summaryrefslogtreecommitdiffstats
path: root/install/tools/ipa-server-install
diff options
context:
space:
mode:
authorMartin Kosek <mkosek@redhat.com>2012-03-06 13:26:45 +0100
committerRob Crittenden <rcritten@redhat.com>2012-03-11 22:11:41 -0400
commitc956b3cd2ba12d87054909af3dce7d231f034240 (patch)
treee810788604eb2436648de82717e114ed021394fc /install/tools/ipa-server-install
parent79d4a34cc980da7395ab7d6184024ac2fe1fea39 (diff)
downloadfreeipa-c956b3cd2ba12d87054909af3dce7d231f034240.tar.gz
freeipa-c956b3cd2ba12d87054909af3dce7d231f034240.tar.xz
freeipa-c956b3cd2ba12d87054909af3dce7d231f034240.zip
Refresh resolvers after DNS install
Server framework calls acutil.res_send() to send DNS queries used for various DNS tests. However, once acutil is imported it does not change its list of configured resolvers even when /etc/resolv.conf is changed. This may lead to unexpected resolution issues. We should at least reload httpd when we change /etc/resolv.conf to point to FreeIPA nameserver to force a new import of acutil and thus workaround this bug until it is resolved in authconfig. https://fedorahosted.org/freeipa/ticket/2481
Diffstat (limited to 'install/tools/ipa-server-install')
-rwxr-xr-xinstall/tools/ipa-server-install8
1 files changed, 4 insertions, 4 deletions
diff --git a/install/tools/ipa-server-install b/install/tools/ipa-server-install
index c379dd777..9c7388b40 100755
--- a/install/tools/ipa-server-install
+++ b/install/tools/ipa-server-install
@@ -1009,10 +1009,6 @@ def main():
service.print_msg("Restarting the KDC")
krb.restart()
- # Restart httpd to pick up the new IPA configuration
- service.print_msg("Restarting the web server")
- http.restart()
-
# Create a BIND instance
bind = bindinstance.BindInstance(fstore, dm_password)
bind.setup(host_name, ip_address, realm_name, domain_name, dns_forwarders,
@@ -1026,6 +1022,10 @@ def main():
else:
bind.create_sample_bind_zone()
+ # Restart httpd to pick up the new IPA configuration
+ service.print_msg("Restarting the web server")
+ http.restart()
+
# Set the admin user kerberos password
ds.change_admin_password(admin_password)