s3-talloc Change TALLOC_ZERO_P() to talloc_zero()
[metze/samba/wip.git] / libgpo / gpo_ldap.c
1 /*
2  *  Unix SMB/CIFS implementation.
3  *  Group Policy Object Support
4  *  Copyright (C) Guenther Deschner 2005,2007
5  *
6  *  This program is free software; you can redistribute it and/or modify
7  *  it under the terms of the GNU General Public License as published by
8  *  the Free Software Foundation; either version 3 of the License, or
9  *  (at your option) any later version.
10  *
11  *  This program is distributed in the hope that it will be useful,
12  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
13  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14  *  GNU General Public License for more details.
15  *
16  *  You should have received a copy of the GNU General Public License
17  *  along with this program; if not, see <http://www.gnu.org/licenses/>.
18  */
19
20 #include "includes.h"
21 #include "libgpo/gpo.h"
22 #include "auth.h"
23 #if _SAMBA_BUILD_ == 4
24 #include "libgpo/gpo_s4.h"
25 #include "source4/libgpo/ads_convenience.h"
26 #endif
27 #include "../libcli/security/security.h"
28
29 /****************************************************************
30  parse the raw extension string into a GP_EXT structure
31 ****************************************************************/
32
33 bool ads_parse_gp_ext(TALLOC_CTX *mem_ctx,
34                       const char *extension_raw,
35                       struct GP_EXT **gp_ext)
36 {
37         bool ret = false;
38         struct GP_EXT *ext = NULL;
39         char **ext_list = NULL;
40         char **ext_strings = NULL;
41         int i;
42
43         if (!extension_raw) {
44                 goto parse_error;
45         }
46
47         DEBUG(20,("ads_parse_gp_ext: %s\n", extension_raw));
48
49         ext = talloc_zero(mem_ctx, struct GP_EXT);
50         if (!ext) {
51                 goto parse_error;
52         }
53
54         ext_list = str_list_make(mem_ctx, extension_raw, "]");
55         if (!ext_list) {
56                 goto parse_error;
57         }
58
59         for (i = 0; ext_list[i] != NULL; i++) {
60                 /* no op */
61         }
62
63         ext->num_exts = i;
64
65         if (ext->num_exts) {
66                 ext->extensions         = talloc_zero_array(mem_ctx, char *,
67                                                             ext->num_exts);
68                 ext->extensions_guid    = talloc_zero_array(mem_ctx, char *,
69                                                             ext->num_exts);
70                 ext->snapins            = talloc_zero_array(mem_ctx, char *,
71                                                             ext->num_exts);
72                 ext->snapins_guid       = talloc_zero_array(mem_ctx, char *,
73                                                             ext->num_exts);
74         }
75
76         ext->gp_extension = talloc_strdup(mem_ctx, extension_raw);
77
78         if (!ext->extensions || !ext->extensions_guid ||
79             !ext->snapins || !ext->snapins_guid ||
80             !ext->gp_extension) {
81                 goto parse_error;
82         }
83
84         for (i = 0; ext_list[i] != NULL; i++) {
85
86                 int k;
87                 char *p, *q;
88
89                 DEBUGADD(10,("extension #%d\n", i));
90
91                 p = ext_list[i];
92
93                 if (p[0] == '[') {
94                         p++;
95                 }
96
97                 ext_strings = str_list_make(mem_ctx, p, "}");
98                 if (ext_strings == NULL) {
99                         goto parse_error;
100                 }
101
102                 for (k = 0; ext_strings[k] != NULL; k++) {
103                         /* no op */
104                 }
105
106                 q = ext_strings[0];
107
108                 if (q[0] == '{') {
109                         q++;
110                 }
111
112                 ext->extensions[i] = talloc_strdup(mem_ctx,
113                                            cse_gpo_guid_string_to_name(q));
114                 ext->extensions_guid[i] = talloc_strdup(mem_ctx, q);
115
116                 /* we might have no name for the guid */
117                 if (ext->extensions_guid[i] == NULL) {
118                         goto parse_error;
119                 }
120
121                 for (k = 1; ext_strings[k] != NULL; k++) {
122
123                         char *m = ext_strings[k];
124
125                         if (m[0] == '{') {
126                                 m++;
127                         }
128
129                         /* FIXME: theoretically there could be more than one
130                          * snapin per extension */
131                         ext->snapins[i] = talloc_strdup(mem_ctx,
132                                 cse_snapin_gpo_guid_string_to_name(m));
133                         ext->snapins_guid[i] = talloc_strdup(mem_ctx, m);
134
135                         /* we might have no name for the guid */
136                         if (ext->snapins_guid[i] == NULL) {
137                                 goto parse_error;
138                         }
139                 }
140         }
141
142         *gp_ext = ext;
143
144         ret = true;
145
146  parse_error:
147         talloc_free(ext_list);
148         talloc_free(ext_strings);
149
150         return ret;
151 }
152
153 #ifdef HAVE_LDAP
154
155 /****************************************************************
156  parse the raw link string into a GP_LINK structure
157 ****************************************************************/
158
159 static ADS_STATUS gpo_parse_gplink(TALLOC_CTX *mem_ctx,
160                                    const char *gp_link_raw,
161                                    uint32_t options,
162                                    struct GP_LINK *gp_link)
163 {
164         ADS_STATUS status = ADS_ERROR_NT(NT_STATUS_NO_MEMORY);
165         char **link_list;
166         int i;
167
168         ZERO_STRUCTP(gp_link);
169
170         DEBUG(10,("gpo_parse_gplink: gPLink: %s\n", gp_link_raw));
171
172         link_list = str_list_make_v3(mem_ctx, gp_link_raw, "]");
173         if (!link_list) {
174                 goto parse_error;
175         }
176
177         for (i = 0; link_list[i] != NULL; i++) {
178                 /* no op */
179         }
180
181         gp_link->gp_opts = options;
182         gp_link->num_links = i;
183
184         if (gp_link->num_links) {
185                 gp_link->link_names = talloc_zero_array(mem_ctx, char *,
186                                                         gp_link->num_links);
187                 gp_link->link_opts = talloc_zero_array(mem_ctx, uint32_t,
188                                                        gp_link->num_links);
189         }
190
191         gp_link->gp_link = talloc_strdup(mem_ctx, gp_link_raw);
192
193         if (!gp_link->link_names || !gp_link->link_opts || !gp_link->gp_link) {
194                 goto parse_error;
195         }
196
197         for (i = 0; link_list[i] != NULL; i++) {
198
199                 char *p, *q;
200
201                 DEBUGADD(10,("gpo_parse_gplink: processing link #%d\n", i));
202
203                 q = link_list[i];
204                 if (q[0] == '[') {
205                         q++;
206                 };
207
208                 p = strchr(q, ';');
209
210                 if (p == NULL) {
211                         goto parse_error;
212                 }
213
214                 gp_link->link_names[i] = talloc_strdup(mem_ctx, q);
215                 if (gp_link->link_names[i] == NULL) {
216                         goto parse_error;
217                 }
218                 gp_link->link_names[i][PTR_DIFF(p, q)] = 0;
219
220                 gp_link->link_opts[i] = atoi(p + 1);
221
222                 DEBUGADD(10,("gpo_parse_gplink: link: %s\n",
223                         gp_link->link_names[i]));
224                 DEBUGADD(10,("gpo_parse_gplink: opt: %d\n",
225                         gp_link->link_opts[i]));
226
227         }
228
229         status = ADS_SUCCESS;
230
231  parse_error:
232         talloc_free(link_list);
233
234         return status;
235 }
236
237 /****************************************************************
238  helper call to get a GP_LINK structure from a linkdn
239 ****************************************************************/
240
241 ADS_STATUS ads_get_gpo_link(ADS_STRUCT *ads,
242                             TALLOC_CTX *mem_ctx,
243                             const char *link_dn,
244                             struct GP_LINK *gp_link_struct)
245 {
246         ADS_STATUS status;
247         const char *attrs[] = {"gPLink", "gPOptions", NULL};
248         LDAPMessage *res = NULL;
249         const char *gp_link;
250         uint32_t gp_options;
251
252         ZERO_STRUCTP(gp_link_struct);
253
254         status = ads_search_dn(ads, &res, link_dn, attrs);
255         if (!ADS_ERR_OK(status)) {
256                 DEBUG(10,("ads_get_gpo_link: search failed with %s\n",
257                         ads_errstr(status)));
258                 return status;
259         }
260
261         if (ads_count_replies(ads, res) != 1) {
262                 DEBUG(10,("ads_get_gpo_link: no result\n"));
263                 ads_msgfree(ads, res);
264                 return ADS_ERROR(LDAP_NO_SUCH_OBJECT);
265         }
266
267         gp_link = ads_pull_string(ads, mem_ctx, res, "gPLink");
268         if (gp_link == NULL) {
269                 DEBUG(10,("ads_get_gpo_link: no 'gPLink' attribute found\n"));
270                 ads_msgfree(ads, res);
271                 return ADS_ERROR(LDAP_NO_SUCH_ATTRIBUTE);
272         }
273
274         /* perfectly legal to have no options */
275         if (!ads_pull_uint32(ads, res, "gPOptions", &gp_options)) {
276                 DEBUG(10,("ads_get_gpo_link: "
277                         "no 'gPOptions' attribute found\n"));
278                 gp_options = 0;
279         }
280
281         ads_msgfree(ads, res);
282
283         return gpo_parse_gplink(mem_ctx, gp_link, gp_options, gp_link_struct);
284 }
285
286 /****************************************************************
287  helper call to add a gp link
288 ****************************************************************/
289
290 ADS_STATUS ads_add_gpo_link(ADS_STRUCT *ads,
291                             TALLOC_CTX *mem_ctx,
292                             const char *link_dn,
293                             const char *gpo_dn,
294                             uint32_t gpo_opt)
295 {
296         ADS_STATUS status;
297         const char *attrs[] = {"gPLink", NULL};
298         LDAPMessage *res = NULL;
299         const char *gp_link, *gp_link_new;
300         ADS_MODLIST mods;
301
302         /* although ADS allows to set anything here, we better check here if
303          * the gpo_dn is sane */
304
305         if (!strnequal(gpo_dn, "LDAP://CN={", strlen("LDAP://CN={")) != 0) {
306                 return ADS_ERROR(LDAP_INVALID_DN_SYNTAX);
307         }
308
309         status = ads_search_dn(ads, &res, link_dn, attrs);
310         if (!ADS_ERR_OK(status)) {
311                 DEBUG(10,("ads_add_gpo_link: search failed with %s\n",
312                         ads_errstr(status)));
313                 return status;
314         }
315
316         if (ads_count_replies(ads, res) != 1) {
317                 DEBUG(10,("ads_add_gpo_link: no result\n"));
318                 ads_msgfree(ads, res);
319                 return ADS_ERROR(LDAP_NO_SUCH_OBJECT);
320         }
321
322         gp_link = ads_pull_string(ads, mem_ctx, res, "gPLink");
323         if (gp_link == NULL) {
324                 gp_link_new = talloc_asprintf(mem_ctx, "[%s;%d]",
325                         gpo_dn, gpo_opt);
326         } else {
327                 gp_link_new = talloc_asprintf(mem_ctx, "%s[%s;%d]",
328                         gp_link, gpo_dn, gpo_opt);
329         }
330
331         ads_msgfree(ads, res);
332         ADS_ERROR_HAVE_NO_MEMORY(gp_link_new);
333
334         mods = ads_init_mods(mem_ctx);
335         ADS_ERROR_HAVE_NO_MEMORY(mods);
336
337         status = ads_mod_str(mem_ctx, &mods, "gPLink", gp_link_new);
338         if (!ADS_ERR_OK(status)) {
339                 return status;
340         }
341
342         return ads_gen_mod(ads, link_dn, mods);
343 }
344
345 /****************************************************************
346  helper call to delete add a gp link
347 ****************************************************************/
348
349 /* untested & broken */
350 ADS_STATUS ads_delete_gpo_link(ADS_STRUCT *ads,
351                                TALLOC_CTX *mem_ctx,
352                                const char *link_dn,
353                                const char *gpo_dn)
354 {
355         ADS_STATUS status;
356         const char *attrs[] = {"gPLink", NULL};
357         LDAPMessage *res = NULL;
358         const char *gp_link, *gp_link_new = NULL;
359         ADS_MODLIST mods;
360
361         /* check for a sane gpo_dn */
362         if (gpo_dn[0] != '[') {
363                 DEBUG(10,("ads_delete_gpo_link: first char not: [\n"));
364                 return ADS_ERROR(LDAP_INVALID_DN_SYNTAX);
365         }
366
367         if (gpo_dn[strlen(gpo_dn)] != ']') {
368                 DEBUG(10,("ads_delete_gpo_link: last char not: ]\n"));
369                 return ADS_ERROR(LDAP_INVALID_DN_SYNTAX);
370         }
371
372         status = ads_search_dn(ads, &res, link_dn, attrs);
373         if (!ADS_ERR_OK(status)) {
374                 DEBUG(10,("ads_delete_gpo_link: search failed with %s\n",
375                         ads_errstr(status)));
376                 return status;
377         }
378
379         if (ads_count_replies(ads, res) != 1) {
380                 DEBUG(10,("ads_delete_gpo_link: no result\n"));
381                 ads_msgfree(ads, res);
382                 return ADS_ERROR(LDAP_NO_SUCH_OBJECT);
383         }
384
385         gp_link = ads_pull_string(ads, mem_ctx, res, "gPLink");
386         if (gp_link == NULL) {
387                 return ADS_ERROR(LDAP_NO_SUCH_ATTRIBUTE);
388         }
389
390         /* find link to delete */
391         /* gp_link_new = talloc_asprintf(mem_ctx, "%s[%s;%d]", gp_link,
392                                          gpo_dn, gpo_opt); */
393
394         ads_msgfree(ads, res);
395         ADS_ERROR_HAVE_NO_MEMORY(gp_link_new);
396
397         mods = ads_init_mods(mem_ctx);
398         ADS_ERROR_HAVE_NO_MEMORY(mods);
399
400         status = ads_mod_str(mem_ctx, &mods, "gPLink", gp_link_new);
401         if (!ADS_ERR_OK(status)) {
402                 return status;
403         }
404
405         return ads_gen_mod(ads, link_dn, mods);
406 }
407
408 /****************************************************************
409  parse a GROUP_POLICY_OBJECT structure from an LDAPMessage result
410 ****************************************************************/
411
412  ADS_STATUS ads_parse_gpo(ADS_STRUCT *ads,
413                           TALLOC_CTX *mem_ctx,
414                           LDAPMessage *res,
415                           const char *gpo_dn,
416                           struct GROUP_POLICY_OBJECT *gpo)
417 {
418         ZERO_STRUCTP(gpo);
419
420         ADS_ERROR_HAVE_NO_MEMORY(res);
421
422         if (gpo_dn) {
423                 gpo->ds_path = talloc_strdup(mem_ctx, gpo_dn);
424         } else {
425                 gpo->ds_path = ads_get_dn(ads, mem_ctx, res);
426         }
427
428         ADS_ERROR_HAVE_NO_MEMORY(gpo->ds_path);
429
430         if (!ads_pull_uint32(ads, res, "versionNumber", &gpo->version)) {
431                 return ADS_ERROR(LDAP_NO_MEMORY);
432         }
433
434         if (!ads_pull_uint32(ads, res, "flags", &gpo->options)) {
435                 return ADS_ERROR(LDAP_NO_MEMORY);
436         }
437
438         gpo->file_sys_path = ads_pull_string(ads, mem_ctx, res,
439                 "gPCFileSysPath");
440         ADS_ERROR_HAVE_NO_MEMORY(gpo->file_sys_path);
441
442         gpo->display_name = ads_pull_string(ads, mem_ctx, res,
443                 "displayName");
444         ADS_ERROR_HAVE_NO_MEMORY(gpo->display_name);
445
446         gpo->name = ads_pull_string(ads, mem_ctx, res,
447                 "name");
448         ADS_ERROR_HAVE_NO_MEMORY(gpo->name);
449
450         gpo->machine_extensions = ads_pull_string(ads, mem_ctx, res,
451                 "gPCMachineExtensionNames");
452         gpo->user_extensions = ads_pull_string(ads, mem_ctx, res,
453                 "gPCUserExtensionNames");
454
455         ads_pull_sd(ads, mem_ctx, res, "ntSecurityDescriptor",
456                 &gpo->security_descriptor);
457         ADS_ERROR_HAVE_NO_MEMORY(gpo->security_descriptor);
458
459         return ADS_ERROR(LDAP_SUCCESS);
460 }
461
462 /****************************************************************
463  get a GROUP_POLICY_OBJECT structure based on different input parameters
464 ****************************************************************/
465
466 ADS_STATUS ads_get_gpo(ADS_STRUCT *ads,
467                        TALLOC_CTX *mem_ctx,
468                        const char *gpo_dn,
469                        const char *display_name,
470                        const char *guid_name,
471                        struct GROUP_POLICY_OBJECT *gpo)
472 {
473         ADS_STATUS status;
474         LDAPMessage *res = NULL;
475         char *dn;
476         const char *filter;
477         const char *attrs[] = {
478                 "cn",
479                 "displayName",
480                 "flags",
481                 "gPCFileSysPath",
482                 "gPCFunctionalityVersion",
483                 "gPCMachineExtensionNames",
484                 "gPCUserExtensionNames",
485                 "gPCWQLFilter",
486                 "name",
487                 "ntSecurityDescriptor",
488                 "versionNumber",
489                 NULL};
490         uint32_t sd_flags = SECINFO_DACL;
491
492         ZERO_STRUCTP(gpo);
493
494         if (!gpo_dn && !display_name && !guid_name) {
495                 return ADS_ERROR(LDAP_NO_SUCH_OBJECT);
496         }
497
498         if (gpo_dn) {
499
500                 if (strnequal(gpo_dn, "LDAP://", strlen("LDAP://")) != 0) {
501                         gpo_dn = gpo_dn + strlen("LDAP://");
502                 }
503
504                 status = ads_search_retry_dn_sd_flags(ads, &res,
505                                                       sd_flags,
506                                                       gpo_dn, attrs);
507
508         } else if (display_name || guid_name) {
509
510                 filter = talloc_asprintf(mem_ctx,
511                                  "(&(objectclass=groupPolicyContainer)(%s=%s))",
512                                  display_name ? "displayName" : "name",
513                                  display_name ? display_name : guid_name);
514                 ADS_ERROR_HAVE_NO_MEMORY(filter);
515
516                 status = ads_do_search_all_sd_flags(ads, ads->config.bind_path,
517                                                     LDAP_SCOPE_SUBTREE, filter,
518                                                     attrs, sd_flags, &res);
519         }
520
521         if (!ADS_ERR_OK(status)) {
522                 DEBUG(10,("ads_get_gpo: search failed with %s\n",
523                         ads_errstr(status)));
524                 return status;
525         }
526
527         if (ads_count_replies(ads, res) != 1) {
528                 DEBUG(10,("ads_get_gpo: no result\n"));
529                 ads_msgfree(ads, res);
530                 return ADS_ERROR(LDAP_NO_SUCH_OBJECT);
531         }
532
533         dn = ads_get_dn(ads, mem_ctx, res);
534         if (dn == NULL) {
535                 ads_msgfree(ads, res);
536                 return ADS_ERROR(LDAP_NO_MEMORY);
537         }
538
539         status = ads_parse_gpo(ads, mem_ctx, res, dn, gpo);
540         ads_msgfree(ads, res);
541         TALLOC_FREE(dn);
542
543         return status;
544 }
545
546 /****************************************************************
547  add a gplink to the GROUP_POLICY_OBJECT linked list
548 ****************************************************************/
549
550 static ADS_STATUS add_gplink_to_gpo_list(ADS_STRUCT *ads,
551                                          TALLOC_CTX *mem_ctx,
552                                          struct GROUP_POLICY_OBJECT **gpo_list,
553                                          const char *link_dn,
554                                          struct GP_LINK *gp_link,
555                                          enum GPO_LINK_TYPE link_type,
556                                          bool only_add_forced_gpos,
557                                          const struct security_token *token)
558 {
559         ADS_STATUS status;
560         int i;
561
562         for (i = 0; i < gp_link->num_links; i++) {
563
564                 struct GROUP_POLICY_OBJECT *new_gpo = NULL;
565
566                 if (gp_link->link_opts[i] & GPO_LINK_OPT_DISABLED) {
567                         DEBUG(10,("skipping disabled GPO\n"));
568                         continue;
569                 }
570
571                 if (only_add_forced_gpos) {
572
573                         if (!(gp_link->link_opts[i] & GPO_LINK_OPT_ENFORCED)) {
574                                 DEBUG(10,("skipping nonenforced GPO link "
575                                         "because GPOPTIONS_BLOCK_INHERITANCE "
576                                         "has been set\n"));
577                                 continue;
578                         } else {
579                                 DEBUG(10,("adding enforced GPO link although "
580                                         "the GPOPTIONS_BLOCK_INHERITANCE "
581                                         "has been set\n"));
582                         }
583                 }
584
585                 new_gpo = talloc_zero(mem_ctx, struct GROUP_POLICY_OBJECT);
586                 ADS_ERROR_HAVE_NO_MEMORY(new_gpo);
587
588                 status = ads_get_gpo(ads, mem_ctx, gp_link->link_names[i],
589                                      NULL, NULL, new_gpo);
590                 if (!ADS_ERR_OK(status)) {
591                         DEBUG(10,("failed to get gpo: %s\n",
592                                 gp_link->link_names[i]));
593                         return status;
594                 }
595
596                 status = ADS_ERROR_NT(gpo_apply_security_filtering(new_gpo,
597                                                                    token));
598                 if (!ADS_ERR_OK(status)) {
599                         DEBUG(10,("skipping GPO \"%s\" as object "
600                                 "has no access to it\n",
601                                 new_gpo->display_name));
602                         talloc_free(new_gpo);
603                         continue;
604                 }
605
606                 new_gpo->link = link_dn;
607                 new_gpo->link_type = link_type;
608
609                 DLIST_ADD(*gpo_list, new_gpo);
610
611                 DEBUG(10,("add_gplink_to_gplist: added GPLINK #%d %s "
612                         "to GPO list\n", i, gp_link->link_names[i]));
613         }
614
615         return ADS_ERROR(LDAP_SUCCESS);
616 }
617
618 /****************************************************************
619 ****************************************************************/
620
621 ADS_STATUS ads_get_sid_token(ADS_STRUCT *ads,
622                              TALLOC_CTX *mem_ctx,
623                              const char *dn,
624                              struct security_token **token)
625 {
626         ADS_STATUS status;
627         struct dom_sid object_sid;
628         struct dom_sid primary_group_sid;
629         struct dom_sid *ad_token_sids;
630         size_t num_ad_token_sids = 0;
631         struct dom_sid *token_sids;
632         uint32_t num_token_sids = 0;
633         struct security_token *new_token = NULL;
634         int i;
635
636         status = ads_get_tokensids(ads, mem_ctx, dn,
637                                    &object_sid, &primary_group_sid,
638                                    &ad_token_sids, &num_ad_token_sids);
639         if (!ADS_ERR_OK(status)) {
640                 return status;
641         }
642
643         token_sids = talloc_array(mem_ctx, struct dom_sid, 1);
644         ADS_ERROR_HAVE_NO_MEMORY(token_sids);
645
646         status = ADS_ERROR_NT(add_sid_to_array_unique(mem_ctx,
647                                                       &primary_group_sid,
648                                                       &token_sids,
649                                                       &num_token_sids));
650         if (!ADS_ERR_OK(status)) {
651                 return status;
652         }
653
654         for (i = 0; i < num_ad_token_sids; i++) {
655
656                 if (sid_check_is_in_builtin(&ad_token_sids[i])) {
657                         continue;
658                 }
659
660                 status = ADS_ERROR_NT(add_sid_to_array_unique(mem_ctx,
661                                                               &ad_token_sids[i],
662                                                               &token_sids,
663                                                               &num_token_sids));
664                 if (!ADS_ERR_OK(status)) {
665                         return status;
666                 }
667         }
668
669         new_token = create_local_nt_token(mem_ctx, &object_sid, false,
670                                           num_token_sids, token_sids);
671         ADS_ERROR_HAVE_NO_MEMORY(new_token);
672
673         *token = new_token;
674
675         security_token_debug(DBGC_CLASS, 5, *token);
676
677         return ADS_ERROR_LDAP(LDAP_SUCCESS);
678 }
679
680 /****************************************************************
681 ****************************************************************/
682
683 static ADS_STATUS add_local_policy_to_gpo_list(TALLOC_CTX *mem_ctx,
684                                                struct GROUP_POLICY_OBJECT **gpo_list,
685                                                enum GPO_LINK_TYPE link_type)
686 {
687         struct GROUP_POLICY_OBJECT *gpo = NULL;
688
689         ADS_ERROR_HAVE_NO_MEMORY(gpo_list);
690
691         gpo = talloc_zero(mem_ctx, struct GROUP_POLICY_OBJECT);
692         ADS_ERROR_HAVE_NO_MEMORY(gpo);
693
694         gpo->name = talloc_strdup(mem_ctx, "Local Policy");
695         ADS_ERROR_HAVE_NO_MEMORY(gpo->name);
696
697         gpo->display_name = talloc_strdup(mem_ctx, "Local Policy");
698         ADS_ERROR_HAVE_NO_MEMORY(gpo->display_name);
699
700         gpo->link_type = link_type;
701
702         DLIST_ADD(*gpo_list, gpo);
703
704         return ADS_ERROR_NT(NT_STATUS_OK);
705 }
706
707 /****************************************************************
708  get the full list of GROUP_POLICY_OBJECTs for a given dn
709 ****************************************************************/
710
711 ADS_STATUS ads_get_gpo_list(ADS_STRUCT *ads,
712                             TALLOC_CTX *mem_ctx,
713                             const char *dn,
714                             uint32_t flags,
715                             const struct security_token *token,
716                             struct GROUP_POLICY_OBJECT **gpo_list)
717 {
718         /* (L)ocal (S)ite (D)omain (O)rganizational(U)nit */
719
720         ADS_STATUS status;
721         struct GP_LINK gp_link;
722         const char *parent_dn, *site_dn, *tmp_dn;
723         bool add_only_forced_gpos = false;
724
725         ZERO_STRUCTP(gpo_list);
726
727         if (!dn) {
728                 return ADS_ERROR_NT(NT_STATUS_INVALID_PARAMETER);
729         }
730
731         if (!ads_set_sasl_wrap_flags(ads, ADS_AUTH_SASL_SIGN)) {
732                 return ADS_ERROR(LDAP_INVALID_CREDENTIALS);
733         }
734
735         DEBUG(10,("ads_get_gpo_list: getting GPO list for [%s]\n", dn));
736
737         /* (L)ocal */
738         status = add_local_policy_to_gpo_list(mem_ctx, gpo_list,
739                                               GP_LINK_LOCAL);
740         if (!ADS_ERR_OK(status)) {
741                 return status;
742         }
743
744         /* (S)ite */
745
746         /* are site GPOs valid for users as well ??? */
747         if (flags & GPO_LIST_FLAG_MACHINE) {
748
749                 status = ads_site_dn_for_machine(ads, mem_ctx,
750                                                  ads->config.ldap_server_name,
751                                                  &site_dn);
752                 if (!ADS_ERR_OK(status)) {
753                         return status;
754                 }
755
756                 DEBUG(10,("ads_get_gpo_list: query SITE: [%s] for GPOs\n",
757                         site_dn));
758
759                 status = ads_get_gpo_link(ads, mem_ctx, site_dn, &gp_link);
760                 if (ADS_ERR_OK(status)) {
761
762                         if (DEBUGLEVEL >= 100) {
763                                 dump_gplink(ads, mem_ctx, &gp_link);
764                         }
765
766                         status = add_gplink_to_gpo_list(ads, mem_ctx, gpo_list,
767                                                         site_dn, &gp_link,
768                                                         GP_LINK_SITE,
769                                                         add_only_forced_gpos,
770                                                         token);
771                         if (!ADS_ERR_OK(status)) {
772                                 return status;
773                         }
774
775                         if (flags & GPO_LIST_FLAG_SITEONLY) {
776                                 return ADS_ERROR(LDAP_SUCCESS);
777                         }
778
779                         /* inheritance can't be blocked at the site level */
780                 }
781         }
782
783         tmp_dn = dn;
784
785         while ((parent_dn = ads_parent_dn(tmp_dn)) &&
786                (!strequal(parent_dn, ads_parent_dn(ads->config.bind_path)))) {
787
788                 /* (D)omain */
789
790                 /* An account can just be a member of one domain */
791                 if (strncmp(parent_dn, "DC=", strlen("DC=")) == 0) {
792
793                         DEBUG(10,("ads_get_gpo_list: query DC: [%s] for GPOs\n",
794                                 parent_dn));
795
796                         status = ads_get_gpo_link(ads, mem_ctx, parent_dn,
797                                                   &gp_link);
798                         if (ADS_ERR_OK(status)) {
799
800                                 if (DEBUGLEVEL >= 100) {
801                                         dump_gplink(ads, mem_ctx, &gp_link);
802                                 }
803
804                                 /* block inheritance from now on */
805                                 if (gp_link.gp_opts &
806                                     GPOPTIONS_BLOCK_INHERITANCE) {
807                                         add_only_forced_gpos = true;
808                                 }
809
810                                 status = add_gplink_to_gpo_list(ads,
811                                                         mem_ctx,
812                                                         gpo_list,
813                                                         parent_dn,
814                                                         &gp_link,
815                                                         GP_LINK_DOMAIN,
816                                                         add_only_forced_gpos,
817                                                         token);
818                                 if (!ADS_ERR_OK(status)) {
819                                         return status;
820                                 }
821                         }
822                 }
823
824                 tmp_dn = parent_dn;
825         }
826
827         /* reset dn again */
828         tmp_dn = dn;
829
830         while ((parent_dn = ads_parent_dn(tmp_dn)) &&
831                (!strequal(parent_dn, ads_parent_dn(ads->config.bind_path)))) {
832
833
834                 /* (O)rganizational(U)nit */
835
836                 /* An account can be a member of more OUs */
837                 if (strncmp(parent_dn, "OU=", strlen("OU=")) == 0) {
838
839                         DEBUG(10,("ads_get_gpo_list: query OU: [%s] for GPOs\n",
840                                 parent_dn));
841
842                         status = ads_get_gpo_link(ads, mem_ctx, parent_dn,
843                                                   &gp_link);
844                         if (ADS_ERR_OK(status)) {
845
846                                 if (DEBUGLEVEL >= 100) {
847                                         dump_gplink(ads, mem_ctx, &gp_link);
848                                 }
849
850                                 /* block inheritance from now on */
851                                 if (gp_link.gp_opts &
852                                     GPOPTIONS_BLOCK_INHERITANCE) {
853                                         add_only_forced_gpos = true;
854                                 }
855
856                                 status = add_gplink_to_gpo_list(ads,
857                                                         mem_ctx,
858                                                         gpo_list,
859                                                         parent_dn,
860                                                         &gp_link,
861                                                         GP_LINK_OU,
862                                                         add_only_forced_gpos,
863                                                         token);
864                                 if (!ADS_ERR_OK(status)) {
865                                         return status;
866                                 }
867                         }
868                 }
869
870                 tmp_dn = parent_dn;
871
872         };
873
874         return ADS_ERROR(LDAP_SUCCESS);
875 }
876
877 #endif /* HAVE_LDAP */