source: TI12-security/trunk/python/ndg.security.test/ndg/security/test/combinedservices/test_combinedservices.cfg @ 4521

Subversion URL: http://proj.badc.rl.ac.uk/svn/ndg/TI12-security/trunk/python/ndg.security.test/ndg/security/test/combinedservices/test_combinedservices.cfg@4521
Revision 4521, 3.4 KB checked in by pjkersha, 11 years ago (diff)

Completed tests running Attribute Authority and Session Manager in the same WSGI stack:

  • ndg.security.server.wsgi.utils.attributeauthorityclient.WSGIAttributeAuthorityClient: completed this class and tested in combinedservices unit tests. This class enables WSGI apps to access an AttributeAuthority? WSGI app running in the same stack or else make a callout to a remote SOAP service.
  • ndg.security.server.wsgi.wssecurity: improved config set-up
Line 
1# NERC Data Grid Project
2#
3# P J Kershaw 12/01/07
4#
5# Copyright (C) 2007 STFC & NERC
6#
7# This software may be distributed under the terms of the Q Public License,
8# version 1.0 or later.
9#
10# $Id:$
11[setUp]
12uri = http://localhost:7999/SessionManager
13
14# For https connections only.  !Omit ssl* settings if using http!
15# sslpeercertcn is the expected CommonName of peer cert.  Omit if it's the
16# same as peer hostname.
17#sslPeerCertCN = junk
18
19# For https only - List of CA certificates to enable this client to verify
20# the server's SSL X.509 certificate
21sslCACertFilePathList = $NDGSEC_COMBINED_SRVS_UNITTEST_DIR/ca/ndg-test-ca.crt
22
23[test01Connect]
24username = testuser
25passphrase = testpassword
26
27[test03ConnectNoCreateServerSess]         
28username = testuser
29passphrase = testpassword
30
31[test06GetAttCertWithSessID]
32aaURI = http://localhost:8000/AttributeAuthority
33acOutFilePath = $NDGSEC_COMBINED_SRVS_UNITTEST_DIR/ac-out.xml
34
35[test07GetAttCertWithUserX509Cert]
36aaURI = http://localhost:8000/AttributeAuthority
37
38[test09WSGILocalSessionManagerInstanceConnect]
39url = http://localhost:8000/test_localSessionManagerConnect
40username = testuser
41passphrase = testpassword
42
43[test10WSGILocalSessionManagerInstanceGetSessionStatus]
44url = http://localhost:8000/test_localSessionManagerGetSessionStatus
45username = testuser
46passphrase = testpassword
47
48[test11WSGILocalSessionManagerInstanceDisconnect]
49url = http://localhost:8000/test_localSessionManagerDisconnect
50username = testuser
51passphrase = testpassword
52
53[test12WSGILocalSessionManagerInstanceGetAttCert]
54url = http://localhost:8000/test_localSessionManagerGetAttCert
55username = testuser
56passphrase = testpassword
57
58[test13WSGILocalAttributeAuthorityInstanceGetHostInfo]
59url = http://localhost:8000/test_localAttributeAuthorityGetHostInfo
60
61[test14WSGILocalAttributeAuthorityInstanceGetTrustedHostInfo]
62url = http://localhost:8000/test_localAttributeAuthorityGetTrustedHostInfo
63role = postgrad
64
65[test15WSGILocalAttributeAuthorityInstanceGetAllHostsInfo]
66url = http://localhost:8000/test_localAttributeAuthorityGetAllHostsInfo
67
68[test16WSGILocalAttributeAuthorityInstanceGetAttCert]
69url = http://localhost:8000/test_localAttributeAuthorityGetAttCert
70username = testuser
71passphrase = testpassword
72
73[wsse]
74# WS-Security settings for unit test AA clients
75#
76# OUTBOUND MESSAGE CONFIG
77
78# Signature of an outbound message
79
80# Certificate associated with private key used to sign a message.  The sign
81# method will add this to the BinarySecurityToken element of the WSSE header. 
82signingCertFilePath=$NDGSEC_COMBINED_SRVS_UNITTEST_DIR/test.crt
83
84# PEM encoded private key file
85signingPriKeyFilePath=$NDGSEC_COMBINED_SRVS_UNITTEST_DIR/test.key
86
87# Set the ValueType for the BinarySecurityToken added to the WSSE header for a
88# signed message.  See __setReqBinSecTokValType method and binSecTokValType
89# class variable for options - it may be one of X509, X509v3, X509PKIPathv1 or
90# give full namespace to alternative - see
91# ZSI.wstools.Namespaces.OASIS.X509TOKEN
92#
93# binSecTokValType determines whether signingCert or signingCertChain
94# attributes will be used.
95reqBinSecTokValType=X509v3
96
97# Add a timestamp element to an outbound message
98addTimestamp=True
99
100# For WSSE 1.1 - service returns signature confirmation containing signature
101# value sent by client
102applySignatureConfirmation=False
103
104#
105# INBOUND MESSAGE CONFIG
106
107# Provide a space separated list of file paths
108caCertFilePathList=$NDGSEC_COMBINED_SRVS_UNITTEST_DIR/ca/ndg-test-ca.crt
Note: See TracBrowser for help on using the repository browser.