diff options
Diffstat (limited to 'python/samba/netcmd/fsmo.py')
-rw-r--r-- | python/samba/netcmd/fsmo.py | 535 |
1 files changed, 535 insertions, 0 deletions
diff --git a/python/samba/netcmd/fsmo.py b/python/samba/netcmd/fsmo.py new file mode 100644 index 0000000..643d0ae --- /dev/null +++ b/python/samba/netcmd/fsmo.py @@ -0,0 +1,535 @@ +# Changes a FSMO role owner +# +# Copyright Nadezhda Ivanova 2009 +# Copyright Jelmer Vernooij 2009 +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; either version 3 of the License, or +# (at your option) any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program. If not, see <http://www.gnu.org/licenses/>. +# + +import samba +import samba.getopt as options +import ldb +from ldb import LdbError +from samba.dcerpc import drsuapi, misc +from samba.auth import system_session +import samba.drs_utils +from samba.netcmd import ( + Command, + CommandError, + SuperCommand, + Option, +) +from samba.samdb import SamDB + + +def get_fsmo_roleowner(samdb, roledn, role): + """Gets the owner of an FSMO role + + :param roledn: The DN of the FSMO role + :param role: The FSMO role + """ + try: + res = samdb.search(roledn, + scope=ldb.SCOPE_BASE, attrs=["fSMORoleOwner"]) + except LdbError as e7: + (num, msg) = e7.args + if num == ldb.ERR_NO_SUCH_OBJECT: + raise CommandError("The '%s' role is not present in this domain" % role) + raise + + if 'fSMORoleOwner' in res[0]: + master_owner = (ldb.Dn(samdb, res[0]["fSMORoleOwner"][0].decode('utf8'))) + else: + master_owner = None + + return master_owner + + +def transfer_dns_role(outf, sambaopts, credopts, role, samdb): + """Transfer dns FSMO role. """ + + if role == "domaindns": + domain_dn = samdb.domain_dn() + role_object = "CN=Infrastructure,DC=DomainDnsZones," + domain_dn + elif role == "forestdns": + forest_dn = samba.dn_from_dns_name(samdb.forest_dns_name()) + role_object = "CN=Infrastructure,DC=ForestDnsZones," + forest_dn + + new_host_dns_name = samdb.host_dns_name() + + res = samdb.search(role_object, + attrs=["fSMORoleOwner"], + scope=ldb.SCOPE_BASE, + controls=["extended_dn:1:1"]) + + if 'fSMORoleOwner' in res[0]: + try: + master_guid = str(misc.GUID(ldb.Dn(samdb, + res[0]['fSMORoleOwner'][0].decode('utf8')) + .get_extended_component('GUID'))) + master_owner = str(ldb.Dn(samdb, res[0]['fSMORoleOwner'][0].decode('utf8'))) + except LdbError as e3: + (num, msg) = e3.args + raise CommandError("No GUID found in naming master DN %s : %s \n" % + (res[0]['fSMORoleOwner'][0], msg)) + else: + outf.write("* The '%s' role does not have an FSMO roleowner\n" % role) + return False + + if role == "domaindns": + master_dns_name = '%s._msdcs.%s' % (master_guid, + samdb.domain_dns_name()) + new_dns_name = '%s._msdcs.%s' % (samdb.get_ntds_GUID(), + samdb.domain_dns_name()) + elif role == "forestdns": + master_dns_name = '%s._msdcs.%s' % (master_guid, + samdb.forest_dns_name()) + new_dns_name = '%s._msdcs.%s' % (samdb.get_ntds_GUID(), + samdb.forest_dns_name()) + + new_owner = samdb.get_dsServiceName() + + if master_dns_name != new_dns_name: + lp = sambaopts.get_loadparm() + creds = credopts.get_credentials(lp, fallback_machine=True) + samdb = SamDB(url="ldap://%s" % (master_dns_name), + session_info=system_session(), + credentials=creds, lp=lp) + + m = ldb.Message() + m.dn = ldb.Dn(samdb, role_object) + m["fSMORoleOwner_Del"] = ldb.MessageElement(master_owner, + ldb.FLAG_MOD_DELETE, + "fSMORoleOwner") + m["fSMORoleOwner_Add"] = ldb.MessageElement(new_owner, + ldb.FLAG_MOD_ADD, + "fSMORoleOwner") + try: + samdb.modify(m) + except LdbError as e5: + (num, msg) = e5.args + raise CommandError("Failed to add role '%s': %s" % (role, msg)) + + try: + connection = samba.drs_utils.drsuapi_connect(new_host_dns_name, + lp, creds) + except samba.drs_utils.drsException as e: + raise CommandError("Drsuapi Connect failed", e) + + try: + drsuapi_connection = connection[0] + drsuapi_handle = connection[1] + req_options = drsuapi.DRSUAPI_DRS_WRIT_REP + NC = role_object[18:] + samba.drs_utils.sendDsReplicaSync(drsuapi_connection, + drsuapi_handle, + master_guid, + NC, req_options) + except samba.drs_utils.drsException as estr: + raise CommandError("Replication failed", estr) + + outf.write("FSMO transfer of '%s' role successful\n" % role) + return True + else: + outf.write("This DC already has the '%s' FSMO role\n" % role) + return False + + +def transfer_role(outf, role, samdb): + """Transfer standard FSMO role. """ + + domain_dn = samdb.domain_dn() + rid_dn = "CN=RID Manager$,CN=System," + domain_dn + naming_dn = "CN=Partitions,%s" % samdb.get_config_basedn() + infrastructure_dn = "CN=Infrastructure," + domain_dn + schema_dn = str(samdb.get_schema_basedn()) + new_owner = ldb.Dn(samdb, samdb.get_dsServiceName()) + m = ldb.Message() + m.dn = ldb.Dn(samdb, "") + if role == "rid": + master_owner = get_fsmo_roleowner(samdb, rid_dn, role) + m["becomeRidMaster"] = ldb.MessageElement( + "1", ldb.FLAG_MOD_REPLACE, + "becomeRidMaster") + elif role == "pdc": + master_owner = get_fsmo_roleowner(samdb, domain_dn, role) + + res = samdb.search(domain_dn, + scope=ldb.SCOPE_BASE, attrs=["objectSid"]) + assert len(res) == 1 + sid = res[0]["objectSid"][0] + m["becomePdc"] = ldb.MessageElement( + sid, ldb.FLAG_MOD_REPLACE, + "becomePdc") + elif role == "naming": + master_owner = get_fsmo_roleowner(samdb, naming_dn, role) + m["becomeDomainMaster"] = ldb.MessageElement( + "1", ldb.FLAG_MOD_REPLACE, + "becomeDomainMaster") + elif role == "infrastructure": + master_owner = get_fsmo_roleowner(samdb, infrastructure_dn, role) + m["becomeInfrastructureMaster"] = ldb.MessageElement( + "1", ldb.FLAG_MOD_REPLACE, + "becomeInfrastructureMaster") + elif role == "schema": + master_owner = get_fsmo_roleowner(samdb, schema_dn, role) + m["becomeSchemaMaster"] = ldb.MessageElement( + "1", ldb.FLAG_MOD_REPLACE, + "becomeSchemaMaster") + else: + raise CommandError("Invalid FSMO role.") + + if master_owner is None: + outf.write("Cannot transfer, no DC assigned to the %s role. Try 'seize' instead\n" % role) + return False + + if master_owner != new_owner: + try: + samdb.modify(m) + except LdbError as e6: + (num, msg) = e6.args + raise CommandError("Transfer of '%s' role failed: %s" % + (role, msg)) + + outf.write("FSMO transfer of '%s' role successful\n" % role) + return True + else: + outf.write("This DC already has the '%s' FSMO role\n" % role) + return False + + +class cmd_fsmo_seize(Command): + """Seize the role.""" + + synopsis = "%prog [options]" + + takes_optiongroups = { + "sambaopts": options.SambaOptions, + "credopts": options.CredentialsOptions, + "versionopts": options.VersionOptions, + } + + takes_options = [ + Option("-H", "--URL", help="LDB URL for database or target server", + type=str, metavar="URL", dest="H"), + Option("--force", + help="Force seizing of role without attempting to transfer.", + action="store_true"), + Option("--role", type="choice", choices=["rid", "pdc", "infrastructure", + "schema", "naming", "domaindns", "forestdns", "all"], + help="""The FSMO role to seize or transfer.\n +rid=RidAllocationMasterRole\n +schema=SchemaMasterRole\n +pdc=PdcEmulationMasterRole\n +naming=DomainNamingMasterRole\n +infrastructure=InfrastructureMasterRole\n +domaindns=DomainDnsZonesMasterRole\n +forestdns=ForestDnsZonesMasterRole\n +all=all of the above\n +You must provide an Admin user and password."""), + ] + + takes_args = [] + + def seize_role(self, role, samdb, force): + """Seize standard fsmo role. """ + + serviceName = samdb.get_dsServiceName() + domain_dn = samdb.domain_dn() + self.infrastructure_dn = "CN=Infrastructure," + domain_dn + self.naming_dn = "CN=Partitions,%s" % samdb.get_config_basedn() + self.schema_dn = str(samdb.get_schema_basedn()) + self.rid_dn = "CN=RID Manager$,CN=System," + domain_dn + + m = ldb.Message() + if role == "rid": + m.dn = ldb.Dn(samdb, self.rid_dn) + elif role == "pdc": + m.dn = ldb.Dn(samdb, domain_dn) + elif role == "naming": + m.dn = ldb.Dn(samdb, self.naming_dn) + elif role == "infrastructure": + m.dn = ldb.Dn(samdb, self.infrastructure_dn) + elif role == "schema": + m.dn = ldb.Dn(samdb, self.schema_dn) + else: + raise CommandError("Invalid FSMO role.") + # first try to transfer to avoid problem if the owner is still active + seize = False + master_owner = get_fsmo_roleowner(samdb, m.dn, role) + # if there is a different owner + if master_owner is not None: + # if there is a different owner + if master_owner != serviceName: + # if --force isn't given, attempt transfer + if force is None: + self.message("Attempting transfer...") + try: + transfer_role(self.outf, role, samdb) + except: + # transfer failed, use the big axe... + seize = True + self.message("Transfer unsuccessful, seizing...") + else: + self.message("Transfer successful, not seizing role") + return True + else: + self.outf.write("This DC already has the '%s' FSMO role\n" % + role) + return False + else: + seize = True + + if force is not None or seize: + self.message("Seizing %s FSMO role..." % role) + m["fSMORoleOwner"] = ldb.MessageElement( + serviceName, ldb.FLAG_MOD_REPLACE, + "fSMORoleOwner") + + samdb.transaction_start() + try: + samdb.modify(m) + if role == "rid": + # We may need to allocate the initial RID Set + samdb.create_own_rid_set() + + except LdbError as e1: + (num, msg) = e1.args + if role == "rid" and num == ldb.ERR_ENTRY_ALREADY_EXISTS: + + # Try again without the RID Set allocation + # (normal). We have to manage the transaction as + # we do not have nested transactions and creating + # a RID set touches multiple objects. :-( + samdb.transaction_cancel() + samdb.transaction_start() + try: + samdb.modify(m) + except LdbError as e: + (num, msg) = e.args + samdb.transaction_cancel() + raise CommandError("Failed to seize '%s' role: %s" % + (role, msg)) + + else: + samdb.transaction_cancel() + raise CommandError("Failed to seize '%s' role: %s" % + (role, msg)) + samdb.transaction_commit() + self.outf.write("FSMO seize of '%s' role successful\n" % role) + + return True + + def seize_dns_role(self, role, samdb, credopts, sambaopts, + versionopts, force): + """Seize DNS FSMO role. """ + + serviceName = samdb.get_dsServiceName() + domain_dn = samdb.domain_dn() + forest_dn = samba.dn_from_dns_name(samdb.forest_dns_name()) + self.domaindns_dn = "CN=Infrastructure,DC=DomainDnsZones," + domain_dn + self.forestdns_dn = "CN=Infrastructure,DC=ForestDnsZones," + forest_dn + + m = ldb.Message() + if role == "domaindns": + m.dn = ldb.Dn(samdb, self.domaindns_dn) + elif role == "forestdns": + m.dn = ldb.Dn(samdb, self.forestdns_dn) + else: + raise CommandError("Invalid FSMO role.") + # first try to transfer to avoid problem if the owner is still active + seize = False + master_owner = get_fsmo_roleowner(samdb, m.dn, role) + if master_owner is not None: + # if there is a different owner + if master_owner != serviceName: + # if --force isn't given, attempt transfer + if force is None: + self.message("Attempting transfer...") + try: + transfer_dns_role(self.outf, sambaopts, credopts, role, + samdb) + except: + # transfer failed, use the big axe... + seize = True + self.message("Transfer unsuccessful, seizing...") + else: + self.message("Transfer successful, not seizing role\n") + return True + else: + self.outf.write("This DC already has the '%s' FSMO role\n" % + role) + return False + else: + seize = True + + if force is not None or seize: + self.message("Seizing %s FSMO role..." % role) + m["fSMORoleOwner"] = ldb.MessageElement( + serviceName, ldb.FLAG_MOD_REPLACE, + "fSMORoleOwner") + try: + samdb.modify(m) + except LdbError as e2: + (num, msg) = e2.args + raise CommandError("Failed to seize '%s' role: %s" % + (role, msg)) + self.outf.write("FSMO seize of '%s' role successful\n" % role) + return True + + def run(self, force=None, H=None, role=None, + credopts=None, sambaopts=None, versionopts=None): + + lp = sambaopts.get_loadparm() + creds = credopts.get_credentials(lp, fallback_machine=True) + + samdb = SamDB(url=H, session_info=system_session(), + credentials=creds, lp=lp) + + if role == "all": + self.seize_role("rid", samdb, force) + self.seize_role("pdc", samdb, force) + self.seize_role("naming", samdb, force) + self.seize_role("infrastructure", samdb, force) + self.seize_role("schema", samdb, force) + self.seize_dns_role("domaindns", samdb, credopts, sambaopts, + versionopts, force) + self.seize_dns_role("forestdns", samdb, credopts, sambaopts, + versionopts, force) + else: + if role == "domaindns" or role == "forestdns": + self.seize_dns_role(role, samdb, credopts, sambaopts, + versionopts, force) + else: + self.seize_role(role, samdb, force) + + +class cmd_fsmo_show(Command): + """Show the roles.""" + + synopsis = "%prog [options]" + + takes_optiongroups = { + "sambaopts": options.SambaOptions, + "credopts": options.CredentialsOptions, + "versionopts": options.VersionOptions, + } + + takes_options = [ + Option("-H", "--URL", help="LDB URL for database or target server", + type=str, metavar="URL", dest="H"), + ] + + takes_args = [] + + def run(self, H=None, credopts=None, sambaopts=None, versionopts=None): + lp = sambaopts.get_loadparm() + creds = credopts.get_credentials(lp, fallback_machine=True) + + samdb = SamDB(url=H, session_info=system_session(), + credentials=creds, lp=lp) + + domain_dn = samdb.domain_dn() + forest_dn = samba.dn_from_dns_name(samdb.forest_dns_name()) + infrastructure_dn = "CN=Infrastructure," + domain_dn + naming_dn = "CN=Partitions,%s" % samdb.get_config_basedn() + schema_dn = samdb.get_schema_basedn() + rid_dn = "CN=RID Manager$,CN=System," + domain_dn + domaindns_dn = "CN=Infrastructure,DC=DomainDnsZones," + domain_dn + forestdns_dn = "CN=Infrastructure,DC=ForestDnsZones," + forest_dn + + masters = [(schema_dn, "schema", "SchemaMasterRole"), + (infrastructure_dn, "infrastructure", "InfrastructureMasterRole"), + (rid_dn, "rid", "RidAllocationMasterRole"), + (domain_dn, "pdc", "PdcEmulationMasterRole"), + (naming_dn, "naming", "DomainNamingMasterRole"), + (domaindns_dn, "domaindns", "DomainDnsZonesMasterRole"), + (forestdns_dn, "forestdns", "ForestDnsZonesMasterRole"), + ] + + for master in masters: + (dn, short_name, long_name) = master + try: + master = get_fsmo_roleowner(samdb, dn, short_name) + if master is not None: + self.message("%s owner: %s" % (long_name, str(master))) + else: + self.message("%s has no current owner" % (long_name)) + except CommandError as e: + self.message("%s: * %s" % (long_name, e.message)) + + +class cmd_fsmo_transfer(Command): + """Transfer the role.""" + + synopsis = "%prog [options]" + + takes_optiongroups = { + "sambaopts": options.SambaOptions, + "credopts": options.CredentialsOptions, + "versionopts": options.VersionOptions, + } + + takes_options = [ + Option("-H", "--URL", help="LDB URL for database or target server", + type=str, metavar="URL", dest="H"), + Option("--role", type="choice", choices=["rid", "pdc", "infrastructure", + "schema", "naming", "domaindns", "forestdns", "all"], + help="""The FSMO role to seize or transfer.\n +rid=RidAllocationMasterRole\n +schema=SchemaMasterRole\n +pdc=PdcEmulationMasterRole\n +naming=DomainNamingMasterRole\n +infrastructure=InfrastructureMasterRole\n +domaindns=DomainDnsZonesMasterRole\n +forestdns=ForestDnsZonesMasterRole\n +all=all of the above\n +You must provide an Admin user and password."""), + ] + + takes_args = [] + + def run(self, force=None, H=None, role=None, + credopts=None, sambaopts=None, versionopts=None): + + lp = sambaopts.get_loadparm() + creds = credopts.get_credentials(lp, fallback_machine=True) + + samdb = SamDB(url=H, session_info=system_session(), + credentials=creds, lp=lp) + + if role == "all": + transfer_role(self.outf, "rid", samdb) + transfer_role(self.outf, "pdc", samdb) + transfer_role(self.outf, "naming", samdb) + transfer_role(self.outf, "infrastructure", samdb) + transfer_role(self.outf, "schema", samdb) + transfer_dns_role(self.outf, sambaopts, credopts, + "domaindns", samdb) + transfer_dns_role(self.outf, sambaopts, credopts, "forestdns", + samdb) + else: + if role == "domaindns" or role == "forestdns": + transfer_dns_role(self.outf, sambaopts, credopts, role, samdb) + else: + transfer_role(self.outf, role, samdb) + + +class cmd_fsmo(SuperCommand): + """Flexible Single Master Operations (FSMO) roles management.""" + + subcommands = {} + subcommands["seize"] = cmd_fsmo_seize() + subcommands["show"] = cmd_fsmo_show() + subcommands["transfer"] = cmd_fsmo_transfer() |