Add support for SASL
[m6w6/libmemcached] / clients / utilities.c
1 /* LibMemcached
2 * Copyright (C) 2006-2009 Brian Aker
3 * All rights reserved.
4 *
5 * Use and distribution licensed under the BSD license. See
6 * the COPYING file in the parent directory for full text.
7 *
8 * Summary:
9 *
10 */
11
12 #include "libmemcached/common.h"
13 #include <stdio.h>
14 #include <ctype.h>
15 #include <string.h>
16 #include "utilities.h"
17
18
19 long int timedif(struct timeval a, struct timeval b)
20 {
21 long us, s;
22
23 us = (int)(a.tv_usec - b.tv_usec);
24 us /= 1000;
25 s = (int)(a.tv_sec - b.tv_sec);
26 s *= 1000;
27 return s + us;
28 }
29
30 void version_command(const char *command_name)
31 {
32 printf("%s v%u.%u\n", command_name, 1U, 0U);
33 exit(0);
34 }
35
36 static const char *lookup_help(memcached_options option)
37 {
38 switch (option)
39 {
40 case OPT_SERVERS: return("List which servers you wish to connect to.");
41 case OPT_VERSION: return("Display the version of the application and then exit.");
42 case OPT_HELP: return("Display this message and then exit.");
43 case OPT_VERBOSE: return("Give more details on the progression of the application.");
44 case OPT_DEBUG: return("Provide output only useful for debugging.");
45 case OPT_FLAG: return("Provide flag information for storage operation.");
46 case OPT_EXPIRE: return("Set the expire option for the object.");
47 case OPT_SET: return("Use set command with memcached when storing.");
48 case OPT_REPLACE: return("Use replace command with memcached when storing.");
49 case OPT_ADD: return("Use add command with memcached when storing.");
50 case OPT_SLAP_EXECUTE_NUMBER: return("Number of times to execute the given test.");
51 case OPT_SLAP_INITIAL_LOAD: return("Number of key pairs to load before executing tests.");
52 case OPT_SLAP_TEST: return("Test to run (currently \"get\" or \"set\").");
53 case OPT_SLAP_CONCURRENCY: return("Number of users to simulate with load.");
54 case OPT_SLAP_NON_BLOCK: return("Set TCP up to use non-blocking IO.");
55 case OPT_SLAP_TCP_NODELAY: return("Set TCP socket up to use nodelay.");
56 case OPT_FLUSH: return("Flush servers before running tests.");
57 case OPT_HASH: return("Select hash type.");
58 case OPT_BINARY: return("Switch to binary protocol.");
59 case OPT_ANALYZE: return("Analyze the provided servers.");
60 case OPT_UDP: return("Use UDP protocol when communicating with server.");
61 case OPT_USERNAME: return "Username to use for SASL authentication";
62 case OPT_PASSWD: return "Password to use for SASL authentication";
63 default: WATCHPOINT_ASSERT(0);
64 };
65
66 WATCHPOINT_ASSERT(0);
67 return "forgot to document this function :)";
68 }
69
70 void help_command(const char *command_name, const char *description,
71 const struct option *long_options,
72 memcached_programs_help_st *options __attribute__((unused)))
73 {
74 unsigned int x;
75
76 printf("%s v%u.%u\n\n", command_name, 1U, 0U);
77 printf("\t%s\n\n", description);
78 printf("Current options. A '=' means the option takes a value.\n\n");
79
80 for (x= 0; long_options[x].name; x++)
81 {
82 const char *help_message;
83
84 printf("\t --%s%c\n", long_options[x].name,
85 long_options[x].has_arg ? '=' : ' ');
86 if ((help_message= lookup_help(long_options[x].val)))
87 printf("\t\t%s\n", help_message);
88 }
89
90 printf("\n");
91 exit(0);
92 }
93
94 void process_hash_option(memcached_st *memc, char *opt_hash)
95 {
96 uint64_t set;
97 memcached_return_t rc;
98
99 if (opt_hash == NULL)
100 return;
101
102 set= MEMCACHED_HASH_DEFAULT; /* Just here to solve warning */
103 if (!strcasecmp(opt_hash, "CRC"))
104 set= MEMCACHED_HASH_CRC;
105 else if (!strcasecmp(opt_hash, "FNV1_64"))
106 set= MEMCACHED_HASH_FNV1_64;
107 else if (!strcasecmp(opt_hash, "FNV1A_64"))
108 set= MEMCACHED_HASH_FNV1A_64;
109 else if (!strcasecmp(opt_hash, "FNV1_32"))
110 set= MEMCACHED_HASH_FNV1_32;
111 else if (!strcasecmp(opt_hash, "FNV1A_32"))
112 set= MEMCACHED_HASH_FNV1A_32;
113 else
114 {
115 fprintf(stderr, "hash: type not recognized %s\n", opt_hash);
116 exit(1);
117 }
118
119 rc= memcached_behavior_set(memc, MEMCACHED_BEHAVIOR_HASH, set);
120 if (rc != MEMCACHED_SUCCESS)
121 {
122 fprintf(stderr, "hash: memcache error %s\n", memcached_strerror(memc, rc));
123 exit(1);
124 }
125 }
126
127 static char *username;
128 static char *passwd;
129
130 #ifdef LIBMEMCACHED_WITH_SASL_SUPPORT
131 static int get_username(void *context, int id, const char **result,
132 unsigned int *len)
133 {
134 (void)context;
135 if (!result || (id != SASL_CB_USER && id != SASL_CB_AUTHNAME))
136 return SASL_BADPARAM;
137
138 *result= username;
139 if (len)
140 *len= (username == NULL) ? 0 : (unsigned int)strlen(username);
141
142 return SASL_OK;
143 }
144
145 static int get_password(sasl_conn_t *conn, void *context, int id,
146 sasl_secret_t **psecret)
147 {
148 (void)context;
149 static sasl_secret_t* x;
150
151 if (!conn || ! psecret || id != SASL_CB_PASS)
152 return SASL_BADPARAM;
153
154 if (passwd == NULL)
155 {
156 *psecret= NULL;
157 return SASL_OK;
158 }
159
160 size_t len= strlen(passwd);
161 x = realloc(x, sizeof(sasl_secret_t) + len);
162 if (!x)
163 return SASL_NOMEM;
164
165 x->len = len;
166 strcpy((void *)x->data, passwd);
167
168 *psecret = x;
169 return SASL_OK;
170 }
171
172 /* callbacks we support */
173 static sasl_callback_t sasl_callbacks[] = {
174 {
175 SASL_CB_USER, &get_username, NULL
176 }, {
177 SASL_CB_AUTHNAME, &get_username, NULL
178 }, {
179 SASL_CB_PASS, &get_password, NULL
180 }, {
181 SASL_CB_LIST_END, NULL, NULL
182 }
183 };
184 #endif
185
186 bool initialize_sasl(memcached_st *memc, char *user, char *password)
187 {
188 #ifdef LIBMEMCACHED_WITH_SASL_SUPPORT
189 if (user != NULL && password != NULL)
190 {
191 username= user;
192 passwd= password;
193
194 if (sasl_client_init(NULL) != SASL_OK)
195 {
196 fprintf(stderr, "Failed to initialize sasl library!\n");
197 return false;
198 }
199 memcached_set_sasl_callbacks(memc, sasl_callbacks);
200 }
201 #else
202 (void)memc;
203 (void)user;
204 (void)passwd;
205 #endif
206
207 return true;
208 }
209
210 void shutdown_sasl(void)
211 {
212 #if LIBMEMCACHED_WITH_SASL_SUPPORT
213 if (username != NULL || passwd != NULL)
214 sasl_done();
215 #endif
216 }