2009-09-17 18:17:55 +02:00
/*
2009-09-14 19:44:41 +03:00
ldb database library
Copyright ( C ) Simo Sorce 2006 - 2008
Copyright ( C ) Andrew Bartlett < abartlet @ samba . org > 2005 - 2007
Copyright ( C ) Nadezhda Ivanova 2009
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation ; either version 3 of the License , or
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
along with this program . If not , see < http : //www.gnu.org/licenses/>.
*/
/*
* Name : ldb
*
* Component : DS Security descriptor module
*
* Description :
* - Calculate the security descriptor of a newly created object
* - Perform sd recalculation on a move operation
* - Handle sd modification invariants
*
* Author : Nadezhda Ivanova
*/
# include "includes.h"
2010-06-15 00:55:03 +02:00
# include <ldb_module.h>
# include "util/dlinklist.h"
2009-09-14 19:44:41 +03:00
# include "dsdb/samdb/samdb.h"
# include "librpc/ndr/libndr.h"
# include "librpc/gen_ndr/ndr_security.h"
# include "libcli/security/security.h"
# include "auth/auth.h"
# include "param/param.h"
2011-09-20 14:26:36 -07:00
# include "dsdb/samdb/ldb_modules/util.h"
2009-09-14 19:44:41 +03:00
2009-09-19 21:45:07 -07:00
struct descriptor_data {
2009-10-20 13:00:12 +11:00
int _dummy ;
2009-09-19 21:45:07 -07:00
} ;
2009-09-14 19:44:41 +03:00
struct descriptor_context {
2009-11-15 22:31:44 +02:00
struct ldb_module * module ;
struct ldb_request * req ;
2010-11-06 23:04:55 +01:00
struct ldb_message * msg ;
2009-11-15 22:31:44 +02:00
struct ldb_reply * search_res ;
struct ldb_reply * search_oc_res ;
struct ldb_val * parentsd_val ;
2010-11-01 17:51:36 +01:00
struct ldb_message_element * sd_element ;
2009-11-15 22:31:44 +02:00
struct ldb_val * sd_val ;
2012-11-21 13:05:31 +01:00
uint32_t sd_flags ;
2009-11-15 22:31:44 +02:00
int ( * step_fn ) ( struct descriptor_context * ) ;
2009-09-14 19:44:41 +03:00
} ;
2011-03-19 00:43:26 +01:00
static struct dom_sid * get_default_ag ( TALLOC_CTX * mem_ctx ,
2009-09-14 19:44:41 +03:00
struct ldb_dn * dn ,
struct security_token * token ,
struct ldb_context * ldb )
{
TALLOC_CTX * tmp_ctx = talloc_new ( mem_ctx ) ;
const struct dom_sid * domain_sid = samdb_domain_sid ( ldb ) ;
struct dom_sid * da_sid = dom_sid_add_rid ( tmp_ctx , domain_sid , DOMAIN_RID_ADMINS ) ;
struct dom_sid * ea_sid = dom_sid_add_rid ( tmp_ctx , domain_sid , DOMAIN_RID_ENTERPRISE_ADMINS ) ;
struct dom_sid * sa_sid = dom_sid_add_rid ( tmp_ctx , domain_sid , DOMAIN_RID_SCHEMA_ADMINS ) ;
struct dom_sid * dag_sid ;
2010-11-16 13:17:32 +01:00
struct ldb_dn * nc_root ;
int ret ;
2009-09-14 19:44:41 +03:00
2010-11-16 13:17:32 +01:00
ret = dsdb_find_nc_root ( ldb , tmp_ctx , dn , & nc_root ) ;
if ( ret ! = LDB_SUCCESS ) {
talloc_free ( tmp_ctx ) ;
return NULL ;
}
2010-04-13 09:18:33 +02:00
2010-11-16 13:17:32 +01:00
if ( ldb_dn_compare ( nc_root , ldb_get_schema_basedn ( ldb ) ) = = 0 ) {
2011-02-22 06:28:19 +02:00
if ( security_token_has_sid ( token , sa_sid ) ) {
2009-09-14 19:44:41 +03:00
dag_sid = dom_sid_dup ( mem_ctx , sa_sid ) ;
2011-02-22 06:28:19 +02:00
} else if ( security_token_has_sid ( token , ea_sid ) ) {
2009-09-14 19:44:41 +03:00
dag_sid = dom_sid_dup ( mem_ctx , ea_sid ) ;
2011-02-22 06:28:19 +02:00
} else if ( security_token_has_sid ( token , da_sid ) ) {
2009-09-14 19:44:41 +03:00
dag_sid = dom_sid_dup ( mem_ctx , da_sid ) ;
2012-11-22 14:07:04 +01:00
} else if ( security_token_is_system ( token ) ) {
dag_sid = dom_sid_dup ( mem_ctx , sa_sid ) ;
2011-02-22 06:28:19 +02:00
} else {
2009-09-14 19:44:41 +03:00
dag_sid = NULL ;
2011-02-22 06:28:19 +02:00
}
2010-11-16 13:17:32 +01:00
} else if ( ldb_dn_compare ( nc_root , ldb_get_config_basedn ( ldb ) ) = = 0 ) {
2011-02-22 06:28:19 +02:00
if ( security_token_has_sid ( token , ea_sid ) ) {
2009-09-14 19:44:41 +03:00
dag_sid = dom_sid_dup ( mem_ctx , ea_sid ) ;
2011-02-22 06:28:19 +02:00
} else if ( security_token_has_sid ( token , da_sid ) ) {
2009-09-14 19:44:41 +03:00
dag_sid = dom_sid_dup ( mem_ctx , da_sid ) ;
2012-11-22 14:07:04 +01:00
} else if ( security_token_is_system ( token ) ) {
dag_sid = dom_sid_dup ( mem_ctx , ea_sid ) ;
2011-02-22 06:28:19 +02:00
} else {
2009-09-14 19:44:41 +03:00
dag_sid = NULL ;
2011-02-22 06:28:19 +02:00
}
2010-11-16 13:17:32 +01:00
} else if ( ldb_dn_compare ( nc_root , ldb_get_default_basedn ( ldb ) ) = = 0 ) {
2011-02-22 06:28:19 +02:00
if ( security_token_has_sid ( token , da_sid ) ) {
2009-09-14 19:44:41 +03:00
dag_sid = dom_sid_dup ( mem_ctx , da_sid ) ;
2011-02-22 06:28:19 +02:00
} else if ( security_token_has_sid ( token , ea_sid ) ) {
2009-09-14 19:44:41 +03:00
dag_sid = dom_sid_dup ( mem_ctx , ea_sid ) ;
2012-11-22 14:07:04 +01:00
} else if ( security_token_is_system ( token ) ) {
dag_sid = dom_sid_dup ( mem_ctx , da_sid ) ;
2011-02-22 06:28:19 +02:00
} else {
2009-09-14 19:44:41 +03:00
dag_sid = NULL ;
2011-02-22 06:28:19 +02:00
}
2010-11-16 13:17:32 +01:00
} else {
2009-09-14 19:44:41 +03:00
dag_sid = NULL ;
2010-11-16 13:17:32 +01:00
}
2009-09-14 19:44:41 +03:00
talloc_free ( tmp_ctx ) ;
return dag_sid ;
}
static struct security_descriptor * get_sd_unpacked ( struct ldb_module * module , TALLOC_CTX * mem_ctx ,
const struct dsdb_class * objectclass )
{
struct ldb_context * ldb = ldb_module_get_ctx ( module ) ;
struct security_descriptor * sd ;
const struct dom_sid * domain_sid = samdb_domain_sid ( ldb ) ;
if ( ! objectclass - > defaultSecurityDescriptor | | ! domain_sid ) {
return NULL ;
}
sd = sddl_decode ( mem_ctx ,
objectclass - > defaultSecurityDescriptor ,
domain_sid ) ;
return sd ;
}
static struct dom_sid * get_default_group ( TALLOC_CTX * mem_ctx ,
struct ldb_context * ldb ,
struct dom_sid * dag )
{
2009-12-09 15:18:37 +11:00
if ( dsdb_functional_level ( ldb ) > = DS_DOMAIN_FUNCTION_2008 ) {
2009-09-17 18:37:46 +02:00
return dag ;
}
return NULL ;
2009-09-14 19:44:41 +03:00
}
2009-11-20 13:25:13 +02:00
static struct security_descriptor * descr_handle_sd_flags ( TALLOC_CTX * mem_ctx ,
struct security_descriptor * new_sd ,
struct security_descriptor * old_sd ,
uint32_t sd_flags )
{
struct security_descriptor * final_sd ;
2009-11-21 18:40:51 +02:00
/* if there is no control or control == 0 modify everything */
2009-11-20 13:25:13 +02:00
if ( ! sd_flags ) {
return new_sd ;
}
final_sd = talloc_zero ( mem_ctx , struct security_descriptor ) ;
final_sd - > revision = SECURITY_DESCRIPTOR_REVISION_1 ;
final_sd - > type = SEC_DESC_SELF_RELATIVE ;
if ( sd_flags & ( SECINFO_OWNER ) ) {
final_sd - > owner_sid = talloc_memdup ( mem_ctx , new_sd - > owner_sid , sizeof ( struct dom_sid ) ) ;
final_sd - > type | = new_sd - > type & SEC_DESC_OWNER_DEFAULTED ;
}
else if ( old_sd ) {
final_sd - > owner_sid = talloc_memdup ( mem_ctx , old_sd - > owner_sid , sizeof ( struct dom_sid ) ) ;
final_sd - > type | = old_sd - > type & SEC_DESC_OWNER_DEFAULTED ;
}
if ( sd_flags & ( SECINFO_GROUP ) ) {
final_sd - > group_sid = talloc_memdup ( mem_ctx , new_sd - > group_sid , sizeof ( struct dom_sid ) ) ;
final_sd - > type | = new_sd - > type & SEC_DESC_GROUP_DEFAULTED ;
}
else if ( old_sd ) {
final_sd - > group_sid = talloc_memdup ( mem_ctx , old_sd - > group_sid , sizeof ( struct dom_sid ) ) ;
final_sd - > type | = old_sd - > type & SEC_DESC_GROUP_DEFAULTED ;
}
if ( sd_flags & ( SECINFO_SACL ) ) {
final_sd - > sacl = security_acl_dup ( mem_ctx , new_sd - > sacl ) ;
final_sd - > type | = new_sd - > type & ( SEC_DESC_SACL_PRESENT |
SEC_DESC_SACL_DEFAULTED | SEC_DESC_SACL_AUTO_INHERIT_REQ |
SEC_DESC_SACL_AUTO_INHERITED | SEC_DESC_SACL_PROTECTED |
SEC_DESC_SERVER_SECURITY ) ;
}
2010-06-01 15:05:02 +03:00
else if ( old_sd & & old_sd - > sacl ) {
2009-11-20 13:25:13 +02:00
final_sd - > sacl = security_acl_dup ( mem_ctx , old_sd - > sacl ) ;
final_sd - > type | = old_sd - > type & ( SEC_DESC_SACL_PRESENT |
SEC_DESC_SACL_DEFAULTED | SEC_DESC_SACL_AUTO_INHERIT_REQ |
SEC_DESC_SACL_AUTO_INHERITED | SEC_DESC_SACL_PROTECTED |
SEC_DESC_SERVER_SECURITY ) ;
}
if ( sd_flags & ( SECINFO_DACL ) ) {
final_sd - > dacl = security_acl_dup ( mem_ctx , new_sd - > dacl ) ;
final_sd - > type | = new_sd - > type & ( SEC_DESC_DACL_PRESENT |
SEC_DESC_DACL_DEFAULTED | SEC_DESC_DACL_AUTO_INHERIT_REQ |
SEC_DESC_DACL_AUTO_INHERITED | SEC_DESC_DACL_PROTECTED |
SEC_DESC_DACL_TRUSTED ) ;
}
2010-06-01 15:05:02 +03:00
else if ( old_sd & & old_sd - > dacl ) {
2009-11-20 13:25:13 +02:00
final_sd - > dacl = security_acl_dup ( mem_ctx , old_sd - > dacl ) ;
final_sd - > type | = old_sd - > type & ( SEC_DESC_DACL_PRESENT |
SEC_DESC_DACL_DEFAULTED | SEC_DESC_DACL_AUTO_INHERIT_REQ |
SEC_DESC_DACL_AUTO_INHERITED | SEC_DESC_DACL_PROTECTED |
SEC_DESC_DACL_TRUSTED ) ;
}
/* not so sure about this */
final_sd - > type | = new_sd - > type & SEC_DESC_RM_CONTROL_VALID ;
return final_sd ;
}
2009-09-14 19:44:41 +03:00
static DATA_BLOB * get_new_descriptor ( struct ldb_module * module ,
struct ldb_dn * dn ,
TALLOC_CTX * mem_ctx ,
const struct dsdb_class * objectclass ,
2009-09-17 18:37:46 +02:00
const struct ldb_val * parent ,
2011-02-21 17:17:12 +02:00
const struct ldb_val * object ,
const struct ldb_val * old_sd ,
2009-11-20 13:25:13 +02:00
uint32_t sd_flags )
2009-09-14 19:44:41 +03:00
{
struct security_descriptor * user_descriptor = NULL , * parent_descriptor = NULL ;
2009-11-20 13:25:13 +02:00
struct security_descriptor * old_descriptor = NULL ;
struct security_descriptor * new_sd , * final_sd ;
2009-09-14 19:44:41 +03:00
DATA_BLOB * linear_sd ;
enum ndr_err_code ndr_err ;
struct ldb_context * ldb = ldb_module_get_ctx ( module ) ;
struct auth_session_info * session_info
= ldb_get_opaque ( ldb , " sessionInfo " ) ;
const struct dom_sid * domain_sid = samdb_domain_sid ( ldb ) ;
char * sddl_sd ;
struct dom_sid * default_owner ;
struct dom_sid * default_group ;
2012-11-22 15:53:14 +01:00
struct security_descriptor * default_descriptor = NULL ;
if ( objectclass ! = NULL ) {
default_descriptor = get_sd_unpacked ( module , mem_ctx , objectclass ) ;
}
2009-09-14 19:44:41 +03:00
2009-09-21 20:08:52 -07:00
if ( object ) {
2009-09-14 19:44:41 +03:00
user_descriptor = talloc ( mem_ctx , struct security_descriptor ) ;
2009-11-20 13:25:13 +02:00
if ( ! user_descriptor ) {
2009-09-14 19:44:41 +03:00
return NULL ;
2009-11-20 13:25:13 +02:00
}
2010-05-09 17:20:01 +02:00
ndr_err = ndr_pull_struct_blob ( object , user_descriptor ,
2009-09-14 19:44:41 +03:00
user_descriptor ,
( ndr_pull_flags_fn_t ) ndr_pull_security_descriptor ) ;
2009-11-20 13:25:13 +02:00
if ( ! NDR_ERR_CODE_IS_SUCCESS ( ndr_err ) ) {
2009-09-14 19:44:41 +03:00
talloc_free ( user_descriptor ) ;
return NULL ;
}
2009-09-21 20:08:52 -07:00
} else {
2012-11-22 15:53:14 +01:00
user_descriptor = default_descriptor ;
2009-09-21 20:08:52 -07:00
}
2009-09-14 19:44:41 +03:00
2009-11-20 13:25:13 +02:00
if ( old_sd ) {
old_descriptor = talloc ( mem_ctx , struct security_descriptor ) ;
if ( ! old_descriptor ) {
return NULL ;
}
2010-05-09 17:20:01 +02:00
ndr_err = ndr_pull_struct_blob ( old_sd , old_descriptor ,
2009-11-20 13:25:13 +02:00
old_descriptor ,
( ndr_pull_flags_fn_t ) ndr_pull_security_descriptor ) ;
if ( ! NDR_ERR_CODE_IS_SUCCESS ( ndr_err ) ) {
talloc_free ( old_descriptor ) ;
return NULL ;
}
}
if ( parent ) {
2009-09-14 19:44:41 +03:00
parent_descriptor = talloc ( mem_ctx , struct security_descriptor ) ;
2009-11-20 13:25:13 +02:00
if ( ! parent_descriptor ) {
2009-09-14 19:44:41 +03:00
return NULL ;
2009-11-20 13:25:13 +02:00
}
2010-05-09 17:20:01 +02:00
ndr_err = ndr_pull_struct_blob ( parent , parent_descriptor ,
2009-09-14 19:44:41 +03:00
parent_descriptor ,
( ndr_pull_flags_fn_t ) ndr_pull_security_descriptor ) ;
2009-11-20 13:25:13 +02:00
if ( ! NDR_ERR_CODE_IS_SUCCESS ( ndr_err ) ) {
2009-09-14 19:44:41 +03:00
talloc_free ( parent_descriptor ) ;
return NULL ;
}
}
2009-11-20 13:25:13 +02:00
2012-11-22 15:53:14 +01:00
if ( user_descriptor & & default_descriptor & &
( user_descriptor - > dacl = = NULL ) )
{
user_descriptor - > dacl = default_descriptor - > dacl ;
user_descriptor - > type | = default_descriptor - > type & (
SEC_DESC_DACL_PRESENT |
SEC_DESC_DACL_DEFAULTED | SEC_DESC_DACL_AUTO_INHERIT_REQ |
SEC_DESC_DACL_AUTO_INHERITED | SEC_DESC_DACL_PROTECTED |
SEC_DESC_DACL_TRUSTED ) ;
}
if ( user_descriptor & & default_descriptor & &
( user_descriptor - > sacl = = NULL ) )
{
user_descriptor - > sacl = default_descriptor - > sacl ;
user_descriptor - > type | = default_descriptor - > type & (
SEC_DESC_SACL_PRESENT |
SEC_DESC_SACL_DEFAULTED | SEC_DESC_SACL_AUTO_INHERIT_REQ |
SEC_DESC_SACL_AUTO_INHERITED | SEC_DESC_SACL_PROTECTED |
SEC_DESC_SERVER_SECURITY ) ;
}
2009-09-14 19:44:41 +03:00
default_owner = get_default_ag ( mem_ctx , dn ,
session_info - > security_token , ldb ) ;
default_group = get_default_group ( mem_ctx , ldb , default_owner ) ;
new_sd = create_security_descriptor ( mem_ctx , parent_descriptor , user_descriptor , true ,
NULL , SEC_DACL_AUTO_INHERIT | SEC_SACL_AUTO_INHERIT ,
session_info - > security_token ,
default_owner , default_group ,
map_generic_rights_ds ) ;
2009-11-20 13:25:13 +02:00
if ( ! new_sd ) {
2009-09-14 19:44:41 +03:00
return NULL ;
2009-11-20 13:25:13 +02:00
}
final_sd = descr_handle_sd_flags ( mem_ctx , new_sd , old_descriptor , sd_flags ) ;
2009-09-14 19:44:41 +03:00
2009-11-20 13:25:13 +02:00
if ( ! final_sd ) {
return NULL ;
}
2010-01-02 16:53:20 +11:00
if ( final_sd - > dacl ) {
final_sd - > dacl - > revision = SECURITY_ACL_REVISION_ADS ;
}
if ( final_sd - > sacl ) {
final_sd - > sacl - > revision = SECURITY_ACL_REVISION_ADS ;
}
2009-11-20 13:25:13 +02:00
sddl_sd = sddl_encode ( mem_ctx , final_sd , domain_sid ) ;
2009-11-15 22:31:44 +02:00
DEBUG ( 10 , ( " Object %s created with desriptor %s \n \n " , ldb_dn_get_linearized ( dn ) , sddl_sd ) ) ;
2009-09-14 19:44:41 +03:00
linear_sd = talloc ( mem_ctx , DATA_BLOB ) ;
if ( ! linear_sd ) {
return NULL ;
}
ndr_err = ndr_push_struct_blob ( linear_sd , mem_ctx ,
2009-11-20 13:25:13 +02:00
final_sd ,
2009-09-14 19:44:41 +03:00
( ndr_push_flags_fn_t ) ndr_push_security_descriptor ) ;
if ( ! NDR_ERR_CODE_IS_SUCCESS ( ndr_err ) ) {
return NULL ;
}
return linear_sd ;
}
2009-11-21 18:40:51 +02:00
static DATA_BLOB * descr_get_descriptor_to_show ( struct ldb_module * module ,
TALLOC_CTX * mem_ctx ,
struct ldb_val * sd ,
uint32_t sd_flags )
{
struct security_descriptor * old_sd , * final_sd ;
DATA_BLOB * linear_sd ;
enum ndr_err_code ndr_err ;
old_sd = talloc ( mem_ctx , struct security_descriptor ) ;
if ( ! old_sd ) {
return NULL ;
}
2010-05-09 17:20:01 +02:00
ndr_err = ndr_pull_struct_blob ( sd , old_sd ,
2009-11-21 18:40:51 +02:00
old_sd ,
( ndr_pull_flags_fn_t ) ndr_pull_security_descriptor ) ;
if ( ! NDR_ERR_CODE_IS_SUCCESS ( ndr_err ) ) {
talloc_free ( old_sd ) ;
return NULL ;
}
final_sd = descr_handle_sd_flags ( mem_ctx , old_sd , NULL , sd_flags ) ;
if ( ! final_sd ) {
return NULL ;
}
linear_sd = talloc ( mem_ctx , DATA_BLOB ) ;
if ( ! linear_sd ) {
return NULL ;
}
ndr_err = ndr_push_struct_blob ( linear_sd , mem_ctx ,
final_sd ,
( ndr_push_flags_fn_t ) ndr_push_security_descriptor ) ;
if ( ! NDR_ERR_CODE_IS_SUCCESS ( ndr_err ) ) {
return NULL ;
}
return linear_sd ;
}
2009-09-14 19:44:41 +03:00
static struct descriptor_context * descriptor_init_context ( struct ldb_module * module ,
struct ldb_request * req )
{
struct ldb_context * ldb ;
struct descriptor_context * ac ;
ldb = ldb_module_get_ctx ( module ) ;
ac = talloc_zero ( req , struct descriptor_context ) ;
if ( ac = = NULL ) {
ldb_set_errstring ( ldb , " Out of Memory " ) ;
return NULL ;
}
ac - > module = module ;
ac - > req = req ;
return ac ;
}
2009-11-21 18:40:51 +02:00
static int descriptor_search_callback ( struct ldb_request * req , struct ldb_reply * ares )
{
struct descriptor_context * ac ;
struct ldb_val * sd_val = NULL ;
struct ldb_message_element * sd_el ;
DATA_BLOB * show_sd ;
int ret ;
ac = talloc_get_type ( req - > context , struct descriptor_context ) ;
if ( ! ares ) {
ret = LDB_ERR_OPERATIONS_ERROR ;
goto fail ;
}
if ( ares - > error ! = LDB_SUCCESS ) {
return ldb_module_done ( ac - > req , ares - > controls ,
ares - > response , ares - > error ) ;
}
switch ( ares - > type ) {
case LDB_REPLY_ENTRY :
2012-11-21 13:05:31 +01:00
sd_el = ldb_msg_find_element ( ares - > message , " nTSecurityDescriptor " ) ;
if ( sd_el ) {
sd_val = sd_el - > values ;
2009-11-21 18:40:51 +02:00
}
2012-11-21 13:05:31 +01:00
2009-11-21 18:40:51 +02:00
if ( sd_val ) {
show_sd = descr_get_descriptor_to_show ( ac - > module , ac - > req ,
2012-11-21 13:05:31 +01:00
sd_val , ac - > sd_flags ) ;
2009-11-21 18:40:51 +02:00
if ( ! show_sd ) {
ret = LDB_ERR_OPERATIONS_ERROR ;
goto fail ;
}
ldb_msg_remove_attr ( ares - > message , " nTSecurityDescriptor " ) ;
ret = ldb_msg_add_steal_value ( ares - > message , " nTSecurityDescriptor " , show_sd ) ;
if ( ret ! = LDB_SUCCESS ) {
goto fail ;
}
}
return ldb_module_send_entry ( ac - > req , ares - > message , ares - > controls ) ;
case LDB_REPLY_REFERRAL :
2010-11-06 22:27:13 +01:00
return ldb_module_send_referral ( ac - > req , ares - > referral ) ;
2009-11-21 18:40:51 +02:00
case LDB_REPLY_DONE :
return ldb_module_done ( ac - > req , ares - > controls ,
ares - > response , ares - > error ) ;
}
fail :
2010-12-17 08:43:33 +11:00
talloc_free ( ares ) ;
2009-11-21 18:40:51 +02:00
return ldb_module_done ( ac - > req , NULL , NULL , ret ) ;
}
2011-02-21 17:04:27 +02:00
static int descriptor_add ( struct ldb_module * module , struct ldb_request * req )
{
2012-11-23 07:18:35 +01:00
struct ldb_context * ldb = ldb_module_get_ctx ( module ) ;
2011-02-21 17:04:27 +02:00
struct ldb_request * add_req ;
struct ldb_message * msg ;
struct ldb_result * parent_res ;
const struct ldb_val * parent_sd = NULL ;
const struct ldb_val * user_sd ;
2012-11-23 07:18:35 +01:00
struct ldb_dn * dn = req - > op . add . message - > dn ;
struct ldb_dn * parent_dn , * nc_root ;
2011-02-21 17:04:27 +02:00
struct ldb_message_element * objectclass_element , * sd_element ;
int ret ;
const struct dsdb_schema * schema ;
DATA_BLOB * sd ;
const struct dsdb_class * objectclass ;
static const char * const parent_attrs [ ] = { " nTSecurityDescriptor " , NULL } ;
2011-11-16 00:56:28 +01:00
uint32_t instanceType ;
bool isNC = false ;
2012-11-21 13:05:31 +01:00
uint32_t sd_flags = dsdb_request_sd_flags ( req , NULL ) ;
2011-02-21 17:04:27 +02:00
2012-11-23 07:18:35 +01:00
/* do not manipulate our control entries */
if ( ldb_dn_is_special ( dn ) ) {
return ldb_next_request ( module , req ) ;
}
2011-02-21 17:04:27 +02:00
user_sd = ldb_msg_find_ldb_val ( req - > op . add . message , " nTSecurityDescriptor " ) ;
sd_element = ldb_msg_find_element ( req - > op . add . message , " nTSecurityDescriptor " ) ;
/* nTSecurityDescriptor without a value is an error, letting through so it is handled */
if ( user_sd = = NULL & & sd_element ) {
return ldb_next_request ( module , req ) ;
}
ldb_debug ( ldb , LDB_DEBUG_TRACE , " descriptor_add: %s \n " , ldb_dn_get_linearized ( dn ) ) ;
2011-11-16 00:56:28 +01:00
instanceType = ldb_msg_find_attr_as_uint ( req - > op . add . message , " instanceType " , 0 ) ;
if ( instanceType & INSTANCE_TYPE_IS_NC_HEAD ) {
isNC = true ;
2011-02-21 17:04:27 +02:00
}
2011-11-16 00:56:28 +01:00
if ( ! isNC ) {
ret = dsdb_find_nc_root ( ldb , req , dn , & nc_root ) ;
if ( ret ! = LDB_SUCCESS ) {
ldb_debug ( ldb , LDB_DEBUG_TRACE , " descriptor_add: Could not find NC root for %s \n " ,
ldb_dn_get_linearized ( dn ) ) ;
return ret ;
}
if ( ldb_dn_compare ( dn , nc_root ) = = 0 ) {
DEBUG ( 0 , ( " Found DN %s being a NC by the old method \n " , ldb_dn_get_linearized ( dn ) ) ) ;
isNC = true ;
}
2011-02-21 17:04:27 +02:00
}
2011-11-16 00:56:28 +01:00
if ( isNC ) {
DEBUG ( 2 , ( " DN: %s is a NC \n " , ldb_dn_get_linearized ( dn ) ) ) ;
}
if ( ! isNC ) {
/* if the object has a parent, retrieve its SD to
* use for calculation . Unfortunately we do not yet have
* instanceType , so we use dsdb_find_nc_root . */
parent_dn = ldb_dn_get_parent ( req , dn ) ;
if ( parent_dn = = NULL ) {
return ldb_oom ( ldb ) ;
}
2011-02-21 17:04:27 +02:00
/* we aren't any NC */
ret = dsdb_module_search_dn ( module , req , & parent_res , parent_dn ,
parent_attrs ,
2012-11-21 10:15:58 +01:00
DSDB_FLAG_NEXT_MODULE |
DSDB_FLAG_AS_SYSTEM |
DSDB_SEARCH_SHOW_RECYCLED ,
2011-02-21 17:04:27 +02:00
req ) ;
if ( ret ! = LDB_SUCCESS ) {
ldb_debug ( ldb , LDB_DEBUG_TRACE , " descriptor_add: Could not find SD for %s \n " ,
ldb_dn_get_linearized ( parent_dn ) ) ;
return ret ;
}
if ( parent_res - > count ! = 1 ) {
return ldb_operr ( ldb ) ;
}
parent_sd = ldb_msg_find_ldb_val ( parent_res - > msgs [ 0 ] , " nTSecurityDescriptor " ) ;
}
schema = dsdb_get_schema ( ldb , req ) ;
objectclass_element = ldb_msg_find_element ( req - > op . add . message , " objectClass " ) ;
if ( objectclass_element = = NULL ) {
return ldb_operr ( ldb ) ;
}
2012-04-04 22:24:16 +02:00
objectclass = dsdb_get_last_structural_class ( schema ,
objectclass_element ) ;
2011-02-21 17:04:27 +02:00
if ( objectclass = = NULL ) {
return ldb_operr ( ldb ) ;
}
2012-11-21 14:13:17 +01:00
/*
* The SD_FLAG control is ignored on add
* and we default to all bits set .
*/
sd_flags = 0xF ;
2011-02-21 17:04:27 +02:00
sd = get_new_descriptor ( module , dn , req ,
objectclass , parent_sd ,
2012-11-21 14:13:17 +01:00
user_sd , NULL , sd_flags ) ;
2012-11-23 09:19:11 +01:00
if ( sd = = NULL ) {
return ldb_operr ( ldb ) ;
}
2011-02-21 17:04:27 +02:00
msg = ldb_msg_copy_shallow ( req , req - > op . add . message ) ;
2012-11-23 09:19:11 +01:00
if ( msg = = NULL ) {
return ldb_oom ( ldb ) ;
}
2012-11-23 09:20:50 +01:00
if ( sd_element ! = NULL ) {
sd_element - > values [ 0 ] = * sd ;
} else {
ret = ldb_msg_add_steal_value ( msg ,
" nTSecurityDescriptor " ,
sd ) ;
if ( ret ! = LDB_SUCCESS ) {
return ret ;
2011-02-21 17:04:27 +02:00
}
}
ret = ldb_build_add_req ( & add_req , ldb , req ,
msg ,
req - > controls ,
req , dsdb_next_callback ,
req ) ;
LDB_REQ_SET_LOCATION ( add_req ) ;
if ( ret ! = LDB_SUCCESS ) {
return ldb_error ( ldb , ret ,
" descriptor_add: Error creating new add request. " ) ;
}
return ldb_next_request ( module , add_req ) ;
}
2011-02-21 17:08:44 +02:00
static int descriptor_modify ( struct ldb_module * module , struct ldb_request * req )
{
2012-11-23 07:18:35 +01:00
struct ldb_context * ldb = ldb_module_get_ctx ( module ) ;
2011-02-21 17:08:44 +02:00
struct ldb_request * mod_req ;
struct ldb_message * msg ;
struct ldb_result * current_res , * parent_res ;
const struct ldb_val * old_sd = NULL ;
const struct ldb_val * parent_sd = NULL ;
const struct ldb_val * user_sd ;
2012-11-23 07:18:35 +01:00
struct ldb_dn * dn = req - > op . mod . message - > dn ;
struct ldb_dn * parent_dn ;
2012-11-23 09:31:05 +01:00
struct ldb_message_element * objectclass_element , * sd_element ;
2011-02-21 17:08:44 +02:00
int ret ;
2012-11-21 13:05:31 +01:00
uint32_t instanceType ;
uint32_t sd_flags = dsdb_request_sd_flags ( req , NULL ) ;
2011-02-21 17:08:44 +02:00
const struct dsdb_schema * schema ;
DATA_BLOB * sd ;
const struct dsdb_class * objectclass ;
static const char * const parent_attrs [ ] = { " nTSecurityDescriptor " , NULL } ;
static const char * const current_attrs [ ] = { " nTSecurityDescriptor " ,
" instanceType " ,
" objectClass " , NULL } ;
2012-11-23 07:18:35 +01:00
/* do not manipulate our control entries */
if ( ldb_dn_is_special ( dn ) ) {
return ldb_next_request ( module , req ) ;
}
2012-11-23 09:31:05 +01:00
sd_element = ldb_msg_find_element ( req - > op . mod . message , " nTSecurityDescriptor " ) ;
if ( sd_element = = NULL ) {
return ldb_next_request ( module , req ) ;
}
2012-11-23 09:55:17 +01:00
/*
* nTSecurityDescriptor with DELETE is not supported yet .
* TODO : handle this correctly .
*/
if ( LDB_FLAG_MOD_TYPE ( sd_element - > flags ) = = LDB_FLAG_MOD_DELETE ) {
return ldb_module_error ( module ,
LDB_ERR_UNWILLING_TO_PERFORM ,
" MOD_DELETE for nTSecurityDescriptor "
" not supported yet " ) ;
}
2011-02-21 17:08:44 +02:00
user_sd = ldb_msg_find_ldb_val ( req - > op . mod . message , " nTSecurityDescriptor " ) ;
2012-11-23 09:31:05 +01:00
/* nTSecurityDescriptor without a value is an error, letting through so it is handled */
if ( user_sd = = NULL ) {
2011-02-21 17:08:44 +02:00
return ldb_next_request ( module , req ) ;
}
ldb_debug ( ldb , LDB_DEBUG_TRACE , " descriptor_modify: %s \n " , ldb_dn_get_linearized ( dn ) ) ;
ret = dsdb_module_search_dn ( module , req , & current_res , dn ,
current_attrs ,
2012-11-21 10:15:58 +01:00
DSDB_FLAG_NEXT_MODULE |
DSDB_FLAG_AS_SYSTEM |
DSDB_SEARCH_SHOW_RECYCLED ,
2011-02-21 17:08:44 +02:00
req ) ;
if ( ret ! = LDB_SUCCESS ) {
ldb_debug ( ldb , LDB_DEBUG_ERROR , " descriptor_modify: Could not find %s \n " ,
ldb_dn_get_linearized ( dn ) ) ;
return ret ;
}
instanceType = ldb_msg_find_attr_as_uint ( current_res - > msgs [ 0 ] ,
" instanceType " , 0 ) ;
/* if the object has a parent, retrieve its SD to
* use for calculation */
if ( ! ldb_dn_is_null ( current_res - > msgs [ 0 ] - > dn ) & &
! ( instanceType & INSTANCE_TYPE_IS_NC_HEAD ) ) {
parent_dn = ldb_dn_get_parent ( req , dn ) ;
if ( parent_dn = = NULL ) {
return ldb_oom ( ldb ) ;
}
ret = dsdb_module_search_dn ( module , req , & parent_res , parent_dn ,
parent_attrs ,
2012-11-21 10:15:58 +01:00
DSDB_FLAG_NEXT_MODULE |
DSDB_FLAG_AS_SYSTEM |
DSDB_SEARCH_SHOW_RECYCLED ,
2011-02-21 17:08:44 +02:00
req ) ;
if ( ret ! = LDB_SUCCESS ) {
ldb_debug ( ldb , LDB_DEBUG_ERROR , " descriptor_modify: Could not find SD for %s \n " ,
ldb_dn_get_linearized ( parent_dn ) ) ;
return ret ;
}
if ( parent_res - > count ! = 1 ) {
return ldb_operr ( ldb ) ;
}
parent_sd = ldb_msg_find_ldb_val ( parent_res - > msgs [ 0 ] , " nTSecurityDescriptor " ) ;
}
schema = dsdb_get_schema ( ldb , req ) ;
objectclass_element = ldb_msg_find_element ( current_res - > msgs [ 0 ] , " objectClass " ) ;
if ( objectclass_element = = NULL ) {
return ldb_operr ( ldb ) ;
}
2012-04-04 22:24:16 +02:00
objectclass = dsdb_get_last_structural_class ( schema ,
objectclass_element ) ;
2011-02-21 17:08:44 +02:00
if ( objectclass = = NULL ) {
return ldb_operr ( ldb ) ;
}
2012-11-21 13:05:31 +01:00
old_sd = ldb_msg_find_ldb_val ( current_res - > msgs [ 0 ] , " nTSecurityDescriptor " ) ;
2011-02-21 17:08:44 +02:00
sd = get_new_descriptor ( module , dn , req ,
objectclass , parent_sd ,
user_sd , old_sd , sd_flags ) ;
2012-11-23 09:19:11 +01:00
if ( sd = = NULL ) {
return ldb_operr ( ldb ) ;
}
2011-02-21 17:08:44 +02:00
msg = ldb_msg_copy_shallow ( req , req - > op . mod . message ) ;
2012-11-23 09:19:11 +01:00
if ( msg = = NULL ) {
return ldb_oom ( ldb ) ;
}
2012-11-23 09:31:05 +01:00
sd_element - > values [ 0 ] = * sd ;
2011-02-21 17:08:44 +02:00
ret = ldb_build_mod_req ( & mod_req , ldb , req ,
msg ,
req - > controls ,
req ,
dsdb_next_callback ,
req ) ;
LDB_REQ_SET_LOCATION ( mod_req ) ;
if ( ret ! = LDB_SUCCESS ) {
return ret ;
}
return ldb_next_request ( module , mod_req ) ;
}
2009-11-21 18:40:51 +02:00
static int descriptor_search ( struct ldb_module * module , struct ldb_request * req )
{
int ret ;
struct ldb_context * ldb ;
struct ldb_request * down_req ;
struct descriptor_context * ac ;
2012-11-21 13:05:31 +01:00
bool explicit_sd_flags = false ;
uint32_t sd_flags = dsdb_request_sd_flags ( req , & explicit_sd_flags ) ;
bool show_sd = explicit_sd_flags ;
2012-11-21 15:24:46 +01:00
if ( ! show_sd & &
ldb_attr_in_list ( req - > op . search . attrs , " nTSecurityDescriptor " ) )
{
show_sd = true ;
}
if ( ! show_sd ) {
2009-11-21 18:40:51 +02:00
return ldb_next_request ( module , req ) ;
}
ldb = ldb_module_get_ctx ( module ) ;
ac = descriptor_init_context ( module , req ) ;
if ( ac = = NULL ) {
2010-07-06 13:21:54 +10:00
return ldb_operr ( ldb ) ;
2009-11-21 18:40:51 +02:00
}
2012-11-21 13:05:31 +01:00
ac - > sd_flags = sd_flags ;
2009-11-21 18:40:51 +02:00
ret = ldb_build_search_req_ex ( & down_req , ldb , ac ,
req - > op . search . base ,
req - > op . search . scope ,
req - > op . search . tree ,
req - > op . search . attrs ,
req - > controls ,
ac , descriptor_search_callback ,
ac - > req ) ;
2010-09-24 12:09:26 -07:00
LDB_REQ_SET_LOCATION ( down_req ) ;
2009-11-21 18:40:51 +02:00
if ( ret ! = LDB_SUCCESS ) {
return ret ;
}
return ldb_next_request ( ac - > module , down_req ) ;
}
2009-09-14 19:44:41 +03:00
/* TODO */
static int descriptor_rename ( struct ldb_module * module , struct ldb_request * req )
{
struct ldb_context * ldb = ldb_module_get_ctx ( module ) ;
2012-11-23 07:18:35 +01:00
struct ldb_dn * olddn = req - > op . rename . olddn ;
2010-11-16 13:25:34 +01:00
/* do not manipulate our control entries */
if ( ldb_dn_is_special ( req - > op . rename . olddn ) ) {
return ldb_next_request ( module , req ) ;
}
2012-11-23 07:18:35 +01:00
ldb_debug ( ldb , LDB_DEBUG_TRACE , " descriptor_rename: %s \n " ,
ldb_dn_get_linearized ( olddn ) ) ;
2009-09-14 19:44:41 +03:00
return ldb_next_request ( module , req ) ;
}
2009-09-19 21:45:07 -07:00
static int descriptor_init ( struct ldb_module * module )
{
2009-11-21 18:40:51 +02:00
int ret = ldb_mod_register_control ( module , LDB_CONTROL_SD_FLAGS_OID ) ;
struct ldb_context * ldb = ldb_module_get_ctx ( module ) ;
if ( ret ! = LDB_SUCCESS ) {
ldb_debug ( ldb , LDB_DEBUG_ERROR ,
" descriptor: Unable to register control with rootdse! \n " ) ;
2010-07-06 13:21:54 +10:00
return ldb_operr ( ldb ) ;
2009-11-21 18:40:51 +02:00
}
2009-09-19 21:45:07 -07:00
return ldb_next_init ( module ) ;
}
2010-11-01 15:28:02 +11:00
static const struct ldb_module_ops ldb_descriptor_module_ops = {
2009-11-21 18:40:51 +02:00
. name = " descriptor " ,
. search = descriptor_search ,
2011-02-21 17:04:27 +02:00
. add = descriptor_add ,
2011-02-21 17:08:44 +02:00
. modify = descriptor_modify ,
2009-09-14 19:44:41 +03:00
. rename = descriptor_rename ,
2009-09-19 21:45:07 -07:00
. init_context = descriptor_init
2009-09-14 19:44:41 +03:00
} ;
2010-11-01 15:28:02 +11:00
int ldb_descriptor_module_init ( const char * version )
{
2010-11-01 22:30:45 +11:00
LDB_MODULE_CHECK_VERSION ( version ) ;
2010-11-01 15:28:02 +11:00
return ldb_register_module ( & ldb_descriptor_module_ops ) ;
}