source: branches/samba-3.5.x/source3/utils/net_rpc_shell.c

Last change on this file was 414, checked in by Herwig Bauernfeind, 15 years ago

Samba 3.5.0: Initial import

File size: 6.6 KB
Line 
1/*
2 * Unix SMB/CIFS implementation.
3 * Shell around net rpc subcommands
4 * Copyright (C) Volker Lendecke 2006
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 3 of the License, or
9 * (at your option) any later version.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, see <http://www.gnu.org/licenses/>.
18 */
19
20
21#include "includes.h"
22#include "utils/net.h"
23
24static NTSTATUS rpc_sh_info(struct net_context *c,
25 TALLOC_CTX *mem_ctx, struct rpc_sh_ctx *ctx,
26 struct rpc_pipe_client *pipe_hnd,
27 int argc, const char **argv)
28{
29 return rpc_info_internals(c, ctx->domain_sid, ctx->domain_name,
30 ctx->cli, pipe_hnd, mem_ctx,
31 argc, argv);
32}
33
34static struct rpc_sh_ctx *this_ctx;
35
36static char **completion_fn(const char *text, int start, int end)
37{
38 char **cmds = NULL;
39 int n_cmds = 0;
40 struct rpc_sh_cmd *c;
41
42 if (start != 0) {
43 return NULL;
44 }
45
46 ADD_TO_ARRAY(NULL, char *, SMB_STRDUP(text), &cmds, &n_cmds);
47
48 for (c = this_ctx->cmds; c->name != NULL; c++) {
49 bool match = (strncmp(text, c->name, strlen(text)) == 0);
50
51 if (match) {
52 ADD_TO_ARRAY(NULL, char *, SMB_STRDUP(c->name),
53 &cmds, &n_cmds);
54 }
55 }
56
57 if (n_cmds == 2) {
58 SAFE_FREE(cmds[0]);
59 cmds[0] = cmds[1];
60 n_cmds -= 1;
61 }
62
63 ADD_TO_ARRAY(NULL, char *, NULL, &cmds, &n_cmds);
64 return cmds;
65}
66
67static NTSTATUS net_sh_run(struct net_context *c,
68 struct rpc_sh_ctx *ctx, struct rpc_sh_cmd *cmd,
69 int argc, const char **argv)
70{
71 TALLOC_CTX *mem_ctx;
72 struct rpc_pipe_client *pipe_hnd = NULL;
73 NTSTATUS status;
74
75 mem_ctx = talloc_new(ctx);
76 if (mem_ctx == NULL) {
77 d_fprintf(stderr, _("talloc_new failed\n"));
78 return NT_STATUS_NO_MEMORY;
79 }
80
81 status = cli_rpc_pipe_open_noauth(ctx->cli, cmd->interface,
82 &pipe_hnd);
83 if (!NT_STATUS_IS_OK(status)) {
84 d_fprintf(stderr, _("Could not open pipe: %s\n"),
85 nt_errstr(status));
86 return status;
87 }
88
89 status = cmd->fn(c, mem_ctx, ctx, pipe_hnd, argc, argv);
90
91 TALLOC_FREE(pipe_hnd);
92
93 talloc_destroy(mem_ctx);
94
95 return status;
96}
97
98static bool net_sh_process(struct net_context *c,
99 struct rpc_sh_ctx *ctx,
100 int argc, const char **argv)
101{
102 struct rpc_sh_cmd *cmd;
103 struct rpc_sh_ctx *new_ctx;
104 NTSTATUS status;
105
106 if (argc == 0) {
107 return true;
108 }
109
110 if (ctx == this_ctx) {
111
112 /* We've been called from the cmd line */
113 if (strequal(argv[0], "..") &&
114 (this_ctx->parent != NULL)) {
115 new_ctx = this_ctx->parent;
116 TALLOC_FREE(this_ctx);
117 this_ctx = new_ctx;
118 return true;
119 }
120 }
121
122 if (strequal(argv[0], "exit") ||
123 strequal(argv[0], "quit") ||
124 strequal(argv[0], "q")) {
125 return false;
126 }
127
128 if (strequal(argv[0], "help") || strequal(argv[0], "?")) {
129 for (cmd = ctx->cmds; cmd->name != NULL; cmd++) {
130 if (ctx != this_ctx) {
131 d_printf("%s ", ctx->whoami);
132 }
133 d_printf("%-15s %s\n", cmd->name, cmd->help);
134 }
135 return true;
136 }
137
138 for (cmd = ctx->cmds; cmd->name != NULL; cmd++) {
139 if (strequal(cmd->name, argv[0])) {
140 break;
141 }
142 }
143
144 if (cmd->name == NULL) {
145 /* None found */
146 d_fprintf(stderr,_( "%s: unknown cmd\n"), argv[0]);
147 return true;
148 }
149
150 new_ctx = TALLOC_P(ctx, struct rpc_sh_ctx);
151 if (new_ctx == NULL) {
152 d_fprintf(stderr, _("talloc failed\n"));
153 return false;
154 }
155 new_ctx->cli = ctx->cli;
156 new_ctx->whoami = talloc_asprintf(new_ctx, "%s %s",
157 ctx->whoami, cmd->name);
158 new_ctx->thiscmd = talloc_strdup(new_ctx, cmd->name);
159
160 if (cmd->sub != NULL) {
161 new_ctx->cmds = cmd->sub(c, new_ctx, ctx);
162 } else {
163 new_ctx->cmds = NULL;
164 }
165
166 new_ctx->parent = ctx;
167 new_ctx->domain_name = ctx->domain_name;
168 new_ctx->domain_sid = ctx->domain_sid;
169
170 argc -= 1;
171 argv += 1;
172
173 if (cmd->sub != NULL) {
174 if (argc == 0) {
175 this_ctx = new_ctx;
176 return true;
177 }
178 return net_sh_process(c, new_ctx, argc, argv);
179 }
180
181 status = net_sh_run(c, new_ctx, cmd, argc, argv);
182
183 if (!NT_STATUS_IS_OK(status)) {
184 d_fprintf(stderr, _("%s failed: %s\n"), new_ctx->whoami,
185 nt_errstr(status));
186 }
187
188 return true;
189}
190
191static struct rpc_sh_cmd sh_cmds[6] = {
192
193 { "info", NULL, &ndr_table_samr.syntax_id, rpc_sh_info,
194 N_("Print information about the domain connected to") },
195
196 { "rights", net_rpc_rights_cmds, 0, NULL,
197 N_("List/Grant/Revoke user rights") },
198
199 { "share", net_rpc_share_cmds, 0, NULL,
200 N_("List/Add/Remove etc shares") },
201
202 { "user", net_rpc_user_cmds, 0, NULL,
203 N_("List/Add/Remove user info") },
204
205 { "account", net_rpc_acct_cmds, 0, NULL,
206 N_("Show/Change account policy settings") },
207
208 { NULL, NULL, 0, NULL, NULL }
209};
210
211int net_rpc_shell(struct net_context *c, int argc, const char **argv)
212{
213 NTSTATUS status;
214 struct rpc_sh_ctx *ctx;
215
216 if (argc != 0 || c->display_usage) {
217 d_printf("%s\nnet rpc shell\n", _("Usage:"));
218 return -1;
219 }
220
221 if (libnetapi_init(&c->netapi_ctx) != 0) {
222 return -1;
223 }
224 libnetapi_set_username(c->netapi_ctx, c->opt_user_name);
225 libnetapi_set_password(c->netapi_ctx, c->opt_password);
226 if (c->opt_kerberos) {
227 libnetapi_set_use_kerberos(c->netapi_ctx);
228 }
229
230 ctx = TALLOC_P(NULL, struct rpc_sh_ctx);
231 if (ctx == NULL) {
232 d_fprintf(stderr, _("talloc failed\n"));
233 return -1;
234 }
235
236 status = net_make_ipc_connection(c, 0, &(ctx->cli));
237 if (!NT_STATUS_IS_OK(status)) {
238 d_fprintf(stderr, _("Could not open connection: %s\n"),
239 nt_errstr(status));
240 return -1;
241 }
242
243 ctx->cmds = sh_cmds;
244 ctx->whoami = "net rpc";
245 ctx->parent = NULL;
246
247 status = net_get_remote_domain_sid(ctx->cli, ctx, &ctx->domain_sid,
248 &ctx->domain_name);
249 if (!NT_STATUS_IS_OK(status)) {
250 return -1;
251 }
252
253 d_printf(_("Talking to domain %s (%s)\n"), ctx->domain_name,
254 sid_string_tos(ctx->domain_sid));
255
256 this_ctx = ctx;
257
258 while(1) {
259 char *prompt = NULL;
260 char *line = NULL;
261 int ret;
262
263 if (asprintf(&prompt, "%s> ", this_ctx->whoami) < 0) {
264 break;
265 }
266
267 line = smb_readline(prompt, NULL, completion_fn);
268 SAFE_FREE(prompt);
269
270 if (line == NULL) {
271 break;
272 }
273
274 ret = poptParseArgvString(line, &argc, &argv);
275 if (ret == POPT_ERROR_NOARG) {
276 SAFE_FREE(line);
277 continue;
278 }
279 if (ret != 0) {
280 d_fprintf(stderr, _("cmdline invalid: %s\n"),
281 poptStrerror(ret));
282 SAFE_FREE(line);
283 return false;
284 }
285
286 if ((line[0] != '\n') &&
287 (!net_sh_process(c, this_ctx, argc, argv))) {
288 SAFE_FREE(line);
289 break;
290 }
291 SAFE_FREE(line);
292 }
293
294 cli_shutdown(ctx->cli);
295
296 TALLOC_FREE(ctx);
297
298 return 0;
299}
Note: See TracBrowser for help on using the repository browser.