diff options
| author | Jan Cholasta <jcholast@redhat.com> | 2016-12-02 09:10:41 +0100 |
|---|---|---|
| committer | Jan Cholasta <jcholast@redhat.com> | 2017-02-22 08:07:48 +0000 |
| commit | fe6f2b6f6effcf9f3c58e1e3f6d0874609c10c25 (patch) | |
| tree | faf107dfdb15e1eb26667620f8b0faaaf84500e2 /ipaserver | |
| parent | cf25ea7e300cdada57bd964acb4393cc11ad333e (diff) | |
| download | freeipa-fe6f2b6f6effcf9f3c58e1e3f6d0874609c10c25.tar.gz freeipa-fe6f2b6f6effcf9f3c58e1e3f6d0874609c10c25.tar.xz freeipa-fe6f2b6f6effcf9f3c58e1e3f6d0874609c10c25.zip | |
scripts, tests: explicitly set confdir in the rest of server code
Commit 1e6a204b4372bbbfb722a00370a5ce4e34406b9f added explicit confdir
setting to api.bootstrap() calls of a randomly selected portion of
server-side scripts and tests. This commit adds it to the rest of
server-side code for consistency.
https://fedorahosted.org/freeipa/ticket/6389
Reviewed-By: Stanislav Laznicka <slaznick@redhat.com>
Diffstat (limited to 'ipaserver')
| -rw-r--r-- | ipaserver/advise/base.py | 9 | ||||
| -rw-r--r-- | ipaserver/dnssec/ldapkeydb.py | 4 | ||||
| -rw-r--r-- | ipaserver/install/ipa_cacert_manage.py | 2 | ||||
| -rw-r--r-- | ipaserver/install/ipa_kra_install.py | 2 | ||||
| -rw-r--r-- | ipaserver/install/ipa_otptoken_import.py | 3 | ||||
| -rw-r--r-- | ipaserver/install/ipa_replica_prepare.py | 2 | ||||
| -rw-r--r-- | ipaserver/install/ipa_server_certinstall.py | 2 |
7 files changed, 16 insertions, 8 deletions
diff --git a/ipaserver/advise/base.py b/ipaserver/advise/base.py index f7e8ef5e4..40dabd042 100644 --- a/ipaserver/advise/base.py +++ b/ipaserver/advise/base.py @@ -25,6 +25,7 @@ from textwrap import wrap from ipalib import api from ipalib.plugable import Plugin, API from ipalib.errors import ValidationError +from ipaplatform.paths import paths from ipapython import admintool from ipapython.ipa_log_manager import log_mgr @@ -235,9 +236,13 @@ class IpaAdvise(admintool.AdminTool): def run(self): super(IpaAdvise, self).run() - api.bootstrap(in_server=False, context='cli') + api.bootstrap(in_server=False, + context='cli', + confdir=paths.ETC_IPA) api.finalize() - advise_api.bootstrap(in_server=False, context='cli') + advise_api.bootstrap(in_server=False, + context='cli', + confdir=paths.ETC_IPA) advise_api.finalize() if not self.options.verbose: # Do not print connection information by default diff --git a/ipaserver/dnssec/ldapkeydb.py b/ipaserver/dnssec/ldapkeydb.py index 98e150d92..0b6824c56 100644 --- a/ipaserver/dnssec/ldapkeydb.py +++ b/ipaserver/dnssec/ldapkeydb.py @@ -9,6 +9,7 @@ import collections from pprint import pprint import ipalib +from ipaplatform.paths import paths from ipapython.dn import DN from ipapython import ipaldap from ipapython import ipa_log_manager @@ -414,7 +415,8 @@ if __name__ == '__main__': log = ipa_log_manager.root_logger # IPA framework initialization - ipalib.api.bootstrap(in_server=True, log=None) # no logging to file + # no logging to file + ipalib.api.bootstrap(in_server=True, log=None, confdir=paths.ETC_IPA) ipalib.api.finalize() # LDAP initialization diff --git a/ipaserver/install/ipa_cacert_manage.py b/ipaserver/install/ipa_cacert_manage.py index dc448364d..363ba378a 100644 --- a/ipaserver/install/ipa_cacert_manage.py +++ b/ipaserver/install/ipa_cacert_manage.py @@ -97,7 +97,7 @@ class CACertManage(admintool.AdminTool): def run(self): command = self.command - api.bootstrap(in_server=True) + api.bootstrap(in_server=True, confdir=paths.ETC_IPA) api.finalize() self.ldap_connect() diff --git a/ipaserver/install/ipa_kra_install.py b/ipaserver/install/ipa_kra_install.py index 340a9930c..99ff4a63f 100644 --- a/ipaserver/install/ipa_kra_install.py +++ b/ipaserver/install/ipa_kra_install.py @@ -77,7 +77,7 @@ class KRAInstall(admintool.AdminTool): installutils.check_server_configuration() - api.bootstrap(in_server=True) + api.bootstrap(in_server=True, confdir=paths.ETC_IPA) api.finalize() @classmethod diff --git a/ipaserver/install/ipa_otptoken_import.py b/ipaserver/install/ipa_otptoken_import.py index 00939e03b..552fdfb03 100644 --- a/ipaserver/install/ipa_otptoken_import.py +++ b/ipaserver/install/ipa_otptoken_import.py @@ -34,6 +34,7 @@ import gssapi import six from six.moves import xrange +from ipaplatform.paths import paths from ipapython import admintool from ipalib import api, errors from ipaserver.plugins.ldap2 import AUTOBIND_DISABLED @@ -509,7 +510,7 @@ class OTPTokenImport(admintool.AdminTool): self.doc.setKey(f.read()) def run(self): - api.bootstrap(in_server=True) + api.bootstrap(in_server=True, confdir=paths.ETC_IPA) api.finalize() try: diff --git a/ipaserver/install/ipa_replica_prepare.py b/ipaserver/install/ipa_replica_prepare.py index ece5f554b..c77e7f6aa 100644 --- a/ipaserver/install/ipa_replica_prepare.py +++ b/ipaserver/install/ipa_replica_prepare.py @@ -180,7 +180,7 @@ class ReplicaPrepare(admintool.AdminTool): else: [self.replica_fqdn] = self.args - api.bootstrap(in_server=True) + api.bootstrap(in_server=True, confdir=paths.ETC_IPA) api.finalize() # Connect to LDAP, connection is closed at the end of run() api.Backend.ldap2.connect() diff --git a/ipaserver/install/ipa_server_certinstall.py b/ipaserver/install/ipa_server_certinstall.py index dc0644300..ee93535ed 100644 --- a/ipaserver/install/ipa_server_certinstall.py +++ b/ipaserver/install/ipa_server_certinstall.py @@ -98,7 +98,7 @@ class ServerCertInstall(admintool.AdminTool): "Private key unlock password required") def run(self): - api.bootstrap(in_server=True) + api.bootstrap(in_server=True, confdir=paths.ETC_IPA) api.finalize() api.Backend.ldap2.connect(bind_pw=self.options.dirman_password) |
