mirror of
https://github.com/samba-team/samba.git
synced 2024-12-23 17:34:34 +03:00
a19d5bd771
Samba default python is 3 now. Signed-off-by: Joe Guo <joeg@catalyst.net.nz> Reviewed-by: Noel Power <npower@samba.org>
193 lines
6.9 KiB
Python
Executable File
193 lines
6.9 KiB
Python
Executable File
#!/usr/bin/env python3
|
|
# vim: expandtab
|
|
#
|
|
# Copyright (C) Matthieu Patou <mat@matws.net> 2011
|
|
#
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation; either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
import optparse
|
|
import sys
|
|
# Allow to run from s4 source directory (without installing samba)
|
|
sys.path.insert(0, "bin/python")
|
|
|
|
import ldb
|
|
import samba
|
|
import samba.getopt as options
|
|
import os
|
|
|
|
from samba.credentials import DONT_USE_KERBEROS
|
|
from samba.auth import system_session
|
|
from samba import param
|
|
from samba.provision import find_provision_key_parameters, secretsdb_self_join
|
|
from samba.upgradehelpers import get_ldbs, get_paths
|
|
|
|
|
|
__docformat__ = "restructuredText"
|
|
|
|
parser = optparse.OptionParser("provision [options]")
|
|
sambaopts = options.SambaOptions(parser)
|
|
parser.add_option_group(sambaopts)
|
|
parser.add_option_group(options.VersionOptions(parser))
|
|
credopts = options.CredentialsOptions(parser)
|
|
parser.add_option_group(credopts)
|
|
parser.add_option("--oldname",
|
|
help="Old DC name")
|
|
parser.add_option("--newname",
|
|
help="New DC name")
|
|
|
|
opts = parser.parse_args()[0]
|
|
|
|
if len(sys.argv) == 1:
|
|
opts.interactive = True
|
|
lp = sambaopts.get_loadparm()
|
|
smbconf = lp.configfile
|
|
|
|
creds = credopts.get_credentials(lp)
|
|
creds.set_kerberos_state(DONT_USE_KERBEROS)
|
|
|
|
|
|
if __name__ == '__main__':
|
|
global defSDmodified
|
|
defSDmodified = False
|
|
# 1) First get files paths
|
|
paths = get_paths(param, smbconf=smbconf)
|
|
# Get ldbs with the system session, it is needed for searching
|
|
# provision parameters
|
|
session = system_session()
|
|
|
|
ldbs = get_ldbs(paths, creds, session, lp)
|
|
ldbs.sam.transaction_start()
|
|
ldbs.secrets.transaction_start()
|
|
|
|
if opts.oldname is None or opts.newname is None:
|
|
raise Exception("Option oldname or newname is missing")
|
|
res = ldbs.sam.search(expression="(&(name=%s)(serverReferenceBL=*))" % opts.oldname)
|
|
if len(res) != 1:
|
|
raise Exception("Wrong number of result returned (%d), are you sure of the old name %s" %
|
|
(len(res), opts.oldname))
|
|
|
|
# Ok got it then check that the new name is not used as well
|
|
res2 = ldbs.sam.search(expression="(&(name=%s)(objectclass=computer))" % opts.newname)
|
|
if len(res2) != 0:
|
|
raise Exception("Seems that %s is a name that already exists, pick another one" %
|
|
opts.newname)
|
|
|
|
names = find_provision_key_parameters(ldbs.sam, ldbs.secrets, ldbs.idmap,
|
|
paths, smbconf, lp)
|
|
|
|
# First rename the entry
|
|
# provision put the name in upper case so let's do it too !
|
|
newdn = ldb.Dn(ldbs.sam, str(res[0].dn))
|
|
newdn.set_component(0, "cn", opts.newname.upper())
|
|
ldbs.sam.rename(res[0].dn, newdn)
|
|
|
|
# Then change password and samaccountname and dnshostname
|
|
msg = ldb.Message(newdn)
|
|
machinepass = samba.generate_random_machine_password(128, 255)
|
|
mputf16 = machinepass.encode('utf-16-le')
|
|
|
|
account = "%s$" % opts.newname.upper()
|
|
msg["clearTextPassword"] = ldb.MessageElement(mputf16,
|
|
ldb.FLAG_MOD_REPLACE,
|
|
"clearTextPassword")
|
|
|
|
msg["sAMAccountName"] = ldb.MessageElement(account,
|
|
ldb.FLAG_MOD_REPLACE,
|
|
"sAMAccountName")
|
|
|
|
msg["dNSHostName"] = ldb.MessageElement("%s.%s" % (opts.newname,
|
|
names.dnsdomain),
|
|
ldb.FLAG_MOD_REPLACE,
|
|
"dNSHostName")
|
|
ldbs.sam.modify(msg)
|
|
|
|
# Do a self join one more time to resync the secrets file
|
|
res = ldbs.sam.search(base=newdn, scope=ldb.SCOPE_BASE,
|
|
attrs=["msDs-keyVersionNumber", "serverReferenceBL"])
|
|
assert(len(res) == 1)
|
|
kvno = int(str(res[0]["msDs-keyVersionNumber"]))
|
|
serverbldn = ldb.Dn(ldbs.sam, str(res[0]["serverReferenceBL"]))
|
|
|
|
secrets_msg = ldbs.secrets.search(expression="sAMAccountName=%s$" %
|
|
opts.oldname.upper(),
|
|
attrs=["secureChannelType"])
|
|
|
|
secChanType = int(secrets_msg[0]["secureChannelType"][0])
|
|
|
|
secretsdb_self_join(ldbs.secrets, domain=names.domain,
|
|
realm=names.realm,
|
|
domainsid=names.domainsid,
|
|
dnsdomain=names.dnsdomain,
|
|
netbiosname=opts.newname.upper(),
|
|
machinepass=machinepass,
|
|
key_version_number=kvno,
|
|
secure_channel_type=secChanType)
|
|
|
|
# Update RID set reference so we don't have to runtime fixup until the next dbcheck as there is no back link.
|
|
|
|
res = ldbs.sam.search(expression="(objectClass=rIDSet)", base=newdn, scope=ldb.SCOPE_ONELEVEL, attrs=[])
|
|
assert(len(res) == 1)
|
|
newridset = str(res[0].dn)
|
|
msg = ldb.Message(newdn)
|
|
|
|
msg["rIDSetReferences"] = ldb.MessageElement(newridset,
|
|
ldb.FLAG_MOD_REPLACE,
|
|
"rIDSetReferences")
|
|
ldbs.sam.modify(msg)
|
|
|
|
# Update the server's sites configuration
|
|
newserverrefdn = ldb.Dn(ldbs.sam, str(serverbldn))
|
|
newserverrefdn.set_component(0, "cn", opts.newname.upper())
|
|
|
|
ldbs.sam.rename(serverbldn, newserverrefdn)
|
|
|
|
msg = ldb.Message(newserverrefdn)
|
|
msg["dNSHostName"] = ldb.MessageElement("%s.%s" % (opts.newname,
|
|
names.dnsdomain),
|
|
ldb.FLAG_MOD_REPLACE,
|
|
"dNSHostName")
|
|
ldbs.sam.modify(msg)
|
|
|
|
try:
|
|
ldbs.sam.transaction_prepare_commit()
|
|
ldbs.secrets.transaction_prepare_commit()
|
|
except Exception:
|
|
ldbs.sam.rollback()
|
|
ldbs.secrets.rollback()
|
|
raise
|
|
|
|
try:
|
|
ldbs.sam.transaction_commit()
|
|
ldbs.secrets.transaction_commit()
|
|
except Exception:
|
|
ldbs.sam.rollback()
|
|
ldbs.secrets.rollback()
|
|
raise
|
|
|
|
# All good so far
|
|
#print lp.get("private dir")
|
|
cf = open(lp.configfile)
|
|
ncfname = "%s.new" % lp.configfile
|
|
newconf = open(ncfname, 'w')
|
|
for l in cf.readlines():
|
|
if l.find("netbios name") > 0:
|
|
newconf.write("\tnetbios name = %s\n" % opts.newname.upper())
|
|
else:
|
|
newconf.write(l)
|
|
newconf.close()
|
|
cf.close()
|
|
os.rename(ncfname, lp.configfile)
|
|
|