>From 91f6c18d0217e79b0baa031f3d4bf09f68cfeab5 Mon Sep 17 00:00:00 2001 From: Rowland Penny Date: Wed, 20 May 2015 12:10:05 +0100 Subject: [PATCH] samba-tool: make 'samba-tool fsmo *' aware of all 7 fsmo roles Signed-off-by: Rowland Penny --- python/samba/netcmd/fsmo.py | 59 ++++++++++++++++++++++++++++++++++++++++--- 1 file changed, 55 insertions(+), 4 deletions(-) diff --git a/python/samba/netcmd/fsmo.py b/python/samba/netcmd/fsmo.py index 1bc4a96..ab853d7 100644 --- a/python/samba/netcmd/fsmo.py +++ b/python/samba/netcmd/fsmo.py @@ -58,6 +58,40 @@ def transfer_role(outf, role, samdb): m["becomeSchemaMaster"]= ldb.MessageElement( "1", ldb.FLAG_MOD_REPLACE, "becomeSchemaMaster") + elif role == "domaindns": + # this would work as the infrastructure role if the schema allowed it + # but it doesn't, so will have to sieze + domain_dn = samdb.domain_dn() + domaindns_dn = "CN=Infrastructure,DC=DomainDnsZones," + domain_dn + try: + res = samdb.search(domaindns_dn, + scope=ldb.SCOPE_BASE, attrs=["fSMORoleOwner"]) + except: + print "Domain DNS partion %s not found" % domaindns_dn + return + + m.dn = ldb.Dn(samdb, domaindns_dn) + dro = samdb.get_dsServiceName() + m["fSMORoleOwner"]= ldb.MessageElement( + "%s" % dro, ldb.FLAG_MOD_REPLACE, + "fSMORoleOwner") + elif role == "forestdns": + # this would work as the infrastructure role if the schema allowed it + # but it doesn't, so will have to sieze + domain_dn = samdb.domain_dn() + forestdns_dn = "CN=Infrastructure,DC=ForestDnsZones," + domain_dn + try: + res = samdb.search(forestdns_dn, + scope=ldb.SCOPE_BASE, attrs=["fSMORoleOwner"]) + except: + print "Forest DNS partion %s not found" % forestdns_dn + return + + m.dn = ldb.Dn(samdb, forestdns_dn) + fro = samdb.get_dsServiceName() + m["fSMORoleOwner"]= ldb.MessageElement( + "%s" % fro, ldb.FLAG_MOD_REPLACE, + "fSMORoleOwner") else: raise CommandError("Invalid FSMO role.") try: @@ -82,13 +116,15 @@ class cmd_fsmo_seize(Command): Option("-H", "--URL", help="LDB URL for database or target server", type=str, metavar="URL", dest="H"), Option("--force", help="Force seizing of the role without attempting to transfer first.", action="store_true"), - Option("--role", type="choice", choices=["rid", "pdc", "infrastructure","schema","naming","all"], + Option("--role", type="choice", choices=["rid", "pdc", "infrastructure","schema","naming","domaindns","forestdns","all"], help="""The FSMO role to seize or transfer.\n rid=RidAllocationMasterRole\n schema=SchemaMasterRole\n pdc=PdcEmulationMasterRole\n naming=DomainNamingMasterRole\n infrastructure=InfrastructureMasterRole\n +domaindns=DomainDnsZonesMasterRole\n +forestdns=ForestDnsZonesMasterRole\n all=all of the above"""), ] @@ -104,6 +140,8 @@ all=all of the above"""), self.naming_dn = "CN=Partitions,%s" % samdb.get_config_basedn() self.schema_dn = str(samdb.get_schema_basedn()) self.rid_dn = "CN=RID Manager$,CN=System," + domain_dn + self.domaindns_dn = "CN=Infrastructure,DC=DomainDnsZones," + domain_dn + self.forestdns_dn = "CN=Infrastructure,DC=ForestDnsZones," + domain_dn m = ldb.Message() if role == "rid": @@ -116,6 +154,10 @@ all=all of the above"""), m.dn = ldb.Dn(samdb, self.infrastructure_dn) elif role == "schema": m.dn = ldb.Dn(samdb, self.schema_dn) + elif role == "domaindns": + m.dn = ldb.Dn(samdb, self.domaindns_dn) + elif role == "forestdns": + m.dn = ldb.Dn(samdb, self.forestdns_dn) else: raise CommandError("Invalid FSMO role.") #first try to transfer to avoid problem if the owner is still active @@ -155,6 +197,8 @@ all=all of the above"""), self.seize_role("naming", samdb, force) self.seize_role("infrastructure", samdb, force) self.seize_role("schema", samdb, force) + self.seize_role("domaindns", samdb, force) + self.seize_role("forestdns", samdb, force) else: self.seize_role(role, samdb, force) @@ -189,6 +233,8 @@ class cmd_fsmo_show(Command): self.naming_dn = "CN=Partitions,%s" % samdb.get_config_basedn() self.schema_dn = samdb.get_schema_basedn() self.rid_dn = "CN=RID Manager$,CN=System," + domain_dn + self.domaindns_dn = "CN=Infrastructure,DC=DomainDnsZones," + domain_dn + self.forestdns_dn = "CN=Infrastructure,DC=ForestDnsZones," + domain_dn res = samdb.search(self.infrastructure_dn, scope=ldb.SCOPE_BASE, attrs=["fSMORoleOwner"]) @@ -215,12 +261,13 @@ class cmd_fsmo_show(Command): assert len(res) == 1 self.ridMaster = res[0]["fSMORoleOwner"][0] + self.message("SchemaMasterRole owner: " + self.schemaMaster) self.message("InfrastructureMasterRole owner: " + self.infrastructureMaster) self.message("RidAllocationMasterRole owner: " + self.ridMaster) self.message("PdcEmulationMasterRole owner: " + self.pdcEmulator) self.message("DomainNamingMasterRole owner: " + self.namingMaster) - self.message("SchemaMasterRole owner: " + self.schemaMaster) - + self.message("DomainDnsZonesMasterRole owner: " + self.domaindnszonesMaster) + self.message("ForestDnsZonesMasterRole owner: " + self.forestdnszonesMaster) class cmd_fsmo_transfer(Command): """Transfer the role.""" @@ -236,13 +283,15 @@ class cmd_fsmo_transfer(Command): takes_options = [ Option("-H", "--URL", help="LDB URL for database or target server", type=str, metavar="URL", dest="H"), - Option("--role", type="choice", choices=["rid", "pdc", "infrastructure","schema","naming","all"], + Option("--role", type="choice", choices=["rid","pdc","infrastructure","schema","naming","domaindns","forestdns","all"], help="""The FSMO role to seize or transfer.\n rid=RidAllocationMasterRole\n schema=SchemaMasterRole\n pdc=PdcEmulationMasterRole\n naming=DomainNamingMasterRole\n infrastructure=InfrastructureMasterRole\n +domaindns=DomainDnsZonesMasterRole\n +forestdns=ForestDnsZonesMasterRole\n all=all of the above"""), ] @@ -263,6 +312,8 @@ all=all of the above"""), transfer_role(self.outf, "naming", samdb) transfer_role(self.outf, "infrastructure", samdb) transfer_role(self.outf, "schema", samdb) + transfer_role(self.outf, "domaindns", samdb) + transfer_role(self.outf, "forestdns", samdb) else: transfer_role(self.outf, role, samdb) -- 1.7.10.4