2 * Unix SMB/CIFS implementation.
3 * Shell around net rpc subcommands
4 * Copyright (C) Volker Lendecke 2006
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 3 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, see <http://www.gnu.org/licenses/>.
22 #include "popt_common.h"
23 #include "utils/net.h"
24 #include "rpc_client/cli_pipe.h"
25 #include "../librpc/gen_ndr/ndr_samr.h"
26 #include "lib/netapi/netapi.h"
27 #include "lib/netapi/netapi_net.h"
28 #include "../libcli/smbreadline/smbreadline.h"
29 #include "libsmb/libsmb.h"
30 #include "libcli/security/dom_sid.h"
32 static NTSTATUS
rpc_sh_info(struct net_context
*c
,
33 TALLOC_CTX
*mem_ctx
, struct rpc_sh_ctx
*ctx
,
34 struct rpc_pipe_client
*pipe_hnd
,
35 int argc
, const char **argv
)
37 return rpc_info_internals(c
, ctx
->domain_sid
, ctx
->domain_name
,
38 ctx
->cli
, pipe_hnd
, mem_ctx
,
42 static struct rpc_sh_ctx
*this_ctx
;
44 static char **completion_fn(const char *text
, int start
, int end
)
54 ADD_TO_ARRAY(NULL
, char *, SMB_STRDUP(text
), &cmds
, &n_cmds
);
56 for (c
= this_ctx
->cmds
; c
->name
!= NULL
; c
++) {
57 bool match
= (strncmp(text
, c
->name
, strlen(text
)) == 0);
60 ADD_TO_ARRAY(NULL
, char *, SMB_STRDUP(c
->name
),
71 ADD_TO_ARRAY(NULL
, char *, NULL
, &cmds
, &n_cmds
);
75 static NTSTATUS
net_sh_run(struct net_context
*c
,
76 struct rpc_sh_ctx
*ctx
, struct rpc_sh_cmd
*cmd
,
77 int argc
, const char **argv
)
80 struct rpc_pipe_client
*pipe_hnd
= NULL
;
83 mem_ctx
= talloc_new(ctx
);
84 if (mem_ctx
== NULL
) {
85 d_fprintf(stderr
, _("talloc_new failed\n"));
86 return NT_STATUS_NO_MEMORY
;
89 status
= cli_rpc_pipe_open_noauth(ctx
->cli
, cmd
->table
,
91 if (!NT_STATUS_IS_OK(status
)) {
92 d_fprintf(stderr
, _("Could not open pipe: %s\n"),
97 status
= cmd
->fn(c
, mem_ctx
, ctx
, pipe_hnd
, argc
, argv
);
99 TALLOC_FREE(pipe_hnd
);
101 talloc_destroy(mem_ctx
);
106 static bool net_sh_process(struct net_context
*c
,
107 struct rpc_sh_ctx
*ctx
,
108 int argc
, const char **argv
)
110 struct rpc_sh_cmd
*cmd
;
111 struct rpc_sh_ctx
*new_ctx
;
118 if (ctx
== this_ctx
) {
120 /* We've been called from the cmd line */
121 if (strequal(argv
[0], "..") &&
122 (this_ctx
->parent
!= NULL
)) {
123 new_ctx
= this_ctx
->parent
;
124 TALLOC_FREE(this_ctx
);
130 if (strequal(argv
[0], "exit") ||
131 strequal(argv
[0], "quit") ||
132 strequal(argv
[0], "q")) {
136 if (strequal(argv
[0], "help") || strequal(argv
[0], "?")) {
137 for (cmd
= ctx
->cmds
; cmd
->name
!= NULL
; cmd
++) {
138 if (ctx
!= this_ctx
) {
139 d_printf("%s ", ctx
->whoami
);
141 d_printf("%-15s %s\n", cmd
->name
, cmd
->help
);
146 for (cmd
= ctx
->cmds
; cmd
->name
!= NULL
; cmd
++) {
147 if (strequal(cmd
->name
, argv
[0])) {
152 if (cmd
->name
== NULL
) {
154 d_fprintf(stderr
,_( "%s: unknown cmd\n"), argv
[0]);
158 new_ctx
= talloc(ctx
, struct rpc_sh_ctx
);
159 if (new_ctx
== NULL
) {
160 d_fprintf(stderr
, _("talloc failed\n"));
163 new_ctx
->cli
= ctx
->cli
;
164 new_ctx
->whoami
= talloc_asprintf(new_ctx
, "%s %s",
165 ctx
->whoami
, cmd
->name
);
166 new_ctx
->thiscmd
= talloc_strdup(new_ctx
, cmd
->name
);
168 if (cmd
->sub
!= NULL
) {
169 new_ctx
->cmds
= cmd
->sub(c
, new_ctx
, ctx
);
171 new_ctx
->cmds
= NULL
;
174 new_ctx
->parent
= ctx
;
175 new_ctx
->domain_name
= ctx
->domain_name
;
176 new_ctx
->domain_sid
= ctx
->domain_sid
;
181 if (cmd
->sub
!= NULL
) {
186 return net_sh_process(c
, new_ctx
, argc
, argv
);
189 status
= net_sh_run(c
, new_ctx
, cmd
, argc
, argv
);
191 if (!NT_STATUS_IS_OK(status
)) {
192 d_fprintf(stderr
, _("%s failed: %s\n"), new_ctx
->whoami
,
199 static struct rpc_sh_cmd sh_cmds
[6] = {
201 { "info", NULL
, &ndr_table_samr
, rpc_sh_info
,
202 N_("Print information about the domain connected to") },
204 { "rights", net_rpc_rights_cmds
, 0, NULL
,
205 N_("List/Grant/Revoke user rights") },
207 { "share", net_rpc_share_cmds
, 0, NULL
,
208 N_("List/Add/Remove etc shares") },
210 { "user", net_rpc_user_cmds
, 0, NULL
,
211 N_("List/Add/Remove user info") },
213 { "account", net_rpc_acct_cmds
, 0, NULL
,
214 N_("Show/Change account policy settings") },
216 { NULL
, NULL
, 0, NULL
, NULL
}
219 int net_rpc_shell(struct net_context
*c
, int argc
, const char **argv
)
222 struct rpc_sh_ctx
*ctx
;
223 struct dom_sid_buf buf
;
225 if (argc
!= 0 || c
->display_usage
) {
226 d_printf("%s\nnet rpc shell\n", _("Usage:"));
230 if (libnetapi_net_init(&c
->netapi_ctx
) != 0) {
233 libnetapi_set_username(c
->netapi_ctx
, c
->opt_user_name
);
234 libnetapi_set_password(c
->netapi_ctx
, c
->opt_password
);
235 if (c
->opt_kerberos
) {
236 libnetapi_set_use_kerberos(c
->netapi_ctx
);
239 ctx
= talloc(NULL
, struct rpc_sh_ctx
);
241 d_fprintf(stderr
, _("talloc failed\n"));
245 status
= net_make_ipc_connection(c
, 0, &(ctx
->cli
));
246 if (!NT_STATUS_IS_OK(status
)) {
247 d_fprintf(stderr
, _("Could not open connection: %s\n"),
253 ctx
->whoami
= "net rpc";
256 status
= net_get_remote_domain_sid(ctx
->cli
, ctx
, &ctx
->domain_sid
,
258 if (!NT_STATUS_IS_OK(status
)) {
262 d_printf(_("Talking to domain %s (%s)\n"), ctx
->domain_name
,
263 dom_sid_str_buf(ctx
->domain_sid
, &buf
));
272 if (asprintf(&prompt
, "%s> ", this_ctx
->whoami
) < 0) {
276 line
= smb_readline(prompt
, NULL
, completion_fn
);
283 ret
= poptParseArgvString(line
, &argc
, &argv
);
284 if (ret
== POPT_ERROR_NOARG
) {
289 d_fprintf(stderr
, _("cmdline invalid: %s\n"),
295 if ((line
[0] != '\n') &&
296 (!net_sh_process(c
, this_ctx
, argc
, argv
))) {
303 cli_shutdown(ctx
->cli
);