Skip to content

Instantly share code, notes, and snippets.

View omindu's full-sized avatar

Omindu Rathnaweera omindu

  • Colombo, Sri Lanka
View GitHub Profile
Country Description Price / msg
Andorra ANDORRA Outbound SMS - Mobiland 0.0995
Andorra ANDORRA Outbound SMS - Other 0.0995
United Arab Emirates UNITED ARAB EMIRATES Outbound SMS - Etisalat 0.0895
United Arab Emirates UNITED ARAB EMIRATES Outbound SMS - Other 0.0895
United Arab Emirates UNITED ARAB EMIRATES Outbound SMS - du 0.0895
Afghanistan AFGHANISTAN Outbound SMS - AWCC 0.159
Afghanistan AFGHANISTAN Outbound SMS - Afghan Telecom 0.159
Afghanistan AFGHANISTAN Outbound SMS - Etisalat 0.159
Afghanistan AFGHANISTAN Outbound SMS - MTN 0.159

IAM Performance Test Results

During each release, we execute various automated performance test scenarios and publish the results.

Test Scenarios Description
Auth Code Grant Redirect With Consent Obtain an access token using the OAuth 2.0 authorization code grant type.
SAML2 SSO Redirect Binding Obtain a SAML 2 assertion response using redirect binding.

Our test client is Apache JMeter. We test each scenario for a fixed duration of

IAM Performance Test Results

During each release, we execute various automated performance test scenarios and publish the results.

Test Scenarios Description
SAML2 SSO Redirect Binding Multi Tenant Obtain a SAML 2 assertion response using redirect binding.
Auth Code Grant Redirect Multi Tenant Obtain an access token using the OAuth 2.0 authorization code grant type.

Our test client is Apache JMeter. We test each scenario for a fixed duration of

USER=#
TOKEN=#
REMOTE=wso2-extensions
# Reads entries in the extensions.txt. An entry should be in the format of "<repo_name>,<owner1>,<owner2>"
for entry in `cat extensions.txt`
do
# Getting the reponame: Split from ',' and get first entry. Then trim.
repo=$(echo $entry | cut -d',' -f -1 | xargs)
# Getting the users: Split from ',' and get all entries from second entry.
TID: [-1234] [] [2018-11-15 14:33:35,852] ERROR {org.wso2.carbon.registry.core.internal.RegistryCoreServiceComponent} -  Unable to create fixed remote mounts. 
org.wso2.carbon.registry.core.exceptions.RegistryException: An exception occurred while executing handler chain. null
	at org.wso2.carbon.registry.core.jdbc.handlers.HandlerManager.delete(HandlerManager.java:2651)
	at org.wso2.carbon.registry.core.jdbc.handlers.UserDefinedHandlerManager.delete(UserDefinedHandlerManager.java:214)
	at org.wso2.carbon.registry.core.jdbc.handlers.HandlerLifecycleManager.delete(HandlerLifecycleManager.java:443)
	at org.wso2.carbon.registry.core.jdbc.EmbeddedRegistry.delete(EmbeddedRegistry.java:851)
	at org.wso2.carbon.registry.core.caching.CacheBackedRegistry.delete(CacheBackedRegistry.java:595)
	at org.wso2.carbon.registry.core.session.UserRegistry.deleteInternal(UserRegistry.java:867)
	at org.wso2.carbon.registry.core.session.UserRegistry.access$1100(UserRegistry.java:61)

Error summary

[1]

TID: [-1234] [] [2018-11-15 14:25:35,511] ERROR {org.apache.catalina.core.StandardContext} -  Servlet [EntitlementServlet] in web application [/api/identity/entitlement] threw load() exception 
java.lang.ClassNotFoundException: org.apache.cxf.transport.servlet.CXFServlet
<?xml version="1.0" encoding="utf-8"?>
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/">
<soapenv:Header>
</soapenv:Header>
<soapenv:Body>
<ns4:updateApplication xmlns:ns4="http://org.apache.axis2/xsd">
<ns4:serviceProvider>
<ns1:applicationID xmlns:ns1="http://model.common.application.identity.carbon.wso2.org/xsd">7</ns1:applicationID>
<ns1:applicationName xmlns:ns1="http://model.common.application.identity.carbon.wso2.org/xsd">TestSP2</ns1:applicationName>
<ns1:certificateContent xmlns:ns1="http://model.common.application.identity.carbon.wso2.org/xsd"/>
@omindu
omindu / commands
Created June 19, 2018 15:56 — forked from pulasthi7/commands
maven
mvn versions:update-properties -Dincludes=org.wso2.carbon.identity.* -DgenerateBackupPoms=false
mvn versions:update-properties -DgenerateBackupPoms=false -Dincludes=org.wso2.carbon.identity.*,org.wso2.carbon.extension.identity.*,org.wso2.charon,org.apache.rampart.wso2,org.apache.ws.security.wso2,org.wso2.carbon.consent.*,org.wso2.carbon.database.utils -U
//Run in release profile with signing disabled
mvn clean install -P wso2-release -Dgpg.skip
mvn versions:set -DnewVersion=1.0.8-SNAPSHOT
[2018-05-10 00:38:58,161] DEBUG {org.wso2.carbon.identity.application.authentication.framework.handler.request.impl.DefaultRequestCoordinator} - retrieving authentication request from cache..
[2018-05-10 00:38:58,164] DEBUG {org.wso2.carbon.identity.application.authentication.framework.util.FrameworkUtils} -
Inbound Request parameters:
commonAuthCallerPath={/passivests}
forceAuth={false}
passiveAuth={false}
relyingParty={PassiveSTSSampleApp2}
tenantDomain={example.com}
wa={wsignin1.0}
wreply={http://localhost:8080/PassiveSTSSampleApp}
package sample.extended.saml.authenticator;
import org.wso2.carbon.identity.application.authentication.framework.FederatedApplicationAuthenticator;
import org.wso2.carbon.identity.application.authentication.framework.context.AuthenticationContext;
import org.wso2.carbon.identity.application.authentication.framework.exception.AuthenticationFailedException;
import org.wso2.carbon.identity.application.authentication.framework.exception.LogoutFailedException;
import org.wso2.carbon.identity.application.authentication.framework.util.FrameworkUtils;
import org.wso2.carbon.identity.application.authenticator.samlsso.SAMLSSOAuthenticator;
import java.util.Map;