Univention Bugzilla – Attachment 7917 Details for
Bug 42079
"samba-tool fsmo show" fails if DomainDnsZones or ForestDnsZones does not exist
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
https://git.samba.org/?p=samba.git;a=blob;f=python/samba/netcmd/fsmo.py
python_samba_netcmd_fsmo.py (text/x-python), 19.24 KB, created by
Christina Scheinig
on 2016-08-22 09:13:02 CEST
(
hide
)
Description:
https://git.samba.org/?p=samba.git;a=blob;f=python/samba/netcmd/fsmo.py
Filename:
MIME Type:
Creator:
Christina Scheinig
Created:
2016-08-22 09:13:02 CEST
Size:
19.24 KB
patch
obsolete
># Changes a FSMO role owner ># ># Copyright Nadezhda Ivanova 2009 ># Copyright Jelmer Vernooij 2009 ># ># This program is free software; you can redistribute it and/or modify ># it under the terms of the GNU General Public License as published by ># the Free Software Foundation; either version 3 of the License, or ># (at your option) any later version. ># ># This program is distributed in the hope that it will be useful, ># but WITHOUT ANY WARRANTY; without even the implied warranty of ># MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the ># GNU General Public License for more details. ># ># You should have received a copy of the GNU General Public License ># along with this program. If not, see <http://www.gnu.org/licenses/>. ># > >import samba >import samba.getopt as options >import ldb >from ldb import LdbError >from samba.dcerpc import drsuapi, misc >from samba.auth import system_session >from samba.netcmd import ( > Command, > CommandError, > SuperCommand, > Option, > ) >from samba.samdb import SamDB > >def get_fsmo_roleowner(samdb, roledn, role): > """Gets the owner of an FSMO role > > :param roledn: The DN of the FSMO role > :param role: The FSMO role > """ > try: > res = samdb.search(roledn, > scope=ldb.SCOPE_BASE, attrs=["fSMORoleOwner"]) > except LdbError, (num, msg): > if num == ldb.ERR_NO_SUCH_OBJECT: > raise CommandError("The '%s' role is not present in this domain" % role) > raise > > if 'fSMORoleOwner' in res[0]: > master_owner = (ldb.Dn(samdb, res[0]["fSMORoleOwner"][0])) > else: > master_owner = None > > return master_owner > > >def transfer_dns_role(outf, sambaopts, credopts, role, samdb): > """Transfer dns FSMO role. """ > > if role == "domaindns": > domain_dn = samdb.domain_dn() > role_object = "CN=Infrastructure,DC=DomainDnsZones," + domain_dn > elif role == "forestdns": > forest_dn = samba.dn_from_dns_name(samdb.forest_dns_name()) > role_object = "CN=Infrastructure,DC=ForestDnsZones," + forest_dn > > res = samdb.search(role_object, > attrs=["fSMORoleOwner"], > scope=ldb.SCOPE_BASE, > controls=["extended_dn:1:1"]) > > if 'fSMORoleOwner' in res[0]: > try: > master_guid = str(misc.GUID(ldb.Dn(samdb, > res[0]['fSMORoleOwner'][0]) > .get_extended_component('GUID'))) > master_owner = str(ldb.Dn(samdb, res[0]['fSMORoleOwner'][0])) > except LdbError, (num, msg): > raise CommandError("No GUID found in naming master DN %s : %s \n" % > (res[0]['fSMORoleOwner'][0], msg)) > else: > outf.write("* The '%s' role does not have an FSMO roleowner\n" % role) > return False > > if role == "domaindns": > master_dns_name = '%s._msdcs.%s' % (master_guid, > samdb.domain_dns_name()) > new_dns_name = '%s._msdcs.%s' % (samdb.get_ntds_GUID(), > samdb.domain_dns_name()) > elif role == "forestdns": > master_dns_name = '%s._msdcs.%s' % (master_guid, > samdb.forest_dns_name()) > new_dns_name = '%s._msdcs.%s' % (samdb.get_ntds_GUID(), > samdb.forest_dns_name()) > > new_owner = samdb.get_dsServiceName() > > if master_dns_name != new_dns_name: > lp = sambaopts.get_loadparm() > creds = credopts.get_credentials(lp, fallback_machine=True) > samdb = SamDB(url="ldap://%s" % (master_dns_name), > session_info=system_session(), > credentials=creds, lp=lp) > > m = ldb.Message() > m.dn = ldb.Dn(samdb, role_object) > m["fSMORoleOwner"] = ldb.MessageElement(master_owner, > ldb.FLAG_MOD_DELETE, > "fSMORoleOwner") > > try: > samdb.modify(m) > except LdbError, (num, msg): > raise CommandError("Failed to delete role '%s': %s" % > (role, msg)) > > m = ldb.Message() > m.dn = ldb.Dn(samdb, role_object) > m["fSMORoleOwner"]= ldb.MessageElement(new_owner, > ldb.FLAG_MOD_ADD, > "fSMORoleOwner") > try: > samdb.modify(m) > except LdbError, (num, msg): > raise CommandError("Failed to add role '%s': %s" % (role, msg)) > > try: > connection = samba.drs_utils.drsuapi_connect(samdb.host_dns_name(), > lp, creds) > except samba.drs_utils.drsException, e: > raise CommandError("Drsuapi Connect failed", e) > > try: > drsuapi_connection = connection[0] > drsuapi_handle = connection[1] > req_options = drsuapi.DRSUAPI_DRS_WRIT_REP > NC = role_object[18:] > samba.drs_utils.sendDsReplicaSync(drsuapi_connection, > drsuapi_handle, > master_guid, > NC, req_options) > except samba.drs_utils.drsException, estr: > raise CommandError("Replication failed", estr) > > outf.write("FSMO transfer of '%s' role successful\n" % role) > return True > else: > outf.write("This DC already has the '%s' FSMO role\n" % role) > return False > >def transfer_role(outf, role, samdb): > """Transfer standard FSMO role. """ > > domain_dn = samdb.domain_dn() > rid_dn = "CN=RID Manager$,CN=System," + domain_dn > naming_dn = "CN=Partitions,%s" % samdb.get_config_basedn() > infrastructure_dn = "CN=Infrastructure," + domain_dn > schema_dn = str(samdb.get_schema_basedn()) > new_owner = ldb.Dn(samdb, samdb.get_dsServiceName()) > m = ldb.Message() > m.dn = ldb.Dn(samdb, "") > if role == "rid": > master_owner = get_fsmo_roleowner(samdb, rid_dn, role) > m["becomeRidMaster"]= ldb.MessageElement( > "1", ldb.FLAG_MOD_REPLACE, > "becomeRidMaster") > elif role == "pdc": > master_owner = get_fsmo_roleowner(samdb, domain_dn, role) > > res = samdb.search(domain_dn, > scope=ldb.SCOPE_BASE, attrs=["objectSid"]) > assert len(res) == 1 > sid = res[0]["objectSid"][0] > m["becomePdc"]= ldb.MessageElement( > sid, ldb.FLAG_MOD_REPLACE, > "becomePdc") > elif role == "naming": > master_owner = get_fsmo_roleowner(samdb, naming_dn, role) > m["becomeDomainMaster"]= ldb.MessageElement( > "1", ldb.FLAG_MOD_REPLACE, > "becomeDomainMaster") > elif role == "infrastructure": > master_owner = get_fsmo_roleowner(samdb, infrastructure_dn, role) > m["becomeInfrastructureMaster"]= ldb.MessageElement( > "1", ldb.FLAG_MOD_REPLACE, > "becomeInfrastructureMaster") > elif role == "schema": > master_owner = get_fsmo_roleowner(samdb, schema_dn, role) > m["becomeSchemaMaster"]= ldb.MessageElement( > "1", ldb.FLAG_MOD_REPLACE, > "becomeSchemaMaster") > else: > raise CommandError("Invalid FSMO role.") > > if master_owner is None: > outf.write("Cannot transfer, no DC assigned to the %s role. Try 'seize' instead\n" % role) > return False > > if master_owner != new_owner: > try: > samdb.modify(m) > except LdbError, (num, msg): > raise CommandError("Transfer of '%s' role failed: %s" % > (role, msg)) > > outf.write("FSMO transfer of '%s' role successful\n" % role) > return True > else: > outf.write("This DC already has the '%s' FSMO role\n" % role) > return False > >class cmd_fsmo_seize(Command): > """Seize the role.""" > > synopsis = "%prog [options]" > > takes_optiongroups = { > "sambaopts": options.SambaOptions, > "credopts": options.CredentialsOptions, > "versionopts": options.VersionOptions, > } > > takes_options = [ > Option("-H", "--URL", help="LDB URL for database or target server", > type=str, metavar="URL", dest="H"), > Option("--force", > help="Force seizing of role without attempting to transfer.", > action="store_true"), > Option("--role", type="choice", choices=["rid", "pdc", "infrastructure", > "schema", "naming", "domaindns", "forestdns", "all"], > help="""The FSMO role to seize or transfer.\n >rid=RidAllocationMasterRole\n >schema=SchemaMasterRole\n >pdc=PdcEmulationMasterRole\n >naming=DomainNamingMasterRole\n >infrastructure=InfrastructureMasterRole\n >domaindns=DomainDnsZonesMasterRole\n >forestdns=ForestDnsZonesMasterRole\n >all=all of the above\n >You must provide an Admin user and password."""), > ] > > takes_args = [] > > def seize_role(self, role, samdb, force): > """Seize standard fsmo role. """ > > serviceName = samdb.get_dsServiceName() > domain_dn = samdb.domain_dn() > self.infrastructure_dn = "CN=Infrastructure," + domain_dn > self.naming_dn = "CN=Partitions,%s" % samdb.get_config_basedn() > self.schema_dn = str(samdb.get_schema_basedn()) > self.rid_dn = "CN=RID Manager$,CN=System," + domain_dn > > m = ldb.Message() > if role == "rid": > m.dn = ldb.Dn(samdb, self.rid_dn) > elif role == "pdc": > m.dn = ldb.Dn(samdb, domain_dn) > elif role == "naming": > m.dn = ldb.Dn(samdb, self.naming_dn) > elif role == "infrastructure": > m.dn = ldb.Dn(samdb, self.infrastructure_dn) > elif role == "schema": > m.dn = ldb.Dn(samdb, self.schema_dn) > else: > raise CommandError("Invalid FSMO role.") > #first try to transfer to avoid problem if the owner is still active > seize = False > master_owner = get_fsmo_roleowner(samdb, m.dn, role) > # if there is a different owner > if master_owner is not None: > # if there is a different owner > if master_owner != serviceName: > # if --force isn't given, attempt transfer > if force is None: > self.message("Attempting transfer...") > try: > transfer_role(self.outf, role, samdb) > except: > #transfer failed, use the big axe... > seize = True > self.message("Transfer unsuccessful, seizing...") > else: > self.message("Transfer successful, not seizing role") > return True > else: > self.outf.write("This DC already has the '%s' FSMO role\n" % > role) > return False > else: > seize = True > > if force is not None or seize == True: > self.message("Seizing %s FSMO role..." % role) > m["fSMORoleOwner"]= ldb.MessageElement( > serviceName, ldb.FLAG_MOD_REPLACE, > "fSMORoleOwner") > try: > samdb.modify(m) > except LdbError, (num, msg): > raise CommandError("Failed to seize '%s' role: %s" % > (role, msg)) > self.outf.write("FSMO seize of '%s' role successful\n" % role) > return True > > def seize_dns_role(self, role, samdb, credopts, sambaopts, > versionopts, force): > """Seize DNS FSMO role. """ > > serviceName = samdb.get_dsServiceName() > domain_dn = samdb.domain_dn() > forest_dn = samba.dn_from_dns_name(samdb.forest_dns_name()) > self.domaindns_dn = "CN=Infrastructure,DC=DomainDnsZones," + domain_dn > self.forestdns_dn = "CN=Infrastructure,DC=ForestDnsZones," + forest_dn > > m = ldb.Message() > if role == "domaindns": > m.dn = ldb.Dn(samdb, self.domaindns_dn) > elif role == "forestdns": > m.dn = ldb.Dn(samdb, self.forestdns_dn) > else: > raise CommandError("Invalid FSMO role.") > #first try to transfer to avoid problem if the owner is still active > seize = False > master_owner = get_fsmo_roleowner(samdb, m.dn, role) > if master_owner is not None: > # if there is a different owner > if master_owner != serviceName: > # if --force isn't given, attempt transfer > if force is None: > self.message("Attempting transfer...") > try: > transfer_dns_role(self.outf, sambaopts, credopts, role, > samdb) > except: > #transfer failed, use the big axe... > seize = True > self.message("Transfer unsuccessful, seizing...") > else: > self.message("Transfer successful, not seizing role\n") > return True > else: > self.outf.write("This DC already has the '%s' FSMO role\n" % > role) > return False > else: > seize = True > > if force is not None or seize == True: > self.message("Seizing %s FSMO role..." % role) > m["fSMORoleOwner"]= ldb.MessageElement( > serviceName, ldb.FLAG_MOD_REPLACE, > "fSMORoleOwner") > try: > samdb.modify(m) > except LdbError, (num, msg): > raise CommandError("Failed to seize '%s' role: %s" % > (role, msg)) > self.outf.write("FSMO seize of '%s' role successful\n" % role) > return True > > > def run(self, force=None, H=None, role=None, > credopts=None, sambaopts=None, versionopts=None): > > lp = sambaopts.get_loadparm() > creds = credopts.get_credentials(lp, fallback_machine=True) > > samdb = SamDB(url=H, session_info=system_session(), > credentials=creds, lp=lp) > > if role == "all": > self.seize_role("rid", samdb, force) > self.seize_role("pdc", samdb, force) > self.seize_role("naming", samdb, force) > self.seize_role("infrastructure", samdb, force) > self.seize_role("schema", samdb, force) > self.seize_dns_role("domaindns", samdb, credopts, sambaopts, > versionopts, force) > self.seize_dns_role("forestdns", samdb, credopts, sambaopts, > versionopts, force) > else: > if role == "domaindns" or role == "forestdns": > self.seize_dns_role(role, samdb, credopts, sambaopts, > versionopts, force) > else: > self.seize_role(role, samdb, force) > > >class cmd_fsmo_show(Command): > """Show the roles.""" > > synopsis = "%prog [options]" > > takes_optiongroups = { > "sambaopts": options.SambaOptions, > "credopts": options.CredentialsOptions, > "versionopts": options.VersionOptions, > } > > takes_options = [ > Option("-H", "--URL", help="LDB URL for database or target server", > type=str, metavar="URL", dest="H"), > ] > > takes_args = [] > > def run(self, H=None, credopts=None, sambaopts=None, versionopts=None): > lp = sambaopts.get_loadparm() > creds = credopts.get_credentials(lp, fallback_machine=True) > > samdb = SamDB(url=H, session_info=system_session(), > credentials=creds, lp=lp) > > domain_dn = samdb.domain_dn() > forest_dn = samba.dn_from_dns_name(samdb.forest_dns_name()) > infrastructure_dn = "CN=Infrastructure," + domain_dn > naming_dn = "CN=Partitions,%s" % samdb.get_config_basedn() > schema_dn = samdb.get_schema_basedn() > rid_dn = "CN=RID Manager$,CN=System," + domain_dn > domaindns_dn = "CN=Infrastructure,DC=DomainDnsZones," + domain_dn > forestdns_dn = "CN=Infrastructure,DC=ForestDnsZones," + forest_dn > > masters = [(schema_dn, "schema", "SchemaMasterRole"), > (infrastructure_dn, "infrastructure", "InfrastructureMasterRole"), > (rid_dn, "rid", "RidAllocationMasterRole"), > (domain_dn, "pdc", "PdcEmulationMasterRole"), > (naming_dn, "naming", "DomainNamingMasterRole"), > (domaindns_dn, "domaindns", "DomainDnsZonesMasterRole"), > (forestdns_dn, "forestdns", "ForestDnsZonesMasterRole"), > ] > > for master in masters: > (dn, short_name, long_name) = master > try: > master = get_fsmo_roleowner(samdb, dn, short_name) > if master is not None: > self.message("%s owner: %s" % (long_name, str(master))) > else: > self.message("%s has no current owner" % (long_name)) > except CommandError, e: > self.message("%s: * %s" % (long_name, e.message)) > >class cmd_fsmo_transfer(Command): > """Transfer the role.""" > > synopsis = "%prog [options]" > > takes_optiongroups = { > "sambaopts": options.SambaOptions, > "credopts": options.CredentialsOptions, > "versionopts": options.VersionOptions, > } > > takes_options = [ > Option("-H", "--URL", help="LDB URL for database or target server", > type=str, metavar="URL", dest="H"), > Option("--role", type="choice", choices=["rid", "pdc", "infrastructure", > "schema", "naming", "domaindns", "forestdns", "all"], > help="""The FSMO role to seize or transfer.\n >rid=RidAllocationMasterRole\n >schema=SchemaMasterRole\n >pdc=PdcEmulationMasterRole\n >naming=DomainNamingMasterRole\n >infrastructure=InfrastructureMasterRole\n >domaindns=DomainDnsZonesMasterRole\n >forestdns=ForestDnsZonesMasterRole\n >all=all of the above\n >You must provide an Admin user and password."""), > ] > > takes_args = [] > > def run(self, force=None, H=None, role=None, > credopts=None, sambaopts=None, versionopts=None): > > lp = sambaopts.get_loadparm() > creds = credopts.get_credentials(lp, fallback_machine=True) > > samdb = SamDB(url=H, session_info=system_session(), > credentials=creds, lp=lp) > > if role == "all": > transfer_role(self.outf, "rid", samdb) > transfer_role(self.outf, "pdc", samdb) > transfer_role(self.outf, "naming", samdb) > transfer_role(self.outf, "infrastructure", samdb) > transfer_role(self.outf, "schema", samdb) > transfer_dns_role(self.outf, sambaopts, credopts, > "domaindns", samdb) > transfer_dns_role(self.outf, sambaopts, credopts, "forestdns", > samdb) > else: > if role == "domaindns" or role == "forestdns": > transfer_dns_role(self.outf, sambaopts, credopts, role, samdb) > else: > transfer_role(self.outf, role, samdb) > > >class cmd_fsmo(SuperCommand): > """Flexible Single Master Operations (FSMO) roles management.""" > > subcommands = {} > subcommands["seize"] = cmd_fsmo_seize() > subcommands["show"] = cmd_fsmo_show() > subcommands["transfer"] = cmd_fsmo_transfer()
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 42079
: 7917