param: Rename variable used for lp_auth_methods AuthMethods
[Samba.git] / source3 / rpcclient / cmd_eventlog.c
blob949e02510b2e3d7c62fbd131b2d1257088dbb4ce
1 /*
2 Unix SMB/CIFS implementation.
3 RPC pipe client
5 Copyright (C) Günther Deschner 2009
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>.
21 #include "includes.h"
22 #include "rpcclient.h"
23 #include "../librpc/gen_ndr/ndr_eventlog.h"
24 #include "../librpc/gen_ndr/ndr_eventlog_c.h"
25 #include "rpc_client/init_lsa.h"
27 static NTSTATUS get_eventlog_handle(struct rpc_pipe_client *cli,
28 TALLOC_CTX *mem_ctx,
29 const char *log,
30 struct policy_handle *handle)
32 NTSTATUS status, result;
33 struct eventlog_OpenUnknown0 unknown0;
34 struct lsa_String logname, servername;
35 struct dcerpc_binding_handle *b = cli->binding_handle;
37 unknown0.unknown0 = 0x005c;
38 unknown0.unknown1 = 0x0001;
40 init_lsa_String(&logname, log);
41 init_lsa_String(&servername, NULL);
43 status = dcerpc_eventlog_OpenEventLogW(b, mem_ctx,
44 &unknown0,
45 &logname,
46 &servername,
47 0x00000001, /* major */
48 0x00000001, /* minor */
49 handle,
50 &result);
51 if (!NT_STATUS_IS_OK(status)) {
52 return status;
55 return result;
58 static NTSTATUS cmd_eventlog_readlog(struct rpc_pipe_client *cli,
59 TALLOC_CTX *mem_ctx,
60 int argc,
61 const char **argv)
63 NTSTATUS status = NT_STATUS_OK;
64 NTSTATUS result = NT_STATUS_OK;
65 struct policy_handle handle;
66 struct dcerpc_binding_handle *b = cli->binding_handle;
68 uint32_t flags = EVENTLOG_BACKWARDS_READ |
69 EVENTLOG_SEQUENTIAL_READ;
70 uint32_t offset = 0;
71 uint32_t number_of_bytes = 0;
72 uint8_t *data;
73 uint32_t sent_size = 0;
74 uint32_t real_size = 0;
76 if (argc < 2 || argc > 4) {
77 printf("Usage: %s logname [offset] [number_of_bytes]\n", argv[0]);
78 return NT_STATUS_OK;
81 if (argc >= 3) {
82 offset = atoi(argv[2]);
85 if (argc >= 4) {
86 number_of_bytes = atoi(argv[3]);
89 status = get_eventlog_handle(cli, mem_ctx, argv[1], &handle);
90 if (!NT_STATUS_IS_OK(status)) {
91 return status;
94 data = talloc_array(mem_ctx, uint8_t, number_of_bytes);
95 if (data == NULL) {
96 goto done;
99 do {
101 enum ndr_err_code ndr_err;
102 DATA_BLOB blob;
103 struct EVENTLOGRECORD r;
104 uint32_t size = 0;
105 uint32_t pos = 0;
107 status = dcerpc_eventlog_ReadEventLogW(b, mem_ctx,
108 &handle,
109 flags,
110 offset,
111 number_of_bytes,
112 data,
113 &sent_size,
114 &real_size,
115 &result);
116 if (!NT_STATUS_IS_OK(status)) {
117 return status;
119 if (NT_STATUS_EQUAL(result, NT_STATUS_BUFFER_TOO_SMALL) &&
120 real_size > 0 ) {
121 number_of_bytes = real_size;
122 data = talloc_realloc(mem_ctx, data, uint8_t, real_size);
123 if (data == NULL) {
124 goto done;
126 status = dcerpc_eventlog_ReadEventLogW(b, mem_ctx,
127 &handle,
128 flags,
129 offset,
130 number_of_bytes,
131 data,
132 &sent_size,
133 &real_size,
134 &result);
135 if (!NT_STATUS_IS_OK(status)) {
136 return status;
140 if (!NT_STATUS_EQUAL(result, NT_STATUS_END_OF_FILE) &&
141 !NT_STATUS_IS_OK(result)) {
142 goto done;
145 number_of_bytes = 0;
147 size = IVAL(data, pos);
149 while (size > 0) {
151 blob = data_blob_const(data + pos, size);
152 /* dump_data(0, blob.data, blob.length); */
153 ndr_err = ndr_pull_struct_blob_all(&blob, mem_ctx, &r,
154 (ndr_pull_flags_fn_t)ndr_pull_EVENTLOGRECORD);
155 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
156 status = ndr_map_error2ntstatus(ndr_err);
157 goto done;
160 NDR_PRINT_DEBUG(EVENTLOGRECORD, &r);
162 pos += size;
164 if (pos + 4 > sent_size) {
165 break;
168 size = IVAL(data, pos);
171 offset++;
173 } while (NT_STATUS_IS_OK(result));
175 done:
176 dcerpc_eventlog_CloseEventLog(b, mem_ctx, &handle, &result);
178 return status;
181 static NTSTATUS cmd_eventlog_numrecords(struct rpc_pipe_client *cli,
182 TALLOC_CTX *mem_ctx,
183 int argc,
184 const char **argv)
186 NTSTATUS status, result;
187 struct policy_handle handle;
188 uint32_t number = 0;
189 struct dcerpc_binding_handle *b = cli->binding_handle;
191 if (argc != 2) {
192 printf("Usage: %s logname\n", argv[0]);
193 return NT_STATUS_OK;
196 status = get_eventlog_handle(cli, mem_ctx, argv[1], &handle);
197 if (!NT_STATUS_IS_OK(status)) {
198 return status;
201 status = dcerpc_eventlog_GetNumRecords(b, mem_ctx,
202 &handle,
203 &number,
204 &result);
205 if (!NT_STATUS_IS_OK(status)) {
206 goto done;
208 if (!NT_STATUS_IS_OK(result)) {
209 status = result;
210 goto done;
213 printf("number of records: %d\n", number);
215 done:
216 dcerpc_eventlog_CloseEventLog(b, mem_ctx, &handle, &result);
218 return status;
221 static NTSTATUS cmd_eventlog_oldestrecord(struct rpc_pipe_client *cli,
222 TALLOC_CTX *mem_ctx,
223 int argc,
224 const char **argv)
226 NTSTATUS status, result;
227 struct policy_handle handle;
228 uint32_t oldest_entry = 0;
229 struct dcerpc_binding_handle *b = cli->binding_handle;
231 if (argc != 2) {
232 printf("Usage: %s logname\n", argv[0]);
233 return NT_STATUS_OK;
236 status = get_eventlog_handle(cli, mem_ctx, argv[1], &handle);
237 if (!NT_STATUS_IS_OK(status)) {
238 return status;
241 status = dcerpc_eventlog_GetOldestRecord(b, mem_ctx,
242 &handle,
243 &oldest_entry,
244 &result);
245 if (!NT_STATUS_IS_OK(status)) {
246 goto done;
248 if (!NT_STATUS_IS_OK(result)) {
249 status = result;
250 goto done;
253 printf("oldest entry: %d\n", oldest_entry);
255 done:
256 dcerpc_eventlog_CloseEventLog(b, mem_ctx, &handle, &result);
258 return status;
261 static NTSTATUS cmd_eventlog_reportevent(struct rpc_pipe_client *cli,
262 TALLOC_CTX *mem_ctx,
263 int argc,
264 const char **argv)
266 NTSTATUS status, result;
267 struct policy_handle handle;
268 struct dcerpc_binding_handle *b = cli->binding_handle;
270 uint16_t num_of_strings = 1;
271 uint32_t data_size = 0;
272 struct lsa_String servername;
273 struct lsa_String *strings;
274 uint8_t *data = NULL;
275 uint32_t record_number = 0;
276 time_t time_written = 0;
278 if (argc != 2) {
279 printf("Usage: %s logname\n", argv[0]);
280 return NT_STATUS_OK;
283 status = get_eventlog_handle(cli, mem_ctx, argv[1], &handle);
284 if (!NT_STATUS_IS_OK(status)) {
285 return status;
288 strings = talloc_array(mem_ctx, struct lsa_String, num_of_strings);
289 if (!strings) {
290 return NT_STATUS_NO_MEMORY;
293 init_lsa_String(&strings[0], "test event written by rpcclient\n");
294 init_lsa_String(&servername, NULL);
296 status = dcerpc_eventlog_ReportEventW(b, mem_ctx,
297 &handle,
298 time(NULL),
299 EVENTLOG_INFORMATION_TYPE,
300 0, /* event_category */
301 0, /* event_id */
302 num_of_strings,
303 data_size,
304 &servername,
305 NULL, /* user_sid */
306 &strings,
307 data,
308 0, /* flags */
309 &record_number,
310 &time_written,
311 &result);
313 if (!NT_STATUS_IS_OK(status)) {
314 goto done;
316 if (!NT_STATUS_IS_OK(result)) {
317 status = result;
318 goto done;
321 printf("entry: %d written at %s\n", record_number,
322 http_timestring(talloc_tos(), time_written));
324 done:
325 dcerpc_eventlog_CloseEventLog(b, mem_ctx, &handle, &result);
327 return status;
330 static NTSTATUS cmd_eventlog_reporteventsource(struct rpc_pipe_client *cli,
331 TALLOC_CTX *mem_ctx,
332 int argc,
333 const char **argv)
335 NTSTATUS status, result;
336 struct policy_handle handle;
337 struct dcerpc_binding_handle *b = cli->binding_handle;
339 uint16_t num_of_strings = 1;
340 uint32_t data_size = 0;
341 struct lsa_String servername, sourcename;
342 struct lsa_String *strings;
343 uint8_t *data = NULL;
344 uint32_t record_number = 0;
345 time_t time_written = 0;
347 if (argc != 2) {
348 printf("Usage: %s logname\n", argv[0]);
349 return NT_STATUS_OK;
352 status = get_eventlog_handle(cli, mem_ctx, argv[1], &handle);
353 if (!NT_STATUS_IS_OK(status)) {
354 return status;
357 strings = talloc_array(mem_ctx, struct lsa_String, num_of_strings);
358 if (!strings) {
359 return NT_STATUS_NO_MEMORY;
362 init_lsa_String(&strings[0], "test event written by rpcclient\n");
363 init_lsa_String(&servername, NULL);
364 init_lsa_String(&sourcename, "rpcclient");
366 status = dcerpc_eventlog_ReportEventAndSourceW(b, mem_ctx,
367 &handle,
368 time(NULL),
369 EVENTLOG_INFORMATION_TYPE,
370 0, /* event_category */
371 0, /* event_id */
372 &sourcename,
373 num_of_strings,
374 data_size,
375 &servername,
376 NULL, /* user_sid */
377 &strings,
378 data,
379 0, /* flags */
380 &record_number,
381 &time_written,
382 &result);
383 if (!NT_STATUS_IS_OK(status)) {
384 goto done;
386 if (!NT_STATUS_IS_OK(result)) {
387 status = result;
388 goto done;
391 printf("entry: %d written at %s\n", record_number,
392 http_timestring(talloc_tos(), time_written));
394 done:
395 dcerpc_eventlog_CloseEventLog(b, mem_ctx, &handle, &result);
397 return status;
400 static NTSTATUS cmd_eventlog_registerevsource(struct rpc_pipe_client *cli,
401 TALLOC_CTX *mem_ctx,
402 int argc,
403 const char **argv)
405 NTSTATUS status, result;
406 struct policy_handle log_handle;
407 struct lsa_String module_name, reg_module_name;
408 struct eventlog_OpenUnknown0 unknown0;
409 struct dcerpc_binding_handle *b = cli->binding_handle;
411 unknown0.unknown0 = 0x005c;
412 unknown0.unknown1 = 0x0001;
414 if (argc != 2) {
415 printf("Usage: %s logname\n", argv[0]);
416 return NT_STATUS_OK;
419 init_lsa_String(&module_name, "rpcclient");
420 init_lsa_String(&reg_module_name, NULL);
422 status = dcerpc_eventlog_RegisterEventSourceW(b, mem_ctx,
423 &unknown0,
424 &module_name,
425 &reg_module_name,
426 1, /* major_version */
427 1, /* minor_version */
428 &log_handle,
429 &result);
430 if (!NT_STATUS_IS_OK(status)) {
431 goto done;
433 if (!NT_STATUS_IS_OK(result)) {
434 status = result;
435 goto done;
438 done:
439 dcerpc_eventlog_DeregisterEventSource(b, mem_ctx, &log_handle, &result);
441 return status;
444 static NTSTATUS cmd_eventlog_backuplog(struct rpc_pipe_client *cli,
445 TALLOC_CTX *mem_ctx,
446 int argc,
447 const char **argv)
449 NTSTATUS status, result;
450 struct policy_handle handle;
451 struct lsa_String backup_filename;
452 const char *tmp;
453 struct dcerpc_binding_handle *b = cli->binding_handle;
455 if (argc != 3) {
456 printf("Usage: %s logname backupname\n", argv[0]);
457 return NT_STATUS_OK;
460 status = get_eventlog_handle(cli, mem_ctx, argv[1], &handle);
461 if (!NT_STATUS_IS_OK(status)) {
462 return status;
465 tmp = talloc_asprintf(mem_ctx, "\\??\\%s", argv[2]);
466 if (!tmp) {
467 status = NT_STATUS_NO_MEMORY;
468 goto done;
471 init_lsa_String(&backup_filename, tmp);
473 status = dcerpc_eventlog_BackupEventLogW(b, mem_ctx,
474 &handle,
475 &backup_filename,
476 &result);
477 if (!NT_STATUS_IS_OK(status)) {
478 goto done;
480 if (!NT_STATUS_IS_OK(result)) {
481 status = result;
482 goto done;
485 done:
486 dcerpc_eventlog_CloseEventLog(b, mem_ctx, &handle, &result);
488 return status;
491 static NTSTATUS cmd_eventlog_loginfo(struct rpc_pipe_client *cli,
492 TALLOC_CTX *mem_ctx,
493 int argc,
494 const char **argv)
496 NTSTATUS status, result;
497 struct policy_handle handle;
498 uint8_t *buffer = NULL;
499 uint32_t buf_size = 0;
500 uint32_t bytes_needed = 0;
501 struct dcerpc_binding_handle *b = cli->binding_handle;
503 if (argc != 2) {
504 printf("Usage: %s logname\n", argv[0]);
505 return NT_STATUS_OK;
508 status = get_eventlog_handle(cli, mem_ctx, argv[1], &handle);
509 if (!NT_STATUS_IS_OK(status)) {
510 return status;
513 buffer = talloc_array(mem_ctx, uint8_t, bytes_needed);
514 if (buffer == NULL) {
515 status = NT_STATUS_NO_MEMORY;
516 goto done;
519 status = dcerpc_eventlog_GetLogInformation(b, mem_ctx,
520 &handle,
521 0, /* level */
522 buffer,
523 buf_size,
524 &bytes_needed,
525 &result);
526 if (!NT_STATUS_IS_OK(status)) {
527 goto done;
529 if (!NT_STATUS_IS_OK(result) &&
530 !NT_STATUS_EQUAL(result, NT_STATUS_BUFFER_TOO_SMALL)) {
531 goto done;
534 buf_size = bytes_needed;
535 buffer = talloc_realloc(mem_ctx, buffer, uint8_t, bytes_needed);
536 if (buffer == NULL) {
537 status = NT_STATUS_NO_MEMORY;
538 goto done;
541 status = dcerpc_eventlog_GetLogInformation(b, mem_ctx,
542 &handle,
543 0, /* level */
544 buffer,
545 buf_size,
546 &bytes_needed,
547 &result);
548 if (!NT_STATUS_IS_OK(status)) {
549 goto done;
551 if (!NT_STATUS_IS_OK(result)) {
552 status = result;
553 goto done;
556 done:
557 dcerpc_eventlog_CloseEventLog(b, mem_ctx, &handle, &result);
559 return status;
563 struct cmd_set eventlog_commands[] = {
564 { "EVENTLOG" },
565 { "eventlog_readlog", RPC_RTYPE_NTSTATUS, cmd_eventlog_readlog, NULL, &ndr_table_eventlog, NULL, "Read Eventlog", "" },
566 { "eventlog_numrecord", RPC_RTYPE_NTSTATUS, cmd_eventlog_numrecords, NULL, &ndr_table_eventlog, NULL, "Get number of records", "" },
567 { "eventlog_oldestrecord", RPC_RTYPE_NTSTATUS, cmd_eventlog_oldestrecord, NULL, &ndr_table_eventlog, NULL, "Get oldest record", "" },
568 { "eventlog_reportevent", RPC_RTYPE_NTSTATUS, cmd_eventlog_reportevent, NULL, &ndr_table_eventlog, NULL, "Report event", "" },
569 { "eventlog_reporteventsource", RPC_RTYPE_NTSTATUS, cmd_eventlog_reporteventsource, NULL, &ndr_table_eventlog, NULL, "Report event and source", "" },
570 { "eventlog_registerevsource", RPC_RTYPE_NTSTATUS, cmd_eventlog_registerevsource, NULL, &ndr_table_eventlog, NULL, "Register event source", "" },
571 { "eventlog_backuplog", RPC_RTYPE_NTSTATUS, cmd_eventlog_backuplog, NULL, &ndr_table_eventlog, NULL, "Backup Eventlog File", "" },
572 { "eventlog_loginfo", RPC_RTYPE_NTSTATUS, cmd_eventlog_loginfo, NULL, &ndr_table_eventlog, NULL, "Get Eventlog Information", "" },
573 { NULL }