AdGuardHome/internal/permcheck/migrate_windows.go

136 lines
4.0 KiB
Go
Raw Normal View History

2024-11-27 16:19:11 +00:00
//go:build windows
package permcheck
import (
"context"
"log/slog"
"github.com/AdguardTeam/golibs/logutil/slogutil"
"golang.org/x/sys/windows"
)
// needsMigration is the Windows-specific implementation of [NeedsMigration].
func needsMigration(ctx context.Context, l *slog.Logger, workDir, _ string) (ok bool) {
2024-11-28 12:14:06 +00:00
l = l.With("type", typeDir, "path", workDir)
2024-11-27 16:19:11 +00:00
dacl, owner, err := getSecurityInfo(workDir)
if err != nil {
l.ErrorContext(ctx, "getting security info", slogutil.KeyError, err)
return true
}
if !owner.IsWellKnown(windows.WinBuiltinAdministratorsSid) {
return true
}
err = rangeACEs(dacl, func(
hdr windows.ACE_HEADER,
mask windows.ACCESS_MASK,
sid *windows.SID,
) (cont bool) {
switch {
case hdr.AceType != windows.ACCESS_ALLOWED_ACE_TYPE:
// Skip non-allowed access control entries.
2024-11-28 16:21:03 +00:00
l.DebugContext(ctx, "skipping deny access control entry", "sid", sid)
2024-11-27 16:19:11 +00:00
case !sid.IsWellKnown(windows.WinBuiltinAdministratorsSid):
// Non-administrator access control entries should not have any
// access rights.
ok = mask > 0
default:
// Administrators should have full control.
ok = mask&fullControlMask != fullControlMask
}
// Stop ranging if the access control entry is unexpected.
return !ok
})
if err != nil {
l.ErrorContext(ctx, "checking access control entries", slogutil.KeyError, err)
return true
}
return ok
}
// migrate is the Windows-specific implementation of [Migrate].
2024-11-28 16:21:03 +00:00
//
2024-11-29 11:28:17 +00:00
// It sets the owner to administrators and adds a full control access control
// entry for the account. It also removes all non-administrator access control
// entries, and keeps deny access control entries. For any created or modified
// entry it sets the propagation flags to be inherited by child objects.
2024-11-28 16:21:03 +00:00
func migrate(ctx context.Context, logger *slog.Logger, workDir, _, _, _, _ string) {
l := logger.With("type", typeDir, "path", workDir)
2024-11-28 12:14:06 +00:00
2024-11-27 16:19:11 +00:00
dacl, owner, err := getSecurityInfo(workDir)
if err != nil {
2024-11-28 16:21:03 +00:00
l.ErrorContext(ctx, "getting security info", slogutil.KeyError, err)
2024-11-27 16:19:11 +00:00
return
}
2024-12-02 12:37:58 +00:00
admins, err := windows.CreateWellKnownSid(windows.WinBuiltinAdministratorsSid)
if err != nil {
2024-11-28 16:21:03 +00:00
l.ErrorContext(ctx, "creating administrators sid", slogutil.KeyError, err)
2024-12-02 12:37:58 +00:00
return
2024-11-27 16:19:11 +00:00
}
// TODO(e.burkov): Check for duplicates?
var accessEntries []windows.EXPLICIT_ACCESS
2024-11-29 11:28:17 +00:00
var setACL bool
2024-11-28 16:21:03 +00:00
// Iterate over the access control entries in DACL to determine if its
// migration is needed.
2024-11-27 16:19:11 +00:00
err = rangeACEs(dacl, func(
hdr windows.ACE_HEADER,
mask windows.ACCESS_MASK,
sid *windows.SID,
) (cont bool) {
switch {
case hdr.AceType != windows.ACCESS_ALLOWED_ACE_TYPE:
2024-11-28 16:21:03 +00:00
// Add non-allowed access control entries as is, since they specify
// the access restrictions, which shouldn't be lost.
l.InfoContext(ctx, "migrating deny access control entry", "sid", sid)
2024-11-27 16:19:11 +00:00
accessEntries = append(accessEntries, newDenyExplicitAccess(sid, mask))
2024-11-29 11:28:17 +00:00
setACL = true
2024-11-27 16:19:11 +00:00
case !sid.IsWellKnown(windows.WinBuiltinAdministratorsSid):
2024-11-28 16:21:03 +00:00
// Remove non-administrator ACEs, since such accounts should not
// have any access rights.
l.InfoContext(ctx, "removing access control entry", "sid", sid)
2024-11-29 11:28:17 +00:00
setACL = true
2024-11-27 16:19:11 +00:00
default:
2024-11-28 16:21:03 +00:00
// Administrators should have full control. Don't add a new entry
// here since it will be added later in case there are other
// required entries.
l.InfoContext(ctx, "migrating access control entry", "sid", sid, "mask", mask)
2024-11-29 11:28:17 +00:00
setACL = setACL || mask&fullControlMask != fullControlMask
2024-11-27 16:19:11 +00:00
}
return true
})
if err != nil {
2024-11-28 16:21:03 +00:00
l.ErrorContext(ctx, "ranging through access control entries", slogutil.KeyError, err)
2024-11-27 16:19:11 +00:00
return
}
2024-11-29 11:28:17 +00:00
if setACL {
2024-12-02 12:37:58 +00:00
accessEntries = append(accessEntries, newFullExplicitAccess(admins))
}
if !owner.IsWellKnown(windows.WinBuiltinAdministratorsSid) {
l.InfoContext(ctx, "migrating owner", "sid", owner)
owner = admins
} else {
l.DebugContext(ctx, "owner is already an administrator")
owner = nil
2024-11-28 16:21:03 +00:00
}
2024-11-27 16:19:11 +00:00
err = setSecurityInfo(workDir, owner, accessEntries)
if err != nil {
2024-11-28 16:21:03 +00:00
l.ErrorContext(ctx, "setting security info", slogutil.KeyError, err)
2024-11-27 16:19:11 +00:00
}
}