s4-debug: Start with DEBUG_DEFAULT_STDOUT, so we can log to a file in deamons
[amitay/samba.git] / source4 / lib / cmdline / popt_common.c
index 0cf57bb2e03f0f59e6c1b14ee6bd53aaf562a3a0..25b02b446d0ca94d9a5baf4923b9737f8c783ce8 100644 (file)
@@ -3,11 +3,11 @@
    Common popt routines
 
    Copyright (C) Tim Potter 2001,2002
-   Copyright (C) Jelmer Vernooij 2002,2003
+   Copyright (C) Jelmer Vernooij 2002,2003,2005
 
    This program is free software; you can redistribute it and/or modify
    it under the terms of the GNU General Public License as published by
-   the Free Software Foundation; either version 2 of the License, or
+   the Free Software Foundation; either version 3 of the License, or
    (at your option) any later version.
    
    This program is distributed in the hope that it will be useful,
    GNU General Public License for more details.
    
    You should have received a copy of the GNU General Public License
-   along with this program; if not, write to the Free Software
-   Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
+   along with this program.  If not, see <http://www.gnu.org/licenses/>.
 */
 
 #include "includes.h"
+#include "version.h"
+#include "lib/cmdline/popt_common.h"
+#include "param/param.h"
 
 /* Handle command line options:
  *             -d,--debuglevel 
  *             -l,--log-base
  *             -n,--netbios-name
  *             -W,--workgroup
+ *             --realm
  *             -i,--scope
  */
 
+enum {OPT_OPTION=1,OPT_LEAK_REPORT,OPT_LEAK_REPORT_FULL,OPT_DEBUG_STDERR};
 
-enum {OPT_OPTION=1,OPT_LEAK_REPORT,OPT_LEAK_REPORT_FULL};
+struct cli_credentials *cmdline_credentials = NULL;
+struct loadparm_context *cmdline_lp_ctx = NULL;
 
-static struct cmdline_auth_info cmdline_auth_info;
+static void popt_version_callback(poptContext con,
+                          enum poptCallbackReason reason,
+                          const struct poptOption *opt,
+                          const char *arg, const void *data)
+{
+       switch(opt->val) {
+       case 'V':
+               printf("Version %s\n", SAMBA_VERSION_STRING );
+               exit(0);
+       }
+}
 
-static void popt_common_callback(poptContext con, 
+static void popt_s4_talloc_log_fn(const char *message)
+{
+       DEBUG(0,("%s", message));
+}
+
+static void popt_samba_callback(poptContext con, 
                           enum poptCallbackReason reason,
                           const struct poptOption *opt,
                           const char *arg, const void *data)
 {
        const char *pname;
-       
+
+       if (reason == POPT_CALLBACK_REASON_POST) {
+               if (lpcfg_configfile(cmdline_lp_ctx) == NULL) {
+                       lpcfg_load_default(cmdline_lp_ctx);
+               }
+               /* Hook any 'every Samba program must do this, after
+                * the smb.conf is setup' functions here */
+               return;
+       }
+
        /* Find out basename of current program */
        pname = strrchr_m(poptGetInvocationName(con),'/');
 
@@ -54,436 +83,137 @@ static void popt_common_callback(poptContext con,
                pname++;
 
        if (reason == POPT_CALLBACK_REASON_PRE) {
-               char *logfile = talloc_asprintf(NULL, "%s/log.%s", dyn_LOGFILEBASE, pname);
-               lp_set_cmdline("log file", logfile);
-               talloc_free(logfile);
+               /* Hook for 'almost the first thing to do in a samba program' here */
+               /* setup for panics */
+               fault_setup();
+
+               /* and logging */
+               setup_logging(pname, DEBUG_DEFAULT_STDOUT);
+               talloc_set_log_fn(popt_s4_talloc_log_fn);
+               talloc_set_abort_fn(smb_panic);
+
+               cmdline_lp_ctx = loadparm_init_global(false);
                return;
        }
 
        switch(opt->val) {
-       case 'd':
-               lp_set_cmdline("log level", arg);
+
+       case OPT_LEAK_REPORT:
+               talloc_enable_leak_report();
                break;
 
-       case 'V':
-               printf( "Version %s\n", SAMBA_VERSION_STRING );
-               exit(0);
+       case OPT_LEAK_REPORT_FULL:
+               talloc_enable_leak_report_full();
                break;
 
-       case 'O':
-               if (arg) {
-                       lp_set_cmdline("socket options", arg);
+       case OPT_OPTION:
+               if (!lpcfg_set_option(cmdline_lp_ctx, arg)) {
+                       fprintf(stderr, "Error setting option '%s'\n", arg);
+                       exit(1);
                }
                break;
 
+       case 'd':
+               lpcfg_set_cmdline(cmdline_lp_ctx, "log level", arg);
+               break;
+
+       case OPT_DEBUG_STDERR:
+               setup_logging(pname, DEBUG_STDERR);
+               break;
+
        case 's':
                if (arg) {
-                       pstrcpy(dyn_CONFIGFILE, arg);
+                       lpcfg_load(cmdline_lp_ctx, arg);
                }
                break;
 
        case 'l':
                if (arg) {
-                       char *logfile = talloc_asprintf(NULL, "%s/log.%s", arg, pname);
-                       lp_set_cmdline("log file", logfile);
-                       talloc_free(logfile);
+                       char *new_logfile = talloc_asprintf(NULL, "%s/log.%s", arg, pname);
+                       lpcfg_set_cmdline(cmdline_lp_ctx, "log file", new_logfile);
+                       talloc_free(new_logfile);
                }
                break;
-               
+       
+
+       }
+
+}
+
+
+static void popt_common_callback(poptContext con, 
+                          enum poptCallbackReason reason,
+                          const struct poptOption *opt,
+                          const char *arg, const void *data)
+{
+       struct loadparm_context *lp_ctx = cmdline_lp_ctx;
+
+       switch(opt->val) {
+       case 'O':
+               if (arg) {
+                       lpcfg_set_cmdline(lp_ctx, "socket options", arg);
+               }
+               break;
+       
        case 'W':
-               lp_set_cmdline("workgroup", arg);
+               lpcfg_set_cmdline(lp_ctx, "workgroup", arg);
+               break;
+
+       case 'r':
+               lpcfg_set_cmdline(lp_ctx, "realm", arg);
                break;
                
        case 'n':
-               lp_set_cmdline("netbios name", arg);
+               lpcfg_set_cmdline(lp_ctx, "netbios name", arg);
                break;
                
        case 'i':
-               lp_set_cmdline("netbios scope", arg);
+               lpcfg_set_cmdline(lp_ctx, "netbios scope", arg);
                break;
 
        case 'm':
-               lp_set_cmdline("max protocol", arg);
+               lpcfg_set_cmdline(lp_ctx, "client max protocol", arg);
                break;
 
        case 'R':
-               lp_set_cmdline("name resolve order", arg);
+               lpcfg_set_cmdline(lp_ctx, "name resolve order", arg);
                break;
 
-       case OPT_OPTION:
-               if (!lp_set_option(arg)) {
-                       fprintf(stderr, "Error setting option '%s'\n", arg);
-                       exit(1);
-               }
-               break;
-
-       case OPT_LEAK_REPORT:
-               talloc_enable_leak_report();
+       case 'S':
+               lpcfg_set_cmdline(lp_ctx, "client signing", arg);
                break;
 
-       case OPT_LEAK_REPORT_FULL:
-               talloc_enable_leak_report_full();
-               break;
        }
 }
 
-struct poptOption popt_common_connection[] = {
-       { NULL, 0, POPT_ARG_CALLBACK, popt_common_callback },
+struct poptOption popt_common_connection4[] = {
+       { NULL, 0, POPT_ARG_CALLBACK, (void *)popt_common_callback },
        { "name-resolve", 'R', POPT_ARG_STRING, NULL, 'R', "Use these name resolution services only", "NAME-RESOLVE-ORDER" },
        { "socket-options", 'O', POPT_ARG_STRING, NULL, 'O', "socket options to use", "SOCKETOPTIONS" },
        { "netbiosname", 'n', POPT_ARG_STRING, NULL, 'n', "Primary netbios name", "NETBIOSNAME" },
+       { "signing", 'S', POPT_ARG_STRING, NULL, 'S', "Set the client signing state", "on|off|required" },
        { "workgroup", 'W', POPT_ARG_STRING, NULL, 'W', "Set the workgroup name", "WORKGROUP" },
+       { "realm", 0, POPT_ARG_STRING, NULL, 'r', "Set the realm name", "REALM" },
        { "scope", 'i', POPT_ARG_STRING, NULL, 'i', "Use this Netbios scope", "SCOPE" },
        { "maxprotocol", 'm', POPT_ARG_STRING, NULL, 'm', "Set max protocol level", "MAXPROTOCOL" },
-       POPT_TABLEEND
+       { NULL }
 };
 
-struct poptOption popt_common_samba[] = {
-       { NULL, 0, POPT_ARG_CALLBACK|POPT_CBFLAG_PRE, popt_common_callback },
+struct poptOption popt_common_samba4[] = {
+       { NULL, 0, POPT_ARG_CALLBACK|POPT_CBFLAG_PRE|POPT_CBFLAG_POST, (void *)popt_samba_callback },
        { "debuglevel",   'd', POPT_ARG_STRING, NULL, 'd', "Set debug level", "DEBUGLEVEL" },
+       { "debug-stderr", 0, POPT_ARG_NONE, NULL, OPT_DEBUG_STDERR, "Send debug output to STDERR", NULL },
        { "configfile",   's', POPT_ARG_STRING, NULL, 's', "Use alternative configuration file", "CONFIGFILE" },
        { "option",         0, POPT_ARG_STRING, NULL, OPT_OPTION, "Set smb.conf option from command line", "name=value" },
        { "log-basename", 'l', POPT_ARG_STRING, NULL, 'l', "Basename for log/debug files", "LOGFILEBASE" },
        { "leak-report",     0, POPT_ARG_NONE, NULL, OPT_LEAK_REPORT, "enable talloc leak reporting on exit", NULL },   
        { "leak-report-full",0, POPT_ARG_NONE, NULL, OPT_LEAK_REPORT_FULL, "enable full talloc leak reporting on exit", NULL },
-       POPT_TABLEEND
+       { NULL }
 };
 
-struct poptOption popt_common_version[] = {
-       { NULL, 0, POPT_ARG_CALLBACK, popt_common_callback },
+struct poptOption popt_common_version4[] = {
+       { NULL, 0, POPT_ARG_CALLBACK, (void *)popt_version_callback },
        { "version", 'V', POPT_ARG_NONE, NULL, 'V', "Print version" },
-       POPT_TABLEEND
+       { NULL }
 };
 
-
-
-/****************************************************************************
- * get a password from a a file or file descriptor
- * exit on failure
- * ****************************************************************************/
-static void get_password_file(struct cmdline_auth_info *a)
-{
-       int fd = -1;
-       char *p;
-       BOOL close_it = False;
-       pstring spec;
-       char pass[128];
-
-       if ((p = getenv("PASSWD_FD")) != NULL) {
-               pstrcpy(spec, "descriptor ");
-               pstrcat(spec, p);
-               sscanf(p, "%d", &fd);
-               close_it = False;
-       } else if ((p = getenv("PASSWD_FILE")) != NULL) {
-               fd = sys_open(p, O_RDONLY, 0);
-               pstrcpy(spec, p);
-               if (fd < 0) {
-                       fprintf(stderr, "Error opening PASSWD_FILE %s: %s\n",
-                                       spec, strerror(errno));
-                       exit(1);
-               }
-               close_it = True;
-       }
-
-       for(p = pass, *p = '\0'; /* ensure that pass is null-terminated */
-               p && p - pass < sizeof(pass);) {
-               switch (read(fd, p, 1)) {
-               case 1:
-                       if (*p != '\n' && *p != '\0') {
-                               *++p = '\0'; /* advance p, and null-terminate pass */
-                               break;
-                       }
-               case 0:
-                       if (p - pass) {
-                               *p = '\0'; /* null-terminate it, just in case... */
-                               p = NULL; /* then force the loop condition to become false */
-                               break;
-                       } else {
-                               fprintf(stderr, "Error reading password from file %s: %s\n",
-                                               spec, "empty password\n");
-                               exit(1);
-                       }
-
-               default:
-                       fprintf(stderr, "Error reading password from file %s: %s\n",
-                                       spec, strerror(errno));
-                       exit(1);
-               }
-       }
-       pstrcpy(a->password, pass);
-       if (close_it)
-               close(fd);
-}
-
-static void get_credentials_file(const char *file, struct cmdline_auth_info *info) 
-{
-       XFILE *auth;
-       fstring buf;
-       uint16_t len = 0;
-       char *ptr, *val, *param;
-
-       if ((auth=x_fopen(file, O_RDONLY, 0)) == NULL)
-       {
-               /* fail if we can't open the credentials file */
-               d_printf("ERROR: Unable to open credentials file!\n");
-               exit(-1);
-       }
-
-       while (!x_feof(auth))
-       {
-               /* get a line from the file */
-               if (!x_fgets(buf, sizeof(buf), auth))
-                       continue;
-               len = strlen(buf);
-
-               if ((len) && (buf[len-1]=='\n'))
-               {
-                       buf[len-1] = '\0';
-                       len--;
-               }
-               if (len == 0)
-                       continue;
-
-               /* break up the line into parameter & value.
-                * will need to eat a little whitespace possibly */
-               param = buf;
-               if (!(ptr = strchr_m (buf, '=')))
-                       continue;
-
-               val = ptr+1;
-               *ptr = '\0';
-
-               /* eat leading white space */
-               while ((*val!='\0') && ((*val==' ') || (*val=='\t')))
-                       val++;
-
-               if (strwicmp("password", param) == 0)
-               {
-                       pstrcpy(info->password, val);
-                       info->got_pass = True;
-               }
-               else if (strwicmp("username", param) == 0)
-                       pstrcpy(info->username, val);
-               else if (strwicmp("domain", param) == 0)
-                       pstrcpy(info->domain,val);
-               memset(buf, 0, sizeof(buf));
-       }
-       x_fclose(auth);
-}
-
-/* Handle command line options:
- *             -U,--user
- *             -A,--authentication-file
- *             -k,--use-kerberos
- *             -N,--no-pass
- *             -S,--signing
- *              -P --machine-pass
- */
-
-
-static void popt_common_credentials_callback(poptContext con, 
-                                               enum poptCallbackReason reason,
-                                               const struct poptOption *opt,
-                                               const char *arg, const void *data)
-{
-       char *p;
-
-       if (reason == POPT_CALLBACK_REASON_PRE) {
-               cmdline_auth_info.use_kerberos = False;
-               cmdline_auth_info.got_pass = False;
-               pstrcpy(cmdline_auth_info.username, "GUEST");   
-
-               if (getenv("LOGNAME"))pstrcpy(cmdline_auth_info.username,getenv("LOGNAME"));
-
-               if (getenv("USER")) {
-                       pstring tmp;
-
-                       pstrcpy(cmdline_auth_info.username,getenv("USER"));
-
-                       pstrcpy(tmp,cmdline_auth_info.username);
-                       if ((p = strchr_m(tmp,'\\'))) {
-                               *p = 0;
-                               pstrcpy(cmdline_auth_info.domain,tmp);
-                               cmdline_auth_info.got_domain = True;
-                               pstrcpy(cmdline_auth_info.username,p+1);
-                       }
-
-                       if ((p = strchr_m(cmdline_auth_info.username,'%'))) {
-                               *p = 0;
-                               pstrcpy(cmdline_auth_info.password,p+1);
-                               cmdline_auth_info.got_pass = True;
-                               memset(strchr_m(getenv("USER"),'%')+1,'X',strlen(cmdline_auth_info.password));
-                       }
-               }
-
-               if (getenv("DOMAIN")) {
-                       pstrcpy(cmdline_auth_info.domain,getenv("DOMAIN"));
-                       cmdline_auth_info.got_domain = True;
-               }
-
-               if (getenv("PASSWD")) {
-                       pstrcpy(cmdline_auth_info.password,getenv("PASSWD"));
-                       cmdline_auth_info.got_pass = True;
-               }
-
-               if (getenv("PASSWD_FD") || getenv("PASSWD_FILE")) {
-                       get_password_file(&cmdline_auth_info);
-                       cmdline_auth_info.got_pass = True;
-               }
-
-               return;
-       }
-
-       switch(opt->val) {
-       case 'U':
-               {
-                       char *lp;
-                       pstring tmp;
-
-                       pstrcpy(cmdline_auth_info.username,arg);
-
-                       pstrcpy(tmp,cmdline_auth_info.username);
-                       if ((p = strchr_m(tmp,'\\'))) {
-                               *p = 0;
-                               pstrcpy(cmdline_auth_info.domain,tmp);
-                               cmdline_auth_info.got_domain = True;
-                               pstrcpy(cmdline_auth_info.username,p+1);
-                       }
-
-                       if ((lp=strchr_m(cmdline_auth_info.username,'%'))) {
-                               *lp = 0;
-                               pstrcpy(cmdline_auth_info.password,lp+1);
-                               cmdline_auth_info.got_pass = True;
-                               memset(strchr_m(arg,'%')+1,'X',strlen(cmdline_auth_info.password));
-                       }
-               }
-               break;
-
-       case 'A':
-               get_credentials_file(arg, &cmdline_auth_info);
-               break;
-
-       case 'k':
-#ifndef HAVE_KRB5
-               d_printf("No kerberos support compiled in\n");
-               exit(1);
-#else
-               cmdline_auth_info.use_kerberos = True;
-               cmdline_auth_info.got_pass = True;
-#endif
-               break;
-
-       case 'S':
-               lp_set_cmdline("client signing", arg);
-               break;
-
-       case 'P':
-               {
-                       char *opt_password = NULL;
-                       /* it is very useful to be able to make ads queries as the
-                          machine account for testing purposes and for domain leave */
-                       
-                       if (!secrets_init()) {
-                               d_printf("ERROR: Unable to open secrets database\n");
-                               exit(1);
-                       }
-                       
-                       opt_password = secrets_fetch_machine_password(lp_workgroup());
-                       
-                       if (!opt_password) {
-                               d_printf("ERROR: Unable to fetch machine password\n");
-                               exit(1);
-                       }
-                       snprintf(cmdline_auth_info.username, sizeof(cmdline_auth_info.username), 
-                                "%s$", lp_netbios_name());
-                       pstrcpy(cmdline_auth_info.password,opt_password);
-                       SAFE_FREE(opt_password);
-
-                       pstrcpy(cmdline_auth_info.password, lp_workgroup());
-
-                       /* machine accounts only work with kerberos */
-                       cmdline_auth_info.use_kerberos = True;
-                       cmdline_auth_info.got_pass = True;
-               }
-               break;
-       }
-}
-
-
-
-struct poptOption popt_common_credentials[] = {
-       { NULL, 0, POPT_ARG_CALLBACK|POPT_CBFLAG_PRE, popt_common_credentials_callback },
-       { "user", 'U', POPT_ARG_STRING, NULL, 'U', "Set the network username", "USERNAME" },
-       { "no-pass", 'N', POPT_ARG_NONE, &cmdline_auth_info.got_pass, 0, "Don't ask for a password" },
-       { "kerberos", 'k', POPT_ARG_NONE, &cmdline_auth_info.use_kerberos, 'k', "Use kerberos (active directory) authentication" },
-       { "authentication-file", 'A', POPT_ARG_STRING, NULL, 'A', "Get the credentials from a file", "FILE" },
-       { "signing", 'S', POPT_ARG_STRING, NULL, 'S', "Set the client signing state", "on|off|required" },
-       { "machine-pass", 'P', POPT_ARG_NONE, NULL, 'P', "Use stored machine account password" },
-       POPT_TABLEEND
-};
-
-void cmdline_set_username(const char *name)
-{
-       pstrcpy(cmdline_auth_info.username, name);
-}
-
-const char *cmdline_get_username(void)
-{
-       return cmdline_auth_info.username;
-}
-
-void cmdline_set_userdomain(const char *domain)
-{
-       cmdline_auth_info.got_domain = True;
-       pstrcpy(cmdline_auth_info.domain, domain);
-}
-
-const char *cmdline_get_userdomain(void)
-{
-       if (cmdline_auth_info.got_domain) {
-               return cmdline_auth_info.domain;
-       }
-
-       /* I think this should be lp_netbios_name() 
-        * instead of lp_workgroup(), because if you're logged in 
-        * as domain user the getenv("USER") contains the domain
-        * and this code path isn't used
-        * --metze
-        */
-       return lp_netbios_name();
-}
-
-const char *cmdline_get_userpassword(void)
-{
-       char *prompt;
-       char *ret;
-
-       if (cmdline_auth_info.got_pass) {
-               return cmdline_auth_info.password;
-       }
-
-       prompt = talloc_asprintf(NULL, "Password for [%s\\%s]:", 
-                                cmdline_get_userdomain(),
-                                cmdline_get_username());
-
-       ret = getpass(prompt);
-
-       talloc_free(prompt);
-       return ret;
-}
-
-void cmdline_set_userpassword(const char *pass)
-{
-       cmdline_auth_info.got_pass = True;
-       pstrcpy(cmdline_auth_info.password, pass);
-}
-
-void cmdline_set_use_kerberos(BOOL use_kerberos)
-{
-       cmdline_auth_info.use_kerberos = use_kerberos;
-}
-
-BOOL cmdline_get_use_kerberos(void)
-{
-       return cmdline_auth_info.use_kerberos;
-}