/* * Unix SMB/CIFS implementation. * Virtual Windows Registry Layer * Copyright (C) Volker Lendecke 2006 * Copyright (C) Michael Adam 2007 * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 3 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, see <http://www.gnu.org/licenses/>. */ #include "includes.h" #undef DBGC_CLASS #define DBGC_CLASS DBGC_RPC_SRV extern REGISTRY_OPS regdb_ops; /* these are the default */ static int smbconf_fetch_keys( const char *key, REGSUBKEY_CTR *subkey_ctr ) { return regdb_ops.fetch_subkeys(key, subkey_ctr); } static BOOL smbconf_store_keys( const char *key, REGSUBKEY_CTR *subkeys ) { return regdb_ops.store_subkeys(key, subkeys); } static int smbconf_fetch_values( const char *key, REGVAL_CTR *val ) { return regdb_ops.fetch_values(key, val); } static BOOL smbconf_store_values( const char *key, REGVAL_CTR *val ) { int i; int num_values = regval_ctr_numvals(val); REGVAL_CTR *new_val_ctr; /* * we build a second regval container and copy over the values, * possibly changing names to the canonical name, because when * canonicalizing parameter names and replacing the original parameter * (with reval_ctr_deletevalue and regval_ctr_addvalue) in the original * container, the order would change and that is not so good in the * "for" loop... :-o */ new_val_ctr = TALLOC_ZERO_P(val, REGVAL_CTR); if (new_val_ctr == NULL) { DEBUG(1, ("out of memory\n")); return False; } for (i=0; i < num_values; i++) { REGISTRY_VALUE *theval = regval_ctr_specific_value(val, i); const char *valname = regval_name(theval); int res; DEBUG(10, ("inspecting value '%s'\n", valname)); /* unfortunately, we can not reject names that are not * valid parameter names here, since e.g. regedit first * creates values as "New Value #1" and so on and then * drops into rename. */ if (regval_type(theval) != REG_SZ) { DEBUG(1, ("smbconf_store_values: only registry value " "type REG_SZ currently allowed under key " "smbconf\n")); return False; } if (registry_smbconf_valname_forbidden(regval_name(theval))) { DEBUG(1, ("smbconf_store_values: value '%s' forbidden " "in registry.\n", valname)); return False; } if (lp_parameter_is_valid(valname) && !lp_parameter_is_canonical(valname)) { char *valstr; size_t len; const char *canon_valname; const char *canon_valstr; BOOL inverse; struct registry_value *value; WERROR err; DATA_BLOB value_data; TALLOC_CTX *mem_ctx; DEBUG(5, ("valid parameter '%s' given but it is a " "synonym. going to canonicalize it.\n", valname)); mem_ctx = talloc_new(val); if (mem_ctx == NULL) { DEBUG(1, ("out of memory...\n")); return False; } err = registry_pull_value(mem_ctx, &value, theval->type, theval->data_p, theval->size, theval->size); if (!W_ERROR_IS_OK(err)) { TALLOC_FREE(mem_ctx); return False; } valstr = (value->v.sz.str); len = value->v.sz.len; if (valstr[len - 1] != '\0') { DEBUG(10, ("string is not '\\0'-terminated. " "adding '\\0'.\n")); valstr = TALLOC_REALLOC_ARRAY(mem_ctx, valstr, char, len + 1); if (valstr == NULL) { DEBUG(1, ("out of memory\n")); TALLOC_FREE(mem_ctx); return False; } valstr[len] = '\0'; len++; } if (!lp_canonicalize_parameter(valname, &canon_valname, &inverse)) { DEBUG(5, ("Error: lp_canonicalize_parameter " "failed after lp_parameter_is_valid. " "This should not happen!\n")); TALLOC_FREE(mem_ctx); return False; } DEBUG(10, ("old value name: '%s', canonical value " "name: '%s'\n", valname, canon_valname)); if (inverse && lp_string_is_valid_boolean(valstr)) { lp_invert_boolean(valstr, &canon_valstr); } else { canon_valstr = valstr; } ZERO_STRUCTP(value); value->type = REG_SZ; value->v.sz.str = CONST_DISCARD(char *, canon_valstr); value->v.sz.len = strlen(canon_valstr) + 1; err = registry_push_value(mem_ctx, value, &value_data); if (!W_ERROR_IS_OK(err)) { DEBUG(10, ("error calling registry_push_value." "\n")); TALLOC_FREE(mem_ctx); return False; } DEBUG(10, ("adding canonicalized parameter to " "container.\n")); theval = regval_compose(val, canon_valname, value->type, (char *)value_data.data, value_data.length); if (theval == NULL) { DEBUG(10, ("error composing registry value. " "(no memory?)\n")); TALLOC_FREE(mem_ctx); return False; } TALLOC_FREE(mem_ctx); } else { DEBUG(10, ("%s parameter found, " "copying it to new container...\n", (lp_parameter_is_valid(valname)? "valid":"unknown"))); } res = regval_ctr_copyvalue(new_val_ctr, theval); if (res == 0) { DEBUG(10, ("error calling regval_ctr_copyvalue." " (no memory?)\n")); return False; } DEBUG(10, ("parameter copied. container now has %d " "values.\n", res)); } return regdb_ops.store_values(key, new_val_ctr); } static BOOL smbconf_reg_access_check(const char *keyname, uint32 requested, uint32 *granted, const struct nt_user_token *token) { if (!(user_has_privileges(token, &se_disk_operators))) { return False; } *granted = REG_KEY_ALL; return True; } static WERROR smbconf_get_secdesc(TALLOC_CTX *mem_ctx, const char *key, struct security_descriptor **psecdesc) { return regdb_ops.get_secdesc(mem_ctx, key, psecdesc); } static WERROR smbconf_set_secdesc(const char *key, struct security_descriptor *secdesc) { return regdb_ops.set_secdesc(key, secdesc); } /* * Table of function pointers for accessing smb.conf data */ REGISTRY_OPS smbconf_reg_ops = { smbconf_fetch_keys, smbconf_fetch_values, smbconf_store_keys, smbconf_store_values, smbconf_reg_access_check, smbconf_get_secdesc, smbconf_set_secdesc };