source: TI12-security/trunk/python/ndg.security.test/ndg/security/test/attributeauthorityclient/attAuthorityClientTest.cfg @ 4718

Subversion URL: http://proj.badc.rl.ac.uk/svn/ndg/TI12-security/trunk/python/ndg.security.test/ndg/security/test/attributeauthorityclient/attAuthorityClientTest.cfg@4718
Revision 4718, 2.6 KB checked in by pjkersha, 11 years ago (diff)

Refactored Attribute Authority client unit tests separating out AA services into the config dir.

Line 
1# NERC Data Grid Project
2#
3# P J Kershaw 16/01/07
4#
5# Copyright (C) 2007 STFC
6#
7# This software may be distributed under the terms of the Q Public License,
8# version 1.0 or later.
9
10[setUp]
11# ! SiteBMapConfig.xml trusted site A aaURI setting must agree with this
12# setting for test6GetMappedAttCert
13uri = http://localhost:5000/AttributeAuthority
14
15# With TCP Mon:
16#uri = http://localhost:4999/AttributeAuthority
17
18# For https connections only.  !Omit ssl* settings if using http!
19# sslpeercertcn is the expected CommonName of peer cert.  Omit if it's the
20# same as peer hostname.
21sslPeerCertCN = AttributeAuthority
22sslCACertFilePathList = $NDGSEC_UNITTEST_CONFIG_DIR/ca/ndg-test-ca.crt
23
24[test02GetTrustedHostInfo]
25role = postgrad
26
27[test03GetTrustedHostInfoWithNoMatchingRoleFound]
28# Set an alternative role to test no matching role found exception
29role = blah
30 
31[test06GetAttCert]
32# Setup for use by test08GetMappedAttCert test
33attCertFilePath = $NDGSEC_AACLNT_UNITTEST_DIR/ac-clnt.xml
34
35[test07GetAttCertWithUserIdSet]
36userId = system
37attCertFilePath = $NDGSEC_AACLNT_UNITTEST_DIR/ac-clnt-test6.xml
38
39[test08GetMappedAttCert]
40uri = http://localhost:5100/AttributeAuthority
41userAttCertFilePath = $NDGSEC_AACLNT_UNITTEST_DIR/ac-clnt.xml
42mappedAttCertFilePath = $NDGSEC_AACLNT_UNITTEST_DIR/mapped-ac.xml
43
44[test09GetMappedAttCertStressTest]
45uri = http://localhost:5100/AttributeAuthority
46userAttCertFilePathList = $NDGSEC_AACLNT_UNITTEST_DIR/ac-clnt.xml
47
48[wsse]
49# WS-Security settings for unit test AA clients
50#
51# OUTBOUND MESSAGE CONFIG
52
53# Signature of an outbound message
54
55# Certificate associated with private key used to sign a message.  The sign
56# method will add this to the BinarySecurityToken element of the WSSE header. 
57signingCertFilePath=$NDGSEC_UNITTEST_CONFIG_DIR/pki/wsse-clnt.crt
58
59# PEM encoded private key file
60signingPriKeyFilePath=$NDGSEC_UNITTEST_CONFIG_DIR/pki/wsse-clnt.key
61
62# Set the ValueType for the BinarySecurityToken added to the WSSE header for a
63# signed message.  See __setReqBinSecTokValType method and binSecTokValType
64# class variable for options - it may be one of X509, X509v3, X509PKIPathv1 or
65# give full namespace to alternative - see
66# ZSI.wstools.Namespaces.OASIS.X509TOKEN
67#
68# binSecTokValType determines whether signingCert or signingCertChain
69# attributes will be used.
70reqBinSecTokValType=X509v3
71
72# Add a timestamp element to an outbound message
73addTimestamp=True
74
75# For WSSE 1.1 - service returns signature confirmation containing signature
76# value sent by client
77applySignatureConfirmation=False
78
79#
80# INBOUND MESSAGE CONFIG
81
82# Provide a space separated list of file paths
83caCertFilePathList=$NDGSEC_UNITTEST_CONFIG_DIR/ca/ndg-test-ca.crt
84
Note: See TracBrowser for help on using the repository browser.