aboutsummaryrefslogtreecommitdiff
path: root/openssl/trunk/demos/sign/sign.c
blob: a6c66e17c3c3183bb047259a7203655215a1fa7b (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
# $Id$
#
# Copyright (C) 2013--2014  Dragon Research Labs ("DRL")
# Portions copyright (C) 2009--2012  Internet Systems Consortium ("ISC")
# Portions copyright (C) 2007--2008  American Registry for Internet Numbers ("ARIN")
#
# Permission to use, copy, modify, and distribute this software for any
# purpose with or without fee is hereby granted, provided that the above
# copyright notices and this permission notice appear in all copies.
#
# THE SOFTWARE IS PROVIDED "AS IS" AND DRL, ISC, AND ARIN DISCLAIM ALL
# WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED
# WARRANTIES OF MERCHANTABILITY AND FITNESS.  IN NO EVENT SHALL DRL,
# ISC, OR ARIN BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR
# CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS
# OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT,
# NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION
# WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

"""
IR database daemon.

This is the old (pre-Django) version of irdbd, still used by smoketest
and perhaps still useful as a minimal example.  This does NOT work with
the GUI, rpkic, or any of the other more recent tools.
"""

# pylint: skip-file

import os
import time
import logging
import argparse
import urlparse
import rpki.http_simple
import rpki.config
import rpki.resource_set
import rpki.relaxng
import rpki.exceptions
import rpki.left_right
import rpki.log
import rpki.x509

from rpki.mysql_import import MySQLdb

logger = logging.getLogger(__name__)

class main(object):


    def handle_list_resources(self, q_pdu, r_msg):

        r_pdu = rpki.left_right.list_resources_elt()
        r_pdu.tag = q_pdu.tag
        r_pdu.self_handle = q_pdu.self_handle
        r_pdu.child_handle = q_pdu.child_handle

        self.cur.execute(
            """
            SELECT registrant_id, valid_until
            FROM registrant
            WHERE registry_handle = %s AND registrant_handle = %s
            """,
            (q_pdu.self_handle, q_pdu.child_handle))

        if self.cur.rowcount != 1:
            raise rpki.exceptions.NotInDatabase(
                "This query should have produced a single exact match, something's messed up"
                " (rowcount = %d, self_handle = %s, child_handle = %s)"
                % (self.cur.rowcount, q_pdu.self_handle, q_pdu.child_handle))

        registrant_id, valid_until = self.cur.fetchone()

        r_pdu.valid_until = valid_until.strftime("%Y-%m-%dT%H:%M:%SZ")

        r_pdu.asn  = rpki.resource_set.resource_set_as.from_sql(
            self.cur,
            """
            SELECT start_as, end_as
            FROM registrant_asn
            WHERE registrant_id = %s
            """,
            (registrant_id,))

        r_pdu.ipv4 = rpki.resource_set.resource_set_ipv4.from_sql(
            self.cur,
            """
            SELECT start_ip, end_ip
            FROM registrant_net
            WHERE registrant_id = %s AND version = 4
            """,
            (registrant_id,))

        r_pdu.ipv6 = rpki.resource_set.resource_set_ipv6.from_sql(
            self.cur,
            """
            SELECT start_ip, end_ip
            FROM registrant_net
            WHERE registrant_id = %s AND version = 6
            """,
            (registrant_id,))

        r_msg.append(r_pdu)


    def handle_list_roa_requests(self, q_pdu, r_msg):

        self.cur.execute(
            "SELECT roa_request_id, asn FROM roa_request WHERE self_handle = %s",
            (q_pdu.self_handle,))

        for roa_request_id, asn in self.cur.fetchall():

            r_pdu = rpki.left_right.list_roa_requests_elt()
            r_pdu.tag = q_pdu.tag
            r_pdu.self_handle = q_pdu.self_handle
            r_pdu.asn = asn

            r_pdu.ipv4 = rpki.resource_set.roa_prefix_set_ipv4.from_sql(
                self.cur,
                """
                SELECT prefix, prefixlen, max_prefixlen
                FROM roa_request_prefix
                WHERE roa_request_id = %s AND version = 4
                """,
                (roa_request_id,))

            r_pdu.ipv6 = rpki.resource_set.roa_prefix_set_ipv6.from_sql(
                self.cur,
                """<
", (roa_request_id,)) r_msg.append(r_pdu) def handle_list_ghostbuster_requests(self, q_pdu, r_msg): self.cur.execute( """ SELECT vcard FROM ghostbuster_request WHERE self_handle = %s AND parent_handle = %s """, (q_pdu.self_handle, q_pdu.parent_handle)) vcards = [result[0] for result in self.cur.fetchall()] if not vcards: self.cur.execute( """ SELECT vcard FROM ghostbuster_request WHERE self_handle = %s AND parent_handle IS NULL """, (q_pdu.self_handle,)) vcards = [result[0] for result in self.cur.fetchall()] for vcard in vcards: r_pdu = rpki.left_right.list_ghostbuster_requests_elt() r_pdu.tag = q_pdu.tag r_pdu.self_handle = q_pdu.self_handle r_pdu.parent_handle = q_pdu.parent_handle r_pdu.vcard = vcard r_msg.append(r_pdu) def handle_list_ee_certificate_requests(self, q_pdu, r_msg): self.cur.execute( """ SELECT ee_certificate_id, pkcs10, gski, cn, sn, eku, valid_until FROM ee_certificate WHERE self_handle = %s """, (q_pdu.self_handle,)) for ee_certificate_id, pkcs10, gski, cn, sn, eku, valid_until in self.cur.fetchall(): r_pdu = rpki.left_right.list_ee_certificate_requests_elt() r_pdu.tag = q_pdu.tag r_pdu.self_handle = q_pdu.self_handle r_pdu.valid_until = valid_until.strftime("%Y-%m-%dT%H:%M:%SZ") r_pdu.pkcs10 = rpki.x509.PKCS10(DER = pkcs10) r_pdu.gski = gski r_pdu.cn = cn r_pdu.sn = sn r_pdu.eku = eku r_pdu.asn = rpki.resource_set.resource_set_as.from_sql( self.cur, """ SELECT start_as, end_as FROM ee_certificate_asn WHERE ee_certificate_id = %s """, (ee_certificate_id,)) r_pdu.ipv4 = rpki.resource_set.resource_set_ipv4.from_sql( self.cur, """ SELECT start_ip, end_ip FROM ee_certificate_net WHERE ee_certificate_id = %s AND version = 4 """, (ee_certificate_id,)) r_pdu.ipv6 = rpki.resource_set.resource_set_ipv6.from_sql( self.cur, """ SELECT start_ip, end_ip FROM ee_certificate_net WHERE ee_certificate_id = %s AND version = 6 """, (ee_certificate_id,)) r_msg.append(r_pdu) handle_dispatch = { rpki.left_right.list_resources_elt : handle_list_resources, rpki.left_right.list_roa_requests_elt : handle_list_roa_requests, rpki.left_right.list_ghostbuster_requests_elt : handle_list_ghostbuster_requests, rpki.left_right.list_ee_certificate_requests_elt : handle_list_ee_certificate_requests } def handler(self, request, q_der): try: self.db.ping(True) r_msg = rpki.left_right.msg.reply() try: q_msg = rpki.left_right.cms_msg_saxify(DER = q_der).unwrap((self.bpki_ta, self.rpkid_cert)) if not isinstance(q_msg, rpki.left_right.msg) or not q_msg.is_query(): raise rpki.exceptions.BadQuery("Unexpected %r PDU" % q_msg) for q_pdu in q_msg: try: try: h = self.handle_dispatch[type(q_pdu)] except KeyError: raise rpki.exceptions.BadQuery("Unexpected %r PDU" % q_pdu) else: h(self, q_pdu, r_msg) except Exception, e: logger.exception("Exception serving PDU %r", q_pdu) r_msg.append(rpki.left_right.report_error_elt.from_exception(e, q_pdu.self_handle, q_pdu.tag)) except Exception, e: logger.exception("Exception decoding query") r_msg.append(rpki.left_right.report_error_elt.from_exception(e)) request.send_cms_response(rpki.left_right.cms_msg_saxify().wrap(r_msg, self.irdbd_key, self.irdbd_cert)) except Exception, e: logger.exception("Unhandled exception, returning HTTP failure") request.send_error(500, "Unhandled exception %s: %s" % (e.__class__.__name__, e)) def __init__(self): os.environ["TZ"] = "UTC" time.tzset() parser = argparse.ArgumentParser(description = __doc__) parser.add_argument("-c", "--config", help = "override default location of configuration file") parser.add_argument("-f", "--foreground", action = "store_true", help = "do not daemonize (ignored, old_irdbd never daemonizes)") rpki.log.argparse_setup(parser) args = parser.parse_args() rpki.log.init("irdbd", args) self.cfg = rpki.config.parser(set_filename = args.config, section = "irdbd") startup_msg = self.cfg.get("startup-message", "") if startup_msg: logger.info(startup_msg) self.cfg.set_global_flags() self.db = MySQLdb.connect(user = self.cfg.get("sql-username"), db = self.cfg.get("sql-database"), passwd = self.cfg.get("sql-password")) self.cur = self.db.cursor() self.db.autocommit(True) self.bpki_ta = rpki.x509.X509(Auto_update = self.cfg.get("bpki-ta")) self.rpkid_cert = rpki.x509.X509(Auto_update = self.cfg.get("rpkid-cert")) self.irdbd_cert = rpki.x509.X509(Auto_update = self.cfg.get("irdbd-cert")) self.irdbd_key = rpki.x509.RSA( Auto_update = self.cfg.get("irdbd-key")) u = urlparse.urlparse(self.cfg.get("http-url")) assert u.scheme in ("", "http") and \ u.username is None and \ u.password is None and \ u.params == "" and \ u.query == "" and \ u.fragment == "" rpki.http_simple.server(host = u.hostname or "localhost", port = u.port or 443, handlers = ((u.path, self.handler),))