Move gpo_sec to top-level.
authorJelmer Vernooij <jelmer@samba.org>
Sun, 1 Mar 2009 01:44:51 +0000 (02:44 +0100)
committerGünther Deschner <gd@samba.org>
Mon, 20 Apr 2009 21:16:16 +0000 (23:16 +0200)
Signed-off-by: Günther Deschner <gd@samba.org>
libgpo/config.mk
libgpo/gpo.h
libgpo/gpo_sec.c [moved from source3/libgpo/gpo_sec.c with 90% similarity]
source3/Makefile.in
source3/include/ads.h
source4/main.mk

index ebfcafd024164640f7713eb25352d96cd7365fb2..10cd2382858b8bca4ebe094f3870f60b9b105eee 100644 (file)
@@ -1,3 +1,4 @@
 [SUBSYSTEM::LIBGPO]
 
-LIBGPO_OBJ_FILES = ../libgpo/gpo_util.o
+LIBGPO_OBJ_FILES = ../libgpo/gpo_util.o ../libgpo/gpo_sec.o \
+                                  ../libgpo/gpext/gpext.o
index 9abf526e14d226143657432e41cc253229dbe2da..c34dc4c750b442162dd7580cf0ee5ee790704d5d 100644 (file)
@@ -157,6 +157,8 @@ struct gp_registry_context {
 #define GP_EXT_GUID_SECURITY "827D319E-6EAC-11D2-A4EA-00C04F79F83A"
 #define GP_EXT_GUID_REGISTRY "35378EAC-683F-11D2-A89A-00C04FBBCFA2"
 #define GP_EXT_GUID_SCRIPTS  "42B5FAAE-6536-11D2-AE5A-0000F87571E3"
+#define ADS_EXTENDED_RIGHT_APPLY_GROUP_POLICY "edacfd8f-ffb3-11d1-b41d-00a0c968f939"
+
 
 #include "../libgpo/gpext/gpext.h"
 
similarity index 90%
rename from source3/libgpo/gpo_sec.c
rename to libgpo/gpo_sec.c
index c72bb2673240535461dfb7023eb4da3e7f1f49cc..15bd2881d50b0dbf76846baf302ef9a87ce6c843 100644 (file)
@@ -18,6 +18,9 @@
  */
 
 #include "includes.h"
+#include "librpc/gen_ndr/security.h"
+#include "librpc/gen_ndr/ndr_misc.h"
+#include "../libgpo/gpo.h"
 
 /****************************************************************
 ****************************************************************/
@@ -41,12 +44,12 @@ static bool gpo_sd_check_agp_object_guid(const struct security_ace_object *objec
                case SEC_ACE_OBJECT_TYPE_PRESENT:
                        if (GUID_equal(&object->type.type,
                                       &ext_right_apg_guid)) {
-                               return True;
+                               return true;
                        }
                case SEC_ACE_INHERITED_OBJECT_TYPE_PRESENT:
                        if (GUID_equal(&object->inherited_type.inherited_type,
                                       &ext_right_apg_guid)) {
-                               return True;
+                               return true;
                        }
                default:
                        break;
@@ -58,7 +61,7 @@ static bool gpo_sd_check_agp_object_guid(const struct security_ace_object *objec
 /****************************************************************
 ****************************************************************/
 
-static bool gpo_sd_check_agp_object(const SEC_ACE *ace)
+static bool gpo_sd_check_agp_object(const struct security_ace *ace)
 {
        if (!sec_ace_object(ace->type)) {
                return false;
@@ -92,7 +95,7 @@ static bool gpo_sd_check_read_access_bits(uint32_t access_mask)
 /****************************************************************
 ****************************************************************/
 
-static NTSTATUS gpo_sd_check_ace_denied_object(const SEC_ACE *ace,
+static NTSTATUS gpo_sd_check_ace_denied_object(const struct security_ace *ace,
                                               const struct nt_user_token *token)
 {
        if (gpo_sd_check_agp_object(ace) &&
@@ -110,7 +113,7 @@ static NTSTATUS gpo_sd_check_ace_denied_object(const SEC_ACE *ace,
 /****************************************************************
 ****************************************************************/
 
-static NTSTATUS gpo_sd_check_ace_allowed_object(const SEC_ACE *ace,
+static NTSTATUS gpo_sd_check_ace_allowed_object(const struct security_ace *ace,
                                                const struct nt_user_token *token)
 {
        if (gpo_sd_check_agp_object(ace) &&
@@ -128,7 +131,7 @@ static NTSTATUS gpo_sd_check_ace_allowed_object(const SEC_ACE *ace,
 /****************************************************************
 ****************************************************************/
 
-static NTSTATUS gpo_sd_check_ace(const SEC_ACE *ace,
+static NTSTATUS gpo_sd_check_ace(const struct security_ace *ace,
                                 const struct nt_user_token *token)
 {
        switch (ace->type) {
@@ -147,8 +150,8 @@ static NTSTATUS gpo_sd_check_ace(const SEC_ACE *ace,
 NTSTATUS gpo_apply_security_filtering(const struct GROUP_POLICY_OBJECT *gpo,
                                      const struct nt_user_token *token)
 {
-       SEC_DESC *sd = gpo->security_descriptor;
-       SEC_ACL *dacl = NULL;
+       struct security_descriptor *sd = gpo->security_descriptor;
+       struct security_acl *dacl = NULL;
        NTSTATUS status = NT_STATUS_ACCESS_DENIED;
        int i;
 
index 425d5f1c3beb4a5b444357b9924937df182db54f..adc36dda2c9b580b0a248e917c9079f0c3149c38 100644 (file)
@@ -412,7 +412,7 @@ LIBADDNS_OBJ = $(LIBADDNS_OBJ0) $(SOCKET_WRAPPER_OBJ)
 GPEXT_OBJ = ../libgpo/gpext/gpext.o @GPEXT_STATIC@
 
 LIBGPO_OBJ0 = libgpo/gpo_ldap.o libgpo/gpo_ini.o ../libgpo/gpo_util.o \
-             libgpo/gpo_fetch.o libgpo/gpo_filesync.o libgpo/gpo_sec.o \
+             libgpo/gpo_fetch.o libgpo/gpo_filesync.o ../libgpo/gpo_sec.o \
              libgpo/gpo_reg.o \
              $(GPEXT_OBJ)
 LIBGPO_OBJ = $(LIBGPO_OBJ0)
index 0fa19b55a6a628a31ea0792933fcf072ff10e041..afa4e1217556ec545c4957427a2f1fbcf43d26ae 100644 (file)
@@ -409,8 +409,6 @@ typedef struct {
        int critical;
 } ads_control;
 
-#define ADS_EXTENDED_RIGHT_APPLY_GROUP_POLICY "edacfd8f-ffb3-11d1-b41d-00a0c968f939"
-
 #define ADS_IGNORE_PRINCIPAL "not_defined_in_RFC4178@please_ignore"
 
 /* Settings for the domainFunctionality attribute in the rootDSE */
index aaae329ed8b7374c6e06397358be21cb952bb922..d9e0254c1f692df0194dec01f042c5f605e78330 100644 (file)
@@ -56,4 +56,4 @@ mkinclude ../libcli/ldap/config.mk
 mkinclude ../libcli/auth/config.mk
 mkinclude ../libcli/drsuapi/config.mk
 mkinclude ../libcli/samsync/config.mk
-
+mkinclude ../libgpo/config.mk