@@ -363,7 +363,7 @@ def getAdministrationPort(server, topology):
363
363
def isAdministrationPortEnabledForServer (server , topology ):
364
364
administrationPortEnabled = False
365
365
if 'AdministrationPortEnabled' in server :
366
- administrationPortEnabled = server ['AdministrationPortEnabled' ] == 'true'
366
+ administrationPortEnabled = server ['AdministrationPortEnabled' ]
367
367
else :
368
368
administrationPortEnabled = isAdministrationPortEnabledForDomain (topology )
369
369
return administrationPortEnabled
@@ -373,7 +373,7 @@ def isAdministrationPortEnabledForDomain(topology):
373
373
administrationPortEnabled = False
374
374
375
375
if 'AdministrationPortEnabled' in topology :
376
- administrationPortEnabled = topology ['AdministrationPortEnabled' ] == 'true'
376
+ administrationPortEnabled = topology ['AdministrationPortEnabled' ]
377
377
else :
378
378
# AdministrationPortEnabled is not explicitly set so going with the default
379
379
# Starting with 14.1.2.0, the domain's AdministrationPortEnabled default is derived from the domain's SecureMode
@@ -385,11 +385,11 @@ def isAdministrationPortEnabledForDomain(topology):
385
385
def isSecureModeEnabledForDomain (topology ):
386
386
secureModeEnabled = False
387
387
if 'SecurityConfiguration' in topology and 'SecureMode' in topology ['SecurityConfiguration' ] and 'SecureModeEnabled' in topology ['SecurityConfiguration' ]['SecureMode' ]:
388
- secureModeEnabled = topology ['SecurityConfiguration' ]['SecureMode' ]['SecureModeEnabled' ] == 'true'
388
+ secureModeEnabled = topology ['SecurityConfiguration' ]['SecureMode' ]['SecureModeEnabled' ]
389
389
else :
390
390
is_production_mode_enabled = False
391
391
if 'ProductionModeEnabled' in topology :
392
- is_production_mode_enabled = topology ['ProductionModeEnabled' ] == 'true'
392
+ is_production_mode_enabled = topology ['ProductionModeEnabled' ]
393
393
secureModeEnabled = is_production_mode_enabled and not env .wlsVersionEarlierThan ("14.1.2.0" )
394
394
return secureModeEnabled
395
395
@@ -429,7 +429,7 @@ def _get_ssl_listen_port(server):
429
429
ssl = getSSLOrNone (server )
430
430
ssl_listen_port = None
431
431
model = env .getModel ()
432
- if ssl is not None and 'Enabled' in ssl and ssl ['Enabled' ] == 'true' :
432
+ if ssl is not None and 'Enabled' in ssl and ssl ['Enabled' ]:
433
433
ssl_listen_port = ssl ['ListenPort' ]
434
434
if ssl_listen_port is None :
435
435
ssl_listen_port = "7002"
@@ -611,7 +611,7 @@ def customizeManagedIstioNetworkAccessPoint(template, listen_address):
611
611
ssl = getSSLOrNone (template )
612
612
ssl_listen_port = None
613
613
model = env .getModel ()
614
- if ssl is not None and 'Enabled' in ssl and ssl ['Enabled' ] == 'true' :
614
+ if ssl is not None and 'Enabled' in ssl and ssl ['Enabled' ]:
615
615
ssl_listen_port = ssl ['ListenPort' ]
616
616
if ssl_listen_port is None :
617
617
ssl_listen_port = "7002"
@@ -676,7 +676,7 @@ def addAdminChannelPortForwardNetworkAccessPoints(server):
676
676
677
677
ssl = getSSLOrNone (server )
678
678
ssl_listen_port = None
679
- if ssl is not None and 'Enabled' in ssl and ssl ['Enabled' ] == 'true' :
679
+ if ssl is not None and 'Enabled' in ssl and ssl ['Enabled' ]:
680
680
ssl_listen_port = ssl ['ListenPort' ]
681
681
if ssl_listen_port is None :
682
682
ssl_listen_port = "7002"
0 commit comments