summaryrefslogtreecommitdiffstats
path: root/base/server/python
diff options
context:
space:
mode:
Diffstat (limited to 'base/server/python')
-rw-r--r--base/server/python/pki/server/deployment/pkiparser.py33
1 files changed, 30 insertions, 3 deletions
diff --git a/base/server/python/pki/server/deployment/pkiparser.py b/base/server/python/pki/server/deployment/pkiparser.py
index 115f3ca45..6e922cf6c 100644
--- a/base/server/python/pki/server/deployment/pkiparser.py
+++ b/base/server/python/pki/server/deployment/pkiparser.py
@@ -564,6 +564,24 @@ class PKIConfigParser:
root = ET.fromstring(response)
return root.findtext("Status")
+ def normalize_cert_token(self, name):
+
+ # get cert token
+ token = self.mdict.get(name)
+
+ # if not specified, get default token name
+ if not token:
+ token = self.mdict.get('pki_token_name')
+
+ # normalize internal token name
+ if not token or \
+ token.lower() == 'internal' or \
+ token.lower() == 'internal key storage token':
+ token = 'Internal Key Storage Token'
+
+ # update cert token
+ self.mdict[name] = token
+
def compose_pki_master_dictionary(self):
"""
Create a single master PKI dictionary from the
@@ -595,11 +613,11 @@ class PKIConfigParser:
instance = pki.server.PKIInstance(self.mdict['pki_instance_name'])
instance.load()
- internal_password = self.mdict['pki_self_signed_token']
+ internal_token = self.mdict['pki_self_signed_token']
# if instance already exists and has password, reuse the password
- if internal_password in instance.passwords:
- self.mdict['pki_pin'] = instance.passwords.get(internal_password)
+ if internal_token in instance.passwords:
+ self.mdict['pki_pin'] = instance.passwords.get(internal_token)
# otherwise, use user-provided password if specified
elif 'pki_pin' in self.mdict:
@@ -1207,6 +1225,15 @@ class PKIConfigParser:
# always normalize 'default' softokn name
self.mdict['pki_token_name'] = "internal"
+ # normalize cert tokens
+ self.normalize_cert_token('pki_audit_signing_token')
+ self.normalize_cert_token('pki_ssl_server_token')
+ self.normalize_cert_token('pki_subsystem_token')
+ self.normalize_cert_token('pki_ca_signing_token')
+ self.normalize_cert_token('pki_ocsp_signing_token')
+ self.normalize_cert_token('pki_storage_token')
+ self.normalize_cert_token('pki_transport_token')
+
# if security domain user is not defined
if not len(self.mdict['pki_security_domain_user']):