12.11.2014 Views

web server - Borland Technical Publications

web server - Borland Technical Publications

web server - Borland Technical Publications

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Executing iastool command-line tools from a script file<br />

Options<br />

The following table describes the options available when using the verify tool.<br />

Option<br />

-src <br />

-role <br />

-nowarn<br />

-strict<br />

-classpath <br />

Description<br />

Specifies the JAR file (or the directory of an<br />

expanded JAR) that you want to verify. The full or<br />

relative path to the file must be specified. There is<br />

no default.<br />

Specifies the level of error checking to perform:<br />

■<br />

■<br />

DEVELOPER<br />

ASSEMBLER<br />

■ DEPLOYER (default)<br />

For details, see the role descriptions above.<br />

Specifies that the tool should only report errors that<br />

preclude deployment and not report warnings.<br />

Specifies that the tool should report the most<br />

minute inconsistencies, many of which do not<br />

affect the overall integrity of the application.<br />

Specifies the search path for application classes<br />

and resources. To enter more than one directory,<br />

ZIP, or JAR file entry, separate each entry with a<br />

semicolon (;).<br />

Example<br />

The following example performs a developer level verification of the JAR file soapclient.jar<br />

located in the c:\examples\soap directory:<br />

-verify -src c:\examples\soap\soap-client.jar -role DEVELOPER<br />

Executing iastool command-line tools from a script file<br />

Several iastool utility tools require that you supply login information (realm, username,<br />

and password). You may, however, want to run iastool commands from a script file,<br />

but doing so would expose the realm, username, password information to anyone who<br />

has access to the script file. There are two methods you can use to protect this<br />

information:<br />

■<br />

“Piping a file to the iastool utility” on page 321<br />

■<br />

“Passing a file to the iastool utility” on page 322<br />

Piping a file to the iastool utility<br />

The following example shows how to ping a hub named east1 by piping the file<br />

mylogin.txt (located in the default <strong>Borland</strong> Deployment Platform installation directory)<br />

to the iastool utility:<br />

iastool -ping -hub east1 < c:\BES\mylogin.txt<br />

where the file mylogin.txt contains three lines that correspond to what you would enter<br />

for the realm, username, and password:<br />

2<br />

username<br />

password<br />

322 BES Developer’s Guide

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!