[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Increase size of IFS file received in http_url_post
Sender: "Stoicescu, Adriana" <astoicescu@xxxxxxxxxx>
We have included in our application a call to http_api_post in order to send
and receive XML documents. The problem is that the received IFS file is
truncated in either case, the file created by your API or the file created
before calling the API. We have checked your source and we cannot find the
spot where we could increase or specify the file size or the method of doing
it.
Could you please help us?
Adriana Stoicescu
Analyst-programmer
UTI, United States, inc.
-----Original Message-----
From: owner-ftpapi@xxxxxxxxxxxxx [mailto:owner-ftpapi@xxxxxxxxxxxxx] On
Behalf Of Scott Klement
Sent: Friday, February 11, 2005 8:50 AM
To: ftpapi@xxxxxxxxxxxxx
Subject: Re: Authorities in the IFS (DCM)
Sender: Scott Klement <sk@xxxxxxxxxxxxxxxx>
> We are experiencing some difficulties in authorities in the IFS which
appear
> to be random, but I am sure they are not.
> We use Scotts httpapi in ssl mode, which in turn evokes a usage of the
DCM.
> The path to the DCM is:
> /QIBM/USERDATA/ICSS/CERT/SERVER/DEFAULT.kdb
That's the path of the key database in the *SYSTEM certificate store.
You're right that this is part of the DCM, but it's not all of it.
> Changing the *PUBLIC authorities for server and default fixes the problem.
>
> My question is, why do we not get this error for all Users ? Our
experience
> is something like 50/50 get/do not get/ the error.
Is it possible that these other users are using certificates that are not
in the *SYSTEM certificate store?
Another thought: Maybe they've got group access to the file? Every file
in the IFS has 3 levels of authority: Owner, Group & Public. You said
that the file is *PUBLIC *EXCLUDE, so that rules out "Public". And they
can't ALL be the owner of the file. So, that leaves group...
You can use QShell to see who the owners are and what their level of
authority is:
STRQSH
ls -l /QIBM/UserData/ICSS/CERT/SERVER/DEFAULT*
This should show something like:
-rwxrwxr-x 1 QSECOFR QSYS 110080 Oct 8 17:54
/QIBM/UserData/ICSS/CERT/SERVER/DEFAULT.KDB
-rwxrwxr-x 1 QSECOFR QSYS 5080 Aug 5 2004
/QIBM/UserData/ICSS/CERT/SERVER/DEFAULT.RDB
In this example, the owner is QSECOFR and the group is QSYS. At the start
you see '-rwxrwxr-x' that indicates the permissions for the three
different classes of users. The first 3 'rwx' is QSECOFR's permissions to
the file. He's got read, write and execute. The next 3 are QSYS's
authorites 'rwx' again, meaning read/write/execute. The last 3 are the
public's authorities. 'r-x' means read & execute (but not write!)
> There may be something else that affects the access to default.kdb other
> than the authorities I have described above.
> I note that QSYS retains all rights. Is it possible that some users are
> adopting QSYS ?
Adopted authority won't work in the IFS. However, user profile swapping
would work. Or, having QSYS assigned as their group profile or a
supplemental group would also work.
-----------------------------------------------------------------------
This is the FTPAPI mailing list. To unsubsribe from the list send mail
to majordomo@xxxxxxxxxxxxx with the body: unsubscribe ftpapi mymailaddr
-----------------------------------------------------------------------
-----------------------------------------------------------------------
This is the FTPAPI mailing list. To unsubsribe from the list send mail
to majordomo@xxxxxxxxxxxxx with the body: unsubscribe ftpapi mymailaddr
-----------------------------------------------------------------------