summaryrefslogtreecommitdiffstats
path: root/base/server/src/scriptlets/initialization.py
diff options
context:
space:
mode:
Diffstat (limited to 'base/server/src/scriptlets/initialization.py')
-rw-r--r--base/server/src/scriptlets/initialization.py64
1 files changed, 32 insertions, 32 deletions
diff --git a/base/server/src/scriptlets/initialization.py b/base/server/src/scriptlets/initialization.py
index f3839fb05..80b28a663 100644
--- a/base/server/src/scriptlets/initialization.py
+++ b/base/server/src/scriptlets/initialization.py
@@ -21,8 +21,6 @@
# PKI Deployment Imports
import pkiconfig as config
-from pkiconfig import pki_master_dict as master
-import pkihelper as util
import pkimessages as log
import pkiscriptlet
@@ -31,73 +29,75 @@ import pkiscriptlet
class PkiScriptlet(pkiscriptlet.AbstractBasePkiScriptlet):
rv = 0
- def spawn(self):
+ def spawn(self, deployer):
+
# begin official logging
config.pki_log.info(log.PKISPAWN_BEGIN_MESSAGE_2,
- master['pki_subsystem'],
- master['pki_instance_name'],
+ deployer.master_dict['pki_subsystem'],
+ deployer.master_dict['pki_instance_name'],
extra=config.PKI_INDENTATION_LEVEL_0)
- if config.str2bool(master['pki_skip_installation']):
+ if config.str2bool(deployer.master_dict['pki_skip_installation']):
config.pki_log.info(log.SKIP_INITIALIZATION_SPAWN_1, __name__,
extra=config.PKI_INDENTATION_LEVEL_1)
return self.rv
else:
config.pki_log.info(log.INITIALIZATION_SPAWN_1, __name__,
extra=config.PKI_INDENTATION_LEVEL_1)
- if master['pki_subsystem'] == "CA" and\
- config.str2bool(master['pki_external_step_two']):
+ if deployer.master_dict['pki_subsystem'] == "CA" and\
+ config.str2bool(deployer.master_dict['pki_external_step_two']):
# verify that this type of "subsystem" currently EXISTS
# for this "instance" (External CA Step 2)
- util.instance.verify_subsystem_exists()
- master['pki_skip_installation'] = "True";
+ deployer.instance.verify_subsystem_exists()
+ deployer.master_dict['pki_skip_installation'] = "True";
else:
# verify that this type of "subsystem" does NOT yet
# exist for this "instance"
- util.instance.verify_subsystem_does_not_exist()
+ deployer.instance.verify_subsystem_does_not_exist()
# detect and avoid any namespace collisions
- util.namespace.collision_detection()
+ deployer.namespace.collision_detection()
# initialize 'uid' and 'gid'
- util.identity.add_uid_and_gid(master['pki_user'], master['pki_group'])
+ deployer.identity.add_uid_and_gid(deployer.master_dict['pki_user'], deployer.master_dict['pki_group'])
# establish 'uid' and 'gid'
- util.identity.set_uid(master['pki_user'])
- util.identity.set_gid(master['pki_group'])
+ deployer.identity.set_uid(deployer.master_dict['pki_user'])
+ deployer.identity.set_gid(deployer.master_dict['pki_group'])
# verify existence of SENSITIVE configuration file data
- util.configuration_file.verify_sensitive_data()
+ deployer.configuration_file.verify_sensitive_data()
# verify existence of MUTUALLY EXCLUSIVE configuration file data
- util.configuration_file.verify_mutually_exclusive_data()
+ deployer.configuration_file.verify_mutually_exclusive_data()
# verify existence of PREDEFINED configuration file data
- util.configuration_file.verify_predefined_configuration_file_data()
+ deployer.configuration_file.verify_predefined_configuration_file_data()
# verify selinux context of selected ports
- util.configuration_file.populate_non_default_ports()
- util.configuration_file.verify_selinux_ports()
+ deployer.configuration_file.populate_non_default_ports()
+ deployer.configuration_file.verify_selinux_ports()
return self.rv
- def destroy(self):
+ def destroy(self, deployer):
+
# begin official logging
config.pki_log.info(log.PKIDESTROY_BEGIN_MESSAGE_2,
- master['pki_subsystem'],
- master['pki_instance_name'],
+ deployer.master_dict['pki_subsystem'],
+ deployer.master_dict['pki_instance_name'],
extra=config.PKI_INDENTATION_LEVEL_0)
config.pki_log.info(log.INITIALIZATION_DESTROY_1, __name__,
extra=config.PKI_INDENTATION_LEVEL_1)
# verify that this type of "subsystem" currently EXISTS
# for this "instance"
- util.instance.verify_subsystem_exists()
+ deployer.instance.verify_subsystem_exists()
# verify that the command-line parameters match the values
# that are present in the corresponding configuration file
- util.configuration_file.verify_command_matches_configuration_file()
+ deployer.configuration_file.verify_command_matches_configuration_file()
# establish 'uid' and 'gid'
- util.identity.set_uid(master['pki_user'])
- util.identity.set_gid(master['pki_group'])
+ deployer.identity.set_uid(deployer.master_dict['pki_user'])
+ deployer.identity.set_gid(deployer.master_dict['pki_group'])
# get ports to remove selinux context
- util.configuration_file.populate_non_default_ports()
+ deployer.configuration_file.populate_non_default_ports()
# get deinstallation token
- token = util.security_domain.get_installation_token(
+ token = deployer.security_domain.get_installation_token(
config.pki_secdomain_user, config.pki_secdomain_pass)
# remove kra connector from CA if this is a KRA
- util.kra_connector.deregister()
+ deployer.kra_connector.deregister()
# de-register instance from its Security Domain
#
@@ -107,7 +107,7 @@ class PkiScriptlet(pkiscriptlet.AbstractBasePkiScriptlet):
# instance's security domain may be a part of a
# tightly-coupled shared instance.
#
- util.security_domain.deregister(token)
+ deployer.security_domain.deregister(token)
# ALWAYS Stop this Apache/Tomcat PKI Process
- util.systemd.stop()
+ deployer.systemd.stop()
return self.rv