2000-07-05 15:24:26 +04:00
/*
2002-01-30 09:08:46 +03:00
Unix SMB / CIFS implementation .
2000-07-05 15:24:26 +04:00
Winbind status program .
2002-05-13 04:46:28 +04:00
Copyright ( C ) Tim Potter 2000 - 2002
2002-01-10 14:28:14 +03:00
Copyright ( C ) Andrew Bartlett 2002
2000-07-05 15:24:26 +04:00
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation ; either version 2 of the License , or
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
along with this program ; if not , write to the Free Software
Foundation , Inc . , 675 Mass Ave , Cambridge , MA 0213 9 , USA .
*/
# include "includes.h"
# include "winbindd.h"
# include "debug.h"
2001-06-04 08:12:38 +04:00
/* Prototypes from common.h */
2000-07-05 15:24:26 +04:00
2001-09-05 11:55:54 +04:00
NSS_STATUS winbindd_request ( int req_type ,
struct winbindd_request * request ,
struct winbindd_response * response ) ;
2000-07-05 15:24:26 +04:00
2002-03-20 06:54:47 +03:00
static char winbind_separator ( void )
2002-01-10 14:28:14 +03:00
{
struct winbindd_response response ;
2002-03-20 06:54:47 +03:00
static BOOL got_sep ;
static char sep ;
if ( got_sep )
return sep ;
2002-01-10 14:28:14 +03:00
ZERO_STRUCT ( response ) ;
/* Send off request */
if ( winbindd_request ( WINBINDD_INFO , NULL , & response ) ! =
NSS_STATUS_SUCCESS ) {
2002-04-04 10:47:20 +04:00
d_printf ( " could not obtain winbind separator! \n " ) ;
2002-02-15 16:28:59 +03:00
/* HACK: (this module should not call lp_ funtions) */
return * lp_winbind_separator ( ) ;
2002-01-10 14:28:14 +03:00
}
2002-03-20 06:54:47 +03:00
sep = response . data . info . winbind_separator ;
got_sep = True ;
2002-01-10 14:28:14 +03:00
2002-03-20 06:54:47 +03:00
if ( ! sep ) {
2002-03-01 04:13:42 +03:00
d_printf ( " winbind separator was NULL! \n " ) ;
2002-02-15 16:28:59 +03:00
/* HACK: (this module should not call lp_ funtions) */
2002-03-20 06:54:47 +03:00
sep = * lp_winbind_separator ( ) ;
2002-01-10 14:28:14 +03:00
}
2002-03-20 06:54:47 +03:00
return sep ;
2002-01-10 14:28:14 +03:00
}
2002-01-26 12:55:38 +03:00
static char * get_winbind_domain ( void )
{
struct winbindd_response response ;
static fstring winbind_domain ;
ZERO_STRUCT ( response ) ;
/* Send off request */
if ( winbindd_request ( WINBINDD_DOMAIN_NAME , NULL , & response ) ! =
NSS_STATUS_SUCCESS ) {
2002-03-01 04:13:42 +03:00
d_printf ( " could not obtain winbind domain name! \n " ) ;
2002-02-15 16:28:59 +03:00
/* HACK: (this module should not call lp_ funtions) */
return lp_workgroup ( ) ;
2002-01-26 12:55:38 +03:00
}
fstrcpy ( winbind_domain , response . data . domain_name ) ;
return winbind_domain ;
}
2002-01-10 13:23:54 +03:00
/* Copy of parse_domain_user from winbindd_util.c. Parse a string of the
form DOMAIN / user into a domain and a user */
2002-03-20 06:54:47 +03:00
static BOOL parse_wbinfo_domain_user ( const char * domuser , fstring domain ,
fstring user )
2002-01-10 13:23:54 +03:00
{
2002-01-10 14:28:14 +03:00
2002-03-20 06:54:47 +03:00
char * p = strchr ( domuser , winbind_separator ( ) ) ;
2002-01-10 13:23:54 +03:00
2002-01-18 05:37:55 +03:00
if ( ! p ) {
fstrcpy ( user , domuser ) ;
2002-01-26 12:55:38 +03:00
fstrcpy ( domain , get_winbind_domain ( ) ) ;
2002-01-18 05:37:55 +03:00
return True ;
}
2002-01-10 13:23:54 +03:00
fstrcpy ( user , p + 1 ) ;
fstrcpy ( domain , domuser ) ;
domain [ PTR_DIFF ( p , domuser ) ] = 0 ;
strupper ( domain ) ;
2002-03-20 06:54:47 +03:00
2002-01-10 13:23:54 +03:00
return True ;
}
2000-10-13 09:19:57 +04:00
/* List groups a user is a member of */
2000-10-11 09:25:32 +04:00
static BOOL wbinfo_get_usergroups ( char * user )
{
struct winbindd_request request ;
struct winbindd_response response ;
2001-09-05 11:55:54 +04:00
NSS_STATUS result ;
int i ;
2000-10-11 09:25:32 +04:00
ZERO_STRUCT ( response ) ;
/* Send request */
fstrcpy ( request . data . username , user ) ;
2000-10-11 09:45:06 +04:00
result = winbindd_request ( WINBINDD_GETGROUPS , & request , & response ) ;
2000-10-11 09:25:32 +04:00
2002-01-11 06:49:51 +03:00
if ( result ! = NSS_STATUS_SUCCESS )
2000-10-11 09:25:32 +04:00
return False ;
2002-01-11 06:49:51 +03:00
for ( i = 0 ; i < response . data . num_entries ; i + + )
2002-03-01 04:13:42 +03:00
d_printf ( " %d \n " , ( int ) ( ( gid_t * ) response . extra_data ) [ i ] ) ;
2002-01-11 06:49:51 +03:00
SAFE_FREE ( response . extra_data ) ;
2000-10-11 09:25:32 +04:00
return True ;
}
2002-03-29 18:37:39 +03:00
/* Convert NetBIOS name to IP */
static BOOL wbinfo_wins_byname ( char * name )
{
struct winbindd_request request ;
struct winbindd_response response ;
ZERO_STRUCT ( request ) ;
ZERO_STRUCT ( response ) ;
/* Send request */
fstrcpy ( request . data . winsreq , name ) ;
if ( winbindd_request ( WINBINDD_WINS_BYNAME , & request , & response ) ! =
NSS_STATUS_SUCCESS ) {
return False ;
}
/* Display response */
printf ( " %s \n " , response . data . winsresp ) ;
return True ;
}
/* Convert IP to NetBIOS name */
static BOOL wbinfo_wins_byip ( char * ip )
{
struct winbindd_request request ;
struct winbindd_response response ;
ZERO_STRUCT ( request ) ;
ZERO_STRUCT ( response ) ;
/* Send request */
fstrcpy ( request . data . winsreq , ip ) ;
if ( winbindd_request ( WINBINDD_WINS_BYIP , & request , & response ) ! =
NSS_STATUS_SUCCESS ) {
return False ;
}
/* Display response */
printf ( " %s \n " , response . data . winsresp ) ;
return True ;
}
2000-07-05 15:24:26 +04:00
/* List trusted domains */
static BOOL wbinfo_list_domains ( void )
{
struct winbindd_response response ;
fstring name ;
ZERO_STRUCT ( response ) ;
/* Send request */
2001-09-05 11:55:54 +04:00
if ( winbindd_request ( WINBINDD_LIST_TRUSTDOM , NULL , & response ) ! =
2002-03-20 06:54:47 +03:00
NSS_STATUS_SUCCESS )
2000-07-05 15:24:26 +04:00
return False ;
/* Display response */
if ( response . extra_data ) {
2002-01-11 06:49:51 +03:00
char * extra_data = ( char * ) response . extra_data ;
while ( next_token ( & extra_data , name , " , " , sizeof ( fstring ) ) )
2002-03-01 04:13:42 +03:00
d_printf ( " %s \n " , name ) ;
2002-01-11 06:49:51 +03:00
SAFE_FREE ( response . extra_data ) ;
2000-07-05 15:24:26 +04:00
}
return True ;
}
2002-01-31 14:49:29 +03:00
/* show sequence numbers */
static BOOL wbinfo_show_sequence ( void )
{
struct winbindd_response response ;
ZERO_STRUCT ( response ) ;
/* Send request */
2002-03-20 06:54:47 +03:00
2002-01-31 14:49:29 +03:00
if ( winbindd_request ( WINBINDD_SHOW_SEQUENCE , NULL , & response ) ! =
2002-03-20 06:54:47 +03:00
NSS_STATUS_SUCCESS )
2002-01-31 14:49:29 +03:00
return False ;
/* Display response */
2002-03-20 06:54:47 +03:00
2002-01-31 14:49:29 +03:00
if ( response . extra_data ) {
char * extra_data = ( char * ) response . extra_data ;
2002-03-01 04:13:42 +03:00
d_printf ( " %s " , extra_data ) ;
2002-01-31 14:49:29 +03:00
SAFE_FREE ( response . extra_data ) ;
}
return True ;
}
2000-07-05 15:24:26 +04:00
/* Check trust account password */
static BOOL wbinfo_check_secret ( void )
{
2000-10-13 09:19:57 +04:00
struct winbindd_response response ;
BOOL result ;
ZERO_STRUCT ( response ) ;
result = winbindd_request ( WINBINDD_CHECK_MACHACC , NULL , & response ) = =
NSS_STATUS_SUCCESS ;
if ( result ) {
2002-03-20 06:54:47 +03:00
if ( response . data . num_entries = = 0 )
2002-03-01 04:13:42 +03:00
d_printf ( " Secret is good \n " ) ;
2002-03-20 06:54:47 +03:00
else
2002-03-01 04:13:42 +03:00
d_printf ( " Secret is bad \n 0x%08x \n " ,
2001-04-25 09:47:50 +04:00
response . data . num_entries ) ;
2000-10-13 09:19:57 +04:00
return True ;
}
return False ;
2000-07-05 15:24:26 +04:00
}
/* Convert uid to sid */
static BOOL wbinfo_uid_to_sid ( uid_t uid )
{
struct winbindd_request request ;
struct winbindd_response response ;
ZERO_STRUCT ( request ) ;
ZERO_STRUCT ( response ) ;
/* Send request */
request . data . uid = uid ;
2002-03-20 06:54:47 +03:00
2001-09-05 11:55:54 +04:00
if ( winbindd_request ( WINBINDD_UID_TO_SID , & request , & response ) ! =
2002-03-20 06:54:47 +03:00
NSS_STATUS_SUCCESS )
2000-07-05 15:24:26 +04:00
return False ;
/* Display response */
2002-03-01 04:13:42 +03:00
d_printf ( " %s \n " , response . data . sid . sid ) ;
2000-07-05 15:24:26 +04:00
return True ;
}
/* Convert gid to sid */
static BOOL wbinfo_gid_to_sid ( gid_t gid )
{
struct winbindd_request request ;
struct winbindd_response response ;
ZERO_STRUCT ( request ) ;
ZERO_STRUCT ( response ) ;
/* Send request */
request . data . gid = gid ;
2002-03-20 06:54:47 +03:00
2001-09-05 11:55:54 +04:00
if ( winbindd_request ( WINBINDD_GID_TO_SID , & request , & response ) ! =
2002-03-20 06:54:47 +03:00
NSS_STATUS_SUCCESS )
2000-07-05 15:24:26 +04:00
return False ;
/* Display response */
2002-03-01 04:13:42 +03:00
d_printf ( " %s \n " , response . data . sid . sid ) ;
2000-07-05 15:24:26 +04:00
return True ;
}
/* Convert sid to uid */
static BOOL wbinfo_sid_to_uid ( char * sid )
{
struct winbindd_request request ;
struct winbindd_response response ;
ZERO_STRUCT ( request ) ;
ZERO_STRUCT ( response ) ;
/* Send request */
fstrcpy ( request . data . sid , sid ) ;
2002-03-20 06:54:47 +03:00
2001-09-05 11:55:54 +04:00
if ( winbindd_request ( WINBINDD_SID_TO_UID , & request , & response ) ! =
2002-03-20 06:54:47 +03:00
NSS_STATUS_SUCCESS )
2000-07-05 15:24:26 +04:00
return False ;
/* Display response */
2002-03-01 04:13:42 +03:00
d_printf ( " %d \n " , ( int ) response . data . uid ) ;
2000-07-05 15:24:26 +04:00
return True ;
}
static BOOL wbinfo_sid_to_gid ( char * sid )
{
struct winbindd_request request ;
struct winbindd_response response ;
ZERO_STRUCT ( request ) ;
ZERO_STRUCT ( response ) ;
/* Send request */
fstrcpy ( request . data . sid , sid ) ;
2002-03-20 06:54:47 +03:00
2001-09-05 11:55:54 +04:00
if ( winbindd_request ( WINBINDD_SID_TO_GID , & request , & response ) ! =
2002-03-20 06:54:47 +03:00
NSS_STATUS_SUCCESS )
2000-07-05 15:24:26 +04:00
return False ;
/* Display response */
2002-03-01 04:13:42 +03:00
d_printf ( " %d \n " , ( int ) response . data . gid ) ;
2000-07-05 15:24:26 +04:00
return True ;
}
/* Convert sid to string */
static BOOL wbinfo_lookupsid ( char * sid )
{
struct winbindd_request request ;
struct winbindd_response response ;
ZERO_STRUCT ( request ) ;
ZERO_STRUCT ( response ) ;
/* Send off request */
fstrcpy ( request . data . sid , sid ) ;
2002-03-20 06:54:47 +03:00
2001-09-05 11:55:54 +04:00
if ( winbindd_request ( WINBINDD_LOOKUPSID , & request , & response ) ! =
2002-03-20 06:54:47 +03:00
NSS_STATUS_SUCCESS )
2000-07-05 15:24:26 +04:00
return False ;
/* Display response */
2002-03-20 06:54:47 +03:00
d_printf ( " %s%c%s %d \n " , response . data . name . dom_name ,
winbind_separator ( ) , response . data . name . name ,
response . data . name . type ) ;
2000-07-05 15:24:26 +04:00
return True ;
}
/* Convert string to sid */
static BOOL wbinfo_lookupname ( char * name )
{
struct winbindd_request request ;
struct winbindd_response response ;
/* Send off request */
ZERO_STRUCT ( request ) ;
ZERO_STRUCT ( response ) ;
2002-03-20 06:54:47 +03:00
parse_wbinfo_domain_user ( name , request . data . name . dom_name ,
request . data . name . name ) ;
2002-01-26 12:55:38 +03:00
2001-09-05 11:55:54 +04:00
if ( winbindd_request ( WINBINDD_LOOKUPNAME , & request , & response ) ! =
2002-03-20 06:54:47 +03:00
NSS_STATUS_SUCCESS )
2000-07-05 15:24:26 +04:00
return False ;
/* Display response */
2002-03-01 04:13:42 +03:00
d_printf ( " %s %d \n " , response . data . sid . sid , response . data . sid . type ) ;
2000-07-05 15:24:26 +04:00
return True ;
}
2001-08-22 06:48:16 +04:00
/* Authenticate a user with a plaintext password */
static BOOL wbinfo_auth ( char * username )
{
struct winbindd_request request ;
struct winbindd_response response ;
2001-09-05 11:55:54 +04:00
NSS_STATUS result ;
2001-08-22 06:48:16 +04:00
char * p ;
/* Send off request */
ZERO_STRUCT ( request ) ;
ZERO_STRUCT ( response ) ;
p = strchr ( username , ' % ' ) ;
if ( p ) {
* p = 0 ;
fstrcpy ( request . data . auth . user , username ) ;
fstrcpy ( request . data . auth . pass , p + 1 ) ;
* p = ' % ' ;
} else
fstrcpy ( request . data . auth . user , username ) ;
result = winbindd_request ( WINBINDD_PAM_AUTH , & request , & response ) ;
/* Display response */
2002-03-01 04:13:42 +03:00
d_printf ( " plaintext password authentication %s \n " ,
2001-09-05 11:55:54 +04:00
( result = = NSS_STATUS_SUCCESS ) ? " succeeded " : " failed " ) ;
2001-08-22 06:48:16 +04:00
2002-03-20 06:54:47 +03:00
d_printf ( " error code was %s (0x%x) \n " ,
response . data . auth . nt_status_string ,
response . data . auth . nt_status ) ;
2002-02-05 12:40:36 +03:00
2001-09-05 11:55:54 +04:00
return result = = NSS_STATUS_SUCCESS ;
2001-08-22 06:48:16 +04:00
}
/* Authenticate a user with a challenge/response */
static BOOL wbinfo_auth_crap ( char * username )
{
struct winbindd_request request ;
struct winbindd_response response ;
2001-09-05 11:55:54 +04:00
NSS_STATUS result ;
2002-01-10 13:23:54 +03:00
fstring name_user ;
fstring name_domain ;
2001-08-22 06:48:16 +04:00
fstring pass ;
char * p ;
/* Send off request */
ZERO_STRUCT ( request ) ;
ZERO_STRUCT ( response ) ;
p = strchr ( username , ' % ' ) ;
if ( p ) {
* p = 0 ;
fstrcpy ( pass , p + 1 ) ;
2002-01-10 13:23:54 +03:00
}
2002-01-10 14:28:14 +03:00
parse_wbinfo_domain_user ( username , name_domain , name_user ) ;
2002-01-10 13:23:54 +03:00
fstrcpy ( request . data . auth_crap . user , name_user ) ;
fstrcpy ( request . data . auth_crap . domain , name_domain ) ;
2001-08-22 06:48:16 +04:00
generate_random_buffer ( request . data . auth_crap . chal , 8 , False ) ;
2001-09-05 11:55:54 +04:00
SMBencrypt ( ( uchar * ) pass , request . data . auth_crap . chal ,
( uchar * ) request . data . auth_crap . lm_resp ) ;
SMBNTencrypt ( ( uchar * ) pass , request . data . auth_crap . chal ,
( uchar * ) request . data . auth_crap . nt_resp ) ;
2001-08-22 06:48:16 +04:00
request . data . auth_crap . lm_resp_len = 24 ;
request . data . auth_crap . nt_resp_len = 24 ;
result = winbindd_request ( WINBINDD_PAM_AUTH_CRAP , & request , & response ) ;
/* Display response */
2002-03-01 04:13:42 +03:00
d_printf ( " challenge/response password authentication %s \n " ,
2001-09-05 11:55:54 +04:00
( result = = NSS_STATUS_SUCCESS ) ? " succeeded " : " failed " ) ;
2001-08-22 06:48:16 +04:00
2002-03-01 04:13:42 +03:00
d_printf ( " error code was %s (0x%x) \n " ,
2002-02-05 12:40:36 +03:00
response . data . auth . nt_status_string ,
response . data . auth . nt_status ) ;
2001-09-05 11:55:54 +04:00
return result = = NSS_STATUS_SUCCESS ;
2001-08-22 06:48:16 +04:00
}
2000-07-05 15:24:26 +04:00
/* Print domain users */
static BOOL print_domain_users ( void )
{
struct winbindd_response response ;
2002-01-11 06:49:51 +03:00
char * extra_data ;
2000-07-05 15:24:26 +04:00
fstring name ;
/* Send request to winbind daemon */
ZERO_STRUCT ( response ) ;
2001-09-05 11:55:54 +04:00
if ( winbindd_request ( WINBINDD_LIST_USERS , NULL , & response ) ! =
2002-03-20 06:54:47 +03:00
NSS_STATUS_SUCCESS )
2000-07-05 15:24:26 +04:00
return False ;
/* Look through extra data */
2002-01-11 06:49:51 +03:00
if ( ! response . extra_data )
2000-07-05 15:24:26 +04:00
return False ;
2002-01-11 06:49:51 +03:00
extra_data = ( char * ) response . extra_data ;
while ( next_token ( & extra_data , name , " , " , sizeof ( fstring ) ) )
2002-03-01 04:13:42 +03:00
d_printf ( " %s \n " , name ) ;
2000-07-05 15:24:26 +04:00
2002-01-11 06:49:51 +03:00
SAFE_FREE ( response . extra_data ) ;
2000-07-05 15:24:26 +04:00
return True ;
}
/* Print domain groups */
static BOOL print_domain_groups ( void )
{
struct winbindd_response response ;
2002-01-11 06:49:51 +03:00
char * extra_data ;
2000-07-05 15:24:26 +04:00
fstring name ;
ZERO_STRUCT ( response ) ;
2001-09-05 11:55:54 +04:00
if ( winbindd_request ( WINBINDD_LIST_GROUPS , NULL , & response ) ! =
2002-03-20 06:54:47 +03:00
NSS_STATUS_SUCCESS )
2000-07-05 15:24:26 +04:00
return False ;
/* Look through extra data */
2002-01-11 06:49:51 +03:00
if ( ! response . extra_data )
2000-07-05 15:24:26 +04:00
return False ;
2002-01-11 06:49:51 +03:00
extra_data = ( char * ) response . extra_data ;
while ( next_token ( & extra_data , name , " , " , sizeof ( fstring ) ) )
2002-03-01 04:13:42 +03:00
d_printf ( " %s \n " , name ) ;
2002-01-11 06:49:51 +03:00
SAFE_FREE ( response . extra_data ) ;
2000-07-05 15:24:26 +04:00
return True ;
}
2001-12-11 08:18:36 +03:00
/* Set the authorised user for winbindd access in secrets.tdb */
static BOOL wbinfo_set_auth_user ( char * username )
{
char * password ;
2002-02-15 16:28:59 +03:00
fstring user , domain ;
2001-12-11 08:18:36 +03:00
/* Separate into user and password */
2002-02-15 16:28:59 +03:00
parse_wbinfo_domain_user ( username , domain , user ) ;
password = strchr ( user , ' % ' ) ;
2001-12-11 08:18:36 +03:00
if ( password ) {
* password = 0 ;
password + + ;
} else
password = " " ;
/* Store in secrets.tdb */
2002-03-20 06:54:47 +03:00
if ( ! secrets_store ( SECRETS_AUTH_USER , username ,
strlen ( username ) + 1 ) | |
! secrets_store ( SECRETS_AUTH_DOMAIN , domain ,
strlen ( domain ) + 1 ) | |
! secrets_store ( SECRETS_AUTH_PASSWORD , password ,
strlen ( password ) + 1 ) ) {
2002-03-01 04:13:42 +03:00
d_fprintf ( stderr , " error storing authenticated user info \n " ) ;
2001-12-11 08:18:36 +03:00
return False ;
}
return True ;
}
2002-01-10 13:23:54 +03:00
static BOOL wbinfo_ping ( void )
{
NSS_STATUS result ;
result = winbindd_request ( WINBINDD_PING , NULL , NULL ) ;
/* Display response */
2002-03-01 04:13:42 +03:00
d_printf ( " 'ping' to winbindd %s \n " ,
2002-01-10 13:23:54 +03:00
( result = = NSS_STATUS_SUCCESS ) ? " succeeded " : " failed " ) ;
return result = = NSS_STATUS_SUCCESS ;
}
2000-07-05 15:24:26 +04:00
/* Print program usage */
static void usage ( void )
{
2002-03-01 04:13:42 +03:00
d_printf ( " Usage: wbinfo -ug | -n name | -sSY sid | -UG uid/gid | -tm "
2002-05-13 04:46:28 +04:00
" | -[aA] user%%password \n " ) ;
2002-03-01 04:13:42 +03:00
d_printf ( " \t -u \t \t \t lists all domain users \n " ) ;
d_printf ( " \t -g \t \t \t lists all domain groups \n " ) ;
d_printf ( " \t -n name \t \t \t converts name to sid \n " ) ;
d_printf ( " \t -s sid \t \t \t converts sid to name \n " ) ;
2002-03-29 18:37:39 +03:00
d_printf ( " \t -N name \t \t \t converts NetBIOS name to IP (WINS) \n " ) ;
d_printf ( " \t -I name \t \t \t converts IP address to NetBIOS name (WINS) \n " ) ;
2002-03-01 04:13:42 +03:00
d_printf ( " \t -U uid \t \t \t converts uid to sid \n " ) ;
d_printf ( " \t -G gid \t \t \t converts gid to sid \n " ) ;
d_printf ( " \t -S sid \t \t \t converts sid to uid \n " ) ;
d_printf ( " \t -Y sid \t \t \t converts sid to gid \n " ) ;
d_printf ( " \t -t \t \t \t check shared secret \n " ) ;
d_printf ( " \t -m \t \t \t list trusted domains \n " ) ;
d_printf ( " \t -r user \t \t \t get user groups \n " ) ;
d_printf ( " \t -a user%%password \t authenticate user \n " ) ;
2002-05-13 04:46:28 +04:00
d_printf ( " \t -A user%%password \t store user and password used by winbindd (root only) \n " ) ;
2002-03-01 04:13:42 +03:00
d_printf ( " \t -p 'ping' winbindd to see if it is alive \n " ) ;
d_printf ( " \t --sequence \t \t show sequence numbers of all domains \n " ) ;
2000-07-05 15:24:26 +04:00
}
/* Main program */
2001-12-11 08:18:36 +03:00
enum {
2002-03-20 06:54:47 +03:00
OPT_SET_AUTH_USER = 1000 ,
OPT_SEQUENCE ,
2001-12-11 08:18:36 +03:00
} ;
2000-07-05 15:24:26 +04:00
int main ( int argc , char * * argv )
{
extern pstring global_myname ;
int opt ;
2001-12-11 08:18:36 +03:00
poptContext pc ;
2001-12-11 21:08:48 +03:00
static char * string_arg ;
static int int_arg ;
2001-12-11 08:18:36 +03:00
BOOL got_command = False ;
2002-04-04 10:40:17 +04:00
int result = 1 ;
2001-12-11 08:18:36 +03:00
struct poptOption long_options [ ] = {
2002-03-20 06:54:47 +03:00
/* longName, shortName, argInfo, argPtr, value, descrip,
argDesc */
2001-12-19 11:44:23 +03:00
{ " help " , ' h ' , POPT_ARG_NONE , 0 , ' h ' } ,
2001-12-11 08:18:36 +03:00
{ " domain-users " , ' u ' , POPT_ARG_NONE , 0 , ' u ' } ,
{ " domain-groups " , ' g ' , POPT_ARG_NONE , 0 , ' g ' } ,
2002-03-29 18:37:39 +03:00
{ " WINS-by-name " , ' N ' , POPT_ARG_STRING , & string_arg , ' N ' } ,
{ " WINS-by-ip " , ' I ' , POPT_ARG_STRING , & string_arg , ' I ' } ,
2001-12-11 08:18:36 +03:00
{ " name-to-sid " , ' n ' , POPT_ARG_STRING , & string_arg , ' n ' } ,
{ " sid-to-name " , ' s ' , POPT_ARG_STRING , & string_arg , ' s ' } ,
{ " uid-to-sid " , ' U ' , POPT_ARG_INT , & int_arg , ' U ' } ,
{ " gid-to-sid " , ' G ' , POPT_ARG_INT , & int_arg , ' G ' } ,
{ " sid-to-uid " , ' S ' , POPT_ARG_STRING , & string_arg , ' S ' } ,
{ " sid-to-gid " , ' Y ' , POPT_ARG_STRING , & string_arg , ' Y ' } ,
{ " check-secret " , ' t ' , POPT_ARG_NONE , 0 , ' t ' } ,
{ " trusted-domains " , ' m ' , POPT_ARG_NONE , 0 , ' m ' } ,
2002-03-20 06:54:47 +03:00
{ " sequence " , 0 , POPT_ARG_NONE , 0 , OPT_SEQUENCE } ,
2001-12-11 08:18:36 +03:00
{ " user-groups " , ' r ' , POPT_ARG_STRING , & string_arg , ' r ' } ,
2001-12-12 02:27:45 +03:00
{ " authenticate " , ' a ' , POPT_ARG_STRING , & string_arg , ' a ' } ,
2002-05-13 04:46:28 +04:00
{ " set-auth-user " , ' A ' , POPT_ARG_STRING , & string_arg , OPT_SET_AUTH_USER } ,
2002-01-10 13:23:54 +03:00
{ " ping " , ' p ' , POPT_ARG_NONE , 0 , ' p ' } ,
2001-12-11 08:18:36 +03:00
{ 0 , 0 , 0 , 0 }
} ;
2000-07-05 15:24:26 +04:00
/* Samba client initialisation */
if ( ! * global_myname ) {
char * p ;
fstrcpy ( global_myname , myhostname ( ) ) ;
2001-07-19 01:50:20 +04:00
p = strchr ( global_myname , ' . ' ) ;
2002-03-20 06:54:47 +03:00
if ( p )
2000-07-05 15:24:26 +04:00
* p = 0 ;
}
2001-11-19 05:49:53 +03:00
if ( ! lp_load ( dyn_CONFIGFILE , True , False , False ) ) {
2002-03-01 04:13:42 +03:00
d_fprintf ( stderr , " wbinfo: error opening config file %s. Error was %s \n " ,
2001-12-05 00:30:52 +03:00
dyn_CONFIGFILE , strerror ( errno ) ) ;
2000-07-05 15:24:26 +04:00
exit ( 1 ) ;
}
2002-01-10 14:28:14 +03:00
2000-07-05 15:24:26 +04:00
load_interfaces ( ) ;
/* Parse command line options */
if ( argc = = 1 ) {
usage ( ) ;
return 1 ;
}
2001-12-11 08:18:36 +03:00
/* Parse options */
pc = poptGetContext ( " wbinfo " , argc , ( const char * * ) argv , long_options , 0 ) ;
while ( ( opt = poptGetNextOpt ( pc ) ) ! = - 1 ) {
if ( got_command ) {
2002-03-20 06:54:47 +03:00
d_fprintf ( stderr , " No more than one command may be specified at once. \n " ) ;
2001-12-11 08:18:36 +03:00
exit ( 1 ) ;
}
got_command = True ;
}
2002-04-04 10:40:17 +04:00
poptFreeContext ( pc ) ;
2001-12-11 08:18:36 +03:00
pc = poptGetContext ( NULL , argc , ( const char * * ) argv , long_options ,
POPT_CONTEXT_KEEP_FIRST ) ;
while ( ( opt = poptGetNextOpt ( pc ) ) ! = - 1 ) {
2000-07-05 15:24:26 +04:00
switch ( opt ) {
2001-12-19 11:44:23 +03:00
case ' h ' :
usage ( ) ;
2002-04-04 10:40:17 +04:00
result = 0 ;
goto done ;
2000-07-05 15:24:26 +04:00
case ' u ' :
if ( ! print_domain_users ( ) ) {
2002-03-01 04:13:42 +03:00
d_printf ( " Error looking up domain users \n " ) ;
2002-04-04 10:40:17 +04:00
goto done ;
2000-07-05 15:24:26 +04:00
}
break ;
case ' g ' :
if ( ! print_domain_groups ( ) ) {
2002-03-01 04:13:42 +03:00
d_printf ( " Error looking up domain groups \n " ) ;
2002-04-04 10:40:17 +04:00
goto done ;
2000-07-05 15:24:26 +04:00
}
break ;
case ' s ' :
2001-12-11 08:18:36 +03:00
if ( ! wbinfo_lookupsid ( string_arg ) ) {
2002-03-01 04:13:42 +03:00
d_printf ( " Could not lookup sid %s \n " , string_arg ) ;
2002-04-04 10:40:17 +04:00
goto done ;
2000-07-05 15:24:26 +04:00
}
break ;
case ' n ' :
2001-12-11 08:18:36 +03:00
if ( ! wbinfo_lookupname ( string_arg ) ) {
2002-03-01 04:13:42 +03:00
d_printf ( " Could not lookup name %s \n " , string_arg ) ;
2002-04-04 10:40:17 +04:00
goto done ;
2000-07-05 15:24:26 +04:00
}
break ;
2002-03-29 18:37:39 +03:00
case ' N ' :
if ( ! wbinfo_wins_byname ( string_arg ) ) {
d_printf ( " Could not lookup WINS by name %s \n " , string_arg ) ;
2002-04-04 10:40:17 +04:00
goto done ;
2002-03-29 18:37:39 +03:00
}
break ;
case ' I ' :
if ( ! wbinfo_wins_byip ( string_arg ) ) {
d_printf ( " Could not lookup WINS by IP %s \n " , string_arg ) ;
2002-04-04 10:40:17 +04:00
goto done ;
2002-03-29 18:37:39 +03:00
}
break ;
2000-07-05 15:24:26 +04:00
case ' U ' :
2001-12-11 08:18:36 +03:00
if ( ! wbinfo_uid_to_sid ( int_arg ) ) {
2002-03-01 04:13:42 +03:00
d_printf ( " Could not convert uid %d to sid \n " , int_arg ) ;
2002-04-04 10:40:17 +04:00
goto done ;
2000-07-05 15:24:26 +04:00
}
break ;
case ' G ' :
2001-12-11 08:18:36 +03:00
if ( ! wbinfo_gid_to_sid ( int_arg ) ) {
2002-03-01 04:13:42 +03:00
d_printf ( " Could not convert gid %d to sid \n " ,
2001-12-11 08:18:36 +03:00
int_arg ) ;
2002-04-04 10:40:17 +04:00
goto done ;
2000-07-05 15:24:26 +04:00
}
break ;
case ' S ' :
2001-12-11 08:18:36 +03:00
if ( ! wbinfo_sid_to_uid ( string_arg ) ) {
2002-03-01 04:13:42 +03:00
d_printf ( " Could not convert sid %s to uid \n " ,
2001-12-11 08:18:36 +03:00
string_arg ) ;
2002-04-04 10:40:17 +04:00
goto done ;
2000-07-05 15:24:26 +04:00
}
break ;
case ' Y ' :
2001-12-11 08:18:36 +03:00
if ( ! wbinfo_sid_to_gid ( string_arg ) ) {
2002-03-01 04:13:42 +03:00
d_printf ( " Could not convert sid %s to gid \n " ,
2001-12-11 08:18:36 +03:00
string_arg ) ;
2002-04-04 10:40:17 +04:00
goto done ;
2000-07-05 15:24:26 +04:00
}
break ;
case ' t ' :
if ( ! wbinfo_check_secret ( ) ) {
2002-03-01 04:13:42 +03:00
d_printf ( " Could not check secret \n " ) ;
2002-04-04 10:40:17 +04:00
goto done ;
2000-07-05 15:24:26 +04:00
}
break ;
case ' m ' :
if ( ! wbinfo_list_domains ( ) ) {
2002-03-01 04:13:42 +03:00
d_printf ( " Could not list trusted domains \n " ) ;
2002-04-04 10:40:17 +04:00
goto done ;
2000-07-05 15:24:26 +04:00
}
break ;
2002-01-31 14:49:29 +03:00
case OPT_SEQUENCE :
if ( ! wbinfo_show_sequence ( ) ) {
2002-03-01 04:13:42 +03:00
d_printf ( " Could not show sequence numbers \n " ) ;
2002-04-04 10:40:17 +04:00
goto done ;
2002-01-31 14:49:29 +03:00
}
break ;
2000-10-11 09:25:32 +04:00
case ' r ' :
2001-12-11 08:18:36 +03:00
if ( ! wbinfo_get_usergroups ( string_arg ) ) {
2002-03-01 04:13:42 +03:00
d_printf ( " Could not get groups for user %s \n " ,
2001-12-11 08:18:36 +03:00
string_arg ) ;
2002-04-04 10:40:17 +04:00
goto done ;
2000-10-11 09:25:32 +04:00
}
break ;
2001-08-22 06:48:16 +04:00
case ' a ' : {
BOOL got_error = False ;
2001-12-11 08:18:36 +03:00
if ( ! wbinfo_auth ( string_arg ) ) {
2002-03-01 04:13:42 +03:00
d_printf ( " Could not authenticate user %s with "
2001-12-11 08:18:36 +03:00
" plaintext password \n " , string_arg ) ;
2001-08-22 06:48:16 +04:00
got_error = True ;
}
2001-12-11 08:18:36 +03:00
if ( ! wbinfo_auth_crap ( string_arg ) ) {
2002-03-01 04:13:42 +03:00
d_printf ( " Could not authenticate user %s with "
2001-12-11 08:18:36 +03:00
" challenge/response \n " , string_arg ) ;
2001-08-22 06:48:16 +04:00
got_error = True ;
}
2001-12-11 08:18:36 +03:00
2001-08-22 06:48:16 +04:00
if ( got_error )
2002-04-04 10:40:17 +04:00
goto done ;
2001-08-22 06:48:16 +04:00
break ;
2001-12-11 08:18:36 +03:00
}
2002-01-10 13:23:54 +03:00
case ' p ' : {
if ( ! wbinfo_ping ( ) ) {
2002-03-01 04:13:42 +03:00
d_printf ( " could not ping winbindd! \n " ) ;
2002-04-04 10:40:17 +04:00
goto done ;
2002-01-10 13:23:54 +03:00
}
break ;
}
2001-12-11 08:18:36 +03:00
case OPT_SET_AUTH_USER :
2002-04-04 10:40:17 +04:00
if ( ! ( wbinfo_set_auth_user ( string_arg ) ) )
goto done ;
2001-12-11 08:18:36 +03:00
break ;
2000-07-05 15:24:26 +04:00
default :
2002-03-01 04:13:42 +03:00
d_fprintf ( stderr , " Invalid option \n " ) ;
2001-12-19 11:44:23 +03:00
usage ( ) ;
2002-04-04 10:40:17 +04:00
goto done ;
2000-07-05 15:24:26 +04:00
}
}
2001-12-11 08:18:36 +03:00
2002-04-04 10:40:17 +04:00
result = 0 ;
/* Exit code */
2000-07-05 15:24:26 +04:00
2002-04-04 10:40:17 +04:00
done :
poptFreeContext ( pc ) ;
return result ;
2000-07-05 15:24:26 +04:00
}