;
209
210         case 'S':
211                 lp_set_cmdline("client signing", arg);
212                 break;
213
214         case 'P':
215                 {
216                         char *opt_password = NULL;
217                         /* it is very useful to be able to make ads queries as the
218                            machine account for testing purposes and for domain leave */
219                         
220                         if (!secrets_init()) {
221                                 d_printf("ERROR: Unable to open secrets database\n");
222                                 exit(1);
223                         }
224                         
225                         opt_password = secrets_fetch_machine_password(lp_workgroup());
226                         
227                         if (!opt_password) {
228                                 d_printf("ERROR: Unable to fetch machine password\n");
229                                 exit(1);
230                         }
231                         cmdline_credentials->username = talloc_asprintf(cmdline_credentials, "%s$", lp_netbios_name());
232                         cmdline_credentials->username_obtained = CRED_SPECIFIED;
233                         cli_credentials_set_password(cmdline_credentials, opt_password, CRED_SPECIFIED);
234                         free(opt_password);
235                         
236                 }
237                 /* machine accounts only work with kerberos */
238
239         case 'k':
240 #ifndef HAVE_KRB5
241                 d_printf("No kerberos support compiled in\n");
242                 exit(1);
243 #else
244                 lp_set_cmdline("gensec:krb5", "True");
245                 lp_set_cmdline("gensec:ms_krb5", "True");
246 #endif
247                 break;
248
249
250         }
251 }
252
253
254
255 struct poptOption popt_common_credentials[] = {
256         { NULL, 0, POPT_ARG_CALLBACK|POPT_CBFLAG_PRE|POPT_CBFLAG_POST, popt_common_credentials_callback },
257         { "user", 'U', POPT_ARG_STRING, NULL, 'U', "Set the network username", "[DOMAIN\\]USERNAME[%PASSWORD]" },
258         { "no-pass", 'N', POPT_ARG_NONE, &dont_ask, True, "Don't ask for a password" },
259         { "kerberos", 'k', POPT_ARG_NONE, NULL, 'k', "Use kerberos (active directory) authentication" },
260         { "authentication-file", 'A', POPT_ARG_STRING, NULL, 'A', "Get the credentials from a file", "FILE" },
261         { "signing", 'S', POPT_ARG_STRING, NULL, 'S', "Set the client signing state", "on|off|required" },
262         { "machine-pass", 'P', POPT_ARG_NONE, NULL, 'P', "Use stored machine account password (implies -k)" },
263         POPT_TABLEEND
264 };