Projet

Général

Profil

« Précédent | Suivant » 

Révision bf9c3717

Ajouté par Remy Menard il y a environ 11 ans

Version 1.99

  • All:
    - a few bugs fixed!
  • New web application LaMBDa
  • ETa:
    - new testing application to capture events
  • SigMa-Test:
    - new options to the command line to configure the public/private keys
    for TLS and for signature
  • ALfA, OMeGa:
    - new method more accurate than "traceEPC": the events are sorted by
    EPCIS
  • OmICroN:
    - New options added to the command line
  • YPSilon, EpcisPHI:
    - user can be identified by alias, if the DN of his certificate is
    incompatible with the LDAP directory
  • YPSilon:
    - new shell script to configure the LDAP directory (same
    functionnalities as IoTa-Installer)
  • IoTa-Installer:
    - installs and configures LaMBDa
    - finer certificate mangagement
    - EpcILoN correctly subscribe with TLS to ETa
  • Greyc letters figures:
    - new figure for LaMBDa
    - shows data flows between PHI and YPSilon
    - sets DS and DSeTa in different schemas

Voir les différences:

IoTa-Installer/lib/ephi.py
("Enter the EpcisPHI web application name", "ephi", "name", {}),
("Enter the archive file pathname", "ephi", "repo", {"type": "file"}),
("Enter the path where the policies will be saved", "epcis_policies", "dir", {}), # not "type": "path" as the directories are created
("Enter the URL of the User web service", "user", "url", {})
("Do you want to deploy the default policies?", "ephi", "deploy_policies", {"type": "YN"}),
("Enter the URL of YPSilon", "ypsilon", "url", {})
], [
("xacml_configuration",
{ "query-policy-directory": ("epcis_policies", "query_dir"),
"capture-policy-directory": ("epcis_policies", "capture_dir"),
"admin-policy-directory": ("epcis_policies", "admin_dir") }),
("application",
{ "eta.userservice.url": ("user", "url"),
"pks-filename": ("cert", "jks_keystore"),
{ "ypsilon-url": ("ypsilon", "url"),
"pks-filename": ("cert", "keystore"),
"pks-password": ("cert", "password"),
"trust-pks-filename": ("cert", "truststore"),
"trust-pks-password": ("cert", "trustpassword") })
......
CONFIG.set("epcis_policies", "query_dir",query_dir)
#
utils.putMessage("Initializing policies in " + policies_dir)
utils.sh_mkdir_p(policies_dir)
if utils.sh_exec("tar -C " + policies_dir + " --strip-components=1 -xaf resources/epcis_policies.tar"):
utils.putDoneOK()
else:
utils.putDoneFail()
if (self.cisTrue("deploy_policies")):
utils.putMessage("Initializing policies in " + policies_dir)
utils.sh_mkdir_p(policies_dir)
if utils.sh_exec("tar -C " + policies_dir + " --strip-components=1 -xaf resources/epcis_policies.tar"):
utils.putDoneOK()
else:
utils.putDoneFail()

Formats disponibles : Unified diff