~zulcss/samba/server-dailies-3.4

« back to all changes in this revision

Viewing changes to source4/lib/registry/tools/regtree.c

  • Committer: Chuck Short
  • Date: 2010-09-28 20:38:39 UTC
  • Revision ID: zulcss@ubuntu.com-20100928203839-pgjulytsi9ue63x1
Initial version

Show diffs side-by-side

added added

removed removed

Lines of Context:
 
1
/*
 
2
   Unix SMB/CIFS implementation.
 
3
   simple registry frontend
 
4
 
 
5
   Copyright (C) Jelmer Vernooij 2004-2007
 
6
 
 
7
   This program is free software; you can redistribute it and/or modify
 
8
   it under the terms of the GNU General Public License as published by
 
9
   the Free Software Foundation; either version 3 of the License, or
 
10
   (at your option) any later version.
 
11
 
 
12
   This program is distributed in the hope that it will be useful,
 
13
   but WITHOUT ANY WARRANTY; without even the implied warranty of
 
14
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 
15
   GNU General Public License for more details.
 
16
 
 
17
   You should have received a copy of the GNU General Public License
 
18
   along with this program.  If not, see <http://www.gnu.org/licenses/>.
 
19
*/
 
20
 
 
21
#include "includes.h"
 
22
#include "lib/registry/registry.h"
 
23
#include "lib/registry/tools/common.h"
 
24
#include "lib/events/events.h"
 
25
#include "lib/cmdline/popt_common.h"
 
26
#include "param/param.h"
 
27
 
 
28
/**
 
29
 * Print a registry key recursively
 
30
 *
 
31
 * @param level Level at which to print
 
32
 * @param p Key to print
 
33
 * @param fullpath Whether the full pat hshould be printed or just the last bit
 
34
 * @param novals Whether values should not be printed
 
35
 */
 
36
static void print_tree(int level, struct registry_key *p,
 
37
                       const char *name,
 
38
                       bool fullpath, bool novals)
 
39
{
 
40
        struct registry_key *subkey;
 
41
        const char *valuename, *keyname;
 
42
        uint32_t valuetype;
 
43
        DATA_BLOB valuedata;
 
44
        struct security_descriptor *sec_desc;
 
45
        WERROR error;
 
46
        int i;
 
47
        TALLOC_CTX *mem_ctx;
 
48
 
 
49
        for(i = 0; i < level; i++) putchar(' '); puts(name);
 
50
 
 
51
        mem_ctx = talloc_init("print_tree");
 
52
        for (i = 0; W_ERROR_IS_OK(error = reg_key_get_subkey_by_index(mem_ctx,
 
53
                                                                      p,
 
54
                                                                      i,
 
55
                                                                      &keyname,
 
56
                                                                      NULL,
 
57
                                                                      NULL)); i++) {
 
58
 
 
59
                SMB_ASSERT(strlen(keyname) > 0);
 
60
                if (!W_ERROR_IS_OK(reg_open_key(mem_ctx, p, keyname, &subkey)))
 
61
                        continue;
 
62
 
 
63
                print_tree(level+1, subkey, (fullpath && strlen(name))?
 
64
                                               talloc_asprintf(mem_ctx, "%s\\%s",
 
65
                                                               name, keyname):
 
66
                                               keyname, fullpath, novals);
 
67
                talloc_free(subkey);
 
68
        }
 
69
        talloc_free(mem_ctx);
 
70
 
 
71
        if(!W_ERROR_EQUAL(error, WERR_NO_MORE_ITEMS)) {
 
72
                DEBUG(0, ("Error occured while fetching subkeys for '%s': %s\n",
 
73
                                  name, win_errstr(error)));
 
74
        }
 
75
 
 
76
        if (!novals) {
 
77
                mem_ctx = talloc_init("print_tree");
 
78
                for(i = 0; W_ERROR_IS_OK(error = reg_key_get_value_by_index(
 
79
                        mem_ctx, p, i, &valuename, &valuetype, &valuedata));
 
80
                        i++) {
 
81
                        int j;
 
82
                        for(j = 0; j < level+1; j++) putchar(' ');
 
83
                        printf("%s\n",  reg_val_description(mem_ctx,
 
84
                                lp_iconv_convenience(cmdline_lp_ctx), valuename,
 
85
                                valuetype, valuedata));
 
86
                }
 
87
                talloc_free(mem_ctx);
 
88
 
 
89
                if(!W_ERROR_EQUAL(error, WERR_NO_MORE_ITEMS)) {
 
90
                        DEBUG(0, ("Error occured while fetching values for '%s': %s\n",
 
91
                                name, win_errstr(error)));
 
92
                }
 
93
        }
 
94
 
 
95
        mem_ctx = talloc_init("sec_desc");
 
96
        if (NT_STATUS_IS_ERR(reg_get_sec_desc(mem_ctx, p, &sec_desc))) {
 
97
                DEBUG(0, ("Error getting security descriptor\n"));
 
98
        }
 
99
        talloc_free(mem_ctx);
 
100
}
 
101
 
 
102
int main(int argc, char **argv)
 
103
{
 
104
        int opt, i;
 
105
        const char *file = NULL;
 
106
        const char *remote = NULL;
 
107
        poptContext pc;
 
108
        struct registry_context *h = NULL;
 
109
        struct registry_key *start_key = NULL;
 
110
        struct tevent_context *ev_ctx;
 
111
        WERROR error;
 
112
        bool fullpath = false, no_values = false;
 
113
        struct poptOption long_options[] = {
 
114
                POPT_AUTOHELP
 
115
                {"file", 'F', POPT_ARG_STRING, &file, 0, "file path", NULL },
 
116
                {"remote", 'R', POPT_ARG_STRING, &remote, 0, "connect to specified remote server", NULL },
 
117
                {"fullpath", 'f', POPT_ARG_NONE, &fullpath, 0, "show full paths", NULL},
 
118
                {"no-values", 'V', POPT_ARG_NONE, &no_values, 0, "don't show values", NULL},
 
119
                POPT_COMMON_SAMBA
 
120
                POPT_COMMON_CREDENTIALS
 
121
                POPT_COMMON_VERSION
 
122
                { NULL }
 
123
        };
 
124
 
 
125
        pc = poptGetContext(argv[0], argc, (const char **) argv, long_options,0);
 
126
 
 
127
        while((opt = poptGetNextOpt(pc)) != -1) {
 
128
        }
 
129
 
 
130
        ev_ctx = s4_event_context_init(NULL);
 
131
 
 
132
        if (remote != NULL) {
 
133
                h = reg_common_open_remote(remote, ev_ctx, cmdline_lp_ctx, cmdline_credentials);
 
134
        } else if (file != NULL) {
 
135
                start_key = reg_common_open_file(file, ev_ctx, cmdline_lp_ctx, cmdline_credentials);
 
136
        } else {
 
137
                h = reg_common_open_local(cmdline_credentials, ev_ctx, cmdline_lp_ctx);
 
138
        }
 
139
 
 
140
        if (h == NULL && start_key == NULL)
 
141
                return 1;
 
142
 
 
143
        poptFreeContext(pc);
 
144
 
 
145
        error = WERR_OK;
 
146
 
 
147
        if (start_key != NULL) {
 
148
                print_tree(0, start_key, "", fullpath, no_values);
 
149
        } else {
 
150
                for(i = 0; reg_predefined_keys[i].handle; i++) {
 
151
                        error = reg_get_predefined_key(h,
 
152
                                                       reg_predefined_keys[i].handle,
 
153
                                                       &start_key);
 
154
                        if (!W_ERROR_IS_OK(error)) {
 
155
                                fprintf(stderr, "Skipping %s: %s\n",
 
156
                                        reg_predefined_keys[i].name,
 
157
                                        win_errstr(error));
 
158
                                continue;
 
159
                        }
 
160
                        SMB_ASSERT(start_key != NULL);
 
161
                        print_tree(0, start_key, reg_predefined_keys[i].name,
 
162
                                   fullpath, no_values);
 
163
                }
 
164
        }
 
165
 
 
166
        return 0;
 
167
}