source: TI12-security/trunk/python/ndg.security.test/ndg/security/test/utils/attAuthorityProperties.xml @ 4136

Subversion URL: http://proj.badc.rl.ac.uk/svn/ndg/TI12-security/trunk/python/ndg.security.test/ndg/security/test/utils/attAuthorityProperties.xml@4136
Revision 4136, 2.5 KB checked in by cbyrom, 11 years ago (diff)

Extend test suite to exercise new functions available to config parser
utility class + add new test config files for use with the tests.

Line 
1<?xml version="1.0" encoding="utf-8"?>
2<AAprop>
3    <name>Site A</name>
4    <portNum>5000</portNum>
5    <useSSL></useSSL> <!-- leave blank to use http -->
6    <sslCertFile>$NDGSEC_AACLNT_UNITTEST_DIR/siteA-aa.crt</sslCertFile>
7    <sslKeyFile>$NDGSEC_AACLNT_UNITTEST_DIR/siteA-aa.key</sslKeyFile>
8    <sslKeyPwd></sslKeyPwd>
9    <!--
10    Directory containing CA cert.s to verify SSL peer cert against
11     - ignored if useSSL is blank
12    -->
13    <sslCACertDir>$NDGSEC_AACLNT_UNITTEST_DIR/ca</sslCACertDir>
14    <WS-Security>
15    <!--
16        WS-Security settings leave 'useSignatureHandler' blank for no signature
17        -->
18            <useSignatureHandler>Yes</useSignatureHandler> 
19        <certFile>$NDGSEC_AACLNT_UNITTEST_DIR/siteA-aa.crt</certFile>
20            <keyFile>$NDGSEC_AACLNT_UNITTEST_DIR/siteA-aa.key</keyFile>
21        <keyPwd></keyPwd>
22                <wssRefInclNS></wssRefInclNS>
23                <wssSignedInfoInclNS></wssSignedInfoInclNS>
24            <caCertFileList>
25            <caCertFile>$NDGSEC_AACLNT_UNITTEST_DIR/ca/ndg-test-ca.crt</caCertFile>
26                <caCertFile>$NDGSEC_AACLNT_UNITTEST_DIR/ca/cacert.pem</caCertFile>
27                <!--
28            To also trust certificates issued from your MyProxy CA, replace
29                "abcdef01.0" with the unique name for your CA certificate and uncomment
30                the following line:
31            <caCertFile>/etc/grid-security/certificates/abcdef01.0</caCertFile>
32                -->
33            </caCertFileList>
34            <!-- Set the value type of the server cert -->
35        <reqBinSecTokValType>X509v3</reqBinSecTokValType>
36            <!-- Set the response message header to include a SignatureConfirmation element -->
37            <applySignatureConfirmation>True</applySignatureConfirmation>
38            <!--
39        Set the certificate used to verify the signature of messages from the
40            client.  This can usually be left blank since the client is expected to
41        include the cert with the signature in the inbound SOAP message
42            -->
43        <clntCertFile></clntCertFile>   
44    </WS-Security>
45    <attCertLifetime>28800</attCertLifetime>
46    <attCertNotBeforeOff>0</attCertNotBeforeOff>
47    <attCertFileName>ac.xml</attCertFileName>
48    <attCertFileLogCnt>16</attCertFileLogCnt>
49    <mapConfigFile>$NDGSEC_AACLNT_UNITTEST_DIR/siteAMapConfig.xml</mapConfigFile>
50    <attCertDir>$NDGSEC_AACLNT_UNITTEST_DIR/attCertLog</attCertDir>
51    <dnSeparator>/</dnSeparator>
52    <userRolesModFilePath>$NDGSEC_AACLNT_UNITTEST_DIR</userRolesModFilePath>
53    <userRolesModName>siteAUserRoles</userRolesModName>
54    <userRolesClassName>TestUserRoles</userRolesClassName>
55    <userRolesPropFile></userRolesPropFile>
56</AAprop>
Note: See TracBrowser for help on using the repository browser.