subunit: Support the time: command.
[Samba/ekacnet.git] / source3 / utils / net_ads_gpo.c
blob7484726e7717cbe7821630300ad3035741dc9f8a
1 /*
2 Samba Unix/Linux SMB client library
3 net ads commands for Group Policy
4 Copyright (C) 2005-2008 Guenther Deschner (gd@samba.org)
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program. If not, see <http://www.gnu.org/licenses/>.
20 #include "includes.h"
21 #include "utils/net.h"
23 #ifdef HAVE_ADS
25 static int net_ads_gpo_refresh(struct net_context *c, int argc, const char **argv)
27 TALLOC_CTX *mem_ctx;
28 ADS_STRUCT *ads;
29 ADS_STATUS status;
30 const char *dn = NULL;
31 struct GROUP_POLICY_OBJECT *gpo_list = NULL;
32 struct GROUP_POLICY_OBJECT *read_list = NULL;
33 uint32 uac = 0;
34 uint32 flags = 0;
35 struct GROUP_POLICY_OBJECT *gpo;
36 NTSTATUS result;
37 struct nt_user_token *token = NULL;
39 if (argc < 1 || c->display_usage) {
40 d_printf("Usage:\n"
41 "net ads gpo refresh <username|machinename>\n"
42 " Lists all GPOs assigned to an account and "
43 "downloads them\n"
44 " username\tUser to refresh GPOs for\n"
45 " machinename\tMachine to refresh GPOs for\n");
46 return -1;
49 mem_ctx = talloc_init("net_ads_gpo_refresh");
50 if (mem_ctx == NULL) {
51 return -1;
54 status = ads_startup(c, false, &ads);
55 if (!ADS_ERR_OK(status)) {
56 d_printf("failed to connect AD server: %s\n", ads_errstr(status));
57 goto out;
60 status = ads_find_samaccount(ads, mem_ctx, argv[0], &uac, &dn);
61 if (!ADS_ERR_OK(status)) {
62 d_printf("failed to find samaccount for %s\n", argv[0]);
63 goto out;
66 if (uac & UF_WORKSTATION_TRUST_ACCOUNT) {
67 flags |= GPO_LIST_FLAG_MACHINE;
70 d_printf("\n%s: '%s' has dn: '%s'\n\n",
71 (uac & UF_WORKSTATION_TRUST_ACCOUNT) ? "machine" : "user",
72 argv[0], dn);
74 d_printf("* fetching token ");
75 if (uac & UF_WORKSTATION_TRUST_ACCOUNT) {
76 status = gp_get_machine_token(ads, mem_ctx, NULL, dn, &token);
77 } else {
78 status = ads_get_sid_token(ads, mem_ctx, dn, &token);
81 if (!ADS_ERR_OK(status)) {
82 d_printf("failed: %s\n", ads_errstr(status));
83 goto out;
85 d_printf("finished\n");
87 d_printf("* fetching GPO List ");
88 status = ads_get_gpo_list(ads, mem_ctx, dn, flags, token, &gpo_list);
89 if (!ADS_ERR_OK(status)) {
90 d_printf("failed: %s\n", ads_errstr(status));
91 goto out;
93 d_printf("finished\n");
95 d_printf("* refreshing Group Policy Data ");
96 if (!NT_STATUS_IS_OK(result = check_refresh_gpo_list(ads, mem_ctx,
97 cache_path(GPO_CACHE_DIR),
98 NULL,
99 flags,
100 gpo_list))) {
101 d_printf("failed: %s\n", nt_errstr(result));
102 goto out;
104 d_printf("finished\n");
106 d_printf("* storing GPO list to registry ");
109 WERROR werr = gp_reg_state_store(mem_ctx, flags, dn,
110 token, gpo_list);
111 if (!W_ERROR_IS_OK(werr)) {
112 d_printf("failed: %s\n", win_errstr(werr));
113 goto out;
117 d_printf("finished\n");
119 if (c->opt_verbose) {
121 d_printf("* dumping GPO list\n");
123 for (gpo = gpo_list; gpo; gpo = gpo->next) {
125 dump_gpo(ads, mem_ctx, gpo, 0);
126 #if 0
127 char *server, *share, *nt_path, *unix_path;
129 d_printf("--------------------------------------\n");
130 d_printf("Name:\t\t\t%s\n", gpo->display_name);
131 d_printf("LDAP GPO version:\t%d (user: %d, machine: %d)\n",
132 gpo->version,
133 GPO_VERSION_USER(gpo->version),
134 GPO_VERSION_MACHINE(gpo->version));
136 result = gpo_explode_filesyspath(mem_ctx, gpo->file_sys_path,
137 &server, &share, &nt_path,
138 &unix_path);
139 if (!NT_STATUS_IS_OK(result)) {
140 d_printf("got: %s\n", nt_errstr(result));
143 d_printf("GPO stored on server: %s, share: %s\n", server, share);
144 d_printf("\tremote path:\t%s\n", nt_path);
145 d_printf("\tlocal path:\t%s\n", unix_path);
146 #endif
150 d_printf("* re-reading GPO list from registry ");
153 WERROR werr = gp_reg_state_read(mem_ctx, flags,
154 &token->user_sids[0],
155 &read_list);
156 if (!W_ERROR_IS_OK(werr)) {
157 d_printf("failed: %s\n", win_errstr(werr));
158 goto out;
162 d_printf("finished\n");
164 if (c->opt_verbose) {
166 d_printf("* dumping GPO list from registry\n");
168 for (gpo = read_list; gpo; gpo = gpo->next) {
170 dump_gpo(ads, mem_ctx, gpo, 0);
172 #if 0
173 char *server, *share, *nt_path, *unix_path;
175 d_printf("--------------------------------------\n");
176 d_printf("Name:\t\t\t%s\n", gpo->display_name);
177 d_printf("LDAP GPO version:\t%d (user: %d, machine: %d)\n",
178 gpo->version,
179 GPO_VERSION_USER(gpo->version),
180 GPO_VERSION_MACHINE(gpo->version));
182 result = gpo_explode_filesyspath(mem_ctx, gpo->file_sys_path,
183 &server, &share, &nt_path,
184 &unix_path);
185 if (!NT_STATUS_IS_OK(result)) {
186 d_printf("got: %s\n", nt_errstr(result));
189 d_printf("GPO stored on server: %s, share: %s\n", server, share);
190 d_printf("\tremote path:\t%s\n", nt_path);
191 d_printf("\tlocal path:\t%s\n", unix_path);
192 #endif
196 out:
197 ads_destroy(&ads);
198 talloc_destroy(mem_ctx);
199 return 0;
202 static int net_ads_gpo_list_all(struct net_context *c, int argc, const char **argv)
204 ADS_STRUCT *ads;
205 ADS_STATUS status;
206 LDAPMessage *res = NULL;
207 int num_reply = 0;
208 LDAPMessage *msg = NULL;
209 struct GROUP_POLICY_OBJECT gpo;
210 TALLOC_CTX *mem_ctx;
211 char *dn;
212 const char *attrs[] = {
213 "versionNumber",
214 "flags",
215 "gPCFileSysPath",
216 "displayName",
217 "name",
218 "gPCMachineExtensionNames",
219 "gPCUserExtensionNames",
220 "ntSecurityDescriptor",
221 NULL
224 if (c->display_usage) {
225 d_printf("Usage:\n"
226 "net ads gpo listall\n"
227 " List all GPOs on the DC\n");
228 return 0;
231 mem_ctx = talloc_init("net_ads_gpo_list_all");
232 if (mem_ctx == NULL) {
233 return -1;
236 status = ads_startup(c, false, &ads);
237 if (!ADS_ERR_OK(status)) {
238 goto out;
241 status = ads_do_search_all_sd_flags(ads, ads->config.bind_path,
242 LDAP_SCOPE_SUBTREE,
243 "(objectclass=groupPolicyContainer)",
244 attrs,
245 DACL_SECURITY_INFORMATION,
246 &res);
248 if (!ADS_ERR_OK(status)) {
249 d_printf("search failed: %s\n", ads_errstr(status));
250 goto out;
253 num_reply = ads_count_replies(ads, res);
255 d_printf("Got %d replies\n\n", num_reply);
257 /* dump the results */
258 for (msg = ads_first_entry(ads, res);
259 msg;
260 msg = ads_next_entry(ads, msg)) {
262 if ((dn = ads_get_dn(ads, mem_ctx, msg)) == NULL) {
263 goto out;
266 status = ads_parse_gpo(ads, mem_ctx, msg, dn, &gpo);
268 if (!ADS_ERR_OK(status)) {
269 d_printf("ads_parse_gpo failed: %s\n",
270 ads_errstr(status));
271 goto out;
274 dump_gpo(ads, mem_ctx, &gpo, 0);
277 out:
278 ads_msgfree(ads, res);
280 TALLOC_FREE(mem_ctx);
281 ads_destroy(&ads);
283 return 0;
286 static int net_ads_gpo_list(struct net_context *c, int argc, const char **argv)
288 ADS_STRUCT *ads;
289 ADS_STATUS status;
290 LDAPMessage *res = NULL;
291 TALLOC_CTX *mem_ctx;
292 const char *dn = NULL;
293 uint32 uac = 0;
294 uint32 flags = 0;
295 struct GROUP_POLICY_OBJECT *gpo_list;
296 struct nt_user_token *token = NULL;
298 if (argc < 1 || c->display_usage) {
299 d_printf("Usage:\n"
300 "net ads gpo list <username|machinename>\n"
301 " Lists all GPOs for machine/user\n"
302 " username\tUser to list GPOs for\n"
303 " machinename\tMachine to list GPOs for\n");
304 return -1;
307 mem_ctx = talloc_init("net_ads_gpo_list");
308 if (mem_ctx == NULL) {
309 goto out;
312 status = ads_startup(c, false, &ads);
313 if (!ADS_ERR_OK(status)) {
314 goto out;
317 status = ads_find_samaccount(ads, mem_ctx, argv[0], &uac, &dn);
318 if (!ADS_ERR_OK(status)) {
319 goto out;
322 if (uac & UF_WORKSTATION_TRUST_ACCOUNT) {
323 flags |= GPO_LIST_FLAG_MACHINE;
326 d_printf("%s: '%s' has dn: '%s'\n",
327 (uac & UF_WORKSTATION_TRUST_ACCOUNT) ? "machine" : "user",
328 argv[0], dn);
330 if (uac & UF_WORKSTATION_TRUST_ACCOUNT) {
331 status = gp_get_machine_token(ads, mem_ctx, NULL, dn, &token);
332 } else {
333 status = ads_get_sid_token(ads, mem_ctx, dn, &token);
336 if (!ADS_ERR_OK(status)) {
337 goto out;
340 status = ads_get_gpo_list(ads, mem_ctx, dn, flags, token, &gpo_list);
341 if (!ADS_ERR_OK(status)) {
342 goto out;
345 dump_gpo_list(ads, mem_ctx, gpo_list, 0);
347 out:
348 ads_msgfree(ads, res);
350 talloc_destroy(mem_ctx);
351 ads_destroy(&ads);
353 return 0;
356 #if 0
357 static int net_ads_gpo_apply(struct net_context *c, int argc, const char **argv)
359 TALLOC_CTX *mem_ctx;
360 ADS_STRUCT *ads;
361 ADS_STATUS status;
362 const char *dn = NULL;
363 struct GROUP_POLICY_OBJECT *gpo_list;
364 uint32 uac = 0;
365 uint32 flags = 0;
366 struct nt_user_token *token = NULL;
367 const char *filter = NULL;
369 if (argc < 1 || c->display_usage) {
370 d_printf("Usage:\n"
371 "net ads gpo apply <username|machinename>\n"
372 " Apply GPOs for machine/user\n"
373 " username\tUsername to apply GPOs for\n"
374 " machinename\tMachine to apply GPOs for\n");
375 return -1;
378 mem_ctx = talloc_init("net_ads_gpo_apply");
379 if (mem_ctx == NULL) {
380 goto out;
383 if (argc >= 2) {
384 filter = cse_gpo_name_to_guid_string(argv[1]);
387 status = ads_startup(c, false, &ads);
388 if (!ADS_ERR_OK(status)) {
389 d_printf("got: %s\n", ads_errstr(status));
390 goto out;
393 status = ads_find_samaccount(ads, mem_ctx, argv[0], &uac, &dn);
394 if (!ADS_ERR_OK(status)) {
395 d_printf("failed to find samaccount for %s: %s\n",
396 argv[0], ads_errstr(status));
397 goto out;
400 if (uac & UF_WORKSTATION_TRUST_ACCOUNT) {
401 flags |= GPO_LIST_FLAG_MACHINE;
404 if (c->opt_verbose) {
405 flags |= GPO_INFO_FLAG_VERBOSE;
408 d_printf("%s: '%s' has dn: '%s'\n",
409 (uac & UF_WORKSTATION_TRUST_ACCOUNT) ? "machine" : "user",
410 argv[0], dn);
412 if (uac & UF_WORKSTATION_TRUST_ACCOUNT) {
413 status = gp_get_machine_token(ads, mem_ctx, NULL, dn, &token);
414 } else {
415 status = ads_get_sid_token(ads, mem_ctx, dn, &token);
418 if (!ADS_ERR_OK(status)) {
419 goto out;
422 status = ads_get_gpo_list(ads, mem_ctx, dn, flags, token, &gpo_list);
423 if (!ADS_ERR_OK(status)) {
424 goto out;
427 status = gpo_process_gpo_list(ads, mem_ctx, token, gpo_list,
428 filter, flags);
429 if (!ADS_ERR_OK(status)) {
430 d_printf("failed to process gpo list: %s\n",
431 ads_errstr(status));
432 goto out;
435 out:
436 ads_destroy(&ads);
437 talloc_destroy(mem_ctx);
438 return 0;
440 #endif
442 static int net_ads_gpo_link_get(struct net_context *c, int argc, const char **argv)
444 ADS_STRUCT *ads;
445 ADS_STATUS status;
446 TALLOC_CTX *mem_ctx;
447 struct GP_LINK gp_link;
449 if (argc < 1 || c->display_usage) {
450 d_printf("Usage:\n"
451 "net ads gpo linkget <container>\n"
452 " Lists gPLink of a containter\n"
453 " container\tContainer to get link for\n");
454 return -1;
457 mem_ctx = talloc_init("add_gpo_link");
458 if (mem_ctx == NULL) {
459 return -1;
462 status = ads_startup(c, false, &ads);
463 if (!ADS_ERR_OK(status)) {
464 goto out;
467 status = ads_get_gpo_link(ads, mem_ctx, argv[0], &gp_link);
468 if (!ADS_ERR_OK(status)) {
469 d_printf("get link for %s failed: %s\n", argv[0],
470 ads_errstr(status));
471 goto out;
474 dump_gplink(ads, mem_ctx, &gp_link);
476 out:
477 talloc_destroy(mem_ctx);
478 ads_destroy(&ads);
480 return 0;
483 static int net_ads_gpo_link_add(struct net_context *c, int argc, const char **argv)
485 ADS_STRUCT *ads;
486 ADS_STATUS status;
487 uint32 gpo_opt = 0;
488 TALLOC_CTX *mem_ctx;
490 if (argc < 2 || c->display_usage) {
491 d_printf("Usage:\n"
492 "net ads gpo linkadd <linkdn> <gpodn> [options]\n"
493 " Link a container to a GPO\n"
494 " linkdn\tContainer to link to a GPO\n"
495 " gpodn\tGPO to link container to\n");
496 d_printf("note: DNs must be provided properly escaped.\n");
497 d_printf("See RFC 4514 for details\n");
498 return -1;
501 mem_ctx = talloc_init("add_gpo_link");
502 if (mem_ctx == NULL) {
503 return -1;
506 if (argc == 3) {
507 gpo_opt = atoi(argv[2]);
510 status = ads_startup(c, false, &ads);
511 if (!ADS_ERR_OK(status)) {
512 goto out;
515 status = ads_add_gpo_link(ads, mem_ctx, argv[0], argv[1], gpo_opt);
516 if (!ADS_ERR_OK(status)) {
517 d_printf("link add failed: %s\n", ads_errstr(status));
518 goto out;
521 out:
522 talloc_destroy(mem_ctx);
523 ads_destroy(&ads);
525 return 0;
528 #if 0 /* broken */
530 static int net_ads_gpo_link_delete(struct net_context *c, int argc, const char **argv)
532 ADS_STRUCT *ads;
533 ADS_STATUS status;
534 TALLOC_CTX *mem_ctx;
536 if (argc < 2 || c->display_usage) {
537 d_printf("Usage:\n"
538 "net ads gpo linkdelete <linkdn> <gpodn>\n"
539 " Delete a GPO link\n"
540 " <linkdn>\tContainer to delete GPO from\n"
541 " <gpodn>\tGPO to delete from container\n");
542 return -1;
545 mem_ctx = talloc_init("delete_gpo_link");
546 if (mem_ctx == NULL) {
547 return -1;
550 status = ads_startup(c, false, &ads);
551 if (!ADS_ERR_OK(status)) {
552 goto out;
555 status = ads_delete_gpo_link(ads, mem_ctx, argv[0], argv[1]);
556 if (!ADS_ERR_OK(status)) {
557 d_printf("delete link failed: %s\n", ads_errstr(status));
558 goto out;
561 out:
562 talloc_destroy(mem_ctx);
563 ads_destroy(&ads);
565 return 0;
568 #endif
570 static int net_ads_gpo_get_gpo(struct net_context *c, int argc, const char **argv)
572 ADS_STRUCT *ads;
573 ADS_STATUS status;
574 TALLOC_CTX *mem_ctx;
575 struct GROUP_POLICY_OBJECT gpo;
577 if (argc < 1 || c->display_usage) {
578 d_printf("Usage:\n"
579 "net ads gpo getgpo <gpo>\n"
580 " List speciefied GPO\n"
581 " gpo\t\tGPO to list\n");
582 return -1;
585 mem_ctx = talloc_init("ads_gpo_get_gpo");
586 if (mem_ctx == NULL) {
587 return -1;
590 status = ads_startup(c, false, &ads);
591 if (!ADS_ERR_OK(status)) {
592 goto out;
595 if (strnequal(argv[0], "CN={", strlen("CN={"))) {
596 status = ads_get_gpo(ads, mem_ctx, argv[0], NULL, NULL, &gpo);
597 } else {
598 status = ads_get_gpo(ads, mem_ctx, NULL, argv[0], NULL, &gpo);
601 if (!ADS_ERR_OK(status)) {
602 d_printf("get gpo for [%s] failed: %s\n", argv[0],
603 ads_errstr(status));
604 goto out;
607 dump_gpo(ads, mem_ctx, &gpo, 1);
609 out:
610 talloc_destroy(mem_ctx);
611 ads_destroy(&ads);
613 return 0;
616 int net_ads_gpo(struct net_context *c, int argc, const char **argv)
618 struct functable func[] = {
619 #if 0
621 "apply",
622 net_ads_gpo_apply,
623 NET_TRANSPORT_ADS,
624 "Apply GPO to container",
625 "net ads gpo apply\n"
626 " Apply GPO to container"
628 #endif
630 "getgpo",
631 net_ads_gpo_get_gpo,
632 NET_TRANSPORT_ADS,
633 "List specified GPO",
634 "net ads gpo getgpo\n"
635 " List specified GPO"
638 "linkadd",
639 net_ads_gpo_link_add,
640 NET_TRANSPORT_ADS,
641 "Link a container to a GPO",
642 "net ads gpo linkadd\n"
643 " Link a container to a GPO"
645 #if 0
647 "linkdelete",
648 net_ads_gpo_link_delete,
649 NET_TRANSPORT_ADS,
650 "Delete GPO link from a container",
651 "net ads gpo linkdelete\n"
652 " Delete GPO link from a container"
654 #endif
656 "linkget",
657 net_ads_gpo_link_get,
658 NET_TRANSPORT_ADS,
659 "Lists gPLink of containter",
660 "net ads gpo linkget\n"
661 " Lists gPLink of containter"
664 "list",
665 net_ads_gpo_list,
666 NET_TRANSPORT_ADS,
667 "Lists all GPOs for machine/user",
668 "net ads gpo list\n"
669 " Lists all GPOs for machine/user"
672 "listall",
673 net_ads_gpo_list_all,
674 NET_TRANSPORT_ADS,
675 "Lists all GPOs on a DC",
676 "net ads gpo listall\n"
677 " Lists all GPOs on a DC"
680 "refresh",
681 net_ads_gpo_refresh,
682 NET_TRANSPORT_ADS,
683 "Lists all GPOs assigned to an account and downloads "
684 "them",
685 "net ads gpo refresh\n"
686 " Lists all GPOs assigned to an account and "
687 "downloads them"
689 {NULL, NULL, 0, NULL, NULL}
692 return net_run_function(c, argc, argv, "net ads gpo", func);
695 #endif /* HAVE_ADS */