summaryrefslogtreecommitdiff
path: root/csharp/test/IceSSL/certs/makecerts.py
diff options
context:
space:
mode:
Diffstat (limited to 'csharp/test/IceSSL/certs/makecerts.py')
-rwxr-xr-xcsharp/test/IceSSL/certs/makecerts.py68
1 files changed, 45 insertions, 23 deletions
diff --git a/csharp/test/IceSSL/certs/makecerts.py b/csharp/test/IceSSL/certs/makecerts.py
index c1beb6ee40f..93e6816dc21 100755
--- a/csharp/test/IceSSL/certs/makecerts.py
+++ b/csharp/test/IceSSL/certs/makecerts.py
@@ -3,17 +3,21 @@
# Copyright (c) ZeroC, Inc. All rights reserved.
#
-import os, sys, socket, getopt
+import os
+import sys
+import getopt
try:
import IceCertUtils
-except:
- print("error: couldn't find IceCertUtils, install `zeroc-icecertutils' package "
- "from Python package repository")
+except ImportError:
+ print(
+ "error: couldn't find IceCertUtils, install `zeroc-icecertutils' package "
+ "from Python package repository"
+ )
sys.exit(1)
-toplevel="."
-while(os.path.abspath(toplevel) != "/"):
+toplevel = "."
+while os.path.abspath(toplevel) != "/":
toplevel = os.path.normpath(os.path.join("..", toplevel))
if os.path.exists(os.path.join(toplevel, "scripts", "Util.py")):
break
@@ -22,10 +26,15 @@ else:
cppcerts = os.path.join(toplevel, "cpp", "test", "IceSSL", "certs")
if not os.path.exists(os.path.join(cppcerts, "db", "ca1", "ca.pem")):
- print("error: CA database is not initialized in `" + os.path.join(cppcerts, "db") + "',"
- " run makecerts.py in `" + cppcerts + "' first")
+ print(
+ "error: CA database is not initialized in `"
+ + os.path.join(cppcerts, "db")
+ + "',"
+ " run makecerts.py in `" + cppcerts + "' first"
+ )
sys.exit(1)
+
def usage():
print("Usage: " + sys.argv[0] + " [options]")
print("")
@@ -35,6 +44,7 @@ def usage():
print("--force Re-save all the files even if they already exists.")
sys.exit(1)
+
#
# Check arguments
#
@@ -47,7 +57,7 @@ except getopt.GetoptError as e:
usage()
sys.exit(1)
-for (o, a) in opts:
+for o, a in opts:
if o == "-h" or o == "--help":
usage()
sys.exit(0)
@@ -56,25 +66,35 @@ for (o, a) in opts:
elif o == "--force":
force = True
-ca1 = IceCertUtils.CertificateFactory(home=os.path.join(cppcerts, "db", "ca1"), debug=debug)
-ca2 = IceCertUtils.CertificateFactory(home=os.path.join(cppcerts, "db", "ca2"), debug=debug)
+ca1 = IceCertUtils.CertificateFactory(
+ home=os.path.join(cppcerts, "db", "ca1"), debug=debug
+)
+ca2 = IceCertUtils.CertificateFactory(
+ home=os.path.join(cppcerts, "db", "ca2"), debug=debug
+)
cai1 = ca1.getIntermediateFactory("intermediate1")
cai2 = cai1.getIntermediateFactory("intermediate1")
-if force or not os.path.exists("cacert1.pem"): ca1.getCA().save("cacert1.pem")
-if force or not os.path.exists("cacert2.pem"): ca2.getCA().save("cacert2.pem")
-if force or not os.path.exists("cacert1.der"): ca1.getCA().save("cacert1.der")
+if force or not os.path.exists("cacert1.pem"):
+ ca1.getCA().save("cacert1.pem")
+if force or not os.path.exists("cacert2.pem"):
+ ca2.getCA().save("cacert2.pem")
+if force or not os.path.exists("cacert1.der"):
+ ca1.getCA().save("cacert1.der")
if force or not os.path.exists("cacerts.pem"):
pem = ""
- with open("cacert1.pem", "r") as f: pem += f.read()
- with open("cacert2.pem", "r") as f: pem += f.read()
- with open("cacerts.pem", "w") as f: f.write(pem);
+ with open("cacert1.pem", "r") as f:
+ pem += f.read()
+ with open("cacert2.pem", "r") as f:
+ pem += f.read()
+ with open("cacerts.pem", "w") as f:
+ f.write(pem)
certs = [
(ca1, "s_rsa_ca1", None, {}),
(ca1, "c_rsa_ca1", None, {}),
- (ca1, "s_rsa_ca1_exp", None, {}), # Expired certificate
- (ca1, "c_rsa_ca1_exp", None, {}), # Expired certificate
+ (ca1, "s_rsa_ca1_exp", None, {}), # Expired certificate
+ (ca1, "c_rsa_ca1_exp", None, {}), # Expired certificate
(ca1, "s_rsa_ca1_cn1", None, {}),
(ca1, "s_rsa_ca1_cn2", None, {}),
(ca1, "s_rsa_ca1_cn3", None, {}),
@@ -88,17 +108,19 @@ certs = [
(cai1, "s_rsa_cai1", None, {}),
(cai2, "s_rsa_cai2", None, {}),
(cai2, "c_rsa_cai2", None, {}),
- (ca1, "s_rsa_ca1", "s_rsa_wroot_ca1", { "root": True }),
+ (ca1, "s_rsa_ca1", "s_rsa_wroot_ca1", {"root": True}),
]
#
# Save the certificate PKCS12 files.
#
-for (ca, alias, path, args) in certs:
- if not path: path = alias
+for ca, alias, path, args in certs:
+ if not path:
+ path = alias
cert = ca.get(alias)
if force or not os.path.exists(path + ".p12"):
cert.save(path + ".p12", **args)
# Also export the ca2 self-signed certificate, it's used by the tests to test self-signed certificates
-if force or not os.path.exists("cacert2.p12"): ca2.getCA().save("cacert2.p12", addkey=True)
+if force or not os.path.exists("cacert2.p12"):
+ ca2.getCA().save("cacert2.p12", addkey=True)