source: trunk/server/source4/lib/policy/gp_ldap.c

Last change on this file was 745, checked in by Silvan Scherrer, 13 years ago

Samba Server: updated trunk to 3.6.0

File size: 31.4 KB
Line 
1/*
2 * Unix SMB/CIFS implementation.
3 * Group Policy Object Support
4 * Copyright (C) Jelmer Vernooij 2008
5 * Copyright (C) Wilco Baan Hofman 2008-2010
6 *
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published by
9 * the Free Software Foundation; either version 3 of the License, or
10 * (at your option) any later version.
11 *
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
16 *
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, see <http://www.gnu.org/licenses/>.
19 */
20#include "includes.h"
21#include "param/param.h"
22#include <ldb.h>
23#include "lib/ldb-samba/ldb_wrap.h"
24#include "auth/credentials/credentials.h"
25#include "../librpc/gen_ndr/nbt.h"
26#include "libcli/libcli.h"
27#include "libnet/libnet.h"
28#include "../librpc/gen_ndr/ndr_security.h"
29#include "../libcli/security/security.h"
30#include "libcli/ldap/ldap_ndr.h"
31#include "../lib/talloc/talloc.h"
32#include "lib/policy/policy.h"
33
34struct gpo_stringmap {
35 const char *str;
36 uint32_t flags;
37};
38static const struct gpo_stringmap gplink_options [] = {
39 { "GPLINK_OPT_DISABLE", GPLINK_OPT_DISABLE },
40 { "GPLINK_OPT_ENFORCE", GPLINK_OPT_ENFORCE },
41 { NULL, 0 }
42};
43static const struct gpo_stringmap gpo_flags [] = {
44 { "GPO_FLAG_USER_DISABLE", GPO_FLAG_USER_DISABLE },
45 { "GPO_FLAG_MACHINE_DISABLE", GPO_FLAG_MACHINE_DISABLE },
46 { NULL, 0 }
47};
48static const struct gpo_stringmap gpo_inheritance [] = {
49 { "GPO_INHERIT", GPO_INHERIT },
50 { "GPO_BLOCK_INHERITANCE", GPO_BLOCK_INHERITANCE },
51 { NULL, 0 }
52};
53
54
55static NTSTATUS parse_gpo(TALLOC_CTX *mem_ctx, struct ldb_message *msg, struct gp_object **ret)
56{
57 struct gp_object *gpo = talloc(mem_ctx, struct gp_object);
58 enum ndr_err_code ndr_err;
59 const DATA_BLOB *data;
60
61 NT_STATUS_HAVE_NO_MEMORY(gpo);
62
63 gpo->dn = talloc_strdup(mem_ctx, ldb_dn_get_linearized(msg->dn));
64 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(gpo->dn, gpo);
65
66 DEBUG(9, ("Parsing GPO LDAP data for %s\n", gpo->dn));
67
68 gpo->display_name = talloc_strdup(gpo, ldb_msg_find_attr_as_string(msg, "displayName", ""));
69 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(gpo->display_name, gpo);
70
71 gpo->name = talloc_strdup(gpo, ldb_msg_find_attr_as_string(msg, "name", ""));
72 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(gpo->name, gpo);
73
74 gpo->flags = ldb_msg_find_attr_as_uint(msg, "flags", 0);
75 gpo->version = ldb_msg_find_attr_as_uint(msg, "versionNumber", 0);
76
77 gpo->file_sys_path = talloc_strdup(gpo, ldb_msg_find_attr_as_string(msg, "gPCFileSysPath", ""));
78 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(gpo->file_sys_path, gpo);
79
80 /* Pull the security descriptor through the NDR library */
81 data = ldb_msg_find_ldb_val(msg, "nTSecurityDescriptor");
82 gpo->security_descriptor = talloc(gpo, struct security_descriptor);
83 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(gpo->security_descriptor, gpo);
84
85 ndr_err = ndr_pull_struct_blob(data,
86 mem_ctx,
87 gpo->security_descriptor,
88 (ndr_pull_flags_fn_t)ndr_pull_security_descriptor);
89 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
90 return ndr_map_error2ntstatus(ndr_err);
91 }
92
93 *ret = gpo;
94 return NT_STATUS_OK;
95}
96
97NTSTATUS gp_get_gpo_flags(TALLOC_CTX *mem_ctx, uint32_t flags, const char ***ret)
98{
99 unsigned int i, count=0;
100 const char **flag_strs = talloc_array(mem_ctx, const char *, 1);
101
102 NT_STATUS_HAVE_NO_MEMORY(flag_strs);
103
104 flag_strs[0] = NULL;
105
106 for (i = 0; gpo_flags[i].str != NULL; i++) {
107 if (flags & gpo_flags[i].flags) {
108 flag_strs = talloc_realloc(mem_ctx, flag_strs, const char *, count+2);
109 NT_STATUS_HAVE_NO_MEMORY(flag_strs);
110 flag_strs[count] = gpo_flags[i].str;
111 flag_strs[count+1] = NULL;
112 count++;
113 }
114 }
115 *ret = flag_strs;
116 return NT_STATUS_OK;
117}
118
119NTSTATUS gp_get_gplink_options(TALLOC_CTX *mem_ctx, uint32_t options, const char ***ret)
120{
121 unsigned int i, count=0;
122 const char **flag_strs = talloc_array(mem_ctx, const char *, 1);
123
124 NT_STATUS_HAVE_NO_MEMORY(flag_strs);
125 flag_strs[0] = NULL;
126
127 for (i = 0; gplink_options[i].str != NULL; i++) {
128 if (options & gplink_options[i].flags) {
129 flag_strs = talloc_realloc(mem_ctx, flag_strs, const char *, count+2);
130 NT_STATUS_HAVE_NO_MEMORY(flag_strs);
131 flag_strs[count] = gplink_options[i].str;
132 flag_strs[count+1] = NULL;
133 count++;
134 }
135 }
136 *ret = flag_strs;
137 return NT_STATUS_OK;
138}
139
140NTSTATUS gp_init(TALLOC_CTX *mem_ctx,
141 struct loadparm_context *lp_ctx,
142 struct cli_credentials *credentials,
143 struct tevent_context *ev_ctx,
144 struct gp_context **gp_ctx)
145{
146
147 struct libnet_LookupDCs *io;
148 char *url;
149 struct libnet_context *net_ctx;
150 struct ldb_context *ldb_ctx;
151 NTSTATUS rv;
152
153 /* Initialise the libnet context */
154 net_ctx = libnet_context_init(ev_ctx, lp_ctx);
155 net_ctx->cred = credentials;
156
157 /* Prepare libnet lookup structure for looking a DC (PDC is correct). */
158 io = talloc_zero(mem_ctx, struct libnet_LookupDCs);
159 NT_STATUS_HAVE_NO_MEMORY(io);
160 io->in.name_type = NBT_NAME_PDC;
161 io->in.domain_name = lpcfg_workgroup(lp_ctx);
162
163 /* Find Active DC's */
164 rv = libnet_LookupDCs(net_ctx, mem_ctx, io);
165 if (!NT_STATUS_IS_OK(rv)) {
166 DEBUG(0, ("Failed to lookup DCs in domain\n"));
167 return rv;
168 }
169
170 /* Connect to ldap://DC_NAME with all relevant contexts*/
171 url = talloc_asprintf(mem_ctx, "ldap://%s", io->out.dcs[0].name);
172 NT_STATUS_HAVE_NO_MEMORY(url);
173 ldb_ctx = ldb_wrap_connect(mem_ctx, net_ctx->event_ctx, lp_ctx,
174 url, NULL, net_ctx->cred, 0);
175 if (ldb_ctx == NULL) {
176 DEBUG(0, ("Can't connect to DC's LDAP with url %s\n", url));
177 return NT_STATUS_UNSUCCESSFUL;
178 }
179
180
181 *gp_ctx = talloc_zero(mem_ctx, struct gp_context);
182 NT_STATUS_HAVE_NO_MEMORY(gp_ctx);
183
184 (*gp_ctx)->lp_ctx = lp_ctx;
185 (*gp_ctx)->credentials = credentials;
186 (*gp_ctx)->ev_ctx = ev_ctx;
187 (*gp_ctx)->ldb_ctx = ldb_ctx;
188 (*gp_ctx)->active_dc = io->out.dcs[0];
189
190 /* We don't need to keep the libnet context */
191 talloc_free(net_ctx);
192 return NT_STATUS_OK;
193}
194
195NTSTATUS gp_list_all_gpos(struct gp_context *gp_ctx, struct gp_object ***ret)
196{
197 struct ldb_result *result;
198 int rv;
199 NTSTATUS status;
200 TALLOC_CTX *mem_ctx;
201 struct ldb_dn *dn;
202 struct gp_object **gpo;
203 unsigned int i; /* same as in struct ldb_result */
204 const char **attrs;
205
206 /* Create a forked memory context, as a base for everything here */
207 mem_ctx = talloc_new(gp_ctx);
208 NT_STATUS_HAVE_NO_MEMORY(mem_ctx);
209
210 /* Create full ldb dn of the policies base object */
211 dn = ldb_get_default_basedn(gp_ctx->ldb_ctx);
212 rv = ldb_dn_add_child(dn, ldb_dn_new(mem_ctx, gp_ctx->ldb_ctx, "CN=Policies,CN=System"));
213 if (!rv) {
214 DEBUG(0, ("Can't append subtree to DN\n"));
215 talloc_free(mem_ctx);
216 return NT_STATUS_UNSUCCESSFUL;
217 }
218
219 DEBUG(10, ("Searching for policies in DN: %s\n", ldb_dn_get_linearized(dn)));
220
221 attrs = talloc_array(mem_ctx, const char *, 7);
222 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(attrs, mem_ctx);
223
224 attrs[0] = "nTSecurityDescriptor";
225 attrs[1] = "versionNumber";
226 attrs[2] = "flags";
227 attrs[3] = "name";
228 attrs[4] = "displayName";
229 attrs[5] = "gPCFileSysPath";
230 attrs[6] = NULL;
231
232 rv = ldb_search(gp_ctx->ldb_ctx, mem_ctx, &result, dn, LDB_SCOPE_ONELEVEL, attrs, "(objectClass=groupPolicyContainer)");
233 if (rv != LDB_SUCCESS) {
234 DEBUG(0, ("LDB search failed: %s\n%s\n", ldb_strerror(rv), ldb_errstring(gp_ctx->ldb_ctx)));
235 talloc_free(mem_ctx);
236 return NT_STATUS_UNSUCCESSFUL;
237 }
238
239 gpo = talloc_array(gp_ctx, struct gp_object *, result->count+1);
240 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(gpo, mem_ctx);
241
242 gpo[result->count] = NULL;
243
244 for (i = 0; i < result->count; i++) {
245 status = parse_gpo(gp_ctx, result->msgs[i], &gpo[i]);
246 if (!NT_STATUS_IS_OK(status)) {
247 DEBUG(0, ("Failed to parse GPO.\n"));
248 talloc_free(mem_ctx);
249 return status;
250 }
251 }
252
253 talloc_free(mem_ctx);
254
255 *ret = gpo;
256 return NT_STATUS_OK;
257}
258
259NTSTATUS gp_get_gpo_info(struct gp_context *gp_ctx, const char *dn_str, struct gp_object **ret)
260{
261 struct ldb_result *result;
262 struct ldb_dn *dn;
263 struct gp_object *gpo;
264 int rv;
265 NTSTATUS status;
266 TALLOC_CTX *mem_ctx;
267 const char **attrs;
268
269 /* Create a forked memory context, as a base for everything here */
270 mem_ctx = talloc_new(gp_ctx);
271 NT_STATUS_HAVE_NO_MEMORY(mem_ctx);
272
273 /* Create an ldb dn struct for the dn string */
274 dn = ldb_dn_new(mem_ctx, gp_ctx->ldb_ctx, dn_str);
275
276 attrs = talloc_array(mem_ctx, const char *, 7);
277 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(attrs, mem_ctx);
278
279 attrs[0] = "nTSecurityDescriptor";
280 attrs[1] = "versionNumber";
281 attrs[2] = "flags";
282 attrs[3] = "name";
283 attrs[4] = "displayName";
284 attrs[5] = "gPCFileSysPath";
285 attrs[6] = NULL;
286
287 rv = ldb_search(gp_ctx->ldb_ctx,
288 mem_ctx,
289 &result,
290 dn,
291 LDB_SCOPE_BASE,
292 attrs,
293 "objectClass=groupPolicyContainer");
294 if (rv != LDB_SUCCESS) {
295 DEBUG(0, ("LDB search failed: %s\n%s\n", ldb_strerror(rv), ldb_errstring(gp_ctx->ldb_ctx)));
296 talloc_free(mem_ctx);
297 return NT_STATUS_UNSUCCESSFUL;
298 }
299
300 /* We expect exactly one record */
301 if (result->count != 1) {
302 DEBUG(0, ("Could not find GPC with dn %s\n", dn_str));
303 talloc_free(mem_ctx);
304 return NT_STATUS_NOT_FOUND;
305 }
306
307 status = parse_gpo(gp_ctx, result->msgs[0], &gpo);
308 if (!NT_STATUS_IS_OK(status)) {
309 DEBUG(0, ("Failed to parse GPO.\n"));
310 talloc_free(mem_ctx);
311 return status;
312 }
313
314 talloc_free(mem_ctx);
315
316 *ret = gpo;
317 return NT_STATUS_OK;
318}
319
320static NTSTATUS parse_gplink (TALLOC_CTX *mem_ctx, const char *gplink_str, struct gp_link ***ret)
321{
322 int start, idx=0;
323 int pos;
324 struct gp_link **gplinks;
325 char *buf, *end;
326 const char *gplink_start = "[LDAP://";
327
328 gplinks = talloc_array(mem_ctx, struct gp_link *, 1);
329 NT_STATUS_HAVE_NO_MEMORY(gplinks);
330
331 gplinks[0] = NULL;
332
333 /* Assuming every gPLink starts with "[LDAP://" */
334 start = strlen(gplink_start);
335
336 for (pos = start; pos < strlen(gplink_str); pos++) {
337 if (gplink_str[pos] == ';') {
338 gplinks = talloc_realloc(mem_ctx, gplinks, struct gp_link *, idx+2);
339 NT_STATUS_HAVE_NO_MEMORY(gplinks);
340 gplinks[idx] = talloc(mem_ctx, struct gp_link);
341 NT_STATUS_HAVE_NO_MEMORY(gplinks[idx]);
342 gplinks[idx]->dn = talloc_strndup(mem_ctx,
343 gplink_str + start,
344 pos - start);
345 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(gplinks[idx]->dn, gplinks);
346
347 for (start = pos + 1; gplink_str[pos] != ']'; pos++);
348
349 buf = talloc_strndup(gplinks, gplink_str + start, pos - start);
350 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(buf, gplinks);
351 gplinks[idx]->options = (uint32_t) strtoll(buf, &end, 0);
352 talloc_free(buf);
353
354 /* Set the last entry in the array to be NULL */
355 gplinks[idx + 1] = NULL;
356
357 /* Increment the array index, the string position past
358 the next "[LDAP://", and set the start reference */
359 idx++;
360 pos += strlen(gplink_start)+1;
361 start = pos;
362 }
363 }
364
365 *ret = gplinks;
366 return NT_STATUS_OK;
367}
368
369
370NTSTATUS gp_get_gplinks(struct gp_context *gp_ctx, const char *dn_str, struct gp_link ***ret)
371{
372 TALLOC_CTX *mem_ctx;
373 struct ldb_dn *dn;
374 struct ldb_result *result;
375 struct gp_link **gplinks;
376 char *gplink_str;
377 int rv;
378 unsigned int i, j;
379 NTSTATUS status;
380
381 /* Create a forked memory context, as a base for everything here */
382 mem_ctx = talloc_new(gp_ctx);
383 NT_STATUS_HAVE_NO_MEMORY(mem_ctx);
384
385 dn = ldb_dn_new(mem_ctx, gp_ctx->ldb_ctx, dn_str);
386
387 rv = ldb_search(gp_ctx->ldb_ctx, mem_ctx, &result, dn, LDB_SCOPE_BASE, NULL, "(objectclass=*)");
388 if (rv != LDB_SUCCESS) {
389 DEBUG(0, ("LDB search failed: %s\n%s\n", ldb_strerror(rv), ldb_errstring(gp_ctx->ldb_ctx)));
390 talloc_free(mem_ctx);
391 return NT_STATUS_UNSUCCESSFUL;
392 }
393
394 for (i = 0; i < result->count; i++) {
395 for (j = 0; j < result->msgs[i]->num_elements; j++) {
396 struct ldb_message_element *element = &result->msgs[i]->elements[j];
397
398 if (strcmp(element->name, "gPLink") == 0) {
399 SMB_ASSERT(element->num_values > 0);
400 gplink_str = talloc_strdup(mem_ctx, (char *) element->values[0].data);
401 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(gplink_str, mem_ctx);
402 goto found;
403 }
404 }
405 }
406 gplink_str = talloc_strdup(mem_ctx, "");
407 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(gplink_str, mem_ctx);
408
409 found:
410
411 status = parse_gplink(gp_ctx, gplink_str, &gplinks);
412 if (!NT_STATUS_IS_OK(status)) {
413 DEBUG(0, ("Failed to parse gPLink\n"));
414 return status;
415 }
416
417 talloc_free(mem_ctx);
418
419 *ret = gplinks;
420 return NT_STATUS_OK;
421}
422
423NTSTATUS gp_list_gpos(struct gp_context *gp_ctx, struct security_token *token, const char ***ret)
424{
425 TALLOC_CTX *mem_ctx;
426 const char **gpos;
427 struct ldb_result *result;
428 char *sid;
429 struct ldb_dn *dn;
430 struct ldb_message_element *element;
431 bool inherit;
432 const char *attrs[] = { "objectClass", NULL };
433 int rv;
434 NTSTATUS status;
435 unsigned int count = 0;
436 unsigned int i;
437 enum {
438 ACCOUNT_TYPE_USER = 0,
439 ACCOUNT_TYPE_MACHINE = 1
440 } account_type;
441
442 /* Create a forked memory context, as a base for everything here */
443 mem_ctx = talloc_new(gp_ctx);
444 NT_STATUS_HAVE_NO_MEMORY(mem_ctx);
445
446 sid = ldap_encode_ndr_dom_sid(mem_ctx,
447 &token->sids[PRIMARY_USER_SID_INDEX]);
448 NT_STATUS_HAVE_NO_MEMORY(sid);
449
450 /* Find the user DN and objectclass via the sid from the security token */
451 rv = ldb_search(gp_ctx->ldb_ctx,
452 mem_ctx,
453 &result,
454 ldb_get_default_basedn(gp_ctx->ldb_ctx),
455 LDB_SCOPE_SUBTREE,
456 attrs,
457 "(&(objectclass=user)(objectSid=%s))", sid);
458 if (rv != LDB_SUCCESS) {
459 DEBUG(0, ("LDB search failed: %s\n%s\n", ldb_strerror(rv),
460 ldb_errstring(gp_ctx->ldb_ctx)));
461 talloc_free(mem_ctx);
462 return NT_STATUS_UNSUCCESSFUL;
463 }
464 if (result->count != 1) {
465 DEBUG(0, ("Could not find user with sid %s.\n", sid));
466 talloc_free(mem_ctx);
467 return NT_STATUS_UNSUCCESSFUL;
468 }
469 DEBUG(10,("Found DN for this user: %s\n", ldb_dn_get_linearized(result->msgs[0]->dn)));
470
471 element = ldb_msg_find_element(result->msgs[0], "objectClass");
472
473 /* We need to know if this account is a user or machine. */
474 account_type = ACCOUNT_TYPE_USER;
475 for (i = 0; i < element->num_values; i++) {
476 if (strcmp((char *)element->values[i].data, "computer") == 0) {
477 account_type = ACCOUNT_TYPE_MACHINE;
478 DEBUG(10, ("This user is a machine\n"));
479 }
480 }
481
482 gpos = talloc_array(gp_ctx, const char *, 1);
483 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(gpos, mem_ctx);
484 gpos[0] = NULL;
485
486 /* Walk through the containers until we hit the root */
487 inherit = 1;
488 dn = ldb_dn_get_parent(mem_ctx, result->msgs[0]->dn);
489 while (ldb_dn_compare_base(ldb_get_default_basedn(gp_ctx->ldb_ctx), dn) == 0) {
490 const char *gpo_attrs[] = { "gPLink", "gPOptions", NULL };
491 struct gp_link **gplinks;
492 enum gpo_inheritance gpoptions;
493
494 DEBUG(10, ("Getting gPLinks for DN: %s\n", ldb_dn_get_linearized(dn)));
495
496 /* Get the gPLink and gPOptions attributes from the container */
497 rv = ldb_search(gp_ctx->ldb_ctx,
498 mem_ctx,
499 &result,
500 dn,
501 LDB_SCOPE_BASE,
502 gpo_attrs,
503 "objectclass=*");
504 if (rv != LDB_SUCCESS) {
505 DEBUG(0, ("LDB search failed: %s\n%s\n", ldb_strerror(rv),
506 ldb_errstring(gp_ctx->ldb_ctx)));
507 talloc_free(mem_ctx);
508 return NT_STATUS_UNSUCCESSFUL;
509 }
510
511 /* Parse the gPLink attribute, put it into a nice struct array */
512 status = parse_gplink(mem_ctx, ldb_msg_find_attr_as_string(result->msgs[0], "gPLink", ""), &gplinks);
513 if (!NT_STATUS_IS_OK(status)) {
514 DEBUG(0, ("Failed to parse gPLink\n"));
515 talloc_free(mem_ctx);
516 return status;
517 }
518
519 /* Check all group policy links on this container */
520 for (i = 0; gplinks[i] != NULL; i++) {
521 struct gp_object *gpo;
522 uint32_t access_granted;
523
524 /* If inheritance was blocked at a higher level and this
525 * gplink is not enforced, it should not be applied */
526 if (!inherit && !(gplinks[i]->options & GPLINK_OPT_ENFORCE))
527 continue;
528
529 /* Don't apply disabled links */
530 if (gplinks[i]->options & GPLINK_OPT_DISABLE)
531 continue;
532
533 /* Get GPO information */
534 status = gp_get_gpo_info(gp_ctx, gplinks[i]->dn, &gpo);
535 if (!NT_STATUS_IS_OK(status)) {
536 DEBUG(0, ("Failed to get gpo information for %s\n", gplinks[i]->dn));
537 talloc_free(mem_ctx);
538 return status;
539 }
540
541 /* If the account does not have read access, this GPO does not apply
542 * to this account */
543 status = se_access_check(gpo->security_descriptor,
544 token,
545 (SEC_STD_READ_CONTROL | SEC_ADS_LIST | SEC_ADS_READ_PROP),
546 &access_granted);
547 if (!NT_STATUS_IS_OK(status)) {
548 continue;
549 }
550
551 /* If the account is a user and the GPO has user disabled flag, or
552 * a machine and the GPO has machine disabled flag, this GPO does
553 * not apply to this account */
554 if ((account_type == ACCOUNT_TYPE_USER &&
555 (gpo->flags & GPO_FLAG_USER_DISABLE)) ||
556 (account_type == ACCOUNT_TYPE_MACHINE &&
557 (gpo->flags & GPO_FLAG_MACHINE_DISABLE))) {
558 continue;
559 }
560
561 /* Add the GPO to the list */
562 gpos = talloc_realloc(gp_ctx, gpos, const char *, count+2);
563 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(gpos, mem_ctx);
564 gpos[count] = talloc_strdup(gp_ctx, gplinks[i]->dn);
565 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(gpos[count], mem_ctx);
566 gpos[count+1] = NULL;
567 count++;
568
569 /* Clean up */
570 talloc_free(gpo);
571 }
572
573 /* If inheritance is blocked, then we should only add enforced gPLinks
574 * higher up */
575 gpoptions = ldb_msg_find_attr_as_uint(result->msgs[0], "gPOptions", 0);
576 if (gpoptions == GPO_BLOCK_INHERITANCE) {
577 inherit = 0;
578 }
579 dn = ldb_dn_get_parent(mem_ctx, dn);
580 }
581
582 talloc_free(mem_ctx);
583
584 *ret = gpos;
585 return NT_STATUS_OK;
586}
587
588NTSTATUS gp_set_gplink(struct gp_context *gp_ctx, const char *dn_str, struct gp_link *gplink)
589{
590 TALLOC_CTX *mem_ctx;
591 struct ldb_result *result;
592 struct ldb_dn *dn;
593 struct ldb_message *msg;
594 const char *attrs[] = { "gPLink", NULL };
595 const char *gplink_str;
596 int rv;
597 char *start;
598
599 /* Create a forked memory context, as a base for everything here */
600 mem_ctx = talloc_new(gp_ctx);
601 NT_STATUS_HAVE_NO_MEMORY(mem_ctx);
602
603 dn = ldb_dn_new(mem_ctx, gp_ctx->ldb_ctx, dn_str);
604
605 rv = ldb_search(gp_ctx->ldb_ctx, mem_ctx, &result, dn, LDB_SCOPE_BASE, attrs, "(objectclass=*)");
606 if (rv != LDB_SUCCESS) {
607 DEBUG(0, ("LDB search failed: %s\n%s\n", ldb_strerror(rv), ldb_errstring(gp_ctx->ldb_ctx)));
608 talloc_free(mem_ctx);
609 return NT_STATUS_UNSUCCESSFUL;
610 }
611
612 if (result->count != 1) {
613 talloc_free(mem_ctx);
614 return NT_STATUS_NOT_FOUND;
615 }
616
617 gplink_str = ldb_msg_find_attr_as_string(result->msgs[0], "gPLink", "");
618
619 /* If this GPO link already exists, alter the options, else add it */
620 if ((start = strcasestr(gplink_str, gplink->dn)) != NULL) {
621 start += strlen(gplink->dn);
622 *start = '\0';
623 start++;
624 while (*start != ']' && *start != '\0') {
625 start++;
626 }
627 gplink_str = talloc_asprintf(mem_ctx, "%s;%d%s", gplink_str, gplink->options, start);
628 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(gplink_str, mem_ctx);
629
630 } else {
631 /* Prepend the new GPO link to the string. This list is backwards in priority. */
632 gplink_str = talloc_asprintf(mem_ctx, "[LDAP://%s;%d]%s", gplink->dn, gplink->options, gplink_str);
633 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(gplink_str, mem_ctx);
634 }
635
636
637
638 msg = ldb_msg_new(mem_ctx);
639 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(msg, mem_ctx);
640
641 msg->dn = dn;
642
643 rv = ldb_msg_add_string(msg, "gPLink", gplink_str);
644 if (rv != 0) {
645 DEBUG(0, ("LDB message add string failed: %s\n", ldb_strerror(rv)));
646 talloc_free(mem_ctx);
647 return NT_STATUS_UNSUCCESSFUL;
648 }
649 msg->elements[0].flags = LDB_FLAG_MOD_REPLACE;
650
651 rv = ldb_modify(gp_ctx->ldb_ctx, msg);
652 if (rv != 0) {
653 DEBUG(0, ("LDB modify failed: %s\n", ldb_strerror(rv)));
654 talloc_free(mem_ctx);
655 return NT_STATUS_UNSUCCESSFUL;
656 }
657
658 talloc_free(mem_ctx);
659 return NT_STATUS_OK;
660}
661
662NTSTATUS gp_del_gplink(struct gp_context *gp_ctx, const char *dn_str, const char *gplink_dn)
663{
664 TALLOC_CTX *mem_ctx;
665 struct ldb_result *result;
666 struct ldb_dn *dn;
667 struct ldb_message *msg;
668 const char *attrs[] = { "gPLink", NULL };
669 const char *gplink_str, *search_string;
670 int rv;
671 char *p;
672
673 /* Create a forked memory context, as a base for everything here */
674 mem_ctx = talloc_new(gp_ctx);
675 NT_STATUS_HAVE_NO_MEMORY(mem_ctx);
676
677 dn = ldb_dn_new(mem_ctx, gp_ctx->ldb_ctx, dn_str);
678
679 rv = ldb_search(gp_ctx->ldb_ctx, mem_ctx, &result, dn, LDB_SCOPE_BASE, attrs, "(objectclass=*)");
680 if (rv != LDB_SUCCESS) {
681 DEBUG(0, ("LDB search failed: %s\n%s\n", ldb_strerror(rv), ldb_errstring(gp_ctx->ldb_ctx)));
682 talloc_free(mem_ctx);
683 return NT_STATUS_UNSUCCESSFUL;
684 }
685
686 if (result->count != 1) {
687 talloc_free(mem_ctx);
688 return NT_STATUS_NOT_FOUND;
689 }
690
691 gplink_str = ldb_msg_find_attr_as_string(result->msgs[0], "gPLink", "");
692
693 /* If this GPO link already exists, alter the options, else add it */
694 search_string = talloc_asprintf(mem_ctx, "[LDAP://%s]", gplink_dn);
695 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(search_string, mem_ctx);
696
697 p = strcasestr(gplink_str, search_string);
698 if (p == NULL) {
699 talloc_free(mem_ctx);
700 return NT_STATUS_NOT_FOUND;
701 }
702
703 *p = '\0';
704 p++;
705 while (*p != ']' && *p != '\0') {
706 p++;
707 }
708 p++;
709 gplink_str = talloc_asprintf(mem_ctx, "%s%s", gplink_str, p);
710 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(gplink_str, mem_ctx);
711
712
713 msg = ldb_msg_new(mem_ctx);
714 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(msg, mem_ctx);
715
716 msg->dn = dn;
717
718 if (strcmp(gplink_str, "") == 0) {
719 rv = ldb_msg_add_empty(msg, "gPLink", LDB_FLAG_MOD_DELETE, NULL);
720 if (rv != 0) {
721 DEBUG(0, ("LDB message add empty element failed: %s\n", ldb_strerror(rv)));
722 talloc_free(mem_ctx);
723 return NT_STATUS_UNSUCCESSFUL;
724 }
725 } else {
726 rv = ldb_msg_add_string(msg, "gPLink", gplink_str);
727 if (rv != 0) {
728 DEBUG(0, ("LDB message add string failed: %s\n", ldb_strerror(rv)));
729 talloc_free(mem_ctx);
730 return NT_STATUS_UNSUCCESSFUL;
731 }
732 msg->elements[0].flags = LDB_FLAG_MOD_REPLACE;
733 }
734 rv = ldb_modify(gp_ctx->ldb_ctx, msg);
735 if (rv != 0) {
736 DEBUG(0, ("LDB modify failed: %s\n", ldb_strerror(rv)));
737 talloc_free(mem_ctx);
738 return NT_STATUS_UNSUCCESSFUL;
739 }
740
741 talloc_free(mem_ctx);
742 return NT_STATUS_OK;
743}
744
745NTSTATUS gp_get_inheritance(struct gp_context *gp_ctx, const char *dn_str, enum gpo_inheritance *inheritance)
746{
747 TALLOC_CTX *mem_ctx;
748 struct ldb_result *result;
749 struct ldb_dn *dn;
750 const char *attrs[] = { "gPOptions", NULL };
751 int rv;
752
753 /* Create a forked memory context, as a base for everything here */
754 mem_ctx = talloc_new(gp_ctx);
755 NT_STATUS_HAVE_NO_MEMORY(mem_ctx);
756
757 dn = ldb_dn_new(mem_ctx, gp_ctx->ldb_ctx, dn_str);
758
759 rv = ldb_search(gp_ctx->ldb_ctx, mem_ctx, &result, dn, LDB_SCOPE_BASE, attrs, "(objectclass=*)");
760 if (rv != LDB_SUCCESS) {
761 DEBUG(0, ("LDB search failed: %s\n%s\n", ldb_strerror(rv), ldb_errstring(gp_ctx->ldb_ctx)));
762 talloc_free(mem_ctx);
763 return NT_STATUS_UNSUCCESSFUL;
764 }
765
766 if (result->count != 1) {
767 talloc_free(mem_ctx);
768 return NT_STATUS_NOT_FOUND;
769 }
770
771 *inheritance = ldb_msg_find_attr_as_uint(result->msgs[0], "gPOptions", 0);
772
773 talloc_free(mem_ctx);
774 return NT_STATUS_OK;
775}
776
777NTSTATUS gp_set_inheritance(struct gp_context *gp_ctx, const char *dn_str, enum gpo_inheritance inheritance)
778{
779 char *inheritance_string;
780 struct ldb_message *msg;
781 int rv;
782
783 msg = ldb_msg_new(gp_ctx);
784 NT_STATUS_HAVE_NO_MEMORY(msg);
785
786 msg->dn = ldb_dn_new(msg, gp_ctx->ldb_ctx, dn_str);
787
788 inheritance_string = talloc_asprintf(msg, "%d", inheritance);
789 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(inheritance_string, msg);
790
791 rv = ldb_msg_add_string(msg, "gPOptions", inheritance_string);
792 if (rv != 0) {
793 DEBUG(0, ("LDB message add string failed: %s\n", ldb_strerror(rv)));
794 talloc_free(msg);
795 return NT_STATUS_UNSUCCESSFUL;
796 }
797 msg->elements[0].flags = LDB_FLAG_MOD_REPLACE;
798
799 rv = ldb_modify(gp_ctx->ldb_ctx, msg);
800 if (rv != 0) {
801 DEBUG(0, ("LDB modify failed: %s\n", ldb_strerror(rv)));
802 talloc_free(msg);
803 return NT_STATUS_UNSUCCESSFUL;
804 }
805
806 talloc_free(msg);
807 return NT_STATUS_OK;
808}
809
810NTSTATUS gp_create_ldap_gpo(struct gp_context *gp_ctx, struct gp_object *gpo)
811{
812 struct ldb_message *msg;
813 TALLOC_CTX *mem_ctx;
814 int rv;
815 char *dn_str, *flags_str, *version_str;
816 struct ldb_dn *child_dn, *gpo_dn;
817
818 mem_ctx = talloc_new(gp_ctx);
819 NT_STATUS_HAVE_NO_MEMORY(mem_ctx);
820
821 /* CN={GUID} */
822 msg = ldb_msg_new(mem_ctx);
823 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(msg, mem_ctx);
824
825 msg->dn = ldb_get_default_basedn(gp_ctx->ldb_ctx);
826 dn_str = talloc_asprintf(mem_ctx, "CN=%s,CN=Policies,CN=System", gpo->name);
827 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(dn_str, mem_ctx);
828
829 child_dn = ldb_dn_new(mem_ctx, gp_ctx->ldb_ctx, dn_str);
830 rv = ldb_dn_add_child(msg->dn, child_dn);
831 if (!rv) goto ldb_msg_add_error;
832
833 flags_str = talloc_asprintf(mem_ctx, "%d", gpo->flags);
834 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(flags_str, mem_ctx);
835
836 version_str = talloc_asprintf(mem_ctx, "%d", gpo->version);
837 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(version_str, mem_ctx);
838
839 rv = ldb_msg_add_string(msg, "objectClass", "top");
840 if (rv != LDB_SUCCESS) goto ldb_msg_add_error;
841 rv = ldb_msg_add_string(msg, "objectClass", "container");
842 if (rv != LDB_SUCCESS) goto ldb_msg_add_error;
843 rv = ldb_msg_add_string(msg, "objectClass", "groupPolicyContainer");
844 if (rv != LDB_SUCCESS) goto ldb_msg_add_error;
845 rv = ldb_msg_add_string(msg, "displayName", gpo->display_name);
846 if (rv != LDB_SUCCESS) goto ldb_msg_add_error;
847 rv = ldb_msg_add_string(msg, "name", gpo->name);
848 if (rv != LDB_SUCCESS) goto ldb_msg_add_error;
849 rv = ldb_msg_add_string(msg, "CN", gpo->name);
850 if (rv != LDB_SUCCESS) goto ldb_msg_add_error;
851 rv = ldb_msg_add_string(msg, "gPCFileSysPath", gpo->file_sys_path);
852 if (rv != LDB_SUCCESS) goto ldb_msg_add_error;
853 rv = ldb_msg_add_string(msg, "flags", flags_str);
854 if (rv != LDB_SUCCESS) goto ldb_msg_add_error;
855 rv = ldb_msg_add_string(msg, "versionNumber", version_str);
856 if (rv != LDB_SUCCESS) goto ldb_msg_add_error;
857 rv = ldb_msg_add_string(msg, "showInAdvancedViewOnly", "TRUE");
858 if (rv != LDB_SUCCESS) goto ldb_msg_add_error;
859 rv = ldb_msg_add_string(msg, "gpCFunctionalityVersion", "2");
860 if (rv != LDB_SUCCESS) goto ldb_msg_add_error;
861
862 rv = ldb_add(gp_ctx->ldb_ctx, msg);
863 if (rv != LDB_SUCCESS) {
864 DEBUG(0, ("LDB add error: %s\n", ldb_errstring(gp_ctx->ldb_ctx)));
865 talloc_free(mem_ctx);
866 return NT_STATUS_UNSUCCESSFUL;
867 }
868
869 gpo_dn = msg->dn;
870
871 /* CN=User */
872 msg = ldb_msg_new(mem_ctx);
873 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(msg, mem_ctx);
874
875 msg->dn = ldb_dn_copy(mem_ctx, gpo_dn);
876 child_dn = ldb_dn_new(mem_ctx, gp_ctx->ldb_ctx, "CN=User");
877 rv = ldb_dn_add_child(msg->dn, child_dn);
878 if (!rv) goto ldb_msg_add_error;
879
880 rv = ldb_msg_add_string(msg, "objectClass", "top");
881 if (rv != LDB_SUCCESS) goto ldb_msg_add_error;
882 rv = ldb_msg_add_string(msg, "objectClass", "container");
883 if (rv != LDB_SUCCESS) goto ldb_msg_add_error;
884 rv = ldb_msg_add_string(msg, "showInAdvancedViewOnly", "TRUE");
885 if (rv != LDB_SUCCESS) goto ldb_msg_add_error;
886 rv = ldb_msg_add_string(msg, "CN", "User");
887 if (rv != LDB_SUCCESS) goto ldb_msg_add_error;
888 rv = ldb_msg_add_string(msg, "name", "User");
889 if (rv != LDB_SUCCESS) goto ldb_msg_add_error;
890
891 rv = ldb_add(gp_ctx->ldb_ctx, msg);
892 if (rv != LDB_SUCCESS) {
893 DEBUG(0, ("LDB add error: %s\n", ldb_errstring(gp_ctx->ldb_ctx)));
894 talloc_free(mem_ctx);
895 return NT_STATUS_UNSUCCESSFUL;
896 }
897
898 /* CN=Machine */
899 msg = ldb_msg_new(mem_ctx);
900 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(msg, mem_ctx);
901
902 msg->dn = ldb_dn_copy(mem_ctx, gpo_dn);
903 child_dn = ldb_dn_new(mem_ctx, gp_ctx->ldb_ctx, "CN=Machine");
904 rv = ldb_dn_add_child(msg->dn, child_dn);
905 if (!rv) goto ldb_msg_add_error;
906
907 rv = ldb_msg_add_string(msg, "objectClass", "top");
908 if (rv != LDB_SUCCESS) goto ldb_msg_add_error;
909 rv = ldb_msg_add_string(msg, "objectClass", "container");
910 if (rv != LDB_SUCCESS) goto ldb_msg_add_error;
911 rv = ldb_msg_add_string(msg, "showInAdvancedViewOnly", "TRUE");
912 if (rv != LDB_SUCCESS) goto ldb_msg_add_error;
913 rv = ldb_msg_add_string(msg, "CN", "Machine");
914 if (rv != LDB_SUCCESS) goto ldb_msg_add_error;
915 rv = ldb_msg_add_string(msg, "name", "Machine");
916 if (rv != LDB_SUCCESS) goto ldb_msg_add_error;
917
918 rv = ldb_add(gp_ctx->ldb_ctx, msg);
919 if (rv != LDB_SUCCESS) {
920 DEBUG(0, ("LDB add error: %s\n", ldb_errstring(gp_ctx->ldb_ctx)));
921 talloc_free(mem_ctx);
922 return NT_STATUS_UNSUCCESSFUL;
923 }
924
925 gpo->dn = talloc_strdup(gpo, ldb_dn_get_linearized(gpo_dn));
926 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(gpo->dn, mem_ctx);
927
928 talloc_free(mem_ctx);
929 return NT_STATUS_OK;
930
931 ldb_msg_add_error:
932 DEBUG(0, ("LDB Error adding element to ldb message\n"));
933 talloc_free(mem_ctx);
934 return NT_STATUS_UNSUCCESSFUL;
935}
936
937NTSTATUS gp_set_ads_acl (struct gp_context *gp_ctx, const char *dn_str, const struct security_descriptor *sd)
938{
939 TALLOC_CTX *mem_ctx;
940 DATA_BLOB data;
941 enum ndr_err_code ndr_err;
942 struct ldb_message *msg;
943 int rv;
944
945 /* Create a forked memory context to clean up easily */
946 mem_ctx = talloc_new(gp_ctx);
947 NT_STATUS_HAVE_NO_MEMORY(mem_ctx);
948
949 /* Push the security descriptor through the NDR library */
950 ndr_err = ndr_push_struct_blob(&data,
951 mem_ctx,
952 sd,
953 (ndr_push_flags_fn_t)ndr_push_security_descriptor);
954 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
955 return ndr_map_error2ntstatus(ndr_err);
956 }
957
958
959 /* Create a LDB message */
960 msg = ldb_msg_new(mem_ctx);
961 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(msg, mem_ctx);
962
963 msg->dn = ldb_dn_new(mem_ctx, gp_ctx->ldb_ctx, dn_str);
964
965 rv = ldb_msg_add_value(msg, "nTSecurityDescriptor", &data, NULL);
966 if (rv != 0) {
967 DEBUG(0, ("LDB message add element failed for adding nTSecurityDescriptor: %s\n", ldb_strerror(rv)));
968 talloc_free(mem_ctx);
969 return NT_STATUS_UNSUCCESSFUL;
970 }
971 msg->elements[0].flags = LDB_FLAG_MOD_REPLACE;
972
973 rv = ldb_modify(gp_ctx->ldb_ctx, msg);
974 if (rv != 0) {
975 DEBUG(0, ("LDB modify failed: %s\n", ldb_strerror(rv)));
976 talloc_free(mem_ctx);
977 return NT_STATUS_UNSUCCESSFUL;
978 }
979
980 talloc_free(mem_ctx);
981 return NT_STATUS_OK;
982}
983
984/* This function sets flags, version and displayName on a GPO */
985NTSTATUS gp_set_ldap_gpo(struct gp_context *gp_ctx, struct gp_object *gpo)
986{
987 int rv;
988 TALLOC_CTX *mem_ctx;
989 struct ldb_message *msg;
990 char *version_str, *flags_str;
991
992 mem_ctx = talloc_new(gp_ctx);
993
994 msg = ldb_msg_new(mem_ctx);
995 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(msg, mem_ctx);
996
997 msg->dn = ldb_dn_new(mem_ctx, gp_ctx->ldb_ctx, gpo->dn);
998
999 version_str = talloc_asprintf(mem_ctx, "%d", gpo->version);
1000 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(msg, mem_ctx);
1001
1002 flags_str = talloc_asprintf(mem_ctx, "%d", gpo->flags);
1003 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(msg, mem_ctx);
1004
1005 rv = ldb_msg_add_string(msg, "flags", flags_str);
1006 if (rv != 0) {
1007 DEBUG(0, ("LDB message add string failed for flags: %s\n", ldb_strerror(rv)));
1008 talloc_free(mem_ctx);
1009 return NT_STATUS_UNSUCCESSFUL;
1010 }
1011 msg->elements[0].flags = LDB_FLAG_MOD_REPLACE;
1012
1013 rv = ldb_msg_add_string(msg, "version", version_str);
1014 if (rv != 0) {
1015 DEBUG(0, ("LDB message add string failed for version: %s\n", ldb_strerror(rv)));
1016 talloc_free(mem_ctx);
1017 return NT_STATUS_UNSUCCESSFUL;
1018 }
1019 msg->elements[1].flags = LDB_FLAG_MOD_REPLACE;
1020
1021 rv = ldb_msg_add_string(msg, "displayName", gpo->display_name);
1022 if (rv != 0) {
1023 DEBUG(0, ("LDB message add string failed for displayName: %s\n", ldb_strerror(rv)));
1024 talloc_free(mem_ctx);
1025 return NT_STATUS_UNSUCCESSFUL;
1026 }
1027 msg->elements[2].flags = LDB_FLAG_MOD_REPLACE;
1028
1029 rv = ldb_modify(gp_ctx->ldb_ctx, msg);
1030 if (rv != 0) {
1031 DEBUG(0, ("LDB modify failed: %s\n", ldb_strerror(rv)));
1032 talloc_free(mem_ctx);
1033 return NT_STATUS_UNSUCCESSFUL;
1034 }
1035
1036 talloc_free(mem_ctx);
1037 return NT_STATUS_OK;
1038}
Note: See TracBrowser for help on using the repository browser.