Author: kaushalye Date: Mon Apr 23 02:33:06 2007 New Revision: 531397 URL: http://svn.apache.org/viewvc?view=rev&rev=531397 Log: Introducing a more convenient way to run samples. Udating secpolicy README for latest changes
Added: webservices/rampart/trunk/c/samples/secpolicy/test_scen.sh (with props) Modified: webservices/rampart/trunk/c/INSTALL webservices/rampart/trunk/c/README webservices/rampart/trunk/c/samples/secpolicy/README.txt webservices/rampart/trunk/c/samples/secpolicy/scenario9/client-outgoing-secpolicy.xml webservices/rampart/trunk/c/samples/secpolicy/scenario9/service-incoming-secpolicy.xml Modified: webservices/rampart/trunk/c/INSTALL URL: http://svn.apache.org/viewvc/webservices/rampart/trunk/c/INSTALL?view=diff&rev=531397&r1=531396&r2=531397 ============================================================================== --- webservices/rampart/trunk/c/INSTALL (original) +++ webservices/rampart/trunk/c/INSTALL Mon Apr 23 02:33:06 2007 @@ -23,14 +23,14 @@ Configuring: ----------------------------------- -1. Run build.sh in axis2/c/rampart directory +1. Run build.sh in rampart/trunk/c directory 2. This will install the rampart module under AXIS2C_HOME/deploy/modules 3. To engage rampart add to axis2.xml <module ref="rampart"/> -NOTE: See the README file in samples/client/enc_echo for more information. +NOTE: See the README file in samples/client/enc_echo for more information on configuration setup. ----------------------------------- Writing callback modules: @@ -38,7 +38,7 @@ User can specify which .so (or DLL) library to use to callback the password. For this user must provide a function pointer for get_password() operation in rampart_callback_t -See rampart/samples/callback/pwcb.c for clarity +See samples/callback/pwcb.c for clarity Modified: webservices/rampart/trunk/c/README URL: http://svn.apache.org/viewvc/webservices/rampart/trunk/c/README?view=diff&rev=531397&r1=531396&r2=531397 ============================================================================== --- webservices/rampart/trunk/c/README (original) +++ webservices/rampart/trunk/c/README Mon Apr 23 02:33:06 2007 @@ -53,3 +53,4 @@ Apache Axis2/C Rampart relies heavily on the use of autoconf and libtool to provide a build environment. And also it uses openssl. + Modified: webservices/rampart/trunk/c/samples/secpolicy/README.txt URL: http://svn.apache.org/viewvc/webservices/rampart/trunk/c/samples/secpolicy/README.txt?view=diff&rev=531397&r1=531396&r2=531397 ============================================================================== --- webservices/rampart/trunk/c/samples/secpolicy/README.txt (original) +++ webservices/rampart/trunk/c/samples/secpolicy/README.txt Mon Apr 23 02:33:06 2007 @@ -25,3 +25,16 @@ 8. A complete scenario, where both client and server encrypt/sign, add Timestamps, Usernametokens. + +I am in a HURRY and I need to try a scenario +-------------------------------------------- +If you in a really hurry and need to try a scenario please use the +test_scen.sh +Usage : %sh test_scen.sh scenarioX server-port +e.g. %s test_scen.sh scenario3 8080 + +I need to try all the scenarios +------------------------------- +In this case please use the script run_all.sh. +Usage: %sh run_all.sh server-port +e.g. %sh run_all.sh 8080 Modified: webservices/rampart/trunk/c/samples/secpolicy/scenario9/client-outgoing-secpolicy.xml URL: http://svn.apache.org/viewvc/webservices/rampart/trunk/c/samples/secpolicy/scenario9/client-outgoing-secpolicy.xml?view=diff&rev=531397&r1=531396&r2=531397 ============================================================================== --- webservices/rampart/trunk/c/samples/secpolicy/scenario9/client-outgoing-secpolicy.xml (original) +++ webservices/rampart/trunk/c/samples/secpolicy/scenario9/client-outgoing-secpolicy.xml Mon Apr 23 02:33:06 2007 @@ -23,7 +23,7 @@ </sp:RecipientToken> <sp:AlgorithmSuite> <wsp:Policy> - <sp:Basic256Rsa15/> + <sp:Basic192Rsa15/> </wsp:Policy> </sp:AlgorithmSuite> <sp:Layout> Modified: webservices/rampart/trunk/c/samples/secpolicy/scenario9/service-incoming-secpolicy.xml URL: http://svn.apache.org/viewvc/webservices/rampart/trunk/c/samples/secpolicy/scenario9/service-incoming-secpolicy.xml?view=diff&rev=531397&r1=531396&r2=531397 ============================================================================== --- webservices/rampart/trunk/c/samples/secpolicy/scenario9/service-incoming-secpolicy.xml (original) +++ webservices/rampart/trunk/c/samples/secpolicy/scenario9/service-incoming-secpolicy.xml Mon Apr 23 02:33:06 2007 @@ -23,7 +23,7 @@ </sp:RecipientToken> <sp:AlgorithmSuite> <wsp:Policy> - <sp:Basic256Rsa15/> + <sp:Basic192Rsa15/> </wsp:Policy> </sp:AlgorithmSuite> <sp:Layout> Added: webservices/rampart/trunk/c/samples/secpolicy/test_scen.sh URL: http://svn.apache.org/viewvc/webservices/rampart/trunk/c/samples/secpolicy/test_scen.sh?view=auto&rev=531397 ============================================================================== --- webservices/rampart/trunk/c/samples/secpolicy/test_scen.sh (added) +++ webservices/rampart/trunk/c/samples/secpolicy/test_scen.sh Mon Apr 23 02:33:06 2007 @@ -0,0 +1,29 @@ +#!/bin/bash +_SMPL_DIR="$PWD" + +if [ $# -ne 2 ] +then + echo "Usage : $0 scenarioX server-port" + exit +fi + S_i=$1 + _PORT=$2 + echo "-------------------------------------------------------------------------" + echo ">Deploying $S_i" + sh deploy.sh $S_i + echo ">Killing server" + killall axis2_http_server + echo ">Go to $AXIS2C_HOME" + cd $AXIS2C_HOME/bin + echo ">Start server @ $_PORT" + ./axis2_http_server -p$_PORT & + echo ">Go to client directory" + cd $_SMPL_DIR/../client/sec_echo + echo ">Run the sample" + sh update_n_run.sh + echo ">Jump back to samples dir :$_SMPL_DIR" + cd $_SMPL_DIR + +killall axis2_http_server +echo "DONE" + Propchange: webservices/rampart/trunk/c/samples/secpolicy/test_scen.sh ------------------------------------------------------------------------------ svn:executable = *