JWAVE Server Development

Caution: JWAVE uses an insecure protocol without authentication. This makes JWAVE insecure to use in an Internet facing configuration and would allow an attacker to execute arbitrary code on the server. If you choose to implement JWAVE in this way, you are responsible for the security of those applications that leverage JWAVE.

This section discusses the following topics:

How to write JWAVE wrappers

Retrieving parameters from the server

Using GETPARAM to unpack value, positional, and keyword parameters

Returning parameters to the client

Returning multiple results

Handling errors

Testing wrapper functions