summaryrefslogtreecommitdiffstats
path: root/ipaserver/install/cainstance.py
diff options
context:
space:
mode:
authorAde Lee <alee@redhat.com>2012-08-15 22:53:51 -0400
committerRob Crittenden <rcritten@redhat.com>2012-09-17 18:43:36 -0400
commit3dd31a875650c7fe7c67ca6b47f2058c1181dafb (patch)
tree137f46dfe1684ebcbd6e9e70ef3c5a690ab32d07 /ipaserver/install/cainstance.py
parent79b89f41962985cf0ab96238b21409b5874f67f8 (diff)
downloadfreeipa-3dd31a875650c7fe7c67ca6b47f2058c1181dafb.tar.gz
freeipa-3dd31a875650c7fe7c67ca6b47f2058c1181dafb.tar.xz
freeipa-3dd31a875650c7fe7c67ca6b47f2058c1181dafb.zip
Modifications to install scripts for dogtag 10
Dogtag 10 uses a new installer, new directory layout and new default ports. This patch changes the ipa install code to integrate these changes. https://fedorahosted.org/freeipa/ticket/2846
Diffstat (limited to 'ipaserver/install/cainstance.py')
-rw-r--r--ipaserver/install/cainstance.py335
1 files changed, 137 insertions, 198 deletions
diff --git a/ipaserver/install/cainstance.py b/ipaserver/install/cainstance.py
index 1d953757c..4ab58d062 100644
--- a/ipaserver/install/cainstance.py
+++ b/ipaserver/install/cainstance.py
@@ -65,15 +65,10 @@ PKI_USER = "pkiuser"
PKI_DS_USER = "pkisrv"
# These values come from /usr/share/pki/ca/setup/postinstall
-PKI_INSTANCE_NAME="pki-ca"
-AGENT_SECURE_PORT=9443
-EE_SECURE_PORT=9444
-ADMIN_SECURE_PORT=9445
-EE_CLIENT_AUTH_PORT=9446
-UNSECURE_PORT=9180
-TOMCAT_SERVER_PORT=9701
+PKI_INSTANCE_NAME="pki-tomcat"
+AGENT_SECURE_PORT=8443
-IPA_SERVICE_PROFILE = '/var/lib/%s/profiles/ca/caIPAserviceCert.cfg' % PKI_INSTANCE_NAME
+IPA_SERVICE_PROFILE = '/var/lib/pki/%s/ca/profiles/ca/caIPAserviceCert.cfg' % PKI_INSTANCE_NAME
# We need to reset the template because the CA uses the regular boot
# information
@@ -97,9 +92,9 @@ def check_inst():
"""
# Check for a couple of binaries we need
- if not os.path.exists('/usr/bin/pkicreate'):
+ if not os.path.exists('/bin/pkispawn'):
return False
- if not os.path.exists('/usr/bin/pkisilent'):
+ if not os.path.exists('/bin/pkidestroy'):
return False
# This is the template tomcat file for a CA
@@ -108,31 +103,6 @@ def check_inst():
return True
-def get_preop_pin(instance_root, instance_name):
- preop_pin = None
-
- filename = instance_root + "/" + instance_name + "/conf/CS.cfg"
-
- # read the config file and get the preop pin
- try:
- f=open(filename)
- except IOError, e:
- root_logger.error("Cannot open configuration file." + str(e))
- raise e
- data = f.read()
- data = data.split('\n')
- pattern = re.compile("preop.pin=(.*)" )
- for line in data:
- match = re.search(pattern, line)
- if (match):
- preop_pin=match.group(1)
- break
-
- if preop_pin is None:
- raise RuntimeError("Unable to find preop.pin in %s. Is your CA already configured?" % filename)
-
- return preop_pin
-
def import_pkcs12(input_file, input_passwd, cert_database,
cert_passwd):
ipautil.run(["/usr/bin/pk12util", "-d", cert_database,
@@ -415,7 +385,7 @@ class CADSInstance(service.Service):
'ocspSigningCert cert-pki-ca',
'subsystemCert cert-pki-ca']:
try:
- certmonger.stop_tracking('/var/lib/pki-ca/alias', nickname=nickname)
+ certmonger.stop_tracking('/etc/pki/pki-tomcat/alias', nickname=nickname)
except (ipautil.CalledProcessError, RuntimeError), e:
root_logger.error("certmonger failed to stop tracking certificate: %s" % str(e))
@@ -444,7 +414,7 @@ class CAInstance(service.Service):
"""
def __init__(self, realm, ra_db):
- service.Service.__init__(self, "pki-cad")
+ service.Service.__init__(self, "pki-tomcatd")
self.realm = realm
self.dm_password = None
self.admin_password = None
@@ -468,7 +438,7 @@ class CAInstance(service.Service):
self.ra_agent_pwd = self.ra_agent_db + "/pwdfile.txt"
self.ds_port = DEFAULT_DSPORT
self.domain_name = "IPA"
- self.server_root = "/var/lib"
+ self.server_root = "/var/lib/pki"
self.ra_cert = None
self.requestId = None
@@ -489,8 +459,7 @@ class CAInstance(service.Service):
pkcs12_info=None, master_host=None, csr_file=None,
cert_file=None, cert_chain_file=None,
subject_base=None):
- """Create a CA instance. This may involve creating the pki-ca instance
- dogtag instance.
+ """Create a CA instance.
To create a clone, pass in pkcs12_info.
@@ -523,15 +492,11 @@ class CAInstance(service.Service):
self.external=2
self.step("creating certificate server user", self.__create_ca_user)
- if not ipautil.dir_exists("/var/lib/pki-ca"):
- self.step("creating pki-ca instance", self.create_instance)
- self.step("configuring certificate server instance", self.__configure_instance)
+ self.step("configuring certificate server instance", self.__spawn_instance)
self.step("disabling nonces", self.__disable_nonce)
# Step 1 of external is getting a CSR so we don't need to do these
# steps until we get a cert back from the external CA.
if self.external != 1:
- if not self.clone:
- self.step("creating CA agent PKCS#12 file in /root", self.__create_ca_agent_pkcs12)
if self.create_ra_agent_db:
self.step("creating RA agent certificate database", self.__create_ra_agent_db)
self.step("importing CA chain to RA certificate database", self.__import_ca_chain)
@@ -555,26 +520,117 @@ class CAInstance(service.Service):
self.start_creation("Configuring certificate server", 210)
- def create_instance(self):
+ def __spawn_instance(self):
"""
- If for some reason the instance doesn't exist, create a new one."
+ Create and configure a new instance using pkispawn.
+ pkispawn requires a configuration file with the appropriate
+ values substituted in.
"""
- args = ['/usr/bin/pkicreate',
- '-pki_instance_root', '/var/lib',
- '-pki_instance_name', PKI_INSTANCE_NAME,
- '-subsystem_type', 'ca',
- '-agent_secure_port', str(AGENT_SECURE_PORT),
- '-ee_secure_port', str(EE_SECURE_PORT),
- '-admin_secure_port', str(ADMIN_SECURE_PORT),
- '-ee_secure_client_auth_port', str(EE_CLIENT_AUTH_PORT),
- '-unsecure_port', str(UNSECURE_PORT),
- '-tomcat_server_port', str(TOMCAT_SERVER_PORT),
- '-redirect', 'conf=/etc/pki-ca',
- '-redirect', 'logs=/var/log/pki-ca',
- '-enable_proxy'
- ]
- ipautil.run(args, env={'PKI_HOSTNAME':self.fqdn})
+ # create a new config file for this installation
+ (cfg_fd, cfg_file) = tempfile.mkstemp()
+ os.close(cfg_fd)
+ shutil.copy("/usr/share/pki/deployment/config/pkideployment.cfg",
+ cfg_file)
+ pent = pwd.getpwnam(PKI_USER)
+ os.chown(cfg_file, pent.pw_uid, pent.pw_gid )
+ replacevars = {
+ "pki_enable_proxy": "True",
+ "pki_restart_configured_instance": "False",
+ "pki_client_database_dir": self.ca_agent_db,
+ "pki_client_database_password": self.admin_password,
+ "pki_client_database_purge": "False",
+ "pki_client_pkcs12_password": self.admin_password,
+ "pki_security_domain_name": self.domain_name,
+ "pki_admin_email": "root@localhost",
+ "pki_admin_password": self.admin_password,
+ "pki_admin_nickname": "ipa-ca-agent",
+ "pki_admin_subject_dn": "CN=ipa-ca-agent,%s" % self.subject_base,
+ "pki_ds_ldap_port": str(self.ds_port),
+ "pki_ds_password": self.dm_password,
+ "pki_ds_base_dn": self.basedn,
+ "pki_ds_database": "ipaca",
+ "pki_backup_keys": "True",
+ "pki_backup_password": self.admin_password,
+ "pki_subsystem_subject_dn": \
+ "CN=CA Subsystem,%s" % self.subject_base,
+ "pki_ocsp_signing_subject_dn": \
+ "CN=OCSP Subsystem,%s" % self.subject_base,
+ "pki_ssl_server_subject_dn": \
+ "CN=%s,%s" % (self.fqdn, self.subject_base),
+ "pki_audit_signing_subject_dn": \
+ "CN=CA Audit,%s" % self.subject_base,
+ "pki_ca_signing_subject_dn": \
+ "CN=Certificate Authority,%s" % self.subject_base,
+ "pki_subsystem_nickname": "subsystemCert cert-pki-ca",
+ "pki_ocsp_signing_nickname": "ocspSigningCert cert-pki-ca",
+ "pki_ssl_server_nickname": "Server-Cert cert-pki-ca",
+ "pki_audit_signing_nickname": "auditSigningCert cert-pki-ca",
+ "pki_ca_signing_nickname": "caSigningCert cert-pki-ca"
+ }
+
+ if (self.clone):
+ cafile = self.pkcs12_info[0]
+ shutil.copy(cafile, "/tmp/ca.p12")
+ pent = pwd.getpwnam(PKI_USER)
+ os.chown("/tmp/ca.p12", pent.pw_uid, pent.pw_gid )
+
+ clone_vars = {
+ "pki_clone_pkcs12_password": self.dm_password,
+ "pki_clone": "True",
+ "pki_clone_pkcs12_path": "/tmp/ca.p12",
+ "pki_security_domain_hostname": self.master_host,
+ "pki_security_domain_https_port": "443",
+ "pki_security_domain_password": self.admin_password,
+ "pki_clone_replication_security": "SSL",
+ "pki_clone_uri": \
+ "https://%s" % ipautil.format_netloc(self.master_host, 443)
+ }
+ replacevars.update(clone_vars)
+
+ if self.external == 1:
+ external_vars = {
+ "pki_external": "True",
+ "pki_external_csr_path": self.csr_file
+ }
+ replacevars.update(external_vars)
+ elif self.external == 2:
+ external_vars = {
+ "pki_external": "True",
+ "pki_external_ca_cert_path": self.cert_file,
+ "pki_external_ca_cert_chain_path": self.cert_chain_file,
+ "pki_external_step_two": "True"
+ }
+ replacevars.update(external_vars)
+
+ ipautil.config_replace_variables(cfg_file, replacevars=replacevars)
+
+ # Define the things we don't want logged
+ nolog = (self.admin_password, self.dm_password,)
+
+ args = ["/bin/pkispawn", "-s", "CA", "-f", cfg_file ]
+
+ try:
+ ipautil.run(args, nolog=nolog)
+ except ipautil.CalledProcessError, e:
+ root_logger.critical("failed to configure ca instance %s" % e)
+ raise RuntimeError('Configuration of CA failed')
+ finally:
+ os.remove(cfg_file)
+
+ if not self.clone:
+ shutil.move("/var/lib/pki/pki-tomcat/alias/ca_admin_cert.p12", \
+ "/root/ca-agent.p12")
+ shutil.move("/var/lib/pki/pki-tomcat/alias/ca_backup_keys.p12", \
+ "/root/cacert.p12")
+
+ if self.external == 1:
+ print "The next step is to get %s signed by your CA and re-run ipa-server-install as:" % self.csr_file
+ print "ipa-server-install --external_cert_file=/path/to/signed_certificate --external_ca_file=/path/to/external_ca_certificate"
+ sys.exit(0)
+
+ root_logger.debug("completed creating ca instance")
+
def __enable(self):
self.backup_state("enabled", self.is_enabled())
@@ -600,110 +656,6 @@ class CAInstance(service.Service):
except ipautil.CalledProcessError, e:
root_logger.critical("failed to add user %s" % e)
- def __configure_instance(self):
- preop_pin = get_preop_pin(self.server_root, PKI_INSTANCE_NAME)
-
- try:
- args = ["/usr/bin/perl", "/usr/bin/pkisilent", "ConfigureCA",
- "-cs_hostname", self.fqdn,
- "-cs_port", str(ADMIN_SECURE_PORT),
- "-client_certdb_dir", self.ca_agent_db,
- "-client_certdb_pwd", self.admin_password,
- "-preop_pin" , preop_pin,
- "-domain_name", self.domain_name,
- "-admin_user", "admin",
- "-admin_email", "root@localhost",
- "-admin_password", self.admin_password,
- "-agent_name", "ipa-ca-agent",
- "-agent_key_size", "2048",
- "-agent_key_type", "rsa",
- "-agent_cert_subject", str(DN(('CN', 'ipa-ca-agent'), self.subject_base)),
- "-ldap_host", self.fqdn,
- "-ldap_port", str(self.ds_port),
- "-bind_dn", "cn=Directory Manager",
- "-bind_password", self.dm_password,
- "-base_dn", str(self.basedn),
- "-db_name", "ipaca",
- "-key_size", "2048",
- "-key_type", "rsa",
- "-key_algorithm", "SHA256withRSA",
- "-save_p12", "true",
- "-backup_pwd", self.admin_password,
- "-subsystem_name", self.service_name,
- "-token_name", "internal",
- "-ca_subsystem_cert_subject_name", str(DN(('CN', 'CA Subsystem'), self.subject_base)),
- "-ca_subsystem_cert_subject_name", str(DN(('CN', 'CA Subsystem'), self.subject_base)),
- "-ca_ocsp_cert_subject_name", str(DN(('CN', 'OCSP Subsystem'), self.subject_base)),
- "-ca_server_cert_subject_name", str(DN(('CN', self.fqdn), self.subject_base)),
- "-ca_audit_signing_cert_subject_name", str(DN(('CN', 'CA Audit'), self.subject_base)),
- "-ca_sign_cert_subject_name", str(DN(('CN', 'Certificate Authority'), self.subject_base)) ]
- if self.external == 1:
- args.append("-external")
- args.append("true")
- args.append("-ext_csr_file")
- args.append(self.csr_file)
- elif self.external == 2:
- args.append("-external")
- args.append("true")
- args.append("-ext_ca_cert_file")
- args.append(self.cert_file)
- args.append("-ext_ca_cert_chain_file")
- args.append(self.cert_chain_file)
- else:
- args.append("-external")
- args.append("false")
- if (self.clone):
- """sd = security domain --> all CS systems get registered to
- a security domain. This is set to the hostname and port of
- the master CA.
- """
- # The install wizard expects the file to be here.
- cafile = self.pkcs12_info[0]
- shutil.copy(cafile, "/var/lib/pki-ca/alias/ca.p12")
- pent = pwd.getpwnam(PKI_USER)
- os.chown("/var/lib/pki-ca/alias/ca.p12", pent.pw_uid, pent.pw_gid )
- args.append("-clone")
- args.append("true")
- args.append("-clone_p12_file")
- args.append("ca.p12")
- args.append("-clone_p12_password")
- args.append(self.dm_password)
- args.append("-sd_hostname")
- args.append(self.master_host)
- args.append("-sd_admin_port")
- args.append("443")
- args.append("-sd_admin_name")
- args.append("admin")
- args.append("-sd_admin_password")
- args.append(self.admin_password)
- args.append("-clone_start_tls")
- args.append("true")
- args.append("-clone_uri")
- args.append("https://%s" % ipautil.format_netloc(self.master_host, 443))
- else:
- args.append("-clone")
- args.append("false")
-
- # Define the things we don't want logged
- nolog = (self.admin_password, self.dm_password,)
-
- ipautil.run(args, env={'PKI_HOSTNAME':self.fqdn}, nolog=nolog)
- except ipautil.CalledProcessError, e:
- root_logger.critical("failed to configure ca instance %s" % e)
- raise RuntimeError('Configuration of CA failed')
-
- if self.external == 1:
- print "The next step is to get %s signed by your CA and re-run ipa-server-install as:" % self.csr_file
- print "ipa-server-install --external_cert_file=/path/to/signed_certificate --external_ca_file=/path/to/external_ca_certificate"
- sys.exit(0)
-
- # pkisilent makes a copy of the CA PKCS#12 file for us but gives
- # it a lousy name.
- if ipautil.file_exists("/root/tmp-ca.p12"):
- shutil.move("/root/tmp-ca.p12", "/root/cacert.p12")
-
- root_logger.debug("completed creating ca instance")
-
def __restart_instance(self):
try:
self.restart(PKI_INSTANCE_NAME)
@@ -713,10 +665,11 @@ class CAInstance(service.Service):
def __disable_nonce(self):
# Turn off Nonces
- if installutils.update_file('/var/lib/pki-ca/conf/CS.cfg', 'ca.enableNonces=true', 'ca.enableNonces=false') != 0:
+ cfg_file = '/var/lib/pki/pki-tomcat/conf/ca/CS.cfg'
+ if installutils.update_file(cfg_file, 'ca.enableNonces=true', 'ca.enableNonces=false') != 0:
raise RuntimeError("Disabling nonces failed")
pent = pwd.getpwnam(PKI_USER)
- os.chown('/var/lib/pki-ca/conf/CS.cfg', pent.pw_uid, pent.pw_gid )
+ os.chown(cfg_file, pent.pw_uid, pent.pw_gid )
def __issue_ra_cert(self):
# The CA certificate is in the agent DB but isn't trusted
@@ -767,7 +720,7 @@ class CAInstance(service.Service):
]
(stdout, stderr, returncode) = ipautil.run(args, nolog=(self.admin_password,))
- data = stdout.split('\r\n')
+ data = stdout.split('\n')
params = get_defList(data)
params['requestId'] = find_substring(data, "requestId")
params['op'] = 'approve'
@@ -788,7 +741,7 @@ class CAInstance(service.Service):
]
(stdout, stderr, returncode) = ipautil.run(args, nolog=(self.admin_password,))
- data = stdout.split('\r\n')
+ data = stdout.split('\n')
outputList = get_outputList(data)
self.ra_cert = outputList['b64_cert']
@@ -905,20 +858,6 @@ class CAInstance(service.Service):
except Exception, e:
raise RuntimeError("Unable to retrieve CA chain: %s" % str(e))
- def __create_ca_agent_pkcs12(self):
- (pwd_fd, pwd_name) = tempfile.mkstemp()
- os.write(pwd_fd, self.admin_password)
- os.close(pwd_fd)
- try:
- ipautil.run(["/usr/bin/pk12util",
- "-n", "ipa-ca-agent",
- "-o", "/root/ca-agent.p12",
- "-d", self.ca_agent_db,
- "-k", pwd_name,
- "-w", pwd_name])
- finally:
- os.remove(pwd_name)
-
def __import_ca_chain(self):
chain = self.__get_ca_chain()
@@ -982,7 +921,7 @@ class CAInstance(service.Service):
csr = pkcs10.strip_header(stdout)
# Send the request to the CA
- conn = httplib.HTTPConnection(self.fqdn, 9180)
+ conn = httplib.HTTPConnection(self.fqdn, 8080)
params = urllib.urlencode({'profileId': 'caServerCert',
'cert_request_type': 'pkcs10',
'requestor_name': 'IPA Installer',
@@ -1020,7 +959,7 @@ class CAInstance(service.Service):
def __setup_sign_profile(self):
# Tell the profile to automatically issue certs for RAs
- installutils.set_directive('/var/lib/pki-ca/profiles/ca/caJarSigningCert.cfg', 'auth.instance_id', 'raCertAuth', quotes=False, separator='=')
+ installutils.set_directive('/var/lib/pki/pki-tomcat/ca/profiles/ca/caJarSigningCert.cfg', 'auth.instance_id', 'raCertAuth', quotes=False, separator='=')
def __enable_crl_publish(self):
"""
@@ -1028,9 +967,9 @@ class CAInstance(service.Service):
http://www.redhat.com/docs/manuals/cert-system/8.0/admin/html/Setting_up_Publishing.html
"""
- caconfig = "/var/lib/pki-ca/conf/CS.cfg"
+ caconfig = "/var/lib/pki/pki-tomcat/conf/ca/CS.cfg"
- publishdir='/var/lib/pki-ca/publish'
+ publishdir='/var/lib/pki/pki-tomcat/ca/publish'
os.mkdir(publishdir)
os.chmod(publishdir, 0755)
pent = pwd.getpwnam(PKI_USER)
@@ -1089,8 +1028,8 @@ class CAInstance(service.Service):
self.disable()
try:
- ipautil.run(["/usr/bin/pkiremove", "-pki_instance_root=/var/lib",
- "-pki_instance_name=%s" % PKI_INSTANCE_NAME, "--force"])
+ ipautil.run(["/bin/pkidestroy", "-i", "pki-tomcat",
+ "-s", "CA"])
except ipautil.CalledProcessError, e:
root_logger.critical("failed to uninstall CA instance %s" % e)
@@ -1118,7 +1057,7 @@ class CAInstance(service.Service):
pin = certmonger.get_pin('internal')
except IOError, e:
raise RuntimeError('Unable to determine PIN for CA instance: %s' % str(e))
- certmonger.dogtag_start_tracking('dogtag-ipa-renew-agent', 'Server-Cert cert-pki-ca', pin, None, '/var/lib/pki-ca/alias', 'restart_pkicad "Server-Cert cert-pki-ca"')
+ certmonger.dogtag_start_tracking('dogtag-ipa-renew-agent', 'Server-Cert cert-pki-ca', pin, None, '/etc/pki/pki-tomcat/alias', 'restart_pkicad "Server-Cert cert-pki-ca"')
def configure_renewal(self):
cmonger = ipaservices.knownservices.certmonger
@@ -1135,7 +1074,7 @@ class CAInstance(service.Service):
for nickname in ['auditSigningCert cert-pki-ca',
'ocspSigningCert cert-pki-ca',
'subsystemCert cert-pki-ca']:
- certmonger.dogtag_start_tracking('dogtag-ipa-renew-agent', nickname, pin, None, '/var/lib/pki-ca/alias', 'renew_ca_cert "%s"' % nickname)
+ certmonger.dogtag_start_tracking('dogtag-ipa-renew-agent', nickname, pin, None, '/etc/pki/pki-tomcat/alias', 'renew_ca_cert "%s"' % nickname)
# Set up the agent cert for renewal
certmonger.dogtag_start_tracking('dogtag-ipa-renew-agent', 'ipaCert', None, '/etc/httpd/alias/pwdfile.txt', '/etc/httpd/alias', 'renew_ra_cert')
@@ -1179,7 +1118,7 @@ class CAInstance(service.Service):
for nickname in ['auditSigningCert cert-pki-ca',
'ocspSigningCert cert-pki-ca',
'subsystemCert cert-pki-ca']:
- certmonger.dogtag_start_tracking('dogtag-ipa-retrieve-agent-submit', nickname, pin, None, '/var/lib/pki-ca/alias', 'restart_pkicad "%s"' % nickname)
+ certmonger.dogtag_start_tracking('dogtag-ipa-retrieve-agent-submit', nickname, pin, None, '/etc/pki/pki-tomcat/alias', 'restart_pkicad "%s"' % nickname)
# The agent renewal is configured in import_ra_cert which is called
# after the HTTP instance is created.
@@ -1191,7 +1130,7 @@ class CAInstance(service.Service):
setlist = installutils.get_directive(IPA_SERVICE_PROFILE,
'policyset.serverCertSet.list', separator='=')
- # this is the default setting from pki-ca. Don't touch it if a user
+ # this is the default setting from pki-tomcat. Don't touch it if a user
# has manually modified it.
if setlist == '1,2,3,4,5,6,7,8':
installutils.set_directive(IPA_SERVICE_PROFILE,
@@ -1234,7 +1173,7 @@ class CAInstance(service.Service):
responsibility to handle changes on upgrades.
"""
master = installutils.get_directive(
- '/var/lib/pki-ca/conf/CS.cfg', 'subsystem.select', '=')
+ '/var/lib/pki/pki-tomcat/conf/ca/CS.cfg', 'subsystem.select', '=')
return master == 'New'
@@ -1301,10 +1240,10 @@ def install_replica_ca(config, postinstall=False):
# unix service.
service.print_msg("Restarting the directory and certificate servers")
- ca.stop()
+ ca.stop(PKI_INSTANCE_NAME)
ipaservices.knownservices.dirsrv.stop("PKI-IPA")
ipaservices.knownservices.dirsrv.start("PKI-IPA")
- ca.start()
+ ca.start(PKI_INSTANCE_NAME)
return (ca, cs)
@@ -1323,7 +1262,7 @@ def update_cert_config(nickname, cert):
'subsystemCert cert-pki-ca': 'ca.subsystem.cert',
'Server-Cert cert-pki-ca': 'ca.sslserver.cert' }
- installutils.set_directive('/var/lib/%s/conf/CS.cfg' % PKI_INSTANCE_NAME,
+ installutils.set_directive('/var/lib/pki/%s/conf/ca/CS.cfg' % PKI_INSTANCE_NAME,
directives[nickname],
base64.b64encode(cert),
quotes=False, separator='=')