1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-28 07:21:54 +03:00
samba-mirror/source/utils/testparm.c
Herb Lewis 85fbd40102 update testparm with -s option so it doesn't require a carriage return
also allow specifying [host hostip] without [configfile]
updated man page
0001-01-01 00:00:00 +00:00

176 lines
4.3 KiB
C

/*
Unix SMB/Netbios implementation.
Version 1.9.
Test validity of smb.conf
Copyright (C) Karl Auer 1993, 1994-1998
Extensively modified by Andrew Tridgell, 1995
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
*/
/*
* Testbed for loadparm.c/params.c
*
* This module simply loads a specified configuration file and
* if successful, dumps it's contents to stdout. Note that the
* operation is performed with DEBUGLEVEL at 3.
*
* Useful for a quick 'syntax check' of a configuration file.
*
*/
#include "includes.h"
#include "smb.h"
/* these live in util.c */
extern FILE *dbf;
extern int DEBUGLEVEL;
extern pstring myhostname;
/***********************************************
Here we do a set of 'hard coded' checks for bad
configuration settings.
************************************************/
static void do_global_checks(void)
{
SMB_STRUCT_STAT st;
if (lp_security() > SEC_SHARE && lp_revalidate(-1)) {
printf("WARNING: the 'revalidate' parameter is ignored in all but \
'security=share' mode.\n");
}
if (lp_security() == SEC_DOMAIN && !lp_encrypted_passwords()) {
printf("ERROR: in 'security=domain' mode the 'encrypt passwords' parameter must also be set to 'true'.\n");
}
if (lp_wins_support() && *lp_wins_server()) {
printf("ERROR: both 'wins support = true' and 'wins server = <server>' \
cannot be set in the smb.conf file. nmbd will abort with this setting.\n");
}
if (!directory_exist(lp_lockdir(), &st)) {
printf("ERROR: lock directory %s does not exist\n",
lp_lockdir());
} else if ((st.st_mode & 0777) != 0755) {
printf("WARNING: lock directory %s should have permissions 0755 for browsing to work\n",
lp_lockdir());
}
}
int main(int argc, char *argv[])
{
extern char *optarg;
extern int optind;
pstring configfile;
int opt;
int s;
BOOL silent_mode = False;
TimeInit();
setup_logging(argv[0],True);
charset_initialise();
while ((opt = getopt(argc, argv,"s")) != EOF) {
switch (opt) {
case 's':
silent_mode = True;
break;
}
}
argc += (1 - optind);
if ((argc == 1) || (argc == 3))
pstrcpy(configfile,CONFIGFILE);
else if ((argc == 2) || (argc == 4))
pstrcpy(configfile,argv[optind]);
dbf = stdout;
DEBUGLEVEL = 2;
printf("Load smb config files from %s\n",configfile);
if(!get_myname(myhostname,NULL))
{
printf("Failed to get my hostname.\n");
return(1);
}
if (!lp_load(configfile,False,True,False))
{
printf("Error loading services.\n");
return(1);
}
printf("Loaded services file OK.\n");
do_global_checks();
for (s=0;s<1000;s++)
if (VALID_SNUM(s))
if (strlen(lp_servicename(s)) > 8) {
printf("WARNING: You have some share names that are longer than 8 chars\n");
printf("These may give errors while browsing or may not be accessible\nto some older clients\n");
break;
}
if (argc < 3)
{
if (!silent_mode) {
printf("Press enter to see a dump of your service definitions\n");
fflush(stdout);
getc(stdin);
}
lp_dump(stdout,True);
}
if (argc >= 3)
{
char *cname;
char *caddr;
if (argc == 3) {
cname = argv[optind];
caddr = argv[optind+1];
} else if (argc == 4) {
cname = argv[optind+1];
caddr = argv[optind+2];
}
/* this is totally ugly, a real `quick' hack */
for (s=0;s<1000;s++)
if (VALID_SNUM(s))
{
if (allow_access(lp_hostsdeny(s),lp_hostsallow(s),cname,caddr))
{
printf("Allow connection from %s (%s) to %s\n",
cname,caddr,lp_servicename(s));
}
else
{
printf("Deny connection from %s (%s) to %s\n",
cname,caddr,lp_servicename(s));
}
}
}
return(0);
}