daca6957a1aa47ed56152776cabff4e0250c866a
[ira/wip.git] / source4 / lib / registry / tools / regtree.c
1 /*
2    Unix SMB/CIFS implementation.
3    simple registry frontend
4
5    Copyright (C) Jelmer Vernooij 2004-2007
6
7    This program is free software; you can redistribute it and/or modify
8    it under the terms of the GNU General Public License as published by
9    the Free Software Foundation; either version 3 of the License, or
10    (at your option) any later version.
11
12    This program is distributed in the hope that it will be useful,
13    but WITHOUT ANY WARRANTY; without even the implied warranty of
14    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15    GNU General Public License for more details.
16
17    You should have received a copy of the GNU General Public License
18    along with this program.  If not, see <http://www.gnu.org/licenses/>.
19 */
20
21 #include "includes.h"
22 #include "lib/registry/registry.h"
23 #include "lib/registry/tools/common.h"
24 #include "lib/events/events.h"
25 #include "lib/cmdline/popt_common.h"
26 #include "param/param.h"
27
28 /**
29  * Print a registry key recursively
30  *
31  * @param level Level at which to print
32  * @param p Key to print
33  * @param fullpath Whether the full pat hshould be printed or just the last bit
34  * @param novals Whether values should not be printed
35  */
36 static void print_tree(int level, struct registry_key *p,
37                        const char *name,
38                        bool fullpath, bool novals)
39 {
40         struct registry_key *subkey;
41         const char *valuename;
42         const char *keyname;
43         uint32_t value_type;
44         DATA_BLOB value_data;
45         struct security_descriptor *sec_desc;
46         WERROR error;
47         int i;
48         TALLOC_CTX *mem_ctx;
49
50         for(i = 0; i < level; i++) putchar(' '); puts(name);
51
52         mem_ctx = talloc_init("print_tree");
53         for (i = 0; W_ERROR_IS_OK(error = reg_key_get_subkey_by_index(mem_ctx,
54                                                                       p,
55                                                                       i,
56                                                                       &keyname,
57                                                                       NULL,
58                                                                       NULL)); i++) {
59                 SMB_ASSERT(strlen(keyname) > 0);
60                 if (!W_ERROR_IS_OK(reg_open_key(mem_ctx, p, keyname, &subkey)))
61                         continue;
62                 print_tree(level+1, subkey, (fullpath && strlen(name))?
63                                                 talloc_asprintf(mem_ctx, "%s\\%s",
64                                                                 name, keyname):
65                                                 keyname, fullpath, novals);
66         }
67         talloc_free(mem_ctx);
68
69         if(!W_ERROR_EQUAL(error, WERR_NO_MORE_ITEMS)) {
70                 DEBUG(0, ("Error occured while fetching subkeys for '%s': %s\n",
71                                   name, win_errstr(error)));
72         }
73
74         if (!novals) {
75                 mem_ctx = talloc_init("print_tree");
76                 for(i = 0; W_ERROR_IS_OK(error = reg_key_get_value_by_index(mem_ctx,
77                                                                             p,
78                                                                             i,
79                                                                             &valuename,
80                                                                             &value_type,
81                                                                             &value_data)); i++) {
82                         int j;
83                         char *desc;
84                         for(j = 0; j < level+1; j++) putchar(' ');
85                         desc = reg_val_description(mem_ctx, lp_iconv_convenience(cmdline_lp_ctx), valuename,
86                                                    value_type, value_data);
87                         printf("%s\n", desc);
88                 }
89                 talloc_free(mem_ctx);
90
91                 if(!W_ERROR_EQUAL(error, WERR_NO_MORE_ITEMS)) {
92                         DEBUG(0, ("Error occured while fetching values for '%s': %s\n",
93                                 name, win_errstr(error)));
94                 }
95         }
96
97         mem_ctx = talloc_init("sec_desc");
98         if (NT_STATUS_IS_ERR(reg_get_sec_desc(mem_ctx, p, &sec_desc))) {
99                 DEBUG(0, ("Error getting security descriptor\n"));
100         }
101         talloc_free(mem_ctx);
102 }
103
104 int main(int argc, char **argv)
105 {
106         int opt, i;
107         const char *file = NULL;
108         const char *remote = NULL;
109         poptContext pc;
110         struct registry_context *h = NULL;
111         struct registry_key *start_key = NULL;
112         struct event_context *ev_ctx;
113         WERROR error;
114         bool fullpath = false, no_values = false;
115         struct poptOption long_options[] = {
116                 POPT_AUTOHELP
117                 {"file", 'F', POPT_ARG_STRING, &file, 0, "file path", NULL },
118                 {"remote", 'R', POPT_ARG_STRING, &remote, 0, "connect to specified remote server", NULL },
119                 {"fullpath", 'f', POPT_ARG_NONE, &fullpath, 0, "show full paths", NULL},
120                 {"no-values", 'V', POPT_ARG_NONE, &no_values, 0, "don't show values", NULL},
121                 POPT_COMMON_SAMBA
122                 POPT_COMMON_CREDENTIALS
123                 POPT_COMMON_VERSION
124                 { NULL }
125         };
126
127         pc = poptGetContext(argv[0], argc, (const char **) argv, long_options,0);
128
129         while((opt = poptGetNextOpt(pc)) != -1) {
130         }
131
132         ev_ctx = s4_event_context_init(NULL);
133
134         if (remote != NULL) {
135                 h = reg_common_open_remote(remote, cmdline_lp_ctx, cmdline_credentials);
136         } else if (file != NULL) {
137                 start_key = reg_common_open_file(file, ev_ctx, cmdline_lp_ctx, cmdline_credentials);
138         } else {
139                 h = reg_common_open_local(cmdline_credentials, ev_ctx, cmdline_lp_ctx);
140         }
141
142         if (h == NULL && start_key == NULL)
143                 return 1;
144
145         poptFreeContext(pc);
146
147         error = WERR_OK;
148
149         if (start_key != NULL) {
150                 print_tree(0, start_key, "", fullpath, no_values);
151         } else {
152                 for(i = 0; reg_predefined_keys[i].handle; i++) {
153                         error = reg_get_predefined_key(h,
154                                                        reg_predefined_keys[i].handle,
155                                                        &start_key);
156                         if (!W_ERROR_IS_OK(error)) {
157                                 fprintf(stderr, "Skipping %s: %s\n",
158                                         reg_predefined_keys[i].name,
159                                         win_errstr(error));
160                                 continue;
161                         }
162                         SMB_ASSERT(start_key != NULL);
163                         print_tree(0, start_key, reg_predefined_keys[i].name,
164                                    fullpath, no_values);
165                 }
166         }
167
168         return 0;
169 }