1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-25 23:21:54 +03:00
samba-mirror/source3/registry/reg_smbconf.c

240 lines
6.5 KiB
C
Raw Normal View History

/*
* Unix SMB/CIFS implementation.
* Virtual Windows Registry Layer
* Copyright (C) Volker Lendecke 2006
* Copyright (C) Michael Adam 2007
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, see <http://www.gnu.org/licenses/>.
*/
#include "includes.h"
#undef DBGC_CLASS
#define DBGC_CLASS DBGC_RPC_SRV
extern REGISTRY_OPS regdb_ops; /* these are the default */
static int smbconf_fetch_keys( const char *key, REGSUBKEY_CTR *subkey_ctr )
{
return regdb_ops.fetch_subkeys(key, subkey_ctr);
}
static BOOL smbconf_store_keys( const char *key, REGSUBKEY_CTR *subkeys )
{
return regdb_ops.store_subkeys(key, subkeys);
}
static int smbconf_fetch_values( const char *key, REGVAL_CTR *val )
{
return regdb_ops.fetch_values(key, val);
}
static BOOL smbconf_store_values( const char *key, REGVAL_CTR *val )
{
int i;
int num_values = regval_ctr_numvals(val);
REGVAL_CTR *new_val_ctr;
/*
* we build a second regval container and copy over the values,
* possibly changing names to the canonical name, because when
* canonicalizing parameter names and replacing the original parameter
* (with reval_ctr_deletevalue and regval_ctr_addvalue) in the original
* container, the order would change and that is not so good in the
* "for" loop... :-o
*/
new_val_ctr = TALLOC_ZERO_P(val, REGVAL_CTR);
if (new_val_ctr == NULL) {
DEBUG(1, ("out of memory\n"));
return False;
}
for (i=0; i < num_values; i++) {
REGISTRY_VALUE *theval = regval_ctr_specific_value(val, i);
const char *valname = regval_name(theval);
int res;
DEBUG(10, ("inspecting value '%s'\n", valname));
/* unfortunately, we can not reject names that are not
* valid parameter names here, since e.g. regedit first
* creates values as "New Value #1" and so on and then
* drops into rename. */
if (regval_type(theval) != REG_SZ) {
DEBUG(1, ("smbconf_store_values: only registry value "
"type REG_SZ currently allowed under key "
"smbconf\n"));
return False;
}
if (registry_smbconf_valname_forbidden(regval_name(theval))) {
DEBUG(1, ("smbconf_store_values: value '%s' forbidden "
"in registry.\n", valname));
return False;
}
if (lp_parameter_is_valid(valname) &&
!lp_parameter_is_canonical(valname))
{
char *valstr;
size_t len;
const char *canon_valname;
const char *canon_valstr;
BOOL inverse;
struct registry_value *value;
WERROR err;
DATA_BLOB value_data;
TALLOC_CTX *mem_ctx;
DEBUG(5, ("valid parameter '%s' given but it is a "
"synonym. going to canonicalize it.\n",
valname));
mem_ctx = talloc_new(val);
if (mem_ctx == NULL) {
DEBUG(1, ("out of memory...\n"));
return False;
}
err = registry_pull_value(mem_ctx, &value,
theval->type,
theval->data_p,
theval->size,
theval->size);
if (!W_ERROR_IS_OK(err)) {
TALLOC_FREE(mem_ctx);
return False;
}
valstr = (value->v.sz.str);
len = value->v.sz.len;
if (valstr[len - 1] != '\0') {
DEBUG(10, ("string is not '\\0'-terminated. "
"adding '\\0'.\n"));
valstr = TALLOC_REALLOC_ARRAY(mem_ctx, valstr,
char, len + 1);
if (valstr == NULL) {
DEBUG(1, ("out of memory\n"));
TALLOC_FREE(mem_ctx);
return False;
}
valstr[len] = '\0';
len++;
}
if (!lp_canonicalize_parameter(valname, &canon_valname,
&inverse))
{
DEBUG(5, ("Error: lp_canonicalize_parameter "
"failed after lp_parameter_is_valid. "
"This should not happen!\n"));
TALLOC_FREE(mem_ctx);
return False;
}
DEBUG(10, ("old value name: '%s', canonical value "
"name: '%s'\n", valname, canon_valname));
if (inverse && lp_string_is_valid_boolean(valstr)) {
lp_invert_boolean(valstr, &canon_valstr);
} else {
canon_valstr = valstr;
}
ZERO_STRUCTP(value);
value->type = REG_SZ;
value->v.sz.str = CONST_DISCARD(char *, canon_valstr);
value->v.sz.len = strlen(canon_valstr) + 1;
err = registry_push_value(mem_ctx, value, &value_data);
if (!W_ERROR_IS_OK(err)) {
DEBUG(10, ("error calling registry_push_value."
"\n"));
TALLOC_FREE(mem_ctx);
return False;
}
DEBUG(10, ("adding canonicalized parameter to "
"container.\n"));
res = regval_ctr_addvalue(new_val_ctr, canon_valname,
value->type,
(char *)value_data.data,
value_data.length);
if (res == 0) {
DEBUG(10, ("error calling regval_ctr_addvalue. "
"(no memory?)\n"));
TALLOC_FREE(mem_ctx);
return False;
}
DEBUG(10, ("parameter added. container now has %d "
"values.\n", res));
TALLOC_FREE(mem_ctx);
} else {
DEBUG(10, ("%s parameter found, "
"copying it to new container...\n",
(lp_parameter_is_valid(valname)?
"valid":"unknown")));
res = regval_ctr_copyvalue(new_val_ctr, theval);
if (res == 0) {
DEBUG(10, ("error calling regval_ctr_copyvalue."
" (no memory?)\n"));
return False;
}
DEBUG(10, ("parameter copied. container now has %d "
"values.\n", res));
}
}
return regdb_ops.store_values(key, new_val_ctr);
}
static BOOL smbconf_reg_access_check(const char *keyname, uint32 requested,
uint32 *granted,
const struct nt_user_token *token)
{
if (!(user_has_privileges(token, &se_disk_operators))) {
return False;
}
*granted = REG_KEY_ALL;
return True;
}
static WERROR smbconf_get_secdesc(TALLOC_CTX *mem_ctx, const char *key,
struct security_descriptor **psecdesc)
{
return regdb_ops.get_secdesc(mem_ctx, key, psecdesc);
}
static WERROR smbconf_set_secdesc(const char *key,
struct security_descriptor *secdesc)
{
return regdb_ops.set_secdesc(key, secdesc);
}
/*
* Table of function pointers for accessing smb.conf data
*/
REGISTRY_OPS smbconf_reg_ops = {
smbconf_fetch_keys,
smbconf_fetch_values,
smbconf_store_keys,
smbconf_store_values,
smbconf_reg_access_check,
smbconf_get_secdesc,
smbconf_set_secdesc
};