blob: 7d0444aac9fec18318e804d1d03a43df115a8eb2 [file] [log] [blame]
Zhiyi Zhang91c846b2017-04-12 14:16:31 -07001/* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil; -*- */
Davide Pesaventob48bbda2020-07-27 19:41:37 -04002/*
3 * Copyright (c) 2017-2020, Regents of the University of California.
Zhiyi Zhang91c846b2017-04-12 14:16:31 -07004 *
5 * This file is part of ndncert, a certificate management system based on NDN.
6 *
7 * ndncert is free software: you can redistribute it and/or modify it under the terms
8 * of the GNU General Public License as published by the Free Software Foundation, either
9 * version 3 of the License, or (at your option) any later version.
10 *
11 * ndncert is distributed in the hope that it will be useful, but WITHOUT ANY
12 * WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
13 * PARTICULAR PURPOSE. See the GNU General Public License for more details.
14 *
15 * You should have received copies of the GNU General Public License along with
16 * ndncert, e.g., in COPYING.md file. If not, see <http://www.gnu.org/licenses/>.
17 *
18 * See AUTHORS.md for complete list of ndncert authors and contributors.
19 */
20
21#include "ca-sqlite.hpp"
Davide Pesaventob48bbda2020-07-27 19:41:37 -040022
Zhiyi Zhangef6b36a2020-09-22 21:20:59 -070023#include <ndn-cxx/security/v2/validation-policy.hpp>
Zhiyi Zhang91c846b2017-04-12 14:16:31 -070024#include <ndn-cxx/util/sqlite3-statement.hpp>
25
26#include <sqlite3.h>
27#include <boost/filesystem.hpp>
28
29namespace ndn {
30namespace ndncert {
31
Davide Pesaventob48bbda2020-07-27 19:41:37 -040032const std::string CaSqlite::STORAGE_TYPE = "ca-storage-sqlite3";
Zhiyi Zhang91c846b2017-04-12 14:16:31 -070033
34NDNCERT_REGISTER_CA_STORAGE(CaSqlite);
35
36using namespace ndn::util;
37
38static const std::string INITIALIZATION = R"_DBTEXT_(
39CREATE TABLE IF NOT EXISTS
40 CertRequests(
41 id INTEGER PRIMARY KEY,
42 request_id TEXT NOT NULL,
43 ca_name BLOB NOT NULL,
tylerliu182bc532020-09-25 01:54:45 -070044 request_type INTEGER NOT NULL,
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -070045 status INTEGER NOT NULL,
46 challenge_status TEXT,
Zhiyi Zhang91c846b2017-04-12 14:16:31 -070047 cert_key_name BLOB NOT NULL,
48 cert_request BLOB NOT NULL,
49 challenge_type TEXT,
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -070050 challenge_secrets TEXT,
51 challenge_tp TEXT,
52 remaining_tries INTEGER,
Zhiyi Zhang5f749a22019-06-12 17:02:33 -070053 remaining_time INTEGER,
54 probe_token BLOB
Zhiyi Zhang91c846b2017-04-12 14:16:31 -070055 );
56CREATE UNIQUE INDEX IF NOT EXISTS
57 CertRequestIdIndex ON CertRequests(request_id);
58CREATE UNIQUE INDEX IF NOT EXISTS
59 CertRequestKeyNameIndex ON CertRequests(cert_key_name);
60
61CREATE TABLE IF NOT EXISTS
62 IssuedCerts(
63 id INTEGER PRIMARY KEY,
64 cert_id TEXT NOT NULL,
65 cert_key_name BLOB NOT NULL,
66 cert BLOB NOT NULL
67 );
68CREATE UNIQUE INDEX IF NOT EXISTS
69 IssuedCertRequestIdIndex ON IssuedCerts(cert_id);
70CREATE UNIQUE INDEX IF NOT EXISTS
71 IssuedCertKeyNameIndex ON IssuedCerts(cert_key_name);
72)_DBTEXT_";
73
74CaSqlite::CaSqlite(const std::string& location)
75 : CaStorage()
76{
77 // Determine the path of sqlite db
78 boost::filesystem::path dbDir;
79 if (!location.empty()) {
80 dbDir = boost::filesystem::path(location);
81 }
Zhiyi Zhang91c846b2017-04-12 14:16:31 -070082 else if (getenv("HOME") != nullptr) {
83 dbDir = boost::filesystem::path(getenv("HOME")) / ".ndn";
84 }
85 else {
86 dbDir = boost::filesystem::current_path() / ".ndn";
87 }
88 boost::filesystem::create_directories(dbDir);
89
90 // open and initialize database
91 int result = sqlite3_open_v2((dbDir / "ndncert-ca.db").c_str(), &m_database,
92 SQLITE_OPEN_READWRITE | SQLITE_OPEN_CREATE,
93#ifdef NDN_CXX_DISABLE_SQLITE3_FS_LOCKING
94 "unix-dotfile"
95#else
96 nullptr
97#endif
98 );
99 if (result != SQLITE_OK)
100 BOOST_THROW_EXCEPTION(Error("CaSqlite DB cannot be opened/created: " + dbDir.string()));
101
102 // initialize database specific tables
103 char* errorMessage = nullptr;
Davide Pesaventob48bbda2020-07-27 19:41:37 -0400104 result = sqlite3_exec(m_database, INITIALIZATION.data(),
Zhiyi Zhang91c846b2017-04-12 14:16:31 -0700105 nullptr, nullptr, &errorMessage);
106 if (result != SQLITE_OK && errorMessage != nullptr) {
107 sqlite3_free(errorMessage);
108 BOOST_THROW_EXCEPTION(Error("CaSqlite DB cannot be initialized"));
109 }
110}
111
112CaSqlite::~CaSqlite()
113{
114 sqlite3_close(m_database);
115}
116
117CertificateRequest
118CaSqlite::getRequest(const std::string& requestId)
119{
120 Sqlite3Statement statement(m_database,
tylerliu182bc532020-09-25 01:54:45 -0700121 R"_SQLTEXT_(SELECT id, request_id, ca_name, status,
122 challenge_status, cert_key_name, cert_request, challenge_type, challenge_secrets,
123 challenge_tp, remaining_tries, remaining_time, request_type, probe_token
Zhiyi Zhang91c846b2017-04-12 14:16:31 -0700124 FROM CertRequests where request_id = ?)_SQLTEXT_");
125 statement.bind(1, requestId, SQLITE_TRANSIENT);
126
127 if (statement.step() == SQLITE_ROW) {
128 Name caName(statement.getBlock(2));
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -0700129 int status = statement.getInt(3);
130 std::string challengeStatus = statement.getString(4);
Zhiyi Zhangef6b36a2020-09-22 21:20:59 -0700131 security::v2::Certificate cert(statement.getBlock(6));
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -0700132 std::string challengeType = statement.getString(7);
133 std::string challengeSecrets = statement.getString(8);
134 std::string challengeTp = statement.getString(9);
135 int remainingTries = statement.getInt(10);
136 int remainingTime = statement.getInt(11);
tylerliu182bc532020-09-25 01:54:45 -0700137 int requestType = statement.getInt(12);
138 CertificateRequest request(caName, requestId, requestType, status, challengeStatus, challengeType,
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -0700139 challengeTp, remainingTime, remainingTries,
140 convertString2Json(challengeSecrets), cert);
tylerliu182bc532020-09-25 01:54:45 -0700141 if (statement.getSize(13) != 0) {
142 shared_ptr<Data> probeToken = make_shared<Data>(statement.getBlock(13));
Zhiyi Zhang5f749a22019-06-12 17:02:33 -0700143 request.setProbeToken(probeToken);
144 }
145 return request;
Zhiyi Zhang91c846b2017-04-12 14:16:31 -0700146 }
147 else {
148 BOOST_THROW_EXCEPTION(Error("Request " + requestId + " cannot be fetched from database"));
149 }
150}
151
152void
153CaSqlite::addRequest(const CertificateRequest& request)
154{
Zhiyi Zhang5f749a22019-06-12 17:02:33 -0700155 // check whether request is there already
Zhiyi Zhang91c846b2017-04-12 14:16:31 -0700156 Sqlite3Statement statement1(m_database,
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -0700157 R"_SQLTEXT_(SELECT * FROM CertRequests where cert_key_name = ?)_SQLTEXT_");
158 statement1.bind(1, request.m_cert.getKeyName().wireEncode(), SQLITE_TRANSIENT);
Zhiyi Zhang91c846b2017-04-12 14:16:31 -0700159 if (statement1.step() == SQLITE_ROW) {
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -0700160 BOOST_THROW_EXCEPTION(Error("Request for " + request.m_cert.getKeyName().toUri() + " already exists"));
Zhiyi Zhang91c846b2017-04-12 14:16:31 -0700161 return;
162 }
163
Zhiyi Zhang5f749a22019-06-12 17:02:33 -0700164 // check whether certificate is already issued
Zhiyi Zhang91c846b2017-04-12 14:16:31 -0700165 Sqlite3Statement statement2(m_database,
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -0700166 R"_SQLTEXT_(SELECT * FROM IssuedCerts where cert_key_name = ?)_SQLTEXT_");
167 statement2.bind(1, request.m_cert.getKeyName().wireEncode(), SQLITE_TRANSIENT);
Zhiyi Zhang91c846b2017-04-12 14:16:31 -0700168 if (statement2.step() == SQLITE_ROW) {
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -0700169 BOOST_THROW_EXCEPTION(Error("Cert for " + request.m_cert.getKeyName().toUri() + " already exists"));
Zhiyi Zhang91c846b2017-04-12 14:16:31 -0700170 return;
171 }
172
Zhiyi Zhang5f749a22019-06-12 17:02:33 -0700173 if (request.m_probeToken != nullptr) {
174 Sqlite3Statement statement(
175 m_database,
176 R"_SQLTEXT_(INSERT INTO CertRequests (request_id, ca_name, status,
177 challenge_status, cert_key_name, cert_request, challenge_type, challenge_secrets,
tylerliu182bc532020-09-25 01:54:45 -0700178 challenge_tp, remaining_tries, remaining_time, request_type, probe_token)
179 values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?))_SQLTEXT_");
180 statement.bind(1, request.m_requestId, SQLITE_TRANSIENT);
181 statement.bind(2, request.m_caPrefix.wireEncode(), SQLITE_TRANSIENT);
182 statement.bind(3, request.m_status);
183 statement.bind(4, request.m_challengeStatus, SQLITE_TRANSIENT);
184 statement.bind(5, request.m_cert.getKeyName().wireEncode(),
185 SQLITE_TRANSIENT);
186 statement.bind(6, request.m_cert.wireEncode(), SQLITE_TRANSIENT);
187 statement.bind(7, request.m_challengeType, SQLITE_TRANSIENT);
188 statement.bind(8, convertJson2String(request.m_challengeSecrets),
189 SQLITE_TRANSIENT);
190 statement.bind(9, request.m_challengeTp, SQLITE_TRANSIENT);
191 statement.bind(10, request.m_remainingTries);
192 statement.bind(11, request.m_remainingTime);
193 statement.bind(12, request.m_requestType);
194 statement.bind(13, request.m_probeToken->wireEncode(), SQLITE_TRANSIENT);
195 if (statement.step() != SQLITE_DONE) {
196 BOOST_THROW_EXCEPTION(Error("Request " + request.m_requestId + " cannot be added to database"));
197 }
198 }
199 else {
200 Sqlite3Statement statement(
201 m_database,
202 R"_SQLTEXT_(INSERT INTO CertRequests (request_id, ca_name, status,
203 challenge_status, cert_key_name, cert_request, challenge_type, challenge_secrets,
204 challenge_tp, remaining_tries, remaining_time, request_type)
Zhiyi Zhang5f749a22019-06-12 17:02:33 -0700205 values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?))_SQLTEXT_");
206 statement.bind(1, request.m_requestId, SQLITE_TRANSIENT);
Suyong Won256c9062020-05-11 02:45:56 -0700207 statement.bind(2, request.m_caPrefix.wireEncode(), SQLITE_TRANSIENT);
Zhiyi Zhang5f749a22019-06-12 17:02:33 -0700208 statement.bind(3, request.m_status);
209 statement.bind(4, request.m_challengeStatus, SQLITE_TRANSIENT);
210 statement.bind(5, request.m_cert.getKeyName().wireEncode(),
211 SQLITE_TRANSIENT);
212 statement.bind(6, request.m_cert.wireEncode(), SQLITE_TRANSIENT);
213 statement.bind(7, request.m_challengeType, SQLITE_TRANSIENT);
214 statement.bind(8, convertJson2String(request.m_challengeSecrets),
215 SQLITE_TRANSIENT);
216 statement.bind(9, request.m_challengeTp, SQLITE_TRANSIENT);
217 statement.bind(10, request.m_remainingTries);
218 statement.bind(11, request.m_remainingTime);
tylerliu182bc532020-09-25 01:54:45 -0700219 statement.bind(12, request.m_requestType);
Zhiyi Zhang5f749a22019-06-12 17:02:33 -0700220 if (statement.step() != SQLITE_DONE) {
221 BOOST_THROW_EXCEPTION(Error("Request " + request.m_requestId + " cannot be added to database"));
222 }
Zhiyi Zhang91c846b2017-04-12 14:16:31 -0700223 }
224}
225
226void
227CaSqlite::updateRequest(const CertificateRequest& request)
228{
229 Sqlite3Statement statement(m_database,
230 R"_SQLTEXT_(UPDATE CertRequests
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -0700231 SET status = ?, challenge_status = ?, challenge_type = ?, challenge_secrets = ?,
tylerliu182bc532020-09-25 01:54:45 -0700232 challenge_tp = ?, remaining_tries = ?, remaining_time = ?, request_type = ?
Zhiyi Zhang91c846b2017-04-12 14:16:31 -0700233 WHERE request_id = ?)_SQLTEXT_");
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -0700234 statement.bind(1, request.m_status);
235 statement.bind(2, request.m_challengeStatus, SQLITE_TRANSIENT);
236 statement.bind(3, request.m_challengeType, SQLITE_TRANSIENT);
237 statement.bind(4, convertJson2String(request.m_challengeSecrets), SQLITE_TRANSIENT);
238 statement.bind(5, request.m_challengeTp, SQLITE_TRANSIENT);
239 statement.bind(6, request.m_remainingTries);
240 statement.bind(7, request.m_remainingTime);
tylerliu182bc532020-09-25 01:54:45 -0700241 statement.bind(8, request.m_requestType);
242 statement.bind(9, request.m_requestId, SQLITE_TRANSIENT);
Zhiyi Zhang91c846b2017-04-12 14:16:31 -0700243
244 if (statement.step() != SQLITE_DONE) {
245 addRequest(request);
246 }
247}
248
Zhiyi Zhangae123bf2017-04-14 12:24:53 -0700249std::list<CertificateRequest>
250CaSqlite::listAllRequests()
251{
252 std::list<CertificateRequest> result;
tylerliu182bc532020-09-25 01:54:45 -0700253 Sqlite3Statement statement(m_database, R"_SQLTEXT_(SELECT id, request_id, ca_name, status,
254 challenge_status, cert_key_name, cert_request, challenge_type, challenge_secrets,
255 challenge_tp, remaining_tries, remaining_time, request_type
256 FROM CertRequests)_SQLTEXT_");
Zhiyi Zhangae123bf2017-04-14 12:24:53 -0700257
Davide Pesaventob48bbda2020-07-27 19:41:37 -0400258 while (statement.step() == SQLITE_ROW) {
Zhiyi Zhangae123bf2017-04-14 12:24:53 -0700259 std::string requestId = statement.getString(1);
260 Name caName(statement.getBlock(2));
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -0700261 int status = statement.getInt(3);
262 std::string challengeStatus = statement.getString(4);
Zhiyi Zhangef6b36a2020-09-22 21:20:59 -0700263 security::v2::Certificate cert(statement.getBlock(6));
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -0700264 std::string challengeType = statement.getString(7);
265 std::string challengeSecrets = statement.getString(8);
266 std::string challengeTp = statement.getString(9);
267 int remainingTries = statement.getInt(10);
268 int remainingTime = statement.getInt(11);
tylerliu182bc532020-09-25 01:54:45 -0700269 int requestType = statement.getInt(12);
270 CertificateRequest entry(caName, requestId, requestType, status, challengeStatus, challengeType,
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -0700271 challengeTp, remainingTime, remainingTries,
272 convertString2Json(challengeSecrets), cert);
Zhiyi Zhangae123bf2017-04-14 12:24:53 -0700273 result.push_back(entry);
274 }
275 return result;
276}
277
278std::list<CertificateRequest>
279CaSqlite::listAllRequests(const Name& caName)
280{
281 std::list<CertificateRequest> result;
282 Sqlite3Statement statement(m_database,
tylerliu182bc532020-09-25 01:54:45 -0700283 R"_SQLTEXT_(SELECT id, request_id, ca_name, status,
284 challenge_status, cert_key_name, cert_request, challenge_type, challenge_secrets,
285 challenge_tp, remaining_tries, remaining_time, request_type
286 FROM CertRequests WHERE ca_name = ?)_SQLTEXT_");
Zhiyi Zhangae123bf2017-04-14 12:24:53 -0700287 statement.bind(1, caName.wireEncode(), SQLITE_TRANSIENT);
288
Davide Pesaventob48bbda2020-07-27 19:41:37 -0400289 while (statement.step() == SQLITE_ROW) {
Zhiyi Zhangae123bf2017-04-14 12:24:53 -0700290 std::string requestId = statement.getString(1);
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -0700291 Name caName(statement.getBlock(2));
292 int status = statement.getInt(3);
293 std::string challengeStatus = statement.getString(4);
Zhiyi Zhangef6b36a2020-09-22 21:20:59 -0700294 security::v2::Certificate cert(statement.getBlock(6));
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -0700295 std::string challengeType = statement.getString(7);
296 std::string challengeSecrets = statement.getString(8);
297 std::string challengeTp = statement.getString(9);
298 int remainingTries = statement.getInt(10);
299 int remainingTime = statement.getInt(11);
tylerliu182bc532020-09-25 01:54:45 -0700300 int requestType = statement.getInt(12);
301 CertificateRequest entry(caName, requestId, requestType, status, challengeStatus, challengeType,
Zhiyi Zhangaf7c2902019-03-14 22:13:21 -0700302 challengeTp, remainingTime, remainingTries,
303 convertString2Json(challengeSecrets), cert);
Zhiyi Zhangae123bf2017-04-14 12:24:53 -0700304 result.push_back(entry);
305 }
306 return result;
307}
308
Zhiyi Zhang91c846b2017-04-12 14:16:31 -0700309void
310CaSqlite::deleteRequest(const std::string& requestId)
311{
312 Sqlite3Statement statement(m_database,
Zhiyi Zhangae123bf2017-04-14 12:24:53 -0700313 R"_SQLTEXT_(DELETE FROM CertRequests WHERE request_id = ?)_SQLTEXT_");
Zhiyi Zhang91c846b2017-04-12 14:16:31 -0700314 statement.bind(1, requestId, SQLITE_TRANSIENT);
315 statement.step();
316}
317
Zhiyi Zhangef6b36a2020-09-22 21:20:59 -0700318security::v2::Certificate
Zhiyi Zhang91c846b2017-04-12 14:16:31 -0700319CaSqlite::getCertificate(const std::string& certId)
320{
321 Sqlite3Statement statement(m_database,
322 R"_SQLTEXT_(SELECT cert FROM IssuedCerts where cert_id = ?)_SQLTEXT_");
323 statement.bind(1, certId, SQLITE_TRANSIENT);
324
325 if (statement.step() == SQLITE_ROW) {
Zhiyi Zhangef6b36a2020-09-22 21:20:59 -0700326 return security::v2::Certificate(statement.getBlock(0));
Zhiyi Zhang91c846b2017-04-12 14:16:31 -0700327 }
328 else {
329 BOOST_THROW_EXCEPTION(Error("Certificate with ID " + certId + " cannot be fetched from database"));
330 }
331}
332
333void
Zhiyi Zhangef6b36a2020-09-22 21:20:59 -0700334CaSqlite::addCertificate(const std::string& certId, const security::v2::Certificate& cert)
Zhiyi Zhang91c846b2017-04-12 14:16:31 -0700335{
336 Sqlite3Statement statement(m_database,
337 R"_SQLTEXT_(INSERT INTO IssuedCerts (cert_id, cert_key_name, cert)
338 values (?, ?, ?))_SQLTEXT_");
339 statement.bind(1, certId, SQLITE_TRANSIENT);
340 statement.bind(2, cert.getKeyName().wireEncode(), SQLITE_TRANSIENT);
341 statement.bind(3, cert.wireEncode(), SQLITE_TRANSIENT);
342
343 if (statement.step() != SQLITE_DONE) {
344 BOOST_THROW_EXCEPTION(Error("Certificate " + cert.getName().toUri() + " cannot be added to database"));
345 }
346}
347
348void
Zhiyi Zhangef6b36a2020-09-22 21:20:59 -0700349CaSqlite::updateCertificate(const std::string& certId, const security::v2::Certificate& cert)
Zhiyi Zhang91c846b2017-04-12 14:16:31 -0700350{
351 Sqlite3Statement statement(m_database,
352 R"_SQLTEXT_(UPDATE IssuedCerts SET cert = ? WHERE cert_id = ?)_SQLTEXT_");
353 statement.bind(1, cert.wireEncode(), SQLITE_TRANSIENT);
354 statement.bind(2, certId, SQLITE_TRANSIENT);
355
356 if (statement.step() != SQLITE_DONE) {
357 addCertificate(certId, cert);
358 }
359}
360
361void
362CaSqlite::deleteCertificate(const std::string& certId)
363{
364 Sqlite3Statement statement(m_database,
365 R"_SQLTEXT_(DELETE FROM IssuedCerts WHERE cert_id = ?)_SQLTEXT_");
366 statement.bind(1, certId, SQLITE_TRANSIENT);
367 statement.step();
368}
369
Zhiyi Zhangef6b36a2020-09-22 21:20:59 -0700370std::list<security::v2::Certificate>
Zhiyi Zhangae123bf2017-04-14 12:24:53 -0700371CaSqlite::listAllIssuedCertificates()
372{
Zhiyi Zhangef6b36a2020-09-22 21:20:59 -0700373 std::list<security::v2::Certificate> result;
Zhiyi Zhangae123bf2017-04-14 12:24:53 -0700374 Sqlite3Statement statement(m_database, R"_SQLTEXT_(SELECT * FROM IssuedCerts)_SQLTEXT_");
375
376 while (statement.step() == SQLITE_ROW) {
Davide Pesaventob48bbda2020-07-27 19:41:37 -0400377 result.emplace_back(statement.getBlock(3));
Zhiyi Zhangae123bf2017-04-14 12:24:53 -0700378 }
379 return result;
380}
381
Zhiyi Zhangef6b36a2020-09-22 21:20:59 -0700382std::list<security::v2::Certificate>
Zhiyi Zhangae123bf2017-04-14 12:24:53 -0700383CaSqlite::listAllIssuedCertificates(const Name& caName)
384{
385 auto allCerts = listAllIssuedCertificates();
Zhiyi Zhangef6b36a2020-09-22 21:20:59 -0700386 std::list<security::v2::Certificate> result;
Zhiyi Zhangae123bf2017-04-14 12:24:53 -0700387 for (const auto& entry : allCerts) {
Zhiyi Zhangef6b36a2020-09-22 21:20:59 -0700388 const auto& klName = entry.getSignature().getKeyLocator().getName();
389 if (security::v2::extractIdentityFromKeyName(klName) == caName) {
Zhiyi Zhangae123bf2017-04-14 12:24:53 -0700390 result.push_back(entry);
391 }
392 }
393 return result;
394}
395
Zhiyi Zhang91c846b2017-04-12 14:16:31 -0700396std::string
397CaSqlite::convertJson2String(const JsonSection& json)
398{
399 std::stringstream ss;
400 boost::property_tree::write_json(ss, json);
401 return ss.str();
402}
403
404JsonSection
405CaSqlite::convertString2Json(const std::string& jsonContent)
406{
407 std::istringstream ss(jsonContent);
408 JsonSection json;
409 boost::property_tree::json_parser::read_json(ss, json);
410 return json;
411}
412
413} // namespace ndncert
414} // namespace ndn