2 * Samba Unix/Linux SMB client library
3 * Distributed SMB/CIFS Server Management Utility
4 * Local registry interface
6 * Copyright (C) Michael Adam 2008
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 3 of the License, or
11 * (at your option) any later version.
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
18 * You should have received a copy of the GNU General Public License
19 * along with this program. If not, see <http://www.gnu.org/licenses/>.
24 #include "registry/reg_api.h"
25 #include "registry/reg_util_token.h"
26 #include "registry/reg_init_basic.h"
27 #include "utils/net.h"
28 #include "utils/net_registry_util.h"
29 #include "include/g_lock.h"
30 #include "registry/reg_backend_db.h"
31 #include "registry/reg_import.h"
32 #include "registry/reg_format.h"
33 #include "registry/reg_api_util.h"
35 #include "../libcli/security/display_sec.h"
36 #include "../libcli/security/sddl.h"
37 #include "../libcli/registry/util_reg.h"
38 #include "passdb/machine_sid.h"
39 #include "net_registry_check.h"
40 #include "lib/util/util_tdb.h"
41 #include "lib/util/smb_strtox.h"
50 * split given path into hive and remaining path and open the hive key
52 static WERROR
open_hive(TALLOC_CTX
*ctx
, const char *path
,
53 uint32_t desired_access
,
54 struct registry_key
**hive
,
58 struct security_token
*token
= NULL
;
59 char *hivename
= NULL
;
60 char *tmp_subkeyname
= NULL
;
61 TALLOC_CTX
*tmp_ctx
= talloc_stackframe();
63 if ((hive
== NULL
) || (subkeyname
== NULL
)) {
64 werr
= WERR_INVALID_PARAMETER
;
68 werr
= split_hive_key(tmp_ctx
, path
, &hivename
, &tmp_subkeyname
);
69 if (!W_ERROR_IS_OK(werr
)) {
72 *subkeyname
= talloc_strdup(ctx
, tmp_subkeyname
);
73 if (*subkeyname
== NULL
) {
74 werr
= WERR_NOT_ENOUGH_MEMORY
;
78 werr
= ntstatus_to_werror(registry_create_admin_token(tmp_ctx
, &token
));
79 if (!W_ERROR_IS_OK(werr
)) {
83 werr
= reg_openhive(ctx
, hivename
, desired_access
, token
, hive
);
84 if (!W_ERROR_IS_OK(werr
)) {
95 static WERROR
open_key(TALLOC_CTX
*ctx
, const char *path
,
96 uint32_t desired_access
,
97 struct registry_key
**key
)
100 char *subkey_name
= NULL
;
101 struct registry_key
*hive
= NULL
;
102 TALLOC_CTX
*tmp_ctx
= talloc_stackframe();
104 if ((path
== NULL
) || (key
== NULL
)) {
105 return WERR_INVALID_PARAMETER
;
108 werr
= open_hive(tmp_ctx
, path
, desired_access
, &hive
, &subkey_name
);
109 if (!W_ERROR_IS_OK(werr
)) {
110 d_fprintf(stderr
, _("open_hive failed: %s\n"),
115 werr
= reg_openkey(ctx
, hive
, subkey_name
, desired_access
, key
);
116 if (!W_ERROR_IS_OK(werr
)) {
117 d_fprintf(stderr
, _("reg_openkey failed: %s\n"),
125 TALLOC_FREE(tmp_ctx
);
129 static WERROR
registry_enumkey(struct registry_key
*parent
, const char *keyname
,
133 TALLOC_CTX
*ctx
= talloc_stackframe();
137 char *valname
= NULL
;
138 struct registry_value
*valvalue
= NULL
;
139 struct registry_key
*key
= NULL
;
141 werr
= reg_openkey(ctx
, parent
, keyname
, REG_KEY_READ
, &key
);
142 if (!W_ERROR_IS_OK(werr
)) {
147 printf("[%s]\n\n", key
->key
->name
);
150 werr
= reg_enumkey(ctx
, key
, count
, &subkey_name
, &modtime
),
154 print_registry_key(subkey_name
, &modtime
);
156 if (!W_ERROR_EQUAL(WERR_NO_MORE_ITEMS
, werr
)) {
162 werr
= reg_enumvalue(ctx
, key
, count
, &valname
, &valvalue
),
166 print_registry_value_with_name(valname
, valvalue
);
168 if (!W_ERROR_EQUAL(WERR_NO_MORE_ITEMS
, werr
)) {
178 werr
= reg_enumkey(ctx
, key
, count
, &subkey_name
, &modtime
),
182 werr
= registry_enumkey(key
, subkey_name
, recursive
);
183 if (!W_ERROR_IS_OK(werr
)) {
187 if (!W_ERROR_EQUAL(WERR_NO_MORE_ITEMS
, werr
)) {
202 * the main "net registry" function implementations
205 static int net_registry_enumerate(struct net_context
*c
, int argc
,
209 struct registry_key
*key
= NULL
;
211 TALLOC_CTX
*ctx
= talloc_stackframe();
214 if (argc
!= 1 || c
->display_usage
) {
217 _("net registry enumerate <path>\n"));
220 _("net registry enumerate 'HKLM\\Software\\Samba'\n"));
224 werr
= open_hive(ctx
, argv
[0], REG_KEY_READ
, &key
, &name
);
225 if (!W_ERROR_IS_OK(werr
)) {
226 d_fprintf(stderr
, _("open_key failed: %s\n"), win_errstr(werr
));
230 werr
= registry_enumkey(key
, name
, c
->opt_reboot
);
231 if (W_ERROR_IS_OK(werr
)) {
239 static int net_registry_enumerate_recursive(struct net_context
*c
, int argc
,
243 struct registry_key
*key
= NULL
;
245 TALLOC_CTX
*ctx
= talloc_stackframe();
248 if (argc
!= 1 || c
->display_usage
) {
251 _("net registry enumerate <path>\n"));
254 _("net registry enumerate 'HKLM\\Software\\Samba'\n"));
258 werr
= open_hive(ctx
, argv
[0], REG_KEY_READ
, &key
, &name
);
259 if (!W_ERROR_IS_OK(werr
)) {
260 d_fprintf(stderr
, _("open_key failed: %s\n"), win_errstr(werr
));
264 werr
= registry_enumkey(key
, name
, true);
265 if (W_ERROR_IS_OK(werr
)) {
274 static int net_registry_createkey(struct net_context
*c
, int argc
,
278 enum winreg_CreateAction action
;
279 char *subkeyname
= NULL
;
280 struct registry_key
*hivekey
= NULL
;
281 struct registry_key
*subkey
= NULL
;
282 TALLOC_CTX
*ctx
= talloc_stackframe();
285 if (argc
!= 1 || c
->display_usage
) {
288 _("net registry createkey <path>\n"));
291 _("net registry createkey "
292 "'HKLM\\Software\\Samba\\smbconf.127.0.0.1'\n"));
295 if (strlen(argv
[0]) == 0) {
296 d_fprintf(stderr
, _("error: zero length key name given\n"));
300 werr
= open_hive(ctx
, argv
[0], REG_KEY_WRITE
, &hivekey
, &subkeyname
);
301 if (!W_ERROR_IS_OK(werr
)) {
302 d_fprintf(stderr
, _("open_hive failed: %s\n"),
307 werr
= reg_createkey(ctx
, hivekey
, subkeyname
, REG_KEY_WRITE
,
309 if (!W_ERROR_IS_OK(werr
)) {
310 d_fprintf(stderr
, _("reg_createkey failed: %s\n"),
315 case REG_ACTION_NONE
:
316 d_printf(_("createkey did nothing -- huh?\n"));
318 case REG_CREATED_NEW_KEY
:
319 d_printf(_("createkey created %s\n"), argv
[0]);
321 case REG_OPENED_EXISTING_KEY
:
322 d_printf(_("createkey opened existing %s\n"), argv
[0]);
333 static int net_registry_deletekey_internal(struct net_context
*c
, int argc
,
338 char *subkeyname
= NULL
;
339 struct registry_key
*hivekey
= NULL
;
340 TALLOC_CTX
*ctx
= talloc_stackframe();
343 if (argc
!= 1 || c
->display_usage
) {
346 _("net registry deletekey <path>\n"));
349 _("net registry deletekey "
350 "'HKLM\\Software\\Samba\\smbconf.127.0.0.1'\n"));
353 if (strlen(argv
[0]) == 0) {
354 d_fprintf(stderr
, _("error: zero length key name given\n"));
358 werr
= open_hive(ctx
, argv
[0], REG_KEY_WRITE
, &hivekey
, &subkeyname
);
359 if (!W_ERROR_IS_OK(werr
)) {
360 d_fprintf(stderr
, "open_hive %s: %s\n", _("failed"),
366 werr
= reg_deletekey_recursive(hivekey
, subkeyname
);
368 werr
= reg_deletekey(hivekey
, subkeyname
);
370 if (!W_ERROR_IS_OK(werr
) &&
371 !(c
->opt_force
&& W_ERROR_EQUAL(werr
, WERR_FILE_NOT_FOUND
)))
373 d_fprintf(stderr
, "reg_deletekey %s: %s\n", _("failed"),
385 static int net_registry_deletekey(struct net_context
*c
, int argc
,
388 return net_registry_deletekey_internal(c
, argc
, argv
, false);
391 static int net_registry_deletekey_recursive(struct net_context
*c
, int argc
,
394 return net_registry_deletekey_internal(c
, argc
, argv
, true);
397 static int net_registry_getvalue_internal(struct net_context
*c
, int argc
,
398 const char **argv
, bool raw
)
402 struct registry_key
*key
= NULL
;
403 struct registry_value
*value
= NULL
;
404 TALLOC_CTX
*ctx
= talloc_stackframe();
406 if (argc
!= 2 || c
->display_usage
) {
407 d_fprintf(stderr
, "%s\n%s",
409 _("net registry getvalue <key> <valuename>\n"));
413 werr
= open_key(ctx
, argv
[0], REG_KEY_READ
, &key
);
414 if (!W_ERROR_IS_OK(werr
)) {
415 d_fprintf(stderr
, _("open_key failed: %s\n"), win_errstr(werr
));
419 werr
= reg_queryvalue(ctx
, key
, argv
[1], &value
);
420 if (!W_ERROR_IS_OK(werr
)) {
421 d_fprintf(stderr
, _("reg_queryvalue failed: %s\n"),
426 print_registry_value(value
, raw
);
435 static int net_registry_getvalue(struct net_context
*c
, int argc
,
438 return net_registry_getvalue_internal(c
, argc
, argv
, false);
441 static int net_registry_getvalueraw(struct net_context
*c
, int argc
,
444 return net_registry_getvalue_internal(c
, argc
, argv
, true);
447 static int net_registry_getvaluesraw(struct net_context
*c
, int argc
,
452 struct registry_key
*key
= NULL
;
453 TALLOC_CTX
*ctx
= talloc_stackframe();
456 if (argc
!= 1 || c
->display_usage
) {
457 d_fprintf(stderr
, "usage: net rpc registry getvaluesraw "
462 werr
= open_key(ctx
, argv
[0], REG_KEY_READ
, &key
);
463 if (!W_ERROR_IS_OK(werr
)) {
464 d_fprintf(stderr
, "open_key failed: %s\n", win_errstr(werr
));
470 struct registry_value
*val
;
472 werr
= reg_enumvalue(talloc_tos(), key
, idx
, NULL
, &val
);
474 if (W_ERROR_EQUAL(werr
, WERR_NO_MORE_ITEMS
)) {
478 if (!W_ERROR_IS_OK(werr
)) {
481 print_registry_value(val
, true);
490 static int net_registry_setvalue(struct net_context
*c
, int argc
,
494 struct registry_value value
;
495 struct registry_key
*key
= NULL
;
497 TALLOC_CTX
*ctx
= talloc_stackframe();
499 if (argc
< 4 || c
->display_usage
) {
500 d_fprintf(stderr
, "%s\n%s",
502 _("net registry setvalue <key> <valuename> "
503 "<type> [<val>]+\n"));
507 if (!strequal(argv
[2], "multi_sz") && (argc
!= 4)) {
508 d_fprintf(stderr
, _("Too many args for type %s\n"), argv
[2]);
512 if (strequal(argv
[2], "dword")) {
516 v
= smb_strtoul(argv
[3], NULL
, 10, &error
, SMB_STR_STANDARD
);
521 value
.type
= REG_DWORD
;
522 value
.data
= data_blob_talloc(ctx
, NULL
, 4);
523 SIVAL(value
.data
.data
, 0, v
);
524 } else if (strequal(argv
[2], "sz")) {
526 if (!push_reg_sz(ctx
, &value
.data
, argv
[3])) {
529 } else if (strequal(argv
[2], "multi_sz")) {
531 int count
= argc
- 3;
533 value
.type
= REG_MULTI_SZ
;
534 array
= talloc_zero_array(ctx
, const char *, count
+ 1);
538 for (i
=0; i
< count
; i
++) {
539 array
[i
] = talloc_strdup(array
, argv
[count
+i
]);
540 if (array
[i
] == NULL
) {
544 if (!push_reg_multi_sz(ctx
, &value
.data
, array
)) {
548 d_fprintf(stderr
, _("type \"%s\" not implemented\n"), argv
[2]);
552 werr
= open_key(ctx
, argv
[0], REG_KEY_WRITE
, &key
);
553 if (!W_ERROR_IS_OK(werr
)) {
554 d_fprintf(stderr
, _("open_key failed: %s\n"), win_errstr(werr
));
558 werr
= reg_setvalue(key
, argv
[1], &value
);
559 if (!W_ERROR_IS_OK(werr
)) {
560 d_fprintf(stderr
, _("reg_setvalue failed: %s\n"),
572 static int net_registry_increment(struct net_context
*c
, int argc
,
575 TDB_DATA lock_key
= string_term_tdb_data("registry_increment_lock");
576 struct g_lock_ctx
*ctx
= NULL
;
577 const char *keyname
= NULL
;
578 struct registry_key
*key
= NULL
;
579 const char *valuename
= NULL
;
580 struct registry_value
*value
= NULL
;
588 if (argc
< 2 || c
->display_usage
) {
589 d_fprintf(stderr
, "%s\n%s",
591 _("net registry increment <key> <valuename> "
603 increment
= smb_strtoul(
604 argv
[2], NULL
, 10, &error
, SMB_STR_STANDARD
);
610 ctx
= g_lock_ctx_init(c
, c
->msg_ctx
);
612 d_fprintf(stderr
, _("g_lock_ctx_init failed\n"));
616 status
= g_lock_lock(ctx
, lock_key
, G_LOCK_WRITE
, timeval_set(600, 0));
617 if (!NT_STATUS_IS_OK(status
)) {
618 d_fprintf(stderr
, _("g_lock_lock failed: %s\n"),
623 werr
= open_key(c
, keyname
, REG_KEY_READ
|REG_KEY_WRITE
, &key
);
624 if (!W_ERROR_IS_OK(werr
)) {
625 d_fprintf(stderr
, _("open_key failed: %s\n"),
630 werr
= reg_queryvalue(key
, key
, valuename
, &value
);
631 if (!W_ERROR_IS_OK(werr
)) {
632 d_fprintf(stderr
, _("reg_queryvalue failed: %s\n"),
637 if (value
->type
!= REG_DWORD
) {
638 d_fprintf(stderr
, _("value not a DWORD: %s\n"),
639 str_regtype(value
->type
));
643 if (value
->data
.length
< 4) {
644 d_fprintf(stderr
, _("value too short for regular DWORD\n"));
648 v
= IVAL(value
->data
.data
, 0);
652 SIVAL(value
->data
.data
, 0, v
);
654 werr
= reg_setvalue(key
, valuename
, value
);
655 if (!W_ERROR_IS_OK(werr
)) {
656 d_fprintf(stderr
, _("reg_setvalue failed: %s\n"),
661 if (!W_ERROR_IS_OK(werr
)) {
662 d_fprintf(stderr
, _("increment failed: %s\n"),
667 g_lock_unlock(ctx
, lock_key
);
669 d_printf(_("%"PRIu32
"\n"), newvalue
);
680 static int net_registry_deletevalue(struct net_context
*c
, int argc
,
684 struct registry_key
*key
= NULL
;
685 TALLOC_CTX
*ctx
= talloc_stackframe();
688 if (argc
!= 2 || c
->display_usage
) {
689 d_fprintf(stderr
, "%s\n%s",
691 _("net registry deletevalue <key> <valuename>\n"));
695 werr
= open_key(ctx
, argv
[0], REG_KEY_WRITE
, &key
);
696 if (!W_ERROR_IS_OK(werr
)) {
697 d_fprintf(stderr
, _("open_key failed: %s\n"), win_errstr(werr
));
701 werr
= reg_deletevalue(key
, argv
[1]);
702 if (!W_ERROR_IS_OK(werr
)) {
703 d_fprintf(stderr
, _("reg_deletevalue failed: %s\n"),
715 static WERROR
net_registry_getsd_internal(struct net_context
*c
,
718 struct security_descriptor
**sd
)
721 struct registry_key
*key
= NULL
;
722 TALLOC_CTX
*ctx
= talloc_stackframe();
723 uint32_t access_mask
= REG_KEY_READ
|
724 SEC_FLAG_MAXIMUM_ALLOWED
|
725 SEC_FLAG_SYSTEM_SECURITY
;
728 * net_rpc_regsitry uses SEC_FLAG_SYSTEM_SECURITY, but access
729 * is denied with these perms right now...
731 access_mask
= REG_KEY_READ
;
734 d_fprintf(stderr
, _("internal error: invalid argument\n"));
735 werr
= WERR_INVALID_PARAMETER
;
739 if (strlen(keyname
) == 0) {
740 d_fprintf(stderr
, _("error: zero length key name given\n"));
741 werr
= WERR_INVALID_PARAMETER
;
745 werr
= open_key(ctx
, keyname
, access_mask
, &key
);
746 if (!W_ERROR_IS_OK(werr
)) {
747 d_fprintf(stderr
, "%s%s\n", _("open_key failed: "),
752 werr
= reg_getkeysecurity(mem_ctx
, key
, sd
);
753 if (!W_ERROR_IS_OK(werr
)) {
754 d_fprintf(stderr
, "%s%s\n", _("reg_getkeysecurity failed: "),
766 static int net_registry_getsd(struct net_context
*c
, int argc
,
771 struct security_descriptor
*secdesc
= NULL
;
772 TALLOC_CTX
*ctx
= talloc_stackframe();
774 if (argc
!= 1 || c
->display_usage
) {
777 _("net registry getsd <path>\n"));
780 _("net registry getsd 'HKLM\\Software\\Samba'\n"));
784 werr
= net_registry_getsd_internal(c
, ctx
, argv
[0], &secdesc
);
785 if (!W_ERROR_IS_OK(werr
)) {
789 display_sec_desc(secdesc
);
798 static int net_registry_getsd_sddl(struct net_context
*c
,
799 int argc
, const char **argv
)
803 struct security_descriptor
*secdesc
= NULL
;
804 TALLOC_CTX
*ctx
= talloc_stackframe();
806 if (argc
!= 1 || c
->display_usage
) {
809 _("net registry getsd_sddl <path>\n"));
812 _("net registry getsd_sddl 'HKLM\\Software\\Samba'\n"));
816 werr
= net_registry_getsd_internal(c
, ctx
, argv
[0], &secdesc
);
817 if (!W_ERROR_IS_OK(werr
)) {
821 d_printf("%s\n", sddl_encode(ctx
, secdesc
, get_global_sam_sid()));
830 static WERROR
net_registry_setsd_internal(struct net_context
*c
,
833 struct security_descriptor
*sd
)
836 struct registry_key
*key
= NULL
;
837 TALLOC_CTX
*ctx
= talloc_stackframe();
838 uint32_t access_mask
= REG_KEY_WRITE
|
839 SEC_FLAG_MAXIMUM_ALLOWED
|
840 SEC_FLAG_SYSTEM_SECURITY
;
843 * net_rpc_regsitry uses SEC_FLAG_SYSTEM_SECURITY, but access
844 * is denied with these perms right now...
846 access_mask
= REG_KEY_WRITE
;
848 if (strlen(keyname
) == 0) {
849 d_fprintf(stderr
, _("error: zero length key name given\n"));
850 werr
= WERR_INVALID_PARAMETER
;
854 werr
= open_key(ctx
, keyname
, access_mask
, &key
);
855 if (!W_ERROR_IS_OK(werr
)) {
856 d_fprintf(stderr
, "%s%s\n", _("open_key failed: "),
861 werr
= reg_setkeysecurity(key
, sd
);
862 if (!W_ERROR_IS_OK(werr
)) {
863 d_fprintf(stderr
, "%s%s\n", _("reg_setkeysecurity failed: "),
875 static int net_registry_setsd_sddl(struct net_context
*c
,
876 int argc
, const char **argv
)
880 struct security_descriptor
*secdesc
= NULL
;
881 TALLOC_CTX
*ctx
= talloc_stackframe();
883 if (argc
!= 2 || c
->display_usage
) {
886 _("net registry setsd_sddl <path> <security_descriptor>\n"));
889 _("net registry setsd_sddl 'HKLM\\Software\\Samba'\n"));
893 secdesc
= sddl_decode(ctx
, argv
[1], get_global_sam_sid());
894 if (secdesc
== NULL
) {
898 werr
= net_registry_setsd_internal(c
, ctx
, argv
[0], secdesc
);
899 if (!W_ERROR_IS_OK(werr
)) {
910 /******************************************************************************/
912 * @defgroup net_registry net registry
916 * @defgroup net_registry_import Import
917 * @ingroup net_registry
926 static WERROR
import_create_key(struct import_ctx
*ctx
,
927 struct registry_key
*parent
,
928 const char *name
, void **pkey
, bool *existing
)
931 TALLOC_CTX
*mem_ctx
= talloc_new(ctx
->mem_ctx
);
933 struct registry_key
*key
= NULL
;
934 enum winreg_CreateAction action
;
936 if (parent
== NULL
) {
937 char *subkeyname
= NULL
;
938 werr
= open_hive(mem_ctx
, name
, REG_KEY_WRITE
,
939 &parent
, &subkeyname
);
940 if (!W_ERROR_IS_OK(werr
)) {
941 d_fprintf(stderr
, _("open_hive failed: %s\n"),
948 action
= REG_ACTION_NONE
;
949 werr
= reg_createkey(mem_ctx
, parent
, name
, REG_KEY_WRITE
,
951 if (!W_ERROR_IS_OK(werr
)) {
952 d_fprintf(stderr
, _("reg_createkey failed: %s\n"),
957 if (action
== REG_ACTION_NONE
) {
958 d_fprintf(stderr
, _("createkey did nothing -- huh?\n"));
959 werr
= WERR_CREATE_FAILED
;
963 if (existing
!= NULL
) {
964 *existing
= (action
== REG_OPENED_EXISTING_KEY
);
968 *pkey
= talloc_steal(ctx
->mem_ctx
, key
);
972 talloc_free(mem_ctx
);
976 static WERROR
import_close_key(struct import_ctx
*ctx
,
977 struct registry_key
*key
)
982 static WERROR
import_delete_key(struct import_ctx
*ctx
,
983 struct registry_key
*parent
, const char *name
)
986 TALLOC_CTX
*mem_ctx
= talloc_new(talloc_tos());
988 if (parent
== NULL
) {
989 char *subkeyname
= NULL
;
990 werr
= open_hive(mem_ctx
, name
, REG_KEY_WRITE
,
991 &parent
, &subkeyname
);
992 if (!W_ERROR_IS_OK(werr
)) {
993 d_fprintf(stderr
, _("open_hive failed: %s\n"),
1000 werr
= reg_deletekey_recursive(parent
, name
);
1001 if (!W_ERROR_IS_OK(werr
)) {
1002 d_fprintf(stderr
, "reg_deletekey_recursive %s: %s\n",
1003 _("failed"), win_errstr(werr
));
1008 talloc_free(mem_ctx
);
1012 static WERROR
import_create_val (struct import_ctx
*ctx
,
1013 struct registry_key
*parent
, const char *name
,
1014 const struct registry_value
*value
)
1018 if (parent
== NULL
) {
1019 return WERR_INVALID_PARAMETER
;
1022 werr
= reg_setvalue(parent
, name
, value
);
1023 if (!W_ERROR_IS_OK(werr
)) {
1024 d_fprintf(stderr
, _("reg_setvalue failed: %s\n"),
1030 static WERROR
import_delete_val (struct import_ctx
*ctx
,
1031 struct registry_key
*parent
, const char *name
)
1035 if (parent
== NULL
) {
1036 return WERR_INVALID_PARAMETER
;
1039 werr
= reg_deletevalue(parent
, name
);
1040 if (!W_ERROR_IS_OK(werr
)) {
1041 d_fprintf(stderr
, _("reg_deletevalue failed: %s\n"),
1048 struct precheck_ctx
{
1049 TALLOC_CTX
*mem_ctx
;
1053 static WERROR
precheck_create_key(struct precheck_ctx
*ctx
,
1054 struct registry_key
*parent
,
1055 const char *name
, void **pkey
, bool *existing
)
1058 TALLOC_CTX
*frame
= talloc_stackframe();
1059 struct registry_key
*key
= NULL
;
1061 if (parent
== NULL
) {
1062 char *subkeyname
= NULL
;
1063 werr
= open_hive(frame
, name
, REG_KEY_READ
,
1064 &parent
, &subkeyname
);
1065 if (!W_ERROR_IS_OK(werr
)) {
1066 d_printf("Precheck: open_hive of [%s] failed: %s\n",
1067 name
, win_errstr(werr
));
1073 werr
= reg_openkey(frame
, parent
, name
, 0, &key
);
1074 if (!W_ERROR_IS_OK(werr
)) {
1075 d_printf("Precheck: openkey [%s] failed: %s\n",
1076 name
, win_errstr(werr
));
1080 if (existing
!= NULL
) {
1085 *pkey
= talloc_steal(ctx
->mem_ctx
, key
);
1090 ctx
->failed
= !W_ERROR_IS_OK(werr
);
1094 static WERROR
precheck_close_key(struct precheck_ctx
*ctx
,
1095 struct registry_key
*key
)
1101 static WERROR
precheck_delete_key(struct precheck_ctx
*ctx
,
1102 struct registry_key
*parent
, const char *name
)
1105 TALLOC_CTX
*frame
= talloc_stackframe();
1106 struct registry_key
*key
;
1108 if (parent
== NULL
) {
1109 char *subkeyname
= NULL
;
1110 werr
= open_hive(frame
, name
, REG_KEY_READ
,
1111 &parent
, &subkeyname
);
1112 if (!W_ERROR_IS_OK(werr
)) {
1113 d_printf("Precheck: open_hive of [%s] failed: %s\n",
1114 name
, win_errstr(werr
));
1120 werr
= reg_openkey(ctx
->mem_ctx
, parent
, name
, 0, &key
);
1121 if (W_ERROR_IS_OK(werr
)) {
1122 d_printf("Precheck: key [%s\\%s] should not exist\n",
1123 parent
->key
->name
, name
);
1124 werr
= WERR_FILE_EXISTS
;
1125 } else if (W_ERROR_EQUAL(werr
, WERR_FILE_NOT_FOUND
)) {
1128 d_printf("Precheck: openkey [%s\\%s] failed: %s\n",
1129 parent
->key
->name
, name
, win_errstr(werr
));
1134 ctx
->failed
= !W_ERROR_IS_OK(werr
);
1138 static WERROR
precheck_create_val(struct precheck_ctx
*ctx
,
1139 struct registry_key
*parent
,
1141 const struct registry_value
*value
)
1143 TALLOC_CTX
*frame
= talloc_stackframe();
1144 struct registry_value
*old
;
1149 werr
= reg_queryvalue(frame
, parent
, name
, &old
);
1150 if (!W_ERROR_IS_OK(werr
)) {
1151 d_printf("Precheck: queryvalue \"%s\" of [%s] failed: %s\n",
1152 name
, parent
->key
->name
, win_errstr(werr
));
1155 if (registry_value_cmp(value
, old
) != 0) {
1156 d_printf("Precheck: unexpected value \"%s\" of key [%s]\n",
1157 name
, parent
->key
->name
);
1165 static WERROR
precheck_delete_val(struct precheck_ctx
*ctx
,
1166 struct registry_key
*parent
,
1169 TALLOC_CTX
*frame
= talloc_stackframe();
1170 struct registry_value
*old
;
1175 werr
= reg_queryvalue(frame
, parent
, name
, &old
);
1176 if (W_ERROR_IS_OK(werr
)) {
1177 d_printf("Precheck: value \"%s\" of key [%s] should not exist\n",
1178 name
, parent
->key
->name
);
1179 werr
= WERR_FILE_EXISTS
;
1180 } else if (W_ERROR_EQUAL(werr
, WERR_FILE_NOT_FOUND
)) {
1183 printf("Precheck: queryvalue \"%s\" of key [%s] failed: %s\n",
1184 name
, parent
->key
->name
, win_errstr(werr
));
1188 ctx
->failed
= !W_ERROR_IS_OK(werr
);
1192 static bool import_precheck(const char *fname
, const char *parse_options
)
1194 TALLOC_CTX
*mem_ctx
= talloc_tos();
1195 struct precheck_ctx precheck_ctx
= {
1199 struct reg_import_callback precheck_callback
= {
1201 .closekey
= (reg_import_callback_closekey_t
)&precheck_close_key
,
1202 .createkey
= (reg_import_callback_createkey_t
)&precheck_create_key
,
1203 .deletekey
= (reg_import_callback_deletekey_t
)&precheck_delete_key
,
1204 .deleteval
= (reg_import_callback_deleteval_t
)&precheck_delete_val
,
1206 .registry_value
= (reg_import_callback_setval_registry_value_t
)
1207 &precheck_create_val
,
1209 .setval_type
= REGISTRY_VALUE
,
1210 .data
= &precheck_ctx
1212 struct reg_parse_callback
*parse_callback
;
1219 parse_callback
= reg_import_adapter(mem_ctx
, precheck_callback
);
1220 if (parse_callback
== NULL
) {
1221 d_printf("talloc failed\n");
1225 ret
= reg_parse_file(fname
, parse_callback
, parse_options
);
1227 if (ret
< 0 || precheck_ctx
.failed
) {
1228 d_printf("Precheck failed\n");
1234 static int import_with_precheck_action(const char *import_fname
,
1235 const char *precheck_fname
,
1236 const char *parse_options
)
1238 TALLOC_CTX
*frame
= talloc_stackframe();
1239 struct import_ctx import_ctx
= {
1242 struct reg_import_callback import_callback
= {
1244 .closekey
= (reg_import_callback_closekey_t
)&import_close_key
,
1245 .createkey
= (reg_import_callback_createkey_t
)&import_create_key
,
1246 .deletekey
= (reg_import_callback_deletekey_t
)&import_delete_key
,
1247 .deleteval
= (reg_import_callback_deleteval_t
)&import_delete_val
,
1249 .registry_value
= (reg_import_callback_setval_registry_value_t
)
1252 .setval_type
= REGISTRY_VALUE
,
1255 struct reg_parse_callback
*parse_callback
;
1259 precheck_ok
= import_precheck(precheck_fname
, parse_options
);
1264 parse_callback
= reg_import_adapter(frame
, import_callback
);
1265 if (parse_callback
== NULL
) {
1266 d_printf("talloc failed\n");
1270 ret
= reg_parse_file(import_fname
, parse_callback
, parse_options
);
1277 static int net_registry_import(struct net_context
*c
, int argc
,
1280 const char *parse_options
= (argc
> 1) ? argv
[1] : NULL
;
1284 if (argc
< 1 || argc
> 2 || c
->display_usage
) {
1287 _("net registry import <reg> [options]\n"));
1290 _("net registry import file.reg enc=CP1252\n"));
1294 werr
= regdb_open();
1295 if (!W_ERROR_IS_OK(werr
)) {
1296 d_printf("Failed to open regdb: %s\n", win_errstr(werr
));
1300 werr
= regdb_transaction_start();
1301 if (!W_ERROR_IS_OK(werr
)) {
1302 d_printf("Failed to start transaction on regdb: %s\n",
1307 ret
= import_with_precheck_action(argv
[0], c
->opt_precheck
,
1311 d_printf("Transaction canceled!\n");
1312 regdb_transaction_cancel();
1316 SMB_ASSERT(ret
== 0);
1318 if (c
->opt_testmode
) {
1319 d_printf("Testmode: not committing changes.\n");
1320 regdb_transaction_cancel();
1324 werr
= regdb_transaction_commit();
1325 if (!W_ERROR_IS_OK(werr
)) {
1326 d_printf("Failed to commit transaction on regdb: %s\n",
1337 /******************************************************************************/
1340 * @defgroup net_registry_export Export
1341 * @ingroup net_registry
1345 static int registry_export(TALLOC_CTX
*ctx
, /*const*/ struct registry_key
*key
,
1346 struct reg_format
*f
)
1352 struct registry_value
*valvalue
= NULL
;
1353 char *valname
= NULL
;
1355 char *subkey_name
= NULL
;
1358 reg_format_registry_key(f
, key
, false);
1362 werr
= reg_enumvalue(ctx
, key
, count
, &valname
, &valvalue
),
1363 W_ERROR_IS_OK(werr
);
1366 reg_format_registry_value(f
, valname
, valvalue
);
1368 if (!W_ERROR_EQUAL(WERR_NO_MORE_ITEMS
, werr
)) {
1369 d_fprintf(stderr
, _("reg_enumvalue failed: %s\n"),
1374 /* recurse on subkeys */
1376 werr
= reg_enumkey(ctx
, key
, count
, &subkey_name
, &modtime
),
1377 W_ERROR_IS_OK(werr
);
1380 struct registry_key
*subkey
= NULL
;
1382 werr
= reg_openkey(ctx
, key
, subkey_name
, REG_KEY_READ
,
1384 if (!W_ERROR_IS_OK(werr
)) {
1385 d_fprintf(stderr
, _("reg_openkey failed: %s\n"),
1390 registry_export(ctx
, subkey
, f
);
1391 TALLOC_FREE(subkey
);
1393 if (!W_ERROR_EQUAL(WERR_NO_MORE_ITEMS
, werr
)) {
1394 d_fprintf(stderr
, _("reg_enumkey failed: %s\n"),
1403 static int net_registry_export(struct net_context
*c
, int argc
,
1408 struct registry_key
*key
= NULL
;
1409 TALLOC_CTX
*ctx
= talloc_stackframe();
1410 struct reg_format
*f
=NULL
;
1412 if (argc
< 2 || argc
> 3 || c
->display_usage
) {
1415 _("net registry export <path> <file> [opt]\n"));
1418 _("net registry export 'HKLM\\Software\\Samba' "
1419 "samba.reg regedit5\n"));
1423 werr
= open_key(ctx
, argv
[0], REG_KEY_READ
, &key
);
1424 if (!W_ERROR_IS_OK(werr
)) {
1425 d_fprintf(stderr
, _("open_key failed: %s\n"), win_errstr(werr
));
1429 f
= reg_format_file(ctx
, argv
[1], (argc
> 2) ? argv
[2] : NULL
);
1431 d_fprintf(stderr
, _("open file failed: %s\n"), strerror(errno
));
1435 ret
= registry_export(ctx
, key
, f
);
1443 /******************************************************************************/
1445 * @defgroup net_registry_convert Convert
1446 * @ingroup net_registry
1450 static int net_registry_convert(struct net_context
*c
, int argc
,
1454 TALLOC_CTX
*mem_ctx
;
1455 const char *in_opt
= NULL
;
1456 const char *out_opt
= NULL
;
1458 if (argc
< 2 || argc
> 4|| c
->display_usage
) {
1461 _("net registry convert <in> <out> [in_opt] [out_opt]\n"
1462 "net registry convert <in> <out> [out_opt]\n"));
1465 _("net registry convert in.reg out.reg regedit4,enc=CP1252\n"));
1469 mem_ctx
= talloc_stackframe();
1486 ret
= reg_parse_file(argv
[0], (struct reg_parse_callback
*)
1487 reg_format_file(mem_ctx
, argv
[1], out_opt
),
1490 talloc_free(mem_ctx
);
1496 static int net_registry_check(struct net_context
*c
, int argc
,
1500 struct check_options opts
;
1503 if (argc
> 1|| c
->display_usage
) {
1506 _("net registry check [-vraTfl] [-o <ODB>] [--wipe] [<TDB>]\n"
1507 " Check a registry database.\n"
1508 " -v|--verbose\t be verbose\n"
1509 " -r|--repair\t\t interactive repair mode\n"
1510 " -a|--auto\t\t noninteractive repair mode\n"
1511 " -T|--test\t\t dry run\n"
1512 " -f|--force\t\t force\n"
1513 " -l|--lock\t\t lock <TDB> while doing the check\n"
1514 " -o|--output=<ODB>\t output database\n"
1515 " --reg-version=n\t assume database format version {n|1,2,3}\n"
1516 " --wipe\t\t create a new database from scratch\n"
1517 " --db=<TDB>\t\t registry database to open\n"));
1518 return c
->display_usage
? 0 : -1;
1521 if (c
->opt_db
!= NULL
) {
1522 dbfile
= talloc_strdup(talloc_tos(), c
->opt_db
);
1523 } else if (argc
> 0) {
1524 dbfile
= talloc_strdup(talloc_tos(), argv
[0]);
1526 dbfile
= state_path(talloc_tos(), "registry.tdb");
1528 if (dbfile
== NULL
) {
1532 opts
= (struct check_options
) {
1533 .lock
= c
->opt_lock
|| c
->opt_long_list_entries
,
1534 .test
= c
->opt_testmode
,
1535 .automatic
= c
->opt_auto
,
1536 .verbose
= c
->opt_verbose
,
1537 .force
= c
->opt_force
,
1538 .repair
= c
->opt_repair
|| c
->opt_reboot
,
1539 .version
= c
->opt_reg_version
,
1540 .output
= c
->opt_output
,
1541 .wipe
= c
->opt_wipe
,
1542 .implicit_db
= (c
->opt_db
== NULL
) && (argc
== 0),
1545 ret
= net_registry_check_db(dbfile
, &opts
);
1546 talloc_free(dbfile
);
1551 /******************************************************************************/
1553 int net_registry(struct net_context
*c
, int argc
, const char **argv
)
1557 struct functable func
[] = {
1560 net_registry_enumerate
,
1561 NET_TRANSPORT_LOCAL
,
1562 N_("Enumerate registry keys and values"),
1563 N_("net registry enumerate\n"
1564 " Enumerate registry keys and values")
1567 "enumerate_recursive",
1568 net_registry_enumerate_recursive
,
1569 NET_TRANSPORT_LOCAL
,
1570 N_("Enumerate registry keys and values"),
1571 N_("net registry enumerate_recursive\n"
1572 " Enumerate registry keys and values")
1576 net_registry_createkey
,
1577 NET_TRANSPORT_LOCAL
,
1578 N_("Create a new registry key"),
1579 N_("net registry createkey\n"
1580 " Create a new registry key")
1584 net_registry_deletekey
,
1585 NET_TRANSPORT_LOCAL
,
1586 N_("Delete a registry key"),
1587 N_("net registry deletekey\n"
1588 " Delete a registry key")
1591 "deletekey_recursive",
1592 net_registry_deletekey_recursive
,
1593 NET_TRANSPORT_LOCAL
,
1594 N_("Delete a registry key with subkeys"),
1595 N_("net registry deletekey_recursive\n"
1596 " Delete a registry key with subkeys")
1600 net_registry_getvalue
,
1601 NET_TRANSPORT_LOCAL
,
1602 N_("Print a registry value"),
1603 N_("net registry getvalue\n"
1604 " Print a registry value")
1608 net_registry_getvalueraw
,
1609 NET_TRANSPORT_LOCAL
,
1610 N_("Print a registry value (raw format)"),
1611 N_("net registry getvalueraw\n"
1612 " Print a registry value (raw format)")
1616 net_registry_getvaluesraw
,
1617 NET_TRANSPORT_LOCAL
,
1618 "Print all values of a key in raw format",
1619 "net registry getvaluesraw <key>\n"
1620 " Print a registry value (raw format)"
1624 net_registry_setvalue
,
1625 NET_TRANSPORT_LOCAL
,
1626 N_("Set a new registry value"),
1627 N_("net registry setvalue\n"
1628 " Set a new registry value")
1632 net_registry_increment
,
1633 NET_TRANSPORT_LOCAL
,
1634 N_("Increment a DWORD registry value under a lock"),
1635 N_("net registry increment\n"
1636 " Increment a DWORD registry value under a lock")
1640 net_registry_deletevalue
,
1641 NET_TRANSPORT_LOCAL
,
1642 N_("Delete a registry value"),
1643 N_("net registry deletevalue\n"
1644 " Delete a registry value")
1649 NET_TRANSPORT_LOCAL
,
1650 N_("Get security descriptor"),
1651 N_("net registry getsd\n"
1652 " Get security descriptor")
1656 net_registry_getsd_sddl
,
1657 NET_TRANSPORT_LOCAL
,
1658 N_("Get security descriptor in sddl format"),
1659 N_("net registry getsd_sddl\n"
1660 " Get security descriptor in sddl format")
1664 net_registry_setsd_sddl
,
1665 NET_TRANSPORT_LOCAL
,
1666 N_("Set security descriptor from sddl format string"),
1667 N_("net registry setsd_sddl\n"
1668 " Set security descriptor from sddl format string")
1672 net_registry_import
,
1673 NET_TRANSPORT_LOCAL
,
1674 N_("Import .reg file"),
1675 N_("net registry import\n"
1676 " Import .reg file")
1680 net_registry_export
,
1681 NET_TRANSPORT_LOCAL
,
1682 N_("Export .reg file"),
1683 N_("net registry export\n"
1684 " Export .reg file")
1688 net_registry_convert
,
1689 NET_TRANSPORT_LOCAL
,
1690 N_("Convert .reg file"),
1691 N_("net registry convert\n"
1692 " Convert .reg file")
1697 NET_TRANSPORT_LOCAL
,
1698 N_("Check a registry database"),
1699 N_("net registry check\n"
1700 " Check a registry database")
1702 { NULL
, NULL
, 0, NULL
, NULL
}
1705 if (!c
->display_usage
1707 && (strcasecmp_m(argv
[0], "convert") != 0)
1708 && (strcasecmp_m(argv
[0], "check") != 0))
1710 if (!W_ERROR_IS_OK(registry_init_basic())) {
1715 ret
= net_run_function(c
, argc
, argv
, "net registry", func
);