This section describes additional configuration settings for SOAtest and Virtualize available in the Parasoft > Preferences menu.

Browser Settings

The Browser panel lets you set options related to Web scenario recording. Available settings include:

  • Firefox Executable Path: Specifies the path to the Firefox executable. On Windows machines, SOAtest and/or Virtualize will attempt to detect a Firefox installation automatically. Linux users will have to browse to the Firefox executable.

  • Chrome Executable Path: Specifies the path to the Chrome executable. Paths set here will be used in web recording wizards and other applicable areas. On Linux, choose google-chrome (e.g. /opt/google/chrome/google-chrome)—not chrome.
  • Safari Executable Path: Specifies the path to the Safari executable.
  • Proxy port: Specifies the proxy port. See Proxy Configuration Details below for more information and tips.
  • Browser communication port: Specifies the browser communication port.
  • Browser Timeout Settings: Specifies the length of delay (in seconds) after which SOAtest and/or Virtualize should stop waiting for browser startup or a user action and consider it to be "timed out."

  • Wait Condition Default Timeout Settings: Specifies the length of delay (in seconds) after which SOAtest and/or Virtualize should stop waiting for the activity specified in the wait condition to occur and consider it to be "timed out."

  • Debug Options> Print debugging information: During recording of a web scenario, it is possible that an action taken is not recorded by SOAtest and/or Virtualize. Enabling this option will allow messages to be printed to the message console during recording, with information about what events SOAtest and/or Virtualize handled, any locators that may have been generated, and if applicable, any exceptions that took place during recording.

  • Allowable Binary Files in Traffic Viewer and Outputs: Allows binary files with the specified extensions or MIME types to be used in the Traffic Viewer and output. By default, only text files will be allowed.

Proxy Configuration Details

When you record or run web scenarios in a browser, the proxy settings in the browser are set to an internal proxy maintained by SOAtest and/or Virtualize. All communication to and from the browser during recording and playback goes through the internal proxy, which is an intermediary used to capture traffic and otherwise facilitate execution. During recording and playback, SOAtest and/or Virtualize temporarily creates this proxy on localhost using the port specified by the Browser Playback setting’s Proxy port option.

The default host and port for the internal proxy is localhost:55555. Change the port number if this port is already in use using the controls Proxy port field. Do not change this from within the browser.

If your machine is configured to use your own proxy, you should configure SOAtest and/or Virtualize to point to that proxy. This enables SOAtest and/or Virtualize to configure its internal proxy to forward all traffic to the specified proxy configured in Proxy Settings.

Console Settings

The Console panel allows you to determine the amount of information that is reported to the Console view and whether it is automatically activated when it contains messages.

Continuous Testing Platform Settings

If you have Continuous Testing Platform (CTP) and a valid license, you can configure your connection to CTP:

  • Use DTP settings: Enable this option to use the connections settings specified in DTP. See Connecting to DTP
  • Server Name: Specifies a name for the server you are connecting to CTP. This is the name that will be used to identify this server within CTP.
  • CTP URL: Specifies the location of the CTP to which you are connecting (e.g., http://emdemo:8080).
  • Notify CTP of virtual asset deployment: Determines whether the  server notifies Parasoft CTP when virtual assets are first deployed.

  • Username: Specifies the username for logging into CTP.
  • Password: Specifies the password for logging into CTP.

    If OpenID Connect authentication is enabled, the Username and Password fields do not appear. Instead, you will see a notice that OIDC authentication is in use with a button to test that connection.

Date Time Format

The Date Time Format panel allows you to specify formats that the application should use to determine whether a string value represents a date/time and, if so, how to parse it. This is particularly useful if you are planning to generate inline expressions for message responders (see Extracting Request Values to Populate Responses).

To add a new date-time format, click Add and enter the format using standard Java date formatting. You can also Modify or Remove a format.

Formats are considered in the order that they appear in the table and the first match found is used. To change the order within the table, select a format and click Move Up or Move Down.

Global Data Source Settings

Global data sources can be reused and shared across Virtualize deployments. The Global Data Source panel lets you determine how information about global data sources is saved. For information on how to configure global data sources, see Adding a Data Source at the Suite, Project, or Global Level.

Technical Support Settings

Use the Technical Support interface to create a zip archive containing the related files if you are experiencing issues. Send the zip file to Parasoft's support team so that they can assist you. Virtualize can automatically create an archive when problems occur.

 Archives are approximately half a megabyte and are created in about 60 seconds.

By default, an archive is not created when problems occur. You can either manually prepare and send a support archive when needed, or you can modify Parasoft  archive creation options so that the product automatically prepares and sends an archive when problems occur.

To configure the product  to automatically prepare and send archives when problems occur:

  1. Open the Technical Support panel by choosing Parasoft> Preferences, then selecting the Parasoft> Technical Support category.
  2. Check Enable auto-creation of support archives.
  3. Customize additional options as needed. Note that Enable auto-creation of support archives and Send archives by email are not applicable to Virtualize.
  4. Click Apply, then OK.

To manually create a support archive:

  1. Choose Parasoft> Preferences and click the Technical Support category
  2. Choose your archive options and click Create Archive.

To open the Technical Support Archive Manager, which allows you to review, e-mail, or delete recent support archives:

  1. Choose Parasoft> Preferences and click the Technical Support category
  2. Click Browse Recent Archives.

Enabling Debug Logging

You can add the following system properties when starting Virtualize from the command line to enable debug logging and to ensure that the all relevant information is included when creating a support archive.

PropertyDescription
parasoft.logging.config.jar.file 

Specifies the preconfigured JAR file shipped withVirtualize that contains logging settings. This is the recommended property to use for enabling logging.

Example:

-J-Dparasoft.logging.config.jar.file=/com/parasoft/xtest/logging/log4j/config/verbose.console.xml
parasoft.logging.config.file 

Specifies a log4j configuration file on disk. Use this system property if you have your own log4j configuration file and are unable to use the parasoft.logging.config.jar.file property, such as configuring server deployments. 

Example:

-J-Dparasoft.logging.config.file=<PATH_TO_LOG4J_CONF_FILE>

MIME Type Settings

The MIME Types panel lets you add and remove MIME types. In addition, it lets you specify the location of your preferred text and XML editors and lets you specify what editor you want to use to edit all files that have a particular MIME type.

To add, edit, or remove a MIME type:

  • To add a MIME type, click Add MIME Type, enter the new MIME type in the dialog box that opens, then enter the file extensions that you want to assign to this MIME type, and (optionally) indicate the implied MIME type by checking the appropriate check boxes. If you enter multiple extensions for a MIME type, separate the extensions with one space character.
  • To edit a MIME type’s settings, select the MIME type whose settings you want to edit, then modify the settings as needed.
  • To remove a MIME type, select the MIME type that you want to remove, then click Delete MIME Type.

Miscellaneous Settings

The Misc panel allows you to set the following miscellaneous settings:

  • Show tool descriptions: Enables/disables showing tool descriptions in applicable wizards. 
  • Character Encoding: You can enable System default to configure SOAtest and/or Virtualize to use the default character set for the particular system being used. Enable Custom to encode characters from the list of encodings available on the JVM being used.
  • Save settings: Specifies what file format to use for saving project files (e.g., .pva, .pvn,  .changetemplate). See Understanding the Available Project File Formats.

  • Default timeout (milliseconds): Allows you to enter the length of delay (in milliseconds) after which SOAtest should consider your FTP, telnet, or HTTP requests to be “timed out.” The default is 30000 milliseconds.
  • Report each duplicate error that occurs on the same line: Tells SOAtest to show only the first instance of duplicate errors that occur for the same line of code.
  • Reset Cookies: Allows you to clear the current global cookies so that next HTTP invocations start a new session.
  • Enable the Automatically backup project files option and specify a file size threshold for .tst and/or .pva files in the Warn on file size large than (MB) field to be notified when the size of the file exceeds the threshold. You can then reduce the size (and prevent performance problems) by dividing it into smaller files.

OpenID Connect

The OpenID Connect panels allows you to configure the application to authenticate users via your OpenID Connect server.

  1. Go to Parasoft > Preferences and select OpenID Connect.
  2. Check Enable.
  3. Configure the following options:
    • Issuer URI: The URI of your OpenID Connect server.
    • Client ID: The ID registered on your OpenID Connect server.
    • Client Secret: The application's password to the OpenID Connect server.
    • Scopes: A space-separated list of scopes used during authentication to authorize access to a user's details.
    • Callback host: The local callback host required to communicate with the OpenID Connect server. The following options are available:
      • localhost: The localhost address will be used for communication.
      • 127.0.0.1: The loopback IP address 127.0.0.1 will be used for communication.
    • Callback port: The callback port number for communication with the OpenID Connect server. The following options are available:
      • Automatically select an open port: Automatically selects an open port (recommended).
      • Use port: Allows you to manually specify the port number.
    • Callback timeout: Specifies, in seconds, the maximum time the browser will wait for user credentials.
  4. Click Test Authentication or Apply to open the OpenID Connect authentication page in your browser.
  5. Provide your credentials in the browser window that opens.
  6. Close the browser window when the authentication confirmation appears and continue in the application.
  7. Click Apply to apply the changes.

The Status panel shows the current OpenID Connect authentication status.

Azure Active Directory users: Enter the redirect URL configured above under "Mobile and desktop applications" in Azure AD. For example, if Callback host is set to "localhost" and Callback port is set to "Automatically select an open port" (the default values), you would enter "http://localhost/oauth2_callback" for the callback URL in Azure AD.

Proxy Settings

The Proxy panel controls how SOAtest and/or Virtualize works with proxy servers. It does not control the separate intermediary proxy used for web scenarios (for details on this other proxy, see Proxy Configuration Details). 

  • If Windows and IE (which use the same settings) are configured to properly use the proxy to access the relevant websites, select Use system proxy configuration.
  • Otherwise, select Enable proxy and manually enter the correct settings. These settings should be equivalent to what you would use in the browser outside of SOAtest/Virtualize.

    • To use an automatic configuration script, select Use automatic configuration script, then enter the proxy address in the Address field.
    • If you want to use the same proxy server for all protocols, check the Same proxy server for all protocols check box, then enter the address and port of the proxy server you want to use in the Proxy Address and Proxy Port fields.
    • If you want to use different proxy servers for different protocols, clear the Same proxy server for all protocols check box, then enter the address and port of each proxy server you want to use in the Proxy Address and Proxy Port fields.
    • If your proxy server requires authentication, check the Enable proxy authentication check box, then enter a valid user name and password in the Username and Password fields.
    • If you want to allow Web traffic from designated IP addresses to pass through directly (avoiding the proxy), enter those IP addresses in the Proxy Exceptions text field. If you enter multiple addresses, use a semicolon (;) to separate the entries.
    • The Proxy Address value should be a URL to the script: either an HTTP(S) URL or a file URL. File URLs should be formatted as "file:///" followed by the file system path where the proxy autoconfiguration script lives. For example, on Windows this could be file:///c:/Users/user/scripts/proxy.pac. On Linux, it might be file:///home/machine/scripts/proxy.pac.

HTTP proxies that do not require authentication can be used while managing remote SOAtest and Virtualize servers. HTTP proxies that require authentication will not be applied when adding a remote SOAtest or Virtualize server to the server tree.

Scripting Settings

The Scripting panel allows you to specify properties used for custom scripts.

    • Java: For Java, you can specify the Java home directory and the path to the javac compiler. You need to specify these parameters if you want to compile Java methods in the editor.   

      Note

      The javac compiler is not included.

      • Java home: Specifies the Java installation directory.
      • Javac classpath: Specifies the Java classpath.
    • JavaScript: If you create scripts using JavaScript, you can specify a script template in the Script Template field.
      • Script Template: Whatever code is specified in this field will be used as the default code for inlined scripting in the language with which the field is associated. This is primarily useful for setting default inputs and common global variables. Script templates apply to scripts used in Extension tools; they do not apply to JavaScript that runs in a browser context.
    • Jython: If you are using Jython scripts, you can specify the Jython Path variable. Jython scripting support can be used without setting this variable by specifying a script template in the Script Template field.

      • Jython Path: Specifies a list of directories to search for python modules that are not already included with Jython. Separate multiple directory paths using the OS default path separator (";" for Windows and ":" for Linux and macOS). If you set the Jython path then you need to restart SOAtest or Virtualize for the change to take effect.
      • Script Template: Code specified in this field sets a default template for Jython scripts used in the tool.
    • Timeout Settings: Specify how many minutes SOAtest or Virtualize should wait before attempting to stop an unresponsive script and log an error message.

Security Settings

You can configure default security settings for Responders used in your projects. In most cases, the security settings can be overridden by configurations set locally in your suites:

Global HTTP Authentication Properties

Configure global HTTP authentication properties that can be used when configuring HTTP protocols within an applicable tool.

  1. Enable the Perform Authentication option and enter the Username and Password to authenticate the request
  2. Choose the authentication type from the drop-down menu. Supported types are Basic, NTLM, Kerberos, or Digest.
  3. If you are using Kerberos authentication, enter the Service Principal to authenticate the request. If the correct username and password, or the correct service principal, are not used, the request will not be authenticated.
    1. Kerberos realm: Specify the Kerberos realm associated with your network. By convention, this is typically your domain name in all caps (e.g. PARASOFT.COM).
    2. KDC server: Specify the hostname of your Key Distribution Center (e.g. kdc.parasoft.com).
    3. Check Ticket: This will execute a simple test to locate a cached Kerberos TGT (Ticket Granting Ticket) to grant access to the service. SOAtest and/or Virtualize will not be able to communicate with the service if it cannot first locate a valid TGT. For more information about Kerberos, see Configuring Kerberos Authentication.

About Kerberos Authentication

Kerberos authentication is known as a trusted third-party authentication mechanism. A client requests access to a service not directly, but from another service: the Key Distribution Center, which manages network-wide authorization. This mechanism facilitates Single Sign-On (SSO) so that a client need only provide authorization credentials once in a given time period (usually 8-10 hours). The authorization is granted in the form of a ticket which can then be cached and reused throughout the granted time period without re-authenticating.

Entities in a Kerberos-protected network, such as clients and servers, are known as principals. The network-space that Kerberos protects is known as a realm. Microsoft's IIS (Internet Information Services) Server provides HTTP-based services with Kerberos through the Negotiation protocol. Other server vendors provide their own implementations of Microsoft's Negotiate protocol.

The ticket that is received upon initial authentication is known as a Ticket Granting Ticket, or TGT. For example, in a Windows environment, the TGT is generated when first logging on to the workstation in the morning. SOAtest and/or Virtualize authorizes itself to use a Kerberos-protected service by retrieving a user's TGT from the system cache.

Avoiding Common Kerberos Errors

Configuring Kerberos Authentication for Tools

  1. Select the tool for which you intend to use Kerberos authentication.
  2. Select the Transport tab and select Security from the left pane of the Transport tab. 
  3. Configure the following options from the security panel of the Transport tab:
    1. Perform Authentication: Select this option to activate authentication.
    2. Use Global Preferences: Select this option if you have authentication properties setup in Security Preferences.
    3. Type: Select Kerberos to perform Kerberos Authentication.
    4. Service Principal: Specify the name of the service/server as defined in the Kerberos database (e.g. HTTP/soatest.parasoft.com).

Now when you invoke your tool, the required Negotiate token will automatically be generated and send as an HTTP header. Kerberos provides a mechanism to prevent so-called "replay" attacks where a user tries to provide captured duplicate credentials for a service in order to gain access to them. 

Server Certificate Settings

Enable the Trust all certificates option to accept any certificate. This is useful if you want to load pages whose certificates are not "trusted."

Enable the Use default Java cacerts option to accept only certificates from the standard list of Java-trusted certificate vendors.

Client Key Store Settings

Enable the Use client keystore option to specify settings for both the server side and client side certificates for SSL through the Client Keystore options.

Important

In order to perform operations that use the XML Signature Verifier, XML Signer, or XML Encryption tools, or if using Key Stores, you will need to download and install the Unlimited Strength Java Cryptography Extension. For details, see JCE Prerequisite.

Keystores are specified at the test or responder suite level. If this option is selected, the following options are available in the Certificate and Private Key tabs:

Certificate Tab

  • Use same key store for private key: Select if the Key Store contains private keys for the certificate.
  • Key store file: Specify the key store file by clicking the Browse button and using the file chooser that opens. If you want the path saved as a relative path (for example, to facilitate project sharing), check the Persist as Relative Path option.
  • Key store password: Specify the Key Store password.
  • Key store type: Specify the type of Key Store being used (e.g. JKS, PKCS12, BKS, PEM, UBER)
  • Load: Click to populate the aliases with the available certificates/keys if the path, type, and key store password are valid.
  • Certificate alias: Specify the certificate alias.

Private Key Tab

  • Key store file: (Only available if the Key Store Contains Keys option is unselected in the Certificate tab) Specify the key store file by clicking the Browse button and using the file chooser that opens. If you want the path saved as a relative path (for example, to facilitate project sharing), check the Persist as Relative Path option.
  • Key store password: (Only available if the Key Store Contains Keys option is unselected in the Certificate tab) Specify the Key Store password.
  • Key store type: (Only available if the Use same key store for private key option is unselected in the Certificate tab) Specify the type of Key Store being used (e.g. JKS, PKCS12, BKS, PEM, UBER)
  • Load: Click to populate the aliases with the available certificates/keys if the path, type, and key store password are valid.
  • Private key alias: Specify the private key alias.
  • Private key password: Specify the private key password.

MQ SSL

You can specify the trust store, key store, and key store password for clients that interact with AUTs over MQ SSL. These settings are not applicable to Virtualize. If you need to configure virtual assets that transport MQ messages over SSL, see Configuring Server and Deployment Settings. For details on MQ SSL settings, see IBM WebSphere MQ> SSL.

JCE Prerequisite

SOAtest and Virtualize ship with their own instance of Java that include the Unlimited Strength Java Cryptography Extension so that they can perform security operations that use XML Signature Verifier, XML Signer, XML Encryption tools, and Key Stores. If you installed SOAtest or Virtualize from the update site (see Eclipse p2 Update Site Installation) and are using your instance of Java, you will need to download and install the unlimited JCE if it's not already on your system. Refer to the Oracle website for downloads and documentation. MacOS users should install Java 8 newer than update 161 to get the unlimited JCE.

Server Settings

The Server panel allows you to configure the following settings for the SOAtest and/or Virtualize server. 

  • Start server: Enable this option to automatically start the server when SOAtest and/or Virtualize starts up.  

  • Server port: Specifies the ports that the server use for HTTP/HTTPS.

SOAP Settings

The SOAP panel allows you to specify the following settings:

  • Default Transport: Allows you to set the default transport protocol.
  • Attachment Encapsulation Format: Allows you to choose MIME, DIME, or MTOM, for the default attachment encapsulation. See Working with Attachments for details.

  • SOAP Version: Allows you to select SOAP 1.1 or SOAP 1.2.
  • Outgoing Message Encoding: Allows you to choose the encoding for outgoing messages. You can choose any Character Encoding you wish to read and write files, but the Outgoing Message Encoding provides additional flexibility so you can set a different charset encoding for the SOAP request.

Customizing SOAP Serialization Settings

You can also customize how SOAtest and/or Virtualize serialize the SOAP objects they transmit and deserialize the SOAP messages they receive, but you cannot do so within the Preferences panel.

SOAP messages are deserialized from XML into some native format and objects are serialized into XML format so that they can be sent as responses.

To add a serializer/deserializer pair, you add a line to the register.py file in the <INSTALL_HOME>/plugins/com.parasoft.ptest.libs.web_<version>/root/startup directory. You must programmatically use Jython register Apache Axis-compliant serializers.

For Axis, you can retrieve the TypeMappingRegistry used by calling soatest.api.SOAPUtil.getDefaultAxisRegistry(). After you retrieve that registry, you can use the Axis API to register the serializer as needed.

System Properties Settings

The System Properties panel lets you add JAR files, class folders, and Java projects to the classpath if needed. Use the available controls to add or remove JAR files, class folders, and Java projects. The specified JAR files, classpaths, and Java projects  will be added to the system's classpath and the corresponding classes will be loaded into the JVM after SOAtest or Virtualize is restarted.

Click Reload to force classes from the class path entries to reload.

Enable the Automatically reload classes option if you want SOAtest/Virtualize to reload classes from your Eclipse project after being modified or recompiled.

Adding Jar Files in Bulk and in Headless Instances

If you want to quickly add a large number of jar files—or add jars to a headless instance of your Parasoft solution— copy them into one of the following directories within your workspace:

  • TestAssets/system_jars  

  • VirtualAssets/system_jars
Jar files in those directories will automatically be loaded upon startup or after Reload is clicked in the Preferences page.

On a headless instance, if you want to reload the jars without having to restart SOAtest or Virtualize, call post /v<version>/preferences/systemProperties/reload from the REST API.

Traffic File Processing Settings

The Traffic File Processing panel lets you globally indicate that you want certain values (such as times-tamps) ignored whenever:

  • you are creating parameterized .pvas from traffic, and
  • request body correlations are configured automatically.

Virtualize is automatically configured to ignore timestamps—based on the regular expression [0-9]{4}-[0-9]{2}-[0-9]{2}T[0-9]{2}:[0-9]{2}:[0-9]{2}([.][0-9]{1,3})?(([+-][0-9]{2}:[0-9]{2})|Z)?

You can add or modify exclusions using the table controls. Element names are specified as exact matches or using a wildcard (*) to match everything. Values are specified as regular expressions.

WSDL History

The WSDL panel lets you review or modify the WSDLs that have been used in tools and projects. These WSDLs will be available for selection in relevant drop-down boxes. This way, if you need to specify the same WSDL multiple times, you don’t need to constantly type it in over and over again. 

Enable the Save WSDLs used in message responders, SOAP clients, and projects if you want SOAtest/Virtualize to save tests' or assets' WSDL URIs. If you are using SOAtest only, the option will read Save WSDLs used in SOAP clients and projects. If you are using Virtualize only, the option will read Save WSDLs used in message responders and projects. 

The WSDL URI field lists the WSDL URIs that will be available in tools’ WSDL URI drop down menu. By default, all WSDL URIs used in related tools are added to this list. Click on a URI in the field and click Refresh WSDL to refresh the WSDL from the given location URL and re-parse it.

Enable the WSDL/Schema Parsing section to check all schema locations in order to locate components belonging to a give target namespace. Disable this option to use only the first schema location encountered in order to resolve components for a given target namespace.

XML Conversion Settings

The XML Conversion settings panel lets you register data models for fixed length messages. 

For details on using this setting, see Fixed Length Message Responder.

XML Schema History Settings

The XML Schema History panel lets you review or modify the XML Schemas that have been used in Messaging Clients (SOAtest), message responders (Virtualize), and projects. These Schemas will be available for selection in relevant drop-down boxes. This way, if you need to specify the same Schema multiple times, you don’t need to constantly type it in over and over again.

XML Schema Locations Settings

The XML Schema Locations panel lets you view, add, and remove schema locations.To add a new schema location:

  1. Click the Add button beneath the Namespace and Location columns.
  2. In the dialog that opens, specify the Namespace and Schema Location.
  3. Click OK after you have added all of the necessary locations.

To specify namespaces to skip:

  1. Click the Add button beneath the List of namespaces to skip during XML Validation table.
  2. In the dialog that opens, specify the namespace you want to skip.
  3. Click OK.

To add OASIS XML Catalog Locations:

  1. Click the Add button beneath the OASIS XML Catalog Locations section of the Schema Locations tab. The Location dialog box displays.
  2. Type in the OASIS XML Catalog Location or Browse to it by clicking the Browse button.
  3. Click OK after you have added all of the necessary locations.

Virtualize Settings

There are two ways to define settings files:

  • Enter them manually in a simple text file. There are no name or location requirements. Each setting should be entered in a single line.
  • Export your GUI preferences, then adjust or extend them as needed. To export, choose Parasoft> Preferences, select Parasoft (the root element in the left tree), click the Share link, specify which settings you want to export.

Settings files can specify the following settings.

Licensing Settings

Some of the settings described in this section have been deprecated.

SettingPurpose
virtualize.license.use_network=true|falseDetermines whether the current installation retrieves its license from License Server.
virtualize.license.network.host=[host]

Specifies the machine name or IP address of the machine running License Server Configuration Manager. If your server uses the HTTPS protocol, prepend https:// to the hostname.

This setting is deprecated

virtualize.license.network.port=[port]

Specifies the License Server port number.

This setting is deprecated

virtualize.license.network.user=[username] 

Specifies the username for authentication on the secondary DTP server specified with the license.network.url option.

This options requires the license.network.use.specified.server and license.network.auth.enabled options to be set to true.

Example: license.network.user=JohnDoe

virtualize.license.network.password=[password] 

Specifies the password for authentication on the secondary DTP server specified with the license.network.url option.

This option requires the license.network.use.specified.server and license.network.auth.enabled options to be set to true and the the license.network.user to be configured.

We strongly recommend encoding your password to ensure successful authentication and a secure connection. You can encode your password by running virtualizecli  with the -encodepass flag. 

Example:

virtualizecli -encodepass mypassword 

The command line tool will generate an encoded string that you can use in the configuration file. 

license.network.url=[url]

Specifies the License Server URL. Include the protocol and host name or IP address and, if appropriate, the port number and context path.

Example: https://10.9.1.63:8443

license.network.context.path=[path]

Specifies the path to the DTP License Server. The context path is a relative path from the host name specified with the license.network.host setting. This setting should only be configured if DTP is deployed to a location other than the root of the host server, which may be the case if your organization uses a reverse proxy.

Configuring the context path is not supported for standalone License Server.

Refer to the DTP documentation for additional information about reverse proxy server configuration and context path configuration. 

This setting is deprecated.

license.network.auth.enabled=true|false 

Enables or disables authentication on the secondary DTP server specified with the license.network.url option.

This option requires the license.network.use.specified.server option to be set to true.

license.network.use.specified.server=[true|false]

This option enables Virtualize to connect to either DTP and License Server, or two instances of DTP simultaneously.

Set to false if you want to retrieve a license from the DTP server specified with Parasoft DTP Settings

If set to true, Virtualize will retrieve a license from the server specified with the license.network.url option. 

virtualize.license.network.edition=[edition_name]

Specifies the type of license that you want this installation to retrieve from LicenseServer.

[edition_name] can be server_edition. To use a custom edition, do not set anything after the "="; simply leaving the value empty.

Example:

virtualize.license.network.edition=desktop_edition

virtualize.license.network.edition=server_edition

virtualize.license.autoconf.timeout=[seconds]Specifies the maximum number of seconds this installation will wait for the license to be automatically configured from LicenseServer. Default is 10.
virtualize.license.
local.expiration=[expiration]
Specifies the local license that you want this installation to use.
virtualize.license.local.password=[password]Specifies the local password that you want this installation to use.
virtualize.license.wait.for.tokens.time=[time in minutes]

Specifies the time that this installation will wait for a license if a license is not currently available. 

For example, use virtualize.license.wait.for.tokens.time=3 to configure Virtualize to wait three minutes for a license token to become available. 

See Manually Adding the License to localsetttings for additional notes and examples.

Virtualize Settings

SettingPurpose
server.startupDetermines whether the server is automatically started upon Virtualize startup.
server.port.httpSpecifies the port that the Virtualize Server uses for HTTP.
server.port.httpsSpecifies the port that the Virtualize Server uses for HTTPS.
server.port.monitoringSpecifies the port that the Virtualize Server uses for monitoring.
system.properties.class-
path=[path1];[path2];[path3] ...

Specifies which jar files and class folders are in the classpath. 

For example: system.properties.classpath=C\:\\myjars\\myLib1.jar;C\:\\myjar s\\myLib2.jar

scripting.timeout.minutesSpecifies the number of minutes after which Virtualize will attempt to stop an unresponsive script and log an error message.
scripting.jython.pathUsed to add a list of directories to search for python modules that are not already included with Jython. Multiple paths can be listed using the OS default path separator (";" for Windows and ":" for Linux and macOS).
parasoft.event.monitoring.broker.portSpecifies the port number for the event monitor. Add this setting to the JVM arguments. If you don't set this property, port 9617 is used by default. If the default number is being used by another application, the even monitor will scan for open ports incrementally starting with the default.
parasoft.server.statistics.broker.portSpecifies the port number for the server statistics collector. Add this setting to the JVM arguments. If you don't set this property, port 9618 is used by default. If the default number is being used by another application, the statistics broker will scan for open ports incrementally starting with the default.
parasoft.mq.environment.ccsidSpecifies a CCSID to connect ot he MQ queue manager. Contact your MQ administrator for additional information.
datasources.jdbc.classpath=[path1];[path2];[path3] ...

Specifies the location of JDBC driver jar files and class folders.

Special characters (spaces, slashes, colons, etc.) must be escaped; for instance:

%20 = SPACE

%3A = :

%5C = \

%7B = {

%7D = }

%24 = $

If listing multiple jars, use \n as a delimiter.

For example,
C:\temp\with
space\${example}\jar.jar

becomes

C%3A%5Ctemp%5Cwith%20space%5C$2 4%7Bexample%7D%5Cjar.jar\n

traffic.wizard.xpath.ignores

Lets you globally indicate that you want certain values (such as times-tamps) ignored whenever:

  • you are creating parameterized .pvas from traffic, and
  • request body correlations are configured automatically.

Exclusions are specified in the format

traffic.wizard.xpath.ignores=[element name 1]:[value pattern 1];[element name 2]:[value pattern 2];[element name 3]:[value pattern 3]

For example:

traffic.wizard.xpath.ignores=*:[0-9]{4}-[0-9]{2}-[0-9]{2}T[0-9]{2}:[0- 9]{2}:[0-9]{2}([.][0-9]{1,3})?(([+-][0-9]{2}:[0- 9]{2})|Z)?;uuid:[a-fA-F0-9]{8}-[a-fA-F0-9]{4}-[a-fA-F0-9]{4}-[a-fA-F0-9]{4}-[a-fA-F0-9]{12}

Note that when the backslash character (\) is used in the regular expression, it needs to be escaped.  For example, the regex [\d], which represents a single digit, would be entered as  [\\d].

Continuous Testing Platform Settings

SettingPurpose
env.manager.server

Specifies the location of the CTP server. Required

Example: env.manager.server=http://em_hostname:8080/

env.manager.server.name

Specifies the name that will be used to label this server on CTP. You can use whatever value will help you identify this server. Optional

Example: env.manager.server.name=MyVirtServerLabel

env.manager.notify

Determines whether the Virtualize server notifies Parasoft CTP when virtual assets are deployed. Optional

Example: env.manager.notify=true

env.manager.username

Specifies the username for logging into CTP. Optional

Example: env.manager.username=me

env.manager.password

Specifies the password for logging into CTP. Optional

Example: env.manager.password=12345

Miscellaneous Settings

Some of the settings described in this section have been deprecated.

SettingPurpose
dtp.autoconfig=true|false

Enables autoconfiguration with Parasoft Test settings stored on the DTP server.

Default: false

dtp.enabled=true|false

Determines whether the current Parasoft Test product is connected to DTP.

Default: false

dtp.url=[url]Specifies the URL of the DTP server. Include protocol and host name or IP address and, as appropriate, port and context path.
dtp.server=[host]Specifies the host name of the DTP server. This setting is deprecated.
dtp.port=[port]Specifies the DTP server port. This setting is deprecated.
console.verbosity.level=low|normal|high

Specifies the verbosity level for the Console view. Available settings are:

low: Configures the Console view to show errors and basic information about the current step’s name and status (done, failed, up-to-date).

normal: Also shows command lines and issues reported during test and analysis.

high: Also shows warnings.

parallel.mode=Manual|Auto|Disabled

Determines which of the following modes is active:

  • Auto: Allows the product to control parallel processing settings.
  • Manual: Allows you to manually configure parallel processing settings to suit your specific needs.
  • Disabled: Configures the product to use only one of the available CPUs.
parallel.max_threads=<number>

Specifies the maximum number of  parallel threads that can be executed simultaneously. The actual number of parallel threads is determined based on the number of CPUs, available memory, and license settings.

parallel.free_memory_limit=<percentage>Specifies the amount of memory that should be kept free in low memory conditions (expressed as a percentage of the total memory available for the application). This is used to ensure that free memory is available for other processes.
parallel.no_memory_limit=true|falseIndicates that you do not want to place any restrictions (beyond existing system limitations) on the memory available to the product.
tasks.clear=true|falseClears existing tasks upon startup in cli mode. This prevents excessive time being spent "loading existing results." The default is true.
security.trust.all.certificates=true|falseTells Virtualize that you want it to accept any certificate. This is useful if you want to load pages whose certificates are not "trusted."
security.use.default.java.cacerts=true|falseTells Virtualize that you want it to accept only certificates from the standard list of Java trusted certificate vendors.

Manually Adding the License to Setttings

To add or change license settings via settings:

  1. If you will be using a custom edition license, define the appropriate license features in the settings as follows:
    [product].license.custom_edition_features= All enabled features
    Note that license feature settings apply only to custom edition licenses.
  2. Define the main license settings in the settings as follows:

    virtualize.license.network.edition=[Type of license edition] 
    virtualize.license.use_network=[Value (true or false)] 
    license.network.url=[URL]

    If your server uses the HTTPS protocol, prepend https:// to the hostname.

Here are several examples of properly-configured license settings in settings file:

Virtualize network license - desktop edition

virtualize.license.network.edition=desktop_edition 
virtualize.license.use_network=true
license.network.url=http://main1.parasoft.com.pl:2222

Virtualize network license -custom edition with various features

virtualize.license.custom_edition_features=Virtualize, Server, Message Packs, Unlimited Million Hits / Day
virtualize.license.network.edition=custom_edition
virtualize.license.use_network=true
license.network.url=http://main1.parasoft.com.pl:2222

Virtualize network license -custom edition with various features

virtualize.license.local.expiration=2014-04-15
virtualize.license.local.password=PARASOFT_353E2A7DA4F3D4B2FF142B0A262AF62B9DEC3449 C124773BAF0B4B508FF21139E867D9772F3702716FCE6D8EA16ACE668DE0EE629D154713599203BD85CE1213_7937E7ED374E70FDD62EE8411C2BB2D8EB465019E64BF3EF3A87DE6B67FB10BBCAF8611B08F70 D9420AC574FC5B3E5EB7241B20506DE2C60B0D80462CBEDBD
virtualize.license.use_network=false

Note that with local licenses, the enabled features are specified via the generated password.



  • No labels