s4-registry: Don't leak memory on error.
[Samba.git] / source4 / lib / registry / tools / regshell.c
blobdd154f78c94ed98bdd5a9c2e5fb7224a07f04f51
1 /*
2 Unix SMB/CIFS implementation.
3 simple registry frontend
5 Copyright (C) Jelmer Vernooij 2004-2007
6 Copyright (C) Wilco Baan Hofman 2009
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>.
22 #include "includes.h"
23 #include "lib/registry/registry.h"
24 #include "lib/cmdline/popt_common.h"
25 #include "lib/events/events.h"
26 #include "system/time.h"
27 #include "../libcli/smbreadline/smbreadline.h"
28 #include "librpc/gen_ndr/ndr_security.h"
29 #include "lib/registry/tools/common.h"
30 #include "param/param.h"
32 struct regshell_context {
33 struct registry_context *registry;
34 char *path;
35 char *predef;
36 struct registry_key *current;
37 struct registry_key *root;
40 static WERROR get_full_path(struct regshell_context *ctx, char *path, char **ret_path)
42 char *dir;
43 char *tmp;
44 char *new_path;
46 if (path[0] == '\\') {
47 new_path = talloc_strdup(ctx, "");
48 } else {
49 new_path = talloc_strdup(ctx, ctx->path);
52 dir = strtok(path, "\\");
53 if (dir == NULL) {
54 *ret_path = new_path;
55 return WERR_OK;
57 do {
58 if (strcmp(dir, "..") == 0) {
59 if (strchr(new_path, '\\')) {
60 new_path[strrchr(new_path, '\\') - new_path] = '\0';
61 } else {
62 tmp = new_path;
63 new_path = talloc_strdup(ctx, "");
64 talloc_free(tmp);
66 continue;
68 if (strcmp(dir, ".") == 0) {
69 continue;
72 tmp = new_path;
73 /* No prepending a backslash */
74 if (strcmp(new_path, "") == 0) {
75 new_path = talloc_strdup(ctx, dir);
76 } else {
77 new_path = talloc_asprintf(ctx, "%s\\%s", new_path, dir);
79 talloc_free(tmp);
81 } while ((dir = strtok(NULL, "\\")));
83 *ret_path = new_path;
84 return WERR_OK;
87 /* *
88 * ck/cd - change key
89 * ls - list values/keys
90 * rmval/rm - remove value
91 * rmkey/rmdir - remove key
92 * mkkey/mkdir - make key
93 * ch - change hive
94 * info - show key info
95 * save - save hive
96 * print - print value
97 * help
98 * exit
101 static WERROR cmd_info(struct regshell_context *ctx, int argc, char **argv)
103 struct security_descriptor *sec_desc = NULL;
104 time_t last_mod;
105 WERROR error;
106 const char *classname = NULL;
107 NTTIME last_change;
108 uint32_t max_subkeynamelen;
109 uint32_t max_valnamelen;
110 uint32_t max_valbufsize;
111 uint32_t num_subkeys;
112 uint32_t num_values;
114 error = reg_key_get_info(ctx, ctx->current, &classname, &num_subkeys, &num_values,
115 &last_change, &max_subkeynamelen, &max_valnamelen, &max_valbufsize);
116 if (!W_ERROR_IS_OK(error)) {
117 printf("Error getting key info: %s\n", win_errstr(error));
118 return error;
122 printf("Name: %s\n", strchr(ctx->path, '\\')?strrchr(ctx->path, '\\')+1:
123 ctx->path);
124 printf("Full path: %s\n", ctx->path);
125 if (classname != NULL)
126 printf("Key Class: %s\n", classname);
127 last_mod = nt_time_to_unix(last_change);
128 printf("Time Last Modified: %s", ctime(&last_mod));
129 printf("Number of subkeys: %d\n", num_subkeys);
130 printf("Number of values: %d\n", num_values);
132 if (max_valnamelen > 0)
133 printf("Maximum value name length: %d\n", max_valnamelen);
135 if (max_valbufsize > 0)
136 printf("Maximum value data length: %d\n", max_valbufsize);
138 if (max_subkeynamelen > 0)
139 printf("Maximum sub key name length: %d\n", max_subkeynamelen);
141 error = reg_get_sec_desc(ctx, ctx->current, &sec_desc);
142 if (!W_ERROR_IS_OK(error)) {
143 printf("Error getting security descriptor: %s\n", win_errstr(error));
144 return WERR_OK;
146 ndr_print_debug((ndr_print_fn_t)ndr_print_security_descriptor,
147 "Security", sec_desc);
148 talloc_free(sec_desc);
150 return WERR_OK;
153 static WERROR cmd_predef(struct regshell_context *ctx, int argc, char **argv)
155 struct registry_key *ret = NULL;
156 if (argc < 2) {
157 fprintf(stderr, "Usage: predef predefined-key-name\n");
158 } else if (!ctx) {
159 fprintf(stderr, "No full registry loaded, no predefined keys defined\n");
160 } else {
161 WERROR error = reg_get_predefined_key_by_name(ctx->registry,
162 argv[1], &ret);
164 if (!W_ERROR_IS_OK(error)) {
165 fprintf(stderr, "Error opening predefined key %s: %s\n",
166 argv[1], win_errstr(error));
167 return error;
170 ctx->predef = strupper_talloc(ctx, argv[1]);
171 ctx->current = ret;
172 ctx->root = ret;
175 return WERR_OK;
178 static WERROR cmd_pwd(struct regshell_context *ctx,
179 int argc, char **argv)
181 if (ctx->predef) {
182 printf("%s\\", ctx->predef);
184 printf("%s\n", ctx->path);
185 return WERR_OK;
188 static WERROR cmd_set(struct regshell_context *ctx, int argc, char **argv)
190 struct registry_value val;
191 WERROR error;
193 if (argc < 4) {
194 fprintf(stderr, "Usage: set value-name type value\n");
195 return WERR_INVALID_PARAM;
198 if (!reg_string_to_val(ctx, argv[2], argv[3], &val.data_type, &val.data)) {
199 fprintf(stderr, "Unable to interpret data\n");
200 return WERR_INVALID_PARAM;
203 error = reg_val_set(ctx->current, argv[1], val.data_type, val.data);
204 if (!W_ERROR_IS_OK(error)) {
205 fprintf(stderr, "Error setting value: %s\n", win_errstr(error));
206 return error;
209 return WERR_OK;
212 static WERROR cmd_ck(struct regshell_context *ctx, int argc, char **argv)
214 struct registry_key *nkey = NULL;
215 char *full_path;
216 WERROR error;
218 if(argc == 2) {
219 if (!W_ERROR_IS_OK(get_full_path(ctx, argv[1], &full_path))) {
220 fprintf(stderr, "Unable to parse the supplied path\n");
221 return WERR_INVALID_PARAM;
223 error = reg_open_key(ctx->registry, ctx->root, full_path,
224 &nkey);
225 if(!W_ERROR_IS_OK(error)) {
226 DEBUG(0, ("Error opening specified key: %s\n",
227 win_errstr(error)));
228 return error;
231 talloc_free(ctx->path);
232 ctx->path = full_path;
234 ctx->current = nkey;
236 printf("New path is: %s\\%s\n", ctx->predef?ctx->predef:"", ctx->path);
238 return WERR_OK;
241 static WERROR cmd_print(struct regshell_context *ctx, int argc, char **argv)
243 uint32_t value_type;
244 DATA_BLOB value_data;
245 WERROR error;
247 if (argc != 2) {
248 fprintf(stderr, "Usage: print <valuename>\n");
249 return WERR_INVALID_PARAM;
252 error = reg_key_get_value_by_name(ctx, ctx->current, argv[1],
253 &value_type, &value_data);
254 if (!W_ERROR_IS_OK(error)) {
255 fprintf(stderr, "No such value '%s'\n", argv[1]);
256 return error;
259 printf("%s\n%s\n", str_regtype(value_type),
260 reg_val_data_string(ctx, value_type, value_data));
262 return WERR_OK;
265 static WERROR cmd_ls(struct regshell_context *ctx, int argc, char **argv)
267 unsigned int i;
268 WERROR error;
269 uint32_t valuetype;
270 DATA_BLOB valuedata;
271 const char *name = NULL;
273 for (i = 0; W_ERROR_IS_OK(error = reg_key_get_subkey_by_index(ctx,
274 ctx->current,
276 &name,
277 NULL,
278 NULL)); i++) {
279 printf("K %s\n", name);
282 if (!W_ERROR_EQUAL(error, WERR_NO_MORE_ITEMS)) {
283 fprintf(stderr, "Error occurred while browsing through keys: %s\n",
284 win_errstr(error));
285 return error;
288 for (i = 0; W_ERROR_IS_OK(error = reg_key_get_value_by_index(ctx,
289 ctx->current, i, &name, &valuetype, &valuedata)); i++)
290 printf("V \"%s\" %s %s\n", name, str_regtype(valuetype),
291 reg_val_data_string(ctx, valuetype, valuedata));
293 return WERR_OK;
295 static WERROR cmd_mkkey(struct regshell_context *ctx, int argc, char **argv)
297 struct registry_key *tmp;
298 WERROR error;
300 if(argc < 2) {
301 fprintf(stderr, "Usage: mkkey <keyname>\n");
302 return WERR_INVALID_PARAM;
305 error = reg_key_add_name(ctx, ctx->current, argv[1], 0, NULL, &tmp);
307 if (!W_ERROR_IS_OK(error)) {
308 fprintf(stderr, "Error adding new subkey '%s': %s\n", argv[1],
309 win_errstr(error));
310 return error;
313 return WERR_OK;
316 static WERROR cmd_rmkey(struct regshell_context *ctx,
317 int argc, char **argv)
319 WERROR error;
321 if(argc < 2) {
322 fprintf(stderr, "Usage: rmkey <name>\n");
323 return WERR_INVALID_PARAM;
326 error = reg_key_del(ctx, ctx->current, argv[1]);
327 if(!W_ERROR_IS_OK(error)) {
328 fprintf(stderr, "Error deleting '%s'\n", argv[1]);
329 return error;
330 } else {
331 fprintf(stderr, "Successfully deleted '%s'\n", argv[1]);
334 return WERR_OK;
337 static WERROR cmd_rmval(struct regshell_context *ctx, int argc, char **argv)
339 WERROR error;
341 if(argc < 2) {
342 fprintf(stderr, "Usage: rmval <valuename>\n");
343 return WERR_INVALID_PARAM;
346 error = reg_del_value(ctx, ctx->current, argv[1]);
347 if(!W_ERROR_IS_OK(error)) {
348 fprintf(stderr, "Error deleting value '%s'\n", argv[1]);
349 return error;
350 } else {
351 fprintf(stderr, "Successfully deleted value '%s'\n", argv[1]);
354 return WERR_OK;
357 _NORETURN_ static WERROR cmd_exit(struct regshell_context *ctx,
358 int argc, char **argv)
360 exit(0);
363 static WERROR cmd_help(struct regshell_context *ctx, int, char **);
365 static struct {
366 const char *name;
367 const char *alias;
368 const char *help;
369 WERROR (*handle)(struct regshell_context *ctx, int argc, char **argv);
370 } regshell_cmds[] = {
371 {"ck", "cd", "Change current key", cmd_ck },
372 {"info", "i", "Show detailed information of a key", cmd_info },
373 {"list", "ls", "List values/keys in current key", cmd_ls },
374 {"print", "p", "Print value", cmd_print },
375 {"mkkey", "mkdir", "Make new key", cmd_mkkey },
376 {"rmval", "rm", "Remove value", cmd_rmval },
377 {"rmkey", "rmdir", "Remove key", cmd_rmkey },
378 {"pwd", "pwk", "Printing current key", cmd_pwd },
379 {"set", "update", "Update value", cmd_set },
380 {"help", "?", "Help", cmd_help },
381 {"exit", "quit", "Exit", cmd_exit },
382 {"predef", "predefined", "Go to predefined key", cmd_predef },
383 {NULL }
386 static WERROR cmd_help(struct regshell_context *ctx,
387 int argc, char **argv)
389 unsigned int i;
390 printf("Available commands:\n");
391 for(i = 0; regshell_cmds[i].name; i++) {
392 printf("%s - %s\n", regshell_cmds[i].name,
393 regshell_cmds[i].help);
395 return WERR_OK;
398 static WERROR process_cmd(struct regshell_context *ctx,
399 char *line)
401 int argc;
402 char **argv = NULL;
403 int ret, i;
405 if ((ret = poptParseArgvString(line, &argc, (const char ***) &argv)) != 0) {
406 fprintf(stderr, "regshell: %s\n", poptStrerror(ret));
407 return WERR_INVALID_PARAM;
410 for(i = 0; regshell_cmds[i].name; i++) {
411 if(!strcmp(regshell_cmds[i].name, argv[0]) ||
412 (regshell_cmds[i].alias && !strcmp(regshell_cmds[i].alias, argv[0]))) {
413 return regshell_cmds[i].handle(ctx, argc, argv);
417 fprintf(stderr, "No such command '%s'\n", argv[0]);
419 return WERR_INVALID_PARAM;
422 #define MAX_COMPLETIONS 100
424 static struct registry_key *current_key = NULL;
426 static char **reg_complete_command(const char *text, int start, int end)
428 /* Complete command */
429 char **matches;
430 size_t len, samelen=0;
431 int i, count=1;
433 matches = malloc_array_p(char *, MAX_COMPLETIONS);
434 if (!matches) return NULL;
435 matches[0] = NULL;
437 len = strlen(text);
438 for (i=0;regshell_cmds[i].handle && count < MAX_COMPLETIONS-1;i++) {
439 if (strncmp(text, regshell_cmds[i].name, len) == 0) {
440 matches[count] = strdup(regshell_cmds[i].name);
441 if (!matches[count])
442 goto cleanup;
443 if (count == 1)
444 samelen = strlen(matches[count]);
445 else
446 while (strncmp(matches[count], matches[count-1], samelen) != 0)
447 samelen--;
448 count++;
452 switch (count) {
453 case 0: /* should never happen */
454 case 1:
455 goto cleanup;
456 case 2:
457 matches[0] = strdup(matches[1]);
458 break;
459 default:
460 matches[0] = strndup(matches[1], samelen);
462 matches[count] = NULL;
463 return matches;
465 cleanup:
466 count--;
467 while (count >= 0) {
468 free(matches[count]);
469 count--;
471 free(matches);
472 return NULL;
475 static char **reg_complete_key(const char *text, int start, int end)
477 struct registry_key *base;
478 const char *subkeyname;
479 unsigned int i, j = 1;
480 size_t len, samelen = 0;
481 char **matches;
482 const char *base_n = "";
483 TALLOC_CTX *mem_ctx;
484 WERROR status;
486 matches = malloc_array_p(char *, MAX_COMPLETIONS);
487 if (!matches) return NULL;
488 matches[0] = NULL;
489 mem_ctx = talloc_init("completion");
491 base = current_key;
493 len = strlen(text);
494 for(i = 0; j < MAX_COMPLETIONS-1; i++) {
495 status = reg_key_get_subkey_by_index(mem_ctx, base, i,
496 &subkeyname, NULL, NULL);
497 if(W_ERROR_IS_OK(status)) {
498 if(!strncmp(text, subkeyname, len)) {
499 matches[j] = strdup(subkeyname);
500 j++;
502 if (j == 1)
503 samelen = strlen(matches[j]);
504 else
505 while (strncmp(matches[j], matches[j-1], samelen) != 0)
506 samelen--;
508 } else if(W_ERROR_EQUAL(status, WERR_NO_MORE_ITEMS)) {
509 break;
510 } else {
511 int n;
513 printf("Error creating completion list: %s\n",
514 win_errstr(status));
516 for (n = j; n >= 0; n--) {
517 SAFE_FREE(matches[n]);
519 SAFE_FREE(matches);
520 talloc_free(mem_ctx);
521 return NULL;
525 if (j == 1) { /* No matches at all */
526 SAFE_FREE(matches);
527 talloc_free(mem_ctx);
528 return NULL;
531 if (j == 2) { /* Exact match */
532 asprintf(&matches[0], "%s%s", base_n, matches[1]);
533 } else {
534 asprintf(&matches[0], "%s%s", base_n,
535 talloc_strndup(mem_ctx, matches[1], samelen));
537 talloc_free(mem_ctx);
539 matches[j] = NULL;
540 return matches;
543 static char **reg_completion(const char *text, int start, int end)
545 smb_readline_ca_char(' ');
547 if (start == 0) {
548 return reg_complete_command(text, start, end);
549 } else {
550 return reg_complete_key(text, start, end);
554 int main(int argc, char **argv)
556 int opt;
557 const char *file = NULL;
558 poptContext pc;
559 const char *remote = NULL;
560 struct regshell_context *ctx;
561 struct tevent_context *ev_ctx;
562 bool ret = true;
563 struct poptOption long_options[] = {
564 POPT_AUTOHELP
565 {"file", 'F', POPT_ARG_STRING, &file, 0, "open hive file", NULL },
566 {"remote", 'R', POPT_ARG_STRING, &remote, 0, "connect to specified remote server", NULL},
567 POPT_COMMON_SAMBA
568 POPT_COMMON_CREDENTIALS
569 POPT_COMMON_VERSION
570 { NULL }
573 pc = poptGetContext(argv[0], argc, (const char **) argv, long_options,0);
575 while((opt = poptGetNextOpt(pc)) != -1) {
578 ctx = talloc_zero(NULL, struct regshell_context);
580 ev_ctx = s4_event_context_init(ctx);
582 if (remote != NULL) {
583 ctx->registry = reg_common_open_remote(remote, ev_ctx,
584 cmdline_lp_ctx, cmdline_credentials);
585 } else if (file != NULL) {
586 ctx->current = reg_common_open_file(file, ev_ctx, cmdline_lp_ctx, cmdline_credentials);
587 if (ctx->current == NULL)
588 return 1;
589 ctx->registry = ctx->current->context;
590 ctx->path = talloc_strdup(ctx, "");
591 ctx->predef = NULL;
592 ctx->root = ctx->current;
593 } else {
594 ctx->registry = reg_common_open_local(cmdline_credentials, ev_ctx, cmdline_lp_ctx);
597 if (ctx->registry == NULL)
598 return 1;
600 if (ctx->current == NULL) {
601 unsigned int i;
603 for (i = 0; (reg_predefined_keys[i].handle != 0) &&
604 (ctx->current == NULL); i++) {
605 WERROR err;
606 err = reg_get_predefined_key(ctx->registry,
607 reg_predefined_keys[i].handle,
608 &ctx->current);
609 if (W_ERROR_IS_OK(err)) {
610 ctx->predef = talloc_strdup(ctx,
611 reg_predefined_keys[i].name);
612 ctx->path = talloc_strdup(ctx, "");
613 ctx->root = ctx->current;
614 break;
615 } else {
616 ctx->current = NULL;
617 ctx->root = NULL;
622 if (ctx->current == NULL) {
623 fprintf(stderr, "Unable to access any of the predefined keys\n");
624 return 1;
627 poptFreeContext(pc);
629 while (true) {
630 char *line, *prompt;
632 if (asprintf(&prompt, "%s\\%s> ", ctx->predef?ctx->predef:"",
633 ctx->path) < 0) {
634 ret = false;
635 break;
638 current_key = ctx->current; /* No way to pass a void * pointer
639 via readline :-( */
640 line = smb_readline(prompt, NULL, reg_completion);
642 if (line == NULL) {
643 free(prompt);
644 break;
647 if (line[0] != '\n') {
648 ret = W_ERROR_IS_OK(process_cmd(ctx, line));
650 free(line);
651 free(prompt);
653 talloc_free(ctx);
655 return (ret?0:1);