aboutsummaryrefslogtreecommitdiffstats
path: root/tests/oom-platform-cert-service/truststoremerger/libraries/JksValidator.py
diff options
context:
space:
mode:
authorJan Malkiewicz <jan.malkiewicz@nokia.com>2020-09-22 08:04:23 +0200
committerJan Malkiewicz <jan.malkiewicz@nokia.com>2020-09-22 20:01:03 +0200
commite0da464c1b8bfe7ceb1f16879a2c550e7348fe18 (patch)
treedbf127607c7e8708776514ab3fbfc67196e7add6 /tests/oom-platform-cert-service/truststoremerger/libraries/JksValidator.py
parent97c946e21835cbc213f9974ed0df05ef702f4b88 (diff)
[OOM-CMPv2] Rename truststoremerger->postprocessor
Issue-ID: DCAEGEN2-2253 Signed-off-by: Jan Malkiewicz <jan.malkiewicz@nokia.com> Change-Id: I6c7fa3378c86dee4e1fe23e4840046b979d942ea
Diffstat (limited to 'tests/oom-platform-cert-service/truststoremerger/libraries/JksValidator.py')
-rw-r--r--tests/oom-platform-cert-service/truststoremerger/libraries/JksValidator.py28
1 files changed, 0 insertions, 28 deletions
diff --git a/tests/oom-platform-cert-service/truststoremerger/libraries/JksValidator.py b/tests/oom-platform-cert-service/truststoremerger/libraries/JksValidator.py
deleted file mode 100644
index 983f66bb..00000000
--- a/tests/oom-platform-cert-service/truststoremerger/libraries/JksValidator.py
+++ /dev/null
@@ -1,28 +0,0 @@
-
-import jks
-
-class JksValidator:
-
- def get_jks_entries(self, jks_path, password_path):
- store = jks.KeyStore.load(jks_path, open(password_path, 'rb').read())
- return store.entries
-
- def assert_jks_truststores_equal(self, result_truststore_path, password_path, expected_truststore_path):
- result_keys = self.get_jks_entries(result_truststore_path, password_path)
- expected_keys = self.get_jks_entries(expected_truststore_path, password_path)
- if len(result_keys) != len(expected_keys):
- return False
- for k in result_keys:
- if not (k in expected_keys and result_keys[k].cert == expected_keys[k].cert):
- return False
- return True
-
- def assert_jks_keystores_equal(self, result_keystore_path, password_path, expected_keystore_path):
- result_keys = self.get_jks_entries(result_keystore_path, password_path)
- expected_keys = self.get_jks_entries(expected_keystore_path, password_path)
- if len(result_keys) != len(expected_keys):
- return False
- for k in result_keys:
- if not (k in expected_keys and result_keys[k].pkey == expected_keys[k].pkey):
- return False
- return True