diff options
author | Volker Lendecke <vl@samba.org> | 2008-05-19 23:06:42 +0200 |
---|---|---|
committer | Stefan Metzmacher <metze@samba.org> | 2008-07-26 20:45:47 +0200 |
commit | 998b0fef1199b3c24939878d202f5e4b71e5b742 (patch) | |
tree | 24962940dde12f02aa741e4ffb126ca811851a3a /source4/scripting/bin/mymachinepw | |
parent | 460356c976f0e5608119da75bcf96663f63a6fc1 (diff) | |
download | samba-998b0fef1199b3c24939878d202f5e4b71e5b742.tar.gz samba-998b0fef1199b3c24939878d202f5e4b71e5b742.tar.bz2 samba-998b0fef1199b3c24939878d202f5e4b71e5b742.zip |
Add "mymachinepw" to fetch our machine password out of secrets.ldb
(This used to be commit 4fbe16deb0e06e145f643568a699b80b431d4f42)
Diffstat (limited to 'source4/scripting/bin/mymachinepw')
-rwxr-xr-x | source4/scripting/bin/mymachinepw | 45 |
1 files changed, 45 insertions, 0 deletions
diff --git a/source4/scripting/bin/mymachinepw b/source4/scripting/bin/mymachinepw new file mode 100755 index 0000000000..d489dc4693 --- /dev/null +++ b/source4/scripting/bin/mymachinepw @@ -0,0 +1,45 @@ +#!/usr/bin/env python + +# Unix SMB/CIFS implementation. +# Copyright (C) Volker Lendecke 2008 +# +# Extract our own machine pw from secrets.ldb +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; either version 3 of the License, or +# (at your option) any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program. If not, see <http://www.gnu.org/licenses/>. +# + +import samba.param as param, ldb, sys, getopt + +optlist, args = getopt.getopt(sys.argv[1:], "s:") + +conf = param.LoadParm() +loaded = False + +for o, v in optlist: + if o == "-s": + if not conf.load(v): + raise(v + " not found") + loaded = True + +if not loaded: + conf.load_default() + +secrets = ldb.Ldb() +secrets.connect(conf.get("private dir") + "/secrets.ldb") + +search = "(&(objectclass=primaryDomain)(samaccountname=" + \ + conf.get("netbios name") + "$))" + +msg = secrets.search(expression=search, attrs=['secret']) +print(msg[0]['secret'][0]) |