mirror of
https://github.com/altlinux/gpupdate.git
synced 2025-10-17 03:33:18 +03:00
Compare commits
400 Commits
ntp_applie
...
0.11.1-alt
Author | SHA1 | Date | |
---|---|---|---|
|
3960c4b094 | ||
|
5f178651f7 | ||
|
674e1d176b | ||
|
afe6ef04d4 | ||
|
fa98fef5a3 | ||
|
c6c34accff | ||
|
dba6a58c6a | ||
|
a02969c686 | ||
|
e040bbbd69 | ||
|
1775bfa08c | ||
|
165f4bfc83 | ||
|
316f5d1e49 | ||
|
150f3441fd | ||
|
769b520d47 | ||
|
517ed6d56b | ||
|
40635f9a01 | ||
|
2eb6e0c632 | ||
|
710b78b79f | ||
|
f308539a5a | ||
|
ca8cb9ce78 | ||
|
3c7d45cd52 | ||
|
6e77d54aa3 | ||
|
3c72786bd8 | ||
|
8a36e01fbb | ||
|
32cb959f0b | ||
|
3fb24dbd99 | ||
|
b737c9f0aa | ||
|
48d94ae046 | ||
|
4ed05cb481 | ||
|
cddc7d70fb | ||
|
64c305c544 | ||
|
4ee10c1560 | ||
|
5e5c5d45a6 | ||
|
56ee1334af | ||
|
de5ef65c16 | ||
|
453934621d | ||
|
2132c3676f | ||
|
e9adb9b298 | ||
|
3e3957d693 | ||
|
554147b57f | ||
|
6b632e851c | ||
|
3e99bfcb60 | ||
|
2c48b3a6a4 | ||
|
2e22d7abc9 | ||
|
e645fa4e86 | ||
|
cdcac9e4db | ||
|
d3a316c1c0 | ||
|
f081ec6454 | ||
|
60d6996db2 | ||
|
ea52e9671b | ||
|
92df692559 | ||
|
3b4f92997e | ||
|
98d02a4da0 | ||
|
eb951cbd5e | ||
|
9ce68f2acc | ||
|
54239c339c | ||
|
2b108e2029 | ||
|
2a21983b13 | ||
|
b6e84b3d9e | ||
|
bb314fb553 | ||
|
28718e8ad6 | ||
|
2857cfb899 | ||
8717e1b9a3 | |||
d3c9b95331 | |||
|
4d6a5d750c | ||
|
84e1340362 | ||
5ee05df574 | |||
|
2a993f0400 | ||
|
b878b7e1b3 | ||
|
c57d1bac9e | ||
b9b5239448 | |||
aae2776790 | |||
|
a20aa841d6 | ||
|
8c7819d96f | ||
|
3d9473f979 | ||
|
01f48be853 | ||
|
1638098fd4 | ||
|
047e5459af | ||
|
5baa4245e3 | ||
ec6b9f7887 | |||
22d0d23b89 | |||
fd3a32e8e1 | |||
|
9e849e8fe3 | ||
|
d65f3ed942 | ||
|
31298be840 | ||
|
5c889fd57e | ||
|
4e2874c972 | ||
|
63e50ac2df | ||
|
ad2a87e20d | ||
|
e9c3a4262a | ||
|
b5706ec6e1 | ||
|
61e7350429 | ||
|
c9a274fc79 | ||
|
127c9f7183 | ||
|
a27f8ba5dd | ||
|
fafe2c34b4 | ||
|
9c91ddc7ba | ||
|
1f02ed650b | ||
|
fc47df4649 | ||
|
42b8bdb82a | ||
|
2a174edeef | ||
|
9b8529b39b | ||
|
062ff742c3 | ||
|
1764560c49 | ||
|
b439e04a2f | ||
|
e413f95633 | ||
|
675f37ab85 | ||
|
9932c682ef | ||
|
018b30cdc4 | ||
|
249eb69ade | ||
|
1ab8c7aee0 | ||
|
400a5fab7d | ||
|
e7851e88b3 | ||
|
0761637666 | ||
|
dda4d987cb | ||
|
609ec0e8b8 | ||
|
c0b28a0655 | ||
|
78aad11e06 | ||
|
59bebbc45e | ||
|
e92656add0 | ||
|
5d24579d2f | ||
|
ce284b61be | ||
|
7a8118ac63 | ||
|
18d8e73acd | ||
|
58235cb1a1 | ||
|
e0d88cc076 | ||
|
c8b0927090 | ||
|
a4a79d8c99 | ||
|
408609fa58 | ||
|
6efebfad89 | ||
12865b0b43 | |||
9117dddcee | |||
1e267f5cb6 | |||
62ed015ea9 | |||
3e6b7cd040 | |||
209eb84d6d | |||
7f3b47a23c | |||
08ba87c8d8 | |||
f2a45a2a6d | |||
9c544adc94 | |||
a225c9aa7f | |||
51c8711da6 | |||
54eb4188a7 | |||
|
89d5e36d6c | ||
|
6cd5ab4ee2 | ||
|
0c913c68e3 | ||
|
12d746a1dc | ||
|
0a25f3a1d6 | ||
|
1eaab893c8 | ||
|
05ea872831 | ||
|
d0506dba29 | ||
|
dd28587b20 | ||
|
1a288c84f5 | ||
|
cadc3eda52 | ||
|
8d3e6691d4 | ||
|
cb54fa5d78 | ||
|
53ffc072f0 | ||
|
7a59bcb65b | ||
|
b81a727cd4 | ||
|
11b33dd148 | ||
|
1ccc18a31f | ||
|
9a3afeebdf | ||
|
0720471cca | ||
|
dd43ddaad6 | ||
|
6fc059aaac | ||
|
8cfb6f0bb3 | ||
|
ddcdc322f8 | ||
|
4ee52f06d6 | ||
|
603efc2deb | ||
|
9fc5007590 | ||
|
a6210f8b29 | ||
|
175f244a5f | ||
|
0d4ce533bc | ||
|
8e22235df2 | ||
|
0519d2703c | ||
|
1ca9b006e1 | ||
|
8cc5a8904b | ||
|
70cdef2e71 | ||
|
3baffeb12d | ||
|
a0d9dc585f | ||
|
388125415b | ||
|
14c7e5db21 | ||
|
582a85df88 | ||
|
18ddc54626 | ||
|
6bad9a331d | ||
|
16b5747620 | ||
|
47015ec312 | ||
|
666c88bdf1 | ||
|
bd5262353b | ||
|
e1d5712b83 | ||
|
bcb9108424 | ||
|
82bb88ca34 | ||
|
518685f361 | ||
|
39e3d15fa8 | ||
|
7a755bbb3e | ||
|
41260df1a1 | ||
|
0d1b60158a | ||
|
b244df8f2d | ||
|
e48ca4fc8e | ||
|
82d52d1c9f | ||
|
e6a51d02fb | ||
|
28e2d9c94b | ||
|
60137feed0 | ||
|
a86c49e471 | ||
|
8c5d0bbb06 | ||
|
c26fbf8042 | ||
|
83e70d5e7a | ||
|
c383b8df9b | ||
|
fc810c3362 | ||
|
7e225c837a | ||
|
b053544512 | ||
|
9b4527d334 | ||
|
3794ffa5be | ||
|
fe68f0cca8 | ||
|
d83cf4d29d | ||
|
47dc1df796 | ||
|
5d2fb3f719 | ||
|
3fded83c75 | ||
|
aeab315c3d | ||
|
446fa532db | ||
|
ac2190809a | ||
|
66bae5a1af | ||
|
4f41c64c98 | ||
|
729f916646 | ||
|
1b150e21c7 | ||
459993d133 | |||
7ee065309b | |||
22c4f97a15 | |||
|
e62b366cf2 | ||
|
fbdd8cc79a | ||
|
8fddb3494a | ||
|
4b3e621650 | ||
|
4a2842b872 | ||
|
682797fb90 | ||
|
12bd7a5b51 | ||
|
0674340f74 | ||
|
5486bcfcef | ||
|
d935557c4c | ||
|
c6b6cdfff3 | ||
2d7144c1b4 | |||
|
4cca8b241a | ||
|
a50f8c0d04 | ||
|
8c4ce9f8a6 | ||
|
bb1183c471 | ||
db74303e73 | |||
|
ced9d35ec4 | ||
|
d84b754292 | ||
|
7507c558ba | ||
9fb411c2e2 | |||
|
b8dc00443f | ||
179b16baa4 | |||
209e4e3128 | |||
2fb59a1b7c | |||
d82cfcfe89 | |||
220313a1fb | |||
|
38378440ff | ||
debe48c06b | |||
b84715cfe4 | |||
abad246ab2 | |||
|
5bc8309abd | ||
|
a18e1a6cce | ||
8420f50f9c | |||
07662349ca | |||
|
a1281d3ac0 | ||
|
5c0fc9bed0 | ||
|
78815c5ecd | ||
|
7a0571278f | ||
|
7e666043be | ||
|
e733c346b3 | ||
|
7e26d8397c | ||
|
b0d3ab2384 | ||
d744cf8f6e | |||
443b410dfa | |||
|
721c66b20d | ||
9fbe8f76be | |||
3c95c0c84b | |||
|
ed42f3cf6a | ||
5dabd2c259 | |||
1f32d4efae | |||
|
5c809a2d5a | ||
|
bec19cf69e | ||
|
583b47ae7c | ||
|
264cedd342 | ||
|
de6db7ad2b | ||
17c8aef19f | |||
e402d399e9 | |||
5258880419 | |||
3fd6d9558e | |||
d26290a720 | |||
f1800a834f | |||
93806b342d | |||
17ea444bcb | |||
fc0495abd0 | |||
c9da82376a | |||
ae9ced2794 | |||
6c231c8b4d | |||
6461aa6836 | |||
5eeba1e73a | |||
ca4399b9b5 | |||
377aa07b9f | |||
38d1f0e571 | |||
|
04651494be | ||
|
4c7e69f7f6 | ||
|
51f4b3aa18 | ||
|
beb555bdf2 | ||
|
bb55c38e21 | ||
|
5df3c6f468 | ||
|
7edaa4afe7 | ||
|
486e035649 | ||
|
51bd701b2d | ||
|
de0635952f | ||
|
21b4ced721 | ||
|
2567bb9c45 | ||
|
a4db4d9cd0 | ||
|
8cdc84aef6 | ||
|
8b82278934 | ||
|
4b4adbf3e1 | ||
|
0e6c3bb6aa | ||
|
fa315bb599 | ||
|
d54cd790b1 | ||
|
c729b8a6d6 | ||
|
142d6eda50 | ||
|
ae8dd798ab | ||
|
8121eb8d6f | ||
|
be15051ba5 | ||
|
7f7a154e1b | ||
|
72c34a7475 | ||
|
abc3a3f609 | ||
|
ce2d1c6e05 | ||
|
58cff92891 | ||
|
6bcd916203 | ||
|
c924adc4b0 | ||
|
9e1760ae9d | ||
|
1a90996259 | ||
|
11768248e4 | ||
|
34d7124a46 | ||
|
c5c80b9091 | ||
|
1b3d046d05 | ||
|
5c2e4fe356 | ||
|
ff5645ef73 | ||
|
3fb3f2e857 | ||
|
f75c79cbeb | ||
|
43c8031da5 | ||
|
4f1c2f288e | ||
|
26908178d3 | ||
|
fe63894ad8 | ||
|
1bf898f1d0 | ||
|
2c71b5e53a | ||
|
601e8b1072 | ||
|
2c15d1cea0 | ||
|
52fc6ea4de | ||
|
3621e80055 | ||
|
d9191e47fa | ||
|
87d873862a | ||
|
9dc833a970 | ||
|
45bf77a64a | ||
|
5be7cc14b0 | ||
|
1f0e417ff1 | ||
|
1d31c72946 | ||
|
eb7538249f | ||
|
0dacf2f657 | ||
|
13f1529306 | ||
|
3b2d0c0af2 | ||
|
aea8f6ed0a | ||
|
322f28baa7 | ||
|
3860bf6b74 | ||
|
abcc660118 | ||
|
b7e61e4ab8 | ||
|
ca50d7f73b | ||
|
d9f3bd3b8c | ||
|
b4e50c2ef8 | ||
|
e46d717af8 | ||
|
83c0395ee4 | ||
|
eef4823e56 | ||
|
4100edcacf | ||
|
89e72eeaff | ||
|
ce54bae087 | ||
|
bbbde0c46a | ||
|
a43f47abd4 | ||
|
60ab746ce3 | ||
|
418d182726 | ||
|
ccb3dd53a8 | ||
|
bb0beb4a92 | ||
|
dda3ca452b | ||
|
0d54a2a0c8 | ||
|
c1a4e67ba3 | ||
|
b10dde3b21 | ||
|
c7b632fbb8 | ||
|
a00366650a | ||
|
a10beac915 | ||
|
d409d68052 | ||
|
5fdefaecc0 | ||
|
0e3d3598f1 | ||
|
556a8f833c | ||
|
a17dd4a9b4 | ||
|
681c4828a6 | ||
|
e670c03026 | ||
|
5bd64352f1 | ||
|
56b7186c15 | ||
|
6b0cfbe2b5 |
22
completions/gpoa
Normal file
22
completions/gpoa
Normal file
@@ -0,0 +1,22 @@
|
||||
_gpoa()
|
||||
{
|
||||
local cur prev words cword split
|
||||
_init_completion -s || return
|
||||
|
||||
case $prev in
|
||||
--dc)
|
||||
_filedir
|
||||
return
|
||||
;;
|
||||
--loglevel)
|
||||
COMPREPLY=($(compgen -W '0 1 2 3 4 5' -- "$cur"))
|
||||
return
|
||||
;;
|
||||
*)
|
||||
COMPREPLY=($(compgen -W '--dc --nodomain --noupdate --noplugins --list-backends --loglevel --help --force' -- "$cur"))
|
||||
return
|
||||
;;
|
||||
esac
|
||||
}
|
||||
|
||||
complete -F _gpoa gpoa
|
27
completions/gpupdate
Normal file
27
completions/gpupdate
Normal file
@@ -0,0 +1,27 @@
|
||||
_gpupdate()
|
||||
{
|
||||
local cur prev words cword split
|
||||
_init_completion -s || return
|
||||
|
||||
case $prev in
|
||||
-u|--user)
|
||||
_filedir
|
||||
return
|
||||
;;
|
||||
-t|--target)
|
||||
COMPREPLY=($(compgen -W 'ALL USER COMPUTER' -- "$cur"))
|
||||
return
|
||||
;;
|
||||
-l|--loglevel)
|
||||
COMPREPLY=($(compgen -W '0 1 2 3 4 5' -- "$cur"))
|
||||
return
|
||||
;;
|
||||
*)
|
||||
COMPREPLY=($(compgen -W '--user --target --loglevel --system --help --force' -- "$cur"))
|
||||
return
|
||||
;;
|
||||
esac
|
||||
}
|
||||
|
||||
complete -F _gpupdate gpupdate
|
||||
|
18
completions/gpupdate-setup
Normal file
18
completions/gpupdate-setup
Normal file
@@ -0,0 +1,18 @@
|
||||
_gpupdate-setup()
|
||||
{
|
||||
local cur prev words cword split
|
||||
_init_completion -s || return
|
||||
|
||||
case $prev in
|
||||
set-backend)
|
||||
COMPREPLY=($(compgen -W 'local samba' -- "$cur"))
|
||||
return
|
||||
;;
|
||||
*)
|
||||
COMPREPLY=($(compgen -W 'list list-backends status enable disable update write set-backend default-policy active-policy active-backend' -- "$cur"))
|
||||
return
|
||||
;;
|
||||
esac
|
||||
}
|
||||
|
||||
complete -F _gpupdate-setup gpupdate-setup
|
1
dist/gpupdate-scripts-run-user.service
vendored
1
dist/gpupdate-scripts-run-user.service
vendored
@@ -1,6 +1,5 @@
|
||||
[Unit]
|
||||
Description=Run Group Policy scripts for a user
|
||||
After=gpupdate-user.service
|
||||
|
||||
[Service]
|
||||
Type=oneshot
|
||||
|
2
dist/gpupdate-user.timer
vendored
2
dist/gpupdate-user.timer
vendored
@@ -2,7 +2,7 @@
|
||||
Description=Run gpupdate-user every hour
|
||||
|
||||
[Timer]
|
||||
OnStartupSec=1
|
||||
OnStartupSec=60min
|
||||
OnUnitActiveSec=60min
|
||||
|
||||
[Install]
|
||||
|
2
dist/gpupdate.timer
vendored
2
dist/gpupdate.timer
vendored
@@ -2,7 +2,7 @@
|
||||
Description=Run gpupdate every hour
|
||||
|
||||
[Timer]
|
||||
OnStartupSec=1
|
||||
OnStartupSec=60min
|
||||
OnUnitActiveSec=60min
|
||||
|
||||
[Install]
|
||||
|
9
dist/system-policy-gpupdate
vendored
9
dist/system-policy-gpupdate
vendored
@@ -2,11 +2,12 @@
|
||||
session [success=2 perm_denied=ignore default=die] pam_localuser.so
|
||||
session substack gpupdate-remote-policy
|
||||
session [default=1] pam_permit.so
|
||||
session [default=6] pam_permit.so
|
||||
session [default=7] pam_permit.so
|
||||
session [success=1 default=ignore] pam_succeed_if.so user ingroup users quiet
|
||||
session [default=4] pam_permit.so
|
||||
session [default=5] pam_permit.so
|
||||
session [success=1 default=ignore] pam_succeed_if.so uid >= 500 quiet
|
||||
session [default=2] pam_permit.so
|
||||
session [default=3] pam_permit.so
|
||||
session [success=1 default=ignore] pam_succeed_if.so service = systemd-user quiet
|
||||
-session required pam_oddjob_gpupdate.so
|
||||
session optional pam_env.so user_readenv=1 conffile=/etc/gpupdate/environment user_envfile=.gpupdate_environment
|
||||
session required pam_permit.so
|
||||
session required pam_permit.so
|
@@ -45,6 +45,9 @@ Don't run plugins.
|
||||
.TP
|
||||
\fB--loglevel \fILOGLEVEL\fP
|
||||
Set logging verbosity from 0 to 5.
|
||||
.TP
|
||||
\fB--force\fP
|
||||
Force GPT download.
|
||||
.
|
||||
.SH FILES
|
||||
\fB/usr/sbin/gpoa\fR utility uses \fB/usr/share/local-policy/default\fR
|
||||
@@ -55,8 +58,10 @@ All data is located in \fB/var/cache/gpupdate\fR. Also domain GPTs are
|
||||
taken from Samba's \fB/var/cache/samba\fR.
|
||||
.
|
||||
The settings read from Samba are stored in
|
||||
\fB/var/cache/gpupdate/registry.sqlite\fR and "Local Policy" settings
|
||||
read from \fB/usr/local/share/local-policy/default\fR are converted
|
||||
Dconf. Machine policies are stored in the \fB/etc/dconf/db/policy.d/policy.ini\fR file,
|
||||
user policies are stored in the \fB/etc/dconf/db/policy<UID>.d/policy<UID>.ini\fR file
|
||||
(where UID is the user ID in the system)."Local Policy" settings
|
||||
read from \fB/usr/share/local-policy/\fR are converted
|
||||
into GPT and stored as \fB/var/cache/gpupdate/local-policy\fR.
|
||||
.SH "SEE ALSO"
|
||||
gpupdate(1)
|
||||
|
@@ -43,6 +43,9 @@ Show help.
|
||||
.TP
|
||||
\fB--user \fIusername\fR
|
||||
Run \fBgpupdate\fP for \fIusername\fP.
|
||||
.TP
|
||||
\fB--force\fP
|
||||
Force GPT download.
|
||||
.
|
||||
.SS "EXIT CODES"
|
||||
.TP
|
||||
|
@@ -22,6 +22,9 @@ from .samba_backend import samba_backend
|
||||
from .nodomain_backend import nodomain_backend
|
||||
from util.logging import log
|
||||
from util.config import GPConfig
|
||||
from util.util import get_uid_by_username, touch_file
|
||||
from util.paths import get_dconf_config_file
|
||||
from storage.dconf_registry import Dconf_registry, create_dconf_ini_file, add_preferences_to_global_registry_dict
|
||||
|
||||
def backend_factory(dc, username, is_machine, no_domain = False):
|
||||
'''
|
||||
@@ -59,3 +62,13 @@ def backend_factory(dc, username, is_machine, no_domain = False):
|
||||
|
||||
return back
|
||||
|
||||
def save_dconf(username, is_machine):
|
||||
if is_machine:
|
||||
uid = None
|
||||
else:
|
||||
uid = get_uid_by_username(username) if not is_machine else None
|
||||
target_file = get_dconf_config_file(uid)
|
||||
touch_file(target_file)
|
||||
Dconf_registry.apply_template(uid)
|
||||
add_preferences_to_global_registry_dict(username, is_machine)
|
||||
create_dconf_ini_file(target_file,Dconf_registry.global_registry_dict, uid)
|
||||
|
@@ -35,7 +35,7 @@ class nodomain_backend(applier_backend):
|
||||
domain = None
|
||||
machine_name = get_machine_name()
|
||||
machine_sid = get_sid(domain, machine_name, True)
|
||||
self.storage = registry_factory('registry')
|
||||
self.storage = registry_factory()
|
||||
self.storage.set_info('domain', domain)
|
||||
self.storage.set_info('machine_name', machine_name)
|
||||
self.storage.set_info('machine_sid', machine_sid)
|
||||
|
@@ -18,11 +18,15 @@
|
||||
|
||||
import os
|
||||
# Facility to determine GPTs for user
|
||||
from samba.gpclass import check_safe_path
|
||||
try:
|
||||
from samba.gpclass import check_safe_path
|
||||
except ImportError:
|
||||
from samba.gp.gpclass import check_safe_path
|
||||
|
||||
from .applier_backend import applier_backend
|
||||
from storage import cache_factory, registry_factory
|
||||
from storage import registry_factory
|
||||
from gpt.gpt import gpt, get_local_gpt
|
||||
from gpt.gpo_dconf_mapping import GpoInfoDconf
|
||||
from util.util import (
|
||||
get_machine_name,
|
||||
is_machine_name
|
||||
@@ -36,14 +40,15 @@ import util.preg
|
||||
from util.logging import log
|
||||
|
||||
class samba_backend(applier_backend):
|
||||
__user_policy_mode_key = 'Software\\Policies\\Microsoft\\Windows\\System\\UserPolicyMode'
|
||||
__user_policy_mode_key = '/SOFTWARE/Policies/Microsoft/Windows/System/UserPolicyMode'
|
||||
__user_policy_mode_key_win = '/Software/Policies/Microsoft/Windows/System/UserPolicyMode'
|
||||
|
||||
def __init__(self, sambacreds, username, domain, is_machine):
|
||||
self.cache_path = '/var/cache/gpupdate/creds/krb5cc_{}'.format(os.getpid())
|
||||
self.__kinit_successful = machine_kinit(self.cache_path)
|
||||
if not self.__kinit_successful:
|
||||
raise Exception('kinit is not successful')
|
||||
self.storage = registry_factory('registry')
|
||||
self.storage = registry_factory()
|
||||
self.storage.set_info('domain', domain)
|
||||
machine_name = get_machine_name()
|
||||
machine_sid = get_sid(domain, machine_name, is_machine)
|
||||
@@ -58,13 +63,13 @@ class samba_backend(applier_backend):
|
||||
else:
|
||||
self.sid = get_sid(self.storage.get_info('domain'), self.username)
|
||||
|
||||
self.cache = cache_factory('regpol_cache')
|
||||
self.gpo_names = cache_factory('gpo_names')
|
||||
|
||||
# Samba objects - LoadParm() and CredentialsOptions()
|
||||
self.sambacreds = sambacreds
|
||||
|
||||
self.cache_dir = self.sambacreds.get_cache_dir()
|
||||
self.gpo_cache_part ='gpo_cache'
|
||||
self._cached = False
|
||||
self.storage.set_info('cache_dir', os.path.join(self.cache_dir, self.gpo_cache_part))
|
||||
logdata = dict({'cachedir': self.cache_dir})
|
||||
log('D7', logdata)
|
||||
|
||||
@@ -78,9 +83,11 @@ class samba_backend(applier_backend):
|
||||
is possible to work with user's part of GPT. This value is
|
||||
checked only if working for user's SID.
|
||||
'''
|
||||
upm = self.storage.get_hklm_entry(self.__user_policy_mode_key)
|
||||
if upm and upm.data:
|
||||
upm = int(upm.data)
|
||||
upm_key = self.storage.get_key_value(self.__user_policy_mode_key)
|
||||
upm_win_key = self.storage.get_key_value(self.__user_policy_mode_key_win)
|
||||
upm = upm_key if upm_key else upm_win_key
|
||||
if upm:
|
||||
upm = int(upm)
|
||||
if upm < 0 or upm > 2:
|
||||
upm = 0
|
||||
else:
|
||||
@@ -140,6 +147,7 @@ class samba_backend(applier_backend):
|
||||
if policy_mode > 0:
|
||||
for gptobj in machine_gpts:
|
||||
try:
|
||||
gptobj.sid = self.sid
|
||||
gptobj.merge_user()
|
||||
except Exception as exc:
|
||||
logdata = dict()
|
||||
@@ -150,10 +158,15 @@ class samba_backend(applier_backend):
|
||||
'''
|
||||
Check if there is SYSVOL path for GPO assigned
|
||||
'''
|
||||
self._cached = False
|
||||
if not gpo.file_sys_path:
|
||||
# GPO named "Local Policy" has no entry by its nature so
|
||||
# no reason to print warning.
|
||||
if 'Local Policy' != gpo.name:
|
||||
if gpo.display_name in self.storage._dict_gpo_name_version_cache.keys():
|
||||
gpo.file_sys_path = self.storage._dict_gpo_name_version_cache.get(gpo.display_name, {}).get('correct_path')
|
||||
self._cached = True
|
||||
return True
|
||||
elif 'Local Policy' != gpo.name:
|
||||
logdata = dict({'gponame': gpo.name})
|
||||
log('W4', logdata)
|
||||
return False
|
||||
@@ -168,11 +181,18 @@ class samba_backend(applier_backend):
|
||||
log('D46')
|
||||
for gpo in gpos:
|
||||
if self._check_sysvol_present(gpo):
|
||||
path = check_safe_path(gpo.file_sys_path).upper()
|
||||
slogdata = dict({'sysvol_path': gpo.file_sys_path, 'gpo_name': gpo.display_name, 'gpo_path': path})
|
||||
log('D30', slogdata)
|
||||
gpt_abspath = os.path.join(self.cache_dir, 'gpo_cache', path)
|
||||
obj = gpt(gpt_abspath, sid)
|
||||
if not self._cached:
|
||||
path = check_safe_path(gpo.file_sys_path).upper()
|
||||
slogdata = dict({'sysvol_path': gpo.file_sys_path, 'gpo_name': gpo.display_name, 'gpo_path': path})
|
||||
log('D30', slogdata)
|
||||
gpt_abspath = os.path.join(self.cache_dir, self.gpo_cache_part, path)
|
||||
else:
|
||||
gpt_abspath = gpo.file_sys_path
|
||||
log('D211', {'sysvol_path': gpo.file_sys_path, 'gpo_name': gpo.display_name})
|
||||
if self._is_machine_username:
|
||||
obj = gpt(gpt_abspath, sid, None, GpoInfoDconf(gpo))
|
||||
else:
|
||||
obj = gpt(gpt_abspath, sid, self.username, GpoInfoDconf(gpo))
|
||||
obj.set_name(gpo.display_name)
|
||||
gpts.append(obj)
|
||||
else:
|
||||
@@ -188,9 +208,9 @@ def upm2str(upm_num):
|
||||
result = 'Not configured'
|
||||
|
||||
if upm_num in [1, '1']:
|
||||
result = 'Replace'
|
||||
|
||||
if upm_num in [2, '2']:
|
||||
result = 'Merge'
|
||||
|
||||
if upm_num in [2, '2']:
|
||||
result = 'Replace'
|
||||
|
||||
return result
|
||||
|
@@ -18,43 +18,42 @@
|
||||
|
||||
from abc import ABC
|
||||
|
||||
import logging
|
||||
from util.logging import slogm
|
||||
from util.logging import log
|
||||
|
||||
def check_experimental_enabled(storage):
|
||||
experimental_enable_flag = 'Software\\BaseALT\\Policies\\GPUpdate\\GlobalExperimental'
|
||||
flag = storage.get_hklm_entry(experimental_enable_flag)
|
||||
experimental_enable_flag = '/Software/BaseALT/Policies/GPUpdate/GlobalExperimental'
|
||||
flag = storage.get_key_value(experimental_enable_flag)
|
||||
|
||||
result = False
|
||||
|
||||
if flag and '1' == flag.data:
|
||||
if flag and '1' == str(flag):
|
||||
result = True
|
||||
|
||||
return result
|
||||
|
||||
def check_windows_mapping_enabled(storage):
|
||||
windows_mapping_enable_flag = 'Software\\BaseALT\\Policies\\GPUpdate\\WindowsPoliciesMapping'
|
||||
flag = storage.get_hklm_entry(windows_mapping_enable_flag)
|
||||
windows_mapping_enable_flag = '/Software/BaseALT/Policies/GPUpdate/WindowsPoliciesMapping'
|
||||
flag = storage.get_key_value(windows_mapping_enable_flag)
|
||||
|
||||
result = True
|
||||
|
||||
if flag and '0' == flag.data:
|
||||
flag = str(flag)
|
||||
if flag and '0' == flag:
|
||||
result = False
|
||||
|
||||
return result
|
||||
|
||||
def check_module_enabled(storage, module_name):
|
||||
gpupdate_module_enable_branch = 'Software\\BaseALT\\Policies\\GPUpdate'
|
||||
gpupdate_module_flag = '{}\\{}'.format(gpupdate_module_enable_branch, module_name)
|
||||
flag = storage.get_hklm_entry(gpupdate_module_flag)
|
||||
gpupdate_module_enable_branch = '/Software/BaseALT/Policies/GPUpdate'
|
||||
gpupdate_module_flag = '{}/{}'.format(gpupdate_module_enable_branch, module_name)
|
||||
flag = storage.get_key_value(gpupdate_module_flag)
|
||||
|
||||
result = None
|
||||
|
||||
if flag:
|
||||
if '1' == flag.data:
|
||||
flag = str(flag)
|
||||
if flag and flag!='None':
|
||||
if '1' == flag:
|
||||
result = True
|
||||
if '0' == flag.data:
|
||||
result = False
|
||||
else:
|
||||
result = False
|
||||
|
||||
return result
|
||||
|
||||
|
@@ -17,9 +17,7 @@
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
import subprocess
|
||||
import threading
|
||||
import logging
|
||||
from util.logging import slogm, log
|
||||
from util.logging import log
|
||||
|
||||
def control_subst(preg_name):
|
||||
'''
|
||||
@@ -101,14 +99,14 @@ class control:
|
||||
if status == None:
|
||||
logdata = dict()
|
||||
logdata['control'] = self.control_name
|
||||
logdata['inpossible values'] = self.self.control_value
|
||||
logdata['inpossible values'] = self.control_value
|
||||
log('E42', logdata)
|
||||
return
|
||||
elif type(self.control_value) == str:
|
||||
if self.control_value not in self.possible_values:
|
||||
logdata = dict()
|
||||
logdata['control'] = self.control_name
|
||||
logdata['inpossible values'] = self.self.control_value
|
||||
logdata['inpossible values'] = self.control_value
|
||||
log('E59', logdata)
|
||||
return
|
||||
status = self.control_value
|
||||
|
@@ -17,18 +17,13 @@
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
from os.path import isfile
|
||||
from util.logging import slogm
|
||||
import logging
|
||||
|
||||
from gpt.envvars import (
|
||||
from util.arguments import (
|
||||
FileAction
|
||||
, action_letter2enum
|
||||
)
|
||||
from util.windows import expand_windows_var
|
||||
from util.util import (
|
||||
get_homedir,
|
||||
homedir_exists
|
||||
)
|
||||
from util.util import get_homedir
|
||||
|
||||
class Envvar:
|
||||
def __init__(self, envvars, username=''):
|
||||
@@ -92,6 +87,8 @@ class Envvar:
|
||||
value = value.replace('\\', '/')
|
||||
exist_line = None
|
||||
for line in lines:
|
||||
if line == '\n':
|
||||
continue
|
||||
if line.split()[0] == name:
|
||||
exist_line = line
|
||||
break
|
||||
|
@@ -17,7 +17,7 @@
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
|
||||
from gpt.folders import (
|
||||
from util.arguments import (
|
||||
FileAction
|
||||
, action_letter2enum
|
||||
)
|
||||
@@ -28,88 +28,154 @@ from pathlib import Path
|
||||
from util.windows import expand_windows_var
|
||||
from util.util import get_homedir
|
||||
from util.exceptions import NotUNCPathError
|
||||
from util.paths import UNCPath
|
||||
import fnmatch
|
||||
|
||||
class Files_cp:
|
||||
def __init__(self, file_obj, file_cache ,username=None):
|
||||
def __init__(self, file_obj, file_cache, exe_check, username=None):
|
||||
self.file_cache = file_cache
|
||||
self.exe_check = exe_check
|
||||
targetPath = expand_windows_var(file_obj.targetPath, username).replace('\\', '/')
|
||||
self.targetPath = check_target_path(targetPath, username)
|
||||
if not self.targetPath:
|
||||
return
|
||||
self.fromPath = (expand_windows_var(file_obj.fromPath, username).replace('\\', '/')
|
||||
if file_obj.fromPath else None)
|
||||
self.isTargetPathDirectory = False
|
||||
self.action = action_letter2enum(file_obj.action)
|
||||
self.readOnly = str2bool(file_obj.readOnly)
|
||||
self.archive = str2bool(file_obj.archive)
|
||||
self.hidden = str2bool(file_obj.hidden)
|
||||
self.suppress = str2bool(file_obj.suppress)
|
||||
self.executable = str2bool(file_obj.executable)
|
||||
self.username = username
|
||||
self.fromPathFiles = self.get_list_files()
|
||||
self.fromPathFiles = list()
|
||||
if self.fromPath:
|
||||
if targetPath[-1] == '/' or self.is_pattern(Path(self.fromPath).name):
|
||||
self.isTargetPathDirectory = True
|
||||
self.get_list_files()
|
||||
self.act()
|
||||
|
||||
def get_target_file(self, targetPath, fromPath):
|
||||
def get_target_file(self, targetPath:Path, fromFile:str) -> Path:
|
||||
try:
|
||||
if fromPath and targetPath.is_dir():
|
||||
if self.hidden:
|
||||
return targetPath.joinpath('.' + fromPath.name)
|
||||
if fromFile:
|
||||
fromFileName = Path(fromFile).name
|
||||
if self.isTargetPathDirectory:
|
||||
targetPath.mkdir(parents = True, exist_ok = True)
|
||||
else:
|
||||
return targetPath.joinpath(fromPath.name)
|
||||
targetPath.parent.mkdir(parents = True, exist_ok = True)
|
||||
targetPath = targetPath.parent
|
||||
fromFileName = self.targetPath.name
|
||||
if self.hidden:
|
||||
return targetPath.joinpath('.' + fromFileName)
|
||||
else:
|
||||
return targetPath.joinpath(fromFileName)
|
||||
|
||||
else:
|
||||
if not self.hidden:
|
||||
return targetPath
|
||||
else:
|
||||
return targetPath.parent.joinpath('.' + targetPath.name)
|
||||
|
||||
except Exception as exc:
|
||||
logdata = dict({'exc': exc})
|
||||
logdata = dict()
|
||||
logdata['targetPath'] = targetPath
|
||||
logdata['fromFile'] = fromFile
|
||||
logdata['exc'] = exc
|
||||
log('D163', logdata)
|
||||
|
||||
def set_read_only(self, targetFile):
|
||||
if self.readOnly:
|
||||
shutil.os.chmod(targetFile, int('444', base = 8))
|
||||
return None
|
||||
|
||||
def copy_target_file(self, targetFile:Path, fromFile:str):
|
||||
try:
|
||||
uri_path = UNCPath(fromFile)
|
||||
self.file_cache.store(fromFile, targetFile)
|
||||
except NotUNCPathError as exc:
|
||||
fromFilePath = Path(fromFile)
|
||||
if fromFilePath.exists():
|
||||
targetFile.write_bytes(fromFilePath.read_bytes())
|
||||
except Exception as exc:
|
||||
logdata = dict()
|
||||
logdata['targetFile'] = targetFile
|
||||
logdata['fromFile'] = fromFile
|
||||
logdata['exc'] = exc
|
||||
log('W15', logdata)
|
||||
|
||||
def set_exe_file(self, targetFile, fromFile):
|
||||
if self.executable:
|
||||
return True
|
||||
if Path(fromFile).suffix in self.exe_check.get_list_markers():
|
||||
targetPath = targetFile.parent
|
||||
for i in self.exe_check.get_list_paths():
|
||||
if targetPath == Path(i):
|
||||
return True
|
||||
return False
|
||||
|
||||
def set_mod_file(self, targetFile, fromFile):
|
||||
if not targetFile.is_file():
|
||||
return
|
||||
if self.set_exe_file(targetFile, fromFile):
|
||||
if self.readOnly:
|
||||
shutil.os.chmod(targetFile, 0o555)
|
||||
else:
|
||||
shutil.os.chmod(targetFile, 0o755)
|
||||
else:
|
||||
shutil.os.chmod(targetFile, int('664', base = 8))
|
||||
if self.readOnly:
|
||||
shutil.os.chmod(targetFile, 0o444)
|
||||
else:
|
||||
shutil.os.chmod(targetFile, 0o644)
|
||||
|
||||
def _create_action(self):
|
||||
for fromPath in self.fromPathFiles:
|
||||
logdata = dict()
|
||||
for fromFile in self.fromPathFiles:
|
||||
targetFile = None
|
||||
|
||||
try:
|
||||
targetFile = self.get_target_file(self.targetPath, fromPath)
|
||||
if not targetFile.exists():
|
||||
targetFile.write_bytes(fromPath.read_bytes())
|
||||
targetFile = self.get_target_file(self.targetPath, fromFile)
|
||||
if targetFile and not targetFile.exists():
|
||||
self.copy_target_file(targetFile, fromFile)
|
||||
if self.username:
|
||||
shutil.chown(targetFile, self.username)
|
||||
self.set_read_only(targetFile)
|
||||
self.set_mod_file(targetFile, fromFile)
|
||||
logdata['File'] = targetFile
|
||||
log('D191', logdata)
|
||||
except Exception as exc:
|
||||
logdata = dict()
|
||||
logdata['exc'] = exc
|
||||
logdata['fromPath'] = fromPath
|
||||
logdata['fromPath'] = fromFile
|
||||
logdata['targetPath'] = self.targetPath
|
||||
logdata['targetFile'] = targetFile
|
||||
log('D164', logdata)
|
||||
|
||||
def _delete_action(self):
|
||||
targetFile = Path(self.targetPath)
|
||||
try:
|
||||
if targetFile.exists():
|
||||
targetFile.unlink()
|
||||
except Exception as exc:
|
||||
logdata = dict()
|
||||
logdata['exc'] = exc
|
||||
logdata['targetPath'] = self.targetPath
|
||||
logdata['targetFile'] = targetFile
|
||||
log('D165', logdata)
|
||||
list_target = [self.targetPath.name]
|
||||
if self.is_pattern(self.targetPath.name) and self.targetPath.parent.exists() and self.targetPath.parent.is_dir():
|
||||
list_target = fnmatch.filter([str(x.name) for x in self.targetPath.parent.iterdir() if x.is_file()], self.targetPath.name)
|
||||
logdata = dict()
|
||||
for targetFile in list_target:
|
||||
targetFile = self.targetPath.parent.joinpath(targetFile)
|
||||
try:
|
||||
if targetFile.exists():
|
||||
targetFile.unlink()
|
||||
logdata['File'] = targetFile
|
||||
log('D193', logdata)
|
||||
|
||||
except Exception as exc:
|
||||
logdata['exc'] = exc
|
||||
logdata['targetPath'] = self.targetPath
|
||||
logdata['targetFile'] = targetFile
|
||||
log('D165', logdata)
|
||||
|
||||
def _update_action(self):
|
||||
for fromPath in self.fromPathFiles:
|
||||
targetFile = self.get_target_file(self.targetPath, fromPath)
|
||||
logdata = dict()
|
||||
for fromFile in self.fromPathFiles:
|
||||
targetFile = self.get_target_file(self.targetPath, fromFile)
|
||||
try:
|
||||
targetFile.write_bytes(fromPath.read_bytes())
|
||||
self.copy_target_file(targetFile, fromFile)
|
||||
if self.username:
|
||||
shutil.chown(self.targetPath, self.username)
|
||||
self.set_read_only(targetFile)
|
||||
self.set_mod_file(targetFile, fromFile)
|
||||
logdata['File'] = targetFile
|
||||
log('D192', logdata)
|
||||
except Exception as exc:
|
||||
logdata = dict()
|
||||
logdata['exc'] = exc
|
||||
logdata['fromPath'] = self.fromPath
|
||||
logdata['targetPath'] = self.targetPath
|
||||
@@ -127,70 +193,76 @@ class Files_cp:
|
||||
self._delete_action()
|
||||
self._create_action()
|
||||
|
||||
def is_pattern(self, name):
|
||||
if name.find('*') != -1 or name.find('?') != -1:
|
||||
return True
|
||||
else:
|
||||
return False
|
||||
|
||||
def get_list_files(self):
|
||||
ls_all_files = list()
|
||||
logdata = dict()
|
||||
logdata['targetPath'] = self.targetPath
|
||||
if self.fromPath and self.fromPath.split('/')[-1] != '*':
|
||||
logdata['targetPath'] = str(self.targetPath)
|
||||
fromFilePath = Path(self.fromPath)
|
||||
if not self.is_pattern(fromFilePath.name):
|
||||
self.fromPathFiles.append(self.fromPath)
|
||||
else:
|
||||
fromPathDir = self.fromPath[:self.fromPath.rfind('/')]
|
||||
|
||||
try:
|
||||
self.file_cache.store(self.fromPath)
|
||||
fromPath = Path(self.file_cache.get(self.fromPath))
|
||||
ls_all_files.append(fromPath)
|
||||
uri_path = UNCPath(fromPathDir)
|
||||
ls_files = self.file_cache.get_ls_smbdir(fromPathDir)
|
||||
if ls_files:
|
||||
filtered_ls_files = fnmatch.filter(ls_files, fromFilePath.name)
|
||||
if filtered_ls_files:
|
||||
self.fromPathFiles = [fromPathDir + '/' + file_s for file_s in filtered_ls_files]
|
||||
except NotUNCPathError as exc:
|
||||
fromPath = Path(self.fromPath)
|
||||
if fromPath.exists():
|
||||
ls_all_files.append(fromPath)
|
||||
except Exception as exc:
|
||||
logdata['fromPath'] = self.fromPath
|
||||
logdata['exc'] = exc
|
||||
log('W13', logdata)
|
||||
elif self.fromPath and len(self.fromPath.split('/')) > 2:
|
||||
ls_files = self.file_cache.get_ls_smbdir(self.fromPath[:-1])
|
||||
if ls_files:
|
||||
ls_from_paths = [self.fromPath[:-1] + file_s for file_s in ls_files]
|
||||
for from_path in ls_from_paths:
|
||||
try:
|
||||
self.file_cache.store(from_path)
|
||||
fromPath = Path(self.file_cache.get(from_path))
|
||||
ls_all_files.append(fromPath)
|
||||
except Exception as exc:
|
||||
logdata['fromPath'] = self.fromPath
|
||||
logdata['exc'] = exc
|
||||
log('W13', logdata)
|
||||
else:
|
||||
try:
|
||||
fromLocalPath = Path(self.fromPath[:-1])
|
||||
if fromLocalPath.is_dir():
|
||||
ls = [fromFile for fromFile in fromLocalPath.iterdir() if fromFile.is_file()]
|
||||
for fromPath in ls:
|
||||
ls_all_files.append(fromPath)
|
||||
exact_path = Path(fromPathDir)
|
||||
if exact_path.is_dir():
|
||||
self.fromPathFiles = [str(fromFile) for fromFile in exact_path.iterdir() if fromFile.is_file()]
|
||||
except Exception as exc:
|
||||
logdata['fromPath'] = self.fromPath
|
||||
logdata['exc'] = exc
|
||||
log('W13', logdata)
|
||||
else:
|
||||
fromPath = Path(self.fromPath) if self.fromPath else None
|
||||
ls_all_files.append(fromPath)
|
||||
return ls_all_files
|
||||
log('W3316', logdata)
|
||||
except Exception as exc:
|
||||
logdata['fromPath'] = self.fromPath
|
||||
logdata['exc'] = exc
|
||||
log('W3317', logdata)
|
||||
|
||||
def check_target_path(path_to_check, username = None):
|
||||
'''
|
||||
Function for checking the correctness of the path
|
||||
'''
|
||||
if not path_to_check:
|
||||
return None
|
||||
|
||||
checking = Path(path_to_check)
|
||||
if checking.is_dir():
|
||||
if username and path_to_check == '/':
|
||||
return Path(get_homedir(username))
|
||||
return checking
|
||||
#Check for path directory without '/something' suffix
|
||||
elif (len(path_to_check.split('/')) > 2
|
||||
and Path(path_to_check.replace(path_to_check.split('/')[-1], '')).is_dir()):
|
||||
return checking
|
||||
elif username:
|
||||
target_path = Path(get_homedir(username))
|
||||
res = target_path.joinpath(path_to_check
|
||||
if path_to_check[0] != '/'
|
||||
else path_to_check[1:])
|
||||
return res
|
||||
else:
|
||||
return False
|
||||
rootpath = Path('/')
|
||||
if username:
|
||||
rootpath = Path(get_homedir(username))
|
||||
|
||||
return rootpath.joinpath(checking)
|
||||
|
||||
class Execution_check():
|
||||
|
||||
__etension_marker_key_name = 'ExtensionMarker'
|
||||
__marker_usage_path_key_name = 'MarkerUsagePath'
|
||||
__hklm_branch = 'Software\\BaseALT\\Policies\\GroupPolicies\\Files'
|
||||
|
||||
def __init__(self, storage):
|
||||
etension_marker_branch = '{}\\{}%'.format(self.__hklm_branch, self.__etension_marker_key_name)
|
||||
marker_usage_path_branch = '{}\\{}%'.format(self.__hklm_branch, self.__marker_usage_path_key_name)
|
||||
self.etension_marker = storage.filter_hklm_entries(etension_marker_branch)
|
||||
self.marker_usage_path = storage.filter_hklm_entries(marker_usage_path_branch)
|
||||
self.list_paths = list()
|
||||
self.list_markers = list()
|
||||
for marker in self.etension_marker:
|
||||
self.list_markers.append(marker.data)
|
||||
for usage_path in self.marker_usage_path:
|
||||
self.list_paths.append(usage_path.data)
|
||||
|
||||
def get_list_paths(self):
|
||||
return self.list_paths
|
||||
|
||||
def get_list_markers(self):
|
||||
return self.list_markers
|
||||
|
@@ -20,7 +20,7 @@
|
||||
from pathlib import Path
|
||||
|
||||
|
||||
from gpt.folders import (
|
||||
from util.arguments import (
|
||||
FileAction
|
||||
, action_letter2enum
|
||||
)
|
||||
@@ -36,20 +36,24 @@ def remove_dir_tree(path, delete_files=False, delete_folder=False, delete_sub_fo
|
||||
content.remove(entry)
|
||||
if entry.is_dir() and delete_sub_folders:
|
||||
content.remove(entry)
|
||||
remove_dir_tree(entry, delete_files, delete_folder, delete_sub_folders)
|
||||
content.extend(remove_dir_tree(entry, delete_files, delete_folder, delete_sub_folders))
|
||||
|
||||
if delete_folder and not content:
|
||||
path.rmdir()
|
||||
|
||||
return content
|
||||
|
||||
def str2bool(boolstr):
|
||||
if boolstr and boolstr.lower() in ['true', 'yes', '1']:
|
||||
if isinstance(boolstr, bool):
|
||||
return boolstr
|
||||
elif boolstr and boolstr.lower() in ['true', 'yes', '1']:
|
||||
return True
|
||||
return False
|
||||
|
||||
|
||||
class Folder:
|
||||
def __init__(self, folder_object, username=None):
|
||||
folder_path = expand_windows_var(folder_object.path, username).replace('\\', '/')
|
||||
folder_path = expand_windows_var(folder_object.path, username).replace('\\', '/').replace('//', '/')
|
||||
if username:
|
||||
folder_path = folder_path.replace(get_homedir(username), '')
|
||||
self.folder_path = Path(get_homedir(username)).joinpath(folder_path if folder_path [0] != '/' else folder_path [1:])
|
||||
@@ -59,18 +63,26 @@ class Folder:
|
||||
self.delete_files = str2bool(folder_object.delete_files)
|
||||
self.delete_folder = str2bool(folder_object.delete_folder)
|
||||
self.delete_sub_folders = str2bool(folder_object.delete_sub_folders)
|
||||
self.hidden_folder = str2bool(folder_object.hidden_folder)
|
||||
|
||||
def _create_action(self):
|
||||
self.folder_path.mkdir(parents=True, exist_ok=True)
|
||||
|
||||
def _delete_action(self):
|
||||
if self.folder_path.exists():
|
||||
if self.action == FileAction.REPLACE:
|
||||
self.delete_folder = True
|
||||
remove_dir_tree(self.folder_path,
|
||||
self.delete_files,
|
||||
self.delete_folder,
|
||||
self.delete_sub_folders)
|
||||
|
||||
def act(self):
|
||||
if self.hidden_folder == True and str(self.folder_path.name)[0] != '.':
|
||||
path_components = list(self.folder_path.parts)
|
||||
path_components[-1] = '.' + path_components[-1]
|
||||
new_folder_path = Path(*path_components)
|
||||
self.folder_path = new_folder_path
|
||||
if self.action == FileAction.CREATE:
|
||||
self._create_action()
|
||||
if self.action == FileAction.UPDATE:
|
||||
|
@@ -18,10 +18,9 @@
|
||||
|
||||
import configparser
|
||||
import os
|
||||
import logging
|
||||
from gi.repository import Gio, GLib
|
||||
|
||||
from util.logging import slogm, log
|
||||
from util.logging import log
|
||||
|
||||
class system_gsetting:
|
||||
def __init__(self, schema, path, value, lock, helper_function=None):
|
||||
|
@@ -18,16 +18,15 @@
|
||||
|
||||
|
||||
|
||||
from gpt.folders import (
|
||||
from util.arguments import (
|
||||
FileAction
|
||||
, action_letter2enum
|
||||
)
|
||||
from util.logging import log
|
||||
from pathlib import Path
|
||||
import configparser
|
||||
from util.windows import expand_windows_var
|
||||
from util.util import get_homedir
|
||||
|
||||
from util.gpoa_ini_parsing import GpoaConfigObj
|
||||
|
||||
|
||||
class Ini_file:
|
||||
@@ -42,53 +41,55 @@ class Ini_file:
|
||||
self.action = action_letter2enum(ini_obj.action)
|
||||
self.key = ini_obj.property
|
||||
self.value = ini_obj.value
|
||||
self.config = configparser.ConfigParser()
|
||||
self.act()
|
||||
|
||||
def _create_action(self):
|
||||
if self.section not in self.config:
|
||||
self.config[self.section] = dict()
|
||||
|
||||
self.config[self.section][self.key] = self.value
|
||||
|
||||
with self.path.open("w", encoding="utf-8") as configfile:
|
||||
self.config.write(configfile)
|
||||
|
||||
|
||||
|
||||
def _delete_action(self):
|
||||
if not self.path.exists():
|
||||
return
|
||||
|
||||
if not self.section:
|
||||
self.path.unlink()
|
||||
return
|
||||
if not self.key:
|
||||
self.config.remove_section(self.section)
|
||||
elif self.section in self.config:
|
||||
self.config.remove_option(self.section, self.key)
|
||||
|
||||
with self.path.open("w", encoding="utf-8") as configfile:
|
||||
self.config.write(configfile)
|
||||
|
||||
|
||||
def act(self):
|
||||
try:
|
||||
self.config.read(self.path)
|
||||
self.config = GpoaConfigObj(str(self.path), unrepr=False)
|
||||
except Exception as exc:
|
||||
logdata = {'exc': exc}
|
||||
log('D176', logdata)
|
||||
return
|
||||
if self.action == FileAction.CREATE:
|
||||
self._create_action()
|
||||
if self.action == FileAction.UPDATE:
|
||||
self._delete_action()
|
||||
self._create_action()
|
||||
if self.action == FileAction.DELETE:
|
||||
self._delete_action()
|
||||
if self.action == FileAction.REPLACE:
|
||||
self._delete_action()
|
||||
self._create_action()
|
||||
|
||||
self.act()
|
||||
|
||||
def _create_action(self):
|
||||
if self.path.is_dir():
|
||||
return
|
||||
if self.section not in self.config:
|
||||
self.config[self.section] = dict()
|
||||
|
||||
self.config[self.section][self.key] = self.value
|
||||
self.config.write()
|
||||
|
||||
|
||||
def _delete_action(self):
|
||||
if not self.path.exists() or self.path.is_dir():
|
||||
return
|
||||
if not self.section:
|
||||
self.path.unlink()
|
||||
return
|
||||
if self.section in self.config:
|
||||
if not self.key:
|
||||
self.config.pop(self.section)
|
||||
elif self.key in self.config[self.section]:
|
||||
self.config[self.section].pop(self.key)
|
||||
self.config.write()
|
||||
|
||||
|
||||
def act(self):
|
||||
try:
|
||||
if self.action == FileAction.CREATE:
|
||||
self._create_action()
|
||||
if self.action == FileAction.UPDATE:
|
||||
self._create_action()
|
||||
if self.action == FileAction.DELETE:
|
||||
self._delete_action()
|
||||
if self.action == FileAction.REPLACE:
|
||||
self._create_action()
|
||||
except Exception as exc:
|
||||
logdata = dict()
|
||||
logdata['action'] = self.action
|
||||
logdata['exc'] = exc
|
||||
log('W23', logdata)
|
||||
|
||||
|
||||
def check_path(path_to_check, username = None):
|
||||
'''
|
||||
|
@@ -18,7 +18,7 @@
|
||||
|
||||
import subprocess
|
||||
|
||||
from gpt.folders import (
|
||||
from util.arguments import (
|
||||
FileAction
|
||||
, action_letter2enum
|
||||
)
|
||||
@@ -26,14 +26,15 @@ from util.logging import log
|
||||
from util.windows import expand_windows_var
|
||||
|
||||
|
||||
|
||||
class Networkshare:
|
||||
|
||||
def __init__(self, networkshare_obj):
|
||||
def __init__(self, networkshare_obj, username = None):
|
||||
self.net_full_cmd = ['/usr/bin/net', 'usershare']
|
||||
self.net_cmd_check = ['/usr/bin/net', 'usershare', 'list']
|
||||
self.cmd = list()
|
||||
self.name = networkshare_obj.name
|
||||
self.path = expand_windows_var(networkshare_obj.path).replace('\\', '/') if networkshare_obj.path else None
|
||||
self.path = expand_windows_var(networkshare_obj.path, username).replace('\\', '/') if networkshare_obj.path else None
|
||||
|
||||
self.action = action_letter2enum(networkshare_obj.action)
|
||||
self.allRegular = networkshare_obj.allRegular
|
||||
self.comment = networkshare_obj.comment
|
||||
@@ -43,11 +44,22 @@ class Networkshare:
|
||||
self.acl = 'Everyone:'
|
||||
self.act()
|
||||
|
||||
def _run_net_full_cmd(self):
|
||||
def check_list_net(self):
|
||||
try:
|
||||
subprocess.call(self.net_full_cmd, stderr=subprocess.DEVNULL)
|
||||
res = subprocess.check_output(self.net_cmd_check, encoding='utf-8')
|
||||
return res
|
||||
except Exception as exc:
|
||||
return exc
|
||||
|
||||
def _run_net_full_cmd(self):
|
||||
logdata = dict()
|
||||
try:
|
||||
res = subprocess.check_output(self.net_full_cmd, stderr=subprocess.DEVNULL, encoding='utf-8')
|
||||
if res:
|
||||
logdata['cmd'] = self.net_full_cmd
|
||||
logdata['answer'] = res
|
||||
log('D190', logdata)
|
||||
except Exception as exc:
|
||||
logdata = dict()
|
||||
logdata['cmd'] = self.net_full_cmd
|
||||
logdata['exc'] = exc
|
||||
log('D182', logdata)
|
||||
@@ -58,7 +70,7 @@ class Networkshare:
|
||||
self.net_full_cmd.append(self.name)
|
||||
self.net_full_cmd.append(self.path)
|
||||
self.net_full_cmd.append(self.comment)
|
||||
self.net_full_cmd.append(self.acl + 'F' if self.abe == 'ENABLE' else self.acl + 'R')
|
||||
self.net_full_cmd.append(self.acl + 'F')
|
||||
self.net_full_cmd.append(self._guest)
|
||||
self._run_net_full_cmd()
|
||||
|
||||
|
@@ -18,9 +18,8 @@
|
||||
|
||||
import os
|
||||
import jinja2
|
||||
import logging
|
||||
|
||||
from util.logging import slogm, log
|
||||
from util.logging import log
|
||||
|
||||
class polkit:
|
||||
__template_path = '/usr/share/gpupdate/templates'
|
||||
@@ -38,7 +37,19 @@ class polkit:
|
||||
else:
|
||||
self.outfile = os.path.join(self.__policy_dir, '{}.rules'.format(self.template_name))
|
||||
|
||||
def _is_empty(self):
|
||||
for key, item in self.args.items():
|
||||
if key == 'User':
|
||||
continue
|
||||
elif item:
|
||||
return False
|
||||
return True
|
||||
|
||||
def generate(self):
|
||||
if self._is_empty():
|
||||
if os.path.isfile(self.outfile):
|
||||
os.remove(self.outfile)
|
||||
return
|
||||
try:
|
||||
template = self.__template_environment.get_template(self.infilename)
|
||||
text = template.render(**self.args)
|
||||
|
@@ -49,9 +49,13 @@ class systemd_unit:
|
||||
service_state = self._get_state()
|
||||
|
||||
if not service_state in ['active', 'activating']:
|
||||
logdata = dict()
|
||||
logdata['unit'] = self.unit_name
|
||||
log('E46', logdata)
|
||||
service_timer_name = self.unit_name.replace(".service", ".timer")
|
||||
self.unit = self.manager.LoadUnit(dbus.String(service_timer_name))
|
||||
service_state = self._get_state()
|
||||
if not service_state in ['active', 'activating']:
|
||||
logdata = dict()
|
||||
logdata['unit'] = self.unit_name
|
||||
log('E46', logdata)
|
||||
else:
|
||||
self.manager.StopUnit(self.unit_name, 'replace')
|
||||
self.manager.DisableUnitFiles([self.unit_name], dbus.Boolean(False))
|
||||
@@ -62,7 +66,7 @@ class systemd_unit:
|
||||
|
||||
service_state = self._get_state()
|
||||
|
||||
if not service_state in ['stopped']:
|
||||
if not service_state in ['stopped', 'deactivating', 'inactive']:
|
||||
logdata = dict()
|
||||
logdata['unit'] = self.unit_name
|
||||
log('E46', logdata)
|
||||
|
@@ -24,13 +24,13 @@ from .applier_frontend import (
|
||||
import json
|
||||
import os
|
||||
from util.logging import log
|
||||
from util.util import is_machine_name
|
||||
from util.util import is_machine_name, string_to_literal_eval
|
||||
|
||||
class chromium_applier(applier_frontend):
|
||||
__module_name = 'ChromiumApplier'
|
||||
__module_enabled = True
|
||||
__module_experimental = False
|
||||
__registry_branch = 'Software\\Policies\\Google\\Chrome'
|
||||
__registry_branch = 'Software/Policies/Google/Chrome'
|
||||
__managed_policies_path = '/etc/chromium/policies/managed'
|
||||
__recommended_policies_path = '/etc/chromium/policies/recommended'
|
||||
|
||||
@@ -65,7 +65,7 @@ class chromium_applier(applier_frontend):
|
||||
#Replacing all nested dictionaries with a list
|
||||
dict_item_to_list = (
|
||||
lambda target_dict :
|
||||
{key:[*val.values()] if type(val) == dict else val for key,val in target_dict.items()}
|
||||
{key:[*val.values()] if type(val) == dict else string_to_literal_eval(val) for key,val in target_dict.items()}
|
||||
)
|
||||
os.makedirs(self.__managed_policies_path, exist_ok=True)
|
||||
with open(destfile, 'w') as f:
|
||||
@@ -98,48 +98,73 @@ class chromium_applier(applier_frontend):
|
||||
'''
|
||||
List of keys resulting from parsing chrome.admx with parsing_chrom_admx_intvalues.py
|
||||
'''
|
||||
valuename_typeint = (['DefaultCookiesSetting',
|
||||
'DefaultFileHandlingGuardSetting',
|
||||
valuename_typeint = (['DefaultClipboardSetting',
|
||||
'DefaultCookiesSetting',
|
||||
'DefaultFileSystemReadGuardSetting',
|
||||
'DefaultFileSystemWriteGuardSetting',
|
||||
'DefaultGeolocationSetting',
|
||||
'DefaultImagesSetting',
|
||||
'DefaultInsecureContentSetting',
|
||||
'DefaultJavaScriptJitSetting',
|
||||
'DefaultJavaScriptSetting',
|
||||
'DefaultPopupsSetting',
|
||||
'DefaultLocalFontsSetting',
|
||||
'DefaultNotificationsSetting',
|
||||
'DefaultGeolocationSetting',
|
||||
'DefaultPopupsSetting',
|
||||
'DefaultSensorsSetting',
|
||||
'DefaultWebBluetoothGuardSetting',
|
||||
'DefaultWebUsbGuardSetting',
|
||||
'DefaultSerialGuardSetting',
|
||||
'LegacySameSiteCookieBehaviorEnabled',
|
||||
'ProxyServerMode',
|
||||
'DefaultThirdPartyStoragePartitioningSetting',
|
||||
'DefaultWebBluetoothGuardSetting',
|
||||
'DefaultWebHidGuardSetting',
|
||||
'DefaultWebUsbGuardSetting',
|
||||
'DefaultWindowManagementSetting',
|
||||
'DefaultMediaStreamSetting',
|
||||
'PrintRasterizationMode',
|
||||
'DefaultPluginsSetting',
|
||||
'DefaultKeygenSetting',
|
||||
'ChromeFrameRendererSettings',
|
||||
'SafeBrowsingProtectionLevel',
|
||||
'PasswordProtectionWarningTrigger',
|
||||
'SafeBrowsingProtectionLevel_recommended',
|
||||
'RestoreOnStartup',
|
||||
'RestoreOnStartup_recommended',
|
||||
'DefaultWindowPlacementSetting',
|
||||
'ProxyServerMode',
|
||||
'ExtensionManifestV2Availability',
|
||||
'ExtensionUnpublishedAvailability',
|
||||
'CreateThemesSettings',
|
||||
'DevToolsGenAiSettings',
|
||||
'GenAILocalFoundationalModelSettings',
|
||||
'HelpMeWriteSettings',
|
||||
'TabOrganizerSettings',
|
||||
'BrowserSwitcherParsingMode',
|
||||
'CloudAPAuthEnabled',
|
||||
'AdsSettingForIntrusiveAdsSites',
|
||||
'AmbientAuthenticationInPrivateModesEnabled',
|
||||
'BatterySaverModeAvailability',
|
||||
'BrowserSignin',
|
||||
'ChromeVariations',
|
||||
'DeveloperToolsAvailability',
|
||||
'DownloadRestrictions',
|
||||
'DownloadRestrictions_recommended',
|
||||
'ForceYouTubeRestrict',
|
||||
'HeadlessMode',
|
||||
'IncognitoModeAvailability',
|
||||
'IntranetRedirectBehavior',
|
||||
'LensOverlaySettings',
|
||||
'MemorySaverModeSavings',
|
||||
'NetworkPredictionOptions',
|
||||
'NetworkPredictionOptions_recommended',
|
||||
'ProfilePickerOnStartupAvailability',
|
||||
'ProfileReauthPrompt',
|
||||
'RelaunchNotification',
|
||||
'SafeSitesFilterBehavior'])
|
||||
'SafeSitesFilterBehavior',
|
||||
'ToolbarAvatarLabelSettings',
|
||||
'UserAgentReduction',
|
||||
'BatterySaverModeAvailability_recommended',
|
||||
'DownloadRestrictions_recommended',
|
||||
'NetworkPredictionOptions_recommended',
|
||||
'PrintPostScriptMode',
|
||||
'PrintRasterizationMode',
|
||||
'ChromeFrameRendererSettings',
|
||||
'DefaultFileHandlingGuardSetting',
|
||||
'DefaultKeygenSetting',
|
||||
'DefaultPluginsSetting',
|
||||
'LegacySameSiteCookieBehaviorEnabled',
|
||||
'ForceMajorVersionToMinorPositionInUserAgent',
|
||||
'PasswordProtectionWarningTrigger',
|
||||
'SafeBrowsingProtectionLevel',
|
||||
'SafeBrowsingProtectionLevel_recommended',
|
||||
'RestoreOnStartup',
|
||||
'RestoreOnStartup_recommended'])
|
||||
return valuename_typeint
|
||||
|
||||
|
||||
@@ -152,7 +177,7 @@ class chromium_applier(applier_frontend):
|
||||
'''
|
||||
Parse registry path string and leave key parameters
|
||||
'''
|
||||
parts = hivekeyname.replace(self.__registry_branch, '').split('\\')
|
||||
parts = hivekeyname.replace(self.__registry_branch, '').split('/')
|
||||
return parts
|
||||
|
||||
|
||||
|
@@ -1,7 +1,7 @@
|
||||
#
|
||||
# GPOA - GPO Applier for Linux
|
||||
#
|
||||
# Copyright (C) 2019-2020 BaseALT Ltd.
|
||||
# Copyright (C) 2019-2022 BaseALT Ltd.
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License as published by
|
||||
@@ -16,20 +16,18 @@
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
import fileinput
|
||||
import jinja2
|
||||
import os
|
||||
import subprocess
|
||||
import logging
|
||||
from pathlib import Path
|
||||
import string
|
||||
|
||||
from .applier_frontend import (
|
||||
applier_frontend
|
||||
, check_enabled
|
||||
)
|
||||
from gpt.drives import json2drive
|
||||
from util.util import get_homedir
|
||||
from util.logging import slogm, log
|
||||
from util.logging import log
|
||||
|
||||
def storage_get_drives(storage, sid):
|
||||
drives = storage.get_drives(sid)
|
||||
@@ -50,45 +48,159 @@ def add_line_if_missing(filename, ins_line):
|
||||
f.write(ins_line + '\n')
|
||||
f.flush()
|
||||
|
||||
def remove_chars_before_colon(input_string):
|
||||
if ":" in input_string:
|
||||
colon_index = input_string.index(":")
|
||||
result_string = input_string[colon_index + 1:]
|
||||
return result_string
|
||||
else:
|
||||
return input_string
|
||||
|
||||
def remove_escaped_quotes(input_string):
|
||||
result_string = input_string.replace('"', '').replace("'", '')
|
||||
return result_string
|
||||
|
||||
|
||||
class Drive_list:
|
||||
__alphabet = string.ascii_uppercase
|
||||
def __init__(self):
|
||||
self.dict_drives = dict()
|
||||
|
||||
def __get_letter(self, letter):
|
||||
slice_letters = set(self.__alphabet[self.__alphabet.find(letter) + 1:]) - set(self.dict_drives.keys())
|
||||
free_letters = sorted(slice_letters)
|
||||
if free_letters:
|
||||
return free_letters[0]
|
||||
else:
|
||||
return None
|
||||
|
||||
def append(self, drive:dict):
|
||||
cur_dir = drive['dir']
|
||||
if cur_dir not in set(self.dict_drives.keys()):
|
||||
if drive['action'] == 'D':
|
||||
return
|
||||
self.dict_drives[cur_dir] = drive
|
||||
return
|
||||
|
||||
else:
|
||||
if drive['action'] == 'C':
|
||||
if drive['useLetter'] == '1':
|
||||
return
|
||||
else:
|
||||
new_dir = self.__get_letter(cur_dir)
|
||||
if not new_dir:
|
||||
return
|
||||
drive['dir'] = new_dir
|
||||
self.dict_drives[new_dir] = drive
|
||||
return
|
||||
|
||||
if drive['action'] == 'U':
|
||||
self.dict_drives[cur_dir]['thisDrive'] = drive['thisDrive']
|
||||
self.dict_drives[cur_dir]['allDrives'] = drive['allDrives']
|
||||
self.dict_drives[cur_dir]['label'] = drive['label']
|
||||
self.dict_drives[cur_dir]['persistent'] = drive['persistent']
|
||||
self.dict_drives[cur_dir]['useLetter'] = drive['useLetter']
|
||||
return
|
||||
|
||||
if drive['action'] == 'R':
|
||||
self.dict_drives[cur_dir] = drive
|
||||
return
|
||||
if drive['action'] == 'D':
|
||||
if drive['useLetter'] == '1':
|
||||
self.dict_drives.pop(cur_dir, None)
|
||||
else:
|
||||
keys_set = set(self.dict_drives.keys())
|
||||
slice_letters = set(self.__alphabet[self.__alphabet.find(cur_dir):])
|
||||
for letter_dir in (keys_set & slice_letters):
|
||||
self.dict_drives.pop(letter_dir, None)
|
||||
|
||||
def __call__(self):
|
||||
return list(self.dict_drives.values())
|
||||
|
||||
def len(self):
|
||||
return len(self.dict_drives)
|
||||
|
||||
class cifs_applier(applier_frontend):
|
||||
def __init__(self, storage):
|
||||
pass
|
||||
__module_name = 'CIFSApplier'
|
||||
__module_enabled = True
|
||||
__module_experimental = False
|
||||
|
||||
def __init__(self, storage, sid):
|
||||
self.applier_cifs = cifs_applier_user(storage, sid, None)
|
||||
self.__module_enabled = check_enabled(
|
||||
storage
|
||||
, self.__module_name
|
||||
, self.__module_experimental
|
||||
)
|
||||
|
||||
def apply(self):
|
||||
pass
|
||||
if self.__module_enabled:
|
||||
log('D179')
|
||||
self.applier_cifs._admin_context_apply()
|
||||
else:
|
||||
log('D180')
|
||||
|
||||
class cifs_applier_user(applier_frontend):
|
||||
__module_name = 'CIFSApplierUser'
|
||||
__module_enabled = False
|
||||
__module_experimental = True
|
||||
__module_enabled = True
|
||||
__module_experimental = False
|
||||
__auto_file = '/etc/auto.master'
|
||||
__auto_dir = '/etc/auto.master.gpupdate.d'
|
||||
__template_path = '/usr/share/gpupdate/templates'
|
||||
__template_mountpoints = 'autofs_mountpoints.j2'
|
||||
__template_identity = 'autofs_identity.j2'
|
||||
__template_auto = 'autofs_auto.j2'
|
||||
__template_mountpoints_hide = 'autofs_mountpoints_hide.j2'
|
||||
__template_auto_hide = 'autofs_auto_hide.j2'
|
||||
__enable_home_link = 'Software\\BaseALT\\Policies\\GPUpdate\\DriveMapsHome'
|
||||
__enable_home_link_user = 'Software\\BaseALT\\Policies\\GPUpdate\\DriveMapsHomeUser'
|
||||
__target_mountpoint = '/media/gpupdate'
|
||||
__target_mountpoint_user = '/run/media'
|
||||
__mountpoint_dirname = 'drives.system'
|
||||
__mountpoint_dirname_user = 'drives'
|
||||
|
||||
def __init__(self, storage, sid, username):
|
||||
self.storage = storage
|
||||
self.sid = sid
|
||||
self.username = username
|
||||
self.state_home_link = False
|
||||
self.state_home_link_user = False
|
||||
|
||||
if username:
|
||||
self.home = self.__target_mountpoint_user + '/' + username
|
||||
self.state_home_link = self.check_enable_home_link(self.__enable_home_link)
|
||||
self.state_home_link_user = self.check_enable_home_link(self.__enable_home_link_user)
|
||||
else:
|
||||
self.home = self.__target_mountpoint
|
||||
|
||||
self.home = get_homedir(username)
|
||||
conf_file = '{}.conf'.format(sid)
|
||||
conf_hide_file = '{}_hide.conf'.format(sid)
|
||||
autofs_file = '{}.autofs'.format(sid)
|
||||
autofs_hide_file = '{}_hide.autofs'.format(sid)
|
||||
cred_file = '{}.creds'.format(sid)
|
||||
|
||||
self.auto_master_d = Path(self.__auto_dir)
|
||||
|
||||
self.user_config = self.auto_master_d / conf_file
|
||||
self.user_config_hide = self.auto_master_d / conf_hide_file
|
||||
if os.path.exists(self.user_config.resolve()):
|
||||
self.user_config.unlink()
|
||||
if os.path.exists(self.user_config_hide.resolve()):
|
||||
self.user_config_hide.unlink()
|
||||
self.user_autofs = self.auto_master_d / autofs_file
|
||||
self.user_autofs_hide = self.auto_master_d / autofs_hide_file
|
||||
if os.path.exists(self.user_autofs.resolve()):
|
||||
self.user_autofs.unlink()
|
||||
if os.path.exists(self.user_autofs_hide.resolve()):
|
||||
self.user_autofs_hide.unlink()
|
||||
self.user_creds = self.auto_master_d / cred_file
|
||||
|
||||
self.mount_dir = Path(os.path.join(self.home, 'net'))
|
||||
if username:
|
||||
self.mntTarget = self.__mountpoint_dirname_user
|
||||
else:
|
||||
self.mntTarget = self.__mountpoint_dirname
|
||||
|
||||
self.mount_dir = Path(os.path.join(self.home))
|
||||
self.drives = storage_get_drives(self.storage, self.sid)
|
||||
|
||||
self.template_loader = jinja2.FileSystemLoader(searchpath=self.__template_path)
|
||||
@@ -98,12 +210,21 @@ class cifs_applier_user(applier_frontend):
|
||||
self.template_indentity = self.template_env.get_template(self.__template_identity)
|
||||
self.template_auto = self.template_env.get_template(self.__template_auto)
|
||||
|
||||
self.template_mountpoints_hide = self.template_env.get_template(self.__template_mountpoints_hide)
|
||||
self.template_auto_hide = self.template_env.get_template(self.__template_auto_hide)
|
||||
|
||||
self.__module_enabled = check_enabled(
|
||||
self.storage
|
||||
, self.__module_name
|
||||
, self.__module_experimental
|
||||
)
|
||||
|
||||
def check_enable_home_link(self, enable_home_link):
|
||||
if self.storage.get_hkcu_entry(self.sid, enable_home_link):
|
||||
data = self.storage.get_hkcu_entry(self.sid, enable_home_link).data
|
||||
return bool(int(data)) if data else None
|
||||
else:
|
||||
return False
|
||||
|
||||
def user_context_apply(self):
|
||||
'''
|
||||
@@ -111,7 +232,7 @@ class cifs_applier_user(applier_frontend):
|
||||
'''
|
||||
pass
|
||||
|
||||
def __admin_context_apply(self):
|
||||
def _admin_context_apply(self):
|
||||
# Create /etc/auto.master.gpupdate.d directory
|
||||
self.auto_master_d.mkdir(parents=True, exist_ok=True)
|
||||
# Create user's destination mount directory
|
||||
@@ -122,28 +243,42 @@ class cifs_applier_user(applier_frontend):
|
||||
add_line_if_missing(self.__auto_file, auto_destdir)
|
||||
|
||||
# Collect data for drive settings
|
||||
drive_list = list()
|
||||
drive_list = Drive_list()
|
||||
for drv in self.drives:
|
||||
drive_settings = dict()
|
||||
drive_settings['dir'] = drv.dir
|
||||
drive_settings['login'] = drv.login
|
||||
drive_settings['password'] = drv.password
|
||||
drive_settings['path'] = drv.path.replace('\\', '/')
|
||||
drive_settings['path'] = remove_chars_before_colon(drv.path.replace('\\', '/'))
|
||||
drive_settings['action'] = drv.action
|
||||
drive_settings['thisDrive'] = drv.thisDrive
|
||||
drive_settings['allDrives'] = drv.allDrives
|
||||
drive_settings['label'] = remove_escaped_quotes(drv.label)
|
||||
drive_settings['persistent'] = drv.persistent
|
||||
drive_settings['useLetter'] = drv.useLetter
|
||||
|
||||
drive_list.append(drive_settings)
|
||||
|
||||
if len(drive_list) > 0:
|
||||
if drive_list.len() > 0:
|
||||
mount_settings = dict()
|
||||
mount_settings['drives'] = drive_list
|
||||
mount_settings['drives'] = drive_list()
|
||||
mount_text = self.template_mountpoints.render(**mount_settings)
|
||||
|
||||
mount_text_hide = self.template_mountpoints_hide.render(**mount_settings)
|
||||
|
||||
with open(self.user_config.resolve(), 'w') as f:
|
||||
f.truncate()
|
||||
f.write(mount_text)
|
||||
f.flush()
|
||||
|
||||
with open(self.user_config_hide.resolve(), 'w') as f:
|
||||
f.truncate()
|
||||
f.write(mount_text_hide)
|
||||
f.flush()
|
||||
|
||||
autofs_settings = dict()
|
||||
autofs_settings['home_dir'] = self.home
|
||||
autofs_settings['mntTarget'] = self.mntTarget
|
||||
autofs_settings['mount_file'] = self.user_config.resolve()
|
||||
autofs_text = self.template_auto.render(**autofs_settings)
|
||||
|
||||
@@ -152,13 +287,71 @@ class cifs_applier_user(applier_frontend):
|
||||
f.write(autofs_text)
|
||||
f.flush()
|
||||
|
||||
autofs_settings['mount_file'] = self.user_config_hide.resolve()
|
||||
autofs_text = self.template_auto_hide.render(**autofs_settings)
|
||||
with open(self.user_autofs_hide.resolve(), 'w') as f:
|
||||
f.truncate()
|
||||
f.write(autofs_text)
|
||||
f.flush()
|
||||
|
||||
if self.username:
|
||||
self.update_drivemaps_home_links()
|
||||
|
||||
subprocess.check_call(['/bin/systemctl', 'restart', 'autofs'])
|
||||
|
||||
def update_drivemaps_home_links(self):
|
||||
dUser = Path(get_homedir(self.username)+'/net.' + self.__mountpoint_dirname_user)
|
||||
dUserHide = Path(get_homedir(self.username)+'/.net.' + self.__mountpoint_dirname_user)
|
||||
|
||||
if self.state_home_link_user:
|
||||
dUserMountpoint = Path(self.home).joinpath(self.__mountpoint_dirname_user)
|
||||
dUserMountpointHide = Path(self.home).joinpath('.' + self.__mountpoint_dirname_user)
|
||||
|
||||
if not dUser.exists():
|
||||
try:
|
||||
os.symlink(dUserMountpoint, dUser, True)
|
||||
except Exception as exc:
|
||||
log('D194', {'exc': exc})
|
||||
|
||||
if not dUserHide.exists():
|
||||
try:
|
||||
os.symlink(dUserMountpointHide, dUserHide, True)
|
||||
except Exception as exc:
|
||||
log('D196', {'exc': exc})
|
||||
else:
|
||||
if dUser.is_symlink() and dUser.owner() == 'root':
|
||||
dUser.unlink()
|
||||
if dUserHide.is_symlink() and dUserHide.owner() == 'root':
|
||||
dUserHide.unlink()
|
||||
|
||||
dMachine = Path(get_homedir(self.username)+'/net.' + self.__mountpoint_dirname)
|
||||
dMachineHide = Path(get_homedir(self.username)+'/.net.' + self.__mountpoint_dirname)
|
||||
|
||||
if self.state_home_link:
|
||||
dMachineMountpoint = Path(self.__target_mountpoint).joinpath(self.__mountpoint_dirname)
|
||||
dMachineMountpointHide = Path(self.__target_mountpoint).joinpath('.' + self.__mountpoint_dirname)
|
||||
|
||||
if not dMachine.exists():
|
||||
try:
|
||||
os.symlink(dMachineMountpoint, dMachine, True)
|
||||
except Exception as exc:
|
||||
log('D195', {'exc': exc})
|
||||
|
||||
if not dMachineHide.exists():
|
||||
try:
|
||||
os.symlink(dMachineMountpointHide, dMachineHide, True)
|
||||
except Exception as exc:
|
||||
log('D197', {'exc': exc})
|
||||
else:
|
||||
if dMachine.is_symlink() and dMachine.owner() == 'root':
|
||||
dMachine.unlink()
|
||||
if dMachineHide.is_symlink() and dMachineHide.owner() == 'root':
|
||||
dMachineHide.unlink()
|
||||
|
||||
def admin_context_apply(self):
|
||||
if self.__module_enabled:
|
||||
log('D146')
|
||||
self.__admin_context_apply()
|
||||
self._admin_context_apply()
|
||||
else:
|
||||
log('D147')
|
||||
|
||||
|
@@ -29,11 +29,11 @@ class control_applier(applier_frontend):
|
||||
__module_name = 'ControlApplier'
|
||||
__module_experimental = False
|
||||
__module_enabled = True
|
||||
_registry_branch = 'Software\\BaseALT\\Policies\\Control'
|
||||
_registry_branch = 'Software/BaseALT/Policies/Control'
|
||||
|
||||
def __init__(self, storage):
|
||||
self.storage = storage
|
||||
self.control_settings = self.storage.filter_hklm_entries('Software\\BaseALT\\Policies\\Control%')
|
||||
self.control_settings = self.storage.filter_hklm_entries(self._registry_branch)
|
||||
self.controls = list()
|
||||
self.__module_enabled = check_enabled(
|
||||
self.storage
|
||||
@@ -43,7 +43,7 @@ class control_applier(applier_frontend):
|
||||
|
||||
def run(self):
|
||||
for setting in self.control_settings:
|
||||
valuename = setting.hive_key.rpartition('\\')[2]
|
||||
valuename = setting.hive_key.rpartition('/')[2]
|
||||
try:
|
||||
self.controls.append(control(valuename, int(setting.data)))
|
||||
logdata = dict()
|
||||
|
@@ -81,8 +81,12 @@ class cups_applier(applier_frontend):
|
||||
if not is_rpm_installed('cups'):
|
||||
log('W9')
|
||||
return
|
||||
|
||||
self.cups_connection = cups.Connection()
|
||||
try:
|
||||
self.cups_connection = cups.Connection()
|
||||
except Exception as exc:
|
||||
logdata = dict()
|
||||
logdata['exc', exc]
|
||||
log('W20', logdata)
|
||||
self.printers = storage_get_printers(self.storage, self.storage.get_info('machine_sid'))
|
||||
|
||||
if self.printers:
|
||||
|
@@ -17,7 +17,7 @@
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
|
||||
from .appliers.file_cp import Files_cp
|
||||
from .appliers.file_cp import Files_cp, Execution_check
|
||||
from .applier_frontend import (
|
||||
applier_frontend
|
||||
, check_enabled
|
||||
@@ -33,6 +33,7 @@ class file_applier(applier_frontend):
|
||||
|
||||
def __init__(self, storage, file_cache, sid):
|
||||
self.storage = storage
|
||||
self.exe_check = Execution_check(storage)
|
||||
self.sid = sid
|
||||
self.file_cache = file_cache
|
||||
self.files = self.storage.get_files(self.sid)
|
||||
@@ -40,7 +41,7 @@ class file_applier(applier_frontend):
|
||||
|
||||
def run(self):
|
||||
for file in self.files:
|
||||
Files_cp(file, self.file_cache)
|
||||
Files_cp(file, self.file_cache, self.exe_check)
|
||||
|
||||
def apply(self):
|
||||
if self.__module_enabled:
|
||||
@@ -59,6 +60,7 @@ class file_applier_user(applier_frontend):
|
||||
self.file_cache = file_cache
|
||||
self.sid = sid
|
||||
self.username = username
|
||||
self.exe_check = Execution_check(storage)
|
||||
self.files = self.storage.get_files(self.sid)
|
||||
self.__module_enabled = check_enabled(
|
||||
self.storage
|
||||
@@ -68,7 +70,7 @@ class file_applier_user(applier_frontend):
|
||||
|
||||
def run(self):
|
||||
for file in self.files:
|
||||
Files_cp(file, self.file_cache, self.username)
|
||||
Files_cp(file, self.file_cache, self.exe_check, self.username)
|
||||
|
||||
def admin_context_apply(self):
|
||||
if self.__module_enabled:
|
||||
|
@@ -33,13 +33,13 @@ from .applier_frontend import (
|
||||
, check_enabled
|
||||
)
|
||||
from util.logging import log
|
||||
from util.util import is_machine_name
|
||||
from util.util import is_machine_name, try_dict_to_literal_eval
|
||||
|
||||
class firefox_applier(applier_frontend):
|
||||
__module_name = 'FirefoxApplier'
|
||||
__module_experimental = False
|
||||
__module_enabled = True
|
||||
__registry_branch = 'Software\\Policies\\Mozilla\\Firefox\\'
|
||||
__registry_branch = 'Software/Policies/Mozilla/Firefox'
|
||||
__firefox_installdir1 = '/usr/lib64/firefox/distribution'
|
||||
__firefox_installdir2 = '/etc/firefox/policies'
|
||||
|
||||
@@ -69,19 +69,27 @@ class firefox_applier(applier_frontend):
|
||||
'''
|
||||
Parse registry path string and leave key parameters
|
||||
'''
|
||||
parts = hivekeyname.replace(self.__registry_branch, '').split('\\')
|
||||
parts = hivekeyname.replace(self.__registry_branch, '').split('/')
|
||||
return parts
|
||||
|
||||
def create_dict(self, firefox_keys):
|
||||
'''
|
||||
Collect dictionaries from registry keys into a general dictionary
|
||||
'''
|
||||
excp = ['SOCKSVersion']
|
||||
counts = dict()
|
||||
for it_data in firefox_keys:
|
||||
branch = counts
|
||||
try:
|
||||
if type(it_data.data) is bytes:
|
||||
it_data.data = it_data.data.decode(encoding='utf-16').replace('\x00','')
|
||||
json_data = try_dict_to_literal_eval(it_data.data)
|
||||
if json_data:
|
||||
it_data.data = json_data
|
||||
it_data.type = 7
|
||||
else:
|
||||
if it_data.type == 1:
|
||||
it_data.data = clean_data_firefox(it_data.data)
|
||||
#Cases when it is necessary to create nested dictionaries
|
||||
if it_data.valuename != it_data.data:
|
||||
parts = self.get_parts(it_data.hive_key)
|
||||
@@ -90,7 +98,12 @@ class firefox_applier(applier_frontend):
|
||||
branch = branch.setdefault(part, {})
|
||||
#dictionary key value initialization
|
||||
if it_data.type == 4:
|
||||
branch[parts[-1]] = self.get_boolean(it_data.data)
|
||||
if it_data.valuename in excp:
|
||||
branch[parts[-1]] = int(it_data.data)
|
||||
else:
|
||||
branch[parts[-1]] = self.get_boolean(it_data.data)
|
||||
elif it_data.type == 7:
|
||||
branch[parts[-1]] = it_data.data
|
||||
else:
|
||||
branch[parts[-1]] = str(it_data.data).replace('\\', '/')
|
||||
#Cases when it is necessary to create lists in a dictionary
|
||||
@@ -160,6 +173,9 @@ def dict_item_to_list(dictionary:dict) -> dict:
|
||||
'''
|
||||
Replacing dictionaries with numeric keys with a List
|
||||
'''
|
||||
if '' in dictionary:
|
||||
dictionary = dictionary.pop('')
|
||||
|
||||
for key,val in dictionary.items():
|
||||
if type(val) == dict:
|
||||
if key_dict_is_digit(val):
|
||||
@@ -167,3 +183,6 @@ def dict_item_to_list(dictionary:dict) -> dict:
|
||||
else:
|
||||
dict_item_to_list(dictionary[key])
|
||||
return dictionary
|
||||
|
||||
def clean_data_firefox(data):
|
||||
return data.replace("'", '\"')
|
||||
|
@@ -45,7 +45,9 @@ from .folder_applier import (
|
||||
folder_applier
|
||||
, folder_applier_user
|
||||
)
|
||||
from .cifs_applier import cifs_applier_user
|
||||
from .cifs_applier import (
|
||||
cifs_applier_user
|
||||
, cifs_applier)
|
||||
from .ntp_applier import ntp_applier
|
||||
from .envvar_applier import (
|
||||
envvar_applier
|
||||
@@ -66,6 +68,11 @@ from .ini_applier import (
|
||||
, ini_applier_user
|
||||
)
|
||||
|
||||
from .kde_applier import (
|
||||
kde_applier
|
||||
, kde_applier_user
|
||||
)
|
||||
|
||||
from .networkshare_applier import networkshare_applier
|
||||
from .yandex_browser_applier import yandex_browser_applier
|
||||
|
||||
@@ -121,12 +128,12 @@ class frontend_manager:
|
||||
'''
|
||||
|
||||
def __init__(self, username, is_machine):
|
||||
self.storage = registry_factory('registry')
|
||||
self.username = determine_username(username)
|
||||
self.storage = registry_factory('dconf', username=self.username)
|
||||
self.is_machine = is_machine
|
||||
self.process_uname = get_process_user()
|
||||
self.sid = get_sid(self.storage.get_info('domain'), self.username, is_machine)
|
||||
self.file_cache = fs_file_cache('file_cache')
|
||||
self.file_cache = fs_file_cache('file_cache', self.username)
|
||||
|
||||
self.machine_appliers = dict()
|
||||
self.user_appliers = dict()
|
||||
@@ -144,6 +151,13 @@ class frontend_manager:
|
||||
self.machine_appliers['yandex_browser'] = yandex_browser_applier(self.storage, self.sid, self.username)
|
||||
self.machine_appliers['shortcuts'] = shortcut_applier(self.storage)
|
||||
self.machine_appliers['gsettings'] = gsettings_applier(self.storage, self.file_cache)
|
||||
try:
|
||||
self.machine_appliers['cifs'] = cifs_applier(self.storage, self.sid)
|
||||
except Exception as exc:
|
||||
logdata = dict()
|
||||
logdata['applier_name'] = 'cifs'
|
||||
logdata['msg'] = str(exc)
|
||||
log('E24', logdata)
|
||||
self.machine_appliers['cups'] = cups_applier(self.storage)
|
||||
self.machine_appliers['firewall'] = firewall_applier(self.storage)
|
||||
self.machine_appliers['folders'] = folder_applier(self.storage, self.sid)
|
||||
@@ -154,6 +168,7 @@ class frontend_manager:
|
||||
self.machine_appliers['scripts'] = scripts_applier(self.storage, self.sid)
|
||||
self.machine_appliers['files'] = file_applier(self.storage, self.file_cache, self.sid)
|
||||
self.machine_appliers['ini'] = ini_applier(self.storage, self.sid)
|
||||
self.machine_appliers['kde'] = kde_applier(self.storage)
|
||||
|
||||
def _init_user_appliers(self):
|
||||
# User appliers are expected to work with user-writable
|
||||
@@ -171,9 +186,11 @@ class frontend_manager:
|
||||
self.user_appliers['package'] = package_applier_user(self.storage, self.sid, self.username)
|
||||
self.user_appliers['polkit'] = polkit_applier_user(self.storage, self.sid, self.username)
|
||||
self.user_appliers['envvar'] = envvar_applier_user(self.storage, self.sid, self.username)
|
||||
self.user_appliers['networkshare'] = networkshare_applier(self.storage, self.sid, self.username)
|
||||
self.user_appliers['scripts'] = scripts_applier_user(self.storage, self.sid, self.username)
|
||||
self.user_appliers['files'] = file_applier_user(self.storage, self.file_cache, self.sid, self.username)
|
||||
self.user_appliers['ini'] = ini_applier_user(self.storage, self.sid, self.username)
|
||||
self.user_appliers['kde'] = kde_applier_user(self.storage, self.sid, self.username, self.file_cache)
|
||||
|
||||
def machine_apply(self):
|
||||
'''
|
||||
|
@@ -16,7 +16,7 @@
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
import logging
|
||||
from util.exceptions import NotUNCPathError
|
||||
import os
|
||||
import pwd
|
||||
import subprocess
|
||||
@@ -25,6 +25,7 @@ from gi.repository import (
|
||||
Gio
|
||||
, GLib
|
||||
)
|
||||
from storage.dconf_registry import Dconf_registry
|
||||
|
||||
from .applier_frontend import (
|
||||
applier_frontend
|
||||
@@ -59,14 +60,14 @@ class gsettings_applier(applier_frontend):
|
||||
__module_name = 'GSettingsApplier'
|
||||
__module_experimental = False
|
||||
__module_enabled = True
|
||||
__registry_branch = 'Software\\BaseALT\\Policies\\GSettings\\'
|
||||
__registry_branch = 'Software\\BaseALT\\Policies\\gsettings\\'
|
||||
__registry_locks_branch = 'Software\\BaseALT\\Policies\\GSettingsLocks\\'
|
||||
__wallpaper_entry = 'Software\\BaseALT\\Policies\\GSettings\\org.mate.background.picture-filename'
|
||||
__vino_authentication_methods_entry = 'Software\\BaseALT\\Policies\\GSettings\\org.gnome.Vino.authentication-methods'
|
||||
__wallpaper_entry = 'Software/BaseALT/Policies/gsettings/org.mate.background.picture-filename'
|
||||
__vino_authentication_methods_entry = 'Software/BaseALT/Policies/gsettings/org.gnome.Vino.authentication-methods'
|
||||
__global_schema = '/usr/share/glib-2.0/schemas'
|
||||
__override_priority_file = 'zzz_policy.gschema.override'
|
||||
__override_old_file = '0_policy.gschema.override'
|
||||
__windows_settings = dict()
|
||||
|
||||
|
||||
def __init__(self, storage, file_cache):
|
||||
self.storage = storage
|
||||
@@ -108,13 +109,13 @@ class gsettings_applier(applier_frontend):
|
||||
|
||||
# Get all configured gsettings locks
|
||||
for lock in self.gsettings_locks:
|
||||
valuename = lock.hive_key.rpartition('\\')[2]
|
||||
valuename = lock.hive_key.rpartition('/')[2]
|
||||
self.locks[valuename] = int(lock.data)
|
||||
|
||||
# Calculate all configured gsettings
|
||||
for setting in self.gsettings_keys:
|
||||
helper = None
|
||||
valuename = setting.hive_key.rpartition('\\')[2]
|
||||
valuename = setting.hive_key.rpartition('/')[2]
|
||||
rp = valuename.rpartition('.')
|
||||
schema = rp[0]
|
||||
path = rp[2]
|
||||
@@ -137,10 +138,7 @@ class gsettings_applier(applier_frontend):
|
||||
log('E48')
|
||||
|
||||
# Update desktop configuration system backend
|
||||
try:
|
||||
proc = subprocess.run(args=['/usr/bin/dconf', "update"], capture_output=True, check=True)
|
||||
except Exception as exc:
|
||||
log('E49')
|
||||
Dconf_registry.dconf_update()
|
||||
|
||||
def apply(self):
|
||||
if self.__module_enabled:
|
||||
@@ -184,9 +182,9 @@ class gsettings_applier_user(applier_frontend):
|
||||
__module_name = 'GSettingsApplierUser'
|
||||
__module_experimental = False
|
||||
__module_enabled = True
|
||||
__registry_branch = 'Software\\BaseALT\\Policies\\GSettings\\'
|
||||
__wallpaper_entry = 'Software\\BaseALT\\Policies\\GSettings\\org.mate.background.picture-filename'
|
||||
__vino_authentication_methods_entry = 'Software\\BaseALT\\Policies\\GSettings\\org.gnome.Vino.authentication-methods'
|
||||
__registry_branch = 'Software\\BaseALT\\Policies\\gsettings\\'
|
||||
__wallpaper_entry = 'Software/BaseALT/Policies/gsettings/org.mate.background.picture-filename'
|
||||
__vino_authentication_methods_entry = 'Software/BaseALT/Policies/gsettings/org.gnome.Vino.authentication-methods'
|
||||
|
||||
def __init__(self, storage, file_cache, sid, username):
|
||||
self.storage = storage
|
||||
@@ -204,25 +202,25 @@ class gsettings_applier_user(applier_frontend):
|
||||
mapping = [
|
||||
# Disable or enable screen saver
|
||||
GSettingsMapping(
|
||||
'Software\\Policies\\Microsoft\\Windows\\Control Panel\\Desktop\\ScreenSaveActive'
|
||||
'Software/Policies/Microsoft/Windows/Control Panel/Desktop/ScreenSaveActive'
|
||||
, 'org.mate.screensaver'
|
||||
, 'idle-activation-enabled'
|
||||
)
|
||||
# Timeout in seconds for screen saver activation. The value of zero effectively disables screensaver start
|
||||
, GSettingsMapping(
|
||||
'Software\\Policies\\Microsoft\\Windows\\Control Panel\\Desktop\\ScreenSaveTimeOut'
|
||||
'Software/Policies/Microsoft/Windows/Control Panel/Desktop/ScreenSaveTimeOut'
|
||||
, 'org.mate.session'
|
||||
, 'idle-delay'
|
||||
)
|
||||
# Enable or disable password protection for screen saver
|
||||
, GSettingsMapping(
|
||||
'Software\\Policies\\Microsoft\\Windows\\Control Panel\\Desktop\\ScreenSaverIsSecure'
|
||||
'Software/Policies/Microsoft/Windows/Control Panel/Desktop/ScreenSaverIsSecure'
|
||||
, 'org.mate.screensaver'
|
||||
, 'lock-enabled'
|
||||
)
|
||||
# Specify image which will be used as a wallpaper
|
||||
, GSettingsMapping(
|
||||
'Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\Wallpaper'
|
||||
'Software/Microsoft/Windows/CurrentVersion/Policies/System/Wallpaper'
|
||||
, 'org.mate.background'
|
||||
, 'picture-filename'
|
||||
)
|
||||
@@ -251,15 +249,6 @@ class gsettings_applier_user(applier_frontend):
|
||||
return uri_fetch(schema, path, value, self.file_cache)
|
||||
|
||||
def run(self):
|
||||
#for setting in self.gsettings_keys:
|
||||
# valuename = setting.hive_key.rpartition('\\')[2]
|
||||
# rp = valuename.rpartition('.')
|
||||
# schema = rp[0]
|
||||
# path = rp[2]
|
||||
# self.gsettings.append(user_gsetting(schema, path, setting.data))
|
||||
|
||||
|
||||
# Calculate all mapped gsettings if mapping enabled
|
||||
if self.__windows_mapping_enabled:
|
||||
log('D83')
|
||||
self.windows_mapping_append()
|
||||
@@ -268,7 +257,7 @@ class gsettings_applier_user(applier_frontend):
|
||||
|
||||
# Calculate all configured gsettings
|
||||
for setting in self.gsettings_keys:
|
||||
valuename = setting.hive_key.rpartition('\\')[2]
|
||||
valuename = setting.hive_key.rpartition('/')[2]
|
||||
rp = valuename.rpartition('.')
|
||||
schema = rp[0]
|
||||
path = rp[2]
|
||||
@@ -293,8 +282,10 @@ class gsettings_applier_user(applier_frontend):
|
||||
try:
|
||||
entry = self.__wallpaper_entry
|
||||
filter_result = self.storage.get_hkcu_entry(self.sid, entry)
|
||||
if filter_result:
|
||||
if filter_result and filter_result.data:
|
||||
self.file_cache.store(filter_result.data)
|
||||
except NotUNCPathError:
|
||||
...
|
||||
except Exception as exc:
|
||||
logdata = dict()
|
||||
logdata['exception'] = str(exc)
|
||||
|
@@ -68,11 +68,11 @@ class ini_applier_user(applier_frontend):
|
||||
Ini_file(inifile, self.username)
|
||||
|
||||
def admin_context_apply(self):
|
||||
pass
|
||||
|
||||
def user_context_apply(self):
|
||||
if self.__module_enabled:
|
||||
log('D173')
|
||||
self.run()
|
||||
else:
|
||||
log('D174')
|
||||
|
||||
def user_context_apply(self):
|
||||
pass
|
||||
|
292
gpoa/frontend/kde_applier.py
Normal file
292
gpoa/frontend/kde_applier.py
Normal file
@@ -0,0 +1,292 @@
|
||||
#
|
||||
# GPOA - GPO Applier for Linux
|
||||
#
|
||||
# Copyright (C) 2019-2024 BaseALT Ltd.
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License as published by
|
||||
# the Free Software Foundation, either version 3 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
from .applier_frontend import applier_frontend, check_enabled
|
||||
from util.logging import log
|
||||
from util.util import get_homedir
|
||||
from util.exceptions import NotUNCPathError
|
||||
import os
|
||||
import subprocess
|
||||
import re
|
||||
import dbus
|
||||
|
||||
class kde_applier(applier_frontend):
|
||||
__module_name = 'KdeApplier'
|
||||
__module_experimental = True
|
||||
__module_enabled = False
|
||||
__hklm_branch = 'Software\\BaseALT\\Policies\\KDE\\'
|
||||
__hklm_lock_branch = 'Software\\BaseALT\\Policies\\KDELocks\\'
|
||||
|
||||
def __init__(self, storage):
|
||||
self.storage = storage
|
||||
self.locks_dict = {}
|
||||
self.locks_data_dict = {}
|
||||
self.all_kde_settings = {}
|
||||
kde_filter = '{}%'.format(self.__hklm_branch)
|
||||
locks_filter = '{}%'.format(self.__hklm_lock_branch)
|
||||
self.locks_settings = self.storage.filter_hklm_entries(locks_filter)
|
||||
self.kde_settings = self.storage.filter_hklm_entries(kde_filter)
|
||||
self.all_kde_settings = {}
|
||||
|
||||
self.__module_enabled = check_enabled(
|
||||
self.storage,
|
||||
self.__module_name,
|
||||
self.__module_experimental
|
||||
)
|
||||
|
||||
def apply(self):
|
||||
if self.__module_enabled:
|
||||
log('D198')
|
||||
create_dict(self.kde_settings, self.all_kde_settings, self.locks_settings, self.locks_dict)
|
||||
apply(self.all_kde_settings, self.locks_dict)
|
||||
else:
|
||||
log('D199')
|
||||
|
||||
class kde_applier_user(applier_frontend):
|
||||
__module_name = 'KdeApplierUser'
|
||||
__module_experimental = True
|
||||
__module_enabled = False
|
||||
__hkcu_branch = 'Software\\BaseALT\\Policies\\KDE\\'
|
||||
__hkcu_lock_branch = 'Software\\BaseALT\\Policies\\KDELocks\\'
|
||||
|
||||
def __init__(self, storage, sid=None, username=None, file_cache = None):
|
||||
self.storage = storage
|
||||
self.username = username
|
||||
self.sid = sid
|
||||
self.file_cache = file_cache
|
||||
self.locks_dict = {}
|
||||
self.locks_data_dict = {}
|
||||
self.all_kde_settings = {}
|
||||
kde_filter = '{}%'.format(self.__hkcu_branch)
|
||||
locks_filter = '{}%'.format(self.__hkcu_lock_branch)
|
||||
self.locks_settings = self.storage.filter_hkcu_entries(self.sid, locks_filter)
|
||||
self.kde_settings = self.storage.filter_hkcu_entries(self.sid, kde_filter)
|
||||
self.__module_enabled = check_enabled(
|
||||
self.storage,
|
||||
self.__module_name,
|
||||
self.__module_experimental
|
||||
)
|
||||
|
||||
def admin_context_apply(self):
|
||||
pass
|
||||
|
||||
def user_context_apply(self):
|
||||
'''
|
||||
Change settings applied in user context
|
||||
'''
|
||||
if self.__module_enabled:
|
||||
log('D200')
|
||||
create_dict(self.kde_settings, self.all_kde_settings, self.locks_settings, self.locks_dict, self.file_cache, self.username)
|
||||
apply(self.all_kde_settings, self.locks_dict, self.username)
|
||||
else:
|
||||
log('D201')
|
||||
|
||||
def create_dict(kde_settings, all_kde_settings, locks_settings, locks_dict, file_cache = None, username = None):
|
||||
for locks in locks_settings:
|
||||
locks_dict[locks.valuename] = locks.data
|
||||
for setting in kde_settings:
|
||||
try:
|
||||
file_name, section, value = setting.keyname.split("/")[-2], setting.keyname.split("/")[-1], setting.valuename
|
||||
data = setting.data
|
||||
if file_name == 'wallpaper':
|
||||
apply_for_wallpaper(data, file_cache, username)
|
||||
else:
|
||||
if file_name not in all_kde_settings:
|
||||
all_kde_settings[file_name] = {}
|
||||
if section not in all_kde_settings[file_name]:
|
||||
all_kde_settings[file_name][section] = {}
|
||||
all_kde_settings[file_name][section][value] = data
|
||||
|
||||
except Exception as exc:
|
||||
logdata = dict()
|
||||
logdata['file_name'] = file_name
|
||||
logdata['section'] = section
|
||||
logdata['value'] = value
|
||||
logdata['data'] = data
|
||||
logdata['exc'] = exc
|
||||
log('W16', logdata)
|
||||
|
||||
def apply(all_kde_settings, locks_dict, username = None):
|
||||
logdata = dict()
|
||||
if username is None:
|
||||
system_path_settings = '/etc/xdg/'
|
||||
system_files = [
|
||||
"baloofilerc",
|
||||
"kcminputrc",
|
||||
"kded_device_automounterrc",
|
||||
"kdeglobals",
|
||||
"ksplashrc",
|
||||
"kwinrc",
|
||||
"plasma-localerc",
|
||||
"plasmarc",
|
||||
"powermanagementprofilesrc"
|
||||
]
|
||||
for file in system_files:
|
||||
file_to_remove = f'{system_path_settings}{file}'
|
||||
if os.path.exists(file_to_remove):
|
||||
os.remove(file_to_remove)
|
||||
for file_name, sections in all_kde_settings.items():
|
||||
file_path = f'{system_path_settings}{file_name}'
|
||||
with open(file_path, 'w') as file:
|
||||
for section, keys in sections.items():
|
||||
section = section.replace(')(', '][')
|
||||
file.write(f'[{section}]\n')
|
||||
for key, value in keys.items():
|
||||
lock = f"{file_name}.{section}.{key}".replace('][', ')(')
|
||||
if lock in locks_dict and locks_dict[lock] == 1:
|
||||
file.write(f'{key}[$i]={value}\n')
|
||||
else:
|
||||
file.write(f'{key}={value}\n')
|
||||
file.write('\n')
|
||||
else:
|
||||
for file_name, sections in all_kde_settings.items():
|
||||
path = f'{get_homedir(username)}/.config/{file_name}'
|
||||
if not os.path.exists(path):
|
||||
open(path, 'a').close()
|
||||
else:
|
||||
pass
|
||||
for section, keys in sections.items():
|
||||
for key, value in keys.items():
|
||||
lock = f"{file_name}.{section}.{key}"
|
||||
if lock in locks_dict and locks_dict[lock] == 1:
|
||||
command = [
|
||||
'kwriteconfig5',
|
||||
'--file', file_name,
|
||||
'--group', section,
|
||||
'--key', key +'/$i/',
|
||||
'--type', 'string',
|
||||
value
|
||||
]
|
||||
else:
|
||||
command = [
|
||||
'kwriteconfig5',
|
||||
'--file', file_name,
|
||||
'--group', section,
|
||||
'--key', key,
|
||||
'--type', 'string',
|
||||
value
|
||||
]
|
||||
try:
|
||||
clear_locks_settings(username, file_name, key)
|
||||
subprocess.run(command, check=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE)
|
||||
except:
|
||||
logdata['command'] = command
|
||||
log('W22', logdata)
|
||||
new_content = []
|
||||
file_path = f'{get_homedir(username)}/.config/{file_name}'
|
||||
try:
|
||||
with open(file_path, 'r') as file:
|
||||
for line in file:
|
||||
line = line.replace('/$i/', '[$i]').replace(')(', '][')
|
||||
new_content.append(line)
|
||||
with open(file_path, 'w') as file:
|
||||
file.writelines(new_content)
|
||||
logdata['file'] = file_name
|
||||
log('D202', logdata)
|
||||
except Exception as exc:
|
||||
logdata['exc'] = exc
|
||||
log('W19', logdata)
|
||||
|
||||
def clear_locks_settings(username, file_name, key):
|
||||
'''
|
||||
Method to remove old locked settings
|
||||
'''
|
||||
file_path = f'{get_homedir(username)}/.config/{file_name}'
|
||||
with open(file_path, 'r') as file:
|
||||
lines = file.readlines()
|
||||
with open(file_path, 'w') as file:
|
||||
for line in lines:
|
||||
if f'{key}[$i]=' not in line:
|
||||
file.write(line)
|
||||
for line in lines:
|
||||
if f'{key}[$i]=' in line:
|
||||
logdata = dict()
|
||||
logdata['line'] = line.strip()
|
||||
log('I10', logdata)
|
||||
|
||||
def apply_for_wallpaper(data, file_cache, username):
|
||||
'''
|
||||
Method to change wallpaper
|
||||
'''
|
||||
logdata = dict()
|
||||
path_to_wallpaper = f'{get_homedir(username)}/.config/plasma-org.kde.plasma.desktop-appletsrc'
|
||||
try:
|
||||
try:
|
||||
file_cache.store(data)
|
||||
data = file_cache.get(data)
|
||||
except NotUNCPathError:
|
||||
data = data
|
||||
os.environ["XDG_DATA_DIRS"] = "/usr/share/kf5:"
|
||||
#Variable for system detection of directories before files with .colors extension
|
||||
os.environ["DISPLAY"] = ":0"
|
||||
#Variable for command execution plasma-apply-colorscheme
|
||||
os.environ["XDG_RUNTIME_DIR"] = f"/run/user/{os.getuid()}"
|
||||
os.environ["DBUS_SESSION_BUS_ADDRESS"] = f"unix:path=/run/user/{os.getuid()}/bus"#plasma-apply-wallpaperimage
|
||||
os.environ["PATH"] = "/usr/lib/kf5/bin:"
|
||||
#environment variable for accessing binary files without hard links
|
||||
if os.path.isfile(path_to_wallpaper):
|
||||
id_desktop = get_id_desktop(path_to_wallpaper)
|
||||
command = [
|
||||
'kwriteconfig5',
|
||||
'--file', 'plasma-org.kde.plasma.desktop-appletsrc',
|
||||
'--group', 'Containments',
|
||||
'--group', id_desktop,
|
||||
'--group', 'Wallpaper',
|
||||
'--group', 'org.kde.image',
|
||||
'--group', 'General',
|
||||
'--key', 'Image',
|
||||
'--type', 'string',
|
||||
data
|
||||
]
|
||||
try:
|
||||
subprocess.run(command, check=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE)
|
||||
except:
|
||||
logdata['command'] = command
|
||||
log('E68', logdata)
|
||||
try:
|
||||
session_bus = dbus.SessionBus()
|
||||
plasma_shell = session_bus.get_object('org.kde.plasmashell', '/PlasmaShell', introspect='org.kde.PlasmaShell')
|
||||
plasma_shell_iface = dbus.Interface(plasma_shell, 'org.kde.PlasmaShell')
|
||||
plasma_shell_iface.refreshCurrentShell()
|
||||
except:
|
||||
pass
|
||||
else:
|
||||
logdata['file'] = path_to_wallpaper
|
||||
log('W21', logdata)
|
||||
except OSError as exc:
|
||||
logdata['exc'] = exc
|
||||
log('W17', logdata)
|
||||
except Exception as exc:
|
||||
logdata['exc'] = exc
|
||||
log('E67', logdata)
|
||||
|
||||
def get_id_desktop(path_to_wallpaper):
|
||||
'''
|
||||
Method for getting desktop id. It is currently accepted that this number is one of the sections in the configuration file.
|
||||
'''
|
||||
pattern = r'\[Containments\]\[(\d+)\][^\[]*activityId=([^\s]+)'
|
||||
try:
|
||||
with open(path_to_wallpaper, 'r') as file:
|
||||
file_content = file.read()
|
||||
match = re.search(pattern, file_content)
|
||||
if match:
|
||||
return match.group(1)
|
||||
else:
|
||||
return None
|
||||
except:
|
||||
return None
|
@@ -25,22 +25,34 @@ from util.logging import log
|
||||
|
||||
class networkshare_applier(applier_frontend):
|
||||
__module_name = 'NetworksharesApplier'
|
||||
__module_name_user = 'NetworksharesApplierUser'
|
||||
__module_experimental = True
|
||||
__module_enabled = False
|
||||
|
||||
def __init__(self, storage, sid):
|
||||
def __init__(self, storage, sid, username = None):
|
||||
self.storage = storage
|
||||
self.sid = sid
|
||||
self.username = username
|
||||
self.networkshare_info = self.storage.get_networkshare(self.sid)
|
||||
self.__module_enabled = check_enabled(self.storage, self.__module_name, self.__module_experimental)
|
||||
self.__module_enabled_user = check_enabled(self.storage, self.__module_name_user, self.__module_experimental)
|
||||
|
||||
def run(self):
|
||||
for networkshar in self.networkshare_info:
|
||||
Networkshare(networkshar)
|
||||
for networkshare in self.networkshare_info:
|
||||
Networkshare(networkshare, self.username)
|
||||
|
||||
def apply(self):
|
||||
if self.__module_enabled:
|
||||
log('D180')
|
||||
log('D187')
|
||||
self.run()
|
||||
else:
|
||||
log('D181')
|
||||
def admin_context_apply(self):
|
||||
pass
|
||||
|
||||
def user_context_apply(self):
|
||||
if self.__module_enabled_user:
|
||||
log('D188')
|
||||
self.run()
|
||||
else:
|
||||
log('D189')
|
||||
|
@@ -17,7 +17,7 @@
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
|
||||
import logging
|
||||
|
||||
import subprocess
|
||||
from enum import Enum
|
||||
|
||||
@@ -26,7 +26,7 @@ from .applier_frontend import (
|
||||
applier_frontend
|
||||
, check_enabled
|
||||
)
|
||||
from util.logging import slogm, log
|
||||
from util.logging import log
|
||||
|
||||
|
||||
class NTPServerType(Enum):
|
||||
@@ -117,30 +117,33 @@ class ntp_applier(applier_frontend):
|
||||
ntp_server_enabled = self.storage.get_hklm_entry(self.ntp_server_enabled)
|
||||
ntp_client_enabled = self.storage.get_hklm_entry(self.ntp_client_enabled)
|
||||
|
||||
if NTPServerType.NTP.value != server_type.data:
|
||||
logdata = dict()
|
||||
logdata['server_type'] = server_type
|
||||
log('W10', logdata)
|
||||
else:
|
||||
log('D126')
|
||||
if '1' == ntp_server_enabled.data:
|
||||
log('D127')
|
||||
self._start_chrony_client(server_address)
|
||||
self._chrony_as_server()
|
||||
elif '0' == ntp_server_enabled.data:
|
||||
log('D128')
|
||||
self._chrony_as_client()
|
||||
if server_type and server_type.data:
|
||||
if NTPServerType.NTP.value != server_type.data:
|
||||
logdata = dict()
|
||||
logdata['server_type'] = server_type
|
||||
log('W10', logdata)
|
||||
else:
|
||||
log('D129')
|
||||
log('D126')
|
||||
if ntp_server_enabled:
|
||||
if '1' == ntp_server_enabled.data and server_address:
|
||||
log('D127')
|
||||
self._start_chrony_client(server_address)
|
||||
self._chrony_as_server()
|
||||
elif '0' == ntp_server_enabled.data:
|
||||
log('D128')
|
||||
self._chrony_as_client()
|
||||
else:
|
||||
log('D129')
|
||||
|
||||
if '1' == ntp_client_enabled.data:
|
||||
log('D130')
|
||||
self._start_chrony_client()
|
||||
elif '0' == ntp_client_enabled.data:
|
||||
log('D131')
|
||||
self._stop_chrony_client()
|
||||
else:
|
||||
log('D132')
|
||||
elif ntp_client_enabled:
|
||||
if '1' == ntp_client_enabled.data:
|
||||
log('D130')
|
||||
self._start_chrony_client()
|
||||
elif '0' == ntp_client_enabled.data:
|
||||
log('D131')
|
||||
self._stop_chrony_client()
|
||||
else:
|
||||
log('D132')
|
||||
|
||||
def apply(self):
|
||||
if self.__module_enabled:
|
||||
|
@@ -62,8 +62,7 @@ class package_applier(applier_frontend):
|
||||
)
|
||||
def run(self):
|
||||
for flag in self.sync_packages_setting:
|
||||
if flag.data:
|
||||
self.flagSync = bool(int(flag.data))
|
||||
self.flagSync = bool(flag.data)
|
||||
|
||||
if 0 < self.install_packages_setting.count() or 0 < self.remove_packages_setting.count():
|
||||
if self.flagSync:
|
||||
@@ -104,8 +103,8 @@ class package_applier_user(applier_frontend):
|
||||
self.username = username
|
||||
self.fulcmd = list()
|
||||
self.fulcmd.append('/usr/libexec/gpupdate/pkcon_runner')
|
||||
self.fulcmd.append('--sid')
|
||||
self.fulcmd.append(self.sid)
|
||||
self.fulcmd.append('--user')
|
||||
self.fulcmd.append(self.username)
|
||||
self.fulcmd.append('--loglevel')
|
||||
logger = logging.getLogger()
|
||||
self.fulcmd.append(str(logger.level))
|
||||
@@ -119,7 +118,7 @@ class package_applier_user(applier_frontend):
|
||||
self.sync_packages_setting = self.storage.filter_hkcu_entries(self.sid, sync_branch)
|
||||
self.flagSync = False
|
||||
|
||||
self.__module_enabled = check_enabled(self.storage, self.__module_name, self.__module_enabled)
|
||||
self.__module_enabled = check_enabled(self.storage, self.__module_name, self.__module_experimental)
|
||||
|
||||
def user_context_apply(self):
|
||||
'''
|
||||
|
@@ -29,28 +29,64 @@ class polkit_applier(applier_frontend):
|
||||
__module_experimental = False
|
||||
__module_enabled = True
|
||||
__deny_all_win = 'Software\\Policies\\Microsoft\\Windows\\RemovableStorageDevices\\Deny_All'
|
||||
__deny_all = 'Software\\BaseALT\\Policies\\GPUpdate\\RemovableStorageDevices\\Deny_All'
|
||||
__registry_branch = 'Software\\BaseALT\\Policies\\Polkit\\'
|
||||
__registry_locks_branch = 'Software\\BaseALT\\Policies\\PolkitLocks\\'
|
||||
__polkit_map = {
|
||||
__deny_all: ['49-gpoa_disk_permissions', { 'Deny_All': 0 }]
|
||||
__deny_all_win: ['49-gpoa_disk_permissions', { 'Deny_All': 0 }],
|
||||
__registry_branch : ['49-alt_group_policy_permissions', {}],
|
||||
__registry_locks_branch : ['47-alt_group_policy_permissions', {}]
|
||||
}
|
||||
|
||||
def __init__(self, storage):
|
||||
self.storage = storage
|
||||
deny_all = storage.filter_hklm_entries(self.__deny_all).first()
|
||||
if not deny_all and check_windows_mapping_enabled(self.storage):
|
||||
deny_all = storage.filter_hklm_entries(self.__deny_all_win).first()
|
||||
deny_all_win = None
|
||||
if check_windows_mapping_enabled(self.storage):
|
||||
deny_all_win = storage.filter_hklm_entries(self.__deny_all_win).first()
|
||||
# Deny_All hook: initialize defaults
|
||||
template_file = self.__polkit_map[self.__deny_all][0]
|
||||
template_vars = self.__polkit_map[self.__deny_all][1]
|
||||
if deny_all:
|
||||
polkit_filter = '{}%'.format(self.__registry_branch)
|
||||
polkit_locks_filter = '{}%'.format(self.__registry_locks_branch)
|
||||
self.polkit_keys = self.storage.filter_hklm_entries(polkit_filter)
|
||||
self.polkit_locks = self.storage.filter_hklm_entries(polkit_locks_filter)
|
||||
template_file = self.__polkit_map[self.__deny_all_win][0]
|
||||
template_vars = self.__polkit_map[self.__deny_all_win][1]
|
||||
template_file_all = self.__polkit_map[self.__registry_branch][0]
|
||||
template_vars_all = self.__polkit_map[self.__registry_branch][1]
|
||||
template_file_all_lock = self.__polkit_map[self.__registry_locks_branch][0]
|
||||
template_vars_all_lock = self.__polkit_map[self.__registry_locks_branch][1]
|
||||
locks = list()
|
||||
for lock in self.polkit_locks:
|
||||
if bool(int(lock.data)):
|
||||
locks.append(lock.valuename)
|
||||
|
||||
dict_lists_rules = {'No': [[], []],
|
||||
'Yes': [[], []],
|
||||
'Auth_self' : [[], []],
|
||||
'Auth_admin': [[], []],
|
||||
'Auth_self_keep': [[], []],
|
||||
'Auth_admin_keep': [[], []]}
|
||||
|
||||
check_and_add_to_list = (lambda it, act: dict_lists_rules[act][0].append(it.valuename)
|
||||
if it.valuename not in locks
|
||||
else dict_lists_rules[act][1].append(it.valuename))
|
||||
|
||||
for it_data in self.polkit_keys:
|
||||
check_and_add_to_list(it_data, it_data.data)
|
||||
|
||||
for key, item in dict_lists_rules.items():
|
||||
self.__polkit_map[self.__registry_branch][1][key] = item[0]
|
||||
self.__polkit_map[self.__registry_locks_branch][1][key] = item[1]
|
||||
|
||||
if deny_all_win:
|
||||
logdata = dict()
|
||||
logdata['Deny_All'] = deny_all.data
|
||||
logdata['Deny_All_win'] = deny_all_win.data
|
||||
log('D69', logdata)
|
||||
self.__polkit_map[self.__deny_all][1]['Deny_All'] = deny_all.data
|
||||
self.__polkit_map[self.__deny_all_win][1]['Deny_All'] = deny_all_win.data
|
||||
else:
|
||||
log('D71')
|
||||
self.policies = []
|
||||
self.policies.append(polkit(template_file, template_vars))
|
||||
self.policies.append(polkit(template_file_all, template_vars_all))
|
||||
self.policies.append(polkit(template_file_all_lock, template_vars_all_lock))
|
||||
self.__module_enabled = check_enabled(
|
||||
self.storage
|
||||
, self.__module_name
|
||||
@@ -73,33 +109,54 @@ class polkit_applier_user(applier_frontend):
|
||||
__module_experimental = False
|
||||
__module_enabled = True
|
||||
__deny_all_win = 'Software\\Policies\\Microsoft\\Windows\\RemovableStorageDevices\\Deny_All'
|
||||
__deny_all = 'Software\\BaseALT\\Policies\\GPUpdate\\RemovableStorageDevices\\Deny_All'
|
||||
__registry_branch = 'Software\\BaseALT\\Policies\\Polkit\\'
|
||||
__polkit_map = {
|
||||
__deny_all: ['48-gpoa_disk_permissions_user', { 'Deny_All': 0, 'User': '' }]
|
||||
__deny_all_win: ['48-gpoa_disk_permissions_user', { 'Deny_All': 0, 'User': '' }],
|
||||
__registry_branch : ['48-alt_group_policy_permissions_user', {'User': ''}]
|
||||
}
|
||||
|
||||
def __init__(self, storage, sid, username):
|
||||
self.storage = storage
|
||||
self.sid = sid
|
||||
self.username = username
|
||||
|
||||
deny_all = storage.filter_hkcu_entries(self.sid, self.__deny_all).first()
|
||||
if not deny_all and check_windows_mapping_enabled(self.storage):
|
||||
deny_all = storage.filter_hkcu_entries(self.sid, self.__deny_all_win).first()
|
||||
deny_all_win = None
|
||||
if check_windows_mapping_enabled(self.storage):
|
||||
deny_all_win = storage.filter_hkcu_entries(self.sid, self.__deny_all_win).first()
|
||||
polkit_filter = '{}%'.format(self.__registry_branch)
|
||||
self.polkit_keys = self.storage.filter_hkcu_entries(self.sid, polkit_filter)
|
||||
# Deny_All hook: initialize defaults
|
||||
template_file = self.__polkit_map[self.__deny_all][0]
|
||||
template_vars = self.__polkit_map[self.__deny_all][1]
|
||||
if deny_all:
|
||||
template_file = self.__polkit_map[self.__deny_all_win][0]
|
||||
template_vars = self.__polkit_map[self.__deny_all_win][1]
|
||||
template_file_all = self.__polkit_map[self.__registry_branch][0]
|
||||
template_vars_all = self.__polkit_map[self.__registry_branch][1]
|
||||
|
||||
dict_lists_rules = {'No': [],
|
||||
'Yes': [],
|
||||
'Auth_self': [],
|
||||
'Auth_admin': [],
|
||||
'Auth_self_keep': [],
|
||||
'Auth_admin_keep': []}
|
||||
|
||||
for it_data in self.polkit_keys:
|
||||
dict_lists_rules[it_data.data].append(it_data.valuename)
|
||||
|
||||
self.__polkit_map[self.__registry_branch][1]['User'] = self.username
|
||||
|
||||
for key, item in dict_lists_rules.items():
|
||||
self.__polkit_map[self.__registry_branch][1][key] = item
|
||||
|
||||
if deny_all_win:
|
||||
logdata = dict()
|
||||
logdata['user'] = self.username
|
||||
logdata['Deny_All'] = deny_all.data
|
||||
logdata['Deny_All_win'] = deny_all_win.data
|
||||
log('D70', logdata)
|
||||
self.__polkit_map[self.__deny_all][1]['Deny_All'] = deny_all.data
|
||||
self.__polkit_map[self.__deny_all][1]['User'] = self.username
|
||||
self.__polkit_map[self.__deny_all_win][1]['Deny_All'] = deny_all_win.data
|
||||
self.__polkit_map[self.__deny_all_win][1]['User'] = self.username
|
||||
else:
|
||||
log('D72')
|
||||
self.policies = []
|
||||
self.policies.append(polkit(template_file, template_vars, self.username))
|
||||
self.policies.append(polkit(template_file_all, template_vars_all, self.username))
|
||||
self.__module_enabled = check_enabled(
|
||||
self.storage
|
||||
, self.__module_name
|
||||
|
@@ -19,9 +19,7 @@
|
||||
import os
|
||||
import shutil
|
||||
from pathlib import Path
|
||||
import pysss_nss_idmap
|
||||
|
||||
from django.template import base
|
||||
from util.logging import log
|
||||
from .appliers.folder import remove_dir_tree
|
||||
from .applier_frontend import (
|
||||
@@ -97,7 +95,6 @@ class scripts_applier_user(applier_frontend):
|
||||
, self.__module_name
|
||||
, self.__module_experimental
|
||||
)
|
||||
self.filling_cache()
|
||||
|
||||
def cleaning_cache(self):
|
||||
log('D161')
|
||||
@@ -145,15 +142,17 @@ def install_script(storage_script_entry, script_dir, access_permissions):
|
||||
'''
|
||||
dir_cr = Path(script_dir)
|
||||
dir_cr.mkdir(parents=True, exist_ok=True)
|
||||
script_name = str(int(storage_script_entry.number)).zfill(5) + '_' + os.path.basename(storage_script_entry.path)
|
||||
if storage_script_entry.number is None:
|
||||
return
|
||||
script_name = str(storage_script_entry.number).zfill(5) + '_' + os.path.basename(storage_script_entry.path)
|
||||
script_file = os.path.join(script_dir, script_name)
|
||||
shutil.copyfile(storage_script_entry.path, script_file)
|
||||
|
||||
os.chmod(script_file, int(access_permissions, base = 8))
|
||||
if storage_script_entry.arg:
|
||||
if storage_script_entry.args:
|
||||
dir_path = script_dir + '/' + script_name + '.arg'
|
||||
dir_arg = Path(dir_path)
|
||||
dir_arg.mkdir(parents=True, exist_ok=True)
|
||||
file_arg = open(dir_path + '/arg', 'w')
|
||||
file_arg.write(storage_script_entry.arg)
|
||||
file_arg.write(storage_script_entry.args)
|
||||
file_arg.close()
|
||||
|
@@ -23,9 +23,8 @@ from .applier_frontend import (
|
||||
applier_frontend
|
||||
, check_enabled
|
||||
)
|
||||
from gpt.shortcuts import json2sc
|
||||
from util.windows import expand_windows_var
|
||||
from util.logging import slogm, log
|
||||
from util.logging import log
|
||||
from util.util import (
|
||||
get_homedir,
|
||||
homedir_exists
|
||||
@@ -38,8 +37,7 @@ def storage_get_shortcuts(storage, sid, username=None):
|
||||
shortcut_objs = storage.get_shortcuts(sid)
|
||||
shortcuts = list()
|
||||
|
||||
for sc_obj in shortcut_objs:
|
||||
sc = json2sc(sc_obj.shortcut)
|
||||
for sc in shortcut_objs:
|
||||
if username:
|
||||
sc.set_expanded_path(expand_windows_var(sc.path, username))
|
||||
shortcuts.append(sc)
|
||||
|
@@ -29,11 +29,11 @@ class systemd_applier(applier_frontend):
|
||||
__module_name = 'SystemdApplier'
|
||||
__module_experimental = False
|
||||
__module_enabled = True
|
||||
__registry_branch = 'Software\\BaseALT\\Policies\\SystemdUnits'
|
||||
__registry_branch = 'Software/BaseALT/Policies/SystemdUnits'
|
||||
|
||||
def __init__(self, storage):
|
||||
self.storage = storage
|
||||
self.systemd_unit_settings = self.storage.filter_hklm_entries('Software\\BaseALT\\Policies\\SystemdUnits%')
|
||||
self.systemd_unit_settings = self.storage.filter_hklm_entries(self.__registry_branch)
|
||||
self.units = []
|
||||
self.__module_enabled = check_enabled(
|
||||
self.storage
|
||||
@@ -43,7 +43,7 @@ class systemd_applier(applier_frontend):
|
||||
|
||||
def run(self):
|
||||
for setting in self.systemd_unit_settings:
|
||||
valuename = setting.hive_key.rpartition('\\')[2]
|
||||
valuename = setting.hive_key.rpartition('/')[2]
|
||||
try:
|
||||
self.units.append(systemd_unit(valuename, int(setting.data)))
|
||||
logdata = dict()
|
||||
@@ -76,7 +76,7 @@ class systemd_applier_user(applier_frontend):
|
||||
__module_name = 'SystemdApplierUser'
|
||||
__module_experimental = False
|
||||
__module_enabled = True
|
||||
__registry_branch = 'Software\\BaseALT\\Policies\\SystemdUnits'
|
||||
__registry_branch = 'Software/BaseALT/Policies/SystemdUnits'
|
||||
|
||||
def __init__(self, storage, sid, username):
|
||||
self.storage = storage
|
||||
|
@@ -24,13 +24,13 @@ from .applier_frontend import (
|
||||
import json
|
||||
import os
|
||||
from util.logging import log
|
||||
from util.util import is_machine_name
|
||||
from util.util import is_machine_name, string_to_literal_eval
|
||||
|
||||
class yandex_browser_applier(applier_frontend):
|
||||
__module_name = 'YandexBrowserApplier'
|
||||
__module_enabled = True
|
||||
__module_experimental = False
|
||||
__registry_branch = 'Software\\Policies\\YandexBrowser'
|
||||
__registry_branch = 'Software/Policies/YandexBrowser'
|
||||
__managed_policies_path = '/etc/opt/yandex/browser/policies/managed'
|
||||
__recommended_policies_path = '/etc/opt/yandex/browser/policies/recommended'
|
||||
|
||||
@@ -65,7 +65,7 @@ class yandex_browser_applier(applier_frontend):
|
||||
#Replacing all nested dictionaries with a list
|
||||
dict_item_to_list = (
|
||||
lambda target_dict :
|
||||
{key:[*val.values()] if type(val) == dict else val for key,val in target_dict.items()}
|
||||
{key:[*val.values()] if type(val) == dict else string_to_literal_eval(val) for key,val in target_dict.items()}
|
||||
)
|
||||
os.makedirs(self.__managed_policies_path, exist_ok=True)
|
||||
with open(destfile, 'w') as f:
|
||||
@@ -98,19 +98,48 @@ class yandex_browser_applier(applier_frontend):
|
||||
'''
|
||||
List of keys resulting from parsing chrome.admx with parsing_chrom_admx_intvalues.py
|
||||
'''
|
||||
valuename_typeint = (['TurboSettings',
|
||||
'DefaultPluginsSetting',
|
||||
'BrowserSignin',
|
||||
valuename_typeint = (['DefaultPageSaveSettings',
|
||||
'DefaultUploadSetting',
|
||||
'YandexAutoLaunchMode',
|
||||
'DefaultClipboardSetting',
|
||||
'DefaultFileSystemReadGuardSetting',
|
||||
'DefaultFileSystemWriteGuardSetting',
|
||||
'DefaultImagesSetting',
|
||||
'DefaultJavaScriptJitSetting',
|
||||
'DefaultJavaScriptSetting',
|
||||
'DefaultLocalFontsSetting',
|
||||
'DefaultPopupsSetting',
|
||||
'DefaultSensorsSetting',
|
||||
'DefaultSerialGuardSetting',
|
||||
'DefaultWebBluetoothGuardSetting',
|
||||
'DefaultWebHidGuardSetting',
|
||||
'DefaultWebUsbGuardSetting',
|
||||
'DefaultWindowManagementSetting',
|
||||
'SafeSitesFilterBehavior',
|
||||
'YandexUserFeedbackMode',
|
||||
'TurboSettings',
|
||||
'SidePanelMode',
|
||||
'RestoreOnStartup',
|
||||
'RestoreOnStartup_recommended',
|
||||
'BrowserSwitcherParsingMode',
|
||||
'DefaultNotificationsSetting',
|
||||
'YandexPowerSavingMode',
|
||||
'ChromeVariations',
|
||||
'DeveloperToolsAvailability',
|
||||
'DownloadRestrictions',
|
||||
'NetworkPredictionOptions',
|
||||
'DownloadRestrictions_recommended',
|
||||
'NetworkPredictionOptions_recommended',
|
||||
'DefaultCookiesSetting',
|
||||
'DefaultGeolocationSetting',
|
||||
'DefaultPopupsSetting',
|
||||
'DeveloperToolsAvailability',
|
||||
'IncognitoModeAvailability',
|
||||
'DefaultPrintingSettings',
|
||||
'DefaultPluginsSetting',
|
||||
'DefaultInsecureContentSetting',
|
||||
'PasswordProtectionWarningTrigger',
|
||||
'SafeBrowsingProtectionLevel',
|
||||
'SafeBrowsingProtectionLevel_recommended',
|
||||
'SidePanelMode',
|
||||
'YandexAutoLaunchMode'])
|
||||
'DiskCacheSize'])
|
||||
return valuename_typeint
|
||||
|
||||
|
||||
@@ -123,7 +152,7 @@ class yandex_browser_applier(applier_frontend):
|
||||
'''
|
||||
Parse registry path string and leave key parameters
|
||||
'''
|
||||
parts = hivekeyname.replace(self.__registry_branch, '').split('\\')
|
||||
parts = hivekeyname.replace(self.__registry_branch, '').split('/')
|
||||
return parts
|
||||
|
||||
|
||||
|
@@ -23,10 +23,11 @@ import signal
|
||||
import gettext
|
||||
import locale
|
||||
|
||||
from backend import backend_factory
|
||||
from backend import backend_factory, save_dconf
|
||||
from frontend.frontend_manager import frontend_manager, determine_username
|
||||
from plugin import plugin_manager
|
||||
from messages import message_with_code
|
||||
from storage import Dconf_registry
|
||||
|
||||
from util.util import get_machine_name
|
||||
from util.users import (
|
||||
@@ -61,6 +62,9 @@ def parse_arguments():
|
||||
arguments.add_argument('--list-backends',
|
||||
action='store_true',
|
||||
help='Show list of available backends')
|
||||
arguments.add_argument('--force',
|
||||
action='store_true',
|
||||
help='Force GPT download')
|
||||
arguments.add_argument('--loglevel',
|
||||
type=int,
|
||||
default=4,
|
||||
@@ -120,6 +124,7 @@ class gpoa_controller:
|
||||
print('local')
|
||||
print('samba')
|
||||
return
|
||||
Dconf_registry._force = self.__args.force
|
||||
self.start_plugins()
|
||||
self.start_backend()
|
||||
|
||||
@@ -159,6 +164,7 @@ class gpoa_controller:
|
||||
einfo = geterr()
|
||||
logdata.update(einfo)
|
||||
log('E3', logdata)
|
||||
save_dconf(self.username, self.is_machine)
|
||||
|
||||
def start_frontend(self):
|
||||
'''
|
||||
|
@@ -19,7 +19,7 @@
|
||||
import json
|
||||
from base64 import b64decode
|
||||
from Crypto.Cipher import AES
|
||||
|
||||
from .dynamic_attributes import DynamicAttributes
|
||||
from util.xml import get_xml_root
|
||||
|
||||
def decrypt_pass(cpassword):
|
||||
@@ -67,6 +67,12 @@ def read_drives(drives_file):
|
||||
drive_obj.set_pass(decrypt_pass(props.get('cpassword')))
|
||||
drive_obj.set_dir(props.get('letter'))
|
||||
drive_obj.set_path(props.get('path'))
|
||||
drive_obj.set_action(props.get('action'))
|
||||
drive_obj.set_thisDrive(props.get('thisDrive'))
|
||||
drive_obj.set_allDrives(props.get('allDrives'))
|
||||
drive_obj.set_label(props.get('label'))
|
||||
drive_obj.set_persistent(props.get('persistent'))
|
||||
drive_obj.set_useLetter(props.get('useLetter'))
|
||||
|
||||
drives.append(drive_obj)
|
||||
|
||||
@@ -87,12 +93,18 @@ def json2drive(json_str):
|
||||
|
||||
return drive_obj
|
||||
|
||||
class drivemap:
|
||||
class drivemap(DynamicAttributes):
|
||||
def __init__(self):
|
||||
self.login = None
|
||||
self.password = None
|
||||
self.dir = None
|
||||
self.path = None
|
||||
self.action = None
|
||||
self.thisDrive = None
|
||||
self.allDrives = None
|
||||
self.label = None
|
||||
self.persistent = None
|
||||
self.useLetter = None
|
||||
|
||||
def set_login(self, username):
|
||||
self.login = username
|
||||
@@ -110,6 +122,24 @@ class drivemap:
|
||||
def set_path(self, path):
|
||||
self.path = path
|
||||
|
||||
def set_action(self, action):
|
||||
self.action = action
|
||||
|
||||
def set_thisDrive(self, thisDrive):
|
||||
self.thisDrive = thisDrive
|
||||
|
||||
def set_allDrives(self, allDrives):
|
||||
self.allDrives = allDrives
|
||||
|
||||
def set_label(self, label):
|
||||
self.label = label
|
||||
|
||||
def set_persistent(self, persistent):
|
||||
self.persistent = persistent
|
||||
|
||||
def set_useLetter(self, useLetter):
|
||||
self.useLetter = useLetter
|
||||
|
||||
def to_json(self):
|
||||
drive = dict()
|
||||
drive['login'] = self.login
|
||||
|
45
gpoa/gpt/dynamic_attributes.py
Normal file
45
gpoa/gpt/dynamic_attributes.py
Normal file
@@ -0,0 +1,45 @@
|
||||
#
|
||||
# GPOA - GPO Applier for Linux
|
||||
#
|
||||
# Copyright (C) 2019-2024 BaseALT Ltd.
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License as published by
|
||||
# the Free Software Foundation, either version 3 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
from enum import Enum
|
||||
|
||||
class DynamicAttributes:
|
||||
def __init__(self, **kwargs):
|
||||
self.policy_name = None
|
||||
for key, value in kwargs.items():
|
||||
self.__setattr__(key, value)
|
||||
|
||||
def __setattr__(self, key, value):
|
||||
if isinstance(value, Enum):
|
||||
value = str(value)
|
||||
self.__dict__[key] = value
|
||||
|
||||
def items(self):
|
||||
return self.__dict__.items()
|
||||
|
||||
def __iter__(self):
|
||||
return iter(self.__dict__.items())
|
||||
|
||||
class RegistryKeyMetadata(DynamicAttributes):
|
||||
def __init__(self, policy_name, type, is_list=None):
|
||||
self.policy_name = policy_name
|
||||
self.type = type
|
||||
self.reloaded_with_policy_key = None
|
||||
self.is_list = is_list
|
||||
|
||||
def __repr__(self):
|
||||
return str(dict(self))
|
@@ -17,24 +17,8 @@
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
from util.xml import get_xml_root
|
||||
from .dynamic_attributes import DynamicAttributes
|
||||
|
||||
from enum import Enum
|
||||
|
||||
class FileAction(Enum):
|
||||
CREATE = 'C'
|
||||
REPLACE = 'R'
|
||||
UPDATE = 'U'
|
||||
DELETE = 'D'
|
||||
|
||||
|
||||
def action_letter2enum(letter):
|
||||
if letter in ['C', 'R', 'U', 'D']:
|
||||
if letter == 'C': return FileAction.CREATE
|
||||
if letter == 'R': return FileAction.REPLACE
|
||||
if letter == 'U': return FileAction.UPDATE
|
||||
if letter == 'D': return FileAction.DELETE
|
||||
|
||||
return FileAction.CREATE
|
||||
|
||||
def read_envvars(envvars_file):
|
||||
variables = list()
|
||||
@@ -43,8 +27,8 @@ def read_envvars(envvars_file):
|
||||
props = var.find('Properties')
|
||||
name = props.get('name')
|
||||
value = props.get('value')
|
||||
var_obj = envvar(name, value)
|
||||
var_obj.set_action(action_letter2enum(props.get('action', default='C')))
|
||||
action = props.get('action', default='C')
|
||||
var_obj = envvar(name, value, action)
|
||||
|
||||
variables.append(var_obj)
|
||||
|
||||
@@ -54,12 +38,9 @@ def merge_envvars(storage, sid, envvar_objects, policy_name):
|
||||
for envv in envvar_objects:
|
||||
storage.add_envvar(sid, envv, policy_name)
|
||||
|
||||
class envvar:
|
||||
def __init__(self, name, value):
|
||||
class envvar(DynamicAttributes):
|
||||
def __init__(self, name, value, action):
|
||||
self.name = name
|
||||
self.value = value
|
||||
self.action = FileAction.CREATE
|
||||
|
||||
def set_action(self, action):
|
||||
self.action = action
|
||||
|
||||
|
@@ -17,6 +17,7 @@
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
from util.xml import get_xml_root
|
||||
from .dynamic_attributes import DynamicAttributes
|
||||
|
||||
def read_files(filesxml):
|
||||
files = list()
|
||||
@@ -30,6 +31,7 @@ def read_files(filesxml):
|
||||
fil_obj.set_archive(props.get('archive', default=None))
|
||||
fil_obj.set_hidden(props.get('hidden', default=None))
|
||||
fil_obj.set_suppress(props.get('suppress', default=None))
|
||||
fil_obj.set_executable(props.get('executable', default=None))
|
||||
files.append(fil_obj)
|
||||
|
||||
return files
|
||||
@@ -38,7 +40,7 @@ def merge_files(storage, sid, file_objects, policy_name):
|
||||
for fileobj in file_objects:
|
||||
storage.add_file(sid, fileobj, policy_name)
|
||||
|
||||
class fileentry:
|
||||
class fileentry(DynamicAttributes):
|
||||
def __init__(self, fromPath):
|
||||
self.fromPath = fromPath
|
||||
|
||||
@@ -54,3 +56,5 @@ class fileentry:
|
||||
self.hidden = hidden
|
||||
def set_suppress(self, suppress):
|
||||
self.suppress = suppress
|
||||
def set_executable(self, executable):
|
||||
self.executable = executable
|
||||
|
@@ -18,27 +18,11 @@
|
||||
|
||||
|
||||
from enum import Enum
|
||||
|
||||
from .dynamic_attributes import DynamicAttributes
|
||||
|
||||
from util.xml import get_xml_root
|
||||
|
||||
|
||||
class FileAction(Enum):
|
||||
CREATE = 'C'
|
||||
REPLACE = 'R'
|
||||
UPDATE = 'U'
|
||||
DELETE = 'D'
|
||||
|
||||
|
||||
def action_letter2enum(letter):
|
||||
if letter in ['C', 'R', 'U', 'D']:
|
||||
if letter == 'C': return FileAction.CREATE
|
||||
if letter == 'R': return FileAction.REPLACE
|
||||
if letter == 'U': return FileAction.UPDATE
|
||||
if letter == 'D': return FileAction.DELETE
|
||||
|
||||
return FileAction.CREATE
|
||||
|
||||
|
||||
def action_enum2letter(enumitem):
|
||||
return enumitem.value
|
||||
@@ -61,14 +45,17 @@ def read_folders(folders_file):
|
||||
|
||||
for fld in get_xml_root(folders_file):
|
||||
props = fld.find('Properties')
|
||||
fld_obj = folderentry(props.get('path'))
|
||||
fld_obj.set_action(action_letter2enum(props.get('action', default='C')))
|
||||
path = props.get('path')
|
||||
action = props.get('action', default='C')
|
||||
fld_obj = folderentry(path, action)
|
||||
fld_obj.set_delete_folder(folder_int2bool(props.get('deleteFolder', default=1)))
|
||||
fld_obj.set_delete_sub_folders(folder_int2bool(props.get('deleteSubFolders', default=1)))
|
||||
fld_obj.set_delete_files(folder_int2bool(props.get('deleteFiles', default=1)))
|
||||
fld_obj.set_hidden_folder(folder_int2bool(props.get('hidden', default=0)))
|
||||
|
||||
folders.append(fld_obj)
|
||||
|
||||
|
||||
return folders
|
||||
|
||||
def merge_folders(storage, sid, folder_objects, policy_name):
|
||||
@@ -76,13 +63,14 @@ def merge_folders(storage, sid, folder_objects, policy_name):
|
||||
storage.add_folder(sid, folder, policy_name)
|
||||
|
||||
|
||||
class folderentry:
|
||||
def __init__(self, path):
|
||||
class folderentry(DynamicAttributes):
|
||||
def __init__(self, path, action):
|
||||
self.path = path
|
||||
self.action = FileAction.CREATE
|
||||
self.action = action
|
||||
self.delete_folder = False
|
||||
self.delete_sub_folders = False
|
||||
self.delete_files = False
|
||||
self.hidden_folder = False
|
||||
|
||||
def set_action(self, action):
|
||||
self.action = action
|
||||
@@ -96,3 +84,5 @@ class folderentry:
|
||||
def set_delete_files(self, del_bool):
|
||||
self.delete_files = del_bool
|
||||
|
||||
def set_hidden_folder(self, hid_bool):
|
||||
self.hidden_folder = hid_bool
|
48
gpoa/gpt/gpo_dconf_mapping.py
Normal file
48
gpoa/gpt/gpo_dconf_mapping.py
Normal file
@@ -0,0 +1,48 @@
|
||||
#
|
||||
# GPOA - GPO Applier for Linux
|
||||
#
|
||||
# Copyright (C) 2019-2024 BaseALT Ltd.
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License as published by
|
||||
# the Free Software Foundation, either version 3 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
from .dynamic_attributes import DynamicAttributes
|
||||
|
||||
class GpoInfoDconf(DynamicAttributes):
|
||||
_counter = 0
|
||||
def __init__(self, gpo) -> None:
|
||||
GpoInfoDconf._counter += 1
|
||||
self.counter = GpoInfoDconf._counter
|
||||
self.display_name = None
|
||||
self.name = None
|
||||
self.version = None
|
||||
self.link = None
|
||||
self._fill_attributes(gpo)
|
||||
|
||||
def _fill_attributes(self, gpo):
|
||||
try:
|
||||
self.display_name = gpo.display_name
|
||||
except:
|
||||
self.display_name = "Unknown"
|
||||
try:
|
||||
self.name = gpo.name
|
||||
except:
|
||||
self.name = "Unknown"
|
||||
try:
|
||||
self.version = gpo.version
|
||||
except:
|
||||
self.version = "Unknown"
|
||||
try:
|
||||
self.link = gpo.link
|
||||
except:
|
||||
self.link = "Unknown"
|
@@ -153,10 +153,13 @@ def get_merger(preference_type):
|
||||
return mergers[preference_type]
|
||||
|
||||
class gpt:
|
||||
def __init__(self, gpt_path, sid):
|
||||
def __init__(self, gpt_path, sid, username='Machine', gpo_info=None):
|
||||
self.path = gpt_path
|
||||
self.username = username
|
||||
self.sid = sid
|
||||
self.storage = registry_factory('registry')
|
||||
self.storage = registry_factory()
|
||||
self.storage._gpt_read_flag = True
|
||||
self.gpo_info = gpo_info
|
||||
self.name = ''
|
||||
self.guid = self.path.rpartition('/')[2]
|
||||
if 'default' == self.guid:
|
||||
@@ -214,7 +217,7 @@ class gpt:
|
||||
if self.settings['machine']['regpol']:
|
||||
mlogdata = dict({'polfile': self.settings['machine']['regpol']})
|
||||
log('D34', mlogdata)
|
||||
util.preg.merge_polfile(self.settings['machine']['regpol'], policy_name=self.name)
|
||||
util.preg.merge_polfile(self.settings['machine']['regpol'], policy_name=self.name, gpo_info=self.gpo_info)
|
||||
# Merge machine preferences to registry if possible
|
||||
for preference_name, preference_path in self.settings['machine'].items():
|
||||
if preference_path:
|
||||
@@ -240,7 +243,11 @@ class gpt:
|
||||
if self.settings['user']['regpol']:
|
||||
mulogdata = dict({'polfile': self.settings['user']['regpol']})
|
||||
log('D35', mulogdata)
|
||||
util.preg.merge_polfile(self.settings['user']['regpol'], sid=self.sid, policy_name=self.name)
|
||||
util.preg.merge_polfile(self.settings['user']['regpol'],
|
||||
sid=self.sid,
|
||||
policy_name=self.name,
|
||||
username=self.username,
|
||||
gpo_info=self.gpo_info)
|
||||
# Merge user preferences to registry if possible
|
||||
for preference_name, preference_path in self.settings['user'].items():
|
||||
if preference_path:
|
||||
|
@@ -17,6 +17,7 @@
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
from util.xml import get_xml_root
|
||||
from .dynamic_attributes import DynamicAttributes
|
||||
|
||||
def read_inifiles(inifiles_file):
|
||||
inifiles = list()
|
||||
@@ -27,7 +28,7 @@ def read_inifiles(inifiles_file):
|
||||
ini_obj.set_section(prors.get('section', default=None))
|
||||
ini_obj.set_property(prors.get('property', default=None))
|
||||
ini_obj.set_value(prors.get('value', default=None))
|
||||
ini_obj.set_action(prors.get('action'))
|
||||
ini_obj.set_action(prors.get('action', default='C'))
|
||||
|
||||
inifiles.append(ini_obj)
|
||||
|
||||
@@ -37,7 +38,7 @@ def merge_inifiles(storage, sid, inifile_objects, policy_name):
|
||||
for iniobj in inifile_objects:
|
||||
storage.add_ini(sid, iniobj, policy_name)
|
||||
|
||||
class inifile:
|
||||
class inifile(DynamicAttributes):
|
||||
def __init__(self, path):
|
||||
self.path = path
|
||||
|
||||
|
@@ -17,6 +17,7 @@
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
from util.xml import get_xml_root
|
||||
from .dynamic_attributes import DynamicAttributes
|
||||
|
||||
def read_networkshares(networksharesxml):
|
||||
networkshares = list()
|
||||
@@ -38,7 +39,7 @@ def merge_networkshares(storage, sid, networkshares_objects, policy_name):
|
||||
for networkshareobj in networkshares_objects:
|
||||
storage.add_networkshare(sid, networkshareobj, policy_name)
|
||||
|
||||
class networkshare:
|
||||
class networkshare(DynamicAttributes):
|
||||
def __init__(self, name):
|
||||
self.name = name
|
||||
|
||||
|
@@ -24,9 +24,10 @@ def read_polfile(filename):
|
||||
return load_preg(filename).entries
|
||||
|
||||
def merge_polfile(storage, sid, policy_objects, policy_name):
|
||||
for entry in policy_objects:
|
||||
if not sid:
|
||||
storage.add_hklm_entry(entry, policy_name)
|
||||
else:
|
||||
storage.add_hkcu_entry(entry, sid, policy_name)
|
||||
pass
|
||||
# for entry in policy_objects:
|
||||
# if not sid:
|
||||
# storage.add_hklm_entry(entry, policy_name)
|
||||
# else:
|
||||
# storage.add_hkcu_entry(entry, sid, policy_name)
|
||||
|
||||
|
@@ -17,6 +17,7 @@
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
import json
|
||||
from .dynamic_attributes import DynamicAttributes
|
||||
|
||||
from util.xml import get_xml_root
|
||||
|
||||
@@ -60,7 +61,7 @@ def json2printer(json_str):
|
||||
|
||||
return prn
|
||||
|
||||
class printer:
|
||||
class printer(DynamicAttributes):
|
||||
def __init__(self, ptype, name, status):
|
||||
'''
|
||||
ptype may be one of:
|
||||
|
@@ -18,7 +18,7 @@
|
||||
|
||||
import configparser
|
||||
import os
|
||||
|
||||
from .dynamic_attributes import DynamicAttributes
|
||||
|
||||
def read_scripts(scripts_file):
|
||||
scripts = Scripts_lists()
|
||||
@@ -61,19 +61,19 @@ def read_scripts(scripts_file):
|
||||
section_scripts[key_index].set_args(config[act][key])
|
||||
if logon_scripts:
|
||||
for i in sorted(logon_scripts.keys()):
|
||||
scripts.add_script(act_upper, logon_scripts[i])
|
||||
scripts.add_script('LOGON', logon_scripts[i])
|
||||
|
||||
if logoff_scripts:
|
||||
for i in sorted(logoff_scripts.keys()):
|
||||
scripts.add_script(act_upper, logoff_scripts[i])
|
||||
scripts.add_script('LOGOFF', logoff_scripts[i])
|
||||
|
||||
if startup_scripts:
|
||||
for i in sorted(startup_scripts.keys()):
|
||||
scripts.add_script(act_upper, startup_scripts[i])
|
||||
scripts.add_script('STARTUP', startup_scripts[i])
|
||||
|
||||
if shutdown_scripts:
|
||||
for i in sorted(shutdown_scripts.keys()):
|
||||
scripts.add_script(act_upper, shutdown_scripts[i])
|
||||
scripts.add_script('SHUTDOWN', shutdown_scripts[i])
|
||||
|
||||
|
||||
return scripts
|
||||
@@ -115,7 +115,7 @@ class Scripts_lists:
|
||||
self.get_shutdown_scripts().append(script)
|
||||
|
||||
|
||||
class Script:
|
||||
class Script(DynamicAttributes):
|
||||
__logon_counter = 0
|
||||
__logoff_counter = 0
|
||||
__startup_counter = 0
|
||||
@@ -126,6 +126,7 @@ class Script:
|
||||
self.action = action_upper
|
||||
self.path = os.path.join(script_dir, action_upper, script_filename.upper())
|
||||
if not os.path.isfile(self.path):
|
||||
self.number = None
|
||||
return None
|
||||
self.args = None
|
||||
|
||||
|
@@ -17,6 +17,7 @@
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
from util.xml import get_xml_root
|
||||
from .dynamic_attributes import DynamicAttributes
|
||||
|
||||
def read_services(service_file):
|
||||
'''
|
||||
@@ -43,7 +44,7 @@ def merge_services(storage, sid, service_objects, policy_name):
|
||||
for srv in service_objects:
|
||||
pass
|
||||
|
||||
class service:
|
||||
class service(DynamicAttributes):
|
||||
def __init__(self, name):
|
||||
self.unit = name
|
||||
self.servname = None
|
||||
|
@@ -18,7 +18,6 @@
|
||||
|
||||
from pathlib import Path
|
||||
import stat
|
||||
import logging
|
||||
from enum import Enum
|
||||
|
||||
from xml.etree import ElementTree
|
||||
@@ -27,11 +26,16 @@ import json
|
||||
|
||||
from util.windows import transform_windows_path
|
||||
from util.xml import get_xml_root
|
||||
from util.paths import get_desktop_files_directory
|
||||
from .dynamic_attributes import DynamicAttributes
|
||||
|
||||
class TargetType(Enum):
|
||||
FILESYSTEM = 'FILESYSTEM'
|
||||
URL = 'URL'
|
||||
|
||||
def __str__(self):
|
||||
return self.value
|
||||
|
||||
def get_ttype(targetstr):
|
||||
'''
|
||||
Validation function for targetType property
|
||||
@@ -42,7 +46,7 @@ def get_ttype(targetstr):
|
||||
'''
|
||||
ttype = TargetType.FILESYSTEM
|
||||
|
||||
if targetstr == 'URL':
|
||||
if targetstr == 'URL'or targetstr == TargetType.URL:
|
||||
ttype = TargetType.URL
|
||||
|
||||
return ttype
|
||||
@@ -85,6 +89,9 @@ def read_shortcuts(shortcuts_file):
|
||||
sc.set_guid(link.get('uid'))
|
||||
sc.set_usercontext(link.get('userContext', False))
|
||||
sc.set_icon(props.get('iconPath'))
|
||||
if props.get('comment'):
|
||||
sc.set_comment(props.get('comment'))
|
||||
|
||||
shortcuts.append(sc)
|
||||
|
||||
return shortcuts
|
||||
@@ -93,24 +100,21 @@ def merge_shortcuts(storage, sid, shortcut_objects, policy_name):
|
||||
for shortcut in shortcut_objects:
|
||||
storage.add_shortcut(sid, shortcut, policy_name)
|
||||
|
||||
def json2sc(json_str):
|
||||
'''
|
||||
Build shortcut out of string-serialized JSON
|
||||
'''
|
||||
json_obj = json.loads(json_str)
|
||||
link_type = get_ttype(json_obj['type'])
|
||||
|
||||
sc = shortcut(json_obj['dest'], json_obj['path'], json_obj['arguments'], json_obj['name'], json_obj['action'], link_type)
|
||||
sc.set_changed(json_obj['changed'])
|
||||
sc.set_clsid(json_obj['clsid'])
|
||||
sc.set_guid(json_obj['guid'])
|
||||
sc.set_usercontext(json_obj['is_in_user_context'])
|
||||
if 'icon' in json_obj:
|
||||
sc.set_icon(json_obj['icon'])
|
||||
def find_desktop_entry(binary_path):
|
||||
desktop_dir = get_desktop_files_directory()
|
||||
binary_name = ''.join(binary_path.split('/')[-1])
|
||||
desktop_file_path = Path(f"{desktop_dir}/{binary_name}.desktop")
|
||||
|
||||
return sc
|
||||
if desktop_file_path.exists():
|
||||
desktop_entry = DesktopEntry()
|
||||
desktop_entry.parse(desktop_file_path)
|
||||
return desktop_entry
|
||||
|
||||
class shortcut:
|
||||
return None
|
||||
|
||||
|
||||
class shortcut(DynamicAttributes):
|
||||
def __init__(self, dest, path, arguments, name=None, action=None, ttype=TargetType.FILESYSTEM):
|
||||
'''
|
||||
:param dest: Path to resulting file on file system
|
||||
@@ -119,16 +123,34 @@ class shortcut:
|
||||
:param name: Name of the application
|
||||
:param type: Link type - FILESYSTEM or URL
|
||||
'''
|
||||
self.dest = dest
|
||||
self.dest = self.replace_slashes(dest)
|
||||
self.path = path
|
||||
self.expanded_path = None
|
||||
self.arguments = arguments
|
||||
self.name = name
|
||||
self.name = self.replace_name(name)
|
||||
self.action = action
|
||||
self.changed = ''
|
||||
self.icon = None
|
||||
self.comment = ''
|
||||
self.is_in_user_context = self.set_usercontext()
|
||||
self.type = ttype
|
||||
self.desktop_file_template = None
|
||||
|
||||
def replace_slashes(self, input_path):
|
||||
if input_path.startswith('%'):
|
||||
index = input_path.find('%', 1)
|
||||
if index != -1:
|
||||
replace_path = input_path[:index + 2] + input_path[index + 2:].replace('/','-')
|
||||
return replace_path
|
||||
return input_path.replace('/','-')
|
||||
|
||||
def replace_name(self, input_name):
|
||||
if input_name.startswith('%'):
|
||||
index = input_name.find('%', 1)
|
||||
if index != -1:
|
||||
replace_name = input_name[index + 2:]
|
||||
return replace_name
|
||||
return input_name
|
||||
|
||||
def __str__(self):
|
||||
result = self.to_json()
|
||||
@@ -149,6 +171,9 @@ class shortcut:
|
||||
def set_icon(self, icon_name):
|
||||
self.icon = icon_name
|
||||
|
||||
def set_comment(self, comment):
|
||||
self.comment = comment
|
||||
|
||||
def set_type(self, ttype):
|
||||
'''
|
||||
Set type of the hyperlink - FILESYSTEM or URL
|
||||
@@ -177,28 +202,6 @@ class shortcut:
|
||||
def is_usercontext(self):
|
||||
return self.is_in_user_context
|
||||
|
||||
def to_json(self):
|
||||
'''
|
||||
Return shortcut's JSON for further serialization.
|
||||
'''
|
||||
content = dict()
|
||||
content['dest'] = self.dest
|
||||
content['path'] = self.path
|
||||
content['name'] = self.name
|
||||
content['arguments'] = self.arguments
|
||||
content['clsid'] = self.clsid
|
||||
content['guid'] = self.guid
|
||||
content['changed'] = self.changed
|
||||
content['action'] = self.action
|
||||
content['is_in_user_context'] = self.is_in_user_context
|
||||
content['type'] = ttype2str(self.type)
|
||||
if self.icon:
|
||||
content['icon'] = self.icon
|
||||
result = self.desktop()
|
||||
result.content.update(content)
|
||||
|
||||
return json.dumps(result.content)
|
||||
|
||||
def desktop(self, dest=None):
|
||||
'''
|
||||
Returns desktop file object which may be written to disk.
|
||||
@@ -206,6 +209,7 @@ class shortcut:
|
||||
if dest:
|
||||
self.desktop_file = DesktopEntry(dest)
|
||||
else:
|
||||
self.desktop_file_template = find_desktop_entry(self.path)
|
||||
self.desktop_file = DesktopEntry()
|
||||
self.desktop_file.addGroup('Desktop Entry')
|
||||
self.desktop_file.set('Version', '1.0')
|
||||
@@ -217,7 +221,7 @@ class shortcut:
|
||||
'''
|
||||
Update desktop file object from internal data.
|
||||
'''
|
||||
if self.type == TargetType.URL:
|
||||
if get_ttype(self.type) == TargetType.URL:
|
||||
self.desktop_file.set('Type', 'Link')
|
||||
else:
|
||||
self.desktop_file.set('Type', 'Application')
|
||||
@@ -227,14 +231,21 @@ class shortcut:
|
||||
desktop_path = self.path
|
||||
if self.expanded_path:
|
||||
desktop_path = self.expanded_path
|
||||
if self.type == TargetType.URL:
|
||||
if get_ttype(self.type) == TargetType.URL:
|
||||
self.desktop_file.set('URL', desktop_path)
|
||||
else:
|
||||
self.desktop_file.set('Terminal', 'false')
|
||||
str2bool_lambda = (lambda boolstr: boolstr if isinstance(boolstr, bool)
|
||||
else boolstr and boolstr.lower() in ['True', 'true', 'yes', '1'])
|
||||
if self.desktop_file_template:
|
||||
terminal_state = str2bool_lambda(self.desktop_file_template.get('Terminal'))
|
||||
self.desktop_file.set('Terminal', 'true' if terminal_state else 'false')
|
||||
self.desktop_file.set('Exec', '{} {}'.format(desktop_path, self.arguments))
|
||||
self.desktop_file.set('Comment', self.comment)
|
||||
|
||||
if self.icon:
|
||||
self.desktop_file.set('Icon', self.icon)
|
||||
elif self.desktop_file_template and self.desktop_file_template.get('Icon', False):
|
||||
self.desktop_file.set('Icon', self.desktop_file_template.get('Icon'))
|
||||
|
||||
def _write_desktop(self, dest, create_only=False, read_firstly=False):
|
||||
'''
|
||||
|
@@ -25,6 +25,7 @@ import os
|
||||
import sys
|
||||
import pwd
|
||||
import signal
|
||||
from storage import Dconf_registry
|
||||
|
||||
from util.users import (
|
||||
is_root
|
||||
@@ -83,6 +84,11 @@ def parse_cli_arguments():
|
||||
type=int,
|
||||
default=5,
|
||||
help='Set logging verbosity level')
|
||||
argparser.add_argument('-f',
|
||||
'--force',
|
||||
action='store_true',
|
||||
default=False,
|
||||
help='Force GPT download')
|
||||
argparser.add_argument('-s',
|
||||
'--system',
|
||||
action='store_true',
|
||||
@@ -165,6 +171,7 @@ def main():
|
||||
gettext.bindtextdomain('gpoa', '/usr/lib/python3/site-packages/gpoa/locale')
|
||||
gettext.textdomain('gpoa')
|
||||
set_loglevel(args.loglevel)
|
||||
Dconf_registry._force = args.force
|
||||
gpo_appliers = runner_factory(args, process_target(args.target))
|
||||
|
||||
if gpo_appliers:
|
||||
|
@@ -146,10 +146,10 @@ def is_unit_enabled(unit_name, unit_global=False):
|
||||
|
||||
def get_status():
|
||||
'''
|
||||
Check that gpupdate.service and gpupdate-user.service are enabled.
|
||||
Check that gpupdate.timer and gpupdate-user.timer are enabled.
|
||||
'''
|
||||
is_gpupdate = is_unit_enabled('gpupdate.service')
|
||||
is_gpupdate_user = is_unit_enabled('gpupdate-user.service', unit_global=True)
|
||||
is_gpupdate = is_unit_enabled('gpupdate.timer')
|
||||
is_gpupdate_user = is_unit_enabled('gpupdate-user.timer', unit_global=True)
|
||||
|
||||
if is_gpupdate and is_gpupdate_user:
|
||||
return True
|
||||
@@ -218,7 +218,7 @@ def enable_gp(policy_name, backend_type):
|
||||
cmd_set_gpupdate_policy = ['/usr/sbin/control', 'system-policy', 'gpupdate']
|
||||
cmd_gpoa_nodomain = ['/usr/sbin/gpoa', '--nodomain', '--loglevel', '5']
|
||||
cmd_enable_gpupdate_service = ['/bin/systemctl', 'enable', 'gpupdate.service']
|
||||
cmd_enable_gpupdate_user_service = ['/bin/systemctl', '--global', 'enable', 'gpupdate-user.service']
|
||||
cmd_enable_gpupdate_user_service = ['/bin/systemctl', '--global', 'disable', 'gpupdate-user.service']
|
||||
cmd_enable_gpupdate_timer = ['/bin/systemctl', 'enable', 'gpupdate.timer']
|
||||
cmd_enable_gpupdate_user_timer = ['/bin/systemctl', '--global', 'enable', 'gpupdate-user.timer']
|
||||
cmd_enable_gpupdate_scripts_service = ['/bin/systemctl', 'enable', 'gpupdate-scripts-run.service']
|
||||
@@ -254,11 +254,7 @@ def enable_gp(policy_name, backend_type):
|
||||
# Enable gpupdate-setup.service for all users
|
||||
if not rollback_on_error(cmd_enable_gpupdate_user_service):
|
||||
return
|
||||
if not is_unit_enabled('gpupdate-user.service', unit_global=True):
|
||||
disable_gp()
|
||||
return
|
||||
|
||||
# Enable gpupdate-scripts-run.service
|
||||
# Enable gpupdate-scripts-run.service
|
||||
if not rollback_on_error(cmd_enable_gpupdate_scripts_service):
|
||||
return
|
||||
if not is_unit_enabled('gpupdate-scripts-run.service'):
|
||||
|
@@ -62,6 +62,13 @@ msgstr "Политика Chromium"
|
||||
msgid "Set user property to"
|
||||
msgstr "Установка свойств для пользователя"
|
||||
|
||||
msgid "The line in the configuration file was cleared"
|
||||
msgstr "В конфигурационном файле была очищена строка"
|
||||
|
||||
msgid "Found GPT in cache"
|
||||
msgstr "Найден GPT в кеше"
|
||||
|
||||
|
||||
# Error
|
||||
msgid "Insufficient permissions to run gpupdate"
|
||||
msgstr "Недостаточно прав для запуска gpupdate"
|
||||
@@ -228,6 +235,30 @@ msgstr "Ошибка очистки каталога для машины"
|
||||
msgid "Error cleaning directory for user"
|
||||
msgstr "Ошибка очистки каталога для пользователя"
|
||||
|
||||
msgid "Error while executing command for widgets"
|
||||
msgstr "Ошибка при выполнении команды для виджетов"
|
||||
|
||||
msgid "Error creating environment variables"
|
||||
msgstr "Ошибка создания переменных среды"
|
||||
|
||||
msgid "Error running kwriteconfig5 command"
|
||||
msgstr "Ошибка выполнения команды kwriteconfig5"
|
||||
|
||||
msgid "Error getting list of keys"
|
||||
msgstr "Ошибка получения списка ключей"
|
||||
|
||||
msgid "Error getting key value"
|
||||
msgstr "Ошибка при получении значения ключей"
|
||||
|
||||
msgid "Failed to update dconf database"
|
||||
msgstr "Не удалось обновить базу данных dconf"
|
||||
|
||||
msgid "Exception occurred while updating dconf database"
|
||||
msgstr "Возникло исключение при обновлении базы данных dconf"
|
||||
|
||||
msgid "Failed to retrieve data from dconf database"
|
||||
msgstr "Не удалось получить данные из базы dconf"
|
||||
|
||||
# Error_end
|
||||
|
||||
# Debug
|
||||
@@ -723,11 +754,11 @@ msgstr "Запуск применение настроек ini файлов дл
|
||||
msgid "Running ini applier for machine will not be started"
|
||||
msgstr "Применение настроек ini файлов для машины не будет запущено"
|
||||
|
||||
msgid "Running ini applier for user in administrator context"
|
||||
msgstr "Запуск применение настроек ini файлов для пользователя в контексте администратора"
|
||||
msgid "Running ini applier for user in user context"
|
||||
msgstr "Запуск применение настроек ini файлов для пользователя в контексте пользователя"
|
||||
|
||||
msgid "Running ini applier for user in administrator context will not be started"
|
||||
msgstr "Применение настроек ini файлов для пользователя в контексте администратора не будет запущено"
|
||||
msgid "Running ini applier for user in user context will not be started"
|
||||
msgstr "Применение настроек ini файлов для пользователя в контексте пользователя не будет запущено"
|
||||
|
||||
msgid "Ini-file path not recognized"
|
||||
msgstr "Путь к ini-файлу не распознан"
|
||||
@@ -741,6 +772,12 @@ msgstr "Сохранение информации об ini-файле"
|
||||
msgid "Dictionary key generation failed"
|
||||
msgstr "Формирования ключа словаря не удалось"
|
||||
|
||||
msgid "Running CIFS applier for machine"
|
||||
msgstr "Запуск применение настроек CIFS для машины"
|
||||
|
||||
msgid "CIFS applier for machine will not be started"
|
||||
msgstr "Применение настроек CIFS для машины не будет запущено"
|
||||
|
||||
msgid "Saving information about network shares"
|
||||
msgstr "Сохранение информации о сетевых ресурсах"
|
||||
|
||||
@@ -762,6 +799,87 @@ msgstr "Yandex_browser_applier для машины не запустится"
|
||||
msgid "Wrote YandexBrowser preferences to"
|
||||
msgstr "Запись настройки Яндекс Браузера в"
|
||||
|
||||
msgid "Running networkshare applier for user"
|
||||
msgstr "Запуск применение настроек сетевых каталогов для пользователя"
|
||||
|
||||
msgid "File copy"
|
||||
msgstr "Копирование файла"
|
||||
|
||||
msgid "Running networkshare applier for user will not be started"
|
||||
msgstr "Применение настроек сетевых каталогов для пользователя не будет запущено"
|
||||
|
||||
msgid "File update"
|
||||
msgstr "Обновление файла"
|
||||
|
||||
msgid "Applying settings for network share"
|
||||
msgstr "Применение настроек для сетевой папки"
|
||||
|
||||
msgid "Deleting a file"
|
||||
msgstr "Удаление файла"
|
||||
|
||||
msgid "Running GPOA by root for user"
|
||||
msgstr "Запуск GPOA от root для пользователя"
|
||||
|
||||
msgid "The GPOA process was started for computer"
|
||||
msgstr "Процесс GPOA запущен для компьютера"
|
||||
|
||||
msgid "Running networkshare applier for machine will not be started"
|
||||
msgstr "Применение настроек сетевых каталогов для машины не будет запущено"
|
||||
|
||||
msgid "Failed to create a symlink to the network drives mountpoint"
|
||||
msgstr "Не удалось создать ссылку на точку монтирования сетевых дисков пользователя"
|
||||
|
||||
msgid "Failed to create a symlink to the system network drives mountpoint"
|
||||
msgstr "Не удалось создать ссылку на точку монтирования системных сетевых дисков"
|
||||
|
||||
msgid "Failed to create a symlink to the hidden network drives mountpoint"
|
||||
msgstr "Не удалось создать ссылку на точку монтирования скрытых сетевых дисков пользователя"
|
||||
|
||||
msgid "Failed to create a symlink to the hidden system network drives mountpoint"
|
||||
msgstr "Не удалось создать ссылку на точку монтирования скрытых системных сетевых дисков"
|
||||
|
||||
msgid "Running KDE applier for machine"
|
||||
msgstr "Запуск применения настроек KDE для машины"
|
||||
|
||||
msgid "KDE applier for machine will not be started"
|
||||
msgstr "Применение настроек KDE для машины не удалось"
|
||||
|
||||
msgid "Running KDE applier for user in user context"
|
||||
msgstr "Запуск применения настроек KDE в контексте пользователя"
|
||||
|
||||
msgid "KDE applier for user in user context will not be started"
|
||||
msgstr "KDE в контексте пользователя не запускается"
|
||||
|
||||
msgid "Changing the configuration file"
|
||||
msgstr "Изменение конфигурационного файла"
|
||||
|
||||
msgid "Widget command completed successfully"
|
||||
msgstr "Команда для виджетов выполнена успешно"
|
||||
|
||||
msgid "Getting a list of keys"
|
||||
msgstr "Получение списка ключей"
|
||||
|
||||
msgid "Getting the key value"
|
||||
msgstr "Получение значения ключа"
|
||||
|
||||
msgid "Successfully updated dconf database"
|
||||
msgstr "База данных dconf успешно обновлена"
|
||||
|
||||
msgid "Creating a dictionary with keys and values from the dconf database"
|
||||
msgstr "Формирование словаря с ключами и значениями из базы dconf"
|
||||
|
||||
msgid "No entry found for the specified path"
|
||||
msgstr "Не найдено записей по указанному пути"
|
||||
|
||||
msgid "Creating an ini file with policies for dconf"
|
||||
msgstr "Создание ini-файла с политиками для dconf"
|
||||
|
||||
msgid "GPO version was not found"
|
||||
msgstr "Версия GPO не найдена"
|
||||
|
||||
msgid "SYSVOL entry found in cache"
|
||||
msgstr "Запись SYSVOL найдена в кеше"
|
||||
|
||||
# Debug_end
|
||||
|
||||
# Warning
|
||||
@@ -808,6 +926,36 @@ msgstr "Не удалось кэшировать файл"
|
||||
msgid "Could not create a valid list of keys"
|
||||
msgstr "Не удалось создать допустимый список ключей"
|
||||
|
||||
msgid "Failed to copy file"
|
||||
msgstr "Не удалось скопировать файл"
|
||||
|
||||
msgid "Failed to create KDE settings list"
|
||||
msgstr "Не удалось создать список настроек KDE"
|
||||
|
||||
msgid "Could not find tools to configure KDE"
|
||||
msgstr "Не удалось найти инструменты для настройки KDE"
|
||||
|
||||
msgid "Failed to open KDE settings"
|
||||
msgstr "Не удалось открыть настройки KDE"
|
||||
|
||||
msgid "Failed to change KDE configuration file"
|
||||
msgstr "Не удалось изменить файл конфигурации KDE"
|
||||
|
||||
msgid "Error connecting to server"
|
||||
msgstr "Ошибка при подключении к серверу"
|
||||
|
||||
msgid "Wallpaper configuration file not found"
|
||||
msgstr "Конфигурационный файл для обоев не найден"
|
||||
|
||||
msgid "The user setting was not installed, conflict with computer setting"
|
||||
msgstr "Пользовательская настройка не была установлена, конфликт с настройкой компьютера"
|
||||
|
||||
msgid "Action for ini file failed"
|
||||
msgstr "Не удалось выполнить действие для INI-файла"
|
||||
|
||||
msgid "Couldn't get the uid"
|
||||
msgstr "Не удалось получить uid"
|
||||
|
||||
# Fatal
|
||||
msgid "Unable to refresh GPO list"
|
||||
msgstr "Невозможно обновить список объектов групповых политик"
|
||||
|
@@ -30,6 +30,8 @@ def info_code(code):
|
||||
info_ids[7] = 'Firefox policy'
|
||||
info_ids[8] = 'Chromium policy'
|
||||
info_ids[9] = 'Set user property to'
|
||||
info_ids[10] = 'The line in the configuration file was cleared'
|
||||
info_ids[11] = 'Found GPT in cache'
|
||||
|
||||
return info_ids.get(code, 'Unknown info code')
|
||||
|
||||
@@ -99,8 +101,14 @@ def error_code(code):
|
||||
error_ids[63] = 'Error merging user GPT (from machine GPO)'
|
||||
error_ids[64] = 'Error to cleanup directory for machine'
|
||||
error_ids[65] = 'Error to cleanup directory for user'
|
||||
|
||||
|
||||
error_ids[66] = 'Error while executing command for widgets'
|
||||
error_ids[67] = 'Error creating environment variables'
|
||||
error_ids[68] = 'Error running kwriteconfig5 command'
|
||||
error_ids[69] = 'Error getting list of keys'
|
||||
error_ids[70] = 'Error getting key value'
|
||||
error_ids[71] = 'Failed to update dconf database'
|
||||
error_ids[72] = 'Exception occurred while updating dconf database'
|
||||
error_ids[73] = 'Failed to retrieve data from dconf database'
|
||||
return error_ids.get(code, 'Unknown error code')
|
||||
|
||||
def debug_code(code):
|
||||
@@ -277,19 +285,45 @@ def debug_code(code):
|
||||
debug_ids[170] = 'Running File copy applier for user in administrator context will not be started'
|
||||
debug_ids[171] = 'Running ini applier for machine'
|
||||
debug_ids[172] = 'Running ini applier for machine will not be started'
|
||||
debug_ids[173] = 'Running ini applier for user in administrator context'
|
||||
debug_ids[174] = 'Running ini applier for user in administrator context will not be started'
|
||||
debug_ids[173] = 'Running ini applier for user in user context'
|
||||
debug_ids[174] = 'Running ini applier for user in user context will not be started'
|
||||
debug_ids[175] = 'Ini-file path not recognized'
|
||||
debug_ids[176] = 'Ini-file is not readable'
|
||||
debug_ids[177] = 'Saving information about ini-file'
|
||||
debug_ids[178] = 'Dictionary key generation failed'
|
||||
debug_ids[179] = 'Saving information about network shares'
|
||||
debug_ids[180] = 'Running networkshare applier for machine'
|
||||
debug_ids[179] = 'Running CIFS applier for machine'
|
||||
debug_ids[180] = 'CIFS applier for machine will not be started'
|
||||
debug_ids[181] = 'Running networkshare applier for machine will not be started'
|
||||
debug_ids[182] = 'Apply network share data action failed'
|
||||
debug_ids[183] = 'Running yandex_browser_applier for machine'
|
||||
debug_ids[184] = 'Yandex_browser_applier for machine will not be started'
|
||||
debug_ids[185] = 'Wrote YandexBrowser preferences to'
|
||||
debug_ids[186] = 'Saving information about network shares'
|
||||
debug_ids[187] = 'Running networkshare applier for machine'
|
||||
debug_ids[188] = 'Running networkshare applier for user'
|
||||
debug_ids[189] = 'Running networkshare applier for user will not be started'
|
||||
debug_ids[190] = 'Applying settings for network share'
|
||||
debug_ids[191] = 'File copy'
|
||||
debug_ids[192] = 'File update'
|
||||
debug_ids[193] = 'Deleting a file'
|
||||
debug_ids[194] = 'Failed to create a symlink to the network drives mountpoint'
|
||||
debug_ids[195] = 'Failed to create a symlink to the system network drives mountpoint'
|
||||
debug_ids[196] = 'Failed to create a symlink to the hidden network drives mountpoint'
|
||||
debug_ids[197] = 'Failed to create a symlink to the hidden system network drives mountpoint'
|
||||
debug_ids[198] = 'Running KDE applier for machine'
|
||||
debug_ids[199] = 'KDE applier for machine will not be started'
|
||||
debug_ids[200] = 'Running KDE applier for user in user context'
|
||||
debug_ids[201] = 'KDE applier for user in user context will not be started'
|
||||
debug_ids[202] = 'Changing the configuration file'
|
||||
debug_ids[203] = 'Widget command completed successfully'
|
||||
debug_ids[204] = 'Getting a list of keys'
|
||||
debug_ids[205] = 'Getting the key value'
|
||||
debug_ids[206] = 'Successfully updated dconf database'
|
||||
debug_ids[207] = 'Creating a dictionary with keys and values from the dconf database'
|
||||
debug_ids[208] = 'No entry found for the specified path'
|
||||
debug_ids[209] = 'Creating an ini file with policies for dconf'
|
||||
debug_ids[211] = 'SYSVOL entry found in cache'
|
||||
#debug_ids[210] = 'GPO version was not found'
|
||||
|
||||
return debug_ids.get(code, 'Unknown debug code')
|
||||
|
||||
@@ -315,6 +349,17 @@ def warning_code(code):
|
||||
warning_ids[12] = 'Failed to read the list of files'
|
||||
warning_ids[13] = 'Failed to caching the file'
|
||||
warning_ids[14] = 'Could not create a valid list of keys'
|
||||
warning_ids[15] = 'Failed to copy file'
|
||||
warning_ids[16] = 'Failed to create KDE settings list'
|
||||
warning_ids[17] = 'Could not find tools to configure KDE'
|
||||
warning_ids[18] = 'Failed to open KDE settings'
|
||||
warning_ids[19] = 'Failed to change KDE configuration file'
|
||||
warning_ids[20] = 'Error connecting to server'
|
||||
warning_ids[21] = 'Wallpaper configuration file not found'
|
||||
warning_ids[22] = 'The user setting was not installed, conflict with computer setting'
|
||||
warning_ids[23] = 'Action for ini file failed'
|
||||
warning_ids[24] = 'Couldn\'t get the uid'
|
||||
|
||||
|
||||
return warning_ids.get(code, 'Unknown warning code')
|
||||
|
||||
|
@@ -20,15 +20,13 @@
|
||||
import rpm
|
||||
import subprocess
|
||||
from gpoa.storage import registry_factory
|
||||
from util.gpoa_ini_parsing import GpoaConfigObj
|
||||
from util.util import get_uid_by_username, string_to_literal_eval
|
||||
import logging
|
||||
from util.logging import log
|
||||
import argparse
|
||||
import gettext
|
||||
import locale
|
||||
from messages import message_with_code
|
||||
from util.arguments import (
|
||||
set_loglevel
|
||||
)
|
||||
|
||||
|
||||
def is_rpm_installed(rpm_name):
|
||||
@@ -44,35 +42,33 @@ def is_rpm_installed(rpm_name):
|
||||
|
||||
class Pkcon_applier:
|
||||
|
||||
def __init__(self, sid = None):
|
||||
self.__install_key_name = 'Install'
|
||||
self.__remove_key_name = 'Remove'
|
||||
self.__hkcu_branch = 'Software\\BaseALT\\Policies\\Packages'
|
||||
self.__hklm_branch = 'Software\\BaseALT\\Policies\\Packages'
|
||||
def __init__(self, user = None):
|
||||
install_key_name = 'Install'
|
||||
remove_key_name = 'Remove'
|
||||
hklm_branch = 'Software/BaseALT/Policies/Packages'
|
||||
self.__install_command = ['/usr/bin/pkcon', '-y', 'install']
|
||||
self.__remove_command = ['/usr/bin/pkcon', '-y', 'remove']
|
||||
self.__reinstall_command = ['/usr/bin/pkcon', '-y', 'reinstall']
|
||||
self.install_packages = set()
|
||||
self.remove_packages = set()
|
||||
self.storage = registry_factory('registry')
|
||||
if sid:
|
||||
install_branch_user = '{}\\{}%'.format(self.__hkcu_branch, self.__install_key_name)
|
||||
remove_branch_user = '{}\\{}%'.format(self.__hkcu_branch, self.__remove_key_name)
|
||||
self.install_packages_setting = self.storage.filter_hkcu_entries(sid, install_branch_user)
|
||||
self.remove_packages_setting = self.storage.filter_hkcu_entries(sid, remove_branch_user)
|
||||
self.storage = registry_factory()
|
||||
if user:
|
||||
uid = get_uid_by_username(user)
|
||||
dict_dconf_db = self.storage.get_dictionary_from_dconf_file_db(uid)
|
||||
else:
|
||||
install_branch = '{}\\{}%'.format(self.__hklm_branch, self.__install_key_name)
|
||||
remove_branch = '{}\\{}%'.format(self.__hklm_branch, self.__remove_key_name)
|
||||
self.install_packages_setting = self.storage.filter_hklm_entries(install_branch)
|
||||
self.remove_packages_setting = self.storage.filter_hklm_entries(remove_branch)
|
||||
dict_dconf_db = self.storage.get_dictionary_from_dconf_file_db()
|
||||
dict_packages = dict_dconf_db.get(hklm_branch,{})
|
||||
self.install_packages_setting = string_to_literal_eval(dict_packages.get(install_key_name,[]))
|
||||
self.remove_packages_setting = string_to_literal_eval(dict_packages.get(remove_key_name,[]))
|
||||
|
||||
for package in self.install_packages_setting:
|
||||
if not is_rpm_installed(package.data):
|
||||
self.install_packages.add(package.data)
|
||||
if not is_rpm_installed(package):
|
||||
self.install_packages.add(package)
|
||||
for package in self.remove_packages_setting:
|
||||
if package.data in self.install_packages:
|
||||
self.install_packages.remove(package.data)
|
||||
if is_rpm_installed(package.data):
|
||||
self.remove_packages.add(package.data)
|
||||
if package in self.install_packages:
|
||||
self.install_packages.remove(package)
|
||||
if is_rpm_installed(package):
|
||||
self.remove_packages.add(package)
|
||||
|
||||
def apply(self):
|
||||
log('D142')
|
||||
@@ -137,13 +133,13 @@ if __name__ == '__main__':
|
||||
gettext.textdomain('gpoa')
|
||||
logger = logging.getLogger()
|
||||
parser = argparse.ArgumentParser(description='Package applier')
|
||||
parser.add_argument('--sid', type = str, help = 'sid', nargs = '?', default = None)
|
||||
parser.add_argument('--user', type = str, help = 'user', nargs = '?', default = None)
|
||||
parser.add_argument('--loglevel', type = int, help = 'loglevel', nargs = '?', default = 30)
|
||||
|
||||
args = parser.parse_args()
|
||||
logger.setLevel(args.loglevel)
|
||||
if args.sid:
|
||||
applier = Pkcon_applier(args.sid)
|
||||
if args.user:
|
||||
applier = Pkcon_applier(args.user)
|
||||
else:
|
||||
applier = Pkcon_applier()
|
||||
applier.apply()
|
||||
|
@@ -21,6 +21,8 @@ import subprocess
|
||||
import argparse
|
||||
import os
|
||||
from pathlib import Path
|
||||
import psutil
|
||||
import time
|
||||
|
||||
class Scripts_runner:
|
||||
'''
|
||||
@@ -104,12 +106,39 @@ class Scripts_runner:
|
||||
|
||||
def run_cmd_subprocess(self, cmd):
|
||||
try:
|
||||
subprocess.Popen(cmd)
|
||||
subprocess.run(cmd)
|
||||
return 'Script run: {}'.format(cmd)
|
||||
except Exception as exc:
|
||||
return exc
|
||||
|
||||
def find_process_by_name_and_script(name, script_path):
|
||||
|
||||
for proc in psutil.process_iter(['pid', 'name', 'cmdline']):
|
||||
try:
|
||||
# Check if the process name matches and the script path is in the command line arguments
|
||||
if proc.info['name'] == name and script_path in proc.info['cmdline']:
|
||||
return proc
|
||||
except (psutil.NoSuchProcess, psutil.AccessDenied, psutil.ZombieProcess):
|
||||
continue
|
||||
return None
|
||||
|
||||
def wait_for_process(name, script_path, check_interval=1):
|
||||
|
||||
process = find_process_by_name_and_script(name, script_path)
|
||||
if not process:
|
||||
print(f"Process with name {name} and script path {script_path} not found.")
|
||||
return
|
||||
|
||||
try:
|
||||
# Loop to wait for the process to finish
|
||||
while process.is_running():
|
||||
print(f"Waiting for process {name} with PID {process.pid} to finish...")
|
||||
time.sleep(check_interval)
|
||||
print(f"Process {name} with PID {process.pid} has finished.")
|
||||
return
|
||||
except (psutil.NoSuchProcess, psutil.AccessDenied):
|
||||
print(f"Process {name} with PID {process.pid} is no longer accessible.")
|
||||
return
|
||||
|
||||
if __name__ == '__main__':
|
||||
parser = argparse.ArgumentParser(description='Scripts runner')
|
||||
@@ -117,6 +146,9 @@ if __name__ == '__main__':
|
||||
parser.add_argument('--user', type = str, help = 'User name ', nargs = '?', default = None)
|
||||
parser.add_argument('--action', type = str, help = 'MACHINE : [STARTUP or SHUTDOWN], USER : [LOGON or LOGOFF]', nargs = '?', default = None)
|
||||
|
||||
process_name = "python3"
|
||||
script_path = "/usr/sbin/gpoa"
|
||||
wait_for_process(process_name, script_path)
|
||||
args = parser.parse_args()
|
||||
try:
|
||||
Scripts_runner(args.mode, args.user, args.action)
|
||||
|
@@ -1,7 +1,7 @@
|
||||
#
|
||||
# GPOA - GPO Applier for Linux
|
||||
#
|
||||
# Copyright (C) 2019-2020 BaseALT Ltd.
|
||||
# Copyright (C) 2019-2023 BaseALT Ltd.
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License as published by
|
||||
@@ -16,12 +16,19 @@
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
from .sqlite_registry import sqlite_registry
|
||||
from .sqlite_cache import sqlite_cache
|
||||
|
||||
def cache_factory(cache_name):
|
||||
return sqlite_cache(cache_name)
|
||||
from storage.dconf_registry import Dconf_registry
|
||||
|
||||
def registry_factory(registry_name='registry', registry_dir=None):
|
||||
return sqlite_registry(registry_name, registry_dir)
|
||||
def registry_factory(registry_name='', envprofile=None , username=None):
|
||||
if username:
|
||||
Dconf_registry._username = username
|
||||
else:
|
||||
Dconf_registry._envprofile = 'system'
|
||||
if envprofile:
|
||||
Dconf_registry._envprofile = envprofile
|
||||
|
||||
if registry_name == 'dconf':
|
||||
return Dconf_registry()
|
||||
else:
|
||||
return Dconf_registry
|
||||
|
||||
|
734
gpoa/storage/dconf_registry.py
Normal file
734
gpoa/storage/dconf_registry.py
Normal file
@@ -0,0 +1,734 @@
|
||||
#
|
||||
# GPOA - GPO Applier for Linux
|
||||
#
|
||||
# Copyright (C) 2019-2023 BaseALT Ltd.
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License as published by
|
||||
# the Free Software Foundation, either version 3 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
import subprocess
|
||||
from pathlib import Path
|
||||
from util.util import string_to_literal_eval, touch_file, get_uid_by_username
|
||||
from util.paths import get_dconf_config_path
|
||||
from util.logging import log
|
||||
import re
|
||||
from collections import OrderedDict
|
||||
import itertools
|
||||
from gpt.dynamic_attributes import RegistryKeyMetadata
|
||||
import gi
|
||||
gi.require_version("Gvdb", "1.0")
|
||||
gi.require_version("GLib", "2.0")
|
||||
from gi.repository import Gvdb, GLib
|
||||
|
||||
|
||||
class PregDconf():
|
||||
def __init__(self, keyname, valuename, type_preg, data):
|
||||
self.keyname = keyname
|
||||
self.valuename = valuename
|
||||
self.hive_key = '{}/{}'.format(self.keyname, self.valuename)
|
||||
self.type = type_preg
|
||||
self.data = data
|
||||
|
||||
|
||||
class gplist(list):
|
||||
def __init__(self, *args, **kwargs):
|
||||
super().__init__(*args, **kwargs)
|
||||
|
||||
def first(self):
|
||||
if self:
|
||||
return self[0]
|
||||
else:
|
||||
return None
|
||||
|
||||
def count(self):
|
||||
return len(self)
|
||||
|
||||
class Dconf_registry():
|
||||
'''
|
||||
A class variable that represents a global registry dictionary shared among instances of the class
|
||||
'''
|
||||
_GpoPriority = 'Software/BaseALT/Policies/GpoPriority'
|
||||
global_registry_dict = dict({_GpoPriority:{}})
|
||||
__template_file = '/usr/share/dconf/user_mandatory.template'
|
||||
_policies_path = 'Software/'
|
||||
_policies_win_path = 'SOFTWARE/'
|
||||
_gpt_read_flag = False
|
||||
_force = False
|
||||
__dconf_dict_flag = False
|
||||
__dconf_dict = dict()
|
||||
_dict_gpo_name_version_cache = dict()
|
||||
_username = None
|
||||
_uid = None
|
||||
_envprofile = None
|
||||
_path_bin_system = "/etc/dconf/db/policy"
|
||||
|
||||
list_keys = list()
|
||||
_info = dict()
|
||||
_counter_gpt = itertools.count(0)
|
||||
|
||||
shortcuts = list()
|
||||
folders = list()
|
||||
files = list()
|
||||
drives = list()
|
||||
scheduledtasks = list()
|
||||
environmentvariables = list()
|
||||
inifiles = list()
|
||||
services = list()
|
||||
printers = list()
|
||||
scripts = list()
|
||||
networkshares = list()
|
||||
|
||||
|
||||
|
||||
@classmethod
|
||||
def set_info(cls, key , data):
|
||||
cls._info[key] = data
|
||||
|
||||
|
||||
@classmethod
|
||||
def get_info(cls, key):
|
||||
return cls._info.setdefault(key, None)
|
||||
|
||||
@staticmethod
|
||||
def get_next_number():
|
||||
return next(Dconf_registry._counter_gpt)
|
||||
|
||||
@staticmethod
|
||||
def get_matching_keys(path):
|
||||
if path[0] != '/':
|
||||
path = '/' + path
|
||||
logdata = dict()
|
||||
envprofile = get_dconf_envprofile()
|
||||
try:
|
||||
process = subprocess.Popen(['dconf', 'list', path],
|
||||
env=envprofile, stdout=subprocess.PIPE, stderr=subprocess.PIPE, text=True)
|
||||
logdata['path'] = path
|
||||
log('D204', logdata)
|
||||
output, error = process.communicate()
|
||||
if not output and not error:
|
||||
return
|
||||
if not error:
|
||||
keys = output.strip().split('\n')
|
||||
for key in keys:
|
||||
Dconf_registry.get_matching_keys(f'{path}{key}')
|
||||
else:
|
||||
Dconf_registry.list_keys.append(path)
|
||||
return Dconf_registry.list_keys
|
||||
except Exception as exc:
|
||||
logdata['exc'] = exc
|
||||
log('E69', logdata)
|
||||
return None
|
||||
|
||||
@staticmethod
|
||||
def get_key_values(keys):
|
||||
key_values = {}
|
||||
for key in keys:
|
||||
key_values[key] = Dconf_registry.get_key_value(key)
|
||||
return key_values
|
||||
|
||||
@staticmethod
|
||||
def get_key_value(key):
|
||||
logdata = dict()
|
||||
envprofile = get_dconf_envprofile()
|
||||
try:
|
||||
process = subprocess.Popen(['dconf', 'read', key],
|
||||
env=envprofile, stdout=subprocess.PIPE, stderr=subprocess.PIPE, text=True)
|
||||
logdata['key'] = key
|
||||
output, error = process.communicate()
|
||||
|
||||
if not error:
|
||||
return string_to_literal_eval(string_to_literal_eval(output))
|
||||
else:
|
||||
return None
|
||||
except Exception as exc:
|
||||
logdata['exc'] = exc
|
||||
log('E70', logdata)
|
||||
return None
|
||||
|
||||
@staticmethod
|
||||
def dconf_update(uid=None):
|
||||
logdata = dict()
|
||||
path_dconf_config = get_dconf_config_path(uid)
|
||||
db_file = path_dconf_config[:-3]
|
||||
try:
|
||||
process = subprocess.Popen(['dconf', 'compile', db_file, path_dconf_config],
|
||||
stdout=subprocess.PIPE, stderr=subprocess.PIPE, text=True)
|
||||
output, error = process.communicate()
|
||||
|
||||
if error:
|
||||
logdata['error'] = error
|
||||
log('E71', logdata)
|
||||
else:
|
||||
logdata['outpupt'] = output
|
||||
log('D206', logdata)
|
||||
except Exception as exc:
|
||||
logdata['exc'] = exc
|
||||
log('E72', logdata)
|
||||
|
||||
@classmethod
|
||||
def check_profile_template(cls):
|
||||
if Path(cls.__template_file).exists():
|
||||
return True
|
||||
else:
|
||||
return None
|
||||
|
||||
@classmethod
|
||||
def apply_template(cls, uid):
|
||||
logdata = dict()
|
||||
if uid and cls.check_profile_template():
|
||||
with open(cls.__template_file, "r") as f:
|
||||
template = f.read()
|
||||
# Replace the "{uid}" placeholder with the actual UID value
|
||||
content = template.replace("{{uid}}", str(uid))
|
||||
|
||||
elif uid:
|
||||
content = f"user-db:user\n" \
|
||||
f"system-db:policy\n" \
|
||||
f"system-db:policy{uid}\n" \
|
||||
f"system-db:local\n" \
|
||||
f"system-db:default\n" \
|
||||
f"system-db:local\n" \
|
||||
f"system-db:policy{uid}\n" \
|
||||
f"system-db:policy\n"
|
||||
else:
|
||||
logdata['uid'] = uid
|
||||
log('W24', logdata)
|
||||
return
|
||||
|
||||
user_mandatory = f'/run/dconf/user/{uid}'
|
||||
touch_file(user_mandatory)
|
||||
|
||||
with open(user_mandatory, "w") as f:
|
||||
f.write(content)
|
||||
|
||||
|
||||
@classmethod
|
||||
def get_policies_from_dconf(cls):
|
||||
return cls.get_dictionary_from_dconf(cls._policies_path, cls._policies_win_path)
|
||||
|
||||
|
||||
@classmethod
|
||||
def get_dictionary_from_dconf(self, *startswith_list):
|
||||
output_dict = {}
|
||||
for startswith in startswith_list:
|
||||
dconf_dict = self.get_key_values(self.get_matching_keys(startswith))
|
||||
for key, value in dconf_dict.items():
|
||||
keys_tmp = key.split('/')
|
||||
update_dict(output_dict.setdefault('/'.join(keys_tmp[:-1])[1:], {}), {keys_tmp[-1]: str(value)})
|
||||
|
||||
log('D207')
|
||||
return output_dict
|
||||
|
||||
|
||||
@classmethod
|
||||
def get_dictionary_from_dconf_file_db(self, uid=None):
|
||||
logdata = dict()
|
||||
if not uid:
|
||||
path_bin = self._path_bin_system
|
||||
else:
|
||||
path_bin = self._path_bin_system + str(uid)
|
||||
output_dict = {}
|
||||
try:
|
||||
if (GLib.file_get_contents(path_bin)[0]):
|
||||
bytes1 = GLib.Bytes.new(GLib.file_get_contents(path_bin)[1])
|
||||
table = Gvdb.Table.new_from_bytes(bytes1, True)
|
||||
|
||||
name_list = Gvdb.Table.get_names(table)
|
||||
for name in name_list:
|
||||
value = Gvdb.Table.get_value(table, name)
|
||||
if not value:
|
||||
continue
|
||||
list_path = name.split('/')
|
||||
if value.is_of_type(GLib.VariantType('s')):
|
||||
part = output_dict.setdefault('/'.join(list_path[1:-1]), {})
|
||||
part[list_path[-1]] = value.get_string()
|
||||
elif value.is_of_type(GLib.VariantType('i')):
|
||||
part = output_dict.setdefault('/'.join(list_path[1:-1]), {})
|
||||
part[list_path[-1]] = value.get_int32()
|
||||
except Exception as exc:
|
||||
logdata['exc'] = exc
|
||||
logdata['path_bin'] = path_bin
|
||||
log('E73', logdata)
|
||||
|
||||
return output_dict
|
||||
|
||||
|
||||
@classmethod
|
||||
def filter_entries(cls, startswith, registry_dict = None):
|
||||
if not registry_dict:
|
||||
registry_dict = cls.global_registry_dict
|
||||
if startswith[-1] == '%':
|
||||
startswith = startswith[:-1]
|
||||
if startswith[-1] == '/' or startswith[-1] == '\\':
|
||||
startswith = startswith[:-1]
|
||||
return filter_dict_keys(startswith, flatten_dictionary(registry_dict))
|
||||
return filter_dict_keys(startswith, flatten_dictionary(registry_dict))
|
||||
|
||||
|
||||
@classmethod
|
||||
def filter_hklm_entries(cls, startswith):
|
||||
pregs = cls.filter_entries(startswith)
|
||||
list_entiers = list()
|
||||
for keyname, value in pregs.items():
|
||||
if isinstance(value, dict):
|
||||
for valuename, data in value.items():
|
||||
list_entiers.append(PregDconf(
|
||||
keyname, convert_string_dconf(valuename), find_preg_type(data), data))
|
||||
elif isinstance(value, list):
|
||||
for data in value:
|
||||
list_entiers.append(PregDconf(
|
||||
keyname, data, find_preg_type(data), data))
|
||||
else:
|
||||
list_entiers.append(PregDconf(
|
||||
'/'.join(keyname.split('/')[:-1]), convert_string_dconf(keyname.split('/')[-1]), find_preg_type(value), value))
|
||||
|
||||
|
||||
return gplist(list_entiers)
|
||||
|
||||
|
||||
@classmethod
|
||||
def filter_hkcu_entries(cls, sid, startswith):
|
||||
return cls.filter_hklm_entries(startswith)
|
||||
|
||||
|
||||
@classmethod
|
||||
def get_storage(cls,dictionary = None):
|
||||
if dictionary:
|
||||
result = dictionary
|
||||
elif Dconf_registry._gpt_read_flag:
|
||||
result = Dconf_registry.global_registry_dict
|
||||
else:
|
||||
if Dconf_registry.__dconf_dict_flag:
|
||||
result = Dconf_registry.__dconf_dict
|
||||
else:
|
||||
Dconf_registry.__dconf_dict = Dconf_registry.get_policies_from_dconf()
|
||||
result = Dconf_registry.__dconf_dict
|
||||
Dconf_registry.__dconf_dict_flag = True
|
||||
return result
|
||||
|
||||
|
||||
@classmethod
|
||||
def filling_storage_from_dconf(cls):
|
||||
Dconf_registry.global_registry_dict = Dconf_registry.get_storage()
|
||||
|
||||
|
||||
@classmethod
|
||||
def get_entry(cls, path, dictionary = None):
|
||||
logdata = dict()
|
||||
result = Dconf_registry.get_storage(dictionary)
|
||||
|
||||
keys = path.split("\\") if "\\" in path else path.split("/")
|
||||
key = '/'.join(keys[:-1]) if keys[0] else '/'.join(keys[:-1])[1:]
|
||||
|
||||
if isinstance(result, dict) and key in result.keys():
|
||||
data = result.get(key).get(keys[-1])
|
||||
return PregDconf(
|
||||
key, convert_string_dconf(keys[-1]), find_preg_type(data), data)
|
||||
else:
|
||||
logdata['path'] = path
|
||||
log('D208', logdata)
|
||||
return None
|
||||
|
||||
|
||||
@classmethod
|
||||
def get_hkcu_entry(cls, sid, hive_key, dictionary = None):
|
||||
return cls.get_hklm_entry(hive_key, dictionary)
|
||||
|
||||
|
||||
@classmethod
|
||||
def get_hklm_entry(cls, hive_key, dictionary = None):
|
||||
return cls.get_entry(hive_key, dictionary)
|
||||
|
||||
|
||||
|
||||
@classmethod
|
||||
def add_shortcut(cls, sid, sc_obj, policy_name):
|
||||
sc_obj.policy_name = policy_name
|
||||
cls.shortcuts.append(sc_obj)
|
||||
|
||||
|
||||
@classmethod
|
||||
def add_printer(cls, sid, pobj, policy_name):
|
||||
pobj.policy_name = policy_name
|
||||
cls.printers.append(pobj)
|
||||
|
||||
|
||||
@classmethod
|
||||
def add_drive(cls, sid, dobj, policy_name):
|
||||
dobj.policy_name = policy_name
|
||||
cls.drives.append(dobj)
|
||||
|
||||
|
||||
@classmethod
|
||||
def add_folder(cls, sid, fobj, policy_name):
|
||||
fobj.policy_name = policy_name
|
||||
cls.folders.append(fobj)
|
||||
|
||||
|
||||
@classmethod
|
||||
def add_envvar(self, sid, evobj, policy_name):
|
||||
evobj.policy_name = policy_name
|
||||
self.environmentvariables.append(evobj)
|
||||
|
||||
|
||||
@classmethod
|
||||
def add_script(cls, sid, scrobj, policy_name):
|
||||
scrobj.policy_name = policy_name
|
||||
cls.scripts.append(scrobj)
|
||||
|
||||
|
||||
@classmethod
|
||||
def add_file(cls, sid, fileobj, policy_name):
|
||||
fileobj.policy_name = policy_name
|
||||
cls.files.append(fileobj)
|
||||
|
||||
|
||||
@classmethod
|
||||
def add_ini(cls, sid, iniobj, policy_name):
|
||||
iniobj.policy_name = policy_name
|
||||
cls.inifiles.append(iniobj)
|
||||
|
||||
|
||||
@classmethod
|
||||
def add_networkshare(cls, sid, networkshareobj, policy_name):
|
||||
networkshareobj.policy_name = policy_name
|
||||
cls.networkshares.append(networkshareobj)
|
||||
|
||||
|
||||
@classmethod
|
||||
def get_shortcuts(cls, sid):
|
||||
return cls.shortcuts
|
||||
|
||||
|
||||
@classmethod
|
||||
def get_printers(cls, sid):
|
||||
return cls.printers
|
||||
|
||||
|
||||
@classmethod
|
||||
def get_drives(cls, sid):
|
||||
return cls.drives
|
||||
|
||||
@classmethod
|
||||
def get_folders(cls, sid):
|
||||
return cls.folders
|
||||
|
||||
|
||||
@classmethod
|
||||
def get_envvars(cls, sid):
|
||||
return cls.environmentvariables
|
||||
|
||||
|
||||
@classmethod
|
||||
def get_scripts(cls, sid, action):
|
||||
action_scripts = list()
|
||||
for part in cls.scripts:
|
||||
if action == 'LOGON' and part.action == 'LOGON':
|
||||
action_scripts.append(part)
|
||||
elif action == 'LOGOFF' and part.action == 'LOGOFF':
|
||||
action_scripts.append(part)
|
||||
elif action == 'STARTUP' and part.action == 'STARTUP':
|
||||
action_scripts.append(part)
|
||||
elif action == 'SHUTDOWN' and part.action == 'SHUTDOWN':
|
||||
action_scripts.append(part)
|
||||
return action_scripts
|
||||
|
||||
|
||||
@classmethod
|
||||
def get_files(cls, sid):
|
||||
return cls.files
|
||||
|
||||
|
||||
@classmethod
|
||||
def get_networkshare(cls, sid):
|
||||
return cls.networkshares
|
||||
|
||||
|
||||
@classmethod
|
||||
def get_ini(cls, sid):
|
||||
return cls.inifiles
|
||||
|
||||
|
||||
@classmethod
|
||||
def wipe_user(cls, sid):
|
||||
cls.wipe_hklm()
|
||||
|
||||
|
||||
@classmethod
|
||||
def wipe_hklm(cls):
|
||||
cls.global_registry_dict = dict({cls._GpoPriority:{}})
|
||||
|
||||
|
||||
def filter_dict_keys(starting_string, input_dict):
|
||||
result = dict()
|
||||
for key in input_dict:
|
||||
key_list = remove_empty_values(re.split(r'\\|/', key))
|
||||
start_list = remove_empty_values(re.split(r'\\|/', starting_string))
|
||||
if key_list[:len(start_list)] == start_list:
|
||||
result[key] = input_dict.get(key)
|
||||
|
||||
return result
|
||||
|
||||
|
||||
def find_preg_type(argument):
|
||||
if isinstance(argument, int):
|
||||
return 4
|
||||
else:
|
||||
return 1
|
||||
|
||||
|
||||
def update_dict(dict1, dict2, save_key=None):
|
||||
'''
|
||||
Updates dict1 with the key-value pairs from dict2
|
||||
'''
|
||||
for key, value in dict2.items():
|
||||
if key in dict1:
|
||||
# If both values are dictionaries, recursively call the update_dict function
|
||||
if isinstance(dict1[key], dict) and isinstance(value, dict):
|
||||
save_key = key
|
||||
update_dict(dict1[key], value, save_key)
|
||||
# If the value in dict1 is a list, extend it with unique values from value
|
||||
elif isinstance(dict1[key], list):
|
||||
dict1[key].extend(set(value) - set(dict1[key]))
|
||||
else:
|
||||
# If the value in dict1 is not a dictionary or the value in dict2 is not a dictionary,
|
||||
# replace the value in dict1 with the value from dict2
|
||||
if save_key and save_key.startswith('Source'):
|
||||
value.reloaded_with_policy_key = [dict1[key].policy_name]
|
||||
if dict1[key].reloaded_with_policy_key:
|
||||
value.reloaded_with_policy_key += dict1[key].reloaded_with_policy_key
|
||||
dict1[key] = value
|
||||
else:
|
||||
dict1[key] = value
|
||||
else:
|
||||
# If the key does not exist in dict1, add the key-value pair from dict2 to dict1
|
||||
dict1[key] = value
|
||||
|
||||
|
||||
def add_to_dict(string, policy_name, username, gpo_info):
|
||||
if gpo_info:
|
||||
counter = gpo_info.counter
|
||||
display_name = gpo_info.display_name
|
||||
name = gpo_info.name
|
||||
version = gpo_info.version
|
||||
else:
|
||||
counter = 0
|
||||
display_name = policy_name
|
||||
name = None
|
||||
version = None
|
||||
|
||||
if username is None:
|
||||
correct_path = '/'.join(string.split('/')[:-2])
|
||||
machine= '{}/Machine/{}'.format(Dconf_registry._GpoPriority, counter)
|
||||
dictionary = Dconf_registry.global_registry_dict.setdefault(machine, dict())
|
||||
else:
|
||||
correct_path = '/'.join(string.split('/')[:-2])
|
||||
user = '{}/User/{}'.format(Dconf_registry._GpoPriority, counter)
|
||||
dictionary = Dconf_registry.global_registry_dict.setdefault(user, dict())
|
||||
|
||||
dictionary['display_name'] = display_name
|
||||
dictionary['name'] = name
|
||||
dictionary['version'] = version
|
||||
dictionary['correct_path'] = correct_path
|
||||
|
||||
|
||||
|
||||
def load_preg_dconf(pregfile, pathfile, policy_name, username, gpo_info):
|
||||
'''
|
||||
Loads the configuration from preg registry into a dictionary
|
||||
'''
|
||||
# Prefix for storing key data
|
||||
source_pre = "Source"
|
||||
dd = dict()
|
||||
for i in pregfile.entries:
|
||||
# Skip this entry if the valuename starts with '**del'
|
||||
if i.valuename.lower().startswith('**del'):
|
||||
continue
|
||||
valuename = convert_string_dconf(i.valuename)
|
||||
data = check_data(i.data, i.type)
|
||||
if i.valuename != i.data and i.valuename:
|
||||
if i.keyname.replace('\\', '/') in dd:
|
||||
# If the key exists in dd, update its value with the new key-value pair
|
||||
dd[i.keyname.replace('\\', '/')].update({valuename.replace('\\', '/'):data})
|
||||
dd[f"{source_pre}/{i.keyname}".replace('\\', '/')].update({valuename.replace('\\', '/'):RegistryKeyMetadata(policy_name, i.type)})
|
||||
else:
|
||||
# If the key does not exist in dd, create a new key-value pair
|
||||
dd[i.keyname.replace('\\', '/')] = {valuename.replace('\\', '/'):data}
|
||||
dd[f"{source_pre}/{i.keyname}".replace('\\', '/')] = {valuename.replace('\\', '/'):RegistryKeyMetadata(policy_name, i.type)}
|
||||
|
||||
elif not i.valuename:
|
||||
keyname_tmp = i.keyname.replace('\\', '/').split('/')
|
||||
keyname = '/'.join(keyname_tmp[:-1])
|
||||
if keyname in dd:
|
||||
# If the key exists in dd, update its value with the new key-value pair
|
||||
dd[keyname].update({keyname_tmp[-1]:data})
|
||||
dd[f"{source_pre}{keyname}"].update({keyname_tmp[-1]:RegistryKeyMetadata(policy_name, i.type)})
|
||||
else:
|
||||
# If the key does not exist in dd, create a new key-value pair
|
||||
dd[keyname] = {keyname_tmp[-1]:data}
|
||||
dd[f"{source_pre}{keyname}"] = {keyname_tmp[-1]:RegistryKeyMetadata(policy_name, i.type)}
|
||||
|
||||
else:
|
||||
# If the value name is the same as the data,
|
||||
# split the keyname and add the data to the appropriate location in dd.
|
||||
all_list_key = i.keyname.split('\\')
|
||||
dd_target = dd.setdefault('/'.join(all_list_key[:-1]),{})
|
||||
key_d ='/'.join(all_list_key[:-1])
|
||||
dd_target_source = dd.setdefault(f"Source/{key_d}",{})
|
||||
dd_target.setdefault(all_list_key[-1], []).append(data)
|
||||
dd_target_source.setdefault(all_list_key[-1], RegistryKeyMetadata(policy_name, i.type, True))
|
||||
|
||||
# Update the global registry dictionary with the contents of dd
|
||||
add_to_dict(pathfile, policy_name, username, gpo_info)
|
||||
update_dict(Dconf_registry.global_registry_dict, dd)
|
||||
|
||||
|
||||
def create_dconf_ini_file(filename, data, uid):
|
||||
'''
|
||||
Create an ini-file based on a dictionary of dictionaries.
|
||||
Args:
|
||||
data (dict): The dictionary of dictionaries containing the data for the ini-file.
|
||||
filename (str): The filename to save the ini-file.
|
||||
Returns:
|
||||
None
|
||||
Raises:
|
||||
None
|
||||
'''
|
||||
with open(filename, 'w') as file:
|
||||
for section, section_data in data.items():
|
||||
file.write(f'[{section}]\n')
|
||||
for key, value in section_data.items():
|
||||
if isinstance(value, int):
|
||||
file.write(f'{key} = {value}\n')
|
||||
else:
|
||||
file.write(f'{key} = "{value}"\n')
|
||||
file.write('\n')
|
||||
logdata = dict()
|
||||
logdata['path'] = filename
|
||||
log('D209', logdata)
|
||||
Dconf_registry.dconf_update(uid)
|
||||
|
||||
def clean_data(data):
|
||||
try:
|
||||
cleaned_string = data.replace('\n', '').replace('\r', '')
|
||||
cleaned_string = cleaned_string.replace('"', "'")
|
||||
return cleaned_string
|
||||
except:
|
||||
return None
|
||||
|
||||
def check_data(data, t_data):
|
||||
if isinstance(data, bytes):
|
||||
if t_data == 7:
|
||||
return clean_data(data.decode('utf-16').replace('\x00',''))
|
||||
else:
|
||||
return None
|
||||
elif t_data == 4:
|
||||
return data
|
||||
return clean_data(data)
|
||||
|
||||
def convert_string_dconf(input_string):
|
||||
macros = {
|
||||
'#': '%sharp%',
|
||||
';': '%semicolon%',
|
||||
'//': '%doubleslash%',
|
||||
'/': '%oneslash%'
|
||||
}
|
||||
output_string = input_string
|
||||
for key, value in macros.items():
|
||||
if key in input_string:
|
||||
output_string = input_string.replace(key, value)
|
||||
elif value in input_string:
|
||||
output_string = input_string.replace(value, key)
|
||||
|
||||
return output_string
|
||||
|
||||
def remove_empty_values(input_list):
|
||||
return list(filter(None, input_list))
|
||||
|
||||
def flatten_dictionary(input_dict, result=None, current_key=''):
|
||||
if result is None:
|
||||
result = {}
|
||||
|
||||
for key, value in input_dict.items():
|
||||
new_key = f"{current_key}/{key}" if current_key else key
|
||||
|
||||
if isinstance(value, dict):
|
||||
flatten_dictionary(value, result, new_key)
|
||||
else:
|
||||
result[new_key] = value
|
||||
|
||||
return result
|
||||
|
||||
def get_dconf_envprofile():
|
||||
dconf_envprofile = {'default': {'DCONF_PROFILE': 'default'},
|
||||
'local': {'DCONF_PROFILE': 'local'},
|
||||
'system': {'DCONF_PROFILE': 'system'}
|
||||
}
|
||||
|
||||
if Dconf_registry._envprofile:
|
||||
return dconf_envprofile.get(Dconf_registry._envprofile, dconf_envprofile['system'])
|
||||
|
||||
if not Dconf_registry._username:
|
||||
return dconf_envprofile['system']
|
||||
|
||||
profile = '/run/dconf/user/{}'.format(get_uid_by_username(Dconf_registry._username))
|
||||
return {'DCONF_PROFILE': profile}
|
||||
|
||||
|
||||
def convert_elements_to_list_dicts(elements):
|
||||
return list(map(lambda x: dict(x), elements))
|
||||
|
||||
def remove_duplicate_dicts_in_list(list_dict):
|
||||
return convert_elements_to_list_dicts(list(OrderedDict((tuple(sorted(d.items())), d) for d in list_dict).values()))
|
||||
|
||||
def add_preferences_to_global_registry_dict(username, is_machine):
|
||||
if is_machine:
|
||||
prefix = 'Software/BaseALT/Policies/Preferences/Machine'
|
||||
else:
|
||||
prefix = f'Software/BaseALT/Policies/Preferences/{username}'
|
||||
|
||||
preferences_global = [('Shortcuts',remove_duplicate_dicts_in_list(Dconf_registry.shortcuts)),
|
||||
('Folders',remove_duplicate_dicts_in_list(Dconf_registry.folders)),
|
||||
('Files',remove_duplicate_dicts_in_list(Dconf_registry.files)),
|
||||
('Drives',remove_duplicate_dicts_in_list(Dconf_registry.drives)),
|
||||
('Scheduledtasks',remove_duplicate_dicts_in_list(Dconf_registry.scheduledtasks)),
|
||||
('Environmentvariables',remove_duplicate_dicts_in_list(Dconf_registry.environmentvariables)),
|
||||
('Inifiles',remove_duplicate_dicts_in_list(Dconf_registry.inifiles)),
|
||||
('Services',remove_duplicate_dicts_in_list(Dconf_registry.services)),
|
||||
('Printers',remove_duplicate_dicts_in_list(Dconf_registry.printers)),
|
||||
('Scripts',remove_duplicate_dicts_in_list(Dconf_registry.scripts)),
|
||||
('Networkshares',remove_duplicate_dicts_in_list(Dconf_registry.networkshares))]
|
||||
|
||||
preferences_global_dict = dict()
|
||||
preferences_global_dict[prefix] = dict()
|
||||
|
||||
for key, val in preferences_global:
|
||||
preferences_global_dict[prefix].update({key:clean_data(str(val))})
|
||||
|
||||
update_dict(Dconf_registry.global_registry_dict, preferences_global_dict)
|
||||
|
||||
def extract_display_name_version(data):
|
||||
policy_force = data.get('Software/BaseALT/Policies/GPUpdate', {}).get('Force', False)
|
||||
if Dconf_registry._force or policy_force:
|
||||
return {}
|
||||
result = {}
|
||||
tmp = {}
|
||||
if isinstance(data, dict):
|
||||
for key in data.keys():
|
||||
if key.startswith(Dconf_registry._GpoPriority+'/'):
|
||||
tmp[key] = data[key]
|
||||
for value in tmp.values():
|
||||
if isinstance(value, dict) and value.get('version', 'None')!='None' and value.get('display_name'):
|
||||
result[value['display_name']] = {'version': value['version'], 'correct_path': value['correct_path']}
|
||||
Dconf_registry._dict_gpo_name_version_cache = result
|
||||
return result
|
@@ -19,35 +19,47 @@
|
||||
|
||||
import os
|
||||
import os.path
|
||||
import tempfile
|
||||
from pathlib import Path
|
||||
import smbc
|
||||
|
||||
|
||||
from util.logging import log
|
||||
from util.paths import file_cache_dir, UNCPath
|
||||
from util.paths import file_cache_dir, file_cache_path_home, UNCPath
|
||||
from util.exceptions import NotUNCPathError
|
||||
|
||||
|
||||
class fs_file_cache:
|
||||
__read_blocksize = 4096
|
||||
|
||||
def __init__(self, cache_name):
|
||||
def __init__(self, cache_name, username = None):
|
||||
self.cache_name = cache_name
|
||||
self.storage_uri = file_cache_dir()
|
||||
if username:
|
||||
try:
|
||||
self.storage_uri = file_cache_path_home(username)
|
||||
except:
|
||||
self.storage_uri = file_cache_dir()
|
||||
else:
|
||||
self.storage_uri = file_cache_dir()
|
||||
logdata = dict({'cache_file': self.storage_uri})
|
||||
log('D20', logdata)
|
||||
self.samba_context = smbc.Context(use_kerberos=1)
|
||||
#, debug=10)
|
||||
|
||||
def store(self, uri):
|
||||
destdir = uri
|
||||
def store(self, uri, destfile = None):
|
||||
try:
|
||||
uri_path = UNCPath(uri)
|
||||
file_name = os.path.basename(uri_path.get_path())
|
||||
file_path = os.path.dirname(uri_path.get_path())
|
||||
destdir = Path('{}/{}/{}'.format(self.storage_uri,
|
||||
uri_path.get_domain(),
|
||||
file_path))
|
||||
if not destfile:
|
||||
file_name = os.path.basename(uri_path.get_path())
|
||||
file_path = os.path.dirname(uri_path.get_path())
|
||||
destdir = Path('{}/{}/{}'.format(self.storage_uri,
|
||||
uri_path.get_domain(),
|
||||
file_path))
|
||||
else:
|
||||
destdir = destfile.parent
|
||||
except NotUNCPathError:
|
||||
return None
|
||||
|
||||
except Exception as exc:
|
||||
logdata = dict({'exception': str(exc)})
|
||||
log('D144', logdata)
|
||||
@@ -56,20 +68,27 @@ class fs_file_cache:
|
||||
if not destdir.exists():
|
||||
destdir.mkdir(parents=True, exist_ok=True)
|
||||
|
||||
destfile = Path('{}/{}/{}'.format(self.storage_uri,
|
||||
uri_path.get_domain(),
|
||||
uri_path.get_path()))
|
||||
if not destfile:
|
||||
destfile = Path('{}/{}/{}'.format(self.storage_uri,
|
||||
uri_path.get_domain(),
|
||||
uri_path.get_path()))
|
||||
|
||||
with open(destfile, 'wb') as df:
|
||||
df.truncate()
|
||||
df.flush()
|
||||
try:
|
||||
fd, tmpfile = tempfile.mkstemp('', str(destfile))
|
||||
df = os.fdopen(fd, 'wb')
|
||||
file_handler = self.samba_context.open(str(uri_path), os.O_RDONLY)
|
||||
while True:
|
||||
data = file_handler.read(self.__read_blocksize)
|
||||
if not data:
|
||||
break
|
||||
df.write(data)
|
||||
df.flush()
|
||||
df.close()
|
||||
os.rename(tmpfile, destfile)
|
||||
os.chmod(destfile, 0o644)
|
||||
except:
|
||||
tmppath = Path(tmpfile)
|
||||
if tmppath.exists():
|
||||
tmppath.unlink()
|
||||
|
||||
def get(self, uri):
|
||||
destfile = uri
|
||||
|
@@ -115,6 +115,13 @@ class drive_entry(object):
|
||||
self.password = dobj.password
|
||||
self.dir = dobj.dir
|
||||
self.path = dobj.path
|
||||
self.action = dobj.action
|
||||
self.thisDrive = dobj.thisDrive
|
||||
self.allDrives = dobj.allDrives
|
||||
self.label = dobj.label
|
||||
self.persistent = dobj.persistent
|
||||
self.useLetter = dobj.useLetter
|
||||
|
||||
|
||||
def update_fields(self):
|
||||
fields = dict()
|
||||
@@ -123,6 +130,12 @@ class drive_entry(object):
|
||||
fields['password'] = self.password
|
||||
fields['dir'] = self.dir
|
||||
fields['path'] = self.path
|
||||
fields['action'] = self.action
|
||||
fields['thisDrive'] = self.thisDrive
|
||||
fields['allDrives'] = self.allDrives
|
||||
fields['label'] = self.label
|
||||
fields['persistent'] = self.persistent
|
||||
fields['useLetter'] = self.useLetter
|
||||
|
||||
return fields
|
||||
|
||||
@@ -138,6 +151,7 @@ class folder_entry(object):
|
||||
self.delete_folder = str(fobj.delete_folder)
|
||||
self.delete_sub_folders = str(fobj.delete_sub_folders)
|
||||
self.delete_files = str(fobj.delete_files)
|
||||
self.hidden_folder = str(fobj.hidden_folder)
|
||||
|
||||
def update_fields(self):
|
||||
'''
|
||||
@@ -149,6 +163,8 @@ class folder_entry(object):
|
||||
fields['delete_folder'] = self.delete_folder
|
||||
fields['delete_sub_folders'] = self.delete_sub_folders
|
||||
fields['delete_files'] = self.delete_files
|
||||
fields['hidden_folder'] = self.hidden_folder
|
||||
|
||||
|
||||
return fields
|
||||
|
||||
@@ -203,17 +219,17 @@ class file_entry(object):
|
||||
'''
|
||||
Object mapping representing FILES.XML
|
||||
'''
|
||||
def __init__(self, sid, scrobj, policy_name):
|
||||
def __init__(self, sid, fileobj, policy_name):
|
||||
self.sid = sid
|
||||
self.policy_name = policy_name
|
||||
self.action = scrobj.action
|
||||
self.fromPath = scrobj.fromPath
|
||||
self.targetPath = scrobj.targetPath
|
||||
self.readOnly = scrobj.readOnly
|
||||
self.archive = scrobj.archive
|
||||
self.hidden = scrobj.hidden
|
||||
self.suppress = scrobj.suppress
|
||||
|
||||
self.action = fileobj.action
|
||||
self.fromPath = fileobj.fromPath
|
||||
self.targetPath = fileobj.targetPath
|
||||
self.readOnly = fileobj.readOnly
|
||||
self.archive = fileobj.archive
|
||||
self.hidden = fileobj.hidden
|
||||
self.suppress = fileobj.suppress
|
||||
self.executable = fileobj.executable
|
||||
|
||||
def update_fields(self):
|
||||
'''
|
||||
@@ -228,6 +244,7 @@ class file_entry(object):
|
||||
fields['archive'] = self.archive
|
||||
fields['hidden'] = self.hidden
|
||||
fields['suppress'] = self.suppress
|
||||
fields['executable'] = self.executable
|
||||
|
||||
return fields
|
||||
|
||||
|
@@ -26,13 +26,11 @@ from sqlalchemy import (
|
||||
Column,
|
||||
Integer,
|
||||
String,
|
||||
MetaData
|
||||
)
|
||||
from sqlalchemy.orm import (
|
||||
mapper,
|
||||
sessionmaker
|
||||
)
|
||||
|
||||
from sqlalchemy.orm import sessionmaker
|
||||
from .sqlite_registry_compat import sqlite_registry_compat
|
||||
|
||||
from util.logging import log
|
||||
from util.paths import cache_dir
|
||||
|
||||
@@ -55,7 +53,8 @@ class sqlite_cache(cache):
|
||||
logdata = dict({'cache_file': self.storage_uri})
|
||||
log('D20', logdata)
|
||||
self.db_cnt = create_engine(self.storage_uri, echo=False)
|
||||
self.__metadata = MetaData(self.db_cnt)
|
||||
self.__compat = sqlite_registry_compat(self.db_cnt)
|
||||
self.__metadata = self.__compat.metadata()
|
||||
self.cache_table = Table(
|
||||
self.cache_name,
|
||||
self.__metadata,
|
||||
@@ -67,7 +66,8 @@ class sqlite_cache(cache):
|
||||
self.__metadata.create_all(self.db_cnt)
|
||||
Session = sessionmaker(bind=self.db_cnt)
|
||||
self.db_session = Session()
|
||||
mapper(self.mapper_obj, self.cache_table)
|
||||
mapper_reg = self.__compat
|
||||
mapper_reg.map_imperatively(self.mapper_obj, self.cache_table)
|
||||
|
||||
def store(self, str_id, value):
|
||||
obj = self.mapper_obj(str_id, value)
|
||||
|
@@ -24,13 +24,11 @@ from sqlalchemy import (
|
||||
Column,
|
||||
Integer,
|
||||
String,
|
||||
MetaData,
|
||||
UniqueConstraint
|
||||
)
|
||||
from sqlalchemy.orm import (
|
||||
mapper,
|
||||
sessionmaker
|
||||
)
|
||||
|
||||
from sqlalchemy.orm import sessionmaker
|
||||
from .sqlite_registry_compat import sqlite_registry_compat
|
||||
|
||||
from util.logging import log
|
||||
from util.paths import cache_dir
|
||||
@@ -58,7 +56,8 @@ class sqlite_registry(registry):
|
||||
cdir = cache_dir()
|
||||
self.db_path = os.path.join('sqlite:///{}/{}.sqlite'.format(cdir, self.db_name))
|
||||
self.db_cnt = create_engine(self.db_path, echo=False)
|
||||
self.__metadata = MetaData(self.db_cnt)
|
||||
self.__compat = sqlite_registry_compat(self.db_cnt)
|
||||
self.__metadata = self.__compat.metadata()
|
||||
self.__info = Table(
|
||||
'info',
|
||||
self.__metadata,
|
||||
@@ -121,6 +120,12 @@ class sqlite_registry(registry):
|
||||
, Column('dir', String)
|
||||
, Column('policy_name', String)
|
||||
, Column('path', String)
|
||||
, Column('action', String)
|
||||
, Column('thisDrive', String)
|
||||
, Column('allDrives', String)
|
||||
, Column('label', String)
|
||||
, Column('persistent', String)
|
||||
, Column('useLetter', String)
|
||||
, UniqueConstraint('sid', 'dir')
|
||||
)
|
||||
self.__folders = Table(
|
||||
@@ -134,6 +139,7 @@ class sqlite_registry(registry):
|
||||
, Column('delete_folder', String)
|
||||
, Column('delete_sub_folders', String)
|
||||
, Column('delete_files', String)
|
||||
, Column('hidden_folder', String)
|
||||
, UniqueConstraint('sid', 'path')
|
||||
)
|
||||
self.__envvars = Table(
|
||||
@@ -172,6 +178,7 @@ class sqlite_registry(registry):
|
||||
, Column('archive', String)
|
||||
, Column('hidden', String)
|
||||
, Column('suppress', String)
|
||||
, Column('executable', String)
|
||||
, UniqueConstraint('sid', 'policy_name', 'targetPath', 'fromPath')
|
||||
)
|
||||
self.__ini = Table(
|
||||
@@ -206,19 +213,20 @@ class sqlite_registry(registry):
|
||||
self.__metadata.create_all(self.db_cnt)
|
||||
Session = sessionmaker(bind=self.db_cnt)
|
||||
self.db_session = Session()
|
||||
mapper_reg = self.__compat
|
||||
try:
|
||||
mapper(info_entry, self.__info)
|
||||
mapper(samba_preg, self.__hklm)
|
||||
mapper(samba_hkcu_preg, self.__hkcu)
|
||||
mapper(ad_shortcut, self.__shortcuts)
|
||||
mapper(printer_entry, self.__printers)
|
||||
mapper(drive_entry, self.__drives)
|
||||
mapper(folder_entry, self.__folders)
|
||||
mapper(envvar_entry, self.__envvars)
|
||||
mapper(script_entry, self.__scripts)
|
||||
mapper(file_entry, self.__files)
|
||||
mapper(ini_entry, self.__ini)
|
||||
mapper(networkshare_entry, self.__networkshare)
|
||||
mapper_reg.map_imperatively(info_entry, self.__info)
|
||||
mapper_reg.map_imperatively(samba_preg, self.__hklm)
|
||||
mapper_reg.map_imperatively(samba_hkcu_preg, self.__hkcu)
|
||||
mapper_reg.map_imperatively(ad_shortcut, self.__shortcuts)
|
||||
mapper_reg.map_imperatively(printer_entry, self.__printers)
|
||||
mapper_reg.map_imperatively(drive_entry, self.__drives)
|
||||
mapper_reg.map_imperatively(folder_entry, self.__folders)
|
||||
mapper_reg.map_imperatively(envvar_entry, self.__envvars)
|
||||
mapper_reg.map_imperatively(script_entry, self.__scripts)
|
||||
mapper_reg.map_imperatively(file_entry, self.__files)
|
||||
mapper_reg.map_imperatively(ini_entry, self.__ini)
|
||||
mapper_reg.map_imperatively(networkshare_entry, self.__networkshare)
|
||||
except:
|
||||
pass
|
||||
#logging.error('Error creating mapper')
|
||||
@@ -481,7 +489,7 @@ class sqlite_registry(registry):
|
||||
logdata['name'] = networkshareentry.name
|
||||
logdata['path'] = networkshareentry.path
|
||||
logdata['action'] = networkshareentry.action
|
||||
log('D179', logdata)
|
||||
log('D186', logdata)
|
||||
try:
|
||||
self._add(networkshareentry)
|
||||
except Exception as exc:
|
||||
|
45
gpoa/storage/sqlite_registry_compat.py
Normal file
45
gpoa/storage/sqlite_registry_compat.py
Normal file
@@ -0,0 +1,45 @@
|
||||
#
|
||||
# GPOA - GPO Applier for Linux
|
||||
#
|
||||
# Copyright (C) 2024 BaseALT Ltd.
|
||||
# Copyright (C) 2024 Evgeny SInelnikov <sin@altlinux.org>.
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License as published by
|
||||
# the Free Software Foundation, either version 3 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
__compat__ = False
|
||||
|
||||
from sqlalchemy import MetaData
|
||||
|
||||
try:
|
||||
from sqlalchemy.orm import registry
|
||||
except:
|
||||
from sqlalchemy.orm import mapper
|
||||
__compat__ = True
|
||||
|
||||
class sqlite_registry_compat:
|
||||
def __init__(self, db_cnt):
|
||||
if not __compat__:
|
||||
self.__registry = registry()
|
||||
self.__metadata = MetaData()
|
||||
else:
|
||||
self.__metadata = MetaData(db_cnt)
|
||||
|
||||
def metadata(self):
|
||||
return self.__metadata
|
||||
|
||||
def map_imperatively(self, obj, table):
|
||||
if __compat__:
|
||||
mapper(obj, table)
|
||||
else:
|
||||
self.__registry.map_imperatively(obj, table)
|
63
gpoa/templates/47-alt_group_policy_permissions.rules.j2
Normal file
63
gpoa/templates/47-alt_group_policy_permissions.rules.j2
Normal file
@@ -0,0 +1,63 @@
|
||||
{#
|
||||
# GPOA - GPO Applier for Linux
|
||||
#
|
||||
# Copyright (C) 2019-2022 BaseALT Ltd.
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License as published by
|
||||
# the Free Software Foundation, either version 3 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
#}
|
||||
|
||||
{% if No|length %}
|
||||
polkit.addRule(function (action, subject) {
|
||||
if ({% for res in No -%}
|
||||
action.id == "{{res}}"{% if No|length == loop.index %}){ {% else %} ||{% endif %}
|
||||
{% endfor %} return polkit.Result.NO;
|
||||
}
|
||||
});
|
||||
{% endif %}{% if Yes|length %}
|
||||
polkit.addRule(function (action, subject) {
|
||||
if ({% for res in Yes -%}
|
||||
action.id == "{{res}}"{% if Yes|length == loop.index %}){ {% else %} ||{% endif %}
|
||||
{% endfor %} return polkit.Result.YES;
|
||||
}
|
||||
});
|
||||
{% endif %}{% if Auth_self|length %}
|
||||
polkit.addRule(function (action, subject) {
|
||||
if ({% for res in Auth_self -%}
|
||||
action.id == "{{res}}"{% if Auth_self|length == loop.index %}){ {% else %} ||{% endif %}
|
||||
{% endfor %} return polkit.Result.AUTH_SELF;
|
||||
}
|
||||
});
|
||||
{% endif %}{% if Auth_admin|length %}
|
||||
polkit.addRule(function (action, subject) {
|
||||
if ({% for res in Auth_admin -%}
|
||||
action.id == "{{res}}"{% if Auth_admin|length == loop.index %}){ {% else %} ||{% endif %}
|
||||
{% endfor %} return polkit.Result.AUTH_ADMIN;
|
||||
}
|
||||
});
|
||||
{% endif %}{% if Auth_self_keep|length %}
|
||||
polkit.addRule(function (action, subject) {
|
||||
if ({% for res in Auth_self_keep -%}
|
||||
action.id == "{{res}}"{% if Auth_self_keep|length == loop.index %}){ {% else %} ||{% endif %}
|
||||
{% endfor %} return polkit.Result.AUTH_SELF_KEEP;
|
||||
}
|
||||
});
|
||||
{% endif %}{% if Auth_admin_keep|length %}
|
||||
polkit.addRule(function (action, subject) {
|
||||
if ({% for res in Auth_admin_keep -%}
|
||||
action.id == "{{res}}"{% if Auth_admin_keep|length == loop.index %}){ {% else %} ||{% endif %}
|
||||
{% endfor %} return polkit.Result.AUTH_ADMIN_KEEP;
|
||||
}
|
||||
});
|
||||
|
||||
{% endif %}
|
63
gpoa/templates/48-alt_group_policy_permissions_user.rules.j2
Normal file
63
gpoa/templates/48-alt_group_policy_permissions_user.rules.j2
Normal file
@@ -0,0 +1,63 @@
|
||||
{#
|
||||
# GPOA - GPO Applier for Linux
|
||||
#
|
||||
# Copyright (C) 2019-2022 BaseALT Ltd.
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License as published by
|
||||
# the Free Software Foundation, either version 3 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
#}
|
||||
|
||||
{% if No|length %}
|
||||
polkit.addRule(function (action, subject) {
|
||||
if ({% for res in No -%}
|
||||
action.id == "{{res}}" {% if No|length == loop.index %}&&{% else %}||{% endif %}
|
||||
{% endfor %}subject.user == "{{User}}") {
|
||||
return polkit.Result.NO;
|
||||
}
|
||||
});{% endif %}{% if Yes|length %}
|
||||
polkit.addRule(function (action, subject) {
|
||||
if ({% for res in Yes -%}
|
||||
action.id == "{{res}}" {% if Yes|length == loop.index %}&&{% else %}||{% endif %}
|
||||
{% endfor %}subject.user == "{{User}}") {
|
||||
return polkit.Result.YES;
|
||||
}
|
||||
});{% endif %}{% if Auth_self|length %}
|
||||
polkit.addRule(function (action, subject) {
|
||||
if ({% for res in Auth_self -%}
|
||||
action.id == "{{res}}" {% if Auth_self|length == loop.index %}&&{% else %}||{% endif %}
|
||||
{% endfor %}subject.user == "{{User}}") {
|
||||
return polkit.Result.AUTH_SELF;
|
||||
}
|
||||
});{% endif %}{% if Auth_admin|length %}
|
||||
polkit.addRule(function (action, subject) {
|
||||
if ({% for res in Auth_admin -%}
|
||||
action.id == "{{res}}" {% if Auth_admin|length == loop.index %}&&{% else %}||{% endif %}
|
||||
{% endfor %}subject.user == "{{User}}") {
|
||||
return polkit.Result.AUTH_ADMIN;
|
||||
}
|
||||
});{% endif %}{% if Auth_self_keep|length %}
|
||||
polkit.addRule(function (action, subject) {
|
||||
if ({% for res in Auth_self_keep -%}
|
||||
action.id == "{{res}}" {% if Auth_self_keep|length == loop.index %}&&{% else %}||{% endif %}
|
||||
{% endfor %}subject.user == "{{User}}") {
|
||||
return polkit.Result.AUTH_SELF_KEEP;
|
||||
}
|
||||
});{% endif %}{% if Auth_admin_keep|length %}
|
||||
polkit.addRule(function (action, subject) {
|
||||
if ({% for res in Auth_admin_keep -%}
|
||||
action.id == "{{res}}" {% if Auth_admin_keep|length == loop.index %}&&{% else %}||{% endif %}
|
||||
{% endfor %}subject.user == "{{User}}") {
|
||||
return polkit.Result.AUTH_ADMIN_KEEP;
|
||||
}
|
||||
});
|
||||
{% endif %}
|
@@ -17,7 +17,7 @@
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
#}
|
||||
|
||||
{% if Deny_All == '1' %}
|
||||
{% if Deny_All == 1 %}
|
||||
polkit.addRule(function (action, subject) {
|
||||
if ((action.id == "org.freedesktop.udisks2.filesystem-mount" ||
|
||||
action.id == "org.freedesktop.udisks2.filesystem-mount-system" ||
|
||||
|
63
gpoa/templates/49-alt_group_policy_permissions.rules.j2
Normal file
63
gpoa/templates/49-alt_group_policy_permissions.rules.j2
Normal file
@@ -0,0 +1,63 @@
|
||||
{#
|
||||
# GPOA - GPO Applier for Linux
|
||||
#
|
||||
# Copyright (C) 2019-2022 BaseALT Ltd.
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License as published by
|
||||
# the Free Software Foundation, either version 3 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
#}
|
||||
|
||||
{% if No|length %}
|
||||
polkit.addRule(function (action, subject) {
|
||||
if ({% for res in No -%}
|
||||
action.id == "{{res}}"{% if No|length == loop.index %}){ {% else %} ||{% endif %}
|
||||
{% endfor %} return polkit.Result.NO;
|
||||
}
|
||||
});
|
||||
{% endif %}{% if Yes|length %}
|
||||
polkit.addRule(function (action, subject) {
|
||||
if ({% for res in Yes -%}
|
||||
action.id == "{{res}}"{% if Yes|length == loop.index %}){ {% else %} ||{% endif %}
|
||||
{% endfor %} return polkit.Result.YES;
|
||||
}
|
||||
});
|
||||
{% endif %}{% if Auth_self|length %}
|
||||
polkit.addRule(function (action, subject) {
|
||||
if ({% for res in Auth_self -%}
|
||||
action.id == "{{res}}"{% if Auth_self|length == loop.index %}){ {% else %} ||{% endif %}
|
||||
{% endfor %} return polkit.Result.AUTH_SELF;
|
||||
}
|
||||
});
|
||||
{% endif %}{% if Auth_admin|length %}
|
||||
polkit.addRule(function (action, subject) {
|
||||
if ({% for res in Auth_admin -%}
|
||||
action.id == "{{res}}"{% if Auth_admin|length == loop.index %}){ {% else %} ||{% endif %}
|
||||
{% endfor %} return polkit.Result.AUTH_ADMIN;
|
||||
}
|
||||
});
|
||||
{% endif %}{% if Auth_self_keep|length %}
|
||||
polkit.addRule(function (action, subject) {
|
||||
if ({% for res in Auth_self_keep -%}
|
||||
action.id == "{{res}}"{% if Auth_self_keep|length == loop.index %}){ {% else %} ||{% endif %}
|
||||
{% endfor %} return polkit.Result.AUTH_SELF_KEEP;
|
||||
}
|
||||
});
|
||||
{% endif %}{% if Auth_admin_keep|length %}
|
||||
polkit.addRule(function (action, subject) {
|
||||
if ({% for res in Auth_admin_keep -%}
|
||||
action.id == "{{res}}"{% if Auth_admin_keep|length == loop.index %}){ {% else %} ||{% endif %}
|
||||
{% endfor %} return polkit.Result.AUTH_ADMIN_KEEP;
|
||||
}
|
||||
});
|
||||
|
||||
{% endif %}
|
@@ -17,7 +17,7 @@
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
#}
|
||||
|
||||
{% if Deny_All == '1' %}
|
||||
{% if Deny_All == 1 %}
|
||||
polkit.addRule(function (action, subject) {
|
||||
if (action.id == "org.freedesktop.udisks2.filesystem-mount" ||
|
||||
action.id == "org.freedesktop.udisks2.filesystem-mount-system" ||
|
||||
|
@@ -16,5 +16,5 @@
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
#}
|
||||
{{ home_dir }}/net {{ mount_file }} -t 120 --browse
|
||||
{{ home_dir }}/{{mntTarget}} {{ mount_file }} -t 120 --browse
|
||||
|
||||
|
20
gpoa/templates/autofs_auto_hide.j2
Normal file
20
gpoa/templates/autofs_auto_hide.j2
Normal file
@@ -0,0 +1,20 @@
|
||||
{#
|
||||
# GPOA - GPO Applier for Linux
|
||||
#
|
||||
# Copyright (C) 2019-2022 BaseALT Ltd.
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License as published by
|
||||
# the Free Software Foundation, either version 3 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
#}
|
||||
{{ home_dir }}/.{{mntTarget}} {{ mount_file }} -t 120
|
||||
|
@@ -1,7 +1,7 @@
|
||||
{#
|
||||
# GPOA - GPO Applier for Linux
|
||||
#
|
||||
# Copyright (C) 2019-2020 BaseALT Ltd.
|
||||
# Copyright (C) 2019-2022 BaseALT Ltd.
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License as published by
|
||||
@@ -17,5 +17,11 @@
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
#}
|
||||
{%- for drv in drives %}
|
||||
{{ drv.dir }} -fstype=cifs,cruid=$USER,sec=krb5,noperm :{{ drv.path }}
|
||||
{% if (drv.thisDrive != 'HIDE') %}
|
||||
{% if drv.label %}
|
||||
"{{ drv.label }}" -fstype=cifs,cruid=$USER,sec=krb5,noperm,cifsacl :{{ drv.path }}
|
||||
{% else %}
|
||||
"{{ drv.dir }}" -fstype=cifs,cruid=$USER,sec=krb5,noperm,cifsacl :{{ drv.path }}
|
||||
{% endif %}
|
||||
{% endif %}
|
||||
{% endfor %}
|
||||
|
27
gpoa/templates/autofs_mountpoints_hide.j2
Normal file
27
gpoa/templates/autofs_mountpoints_hide.j2
Normal file
@@ -0,0 +1,27 @@
|
||||
{#
|
||||
# GPOA - GPO Applier for Linux
|
||||
#
|
||||
# Copyright (C) 2019-2022 BaseALT Ltd.
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License as published by
|
||||
# the Free Software Foundation, either version 3 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
#}
|
||||
{%- for drv in drives %}
|
||||
{% if (drv.thisDrive == 'HIDE') %}
|
||||
{% if drv.label %}
|
||||
"{{ drv.label }}" -fstype=cifs,cruid=$USER,sec=krb5,noperm,cifsacl :{{ drv.path }}
|
||||
{% else %}
|
||||
"{{ drv.dir }}" -fstype=cifs,cruid=$USER,sec=krb5,noperm,cifsacl :{{ drv.path }}
|
||||
{% endif %}
|
||||
{% endif %}
|
||||
{% endfor %}
|
@@ -18,7 +18,7 @@
|
||||
|
||||
import logging
|
||||
import logging.handlers
|
||||
from enum import IntEnum
|
||||
from enum import IntEnum, Enum
|
||||
|
||||
from messages import message_with_code
|
||||
from .logging import slogm
|
||||
@@ -84,3 +84,20 @@ class ExitCodeUpdater(IntEnum):
|
||||
FAIL_GPUPDATE_USER_NOREPLY = 3
|
||||
EXIT_SIGINT = 130
|
||||
|
||||
class FileAction(Enum):
|
||||
CREATE = 'C'
|
||||
REPLACE = 'R'
|
||||
UPDATE = 'U'
|
||||
DELETE = 'D'
|
||||
|
||||
def __str__(self):
|
||||
return self.value
|
||||
|
||||
def action_letter2enum(letter):
|
||||
if letter in ['C', 'R', 'U', 'D']:
|
||||
if letter == 'C': return FileAction.CREATE
|
||||
if letter == 'R': return FileAction.REPLACE
|
||||
if letter == 'U': return FileAction.UPDATE
|
||||
if letter == 'D': return FileAction.DELETE
|
||||
|
||||
return FileAction.CREATE
|
||||
|
@@ -20,6 +20,7 @@ import dbus
|
||||
|
||||
from .logging import log
|
||||
from .users import is_root
|
||||
from storage import Dconf_registry
|
||||
|
||||
|
||||
class dbus_runner:
|
||||
@@ -72,6 +73,7 @@ class dbus_runner:
|
||||
if self.username:
|
||||
logdata = dict({'username': self.username})
|
||||
log('D6', logdata)
|
||||
gpupdate = 'gpupdate' if not Dconf_registry._force else 'gpupdate_force'
|
||||
if is_root():
|
||||
# oddjobd-gpupdate's ACL allows access to this method
|
||||
# only for superuser. This method is called via PAM
|
||||
@@ -95,7 +97,7 @@ class dbus_runner:
|
||||
result = self.system_bus.call_blocking(self.bus_name,
|
||||
self._object_path,
|
||||
self.interface_name,
|
||||
'gpupdate',
|
||||
gpupdate,
|
||||
None,
|
||||
[],
|
||||
timeout=self._synchronous_timeout)
|
||||
@@ -106,11 +108,12 @@ class dbus_runner:
|
||||
raise exc
|
||||
else:
|
||||
log('D11')
|
||||
gpupdate_computer = 'gpupdate_computer' if not Dconf_registry._force else 'gpupdate_computer_force'
|
||||
try:
|
||||
result = self.system_bus.call_blocking(self.bus_name,
|
||||
self._object_path,
|
||||
self.interface_name,
|
||||
'gpupdate_computer',
|
||||
gpupdate_computer,
|
||||
None,
|
||||
# The following positional parameter is called "args".
|
||||
# There is no official documentation for it.
|
||||
@@ -118,7 +121,6 @@ class dbus_runner:
|
||||
timeout=self._synchronous_timeout)
|
||||
print_dbus_result(result)
|
||||
except dbus.exceptions.DBusException as exc:
|
||||
print(exc)
|
||||
logdata = dict({'error': str(exc)})
|
||||
log('E22', logdata)
|
||||
raise exc
|
||||
|
@@ -46,3 +46,10 @@ class NotUNCPathError(Exception):
|
||||
def __str__(self):
|
||||
return self.path
|
||||
|
||||
class GetGPOListFail(Exception):
|
||||
def __init__(self, exc):
|
||||
self.exc = exc
|
||||
|
||||
def __str__(self):
|
||||
return self.exc
|
||||
|
||||
|
356
gpoa/util/gpoa_ini_parsing.py
Normal file
356
gpoa/util/gpoa_ini_parsing.py
Normal file
@@ -0,0 +1,356 @@
|
||||
#
|
||||
# GPOA - GPO Applier for Linux
|
||||
#
|
||||
# Copyright (C) 2019-2023 BaseALT Ltd.
|
||||
#
|
||||
# This program is free software: you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License as published by
|
||||
# the Free Software Foundation, either version 3 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
from configobj import (ConfigObj, NestingError, Section,
|
||||
DuplicateError, ParseError, UnreprError,
|
||||
UnknownType,UnreprError,
|
||||
BOM_UTF8, DEFAULT_INDENT_TYPE, BOM_LIST,
|
||||
match_utf8, unrepr)
|
||||
import six
|
||||
import re
|
||||
import sys
|
||||
import os
|
||||
|
||||
# Michael Foord: fuzzyman AT voidspace DOT org DOT uk
|
||||
# Nicola Larosa: nico AT tekNico DOT net
|
||||
# Rob Dennis: rdennis AT gmail DOT com
|
||||
# Eli Courtwright: eli AT courtwright DOT org
|
||||
# This class based on the ConfigObj module, distributed under the BSD-3-Clause license.
|
||||
# This class includes modified code from the ConfigObj module mentioned above.
|
||||
# The original authors and their contact information are listed in the comments above.
|
||||
# For more information about ConfigObj, please visit the main repository:
|
||||
# https://github.com/DiffSK/configobj
|
||||
|
||||
|
||||
class GpoaConfigObj(ConfigObj):
|
||||
|
||||
_sectionmarker = re.compile(r'''^
|
||||
(\s*) # 1: indentation
|
||||
((?:\[\s*)+) # 2: section marker open
|
||||
( # 3: section name open
|
||||
(?:"\s*\S.*?\s*")| # at least one non-space with double quotes
|
||||
(?:'\s*\S.*?\s*')| # at least one non-space with single quotes
|
||||
(?:[^'"\s].*?) # at least one non-space unquoted
|
||||
) # section name close
|
||||
((?:\s*\])+) # 4: section marker close
|
||||
(\s*(?:[#;].*)?)? # 5: optional comment
|
||||
$''',
|
||||
re.VERBOSE)
|
||||
|
||||
_valueexp = re.compile(r'''^
|
||||
(?:
|
||||
(?:
|
||||
(
|
||||
(?:
|
||||
(?:
|
||||
(?:".*?")| # double quotes
|
||||
(?:'.*?')| # single quotes
|
||||
(?:[^'",\#][^,\#]*?) # unquoted
|
||||
)
|
||||
\s*,\s* # comma
|
||||
)* # match all list items ending in a comma (if any)
|
||||
)
|
||||
(
|
||||
(?:".*?")| # double quotes
|
||||
(?:'.*?')| # single quotes
|
||||
(?:[^'",\#\s][^,]*?)| # unquoted
|
||||
(?:(?<!,)) # Empty value
|
||||
)? # last item in a list - or string value
|
||||
)|
|
||||
(,) # alternatively a single comma - empty list
|
||||
)
|
||||
(\s*(?:[#;].*)?)? # optional comment
|
||||
$''',
|
||||
re.VERBOSE)
|
||||
|
||||
COMMENT_MARKERS = ['#', ';']
|
||||
|
||||
def _handle_comment(self, comment):
|
||||
"""Deal with a comment."""
|
||||
if not comment:
|
||||
return ''
|
||||
start = self.indent_type
|
||||
if not comment.lstrip().startswith(tuple(self.COMMENT_MARKERS)):
|
||||
start += ' # '
|
||||
return start + comment.strip()
|
||||
|
||||
def _parse(self, infile):
|
||||
"""Actually parse the config file."""
|
||||
temp_list_values = self.list_values
|
||||
if self.unrepr:
|
||||
self.list_values = False
|
||||
|
||||
comment_list = []
|
||||
done_start = False
|
||||
this_section = self
|
||||
maxline = len(infile) - 1
|
||||
cur_index = -1
|
||||
reset_comment = False
|
||||
comment_markers = tuple(self.COMMENT_MARKERS)
|
||||
|
||||
while cur_index < maxline:
|
||||
if reset_comment:
|
||||
comment_list = []
|
||||
cur_index += 1
|
||||
line = infile[cur_index]
|
||||
sline = line.strip()
|
||||
# do we have anything on the line ?
|
||||
if not sline or sline.startswith(comment_markers):
|
||||
reset_comment = False
|
||||
comment_list.append(line)
|
||||
continue
|
||||
|
||||
if not done_start:
|
||||
# preserve initial comment
|
||||
self.initial_comment = comment_list
|
||||
comment_list = []
|
||||
done_start = True
|
||||
|
||||
reset_comment = True
|
||||
# first we check if it's a section marker
|
||||
mat = self._sectionmarker.match(line)
|
||||
if mat is not None:
|
||||
# is a section line
|
||||
(indent, sect_open, sect_name, sect_close, comment) = mat.groups()
|
||||
if indent and (self.indent_type is None):
|
||||
self.indent_type = indent
|
||||
cur_depth = sect_open.count('[')
|
||||
if cur_depth != sect_close.count(']'):
|
||||
self._handle_error("Cannot compute the section depth",
|
||||
NestingError, infile, cur_index)
|
||||
continue
|
||||
|
||||
if cur_depth < this_section.depth:
|
||||
# the new section is dropping back to a previous level
|
||||
try:
|
||||
parent = self._match_depth(this_section,
|
||||
cur_depth).parent
|
||||
except SyntaxError:
|
||||
self._handle_error("Cannot compute nesting level",
|
||||
NestingError, infile, cur_index)
|
||||
continue
|
||||
elif cur_depth == this_section.depth:
|
||||
# the new section is a sibling of the current section
|
||||
parent = this_section.parent
|
||||
elif cur_depth == this_section.depth + 1:
|
||||
# the new section is a child the current section
|
||||
parent = this_section
|
||||
else:
|
||||
self._handle_error("Section too nested",
|
||||
NestingError, infile, cur_index)
|
||||
continue
|
||||
|
||||
sect_name = self._unquote(sect_name)
|
||||
if sect_name in parent:
|
||||
self._handle_error('Duplicate section name',
|
||||
DuplicateError, infile, cur_index)
|
||||
continue
|
||||
|
||||
# create the new section
|
||||
this_section = Section(
|
||||
parent,
|
||||
cur_depth,
|
||||
self,
|
||||
name=sect_name)
|
||||
parent[sect_name] = this_section
|
||||
parent.inline_comments[sect_name] = comment
|
||||
parent.comments[sect_name] = comment_list
|
||||
continue
|
||||
#
|
||||
# it's not a section marker,
|
||||
# so it should be a valid ``key = value`` line
|
||||
mat = self._keyword.match(line)
|
||||
if mat is None:
|
||||
self._handle_error(
|
||||
'Invalid line ({!r}) (matched as neither section nor keyword)'.format(line),
|
||||
ParseError, infile, cur_index)
|
||||
else:
|
||||
# is a keyword value
|
||||
# value will include any inline comment
|
||||
(indent, key, value) = mat.groups()
|
||||
if indent and (self.indent_type is None):
|
||||
self.indent_type = indent
|
||||
# check for a multiline value
|
||||
if value[:3] in ['"""', "'''"]:
|
||||
try:
|
||||
value, comment, cur_index = self._multiline(
|
||||
value, infile, cur_index, maxline)
|
||||
except SyntaxError:
|
||||
self._handle_error(
|
||||
'Parse error in multiline value',
|
||||
ParseError, infile, cur_index)
|
||||
continue
|
||||
else:
|
||||
if self.unrepr:
|
||||
comment = ''
|
||||
try:
|
||||
value = unrepr(value)
|
||||
except Exception as cause:
|
||||
if isinstance(cause, UnknownType):
|
||||
msg = 'Unknown name or type in value'
|
||||
else:
|
||||
msg = 'Parse error from unrepr-ing multiline value'
|
||||
self._handle_error(msg, UnreprError, infile, cur_index)
|
||||
continue
|
||||
else:
|
||||
if self.unrepr:
|
||||
comment = ''
|
||||
try:
|
||||
value = unrepr(value)
|
||||
except Exception as cause:
|
||||
if isinstance(cause, UnknownType):
|
||||
msg = 'Unknown name or type in value'
|
||||
else:
|
||||
msg = 'Parse error from unrepr-ing value'
|
||||
self._handle_error(msg, UnreprError, infile, cur_index)
|
||||
continue
|
||||
else:
|
||||
# extract comment and lists
|
||||
try:
|
||||
(value, comment) = self._handle_value(value)
|
||||
except SyntaxError:
|
||||
self._handle_error(
|
||||
'Parse error in value',
|
||||
ParseError, infile, cur_index)
|
||||
continue
|
||||
#
|
||||
key = self._unquote(key)
|
||||
if key in this_section:
|
||||
self._handle_error(
|
||||
'Duplicate keyword name',
|
||||
DuplicateError, infile, cur_index)
|
||||
continue
|
||||
# add the key.
|
||||
# we set unrepr because if we have got this far we will never
|
||||
# be creating a new section
|
||||
this_section.__setitem__(key, value, unrepr=True)
|
||||
this_section.inline_comments[key] = comment
|
||||
this_section.comments[key] = comment_list
|
||||
continue
|
||||
#
|
||||
if self.indent_type is None:
|
||||
# no indentation used, set the type accordingly
|
||||
self.indent_type = ''
|
||||
|
||||
# preserve the final comment
|
||||
if not self and not self.initial_comment:
|
||||
self.initial_comment = comment_list
|
||||
elif not reset_comment:
|
||||
self.final_comment = comment_list
|
||||
self.list_values = temp_list_values
|
||||
|
||||
|
||||
def write(self, outfile=None, section=None):
|
||||
if self.indent_type is None:
|
||||
# this can be true if initialised from a dictionary
|
||||
self.indent_type = DEFAULT_INDENT_TYPE
|
||||
|
||||
out = []
|
||||
comment_markers = tuple(self.COMMENT_MARKERS)
|
||||
comment_marker_default = comment_markers[0] + ' '
|
||||
if section is None:
|
||||
int_val = self.interpolation
|
||||
self.interpolation = False
|
||||
section = self
|
||||
for line in self.initial_comment:
|
||||
line = self._decode_element(line)
|
||||
stripped_line = line.strip()
|
||||
if stripped_line and not stripped_line.startswith(comment_markers):
|
||||
line = comment_marker_default + line
|
||||
out.append(line)
|
||||
|
||||
indent_string = self.indent_type * section.depth
|
||||
for entry in (section.scalars + section.sections):
|
||||
if entry in section.defaults:
|
||||
# don't write out default values
|
||||
continue
|
||||
for comment_line in section.comments[entry]:
|
||||
comment_line = self._decode_element(comment_line.lstrip())
|
||||
if comment_line and not comment_line.startswith(comment_markers):
|
||||
comment_line = comment_marker_default + comment_line
|
||||
out.append(indent_string + comment_line)
|
||||
this_entry = section[entry]
|
||||
comment = self._handle_comment(section.inline_comments[entry])
|
||||
|
||||
if isinstance(this_entry, Section):
|
||||
# a section
|
||||
out.append(self._write_marker(
|
||||
indent_string,
|
||||
this_entry.depth,
|
||||
entry,
|
||||
comment))
|
||||
out.extend(self.write(section=this_entry))
|
||||
else:
|
||||
out.append(self._write_line(
|
||||
indent_string,
|
||||
entry,
|
||||
this_entry,
|
||||
comment))
|
||||
|
||||
if section is self:
|
||||
for line in self.final_comment:
|
||||
line = self._decode_element(line)
|
||||
stripped_line = line.strip()
|
||||
if stripped_line and not stripped_line.startswith(comment_markers):
|
||||
line = comment_marker_default + line
|
||||
out.append(line)
|
||||
self.interpolation = int_val
|
||||
|
||||
if section is not self:
|
||||
return out
|
||||
|
||||
if (self.filename is None) and (outfile is None):
|
||||
# output a list of lines
|
||||
# might need to encode
|
||||
# NOTE: This will *screw* UTF16, each line will start with the BOM
|
||||
if self.encoding:
|
||||
out = [l.encode(self.encoding) for l in out]
|
||||
if (self.BOM and ((self.encoding is None) or
|
||||
(BOM_LIST.get(self.encoding.lower()) == 'utf_8'))):
|
||||
# Add the UTF8 BOM
|
||||
if not out:
|
||||
out.append('')
|
||||
out[0] = BOM_UTF8 + out[0]
|
||||
return out
|
||||
|
||||
# Turn the list to a string, joined with correct newlines
|
||||
newline = self.newlines or os.linesep
|
||||
if (getattr(outfile, 'mode', None) is not None and outfile.mode == 'w'
|
||||
and sys.platform == 'win32' and newline == '\r\n'):
|
||||
# Windows specific hack to avoid writing '\r\r\n'
|
||||
newline = '\n'
|
||||
output = newline.join(out)
|
||||
if not output.endswith(newline):
|
||||
output += newline
|
||||
|
||||
if isinstance(output, six.binary_type):
|
||||
output_bytes = output
|
||||
else:
|
||||
output_bytes = output.encode(self.encoding or
|
||||
self.default_encoding or
|
||||
'ascii')
|
||||
|
||||
if self.BOM and ((self.encoding is None) or match_utf8(self.encoding)):
|
||||
# Add the UTF8 BOM
|
||||
output_bytes = BOM_UTF8 + output_bytes
|
||||
|
||||
if outfile is not None:
|
||||
outfile.write(output_bytes)
|
||||
else:
|
||||
with open(self.filename, 'wb') as h:
|
||||
h.write(output_bytes)
|
@@ -21,6 +21,7 @@ import pathlib
|
||||
import os
|
||||
from pathlib import Path
|
||||
from urllib.parse import urlparse
|
||||
from util.util import get_homedir
|
||||
|
||||
from .config import GPConfig
|
||||
from .exceptions import NotUNCPathError
|
||||
@@ -67,12 +68,19 @@ def file_cache_dir():
|
||||
Returns path pointing to gpupdate's cache directory
|
||||
'''
|
||||
cachedir = pathlib.Path('/var/cache/gpupdate_file_cache')
|
||||
|
||||
if not cachedir.exists():
|
||||
cachedir.mkdir(parents=True, exist_ok=True)
|
||||
|
||||
return cachedir
|
||||
|
||||
def file_cache_path_home(username) -> str:
|
||||
'''
|
||||
Returns the path pointing to the gpupdate cache directory in the /home directory.
|
||||
'''
|
||||
cachedir = f'{get_homedir(username)}/.cache/gpupdate'
|
||||
|
||||
return cachedir
|
||||
|
||||
def local_policy_cache():
|
||||
'''
|
||||
Returns path to directory where lies local policy settings cache
|
||||
@@ -85,6 +93,21 @@ def local_policy_cache():
|
||||
|
||||
return lpcache
|
||||
|
||||
def get_dconf_config_path(uid = None):
|
||||
if uid:
|
||||
return f'/etc/dconf/db/policy{uid}.d/'
|
||||
else:
|
||||
return '/etc/dconf/db/policy.d/'
|
||||
|
||||
def get_dconf_config_file(uid = None):
|
||||
if uid:
|
||||
return f'/etc/dconf/db/policy{uid}.d/policy{uid}.ini'
|
||||
else:
|
||||
return '/etc/dconf/db/policy.d/policy.ini'
|
||||
|
||||
def get_desktop_files_directory():
|
||||
return '/usr/share/applications'
|
||||
|
||||
class UNCPath:
|
||||
def __init__(self, path):
|
||||
self.path = path
|
||||
|
@@ -19,6 +19,7 @@
|
||||
|
||||
from xml.etree import ElementTree
|
||||
from storage import registry_factory
|
||||
from storage.dconf_registry import load_preg_dconf
|
||||
|
||||
from samba.gp_parse.gp_pol import GPPolParser
|
||||
|
||||
@@ -80,10 +81,16 @@ def preg_keymap(preg):
|
||||
return keymap
|
||||
|
||||
|
||||
def merge_polfile(preg, sid=None, reg_name='registry', reg_path=None, policy_name='Unknown'):
|
||||
def merge_polfile(preg, sid=None, reg_name='registry', reg_path=None, policy_name='Unknown', username='Machine', gpo_info=None):
|
||||
pregfile = load_preg(preg)
|
||||
if sid is None and username == 'Machine':
|
||||
load_preg_dconf(pregfile, preg, policy_name, None, gpo_info)
|
||||
else:
|
||||
load_preg_dconf(pregfile, preg, policy_name, username, gpo_info)
|
||||
logdata = dict({'pregfile': preg})
|
||||
log('D32', logdata)
|
||||
#log dconf
|
||||
return
|
||||
storage = registry_factory(reg_name, reg_path)
|
||||
for entry in pregfile.entries:
|
||||
if not sid:
|
||||
|
@@ -47,7 +47,6 @@ def username_match_uid(username):
|
||||
'''
|
||||
Check the passed username matches current process UID.
|
||||
'''
|
||||
uid = os.getuid()
|
||||
process_username = get_process_user()
|
||||
|
||||
if process_username == username:
|
||||
|
@@ -23,6 +23,7 @@ import subprocess
|
||||
import re
|
||||
from pathlib import Path
|
||||
from .samba import smbopts
|
||||
import ast
|
||||
|
||||
|
||||
def get_machine_name():
|
||||
@@ -105,20 +106,7 @@ def get_backends():
|
||||
'''
|
||||
Get the list of backends supported by GPOA
|
||||
'''
|
||||
command = ['/usr/sbin/gpoa', '--list-backends']
|
||||
backends = list()
|
||||
out = list()
|
||||
|
||||
with subprocess.Popen(command, stdout=subprocess.PIPE) as proc:
|
||||
out = proc.stdout.read().decode('utf-8')
|
||||
proc.wait()
|
||||
out = out.split('\n')
|
||||
for line in out:
|
||||
tmpline = line.replace('\n', '')
|
||||
if tmpline != '':
|
||||
backends.append(tmpline)
|
||||
|
||||
return backends
|
||||
return ['local', 'samba']
|
||||
|
||||
def get_default_policy_name():
|
||||
'''
|
||||
@@ -180,3 +168,31 @@ def get_policy_variants():
|
||||
|
||||
return general_listing
|
||||
|
||||
def string_to_literal_eval(string):
|
||||
try:
|
||||
literaleval = ast.literal_eval(string)
|
||||
except:
|
||||
literaleval = string
|
||||
return literaleval
|
||||
|
||||
def try_dict_to_literal_eval(string):
|
||||
try:
|
||||
literaleval = ast.literal_eval(string)
|
||||
if isinstance(literaleval ,dict):
|
||||
return literaleval
|
||||
else:
|
||||
return None
|
||||
except:
|
||||
return None
|
||||
|
||||
def touch_file(filename):
|
||||
path = Path(filename)
|
||||
path.parent.mkdir(parents=True, exist_ok=True)
|
||||
path.touch()
|
||||
|
||||
def get_uid_by_username(username):
|
||||
try:
|
||||
user_info = pwd.getpwnam(username)
|
||||
return user_info.pw_uid
|
||||
except KeyError:
|
||||
return None
|
||||
|
@@ -18,22 +18,34 @@
|
||||
|
||||
|
||||
import os
|
||||
import subprocess
|
||||
from pathlib import Path
|
||||
from samba import getopt as options
|
||||
from samba import NTSTATUSError
|
||||
from samba.gpclass import get_dc_hostname, check_refresh_gpo_list
|
||||
|
||||
try:
|
||||
from samba.gpclass import get_dc_hostname, check_refresh_gpo_list
|
||||
except ImportError:
|
||||
from samba.gp.gpclass import get_dc_hostname, check_refresh_gpo_list
|
||||
|
||||
from samba.netcmd.common import netcmd_get_domain_infos_via_cldap
|
||||
from storage.dconf_registry import Dconf_registry, extract_display_name_version
|
||||
import samba.gpo
|
||||
|
||||
from storage import cache_factory
|
||||
from messages import message_with_code
|
||||
from .xdg import (
|
||||
xdg_get_desktop
|
||||
)
|
||||
from .util import get_homedir
|
||||
from .util import get_homedir, get_uid_by_username
|
||||
from .exceptions import GetGPOListFail
|
||||
from .logging import log
|
||||
from .samba import smbopts
|
||||
|
||||
from gpoa.storage import registry_factory
|
||||
from samba.samdb import SamDB
|
||||
from samba.auth import system_session
|
||||
import optparse
|
||||
import ldb
|
||||
import ipaddress
|
||||
import netifaces
|
||||
import random
|
||||
|
||||
class smbcreds (smbopts):
|
||||
|
||||
@@ -42,6 +54,13 @@ class smbcreds (smbopts):
|
||||
self.credopts = options.CredentialsOptions(self.parser)
|
||||
self.creds = self.credopts.get_credentials(self.lp, fallback_machine=True)
|
||||
self.set_dc(dc_fqdn)
|
||||
self.sDomain = SiteDomainScanner(self.creds, self.lp, self.selected_dc)
|
||||
self.dc_site_servers = self.sDomain.select_site_servers()
|
||||
self.all_servers = self.sDomain.select_all_servers()
|
||||
[self.all_servers.remove(element)
|
||||
for element in self.dc_site_servers
|
||||
if element in self.all_servers]
|
||||
self.pdc_emulator_server = self.sDomain.select_pdc_emulator_server()
|
||||
|
||||
def get_dc(self):
|
||||
return self.selected_dc
|
||||
@@ -91,7 +110,11 @@ class smbcreds (smbopts):
|
||||
hostname
|
||||
'''
|
||||
gpos = list()
|
||||
|
||||
if Dconf_registry.get_info('machine_name') == username:
|
||||
dconf_dict = Dconf_registry.get_dictionary_from_dconf_file_db()
|
||||
else:
|
||||
dconf_dict = Dconf_registry.get_dictionary_from_dconf_file_db(get_uid_by_username(username))
|
||||
dict_gpo_name_version = extract_display_name_version(dconf_dict)
|
||||
try:
|
||||
log('D48')
|
||||
ads = samba.gpo.ADS_STRUCT(self.selected_dc, self.lp, self.creds)
|
||||
@@ -103,21 +126,42 @@ class smbcreds (smbopts):
|
||||
for gpo in gpos:
|
||||
# These setters are taken from libgpo/pygpo.c
|
||||
# print(gpo.ds_path) # LDAP entry
|
||||
if gpo.display_name in dict_gpo_name_version.keys() and dict_gpo_name_version.get(gpo.display_name, {}).get('version') == gpo.version:
|
||||
if Path(dict_gpo_name_version.get(gpo.display_name, {}).get('correct_path')).exists():
|
||||
gpo.file_sys_path = ''
|
||||
ldata = dict({'gpo_name': gpo.display_name, 'gpo_uuid': gpo.name, 'file_sys_path_cache': True})
|
||||
log('I11', ldata)
|
||||
continue
|
||||
ldata = dict({'gpo_name': gpo.display_name, 'gpo_uuid': gpo.name, 'file_sys_path': gpo.file_sys_path})
|
||||
log('I2', ldata)
|
||||
|
||||
except Exception as exc:
|
||||
if self.selected_dc != self.pdc_emulator_server:
|
||||
raise GetGPOListFail(exc)
|
||||
logdata = dict({'username': username, 'dc': self.selected_dc})
|
||||
log('E17', logdata)
|
||||
|
||||
return gpos
|
||||
|
||||
def update_gpos(self, username):
|
||||
gpos = self.get_gpos(username)
|
||||
|
||||
list_selected_dc = set()
|
||||
|
||||
|
||||
|
||||
if self.dc_site_servers:
|
||||
self.selected_dc = self.dc_site_servers.pop()
|
||||
|
||||
self.all_servers = [dc for dc in self.all_servers if dc != self.selected_dc]
|
||||
list_selected_dc.add(self.selected_dc)
|
||||
|
||||
try:
|
||||
gpos = self.get_gpos(username)
|
||||
|
||||
except GetGPOListFail:
|
||||
self.selected_dc = self.pdc_emulator_server
|
||||
gpos = self.get_gpos(username)
|
||||
|
||||
while list_selected_dc:
|
||||
logdata = dict()
|
||||
logdata['username'] = username
|
||||
@@ -129,20 +173,136 @@ class smbcreds (smbopts):
|
||||
list_selected_dc.clear()
|
||||
except NTSTATUSError as smb_exc:
|
||||
logdata['smb_exc'] = str(smb_exc)
|
||||
self.selected_dc = get_dc_hostname(self.creds, self.lp)
|
||||
if self.selected_dc not in list_selected_dc:
|
||||
logdata['action'] = 'Search another dc'
|
||||
log('W11', logdata)
|
||||
list_selected_dc.add(self.selected_dc)
|
||||
if not check_scroll_enabled():
|
||||
if self.pdc_emulator_server and self.selected_dc != self.pdc_emulator_server:
|
||||
self.selected_dc = self.pdc_emulator_server
|
||||
logdata['action'] = 'Selected pdc'
|
||||
logdata['pdc'] = self.selected_dc
|
||||
log('W11', logdata)
|
||||
else:
|
||||
log('F1', logdata)
|
||||
raise smb_exc
|
||||
else:
|
||||
log('F1', logdata)
|
||||
raise smb_exc
|
||||
if self.dc_site_servers:
|
||||
self.selected_dc = self.dc_site_servers.pop()
|
||||
elif self.all_servers:
|
||||
self.selected_dc = self.all_servers.pop()
|
||||
else:
|
||||
self.selected_dc = self.pdc_emulator_server
|
||||
|
||||
|
||||
if self.selected_dc not in list_selected_dc:
|
||||
logdata['action'] = 'Search another dc'
|
||||
logdata['another_dc'] = self.selected_dc
|
||||
log('W11', logdata)
|
||||
list_selected_dc.add(self.selected_dc)
|
||||
else:
|
||||
log('F1', logdata)
|
||||
raise smb_exc
|
||||
except Exception as exc:
|
||||
logdata['exc'] = str(exc)
|
||||
log('F1', logdata)
|
||||
raise exc
|
||||
return gpos
|
||||
|
||||
|
||||
class SiteDomainScanner:
|
||||
def __init__(self, smbcreds, lp, dc):
|
||||
self.samdb = SamDB(url='ldap://{}'.format(dc), session_info=system_session(), credentials=smbcreds, lp=lp)
|
||||
self.pdc_emulator = self._search_pdc_emulator()
|
||||
|
||||
@staticmethod
|
||||
def _get_ldb_single_message_attr(ldb_message, attr_name, encoding='utf8'):
|
||||
if attr_name in ldb_message:
|
||||
return ldb_message[attr_name][0].decode(encoding)
|
||||
else:
|
||||
return None
|
||||
|
||||
@staticmethod
|
||||
def _get_ldb_single_result_attr(ldb_result, attr_name, encoding='utf8'):
|
||||
if len(ldb_result) == 1 and attr_name in ldb_result[0]:
|
||||
return ldb_result[0][attr_name][0].decode(encoding)
|
||||
else:
|
||||
return None
|
||||
|
||||
def _get_server_hostname(self, ds_service_name):
|
||||
ds_service_name_dn = ldb.Dn(self.samdb, ds_service_name)
|
||||
server_dn = ds_service_name_dn.parent()
|
||||
res = self.samdb.search(server_dn, scope=ldb.SCOPE_BASE)
|
||||
return self._get_ldb_single_result_attr(res, 'dNSHostName')
|
||||
|
||||
def _search_pdc_emulator(self):
|
||||
res = self.samdb.search(self.samdb.domain_dn(), scope=ldb.SCOPE_BASE)
|
||||
pdc_settings_object = self._get_ldb_single_result_attr(res, 'fSMORoleOwner')
|
||||
return self._get_server_hostname(pdc_settings_object)
|
||||
|
||||
def get_ip_addresses(self):
|
||||
interface_list = netifaces.interfaces()
|
||||
addresses = []
|
||||
for iface in interface_list:
|
||||
address_entry = netifaces.ifaddresses(iface)
|
||||
if netifaces.AF_INET in address_entry:
|
||||
addresses.extend(ipaddress.ip_address(ipv4_address_entry['addr']) for ipv4_address_entry in address_entry[netifaces.AF_INET])
|
||||
if netifaces.AF_INET6 in address_entry:
|
||||
addresses.extend(ipaddress.ip_address(ipv6_address_entry['addr']) for ipv6_address_entry in address_entry[netifaces.AF_INET6])
|
||||
return addresses
|
||||
|
||||
def get_ad_subnets_sites(self):
|
||||
subnet_dn = ldb.Dn(self.samdb, "CN=Subnets,CN=Sites")
|
||||
config_dn = self.samdb.get_config_basedn()
|
||||
subnet_dn.add_base(config_dn)
|
||||
res = self.samdb.search(subnet_dn, ldb.SCOPE_ONELEVEL, expression='objectClass=subnet', attrs=['cn', 'siteObject'])
|
||||
subnets = {ipaddress.ip_network(self._get_ldb_single_message_attr(msg, 'cn')): self._get_ldb_single_message_attr(msg, 'siteObject') for msg in res}
|
||||
return subnets
|
||||
|
||||
def get_ad_site_servers(self, site):
|
||||
servers_dn = ldb.Dn(self.samdb, "CN=Servers")
|
||||
site_dn = ldb.Dn(self.samdb, site)
|
||||
servers_dn.add_base(site_dn)
|
||||
res = self.samdb.search(servers_dn, ldb.SCOPE_ONELEVEL, expression='objectClass=server', attrs=['dNSHostName'])
|
||||
servers = [self._get_ldb_single_message_attr(msg, 'dNSHostName') for msg in res]
|
||||
random.shuffle(servers)
|
||||
return servers
|
||||
|
||||
def get_ad_all_servers(self):
|
||||
sites_dn = ldb.Dn(self.samdb, "CN=Sites")
|
||||
config_dn = self.samdb.get_config_basedn()
|
||||
sites_dn.add_base(config_dn)
|
||||
res = self.samdb.search(sites_dn, ldb.SCOPE_SUBTREE, expression='objectClass=server', attrs=['dNSHostName'])
|
||||
servers = [self._get_ldb_single_message_attr(msg, 'dNSHostName') for msg in res]
|
||||
random.shuffle(servers)
|
||||
return servers
|
||||
|
||||
def check_ip_in_subnets(self, ip_addresses, subnets_sites):
|
||||
return next((subnets_sites[subnet] for subnet in subnets_sites.keys()
|
||||
if any(ip_address in subnet for ip_address in ip_addresses)), None)
|
||||
|
||||
def select_site_servers(self):
|
||||
try:
|
||||
ip_addresses = self.get_ip_addresses()
|
||||
subnets_sites = self.get_ad_subnets_sites()
|
||||
|
||||
our_site = self.check_ip_in_subnets(ip_addresses, subnets_sites)
|
||||
|
||||
servers = []
|
||||
if our_site:
|
||||
servers = self.get_ad_site_servers(our_site)
|
||||
random.shuffle(servers)
|
||||
return servers
|
||||
except Exception as e:
|
||||
return []
|
||||
|
||||
def select_all_servers(self):
|
||||
try:
|
||||
servers = self.get_ad_all_servers()
|
||||
random.shuffle(servers)
|
||||
return servers
|
||||
except Exception as e:
|
||||
return []
|
||||
|
||||
def select_pdc_emulator_server(self):
|
||||
return self.pdc_emulator
|
||||
|
||||
def expand_windows_var(text, username=None):
|
||||
'''
|
||||
Scan the line for percent-encoded variables and expand them.
|
||||
@@ -166,7 +326,9 @@ def expand_windows_var(text, username=None):
|
||||
|
||||
result = text
|
||||
for var in variables.keys():
|
||||
result = result.replace('%{}%'.format(var), variables[var])
|
||||
result = result.replace('%{}%'.format(var),
|
||||
variables[var] if variables[var][-1] == '/'
|
||||
else variables[var] +'/')
|
||||
|
||||
return result
|
||||
|
||||
@@ -182,3 +344,11 @@ def transform_windows_path(text):
|
||||
|
||||
return result
|
||||
|
||||
def check_scroll_enabled():
|
||||
storage = registry_factory()
|
||||
enable_scroll = '/Software/BaseALT/Policies/GPUpdate/ScrollSysvolDC'
|
||||
if storage.get_key_value(enable_scroll):
|
||||
data = storage.get_hklm_entry(enable_scroll).data
|
||||
return bool(int(data))
|
||||
else:
|
||||
return False
|
||||
|
202
gpupdate.spec
202
gpupdate.spec
@@ -1,7 +1,41 @@
|
||||
%define _unpackaged_files_terminate_build 1
|
||||
#add_python3_self_prov_path %buildroot%python3_sitelibdir/gpoa
|
||||
|
||||
%add_python3_req_skip backend
|
||||
%add_python3_req_skip frontend.frontend_manager
|
||||
%add_python3_req_skip gpt.envvars
|
||||
%add_python3_req_skip gpt.folders
|
||||
%add_python3_req_skip gpt.gpt
|
||||
%add_python3_req_skip gpt.printers
|
||||
%add_python3_req_skip gpt.shortcuts
|
||||
%add_python3_req_skip gpt.gpo_dconf_mapping
|
||||
%add_python3_req_skip gpt.dynamic_attributes
|
||||
%add_python3_req_skip messages
|
||||
%add_python3_req_skip storage
|
||||
%add_python3_req_skip storage.fs_file_cache
|
||||
%add_python3_req_skip storage.dconf_registry
|
||||
%add_python3_req_skip util
|
||||
%add_python3_req_skip util.arguments
|
||||
%add_python3_req_skip util.config
|
||||
%add_python3_req_skip util.dbus
|
||||
%add_python3_req_skip util.exceptions
|
||||
%add_python3_req_skip util.kerberos
|
||||
%add_python3_req_skip util.logging
|
||||
%add_python3_req_skip util.paths
|
||||
%add_python3_req_skip util.preg
|
||||
%add_python3_req_skip util.roles
|
||||
%add_python3_req_skip util.rpm
|
||||
%add_python3_req_skip util.sid
|
||||
%add_python3_req_skip util.signals
|
||||
%add_python3_req_skip util.system
|
||||
%add_python3_req_skip util.users
|
||||
%add_python3_req_skip util.util
|
||||
%add_python3_req_skip util.windows
|
||||
%add_python3_req_skip util.xml
|
||||
%add_python3_req_skip util.gpoa_ini_parsing
|
||||
|
||||
Name: gpupdate
|
||||
Version: 0.9.11.2
|
||||
Version: 0.11.1
|
||||
Release: alt1
|
||||
|
||||
Summary: GPT applier
|
||||
@@ -16,11 +50,14 @@ BuildRequires: rpm-build-python3
|
||||
BuildRequires: gettext-tools
|
||||
Requires: python3-module-rpm
|
||||
Requires: python3-module-dbus
|
||||
Requires: oddjob-%name >= 0.2.0
|
||||
Requires: python3-module-configobj
|
||||
Requires: oddjob-%name >= 0.2.3
|
||||
Requires: libnss-role >= 0.5.0
|
||||
Requires: local-policy >= 0.4.9
|
||||
Requires: pam-config >= 1.9.0
|
||||
Requires: autofs
|
||||
Requires: dconf-profile
|
||||
Requires: libgvdb-gir
|
||||
# This is needed by shortcuts_applier
|
||||
Requires: desktop-file-utils
|
||||
# This is needed for smb file cache support
|
||||
@@ -87,6 +124,9 @@ install -Dm0644 dist/%name-remote-policy %buildroot%_sysconfdir/pam.d/%name-remo
|
||||
install -Dm0644 dist/%name.ini %buildroot%_sysconfdir/%name/%name.ini
|
||||
install -Dm0644 doc/gpoa.1 %buildroot/%_man1dir/gpoa.1
|
||||
install -Dm0644 doc/gpupdate.1 %buildroot/%_man1dir/gpupdate.1
|
||||
install -Dm0644 completions/gpoa %buildroot/%_datadir/bash-completion/completions/gpoa
|
||||
install -Dm0644 completions/gpupdate %buildroot/%_datadir/bash-completion/completions/gpupdate
|
||||
install -Dm0644 completions/gpupdate-setup %buildroot/%_datadir/bash-completion/completions/gpupdate-setup
|
||||
|
||||
for i in gpupdate-localusers \
|
||||
gpupdate-group-users \
|
||||
@@ -108,7 +148,7 @@ fi
|
||||
# Remove storage in case we've lost compatibility between versions.
|
||||
# The storage will be regenerated on GPOA start.
|
||||
%define active_policy %_sysconfdir/local-policy/active
|
||||
%triggerpostun -- %name < 0.9.10
|
||||
%triggerpostun -- %name < 0.9.13.6
|
||||
rm -f %_cachedir/%name/registry.sqlite
|
||||
if test -L %active_policy; then
|
||||
sed -i "s|^\s*local-policy\s*=.*|local-policy = $(readlink -f %active_policy)|" \
|
||||
@@ -133,9 +173,12 @@ fi
|
||||
%_unitdir/%name.timer
|
||||
%_man1dir/gpoa.1.*
|
||||
%_man1dir/gpupdate.1.*
|
||||
/usr/lib/systemd/user/%name-user.service
|
||||
/usr/lib/systemd/user/%name-user.timer
|
||||
/usr/lib/systemd/user/%name-scripts-run-user.service
|
||||
%_datadir/bash-completion/completions/gpoa
|
||||
%_datadir/bash-completion/completions/gpupdate
|
||||
%_datadir/bash-completion/completions/gpupdate-setup
|
||||
%_user_unitdir/%name-user.service
|
||||
%_user_unitdir/%name-user.timer
|
||||
%_user_unitdir/%name-scripts-run-user.service
|
||||
%dir %_sysconfdir/%name
|
||||
%_sysconfdir/control.d/facilities/*
|
||||
%config(noreplace) %_sysconfdir/%name/environment
|
||||
@@ -151,6 +194,153 @@ fi
|
||||
%exclude %python3_sitelibdir/gpoa/test
|
||||
|
||||
%changelog
|
||||
* Tue Aug 27 2024 Valery Sinelnikov <greh@altlinux.org> 0.11.1-alt1
|
||||
- Fixed setting links in shortcuts (closes: 51275)
|
||||
|
||||
* Fri Aug 09 2024 Valery Sinelnikov <greh@altlinux.org> 0.11.0-alt1
|
||||
- Added saving preferences in dconf
|
||||
- Added versioning support for gpt
|
||||
- Added the ability to force gpt download
|
||||
- Added completions for --force
|
||||
- Added new exceptions for Chromium 126
|
||||
- Added information to the man pages
|
||||
- Fixed handling of incorrect valuename
|
||||
|
||||
* Mon Jul 08 2024 Valery Sinelnikov <greh@altlinux.org> 0.10.6-alt1
|
||||
- Fixed firefox_applier errors
|
||||
|
||||
* Fri Jun 28 2024 Valery Sinelnikov <greh@altlinux.org> 0.10.5-alt1
|
||||
- Correction of missing entries with a upper case
|
||||
- Fixed string processing in date (closes: 50782)
|
||||
- Fixed getting correct data for the user for pkcon_runner
|
||||
|
||||
* Thu Jun 27 2024 Valery Sinelnikov <greh@altlinux.org> 0.10.4-alt1
|
||||
- Fixed the definition of the module activation check (closes: 50755)
|
||||
- Fixed sorting of scripts (closes: 50756)
|
||||
- Fixed reading key values from dconf
|
||||
- Changed the method for getting the list of packages for pkcon_runner
|
||||
|
||||
* Wed Jun 19 2024 Valery Sinelnikov <greh@altlinux.org> 0.10.3-alt1
|
||||
- Added autocompletion for gpoa, gpupdate, gpupdate-setup
|
||||
- Added correct work with json data in keys for the Firefox browser
|
||||
- Polkit_appliers changed to non-experimental
|
||||
- Fixed bug of not clearing kde applier settings (closes: 50336)
|
||||
- Fixed registry key reading (closes: 50553)
|
||||
- Added waiting for data generation for scripts (closes: 50667)
|
||||
|
||||
* Fri Jun 07 2024 Valery Sinelnikov <greh@altlinux.org> 0.10.2-alt1
|
||||
- Added some fixes to dconf_registry and scripts
|
||||
- Fixed windows registry key reading for loopback
|
||||
|
||||
* Tue Jun 04 2024 Valery Sinelnikov <greh@altlinux.org> 0.10.1-alt1
|
||||
- Added handling of unexpected data types when writing to dconf
|
||||
|
||||
* Mon May 13 2024 Valery Sinelnikov <greh@altlinux.org> 0.10.0-alt1
|
||||
- A method for storing registry keys obtained from GPOs (Group Policy Objects)
|
||||
has undergone significant repairs. We have switched from using SQLite
|
||||
to using Dconf to improve data storage efficiency
|
||||
|
||||
* Wed Mar 13 2024 Valery Sinelnikov <greh@altlinux.org> 0.9.13.9-alt1
|
||||
- Fixed premature removal of double slash
|
||||
|
||||
* Thu Feb 22 2024 Valery Sinelnikov <greh@altlinux.org> 0.9.13.8-alt1
|
||||
- Added search for dc on the site
|
||||
- Added compatibility support for the oldest versions of SQLAlchemy
|
||||
|
||||
* Mon Feb 05 2024 Valery Sinelnikov <greh@altlinux.org> 0.9.13.7-alt1
|
||||
- Editing the cache size in the Yandex browser has returned (closes: 44621)
|
||||
- Removed unnecessary calls to subprocess
|
||||
|
||||
* Wed Jan 31 2024 Valery Sinelnikov <greh@altlinux.org> 0.9.13.6-alt1
|
||||
- Added support for hidden attribute for folders (closes: 48964)
|
||||
- Added support for Cyrillic and spaces for mounting disks (closes: 49229)
|
||||
|
||||
* Fri Jan 12 2024 Valery Sinelnikov <greh@altlinux.org> 0.9.13.5-alt1
|
||||
- Fixed blocking check for machine policies with multiple sections (closes: 48971)
|
||||
- Extension of the valuename_typeint list for the admx-chromium 120.0
|
||||
- Extension of the valuename_typeint list for the admx-yandex 118.0
|
||||
- Changed PAM logic to prevent re-call (closes: 48973)
|
||||
- Changed timer option OnStartupSec to prevent re-call
|
||||
|
||||
* Mon Dec 18 2023 Valery Sinelnikov <greh@altlinux.org> 0.9.13.4-alt1
|
||||
- Fixed regular expression to search for wallpaper management section (closes: 48828)
|
||||
|
||||
* Wed Dec 13 2023 Valery Sinelnikov <greh@altlinux.org> 0.9.13.3-alt1
|
||||
- Fixed bug handling of invalid username
|
||||
when requesting cache (closes: 48310)
|
||||
|
||||
* Tue Nov 28 2023 Valery Sinelnikov <greh@altlinux.org> 0.9.13.2-alt1
|
||||
- Fixed kde_applier bug (closes: 47995)
|
||||
|
||||
* Wed Oct 18 2023 Valery Sinelnikov <greh@altlinux.org> 0.9.13.1-alt1
|
||||
- Fixed kde_applier bug (closes: 47995)
|
||||
- Fixed kde_applier bug (closes: 47996)
|
||||
- Fixed kde_applier bug (closes: 47998)
|
||||
- Fixed kde_applier bug (closes: 47820)
|
||||
- Fixed shortcut_applier bug (closes: 47638)
|
||||
- Fixed shortcut_applier bug (closes: 47641)
|
||||
- Fixed systemd_applier bug (closes: 47652)
|
||||
|
||||
* Tue Sep 19 2023 Valery Sinelnikov <greh@altlinux.org> 0.9.13.0-alt1
|
||||
- Added KDE applier
|
||||
- Fixed loopback policy processing
|
||||
- Fixed appliers exception for some chromium policies
|
||||
- Fixed ntp error
|
||||
- cifs_appliers, polkit_appliers changed to non-experimental
|
||||
|
||||
* Wed Jun 14 2023 Valery Sinelnikov <greh@altlinux.org> 0.9.12.6-alt1
|
||||
- Added support for dictionaries as policy values for
|
||||
yandex_browser_applier and chromium_applier
|
||||
- Extended functionality of ConfigObj to save comments ';'
|
||||
- Added support for SQLAlchemy2 in storage
|
||||
- Added 'cifsacl' option to mount templates
|
||||
|
||||
* Fri May 26 2023 Valery Sinelnikov <greh@altlinux.org> 0.9.12.5-alt1
|
||||
- Fixed editing cache volume (DiskCacheSize) in Yandex browser (closes: 44621)
|
||||
- The access to caching files has been fixed
|
||||
|
||||
* Sun Mar 19 2023 Evgeny Sinelnikov <sin@altlinux.org> 0.9.12.4-alt1
|
||||
- Fixed an implementation of replace action in folder applier
|
||||
- Improve file cache store() with copy in temporary file before saving
|
||||
- Added implementation of using executable bit in file copy applier
|
||||
- Fixed debug messages typos in file copy applier
|
||||
|
||||
* Tue Feb 28 2023 Evgeny Sinelnikov <sin@altlinux.org> 0.9.12.3-alt1
|
||||
- Add support of set copyied files to be executed by paths and suffixes (extensions).
|
||||
- Add support of saving comments in ini files.
|
||||
- Add support samba-4.17 python interface for gp.gpclass instead of gpclass.
|
||||
|
||||
* Thu Dec 29 2022 Valery Sinelnikov <greh@altlinux.org> 0.9.12.2-alt2
|
||||
- Fixed a typo in cifs_applier.py
|
||||
|
||||
* Thu Dec 29 2022 Evgeny Sinelnikov <sin@altlinux.org> 0.9.12.2-alt1
|
||||
- Add support of create and delete symlinks in user home directory for mapped
|
||||
network drives in cifs applier
|
||||
- Fix file copy applier support of delete files with substitution
|
||||
|
||||
* Tue Dec 13 2022 Evgeny Sinelnikov <sin@altlinux.org> 0.9.12.1-alt1
|
||||
- Update file copy applier with substitution support
|
||||
- Update translations for several logs
|
||||
|
||||
* Mon Dec 12 2022 Evgeny Sinelnikov <sin@altlinux.org> 0.9.12-alt2
|
||||
- Update release with forgotten changes
|
||||
|
||||
* Sun Dec 11 2022 Evgeny Sinelnikov <sin@altlinux.org> 0.9.12-alt1
|
||||
- Fixed mapped drive maps for user and add support for machine
|
||||
+ Added label option support
|
||||
+ Fixed letters collisions and assigning as Windows
|
||||
- Replaced cifs applier mountpoints into shown gvfs directories:
|
||||
+ /media/gpupdate/Drive - for system shares
|
||||
+ /media/gpupdate/.Drive - for system hidden shares
|
||||
+ /run/media/USERNAME/DriveUser - for user shares
|
||||
+ /run/media/USERNAME/.DriveUser - for user hidden shares
|
||||
- Added network shares support for user
|
||||
- Fixed bug (closes: 44026) for chromium applier
|
||||
- Added keylist handling when generating firefox settings (closes: 44209)
|
||||
- Added a check of the need to scroll DC (scrolling DCs disabled by default!)
|
||||
- Added the ability to generate rules for all polkit actions
|
||||
- Added applier for Yandex.Browser
|
||||
|
||||
* Fri Sep 30 2022 Valery Sinelnikov <greh@altlinux.org> 0.9.11.2-alt1
|
||||
- Fixed formation of the correct path for creating a user directory
|
||||
|
||||
|
Reference in New Issue
Block a user