1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
|
# vgp_openssh_ext samba group policy
# Copyright (C) David Mulder <dmulder@suse.com> 2020
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
import os
import re
from io import BytesIO
from samba.gp.gpclass import gp_xml_ext, gp_file_applier
from samba.common import get_bytes
intro = b'''
### autogenerated by samba
#
# This file is generated by the vgp_openssh_ext Group Policy
# Client Side Extension. To modify the contents of this file,
# modify the appropriate Group Policy objects which apply
# to this machine. DO NOT MODIFY THIS FILE DIRECTLY.
#
'''
# For each key value pair in sshd_config, the first obtained value will be
# used. We must insert config files in reverse, so that the last applied policy
# takes precedence.
def select_next_conf(directory):
configs = [re.match(r'(\d+)', f) for f in os.listdir(directory)]
conf_ids = [int(m.group(1)) for m in configs if m]
conf_ids.append(9000000000) # The starting node
conf_id = min(conf_ids)-1
return os.path.join(directory, '%010d_gp.conf' % conf_id)
class vgp_openssh_ext(gp_xml_ext, gp_file_applier):
def __str__(self):
return 'VGP/Unix Settings/OpenSSH'
def process_group_policy(self, deleted_gpo_list, changed_gpo_list,
cfg_dir='/etc/ssh/sshd_config.d'):
for guid, settings in deleted_gpo_list:
if str(self) in settings:
for attribute, sshd_config in settings[str(self)].items():
self.unapply(guid, attribute, sshd_config)
for gpo in changed_gpo_list:
if gpo.file_sys_path:
xml = 'MACHINE/VGP/VTLA/SshCfg/SshD/manifest.xml'
path = os.path.join(gpo.file_sys_path, xml)
xml_conf = self.parse(path)
if not xml_conf:
continue
policy = xml_conf.find('policysetting')
data = policy.find('data')
configfile = data.find('configfile')
for configsection in configfile.findall('configsection'):
if configsection.find('sectionname').text:
continue
settings = {}
for kv in configsection.findall('keyvaluepair'):
settings[kv.find('key')] = kv.find('value')
raw = BytesIO()
for k, v in settings.items():
raw.write(b'%s %s\n' %
(get_bytes(k.text), get_bytes(v.text)))
# Each GPO applies only one set of OpenSSH settings, in a
# single file, so the attribute does not need uniqueness.
attribute = self.generate_attribute(gpo.name)
# The value hash is generated from the raw data we will
# write to the OpenSSH settings file, ensuring any changes
# to this GPO will cause the file to be rewritten.
value_hash = self.generate_value_hash(raw.getvalue())
if not os.path.isdir(cfg_dir):
os.mkdir(cfg_dir, 0o640)
def applier_func(cfg_dir, raw):
filename = select_next_conf(cfg_dir)
f = open(filename, 'wb')
f.write(intro)
f.write(raw.getvalue())
os.chmod(filename, 0o640)
f.close()
return [filename]
self.apply(gpo.name, attribute, value_hash, applier_func,
cfg_dir, raw)
raw.close()
def rsop(self, gpo):
output = {}
if gpo.file_sys_path:
xml = 'MACHINE/VGP/VTLA/SshCfg/SshD/manifest.xml'
path = os.path.join(gpo.file_sys_path, xml)
xml_conf = self.parse(path)
if not xml_conf:
return output
policy = xml_conf.find('policysetting')
data = policy.find('data')
configfile = data.find('configfile')
for configsection in configfile.findall('configsection'):
if configsection.find('sectionname').text:
continue
for kv in configsection.findall('keyvaluepair'):
if str(self) not in output.keys():
output[str(self)] = {}
output[str(self)][kv.find('key').text] = \
kv.find('value').text
return output
|