summaryrefslogtreecommitdiffstats
path: root/base/deploy/src/pkidestroy
diff options
context:
space:
mode:
authorAde Lee <alee@redhat.com>2013-02-01 14:21:25 -0500
committerAde Lee <alee@redhat.com>2013-02-11 11:20:56 -0500
commit8acab668775a85931c33e68eb79b2cf822b7c631 (patch)
tree59ae544c920503a6fc6fde2cf4b7832026808e1c /base/deploy/src/pkidestroy
parent4cd35fd44d71305a985ad8616ffad0fd355af2bf (diff)
downloadpki-8acab668775a85931c33e68eb79b2cf822b7c631.tar.gz
pki-8acab668775a85931c33e68eb79b2cf822b7c631.tar.xz
pki-8acab668775a85931c33e68eb79b2cf822b7c631.zip
Change pkidestroy to get an install token and use admin interface to update
security domain.
Diffstat (limited to 'base/deploy/src/pkidestroy')
-rwxr-xr-xbase/deploy/src/pkidestroy20
1 files changed, 20 insertions, 0 deletions
diff --git a/base/deploy/src/pkidestroy b/base/deploy/src/pkidestroy
index ba52d9642..839e1cad5 100755
--- a/base/deploy/src/pkidestroy
+++ b/base/deploy/src/pkidestroy
@@ -100,6 +100,18 @@ def main(argv):
nargs=1, metavar='<instance>',
help='FORMAT: ${pki_instance_name}')
+ parser.optional.add_argument('-u',
+ dest='pki_secdomain_user',
+ action='store',
+ nargs=1, metavar='<security domain user>',
+ help='security domain user')
+
+ parser.optional.add_argument('-w',
+ dest='pki_secdomain_pass',
+ action='store',
+ nargs=1, metavar='<security domain password>',
+ help='security domain password')
+
args = parser.process_command_line_arguments(argv)
interactive = False
@@ -142,6 +154,14 @@ def main(argv):
else:
break
+ # '-u'
+ if args.pki_secdomain_user:
+ config.pki_secdomain_user = str(args.pki_secdomain_user).strip('[\']')
+
+ # '-w'
+ if args.pki_secdomain_pass:
+ config.pki_secdomain_pass = str(args.pki_secdomain_pass).strip('[\']')
+
# verify that previously deployed instance exists
deployed_pki_instance_path = config.pki_root_prefix +\
config.PKI_DEPLOYMENT_BASE_ROOT + "/" +\