summaryrefslogtreecommitdiffstats
path: root/python/samba/netcmd/fsmo.py
diff options
context:
space:
mode:
Diffstat (limited to 'python/samba/netcmd/fsmo.py')
-rw-r--r--python/samba/netcmd/fsmo.py535
1 files changed, 535 insertions, 0 deletions
diff --git a/python/samba/netcmd/fsmo.py b/python/samba/netcmd/fsmo.py
new file mode 100644
index 0000000..643d0ae
--- /dev/null
+++ b/python/samba/netcmd/fsmo.py
@@ -0,0 +1,535 @@
+# Changes a FSMO role owner
+#
+# Copyright Nadezhda Ivanova 2009
+# Copyright Jelmer Vernooij 2009
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; either version 3 of the License, or
+# (at your option) any later version.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program. If not, see <http://www.gnu.org/licenses/>.
+#
+
+import samba
+import samba.getopt as options
+import ldb
+from ldb import LdbError
+from samba.dcerpc import drsuapi, misc
+from samba.auth import system_session
+import samba.drs_utils
+from samba.netcmd import (
+ Command,
+ CommandError,
+ SuperCommand,
+ Option,
+)
+from samba.samdb import SamDB
+
+
+def get_fsmo_roleowner(samdb, roledn, role):
+ """Gets the owner of an FSMO role
+
+ :param roledn: The DN of the FSMO role
+ :param role: The FSMO role
+ """
+ try:
+ res = samdb.search(roledn,
+ scope=ldb.SCOPE_BASE, attrs=["fSMORoleOwner"])
+ except LdbError as e7:
+ (num, msg) = e7.args
+ if num == ldb.ERR_NO_SUCH_OBJECT:
+ raise CommandError("The '%s' role is not present in this domain" % role)
+ raise
+
+ if 'fSMORoleOwner' in res[0]:
+ master_owner = (ldb.Dn(samdb, res[0]["fSMORoleOwner"][0].decode('utf8')))
+ else:
+ master_owner = None
+
+ return master_owner
+
+
+def transfer_dns_role(outf, sambaopts, credopts, role, samdb):
+ """Transfer dns FSMO role. """
+
+ if role == "domaindns":
+ domain_dn = samdb.domain_dn()
+ role_object = "CN=Infrastructure,DC=DomainDnsZones," + domain_dn
+ elif role == "forestdns":
+ forest_dn = samba.dn_from_dns_name(samdb.forest_dns_name())
+ role_object = "CN=Infrastructure,DC=ForestDnsZones," + forest_dn
+
+ new_host_dns_name = samdb.host_dns_name()
+
+ res = samdb.search(role_object,
+ attrs=["fSMORoleOwner"],
+ scope=ldb.SCOPE_BASE,
+ controls=["extended_dn:1:1"])
+
+ if 'fSMORoleOwner' in res[0]:
+ try:
+ master_guid = str(misc.GUID(ldb.Dn(samdb,
+ res[0]['fSMORoleOwner'][0].decode('utf8'))
+ .get_extended_component('GUID')))
+ master_owner = str(ldb.Dn(samdb, res[0]['fSMORoleOwner'][0].decode('utf8')))
+ except LdbError as e3:
+ (num, msg) = e3.args
+ raise CommandError("No GUID found in naming master DN %s : %s \n" %
+ (res[0]['fSMORoleOwner'][0], msg))
+ else:
+ outf.write("* The '%s' role does not have an FSMO roleowner\n" % role)
+ return False
+
+ if role == "domaindns":
+ master_dns_name = '%s._msdcs.%s' % (master_guid,
+ samdb.domain_dns_name())
+ new_dns_name = '%s._msdcs.%s' % (samdb.get_ntds_GUID(),
+ samdb.domain_dns_name())
+ elif role == "forestdns":
+ master_dns_name = '%s._msdcs.%s' % (master_guid,
+ samdb.forest_dns_name())
+ new_dns_name = '%s._msdcs.%s' % (samdb.get_ntds_GUID(),
+ samdb.forest_dns_name())
+
+ new_owner = samdb.get_dsServiceName()
+
+ if master_dns_name != new_dns_name:
+ lp = sambaopts.get_loadparm()
+ creds = credopts.get_credentials(lp, fallback_machine=True)
+ samdb = SamDB(url="ldap://%s" % (master_dns_name),
+ session_info=system_session(),
+ credentials=creds, lp=lp)
+
+ m = ldb.Message()
+ m.dn = ldb.Dn(samdb, role_object)
+ m["fSMORoleOwner_Del"] = ldb.MessageElement(master_owner,
+ ldb.FLAG_MOD_DELETE,
+ "fSMORoleOwner")
+ m["fSMORoleOwner_Add"] = ldb.MessageElement(new_owner,
+ ldb.FLAG_MOD_ADD,
+ "fSMORoleOwner")
+ try:
+ samdb.modify(m)
+ except LdbError as e5:
+ (num, msg) = e5.args
+ raise CommandError("Failed to add role '%s': %s" % (role, msg))
+
+ try:
+ connection = samba.drs_utils.drsuapi_connect(new_host_dns_name,
+ lp, creds)
+ except samba.drs_utils.drsException as e:
+ raise CommandError("Drsuapi Connect failed", e)
+
+ try:
+ drsuapi_connection = connection[0]
+ drsuapi_handle = connection[1]
+ req_options = drsuapi.DRSUAPI_DRS_WRIT_REP
+ NC = role_object[18:]
+ samba.drs_utils.sendDsReplicaSync(drsuapi_connection,
+ drsuapi_handle,
+ master_guid,
+ NC, req_options)
+ except samba.drs_utils.drsException as estr:
+ raise CommandError("Replication failed", estr)
+
+ outf.write("FSMO transfer of '%s' role successful\n" % role)
+ return True
+ else:
+ outf.write("This DC already has the '%s' FSMO role\n" % role)
+ return False
+
+
+def transfer_role(outf, role, samdb):
+ """Transfer standard FSMO role. """
+
+ domain_dn = samdb.domain_dn()
+ rid_dn = "CN=RID Manager$,CN=System," + domain_dn
+ naming_dn = "CN=Partitions,%s" % samdb.get_config_basedn()
+ infrastructure_dn = "CN=Infrastructure," + domain_dn
+ schema_dn = str(samdb.get_schema_basedn())
+ new_owner = ldb.Dn(samdb, samdb.get_dsServiceName())
+ m = ldb.Message()
+ m.dn = ldb.Dn(samdb, "")
+ if role == "rid":
+ master_owner = get_fsmo_roleowner(samdb, rid_dn, role)
+ m["becomeRidMaster"] = ldb.MessageElement(
+ "1", ldb.FLAG_MOD_REPLACE,
+ "becomeRidMaster")
+ elif role == "pdc":
+ master_owner = get_fsmo_roleowner(samdb, domain_dn, role)
+
+ res = samdb.search(domain_dn,
+ scope=ldb.SCOPE_BASE, attrs=["objectSid"])
+ assert len(res) == 1
+ sid = res[0]["objectSid"][0]
+ m["becomePdc"] = ldb.MessageElement(
+ sid, ldb.FLAG_MOD_REPLACE,
+ "becomePdc")
+ elif role == "naming":
+ master_owner = get_fsmo_roleowner(samdb, naming_dn, role)
+ m["becomeDomainMaster"] = ldb.MessageElement(
+ "1", ldb.FLAG_MOD_REPLACE,
+ "becomeDomainMaster")
+ elif role == "infrastructure":
+ master_owner = get_fsmo_roleowner(samdb, infrastructure_dn, role)
+ m["becomeInfrastructureMaster"] = ldb.MessageElement(
+ "1", ldb.FLAG_MOD_REPLACE,
+ "becomeInfrastructureMaster")
+ elif role == "schema":
+ master_owner = get_fsmo_roleowner(samdb, schema_dn, role)
+ m["becomeSchemaMaster"] = ldb.MessageElement(
+ "1", ldb.FLAG_MOD_REPLACE,
+ "becomeSchemaMaster")
+ else:
+ raise CommandError("Invalid FSMO role.")
+
+ if master_owner is None:
+ outf.write("Cannot transfer, no DC assigned to the %s role. Try 'seize' instead\n" % role)
+ return False
+
+ if master_owner != new_owner:
+ try:
+ samdb.modify(m)
+ except LdbError as e6:
+ (num, msg) = e6.args
+ raise CommandError("Transfer of '%s' role failed: %s" %
+ (role, msg))
+
+ outf.write("FSMO transfer of '%s' role successful\n" % role)
+ return True
+ else:
+ outf.write("This DC already has the '%s' FSMO role\n" % role)
+ return False
+
+
+class cmd_fsmo_seize(Command):
+ """Seize the role."""
+
+ synopsis = "%prog [options]"
+
+ takes_optiongroups = {
+ "sambaopts": options.SambaOptions,
+ "credopts": options.CredentialsOptions,
+ "versionopts": options.VersionOptions,
+ }
+
+ takes_options = [
+ Option("-H", "--URL", help="LDB URL for database or target server",
+ type=str, metavar="URL", dest="H"),
+ Option("--force",
+ help="Force seizing of role without attempting to transfer.",
+ action="store_true"),
+ Option("--role", type="choice", choices=["rid", "pdc", "infrastructure",
+ "schema", "naming", "domaindns", "forestdns", "all"],
+ help="""The FSMO role to seize or transfer.\n
+rid=RidAllocationMasterRole\n
+schema=SchemaMasterRole\n
+pdc=PdcEmulationMasterRole\n
+naming=DomainNamingMasterRole\n
+infrastructure=InfrastructureMasterRole\n
+domaindns=DomainDnsZonesMasterRole\n
+forestdns=ForestDnsZonesMasterRole\n
+all=all of the above\n
+You must provide an Admin user and password."""),
+ ]
+
+ takes_args = []
+
+ def seize_role(self, role, samdb, force):
+ """Seize standard fsmo role. """
+
+ serviceName = samdb.get_dsServiceName()
+ domain_dn = samdb.domain_dn()
+ self.infrastructure_dn = "CN=Infrastructure," + domain_dn
+ self.naming_dn = "CN=Partitions,%s" % samdb.get_config_basedn()
+ self.schema_dn = str(samdb.get_schema_basedn())
+ self.rid_dn = "CN=RID Manager$,CN=System," + domain_dn
+
+ m = ldb.Message()
+ if role == "rid":
+ m.dn = ldb.Dn(samdb, self.rid_dn)
+ elif role == "pdc":
+ m.dn = ldb.Dn(samdb, domain_dn)
+ elif role == "naming":
+ m.dn = ldb.Dn(samdb, self.naming_dn)
+ elif role == "infrastructure":
+ m.dn = ldb.Dn(samdb, self.infrastructure_dn)
+ elif role == "schema":
+ m.dn = ldb.Dn(samdb, self.schema_dn)
+ else:
+ raise CommandError("Invalid FSMO role.")
+ # first try to transfer to avoid problem if the owner is still active
+ seize = False
+ master_owner = get_fsmo_roleowner(samdb, m.dn, role)
+ # if there is a different owner
+ if master_owner is not None:
+ # if there is a different owner
+ if master_owner != serviceName:
+ # if --force isn't given, attempt transfer
+ if force is None:
+ self.message("Attempting transfer...")
+ try:
+ transfer_role(self.outf, role, samdb)
+ except:
+ # transfer failed, use the big axe...
+ seize = True
+ self.message("Transfer unsuccessful, seizing...")
+ else:
+ self.message("Transfer successful, not seizing role")
+ return True
+ else:
+ self.outf.write("This DC already has the '%s' FSMO role\n" %
+ role)
+ return False
+ else:
+ seize = True
+
+ if force is not None or seize:
+ self.message("Seizing %s FSMO role..." % role)
+ m["fSMORoleOwner"] = ldb.MessageElement(
+ serviceName, ldb.FLAG_MOD_REPLACE,
+ "fSMORoleOwner")
+
+ samdb.transaction_start()
+ try:
+ samdb.modify(m)
+ if role == "rid":
+ # We may need to allocate the initial RID Set
+ samdb.create_own_rid_set()
+
+ except LdbError as e1:
+ (num, msg) = e1.args
+ if role == "rid" and num == ldb.ERR_ENTRY_ALREADY_EXISTS:
+
+ # Try again without the RID Set allocation
+ # (normal). We have to manage the transaction as
+ # we do not have nested transactions and creating
+ # a RID set touches multiple objects. :-(
+ samdb.transaction_cancel()
+ samdb.transaction_start()
+ try:
+ samdb.modify(m)
+ except LdbError as e:
+ (num, msg) = e.args
+ samdb.transaction_cancel()
+ raise CommandError("Failed to seize '%s' role: %s" %
+ (role, msg))
+
+ else:
+ samdb.transaction_cancel()
+ raise CommandError("Failed to seize '%s' role: %s" %
+ (role, msg))
+ samdb.transaction_commit()
+ self.outf.write("FSMO seize of '%s' role successful\n" % role)
+
+ return True
+
+ def seize_dns_role(self, role, samdb, credopts, sambaopts,
+ versionopts, force):
+ """Seize DNS FSMO role. """
+
+ serviceName = samdb.get_dsServiceName()
+ domain_dn = samdb.domain_dn()
+ forest_dn = samba.dn_from_dns_name(samdb.forest_dns_name())
+ self.domaindns_dn = "CN=Infrastructure,DC=DomainDnsZones," + domain_dn
+ self.forestdns_dn = "CN=Infrastructure,DC=ForestDnsZones," + forest_dn
+
+ m = ldb.Message()
+ if role == "domaindns":
+ m.dn = ldb.Dn(samdb, self.domaindns_dn)
+ elif role == "forestdns":
+ m.dn = ldb.Dn(samdb, self.forestdns_dn)
+ else:
+ raise CommandError("Invalid FSMO role.")
+ # first try to transfer to avoid problem if the owner is still active
+ seize = False
+ master_owner = get_fsmo_roleowner(samdb, m.dn, role)
+ if master_owner is not None:
+ # if there is a different owner
+ if master_owner != serviceName:
+ # if --force isn't given, attempt transfer
+ if force is None:
+ self.message("Attempting transfer...")
+ try:
+ transfer_dns_role(self.outf, sambaopts, credopts, role,
+ samdb)
+ except:
+ # transfer failed, use the big axe...
+ seize = True
+ self.message("Transfer unsuccessful, seizing...")
+ else:
+ self.message("Transfer successful, not seizing role\n")
+ return True
+ else:
+ self.outf.write("This DC already has the '%s' FSMO role\n" %
+ role)
+ return False
+ else:
+ seize = True
+
+ if force is not None or seize:
+ self.message("Seizing %s FSMO role..." % role)
+ m["fSMORoleOwner"] = ldb.MessageElement(
+ serviceName, ldb.FLAG_MOD_REPLACE,
+ "fSMORoleOwner")
+ try:
+ samdb.modify(m)
+ except LdbError as e2:
+ (num, msg) = e2.args
+ raise CommandError("Failed to seize '%s' role: %s" %
+ (role, msg))
+ self.outf.write("FSMO seize of '%s' role successful\n" % role)
+ return True
+
+ def run(self, force=None, H=None, role=None,
+ credopts=None, sambaopts=None, versionopts=None):
+
+ lp = sambaopts.get_loadparm()
+ creds = credopts.get_credentials(lp, fallback_machine=True)
+
+ samdb = SamDB(url=H, session_info=system_session(),
+ credentials=creds, lp=lp)
+
+ if role == "all":
+ self.seize_role("rid", samdb, force)
+ self.seize_role("pdc", samdb, force)
+ self.seize_role("naming", samdb, force)
+ self.seize_role("infrastructure", samdb, force)
+ self.seize_role("schema", samdb, force)
+ self.seize_dns_role("domaindns", samdb, credopts, sambaopts,
+ versionopts, force)
+ self.seize_dns_role("forestdns", samdb, credopts, sambaopts,
+ versionopts, force)
+ else:
+ if role == "domaindns" or role == "forestdns":
+ self.seize_dns_role(role, samdb, credopts, sambaopts,
+ versionopts, force)
+ else:
+ self.seize_role(role, samdb, force)
+
+
+class cmd_fsmo_show(Command):
+ """Show the roles."""
+
+ synopsis = "%prog [options]"
+
+ takes_optiongroups = {
+ "sambaopts": options.SambaOptions,
+ "credopts": options.CredentialsOptions,
+ "versionopts": options.VersionOptions,
+ }
+
+ takes_options = [
+ Option("-H", "--URL", help="LDB URL for database or target server",
+ type=str, metavar="URL", dest="H"),
+ ]
+
+ takes_args = []
+
+ def run(self, H=None, credopts=None, sambaopts=None, versionopts=None):
+ lp = sambaopts.get_loadparm()
+ creds = credopts.get_credentials(lp, fallback_machine=True)
+
+ samdb = SamDB(url=H, session_info=system_session(),
+ credentials=creds, lp=lp)
+
+ domain_dn = samdb.domain_dn()
+ forest_dn = samba.dn_from_dns_name(samdb.forest_dns_name())
+ infrastructure_dn = "CN=Infrastructure," + domain_dn
+ naming_dn = "CN=Partitions,%s" % samdb.get_config_basedn()
+ schema_dn = samdb.get_schema_basedn()
+ rid_dn = "CN=RID Manager$,CN=System," + domain_dn
+ domaindns_dn = "CN=Infrastructure,DC=DomainDnsZones," + domain_dn
+ forestdns_dn = "CN=Infrastructure,DC=ForestDnsZones," + forest_dn
+
+ masters = [(schema_dn, "schema", "SchemaMasterRole"),
+ (infrastructure_dn, "infrastructure", "InfrastructureMasterRole"),
+ (rid_dn, "rid", "RidAllocationMasterRole"),
+ (domain_dn, "pdc", "PdcEmulationMasterRole"),
+ (naming_dn, "naming", "DomainNamingMasterRole"),
+ (domaindns_dn, "domaindns", "DomainDnsZonesMasterRole"),
+ (forestdns_dn, "forestdns", "ForestDnsZonesMasterRole"),
+ ]
+
+ for master in masters:
+ (dn, short_name, long_name) = master
+ try:
+ master = get_fsmo_roleowner(samdb, dn, short_name)
+ if master is not None:
+ self.message("%s owner: %s" % (long_name, str(master)))
+ else:
+ self.message("%s has no current owner" % (long_name))
+ except CommandError as e:
+ self.message("%s: * %s" % (long_name, e.message))
+
+
+class cmd_fsmo_transfer(Command):
+ """Transfer the role."""
+
+ synopsis = "%prog [options]"
+
+ takes_optiongroups = {
+ "sambaopts": options.SambaOptions,
+ "credopts": options.CredentialsOptions,
+ "versionopts": options.VersionOptions,
+ }
+
+ takes_options = [
+ Option("-H", "--URL", help="LDB URL for database or target server",
+ type=str, metavar="URL", dest="H"),
+ Option("--role", type="choice", choices=["rid", "pdc", "infrastructure",
+ "schema", "naming", "domaindns", "forestdns", "all"],
+ help="""The FSMO role to seize or transfer.\n
+rid=RidAllocationMasterRole\n
+schema=SchemaMasterRole\n
+pdc=PdcEmulationMasterRole\n
+naming=DomainNamingMasterRole\n
+infrastructure=InfrastructureMasterRole\n
+domaindns=DomainDnsZonesMasterRole\n
+forestdns=ForestDnsZonesMasterRole\n
+all=all of the above\n
+You must provide an Admin user and password."""),
+ ]
+
+ takes_args = []
+
+ def run(self, force=None, H=None, role=None,
+ credopts=None, sambaopts=None, versionopts=None):
+
+ lp = sambaopts.get_loadparm()
+ creds = credopts.get_credentials(lp, fallback_machine=True)
+
+ samdb = SamDB(url=H, session_info=system_session(),
+ credentials=creds, lp=lp)
+
+ if role == "all":
+ transfer_role(self.outf, "rid", samdb)
+ transfer_role(self.outf, "pdc", samdb)
+ transfer_role(self.outf, "naming", samdb)
+ transfer_role(self.outf, "infrastructure", samdb)
+ transfer_role(self.outf, "schema", samdb)
+ transfer_dns_role(self.outf, sambaopts, credopts,
+ "domaindns", samdb)
+ transfer_dns_role(self.outf, sambaopts, credopts, "forestdns",
+ samdb)
+ else:
+ if role == "domaindns" or role == "forestdns":
+ transfer_dns_role(self.outf, sambaopts, credopts, role, samdb)
+ else:
+ transfer_role(self.outf, role, samdb)
+
+
+class cmd_fsmo(SuperCommand):
+ """Flexible Single Master Operations (FSMO) roles management."""
+
+ subcommands = {}
+ subcommands["seize"] = cmd_fsmo_seize()
+ subcommands["show"] = cmd_fsmo_show()
+ subcommands["transfer"] = cmd_fsmo_transfer()