1 | #!/usr/bin/env python
|
---|
2 | # vim: expandtab
|
---|
3 | #
|
---|
4 | # Copyright (C) Matthieu Patou <mat@matws.net> 2011
|
---|
5 | #
|
---|
6 | # This program is free software; you can redistribute it and/or modify
|
---|
7 | # it under the terms of the GNU General Public License as published by
|
---|
8 | # the Free Software Foundation; either version 3 of the License, or
|
---|
9 | # (at your option) any later version.
|
---|
10 | #
|
---|
11 | # This program is distributed in the hope that it will be useful,
|
---|
12 | # but WITHOUT ANY WARRANTY; without even the implied warranty of
|
---|
13 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
---|
14 | # GNU General Public License for more details.
|
---|
15 | #
|
---|
16 | # You should have received a copy of the GNU General Public License
|
---|
17 | # along with this program. If not, see <http://www.gnu.org/licenses/>.
|
---|
18 |
|
---|
19 |
|
---|
20 | import optparse
|
---|
21 | import sys
|
---|
22 | # Allow to run from s4 source directory (without installing samba)
|
---|
23 | sys.path.insert(0, "bin/python")
|
---|
24 |
|
---|
25 | import ldb
|
---|
26 | import samba
|
---|
27 | import samba.getopt as options
|
---|
28 | import os
|
---|
29 |
|
---|
30 | from samba.credentials import DONT_USE_KERBEROS
|
---|
31 | from samba.auth import system_session
|
---|
32 | from samba import param
|
---|
33 | from samba.provision import find_provision_key_parameters, secretsdb_self_join
|
---|
34 | from samba.upgradehelpers import get_ldbs, get_paths
|
---|
35 |
|
---|
36 |
|
---|
37 | __docformat__ = "restructuredText"
|
---|
38 |
|
---|
39 | parser = optparse.OptionParser("provision [options]")
|
---|
40 | sambaopts = options.SambaOptions(parser)
|
---|
41 | parser.add_option_group(sambaopts)
|
---|
42 | parser.add_option_group(options.VersionOptions(parser))
|
---|
43 | credopts = options.CredentialsOptions(parser)
|
---|
44 | parser.add_option_group(credopts)
|
---|
45 | parser.add_option("--oldname",
|
---|
46 | help="Old DC name")
|
---|
47 | parser.add_option("--newname",
|
---|
48 | help="New DC name")
|
---|
49 |
|
---|
50 | opts = parser.parse_args()[0]
|
---|
51 |
|
---|
52 | if len(sys.argv) == 1:
|
---|
53 | opts.interactive = True
|
---|
54 | lp = sambaopts.get_loadparm()
|
---|
55 | smbconf = lp.configfile
|
---|
56 |
|
---|
57 | creds = credopts.get_credentials(lp)
|
---|
58 | creds.set_kerberos_state(DONT_USE_KERBEROS)
|
---|
59 |
|
---|
60 |
|
---|
61 | if __name__ == '__main__':
|
---|
62 | global defSDmodified
|
---|
63 | defSDmodified = False
|
---|
64 | # 1) First get files paths
|
---|
65 | paths = get_paths(param, smbconf=smbconf)
|
---|
66 | # Get ldbs with the system session, it is needed for searching
|
---|
67 | # provision parameters
|
---|
68 | session = system_session()
|
---|
69 |
|
---|
70 | ldbs = get_ldbs(paths, creds, session, lp)
|
---|
71 | ldbs.sam.transaction_start()
|
---|
72 | ldbs.secrets.transaction_start()
|
---|
73 |
|
---|
74 | if opts.oldname is None or opts.newname is None:
|
---|
75 | raise Exception("Option oldname or newname is missing")
|
---|
76 | res = ldbs.sam.search(expression="(&(name=%s)(serverReferenceBL=*))" % opts.oldname)
|
---|
77 | if len(res) != 1:
|
---|
78 | raise Exception("Wrong number of result returned (%d), are you sure of the old name %s" %
|
---|
79 | (len(res), opts.oldname))
|
---|
80 |
|
---|
81 | # Ok got it then check that the new name is not used as well
|
---|
82 | res2 = ldbs.sam.search(expression="(&(name=%s)(objectclass=computer))" % opts.newname)
|
---|
83 | if len(res2) != 0:
|
---|
84 | raise Exception("Seems that %s is a name that already exists, pick another one" %
|
---|
85 | opts.newname)
|
---|
86 |
|
---|
87 | names = find_provision_key_parameters(ldbs.sam, ldbs.secrets, ldbs.idmap,
|
---|
88 | paths, smbconf, lp)
|
---|
89 |
|
---|
90 | # First rename the entry
|
---|
91 | # provision put the name in upper case so let's do it too !
|
---|
92 | newdn = ldb.Dn(ldbs.sam, str(res[0].dn))
|
---|
93 | newdn.set_component(0, "cn", opts.newname.upper())
|
---|
94 | ldbs.sam.rename(res[0].dn, newdn)
|
---|
95 |
|
---|
96 | # Then change password and samaccountname and dnshostname
|
---|
97 | msg = ldb.Message(newdn)
|
---|
98 | machinepass = samba.generate_random_password(128, 255)
|
---|
99 | mputf16 = machinepass.encode('utf-16-le')
|
---|
100 |
|
---|
101 | account = "%s$" % opts.newname.upper()
|
---|
102 | msg["clearTextPassword"] = ldb.MessageElement(mputf16,
|
---|
103 | ldb.FLAG_MOD_REPLACE,
|
---|
104 | "clearTextPassword")
|
---|
105 |
|
---|
106 | msg["sAMAccountName"] = ldb.MessageElement(account,
|
---|
107 | ldb.FLAG_MOD_REPLACE,
|
---|
108 | "sAMAccountName")
|
---|
109 |
|
---|
110 | msg["dNSHostName"] = ldb.MessageElement("%s.%s" % (opts.newname,
|
---|
111 | names.dnsdomain),
|
---|
112 | ldb.FLAG_MOD_REPLACE,
|
---|
113 | "dNSHostName")
|
---|
114 | ldbs.sam.modify(msg)
|
---|
115 |
|
---|
116 | # Do a self join one more time to resync the secrets file
|
---|
117 | res = ldbs.sam.search(base=newdn, scope=ldb.SCOPE_BASE,
|
---|
118 | attrs=["msDs-keyVersionNumber", "serverReferenceBL"])
|
---|
119 | assert(len(res) == 1)
|
---|
120 | kvno = int(str(res[0]["msDs-keyVersionNumber"]))
|
---|
121 | serverbldn = ldb.Dn(ldbs.sam, str(res[0]["serverReferenceBL"]))
|
---|
122 |
|
---|
123 | secrets_msg = ldbs.secrets.search(expression="sAMAccountName=%s$" %
|
---|
124 | opts.oldname.upper(),
|
---|
125 | attrs=["secureChannelType"])
|
---|
126 |
|
---|
127 | secChanType = int(secrets_msg[0]["secureChannelType"][0])
|
---|
128 |
|
---|
129 | secretsdb_self_join(ldbs.secrets, domain=names.domain,
|
---|
130 | realm=names.realm,
|
---|
131 | domainsid=names.domainsid,
|
---|
132 | dnsdomain=names.dnsdomain,
|
---|
133 | netbiosname=opts.newname.upper(),
|
---|
134 | machinepass=machinepass,
|
---|
135 | key_version_number=kvno,
|
---|
136 | secure_channel_type=secChanType)
|
---|
137 |
|
---|
138 | # Update RID set reference so we don't have to runtime fixup until the next dbcheck as there is no back link.
|
---|
139 |
|
---|
140 | res = ldbs.sam.search(expression="(objectClass=rIDSet)", base=newdn, scope=ldb.SCOPE_ONELEVEL, attrs=[])
|
---|
141 | assert(len(res) == 1)
|
---|
142 | newridset = str(res[0].dn)
|
---|
143 | msg = ldb.Message(newdn)
|
---|
144 |
|
---|
145 | msg["rIDSetReferences"] = ldb.MessageElement(newridset,
|
---|
146 | ldb.FLAG_MOD_REPLACE,
|
---|
147 | "rIDSetReferences")
|
---|
148 | ldbs.sam.modify(msg)
|
---|
149 |
|
---|
150 | # Update the server's sites configuration
|
---|
151 | newserverrefdn = ldb.Dn(ldbs.sam, str(serverbldn))
|
---|
152 | newserverrefdn.set_component(0, "cn", opts.newname.upper())
|
---|
153 |
|
---|
154 | ldbs.sam.rename(serverbldn, newserverrefdn)
|
---|
155 |
|
---|
156 | msg = ldb.Message(newserverrefdn)
|
---|
157 | msg["dNSHostName"] = ldb.MessageElement("%s.%s" % (opts.newname,
|
---|
158 | names.dnsdomain),
|
---|
159 | ldb.FLAG_MOD_REPLACE,
|
---|
160 | "dNSHostName")
|
---|
161 | ldbs.sam.modify(msg)
|
---|
162 |
|
---|
163 | try:
|
---|
164 | ldbs.sam.transaction_prepare_commit()
|
---|
165 | ldbs.secrets.transaction_prepare_commit()
|
---|
166 | except Exception:
|
---|
167 | ldbs.sam.rollback()
|
---|
168 | ldbs.secrets.rollback()
|
---|
169 | raise
|
---|
170 |
|
---|
171 | try:
|
---|
172 | ldbs.sam.transaction_commit()
|
---|
173 | ldbs.secrets.transaction_commit()
|
---|
174 | except Exception:
|
---|
175 | ldbs.sam.rollback()
|
---|
176 | ldbs.secrets.rollback()
|
---|
177 | raise
|
---|
178 |
|
---|
179 | # All good so far
|
---|
180 | #print lp.get("private dir")
|
---|
181 | cf = open(lp.configfile)
|
---|
182 | ncfname = "%s.new" % lp.configfile
|
---|
183 | newconf = open(ncfname, 'w')
|
---|
184 | for l in cf.readlines():
|
---|
185 | if l.find("netbios name") > 0:
|
---|
186 | newconf.write("\tnetbios name = %s\n" % opts.newname.upper())
|
---|
187 | else:
|
---|
188 | newconf.write(l)
|
---|
189 | newconf.close()
|
---|
190 | cf.close()
|
---|
191 | os.rename(ncfname, lp.configfile)
|
---|
192 |
|
---|