cxf-commits mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From ff...@apache.org
Subject svn commit: r1173498 - in /cxf/branches/2.3.x-fixes: ./ distribution/src/main/release/samples/ws_security/interopfest/ distribution/src/main/release/samples/ws_security/sign_enc/ distribution/src/main/release/samples/ws_security/ut/ distribution/src/ma...
Date Wed, 21 Sep 2011 05:04:19 GMT
Author: ffang
Date: Wed Sep 21 05:04:18 2011
New Revision: 1173498

URL: http://svn.apache.org/viewvc?rev=1173498&view=rev
Log:
Merged revisions 1173497 via svnmerge from 
https://svn.apache.org/repos/asf/cxf/branches/2.4.x-fixes

................
  r1173497 | ffang | 2011-09-21 12:56:36 +0800 (三, 21  9 2011) | 9 lines
  
  Merged revisions 1173487 via svnmerge from 
  https://svn.apache.org/repos/asf/cxf/trunk
  
  ........
    r1173487 | ffang | 2011-09-21 12:23:38 +0800 (三, 21  9 2011) | 1 line
    
    [CXF-3814]update JDK download url in examples README.txt
  ........
................

Modified:
    cxf/branches/2.3.x-fixes/   (props changed)
    cxf/branches/2.3.x-fixes/distribution/src/main/release/samples/ws_security/interopfest/README.txt
    cxf/branches/2.3.x-fixes/distribution/src/main/release/samples/ws_security/sign_enc/README.txt
    cxf/branches/2.3.x-fixes/distribution/src/main/release/samples/ws_security/ut/README.txt
    cxf/branches/2.3.x-fixes/distribution/src/main/release/samples/ws_security/ut_policy/README.txt
    cxf/branches/2.3.x-fixes/distribution/src/main/release/samples/ws_security/ut_sign/README.txt

Propchange: cxf/branches/2.3.x-fixes/
------------------------------------------------------------------------------
Binary property 'svnmerge-integrated' - no diff available.

Modified: cxf/branches/2.3.x-fixes/distribution/src/main/release/samples/ws_security/interopfest/README.txt
URL: http://svn.apache.org/viewvc/cxf/branches/2.3.x-fixes/distribution/src/main/release/samples/ws_security/interopfest/README.txt?rev=1173498&r1=1173497&r2=1173498&view=diff
==============================================================================
--- cxf/branches/2.3.x-fixes/distribution/src/main/release/samples/ws_security/interopfest/README.txt
(original)
+++ cxf/branches/2.3.x-fixes/distribution/src/main/release/samples/ws_security/interopfest/README.txt
Wed Sep 21 05:04:18 2011
@@ -20,11 +20,11 @@ or have been changed.
 
 The samples in this directory use STRONG encryption.  The default encryption algorithms 
 included in a JRE is not adequate for these samples.   The Java Cryptography Extension 
-(JCE) Unlimited Strength Jurisdiction Policy Files available on Sun's JDK download 
+(JCE) Unlimited Strength Jurisdiction Policy Files available on Oracle's JDK download 
 page[3] *must* be installed for the examples to work.   If you get errors about invalid
 key lengths, the Unlimited Strength files are not installed.
 
-[3] http://java.sun.com/javase/downloads/index.jsp
+[3] http://www.oracle.com/technetwork/java/javase/downloads/index.html
 
 
 *** Running the WS-Security samples against the Microsoft servers ***

Modified: cxf/branches/2.3.x-fixes/distribution/src/main/release/samples/ws_security/sign_enc/README.txt
URL: http://svn.apache.org/viewvc/cxf/branches/2.3.x-fixes/distribution/src/main/release/samples/ws_security/sign_enc/README.txt?rev=1173498&r1=1173497&r2=1173498&view=diff
==============================================================================
--- cxf/branches/2.3.x-fixes/distribution/src/main/release/samples/ws_security/sign_enc/README.txt
(original)
+++ cxf/branches/2.3.x-fixes/distribution/src/main/release/samples/ws_security/sign_enc/README.txt
Wed Sep 21 05:04:18 2011
@@ -31,11 +31,11 @@ set the environment by running the scrip
 
 The samples in this directory use STRONG encryption.  The default encryption algorithms
 included in a JRE is not adequate for these samples.   The Java Cryptography Extension
-(JCE) Unlimited Strength Jurisdiction Policy Files available on Sun's JDK download
+(JCE) Unlimited Strength Jurisdiction Policy Files available on Oracle's JDK download
 page[3] *must* be installed for the examples to work.   If you get errors about invalid
 key lengths, the Unlimited Strength files are not installed.
 
-[3] http://java.sun.com/javase/downloads/index.jsp
+[3] http://www.oracle.com/technetwork/java/javase/downloads/index.html
 
 
 Building and running the demo using Ant

Modified: cxf/branches/2.3.x-fixes/distribution/src/main/release/samples/ws_security/ut/README.txt
URL: http://svn.apache.org/viewvc/cxf/branches/2.3.x-fixes/distribution/src/main/release/samples/ws_security/ut/README.txt?rev=1173498&r1=1173497&r2=1173498&view=diff
==============================================================================
--- cxf/branches/2.3.x-fixes/distribution/src/main/release/samples/ws_security/ut/README.txt
(original)
+++ cxf/branches/2.3.x-fixes/distribution/src/main/release/samples/ws_security/ut/README.txt
Wed Sep 21 05:04:18 2011
@@ -31,11 +31,11 @@ set the environment by running the scrip
 
 The samples in this directory use STRONG encryption.  The default encryption algorithms
 included in a JRE is not adequate for these samples.   The Java Cryptography Extension
-(JCE) Unlimited Strength Jurisdiction Policy Files available on Sun's JDK download
+(JCE) Unlimited Strength Jurisdiction Policy Files available on Oracle's JDK download
 page[3] *must* be installed for the examples to work.   If you get errors about invalid
 key lengths, the Unlimited Strength files are not installed.
 
-[3] http://java.sun.com/javase/downloads/index.jsp
+[3] http://www.oracle.com/technetwork/java/javase/downloads/index.html
 
 
 Building and running the demo using Ant

Modified: cxf/branches/2.3.x-fixes/distribution/src/main/release/samples/ws_security/ut_policy/README.txt
URL: http://svn.apache.org/viewvc/cxf/branches/2.3.x-fixes/distribution/src/main/release/samples/ws_security/ut_policy/README.txt?rev=1173498&r1=1173497&r2=1173498&view=diff
==============================================================================
--- cxf/branches/2.3.x-fixes/distribution/src/main/release/samples/ws_security/ut_policy/README.txt
(original)
+++ cxf/branches/2.3.x-fixes/distribution/src/main/release/samples/ws_security/ut_policy/README.txt
Wed Sep 21 05:04:18 2011
@@ -1,148 +1,148 @@
-WS-Security Demo  (UsernameToken and Timestamp)
-=================
-
-This demo shows how WS-Security support in Apache CXF may be enabled.
-
-WS-Security can be configured to the Client and Server endpoints by adding
-WS-SecurityPolicies into the WSDL.
-
-The logging feature is used to log the inbound and outbound
-SOAP messages and display these to the console.
-
-In all other respects this demo is based on the basic hello_world sample.
-
-Please review the README in the samples directory before continuing.
-
-
-Prerequisite
-------------
-
-If your environment already includes cxf-manifest.jar on the CLASSPATH,
-and the JDK and ant bin directories on the PATH, it is not necessary to
-run the environment script described in the samples directory README.
-If your environment is not properly configured, or if you are planning
-on using wsdl2java, javac, and java to build and run the demos, you must
-set the environment by running the script.
-
-
-*** Requirements ***
-
-The samples in this directory use STRONG encryption.  The default encryption algorithms
-included in a JRE is not adequate for these samples.   The Java Cryptography Extension
-(JCE) Unlimited Strength Jurisdiction Policy Files available on Sun's JDK download
-page[3] *must* be installed for the examples to work.   If you get errors about invalid
-key lengths, the Unlimited Strength files are not installed.
-
-[3] http://java.sun.com/javase/downloads/index.jsp
-
-
-Building and running the demo using Ant
----------------------------------------
-
-From the base directory of this sample (i.e., where this README file is
-located), the Ant build.xml file can be used to build and run the demo.
-The server and client targets automatically build the demo.
-
-Using either UNIX or Windows:
-
-  ant server  (from one command line window)
-  ant client  (from a second command line window)
-
-On startup, the client makes one invocation.
-
-You can use the target client.unauthenticated to show that the policy UsernameToken is enforced
by the server.
-
-To remove the code generated from the WSDL file and the .class
-files, run "ant clean".
-
-
-Building and running the demo using Maven
----------------------------------------
-
-From the base directory of this sample (i.e., where this README file is
-located), the maven pom.xml file can be used to build and run the demo.
-
-
-Using either UNIX or Windows:
-
-  mvn install (builds the demo)
-  mvn -Pserver  (from one command line window)
-  Mvn -Pclient  (from a second command line window)
-
-On startup, the client makes one invocation.
-
-You can use the profile client.unauthenticated to show that the policy UsernameToken is enforced
by the server.
-
-To remove the code generated from the WSDL file and the .class
-files, run "mvn clean".
-
-
-
-Building the demo using wsdl2java and javac
--------------------------------------------
-
-From the base directory of this sample (i.e., where this README file is
-located) first create the target directory build/classes and then
-generate code from the WSDL file.
-
-
-For UNIX:
-  mkdir -p build/classes
-
-  wsdl2java -d build/classes -compile ./wsdl/hello_world_wssec.wsdl
-
-For Windows:
-  mkdir build\classes
-    Must use back slashes.
-
-  wsdl2java -d build\classes -compile .\wsdl\hello_world_wssec.wsdl
-    May use either forward or back slashes.
-
-Now compile the provided client and server applications with the commands:
-
-For UNIX:
-
-  export CLASSPATH=$CLASSPATH:$CXF_HOME/lib/cxf-manifest.jar:./build/classes
-  javac -d build/classes src/demo/wssec/common/*.java
-  javac -d build/classes src/demo/wssec/client/*.java
-  javac -d build/classes src/demo/wssec/server/*.java
-
-For Windows:
-  set classpath=%classpath%;%CXF_HOME%\lib\cxf-manifest.jar;.\build\classes
-  javac -d build\classes src\demo\wssec\common\*.java
-  javac -d build\classes src\demo\wssec\client\*.java
-  javac -d build\classes src\demo\wssec\server\*.java
-
-
-Running the demo using java
----------------------------
-
-From the base directory of this sample (i.e., where this README file is
-located) run the commands, entered on a single command line:
-
-For UNIX (must use forward slashes):
-    java -Djava.util.logging.config.file=./logging.properties
-         demo.wssec.server.Server &
-
-    java -Djava.util.logging.config.file=./logging.properties
-         demo.wssec.client.Client ./wsdl/hello_world_wssec.wsdl
-
-The server process starts in the background.
-
-For Windows (may use either forward or back slashes):
-  start
-    java -Djava.util.logging.config.file=.\logging.properties
-         demo.wssec.server.Server
-
-    java -Djava.util.logging.config.file=.\logging.properties
-         demo.wssec.client.Client .\wsdl\hello_world_wssec.wsdl
-
-The server process starts in a new command window.
-
-After running the client, terminate the server process.
-
-To remove the code generated from the WSDL file and the .class
-files, either delete the build directory and its contents or run:
-
-  ant clean
-
+WS-Security Demo  (UsernameToken and Timestamp)
+=================
+
+This demo shows how WS-Security support in Apache CXF may be enabled.
+
+WS-Security can be configured to the Client and Server endpoints by adding
+WS-SecurityPolicies into the WSDL.
+
+The logging feature is used to log the inbound and outbound
+SOAP messages and display these to the console.
+
+In all other respects this demo is based on the basic hello_world sample.
+
+Please review the README in the samples directory before continuing.
+
+
+Prerequisite
+------------
+
+If your environment already includes cxf-manifest.jar on the CLASSPATH,
+and the JDK and ant bin directories on the PATH, it is not necessary to
+run the environment script described in the samples directory README.
+If your environment is not properly configured, or if you are planning
+on using wsdl2java, javac, and java to build and run the demos, you must
+set the environment by running the script.
+
+
+*** Requirements ***
+
+The samples in this directory use STRONG encryption.  The default encryption algorithms
+included in a JRE is not adequate for these samples.   The Java Cryptography Extension
+(JCE) Unlimited Strength Jurisdiction Policy Files available on Oracle's JDK download
+page[3] *must* be installed for the examples to work.   If you get errors about invalid
+key lengths, the Unlimited Strength files are not installed.
+
+[3] http://www.oracle.com/technetwork/java/javase/downloads/index.html
+
+
+Building and running the demo using Ant
+---------------------------------------
+
+From the base directory of this sample (i.e., where this README file is
+located), the Ant build.xml file can be used to build and run the demo.
+The server and client targets automatically build the demo.
+
+Using either UNIX or Windows:
+
+  ant server  (from one command line window)
+  ant client  (from a second command line window)
+
+On startup, the client makes one invocation.
+
+You can use the target client.unauthenticated to show that the policy UsernameToken is enforced
by the server.
+
+To remove the code generated from the WSDL file and the .class
+files, run "ant clean".
+
+
+Building and running the demo using Maven
+---------------------------------------
+
+From the base directory of this sample (i.e., where this README file is
+located), the maven pom.xml file can be used to build and run the demo.
+
+
+Using either UNIX or Windows:
+
+  mvn install (builds the demo)
+  mvn -Pserver  (from one command line window)
+  Mvn -Pclient  (from a second command line window)
+
+On startup, the client makes one invocation.
+
+You can use the profile client.unauthenticated to show that the policy UsernameToken is enforced
by the server.
+
+To remove the code generated from the WSDL file and the .class
+files, run "mvn clean".
+
+
+
+Building the demo using wsdl2java and javac
+-------------------------------------------
+
+From the base directory of this sample (i.e., where this README file is
+located) first create the target directory build/classes and then
+generate code from the WSDL file.
+
+
+For UNIX:
+  mkdir -p build/classes
+
+  wsdl2java -d build/classes -compile ./wsdl/hello_world_wssec.wsdl
+
+For Windows:
+  mkdir build\classes
+    Must use back slashes.
+
+  wsdl2java -d build\classes -compile .\wsdl\hello_world_wssec.wsdl
+    May use either forward or back slashes.
+
+Now compile the provided client and server applications with the commands:
+
+For UNIX:
+
+  export CLASSPATH=$CLASSPATH:$CXF_HOME/lib/cxf-manifest.jar:./build/classes
+  javac -d build/classes src/demo/wssec/common/*.java
+  javac -d build/classes src/demo/wssec/client/*.java
+  javac -d build/classes src/demo/wssec/server/*.java
+
+For Windows:
+  set classpath=%classpath%;%CXF_HOME%\lib\cxf-manifest.jar;.\build\classes
+  javac -d build\classes src\demo\wssec\common\*.java
+  javac -d build\classes src\demo\wssec\client\*.java
+  javac -d build\classes src\demo\wssec\server\*.java
+
+
+Running the demo using java
+---------------------------
+
+From the base directory of this sample (i.e., where this README file is
+located) run the commands, entered on a single command line:
+
+For UNIX (must use forward slashes):
+    java -Djava.util.logging.config.file=./logging.properties
+         demo.wssec.server.Server &
+
+    java -Djava.util.logging.config.file=./logging.properties
+         demo.wssec.client.Client ./wsdl/hello_world_wssec.wsdl
+
+The server process starts in the background.
+
+For Windows (may use either forward or back slashes):
+  start
+    java -Djava.util.logging.config.file=.\logging.properties
+         demo.wssec.server.Server
+
+    java -Djava.util.logging.config.file=.\logging.properties
+         demo.wssec.client.Client .\wsdl\hello_world_wssec.wsdl
+
+The server process starts in a new command window.
+
+After running the client, terminate the server process.
+
+To remove the code generated from the WSDL file and the .class
+files, either delete the build directory and its contents or run:
+
+  ant clean
+

Modified: cxf/branches/2.3.x-fixes/distribution/src/main/release/samples/ws_security/ut_sign/README.txt
URL: http://svn.apache.org/viewvc/cxf/branches/2.3.x-fixes/distribution/src/main/release/samples/ws_security/ut_sign/README.txt?rev=1173498&r1=1173497&r2=1173498&view=diff
==============================================================================
--- cxf/branches/2.3.x-fixes/distribution/src/main/release/samples/ws_security/ut_sign/README.txt
(original)
+++ cxf/branches/2.3.x-fixes/distribution/src/main/release/samples/ws_security/ut_sign/README.txt
Wed Sep 21 05:04:18 2011
@@ -31,11 +31,11 @@ set the environment by running the scrip
 
 The samples in this directory use STRONG encryption.  The default encryption algorithms
 included in a JRE is not adequate for these samples.   The Java Cryptography Extension
-(JCE) Unlimited Strength Jurisdiction Policy Files available on Sun's JDK download
+(JCE) Unlimited Strength Jurisdiction Policy Files available on Oracle's JDK download
 page[3] *must* be installed for the examples to work.   If you get errors about invalid
 key lengths, the Unlimited Strength files are not installed.
 
-[3] http://java.sun.com/javase/downloads/index.jsp
+[3] http://www.oracle.com/technetwork/java/javase/downloads/index.html
 
 
 Building and running the demo using Ant



Mime
View raw message