# SPDX-FileCopyrightText: 2004-2025 Univention GmbH
# SPDX-License-Identifier: AGPL-3.0-only
"""|UDM| module for the trust accounts"""
from __future__ import annotations
from typing import Any
import univention.admin.filter
import univention.admin.handlers
import univention.admin.localization
import univention.admin.mapping
import univention.admin.password
import univention.admin.syntax
import univention.admin.uexceptions
from univention.admin.certificate import PKIIntegration, pki_option, pki_properties, pki_tab, register_pki_mapping
from univention.admin.guardian_roles import register_role_mapping, role_layout, role_properties
from univention.admin.layout import Group, Tab
translation = univention.admin.localization.translation('univention.admin.handlers.computers')
_ = translation.translate
module = 'computers/trustaccount'
operations = ['add', 'edit', 'remove', 'search', 'move']
docleanup = True
childs = False
short_description = _('Computer: Domain trust account')
object_name = _('Domain trust account')
object_name_plural = _('Domain trust accounts')
long_description = ''
# fmt: off
options = {
'pki': pki_option(),
}
property_descriptions = dict({
'name': univention.admin.property(
short_description=_('Name'),
long_description='',
syntax=univention.admin.syntax.dnsName_umlauts,
include_in_default_search=True,
required=True,
identifies=True,
),
'description': univention.admin.property(
short_description=_('Description'),
long_description='',
syntax=univention.admin.syntax.string,
include_in_default_search=True,
),
'password': univention.admin.property(
short_description=_('Machine Password'),
long_description='',
syntax=univention.admin.syntax.passwd,
required=True,
dontsearch=True,
),
}, **pki_properties())
property_descriptions.update(role_properties())
layout = [
Tab(_('General'), _('Basic values'), layout=[
Group(_('Trust account'), layout=[
["name", "description"],
"password",
]),
]),
pki_tab(),
]
layout.append(role_layout())
mapping = univention.admin.mapping.mapping()
mapping.register('name', 'cn', None, univention.admin.mapping.ListToString)
mapping.register('description', 'description', None, univention.admin.mapping.ListToString)
register_pki_mapping(mapping)
register_role_mapping(mapping)
# fmt: on
[docs]
class object(univention.admin.handlers.simpleLdap, PKIIntegration):
module = module
[docs]
def open(self) -> None:
super().open()
self.pki_open()
self.options = ['samba'] # FIXME: TODO
self.modifypassword = 1
if self.exists():
self['password'] = '********'
self.modifypassword = 0
self.save()
[docs]
def getMachineSid(self, lo: univention.admin.uldap.access, position: univention.admin.uldap.position, uidNum: str, rid: str | None = None) -> str:
# if rid is given, use it regardless of s4 connector
if rid:
searchResult = self.lo.authz_connection.search(filter='objectClass=sambaDomain', attr=['sambaSID'])
domainsid = searchResult[0][1]['sambaSID'][0]
sid = domainsid + '-' + rid
return self.request_lock('sid', sid)
else:
# if no rid is given, create a domain sid or local sid if connector is present
if self.s4connector_present:
return 'S-1-4-%s' % uidNum
else:
num = uidNum
while True:
try:
return self.request_lock('sid+user', num)
except univention.admin.uexceptions.noLock:
num = str(int(num) + 1)
def _ldap_addlist(self) -> list[tuple[str, Any]]:
acctFlags = univention.admin.samba.acctFlags(flags={'I': 1})
al = super()._ldap_addlist()
ocs = [b'top', b'person', b'sambaSamAccount']
al.append(('sambaSID', [self.getMachineSid(self.lo, self.position, self.request_lock('uidNumber')).encode('ASCII')]))
al.append(('sambaAcctFlags', [acctFlags.decode().encode('ASCII')]))
al.append(('sn', self['name'].encode('UTF-8')))
al.insert(0, ('objectClass', ocs))
return al
def _ldap_pre_modify(self) -> None:
super()._ldap_pre_modify()
if self.hasChanged('password'):
if not self['password']:
self.modifypassword = 0
elif not self.info['password']:
self.modifypassword = 0
else:
self.modifypassword = 1
def _ldap_modlist(self) -> list[tuple[str, Any, Any]]:
ml = super()._ldap_modlist()
if self.hasChanged('name') and self['name']:
requested_uid = '%s$' % self['name']
try:
ml.append(('uid', self.oldattr.get('uid', []), [self.request_lock('uid', requested_uid).encode('UTF-8')]))
except univention.admin.uexceptions.noLock:
raise univention.admin.uexceptions.uidAlreadyUsed(requested_uid)
if self.modifypassword:
password_nt, password_lm = univention.admin.password.ntlm(self['password'])
ml.append(('sambaNTPassword', self.oldattr.get('sambaNTPassword', [b''])[0], password_nt.encode('ASCII')))
ml.append(('sambaLMPassword', self.oldattr.get('sambaLMPassword', [b''])[0], password_lm.encode('ASCII')))
return ml
def _ldap_pre_remove(self) -> None:
super()._ldap_pre_remove()
if self.oldattr.get('uid'):
self.alloc.append(('uid', self.oldattr['uid'][0].decode('UTF-8')))
if self.oldattr.get('sambaSID'):
self.alloc.append(('sid', self.oldattr['sambaSID'][0].decode('ASCII')))
[docs]
def lookup(co, lo, filter_s, base='', superordinate=None, scope='sub', unique=False, required=False, timeout=-1, sizelimit=0, serverctrls=None, response=None):
filter = univention.admin.filter.conjunction('&', [
univention.admin.filter.expression('objectClass', 'sambaSamAccount'),
univention.admin.filter.expression('sambaAcctFlags', '[I ]'),
]) # fmt: skip
if filter_s:
filter_p = univention.admin.filter.parse(filter_s)
univention.admin.filter.walk(filter_p, univention.admin.mapping.mapRewrite, arg=mapping)
filter.expressions.append(filter_p)
res: list[univention.admin.handlers.simpleLdap] = [
object(co, lo, None, dn, attributes=attrs)
for dn, attrs in lo.authz_connection.search(str(filter), base, scope, [], unique, required, timeout, sizelimit, serverctrls, response)
]
return res
[docs]
def identify(dn: str, attr: univention.admin.handlers._Attributes, canonical: bool = False) -> bool:
return b'sambaSamAccount' in attr.get('objectClass', []) and b'[I ]' in attr.get('sambaAcctFlags', [])