File: README

package info (click to toggle)
zeroc-ice 3.3.1-12
  • links: PTS
  • area: main
  • in suites: squeeze
  • size: 40,720 kB
  • ctags: 46,971
  • sloc: cpp: 241,481; java: 104,729; cs: 66,568; python: 18,996; makefile: 5,797; xml: 5,397; ruby: 4,788; php: 3,172; yacc: 3,113; lex: 2,223; ansic: 1,249; perl: 1,200; sh: 182; sql: 73
file content (103 lines) | stat: -rw-r--r-- 3,996 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
This demo shows how to prevent unauthorized access to the IceGrid
registry and node, to the Glacier2 administrative router and the
Ice.Admin functionality of IceGrid-managed servers. These components
use IceSSL secure connections to communicate and restrict access to
their endpoints.

The client and server use a regular TCP endpoint to communicate. Of
course, they could also use a secure endpoint if necessary.

To run the demo, you first need to generate certificates for the
IceGrid registry and node, the Glacier2 administrative router and the
server.

Run the makecerts.py script to create the certificates:

$ makecerts.py

And follow the instructions from the script. Note that to run the
script you must have java (Java5 or greater) in your path.

For simplicity, the certificates created by makecerts.py are not
protected with a password. In a real world deployment, to ensure that
only privileged users can create new certificates and start the
IceGrid components, you would typically use a password for the
certificate authority, the IceGrid registry and node certificates and
the Glacier2 certificate. 

You could also protect the server certificate with a password and
specify the password in the server configuration in clear text.
However, this wouldn't improve security as you would still rely on
filesystem permissions to restrict access to the configuration file,
so you might as well use a certificate without a password and rely on
the filesystem permissions to restrict access to the certificate.

Once the certificates are generated, you can start the IceGrid
registry, node and Glacier2 router:

$ icegridregistry --Ice.Config=config.registry
$ icegridnode --Ice.Config=config.node
$ glacier2router --Ice.Config=config.glacier2

In a separate window:

$ icegridadmin --Ice.Config=config.admin -e \
    "application add application.xml"
$ client

This will deploy the application described in the file
"application.xml" and start the client.

To use icegridadmin through the Glacier2 router, you can use the
following command:

$ icegridadmin --Ice.Config=config.admin \
  --Ice.Default.Router="DemoGlacier2/router:ssl -p 4064" 

Alternatively, you can edit the config.admin file and uncomment the
Ice.Default.Router property definition.

To use the IceGrid administrative GUI, use the following settings in
the GUI Login dialog:

- To connect directly to IceGrid, in the "Direct" tab:

  * Check the "Enable IceSSL" checkbox
  * Set the IceGrid instance name to "DemoIceGrid"
  * Set the IceGrid registry endpoints to "ssl -p 4062"
  * In the SSL configuration section, select the "Basic" tab
  * Set the Keystore file to the certs.jks file from the certs
    directory of this demo
  * Set the password to the Java keystore password to "password"

- To connect via Glacier2, in the "Routed" tab:

  * Check the "Enable IceSSL" checkbox
  * Set the Glacier2 instance name to "DemoGlacier2"
  * Set the Glacier2 router endpoints to "ssl -p 4064"
  * In the SSL configuration section, select the "Basic" tab
  * Set the Keystore file to the certs.jks file from the certs
    directory of this demo
  * Set the password to the Java keystore password to "password"

The IceGrid registry and Glacier2 router are configured to use the
"null permissions verifier" so you can use any username/password to
login with the admin tools. In a real world deployment, you would
instead typically use the file-based permissions verifier or a custom
permissions verifier implementation.


Vista Note
----------

On Vista-derived operating systems, the IceGrid node may emit the
following warning:

  warning: Unable to lookup the performance counter name:
  Unable to connect to the specified computer or the computer is
  offline. This usually occurs when you do not have sufficient
  privileges.

This issue can be resolved by granting appropriate permissions to the
node's user account. Please refer to the Troubleshooting section of
Appendix H in the Ice manual for more information.