2 Unix SMB/CIFS implementation.
5 Copyright (C) Andrew Tridgell 2000
6 Copyright (C) Tim Potter 2000
7 Copyright (C) Jeremy Allison 2000
8 Copyright (C) Stefan (metze) Metzmacher 2003
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 3 of the License, or
13 (at your option) any later version.
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
20 You should have received a copy of the GNU General Public License
21 along with this program. If not, see <http://www.gnu.org/licenses/>.
25 #include "popt_common.h"
26 #include "../librpc/gen_ndr/ndr_lsa.h"
27 #include "rpc_client/cli_lsarpc.h"
28 #include "fake_file.h"
29 #include "../libcli/security/security.h"
33 /* numeric is set when the user wants numeric SIDs and ACEs rather
34 than going via LSA calls to resolve them */
38 enum todo_values {NOOP_QUOTA=0,FS_QUOTA,USER_QUOTA,LIST_QUOTA,SET_QUOTA};
39 enum exit_values {EXIT_OK, EXIT_FAILED, EXIT_PARSE_ERROR};
41 static struct cli_state *cli_ipc;
42 static struct rpc_pipe_client *global_pipe_hnd;
43 static struct policy_handle pol;
44 static bool got_policy_hnd;
45 static struct user_auth_info *smbcquotas_auth_info;
47 static struct cli_state *connect_one(const char *share);
49 /* Open cli connection and policy handle */
51 static bool cli_open_policy_hnd(void)
53 /* Initialise cli LSA connection */
57 cli_ipc = connect_one("IPC$");
58 ret = cli_rpc_pipe_open_noauth(cli_ipc,
59 &ndr_table_lsarpc.syntax_id,
61 if (!NT_STATUS_IS_OK(ret)) {
66 /* Open policy handle */
68 if (!got_policy_hnd) {
70 /* Some systems don't support SEC_FLAG_MAXIMUM_ALLOWED,
71 but NT sends 0x2000000 so we might as well do it too. */
73 if (!NT_STATUS_IS_OK(rpccli_lsa_open_policy(global_pipe_hnd, talloc_tos(), True,
74 GENERIC_EXECUTE_ACCESS, &pol))) {
78 got_policy_hnd = True;
84 /* convert a SID to a string, either numeric or username/group */
85 static void SidToString(fstring str, struct dom_sid *sid, bool _numeric)
87 char **domains = NULL;
89 enum lsa_SidType *types = NULL;
91 sid_to_fstring(str, sid);
95 /* Ask LSA to convert the sid to a name */
97 if (!cli_open_policy_hnd() ||
98 !NT_STATUS_IS_OK(rpccli_lsa_lookup_sids(global_pipe_hnd, talloc_tos(),
99 &pol, 1, sid, &domains,
101 !domains || !domains[0] || !names || !names[0]) {
107 slprintf(str, sizeof(fstring) - 1, "%s%s%s",
108 domains[0], lp_winbind_separator(),
113 /* convert a string to a SID, either numeric or username/group */
114 static bool StringToSid(struct dom_sid *sid, const char *str)
116 enum lsa_SidType *types = NULL;
117 struct dom_sid *sids = NULL;
120 if (strncmp(str, "S-", 2) == 0) {
121 return string_to_sid(sid, str);
124 if (!cli_open_policy_hnd() ||
125 !NT_STATUS_IS_OK(rpccli_lsa_lookup_names(global_pipe_hnd, talloc_tos(),
126 &pol, 1, &str, NULL, 1, &sids,
132 sid_copy(sid, &sids[0]);
139 #define QUOTA_SETLIM 2
140 #define QUOTA_SETFLAGS 3
143 enum {PARSE_FLAGS,PARSE_LIM};
145 static int parse_quota_set(TALLOC_CTX *ctx,
147 char **pp_username_str,
148 enum SMB_QUOTA_TYPE *qtype,
150 SMB_NTQUOTA_STRUCT *pqt)
152 char *p = set_str,*p2;
158 *pp_username_str = NULL;
159 if (strnequal(set_str,"UQLIM:",6)) {
161 *qtype = SMB_USER_QUOTA_TYPE;
164 if ((p2=strstr(p,":"))==NULL) {
171 *pp_username_str = talloc_strdup(ctx, p);
173 } else if (strnequal(set_str,"FSQLIM:",7)) {
175 *qtype = SMB_USER_FS_QUOTA_TYPE;
178 } else if (strnequal(set_str,"FSQFLAGS:",9)) {
181 *qtype = SMB_USER_FS_QUOTA_TYPE;
182 *cmd = QUOTA_SETFLAGS;
189 if (sscanf(p,"%"PRIu64"/%"PRIu64,&pqt->softlim,&pqt->hardlim)!=2) {
197 if ((p2=strstr(p,"/"))==NULL) {
204 if (strnequal(p,"QUOTA_ENABLED",13)) {
206 } else if (strnequal(p,"DENY_DISK",9)) {
208 } else if (strnequal(p,"LOG_SOFTLIMIT",13)) {
209 pqt->qflags |= QUOTAS_LOG_THRESHOLD;
210 } else if (strnequal(p,"LOG_HARDLIMIT",13)) {
211 pqt->qflags |= QUOTAS_LOG_LIMIT;
220 pqt->qflags |= QUOTAS_DENY_DISK;
222 pqt->qflags |= QUOTAS_ENABLED;
231 static int do_quota(struct cli_state *cli,
232 enum SMB_QUOTA_TYPE qtype,
234 const char *username_str,
235 SMB_NTQUOTA_STRUCT *pqt)
238 uint16_t quota_fnum = 0;
239 SMB_NTQUOTA_LIST *qtl = NULL;
240 SMB_NTQUOTA_STRUCT qt;
245 status = cli_get_fs_attr_info(cli, &fs_attrs);
246 if (!NT_STATUS_IS_OK(status)) {
247 d_printf("Failed to get the filesystem attributes %s.\n",
252 if (!(fs_attrs & FILE_VOLUME_QUOTAS)) {
253 d_printf("Quotas are not supported by the server.\n");
257 status = cli_get_quota_handle(cli, "a_fnum);
258 if (!NT_STATUS_IS_OK(status)) {
259 d_printf("Quotas are not enabled on this share.\n");
260 d_printf("Failed to open %s %s.\n",
261 FAKE_FILE_NAME_QUOTA_WIN32,
267 case SMB_USER_QUOTA_TYPE:
268 if (!StringToSid(&qt.sid, username_str)) {
269 d_printf("StringToSid() failed for [%s]\n",username_str);
275 if (!cli_get_user_quota(cli, quota_fnum, &qt)) {
276 d_printf("%s cli_get_user_quota %s\n",
277 cli_errstr(cli),username_str);
280 dump_ntquota(&qt,verbose,numeric,SidToString);
284 if (!cli_set_user_quota(cli, quota_fnum, pqt)) {
285 d_printf("%s cli_set_user_quota %s\n",
286 cli_errstr(cli),username_str);
289 if (!cli_get_user_quota(cli, quota_fnum, &qt)) {
290 d_printf("%s cli_get_user_quota %s\n",
291 cli_errstr(cli),username_str);
294 dump_ntquota(&qt,verbose,numeric,SidToString);
297 if (!cli_list_user_quota(cli, quota_fnum, &qtl)) {
298 d_printf("%s cli_set_user_quota %s\n",
299 cli_errstr(cli),username_str);
302 dump_ntquota_list(&qtl,verbose,numeric,SidToString);
303 free_ntquota_list(&qtl);
306 d_printf("Unknown Error\n");
310 case SMB_USER_FS_QUOTA_TYPE:
313 if (!cli_get_fs_quota_info(cli, quota_fnum, &qt)) {
314 d_printf("%s cli_get_fs_quota_info\n",
318 dump_ntquota(&qt,True,numeric,NULL);
321 if (!cli_get_fs_quota_info(cli, quota_fnum, &qt)) {
322 d_printf("%s cli_get_fs_quota_info\n",
326 qt.softlim = pqt->softlim;
327 qt.hardlim = pqt->hardlim;
328 if (!cli_set_fs_quota_info(cli, quota_fnum, &qt)) {
329 d_printf("%s cli_set_fs_quota_info\n",
333 if (!cli_get_fs_quota_info(cli, quota_fnum, &qt)) {
334 d_printf("%s cli_get_fs_quota_info\n",
338 dump_ntquota(&qt,True,numeric,NULL);
341 if (!cli_get_fs_quota_info(cli, quota_fnum, &qt)) {
342 d_printf("%s cli_get_fs_quota_info\n",
346 qt.qflags = pqt->qflags;
347 if (!cli_set_fs_quota_info(cli, quota_fnum, &qt)) {
348 d_printf("%s cli_set_fs_quota_info\n",
352 if (!cli_get_fs_quota_info(cli, quota_fnum, &qt)) {
353 d_printf("%s cli_get_fs_quota_info\n",
357 dump_ntquota(&qt,True,numeric,NULL);
360 d_printf("Unknown Error\n");
365 d_printf("Unknown Error\n");
369 cli_close(cli, quota_fnum);
374 /*****************************************************
375 Return a connection to a server.
376 *******************************************************/
378 static struct cli_state *connect_one(const char *share)
381 struct sockaddr_storage ss;
387 if (get_cmdline_auth_info_use_machine_account(smbcquotas_auth_info) &&
388 !set_cmdline_auth_info_machine_account_creds(smbcquotas_auth_info)) {
392 if (get_cmdline_auth_info_use_kerberos(smbcquotas_auth_info)) {
393 flags |= CLI_FULL_CONNECTION_USE_KERBEROS |
394 CLI_FULL_CONNECTION_FALLBACK_AFTER_KERBEROS;
398 set_cmdline_auth_info_getpass(smbcquotas_auth_info);
400 nt_status = cli_full_connection(&c, global_myname(), server,
403 get_cmdline_auth_info_username(smbcquotas_auth_info),
405 get_cmdline_auth_info_password(smbcquotas_auth_info),
407 get_cmdline_auth_info_signing_state(smbcquotas_auth_info),
409 if (!NT_STATUS_IS_OK(nt_status)) {
410 DEBUG(0,("cli_full_connection failed! (%s)\n", nt_errstr(nt_status)));
414 if (get_cmdline_auth_info_smb_encrypt(smbcquotas_auth_info)) {
415 nt_status = cli_cm_force_encryption(c,
416 get_cmdline_auth_info_username(smbcquotas_auth_info),
417 get_cmdline_auth_info_password(smbcquotas_auth_info),
420 if (!NT_STATUS_IS_OK(nt_status)) {
429 /****************************************************************************
431 ****************************************************************************/
432 int main(int argc, const char *argv[])
438 char *username_str = NULL;
440 char *set_str = NULL;
441 enum SMB_QUOTA_TYPE qtype = SMB_INVALID_QUOTA_TYPE;
443 static bool test_args = False;
444 struct cli_state *cli;
445 bool fix_user = False;
446 SMB_NTQUOTA_STRUCT qt;
447 TALLOC_CTX *frame = talloc_stackframe();
449 struct poptOption long_options[] = {
451 { "user", 'u', POPT_ARG_STRING, NULL, 'u', "Show quotas for user", "user" },
452 { "list", 'L', POPT_ARG_NONE, NULL, 'L', "List user quotas" },
453 { "fs", 'F', POPT_ARG_NONE, NULL, 'F', "Show filesystem quotas" },
454 { "set", 'S', POPT_ARG_STRING, NULL, 'S', "Set acls\n\
456 UQLIM:<username>/<softlimit>/<hardlimit> for user quotas\n\
457 FSQLIM:<softlimit>/<hardlimit> for filesystem defaults\n\
458 FSQFLAGS:QUOTA_ENABLED/DENY_DISK/LOG_SOFTLIMIT/LOG_HARD_LIMIT", "SETSTRING" },
459 { "numeric", 'n', POPT_ARG_NONE, NULL, 'n', "Don't resolve sids or limits to names" },
460 { "verbose", 'v', POPT_ARG_NONE, NULL, 'v', "be verbose" },
461 { "test-args", 't', POPT_ARG_NONE, NULL, 'r', "Test arguments"},
463 POPT_COMMON_CREDENTIALS
471 /* set default debug level to 1 regardless of what smb.conf sets */
472 setup_logging( "smbcquotas", DEBUG_STDERR);
473 lp_set_cmdline("log level", "1");
479 lp_load(get_dyn_CONFIGFILE(),True,False,False,True);
482 smbcquotas_auth_info = user_auth_info_init(frame);
483 if (smbcquotas_auth_info == NULL) {
486 popt_common_set_auth_info(smbcquotas_auth_info);
488 pc = poptGetContext("smbcquotas", argc, argv, long_options, 0);
490 poptSetOtherOptionHelp(pc, "//server1/share1");
492 while ((opt = poptGetNextOpt(pc)) != -1) {
505 d_printf("Please specify only one option of <-L|-F|-S|-u>\n");
506 exit(EXIT_PARSE_ERROR);
513 d_printf("Please specify only one option of <-L|-F|-S|-u>\n");
514 exit(EXIT_PARSE_ERROR);
521 d_printf("Please specify only one option of <-L|-F|-S|-u>\n");
522 exit(EXIT_PARSE_ERROR);
524 username_str = talloc_strdup(frame, poptGetOptArg(pc));
526 exit(EXIT_PARSE_ERROR);
534 d_printf("Please specify only one option of <-L|-F|-S|-u>\n");
535 exit(EXIT_PARSE_ERROR);
537 set_str = talloc_strdup(frame, poptGetOptArg(pc));
539 exit(EXIT_PARSE_ERROR);
550 username_str = talloc_strdup(
551 frame, get_cmdline_auth_info_username(smbcquotas_auth_info));
553 exit(EXIT_PARSE_ERROR);
557 /* Make connection to server */
558 if(!poptPeekArg(pc)) {
559 poptPrintUsage(pc, stderr, 0);
560 exit(EXIT_PARSE_ERROR);
563 path = talloc_strdup(frame, poptGetArg(pc));
565 printf("Out of memory\n");
566 exit(EXIT_PARSE_ERROR);
569 string_replace(path, '/', '\\');
571 server = SMB_STRDUP(path+2);
573 printf("Out of memory\n");
574 exit(EXIT_PARSE_ERROR);
576 share = strchr_m(server,'\\');
578 printf("Invalid argument: %s\n", share);
579 exit(EXIT_PARSE_ERROR);
585 if (todo == SET_QUOTA) {
586 if (parse_quota_set(talloc_tos(), set_str, &username_str, &qtype, &cmd, &qt)) {
587 printf("Invalid argument: -S %s\n", set_str);
588 exit(EXIT_PARSE_ERROR);
593 cli = connect_one(share);
602 /* Perform requested action */
606 result = do_quota(cli,SMB_USER_FS_QUOTA_TYPE, QUOTA_GET, username_str, NULL);
609 result = do_quota(cli,SMB_USER_QUOTA_TYPE, QUOTA_LIST, username_str, NULL);
612 result = do_quota(cli,SMB_USER_QUOTA_TYPE, QUOTA_GET, username_str, NULL);
615 result = do_quota(cli, qtype, cmd, username_str, &qt);
619 result = EXIT_FAILED;