public static List <PolicyObject> GetPolicyForComputerInternal(SQLLib sql, string MachineID) { PolicyObjectList PolicyListSigned = new PolicyObjectList(); PolicyListSigned.Items = new List <PolicyObject>(); SqlDataReader dr; dr = sql.ExecSQLReader("SELECT * FROM Policies WHERE MachineID=@m AND Enabled=1", new SQLParam("@m", MachineID)); while (dr.Read()) { PolicyObject obj = LoadPolicyDB(dr, false, false); PolicyListSigned.Items.Add(obj); } dr.Close(); Int64? GroupID = null; object sqlo = sql.ExecSQLScalar("select Grouping from ComputerAccounts where MachineID=@m", new SQLParam("@m", MachineID)); if (sqlo is DBNull || sqlo == null) { GroupID = null; } else { GroupID = Convert.ToInt64(sqlo); } do { dr = sql.ExecSQLReader("SELECT * FROM Policies WHERE " + (GroupID == null ? "Grouping is NULL" : "Grouping=@g") + " AND Enabled=1 AND MachineID is NULL", new SQLParam("@g", GroupID)); while (dr.Read()) { PolicyObject obj = LoadPolicyDB(dr, false, false); PolicyListSigned.Items.Add(obj); } dr.Close(); if (GroupID != null) { sqlo = sql.ExecSQLScalar("select ParentID FROM Grouping WHERE ID=@g", new SQLParam("@g", GroupID)); if (sqlo is DBNull || sqlo == null) { GroupID = null; } else { GroupID = Convert.ToInt64(sqlo); } } else { break; } } while (true); PolicyListSigned.Items.Reverse(); Int64 Count = 1; foreach (PolicyObject p in PolicyListSigned.Items) { p.Order = Count; Count++; } #region Resolve Linked Policies for client for (int i = 0; i < PolicyListSigned.Items.Count; i++) { PolicyObject pol = PolicyListSigned.Items[i]; if (pol.Type == PolicyIDs.LinkedPolicy) { List <Int64> RunningIDs = new List <Int64>(); PolicyObject po = pol; while (true) { if (RunningIDs.Contains(po.ID) == true) { FoxEventLog.WriteEventLog("Policy ID " + pol.ID.ToString() + " (" + pol.Name + ") creates a loop!", System.Diagnostics.EventLogEntryType.Warning); break; } RunningIDs.Add(po.ID); Int64 PolID; po.Data = Convert.ToString(sql.ExecSQLScalar("SELECT DataBlob FROM Policies WHERE ID=@id", new SQLParam("@id", po.ID))); if (Int64.TryParse(po.Data, out PolID) == false) { FoxEventLog.WriteEventLog("Cannot read data of policy ID " + po.ID.ToString() + " (" + po.Name + ") for linking.", System.Diagnostics.EventLogEntryType.Warning); break; } if (Policies.PolicyExsits(sql, PolID) == false) { FoxEventLog.WriteEventLog("Policy ID " + PolID.ToString() + " referencing from " + po.ID.ToString() + " (" + po.Name + ") does not exist.", System.Diagnostics.EventLogEntryType.Warning); break; } if (Convert.ToInt32(sql.ExecSQLScalar("SELECT Enabled FROM Policies WHERE ID=@id", new SQLParam("@id", PolID))) != 1) { break; } dr = sql.ExecSQLReader("SELECT * FROM Policies WHERE ID=@id", new SQLParam("@id", PolID)); dr.Read(); po = LoadPolicyDB(dr, false, false); dr.Close(); if (po == null) { FoxEventLog.WriteEventLog("Cannot read policy ID for linking " + PolID.ToString(), System.Diagnostics.EventLogEntryType.Warning); break; } if (po.Type != PolicyIDs.LinkedPolicy) { pol = po; PolicyListSigned.Items[i] = po; break; } } } } #endregion return(PolicyListSigned.Items); }
public RESTStatus GetPolicyForComputer(SQLLib sql, object dummy, NetworkConnectionInfo ni) { if (ni.HasAcl(ACLFlags.ComputerLogin) == false) { ni.Error = "Access denied"; ni.ErrorID = ErrorFlags.AccessDenied; return(RESTStatus.Denied); } PolicyListSigned = new PolicyObjectListSigned(); PolicyListSigned.Items = new List <PolicyObjectSigned>(); string MachineID = ni.Username; lock (ni.sqllock) { SqlDataReader dr = sql.ExecSQLReader("SELECT * FROM Policies WHERE MachineID=@m AND Enabled=1 AND Type not in (" + PolicyIDs.HiddenPoliciesSQLINClause + ")", new SQLParam("@m", MachineID)); while (dr.Read()) { PolicyObject obj = LoadPolicyDB(dr, false, true); PolicyObjectSigned objs = new PolicyObjectSigned(); objs.Policy = obj; if (Certificates.Sign(objs, SettingsManager.Settings.UseCertificate) == false) { FoxEventLog.WriteEventLog("Cannot sign policy with Certificate " + SettingsManager.Settings.UseCertificate, System.Diagnostics.EventLogEntryType.Warning); ni.Error = "Cannot sign policy with Certificate " + SettingsManager.Settings.UseCertificate; ni.ErrorID = ErrorFlags.CannotSign; dr.Close(); return(RESTStatus.ServerError); } PolicyListSigned.Items.Add(objs); } dr.Close(); } Int64? GroupID = null; object sqlo = sql.ExecSQLScalar("select Grouping from ComputerAccounts where MachineID=@m", new SQLParam("@m", MachineID)); if (sqlo is DBNull || sqlo == null) { GroupID = null; } else { GroupID = Convert.ToInt64(sqlo); } do { lock (ni.sqllock) { SqlDataReader dr = sql.ExecSQLReader("SELECT * FROM Policies WHERE " + (GroupID == null ? "Grouping is NULL" : "Grouping=@g") + " AND Enabled=1 AND Type NOT IN (" + PolicyIDs.HiddenPoliciesSQLINClause + ") AND MachineID is NULL", new SQLParam("@g", GroupID)); while (dr.Read()) { PolicyObject obj = LoadPolicyDB(dr, false, true); PolicyObjectSigned objs = new PolicyObjectSigned(); objs.Policy = obj; PolicyListSigned.Items.Add(objs); } dr.Close(); } if (GroupID != null) { lock (ni.sqllock) { sqlo = sql.ExecSQLScalar("select ParentID FROM Grouping WHERE ID=@g", new SQLParam("@g", GroupID)); } if (sqlo is DBNull || sqlo == null) { GroupID = null; } else { GroupID = Convert.ToInt64(sqlo); } } else { break; } } while (true); PolicyListSigned.Items.Reverse(); Int64 Count = 1; foreach (PolicyObjectSigned p in PolicyListSigned.Items) { p.Policy.Order = Count; Count++; if (Certificates.Sign(p, SettingsManager.Settings.UseCertificate) == false) { FoxEventLog.WriteEventLog("Cannot sign policy with Certificate " + SettingsManager.Settings.UseCertificate, System.Diagnostics.EventLogEntryType.Warning); ni.Error = "Cannot sign policy with Certificate " + SettingsManager.Settings.UseCertificate; ni.ErrorID = ErrorFlags.CannotSign; return(RESTStatus.ServerError); } } List <PolicyObjectSigned> RemoveFromList = new List <PolicyObjectSigned>(); #region Resolve Linked Policies for client for (int i = 0; i < PolicyListSigned.Items.Count; i++) { PolicyObjectSigned pol = PolicyListSigned.Items[i]; if (pol.Policy.Type == PolicyIDs.LinkedPolicy) { List <Int64> RunningIDs = new List <Int64>(); PolicyObject po = pol.Policy; while (true) { if (RunningIDs.Contains(po.ID) == true) { FoxEventLog.WriteEventLog("Policy ID " + pol.Policy.ID.ToString() + " (" + pol.Policy.Name + ") creates a loop!", System.Diagnostics.EventLogEntryType.Warning); break; } RunningIDs.Add(po.ID); lock (ni.sqllock) { po.Data = Convert.ToString(sql.ExecSQLScalar("SELECT DataBlob FROM Policies WHERE ID=@id", new SQLParam("@id", po.ID))); } Int64 PolID; if (Int64.TryParse(po.Data, out PolID) == false) { FoxEventLog.WriteEventLog("Cannot read data of policy ID " + po.ID.ToString() + " (" + po.Name + ") for linking.", System.Diagnostics.EventLogEntryType.Warning); break; } lock (ni.sqllock) { if (Policies.PolicyExsits(sql, PolID) == false) { FoxEventLog.WriteEventLog("Policy ID " + PolID.ToString() + " referencing from " + po.ID.ToString() + " (" + po.Name + ") does not exist.", System.Diagnostics.EventLogEntryType.Warning); break; } } lock (ni.sqllock) { if (Convert.ToInt32(sql.ExecSQLScalar("SELECT Enabled FROM Policies WHERE ID=@id", new SQLParam("@id", PolID))) != 1) { break; } } lock (ni.sqllock) { SqlDataReader dr = sql.ExecSQLReader("SELECT * FROM Policies WHERE ID=@id", new SQLParam("@id", PolID)); dr.Read(); po = LoadPolicyDB(dr, false, true); dr.Close(); } if (po == null) { FoxEventLog.WriteEventLog("Cannot read policy ID for linking " + PolID.ToString(), System.Diagnostics.EventLogEntryType.Warning); break; } if (po.Type != PolicyIDs.LinkedPolicy) { if (PolicyIDs.HiddenPolicies.Contains(po.Type) == true) { pol.Policy = null; pol.Signature = null; break; } else { pol.Policy = po; pol.Signature = null; break; } } } if (pol.Policy != null) { if (Certificates.Sign(pol, SettingsManager.Settings.UseCertificate) == false) { FoxEventLog.WriteEventLog("Cannot sign policy with Certificate " + SettingsManager.Settings.UseCertificate, System.Diagnostics.EventLogEntryType.Warning); ni.Error = "Cannot sign policy with Certificate " + SettingsManager.Settings.UseCertificate; ni.ErrorID = ErrorFlags.CannotSign; return(RESTStatus.ServerError); } } else { RemoveFromList.Add(pol); } } } foreach (PolicyObjectSigned pos in RemoveFromList) { PolicyListSigned.Items.Remove(pos); } #endregion if (Certificates.Sign(PolicyListSigned, SettingsManager.Settings.UseCertificate) == false) { FoxEventLog.WriteEventLog("Cannot sign policy list with Certificate " + SettingsManager.Settings.UseCertificate, System.Diagnostics.EventLogEntryType.Warning); ni.Error = "Cannot sign policy list with Certificate " + SettingsManager.Settings.UseCertificate; ni.ErrorID = ErrorFlags.CannotSign; return(RESTStatus.ServerError); } return(RESTStatus.Success); }