s3-cli: fix bug 563, >8GB tar on BE machines
[Samba.git] / libgpo / gpo_fetch.c
blob06c730cfa38404bc697bcbe247e85db0d0f5f7d0
1 /*
2 * Unix SMB/CIFS implementation.
3 * Group Policy Object Support
4 * Copyright (C) Guenther Deschner 2005-2006
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 3 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, see <http://www.gnu.org/licenses/>.
20 #include "includes.h"
21 #include "system/filesys.h"
22 #include "../libgpo/gpo.h"
23 #include "../libgpo/gpo_ini.h"
25 #if _SAMBA_BUILD_ == 4
26 #include "param/param.h"
27 #include "libcli/resolve/resolve.h"
28 #include "../lib/tevent/tevent.h"
29 #include "libcli/libcli.h"
30 #include "libcli/raw/libcliraw.h"
31 #include "libcli/libcli_proto.h"
32 #include "libgpo/ads_convenience.h"
33 #include "libgpo/gpo_s4.h"
34 #include "lib/util/util.h"
35 #endif
37 /****************************************************************
38 explode the GPO CIFS URI into their components
39 ****************************************************************/
41 NTSTATUS gpo_explode_filesyspath(TALLOC_CTX *mem_ctx,
42 const char *cache_dir,
43 const char *file_sys_path,
44 char **server,
45 char **service,
46 char **nt_path,
47 char **unix_path)
49 char *path = NULL;
51 *server = NULL;
52 *service = NULL;
53 *nt_path = NULL;
54 *unix_path = NULL;
56 if (!file_sys_path) {
57 return NT_STATUS_OK;
60 if (!next_token_talloc(mem_ctx, &file_sys_path, server, "\\")) {
61 return NT_STATUS_INVALID_PARAMETER;
63 NT_STATUS_HAVE_NO_MEMORY(*server);
65 if (!next_token_talloc(mem_ctx, &file_sys_path, service, "\\")) {
66 return NT_STATUS_INVALID_PARAMETER;
68 NT_STATUS_HAVE_NO_MEMORY(*service);
70 if ((*nt_path = talloc_asprintf(mem_ctx, "\\%s", file_sys_path))
71 == NULL) {
72 return NT_STATUS_NO_MEMORY;
74 NT_STATUS_HAVE_NO_MEMORY(*nt_path);
76 if ((path = talloc_asprintf(mem_ctx,
77 "%s/%s",
78 cache_dir,
79 file_sys_path)) == NULL) {
80 return NT_STATUS_NO_MEMORY;
82 #if _SAMBA_BUILD_ == 4
83 path = string_sub_talloc(mem_ctx, path, "\\", "/");
84 #else
85 path = talloc_string_sub(mem_ctx, path, "\\", "/");
86 #endif
87 if (!path) {
88 return NT_STATUS_NO_MEMORY;
91 *unix_path = talloc_strdup(mem_ctx, path);
92 NT_STATUS_HAVE_NO_MEMORY(*unix_path);
94 talloc_free(path);
95 return NT_STATUS_OK;
98 /****************************************************************
99 prepare the local disc storage for "unix_path"
100 ****************************************************************/
102 static NTSTATUS gpo_prepare_local_store(TALLOC_CTX *mem_ctx,
103 const char *cache_dir,
104 const char *unix_path)
106 char *current_dir;
107 char *tok;
109 current_dir = talloc_strdup(mem_ctx, cache_dir);
110 NT_STATUS_HAVE_NO_MEMORY(current_dir);
112 if ((mkdir(cache_dir, 0644)) < 0 && errno != EEXIST) {
113 return NT_STATUS_ACCESS_DENIED;
116 while (next_token_talloc(mem_ctx, &unix_path, &tok, "/")) {
117 if (strequal(tok, GPO_CACHE_DIR)) {
118 break;
122 while (next_token_talloc(mem_ctx, &unix_path, &tok, "/")) {
123 current_dir = talloc_asprintf_append_buffer(current_dir, "/%s", tok);
124 NT_STATUS_HAVE_NO_MEMORY(current_dir);
126 if ((mkdir(current_dir, 0644)) < 0 && errno != EEXIST) {
127 return NT_STATUS_ACCESS_DENIED;
131 return NT_STATUS_OK;
134 static NTSTATUS gpo_connect_server(ADS_STRUCT *ads, struct loadparm_context *lp_ctx,
135 const char *server, const char *service, void *ret_cli)
137 NTSTATUS result;
138 #if _SAMBA_BUILD_ == 3
139 struct cli_state *cli;
142 result = cli_full_connection(&cli,
143 global_myname(),
144 server,
145 NULL, 0,
146 service, "A:",
147 ads->auth.user_name, NULL,
148 ads->auth.password,
149 CLI_FULL_CONNECTION_USE_KERBEROS |
150 CLI_FULL_CONNECTION_FALLBACK_AFTER_KERBEROS,
151 Undefined, NULL);
152 if (!NT_STATUS_IS_OK(result)) {
153 DEBUG(10,("check_refresh_gpo: "
154 "failed to connect: %s\n",
155 nt_errstr(result)));
156 return result;
158 *(struct cli_state **) ret_cli = cli;
159 #else
160 struct smbcli_state *cli = NULL;
161 struct smbcli_options options;
162 struct smbcli_session_options session_options;
164 lp_smbcli_options(lp_ctx, &options);
165 lp_smbcli_session_options(lp_ctx, &session_options);
167 result = smbcli_full_connection(NULL, &cli,
168 server,
169 NULL, service,
170 NULL /*devtype*/, NULL /* socket options */,
171 ads->credentials,
172 lp_resolve_context(lp_ctx),
173 tevent_context_init(ads),
174 &options,
175 &session_options,
176 lp_iconv_convenience(lp_ctx),
177 lp_gensec_settings(ads, lp_ctx));
178 if (!NT_STATUS_IS_OK(result)) {
179 DEBUG(10,("failed to connect: %s\n",
180 nt_errstr(result)));
181 return result;
183 *(struct smbcli_state **) ret_cli = cli;
184 #endif
185 return NT_STATUS_OK;
188 /****************************************************************
189 download a full GPO via CIFS
190 ****************************************************************/
192 NTSTATUS gpo_fetch_files(TALLOC_CTX *mem_ctx,
193 ADS_STRUCT *ads,
194 struct loadparm_context *lp_ctx,
195 const char *cache_dir,
196 struct GROUP_POLICY_OBJECT *gpo)
198 NTSTATUS result;
199 char *server, *service, *nt_path, *unix_path;
200 char *nt_ini_path, *unix_ini_path;
201 #if _SAMBA_BUILD_ == 3
202 struct cli_state *cli;
203 #else
204 struct smbcli_state *cli;
205 #endif
208 result = gpo_explode_filesyspath(mem_ctx, cache_dir, gpo->file_sys_path,
209 &server, &service, &nt_path,
210 &unix_path);
211 NT_STATUS_NOT_OK_RETURN(result);
214 result = gpo_connect_server(ads, lp_ctx, server, service, &cli);
215 NT_STATUS_NOT_OK_RETURN(result);
218 result = gpo_prepare_local_store(mem_ctx, cache_dir, unix_path);
219 NT_STATUS_NOT_OK_RETURN(result);
221 unix_ini_path = talloc_asprintf(mem_ctx, "%s/%s", unix_path, GPT_INI);
222 nt_ini_path = talloc_asprintf(mem_ctx, "%s\\%s", nt_path, GPT_INI);
223 NT_STATUS_HAVE_NO_MEMORY(unix_ini_path);
224 NT_STATUS_HAVE_NO_MEMORY(nt_ini_path);
226 result = gpo_copy_file(mem_ctx, cli, nt_ini_path, unix_ini_path);
227 NT_STATUS_NOT_OK_RETURN(result);
229 result = gpo_sync_directories(mem_ctx, cli, nt_path, unix_path);
230 NT_STATUS_NOT_OK_RETURN(result);
232 return NT_STATUS_OK;
235 /****************************************************************
236 get the locally stored gpt.ini version number
237 ****************************************************************/
239 NTSTATUS gpo_get_sysvol_gpt_version(TALLOC_CTX *mem_ctx,
240 const char *unix_path,
241 uint32_t *sysvol_version,
242 char **display_name)
244 NTSTATUS status;
245 uint32_t version = 0;
246 char *local_path = NULL;
247 char *name = NULL;
249 if (!unix_path) {
250 return NT_STATUS_OK;
253 local_path = talloc_asprintf(mem_ctx, "%s/%s", unix_path, GPT_INI);
254 NT_STATUS_HAVE_NO_MEMORY(local_path);
256 status = parse_gpt_ini(mem_ctx, local_path, &version, &name);
257 if (!NT_STATUS_IS_OK(status)) {
258 DEBUG(10,("gpo_get_sysvol_gpt_version: "
259 "failed to parse ini [%s]: %s\n",
260 local_path, nt_errstr(status)));
261 return status;
264 if (sysvol_version) {
265 *sysvol_version = version;
268 if (name && *display_name) {
269 *display_name = talloc_strdup(mem_ctx, name);
270 NT_STATUS_HAVE_NO_MEMORY(*display_name);
273 return NT_STATUS_OK;