Changeset 4140
- Timestamp:
- 27/08/08 16:12:07 (12 years ago)
- Location:
- TI12-security/trunk/python/ndg.security.test/ndg/security/test
- Files:
-
- 7 edited
Legend:
- Unmodified
- Added
- Removed
-
TI12-security/trunk/python/ndg.security.test/ndg/security/test/XMLSecDoc/xmlSecDocTest.py
r4138 r4140 89 89 self.xmlSecDoc.filePath = xpdVars(self.cfg['test2Sign']['filepath']) 90 90 self.xmlSecDoc.certFilePathList = \ 91 xpdVars(self.cfg['test2Sign']['signing CertFilePath'])91 xpdVars(self.cfg['test2Sign']['signingcertfilepath']) 92 92 self.xmlSecDoc.signingKeyFilePath = \ 93 xpdVars(self.cfg['test2Sign'][' keyfile'])93 xpdVars(self.cfg['test2Sign']['signingprikeyfilepath']) 94 94 95 keyPwd = self.cfg['test2Sign'].get('signing PriKeyPwd')95 keyPwd = self.cfg['test2Sign'].get('signingprikeypwd') 96 96 if keyPwd is None: 97 97 self.xmlSecDoc.signingKeyPwd = \ -
TI12-security/trunk/python/ndg.security.test/ndg/security/test/attAuthority/siteAServer.py
r3189 r4140 22 22 from twisted.python.runtime import platformType 23 23 if platformType == "win32": 24 from twisted.scripts._twistw import run 24 from twisted.scripts.twistd import run 25 #from twisted.scripts._twistw import run 25 26 else: 26 27 from twisted.scripts.twistd import run … … 35 36 os.environ['NDGSEC_AA_PROPFILEPATH'] = \ 36 37 os.path.join(os.environ['NDGSEC_AACLNT_UNITTEST_DIR'], 38 # "siteAAttAuthority.cfg") 37 39 "siteAAttAuthorityProperties.xml") 38 40 39 41 if 'NDGSEC_DIR' in os.environ: 40 42 tacFilePath=os.path.join(os.environ['NDGSEC_DIR'], … … 47 49 tacFilePath = os.path.join(eggConfigDir, "attAuthority.tac") 48 50 49 sys.argv += ["--pidfile=twistd-%d.pid" % os.getpid(), "-noy", tacFilePath] 51 # NB, pid not required on windows - this just causes an error to be thrown 52 if platformType != "win32": 53 sys.argv += ["--pidfile=twistd-%d.pid" % os.getpid()] 54 sys.argv += ["-noy", tacFilePath] 55 print "Running: %s" %sys.argv 50 56 run() -
TI12-security/trunk/python/ndg.security.test/ndg/security/test/attAuthority/siteBServer.py
r3189 r4140 22 22 from twisted.python.runtime import platformType 23 23 if platformType == "win32": 24 from twisted.scripts._twistw import run 24 from twisted.scripts.twistd import run 25 #from twisted.scripts._twistw import run 25 26 else: 26 27 from twisted.scripts.twistd import run … … 47 48 tacFilePath = os.path.join(eggConfigDir, "attAuthority.tac") 48 49 49 sys.argv += ["--pidfile=twistd-%d.pid" % os.getpid(), "-noy", tacFilePath] 50 # NB, pid not required on windows - this just causes an error to be thrown 51 if platformType != "win32": 52 sys.argv += ["--pidfile=twistd-%d.pid" % os.getpid()] 53 sys.argv += ["-noy", tacFilePath] 50 54 run() -
TI12-security/trunk/python/ndg.security.test/ndg/security/test/attCert/AttCertTest.py
r4138 r4140 188 188 self.attCert.filePath = xpdVars(self.cfg['test9Sign']['filepath']) 189 189 self.attCert.certFilePathList = \ 190 xpdVars(self.cfg['test9Sign']['signing CertFilePath'])190 xpdVars(self.cfg['test9Sign']['signingcertfilepath']) 191 191 self.attCert.signingKeyFilePath = \ 192 xpdVars(self.cfg['test9Sign']['signing PriKeyFilePath'])193 194 signingKeyPwd = self.cfg['test9Sign'].get('signing PriKeyPwd')192 xpdVars(self.cfg['test9Sign']['signingprikeyfilepath']) 193 194 signingKeyPwd = self.cfg['test9Sign'].get('signingprikeypwd') 195 195 if signingKeyPwd is None: 196 196 try: … … 241 241 self.cfg['test13IsValidStressTest']['certfilepathlist'].split()] 242 242 self.attCert.signingKeyFilePath = \ 243 xpdVars(self.cfg['test13IsValidStressTest']['signing PriKeyFilePath'])244 245 signingKeyPwd = self.cfg['test13IsValidStressTest'].get('signing PriKeyPwd')243 xpdVars(self.cfg['test13IsValidStressTest']['signingprikeyfilepath']) 244 245 signingKeyPwd = self.cfg['test13IsValidStressTest'].get('signingprikeypwd') 246 246 if signingKeyPwd is None: 247 247 try: -
TI12-security/trunk/python/ndg.security.test/ndg/security/test/myProxy/MyProxyClientTest.py
r4138 r4140 64 64 prompt="\ntest1Store cred. owner pass-phrase: ") 65 65 66 certFile = xpdVars(self.cfg['test1Store']['signing CertFilePath'])67 keyFile = xpdVars(self.cfg['test1Store']['signing PriKeyFilePath'])66 certFile = xpdVars(self.cfg['test1Store']['signingcertfilepath']) 67 keyFile = xpdVars(self.cfg['test1Store']['signingprikeyfilepath']) 68 68 ownerCertFile = xpdVars(self.cfg['test1Store']['ownercertfile']) 69 69 ownerKeyFile = xpdVars(self.cfg['test1Store']['ownerkeyfile']) -
TI12-security/trunk/python/ndg.security.test/ndg/security/test/sessionCookie/SessionCookieTest.py
r3192 r4140 52 52 try: 53 53 self.__class__.priKeyPwd = configParser.get('setUp', 54 'pri KeyPwd')54 'prikeypwd') 55 55 except NoOptionError: 56 56 try: … … 60 60 raise SystemExit 61 61 62 self.priKeyFilePath=xpdVars(configParser.get('setUp','pri KeyFilePath'))62 self.priKeyFilePath=xpdVars(configParser.get('setUp','prikeyfilepath')) 63 63 64 64 self.cookie.x509CertFilePath = xpdVars(configParser.get('setUp', -
TI12-security/trunk/python/ndg.security.test/ndg/security/test/xmlsec/etree/test_etree.py
r4138 r4140 86 86 xpdVars(self.cfg['test2SignWithInclC14N']['filepath']) 87 87 self.xmlSecDoc.certFilePathList = \ 88 xpdVars(self.cfg['test2SignWithInclC14N']['signing CertFilePath'])88 xpdVars(self.cfg['test2SignWithInclC14N']['signingcertfilepath']) 89 89 self.xmlSecDoc.signingKeyFilePath = \ 90 xpdVars(self.cfg['test2SignWithInclC14N'][' keyfile'])90 xpdVars(self.cfg['test2SignWithInclC14N']['signingprikeyfilepath']) 91 91 92 keyPwd = self.cfg['test2SignWithInclC14N'].get('signing PriKeyPwd')92 keyPwd = self.cfg['test2SignWithInclC14N'].get('signingprikeypwd') 93 93 if keyPwd is None: 94 94 self.xmlSecDoc.signingKeyPwd = getpass.getpass(prompt=\ … … 106 106 xpdVars(self.cfg['test3SignWithExclC14N']['filepath']) 107 107 self.xmlSecDoc.certFilePathList = \ 108 xpdVars(self.cfg['test3SignWithExclC14N']['signing CertFilePath'])108 xpdVars(self.cfg['test3SignWithExclC14N']['signingcertfilepath']) 109 109 self.xmlSecDoc.signingKeyFilePath = \ 110 110 xpdVars(self.cfg['test3SignWithExclC14N']['keyfile']) 111 111 112 keyPwd = self.cfg['test3SignWithExclC14N'].get('signing PriKeyPwd')112 keyPwd = self.cfg['test3SignWithExclC14N'].get('signingprikeypwd') 113 113 if keyPwd is None: 114 114 self.xmlSecDoc.signingKeyPwd = getpass.getpass(prompt=\
Note: See TracChangeset
for help on using the changeset viewer.