1
0
mirror of https://github.com/altlinux/gpupdate.git synced 2025-08-23 09:49:29 +03:00

Compare commits

...

530 Commits

Author SHA1 Message Date
9325c241ef 0.13.3-alt1
- Fixed machine account credentials initialization (closes: 55324)
2025-07-26 01:10:09 +04:00
3c0c722818 Fixed machine account credentials initialization 2025-07-26 01:08:00 +04:00
9424c2c8e8 0.13.2-alt1
- Fixed: Check directory existence before cleanup to avoid errors(closes:53703)
2025-04-03 10:52:48 +04:00
9065352bb0 Added directory existence check before cleanup 2025-04-03 10:47:26 +04:00
9034d4ba4c 0.13.1-alt1
- Refined registry key handling: LAPS enablement and user presence check
2025-03-14 17:44:20 +04:00
2e6c76337b Refined registry key handling: LAPS enablement and user presence check 2025-03-14 17:44:08 +04:00
a3398e0307 0.13.0-alt1
- Implemented Local Administrator Password Solution (LAPS) functionality,
  including support for Group Policy Object (GPO) keys to
  configure LAPS settings
- Added support for disabling cifsacl in autofs mounts (closes:52333)
- Implemented the ability to merge computer and user GPO shortcuts
- Added access restrictions to network directories of other users
- Added cleaning functionality for the autofs configuration catalog
- Added ability to configure KDE 6 files
2025-03-07 12:24:28 +04:00
c7192773fd Added ability to configure KDE 6 files 2025-03-07 12:22:46 +04:00
93bcac5f19 Added exclude desktop_file_template and desktop_file from dict(obj) 2025-03-06 15:52:26 +04:00
967687497c Implemented the ability to merge computer GPO shortcuts with user GPO shortcuts 2025-03-06 15:45:19 +04:00
3797993209 Fixed unintended escaping in critical data 2025-03-05 10:29:10 +04:00
04831c4dbd Added support for disabling cifsacl 2025-03-04 14:22:16 +04:00
316c0881a9 Updated templates to support disabling cifsacl in autofs mounts 2025-03-04 14:20:09 +04:00
22d0c87538 Added handling of spaces in package names 2025-03-04 11:35:22 +04:00
2c66ad9bc1 Added restriction of access to the connected network catalogs of other users 2025-03-04 11:33:19 +04:00
5fe0b6f418 Added cleaning the autofs configuration catalog and logs for it 2025-03-04 11:19:06 +04:00
829825060b Lower logging level in ncrypt_protect_secret
to reduce log verbosity
2025-02-28 16:27:59 +04:00
463620ff25 Added verification of target user existence
and logging message for cases when user is not found
2025-02-28 15:39:29 +04:00
ab632a8177 Added function to check if a local user exist 2025-02-28 15:22:10 +04:00
5c47ebb6c5 Added the use of laps in frontend_manager 2025-02-28 13:59:04 +04:00
6a840674ca Replaced prints for new logs 2025-02-28 12:35:31 +04:00
a6f6b021fa Added translations to messages of new logs 2025-02-28 12:33:53 +04:00
0f4066e0f0 Added identifiers and messages to logs 2025-02-28 12:32:22 +04:00
030e69cb86 Refactor code with better naming and comments for clarity 2025-02-27 15:15:46 +04:00
5f94fad90b Added implementation of actions in case of used password 2025-02-27 11:46:51 +04:00
156918ad3b Added accounting of group policies 2025-02-26 13:22:12 +04:00
6df5a5754f Added usage of fixed implementations 2025-02-25 12:55:13 +04:00
dda57ed179 Fixed password change and added time after changing it 2025-02-25 12:23:42 +04:00
99595c85d3 Improved saving of password change time 2025-02-25 11:51:32 +04:00
e25c5844a9 Improving get_last_login_hours_ago 2025-02-21 12:55:36 +04:00
8e1a76552f Inaccuracies have been corrected 2025-02-14 14:08:28 +04:00
1f6776912d Added password change logic 2025-02-13 17:04:21 +04:00
3e889622b1 Added implementation for generating password
and searching for elapsed login time
2025-02-11 16:13:45 +04:00
1c827d4533 Added part of laps implementation 2025-02-10 18:36:13 +04:00
ce660afcbd Added laps sketch 2025-02-07 18:37:18 +04:00
5b1a928291 Added saving samdb to Dconf_registry 2025-02-07 17:59:19 +04:00
a77a6e3c6f Added function remove_prefix_from_keys in util 2025-02-06 14:26:36 +04:00
25a784fa2e Added new applier for laps 2025-02-04 17:09:44 +04:00
6378c8c78b Added a branch for storing locks and installing them 2025-02-04 11:47:31 +04:00
9ad7440c8b Added support for distr profile layer 2025-02-04 11:47:23 +04:00
2a5642a76d Added multiuser for machine templates 2025-02-04 11:47:17 +04:00
dbff83050b Added function to call a method on dbus 2025-02-04 11:45:49 +04:00
ed1b2aa39e Code refactoring and optimization 2025-02-04 11:45:43 +04:00
02701136c0 0.12.2-alt1
- Fixed interpretation of boolean values (closes:52683)
2025-01-14 12:10:00 +04:00
408d221c3d Fixed interpretation of boolean values 2025-01-14 12:08:15 +04:00
67a02a4623 0.12.1-alt1
- Fixed checking the path for existence (closes:52597)
2025-01-10 10:37:12 +04:00
7a0af6ab9b Fixed checking the path for existence 2025-01-09 15:55:40 +04:00
ce6e49443f 0.12.0-alt1
- Special thanks to Andrey Belgorodtsev (andrey@net55.su)
  for valuable pre-release testing and feedback
- Added applier thunderbird
- Added environment file cleaning (closes: 51016)
- Added the ability to set the name of the directory to automount
- Added the ability to remove the prefix from a sylink
  to the catalog in automount
- Added the ability to set the timeout in automount
- Added messages using the force mode
- Improved KDE update logic
- Added preservation of previous keys
2024-12-10 10:49:01 +04:00
433d312c0f Prevention of removing the register keys in case --nodomain 2024-12-09 18:49:01 +04:00
2ec68dd95a Added preservation of mod_previous_value in the Source registry branch 2024-12-09 14:17:02 +04:00
3990f876a4 Added the mod_previous_value field in metadata policies 2024-12-09 14:13:41 +04:00
1f541914cd Added clarification to the log 2024-12-05 17:14:56 +04:00
dc054008fd The autofs restart condition has been clarified 2024-12-05 17:13:21 +04:00
aa4bf9a7c8 Added prevention of unnecessary startup of the gpupdate.service 2024-12-05 17:10:42 +04:00
99a6e85ccf Fixed the preservation of previous keys 2024-12-03 14:34:49 +04:00
79ef884f7d Fixed loss of value 0 from dconfdb 2024-11-29 12:37:25 +04:00
0abc5b0282 Managing version absence in gpo 2024-11-28 16:34:29 +04:00
dce52c4d9c Fixed handling of not configured state for plasma update 2024-11-27 11:35:22 +04:00
4d5969a5fa Added messages using the force mode 2024-11-20 10:53:23 +04:00
3263a4cfd3 The usage of the ADB plugin is commented out 2024-11-20 10:38:44 +04:00
0685b9e492 Added use of data from Previous branch 2024-11-18 10:18:32 +04:00
7188c70a77 The function clean_data moved 2024-11-15 18:10:48 +04:00
2edc5c326c The envvar_applier moved to admin_context_apply 2024-11-14 13:54:36 +04:00
39b92ce763 The save_dconf moved to the required stage 2024-11-14 13:54:36 +04:00
620010e1ab Improved link removal logic 2024-11-14 13:54:36 +04:00
b87e8b218f Removed unborrowed code 2024-11-14 13:54:36 +04:00
df0f806035 Added preservation of previous values of the registry in the register 2024-11-14 13:54:36 +04:00
7e8657939f Added dict key prefix management functions:
- add_prefix_to_keys() to prefix dictionary keys
- remove_keys_with_prefix() to filter prefixed keys
2024-11-14 13:54:36 +04:00
a879d5ad52 Replaced the _true_strings list with set
and added dict previous_global_registry_dict
2024-11-14 13:54:36 +04:00
c097769681 Improved correct removal of links 2024-11-14 13:54:36 +04:00
a85158ce3c Brought cifs_applier into working condition 2024-11-14 13:54:36 +04:00
f79b283574 Added reading data from applier storage 2024-11-14 13:54:36 +04:00
b791f3d5eb Added the ability to write and read from applier storage 2024-11-14 13:54:36 +04:00
b16460309a Added a new log with translation 2024-11-14 13:54:36 +04:00
40cf97989e Added the ability to get the path predefined applier storage 2024-11-14 13:54:36 +04:00
71eeb1d5a0 Added the ability to specify a specific file
in get_dictionary_from_dconf_file_db
2024-11-14 13:54:36 +04:00
f45fc7092d Fixed cifs_applie for check_enable_key. 2024-11-14 13:54:36 +04:00
e537b3846a Added the ability to query get_entry as data 2024-11-14 13:54:36 +04:00
64581f60d2 Added the ability to remove the prefix from a symlink
and set the name of the directory to mount
2024-11-14 13:54:36 +04:00
1436ee201e Added new classmethod check_enable_dconf_key 2024-11-14 13:54:36 +04:00
0051e001a8 Added the use of keys to configure the name and timeout 2024-11-14 13:54:36 +04:00
d4eb4263fa Added use of timeout setting 2024-11-14 13:54:36 +04:00
a99ed2db2a Added timeout variable to autofs templates 2024-11-14 13:54:36 +04:00
8bc4375339 Removed unnecessary imports 2024-11-14 13:54:36 +04:00
f24038b288 Changed the way the log is output 2024-11-14 13:54:36 +04:00
96ec5cc690 Removing unclaimed imports 2024-11-14 13:54:36 +04:00
e88278fb47 Added environment file cleaning 2024-11-14 13:54:36 +04:00
4be89029aa Updated dates 2024-11-14 13:54:36 +04:00
b981744d75 Cleaned up code and updated date 2024-11-14 13:54:36 +04:00
760a1d8b90 Added to use thunderbird_applier 2024-11-14 13:54:36 +04:00
cb035fd56e Added logs for Thunderbird 2024-11-14 13:54:36 +04:00
e56293e768 Updated dates 2024-11-14 13:54:36 +04:00
0c0f7d223b Cleaned up code 2024-11-14 13:54:36 +04:00
3c09737aa7 Added thunderbird applier 2024-11-14 13:54:36 +04:00
0027b5aa96 Functions moved from class to outside 2024-11-14 13:54:36 +04:00
df8984dd65 Fixed frequent updating of plasmashell service 2024-11-13 15:41:22 +04:00
5f8c75e27c Merge pull request #208 from altlinux/fix_file_cache
Fix wallpaper for KDE
2024-10-25 15:40:52 +04:00
03b031734a Merge pull request #207 from alxvmr/quote_fix
Added handling of quotation marks in Preference values
2024-10-25 15:32:03 +04:00
77c0d60b7d Fixed desktop image caching mechanism in KDE 2024-10-22 13:14:11 +04:00
51b744f94b Added check for the existence of the cached file and logs about it 2024-10-11 17:17:31 +04:00
cdd9d84037 Added function for changing rights to caching directories 2024-10-11 17:17:28 +04:00
4de1946e32 0.11.4-alt1
- Added skip plugin (closes: 51631)
- Fixed getting the network path (closes:51606)
- The _appliers sequence has been changed,
  package_applier has been moved to the end
2024-10-11 12:24:23 +04:00
73759857b3 The _appliers sequence has been changed,
package_applier has been moved to the end
2024-10-11 12:06:09 +04:00
b3e222ae55 Fixed getting the network path 2024-10-11 12:04:38 +04:00
8a2c9554f7 Added handling of quotation marks in Preference values 2024-09-27 13:16:18 +04:00
862b3b358b 0.11.3-alt1
- Optimized string cleaning using str.translate()
2024-09-06 15:06:06 +04:00
0d2c70da35 Optimized string cleaning using str.translate()
for multiple character replacements
2024-09-06 15:05:27 +04:00
2953e4b0c6 0.11.2-alt1
- Fixed data type handling in kde_applier
- Removing legacy unused code
- Added saving policy data without polfile
- Added escaping of special characters in data (closes: 51201)
2024-09-05 10:39:51 +04:00
c8585ac932 Added accounting for empty policies 2024-09-05 10:37:15 +04:00
981d883ed0 Added escaping of special characters in data 2024-09-04 13:04:30 +04:00
3ddd9462ea The location to add policy data has been moved 2024-09-04 10:33:43 +04:00
ab79f169e8 Changed the function of adding policy data 2024-09-04 10:25:36 +04:00
5a3ba30910 Fixed data type handling 2024-09-02 12:13:53 +04:00
d554b1fdf9 Removing Unused Code 2024-08-29 14:44:36 +04:00
3960c4b094 0.11.1-alt1
- Fixed setting links in shortcuts (closes: 51275)
2024-08-27 11:54:00 +04:00
5f178651f7 Fixed setting links in shortcuts 2024-08-27 11:34:45 +04:00
674e1d176b Removed unused code 2024-08-27 11:23:45 +04:00
afe6ef04d4 0.11.0-alt1
- Added saving preferences in dconf
- Added versioning support for gpt
- Added the ability to force gpt download
- Added completions for --force
- Added new exceptions for Chromium 126
- Added information to the man pages
- Fixed handling of incorrect valuename
2024-08-09 17:12:05 +04:00
fa98fef5a3 Del print 2024-08-09 16:48:19 +04:00
c6c34accff Added --force key management via Group Policy 2024-08-09 16:02:49 +04:00
dba6a58c6a Added completions for --force 2024-08-09 12:05:14 +04:00
a02969c686 Added new exceptions for Chromium 126 2024-08-09 12:00:58 +04:00
e040bbbd69 Added information to the man pages 2024-08-09 11:59:43 +04:00
1775bfa08c Added "force" for gpupdate switch to force gpt download 2024-08-09 11:56:59 +04:00
165f4bfc83 Added --force for gpoa switch to force gpt download 2024-08-09 11:56:06 +04:00
316f5d1e49 Added class field _force 2024-08-09 11:52:55 +04:00
150f3441fd Added rectification to check_module_enabled 2024-08-08 15:03:15 +04:00
769b520d47 Added tracking of attempts to read from the dconf database in the log 2024-08-07 11:58:57 +04:00
517ed6d56b Added number attribute to scriptsini for incorrect paths 2024-08-06 14:00:36 +04:00
40635f9a01 Removed premature call to fill_cache 2024-08-05 17:22:45 +04:00
2eb6e0c632 Added ignoring of policies without versions 2024-08-05 17:19:46 +04:00
710b78b79f Added conversion of key value to list 2024-07-29 17:34:41 +04:00
f308539a5a Changed the way to read package lists 2024-07-25 16:57:51 +04:00
ca8cb9ce78 Storing versions and policy paths has been changed to a dictionary 2024-07-25 11:00:41 +04:00
3c7d45cd52 Added reading cached gpt 2024-07-24 12:50:58 +04:00
6e77d54aa3 Added checking for cached gpt 2024-07-24 12:08:51 +04:00
3c72786bd8 Added now log D211 2024-07-23 17:13:51 +04:00
8a36e01fbb Added explicit conversion to uid string to form filename 2024-07-22 17:14:39 +04:00
32cb959f0b Corrected operation of _check_sysvol_present 2024-07-22 17:10:34 +04:00
3fb24dbd99 Added GPO version mapping in caches and removed
the file_sys_path attribute to prevent reloading
2024-07-22 11:47:41 +04:00
b737c9f0aa Added saving of policy data in a class field,
which does not require downloading
2024-07-22 11:34:37 +04:00
48d94ae046 Added method for reading keys and binary file 2024-07-19 15:58:26 +04:00
4ed05cb481 Added check for empty value 2024-07-18 17:56:25 +04:00
cddc7d70fb Changed the way the dconf database is created 2024-07-15 10:41:49 +04:00
64c305c544 Added get_dconf_config_path 2024-07-12 13:23:01 +04:00
4ee10c1560 Renamed the get_dconf_config_path function to get_dconf_config_file 2024-07-12 13:20:15 +04:00
5e5c5d45a6 Added saving policy_name for preferences 2024-07-11 12:05:48 +04:00
56ee1334af Added a new field for the DynamicAttributes class 2024-07-11 12:04:01 +04:00
de5ef65c16 Added list mark 2024-07-09 18:44:21 +04:00
453934621d Renamed the variable 2024-07-09 15:51:13 +04:00
2132c3676f Added use of RegistryKeyMetadat 2024-07-09 14:02:42 +04:00
e9adb9b298 Added RegistryKeyMetadata class for storage in dconf 2024-07-09 14:02:42 +04:00
3e3957d693 Renamed the function for clarity 2024-07-09 14:02:42 +04:00
554147b57f Simplifying Enum Display 2024-07-09 14:02:42 +04:00
6b632e851c Updated to message W17 2024-07-09 14:02:42 +04:00
3e99bfcb60 Added saving data about sources in keys 2024-07-09 14:02:42 +04:00
2c48b3a6a4 Changed the gpo priority key and added the use of gpo_info 2024-07-09 14:02:42 +04:00
2e22d7abc9 Added gpo counter for saving in dconf 2024-07-09 14:02:42 +04:00
e645fa4e86 Changed base class after renaming 2024-07-09 14:02:42 +04:00
cdcac9e4db Added use of GpoInfoDconf object to save policy data 2024-07-09 14:02:42 +04:00
d3a316c1c0 Renamed base class 2024-07-09 14:02:42 +04:00
f081ec6454 Added a class to represent gpo attributes in dconf 2024-07-09 14:02:42 +04:00
60d6996db2 Transferring the use of FileAction 2024-07-09 14:02:42 +04:00
ea52e9671b Clean code 2024-07-09 14:02:42 +04:00
92df692559 Using FileAction from util 2024-07-09 14:02:42 +04:00
3b4f92997e FileAction moved to util 2024-07-09 14:02:42 +04:00
98d02a4da0 Added use of add_preferences_to_global_registry_dict 2024-07-09 14:02:42 +04:00
eb951cbd5e Added functions to convert preference objects to dconf keys 2024-07-09 14:02:42 +04:00
9ce68f2acc Added base class inheritance 2024-07-09 14:02:42 +04:00
54239c339c Added base class for preference 2024-07-09 14:02:42 +04:00
2b108e2029 0.10.6-alt1
- Fixed firefox_applier errors
2024-07-08 16:51:46 +04:00
2a21983b13 Personalized data extraction 2024-07-08 16:30:38 +04:00
b6e84b3d9e Removed Convert_string_dconf from valuename 2024-07-08 16:29:00 +04:00
bb314fb553 0.10.5-alt1
- Correction of missing entries with a upper case
- Fixed string processing in date (closes: 50782)
- Fixed getting correct data for the user for pkcon_runner
2024-07-02 14:27:19 +04:00
28718e8ad6 Update getting correct data for the user 2024-07-02 11:29:54 +04:00
2857cfb899 Fixed getting correct data for the user 2024-06-28 18:46:24 +04:00
8717e1b9a3 Fixed string processing in date 2024-06-28 18:44:21 +04:00
d3c9b95331 Correction of missing entries with a upper case 2024-06-28 18:44:11 +04:00
4d6a5d750c 0.10.4-alt1
- Fixed the definition of the module activation check (closes: 50755)
- Fixed sorting of scripts (closes: 50756)
- Fixed reading key values from dconf
- Changed the method for getting the list of packages for pkcon_runner
2024-06-27 16:48:27 +04:00
84e1340362 Fixed sorting of scripts
Reported-by: Sergey Sysoev <sysoevsa@surgut.gazprom.ru>
2024-06-27 16:43:18 +04:00
5ee05df574 Fixed the definition of the module activation check
Reported-by: Sergey Sysoev <sysoevsa@surgut.gazprom.ru>
2024-06-27 14:26:37 +04:00
2a993f0400 Fixed reading key values ​​from dconf 2024-06-27 12:14:59 +04:00
b878b7e1b3 Changed the method for getting the list of packages for pkcon_runner 2024-06-27 12:13:08 +04:00
c57d1bac9e 0.10.3-alt1
- Added autocompletion for gpoa, gpupdate, gpupdate-setup
- Added correct work with json data in keys for the Firefox browser
- Polkit_appliers changed to non-experimental
- Fixed bug of not clearing kde applier settings (closes: 50336)
- Fixed registry key reading (closes: 50553)
- Added waiting for data generation for scripts (closes: 50667)
2024-06-19 14:45:49 +04:00
b9b5239448 Changed macro processing method 2024-06-19 14:37:40 +04:00
aae2776790 Added dictionary with macros 2024-06-19 13:59:13 +04:00
a20aa841d6 Add functions to find and wait for a Python process by script path 2024-06-19 13:57:53 +04:00
8c7819d96f Update autocompletion for gpupdate-setup 2024-06-13 16:54:24 +04:00
3d9473f979 Update autocompletion for gpoa and gpupdate 2024-06-13 16:52:34 +04:00
01f48be853 Update gpupdate.spec 2024-06-13 16:17:02 +04:00
1638098fd4 Added autocompletion for gpupdate-setup 2024-06-13 16:16:56 +04:00
047e5459af Added autocompletion for gpupdate 2024-06-13 16:16:37 +04:00
5baa4245e3 Added autocompletion for gpoa 2024-06-13 16:16:30 +04:00
ec6b9f7887 Changing the date in the license 2024-06-13 16:13:00 +04:00
22d0d23b89 Added functionality for clearing unconnected settings 2024-06-13 16:12:53 +04:00
fd3a32e8e1 Removing the old system settings cleanup 2024-06-13 16:12:37 +04:00
9e849e8fe3 Added use try_dict_to_literal_eval 2024-06-13 16:09:02 +04:00
d65f3ed942 Added forgotten return 2024-06-13 16:07:53 +04:00
31298be840 Added new function try_dict_to_literal_eval 2024-06-13 16:06:27 +04:00
5c889fd57e Added saving to dconf of type REG_MULTI_SZ 2024-06-11 16:02:17 +04:00
4e2874c972 Fixed reading flagSync 2024-06-11 15:44:18 +04:00
63e50ac2df Polkit_applier enabled by default 2024-06-11 15:42:29 +04:00
ad2a87e20d 0.10.2-alt1
- Added some fixes to dconf_registry and scripts
- Fixed windows registry key reading for loopback
2024-06-07 14:59:14 +04:00
e9c3a4262a Fixed windows registry key reading for loopback 2024-06-07 14:54:25 +04:00
b5706ec6e1 Added support for the newline symbol in the environment file 2024-06-06 18:14:35 +04:00
61e7350429 Replaced Popen with run for command execution 2024-06-06 16:39:39 +04:00
c9a274fc79 Reducing typical data to two types 2024-06-06 16:33:01 +04:00
127c9f7183 0.10.1-alt1
- Added handling of unexpected data types when writing to dconf
2024-06-04 17:45:48 +04:00
a27f8ba5dd Added handling of unexpected data types 2024-06-04 17:40:23 +04:00
fafe2c34b4 0.10.0-alt1
- A method for storing registry keys obtained from GPOs (Group Policy Objects)
  has undergone significant repairs. We have switched from using SQLite
  to using Dconf to improve data storage efficiency
2024-05-13 18:36:07 +04:00
9c91ddc7ba Added processing the absence of GPO version 2024-05-13 18:34:12 +04:00
1f02ed650b Added corrections of shortcuts 2024-05-07 13:51:03 +04:00
fc47df4649 Added saving version 2024-04-26 10:30:58 +04:00
42b8bdb82a Added usage version 2024-04-26 10:29:58 +04:00
2a174edeef Added version argument 2024-04-26 10:29:02 +04:00
9b8529b39b Fixed creation of shortcut attributes 2024-04-25 15:15:35 +04:00
062ff742c3 Typo fixed 2024-04-24 13:19:27 +04:00
1764560c49 Fixed the templates for a new registry 2024-04-10 17:10:20 +04:00
b439e04a2f Corrected the interpretation of the terminal attribute for shortcuts 2024-04-09 18:20:35 +04:00
e413f95633 Improved processing of registry keys 2024-04-05 16:40:31 +04:00
675f37ab85 The incapable dictionary is removed 2024-04-04 16:01:34 +04:00
9932c682ef Simplifying dconf profile selection 2024-03-15 13:31:41 +04:00
018b30cdc4 Cleaning up code and removing unnecessary parts 2024-03-14 10:40:30 +04:00
249eb69ade Changed package_applier_user launch keys 2024-03-14 10:40:30 +04:00
1ab8c7aee0 Adapted check_enable_home_link to work with the new storage 2024-03-14 10:40:30 +04:00
400a5fab7d Typo corrected 2024-03-14 10:40:30 +04:00
e7851e88b3 Added use of profile forwarding in registry_factory 2024-03-14 10:40:30 +04:00
0761637666 Corrected variable name 2024-03-14 10:40:30 +04:00
dda4d987cb Added the ability to store envprofile status 2024-03-14 10:40:30 +04:00
609ec0e8b8 Improve code readability 2024-03-14 10:40:30 +04:00
c0b28a0655 In dconf_registry init was removed, the action performed in it was transferred to gpt 2024-03-14 10:40:30 +04:00
78aad11e06 Improved get_key_value and get_dconf_envprofile 2024-03-14 10:40:30 +04:00
59bebbc45e Added function to get profile for dconf 2024-03-14 10:40:30 +04:00
e92656add0 Adaptation to the new storage for pkcon_runner 2024-03-14 10:40:30 +04:00
5d24579d2f Added use of username when get storage 2024-03-14 10:40:30 +04:00
ce284b61be Added class field to store username 2024-03-14 10:40:30 +04:00
7a8118ac63 Added the ability to save username when get storage 2024-03-14 10:40:30 +04:00
18d8e73acd Unnecessary line removed 2024-03-14 10:40:30 +04:00
58235cb1a1 Fix check_enabled in package_applier 2024-03-14 10:40:30 +04:00
e0d88cc076 Adapted to work with the new storage 2024-03-14 10:40:30 +04:00
c8b0927090 Adding forwarding policy_name and username to load_preg_dconf 2024-03-14 10:40:30 +04:00
a4a79d8c99 Adding policy name to ReadQueue key values 2024-03-14 10:40:30 +04:00
408609fa58 Using a new argument when creating a gpt object 2024-03-14 10:40:30 +04:00
6efebfad89 Added username argument to gpt class constructor 2024-03-14 10:40:30 +04:00
12865b0b43 Correcting logs in class methods 2024-03-14 10:40:30 +04:00
9117dddcee Changing the log in the create_dconf_ini_file method 2024-03-14 10:40:30 +04:00
1e267f5cb6 Removing an empty key in a dictionary 2024-03-14 10:40:30 +04:00
62ed015ea9 Added logs for the create_dconf_ini_file 2024-03-14 10:40:30 +04:00
3e6b7cd040 Added logs for the get_entry 2024-03-14 10:40:30 +04:00
209eb84d6d Added logs for the get_dictionary_from_dconf 2024-03-14 10:40:30 +04:00
7f3b47a23c Added logs for the apply_template 2024-03-14 10:40:30 +04:00
08ba87c8d8 log correction 2024-03-14 10:40:30 +04:00
f2a45a2a6d Added logs for the dconf_update 2024-03-14 10:40:30 +04:00
9c544adc94 Added logs for the get_key_value method 2024-03-14 10:40:30 +04:00
a225c9aa7f Added logs for the get_matching_keys method 2024-03-14 10:40:30 +04:00
51c8711da6 Updated get_key_values ​​method 2024-03-14 10:40:30 +04:00
54eb4188a7 Fixed error message and added logging module 2024-03-14 10:40:30 +04:00
89d5e36d6c Added extension with unique values 2024-03-14 10:40:30 +04:00
6cd5ab4ee2 Removed duplicate additions of objects 2024-03-14 10:40:30 +04:00
0c913c68e3 Added search for a suitable .desktop file
and creation of a policy based on it
2024-03-14 10:40:30 +04:00
12d746a1dc Added get_desktop_files_directory for .desktop path 2024-03-14 10:40:30 +04:00
0a25f3a1d6 Changed work with object_shortcut 2024-03-14 10:40:30 +04:00
1eaab893c8 Changed queries to the registry from systemd_applier 2024-03-14 10:40:30 +04:00
05ea872831 Fixed registry queries 2024-03-14 10:40:30 +04:00
d0506dba29 Changed interpretation method from new repository 2024-03-14 10:40:30 +04:00
dd28587b20 Added local path processing 2024-03-14 10:40:30 +04:00
1a288c84f5 Added check for empty value 2024-03-14 10:40:30 +04:00
cadc3eda52 Added processing of the key list request 2024-03-14 10:40:30 +04:00
8d3e6691d4 Added the ability to return registry keys with a list item value 2024-03-14 10:40:30 +04:00
cb54fa5d78 Changes in requests to get a list of packages 2024-03-14 10:40:30 +04:00
53ffc072f0 Added the ability to get a class 2024-03-14 10:40:30 +04:00
7a59bcb65b Added fun for correct processing of branch requests 2024-03-14 10:40:30 +04:00
b81a727cd4 Added class method to get the key 2024-03-14 10:40:30 +04:00
11b33dd148 Changed request method for ScrollSysvolDC 2024-03-14 10:40:30 +04:00
1ccc18a31f Changed request method for UserPolicyMode 2024-03-14 10:40:30 +04:00
9a3afeebdf Request method changed 2024-03-14 10:40:30 +04:00
0720471cca Fixed adding a list of scripts 2024-03-14 10:40:30 +04:00
dd43ddaad6 Typos corrected 2024-03-14 10:40:30 +04:00
6fc059aaac Processing module status changed 2024-03-14 10:40:30 +04:00
8cfb6f0bb3 Removed unnecessary arguments 2024-03-14 10:40:30 +04:00
ddcdc322f8 Moved save_dconf 2024-03-14 10:40:30 +04:00
4ee52f06d6 Added gpt status flags 2024-03-14 10:40:30 +04:00
603efc2deb Removed obsolete implementation 2024-03-14 10:40:30 +04:00
9fc5007590 Added registry saving to dconf in the backend 2024-03-14 10:40:30 +04:00
a6210f8b29 Removed obsolete implementation 2024-03-14 10:40:30 +04:00
175f244a5f Removed excess supply merge_polfile 2024-03-14 10:40:30 +04:00
0d4ce533bc Added flag for data status 2024-03-14 10:40:30 +04:00
8e22235df2 Adaptation of gsettings for new storage 2024-03-14 10:40:30 +04:00
0519d2703c Added handling of empty data 2024-03-14 10:40:30 +04:00
1ca9b006e1 Using the dconf registry 2024-03-14 10:40:30 +04:00
8cc5a8904b Added processing of various requests 2024-03-14 10:40:30 +04:00
70cdef2e71 Changed key request gsettings 2024-03-14 10:40:30 +04:00
3baffeb12d Changes to the data source in the registry 2024-03-14 10:40:30 +04:00
a0d9dc585f Removed erroneous addition of objects 2024-03-14 10:40:30 +04:00
388125415b Fixed directory functionality 2024-03-14 10:40:30 +04:00
14c7e5db21 Bugs fixed and return data wrapper added 2024-03-14 10:40:30 +04:00
582a85df88 Added explicit conversion to string 2024-03-14 10:40:30 +04:00
18ddc54626 Added processing of different types of keys 2024-03-14 10:40:30 +04:00
6bad9a331d Added the ability to query the Group Policy dictionary 2024-03-14 10:40:30 +04:00
16b5747620 Added checking the fullness of the global registry key dictionary 2024-03-14 10:40:30 +04:00
47015ec312 Added the ability to query a dictionary across multiple dconf paths 2024-03-14 10:40:30 +04:00
666c88bdf1 Added class method for getting dconf keys 2024-03-14 10:40:30 +04:00
bd5262353b Added semicolon handling when writing dconf 2024-03-14 10:40:30 +04:00
e1d5712b83 Added the ability to call methods through a class 2024-03-14 10:40:30 +04:00
bcb9108424 Refactor object initialization in init 2024-03-14 10:40:30 +04:00
82bb88ca34 Added saving the preference to dconf 2024-03-14 10:40:29 +04:00
518685f361 Added to gpupdate.spec req_skip storage.dconf_registry 2024-03-14 10:40:29 +04:00
39e3d15fa8 Fixed formation of the general list of scripts 2024-03-14 10:40:29 +04:00
7a755bbb3e Added old storage functionality 2024-03-14 10:40:29 +04:00
41260df1a1 Added support for sqlite_registry API 2024-03-14 10:40:29 +04:00
0d1b60158a Added functions for verification and request in the dictionary 2024-03-14 10:40:29 +04:00
b244df8f2d Changed storage int 2024-03-14 10:40:29 +04:00
e48ca4fc8e Added staticmethod for update dconf 2024-03-14 10:40:29 +04:00
82d52d1c9f Added methods for mandatory_profile creation 2024-03-14 10:40:29 +04:00
e6a51d02fb Added functions get_uid_by_username 2024-03-14 10:40:29 +04:00
28e2d9c94b Added new fields to store preference 2024-03-14 10:40:29 +04:00
60137feed0 Added static methods to query dconf 2024-03-14 10:40:29 +04:00
a86c49e471 Added to the global_dict key ReadQueue and to able fill it 2024-03-14 10:40:29 +04:00
8c5d0bbb06 Use load_preg_dconf in merge_polfile 2024-03-14 10:40:29 +04:00
c26fbf8042 create_dconf_ini_file function moved 2024-03-14 10:40:29 +04:00
83e70d5e7a Added functions for filling the dictionary 2024-03-14 10:40:29 +04:00
c383b8df9b Added class to storing registry data for dconf 2024-03-14 10:40:29 +04:00
fc810c3362 Add create_ini_file function 2024-03-14 10:40:29 +04:00
7e225c837a Add touch_file function 2024-03-14 10:40:29 +04:00
b053544512 0.9.13.9-alt1
- Fixed premature removal of double slash
2024-03-13 16:14:31 +04:00
9b4527d334 Fixed premature removal of double slash 2024-03-13 16:13:26 +04:00
3794ffa5be 0.9.13.8-alt1
- Added search for dc on the site
- Added compatibility support for the oldest versions of SQLAlchemy
2024-02-22 17:00:44 +04:00
fe68f0cca8 Added use of new exception GetGPOListFail 2024-02-22 17:00:09 +04:00
d83cf4d29d Added new exception GetGPOListFail 2024-02-21 14:57:22 +04:00
47dc1df796 The way to find the desired DC is supplemented 2024-02-21 11:49:45 +04:00
5d2fb3f719 Fixed search for the required domain 2024-02-20 15:31:32 +04:00
3fded83c75 Support compatility for oldest versions of SQLAlchemy in storage 2024-02-20 13:00:36 +04:00
aeab315c3d Improved search for the required domain 2024-02-20 12:59:49 +04:00
446fa532db Added removal of extra slash 2024-02-19 11:51:34 +04:00
ac2190809a Added a class for site domain search 2024-02-16 18:34:12 +04:00
66bae5a1af 0.9.13.7-alt1
- Editing the cache size in the Yandex browser has returned (closes: 44621)
- Removed unnecessary calls to subprocess
2024-02-05 18:23:07 +04:00
4f41c64c98 Added a forgotten key to yandex_browser_applier 2024-02-05 18:10:00 +04:00
729f916646 Removed unnecessary calls to subprocess 2024-02-05 17:47:23 +04:00
1b150e21c7 0.9.13.6-alt1
- Added support for hidden attribute for folders (closes: 48964)
- Added support for Cyrillic and spaces for mounting disks (closes: 49229)
2024-01-31 18:21:40 +04:00
459993d133 Changing the handling of nested directories and files 2024-01-31 18:21:06 +04:00
7ee065309b Fixed creation of hidden directories 2024-01-31 18:20:56 +04:00
22c4f97a15 Extending the base for an additional attribute 2024-01-31 18:20:36 +04:00
e62b366cf2 Autofs templates have been added 2024-01-31 12:20:29 +04:00
fbdd8cc79a Added additional label and path processing 2024-01-31 12:18:16 +04:00
8fddb3494a 0.9.13.5-alt1
- Fixed blocking check for machine policies with multiple sections (closes: 48971)
- Extension of the valuename_typeint list for the admx-chromium 120.0
- Extension of the valuename_typeint list for the admx-yandex 118.0
- Changed PAM logic to prevent re-call (closes: 48973)
- Changed timer option OnStartupSec to prevent re-call
2024-01-15 11:10:50 +04:00
4b3e621650 Removed unnecessary imports 2024-01-15 11:10:23 +04:00
4a2842b872 Exception handling has been clarified 2024-01-12 15:48:54 +04:00
682797fb90 To avoid conflicts with granting access 2024-01-12 15:47:12 +04:00
12bd7a5b51 Application of ini file settings is moved to the user context 2024-01-12 15:41:28 +04:00
0674340f74 Added error prevention when trying to cache a local file 2024-01-12 15:23:10 +04:00
5486bcfcef Removed unnecessary option in gpupdate-scripts-run-user.service 2024-01-10 15:56:43 +04:00
d935557c4c Extension of the valuename_typeint list for the admx-chromium 120.0 browser 2024-01-10 14:51:39 +04:00
c6b6cdfff3 Extension of the valuename_typeint list for the admx-yandex 118.0 browser 2024-01-10 14:51:31 +04:00
2d7144c1b4 Fixed blocking check for machine policies with multiple sections 2024-01-10 12:09:17 +04:00
4cca8b241a Changed PAM logic to prevent re-call 2024-01-09 13:56:37 +04:00
a50f8c0d04 Changed timer option OnStartupSec to prevent re-call 2024-01-09 11:55:55 +04:00
8c4ce9f8a6 Changing the status of state check heuristic 2024-01-09 11:53:19 +04:00
bb1183c471 0.9.13.4-alt1
- Fixed regular expression to search for wallpaper management section (closes: 48828)
2023-12-18 16:47:07 +04:00
db74303e73 Correcting the regular expression 2023-12-18 16:30:31 +04:00
ced9d35ec4 0.9.13.3-alt1
- Fixed bug handling of invalid username
  when requesting cache (closes: 48310)
2023-12-13 11:17:14 +04:00
d84b754292 Added handling of invalid username when requesting cache 2023-12-13 11:11:32 +04:00
7507c558ba 0.9.13.2-alt1
- Fixed kde_applier bug (closes: 47995)
2023-11-28 10:45:21 +04:00
9fb411c2e2 Added check for file existence and log for application warnings. 2023-11-28 10:42:54 +04:00
b8dc00443f Changed file permissions when copying 2023-11-27 11:03:30 +04:00
179b16baa4 Changed check for file caching 2023-11-24 12:36:31 +04:00
209e4e3128 Added method for determining the numeric group of desktop wallpaper settings 2023-11-24 12:28:02 +04:00
2fb59a1b7c Changed desktop wallpaper configuration method 2023-11-24 12:22:30 +04:00
d82cfcfe89 Added libraries for working with the configuration file. The name of the method and its arguments have been changed. 2023-11-24 12:02:36 +04:00
220313a1fb Added logs for wallpaper configuration files 2023-11-24 11:26:33 +04:00
38378440ff 0.9.13.1-alt1
- Fixed kde_applier bug (closes: 47995)
- Fixed kde_applier bug (closes: 47996)
- Fixed kde_applier bug (closes: 47998)
- Fixed kde_applier bug (closes: 47820)
- Fixed shortcut_applier bug (closes: 47638)
- Fixed shortcut_applier bug (closes: 47641)
- Fixed systemd_applier bug (closes: 47652)
2023-10-18 15:20:15 +04:00
debe48c06b Fixed creation of a file in the wrong path when customizing the appearance. Typo correction. 2023-10-18 15:11:10 +04:00
b84715cfe4 Fixed creation of a section with symbols )( 2023-10-18 15:11:01 +04:00
abad246ab2 Fixed a bug with caching the local path to the image. 2023-10-18 15:10:51 +04:00
5bc8309abd Fixed implementation of adding shortcut names with the / symbol 2023-10-18 15:07:55 +04:00
a18e1a6cce Implemented adding comments to shortcuts 2023-10-18 15:07:46 +04:00
8420f50f9c Added exception handling. Checking gpupdate.timer status. 2023-09-22 15:11:41 +04:00
07662349ca Added state for stopping the service. 2023-09-21 16:45:11 +04:00
a1281d3ac0 0.9.13.0-alt1
- Added KDE applier
- Fixed loopback policy processing
- Fixed appliers exception for some chromium policies
- Fixed ntp error
- cifs_appliers, polkit_appliers changed to non-experimental
2023-09-19 11:18:52 +04:00
5c0fc9bed0 Added handling of missing files 2023-09-19 11:17:29 +04:00
78815c5ecd Correction of logs 2023-09-18 13:02:01 +04:00
7a0571278f Added avoidance of error output in other de 2023-09-18 12:00:25 +04:00
7e666043be Using file_cache for a user 2023-09-15 11:20:10 +04:00
e733c346b3 Added content checking 2023-09-15 10:39:23 +04:00
7e26d8397c Merge branch 'ntp_applier_addition' into sisyphus 2023-09-15 10:20:22 +04:00
b0d3ab2384 Merge remote-tracking branch 'github/kde_applier' into sisyphus 2023-09-15 10:18:51 +04:00
d744cf8f6e Added method for creating a path for caching in the /home directory 2023-09-14 18:54:54 +04:00
443b410dfa Added directory path processing with caching in /home. 2023-09-14 18:52:53 +04:00
721c66b20d Merge remote-tracking branch 'github/kde_applier' 2023-09-13 12:14:55 +04:00
9fbe8f76be Added variable to process paths to shared directories 2023-09-13 11:48:26 +04:00
3c95c0c84b Added the ability to install wallpaper from shared folders and update them at runtime. 2023-09-13 11:46:56 +04:00
ed42f3cf6a Merge remote-tracking branch 'github/kde_applier' 2023-09-07 15:08:30 +04:00
5dabd2c259 Fixed creation of a dictionary with locks 2023-09-07 14:51:26 +04:00
1f32d4efae Added method to clear old blocked policies. Added logs for exceptions. 2023-09-07 14:50:28 +04:00
5c809a2d5a polkit_appliers changed to non-experimental 2023-09-06 12:00:08 +04:00
bec19cf69e cifs_appliers changed to non-experimental 2023-09-06 11:59:09 +04:00
583b47ae7c Fixed loopback policy processing 2023-09-06 11:30:43 +04:00
264cedd342 Merge remote-tracking branch 'yarik64/chromium_appliers' into userMode_fix 2023-09-06 11:09:48 +04:00
de6db7ad2b Merge remote-tracking branch 'github/kde_applier' into userMode_fix 2023-09-05 18:52:35 +04:00
17c8aef19f Added method to clear old blocked policies. Added logs for exceptions. 2023-09-05 18:31:21 +04:00
e402d399e9 Added logs 2023-09-05 18:18:53 +04:00
5258880419 Added translation to logs 2023-09-05 18:17:55 +04:00
3fd6d9558e Removed system variable creations 2023-09-05 18:17:03 +04:00
d26290a720 Cleaned up code, removed unused methods 2023-08-25 13:43:58 +04:00
f1800a834f Added error log when creating a dictionary 2023-08-24 15:42:34 +04:00
93806b342d Added translation for error log output 2023-08-24 15:40:10 +04:00
17ea444bcb Changes:
• Added a method for forming a dictionary
• Calls to the kwriteconfig5 utility have been added to the apply method
• Added logs
2023-08-24 15:37:17 +04:00
fc0495abd0 Added comments and cleaned up code 2023-08-11 17:58:03 +04:00
c9da82376a Added global dictionary. Optimized code. 2023-08-10 17:51:45 +04:00
ae9ced2794 Added logs for kde applier 2023-08-09 17:29:41 +04:00
6c231c8b4d Added translation for logging 2023-08-09 17:27:03 +04:00
6461aa6836 Added check for files to be overwritten in /etc/xdg 2023-08-09 17:24:48 +04:00
5eeba1e73a Changed parameters obtained when extracting machine policies 2023-08-08 12:59:04 +04:00
ca4399b9b5 Changed the method of obtaining data on applied policies in the class of machine policies 2023-08-08 12:54:48 +04:00
377aa07b9f add using kde aplier for frontend_manager 2023-08-07 12:53:56 +04:00
38d1f0e571 add file with applier for kde 2023-08-07 12:50:44 +04:00
04651494be fixed appliers exception for some chromium policies 2023-07-07 19:10:28 +04:00
4c7e69f7f6 0.9.12.6-alt1
- Added support for dictionaries as policy values for
  yandex_browser_applier and chromium_applier
- Extended functionality of ConfigObj to save comments ';'
- Added support for SQLAlchemy2 in storage
- Added 'cifsacl' option to mount templates
2023-06-15 17:42:36 +04:00
51f4b3aa18 Added fix for _handle_comment 2023-06-15 17:42:03 +04:00
beb555bdf2 Added 'cifsacl' option to mount templates 2023-06-15 10:40:28 +04:00
bb55c38e21 Merge branch 'support_for_SQLAlchemy2_in_storage' 2023-06-15 10:25:31 +04:00
5df3c6f468 Merge branch 'Enhancing_the_functionality_of_ConfigObj' 2023-06-15 10:21:16 +04:00
7edaa4afe7 Support for SQLAlchemy2 in storage 2023-06-14 15:38:02 +04:00
486e035649 Enhancing the functionality of ConfigObj to preserve comments ;
and incorporating its usage in the editing of INI files in ini_applier
2023-06-09 18:16:36 +04:00
51bd701b2d frontend/yandex_browser_applier.py: added support for dictionaries as policy values 2023-05-30 13:27:41 +04:00
de0635952f frontend/chromium_applier.py: added support for dictionaries as policy values 2023-05-30 13:27:04 +04:00
21b4ced721 util/util.py: added new function string_to_literal_evalgit 2023-05-30 13:21:16 +04:00
2567bb9c45 0.9.12.5-alt1
- Fixed editing cache volume (DiskCacheSize) in Yandex browser (closes: 44621)
- The access to caching files has been fixed
2023-05-26 16:17:54 +04:00
a4db4d9cd0 The access to caching files has been fixed 2023-05-26 16:12:49 +04:00
8cdc84aef6 Fixed editing cache volume in Yandex browser 2023-03-29 20:33:06 +04:00
8b82278934 0.9.12.4-alt1
- Fixed an implementation of replace action in folder applier
- Improve file cache store() with copy in temporary file before saving
- Added implementation of using executable bit in file copy applier
- Fixed debug messages typos in file copy applier
2023-03-20 18:49:35 +04:00
4b4adbf3e1 Fixed an implementation of replace action in folder applier 2023-03-20 18:49:35 +04:00
0e6c3bb6aa Improve file cache store() with copy in temporary file before saving 2023-03-20 18:49:20 +04:00
fa315bb599 Added implementation of using executable bit in file copy applier 2023-03-19 01:52:33 +04:00
d54cd790b1 Added executable attribute to table for files 2023-03-19 01:39:11 +04:00
c729b8a6d6 Fix debug messages typos in file copy applier 2023-03-19 01:19:59 +04:00
142d6eda50 Fix set executable logic in file copy applier 2023-03-19 01:18:31 +04:00
ae8dd798ab 0.9.12.3-alt1
- Add support of set copyied files to be executed by paths and suffixes (extensions).
- Add support of saving comments in ini files.
- Add support samba-4.17 python interface for gp.gpclass instead of gpclass.
2023-02-28 22:16:08 +04:00
8121eb8d6f Add support samba-4.17 python interface for gp.gpclass instead of gpclass. 2023-02-28 22:05:51 +04:00
be15051ba5 Merge pull request #190 from altlinux/addition_paths_and_suffixes_to_files_app
Add support of set copyied files to be executed by paths and suffixes (extensions)
2023-02-21 20:12:59 +04:00
7f7a154e1b Merge pull request #189 from altlinux/save_comments_in_ini_files
Save comments in ini files
2023-02-21 19:25:41 +04:00
72c34a7475 appliers/file_cp.py: changes the mode bits for the file only 2023-02-21 14:29:51 +04:00
abc3a3f609 Added implementation to set execute permissions 2023-02-21 12:40:07 +04:00
ce2d1c6e05 Added the ability to set execution permissions 2023-02-21 11:23:53 +04:00
58cff92891 Added new requires python3-module-configobj 2023-01-17 18:26:48 +04:00
6bcd916203 Replaced ini-file editing module 2023-01-17 18:23:01 +04:00
c924adc4b0 0.9.12.2-alt2
- Fixed a typo in cifs_applier.py
2022-12-29 12:44:40 +04:00
9e1760ae9d frontend/cifs_applier.py: added object pointer 2022-12-29 12:41:24 +04:00
1a90996259 0.9.12.2-alt1
- Add support of create and delete symlinks in user home directory for mapped
  network drives in cifs applier
- Fix file copy applier support of delete files with substitution
2022-12-29 05:46:46 +04:00
11768248e4 Merge pull request #188 from altlinux/addition_mapped_drive
Create symlinks in user home directory for mapped network drives
2022-12-29 05:33:55 +04:00
34d7124a46 Update translation debug logs for create symlinks mountpoints in cifs_applier 2022-12-29 05:29:53 +04:00
c5c80b9091 frontend/cifs_applier.py: replace create symlinks logic to separate method 2022-12-29 05:29:39 +04:00
1b3d046d05 frontend/cifs_applier.py: add separated symlinks for hidden mountpoints 2022-12-29 04:38:41 +04:00
5c2e4fe356 frontend/cifs_applier.py: fix state variable names 2022-12-29 04:26:04 +04:00
ff5645ef73 frontend/cifs_applier.py: generalize mountpoints names 2022-12-29 03:40:16 +04:00
3fb3f2e857 Merge pull request #187 from altlinux/fix_delete_action_file_cp
appliers/file_cp.py: fix file delete for substitutions
2022-12-29 03:13:16 +04:00
f75c79cbeb frontend/cifs_applier.py: added forgotten argument to get_hkcu_entry 2022-12-28 17:07:30 +04:00
43c8031da5 messages/__init__.py: added logs for drive link display policies 2022-12-28 16:22:02 +04:00
4f1c2f288e frontend/cifs_applier.py: added support for drive link display policies 2022-12-28 16:14:02 +04:00
26908178d3 appliers/file_cp.py: fix file delete for substitutions 2022-12-27 17:35:53 +04:00
fe63894ad8 0.9.12.1-alt1
- Update file copy applier with substitution support
- Update translations for several logs
2022-12-13 19:02:05 +04:00
1bf898f1d0 appliers/file_cp.py: fix file copy 2022-12-13 18:42:37 +04:00
2c71b5e53a Translation for several logs 2022-12-13 18:38:00 +04:00
601e8b1072 Merge pull request #183 from altlinux/addition_to_files
Improve file copy applier support
2022-12-13 13:11:50 +04:00
2c15d1cea0 appliers/file_cp.py: added accounting for empty fromPath and using logs 2022-12-13 11:54:54 +04:00
52fc6ea4de messages/__init__.py: added new logs for file_cp.py 2022-12-13 11:54:47 +04:00
3621e80055 Typos fixed in file_cp.py 2022-12-13 11:51:42 +04:00
d9191e47fa appliers/file_cp.py: fixes for refactored copy files algorithms 2022-12-13 11:51:42 +04:00
87d873862a appliers/file_cp.py: refactor copy files algorithms 2022-12-13 11:51:42 +04:00
9dc833a970 appliers/file_cp.py: improve delete files list calclulation 2022-12-13 11:51:42 +04:00
45bf77a64a appliers/file_cp.py: change string to int argument for chmod to octal int 2022-12-13 11:51:42 +04:00
5be7cc14b0 appliers/file_cp.py: fix choosing target directory path 2022-12-13 11:51:42 +04:00
1f0e417ff1 Added the ability to use wildcards for delete files in appliers/file_cp.py 2022-12-13 11:51:42 +04:00
1d31c72946 Added the ability to use wildcards in appliers/file_cp.py 2022-12-13 11:51:42 +04:00
eb7538249f 0.9.12-alt2
- Update release with forgotten changes
2022-12-12 15:29:17 +04:00
0dacf2f657 Merge remote-tracking branch 'origin/master' 2022-12-12 15:28:57 +04:00
13f1529306 0.9.12-alt1
- Fixed mapped drive maps for user and add support for machine
 + Added label option support
 + Fixed letters collisions and assigning as Windows
- Replaced cifs applier mountpoints into shown gvfs directories:
 + /media/gpupdate/Drive - for system shares
 + /media/gpupdate/.Drive - for system hidden shares
 + /run/media/USERNAME/DriveUser - for user shares
 + /run/media/USERNAME/.DriveUser - for user hidden shares
- Added network shares support for user
- Fixed bug (closes: 44026) for chromium applier
- Added keylist handling when generating firefox settings (closes: 44209)
- Added a check of the need to scroll DC (scrolling DCs disabled by default!)
- Added the ability to generate rules for all polkit actions
- Added applier for Yandex.Browser
2022-12-11 20:52:57 +04:00
3b2d0c0af2 Merge pull request #184 from altlinux/addition_to_networkshare
Samba usershares support for user settings
2022-12-11 15:12:10 +04:00
aea8f6ed0a Simplify Networkshare initialization with username 2022-12-11 12:01:07 +04:00
322f28baa7 Merge pull request #185 from altlinux/fix_bug_chromium
Fix bug ALT#44026 for chromium applier.
2022-12-11 02:18:45 +04:00
3860bf6b74 Fix bug 44026 for chromium_applier.py 2022-12-09 17:59:43 +04:00
abcc660118 Added interactivity to work with /usr/bin/net in netshare.py 2022-12-09 17:32:54 +04:00
b7e61e4ab8 Added new logs for user networkshare 2022-12-09 17:32:47 +04:00
ca50d7f73b Added the use of settings for creating common catalogs for the user 2022-12-09 17:32:40 +04:00
d9f3bd3b8c The functionality of the creation of general catalogs was expanded for the user 2022-12-09 17:32:28 +04:00
b4e50c2ef8 Correction of final paths for catalogs in autofs_auto.j2, autofs_auto_hide.j2, cifs_applier.py 2022-12-05 13:26:29 +04:00
e46d717af8 Bump to 0.9.12... 2022-12-04 05:21:56 +04:00
83c0395ee4 Merge pull request #179 from altlinux/fix_bug_44209_in_firefox_app
Added keylist handling when generating firefox settings
2022-12-04 04:57:25 +04:00
eef4823e56 Merge pull request #170 from altlinux/DC_scrolling_with_full_Sysvol
Added a check of the need to scroll DC
2022-12-04 04:56:37 +04:00
4100edcacf Set alt polkit group policy permissions more priority than windows 2022-12-04 04:52:04 +04:00
89e72eeaff Merge remote-tracking branch 'origin/PolkitApplier_addition' 2022-12-04 04:22:07 +04:00
ce54bae087 Merge pull request #181 from altlinux/fix_Mapped_Drive
Fix mapped drive for user and machine
2022-12-04 03:58:14 +04:00
bbbde0c46a Replace cifs applier mountpoints into shown gvfs directories 2022-12-04 03:52:48 +04:00
a43f47abd4 frontend/cifs_applier.py: add optimization improvements 2022-12-04 03:51:16 +04:00
60ab746ce3 Added drive mapping support for computer 2022-12-02 16:31:16 +04:00
418d182726 Signature usage added to autofs templates 2022-12-02 16:27:11 +04:00
ccb3dd53a8 Added use of machine_cifs_applier to frontend_manager.py 2022-12-02 13:31:54 +04:00
bb0beb4a92 Added support for hiding in templates for autofs 2022-12-02 12:29:07 +04:00
dda3ca452b Added support for hide in cifs_applier.py 2022-12-01 14:33:23 +04:00
0d54a2a0c8 Added deletion of drive sequence in cifs_applier.py 2022-11-30 14:35:06 +04:00
c1a4e67ba3 Added new class to generate disk list in cifs_applier.py 2022-11-29 19:19:51 +04:00
b10dde3b21 Added new fields (thisDrive, allDrives, label, persistent, useLetter)
to files drives.py, record_types.py, sqlite_registry.py
2022-11-23 17:19:44 +04:00
c7b632fbb8 Added action handling to the autofs_mountpoints.j2 template 2022-11-22 17:40:32 +04:00
a00366650a Added use of field action to cifs_applier.py 2022-11-22 17:38:09 +04:00
a10beac915 Added a new action column to sqlite_registry.py 2022-11-22 17:37:28 +04:00
d409d68052 Added new field action to record_types.py 2022-11-22 17:25:39 +04:00
5fdefaecc0 Added new field action to gpt/drives.py 2022-11-22 17:22:48 +04:00
0e3d3598f1 Added keylist handling when generating firefox settings 2022-11-16 13:47:48 +04:00
556a8f833c Added removal of empty rules 2022-11-11 18:07:48 +04:00
a17dd4a9b4 Added locks and optimized code 2022-11-11 12:55:01 +04:00
681c4828a6 Changed argument names and added a new template for rules polkit with locks 2022-11-10 18:07:56 +04:00
e670c03026 Added the ability to generate rules for all polkit actions 2022-11-10 13:47:42 +04:00
5bd64352f1 Added new templates for generating polkit rules 2022-11-09 16:15:54 +04:00
56b7186c15 Added handling of empty values 2022-11-02 13:11:08 +04:00
249d3a6caa Checking your own policies and, if none, using win_key with mapping enabled 2022-10-28 12:43:10 +04:00
7b6cb64d58 Added check_windows_mapping_enabled in polkit_applier.py 2022-10-27 14:44:09 +04:00
da71aaf0dd Rename the applier yandex_applier.py -> yandex_browser_applier.py 2022-10-26 18:11:53 +04:00
d35dd5433d Added new logs for using yandex_applier 2022-10-10 17:57:20 +04:00
cb6bc1f280 Added use of yandex_applier 2022-10-10 15:53:11 +04:00
3d79315470 Added a new applier for yandex-browser 2022-10-10 15:47:29 +04:00
077d67c417 Added implementation of the networkshare_applier 2022-10-10 13:22:34 +04:00
77b6ffb81a Added new logs for using network shares 2022-10-10 13:22:34 +04:00
e4a41e9d07 Added new networkshare applier for use to Frontend_manager 2022-10-10 13:22:34 +04:00
0460f64b47 Added a new class to save netshare information 2022-10-10 13:22:34 +04:00
477a99c703 Added new applier networkshare 2022-10-10 13:22:34 +04:00
385e9ae02f Added a new log number(D179) about saving network share information 2022-10-10 13:22:34 +04:00
18a7426863 Added table support for network share 2022-10-10 13:22:34 +04:00
3f2176659a Added new storage type for networkshares 2022-10-10 13:22:34 +04:00
72e756c778 Enable NETWORKSHARES.XML parser and merger 2022-10-10 13:22:34 +04:00
bb340112d5 gpt module: Added facilities to read NETWORKSHARES.XML 2022-10-10 13:22:34 +04:00
6b0cfbe2b5 Added a check of the need to scroll DC 2022-08-31 13:04:30 +04:00
94 changed files with 5557 additions and 1724 deletions

22
completions/gpoa Normal file
View File

@ -0,0 +1,22 @@
_gpoa()
{
local cur prev words cword split
_init_completion -s || return
case $prev in
--dc)
_filedir
return
;;
--loglevel)
COMPREPLY=($(compgen -W '0 1 2 3 4 5' -- "$cur"))
return
;;
*)
COMPREPLY=($(compgen -W '--dc --nodomain --noupdate --noplugins --list-backends --loglevel --help --force' -- "$cur"))
return
;;
esac
}
complete -F _gpoa gpoa

27
completions/gpupdate Normal file
View File

@ -0,0 +1,27 @@
_gpupdate()
{
local cur prev words cword split
_init_completion -s || return
case $prev in
-u|--user)
_filedir
return
;;
-t|--target)
COMPREPLY=($(compgen -W 'ALL USER COMPUTER' -- "$cur"))
return
;;
-l|--loglevel)
COMPREPLY=($(compgen -W '0 1 2 3 4 5' -- "$cur"))
return
;;
*)
COMPREPLY=($(compgen -W '--user --target --loglevel --system --help --force' -- "$cur"))
return
;;
esac
}
complete -F _gpupdate gpupdate

View File

@ -0,0 +1,18 @@
_gpupdate-setup()
{
local cur prev words cword split
_init_completion -s || return
case $prev in
set-backend)
COMPREPLY=($(compgen -W 'local samba' -- "$cur"))
return
;;
*)
COMPREPLY=($(compgen -W 'list list-backends status enable disable update write set-backend default-policy active-policy active-backend' -- "$cur"))
return
;;
esac
}
complete -F _gpupdate-setup gpupdate-setup

View File

@ -1,6 +1,5 @@
[Unit] [Unit]
Description=Run Group Policy scripts for a user Description=Run Group Policy scripts for a user
After=gpupdate-user.service
[Service] [Service]
Type=oneshot Type=oneshot

View File

@ -2,7 +2,7 @@
Description=Run gpupdate-user every hour Description=Run gpupdate-user every hour
[Timer] [Timer]
OnStartupSec=1 OnStartupSec=60min
OnUnitActiveSec=60min OnUnitActiveSec=60min
[Install] [Install]

2
dist/gpupdate.timer vendored
View File

@ -2,7 +2,7 @@
Description=Run gpupdate every hour Description=Run gpupdate every hour
[Timer] [Timer]
OnStartupSec=1 OnStartupSec=60min
OnUnitActiveSec=60min OnUnitActiveSec=60min
[Install] [Install]

View File

@ -2,11 +2,12 @@
session [success=2 perm_denied=ignore default=die] pam_localuser.so session [success=2 perm_denied=ignore default=die] pam_localuser.so
session substack gpupdate-remote-policy session substack gpupdate-remote-policy
session [default=1] pam_permit.so session [default=1] pam_permit.so
session [default=6] pam_permit.so session [default=7] pam_permit.so
session [success=1 default=ignore] pam_succeed_if.so user ingroup users quiet session [success=1 default=ignore] pam_succeed_if.so user ingroup users quiet
session [default=4] pam_permit.so session [default=5] pam_permit.so
session [success=1 default=ignore] pam_succeed_if.so uid >= 500 quiet session [success=1 default=ignore] pam_succeed_if.so uid >= 500 quiet
session [default=2] pam_permit.so session [default=3] pam_permit.so
session [success=1 default=ignore] pam_succeed_if.so service = systemd-user quiet
-session required pam_oddjob_gpupdate.so -session required pam_oddjob_gpupdate.so
session optional pam_env.so user_readenv=1 conffile=/etc/gpupdate/environment user_envfile=.gpupdate_environment session optional pam_env.so user_readenv=1 conffile=/etc/gpupdate/environment user_envfile=.gpupdate_environment
session required pam_permit.so session required pam_permit.so

View File

@ -45,6 +45,9 @@ Don't run plugins.
.TP .TP
\fB--loglevel \fILOGLEVEL\fP \fB--loglevel \fILOGLEVEL\fP
Set logging verbosity from 0 to 5. Set logging verbosity from 0 to 5.
.TP
\fB--force\fP
Force GPT download.
. .
.SH FILES .SH FILES
\fB/usr/sbin/gpoa\fR utility uses \fB/usr/share/local-policy/default\fR \fB/usr/sbin/gpoa\fR utility uses \fB/usr/share/local-policy/default\fR
@ -55,8 +58,10 @@ All data is located in \fB/var/cache/gpupdate\fR. Also domain GPTs are
taken from Samba's \fB/var/cache/samba\fR. taken from Samba's \fB/var/cache/samba\fR.
. .
The settings read from Samba are stored in The settings read from Samba are stored in
\fB/var/cache/gpupdate/registry.sqlite\fR and "Local Policy" settings Dconf. Machine policies are stored in the \fB/etc/dconf/db/policy.d/policy.ini\fR file,
read from \fB/usr/local/share/local-policy/default\fR are converted user policies are stored in the \fB/etc/dconf/db/policy<UID>.d/policy<UID>.ini\fR file
(where UID is the user ID in the system)."Local Policy" settings
read from \fB/usr/share/local-policy/\fR are converted
into GPT and stored as \fB/var/cache/gpupdate/local-policy\fR. into GPT and stored as \fB/var/cache/gpupdate/local-policy\fR.
.SH "SEE ALSO" .SH "SEE ALSO"
gpupdate(1) gpupdate(1)

View File

@ -43,6 +43,9 @@ Show help.
.TP .TP
\fB--user \fIusername\fR \fB--user \fIusername\fR
Run \fBgpupdate\fP for \fIusername\fP. Run \fBgpupdate\fP for \fIusername\fP.
.TP
\fB--force\fP
Force GPT download.
. .
.SS "EXIT CODES" .SS "EXIT CODES"
.TP .TP

View File

@ -22,6 +22,9 @@ from .samba_backend import samba_backend
from .nodomain_backend import nodomain_backend from .nodomain_backend import nodomain_backend
from util.logging import log from util.logging import log
from util.config import GPConfig from util.config import GPConfig
from util.util import get_uid_by_username, touch_file
from util.paths import get_dconf_config_file
from storage.dconf_registry import Dconf_registry, create_dconf_ini_file, add_preferences_to_global_registry_dict
def backend_factory(dc, username, is_machine, no_domain = False): def backend_factory(dc, username, is_machine, no_domain = False):
''' '''
@ -59,3 +62,14 @@ def backend_factory(dc, username, is_machine, no_domain = False):
return back return back
def save_dconf(username, is_machine, nodomain=None):
if is_machine:
uid = None
else:
uid = get_uid_by_username(username) if not is_machine else None
target_file = get_dconf_config_file(uid)
touch_file(target_file)
Dconf_registry.apply_template(uid)
add_preferences_to_global_registry_dict(username, is_machine)
Dconf_registry.update_dict_to_previous()
create_dconf_ini_file(target_file,Dconf_registry.global_registry_dict, uid, nodomain)

View File

@ -1,7 +1,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2020 BaseALT Ltd. # Copyright (C) 2019-2024 BaseALT Ltd.
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -16,18 +16,14 @@
# You should have received a copy of the GNU General Public License # You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>. # along with this program. If not, see <http://www.gnu.org/licenses/>.
import logging
import os
from .applier_backend import applier_backend from .applier_backend import applier_backend
from storage import registry_factory from storage import registry_factory
from gpt.gpt import gpt, get_local_gpt from gpt.gpt import get_local_gpt
from util.util import ( from util.util import (
get_machine_name get_machine_name
) )
from util.sid import get_sid from util.sid import get_sid
import util.preg
from util.logging import slogm
class nodomain_backend(applier_backend): class nodomain_backend(applier_backend):
@ -35,7 +31,7 @@ class nodomain_backend(applier_backend):
domain = None domain = None
machine_name = get_machine_name() machine_name = get_machine_name()
machine_sid = get_sid(domain, machine_name, True) machine_sid = get_sid(domain, machine_name, True)
self.storage = registry_factory('registry') self.storage = registry_factory()
self.storage.set_info('domain', domain) self.storage.set_info('domain', domain)
self.storage.set_info('machine_name', machine_name) self.storage.set_info('machine_name', machine_name)
self.storage.set_info('machine_sid', machine_sid) self.storage.set_info('machine_sid', machine_sid)

View File

@ -1,7 +1,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2020 BaseALT Ltd. # Copyright (C) 2019-2024 BaseALT Ltd.
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -18,32 +18,35 @@
import os import os
# Facility to determine GPTs for user # Facility to determine GPTs for user
from samba.gpclass import check_safe_path try:
from samba.gpclass import check_safe_path
except ImportError:
from samba.gp.gpclass import check_safe_path
from .applier_backend import applier_backend from .applier_backend import applier_backend
from storage import cache_factory, registry_factory from storage import registry_factory
from gpt.gpt import gpt, get_local_gpt from gpt.gpt import gpt, get_local_gpt
from gpt.gpo_dconf_mapping import GpoInfoDconf
from util.util import ( from util.util import (
get_machine_name, get_machine_name
is_machine_name
) )
from util.kerberos import ( from util.kerberos import (
machine_kinit machine_kinit
, machine_kdestroy , machine_kdestroy
) )
from util.sid import get_sid from util.sid import get_sid
import util.preg
from util.logging import log from util.logging import log
class samba_backend(applier_backend): class samba_backend(applier_backend):
__user_policy_mode_key = 'Software\\Policies\\Microsoft\\Windows\\System\\UserPolicyMode' __user_policy_mode_key = '/SOFTWARE/Policies/Microsoft/Windows/System/UserPolicyMode'
__user_policy_mode_key_win = '/Software/Policies/Microsoft/Windows/System/UserPolicyMode'
def __init__(self, sambacreds, username, domain, is_machine): def __init__(self, sambacreds, username, domain, is_machine):
self.cache_path = '/var/cache/gpupdate/creds/krb5cc_{}'.format(os.getpid()) self.cache_path = '/var/cache/gpupdate/creds/krb5cc_{}'.format(os.getpid())
self.__kinit_successful = machine_kinit(self.cache_path) self.__kinit_successful = machine_kinit(self.cache_path)
if not self.__kinit_successful: if not self.__kinit_successful:
raise Exception('kinit is not successful') raise Exception('kinit is not successful')
self.storage = registry_factory('registry') self.storage = registry_factory()
self.storage.set_info('domain', domain) self.storage.set_info('domain', domain)
machine_name = get_machine_name() machine_name = get_machine_name()
machine_sid = get_sid(domain, machine_name, is_machine) machine_sid = get_sid(domain, machine_name, is_machine)
@ -58,13 +61,13 @@ class samba_backend(applier_backend):
else: else:
self.sid = get_sid(self.storage.get_info('domain'), self.username) self.sid = get_sid(self.storage.get_info('domain'), self.username)
self.cache = cache_factory('regpol_cache')
self.gpo_names = cache_factory('gpo_names')
# Samba objects - LoadParm() and CredentialsOptions() # Samba objects - LoadParm() and CredentialsOptions()
self.sambacreds = sambacreds self.sambacreds = sambacreds
self.cache_dir = self.sambacreds.get_cache_dir() self.cache_dir = self.sambacreds.get_cache_dir()
self.gpo_cache_part ='gpo_cache'
self._cached = False
self.storage.set_info('cache_dir', os.path.join(self.cache_dir, self.gpo_cache_part))
logdata = dict({'cachedir': self.cache_dir}) logdata = dict({'cachedir': self.cache_dir})
log('D7', logdata) log('D7', logdata)
@ -78,9 +81,11 @@ class samba_backend(applier_backend):
is possible to work with user's part of GPT. This value is is possible to work with user's part of GPT. This value is
checked only if working for user's SID. checked only if working for user's SID.
''' '''
upm = self.storage.get_hklm_entry(self.__user_policy_mode_key) upm_key = self.storage.get_key_value(self.__user_policy_mode_key)
if upm and upm.data: upm_win_key = self.storage.get_key_value(self.__user_policy_mode_key_win)
upm = int(upm.data) upm = upm_key if upm_key else upm_win_key
if upm:
upm = int(upm)
if upm < 0 or upm > 2: if upm < 0 or upm > 2:
upm = 0 upm = 0
else: else:
@ -101,8 +106,6 @@ class samba_backend(applier_backend):
raise exc raise exc
if self._is_machine_username: if self._is_machine_username:
self.storage.wipe_hklm()
self.storage.wipe_user(self.storage.get_info('machine_sid'))
for gptobj in machine_gpts: for gptobj in machine_gpts:
try: try:
gptobj.merge_machine() gptobj.merge_machine()
@ -120,7 +123,6 @@ class samba_backend(applier_backend):
except Exception as exc: except Exception as exc:
log('F3') log('F3')
raise exc raise exc
self.storage.wipe_user(self.sid)
# Merge user settings if UserPolicyMode set accordingly # Merge user settings if UserPolicyMode set accordingly
# and user settings (for HKCU) are exist. # and user settings (for HKCU) are exist.
@ -140,6 +142,7 @@ class samba_backend(applier_backend):
if policy_mode > 0: if policy_mode > 0:
for gptobj in machine_gpts: for gptobj in machine_gpts:
try: try:
gptobj.sid = self.sid
gptobj.merge_user() gptobj.merge_user()
except Exception as exc: except Exception as exc:
logdata = dict() logdata = dict()
@ -150,10 +153,15 @@ class samba_backend(applier_backend):
''' '''
Check if there is SYSVOL path for GPO assigned Check if there is SYSVOL path for GPO assigned
''' '''
self._cached = False
if not gpo.file_sys_path: if not gpo.file_sys_path:
# GPO named "Local Policy" has no entry by its nature so # GPO named "Local Policy" has no entry by its nature so
# no reason to print warning. # no reason to print warning.
if 'Local Policy' != gpo.name: if gpo.display_name in self.storage._dict_gpo_name_version_cache.keys():
gpo.file_sys_path = self.storage._dict_gpo_name_version_cache.get(gpo.display_name, {}).get('correct_path')
self._cached = True
return True
elif 'Local Policy' != gpo.name:
logdata = dict({'gponame': gpo.name}) logdata = dict({'gponame': gpo.name})
log('W4', logdata) log('W4', logdata)
return False return False
@ -168,11 +176,18 @@ class samba_backend(applier_backend):
log('D46') log('D46')
for gpo in gpos: for gpo in gpos:
if self._check_sysvol_present(gpo): if self._check_sysvol_present(gpo):
path = check_safe_path(gpo.file_sys_path).upper() if not self._cached:
slogdata = dict({'sysvol_path': gpo.file_sys_path, 'gpo_name': gpo.display_name, 'gpo_path': path}) path = check_safe_path(gpo.file_sys_path).upper()
log('D30', slogdata) slogdata = dict({'sysvol_path': gpo.file_sys_path, 'gpo_name': gpo.display_name, 'gpo_path': path})
gpt_abspath = os.path.join(self.cache_dir, 'gpo_cache', path) log('D30', slogdata)
obj = gpt(gpt_abspath, sid) gpt_abspath = os.path.join(self.cache_dir, self.gpo_cache_part, path)
else:
gpt_abspath = gpo.file_sys_path
log('D211', {'sysvol_path': gpo.file_sys_path, 'gpo_name': gpo.display_name})
if self._is_machine_username:
obj = gpt(gpt_abspath, sid, None, GpoInfoDconf(gpo))
else:
obj = gpt(gpt_abspath, sid, self.username, GpoInfoDconf(gpo))
obj.set_name(gpo.display_name) obj.set_name(gpo.display_name)
gpts.append(obj) gpts.append(obj)
else: else:
@ -188,9 +203,9 @@ def upm2str(upm_num):
result = 'Not configured' result = 'Not configured'
if upm_num in [1, '1']: if upm_num in [1, '1']:
result = 'Replace'
if upm_num in [2, '2']:
result = 'Merge' result = 'Merge'
if upm_num in [2, '2']:
result = 'Replace'
return result return result

View File

@ -1,7 +1,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2020 BaseALT Ltd. # Copyright (C) 2019-2024 BaseALT Ltd.
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -18,43 +18,41 @@
from abc import ABC from abc import ABC
import logging
from util.logging import slogm
def check_experimental_enabled(storage): def check_experimental_enabled(storage):
experimental_enable_flag = 'Software\\BaseALT\\Policies\\GPUpdate\\GlobalExperimental' experimental_enable_flag = '/Software/BaseALT/Policies/GPUpdate/GlobalExperimental'
flag = storage.get_hklm_entry(experimental_enable_flag) flag = storage.get_key_value(experimental_enable_flag)
result = False result = False
if flag and '1' == flag.data: if flag and '1' == str(flag):
result = True result = True
return result return result
def check_windows_mapping_enabled(storage): def check_windows_mapping_enabled(storage):
windows_mapping_enable_flag = 'Software\\BaseALT\\Policies\\GPUpdate\\WindowsPoliciesMapping' windows_mapping_enable_flag = '/Software/BaseALT/Policies/GPUpdate/WindowsPoliciesMapping'
flag = storage.get_hklm_entry(windows_mapping_enable_flag) flag = storage.get_key_value(windows_mapping_enable_flag)
result = True result = True
flag = str(flag)
if flag and '0' == flag.data: if flag and '0' == flag:
result = False result = False
return result return result
def check_module_enabled(storage, module_name): def check_module_enabled(storage, module_name):
gpupdate_module_enable_branch = 'Software\\BaseALT\\Policies\\GPUpdate' gpupdate_module_enable_branch = '/Software/BaseALT/Policies/GPUpdate'
gpupdate_module_flag = '{}\\{}'.format(gpupdate_module_enable_branch, module_name) gpupdate_module_flag = '{}/{}'.format(gpupdate_module_enable_branch, module_name)
flag = storage.get_hklm_entry(gpupdate_module_flag) flag = storage.get_key_value(gpupdate_module_flag)
result = None result = None
flag = str(flag)
if flag: if flag and flag!='None':
if '1' == flag.data: if '1' == flag:
result = True result = True
if '0' == flag.data: else:
result = False result = False
return result return result

View File

@ -17,9 +17,7 @@
# along with this program. If not, see <http://www.gnu.org/licenses/>. # along with this program. If not, see <http://www.gnu.org/licenses/>.
import subprocess import subprocess
import threading from util.logging import log
import logging
from util.logging import slogm, log
def control_subst(preg_name): def control_subst(preg_name):
''' '''
@ -101,14 +99,14 @@ class control:
if status == None: if status == None:
logdata = dict() logdata = dict()
logdata['control'] = self.control_name logdata['control'] = self.control_name
logdata['inpossible values'] = self.self.control_value logdata['inpossible values'] = self.control_value
log('E42', logdata) log('E42', logdata)
return return
elif type(self.control_value) == str: elif type(self.control_value) == str:
if self.control_value not in self.possible_values: if self.control_value not in self.possible_values:
logdata = dict() logdata = dict()
logdata['control'] = self.control_name logdata['control'] = self.control_name
logdata['inpossible values'] = self.self.control_value logdata['inpossible values'] = self.control_value
log('E59', logdata) log('E59', logdata)
return return
status = self.control_value status = self.control_value

View File

@ -1,7 +1,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2020 BaseALT Ltd. # Copyright (C) 2019-2024 BaseALT Ltd.
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -17,27 +17,40 @@
# along with this program. If not, see <http://www.gnu.org/licenses/>. # along with this program. If not, see <http://www.gnu.org/licenses/>.
from os.path import isfile from os.path import isfile
from util.logging import slogm
import logging
from gpt.envvars import ( from util.arguments import (
FileAction FileAction
, action_letter2enum , action_letter2enum
) )
from util.windows import expand_windows_var from util.windows import expand_windows_var
from util.util import ( from util.util import get_homedir
get_homedir, from util.logging import log
homedir_exists
)
class Envvar: class Envvar:
__envvar_file_path = '/etc/gpupdate/environment'
__envvar_file_path_user = '/.gpupdate_environment'
def __init__(self, envvars, username=''): def __init__(self, envvars, username=''):
self.username = username self.username = username
self.envvars = envvars self.envvars = envvars
if self.username == 'root': if self.username == 'root':
self.envvar_file_path = '/etc/gpupdate/environment' self.envvar_file_path = Envvar.__envvar_file_path
else: else:
self.envvar_file_path = get_homedir(self.username) + '/.gpupdate_environment' self.envvar_file_path = get_homedir(self.username) + Envvar.__envvar_file_path_user
@staticmethod
def clear_envvar_file(username = False):
if username:
file_path = get_homedir(username) + Envvar.__envvar_file_path_user
else:
file_path = Envvar.__envvar_file_path
try:
with open(file_path, 'w') as file:
file.write('')
log('D215', {'path':file_path})
except Exception as exc:
log('D216', {'path': file_path, 'exc': exc})
def _open_envvar_file(self): def _open_envvar_file(self):
fd = None fd = None
@ -92,6 +105,8 @@ class Envvar:
value = value.replace('\\', '/') value = value.replace('\\', '/')
exist_line = None exist_line = None
for line in lines: for line in lines:
if line == '\n':
continue
if line.split()[0] == name: if line.split()[0] == name:
exist_line = line exist_line = line
break break

View File

@ -17,7 +17,7 @@
# along with this program. If not, see <http://www.gnu.org/licenses/>. # along with this program. If not, see <http://www.gnu.org/licenses/>.
from gpt.folders import ( from util.arguments import (
FileAction FileAction
, action_letter2enum , action_letter2enum
) )
@ -28,88 +28,154 @@ from pathlib import Path
from util.windows import expand_windows_var from util.windows import expand_windows_var
from util.util import get_homedir from util.util import get_homedir
from util.exceptions import NotUNCPathError from util.exceptions import NotUNCPathError
from util.paths import UNCPath
import fnmatch
class Files_cp: class Files_cp:
def __init__(self, file_obj, file_cache ,username=None): def __init__(self, file_obj, file_cache, exe_check, username=None):
self.file_cache = file_cache self.file_cache = file_cache
self.exe_check = exe_check
targetPath = expand_windows_var(file_obj.targetPath, username).replace('\\', '/') targetPath = expand_windows_var(file_obj.targetPath, username).replace('\\', '/')
self.targetPath = check_target_path(targetPath, username) self.targetPath = check_target_path(targetPath, username)
if not self.targetPath: if not self.targetPath:
return return
self.fromPath = (expand_windows_var(file_obj.fromPath, username).replace('\\', '/') self.fromPath = (expand_windows_var(file_obj.fromPath, username).replace('\\', '/')
if file_obj.fromPath else None) if file_obj.fromPath else None)
self.isTargetPathDirectory = False
self.action = action_letter2enum(file_obj.action) self.action = action_letter2enum(file_obj.action)
self.readOnly = str2bool(file_obj.readOnly) self.readOnly = str2bool(file_obj.readOnly)
self.archive = str2bool(file_obj.archive) self.archive = str2bool(file_obj.archive)
self.hidden = str2bool(file_obj.hidden) self.hidden = str2bool(file_obj.hidden)
self.suppress = str2bool(file_obj.suppress) self.suppress = str2bool(file_obj.suppress)
self.executable = str2bool(file_obj.executable)
self.username = username self.username = username
self.fromPathFiles = self.get_list_files() self.fromPathFiles = list()
if self.fromPath:
if targetPath[-1] == '/' or self.is_pattern(Path(self.fromPath).name):
self.isTargetPathDirectory = True
self.get_list_files()
self.act() self.act()
def get_target_file(self, targetPath, fromPath): def get_target_file(self, targetPath:Path, fromFile:str) -> Path:
try: try:
if fromPath and targetPath.is_dir(): if fromFile:
if self.hidden: fromFileName = Path(fromFile).name
return targetPath.joinpath('.' + fromPath.name) if self.isTargetPathDirectory:
targetPath.mkdir(parents = True, exist_ok = True)
else: else:
return targetPath.joinpath(fromPath.name) targetPath.parent.mkdir(parents = True, exist_ok = True)
targetPath = targetPath.parent
fromFileName = self.targetPath.name
if self.hidden:
return targetPath.joinpath('.' + fromFileName)
else:
return targetPath.joinpath(fromFileName)
else: else:
if not self.hidden: if not self.hidden:
return targetPath return targetPath
else: else:
return targetPath.parent.joinpath('.' + targetPath.name) return targetPath.parent.joinpath('.' + targetPath.name)
except Exception as exc: except Exception as exc:
logdata = dict({'exc': exc}) logdata = dict()
logdata['targetPath'] = targetPath
logdata['fromFile'] = fromFile
logdata['exc'] = exc
log('D163', logdata) log('D163', logdata)
def set_read_only(self, targetFile): return None
if self.readOnly:
shutil.os.chmod(targetFile, int('444', base = 8)) def copy_target_file(self, targetFile:Path, fromFile:str):
try:
uri_path = UNCPath(fromFile)
self.file_cache.store(fromFile, targetFile)
except NotUNCPathError as exc:
fromFilePath = Path(fromFile)
if fromFilePath.exists():
targetFile.write_bytes(fromFilePath.read_bytes())
except Exception as exc:
logdata = dict()
logdata['targetFile'] = targetFile
logdata['fromFile'] = fromFile
logdata['exc'] = exc
log('W15', logdata)
def set_exe_file(self, targetFile, fromFile):
if self.executable:
return True
if Path(fromFile).suffix in self.exe_check.get_list_markers():
targetPath = targetFile.parent
for i in self.exe_check.get_list_paths():
if targetPath == Path(i):
return True
return False
def set_mod_file(self, targetFile, fromFile):
if not targetFile.is_file():
return
if self.set_exe_file(targetFile, fromFile):
if self.readOnly:
shutil.os.chmod(targetFile, 0o555)
else:
shutil.os.chmod(targetFile, 0o755)
else: else:
shutil.os.chmod(targetFile, int('664', base = 8)) if self.readOnly:
shutil.os.chmod(targetFile, 0o444)
else:
shutil.os.chmod(targetFile, 0o644)
def _create_action(self): def _create_action(self):
for fromPath in self.fromPathFiles: logdata = dict()
for fromFile in self.fromPathFiles:
targetFile = None
try: try:
targetFile = self.get_target_file(self.targetPath, fromPath) targetFile = self.get_target_file(self.targetPath, fromFile)
if not targetFile.exists(): if targetFile and not targetFile.exists():
targetFile.write_bytes(fromPath.read_bytes()) self.copy_target_file(targetFile, fromFile)
if self.username: if self.username:
shutil.chown(targetFile, self.username) shutil.chown(targetFile, self.username)
self.set_read_only(targetFile) self.set_mod_file(targetFile, fromFile)
logdata['File'] = targetFile
log('D191', logdata)
except Exception as exc: except Exception as exc:
logdata = dict()
logdata['exc'] = exc logdata['exc'] = exc
logdata['fromPath'] = fromPath logdata['fromPath'] = fromFile
logdata['targetPath'] = self.targetPath logdata['targetPath'] = self.targetPath
logdata['targetFile'] = targetFile logdata['targetFile'] = targetFile
log('D164', logdata) log('D164', logdata)
def _delete_action(self): def _delete_action(self):
targetFile = Path(self.targetPath) list_target = [self.targetPath.name]
try: if self.is_pattern(self.targetPath.name) and self.targetPath.parent.exists() and self.targetPath.parent.is_dir():
if targetFile.exists(): list_target = fnmatch.filter([str(x.name) for x in self.targetPath.parent.iterdir() if x.is_file()], self.targetPath.name)
targetFile.unlink() logdata = dict()
except Exception as exc: for targetFile in list_target:
logdata = dict() targetFile = self.targetPath.parent.joinpath(targetFile)
logdata['exc'] = exc try:
logdata['targetPath'] = self.targetPath if targetFile.exists():
logdata['targetFile'] = targetFile targetFile.unlink()
log('D165', logdata) logdata['File'] = targetFile
log('D193', logdata)
except Exception as exc:
logdata['exc'] = exc
logdata['targetPath'] = self.targetPath
logdata['targetFile'] = targetFile
log('D165', logdata)
def _update_action(self): def _update_action(self):
for fromPath in self.fromPathFiles: logdata = dict()
targetFile = self.get_target_file(self.targetPath, fromPath) for fromFile in self.fromPathFiles:
targetFile = self.get_target_file(self.targetPath, fromFile)
try: try:
targetFile.write_bytes(fromPath.read_bytes()) self.copy_target_file(targetFile, fromFile)
if self.username: if self.username:
shutil.chown(self.targetPath, self.username) shutil.chown(self.targetPath, self.username)
self.set_read_only(targetFile) self.set_mod_file(targetFile, fromFile)
logdata['File'] = targetFile
log('D192', logdata)
except Exception as exc: except Exception as exc:
logdata = dict()
logdata['exc'] = exc logdata['exc'] = exc
logdata['fromPath'] = self.fromPath logdata['fromPath'] = self.fromPath
logdata['targetPath'] = self.targetPath logdata['targetPath'] = self.targetPath
@ -127,70 +193,76 @@ class Files_cp:
self._delete_action() self._delete_action()
self._create_action() self._create_action()
def is_pattern(self, name):
if name.find('*') != -1 or name.find('?') != -1:
return True
else:
return False
def get_list_files(self): def get_list_files(self):
ls_all_files = list()
logdata = dict() logdata = dict()
logdata['targetPath'] = self.targetPath logdata['targetPath'] = str(self.targetPath)
if self.fromPath and self.fromPath.split('/')[-1] != '*': fromFilePath = Path(self.fromPath)
if not self.is_pattern(fromFilePath.name):
self.fromPathFiles.append(self.fromPath)
else:
fromPathDir = self.fromPath[:self.fromPath.rfind('/')]
try: try:
self.file_cache.store(self.fromPath) uri_path = UNCPath(fromPathDir)
fromPath = Path(self.file_cache.get(self.fromPath)) ls_files = self.file_cache.get_ls_smbdir(fromPathDir)
ls_all_files.append(fromPath) if ls_files:
filtered_ls_files = fnmatch.filter(ls_files, fromFilePath.name)
if filtered_ls_files:
self.fromPathFiles = [fromPathDir + '/' + file_s for file_s in filtered_ls_files]
except NotUNCPathError as exc: except NotUNCPathError as exc:
fromPath = Path(self.fromPath)
if fromPath.exists():
ls_all_files.append(fromPath)
except Exception as exc:
logdata['fromPath'] = self.fromPath
logdata['exc'] = exc
log('W13', logdata)
elif self.fromPath and len(self.fromPath.split('/')) > 2:
ls_files = self.file_cache.get_ls_smbdir(self.fromPath[:-1])
if ls_files:
ls_from_paths = [self.fromPath[:-1] + file_s for file_s in ls_files]
for from_path in ls_from_paths:
try:
self.file_cache.store(from_path)
fromPath = Path(self.file_cache.get(from_path))
ls_all_files.append(fromPath)
except Exception as exc:
logdata['fromPath'] = self.fromPath
logdata['exc'] = exc
log('W13', logdata)
else:
try: try:
fromLocalPath = Path(self.fromPath[:-1]) exact_path = Path(fromPathDir)
if fromLocalPath.is_dir(): if exact_path.is_dir():
ls = [fromFile for fromFile in fromLocalPath.iterdir() if fromFile.is_file()] self.fromPathFiles = [str(fromFile) for fromFile in exact_path.iterdir() if fromFile.is_file()]
for fromPath in ls:
ls_all_files.append(fromPath)
except Exception as exc: except Exception as exc:
logdata['fromPath'] = self.fromPath logdata['fromPath'] = self.fromPath
logdata['exc'] = exc logdata['exc'] = exc
log('W13', logdata) log('W3316', logdata)
else: except Exception as exc:
fromPath = Path(self.fromPath) if self.fromPath else None logdata['fromPath'] = self.fromPath
ls_all_files.append(fromPath) logdata['exc'] = exc
return ls_all_files log('W3317', logdata)
def check_target_path(path_to_check, username = None): def check_target_path(path_to_check, username = None):
''' '''
Function for checking the correctness of the path Function for checking the correctness of the path
''' '''
if not path_to_check:
return None
checking = Path(path_to_check) checking = Path(path_to_check)
if checking.is_dir(): rootpath = Path('/')
if username and path_to_check == '/': if username:
return Path(get_homedir(username)) rootpath = Path(get_homedir(username))
return checking
#Check for path directory without '/something' suffix return rootpath.joinpath(checking)
elif (len(path_to_check.split('/')) > 2
and Path(path_to_check.replace(path_to_check.split('/')[-1], '')).is_dir()): class Execution_check():
return checking
elif username: __etension_marker_key_name = 'ExtensionMarker'
target_path = Path(get_homedir(username)) __marker_usage_path_key_name = 'MarkerUsagePath'
res = target_path.joinpath(path_to_check __hklm_branch = 'Software\\BaseALT\\Policies\\GroupPolicies\\Files'
if path_to_check[0] != '/'
else path_to_check[1:]) def __init__(self, storage):
return res etension_marker_branch = '{}\\{}%'.format(self.__hklm_branch, self.__etension_marker_key_name)
else: marker_usage_path_branch = '{}\\{}%'.format(self.__hklm_branch, self.__marker_usage_path_key_name)
return False self.etension_marker = storage.filter_hklm_entries(etension_marker_branch)
self.marker_usage_path = storage.filter_hklm_entries(marker_usage_path_branch)
self.list_paths = list()
self.list_markers = list()
for marker in self.etension_marker:
self.list_markers.append(marker.data)
for usage_path in self.marker_usage_path:
self.list_paths.append(usage_path.data)
def get_list_paths(self):
return self.list_paths
def get_list_markers(self):
return self.list_markers

View File

@ -20,7 +20,7 @@
from pathlib import Path from pathlib import Path
from gpt.folders import ( from util.arguments import (
FileAction FileAction
, action_letter2enum , action_letter2enum
) )
@ -36,20 +36,24 @@ def remove_dir_tree(path, delete_files=False, delete_folder=False, delete_sub_fo
content.remove(entry) content.remove(entry)
if entry.is_dir() and delete_sub_folders: if entry.is_dir() and delete_sub_folders:
content.remove(entry) content.remove(entry)
remove_dir_tree(entry, delete_files, delete_folder, delete_sub_folders) content.extend(remove_dir_tree(entry, delete_files, delete_folder, delete_sub_folders))
if delete_folder and not content: if delete_folder and not content:
path.rmdir() path.rmdir()
return content
def str2bool(boolstr): def str2bool(boolstr):
if boolstr and boolstr.lower() in ['true', 'yes', '1']: if isinstance(boolstr, bool):
return boolstr
elif boolstr and boolstr.lower() in ['true', 'yes', '1']:
return True return True
return False return False
class Folder: class Folder:
def __init__(self, folder_object, username=None): def __init__(self, folder_object, username=None):
folder_path = expand_windows_var(folder_object.path, username).replace('\\', '/') folder_path = expand_windows_var(folder_object.path, username).replace('\\', '/').replace('//', '/')
if username: if username:
folder_path = folder_path.replace(get_homedir(username), '') folder_path = folder_path.replace(get_homedir(username), '')
self.folder_path = Path(get_homedir(username)).joinpath(folder_path if folder_path [0] != '/' else folder_path [1:]) self.folder_path = Path(get_homedir(username)).joinpath(folder_path if folder_path [0] != '/' else folder_path [1:])
@ -59,18 +63,26 @@ class Folder:
self.delete_files = str2bool(folder_object.delete_files) self.delete_files = str2bool(folder_object.delete_files)
self.delete_folder = str2bool(folder_object.delete_folder) self.delete_folder = str2bool(folder_object.delete_folder)
self.delete_sub_folders = str2bool(folder_object.delete_sub_folders) self.delete_sub_folders = str2bool(folder_object.delete_sub_folders)
self.hidden_folder = str2bool(folder_object.hidden_folder)
def _create_action(self): def _create_action(self):
self.folder_path.mkdir(parents=True, exist_ok=True) self.folder_path.mkdir(parents=True, exist_ok=True)
def _delete_action(self): def _delete_action(self):
if self.folder_path.exists(): if self.folder_path.exists():
if self.action == FileAction.REPLACE:
self.delete_folder = True
remove_dir_tree(self.folder_path, remove_dir_tree(self.folder_path,
self.delete_files, self.delete_files,
self.delete_folder, self.delete_folder,
self.delete_sub_folders) self.delete_sub_folders)
def act(self): def act(self):
if self.hidden_folder == True and str(self.folder_path.name)[0] != '.':
path_components = list(self.folder_path.parts)
path_components[-1] = '.' + path_components[-1]
new_folder_path = Path(*path_components)
self.folder_path = new_folder_path
if self.action == FileAction.CREATE: if self.action == FileAction.CREATE:
self._create_action() self._create_action()
if self.action == FileAction.UPDATE: if self.action == FileAction.UPDATE:

View File

@ -18,10 +18,9 @@
import configparser import configparser
import os import os
import logging
from gi.repository import Gio, GLib from gi.repository import Gio, GLib
from util.logging import slogm, log from util.logging import log
class system_gsetting: class system_gsetting:
def __init__(self, schema, path, value, lock, helper_function=None): def __init__(self, schema, path, value, lock, helper_function=None):

View File

@ -18,16 +18,15 @@
from gpt.folders import ( from util.arguments import (
FileAction FileAction
, action_letter2enum , action_letter2enum
) )
from util.logging import log from util.logging import log
from pathlib import Path from pathlib import Path
import configparser
from util.windows import expand_windows_var from util.windows import expand_windows_var
from util.util import get_homedir from util.util import get_homedir
from util.gpoa_ini_parsing import GpoaConfigObj
class Ini_file: class Ini_file:
@ -42,53 +41,55 @@ class Ini_file:
self.action = action_letter2enum(ini_obj.action) self.action = action_letter2enum(ini_obj.action)
self.key = ini_obj.property self.key = ini_obj.property
self.value = ini_obj.value self.value = ini_obj.value
self.config = configparser.ConfigParser()
self.act()
def _create_action(self):
if self.section not in self.config:
self.config[self.section] = dict()
self.config[self.section][self.key] = self.value
with self.path.open("w", encoding="utf-8") as configfile:
self.config.write(configfile)
def _delete_action(self):
if not self.path.exists():
return
if not self.section:
self.path.unlink()
return
if not self.key:
self.config.remove_section(self.section)
elif self.section in self.config:
self.config.remove_option(self.section, self.key)
with self.path.open("w", encoding="utf-8") as configfile:
self.config.write(configfile)
def act(self):
try: try:
self.config.read(self.path) self.config = GpoaConfigObj(str(self.path), unrepr=False)
except Exception as exc: except Exception as exc:
logdata = {'exc': exc} logdata = {'exc': exc}
log('D176', logdata) log('D176', logdata)
return return
if self.action == FileAction.CREATE:
self._create_action() self.act()
if self.action == FileAction.UPDATE:
self._delete_action() def _create_action(self):
self._create_action() if self.path.is_dir():
if self.action == FileAction.DELETE: return
self._delete_action() if self.section not in self.config:
if self.action == FileAction.REPLACE: self.config[self.section] = dict()
self._delete_action()
self._create_action() self.config[self.section][self.key] = self.value
self.config.write()
def _delete_action(self):
if not self.path.exists() or self.path.is_dir():
return
if not self.section:
self.path.unlink()
return
if self.section in self.config:
if not self.key:
self.config.pop(self.section)
elif self.key in self.config[self.section]:
self.config[self.section].pop(self.key)
self.config.write()
def act(self):
try:
if self.action == FileAction.CREATE:
self._create_action()
if self.action == FileAction.UPDATE:
self._create_action()
if self.action == FileAction.DELETE:
self._delete_action()
if self.action == FileAction.REPLACE:
self._create_action()
except Exception as exc:
logdata = dict()
logdata['action'] = self.action
logdata['exc'] = exc
log('W23', logdata)
def check_path(path_to_check, username = None): def check_path(path_to_check, username = None):
''' '''

View File

@ -0,0 +1,90 @@
#
# GPOA - GPO Applier for Linux
#
# Copyright (C) 2019-2022 BaseALT Ltd.
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
import subprocess
from util.arguments import (
FileAction
, action_letter2enum
)
from util.logging import log
from util.windows import expand_windows_var
class Networkshare:
def __init__(self, networkshare_obj, username = None):
self.net_full_cmd = ['/usr/bin/net', 'usershare']
self.net_cmd_check = ['/usr/bin/net', 'usershare', 'list']
self.cmd = list()
self.name = networkshare_obj.name
self.path = expand_windows_var(networkshare_obj.path, username).replace('\\', '/') if networkshare_obj.path else None
self.action = action_letter2enum(networkshare_obj.action)
self.allRegular = networkshare_obj.allRegular
self.comment = networkshare_obj.comment
self.limitUsers = networkshare_obj.limitUsers
self.abe = networkshare_obj.abe
self._guest = 'guest_ok=y'
self.acl = 'Everyone:'
self.act()
def check_list_net(self):
try:
res = subprocess.check_output(self.net_cmd_check, encoding='utf-8')
return res
except Exception as exc:
return exc
def _run_net_full_cmd(self):
logdata = dict()
try:
res = subprocess.check_output(self.net_full_cmd, stderr=subprocess.DEVNULL, encoding='utf-8')
if res:
logdata['cmd'] = self.net_full_cmd
logdata['answer'] = res
log('D190', logdata)
except Exception as exc:
logdata['cmd'] = self.net_full_cmd
logdata['exc'] = exc
log('D182', logdata)
def _create_action(self):
self.net_full_cmd.append('add')
self.net_full_cmd.append(self.name)
self.net_full_cmd.append(self.path)
self.net_full_cmd.append(self.comment)
self.net_full_cmd.append(self.acl + 'F')
self.net_full_cmd.append(self._guest)
self._run_net_full_cmd()
def _delete_action(self):
self.net_full_cmd.append('delete')
self.net_full_cmd.append(self.name)
self._run_net_full_cmd()
def act(self):
if self.action == FileAction.CREATE:
self._create_action()
if self.action == FileAction.UPDATE:
self._create_action()
if self.action == FileAction.DELETE:
self._delete_action()
if self.action == FileAction.REPLACE:
self._create_action()

View File

@ -18,9 +18,8 @@
import os import os
import jinja2 import jinja2
import logging
from util.logging import slogm, log from util.logging import log
class polkit: class polkit:
__template_path = '/usr/share/gpupdate/templates' __template_path = '/usr/share/gpupdate/templates'
@ -38,7 +37,19 @@ class polkit:
else: else:
self.outfile = os.path.join(self.__policy_dir, '{}.rules'.format(self.template_name)) self.outfile = os.path.join(self.__policy_dir, '{}.rules'.format(self.template_name))
def _is_empty(self):
for key, item in self.args.items():
if key == 'User':
continue
elif item:
return False
return True
def generate(self): def generate(self):
if self._is_empty():
if os.path.isfile(self.outfile):
os.remove(self.outfile)
return
try: try:
template = self.__template_environment.get_template(self.infilename) template = self.__template_environment.get_template(self.infilename)
text = template.render(**self.args) text = template.render(**self.args)

View File

@ -17,9 +17,8 @@
# along with this program. If not, see <http://www.gnu.org/licenses/>. # along with this program. If not, see <http://www.gnu.org/licenses/>.
import dbus import dbus
import logging
from util.logging import slogm, log from util.logging import log
class systemd_unit: class systemd_unit:
def __init__(self, unit_name, state): def __init__(self, unit_name, state):
@ -38,6 +37,9 @@ class systemd_unit:
if self.desired_state == 1: if self.desired_state == 1:
self.manager.UnmaskUnitFiles([self.unit_name], dbus.Boolean(False)) self.manager.UnmaskUnitFiles([self.unit_name], dbus.Boolean(False))
self.manager.EnableUnitFiles([self.unit_name], dbus.Boolean(False), dbus.Boolean(True)) self.manager.EnableUnitFiles([self.unit_name], dbus.Boolean(False), dbus.Boolean(True))
if self.unit_name == 'gpupdate.service':
if self.manager.GetUnitFileState(dbus.String(self.unit_name)) == 'enabled':
return
self.manager.StartUnit(self.unit_name, 'replace') self.manager.StartUnit(self.unit_name, 'replace')
logdata = dict() logdata = dict()
logdata['unit'] = self.unit_name logdata['unit'] = self.unit_name
@ -49,9 +51,13 @@ class systemd_unit:
service_state = self._get_state() service_state = self._get_state()
if not service_state in ['active', 'activating']: if not service_state in ['active', 'activating']:
logdata = dict() service_timer_name = self.unit_name.replace(".service", ".timer")
logdata['unit'] = self.unit_name self.unit = self.manager.LoadUnit(dbus.String(service_timer_name))
log('E46', logdata) service_state = self._get_state()
if not service_state in ['active', 'activating']:
logdata = dict()
logdata['unit'] = self.unit_name
log('E46', logdata)
else: else:
self.manager.StopUnit(self.unit_name, 'replace') self.manager.StopUnit(self.unit_name, 'replace')
self.manager.DisableUnitFiles([self.unit_name], dbus.Boolean(False)) self.manager.DisableUnitFiles([self.unit_name], dbus.Boolean(False))
@ -62,7 +68,7 @@ class systemd_unit:
service_state = self._get_state() service_state = self._get_state()
if not service_state in ['stopped']: if not service_state in ['stopped', 'deactivating', 'inactive']:
logdata = dict() logdata = dict()
logdata['unit'] = self.unit_name logdata['unit'] = self.unit_name
log('E46', logdata) log('E46', logdata)

View File

@ -1,7 +1,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2020 BaseALT Ltd. # Copyright (C) 2019-2024 BaseALT Ltd.
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -24,13 +24,13 @@ from .applier_frontend import (
import json import json
import os import os
from util.logging import log from util.logging import log
from util.util import is_machine_name from util.util import is_machine_name, string_to_literal_eval
class chromium_applier(applier_frontend): class chromium_applier(applier_frontend):
__module_name = 'ChromiumApplier' __module_name = 'ChromiumApplier'
__module_enabled = True __module_enabled = True
__module_experimental = False __module_experimental = False
__registry_branch = 'Software\\Policies\\Google\\Chrome' __registry_branch = 'Software/Policies/Google/Chrome'
__managed_policies_path = '/etc/chromium/policies/managed' __managed_policies_path = '/etc/chromium/policies/managed'
__recommended_policies_path = '/etc/chromium/policies/recommended' __recommended_policies_path = '/etc/chromium/policies/recommended'
@ -39,8 +39,7 @@ class chromium_applier(applier_frontend):
self.sid = sid self.sid = sid
self.username = username self.username = username
self._is_machine_name = is_machine_name(self.username) self._is_machine_name = is_machine_name(self.username)
chromium_filter = '{}%'.format(self.__registry_branch) self.chromium_keys = self.storage.filter_hklm_entries(self.__registry_branch)
self.chromium_keys = self.storage.filter_hklm_entries(chromium_filter)
self.policies_json = dict() self.policies_json = dict()
@ -65,7 +64,7 @@ class chromium_applier(applier_frontend):
#Replacing all nested dictionaries with a list #Replacing all nested dictionaries with a list
dict_item_to_list = ( dict_item_to_list = (
lambda target_dict : lambda target_dict :
{key:[*val.values()] if type(val) == dict else val for key,val in target_dict.items()} {key:[*val.values()] if type(val) == dict else string_to_literal_eval(val) for key,val in target_dict.items()}
) )
os.makedirs(self.__managed_policies_path, exist_ok=True) os.makedirs(self.__managed_policies_path, exist_ok=True)
with open(destfile, 'w') as f: with open(destfile, 'w') as f:
@ -98,48 +97,73 @@ class chromium_applier(applier_frontend):
''' '''
List of keys resulting from parsing chrome.admx with parsing_chrom_admx_intvalues.py List of keys resulting from parsing chrome.admx with parsing_chrom_admx_intvalues.py
''' '''
valuename_typeint = (['DefaultCookiesSetting', valuename_typeint = (['DefaultClipboardSetting',
'DefaultFileHandlingGuardSetting', 'DefaultCookiesSetting',
'DefaultFileSystemReadGuardSetting', 'DefaultFileSystemReadGuardSetting',
'DefaultFileSystemWriteGuardSetting', 'DefaultFileSystemWriteGuardSetting',
'DefaultGeolocationSetting',
'DefaultImagesSetting', 'DefaultImagesSetting',
'DefaultInsecureContentSetting', 'DefaultInsecureContentSetting',
'DefaultJavaScriptJitSetting',
'DefaultJavaScriptSetting', 'DefaultJavaScriptSetting',
'DefaultPopupsSetting', 'DefaultLocalFontsSetting',
'DefaultNotificationsSetting', 'DefaultNotificationsSetting',
'DefaultGeolocationSetting', 'DefaultPopupsSetting',
'DefaultSensorsSetting', 'DefaultSensorsSetting',
'DefaultWebBluetoothGuardSetting',
'DefaultWebUsbGuardSetting',
'DefaultSerialGuardSetting', 'DefaultSerialGuardSetting',
'LegacySameSiteCookieBehaviorEnabled', 'DefaultThirdPartyStoragePartitioningSetting',
'ProxyServerMode', 'DefaultWebBluetoothGuardSetting',
'DefaultWebHidGuardSetting',
'DefaultWebUsbGuardSetting',
'DefaultWindowManagementSetting',
'DefaultMediaStreamSetting', 'DefaultMediaStreamSetting',
'PrintRasterizationMode', 'DefaultWindowPlacementSetting',
'DefaultPluginsSetting', 'ProxyServerMode',
'DefaultKeygenSetting', 'ExtensionManifestV2Availability',
'ChromeFrameRendererSettings', 'ExtensionUnpublishedAvailability',
'SafeBrowsingProtectionLevel', 'CreateThemesSettings',
'PasswordProtectionWarningTrigger', 'DevToolsGenAiSettings',
'SafeBrowsingProtectionLevel_recommended', 'GenAILocalFoundationalModelSettings',
'RestoreOnStartup', 'HelpMeWriteSettings',
'RestoreOnStartup_recommended', 'TabOrganizerSettings',
'BrowserSwitcherParsingMode',
'CloudAPAuthEnabled',
'AdsSettingForIntrusiveAdsSites', 'AdsSettingForIntrusiveAdsSites',
'AmbientAuthenticationInPrivateModesEnabled', 'AmbientAuthenticationInPrivateModesEnabled',
'BatterySaverModeAvailability',
'BrowserSignin', 'BrowserSignin',
'ChromeVariations', 'ChromeVariations',
'DeveloperToolsAvailability', 'DeveloperToolsAvailability',
'DownloadRestrictions', 'DownloadRestrictions',
'DownloadRestrictions_recommended',
'ForceYouTubeRestrict', 'ForceYouTubeRestrict',
'HeadlessMode', 'HeadlessMode',
'IncognitoModeAvailability', 'IncognitoModeAvailability',
'IntranetRedirectBehavior', 'IntranetRedirectBehavior',
'LensOverlaySettings',
'MemorySaverModeSavings',
'NetworkPredictionOptions', 'NetworkPredictionOptions',
'NetworkPredictionOptions_recommended',
'ProfilePickerOnStartupAvailability', 'ProfilePickerOnStartupAvailability',
'ProfileReauthPrompt',
'RelaunchNotification', 'RelaunchNotification',
'SafeSitesFilterBehavior']) 'SafeSitesFilterBehavior',
'ToolbarAvatarLabelSettings',
'UserAgentReduction',
'BatterySaverModeAvailability_recommended',
'DownloadRestrictions_recommended',
'NetworkPredictionOptions_recommended',
'PrintPostScriptMode',
'PrintRasterizationMode',
'ChromeFrameRendererSettings',
'DefaultFileHandlingGuardSetting',
'DefaultKeygenSetting',
'DefaultPluginsSetting',
'LegacySameSiteCookieBehaviorEnabled',
'ForceMajorVersionToMinorPositionInUserAgent',
'PasswordProtectionWarningTrigger',
'SafeBrowsingProtectionLevel',
'SafeBrowsingProtectionLevel_recommended',
'RestoreOnStartup',
'RestoreOnStartup_recommended'])
return valuename_typeint return valuename_typeint
@ -152,7 +176,7 @@ class chromium_applier(applier_frontend):
''' '''
Parse registry path string and leave key parameters Parse registry path string and leave key parameters
''' '''
parts = hivekeyname.replace(self.__registry_branch, '').split('\\') parts = hivekeyname.replace(self.__registry_branch, '').split('/')
return parts return parts

View File

@ -1,7 +1,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2020 BaseALT Ltd. # Copyright (C) 2019-2022 BaseALT Ltd.
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -16,20 +16,19 @@
# You should have received a copy of the GNU General Public License # You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>. # along with this program. If not, see <http://www.gnu.org/licenses/>.
import fileinput
import jinja2 import jinja2
import os import os
import pwd
import subprocess import subprocess
import logging
from pathlib import Path from pathlib import Path
import string
from .applier_frontend import ( from .applier_frontend import (
applier_frontend applier_frontend
, check_enabled , check_enabled
) )
from gpt.drives import json2drive from util.util import get_homedir, get_uid_by_username
from util.util import get_homedir from util.logging import log
from util.logging import slogm, log
def storage_get_drives(storage, sid): def storage_get_drives(storage, sid):
drives = storage.get_drives(sid) drives = storage.get_drives(sid)
@ -50,45 +49,212 @@ def add_line_if_missing(filename, ins_line):
f.write(ins_line + '\n') f.write(ins_line + '\n')
f.flush() f.flush()
def remove_chars_before_colon(input_string):
if ":" in input_string:
colon_index = input_string.index(":")
result_string = input_string[colon_index + 1:]
return result_string
else:
return input_string
def remove_escaped_quotes(input_string):
result_string = input_string.replace('"', '').replace("'", '')
return result_string
class Drive_list:
__alphabet = string.ascii_uppercase
def __init__(self):
self.dict_drives = dict()
def __get_letter(self, letter):
slice_letters = set(self.__alphabet[self.__alphabet.find(letter) + 1:]) - set(self.dict_drives.keys())
free_letters = sorted(slice_letters)
if free_letters:
return free_letters[0]
else:
return None
def append(self, drive:dict):
cur_dir = drive['dir']
if cur_dir not in set(self.dict_drives.keys()):
if drive['action'] == 'D':
return
self.dict_drives[cur_dir] = drive
return
else:
if drive['action'] == 'C':
if drive['useLetter'] == '1':
return
else:
new_dir = self.__get_letter(cur_dir)
if not new_dir:
return
drive['dir'] = new_dir
self.dict_drives[new_dir] = drive
return
if drive['action'] == 'U':
self.dict_drives[cur_dir]['thisDrive'] = drive['thisDrive']
self.dict_drives[cur_dir]['allDrives'] = drive['allDrives']
self.dict_drives[cur_dir]['label'] = drive['label']
self.dict_drives[cur_dir]['persistent'] = drive['persistent']
self.dict_drives[cur_dir]['useLetter'] = drive['useLetter']
return
if drive['action'] == 'R':
self.dict_drives[cur_dir] = drive
return
if drive['action'] == 'D':
if drive['useLetter'] == '1':
self.dict_drives.pop(cur_dir, None)
else:
keys_set = set(self.dict_drives.keys())
slice_letters = set(self.__alphabet[self.__alphabet.find(cur_dir):])
for letter_dir in (keys_set & slice_letters):
self.dict_drives.pop(letter_dir, None)
def __call__(self):
return list(self.dict_drives.values())
def len(self):
return len(self.dict_drives)
class cifs_applier(applier_frontend): class cifs_applier(applier_frontend):
def __init__(self, storage): __module_name = 'CIFSApplier'
pass __module_enabled = True
__module_experimental = False
__dir4clean = '/etc/auto.master.gpupdate.d'
def __init__(self, storage, sid):
self.clear_directory_auto_dir()
self.applier_cifs = cifs_applier_user(storage, sid, None)
self.__module_enabled = check_enabled(
storage
, self.__module_name
, self.__module_experimental
)
def clear_directory_auto_dir(self):
path = Path(self.__dir4clean)
if not path.exists():
return
for item in path.iterdir():
try:
if item.is_file() or item.is_symlink():
item.unlink()
except Exception as exc:
log('W37', {'exc': exc})
log('D231')
def apply(self): def apply(self):
pass if self.__module_enabled:
log('D179')
self.applier_cifs._admin_context_apply()
else:
log('D180')
class cifs_applier_user(applier_frontend): class cifs_applier_user(applier_frontend):
__module_name = 'CIFSApplierUser' __module_name = 'CIFSApplierUser'
__module_enabled = False __module_enabled = True
__module_experimental = True __module_experimental = False
__auto_file = '/etc/auto.master' __auto_file = '/etc/auto.master'
__auto_dir = '/etc/auto.master.gpupdate.d' __auto_dir = '/etc/auto.master.gpupdate.d'
__template_path = '/usr/share/gpupdate/templates' __template_path = '/usr/share/gpupdate/templates'
__template_mountpoints = 'autofs_mountpoints.j2' __template_mountpoints = 'autofs_mountpoints.j2'
__template_identity = 'autofs_identity.j2' __template_identity = 'autofs_identity.j2'
__template_auto = 'autofs_auto.j2' __template_auto = 'autofs_auto.j2'
__template_mountpoints_hide = 'autofs_mountpoints_hide.j2'
__template_auto_hide = 'autofs_auto_hide.j2'
__enable_home_link = '/Software/BaseALT/Policies/GPUpdate/DriveMapsHome'
__enable_home_link_user = '/Software/BaseALT/Policies/GPUpdate/DriveMapsHomeUser'
__name_dir = '/Software/BaseALT/Policies/GPUpdate'
__name_link_prefix = '/Software/BaseALT/Policies/GPUpdate/DriveMapsHomeDisableNet'
__name_link_prefix_user = '/Software/BaseALT/Policies/GPUpdate/DriveMapsHomeDisableNetUser'
__key_link_prefix = 'DriveMapsHomeDisableNet'
__key_link_prefix_user = 'DriveMapsHomeDisableNetUser'
__timeout_user_key = '/Software/BaseALT/Policies/GPUpdate/TimeoutAutofsUser'
__timeout_key = '/Software/BaseALT/Policies/GPUpdate/TimeoutAutofs'
__cifsacl_key = '/Software/BaseALT/Policies/GPUpdate/CifsaclDisable'
__target_mountpoint = '/media/gpupdate'
__target_mountpoint_user = '/run/media'
__mountpoint_dirname = 'drives.system'
__mountpoint_dirname_user = 'drives'
__key_cifs_previous_value = 'Previous/Software/BaseALT/Policies/GPUpdate'
__key_preferences = 'Software/BaseALT/Policies/Preferences/'
__key_preferences_previous = 'Previous/Software/BaseALT/Policies/Preferences/'
__name_value = 'DriveMapsName'
__name_value_user = 'DriveMapsNameUser'
def __init__(self, storage, sid, username): def __init__(self, storage, sid, username):
self.storage = storage self.storage = storage
self.sid = sid self.sid = sid
self.username = username self.username = username
self.state_home_link = False
self.state_home_link_user = False
self.dict_registry_machine = self.storage.get_dictionary_from_dconf_file_db()
self.homedir = ''
name_dir = self.__name_dir[1:]
self.home = get_homedir(username) if username:
self.dict_registry_user = self.storage.get_dictionary_from_dconf_file_db(get_uid_by_username(username))
self.home = self.__target_mountpoint_user + '/' + username
self.state_home_link = self.storage.check_enable_key(self.__enable_home_link)
self.state_home_link_disable_net = self.storage.check_enable_key(self.__name_link_prefix)
self.state_home_link_disable_net_user = self.storage.check_enable_key(self.__name_link_prefix_user)
self.state_home_link_user = self.storage.check_enable_key(self.__enable_home_link_user)
self.timeout = self.storage.get_entry(self.__timeout_user_key)
dirname = self.storage.get_entry(self.__name_dir + '/' + self.__name_value_user)
dirname_system_from_machine = self.dict_registry_machine.get(name_dir, dict()).get(self.__name_value, None)
self.__mountpoint_dirname_user = dirname.data if dirname and dirname.data else self.__mountpoint_dirname_user
self.__mountpoint_dirname = dirname_system_from_machine if dirname_system_from_machine else self.__mountpoint_dirname
mntTarget = self.__mountpoint_dirname_user
self.keys_cifs_previous_values_user = self.dict_registry_user.get(self.__key_cifs_previous_value,dict())
self.keys_cifs_values_user = self.dict_registry_user.get(name_dir,dict())
self.keys_the_preferences_previous_values_user = self.dict_registry_user.get((self.__key_preferences_previous+self.username),dict()).get('Drives', dict())
self.keys_the_preferences_values_user = self.dict_registry_user.get((self.__key_preferences+self.username),dict()).get('Drives', dict())
else:
self.home = self.__target_mountpoint
self.timeout = self.storage.get_entry(self.__timeout_key)
dirname_system = self.storage.get_entry(self.__name_dir + '/' + self.__name_value)
self.__mountpoint_dirname = dirname_system.data if dirname_system and dirname_system.data else self.__mountpoint_dirname
mntTarget = self.__mountpoint_dirname
self.keys_cifs_previous_values_machine = self.dict_registry_machine.get(self.__key_cifs_previous_value,dict())
self.keys_cifs_values_machine = self.dict_registry_machine.get(name_dir,dict())
self.keys_the_preferences_previous_values = self.dict_registry_machine.get((self.__key_preferences_previous+'Machine'),dict()).get('Drives', dict())
self.keys_the_preferences_values = self.dict_registry_machine.get((self.__key_preferences+'Machine'),dict()).get('Drives', dict())
self.cifsacl_disable = self.storage.get_entry(self.__cifsacl_key, preg=False)
self.mntTarget = mntTarget.translate(str.maketrans({" ": r"\ "}))
conf_file = '{}.conf'.format(sid) conf_file = '{}.conf'.format(sid)
conf_hide_file = '{}_hide.conf'.format(sid)
autofs_file = '{}.autofs'.format(sid) autofs_file = '{}.autofs'.format(sid)
autofs_hide_file = '{}_hide.autofs'.format(sid)
cred_file = '{}.creds'.format(sid) cred_file = '{}.creds'.format(sid)
self.auto_master_d = Path(self.__auto_dir) self.auto_master_d = Path(self.__auto_dir)
self.user_config = self.auto_master_d / conf_file self.user_config = self.auto_master_d / conf_file
self.user_config_hide = self.auto_master_d / conf_hide_file
if os.path.exists(self.user_config.resolve()): if os.path.exists(self.user_config.resolve()):
self.user_config.unlink() self.user_config.unlink()
if os.path.exists(self.user_config_hide.resolve()):
self.user_config_hide.unlink()
self.user_autofs = self.auto_master_d / autofs_file self.user_autofs = self.auto_master_d / autofs_file
self.user_autofs_hide = self.auto_master_d / autofs_hide_file
if os.path.exists(self.user_autofs.resolve()): if os.path.exists(self.user_autofs.resolve()):
self.user_autofs.unlink() self.user_autofs.unlink()
if os.path.exists(self.user_autofs_hide.resolve()):
self.user_autofs_hide.unlink()
self.user_creds = self.auto_master_d / cred_file self.user_creds = self.auto_master_d / cred_file
self.mount_dir = Path(os.path.join(self.home, 'net'))
self.mount_dir = Path(os.path.join(self.home))
self.drives = storage_get_drives(self.storage, self.sid) self.drives = storage_get_drives(self.storage, self.sid)
self.template_loader = jinja2.FileSystemLoader(searchpath=self.__template_path) self.template_loader = jinja2.FileSystemLoader(searchpath=self.__template_path)
@ -98,6 +264,9 @@ class cifs_applier_user(applier_frontend):
self.template_indentity = self.template_env.get_template(self.__template_identity) self.template_indentity = self.template_env.get_template(self.__template_identity)
self.template_auto = self.template_env.get_template(self.__template_auto) self.template_auto = self.template_env.get_template(self.__template_auto)
self.template_mountpoints_hide = self.template_env.get_template(self.__template_mountpoints_hide)
self.template_auto_hide = self.template_env.get_template(self.__template_auto_hide)
self.__module_enabled = check_enabled( self.__module_enabled = check_enabled(
self.storage self.storage
, self.__module_name , self.__module_name
@ -105,46 +274,82 @@ class cifs_applier_user(applier_frontend):
) )
def is_mount_point_dirname(self):
if self.username:
return self.mount_dir.joinpath(self.__mountpoint_dirname_user).is_mount()
else:
return self.mount_dir.joinpath(self.__mountpoint_dirname).is_mount()
def is_changed_keys(self):
if self.username:
return (self.keys_cifs_previous_values_user.get(self.__name_value_user) != self.keys_cifs_values_user.get(self.__name_value_user) or
self.keys_the_preferences_previous_values_user != self.keys_the_preferences_values_user)
else:
return (self.keys_cifs_previous_values_machine.get(self.__name_value) != self.keys_cifs_values_machine.get(self.__name_value) or
self.keys_the_preferences_previous_values != self.keys_the_preferences_values)
def user_context_apply(self): def user_context_apply(self):
''' '''
Nothing to implement. Nothing to implement.
''' '''
pass pass
def __admin_context_apply(self): def _admin_context_apply(self):
# Create /etc/auto.master.gpupdate.d directory # Create /etc/auto.master.gpupdate.d directory
self.auto_master_d.mkdir(parents=True, exist_ok=True) self.auto_master_d.mkdir(parents=True, exist_ok=True)
# Create user's destination mount directory # Create user's destination mount directory
self.mount_dir.mkdir(parents=True, exist_ok=True) self.mount_dir.mkdir(parents=True, exist_ok=True)
uid = pwd.getpwnam(self.username).pw_uid if self.username else None
if uid:
os.chown(self.mount_dir, uid=uid, gid=-1)
self.mount_dir.chmod(0o700)
# Add pointer to /etc/auto.master.gpiupdate.d in /etc/auto.master # Add pointer to /etc/auto.master.gpiupdate.d in /etc/auto.master
auto_destdir = '+dir:{}'.format(self.__auto_dir) auto_destdir = '+dir:{}'.format(self.__auto_dir)
add_line_if_missing(self.__auto_file, auto_destdir) add_line_if_missing(self.__auto_file, auto_destdir)
# Collect data for drive settings # Collect data for drive settings
drive_list = list() drive_list = Drive_list()
for drv in self.drives: for drv in self.drives:
drive_settings = dict() drive_settings = dict()
drive_settings['dir'] = drv.dir drive_settings['dir'] = drv.dir
drive_settings['login'] = drv.login drive_settings['login'] = drv.login
drive_settings['password'] = drv.password drive_settings['password'] = drv.password
drive_settings['path'] = drv.path.replace('\\', '/') drive_settings['path'] = remove_chars_before_colon(drv.path.replace('\\', '/'))
drive_settings['action'] = drv.action
drive_settings['thisDrive'] = drv.thisDrive
drive_settings['allDrives'] = drv.allDrives
drive_settings['label'] = remove_escaped_quotes(drv.label)
drive_settings['persistent'] = drv.persistent
drive_settings['useLetter'] = drv.useLetter
drive_settings['username'] = self.username
drive_settings['cifsacl'] = False if self.cifsacl_disable else True
drive_list.append(drive_settings) drive_list.append(drive_settings)
if len(drive_list) > 0: if drive_list.len() > 0:
mount_settings = dict() mount_settings = dict()
mount_settings['drives'] = drive_list mount_settings['drives'] = drive_list()
mount_text = self.template_mountpoints.render(**mount_settings) mount_text = self.template_mountpoints.render(**mount_settings)
mount_text_hide = self.template_mountpoints_hide.render(**mount_settings)
with open(self.user_config.resolve(), 'w') as f: with open(self.user_config.resolve(), 'w') as f:
f.truncate() f.truncate()
f.write(mount_text) f.write(mount_text)
f.flush() f.flush()
with open(self.user_config_hide.resolve(), 'w') as f:
f.truncate()
f.write(mount_text_hide)
f.flush()
autofs_settings = dict() autofs_settings = dict()
autofs_settings['home_dir'] = self.home autofs_settings['home_dir'] = self.home
autofs_settings['mntTarget'] = self.mntTarget
autofs_settings['mount_file'] = self.user_config.resolve() autofs_settings['mount_file'] = self.user_config.resolve()
autofs_settings['timeout'] = self.timeout.data if self.timeout and self.timeout.data else 120
autofs_text = self.template_auto.render(**autofs_settings) autofs_text = self.template_auto.render(**autofs_settings)
with open(self.user_autofs.resolve(), 'w') as f: with open(self.user_autofs.resolve(), 'w') as f:
@ -152,13 +357,123 @@ class cifs_applier_user(applier_frontend):
f.write(autofs_text) f.write(autofs_text)
f.flush() f.flush()
autofs_settings['mount_file'] = self.user_config_hide.resolve()
autofs_text = self.template_auto_hide.render(**autofs_settings)
with open(self.user_autofs_hide.resolve(), 'w') as f:
f.truncate()
f.write(autofs_text)
f.flush()
if self.is_changed_keys() or (self.drives and not self.is_mount_point_dirname()):
self.restart_autofs()
if self.username:
self.update_drivemaps_home_links()
def restart_autofs(self):
try:
subprocess.check_call(['/bin/systemctl', 'restart', 'autofs']) subprocess.check_call(['/bin/systemctl', 'restart', 'autofs'])
except Exception as exc:
log('E74', {'exc': exc})
def unlink_symlink(self, symlink:Path, previous=None):
try:
if symlink.exists() and symlink.is_symlink() and symlink.owner() == 'root':
symlink.unlink()
elif symlink.is_symlink() and not symlink.exists():
symlink.unlink()
elif previous:
symlink.unlink()
except:
pass
def del_previous_link(self, previous_value_link , mountpoint_dirname, prefix):
d_previous = Path(self.homedir + ('/' if prefix else '/net.') + previous_value_link)
if d_previous.name != mountpoint_dirname:
dHide_previous = Path(self.homedir + ('/.' if prefix else '/.net.') + previous_value_link)
self.unlink_symlink(d_previous, True)
self.unlink_symlink(dHide_previous, True)
def update_drivemaps_home_links(self):
if self.state_home_link_disable_net:
prefix = ''
else:
prefix = 'net.'
if self.state_home_link_disable_net_user:
prefix_user = ''
else:
prefix_user = 'net.'
previous_value_link = self.keys_cifs_previous_values_machine.get(self.__name_value, self.__mountpoint_dirname)
previous_state_home_link_disable_net_user = self.keys_cifs_previous_values_user.get(self.__key_link_prefix_user)
previous_state_home_link_disable_net = self.keys_cifs_previous_values_user.get(self.__key_link_prefix)
previous_value_link_user = self.keys_cifs_previous_values_user.get(self.__name_value_user, self.__mountpoint_dirname_user)
self.homedir = get_homedir(self.username)
dUser = Path(self.homedir + '/' + prefix_user + self.__mountpoint_dirname_user)
dUserHide = Path(self.homedir + '/.' + prefix_user + self.__mountpoint_dirname_user)
dMachine = Path(self.homedir+'/' + prefix + self.__mountpoint_dirname)
dMachineHide = Path(self.homedir+'/.' + prefix + self.__mountpoint_dirname)
if self.state_home_link_user:
dUserMountpoint = Path(self.home).joinpath(self.__mountpoint_dirname_user)
dUserMountpointHide = Path(self.home).joinpath('.' + self.__mountpoint_dirname_user)
self.del_previous_link(previous_value_link_user, dUser.name, previous_state_home_link_disable_net_user)
if not dUser.exists() and dUserMountpoint.exists():
try:
os.symlink(dUserMountpoint, dUser, True)
except Exception as exc:
log('D194', {'exc': exc})
elif dUser.is_symlink() and not dUserMountpoint.exists():
self.unlink_symlink(dUser)
if not dUserHide.exists() and dUserMountpointHide.exists():
try:
os.symlink(dUserMountpointHide, dUserHide, True)
except Exception as exc:
log('D196', {'exc': exc})
elif dUserHide.is_symlink() and not dUserMountpointHide.exists():
self.unlink_symlink(dUserHide)
else:
self.del_previous_link(previous_value_link_user, dUser.name, previous_state_home_link_disable_net_user)
self.unlink_symlink(dUser)
self.unlink_symlink(dUserHide)
if self.state_home_link:
dMachineMountpoint = Path(self.__target_mountpoint).joinpath(self.__mountpoint_dirname)
dMachineMountpointHide = Path(self.__target_mountpoint).joinpath('.' + self.__mountpoint_dirname)
self.del_previous_link(previous_value_link, dMachine.name, previous_state_home_link_disable_net)
if not dMachine.exists() and dMachineMountpoint.exists():
try:
os.symlink(dMachineMountpoint, dMachine, True)
except Exception as exc:
log('D195', {'exc': exc})
elif dMachine.is_symlink() and not dMachineMountpoint.exists():
self.unlink_symlink(dMachine)
if not dMachineHide.exists() and dMachineMountpointHide.exists():
try:
os.symlink(dMachineMountpointHide, dMachineHide, True)
except Exception as exc:
log('D197', {'exc': exc})
elif dMachineHide.is_symlink() and not dMachineMountpointHide.exists():
self.unlink_symlink(dMachineHide)
else:
self.del_previous_link(previous_value_link, dMachine.name, previous_state_home_link_disable_net)
self.unlink_symlink(dMachine)
self.unlink_symlink(dMachineHide)
def admin_context_apply(self): def admin_context_apply(self):
if self.__module_enabled: if self.__module_enabled:
log('D146') log('D146')
self.__admin_context_apply() self._admin_context_apply()
else: else:
log('D147') log('D147')

View File

@ -1,7 +1,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2020 BaseALT Ltd. # Copyright (C) 2019-2024 BaseALT Ltd.
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -21,19 +21,18 @@ from .applier_frontend import (
, check_enabled , check_enabled
) )
from .appliers.control import control from .appliers.control import control
from util.logging import slogm, log from util.logging import log
import logging
class control_applier(applier_frontend): class control_applier(applier_frontend):
__module_name = 'ControlApplier' __module_name = 'ControlApplier'
__module_experimental = False __module_experimental = False
__module_enabled = True __module_enabled = True
_registry_branch = 'Software\\BaseALT\\Policies\\Control' _registry_branch = 'Software/BaseALT/Policies/Control'
def __init__(self, storage): def __init__(self, storage):
self.storage = storage self.storage = storage
self.control_settings = self.storage.filter_hklm_entries('Software\\BaseALT\\Policies\\Control%') self.control_settings = self.storage.filter_hklm_entries(self._registry_branch)
self.controls = list() self.controls = list()
self.__module_enabled = check_enabled( self.__module_enabled = check_enabled(
self.storage self.storage
@ -43,7 +42,7 @@ class control_applier(applier_frontend):
def run(self): def run(self):
for setting in self.control_settings: for setting in self.control_settings:
valuename = setting.hive_key.rpartition('\\')[2] valuename = setting.hive_key.rpartition('/')[2]
try: try:
self.controls.append(control(valuename, int(setting.data))) self.controls.append(control(valuename, int(setting.data)))
logdata = dict() logdata = dict()

View File

@ -1,7 +1,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2020 BaseALT Ltd. # Copyright (C) 2019-2024 BaseALT Ltd.
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -16,19 +16,15 @@
# You should have received a copy of the GNU General Public License # You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>. # along with this program. If not, see <http://www.gnu.org/licenses/>.
import logging
import os
import json import json
import cups import cups
from .applier_frontend import ( from .applier_frontend import (
applier_frontend applier_frontend
, check_enabled , check_enabled
) )
from gpt.printers import json2printer from gpt.printers import json2printer
from util.rpm import is_rpm_installed from util.rpm import is_rpm_installed
from util.logging import slogm, log from util.logging import log
def storage_get_printers(storage, sid): def storage_get_printers(storage, sid):
''' '''
@ -81,8 +77,12 @@ class cups_applier(applier_frontend):
if not is_rpm_installed('cups'): if not is_rpm_installed('cups'):
log('W9') log('W9')
return return
try:
self.cups_connection = cups.Connection() self.cups_connection = cups.Connection()
except Exception as exc:
logdata = dict()
logdata['exc', exc]
log('W20', logdata)
self.printers = storage_get_printers(self.storage, self.storage.get_info('machine_sid')) self.printers = storage_get_printers(self.storage, self.storage.get_info('machine_sid'))
if self.printers: if self.printers:
@ -111,7 +111,7 @@ class cups_applier_user(applier_frontend):
self.__module_enabled = check_enabled( self.__module_enabled = check_enabled(
self.storage self.storage
, self.__module_name , self.__module_name
, self.__module_enabled , self.__module_experimental
) )
def user_context_apply(self): def user_context_apply(self):

View File

@ -1,7 +1,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2020 BaseALT Ltd. # Copyright (C) 2019-2024 BaseALT Ltd.
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -21,9 +21,8 @@ from .applier_frontend import (
, check_enabled , check_enabled
) )
from .appliers.envvar import Envvar from .appliers.envvar import Envvar
from util.logging import slogm, log from util.logging import log
import logging
class envvar_applier(applier_frontend): class envvar_applier(applier_frontend):
__module_name = 'EnvvarsApplier' __module_name = 'EnvvarsApplier'
@ -34,7 +33,8 @@ class envvar_applier(applier_frontend):
self.storage = storage self.storage = storage
self.sid = sid self.sid = sid
self.envvars = self.storage.get_envvars(self.sid) self.envvars = self.storage.get_envvars(self.sid)
#self.__module_enabled = check_enabled(self.storage, self.__module_name, self.__module_enabled) Envvar.clear_envvar_file()
self.__module_enabled = check_enabled(self.storage, self.__module_name, self.__module_experimental)
def apply(self): def apply(self):
if self.__module_enabled: if self.__module_enabled:
@ -54,12 +54,10 @@ class envvar_applier_user(applier_frontend):
self.sid = sid self.sid = sid
self.username = username self.username = username
self.envvars = self.storage.get_envvars(self.sid) self.envvars = self.storage.get_envvars(self.sid)
#self.__module_enabled = check_enabled(self.storage, self.__module_name, self.__module_experimental) Envvar.clear_envvar_file(username)
self.__module_enabled = check_enabled(self.storage, self.__module_name, self.__module_experimental)
def admin_context_apply(self): def admin_context_apply(self):
pass
def user_context_apply(self):
if self.__module_enabled: if self.__module_enabled:
log('D136') log('D136')
ev = Envvar(self.envvars, self.username) ev = Envvar(self.envvars, self.username)
@ -67,3 +65,6 @@ class envvar_applier_user(applier_frontend):
else: else:
log('D137') log('D137')
def user_context_apply(self):
pass

View File

@ -17,7 +17,7 @@
# along with this program. If not, see <http://www.gnu.org/licenses/>. # along with this program. If not, see <http://www.gnu.org/licenses/>.
from .appliers.file_cp import Files_cp from .appliers.file_cp import Files_cp, Execution_check
from .applier_frontend import ( from .applier_frontend import (
applier_frontend applier_frontend
, check_enabled , check_enabled
@ -33,6 +33,7 @@ class file_applier(applier_frontend):
def __init__(self, storage, file_cache, sid): def __init__(self, storage, file_cache, sid):
self.storage = storage self.storage = storage
self.exe_check = Execution_check(storage)
self.sid = sid self.sid = sid
self.file_cache = file_cache self.file_cache = file_cache
self.files = self.storage.get_files(self.sid) self.files = self.storage.get_files(self.sid)
@ -40,7 +41,7 @@ class file_applier(applier_frontend):
def run(self): def run(self):
for file in self.files: for file in self.files:
Files_cp(file, self.file_cache) Files_cp(file, self.file_cache, self.exe_check)
def apply(self): def apply(self):
if self.__module_enabled: if self.__module_enabled:
@ -59,6 +60,7 @@ class file_applier_user(applier_frontend):
self.file_cache = file_cache self.file_cache = file_cache
self.sid = sid self.sid = sid
self.username = username self.username = username
self.exe_check = Execution_check(storage)
self.files = self.storage.get_files(self.sid) self.files = self.storage.get_files(self.sid)
self.__module_enabled = check_enabled( self.__module_enabled = check_enabled(
self.storage self.storage
@ -68,7 +70,7 @@ class file_applier_user(applier_frontend):
def run(self): def run(self):
for file in self.files: for file in self.files:
Files_cp(file, self.file_cache, self.username) Files_cp(file, self.file_cache, self.exe_check, self.username)
def admin_context_apply(self): def admin_context_apply(self):
if self.__module_enabled: if self.__module_enabled:

View File

@ -1,7 +1,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2020 BaseALT Ltd. # Copyright (C) 2019-2024 BaseALT Ltd.
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -33,15 +33,14 @@ from .applier_frontend import (
, check_enabled , check_enabled
) )
from util.logging import log from util.logging import log
from util.util import is_machine_name from util.util import is_machine_name, try_dict_to_literal_eval
class firefox_applier(applier_frontend): class firefox_applier(applier_frontend):
__module_name = 'FirefoxApplier' __module_name = 'FirefoxApplier'
__module_experimental = False __module_experimental = False
__module_enabled = True __module_enabled = True
__registry_branch = 'Software\\Policies\\Mozilla\\Firefox\\' __registry_branch = 'Software/Policies/Mozilla/Firefox'
__firefox_installdir1 = '/usr/lib64/firefox/distribution' __firefox_policies = '/etc/firefox/policies'
__firefox_installdir2 = '/etc/firefox/policies'
def __init__(self, storage, sid, username): def __init__(self, storage, sid, username):
self.storage = storage self.storage = storage
@ -50,8 +49,7 @@ class firefox_applier(applier_frontend):
self._is_machine_name = is_machine_name(self.username) self._is_machine_name = is_machine_name(self.username)
self.policies = dict() self.policies = dict()
self.policies_json = dict({ 'policies': self.policies }) self.policies_json = dict({ 'policies': self.policies })
firefox_filter = '{}%'.format(self.__registry_branch) self.firefox_keys = self.storage.filter_hklm_entries(self.__registry_branch)
self.firefox_keys = self.storage.filter_hklm_entries(firefox_filter)
self.policies_gen = dict() self.policies_gen = dict()
self.__module_enabled = check_enabled( self.__module_enabled = check_enabled(
self.storage self.storage
@ -59,78 +57,16 @@ class firefox_applier(applier_frontend):
, self.__module_experimental , self.__module_experimental
) )
def get_boolean(self,data):
if data in ['0', 'false', None, 'none', 0]:
return False
if data in ['1', 'true', 1]:
return True
def get_parts(self, hivekeyname):
'''
Parse registry path string and leave key parameters
'''
parts = hivekeyname.replace(self.__registry_branch, '').split('\\')
return parts
def create_dict(self, firefox_keys):
'''
Collect dictionaries from registry keys into a general dictionary
'''
counts = dict()
for it_data in firefox_keys:
branch = counts
try:
if type(it_data.data) is bytes:
it_data.data = it_data.data.decode(encoding='utf-16').replace('\x00','')
#Cases when it is necessary to create nested dictionaries
if it_data.valuename != it_data.data:
parts = self.get_parts(it_data.hive_key)
#creating a nested dictionary from elements
for part in parts[:-1]:
branch = branch.setdefault(part, {})
#dictionary key value initialization
if it_data.type == 4:
branch[parts[-1]] = self.get_boolean(it_data.data)
else:
branch[parts[-1]] = str(it_data.data).replace('\\', '/')
#Cases when it is necessary to create lists in a dictionary
else:
parts = self.get_parts(it_data.keyname)
for part in parts[:-1]:
branch = branch.setdefault(part, {})
if branch.get(parts[-1]) is None:
branch[parts[-1]] = list()
if it_data.type == 4:
branch[parts[-1]].append(self.get_boolean(it_data.data))
else:
if os.path.isdir(str(it_data.data).replace('\\', '/')):
branch[parts[-1]].append(str(it_data.data).replace('\\', '/'))
else:
branch[parts[-1]].append(str(it_data.data))
except Exception as exc:
logdata = dict()
logdata['Exception'] = exc
logdata['keyname'] = it_data.keyname
log('W14', logdata)
self.policies_json = {'policies': dict_item_to_list(counts)}
def machine_apply(self): def machine_apply(self):
''' '''
Write policies.json to Firefox installdir. Write policies.json to Firefox.
''' '''
self.create_dict(self.firefox_keys) excp = ['SOCKSVersion']
destfile = os.path.join(self.__firefox_installdir1, 'policies.json') self.policies_json = create_dict(self.firefox_keys, self.__registry_branch, excp)
os.makedirs(self.__firefox_installdir1, exist_ok=True) destfile = os.path.join(self.__firefox_policies, 'policies.json')
with open(destfile, 'w') as f: os.makedirs(self.__firefox_policies, exist_ok=True)
json.dump(self.policies_json, f)
logdata = dict()
logdata['destfile'] = destfile
log('D91', logdata)
destfile = os.path.join(self.__firefox_installdir2, 'policies.json')
os.makedirs(self.__firefox_installdir2, exist_ok=True)
with open(destfile, 'w') as f: with open(destfile, 'w') as f:
json.dump(self.policies_json, f) json.dump(self.policies_json, f)
logdata = dict() logdata = dict()
@ -160,6 +96,9 @@ def dict_item_to_list(dictionary:dict) -> dict:
''' '''
Replacing dictionaries with numeric keys with a List Replacing dictionaries with numeric keys with a List
''' '''
if '' in dictionary:
dictionary = dictionary.pop('')
for key,val in dictionary.items(): for key,val in dictionary.items():
if type(val) == dict: if type(val) == dict:
if key_dict_is_digit(val): if key_dict_is_digit(val):
@ -167,3 +106,65 @@ def dict_item_to_list(dictionary:dict) -> dict:
else: else:
dict_item_to_list(dictionary[key]) dict_item_to_list(dictionary[key])
return dictionary return dictionary
def clean_data_firefox(data):
return data.replace("'", '\"')
def create_dict(firefox_keys, registry_branch, excp=list()):
'''
Collect dictionaries from registry keys into a general dictionary
'''
get_boolean = lambda data: data in ['1', 'true', 'True', True, 1] if isinstance(data, (str, int)) else False
get_parts = lambda hivekey, registry: hivekey.replace(registry, '').split('/')
counts = dict()
for it_data in firefox_keys:
branch = counts
try:
if type(it_data.data) is bytes:
it_data.data = it_data.data.decode(encoding='utf-16').replace('\x00','')
json_data = try_dict_to_literal_eval(it_data.data)
if json_data:
it_data.data = json_data
it_data.type = 7
else:
if it_data.type == 1:
it_data.data = clean_data_firefox(it_data.data)
#Cases when it is necessary to create nested dictionaries
if it_data.valuename != it_data.data:
parts = get_parts(it_data.hive_key, registry_branch)
#creating a nested dictionary from elements
for part in parts[:-1]:
branch = branch.setdefault(part, {})
#dictionary key value initialization
if it_data.type == 4:
if it_data.valuename in excp:
branch[parts[-1]] = int(it_data.data)
else:
branch[parts[-1]] = get_boolean(it_data.data)
elif it_data.type == 7:
branch[parts[-1]] = it_data.data
else:
branch[parts[-1]] = str(it_data.data).replace('\\', '/')
#Cases when it is necessary to create lists in a dictionary
else:
parts = get_parts(it_data.keyname, registry_branch)
for part in parts[:-1]:
branch = branch.setdefault(part, {})
if branch.get(parts[-1]) is None:
branch[parts[-1]] = list()
if it_data.type == 4:
branch[parts[-1]].append(get_boolean(it_data.data))
else:
if os.path.isdir(str(it_data.data).replace('\\', '/')):
branch[parts[-1]].append(str(it_data.data).replace('\\', '/'))
else:
branch[parts[-1]].append(str(it_data.data))
except Exception as exc:
logdata = dict()
logdata['Exception'] = exc
logdata['keyname'] = it_data.keyname
log('W14', logdata)
return {'policies': dict_item_to_list(counts)}

View File

@ -1,7 +1,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2020 BaseALT Ltd. # Copyright (C) 2019-2024 BaseALT Ltd.
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -17,10 +17,9 @@
# along with this program. If not, see <http://www.gnu.org/licenses/>. # along with this program. If not, see <http://www.gnu.org/licenses/>.
import logging
import subprocess import subprocess
from util.logging import slogm, log from util.logging import log
from .applier_frontend import ( from .applier_frontend import (
applier_frontend applier_frontend
, check_enabled , check_enabled

View File

@ -1,7 +1,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2020 BaseALT Ltd. # Copyright (C) 2019-2024 BaseALT Ltd.
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -16,7 +16,6 @@
# You should have received a copy of the GNU General Public License # You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>. # along with this program. If not, see <http://www.gnu.org/licenses/>.
from pathlib import Path
from .applier_frontend import ( from .applier_frontend import (
applier_frontend applier_frontend

View File

@ -1,7 +1,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2020 BaseALT Ltd. # Copyright (C) 2019-2024 BaseALT Ltd.
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -26,6 +26,7 @@ from .polkit_applier import (
) )
from .systemd_applier import systemd_applier from .systemd_applier import systemd_applier
from .firefox_applier import firefox_applier from .firefox_applier import firefox_applier
from .thunderbird_applier import thunderbird_applier
from .chromium_applier import chromium_applier from .chromium_applier import chromium_applier
from .cups_applier import cups_applier from .cups_applier import cups_applier
from .package_applier import ( from .package_applier import (
@ -45,7 +46,9 @@ from .folder_applier import (
folder_applier folder_applier
, folder_applier_user , folder_applier_user
) )
from .cifs_applier import cifs_applier_user from .cifs_applier import (
cifs_applier_user
, cifs_applier)
from .ntp_applier import ntp_applier from .ntp_applier import ntp_applier
from .envvar_applier import ( from .envvar_applier import (
envvar_applier envvar_applier
@ -66,6 +69,15 @@ from .ini_applier import (
, ini_applier_user , ini_applier_user
) )
from .kde_applier import (
kde_applier
, kde_applier_user
)
from .laps_applier import laps_applier
from .networkshare_applier import networkshare_applier
from .yandex_browser_applier import yandex_browser_applier
from util.sid import get_sid from util.sid import get_sid
from util.users import ( from util.users import (
is_root, is_root,
@ -118,12 +130,12 @@ class frontend_manager:
''' '''
def __init__(self, username, is_machine): def __init__(self, username, is_machine):
self.storage = registry_factory('registry')
self.username = determine_username(username) self.username = determine_username(username)
self.storage = registry_factory('dconf', username=self.username)
self.is_machine = is_machine self.is_machine = is_machine
self.process_uname = get_process_user() self.process_uname = get_process_user()
self.sid = get_sid(self.storage.get_info('domain'), self.username, is_machine) self.sid = get_sid(self.storage.get_info('domain'), self.username, is_machine)
self.file_cache = fs_file_cache('file_cache') self.file_cache = fs_file_cache('file_cache', self.username)
self.machine_appliers = dict() self.machine_appliers = dict()
self.user_appliers = dict() self.user_appliers = dict()
@ -133,22 +145,34 @@ class frontend_manager:
self._init_user_appliers() self._init_user_appliers()
def _init_machine_appliers(self): def _init_machine_appliers(self):
self.machine_appliers['laps_applier'] = laps_applier(self.storage)
self.machine_appliers['control'] = control_applier(self.storage) self.machine_appliers['control'] = control_applier(self.storage)
self.machine_appliers['polkit'] = polkit_applier(self.storage) self.machine_appliers['polkit'] = polkit_applier(self.storage)
self.machine_appliers['systemd'] = systemd_applier(self.storage) self.machine_appliers['systemd'] = systemd_applier(self.storage)
self.machine_appliers['firefox'] = firefox_applier(self.storage, self.sid, self.username) self.machine_appliers['firefox'] = firefox_applier(self.storage, self.sid, self.username)
self.machine_appliers['thunderbird'] = thunderbird_applier(self.storage, self.sid, self.username)
self.machine_appliers['chromium'] = chromium_applier(self.storage, self.sid, self.username) self.machine_appliers['chromium'] = chromium_applier(self.storage, self.sid, self.username)
self.machine_appliers['yandex_browser'] = yandex_browser_applier(self.storage, self.sid, self.username)
self.machine_appliers['shortcuts'] = shortcut_applier(self.storage) self.machine_appliers['shortcuts'] = shortcut_applier(self.storage)
self.machine_appliers['gsettings'] = gsettings_applier(self.storage, self.file_cache) self.machine_appliers['gsettings'] = gsettings_applier(self.storage, self.file_cache)
try:
self.machine_appliers['cifs'] = cifs_applier(self.storage, self.sid)
except Exception as exc:
logdata = dict()
logdata['applier_name'] = 'cifs'
logdata['msg'] = str(exc)
log('E24', logdata)
self.machine_appliers['cups'] = cups_applier(self.storage) self.machine_appliers['cups'] = cups_applier(self.storage)
self.machine_appliers['firewall'] = firewall_applier(self.storage) self.machine_appliers['firewall'] = firewall_applier(self.storage)
self.machine_appliers['folders'] = folder_applier(self.storage, self.sid) self.machine_appliers['folders'] = folder_applier(self.storage, self.sid)
self.machine_appliers['package'] = package_applier(self.storage)
self.machine_appliers['ntp'] = ntp_applier(self.storage) self.machine_appliers['ntp'] = ntp_applier(self.storage)
self.machine_appliers['envvar'] = envvar_applier(self.storage, self.sid) self.machine_appliers['envvar'] = envvar_applier(self.storage, self.sid)
self.machine_appliers['networkshare'] = networkshare_applier(self.storage, self.sid)
self.machine_appliers['scripts'] = scripts_applier(self.storage, self.sid) self.machine_appliers['scripts'] = scripts_applier(self.storage, self.sid)
self.machine_appliers['files'] = file_applier(self.storage, self.file_cache, self.sid) self.machine_appliers['files'] = file_applier(self.storage, self.file_cache, self.sid)
self.machine_appliers['ini'] = ini_applier(self.storage, self.sid) self.machine_appliers['ini'] = ini_applier(self.storage, self.sid)
self.machine_appliers['kde'] = kde_applier(self.storage)
self.machine_appliers['package'] = package_applier(self.storage)
def _init_user_appliers(self): def _init_user_appliers(self):
# User appliers are expected to work with user-writable # User appliers are expected to work with user-writable
@ -163,12 +187,14 @@ class frontend_manager:
logdata['applier_name'] = 'cifs' logdata['applier_name'] = 'cifs'
logdata['msg'] = str(exc) logdata['msg'] = str(exc)
log('E25', logdata) log('E25', logdata)
self.user_appliers['package'] = package_applier_user(self.storage, self.sid, self.username)
self.user_appliers['polkit'] = polkit_applier_user(self.storage, self.sid, self.username) self.user_appliers['polkit'] = polkit_applier_user(self.storage, self.sid, self.username)
self.user_appliers['envvar'] = envvar_applier_user(self.storage, self.sid, self.username) self.user_appliers['envvar'] = envvar_applier_user(self.storage, self.sid, self.username)
self.user_appliers['networkshare'] = networkshare_applier(self.storage, self.sid, self.username)
self.user_appliers['scripts'] = scripts_applier_user(self.storage, self.sid, self.username) self.user_appliers['scripts'] = scripts_applier_user(self.storage, self.sid, self.username)
self.user_appliers['files'] = file_applier_user(self.storage, self.file_cache, self.sid, self.username) self.user_appliers['files'] = file_applier_user(self.storage, self.file_cache, self.sid, self.username)
self.user_appliers['ini'] = ini_applier_user(self.storage, self.sid, self.username) self.user_appliers['ini'] = ini_applier_user(self.storage, self.sid, self.username)
self.user_appliers['kde'] = kde_applier_user(self.storage, self.sid, self.username, self.file_cache)
self.user_appliers['package'] = package_applier_user(self.storage, self.sid, self.username)
def machine_apply(self): def machine_apply(self):
''' '''

View File

@ -1,7 +1,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2021 BaseALT Ltd. # Copyright (C) 2019-2024 BaseALT Ltd.
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -16,15 +16,13 @@
# You should have received a copy of the GNU General Public License # You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>. # along with this program. If not, see <http://www.gnu.org/licenses/>.
import logging from util.exceptions import NotUNCPathError
import os import os
import pwd import pwd
import subprocess import subprocess
from gi.repository import ( from gi.repository import Gio
Gio from storage.dconf_registry import Dconf_registry
, GLib
)
from .applier_frontend import ( from .applier_frontend import (
applier_frontend applier_frontend
@ -35,7 +33,7 @@ from .appliers.gsettings import (
system_gsettings, system_gsettings,
user_gsettings user_gsettings
) )
from util.logging import slogm ,log from util.logging import log
def uri_fetch(schema, path, value, cache): def uri_fetch(schema, path, value, cache):
''' '''
@ -48,6 +46,8 @@ def uri_fetch(schema, path, value, cache):
logdata['src'] = value logdata['src'] = value
try: try:
retval = cache.get(value) retval = cache.get(value)
if not retval:
retval = ''
logdata['dst'] = retval logdata['dst'] = retval
log('D90', logdata) log('D90', logdata)
except Exception as exc: except Exception as exc:
@ -59,14 +59,14 @@ class gsettings_applier(applier_frontend):
__module_name = 'GSettingsApplier' __module_name = 'GSettingsApplier'
__module_experimental = False __module_experimental = False
__module_enabled = True __module_enabled = True
__registry_branch = 'Software\\BaseALT\\Policies\\GSettings\\' __registry_branch = 'Software\\BaseALT\\Policies\\gsettings\\'
__registry_locks_branch = 'Software\\BaseALT\\Policies\\GSettingsLocks\\' __registry_locks_branch = 'Software\\BaseALT\\Policies\\GSettingsLocks\\'
__wallpaper_entry = 'Software\\BaseALT\\Policies\\GSettings\\org.mate.background.picture-filename' __wallpaper_entry = 'Software/BaseALT/Policies/gsettings/org.mate.background.picture-filename'
__vino_authentication_methods_entry = 'Software\\BaseALT\\Policies\\GSettings\\org.gnome.Vino.authentication-methods' __vino_authentication_methods_entry = 'Software/BaseALT/Policies/gsettings/org.gnome.Vino.authentication-methods'
__global_schema = '/usr/share/glib-2.0/schemas' __global_schema = '/usr/share/glib-2.0/schemas'
__override_priority_file = 'zzz_policy.gschema.override' __override_priority_file = 'zzz_policy.gschema.override'
__override_old_file = '0_policy.gschema.override' __override_old_file = '0_policy.gschema.override'
__windows_settings = dict()
def __init__(self, storage, file_cache): def __init__(self, storage, file_cache):
self.storage = storage self.storage = storage
@ -108,13 +108,13 @@ class gsettings_applier(applier_frontend):
# Get all configured gsettings locks # Get all configured gsettings locks
for lock in self.gsettings_locks: for lock in self.gsettings_locks:
valuename = lock.hive_key.rpartition('\\')[2] valuename = lock.hive_key.rpartition('/')[2]
self.locks[valuename] = int(lock.data) self.locks[valuename] = int(lock.data)
# Calculate all configured gsettings # Calculate all configured gsettings
for setting in self.gsettings_keys: for setting in self.gsettings_keys:
helper = None helper = None
valuename = setting.hive_key.rpartition('\\')[2] valuename = setting.hive_key.rpartition('/')[2]
rp = valuename.rpartition('.') rp = valuename.rpartition('.')
schema = rp[0] schema = rp[0]
path = rp[2] path = rp[2]
@ -137,10 +137,7 @@ class gsettings_applier(applier_frontend):
log('E48') log('E48')
# Update desktop configuration system backend # Update desktop configuration system backend
try: Dconf_registry.dconf_update()
proc = subprocess.run(args=['/usr/bin/dconf', "update"], capture_output=True, check=True)
except Exception as exc:
log('E49')
def apply(self): def apply(self):
if self.__module_enabled: if self.__module_enabled:
@ -184,9 +181,9 @@ class gsettings_applier_user(applier_frontend):
__module_name = 'GSettingsApplierUser' __module_name = 'GSettingsApplierUser'
__module_experimental = False __module_experimental = False
__module_enabled = True __module_enabled = True
__registry_branch = 'Software\\BaseALT\\Policies\\GSettings\\' __registry_branch = 'Software\\BaseALT\\Policies\\gsettings\\'
__wallpaper_entry = 'Software\\BaseALT\\Policies\\GSettings\\org.mate.background.picture-filename' __wallpaper_entry = 'Software/BaseALT/Policies/gsettings/org.mate.background.picture-filename'
__vino_authentication_methods_entry = 'Software\\BaseALT\\Policies\\GSettings\\org.gnome.Vino.authentication-methods' __vino_authentication_methods_entry = 'Software/BaseALT/Policies/gsettings/org.gnome.Vino.authentication-methods'
def __init__(self, storage, file_cache, sid, username): def __init__(self, storage, file_cache, sid, username):
self.storage = storage self.storage = storage
@ -204,25 +201,25 @@ class gsettings_applier_user(applier_frontend):
mapping = [ mapping = [
# Disable or enable screen saver # Disable or enable screen saver
GSettingsMapping( GSettingsMapping(
'Software\\Policies\\Microsoft\\Windows\\Control Panel\\Desktop\\ScreenSaveActive' 'Software/Policies/Microsoft/Windows/Control Panel/Desktop/ScreenSaveActive'
, 'org.mate.screensaver' , 'org.mate.screensaver'
, 'idle-activation-enabled' , 'idle-activation-enabled'
) )
# Timeout in seconds for screen saver activation. The value of zero effectively disables screensaver start # Timeout in seconds for screen saver activation. The value of zero effectively disables screensaver start
, GSettingsMapping( , GSettingsMapping(
'Software\\Policies\\Microsoft\\Windows\\Control Panel\\Desktop\\ScreenSaveTimeOut' 'Software/Policies/Microsoft/Windows/Control Panel/Desktop/ScreenSaveTimeOut'
, 'org.mate.session' , 'org.mate.session'
, 'idle-delay' , 'idle-delay'
) )
# Enable or disable password protection for screen saver # Enable or disable password protection for screen saver
, GSettingsMapping( , GSettingsMapping(
'Software\\Policies\\Microsoft\\Windows\\Control Panel\\Desktop\\ScreenSaverIsSecure' 'Software/Policies/Microsoft/Windows/Control Panel/Desktop/ScreenSaverIsSecure'
, 'org.mate.screensaver' , 'org.mate.screensaver'
, 'lock-enabled' , 'lock-enabled'
) )
# Specify image which will be used as a wallpaper # Specify image which will be used as a wallpaper
, GSettingsMapping( , GSettingsMapping(
'Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Wallpaper' 'Software/Microsoft/Windows/CurrentVersion/Policies/System/Wallpaper'
, 'org.mate.background' , 'org.mate.background'
, 'picture-filename' , 'picture-filename'
) )
@ -251,15 +248,6 @@ class gsettings_applier_user(applier_frontend):
return uri_fetch(schema, path, value, self.file_cache) return uri_fetch(schema, path, value, self.file_cache)
def run(self): def run(self):
#for setting in self.gsettings_keys:
# valuename = setting.hive_key.rpartition('\\')[2]
# rp = valuename.rpartition('.')
# schema = rp[0]
# path = rp[2]
# self.gsettings.append(user_gsetting(schema, path, setting.data))
# Calculate all mapped gsettings if mapping enabled
if self.__windows_mapping_enabled: if self.__windows_mapping_enabled:
log('D83') log('D83')
self.windows_mapping_append() self.windows_mapping_append()
@ -268,7 +256,7 @@ class gsettings_applier_user(applier_frontend):
# Calculate all configured gsettings # Calculate all configured gsettings
for setting in self.gsettings_keys: for setting in self.gsettings_keys:
valuename = setting.hive_key.rpartition('\\')[2] valuename = setting.hive_key.rpartition('/')[2]
rp = valuename.rpartition('.') rp = valuename.rpartition('.')
schema = rp[0] schema = rp[0]
path = rp[2] path = rp[2]
@ -293,8 +281,10 @@ class gsettings_applier_user(applier_frontend):
try: try:
entry = self.__wallpaper_entry entry = self.__wallpaper_entry
filter_result = self.storage.get_hkcu_entry(self.sid, entry) filter_result = self.storage.get_hkcu_entry(self.sid, entry)
if filter_result: if filter_result and filter_result.data:
self.file_cache.store(filter_result.data) self.file_cache.store(filter_result.data)
except NotUNCPathError:
...
except Exception as exc: except Exception as exc:
logdata = dict() logdata = dict()
logdata['exception'] = str(exc) logdata['exception'] = str(exc)

View File

@ -1,7 +1,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2022 BaseALT Ltd. # Copyright (C) 2019-2024 BaseALT Ltd.
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -16,7 +16,6 @@
# You should have received a copy of the GNU General Public License # You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>. # along with this program. If not, see <http://www.gnu.org/licenses/>.
from pathlib import Path
from .appliers.ini_file import Ini_file from .appliers.ini_file import Ini_file
from .applier_frontend import ( from .applier_frontend import (
@ -68,11 +67,11 @@ class ini_applier_user(applier_frontend):
Ini_file(inifile, self.username) Ini_file(inifile, self.username)
def admin_context_apply(self): def admin_context_apply(self):
pass
def user_context_apply(self):
if self.__module_enabled: if self.__module_enabled:
log('D173') log('D173')
self.run() self.run()
else: else:
log('D174') log('D174')
def user_context_apply(self):
pass

View File

@ -0,0 +1,367 @@
#
# GPOA - GPO Applier for Linux
#
# Copyright (C) 2019-2024 BaseALT Ltd.
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
from .applier_frontend import applier_frontend, check_enabled
from util.logging import log
from util.util import get_homedir
from util.exceptions import NotUNCPathError
import os
import subprocess
import re
import dbus
import shutil
class kde_applier(applier_frontend):
__module_name = 'KdeApplier'
__module_experimental = True
__module_enabled = False
__hklm_branch = 'Software/BaseALT/Policies/KDE/'
__hklm_lock_branch = 'Software/BaseALT/Policies/KDELocks/'
def __init__(self, storage):
self.storage = storage
self.locks_dict = {}
self.locks_data_dict = {}
self.all_kde_settings = {}
kde_filter = '{}%'.format(self.__hklm_branch)
locks_filter = '{}%'.format(self.__hklm_lock_branch)
self.locks_settings = self.storage.filter_hklm_entries(locks_filter)
self.kde_settings = self.storage.filter_hklm_entries(kde_filter)
self.all_kde_settings = {}
self.__module_enabled = check_enabled(
self.storage,
self.__module_name,
self.__module_experimental
)
def apply(self):
if self.__module_enabled:
log('D198')
create_dict(self.kde_settings, self.all_kde_settings, self.locks_settings, self.locks_dict)
apply(self.all_kde_settings, self.locks_dict)
else:
log('D199')
class kde_applier_user(applier_frontend):
__module_name = 'KdeApplierUser'
__module_experimental = True
__module_enabled = False
kde_version = None
__hkcu_branch = 'Software/BaseALT/Policies/KDE'
__hkcu_lock_branch = 'Software/BaseALT/Policies/KDELocks'
__plasma_update_entry = 'Software/BaseALT/Policies/KDE/Plasma/Update'
def __init__(self, storage, sid=None, username=None, file_cache = None):
self.storage = storage
self.username = username
self.sid = sid
self.file_cache = file_cache
self.locks_dict = {}
self.locks_data_dict = {}
self.all_kde_settings = {}
kde_applier_user.kde_version = get_kde_version()
kde_filter = '{}%'.format(self.__hkcu_branch)
locks_filter = '{}%'.format(self.__hkcu_lock_branch)
self.locks_settings = self.storage.filter_hkcu_entries(self.sid, locks_filter)
self.plasma_update = self.storage.get_entry(self.__plasma_update_entry)
self.plasma_update_flag = self.plasma_update.data if self.plasma_update is not None else 0
self.kde_settings = self.storage.filter_hkcu_entries(self.sid, kde_filter)
self.__module_enabled = check_enabled(
self.storage,
self.__module_name,
self.__module_experimental
)
def admin_context_apply(self):
try:
for setting in self.kde_settings:
file_name = setting.keyname.split("/")[-2]
if file_name == 'wallpaper':
data = setting.data
break
self.file_cache.store(data)
except Exception as exc:
logdata = dict()
logdata['exc'] = exc
def user_context_apply(self):
'''
Change settings applied in user context
'''
if self.__module_enabled:
log('D200')
create_dict(self.kde_settings, self.all_kde_settings, self.locks_settings, self.locks_dict, self.file_cache, self.username, self.plasma_update_flag)
apply(self.all_kde_settings, self.locks_dict, self.username)
else:
log('D201')
dbus_methods_mapping = {
'kscreenlockerrc': {
'dbus_service': 'org.kde.screensaver',
'dbus_path': '/ScreenSaver',
'dbus_interface': 'org.kde.screensaver',
'dbus_method': 'configure'
},
'wallpaper': {
'dbus_service': 'org.freedesktop.systemd1',
'dbus_path': '/org/freedesktop/systemd1',
'dbus_interface': 'org.freedesktop.systemd1.Manager',
'dbus_method': 'RestartUnit',
'dbus_args': ['plasma-plasmashell.service', 'replace']
}
}
def get_kde_version():
try:
kinfo_path = shutil.which("kinfo", path="/usr/lib/kf5/bin:/usr/bin")
if not kinfo_path:
raise FileNotFoundError("Unable to find kinfo")
output = subprocess.check_output([kinfo_path], text=True, env={'LANG':'C'})
for line in output.splitlines():
if "KDE Frameworks Version" in line:
frameworks_version = line.split(":", 1)[1].strip()
major_frameworks_version = int(frameworks_version.split(".")[0])
return major_frameworks_version
except:
return None
def create_dict(kde_settings, all_kde_settings, locks_settings, locks_dict, file_cache = None, username = None, plasmaupdate = False):
for locks in locks_settings:
locks_dict[locks.valuename] = locks.data
for setting in kde_settings:
try:
file_name, section, value = setting.keyname.split("/")[-2], setting.keyname.split("/")[-1], setting.valuename
data = setting.data
if file_name == 'wallpaper':
apply_for_wallpaper(data, file_cache, username, plasmaupdate)
else:
all_kde_settings.setdefault(file_name, {}).setdefault(section, {})[value] = data
except Exception as exc:
logdata = dict()
logdata['file_name'] = file_name
logdata['section'] = section
logdata['value'] = value
logdata['data'] = data
logdata['exc'] = exc
log('W16', logdata)
def apply(all_kde_settings, locks_dict, username = None):
logdata = dict()
modified_files = set()
if username is None:
system_path_settings = '/etc/xdg/'
system_files = [
"baloofilerc",
"kcminputrc",
"kded_device_automounterrc",
"kdeglobals",
"ksplashrc",
"kwinrc",
"plasma-localerc",
"plasmarc",
"powermanagementprofilesrc"
]
for file in system_files:
file_to_remove = f'{system_path_settings}{file}'
if os.path.exists(file_to_remove):
os.remove(file_to_remove)
for file_name, sections in all_kde_settings.items():
file_path = f'{system_path_settings}{file_name}'
with open(file_path, 'w') as file:
for section, keys in sections.items():
section = section.replace(')(', '][')
file.write(f'[{section}]\n')
for key, value in keys.items():
lock = f"{file_name}.{section}.{key}".replace('][', ')(')
if locks_dict.get(lock) == 1:
file.write(f'{key}[$i]={value}\n')
else:
file.write(f'{key}={value}\n')
file.write('\n')
modified_files.add(file_name)
else:
for file_name, sections in all_kde_settings.items():
path = f'{get_homedir(username)}/.config/{file_name}'
if not os.path.exists(path):
open(path, 'a').close()
else:
pass
for section, keys in sections.items():
for key, value in keys.items():
value = str(value)
lock = f"{file_name}.{section}.{key}"
if lock in locks_dict and locks_dict[lock] == 1:
command = [
f'kwriteconfig{kde_applier_user.kde_version}',
'--file', file_name,
'--group', section,
'--key', key +'/$i/',
'--type', 'string',
value
]
else:
command = [
f'kwriteconfig{kde_applier_user.kde_version}',
'--file', file_name,
'--group', section,
'--key', key,
'--type', 'string',
value
]
try:
clear_locks_settings(username, file_name, key)
env_path = dict(os.environ)
env_path["PATH"] = "/usr/lib/kf5/bin:/usr/bin"
subprocess.run(command, check=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE, env=env_path)
except:
logdata['command'] = command
log('W22', logdata)
new_content = []
file_path = f'{get_homedir(username)}/.config/{file_name}'
try:
with open(file_path, 'r') as file:
for line in file:
line = line.replace('/$i/', '[$i]').replace(')(', '][')
new_content.append(line)
with open(file_path, 'w') as file:
file.writelines(new_content)
logdata['file'] = file_name
log('D202', logdata)
except Exception as exc:
logdata['exc'] = exc
log('W19', logdata)
modified_files.add(file_name)
for file_name in modified_files:
call_dbus_method(file_name)
def clear_locks_settings(username, file_name, key):
'''
Method to remove old locked settings
'''
file_path = f'{get_homedir(username)}/.config/{file_name}'
with open(file_path, 'r') as file:
lines = file.readlines()
with open(file_path, 'w') as file:
for line in lines:
if f'{key}[$i]=' not in line:
file.write(line)
for line in lines:
if f'{key}[$i]=' in line:
logdata = dict()
logdata['line'] = line.strip()
log('I10', logdata)
def apply_for_wallpaper(data, file_cache, username, plasmaupdate):
'''
Method to change wallpaper
'''
logdata = dict()
path_to_wallpaper = f'{get_homedir(username)}/.config/plasma-org.kde.plasma.desktop-appletsrc'
id_desktop = get_id_desktop(path_to_wallpaper)
try:
try:
data = str(file_cache.get(data))
except NotUNCPathError:
data = str(data)
with open(path_to_wallpaper, 'r') as file:
current_wallpaper = file.read()
match = re.search(rf'\[Containments\]\[{id_desktop}\]\[Wallpaper\]\[org\.kde\.image\]\[General\]\s+Image=(.*)', current_wallpaper)
if match:
current_wallpaper_path = match.group(1)
flag = (current_wallpaper_path == data)
else:
flag = False
os.environ["LANGUAGE"] = os.environ["LANG"].split(".")[0]
os.environ["XDG_DATA_DIRS"] = "/usr/share/kf5:"
#Variable for system detection of directories before files with .colors extension
os.environ["DISPLAY"] = ":0"
#Variable for command execution plasma-apply-colorscheme
os.environ["XDG_RUNTIME_DIR"] = f"/run/user/{os.getuid()}"
os.environ["PATH"] = "/usr/lib/kf5/bin:"
os.environ["DBUS_SESSION_BUS_ADDRESS"] = f"unix:path=/run/user/{os.getuid()}/bus"#plasma-apply-wallpaperimage
env_path = dict(os.environ)
env_path["PATH"] = "/usr/lib/kf5/bin:/usr/bin"
#environment variable for accessing binary files without hard links
if not flag:
if os.path.isfile(path_to_wallpaper):
command = [
f'kwriteconfig{kde_applier_user.kde_version}',
'--file', 'plasma-org.kde.plasma.desktop-appletsrc',
'--group', 'Containments',
'--group', id_desktop,
'--group', 'Wallpaper',
'--group', 'org.kde.image',
'--group', 'General',
'--key', 'Image',
'--type', 'string',
data
]
try:
subprocess.run(command, check=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE, env=env_path)
except:
logdata['command'] = command
log('E68', logdata)
if plasmaupdate == 1:
call_dbus_method("wallpaper")
else:
logdata['file'] = path_to_wallpaper
log('W21', logdata)
except OSError as exc:
logdata['exc'] = exc
log('W17', logdata)
except Exception as exc:
logdata['exc'] = exc
log('E67', logdata)
def get_id_desktop(path_to_wallpaper):
'''
Method for getting desktop id. It is currently accepted that this number is one of the sections in the configuration file.
'''
pattern = r'\[Containments\]\[(\d+)\][^\[]*activityId=([^\s]+)'
try:
with open(path_to_wallpaper, 'r') as file:
file_content = file.read()
match = re.search(pattern, file_content)
return match.group(1) if match else None
except:
return None
def call_dbus_method(file_name):
'''
Method to call D-Bus method based on the file name
'''
os.environ["DBUS_SESSION_BUS_ADDRESS"] = f"unix:path=/run/user/{os.getuid()}/bus"
if file_name in dbus_methods_mapping:
config = dbus_methods_mapping[file_name]
try:
session_bus = dbus.SessionBus()
dbus_object = session_bus.get_object(config['dbus_service'], config['dbus_path'])
dbus_iface = dbus.Interface(dbus_object, config['dbus_interface'])
if 'dbus_args' in config:
getattr(dbus_iface, config['dbus_method'])(*config['dbus_args'])
else:
getattr(dbus_iface, config['dbus_method'])()
except dbus.exceptions.DBusException as e:
logdata = dict({'error': str(exc)})
log('E31', logdata)
else:
pass

View File

@ -0,0 +1,695 @@
#
# GPOA - GPO Applier for Linux
#
# Copyright (C) 2025 BaseALT Ltd.
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
from .applier_frontend import (
applier_frontend,
check_enabled
)
import struct
from datetime import datetime, timedelta
import dpapi_ng
from util.util import remove_prefix_from_keys, check_local_user_exists
from util.sid import WellKnown21RID
import subprocess
import ldb
import string
import secrets
import os
import psutil
from util.logging import log
import logging
class laps_applier(applier_frontend):
"""
LAPS (Local Administrator Password Solution) implementation for managing
and automatically rotating administrator passwords.
"""
# Time calculation constants
# Number of seconds between the Windows epoch (1601-01-01 00:00:00 UTC)
# and the Unix epoch (1970-01-01 00:00:00 UTC).
# Used to convert between Unix timestamps and Windows FileTime.
_EPOCH_TIMESTAMP = 11644473600
# Number of 100-nanosecond intervals per second.
# Used to convert seconds to Windows FileTime format.
_HUNDREDS_OF_NANOSECONDS = 10000000
# Number of 100-nanosecond intervals in one day
_DAY_FLOAT = 8.64e11
# Module configuration
__module_name = 'LapsApplier'
__module_experimental = True
__module_enabled = False
# Registry paths
_WINDOWS_REGISTRY_PATH = 'SOFTWARE/Microsoft/Windows/CurrentVersion/Policies/LAPS/'
_ALT_REGISTRY_PATH = 'Software/BaseALT/Policies/Laps/'
# LDAP attributes
_ATTR_ENCRYPTED_PASSWORD = 'msLAPS-EncryptedPassword'
_ATTR_PASSWORD_EXPIRATION_TIME = 'msLAPS-PasswordExpirationTime'
# dconf key for password modification time
_KEY_PASSWORD_LAST_MODIFIED = '/Software/BaseALT/Policies/Laps/PasswordLastModified/'
# Password complexity levels
_PASSWORD_COMPLEXITY = {
1: string.ascii_uppercase,
2: string.ascii_letters,
3: string.ascii_letters + string.digits,
4: string.ascii_letters + string.digits + string.punctuation
}
# Post-authentication actions
_ACTION_NONE = 0
_ACTION_CHANGE_PASSWORD = 1
_ACTION_TERMINATE_SESSIONS = 3
_ACTION_REBOOT = 5
def __init__(self, storage):
"""
Initialize the LAPS applier with configuration from registry.
Args:
storage: Storage object containing registry entries and system information
"""
self.storage = storage
# Load registry configuration
if not self._load_configuration():
self.__module_enabled = False
return
if not self._check_requirements():
log('W29')
self.__module_enabled = False
return
# Initialize system connections and parameters
self._initialize_system_parameters()
# Check if module is enabled in configuration
self.__module_enabled = check_enabled(
self.storage,
self.__module_name,
self.__module_experimental
)
def _load_configuration(self):
"""Load configuration settings from registry."""
alt_keys = remove_prefix_from_keys(
self.storage.filter_entries(self._ALT_REGISTRY_PATH),
self._ALT_REGISTRY_PATH
)
windows_keys = remove_prefix_from_keys(
self.storage.filter_entries(self._WINDOWS_REGISTRY_PATH),
self._WINDOWS_REGISTRY_PATH
)
# Combine configurations with BaseALT taking precedence
self.config = windows_keys
self.config.update(alt_keys)
# Extract commonly used configuration parameters
self.backup_directory = self.config.get('BackupDirectory', None)
self.encryption_enabled = self.config.get('ADPasswordEncryptionEnabled', 1)
self.password_expiration_protection = self.config.get('PasswordExpirationProtectionEnabled', 1)
self.password_age_days = self.config.get('PasswordAgeDays', 30)
self.post_authentication_actions = self.config.get('PostAuthenticationActions', 3)
self.post_authentication_reset_delay = self.config.get('PostAuthenticationResetDelay', 24)
name = self.config.get('AdministratorAccountName', 'root')
if name and check_local_user_exists(name):
self.target_user = name
else:
log('W36')
return False
return True
def _check_requirements(self):
"""
Check if the necessary requirements are met for the module to operate.
Returns:
bool: True if requirements are met, False otherwise
"""
if self.backup_directory != 2 or not self.encryption_enabled:
logdata = dict()
logdata['backup_directory'] = self.backup_directory
logdata['encryption_enabled'] = self.encryption_enabled
log('D223', logdata)
return False
return True
def _initialize_system_parameters(self):
"""Initialize system parameters and connections."""
# Set up LDAP connections
self.samdb = self.storage.get_info('samdb')
self.domain_sid = self.samdb.get_domain_sid()
self.domain_dn = self.samdb.domain_dn()
self.computer_dn = self._get_computer_dn()
self.admin_group_sid = f'{self.domain_sid}-{WellKnown21RID.DOMAIN_ADMINS.value}'
# Set up time parameters
self.expiration_date = self._get_expiration_date()
self.expiration_date_int = self._convert_to_filetime(self.expiration_date)
self.current_time_int = self._convert_to_filetime(datetime.now())
# Get current system state
self.expiration_time_attr = self._get_expiration_time_attr()
self.pass_last_mod_int = self._read_dconf_pass_last_mod()
self.encryption_principal = self._get_encryption_principal()
self.last_login_hours_ago = self._get_last_login_hours_ago()
def _get_computer_dn(self):
"""
Get the Distinguished Name of the computer account.
Returns:
str: Computer's distinguished name in LDAP
"""
machine_name = self.storage.get_info('machine_name')
search_filter = f'(sAMAccountName={machine_name})'
results = self.samdb.search(base=self.domain_dn, expression=search_filter, attrs=['dn'])
return results[0]['dn']
def _get_encryption_principal(self):
"""
Get the encryption principal for password encryption.
Returns:
str: SID of the encryption principal
"""
encryption_principal = self.config.get('ADPasswordEncryptionPrincipal', None)
if not encryption_principal:
return self.admin_group_sid
return self._verify_encryption_principal(encryption_principal)
def _verify_encryption_principal(self, principal_name):
"""
Verify the encryption principal exists and get its SID.
Args:
principal_name: Principal name to verify
Returns:
str: SID of the encryption principal if found, or admin group SID as fallback
"""
try:
# Try to resolve as domain\\user format
domain = self.storage.get_info('domain')
username = f'{domain}\\{principal_name}'
output = subprocess.check_output(['wbinfo', '-n', username])
sid = output.split()[0].decode('utf-8')
return sid
except subprocess.CalledProcessError:
# Try to resolve directly as SID
try:
output = subprocess.check_output(['wbinfo', '-s', principal_name])
return principal_name
except subprocess.CalledProcessError:
# Fallback to admin group SID
logdata = dict()
logdata['principal_name'] = principal_name
log('W30', logdata)
return self.admin_group_sid
def _get_expiration_date(self, base_time=None):
"""
Calculate the password expiration date.
Args:
base_time: Optional datetime to base calculation on, defaults to now
Returns:
datetime: Password expiration date
"""
base = base_time or datetime.now()
# Set to beginning of day and add password age
return (base.replace(hour=0, minute=0, second=0, microsecond=0) +
timedelta(days=int(self.password_age_days)))
def _convert_to_filetime(self, dt):
"""
Convert datetime to Windows filetime format (100ns intervals since 1601-01-01).
Args:
dt: Datetime to convert
Returns:
int: Windows filetime integer
"""
epoch_timedelta = timedelta(seconds=self._EPOCH_TIMESTAMP)
new_dt = dt + epoch_timedelta
return int(new_dt.timestamp() * self._HUNDREDS_OF_NANOSECONDS)
def _get_expiration_time_attr(self):
"""
Get the current password expiration time from LDAP.
Returns:
int: Password expiration time as integer, or 0 if not found
"""
try:
res = self.samdb.search(
base=self.computer_dn,
scope=ldb.SCOPE_BASE,
expression="(objectClass=*)",
attrs=[self._ATTR_PASSWORD_EXPIRATION_TIME]
)
return int(res[0].get(self._ATTR_PASSWORD_EXPIRATION_TIME, 0)[0])
except Exception as exc:
logdata = dict()
logdata['exc'] = exc
log('W31', logdata)
return 0
def _read_dconf_pass_last_mod(self):
"""
Read the password last modified time from dconf.
Returns:
int: Timestamp of last password modification or current time if not found
"""
try:
key_path = self._KEY_PASSWORD_LAST_MODIFIED + self.target_user
last_modified = subprocess.check_output(
['dconf', 'read', key_path],
text=True
).strip().strip("'\"")
return int(last_modified)
except Exception as exc:
logdata = dict()
logdata['exc'] = exc
log('W32', logdata)
return self.current_time_int
def _write_dconf_pass_last_mod(self):
"""
Write the password last modified time to dconf.
"""
try:
# Ensure dbus session is available
self._ensure_dbus_session()
# Write current time to dconf
key_path = self._KEY_PASSWORD_LAST_MODIFIED + self.target_user
last_modified = f'"{self.current_time_int}"'
subprocess.check_output(['dconf', 'write', key_path, last_modified])
log('D222')
except Exception as exc:
logdata = dict()
logdata['exc'] = exc
log('W28', logdata)
def _ensure_dbus_session(self):
"""Ensure a D-Bus session is available for dconf operations."""
dbus_address = os.getenv("DBUS_SESSION_BUS_ADDRESS")
if not dbus_address:
result = subprocess.run(
["dbus-daemon", "--fork", "--session", "--print-address"],
capture_output=True,
text=True
)
dbus_address = result.stdout.strip()
os.environ["DBUS_SESSION_BUS_ADDRESS"] = dbus_address
def _get_last_login_hours_ago(self):
"""
Get the number of hours since the user's last login.
Returns:
int: Hours since last login, or 0 if error or no login found
"""
logdata = dict()
logdata['target_user'] = self.target_user
try:
output = subprocess.check_output(
["last", "-n", "1", self.target_user],
env={'LANG':'C'},
text=True
).split("\n")[0]
parts = output.split()
if len(parts) < 7:
return 0
# Parse login time
login_str = f"{parts[4]} {parts[5]} {parts[6]}"
last_login_time = datetime.strptime(login_str, "%b %d %H:%M")
last_login_time = last_login_time.replace(year=datetime.now().year)
# Calculate hours difference
time_diff = datetime.now() - last_login_time
hours_ago = int(time_diff.total_seconds() // 3600)
logdata['hours_ago'] = hours_ago
log('D224', logdata)
return hours_ago
except Exception as exc:
logdata['exc'] = exc
log('W33', logdata)
return 0
def _get_changed_password_hours_ago(self):
"""
Calculate how many hours ago the password was last changed.
Returns:
int: Hours since password was last changed, or 0 if error
"""
logdata = dict()
logdata['target_user'] = self.target_user
try:
diff_time = self.current_time_int - self.pass_last_mod_int
hours_difference = diff_time // 3.6e10
hours_ago = int(hours_difference)
logdata['hours_ago'] = hours_ago
log('D225', logdata)
return hours_ago
except Exception as exc:
logdata['exc'] = exc
log('W34', logdata)
return 0
def _generate_password(self):
"""
Generate a secure password based on policy settings.
Returns:
str: Generated password meeting complexity requirements
"""
# Get password length from config
password_length = self.config.get('PasswordLength', 14)
if not isinstance(password_length, int) or not (8 <= password_length <= 64):
password_length = 14
# Get password complexity from config
password_complexity = self.config.get('PasswordComplexity', 4)
if not isinstance(password_complexity, int) or not (1 <= password_complexity <= 4):
password_complexity = 4
# Get character set based on complexity
char_set = self._PASSWORD_COMPLEXITY.get(password_complexity, self._PASSWORD_COMPLEXITY[4])
# Generate initial password
password = ''.join(secrets.choice(char_set) for _ in range(password_length))
# Ensure password meets complexity requirements
if password_complexity >= 3 and not any(c.isdigit() for c in password):
# Add a digit if required but missing
digit = secrets.choice(string.digits)
position = secrets.randbelow(len(password))
password = password[:position] + digit + password[position:]
if password_complexity == 4 and not any(c in string.punctuation for c in password):
# Add a special character if required but missing
special_char = secrets.choice(string.punctuation)
position = secrets.randbelow(len(password))
password = password[:position] + special_char + password[position:]
return password
def _get_json_password_data(self, password):
"""
Format password information as JSON.
Args:
password: The password
Returns:
str: JSON formatted password information
"""
return f'{{"n":"{self.target_user}","t":"{self.expiration_date_int}","p":"{password}"}}'
def _create_password_blob(self, password):
"""
Create encrypted password blob for LDAP storage.
Args:
password: Password to encrypt
Returns:
bytes: Encrypted password blob
"""
# Create JSON data and encode as UTF-16LE with null terminator
json_data = self._get_json_password_data(password)
password_bytes = json_data.encode("utf-16-le") + b"\x00\x00"
# Save and change loglevel
logger = logging.getLogger()
old_level = logger.level
logger.setLevel(logging.ERROR)
# Encrypt the password
dpapi_blob = dpapi_ng.ncrypt_protect_secret(
password_bytes,
self.encryption_principal,
auth_protocol='kerberos'
)
# Restoreloglevel
logger.setLevel(old_level)
# Create full blob with metadata
return self._add_blob_metadata(dpapi_blob)
def _add_blob_metadata(self, dpapi_blob):
"""
Add metadata to the encrypted password blob.
Args:
dpapi_blob: Encrypted password blob
Returns:
bytes: Complete blob with metadata
"""
# Convert timestamp to correct format
left, right = struct.unpack('<LL', struct.pack('Q', self.current_time_int))
packed = struct.pack('<LL', right, left)
# Add blob length and padding
prefix = packed + struct.pack('<i', len(dpapi_blob)) + b'\x00\x00\x00\x00'
# Combine metadata and encrypted blob
return prefix + dpapi_blob
def _change_user_password(self, new_password):
"""
Change the password for the target user.
Args:
new_password: New password to set
Returns:
bool: True if password was changed successfully, False otherwise
"""
logdata = dict()
logdata['target_use'] = self.target_user
try:
# Use chpasswd to change the password
process = subprocess.Popen(
["chpasswd"],
stdin=subprocess.PIPE,
text=True
)
process.communicate(f"{self.target_user}:{new_password}")
# Record the time of change
self._write_dconf_pass_last_mod()
log('D221', logdata)
return True
except Exception as exc:
logdata['exc'] = exc
log('W27', logdata)
return False
def _update_ldap_password(self, encrypted_blob):
"""
Update the encrypted password and expiration time in LDAP.
Args:
encrypted_blob: Encrypted password blob
Returns:
bool: True if LDAP was updated successfully, False otherwise
"""
logdata = dict()
logdata['computer_dn'] = self.computer_dn
try:
# Create LDAP modification message
mod_msg = ldb.Message()
mod_msg.dn = self.computer_dn
# Update password blob
mod_msg[self._ATTR_ENCRYPTED_PASSWORD] = ldb.MessageElement(
encrypted_blob,
ldb.FLAG_MOD_REPLACE,
self._ATTR_ENCRYPTED_PASSWORD
)
# Update expiration time
mod_msg[self._ATTR_PASSWORD_EXPIRATION_TIME] = ldb.MessageElement(
str(self.expiration_date_int),
ldb.FLAG_MOD_REPLACE,
self._ATTR_PASSWORD_EXPIRATION_TIME
)
# Perform the LDAP modification
self.samdb.modify(mod_msg)
log('D226', logdata)
return True
except Exception as exc:
logdata['exc'] = exc
log('E75', logdata)
return False
def _should_update_password(self):
"""
Determine if the password should be updated based on policy.
Returns:
tuple: (bool: update needed, bool: perform post-action)
"""
# Check if password has expired
if not self._is_password_expired():
# Password not expired, check if post-login action needed
return self._check_post_login_action()
# Password has expired, update needed
return True, False
def _is_password_expired(self):
"""
Check if the password has expired according to policy.
Returns:
bool: True if password has expired, False otherwise
"""
# Case 1: No expiration protection, check LDAP attribute
if not self.password_expiration_protection:
if self.expiration_time_attr > self.current_time_int:
return False
# Case 2: With expiration protection, check both policy and LDAP
elif self.password_expiration_protection:
policy_expiry = self.pass_last_mod_int + (self.password_age_days * int(self._DAY_FLOAT))
if policy_expiry > self.current_time_int and self.expiration_time_attr > self.current_time_int:
return False
return True
def _check_post_login_action(self):
"""
Check if a post-login password change action should be performed.
Returns:
tuple: (bool: update needed, bool: perform post-action)
"""
# Check if password was changed after last login
if self._get_changed_password_hours_ago() < self.last_login_hours_ago:
return False, False
# Check if enough time has passed since login
if self.last_login_hours_ago < self.post_authentication_reset_delay:
return False, False
# Check if action is configured
if self.post_authentication_actions == self._ACTION_NONE:
return False, False
# Update needed, determine if post-action required
return True, self.post_authentication_actions > self._ACTION_CHANGE_PASSWORD
def _perform_post_action(self):
"""
Perform post-password-change action based on configuration.
"""
if self.post_authentication_actions == self._ACTION_TERMINATE_SESSIONS:
self._terminate_user_sessions()
elif self.post_authentication_actions == self._ACTION_REBOOT:
log('D220')
subprocess.run(["reboot"])
def _terminate_user_sessions(self):
"""
Terminates all processes associated with the active sessions of the target user.
"""
# Get active sessions for the target user
user_sessions = [user for user in psutil.users() if user.name == self.target_user]
logdata = dict()
logdata['target_user'] = self.target_user
if not user_sessions:
log('D227', logdata)
return
# Terminate each session
for session in user_sessions:
try:
# Get the process and terminate it
proc = psutil.Process(session.pid)
proc.kill() # Send SIGKILL
logdata['pid'] = session.pid
log('D228')
except (psutil.NoSuchProcess, psutil.AccessDenied) as exc:
logdata['pid'] = session.pid
logdata['exc'] = exc
log('W35', logdata)
def update_laps_password(self):
"""
Update the LAPS password if needed based on policy.
Checks expiration and login times to determine if update is needed.
"""
# Check if password update is needed
update_needed, perform_post_action = self._should_update_password()
if not update_needed:
log('D229')
return False
# Generate new password
password = self._generate_password()
# Create encrypted password blob
encrypted_blob = self._create_password_blob(password)
# Update password in LDAP
ldap_success = self._update_ldap_password(encrypted_blob)
if not ldap_success:
return False
# Change local user password
local_success = self._change_user_password(password)
if not local_success:
log('E76')
return False
log('D230')
# Perform post-action if configured
if perform_post_action:
self._perform_post_action()
def apply(self):
"""
Main entry point for the LAPS applier.
"""
if self.__module_enabled:
log('D218')
self.update_laps_password()
else:
log('D219')

View File

@ -0,0 +1,58 @@
#
# GPOA - GPO Applier for Linux
#
# Copyright (C) 2019-2022 BaseALT Ltd.
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
from .appliers.netshare import Networkshare
from .applier_frontend import (
applier_frontend
, check_enabled
)
from util.logging import log
class networkshare_applier(applier_frontend):
__module_name = 'NetworksharesApplier'
__module_name_user = 'NetworksharesApplierUser'
__module_experimental = True
__module_enabled = False
def __init__(self, storage, sid, username = None):
self.storage = storage
self.sid = sid
self.username = username
self.networkshare_info = self.storage.get_networkshare(self.sid)
self.__module_enabled = check_enabled(self.storage, self.__module_name, self.__module_experimental)
self.__module_enabled_user = check_enabled(self.storage, self.__module_name_user, self.__module_experimental)
def run(self):
for networkshare in self.networkshare_info:
Networkshare(networkshare, self.username)
def apply(self):
if self.__module_enabled:
log('D187')
self.run()
else:
log('D181')
def admin_context_apply(self):
pass
def user_context_apply(self):
if self.__module_enabled_user:
log('D188')
self.run()
else:
log('D189')

View File

@ -17,7 +17,7 @@
# along with this program. If not, see <http://www.gnu.org/licenses/>. # along with this program. If not, see <http://www.gnu.org/licenses/>.
import logging
import subprocess import subprocess
from enum import Enum from enum import Enum
@ -26,7 +26,7 @@ from .applier_frontend import (
applier_frontend applier_frontend
, check_enabled , check_enabled
) )
from util.logging import slogm, log from util.logging import log
class NTPServerType(Enum): class NTPServerType(Enum):
@ -117,30 +117,33 @@ class ntp_applier(applier_frontend):
ntp_server_enabled = self.storage.get_hklm_entry(self.ntp_server_enabled) ntp_server_enabled = self.storage.get_hklm_entry(self.ntp_server_enabled)
ntp_client_enabled = self.storage.get_hklm_entry(self.ntp_client_enabled) ntp_client_enabled = self.storage.get_hklm_entry(self.ntp_client_enabled)
if NTPServerType.NTP.value != server_type.data: if server_type and server_type.data:
logdata = dict() if NTPServerType.NTP.value != server_type.data:
logdata['server_type'] = server_type logdata = dict()
log('W10', logdata) logdata['server_type'] = server_type
else: log('W10', logdata)
log('D126')
if '1' == ntp_server_enabled.data:
log('D127')
self._start_chrony_client(server_address)
self._chrony_as_server()
elif '0' == ntp_server_enabled.data:
log('D128')
self._chrony_as_client()
else: else:
log('D129') log('D126')
if ntp_server_enabled:
if '1' == ntp_server_enabled.data and server_address:
log('D127')
self._start_chrony_client(server_address)
self._chrony_as_server()
elif '0' == ntp_server_enabled.data:
log('D128')
self._chrony_as_client()
else:
log('D129')
if '1' == ntp_client_enabled.data: elif ntp_client_enabled:
log('D130') if '1' == ntp_client_enabled.data:
self._start_chrony_client() log('D130')
elif '0' == ntp_client_enabled.data: self._start_chrony_client()
log('D131') elif '0' == ntp_client_enabled.data:
self._stop_chrony_client() log('D131')
else: self._stop_chrony_client()
log('D132') else:
log('D132')
def apply(self): def apply(self):
if self.__module_enabled: if self.__module_enabled:

View File

@ -1,7 +1,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2020 BaseALT Ltd. # Copyright (C) 2019-2024 BaseALT Ltd.
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -18,12 +18,7 @@
import logging import logging
import subprocess import subprocess
from util.logging import slogm, log from util.logging import log
from util.rpm import (
update
, install_rpm
, remove_rpm
)
from .applier_frontend import ( from .applier_frontend import (
applier_frontend applier_frontend
@ -62,8 +57,7 @@ class package_applier(applier_frontend):
) )
def run(self): def run(self):
for flag in self.sync_packages_setting: for flag in self.sync_packages_setting:
if flag.data: self.flagSync = bool(flag.data)
self.flagSync = bool(int(flag.data))
if 0 < self.install_packages_setting.count() or 0 < self.remove_packages_setting.count(): if 0 < self.install_packages_setting.count() or 0 < self.remove_packages_setting.count():
if self.flagSync: if self.flagSync:
@ -104,8 +98,8 @@ class package_applier_user(applier_frontend):
self.username = username self.username = username
self.fulcmd = list() self.fulcmd = list()
self.fulcmd.append('/usr/libexec/gpupdate/pkcon_runner') self.fulcmd.append('/usr/libexec/gpupdate/pkcon_runner')
self.fulcmd.append('--sid') self.fulcmd.append('--user')
self.fulcmd.append(self.sid) self.fulcmd.append(self.username)
self.fulcmd.append('--loglevel') self.fulcmd.append('--loglevel')
logger = logging.getLogger() logger = logging.getLogger()
self.fulcmd.append(str(logger.level)) self.fulcmd.append(str(logger.level))
@ -119,7 +113,7 @@ class package_applier_user(applier_frontend):
self.sync_packages_setting = self.storage.filter_hkcu_entries(self.sid, sync_branch) self.sync_packages_setting = self.storage.filter_hkcu_entries(self.sid, sync_branch)
self.flagSync = False self.flagSync = False
self.__module_enabled = check_enabled(self.storage, self.__module_name, self.__module_enabled) self.__module_enabled = check_enabled(self.storage, self.__module_name, self.__module_experimental)
def user_context_apply(self): def user_context_apply(self):
''' '''

View File

@ -19,36 +19,74 @@
from .applier_frontend import ( from .applier_frontend import (
applier_frontend applier_frontend
, check_enabled , check_enabled
, check_windows_mapping_enabled
) )
from .appliers.polkit import polkit from .appliers.polkit import polkit
from util.logging import slogm, log from util.logging import log
import logging
class polkit_applier(applier_frontend): class polkit_applier(applier_frontend):
__module_name = 'PolkitApplier' __module_name = 'PolkitApplier'
__module_experimental = False __module_experimental = False
__module_enabled = True __module_enabled = True
__deny_all = 'Software\\Policies\\Microsoft\\Windows\\RemovableStorageDevices\\Deny_All' __deny_all_win = 'Software\\Policies\\Microsoft\\Windows\\RemovableStorageDevices\\Deny_All'
__registry_branch = 'Software\\BaseALT\\Policies\\Polkit\\'
__registry_locks_branch = 'Software\\BaseALT\\Policies\\PolkitLocks\\'
__polkit_map = { __polkit_map = {
__deny_all: ['49-gpoa_disk_permissions', { 'Deny_All': 0 }] __deny_all_win: ['49-gpoa_disk_permissions', { 'Deny_All': 0 }],
__registry_branch : ['49-alt_group_policy_permissions', {}],
__registry_locks_branch : ['47-alt_group_policy_permissions', {}]
} }
def __init__(self, storage): def __init__(self, storage):
self.storage = storage self.storage = storage
deny_all = storage.filter_hklm_entries(self.__deny_all).first() deny_all_win = None
if check_windows_mapping_enabled(self.storage):
deny_all_win = storage.filter_hklm_entries(self.__deny_all_win).first()
# Deny_All hook: initialize defaults # Deny_All hook: initialize defaults
template_file = self.__polkit_map[self.__deny_all][0] polkit_filter = '{}%'.format(self.__registry_branch)
template_vars = self.__polkit_map[self.__deny_all][1] polkit_locks_filter = '{}%'.format(self.__registry_locks_branch)
if deny_all: self.polkit_keys = self.storage.filter_hklm_entries(polkit_filter)
self.polkit_locks = self.storage.filter_hklm_entries(polkit_locks_filter)
template_file = self.__polkit_map[self.__deny_all_win][0]
template_vars = self.__polkit_map[self.__deny_all_win][1]
template_file_all = self.__polkit_map[self.__registry_branch][0]
template_vars_all = self.__polkit_map[self.__registry_branch][1]
template_file_all_lock = self.__polkit_map[self.__registry_locks_branch][0]
template_vars_all_lock = self.__polkit_map[self.__registry_locks_branch][1]
locks = list()
for lock in self.polkit_locks:
if bool(int(lock.data)):
locks.append(lock.valuename)
dict_lists_rules = {'No': [[], []],
'Yes': [[], []],
'Auth_self' : [[], []],
'Auth_admin': [[], []],
'Auth_self_keep': [[], []],
'Auth_admin_keep': [[], []]}
check_and_add_to_list = (lambda it, act: dict_lists_rules[act][0].append(it.valuename)
if it.valuename not in locks
else dict_lists_rules[act][1].append(it.valuename))
for it_data in self.polkit_keys:
check_and_add_to_list(it_data, it_data.data)
for key, item in dict_lists_rules.items():
self.__polkit_map[self.__registry_branch][1][key] = item[0]
self.__polkit_map[self.__registry_locks_branch][1][key] = item[1]
if deny_all_win:
logdata = dict() logdata = dict()
logdata['Deny_All'] = deny_all.data logdata['Deny_All_win'] = deny_all_win.data
log('D69', logdata) log('D69', logdata)
self.__polkit_map[self.__deny_all][1]['Deny_All'] = deny_all.data self.__polkit_map[self.__deny_all_win][1]['Deny_All'] = deny_all_win.data
else: else:
log('D71') log('D71')
self.policies = [] self.policies = []
self.policies.append(polkit(template_file, template_vars)) self.policies.append(polkit(template_file, template_vars))
self.policies.append(polkit(template_file_all, template_vars_all))
self.policies.append(polkit(template_file_all_lock, template_vars_all_lock))
self.__module_enabled = check_enabled( self.__module_enabled = check_enabled(
self.storage self.storage
, self.__module_name , self.__module_name
@ -70,31 +108,55 @@ class polkit_applier_user(applier_frontend):
__module_name = 'PolkitApplierUser' __module_name = 'PolkitApplierUser'
__module_experimental = False __module_experimental = False
__module_enabled = True __module_enabled = True
__deny_all = 'Software\\Policies\\Microsoft\\Windows\\RemovableStorageDevices\\Deny_All' __deny_all_win = 'Software\\Policies\\Microsoft\\Windows\\RemovableStorageDevices\\Deny_All'
__registry_branch = 'Software\\BaseALT\\Policies\\Polkit\\'
__polkit_map = { __polkit_map = {
__deny_all: ['48-gpoa_disk_permissions_user', { 'Deny_All': 0, 'User': '' }] __deny_all_win: ['48-gpoa_disk_permissions_user', { 'Deny_All': 0, 'User': '' }],
__registry_branch : ['48-alt_group_policy_permissions_user', {'User': ''}]
} }
def __init__(self, storage, sid, username): def __init__(self, storage, sid, username):
self.storage = storage self.storage = storage
self.sid = sid self.sid = sid
self.username = username self.username = username
deny_all_win = None
deny_all = storage.filter_hkcu_entries(self.sid, self.__deny_all).first() if check_windows_mapping_enabled(self.storage):
deny_all_win = storage.filter_hkcu_entries(self.sid, self.__deny_all_win).first()
polkit_filter = '{}%'.format(self.__registry_branch)
self.polkit_keys = self.storage.filter_hkcu_entries(self.sid, polkit_filter)
# Deny_All hook: initialize defaults # Deny_All hook: initialize defaults
template_file = self.__polkit_map[self.__deny_all][0] template_file = self.__polkit_map[self.__deny_all_win][0]
template_vars = self.__polkit_map[self.__deny_all][1] template_vars = self.__polkit_map[self.__deny_all_win][1]
if deny_all: template_file_all = self.__polkit_map[self.__registry_branch][0]
template_vars_all = self.__polkit_map[self.__registry_branch][1]
dict_lists_rules = {'No': [],
'Yes': [],
'Auth_self': [],
'Auth_admin': [],
'Auth_self_keep': [],
'Auth_admin_keep': []}
for it_data in self.polkit_keys:
dict_lists_rules[it_data.data].append(it_data.valuename)
self.__polkit_map[self.__registry_branch][1]['User'] = self.username
for key, item in dict_lists_rules.items():
self.__polkit_map[self.__registry_branch][1][key] = item
if deny_all_win:
logdata = dict() logdata = dict()
logdata['user'] = self.username logdata['user'] = self.username
logdata['Deny_All'] = deny_all.data logdata['Deny_All_win'] = deny_all_win.data
log('D70', logdata) log('D70', logdata)
self.__polkit_map[self.__deny_all][1]['Deny_All'] = deny_all.data self.__polkit_map[self.__deny_all_win][1]['Deny_All'] = deny_all_win.data
self.__polkit_map[self.__deny_all][1]['User'] = self.username self.__polkit_map[self.__deny_all_win][1]['User'] = self.username
else: else:
log('D72') log('D72')
self.policies = [] self.policies = []
self.policies.append(polkit(template_file, template_vars, self.username)) self.policies.append(polkit(template_file, template_vars, self.username))
self.policies.append(polkit(template_file_all, template_vars_all, self.username))
self.__module_enabled = check_enabled( self.__module_enabled = check_enabled(
self.storage self.storage
, self.__module_name , self.__module_name

View File

@ -19,9 +19,7 @@
import os import os
import shutil import shutil
from pathlib import Path from pathlib import Path
import pysss_nss_idmap
from django.template import base
from util.logging import log from util.logging import log
from .appliers.folder import remove_dir_tree from .appliers.folder import remove_dir_tree
from .applier_frontend import ( from .applier_frontend import (
@ -97,7 +95,6 @@ class scripts_applier_user(applier_frontend):
, self.__module_name , self.__module_name
, self.__module_experimental , self.__module_experimental
) )
self.filling_cache()
def cleaning_cache(self): def cleaning_cache(self):
log('D161') log('D161')
@ -145,15 +142,17 @@ def install_script(storage_script_entry, script_dir, access_permissions):
''' '''
dir_cr = Path(script_dir) dir_cr = Path(script_dir)
dir_cr.mkdir(parents=True, exist_ok=True) dir_cr.mkdir(parents=True, exist_ok=True)
script_name = str(int(storage_script_entry.number)).zfill(5) + '_' + os.path.basename(storage_script_entry.path) if storage_script_entry.number is None:
return
script_name = str(storage_script_entry.number).zfill(5) + '_' + os.path.basename(storage_script_entry.path)
script_file = os.path.join(script_dir, script_name) script_file = os.path.join(script_dir, script_name)
shutil.copyfile(storage_script_entry.path, script_file) shutil.copyfile(storage_script_entry.path, script_file)
os.chmod(script_file, int(access_permissions, base = 8)) os.chmod(script_file, int(access_permissions, base = 8))
if storage_script_entry.arg: if storage_script_entry.args:
dir_path = script_dir + '/' + script_name + '.arg' dir_path = script_dir + '/' + script_name + '.arg'
dir_arg = Path(dir_path) dir_arg = Path(dir_path)
dir_arg.mkdir(parents=True, exist_ok=True) dir_arg.mkdir(parents=True, exist_ok=True)
file_arg = open(dir_path + '/arg', 'w') file_arg = open(dir_path + '/arg', 'w')
file_arg.write(storage_script_entry.arg) file_arg.write(storage_script_entry.args)
file_arg.close() file_arg.close()

View File

@ -1,7 +1,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2020 BaseALT Ltd. # Copyright (C) 2019-2024 BaseALT Ltd.
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -16,30 +16,31 @@
# You should have received a copy of the GNU General Public License # You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>. # along with this program. If not, see <http://www.gnu.org/licenses/>.
import logging
import subprocess import subprocess
from .applier_frontend import ( from .applier_frontend import (
applier_frontend applier_frontend
, check_enabled , check_enabled
) )
from gpt.shortcuts import json2sc
from util.windows import expand_windows_var from util.windows import expand_windows_var
from util.logging import slogm, log from util.logging import log
from util.util import ( from util.util import (
get_homedir, get_homedir,
homedir_exists homedir_exists,
string_to_literal_eval
) )
from gpt.shortcuts import shortcut, get_ttype
def storage_get_shortcuts(storage, sid, username=None): def storage_get_shortcuts(storage, sid, username=None, shortcuts_machine=None):
''' '''
Query storage for shortcuts' rows for specified SID. Query storage for shortcuts' rows for specified SID.
''' '''
shortcut_objs = storage.get_shortcuts(sid) shortcut_objs = storage.get_shortcuts(sid)
shortcuts = list() shortcuts = list()
if username and shortcuts_machine:
shortcut_objs += shortcuts_machine
for sc_obj in shortcut_objs: for sc in shortcut_objs:
sc = json2sc(sc_obj.shortcut)
if username: if username:
sc.set_expanded_path(expand_windows_var(sc.path, username)) sc.set_expanded_path(expand_windows_var(sc.path, username))
shortcuts.append(sc) shortcuts.append(sc)
@ -137,14 +138,46 @@ class shortcut_applier_user(applier_frontend):
__module_name = 'ShortcutsApplierUser' __module_name = 'ShortcutsApplierUser'
__module_experimental = False __module_experimental = False
__module_enabled = True __module_enabled = True
__REGISTRY_PATH_SHORTCATSMERGE= '/Software/BaseALT/Policies/GPUpdate/ShortcutsMerge'
__DCONF_REGISTRY_PATH_PREFERENCES_MACHINE = 'Software/BaseALT/Policies/Preferences/Machine'
def __init__(self, storage, sid, username): def __init__(self, storage, sid, username):
self.storage = storage self.storage = storage
self.sid = sid self.sid = sid
self.username = username self.username = username
self.__module_enabled = check_enabled(self.storage, self.__module_name, self.__module_experimental)
def get_machine_shortcuts(self):
result = list()
try:
storage_machine_dict = self.storage.get_dictionary_from_dconf_file_db()
machine_shortcuts = storage_machine_dict.get(
self.__DCONF_REGISTRY_PATH_PREFERENCES_MACHINE, dict()).get('Shortcuts')
shortcut_objs = string_to_literal_eval(machine_shortcuts)
for obj in shortcut_objs:
shortcut_machine =shortcut(
obj.get('dest'),
obj.get('path'),
obj.get('arguments'),
obj.get('name'),
obj.get('action'),
get_ttype(obj.get('target_type')))
shortcut_machine.set_usercontext(1)
result.append(shortcut_machine)
except:
return None
return result
def check_enabled_shortcuts_merge(self):
return self.storage.get_key_value(self.__REGISTRY_PATH_SHORTCATSMERGE)
def run(self, in_usercontext): def run(self, in_usercontext):
shortcuts = storage_get_shortcuts(self.storage, self.sid, self.username) shortcuts_machine = None
if self.check_enabled_shortcuts_merge():
shortcuts_machine = self.get_machine_shortcuts()
shortcuts = storage_get_shortcuts(self.storage, self.sid, self.username, shortcuts_machine)
if shortcuts: if shortcuts:
for sc in shortcuts: for sc in shortcuts:

View File

@ -1,7 +1,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2020 BaseALT Ltd. # Copyright (C) 2019-2024 BaseALT Ltd.
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -21,19 +21,18 @@ from .applier_frontend import (
, check_enabled , check_enabled
) )
from .appliers.systemd import systemd_unit from .appliers.systemd import systemd_unit
from util.logging import slogm, log from util.logging import log
import logging
class systemd_applier(applier_frontend): class systemd_applier(applier_frontend):
__module_name = 'SystemdApplier' __module_name = 'SystemdApplier'
__module_experimental = False __module_experimental = False
__module_enabled = True __module_enabled = True
__registry_branch = 'Software\\BaseALT\\Policies\\SystemdUnits' __registry_branch = 'Software/BaseALT/Policies/SystemdUnits'
def __init__(self, storage): def __init__(self, storage):
self.storage = storage self.storage = storage
self.systemd_unit_settings = self.storage.filter_hklm_entries('Software\\BaseALT\\Policies\\SystemdUnits%') self.systemd_unit_settings = self.storage.filter_hklm_entries(self.__registry_branch)
self.units = [] self.units = []
self.__module_enabled = check_enabled( self.__module_enabled = check_enabled(
self.storage self.storage
@ -43,15 +42,14 @@ class systemd_applier(applier_frontend):
def run(self): def run(self):
for setting in self.systemd_unit_settings: for setting in self.systemd_unit_settings:
valuename = setting.hive_key.rpartition('\\')[2]
try: try:
self.units.append(systemd_unit(valuename, int(setting.data))) self.units.append(systemd_unit(setting.valuename, int(setting.data)))
logdata = dict() logdata = dict()
logdata['unit'] = format(valuename) logdata['unit'] = format(setting.valuename)
log('I4', logdata) log('I4', logdata)
except Exception as exc: except Exception as exc:
logdata = dict() logdata = dict()
logdata['unit'] = format(valuename) logdata['unit'] = format(setting.valuename)
logdata['exc'] = exc logdata['exc'] = exc
log('I5', logdata) log('I5', logdata)
for unit in self.units: for unit in self.units:
@ -76,7 +74,7 @@ class systemd_applier_user(applier_frontend):
__module_name = 'SystemdApplierUser' __module_name = 'SystemdApplierUser'
__module_experimental = False __module_experimental = False
__module_enabled = True __module_enabled = True
__registry_branch = 'Software\\BaseALT\\Policies\\SystemdUnits' __registry_branch = 'Software/BaseALT/Policies/SystemdUnits'
def __init__(self, storage, sid, username): def __init__(self, storage, sid, username):
self.storage = storage self.storage = storage

View File

@ -0,0 +1,70 @@
#
# GPOA - GPO Applier for Linux
#
# Copyright (C) 2024 BaseALT Ltd.
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
import json
import os
from .applier_frontend import (
applier_frontend
, check_enabled
)
from util.logging import log
from util.util import is_machine_name
from .firefox_applier import create_dict
class thunderbird_applier(applier_frontend):
__module_name = 'ThunderbirdApplier'
__module_experimental = False
__module_enabled = True
__registry_branch = 'Software/Policies/Mozilla/Thunderbird'
__thunderbird_policies = '/etc/thunderbird/policies'
def __init__(self, storage, sid, username):
self.storage = storage
self.sid = sid
self.username = username
self._is_machine_name = is_machine_name(self.username)
self.policies = dict()
self.policies_json = dict({ 'policies': self.policies })
self.thunderbird_keys = self.storage.filter_hklm_entries(self.__registry_branch)
self.policies_gen = dict()
self.__module_enabled = check_enabled(
self.storage
, self.__module_name
, self.__module_experimental
)
def machine_apply(self):
'''
Write policies.json to Thunderbird.
'''
self.policies_json = create_dict(self.thunderbird_keys, self.__registry_branch)
destfile = os.path.join(self.__thunderbird_policies, 'policies.json')
os.makedirs(self.__thunderbird_policies, exist_ok=True)
with open(destfile, 'w') as f:
json.dump(self.policies_json, f)
logdata = dict()
logdata['destfile'] = destfile
log('D212', logdata)
def apply(self):
if self.__module_enabled:
log('D213')
self.machine_apply()
else:
log('D214')

View File

@ -0,0 +1,197 @@
#
# GPOA - GPO Applier for Linux
#
# Copyright (C) 2019-2024 BaseALT Ltd.
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
from .applier_frontend import (
applier_frontend
, check_enabled
)
import json
import os
from util.logging import log
from util.util import is_machine_name, string_to_literal_eval
class yandex_browser_applier(applier_frontend):
__module_name = 'YandexBrowserApplier'
__module_enabled = True
__module_experimental = False
__registry_branch = 'Software/Policies/YandexBrowser'
__managed_policies_path = '/etc/opt/yandex/browser/policies/managed'
__recommended_policies_path = '/etc/opt/yandex/browser/policies/recommended'
def __init__(self, storage, sid, username):
self.storage = storage
self.sid = sid
self.username = username
self._is_machine_name = is_machine_name(self.username)
self.yandex_keys = self.storage.filter_hklm_entries(self.__registry_branch)
self.policies_json = dict()
self.__module_enabled = check_enabled(
self.storage
, self.__module_name
, self.__module_experimental
)
def machine_apply(self):
'''
Apply machine settings.
'''
destfile = os.path.join(self.__managed_policies_path, 'policies.json')
try:
recommended__json = self.policies_json.pop('Recommended')
except:
recommended__json = {}
#Replacing all nested dictionaries with a list
dict_item_to_list = (
lambda target_dict :
{key:[*val.values()] if type(val) == dict else string_to_literal_eval(val) for key,val in target_dict.items()}
)
os.makedirs(self.__managed_policies_path, exist_ok=True)
with open(destfile, 'w') as f:
json.dump(dict_item_to_list(self.policies_json), f)
logdata = dict()
logdata['destfile'] = destfile
log('D185', logdata)
destfilerec = os.path.join(self.__recommended_policies_path, 'policies.json')
os.makedirs(self.__recommended_policies_path, exist_ok=True)
with open(destfilerec, 'w') as f:
json.dump(dict_item_to_list(recommended__json), f)
logdata = dict()
logdata['destfilerec'] = destfilerec
log('D185', logdata)
def apply(self):
'''
All actual job done here.
'''
if self.__module_enabled:
log('D183')
self.create_dict(self.yandex_keys)
self.machine_apply()
else:
log('D184')
def get_valuename_typeint(self):
'''
List of keys resulting from parsing chrome.admx with parsing_chrom_admx_intvalues.py
'''
valuename_typeint = (['DefaultPageSaveSettings',
'DefaultUploadSetting',
'YandexAutoLaunchMode',
'DefaultClipboardSetting',
'DefaultFileSystemReadGuardSetting',
'DefaultFileSystemWriteGuardSetting',
'DefaultImagesSetting',
'DefaultJavaScriptJitSetting',
'DefaultJavaScriptSetting',
'DefaultLocalFontsSetting',
'DefaultPopupsSetting',
'DefaultSensorsSetting',
'DefaultSerialGuardSetting',
'DefaultWebBluetoothGuardSetting',
'DefaultWebHidGuardSetting',
'DefaultWebUsbGuardSetting',
'DefaultWindowManagementSetting',
'SafeSitesFilterBehavior',
'YandexUserFeedbackMode',
'TurboSettings',
'SidePanelMode',
'RestoreOnStartup',
'RestoreOnStartup_recommended',
'BrowserSwitcherParsingMode',
'DefaultNotificationsSetting',
'YandexPowerSavingMode',
'ChromeVariations',
'DeveloperToolsAvailability',
'DownloadRestrictions',
'NetworkPredictionOptions',
'DownloadRestrictions_recommended',
'NetworkPredictionOptions_recommended',
'DefaultCookiesSetting',
'DefaultGeolocationSetting',
'IncognitoModeAvailability',
'DefaultPrintingSettings',
'DefaultPluginsSetting',
'DefaultInsecureContentSetting',
'PasswordProtectionWarningTrigger',
'SafeBrowsingProtectionLevel',
'SafeBrowsingProtectionLevel_recommended',
'DiskCacheSize'])
return valuename_typeint
def get_boolean(self,data):
if data in ['0', 'false', None, 'none', 0]:
return False
if data in ['1', 'true', 1]:
return True
def get_parts(self, hivekeyname):
'''
Parse registry path string and leave key parameters
'''
parts = hivekeyname.replace(self.__registry_branch, '').split('/')
return parts
def create_dict(self, yandex_keys):
'''
Collect dictionaries from registry keys into a general dictionary
'''
counts = dict()
#getting the list of keys to read as an integer
valuename_typeint = self.get_valuename_typeint()
for it_data in yandex_keys:
branch = counts
try:
if type(it_data.data) is bytes:
it_data.data = it_data.data.decode(encoding='utf-16').replace('\x00','')
parts = self.get_parts(it_data.hive_key)
#creating a nested dictionary from elements
for part in parts[:-1]:
branch = branch.setdefault(part, {})
#dictionary key value initialization
if it_data.type == 4:
if it_data.valuename in valuename_typeint:
branch[parts[-1]] = int(it_data.data)
else:
branch[parts[-1]] = self.get_boolean(it_data.data)
else:
if it_data.data[0] == '[' and it_data.data[-1] == ']':
try:
branch[parts[-1]] = json.loads(str(it_data.data))
except:
branch[parts[-1]] = str(it_data.data).replace('\\', '/')
else:
branch[parts[-1]] = str(it_data.data).replace('\\', '/')
except Exception as exc:
logdata = dict()
logdata['Exception'] = exc
logdata['keyname'] = it_data.keyname
log('D178', logdata)
try:
self.policies_json = counts['']
except:
self.policies_json = {}

View File

@ -23,10 +23,11 @@ import signal
import gettext import gettext
import locale import locale
from backend import backend_factory from backend import backend_factory, save_dconf
from frontend.frontend_manager import frontend_manager, determine_username from frontend.frontend_manager import frontend_manager, determine_username
from plugin import plugin_manager from plugin import plugin_manager
from messages import message_with_code from messages import message_with_code
from storage import Dconf_registry
from util.util import get_machine_name from util.util import get_machine_name
from util.users import ( from util.users import (
@ -61,6 +62,9 @@ def parse_arguments():
arguments.add_argument('--list-backends', arguments.add_argument('--list-backends',
action='store_true', action='store_true',
help='Show list of available backends') help='Show list of available backends')
arguments.add_argument('--force',
action='store_true',
help='Force GPT download')
arguments.add_argument('--loglevel', arguments.add_argument('--loglevel',
type=int, type=int,
default=4, default=4,
@ -120,6 +124,7 @@ class gpoa_controller:
print('local') print('local')
print('samba') print('samba')
return return
Dconf_registry._force = self.__args.force
self.start_plugins() self.start_plugins()
self.start_backend() self.start_backend()
@ -149,6 +154,7 @@ class gpoa_controller:
back.retrieve_and_store() back.retrieve_and_store()
# Start frontend only on successful backend finish # Start frontend only on successful backend finish
self.start_frontend() self.start_frontend()
save_dconf(self.username, self.is_machine, nodomain)
except Exception as exc: except Exception as exc:
logdata = dict({'message': str(exc)}) logdata = dict({'message': str(exc)})
# In case we're handling "E3" - it means that # In case we're handling "E3" - it means that

View File

@ -19,7 +19,7 @@
import json import json
from base64 import b64decode from base64 import b64decode
from Crypto.Cipher import AES from Crypto.Cipher import AES
from .dynamic_attributes import DynamicAttributes
from util.xml import get_xml_root from util.xml import get_xml_root
def decrypt_pass(cpassword): def decrypt_pass(cpassword):
@ -67,6 +67,12 @@ def read_drives(drives_file):
drive_obj.set_pass(decrypt_pass(props.get('cpassword'))) drive_obj.set_pass(decrypt_pass(props.get('cpassword')))
drive_obj.set_dir(props.get('letter')) drive_obj.set_dir(props.get('letter'))
drive_obj.set_path(props.get('path')) drive_obj.set_path(props.get('path'))
drive_obj.set_action(props.get('action'))
drive_obj.set_thisDrive(props.get('thisDrive'))
drive_obj.set_allDrives(props.get('allDrives'))
drive_obj.set_label(props.get('label'))
drive_obj.set_persistent(props.get('persistent'))
drive_obj.set_useLetter(props.get('useLetter'))
drives.append(drive_obj) drives.append(drive_obj)
@ -87,12 +93,18 @@ def json2drive(json_str):
return drive_obj return drive_obj
class drivemap: class drivemap(DynamicAttributes):
def __init__(self): def __init__(self):
self.login = None self.login = None
self.password = None self.password = None
self.dir = None self.dir = None
self.path = None self.path = None
self.action = None
self.thisDrive = None
self.allDrives = None
self.label = None
self.persistent = None
self.useLetter = None
def set_login(self, username): def set_login(self, username):
self.login = username self.login = username
@ -110,6 +122,24 @@ class drivemap:
def set_path(self, path): def set_path(self, path):
self.path = path self.path = path
def set_action(self, action):
self.action = action
def set_thisDrive(self, thisDrive):
self.thisDrive = thisDrive
def set_allDrives(self, allDrives):
self.allDrives = allDrives
def set_label(self, label):
self.label = label
def set_persistent(self, persistent):
self.persistent = persistent
def set_useLetter(self, useLetter):
self.useLetter = useLetter
def to_json(self): def to_json(self):
drive = dict() drive = dict()
drive['login'] = self.login drive['login'] = self.login

View File

@ -0,0 +1,56 @@
#
# GPOA - GPO Applier for Linux
#
# Copyright (C) 2019-2024 BaseALT Ltd.
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
from enum import Enum
class DynamicAttributes:
def __init__(self, **kwargs):
self.policy_name = None
for key, value in kwargs.items():
self.__setattr__(key, value)
def __setattr__(self, key, value):
if isinstance(value, Enum):
value = str(value)
if isinstance(value, str):
for q in ["'", "\""]:
if any(q in ch for ch in value):
value = value.replace(q, "")
self.__dict__[key] = value
def items(self):
return self.__dict__.items()
def __iter__(self):
return iter(self.__dict__.items())
def get_original_value(self, key):
value = self.__dict__.get(key)
if isinstance(value, str):
value = value.replace("", "'")
return value
class RegistryKeyMetadata(DynamicAttributes):
def __init__(self, policy_name, type, is_list=None, mod_previous_value=None):
self.policy_name = policy_name
self.type = type
self.reloaded_with_policy_key = None
self.is_list = is_list
self.mod_previous_value = mod_previous_value
def __repr__(self):
return str(dict(self))

View File

@ -17,24 +17,8 @@
# along with this program. If not, see <http://www.gnu.org/licenses/>. # along with this program. If not, see <http://www.gnu.org/licenses/>.
from util.xml import get_xml_root from util.xml import get_xml_root
from .dynamic_attributes import DynamicAttributes
from enum import Enum
class FileAction(Enum):
CREATE = 'C'
REPLACE = 'R'
UPDATE = 'U'
DELETE = 'D'
def action_letter2enum(letter):
if letter in ['C', 'R', 'U', 'D']:
if letter == 'C': return FileAction.CREATE
if letter == 'R': return FileAction.REPLACE
if letter == 'U': return FileAction.UPDATE
if letter == 'D': return FileAction.DELETE
return FileAction.CREATE
def read_envvars(envvars_file): def read_envvars(envvars_file):
variables = list() variables = list()
@ -43,8 +27,8 @@ def read_envvars(envvars_file):
props = var.find('Properties') props = var.find('Properties')
name = props.get('name') name = props.get('name')
value = props.get('value') value = props.get('value')
var_obj = envvar(name, value) action = props.get('action', default='C')
var_obj.set_action(action_letter2enum(props.get('action', default='C'))) var_obj = envvar(name, value, action)
variables.append(var_obj) variables.append(var_obj)
@ -54,12 +38,9 @@ def merge_envvars(storage, sid, envvar_objects, policy_name):
for envv in envvar_objects: for envv in envvar_objects:
storage.add_envvar(sid, envv, policy_name) storage.add_envvar(sid, envv, policy_name)
class envvar: class envvar(DynamicAttributes):
def __init__(self, name, value): def __init__(self, name, value, action):
self.name = name self.name = name
self.value = value self.value = value
self.action = FileAction.CREATE
def set_action(self, action):
self.action = action self.action = action

View File

@ -17,6 +17,7 @@
# along with this program. If not, see <http://www.gnu.org/licenses/>. # along with this program. If not, see <http://www.gnu.org/licenses/>.
from util.xml import get_xml_root from util.xml import get_xml_root
from .dynamic_attributes import DynamicAttributes
def read_files(filesxml): def read_files(filesxml):
files = list() files = list()
@ -30,6 +31,7 @@ def read_files(filesxml):
fil_obj.set_archive(props.get('archive', default=None)) fil_obj.set_archive(props.get('archive', default=None))
fil_obj.set_hidden(props.get('hidden', default=None)) fil_obj.set_hidden(props.get('hidden', default=None))
fil_obj.set_suppress(props.get('suppress', default=None)) fil_obj.set_suppress(props.get('suppress', default=None))
fil_obj.set_executable(props.get('executable', default=None))
files.append(fil_obj) files.append(fil_obj)
return files return files
@ -38,7 +40,7 @@ def merge_files(storage, sid, file_objects, policy_name):
for fileobj in file_objects: for fileobj in file_objects:
storage.add_file(sid, fileobj, policy_name) storage.add_file(sid, fileobj, policy_name)
class fileentry: class fileentry(DynamicAttributes):
def __init__(self, fromPath): def __init__(self, fromPath):
self.fromPath = fromPath self.fromPath = fromPath
@ -54,3 +56,5 @@ class fileentry:
self.hidden = hidden self.hidden = hidden
def set_suppress(self, suppress): def set_suppress(self, suppress):
self.suppress = suppress self.suppress = suppress
def set_executable(self, executable):
self.executable = executable

View File

@ -1,7 +1,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2020 BaseALT Ltd. # Copyright (C) 2019-2024 BaseALT Ltd.
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -17,28 +17,11 @@
# along with this program. If not, see <http://www.gnu.org/licenses/>. # along with this program. If not, see <http://www.gnu.org/licenses/>.
from enum import Enum from .dynamic_attributes import DynamicAttributes
from util.xml import get_xml_root from util.xml import get_xml_root
class FileAction(Enum):
CREATE = 'C'
REPLACE = 'R'
UPDATE = 'U'
DELETE = 'D'
def action_letter2enum(letter):
if letter in ['C', 'R', 'U', 'D']:
if letter == 'C': return FileAction.CREATE
if letter == 'R': return FileAction.REPLACE
if letter == 'U': return FileAction.UPDATE
if letter == 'D': return FileAction.DELETE
return FileAction.CREATE
def action_enum2letter(enumitem): def action_enum2letter(enumitem):
return enumitem.value return enumitem.value
@ -61,14 +44,17 @@ def read_folders(folders_file):
for fld in get_xml_root(folders_file): for fld in get_xml_root(folders_file):
props = fld.find('Properties') props = fld.find('Properties')
fld_obj = folderentry(props.get('path')) path = props.get('path')
fld_obj.set_action(action_letter2enum(props.get('action', default='C'))) action = props.get('action', default='C')
fld_obj = folderentry(path, action)
fld_obj.set_delete_folder(folder_int2bool(props.get('deleteFolder', default=1))) fld_obj.set_delete_folder(folder_int2bool(props.get('deleteFolder', default=1)))
fld_obj.set_delete_sub_folders(folder_int2bool(props.get('deleteSubFolders', default=1))) fld_obj.set_delete_sub_folders(folder_int2bool(props.get('deleteSubFolders', default=1)))
fld_obj.set_delete_files(folder_int2bool(props.get('deleteFiles', default=1))) fld_obj.set_delete_files(folder_int2bool(props.get('deleteFiles', default=1)))
fld_obj.set_hidden_folder(folder_int2bool(props.get('hidden', default=0)))
folders.append(fld_obj) folders.append(fld_obj)
return folders return folders
def merge_folders(storage, sid, folder_objects, policy_name): def merge_folders(storage, sid, folder_objects, policy_name):
@ -76,13 +62,14 @@ def merge_folders(storage, sid, folder_objects, policy_name):
storage.add_folder(sid, folder, policy_name) storage.add_folder(sid, folder, policy_name)
class folderentry: class folderentry(DynamicAttributes):
def __init__(self, path): def __init__(self, path, action):
self.path = path self.path = path
self.action = FileAction.CREATE self.action = action
self.delete_folder = False self.delete_folder = False
self.delete_sub_folders = False self.delete_sub_folders = False
self.delete_files = False self.delete_files = False
self.hidden_folder = False
def set_action(self, action): def set_action(self, action):
self.action = action self.action = action
@ -96,3 +83,5 @@ class folderentry:
def set_delete_files(self, del_bool): def set_delete_files(self, del_bool):
self.delete_files = del_bool self.delete_files = del_bool
def set_hidden_folder(self, hid_bool):
self.hidden_folder = hid_bool

View File

@ -0,0 +1,48 @@
#
# GPOA - GPO Applier for Linux
#
# Copyright (C) 2019-2024 BaseALT Ltd.
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
from .dynamic_attributes import DynamicAttributes
class GpoInfoDconf(DynamicAttributes):
_counter = 0
def __init__(self, gpo) -> None:
GpoInfoDconf._counter += 1
self.counter = GpoInfoDconf._counter
self.display_name = None
self.name = None
self.version = None
self.link = None
self._fill_attributes(gpo)
def _fill_attributes(self, gpo):
try:
self.display_name = gpo.display_name
except:
self.display_name = "Unknown"
try:
self.name = gpo.name
except:
self.name = "Unknown"
try:
self.version = gpo.version
except:
self.version = "Unknown"
try:
self.link = gpo.link
except:
self.link = "Unknown"

View File

@ -1,7 +1,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2020 BaseALT Ltd. # Copyright (C) 2019-2024 BaseALT Ltd.
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -23,6 +23,7 @@ from enum import Enum, unique
from samba.gp_parse.gp_pol import GPPolParser from samba.gp_parse.gp_pol import GPPolParser
from storage import registry_factory from storage import registry_factory
from storage.dconf_registry import add_to_dict
from .polfile import ( from .polfile import (
read_polfile read_polfile
@ -68,6 +69,10 @@ from .scriptsini import (
read_scripts read_scripts
, merge_scripts , merge_scripts
) )
from .networkshares import (
read_networkshares
, merge_networkshares
)
import util import util
import util.preg import util.preg
from util.paths import ( from util.paths import (
@ -91,6 +96,7 @@ class FileType(Enum):
SERVICES = 'services.xml' SERVICES = 'services.xml'
PRINTERS = 'printers.xml' PRINTERS = 'printers.xml'
SCRIPTS = 'scripts.ini' SCRIPTS = 'scripts.ini'
NETWORKSHARES = 'networkshares.xml'
def get_preftype(path_to_file): def get_preftype(path_to_file):
fpath = Path(path_to_file) fpath = Path(path_to_file)
@ -117,6 +123,7 @@ def pref_parsers():
parsers[FileType.SERVICES] = read_services parsers[FileType.SERVICES] = read_services
parsers[FileType.PRINTERS] = read_printers parsers[FileType.PRINTERS] = read_printers
parsers[FileType.SCRIPTS] = read_scripts parsers[FileType.SCRIPTS] = read_scripts
parsers[FileType.NETWORKSHARES] = read_networkshares
return parsers return parsers
@ -138,6 +145,7 @@ def pref_mergers():
mergers[FileType.SERVICES] = merge_services mergers[FileType.SERVICES] = merge_services
mergers[FileType.PRINTERS] = merge_printers mergers[FileType.PRINTERS] = merge_printers
mergers[FileType.SCRIPTS] = merge_scripts mergers[FileType.SCRIPTS] = merge_scripts
mergers[FileType.NETWORKSHARES] = merge_networkshares
return mergers return mergers
@ -146,10 +154,14 @@ def get_merger(preference_type):
return mergers[preference_type] return mergers[preference_type]
class gpt: class gpt:
def __init__(self, gpt_path, sid): def __init__(self, gpt_path, sid, username='Machine', gpo_info=None):
add_to_dict(gpt_path, username, gpo_info)
self.path = gpt_path self.path = gpt_path
self.username = username
self.sid = sid self.sid = sid
self.storage = registry_factory('registry') self.storage = registry_factory()
self.storage._gpt_read_flag = True
self.gpo_info = gpo_info
self.name = '' self.name = ''
self.guid = self.path.rpartition('/')[2] self.guid = self.path.rpartition('/')[2]
if 'default' == self.guid: if 'default' == self.guid:
@ -171,6 +183,7 @@ class gpt:
, 'services' , 'services'
, 'scheduledtasks' , 'scheduledtasks'
, 'scripts' , 'scripts'
, 'networkshares'
] ]
self.settings = dict() self.settings = dict()
self.settings['machine'] = dict() self.settings['machine'] = dict()
@ -206,7 +219,7 @@ class gpt:
if self.settings['machine']['regpol']: if self.settings['machine']['regpol']:
mlogdata = dict({'polfile': self.settings['machine']['regpol']}) mlogdata = dict({'polfile': self.settings['machine']['regpol']})
log('D34', mlogdata) log('D34', mlogdata)
util.preg.merge_polfile(self.settings['machine']['regpol'], policy_name=self.name) util.preg.merge_polfile(self.settings['machine']['regpol'], policy_name=self.name, gpo_info=self.gpo_info)
# Merge machine preferences to registry if possible # Merge machine preferences to registry if possible
for preference_name, preference_path in self.settings['machine'].items(): for preference_name, preference_path in self.settings['machine'].items():
if preference_path: if preference_path:
@ -232,7 +245,11 @@ class gpt:
if self.settings['user']['regpol']: if self.settings['user']['regpol']:
mulogdata = dict({'polfile': self.settings['user']['regpol']}) mulogdata = dict({'polfile': self.settings['user']['regpol']})
log('D35', mulogdata) log('D35', mulogdata)
util.preg.merge_polfile(self.settings['user']['regpol'], sid=self.sid, policy_name=self.name) util.preg.merge_polfile(self.settings['user']['regpol'],
sid=self.sid,
policy_name=self.name,
username=self.username,
gpo_info=self.gpo_info)
# Merge user preferences to registry if possible # Merge user preferences to registry if possible
for preference_name, preference_path in self.settings['user'].items(): for preference_name, preference_path in self.settings['user'].items():
if preference_path: if preference_path:

View File

@ -1,7 +1,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2022 BaseALT Ltd. # Copyright (C) 2019-2024 BaseALT Ltd.
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -17,6 +17,7 @@
# along with this program. If not, see <http://www.gnu.org/licenses/>. # along with this program. If not, see <http://www.gnu.org/licenses/>.
from util.xml import get_xml_root from util.xml import get_xml_root
from .dynamic_attributes import DynamicAttributes
def read_inifiles(inifiles_file): def read_inifiles(inifiles_file):
inifiles = list() inifiles = list()
@ -27,7 +28,7 @@ def read_inifiles(inifiles_file):
ini_obj.set_section(prors.get('section', default=None)) ini_obj.set_section(prors.get('section', default=None))
ini_obj.set_property(prors.get('property', default=None)) ini_obj.set_property(prors.get('property', default=None))
ini_obj.set_value(prors.get('value', default=None)) ini_obj.set_value(prors.get('value', default=None))
ini_obj.set_action(prors.get('action')) ini_obj.set_action(prors.get('action', default='C'))
inifiles.append(ini_obj) inifiles.append(ini_obj)
@ -37,7 +38,7 @@ def merge_inifiles(storage, sid, inifile_objects, policy_name):
for iniobj in inifile_objects: for iniobj in inifile_objects:
storage.add_ini(sid, iniobj, policy_name) storage.add_ini(sid, iniobj, policy_name)
class inifile: class inifile(DynamicAttributes):
def __init__(self, path): def __init__(self, path):
self.path = path self.path = path

57
gpoa/gpt/networkshares.py Normal file
View File

@ -0,0 +1,57 @@
#
# GPOA - GPO Applier for Linux
#
# Copyright (C) 2019-2024 BaseALT Ltd.
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
from util.xml import get_xml_root
from .dynamic_attributes import DynamicAttributes
def read_networkshares(networksharesxml):
networkshares = list()
for share in get_xml_root(networksharesxml):
props = share.find('Properties')
networkshare_obj = networkshare(props.get('name'))
networkshare_obj.set_action(props.get('action', default='C'))
networkshare_obj.set_path(props.get('path', default=None))
networkshare_obj.set_all_regular(props.get('allRegular', default=None))
networkshare_obj.set_comment(props.get('comment', default=None))
networkshare_obj.set_limitUsers(props.get('limitUsers', default=None))
networkshare_obj.set_abe(props.get('abe', default=None))
networkshares.append(networkshare_obj)
return networkshares
def merge_networkshares(storage, sid, networkshares_objects, policy_name):
for networkshareobj in networkshares_objects:
storage.add_networkshare(sid, networkshareobj, policy_name)
class networkshare(DynamicAttributes):
def __init__(self, name):
self.name = name
def set_action(self, action):
self.action = action
def set_path(self, path):
self.path = path
def set_all_regular(self, allRegular):
self.allRegular = allRegular
def set_comment(self, comment):
self.comment = comment
def set_limitUsers(self, limitUsers):
self.limitUsers = limitUsers
def set_abe(self, abe):
self.abe = abe

View File

@ -24,9 +24,10 @@ def read_polfile(filename):
return load_preg(filename).entries return load_preg(filename).entries
def merge_polfile(storage, sid, policy_objects, policy_name): def merge_polfile(storage, sid, policy_objects, policy_name):
for entry in policy_objects: pass
if not sid: # for entry in policy_objects:
storage.add_hklm_entry(entry, policy_name) # if not sid:
else: # storage.add_hklm_entry(entry, policy_name)
storage.add_hkcu_entry(entry, sid, policy_name) # else:
# storage.add_hkcu_entry(entry, sid, policy_name)

View File

@ -1,7 +1,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2020 BaseALT Ltd. # Copyright (C) 2019-2024 BaseALT Ltd.
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -17,6 +17,7 @@
# along with this program. If not, see <http://www.gnu.org/licenses/>. # along with this program. If not, see <http://www.gnu.org/licenses/>.
import json import json
from .dynamic_attributes import DynamicAttributes
from util.xml import get_xml_root from util.xml import get_xml_root
@ -60,7 +61,7 @@ def json2printer(json_str):
return prn return prn
class printer: class printer(DynamicAttributes):
def __init__(self, ptype, name, status): def __init__(self, ptype, name, status):
''' '''
ptype may be one of: ptype may be one of:

View File

@ -1,7 +1,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2020 BaseALT Ltd. # Copyright (C) 2019-2024 BaseALT Ltd.
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -18,7 +18,7 @@
import configparser import configparser
import os import os
from .dynamic_attributes import DynamicAttributes
def read_scripts(scripts_file): def read_scripts(scripts_file):
scripts = Scripts_lists() scripts = Scripts_lists()
@ -61,19 +61,19 @@ def read_scripts(scripts_file):
section_scripts[key_index].set_args(config[act][key]) section_scripts[key_index].set_args(config[act][key])
if logon_scripts: if logon_scripts:
for i in sorted(logon_scripts.keys()): for i in sorted(logon_scripts.keys()):
scripts.add_script(act_upper, logon_scripts[i]) scripts.add_script('LOGON', logon_scripts[i])
if logoff_scripts: if logoff_scripts:
for i in sorted(logoff_scripts.keys()): for i in sorted(logoff_scripts.keys()):
scripts.add_script(act_upper, logoff_scripts[i]) scripts.add_script('LOGOFF', logoff_scripts[i])
if startup_scripts: if startup_scripts:
for i in sorted(startup_scripts.keys()): for i in sorted(startup_scripts.keys()):
scripts.add_script(act_upper, startup_scripts[i]) scripts.add_script('STARTUP', startup_scripts[i])
if shutdown_scripts: if shutdown_scripts:
for i in sorted(shutdown_scripts.keys()): for i in sorted(shutdown_scripts.keys()):
scripts.add_script(act_upper, shutdown_scripts[i]) scripts.add_script('SHUTDOWN', shutdown_scripts[i])
return scripts return scripts
@ -115,7 +115,7 @@ class Scripts_lists:
self.get_shutdown_scripts().append(script) self.get_shutdown_scripts().append(script)
class Script: class Script(DynamicAttributes):
__logon_counter = 0 __logon_counter = 0
__logoff_counter = 0 __logoff_counter = 0
__startup_counter = 0 __startup_counter = 0
@ -126,6 +126,7 @@ class Script:
self.action = action_upper self.action = action_upper
self.path = os.path.join(script_dir, action_upper, script_filename.upper()) self.path = os.path.join(script_dir, action_upper, script_filename.upper())
if not os.path.isfile(self.path): if not os.path.isfile(self.path):
self.number = None
return None return None
self.args = None self.args = None

View File

@ -1,7 +1,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2020 BaseALT Ltd. # Copyright (C) 2019-2024 BaseALT Ltd.
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -17,6 +17,7 @@
# along with this program. If not, see <http://www.gnu.org/licenses/>. # along with this program. If not, see <http://www.gnu.org/licenses/>.
from util.xml import get_xml_root from util.xml import get_xml_root
from .dynamic_attributes import DynamicAttributes
def read_services(service_file): def read_services(service_file):
''' '''
@ -43,7 +44,7 @@ def merge_services(storage, sid, service_objects, policy_name):
for srv in service_objects: for srv in service_objects:
pass pass
class service: class service(DynamicAttributes):
def __init__(self, name): def __init__(self, name):
self.unit = name self.unit = name
self.servname = None self.servname = None

View File

@ -1,7 +1,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2020 BaseALT Ltd. # Copyright (C) 2019-2024 BaseALT Ltd.
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -18,20 +18,23 @@
from pathlib import Path from pathlib import Path
import stat import stat
import logging
from enum import Enum from enum import Enum
from xml.etree import ElementTree
from xdg.DesktopEntry import DesktopEntry from xdg.DesktopEntry import DesktopEntry
import json import json
from util.windows import transform_windows_path from util.windows import transform_windows_path
from util.xml import get_xml_root from util.xml import get_xml_root
from util.paths import get_desktop_files_directory
from .dynamic_attributes import DynamicAttributes
class TargetType(Enum): class TargetType(Enum):
FILESYSTEM = 'FILESYSTEM' FILESYSTEM = 'FILESYSTEM'
URL = 'URL' URL = 'URL'
def __str__(self):
return self.value
def get_ttype(targetstr): def get_ttype(targetstr):
''' '''
Validation function for targetType property Validation function for targetType property
@ -42,7 +45,7 @@ def get_ttype(targetstr):
''' '''
ttype = TargetType.FILESYSTEM ttype = TargetType.FILESYSTEM
if targetstr == 'URL': if targetstr == 'URL'or targetstr == TargetType.URL:
ttype = TargetType.URL ttype = TargetType.URL
return ttype return ttype
@ -85,6 +88,9 @@ def read_shortcuts(shortcuts_file):
sc.set_guid(link.get('uid')) sc.set_guid(link.get('uid'))
sc.set_usercontext(link.get('userContext', False)) sc.set_usercontext(link.get('userContext', False))
sc.set_icon(props.get('iconPath')) sc.set_icon(props.get('iconPath'))
if props.get('comment'):
sc.set_comment(props.get('comment'))
shortcuts.append(sc) shortcuts.append(sc)
return shortcuts return shortcuts
@ -93,24 +99,23 @@ def merge_shortcuts(storage, sid, shortcut_objects, policy_name):
for shortcut in shortcut_objects: for shortcut in shortcut_objects:
storage.add_shortcut(sid, shortcut, policy_name) storage.add_shortcut(sid, shortcut, policy_name)
def json2sc(json_str):
'''
Build shortcut out of string-serialized JSON
'''
json_obj = json.loads(json_str)
link_type = get_ttype(json_obj['type'])
sc = shortcut(json_obj['dest'], json_obj['path'], json_obj['arguments'], json_obj['name'], json_obj['action'], link_type) def find_desktop_entry(binary_path):
sc.set_changed(json_obj['changed']) desktop_dir = get_desktop_files_directory()
sc.set_clsid(json_obj['clsid']) binary_name = ''.join(binary_path.split('/')[-1])
sc.set_guid(json_obj['guid']) desktop_file_path = Path(f"{desktop_dir}/{binary_name}.desktop")
sc.set_usercontext(json_obj['is_in_user_context'])
if 'icon' in json_obj:
sc.set_icon(json_obj['icon'])
return sc if desktop_file_path.exists():
desktop_entry = DesktopEntry()
desktop_entry.parse(desktop_file_path)
return desktop_entry
return None
class shortcut(DynamicAttributes):
_ignore_fields = {"desktop_file_template", "desktop_file"}
class shortcut:
def __init__(self, dest, path, arguments, name=None, action=None, ttype=TargetType.FILESYSTEM): def __init__(self, dest, path, arguments, name=None, action=None, ttype=TargetType.FILESYSTEM):
''' '''
:param dest: Path to resulting file on file system :param dest: Path to resulting file on file system
@ -119,16 +124,42 @@ class shortcut:
:param name: Name of the application :param name: Name of the application
:param type: Link type - FILESYSTEM or URL :param type: Link type - FILESYSTEM or URL
''' '''
self.dest = dest self.dest = self.replace_slashes(dest)
self.path = path self.path = path
self.expanded_path = None self.expanded_path = None
self.arguments = arguments self.arguments = arguments
self.name = name self.name = self.replace_name(name)
self.action = action self.action = action
self.changed = '' self.changed = ''
self.icon = None self.icon = None
self.comment = ''
self.is_in_user_context = self.set_usercontext() self.is_in_user_context = self.set_usercontext()
self.type = ttype self.type = ttype
self.desktop_file_template = None
def items(self):
return ((k, v) for k, v in super().items() if k not in self._ignore_fields)
def __iter__(self):
return iter(self.items())
def replace_slashes(self, input_path):
if input_path.startswith('%'):
index = input_path.find('%', 1)
if index != -1:
replace_path = input_path[:index + 2] + input_path[index + 2:].replace('/','-')
return replace_path
return input_path.replace('/','-')
def replace_name(self, input_name):
if input_name.startswith('%'):
index = input_name.find('%', 1)
if index != -1:
replace_name = input_name[index + 2:]
return replace_name
return input_name
def __str__(self): def __str__(self):
result = self.to_json() result = self.to_json()
@ -149,6 +180,9 @@ class shortcut:
def set_icon(self, icon_name): def set_icon(self, icon_name):
self.icon = icon_name self.icon = icon_name
def set_comment(self, comment):
self.comment = comment
def set_type(self, ttype): def set_type(self, ttype):
''' '''
Set type of the hyperlink - FILESYSTEM or URL Set type of the hyperlink - FILESYSTEM or URL
@ -177,28 +211,6 @@ class shortcut:
def is_usercontext(self): def is_usercontext(self):
return self.is_in_user_context return self.is_in_user_context
def to_json(self):
'''
Return shortcut's JSON for further serialization.
'''
content = dict()
content['dest'] = self.dest
content['path'] = self.path
content['name'] = self.name
content['arguments'] = self.arguments
content['clsid'] = self.clsid
content['guid'] = self.guid
content['changed'] = self.changed
content['action'] = self.action
content['is_in_user_context'] = self.is_in_user_context
content['type'] = ttype2str(self.type)
if self.icon:
content['icon'] = self.icon
result = self.desktop()
result.content.update(content)
return json.dumps(result.content)
def desktop(self, dest=None): def desktop(self, dest=None):
''' '''
Returns desktop file object which may be written to disk. Returns desktop file object which may be written to disk.
@ -206,6 +218,7 @@ class shortcut:
if dest: if dest:
self.desktop_file = DesktopEntry(dest) self.desktop_file = DesktopEntry(dest)
else: else:
self.desktop_file_template = find_desktop_entry(self.path)
self.desktop_file = DesktopEntry() self.desktop_file = DesktopEntry()
self.desktop_file.addGroup('Desktop Entry') self.desktop_file.addGroup('Desktop Entry')
self.desktop_file.set('Version', '1.0') self.desktop_file.set('Version', '1.0')
@ -217,7 +230,7 @@ class shortcut:
''' '''
Update desktop file object from internal data. Update desktop file object from internal data.
''' '''
if self.type == TargetType.URL: if get_ttype(self.type) == TargetType.URL:
self.desktop_file.set('Type', 'Link') self.desktop_file.set('Type', 'Link')
else: else:
self.desktop_file.set('Type', 'Application') self.desktop_file.set('Type', 'Application')
@ -227,14 +240,21 @@ class shortcut:
desktop_path = self.path desktop_path = self.path
if self.expanded_path: if self.expanded_path:
desktop_path = self.expanded_path desktop_path = self.expanded_path
if self.type == TargetType.URL: if get_ttype(self.type) == TargetType.URL:
self.desktop_file.set('URL', desktop_path) self.desktop_file.set('URL', desktop_path)
else: else:
self.desktop_file.set('Terminal', 'false') str2bool_lambda = (lambda boolstr: boolstr if isinstance(boolstr, bool)
self.desktop_file.set('Exec', '{} {}'.format(desktop_path, self.arguments)) else boolstr and boolstr.lower() in ['True', 'true', 'yes', '1'])
if self.desktop_file_template:
terminal_state = str2bool_lambda(self.desktop_file_template.get('Terminal'))
self.desktop_file.set('Terminal', 'true' if terminal_state else 'false')
self.desktop_file.set('Exec', '{} {}'.format(desktop_path, self.get_original_value('arguments')))
self.desktop_file.set('Comment', self.comment)
if self.icon: if self.icon:
self.desktop_file.set('Icon', self.icon) self.desktop_file.set('Icon', self.icon)
elif self.desktop_file_template and self.desktop_file_template.get('Icon', False):
self.desktop_file.set('Icon', self.desktop_file_template.get('Icon'))
def _write_desktop(self, dest, create_only=False, read_firstly=False): def _write_desktop(self, dest, create_only=False, read_firstly=False):
''' '''

View File

@ -25,6 +25,7 @@ import os
import sys import sys
import pwd import pwd
import signal import signal
from storage import Dconf_registry
from util.users import ( from util.users import (
is_root is_root
@ -83,6 +84,11 @@ def parse_cli_arguments():
type=int, type=int,
default=5, default=5,
help='Set logging verbosity level') help='Set logging verbosity level')
argparser.add_argument('-f',
'--force',
action='store_true',
default=False,
help='Force GPT download')
argparser.add_argument('-s', argparser.add_argument('-s',
'--system', '--system',
action='store_true', action='store_true',
@ -165,6 +171,7 @@ def main():
gettext.bindtextdomain('gpoa', '/usr/lib/python3/site-packages/gpoa/locale') gettext.bindtextdomain('gpoa', '/usr/lib/python3/site-packages/gpoa/locale')
gettext.textdomain('gpoa') gettext.textdomain('gpoa')
set_loglevel(args.loglevel) set_loglevel(args.loglevel)
Dconf_registry._force = args.force
gpo_appliers = runner_factory(args, process_target(args.target)) gpo_appliers = runner_factory(args, process_target(args.target))
if gpo_appliers: if gpo_appliers:

View File

@ -2,7 +2,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2020 BaseALT Ltd. # Copyright (C) 2019-2024 BaseALT Ltd.
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -19,9 +19,7 @@
import os import os
import sys
import argparse import argparse
import subprocess
from util.util import ( from util.util import (
runcmd runcmd
@ -146,10 +144,10 @@ def is_unit_enabled(unit_name, unit_global=False):
def get_status(): def get_status():
''' '''
Check that gpupdate.service and gpupdate-user.service are enabled. Check that gpupdate.timer and gpupdate-user.timer are enabled.
''' '''
is_gpupdate = is_unit_enabled('gpupdate.service') is_gpupdate = is_unit_enabled('gpupdate.timer')
is_gpupdate_user = is_unit_enabled('gpupdate-user.service', unit_global=True) is_gpupdate_user = is_unit_enabled('gpupdate-user.timer', unit_global=True)
if is_gpupdate and is_gpupdate_user: if is_gpupdate and is_gpupdate_user:
return True return True
@ -218,7 +216,7 @@ def enable_gp(policy_name, backend_type):
cmd_set_gpupdate_policy = ['/usr/sbin/control', 'system-policy', 'gpupdate'] cmd_set_gpupdate_policy = ['/usr/sbin/control', 'system-policy', 'gpupdate']
cmd_gpoa_nodomain = ['/usr/sbin/gpoa', '--nodomain', '--loglevel', '5'] cmd_gpoa_nodomain = ['/usr/sbin/gpoa', '--nodomain', '--loglevel', '5']
cmd_enable_gpupdate_service = ['/bin/systemctl', 'enable', 'gpupdate.service'] cmd_enable_gpupdate_service = ['/bin/systemctl', 'enable', 'gpupdate.service']
cmd_enable_gpupdate_user_service = ['/bin/systemctl', '--global', 'enable', 'gpupdate-user.service'] cmd_enable_gpupdate_user_service = ['/bin/systemctl', '--global', 'disable', 'gpupdate-user.service']
cmd_enable_gpupdate_timer = ['/bin/systemctl', 'enable', 'gpupdate.timer'] cmd_enable_gpupdate_timer = ['/bin/systemctl', 'enable', 'gpupdate.timer']
cmd_enable_gpupdate_user_timer = ['/bin/systemctl', '--global', 'enable', 'gpupdate-user.timer'] cmd_enable_gpupdate_user_timer = ['/bin/systemctl', '--global', 'enable', 'gpupdate-user.timer']
cmd_enable_gpupdate_scripts_service = ['/bin/systemctl', 'enable', 'gpupdate-scripts-run.service'] cmd_enable_gpupdate_scripts_service = ['/bin/systemctl', 'enable', 'gpupdate-scripts-run.service']
@ -254,11 +252,7 @@ def enable_gp(policy_name, backend_type):
# Enable gpupdate-setup.service for all users # Enable gpupdate-setup.service for all users
if not rollback_on_error(cmd_enable_gpupdate_user_service): if not rollback_on_error(cmd_enable_gpupdate_user_service):
return return
if not is_unit_enabled('gpupdate-user.service', unit_global=True): # Enable gpupdate-scripts-run.service
disable_gp()
return
# Enable gpupdate-scripts-run.service
if not rollback_on_error(cmd_enable_gpupdate_scripts_service): if not rollback_on_error(cmd_enable_gpupdate_scripts_service):
return return
if not is_unit_enabled('gpupdate-scripts-run.service'): if not is_unit_enabled('gpupdate-scripts-run.service'):

View File

@ -1,7 +1,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2020 BaseALT Ltd. # Copyright (C) 2019-2024 BaseALT Ltd.
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -62,6 +62,13 @@ msgstr "Политика Chromium"
msgid "Set user property to" msgid "Set user property to"
msgstr "Установка свойств для пользователя" msgstr "Установка свойств для пользователя"
msgid "The line in the configuration file was cleared"
msgstr "В конфигурационном файле была очищена строка"
msgid "Found GPT in cache"
msgstr "Найден GPT в кеше"
# Error # Error
msgid "Insufficient permissions to run gpupdate" msgid "Insufficient permissions to run gpupdate"
msgstr "Недостаточно прав для запуска gpupdate" msgstr "Недостаточно прав для запуска gpupdate"
@ -228,6 +235,39 @@ msgstr "Ошибка очистки каталога для машины"
msgid "Error cleaning directory for user" msgid "Error cleaning directory for user"
msgstr "Ошибка очистки каталога для пользователя" msgstr "Ошибка очистки каталога для пользователя"
msgid "Error while executing command for widgets"
msgstr "Ошибка при выполнении команды для виджетов"
msgid "Error creating environment variables"
msgstr "Ошибка создания переменных среды"
msgid "Error running kwriteconfig5 command"
msgstr "Ошибка выполнения команды kwriteconfig5"
msgid "Error getting list of keys"
msgstr "Ошибка получения списка ключей"
msgid "Error getting key value"
msgstr "Ошибка при получении значения ключей"
msgid "Failed to update dconf database"
msgstr "Не удалось обновить базу данных dconf"
msgid "Exception occurred while updating dconf database"
msgstr "Возникло исключение при обновлении базы данных dconf"
msgid "Failed to retrieve data from dconf database"
msgstr "Не удалось получить данные из базы dconf"
msgid "Autofs restart failed"
msgstr "Перезапуск Autofs не удался"
msgid "Failed to update LDAP with new password data"
msgstr "Не удалось обновить LDAP новыми данными пароля"
msgid "Failed to change local user password"
msgstr "Не удалось изменить пароль локального пользователя"
# Error_end # Error_end
# Debug # Debug
@ -603,11 +643,11 @@ msgstr "Запуск применение настроек Envvar для маш
msgid "Envvar applier for machine will not be started" msgid "Envvar applier for machine will not be started"
msgstr "Применение настроек Envvar для машины не запускается" msgstr "Применение настроек Envvar для машины не запускается"
msgid "Running Envvar applier for user in user context" msgid "Running Envvar applier for user in admin context"
msgstr "Запуск применение настроек Envvar для пользователя в контексте пользователя" msgstr "Запуск применение настроек Envvar для пользователя в контексте администратора"
msgid "Envvar applier for user in user context will not be started" msgid "Envvar applier for user in admin context will not be started"
msgstr "Применение настроек Envvar для пользователя в контексте пользователя не запускается" msgstr "Применение настроек Envvar для пользователя в контексте администратора не запускается"
msgid "Running Package applier for machine" msgid "Running Package applier for machine"
msgstr "Запуск установки пакетов для машины" msgstr "Запуск установки пакетов для машины"
@ -709,25 +749,25 @@ msgid "Running File copy applier for machine"
msgstr "Запуск применение настроек копирования файлов для машины" msgstr "Запуск применение настроек копирования файлов для машины"
msgid "Running File copy applier for machine will not be started" msgid "Running File copy applier for machine will not be started"
msgstr "Запуск применение настроек копирования файлов для машины не будет запущено" msgstr "Применение настроек копирования файлов для машины не будет запущено"
msgid "Running File copy applier for user in administrator context" msgid "Running File copy applier for user in administrator context"
msgstr "Запуск применение настроек копирования файлов для пользователя в контексте администратора" msgstr "Запуск применение настроек копирования файлов для пользователя в контексте администратора"
msgid "Running File copy applier for user in administrator context will not be started" msgid "Running File copy applier for user in administrator context will not be started"
msgstr "Запуск применение настроек копирования файлов для пользователя в контексте администратора не будет запущено" msgstr "Применение настроек копирования файлов для пользователя в контексте администратора не будет запущено"
msgid "Running ini applier for machine" msgid "Running ini applier for machine"
msgstr "Запуск применение настроек ini файлов для машины" msgstr "Запуск применение настроек ini файлов для машины"
msgid "Running ini applier for machine will not be started" msgid "Running ini applier for machine will not be started"
msgstr "Запуск применение настроек ini файлов для машины не будет запущено" msgstr "Применение настроек ini файлов для машины не будет запущено"
msgid "Running ini applier for user in administrator context" msgid "Running ini applier for user in user context"
msgstr "Запуск применение настроек ini файлов для пользователя в контексте администратора" msgstr "Запуск применение настроек ini файлов для пользователя в контексте пользователя"
msgid "Running ini applier for user in administrator context will not be started" msgid "Running ini applier for user in user context will not be started"
msgstr "Запуск применение настроек ini файлов для пользователя в контексте администратора не будет запущено" msgstr "Применение настроек ini файлов для пользователя в контексте пользователя не будет запущено"
msgid "Ini-file path not recognized" msgid "Ini-file path not recognized"
msgstr "Путь к ini-файлу не распознан" msgstr "Путь к ini-файлу не распознан"
@ -741,6 +781,174 @@ msgstr "Сохранение информации об ini-файле"
msgid "Dictionary key generation failed" msgid "Dictionary key generation failed"
msgstr "Формирования ключа словаря не удалось" msgstr "Формирования ключа словаря не удалось"
msgid "Running CIFS applier for machine"
msgstr "Запуск применение настроек CIFS для машины"
msgid "CIFS applier for machine will not be started"
msgstr "Применение настроек CIFS для машины не будет запущено"
msgid "Saving information about network shares"
msgstr "Сохранение информации о сетевых ресурсах"
msgid "Running networkshare applier for machine"
msgstr "Запуск применение настроек сетевых каталогов для машины"
msgid "Running networkshare applier for machine will not be starte"
msgstr "Применение настроек сетевых каталогов для машины не будет запущено"
msgid "Apply network share data action failed"
msgstr "Не удалось применить действие с данными общего сетевого ресурса"
msgid "Running yandex_browser_applier for machine"
msgstr "Запуск yandex_browser_applier для машины"
msgid "Yandex_browser_applier for machine will not be started"
msgstr "Yandex_browser_applier для машины не запустится"
msgid "Wrote YandexBrowser preferences to"
msgstr "Запись настройки Яндекс Браузера в"
msgid "Running networkshare applier for user"
msgstr "Запуск применение настроек сетевых каталогов для пользователя"
msgid "File copy"
msgstr "Копирование файла"
msgid "Running networkshare applier for user will not be started"
msgstr "Применение настроек сетевых каталогов для пользователя не будет запущено"
msgid "File update"
msgstr "Обновление файла"
msgid "Applying settings for network share"
msgstr "Применение настроек для сетевой папки"
msgid "Deleting a file"
msgstr "Удаление файла"
msgid "Running GPOA by root for user"
msgstr "Запуск GPOA от root для пользователя"
msgid "The GPOA process was started for computer"
msgstr "Процесс GPOA запущен для компьютера"
msgid "Running networkshare applier for machine will not be started"
msgstr "Применение настроек сетевых каталогов для машины не будет запущено"
msgid "Failed to create a symlink to the network drives mountpoint"
msgstr "Не удалось создать ссылку на точку монтирования сетевых дисков пользователя"
msgid "Failed to create a symlink to the system network drives mountpoint"
msgstr "Не удалось создать ссылку на точку монтирования системных сетевых дисков"
msgid "Failed to create a symlink to the hidden network drives mountpoint"
msgstr "Не удалось создать ссылку на точку монтирования скрытых сетевых дисков пользователя"
msgid "Failed to create a symlink to the hidden system network drives mountpoint"
msgstr "Не удалось создать ссылку на точку монтирования скрытых системных сетевых дисков"
msgid "Running KDE applier for machine"
msgstr "Запуск применения настроек KDE для машины"
msgid "KDE applier for machine will not be started"
msgstr "Применение настроек KDE для машины не удалось"
msgid "Running KDE applier for user in user context"
msgstr "Запуск применения настроек KDE в контексте пользователя"
msgid "KDE applier for user in user context will not be started"
msgstr "KDE в контексте пользователя не запускается"
msgid "Changing the configuration file"
msgstr "Изменение конфигурационного файла"
msgid "Widget command completed successfully"
msgstr "Команда для виджетов выполнена успешно"
msgid "Getting a list of keys"
msgstr "Получение списка ключей"
msgid "Getting the key value"
msgstr "Получение значения ключа"
msgid "Successfully updated dconf database"
msgstr "База данных dconf успешно обновлена"
msgid "Creating a dictionary with keys and values from the dconf database"
msgstr "Формирование словаря с ключами и значениями из базы dconf"
msgid "No entry found for the specified path"
msgstr "Не найдено записей по указанному пути"
msgid "Creating an ini file with policies for dconf"
msgstr "Создание ini-файла с политиками для dconf"
msgid "GPO version was not found"
msgstr "Версия GPO не найдена"
msgid "SYSVOL entry found in cache"
msgstr "Запись SYSVOL найдена в кеше"
msgid "Wrote Thunderbird preferences to"
msgstr "Настройки Thunderbird записаны в"
msgid "Running Thunderbird applier for machine"
msgstr "Запуск применение настроек Thunderbird для машины"
msgid "Thunderbird applier for machine will not be started"
msgstr "Применение настроек Thunderbird для компьютера не запускается"
msgid "The environment file has been cleaned"
msgstr "Файл environment очищен"
msgid "Cleanup of file environment failed"
msgstr "Очистка файла environment не удалась"
msgid "Failed to get dictionary"
msgstr "Не удалось получить словарь"
msgid "LAPS applier started"
msgstr "Запущен обработчик LAPS"
msgid "LAPS applier is disabled"
msgstr "Обработчик LAPS отключен"
msgid "Rebooting system after password change"
msgstr "Перезагрузка системы после смены пароля"
msgid "Password changed"
msgstr "Пароль изменён"
msgid "Writing password changes time"
msgstr "Запись времени изменения пароля"
msgid "Requirements not met"
msgstr "Требования не выполнены"
msgid "The number of hours from the moment of the last user entrance"
msgstr "Количество часов с момента последнего входа пользователя"
msgid "The number of hours since the password has last changed"
msgstr "Количество часов с момента последнего изменения пароля"
msgid "LDAP updated with new password data"
msgstr "LDAP обновлён новыми данными пароля"
msgid "No active sessions found"
msgstr "Активные сеансы не найдены"
msgid "Process terminated"
msgstr "Процесс завершён"
msgid "Password update not needed"
msgstr "Обновление пароля не требуется"
msgid "Password successfully updated"
msgstr "Пароль успешно обновлён"
msgid "Cleaning the autofs catalog"
msgstr "Очистка каталога autofs"
# Debug_end # Debug_end
# Warning # Warning
@ -787,6 +995,75 @@ msgstr "Не удалось кэшировать файл"
msgid "Could not create a valid list of keys" msgid "Could not create a valid list of keys"
msgstr "Не удалось создать допустимый список ключей" msgstr "Не удалось создать допустимый список ключей"
msgid "Failed to copy file"
msgstr "Не удалось скопировать файл"
msgid "Failed to create KDE settings list"
msgstr "Не удалось создать список настроек KDE"
msgid "Could not find tools to configure KDE"
msgstr "Не удалось найти инструменты для настройки KDE"
msgid "Failed to open KDE settings"
msgstr "Не удалось открыть настройки KDE"
msgid "Failed to change KDE configuration file"
msgstr "Не удалось изменить файл конфигурации KDE"
msgid "Error connecting to server"
msgstr "Ошибка при подключении к серверу"
msgid "Wallpaper configuration file not found"
msgstr "Конфигурационный файл для обоев не найден"
msgid "The user setting was not installed, conflict with computer setting"
msgstr "Пользовательская настройка не была установлена, конфликт с настройкой компьютера"
msgid "Action for ini file failed"
msgstr "Не удалось выполнить действие для INI-файла"
msgid "Couldn't get the uid"
msgstr "Не удалось получить uid"
msgid "Failed to load content from remote host"
msgstr "Не удалось загрузить контент с удаленного узла"
msgid "Force mode activated"
msgstr "Режим force задействован"
msgid "Failed to change password"
msgstr "Не удалось изменить пароль"
msgid "Failed to write password modification time"
msgstr "Не удалось записать время изменения пароля"
msgid "LAPS requirements not met, module disabled"
msgstr "Требования LAPS не выполнены, модуль отключён"
msgid "Could not resolve encryption principal name. Return admin group SID"
msgstr "Не удалось определить имя шифрования. Возвращён SID группы администраторов"
msgid "Failed to get expiration time from LDAP"
msgstr "Не удалось получить время истечения срока действия из LDAP"
msgid "Failed to read password modification time from dconf"
msgstr "Не удалось прочитать время изменения пароля из dconf"
msgid "Failed to get last login time"
msgstr "Не удалось получить время последнего входа"
msgid "Failed to calculate password age"
msgstr "Не удалось вычислить возраст пароля"
msgid "Failed to terminate process"
msgstr "Не удалось завершить процесс"
msgid "The user was not found to change the password"
msgstr "Пользователь для изменения пароля не был найден"
msgid "Error while cleaning the autofs catalog"
msgstr "Ошибка при очистке каталога autofs"
# Fatal # Fatal
msgid "Unable to refresh GPO list" msgid "Unable to refresh GPO list"
msgstr "Невозможно обновить список объектов групповых политик" msgstr "Невозможно обновить список объектов групповых политик"

View File

@ -1,7 +1,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2020 BaseALT Ltd. # Copyright (C) 2019-2024 BaseALT Ltd.
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -30,6 +30,8 @@ def info_code(code):
info_ids[7] = 'Firefox policy' info_ids[7] = 'Firefox policy'
info_ids[8] = 'Chromium policy' info_ids[8] = 'Chromium policy'
info_ids[9] = 'Set user property to' info_ids[9] = 'Set user property to'
info_ids[10] = 'The line in the configuration file was cleared'
info_ids[11] = 'Found GPT in cache'
return info_ids.get(code, 'Unknown info code') return info_ids.get(code, 'Unknown info code')
@ -99,8 +101,17 @@ def error_code(code):
error_ids[63] = 'Error merging user GPT (from machine GPO)' error_ids[63] = 'Error merging user GPT (from machine GPO)'
error_ids[64] = 'Error to cleanup directory for machine' error_ids[64] = 'Error to cleanup directory for machine'
error_ids[65] = 'Error to cleanup directory for user' error_ids[65] = 'Error to cleanup directory for user'
error_ids[66] = 'Error while executing command for widgets'
error_ids[67] = 'Error creating environment variables'
error_ids[68] = 'Error running kwriteconfig5 command'
error_ids[69] = 'Error getting list of keys'
error_ids[70] = 'Error getting key value'
error_ids[71] = 'Failed to update dconf database'
error_ids[72] = 'Exception occurred while updating dconf database'
error_ids[73] = 'Failed to retrieve data from dconf database'
error_ids[74] = 'Autofs restart failed'
error_ids[75] = 'Failed to update LDAP with new password data'
error_ids[76] = 'Failed to change local user password'
return error_ids.get(code, 'Unknown error code') return error_ids.get(code, 'Unknown error code')
def debug_code(code): def debug_code(code):
@ -240,8 +251,8 @@ def debug_code(code):
debug_ids[133] = 'NTP applier for machine will not be started' debug_ids[133] = 'NTP applier for machine will not be started'
debug_ids[134] = 'Running Envvar applier for machine' debug_ids[134] = 'Running Envvar applier for machine'
debug_ids[135] = 'Envvar applier for machine will not be started' debug_ids[135] = 'Envvar applier for machine will not be started'
debug_ids[136] = 'Running Envvar applier for user in user context' debug_ids[136] = 'Running Envvar applier for user in admin context'
debug_ids[137] = 'Envvar applier for user in user context will not be started' debug_ids[137] = 'Envvar applier for user in admin context will not be started'
debug_ids[138] = 'Running Package applier for machine' debug_ids[138] = 'Running Package applier for machine'
debug_ids[139] = 'Package applier for machine will not be started' debug_ids[139] = 'Package applier for machine will not be started'
debug_ids[140] = 'Running Package applier for user in administrator context' debug_ids[140] = 'Running Package applier for user in administrator context'
@ -277,12 +288,64 @@ def debug_code(code):
debug_ids[170] = 'Running File copy applier for user in administrator context will not be started' debug_ids[170] = 'Running File copy applier for user in administrator context will not be started'
debug_ids[171] = 'Running ini applier for machine' debug_ids[171] = 'Running ini applier for machine'
debug_ids[172] = 'Running ini applier for machine will not be started' debug_ids[172] = 'Running ini applier for machine will not be started'
debug_ids[173] = 'Running ini applier for user in administrator context' debug_ids[173] = 'Running ini applier for user in user context'
debug_ids[174] = 'Running ini applier for user in administrator context will not be started' debug_ids[174] = 'Running ini applier for user in user context will not be started'
debug_ids[175] = 'Ini-file path not recognized' debug_ids[175] = 'Ini-file path not recognized'
debug_ids[176] = 'Ini-file is not readable' debug_ids[176] = 'Ini-file is not readable'
debug_ids[177] = 'Saving information about ini-file' debug_ids[177] = 'Saving information about ini-file'
debug_ids[178] = 'Dictionary key generation failed' debug_ids[178] = 'Dictionary key generation failed'
debug_ids[179] = 'Running CIFS applier for machine'
debug_ids[180] = 'CIFS applier for machine will not be started'
debug_ids[181] = 'Running networkshare applier for machine will not be started'
debug_ids[182] = 'Apply network share data action failed'
debug_ids[183] = 'Running yandex_browser_applier for machine'
debug_ids[184] = 'Yandex_browser_applier for machine will not be started'
debug_ids[185] = 'Wrote YandexBrowser preferences to'
debug_ids[186] = 'Saving information about network shares'
debug_ids[187] = 'Running networkshare applier for machine'
debug_ids[188] = 'Running networkshare applier for user'
debug_ids[189] = 'Running networkshare applier for user will not be started'
debug_ids[190] = 'Applying settings for network share'
debug_ids[191] = 'File copy'
debug_ids[192] = 'File update'
debug_ids[193] = 'Deleting a file'
debug_ids[194] = 'Failed to create a symlink to the network drives mountpoint'
debug_ids[195] = 'Failed to create a symlink to the system network drives mountpoint'
debug_ids[196] = 'Failed to create a symlink to the hidden network drives mountpoint'
debug_ids[197] = 'Failed to create a symlink to the hidden system network drives mountpoint'
debug_ids[198] = 'Running KDE applier for machine'
debug_ids[199] = 'KDE applier for machine will not be started'
debug_ids[200] = 'Running KDE applier for user in user context'
debug_ids[201] = 'KDE applier for user in user context will not be started'
debug_ids[202] = 'Changing the configuration file'
debug_ids[203] = 'Widget command completed successfully'
debug_ids[204] = 'Getting a list of keys'
debug_ids[205] = 'Getting the key value'
debug_ids[206] = 'Successfully updated dconf database'
debug_ids[207] = 'Creating a dictionary with keys and values from the dconf database'
debug_ids[208] = 'No entry found for the specified path'
debug_ids[209] = 'Creating an ini file with policies for dconf'
debug_ids[211] = 'SYSVOL entry found in cache'
debug_ids[212] = 'Wrote Thunderbird preferences to'
debug_ids[213] = 'Running Thunderbird applier for machine'
debug_ids[214] = 'Thunderbird applier for machine will not be started'
debug_ids[215] = 'The environment file has been cleaned'
debug_ids[216] = 'Cleanup of file environment failed'
debug_ids[217] = 'Failed to get dictionary'
debug_ids[218] = 'LAPS applier started'
debug_ids[219] = 'LAPS applier is disabled'
debug_ids[220] = 'Rebooting system after password change'
debug_ids[221] = 'Password changed'
debug_ids[222] = 'Writing password changes time'
debug_ids[223] = 'Requirements not met'
debug_ids[224] = 'The number of hours from the moment of the last user entrance'
debug_ids[225] = 'The number of hours since the password has last changed'
debug_ids[226] = 'LDAP updated with new password data'
debug_ids[227] = 'No active sessions found'
debug_ids[228] = 'Process terminated'
debug_ids[229] = 'Password update not needed'
debug_ids[230] = 'Password successfully updated'
debug_ids[231] = 'Cleaning the autofs catalog'
return debug_ids.get(code, 'Unknown debug code') return debug_ids.get(code, 'Unknown debug code')
@ -308,6 +371,29 @@ def warning_code(code):
warning_ids[12] = 'Failed to read the list of files' warning_ids[12] = 'Failed to read the list of files'
warning_ids[13] = 'Failed to caching the file' warning_ids[13] = 'Failed to caching the file'
warning_ids[14] = 'Could not create a valid list of keys' warning_ids[14] = 'Could not create a valid list of keys'
warning_ids[15] = 'Failed to copy file'
warning_ids[16] = 'Failed to create KDE settings list'
warning_ids[17] = 'Could not find tools to configure KDE'
warning_ids[18] = 'Failed to open KDE settings'
warning_ids[19] = 'Failed to change KDE configuration file'
warning_ids[20] = 'Error connecting to server'
warning_ids[21] = 'Wallpaper configuration file not found'
warning_ids[22] = 'The user setting was not installed, conflict with computer setting'
warning_ids[23] = 'Action for ini file failed'
warning_ids[24] = 'Couldn\'t get the uid'
warning_ids[25] = 'Failed to load content from remote host'
warning_ids[26] = 'Force mode activated'
warning_ids[27] = 'Failed to change password'
warning_ids[28] = 'Failed to write password modification time'
warning_ids[29] = 'LAPS requirements not met, module disabled'
warning_ids[30] = 'Could not resolve encryption principal name. Return admin group SID'
warning_ids[31] = 'Failed to get expiration time from LDAP'
warning_ids[32] = 'Failed to read password modification time from dconf'
warning_ids[33] = 'Failed to get last login time'
warning_ids[34] = 'Failed to calculate password age'
warning_ids[35] = 'Failed to terminate process'
warning_ids[36] = 'The user was not found to change the password'
warning_ids[37] = 'Error while cleaning the autofs catalog'
return warning_ids.get(code, 'Unknown warning code') return warning_ids.get(code, 'Unknown warning code')

View File

@ -20,15 +20,13 @@
import rpm import rpm
import subprocess import subprocess
from gpoa.storage import registry_factory from gpoa.storage import registry_factory
from util.gpoa_ini_parsing import GpoaConfigObj
from util.util import get_uid_by_username, string_to_literal_eval
import logging import logging
from util.logging import log from util.logging import log
import argparse import argparse
import gettext import gettext
import locale import locale
from messages import message_with_code
from util.arguments import (
set_loglevel
)
def is_rpm_installed(rpm_name): def is_rpm_installed(rpm_name):
@ -44,35 +42,35 @@ def is_rpm_installed(rpm_name):
class Pkcon_applier: class Pkcon_applier:
def __init__(self, sid = None): def __init__(self, user = None):
self.__install_key_name = 'Install' install_key_name = 'Install'
self.__remove_key_name = 'Remove' remove_key_name = 'Remove'
self.__hkcu_branch = 'Software\\BaseALT\\Policies\\Packages' hklm_branch = 'Software/BaseALT/Policies/Packages'
self.__hklm_branch = 'Software\\BaseALT\\Policies\\Packages'
self.__install_command = ['/usr/bin/pkcon', '-y', 'install'] self.__install_command = ['/usr/bin/pkcon', '-y', 'install']
self.__remove_command = ['/usr/bin/pkcon', '-y', 'remove'] self.__remove_command = ['/usr/bin/pkcon', '-y', 'remove']
self.__reinstall_command = ['/usr/bin/pkcon', '-y', 'reinstall'] self.__reinstall_command = ['/usr/bin/pkcon', '-y', 'reinstall']
self.install_packages = set() self.install_packages = set()
self.remove_packages = set() self.remove_packages = set()
self.storage = registry_factory('registry') self.storage = registry_factory()
if sid: if user:
install_branch_user = '{}\\{}%'.format(self.__hkcu_branch, self.__install_key_name) uid = get_uid_by_username(user)
remove_branch_user = '{}\\{}%'.format(self.__hkcu_branch, self.__remove_key_name) dict_dconf_db = self.storage.get_dictionary_from_dconf_file_db(uid)
self.install_packages_setting = self.storage.filter_hkcu_entries(sid, install_branch_user)
self.remove_packages_setting = self.storage.filter_hkcu_entries(sid, remove_branch_user)
else: else:
install_branch = '{}\\{}%'.format(self.__hklm_branch, self.__install_key_name) dict_dconf_db = self.storage.get_dictionary_from_dconf_file_db()
remove_branch = '{}\\{}%'.format(self.__hklm_branch, self.__remove_key_name) dict_packages = dict_dconf_db.get(hklm_branch,{})
self.install_packages_setting = self.storage.filter_hklm_entries(install_branch) self.install_packages_setting = string_to_literal_eval(dict_packages.get(install_key_name,[]))
self.remove_packages_setting = self.storage.filter_hklm_entries(remove_branch) self.remove_packages_setting = string_to_literal_eval(dict_packages.get(remove_key_name,[]))
for package in self.install_packages_setting: for package in self.install_packages_setting:
if not is_rpm_installed(package.data): package = package.strip()
self.install_packages.add(package.data) if not is_rpm_installed(package):
self.install_packages.add(package)
for package in self.remove_packages_setting: for package in self.remove_packages_setting:
if package.data in self.install_packages: package = package.strip()
self.install_packages.remove(package.data) if package in self.install_packages:
if is_rpm_installed(package.data): self.install_packages.remove(package)
self.remove_packages.add(package.data) if is_rpm_installed(package):
self.remove_packages.add(package)
def apply(self): def apply(self):
log('D142') log('D142')
@ -137,13 +135,13 @@ if __name__ == '__main__':
gettext.textdomain('gpoa') gettext.textdomain('gpoa')
logger = logging.getLogger() logger = logging.getLogger()
parser = argparse.ArgumentParser(description='Package applier') parser = argparse.ArgumentParser(description='Package applier')
parser.add_argument('--sid', type = str, help = 'sid', nargs = '?', default = None) parser.add_argument('--user', type = str, help = 'user', nargs = '?', default = None)
parser.add_argument('--loglevel', type = int, help = 'loglevel', nargs = '?', default = 30) parser.add_argument('--loglevel', type = int, help = 'loglevel', nargs = '?', default = 30)
args = parser.parse_args() args = parser.parse_args()
logger.setLevel(args.loglevel) logger.setLevel(args.loglevel)
if args.sid: if args.user:
applier = Pkcon_applier(args.sid) applier = Pkcon_applier(args.user)
else: else:
applier = Pkcon_applier() applier = Pkcon_applier()
applier.apply() applier.apply()

View File

@ -35,6 +35,6 @@ class plugin_manager:
logging.warning(slogm(str(exc))) logging.warning(slogm(str(exc)))
def run(self): def run(self):
self.plugins.get('adp', plugin('adp')).run() #self.plugins.get('adp', plugin('adp')).run()
self.plugins.get('roles', plugin('roles')).run() self.plugins.get('roles', plugin('roles')).run()

View File

@ -21,6 +21,8 @@ import subprocess
import argparse import argparse
import os import os
from pathlib import Path from pathlib import Path
import psutil
import time
class Scripts_runner: class Scripts_runner:
''' '''
@ -104,12 +106,39 @@ class Scripts_runner:
def run_cmd_subprocess(self, cmd): def run_cmd_subprocess(self, cmd):
try: try:
subprocess.Popen(cmd) subprocess.run(cmd)
return 'Script run: {}'.format(cmd) return 'Script run: {}'.format(cmd)
except Exception as exc: except Exception as exc:
return exc return exc
def find_process_by_name_and_script(name, script_path):
for proc in psutil.process_iter(['pid', 'name', 'cmdline']):
try:
# Check if the process name matches and the script path is in the command line arguments
if proc.info['name'] == name and script_path in proc.info['cmdline']:
return proc
except (psutil.NoSuchProcess, psutil.AccessDenied, psutil.ZombieProcess):
continue
return None
def wait_for_process(name, script_path, check_interval=1):
process = find_process_by_name_and_script(name, script_path)
if not process:
print(f"Process with name {name} and script path {script_path} not found.")
return
try:
# Loop to wait for the process to finish
while process.is_running():
print(f"Waiting for process {name} with PID {process.pid} to finish...")
time.sleep(check_interval)
print(f"Process {name} with PID {process.pid} has finished.")
return
except (psutil.NoSuchProcess, psutil.AccessDenied):
print(f"Process {name} with PID {process.pid} is no longer accessible.")
return
if __name__ == '__main__': if __name__ == '__main__':
parser = argparse.ArgumentParser(description='Scripts runner') parser = argparse.ArgumentParser(description='Scripts runner')
@ -117,6 +146,9 @@ if __name__ == '__main__':
parser.add_argument('--user', type = str, help = 'User name ', nargs = '?', default = None) parser.add_argument('--user', type = str, help = 'User name ', nargs = '?', default = None)
parser.add_argument('--action', type = str, help = 'MACHINE : [STARTUP or SHUTDOWN], USER : [LOGON or LOGOFF]', nargs = '?', default = None) parser.add_argument('--action', type = str, help = 'MACHINE : [STARTUP or SHUTDOWN], USER : [LOGON or LOGOFF]', nargs = '?', default = None)
process_name = "python3"
script_path = "/usr/sbin/gpoa"
wait_for_process(process_name, script_path)
args = parser.parse_args() args = parser.parse_args()
try: try:
Scripts_runner(args.mode, args.user, args.action) Scripts_runner(args.mode, args.user, args.action)

View File

@ -1,7 +1,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2020 BaseALT Ltd. # Copyright (C) 2019-2023 BaseALT Ltd.
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -16,12 +16,19 @@
# You should have received a copy of the GNU General Public License # You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>. # along with this program. If not, see <http://www.gnu.org/licenses/>.
from .sqlite_registry import sqlite_registry
from .sqlite_cache import sqlite_cache
def cache_factory(cache_name): from storage.dconf_registry import Dconf_registry
return sqlite_cache(cache_name)
def registry_factory(registry_name='registry', registry_dir=None): def registry_factory(registry_name='', envprofile=None , username=None):
return sqlite_registry(registry_name, registry_dir) if username:
Dconf_registry._username = username
else:
Dconf_registry._envprofile = 'system'
if envprofile:
Dconf_registry._envprofile = envprofile
if registry_name == 'dconf':
return Dconf_registry()
else:
return Dconf_registry

View File

@ -0,0 +1,861 @@
#
# GPOA - GPO Applier for Linux
#
# Copyright (C) 2019-2023 BaseALT Ltd.
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
import subprocess
from pathlib import Path
from util.util import (string_to_literal_eval,
try_dict_to_literal_eval,
touch_file, get_uid_by_username,
add_prefix_to_keys,
remove_keys_with_prefix,
clean_data)
from util.paths import get_dconf_config_path
from util.logging import log
import re
from collections import OrderedDict
import itertools
from gpt.dynamic_attributes import RegistryKeyMetadata
import gi
gi.require_version("Gvdb", "1.0")
gi.require_version("GLib", "2.0")
from gi.repository import Gvdb, GLib
class PregDconf():
def __init__(self, keyname, valuename, type_preg, data):
self.keyname = keyname
self.valuename = valuename
self.hive_key = '{}/{}'.format(self.keyname, self.valuename)
self.type = type_preg
self.data = data
class gplist(list):
def __init__(self, *args, **kwargs):
super().__init__(*args, **kwargs)
def first(self):
if self:
return self[0]
else:
return None
def count(self):
return len(self)
class Dconf_registry():
'''
A class variable that represents a global registry dictionary shared among instances of the class
'''
_GpoPriority = 'Software/BaseALT/Policies/GpoPriority'
_gpo_name = set()
global_registry_dict = dict({_GpoPriority:{}})
previous_global_registry_dict = dict()
__template_file = '/usr/share/dconf/user_mandatory.template'
_policies_path = 'Software/'
_policies_win_path = 'SOFTWARE/'
_gpt_read_flag = False
_force = False
__dconf_dict_flag = False
__dconf_dict = dict()
_dconf_db = dict()
_dict_gpo_name_version_cache = dict()
_username = None
_uid = None
_envprofile = None
_path_bin_system = "/etc/dconf/db/policy"
list_keys = list()
_info = dict()
_counter_gpt = itertools.count(0)
shortcuts = list()
folders = list()
files = list()
drives = list()
scheduledtasks = list()
environmentvariables = list()
inifiles = list()
services = list()
printers = list()
scripts = list()
networkshares = list()
_true_strings = {
"True",
"true",
"TRUE",
"yes",
"Yes",
"enabled",
"enable",
"Enabled",
"Enable",
'1'
}
@classmethod
def set_info(cls, key , data):
cls._info[key] = data
@classmethod
def get_info(cls, key):
return cls._info.setdefault(key, None)
@staticmethod
def get_next_number():
return next(Dconf_registry._counter_gpt)
@staticmethod
def get_matching_keys(path):
if path[0] != '/':
path = '/' + path
logdata = dict()
envprofile = get_dconf_envprofile()
try:
process = subprocess.Popen(['dconf', 'list', path],
env=envprofile, stdout=subprocess.PIPE, stderr=subprocess.PIPE, text=True)
logdata['path'] = path
log('D204', logdata)
output, error = process.communicate()
if not output and not error:
return
if not error:
keys = output.strip().split('\n')
for key in keys:
Dconf_registry.get_matching_keys(f'{path}{key}')
else:
Dconf_registry.list_keys.append(path)
return Dconf_registry.list_keys
except Exception as exc:
logdata['exc'] = exc
log('E69', logdata)
return None
@staticmethod
def get_key_values(keys):
key_values = {}
for key in keys:
key_values[key] = Dconf_registry.get_key_value(key)
return key_values
@staticmethod
def get_key_value(key):
logdata = dict()
envprofile = get_dconf_envprofile()
try:
process = subprocess.Popen(['dconf', 'read', key],
env=envprofile, stdout=subprocess.PIPE, stderr=subprocess.PIPE, text=True)
logdata['key'] = key
output, error = process.communicate()
if not error:
return string_to_literal_eval(string_to_literal_eval(output))
else:
return None
except Exception as exc:
logdata['exc'] = exc
log('E70', logdata)
return None
@staticmethod
def dconf_update(uid=None):
logdata = dict()
path_dconf_config = get_dconf_config_path(uid)
db_file = path_dconf_config[:-3]
try:
process = subprocess.Popen(['dconf', 'compile', db_file, path_dconf_config],
stdout=subprocess.PIPE, stderr=subprocess.PIPE, text=True)
output, error = process.communicate()
if error:
logdata['error'] = error
log('E71', logdata)
else:
logdata['outpupt'] = output
log('D206', logdata)
except Exception as exc:
logdata['exc'] = exc
log('E72', logdata)
@classmethod
def check_profile_template(cls):
if Path(cls.__template_file).exists():
return True
else:
return None
@classmethod
def update_dict_to_previous(cls):
dict_clean_previous = remove_keys_with_prefix(cls._dconf_db)
dict_with_previous = add_prefix_to_keys(dict_clean_previous)
cls.global_registry_dict.update(dict_with_previous)
@classmethod
def apply_template(cls, uid):
logdata = dict()
if uid and cls.check_profile_template():
with open(cls.__template_file, "r") as f:
template = f.read()
# Replace the "{uid}" placeholder with the actual UID value
content = template.replace("{{uid}}", str(uid))
elif uid:
content = f"user-db:user\n" \
f"system-db:distr\n" \
f"system-db:policy\n" \
f"system-db:policy{uid}\n" \
f"system-db:local\n" \
f"system-db:default\n" \
f"system-db:local\n" \
f"system-db:policy{uid}\n" \
f"system-db:policy\n" \
f"system-db:distr\n"
else:
logdata['uid'] = uid
log('W24', logdata)
return
user_mandatory = f'/run/dconf/user/{uid}'
touch_file(user_mandatory)
with open(user_mandatory, "w") as f:
f.write(content)
@classmethod
def get_policies_from_dconf(cls):
return cls.get_dictionary_from_dconf(cls._policies_path, cls._policies_win_path)
@classmethod
def get_dictionary_from_dconf(self, *startswith_list):
output_dict = {}
for startswith in startswith_list:
dconf_dict = self.get_key_values(self.get_matching_keys(startswith))
for key, value in dconf_dict.items():
keys_tmp = key.split('/')
update_dict(output_dict.setdefault('/'.join(keys_tmp[:-1])[1:], {}), {keys_tmp[-1]: str(value)})
log('D207')
return output_dict
@classmethod
def get_dictionary_from_dconf_file_db(self, uid=None, path_bin=None, save_dconf_db=False):
logdata = dict()
error_skip = None
if path_bin:
error_skip = True
elif not uid:
path_bin = self._path_bin_system
else:
path_bin = self._path_bin_system + str(uid)
output_dict = {}
try:
if (GLib.file_get_contents(path_bin)[0]):
bytes1 = GLib.Bytes.new(GLib.file_get_contents(path_bin)[1])
table = Gvdb.Table.new_from_bytes(bytes1, True)
name_list = Gvdb.Table.get_names(table)
for name in name_list:
value = Gvdb.Table.get_value(table, name)
if value is None:
continue
list_path = name.split('/')
if value.is_of_type(GLib.VariantType('s')):
part = output_dict.setdefault('/'.join(list_path[1:-1]), {})
part[list_path[-1]] = value.get_string()
elif value.is_of_type(GLib.VariantType('i')):
part = output_dict.setdefault('/'.join(list_path[1:-1]), {})
part[list_path[-1]] = value.get_int32()
except Exception as exc:
logdata['exc'] = exc
logdata['path_bin'] = path_bin
if not error_skip:
log('E73', logdata)
else:
log('D217', logdata)
if save_dconf_db:
Dconf_registry._dconf_db = output_dict
return output_dict
@classmethod
def filter_entries(cls, startswith, registry_dict = None):
if not registry_dict:
registry_dict = cls.global_registry_dict
if startswith[-1] == '%':
startswith = startswith[:-1]
if startswith[-1] == '/' or startswith[-1] == '\\':
startswith = startswith[:-1]
return filter_dict_keys(startswith, flatten_dictionary(registry_dict))
return filter_dict_keys(startswith, flatten_dictionary(registry_dict))
@classmethod
def filter_hklm_entries(cls, startswith):
pregs = cls.filter_entries(startswith)
list_entiers = list()
for keyname, value in pregs.items():
if isinstance(value, dict):
for valuename, data in value.items():
list_entiers.append(PregDconf(
keyname, convert_string_dconf(valuename), find_preg_type(data), data))
elif isinstance(value, list):
for data in value:
list_entiers.append(PregDconf(
keyname, data, find_preg_type(data), data))
else:
list_entiers.append(PregDconf(
'/'.join(keyname.split('/')[:-1]), convert_string_dconf(keyname.split('/')[-1]), find_preg_type(value), value))
return gplist(list_entiers)
@classmethod
def filter_hkcu_entries(cls, sid, startswith):
return cls.filter_hklm_entries(startswith)
@classmethod
def get_storage(cls,dictionary = None):
if dictionary:
result = dictionary
elif Dconf_registry._gpt_read_flag:
result = Dconf_registry.global_registry_dict
else:
if Dconf_registry.__dconf_dict_flag:
result = Dconf_registry.__dconf_dict
else:
Dconf_registry.__dconf_dict = Dconf_registry.get_policies_from_dconf()
result = Dconf_registry.__dconf_dict
Dconf_registry.__dconf_dict_flag = True
return result
@classmethod
def filling_storage_from_dconf(cls):
Dconf_registry.global_registry_dict = Dconf_registry.get_storage()
@classmethod
def get_entry(cls, path, dictionary = None, preg = True):
logdata = dict()
result = Dconf_registry.get_storage(dictionary)
keys = path.split("\\") if "\\" in path else path.split("/")
key = '/'.join(keys[:-1]) if keys[0] else '/'.join(keys[:-1])[1:]
if isinstance(result, dict) and key in result.keys():
data = result.get(key).get(keys[-1])
return PregDconf(
key, convert_string_dconf(keys[-1]), find_preg_type(data), data) if preg else data
else:
logdata['path'] = path
log('D208', logdata)
return None
@classmethod
def check_enable_key(cls ,key):
data = cls.get_entry(key, preg = False)
if data:
if isinstance(data, str):
return True if data in cls._true_strings else False
elif isinstance(data, int):
return bool(data)
else:
return False
return False
@classmethod
def get_hkcu_entry(cls, sid, hive_key, dictionary = None):
return cls.get_hklm_entry(hive_key, dictionary)
@classmethod
def get_hklm_entry(cls, hive_key, dictionary = None):
return cls.get_entry(hive_key, dictionary)
@classmethod
def add_shortcut(cls, sid, sc_obj, policy_name):
sc_obj.policy_name = policy_name
cls.shortcuts.append(sc_obj)
@classmethod
def add_printer(cls, sid, pobj, policy_name):
pobj.policy_name = policy_name
cls.printers.append(pobj)
@classmethod
def add_drive(cls, sid, dobj, policy_name):
dobj.policy_name = policy_name
cls.drives.append(dobj)
@classmethod
def add_folder(cls, sid, fobj, policy_name):
fobj.policy_name = policy_name
cls.folders.append(fobj)
@classmethod
def add_envvar(self, sid, evobj, policy_name):
evobj.policy_name = policy_name
self.environmentvariables.append(evobj)
@classmethod
def add_script(cls, sid, scrobj, policy_name):
scrobj.policy_name = policy_name
cls.scripts.append(scrobj)
@classmethod
def add_file(cls, sid, fileobj, policy_name):
fileobj.policy_name = policy_name
cls.files.append(fileobj)
@classmethod
def add_ini(cls, sid, iniobj, policy_name):
iniobj.policy_name = policy_name
cls.inifiles.append(iniobj)
@classmethod
def add_networkshare(cls, sid, networkshareobj, policy_name):
networkshareobj.policy_name = policy_name
cls.networkshares.append(networkshareobj)
@classmethod
def get_shortcuts(cls, sid):
return cls.shortcuts
@classmethod
def get_printers(cls, sid):
return cls.printers
@classmethod
def get_drives(cls, sid):
return cls.drives
@classmethod
def get_folders(cls, sid):
return cls.folders
@classmethod
def get_envvars(cls, sid):
return cls.environmentvariables
@classmethod
def get_scripts(cls, sid, action):
action_scripts = list()
for part in cls.scripts:
if action == 'LOGON' and part.action == 'LOGON':
action_scripts.append(part)
elif action == 'LOGOFF' and part.action == 'LOGOFF':
action_scripts.append(part)
elif action == 'STARTUP' and part.action == 'STARTUP':
action_scripts.append(part)
elif action == 'SHUTDOWN' and part.action == 'SHUTDOWN':
action_scripts.append(part)
return action_scripts
@classmethod
def get_files(cls, sid):
return cls.files
@classmethod
def get_networkshare(cls, sid):
return cls.networkshares
@classmethod
def get_ini(cls, sid):
return cls.inifiles
@classmethod
def wipe_user(cls, sid):
cls.wipe_hklm()
@classmethod
def wipe_hklm(cls):
cls.global_registry_dict = dict({cls._GpoPriority:{}})
def filter_dict_keys(starting_string, input_dict):
result = dict()
for key in input_dict:
key_list = remove_empty_values(re.split(r'\\|/', key))
start_list = remove_empty_values(re.split(r'\\|/', starting_string))
if key_list[:len(start_list)] == start_list:
result[key] = input_dict.get(key)
return result
def find_preg_type(argument):
if isinstance(argument, int):
return 4
else:
return 1
def update_dict(dict1, dict2, save_key=None):
'''
Updates dict1 with the key-value pairs from dict2
'''
for key, value in dict2.items():
if key in dict1:
# If both values are dictionaries, recursively call the update_dict function
if isinstance(dict1[key], dict) and isinstance(value, dict):
save_key = key
update_dict(dict1[key], value, save_key)
# If the value in dict1 is a list, extend it with unique values from value
elif isinstance(dict1[key], list):
dict1[key].extend(set(value) - set(dict1[key]))
else:
# If the value in dict1 is not a dictionary or the value in dict2 is not a dictionary,
# replace the value in dict1 with the value from dict2
if save_key and save_key.startswith('Source'):
value.reloaded_with_policy_key = [dict1[key].policy_name]
if dict1[key].reloaded_with_policy_key:
value.reloaded_with_policy_key += dict1[key].reloaded_with_policy_key
dict1[key] = value
else:
dict1[key] = value
else:
# If the key does not exist in dict1, add the key-value pair from dict2 to dict1
dict1[key] = value
def add_to_dict(string, username, gpo_info):
if gpo_info:
counter = gpo_info.counter
display_name = gpo_info.display_name
name = gpo_info.name
version = gpo_info.version
else:
counter = 0
display_name = 'Local Policy'
name = None
version = None
if username is None or username == 'Machine':
machine= '{}/Machine/{}'.format(Dconf_registry._GpoPriority, counter)
dictionary = Dconf_registry.global_registry_dict.setdefault(machine, dict())
else:
if name in Dconf_registry._gpo_name:
return
user = '{}/User/{}'.format(Dconf_registry._GpoPriority, counter)
dictionary = Dconf_registry.global_registry_dict.setdefault(user, dict())
Dconf_registry._gpo_name.add(name)
dictionary['display_name'] = display_name
dictionary['name'] = name
dictionary['version'] = str(version)
dictionary['correct_path'] = string
def get_mod_previous_value(key_source, key_valuename):
previous_sourc = try_dict_to_literal_eval(Dconf_registry._dconf_db
.get(key_source, {})
.get(key_valuename, {}))
return previous_sourc.get('mod_previous_value') if previous_sourc else None
def get_previous_value(key_source, key_valuename):
previous = key_source.replace('Source', 'Previous')
return (Dconf_registry._dconf_db
.get(previous, {})
.get(key_valuename, None))
def load_preg_dconf(pregfile, pathfile, policy_name, username, gpo_info):
'''
Loads the configuration from preg registry into a dictionary
'''
# Prefix for storing key data
source_pre = "Source"
dd = dict()
for i in pregfile.entries:
# Skip this entry if the valuename starts with '**del'
if i.valuename.lower().startswith('**del'):
continue
valuename = convert_string_dconf(i.valuename)
data = check_data(i.data, i.type)
if i.valuename != i.data and i.valuename:
key_registry_source = f"{source_pre}/{i.keyname}".replace('\\', '/')
key_registry = f"{i.keyname}".replace('\\', '/')
key_valuename = valuename.replace('\\', '/')
if i.keyname.replace('\\', '/') in dd:
# If the key exists in dd, update its value with the new key-value pair
dd[i.keyname.replace('\\', '/')].update({key_valuename:data})
mod_previous_value = get_mod_previous_value(key_registry_source, key_valuename)
previous_value = get_previous_value(key_registry, key_valuename)
if previous_value != data:
(dd[key_registry_source]
.update({key_valuename:RegistryKeyMetadata(policy_name, i.type, mod_previous_value=previous_value)}))
else:
(dd[key_registry_source]
.update({key_valuename:RegistryKeyMetadata(policy_name, i.type, mod_previous_value=mod_previous_value)}))
else:
# If the key does not exist in dd, create a new key-value pair
dd[i.keyname.replace('\\', '/')] = {key_valuename:data}
mod_previous_value = get_mod_previous_value(key_registry_source, key_valuename)
previous_value = get_previous_value(key_registry, key_valuename)
if previous_value != data:
dd[key_registry_source] = {key_valuename:RegistryKeyMetadata(policy_name, i.type, mod_previous_value=previous_value)}
else:
dd[key_registry_source] = {key_valuename:RegistryKeyMetadata(policy_name, i.type, mod_previous_value=mod_previous_value)}
elif not i.valuename:
keyname_tmp = i.keyname.replace('\\', '/').split('/')
keyname = '/'.join(keyname_tmp[:-1])
mod_previous_value = get_mod_previous_value(f"{source_pre}/{keyname}", keyname_tmp[-1])
previous_value = get_previous_value(f"{keyname}", keyname_tmp[-1])
if keyname in dd:
# If the key exists in dd, update its value with the new key-value pair
dd[keyname].update({keyname_tmp[-1]:data})
if previous_value != data:
dd[f"{source_pre}/{keyname}"].update({keyname_tmp[-1]:RegistryKeyMetadata(policy_name, i.type, mod_previous_value=previous_value)})
else:
dd[f"{source_pre}/{keyname}"].update({keyname_tmp[-1]:RegistryKeyMetadata(policy_name, i.type, mod_previous_value=mod_previous_value)})
else:
# If the key does not exist in dd, create a new key-value pair
dd[keyname] = {keyname_tmp[-1]:data}
if previous_value != data:
dd[f"{source_pre}/{keyname}"] = {keyname_tmp[-1]:RegistryKeyMetadata(policy_name, i.type, mod_previous_value=previous_value)}
else:
dd[f"{source_pre}/{keyname}"] = {keyname_tmp[-1]:RegistryKeyMetadata(policy_name, i.type, mod_previous_value=mod_previous_value)}
else:
# If the value name is the same as the data,
# split the keyname and add the data to the appropriate location in dd.
all_list_key = i.keyname.split('\\')
key_d ='/'.join(all_list_key[:-1])
dd_target = dd.setdefault(key_d,{})
key_source = f"Source/{key_d}"
dd_target_source = dd.setdefault(key_source, {})
data_list = dd_target.setdefault(all_list_key[-1], []).append(data)
mod_previous_value = get_mod_previous_value(key_source, all_list_key[-1])
previous_value = get_previous_value(key_d, all_list_key[-1])
if previous_value != str(data_list):
dd_target_source[all_list_key[-1]] = RegistryKeyMetadata(policy_name, i.type, is_list=True, mod_previous_value=previous_value)
else:
dd_target_source[all_list_key[-1]] = RegistryKeyMetadata(policy_name, i.type, is_list=True, mod_previous_value=mod_previous_value)
# Update the global registry dictionary with the contents of dd
update_dict(Dconf_registry.global_registry_dict, dd)
def create_dconf_ini_file(filename, data, uid=None, nodomain=None):
'''
Create an ini-file based on a dictionary of dictionaries.
Args:
data (dict): The dictionary of dictionaries containing the data for the ini-file.
filename (str): The filename to save the ini-file.
Returns:
None
Raises:
None
'''
with open(filename, 'a' if nodomain else 'w') as file:
for section, section_data in data.items():
file.write(f'[{section}]\n')
for key, value in section_data.items():
if isinstance(value, int):
file.write(f'{key} = {value}\n')
else:
file.write(f'{key} = "{value}"\n')
file.write('\n')
logdata = dict()
logdata['path'] = filename
log('D209', logdata)
create_dconf_file_locks(filename, data)
Dconf_registry.dconf_update(uid)
def create_dconf_file_locks(filename_ini, data):
"""
Creates a dconf lock file based on the provided filename and data.
:param filename_ini: Path to the ini file (str)
:param data: Dictionary containing configuration data
"""
# Extract the path parts up to the directory of the ini file
tmp_lock = filename_ini.split('/')[:-1]
# Construct the path to the lock file
file_lock = '/'.join(tmp_lock + ['locks', tmp_lock[-1][:-1] + 'pol'])
# Create an empty lock file
touch_file(file_lock)
# Open the lock file for writing
with open(file_lock, 'w') as file:
# Iterate over all lock keys obtained from the data
for key_lock in get_keys_dconf_locks(data):
# Remove the "lock/" prefix from the key and split into parts
key = key_lock.split('/')[1:]
# Write the cleaned key to the lock file
file.write(f'{key}\n')
def get_keys_dconf_locks(data):
"""
Extracts keys from the provided data that start with "Locks/"
and have a value of 1.
:param data: Dictionary containing configuration data
:return: List of lock keys (str) without the "Locks/" prefix
"""
result = []
# Flatten the nested dictionary into a single-level dictionary
flatten_data = flatten_dictionary(data)
# Iterate through all keys in the flattened dictionary
for key in flatten_data:
# Check if the key starts with "Locks/" and its value is 1
if key.startswith('Locks/') and flatten_data[key] == 1:
# Remove the "Locks" prefix and append to the result
result.append(key.removeprefix('Locks'))
return result
def check_data(data, t_data):
if isinstance(data, bytes):
if t_data == 7:
return clean_data(data.decode('utf-16').replace('\x00',''))
else:
return None
elif t_data == 4:
return data
return clean_data(data)
def convert_string_dconf(input_string):
macros = {
'#': '%sharp%',
';': '%semicolon%',
'//': '%doubleslash%',
'/': '%oneslash%'
}
output_string = input_string
for key, value in macros.items():
if key in input_string:
output_string = input_string.replace(key, value)
elif value in input_string:
output_string = input_string.replace(value, key)
return output_string
def remove_empty_values(input_list):
return list(filter(None, input_list))
def flatten_dictionary(input_dict, result=None, current_key=''):
if result is None:
result = {}
for key, value in input_dict.items():
new_key = f"{current_key}/{key}" if current_key else key
if isinstance(value, dict):
flatten_dictionary(value, result, new_key)
else:
result[new_key] = value
return result
def get_dconf_envprofile():
dconf_envprofile = {'default': {'DCONF_PROFILE': 'default'},
'local': {'DCONF_PROFILE': 'local'},
'system': {'DCONF_PROFILE': 'system'}
}
if Dconf_registry._envprofile:
return dconf_envprofile.get(Dconf_registry._envprofile, dconf_envprofile['system'])
if not Dconf_registry._username:
return dconf_envprofile['system']
profile = '/run/dconf/user/{}'.format(get_uid_by_username(Dconf_registry._username))
return {'DCONF_PROFILE': profile}
def convert_elements_to_list_dicts(elements):
return list(map(lambda x: dict(x), elements))
def remove_duplicate_dicts_in_list(list_dict):
return convert_elements_to_list_dicts(list(OrderedDict((tuple(sorted(d.items())), d) for d in list_dict).values()))
def add_preferences_to_global_registry_dict(username, is_machine):
if is_machine:
prefix = 'Software/BaseALT/Policies/Preferences/Machine'
else:
prefix = f'Software/BaseALT/Policies/Preferences/{username}'
preferences_global = [('Shortcuts',remove_duplicate_dicts_in_list(Dconf_registry.shortcuts)),
('Folders',remove_duplicate_dicts_in_list(Dconf_registry.folders)),
('Files',remove_duplicate_dicts_in_list(Dconf_registry.files)),
('Drives',remove_duplicate_dicts_in_list(Dconf_registry.drives)),
('Scheduledtasks',remove_duplicate_dicts_in_list(Dconf_registry.scheduledtasks)),
('Environmentvariables',remove_duplicate_dicts_in_list(Dconf_registry.environmentvariables)),
('Inifiles',remove_duplicate_dicts_in_list(Dconf_registry.inifiles)),
('Services',remove_duplicate_dicts_in_list(Dconf_registry.services)),
('Printers',remove_duplicate_dicts_in_list(Dconf_registry.printers)),
('Scripts',remove_duplicate_dicts_in_list(Dconf_registry.scripts)),
('Networkshares',remove_duplicate_dicts_in_list(Dconf_registry.networkshares))]
preferences_global_dict = dict()
preferences_global_dict[prefix] = dict()
for key, val in preferences_global:
preferences_global_dict[prefix].update({key:clean_data(str(val))})
update_dict(Dconf_registry.global_registry_dict, preferences_global_dict)
def extract_display_name_version(data, username):
policy_force = data.get('Software/BaseALT/Policies/GPUpdate', {}).get('Force', False)
if Dconf_registry._force or policy_force:
logdata = dict({'username': username})
log('W26', logdata)
return {}
result = {}
tmp = {}
if isinstance(data, dict):
for key in data.keys():
if key.startswith(Dconf_registry._GpoPriority+'/'):
tmp[key] = data[key]
for value in tmp.values():
if isinstance(value, dict) and value.get('version', 'None')!='None' and value.get('display_name'):
result[value['display_name']] = {'version': value['version'], 'correct_path': value['correct_path']}
Dconf_registry._dict_gpo_name_version_cache = result
return result

View File

@ -1,7 +1,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2021 BaseALT Ltd. <org@basealt.ru> # Copyright (C) 2021-2024 BaseALT Ltd. <org@basealt.ru>
# Copyright (C) 2021 Igor Chudov <nir@nir.org.ru> # Copyright (C) 2021 Igor Chudov <nir@nir.org.ru>
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
@ -19,35 +19,48 @@
import os import os
import os.path import os.path
import tempfile
from pathlib import Path from pathlib import Path
import smbc import smbc
from util.logging import log from util.logging import log
from util.paths import file_cache_dir, UNCPath from util.paths import file_cache_dir, file_cache_path_home, UNCPath
from util.exceptions import NotUNCPathError from util.exceptions import NotUNCPathError
from util.util import get_machine_name
class fs_file_cache: class fs_file_cache:
__read_blocksize = 4096 __read_blocksize = 4096
def __init__(self, cache_name): def __init__(self, cache_name, username = None):
self.cache_name = cache_name self.cache_name = cache_name
self.storage_uri = file_cache_dir() self.username = username
if username and username != get_machine_name():
try:
self.storage_uri = file_cache_path_home(username)
except:
self.storage_uri = file_cache_dir()
else:
self.storage_uri = file_cache_dir()
logdata = dict({'cache_file': self.storage_uri}) logdata = dict({'cache_file': self.storage_uri})
log('D20', logdata) log('D20', logdata)
self.samba_context = smbc.Context(use_kerberos=1) self.samba_context = smbc.Context(use_kerberos=1)
#, debug=10) #, debug=10)
def store(self, uri): def store(self, uri, destfile = None):
destdir = uri
try: try:
uri_path = UNCPath(uri) uri_path = UNCPath(uri)
file_name = os.path.basename(uri_path.get_path()) if not destfile:
file_path = os.path.dirname(uri_path.get_path()) file_name = os.path.basename(uri_path.get_path())
destdir = Path('{}/{}/{}'.format(self.storage_uri, file_path = os.path.dirname(uri_path.get_path())
uri_path.get_domain(), destdir = Path('{}/{}/{}'.format(self.storage_uri,
file_path)) uri_path.get_domain(),
file_path))
else:
destdir = destfile.parent
except NotUNCPathError:
return None
except Exception as exc: except Exception as exc:
logdata = dict({'exception': str(exc)}) logdata = dict({'exception': str(exc)})
log('D144', logdata) log('D144', logdata)
@ -56,20 +69,29 @@ class fs_file_cache:
if not destdir.exists(): if not destdir.exists():
destdir.mkdir(parents=True, exist_ok=True) destdir.mkdir(parents=True, exist_ok=True)
destfile = Path('{}/{}/{}'.format(self.storage_uri, if not destfile:
uri_path.get_domain(), destfile = Path('{}/{}/{}'.format(self.storage_uri,
uri_path.get_path())) uri_path.get_domain(),
uri_path.get_path()))
with open(destfile, 'wb') as df: try:
df.truncate() fd, tmpfile = tempfile.mkstemp('', str(destfile))
df.flush() df = os.fdopen(fd, 'wb')
file_handler = self.samba_context.open(str(uri_path), os.O_RDONLY) file_handler = self.samba_context.open(str(uri_path), os.O_RDONLY)
while True: while True:
data = file_handler.read(self.__read_blocksize) data = file_handler.read(self.__read_blocksize)
if not data: if not data:
break break
df.write(data) df.write(data)
df.flush() df.close()
os.rename(tmpfile, destfile)
os.chmod(destfile, 0o644)
except Exception as exc:
logdata = dict({'exception': str(exc)})
log('W25', logdata)
tmppath = Path(tmpfile)
if tmppath.exists():
tmppath.unlink()
def get(self, uri): def get(self, uri):
destfile = uri destfile = uri
@ -87,8 +109,10 @@ class fs_file_cache:
logdata = dict({'exception': str(exc)}) logdata = dict({'exception': str(exc)})
log('E36', logdata) log('E36', logdata)
raise exc raise exc
if Path(destfile).exists():
return str(destfile) return str(destfile)
else:
return None
def get_ls_smbdir(self, uri): def get_ls_smbdir(self, uri):
type_file_smb = 8 type_file_smb = 8

View File

@ -1,260 +0,0 @@
#
# GPOA - GPO Applier for Linux
#
# Copyright (C) 2019-2020 BaseALT Ltd.
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
class samba_preg(object):
'''
Object mapping representing HKLM entry (registry key without SID)
'''
def __init__(self, preg_obj, policy_name):
self.policy_name = policy_name
self.keyname = preg_obj.keyname
self.valuename = preg_obj.valuename
self.hive_key = '{}\\{}'.format(self.keyname, self.valuename)
self.type = preg_obj.type
self.data = preg_obj.data
def update_fields(self):
fields = dict()
fields['policy_name'] = self.policy_name
fields['type'] = self.type
fields['data'] = self.data
return fields
class samba_hkcu_preg(object):
'''
Object mapping representing HKCU entry (registry key with SID)
'''
def __init__(self, sid, preg_obj, policy_name):
self.sid = sid
self.policy_name = policy_name
self.keyname = preg_obj.keyname
self.valuename = preg_obj.valuename
self.hive_key = '{}\\{}'.format(self.keyname, self.valuename)
self.type = preg_obj.type
self.data = preg_obj.data
def update_fields(self):
fields = dict()
fields['policy_name'] = self.policy_name
fields['type'] = self.type
fields['data'] = self.data
return fields
class ad_shortcut(object):
'''
Object mapping representing Windows shortcut.
'''
def __init__(self, sid, sc, policy_name):
self.sid = sid
self.policy_name = policy_name
self.path = sc.dest
self.shortcut = sc.to_json()
def update_fields(self):
fields = dict()
fields['policy_name'] = self.policy_name
fields['path'] = self.path
fields['shortcut'] = self.shortcut
return fields
class info_entry(object):
def __init__(self, name, value):
self.name = name
self.value = value
def update_fields(self):
fields = dict()
fields['value'] = self.value
return fields
class printer_entry(object):
'''
Object mapping representing Windows printer of some type.
'''
def __init__(self, sid, pobj, policy_name):
self.sid = sid
self.policy_name = policy_name
self.name = pobj.name
self.printer = pobj.to_json()
def update_fields(self):
fields = dict()
fields['policy_name'] = self.policy_name
fields['name'] = self.name
fields['printer'] = self.printer.to_json()
return fields
class drive_entry(object):
'''
Object mapping representing Samba share bound to drive letter
'''
def __init__(self, sid, dobj, policy_name):
self.sid = sid
self.policy_name = policy_name
self.login = dobj.login
self.password = dobj.password
self.dir = dobj.dir
self.path = dobj.path
def update_fields(self):
fields = dict()
fields['policy_name'] = self.policy_name
fields['login'] = self.login
fields['password'] = self.password
fields['dir'] = self.dir
fields['path'] = self.path
return fields
class folder_entry(object):
'''
Object mapping representing file system directory
'''
def __init__(self, sid, fobj, policy_name):
self.sid = sid
self.policy_name = policy_name
self.path = fobj.path
self.action = fobj.action.value
self.delete_folder = str(fobj.delete_folder)
self.delete_sub_folders = str(fobj.delete_sub_folders)
self.delete_files = str(fobj.delete_files)
def update_fields(self):
'''
Return list of fields to update
'''
fields = dict()
fields['policy_name'] = self.policy_name
fields['action'] = self.action
fields['delete_folder'] = self.delete_folder
fields['delete_sub_folders'] = self.delete_sub_folders
fields['delete_files'] = self.delete_files
return fields
class envvar_entry(object):
'''
Object mapping representing environment variables
'''
def __init__(self, sid, evobj, policy_name):
self.sid = sid
self.policy_name = policy_name
self.name = evobj.name
self.value = evobj.value
self.action = evobj.action.value
def update_fields(self):
'''
Return list of fields to update
'''
fields = dict()
fields['policy_name'] = self.policy_name
fields['action'] = self.action
fields['value'] = self.value
return fields
class script_entry(object):
'''
Object mapping representing scripts.ini
'''
def __init__(self, sid, scrobj, policy_name):
self.sid = sid
self.policy_name = policy_name
self.action = scrobj.action
self.number = scrobj.number
self.path = scrobj.path
self.arg = scrobj.args
def update_fields(self):
'''
Return list of fields to update
'''
fields = dict()
fields['policy_name'] = self.policy_name
fields['action'] = self.action
fields['number'] = self.number
fields['path'] = self.path
fields['arg'] = self.arg
return fields
class file_entry(object):
'''
Object mapping representing FILES.XML
'''
def __init__(self, sid, scrobj, policy_name):
self.sid = sid
self.policy_name = policy_name
self.action = scrobj.action
self.fromPath = scrobj.fromPath
self.targetPath = scrobj.targetPath
self.readOnly = scrobj.readOnly
self.archive = scrobj.archive
self.hidden = scrobj.hidden
self.suppress = scrobj.suppress
def update_fields(self):
'''
Return list of fields to update
'''
fields = dict()
fields['policy_name'] = self.policy_name
fields['action'] = self.action
fields['fromPath'] = self.fromPath
fields['targetPath'] = self.targetPath
fields['readOnly'] = self.readOnly
fields['archive'] = self.archive
fields['hidden'] = self.hidden
fields['suppress'] = self.suppress
return fields
class ini_entry(object):
'''
Object mapping representing INIFILES.XML
'''
def __init__(self, sid, iniobj, policy_name):
self.sid = sid
self.policy_name = policy_name
self.action = iniobj.action
self.path = iniobj.path
self.section = iniobj.section
self.property = iniobj.property
self.value = iniobj.value
def update_fields(self):
'''
Return list of fields to update
'''
fields = dict()
fields['policy_name'] = self.policy_name
fields['action'] = self.action
fields['path'] = self.path
fields['section'] = self.section
fields['property'] = self.property
fields['value'] = self.value
return fields

View File

@ -1,101 +0,0 @@
#
# GPOA - GPO Applier for Linux
#
# Copyright (C) 2019-2020 BaseALT Ltd.
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
from .cache import cache
import os
from sqlalchemy import (
create_engine,
Table,
Column,
Integer,
String,
MetaData
)
from sqlalchemy.orm import (
mapper,
sessionmaker
)
from util.logging import log
from util.paths import cache_dir
def mapping_factory(mapper_suffix):
exec(
'''
class mapped_id_{}(object):
def __init__(self, str_id, value):
self.str_id = str_id
self.value = str(value)
'''.format(mapper_suffix)
)
return eval('mapped_id_{}'.format(mapper_suffix))
class sqlite_cache(cache):
def __init__(self, cache_name):
self.cache_name = cache_name
self.mapper_obj = mapping_factory(self.cache_name)
self.storage_uri = os.path.join('sqlite:///{}/{}.sqlite'.format(cache_dir(), self.cache_name))
logdata = dict({'cache_file': self.storage_uri})
log('D20', logdata)
self.db_cnt = create_engine(self.storage_uri, echo=False)
self.__metadata = MetaData(self.db_cnt)
self.cache_table = Table(
self.cache_name,
self.__metadata,
Column('id', Integer, primary_key=True),
Column('str_id', String(65536), unique=True),
Column('value', String)
)
self.__metadata.create_all(self.db_cnt)
Session = sessionmaker(bind=self.db_cnt)
self.db_session = Session()
mapper(self.mapper_obj, self.cache_table)
def store(self, str_id, value):
obj = self.mapper_obj(str_id, value)
self._upsert(obj)
def get(self, obj_id):
result = self.db_session.query(self.mapper_obj).filter(self.mapper_obj.str_id == obj_id).first()
return result
def get_default(self, obj_id, default_value):
result = self.get(obj_id)
if result == None:
logdata = dict()
logdata['object'] = obj_id
log('D43', logdata)
self.store(obj_id, default_value)
return str(default_value)
return result.value
def _upsert(self, obj):
try:
self.db_session.add(obj)
self.db_session.commit()
except Exception as exc:
self.db_session.rollback()
logdata = dict()
logdata['msg'] = str(exc)
log('D44', logdata)
self.db_session.query(self.mapper_obj).filter(self.mapper_obj.str_id == obj.str_id).update({ 'value': obj.value })
self.db_session.commit()

View File

@ -1,576 +0,0 @@
#
# GPOA - GPO Applier for Linux
#
# Copyright (C) 2019-2020 BaseALT Ltd.
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
import os
from sqlalchemy import (
create_engine,
Table,
Column,
Integer,
String,
MetaData,
UniqueConstraint
)
from sqlalchemy.orm import (
mapper,
sessionmaker
)
from util.logging import log
from util.paths import cache_dir
from .registry import registry
from .record_types import (
samba_preg
, samba_hkcu_preg
, ad_shortcut
, info_entry
, printer_entry
, drive_entry
, folder_entry
, envvar_entry
, script_entry
, file_entry
, ini_entry
)
class sqlite_registry(registry):
def __init__(self, db_name, registry_cache_dir=None):
self.db_name = db_name
cdir = registry_cache_dir
if cdir == None:
cdir = cache_dir()
self.db_path = os.path.join('sqlite:///{}/{}.sqlite'.format(cdir, self.db_name))
self.db_cnt = create_engine(self.db_path, echo=False)
self.__metadata = MetaData(self.db_cnt)
self.__info = Table(
'info',
self.__metadata,
Column('id', Integer, primary_key=True),
Column('name', String(65536), unique=True),
Column('value', String(65536))
)
self.__hklm = Table(
'HKLM'
, self.__metadata
, Column('id', Integer, primary_key=True)
, Column('hive_key', String(65536, collation='NOCASE'),
unique=True)
, Column('keyname', String(collation='NOCASE'))
, Column('valuename', String(collation='NOCASE'))
, Column('policy_name', String)
, Column('type', Integer)
, Column('data', String)
)
self.__hkcu = Table(
'HKCU'
, self.__metadata
, Column('id', Integer, primary_key=True)
, Column('sid', String)
, Column('hive_key', String(65536, collation='NOCASE'))
, Column('keyname', String(collation='NOCASE'))
, Column('valuename', String(collation='NOCASE'))
, Column('policy_name', String)
, Column('type', Integer)
, Column('data', String)
, UniqueConstraint('sid', 'hive_key')
)
self.__shortcuts = Table(
'Shortcuts'
, self.__metadata
, Column('id', Integer, primary_key=True)
, Column('sid', String)
, Column('path', String)
, Column('policy_name', String)
, Column('shortcut', String)
, UniqueConstraint('sid', 'path')
)
self.__printers = Table(
'Printers'
, self.__metadata
, Column('id', Integer, primary_key=True)
, Column('sid', String)
, Column('name', String)
, Column('policy_name', String)
, Column('printer', String)
, UniqueConstraint('sid', 'name')
)
self.__drives = Table(
'Drives'
, self.__metadata
, Column('id', Integer, primary_key=True)
, Column('sid', String)
, Column('login', String)
, Column('password', String)
, Column('dir', String)
, Column('policy_name', String)
, Column('path', String)
, UniqueConstraint('sid', 'dir')
)
self.__folders = Table(
'Folders'
, self.__metadata
, Column('id', Integer, primary_key=True)
, Column('sid', String)
, Column('path', String)
, Column('policy_name', String)
, Column('action', String)
, Column('delete_folder', String)
, Column('delete_sub_folders', String)
, Column('delete_files', String)
, UniqueConstraint('sid', 'path')
)
self.__envvars = Table(
'Envvars'
, self.__metadata
, Column('id', Integer, primary_key=True)
, Column('sid', String)
, Column('name', String)
, Column('policy_name', String)
, Column('action', String)
, Column('value', String)
, UniqueConstraint('sid', 'name')
)
self.__scripts = Table(
'Scripts'
, self.__metadata
, Column('id', Integer, primary_key=True)
, Column('sid', String)
, Column('policy_name', String)
, Column('number', String)
, Column('action', String)
, Column('path', String)
, Column('arg', String)
, UniqueConstraint('sid', 'path', 'arg')
)
self.__files = Table(
'Files'
, self.__metadata
, Column('id', Integer, primary_key=True)
, Column('sid', String)
, Column('policy_name', String)
, Column('action', String)
, Column('fromPath', String)
, Column('targetPath', String)
, Column('readOnly', String)
, Column('archive', String)
, Column('hidden', String)
, Column('suppress', String)
, UniqueConstraint('sid', 'policy_name', 'targetPath', 'fromPath')
)
self.__ini = Table(
'Ini'
, self.__metadata
, Column('id', Integer, primary_key=True)
, Column('sid', String)
, Column('policy_name', String)
, Column('action', String)
, Column('path', String)
, Column('section', String)
, Column('property', String)
, Column('value', String)
, UniqueConstraint('sid', 'action', 'path', 'section', 'property', 'value')
)
self.__metadata.create_all(self.db_cnt)
Session = sessionmaker(bind=self.db_cnt)
self.db_session = Session()
try:
mapper(info_entry, self.__info)
mapper(samba_preg, self.__hklm)
mapper(samba_hkcu_preg, self.__hkcu)
mapper(ad_shortcut, self.__shortcuts)
mapper(printer_entry, self.__printers)
mapper(drive_entry, self.__drives)
mapper(folder_entry, self.__folders)
mapper(envvar_entry, self.__envvars)
mapper(script_entry, self.__scripts)
mapper(file_entry, self.__files)
mapper(ini_entry, self.__ini)
except:
pass
#logging.error('Error creating mapper')
def _add(self, row):
try:
self.db_session.add(row)
self.db_session.commit()
except Exception as exc:
self.db_session.rollback()
raise exc
def _info_upsert(self, row):
try:
self._add(row)
except:
(self
.db_session.query(info_entry)
.filter(info_entry.name == row.name)
.update(row.update_fields()))
self.db_session.commit()
def _hklm_upsert(self, row):
try:
self._add(row)
except:
(self
.db_session
.query(samba_preg)
.filter(samba_preg.hive_key == row.hive_key)
.update(row.update_fields()))
self.db_session.commit()
def _hkcu_upsert(self, row):
try:
self._add(row)
except Exception as exc:
(self
.db_session
.query(samba_hkcu_preg)
.filter(samba_hkcu_preg.sid == row.sid)
.filter(samba_hkcu_preg.hive_key == row.hive_key)
.update(row.update_fields()))
self.db_session.commit()
def _shortcut_upsert(self, row):
try:
self._add(row)
except:
(self
.db_session
.query(ad_shortcut)
.filter(ad_shortcut.sid == row.sid)
.filter(ad_shortcut.path == row.path)
.update(row.update_fields()))
self.db_session.commit()
def _printer_upsert(self, row):
try:
self._add(row)
except:
(self
.db_session
.query(printer_entry)
.filter(printer_entry.sid == row.sid)
.filter(printer_entry.name == row.name)
.update(row.update_fields()))
self.db_session.commit()
def _drive_upsert(self, row):
try:
self._add(row)
except:
(self
.db_session
.query(drive_entry)
.filter(drive_entry.sid == row.sid)
.filter(drive_entry.dir == row.dir)
.update(row.update_fields()))
self.db_session.commit()
def set_info(self, name, value):
ientry = info_entry(name, value)
logdata = dict()
logdata['varname'] = name
logdata['value'] = value
log('D19', logdata)
self._info_upsert(ientry)
def _delete_hklm_keyname(self, keyname):
'''
Delete PReg hive_key from HKEY_LOCAL_MACHINE
'''
logdata = dict({'keyname': keyname})
try:
(self
.db_session
.query(samba_preg)
.filter(samba_preg.keyname == keyname)
.delete(synchronize_session=False))
self.db_session.commit()
log('D65', logdata)
except Exception as exc:
log('D63', logdata)
def add_hklm_entry(self, preg_entry, policy_name):
'''
Write PReg entry to HKEY_LOCAL_MACHINE
'''
pentry = samba_preg(preg_entry, policy_name)
if not pentry.valuename.startswith('**'):
self._hklm_upsert(pentry)
else:
logdata = dict({'key': pentry.hive_key})
if pentry.valuename.lower() == '**delvals.':
self._delete_hklm_keyname(pentry.keyname)
else:
log('D27', logdata)
def _delete_hkcu_keyname(self, keyname, sid):
'''
Delete PReg hive_key from HKEY_CURRENT_USER
'''
logdata = dict({'sid': sid, 'keyname': keyname})
try:
(self
.db_session
.query(samba_hkcu_preg)
.filter(samba_hkcu_preg.sid == sid)
.filter(samba_hkcu_preg.keyname == keyname)
.delete(synchronize_session=False))
self.db_session.commit()
log('D66', logdata)
except:
log('D64', logdata)
def add_hkcu_entry(self, preg_entry, sid, policy_name):
'''
Write PReg entry to HKEY_CURRENT_USER
'''
hkcu_pentry = samba_hkcu_preg(sid, preg_entry, policy_name)
logdata = dict({'sid': sid, 'policy': policy_name, 'key': hkcu_pentry.hive_key})
if not hkcu_pentry.valuename.startswith('**'):
log('D26', logdata)
self._hkcu_upsert(hkcu_pentry)
else:
if hkcu_pentry.valuename.lower() == '**delvals.':
self._delete_hkcu_keyname(hkcu_pentry.keyname, sid)
else:
log('D51', logdata)
def add_shortcut(self, sid, sc_obj, policy_name):
'''
Store shortcut information in the database
'''
sc_entry = ad_shortcut(sid, sc_obj, policy_name)
logdata = dict()
logdata['link'] = sc_entry.path
logdata['sid'] = sid
log('D41', logdata)
self._shortcut_upsert(sc_entry)
def add_printer(self, sid, pobj, policy_name):
'''
Store printer configuration in the database
'''
prn_entry = printer_entry(sid, pobj, policy_name)
logdata = dict()
logdata['printer'] = prn_entry.name
logdata['sid'] = sid
log('D40', logdata)
self._printer_upsert(prn_entry)
def add_drive(self, sid, dobj, policy_name):
drv_entry = drive_entry(sid, dobj, policy_name)
logdata = dict()
logdata['uri'] = drv_entry.path
logdata['sid'] = sid
log('D39', logdata)
self._drive_upsert(drv_entry)
def add_folder(self, sid, fobj, policy_name):
fld_entry = folder_entry(sid, fobj, policy_name)
logdata = dict()
logdata['folder'] = fld_entry.path
logdata['sid'] = sid
log('D42', logdata)
try:
self._add(fld_entry)
except Exception as exc:
(self
._filter_sid_obj(folder_entry, sid)
.filter(folder_entry.path == fld_entry.path)
.update(fld_entry.update_fields()))
self.db_session.commit()
def add_envvar(self, sid, evobj, policy_name):
ev_entry = envvar_entry(sid, evobj, policy_name)
logdata = dict()
logdata['envvar'] = ev_entry.name
logdata['sid'] = sid
log('D53', logdata)
try:
self._add(ev_entry)
except Exception as exc:
(self
._filter_sid_obj(envvar_entry, sid)
.filter(envvar_entry.name == ev_entry.name)
.update(ev_entry.update_fields()))
self.db_session.commit()
def add_script(self, sid, scrobj, policy_name):
scr_entry = script_entry(sid, scrobj, policy_name)
logdata = dict()
logdata['script path'] = scrobj.path
logdata['sid'] = sid
log('D153', logdata)
try:
self._add(scr_entry)
except Exception as exc:
(self
._filter_sid_obj(script_entry, sid)
.filter(script_entry.path == scr_entry.path)
.update(scr_entry.update_fields()))
self.db_session.commit()
def add_file(self, sid, fileobj, policy_name):
f_entry = file_entry(sid, fileobj, policy_name)
logdata = dict()
logdata['targetPath'] = f_entry.targetPath
logdata['fromPath'] = f_entry.fromPath
log('D162', logdata)
try:
self._add(f_entry)
except Exception as exc:
(self
._filter_sid_obj(file_entry, sid)
.filter(file_entry.targetPath == f_entry.targetPath)
.update(f_entry.update_fields()))
self.db_session.commit()
def add_ini(self, sid, iniobj, policy_name):
inientry = ini_entry(sid, iniobj, policy_name)
logdata = dict()
logdata['path'] = inientry.path
logdata['action'] = inientry.action
log('D177', logdata)
try:
self._add(inientry)
except Exception as exc:
(self
._filter_sid_obj(ini_entry, sid)
.filter(ini_entry.path == inientry.path)
.update(inientry.update_fields()))
self.db_session.commit()
def _filter_sid_obj(self, row_object, sid):
res = (self
.db_session
.query(row_object)
.filter(row_object.sid == sid))
return res
def _filter_sid_list(self, row_object, sid):
res = (self
.db_session
.query(row_object)
.filter(row_object.sid == sid)
.order_by(row_object.id)
.all())
return res
def get_shortcuts(self, sid):
return self._filter_sid_list(ad_shortcut, sid)
def get_printers(self, sid):
return self._filter_sid_list(printer_entry, sid)
def get_drives(self, sid):
return self._filter_sid_list(drive_entry, sid)
def get_folders(self, sid):
return self._filter_sid_list(folder_entry, sid)
def get_envvars(self, sid):
return self._filter_sid_list(envvar_entry, sid)
def _filter_scripts_list(self, row_object, sid, action):
res = (self
.db_session
.query(row_object)
.filter(row_object.sid == sid)
.filter(row_object.action == action)
.order_by(row_object.id)
.all())
return res
def get_scripts(self, sid, action):
return self._filter_scripts_list(script_entry, sid, action)
def get_files(self, sid):
return self._filter_sid_list(file_entry, sid)
def get_ini(self, sid):
return self._filter_sid_list(ini_entry, sid)
def get_hkcu_entry(self, sid, hive_key):
res = (self
.db_session
.query(samba_hkcu_preg)
.filter(samba_hkcu_preg.sid == sid)
.filter(samba_hkcu_preg.hive_key == hive_key)
.first())
# Try to get the value from machine SID as a default if no option is set.
if not res:
machine_sid = self.get_info('machine_sid')
res = self.db_session.query(samba_hkcu_preg).filter(samba_hkcu_preg.sid == machine_sid).filter(samba_hkcu_preg.hive_key == hive_key).first()
return res
def filter_hkcu_entries(self, sid, startswith):
res = (self
.db_session
.query(samba_hkcu_preg)
.filter(samba_hkcu_preg.sid == sid)
.filter(samba_hkcu_preg.hive_key.like(startswith)))
return res
def get_info(self, name):
res = (self
.db_session
.query(info_entry)
.filter(info_entry.name == name)
.first())
return res.value
def get_hklm_entry(self, hive_key):
res = (self
.db_session
.query(samba_preg)
.filter(samba_preg.hive_key == hive_key)
.first())
return res
def filter_hklm_entries(self, startswith):
res = (self
.db_session
.query(samba_preg)
.filter(samba_preg.hive_key.like(startswith)))
return res
def wipe_user(self, sid):
self._wipe_sid(samba_hkcu_preg, sid)
self._wipe_sid(ad_shortcut, sid)
self._wipe_sid(printer_entry, sid)
self._wipe_sid(drive_entry, sid)
self._wipe_sid(script_entry, sid)
self._wipe_sid(file_entry, sid)
self._wipe_sid(ini_entry, sid)
def _wipe_sid(self, row_object, sid):
(self
.db_session
.query(row_object)
.filter(row_object.sid == sid)
.delete())
self.db_session.commit()
def wipe_hklm(self):
self.db_session.query(samba_preg).delete()
self.db_session.commit()

View File

@ -0,0 +1,63 @@
{#
# GPOA - GPO Applier for Linux
#
# Copyright (C) 2019-2022 BaseALT Ltd.
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
#}
{% if No|length %}
polkit.addRule(function (action, subject) {
if ({% for res in No -%}
action.id == "{{res}}"{% if No|length == loop.index %}){ {% else %} ||{% endif %}
{% endfor %} return polkit.Result.NO;
}
});
{% endif %}{% if Yes|length %}
polkit.addRule(function (action, subject) {
if ({% for res in Yes -%}
action.id == "{{res}}"{% if Yes|length == loop.index %}){ {% else %} ||{% endif %}
{% endfor %} return polkit.Result.YES;
}
});
{% endif %}{% if Auth_self|length %}
polkit.addRule(function (action, subject) {
if ({% for res in Auth_self -%}
action.id == "{{res}}"{% if Auth_self|length == loop.index %}){ {% else %} ||{% endif %}
{% endfor %} return polkit.Result.AUTH_SELF;
}
});
{% endif %}{% if Auth_admin|length %}
polkit.addRule(function (action, subject) {
if ({% for res in Auth_admin -%}
action.id == "{{res}}"{% if Auth_admin|length == loop.index %}){ {% else %} ||{% endif %}
{% endfor %} return polkit.Result.AUTH_ADMIN;
}
});
{% endif %}{% if Auth_self_keep|length %}
polkit.addRule(function (action, subject) {
if ({% for res in Auth_self_keep -%}
action.id == "{{res}}"{% if Auth_self_keep|length == loop.index %}){ {% else %} ||{% endif %}
{% endfor %} return polkit.Result.AUTH_SELF_KEEP;
}
});
{% endif %}{% if Auth_admin_keep|length %}
polkit.addRule(function (action, subject) {
if ({% for res in Auth_admin_keep -%}
action.id == "{{res}}"{% if Auth_admin_keep|length == loop.index %}){ {% else %} ||{% endif %}
{% endfor %} return polkit.Result.AUTH_ADMIN_KEEP;
}
});
{% endif %}

View File

@ -0,0 +1,63 @@
{#
# GPOA - GPO Applier for Linux
#
# Copyright (C) 2019-2022 BaseALT Ltd.
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
#}
{% if No|length %}
polkit.addRule(function (action, subject) {
if ({% for res in No -%}
action.id == "{{res}}" {% if No|length == loop.index %}&&{% else %}||{% endif %}
{% endfor %}subject.user == "{{User}}") {
return polkit.Result.NO;
}
});{% endif %}{% if Yes|length %}
polkit.addRule(function (action, subject) {
if ({% for res in Yes -%}
action.id == "{{res}}" {% if Yes|length == loop.index %}&&{% else %}||{% endif %}
{% endfor %}subject.user == "{{User}}") {
return polkit.Result.YES;
}
});{% endif %}{% if Auth_self|length %}
polkit.addRule(function (action, subject) {
if ({% for res in Auth_self -%}
action.id == "{{res}}" {% if Auth_self|length == loop.index %}&&{% else %}||{% endif %}
{% endfor %}subject.user == "{{User}}") {
return polkit.Result.AUTH_SELF;
}
});{% endif %}{% if Auth_admin|length %}
polkit.addRule(function (action, subject) {
if ({% for res in Auth_admin -%}
action.id == "{{res}}" {% if Auth_admin|length == loop.index %}&&{% else %}||{% endif %}
{% endfor %}subject.user == "{{User}}") {
return polkit.Result.AUTH_ADMIN;
}
});{% endif %}{% if Auth_self_keep|length %}
polkit.addRule(function (action, subject) {
if ({% for res in Auth_self_keep -%}
action.id == "{{res}}" {% if Auth_self_keep|length == loop.index %}&&{% else %}||{% endif %}
{% endfor %}subject.user == "{{User}}") {
return polkit.Result.AUTH_SELF_KEEP;
}
});{% endif %}{% if Auth_admin_keep|length %}
polkit.addRule(function (action, subject) {
if ({% for res in Auth_admin_keep -%}
action.id == "{{res}}" {% if Auth_admin_keep|length == loop.index %}&&{% else %}||{% endif %}
{% endfor %}subject.user == "{{User}}") {
return polkit.Result.AUTH_ADMIN_KEEP;
}
});
{% endif %}

View File

@ -17,7 +17,7 @@
# along with this program. If not, see <http://www.gnu.org/licenses/>. # along with this program. If not, see <http://www.gnu.org/licenses/>.
#} #}
{% if Deny_All == '1' %} {% if Deny_All == 1 %}
polkit.addRule(function (action, subject) { polkit.addRule(function (action, subject) {
if ((action.id == "org.freedesktop.udisks2.filesystem-mount" || if ((action.id == "org.freedesktop.udisks2.filesystem-mount" ||
action.id == "org.freedesktop.udisks2.filesystem-mount-system" || action.id == "org.freedesktop.udisks2.filesystem-mount-system" ||

View File

@ -0,0 +1,63 @@
{#
# GPOA - GPO Applier for Linux
#
# Copyright (C) 2019-2022 BaseALT Ltd.
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
#}
{% if No|length %}
polkit.addRule(function (action, subject) {
if ({% for res in No -%}
action.id == "{{res}}"{% if No|length == loop.index %}){ {% else %} ||{% endif %}
{% endfor %} return polkit.Result.NO;
}
});
{% endif %}{% if Yes|length %}
polkit.addRule(function (action, subject) {
if ({% for res in Yes -%}
action.id == "{{res}}"{% if Yes|length == loop.index %}){ {% else %} ||{% endif %}
{% endfor %} return polkit.Result.YES;
}
});
{% endif %}{% if Auth_self|length %}
polkit.addRule(function (action, subject) {
if ({% for res in Auth_self -%}
action.id == "{{res}}"{% if Auth_self|length == loop.index %}){ {% else %} ||{% endif %}
{% endfor %} return polkit.Result.AUTH_SELF;
}
});
{% endif %}{% if Auth_admin|length %}
polkit.addRule(function (action, subject) {
if ({% for res in Auth_admin -%}
action.id == "{{res}}"{% if Auth_admin|length == loop.index %}){ {% else %} ||{% endif %}
{% endfor %} return polkit.Result.AUTH_ADMIN;
}
});
{% endif %}{% if Auth_self_keep|length %}
polkit.addRule(function (action, subject) {
if ({% for res in Auth_self_keep -%}
action.id == "{{res}}"{% if Auth_self_keep|length == loop.index %}){ {% else %} ||{% endif %}
{% endfor %} return polkit.Result.AUTH_SELF_KEEP;
}
});
{% endif %}{% if Auth_admin_keep|length %}
polkit.addRule(function (action, subject) {
if ({% for res in Auth_admin_keep -%}
action.id == "{{res}}"{% if Auth_admin_keep|length == loop.index %}){ {% else %} ||{% endif %}
{% endfor %} return polkit.Result.AUTH_ADMIN_KEEP;
}
});
{% endif %}

View File

@ -17,7 +17,7 @@
# along with this program. If not, see <http://www.gnu.org/licenses/>. # along with this program. If not, see <http://www.gnu.org/licenses/>.
#} #}
{% if Deny_All == '1' %} {% if Deny_All == 1 %}
polkit.addRule(function (action, subject) { polkit.addRule(function (action, subject) {
if (action.id == "org.freedesktop.udisks2.filesystem-mount" || if (action.id == "org.freedesktop.udisks2.filesystem-mount" ||
action.id == "org.freedesktop.udisks2.filesystem-mount-system" || action.id == "org.freedesktop.udisks2.filesystem-mount-system" ||

View File

@ -16,5 +16,5 @@
# You should have received a copy of the GNU General Public License # You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>. # along with this program. If not, see <http://www.gnu.org/licenses/>.
#} #}
{{ home_dir }}/net {{ mount_file }} -t 120 --browse {{ home_dir }}/{{mntTarget}} {{ mount_file }} -t {{timeout}} --browse

View File

@ -0,0 +1,20 @@
{#
# GPOA - GPO Applier for Linux
#
# Copyright (C) 2019-2022 BaseALT Ltd.
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
#}
{{ home_dir }}/.{{mntTarget}} {{ mount_file }} -t {{timeout}}

View File

@ -1,7 +1,7 @@
{# {#
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2020 BaseALT Ltd. # Copyright (C) 2019-2022 BaseALT Ltd.
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -17,5 +17,11 @@
# along with this program. If not, see <http://www.gnu.org/licenses/>. # along with this program. If not, see <http://www.gnu.org/licenses/>.
#} #}
{%- for drv in drives %} {%- for drv in drives %}
{{ drv.dir }} -fstype=cifs,cruid=$USER,sec=krb5,noperm :{{ drv.path }} {% if (drv.thisDrive != 'HIDE') %}
{% endfor %} {% if drv.label %}
"{{ drv.label }}" -fstype=cifs,cruid=$USER,sec=krb5,noperm{% if drv.username %}{% else %},multiuser{% endif %}{% if drv.cifsacl %},cifsacl{% endif %} :{{ drv.path }}
{% else %}
"{{ drv.dir }}" -fstype=cifs,cruid=$USER,sec=krb5,noperm{% if drv.username %}{% else %},multiuser{% endif %}{% if drv.cifsacl %},cifsacl{% endif %} :{{ drv.path }}
{% endif %}
{% endif %}
{% endfor %}

View File

@ -0,0 +1,27 @@
{#
# GPOA - GPO Applier for Linux
#
# Copyright (C) 2019-2022 BaseALT Ltd.
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
#}
{%- for drv in drives %}
{% if (drv.thisDrive == 'HIDE') %}
{% if drv.label %}
"{{ drv.label }}" -fstype=cifs,cruid=$USER,sec=krb5,noperm{% if drv.username %}{% else %},multiuser{% endif %}{% if drv.cifsacl %},cifsacl{% endif %} :{{ drv.path }}
{% else %}
"{{ drv.dir }}" -fstype=cifs,cruid=$USER,sec=krb5,noperm{% if drv.username %}{% else %},multiuser{% endif %}{% if drv.cifsacl %},cifsacl{% endif %} :{{ drv.path }}
{% endif %}
{% endif %}
{% endfor %}

View File

@ -1,7 +1,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2020 BaseALT Ltd. # Copyright (C) 2019-2024 BaseALT Ltd.
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -18,10 +18,9 @@
import logging import logging
import logging.handlers import logging.handlers
from enum import IntEnum from enum import IntEnum, Enum
from messages import message_with_code from .logging import log
from .logging import slogm
def set_loglevel(loglevel_num=None): def set_loglevel(loglevel_num=None):
@ -70,7 +69,7 @@ def process_target(target_name=None):
target = target_name target = target_name
logdata = dict({'target': target}) logdata = dict({'target': target})
logging.debug(slogm(message_with_code('D10'), logdata)) log('D10', logdata)
return target.upper() return target.upper()
@ -84,3 +83,20 @@ class ExitCodeUpdater(IntEnum):
FAIL_GPUPDATE_USER_NOREPLY = 3 FAIL_GPUPDATE_USER_NOREPLY = 3
EXIT_SIGINT = 130 EXIT_SIGINT = 130
class FileAction(Enum):
CREATE = 'C'
REPLACE = 'R'
UPDATE = 'U'
DELETE = 'D'
def __str__(self):
return self.value
def action_letter2enum(letter):
if letter in ['C', 'R', 'U', 'D']:
if letter == 'C': return FileAction.CREATE
if letter == 'R': return FileAction.REPLACE
if letter == 'U': return FileAction.UPDATE
if letter == 'D': return FileAction.DELETE
return FileAction.CREATE

View File

@ -1,7 +1,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2020 BaseALT Ltd. # Copyright (C) 2019-2024 BaseALT Ltd.
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -20,6 +20,7 @@ import dbus
from .logging import log from .logging import log
from .users import is_root from .users import is_root
from storage import Dconf_registry
class dbus_runner: class dbus_runner:
@ -72,6 +73,7 @@ class dbus_runner:
if self.username: if self.username:
logdata = dict({'username': self.username}) logdata = dict({'username': self.username})
log('D6', logdata) log('D6', logdata)
gpupdate = 'gpupdate' if not Dconf_registry._force else 'gpupdate_force'
if is_root(): if is_root():
# oddjobd-gpupdate's ACL allows access to this method # oddjobd-gpupdate's ACL allows access to this method
# only for superuser. This method is called via PAM # only for superuser. This method is called via PAM
@ -95,7 +97,7 @@ class dbus_runner:
result = self.system_bus.call_blocking(self.bus_name, result = self.system_bus.call_blocking(self.bus_name,
self._object_path, self._object_path,
self.interface_name, self.interface_name,
'gpupdate', gpupdate,
None, None,
[], [],
timeout=self._synchronous_timeout) timeout=self._synchronous_timeout)
@ -106,11 +108,12 @@ class dbus_runner:
raise exc raise exc
else: else:
log('D11') log('D11')
gpupdate_computer = 'gpupdate_computer' if not Dconf_registry._force else 'gpupdate_computer_force'
try: try:
result = self.system_bus.call_blocking(self.bus_name, result = self.system_bus.call_blocking(self.bus_name,
self._object_path, self._object_path,
self.interface_name, self.interface_name,
'gpupdate_computer', gpupdate_computer,
None, None,
# The following positional parameter is called "args". # The following positional parameter is called "args".
# There is no official documentation for it. # There is no official documentation for it.
@ -118,7 +121,6 @@ class dbus_runner:
timeout=self._synchronous_timeout) timeout=self._synchronous_timeout)
print_dbus_result(result) print_dbus_result(result)
except dbus.exceptions.DBusException as exc: except dbus.exceptions.DBusException as exc:
print(exc)
logdata = dict({'error': str(exc)}) logdata = dict({'error': str(exc)})
log('E22', logdata) log('E22', logdata)
raise exc raise exc

View File

@ -46,3 +46,10 @@ class NotUNCPathError(Exception):
def __str__(self): def __str__(self):
return self.path return self.path
class GetGPOListFail(Exception):
def __init__(self, exc):
self.exc = exc
def __str__(self):
return self.exc

View File

@ -0,0 +1,356 @@
#
# GPOA - GPO Applier for Linux
#
# Copyright (C) 2019-2023 BaseALT Ltd.
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
from configobj import (ConfigObj, NestingError, Section,
DuplicateError, ParseError, UnreprError,
UnknownType,UnreprError,
BOM_UTF8, DEFAULT_INDENT_TYPE, BOM_LIST,
match_utf8, unrepr)
import six
import re
import sys
import os
# Michael Foord: fuzzyman AT voidspace DOT org DOT uk
# Nicola Larosa: nico AT tekNico DOT net
# Rob Dennis: rdennis AT gmail DOT com
# Eli Courtwright: eli AT courtwright DOT org
# This class based on the ConfigObj module, distributed under the BSD-3-Clause license.
# This class includes modified code from the ConfigObj module mentioned above.
# The original authors and their contact information are listed in the comments above.
# For more information about ConfigObj, please visit the main repository:
# https://github.com/DiffSK/configobj
class GpoaConfigObj(ConfigObj):
_sectionmarker = re.compile(r'''^
(\s*) # 1: indentation
((?:\[\s*)+) # 2: section marker open
( # 3: section name open
(?:"\s*\S.*?\s*")| # at least one non-space with double quotes
(?:'\s*\S.*?\s*')| # at least one non-space with single quotes
(?:[^'"\s].*?) # at least one non-space unquoted
) # section name close
((?:\s*\])+) # 4: section marker close
(\s*(?:[#;].*)?)? # 5: optional comment
$''',
re.VERBOSE)
_valueexp = re.compile(r'''^
(?:
(?:
(
(?:
(?:
(?:".*?")| # double quotes
(?:'.*?')| # single quotes
(?:[^'",\#][^,\#]*?) # unquoted
)
\s*,\s* # comma
)* # match all list items ending in a comma (if any)
)
(
(?:".*?")| # double quotes
(?:'.*?')| # single quotes
(?:[^'",\#\s][^,]*?)| # unquoted
(?:(?<!,)) # Empty value
)? # last item in a list - or string value
)|
(,) # alternatively a single comma - empty list
)
(\s*(?:[#;].*)?)? # optional comment
$''',
re.VERBOSE)
COMMENT_MARKERS = ['#', ';']
def _handle_comment(self, comment):
"""Deal with a comment."""
if not comment:
return ''
start = self.indent_type
if not comment.lstrip().startswith(tuple(self.COMMENT_MARKERS)):
start += ' # '
return start + comment.strip()
def _parse(self, infile):
"""Actually parse the config file."""
temp_list_values = self.list_values
if self.unrepr:
self.list_values = False
comment_list = []
done_start = False
this_section = self
maxline = len(infile) - 1
cur_index = -1
reset_comment = False
comment_markers = tuple(self.COMMENT_MARKERS)
while cur_index < maxline:
if reset_comment:
comment_list = []
cur_index += 1
line = infile[cur_index]
sline = line.strip()
# do we have anything on the line ?
if not sline or sline.startswith(comment_markers):
reset_comment = False
comment_list.append(line)
continue
if not done_start:
# preserve initial comment
self.initial_comment = comment_list
comment_list = []
done_start = True
reset_comment = True
# first we check if it's a section marker
mat = self._sectionmarker.match(line)
if mat is not None:
# is a section line
(indent, sect_open, sect_name, sect_close, comment) = mat.groups()
if indent and (self.indent_type is None):
self.indent_type = indent
cur_depth = sect_open.count('[')
if cur_depth != sect_close.count(']'):
self._handle_error("Cannot compute the section depth",
NestingError, infile, cur_index)
continue
if cur_depth < this_section.depth:
# the new section is dropping back to a previous level
try:
parent = self._match_depth(this_section,
cur_depth).parent
except SyntaxError:
self._handle_error("Cannot compute nesting level",
NestingError, infile, cur_index)
continue
elif cur_depth == this_section.depth:
# the new section is a sibling of the current section
parent = this_section.parent
elif cur_depth == this_section.depth + 1:
# the new section is a child the current section
parent = this_section
else:
self._handle_error("Section too nested",
NestingError, infile, cur_index)
continue
sect_name = self._unquote(sect_name)
if sect_name in parent:
self._handle_error('Duplicate section name',
DuplicateError, infile, cur_index)
continue
# create the new section
this_section = Section(
parent,
cur_depth,
self,
name=sect_name)
parent[sect_name] = this_section
parent.inline_comments[sect_name] = comment
parent.comments[sect_name] = comment_list
continue
#
# it's not a section marker,
# so it should be a valid ``key = value`` line
mat = self._keyword.match(line)
if mat is None:
self._handle_error(
'Invalid line ({!r}) (matched as neither section nor keyword)'.format(line),
ParseError, infile, cur_index)
else:
# is a keyword value
# value will include any inline comment
(indent, key, value) = mat.groups()
if indent and (self.indent_type is None):
self.indent_type = indent
# check for a multiline value
if value[:3] in ['"""', "'''"]:
try:
value, comment, cur_index = self._multiline(
value, infile, cur_index, maxline)
except SyntaxError:
self._handle_error(
'Parse error in multiline value',
ParseError, infile, cur_index)
continue
else:
if self.unrepr:
comment = ''
try:
value = unrepr(value)
except Exception as cause:
if isinstance(cause, UnknownType):
msg = 'Unknown name or type in value'
else:
msg = 'Parse error from unrepr-ing multiline value'
self._handle_error(msg, UnreprError, infile, cur_index)
continue
else:
if self.unrepr:
comment = ''
try:
value = unrepr(value)
except Exception as cause:
if isinstance(cause, UnknownType):
msg = 'Unknown name or type in value'
else:
msg = 'Parse error from unrepr-ing value'
self._handle_error(msg, UnreprError, infile, cur_index)
continue
else:
# extract comment and lists
try:
(value, comment) = self._handle_value(value)
except SyntaxError:
self._handle_error(
'Parse error in value',
ParseError, infile, cur_index)
continue
#
key = self._unquote(key)
if key in this_section:
self._handle_error(
'Duplicate keyword name',
DuplicateError, infile, cur_index)
continue
# add the key.
# we set unrepr because if we have got this far we will never
# be creating a new section
this_section.__setitem__(key, value, unrepr=True)
this_section.inline_comments[key] = comment
this_section.comments[key] = comment_list
continue
#
if self.indent_type is None:
# no indentation used, set the type accordingly
self.indent_type = ''
# preserve the final comment
if not self and not self.initial_comment:
self.initial_comment = comment_list
elif not reset_comment:
self.final_comment = comment_list
self.list_values = temp_list_values
def write(self, outfile=None, section=None):
if self.indent_type is None:
# this can be true if initialised from a dictionary
self.indent_type = DEFAULT_INDENT_TYPE
out = []
comment_markers = tuple(self.COMMENT_MARKERS)
comment_marker_default = comment_markers[0] + ' '
if section is None:
int_val = self.interpolation
self.interpolation = False
section = self
for line in self.initial_comment:
line = self._decode_element(line)
stripped_line = line.strip()
if stripped_line and not stripped_line.startswith(comment_markers):
line = comment_marker_default + line
out.append(line)
indent_string = self.indent_type * section.depth
for entry in (section.scalars + section.sections):
if entry in section.defaults:
# don't write out default values
continue
for comment_line in section.comments[entry]:
comment_line = self._decode_element(comment_line.lstrip())
if comment_line and not comment_line.startswith(comment_markers):
comment_line = comment_marker_default + comment_line
out.append(indent_string + comment_line)
this_entry = section[entry]
comment = self._handle_comment(section.inline_comments[entry])
if isinstance(this_entry, Section):
# a section
out.append(self._write_marker(
indent_string,
this_entry.depth,
entry,
comment))
out.extend(self.write(section=this_entry))
else:
out.append(self._write_line(
indent_string,
entry,
this_entry,
comment))
if section is self:
for line in self.final_comment:
line = self._decode_element(line)
stripped_line = line.strip()
if stripped_line and not stripped_line.startswith(comment_markers):
line = comment_marker_default + line
out.append(line)
self.interpolation = int_val
if section is not self:
return out
if (self.filename is None) and (outfile is None):
# output a list of lines
# might need to encode
# NOTE: This will *screw* UTF16, each line will start with the BOM
if self.encoding:
out = [l.encode(self.encoding) for l in out]
if (self.BOM and ((self.encoding is None) or
(BOM_LIST.get(self.encoding.lower()) == 'utf_8'))):
# Add the UTF8 BOM
if not out:
out.append('')
out[0] = BOM_UTF8 + out[0]
return out
# Turn the list to a string, joined with correct newlines
newline = self.newlines or os.linesep
if (getattr(outfile, 'mode', None) is not None and outfile.mode == 'w'
and sys.platform == 'win32' and newline == '\r\n'):
# Windows specific hack to avoid writing '\r\r\n'
newline = '\n'
output = newline.join(out)
if not output.endswith(newline):
output += newline
if isinstance(output, six.binary_type):
output_bytes = output
else:
output_bytes = output.encode(self.encoding or
self.default_encoding or
'ascii')
if self.BOM and ((self.encoding is None) or match_utf8(self.encoding)):
# Add the UTF8 BOM
output_bytes = BOM_UTF8 + output_bytes
if outfile is not None:
outfile.write(output_bytes)
else:
with open(self.filename, 'wb') as h:
h.write(output_bytes)

View File

@ -1,7 +1,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2021 BaseALT Ltd. <org@basealt.ru> # Copyright (C) 2019-2024 BaseALT Ltd. <org@basealt.ru>
# Copyright (C) 2019-2021 Igor Chudov <nir@nir.org.ru> # Copyright (C) 2019-2021 Igor Chudov <nir@nir.org.ru>
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
@ -21,6 +21,7 @@ import pathlib
import os import os
from pathlib import Path from pathlib import Path
from urllib.parse import urlparse from urllib.parse import urlparse
from util.util import get_homedir
from .config import GPConfig from .config import GPConfig
from .exceptions import NotUNCPathError from .exceptions import NotUNCPathError
@ -67,12 +68,19 @@ def file_cache_dir():
Returns path pointing to gpupdate's cache directory Returns path pointing to gpupdate's cache directory
''' '''
cachedir = pathlib.Path('/var/cache/gpupdate_file_cache') cachedir = pathlib.Path('/var/cache/gpupdate_file_cache')
if not cachedir.exists(): if not cachedir.exists():
cachedir.mkdir(parents=True, exist_ok=True) cachedir.mkdir(parents=True, exist_ok=True)
return cachedir return cachedir
def file_cache_path_home(username) -> str:
'''
Returns the path pointing to the gpupdate cache directory in the /home directory.
'''
cachedir = f'{get_homedir(username)}/.cache/gpupdate'
return cachedir
def local_policy_cache(): def local_policy_cache():
''' '''
Returns path to directory where lies local policy settings cache Returns path to directory where lies local policy settings cache
@ -85,6 +93,22 @@ def local_policy_cache():
return lpcache return lpcache
def get_dconf_config_path(uid = None):
if uid:
return f'/etc/dconf/db/policy{uid}.d/'
else:
return '/etc/dconf/db/policy.d/'
def get_dconf_config_file(uid = None):
if uid:
return f'/etc/dconf/db/policy{uid}.d/policy{uid}.ini'
else:
return '/etc/dconf/db/policy.d/policy.ini'
def get_desktop_files_directory():
return '/usr/share/applications'
class UNCPath: class UNCPath:
def __init__(self, path): def __init__(self, path):
self.path = path self.path = path
@ -99,7 +123,7 @@ class UNCPath:
def get_uri(self): def get_uri(self):
path = self.path path = self.path
if self.type == 'unc': if self.type == 'unc':
path = self.path.replace('\\', '/') path = self.path.replace('\\\\', '/')
path = path.replace('//', 'smb://') path = path.replace('//', 'smb://')
else: else:
pass pass

View File

@ -1,7 +1,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2020 BaseALT Ltd. # Copyright (C) 2019-2024 BaseALT Ltd.
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -18,7 +18,7 @@
from xml.etree import ElementTree from xml.etree import ElementTree
from storage import registry_factory from storage.dconf_registry import load_preg_dconf
from samba.gp_parse.gp_pol import GPPolParser from samba.gp_parse.gp_pol import GPPolParser
@ -80,16 +80,15 @@ def preg_keymap(preg):
return keymap return keymap
def merge_polfile(preg, sid=None, reg_name='registry', reg_path=None, policy_name='Unknown'): def merge_polfile(preg, sid=None, reg_name='registry', reg_path=None, policy_name='Unknown', username='Machine', gpo_info=None):
pregfile = load_preg(preg) pregfile = load_preg(preg)
if sid is None and username == 'Machine':
load_preg_dconf(pregfile, preg, policy_name, None, gpo_info)
else:
load_preg_dconf(pregfile, preg, policy_name, username, gpo_info)
logdata = dict({'pregfile': preg}) logdata = dict({'pregfile': preg})
log('D32', logdata) log('D32', logdata)
storage = registry_factory(reg_name, reg_path)
for entry in pregfile.entries:
if not sid:
storage.add_hklm_entry(entry, policy_name)
else:
storage.add_hkcu_entry(entry, sid, policy_name)
class entry: class entry:

View File

@ -2,7 +2,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2020 BaseALT Ltd. # Copyright (C) 2019-2024 BaseALT Ltd.
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -20,7 +20,6 @@
from enum import Enum from enum import Enum
import pwd import pwd
import logging
import subprocess import subprocess
import pysss_nss_idmap import pysss_nss_idmap

View File

@ -1,7 +1,7 @@
# #
# GPOA - GPO Applier for Linux # GPOA - GPO Applier for Linux
# #
# Copyright (C) 2019-2021 BaseALT Ltd. # Copyright (C) 2019-2024 BaseALT Ltd.
# #
# This program is free software: you can redistribute it and/or modify # This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by # it under the terms of the GNU General Public License as published by
@ -19,8 +19,6 @@
import os import os
import pwd import pwd
from .logging import log
def is_root(): def is_root():
''' '''
@ -47,7 +45,6 @@ def username_match_uid(username):
''' '''
Check the passed username matches current process UID. Check the passed username matches current process UID.
''' '''
uid = os.getuid()
process_username = get_process_user() process_username = get_process_user()
if process_username == username: if process_username == username:

View File

@ -23,6 +23,7 @@ import subprocess
import re import re
from pathlib import Path from pathlib import Path
from .samba import smbopts from .samba import smbopts
import ast
def get_machine_name(): def get_machine_name():
@ -105,20 +106,7 @@ def get_backends():
''' '''
Get the list of backends supported by GPOA Get the list of backends supported by GPOA
''' '''
command = ['/usr/sbin/gpoa', '--list-backends'] return ['local', 'samba']
backends = list()
out = list()
with subprocess.Popen(command, stdout=subprocess.PIPE) as proc:
out = proc.stdout.read().decode('utf-8')
proc.wait()
out = out.split('\n')
for line in out:
tmpline = line.replace('\n', '')
if tmpline != '':
backends.append(tmpline)
return backends
def get_default_policy_name(): def get_default_policy_name():
''' '''
@ -180,3 +168,89 @@ def get_policy_variants():
return general_listing return general_listing
def string_to_literal_eval(string):
try:
literaleval = ast.literal_eval(string)
except:
literaleval = string
return literaleval
def try_dict_to_literal_eval(string):
try:
literaleval = ast.literal_eval(string)
if isinstance(literaleval ,dict):
return literaleval
else:
return None
except:
return None
def touch_file(filename):
path = Path(filename)
path.parent.mkdir(parents=True, exist_ok=True)
path.touch()
def get_uid_by_username(username):
try:
user_info = pwd.getpwnam(username)
return user_info.pw_uid
except KeyError:
return None
def add_prefix_to_keys(dictionary: dict, prefix: str='Previous/') -> dict:
"""
Adds a prefix to each key in the dictionary.
Args: Input dictionary whose keys need to be modified
prefix string to be added to each key. Defaults to 'Previous/'
Returns: New dictionary with modified keys having the specified prefix
"""
result = {}
for key, value in dictionary.items():
new_key = f'{prefix}{key}'
if isinstance(value, dict):
result[new_key] = {deep_key:clean_data(val) if isinstance(val, str) else val for deep_key, val in value.items()}
else:
result[new_key] = value
return result
def remove_keys_with_prefix(dictionary: dict, prefix: tuple=('Previous/', 'Source/')) -> dict:
"""
Removes all keys that start with the specified prefix from the dictionary.
By default, removes keys starting with 'Previous/' and 'Source/' prefix.
"""
return {key: value for key, value in dictionary.items() if not key.startswith(prefix)}
def remove_prefix_from_keys(dictionary: dict, prefix: str) -> dict:
"""
Removes the specified prefix from the keys of the dictionary.
If a key starts with the prefix, it is removed.
"""
return {key[len(prefix):] if key.startswith(prefix) else key: value for key, value in dictionary.items()}
def get_trans_table():
return str.maketrans({
'\n': '',
'\r': '',
'"': "'",
'\\': '\\\\'
})
def clean_data(data):
try:
cleaned_string = data.translate(get_trans_table())
return cleaned_string
except:
return None
def check_local_user_exists(username):
"""
Checks if a local user with the given username exists on a Linux system.
"""
try:
# Try to get user information from the password database
pwd.getpwnam(username)
return True
except:
return False

View File

@ -18,30 +18,52 @@
import os import os
import subprocess from pathlib import Path
from samba import getopt as options from samba.credentials import Credentials
from samba import NTSTATUSError from samba import NTSTATUSError
from samba.gpclass import get_dc_hostname, check_refresh_gpo_list
try:
from samba.gpclass import get_dc_hostname, check_refresh_gpo_list
except ImportError:
from samba.gp.gpclass import get_dc_hostname, check_refresh_gpo_list
from samba.netcmd.common import netcmd_get_domain_infos_via_cldap from samba.netcmd.common import netcmd_get_domain_infos_via_cldap
from storage.dconf_registry import Dconf_registry, extract_display_name_version
import samba.gpo import samba.gpo
from storage import cache_factory
from messages import message_with_code
from .xdg import ( from .xdg import (
xdg_get_desktop xdg_get_desktop
) )
from .util import get_homedir from .util import get_homedir, get_uid_by_username
from .exceptions import GetGPOListFail
from .logging import log from .logging import log
from .samba import smbopts from .samba import smbopts
from gpoa.storage import registry_factory
from samba.samdb import SamDB
from samba.auth import system_session
import optparse
import ldb
import ipaddress
import netifaces
import random
class smbcreds (smbopts): class smbcreds (smbopts):
def __init__(self, dc_fqdn=None): def __init__(self, dc_fqdn=None):
smbopts.__init__(self, 'GPO Applier') smbopts.__init__(self, 'GPO Applier')
self.credopts = options.CredentialsOptions(self.parser)
self.creds = self.credopts.get_credentials(self.lp, fallback_machine=True) self.creds = Credentials()
self.creds.guess(self.lp)
self.creds.set_machine_account()
self.set_dc(dc_fqdn) self.set_dc(dc_fqdn)
self.sDomain = SiteDomainScanner(self.creds, self.lp, self.selected_dc)
self.dc_site_servers = self.sDomain.select_site_servers()
self.all_servers = self.sDomain.select_all_servers()
[self.all_servers.remove(element)
for element in self.dc_site_servers
if element in self.all_servers]
self.pdc_emulator_server = self.sDomain.select_pdc_emulator_server()
def get_dc(self): def get_dc(self):
return self.selected_dc return self.selected_dc
@ -91,7 +113,11 @@ class smbcreds (smbopts):
hostname hostname
''' '''
gpos = list() gpos = list()
if Dconf_registry.get_info('machine_name') == username:
dconf_dict = Dconf_registry.get_dictionary_from_dconf_file_db(save_dconf_db=True)
else:
dconf_dict = Dconf_registry.get_dictionary_from_dconf_file_db(get_uid_by_username(username), save_dconf_db=True)
dict_gpo_name_version = extract_display_name_version(dconf_dict, username)
try: try:
log('D48') log('D48')
ads = samba.gpo.ADS_STRUCT(self.selected_dc, self.lp, self.creds) ads = samba.gpo.ADS_STRUCT(self.selected_dc, self.lp, self.creds)
@ -103,21 +129,42 @@ class smbcreds (smbopts):
for gpo in gpos: for gpo in gpos:
# These setters are taken from libgpo/pygpo.c # These setters are taken from libgpo/pygpo.c
# print(gpo.ds_path) # LDAP entry # print(gpo.ds_path) # LDAP entry
if gpo.display_name in dict_gpo_name_version.keys() and dict_gpo_name_version.get(gpo.display_name, {}).get('version') == str(getattr(gpo, 'version', None)):
if Path(dict_gpo_name_version.get(gpo.display_name, {}).get('correct_path')).exists():
gpo.file_sys_path = ''
ldata = dict({'gpo_name': gpo.display_name, 'gpo_uuid': gpo.name, 'file_sys_path_cache': True})
log('I11', ldata)
continue
ldata = dict({'gpo_name': gpo.display_name, 'gpo_uuid': gpo.name, 'file_sys_path': gpo.file_sys_path}) ldata = dict({'gpo_name': gpo.display_name, 'gpo_uuid': gpo.name, 'file_sys_path': gpo.file_sys_path})
log('I2', ldata) log('I2', ldata)
except Exception as exc: except Exception as exc:
logdata = dict({'username': username, 'dc': self.selected_dc}) if self.selected_dc != self.pdc_emulator_server:
raise GetGPOListFail(exc)
logdata = dict({'username': username, 'dc': self.selected_dc, 'exc': exc})
log('E17', logdata) log('E17', logdata)
return gpos return gpos
def update_gpos(self, username): def update_gpos(self, username):
gpos = self.get_gpos(username)
list_selected_dc = set() list_selected_dc = set()
if self.dc_site_servers:
self.selected_dc = self.dc_site_servers.pop()
self.all_servers = [dc for dc in self.all_servers if dc != self.selected_dc]
list_selected_dc.add(self.selected_dc) list_selected_dc.add(self.selected_dc)
try:
gpos = self.get_gpos(username)
except GetGPOListFail:
self.selected_dc = self.pdc_emulator_server
gpos = self.get_gpos(username)
while list_selected_dc: while list_selected_dc:
logdata = dict() logdata = dict()
logdata['username'] = username logdata['username'] = username
@ -129,20 +176,137 @@ class smbcreds (smbopts):
list_selected_dc.clear() list_selected_dc.clear()
except NTSTATUSError as smb_exc: except NTSTATUSError as smb_exc:
logdata['smb_exc'] = str(smb_exc) logdata['smb_exc'] = str(smb_exc)
self.selected_dc = get_dc_hostname(self.creds, self.lp) if not check_scroll_enabled():
if self.selected_dc not in list_selected_dc: if self.pdc_emulator_server and self.selected_dc != self.pdc_emulator_server:
logdata['action'] = 'Search another dc' self.selected_dc = self.pdc_emulator_server
log('W11', logdata) logdata['action'] = 'Selected pdc'
list_selected_dc.add(self.selected_dc) logdata['pdc'] = self.selected_dc
log('W11', logdata)
else:
log('F1', logdata)
raise smb_exc
else: else:
log('F1', logdata) if self.dc_site_servers:
raise smb_exc self.selected_dc = self.dc_site_servers.pop()
elif self.all_servers:
self.selected_dc = self.all_servers.pop()
else:
self.selected_dc = self.pdc_emulator_server
if self.selected_dc not in list_selected_dc:
logdata['action'] = 'Search another dc'
logdata['another_dc'] = self.selected_dc
log('W11', logdata)
list_selected_dc.add(self.selected_dc)
else:
log('F1', logdata)
raise smb_exc
except Exception as exc: except Exception as exc:
logdata['exc'] = str(exc) logdata['exc'] = str(exc)
log('F1', logdata) log('F1', logdata)
raise exc raise exc
return gpos return gpos
class SiteDomainScanner:
def __init__(self, smbcreds, lp, dc):
self.samdb = SamDB(url='ldap://{}'.format(dc), session_info=system_session(), credentials=smbcreds, lp=lp)
Dconf_registry.set_info('samdb', self.samdb)
self.pdc_emulator = self._search_pdc_emulator()
@staticmethod
def _get_ldb_single_message_attr(ldb_message, attr_name, encoding='utf8'):
if attr_name in ldb_message:
return ldb_message[attr_name][0].decode(encoding)
else:
return None
@staticmethod
def _get_ldb_single_result_attr(ldb_result, attr_name, encoding='utf8'):
if len(ldb_result) == 1 and attr_name in ldb_result[0]:
return ldb_result[0][attr_name][0].decode(encoding)
else:
return None
def _get_server_hostname(self, ds_service_name):
ds_service_name_dn = ldb.Dn(self.samdb, ds_service_name)
server_dn = ds_service_name_dn.parent()
res = self.samdb.search(server_dn, scope=ldb.SCOPE_BASE)
return self._get_ldb_single_result_attr(res, 'dNSHostName')
def _search_pdc_emulator(self):
res = self.samdb.search(self.samdb.domain_dn(), scope=ldb.SCOPE_BASE)
pdc_settings_object = self._get_ldb_single_result_attr(res, 'fSMORoleOwner')
return self._get_server_hostname(pdc_settings_object)
def get_ip_addresses(self):
interface_list = netifaces.interfaces()
addresses = []
for iface in interface_list:
address_entry = netifaces.ifaddresses(iface)
if netifaces.AF_INET in address_entry:
addresses.extend(ipaddress.ip_address(ipv4_address_entry['addr']) for ipv4_address_entry in address_entry[netifaces.AF_INET])
if netifaces.AF_INET6 in address_entry:
addresses.extend(ipaddress.ip_address(ipv6_address_entry['addr']) for ipv6_address_entry in address_entry[netifaces.AF_INET6])
return addresses
def get_ad_subnets_sites(self):
subnet_dn = ldb.Dn(self.samdb, "CN=Subnets,CN=Sites")
config_dn = self.samdb.get_config_basedn()
subnet_dn.add_base(config_dn)
res = self.samdb.search(subnet_dn, ldb.SCOPE_ONELEVEL, expression='objectClass=subnet', attrs=['cn', 'siteObject'])
subnets = {ipaddress.ip_network(self._get_ldb_single_message_attr(msg, 'cn')): self._get_ldb_single_message_attr(msg, 'siteObject') for msg in res}
return subnets
def get_ad_site_servers(self, site):
servers_dn = ldb.Dn(self.samdb, "CN=Servers")
site_dn = ldb.Dn(self.samdb, site)
servers_dn.add_base(site_dn)
res = self.samdb.search(servers_dn, ldb.SCOPE_ONELEVEL, expression='objectClass=server', attrs=['dNSHostName'])
servers = [self._get_ldb_single_message_attr(msg, 'dNSHostName') for msg in res]
random.shuffle(servers)
return servers
def get_ad_all_servers(self):
sites_dn = ldb.Dn(self.samdb, "CN=Sites")
config_dn = self.samdb.get_config_basedn()
sites_dn.add_base(config_dn)
res = self.samdb.search(sites_dn, ldb.SCOPE_SUBTREE, expression='objectClass=server', attrs=['dNSHostName'])
servers = [self._get_ldb_single_message_attr(msg, 'dNSHostName') for msg in res]
random.shuffle(servers)
return servers
def check_ip_in_subnets(self, ip_addresses, subnets_sites):
return next((subnets_sites[subnet] for subnet in subnets_sites.keys()
if any(ip_address in subnet for ip_address in ip_addresses)), None)
def select_site_servers(self):
try:
ip_addresses = self.get_ip_addresses()
subnets_sites = self.get_ad_subnets_sites()
our_site = self.check_ip_in_subnets(ip_addresses, subnets_sites)
servers = []
if our_site:
servers = self.get_ad_site_servers(our_site)
random.shuffle(servers)
return servers
except Exception as e:
return []
def select_all_servers(self):
try:
servers = self.get_ad_all_servers()
random.shuffle(servers)
return servers
except Exception as e:
return []
def select_pdc_emulator_server(self):
return self.pdc_emulator
def expand_windows_var(text, username=None): def expand_windows_var(text, username=None):
''' '''
Scan the line for percent-encoded variables and expand them. Scan the line for percent-encoded variables and expand them.
@ -166,7 +330,9 @@ def expand_windows_var(text, username=None):
result = text result = text
for var in variables.keys(): for var in variables.keys():
result = result.replace('%{}%'.format(var), variables[var]) result = result.replace('%{}%'.format(var),
variables[var] if variables[var][-1] == '/'
else variables[var] +'/')
return result return result
@ -182,3 +348,11 @@ def transform_windows_path(text):
return result return result
def check_scroll_enabled():
storage = registry_factory()
enable_scroll = '/Software/BaseALT/Policies/GPUpdate/ScrollSysvolDC'
if storage.get_key_value(enable_scroll):
data = storage.get_hklm_entry(enable_scroll).data
return bool(int(data))
else:
return False

View File

@ -1,7 +1,42 @@
%define _unpackaged_files_terminate_build 1 %define _unpackaged_files_terminate_build 1
#add_python3_self_prov_path %buildroot%python3_sitelibdir/gpoa
%add_python3_req_skip backend
%add_python3_req_skip frontend.frontend_manager
%add_python3_req_skip gpt.envvars
%add_python3_req_skip gpt.folders
%add_python3_req_skip gpt.gpt
%add_python3_req_skip gpt.printers
%add_python3_req_skip gpt.shortcuts
%add_python3_req_skip gpt.gpo_dconf_mapping
%add_python3_req_skip gpt.dynamic_attributes
%add_python3_req_skip messages
%add_python3_req_skip plugin
%add_python3_req_skip storage
%add_python3_req_skip storage.fs_file_cache
%add_python3_req_skip storage.dconf_registry
%add_python3_req_skip util
%add_python3_req_skip util.arguments
%add_python3_req_skip util.config
%add_python3_req_skip util.dbus
%add_python3_req_skip util.exceptions
%add_python3_req_skip util.kerberos
%add_python3_req_skip util.logging
%add_python3_req_skip util.paths
%add_python3_req_skip util.preg
%add_python3_req_skip util.roles
%add_python3_req_skip util.rpm
%add_python3_req_skip util.sid
%add_python3_req_skip util.signals
%add_python3_req_skip util.system
%add_python3_req_skip util.users
%add_python3_req_skip util.util
%add_python3_req_skip util.windows
%add_python3_req_skip util.xml
%add_python3_req_skip util.gpoa_ini_parsing
Name: gpupdate Name: gpupdate
Version: 0.9.11.2 Version: 0.13.3
Release: alt1 Release: alt1
Summary: GPT applier Summary: GPT applier
@ -16,11 +51,18 @@ BuildRequires: rpm-build-python3
BuildRequires: gettext-tools BuildRequires: gettext-tools
Requires: python3-module-rpm Requires: python3-module-rpm
Requires: python3-module-dbus Requires: python3-module-dbus
Requires: oddjob-%name >= 0.2.0 Requires: python3-module-configobj
Requires: python3-module-gssapi
Requires: python3-module-krb5
Requires: oddjob-%name >= 0.2.3
Requires: libnss-role >= 0.5.0 Requires: libnss-role >= 0.5.0
Requires: local-policy >= 0.4.9 Requires: local-policy >= 0.4.9
Requires: pam-config >= 1.9.0 Requires: pam-config >= 1.9.0
Requires: autofs Requires: autofs
Requires: dconf-profile
Requires: packagekit
Requires: dconf
Requires: libgvdb-gir
# This is needed by shortcuts_applier # This is needed by shortcuts_applier
Requires: desktop-file-utils Requires: desktop-file-utils
# This is needed for smb file cache support # This is needed for smb file cache support
@ -87,6 +129,9 @@ install -Dm0644 dist/%name-remote-policy %buildroot%_sysconfdir/pam.d/%name-remo
install -Dm0644 dist/%name.ini %buildroot%_sysconfdir/%name/%name.ini install -Dm0644 dist/%name.ini %buildroot%_sysconfdir/%name/%name.ini
install -Dm0644 doc/gpoa.1 %buildroot/%_man1dir/gpoa.1 install -Dm0644 doc/gpoa.1 %buildroot/%_man1dir/gpoa.1
install -Dm0644 doc/gpupdate.1 %buildroot/%_man1dir/gpupdate.1 install -Dm0644 doc/gpupdate.1 %buildroot/%_man1dir/gpupdate.1
install -Dm0644 completions/gpoa %buildroot/%_datadir/bash-completion/completions/gpoa
install -Dm0644 completions/gpupdate %buildroot/%_datadir/bash-completion/completions/gpupdate
install -Dm0644 completions/gpupdate-setup %buildroot/%_datadir/bash-completion/completions/gpupdate-setup
for i in gpupdate-localusers \ for i in gpupdate-localusers \
gpupdate-group-users \ gpupdate-group-users \
@ -108,7 +153,7 @@ fi
# Remove storage in case we've lost compatibility between versions. # Remove storage in case we've lost compatibility between versions.
# The storage will be regenerated on GPOA start. # The storage will be regenerated on GPOA start.
%define active_policy %_sysconfdir/local-policy/active %define active_policy %_sysconfdir/local-policy/active
%triggerpostun -- %name < 0.9.10 %triggerpostun -- %name < 0.9.13.6
rm -f %_cachedir/%name/registry.sqlite rm -f %_cachedir/%name/registry.sqlite
if test -L %active_policy; then if test -L %active_policy; then
sed -i "s|^\s*local-policy\s*=.*|local-policy = $(readlink -f %active_policy)|" \ sed -i "s|^\s*local-policy\s*=.*|local-policy = $(readlink -f %active_policy)|" \
@ -133,9 +178,12 @@ fi
%_unitdir/%name.timer %_unitdir/%name.timer
%_man1dir/gpoa.1.* %_man1dir/gpoa.1.*
%_man1dir/gpupdate.1.* %_man1dir/gpupdate.1.*
/usr/lib/systemd/user/%name-user.service %_datadir/bash-completion/completions/gpoa
/usr/lib/systemd/user/%name-user.timer %_datadir/bash-completion/completions/gpupdate
/usr/lib/systemd/user/%name-scripts-run-user.service %_datadir/bash-completion/completions/gpupdate-setup
%_user_unitdir/%name-user.service
%_user_unitdir/%name-user.timer
%_user_unitdir/%name-scripts-run-user.service
%dir %_sysconfdir/%name %dir %_sysconfdir/%name
%_sysconfdir/control.d/facilities/* %_sysconfdir/control.d/facilities/*
%config(noreplace) %_sysconfdir/%name/environment %config(noreplace) %_sysconfdir/%name/environment
@ -151,6 +199,206 @@ fi
%exclude %python3_sitelibdir/gpoa/test %exclude %python3_sitelibdir/gpoa/test
%changelog %changelog
* Sat Jul 26 2025 Evgeny Sinelnikov <sin@altlinux.org> 0.13.3-alt1
- Fixed machine account credentials initialization (closes: 55324)
* Thu Apr 03 2025 Valery Sinelnikov <greh@altlinux.org> 0.13.2-alt1
- Fixed: Check directory existence before cleanup to avoid errors(closes:53703)
* Fri Mar 14 2025 Valery Sinelnikov <greh@altlinux.org> 0.13.1-alt1
- Refined registry key handling: LAPS enablement and user presence check
* Thu Mar 06 2025 Valery Sinelnikov <greh@altlinux.org> 0.13.0-alt1
- Implemented Local Administrator Password Solution (LAPS) functionality,
including support for Group Policy Object (GPO) keys to
configure LAPS settings
- Added support for disabling cifsacl in autofs mounts (closes:52333)
- Implemented the ability to merge computer and user GPO shortcuts
- Added access restrictions to network directories of other users
- Added cleaning functionality for the autofs configuration catalog
- Added ability to configure KDE 6 files
* Tue Jan 14 2025 Valery Sinelnikov <greh@altlinux.org> 0.12.2-alt1
- Fixed interpretation of boolean values (closes:52683)
* Fri Jan 10 2025 Valery Sinelnikov <greh@altlinux.org> 0.12.1-alt1
- Fixed checking the path for existence (closes:52597)
* Tue Dec 10 2024 Valery Sinelnikov <greh@altlinux.org> 0.12.0-alt1
- Special thanks to Andrey Belgorodtsev (andrey@net55.su)
for valuable pre-release testing and feedback
- Added applier thunderbird
- Added environment file cleaning (closes: 51016)
- Added the ability to set the name of the directory to automount
- Added the ability to remove the prefix from a sylink
to the catalog in automount
- Added the ability to set the timeout in automount
- Added messages using the force mode
- Improved KDE update logic
- Added preservation of previous keys
* Fri Oct 11 2024 Valery Sinelnikov <greh@altlinux.org> 0.11.4-alt1
- Added skip plugin (closes: 51631)
- Fixed getting the network path (closes:51606)
- The _appliers sequence has been changed,
package_applier has been moved to the end
* Fri Sep 06 2024 Valery Sinelnikov <greh@altlinux.org> 0.11.3-alt1
- Optimized string cleaning using str.translate()
* Wed Sep 04 2024 Valery Sinelnikov <greh@altlinux.org> 0.11.2-alt1
- Fixed data type handling in kde_applier
- Removing legacy unused code
- Added saving policy data without polfile
- Added escaping of special characters in data (closes: 51201)
* Tue Aug 27 2024 Valery Sinelnikov <greh@altlinux.org> 0.11.1-alt1
- Fixed setting links in shortcuts (closes: 51275)
* Fri Aug 09 2024 Valery Sinelnikov <greh@altlinux.org> 0.11.0-alt1
- Added saving preferences in dconf
- Added versioning support for gpt
- Added the ability to force gpt download
- Added completions for --force
- Added new exceptions for Chromium 126
- Added information to the man pages
- Fixed handling of incorrect valuename
* Mon Jul 08 2024 Valery Sinelnikov <greh@altlinux.org> 0.10.6-alt1
- Fixed firefox_applier errors
* Fri Jun 28 2024 Valery Sinelnikov <greh@altlinux.org> 0.10.5-alt1
- Correction of missing entries with a upper case
- Fixed string processing in date (closes: 50782)
- Fixed getting correct data for the user for pkcon_runner
* Thu Jun 27 2024 Valery Sinelnikov <greh@altlinux.org> 0.10.4-alt1
- Fixed the definition of the module activation check (closes: 50755)
- Fixed sorting of scripts (closes: 50756)
- Fixed reading key values from dconf
- Changed the method for getting the list of packages for pkcon_runner
* Wed Jun 19 2024 Valery Sinelnikov <greh@altlinux.org> 0.10.3-alt1
- Added autocompletion for gpoa, gpupdate, gpupdate-setup
- Added correct work with json data in keys for the Firefox browser
- Polkit_appliers changed to non-experimental
- Fixed bug of not clearing kde applier settings (closes: 50336)
- Fixed registry key reading (closes: 50553)
- Added waiting for data generation for scripts (closes: 50667)
* Fri Jun 07 2024 Valery Sinelnikov <greh@altlinux.org> 0.10.2-alt1
- Added some fixes to dconf_registry and scripts
- Fixed windows registry key reading for loopback
* Tue Jun 04 2024 Valery Sinelnikov <greh@altlinux.org> 0.10.1-alt1
- Added handling of unexpected data types when writing to dconf
* Mon May 13 2024 Valery Sinelnikov <greh@altlinux.org> 0.10.0-alt1
- A method for storing registry keys obtained from GPOs (Group Policy Objects)
has undergone significant repairs. We have switched from using SQLite
to using Dconf to improve data storage efficiency
* Wed Mar 13 2024 Valery Sinelnikov <greh@altlinux.org> 0.9.13.9-alt1
- Fixed premature removal of double slash
* Thu Feb 22 2024 Valery Sinelnikov <greh@altlinux.org> 0.9.13.8-alt1
- Added search for dc on the site
- Added compatibility support for the oldest versions of SQLAlchemy
* Mon Feb 05 2024 Valery Sinelnikov <greh@altlinux.org> 0.9.13.7-alt1
- Editing the cache size in the Yandex browser has returned (closes: 44621)
- Removed unnecessary calls to subprocess
* Wed Jan 31 2024 Valery Sinelnikov <greh@altlinux.org> 0.9.13.6-alt1
- Added support for hidden attribute for folders (closes: 48964)
- Added support for Cyrillic and spaces for mounting disks (closes: 49229)
* Fri Jan 12 2024 Valery Sinelnikov <greh@altlinux.org> 0.9.13.5-alt1
- Fixed blocking check for machine policies with multiple sections (closes: 48971)
- Extension of the valuename_typeint list for the admx-chromium 120.0
- Extension of the valuename_typeint list for the admx-yandex 118.0
- Changed PAM logic to prevent re-call (closes: 48973)
- Changed timer option OnStartupSec to prevent re-call
* Mon Dec 18 2023 Valery Sinelnikov <greh@altlinux.org> 0.9.13.4-alt1
- Fixed regular expression to search for wallpaper management section (closes: 48828)
* Wed Dec 13 2023 Valery Sinelnikov <greh@altlinux.org> 0.9.13.3-alt1
- Fixed bug handling of invalid username
when requesting cache (closes: 48310)
* Tue Nov 28 2023 Valery Sinelnikov <greh@altlinux.org> 0.9.13.2-alt1
- Fixed kde_applier bug (closes: 47995)
* Wed Oct 18 2023 Valery Sinelnikov <greh@altlinux.org> 0.9.13.1-alt1
- Fixed kde_applier bug (closes: 47995)
- Fixed kde_applier bug (closes: 47996)
- Fixed kde_applier bug (closes: 47998)
- Fixed kde_applier bug (closes: 47820)
- Fixed shortcut_applier bug (closes: 47638)
- Fixed shortcut_applier bug (closes: 47641)
- Fixed systemd_applier bug (closes: 47652)
* Tue Sep 19 2023 Valery Sinelnikov <greh@altlinux.org> 0.9.13.0-alt1
- Added KDE applier
- Fixed loopback policy processing
- Fixed appliers exception for some chromium policies
- Fixed ntp error
- cifs_appliers, polkit_appliers changed to non-experimental
* Wed Jun 14 2023 Valery Sinelnikov <greh@altlinux.org> 0.9.12.6-alt1
- Added support for dictionaries as policy values for
yandex_browser_applier and chromium_applier
- Extended functionality of ConfigObj to save comments ';'
- Added support for SQLAlchemy2 in storage
- Added 'cifsacl' option to mount templates
* Fri May 26 2023 Valery Sinelnikov <greh@altlinux.org> 0.9.12.5-alt1
- Fixed editing cache volume (DiskCacheSize) in Yandex browser (closes: 44621)
- The access to caching files has been fixed
* Sun Mar 19 2023 Evgeny Sinelnikov <sin@altlinux.org> 0.9.12.4-alt1
- Fixed an implementation of replace action in folder applier
- Improve file cache store() with copy in temporary file before saving
- Added implementation of using executable bit in file copy applier
- Fixed debug messages typos in file copy applier
* Tue Feb 28 2023 Evgeny Sinelnikov <sin@altlinux.org> 0.9.12.3-alt1
- Add support of set copyied files to be executed by paths and suffixes (extensions).
- Add support of saving comments in ini files.
- Add support samba-4.17 python interface for gp.gpclass instead of gpclass.
* Thu Dec 29 2022 Valery Sinelnikov <greh@altlinux.org> 0.9.12.2-alt2
- Fixed a typo in cifs_applier.py
* Thu Dec 29 2022 Evgeny Sinelnikov <sin@altlinux.org> 0.9.12.2-alt1
- Add support of create and delete symlinks in user home directory for mapped
network drives in cifs applier
- Fix file copy applier support of delete files with substitution
* Tue Dec 13 2022 Evgeny Sinelnikov <sin@altlinux.org> 0.9.12.1-alt1
- Update file copy applier with substitution support
- Update translations for several logs
* Mon Dec 12 2022 Evgeny Sinelnikov <sin@altlinux.org> 0.9.12-alt2
- Update release with forgotten changes
* Sun Dec 11 2022 Evgeny Sinelnikov <sin@altlinux.org> 0.9.12-alt1
- Fixed mapped drive maps for user and add support for machine
+ Added label option support
+ Fixed letters collisions and assigning as Windows
- Replaced cifs applier mountpoints into shown gvfs directories:
+ /media/gpupdate/Drive - for system shares
+ /media/gpupdate/.Drive - for system hidden shares
+ /run/media/USERNAME/DriveUser - for user shares
+ /run/media/USERNAME/.DriveUser - for user hidden shares
- Added network shares support for user
- Fixed bug (closes: 44026) for chromium applier
- Added keylist handling when generating firefox settings (closes: 44209)
- Added a check of the need to scroll DC (scrolling DCs disabled by default!)
- Added the ability to generate rules for all polkit actions
- Added applier for Yandex.Browser
* Fri Sep 30 2022 Valery Sinelnikov <greh@altlinux.org> 0.9.11.2-alt1 * Fri Sep 30 2022 Valery Sinelnikov <greh@altlinux.org> 0.9.11.2-alt1
- Fixed formation of the correct path for creating a user directory - Fixed formation of the correct path for creating a user directory

0
tools/parsing_chrom_admx_intvalues.py Normal file → Executable file
View File