1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
|
#!/usr/bin/env python
# $Id$
"""
Unpickle trunk/ CA state packaged by ca-pickle and attempt to whack a
tk705/ rpki-ca instance into an equivalent state.
"""
import os
import sys
import time
import cPickle
import datetime
import argparse
import subprocess
import rpki.config
import rpki.x509
import rpki.POW
from base64 import urlsafe_b64encode
class LazyDict(object):
"""
Convenience wrapper to allow attribute notation for brevity
when diving into deeply nested mappings created by ca-pickle.
"""
def __init__(self, *args, **kwargs):
self._d = dict(*args, **kwargs)
def __getattr__(self, name):
if name in self._d:
return self._d[name]
raise AttributeError
def __getitem__(self, name):
if name in self._d:
return self._d[name]
raise KeyError
def __iter__(self):
return self._d.iterkeys()
iterkeys = __iter__
def __len__(self):
return len(self._d)
@classmethod
def insinuate(cls, thing):
if isinstance(thing, dict):
return cls((k, cls.insinuate(v)) for k, v in thing.iteritems())
if isinstance(thing, list):
return list(cls.insinuate(v) for v in thing)
if isinstance(thing, tuple):
return tuple(cls.insinuate(v) for v in thing)
return thing
os.environ.update(TZ = "UTC")
time.tzset()
cfg = rpki.config.argparser(doc = __doc__)
cfg.argparser.add_argument("input_file", help = "input file")
cfg.add_logging_arguments()
args = cfg.argparser.parse_args()
cfg.configure_logging(args = args)
xzcat = subprocess.Popen(("xzcat", args.input_file), stdout = subprocess.PIPE)
world = LazyDict.insinuate(cPickle.load(xzcat.stdout))
if xzcat.wait() != 0:
sys.exit("XZ unpickling failed with code {}".format(xzcat.returncode))
if False:
# Trivial test for the LazyDict code
print "Engine handle is", world.cooked_config.myrpki.handle
# None-safe wrappers for DER constructors.
def X509(obj): return None if obj is None else rpki.x509.X509( DER = obj)
def CRL(obj): return None if obj is None else rpki.x509.CRL( DER = obj)
def RSA(obj): return None if obj is None else rpki.x509.RSA( DER = obj)
def PKCS10(obj): return None if obj is None else rpki.x509.PKCS10( DER = obj)
def MFT(obj): return None if obj is None else rpki.x509.SignedManifest(DER = obj)
def ROA(obj): return None if obj is None else rpki.x509.ROA( DER = obj)
def GBR(obj): return None if obj is None else rpki.x509.Ghostbuster( DER = obj)
# Other conversions
def ski_to_gski(ski):
return None if ski is None else urlsafe_b64encode(ski).rstrip("=")
def cfg_to_bool(v):
from ConfigParser import RawConfigParser
states = RawConfigParser._boolean_states
return states[v.lower()]
# Because of the way Django ORM uses DJANGO_SETTINGS_MODULE, we'll
# probably need to fork() to handle the several databases. Shouldn't
# be particularly difficult, write three driver functions and a
# service function that fork()s then calls a driver, or something like
# that.
#
# Prototype with rpkid for now, fork later.
os.environ.update(DJANGO_SETTINGS_MODULE = "rpki.django_settings.rpkid")
import django
django.setup()
import rpki.rpkidb
print "rpkid self"
for row in world.databases.rpkid.self:
print " ", row.self_handle
rpki.rpkidb.models.Tenant.objects.create(
pk = row.self_id,
tenant_handle = row.self_handle,
use_hsm = row.use_hsm,
crl_interval = row.crl_interval,
regen_margin = row.regen_margin,
bpki_cert = X509(row.bpki_cert),
bpki_glue = X509(row.bpki_glue))
print "rpkid bsc"
for row in world.databases.rpkid.bsc:
print " ", row.bsc_handle
tenant = rpki.rpkidb.models.Tenant.objects.get(pk = row.self_id )
rpki.rpkidb.models.BSC.objects.create(
pk = row.bsc_id,
bsc_handle = row.bsc_handle,
private_key_id = RSA(row.private_key_id),
pkcs10_request = PKCS10(row.pkcs10_request),
hash_alg = row.hash_alg or "sha256",
signing_cert = X509(row.signing_cert),
signing_cert_crl = CRL(row.signing_cert_crl),
tenant = tenant)
print "rpkid repository"
for row in world.databases.rpkid.repository:
print " ", row.repository_handle
tenant = rpki.rpkidb.models.Tenant.objects.get(pk = row.self_id )
bsc = rpki.rpkidb.models.BSC.objects.get( pk = row.bsc_id, tenant = tenant )
rpki.rpkidb.models.Repository.objects.create(
pk = row.repository_id,
repository_handle = row.repository_handle,
peer_contact_uri = row.peer_contact_uri,
bpki_cert = X509(row.bpki_cert),
bpki_glue = X509(row.bpki_glue),
last_cms_timestamp = row.last_cms_timestamp,
bsc = bsc,
tenant = tenant)
print "rpkid parent"
for row in world.databases.rpkid.parent:
print " ", row.parent_handle
tenant = rpki.rpkidb.models.Tenant.objects.get( pk = row.self_id )
bsc = rpki.rpkidb.models.BSC.objects.get( pk = row.bsc_id, tenant = tenant )
repository = rpki.rpkidb.models.Repository.objects.get(pk = row.repository_id, tenant = tenant )
rpki.rpkidb.models.Parent.objects.create(
pk = row.parent_id,
parent_handle = row.parent_handle,
bpki_cert = X509(row.bpki_cms_cert),
bpki_glue = X509(row.bpki_cms_glue),
peer_contact_uri = row.peer_contact_uri,
sia_base = row.sia_base,
sender_name = row.sender_name,
recipient_name = row.recipient_name,
last_cms_timestamp = row.last_cms_timestamp,
bsc = bsc,
repository = repository,
tenant = tenant)
print "rpkid ca"
for row in world.databases.rpkid.ca:
parent = rpki.rpkidb.models.Parent.objects.get(pk = row.parent_id)
rpki.rpkidb.models.CA.objects.create(
pk = row.ca_id,
last_crl_manifest_number= max(row.last_crl_sn, row.last_manifest_sn),
last_issued_sn = row.last_issued_sn,
sia_uri = row.sia_uri,
parent_resource_class = row.parent_resource_class,
parent = parent)
print "rpkid ca_detail"
for row in world.databases.rpkid.ca_detail:
ca = rpki.rpkidb.models.CA.objects.get(pk = row.ca_id)
rpki.rpkidb.models.CADetail.objects.create(
pk = row.ca_detail_id,
public_key = RSA(row.public_key),
private_key_id = RSA(row.private_key_id),
latest_crl = CRL(row.latest_crl),
crl_published = row.crl_published,
latest_ca_cert = X509(row.latest_ca_cert),
manifest_private_key_id = RSA(row.manifest_private_key_id),
manifest_public_key = RSA(row.manifest_public_key),
latest_manifest = MFT(row.latest_manifest),
manifest_published = row.manifest_published,
state = row.state,
ca_cert_uri = row.ca_cert_uri,
ca = ca)
print "rpkid child"
for row in world.databases.rpkid.child:
print " ", row.child_handle
tenant = rpki.rpkidb.models.Tenant.objects.get(pk = row.self_id)
bsc = rpki.rpkidb.models.BSC.objects.get( pk = row.bsc_id, tenant = tenant)
rpki.rpkidb.models.Child.objects.create(
pk = row.child_id,
child_handle = row.child_handle,
bpki_cert = X509(row.bpki_cert),
bpki_glue = X509(row.bpki_glue),
last_cms_timestamp = row.last_cms_timestamp,
tenant = tenant,
bsc = bsc)
print "rpkid child_cert"
for row in world.databases.rpkid.child_cert:
child = rpki.rpkidb.models.Child.objects.get( pk = row.child_id)
ca_detail = rpki.rpkidb.models.CADetail.objects.get(pk = row.ca_detail_id)
rpki.rpkidb.models.ChildCert.objects.create(
pk = row.child_cert_id,
cert = X509(row.cert),
published = row.published,
gski = ski_to_gski(row.ski),
child = child,
ca_detail = ca_detail)
print "rpkid revoked_cert"
for row in world.databases.rpkid.revoked_cert:
ca_detail = rpki.rpkidb.models.CADetail.objects.get(pk = row.ca_detail_id)
rpki.rpkidb.models.RevokedCert.objects.create(
pk = row.revoked_cert_id,
serial = row.serial,
revoked = row.revoked,
expires = row.expires,
ca_detail = ca_detail)
print "rpkid roa"
for row in world.databases.rpkid.roa:
tenant = rpki.rpkidb.models.Tenant.objects.get( pk = row.self_id)
ca_detail = rpki.rpkidb.models.CADetail.objects.get(pk = row.ca_detail_id)
prefixes = tuple((p.version, "%s/%s-%s".format(p.prefix, p.prefixlen, p.max_prefixlen))
for p in world.databases.rpkid.roa_prefix
if p.roa_id == row.roa_id)
ipv4 = ",".join(p for v, p in prefixes if v == 4) or None
ipv6 = ",".join(p for v, p in prefixes if v == 6) or None
rpki.rpkidb.models.ROA.objects.create(
pk = row.roa_id,
asn = row.asn,
ipv4 = ipv4,
ipv6 = ipv6,
cert = X509(row.cert),
roa = ROA(row.roa),
published = row.published,
tenant = tenant,
ca_detail = ca_detail)
print "rpkid ghostbuster"
for row in world.databases.rpkid.ghostbuster:
tenant = rpki.rpkidb.models.Tenant.objects.get( pk = row.self_id)
ca_detail = rpki.rpkidb.models.CADetail.objects.get(pk = row.ca_detail_id)
rpki.rpkidb.models.Ghostbuster.objects.create(
pk = row.ghostbuster_id,
vcard = row.vcard,
cert = X509(row.cert),
ghostbuster = GBR(row.ghostbuster),
published = row.published,
tenant = tenant,
ca_detail = ca_detail)
print "rpkid ee_cert"
for row in world.databases.rpkid.ee_cert:
tenant = rpki.rpkidb.models.Tenant.objects.get( pk = row.self_id)
ca_detail = rpki.rpkidb.models.CADetail.objects.get(pk = row.ca_detail_id)
rpki.rpkidb.models.EECertificate.objects.create(
pk = row.ee_cert_id,
gski = ski_to_gski(row.ski),
cert = X509(row.cert),
published = row.published,
tenant = tenant,
ca_detail = ca_detail)
if cfg_to_bool(world.cooked_config.myrpki.run_rootd):
print "rootd enabled"
root_cer = X509(world.files[world.cooked_config.rootd["rpki-root-cert"]])
root_key = RSA(world.files[world.cooked_config.rootd["rpki-root-key"]])
root_dir = world.cooked_config.rootd["rpki-root-dir"]
root_crl = CRL(world.files[os.path.join(root_dir, world.cooked_config.rootd["rpki-root-crl"])])
root_mft = MFT(world.files[os.path.join(root_dir,world.cooked_config.rootd["rpki-root-manifest"])])
work_cer = X509(world.files[os.path.join(root_dir,world.cooked_config.rootd["rpki-subject-cert"])])
print "root cer: {!r}".format(root_cer)
print "root key: {!r}".format(root_key)
print "root crl: {!r}".format(root_crl)
print "root.mft: {!r}".format(root_mft)
print "work.cer: {!r}".format(work_cer)
root_serial = root_cer.getSerial()
work_serial = work_cer.getSerial()
mft_serial = root_mft.get_POW().certs()[0].getSerial()
print "Serials: root {} worker {} manifest {} next {}".format(
root_serial, work_serial, mft_serial,
max(root_serial, work_serial, mft_serial) + 1)
root_mft.extract()
mft_number = root_mft.get_POW().getManifestNumber()
crl_number = root_crl.getCRLNumber()
print "Numbers: CRL {} manifest {} next {}".format(
crl_number, mft_number, max(crl_number, mft_number) + 1)
|