1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-25 23:21:54 +03:00
samba-mirror/python/samba/tests/token_factory.py
Andrew Bartlett e2cc29d132 libcli/security: Pass in claims evaluation state when building any security token
Signed-off-by: Andrew Bartlett <abartlet@samba.org>
Reviewed-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
2023-09-26 23:45:35 +00:00

240 lines
9.3 KiB
Python

# Unix SMB/CIFS implementation.
# Copyright © Catalyst IT 2023
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
#
"""An API for creating arbitrary security tokens."""
from samba.dcerpc import security
CLAIM_VAL_TYPES = {
int: 0x0001,
'uint': 0x0002,
str: 0x0003,
security.dom_sid: 0x0005,
bool: 0x0006,
bytes: 0x0010
}
def _normalise_claims(args):
if isinstance(args, security.CLAIM_SECURITY_ATTRIBUTE_RELATIVE_V1):
return [args]
if args is None or len(args) == 0:
return []
if isinstance(args, list):
for x in args:
if not isinstance(x, security.CLAIM_SECURITY_ATTRIBUTE_RELATIVE_V1):
raise TypeError(f"list should be of claims, not '{type(x)}'")
return args
claims_out = []
if isinstance(args, dict):
# the key is the name and the value is a list of claim values
for k, v in args.items():
if not isinstance(k, str):
raise TypeError("expected str for claim name, "
f"not {type(k)} (for {k!r})")
if isinstance(v, (str, int)):
v = [v]
if not isinstance(v, list):
raise TypeError(f"expected list of claim values for '{k}', "
f"not {v!r} of type {type(v)}")
if len(v) == 0:
raise ValueError("empty claim lists are not valid"
f" (for {k})")
t = type(v[0])
for val in v[1:]:
if type(val) != t:
raise TypeError(f"claim values for '{k}' "
"should all be the same type")
c = security.CLAIM_SECURITY_ATTRIBUTE_RELATIVE_V1()
c.name = k
c.value_type = CLAIM_VAL_TYPES[t]
c.values = v
c.value_count = len(v)
claims_out.append(c)
return claims_out
def str_to_sid(s):
lut = {
# These are a subset of two letter aliases that don't need a
# domain SID or other magic. (c.f. sid_strings test).
'AA': security.SID_BUILTIN_ACCESS_CONTROL_ASSISTANCE_OPS, # S-1-5-32-579
'AC': security.SID_SECURITY_BUILTIN_PACKAGE_ANY_PACKAGE, # S-1-15-2-1
'AN': security.SID_NT_ANONYMOUS, # S-1-5-7
'AO': security.SID_BUILTIN_ACCOUNT_OPERATORS, # S-1-5-32-548
'AS': security.SID_AUTHENTICATION_AUTHORITY_ASSERTED_IDENTITY, # S-1-18-1
'AU': security.SID_NT_AUTHENTICATED_USERS, # S-1-5-11
'BA': security.SID_BUILTIN_ADMINISTRATORS, # S-1-5-32-544
'BG': security.SID_BUILTIN_GUESTS, # S-1-5-32-546
'BO': security.SID_BUILTIN_BACKUP_OPERATORS, # S-1-5-32-551
'BU': security.SID_BUILTIN_USERS, # S-1-5-32-545
'CD': security.SID_BUILTIN_CERT_SERV_DCOM_ACCESS, # S-1-5-32-574
'CG': security.SID_CREATOR_GROUP, # S-1-3-1
'CO': security.SID_CREATOR_OWNER, # S-1-3-0
'CY': security.SID_BUILTIN_CRYPTO_OPERATORS, # S-1-5-32-569
'ED': security.SID_NT_ENTERPRISE_DCS, # S-1-5-9
'ER': security.SID_BUILTIN_EVENT_LOG_READERS, # S-1-5-32-573
'ES': security.SID_BUILTIN_RDS_ENDPOINT_SERVERS, # S-1-5-32-576
'HA': security.SID_BUILTIN_HYPER_V_ADMINS, # S-1-5-32-578
'HI': security.SID_SECURITY_MANDATORY_HIGH, # S-1-16-12288
'IS': security.SID_BUILTIN_IUSERS, # S-1-5-32-568
'IU': security.SID_NT_INTERACTIVE, # S-1-5-4
'LS': security.SID_NT_LOCAL_SERVICE, # S-1-5-19
'LU': security.SID_BUILTIN_PERFLOG_USERS, # S-1-5-32-559
'LW': security.SID_SECURITY_MANDATORY_LOW, # S-1-16-4096
'ME': security.SID_SECURITY_MANDATORY_MEDIUM, # S-1-16-8192
'MP': security.SID_SECURITY_MANDATORY_MEDIUM_PLUS, # S-1-16-8448
'MS': security.SID_BUILTIN_RDS_MANAGEMENT_SERVERS, # S-1-5-32-577
'MU': security.SID_BUILTIN_PERFMON_USERS, # S-1-5-32-558
'NO': security.SID_BUILTIN_NETWORK_CONF_OPERATORS, # S-1-5-32-556
'NS': security.SID_NT_NETWORK_SERVICE, # S-1-5-20
'NU': security.SID_NT_NETWORK, # S-1-5-2
'OW': security.SID_OWNER_RIGHTS, # S-1-3-4
'PO': security.SID_BUILTIN_PRINT_OPERATORS, # S-1-5-32-550
'PS': security.SID_NT_SELF, # S-1-5-10
'PU': security.SID_BUILTIN_POWER_USERS, # S-1-5-32-547
'RA': security.SID_BUILTIN_RDS_REMOTE_ACCESS_SERVERS, # S-1-5-32-575
'RC': security.SID_NT_RESTRICTED, # S-1-5-12
'RD': security.SID_BUILTIN_REMOTE_DESKTOP_USERS, # S-1-5-32-555
'RE': security.SID_BUILTIN_REPLICATOR, # S-1-5-32-552
'RM': security.SID_BUILTIN_REMOTE_MANAGEMENT_USERS, # S-1-5-32-580
'RU': security.SID_BUILTIN_PREW2K, # S-1-5-32-554
'SI': security.SID_SECURITY_MANDATORY_SYSTEM, # S-1-16-16384
'SO': security.SID_BUILTIN_SERVER_OPERATORS, # S-1-5-32-549
'SS': security.SID_SERVICE_ASSERTED_IDENTITY, # S-1-18-2
'SU': security.SID_NT_SERVICE, # S-1-5-6
'SY': security.SID_NT_SYSTEM, # S-1-5-18
'WD': security.SID_WORLD, # S-1-1-0
'WR': security.SID_SECURITY_RESTRICTED_CODE, # S-1-5-33
}
if s in lut:
s = lut[s]
return security.dom_sid(s)
def _normalise_sids(args):
if isinstance(args, security.dom_sid):
return [args]
if isinstance(args, str):
return [str_to_sid(args)]
if not isinstance(args, list):
raise TypeError("expected a SID, sid string, or list of SIDs, "
f"not'{type(args)}'")
sids_out = []
for s in args:
if isinstance(s, str):
s = str_to_sid(s)
elif not isinstance(s, security.dom_sid):
raise TypeError(f"expected a SID, not'{type(s)}'")
sids_out.append(s)
return sids_out
def _normalise_mask(mask, mask_type):
if isinstance(mask, int):
return mask
if not isinstance(mask, list):
raise TypeError("expected int mask or list of flags")
if mask_type == 'privileges':
prefix = 'SEC_PRIV_'
tail = '_BIT'
elif mask_type == 'rights':
prefix = 'LSA_POLICY_MODE_'
tail = ''
else:
raise ValueError(f"unknown mask_type value: {mask_type}")
mask_out = 0
for x in mask:
if isinstance(x, str) and x.startswith(prefix):
if not x.endswith(tail):
# we don't want security.SEC_PRIV_SHUTDOWN (19),
# we want security.SEC_PRIV_SHUTDOWN_BIT (1 << 20)
# but you can write "SEC_PRIV_SHUTDOWN"
x += tail
x = getattr(security, x)
mask_out |= x
return mask_out
def token(sids=None, **kwargs):
"""Return a security token with the specified attributes.
The security.token API is annoying and fragile; here we wrap it in
something nicer.
In general the arguments can either be objects of the correct
type, or Python strings or structures that clearly convert to that
type. For example, there two are equivalent:
>>> t = token([security.dom_sid("S-1-2")])
>>> t = token(["S-1-2"])
To add claims and device SIDs you do something like this:
>>> t = token(["AA", WD"],
device_sids=["WD"],
user_claims={"Title": ["PM"],
"ClearanceLevel": [1]}
"""
claims_kws = ['device_claims',
'local_claims',
'user_claims']
sid_kws = ['sids', 'device_sids']
mask_kws = ['privileges',
'rights']
if sids is not None:
kwargs['sids'] = sids
norm_args = {}
for k, v in kwargs.items():
if k in claims_kws:
norm_args[k] = _normalise_claims(v)
elif k in mask_kws:
norm_args[k] = _normalise_mask(v, k)
elif k in sid_kws:
norm_args[k] = _normalise_sids(v)
else:
raise TypeError(f"{k} is an invalid keyword argument")
t = security.token(evaluate_claims=security.CLAIMS_EVALUATION_ALWAYS)
for k, v in norm_args.items():
setattr(t, k, v)
if isinstance(v, list):
setattr(t, 'num_' + k, len(v))
return t