2 Unix SMB/CIFS implementation.
5 Copyright (C) Tim Potter 2001,2002
6 Copyright (C) Jelmer Vernooij 2002,2003
7 Copyright (C) James Peach 2006
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
24 #include "system/filesys.h"
25 #include "popt_common.h"
27 /* Handle command line options:
40 extern bool override_logfile
;
42 static void set_logfile(poptContext con
, const char * arg
)
48 /* Find out basename of current program */
49 pname
= strrchr_m(poptGetInvocationName(con
),'/');
52 pname
= poptGetInvocationName(con
);
56 if (asprintf(&lfile
, "%s/log.%s", arg
, pname
) < 0) {
59 lp_set_logfile(lfile
);
63 static bool PrintSambaVersionString
;
65 static void popt_s3_talloc_log_fn(const char *message
)
67 DEBUG(0,("%s", message
));
70 static void popt_common_callback(poptContext con
,
71 enum poptCallbackReason reason
,
72 const struct poptOption
*opt
,
73 const char *arg
, const void *data
)
76 if (reason
== POPT_CALLBACK_REASON_PRE
) {
77 set_logfile(con
, get_dyn_LOGFILEBASE());
78 talloc_set_log_fn(popt_s3_talloc_log_fn
);
79 talloc_set_abort_fn(smb_panic
);
83 if (reason
== POPT_CALLBACK_REASON_POST
) {
85 if (PrintSambaVersionString
) {
86 printf( "Version %s\n", samba_version_string());
90 if (is_default_dyn_CONFIGFILE()) {
91 if(getenv("SMB_CONF_PATH")) {
92 set_dyn_CONFIGFILE(getenv("SMB_CONF_PATH"));
96 /* Further 'every Samba program must do this' hooks here. */
102 if (!lp_set_option(arg
)) {
103 fprintf(stderr
, "Error setting option '%s'\n", arg
);
110 lp_set_cmdline("log level", arg
);
115 PrintSambaVersionString
= True
;
120 lp_do_parameter(-1, "socket options", arg
);
126 set_dyn_CONFIGFILE(arg
);
132 lp_set_cmdline("netbios name", arg
);
138 set_logfile(con
, arg
);
139 override_logfile
= True
;
140 set_dyn_LOGFILEBASE(arg
);
146 lp_set_cmdline("netbios scope", arg
);
152 lp_set_cmdline("workgroup", arg
);
158 struct poptOption popt_common_connection
[] = {
159 { NULL
, 0, POPT_ARG_CALLBACK
, (void *)popt_common_callback
},
160 { "socket-options", 'O', POPT_ARG_STRING
, NULL
, 'O', "socket options to use",
162 { "netbiosname", 'n', POPT_ARG_STRING
, NULL
, 'n', "Primary netbios name", "NETBIOSNAME" },
163 { "workgroup", 'W', POPT_ARG_STRING
, NULL
, 'W', "Set the workgroup name", "WORKGROUP" },
164 { "scope", 'i', POPT_ARG_STRING
, NULL
, 'i', "Use this Netbios scope", "SCOPE" },
169 struct poptOption popt_common_samba
[] = {
170 { NULL
, 0, POPT_ARG_CALLBACK
|POPT_CBFLAG_PRE
|POPT_CBFLAG_POST
, (void *)popt_common_callback
},
171 { "debuglevel", 'd', POPT_ARG_STRING
, NULL
, 'd', "Set debug level", "DEBUGLEVEL" },
172 { "configfile", 's', POPT_ARG_STRING
, NULL
, 's', "Use alternate configuration file", "CONFIGFILE" },
173 { "log-basename", 'l', POPT_ARG_STRING
, NULL
, 'l', "Base name for log files", "LOGFILEBASE" },
174 { "version", 'V', POPT_ARG_NONE
, NULL
, 'V', "Print version" },
175 { "option", 0, POPT_ARG_STRING
, NULL
, OPT_OPTION
, "Set smb.conf option from command line", "name=value" },
179 struct poptOption popt_common_configfile
[] = {
180 { NULL
, 0, POPT_ARG_CALLBACK
|POPT_CBFLAG_PRE
|POPT_CBFLAG_POST
, (void *)popt_common_callback
},
181 { "configfile", 0, POPT_ARG_STRING
, NULL
, 's', "Use alternate configuration file", "CONFIGFILE" },
185 struct poptOption popt_common_version
[] = {
186 { NULL
, 0, POPT_ARG_CALLBACK
|POPT_CBFLAG_POST
, (void *)popt_common_callback
},
187 { "version", 'V', POPT_ARG_NONE
, NULL
, 'V', "Print version" },
191 struct poptOption popt_common_debuglevel
[] = {
192 { NULL
, 0, POPT_ARG_CALLBACK
, (void *)popt_common_callback
},
193 { "debuglevel", 'd', POPT_ARG_STRING
, NULL
, 'd', "Set debug level", "DEBUGLEVEL" },
197 struct poptOption popt_common_option
[] = {
198 { NULL
, 0, POPT_ARG_CALLBACK
|POPT_CBFLAG_POST
, (void *)popt_common_callback
},
199 { "option", 0, POPT_ARG_STRING
, NULL
, OPT_OPTION
, "Set smb.conf option from command line", "name=value" },
203 /****************************************************************************
204 * get a password from a a file or file descriptor
206 * ****************************************************************************/
208 static void get_password_file(struct user_auth_info
*auth_info
)
212 bool close_it
= False
;
216 if ((p
= getenv("PASSWD_FD")) != NULL
) {
217 if (asprintf(&spec
, "descriptor %s", p
) < 0) {
220 sscanf(p
, "%d", &fd
);
222 } else if ((p
= getenv("PASSWD_FILE")) != NULL
) {
223 fd
= open(p
, O_RDONLY
, 0);
224 spec
= SMB_STRDUP(p
);
226 fprintf(stderr
, "Error opening PASSWD_FILE %s: %s\n",
227 spec
, strerror(errno
));
234 fprintf(stderr
, "fd = %d, < 0\n", fd
);
238 for(p
= pass
, *p
= '\0'; /* ensure that pass is null-terminated */
239 p
&& p
- pass
< sizeof(pass
);) {
240 switch (read(fd
, p
, 1)) {
242 if (*p
!= '\n' && *p
!= '\0') {
243 *++p
= '\0'; /* advance p, and null-terminate pass */
248 *p
= '\0'; /* null-terminate it, just in case... */
249 p
= NULL
; /* then force the loop condition to become false */
252 fprintf(stderr
, "Error reading password from file %s: %s\n",
253 spec
, "empty password\n");
259 fprintf(stderr
, "Error reading password from file %s: %s\n",
260 spec
, strerror(errno
));
267 set_cmdline_auth_info_password(auth_info
, pass
);
273 static void get_credentials_file(struct user_auth_info
*auth_info
,
279 char *ptr
, *val
, *param
;
281 if ((auth
=x_fopen(file
, O_RDONLY
, 0)) == NULL
)
283 /* fail if we can't open the credentials file */
284 d_printf("ERROR: Unable to open credentials file!\n");
288 while (!x_feof(auth
))
290 /* get a line from the file */
291 if (!x_fgets(buf
, sizeof(buf
), auth
))
295 if ((len
) && (buf
[len
-1]=='\n'))
303 /* break up the line into parameter & value.
304 * will need to eat a little whitespace possibly */
306 if (!(ptr
= strchr_m (buf
, '=')))
312 /* eat leading white space */
313 while ((*val
!='\0') && ((*val
==' ') || (*val
=='\t')))
316 if (strwicmp("password", param
) == 0) {
317 set_cmdline_auth_info_password(auth_info
, val
);
318 } else if (strwicmp("username", param
) == 0) {
319 set_cmdline_auth_info_username(auth_info
, val
);
320 } else if (strwicmp("domain", param
) == 0) {
321 set_cmdline_auth_info_domain(auth_info
, val
);
323 memset(buf
, 0, sizeof(buf
));
328 /* Handle command line options:
330 * -A,--authentication-file
340 static void popt_common_credentials_callback(poptContext con
,
341 enum poptCallbackReason reason
,
342 const struct poptOption
*opt
,
343 const char *arg
, const void *data
)
345 struct user_auth_info
*auth_info
= talloc_get_type_abort(
346 *((const char **)data
), struct user_auth_info
);
348 if (reason
== POPT_CALLBACK_REASON_PRE
) {
349 set_cmdline_auth_info_username(auth_info
, "GUEST");
351 if (getenv("LOGNAME")) {
352 set_cmdline_auth_info_username(auth_info
,
356 if (getenv("USER")) {
357 char *puser
= SMB_STRDUP(getenv("USER"));
361 set_cmdline_auth_info_username(auth_info
, puser
);
364 if (getenv("PASSWD")) {
365 set_cmdline_auth_info_password(auth_info
,
369 if (getenv("PASSWD_FD") || getenv("PASSWD_FILE")) {
370 get_password_file(auth_info
);
380 char *puser
= SMB_STRDUP(arg
);
382 if ((lp
=strchr_m(puser
,'%'))) {
385 set_cmdline_auth_info_username(auth_info
,
387 set_cmdline_auth_info_password(auth_info
,
390 memset(lp
+ 1, '\0', len
);
392 set_cmdline_auth_info_username(auth_info
,
400 get_credentials_file(auth_info
, arg
);
405 d_printf("No kerberos support compiled in\n");
408 set_cmdline_auth_info_use_krb5_ticket(auth_info
);
413 if (!set_cmdline_auth_info_signing_state(auth_info
, arg
)) {
414 fprintf(stderr
, "Unknown signing option %s\n", arg
);
419 set_cmdline_auth_info_use_machine_account(auth_info
);
422 set_cmdline_auth_info_password(auth_info
, "");
425 set_cmdline_auth_info_smb_encrypt(auth_info
);
428 set_cmdline_auth_info_use_ccache(auth_info
, true);
431 set_cmdline_auth_info_use_pw_nt_hash(auth_info
, true);
436 static struct user_auth_info
*global_auth_info
;
438 void popt_common_set_auth_info(struct user_auth_info
*auth_info
)
440 global_auth_info
= auth_info
;
444 * @brief Burn the commandline password.
446 * This function removes the password from the command line so we
447 * don't leak the password e.g. in 'ps aux'.
449 * It should be called after processing the options and you should pass down
452 * @param[in] argc The number of arguments.
454 * @param[in] argv[] The argument array we will find the array.
456 void popt_burn_cmdline_password(int argc
, char *argv
[])
462 for (i
= 0; i
< argc
; i
++) {
464 if (strncmp(p
, "-U", 2) == 0) {
467 } else if (strncmp(p
, "--user", 6) == 0) {
477 if (strlen(p
) == ulen
) {
481 p
= strchr_m(p
, '%');
483 memset(p
, '\0', strlen(p
));
490 struct poptOption popt_common_credentials
[] = {
491 { NULL
, 0, POPT_ARG_CALLBACK
|POPT_CBFLAG_PRE
,
492 (void *)popt_common_credentials_callback
, 0,
493 (const char *)&global_auth_info
},
494 { "user", 'U', POPT_ARG_STRING
, NULL
, 'U', "Set the network username", "USERNAME" },
495 { "no-pass", 'N', POPT_ARG_NONE
, NULL
, 'N', "Don't ask for a password" },
496 { "kerberos", 'k', POPT_ARG_NONE
, NULL
, 'k', "Use kerberos (active directory) authentication" },
497 { "authentication-file", 'A', POPT_ARG_STRING
, NULL
, 'A', "Get the credentials from a file", "FILE" },
498 { "signing", 'S', POPT_ARG_STRING
, NULL
, 'S', "Set the client signing state", "on|off|required" },
499 {"machine-pass", 'P', POPT_ARG_NONE
, NULL
, 'P', "Use stored machine account password" },
500 {"encrypt", 'e', POPT_ARG_NONE
, NULL
, 'e', "Encrypt SMB transport (UNIX extended servers only)" },
501 {"use-ccache", 'C', POPT_ARG_NONE
, NULL
, 'C',
502 "Use the winbind ccache for authentication" },
503 {"pw-nt-hash", '\0', POPT_ARG_NONE
, NULL
, 'H',
504 "The supplied password is the NT hash" },