aboutsummaryrefslogtreecommitdiff
path: root/scripts/convert-from-entitydb-to-sql.py
diff options
context:
space:
mode:
authorRob Austein <sra@hactrn.net>2011-12-13 00:17:41 +0000
committerRob Austein <sra@hactrn.net>2011-12-13 00:17:41 +0000
commit266a24c2d42c6e064561e39aef3bd40a674e61cc (patch)
tree735083028b807d25fa2225a409e1bb0b6251da6a /scripts/convert-from-entitydb-to-sql.py
parent63676e02d7e58487cb0794659de6602168e36e90 (diff)
Flesh out BPKI methods
svn path=/branches/tk100/; revision=4118
Diffstat (limited to 'scripts/convert-from-entitydb-to-sql.py')
-rw-r--r--scripts/convert-from-entitydb-to-sql.py38
1 files changed, 21 insertions, 17 deletions
diff --git a/scripts/convert-from-entitydb-to-sql.py b/scripts/convert-from-entitydb-to-sql.py
index 8885893b..1ab5201d 100644
--- a/scripts/convert-from-entitydb-to-sql.py
+++ b/scripts/convert-from-entitydb-to-sql.py
@@ -113,30 +113,35 @@ def read_openssl_serial(filename):
return int(text.strip(), 16)
def get_or_create_CA(purpose):
+ cer = rpki.x509.X509(Auto_file = os.path.join(bpki, purpose, "ca.cer"))
+ key = rpki.x509.RSA(Auto_file = os.path.join(bpki, purpose, "ca.key"))
crl = rpki.x509.CRL(Auto_file = os.path.join(bpki, purpose, "ca.crl"))
serial = read_openssl_serial(os.path.join(bpki, purpose, "serial"))
crl_number = read_openssl_serial(os.path.join(bpki, purpose, "crl_number"))
- return rpki.irdb.CA.objects.get_or_create(identity = identity,
- purpose = rpki.irdb.CA.purpose_map[purpose],
- next_serial = serial,
- next_crl_number = crl_number,
- last_crl_update = crl.getThisUpdate().to_sql(),
- next_crl_update = crl.getNextUpdate().to_sql())[0]
-
-def get_or_create_KeyedCertificate(issuer, purpose):
+ return rpki.irdb.CA.objects.get_or_create(
+ identity = identity,
+ purpose = rpki.irdb.CA.purpose_map[purpose],
+ certificate = cer,
+ private_key = key,
+ latest_crl = crl,
+ next_serial = serial,
+ next_crl_number = crl_number,
+ last_crl_update = crl.getThisUpdate().to_sql(),
+ next_crl_update = crl.getNextUpdate().to_sql())[0]
+
+def get_or_create_EECertificate(issuer, purpose):
cer = rpki.x509.X509(Auto_file = os.path.join(bpki, "servers", purpose + ".cer"))
key = rpki.x509.RSA(Auto_file = os.path.join(bpki, "servers", purpose + ".key"))
- rpki.irdb.KeyedCertificate.objects.get_or_create(
+ rpki.irdb.EECertificate.objects.get_or_create(
issuer = issuer,
- purpose = rpki.irdb.KeyedCertificate.purpose_map[purpose],
+ purpose = rpki.irdb.EECertificate.purpose_map[purpose],
certificate = cer,
private_key = key)
# Load BPKI CA data
resource_ca = get_or_create_CA("resources")
-get_or_create_KeyedCertificate(resource_ca, "ca")
# Load BPKI server EE certificates and keys
@@ -145,15 +150,14 @@ run_flags = dict((i, cfg.getboolean(i, section = "myrpki"))
if any(run_flags.itervalues()):
server_ca = get_or_create_CA("servers")
- get_or_create_KeyedCertificate(server_ca, "ca")
- get_or_create_KeyedCertificate(server_ca, "irbe")
+ get_or_create_EECertificate(server_ca, "irbe")
if run_flags["run_rpkid"]:
- get_or_create_KeyedCertificate(server_ca, "rpkid")
- get_or_create_KeyedCertificate(server_ca, "irdbd")
+ get_or_create_EECertificate(server_ca, "rpkid")
+ get_or_create_EECertificate(server_ca, "irdbd")
if run_flags["run_pubd"]:
- get_or_create_KeyedCertificate(server_ca, "pubd")
+ get_or_create_EECertificate(server_ca, "pubd")
if run_flags["run_rootd"]:
- get_or_create_KeyedCertificate(server_ca, "rootd")
+ get_or_create_EECertificate(server_ca, "rootd")
else:
server_ca = None