diff options
author | 2020-09-21 15:15:38 +0200 | |
---|---|---|
committer | 2020-09-21 15:23:47 +0200 | |
commit | 97c946e21835cbc213f9974ed0df05ef702f4b88 (patch) | |
tree | 8b7112c5544f1c8f4ed6e5e4fd4f1cd7d271aec5 /tests/oom-platform-cert-service/truststoremerger/libraries/JksValidator.py | |
parent | 1cb65312aebb6734a563cfc6495e59f65eafd750 (diff) |
Introduce real Kesystore check
Previous implementation for keystores was just comapring zero elements with zero elements,
since keystore doesnt contain any certs (just private keys). Small naming of keywords changes.
Change-Id: If8002e44ef3ced9f2203b94178f9713acd81e561
Signed-off-by: kjaniak <kornel.janiak@nokia.com>
Issue-ID: DCAEGEN2-2253
Diffstat (limited to 'tests/oom-platform-cert-service/truststoremerger/libraries/JksValidator.py')
-rw-r--r-- | tests/oom-platform-cert-service/truststoremerger/libraries/JksValidator.py | 28 |
1 files changed, 28 insertions, 0 deletions
diff --git a/tests/oom-platform-cert-service/truststoremerger/libraries/JksValidator.py b/tests/oom-platform-cert-service/truststoremerger/libraries/JksValidator.py new file mode 100644 index 00000000..983f66bb --- /dev/null +++ b/tests/oom-platform-cert-service/truststoremerger/libraries/JksValidator.py @@ -0,0 +1,28 @@ + +import jks + +class JksValidator: + + def get_jks_entries(self, jks_path, password_path): + store = jks.KeyStore.load(jks_path, open(password_path, 'rb').read()) + return store.entries + + def assert_jks_truststores_equal(self, result_truststore_path, password_path, expected_truststore_path): + result_keys = self.get_jks_entries(result_truststore_path, password_path) + expected_keys = self.get_jks_entries(expected_truststore_path, password_path) + if len(result_keys) != len(expected_keys): + return False + for k in result_keys: + if not (k in expected_keys and result_keys[k].cert == expected_keys[k].cert): + return False + return True + + def assert_jks_keystores_equal(self, result_keystore_path, password_path, expected_keystore_path): + result_keys = self.get_jks_entries(result_keystore_path, password_path) + expected_keys = self.get_jks_entries(expected_keystore_path, password_path) + if len(result_keys) != len(expected_keys): + return False + for k in result_keys: + if not (k in expected_keys and result_keys[k].pkey == expected_keys[k].pkey): + return False + return True |