This file is indexed.

/usr/share/pyshared/juju/state/initialize.py is in juju-0.7 0.7-0ubuntu2.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
import logging
import uuid

from twisted.internet.defer import inlineCallbacks
from txzookeeper.client import ZOO_OPEN_ACL_UNSAFE

from juju.machine.constraints import Constraints, ConstraintSet

from .auth import make_ace
from .environment import EnvironmentStateManager, GlobalSettingsStateManager
from .machine import MachineStateManager


log = logging.getLogger("juju.state.init")


class StateHierarchy(object):
    """
    An initializer to the juju zookeeper hierarchy.
    """

    def __init__(self, client, admin_identity, instance_id, constraints_data,
                 provider_type):
        """
        :param client: A zookeeper client
        :param admin_identity: A zookeeper auth identity for the admin.
        :param instance_id: The boostrap node machine id.
        :param constraints_data: A Constraints's data dictionary with which to
            set up the first machine state, and to store in the environment.
        :param provider_type: The type of the environnment machine provider.
        """
        self.client = client
        self.admin_identity = admin_identity
        if instance_id.isdigit():
            instance_id = int(instance_id)
        self.instance_id = instance_id

        self.constraints_data = constraints_data
        self.provider_type = provider_type

    @inlineCallbacks
    def initialize(self):
        log.info("Initializing zookeeper hierarchy")

        acls = [make_ace(self.admin_identity, all=True),
                # XXX till we have roles throughout
                ZOO_OPEN_ACL_UNSAFE]

        yield self.client.create("/charms", acls=acls)
        yield self.client.create("/services", acls=acls)
        yield self.client.create("/machines", acls=acls)
        yield self.client.create("/units", acls=acls)
        yield self.client.create("/relations", acls=acls)

        # In this very specific case, it's OK to create a Constraints object
        # with a non-provider-specific ConstraintSet, because *all* we need it
        # for is its data dict. In *any* other circumstances, this would be Bad
        # and Wrong.
        constraints = Constraints(ConstraintSet(None), self.constraints_data)

        # Poke constraints data into a machine state to represent this machine.
        manager = MachineStateManager(self.client)
        machine_state = yield manager.add_machine_state(constraints)

        yield machine_state.set_instance_id(self.instance_id)

        # Set up environment constraints similarly.
        esm = EnvironmentStateManager(self.client)
        yield esm.set_constraints(constraints)

        # Setup default global settings information.
        settings = GlobalSettingsStateManager(self.client)
        yield settings.set_provider_type(self.provider_type)
        yield settings.set_environment_id(uuid.uuid4().get_hex())

        # This must come last, since clients will wait on it.
        yield self.client.create("/initialized", acls=acls)

        # DON'T WRITE ANYTHING HERE.  See line above.