pgreco / rpms / ipa

Forked from forks/areguera/rpms/ipa 4 years ago
Clone

Blame SOURCES/0058-install-Fix-server-and-replica-install-options.patch

590d18
From 8fd313b624e3da699280f81da1f88ef7149e6123 Mon Sep 17 00:00:00 2001
590d18
From: Jan Cholasta <jcholast@redhat.com>
590d18
Date: Wed, 12 Aug 2015 07:49:53 +0200
590d18
Subject: [PATCH] install: Fix server and replica install options
590d18
590d18
https://fedorahosted.org/freeipa/ticket/5184
590d18
590d18
Reviewed-By: Martin Babinsky <mbabinsk@redhat.com>
590d18
---
590d18
 ipaserver/install/server/install.py        | 55 ++++++------------------------
590d18
 ipaserver/install/server/replicainstall.py | 36 ++++---------------
590d18
 2 files changed, 17 insertions(+), 74 deletions(-)
590d18
590d18
diff --git a/ipaserver/install/server/install.py b/ipaserver/install/server/install.py
590d18
index b9bf3f34bdb7c32115e5c6a7038f11f901ab06b8..ff517513473a458a84f63c5c1308a8cc0b8699f8 100644
590d18
--- a/ipaserver/install/server/install.py
590d18
+++ b/ipaserver/install/server/install.py
590d18
@@ -1137,18 +1137,6 @@ def uninstall(installer):
590d18
 class ServerCA(common.Installable, core.Group, core.Composite):
590d18
     description = "certificate system"
590d18
 
590d18
-    setup_ca = Knob(
590d18
-        bool, False,
590d18
-        initializable=False,
590d18
-        description="configure a dogtag CA",
590d18
-    )
590d18
-
590d18
-    setup_kra = Knob(
590d18
-        bool, False,
590d18
-        initializable=False,
590d18
-        description="configure a dogtag KRA",
590d18
-    )
590d18
-
590d18
     external_ca = Knob(
590d18
         bool, False,
590d18
         description=("Generate a CSR for the IPA CA certificate to be signed "
590d18
@@ -1163,7 +1151,7 @@ class ServerCA(common.Installable, core.Group, core.Composite):
590d18
     external_cert_files = Knob(
590d18
         (list, str), None,
590d18
         description=("File containing the IPA CA certificate and the external "
590d18
-                     "CA certificate chain (can be specified multiple times)"),
590d18
+                     "CA certificate chain"),
590d18
         cli_name='external-cert-file',
590d18
         cli_aliases=['external_cert_file', 'external_ca_file'],
590d18
         cli_metavar='FILE',
590d18
@@ -1308,6 +1296,7 @@ class ServerDNS(common.Installable, core.Group, core.Composite):
590d18
         description=("The reverse DNS zone to use. This option can be used "
590d18
                      "multiple times"),
590d18
         cli_name='reverse-zone',
590d18
+        cli_metavar='REVERSE_ZONE',
590d18
     )
590d18
 
590d18
     no_reverse = Knob(
590d18
@@ -1320,31 +1309,6 @@ class ServerDNS(common.Installable, core.Group, core.Composite):
590d18
         description="Disable DNSSEC validation",
590d18
     )
590d18
 
590d18
-    dnssec_master = Knob(
590d18
-        bool, False,
590d18
-        initializable=False,
590d18
-        description="Setup server to be DNSSEC key master",
590d18
-    )
590d18
-
590d18
-    disable_dnssec_master = Knob(
590d18
-        bool, False,
590d18
-        initializable=False,
590d18
-        description="Disable the DNSSEC master on this server",
590d18
-    )
590d18
-
590d18
-    kasp_db_file = Knob(
590d18
-        str, None,
590d18
-        initializable=False,
590d18
-        description="Copy OpenDNSSEC metadata from the specified file (will "
590d18
-                    "not create a new kasp.db file)",
590d18
-    )
590d18
-
590d18
-    force = Knob(
590d18
-        bool, False,
590d18
-        initializable=False,
590d18
-        description="Force install",
590d18
-    )
590d18
-
590d18
     zonemgr = Knob(
590d18
         str, None,
590d18
         description=("DNS zone manager e-mail address. Defaults to "
590d18
@@ -1416,7 +1380,6 @@ class Server(common.Installable, common.Interactive, core.Composite):
590d18
     master_password = Knob(
590d18
         str, None,
590d18
         sensitive=True,
590d18
-        deprecated=True,
590d18
         description="kerberos master password (normally autogenerated)",
590d18
         cli_short_name='P',
590d18
     )
590d18
@@ -1466,11 +1429,13 @@ class Server(common.Installable, common.Interactive, core.Composite):
590d18
         description=("Master Server IP Address. This option can be used "
590d18
                      "multiple times"),
590d18
         cli_name='ip-address',
590d18
+        cli_metavar='IP_ADDRESS',
590d18
     )
590d18
 
590d18
     no_ntp = Knob(
590d18
         bool, False,
590d18
         description="do not configure ntp",
590d18
+        cli_short_name='N',
590d18
     )
590d18
 
590d18
     idstart = Knob(
590d18
@@ -1615,8 +1580,8 @@ class Server(common.Installable, common.Interactive, core.Composite):
590d18
         # Automatically disable pkinit w/ dogtag until that is supported
590d18
         self.ca.no_pkinit = True
590d18
 
590d18
-        self.setup_ca = self.ca.setup_ca
590d18
-        self.setup_kra = self.ca.setup_kra
590d18
+        self.setup_ca = False
590d18
+        self.setup_kra = False
590d18
         self.external_ca = self.ca.external_ca
590d18
         self.external_ca_type = self.ca.external_ca_type
590d18
         self.external_cert_files = self.ca.external_cert_files
590d18
@@ -1639,10 +1604,10 @@ class Server(common.Installable, common.Interactive, core.Composite):
590d18
         self.reverse_zones = self.dns.reverse_zones
590d18
         self.no_reverse = self.dns.no_reverse
590d18
         self.no_dnssec_validation = self.dns.no_dnssec_validation
590d18
-        self.dnssec_master = self.dns.dnssec_master
590d18
-        self.disable_dnssec_master = self.dns.disable_dnssec_master
590d18
-        self.kasp_db_file = self.dns.kasp_db_file
590d18
-        self.force = self.dns.force
590d18
+        self.dnssec_master = False
590d18
+        self.disable_dnssec_master = False
590d18
+        self.kasp_db_file = None
590d18
+        self.force = False
590d18
         self.zonemgr = self.dns.zonemgr
590d18
         self.no_host_dns = self.dns.no_host_dns
590d18
         self.no_dns_sshfp = self.dns.no_dns_sshfp
590d18
diff --git a/ipaserver/install/server/replicainstall.py b/ipaserver/install/server/replicainstall.py
590d18
index 1ad291a1eada080361031a5723a0ea61679fc72e..dd8bc0d4bb7d8d9835a3e3e4dc24d1f67199d28f 100644
590d18
--- a/ipaserver/install/server/replicainstall.py
590d18
+++ b/ipaserver/install/server/replicainstall.py
590d18
@@ -679,6 +679,7 @@ class ReplicaDNS(common.Installable, core.Group, core.Composite):
590d18
         description=("The reverse DNS zone to use. This option can be used "
590d18
                      "multiple times"),
590d18
         cli_name='reverse-zone',
590d18
+        cli_metavar='REVERSE_ZONE',
590d18
     )
590d18
 
590d18
     no_reverse = Knob(
590d18
@@ -691,31 +692,6 @@ class ReplicaDNS(common.Installable, core.Group, core.Composite):
590d18
         description="Disable DNSSEC validation",
590d18
     )
590d18
 
590d18
-    dnssec_master = Knob(
590d18
-        bool, False,
590d18
-        initializable=False,
590d18
-        description="Setup server to be DNSSEC key master",
590d18
-    )
590d18
-
590d18
-    disable_dnssec_master = Knob(
590d18
-        bool, False,
590d18
-        initializable=False,
590d18
-        description="Disable the DNSSEC master on this server",
590d18
-    )
590d18
-
590d18
-    force = Knob(
590d18
-        bool, False,
590d18
-        initializable=False,
590d18
-        description="Force install",
590d18
-    )
590d18
-
590d18
-    kasp_db_file = Knob(
590d18
-        str, None,
590d18
-        initializable=False,
590d18
-        description="Copy OpenDNSSEC metadata from the specified file (will "
590d18
-                    "not create a new kasp.db file)",
590d18
-    )
590d18
-
590d18
     no_host_dns = Knob(
590d18
         bool, False,
590d18
         description="Do not use DNS for hostname lookup during installation",
590d18
@@ -750,6 +726,7 @@ class Replica(common.Installable, common.Interactive, core.Composite):
590d18
         description=("Replica server IP Address. This option can be used "
590d18
                      "multiple times"),
590d18
         cli_name='ip-address',
590d18
+        cli_metavar='IP_ADDRESS',
590d18
     )
590d18
 
590d18
     password = Knob(
590d18
@@ -774,6 +751,7 @@ class Replica(common.Installable, common.Interactive, core.Composite):
590d18
     no_ntp = Knob(
590d18
         bool, False,
590d18
         description="do not configure ntp",
590d18
+        cli_short_name='N',
590d18
     )
590d18
 
590d18
     no_ui_redirect = Knob(
590d18
@@ -864,10 +842,10 @@ class Replica(common.Installable, common.Interactive, core.Composite):
590d18
         self.reverse_zones = self.dns.reverse_zones
590d18
         self.no_reverse = self.dns.no_reverse
590d18
         self.no_dnssec_validation = self.dns.no_dnssec_validation
590d18
-        self.dnssec_master = self.dns.dnssec_master
590d18
-        self.disable_dnssec_master = self.dns.disable_dnssec_master
590d18
-        self.kasp_db_file = self.dns.kasp_db_file
590d18
-        self.force = self.dns.force
590d18
+        self.dnssec_master = False
590d18
+        self.disable_dnssec_master = False
590d18
+        self.kasp_db_file = None
590d18
+        self.force = False
590d18
         self.zonemgr = None
590d18
         self.no_host_dns = self.dns.no_host_dns
590d18
         self.no_dns_sshfp = self.dns.no_dns_sshfp
590d18
-- 
590d18
2.4.3
590d18