source: TI12-security/trunk/python/ndg.security.test/ndg/security/test/attributeauthority/test_attributeauthority.cfg @ 4667

Subversion URL: http://proj.badc.rl.ac.uk/svn/ndg/TI12-security/trunk/python/ndg.security.test/ndg/security/test/attributeauthority/test_attributeauthority.cfg@4667
Revision 4667, 2.6 KB checked in by pjkersha, 11 years ago (diff)
  • Completed Attribute Authority unit test
  • re-issued out of date test certs.
Line 
1# NERC Data Grid Project
2#
3# P J Kershaw 16/01/07
4#
5# Copyright (C) 2007 STFC & NERC
6#
7# This software may be distributed under the terms of the Q Public License,
8# version 1.0 or later.
9
10[DEFAULT]
11siteBPropFilePath=$NDGSEC_AA_UNITTEST_DIR/siteB/siteBAttAuthority.cfg
12
13[setUp]
14# ! SiteBMapConfig.xml trusted site A aaURI setting must agree with this
15# setting for test6GetMappedAttCert
16propFilePath=$NDGSEC_AA_UNITTEST_DIR/siteA/siteAAttAuthority.cfg
17
18# For https connections only.  !Omit ssl* settings if using http!
19# sslpeercertcn is the expected CommonName of peer cert.  Omit if it's the
20# same as peer hostname.
21sslPeerCertCN = AttributeAuthority
22sslCACertFilePathList = $NDGSEC_AA_UNITTEST_DIR/ca/ndg-test-ca.crt
23
24[test02GetTrustedHostInfo]
25role = postgrad
26
27[test03GetTrustedHostInfoWithNoMatchingRoleFound]
28# Set an alternative role to test no matching role found exception
29role = blah
30 
31[test05GetAttCert]
32issuingClntCertFilePath = $NDGSEC_AA_UNITTEST_DIR/user.crt
33
34# Setup for use by test08GetMappedAttCert test
35attCertFilePath = $NDGSEC_AA_UNITTEST_DIR/ac-clnt.xml
36
37[test06GetAttCertWithUserIdSet]
38userId = system
39attCertFilePath = $NDGSEC_AA_UNITTEST_DIR/ac-clnt-test6.xml
40
41[test07GetMappedAttCert]
42issuingClntCertFilePath = $NDGSEC_AA_UNITTEST_DIR/user.crt
43userAttCertFilePath = $NDGSEC_AA_UNITTEST_DIR/ac-clnt.xml
44mappedAttCertFilePath = $NDGSEC_AA_UNITTEST_DIR/mapped-ac.xml
45
46[test08GetMappedAttCertStressTest]
47userAttCertFilePathList = $NDGSEC_AA_UNITTEST_DIR/ac-clnt.xml
48
49[wsse]
50# WS-Security settings for unit test AA clients
51#
52# OUTBOUND MESSAGE CONFIG
53
54# Signature of an outbound message
55
56# Certificate associated with private key used to sign a message.  The sign
57# method will add this to the BinarySecurityToken element of the WSSE header. 
58signingCertFilePath=$NDGSEC_AA_UNITTEST_DIR/test.crt
59
60# PEM encoded private key file
61signingPriKeyFilePath=$NDGSEC_AA_UNITTEST_DIR/test.key
62
63# Set the ValueType for the BinarySecurityToken added to the WSSE header for a
64# signed message.  See __setReqBinSecTokValType method and binSecTokValType
65# class variable for options - it may be one of X509, X509v3, X509PKIPathv1 or
66# give full namespace to alternative - see
67# ZSI.wstools.Namespaces.OASIS.X509TOKEN
68#
69# binSecTokValType determines whether signingCert or signingCertChain
70# attributes will be used.
71reqBinSecTokValType=X509v3
72
73# Add a timestamp element to an outbound message
74addTimestamp=True
75
76# For WSSE 1.1 - service returns signature confirmation containing signature
77# value sent by client
78applySignatureConfirmation=False
79
80#
81# INBOUND MESSAGE CONFIG
82
83# Provide a space separated list of file paths
84caCertFilePathList=$NDGSEC_AA_UNITTEST_DIR/ca/ndg-test-ca.crt
85
Note: See TracBrowser for help on using the repository browser.