s4-netlogon: implement dcesrv_netr_DsRAddressToSitenamesExW
[Samba/aatanasov.git] / source3 / lib / substitute.c
blobc9dc1d2eb47e89434eaeaf2bfaad88ff05c3ce04
1 /*
2 Unix SMB/CIFS implementation.
3 string substitution functions
4 Copyright (C) Andrew Tridgell 1992-2000
5 Copyright (C) Gerald Carter 2006
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>.
22 #include "includes.h"
24 userdom_struct current_user_info;
25 fstring remote_proto="UNKNOWN";
27 /**
28 * Set the 'local' machine name
29 * @param local_name the name we are being called
30 * @param if this is the 'final' name for us, not be be changed again
33 static char *local_machine;
35 void free_local_machine_name(void)
37 SAFE_FREE(local_machine);
40 bool set_local_machine_name(const char *local_name, bool perm)
42 static bool already_perm = false;
43 char *tmp_local_machine = NULL;
44 char addr[INET6_ADDRSTRLEN];
45 size_t len;
47 tmp_local_machine = SMB_STRDUP(local_name);
48 if (!tmp_local_machine) {
49 return false;
51 trim_char(tmp_local_machine,' ',' ');
54 * Windows NT/2k uses "*SMBSERVER" and XP uses "*SMBSERV"
55 * arrggg!!!
58 if (strequal(tmp_local_machine, "*SMBSERVER") ||
59 strequal(tmp_local_machine, "*SMBSERV") ) {
60 SAFE_FREE(local_machine);
61 local_machine = SMB_STRDUP(client_socket_addr(get_client_fd(),
62 addr, sizeof(addr)) );
63 SAFE_FREE(tmp_local_machine);
64 return local_machine ? true : false;
67 if (already_perm) {
68 return true;
71 SAFE_FREE(local_machine);
72 len = strlen(tmp_local_machine);
73 local_machine = SMB_CALLOC_ARRAY(char, len+1);
74 if (!local_machine) {
75 SAFE_FREE(tmp_local_machine);
76 return false;
78 /* alpha_strcpy includes the space for the terminating nul. */
79 alpha_strcpy(local_machine,tmp_local_machine,
80 SAFE_NETBIOS_CHARS,len+1);
81 strlower_m(local_machine);
82 SAFE_FREE(tmp_local_machine);
84 already_perm = perm;
86 return true;
89 const char *get_local_machine_name(void)
91 if (!local_machine || !*local_machine) {
92 return global_myname();
95 return local_machine;
98 /**
99 * Set the 'remote' machine name
100 * @param remote_name the name our client wants to be called by
101 * @param if this is the 'final' name for them, not be be changed again
104 static char *remote_machine;
106 bool set_remote_machine_name(const char *remote_name, bool perm)
108 static bool already_perm = False;
109 char *tmp_remote_machine;
110 size_t len;
112 if (already_perm) {
113 return true;
116 tmp_remote_machine = SMB_STRDUP(remote_name);
117 if (!tmp_remote_machine) {
118 return false;
120 trim_char(tmp_remote_machine,' ',' ');
122 SAFE_FREE(remote_machine);
123 len = strlen(tmp_remote_machine);
124 remote_machine = SMB_CALLOC_ARRAY(char, len+1);
125 if (!remote_machine) {
126 SAFE_FREE(tmp_remote_machine);
127 return false;
130 /* alpha_strcpy includes the space for the terminating nul. */
131 alpha_strcpy(remote_machine,tmp_remote_machine,
132 SAFE_NETBIOS_CHARS,len+1);
133 strlower_m(remote_machine);
134 SAFE_FREE(tmp_remote_machine);
136 already_perm = perm;
138 return true;
141 const char *get_remote_machine_name(void)
143 return remote_machine ? remote_machine : "";
146 /*******************************************************************
147 Setup the string used by %U substitution.
148 ********************************************************************/
150 static char *smb_user_name;
152 void sub_set_smb_name(const char *name)
154 char *tmp;
155 size_t len;
156 bool is_machine_account = false;
158 /* don't let anonymous logins override the name */
159 if (!name || !*name) {
160 return;
163 tmp = SMB_STRDUP(name);
164 if (!tmp) {
165 return;
167 trim_char(tmp, ' ', ' ');
168 strlower_m(tmp);
170 len = strlen(tmp);
172 if (len == 0) {
173 SAFE_FREE(tmp);
174 return;
177 /* long story but here goes....we have to allow usernames
178 ending in '$' as they are valid machine account names.
179 So check for a machine account and re-add the '$'
180 at the end after the call to alpha_strcpy(). --jerry */
182 if (tmp[len-1] == '$') {
183 is_machine_account = True;
186 SAFE_FREE(smb_user_name);
187 smb_user_name = SMB_CALLOC_ARRAY(char, len+1);
188 if (!smb_user_name) {
189 SAFE_FREE(tmp);
190 return;
193 /* alpha_strcpy includes the space for the terminating nul. */
194 alpha_strcpy(smb_user_name, tmp,
195 SAFE_NETBIOS_CHARS,
196 len+1);
198 SAFE_FREE(tmp);
200 if (is_machine_account) {
201 len = strlen(smb_user_name);
202 smb_user_name[len-1] = '$';
206 static const char *get_smb_user_name(void)
208 return smb_user_name ? smb_user_name : "";
211 /*******************************************************************
212 Setup the strings used by substitutions. Called per packet. Ensure
213 %U name is set correctly also.
215 smb_name must be sanitized by alpha_strcpy
216 ********************************************************************/
218 void set_current_user_info(const char *smb_name, const char *unix_name,
219 const char *domain)
221 fstrcpy(current_user_info.smb_name, smb_name);
222 fstrcpy(current_user_info.unix_name, unix_name);
223 fstrcpy(current_user_info.domain, domain);
225 /* The following is safe as current_user_info.smb_name
226 * has already been sanitised in register_existing_vuid. */
228 sub_set_smb_name(current_user_info.smb_name);
231 /*******************************************************************
232 Return the current active user name.
233 *******************************************************************/
235 const char *get_current_username(void)
237 if (current_user_info.smb_name[0] == '\0' ) {
238 return get_smb_user_name();
241 return current_user_info.smb_name;
244 /*******************************************************************
245 Given a pointer to a %$(NAME) in p and the whole string in str
246 expand it as an environment variable.
247 Return a new allocated and expanded string.
248 Based on code by Branko Cibej <branko.cibej@hermes.si>
249 When this is called p points at the '%' character.
250 May substitute multiple occurrencies of the same env var.
251 ********************************************************************/
253 static char * realloc_expand_env_var(char *str, char *p)
255 char *envname;
256 char *envval;
257 char *q, *r;
258 int copylen;
260 if (p[0] != '%' || p[1] != '$' || p[2] != '(') {
261 return str;
265 * Look for the terminating ')'.
268 if ((q = strchr_m(p,')')) == NULL) {
269 DEBUG(0,("expand_env_var: Unterminated environment variable [%s]\n", p));
270 return str;
274 * Extract the name from within the %$(NAME) string.
277 r = p + 3;
278 copylen = q - r;
280 /* reserve space for use later add %$() chars */
281 if ( (envname = (char *)SMB_MALLOC(copylen + 1 + 4)) == NULL ) {
282 return NULL;
285 strncpy(envname,r,copylen);
286 envname[copylen] = '\0';
288 if ((envval = getenv(envname)) == NULL) {
289 DEBUG(0,("expand_env_var: Environment variable [%s] not set\n", envname));
290 SAFE_FREE(envname);
291 return str;
295 * Copy the full %$(NAME) into envname so it
296 * can be replaced.
299 copylen = q + 1 - p;
300 strncpy(envname,p,copylen);
301 envname[copylen] = '\0';
302 r = realloc_string_sub(str, envname, envval);
303 SAFE_FREE(envname);
305 return r;
308 /*******************************************************************
309 *******************************************************************/
311 static char *longvar_domainsid( void )
313 DOM_SID sid;
314 fstring tmp;
315 char *sid_string;
317 if ( !secrets_fetch_domain_sid( lp_workgroup(), &sid ) ) {
318 return NULL;
321 sid_string = SMB_STRDUP( sid_to_fstring( tmp, &sid ) );
323 if ( !sid_string ) {
324 DEBUG(0,("longvar_domainsid: failed to dup SID string!\n"));
327 return sid_string;
330 /*******************************************************************
331 *******************************************************************/
333 struct api_longvar {
334 const char *name;
335 char* (*fn)( void );
338 static struct api_longvar longvar_table[] = {
339 { "DomainSID", longvar_domainsid },
340 { NULL, NULL }
343 static char *get_longvar_val( const char *varname )
345 int i;
347 DEBUG(7,("get_longvar_val: expanding variable [%s]\n", varname));
349 for ( i=0; longvar_table[i].name; i++ ) {
350 if ( strequal( longvar_table[i].name, varname ) ) {
351 return longvar_table[i].fn();
355 return NULL;
358 /*******************************************************************
359 Expand the long smb.conf variable names given a pointer to a %(NAME).
360 Return the number of characters by which the pointer should be advanced.
361 When this is called p points at the '%' character.
362 ********************************************************************/
364 static char *realloc_expand_longvar(char *str, char *p)
366 fstring varname;
367 char *value;
368 char *q, *r;
369 int copylen;
371 if ( p[0] != '%' || p[1] != '(' ) {
372 return str;
375 /* Look for the terminating ')'.*/
377 if ((q = strchr_m(p,')')) == NULL) {
378 DEBUG(0,("realloc_expand_longvar: Unterminated environment variable [%s]\n", p));
379 return str;
382 /* Extract the name from within the %(NAME) string.*/
384 r = p+2;
385 copylen = MIN( (q-r), (sizeof(varname)-1) );
386 strncpy(varname, r, copylen);
387 varname[copylen] = '\0';
389 if ((value = get_longvar_val(varname)) == NULL) {
390 DEBUG(0,("realloc_expand_longvar: Variable [%s] not set. Skipping\n", varname));
391 return str;
394 /* Copy the full %(NAME) into envname so it can be replaced.*/
396 copylen = MIN( (q+1-p),(sizeof(varname)-1) );
397 strncpy( varname, p, copylen );
398 varname[copylen] = '\0';
399 r = realloc_string_sub(str, varname, value);
400 SAFE_FREE( value );
402 /* skip over the %(varname) */
404 return r;
407 /*******************************************************************
408 Patch from jkf@soton.ac.uk
409 Added this to implement %p (NIS auto-map version of %H)
410 *******************************************************************/
412 static const char *automount_path(const char *user_name)
414 TALLOC_CTX *ctx = talloc_tos();
415 const char *server_path;
417 /* use the passwd entry as the default */
418 /* this will be the default if WITH_AUTOMOUNT is not used or fails */
420 server_path = talloc_strdup(ctx, get_user_home_dir(ctx, user_name));
421 if (!server_path) {
422 return "";
425 #if (defined(HAVE_NETGROUP) && defined (WITH_AUTOMOUNT))
427 if (lp_nis_home_map()) {
428 const char *home_path_start;
429 char *automount_value = automount_lookup(ctx, user_name);
431 if(automount_value && strlen(automount_value) > 0) {
432 home_path_start = strchr_m(automount_value,':');
433 if (home_path_start != NULL) {
434 DEBUG(5, ("NIS lookup succeeded. "
435 "Home path is: %s\n",
436 home_path_start ?
437 (home_path_start+1):""));
438 server_path = talloc_strdup(ctx,
439 home_path_start+1);
440 if (!server_path) {
441 server_path = "";
444 } else {
445 /* NIS key lookup failed: default to
446 * user home directory from password file */
447 DEBUG(5, ("NIS lookup failed. Using Home path from "
448 "passwd file. Home path is: %s\n", server_path ));
451 #endif
453 DEBUG(4,("Home server path: %s\n", server_path));
454 return server_path;
457 /*******************************************************************
458 Patch from jkf@soton.ac.uk
459 This is Luke's original function with the NIS lookup code
460 moved out to a separate function.
461 *******************************************************************/
463 static const char *automount_server(const char *user_name)
465 TALLOC_CTX *ctx = talloc_tos();
466 const char *server_name;
467 const char *local_machine_name = get_local_machine_name();
469 /* use the local machine name as the default */
470 /* this will be the default if WITH_AUTOMOUNT is not used or fails */
471 if (local_machine_name && *local_machine_name) {
472 server_name = talloc_strdup(ctx, local_machine_name);
473 } else {
474 server_name = talloc_strdup(ctx, global_myname());
477 if (!server_name) {
478 return "";
481 #if (defined(HAVE_NETGROUP) && defined (WITH_AUTOMOUNT))
482 if (lp_nis_home_map()) {
483 char *p;
484 char *srv;
485 char *automount_value = automount_lookup(ctx, user_name);
486 if (!automount_value) {
487 return "";
489 srv = talloc_strdup(ctx, automount_value);
490 if (!srv) {
491 return "";
493 p = strchr_m(srv, ':');
494 if (!p) {
495 return "";
497 *p = '\0';
498 server_name = srv;
499 DEBUG(5, ("NIS lookup succeeded. Home server %s\n",
500 server_name));
502 #endif
504 DEBUG(4,("Home server: %s\n", server_name));
505 return server_name;
508 /****************************************************************************
509 Do some standard substitutions in a string.
510 len is the length in bytes of the space allowed in string str. If zero means
511 don't allow expansions.
512 ****************************************************************************/
514 void standard_sub_basic(const char *smb_name, const char *domain_name,
515 char *str, size_t len)
517 char *s;
519 if ( (s = alloc_sub_basic( smb_name, domain_name, str )) != NULL ) {
520 strncpy( str, s, len );
523 SAFE_FREE( s );
527 /****************************************************************************
528 Do some standard substitutions in a string.
529 This function will return an allocated string that have to be freed.
530 ****************************************************************************/
532 char *talloc_sub_basic(TALLOC_CTX *mem_ctx, const char *smb_name,
533 const char *domain_name, const char *str)
535 char *a, *t;
537 if ( (a = alloc_sub_basic(smb_name, domain_name, str)) == NULL ) {
538 return NULL;
540 t = talloc_strdup(mem_ctx, a);
541 SAFE_FREE(a);
542 return t;
545 /****************************************************************************
546 ****************************************************************************/
548 char *alloc_sub_basic(const char *smb_name, const char *domain_name,
549 const char *str)
551 char *b, *p, *s, *r, *a_string;
552 fstring pidstr, vnnstr;
553 char addr[INET6_ADDRSTRLEN];
554 const char *local_machine_name = get_local_machine_name();
555 TALLOC_CTX *tmp_ctx = NULL;
557 /* workaround to prevent a crash while looking at bug #687 */
559 if (!str) {
560 DEBUG(0,("alloc_sub_basic: NULL source string! This should not happen\n"));
561 return NULL;
564 a_string = SMB_STRDUP(str);
565 if (a_string == NULL) {
566 DEBUG(0, ("alloc_sub_basic: Out of memory!\n"));
567 return NULL;
570 tmp_ctx = talloc_stackframe();
572 for (b = s = a_string; (p = strchr_m(s, '%')); s = a_string + (p - b)) {
574 r = NULL;
575 b = a_string;
577 switch (*(p+1)) {
578 case 'U' :
579 r = strlower_talloc(tmp_ctx, smb_name);
580 if (r == NULL) {
581 goto error;
583 a_string = realloc_string_sub(a_string, "%U", r);
584 break;
585 case 'G' : {
586 struct passwd *pass;
587 r = talloc_strdup(tmp_ctx, smb_name);
588 if (r == NULL) {
589 goto error;
591 pass = Get_Pwnam_alloc(tmp_ctx, r);
592 if (pass != NULL) {
593 a_string = realloc_string_sub(
594 a_string, "%G",
595 gidtoname(pass->pw_gid));
597 TALLOC_FREE(pass);
598 break;
600 case 'D' :
601 r = strupper_talloc(tmp_ctx, domain_name);
602 if (r == NULL) {
603 goto error;
605 a_string = realloc_string_sub(a_string, "%D", r);
606 break;
607 case 'I' : {
608 int offset = 0;
609 client_addr(get_client_fd(), addr, sizeof(addr));
610 if (strnequal(addr,"::ffff:",7)) {
611 offset = 7;
613 a_string = realloc_string_sub(a_string, "%I",
614 addr + offset);
615 break;
617 case 'i':
618 a_string = realloc_string_sub( a_string, "%i",
619 client_socket_addr(get_client_fd(), addr, sizeof(addr)) );
620 break;
621 case 'L' :
622 if ( StrnCaseCmp(p, "%LOGONSERVER%", strlen("%LOGONSERVER%")) == 0 ) {
623 break;
625 if (local_machine_name && *local_machine_name) {
626 a_string = realloc_string_sub(a_string, "%L", local_machine_name);
627 } else {
628 a_string = realloc_string_sub(a_string, "%L", global_myname());
630 break;
631 case 'N':
632 a_string = realloc_string_sub(a_string, "%N", automount_server(smb_name));
633 break;
634 case 'M' :
635 a_string = realloc_string_sub(a_string, "%M", client_name(get_client_fd()));
636 break;
637 case 'R' :
638 a_string = realloc_string_sub(a_string, "%R", remote_proto);
639 break;
640 case 'T' :
641 a_string = realloc_string_sub(a_string, "%T", current_timestring(tmp_ctx, False));
642 break;
643 case 'a' :
644 a_string = realloc_string_sub(a_string, "%a",
645 get_remote_arch_str());
646 break;
647 case 'd' :
648 slprintf(pidstr,sizeof(pidstr)-1, "%d",(int)sys_getpid());
649 a_string = realloc_string_sub(a_string, "%d", pidstr);
650 break;
651 case 'h' :
652 a_string = realloc_string_sub(a_string, "%h", myhostname());
653 break;
654 case 'm' :
655 a_string = realloc_string_sub(a_string, "%m",
656 remote_machine
657 ? remote_machine
658 : "");
659 break;
660 case 'v' :
661 a_string = realloc_string_sub(a_string, "%v", samba_version_string());
662 break;
663 case 'w' :
664 a_string = realloc_string_sub(a_string, "%w", lp_winbind_separator());
665 break;
666 case '$' :
667 a_string = realloc_expand_env_var(a_string, p); /* Expand environment variables */
668 break;
669 case '(':
670 a_string = realloc_expand_longvar( a_string, p );
671 break;
672 case 'V' :
673 slprintf(vnnstr,sizeof(vnnstr)-1, "%u", get_my_vnn());
674 a_string = realloc_string_sub(a_string, "%V", vnnstr);
675 break;
676 default:
677 break;
680 p++;
681 TALLOC_FREE(r);
683 if (a_string == NULL) {
684 goto done;
688 goto done;
690 error:
691 SAFE_FREE(a_string);
693 done:
694 TALLOC_FREE(tmp_ctx);
695 return a_string;
698 /****************************************************************************
699 Do some specific substitutions in a string.
700 This function will return an allocated string that have to be freed.
701 ****************************************************************************/
703 char *talloc_sub_specified(TALLOC_CTX *mem_ctx,
704 const char *input_string,
705 const char *username,
706 const char *domain,
707 uid_t uid,
708 gid_t gid)
710 char *a_string;
711 char *ret_string = NULL;
712 char *b, *p, *s;
713 TALLOC_CTX *tmp_ctx;
715 if (!(tmp_ctx = talloc_new(mem_ctx))) {
716 DEBUG(0, ("talloc_new failed\n"));
717 return NULL;
720 a_string = talloc_strdup(tmp_ctx, input_string);
721 if (a_string == NULL) {
722 DEBUG(0, ("talloc_sub_specified: Out of memory!\n"));
723 goto done;
726 for (b = s = a_string; (p = strchr_m(s, '%')); s = a_string + (p - b)) {
728 b = a_string;
730 switch (*(p+1)) {
731 case 'U' :
732 a_string = talloc_string_sub(
733 tmp_ctx, a_string, "%U", username);
734 break;
735 case 'u' :
736 a_string = talloc_string_sub(
737 tmp_ctx, a_string, "%u", username);
738 break;
739 case 'G' :
740 if (gid != -1) {
741 a_string = talloc_string_sub(
742 tmp_ctx, a_string, "%G",
743 gidtoname(gid));
744 } else {
745 a_string = talloc_string_sub(
746 tmp_ctx, a_string,
747 "%G", "NO_GROUP");
749 break;
750 case 'g' :
751 if (gid != -1) {
752 a_string = talloc_string_sub(
753 tmp_ctx, a_string, "%g",
754 gidtoname(gid));
755 } else {
756 a_string = talloc_string_sub(
757 tmp_ctx, a_string, "%g", "NO_GROUP");
759 break;
760 case 'D' :
761 a_string = talloc_string_sub(tmp_ctx, a_string,
762 "%D", domain);
763 break;
764 case 'N' :
765 a_string = talloc_string_sub(
766 tmp_ctx, a_string, "%N",
767 automount_server(username));
768 break;
769 default:
770 break;
773 p++;
774 if (a_string == NULL) {
775 goto done;
779 /* Watch out, using "mem_ctx" here, so all intermediate stuff goes
780 * away with the TALLOC_FREE(tmp_ctx) further down. */
782 ret_string = talloc_sub_basic(mem_ctx, username, domain, a_string);
784 done:
785 TALLOC_FREE(tmp_ctx);
786 return ret_string;
789 /****************************************************************************
790 ****************************************************************************/
792 static char *alloc_sub_advanced(const char *servicename, const char *user,
793 const char *connectpath, gid_t gid,
794 const char *smb_name, const char *domain_name,
795 const char *str)
797 char *a_string, *ret_string;
798 char *b, *p, *s;
800 a_string = SMB_STRDUP(str);
801 if (a_string == NULL) {
802 DEBUG(0, ("alloc_sub_advanced: Out of memory!\n"));
803 return NULL;
806 for (b = s = a_string; (p = strchr_m(s, '%')); s = a_string + (p - b)) {
808 b = a_string;
810 switch (*(p+1)) {
811 case 'N' :
812 a_string = realloc_string_sub(a_string, "%N", automount_server(user));
813 break;
814 case 'H': {
815 char *h;
816 if ((h = get_user_home_dir(talloc_tos(), user)))
817 a_string = realloc_string_sub(a_string, "%H", h);
818 TALLOC_FREE(h);
819 break;
821 case 'P':
822 a_string = realloc_string_sub(a_string, "%P", connectpath);
823 break;
824 case 'S':
825 a_string = realloc_string_sub(a_string, "%S", servicename);
826 break;
827 case 'g':
828 a_string = realloc_string_sub(a_string, "%g", gidtoname(gid));
829 break;
830 case 'u':
831 a_string = realloc_string_sub(a_string, "%u", user);
832 break;
834 /* Patch from jkf@soton.ac.uk Left the %N (NIS
835 * server name) in standard_sub_basic as it is
836 * a feature for logon servers, hence uses the
837 * username. The %p (NIS server path) code is
838 * here as it is used instead of the default
839 * "path =" string in [homes] and so needs the
840 * service name, not the username. */
841 case 'p':
842 a_string = realloc_string_sub(a_string, "%p",
843 automount_path(servicename));
844 break;
846 default:
847 break;
850 p++;
851 if (a_string == NULL) {
852 return NULL;
856 ret_string = alloc_sub_basic(smb_name, domain_name, a_string);
857 SAFE_FREE(a_string);
858 return ret_string;
862 * This obviously is inefficient and needs to be merged into
863 * alloc_sub_advanced...
866 char *talloc_sub_advanced(TALLOC_CTX *mem_ctx,
867 const char *servicename, const char *user,
868 const char *connectpath, gid_t gid,
869 const char *smb_name, const char *domain_name,
870 const char *str)
872 char *a, *t;
874 if (!(a = alloc_sub_advanced(servicename, user, connectpath, gid,
875 smb_name, domain_name, str))) {
876 return NULL;
878 t = talloc_strdup(mem_ctx, a);
879 SAFE_FREE(a);
880 return t;
884 void standard_sub_advanced(const char *servicename, const char *user,
885 const char *connectpath, gid_t gid,
886 const char *smb_name, const char *domain_name,
887 char *str, size_t len)
889 char *s;
891 s = alloc_sub_advanced(servicename, user, connectpath,
892 gid, smb_name, domain_name, str);
894 if ( s ) {
895 strncpy( str, s, len );
896 SAFE_FREE( s );
900 /****************************************************************************
901 Do some standard substitutions in a string.
902 ****************************************************************************/
904 char *standard_sub_conn(TALLOC_CTX *ctx, connection_struct *conn, const char *str)
906 return talloc_sub_advanced(ctx,
907 lp_servicename(SNUM(conn)),
908 conn->server_info->unix_name,
909 conn->connectpath,
910 conn->server_info->utok.gid,
911 get_smb_user_name(),
913 str);