2009-09-17 18:17:55 +02:00
/*
2009-09-14 19:44:41 +03:00
ldb database library
Copyright ( C ) Simo Sorce 2006 - 2008
Copyright ( C ) Andrew Bartlett < abartlet @ samba . org > 2005 - 2007
Copyright ( C ) Nadezhda Ivanova 2009
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation ; either version 3 of the License , or
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
along with this program . If not , see < http : //www.gnu.org/licenses/>.
*/
/*
* Name : ldb
*
* Component : DS Security descriptor module
*
* Description :
* - Calculate the security descriptor of a newly created object
* - Perform sd recalculation on a move operation
* - Handle sd modification invariants
*
* Author : Nadezhda Ivanova
*/
# include "includes.h"
2010-06-15 00:55:03 +02:00
# include <ldb_module.h>
# include "util/dlinklist.h"
2009-09-14 19:44:41 +03:00
# include "dsdb/samdb/samdb.h"
# include "librpc/ndr/libndr.h"
# include "librpc/gen_ndr/ndr_security.h"
# include "libcli/security/security.h"
# include "auth/auth.h"
# include "param/param.h"
2011-09-20 14:26:36 -07:00
# include "dsdb/samdb/ldb_modules/util.h"
2009-09-14 19:44:41 +03:00
2009-09-19 21:45:07 -07:00
struct descriptor_data {
2009-10-20 13:00:12 +11:00
int _dummy ;
2009-09-19 21:45:07 -07:00
} ;
2009-09-14 19:44:41 +03:00
struct descriptor_context {
2009-11-15 22:31:44 +02:00
struct ldb_module * module ;
struct ldb_request * req ;
2010-11-06 23:04:55 +01:00
struct ldb_message * msg ;
2009-11-15 22:31:44 +02:00
struct ldb_reply * search_res ;
struct ldb_reply * search_oc_res ;
struct ldb_val * parentsd_val ;
2010-11-01 17:51:36 +01:00
struct ldb_message_element * sd_element ;
2009-11-15 22:31:44 +02:00
struct ldb_val * sd_val ;
int ( * step_fn ) ( struct descriptor_context * ) ;
2009-09-14 19:44:41 +03:00
} ;
2011-03-19 00:43:26 +01:00
static struct dom_sid * get_default_ag ( TALLOC_CTX * mem_ctx ,
2009-09-14 19:44:41 +03:00
struct ldb_dn * dn ,
struct security_token * token ,
struct ldb_context * ldb )
{
TALLOC_CTX * tmp_ctx = talloc_new ( mem_ctx ) ;
const struct dom_sid * domain_sid = samdb_domain_sid ( ldb ) ;
struct dom_sid * da_sid = dom_sid_add_rid ( tmp_ctx , domain_sid , DOMAIN_RID_ADMINS ) ;
struct dom_sid * ea_sid = dom_sid_add_rid ( tmp_ctx , domain_sid , DOMAIN_RID_ENTERPRISE_ADMINS ) ;
struct dom_sid * sa_sid = dom_sid_add_rid ( tmp_ctx , domain_sid , DOMAIN_RID_SCHEMA_ADMINS ) ;
struct dom_sid * dag_sid ;
2010-11-16 13:17:32 +01:00
struct ldb_dn * nc_root ;
int ret ;
2009-09-14 19:44:41 +03:00
2010-11-16 13:17:32 +01:00
ret = dsdb_find_nc_root ( ldb , tmp_ctx , dn , & nc_root ) ;
if ( ret ! = LDB_SUCCESS ) {
talloc_free ( tmp_ctx ) ;
return NULL ;
}
2010-04-13 09:18:33 +02:00
2010-11-16 13:17:32 +01:00
if ( ldb_dn_compare ( nc_root , ldb_get_schema_basedn ( ldb ) ) = = 0 ) {
2011-02-22 06:28:19 +02:00
if ( security_token_has_sid ( token , sa_sid ) ) {
2009-09-14 19:44:41 +03:00
dag_sid = dom_sid_dup ( mem_ctx , sa_sid ) ;
2011-02-22 06:28:19 +02:00
} else if ( security_token_has_sid ( token , ea_sid ) ) {
2009-09-14 19:44:41 +03:00
dag_sid = dom_sid_dup ( mem_ctx , ea_sid ) ;
2011-02-22 06:28:19 +02:00
} else if ( security_token_has_sid ( token , da_sid ) ) {
2009-09-14 19:44:41 +03:00
dag_sid = dom_sid_dup ( mem_ctx , da_sid ) ;
2011-02-22 06:28:19 +02:00
} else {
2009-09-14 19:44:41 +03:00
dag_sid = NULL ;
2011-02-22 06:28:19 +02:00
}
2010-11-16 13:17:32 +01:00
} else if ( ldb_dn_compare ( nc_root , ldb_get_config_basedn ( ldb ) ) = = 0 ) {
2011-02-22 06:28:19 +02:00
if ( security_token_has_sid ( token , ea_sid ) ) {
2009-09-14 19:44:41 +03:00
dag_sid = dom_sid_dup ( mem_ctx , ea_sid ) ;
2011-02-22 06:28:19 +02:00
} else if ( security_token_has_sid ( token , da_sid ) ) {
2009-09-14 19:44:41 +03:00
dag_sid = dom_sid_dup ( mem_ctx , da_sid ) ;
2011-02-22 06:28:19 +02:00
} else {
2009-09-14 19:44:41 +03:00
dag_sid = NULL ;
2011-02-22 06:28:19 +02:00
}
2010-11-16 13:17:32 +01:00
} else if ( ldb_dn_compare ( nc_root , ldb_get_default_basedn ( ldb ) ) = = 0 ) {
2011-02-22 06:28:19 +02:00
if ( security_token_has_sid ( token , da_sid ) ) {
2009-09-14 19:44:41 +03:00
dag_sid = dom_sid_dup ( mem_ctx , da_sid ) ;
2011-02-22 06:28:19 +02:00
} else if ( security_token_has_sid ( token , ea_sid ) ) {
2009-09-14 19:44:41 +03:00
dag_sid = dom_sid_dup ( mem_ctx , ea_sid ) ;
2011-02-22 06:28:19 +02:00
} else {
2009-09-14 19:44:41 +03:00
dag_sid = NULL ;
2011-02-22 06:28:19 +02:00
}
2010-11-16 13:17:32 +01:00
} else {
2009-09-14 19:44:41 +03:00
dag_sid = NULL ;
2010-11-16 13:17:32 +01:00
}
2009-09-14 19:44:41 +03:00
talloc_free ( tmp_ctx ) ;
return dag_sid ;
}
static struct security_descriptor * get_sd_unpacked ( struct ldb_module * module , TALLOC_CTX * mem_ctx ,
const struct dsdb_class * objectclass )
{
struct ldb_context * ldb = ldb_module_get_ctx ( module ) ;
struct security_descriptor * sd ;
const struct dom_sid * domain_sid = samdb_domain_sid ( ldb ) ;
if ( ! objectclass - > defaultSecurityDescriptor | | ! domain_sid ) {
return NULL ;
}
sd = sddl_decode ( mem_ctx ,
objectclass - > defaultSecurityDescriptor ,
domain_sid ) ;
return sd ;
}
static struct dom_sid * get_default_group ( TALLOC_CTX * mem_ctx ,
struct ldb_context * ldb ,
struct dom_sid * dag )
{
2009-12-09 15:18:37 +11:00
if ( dsdb_functional_level ( ldb ) > = DS_DOMAIN_FUNCTION_2008 ) {
2009-09-17 18:37:46 +02:00
return dag ;
}
return NULL ;
2009-09-14 19:44:41 +03:00
}
2009-11-20 13:25:13 +02:00
static struct security_descriptor * descr_handle_sd_flags ( TALLOC_CTX * mem_ctx ,
struct security_descriptor * new_sd ,
struct security_descriptor * old_sd ,
uint32_t sd_flags )
{
struct security_descriptor * final_sd ;
2009-11-21 18:40:51 +02:00
/* if there is no control or control == 0 modify everything */
2009-11-20 13:25:13 +02:00
if ( ! sd_flags ) {
return new_sd ;
}
final_sd = talloc_zero ( mem_ctx , struct security_descriptor ) ;
final_sd - > revision = SECURITY_DESCRIPTOR_REVISION_1 ;
final_sd - > type = SEC_DESC_SELF_RELATIVE ;
if ( sd_flags & ( SECINFO_OWNER ) ) {
final_sd - > owner_sid = talloc_memdup ( mem_ctx , new_sd - > owner_sid , sizeof ( struct dom_sid ) ) ;
final_sd - > type | = new_sd - > type & SEC_DESC_OWNER_DEFAULTED ;
}
else if ( old_sd ) {
final_sd - > owner_sid = talloc_memdup ( mem_ctx , old_sd - > owner_sid , sizeof ( struct dom_sid ) ) ;
final_sd - > type | = old_sd - > type & SEC_DESC_OWNER_DEFAULTED ;
}
if ( sd_flags & ( SECINFO_GROUP ) ) {
final_sd - > group_sid = talloc_memdup ( mem_ctx , new_sd - > group_sid , sizeof ( struct dom_sid ) ) ;
final_sd - > type | = new_sd - > type & SEC_DESC_GROUP_DEFAULTED ;
}
else if ( old_sd ) {
final_sd - > group_sid = talloc_memdup ( mem_ctx , old_sd - > group_sid , sizeof ( struct dom_sid ) ) ;
final_sd - > type | = old_sd - > type & SEC_DESC_GROUP_DEFAULTED ;
}
if ( sd_flags & ( SECINFO_SACL ) ) {
final_sd - > sacl = security_acl_dup ( mem_ctx , new_sd - > sacl ) ;
final_sd - > type | = new_sd - > type & ( SEC_DESC_SACL_PRESENT |
SEC_DESC_SACL_DEFAULTED | SEC_DESC_SACL_AUTO_INHERIT_REQ |
SEC_DESC_SACL_AUTO_INHERITED | SEC_DESC_SACL_PROTECTED |
SEC_DESC_SERVER_SECURITY ) ;
}
2010-06-01 15:05:02 +03:00
else if ( old_sd & & old_sd - > sacl ) {
2009-11-20 13:25:13 +02:00
final_sd - > sacl = security_acl_dup ( mem_ctx , old_sd - > sacl ) ;
final_sd - > type | = old_sd - > type & ( SEC_DESC_SACL_PRESENT |
SEC_DESC_SACL_DEFAULTED | SEC_DESC_SACL_AUTO_INHERIT_REQ |
SEC_DESC_SACL_AUTO_INHERITED | SEC_DESC_SACL_PROTECTED |
SEC_DESC_SERVER_SECURITY ) ;
}
if ( sd_flags & ( SECINFO_DACL ) ) {
final_sd - > dacl = security_acl_dup ( mem_ctx , new_sd - > dacl ) ;
final_sd - > type | = new_sd - > type & ( SEC_DESC_DACL_PRESENT |
SEC_DESC_DACL_DEFAULTED | SEC_DESC_DACL_AUTO_INHERIT_REQ |
SEC_DESC_DACL_AUTO_INHERITED | SEC_DESC_DACL_PROTECTED |
SEC_DESC_DACL_TRUSTED ) ;
}
2010-06-01 15:05:02 +03:00
else if ( old_sd & & old_sd - > dacl ) {
2009-11-20 13:25:13 +02:00
final_sd - > dacl = security_acl_dup ( mem_ctx , old_sd - > dacl ) ;
final_sd - > type | = old_sd - > type & ( SEC_DESC_DACL_PRESENT |
SEC_DESC_DACL_DEFAULTED | SEC_DESC_DACL_AUTO_INHERIT_REQ |
SEC_DESC_DACL_AUTO_INHERITED | SEC_DESC_DACL_PROTECTED |
SEC_DESC_DACL_TRUSTED ) ;
}
/* not so sure about this */
final_sd - > type | = new_sd - > type & SEC_DESC_RM_CONTROL_VALID ;
return final_sd ;
}
2009-09-14 19:44:41 +03:00
static DATA_BLOB * get_new_descriptor ( struct ldb_module * module ,
struct ldb_dn * dn ,
TALLOC_CTX * mem_ctx ,
const struct dsdb_class * objectclass ,
2009-09-17 18:37:46 +02:00
const struct ldb_val * parent ,
2011-02-21 17:17:12 +02:00
const struct ldb_val * object ,
const struct ldb_val * old_sd ,
2009-11-20 13:25:13 +02:00
uint32_t sd_flags )
2009-09-14 19:44:41 +03:00
{
struct security_descriptor * user_descriptor = NULL , * parent_descriptor = NULL ;
2009-11-20 13:25:13 +02:00
struct security_descriptor * old_descriptor = NULL ;
struct security_descriptor * new_sd , * final_sd ;
2009-09-14 19:44:41 +03:00
DATA_BLOB * linear_sd ;
enum ndr_err_code ndr_err ;
struct ldb_context * ldb = ldb_module_get_ctx ( module ) ;
struct auth_session_info * session_info
= ldb_get_opaque ( ldb , " sessionInfo " ) ;
const struct dom_sid * domain_sid = samdb_domain_sid ( ldb ) ;
char * sddl_sd ;
struct dom_sid * default_owner ;
struct dom_sid * default_group ;
2009-09-21 20:08:52 -07:00
if ( object ) {
2009-09-14 19:44:41 +03:00
user_descriptor = talloc ( mem_ctx , struct security_descriptor ) ;
2009-11-20 13:25:13 +02:00
if ( ! user_descriptor ) {
2009-09-14 19:44:41 +03:00
return NULL ;
2009-11-20 13:25:13 +02:00
}
2010-05-09 17:20:01 +02:00
ndr_err = ndr_pull_struct_blob ( object , user_descriptor ,
2009-09-14 19:44:41 +03:00
user_descriptor ,
( ndr_pull_flags_fn_t ) ndr_pull_security_descriptor ) ;
2009-11-20 13:25:13 +02:00
if ( ! NDR_ERR_CODE_IS_SUCCESS ( ndr_err ) ) {
2009-09-14 19:44:41 +03:00
talloc_free ( user_descriptor ) ;
return NULL ;
}
2009-09-21 20:08:52 -07:00
} else {
2009-09-14 19:44:41 +03:00
user_descriptor = get_sd_unpacked ( module , mem_ctx , objectclass ) ;
2009-09-21 20:08:52 -07:00
}
2009-09-14 19:44:41 +03:00
2009-11-20 13:25:13 +02:00
if ( old_sd ) {
old_descriptor = talloc ( mem_ctx , struct security_descriptor ) ;
if ( ! old_descriptor ) {
return NULL ;
}
2010-05-09 17:20:01 +02:00
ndr_err = ndr_pull_struct_blob ( old_sd , old_descriptor ,
2009-11-20 13:25:13 +02:00
old_descriptor ,
( ndr_pull_flags_fn_t ) ndr_pull_security_descriptor ) ;
if ( ! NDR_ERR_CODE_IS_SUCCESS ( ndr_err ) ) {
talloc_free ( old_descriptor ) ;
return NULL ;
}
}
if ( parent ) {
2009-09-14 19:44:41 +03:00
parent_descriptor = talloc ( mem_ctx , struct security_descriptor ) ;
2009-11-20 13:25:13 +02:00
if ( ! parent_descriptor ) {
2009-09-14 19:44:41 +03:00
return NULL ;
2009-11-20 13:25:13 +02:00
}
2010-05-09 17:20:01 +02:00
ndr_err = ndr_pull_struct_blob ( parent , parent_descriptor ,
2009-09-14 19:44:41 +03:00
parent_descriptor ,
( ndr_pull_flags_fn_t ) ndr_pull_security_descriptor ) ;
2009-11-20 13:25:13 +02:00
if ( ! NDR_ERR_CODE_IS_SUCCESS ( ndr_err ) ) {
2009-09-14 19:44:41 +03:00
talloc_free ( parent_descriptor ) ;
return NULL ;
}
}
2009-11-20 13:25:13 +02:00
2009-09-14 19:44:41 +03:00
default_owner = get_default_ag ( mem_ctx , dn ,
session_info - > security_token , ldb ) ;
default_group = get_default_group ( mem_ctx , ldb , default_owner ) ;
new_sd = create_security_descriptor ( mem_ctx , parent_descriptor , user_descriptor , true ,
NULL , SEC_DACL_AUTO_INHERIT | SEC_SACL_AUTO_INHERIT ,
session_info - > security_token ,
default_owner , default_group ,
map_generic_rights_ds ) ;
2009-11-20 13:25:13 +02:00
if ( ! new_sd ) {
2009-09-14 19:44:41 +03:00
return NULL ;
2009-11-20 13:25:13 +02:00
}
final_sd = descr_handle_sd_flags ( mem_ctx , new_sd , old_descriptor , sd_flags ) ;
2009-09-14 19:44:41 +03:00
2009-11-20 13:25:13 +02:00
if ( ! final_sd ) {
return NULL ;
}
2010-01-02 16:53:20 +11:00
if ( final_sd - > dacl ) {
final_sd - > dacl - > revision = SECURITY_ACL_REVISION_ADS ;
}
if ( final_sd - > sacl ) {
final_sd - > sacl - > revision = SECURITY_ACL_REVISION_ADS ;
}
2009-11-20 13:25:13 +02:00
sddl_sd = sddl_encode ( mem_ctx , final_sd , domain_sid ) ;
2009-11-15 22:31:44 +02:00
DEBUG ( 10 , ( " Object %s created with desriptor %s \n \n " , ldb_dn_get_linearized ( dn ) , sddl_sd ) ) ;
2009-09-14 19:44:41 +03:00
linear_sd = talloc ( mem_ctx , DATA_BLOB ) ;
if ( ! linear_sd ) {
return NULL ;
}
ndr_err = ndr_push_struct_blob ( linear_sd , mem_ctx ,
2009-11-20 13:25:13 +02:00
final_sd ,
2009-09-14 19:44:41 +03:00
( ndr_push_flags_fn_t ) ndr_push_security_descriptor ) ;
if ( ! NDR_ERR_CODE_IS_SUCCESS ( ndr_err ) ) {
return NULL ;
}
return linear_sd ;
}
2009-11-21 18:40:51 +02:00
static DATA_BLOB * descr_get_descriptor_to_show ( struct ldb_module * module ,
TALLOC_CTX * mem_ctx ,
struct ldb_val * sd ,
uint32_t sd_flags )
{
struct security_descriptor * old_sd , * final_sd ;
DATA_BLOB * linear_sd ;
enum ndr_err_code ndr_err ;
old_sd = talloc ( mem_ctx , struct security_descriptor ) ;
if ( ! old_sd ) {
return NULL ;
}
2010-05-09 17:20:01 +02:00
ndr_err = ndr_pull_struct_blob ( sd , old_sd ,
2009-11-21 18:40:51 +02:00
old_sd ,
( ndr_pull_flags_fn_t ) ndr_pull_security_descriptor ) ;
if ( ! NDR_ERR_CODE_IS_SUCCESS ( ndr_err ) ) {
talloc_free ( old_sd ) ;
return NULL ;
}
final_sd = descr_handle_sd_flags ( mem_ctx , old_sd , NULL , sd_flags ) ;
if ( ! final_sd ) {
return NULL ;
}
linear_sd = talloc ( mem_ctx , DATA_BLOB ) ;
if ( ! linear_sd ) {
return NULL ;
}
ndr_err = ndr_push_struct_blob ( linear_sd , mem_ctx ,
final_sd ,
( ndr_push_flags_fn_t ) ndr_push_security_descriptor ) ;
if ( ! NDR_ERR_CODE_IS_SUCCESS ( ndr_err ) ) {
return NULL ;
}
return linear_sd ;
}
2009-09-14 19:44:41 +03:00
static struct descriptor_context * descriptor_init_context ( struct ldb_module * module ,
struct ldb_request * req )
{
struct ldb_context * ldb ;
struct descriptor_context * ac ;
ldb = ldb_module_get_ctx ( module ) ;
ac = talloc_zero ( req , struct descriptor_context ) ;
if ( ac = = NULL ) {
ldb_set_errstring ( ldb , " Out of Memory " ) ;
return NULL ;
}
ac - > module = module ;
ac - > req = req ;
return ac ;
}
2009-11-21 18:40:51 +02:00
static int descriptor_search_callback ( struct ldb_request * req , struct ldb_reply * ares )
{
struct descriptor_context * ac ;
struct ldb_control * sd_control ;
struct ldb_val * sd_val = NULL ;
struct ldb_message_element * sd_el ;
DATA_BLOB * show_sd ;
int ret ;
uint32_t sd_flags = 0 ;
ac = talloc_get_type ( req - > context , struct descriptor_context ) ;
if ( ! ares ) {
ret = LDB_ERR_OPERATIONS_ERROR ;
goto fail ;
}
if ( ares - > error ! = LDB_SUCCESS ) {
return ldb_module_done ( ac - > req , ares - > controls ,
ares - > response , ares - > error ) ;
}
sd_control = ldb_request_get_control ( ac - > req , LDB_CONTROL_SD_FLAGS_OID ) ;
2009-11-22 13:36:35 +02:00
if ( sd_control ) {
struct ldb_sd_flags_control * sdctr = ( struct ldb_sd_flags_control * ) sd_control - > data ;
sd_flags = sdctr - > secinfo_flags ;
/* we only care for the last 4 bits */
sd_flags = sd_flags & 0x0000000F ;
2009-12-16 20:39:18 +11:00
if ( sd_flags = = 0 ) {
/* MS-ADTS 3.1.1.3.4.1.11 says that no bits
equals all 4 bits */
sd_flags = 0xF ;
}
2009-11-22 13:36:35 +02:00
}
2009-11-21 18:40:51 +02:00
switch ( ares - > type ) {
case LDB_REPLY_ENTRY :
if ( sd_flags ! = 0 ) {
sd_el = ldb_msg_find_element ( ares - > message , " nTSecurityDescriptor " ) ;
if ( sd_el ) {
sd_val = sd_el - > values ;
}
}
if ( sd_val ) {
show_sd = descr_get_descriptor_to_show ( ac - > module , ac - > req ,
sd_val , sd_flags ) ;
if ( ! show_sd ) {
ret = LDB_ERR_OPERATIONS_ERROR ;
goto fail ;
}
ldb_msg_remove_attr ( ares - > message , " nTSecurityDescriptor " ) ;
ret = ldb_msg_add_steal_value ( ares - > message , " nTSecurityDescriptor " , show_sd ) ;
if ( ret ! = LDB_SUCCESS ) {
goto fail ;
}
}
return ldb_module_send_entry ( ac - > req , ares - > message , ares - > controls ) ;
case LDB_REPLY_REFERRAL :
2010-11-06 22:27:13 +01:00
return ldb_module_send_referral ( ac - > req , ares - > referral ) ;
2009-11-21 18:40:51 +02:00
case LDB_REPLY_DONE :
return ldb_module_done ( ac - > req , ares - > controls ,
ares - > response , ares - > error ) ;
}
fail :
2010-12-17 08:43:33 +11:00
talloc_free ( ares ) ;
2009-11-21 18:40:51 +02:00
return ldb_module_done ( ac - > req , NULL , NULL , ret ) ;
}
2011-02-21 17:04:27 +02:00
static int descriptor_add ( struct ldb_module * module , struct ldb_request * req )
{
struct ldb_context * ldb ;
struct ldb_request * add_req ;
struct ldb_message * msg ;
struct ldb_result * parent_res ;
const struct ldb_val * parent_sd = NULL ;
const struct ldb_val * user_sd ;
struct ldb_dn * parent_dn , * dn , * nc_root ;
struct ldb_message_element * objectclass_element , * sd_element ;
int ret ;
const struct dsdb_schema * schema ;
DATA_BLOB * sd ;
const struct dsdb_class * objectclass ;
static const char * const parent_attrs [ ] = { " nTSecurityDescriptor " , NULL } ;
2011-11-16 00:56:28 +01:00
uint32_t instanceType ;
bool isNC = false ;
2011-02-21 17:04:27 +02:00
ldb = ldb_module_get_ctx ( module ) ;
dn = req - > op . add . message - > dn ;
user_sd = ldb_msg_find_ldb_val ( req - > op . add . message , " nTSecurityDescriptor " ) ;
sd_element = ldb_msg_find_element ( req - > op . add . message , " nTSecurityDescriptor " ) ;
/* nTSecurityDescriptor without a value is an error, letting through so it is handled */
if ( user_sd = = NULL & & sd_element ) {
return ldb_next_request ( module , req ) ;
}
ldb_debug ( ldb , LDB_DEBUG_TRACE , " descriptor_add: %s \n " , ldb_dn_get_linearized ( dn ) ) ;
/* do not manipulate our control entries */
if ( ldb_dn_is_special ( dn ) ) {
return ldb_next_request ( module , req ) ;
}
2011-11-16 00:56:28 +01:00
instanceType = ldb_msg_find_attr_as_uint ( req - > op . add . message , " instanceType " , 0 ) ;
if ( instanceType & INSTANCE_TYPE_IS_NC_HEAD ) {
isNC = true ;
2011-02-21 17:04:27 +02:00
}
2011-11-16 00:56:28 +01:00
if ( ! isNC ) {
ret = dsdb_find_nc_root ( ldb , req , dn , & nc_root ) ;
if ( ret ! = LDB_SUCCESS ) {
ldb_debug ( ldb , LDB_DEBUG_TRACE , " descriptor_add: Could not find NC root for %s \n " ,
ldb_dn_get_linearized ( dn ) ) ;
return ret ;
}
if ( ldb_dn_compare ( dn , nc_root ) = = 0 ) {
DEBUG ( 0 , ( " Found DN %s being a NC by the old method \n " , ldb_dn_get_linearized ( dn ) ) ) ;
isNC = true ;
}
2011-02-21 17:04:27 +02:00
}
2011-11-16 00:56:28 +01:00
if ( isNC ) {
DEBUG ( 2 , ( " DN: %s is a NC \n " , ldb_dn_get_linearized ( dn ) ) ) ;
}
if ( ! isNC ) {
/* if the object has a parent, retrieve its SD to
* use for calculation . Unfortunately we do not yet have
* instanceType , so we use dsdb_find_nc_root . */
parent_dn = ldb_dn_get_parent ( req , dn ) ;
if ( parent_dn = = NULL ) {
return ldb_oom ( ldb ) ;
}
2011-02-21 17:04:27 +02:00
/* we aren't any NC */
ret = dsdb_module_search_dn ( module , req , & parent_res , parent_dn ,
parent_attrs ,
DSDB_FLAG_NEXT_MODULE ,
req ) ;
if ( ret ! = LDB_SUCCESS ) {
ldb_debug ( ldb , LDB_DEBUG_TRACE , " descriptor_add: Could not find SD for %s \n " ,
ldb_dn_get_linearized ( parent_dn ) ) ;
return ret ;
}
if ( parent_res - > count ! = 1 ) {
return ldb_operr ( ldb ) ;
}
parent_sd = ldb_msg_find_ldb_val ( parent_res - > msgs [ 0 ] , " nTSecurityDescriptor " ) ;
}
schema = dsdb_get_schema ( ldb , req ) ;
objectclass_element = ldb_msg_find_element ( req - > op . add . message , " objectClass " ) ;
if ( objectclass_element = = NULL ) {
return ldb_operr ( ldb ) ;
}
2012-04-04 22:24:16 +02:00
objectclass = dsdb_get_last_structural_class ( schema ,
objectclass_element ) ;
2011-02-21 17:04:27 +02:00
if ( objectclass = = NULL ) {
return ldb_operr ( ldb ) ;
}
sd = get_new_descriptor ( module , dn , req ,
objectclass , parent_sd ,
user_sd , NULL , 0 ) ;
msg = ldb_msg_copy_shallow ( req , req - > op . add . message ) ;
if ( sd ! = NULL ) {
if ( sd_element ! = NULL ) {
sd_element - > values [ 0 ] = * sd ;
} else {
ret = ldb_msg_add_steal_value ( msg ,
" nTSecurityDescriptor " ,
sd ) ;
if ( ret ! = LDB_SUCCESS ) {
return ret ;
}
}
}
ret = ldb_build_add_req ( & add_req , ldb , req ,
msg ,
req - > controls ,
req , dsdb_next_callback ,
req ) ;
LDB_REQ_SET_LOCATION ( add_req ) ;
if ( ret ! = LDB_SUCCESS ) {
return ldb_error ( ldb , ret ,
" descriptor_add: Error creating new add request. " ) ;
}
return ldb_next_request ( module , add_req ) ;
}
2011-02-21 17:08:44 +02:00
static int descriptor_modify ( struct ldb_module * module , struct ldb_request * req )
{
struct ldb_context * ldb ;
2012-05-11 14:25:49 -07:00
struct ldb_control * sd_recalculate_control , * sd_flags_control , * show_deleted_control ;
2011-02-21 17:08:44 +02:00
struct ldb_request * mod_req ;
struct ldb_message * msg ;
struct ldb_result * current_res , * parent_res ;
const struct ldb_val * old_sd = NULL ;
const struct ldb_val * parent_sd = NULL ;
const struct ldb_val * user_sd ;
struct ldb_dn * parent_dn , * dn ;
struct ldb_message_element * objectclass_element ;
int ret ;
2012-05-11 14:25:49 -07:00
uint32_t instanceType , sd_flags = 0 , flags ;
2011-02-21 17:08:44 +02:00
const struct dsdb_schema * schema ;
DATA_BLOB * sd ;
const struct dsdb_class * objectclass ;
static const char * const parent_attrs [ ] = { " nTSecurityDescriptor " , NULL } ;
static const char * const current_attrs [ ] = { " nTSecurityDescriptor " ,
" instanceType " ,
" objectClass " , NULL } ;
ldb = ldb_module_get_ctx ( module ) ;
dn = req - > op . mod . message - > dn ;
user_sd = ldb_msg_find_ldb_val ( req - > op . mod . message , " nTSecurityDescriptor " ) ;
/* This control forces the recalculation of the SD also when
* no modification is performed . */
2012-05-11 14:25:49 -07:00
show_deleted_control = ldb_request_get_control ( req ,
LDB_CONTROL_SHOW_DELETED_OID ) ;
2011-02-21 17:08:44 +02:00
sd_recalculate_control = ldb_request_get_control ( req ,
LDB_CONTROL_RECALCULATE_SD_OID ) ;
if ( ! user_sd & & ! sd_recalculate_control ) {
return ldb_next_request ( module , req ) ;
}
ldb_debug ( ldb , LDB_DEBUG_TRACE , " descriptor_modify: %s \n " , ldb_dn_get_linearized ( dn ) ) ;
/* do not manipulate our control entries */
if ( ldb_dn_is_special ( dn ) ) {
return ldb_next_request ( module , req ) ;
}
2012-05-11 14:25:49 -07:00
flags = DSDB_FLAG_NEXT_MODULE ;
if ( show_deleted_control ) {
flags | = DSDB_SEARCH_SHOW_DELETED ;
}
2011-02-21 17:08:44 +02:00
ret = dsdb_module_search_dn ( module , req , & current_res , dn ,
current_attrs ,
2012-05-11 14:25:49 -07:00
flags ,
2011-02-21 17:08:44 +02:00
req ) ;
if ( ret ! = LDB_SUCCESS ) {
ldb_debug ( ldb , LDB_DEBUG_ERROR , " descriptor_modify: Could not find %s \n " ,
ldb_dn_get_linearized ( dn ) ) ;
return ret ;
}
instanceType = ldb_msg_find_attr_as_uint ( current_res - > msgs [ 0 ] ,
" instanceType " , 0 ) ;
/* if the object has a parent, retrieve its SD to
* use for calculation */
if ( ! ldb_dn_is_null ( current_res - > msgs [ 0 ] - > dn ) & &
! ( instanceType & INSTANCE_TYPE_IS_NC_HEAD ) ) {
parent_dn = ldb_dn_get_parent ( req , dn ) ;
if ( parent_dn = = NULL ) {
return ldb_oom ( ldb ) ;
}
ret = dsdb_module_search_dn ( module , req , & parent_res , parent_dn ,
parent_attrs ,
DSDB_FLAG_NEXT_MODULE ,
req ) ;
if ( ret ! = LDB_SUCCESS ) {
ldb_debug ( ldb , LDB_DEBUG_ERROR , " descriptor_modify: Could not find SD for %s \n " ,
ldb_dn_get_linearized ( parent_dn ) ) ;
return ret ;
}
if ( parent_res - > count ! = 1 ) {
return ldb_operr ( ldb ) ;
}
parent_sd = ldb_msg_find_ldb_val ( parent_res - > msgs [ 0 ] , " nTSecurityDescriptor " ) ;
}
sd_flags_control = ldb_request_get_control ( req , LDB_CONTROL_SD_FLAGS_OID ) ;
schema = dsdb_get_schema ( ldb , req ) ;
objectclass_element = ldb_msg_find_element ( current_res - > msgs [ 0 ] , " objectClass " ) ;
if ( objectclass_element = = NULL ) {
return ldb_operr ( ldb ) ;
}
2012-04-04 22:24:16 +02:00
objectclass = dsdb_get_last_structural_class ( schema ,
objectclass_element ) ;
2011-02-21 17:08:44 +02:00
if ( objectclass = = NULL ) {
return ldb_operr ( ldb ) ;
}
if ( sd_flags_control ) {
struct ldb_sd_flags_control * sdctr = ( struct ldb_sd_flags_control * ) sd_flags_control - > data ;
sd_flags = sdctr - > secinfo_flags ;
/* we only care for the last 4 bits */
sd_flags = sd_flags & 0x0000000F ;
}
if ( sd_flags ! = 0 ) {
old_sd = ldb_msg_find_ldb_val ( current_res - > msgs [ 0 ] , " nTSecurityDescriptor " ) ;
}
sd = get_new_descriptor ( module , dn , req ,
objectclass , parent_sd ,
user_sd , old_sd , sd_flags ) ;
msg = ldb_msg_copy_shallow ( req , req - > op . mod . message ) ;
if ( sd ! = NULL ) {
struct ldb_message_element * sd_element ;
if ( user_sd ! = NULL ) {
sd_element = ldb_msg_find_element ( msg ,
" nTSecurityDescriptor " ) ;
sd_element - > values [ 0 ] = * sd ;
} else if ( sd_recalculate_control ! = NULL ) {
/* In this branch we really do force the recalculation
* of the SD */
ldb_msg_remove_attr ( msg , " nTSecurityDescriptor " ) ;
ret = ldb_msg_add_steal_value ( msg ,
" nTSecurityDescriptor " ,
sd ) ;
if ( ret ! = LDB_SUCCESS ) {
return ldb_error ( ldb , ret ,
" descriptor_modify: Could not replace SD value in message. " ) ;
}
sd_element = ldb_msg_find_element ( msg ,
" nTSecurityDescriptor " ) ;
sd_element - > flags = LDB_FLAG_MOD_REPLACE ;
}
}
/* mark the controls as non-critical since we've handled them */
if ( sd_flags_control ! = NULL ) {
sd_flags_control - > critical = 0 ;
}
if ( sd_recalculate_control ! = NULL ) {
sd_recalculate_control - > critical = 0 ;
}
ret = ldb_build_mod_req ( & mod_req , ldb , req ,
msg ,
req - > controls ,
req ,
dsdb_next_callback ,
req ) ;
LDB_REQ_SET_LOCATION ( mod_req ) ;
if ( ret ! = LDB_SUCCESS ) {
return ret ;
}
return ldb_next_request ( module , mod_req ) ;
}
2009-11-21 18:40:51 +02:00
static int descriptor_search ( struct ldb_module * module , struct ldb_request * req )
{
int ret ;
struct ldb_context * ldb ;
struct ldb_control * sd_control ;
struct ldb_request * down_req ;
struct descriptor_context * ac ;
sd_control = ldb_request_get_control ( req , LDB_CONTROL_SD_FLAGS_OID ) ;
if ( ! sd_control ) {
return ldb_next_request ( module , req ) ;
}
ldb = ldb_module_get_ctx ( module ) ;
ac = descriptor_init_context ( module , req ) ;
if ( ac = = NULL ) {
2010-07-06 13:21:54 +10:00
return ldb_operr ( ldb ) ;
2009-11-21 18:40:51 +02:00
}
ret = ldb_build_search_req_ex ( & down_req , ldb , ac ,
req - > op . search . base ,
req - > op . search . scope ,
req - > op . search . tree ,
req - > op . search . attrs ,
req - > controls ,
ac , descriptor_search_callback ,
ac - > req ) ;
2010-09-24 12:09:26 -07:00
LDB_REQ_SET_LOCATION ( down_req ) ;
2009-11-21 18:40:51 +02:00
if ( ret ! = LDB_SUCCESS ) {
return ret ;
}
2009-12-16 20:39:18 +11:00
/* mark it as handled */
2009-11-21 18:40:51 +02:00
if ( sd_control ) {
2009-12-16 20:39:18 +11:00
sd_control - > critical = 0 ;
2009-11-21 18:40:51 +02:00
}
return ldb_next_request ( ac - > module , down_req ) ;
}
2009-09-14 19:44:41 +03:00
/* TODO */
static int descriptor_rename ( struct ldb_module * module , struct ldb_request * req )
{
struct ldb_context * ldb = ldb_module_get_ctx ( module ) ;
2009-11-03 11:21:05 +02:00
ldb_debug ( ldb , LDB_DEBUG_TRACE , " descriptor_rename: %s \n " , ldb_dn_get_linearized ( req - > op . rename . olddn ) ) ;
2010-11-16 13:25:34 +01:00
/* do not manipulate our control entries */
if ( ldb_dn_is_special ( req - > op . rename . olddn ) ) {
return ldb_next_request ( module , req ) ;
}
2009-09-14 19:44:41 +03:00
return ldb_next_request ( module , req ) ;
}
2009-09-19 21:45:07 -07:00
static int descriptor_init ( struct ldb_module * module )
{
2009-11-21 18:40:51 +02:00
int ret = ldb_mod_register_control ( module , LDB_CONTROL_SD_FLAGS_OID ) ;
struct ldb_context * ldb = ldb_module_get_ctx ( module ) ;
if ( ret ! = LDB_SUCCESS ) {
ldb_debug ( ldb , LDB_DEBUG_ERROR ,
" descriptor: Unable to register control with rootdse! \n " ) ;
2010-07-06 13:21:54 +10:00
return ldb_operr ( ldb ) ;
2009-11-21 18:40:51 +02:00
}
2009-09-19 21:45:07 -07:00
return ldb_next_init ( module ) ;
}
2010-11-01 15:28:02 +11:00
static const struct ldb_module_ops ldb_descriptor_module_ops = {
2009-11-21 18:40:51 +02:00
. name = " descriptor " ,
. search = descriptor_search ,
2011-02-21 17:04:27 +02:00
. add = descriptor_add ,
2011-02-21 17:08:44 +02:00
. modify = descriptor_modify ,
2009-09-14 19:44:41 +03:00
. rename = descriptor_rename ,
2009-09-19 21:45:07 -07:00
. init_context = descriptor_init
2009-09-14 19:44:41 +03:00
} ;
2010-11-01 15:28:02 +11:00
int ldb_descriptor_module_init ( const char * version )
{
2010-11-01 22:30:45 +11:00
LDB_MODULE_CHECK_VERSION ( version ) ;
2010-11-01 15:28:02 +11:00
return ldb_register_module ( & ldb_descriptor_module_ops ) ;
}