summaryrefslogtreecommitdiff
path: root/lib/chef/win32/security/sid.rb
blob: 5e7edf27331a8c2a583113be940c6619188534a7 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
#
# Author:: John Keiser (<jkeiser@opscode.com>)
# Copyright:: Copyright 2011 Opscode, Inc.
# License:: Apache License, Version 2.0
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#

require "chef/win32/security"
require "chef/win32/api/net"
require "chef/win32/api/error"

require "wmi-lite/wmi"

class Chef
  module ReservedNames::Win32
    class Security
      class SID
        include Chef::ReservedNames::Win32::API::Net
        include Chef::ReservedNames::Win32::API::Error

        class << self
          include Chef::ReservedNames::Win32::API::Net
          include Chef::ReservedNames::Win32::API::Error
        end

        def initialize(pointer, owner = nil)
          @pointer = pointer
          # Keep a reference to the actual owner of this memory so we don't get freed
          @owner = owner
        end

        def self.from_account(name)
          domain, sid, use = Chef::ReservedNames::Win32::Security.lookup_account_name(name)
          sid
        end

        def self.from_string_sid(string_sid)
          Chef::ReservedNames::Win32::Security::convert_string_sid_to_sid(string_sid)
        end

        def ==(other)
          other != nil && Chef::ReservedNames::Win32::Security.equal_sid(self, other)
        end

        attr_reader :pointer

        def account
          Chef::ReservedNames::Win32::Security.lookup_account_sid(self)
        end

        def account_name
          domain, name, use = account
          (domain != nil && domain.length > 0) ? "#{domain}\\#{name}" : name
        end

        def size
          Chef::ReservedNames::Win32::Security.get_length_sid(self)
        end

        def to_s
          Chef::ReservedNames::Win32::Security.convert_sid_to_string_sid(self)
        end

        def valid?
          Chef::ReservedNames::Win32::Security.is_valid_sid(self)
        end

        # Well-known SIDs
        def self.Null
          SID.from_string_sid("S-1-0")
        end
        def self.Nobody
          SID.from_string_sid("S-1-0-0")
        end
        def self.World
          SID.from_string_sid("S-1-1")
        end
        def self.Everyone
          SID.from_string_sid("S-1-1-0")
        end
        def self.Local
          SID.from_string_sid("S-1-2")
        end
        def self.Creator
          SID.from_string_sid("S-1-3")
        end
        def self.CreatorOwner
          SID.from_string_sid("S-1-3-0")
        end
        def self.CreatorGroup
          SID.from_string_sid("S-1-3-1")
        end
        def self.CreatorOwnerServer
          SID.from_string_sid("S-1-3-2")
        end
        def self.CreatorGroupServer
          SID.from_string_sid("S-1-3-3")
        end
        def self.NonUnique
          SID.from_string_sid("S-1-4")
        end
        def self.Nt
          SID.from_string_sid("S-1-5")
        end
        def self.Dialup
          SID.from_string_sid("S-1-5-1")
        end
        def self.Network
          SID.from_string_sid("S-1-5-2")
        end
        def self.Batch
          SID.from_string_sid("S-1-5-3")
        end
        def self.Interactive
          SID.from_string_sid("S-1-5-4")
        end
        def self.Service
          SID.from_string_sid("S-1-5-6")
        end
        def self.Anonymous
          SID.from_string_sid("S-1-5-7")
        end
        def self.Proxy
          SID.from_string_sid("S-1-5-8")
        end
        def self.EnterpriseDomainControllers
          SID.from_string_sid("S-1-5-9")
        end
        def self.PrincipalSelf
          SID.from_string_sid("S-1-5-10")
        end
        def self.AuthenticatedUsers
          SID.from_string_sid("S-1-5-11")
        end
        def self.RestrictedCode
          SID.from_string_sid("S-1-5-12")
        end
        def self.TerminalServerUsers
          SID.from_string_sid("S-1-5-13")
        end
        def self.LocalSystem
          SID.from_string_sid("S-1-5-18")
        end
        def self.NtLocal
          SID.from_string_sid("S-1-5-19")
        end
        def self.NtNetwork
          SID.from_string_sid("S-1-5-20")
        end
        def self.BuiltinAdministrators
          SID.from_string_sid("S-1-5-32-544")
        end
        def self.BuiltinUsers
          SID.from_string_sid("S-1-5-32-545")
        end
        def self.Guests
          SID.from_string_sid("S-1-5-32-546")
        end
        def self.PowerUsers
          SID.from_string_sid("S-1-5-32-547")
        end
        def self.AccountOperators
          SID.from_string_sid("S-1-5-32-548")
        end
        def self.ServerOperators
          SID.from_string_sid("S-1-5-32-549")
        end
        def self.PrintOperators
          SID.from_string_sid("S-1-5-32-550")
        end
        def self.BackupOperators
          SID.from_string_sid("S-1-5-32-551")
        end
        def self.Replicators
          SID.from_string_sid("S-1-5-32-552")
        end
        def self.Administrators
          SID.from_string_sid("S-1-5-32-544")
        end

        def self.None
          SID.from_account("#{::ENV['COMPUTERNAME']}\\None")
        end
        def self.Administrator
          SID.from_account("#{::ENV['COMPUTERNAME']}\\#{SID.admin_account_name}")
        end
        def self.Guest
          SID.from_account("#{::ENV['COMPUTERNAME']}\\Guest")
        end

        def self.current_user
          SID.from_account("#{::ENV['USERDOMAIN']}\\#{::ENV['USERNAME']}")
        end

        # See https://technet.microsoft.com/en-us/library/cc961992.aspx
        # In practice, this is SID.Administrators if the current_user is an admin (even if not
        # running elevated), and is current_user otherwise. On win2k3, it technically can be
        # current_user in all cases if a certain group policy is set.
        def self.default_security_object_owner
          token = Chef::ReservedNames::Win32::Security.open_current_process_token
          Chef::ReservedNames::Win32::Security.get_token_information_owner(token)
        end

        # See https://technet.microsoft.com/en-us/library/cc961996.aspx
        # In practice, this seems to be SID.current_user for Microsoft Accounts, the current
        # user's Domain Users group for domain accounts, and SID.None otherwise.
        def self.default_security_object_group
          token = Chef::ReservedNames::Win32::Security.open_current_process_token
          Chef::ReservedNames::Win32::Security.get_token_information_primary_group(token)
        end

        def self.admin_account_name
          @admin_account_name ||= begin
            admin_account_name = nil

            # Call NetUserEnum to enumerate the users without hitting network
            # http://msdn.microsoft.com/en-us/library/windows/desktop/aa370652(v=vs.85).aspx
            servername = nil # We are querying the local server
            level = 3 # We want USER_INFO_3 structure which contains the SID
            filter = FILTER_NORMAL_ACCOUNT # Only query the user accounts
            bufptr = FFI::MemoryPointer.new(:pointer) # Buffer which will receive the data
            prefmaxlen = MAX_PREFERRED_LENGTH # Let the system allocate the needed amount of memory
            entriesread = FFI::Buffer.new(:long).write_long(0)
            totalentries = FFI::Buffer.new(:long).write_long(0)
            resume_handle = FFI::Buffer.new(:long).write_long(0)

            status = ERROR_MORE_DATA

            while(status == ERROR_MORE_DATA) do
              status = NetUserEnum(servername, level, filter, bufptr, prefmaxlen, entriesread, totalentries, resume_handle)

              if (status == NERR_Success || status == ERROR_MORE_DATA)
                entriesread.read_long.times.collect do |i|
                  user_info = USER_INFO_3.new(bufptr.read_pointer + i * USER_INFO_3.size)
                  # Check if the account is the Administrator account
                  # RID for the Administrator account is always 500 and it's privilage is set to USER_PRIV_ADMIN
                  if user_info[:usri3_user_id] == 500 && user_info[:usri3_priv] == 2 # USER_PRIV_ADMIN (2) - Administrator
                    admin_account_name = user_info[:usri3_name].read_wstring
                    break
                  end
                end

                # Free the memory allocated by the system
                NetApiBufferFree(bufptr.read_pointer)
              end
            end

            raise "Can not determine the administrator account name." if admin_account_name.nil?
            admin_account_name
          end
        end
      end
    end
  end
end