source: TI12-security/trunk/python/ndg.security.test/ndg/security/test/attAuthority/wsgi/site-a.ini @ 4238

Subversion URL: http://proj.badc.rl.ac.uk/svn/ndg/TI12-security/trunk/python/ndg.security.test/ndg/security/test/attAuthority/wsgi/site-a.ini@4238
Revision 4238, 3.0 KB checked in by pjkersha, 11 years ago (diff)

Working unit tests for WSGI based Attribute Authority. TODO:

  • test with Attribute Authority properties picked up from ini file instead of XML properties file (code supports both methods)
  • refactor unit test config to use standard WS-Security config section
Line 
1#
2# PasteDeploy ini file for Attribute Authority Unit tests Site A Server
3#
4# NERC Data Grid Project
5#
6# P J Kershaw 12/09/08
7#
8# Copyright (C) 2008 CCLRC & NERC
9#
10# This software may be distributed under the terms of the Q Public License,
11# version 1.0 or later.
12
13[DEFAULT]
14#wsseCfgFilePath = $NDGSEC_AACLNT_UNITTEST_DIR/wssecurity.cfg
15wsseCfgFilePath = %(here)s/site-a.ini
16wsseCfgFileSection = WS-Security
17
18[server:main]
19use = egg:Paste#http
20host = 0.0.0.0
21port = 5000
22
23[app:mainApp]
24paste.app_factory = ndg.security.test.attAuthority.wsgi.siteAServerApp:app_factory
25
26# Chain of SOAP Middleware filters
27[pipeline:main]
28pipeline = wsseSignatureVerificationFilter AttributeAuthorityFilter wsseSignatureFilter mainApp
29
30
31[filter:AttributeAuthorityFilter]
32paste.filter_app_factory = ndg.security.server.wsgi.soap:SOAPBindingMiddleware
33ServiceSOAPBindingClass = ndg.security.server.zsi.attributeauthority.AttributeAuthorityWS
34referencedFilters = wsseSignatureVerificationFilter01
35path = /AttributeAuthority
36enableWSDLQuery = True
37charset = utf-8
38
39[filter:wsseSignatureVerificationFilter]
40paste.filter_app_factory = ndg.security.server.wsgi.wssecurity:SignatureVerificationFilter
41filterID = wsseSignatureVerificationFilter01
42
43[filter:wsseSignatureFilter]
44paste.filter_app_factory = ndg.security.server.wsgi.wssecurity:ApplySignatureFilter
45# Last filter in chain SOAP handlers writes the response
46writeResponse = True
47
48
49[WS-Security]
50#
51# OUTBOUND MESSAGE CONFIG
52
53# Signature of an outbound message
54
55# Certificate associated with private key used to sign a message.  The sign
56# method will add this to the BinarySecurityToken element of the WSSE header. 
57signingCertFilePath=$NDGSEC_AACLNT_UNITTEST_DIR/siteA-aa.crt
58
59# PEM encoded private key file
60signingPriKeyFilePath=$NDGSEC_AACLNT_UNITTEST_DIR/siteA-aa.key
61
62# Set the ValueType for the BinarySecurityToken added to the WSSE header for a
63# signed message.  See __setReqBinSecTokValType method and binSecTokValType
64# class variable for options - it may be one of X509, X509v3, X509PKIPathv1 or
65# give full namespace to alternative - see
66# ZSI.wstools.Namespaces.OASIS.X509TOKEN
67#
68# binSecTokValType determines whether signingCert or signingCertChain
69# attributes will be used.
70reqBinSecTokValType=X509v3
71
72# Add a timestamp element to an outbound message
73addTimestamp=True
74
75# For WSSE 1.1 - service returns signature confirmation containing signature
76# value sent by client
77applySignatureConfirmation=False
78
79#
80# INBOUND MESSAGE CONFIG
81
82# Provide a space separated list of file paths
83caCertFilePathList=$NDGSEC_AACLNT_UNITTEST_DIR/ca/ndg-test-ca.crt
84
85# Logging configuration
86[loggers]
87keys = root, ndg
88
89[handlers]
90keys = console
91
92[formatters]
93keys = generic
94
95[logger_root]
96level = INFO
97handlers = console
98
99[logger_ndg]
100level = DEBUG
101handlers =
102qualname = ndg
103
104[handler_console]
105class = StreamHandler
106args = (sys.stderr,)
107level = NOTSET
108formatter = generic
109
110[formatter_generic]
111format = %(asctime)s,%(msecs)03d %(levelname)-5.5s [%(name)s] %(message)s
112datefmt = %H:%M:%S
Note: See TracBrowser for help on using the repository browser.