Ignore:
Timestamp:
05/02/07 12:27:49 (13 years ago)
Author:
pjkersha
Message:

python/www/html/sessionMgr.wsdl,
python/ndg.security.server/ndg/security/server/SessionMgr/SessionMgr_services_server.py,
python/ndg.security.common/ndg/security/common/SessionMgr/SessionMgr_services.py,
python/www/html/attAuthority.wsdl,
python/ndg.security.server/ndg/security/server/AttAuthority/AttAuthority_services_server.py,
python/ndg.security.common/ndg/security/common/AttAuthority/AttAuthority_services.py:
Fixes for WebSphere? WSDL check - added targetNamespace attribute to xsd:schema element,
added 'wsdl' prefix to operation, part and message elements.

File:
1 edited

Legend:

Unmodified
Added
Removed
  • TI12-security/trunk/python/ndg.security.common/ndg/security/common/wsSecurity.py

    r2092 r2107  
    668668                self.__setVerifyingCert(b64EncX509Cert) 
    669669            except Exception, e: 
    670                 raise VerifyError, "Error extracting BinarySecurityToken " + \ 
    671                                    "from WSSE header: " + str(e) 
    672          
     670                # Ignore exception for now to allow for problems with  
     671                # WebSphere client setting X.509 cert 
     672                # 
     673                # P J Kershaw 05/02/07 
     674                pass                  
     675#                raise VerifyError, "Error extracting BinarySecurityToken " + \ 
     676#                                   "from WSSE header: " + str(e) 
     677 
    673678        if self.__verifyingCert is None: 
    674679            raise VerifyError, "No certificate set for verification " + \ 
    675680                "of the signature" 
    676681         
    677         import pdb;pdb.set_trace() 
    678682        # Extract RSA public key from the cert 
    679683        rsaPubKey = self.__verifyingCert.m2CryptoX509.get_pubkey().get_rsa() 
Note: See TracChangeset for help on using the changeset viewer.