1
0
mirror of https://github.com/samba-team/samba.git synced 2025-07-23 20:59:10 +03:00

s4-net: Convert machinepw command to python.

This commit is contained in:
Jelmer Vernooij
2010-04-08 23:58:15 +02:00
parent f83aa13f62
commit 9af8d02b22
7 changed files with 115 additions and 156 deletions

View File

@ -155,3 +155,5 @@ from samba.netcmd.user import cmd_user
commands["user"] = cmd_user()
from samba.netcmd.vampire import cmd_vampire
commands["vampire"] = cmd_vampire()
from samba.netcmd.machinepw import cmd_machinepw
commands["machinepw"] = cmd_machinepw()

View File

@ -0,0 +1,59 @@
#!/usr/bin/python
#
# joins
#
# Copyright Jelmer Vernooij 2010
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
#
import samba.getopt as options
from samba.net import Net, LIBNET_JOIN_AUTOMATIC
from samba.netcmd import Command, CommandError
from samba.dcerpc.netr import SEC_CHAN_WKSTA, SEC_CHAN_BDC
class cmd_join(Command):
"""Joins domain as either member or backup domain controller."""
synopsis = "%prog join <domain> [BDC | MEMBER] [options]"
takes_optiongroups = {
"sambaopts": options.SambaOptions,
"versionopts": options.VersionOptions,
"credopts": options.CredentialsOptions,
}
takes_args = ["domain", "role?"]
def run(self, domain, role=None, sambaopts=None, credopts=None,
versionopts=None):
lp = sambaopts.get_loadparm()
creds = credopts.get_credentials(lp)
net = Net(creds, lp)
if role is None:
secure_channel_type = SEC_CHAN_WKSTA
elif role == "BDC":
secure_channel_type = SEC_CHAN_BDC
elif role == "MEMBER":
secure_channel_type = SEC_CHAN_WKSTA
else:
raise CommandError("Invalid role %s (possible values: MEMBER, BDC)" % role)
(join_password, sid, domain_name) = net.join(domain,
lp.get("netbios name"), SEC_CHAN_WKSTA, LIBNET_JOIN_AUTOMATIC)
self.outf.write("Joined domain %s (%s)\n" % (domain_name, sid))

View File

@ -0,0 +1,53 @@
#!/usr/bin/python
#
# Machine passwords
# Copyright Jelmer Vernooij 2010
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
#
import samba.getopt as options
from samba import Ldb
from samba.auth import system_session
from samba.netcmd import Command, CommandError
class cmd_machinepw(Command):
"""Get a machine password out of our SAM."""
synopsis = "%prog machinepw <accountname>"
takes_optiongroups = {
"sambaopts": options.SambaOptions,
"versionopts": options.VersionOptions,
"credopts": options.CredentialsOptions,
}
takes_args = ["secret"]
def run(self, secret, sambaopts=None, credopts=None, versionopts=None):
lp = sambaopts.get_loadparm()
creds = credopts.get_credentials(lp)
url = lp.get("secrets database")
secretsdb = Ldb(url=url, session_info=system_session(),
credentials=creds, lp=lp)
result = secretsdb.search(attrs=["secret"],
expression="(&(objectclass=primaryDomain)(samaccountname=%s))" % secret)
if len(result) != 1:
raise CommandError("search returned %d records, expected 1" % len(result))
self.outf.write("%s\n" % result[0]["secret"])

View File

@ -50,66 +50,3 @@ class cmd_vampire(Command):
net = Net(creds, lp)
(domain_name, domain_sid) = net.vampire(domain=domain, target_dir=target_dir)
self.outf.write("Vampired domain %s (%s)\n" % (domain_name, domain_sid))
class cmd_samdump_keytab(Command):
"""Dumps kerberos keys of a domain into a keytab."""
synopsis = "%prog samdump keytab [options] <keytab>"
takes_optiongroups = {
"sambaopts": options.SambaOptions,
"credopts": options.CredentialsOptions,
"versionopts": options.VersionOptions,
}
takes_args = ["keytab"]
def run(self, keytab, credopts=None, sambaopts=None, versionopts=None):
lp = sambaopts.get_loadparm()
creds = credopts.get_credentials(lp)
net = Net(creds, lp)
net.samdump_keytab(keytab)
class cmd_samsync_ldb(Command):
"""Synchronise into the local ldb the SAM of a domain."""
synopsis = "%prog samsync"
takes_optiongroups = {
"sambaopts": options.SambaOptions,
"credopts": options.CredentialsOptions,
"versionopts": options.VersionOptions,
}
def run(self, credopts=None, sambaopts=None, versionopts=None):
lp = sambaopts.get_loadparm()
creds = credopts.get_credentials(lp)
net = Net(creds, lp)
net.samdump()
class cmd_samsync(SuperCommand):
commands = {
"ldb": cmd_samsync_ldb()
}
class cmd_samdump(Command):
"""Dump the sam database."""
synopsis = "%prog samdump"
takes_optiongroups = {
"sambaopts": options.SambaOptions,
"credopts": options.CredentialsOptions,
"versionopts": options.VersionOptions,
}
def run(self, credopts=None, sambaopts=None, versionopts=None):
lp = sambaopts.get_loadparm()
creds = credopts.get_credentials(lp)
net = Net(creds, lp)
net.samdump()