Changeset 4384
- Timestamp:
- 29/10/08 11:21:26 (11 years ago)
- Location:
- TI12-security/trunk/python
- Files:
-
- 24 edited
Legend:
- Unmodified
- Added
- Removed
-
TI12-security/trunk/python/Tests/SessionMgrTest.py
r4279 r4384 5 5 6 6 7 class SessionM grTestCase(unittest.TestCase):7 class SessionManagerTestCase(unittest.TestCase): 8 8 9 9 def setUp(self): 10 10 """Nb. Credential Repository interface dynamic load is implict""" 11 11 self.propFilePath = './sessionMgrProperties.xml' 12 self.sessMgr = SessionM gr(propFilePath=self.propFilePath)12 self.sessMgr = SessionManager(propFilePath=self.propFilePath) 13 13 14 14 def tearDown(self): … … 17 17 def testExplicitReadPropAndLoadCredentialRepositoryInt(self): 18 18 '''Test for loading Credential Repository SEPARATE to __init__''' 19 sessMgr = SessionM gr()19 sessMgr = SessionManager() 20 20 sessMgr.readProperties(self.propFilePath) 21 21 sessMgr.loadCredentialRepositoryInterface() … … 25 25 self.sessMgr.auditCredentialRepository() 26 26 27 class SessionM grTestSuite(unittest.TestSuite):27 class SessionManagerTestSuite(unittest.TestSuite): 28 28 def __init__(self): 29 map = map(SessionM grTestCase,29 map = map(SessionManagerTestCase, 30 30 (testExplicitReadPropAndLoadCredentialRepositoryInt, 31 31 testCredentialRepositoryAudit) -
TI12-security/trunk/python/ndg.security.client/ndg/security/client/ndgSessionClient.py
r2909 r4384 330 330 # Initialise session client 331 331 try: 332 sessClnt = SessionM grClient(smWSDL=options.sessMgrURI,332 sessClnt = SessionManagerClient(smWSDL=options.sessMgrURI, 333 333 smCertFilePath=options.smCertFilePath, 334 334 clntCertFilePath=options.clntCertFilePath, -
TI12-security/trunk/python/ndg.security.client/ndg/security/client/ssoclient/ssoclient/controllers/logout.py
r3918 r4384 10 10 import base64 # decode the return to address 11 11 12 from ndg.security.common. SessionMgr import SessionMgrClient12 from ndg.security.common.sessionmanager import SessionManagerClient 13 13 14 14 … … 30 30 31 31 try: 32 smClnt = SessionM grClient(uri=session['ndgSec']['h'],32 smClnt = SessionManagerClient(uri=session['ndgSec']['h'], 33 33 tracefile=g.ndg.security.common.sso.cfg.tracefile, 34 34 **g.ndg.security.common.sso.cfg.wss) -
TI12-security/trunk/python/ndg.security.common/ndg/security/common/__init__.py
r4381 r4384 19 19 __all__ = [ 20 20 'authz', 21 ' AttAuthority',21 'attributeauthority', 22 22 'AttCert', 23 ' CredentialWallet',23 'credentialwallet', 24 24 'm2CryptoSSLUtility', 25 25 'openssl', 26 ' SessionMgr',26 'sessionmanager', 27 27 'utils', 28 28 'wssecurity', -
TI12-security/trunk/python/ndg.security.common/ndg/security/common/attributeauthority.py
r4381 r4384 32 32 from ZSI.wstools.Utility import HTTPResponse 33 33 34 from ndg.security.common.zsi.attributeauthority.AttAuthority_services import AttAuthorityServiceLocator 34 from ndg.security.common.zsi.attributeauthority.AttAuthority_services import \ 35 AttAuthorityServiceLocator 35 36 from ndg.security.common.wssecurity.dom import SignatureHandler 36 37 from ndg.security.common.AttCert import AttCert, AttCertParse 37 from ndg.security.common.m2CryptoSSLUtility import HTTPSConnection, \ 38 HostCheck 39 38 from ndg.security.common.m2CryptoSSLUtility import HTTPSConnection, HostCheck 40 39 from ndg.security.common.zsi.httpproxy import ProxyHTTPConnection 41 40 … … 293 292 294 293 if not self.__srv: 295 raise InvalidSessionM grClientCtx(\294 raise InvalidSessionManagerClientCtx(\ 296 295 "Client binding is not initialised") 297 296 … … 336 335 337 336 if not self.__srv: 338 raise InvalidSessionM grClientCtx(\337 raise InvalidSessionManagerClientCtx(\ 339 338 "Client binding is not initialised") 340 339 … … 381 380 382 381 if not self.__srv: 383 raise InvalidSessionM grClientCtx(\382 raise InvalidSessionManagerClientCtx(\ 384 383 "Client binding is not initialised") 385 384 … … 450 449 451 450 if not self.__srv: 452 raise InvalidSessionM grClientCtx(\451 raise InvalidSessionManagerClientCtx(\ 453 452 "Client binding is not initialised") 454 453 … … 485 484 486 485 if not self.__srv: 487 raise InvalidSessionM grClientCtx(\486 raise InvalidSessionManagerClientCtx(\ 488 487 "Client binding is not initialised") 489 488 -
TI12-security/trunk/python/ndg.security.common/ndg/security/common/authz/pdp/browse.py
r4067 r4384 31 31 PDPMissingUserHandleAttr 32 32 33 from ndg.security.common. SessionMgr import SessionMgrClient, SessionNotFound,\33 from ndg.security.common.sessionmanager import SessionManagerClient, SessionNotFound,\ 34 34 SessionCertTimeError, SessionExpired, InvalidSession, \ 35 35 AttributeRequestDenied … … 393 393 # are read from a separate config file section otherwise, from the 394 394 # PDP config object 395 self.smClnt = SessionM grClient(uri=self.smURI,395 self.smClnt = SessionManagerClient(uri=self.smURI, 396 396 sslCACertFilePathList=self.sslCACertFilePathList, 397 397 tracefile=self.tracefile, -
TI12-security/trunk/python/ndg.security.common/ndg/security/common/authz/pdp/proftp.py
r4285 r4384 29 29 PDPUserInsufficientPrivileges 30 30 31 from ndg.security.common. SessionMgr import SessionMgrClient, SessionNotFound,\31 from ndg.security.common.sessionmanager import SessionManagerClient, SessionNotFound,\ 32 32 SessionCertTimeError, SessionExpired, InvalidSession, \ 33 33 AttributeRequestDenied … … 290 290 try: 291 291 # Create Session Manager client 292 self.smClnt = SessionM grClient(uri=self.smURI,292 self.smClnt = SessionManagerClient(uri=self.smURI, 293 293 sslCACertFilePathList=self.sslCACertFilePathList, 294 294 tracefile=self.tracefile, -
TI12-security/trunk/python/ndg.security.common/ndg/security/common/myproxy.py
r4318 r4384 355 355 356 356 except Exception, e: 357 raise SessionM grError, \357 raise SessionManagerError, \ 358 358 "Error parsing tag \"%s\" in properties file" % elem.tag 359 359 -
TI12-security/trunk/python/ndg.security.common/ndg/security/common/sessionmanager.py
r4377 r4384 29 29 HostCheck 30 30 from ndg.security.common.zsi.httpproxy import ProxyHTTPConnection 31 from SessionMgr_services import SessionMgrServiceLocator 31 from ndg.security.common.zsi.sessionmanager.SessionMgr_services import \ 32 SessionMgrServiceLocator 32 33 33 34 import logging … … 35 36 36 37 37 #_____________________________________________________________________________ 38 class SessionMgrClientError(Exception): 39 """Exception handling for SessionMgrClient class""" 40 41 #_____________________________________________________________________________ 42 class SessionNotFound(SessionMgrClientError): 38 39 class SessionManagerClientError(Exception): 40 """Exception handling for SessionManagerClient class""" 41 42 class SessionNotFound(SessionManagerClientError): 43 43 """Raise when a session ID input doesn't match with an active session on 44 44 the Session Manager""" 45 45 46 #_____________________________________________________________________________ 47 class SessionCertTimeError(SessionMgrClientError): 46 class SessionCertTimeError(SessionManagerClientError): 48 47 """Session's X.509 Cert. not before time is BEFORE the system time - 49 48 usually caused by server's clocks being out of sync. Fix by all servers 50 49 running NTP""" 51 50 52 #_____________________________________________________________________________ 53 class SessionExpired(SessionMgrClientError): 51 class SessionExpired(SessionManagerClientError): 54 52 """Session's X.509 Cert. has expired""" 55 53 56 #_____________________________________________________________________________ 57 class InvalidSession(SessionMgrClientError): 54 class InvalidSession(SessionManagerClientError): 58 55 """Session is invalid""" 59 56 60 #_____________________________________________________________________________ 61 class InvalidAttributeAuthorityClientCtx(SessionMgrClientError): 57 class InvalidAttributeAuthorityClientCtx(SessionManagerClientError): 62 58 """Attribute Authority ZSI Client is not initialised""" 63 59 64 #_____________________________________________________________________________ 65 class AttributeRequestDenied(SessionMgrClientError): 60 class AttributeRequestDenied(SessionManagerClientError): 66 61 """Raise when a getAttCert call to the Attribute Authority is denied""" 67 62 … … 83 78 ac = AttCertParse(ac) 84 79 elif not isinstance(ac, AttCert): 85 raise SessionM grClientError, \80 raise SessionManagerClientError, \ 86 81 "Input external Attribute Cert. must be AttCert type" 87 82 … … 105 100 "from the target Attribute Authority") 106 101 107 #_____________________________________________________________________________ 108 class SessionM grClient(object):102 103 class SessionManagerClient(object): 109 104 """Client interface to Session Manager Web Service 110 105 … … 161 156 @param signatureHandlerKw: keywords to configure signature handler""" 162 157 163 log.debug("SessionM grClient.__init__ ...")158 log.debug("SessionManagerClient.__init__ ...") 164 159 165 160 self.__srv = None … … 205 200 206 201 if not isinstance(uri, basestring): 207 raise SessionM grClientError(202 raise SessionManagerClientError( 208 203 "Session Manager URI must be a valid string") 209 204 … … 353 348 transdict=self._transdict) 354 349 except HTTPResponse, e: 355 raise SessionM grClientError, \350 raise SessionManagerClientError, \ 356 351 "Initialising Service for \"%s\": %s %s" % \ 357 352 (self.__uri, e.status, e.reason) … … 377 372 378 373 @type createServerSess: bool 379 @param createServerSess: If set to True, the SessionM gr will create374 @param createServerSess: If set to True, the SessionManager will create 380 375 and manage a session for the user. For non-browser client case, it's 381 376 possible to choose to have a client or server side session using this … … 396 391 397 392 except Exception, e: 398 raise SessionM grClientError, "Pass-phrase not defined: " + \393 raise SessionManagerClientError, "Pass-phrase not defined: " + \ 399 394 str(e) 400 395 … … 453 448 454 449 if sessID and userDN: 455 raise SessionM grClientError(450 raise SessionManagerClientError( 456 451 'Only "SessID" or "userDN" keywords may be set') 457 452 458 453 if not sessID and not userDN: 459 raise SessionM grClientError(454 raise SessionManagerClientError( 460 455 'A "SessID" or "userDN" keyword must be set') 461 456 -
TI12-security/trunk/python/ndg.security.server/ndg/security/server/authnservice/__init__.py
r4157 r4384 1 1 """ 2 2 Include authentication service directory into distribution - contains 3 various implementations of the authentication service used by SessionM gr3 various implementations of the authentication service used by SessionManager 4 4 5 5 NERC Data Grid Project -
TI12-security/trunk/python/ndg.security.server/ndg/security/server/authnservice/basicauthn.py
r4369 r4384 1 1 """ 2 Basic Authentication interface - extending the SessionM gr AbstractAuthNService3 interface - to allow use with SessionM gr2 Basic Authentication interface - extending the SessionManager AbstractAuthNService 3 interface - to allow use with SessionManager 4 4 5 5 NERC Data Grid Project … … 17 17 import hashlib 18 18 19 from ndg.security.server.sessionmanager import SessionM gr, \19 from ndg.security.server.sessionmanager import SessionManager, \ 20 20 AbstractAuthNService, AuthNServiceInvalidCredentials, AuthNServiceError 21 21 from ndg.security.common.myproxy import MyProxyClient -
TI12-security/trunk/python/ndg.security.server/ndg/security/server/authnservice/myproxyauthn.py
r4369 r4384 1 1 """ 2 MyProxy Client interface - extending the SessionM gr AbstractAuthNService3 interface - to allow use with SessionM gr2 MyProxy Client interface - extending the SessionManager AbstractAuthNService 3 interface - to allow use with SessionManager 4 4 5 5 NERC Data Grid Project -
TI12-security/trunk/python/ndg.security.server/ndg/security/server/initCredReposDb.py
r4279 r4384 67 67 dbURI = "mysql://%s:%s@%s/%s" % \ 68 68 (opt.username, password, opt.hostname, opt.dbName) 69 credentialRepository = SessionM grCredentialRepository(dbURI=dbURI)69 credentialRepository = SessionManagerCredentialRepository(dbURI=dbURI) 70 70 except Exception, e: 71 71 sys.stderr.write("%s\n" % str(e)) -
TI12-security/trunk/python/ndg.security.server/ndg/security/server/sessionmanager.py
r4381 r4384 1 1 """NDG Security server side session management and security includes 2 UserSession and SessionM gr classes.2 UserSession and SessionManager classes. 3 3 4 4 NERC Data Grid Project … … 37 37 38 38 # Credential Wallet 39 from ndg.security.common.credentialwallet import CredentialWallet, CredentialRepository, \ 40 CredentialWalletError, CredentialWalletAttributeRequestDenied 39 from ndg.security.common.credentialwallet import CredentialWallet, \ 40 CredentialRepository, CredentialWalletError, \ 41 CredentialWalletAttributeRequestDenied 41 42 42 43 from ndg.security.common.wssecurity import WSSecurityConfig … … 46 47 # Use client package to allow redirection of authorisation requests and 47 48 # to retrieve Attribute Authority public key 48 from ndg.security.common. SessionMgr import SessionMgrClient49 from ndg.security.common.sessionmanager import SessionManagerClient 49 50 50 51 # generic parser to read INI/XML properties file … … 190 191 191 192 except Exception, e: 192 raise SessionM grError("Decoding text: %s" % e)193 raise SessionManagerError("Decoding text: %s" % e) 193 194 if encrKey is not None: 194 195 try: … … 199 200 200 201 except Exception, e: 201 raise SessionM grError("Decrypting Session Manager URI: %s" % e)202 raise SessionManagerError("Decrypting Session Manager URI: %s" % e) 202 203 else: 203 204 return b64DecodedEncrTxt 204 205 205 class SessionM grError(_SessionException):206 class SessionManagerError(_SessionException): 206 207 """Exception handling for NDG Session Manager class.""" 207 208 208 class SessionNotFound(SessionM grError):209 """Raise from SessionM gr._connect2UserSession when session ID is not209 class SessionNotFound(SessionManagerError): 210 """Raise from SessionManager._connect2UserSession when session ID is not 210 211 found in the Session dictionary""" 211 212 212 213 213 class SessionM gr(dict):214 class SessionManager(dict): 214 215 """NDG authentication and session handling 215 216 … … 552 553 readPropertiesFile = INIPropertyFileWithValidation() 553 554 fileProp = readPropertiesFile(self.propFilePath, 554 validKeys=SessionM gr.propertyDefaults,555 validKeys=SessionManager.propertyDefaults, 555 556 prefix=prefix, 556 557 sections=(section,)) … … 577 578 Check input keys are valid names""" 578 579 579 log.debug("Calling SessionM gr.setProperties with kw = %s" % prop)580 log.debug("Calling SessionManager.setProperties with kw = %s" % prop) 580 581 581 582 for key in prop.keys(): 582 583 if key not in self.propertyDefaults: 583 raise SessionM grError("Property name \"%s\" is invalid" % key)584 raise SessionManagerError("Property name \"%s\" is invalid" % key) 584 585 for key, value in prop.items(): 585 586 … … 598 599 self.__prop[key] = value 599 600 else: 600 raise SessionM grError('Key "%s" is not a valid Session '601 raise SessionManagerError('Key "%s" is not a valid Session ' 601 602 'Manager property' % key) 602 603 … … 612 613 @return: True if session is active, False if no session found""" 613 614 614 log.debug("Calling SessionM gr.getSessionStatus ...")615 log.debug("Calling SessionManager.getSessionStatus ...") 615 616 616 617 # Look for a session corresponding to this ID 617 618 if sessID and userDN: 618 raise SessionM grError('Only "SessID" or "userDN" keywords may be '619 raise SessionManagerError('Only "SessID" or "userDN" keywords may be ' 619 620 'set') 620 621 elif sessID: … … 659 660 660 661 @type createUserSess: bool 661 @param createServerSess: If set to True, the SessionM gr will create662 @param createServerSess: If set to True, the SessionManager will create 662 663 and manage a session for the user. For command line case, it's 663 664 possible to choose to have a client or server side session using this … … 684 685 """ 685 686 686 log.debug("Calling SessionM gr.connect ...")687 log.debug("Calling SessionManager.connect ...") 687 688 688 689 # Initialise proxy cert to be returned … … 758 759 services where required""" 759 760 760 log.debug("Calling SessionM gr._createUserSession ...")761 log.debug("Calling SessionManager._createUserSession ...") 761 762 762 763 # Check for an existing session for the same user … … 814 815 # Check for unique session ID 815 816 if newSessID in self.__sessDict: 816 raise SessionM grError("New Session ID is already in use:\n\n %s" %817 raise SessionManagerError("New Session ID is already in use:\n\n %s" % 817 818 newSessID) 818 819 … … 841 842 an existing session.""" 842 843 843 log.debug("Calling SessionM gr._connect2UserSession ...")844 log.debug("Calling SessionManager._connect2UserSession ...") 844 845 845 846 # Look for a session corresponding to this ID … … 896 897 userDN)) 897 898 else: 898 raise SessionM grError('"username", "sessID" or "userX509Cert" keywords '899 raise SessionManagerError('"username", "sessID" or "userX509Cert" keywords ' 899 900 'must be set') 900 901 … … 937 938 """ 938 939 939 log.debug("Calling SessionM gr.deleteUserSession ...")940 log.debug("Calling SessionManager.deleteUserSession ...") 940 941 941 942 # Look for a session corresponding to the session ID/proxy cert. … … 945 946 946 947 except KeyError: 947 raise SessionM grError(948 raise SessionManagerError( 948 949 "Deleting user session - no matching session ID exists") 949 950 … … 956 957 957 958 except Exception, e: 958 raise SessionM grError(959 raise SessionManagerError( 959 960 "Parsing input proxy certificate DN for session connect: %s"%\ 960 961 str(e)) … … 964 965 except KeyError: 965 966 # User session not found with given proxy cert 966 raise SessionM grError(967 raise SessionManagerError( 967 968 "No user session found matching input proxy certificate") 968 969 … … 971 972 else: 972 973 # User session not found with given ID 973 raise SessionM grError('"sessID", "userCert" or "userSess" '974 raise SessionManagerError('"sessID", "userCert" or "userSess" ' 974 975 'keywords must be set') 975 976 … … 986 987 987 988 except Exception, e: 988 raise SessionM grError("Deleting user session: %s" % e)989 raise SessionManagerError("Deleting user session: %s" % e) 989 990 990 991 log.info("Deleted user session: user DN = %s, sessID = %s" % … … 1017 1018 """ 1018 1019 1019 log.debug("Calling SessionM gr.getAttCert ...")1020 log.debug("Calling SessionManager.getAttCert ...") 1020 1021 1021 1022 # Retrieve session corresponding to user's session ID using relevant … … 1039 1040 """Remove expired Attribute Certificates from the Credential 1040 1041 Repository""" 1041 log.debug("Calling SessionM gr.auditCredentialRepository ...")1042 log.debug("Calling SessionManager.auditCredentialRepository ...") 1042 1043 self._credentialRepository.auditCredentials() 1043 1044 … … 1086 1087 """ 1087 1088 An abstract base class to define the authentication service interface for 1088 use with a SessionM gr service1089 use with a SessionManager service 1089 1090 """ 1090 1091 -
TI12-security/trunk/python/ndg.security.server/ndg/security/server/sso/sso/controllers/login.py
r4377 r4384 7 7 SecuritySession, SSOServiceQuery 8 8 from ndg.security.common.attributeauthority import AttributeAuthorityClient 9 from ndg.security.common. SessionMgr import SessionMgrClient, SessionExpired, \9 from ndg.security.common.sessionmanager import SessionManagerClient, SessionExpired, \ 10 10 AttributeRequestDenied 11 11 from ndg.security.common.m2CryptoSSLUtility import HTTPSConnection, \ … … 40 40 # Session is set in this domain - check it 41 41 try: 42 smClnt = SessionM grClient(uri=session['ndgSec']['h'],42 smClnt = SessionManagerClient(uri=session['ndgSec']['h'], 43 43 tracefile=self.cfg.tracefile, 44 44 httpProxyHost=self.cfg.httpProxyHost, … … 50 50 c.xml='Error establishing security context. Please report ' + \ 51 51 'the error to your site administrator' 52 log.error("Initialising SessionM grClient for " + \52 log.error("Initialising SessionManagerClient for " + \ 53 53 "getSessionStatus call: %s" % e) 54 54 SecuritySession.delete() … … 92 92 93 93 try: 94 smClnt = SessionM grClient(uri=self.cfg.smURI,94 smClnt = SessionManagerClient(uri=self.cfg.smURI, 95 95 tracefile=self.cfg.tracefile, 96 96 httpProxyHost=self.cfg.httpProxyHost, … … 104 104 c.xml='Error establishing security context. Please report ' + \ 105 105 'the error to your site administrator' 106 log.error("Login: initialising SessionM grClient: %s" % e)106 log.error("Login: initialising SessionManagerClient: %s" % e) 107 107 response.status_code = 400 108 108 return render('ndg.security.kid', 'ndg.security.login') -
TI12-security/trunk/python/ndg.security.server/ndg/security/server/sso/sso/controllers/logout.py
r3918 r4384 8 8 from urlparse import urlsplit, urlunsplit 9 9 10 from ndg.security.common. SessionMgr import SessionMgrClient10 from ndg.security.common.sessionmanager import SessionManagerClient 11 11 12 12 … … 31 31 32 32 try: 33 smClnt = SessionM grClient(uri=session['ndgSec']['h'],33 smClnt = SessionManagerClient(uri=session['ndgSec']['h'], 34 34 tracefile=cfg.tracefile, 35 35 **cfg.wss) -
TI12-security/trunk/python/ndg.security.server/ndg/security/server/zsi/sessionmanager/__init__.py
r4369 r4384 19 19 import SessionMgrService as _SessionMgrService 20 20 21 from ndg.security.server.sessionmanager import SessionM gr21 from ndg.security.server.sessionmanager import SessionManager 22 22 23 23 from ndg.security.common.wssecurity.dom import SignatureHandler … … 39 39 # Initialise Attribute Authority class - property file will be 40 40 # picked up from default location under $NDG_DIR directory 41 self.sm = SessionM gr(**kw)41 self.sm = SessionManager(**kw) 42 42 43 43 -
TI12-security/trunk/python/ndg.security.server/ndg/security/server/zsi/twisted/sessionmanager/SessionMgr_services_server.py
r4363 r4384 5 5 ################################################## 6 6 7 from ndg.security.common. SessionMgr.SessionMgr_services import *7 from ndg.security.common.sessionmanager.SessionMgr_services import * 8 8 from ZSI.ServiceContainer import ServiceSOAPBinding 9 9 -
TI12-security/trunk/python/ndg.security.server/ndg/security/server/zsi/twisted/sessionmanager/sessionMgr.tac
r4369 r4384 41 41 from ndg.security.server.zsi.twisted.sessionmanager.SessionMgr_services_server\ 42 42 import SessionMgrService as _SessionMgrService 43 from ndg.security.server.sessionmanager import SessionM gr43 from ndg.security.server.sessionmanager import SessionManager 44 44 from ndg.security.common.wssecurity.dom import SignatureHandler 45 45 from ndg.security.server.zsi.twisted import WSSecurityHandler, \ … … 50 50 51 51 52 class SessionM grService(_SessionMgrService, WSResource):52 class SessionManagerService(_SessionMgrService, WSResource): 53 53 54 54 # Add WS-Security handlers … … 72 72 73 73 WSResource.__init__(self) 74 self.sm = SessionM gr()74 self.sm = SessionManager() 75 75 76 76 … … 211 211 212 212 # Create Service 213 srv = SessionM grService()213 srv = SessionManagerService() 214 214 215 215 if srv.sm.has_key('WS-Security'): -
TI12-security/trunk/python/ndg.security.test/ndg/security/test/authnservice/__init__.py
r4158 r4384 1 1 """ 2 2 Include authentication service directory into distribution - contains 3 various test implementations of the authentication service used by SessionM gr3 various test implementations of the authentication service used by SessionManager 4 4 5 5 NERC Data Grid Project -
TI12-security/trunk/python/ndg.security.test/ndg/security/test/authnservice/test_authnservice.py
r4369 r4384 22 22 """ 23 23 A simple test proxy client with the methods stubbed out to allow 24 for use in testing SessionM gr24 for use in testing SessionManager 25 25 - NB, the stubbed out methods here are overkill in terms of the 26 26 AbstractAuthNService interface - they are included to dummy out the MyProxy -
TI12-security/trunk/python/ndg.security.test/ndg/security/test/sessionmanager/test_sessionmanager.py
r4382 r4384 33 33 34 34 35 class SessionM grTestCase(unittest.TestCase):36 """Unit test case for ndg.security.server.sessionmanager.SessionM gr class.35 class SessionManagerTestCase(unittest.TestCase): 36 """Unit test case for ndg.security.server.sessionmanager.SessionManager class. 37 37 38 38 This class manages server side sessions""" … … 59 59 # Omit traceFile keyword to leave out SOAP debug info 60 60 self.propFilePath = xpdVars(self.cfg.get('setUp', 'propFilePath')) 61 self.sm = SessionM gr(propFilePath=self.propFilePath)61 self.sm = SessionManager(propFilePath=self.propFilePath) 62 62 63 63 def _sessionMgrConnect(self): … … 65 65 print "Connecting to session manager..." 66 66 username = self.cfg.get('test1Connect', 'username') 67 if SessionM grTestCase.test1Passphrase is None and \67 if SessionManagerTestCase.test1Passphrase is None and \ 68 68 self.cfg.has_option('test1Connect', 'passphrase'): 69 SessionM grTestCase.test1Passphrase = self.cfg.get('test1Connect',69 SessionManagerTestCase.test1Passphrase = self.cfg.get('test1Connect', 70 70 'passphrase') 71 71 72 if not SessionM grTestCase.test1Passphrase:73 SessionM grTestCase.test1Passphrase = getpass.getpass(\72 if not SessionManagerTestCase.test1Passphrase: 73 SessionManagerTestCase.test1Passphrase = getpass.getpass(\ 74 74 prompt="\ntest1Connect pass-phrase for user %s: " % username) 75 75 … … 77 77 userCert, self.userPriKey, self.issuingCert, self.sessID = \ 78 78 self.sm.connect(username=username, 79 passphrase=SessionM grTestCase.test1Passphrase)79 passphrase=SessionManagerTestCase.test1Passphrase) 80 80 self.userCert = X509CertParse(userCert) 81 81 … … 92 92 93 93 username = self.cfg.get('test1Connect', 'username') 94 if SessionM grTestCase.test1Passphrase is None and \94 if SessionManagerTestCase.test1Passphrase is None and \ 95 95 self.cfg.has_option('test1Connect', 'passphrase'): 96 SessionM grTestCase.test1Passphrase = self.cfg.get('test1Connect',96 SessionManagerTestCase.test1Passphrase = self.cfg.get('test1Connect', 97 97 'passphrase') 98 98 99 if not SessionM grTestCase.test1Passphrase:100 SessionM grTestCase.test1Passphrase = getpass.getpass(99 if not SessionManagerTestCase.test1Passphrase: 100 SessionManagerTestCase.test1Passphrase = getpass.getpass( 101 101 prompt="\ntest1Connect pass-phrase for user %s: " % username) 102 102 … … 104 104 userCert, userPriKey, issuingCert, sessID = self.sm.connect( 105 105 username=username, 106 passphrase=SessionM grTestCase.test1Passphrase)106 passphrase=SessionManagerTestCase.test1Passphrase) 107 107 assert(userCert is None) 108 108 assert(userPriKey is None) … … 115 115 116 116 username = self.cfg.get('test1Connect', 'username') 117 if SessionM grTestCase.test1Passphrase is None and \117 if SessionManagerTestCase.test1Passphrase is None and \ 118 118 self.cfg.has_option('test1Connect', 'passphrase'): 119 SessionM grTestCase.test1Passphrase = self.cfg.get('test1Connect',119 SessionManagerTestCase.test1Passphrase = self.cfg.get('test1Connect', 120 120 'passphrase') 121 121 122 if not SessionM grTestCase.test1Passphrase:123 SessionM grTestCase.test1Passphrase = getpass.getpass(122 if not SessionManagerTestCase.test1Passphrase: 123 SessionManagerTestCase.test1Passphrase = getpass.getpass( 124 124 prompt="\ntest1Connect pass-phrase for user %s: " % username) 125 125 … … 127 127 userCert, self.userPriKey, self.issuingCert, self.sessID = \ 128 128 self.sm.connect(username=username, 129 passphrase=SessionM grTestCase.test1Passphrase)129 passphrase=SessionManagerTestCase.test1Passphrase) 130 130 self.userCert = X509CertParse(userCert) 131 131 … … 156 156 username = self.cfg.get(section, 'username') 157 157 158 if SessionM grTestCase.test3Passphrase is None and \158 if SessionManagerTestCase.test3Passphrase is None and \ 159 159 self.cfg.has_option(section, passphrase): 160 SessionM grTestCase.test3Passphrase = self.cfg.get(section,160 SessionManagerTestCase.test3Passphrase = self.cfg.get(section, 161 161 'passphrase') 162 162 163 if not SessionM grTestCase.test3Passphrase:164 SessionM grTestCase.test3Passphrase = getpass.getpass(prompt=\163 if not SessionManagerTestCase.test3Passphrase: 164 SessionManagerTestCase.test3Passphrase = getpass.getpass(prompt=\ 165 165 "\ntest3ConnectNoCreateServerSess " 166 166 "pass-phrase for user %s: " % … … 169 169 self.userCert, self.userPriKey, self.issuingCert, sessID = \ 170 170 self.sm.connect(username=username, 171 passphrase=SessionM grTestCase.test3Passphrase,171 passphrase=SessionManagerTestCase.test3Passphrase, 172 172 createServerSess=False) 173 173 … … 302 302 303 303 #_____________________________________________________________________________ 304 class SessionM grTestSuite(unittest.TestSuite):304 class SessionManagerTestSuite(unittest.TestSuite): 305 305 306 306 def __init__(self): 307 print "SessionM grTestSuite ..."308 smTestCaseMap = map(SessionM grTestCase,307 print "SessionManagerTestSuite ..." 308 smTestCaseMap = map(SessionManagerTestCase, 309 309 ( 310 310 "test1Connect", … … 322 322 323 323 if __name__ == "__main__": 324 # suite = SessionM grTestSuite()324 # suite = SessionManagerTestSuite() 325 325 # unittest.TextTestRunner(verbosity=2).run(suite) 326 326 unittest.main() -
TI12-security/trunk/python/ndg.security.test/ndg/security/test/sessionmgrclient/SessionMgrClientTest.py
r4129 r4384 19 19 from ConfigParser import SafeConfigParser 20 20 21 from ndg.security.common. SessionMgr import SessionMgrClient, \21 from ndg.security.common.sessionmanager import SessionManagerClient, \ 22 22 AttributeRequestDenied 23 23 … … 30 30 31 31 32 class SessionM grClientTestCase(unittest.TestCase):32 class SessionManagerClientTestCase(unittest.TestCase): 33 33 pemPat = "-----BEGIN CERTIFICATE-----[^\-]*-----END CERTIFICATE-----" 34 34 … … 126 126 # Initialise the Session Manager client connection 127 127 # Omit traceFile keyword to leave out SOAP debug info 128 self.clnt = SessionM grClient(uri=self.cfg['setUp']['smuri'],128 self.clnt = SessionManagerClient(uri=self.cfg['setUp']['smuri'], 129 129 sslCACertList=sslCACertList, 130 130 sslPeerCertCN=self.cfg['setUp'].get('sslpeercertcn'), … … 365 365 366 366 #_____________________________________________________________________________ 367 class SessionM grClientTestSuite(unittest.TestSuite):367 class SessionManagerClientTestSuite(unittest.TestSuite): 368 368 369 369 def __init__(self): 370 map = map(SessionM grClientTestCase,370 map = map(SessionManagerClientTestCase, 371 371 ( 372 372 "test1Connect", -
TI12-security/trunk/python/ndg.security.test/ndg/security/test/utils/testConfigFileParsers.py
r4377 r4384 8 8 from ndg.security.common.utils.ConfigFileParsers import readProperties, readAndValidateProperties 9 9 from ndg.security.server.attributeauthority import AttributeAuthority 10 from ndg.security.server.sessionmanager import SessionM gr10 from ndg.security.server.sessionmanager import SessionManager 11 11 from ConfigParser import MissingSectionHeaderError 12 12 … … 110 110 111 111 112 def testSessionM grINIInput(self):112 def testSessionManagerINIInput(self): 113 113 114 cfg = readProperties(self.SESSION_MGR_INI_FILE, validKeys=SessionM gr._SessionMgr__validElem)114 cfg = readProperties(self.SESSION_MGR_INI_FILE, validKeys=SessionManager._SessionManager__validElem) 115 115 # do some basic checks of what is returned 116 116 self.assertNotEqual(cfg, None) … … 122 122 123 123 124 def testSessionM grXMLInput(self):124 def testSessionManagerXMLInput(self): 125 125 126 cfg = readProperties(self.SESSION_MGR_XML_FILE, validKeys=SessionM gr._SessionMgr__validElem)126 cfg = readProperties(self.SESSION_MGR_XML_FILE, validKeys=SessionManager._SessionManager__validElem) 127 127 # do some basic checks of what is returned 128 128 self.assertNotEqual(cfg, None)
Note: See TracChangeset
for help on using the changeset viewer.