1
0
mirror of https://github.com/samba-team/samba.git synced 2025-01-19 10:03:58 +03:00
Andrew Tridgell cc32fc2af0 silly me.
perms on lock dir should be 755 not 644.
(This used to be commit 930a4292e95947d20696b7ce08bbb936442fe327)
1998-08-21 07:25:57 +00:00

149 lines
3.7 KiB
C

/*
Unix SMB/Netbios implementation.
Version 1.9.
Test validity of smb.conf
Copyright (C) Karl Auer 1993, 1994-1998
Extensively modified by Andrew Tridgell, 1995
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
*/
/*
* Testbed for loadparm.c/params.c
*
* This module simply loads a specified configuration file and
* if successful, dumps it's contents to stdout. Note that the
* operation is performed with DEBUGLEVEL at 3.
*
* Useful for a quick 'syntax check' of a configuration file.
*
*/
#include "includes.h"
#include "smb.h"
/* these live in util.c */
extern FILE *dbf;
extern int DEBUGLEVEL;
extern pstring myhostname;
/***********************************************
Here we do a set of 'hard coded' checks for bad
configuration settings.
************************************************/
void do_global_checks(void)
{
struct stat st;
if (lp_security() > SEC_SHARE && lp_revalidate(-1)) {
printf("WARNING: the 'revalidate' parameter is ignored in all but \
'security=share' mode.\n");
}
if (lp_wins_support() && *lp_wins_server()) {
printf("ERROR: both 'wins support = true' and 'wins server = <server>' \
cannot be set in the smb.conf file. nmbd will abort with this setting.\n");
}
if (!directory_exist(lp_lockdir(), &st)) {
printf("ERROR: lock directory %s does not exist\n",
lp_lockdir());
} else if ((st.st_mode & 0777) != 0755) {
printf("WARNING: lock directory %s should have permissions 0644 for browsing to work\n",
lp_lockdir());
}
}
int main(int argc, char *argv[])
{
pstring configfile;
int s;
TimeInit();
setup_logging(argv[0],True);
charset_initialise();
if (argc < 2)
pstrcpy(configfile,CONFIGFILE);
else
pstrcpy(configfile,argv[1]);
dbf = stdout;
DEBUGLEVEL = 2;
printf("Load smb config files from %s\n",configfile);
if(!get_myname(myhostname,NULL))
{
printf("Failed to get my hostname.\n");
return(1);
}
if (!lp_load(configfile,False,True,False))
{
printf("Error loading services.\n");
return(1);
}
printf("Loaded services file OK.\n");
do_global_checks();
for (s=0;s<1000;s++)
if (VALID_SNUM(s))
if (strlen(lp_servicename(s)) > 8) {
printf("WARNING: You have some share names that are longer than 8 chars\n");
printf("These may give errors while browsing or may not be accessible\nto some older clients\n");
break;
}
if (argc < 4)
{
printf("Press enter to see a dump of your service definitions\n");
fflush(stdout);
getc(stdin);
lp_dump(stdout,True);
}
if (argc == 4)
{
char *cname = argv[2];
char *caddr = argv[3];
/* this is totally ugly, a real `quick' hack */
for (s=0;s<1000;s++)
if (VALID_SNUM(s))
{
if (allow_access(lp_hostsdeny(s),lp_hostsallow(s),cname,caddr))
{
printf("Allow connection from %s (%s) to %s\n",
cname,caddr,lp_servicename(s));
}
else
{
printf("Deny connection from %s (%s) to %s\n",
cname,caddr,lp_servicename(s));
}
}
}
return(0);
}