s4-netlogon: implement dcesrv_netr_DsRAddressToSitenamesExW
[Samba/aatanasov.git] / source3 / registry / reg_dispatcher.c
blobcc6d95f73806de909befe17acf5fae21398811c5
1 /*
2 * Unix SMB/CIFS implementation.
3 * Virtual Windows Registry Layer
4 * Copyright (C) Gerald Carter 2002-2005
5 * Copyright (C) Michael Adam 2006-2008
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published by
9 * the Free Software Foundation; either version 3 of the License, or
10 * (at your option) any later version.
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, see <http://www.gnu.org/licenses/>.
22 * Implementation of registry frontend view functions.
23 * Functions moved from reg_frontend.c to minimize linker deps.
26 #include "includes.h"
28 #undef DBGC_CLASS
29 #define DBGC_CLASS DBGC_REGISTRY
31 static const struct generic_mapping reg_generic_map =
32 { REG_KEY_READ, REG_KEY_WRITE, REG_KEY_EXECUTE, REG_KEY_ALL };
34 /********************************************************************
35 ********************************************************************/
37 static WERROR construct_registry_sd(TALLOC_CTX *ctx, SEC_DESC **psd)
39 SEC_ACE ace[3];
40 size_t i = 0;
41 SEC_DESC *sd;
42 SEC_ACL *theacl;
43 size_t sd_size;
45 /* basic access for Everyone */
47 init_sec_ace(&ace[i++], &global_sid_World, SEC_ACE_TYPE_ACCESS_ALLOWED,
48 REG_KEY_READ, 0);
50 /* Full Access 'BUILTIN\Administrators' */
52 init_sec_ace(&ace[i++], &global_sid_Builtin_Administrators,
53 SEC_ACE_TYPE_ACCESS_ALLOWED, REG_KEY_ALL, 0);
55 /* Full Access 'NT Authority\System' */
57 init_sec_ace(&ace[i++], &global_sid_System, SEC_ACE_TYPE_ACCESS_ALLOWED,
58 REG_KEY_ALL, 0);
60 /* create the security descriptor */
62 theacl = make_sec_acl(ctx, NT4_ACL_REVISION, i, ace);
63 if (theacl == NULL) {
64 return WERR_NOMEM;
67 sd = make_sec_desc(ctx, SEC_DESC_REVISION, SEC_DESC_SELF_RELATIVE,
68 &global_sid_Builtin_Administrators,
69 &global_sid_System, NULL, theacl,
70 &sd_size);
71 if (sd == NULL) {
72 return WERR_NOMEM;
75 *psd = sd;
76 return WERR_OK;
79 /***********************************************************************
80 High level wrapper function for storing registry subkeys
81 ***********************************************************************/
83 bool store_reg_keys(struct registry_key_handle *key,
84 struct regsubkey_ctr *subkeys)
86 if (key->ops && key->ops->store_subkeys)
87 return key->ops->store_subkeys(key->name, subkeys);
89 return false;
92 /***********************************************************************
93 High level wrapper function for storing registry values
94 ***********************************************************************/
96 bool store_reg_values(struct registry_key_handle *key, struct regval_ctr *val)
98 if (key->ops && key->ops->store_values)
99 return key->ops->store_values(key->name, val);
101 return false;
104 WERROR create_reg_subkey(struct registry_key_handle *key, const char *subkey)
106 if (key->ops && key->ops->create_subkey) {
107 return key->ops->create_subkey(key->name, subkey);
110 return WERR_NOT_SUPPORTED;
113 WERROR delete_reg_subkey(struct registry_key_handle *key, const char *subkey)
115 if (key->ops && key->ops->delete_subkey) {
116 return key->ops->delete_subkey(key->name, subkey);
119 return WERR_NOT_SUPPORTED;
122 /***********************************************************************
123 High level wrapper function for enumerating registry subkeys
124 Initialize the TALLOC_CTX if necessary
125 ***********************************************************************/
127 int fetch_reg_keys(struct registry_key_handle *key,
128 struct regsubkey_ctr *subkey_ctr)
130 int result = -1;
132 if (key->ops && key->ops->fetch_subkeys)
133 result = key->ops->fetch_subkeys(key->name, subkey_ctr);
135 return result;
138 /***********************************************************************
139 High level wrapper function for enumerating registry values
140 ***********************************************************************/
142 int fetch_reg_values(struct registry_key_handle *key, struct regval_ctr *val)
144 int result = -1;
146 DEBUG(10, ("fetch_reg_values called for key '%s' (ops %p)\n", key->name,
147 (key->ops) ? (void *)key->ops : NULL));
149 if (key->ops && key->ops->fetch_values)
150 result = key->ops->fetch_values(key->name, val);
152 return result;
155 /***********************************************************************
156 High level access check for passing the required access mask to the
157 underlying registry backend
158 ***********************************************************************/
160 bool regkey_access_check(struct registry_key_handle *key, uint32 requested,
161 uint32 *granted,
162 const struct nt_user_token *token )
164 SEC_DESC *sec_desc;
165 NTSTATUS status;
166 WERROR err;
168 /* use the default security check if the backend has not defined its
169 * own */
171 if (key->ops && key->ops->reg_access_check) {
172 return key->ops->reg_access_check(key->name, requested,
173 granted, token);
176 err = regkey_get_secdesc(talloc_tos(), key, &sec_desc);
178 if (!W_ERROR_IS_OK(err)) {
179 return false;
182 se_map_generic( &requested, &reg_generic_map );
184 status =se_access_check(sec_desc, token, requested, granted);
185 TALLOC_FREE(sec_desc);
186 if (!NT_STATUS_IS_OK(status)) {
187 return false;
190 return NT_STATUS_IS_OK(status);
193 WERROR regkey_get_secdesc(TALLOC_CTX *mem_ctx, struct registry_key_handle *key,
194 struct security_descriptor **psecdesc)
196 struct security_descriptor *secdesc;
197 WERROR werr;
199 if (key->ops && key->ops->get_secdesc) {
200 werr = key->ops->get_secdesc(mem_ctx, key->name, psecdesc);
201 if (W_ERROR_IS_OK(werr)) {
202 return WERR_OK;
206 werr = construct_registry_sd(mem_ctx, &secdesc);
207 if (!W_ERROR_IS_OK(werr)) {
208 return werr;
211 *psecdesc = secdesc;
212 return WERR_OK;
215 WERROR regkey_set_secdesc(struct registry_key_handle *key,
216 struct security_descriptor *psecdesc)
218 if (key->ops && key->ops->set_secdesc) {
219 return key->ops->set_secdesc(key->name, psecdesc);
222 return WERR_ACCESS_DENIED;
226 * Check whether the in-memory version of the subkyes of a
227 * registry key needs update from disk.
229 bool reg_subkeys_need_update(struct registry_key_handle *key,
230 struct regsubkey_ctr *subkeys)
232 if (key->ops && key->ops->subkeys_need_update)
234 return key->ops->subkeys_need_update(subkeys);
237 return false;
241 * Check whether the in-memory version of the values of a
242 * registry key needs update from disk.
244 bool reg_values_need_update(struct registry_key_handle *key,
245 struct regval_ctr *values)
247 if (key->ops && key->ops->values_need_update)
249 return key->ops->values_need_update(values);
252 return false;