summaryrefslogtreecommitdiff
path: root/source4/scripting
diff options
context:
space:
mode:
authorVolker Lendecke <vl@samba.org>2008-05-19 23:06:42 +0200
committerStefan Metzmacher <metze@samba.org>2008-07-26 20:45:47 +0200
commit998b0fef1199b3c24939878d202f5e4b71e5b742 (patch)
tree24962940dde12f02aa741e4ffb126ca811851a3a /source4/scripting
parent460356c976f0e5608119da75bcf96663f63a6fc1 (diff)
downloadsamba-998b0fef1199b3c24939878d202f5e4b71e5b742.tar.gz
samba-998b0fef1199b3c24939878d202f5e4b71e5b742.tar.bz2
samba-998b0fef1199b3c24939878d202f5e4b71e5b742.zip
Add "mymachinepw" to fetch our machine password out of secrets.ldb
(This used to be commit 4fbe16deb0e06e145f643568a699b80b431d4f42)
Diffstat (limited to 'source4/scripting')
-rwxr-xr-xsource4/scripting/bin/mymachinepw45
1 files changed, 45 insertions, 0 deletions
diff --git a/source4/scripting/bin/mymachinepw b/source4/scripting/bin/mymachinepw
new file mode 100755
index 0000000000..d489dc4693
--- /dev/null
+++ b/source4/scripting/bin/mymachinepw
@@ -0,0 +1,45 @@
+#!/usr/bin/env python
+
+# Unix SMB/CIFS implementation.
+# Copyright (C) Volker Lendecke 2008
+#
+# Extract our own machine pw from secrets.ldb
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; either version 3 of the License, or
+# (at your option) any later version.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program. If not, see <http://www.gnu.org/licenses/>.
+#
+
+import samba.param as param, ldb, sys, getopt
+
+optlist, args = getopt.getopt(sys.argv[1:], "s:")
+
+conf = param.LoadParm()
+loaded = False
+
+for o, v in optlist:
+ if o == "-s":
+ if not conf.load(v):
+ raise(v + " not found")
+ loaded = True
+
+if not loaded:
+ conf.load_default()
+
+secrets = ldb.Ldb()
+secrets.connect(conf.get("private dir") + "/secrets.ldb")
+
+search = "(&(objectclass=primaryDomain)(samaccountname=" + \
+ conf.get("netbios name") + "$))"
+
+msg = secrets.search(expression=search, attrs=['secret'])
+print(msg[0]['secret'][0])