1
0
mirror of https://github.com/samba-team/samba.git synced 2025-02-28 01:58:17 +03:00

Add preliminary NT ACL support for GPT (GPO on filesystem).

Signed-off-by: Jelmer Vernooij <jelmer@samba.org>
This commit is contained in:
Wilco Baan Hofman 2010-05-19 17:22:48 +02:00 committed by Jelmer Vernooij
parent 60bc5fe0ed
commit 299531ce32
3 changed files with 120 additions and 38 deletions

View File

@ -22,6 +22,7 @@
#include "libcli/libcli.h"
#include "param/param.h"
#include "libcli/resolve/resolve.h"
#include "libcli/raw/libcliraw.h"
#include <sys/stat.h>
#include <fcntl.h>
#include <unistd.h>
@ -186,12 +187,29 @@ static NTSTATUS gp_cli_connect(struct gp_context *gp_ctx)
return NT_STATUS_OK;
}
static char * gp_get_share_path(TALLOC_CTX *mem_ctx, const char *file_sys_path)
{
unsigned int i, bkslash_cnt;
/* Get the path from the share down (\\..\..\(this\stuff) */
for (i = 0, bkslash_cnt = 0; file_sys_path[i] != '\0'; i++) {
if (file_sys_path[i] == '\\')
bkslash_cnt++;
if (bkslash_cnt == 4) {
return talloc_strdup(mem_ctx, &file_sys_path[i]);
}
}
return NULL;
}
NTSTATUS gp_fetch_gpt (struct gp_context *gp_ctx, struct gp_object *gpo, const char **ret_local_path)
{
TALLOC_CTX *mem_ctx;
struct gp_list_state *state;
NTSTATUS status;
unsigned int i, bkslash_cnt;
struct stat st;
int rv;
@ -211,18 +229,9 @@ NTSTATUS gp_fetch_gpt (struct gp_context *gp_ctx, struct gp_object *gpo, const c
/* Prepare the state structure */
state = talloc_zero(mem_ctx, struct gp_list_state);
state->gp_ctx = gp_ctx;
state->local_path = talloc_asprintf(gp_ctx, "%s/%s", gp_tmpdir(mem_ctx), gpo->name);
state->local_path = talloc_asprintf(mem_ctx, "%s/%s", gp_tmpdir(mem_ctx), gpo->name);
state->share_path = gp_get_share_path(mem_ctx, gpo->file_sys_path);
/* Get the path from the share down (\\..\..\(this\stuff) */
for (i = 0, bkslash_cnt = 0; gpo->file_sys_path[i] != '\0'; i++) {
if (gpo->file_sys_path[i] == '\\')
bkslash_cnt++;
if (bkslash_cnt == 4) {
state->share_path = talloc_strdup(mem_ctx, &gpo->file_sys_path[i]);
break;
}
}
/* Create the GPO dir if it does not exist */
if (stat(state->local_path, &st) != 0) {
@ -310,7 +319,6 @@ static NTSTATUS push_recursive (struct gp_context *gp_ctx, const char *local_pat
NTSTATUS gp_push_gpt(struct gp_context *gp_ctx, const char *local_path, const char *file_sys_path)
{
NTSTATUS status;
unsigned int i, bkslash_cnt;
char *share_path;
if (gp_ctx->cli == NULL) {
@ -320,17 +328,7 @@ NTSTATUS gp_push_gpt(struct gp_context *gp_ctx, const char *local_path, const ch
return status;
}
}
/* Get the path from the share down (\\..\..\(this\stuff) */
for (i = 0, bkslash_cnt = 0; file_sys_path[i] != '\0'; i++) {
if (file_sys_path[i] == '\\')
bkslash_cnt++;
if (bkslash_cnt == 4) {
share_path = talloc_strdup(gp_ctx, &file_sys_path[i]);
break;
}
}
share_path = gp_get_share_path(gp_ctx, file_sys_path);
DEBUG(5, ("Copying %s to %s on sysvol\n", local_path, share_path));
@ -355,6 +353,9 @@ NTSTATUS gp_create_gpt(struct gp_context *gp_ctx, const char *name, const char *
tmp_dir = gp_tmpdir(mem_ctx);
policy_dir = talloc_asprintf(mem_ctx, "%s/%s", tmp_dir, name);
/* Create the directories */
rv = mkdir(policy_dir, 0755);
if (rv < 0) {
DEBUG(0, ("Could not create the policy dir: %s\n", policy_dir));
@ -378,6 +379,8 @@ NTSTATUS gp_create_gpt(struct gp_context *gp_ctx, const char *name, const char *
return NT_STATUS_UNSUCCESSFUL;
}
/* Create a GPT.INI with version 0 */
tmp_str = talloc_asprintf(mem_ctx, "%s/GPT.INI", policy_dir);
fd = open(tmp_str, O_CREAT | O_WRONLY, 0644);
if (fd < 0) {
@ -395,7 +398,7 @@ NTSTATUS gp_create_gpt(struct gp_context *gp_ctx, const char *name, const char *
close(fd);
/* Upload the GPT to the sysvol share on a DC */
status = gp_push_gpt(gp_ctx, policy_dir, file_sys_path);
if (!NT_STATUS_IS_OK(status)) {
talloc_free(mem_ctx);
@ -405,3 +408,70 @@ NTSTATUS gp_create_gpt(struct gp_context *gp_ctx, const char *name, const char *
talloc_free(mem_ctx);
return NT_STATUS_OK;
}
NTSTATUS gp_set_gpt_security_descriptor(struct gp_context *gp_ctx, struct gp_object *gpo, struct security_descriptor *sd)
{
TALLOC_CTX *mem_ctx;
NTSTATUS status;
union smb_setfileinfo fileinfo;
union smb_open io;
union smb_close io_close;
/* Create a connection to sysvol if it is not already there */
if (gp_ctx->cli == NULL) {
status = gp_cli_connect(gp_ctx);
if (!NT_STATUS_IS_OK(status)) {
DEBUG(0, ("Failed to create cli connection to DC\n"));
return status;
}
}
/* Create a forked memory context which can be freed easily */
mem_ctx = talloc_new(gp_ctx);
/* Open the directory with NTCreate AndX call */
io.generic.level = RAW_OPEN_NTCREATEX;
io.ntcreatex.in.root_fid.fnum = 0;
io.ntcreatex.in.flags = 0;
io.ntcreatex.in.access_mask = SEC_FLAG_MAXIMUM_ALLOWED;
io.ntcreatex.in.create_options = 0;
io.ntcreatex.in.file_attr = FILE_ATTRIBUTE_NORMAL;
io.ntcreatex.in.share_access = NTCREATEX_SHARE_ACCESS_READ | NTCREATEX_SHARE_ACCESS_WRITE;
io.ntcreatex.in.alloc_size = 0;
io.ntcreatex.in.open_disposition = NTCREATEX_DISP_OPEN;
io.ntcreatex.in.impersonation = NTCREATEX_IMPERSONATION_ANONYMOUS;
io.ntcreatex.in.security_flags = 0;
io.ntcreatex.in.fname = gp_get_share_path(mem_ctx, gpo->file_sys_path);
status = smb_raw_open(gp_ctx->cli->tree, mem_ctx, &io);
if (!NT_STATUS_IS_OK(status)) {
DEBUG(0, ("Can't open GPT directory\n"));
talloc_free(mem_ctx);
return status;
}
/* Set the security descriptor on the directory */
fileinfo.generic.level = RAW_FILEINFO_SEC_DESC;
fileinfo.set_secdesc.in.file.fnum = io.ntcreatex.out.file.fnum;
fileinfo.set_secdesc.in.secinfo_flags = SECINFO_OWNER | SECINFO_GROUP | SECINFO_SACL | SECINFO_DACL;
fileinfo.set_secdesc.in.sd = sd;
status = smb_raw_setfileinfo(gp_ctx->cli->tree, &fileinfo);
if (!NT_STATUS_IS_OK(status)) {
DEBUG(0, ("Failed to set security descriptor on the GPT\n"));
talloc_free(mem_ctx);
return status;
}
/* Close the directory */
io_close.close.level = RAW_CLOSE_CLOSE;
io_close.close.in.file.fnum = io.ntcreatex.out.file.fnum;
io_close.close.in.write_time = 0;
status = smb_raw_close(gp_ctx->cli->tree, &io_close);
if (!NT_STATUS_IS_OK(status)) {
DEBUG(0, ("Failed to close directory\n"));
talloc_free(mem_ctx);
return status;
}
talloc_free(mem_ctx);
return NT_STATUS_OK;
}

View File

@ -63,8 +63,8 @@ NTSTATUS gp_create_gpt_security_descriptor (TALLOC_CTX *mem_ctx, struct security
fs_sd = talloc(mem_ctx, struct security_descriptor);
/* Copy the basic information from the directory server security descriptor */
fs_sd->owner_sid = talloc_memdup(fs_sd, fs_sd->owner_sid, sizeof(struct dom_sid));
fs_sd->group_sid = talloc_memdup(fs_sd, fs_sd->group_sid, sizeof(struct dom_sid));
fs_sd->owner_sid = talloc_memdup(fs_sd, ds_sd->owner_sid, sizeof(struct dom_sid));
fs_sd->group_sid = talloc_memdup(fs_sd, ds_sd->group_sid, sizeof(struct dom_sid));
fs_sd->type = ds_sd->type;
fs_sd->revision = ds_sd->revision;
@ -114,7 +114,7 @@ NTSTATUS gp_create_gpo (struct gp_context *gp_ctx, const char *display_name, str
struct GUID guid_struct;
char *guid_str;
char *name;
//struct security_descriptor *sd;
struct security_descriptor *sd;
TALLOC_CTX *mem_ctx;
struct gp_object *gpo;
unsigned int i;
@ -126,7 +126,7 @@ NTSTATUS gp_create_gpo (struct gp_context *gp_ctx, const char *display_name, str
/* Create the gpo struct to return later */
gpo = talloc(gp_ctx, struct gp_object);
/* Generate GUID */
/* Generate a GUID */
guid_struct = GUID_random();
guid_str = GUID_string(mem_ctx, &guid_struct);
name = talloc_asprintf(gpo, "{%s}", guid_str);
@ -140,8 +140,6 @@ NTSTATUS gp_create_gpo (struct gp_context *gp_ctx, const char *display_name, str
gpo->display_name = talloc_strdup(gpo, display_name);
gpo->file_sys_path = talloc_asprintf(gpo, "\\\\%s\\sysvol\\%s\\Policies\\%s", lp_realm(gp_ctx->lp_ctx), lp_realm(gp_ctx->lp_ctx), name);
/* FIXME: Add gpo->security_descriptor */
/* Create the GPT */
status = gp_create_gpt(gp_ctx, name, gpo->file_sys_path);
if (!NT_STATUS_IS_OK(status)) {
@ -149,13 +147,6 @@ NTSTATUS gp_create_gpo (struct gp_context *gp_ctx, const char *display_name, str
return status;
}
/* Create matching file and DS security descriptors */
/* status = gp_create_gpt_security_descriptor (mem_ctx, gpo->security_descriptor, &sd);
if (!NT_STATUS_IS_OK(status)) {
DEBUG(0, ("Failed to convert ADS security descriptor to filesystem security descriptor\n"));
return status;
}
*/
/* Create the LDAP GPO, including CN=User and CN=Machine */
status = gp_create_ldap_gpo(gp_ctx, gpo);
@ -164,6 +155,26 @@ NTSTATUS gp_create_gpo (struct gp_context *gp_ctx, const char *display_name, str
return status;
}
/* Get the new security descriptor */
status = gp_get_gpo_info(gp_ctx, gpo->dn, &gpo);
if (!NT_STATUS_IS_OK(status)) {
DEBUG(0, ("Failed to fetch LDAP group policy object\n"));
return status;
}
/* Create matching file and DS security descriptors */
status = gp_create_gpt_security_descriptor(mem_ctx, gpo->security_descriptor, &sd);
if (!NT_STATUS_IS_OK(status)) {
DEBUG(0, ("Failed to convert ADS security descriptor to filesystem security descriptor\n"));
return status;
}
/* Set the security descriptor on the filesystem for this GPO */
status = gp_set_gpt_security_descriptor(gp_ctx, gpo, sd);
if (!NT_STATUS_IS_OK(status)) {
DEBUG(0, ("Failed to set security descriptor (ACL) on the file system\n"));
return status;
}
talloc_free(mem_ctx);

View File

@ -92,6 +92,7 @@ NTSTATUS gp_create_ldap_gpo(struct gp_context *gp_ctx, struct gp_object *gpo);
/* File system functions */
NTSTATUS gp_fetch_gpt (struct gp_context *gp_ctx, struct gp_object *gpo, const char **path);
NTSTATUS gp_create_gpt(struct gp_context *gp_ctx, const char *name, const char *file_sys_path);
NTSTATUS gp_set_gpt_security_descriptor(struct gp_context *gp_ctx, struct gp_object *gpo, struct security_descriptor *sd);
/* Managing functions */
NTSTATUS gp_create_gpo (struct gp_context *gp_ctx, const char *display_name, struct gp_object **ret);