Changeset 3001
- Timestamp:
- 07/11/07 14:44:00 (13 years ago)
- Location:
- TI12-security/trunk/python
- Files:
-
- 6 edited
Legend:
- Unmodified
- Added
- Removed
-
TI12-security/trunk/python/README
r1701 r3001 1 NDG Security Post-Alpha Development Version1 NDG Security Beta Development Version 2 2 ___________________________________________ 3 3 -
TI12-security/trunk/python/ndg.security.common/ndg/security/common/CredWallet.py
r2961 r3001 734 734 """ 735 735 736 self.debug(\736 log.debug(\ 737 737 'CredWallet.getAATrustedHostInfo for role "%s" and service: "%s"' % \ 738 738 (userRole, aaURI or aaPropFilePath)) -
TI12-security/trunk/python/ndg.security.server/ndg/security/server/AttAuthority/__init__.py
r2961 r3001 766 766 # Information about trusted hosts 767 767 for elem in trustedElem: 768 769 roleElem = elem.findall('role')770 if not roleElem:771 raise AttAuthorityError("\"role\" tag not found in \"%s\"" % \772 self.__prop['mapConfigFile'])773 774 768 try: 775 769 trustedHost = elem.attrib.values()[0] … … 792 786 for k in self.__mapConfig['trustedHosts'][trustedHost]: 793 787 self.__mapConfig['trustedHosts'][trustedHost][k] = \ 794 elem.findtext(k) 795 796 # Role keyword value requires special parsing before assingment 797 self.__mapConfig['trustedHosts'][trustedHost]['role'] = \ 788 elem.findtext(k) 789 790 roleElem = elem.findall('role') 791 if roleElem: 792 # Role keyword value requires special parsing before 793 # assignment 794 self.__mapConfig['trustedHosts'][trustedHost]['role'] = \ 798 795 [dict(i.items()) for i in roleElem] 799 796 else: 797 # It's possible for trust relationships to not contain any 798 # role mapping. e.g. a site's login service trusting other 799 # sites login requests 800 self.__mapConfig['trustedHosts'][trustedHost]['role'] = [] 801 800 802 self.__localRole2RemoteRole[trustedHost] = {} 801 803 self.__remoteRole2LocalRole[trustedHost] = {} 802 804 803 805 for role in self.__mapConfig['trustedHosts'][trustedHost]['role']: 804 805 806 try: 806 807 localRole = role['local'] -
TI12-security/trunk/python/ndg.security.test/ndg/security/test/AttAuthority/AttAuthorityClientTest.py
r2931 r3001 320 320 signingCertChain = \ 321 321 self._getCertChainFromProxyCertFile(proxyCertFilePath) 322 else: 323 signingCertChain = None 322 324 323 325 setSignatureHandler = \ … … 335 337 caCertFilePathList=caCertFilePathList, 336 338 tracefile=sys.stderr) 337 339 import pdb;pdb.set_trace() 338 340 acFilePathList = \ 339 341 self.cfg['test8GetMappedAttCertStressTest']['userattcertfilepathlist'].split() -
TI12-security/trunk/python/ndg.security.test/ndg/security/test/AttAuthority/attAuthorityClientTest.cfg
r2900 r3001 113 113 # ValueType for BinarySecurityToken element of WSSE header. Specify 114 114 # 'X509PKIPathv1' for use with proxy certificates 115 #reqbinsectokvaltype = X509v3115 reqbinsectokvaltype = X509v3 116 116 #reqbinsectokvaltype = X509 117 reqbinsectokvaltype = X509PKIPathv1117 #reqbinsectokvaltype = X509PKIPathv1 118 118 119 119 # Test with proxy certificates or with standard certs. Comment out as 120 120 # appropriate 121 proxycertfilepath = ./proxy-cert.pem122 #clntcertfilepath = ./aa-cert.pem121 #proxycertfilepath = ./proxy-cert.pem 122 clntcertfilepath = ./aa-cert.pem 123 123 124 124 clntprikeypwd = -
TI12-security/trunk/python/ndg.security.test/ndg/security/test/SessionMgr/README
r2137 r3001 1 Unit tests for Certificate AuthorityWeb Service Client1 Unit tests for Session Manager Web Service Client 2 2 _________________________________________________ 3 3 4 Before running the tests start the Certificate Authorityweb service:4 Before running the tests start the Session Manager web service: 5 5 6 6 $ ./server.sh 7 7 8 Run the unit test script caClientTest.py from a separate terminal. 8 ... and the Attribute Authority test services in ../AttAuthority: 9 10 $ ./siteAServer.sh 11 12 and in a separate terminal: 13 14 $ ./siteBServer.sh 15 16 Run the unit test script SessionMgrClientTest.py from a separate terminal.
Note: See TracChangeset
for help on using the changeset viewer.