diff options
| author | Abhishek Koneru <akoneru@redhat.com> | 2013-06-20 16:25:40 -0400 |
|---|---|---|
| committer | Abhishek Koneru <akoneru@redhat.com> | 2013-06-27 08:08:06 -0400 |
| commit | 66c34cfbe1ca67c7ad7b5fddae26cd1b2d53e8c4 (patch) | |
| tree | b83d9d4d357e7c028f87e5224f1bbbfeea87f503 /base/server/src/scriptlets/initialization.py | |
| parent | 3e1d74f6ddf90e2499420add9bb9bfafa968722a (diff) | |
| download | pki-66c34cfbe1ca67c7ad7b5fddae26cd1b2d53e8c4.tar.gz pki-66c34cfbe1ca67c7ad7b5fddae26cd1b2d53e8c4.tar.xz pki-66c34cfbe1ca67c7ad7b5fddae26cd1b2d53e8c4.zip | |
Code refactored for global variables and utility classes.
Added a new class PKIDeployer, whose object holds references to
global dictionaries for master and slots and also objects of
utility classes in pkihelper.py. This object once created in
pkispawn/pkidestroy will be passed on to the PKIScriptlets and
used. This also fixes few pylint related errors (E1120)
Ticket #316
Diffstat (limited to 'base/server/src/scriptlets/initialization.py')
| -rw-r--r-- | base/server/src/scriptlets/initialization.py | 64 |
1 files changed, 32 insertions, 32 deletions
diff --git a/base/server/src/scriptlets/initialization.py b/base/server/src/scriptlets/initialization.py index f3839fb05..80b28a663 100644 --- a/base/server/src/scriptlets/initialization.py +++ b/base/server/src/scriptlets/initialization.py @@ -21,8 +21,6 @@ # PKI Deployment Imports import pkiconfig as config -from pkiconfig import pki_master_dict as master -import pkihelper as util import pkimessages as log import pkiscriptlet @@ -31,73 +29,75 @@ import pkiscriptlet class PkiScriptlet(pkiscriptlet.AbstractBasePkiScriptlet): rv = 0 - def spawn(self): + def spawn(self, deployer): + # begin official logging config.pki_log.info(log.PKISPAWN_BEGIN_MESSAGE_2, - master['pki_subsystem'], - master['pki_instance_name'], + deployer.master_dict['pki_subsystem'], + deployer.master_dict['pki_instance_name'], extra=config.PKI_INDENTATION_LEVEL_0) - if config.str2bool(master['pki_skip_installation']): + if config.str2bool(deployer.master_dict['pki_skip_installation']): config.pki_log.info(log.SKIP_INITIALIZATION_SPAWN_1, __name__, extra=config.PKI_INDENTATION_LEVEL_1) return self.rv else: config.pki_log.info(log.INITIALIZATION_SPAWN_1, __name__, extra=config.PKI_INDENTATION_LEVEL_1) - if master['pki_subsystem'] == "CA" and\ - config.str2bool(master['pki_external_step_two']): + if deployer.master_dict['pki_subsystem'] == "CA" and\ + config.str2bool(deployer.master_dict['pki_external_step_two']): # verify that this type of "subsystem" currently EXISTS # for this "instance" (External CA Step 2) - util.instance.verify_subsystem_exists() - master['pki_skip_installation'] = "True"; + deployer.instance.verify_subsystem_exists() + deployer.master_dict['pki_skip_installation'] = "True"; else: # verify that this type of "subsystem" does NOT yet # exist for this "instance" - util.instance.verify_subsystem_does_not_exist() + deployer.instance.verify_subsystem_does_not_exist() # detect and avoid any namespace collisions - util.namespace.collision_detection() + deployer.namespace.collision_detection() # initialize 'uid' and 'gid' - util.identity.add_uid_and_gid(master['pki_user'], master['pki_group']) + deployer.identity.add_uid_and_gid(deployer.master_dict['pki_user'], deployer.master_dict['pki_group']) # establish 'uid' and 'gid' - util.identity.set_uid(master['pki_user']) - util.identity.set_gid(master['pki_group']) + deployer.identity.set_uid(deployer.master_dict['pki_user']) + deployer.identity.set_gid(deployer.master_dict['pki_group']) # verify existence of SENSITIVE configuration file data - util.configuration_file.verify_sensitive_data() + deployer.configuration_file.verify_sensitive_data() # verify existence of MUTUALLY EXCLUSIVE configuration file data - util.configuration_file.verify_mutually_exclusive_data() + deployer.configuration_file.verify_mutually_exclusive_data() # verify existence of PREDEFINED configuration file data - util.configuration_file.verify_predefined_configuration_file_data() + deployer.configuration_file.verify_predefined_configuration_file_data() # verify selinux context of selected ports - util.configuration_file.populate_non_default_ports() - util.configuration_file.verify_selinux_ports() + deployer.configuration_file.populate_non_default_ports() + deployer.configuration_file.verify_selinux_ports() return self.rv - def destroy(self): + def destroy(self, deployer): + # begin official logging config.pki_log.info(log.PKIDESTROY_BEGIN_MESSAGE_2, - master['pki_subsystem'], - master['pki_instance_name'], + deployer.master_dict['pki_subsystem'], + deployer.master_dict['pki_instance_name'], extra=config.PKI_INDENTATION_LEVEL_0) config.pki_log.info(log.INITIALIZATION_DESTROY_1, __name__, extra=config.PKI_INDENTATION_LEVEL_1) # verify that this type of "subsystem" currently EXISTS # for this "instance" - util.instance.verify_subsystem_exists() + deployer.instance.verify_subsystem_exists() # verify that the command-line parameters match the values # that are present in the corresponding configuration file - util.configuration_file.verify_command_matches_configuration_file() + deployer.configuration_file.verify_command_matches_configuration_file() # establish 'uid' and 'gid' - util.identity.set_uid(master['pki_user']) - util.identity.set_gid(master['pki_group']) + deployer.identity.set_uid(deployer.master_dict['pki_user']) + deployer.identity.set_gid(deployer.master_dict['pki_group']) # get ports to remove selinux context - util.configuration_file.populate_non_default_ports() + deployer.configuration_file.populate_non_default_ports() # get deinstallation token - token = util.security_domain.get_installation_token( + token = deployer.security_domain.get_installation_token( config.pki_secdomain_user, config.pki_secdomain_pass) # remove kra connector from CA if this is a KRA - util.kra_connector.deregister() + deployer.kra_connector.deregister() # de-register instance from its Security Domain # @@ -107,7 +107,7 @@ class PkiScriptlet(pkiscriptlet.AbstractBasePkiScriptlet): # instance's security domain may be a part of a # tightly-coupled shared instance. # - util.security_domain.deregister(token) + deployer.security_domain.deregister(token) # ALWAYS Stop this Apache/Tomcat PKI Process - util.systemd.stop() + deployer.systemd.stop() return self.rv |
