summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rwxr-xr-xclient/ipa-client-automount1
-rwxr-xr-xdaemons/dnssec/ipa-dnskeysync-replica5
-rwxr-xr-xdaemons/dnssec/ipa-dnskeysyncd5
-rwxr-xr-xdaemons/dnssec/ipa-ods-exporter5
-rwxr-xr-xinstall/certmonger/dogtag-ipa-ca-renew-agent-submit2
-rw-r--r--install/migration/migration.py3
-rwxr-xr-xinstall/oddjob/com.redhat.idm.trust-fetch-domains4
-rw-r--r--install/restart_scripts/renew_ca_cert2
-rw-r--r--install/restart_scripts/renew_ra_cert2
-rw-r--r--install/restart_scripts/restart_dirsrv3
-rw-r--r--install/restart_scripts/stop_pkicad3
-rwxr-xr-xinstall/share/copy-schema-to-ca.py2
-rw-r--r--install/share/wsgi.py6
-rwxr-xr-xinstall/tools/ipa-adtrust-install5
-rwxr-xr-xinstall/tools/ipa-ca-install5
-rwxr-xr-xinstall/tools/ipa-csreplica-manage9
-rwxr-xr-xinstall/tools/ipa-dns-install7
-rwxr-xr-xinstall/tools/ipa-httpd-kdcproxy3
-rwxr-xr-xinstall/tools/ipa-nis-manage4
-rwxr-xr-xinstall/tools/ipa-replica-conncheck4
-rwxr-xr-xinstall/tools/ipa-replica-manage5
-rwxr-xr-xinstall/tools/ipactl5
-rw-r--r--ipaclient/install/client.py1
-rw-r--r--ipaclient/install/ipa_certupdate.py2
-rw-r--r--ipaserver/install/ipa_backup.py2
-rw-r--r--ipaserver/install/ipa_ldap_updater.py2
-rw-r--r--ipaserver/install/ipa_restore.py1
-rw-r--r--ipaserver/install/ipa_server_upgrade.py2
-rw-r--r--ipaserver/install/ipa_winsync_migrate.py3
-rw-r--r--ipaserver/install/ldapupdate.py4
-rw-r--r--ipaserver/install/server/install.py2
-rw-r--r--ipaserver/install/server/replicainstall.py19
32 files changed, 86 insertions, 42 deletions
diff --git a/client/ipa-client-automount b/client/ipa-client-automount
index 0dd15b39f..18914bd74 100755
--- a/client/ipa-client-automount
+++ b/client/ipa-client-automount
@@ -384,6 +384,7 @@ def main():
cfg = dict(
context='cli_installer',
+ confdir=paths.ETC_IPA,
in_server=False,
debug=options.debug,
verbose=0,
diff --git a/daemons/dnssec/ipa-dnskeysync-replica b/daemons/dnssec/ipa-dnskeysync-replica
index 9363d3f3e..9bf19eeab 100755
--- a/daemons/dnssec/ipa-dnskeysync-replica
+++ b/daemons/dnssec/ipa-dnskeysync-replica
@@ -122,7 +122,10 @@ def ldap2replica_zone_keys_sync(log, ldapkeydb, localhsm):
# IPA framework initialization
-ipalib.api.bootstrap(in_server=True, log=None) # no logging to file
+ipalib.api.bootstrap(
+ context='dns', confdir=paths.ETC_IPA,
+ in_server=True, log=None, # no logging to file
+)
ipalib.api.finalize()
standard_logging_setup(verbose=True, debug = True) # debug=ipalib.api.env.debug)
log = root_logger
diff --git a/daemons/dnssec/ipa-dnskeysyncd b/daemons/dnssec/ipa-dnskeysyncd
index d42515466..fc1a0f6cf 100755
--- a/daemons/dnssec/ipa-dnskeysyncd
+++ b/daemons/dnssec/ipa-dnskeysyncd
@@ -19,7 +19,10 @@ from ipaplatform.paths import paths
from ipaserver.dnssec.keysyncer import KeySyncer
# IPA framework initialization
-api.bootstrap(in_server=True, log=None) # no logging to file
+api.bootstrap(
+ context='dns', confdir=paths.ETC_IPA,
+ in_server=True, log=None, # no logging to file
+)
api.finalize()
standard_logging_setup(verbose=True, debug=api.env.debug)
log = root_logger
diff --git a/daemons/dnssec/ipa-ods-exporter b/daemons/dnssec/ipa-ods-exporter
index 9285fe695..260a7b651 100755
--- a/daemons/dnssec/ipa-ods-exporter
+++ b/daemons/dnssec/ipa-ods-exporter
@@ -614,7 +614,10 @@ elif len(sys.argv) == 2:
log.addHandler(console)
# IPA framework initialization
-ipalib.api.bootstrap(in_server=True, log=None) # no logging to file
+ipalib.api.bootstrap(
+ context='dns', confdir=paths.ETC_IPA,
+ in_server=True, log=None, # no logging to file
+)
ipalib.api.finalize()
# Kerberos initialization
diff --git a/install/certmonger/dogtag-ipa-ca-renew-agent-submit b/install/certmonger/dogtag-ipa-ca-renew-agent-submit
index 7389a5e0f..2e137ad44 100755
--- a/install/certmonger/dogtag-ipa-ca-renew-agent-submit
+++ b/install/certmonger/dogtag-ipa-ca-renew-agent-submit
@@ -494,7 +494,7 @@ def main():
'ipaCACertRenewal': renew_ca_cert,
}
- api.bootstrap(in_server=True, context='renew')
+ api.bootstrap(in_server=True, context='renew', confdir=paths.ETC_IPA)
api.finalize()
api.Backend.ldap2.connect()
diff --git a/install/migration/migration.py b/install/migration/migration.py
index 4743279be..73e47776b 100644
--- a/install/migration/migration.py
+++ b/install/migration/migration.py
@@ -24,6 +24,7 @@ import cgi
import errno
from wsgiref.util import request_uri
+from ipaplatform.paths import paths
from ipapython.ipa_log_manager import root_logger
from ipapython.dn import DN
from ipapython import ipaldap
@@ -72,7 +73,7 @@ def application(environ, start_response):
# API object only for configuration, finalize() not needed
api = create_api(mode=None)
- api.bootstrap(context='server', in_server=True)
+ api.bootstrap(context='server', confdir=paths.ETC_IPA, in_server=True)
try:
bind(api.env.ldap_uri, api.env.basedn,
form_data['username'].value, form_data['password'].value)
diff --git a/install/oddjob/com.redhat.idm.trust-fetch-domains b/install/oddjob/com.redhat.idm.trust-fetch-domains
index a0d8a3165..e5c2e8ce5 100755
--- a/install/oddjob/com.redhat.idm.trust-fetch-domains
+++ b/install/oddjob/com.redhat.idm.trust-fetch-domains
@@ -8,6 +8,7 @@ from ipapython.dn import DN
from ipalib.config import Env
from ipalib.constants import DEFAULT_CONFIG
from ipaplatform.constants import constants
+from ipaplatform.paths import paths
import sys
import os
import pwd
@@ -95,7 +96,8 @@ env._bootstrap(debug=options.debug, log=None)
env._finalize_core(**dict(DEFAULT_CONFIG))
# Initialize the API with the proper debug level
-api.bootstrap(in_server=True, debug=env.debug, log=None, context='server')
+api.bootstrap(in_server=True, debug=env.debug, log=None,
+ context='server', confdir=paths.ETC_IPA)
api.finalize()
# Only import trust plugin after api is initialized or internal imports
diff --git a/install/restart_scripts/renew_ca_cert b/install/restart_scripts/renew_ca_cert
index 46e4242a4..bbeae1ae1 100644
--- a/install/restart_scripts/renew_ca_cert
+++ b/install/restart_scripts/renew_ca_cert
@@ -40,7 +40,7 @@ from ipaplatform.paths import paths
def _main():
nickname = sys.argv[1]
- api.bootstrap(in_server=True, context='restart')
+ api.bootstrap(in_server=True, context='restart', confdir=paths.ETC_IPA)
api.finalize()
api.Backend.ldap2.connect()
diff --git a/install/restart_scripts/renew_ra_cert b/install/restart_scripts/renew_ra_cert
index eb11c81a8..d978f946c 100644
--- a/install/restart_scripts/renew_ra_cert
+++ b/install/restart_scripts/renew_ra_cert
@@ -36,7 +36,7 @@ from ipaplatform.paths import paths
def _main():
nickname = 'ipaCert'
- api.bootstrap(in_server=True, context='restart')
+ api.bootstrap(in_server=True, context='restart', confdir=paths.ETC_IPA)
api.finalize()
api.Backend.ldap2.connect()
diff --git a/install/restart_scripts/restart_dirsrv b/install/restart_scripts/restart_dirsrv
index 72d3c544b..b4c9490c1 100644
--- a/install/restart_scripts/restart_dirsrv
+++ b/install/restart_scripts/restart_dirsrv
@@ -24,6 +24,7 @@ import syslog
import traceback
from ipalib import api
from ipaplatform import services
+from ipaplatform.paths import paths
from ipaserver.install import certs
@@ -33,7 +34,7 @@ def _main():
except IndexError:
instance = ""
- api.bootstrap(in_server=True, context='restart')
+ api.bootstrap(in_server=True, context='restart', confdir=paths.ETC_IPA)
api.finalize()
syslog.syslog(syslog.LOG_NOTICE, "certmonger restarted dirsrv instance '%s'" % instance)
diff --git a/install/restart_scripts/stop_pkicad b/install/restart_scripts/stop_pkicad
index ae07dcd58..133a4ef8f 100644
--- a/install/restart_scripts/stop_pkicad
+++ b/install/restart_scripts/stop_pkicad
@@ -23,11 +23,12 @@ import syslog
import traceback
from ipalib import api
from ipaplatform import services
+from ipaplatform.paths import paths
from ipaserver.install import certs
def main():
- api.bootstrap(in_server=True, context='restart')
+ api.bootstrap(in_server=True, context='restart', confdir=paths.ETC_IPA)
api.finalize()
dogtag_service = services.knownservices['pki_tomcatd']
diff --git a/install/share/copy-schema-to-ca.py b/install/share/copy-schema-to-ca.py
index 658204bc1..4daed6f51 100755
--- a/install/share/copy-schema-to-ca.py
+++ b/install/share/copy-schema-to-ca.py
@@ -114,7 +114,7 @@ def main():
standard_logging_setup(verbose=True)
# In 3.0, restarting needs access to api.env
- api.bootstrap_with_global_options(context='server')
+ api.bootstrap_with_global_options(context='server', confdir=paths.ETC_IPA)
add_ca_schema()
restart_pki_ds()
diff --git a/install/share/wsgi.py b/install/share/wsgi.py
index ee9311e4e..ca97d1e23 100644
--- a/install/share/wsgi.py
+++ b/install/share/wsgi.py
@@ -23,6 +23,7 @@
"""
WSGI appliction for IPA server.
"""
+from ipaplatform.paths import paths
from ipalib import api
from ipalib.config import Env
from ipalib.constants import DEFAULT_CONFIG
@@ -31,11 +32,12 @@ from ipalib.constants import DEFAULT_CONFIG
# by reading in the configuration file(s). The server always reads
# default.conf and will also read in `context'.conf.
env = Env()
-env._bootstrap(context='server', log=None)
+env._bootstrap(context='server', log=None, confdir=paths.ETC_IPA)
env._finalize_core(**dict(DEFAULT_CONFIG))
# Initialize the API with the proper debug level
-api.bootstrap(context='server', debug=env.debug, log=None)
+api.bootstrap(context='server', confdir=paths.ETC_IPA,
+ debug=env.debug, log=None)
try:
api.finalize()
except Exception as e:
diff --git a/install/tools/ipa-adtrust-install b/install/tools/ipa-adtrust-install
index 918b23850..8d927f10e 100755
--- a/install/tools/ipa-adtrust-install
+++ b/install/tools/ipa-adtrust-install
@@ -263,11 +263,12 @@ def main():
sys.exit("Aborting installation.")
# Initialize the ipalib api
- cfg = dict(
+ api.bootstrap(
in_server=True,
debug=options.debug,
+ context='install',
+ confdir=paths.ETC_IPA
)
- api.bootstrap(**cfg)
api.finalize()
# If domain name and realm does not match, IPA server will not be able
diff --git a/install/tools/ipa-ca-install b/install/tools/ipa-ca-install
index bf817c7f1..88939f9db 100755
--- a/install/tools/ipa-ca-install
+++ b/install/tools/ipa-ca-install
@@ -261,7 +261,10 @@ def main():
# override ra_plugin setting read from default.conf so that we have
# functional dogtag backend plugins during CA install
- api.bootstrap(in_server=True, ra_plugin='dogtag')
+ api.bootstrap(
+ context='install', confdir=paths.ETC_IPA,
+ in_server=True, ra_plugin='dogtag'
+ )
api.finalize()
api.Backend.ldap2.connect()
diff --git a/install/tools/ipa-csreplica-manage b/install/tools/ipa-csreplica-manage
index 6a3b8693c..f494380e6 100755
--- a/install/tools/ipa-csreplica-manage
+++ b/install/tools/ipa-csreplica-manage
@@ -408,14 +408,13 @@ def main():
# Just initialize the environment. This is so the installer can have
# access to the plugin environment
- api_env = {'in_server' : True,
- 'verbose' : options.verbose,
- }
-
+ api_env = {}
if os.getegid() != 0:
api_env['log'] = None # turn off logging for non-root
- api.bootstrap(**api_env)
+ api.bootstrap(
+ context='cli', in_server=True, verbose=options.verbose, **api_env
+ )
api.finalize()
dirman_passwd = None
diff --git a/install/tools/ipa-dns-install b/install/tools/ipa-dns-install
index 699749d08..5bd0ba6d7 100755
--- a/install/tools/ipa-dns-install
+++ b/install/tools/ipa-dns-install
@@ -132,11 +132,10 @@ def main():
installutils.check_server_configuration()
# Initialize the ipalib api
- cfg = dict(
- in_server=True,
- debug=options.debug,
+ api.bootstrap(
+ context='install', confdir=paths.ETC_IPA,
+ in_server=True, debug=options.debug,
)
- api.bootstrap(**cfg)
api.finalize()
api.Backend.ldap2.connect()
diff --git a/install/tools/ipa-httpd-kdcproxy b/install/tools/ipa-httpd-kdcproxy
index 329565c2b..bb2949be8 100755
--- a/install/tools/ipa-httpd-kdcproxy
+++ b/install/tools/ipa-httpd-kdcproxy
@@ -184,7 +184,8 @@ class KDCProxyConfig(object):
def main(debug=DEBUG, time_limit=TIME_LIMIT):
# initialize API without file logging
if not api.isdone('bootstrap'):
- api.bootstrap(context='ipa-httpd-kdcproxy', log=None, debug=debug)
+ api.bootstrap(context='server', confdir=paths.ETC_IPA,
+ log=None, debug=debug)
standard_logging_setup(verbose=True, debug=debug)
try:
diff --git a/install/tools/ipa-nis-manage b/install/tools/ipa-nis-manage
index 21ff18334..c44b0f9ed 100755
--- a/install/tools/ipa-nis-manage
+++ b/install/tools/ipa-nis-manage
@@ -113,7 +113,9 @@ def main():
if not dirman_password:
sys.exit("No password supplied")
- api.bootstrap(context='cli', debug=options.debug, in_server=True)
+ api.bootstrap(
+ context='cli', confdir=paths.ETC_IPA,
+ debug=options.debug, in_server=True)
api.finalize()
api.Backend.ldap2.connect(bind_pw=dirman_password)
diff --git a/install/tools/ipa-replica-conncheck b/install/tools/ipa-replica-conncheck
index 2413754e5..121f06844 100755
--- a/install/tools/ipa-replica-conncheck
+++ b/install/tools/ipa-replica-conncheck
@@ -554,7 +554,9 @@ def main():
else:
nss_dir = None
- api.bootstrap(context='client', xmlrpc_uri=xmlrpc_uri,
+ api.bootstrap(context='client',
+ confdir=paths.ETC_IPA,
+ xmlrpc_uri=xmlrpc_uri,
nss_dir=nss_db.secdir)
api.finalize()
try:
diff --git a/install/tools/ipa-replica-manage b/install/tools/ipa-replica-manage
index 1ee7301e6..56cb90bea 100755
--- a/install/tools/ipa-replica-manage
+++ b/install/tools/ipa-replica-manage
@@ -1508,7 +1508,10 @@ def main(options, args):
if os.getegid() != 0:
api_env['log'] = None # turn off logging for non-root
- api.bootstrap(**api_env)
+ api.bootstrap(
+ context='cli', confdir=paths.ETC_IPA,
+ in_server=True, verbose=options.verbose
+ )
api.finalize()
dirman_passwd = None
diff --git a/install/tools/ipactl b/install/tools/ipactl
index ce4fe0254..db8ff6249 100755
--- a/install/tools/ipactl
+++ b/install/tools/ipactl
@@ -560,7 +560,10 @@ def main():
else:
raise e
- api.bootstrap(in_server=True, context='ipactl', debug=options.debug)
+ api.bootstrap(in_server=True,
+ context='ipactl',
+ confdir=paths.ETC_IPA,
+ debug=options.debug)
api.finalize()
if '.' not in api.env.host:
diff --git a/ipaclient/install/client.py b/ipaclient/install/client.py
index 7bd84045d..0954c2bff 100644
--- a/ipaclient/install/client.py
+++ b/ipaclient/install/client.py
@@ -2620,6 +2620,7 @@ def _install(options):
with certdb.NSSDatabase() as tmp_db:
api.bootstrap(context='cli_installer',
+ confdir=paths.ETC_IPA,
debug=options.debug,
delegate=False,
nss_dir=tmp_db.secdir)
diff --git a/ipaclient/install/ipa_certupdate.py b/ipaclient/install/ipa_certupdate.py
index 2c55db462..75c5d97df 100644
--- a/ipaclient/install/ipa_certupdate.py
+++ b/ipaclient/install/ipa_certupdate.py
@@ -53,7 +53,7 @@ class CertUpdate(admintool.AdminTool):
raise admintool.ScriptError(
"IPA client is not configured on this system.")
- api.bootstrap(context='cli_installer')
+ api.bootstrap(context='cli_installer', confdir=paths.ETC_IPA)
api.finalize()
server = urlsplit(api.env.jsonrpc_uri).hostname
diff --git a/ipaserver/install/ipa_backup.py b/ipaserver/install/ipa_backup.py
index a4261f5fb..c11120b30 100644
--- a/ipaserver/install/ipa_backup.py
+++ b/ipaserver/install/ipa_backup.py
@@ -256,7 +256,7 @@ class Backup(admintool.AdminTool):
options = self.options
super(Backup, self).run()
- api.bootstrap(in_server=True, context='backup')
+ api.bootstrap(in_server=True, context='backup', confdir=paths.ETC_IPA)
api.finalize()
self.log.info("Preparing backup on %s", api.env.host)
diff --git a/ipaserver/install/ipa_ldap_updater.py b/ipaserver/install/ipa_ldap_updater.py
index e6e6b5a36..f3e05b852 100644
--- a/ipaserver/install/ipa_ldap_updater.py
+++ b/ipaserver/install/ipa_ldap_updater.py
@@ -89,7 +89,7 @@ class LDAPUpdater(admintool.AdminTool):
def run(self):
super(LDAPUpdater, self).run()
- api.bootstrap(in_server=True, context='updates')
+ api.bootstrap(in_server=True, context='updates', confdir=paths.ETC_IPA)
api.finalize()
def handle_error(self, exception):
diff --git a/ipaserver/install/ipa_restore.py b/ipaserver/install/ipa_restore.py
index 2987b5aad..2fae21591 100644
--- a/ipaserver/install/ipa_restore.py
+++ b/ipaserver/install/ipa_restore.py
@@ -841,6 +841,7 @@ class Restore(admintool.AdminTool):
services.knownservices.certmonger.restart()
def init_api(self, **overrides):
+ overrides.setdefault('confdir', paths.ETC_IPA)
api.bootstrap(in_server=True, context='restore', **overrides)
api.finalize()
diff --git a/ipaserver/install/ipa_server_upgrade.py b/ipaserver/install/ipa_server_upgrade.py
index c38470474..ef310687b 100644
--- a/ipaserver/install/ipa_server_upgrade.py
+++ b/ipaserver/install/ipa_server_upgrade.py
@@ -38,7 +38,7 @@ class ServerUpgrade(admintool.AdminTool):
def run(self):
super(ServerUpgrade, self).run()
- api.bootstrap(in_server=True, context='updates')
+ api.bootstrap(in_server=True, context='updates', confdir=paths.ETC_IPA)
api.finalize()
try:
diff --git a/ipaserver/install/ipa_winsync_migrate.py b/ipaserver/install/ipa_winsync_migrate.py
index d0653c983..cb77de6aa 100644
--- a/ipaserver/install/ipa_winsync_migrate.py
+++ b/ipaserver/install/ipa_winsync_migrate.py
@@ -24,6 +24,7 @@ import six
from ipalib import api
from ipalib import errors
+from ipaplatform.paths import paths
from ipapython import admintool
from ipapython.dn import DN
from ipapython.ipautil import realm_to_suffix, posixify
@@ -346,7 +347,7 @@ class WinsyncMigrate(admintool.AdminTool):
sys.exit(e)
# Finalize API
- api.bootstrap(in_server=True, context='server')
+ api.bootstrap(in_server=True, context='server', confdir=paths.ETC_IPA)
api.finalize()
# Setup LDAP connection
diff --git a/ipaserver/install/ldapupdate.py b/ipaserver/install/ldapupdate.py
index 576b03541..bc2673b31 100644
--- a/ipaserver/install/ldapupdate.py
+++ b/ipaserver/install/ldapupdate.py
@@ -308,7 +308,9 @@ class LDAPUpdate(object):
self.sub_dict["TOTAL_EXCLUDES"] = "(objectclass=*) $ EXCLUDE " + \
" ".join(constants.REPL_AGMT_TOTAL_EXCLUDES)
self.api = create_api(mode=None)
- self.api.bootstrap(in_server=True, context='updates',
+ self.api.bootstrap(in_server=True,
+ context='updates',
+ confdir=paths.ETC_IPA,
ldap_uri=self.ldapuri)
self.api.finalize()
if online:
diff --git a/ipaserver/install/server/install.py b/ipaserver/install/server/install.py
index 1f2e8a437..b30a9349f 100644
--- a/ipaserver/install/server/install.py
+++ b/ipaserver/install/server/install.py
@@ -566,6 +566,7 @@ def install_check(installer):
# we are sure we have the configuration file ready.
cfg = dict(
context='installer',
+ confdir=paths.ETC_IPA,
in_server=True,
# make sure host name specified by user is used instead of default
host=host_name,
@@ -962,6 +963,7 @@ def uninstall_check(installer):
# we are sure we have the configuration file ready.
cfg = dict(
context='installer',
+ confdir=paths.ETC_IPA,
in_server=True,
)
diff --git a/ipaserver/install/server/replicainstall.py b/ipaserver/install/server/replicainstall.py
index 742848da6..f1f7b1bf8 100644
--- a/ipaserver/install/server/replicainstall.py
+++ b/ipaserver/install/server/replicainstall.py
@@ -692,7 +692,7 @@ def install_check(installer):
# Note: We must do this before bootstraping and finalizing ipalib.api
create_ipa_conf(fstore, config, ca_enabled)
- api.bootstrap(in_server=True, context='installer')
+ api.bootstrap(in_server=True, context='installer', confdir=paths.ETC_IPA)
api.finalize()
installutils.verify_fqdn(config.master_host_name, options.no_host_dns)
@@ -731,7 +731,9 @@ def install_check(installer):
ldapuri = 'ldaps://%s' % ipautil.format_netloc(config.master_host_name)
remote_api = create_api(mode=None)
- remote_api.bootstrap(in_server=True, context='installer',
+ remote_api.bootstrap(in_server=True,
+ context='installer',
+ confdir=paths.ETC_IPA,
ldap_uri=ldapuri)
remote_api.finalize()
conn = remote_api.Backend.ldap2
@@ -954,12 +956,14 @@ def promote_check(installer):
fstore = sysrestore.FileStore(paths.SYSRESTORE)
env = Env()
- env._bootstrap(context='installer', log=None)
+ env._bootstrap(context='installer', confdir=paths.ETC_IPA, log=None)
env._finalize_core(**dict(constants.DEFAULT_CONFIG))
# pylint: disable=no-member
xmlrpc_uri = 'https://{}/ipa/xml'.format(ipautil.format_netloc(env.host))
- api.bootstrap(in_server=True, context='installer',
+ api.bootstrap(in_server=True,
+ context='installer',
+ confdir=paths.ETC_IPA,
ldap_uri=installutils.realm_to_ldapi_uri(env.realm),
xmlrpc_uri=xmlrpc_uri)
# pylint: enable=no-member
@@ -1056,8 +1060,11 @@ def promote_check(installer):
xmlrpc_uri = 'https://{}/ipa/xml'.format(
ipautil.format_netloc(config.master_host_name))
remote_api = create_api(mode=None)
- remote_api.bootstrap(in_server=True, context='installer',
- ldap_uri=ldapuri, xmlrpc_uri=xmlrpc_uri)
+ remote_api.bootstrap(in_server=True,
+ context='installer',
+ confdir=paths.ETC_IPA,
+ ldap_uri=ldapuri,
+ xmlrpc_uri=xmlrpc_uri)
remote_api.finalize()
check_remote_version(remote_api)