RSA IMG Connector Data Sheet for Microsoft Exchange 2010 Powershell Agent Based

Total Page:16

File Type:pdf, Size:1020Kb

RSA IMG Connector Data Sheet for Microsoft Exchange 2010 Powershell Agent Based RSA IMG Connector Data Sheet for Microsoft Exchange 2010 PowerShell Agent Based RSA IMG Connector Data Sheet for Microsoft Exchange 2010 PowerShell Agent Based This data sheet provides the configuration information required to create a new Microsoft Exchange 2010 Powershell Agent Based connector. Supported Software RSA IMG version: 6.8.1 and above. Application: Microsoft Exchange 2010 Prerequisites To make Microsoft Exchange 2013 connector working, SSH PowerShell Agent should be installed and running on the machine where Microsoft exchange 2010 is installed. Configuration General Field Name Value Name Microsoft Exchange 2010 Description Microsoft Exchange 2010 Connector Server AFX Server Version 1 1 RSA IMG Connector Data Sheet for Microsoft Exchange 2010 PowerShell Agent Based Connector Template Microsoft Exchange 2010 (under group type “Generic-Powershell-WebService”) State Active Export As Template N/A Settings Field Name Value Endpoint Type e.g. Type of the endpoint on which the command would be running FIM, exchange etc Powershell Host Host name or an IP address on which the agent is running Name Powershell port Port on which the agent is running Trust-Store Path Path for the trust-store where the agent certificate has been added. Trust-Store Password of the trust-store where the agent certificate has been added. Password Key-Store Path Path for the key-store where the client (connector) certificate has been added. Key-Store Password Password of the key-store where the client (connector) certificate has been added. Version 1 2 RSA IMG Connector Data Sheet for Microsoft Exchange 2010 PowerShell Agent Based Screenshot: Version 1 3 RSA IMG Connector Data Sheet for Microsoft Exchange 2010 PowerShell Agent Based Capabilities Following commands are supported by RSA IMG Exchange 2010 connector: o CreateAccount: creates a mailbox o DeleteAccount: deletes a mailbox o EnableAccount: enables a mailbox o DisableAccount: disables a mailbox o UpdateAccount: updates a mailbox o MoveAccount: moves a mailbox For Exchange AFX adapter, 'Mailbox' verb can be used instead of 'Account' on AFX UI (user interface) e.g. CreateMailbox, DeleteMailbox etc. Command : CreateAccount Command Name Limitations CreateAccount Microsoft Exchange is Active Directory dependent application. To create an account/mailbox at Exchange, first there should be an account in Active Directory Input Parameters Field Name Value Parameter Name Identity Type String Default Value N/A Is the parameter required? Yes. Is the parameter encrypted? No Display Name Identity Version 1 4 RSA IMG Connector Data Sheet for Microsoft Exchange 2010 PowerShell Agent Based Mapping ${Account.Name} Description Identity/Mailbox name Field Name Value Parameter Name Database Type String Default Value N/A Is the parameter required? Yes Is the parameter encrypted? No Display Name Database Mapping Mailbox Database Description Mailbox database name Command Code Field Name Value Exchange Command Enable-Mailbox '${Identity}' -Database '${Database}' Command : DeleteAccount Command Name Limitations Version 1 5 RSA IMG Connector Data Sheet for Microsoft Exchange 2010 PowerShell Agent Based DeleteAccount N/A Input Parameters Field Name Value Parameter Name Identity Type String Default Value N/A Is the parameter required? Yes Is the parameter encrypted? No Display Name Identity Mapping ${Account.Name} Description Identity/Mailbox name Command Code Field Name Value Exchange Command Disable-Mailbox '${Identity}' -Confirm:$False Command : EnableAccount Command Name Limitations Version 1 6 RSA IMG Connector Data Sheet for Microsoft Exchange 2010 PowerShell Agent Based EnableAccount N/A Input Parameters Field Name Value Parameter Name Identity Type String Default Value N/A Is the parameter required? Yes. Is the parameter encrypted? No Display Name Identity Mapping ${Account.Name} Description Identity/Mailbox name Field Name Value Parameter Name Database Type String Default Value N/A Is the parameter required? Yes Version 1 7 RSA IMG Connector Data Sheet for Microsoft Exchange 2010 PowerShell Agent Based Is the parameter encrypted? No Display Name Database Mapping Mailbox Database Description Mailbox database name Command Code Field Name Value Exchange Command Enable-Mailbox '${Identity}' -Database '${Database}' Command : DisableAccount Command Name Limitations DisableAccount N/A Input Parameters Field Name Value Parameter Name Identity Type String Default Value N/A Is the parameter required? Yes Version 1 8 RSA IMG Connector Data Sheet for Microsoft Exchange 2010 PowerShell Agent Based Is the parameter encrypted? No Display Name Identity Mapping ${Account.Name} Description Identity/Mailbox name Command Code Field Name Value Exchange Command Disable-Mailbox '${Identity}' -Confirm:$False Command : UpdateAccount Command Name Limitations UpdateAccount N/A Input Parameters Field Name Value Parameter Name Identity Type String Default Value N/A Is the parameter required? Yes. Version 1 9 RSA IMG Connector Data Sheet for Microsoft Exchange 2010 PowerShell Agent Based Is the parameter encrypted? No Display Name Identity Mapping ${Account.Name} Description Identity/Mailbox name Field Name Value Parameter Name ForwardingAddress Type String Default Value N/A Is the parameter required? Yes Is the parameter encrypted? No Display Name Forwarding Address Mapping ${Account.Name} Description Forwarding address i.e. alias to which mails should be forwarded Command Code Field Name Value Exchange Command Set-Mailbox '${Identity}' -ForwardingAddress '${ForwardingAddress}' Version 1 10 RSA IMG Connector Data Sheet for Microsoft Exchange 2010 PowerShell Agent Based Command : MoveAccount Command Name Limitations MoveAccount N/A Input Parameters Field Name Value Parameter Name Identity Type String Default Value N/A Is the parameter required? Yes. Is the parameter encrypted? No Display Name Identity Mapping ${Account.Name} Description Identity/Mailbox name Field Name Value Parameter Name Database Type String Version 1 11 RSA IMG Connector Data Sheet for Microsoft Exchange 2010 PowerShell Agent Based Default Value N/A Is the parameter required? Yes Is the parameter encrypted? No Display Name Database Mapping Name of the target database where you want to move mailbox (e.g. New Mailbox Database, EN12434 Mailbox Database etc.) Description A target mailbox database name Command Code Field Name Value Exchange Command Move-Mailbox '${Identity}' -TargetDatabase '${Database}' -Confirm:$False Active Directory Connector Dependent Microsoft Exchange 2010 Connector We can configure a Microsoft Exchange 2010 Connector with an Active Directory connector. With the help of this configuration, an account will be created in Active directory and then a mailbox is created in Microsoft Exchange 2010 for same account which is created in Active directory. Steps for configuration: 1. Create a Microsoft Exchange Connector 2010 in ‘Active’ state 2. Now create an Active director connector in ‘Test’ State 3. On the Settings page of Active directory connector, in ‘Dependent Exchange Connector’ setting under miscellaneous heading, select the Microsoft Exchange 2010 connector created in step 1 4. Click OK Version 1 12 RSA IMG Connector Data Sheet for Microsoft Exchange 2010 PowerShell Agent Based Setting Exchange ‘Alias’ through Active Directory Connector-Dependent Microsoft Exchange 2010 Connector We can configure/set value of ‘alias’ attribute of Exchange mailbox through dependent Exchange connector. Steps for configuration: 1. Create Exchange connector in active state and associate it with Active Directory connector as mentioned in above steps. 2. Edit the Create Account command of Active directory connector and add two parameters with names exactly as ‘Exchange_Database’ and ‘Exchange_Alias’ Note : If you don’t want to provide mailbox database value, don’t create the ‘Exchange_Database’ parameter. 3. Save the changes 4. In Exchange connector, for create account/enable account command; add one parameter named ‘Alias’. Edit the command as shown below: Version 1 13 RSA IMG Connector Data Sheet for Microsoft Exchange 2010 PowerShell Agent Based 5. Save the changes and execute the Create Account command with appropriate values. Note: 1. Microsoft Exchange 2010 doesn’t allow special characters like ‘@’ in mailbox identity name. If we run a CreateAccount command in Microsoft Exchange 2010 connector, it will show an error. But if we run a CreateAccount command for Active Directory connector which is configured with Microsoft Exchange 2010 connector (i.e. dependent Exchange connector), it shows successful status message because an account is created in Active Directory and not in Microsoft Exchange 2010 Version 1 14 RSA IMG Connector Data Sheet for Microsoft Exchange 2010 PowerShell Agent Based 2. MoveAccount command (move a mailbox) moves a mailbox from current database to target database. For this, it refers to a script MoveMailbox.ps1, which is by default shipped by Microsoft Exchange server. It is assumed that the Exchange server is installed to the location 'C:\Program Files\Microsoft\...\...' so that the script will be at 'C:\Program Files\Microsoft\Exchange Server\V14\Scripts'. If this is not the default location for Exchange server, then the Move mailbox command will fail. If Exchange server is not installed to the location 'C:\Program files\Microsoft\...', we need to provide correct location of the MoveMailbox.ps1 script to the command at back end. As we are using script written by Microsoft, we can't make change in it and for negative testing of MoveMailbox command, proper exit status won't come out hence negative testing can't be performed. Copyright © 2015 EMC Corporation. All Rights Reserved. Published in the USA. Trademarks RSA, the RSA Logo, and EMC are either registered trademarks or trademarks of EMC Corporation in the United States and/or other countries. All other trademarks used herein are the property of their respective owners. For a list of EMC trademarks, go to www.rsa.com/legal/trademarks_list.pdf. Version 1 15 .
Recommended publications
  • Name Synopsis Description
    Perl version 5.10.0 documentation - vmsish NAME vmsish - Perl pragma to control VMS-specific language features SYNOPSIS use vmsish; use vmsish 'status';# or '$?' use vmsish 'exit'; use vmsish 'time'; use vmsish 'hushed'; no vmsish 'hushed'; vmsish::hushed($hush); use vmsish; no vmsish 'time'; DESCRIPTION If no import list is supplied, all possible VMS-specific features areassumed. Currently, there are four VMS-specific features available:'status' (a.k.a '$?'), 'exit', 'time' and 'hushed'. If you're not running VMS, this module does nothing. vmsish status This makes $? and system return the native VMS exit statusinstead of emulating the POSIX exit status. vmsish exit This makes exit 1 produce a successful exit (with status SS$_NORMAL),instead of emulating UNIX exit(), which considers exit 1 to indicatean error. As with the CRTL's exit() function, exit 0 is also mappedto an exit status of SS$_NORMAL, and any other argument to exit() isused directly as Perl's exit status. vmsish time This makes all times relative to the local time zone, instead of thedefault of Universal Time (a.k.a Greenwich Mean Time, or GMT). vmsish hushed This suppresses printing of VMS status messages to SYS$OUTPUT andSYS$ERROR if Perl terminates with an error status. and allowsprograms that are expecting "unix-style" Perl to avoid having to parseVMS error messages. It does not suppress any messages from Perlitself, just the messages generated by DCL after Perl exits. The DCLsymbol $STATUS will still have the termination status, but with ahigh-order bit set: EXAMPLE:$ perl -e"exit 44;" Non-hushed error exit%SYSTEM-F-ABORT, abort DCL message$ show sym $STATUS$STATUS == "%X0000002C" $ perl -e"use vmsish qw(hushed); exit 44;" Hushed error exit $ show sym $STATUS $STATUS == "%X1000002C" The 'hushed' flag has a global scope during compilation: the exit() ordie() commands that are compiled after 'vmsish hushed' will be hushedwhen they are executed.
    [Show full text]
  • UNIX X Command Tips and Tricks David B
    SESUG Paper 122-2019 UNIX X Command Tips and Tricks David B. Horvath, MS, CCP ABSTRACT SAS® provides the ability to execute operating system level commands from within your SAS code – generically known as the “X Command”. This session explores the various commands, the advantages and disadvantages of each, and their alternatives. The focus is on UNIX/Linux but much of the same applies to Windows as well. Under SAS EG, any issued commands execute on the SAS engine, not necessarily on the PC. X %sysexec Call system Systask command Filename pipe &SYSRC Waitfor Alternatives will also be addressed – how to handle when NOXCMD is the default for your installation, saving results, and error checking. INTRODUCTION In this paper I will be covering some of the basics of the functionality within SAS that allows you to execute operating system commands from within your program. There are multiple ways you can do so – external to data steps, within data steps, and within macros. All of these, along with error checking, will be covered. RELEVANT OPTIONS Execution of any of the SAS System command execution commands depends on one option's setting: XCMD Enables the X command in SAS. Which can only be set at startup: options xcmd; ____ 30 WARNING 30-12: SAS option XCMD is valid only at startup of the SAS System. The SAS option is ignored. Unfortunately, ff NOXCMD is set at startup time, you're out of luck. Sorry! You might want to have a conversation with your system administrators to determine why and if you can get it changed.
    [Show full text]
  • HP Openvms Utility Routines Manual
    HP OpenVMS Utility Routines Manual Order Number: BA554-90019 June 2010 This manual describes the OpenVMS utility routines, a set of routines that provide a programming interface to various OpenVMS utilities. Revision/Update Information: This manual supersedes the HP OpenVMS Utility Routines Manual, OpenVMS Alpha Version 8.3. Software Version: OpenVMS Version 8.4 for Integrity servers OpenVMS Alpha Version 8.4 Hewlett-Packard Company Palo Alto, California © Copyright 2010 Hewlett-Packard Development Company, L.P. Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor’s standard commercial license. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. Intel and Itanium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. ZK4493 The HP OpenVMS documentation set is available on CD. This document was prepared using DECdocument, Version 3.3-1B. Contents Preface ............................................................ xvii 1 Introduction to Utility Routines 2 Access Control List (ACL) Editor Routine 2.1 Introduction to the ACL Editor Routine ........................... ACL–1 2.2 Using the ACL Editor Routine: An Example ....................... ACL–1 2.3 ACL Editor Routine . ........................................ ACL–2 ACLEDIT$EDIT ...........................................
    [Show full text]
  • Lecture 4: September 13 4.1 Process State
    CMPSCI 377 Operating Systems Fall 2012 Lecture 4: September 13 Lecturer: Prashant Shenoy TA: Sean Barker & Demetre Lavigne 4.1 Process State 4.1.1 Process A process is a dynamic instance of a computer program that is being sequentially executed by a computer system that has the ability to run several computer programs concurrently. A computer program itself is just a passive collection of instructions, while a process is the actual execution of those instructions. Several processes may be associated with the same program; for example, opening up several windows of the same program typically means more than one process is being executed. The state of a process consists of - code for the running program (text segment), its static data, its heap and the heap pointer (HP) where dynamic data is kept, program counter (PC), stack and the stack pointer (SP), value of CPU registers, set of OS resources in use (list of open files etc.), and the current process execution state (new, ready, running etc.). Some state may be stored in registers, such as the program counter. 4.1.2 Process Execution States Processes go through various process states which determine how the process is handled by the operating system kernel. The specific implementations of these states vary in different operating systems, and the names of these states are not standardised, but the general high-level functionality is the same. When a process is first started/created, it is in new state. It needs to wait for the process scheduler (of the operating system) to set its status to "new" and load it into main memory from secondary storage device (such as a hard disk or a CD-ROM).
    [Show full text]
  • System Calls & Signals
    CS345 OPERATING SYSTEMS System calls & Signals Panagiotis Papadopoulos [email protected] 1 SYSTEM CALL When a program invokes a system call, it is interrupted and the system switches to Kernel space. The Kernel then saves the process execution context (so that it can resume the program later) and determines what is being requested. The Kernel carefully checks that the request is valid and that the process invoking the system call has enough privilege. For instance some system calls can only be called by a user with superuser privilege (often referred to as root). If everything is good, the Kernel processes the request in Kernel Mode and can access the device drivers in charge of controlling the hardware (e.g. reading a character inputted from the keyboard). The Kernel can read and modify the data of the calling process as it has access to memory in User Space (e.g. it can copy the keyboard character into a buffer that the calling process has access to) When the Kernel is done processing the request, it restores the process execution context that was saved when the system call was invoked, and control returns to the calling program which continues executing. 2 SYSTEM CALLS FORK() 3 THE FORK() SYSTEM CALL (1/2) • A process calling fork()spawns a child process. • The child is almost an identical clone of the parent: • Program Text (segment .text) • Stack (ss) • PCB (eg. registers) • Data (segment .data) #include <sys/types.h> #include <unistd.h> pid_t fork(void); 4 THE FORK() SYSTEM CALL (2/2) • The fork()is one of the those system calls, which is called once, but returns twice! Consider a piece of program • After fork()both the parent and the child are ..
    [Show full text]
  • 1 Introduction to Shell Programming
    1 Introduction to Shell Programming This lecture is prepared for beginners who wish to learn the basics of shell scripting/programming plus introduction to power tools such as awk, sed, etc. 1.1 What is Linux Shell? • In Operating System, there is special program called Shell. Shell ac- cepts your instruction or commands in English (mostly) and if its a valid command, it is passed to kernel. • Shell is a user program or it's a environment provided for user interac- tion. • Shell is an command language interpreter that executes commands read from the standard input device (keyboard) or from a file. • Shell is not part of system kernel, but uses the system kernel to execute programs, create files etc. • To find all available shells in your system type following command: $ cat /etc/shells • Note that each shell does the same job, but each understand a different command syntax and provides different built-in functions. • In MS-DOS, Shell name is COMMAND.COM which is also used for same purpose, but it's not as powerful as our Linux Shells are! • To find your current shell type following command $ echo $SHELL • To use shell (You start to use your shell as soon as you log into your system) you have to simply type commands. 1 1.2 What is Shell Script ? • Normally shells are interactive. It means shell accept command from you (via keyboard) and execute them. • But if you use command one by one (sequence of 'n' number of com- mands) , the you can store this sequence of command to text file and tell the shell to execute this text file instead of entering the commands.
    [Show full text]
  • Lecture 22 Systems Programming Process Control
    Lecture 22 Systems Programming Process Control A process is defined as an instance of a program that is currently running. A uni processor system can still execute multiple processes giving the appearance of a multi- processor machine. A call to a program spawns a process. If a mail program is called by n users then n processes or instances are created and executed by the unix system. Many operating systems including windows and unix executes many processes at the same time. When a program is called, a process is created and a process ID is issued. The process ID is given by the function getpid() defined in <unistd.h>. The prototype for pid( ) is given by #include < unistd.h > pid_t getpid(void); In a uni-processor machine, each process takes turns running and for a short duration, a process takes time interval called a timeslice. The unix command ps can be used to list all current process status. ps PID TTY TIME CMD 10150 pts/16 00:00:00 csh 31462 pts/16 00:00:00 ps The command ps lists the process ID (PID), the terminal name(TTY), the amount of time the process has used so far(TIME) and the command it is executing(CMD). Ps command only displays the current user processes. But we can get all the processes with the flag (- a) and in long format with flag (-l) ps –a ps -l ps -al Information provided by each process may include the following. PID The process ID in integer form PPID The parent process ID in integer form STAT The state of the process TIME CPU time used by the process (in seconds) TT Control terminal of the process COMMAND The user command that started the process Copyright @ 2008 Ananda Gunawardena Each process has a process ID that can be obtained using the getpid() a system call declared in unistd.h.
    [Show full text]
  • Openvms I/O User's Reference Manual
    OpenVMS I/O User’s Reference Manual Order Number: AA–PV6SD–TK April 2001 This manual contains the information necessary to interface directly with the I/O device drivers supplied as part of the Compaq OpenVMS operating system. Several examples of programming techniques are included. This document does not contain information on I/O operations using the OpenVMS Record Management Services. Revision/Update Information: This manual supersedes the OpenVMS I/O User’s Reference Manual, OpenVMS Alpha Version 7.2, OpenVMS VAX Version 7.2 Software Version: OpenVMS Alpha Version 7.3 OpenVMS VAX Version 7.3 Compaq Computer Corporation Houston, Texas © 2001 Compaq Computer Corporation Compaq, VAX, VMS, and the Compaq logo Registered in U.S. Patent and Trademark Office. OpenVMS and Tru64 are trademarks of Compaq Information Technologies Group, L.P in the United States and other countries. Microsoft, MS-DOS, Visual C++, Windows, and Windows NT are trademarks of Microsoft Corporation in the United States and other countries. Intel, Intel Inside, and Pentium are trademarks of Intel Corporation in the United States and other countries. Motif, OSF/1, and UNIX are trademarks of The Open Group in the United States and other countries. All other product names mentioned herein may be trademarks of their respective companies. Confidential computer software. Valid license from Compaq required for possession, use, or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor’s standard commercial license. Compaq shall not be liable for technical or editorial errors or omissions contained herein.
    [Show full text]
  • Essential Skills for Bioinformatics: Unix/Linux PIPES a Simple Program with Grep and Pipes
    Essential Skills for Bioinformatics: Unix/Linux PIPES A simple program with grep and pipes • Suppose we are working with a FASTA file and a program warns that it contains non-nucleotide characters in sequences. We can check for non-nucleotide characters easily with a Unix one-liner using pipes and the grep. • The grep Unix tool searches files or standard input for strings that match patterns. These patterns can be simple strings, or regular expressions. See man grep for more details. A simple program with grep and pipes • tb1-protein.fasta • Approach: - remove all header lines (those that begin with >) - the remaining sequences are piped to grep - print lines containing non-nucleotide characters A simple program with grep and pipes • “^>”: regular expression pattern which matches all lines that start with a > character. • -v: invert the matching lines because we want to exclude lines starting with > • |: pipe the standard output to the next command with the pipe character | • “[^ACGT]”: When used in brackets, a caret symbol (^) matches anything that’s not one of the characters in these brackets. [^ACGT] matches any character that’s not A, C, G, or T. • -i: We ignore case. • --color: to color the matching non-nucleotide character. • Both regular expressions are in quotes, which is a good habit to get into. Combining pipes and redirection • Large bioinformatics programs will often use multiple streams simultaneously. Results are output via the standard output stream while diagnostic messages, warnings, or errors are output to the standard error stream. In such cases, we need to combine pipes and redirection to manage all streams from a running program.
    [Show full text]
  • Freebsd System Programming Freebsd System Programming
    FreeBSD system programming FreeBSD system programming Authors: Nathan Boeger (nboeger at khmere.com) Mana Tominaga (manna at dumaexplorer.com ) Copyright (C) 2001,2002,2003,2004 Nathan Boeger and Mana Tominaga Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.1 or any later version published by the Free Software Foundation; with no Invariant Sections, one Front-Cover Texts, and one Back-Cover Text: "Nathan Boeger and Mana Tominaga wrote this book and asks for your support through donation. Contact the authors for more information" A copy of the license is included in the section entitled GNU Free Documentation License" Welcome to the FreeBSD System Programming book. Please note that this is a work in progress and feedback is appreciated! please note a few things first: • We have written the book in a new format. I have read many programming books that have covered many different areas. Personally, I found it hard to follow code with no comments or switching back and forth between text explaining code and the code. So in this book, after chapter 1, I have split the code and text into separate pieces. The source code for each chapter is online and fully downloaded able. That way if you only want to check out the source code examples you can view them only. And if you want to understand the concepts you can read the text or even have them side by side. Please let us know your thoughts on this • The book was ordinally intended to be published in hard copy form.
    [Show full text]
  • Beyond Errno Error Handling in C David Svoboda
    Beyond errno Error Handling in C David Svoboda Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Beyond errno: Error Handling in C November© 2016 Carnegie3-4, 2016 Mellon University ©[DISTRIBUTION 2016 Carnegie STATEMENT Mellon A] This material University has been approved for public release and unlimited distribution. [DISTRIBUTION STATEMENT A] This material has been approved for 1 publicREV release-03.18.2016.0 and unlimited distribution. Copyright 2016 Carnegie Mellon University and IEEE This material is based upon work funded and supported by the Department of Defense under Contract No. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center. References herein to any specific commercial product, process, or service by trade name, trade mark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by Carnegie Mellon University or its Software Engineering Institute. NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN “AS-IS” BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. [Distribution Statement A] This material has been approved for public release and unlimited distribution. Please see Copyright notice for non-US Government use and distribution. This material may be reproduced in its entirety, without modification, and freely distributed in written or electronic form without requesting formal permission.
    [Show full text]
  • Kyua and Jenkins Testing Framework for BSD by Craig Rodrigues Rodrigc
    Kyua and Jenkins Testing Framework for BSD by Craig Rodrigues [email protected] Kyua What is Kyua? ● It's a pun on “Q.A.”, but pronounced “kyoo-ah” ● It provides a framework for defining tests, and running them ● Actual tests can be implemented in C, C++, Shell, Python, etc. History of Kyua ● Automated Testing Framework (ATF) started as a NetBSD Google Summer of Code project in 2007 by Julio Merino (jmmv@) ● ATF was targeted to testing NetBSD with a consistent framework ● Imported into NetBSD, and later FreeBSD History of Kyua ● ATF was later refactored into two parts – ATF: libraries and API's for writing tests in C, C++, shell – Kyua: run-time engine for running the tests, and generating reports Who uses Kyua? ● Open Source projects: – NetBSD: ATF has been imported into base system – FreeBSD: ATF has been imported into base system ● Companies building BSD based products Trying out Kyua under FreeBSD Build tests included with FreeBSD ● In FreeBSD-10 and lower, put in /etc/make.conf WITH_TESTS=”yes” ● make buildworld; make installworld ● Tests will be in /usr/tests Install kyua ● pkg install devel/kyua List the tests ● cd /usr/tests ● kyua list Run the tests ● cd /usr/tests ● kyua test Generate reports ● Plain text report – kyua report ● HTML report – kyua report-html ● Junit XML report – kyua report-junit Writing your own tests What do you need? ● Kyuafile – kyua binary reads this to figure out what tests to run ● Tests, can be one or more of: – plain test – ATF test – TAP test Kyuafile -- Comments in Kyuafiles must start with -- two hyphens -- Need this boilerplate: syntax(2) -- The name of the test suite must be -- defined.
    [Show full text]