2 Unix SMB/CIFS implementation.
4 Copyright (C) Andrew Tridgell 1997-2003
5 Copyright (C) Jelmer Vernooij 2006-2008
6 Copyright (C) James Peach 2010
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>.
23 #include "system/readline.h"
24 #include "../libcli/smbreadline/smbreadline.h"
25 #include "lib/cmdline/popt_common.h"
26 #include "auth/credentials/credentials.h"
27 #include "torture/smbtorture.h"
28 #include "param/param.h"
32 typedef void (*shell_function)(const struct shell_command *,
33 struct torture_context *, int, const char **);
35 static void shell_quit(const struct shell_command *,
36 struct torture_context *, int, const char **);
37 static void shell_help(const struct shell_command *,
38 struct torture_context *, int, const char **);
39 static void shell_set(const struct shell_command *,
40 struct torture_context *, int, const char **);
41 static void shell_run(const struct shell_command *,
42 struct torture_context *, int, const char **);
43 static void shell_list(const struct shell_command *,
44 struct torture_context *, int, const char **);
45 static void shell_auth(const struct shell_command *,
46 struct torture_context *, int, const char **);
47 static void shell_target(const struct shell_command *,
48 struct torture_context *, int, const char **);
50 static void shell_usage(const struct shell_command *);
51 static bool match_command(const char *, const struct shell_command *);
55 shell_function handler;
61 static const struct shell_command commands[] =
65 "[[username | principal | domain | realm | password] STRING]",
66 "set authentication parameters"
70 shell_help, "help", NULL,
71 "print this help message"
75 shell_list, "list", NULL,
76 "list the available tests"
80 shell_quit, "quit", NULL,
85 shell_run, "run", "[TESTNAME]",
86 "run the specified test"
90 shell_set, "set", "[NAME VALUE]",
91 "print or set test configuration parameters"
95 shell_target, "target", "[TARGET]",
96 "print or set the test target"
101 void torture_shell(struct torture_context *tctx)
109 /* If we don't have a specified password, specify it as empty. This
110 * stops the credentials system prompting when we use the "auth"
111 * command to display the current auth parameters.
113 cli_credentials_set_password(cmdline_credentials, "", CRED_GUESS_ENV);
116 cline = smb_readline("torture> ", NULL, NULL);
125 ret = poptParseArgvString(cline, &argc, &argv);
127 fprintf(stderr, "Error parsing line\n");
131 for (i = 0; i < ARRAY_SIZE(commands); i++) {
132 if (match_command(argv[0], &commands[i])) {
135 commands[i].handler(&commands[i],
145 static void shell_quit(const struct shell_command * command,
146 struct torture_context *tctx, int argc, const char **argv)
151 static void shell_help(const struct shell_command * command,
152 struct torture_context *tctx, int argc, const char **argv)
157 for (i = 0; i < ARRAY_SIZE(commands); i++) {
158 if (match_command(argv[0], &commands[i])) {
159 shell_usage(&commands[i]);
164 fprintf(stdout, "Available commands:\n");
165 for (i = 0; i < ARRAY_SIZE(commands); i++) {
166 fprintf(stdout, "\t%s - %s\n",
167 commands[i].name, commands[i].help);
172 static void shell_set(const struct shell_command *command,
173 struct torture_context *tctx, int argc, const char **argv)
177 lpcfg_dump(tctx->lp_ctx, stdout,
178 false /* show_defaults */,
179 0 /* skip services */);
183 /* We want to allow users to set any config option. Top level
184 * options will get checked against their static definition, but
185 * parametric options can't be checked and will just get stashed
186 * as they are provided.
188 lpcfg_set_cmdline(tctx->lp_ctx, argv[0], argv[1]);
192 shell_usage(command);
196 static void shell_run(const struct shell_command * command,
197 struct torture_context *tctx, int argc, const char **argv)
200 shell_usage(command);
204 torture_run_named_tests(tctx, argv[0], NULL /* restricted */);
207 static void shell_list(const struct shell_command * command,
208 struct torture_context *tctx, int argc, const char **argv)
211 shell_usage(command);
215 torture_print_testsuites(true);
218 static void shell_auth(const struct shell_command * command,
219 struct torture_context *tctx, int argc, const char **argv)
223 const char * username;
226 const char * password;
227 const char * principal;
229 username = cli_credentials_get_username(cmdline_credentials);
230 principal = cli_credentials_get_principal(cmdline_credentials, tctx);
231 domain = cli_credentials_get_domain(cmdline_credentials);
232 realm = cli_credentials_get_realm(cmdline_credentials);
233 password = cli_credentials_get_password(cmdline_credentials);
235 printf("Username: %s\n", username ? username : "");
236 printf("User Principal: %s\n", principal ? principal : "");
237 printf("Domain: %s\n", domain ? domain : "");
238 printf("Realm: %s\n", realm ? realm : "");
239 printf("Password: %s\n", password ? password : "");
240 } else if (argc == 2) {
243 if (!strcmp(argv[0], "username")) {
244 result = cli_credentials_set_username(
245 cmdline_credentials, argv[1], CRED_SPECIFIED);
246 } else if (!strcmp(argv[0], "principal")) {
247 result = cli_credentials_set_principal(
248 cmdline_credentials, argv[1], CRED_SPECIFIED);
249 } else if (!strcmp(argv[0], "domain")) {
250 result = cli_credentials_set_domain(
251 cmdline_credentials, argv[1], CRED_SPECIFIED);
252 } else if (!strcmp(argv[0], "realm")) {
253 result = cli_credentials_set_realm(
254 cmdline_credentials, argv[1], CRED_SPECIFIED);
255 } else if (!strcmp(argv[0], "password")) {
256 result = cli_credentials_set_password(
257 cmdline_credentials, argv[1], CRED_SPECIFIED);
259 shell_usage(command);
264 printf("failed to set %s\n", argv[0]);
267 shell_usage(command);
272 static void shell_target(const struct shell_command *command,
273 struct torture_context *tctx, int argc, const char **argv)
278 const char * binding;
280 host = torture_setting_string(tctx, "host", NULL);
281 share = torture_setting_string(tctx, "share", NULL);
282 binding = torture_setting_string(tctx, "binding", NULL);
284 printf("Target host: %s\n", host ? host : "");
285 printf("Target share: %s\n", share ? share : "");
286 printf("Target binding: %s\n", binding ? binding : "");
287 } else if (argc == 1) {
288 torture_parse_target(tctx, tctx->lp_ctx, argv[0]);
290 shell_usage(command);
294 static void shell_usage(const struct shell_command * command)
296 if (command->usage) {
297 fprintf(stderr, "Usage: %s %s\n",
298 command->name, command->usage);
300 fprintf(stderr, "Usage: %s\n",
305 static bool match_command(const char * name,
306 const struct shell_command * command)
308 if (!strcmp(name, command->name)) {
312 if (name[0] == command->name[0] && name[1] == '\0') {