r23801: The FSF has moved around a lot. This fixes their Mass Ave address.
[kai/samba.git] / source3 / registry / reg_api.c
index 4bcc6d73035202d68d3802597b10e70ba172f267..b7f79c151914e53ac58f1538e19284d6c33ce957 100644 (file)
@@ -5,7 +5,7 @@
  *
  *  This program is free software; you can redistribute it and/or modify
  *  it under the terms of the GNU General Public License as published by
- *  the Free Software Foundation; either version 2 of the License, or
+ *  the Free Software Foundation; either version 3 of the License, or
  *  (at your option) any later version.
  *  
  *  This program is distributed in the hope that it will be useful,
@@ -14,8 +14,7 @@
  *  GNU General Public License for more details.
  *  
  *  You should have received a copy of the GNU General Public License
- *  along with this program; if not, write to the Free Software
- *  Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
+ *  along with this program; if not, see <http://www.gnu.org/licenses/>.
  */
 
 /* Attempt to wrap the existing API in a more winreg.idl-like way */
@@ -57,6 +56,116 @@ static WERROR fill_subkey_cache(struct registry_key *key)
        return WERR_OK;
 }
 
+static int regkey_destructor(REGISTRY_KEY *key)
+{
+       return regdb_close();
+}
+
+static WERROR regkey_open_onelevel(TALLOC_CTX *mem_ctx, 
+                                  struct registry_key *parent,
+                                  const char *name,
+                                  const struct nt_user_token *token,
+                                  uint32 access_desired,
+                                  struct registry_key **pregkey)
+{
+       WERROR          result = WERR_OK;
+       struct registry_key *regkey;
+       REGISTRY_KEY *key;
+       REGSUBKEY_CTR   *subkeys = NULL;
+
+       DEBUG(7,("regkey_open_onelevel: name = [%s]\n", name));
+
+       SMB_ASSERT(strchr(name, '\\') == NULL);
+
+       if (!(regkey = TALLOC_ZERO_P(mem_ctx, struct registry_key)) ||
+           !(regkey->token = dup_nt_token(regkey, token)) ||
+           !(regkey->key = TALLOC_ZERO_P(regkey, REGISTRY_KEY))) {
+               result = WERR_NOMEM;
+               goto done;
+       }
+
+       if ( !(W_ERROR_IS_OK(result = regdb_open())) ) {
+               goto done;
+       }
+
+       key = regkey->key;
+       talloc_set_destructor(key, regkey_destructor);
+               
+       /* initialization */
+       
+       key->type = REG_KEY_GENERIC;
+
+       if (name[0] == '\0') {
+               /*
+                * Open a copy of the parent key
+                */
+               if (!parent) {
+                       result = WERR_BADFILE;
+                       goto done;
+               }
+               key->name = talloc_strdup(key, parent->key->name);
+       }
+       else {
+               /*
+                * Normal subkey open
+                */
+               key->name = talloc_asprintf(key, "%s%s%s",
+                                           parent ? parent->key->name : "",
+                                           parent ? "\\": "",
+                                           name);
+       }
+
+       if (key->name == NULL) {
+               result = WERR_NOMEM;
+               goto done;
+       }
+
+       /* Tag this as a Performance Counter Key */
+
+       if( StrnCaseCmp(key->name, KEY_HKPD, strlen(KEY_HKPD)) == 0 )
+               key->type = REG_KEY_HKPD;
+       
+       /* Look up the table of registry I/O operations */
+
+       if ( !(key->hook = reghook_cache_find( key->name )) ) {
+               DEBUG(0,("reg_open_onelevel: Failed to assigned a "
+                        "REGISTRY_HOOK to [%s]\n", key->name ));
+               result = WERR_BADFILE;
+               goto done;
+       }
+       
+       /* check if the path really exists; failed is indicated by -1 */
+       /* if the subkey count failed, bail out */
+
+       if ( !(subkeys = TALLOC_ZERO_P( key, REGSUBKEY_CTR )) ) {
+               result = WERR_NOMEM;
+               goto done;
+       }
+
+       if ( fetch_reg_keys( key, subkeys ) == -1 )  {
+               result = WERR_BADFILE;
+               goto done;
+       }
+       
+       TALLOC_FREE( subkeys );
+
+       if ( !regkey_access_check( key, access_desired, &key->access_granted,
+                                  token ) ) {
+               result = WERR_ACCESS_DENIED;
+               goto done;
+       }
+
+       *pregkey = regkey;
+       result = WERR_OK;
+       
+done:
+       if ( !W_ERROR_IS_OK(result) ) {
+               TALLOC_FREE(regkey);
+       }
+
+       return result;
+}
+
 WERROR reg_openhive(TALLOC_CTX *mem_ctx, const char *hive,
                    uint32 desired_access,
                    const struct nt_user_token *token,
@@ -386,6 +495,7 @@ WERROR reg_deletekey(struct registry_key *parent, const char *path)
        TALLOC_CTX *mem_ctx;
        char *name, *end;
        int num_subkeys;
+       struct registry_key *tmp_key;
 
        if (!(mem_ctx = talloc_init("reg_createkey"))) return WERR_NOMEM;
 
@@ -394,18 +504,30 @@ WERROR reg_deletekey(struct registry_key *parent, const char *path)
                goto error;
        }
 
-       if ((end = strrchr(name, '\\')) != NULL) {
-               struct registry_key *tmp;
+       /* check if the key has subkeys */
+       err = reg_openkey(mem_ctx, parent, name, REG_KEY_READ, &tmp_key);
+       if (!W_ERROR_IS_OK(err)) {
+               goto error;
+       }
+       if (!W_ERROR_IS_OK(err = fill_subkey_cache(tmp_key))) {
+               goto error;
+       }
+       if (tmp_key->subkeys->num_subkeys > 0) {
+               err = WERR_ACCESS_DENIED;
+               goto error;
+       }
 
+       /* no subkeys - proceed with delete */
+       if ((end = strrchr(name, '\\')) != NULL) {
                *end = '\0';
 
                err = reg_openkey(mem_ctx, parent, name,
-                                 SEC_RIGHTS_CREATE_SUBKEY, &tmp);
+                                 SEC_RIGHTS_CREATE_SUBKEY, &tmp_key);
                if (!W_ERROR_IS_OK(err)) {
                        goto error;
                }
 
-               parent = tmp;
+               parent = tmp_key;
                name = end+1;
        }
 
@@ -555,4 +677,51 @@ WERROR reg_open_path(TALLOC_CTX *mem_ctx, const char *orig_path,
        return WERR_OK;
 }
 
-/* END */
+
+/*
+ * Utility function to delete a registry key with all its subkeys. 
+ * Note that reg_deletekey returns ACCESS_DENIED when called on a 
+ * key that has subkeys.
+ */
+WERROR reg_deletekey_recursive(TALLOC_CTX *ctx,
+                              struct registry_key *parent, 
+                              const char *path)
+{
+       TALLOC_CTX *mem_ctx = NULL;
+       WERROR werr = WERR_OK;
+       struct registry_key *key;
+       char *subkey_name = NULL;
+
+       mem_ctx = talloc_new(ctx);
+       if (mem_ctx == NULL) {
+               werr = WERR_NOMEM;
+               goto done;
+       }
+
+       /* recurse through subkeys first */
+       werr = reg_openkey(mem_ctx, parent, path, REG_KEY_WRITE, &key);
+       if (!W_ERROR_IS_OK(werr)) {
+               goto done;
+       }
+
+       while (W_ERROR_IS_OK(werr = reg_enumkey(mem_ctx, key, 0,
+                                               &subkey_name, NULL))) 
+       {
+               werr = reg_deletekey_recursive(mem_ctx, key, subkey_name);
+               if (!W_ERROR_IS_OK(werr)) {
+                       goto done;
+               }
+       }
+       if (!W_ERROR_EQUAL(WERR_NO_MORE_ITEMS, werr)) {
+               DEBUG(1, ("reg_deletekey_recursive: Error enumerating "
+                         "subkeys: %s\n", dos_errstr(werr)));
+               goto done;
+       }
+
+       /* now delete the actual key */
+       werr = reg_deletekey(parent, path);
+       
+done:
+       TALLOC_FREE(mem_ctx);
+       return werr;
+}