mirror of
https://github.com/samba-team/samba.git
synced 2024-12-27 03:21:53 +03:00
8c2c9794ec
Signed-off-by: Joe Guo <joeg@catalyst.net.nz> Reviewed-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz> Reviewed-by: Andrew Bartlett <abartlet@samba.org> Autobuild-User(master): Andrew Bartlett <abartlet@samba.org> Autobuild-Date(master): Thu Sep 6 15:50:17 CEST 2018 on sn-devel-144
543 lines
21 KiB
Python
543 lines
21 KiB
Python
# Changes a FSMO role owner
|
|
#
|
|
# Copyright Nadezhda Ivanova 2009
|
|
# Copyright Jelmer Vernooij 2009
|
|
#
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation; either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
#
|
|
|
|
import samba
|
|
import samba.getopt as options
|
|
import ldb
|
|
from ldb import LdbError
|
|
from samba.dcerpc import drsuapi, misc
|
|
from samba.auth import system_session
|
|
from samba.netcmd import (
|
|
Command,
|
|
CommandError,
|
|
SuperCommand,
|
|
Option,
|
|
)
|
|
from samba.samdb import SamDB
|
|
|
|
|
|
def get_fsmo_roleowner(samdb, roledn, role):
|
|
"""Gets the owner of an FSMO role
|
|
|
|
:param roledn: The DN of the FSMO role
|
|
:param role: The FSMO role
|
|
"""
|
|
try:
|
|
res = samdb.search(roledn,
|
|
scope=ldb.SCOPE_BASE, attrs=["fSMORoleOwner"])
|
|
except LdbError as e7:
|
|
(num, msg) = e7.args
|
|
if num == ldb.ERR_NO_SUCH_OBJECT:
|
|
raise CommandError("The '%s' role is not present in this domain" % role)
|
|
raise
|
|
|
|
if 'fSMORoleOwner' in res[0]:
|
|
master_owner = (ldb.Dn(samdb, res[0]["fSMORoleOwner"][0].decode('utf8')))
|
|
else:
|
|
master_owner = None
|
|
|
|
return master_owner
|
|
|
|
|
|
def transfer_dns_role(outf, sambaopts, credopts, role, samdb):
|
|
"""Transfer dns FSMO role. """
|
|
|
|
if role == "domaindns":
|
|
domain_dn = samdb.domain_dn()
|
|
role_object = "CN=Infrastructure,DC=DomainDnsZones," + domain_dn
|
|
elif role == "forestdns":
|
|
forest_dn = samba.dn_from_dns_name(samdb.forest_dns_name())
|
|
role_object = "CN=Infrastructure,DC=ForestDnsZones," + forest_dn
|
|
|
|
res = samdb.search(role_object,
|
|
attrs=["fSMORoleOwner"],
|
|
scope=ldb.SCOPE_BASE,
|
|
controls=["extended_dn:1:1"])
|
|
|
|
if 'fSMORoleOwner' in res[0]:
|
|
try:
|
|
master_guid = str(misc.GUID(ldb.Dn(samdb,
|
|
res[0]['fSMORoleOwner'][0].decode('utf8'))
|
|
.get_extended_component('GUID')))
|
|
master_owner = str(ldb.Dn(samdb, res[0]['fSMORoleOwner'][0].decode('utf8')))
|
|
except LdbError as e3:
|
|
(num, msg) = e3.args
|
|
raise CommandError("No GUID found in naming master DN %s : %s \n" %
|
|
(res[0]['fSMORoleOwner'][0], msg))
|
|
else:
|
|
outf.write("* The '%s' role does not have an FSMO roleowner\n" % role)
|
|
return False
|
|
|
|
if role == "domaindns":
|
|
master_dns_name = '%s._msdcs.%s' % (master_guid,
|
|
samdb.domain_dns_name())
|
|
new_dns_name = '%s._msdcs.%s' % (samdb.get_ntds_GUID(),
|
|
samdb.domain_dns_name())
|
|
elif role == "forestdns":
|
|
master_dns_name = '%s._msdcs.%s' % (master_guid,
|
|
samdb.forest_dns_name())
|
|
new_dns_name = '%s._msdcs.%s' % (samdb.get_ntds_GUID(),
|
|
samdb.forest_dns_name())
|
|
|
|
new_owner = samdb.get_dsServiceName()
|
|
|
|
if master_dns_name != new_dns_name:
|
|
lp = sambaopts.get_loadparm()
|
|
creds = credopts.get_credentials(lp, fallback_machine=True)
|
|
samdb = SamDB(url="ldap://%s" % (master_dns_name),
|
|
session_info=system_session(),
|
|
credentials=creds, lp=lp)
|
|
|
|
m = ldb.Message()
|
|
m.dn = ldb.Dn(samdb, role_object)
|
|
m["fSMORoleOwner"] = ldb.MessageElement(master_owner,
|
|
ldb.FLAG_MOD_DELETE,
|
|
"fSMORoleOwner")
|
|
|
|
try:
|
|
samdb.modify(m)
|
|
except LdbError as e4:
|
|
(num, msg) = e4.args
|
|
raise CommandError("Failed to delete role '%s': %s" %
|
|
(role, msg))
|
|
|
|
m = ldb.Message()
|
|
m.dn = ldb.Dn(samdb, role_object)
|
|
m["fSMORoleOwner"] = ldb.MessageElement(new_owner,
|
|
ldb.FLAG_MOD_ADD,
|
|
"fSMORoleOwner")
|
|
try:
|
|
samdb.modify(m)
|
|
except LdbError as e5:
|
|
(num, msg) = e5.args
|
|
raise CommandError("Failed to add role '%s': %s" % (role, msg))
|
|
|
|
try:
|
|
connection = samba.drs_utils.drsuapi_connect(samdb.host_dns_name(),
|
|
lp, creds)
|
|
except samba.drs_utils.drsException as e:
|
|
raise CommandError("Drsuapi Connect failed", e)
|
|
|
|
try:
|
|
drsuapi_connection = connection[0]
|
|
drsuapi_handle = connection[1]
|
|
req_options = drsuapi.DRSUAPI_DRS_WRIT_REP
|
|
NC = role_object[18:]
|
|
samba.drs_utils.sendDsReplicaSync(drsuapi_connection,
|
|
drsuapi_handle,
|
|
master_guid,
|
|
NC, req_options)
|
|
except samba.drs_utils.drsException as estr:
|
|
raise CommandError("Replication failed", estr)
|
|
|
|
outf.write("FSMO transfer of '%s' role successful\n" % role)
|
|
return True
|
|
else:
|
|
outf.write("This DC already has the '%s' FSMO role\n" % role)
|
|
return False
|
|
|
|
|
|
def transfer_role(outf, role, samdb):
|
|
"""Transfer standard FSMO role. """
|
|
|
|
domain_dn = samdb.domain_dn()
|
|
rid_dn = "CN=RID Manager$,CN=System," + domain_dn
|
|
naming_dn = "CN=Partitions,%s" % samdb.get_config_basedn()
|
|
infrastructure_dn = "CN=Infrastructure," + domain_dn
|
|
schema_dn = str(samdb.get_schema_basedn())
|
|
new_owner = ldb.Dn(samdb, samdb.get_dsServiceName())
|
|
m = ldb.Message()
|
|
m.dn = ldb.Dn(samdb, "")
|
|
if role == "rid":
|
|
master_owner = get_fsmo_roleowner(samdb, rid_dn, role)
|
|
m["becomeRidMaster"] = ldb.MessageElement(
|
|
"1", ldb.FLAG_MOD_REPLACE,
|
|
"becomeRidMaster")
|
|
elif role == "pdc":
|
|
master_owner = get_fsmo_roleowner(samdb, domain_dn, role)
|
|
|
|
res = samdb.search(domain_dn,
|
|
scope=ldb.SCOPE_BASE, attrs=["objectSid"])
|
|
assert len(res) == 1
|
|
sid = res[0]["objectSid"][0]
|
|
m["becomePdc"] = ldb.MessageElement(
|
|
sid, ldb.FLAG_MOD_REPLACE,
|
|
"becomePdc")
|
|
elif role == "naming":
|
|
master_owner = get_fsmo_roleowner(samdb, naming_dn, role)
|
|
m["becomeDomainMaster"] = ldb.MessageElement(
|
|
"1", ldb.FLAG_MOD_REPLACE,
|
|
"becomeDomainMaster")
|
|
elif role == "infrastructure":
|
|
master_owner = get_fsmo_roleowner(samdb, infrastructure_dn, role)
|
|
m["becomeInfrastructureMaster"] = ldb.MessageElement(
|
|
"1", ldb.FLAG_MOD_REPLACE,
|
|
"becomeInfrastructureMaster")
|
|
elif role == "schema":
|
|
master_owner = get_fsmo_roleowner(samdb, schema_dn, role)
|
|
m["becomeSchemaMaster"] = ldb.MessageElement(
|
|
"1", ldb.FLAG_MOD_REPLACE,
|
|
"becomeSchemaMaster")
|
|
else:
|
|
raise CommandError("Invalid FSMO role.")
|
|
|
|
if master_owner is None:
|
|
outf.write("Cannot transfer, no DC assigned to the %s role. Try 'seize' instead\n" % role)
|
|
return False
|
|
|
|
if master_owner != new_owner:
|
|
try:
|
|
samdb.modify(m)
|
|
except LdbError as e6:
|
|
(num, msg) = e6.args
|
|
raise CommandError("Transfer of '%s' role failed: %s" %
|
|
(role, msg))
|
|
|
|
outf.write("FSMO transfer of '%s' role successful\n" % role)
|
|
return True
|
|
else:
|
|
outf.write("This DC already has the '%s' FSMO role\n" % role)
|
|
return False
|
|
|
|
|
|
class cmd_fsmo_seize(Command):
|
|
"""Seize the role."""
|
|
|
|
synopsis = "%prog [options]"
|
|
|
|
takes_optiongroups = {
|
|
"sambaopts": options.SambaOptions,
|
|
"credopts": options.CredentialsOptions,
|
|
"versionopts": options.VersionOptions,
|
|
}
|
|
|
|
takes_options = [
|
|
Option("-H", "--URL", help="LDB URL for database or target server",
|
|
type=str, metavar="URL", dest="H"),
|
|
Option("--force",
|
|
help="Force seizing of role without attempting to transfer.",
|
|
action="store_true"),
|
|
Option("--role", type="choice", choices=["rid", "pdc", "infrastructure",
|
|
"schema", "naming", "domaindns", "forestdns", "all"],
|
|
help="""The FSMO role to seize or transfer.\n
|
|
rid=RidAllocationMasterRole\n
|
|
schema=SchemaMasterRole\n
|
|
pdc=PdcEmulationMasterRole\n
|
|
naming=DomainNamingMasterRole\n
|
|
infrastructure=InfrastructureMasterRole\n
|
|
domaindns=DomainDnsZonesMasterRole\n
|
|
forestdns=ForestDnsZonesMasterRole\n
|
|
all=all of the above\n
|
|
You must provide an Admin user and password."""),
|
|
]
|
|
|
|
takes_args = []
|
|
|
|
def seize_role(self, role, samdb, force):
|
|
"""Seize standard fsmo role. """
|
|
|
|
serviceName = samdb.get_dsServiceName()
|
|
domain_dn = samdb.domain_dn()
|
|
self.infrastructure_dn = "CN=Infrastructure," + domain_dn
|
|
self.naming_dn = "CN=Partitions,%s" % samdb.get_config_basedn()
|
|
self.schema_dn = str(samdb.get_schema_basedn())
|
|
self.rid_dn = "CN=RID Manager$,CN=System," + domain_dn
|
|
|
|
m = ldb.Message()
|
|
if role == "rid":
|
|
m.dn = ldb.Dn(samdb, self.rid_dn)
|
|
elif role == "pdc":
|
|
m.dn = ldb.Dn(samdb, domain_dn)
|
|
elif role == "naming":
|
|
m.dn = ldb.Dn(samdb, self.naming_dn)
|
|
elif role == "infrastructure":
|
|
m.dn = ldb.Dn(samdb, self.infrastructure_dn)
|
|
elif role == "schema":
|
|
m.dn = ldb.Dn(samdb, self.schema_dn)
|
|
else:
|
|
raise CommandError("Invalid FSMO role.")
|
|
# first try to transfer to avoid problem if the owner is still active
|
|
seize = False
|
|
master_owner = get_fsmo_roleowner(samdb, m.dn, role)
|
|
# if there is a different owner
|
|
if master_owner is not None:
|
|
# if there is a different owner
|
|
if master_owner != serviceName:
|
|
# if --force isn't given, attempt transfer
|
|
if force is None:
|
|
self.message("Attempting transfer...")
|
|
try:
|
|
transfer_role(self.outf, role, samdb)
|
|
except:
|
|
# transfer failed, use the big axe...
|
|
seize = True
|
|
self.message("Transfer unsuccessful, seizing...")
|
|
else:
|
|
self.message("Transfer successful, not seizing role")
|
|
return True
|
|
else:
|
|
self.outf.write("This DC already has the '%s' FSMO role\n" %
|
|
role)
|
|
return False
|
|
else:
|
|
seize = True
|
|
|
|
if force is not None or seize:
|
|
self.message("Seizing %s FSMO role..." % role)
|
|
m["fSMORoleOwner"] = ldb.MessageElement(
|
|
serviceName, ldb.FLAG_MOD_REPLACE,
|
|
"fSMORoleOwner")
|
|
|
|
samdb.transaction_start()
|
|
try:
|
|
samdb.modify(m)
|
|
if role == "rid":
|
|
# We may need to allocate the initial RID Set
|
|
samdb.create_own_rid_set()
|
|
|
|
except LdbError as e1:
|
|
(num, msg) = e1.args
|
|
if role == "rid" and num == ldb.ERR_ENTRY_ALREADY_EXISTS:
|
|
|
|
# Try again without the RID Set allocation
|
|
# (normal). We have to manage the transaction as
|
|
# we do not have nested transactions and creating
|
|
# a RID set touches multiple objects. :-(
|
|
samdb.transaction_cancel()
|
|
samdb.transaction_start()
|
|
try:
|
|
samdb.modify(m)
|
|
except LdbError as e:
|
|
(num, msg) = e.args
|
|
samdb.transaction_cancel()
|
|
raise CommandError("Failed to seize '%s' role: %s" %
|
|
(role, msg))
|
|
|
|
else:
|
|
samdb.transaction_cancel()
|
|
raise CommandError("Failed to seize '%s' role: %s" %
|
|
(role, msg))
|
|
samdb.transaction_commit()
|
|
self.outf.write("FSMO seize of '%s' role successful\n" % role)
|
|
|
|
return True
|
|
|
|
def seize_dns_role(self, role, samdb, credopts, sambaopts,
|
|
versionopts, force):
|
|
"""Seize DNS FSMO role. """
|
|
|
|
serviceName = samdb.get_dsServiceName()
|
|
domain_dn = samdb.domain_dn()
|
|
forest_dn = samba.dn_from_dns_name(samdb.forest_dns_name())
|
|
self.domaindns_dn = "CN=Infrastructure,DC=DomainDnsZones," + domain_dn
|
|
self.forestdns_dn = "CN=Infrastructure,DC=ForestDnsZones," + forest_dn
|
|
|
|
m = ldb.Message()
|
|
if role == "domaindns":
|
|
m.dn = ldb.Dn(samdb, self.domaindns_dn)
|
|
elif role == "forestdns":
|
|
m.dn = ldb.Dn(samdb, self.forestdns_dn)
|
|
else:
|
|
raise CommandError("Invalid FSMO role.")
|
|
# first try to transfer to avoid problem if the owner is still active
|
|
seize = False
|
|
master_owner = get_fsmo_roleowner(samdb, m.dn, role)
|
|
if master_owner is not None:
|
|
# if there is a different owner
|
|
if master_owner != serviceName:
|
|
# if --force isn't given, attempt transfer
|
|
if force is None:
|
|
self.message("Attempting transfer...")
|
|
try:
|
|
transfer_dns_role(self.outf, sambaopts, credopts, role,
|
|
samdb)
|
|
except:
|
|
# transfer failed, use the big axe...
|
|
seize = True
|
|
self.message("Transfer unsuccessful, seizing...")
|
|
else:
|
|
self.message("Transfer successful, not seizing role\n")
|
|
return True
|
|
else:
|
|
self.outf.write("This DC already has the '%s' FSMO role\n" %
|
|
role)
|
|
return False
|
|
else:
|
|
seize = True
|
|
|
|
if force is not None or seize:
|
|
self.message("Seizing %s FSMO role..." % role)
|
|
m["fSMORoleOwner"] = ldb.MessageElement(
|
|
serviceName, ldb.FLAG_MOD_REPLACE,
|
|
"fSMORoleOwner")
|
|
try:
|
|
samdb.modify(m)
|
|
except LdbError as e2:
|
|
(num, msg) = e2.args
|
|
raise CommandError("Failed to seize '%s' role: %s" %
|
|
(role, msg))
|
|
self.outf.write("FSMO seize of '%s' role successful\n" % role)
|
|
return True
|
|
|
|
def run(self, force=None, H=None, role=None,
|
|
credopts=None, sambaopts=None, versionopts=None):
|
|
|
|
lp = sambaopts.get_loadparm()
|
|
creds = credopts.get_credentials(lp, fallback_machine=True)
|
|
|
|
samdb = SamDB(url=H, session_info=system_session(),
|
|
credentials=creds, lp=lp)
|
|
|
|
if role == "all":
|
|
self.seize_role("rid", samdb, force)
|
|
self.seize_role("pdc", samdb, force)
|
|
self.seize_role("naming", samdb, force)
|
|
self.seize_role("infrastructure", samdb, force)
|
|
self.seize_role("schema", samdb, force)
|
|
self.seize_dns_role("domaindns", samdb, credopts, sambaopts,
|
|
versionopts, force)
|
|
self.seize_dns_role("forestdns", samdb, credopts, sambaopts,
|
|
versionopts, force)
|
|
else:
|
|
if role == "domaindns" or role == "forestdns":
|
|
self.seize_dns_role(role, samdb, credopts, sambaopts,
|
|
versionopts, force)
|
|
else:
|
|
self.seize_role(role, samdb, force)
|
|
|
|
|
|
class cmd_fsmo_show(Command):
|
|
"""Show the roles."""
|
|
|
|
synopsis = "%prog [options]"
|
|
|
|
takes_optiongroups = {
|
|
"sambaopts": options.SambaOptions,
|
|
"credopts": options.CredentialsOptions,
|
|
"versionopts": options.VersionOptions,
|
|
}
|
|
|
|
takes_options = [
|
|
Option("-H", "--URL", help="LDB URL for database or target server",
|
|
type=str, metavar="URL", dest="H"),
|
|
]
|
|
|
|
takes_args = []
|
|
|
|
def run(self, H=None, credopts=None, sambaopts=None, versionopts=None):
|
|
lp = sambaopts.get_loadparm()
|
|
creds = credopts.get_credentials(lp, fallback_machine=True)
|
|
|
|
samdb = SamDB(url=H, session_info=system_session(),
|
|
credentials=creds, lp=lp)
|
|
|
|
domain_dn = samdb.domain_dn()
|
|
forest_dn = samba.dn_from_dns_name(samdb.forest_dns_name())
|
|
infrastructure_dn = "CN=Infrastructure," + domain_dn
|
|
naming_dn = "CN=Partitions,%s" % samdb.get_config_basedn()
|
|
schema_dn = samdb.get_schema_basedn()
|
|
rid_dn = "CN=RID Manager$,CN=System," + domain_dn
|
|
domaindns_dn = "CN=Infrastructure,DC=DomainDnsZones," + domain_dn
|
|
forestdns_dn = "CN=Infrastructure,DC=ForestDnsZones," + forest_dn
|
|
|
|
masters = [(schema_dn, "schema", "SchemaMasterRole"),
|
|
(infrastructure_dn, "infrastructure", "InfrastructureMasterRole"),
|
|
(rid_dn, "rid", "RidAllocationMasterRole"),
|
|
(domain_dn, "pdc", "PdcEmulationMasterRole"),
|
|
(naming_dn, "naming", "DomainNamingMasterRole"),
|
|
(domaindns_dn, "domaindns", "DomainDnsZonesMasterRole"),
|
|
(forestdns_dn, "forestdns", "ForestDnsZonesMasterRole"),
|
|
]
|
|
|
|
for master in masters:
|
|
(dn, short_name, long_name) = master
|
|
try:
|
|
master = get_fsmo_roleowner(samdb, dn, short_name)
|
|
if master is not None:
|
|
self.message("%s owner: %s" % (long_name, str(master)))
|
|
else:
|
|
self.message("%s has no current owner" % (long_name))
|
|
except CommandError as e:
|
|
self.message("%s: * %s" % (long_name, e.message))
|
|
|
|
|
|
class cmd_fsmo_transfer(Command):
|
|
"""Transfer the role."""
|
|
|
|
synopsis = "%prog [options]"
|
|
|
|
takes_optiongroups = {
|
|
"sambaopts": options.SambaOptions,
|
|
"credopts": options.CredentialsOptions,
|
|
"versionopts": options.VersionOptions,
|
|
}
|
|
|
|
takes_options = [
|
|
Option("-H", "--URL", help="LDB URL for database or target server",
|
|
type=str, metavar="URL", dest="H"),
|
|
Option("--role", type="choice", choices=["rid", "pdc", "infrastructure",
|
|
"schema", "naming", "domaindns", "forestdns", "all"],
|
|
help="""The FSMO role to seize or transfer.\n
|
|
rid=RidAllocationMasterRole\n
|
|
schema=SchemaMasterRole\n
|
|
pdc=PdcEmulationMasterRole\n
|
|
naming=DomainNamingMasterRole\n
|
|
infrastructure=InfrastructureMasterRole\n
|
|
domaindns=DomainDnsZonesMasterRole\n
|
|
forestdns=ForestDnsZonesMasterRole\n
|
|
all=all of the above\n
|
|
You must provide an Admin user and password."""),
|
|
]
|
|
|
|
takes_args = []
|
|
|
|
def run(self, force=None, H=None, role=None,
|
|
credopts=None, sambaopts=None, versionopts=None):
|
|
|
|
lp = sambaopts.get_loadparm()
|
|
creds = credopts.get_credentials(lp, fallback_machine=True)
|
|
|
|
samdb = SamDB(url=H, session_info=system_session(),
|
|
credentials=creds, lp=lp)
|
|
|
|
if role == "all":
|
|
transfer_role(self.outf, "rid", samdb)
|
|
transfer_role(self.outf, "pdc", samdb)
|
|
transfer_role(self.outf, "naming", samdb)
|
|
transfer_role(self.outf, "infrastructure", samdb)
|
|
transfer_role(self.outf, "schema", samdb)
|
|
transfer_dns_role(self.outf, sambaopts, credopts,
|
|
"domaindns", samdb)
|
|
transfer_dns_role(self.outf, sambaopts, credopts, "forestdns",
|
|
samdb)
|
|
else:
|
|
if role == "domaindns" or role == "forestdns":
|
|
transfer_dns_role(self.outf, sambaopts, credopts, role, samdb)
|
|
else:
|
|
transfer_role(self.outf, role, samdb)
|
|
|
|
|
|
class cmd_fsmo(SuperCommand):
|
|
"""Flexible Single Master Operations (FSMO) roles management."""
|
|
|
|
subcommands = {}
|
|
subcommands["seize"] = cmd_fsmo_seize()
|
|
subcommands["show"] = cmd_fsmo_show()
|
|
subcommands["transfer"] = cmd_fsmo_transfer()
|