blob: 46e0357e44d02f1706f892810099113d0854c47b [file] [log] [blame]
import os
from OpenSSL import crypto
from cryptography import x509
from cryptography.hazmat.backends import default_backend
from EnvsReader import EnvsReader
from ArtifactParser import ArtifactParser
class PemArtifactsValidator:
def __init__(self, mount_path):
self.parser = ArtifactParser(mount_path, "pem")
self.key = mount_path + '/key.pem'
def get_and_compare_data_pem(self, path_to_env):
data = self.get_data_pem(path_to_env)
return data, self.parser.contains_expected_data(data)
def artifacts_exist_and_are_not_empty(self):
keystoreExists = self.file_exists_and_is_not_empty(self.parser.keystorePath)
truststoreExists = self.file_exists_and_is_not_empty(self.parser.truststorePath)
keyExists = self.file_exists_and_is_not_empty(self.key)
return keystoreExists and truststoreExists and keyExists
def file_exists_and_is_not_empty(self, pathToFile):
return os.path.isfile(pathToFile) and os.path.getsize(pathToFile) > 0
def get_data_pem(self, path_to_env):
envs = self.parser.get_envs_as_dict(EnvsReader().read_env_list_from_file(path_to_env))
certificate = self.get_keystore_certificate()
data = self.parser.get_owner_data_from_certificate(certificate)
data['SANS'] = self.parser.get_sans(certificate)
return type('', (object,), {"expectedData": envs, "actualData": data})
def get_keystore_certificate(self):
return crypto.X509.from_cryptography(self.load_x509_certificate())
def load_x509_certificate(self):
cert = x509.load_pem_x509_certificate(open(self.parser.keystorePath, 'rb').read(), default_backend())
return cert