def genCrt(name): letters = "abcdefghijklmnopqrstuvwxyz" rnd = random.Random() SecurityBorker.bork() #Disables PKIX validation cred={"user":"******","passwd":"capasswd"} url = "https://127.0.0.1:9876" s = xmlrpclib.ServerProxy(url) base_subj = {} base_subj["C"]="US" base_subj["ST"]="Texas" base_subj["L"]="San Antonio" base_subj["O"]="RackExp" name = rndName(8) subj = copy.deepcopy(base_subj) subj["CN"] = "%s.%s"%(name,"rackexp.org") subj["OU"] = "%s unit"%(name) r = s.genCrt(cred,2048,subj) (key,crt) = (r["key",r["crt"])
import org.hexp.hibernateexp.util.SslNonsense.SecurityBorker as SecurityBorker import util util.setConfig("stag.json", skipDb=True) from util import * import xmlrpclib import re import sys import os ssl_re = re.compile("^ssl[0-9]+$") baseSubj = "C=US,ST=Texas,L=San Antonio,O=RackExp,OU=client TestSites" SecurityBorker.bork() def usage(prog): printf("usage is %s <chain.json> <dnsxmlrpcconf.json> <baseDomain> ", prog) printf("<Shared ip> <vs_name> <number> <info.db>\n") printf("\n") def getCFS(info): crtNames = [] cfs = [] certs = info["certs"] vs_name = info["vs_name"] ip = info["ip"] vss = []
import org.hexp.hibernateexp.util.SslNonsense.SecurityBorker as SecurityBorker import util util.setConfig("stag.json",skipDb=True) from util import * import xmlrpclib import re import sys import os ssl_re = re.compile("^ssl[0-9]+$") baseSubj = "C=US,ST=Texas,L=San Antonio,O=RackExp,OU=client TestSites" SecurityBorker.bork() def usage(prog): printf("usage is %s <chain.json> <dnsxmlrpcconf.json> <baseDomain> ",prog) printf("<Shared ip> <vs_name> <number> <info.db>\n") printf("\n") def getCFS(info): crtNames = [] cfs = [] certs = info["certs"] vs_name = info["vs_name"] ip = info["ip"] vss = [] for (host,cb) in certs.items(): cf = CertificateFiles(cb["crt"] + cb["chain"],cb["key"])