s3: smbd: Make extract_snapshot_token() a wrapper for extract_snapshot_token_internal().
[Samba.git] / source3 / utils / net_rpc_shell.c
blob634c5b5248af49ceddc6ffb51b5b5ca57632fab2
1 /*
2 * Unix SMB/CIFS implementation.
3 * Shell around net rpc subcommands
4 * Copyright (C) Volker Lendecke 2006
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 3 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, see <http://www.gnu.org/licenses/>.
21 #include "includes.h"
22 #include "utils/net.h"
23 #include "rpc_client/cli_pipe.h"
24 #include "../librpc/gen_ndr/ndr_samr.h"
25 #include "lib/netapi/netapi.h"
26 #include "lib/netapi/netapi_net.h"
27 #include "../libcli/smbreadline/smbreadline.h"
28 #include "libsmb/libsmb.h"
29 #include "libcli/security/dom_sid.h"
31 #include <popt.h>
33 static NTSTATUS rpc_sh_info(struct net_context *c,
34 TALLOC_CTX *mem_ctx, struct rpc_sh_ctx *ctx,
35 struct rpc_pipe_client *pipe_hnd,
36 int argc, const char **argv)
38 return rpc_info_internals(c, ctx->domain_sid, ctx->domain_name,
39 ctx->cli, pipe_hnd, mem_ctx,
40 argc, argv);
43 static struct rpc_sh_ctx *this_ctx;
45 static char **completion_fn(const char *text, int start, int end)
47 char **cmds = NULL;
48 int n_cmds = 0;
49 struct rpc_sh_cmd *c;
51 if (start != 0) {
52 return NULL;
55 ADD_TO_ARRAY(NULL, char *, SMB_STRDUP(text), &cmds, &n_cmds);
57 for (c = this_ctx->cmds; c->name != NULL; c++) {
58 bool match = (strncmp(text, c->name, strlen(text)) == 0);
60 if (match) {
61 ADD_TO_ARRAY(NULL, char *, SMB_STRDUP(c->name),
62 &cmds, &n_cmds);
66 if (n_cmds == 2) {
67 SAFE_FREE(cmds[0]);
68 cmds[0] = cmds[1];
69 n_cmds -= 1;
72 ADD_TO_ARRAY(NULL, char *, NULL, &cmds, &n_cmds);
73 return cmds;
76 static NTSTATUS net_sh_run(struct net_context *c,
77 struct rpc_sh_ctx *ctx, struct rpc_sh_cmd *cmd,
78 int argc, const char **argv)
80 TALLOC_CTX *mem_ctx;
81 struct rpc_pipe_client *pipe_hnd = NULL;
82 NTSTATUS status;
84 mem_ctx = talloc_new(ctx);
85 if (mem_ctx == NULL) {
86 d_fprintf(stderr, _("talloc_new failed\n"));
87 return NT_STATUS_NO_MEMORY;
90 status = cli_rpc_pipe_open_noauth(ctx->cli, cmd->table,
91 &pipe_hnd);
92 if (!NT_STATUS_IS_OK(status)) {
93 d_fprintf(stderr, _("Could not open pipe: %s\n"),
94 nt_errstr(status));
95 return status;
98 status = cmd->fn(c, mem_ctx, ctx, pipe_hnd, argc, argv);
100 TALLOC_FREE(pipe_hnd);
102 talloc_destroy(mem_ctx);
104 return status;
107 static bool net_sh_process(struct net_context *c,
108 struct rpc_sh_ctx *ctx,
109 int argc, const char **argv)
111 struct rpc_sh_cmd *cmd;
112 struct rpc_sh_ctx *new_ctx;
113 NTSTATUS status;
115 if (argc == 0) {
116 return true;
119 if (ctx == this_ctx) {
121 /* We've been called from the cmd line */
122 if (strequal(argv[0], "..") &&
123 (this_ctx->parent != NULL)) {
124 new_ctx = this_ctx->parent;
125 TALLOC_FREE(this_ctx);
126 this_ctx = new_ctx;
127 return true;
131 if (strequal(argv[0], "exit") ||
132 strequal(argv[0], "quit") ||
133 strequal(argv[0], "q")) {
134 return false;
137 if (strequal(argv[0], "help") || strequal(argv[0], "?")) {
138 for (cmd = ctx->cmds; cmd->name != NULL; cmd++) {
139 if (ctx != this_ctx) {
140 d_printf("%s ", ctx->whoami);
142 d_printf("%-15s %s\n", cmd->name, cmd->help);
144 return true;
147 for (cmd = ctx->cmds; cmd->name != NULL; cmd++) {
148 if (strequal(cmd->name, argv[0])) {
149 break;
153 if (cmd->name == NULL) {
154 /* None found */
155 d_fprintf(stderr,_( "%s: unknown cmd\n"), argv[0]);
156 return true;
159 new_ctx = talloc(ctx, struct rpc_sh_ctx);
160 if (new_ctx == NULL) {
161 d_fprintf(stderr, _("talloc failed\n"));
162 return false;
164 new_ctx->cli = ctx->cli;
165 new_ctx->whoami = talloc_asprintf(new_ctx, "%s %s",
166 ctx->whoami, cmd->name);
167 new_ctx->thiscmd = talloc_strdup(new_ctx, cmd->name);
169 if (cmd->sub != NULL) {
170 new_ctx->cmds = cmd->sub(c, new_ctx, ctx);
171 } else {
172 new_ctx->cmds = NULL;
175 new_ctx->parent = ctx;
176 new_ctx->domain_name = ctx->domain_name;
177 new_ctx->domain_sid = ctx->domain_sid;
179 argc -= 1;
180 argv += 1;
182 if (cmd->sub != NULL) {
183 if (argc == 0) {
184 this_ctx = new_ctx;
185 return true;
187 return net_sh_process(c, new_ctx, argc, argv);
190 status = net_sh_run(c, new_ctx, cmd, argc, argv);
192 if (!NT_STATUS_IS_OK(status)) {
193 d_fprintf(stderr, _("%s failed: %s\n"), new_ctx->whoami,
194 nt_errstr(status));
197 return true;
200 static struct rpc_sh_cmd sh_cmds[6] = {
202 { "info", NULL, &ndr_table_samr, rpc_sh_info,
203 N_("Print information about the domain connected to") },
205 { "rights", net_rpc_rights_cmds, 0, NULL,
206 N_("List/Grant/Revoke user rights") },
208 { "share", net_rpc_share_cmds, 0, NULL,
209 N_("List/Add/Remove etc shares") },
211 { "user", net_rpc_user_cmds, 0, NULL,
212 N_("List/Add/Remove user info") },
214 { "account", net_rpc_acct_cmds, 0, NULL,
215 N_("Show/Change account policy settings") },
217 { NULL, NULL, 0, NULL, NULL }
220 int net_rpc_shell(struct net_context *c, int argc, const char **argv)
222 NTSTATUS status;
223 struct rpc_sh_ctx *ctx;
224 struct dom_sid_buf buf;
225 NET_API_STATUS net_api_status;
227 if (argc != 0 || c->display_usage) {
228 d_printf("%s\nnet rpc shell\n", _("Usage:"));
229 return -1;
232 if (libnetapi_net_init(&c->netapi_ctx) != 0) {
233 return -1;
236 net_api_status = libnetapi_set_creds(c->netapi_ctx, c->creds);
237 if (net_api_status != 0) {
238 return -1;
241 ctx = talloc(NULL, struct rpc_sh_ctx);
242 if (ctx == NULL) {
243 d_fprintf(stderr, _("talloc failed\n"));
244 return -1;
247 status = net_make_ipc_connection(c, 0, &(ctx->cli));
248 if (!NT_STATUS_IS_OK(status)) {
249 d_fprintf(stderr, _("Could not open connection: %s\n"),
250 nt_errstr(status));
251 return -1;
254 ctx->cmds = sh_cmds;
255 ctx->whoami = "net rpc";
256 ctx->parent = NULL;
258 status = net_get_remote_domain_sid(ctx->cli, ctx, &ctx->domain_sid,
259 &ctx->domain_name);
260 if (!NT_STATUS_IS_OK(status)) {
261 return -1;
264 d_printf(_("Talking to domain %s (%s)\n"), ctx->domain_name,
265 dom_sid_str_buf(ctx->domain_sid, &buf));
267 this_ctx = ctx;
269 while(1) {
270 char *prompt = NULL;
271 char *line = NULL;
272 int ret;
274 if (asprintf(&prompt, "%s> ", this_ctx->whoami) < 0) {
275 break;
278 line = smb_readline(prompt, NULL, completion_fn);
279 SAFE_FREE(prompt);
281 if (line == NULL) {
282 break;
285 ret = poptParseArgvString(line, &argc, &argv);
286 if (ret == POPT_ERROR_NOARG) {
287 SAFE_FREE(line);
288 continue;
290 if (ret != 0) {
291 d_fprintf(stderr, _("cmdline invalid: %s\n"),
292 poptStrerror(ret));
293 SAFE_FREE(line);
294 return false;
297 if ((line[0] != '\n') &&
298 (!net_sh_process(c, this_ctx, argc, argv))) {
299 SAFE_FREE(line);
300 break;
302 SAFE_FREE(line);
305 cli_shutdown(ctx->cli);
307 TALLOC_FREE(ctx);
309 return 0;