summaryrefslogtreecommitdiff
path: root/lib/chef/win32/security/security_descriptor.rb
diff options
context:
space:
mode:
Diffstat (limited to 'lib/chef/win32/security/security_descriptor.rb')
-rw-r--r--lib/chef/win32/security/security_descriptor.rb93
1 files changed, 93 insertions, 0 deletions
diff --git a/lib/chef/win32/security/security_descriptor.rb b/lib/chef/win32/security/security_descriptor.rb
new file mode 100644
index 0000000000..658e9104b4
--- /dev/null
+++ b/lib/chef/win32/security/security_descriptor.rb
@@ -0,0 +1,93 @@
+#
+# Author:: John Keiser (<jkeiser@opscode.com>)
+# Copyright:: Copyright 2011 Opscode, Inc.
+# License:: Apache License, Version 2.0
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+#
+
+require 'chef/win32/security'
+require 'chef/win32/security/acl'
+require 'chef/win32/security/sid'
+
+class Chef
+ module ReservedNames::Win32
+ class Security
+ class SecurityDescriptor
+
+ def initialize(pointer)
+ @pointer = pointer
+ end
+
+ attr_reader :pointer
+
+ def absolute?
+ !self_relative?
+ end
+
+ def control
+ control, version = Chef::ReservedNames::Win32::Security.get_security_descriptor_control(self)
+ control
+ end
+
+ def dacl
+ raise "DACL not present" if !dacl_present?
+ present, acl, defaulted = Chef::ReservedNames::Win32::Security.get_security_descriptor_dacl(self)
+ acl
+ end
+
+ def dacl_inherits?
+ (control & Chef::ReservedNames::Win32::API::Security::SE_DACL_PROTECTED) == 0
+ end
+
+ def dacl_present?
+ (control & Chef::ReservedNames::Win32::API::Security::SE_DACL_PRESENT) != 0
+ end
+
+ def group
+ result, defaulted = Chef::ReservedNames::Win32::Security.get_security_descriptor_group(self)
+ result
+ end
+
+ def owner
+ result, defaulted = Chef::ReservedNames::Win32::Security.get_security_descriptor_owner(self)
+ result
+ end
+
+ def sacl
+ raise "SACL not present" if !sacl_present?
+ Security.with_privileges("SeSecurityPrivilege") do
+ present, acl, defaulted = Chef::ReservedNames::Win32::Security.get_security_descriptor_sacl(self)
+ acl
+ end
+ end
+
+ def sacl_inherits?
+ (control & Chef::ReservedNames::Win32::API::Security::SE_SACL_PROTECTED) == 0
+ end
+
+ def sacl_present?
+ (control & Chef::ReservedNames::Win32::API::Security::SE_SACL_PRESENT) != 0
+ end
+
+ def self_relative?
+ (control & Chef::ReservedNames::Win32::API::Security::SE_SELF_RELATIVE) != 0
+ end
+
+ def valid?
+ Chef::ReservedNames::Win32::Security.is_valid_security_descriptor(self)
+ end
+ end
+ end
+ end
+end