mirror of
https://github.com/samba-team/samba.git
synced 2025-01-11 05:18:09 +03:00
07fa6678e4
Python regards 'GPT\.INI$' as a string containing an invalid escape sequence '\.', which is ignored (i.e. treated as the literal sequence of those 2 characters), but only after Python has grumbled to itself, and to you if you enabled DeprecationWarnings. The proper thing to do here is use r-strings, like r'GPT\.INI$', which tell Python that all backslashes are literal. Alternatively (as we do once in this patch), the backslash can itself be escaped ('\\'). There are more problems of this nature in the build scripts. Signed-off-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz> Reviewed-by: Noel Power <npower@samba.org>
236 lines
9.5 KiB
Python
236 lines
9.5 KiB
Python
# Manipulate ACLs on directory objects
|
|
#
|
|
# Copyright (C) Nadezhda Ivanova <nivanova@samba.org> 2010
|
|
#
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation; either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
#
|
|
|
|
import samba.getopt as options
|
|
from samba.dcerpc import security
|
|
from samba.samdb import SamDB
|
|
from samba.ndr import ndr_unpack, ndr_pack
|
|
from samba.dcerpc.security import (
|
|
GUID_DRS_ALLOCATE_RIDS, GUID_DRS_CHANGE_DOMAIN_MASTER,
|
|
GUID_DRS_CHANGE_INFR_MASTER, GUID_DRS_CHANGE_PDC,
|
|
GUID_DRS_CHANGE_RID_MASTER, GUID_DRS_CHANGE_SCHEMA_MASTER,
|
|
GUID_DRS_GET_CHANGES, GUID_DRS_GET_ALL_CHANGES,
|
|
GUID_DRS_GET_FILTERED_ATTRIBUTES, GUID_DRS_MANAGE_TOPOLOGY,
|
|
GUID_DRS_MONITOR_TOPOLOGY, GUID_DRS_REPL_SYNCRONIZE,
|
|
GUID_DRS_RO_REPL_SECRET_SYNC)
|
|
|
|
|
|
import ldb
|
|
from ldb import SCOPE_BASE
|
|
import re
|
|
|
|
from samba.auth import system_session
|
|
from samba.netcmd import (
|
|
Command,
|
|
CommandError,
|
|
SuperCommand,
|
|
Option,
|
|
)
|
|
|
|
|
|
class cmd_dsacl_set(Command):
|
|
"""Modify access list on a directory object."""
|
|
|
|
synopsis = "%prog [options]"
|
|
car_help = """ The access control right to allow or deny """
|
|
|
|
takes_optiongroups = {
|
|
"sambaopts": options.SambaOptions,
|
|
"credopts": options.CredentialsOptions,
|
|
"versionopts": options.VersionOptions,
|
|
}
|
|
|
|
takes_options = [
|
|
Option("-H", "--URL", help="LDB URL for database or target server",
|
|
type=str, metavar="URL", dest="H"),
|
|
Option("--car", type="choice", choices=["change-rid",
|
|
"change-pdc",
|
|
"change-infrastructure",
|
|
"change-schema",
|
|
"change-naming",
|
|
"allocate_rids",
|
|
"get-changes",
|
|
"get-changes-all",
|
|
"get-changes-filtered",
|
|
"topology-manage",
|
|
"topology-monitor",
|
|
"repl-sync",
|
|
"ro-repl-secret-sync"],
|
|
help=car_help),
|
|
Option("--action", type="choice", choices=["allow", "deny"],
|
|
help="""Deny or allow access"""),
|
|
Option("--objectdn", help="DN of the object whose SD to modify",
|
|
type="string"),
|
|
Option("--trusteedn", help="DN of the entity that gets access",
|
|
type="string"),
|
|
Option("--sddl", help="An ACE or group of ACEs to be added on the object",
|
|
type="string"),
|
|
]
|
|
|
|
def find_trustee_sid(self, samdb, trusteedn):
|
|
res = samdb.search(base=trusteedn, expression="(objectClass=*)",
|
|
scope=SCOPE_BASE)
|
|
assert(len(res) == 1)
|
|
return ndr_unpack(security.dom_sid, res[0]["objectSid"][0])
|
|
|
|
def modify_descriptor(self, samdb, object_dn, desc, controls=None):
|
|
assert(isinstance(desc, security.descriptor))
|
|
m = ldb.Message()
|
|
m.dn = ldb.Dn(samdb, object_dn)
|
|
m["nTSecurityDescriptor"] = ldb.MessageElement(
|
|
(ndr_pack(desc)), ldb.FLAG_MOD_REPLACE,
|
|
"nTSecurityDescriptor")
|
|
samdb.modify(m)
|
|
|
|
def read_descriptor(self, samdb, object_dn):
|
|
res = samdb.search(base=object_dn, scope=SCOPE_BASE,
|
|
attrs=["nTSecurityDescriptor"])
|
|
# we should theoretically always have an SD
|
|
assert(len(res) == 1)
|
|
desc = res[0]["nTSecurityDescriptor"][0]
|
|
return ndr_unpack(security.descriptor, desc)
|
|
|
|
def get_domain_sid(self, samdb):
|
|
res = samdb.search(base=samdb.domain_dn(),
|
|
expression="(objectClass=*)", scope=SCOPE_BASE)
|
|
return ndr_unpack(security.dom_sid, res[0]["objectSid"][0])
|
|
|
|
def add_ace(self, samdb, object_dn, new_ace):
|
|
"""Add new ace explicitly."""
|
|
desc = self.read_descriptor(samdb, object_dn)
|
|
new_ace = security.descriptor.from_sddl("D:" + new_ace,self.get_domain_sid(samdb))
|
|
new_ace_list = re.findall(r"\(.*?\)",new_ace.as_sddl())
|
|
for new_ace in new_ace_list:
|
|
desc_sddl = desc.as_sddl(self.get_domain_sid(samdb))
|
|
# TODO add bindings for descriptor manipulation and get rid of this
|
|
desc_aces = re.findall(r"\(.*?\)", desc_sddl)
|
|
for ace in desc_aces:
|
|
if ("ID" in ace):
|
|
desc_sddl = desc_sddl.replace(ace, "")
|
|
if new_ace in desc_sddl:
|
|
continue
|
|
if desc_sddl.find("(") >= 0:
|
|
desc_sddl = desc_sddl[:desc_sddl.index("(")] + new_ace + desc_sddl[desc_sddl.index("("):]
|
|
else:
|
|
desc_sddl = desc_sddl + new_ace
|
|
desc = security.descriptor.from_sddl(desc_sddl, self.get_domain_sid(samdb))
|
|
self.modify_descriptor(samdb, object_dn, desc)
|
|
|
|
def print_acl(self, samdb, object_dn, new=False):
|
|
desc = self.read_descriptor(samdb, object_dn)
|
|
desc_sddl = desc.as_sddl(self.get_domain_sid(samdb))
|
|
if new:
|
|
self.outf.write("new descriptor for %s:\n" % object_dn)
|
|
else:
|
|
self.outf.write("old descriptor for %s:\n" % object_dn)
|
|
self.outf.write(desc_sddl + "\n")
|
|
|
|
def run(self, car, action, objectdn, trusteedn, sddl,
|
|
H=None, credopts=None, sambaopts=None, versionopts=None):
|
|
lp = sambaopts.get_loadparm()
|
|
creds = credopts.get_credentials(lp)
|
|
|
|
if sddl is None and (car is None or action is None
|
|
or objectdn is None or trusteedn is None):
|
|
return self.usage()
|
|
|
|
samdb = SamDB(url=H, session_info=system_session(),
|
|
credentials=creds, lp=lp)
|
|
cars = {'change-rid': GUID_DRS_CHANGE_RID_MASTER,
|
|
'change-pdc': GUID_DRS_CHANGE_PDC,
|
|
'change-infrastructure': GUID_DRS_CHANGE_INFR_MASTER,
|
|
'change-schema': GUID_DRS_CHANGE_SCHEMA_MASTER,
|
|
'change-naming': GUID_DRS_CHANGE_DOMAIN_MASTER,
|
|
'allocate_rids': GUID_DRS_ALLOCATE_RIDS,
|
|
'get-changes': GUID_DRS_GET_CHANGES,
|
|
'get-changes-all': GUID_DRS_GET_ALL_CHANGES,
|
|
'get-changes-filtered': GUID_DRS_GET_FILTERED_ATTRIBUTES,
|
|
'topology-manage': GUID_DRS_MANAGE_TOPOLOGY,
|
|
'topology-monitor': GUID_DRS_MONITOR_TOPOLOGY,
|
|
'repl-sync': GUID_DRS_REPL_SYNCRONIZE,
|
|
'ro-repl-secret-sync': GUID_DRS_RO_REPL_SECRET_SYNC,
|
|
}
|
|
sid = self.find_trustee_sid(samdb, trusteedn)
|
|
if sddl:
|
|
new_ace = sddl
|
|
elif action == "allow":
|
|
new_ace = "(OA;;CR;%s;;%s)" % (cars[car], str(sid))
|
|
elif action == "deny":
|
|
new_ace = "(OD;;CR;%s;;%s)" % (cars[car], str(sid))
|
|
else:
|
|
raise CommandError("Wrong argument '%s'!" % action)
|
|
|
|
self.print_acl(samdb, objectdn)
|
|
self.add_ace(samdb, objectdn, new_ace)
|
|
self.print_acl(samdb, objectdn, new=True)
|
|
|
|
|
|
class cmd_dsacl_get(Command):
|
|
"""Print access list on a directory object."""
|
|
|
|
synopsis = "%prog [options]"
|
|
|
|
takes_optiongroups = {
|
|
"sambaopts": options.SambaOptions,
|
|
"credopts": options.CredentialsOptions,
|
|
"versionopts": options.VersionOptions,
|
|
}
|
|
|
|
takes_options = [
|
|
Option("-H", "--URL", help="LDB URL for database or target server",
|
|
type=str, metavar="URL", dest="H"),
|
|
Option("--objectdn", help="DN of the object whose SD to modify",
|
|
type="string"),
|
|
]
|
|
|
|
def read_descriptor(self, samdb, object_dn):
|
|
res = samdb.search(base=object_dn, scope=SCOPE_BASE,
|
|
attrs=["nTSecurityDescriptor"])
|
|
# we should theoretically always have an SD
|
|
assert(len(res) == 1)
|
|
desc = res[0]["nTSecurityDescriptor"][0]
|
|
return ndr_unpack(security.descriptor, desc)
|
|
|
|
def get_domain_sid(self, samdb):
|
|
res = samdb.search(base=samdb.domain_dn(),
|
|
expression="(objectClass=*)", scope=SCOPE_BASE)
|
|
return ndr_unpack( security.dom_sid,res[0]["objectSid"][0])
|
|
|
|
def print_acl(self, samdb, object_dn):
|
|
desc = self.read_descriptor(samdb, object_dn)
|
|
desc_sddl = desc.as_sddl(self.get_domain_sid(samdb))
|
|
self.outf.write("descriptor for %s:\n" % object_dn)
|
|
self.outf.write(desc_sddl + "\n")
|
|
|
|
def run(self, objectdn,
|
|
H=None, credopts=None, sambaopts=None, versionopts=None):
|
|
lp = sambaopts.get_loadparm()
|
|
creds = credopts.get_credentials(lp)
|
|
|
|
samdb = SamDB(url=H, session_info=system_session(),
|
|
credentials=creds, lp=lp)
|
|
self.print_acl(samdb, objectdn)
|
|
|
|
|
|
class cmd_dsacl(SuperCommand):
|
|
"""DS ACLs manipulation."""
|
|
|
|
subcommands = {}
|
|
subcommands["set"] = cmd_dsacl_set()
|
|
subcommands["get"] = cmd_dsacl_get()
|