2 * Copyright (c) 2000-2016 Apple Inc. All rights reserved.
4 * @APPLE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. Please obtain a copy of the License at
10 * http://www.opensource.apple.com/apsl/ and read it before using this
13 * The Original Code and all software distributed under the License are
14 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 * Please see the License for the specific language governing rights and
19 * limitations under the License.
21 * @APPLE_LICENSE_HEADER_END@
25 * Modification History
27 * June 13, 2005 Allan Nathanson <ajn@apple.com>
28 * - added SCPreferences support
30 * August 4, 2004 Allan Nathanson <ajn@apple.com>
31 * - added network configuration (prefs) support
33 * September 25, 2002 Allan Nathanson <ajn@apple.com>
34 * - added command line history & editing
36 * July 9, 2001 Allan Nathanson <ajn@apple.com>
37 * - added "-r" option for checking network reachability
38 * - added "-w" option to check/wait for the presence of a
41 * June 1, 2001 Allan Nathanson <ajn@apple.com>
42 * - public API conversion
44 * November 9, 2000 Allan Nathanson <ajn@apple.com>
48 #include <TargetConditionals.h>
59 #include <mach/mach.h>
60 #include <mach/mach_error.h>
65 #include "dictionary.h"
72 #define LINE_LENGTH 2048
74 __private_extern__ AuthorizationRef authorization
= NULL
;
75 __private_extern__ InputRef currentInput
= NULL
;
76 __private_extern__ Boolean doDispatch
= FALSE
;
77 __private_extern__
int nesting
= 0;
78 __private_extern__ CFRunLoopRef notifyRl
= NULL
;
79 __private_extern__ CFRunLoopSourceRef notifyRls
= NULL
;
80 __private_extern__ SCPreferencesRef prefs
= NULL
;
81 __private_extern__ SCDynamicStoreRef store
= NULL
;
82 __private_extern__ CFPropertyListRef value
= NULL
;
83 __private_extern__ CFMutableArrayRef watchedKeys
= NULL
;
84 __private_extern__ CFMutableArrayRef watchedPatterns
= NULL
;
86 static const struct option longopts
[] = {
87 // { "debug", no_argument, NULL, 'd' },
88 // { "dispatch", no_argument, NULL, 'D' },
89 // { "verbose", no_argument, NULL, 'v' },
90 // { "SPI", no_argument, NULL, 'p' },
91 // { "check-reachability", required_argument, NULL, 'r' },
92 // { "timeout", required_argument, NULL, 't' },
93 // { "wait-key", required_argument, NULL, 'w' },
94 // { "watch-reachability", no_argument, NULL, 'W' },
95 { "dns", no_argument
, NULL
, 0 },
96 { "get", required_argument
, NULL
, 0 },
97 { "error", required_argument
, NULL
, 0 },
98 { "help", no_argument
, NULL
, '?' },
99 { "nc", required_argument
, NULL
, 0 },
100 { "net", no_argument
, NULL
, 0 },
101 { "nwi", no_argument
, NULL
, 0 },
102 { "prefs", no_argument
, NULL
, 0 },
103 { "proxy", no_argument
, NULL
, 0 },
104 { "renew", required_argument
, NULL
, 0 },
105 { "set", required_argument
, NULL
, 0 },
106 { "snapshot", no_argument
, NULL
, 0 },
107 { "user", required_argument
, NULL
, 0 },
108 { "password", required_argument
, NULL
, 0 },
109 { "secret", required_argument
, NULL
, 0 },
110 { "log", required_argument
, NULL
, 0 },
111 { "disable-until-needed", no_argument
, NULL
, 0 },
118 _copyStringFromSTDIN(CFStringRef prompt
, CFStringRef defaultValue
)
122 Boolean is_user_prompt
= (prompt
!= NULL
&& isatty(STDIN_FILENO
) && isatty(STDOUT_FILENO
));
128 /* Print out a prompt to user that entry is desired */
129 if (is_user_prompt
) {
130 if (defaultValue
!= NULL
) {
131 SCPrint(TRUE
, stdout
, CFSTR("%@ [%@]: "), prompt
, defaultValue
);
133 SCPrint(TRUE
, stdout
, CFSTR("%@: "), prompt
);
138 if (fgets(buf
, sizeof(buf
), stdin
) == NULL
) {
142 /* Prepare for trim */
143 len
= (int)strlen(buf
);
148 if ((modlen
> 0) && (modbuf
[modlen
- 1] == '\n')) {
149 modbuf
[modlen
- 1] = '\0';
153 /* If nothing was entered at the user prompt, set default */
154 if (is_user_prompt
&& defaultValue
!= NULL
&& modlen
== 0) {
155 CFRetain(defaultValue
);
159 /* Trim spaces from front */
160 while (modlen
> 0 && isspace(modbuf
[0])) {
165 /* Trim spaces from back */
166 for (i
= modlen
- 1; i
>= 0; i
--) {
167 if (isspace(buf
[i
])) {
175 utf8
= CFStringCreateWithBytes(NULL
, (UInt8
*)modbuf
, modlen
, kCFStringEncodingUTF8
, TRUE
);
180 getLine(char *buf
, int len
, InputRef src
)
188 line
= el_gets(src
->el
, &count
);
192 strlcpy(buf
, line
, len
);
194 if (fgets(buf
, len
, src
->fp
) == NULL
)
198 n
= (int)strlen(buf
);
199 if (buf
[n
-1] == '\n') {
200 /* the entire line fit in the buffer, remove the newline */
202 } else if (!src
->el
) {
203 /* eat the remainder of the line */
206 } while ((n
!= '\n') && (n
!= EOF
));
209 if (src
->h
&& (buf
[0] != '\0')) {
212 history(src
->h
, &ev
, H_ENTER
, buf
);
220 getString(char **line
)
222 char *s
, *e
, c
, *string
;
223 int i
, isQuoted
= 0, escaped
= 0;
225 if (*line
== NULL
) return NULL
;
226 if (**line
== '\0') return NULL
;
228 /* Skip leading white space */
229 while (isspace(**line
)) *line
+= 1;
231 /* Grab the next string */
234 return NULL
; /* no string available */
235 } else if (*s
== '"') {
236 isQuoted
= 1; /* it's a quoted string */
240 for (e
= s
; (c
= *e
) != '\0'; e
++) {
241 if (isQuoted
&& (c
== '"'))
242 break; /* end of quoted string */
246 break; /* if premature end-of-string */
247 if ((*e
== '"') || isspace(*e
))
248 escaped
++; /* if escaped quote or white space */
250 if (!isQuoted
&& isspace(c
))
251 break; /* end of non-quoted string */
254 string
= malloc(e
- s
- escaped
+ 1);
256 for (i
= 0; s
< e
; s
++) {
258 if (!((s
[0] == '\\') && ((s
[1] == '"') || isspace(s
[1])))) i
++;
263 e
++; /* move past end of quoted string */
272 process_line(InputRef src
)
278 char line
[LINE_LENGTH
];
281 // if end-of-file, exit
282 if (getLine(line
, sizeof(line
), src
) == NULL
)
286 SCPrint(TRUE
, stdout
, CFSTR("%d> %s\n"), nesting
, line
);
289 // break up the input line
290 while ((arg
= getString(&s
)) != NULL
) {
292 argv
= (char **)malloc(2 * sizeof(char *));
294 argv
= (char **)reallocf(argv
, ((argc
+ 2) * sizeof(char *)));
299 return TRUE
; // if no arguments
302 /* process the command */
303 if (*argv
[0] != '#') {
304 argv
[argc
] = NULL
; // just in case...
306 do_command(argc
, argv
);
309 /* free the arguments */
310 for (i
= 0; i
< argc
; i
++) {
315 return !termRequested
;
320 usage(const char *command
)
322 SCPrint(TRUE
, stderr
, CFSTR("usage: %s\n"), command
);
323 SCPrint(TRUE
, stderr
, CFSTR("\tinteractive access to the dynamic store.\n"));
324 SCPrint(TRUE
, stderr
, CFSTR("\n"));
325 SCPrint(TRUE
, stderr
, CFSTR(" or: %s --prefs [preference-file]\n"), command
);
326 SCPrint(TRUE
, stderr
, CFSTR("\tinteractive access to the [raw] stored preferences.\n"));
327 SCPrint(TRUE
, stderr
, CFSTR("\n"));
328 SCPrint(TRUE
, stderr
, CFSTR(" or: %s [-W] -r nodename\n"), command
);
329 SCPrint(TRUE
, stderr
, CFSTR(" or: %s [-W] -r address\n"), command
);
330 SCPrint(TRUE
, stderr
, CFSTR(" or: %s [-W] -r local-address remote-address\n"), command
);
331 SCPrint(TRUE
, stderr
, CFSTR("\tcheck reachability of node, address, or address pair (-W to \"watch\").\n"));
332 SCPrint(TRUE
, stderr
, CFSTR("\n"));
333 SCPrint(TRUE
, stderr
, CFSTR(" or: %s -w dynamic-store-key [ -t timeout ]\n"), command
);
334 SCPrint(TRUE
, stderr
, CFSTR("\t-w\twait for presense of dynamic store key\n"));
335 SCPrint(TRUE
, stderr
, CFSTR("\t-t\ttime to wait for key\n"));
336 SCPrint(TRUE
, stderr
, CFSTR("\n"));
337 SCPrint(TRUE
, stderr
, CFSTR(" or: %s --get pref\n"), command
);
338 SCPrint(TRUE
, stderr
, CFSTR(" or: %s --set pref [newval]\n"), command
);
339 SCPrint(TRUE
, stderr
, CFSTR(" or: %s --get filename path key \n"), command
);
340 SCPrint(TRUE
, stderr
, CFSTR("\tpref\tdisplay (or set) the specified preference. Valid preferences\n"));
341 SCPrint(TRUE
, stderr
, CFSTR("\t\tinclude:\n"));
342 SCPrint(TRUE
, stderr
, CFSTR("\t\t\tComputerName, LocalHostName, HostName\n"));
343 SCPrint(TRUE
, stderr
, CFSTR("\tnewval\tNew preference value to be set. If not specified,\n"));
344 SCPrint(TRUE
, stderr
, CFSTR("\t\tthe new value will be read from standard input.\n"));
345 SCPrint(TRUE
, stderr
, CFSTR("\n"));
346 SCPrint(TRUE
, stderr
, CFSTR(" or: %s --dns\n"), command
);
347 SCPrint(TRUE
, stderr
, CFSTR("\tshow DNS configuration.\n"));
348 SCPrint(TRUE
, stderr
, CFSTR("\n"));
349 SCPrint(TRUE
, stderr
, CFSTR(" or: %s --proxy\n"), command
);
350 SCPrint(TRUE
, stderr
, CFSTR("\tshow \"proxy\" configuration.\n"));
351 SCPrint(TRUE
, stderr
, CFSTR("\n"));
352 SCPrint(TRUE
, stderr
, CFSTR(" or: %s --nwi\n"), command
);
353 SCPrint(TRUE
, stderr
, CFSTR("\tshow network information\n"));
354 SCPrint(TRUE
, stderr
, CFSTR("\n"));
355 SCPrint(TRUE
, stderr
, CFSTR(" or: %s --nc\n"), command
);
356 SCPrint(TRUE
, stderr
, CFSTR("\tshow VPN network configuration information. Use --nc help for full command list\n"));
359 SCPrint(TRUE
, stderr
, CFSTR("\n"));
360 SCPrint(TRUE
, stderr
, CFSTR(" or: %s --log IPMonitor [off|on]\n"), command
);
361 SCPrint(TRUE
, stderr
, CFSTR("\tmanage logging.\n"));
363 SCPrint(TRUE
, stderr
, CFSTR("\n"));
364 SCPrint(TRUE
, stderr
, CFSTR(" or: %s --disable-until-needed <interfaceName> [on|off ]\n"), command
);
365 SCPrint(TRUE
, stderr
, CFSTR("\tmanage secondary interface demand.\n"));
368 if (getenv("ENABLE_EXPERIMENTAL_SCUTIL_COMMANDS")) {
369 SCPrint(TRUE
, stderr
, CFSTR("\n"));
370 SCPrint(TRUE
, stderr
, CFSTR(" or: %s --net\n"), command
);
371 SCPrint(TRUE
, stderr
, CFSTR("\tmanage network configuration.\n"));
374 SCPrint(TRUE
, stderr
, CFSTR("\n"));
375 SCPrint(TRUE
, stderr
, CFSTR(" or: %s --error err#\n"), command
);
376 SCPrint(TRUE
, stderr
, CFSTR("\tdisplay a descriptive message for the given error code\n"));
385 #if !TARGET_OS_SIMULATOR
387 #else // !TARGET_OS_SIMULATOR
389 #endif // !TARGET_OS_SIMULATOR
394 main(int argc
, char * const argv
[])
396 Boolean disableUntilNeeded
= FALSE
;
397 Boolean doDNS
= FALSE
;
398 Boolean doNet
= FALSE
;
399 Boolean doNWI
= FALSE
;
400 Boolean doPrefs
= FALSE
;
401 Boolean doProxy
= FALSE
;
402 Boolean doReach
= FALSE
;
403 Boolean doSnap
= FALSE
;
410 const char *prog
= argv
[0];
415 int timeout
= 15; /* default timeout (in seconds) */
417 Boolean watch
= FALSE
;
418 int xStore
= 0; /* non dynamic store command line options */
420 /* process any arguments */
422 while ((opt
= getopt_long(argc
, argv
, "dDvprt:w:W", longopts
, &opti
)) != -1)
426 _sc_log
= FALSE
; /* enable framework logging */
433 _sc_log
= FALSE
; /* enable framework logging */
436 enablePrivateAPI
= TRUE
;
443 timeout
= atoi(optarg
);
453 if (strcmp(longopts
[opti
].name
, "dns") == 0) {
456 } else if (strcmp(longopts
[opti
].name
, "error") == 0) {
459 } else if (strcmp(longopts
[opti
].name
, "get") == 0) {
462 } else if (strcmp(longopts
[opti
].name
, "nc") == 0) {
465 } else if (strcmp(longopts
[opti
].name
, "net") == 0) {
468 } else if (strcmp(longopts
[opti
].name
, "nwi") == 0) {
471 } else if (strcmp(longopts
[opti
].name
, "prefs") == 0) {
474 } else if (strcmp(longopts
[opti
].name
, "proxy") == 0) {
477 } else if (strcmp(longopts
[opti
].name
, "renew") == 0) {
480 } else if (strcmp(longopts
[opti
].name
, "set") == 0) {
483 } else if (strcmp(longopts
[opti
].name
, "snapshot") == 0) {
486 } else if (strcmp(longopts
[opti
].name
, "log") == 0) {
489 } else if (strcmp(longopts
[opti
].name
, "disable-until-needed") == 0) {
490 disableUntilNeeded
= TRUE
;
492 } else if (strcmp(longopts
[opti
].name
, "user") == 0) {
493 username
= CFStringCreateWithCString(NULL
, optarg
, kCFStringEncodingUTF8
);
494 } else if (strcmp(longopts
[opti
].name
, "password") == 0) {
495 password
= CFStringCreateWithCString(NULL
, optarg
, kCFStringEncodingUTF8
);
496 } else if (strcmp(longopts
[opti
].name
, "secret") == 0) {
497 sharedsecret
= CFStringCreateWithCString(NULL
, optarg
, kCFStringEncodingUTF8
);
508 // if we are attempting to process more than one type of request
512 /* are we checking (or watching) the reachability of a host/address */
518 do_watchReachability(argc
, (char **)argv
);
520 do_checkReachability(argc
, (char **)argv
);
525 /* are we waiting on the presense of a dynamic store key */
527 do_wait(wait
, timeout
);
531 /* are we looking up the DNS configuration */
534 do_watchDNSConfiguration(argc
, (char **)argv
);
536 do_showDNSConfiguration(argc
, (char **)argv
);
543 do_watchNWI(argc
, (char**)argv
);
545 do_showNWI(argc
, (char**)argv
);
551 if (!enablePrivateAPI
552 #if !TARGET_OS_SIMULATOR
554 #endif // !TARGET_OS_SIMULATOR
559 do_open(0, NULL
); /* open the dynamic store */
560 do_snapshot(argc
, (char**)argv
);
564 /* are we translating error #'s to descriptive text */
566 int sc_status
= atoi(error
);
568 SCPrint(TRUE
, stdout
, CFSTR("Error: 0x%08x %d %s\n"),
571 SCErrorString(sc_status
));
575 /* are we looking up a preference value */
578 if (findPref(get
) < 0) {
581 } else if (argc
== 2) {
584 * i.e. scutil --get <filename> <prefs path> <key>
586 * need to go back one argument to re-use the 1st "--get"
587 * argument as the prefs path name
595 do_getPref(get
, argc
, (char **)argv
);
599 /* are we looking up the proxy configuration */
601 do_showProxyConfiguration(argc
, (char **)argv
);
605 /* are we changing a preference value */
607 if (findPref(set
) < 0) {
610 do_setPref(set
, argc
, (char **)argv
);
616 if (strcasecmp(log
, "IPMonitor")) {
619 do_log(log
, argc
, (char * *)argv
);
623 /* disableUntilNeeded */
624 if (disableUntilNeeded
) {
625 do_disable_until_needed(argc
, (char * *)argv
);
628 /* network connection commands */
630 if (find_nc_cmd(nc_cmd
) < 0) {
633 do_nc_cmd(nc_cmd
, argc
, (char **)argv
, watch
);
638 /* if we are going to be managing the network configuration */
639 commands
= (cmdInfo
*)commands_net
;
640 nCommands
= nCommands_net
;
642 if (!getenv("ENABLE_EXPERIMENTAL_SCUTIL_COMMANDS")) {
646 do_net_init(); /* initialization */
647 do_net_open(argc
, (char **)argv
); /* open prefs */
648 } else if (doPrefs
) {
649 /* if we are going to be managing the network configuration */
650 commands
= (cmdInfo
*)commands_prefs
;
651 nCommands
= nCommands_prefs
;
653 do_dictInit(0, NULL
); /* start with an empty dictionary */
654 do_prefs_init(); /* initialization */
655 do_prefs_open(argc
, (char **)argv
); /* open prefs */
657 /* if we are going to be managing the dynamic store */
658 commands
= (cmdInfo
*)commands_store
;
659 nCommands
= nCommands_store
;
661 do_dictInit(0, NULL
); /* start with an empty dictionary */
662 do_open(0, NULL
); /* open the dynamic store */
665 /* are we trying to renew a DHCP lease */
671 /* allocate command input stream */
672 src
= (InputRef
)CFAllocatorAllocate(NULL
, sizeof(Input
), 0);
677 if (isatty(fileno(src
->fp
))) {
682 if (tcgetattr(fileno(src
->fp
), &t
) != -1) {
683 if ((t
.c_lflag
& ECHO
) == 0) {
687 src
->el
= el_init(prog
, src
->fp
, stdout
, stderr
);
688 src
->h
= history_init();
690 (void)history(src
->h
, &ev
, H_SETSIZE
, INT_MAX
);
691 el_set(src
->el
, EL_HIST
, history
, src
->h
);
694 el_set(src
->el
, EL_EDITMODE
, 0);
697 el_set(src
->el
, EL_EDITOR
, "emacs");
698 el_set(src
->el
, EL_PROMPT
, prompt
);
700 el_source(src
->el
, NULL
);
702 if ((el_get(src
->el
, EL_EDITMODE
, &editmode
) != -1) && editmode
!= 0) {
703 el_set(src
->el
, EL_SIGNAL
, 1);
715 ok
= process_line(src
);
721 /* close the socket, free resources */
722 if (src
->h
) history_end(src
->h
);
723 if (src
->el
) el_end(src
->el
);
724 (void)fclose(src
->fp
);
725 CFAllocatorDeallocate(NULL
, src
);
727 exit (EX_OK
); // insure the process exit status is 0
728 return 0; // ...and make main fit the ANSI spec.