1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
|
# $Id$
"""
Command line program to simulate behavior of the IR back-end.
"""
import glob, rpki.left_right, rpki.relaxng, getopt, sys, lxml.etree, POW, POW.pkix, rpki.cms, rpki.https, xml.sax, lxml.sax
# Kludge around current test setup all being PEM rather than DER format
convert_from_pem = True
class command(object):
elements = ()
def getopt(self, argv):
opts, args = getopt.getopt(argv, "", [x + "=" for x in self.attributes + self.elements] + [x for x in self.booleans])
for o, a in opts:
o = o[2:]
handler = getattr(self, "handle_" + o, None)
if handler is not None:
handler(a)
elif o in self.booleans:
setattr(self, o, True)
else:
assert o in self.attributes
setattr(self, o, a)
return args
def process(self, msg, argv):
argv = self.getopt(argv)
msg.append(self)
return argv
def handle_action(self, arg):
self.action = arg
self.type = "query"
def handle_peer_ta(self, arg):
self.peer_ta = read_cert(arg)
def read_cert(filename):
f = open(filename, "r")
der = f.read()
f.close()
if convert_from_pem:
der = POW.pemRead(POW.X509_CERTIFICATE, der).derWrite()
cert = POW.pkix.Certificate()
cert.fromString(der)
return cert
class self(command, rpki.left_right.self_elt):
elements = ("extension_preference",)
def handle_extension_preference(self, arg):
k,v = arg.split("=", 1)
pref = rpki.left_right.extension_preference_elt()
pref.name = k
pref.value = v
self.prefs.append(pref)
class bsc(command, rpki.left_right.bsc_elt):
elements = ('signing_cert',)
def handle_signing_cert(self, arg):
self.signing_cert.append(read_cert(arg))
class parent(command, rpki.left_right.parent_elt):
elements = ("peer_ta",)
class child(command, rpki.left_right.child_elt):
elements = ("peer_ta",)
class repository(command, rpki.left_right.repository_elt):
elements = ("peer_ta",)
class route_origin(command, rpki.left_right.route_origin_elt):
def handle_asn(self, arg):
self.asn = long(arg)
def handle_ipv4(self, arg):
self.ipv4 = resource_set.resource_set_ipv4(arg)
def handle_ipv6(self, arg):
self.ipv6 = resource_set.resource_set_ipv6(arg)
dispatch = dict((x.element_name, x) for x in (self, bsc, parent, child, repository, route_origin))
def usage():
print "Usage:", sys.argv[0]
for k,v in dispatch.iteritems():
print " ", k, " ".join(["--" + x + "=" for x in v.attributes + v.elements]), " ".join(["--" + x for x in v.booleans])
sys.exit(1)
def main():
rng = rpki.relaxng.RelaxNG("left-right-schema.rng")
httpsCerts = rpki.https.CertInfo("Bob")
q_msg = rpki.left_right.msg()
argv = sys.argv[1:]
if not argv:
usage()
else:
while argv:
try:
cmd = dispatch[argv[0]]()
except KeyError:
usage()
argv = cmd.process(q_msg, argv[1:])
assert q_msg
q_elt = q_msg.toXML()
q_xml = lxml.etree.tostring(q_elt, pretty_print=True, encoding="us-ascii", xml_declaration=True)
try:
rng.assertValid(q_elt)
except lxml.etree.DocumentInvalid:
print "Generated request document doesn't pass schema check:"
print q_xml
sys.exit(1)
print q_xml
q_cms = rpki.cms.encode(q_xml, "biz-certs/Alice-EE.key", ("biz-certs/Alice-EE.cer", "biz-certs/Alice-CA.cer"))
r_cms = rpki.https.client(certInfo=httpsCerts, msg=q_cms, url="/left-right")
r_xml = rpki.cms.decode(r_cms, "biz-certs/Bob-Root.cer")
print r_xml
r_elt = lxml.etree.fromstring(r_xml)
try:
rng.assertValid(r_elt)
except lxml.etree.DocumentInvalid:
print "Received reply document doesn't pass schema check:"
print r_xml
sys.exit(1)
handler = rpki.left_right.sax_handler()
lxml.sax.saxify(r_elt, handler)
r_msg = handler.result
# Do something useful with reply here
print r_msg
if __name__ == "__main__": main()
|