/* Samba Unix/Linux SMB client library net ads commands for Group Policy Copyright (C) 2005 Guenther Deschner (gd@samba.org) This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */ #include "includes.h" #include "utils/net.h" #ifdef HAVE_ADS static int net_ads_gpo_usage(int argc, const char **argv) { d_printf( "net ads gpo \n"\ " can be either:\n"\ " ADDLINK Link a container to a GPO\n"\ " APPLY Apply all GPOs\n"\ " DELETELINK Delete a gPLink from a container\n"\ " EFFECTIVE Lists all GPOs assigned to a machine\n"\ " GETGPO Lists specified GPO\n"\ " GETLINK Lists gPLink of a containter\n"\ " HELP Prints this help message\n"\ " LIST Lists all GPOs\n"\ "\n" ); return -1; } static int net_ads_gpo_effective(int argc, const char **argv) { TALLOC_CTX *mem_ctx; ADS_STRUCT *ads; ADS_STATUS status; const char *attrs[] = { "userAccountControl", NULL }; LDAPMessage *res = NULL; const char *filter; char *dn = NULL; struct GROUP_POLICY_OBJECT *gpo_list; uint32 uac = 0; uint32 flags = 0; struct GROUP_POLICY_OBJECT *gpo; NTSTATUS result; if (argc < 1) { printf("usage: net ads gpo effective \n"); return -1; } mem_ctx = talloc_init("net_ads_gpo_effective"); if (mem_ctx == NULL) { return -1; } filter = talloc_asprintf(mem_ctx, "(&(objectclass=user)(sAMAccountName=%s))", argv[0]); if (filter == NULL) { goto out; } status = ads_startup(False, &ads); if (!ADS_ERR_OK(status)) { goto out; } status = ads_do_search_all(ads, ads->config.bind_path, LDAP_SCOPE_SUBTREE, filter, attrs, &res); if (!ADS_ERR_OK(status)) { goto out; } if (ads_count_replies(ads, res) != 1) { printf("no result\n"); goto out; } dn = ads_get_dn(ads, res); if (dn == NULL) { goto out; } if (!ads_pull_uint32(ads, res, "userAccountControl", &uac)) { goto out; } if (uac & UF_WORKSTATION_TRUST_ACCOUNT) { flags |= GPO_LIST_FLAG_MACHINE; } printf("\n%s: '%s' has dn: '%s'\n\n", (uac & UF_WORKSTATION_TRUST_ACCOUNT) ? "machine" : "user", argv[0], dn); status = ads_get_gpo_list(ads, mem_ctx, dn, flags, &gpo_list); if (!ADS_ERR_OK(status)) { goto out; } for (gpo = gpo_list; gpo; gpo = gpo->next) { char *server, *share, *nt_path, *unix_path; printf("--------------------------------------\n"); printf("Name:\t\t\t%s\n", gpo->display_name); printf("LDAP GPO version:\t%d (user: %d, machine: %d)\n", gpo->version, GPO_VERSION_USER(gpo->version), GPO_VERSION_MACHINE(gpo->version)); result = ads_gpo_explode_filesyspath(ads, mem_ctx, gpo->file_sys_path, &server, &share, &nt_path, &unix_path); if (!NT_STATUS_IS_OK(result)) { printf("got: %s\n", nt_errstr(result)); } printf("GPO stored on server: %s, share: %s\n", server, share); printf("\tremote path:\t%s\n", nt_path); printf("\tlocal path:\t%s\n", unix_path); } out: ads_memfree(ads, dn); ads_msgfree(ads, res); ads_destroy(&ads); talloc_destroy(mem_ctx); return 0; } static int net_ads_gpo_list(int argc, const char **argv) { ADS_STRUCT *ads; ADS_STATUS status; LDAPMessage *res = NULL; int num_reply = 0; LDAPMessage *msg = NULL; struct GROUP_POLICY_OBJECT gpo; TALLOC_CTX *mem_ctx; char *dn; const char *attrs[] = { "versionNumber", "flags", "gPCFileSysPath", "displayName", "name", "gPCMachineExtensionNames", "gPCUserExtensionNames", NULL }; mem_ctx = talloc_init("net_ads_gpo_list"); if (mem_ctx == NULL) { return -1; } status = ads_startup(False, &ads); if (!ADS_ERR_OK(status)) { goto out; } status = ads_do_search_all(ads, ads->config.bind_path, LDAP_SCOPE_SUBTREE, "(objectclass=groupPolicyContainer)", attrs, &res); if (!ADS_ERR_OK(status)) { d_printf("search failed: %s\n", ads_errstr(status)); goto out; } num_reply = ads_count_replies(ads, res); d_printf("Got %d replies\n\n", num_reply); /* dump the results */ for (msg = ads_first_entry(ads, res); msg; msg = ads_next_entry(ads, msg)) { if ((dn = ads_get_dn(ads, msg)) == NULL) { goto out; } status = ads_parse_gpo(ads, mem_ctx, msg, dn, &gpo); if (!ADS_ERR_OK(status)) { d_printf("parse failed: %s\n", ads_errstr(status)); ads_memfree(ads, dn); goto out; } dump_gpo(mem_ctx, &gpo); ads_memfree(ads, dn); } out: ads_msgfree(ads, res); talloc_destroy(mem_ctx); ads_destroy(&ads); return 0; } static int net_ads_gpo_apply(int argc, const char **argv) { TALLOC_CTX *mem_ctx; ADS_STRUCT *ads; ADS_STATUS status; const char *attrs[] = {"distinguishedName", "userAccountControl", NULL}; LDAPMessage *res = NULL; const char *filter; char *dn = NULL; struct GROUP_POLICY_OBJECT *gpo_list; uint32 uac = 0; uint32 flags = 0; if (argc < 1) { printf("usage: net ads gpo apply \n"); return -1; } mem_ctx = talloc_init("net_ads_gpo_apply"); if (mem_ctx == NULL) { goto out; } filter = talloc_asprintf(mem_ctx, "(&(objectclass=user)(sAMAccountName=%s))", argv[0]); if (filter == NULL) { goto out; } status = ads_startup(False, &ads); if (!ADS_ERR_OK(status)) { goto out; } status = ads_do_search_all(ads, ads->config.bind_path, LDAP_SCOPE_SUBTREE, filter, attrs, &res); if (!ADS_ERR_OK(status)) { goto out; } if (ads_count_replies(ads, res) != 1) { printf("no result\n"); goto out; } dn = ads_get_dn(ads, res); if (dn == NULL) { goto out; } if (!ads_pull_uint32(ads, res, "userAccountControl", &uac)) { goto out; } if (uac & UF_WORKSTATION_TRUST_ACCOUNT) { flags |= GPO_LIST_FLAG_MACHINE; } printf("%s: '%s' has dn: '%s'\n", (uac & UF_WORKSTATION_TRUST_ACCOUNT) ? "machine" : "user", argv[0], dn); status = ads_get_gpo_list(ads, mem_ctx, dn, flags, &gpo_list); if (!ADS_ERR_OK(status)) { goto out; } /* FIXME: allow to process just a single extension */ status = gpo_process_gpo_list(ads, mem_ctx, &gpo_list, NULL, flags); if (!ADS_ERR_OK(status)) { goto out; } out: ads_memfree(ads, dn); ads_msgfree(ads, res); ads_destroy(&ads); talloc_destroy(mem_ctx); return 0; } static int net_ads_gpo_get_link(int argc, const char **argv) { ADS_STRUCT *ads; ADS_STATUS status; TALLOC_CTX *mem_ctx; struct GP_LINK gp_link; if (argc < 1) { printf("usage: net ads gpo getlink \n"); return -1; } mem_ctx = talloc_init("add_gpo_link"); if (mem_ctx == NULL) { return -1; } status = ads_startup(False, &ads); if (!ADS_ERR_OK(status)) { goto out; } status = ads_get_gpo_link(ads, mem_ctx, argv[0], &gp_link); if (!ADS_ERR_OK(status)) { d_printf("get link for %s failed: %s\n", argv[0], ads_errstr(status)); goto out; } dump_gplink(ads, mem_ctx, &gp_link); out: talloc_destroy(mem_ctx); ads_destroy(&ads); return 0; } static int net_ads_gpo_add_link(int argc, const char **argv) { ADS_STRUCT *ads; ADS_STATUS status; uint32 gpo_opt = 0; TALLOC_CTX *mem_ctx; if (argc < 2) { printf("usage: net ads gpo addlink [options]\n"); return -1; } mem_ctx = talloc_init("add_gpo_link"); if (mem_ctx == NULL) { return -1; } if (argc == 3) { gpo_opt = atoi(argv[2]); } status = ads_startup(False, &ads); if (!ADS_ERR_OK(status)) { goto out; } status = ads_add_gpo_link(ads, mem_ctx, argv[0], argv[1], gpo_opt); if (!ADS_ERR_OK(status)) { d_printf("add link failed: %s\n", ads_errstr(status)); goto out; } out: talloc_destroy(mem_ctx); ads_destroy(&ads); return 0; } static int net_ads_gpo_delete_link(int argc, const char **argv) { ADS_STRUCT *ads; ADS_STATUS status; TALLOC_CTX *mem_ctx; if (argc < 2) { return -1; } mem_ctx = talloc_init("delete_gpo_link"); if (mem_ctx == NULL) { return -1; } status = ads_startup(False, &ads); if (!ADS_ERR_OK(status)) { goto out; } status = ads_delete_gpo_link(ads, mem_ctx, argv[0], argv[1]); if (!ADS_ERR_OK(status)) { d_printf("delete link failed: %s\n", ads_errstr(status)); goto out; } out: talloc_destroy(mem_ctx); ads_destroy(&ads); return 0; } static int net_ads_gpo_get_gpo(int argc, const char **argv) { ADS_STRUCT *ads; ADS_STATUS status; TALLOC_CTX *mem_ctx; struct GROUP_POLICY_OBJECT gpo; uint32 sysvol_gpt_version; char *display_name; if (argc < 1) { return -1; } mem_ctx = talloc_init("add_gpo_get_gpo"); if (mem_ctx == NULL) { return -1; } status = ads_startup(False, &ads); if (!ADS_ERR_OK(status)) { goto out; } if (strnequal(argv[0], "CN={", strlen("CN={"))) { status = ads_get_gpo(ads, mem_ctx, argv[0], NULL, NULL, &gpo); } else { status = ads_get_gpo(ads, mem_ctx, NULL, argv[0], NULL, &gpo); } if (!ADS_ERR_OK(status)) { d_printf("get gpo for [%s] failed: %s\n", argv[0], ads_errstr(status)); goto out; } dump_gpo(mem_ctx, &gpo); status = ADS_ERROR_NT(ads_gpo_get_sysvol_gpt_version(ads, mem_ctx, gpo.file_sys_path, &sysvol_gpt_version, &display_name)); if (!ADS_ERR_OK(status)) { goto out; } printf("sysvol GPT version: %d\n", sysvol_gpt_version); out: talloc_destroy(mem_ctx); ads_destroy(&ads); return 0; } int net_ads_gpo(int argc, const char **argv) { struct functable func[] = { {"LIST", net_ads_gpo_list}, {"EFFECTIVE", net_ads_gpo_effective}, {"ADDLINK", net_ads_gpo_add_link}, {"DELETELINK", net_ads_gpo_delete_link}, {"GETLINK", net_ads_gpo_get_link}, {"GETGPO", net_ads_gpo_get_gpo}, {"HELP", net_ads_gpo_usage}, {"APPLY", net_ads_gpo_apply}, {NULL, NULL} }; return net_run_function(argc, argv, func, net_ads_gpo_usage); } #endif /* HAVE_ADS */