Fix SSL shenanigans with a hack to allow the user to specify the CA bundle file

This commit is contained in:
mike
2023-08-12 04:45:57 -07:00
parent 1a6dcdeb78
commit e665ba79d7
2 changed files with 27 additions and 2 deletions

15
main.py
View File

@ -23,7 +23,7 @@ def main():
dest="source_port",
required=False,
default=None,
help="Port of the source server"
help="Port of the source server. Requests will use https (not ssh), so you probably don't want to change this."
)
parser.add_argument(
"--source-token",
@ -57,7 +57,7 @@ def main():
dest="destination_port",
required=False,
default=None,
help="Port of the destination server"
help="Port of the destination server. Requests will use https (not ssh), so you probably don't want to change this."
)
parser.add_argument(
"--destination-token", "--dest-token",
@ -124,6 +124,13 @@ def main():
help="Don't verify SSL certificates",
)
parser.add_argument(
"--ca-bundle",
dest="ca_bundle",
default=None,
help="Specify the location of your system-wide CA Bundle, in case python is not using it."
)
args = parser.parse_args()
mig = Migrator(
source_host=args.source_hostname,
@ -133,7 +140,11 @@ def main():
destination_port=args.destination_port,
destination_token=args.destination_token
)
mig.set_verify_ssl(args.verify_ssl)
if args.ca_bundle:
mig.set_ca_bundle(args.ca_bundle)
mig.migrate_entire_org(
interactive=args.interactive,
source_org=args.source_org,