source: TI12-security/trunk/python/ndg.security.test/ndg/security/test/SessionMgr/sessionMgrClientTest.cfg @ 3024

Subversion URL: http://proj.badc.rl.ac.uk/svn/ndg/TI12-security/trunk/python/ndg.security.test/ndg/security/test/SessionMgr/sessionMgrClientTest.cfg@3024
Revision 3024, 2.3 KB checked in by pjkersha, 13 years ago (diff)

Adding getSessionStatus to enable SM clients to check a session is still valid.

python/ndg.security.server/ndg/security/server/SessionMgr/init.py:

  • new method getSessionStatus checks for a session's existence with given input sessID.

python/www/html/sessionMgr.wsdl,
python/ndg.security.server/ndg/security/server/SessionMgr/SessionMgr_services_server.py,
python/ndg.security.common/ndg/security/common/SessionMgr/SessionMgr_services.py:

  • added getSessionStatus operation to WSDL and regenerated the stubs

python/ndg.security.test/ndg/security/test/MyProxy/myProxyProperties.xml: replace refs to GLOBUS_LOCATION with NDGSEC_DIR for MyProxy? unit tests OpenSSL config file.

python/ndg.security.test/ndg/security/test/SessionMgr/SessionMgrTest.py: new unit test to test out ndg.security.server.SessionMgr?.SessionMgr? class. Previously, this required use of the SessionMgrClient? unit tests. ie. running over SOAP interface.

python/ndg.security.test/ndg/security/test/SessionMgr/sessionMgrProperties.xml,
python/ndg.security.test/ndg/security/test/SessionMgr/sessionMgrClientTest.cfg:

  • expt with settings to try twisted over http but run through proxy on 443 with Apache.
Line 
1# NERC Data Grid Project
2#
3# P J Kershaw 12/01/07
4#
5# Copyright (C) 2007 CCLRC & NERC
6#
7# This software may be distributed under the terms of the Q Public License,
8# version 1.0 or later.
9#
10# $Id:$
11[setUp]
12smuri = https://localhost/SessionManager
13#smuri = https://localhost:5700/SessionManager
14#smuri = https://glue.badc.rl.ac.uk:50000/SessionManager
15
16# For https connections only.  !Omit ssl* settings if using http!
17# sslpeercertcn is the expected CommonName of peer cert.  Omit if it's the
18# same as peer hostname.
19#sslpeercertcn = webSphereTest
20sslcacertfilepathlist = cacert.pem
21
22# Set to False to test service without WS-Security signature
23setsignaturehandler = True
24
25# ValueType for BinarySecurityToken element of WSSE header.  Specify
26# 'X509PKIPathv1' for use with proxy certificates
27reqbinsectokvaltype = X509v3
28#reqbinsectokvaltype = X509
29#reqbinsectokvaltype = X509PKIPathv1
30
31# Test with proxy certificates or with standard certs.  Comment out as
32# appropriate
33#proxycertfilepath = ./proxy-cert.pem
34
35# Test without proxy certificates - uses AA server side cert/private key for
36# client side too (!)
37clntcertfilepath = ./clnt-cert.pem
38
39clntprikeyfilepath = ./clnt-key.pem
40#clntprikeyfilepath = ./proxy-key.pem
41
42# Password protecting client private key - if omitted it will be prompted for
43# from tty
44clntprikeypwd = 
45
46# Space separated list of CA certificate files used to verify certificate used
47# in message signature
48cacertfilepathlist = ./cacert.pem
49
50[test1AddUser]
51username = BugsBunny
52# Comment out to prompt for on tty.
53#passphrase =
54 
55[test2Connect]         
56#username = lawrence
57username = raphaelTest
58#username = gabriel
59passphrase = testpassword
60
61[test3ConnectNoCreateServerSess]         
62username = raphaelTest
63#username = gabriel
64passphrase = 
65
66[test6GetAttCertUsingSessID]
67aaURI = http://localhost:5000/AttributeAuthority
68acOutFilePath = ac-out.xml
69
70[test6aGetAttCertRefusedUsingSessID]
71aaURI = http://localhost:5100/AttributeAuthority
72
73[test6bGetMappedAttCertUsingSessID]
74aaURI = http://localhost:5100/AttributeAuthority
75
76[test6cGetAttCertWithExtAttCertListUsingSessID]
77aaURI = http://localhost:5100/AttributeAuthority
78# Use output from test6GetAttCertUsingSessID!
79extACFilePath = ac-out.xml
80
81[test7GetAttCertUsingProxyCert]
82aaURI = http://localhost:5000/AttributeAuthority
83#aaURI = http://glue.badc.rl.ac.uk/services/ndg/security/AttributeAuthority
Note: See TracBrowser for help on using the repository browser.