summaryrefslogtreecommitdiff
path: root/source4/scripting/python/samba/provision/sambadns.py
diff options
context:
space:
mode:
authorJelmer Vernooij <jelmer@samba.org>2012-12-28 15:37:14 +0100
committerAndrew Bartlett <abartlet@samba.org>2013-03-02 03:57:34 +0100
commit87afc3aee1ea593069322a49355dd8780d99e123 (patch)
tree8e1ea6678d93b53f21b34c4940b7d5a64e0f5020 /source4/scripting/python/samba/provision/sambadns.py
parent80fce353e740c793619005ac102ab07fb5e7d280 (diff)
downloadsamba-87afc3aee1ea593069322a49355dd8780d99e123.tar.gz
samba-87afc3aee1ea593069322a49355dd8780d99e123.tar.bz2
samba-87afc3aee1ea593069322a49355dd8780d99e123.zip
Move python modules from source4/scripting/python/ to python/.
Reviewed-by: Andrew Bartlett <abartlet@samba.org> Autobuild-User(master): Andrew Bartlett <abartlet@samba.org> Autobuild-Date(master): Sat Mar 2 03:57:34 CET 2013 on sn-devel-104
Diffstat (limited to 'source4/scripting/python/samba/provision/sambadns.py')
-rw-r--r--source4/scripting/python/samba/provision/sambadns.py1135
1 files changed, 0 insertions, 1135 deletions
diff --git a/source4/scripting/python/samba/provision/sambadns.py b/source4/scripting/python/samba/provision/sambadns.py
deleted file mode 100644
index 4522683fe8..0000000000
--- a/source4/scripting/python/samba/provision/sambadns.py
+++ /dev/null
@@ -1,1135 +0,0 @@
-# Unix SMB/CIFS implementation.
-# backend code for provisioning DNS for a Samba4 server
-#
-# Copyright (C) Kai Blin <kai@samba.org> 2011
-# Copyright (C) Amitay Isaacs <amitay@gmail.com> 2011
-#
-# This program is free software; you can redistribute it and/or modify
-# it under the terms of the GNU General Public License as published by
-# the Free Software Foundation; either version 3 of the License, or
-# (at your option) any later version.
-#
-# This program is distributed in the hope that it will be useful,
-# but WITHOUT ANY WARRANTY; without even the implied warranty of
-# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-# GNU General Public License for more details.
-#
-# You should have received a copy of the GNU General Public License
-# along with this program. If not, see <http://www.gnu.org/licenses/>.
-#
-
-"""DNS-related provisioning"""
-
-import os
-import uuid
-import shutil
-import time
-import ldb
-from base64 import b64encode
-import samba
-from samba.tdb_util import tdb_copy
-from samba.ndr import ndr_pack, ndr_unpack
-from samba import setup_file
-from samba.dcerpc import dnsp, misc, security
-from samba.dsdb import (
- DS_DOMAIN_FUNCTION_2000,
- DS_DOMAIN_FUNCTION_2003,
- DS_DOMAIN_FUNCTION_2008_R2
- )
-from samba.provision.descriptor import (
- get_domain_descriptor,
- get_domain_delete_protected1_descriptor,
- get_domain_delete_protected2_descriptor,
- get_dns_partition_descriptor,
- get_dns_forest_microsoft_dns_descriptor,
- get_dns_domain_microsoft_dns_descriptor
- )
-from samba.provision.common import (
- setup_path,
- setup_add_ldif,
- setup_modify_ldif,
- setup_ldb
- )
-
-
-def get_domainguid(samdb, domaindn):
- res = samdb.search(base=domaindn, scope=ldb.SCOPE_BASE, attrs=["objectGUID"])
- domainguid = str(ndr_unpack(misc.GUID, res[0]["objectGUID"][0]))
- return domainguid
-
-
-def get_dnsadmins_sid(samdb, domaindn):
- res = samdb.search(base="CN=DnsAdmins,CN=Users,%s" % domaindn, scope=ldb.SCOPE_BASE,
- attrs=["objectSid"])
- dnsadmins_sid = ndr_unpack(security.dom_sid, res[0]["objectSid"][0])
- return dnsadmins_sid
-
-
-class ARecord(dnsp.DnssrvRpcRecord):
-
- def __init__(self, ip_addr, serial=1, ttl=900, rank=dnsp.DNS_RANK_ZONE):
- super(ARecord, self).__init__()
- self.wType = dnsp.DNS_TYPE_A
- self.rank = rank
- self.dwSerial = serial
- self.dwTtlSeconds = ttl
- self.data = ip_addr
-
-
-class AAAARecord(dnsp.DnssrvRpcRecord):
-
- def __init__(self, ip6_addr, serial=1, ttl=900, rank=dnsp.DNS_RANK_ZONE):
- super(AAAARecord, self).__init__()
- self.wType = dnsp.DNS_TYPE_AAAA
- self.rank = rank
- self.dwSerial = serial
- self.dwTtlSeconds = ttl
- self.data = ip6_addr
-
-
-class CNameRecord(dnsp.DnssrvRpcRecord):
-
- def __init__(self, cname, serial=1, ttl=900, rank=dnsp.DNS_RANK_ZONE):
- super(CNameRecord, self).__init__()
- self.wType = dnsp.DNS_TYPE_CNAME
- self.rank = rank
- self.dwSerial = serial
- self.dwTtlSeconds = ttl
- self.data = cname
-
-
-class NSRecord(dnsp.DnssrvRpcRecord):
-
- def __init__(self, dns_server, serial=1, ttl=900, rank=dnsp.DNS_RANK_ZONE):
- super(NSRecord, self).__init__()
- self.wType = dnsp.DNS_TYPE_NS
- self.rank = rank
- self.dwSerial = serial
- self.dwTtlSeconds = ttl
- self.data = dns_server
-
-
-class SOARecord(dnsp.DnssrvRpcRecord):
-
- def __init__(self, mname, rname, serial=1, refresh=900, retry=600,
- expire=86400, minimum=3600, ttl=3600, rank=dnsp.DNS_RANK_ZONE):
- super(SOARecord, self).__init__()
- self.wType = dnsp.DNS_TYPE_SOA
- self.rank = rank
- self.dwSerial = serial
- self.dwTtlSeconds = ttl
- soa = dnsp.soa()
- soa.serial = serial
- soa.refresh = refresh
- soa.retry = retry
- soa.expire = expire
- soa.mname = mname
- soa.rname = rname
- self.data = soa
-
-
-class SRVRecord(dnsp.DnssrvRpcRecord):
-
- def __init__(self, target, port, priority=0, weight=100, serial=1, ttl=900,
- rank=dnsp.DNS_RANK_ZONE):
- super(SRVRecord, self).__init__()
- self.wType = dnsp.DNS_TYPE_SRV
- self.rank = rank
- self.dwSerial = serial
- self.dwTtlSeconds = ttl
- srv = dnsp.srv()
- srv.nameTarget = target
- srv.wPort = port
- srv.wPriority = priority
- srv.wWeight = weight
- self.data = srv
-
-
-class TXTRecord(dnsp.DnssrvRpcRecord):
-
- def __init__(self, slist, serial=1, ttl=900, rank=dnsp.DNS_RANK_ZONE):
- super(TXTRecord, self).__init__()
- self.wType = dnsp.DNS_TYPE_TXT
- self.rank = rank
- self.dwSerial = serial
- self.dwTtlSeconds = ttl
- stringlist = dnsp.string_list()
- stringlist.count = len(slist)
- stringlist.str = slist
- self.data = stringlist
-
-
-class TypeProperty(dnsp.DnsProperty):
-
- def __init__(self, zone_type=dnsp.DNS_ZONE_TYPE_PRIMARY):
- super(TypeProperty, self).__init__()
- self.wDataLength = 1
- self.version = 1
- self.id = dnsp.DSPROPERTY_ZONE_TYPE
- self.data = zone_type
-
-
-class AllowUpdateProperty(dnsp.DnsProperty):
-
- def __init__(self, allow_update=dnsp.DNS_ZONE_UPDATE_SECURE):
- super(AllowUpdateProperty, self).__init__()
- self.wDataLength = 1
- self.version = 1
- self.id = dnsp.DSPROPERTY_ZONE_ALLOW_UPDATE
- self.data = allow_update
-
-
-class SecureTimeProperty(dnsp.DnsProperty):
-
- def __init__(self, secure_time=0):
- super(SecureTimeProperty, self).__init__()
- self.wDataLength = 1
- self.version = 1
- self.id = dnsp.DSPROPERTY_ZONE_SECURE_TIME
- self.data = secure_time
-
-
-class NorefreshIntervalProperty(dnsp.DnsProperty):
-
- def __init__(self, norefresh_interval=0):
- super(NorefreshIntervalProperty, self).__init__()
- self.wDataLength = 1
- self.version = 1
- self.id = dnsp.DSPROPERTY_ZONE_NOREFRESH_INTERVAL
- self.data = norefresh_interval
-
-
-class RefreshIntervalProperty(dnsp.DnsProperty):
-
- def __init__(self, refresh_interval=0):
- super(RefreshIntervalProperty, self).__init__()
- self.wDataLength = 1
- self.version = 1
- self.id = dnsp.DSPROPERTY_ZONE_REFRESH_INTERVAL
- self.data = refresh_interval
-
-
-class AgingStateProperty(dnsp.DnsProperty):
-
- def __init__(self, aging_enabled=0):
- super(AgingStateProperty, self).__init__()
- self.wDataLength = 1
- self.version = 1
- self.id = dnsp.DSPROPERTY_ZONE_AGING_STATE
- self.data = aging_enabled
-
-
-class AgingEnabledTimeProperty(dnsp.DnsProperty):
-
- def __init__(self, next_cycle_hours=0):
- super(AgingEnabledTimeProperty, self).__init__()
- self.wDataLength = 1
- self.version = 1;
- self.id = dnsp.DSPROPERTY_ZONE_AGING_ENABLED_TIME
- self.data = next_cycle_hours
-
-
-def setup_dns_partitions(samdb, domainsid, domaindn, forestdn, configdn,
- serverdn):
- domainzone_dn = "DC=DomainDnsZones,%s" % domaindn
- forestzone_dn = "DC=ForestDnsZones,%s" % forestdn
- descriptor = get_dns_partition_descriptor(domainsid)
- setup_add_ldif(samdb, setup_path("provision_dnszones_partitions.ldif"), {
- "DOMAINZONE_DN": domainzone_dn,
- "FORESTZONE_DN": forestzone_dn,
- "SECDESC" : b64encode(descriptor)
- })
-
- domainzone_guid = get_domainguid(samdb, domainzone_dn)
- forestzone_guid = get_domainguid(samdb, forestzone_dn)
-
- domainzone_guid = str(uuid.uuid4())
- forestzone_guid = str(uuid.uuid4())
-
- domainzone_dns = ldb.Dn(samdb, domainzone_dn).canonical_ex_str().strip()
- forestzone_dns = ldb.Dn(samdb, forestzone_dn).canonical_ex_str().strip()
-
- protected1_desc = get_domain_delete_protected1_descriptor(domainsid)
- protected2_desc = get_domain_delete_protected2_descriptor(domainsid)
- setup_add_ldif(samdb, setup_path("provision_dnszones_add.ldif"), {
- "DOMAINZONE_DN": domainzone_dn,
- "FORESTZONE_DN": forestzone_dn,
- "DOMAINZONE_GUID": domainzone_guid,
- "FORESTZONE_GUID": forestzone_guid,
- "DOMAINZONE_DNS": domainzone_dns,
- "FORESTZONE_DNS": forestzone_dns,
- "CONFIGDN": configdn,
- "SERVERDN": serverdn,
- "LOSTANDFOUND_DESCRIPTOR": b64encode(protected2_desc),
- "INFRASTRUCTURE_DESCRIPTOR": b64encode(protected1_desc),
- })
-
- setup_modify_ldif(samdb, setup_path("provision_dnszones_modify.ldif"), {
- "CONFIGDN": configdn,
- "SERVERDN": serverdn,
- "DOMAINZONE_DN": domainzone_dn,
- "FORESTZONE_DN": forestzone_dn,
- })
-
-
-def add_dns_accounts(samdb, domaindn):
- setup_add_ldif(samdb, setup_path("provision_dns_accounts_add.ldif"), {
- "DOMAINDN": domaindn,
- })
-
-
-def add_dns_container(samdb, domaindn, prefix, domain_sid, dnsadmins_sid, forest=False):
- name_map = {'DnsAdmins': str(dnsadmins_sid)}
- if forest is True:
- sd_val = get_dns_forest_microsoft_dns_descriptor(domain_sid,
- name_map=name_map)
- else:
- sd_val = get_dns_domain_microsoft_dns_descriptor(domain_sid,
- name_map=name_map)
- # CN=MicrosoftDNS,<PREFIX>,<DOMAINDN>
- msg = ldb.Message(ldb.Dn(samdb, "CN=MicrosoftDNS,%s,%s" % (prefix, domaindn)))
- msg["objectClass"] = ["top", "container"]
- msg["nTSecurityDescriptor"] = ldb.MessageElement(sd_val, ldb.FLAG_MOD_ADD,
- "nTSecurityDescriptor")
- samdb.add(msg)
-
-
-def add_rootservers(samdb, domaindn, prefix):
- rootservers = {}
- rootservers["a.root-servers.net"] = "198.41.0.4"
- rootservers["b.root-servers.net"] = "192.228.79.201"
- rootservers["c.root-servers.net"] = "192.33.4.12"
- rootservers["d.root-servers.net"] = "128.8.10.90"
- rootservers["e.root-servers.net"] = "192.203.230.10"
- rootservers["f.root-servers.net"] = "192.5.5.241"
- rootservers["g.root-servers.net"] = "192.112.36.4"
- rootservers["h.root-servers.net"] = "128.63.2.53"
- rootservers["i.root-servers.net"] = "192.36.148.17"
- rootservers["j.root-servers.net"] = "192.58.128.30"
- rootservers["k.root-servers.net"] = "193.0.14.129"
- rootservers["l.root-servers.net"] = "199.7.83.42"
- rootservers["m.root-servers.net"] = "202.12.27.33"
-
- rootservers_v6 = {}
- rootservers_v6["a.root-servers.net"] = "2001:503:ba3e::2:30"
- rootservers_v6["f.root-servers.net"] = "2001:500:2f::f"
- rootservers_v6["h.root-servers.net"] = "2001:500:1::803f:235"
- rootservers_v6["j.root-servers.net"] = "2001:503:c27::2:30"
- rootservers_v6["k.root-servers.net"] = "2001:7fd::1"
- rootservers_v6["m.root-servers.net"] = "2001:dc3::35"
-
- container_dn = "DC=RootDNSServers,CN=MicrosoftDNS,%s,%s" % (prefix, domaindn)
-
- # Add DC=RootDNSServers,CN=MicrosoftDNS,<PREFIX>,<DOMAINDN>
- msg = ldb.Message(ldb.Dn(samdb, container_dn))
- props = []
- props.append(ndr_pack(TypeProperty(zone_type=dnsp.DNS_ZONE_TYPE_CACHE)))
- props.append(ndr_pack(AllowUpdateProperty(allow_update=dnsp.DNS_ZONE_UPDATE_OFF)))
- props.append(ndr_pack(SecureTimeProperty()))
- props.append(ndr_pack(NorefreshIntervalProperty()))
- props.append(ndr_pack(RefreshIntervalProperty()))
- props.append(ndr_pack(AgingStateProperty()))
- props.append(ndr_pack(AgingEnabledTimeProperty()))
- msg["objectClass"] = ["top", "dnsZone"]
- msg["cn"] = ldb.MessageElement("Zone", ldb.FLAG_MOD_ADD, "cn")
- msg["dNSProperty"] = ldb.MessageElement(props, ldb.FLAG_MOD_ADD, "dNSProperty")
- samdb.add(msg)
-
- # Add DC=@,DC=RootDNSServers,CN=MicrosoftDNS,<PREFIX>,<DOMAINDN>
- record = []
- for rserver in rootservers:
- record.append(ndr_pack(NSRecord(rserver, serial=0, ttl=0, rank=dnsp.DNS_RANK_ROOT_HINT)))
-
- msg = ldb.Message(ldb.Dn(samdb, "DC=@,%s" % container_dn))
- msg["objectClass"] = ["top", "dnsNode"]
- msg["dnsRecord"] = ldb.MessageElement(record, ldb.FLAG_MOD_ADD, "dnsRecord")
- samdb.add(msg)
-
- # Add DC=<rootserver>,DC=RootDNSServers,CN=MicrosoftDNS,<PREFIX>,<DOMAINDN>
- for rserver in rootservers:
- record = [ndr_pack(ARecord(rootservers[rserver], serial=0, ttl=0, rank=dnsp.DNS_RANK_ROOT_HINT))]
- # Add AAAA record as well (How does W2K* add IPv6 records?)
- #if rserver in rootservers_v6:
- # record.append(ndr_pack(AAAARecord(rootservers_v6[rserver], serial=0, ttl=0)))
- msg = ldb.Message(ldb.Dn(samdb, "DC=%s,%s" % (rserver, container_dn)))
- msg["objectClass"] = ["top", "dnsNode"]
- msg["dnsRecord"] = ldb.MessageElement(record, ldb.FLAG_MOD_ADD, "dnsRecord")
- samdb.add(msg)
-
-def add_at_record(samdb, container_dn, prefix, hostname, dnsdomain, hostip, hostip6):
-
- fqdn_hostname = "%s.%s" % (hostname, dnsdomain)
-
- at_records = []
-
- # SOA record
- at_soa_record = SOARecord(fqdn_hostname, "hostmaster.%s" % dnsdomain)
- at_records.append(ndr_pack(at_soa_record))
-
- # NS record
- at_ns_record = NSRecord(fqdn_hostname)
- at_records.append(ndr_pack(at_ns_record))
-
- if hostip is not None:
- # A record
- at_a_record = ARecord(hostip)
- at_records.append(ndr_pack(at_a_record))
-
- if hostip6 is not None:
- # AAAA record
- at_aaaa_record = AAAARecord(hostip6)
- at_records.append(ndr_pack(at_aaaa_record))
-
- msg = ldb.Message(ldb.Dn(samdb, "DC=@,%s" % container_dn))
- msg["objectClass"] = ["top", "dnsNode"]
- msg["dnsRecord"] = ldb.MessageElement(at_records, ldb.FLAG_MOD_ADD, "dnsRecord")
- samdb.add(msg)
-
-
-def add_srv_record(samdb, container_dn, prefix, host, port):
- srv_record = SRVRecord(host, port)
- msg = ldb.Message(ldb.Dn(samdb, "%s,%s" % (prefix, container_dn)))
- msg["objectClass"] = ["top", "dnsNode"]
- msg["dnsRecord"] = ldb.MessageElement(ndr_pack(srv_record), ldb.FLAG_MOD_ADD, "dnsRecord")
- samdb.add(msg)
-
-
-def add_ns_record(samdb, container_dn, prefix, host):
- ns_record = NSRecord(host)
- msg = ldb.Message(ldb.Dn(samdb, "%s,%s" % (prefix, container_dn)))
- msg["objectClass"] = ["top", "dnsNode"]
- msg["dnsRecord"] = ldb.MessageElement(ndr_pack(ns_record), ldb.FLAG_MOD_ADD, "dnsRecord")
- samdb.add(msg)
-
-
-def add_ns_glue_record(samdb, container_dn, prefix, host):
- ns_record = NSRecord(host, rank=dnsp.DNS_RANK_NS_GLUE)
- msg = ldb.Message(ldb.Dn(samdb, "%s,%s" % (prefix, container_dn)))
- msg["objectClass"] = ["top", "dnsNode"]
- msg["dnsRecord"] = ldb.MessageElement(ndr_pack(ns_record), ldb.FLAG_MOD_ADD, "dnsRecord")
- samdb.add(msg)
-
-
-def add_cname_record(samdb, container_dn, prefix, host):
- cname_record = CNameRecord(host)
- msg = ldb.Message(ldb.Dn(samdb, "%s,%s" % (prefix, container_dn)))
- msg["objectClass"] = ["top", "dnsNode"]
- msg["dnsRecord"] = ldb.MessageElement(ndr_pack(cname_record), ldb.FLAG_MOD_ADD, "dnsRecord")
- samdb.add(msg)
-
-
-def add_host_record(samdb, container_dn, prefix, hostip, hostip6):
- host_records = []
- if hostip:
- a_record = ARecord(hostip)
- host_records.append(ndr_pack(a_record))
- if hostip6:
- aaaa_record = AAAARecord(hostip6)
- host_records.append(ndr_pack(aaaa_record))
- if host_records:
- msg = ldb.Message(ldb.Dn(samdb, "%s,%s" % (prefix, container_dn)))
- msg["objectClass"] = ["top", "dnsNode"]
- msg["dnsRecord"] = ldb.MessageElement(host_records, ldb.FLAG_MOD_ADD, "dnsRecord")
- samdb.add(msg)
-
-
-def add_domain_record(samdb, domaindn, prefix, dnsdomain, domainsid, dnsadmins_sid):
- # DC=<DNSDOMAIN>,CN=MicrosoftDNS,<PREFIX>,<DOMAINDN>
- sddl = "O:SYG:BAD:AI" \
- "(A;;RPWPCRCCDCLCLORCWOWDSDDTSW;;;DA)" \
- "(A;;CC;;;AU)" \
- "(A;;RPLCLORC;;;WD)" \
- "(A;;RPWPCRCCDCLCLORCWOWDSDDTSW;;;SY)" \
- "(A;CI;RPWPCRCCDCLCRCWOWDSDDTSW;;;ED)" \
- "(A;CIID;RPWPCRCCDCLCRCWOWDSDDTSW;;;%s)" \
- "(A;CIID;RPWPCRCCDCLCRCWOWDSDDTSW;;;ED)" \
- "(OA;CIID;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)" \
- "(A;CIID;RPWPCRCCDCLCLORCWOWDSDDTSW;;;EA)" \
- "(A;CIID;LC;;;RU)" \
- "(A;CIID;RPWPCRCCLCLORCWOWDSDSW;;;BA)" \
- "S:AI" % dnsadmins_sid
- sec = security.descriptor.from_sddl(sddl, domainsid)
- props = []
- props.append(ndr_pack(TypeProperty()))
- props.append(ndr_pack(AllowUpdateProperty()))
- props.append(ndr_pack(SecureTimeProperty()))
- props.append(ndr_pack(NorefreshIntervalProperty(norefresh_interval=168)))
- props.append(ndr_pack(RefreshIntervalProperty(refresh_interval=168)))
- props.append(ndr_pack(AgingStateProperty()))
- props.append(ndr_pack(AgingEnabledTimeProperty()))
- msg = ldb.Message(ldb.Dn(samdb, "DC=%s,CN=MicrosoftDNS,%s,%s" % (dnsdomain, prefix, domaindn)))
- msg["objectClass"] = ["top", "dnsZone"]
- msg["ntSecurityDescriptor"] = ldb.MessageElement(ndr_pack(sec), ldb.FLAG_MOD_ADD,
- "nTSecurityDescriptor")
- msg["dNSProperty"] = ldb.MessageElement(props, ldb.FLAG_MOD_ADD, "dNSProperty")
- samdb.add(msg)
-
-
-def add_msdcs_record(samdb, forestdn, prefix, dnsforest):
- # DC=_msdcs.<DNSFOREST>,CN=MicrosoftDNS,<PREFIX>,<FORESTDN>
- msg = ldb.Message(ldb.Dn(samdb, "DC=_msdcs.%s,CN=MicrosoftDNS,%s,%s" %
- (dnsforest, prefix, forestdn)))
- msg["objectClass"] = ["top", "dnsZone"]
- samdb.add(msg)
-
-
-def add_dc_domain_records(samdb, domaindn, prefix, site, dnsdomain, hostname,
- hostip, hostip6):
-
- fqdn_hostname = "%s.%s" % (hostname, dnsdomain)
-
- # Set up domain container - DC=<DNSDOMAIN>,CN=MicrosoftDNS,<PREFIX>,<DOMAINDN>
- domain_container_dn = ldb.Dn(samdb, "DC=%s,CN=MicrosoftDNS,%s,%s" %
- (dnsdomain, prefix, domaindn))
-
- # DC=@ record
- add_at_record(samdb, domain_container_dn, "DC=@", hostname, dnsdomain,
- hostip, hostip6)
-
- # DC=<HOSTNAME> record
- add_host_record(samdb, domain_container_dn, "DC=%s" % hostname, hostip,
- hostip6)
-
- # DC=_kerberos._tcp record
- add_srv_record(samdb, domain_container_dn, "DC=_kerberos._tcp",
- fqdn_hostname, 88)
-
- # DC=_kerberos._tcp.<SITENAME>._sites record
- add_srv_record(samdb, domain_container_dn, "DC=_kerberos._tcp.%s._sites" %
- site, fqdn_hostname, 88)
-
- # DC=_kerberos._udp record
- add_srv_record(samdb, domain_container_dn, "DC=_kerberos._udp",
- fqdn_hostname, 88)
-
- # DC=_kpasswd._tcp record
- add_srv_record(samdb, domain_container_dn, "DC=_kpasswd._tcp",
- fqdn_hostname, 464)
-
- # DC=_kpasswd._udp record
- add_srv_record(samdb, domain_container_dn, "DC=_kpasswd._udp",
- fqdn_hostname, 464)
-
- # DC=_ldap._tcp record
- add_srv_record(samdb, domain_container_dn, "DC=_ldap._tcp", fqdn_hostname,
- 389)
-
- # DC=_ldap._tcp.<SITENAME>._sites record
- add_srv_record(samdb, domain_container_dn, "DC=_ldap._tcp.%s._sites" %
- site, fqdn_hostname, 389)
-
- # FIXME: The number of SRV records depend on the various roles this DC has.
- # _gc and _msdcs records are added if the we are the forest dc and not subdomain dc
- #
- # Assumption: current DC is GC and add all the entries
-
- # DC=_gc._tcp record
- add_srv_record(samdb, domain_container_dn, "DC=_gc._tcp", fqdn_hostname,
- 3268)
-
- # DC=_gc._tcp.<SITENAME>,_sites record
- add_srv_record(samdb, domain_container_dn, "DC=_gc._tcp.%s._sites" % site,
- fqdn_hostname, 3268)
-
- # DC=_msdcs record
- add_ns_glue_record(samdb, domain_container_dn, "DC=_msdcs", fqdn_hostname)
-
- # FIXME: Following entries are added only if DomainDnsZones and ForestDnsZones partitions
- # are created
- #
- # Assumption: Additional entries won't hurt on os_level = 2000
-
- # DC=_ldap._tcp.<SITENAME>._sites.DomainDnsZones
- add_srv_record(samdb, domain_container_dn,
- "DC=_ldap._tcp.%s._sites.DomainDnsZones" % site, fqdn_hostname,
- 389)
-
- # DC=_ldap._tcp.<SITENAME>._sites.ForestDnsZones
- add_srv_record(samdb, domain_container_dn,
- "DC=_ldap._tcp.%s._sites.ForestDnsZones" % site, fqdn_hostname,
- 389)
-
- # DC=_ldap._tcp.DomainDnsZones
- add_srv_record(samdb, domain_container_dn, "DC=_ldap._tcp.DomainDnsZones",
- fqdn_hostname, 389)
-
- # DC=_ldap._tcp.ForestDnsZones
- add_srv_record(samdb, domain_container_dn, "DC=_ldap._tcp.ForestDnsZones",
- fqdn_hostname, 389)
-
- # DC=DomainDnsZones
- add_host_record(samdb, domain_container_dn, "DC=DomainDnsZones", hostip,
- hostip6)
-
- # DC=ForestDnsZones
- add_host_record(samdb, domain_container_dn, "DC=ForestDnsZones", hostip,
- hostip6)
-
-
-def add_dc_msdcs_records(samdb, forestdn, prefix, site, dnsforest, hostname,
- hostip, hostip6, domainguid, ntdsguid):
-
- fqdn_hostname = "%s.%s" % (hostname, dnsforest)
-
- # Set up forest container - DC=<DNSDOMAIN>,CN=MicrosoftDNS,<PREFIX>,<DOMAINDN>
- forest_container_dn = ldb.Dn(samdb, "DC=_msdcs.%s,CN=MicrosoftDNS,%s,%s" %
- (dnsforest, prefix, forestdn))
-
- # DC=@ record
- add_at_record(samdb, forest_container_dn, "DC=@", hostname, dnsforest,
- None, None)
-
- # DC=_kerberos._tcp.dc record
- add_srv_record(samdb, forest_container_dn, "DC=_kerberos._tcp.dc",
- fqdn_hostname, 88)
-
- # DC=_kerberos._tcp.<SITENAME>._sites.dc record
- add_srv_record(samdb, forest_container_dn,
- "DC=_kerberos._tcp.%s._sites.dc" % site, fqdn_hostname, 88)
-
- # DC=_ldap._tcp.dc record
- add_srv_record(samdb, forest_container_dn, "DC=_ldap._tcp.dc",
- fqdn_hostname, 389)
-
- # DC=_ldap._tcp.<SITENAME>._sites.dc record
- add_srv_record(samdb, forest_container_dn, "DC=_ldap._tcp.%s._sites.dc" %
- site, fqdn_hostname, 389)
-
- # DC=_ldap._tcp.<SITENAME>._sites.gc record
- add_srv_record(samdb, forest_container_dn, "DC=_ldap._tcp.%s._sites.gc" %
- site, fqdn_hostname, 3268)
-
- # DC=_ldap._tcp.gc record
- add_srv_record(samdb, forest_container_dn, "DC=_ldap._tcp.gc",
- fqdn_hostname, 3268)
-
- # DC=_ldap._tcp.pdc record
- add_srv_record(samdb, forest_container_dn, "DC=_ldap._tcp.pdc",
- fqdn_hostname, 389)
-
- # DC=gc record
- add_host_record(samdb, forest_container_dn, "DC=gc", hostip, hostip6)
-
- # DC=_ldap._tcp.<DOMAINGUID>.domains record
- add_srv_record(samdb, forest_container_dn,
- "DC=_ldap._tcp.%s.domains" % domainguid, fqdn_hostname, 389)
-
- # DC=<NTDSGUID>
- add_cname_record(samdb, forest_container_dn, "DC=%s" % ntdsguid,
- fqdn_hostname)
-
-
-def secretsdb_setup_dns(secretsdb, names, private_dir, realm,
- dnsdomain, dns_keytab_path, dnspass):
- """Add DNS specific bits to a secrets database.
-
- :param secretsdb: Ldb Handle to the secrets database
- :param names: Names shortcut
- :param machinepass: Machine password
- """
- try:
- os.unlink(os.path.join(private_dir, dns_keytab_path))
- except OSError:
- pass
-
- setup_ldb(secretsdb, setup_path("secrets_dns.ldif"), {
- "REALM": realm,
- "DNSDOMAIN": dnsdomain,
- "DNS_KEYTAB": dns_keytab_path,
- "DNSPASS_B64": b64encode(dnspass),
- "HOSTNAME": names.hostname,
- "DNSNAME" : '%s.%s' % (
- names.netbiosname.lower(), names.dnsdomain.lower())
- })
-
-
-def create_dns_dir(logger, paths):
- """Write out a DNS zone file, from the info in the current database.
-
- :param logger: Logger object
- :param paths: paths object
- """
- dns_dir = os.path.dirname(paths.dns)
-
- try:
- shutil.rmtree(dns_dir, True)
- except OSError:
- pass
-
- os.mkdir(dns_dir, 0770)
-
- if paths.bind_gid is not None:
- try:
- os.chown(dns_dir, -1, paths.bind_gid)
- # chmod needed to cope with umask
- os.chmod(dns_dir, 0770)
- except OSError:
- if not os.environ.has_key('SAMBA_SELFTEST'):
- logger.error("Failed to chown %s to bind gid %u" % (
- dns_dir, paths.bind_gid))
-
-
-def create_zone_file(lp, logger, paths, targetdir, dnsdomain,
- hostip, hostip6, hostname, realm, domainguid,
- ntdsguid, site):
- """Write out a DNS zone file, from the info in the current database.
-
- :param paths: paths object
- :param dnsdomain: DNS Domain name
- :param domaindn: DN of the Domain
- :param hostip: Local IPv4 IP
- :param hostip6: Local IPv6 IP
- :param hostname: Local hostname
- :param realm: Realm name
- :param domainguid: GUID of the domain.
- :param ntdsguid: GUID of the hosts nTDSDSA record.
- """
- assert isinstance(domainguid, str)
-
- if hostip6 is not None:
- hostip6_base_line = " IN AAAA " + hostip6
- hostip6_host_line = hostname + " IN AAAA " + hostip6
- gc_msdcs_ip6_line = "gc._msdcs IN AAAA " + hostip6
- else:
- hostip6_base_line = ""
- hostip6_host_line = ""
- gc_msdcs_ip6_line = ""
-
- if hostip is not None:
- hostip_base_line = " IN A " + hostip
- hostip_host_line = hostname + " IN A " + hostip
- gc_msdcs_ip_line = "gc._msdcs IN A " + hostip
- else:
- hostip_base_line = ""
- hostip_host_line = ""
- gc_msdcs_ip_line = ""
-
- # we need to freeze the zone while we update the contents
- if targetdir is None:
- rndc = ' '.join(lp.get("rndc command"))
- os.system(rndc + " freeze " + lp.get("realm"))
-
- setup_file(setup_path("provision.zone"), paths.dns, {
- "HOSTNAME": hostname,
- "DNSDOMAIN": dnsdomain,
- "REALM": realm,
- "HOSTIP_BASE_LINE": hostip_base_line,
- "HOSTIP_HOST_LINE": hostip_host_line,
- "DOMAINGUID": domainguid,
- "DATESTRING": time.strftime("%Y%m%d%H"),
- "DEFAULTSITE": site,
- "NTDSGUID": ntdsguid,
- "HOSTIP6_BASE_LINE": hostip6_base_line,
- "HOSTIP6_HOST_LINE": hostip6_host_line,
- "GC_MSDCS_IP_LINE": gc_msdcs_ip_line,
- "GC_MSDCS_IP6_LINE": gc_msdcs_ip6_line,
- })
-
- if paths.bind_gid is not None:
- try:
- os.chown(paths.dns, -1, paths.bind_gid)
- # chmod needed to cope with umask
- os.chmod(paths.dns, 0664)
- except OSError:
- if not os.environ.has_key('SAMBA_SELFTEST'):
- logger.error("Failed to chown %s to bind gid %u" % (
- paths.dns, paths.bind_gid))
-
- if targetdir is None:
- os.system(rndc + " unfreeze " + lp.get("realm"))
-
-
-def create_samdb_copy(samdb, logger, paths, names, domainsid, domainguid):
- """Create a copy of samdb and give write permissions to named for dns partitions
- """
- private_dir = paths.private_dir
- samldb_dir = os.path.join(private_dir, "sam.ldb.d")
- dns_dir = os.path.dirname(paths.dns)
- dns_samldb_dir = os.path.join(dns_dir, "sam.ldb.d")
-
- # Find the partitions and corresponding filenames
- partfile = {}
- res = samdb.search(base="@PARTITION", scope=ldb.SCOPE_BASE, attrs=["partition"])
- for tmp in res[0]["partition"]:
- (nc, fname) = tmp.split(':')
- partfile[nc.upper()] = fname
-
- # Create empty domain partition
- domaindn = names.domaindn.upper()
- domainpart_file = os.path.join(dns_dir, partfile[domaindn])
- try:
- os.mkdir(dns_samldb_dir)
- file(domainpart_file, 'w').close()
-
- # Fill the basedn and @OPTION records in domain partition
- dom_ldb = samba.Ldb(domainpart_file)
- domainguid_line = "objectGUID: %s\n-" % domainguid
- descr = b64encode(get_domain_descriptor(domainsid))
- setup_add_ldif(dom_ldb, setup_path("provision_basedn.ldif"), {
- "DOMAINDN" : names.domaindn,
- "DOMAINGUID" : domainguid_line,
- "DOMAINSID" : str(domainsid),
- "DESCRIPTOR" : descr})
- setup_add_ldif(dom_ldb,
- setup_path("provision_basedn_options.ldif"), None)
- except:
- logger.error(
- "Failed to setup database for BIND, AD based DNS cannot be used")
- raise
- del partfile[domaindn]
-
- # Link dns partitions and metadata
- domainzonedn = "DC=DOMAINDNSZONES,%s" % names.domaindn.upper()
- forestzonedn = "DC=FORESTDNSZONES,%s" % names.rootdn.upper()
- domainzone_file = partfile[domainzonedn]
- forestzone_file = partfile[forestzonedn]
- metadata_file = "metadata.tdb"
- try:
- os.link(os.path.join(samldb_dir, metadata_file),
- os.path.join(dns_samldb_dir, metadata_file))
- os.link(os.path.join(private_dir, domainzone_file),
- os.path.join(dns_dir, domainzone_file))
- os.link(os.path.join(private_dir, forestzone_file),
- os.path.join(dns_dir, forestzone_file))
- except OSError:
- logger.error(
- "Failed to setup database for BIND, AD based DNS cannot be used")
- raise
- del partfile[domainzonedn]
- del partfile[forestzonedn]
-
- # Copy root, config, schema partitions (and any other if any)
- # Since samdb is open in the current process, copy them in a child process
- try:
- tdb_copy(os.path.join(private_dir, "sam.ldb"),
- os.path.join(dns_dir, "sam.ldb"))
- for nc in partfile:
- pfile = partfile[nc]
- tdb_copy(os.path.join(private_dir, pfile),
- os.path.join(dns_dir, pfile))
- except:
- logger.error(
- "Failed to setup database for BIND, AD based DNS cannot be used")
- raise
-
- # Give bind read/write permissions dns partitions
- if paths.bind_gid is not None:
- try:
- os.chown(samldb_dir, -1, paths.bind_gid)
- os.chmod(samldb_dir, 0750)
-
- for dirname, dirs, files in os.walk(dns_dir):
- for d in dirs:
- dpath = os.path.join(dirname, d)
- os.chown(dpath, -1, paths.bind_gid)
- os.chmod(dpath, 0770)
- for f in files:
- if f.endswith('.ldb') or f.endswith('.tdb'):
- fpath = os.path.join(dirname, f)
- os.chown(fpath, -1, paths.bind_gid)
- os.chmod(fpath, 0660)
- except OSError:
- if not os.environ.has_key('SAMBA_SELFTEST'):
- logger.error(
- "Failed to set permissions to sam.ldb* files, fix manually")
- else:
- if not os.environ.has_key('SAMBA_SELFTEST'):
- logger.warning("""Unable to find group id for BIND,
- set permissions to sam.ldb* files manually""")
-
-
-def create_dns_update_list(lp, logger, paths):
- """Write out a dns_update_list file"""
- # note that we use no variable substitution on this file
- # the substitution is done at runtime by samba_dnsupdate, samba_spnupdate
- setup_file(setup_path("dns_update_list"), paths.dns_update_list, None)
- setup_file(setup_path("spn_update_list"), paths.spn_update_list, None)
-
-
-def create_named_conf(paths, realm, dnsdomain, dns_backend):
- """Write out a file containing zone statements suitable for inclusion in a
- named.conf file (including GSS-TSIG configuration).
-
- :param paths: all paths
- :param realm: Realm name
- :param dnsdomain: DNS Domain name
- :param dns_backend: DNS backend type
- :param keytab_name: File name of DNS keytab file
- """
-
- if dns_backend == "BIND9_FLATFILE":
- setup_file(setup_path("named.conf"), paths.namedconf, {
- "DNSDOMAIN": dnsdomain,
- "REALM": realm,
- "ZONE_FILE": paths.dns,
- "REALM_WC": "*." + ".".join(realm.split(".")[1:]),
- "NAMED_CONF": paths.namedconf,
- "NAMED_CONF_UPDATE": paths.namedconf_update
- })
-
- setup_file(setup_path("named.conf.update"), paths.namedconf_update)
-
- elif dns_backend == "BIND9_DLZ":
- setup_file(setup_path("named.conf.dlz"), paths.namedconf, {
- "NAMED_CONF": paths.namedconf,
- "MODULESDIR" : samba.param.modules_dir(),
- })
-
-
-def create_named_txt(path, realm, dnsdomain, dnsname, private_dir,
- keytab_name):
- """Write out a file containing zone statements suitable for inclusion in a
- named.conf file (including GSS-TSIG configuration).
-
- :param path: Path of the new named.conf file.
- :param realm: Realm name
- :param dnsdomain: DNS Domain name
- :param private_dir: Path to private directory
- :param keytab_name: File name of DNS keytab file
- """
- setup_file(setup_path("named.txt"), path, {
- "DNSDOMAIN": dnsdomain,
- "DNSNAME" : dnsname,
- "REALM": realm,
- "DNS_KEYTAB": keytab_name,
- "DNS_KEYTAB_ABS": os.path.join(private_dir, keytab_name),
- "PRIVATE_DIR": private_dir
- })
-
-
-def is_valid_dns_backend(dns_backend):
- return dns_backend in ("BIND9_FLATFILE", "BIND9_DLZ", "SAMBA_INTERNAL", "NONE")
-
-
-def is_valid_os_level(os_level):
- return DS_DOMAIN_FUNCTION_2000 <= os_level <= DS_DOMAIN_FUNCTION_2008_R2
-
-
-def create_dns_legacy(samdb, domainsid, forestdn, dnsadmins_sid):
- # Set up MicrosoftDNS container
- add_dns_container(samdb, forestdn, "CN=System", domainsid, dnsadmins_sid)
- # Add root servers
- add_rootservers(samdb, forestdn, "CN=System")
-
-
-def fill_dns_data_legacy(samdb, domainsid, forestdn, dnsdomain, site, hostname,
- hostip, hostip6, dnsadmins_sid):
- # Add domain record
- add_domain_record(samdb, forestdn, "CN=System", dnsdomain, domainsid,
- dnsadmins_sid)
-
- # Add DNS records for a DC in domain
- add_dc_domain_records(samdb, forestdn, "CN=System", site, dnsdomain,
- hostname, hostip, hostip6)
-
-
-def create_dns_partitions(samdb, domainsid, names, domaindn, forestdn,
- dnsadmins_sid):
- # Set up additional partitions (DomainDnsZones, ForstDnsZones)
- setup_dns_partitions(samdb, domainsid, domaindn, forestdn,
- names.configdn, names.serverdn)
-
- # Set up MicrosoftDNS containers
- add_dns_container(samdb, domaindn, "DC=DomainDnsZones", domainsid,
- dnsadmins_sid)
- add_dns_container(samdb, forestdn, "DC=ForestDnsZones", domainsid,
- dnsadmins_sid, forest=True)
-
-
-def fill_dns_data_partitions(samdb, domainsid, site, domaindn, forestdn,
- dnsdomain, dnsforest, hostname, hostip, hostip6,
- domainguid, ntdsguid, dnsadmins_sid, autofill=True):
- """Fill data in various AD partitions
-
- :param samdb: LDB object connected to sam.ldb file
- :param domainsid: Domain SID (as dom_sid object)
- :param site: Site name to create hostnames in
- :param domaindn: DN of the domain
- :param forestdn: DN of the forest
- :param dnsdomain: DNS name of the domain
- :param dnsforest: DNS name of the forest
- :param hostname: Host name of this DC
- :param hostip: IPv4 addresses
- :param hostip6: IPv6 addresses
- :param domainguid: Domain GUID
- :param ntdsguid: NTDS GUID
- :param dnsadmins_sid: SID for DnsAdmins group
- :param autofill: Create DNS records (using fixed template)
- """
-
- ##### Set up DC=DomainDnsZones,<DOMAINDN>
- # Add rootserver records
- add_rootservers(samdb, domaindn, "DC=DomainDnsZones")
-
- # Add domain record
- add_domain_record(samdb, domaindn, "DC=DomainDnsZones", dnsdomain,
- domainsid, dnsadmins_sid)
-
- # Add DNS records for a DC in domain
- if autofill:
- add_dc_domain_records(samdb, domaindn, "DC=DomainDnsZones", site,
- dnsdomain, hostname, hostip, hostip6)
-
- ##### Set up DC=ForestDnsZones,<DOMAINDN>
- # Add _msdcs record
- add_msdcs_record(samdb, forestdn, "DC=ForestDnsZones", dnsforest)
-
- # Add DNS records for a DC in forest
- if autofill:
- add_dc_msdcs_records(samdb, forestdn, "DC=ForestDnsZones", site,
- dnsforest, hostname, hostip, hostip6,
- domainguid, ntdsguid)
-
-
-def setup_ad_dns(samdb, secretsdb, domainsid, names, paths, lp, logger,
- dns_backend, os_level, site, dnspass=None, hostip=None, hostip6=None,
- targetdir=None):
- """Provision DNS information (assuming GC role)
-
- :param samdb: LDB object connected to sam.ldb file
- :param secretsdb: LDB object connected to secrets.ldb file
- :param domainsid: Domain SID (as dom_sid object)
- :param names: Names shortcut
- :param paths: Paths shortcut
- :param lp: Loadparm object
- :param logger: Logger object
- :param dns_backend: Type of DNS backend
- :param os_level: Functional level (treated as os level)
- :param site: Site to create hostnames in
- :param dnspass: Password for bind's DNS account
- :param hostip: IPv4 address
- :param hostip6: IPv6 address
- :param targetdir: Target directory for creating DNS-related files for BIND9
- """
-
- if not is_valid_dns_backend(dns_backend):
- raise Exception("Invalid dns backend: %r" % dns_backend)
-
- if not is_valid_os_level(os_level):
- raise Exception("Invalid os level: %r" % os_level)
-
- if dns_backend == "NONE":
- logger.info("No DNS backend set, not configuring DNS")
- return
-
- # Add dns accounts (DnsAdmins, DnsUpdateProxy) in domain
- logger.info("Adding DNS accounts")
- add_dns_accounts(samdb, names.domaindn)
-
- # If dns_backend is BIND9_FLATFILE
- # Populate only CN=MicrosoftDNS,CN=System,<FORESTDN>
- #
- # If dns_backend is SAMBA_INTERNAL or BIND9_DLZ
- # Populate DNS partitions
-
- # If os_level < 2003 (DS_DOMAIN_FUNCTION_2000)
- # All dns records are in CN=MicrosoftDNS,CN=System,<FORESTDN>
- #
- # If os_level >= 2003 (DS_DOMAIN_FUNCTION_2003, DS_DOMAIN_FUNCTION_2008,
- # DS_DOMAIN_FUNCTION_2008_R2)
- # Root server records are in CN=MicrosoftDNS,CN=System,<FORESTDN>
- # Domain records are in CN=MicrosoftDNS,CN=System,<FORESTDN>
- # Domain records are in CN=MicrosoftDNS,DC=DomainDnsZones,<DOMAINDN>
- # Forest records are in CN=MicrosoftDNS,DC=ForestDnsZones,<FORESTDN>
- domaindn = names.domaindn
- forestdn = samdb.get_root_basedn().get_linearized()
-
- dnsdomain = names.dnsdomain.lower()
- dnsforest = dnsdomain
-
- hostname = names.netbiosname.lower()
-
- dnsadmins_sid = get_dnsadmins_sid(samdb, domaindn)
- domainguid = get_domainguid(samdb, domaindn)
-
- # Create CN=System
- logger.info("Creating CN=MicrosoftDNS,CN=System,%s" % forestdn)
- create_dns_legacy(samdb, domainsid, forestdn, dnsadmins_sid)
-
- if os_level == DS_DOMAIN_FUNCTION_2000:
- # Populating legacy dns
- logger.info("Populating CN=MicrosoftDNS,CN=System,%s" % forestdn)
- fill_dns_data_legacy(samdb, domainsid, forestdn, dnsdomain, site,
- hostname, hostip, hostip6, dnsadmins_sid)
-
- elif dns_backend in ("SAMBA_INTERNAL", "BIND9_DLZ") and \
- os_level >= DS_DOMAIN_FUNCTION_2003:
-
- # Create DNS partitions
- logger.info("Creating DomainDnsZones and ForestDnsZones partitions")
- create_dns_partitions(samdb, domainsid, names, domaindn, forestdn,
- dnsadmins_sid)
-
- # Populating dns partitions
- logger.info("Populating DomainDnsZones and ForestDnsZones partitions")
- fill_dns_data_partitions(samdb, domainsid, site, domaindn, forestdn,
- dnsdomain, dnsforest, hostname, hostip, hostip6,
- domainguid, names.ntdsguid, dnsadmins_sid)
-
- if dns_backend.startswith("BIND9_"):
- setup_bind9_dns(samdb, secretsdb, domainsid, names, paths, lp, logger,
- dns_backend, os_level, site=site, dnspass=dnspass, hostip=hostip,
- hostip6=hostip6, targetdir=targetdir)
-
-
-def setup_bind9_dns(samdb, secretsdb, domainsid, names, paths, lp, logger,
- dns_backend, os_level, site=None, dnspass=None, hostip=None,
- hostip6=None, targetdir=None):
- """Provision DNS information (assuming BIND9 backend in DC role)
-
- :param samdb: LDB object connected to sam.ldb file
- :param secretsdb: LDB object connected to secrets.ldb file
- :param domainsid: Domain SID (as dom_sid object)
- :param names: Names shortcut
- :param paths: Paths shortcut
- :param lp: Loadparm object
- :param logger: Logger object
- :param dns_backend: Type of DNS backend
- :param os_level: Functional level (treated as os level)
- :param site: Site to create hostnames in
- :param dnspass: Password for bind's DNS account
- :param hostip: IPv4 address
- :param hostip6: IPv6 address
- :param targetdir: Target directory for creating DNS-related files for BIND9
- """
-
- if (not is_valid_dns_backend(dns_backend) or
- not dns_backend.startswith("BIND9_")):
- raise Exception("Invalid dns backend: %r" % dns_backend)
-
- if not is_valid_os_level(os_level):
- raise Exception("Invalid os level: %r" % os_level)
-
- domaindn = names.domaindn
-
- domainguid = get_domainguid(samdb, domaindn)
-
- secretsdb_setup_dns(secretsdb, names,
- paths.private_dir, realm=names.realm,
- dnsdomain=names.dnsdomain,
- dns_keytab_path=paths.dns_keytab, dnspass=dnspass)
-
- create_dns_dir(logger, paths)
-
- if dns_backend == "BIND9_FLATFILE":
- create_zone_file(lp, logger, paths, targetdir, site=site,
- dnsdomain=names.dnsdomain, hostip=hostip,
- hostip6=hostip6, hostname=names.hostname,
- realm=names.realm, domainguid=domainguid,
- ntdsguid=names.ntdsguid)
-
- if dns_backend == "BIND9_DLZ" and os_level >= DS_DOMAIN_FUNCTION_2003:
- create_samdb_copy(samdb, logger, paths, names, domainsid, domainguid)
-
- create_named_conf(paths, realm=names.realm,
- dnsdomain=names.dnsdomain, dns_backend=dns_backend)
-
- create_named_txt(paths.namedtxt,
- realm=names.realm, dnsdomain=names.dnsdomain,
- dnsname = "%s.%s" % (names.hostname, names.dnsdomain),
- private_dir=paths.private_dir,
- keytab_name=paths.dns_keytab)
- logger.info("See %s for an example configuration include file for BIND",
- paths.namedconf)
- logger.info("and %s for further documentation required for secure DNS "
- "updates", paths.namedtxt)