From 186d2373e65ae30e0fe0f7e1c606ad78e297a282 Mon Sep 17 00:00:00 2001
From: Thomas Woerner <twoerner@redhat.com>
Date: Mon, 22 Jul 2019 17:52:14 +0200
Subject: [PATCH] ansible_ipa_replica: Dropped unused ds_init_info and
 krb_init_info functions

These functions are not used and therefore these functions have been
removed.
---
 .../module_utils/ansible_ipa_replica.py       | 137 ------------------
 1 file changed, 137 deletions(-)

diff --git a/roles/ipareplica/module_utils/ansible_ipa_replica.py b/roles/ipareplica/module_utils/ansible_ipa_replica.py
index c2664209..ae05e45e 100644
--- a/roles/ipareplica/module_utils/ansible_ipa_replica.py
+++ b/roles/ipareplica/module_utils/ansible_ipa_replica.py
@@ -326,40 +326,6 @@ def gen_ReplicaConfig():
     return config
 
 
-def ds_init_info(ansible_log, fstore, domainlevel, dirsrv_config_file,
-                 realm_name, host_name, domain_name, dm_password,
-                 idstart, idmax, subject_base, ca_subject,
-                 #no_hbac_allow,
-                 dirsrv_pkcs12_info, no_pkinit,
-                 external_cert_files, dirsrv_cert_files):
-
-    if not external_cert_files:
-        ds = dsinstance.DsInstance(fstore=fstore, domainlevel=domainlevel,
-                                   config_ldif=dirsrv_config_file)
-        ds.set_output(ansible_log)
-
-        if dirsrv_cert_files:
-            _dirsrv_pkcs12_info = dirsrv_pkcs12_info
-        else:
-            _dirsrv_pkcs12_info = None
-
-        with redirect_stdout(ansible_log):
-            ds.init_info(realm_name, host_name, domain_name, dm_password,
-                         subject_base, ca_subject, idstart, idmax,
-                         #hbac_allow=not no_hbac_allow,
-                         _dirsrv_pkcs12_info, setup_pkinit=not no_pkinit)
-    else:
-        ds = dsinstance.DsInstance(fstore=fstore, domainlevel=domainlevel)
-        ds.set_output(ansible_log)
-
-        with redirect_stdout(ansible_log):
-            ds.init_info(realm_name, host_name, domain_name, dm_password,
-                         subject_base, ca_subject, 1101, 1100, None,
-                         setup_pkinit=not no_pkinit)
-
-    return ds
-
-
 def replica_ds_init_info(ansible_log,
                          config, options, ca_is_configured, remote_api,
                          ds_ca_subject, ca_file,
@@ -425,109 +391,6 @@ def replica_ds_init_info(ansible_log,
     return ds
 
 
-def krb_init_info(ansible_log, fstore, realm_name, host_name, no_pkinit,
-                  subject_base):
-    krb = krbinstance.KrbInstance(fstore)
-    krb.set_output(ansible_log)
-    with redirect_stdout(ansible_log):
-        krb.init_info(realm_name, host_name, etup_pkinit=not no_pkinit,
-                      subject_base=subject_base)
-
-
-def replica_krb_init_info(ansible_log, fstore, realm_name, master_host_name,
-                          host_name, domain_name, admin_password,
-                          no_pkinit, subject_base, pkcs12_info=None):
-    # promote is not needed here
-
-    # From replicainstall.install_krb
-    krb = krbinstance.KrbInstance(fstore=fstore)
-    krb.set_output(ansible_log)
-
-    # pkinit files
-    if pkcs12_info is None:
-        pkcs12_info = make_pkcs12_info(config.dir, "pkinitcert.p12",
-                                       "pkinit_pin.txt")
-
-    #krb.create_replica(realm_name,
-    #                   master_host_name, host_name,
-    #                   domain_name, dirman_password,
-    #                   setup_pkinit, pkcs12_info,
-    #                   subject_base=subject_base,
-    #                   promote=promote)
-    with redirect_stdout(ansible_log):
-        krb.init_info(realm_name, host_name, setup_pkinit=not no_pkinit,
-                      subject_base=subject_base)
-
-        # From ipaserver.install.krbinstance.create_replica
-
-        krb.pkcs12_info = pkcs12_info
-        krb.subject_base = subject_base
-        krb.master_fqdn = master_host_name
-        krb.config_pkinit = not no_pkinit
-
-        #krb.__common_setup(realm_name, host_name, domain_name, admin_password)
-        krb.fqdn = host_name
-        krb.realm = realm_name.upper()
-        krb.host = host_name.split(".")[0]
-        krb.ip = socket.getaddrinfo(host_name, None, socket.AF_UNSPEC, socket.SOCK_STREAM)[0][4][0]
-        krb.domain = domain_name
-        krb.suffix = ipautil.realm_to_suffix(krb.realm)
-        krb.kdc_password = ipautil.ipa_generate_password()
-        krb.admin_password = admin_password
-        krb.dm_password = admin_password
-
-        #krb.__setup_sub_dict()
-        if os.path.exists(paths.COMMON_KRB5_CONF_DIR):
-            includes = 'includedir {}'.format(paths.COMMON_KRB5_CONF_DIR)
-        else:
-            includes = ''
-
-        krb.sub_dict = dict(FQDN=krb.fqdn,
-                             IP=krb.ip,
-                             PASSWORD=krb.kdc_password,
-                             SUFFIX=krb.suffix,
-                             DOMAIN=krb.domain,
-                             HOST=krb.host,
-                             SERVER_ID=installutils.realm_to_serverid(krb.realm),
-                             REALM=krb.realm,
-                             KRB5KDC_KADM5_ACL=paths.KRB5KDC_KADM5_ACL,
-                             DICT_WORDS=paths.DICT_WORDS,
-                             KRB5KDC_KADM5_KEYTAB=paths.KRB5KDC_KADM5_KEYTAB,
-                             KDC_CERT=paths.KDC_CERT,
-                             KDC_KEY=paths.KDC_KEY,
-                             CACERT_PEM=paths.CACERT_PEM,
-                             KDC_CA_BUNDLE_PEM=paths.KDC_CA_BUNDLE_PEM,
-                             CA_BUNDLE_PEM=paths.CA_BUNDLE_PEM,
-                             INCLUDES=includes)
-
-        # IPA server/KDC is not a subdomain of default domain
-        # Proper domain-realm mapping needs to be specified
-        domain = dnsname.from_text(krb.domain)
-        fqdn = dnsname.from_text(krb.fqdn)
-        if not fqdn.is_subdomain(domain):
-            logger.debug("IPA FQDN '%s' is not located in default domain '%s'",
-                         fqdn, domain)
-            server_domain = fqdn.parent().to_unicode(omit_final_dot=True)
-            logger.debug("Domain '%s' needs additional mapping in krb5.conf",
-                         server_domain)
-            dr_map = " .%(domain)s = %(realm)s\n %(domain)s = %(realm)s\n" \
-                        % dict(domain=server_domain, realm=krb.realm)
-        else:
-            dr_map = ""
-        krb.sub_dict['OTHER_DOMAIN_REALM_MAPS'] = dr_map
-
-        # Configure KEYRING CCACHE if supported
-        if kernel_keyring.is_persistent_keyring_supported():
-            logger.debug("Enabling persistent keyring CCACHE")
-            krb.sub_dict['OTHER_LIBDEFAULTS'] = \
-                " default_ccache_name = KEYRING:persistent:%{uid}\n"
-        else:
-            logger.debug("Persistent keyring CCACHE is not enabled")
-            krb.sub_dict['OTHER_LIBDEFAULTS'] = ''
-
-    return krb
-
-
 def ansible_module_get_parsed_ip_addresses(ansible_module,
                                            param='ip_addresses'):
     ip_addrs = []
-- 
GitLab