from hashlib import blake2b
from tempfile import NamedTemporaryFile
from samba.common import get_bytes
+from samba.gp.util.logging import log
intro = '''
### autogenerated by samba
'''
+# The deny all file is implicit any time an allow entry is used
+DENY_BOUND = 9000000000
+DENY_FILE = '_gp_DENY_ALL.conf'
+
+# Each policy MUST create it's own DENY_ALL file if an allow entry exists,
+# otherwise policies will conflict and one could remove a DENY_ALL when another
+# one still requires it.
+def deny_file(access):
+ deny_filename = os.path.join(access,
+ '%d%s' % (select_next_deny(access), DENY_FILE))
+ with NamedTemporaryFile(delete=False, dir=access) as f:
+ with open(f.name, 'w') as w:
+ w.write(intro)
+ w.write('-:ALL:ALL')
+ os.chmod(f.name, 0o644)
+ os.rename(f.name, deny_filename)
+ return deny_filename
+
+def select_next_deny(directory):
+ configs = [re.match(r'(\d+)', f) for f in os.listdir(directory) if DENY_FILE in f]
+ return max([int(m.group(1)) for m in configs if m]+[DENY_BOUND])+1
+
# Access files in /etc/security/access.d are read in the order of the system
# locale. Here we number the conf files to ensure they are read in the correct
-# order.
+# order. Ignore the deny file, since allow entries should always come before
+# the implicit deny ALL.
def select_next_conf(directory):
- configs = [re.match(r'(\d+)', f) for f in os.listdir(directory)]
+ configs = [re.match(r'(\d+)', f) for f in os.listdir(directory) if DENY_FILE not in f]
return max([int(m.group(1)) for m in configs if m]+[0])+1
class vgp_access_ext(gp_xml_ext):
for guid, settings in deleted_gpo_list:
self.gp_db.set_guid(guid)
if str(self) in settings:
- for attribute, access_file in settings[str(self)].items():
- if os.path.exists(access_file):
- os.unlink(access_file)
+ for attribute, policy_files in settings[str(self)].items():
+ for access_file in policy_files.split(':'):
+ if os.path.exists(access_file):
+ os.unlink(access_file)
self.gp_db.delete(str(self), attribute)
self.gp_db.commit()
path = os.path.join(gpo.file_sys_path, deny)
deny_conf = self.parse(path)
entries = []
+ policy_files = []
if allow_conf:
policy = allow_conf.find('policysetting')
data = policy.find('data')
- for listelement in data.findall('listelement'):
+ allow_listelements = data.findall('listelement')
+ for listelement in allow_listelements:
adobject = listelement.find('adobject')
name = adobject.find('name').text
domain = adobject.find('domain').text
entries.append('+:%s\\%s:ALL' % (domain, name))
+ if len(allow_listelements) > 0:
+ log.info('Adding an implicit deny ALL because an allow'
+ ' entry is present')
+ policy_files.append(deny_file(access))
if deny_conf:
policy = deny_conf.find('policysetting')
data = policy.find('data')
name = adobject.find('name').text
domain = adobject.find('domain').text
entries.append('-:%s\\%s:ALL' % (domain, name))
+ if len(allow_listelements) > 0:
+ log.warn("Deny entry '%s' is meaningless with "
+ "allow present" % entries[-1])
if len(entries) == 0:
continue
conf_id = select_next_conf(access)
access_file = os.path.join(access, '%010d_gp.conf' % conf_id)
+ policy_files.append(access_file)
access_contents = '\n'.join(entries)
attribute = blake2b(get_bytes(access_contents)).hexdigest()
old_val = self.gp_db.retrieve(str(self), attribute)
w.write(access_contents)
os.chmod(f.name, 0o644)
os.rename(f.name, access_file)
- self.gp_db.store(str(self), attribute, access_file)
+ self.gp_db.store(str(self), attribute, ':'.join(policy_files))
self.gp_db.commit()
def rsop(self, gpo):
if allow_conf:
policy = allow_conf.find('policysetting')
data = policy.find('data')
- for listelement in data.findall('listelement'):
+ allow_listelements = data.findall('listelement')
+ for listelement in allow_listelements:
adobject = listelement.find('adobject')
name = adobject.find('name').text
domain = adobject.find('domain').text
if str(self) not in output.keys():
output[str(self)] = []
output[str(self)].append('+:%s\\%s:ALL' % (name, domain))
+ if len(allow_listelements) > 0:
+ output[str(self)].append('-:ALL:ALL')
if deny_conf:
policy = deny_conf.find('policysetting')
data = policy.find('data')