diff options
-rw-r--r-- | scripts/apnic-poke-1.sh | 76 | ||||
-rw-r--r-- | scripts/apnic-poke-1.yaml | 28 | ||||
-rw-r--r-- | scripts/biz-certs/Bob-CA.srl | 2 |
3 files changed, 105 insertions, 1 deletions
diff --git a/scripts/apnic-poke-1.sh b/scripts/apnic-poke-1.sh new file mode 100644 index 00000000..ff6796a7 --- /dev/null +++ b/scripts/apnic-poke-1.sh @@ -0,0 +1,76 @@ +#!/bin/sh - +# $Id$ +# +# Script to let APNIC test against my server. +# +# This blows away rpkid's database and rebuilds it with what we need +# for this test, and knows far too much about the id numbers that +# rpkid and mysql will assign. In the long run we must do better than +# this, but gotta start somewhere. + +openssl=../openssl/openssl/apps/openssl + +# Halt on first error and show what's happening + +set -ex + +# Generate new key and cert for testroot.py if needed + +if test ! -r testroot.cer -o ! -r testroot.key +then + $openssl req -new -newkey rsa:2048 -nodes -keyout testroot.key -out testroot.req -config testroot.cnf + $openssl x509 -req -in testroot.req -out testroot.cer -extfile testroot.cnf -extensions req_x509_ext -signkey testroot.key -text -sha256 + rm -f testroot.req +fi + +# Blow away old rpkid database (!) so we can start clean + +mysql -u rpki -p`awk '$1 == "sql-password" {print $3}' rpkid.conf` rpki <../docs/rpki-db-schema.sql + +# Clear out any old publication results + +rm -rf publication + +# Start rpkid so we can configure it, make sure we shut it down on exit + +python rpkid.py >rpkid.log 2>&1 & rpkid=$! +trap "kill $rpkid" 0 1 2 3 13 15 + +# Create a self instance + +python irbe-cli.py self --action create --crl_interval 84600 + +# Create a business signing context, issue the necessary business cert, and set up the cert chain + +python irbe-cli.py --pem_out bsc.req bsc --action create --self_id 1 --generate_keypair --signing_cert biz-certs/Bob-CA.cer +$openssl x509 -req -in bsc.req -out bsc.cer -CA biz-certs/Bob-CA.cer -CAkey biz-certs/Bob-CA.key -CAserial biz-certs/Bob-CA.srl +python irbe-cli.py bsc --action set --self_id 1 --bsc_id 1 --signing_cert bsc.cer +rm -f bsc.req bsc.cer + +# Create a repository context + +python irbe-cli.py repository --self_id 1 --action create --bsc_id 1 + +# Create a parent context pointing at testroot.py + +python irbe-cli.py parent --self_id 1 --action create --bsc_id 1 --repository_id 1 \ + --peer_contact_uri https://localhost:44333/ \ + --cms_ta biz-certs/Elena-Root.cer \ + --https_ta biz-certs/Elena-Root.cer \ + --sia_base rsync://wombat.invalid/ + +# Create a child context -- note that we're using the -CA as trust anchor rather than -Root, +# because the APNIC poke tool doesn't offer any way to construct CMS chains + +python irbe-cli.py child --self_id 1 --action create --bsc_id 1 --cms_ta biz-certs/Frank-Root.cer + +# Run the other daemons, arrange for everything to go away on shutdown, +# run initial cron job to set things up, then wait + +python testroot.py >testroot.log 2>&1 & testroot=$! +python irdb.py >irdb.log 2>&1 & irdb=$! +trap "kill $rpkid $irdb $testroot" 0 1 2 3 13 15 + +python http-client.py + +tail +0f rpkid.log diff --git a/scripts/apnic-poke-1.yaml b/scripts/apnic-poke-1.yaml new file mode 100644 index 00000000..24b80561 --- /dev/null +++ b/scripts/apnic-poke-1.yaml @@ -0,0 +1,28 @@ +--- +# $Id$ + +version: 1 +posturl: https://adrilankha.hactrn.net:4433/up-down/1 +recipient-id: wombat +sender-id: "1" + +cms-cert-file: biz-certs/Frank-EE.cer +cms-key-file: biz-certs/Frank-EE.key +cms-ca-cert-file: biz-certs/Bob-Root.cer +cms-cert-chain-file: [ biz-certs/Frank-CA.cer ] + +ssl-cert-file: biz-certs/Frank-EE.cer +ssl-key-file: biz-certs/Frank-EE.key +ssl-ca-cert-file: biz-certs/Bob-Root.cer + +requests: + list: + type: list + issue: + type: issue + class: 1 + sia: [ "rsync://bandicoot.invalid/some/where/" ] + revoke: + type: revoke + class: 1 + ski: "CB5K6APY-4KcGAW9jaK_cVPXKX0" diff --git a/scripts/biz-certs/Bob-CA.srl b/scripts/biz-certs/Bob-CA.srl index 4ae81a8c..ba1fecaa 100644 --- a/scripts/biz-certs/Bob-CA.srl +++ b/scripts/biz-certs/Bob-CA.srl @@ -1 +1 @@ -90801F1ED19454EF +90801F1ED19454F1 |