From 764e0a41bd0fa062ff32287c53645fcbb650697e Mon Sep 17 00:00:00 2001 From: Joanna Jeremicz Date: Thu, 13 Aug 2020 14:43:49 +0200 Subject: [PATCH] Add CSITs for Truststore Merger Issue-ID: DCAEGEN2-2253 Signed-off-by: Joanna Jeremicz Change-Id: Ie2d648108c99f4a1e61fe855f318078e6ffc0e21 --- .../truststoremerger/setup.sh | 28 +++++++++ .../truststoremerger/teardown.sh | 18 ++++++ .../truststoremerger/testplan.txt | 3 + .../expected_truststores/jksAndPemAndP12.jks | Bin 0 -> 3923 bytes .../assets/expected_truststores/pemAndP12.pem | 63 +++++++++++++++++++ .../assets/invalid_different_lists_size.env | 2 + .../assets/invalid_duplicated_aliases.env | 2 + .../assets/invalid_empty_certs.env | 2 + .../truststoremerger/assets/invalid_empty_file.env | 0 .../assets/invalid_empty_passwords.env | 2 + .../truststoremerger/assets/invalid_extension.env | 2 + .../assets/invalid_file_password_pair.env | 2 + .../assets/invalid_password_path.env | 2 + .../assets/invalid_truststore_paths.env | 2 + .../truststoremerger/assets/truststores/empty.pem | 0 .../assets/truststores/truststore.jks | Bin 0 -> 1413 bytes .../assets/truststores/truststore.p12 | Bin 0 -> 1530 bytes .../assets/truststores/truststore.pem | 28 +++++++++ .../assets/truststores/truststoreJks.pass | 1 + .../assets/truststores/truststoreP12.pass | 1 + .../truststoremerger/assets/valid_jks_pem_p12.env | 2 + .../truststoremerger/assets/valid_pem_p12.env | 2 + .../assets/valid_single_truststore.env | 2 + .../truststoremerger/libraries/EnvsReader.py | 11 ++++ .../libraries/JksTruststoreValidator.py | 18 ++++++ .../libraries/PemTruststoreValidator.py | 19 ++++++ .../libraries/TrustMergerManager.py | 47 +++++++++++++++ .../resources/trust-merger-keywords.robot | 34 +++++++++++ .../resources/trust-merger-properties.robot | 35 +++++++++++ .../truststoremerger/trust-merger-test.robot | 67 +++++++++++++++++++++ 30 files changed, 395 insertions(+) create mode 100644 plans/oom-platform-cert-service/truststoremerger/setup.sh create mode 100644 plans/oom-platform-cert-service/truststoremerger/teardown.sh create mode 100755 plans/oom-platform-cert-service/truststoremerger/testplan.txt create mode 100644 tests/oom-platform-cert-service/truststoremerger/assets/expected_truststores/jksAndPemAndP12.jks create mode 100644 tests/oom-platform-cert-service/truststoremerger/assets/expected_truststores/pemAndP12.pem create mode 100644 tests/oom-platform-cert-service/truststoremerger/assets/invalid_different_lists_size.env create mode 100644 tests/oom-platform-cert-service/truststoremerger/assets/invalid_duplicated_aliases.env create mode 100644 tests/oom-platform-cert-service/truststoremerger/assets/invalid_empty_certs.env create mode 100644 tests/oom-platform-cert-service/truststoremerger/assets/invalid_empty_file.env create mode 100644 tests/oom-platform-cert-service/truststoremerger/assets/invalid_empty_passwords.env create mode 100644 tests/oom-platform-cert-service/truststoremerger/assets/invalid_extension.env create mode 100644 tests/oom-platform-cert-service/truststoremerger/assets/invalid_file_password_pair.env create mode 100644 tests/oom-platform-cert-service/truststoremerger/assets/invalid_password_path.env create mode 100644 tests/oom-platform-cert-service/truststoremerger/assets/invalid_truststore_paths.env create mode 100644 tests/oom-platform-cert-service/truststoremerger/assets/truststores/empty.pem create mode 100644 tests/oom-platform-cert-service/truststoremerger/assets/truststores/truststore.jks create mode 100644 tests/oom-platform-cert-service/truststoremerger/assets/truststores/truststore.p12 create mode 100644 tests/oom-platform-cert-service/truststoremerger/assets/truststores/truststore.pem create mode 100644 tests/oom-platform-cert-service/truststoremerger/assets/truststores/truststoreJks.pass create mode 100644 tests/oom-platform-cert-service/truststoremerger/assets/truststores/truststoreP12.pass create mode 100644 tests/oom-platform-cert-service/truststoremerger/assets/valid_jks_pem_p12.env create mode 100644 tests/oom-platform-cert-service/truststoremerger/assets/valid_pem_p12.env create mode 100644 tests/oom-platform-cert-service/truststoremerger/assets/valid_single_truststore.env create mode 100644 tests/oom-platform-cert-service/truststoremerger/libraries/EnvsReader.py create mode 100644 tests/oom-platform-cert-service/truststoremerger/libraries/JksTruststoreValidator.py create mode 100644 tests/oom-platform-cert-service/truststoremerger/libraries/PemTruststoreValidator.py create mode 100644 tests/oom-platform-cert-service/truststoremerger/libraries/TrustMergerManager.py create mode 100644 tests/oom-platform-cert-service/truststoremerger/resources/trust-merger-keywords.robot create mode 100644 tests/oom-platform-cert-service/truststoremerger/resources/trust-merger-properties.robot create mode 100644 tests/oom-platform-cert-service/truststoremerger/trust-merger-test.robot diff --git a/plans/oom-platform-cert-service/truststoremerger/setup.sh b/plans/oom-platform-cert-service/truststoremerger/setup.sh new file mode 100644 index 00000000..9f618406 --- /dev/null +++ b/plans/oom-platform-cert-service/truststoremerger/setup.sh @@ -0,0 +1,28 @@ +#!/bin/bash +# +# Copyright 2020 Nokia. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# + +#export container name +export MergerContainerName=TrustStoreMerger + +#install docker sdk +echo "Uninstall docker-py and reinstall docker." +pip uninstall -y docker-py +pip uninstall -y docker +pip install -U docker==2.7.0 + +#install pyjks for .jks files management +pip install pyjks diff --git a/plans/oom-platform-cert-service/truststoremerger/teardown.sh b/plans/oom-platform-cert-service/truststoremerger/teardown.sh new file mode 100644 index 00000000..a0ee4d26 --- /dev/null +++ b/plans/oom-platform-cert-service/truststoremerger/teardown.sh @@ -0,0 +1,18 @@ +#!/bin/bash +# +# Copyright 2017 ZTE, Inc. and others. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# + +kill-instance.sh ${MergerContainerName} diff --git a/plans/oom-platform-cert-service/truststoremerger/testplan.txt b/plans/oom-platform-cert-service/truststoremerger/testplan.txt new file mode 100755 index 00000000..11e00832 --- /dev/null +++ b/plans/oom-platform-cert-service/truststoremerger/testplan.txt @@ -0,0 +1,3 @@ +# Test suites are relative paths under [integration/csit.git]/tests/. +# Place the suites in run order. +oom-platform-cert-service/truststoremerger diff --git a/tests/oom-platform-cert-service/truststoremerger/assets/expected_truststores/jksAndPemAndP12.jks b/tests/oom-platform-cert-service/truststoremerger/assets/expected_truststores/jksAndPemAndP12.jks new file mode 100644 index 0000000000000000000000000000000000000000..1c9f111a743e6bff891ec059bd065246b1efefeb GIT binary patch literal 3923 zcmeI!do+~Y9tZHb7sfCRLoOlmPNJR}O)jMwBli)JOG*reQJQiKF$YtGXmY2FOUk8` zCbvqi5utH=Npej|^`fR+k~nnEI;V9`=bUx^Ip?4Lc-CIOz4x=%e%ABdpS72#mZv}< z5M=d%es6`{XwKdz-Duv<00;#3m;UFj*A_fB35Mc-# z0tVITHYwq7?_@D>vs81tQ97n^5zbQPXJVvnd0-8sc zUT>AF(0~bvCqNpUyFA<}M{(_yY1QYOCh43JHA*HuMctt@?z---_r=N&#i&Q_b0ee@ zIF=>Fxc9q?YoZ2)#C9{H1FpI(CcWdp9(pRq4dkU{h7b*$KQy-?>QX@r|8^C9fNxl+60w7`T~E56q!D?nQH=dODzj7bCQIZB%3g&g z+IUm##+{ST%gml?AAwb4TjNLpSQ_$%s6Q`-EbSGhH!!1W@8FX)loMZFVdN+U@RP27 z(&DK-F{iFubn@f}o?+OIl<#;vmSSR?-Nw>$Ej@QDPr1)s9cVaG-q9LkurwB%Wf775 z(Ez1-;UO?`sb8;CTw6^h{&NXdw>U*?P*1uRFMhkHmKJRHg(dXn>0!@n2hk8H7zEC9 z189K!Y6Rs`Ff2^M##U2c{=V}7uRiETP8_ONt>b=6?Jk7n`1lQP^b3l+ zl6lLJmiN`Hwf#=r5yPU~tizb3wkMeZmbfI}`I)yu);4cnO;EvaNyl z_TUu%xSC;%Dc9UF?lIy*+OseJT9J}HrmM!2@|uwYE?Q_EA0SoKZT-SG&w1{UYMsk{ zzkdiMe=GOHX_v}LX$D)at54T{hD-Lzm^;Yo9P_l4Z--usrVNcS$+VwD=t4Ie*1Kjaxn=8u!YzPZNP@7XXb9lC5@%;!ZaTVKi}Hpo2~ z3^^_K7P~R@4R@ydnU|bYK-70+CH;K^{QT+e8g6u7e=iR&H<~|P1HbC6zoG?N^l#q6 zDgidEbk$qgzj!O*@$hxDl3dD&_#bu^UC_cD$5$bse+U^s!z%+y2w|Z_)tDrKx;q$* z#JFhyuG%|y5wvtP0Ud%Hp62d>mjp1YVTD1FNDCU1=1D(6XZjoHe}DHo(=vu;6a#%l zgOf~unirGqt9T&5%k8+IKh4*F&1(VxXyJ)?0+C1{u6g}q`M=l#8+`T05C4uln6rvJ zI2OVNM}P#$i&+&BA;SZA3J0PEEd_*Gk^r6PIy+&STfC{_X{bbZsU!SR$7!=K{c-|H zV|t;7veww#g+Xyh|3mcv@4N9616S-z%Tn}>lt&*YuUNIa7GA@J-D?^s<-BIuFv7_p zJ|PdD7wKYOZfE2+TD;5Z$b@taIc;sZE*ryO3{7neUg9{uvA*SOH!a?VRSLu9_$Wi-i&JF=u$ zj=k3lUy8k}yfWyt)O}D~q`Z-u?TON&|HhQj9ht~nXUw0?irqV%AWPMu&U$)OL->RKsY0clRS$$iQ*)!nNHW3CE?{3J*-xeEbM;2GT1u5)}pT;8g zhAs=%S6k{@+dPQme|?#oX+E}bA^PA(zxqzH<=>J0CnSGl6>-K~qtn3HLPyH;PbjZ^ zx9E34TYq5rr^EjV+10<_fqa7Dx(;c-X=Cr}SlXH@F?ZW%A3n{B-h0g$(Krxgw&W$H%)lB>5?}GoMxEK%m)e zSLfw9w0H`JH><|?oj{cxS4mL7NV%-IqxwmBY?^!EUaY9GgG#7~gP!+gQQ~L}QtH0T zSb)mA=%LOk2?JXnSBkJ?k8mE_EO)g3qLa(%5>-x3VfwyplbTlrI*$pX_qeho)5V<# zP}10#fb=_a!&x}l(rA>1CXAk4bZZQ1KPJ)5i_J0}*-;IvjGX9)-JZb9ai^~L8gTU5 z3^OKc$iW$19g-jXJV+^BVbi;Ha5W{0Hx1Xd-lpEM7MWbf@wN9OE<{6`o#h$(AhaTu zK-!8BHcxcqZyC>P*Md)aAAVm;shWG~*~ClT-eqq%)%P8_ji=}*G=2u%+Qrgek-8uL v3%WIeg^~Zx+F#K9g6?13CVxTqe}^s$G!UQ^@Z|$~(!)Vrdpy$x(X;8#fjUn- literal 0 HcmV?d00001 diff --git a/tests/oom-platform-cert-service/truststoremerger/assets/expected_truststores/pemAndP12.pem b/tests/oom-platform-cert-service/truststoremerger/assets/expected_truststores/pemAndP12.pem new file mode 100644 index 00000000..978e682d --- /dev/null +++ b/tests/oom-platform-cert-service/truststoremerger/assets/expected_truststores/pemAndP12.pem @@ -0,0 +1,63 @@ +-----BEGIN CERTIFICATE----- +MIIEszCCAxugAwIBAgIUZrzliCEcld8Q7Fa20QOooFrkewAwDQYJKoZIhvcNAQEL +BQAwYTEjMCEGCgmSJomT8ixkAQEME2MtMGI4NDYyNzkzMDkyYzFhZGYxFTATBgNV +BAMMDE1hbmFnZW1lbnRDQTEjMCEGA1UECgwaRUpCQ0EgQ29udGFpbmVyIFF1aWNr +c3RhcnQwHhcNMjAwNzE1MTI1NTI1WhcNMzAwNzE1MTI1NTI1WjBhMSMwIQYKCZIm +iZPyLGQBAQwTYy0wYjg0NjI3OTMwOTJjMWFkZjEVMBMGA1UEAwwMTWFuYWdlbWVu +dENBMSMwIQYDVQQKDBpFSkJDQSBDb250YWluZXIgUXVpY2tzdGFydDCCAaIwDQYJ +KoZIhvcNAQEBBQADggGPADCCAYoCggGBAPKU+p62gXve2rCo2ojyyKcy9T/yEZJi +9eZJoawets18FNKzWgXDz3ZK+dgc8hVHZahmIzfh9ovcEALYvCx1bLKN5tqbV7O0 +lUFGI+DGlP9QzGKopCh/uMXas4/lfVNogEB7cXu62ak6FuIuaKHETeqez5wC0d1d +KcilG4loaN3tGXn8j1rnUq1fVu4QyxYfDekRzFiLOvdGeYfZlMkGcVYq3jDV9/sH +5wKUKIxRwa+t1GlvzJqjVY6K3UvxS8ZBrNYTAtsvI/s6fd8Ah4FIM0Zsc8X1CIb4 +rxqhU6CDx1fQCgKyO6FG/3kVA9Y6+VLeRXsa/VaZxRwQWn0XfVrVpajiD+q3m9xd +/NJUEAu1xEyfZw43ZSduGjrf5pwHR871noo+7pEbTDlM92ktDFW3go1DowrhEUlf +XaU6C25yuzThl8f9pFD9/Bo82nHL5n8BENLCmaYrioVWQBAmrQKo1Y3uFgY+fP7y +CL1POlJTuoXO++KhnEvhGfiIVBlzwdBATwIDAQABo2MwYTAPBgNVHRMBAf8EBTAD +AQH/MB8GA1UdIwQYMBaAFAZ6Sy3QQ0dNORdnfg5ppmOI6ngpMB0GA1UdDgQWBBQG +ekst0ENHTTkXZ34OaaZjiOp4KTAOBgNVHQ8BAf8EBAMCAYYwDQYJKoZIhvcNAQEL +BQADggGBAM8MyROdYt0458uCRM/8KZYU9q5xRDGXUGXVpEcGyu1hVlnzlnv7YJSX +BWQenl092IVM7B0hsttpQIAXK4lS3hQ1fTaYWub0TPbK7xORGwi2uTDEagWXMc5e +c2J6Sb9IFl2UqX8cERRCJNuENnuf10MU3rXa2TfydaELDXxr49KPPx3tgl/OfbtY +MmFWLiyxo1jIZ/LeIiaN1m0OtGskkR8TF2D/ZA7YPzEWl2R3PhYNR1gkfAtYPWya +DTXgiQwXuWDhdSTqiN3QuxRDVXFiQgoV0wqjgkqh4NiOXWB2ryaPvqiYRCvoM6Ly +OcYy4LidGz9J+jQGAJPh4fI/1G4SgwVAT0bgYREy4IP6Y8R4zGoU0rGKnknfL70E +t4Xm2ASu5jEcne2l1UOPPctFmei+QHmZ0c8V8HNmP5XRf+47OSi+ryCrRQfKrkyw +UgvoB49yV3M1+IgCx18daEQCYal98hhQMn/3NVrOJeOjzDcF6Gxb679Cu/biZ8Wx +li7RV0Xt1g== +-----END CERTIFICATE----- +Bag Attributes + friendlyName: trusted-certificate-1 + 2.16.840.1.113894.746875.1.1: +subject=UID = c-0b8462793092c1adf, CN = ManagementCA, O = EJBCA Container Quickstart + +issuer=UID = c-0b8462793092c1adf, CN = ManagementCA, O = EJBCA Container Quickstart + +-----BEGIN CERTIFICATE----- +MIIEszCCAxugAwIBAgIUZrzliCEcld8Q7Fa20QOooFrkewAwDQYJKoZIhvcNAQEL +BQAwYTEjMCEGCgmSJomT8ixkAQEME2MtMGI4NDYyNzkzMDkyYzFhZGYxFTATBgNV +BAMMDE1hbmFnZW1lbnRDQTEjMCEGA1UECgwaRUpCQ0EgQ29udGFpbmVyIFF1aWNr +c3RhcnQwHhcNMjAwNzE1MTI1NTI1WhcNMzAwNzE1MTI1NTI1WjBhMSMwIQYKCZIm +iZPyLGQBAQwTYy0wYjg0NjI3OTMwOTJjMWFkZjEVMBMGA1UEAwwMTWFuYWdlbWVu +dENBMSMwIQYDVQQKDBpFSkJDQSBDb250YWluZXIgUXVpY2tzdGFydDCCAaIwDQYJ +KoZIhvcNAQEBBQADggGPADCCAYoCggGBAPKU+p62gXve2rCo2ojyyKcy9T/yEZJi +9eZJoawets18FNKzWgXDz3ZK+dgc8hVHZahmIzfh9ovcEALYvCx1bLKN5tqbV7O0 +lUFGI+DGlP9QzGKopCh/uMXas4/lfVNogEB7cXu62ak6FuIuaKHETeqez5wC0d1d +KcilG4loaN3tGXn8j1rnUq1fVu4QyxYfDekRzFiLOvdGeYfZlMkGcVYq3jDV9/sH +5wKUKIxRwa+t1GlvzJqjVY6K3UvxS8ZBrNYTAtsvI/s6fd8Ah4FIM0Zsc8X1CIb4 +rxqhU6CDx1fQCgKyO6FG/3kVA9Y6+VLeRXsa/VaZxRwQWn0XfVrVpajiD+q3m9xd +/NJUEAu1xEyfZw43ZSduGjrf5pwHR871noo+7pEbTDlM92ktDFW3go1DowrhEUlf +XaU6C25yuzThl8f9pFD9/Bo82nHL5n8BENLCmaYrioVWQBAmrQKo1Y3uFgY+fP7y +CL1POlJTuoXO++KhnEvhGfiIVBlzwdBATwIDAQABo2MwYTAPBgNVHRMBAf8EBTAD +AQH/MB8GA1UdIwQYMBaAFAZ6Sy3QQ0dNORdnfg5ppmOI6ngpMB0GA1UdDgQWBBQG +ekst0ENHTTkXZ34OaaZjiOp4KTAOBgNVHQ8BAf8EBAMCAYYwDQYJKoZIhvcNAQEL +BQADggGBAM8MyROdYt0458uCRM/8KZYU9q5xRDGXUGXVpEcGyu1hVlnzlnv7YJSX +BWQenl092IVM7B0hsttpQIAXK4lS3hQ1fTaYWub0TPbK7xORGwi2uTDEagWXMc5e +c2J6Sb9IFl2UqX8cERRCJNuENnuf10MU3rXa2TfydaELDXxr49KPPx3tgl/OfbtY +MmFWLiyxo1jIZ/LeIiaN1m0OtGskkR8TF2D/ZA7YPzEWl2R3PhYNR1gkfAtYPWya +DTXgiQwXuWDhdSTqiN3QuxRDVXFiQgoV0wqjgkqh4NiOXWB2ryaPvqiYRCvoM6Ly +OcYy4LidGz9J+jQGAJPh4fI/1G4SgwVAT0bgYREy4IP6Y8R4zGoU0rGKnknfL70E +t4Xm2ASu5jEcne2l1UOPPctFmei+QHmZ0c8V8HNmP5XRf+47OSi+ryCrRQfKrkyw +UgvoB49yV3M1+IgCx18daEQCYal98hhQMn/3NVrOJeOjzDcF6Gxb679Cu/biZ8Wx +li7RV0Xt1g== +-----END CERTIFICATE----- diff --git a/tests/oom-platform-cert-service/truststoremerger/assets/invalid_different_lists_size.env b/tests/oom-platform-cert-service/truststoremerger/assets/invalid_different_lists_size.env new file mode 100644 index 00000000..9edfaa41 --- /dev/null +++ b/tests/oom-platform-cert-service/truststoremerger/assets/invalid_different_lists_size.env @@ -0,0 +1,2 @@ +TRUSTSTORES_PATHS=/var/certs/truststore.jks:/var/certs/truststore.pem:/var/certs/truststore.p12 +TRUSTSTORES_PASSWORDS_PATHS=/var/certs/truststoreJks.pass:/var/certs/truststoreP12.pass diff --git a/tests/oom-platform-cert-service/truststoremerger/assets/invalid_duplicated_aliases.env b/tests/oom-platform-cert-service/truststoremerger/assets/invalid_duplicated_aliases.env new file mode 100644 index 00000000..f98b3366 --- /dev/null +++ b/tests/oom-platform-cert-service/truststoremerger/assets/invalid_duplicated_aliases.env @@ -0,0 +1,2 @@ +TRUSTSTORES_PATHS=/var/certs/truststore.jks:/var/certs/truststore.jks +TRUSTSTORES_PASSWORDS_PATHS=/var/certs/truststoreJks.pass:/var/certs/truststoreJks.pass diff --git a/tests/oom-platform-cert-service/truststoremerger/assets/invalid_empty_certs.env b/tests/oom-platform-cert-service/truststoremerger/assets/invalid_empty_certs.env new file mode 100644 index 00000000..95c00fc2 --- /dev/null +++ b/tests/oom-platform-cert-service/truststoremerger/assets/invalid_empty_certs.env @@ -0,0 +1,2 @@ +TRUSTSTORES_PATHS=/var/certs/empty.pem:/var/certs/truststore.p12 +TRUSTSTORES_PASSWORDS_PATHS=:/var/certs/truststoreP12.pass diff --git a/tests/oom-platform-cert-service/truststoremerger/assets/invalid_empty_file.env b/tests/oom-platform-cert-service/truststoremerger/assets/invalid_empty_file.env new file mode 100644 index 00000000..e69de29b diff --git a/tests/oom-platform-cert-service/truststoremerger/assets/invalid_empty_passwords.env b/tests/oom-platform-cert-service/truststoremerger/assets/invalid_empty_passwords.env new file mode 100644 index 00000000..840728bb --- /dev/null +++ b/tests/oom-platform-cert-service/truststoremerger/assets/invalid_empty_passwords.env @@ -0,0 +1,2 @@ +TRUSTSTORES_PATHS=/var/certs/truststore.jks:/var/certs/truststore.pem:/var/certs/truststore.p12 +TRUSTSTORES_PASSWORDS_PATHS= diff --git a/tests/oom-platform-cert-service/truststoremerger/assets/invalid_extension.env b/tests/oom-platform-cert-service/truststoremerger/assets/invalid_extension.env new file mode 100644 index 00000000..5b971616 --- /dev/null +++ b/tests/oom-platform-cert-service/truststoremerger/assets/invalid_extension.env @@ -0,0 +1,2 @@ +TRUSTSTORES_PATHS=/var/certs/truststore.txt:/var/certs/truststore.p12 +TRUSTSTORES_PASSWORDS_PATHS=/var/certs/truststoreJks.pass:/var/certs/truststoreP12.pass diff --git a/tests/oom-platform-cert-service/truststoremerger/assets/invalid_file_password_pair.env b/tests/oom-platform-cert-service/truststoremerger/assets/invalid_file_password_pair.env new file mode 100644 index 00000000..1a195116 --- /dev/null +++ b/tests/oom-platform-cert-service/truststoremerger/assets/invalid_file_password_pair.env @@ -0,0 +1,2 @@ +TRUSTSTORES_PATHS=/var/certs/truststore.jks +TRUSTSTORES_PASSWORDS_PATHS=/var/certs/truststoreP12.pass diff --git a/tests/oom-platform-cert-service/truststoremerger/assets/invalid_password_path.env b/tests/oom-platform-cert-service/truststoremerger/assets/invalid_password_path.env new file mode 100644 index 00000000..b397f9ac --- /dev/null +++ b/tests/oom-platform-cert-service/truststoremerger/assets/invalid_password_path.env @@ -0,0 +1,2 @@ +TRUSTSTORES_PATHS=/var/certs/truststore.jks +TRUSTSTORES_PASSWORDS_PATHS=/var/certs/truststoreJks_invalid.pass diff --git a/tests/oom-platform-cert-service/truststoremerger/assets/invalid_truststore_paths.env b/tests/oom-platform-cert-service/truststoremerger/assets/invalid_truststore_paths.env new file mode 100644 index 00000000..52fa88c6 --- /dev/null +++ b/tests/oom-platform-cert-service/truststoremerger/assets/invalid_truststore_paths.env @@ -0,0 +1,2 @@ +TRUSTSTORES_PATHS=/invalid/truststore.jks:/invalid/truststore.p12 +TRUSTSTORES_PASSWORDS_PATHS=/var/certs/truststoreJks.pass:/var/certs/truststoreP12.pass diff --git a/tests/oom-platform-cert-service/truststoremerger/assets/truststores/empty.pem b/tests/oom-platform-cert-service/truststoremerger/assets/truststores/empty.pem new file mode 100644 index 00000000..e69de29b diff --git a/tests/oom-platform-cert-service/truststoremerger/assets/truststores/truststore.jks b/tests/oom-platform-cert-service/truststoremerger/assets/truststores/truststore.jks new file mode 100644 index 0000000000000000000000000000000000000000..3bd85a064a6e1cd017d4508fe2265d20d5dcff54 GIT binary patch literal 1413 zcmb7DYdF&j9NvEy9k(s1SxktWZ5D0XAfPYcx zEW$k z;@EJ$r~-g80skci)hCz_HxG*k&BkU+ryp#Sq43%c{?cK`$g#)6_CAPcGlWkCT*yIGlyT5T-@ z6SU(|I`bhm=YkE!RnJ4~l%Tkz@1+<=FN53^V*u4m?3JTZuSH51|Ac!#9wuuP@gEUN<+IQzQ5j$tv7)yZcc-W zy$AiyQBULg8?sxkKc4nYkr`3*eKU>SrQE*`?w{f7x1j93nt1UVX(>+CeB8`_ej8_0 z5p{@}5L)81lJPDD-r}#z9VyMsk0KuNUg+vm!B*lj9f*ZQ!k0>quwkx}$FU_+uA}sY8H!ZTnTPmGs`?XB$ zR|Ng-w{|U1|6EexxOZ?GB6KEv>WOiyC2B4btGfpRYe&k5>93q%e)dB|(sbM6tA#RF z?iWpGaiD^944S<)Y4p=z&tOkBQ4lksPXB_;mlCRCly4*H1`O5CDx=Dp;Foo_10*ka zE4r6U4n;FmDpmgwWKuBaV=YGJ4e9P71!G0Yt@YL(8lWVjWa)swsK?HJ)5w(#<3z z&E${O=!5)B)TjkUgx`FBNW_S6`x>M8X28?`&IvUr41fToXF&$2y&gerBpeOj>PjOl z+RaE^1Rddd9XNc{{JYuTL7k1YJ{$w0NV>IFU< zx(}x2M)YqZ9rD!v9((a*hhaN!HS5`3cu~le@$FZ_xwrH0Susk#+4lC=w0l`q6c>1^ zXY}o=ihD~Dcbdv-LoTuFnj1;Fk8j9Q4A`%nlhw%KMTKRHlIP)3(*fNnn5q~2Bwm>C z(T>POLz-=MQ>)#v{$M@eLwCLPP&QH)miU?YP!nEff2Z*J1%y#_)S&^>Xxyn`6!PQP z=ZUy&uh}LZ<8Xu^EQoQq-8C)MjFTneqsolraj|SmH^bjP^e=~|^0(rGlGvv&&Yxjv z%D6gfcgri#gvZLbCEQq$G`(ysFxE^{kVZ(>>J4i&$LYQ=$vvhnBAbp-k z3CaC@B1SrS`9ZmZmw_~KXLH^%>UI}@atxa_WBN;49X0T%+?m{%CqnCWUKo&-(|CgJH}7 literal 0 HcmV?d00001 diff --git a/tests/oom-platform-cert-service/truststoremerger/assets/truststores/truststore.p12 b/tests/oom-platform-cert-service/truststoremerger/assets/truststores/truststore.p12 new file mode 100644 index 0000000000000000000000000000000000000000..3a98c4a203e2a856be44eb3269ad8a22b6ae96a4 GIT binary patch literal 1530 zcmVnK%Eas|xh9uD2{J0s{cUP=JC3K%`b&-^h@EFHDysbpzcvNaFw@Zgy3JFnn*J zPF4tdrc11B6tIq@@E_dNzsA}ow5P8Zt}Q5n1ogaf{^bGDN~Gb=LhUCLmgr`=yFi-R zeI-H$u;=*(;>>$bs5u1W5EZz$8K%|a$5GmfnFm;9{rp*225)ks+fPc=z#yjYu}XOd zGRceuMTgwWqJUdu>~=z>BdB-;xL?VNF`rTwTyCgL=INWq+x^!aQk|#}PLP7r;#lyN zh!qs-hIX5apqzYm2k#iH;35U7N;y%n0wVpm$ln7Mh%B@Bj~Wx66@p-I-K6hbjQPwj zV}^Em5j2G-di^m@4GvgF^?MMv*O@iHFW|iiDkagoY*QapE8K*L33rWRKPVKfa_wW? zCXgldGZRp?8g&HbT>Bs^W@0qb1}@2&BI}fQ6Wc^+KEU3J zpt)eNWRMJ=7Yo9Y?5YkE#gakQ*JJyn2iNb|jTIfdVa#h`ucjk9jCB(lz~9KRmA%Clk9V@()7VEXK@V71q$DF zN|&`VdA(u>tHn?`2EB>9)89d>O6^{O z%TlTkQ(T}di~KKJwI5_Tf`V}gW_%ZjP>`x@Gj28^Clm|o+D(y6PnpmBtqBOGWleck ztcO9=1AGt;z;kzu6uO*32O7SaYC;f-;LjJ+nz~F}34k-e^^}FX`Y}N&M0DS5W^GZU z;B-cW{70BP8d{gnXIURLFhY79EW%BWoixgq>DnTj!$fvshLN?Q<}Ch+)*;0N+A$)t z?iC`k_A3$*_*puk3T#wE3^Ek~QUDG$!nbWH6keJrVS-{}zO93Cio?-;&4M-&*_~M( zx3IGpG|JaZ8iBoGHgi+Cb3QkVc2 zdQ&(HT{3VqblweI8BBhVu(^OK*VW+(ED%;3Ry1pFzZ(Ch^b!onjg~PN|N3xx%JYXQ z$M2>0yAn#-$G|cNpW!XN1P4aZbRV{Mis~@z4hx=&%Ip zS0ElSd8Tv;;7#6=2^2%D33T^CB^@(cd>D>xJ+IawEBnLO3aI`8B+=2=1WgwH zWH}PTyq)~-d-OFY*y;e7nH^b!mcv=0M!N+85+W&cZt?jiy?m;0+5yq@QuDo8bAV}D zFFVjr!?w3#_UFQ!Kz_ls(SALJ