NOTE: SOME FUNCTIONALITY EMPLOYS JAVASCRIPT WASD Install and Update – New to WASD? Start Here!

WASD Install and Update

1.New to WASD? Start Here!

1.1Using IA64-hosted X86 Cross-Complier?
1.2Troubleshooting?
Welcome!

WASD is outlined in the Introduction and Package Overview sections of the WASD Features document.

There are a number of approaches to installing and updating a WASD package.
The vanilla recipes are 2. Installation and 3. Update but there are 5. Other Ways to Deploy.

This section provides a quick guide to getting your WASD package installed, configured and serving.

  1. Unzip Package

    Install the files following the guidelines in 2. Installation.
    Note that more than one archive may be needed (‘Source Archive, Object Module Archives’ in 2.1 Package UNZIP).

    Building an SSL-capable version of the server is a common requirement.

    As described in VSI OpenSSL SSL111-V0101-1S and SSL3-V0300-7 it is now possible to install VSI OpenSSL releases on pre-V8.4 VMS. This is the recommended approach to providing and maintaining OpenSSL for WASD.

    WASD SSL is discussed in detail in Transport Layer Security of WASD Features and Facilities.

  2. INSTALL Package

    Server installation is performed using the INSTALL.COM procedure (2.9 INSTALL.COM Procedure).

  3. Configure Package

    Following the execution of the INSTALL.COM procedure the package should require only minor, further configuration.

    Initially two files may require alteration.

    1. The startup file, possibly to set the local WASD_CONFIG_GMT logical (for systems not supporting DTSS (e.g. DECnet-Plus)). Consider using the STARTUP_LOCAL.COM file for other site-specific requirements (4.3 Account Support Files).
    2. The only configuration that should require immediate attention will be the mapping rules (Request Processing Configuration in WASD Configuration).

    More generally server runtime configuration involves the considerations discussed in Site Organisation of WASD Configuration along with the following aspects:

  4. Start Server

    Execute the startup procedure (‘STARTUP.COM’ in 4.3 Account Support Files). Get your browser and connect!

  5. Find Out What's Wrong

    Of course something will not be right! This can happen with the initial configuration and sometimes when changing configuration. The server provides information messages in the run-time log, look in the WASD_ROOT:[LOG_SERVER] directory.

    Remember, the basic installation's integrity can always be checked as described in 2.10 Quick-Check). This uses the configuration files from the [EXAMPLE] directory, so provided these have not been altered the server should execute in demonstration mode correctly.

    Can't resolve it? See 2.12 Reporting Problems.

1.1Using IA64-hosted X86 Cross-Complier?

While native X86 C compiler releases mean compiling on the target system is possible, the IA64 cross-compiler is still a viable option.

  1. cross-compile on an IA64 system
  2. link resulting object file(s) on the X86 system

When building using the cross-compiler tools the procedures recognise the XCC$COMPILER environment and adjust to create and use [.OBJ_X86_64] object code directories.

For example; to build WASD package:

  1. On IA64 ensure @SYS$MANAGER:X86_XTOOLS$SYLOGIN.COM and then select "3. Compile only" and complete the compilation.
  2. On X86 perform the corresponding "2. linking (separate package) object modules", and continue the rest of the installation.

1.2Troubleshooting?

When initially installing or configuring WASD, and sometimes later where something breaks spectacularly, it is most useful to be able to gain insight into what the server is up to.

The go-to tool is  WATCH  (yes, all capitals, and for no other reason than it makes it stand out).

WATCH is described in detail in WATCH Facility of the WASD Features and Facilities document.

For most circumstances WATCH can be made available for troubleshooting even if the configuration is significantly broken. This is done by using a skeleton-key to authorise special access into the server.

The skeleton-key is described in detail in Skeleton-Key Authentication of the WASD Features and Facilities document.

TL;DR

Enable at the command-line with the username anything beginning with an underscore and at least 8 characters, same for the password length.

$ HTTPD /DO=AUTH=SKELKEY=_username:password

Then using a browser access any available service, entering the above username (including underscore) and password when prompted.

https://the.host.name:port /httpd/-/admin/report/WATCH

The service administration facilities (of which WATCH is one) are also available and useful.

https://the.host.name:port /httpd/-/admin/