source: TI12-security/trunk/python/ndg.security.test/ndg/security/test/attAuthority/wsgi/site-a.ini @ 4233

Subversion URL: http://proj.badc.rl.ac.uk/svn/ndg/TI12-security/trunk/python/ndg.security.test/ndg/security/test/attAuthority/wsgi/site-a.ini@4233
Revision 4233, 2.9 KB checked in by pjkersha, 12 years ago (diff)

More work on WSGI version of Attribute Authority unit tests. TODO: complete code to enable WS-Security config to be picked up from within the Paste ini file.

Line 
1#
2# PasteDeploy ini file for Attribute Authority Unit tests Site A Server
3#
4# NERC Data Grid Project
5#
6# P J Kershaw 12/09/08
7#
8# Copyright (C) 2008 CCLRC & NERC
9#
10# This software may be distributed under the terms of the Q Public License,
11# version 1.0 or later.
12
13[DEFAULT]
14#wsseCfgFilePath = $NDGSEC_AACLNT_UNITTEST_DIR/wssecurity.cfg
15wsseCfgFileSection = WS-Security
16
17[server:main]
18use = egg:Paste#http
19host = 0.0.0.0
20port = 5000
21
22[app:mainApp]
23paste.app_factory = ndg.security.test.attAuthority.wsgi.siteAServerApp:app_factory
24
25# Chain of SOAP Middleware filters
26[pipeline:main]
27pipeline = wsseSignatureVerificationFilter AttributeAuthorityFilter wsseSignatureFilter mainApp
28
29
30[filter:AttributeAuthorityFilter]
31paste.filter_app_factory = ndg.security.server.wsgi.soap:SOAPBindingMiddleware
32ServiceSOAPBindingClass = ndg.security.server.zsi.attributeauthority.AttributeAuthorityWS
33referencedFilters = wsseSignatureVerificationFilter01
34path = /AttributeAuthority
35enableWSDLQuery = True
36charset = utf-8
37
38[filter:wsseSignatureVerificationFilter]
39paste.filter_app_factory = ndg.security.server.wsgi.wssecurity:SignatureVerificationFilter
40filterID = wsseSignatureVerificationFilter01
41
42[filter:wsseSignatureFilter]
43paste.filter_app_factory = ndg.security.server.wsgi.wssecurity:ApplySignatureFilter
44# Last filter in chain SOAP handlers writes the response
45writeResponse = True
46
47
48[WS-Security]
49#
50# OUTBOUND MESSAGE CONFIG
51
52# Signature of an outbound message
53
54# Certificate associated with private key used to sign a message.  The sign
55# method will add this to the BinarySecurityToken element of the WSSE header. 
56signingCertFilePath=$NDGSEC_AACLNT_UNITTEST_DIR/siteA-aa.crt
57
58# PEM encoded private key file
59signingPriKeyFilePath=$NDGSEC_AACLNT_UNITTEST_DIR/siteA-aa.key
60
61# Set the ValueType for the BinarySecurityToken added to the WSSE header for a
62# signed message.  See __setReqBinSecTokValType method and binSecTokValType
63# class variable for options - it may be one of X509, X509v3, X509PKIPathv1 or
64# give full namespace to alternative - see
65# ZSI.wstools.Namespaces.OASIS.X509TOKEN
66#
67# binSecTokValType determines whether signingCert or signingCertChain
68# attributes will be used.
69reqBinSecTokValType=X509v3
70
71# Add a timestamp element to an outbound message
72addTimestamp=True
73
74# For WSSE 1.1 - service returns signature confirmation containing signature
75# value sent by client
76applySignatureConfirmation=False
77
78#
79# INBOUND MESSAGE CONFIG
80
81# Provide a space separated list of file paths
82caCertFilePathList=$NDGSEC_AACLNT_UNITTEST_DIR/ca/ndg-test-ca.crt
83
84# Logging configuration
85[loggers]
86keys = root, ndg
87
88[handlers]
89keys = console
90
91[formatters]
92keys = generic
93
94[logger_root]
95level = INFO
96handlers = console
97
98[logger_ndg]
99level = DEBUG
100handlers =
101qualname = ndg
102
103[handler_console]
104class = StreamHandler
105args = (sys.stderr,)
106level = NOTSET
107formatter = generic
108
109[formatter_generic]
110format = %(asctime)s,%(msecs)03d %(levelname)-5.5s [%(name)s] %(message)s
111datefmt = %H:%M:%S
Note: See TracBrowser for help on using the repository browser.