Ignore:
Timestamp:
30/11/09 16:30:24 (11 years ago)
Author:
pjkersha
Message:

Re-issue 1.3.3 release:

  • uses SQLAlchemy test user database for authz_lite integration tests
  • important fix for ndg.security.common.saml_utils.bindings.AttributeQuerySOAPBinding: set 'nameFormat' attribute not 'format' for attributes in AttributeQuery?.
File:
1 edited

Legend:

Unmodified
Added
Removed
  • TI12-security/trunk/python/ndg_security_test/ndg/security/test/integration/authz_lite/securityservices.ini

    r6063 r6067  
    2828attributeQueryInterfaceEnvironKeyName = ndg.security.server.attributeauthority.attributeQueryInterface 
    2929 
     30dbConnectionString = sqlite:///%(testConfigDir)s/user.db 
    3031 
    3132[server:main] 
     
    245246 
    246247# Basic Authentication interface to demonstrate capabilities 
    247 openid.provider.authNInterface=ndg.security.server.wsgi.openid.provider.authninterface.basic.BasicAuthNInterface 
     248#openid.provider.authNInterface=ndg.security.server.wsgi.openid.provider.authninterface.basic.BasicAuthNInterface 
     249openid.provider.authNInterface=ndg.security.server.wsgi.openid.provider.authninterface.sqlalchemy_authn.SQLAlchemyAuthnInterface 
     250openid.provider.authN.connectionString=%(dbConnectionString)s 
     251openid.provider.authN.logonSqlQuery=select count(*) from users where username = '${username}' and md5password = '${password}' 
     252openid.provider.authN.username2UserIdentifierSqlQuery=select openid_identifier from users where username = '${username}' 
     253openid.provider.authN.isMD5EncodedPwd=True 
    248254 
    249255# user login details format is: 
     
    261267 
    262268# Attribute Exchange interface 
    263 openid.provider.axResponse.class=ndg.security.server.wsgi.openid.provider.axinterface.csv.CSVFileAXInterface 
    264 openid.provider.axResponse.csvFilePath=%(here)s/openidprovider/attributeexchange.csv 
     269#openid.provider.axResponse.class=ndg.security.server.wsgi.openid.provider.axinterface.csv.CSVFileAXInterface 
     270#openid.provider.axResponse.csvFilePath=%(here)s/openidprovider/attributeexchange.csv 
     271openid.provider.axResponse.class=ndg.security.server.wsgi.openid.provider.axinterface.sqlalchemy_ax.SQLAlchemyAXInterface 
     272openid.provider.axResponse.connectionString=%(dbConnectionString)s 
     273openid.provider.axResponse.sqlQuery = select firstname, lastname, emailaddress from users where username = '${username}' 
    265274openid.provider.axResponse.attributeNames=http://openid.net/schema/namePerson/first 
    266275    http://openid.net/schema/namePerson/last 
     
    311320# Settings for custom AttributeInterface derived class to get user roles for given  
    312321# user ID 
    313 attributeAuthority.attributeInterface.modFilePath: %(testConfigDir)s/attributeauthority/sitea 
    314 attributeAuthority.attributeInterface.modName: siteAUserRoles 
    315 attributeAuthority.attributeInterface.className: TestUserRoles 
     322#attributeAuthority.attributeInterface.modFilePath: %(testConfigDir)s/attributeauthority/sitea 
     323#attributeAuthority.attributeInterface.modName: siteAUserRoles 
     324#attributeAuthority.attributeInterface.className: TestUserRoles 
     325 
     326# SQLAlchemy Attribute Interface 
     327attributeAuthority.attributeInterface.connectionString: %(dbConnectionString)s 
     328attributeAuthority.attributeInterface.modName: ndg.security.server.attributeauthority 
     329attributeAuthority.attributeInterface.className: SQLAlchemyAttributeInterface 
     330attributeAuthority.attributeInterface.issuerName = /O=Site A/CN=Attribute Authority 
     331attributeAuthority.attributeInterface.samlSubjectSqlQuery = select count(*) from users where openid = '${userId}' 
     332attributeAuthority.attributeInterface.samlAttribute2SqlQuery.1 = "urn:esg:first:name" "select firstname from users where openid = '${userId}'" 
     333attributeAuthority.attributeInterface.samlAttribute2SqlQuery.lastName = "urn:esg:last:name" "select lastname from users where openid = '${userId}'" 
     334attributeAuthority.attributeInterface.samlAttribute2SqlQuery.emailAddress = "urn:esg:email:address" "select emailaddress from users where openid = '${userId}'" 
     335attributeAuthority.attributeInterface.samlAttribute2SqlQuery.4 = "urn:siteA:security:authz:1.0:attr" "select attributename from attributes where openid = '${userId}'" 
     336attributeAuthority.attributeInterface.samlValidRequestorDNs = /O=Site A/CN=Authorisation Service,/O=Site A/CN=Attribute Authority, 
     337                                                           /O=Site B/CN=Authorisation Service,  
     338                                                           /CN=test/O=NDG/OU=BADC 
    316339 
    317340# Config for XML signature of Attribute Certificate 
Note: See TracChangeset for help on using the changeset viewer.