mirror of
https://github.com/samba-team/samba.git
synced 2024-12-25 23:21:54 +03:00
1c38391c70
This implements some kind of improved AFS support for Samba on Linux with
OpenAFS 1.2.10. ./configure --with-fake-kaserver assumes that you have
OpenAFS on your machine. To use this, you have to put the AFS server's KeyFile
into secrets.tdb with 'net afskey'. If this is done, on each tree connect
smbd creates a Kerberos V4 ticket suitable for use by the AFS client and
gives it to the kernel via the AFS syscall. This is meant to be very
light-weight, so I did not link in a whole lot of libraries to be more
platform-independent using the ka_SetToken function call.
Volker
(This used to be commit 5775690ee8
)
761 lines
19 KiB
C
761 lines
19 KiB
C
/*
|
|
Samba Unix/Linux SMB client library
|
|
Distributed SMB/CIFS Server Management Utility
|
|
Copyright (C) 2001 Steve French (sfrench@us.ibm.com)
|
|
Copyright (C) 2001 Jim McDonough (jmcd@us.ibm.com)
|
|
Copyright (C) 2001 Andrew Tridgell (tridge@samba.org)
|
|
Copyright (C) 2001 Andrew Bartlett (abartlet@samba.org)
|
|
|
|
Originally written by Steve and Jim. Largely rewritten by tridge in
|
|
November 2001.
|
|
|
|
Reworked again by abartlet in December 2001
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 2 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */
|
|
|
|
/*****************************************************/
|
|
/* */
|
|
/* Distributed SMB/CIFS Server Management Utility */
|
|
/* */
|
|
/* The intent was to make the syntax similar */
|
|
/* to the NET utility (first developed in DOS */
|
|
/* with additional interesting & useful functions */
|
|
/* added in later SMB server network operating */
|
|
/* systems). */
|
|
/* */
|
|
/*****************************************************/
|
|
|
|
#include "includes.h"
|
|
#include "../utils/net.h"
|
|
|
|
/***********************************************************************/
|
|
/* Beginning of internationalization section. Translatable constants */
|
|
/* should be kept in this area and referenced in the rest of the code. */
|
|
/* */
|
|
/* No functions, outside of Samba or LSB (Linux Standards Base) should */
|
|
/* be used (if possible). */
|
|
/***********************************************************************/
|
|
|
|
#define YES_STRING "Yes"
|
|
#define NO_STRING "No"
|
|
|
|
/************************************************************************************/
|
|
/* end of internationalization section */
|
|
/************************************************************************************/
|
|
|
|
/* Yes, these buggers are globals.... */
|
|
const char *opt_requester_name = NULL;
|
|
const char *opt_host = NULL;
|
|
const char *opt_password = NULL;
|
|
const char *opt_user_name = NULL;
|
|
BOOL opt_user_specified = False;
|
|
const char *opt_workgroup = NULL;
|
|
int opt_long_list_entries = 0;
|
|
int opt_reboot = 0;
|
|
int opt_force = 0;
|
|
int opt_port = 0;
|
|
int opt_maxusers = -1;
|
|
const char *opt_comment = "";
|
|
const char *opt_container = "cn=Users";
|
|
int opt_flags = -1;
|
|
int opt_timeout = 0;
|
|
const char *opt_target_workgroup = NULL;
|
|
static int opt_machine_pass = 0;
|
|
|
|
BOOL opt_have_ip = False;
|
|
struct in_addr opt_dest_ip;
|
|
|
|
extern BOOL AllowDebugChange;
|
|
|
|
uint32 get_sec_channel_type(const char *param)
|
|
{
|
|
if (!(param && *param)) {
|
|
return get_default_sec_channel();
|
|
} else {
|
|
if (strcasecmp(param, "PDC")==0) {
|
|
return SEC_CHAN_BDC;
|
|
} else if (strcasecmp(param, "BDC")==0) {
|
|
return SEC_CHAN_BDC;
|
|
} else if (strcasecmp(param, "MEMBER")==0) {
|
|
return SEC_CHAN_WKSTA;
|
|
#if 0
|
|
} else if (strcasecmp(param, "DOMAIN")==0) {
|
|
return SEC_CHAN_DOMAIN;
|
|
#endif
|
|
} else {
|
|
return get_default_sec_channel();
|
|
}
|
|
}
|
|
}
|
|
|
|
/*
|
|
run a function from a function table. If not found then
|
|
call the specified usage function
|
|
*/
|
|
int net_run_function(int argc, const char **argv, struct functable *table,
|
|
int (*usage_fn)(int argc, const char **argv))
|
|
{
|
|
int i;
|
|
|
|
if (argc < 1) {
|
|
d_printf("\nUsage: \n");
|
|
return usage_fn(argc, argv);
|
|
}
|
|
for (i=0; table[i].funcname; i++) {
|
|
if (StrCaseCmp(argv[0], table[i].funcname) == 0)
|
|
return table[i].fn(argc-1, argv+1);
|
|
}
|
|
d_printf("No command: %s\n", argv[0]);
|
|
return usage_fn(argc, argv);
|
|
}
|
|
|
|
|
|
/****************************************************************************
|
|
connect to \\server\ipc$
|
|
****************************************************************************/
|
|
NTSTATUS connect_to_ipc(struct cli_state **c, struct in_addr *server_ip,
|
|
const char *server_name)
|
|
{
|
|
NTSTATUS nt_status;
|
|
|
|
if (!opt_password) {
|
|
char *pass = getpass("Password:");
|
|
if (pass) {
|
|
opt_password = strdup(pass);
|
|
}
|
|
}
|
|
|
|
nt_status = cli_full_connection(c, opt_requester_name, server_name,
|
|
server_ip, opt_port,
|
|
"IPC$", "IPC",
|
|
opt_user_name, opt_workgroup,
|
|
opt_password, 0, Undefined, NULL);
|
|
|
|
if (NT_STATUS_IS_OK(nt_status)) {
|
|
return nt_status;
|
|
} else {
|
|
DEBUG(1,("Cannot connect to server. Error was %s\n",
|
|
nt_errstr(nt_status)));
|
|
|
|
/* Display a nicer message depending on the result */
|
|
|
|
if (NT_STATUS_V(nt_status) ==
|
|
NT_STATUS_V(NT_STATUS_LOGON_FAILURE))
|
|
d_printf("The username or password was not correct.\n");
|
|
|
|
return nt_status;
|
|
}
|
|
}
|
|
|
|
/****************************************************************************
|
|
connect to \\server\ipc$ anonymously
|
|
****************************************************************************/
|
|
NTSTATUS connect_to_ipc_anonymous(struct cli_state **c,
|
|
struct in_addr *server_ip, const char *server_name)
|
|
{
|
|
NTSTATUS nt_status;
|
|
|
|
nt_status = cli_full_connection(c, opt_requester_name, server_name,
|
|
server_ip, opt_port,
|
|
"IPC$", "IPC",
|
|
"", "",
|
|
"", 0, Undefined, NULL);
|
|
|
|
if (NT_STATUS_IS_OK(nt_status)) {
|
|
return nt_status;
|
|
} else {
|
|
DEBUG(1,("Cannot connect to server (anonymously). Error was %s\n", nt_errstr(nt_status)));
|
|
return nt_status;
|
|
}
|
|
}
|
|
|
|
/****************************************************************************
|
|
Use the local machine's password for this session
|
|
****************************************************************************/
|
|
int net_use_machine_password(void)
|
|
{
|
|
char *user_name = NULL;
|
|
|
|
if (!secrets_init()) {
|
|
d_printf("ERROR: Unable to open secrets database\n");
|
|
exit(1);
|
|
}
|
|
|
|
user_name = NULL;
|
|
opt_password = secrets_fetch_machine_password(opt_target_workgroup, NULL, NULL);
|
|
if (asprintf(&user_name, "%s$@%s", global_myname(), lp_realm()) == -1) {
|
|
return -1;
|
|
}
|
|
opt_user_name = user_name;
|
|
return 0;
|
|
}
|
|
|
|
BOOL net_find_server(unsigned flags, struct in_addr *server_ip, char **server_name)
|
|
{
|
|
|
|
if (opt_host) {
|
|
*server_name = strdup(opt_host);
|
|
}
|
|
|
|
if (opt_have_ip) {
|
|
*server_ip = opt_dest_ip;
|
|
if (!*server_name) {
|
|
*server_name = strdup(inet_ntoa(opt_dest_ip));
|
|
}
|
|
} else if (*server_name) {
|
|
/* resolve the IP address */
|
|
if (!resolve_name(*server_name, server_ip, 0x20)) {
|
|
DEBUG(1,("Unable to resolve server name\n"));
|
|
return False;
|
|
}
|
|
} else if (flags & NET_FLAGS_PDC) {
|
|
struct in_addr pdc_ip;
|
|
|
|
if (get_pdc_ip(opt_target_workgroup, &pdc_ip)) {
|
|
fstring dc_name;
|
|
|
|
if (is_zero_ip(pdc_ip))
|
|
return False;
|
|
|
|
if ( !name_status_find(opt_target_workgroup, 0x1b, 0x20, pdc_ip, dc_name) )
|
|
return False;
|
|
|
|
*server_name = strdup(dc_name);
|
|
*server_ip = pdc_ip;
|
|
}
|
|
|
|
} else if (flags & NET_FLAGS_DMB) {
|
|
struct in_addr msbrow_ip;
|
|
/* if (!resolve_name(MSBROWSE, &msbrow_ip, 1)) */
|
|
if (!resolve_name(opt_target_workgroup, &msbrow_ip, 0x1B)) {
|
|
DEBUG(1,("Unable to resolve domain browser via name lookup\n"));
|
|
return False;
|
|
} else {
|
|
*server_ip = msbrow_ip;
|
|
}
|
|
*server_name = strdup(inet_ntoa(opt_dest_ip));
|
|
} else if (flags & NET_FLAGS_MASTER) {
|
|
struct in_addr brow_ips;
|
|
if (!resolve_name(opt_target_workgroup, &brow_ips, 0x1D)) {
|
|
/* go looking for workgroups */
|
|
DEBUG(1,("Unable to resolve master browser via name lookup\n"));
|
|
return False;
|
|
} else {
|
|
*server_ip = brow_ips;
|
|
}
|
|
*server_name = strdup(inet_ntoa(opt_dest_ip));
|
|
} else if (!(flags & NET_FLAGS_LOCALHOST_DEFAULT_INSANE)) {
|
|
extern struct in_addr loopback_ip;
|
|
*server_ip = loopback_ip;
|
|
*server_name = strdup("127.0.0.1");
|
|
}
|
|
|
|
if (!server_name || !*server_name) {
|
|
DEBUG(1,("no server to connect to\n"));
|
|
return False;
|
|
}
|
|
|
|
return True;
|
|
}
|
|
|
|
|
|
BOOL net_find_pdc(struct in_addr *server_ip, fstring server_name, const char *domain_name)
|
|
{
|
|
if (get_pdc_ip(domain_name, server_ip)) {
|
|
if (is_zero_ip(*server_ip))
|
|
return False;
|
|
|
|
if (!name_status_find(domain_name, 0x1b, 0x20, *server_ip, server_name))
|
|
return False;
|
|
|
|
return True;
|
|
}
|
|
else
|
|
return False;
|
|
}
|
|
|
|
|
|
struct cli_state *net_make_ipc_connection(unsigned flags)
|
|
{
|
|
char *server_name = NULL;
|
|
struct in_addr server_ip;
|
|
struct cli_state *cli = NULL;
|
|
NTSTATUS nt_status;
|
|
|
|
if (!net_find_server(flags, &server_ip, &server_name)) {
|
|
d_printf("\nUnable to find a suitable server\n");
|
|
return NULL;
|
|
}
|
|
|
|
if (flags & NET_FLAGS_ANONYMOUS) {
|
|
nt_status = connect_to_ipc_anonymous(&cli, &server_ip, server_name);
|
|
} else {
|
|
nt_status = connect_to_ipc(&cli, &server_ip, server_name);
|
|
}
|
|
|
|
SAFE_FREE(server_name);
|
|
if (NT_STATUS_IS_OK(nt_status)) {
|
|
return cli;
|
|
} else {
|
|
return NULL;
|
|
}
|
|
}
|
|
|
|
static int net_user(int argc, const char **argv)
|
|
{
|
|
if (net_ads_check() == 0)
|
|
return net_ads_user(argc, argv);
|
|
|
|
/* if server is not specified, default to PDC? */
|
|
if (net_rpc_check(NET_FLAGS_PDC))
|
|
return net_rpc_user(argc, argv);
|
|
|
|
return net_rap_user(argc, argv);
|
|
}
|
|
|
|
static int net_group(int argc, const char **argv)
|
|
{
|
|
if (net_ads_check() == 0)
|
|
return net_ads_group(argc, argv);
|
|
|
|
if (argc == 0 && net_rpc_check(NET_FLAGS_PDC))
|
|
return net_rpc_group(argc, argv);
|
|
|
|
return net_rap_group(argc, argv);
|
|
}
|
|
|
|
static int net_join(int argc, const char **argv)
|
|
{
|
|
if (net_ads_check() == 0) {
|
|
if (net_ads_join(argc, argv) == 0)
|
|
return 0;
|
|
else
|
|
d_printf("ADS join did not work, falling back to RPC...\n");
|
|
}
|
|
return net_rpc_join(argc, argv);
|
|
}
|
|
|
|
static int net_changetrustpw(int argc, const char **argv)
|
|
{
|
|
if (net_ads_check() == 0)
|
|
return net_ads_changetrustpw(argc, argv);
|
|
|
|
return net_rpc_changetrustpw(argc, argv);
|
|
}
|
|
|
|
static int net_changesecretpw(int argc, const char **argv)
|
|
{
|
|
char *trust_pw;
|
|
uint32 sec_channel_type = SEC_CHAN_WKSTA;
|
|
|
|
if(opt_force) {
|
|
trust_pw = getpass("Enter machine password: ");
|
|
|
|
if (!secrets_store_machine_password(trust_pw, lp_workgroup(), sec_channel_type)) {
|
|
d_printf("Unable to write the machine account password in the secrets database");
|
|
return 1;
|
|
}
|
|
else {
|
|
d_printf("Modified trust account password in secrets database\n");
|
|
}
|
|
}
|
|
else {
|
|
d_printf("Machine account password change requires the -f flag.\n");
|
|
d_printf("Do NOT use this function unless you know what it does!\n");
|
|
d_printf("This function will change the ADS Domain member machine account password in the secrets.tdb file!\n");
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int net_share(int argc, const char **argv)
|
|
{
|
|
if (net_rpc_check(0))
|
|
return net_rpc_share(argc, argv);
|
|
return net_rap_share(argc, argv);
|
|
}
|
|
|
|
static int net_file(int argc, const char **argv)
|
|
{
|
|
if (net_rpc_check(0))
|
|
return net_rpc_file(argc, argv);
|
|
return net_rap_file(argc, argv);
|
|
}
|
|
|
|
/*
|
|
Retrieve our local SID or the SID for the specified name
|
|
*/
|
|
static int net_getlocalsid(int argc, const char **argv)
|
|
{
|
|
DOM_SID sid;
|
|
const char *name;
|
|
fstring sid_str;
|
|
|
|
if (argc >= 1) {
|
|
name = argv[0];
|
|
}
|
|
else {
|
|
name = global_myname();
|
|
}
|
|
|
|
if (!secrets_fetch_domain_sid(name, &sid)) {
|
|
DEBUG(0, ("Can't fetch domain SID for name: %s\n", name));
|
|
return 1;
|
|
}
|
|
sid_to_string(sid_str, &sid);
|
|
d_printf("SID for domain %s is: %s\n", name, sid_str);
|
|
return 0;
|
|
}
|
|
|
|
static int net_setlocalsid(int argc, const char **argv)
|
|
{
|
|
DOM_SID sid;
|
|
|
|
if ( (argc != 1)
|
|
|| (strncmp(argv[0], "S-1-5-21-", strlen("S-1-5-21-")) != 0)
|
|
|| (!string_to_sid(&sid, argv[0]))
|
|
|| (sid.num_auths != 4)) {
|
|
d_printf("usage: net setlocalsid S-1-5-21-x-y-z\n");
|
|
return 1;
|
|
}
|
|
|
|
if (!secrets_store_domain_sid(global_myname(), &sid)) {
|
|
DEBUG(0,("Can't store domain SID as a pdc/bdc.\n"));
|
|
return 1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int net_getdomainsid(int argc, const char **argv)
|
|
{
|
|
DOM_SID domain_sid;
|
|
fstring sid_str;
|
|
|
|
if (!secrets_fetch_domain_sid(global_myname(), &domain_sid)) {
|
|
d_printf("Could not fetch local SID\n");
|
|
return 1;
|
|
}
|
|
sid_to_string(sid_str, &domain_sid);
|
|
d_printf("SID for domain %s is: %s\n", global_myname(), sid_str);
|
|
|
|
if (!secrets_fetch_domain_sid(opt_workgroup, &domain_sid)) {
|
|
d_printf("Could not fetch domain SID\n");
|
|
return 1;
|
|
}
|
|
|
|
sid_to_string(sid_str, &domain_sid);
|
|
d_printf("SID for domain %s is: %s\n", opt_workgroup, sid_str);
|
|
|
|
return 0;
|
|
}
|
|
|
|
#ifdef WITH_FAKE_KASERVER
|
|
|
|
int net_afskey_usage(int argc, const char **argv)
|
|
{
|
|
d_printf(" net afskey filename\n"
|
|
"\tImports a OpenAFS KeyFile into our secrets.tdb\n\n");
|
|
return -1;
|
|
}
|
|
|
|
static int net_afskey(int argc, const char **argv)
|
|
{
|
|
int fd;
|
|
struct afs_keyfile keyfile;
|
|
|
|
if (argc != 1) {
|
|
d_printf("usage: 'net afskey <keyfile>'\n");
|
|
return -1;
|
|
}
|
|
|
|
if (!secrets_init()) {
|
|
d_printf("Could not open secrets.tdb\n");
|
|
return -1;
|
|
}
|
|
|
|
if ((fd = open(argv[0], O_RDONLY, 0)) < 0) {
|
|
d_printf("Could not open %s\n", argv[0]);
|
|
return -1;
|
|
}
|
|
|
|
if (read(fd, &keyfile, sizeof(keyfile)) != sizeof(keyfile)) {
|
|
d_printf("Could not read keyfile\n");
|
|
return -1;
|
|
}
|
|
|
|
if (!secrets_store_afs_keyfile(afs_cell(), &keyfile)) {
|
|
d_printf("Could not write keyfile to secrets.tdb\n");
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
#endif /* WITH_FAKE_KASERVER */
|
|
|
|
static uint32 get_maxrid(void)
|
|
{
|
|
SAM_ACCOUNT *pwd = NULL;
|
|
uint32 max_rid = 0;
|
|
GROUP_MAP *map = NULL;
|
|
int num_entries = 0;
|
|
int i;
|
|
|
|
if (!pdb_setsampwent(False)) {
|
|
DEBUG(0, ("load_sampwd_entries: Unable to open passdb.\n"));
|
|
return 0;
|
|
}
|
|
|
|
for (; (NT_STATUS_IS_OK(pdb_init_sam(&pwd)))
|
|
&& pdb_getsampwent(pwd) == True; pwd=NULL) {
|
|
uint32 rid;
|
|
|
|
if (!sid_peek_rid(pdb_get_user_sid(pwd), &rid)) {
|
|
DEBUG(0, ("can't get RID for user '%s'\n",
|
|
pdb_get_username(pwd)));
|
|
pdb_free_sam(&pwd);
|
|
continue;
|
|
}
|
|
|
|
if (rid > max_rid)
|
|
max_rid = rid;
|
|
|
|
DEBUG(1,("%d is user '%s'\n", rid, pdb_get_username(pwd)));
|
|
pdb_free_sam(&pwd);
|
|
}
|
|
|
|
pdb_endsampwent();
|
|
pdb_free_sam(&pwd);
|
|
|
|
if (!pdb_enum_group_mapping(SID_NAME_UNKNOWN, &map, &num_entries,
|
|
ENUM_ONLY_MAPPED))
|
|
return max_rid;
|
|
|
|
for (i = 0; i < num_entries; i++) {
|
|
uint32 rid;
|
|
|
|
if (!sid_peek_check_rid(get_global_sam_sid(), &map[i].sid,
|
|
&rid)) {
|
|
DEBUG(3, ("skipping map for group '%s', SID %s\n",
|
|
map[i].nt_name,
|
|
sid_string_static(&map[i].sid)));
|
|
continue;
|
|
}
|
|
DEBUG(1,("%d is group '%s'\n", rid, map[i].nt_name));
|
|
|
|
if (rid > max_rid)
|
|
max_rid = rid;
|
|
}
|
|
|
|
SAFE_FREE(map);
|
|
|
|
return max_rid;
|
|
}
|
|
|
|
static int net_maxrid(int argc, const char **argv)
|
|
{
|
|
uint32 rid;
|
|
|
|
if (argc != 0) {
|
|
DEBUG(0, ("usage: net maxrid\n"));
|
|
return 1;
|
|
}
|
|
|
|
if ((rid = get_maxrid()) == 0) {
|
|
DEBUG(0, ("can't get current maximum rid\n"));
|
|
return 1;
|
|
}
|
|
|
|
d_printf("Currently used maximum rid: %d\n", rid);
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* main function table */
|
|
static struct functable net_func[] = {
|
|
{"RPC", net_rpc},
|
|
{"RAP", net_rap},
|
|
{"ADS", net_ads},
|
|
|
|
/* eventually these should auto-choose the transport ... */
|
|
{"FILE", net_file},
|
|
{"SHARE", net_share},
|
|
{"SESSION", net_rap_session},
|
|
{"SERVER", net_rap_server},
|
|
{"DOMAIN", net_rap_domain},
|
|
{"PRINTQ", net_rap_printq},
|
|
{"USER", net_user},
|
|
{"GROUP", net_group},
|
|
{"GROUPMAP", net_groupmap},
|
|
{"VALIDATE", net_rap_validate},
|
|
{"GROUPMEMBER", net_rap_groupmember},
|
|
{"ADMIN", net_rap_admin},
|
|
{"SERVICE", net_rap_service},
|
|
{"PASSWORD", net_rap_password},
|
|
{"CHANGETRUSTPW", net_changetrustpw},
|
|
{"CHANGESECRETPW", net_changesecretpw},
|
|
{"TIME", net_time},
|
|
{"LOOKUP", net_lookup},
|
|
{"JOIN", net_join},
|
|
{"CACHE", net_cache},
|
|
{"GETLOCALSID", net_getlocalsid},
|
|
{"SETLOCALSID", net_setlocalsid},
|
|
{"GETDOMAINSID", net_getdomainsid},
|
|
{"MAXRID", net_maxrid},
|
|
{"IDMAP", net_idmap},
|
|
#ifdef WITH_FAKE_KASERVER
|
|
{"AFSKEY", net_afskey},
|
|
#endif
|
|
|
|
{"HELP", net_help},
|
|
{NULL, NULL}
|
|
};
|
|
|
|
|
|
/****************************************************************************
|
|
main program
|
|
****************************************************************************/
|
|
int main(int argc, const char **argv)
|
|
{
|
|
int opt,i;
|
|
char *p;
|
|
int rc = 0;
|
|
int argc_new = 0;
|
|
const char ** argv_new;
|
|
poptContext pc;
|
|
|
|
struct poptOption long_options[] = {
|
|
{"help", 'h', POPT_ARG_NONE, 0, 'h'},
|
|
{"workgroup", 'w', POPT_ARG_STRING, &opt_target_workgroup},
|
|
{"user", 'U', POPT_ARG_STRING, &opt_user_name, 'U'},
|
|
{"ipaddress", 'I', POPT_ARG_STRING, 0,'I'},
|
|
{"port", 'p', POPT_ARG_INT, &opt_port},
|
|
{"myname", 'n', POPT_ARG_STRING, &opt_requester_name},
|
|
{"server", 'S', POPT_ARG_STRING, &opt_host},
|
|
{"container", 'c', POPT_ARG_STRING, &opt_container},
|
|
{"comment", 'C', POPT_ARG_STRING, &opt_comment},
|
|
{"maxusers", 'M', POPT_ARG_INT, &opt_maxusers},
|
|
{"flags", 'F', POPT_ARG_INT, &opt_flags},
|
|
{"long", 'l', POPT_ARG_NONE, &opt_long_list_entries},
|
|
{"reboot", 'r', POPT_ARG_NONE, &opt_reboot},
|
|
{"force", 'f', POPT_ARG_NONE, &opt_force},
|
|
{"timeout", 't', POPT_ARG_INT, &opt_timeout},
|
|
{"machine-pass",'P', POPT_ARG_NONE, &opt_machine_pass},
|
|
{"myworkgroup", 'W', POPT_ARG_STRING, &opt_workgroup},
|
|
POPT_COMMON_SAMBA
|
|
{ 0, 0, 0, 0}
|
|
};
|
|
|
|
zero_ip(&opt_dest_ip);
|
|
|
|
/* set default debug level to 0 regardless of what smb.conf sets */
|
|
DEBUGLEVEL_CLASS[DBGC_ALL] = 0;
|
|
dbf = x_stderr;
|
|
|
|
pc = poptGetContext(NULL, argc, (const char **) argv, long_options,
|
|
POPT_CONTEXT_KEEP_FIRST);
|
|
|
|
while((opt = poptGetNextOpt(pc)) != -1) {
|
|
switch (opt) {
|
|
case 'h':
|
|
net_help(argc, argv);
|
|
exit(0);
|
|
break;
|
|
case 'I':
|
|
opt_dest_ip = *interpret_addr2(poptGetOptArg(pc));
|
|
if (is_zero_ip(opt_dest_ip))
|
|
d_printf("\nInvalid ip address specified\n");
|
|
else
|
|
opt_have_ip = True;
|
|
break;
|
|
case 'U':
|
|
opt_user_specified = True;
|
|
opt_user_name = strdup(opt_user_name);
|
|
p = strchr(opt_user_name,'%');
|
|
if (p) {
|
|
*p = 0;
|
|
opt_password = p+1;
|
|
}
|
|
break;
|
|
default:
|
|
d_printf("\nInvalid option %s: %s\n",
|
|
poptBadOption(pc, 0), poptStrerror(opt));
|
|
net_help(argc, argv);
|
|
exit(1);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Don't load debug level from smb.conf. It should be
|
|
* set by cmdline arg or remain default (0)
|
|
*/
|
|
AllowDebugChange = False;
|
|
lp_load(dyn_CONFIGFILE,True,False,False);
|
|
|
|
argv_new = (const char **)poptGetArgs(pc);
|
|
|
|
argc_new = argc;
|
|
for (i=0; i<argc; i++) {
|
|
if (argv_new[i] == NULL) {
|
|
argc_new = i;
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (!opt_requester_name) {
|
|
static fstring myname;
|
|
get_myname(myname);
|
|
opt_requester_name = myname;
|
|
}
|
|
|
|
if (!opt_user_name && getenv("LOGNAME")) {
|
|
opt_user_name = getenv("LOGNAME");
|
|
}
|
|
|
|
if (!opt_workgroup) {
|
|
opt_workgroup = smb_xstrdup(lp_workgroup());
|
|
}
|
|
|
|
if (!opt_target_workgroup) {
|
|
opt_target_workgroup = smb_xstrdup(lp_workgroup());
|
|
}
|
|
|
|
if (!init_names())
|
|
exit(1);
|
|
|
|
load_interfaces();
|
|
|
|
/* this makes sure that when we do things like call scripts,
|
|
that it won't assert becouse we are not root */
|
|
sec_init();
|
|
|
|
if (opt_machine_pass) {
|
|
/* it is very useful to be able to make ads queries as the
|
|
machine account for testing purposes and for domain leave */
|
|
|
|
net_use_machine_password();
|
|
}
|
|
|
|
if (!opt_password) {
|
|
opt_password = getenv("PASSWD");
|
|
}
|
|
|
|
rc = net_run_function(argc_new-1, argv_new+1, net_func, net_help);
|
|
|
|
DEBUG(2,("return code = %d\n", rc));
|
|
return rc;
|
|
}
|