summaryrefslogtreecommitdiff
path: root/swat2/scripting/server/regedit.esp
diff options
context:
space:
mode:
authorStefan Metzmacher <metze@samba.org>2008-09-11 16:47:45 +0200
committerStefan Metzmacher <metze@samba.org>2008-09-12 08:51:07 +0200
commitbf852a3dbeee8900fa36978f08a5cdceabcbd926 (patch)
treedd365b88f23fafefb02b7ebc2dea4e3ca39372fe /swat2/scripting/server/regedit.esp
parenta383b8bf88a5681f9c9c6839ba645c872a735051 (diff)
downloadsamba-bf852a3dbeee8900fa36978f08a5cdceabcbd926.tar.gz
rename swat => swat2, so that we don't conflict with samba3
metze
Diffstat (limited to 'swat2/scripting/server/regedit.esp')
-rw-r--r--swat2/scripting/server/regedit.esp51
1 files changed, 51 insertions, 0 deletions
diff --git a/swat2/scripting/server/regedit.esp b/swat2/scripting/server/regedit.esp
new file mode 100644
index 00000000000..58ba695c473
--- /dev/null
+++ b/swat2/scripting/server/regedit.esp
@@ -0,0 +1,51 @@
+<%
+/*
+ server side AJAJ functions for registry editing. These go along
+ with scripting/client/regedit.js
+*/
+libinclude("base.js");
+libinclude("winreg.js");
+libinclude("server_call.js");
+
+/*
+ server side call to return a listing of keys in a winreg path
+*/
+function enum_keys(binding, path) {
+ printf("enum_keys(%s, %s)\n", binding, path);
+ var reg = winregObj();
+
+ reg.credentials = session.authinfo.credentials;
+
+ var status = reg.connect(binding);
+ if (status.is_ok != true) {
+ printVars(status);
+ return undefined;
+ }
+ return reg.enum_path(path);
+}
+
+/*
+ server side call to return a listing of values in a winreg path
+*/
+function enum_values(binding, path) {
+ printf("enum_values(%s, %s)\n", binding, path);
+ var reg = winregObj();
+
+ reg.credentials = session.authinfo.credentials;
+
+ var status = reg.connect(binding);
+ if (status.is_ok != true) {
+ printVars(status);
+ return undefined;
+ }
+ return reg.enum_values(path);
+}
+
+/* register a call for clients to make */
+var call = servCallObj();
+call.add('enum_keys', enum_keys);
+call.add('enum_values', enum_values);
+
+/* run the function that was asked for */
+call.run();
+%>