Ignore:
Timestamp:
11/03/10 14:55:42 (11 years ago)
Author:
pjkersha
Message:
  • Working Attribute Authority client unit tests. Configuration parameters such as issuer and flags to test query timestamp and SAML version string have now been moved out of the Attribute Authority to the generic SAML subject Query middleware interface ndg.security.server.wsgi.saml.SOAPQueryInterfaceMiddleware. This could be moved into the SAML egg at a later stage. The AuthzDecisionQuery? interface should be retested to allow for these changes.
File:
1 edited

Legend:

Unmodified
Added
Removed
  • TI12-security/trunk/NDGSecurity/python/ndg_security_test/ndg/security/test/unit/attributeauthorityclient/test_samlattributeauthorityclient.cfg

    r6575 r6721  
    1212# included here 
    1313[test01AttributeQuery] 
    14 uri = http://localhost:5000/AttributeAuthority/saml 
     14uri = http://localhost:5000/AttributeAuthority/ 
    1515subject = https://openid.localhost/philip.kershaw 
    1616siteAttributeName = urn:siteA:security:authz:1.0:attr 
    1717 
    1818[test02AttributeQueryInvalidIssuer] 
    19 uri = http://localhost:5000/AttributeAuthority/saml 
     19uri = http://localhost:5000/AttributeAuthority/ 
    2020subject = https://openid.localhost/philip.kershaw 
    2121siteAttributeName = urn:siteA:security:authz:1.0:attr 
    2222 
    2323[test03AttributeQueryUnknownSubject] 
    24 uri = http://localhost:5000/AttributeAuthority/saml 
     24uri = http://localhost:5000/AttributeAuthority/ 
    2525subject = https://openid.localhost/unknown 
    2626siteAttributeName = urn:siteA:security:authz:1.0:attr 
    2727 
    2828[test04AttributeQueryInvalidAttrName] 
    29 uri = http://localhost:5000/AttributeAuthority/saml 
     29uri = http://localhost:5000/AttributeAuthority/ 
    3030subject = https://openid.localhost/philip.kershaw 
    3131siteAttributeName = invalid-attr 
    3232prefix = saml. 
    33 saml.serialise = saml.xml.etree:AttributeQueryElementTree.toXML 
    34 saml.deserialise = saml.xml.etree:ResponseElementTree.fromXML 
     33saml.serialise = ndg.saml.xml.etree:AttributeQueryElementTree.toXML 
     34saml.deserialise = ndg.saml.xml.etree:ResponseElementTree.fromXML 
    3535 
    3636[test05AttributeQuerySOAPBindingInterface] 
    37 uri = http://localhost:5000/AttributeAuthority/saml 
     37uri = http://localhost:5000/AttributeAuthority/ 
    3838subject = https://openid.localhost/philip.kershaw 
    3939 
    4040[test06AttributeQueryFromConfig] 
    41 uri = http://localhost:5000/AttributeAuthority/saml 
     41uri = http://localhost:5000/AttributeAuthority/ 
    4242subject = https://openid.localhost/philip.kershaw 
    4343 
     
    4949 
    5050[test07AttributeQuerySslSOAPBindingInterface] 
    51 uri = http://localhost:5000/AttributeAuthority/saml 
     51uri = http://localhost:5000/AttributeAuthority/ 
    5252subject = https://openid.localhost/philip.kershaw 
    5353 
     
    6363attributeQuery.sslPriKeyFilePath = $NDGSEC_TEST_CONFIG_DIR/pki/test.key 
    6464attributeQuery.sslValidDNs = /C=UK/ST=Oxfordshire/O=BADC/OU=Security/CN=localhost, /O=Site A/CN=Attribute Authority 
     65 
Note: See TracChangeset for help on using the changeset viewer.