Wednesday, May 20, 2009

5.sap exchange and infrastructure proxies

sap exchange and infrastructure proxies

Table of Contents
Table of Contents................................................................................................................2
Proxies Usage Overview.....................................................................................................3
Reminder: XI Infrastructure Roadmap...........................................................................3
Connectivity Review.......................................................................................................4
Proxy Runtime................................................................................................................5
ABAP Proxy Runtime.................................................................................................6
ABAP Application Related.....................................................................................6
ABAP Web Service Related...................................................................................7
Java Proxy Runtime....................................................................................................8
Proxy Generation............................................................................................................9
ABAP Proxy Generation...........................................................................................10
SE80 - Object Navigator.......................................................................................10
SPROXY – ABAP Proxy Generation...................................................................10
ABAP Proxy Objects............................................................................................12
Inbound (example with asynchronous interface)..............................................12
Outbound...........................................................................................................12
Java Proxy Generation..............................................................................................13
Java Proxy Objects................................................................................................14
Inbound (example with synchronous interface)................................................15
Outbound (example with synchronous interface).............................................15
APPENDIX.......................................................................................................................16
ABAP Proxy (SPROXY)..............................................................................................16
Navigation Tree........................................................................................................16
Tab Pages..................................................................................................................17
Method Implementation............................................................................................19
Outbound Proxy....................................................................................................19
Calling the Proxy..............................................................................................19
Handling Exceptions.........................................................................................19
Deployment.......................................................................................................19
Inbound Proxy.......................................................................................................20
Code the Method...............................................................................................20
Independent Method Testing............................................................................24
Deployment.......................................................................................................24
Naming Considerations.............................................................................................25
Java Proxy.....................................................................................................................26
Method Implementation............................................................................................26
Outbound Proxy....................................................................................................26
Calling the Proxy..............................................................................................26
Handling Exceptions.........................................................................................26
Deployment.......................................................................................................27
Inbound Proxy.......................................................................................................28
Deployment.......................................................................................................28
Naming Considerations.............................................................................................32
Source File – Details.................................................................................................32
Implemented Method – Full example...................................................................32

0 comments:

Post a Comment

Followers