Removed version number from file header.
[kai/samba.git] / source3 / utils / pdbedit.c
index 443aa674eb4abaff4bea2d4dd60f1a500e4efa9a..bdf499ae47ebf7e827246d6af25afb8f572f9654 100644 (file)
@@ -1,7 +1,6 @@
 /* 
-   Unix SMB/Netbios implementation.
+   Unix SMB/CIFS implementation.
    passdb editing frontend
-   Version 3.0
    
    Copyright (C) Simo Sorce      2000
    Copyright (C) Andrew Bartlett 2001   
    Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
 */
 
-/* base uid for trust accounts is set to 60000 ! 
- * May be we should add the defines in smb.h to make it possible having 
- * different values on different platforms?
- */
-
-#define BASE_MACHINE_UID 60000
-#define MAX_MACHINE_UID 65500 /* 5500 trust accounts aren't enough? */
-
 #include "includes.h"
 
 extern pstring global_myname;
+extern BOOL AllowDebugChange;
 
 /*
  * Next two lines needed for SunOS and don't
@@ -46,7 +38,7 @@ extern int optind;
 static void usage(void)
 {
        if (getuid() == 0) {
-               printf("tdbedit options\n");
+               printf("pdbedit options\n");
        } else {
                printf("You need to be root to use this tool!\n");
        }
@@ -65,6 +57,7 @@ static void usage(void)
        printf("     -m                it is a machine trust\n");
        printf("  -x                   delete this user\n");
        printf("  -i file              import account from file (smbpasswd style)\n");
+       printf("  -D debuglevel        set DEBUGELEVEL (default = 1)\n");
        exit(1);
 }
 
@@ -74,41 +67,58 @@ static void usage(void)
 
 static int print_sam_info (SAM_ACCOUNT *sam_pwent, BOOL verbosity, BOOL smbpwdstyle)
 {
+       uid_t uid;
+       gid_t gid;
+
        /* TODO: chaeck if entry is a user or a workstation */
        if (!sam_pwent) return -1;
        
        if (verbosity) {
-               printf ("username:       %s\n", sam_pwent->username);
-               printf ("user ID/Group:  %u/%u\n", (unsigned int)sam_pwent->uid,
-                                                 (unsigned int)sam_pwent->gid);
-               printf ("user RID/GRID:  %u/%u\n", (unsigned int)sam_pwent->user_rid,
-                                                 (unsigned int)sam_pwent->group_rid);
-               printf ("Full Name:      %s\n", sam_pwent->full_name);
-               printf ("Home Directory: %s\n", sam_pwent->home_dir);
-               printf ("HomeDir Drive:  %s\n", sam_pwent->dir_drive);
-               printf ("Logon Script:   %s\n", sam_pwent->logon_script);
-               printf ("Profile Path:   %s\n", sam_pwent->profile_path);
+               printf ("username:       %s\n",  pdb_get_username(sam_pwent));
+               if (IS_SAM_UNIX_USER(sam_pwent)) {
+                       uid = pdb_get_uid(sam_pwent);
+                       gid = pdb_get_gid(sam_pwent);
+                       printf ("user ID/Group:  %d/%d\n", uid, gid);
+               }
+               printf ("user RID/GRID:  %u/%u\n", (unsigned int)pdb_get_user_rid(sam_pwent),
+                       (unsigned int)pdb_get_group_rid(sam_pwent));
+               printf ("Full Name:      %s\n", pdb_get_fullname(sam_pwent));
+               printf ("Home Directory: %s\n", pdb_get_homedir(sam_pwent));
+               printf ("HomeDir Drive:  %s\n", pdb_get_dirdrive(sam_pwent));
+               printf ("Logon Script:   %s\n", pdb_get_logon_script(sam_pwent));
+               printf ("Profile Path:   %s\n", pdb_get_profile_path(sam_pwent));
        } else if (smbpwdstyle) {
-               char lm_passwd[33];
-               char nt_passwd[33];
-               pdb_sethexpwd(lm_passwd, 
-                             pdb_get_lanman_passwd(sam_pwent), 
-                             pdb_get_acct_ctrl(sam_pwent));
-               pdb_sethexpwd(nt_passwd, 
-                             pdb_get_nt_passwd(sam_pwent), 
-                             pdb_get_acct_ctrl(sam_pwent));
-               
-               printf("%s:%d:%s:%s:%s:LCT-%08X:\n",
-                       pdb_get_username(sam_pwent),
-                       pdb_get_uid(sam_pwent),
-                       lm_passwd,
-                       nt_passwd,
-                       pdb_encode_acct_ctrl(pdb_get_acct_ctrl(sam_pwent),NEW_PW_FORMAT_SPACE_PADDED_LEN),
-                       (uint32)pdb_get_pass_last_set_time(sam_pwent));
+               if (IS_SAM_UNIX_USER(sam_pwent)) {
+                       char lm_passwd[33];
+                       char nt_passwd[33];
+
+                       uid = pdb_get_uid(sam_pwent);
+                       pdb_sethexpwd(lm_passwd, 
+                                     pdb_get_lanman_passwd(sam_pwent), 
+                                     pdb_get_acct_ctrl(sam_pwent));
+                       pdb_sethexpwd(nt_passwd, 
+                                     pdb_get_nt_passwd(sam_pwent), 
+                                     pdb_get_acct_ctrl(sam_pwent));
+                       
+                       printf("%s:%d:%s:%s:%s:LCT-%08X:\n",
+                              pdb_get_username(sam_pwent),
+                              uid,
+                              lm_passwd,
+                              nt_passwd,
+                              pdb_encode_acct_ctrl(pdb_get_acct_ctrl(sam_pwent),NEW_PW_FORMAT_SPACE_PADDED_LEN),
+                              (uint32)pdb_get_pass_last_set_time(sam_pwent));
+               } else {
+                       fprintf(stderr, "Can't output in smbpasswd format, no uid on this record.\n");
+               }
        } else {
-               printf ("%s:%d:%s\n", sam_pwent->username, sam_pwent->uid, sam_pwent->full_name);
-       }       
-       
+               if (IS_SAM_UNIX_USER(sam_pwent)) {
+                       printf ("%s:%d:%s\n", pdb_get_username(sam_pwent), pdb_get_uid(sam_pwent), 
+                               pdb_get_fullname(sam_pwent));
+               } else {        
+                       printf ("%s:(null):%s\n", pdb_get_username(sam_pwent), pdb_get_fullname(sam_pwent));
+               }
+       }
+
        return 0;       
 }
 
@@ -150,19 +160,20 @@ static int print_users_list (BOOL verbosity, BOOL smbpwdstyle)
        ret = pdb_setsampwent(False);
        if (ret && errno == ENOENT) {
                fprintf (stderr,"Password database not found!\n");
-               pdb_free_sam(&sam_pwent);
                exit(1);
        }
+       pdb_free_sam(&sam_pwent);
 
-       while ((ret = pdb_getsampwent (sam_pwent))) {
+       while ((NT_STATUS_IS_OK(pdb_init_sam(&sam_pwent)) 
+               && (ret = pdb_getsampwent (sam_pwent)))) {
                if (verbosity)
                        printf ("---------------\n");
                print_sam_info (sam_pwent, verbosity, smbpwdstyle);
-               pdb_reset_sam(sam_pwent);
+               pdb_free_sam(&sam_pwent);
        }
+       pdb_free_sam(&sam_pwent);
        
        pdb_endsampwent ();
-       pdb_free_sam(&sam_pwent);
        return 0;
 }
 
@@ -187,15 +198,15 @@ static int set_user_info (char *username, char *fullname, char *homedir, char *d
        if (fullname)
                pdb_set_fullname(sam_pwent, fullname);
        if (homedir)
-               pdb_set_homedir(sam_pwent, homedir);
+               pdb_set_homedir(sam_pwent, homedir, True);
        if (drive)
-               pdb_set_dir_drive(sam_pwent,drive);
+               pdb_set_dir_drive(sam_pwent,drive, True);
        if (script)
-               pdb_set_logon_script(sam_pwent, script);
+               pdb_set_logon_script(sam_pwent, script, True);
        if (profile)
-               pdb_set_profile_path (sam_pwent, profile);
+               pdb_set_profile_path (sam_pwent, profile, True);
        
-       if (pdb_update_sam_account (sam_pwent, True))
+       if (pdb_update_sam_account (sam_pwent))
                print_user_info (username, True, False);
        else {
                fprintf (stderr, "Unable to modify entry!\n");
@@ -217,14 +228,17 @@ static int new_user (char *username, char *fullname, char *homedir, char *drive,
        
        ZERO_STRUCT(sam_pwent);
 
-       pdb_init_sam (&sam_pwent);
-
-       if (!(pwd = sys_getpwnam(username))) {
-               fprintf (stderr, "User %s does not exist in system passwd!\n", username);
-               pdb_free_sam (&sam_pwent);
-               return -1;
+       if ((pwd = getpwnam_alloc(username))) {
+               pdb_init_sam_pw (&sam_pwent, pwd);
+               passwd_free(&pwd);
+       } else {
+               fprintf (stderr, "WARNING: user %s does not exist in system passwd\n", username);
+               pdb_init_sam(&sam_pwent);
+               if (!pdb_set_username(sam_pwent, username)) {
+                       return False;
+               }
        }
-       
+
        password1 = getpass("new password:");
        password2 = getpass("retype new password:");
        if (strcmp (password1, password2)) {
@@ -235,24 +249,17 @@ static int new_user (char *username, char *fullname, char *homedir, char *drive,
 
        pdb_set_plaintext_passwd(sam_pwent, password1);
 
-       pdb_set_username(sam_pwent, username);
        if (fullname)
                pdb_set_fullname(sam_pwent, fullname);
        if (homedir)
-               pdb_set_homedir (sam_pwent, homedir);
+               pdb_set_homedir (sam_pwent, homedir, True);
        if (drive)
-               pdb_set_dir_drive (sam_pwent, drive);
+               pdb_set_dir_drive (sam_pwent, drive, True);
        if (script)
-               pdb_set_logon_script(sam_pwent, script);
+               pdb_set_logon_script(sam_pwent, script, True);
        if (profile)
-               pdb_set_profile_path (sam_pwent, profile);
+               pdb_set_profile_path (sam_pwent, profile, True);
        
-       /* TODO: Check uid not being in MACHINE UID range!! */
-       pdb_set_uid (sam_pwent, pwd->pw_uid);
-       pdb_set_gid (sam_pwent, pwd->pw_gid);
-       pdb_set_user_rid (sam_pwent, pdb_uid_to_user_rid (pwd->pw_uid));
-       pdb_set_group_rid (sam_pwent, pdb_gid_to_group_rid (pwd->pw_gid));
-
        pdb_set_acct_ctrl (sam_pwent, ACB_NORMAL);
        
        if (pdb_add_sam_account (sam_pwent)) { 
@@ -273,10 +280,8 @@ static int new_user (char *username, char *fullname, char *homedir, char *drive,
 static int new_machine (char *machinename)
 {
        SAM_ACCOUNT *sam_pwent=NULL;
-       SAM_ACCOUNT *sam_trust=NULL;
        char name[16];
        char *password = NULL;
-       uid_t uid;
        
        pdb_init_sam (&sam_pwent);
 
@@ -293,25 +298,6 @@ static int new_machine (char *machinename)
 
        pdb_set_username (sam_pwent, name);
        
-       for (uid=BASE_MACHINE_UID; uid<=MAX_MACHINE_UID; uid++) {
-               pdb_init_sam (&sam_trust);
-               if (pdb_getsampwuid (sam_trust, uid)) {
-                       pdb_free_sam (&sam_trust);
-               } else {
-                       break;
-               }
-       }
-
-       if (uid>MAX_MACHINE_UID) {
-               fprintf (stderr, "No more free UIDs available to Machine accounts!\n");
-               pdb_free_sam(&sam_pwent);               
-               return -1;
-       }
-
-       pdb_set_uid (sam_pwent, uid);
-       pdb_set_gid (sam_pwent, BASE_MACHINE_UID); /* TODO: set there more appropriate value!! */
-       pdb_set_user_rid (sam_pwent,pdb_uid_to_user_rid (uid));
-       pdb_set_group_rid (sam_pwent, pdb_gid_to_group_rid (BASE_MACHINE_UID));
        pdb_set_acct_ctrl (sam_pwent, ACB_WSTRUST);
        
        if (pdb_add_sam_account (sam_pwent)) {
@@ -331,7 +317,16 @@ static int new_machine (char *machinename)
 
 static int delete_user_entry (char *username)
 {
-       return pdb_delete_sam_account (username);
+       SAM_ACCOUNT *samaccount;
+
+       pdb_init_sam(&samaccount);
+
+       if (!pdb_getsampwnam(samaccount, username)) {
+               fprintf (stderr, "user %s does not exist in the passdb\n", username);
+               return -1;
+       }
+
+       return pdb_delete_sam_account (samaccount);
 }
 
 /*********************************************************
@@ -341,11 +336,20 @@ static int delete_user_entry (char *username)
 static int delete_machine_entry (char *machinename)
 {
        char name[16];
+       SAM_ACCOUNT *samaccount;
        
        safe_strcpy (name, machinename, 16);
        if (name[strlen(name)] != '$')
                safe_strcat (name, "$", 16);
-       return pdb_delete_sam_account (name);
+
+       pdb_init_sam(&samaccount);
+
+       if (!pdb_getsampwnam(samaccount, name)) {
+               fprintf (stderr, "user %s does not exist in the passdb\n", name);
+               return -1;
+       }
+
+       return pdb_delete_sam_account (samaccount);
 }
 
 /*********************************************************
@@ -366,10 +370,7 @@ static int import_users (char *filename)
        long uidval;
        int line = 0;
        int good = 0;
-
-       if (!pdb_init_sam (&sam_pwent)) {
-               fprintf (stderr, "pdb_init_sam FAILED!\n");
-       }
+       struct passwd *pwd;
 
        if((fp = sys_fopen(filename, "rb")) == NULL) {
                fprintf (stderr, "%s\n", strerror (ferror (fp)));
@@ -382,7 +383,6 @@ static int import_users (char *filename)
                fgets(linebuf, 256, fp);
                if (ferror(fp)) {
                        fprintf (stderr, "%s\n", strerror (ferror (fp)));
-                       pdb_free_sam(&sam_pwent);
                        return -1;
                }
                if ((linebuf_len = strlen(linebuf)) == 0) {
@@ -400,20 +400,16 @@ static int import_users (char *filename)
                linebuf[linebuf_len] = '\0';
                if ((linebuf[0] == 0) && feof(fp)) {
                        /*end of file!!*/
-                       pdb_free_sam(&sam_pwent);
                        return 0;
                }
                line++;
                if (linebuf[0] == '#' || linebuf[0] == '\0')
                        continue;
                
-               pdb_set_acct_ctrl (sam_pwent,ACB_NORMAL);
-               
                /* Get user name */
                p = (unsigned char *) strchr_m(linebuf, ':');
                if (p == NULL) {
                        fprintf (stderr, "Error: malformed password entry at line %d !!\n", line);
-                       pdb_reset_sam (sam_pwent);
                        continue;
                }
                strncpy(user_name, linebuf, PTR_DIFF(p, linebuf));
@@ -423,25 +419,30 @@ static int import_users (char *filename)
                p++;
                if(*p == '-') {
                        fprintf (stderr, "Error: negative uid at line %d\n", line);
-                       pdb_reset_sam (sam_pwent);
                        continue;
                }
                if (!isdigit(*p)) {
                        fprintf (stderr, "Error: malformed password entry at line %d (uid not number)\n", line);
-                       pdb_reset_sam (sam_pwent);
                        continue;
                }
                uidval = atoi((char *) p);
                while (*p && isdigit(*p)) p++;
                if (*p != ':') {
                        fprintf (stderr, "Error: malformed password entry at line %d (no : after uid)\n", line);
-                       pdb_reset_sam (sam_pwent);
                        continue;
                }
+               if(!(pwd = sys_getpwnam(user_name))) {
+                       fprintf(stderr, "User %s does not \
+exist in system password file (usually /etc/passwd). Cannot add \
+account without a valid local system user.\n", user_name);
+                       return False;
+               }
+
+               if (!NT_STATUS_IS_OK(pdb_init_sam_pw(&sam_pwent, pwd))) {
+                       fprintf(stderr, "Failed initialise SAM_ACCOUNT for user %s.\n", user_name);
+                       return False;
+               }
 
-               pdb_set_username(sam_pwent, user_name);
-               pdb_set_uid (sam_pwent, uidval);
-               
                /* Get passwords */
                p++;
                if (*p == '*' || *p == 'X') {
@@ -453,12 +454,12 @@ static int import_users (char *filename)
                } else {
                        if (linebuf_len < (PTR_DIFF(p, linebuf) + 33)) {
                                fprintf (stderr, "Error: malformed password entry at line %d (password too short)\n",line);
-                               pdb_reset_sam (sam_pwent);
+                               pdb_free_sam (&sam_pwent);
                                continue;
                        }
                        if (p[32] != ':') {
                                fprintf (stderr, "Error: malformed password entry at line %d (no terminating :)\n",line);
-                               pdb_reset_sam (sam_pwent);
+                               pdb_free_sam (&sam_pwent);
                                continue;
                        }
                        if (!strncasecmp((char *) p, "NO PASSWORD", 11)) {
@@ -467,7 +468,7 @@ static int import_users (char *filename)
                        } else {
                                if (!pdb_gethexpwd((char *)p, smbpwd)) {
                                        fprintf (stderr, "Error: malformed Lanman password entry at line %d (non hex chars)\n", line);
-                                       pdb_reset_sam (sam_pwent);
+                                       pdb_free_sam (&sam_pwent);
                                        continue;
                                }
                                pdb_set_lanman_passwd(sam_pwent, smbpwd);
@@ -514,49 +515,17 @@ static int import_users (char *filename)
                        }
                }
 
-               /* Old-style workstation account code droped. */
-
-               if (pdb_get_acct_ctrl(sam_pwent) & ACB_WSTRUST) {
-                       if ((uidval < BASE_MACHINE_UID) || (uidval > MAX_MACHINE_UID)) {
-                               fprintf (stderr, "Warning: Machine UID out of normal range %d-%d\n",
-                                                BASE_MACHINE_UID,
-                                                MAX_MACHINE_UID);
-                       }
-                       pdb_set_uid(sam_pwent, BASE_MACHINE_UID);
-               }
-       
-               /* Test if user is valid */
-               if (pdb_get_acct_ctrl(sam_pwent) & ACB_NORMAL) {
-                       struct passwd  *pwd = NULL;
-
-                       if (!(pwd = sys_getpwnam(user_name))) {
-                               fprintf (stderr, "Error: User %s does not exist in system passwd!\n", user_name);
-                               continue;
-                       }
-                       pdb_set_gid(sam_pwent, pwd->pw_gid);
-               }
-
-               /* Fill in sam_pwent structure */
-               pdb_set_user_rid(sam_pwent, pdb_uid_to_user_rid (pdb_get_uid(sam_pwent)));
-               pdb_set_group_rid(sam_pwent, pdb_gid_to_group_rid (pdb_get_gid(sam_pwent)));
-
-               /* TODO: set also full_name, home_dir, dir_drive, logon_script, profile_path, ecc...
-                * when defaults will be available (after passdb redesign)
-                * let them blank just now they are not used anyway
-                */
-                                        
                 /* Now ADD the entry */
                if (!(pdb_add_sam_account (sam_pwent))) {
                        fprintf (stderr, "Unable to add user entry!\n");
-                       pdb_reset_sam (sam_pwent);
+                       pdb_free_sam (&sam_pwent);
                        continue;
                }
                printf ("%s imported!\n", user_name);
                good++;
-               pdb_reset_sam (sam_pwent);
+               pdb_free_sam (&sam_pwent);
        }
        printf ("%d lines read.\n%d entryes imported\n", line, good);
-       pdb_free_sam(&sam_pwent);       
        return 0;
 }
 
@@ -567,7 +536,6 @@ static int import_users (char *filename)
 int main (int argc, char **argv)
 {
        int ch;
-       static pstring servicesf = CONFIGFILE;
        BOOL list_users = False;
        BOOL verbose = False;
        BOOL spstyle = False;
@@ -584,27 +552,28 @@ int main (int argc, char **argv)
        char *profile_path = NULL;
        char *smbpasswd = NULL;
 
-       TimeInit();
-       
-       setup_logging("tdbedit", True);
+       setup_logging("pdbedit", True);
 
        if (argc < 2) {
                usage();
                return 0;
        }
        
-       if(!initialize_password_db(True)) {
-               fprintf(stderr, "Can't setup password database vectors.\n");
+       DEBUGLEVEL = 1;
+       AllowDebugChange = False;
+
+       if (!lp_load(dyn_CONFIGFILE,True,False,False)) {
+               fprintf(stderr, "Can't load %s - run testparm to debug it\n", 
+                       dyn_CONFIGFILE);
                exit(1);
        }
        
-       if (!lp_load(servicesf,True,False,False)) {
-               fprintf(stderr, "Can't load %s - run testparm to debug it\n", 
-                       servicesf);
+       if(!initialize_password_db(True)) {
+               fprintf(stderr, "Can't setup password database vectors.\n");
                exit(1);
        }
        
-       while ((ch = getopt(argc, argv, "ad:f:h:i:lmp:s:u:vwx")) != EOF) {
+       while ((ch = getopt(argc, argv, "ad:f:h:i:lmp:s:u:vwxD:")) != EOF) {
                switch(ch) {
                case 'a':
                        add_user = True;
@@ -651,6 +620,9 @@ int main (int argc, char **argv)
                        import = True;
                        smbpasswd = optarg;
                        break;
+               case 'D':
+                       DEBUGLEVEL = atoi(optarg);
+                       break;
                default:
                        usage();
                }