r23792: convert Samba4 to GPLv3
[samba.git] / source4 / lib / cmdline / popt_common.c
index 7acdb34bba23a710c9ae5bd25dc36f1fad0fc18c..904a8738925fc816a711f89ed61233fe0702ab07 100644 (file)
@@ -3,11 +3,11 @@
    Common popt routines
 
    Copyright (C) Tim Potter 2001,2002
-   Copyright (C) Jelmer Vernooij 2002,2003
+   Copyright (C) Jelmer Vernooij 2002,2003,2005
 
    This program is free software; you can redistribute it and/or modify
    it under the terms of the GNU General Public License as published by
-   the Free Software Foundation; either version 2 of the License, or
+   the Free Software Foundation; either version 3 of the License, or
    (at your option) any later version.
    
    This program is distributed in the hope that it will be useful,
    GNU General Public License for more details.
    
    You should have received a copy of the GNU General Public License
-   along with this program; if not, write to the Free Software
-   Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
+   along with this program.  If not, see <http://www.gnu.org/licenses/>.
 */
 
 #include "includes.h"
+#include "version.h"
+#include "lib/cmdline/popt_common.h"
 
 /* Handle command line options:
  *             -d,--debuglevel 
  *             -l,--log-base
  *             -n,--netbios-name
  *             -W,--workgroup
+ *             --realm
  *             -i,--scope
  */
 
-static struct cmdline_auth_info cmdline_auth_info;
+enum {OPT_OPTION=1,OPT_LEAK_REPORT,OPT_LEAK_REPORT_FULL,OPT_DEBUG_STDERR};
+
+struct cli_credentials *cmdline_credentials = NULL;
 
 static void popt_common_callback(poptContext con, 
                           enum poptCallbackReason reason,
                           const struct poptOption *opt,
                           const char *arg, const void *data)
 {
-       pstring logfile;
        const char *pname;
-       
+
+       if (reason == POPT_CALLBACK_REASON_POST) {
+               lp_load();
+               /* Hook any 'every Samba program must do this, after
+                * the smb.conf is setup' functions here */
+               return;
+       }
+
        /* Find out basename of current program */
        pname = strrchr_m(poptGetInvocationName(con),'/');
 
@@ -52,8 +62,16 @@ static void popt_common_callback(poptContext con,
                pname++;
 
        if (reason == POPT_CALLBACK_REASON_PRE) {
-               pstr_sprintf(logfile, "%s/log.%s", dyn_LOGFILEBASE, pname);
-               lp_set_cmdline("log file", logfile);
+               /* Hook for 'almost the first thing to do in a samba program' here */
+               /* setup for panics */
+               fault_setup(poptGetInvocationName(con));
+
+               /* and logging */
+               setup_logging(pname, DEBUG_STDOUT);
+
+               if (getenv("SMB_CONF_PATH")) {
+                       lp_set_cmdline("config file", getenv("SMB_CONF_PATH"));
+               }
                return;
        }
 
@@ -62,6 +80,10 @@ static void popt_common_callback(poptContext con,
                lp_set_cmdline("log level", arg);
                break;
 
+       case OPT_DEBUG_STDERR:
+               setup_logging(pname, DEBUG_STDERR);
+               break;
+
        case 'V':
                printf( "Version %s\n", SAMBA_VERSION_STRING );
                exit(0);
@@ -75,20 +97,25 @@ static void popt_common_callback(poptContext con,
 
        case 's':
                if (arg) {
-                       pstrcpy(dyn_CONFIGFILE, arg);
+                       lp_set_cmdline("config file", arg);
                }
                break;
 
        case 'l':
                if (arg) {
-                       pstr_sprintf(logfile, "%s/log.%s", arg, pname);
-                       lp_set_cmdline("log file", logfile);
+                       char *new_logfile = talloc_asprintf(NULL, "%s/log.%s", arg, pname);
+                       lp_set_cmdline("log file", new_logfile);
+                       talloc_free(new_logfile);
                }
                break;
                
        case 'W':
                lp_set_cmdline("workgroup", arg);
                break;
+
+       case 'r':
+               lp_set_cmdline("realm", arg);
+               break;
                
        case 'n':
                lp_set_cmdline("netbios name", arg);
@@ -99,361 +126,58 @@ static void popt_common_callback(poptContext con,
                break;
 
        case 'm':
-               lp_set_cmdline("max protocol", arg);
+               lp_set_cmdline("client max protocol", arg);
                break;
 
        case 'R':
                lp_set_cmdline("name resolve order", arg);
                break;
+
+       case OPT_OPTION:
+               if (!lp_set_option(arg)) {
+                       fprintf(stderr, "Error setting option '%s'\n", arg);
+                       exit(1);
+               }
+               break;
+
+       case OPT_LEAK_REPORT:
+               talloc_enable_leak_report();
+               break;
+
+       case OPT_LEAK_REPORT_FULL:
+               talloc_enable_leak_report_full();
+               break;
+
        }
 }
 
 struct poptOption popt_common_connection[] = {
-       { NULL, 0, POPT_ARG_CALLBACK, popt_common_callback },
+       { NULL, 0, POPT_ARG_CALLBACK, (void *)popt_common_callback },
        { "name-resolve", 'R', POPT_ARG_STRING, NULL, 'R', "Use these name resolution services only", "NAME-RESOLVE-ORDER" },
        { "socket-options", 'O', POPT_ARG_STRING, NULL, 'O', "socket options to use", "SOCKETOPTIONS" },
        { "netbiosname", 'n', POPT_ARG_STRING, NULL, 'n', "Primary netbios name", "NETBIOSNAME" },
        { "workgroup", 'W', POPT_ARG_STRING, NULL, 'W', "Set the workgroup name", "WORKGROUP" },
+       { "realm", 0, POPT_ARG_STRING, NULL, 'r', "Set the realm name", "REALM" },
        { "scope", 'i', POPT_ARG_STRING, NULL, 'i', "Use this Netbios scope", "SCOPE" },
        { "maxprotocol", 'm', POPT_ARG_STRING, NULL, 'm', "Set max protocol level", "MAXPROTOCOL" },
-       POPT_TABLEEND
+       { NULL }
 };
 
 struct poptOption popt_common_samba[] = {
-       { NULL, 0, POPT_ARG_CALLBACK|POPT_CBFLAG_PRE, popt_common_callback },
-       { "debuglevel", 'd', POPT_ARG_STRING, NULL, 'd', "Set debug level", "DEBUGLEVEL" },
-       { "configfile", 's', POPT_ARG_STRING, NULL, 's', "Use alternative configuration file", "CONFIGFILE" },
+       { NULL, 0, POPT_ARG_CALLBACK|POPT_CBFLAG_PRE|POPT_CBFLAG_POST, (void *)popt_common_callback },
+       { "debuglevel",   'd', POPT_ARG_STRING, NULL, 'd', "Set debug level", "DEBUGLEVEL" },
+       { "debug-stderr", 0, POPT_ARG_NONE, NULL, OPT_DEBUG_STDERR, "Send debug output to STDERR", NULL },
+       { "configfile",   's', POPT_ARG_STRING, NULL, 's', "Use alternative configuration file", "CONFIGFILE" },
+       { "option",         0, POPT_ARG_STRING, NULL, OPT_OPTION, "Set smb.conf option from command line", "name=value" },
        { "log-basename", 'l', POPT_ARG_STRING, NULL, 'l', "Basename for log/debug files", "LOGFILEBASE" },
-       POPT_TABLEEND
+       { "leak-report",     0, POPT_ARG_NONE, NULL, OPT_LEAK_REPORT, "enable talloc leak reporting on exit", NULL },   
+       { "leak-report-full",0, POPT_ARG_NONE, NULL, OPT_LEAK_REPORT_FULL, "enable full talloc leak reporting on exit", NULL },
+       { NULL }
 };
 
 struct poptOption popt_common_version[] = {
-       { NULL, 0, POPT_ARG_CALLBACK, popt_common_callback },
+       { NULL, 0, POPT_ARG_CALLBACK, (void *)popt_common_callback },
        { "version", 'V', POPT_ARG_NONE, NULL, 'V', "Print version" },
-       POPT_TABLEEND
+       { NULL }
 };
 
-
-
-/****************************************************************************
- * get a password from a a file or file descriptor
- * exit on failure
- * ****************************************************************************/
-static void get_password_file(struct cmdline_auth_info *a)
-{
-       int fd = -1;
-       char *p;
-       BOOL close_it = False;
-       pstring spec;
-       char pass[128];
-
-       if ((p = getenv("PASSWD_FD")) != NULL) {
-               pstrcpy(spec, "descriptor ");
-               pstrcat(spec, p);
-               sscanf(p, "%d", &fd);
-               close_it = False;
-       } else if ((p = getenv("PASSWD_FILE")) != NULL) {
-               fd = sys_open(p, O_RDONLY, 0);
-               pstrcpy(spec, p);
-               if (fd < 0) {
-                       fprintf(stderr, "Error opening PASSWD_FILE %s: %s\n",
-                                       spec, strerror(errno));
-                       exit(1);
-               }
-               close_it = True;
-       }
-
-       for(p = pass, *p = '\0'; /* ensure that pass is null-terminated */
-               p && p - pass < sizeof(pass);) {
-               switch (read(fd, p, 1)) {
-               case 1:
-                       if (*p != '\n' && *p != '\0') {
-                               *++p = '\0'; /* advance p, and null-terminate pass */
-                               break;
-                       }
-               case 0:
-                       if (p - pass) {
-                               *p = '\0'; /* null-terminate it, just in case... */
-                               p = NULL; /* then force the loop condition to become false */
-                               break;
-                       } else {
-                               fprintf(stderr, "Error reading password from file %s: %s\n",
-                                               spec, "empty password\n");
-                               exit(1);
-                       }
-
-               default:
-                       fprintf(stderr, "Error reading password from file %s: %s\n",
-                                       spec, strerror(errno));
-                       exit(1);
-               }
-       }
-       pstrcpy(a->password, pass);
-       if (close_it)
-               close(fd);
-}
-
-static void get_credentials_file(const char *file, struct cmdline_auth_info *info) 
-{
-       XFILE *auth;
-       fstring buf;
-       uint16_t len = 0;
-       char *ptr, *val, *param;
-
-       if ((auth=x_fopen(file, O_RDONLY, 0)) == NULL)
-       {
-               /* fail if we can't open the credentials file */
-               d_printf("ERROR: Unable to open credentials file!\n");
-               exit(-1);
-       }
-
-       while (!x_feof(auth))
-       {
-               /* get a line from the file */
-               if (!x_fgets(buf, sizeof(buf), auth))
-                       continue;
-               len = strlen(buf);
-
-               if ((len) && (buf[len-1]=='\n'))
-               {
-                       buf[len-1] = '\0';
-                       len--;
-               }
-               if (len == 0)
-                       continue;
-
-               /* break up the line into parameter & value.
-                * will need to eat a little whitespace possibly */
-               param = buf;
-               if (!(ptr = strchr_m (buf, '=')))
-                       continue;
-
-               val = ptr+1;
-               *ptr = '\0';
-
-               /* eat leading white space */
-               while ((*val!='\0') && ((*val==' ') || (*val=='\t')))
-                       val++;
-
-               if (strwicmp("password", param) == 0)
-               {
-                       pstrcpy(info->password, val);
-                       info->got_pass = True;
-               }
-               else if (strwicmp("username", param) == 0)
-                       pstrcpy(info->username, val);
-               else if (strwicmp("domain", param) == 0)
-                       pstrcpy(info->domain,val);
-               memset(buf, 0, sizeof(buf));
-       }
-       x_fclose(auth);
-}
-
-/* Handle command line options:
- *             -U,--user
- *             -A,--authentication-file
- *             -k,--use-kerberos
- *             -N,--no-pass
- *             -S,--signing
- *              -P --machine-pass
- */
-
-
-static void popt_common_credentials_callback(poptContext con, 
-                                               enum poptCallbackReason reason,
-                                               const struct poptOption *opt,
-                                               const char *arg, const void *data)
-{
-       char *p;
-
-       if (reason == POPT_CALLBACK_REASON_PRE) {
-               cmdline_auth_info.use_kerberos = False;
-               cmdline_auth_info.got_pass = False;
-               pstrcpy(cmdline_auth_info.username, "GUEST");   
-
-               if (getenv("LOGNAME"))pstrcpy(cmdline_auth_info.username,getenv("LOGNAME"));
-
-               if (getenv("USER")) {
-                       pstring tmp;
-
-                       pstrcpy(cmdline_auth_info.username,getenv("USER"));
-
-                       pstrcpy(tmp,cmdline_auth_info.username);
-                       if ((p = strchr_m(tmp,'\\'))) {
-                               *p = 0;
-                               pstrcpy(cmdline_auth_info.domain,tmp);
-                               pstrcpy(cmdline_auth_info.username,p+1);
-                       }
-
-                       if ((p = strchr_m(cmdline_auth_info.username,'%'))) {
-                               *p = 0;
-                               pstrcpy(cmdline_auth_info.password,p+1);
-                               cmdline_auth_info.got_pass = True;
-                               memset(strchr_m(getenv("USER"),'%')+1,'X',strlen(cmdline_auth_info.password));
-                       }
-               }
-
-               if (getenv("DOMAIN")) {
-                       pstrcpy(cmdline_auth_info.domain,getenv("DOMAIN"));
-               }
-
-               if (getenv("PASSWD")) {
-                       pstrcpy(cmdline_auth_info.password,getenv("PASSWD"));
-                       cmdline_auth_info.got_pass = True;
-               }
-
-               if (getenv("PASSWD_FD") || getenv("PASSWD_FILE")) {
-                       get_password_file(&cmdline_auth_info);
-                       cmdline_auth_info.got_pass = True;
-               }
-
-               return;
-       }
-
-       switch(opt->val) {
-       case 'U':
-               {
-                       char *lp;
-                       pstring tmp;
-
-                       pstrcpy(cmdline_auth_info.username,arg);
-
-                       pstrcpy(tmp,cmdline_auth_info.username);
-                       if ((p = strchr_m(tmp,'\\'))) {
-                               *p = 0;
-                               pstrcpy(cmdline_auth_info.domain,tmp);
-                               pstrcpy(cmdline_auth_info.username,p+1);
-                       }
-
-                       if ((lp=strchr_m(cmdline_auth_info.username,'%'))) {
-                               *lp = 0;
-                               pstrcpy(cmdline_auth_info.password,lp+1);
-                               cmdline_auth_info.got_pass = True;
-                               memset(strchr_m(arg,'%')+1,'X',strlen(cmdline_auth_info.password));
-                       }
-               }
-               break;
-
-       case 'A':
-               get_credentials_file(arg, &cmdline_auth_info);
-               break;
-
-       case 'k':
-#ifndef HAVE_KRB5
-               d_printf("No kerberos support compiled in\n");
-               exit(1);
-#else
-               cmdline_auth_info.use_kerberos = True;
-               cmdline_auth_info.got_pass = True;
-#endif
-               break;
-
-       case 'S':
-               lp_set_cmdline("client signing", arg);
-               break;
-
-       case 'P':
-               {
-                       char *opt_password = NULL;
-                       /* it is very useful to be able to make ads queries as the
-                          machine account for testing purposes and for domain leave */
-                       
-                       if (!secrets_init()) {
-                               d_printf("ERROR: Unable to open secrets database\n");
-                               exit(1);
-                       }
-                       
-                       opt_password = secrets_fetch_machine_password(lp_workgroup());
-                       
-                       if (!opt_password) {
-                               d_printf("ERROR: Unable to fetch machine password\n");
-                               exit(1);
-                       }
-                       pstr_sprintf(cmdline_auth_info.username, "%s$", 
-                                    lp_netbios_name());
-                       pstrcpy(cmdline_auth_info.password,opt_password);
-                       SAFE_FREE(opt_password);
-
-                       pstrcpy(cmdline_auth_info.password, lp_workgroup());
-
-                       /* machine accounts only work with kerberos */
-                       cmdline_auth_info.use_kerberos = True;
-                       cmdline_auth_info.got_pass = True;
-               }
-               break;
-       }
-}
-
-
-
-struct poptOption popt_common_credentials[] = {
-       { NULL, 0, POPT_ARG_CALLBACK|POPT_CBFLAG_PRE, popt_common_credentials_callback },
-       { "user", 'U', POPT_ARG_STRING, NULL, 'U', "Set the network username", "USERNAME" },
-       { "no-pass", 'N', POPT_ARG_NONE, &cmdline_auth_info.got_pass, True, "Don't ask for a password" },
-       { "kerberos", 'k', POPT_ARG_NONE, &cmdline_auth_info.use_kerberos, True, "Use kerberos (active directory) authentication" },
-       { "authentication-file", 'A', POPT_ARG_STRING, NULL, 'A', "Get the credentials from a file", "FILE" },
-       { "signing", 'S', POPT_ARG_STRING, NULL, 'S', "Set the client signing state", "on|off|required" },
-       { "machine-pass", 'P', POPT_ARG_NONE, NULL, 'P', "Use stored machine account password" },
-       POPT_TABLEEND
-};
-
-void cmdline_set_username(const char *name)
-{
-       pstrcpy(cmdline_auth_info.username, name);
-}
-
-const char *cmdline_get_username(void)
-{
-       return cmdline_auth_info.username;
-}
-
-void cmdline_set_userdomain(const char *domain)
-{
-       pstrcpy(cmdline_auth_info.domain, domain);
-}
-
-const char *cmdline_get_userdomain(void)
-{
-       if (cmdline_auth_info.domain[0]) {
-               return cmdline_auth_info.domain;
-       }
-
-       /* I think this should be lp_netbios_name() 
-        * instead of lp_workgroup(), because if you're logged in 
-        * as domain user the getenv("USER") contains the domain
-        * and this code path isn't used
-        * --metze
-        */
-       return lp_netbios_name();
-}
-
-const char *cmdline_get_userpassword(void)
-{
-       pstring prompt;
-
-       if (cmdline_auth_info.got_pass) {
-               return cmdline_auth_info.password;
-       }
-
-       pstr_sprintf(prompt, "Password for [%s\\%s]:", 
-                       cmdline_get_userdomain(),
-                       cmdline_get_username());
-
-       return getpass(prompt);
-}
-
-void cmdline_set_userpassword(const char *pass)
-{
-       cmdline_auth_info.got_pass = True;
-       pstrcpy(cmdline_auth_info.password, pass);
-}
-
-void cmdline_set_use_kerberos(BOOL use_kerberos)
-{
-       cmdline_auth_info.use_kerberos = use_kerberos;
-}
-
-BOOL cmdline_get_use_kerberos(void)
-{
-       return cmdline_auth_info.use_kerberos;
-}