diff options
author | Jan Malkiewicz <jan.malkiewicz@nokia.com> | 2020-09-22 08:04:23 +0200 |
---|---|---|
committer | Jan Malkiewicz <jan.malkiewicz@nokia.com> | 2020-09-22 20:01:03 +0200 |
commit | e0da464c1b8bfe7ceb1f16879a2c550e7348fe18 (patch) | |
tree | dbf127607c7e8708776514ab3fbfc67196e7add6 /tests/oom-platform-cert-service/truststoremerger/libraries/JksValidator.py | |
parent | 97c946e21835cbc213f9974ed0df05ef702f4b88 (diff) |
[OOM-CMPv2] Rename truststoremerger->postprocessor
Issue-ID: DCAEGEN2-2253
Signed-off-by: Jan Malkiewicz <jan.malkiewicz@nokia.com>
Change-Id: I6c7fa3378c86dee4e1fe23e4840046b979d942ea
Diffstat (limited to 'tests/oom-platform-cert-service/truststoremerger/libraries/JksValidator.py')
-rw-r--r-- | tests/oom-platform-cert-service/truststoremerger/libraries/JksValidator.py | 28 |
1 files changed, 0 insertions, 28 deletions
diff --git a/tests/oom-platform-cert-service/truststoremerger/libraries/JksValidator.py b/tests/oom-platform-cert-service/truststoremerger/libraries/JksValidator.py deleted file mode 100644 index 983f66bb..00000000 --- a/tests/oom-platform-cert-service/truststoremerger/libraries/JksValidator.py +++ /dev/null @@ -1,28 +0,0 @@ - -import jks - -class JksValidator: - - def get_jks_entries(self, jks_path, password_path): - store = jks.KeyStore.load(jks_path, open(password_path, 'rb').read()) - return store.entries - - def assert_jks_truststores_equal(self, result_truststore_path, password_path, expected_truststore_path): - result_keys = self.get_jks_entries(result_truststore_path, password_path) - expected_keys = self.get_jks_entries(expected_truststore_path, password_path) - if len(result_keys) != len(expected_keys): - return False - for k in result_keys: - if not (k in expected_keys and result_keys[k].cert == expected_keys[k].cert): - return False - return True - - def assert_jks_keystores_equal(self, result_keystore_path, password_path, expected_keystore_path): - result_keys = self.get_jks_entries(result_keystore_path, password_path) - expected_keys = self.get_jks_entries(expected_keystore_path, password_path) - if len(result_keys) != len(expected_keys): - return False - for k in result_keys: - if not (k in expected_keys and result_keys[k].pkey == expected_keys[k].pkey): - return False - return True |