wsmancli/README

196 lines
8.1 KiB
Plaintext
Raw Normal View History

How to compile and run openwsman from Subversion?
===============================
After checking out the project from subversion run ./autoconfiscate in the TOP directory and
follow that by running ./configure <options>.
If you download a packaged version, then there is no need to run ./autoconfiscate and you will
be able to run ./configure directly.
Most likely you will need to install some of the packages, depending on the distribution
you are running.
Packages and other software needed:
- libxml2
- sfcc (from the sblim project)
- swig and python for python binding support
- other development packages like autoconf, automake etc.
After all packages are installed, compile everything and install. The server can run as
a daemon, which would require root access; But it can be run in the foreground with debugging
messages printed to stdout as well. This the help output when you run:
% /usr/local/sbin/openwsmand --help
Usage:
openwsmand [OPTION...] WS-Management Server
Help Options:
-?, --help Show help options
Application Options:
-n, --no-plugins Do not load any plugins
-d, --debug Start daemon in foreground and turn on debugging
-s, --syslog=0-6 Set the verbosity of syslog output.
-c, --config-file=<file> Alternate configuration file
Starting from version 0.1.1 a configuration file is needed. you can find an example in the
./etc directory. The configuration file has the following syntax:
[server]
port = 8889
#ssl_port = 8888
ssl_cert_file = /etc/openwsman/servercert.pem
ssl_key_file = /etc/openwsman/serverkey.pem
#digest_password_file = /etc/openwsman/digest_auth.passwd
basic_password_file = /etc/openwsman/simple_auth.passwd
enum_idle_timeout = 5000
min_threads = 1
max_threads = 1
#use_digest is OBSOLETED, see below.
#
# Authentication backend for BASIC authentication. Default is to read a configuration file defined with 'basic_password_file'
#
#basic_authenticator = libwsman_pam_auth.so
#basic_authenticator_arg = openwsman
[client]
port = 8889
agent = openwsman 1.5.9
[cim]
default_cim_namespace = root/cimv2
# The following are in part fake namespaces for some publicly available CIM implementations.
vendor_namespaces = OpenWBEM=http://schema.openwbem.org/wbem/wscim/1/cim-schema/2,Linux=http://sblim.sf.net/wbem/wscim/1/cim-schema/2,OMC=http://schema.omc-project.org/wbem/wscim/1/cim-schema/2,Reef=http://reef.sblim.sf.net/wbem/wscim/1/cim-schema/2,CWS=http://cws.sblim.sf.net/wbem/wscim/1/cim-schema/2
To be able to put the configuration files under /etc/openwsman, run the configure script
with the --sysconfdir option using the value /etc. If this option is not used, the default will
be under PREFIX (/usr/local/etc ).
To run in SSL mode you need to enable the SSL port and create certificates and adapt the configuration
with the correct path to the files.
To start the server in the foreground, run:
% /usr/local/sbin/openwsmand -d
You can also specify the configuration file to be used on the command line using the -c option.
On the client side, which has the following options
% /usr/local/bin/wsman --help-all
Usage:
wsman [Option...] <action> <Resource Uri>
Usage:
wsman [Option...] <action> <Resource Uri>
Help Options
-?, --help
--help-all Show help options
--help-enumeration Enumeration Options
--help-tests Test Cases
--help-cim CIM Options
--help-flags Request Flags
--help-event Subscription Options
Enumeration
-m, --max-elements=<max number of elements> Max Elements Per Pull/Optimized Enumeration
-o, --optimize Optimize enumeration results
-E, --estimate-count Return estimation of total items
-M, --enum-mode=epr|objepr Enumeration Mode
-U, --enum-context=<enum context> Enumeration Context (For use with Pull and Release)
Tests
-f, --from-file=<file name> Send request from file
-R, --print-request print request on stdout
-Q, --request Only output reqest. Not send it.
-S, --step Do not perform multiple operations (do not pull data when enumerating)
CIM
-N, --namespace=<namespace> CIM Namespace (default is root/cimv2)
-B, --binding-enum-mode=none|include|exclude CIM binding Enumeration Mode
-T, --cim-extensions Show CIM Extensions
-W, --references CIM References
-w, --associators CIM Associators
Flags
-x, --filter=<filter> Filter
-D, --dialect=<dialect> Filter Dialect
-t, --operation-timeout=<time in sec> Operation timeout in seconds
-e, --max-envelope-size=<size> maximal envelope size
-F, --fragment=<fragment> Fragment (Supported Dialects: XPATH)
Event subscription
-G, --delivery-mode=<mode> Four delivery modes available: push/pushwithack/events/pull
-Z, --notification-uri=<uri> Where notifications are sent
-r, --subscription-expiry-time=<seconds> subscription expiry time in seconds
-H, --heartbeat=<seconds> Send hearbeat in an interval
-l, --bookmark Send bookmark
-i, --subscription-identifier=<uuid:XXX> Used to specify which subscription
-L, --notify-reference-properties=<xs:anyURI> Notify Reference Properties
Application Options
-d, --debug=1-6 Set the verbosity of debugging output.
-c, --cacert=<filename> Certificate file to verify the peer
-A, --cert=<filename> Certificate file. The certificate must be in PEM format.
-K, --sslkey=<key> SSL Key.
-u, --username=<username> User name
-g, --path=<path> Path
-J, --input=<filename> File with resource for Create and Put operations in XML, can be a SOAP envelope
-p, --password=<password> Password
-h, --hostname=<hostname> Host name
-b, --endpoint=<url> End point
-P, --port=<port> Server Port
-X, --proxy=<proxy> Proxy name
-Y, --proxyauth=<proxyauth> Proxy user:pwd
-y, --auth=<basic|digest|gss> Authentication Method
-a, --method=<custom method> Method (Works only with 'invoke')
-k, --prop=<key=val> Properties with key value pairs (For 'put', 'invoke' and 'create')
-C, --config-file=<file> Alternate configuration file
-O, --out-file=<file> Write output to file
-V, --noverifypeer Not to verify peer certificate
-v, --noverifyhost Not to verify hostname
-I, --transport-timeout=<time in sec> Transport timeout in seconds
To create a password file, use the htpasswd and htdigest utilities from the apache distribution.
You can connect to the server with the following command, which is part of the DMTF WS-Management specification (Draft)
wsman identify -h <hostname> --port 8889 -u wsman --password secret
The above command should give the following result:
<?xml version="1.0" encoding="UTF-8"?>
<s:Envelope xmlns:s="http://www.w3.org/2003/05/soap-envelope" xmlns:wsmid="http://schemas.dmtf.org/wbem/wsman/identity/1/wsmanidentity.xsd">
<s:Header/>
<s:Body>
<wsmid:IdentifyResponse>
<wsmid:ProtocolVersion>http://schemas.dmtf.org/wbem/wsman/1/wsman.xsd</wsmid:ProtocolVersion>
<wsmid:ProductVendor>openwsman</wsmid:ProductVendor>
<wsmid:ProductVersion>2.0.0</wsmid:ProductVersion>
</wsmid:IdentifyResponse>
</s:Body>
</s:Envelope>