Redp 4884
Redp 4884
Martin Keen
Rafael Coutinho
Sylvi Lippmann
Salvatore Sollami
Sundaragopal Venkatraman
Steve Baber
Henry Cui
Craig Fleming
ibm.com/redbooks
SOA
In an SOA, applications are made up of loosely coupled software services, which interact to
provide all the functionality needed by the application. Each service is generally designed to
be self-contained and stateless to simplify the communication that takes place between them.
There are three major roles involved in an SOA:
Service provider
Service broker
Service requester
Figure 1 shows the interactions between these roles.
Service
Broker
look up
Service
Requester
register
bind
Service
Provider
Service provider
The service provider creates a service and can publish its interface and access information to
a service broker.
A service provider must decide which services to expose and how to expose them. Often, a
trade-off exists between security and interoperability; the service provider must make
technology decisions based on this trade-off. If the service provider uses a service broker,
decisions must be made about how to categorize the service, and the service must be
registered with the service broker using agreed-upon protocols.
Service broker
The service broker, also known as the service registry, is responsible for making the service
interface and implementation access information that is available to any potential service
requester.
The service broker provides mechanisms for registering and finding services. A particular
broker might be public (for example, available on the Internet) or private, only available to a
limited audience (for example, on an intranet). The type and format of the information stored
by a broker and the access mechanisms used is implementation-dependent.
Service requester
The service requester, also known as a service client, discovers services and then uses them
as part of its operation.
A service requester uses services provided by service providers. Using an agreed-upon
protocol, the requester can find the required information about services using a broker (or this
information can be obtained in another way). After the service requester has the necessary
details of the service, it can bind or connect to the service and invoke operations on it. The
binding is usually static, but the possibility of dynamically discovering the service details from
a service broker and configuring the client accordingly makes dynamic binding possible.
SOAP
SOAP is a network, transport, and programming language-neutral protocol that allows a client
to call a remote service. The message format is XML. SOAP is used for all communication
between the service requester and the service provider. The format of the individual SOAP
messages depends on the specific details of the service being used.
The specification for SOAP is available at the following address:
http://www.w3.org/TR/soap/
WSDL is one way to make service interface and implementation information available in a
service registry. A server can use a WSDL document to deploy a web service. A service
requester can use a WSDL document to work out how to access a web service (or a tool can
be used for this purpose).
The specification for WSDL is available at the following address:
http://www.w3.org/TR/wsdl/
For information about standards related to web services supported by IBM Rational
Application Developer, see the following address:
http://publib.boulder.ibm.com/infocenter/radhelp/v8/index.jsp?topic=/com.ibm.webse
rvice.doc/topics/core/cwsfpstandards.html
This information center describes which versions of the standards are supported by IBM
WebSphere Application Server V8.0, V7.0, and V6.1 with or without the Feature Pack for
Web Services.
JSR 224: Java API for XML-Based Web Services (JAX-WS) 2.2
The Java API for XML-Based Web Services (JAX-WS) is a programming model that simplifies
application development through the support of a standard, annotation-based model to
develop web services applications and clients.
The JAX-WS programming standard aligns itself with the document-centric messaging model
and replaces the remote procedure call programming model defined by the Java API for
XML-based RPC (JAX-RPC) specification. Although Rational Application Developer still
supports the JAX-RPC programming model and applications, JAX-RPC has limitations and
does not support many current document-centric services. JAX-RPC will not be described
further in this paper.
Table 1 shows the WebSphere Application Server versions that support JAX-WS 2.0, 2.1, and
2.2.
Table 1 WebSphere Application Server support for JAX-WS versions
Java EE version
JAX-WS version
Java EE 5
JAX-WS 2.0
Java EE 5
JAX-WS 2.1
7.0
8.0
Java EE 6
JAX-WS 2.2
8.0
JAX-WS 2.1 introduces support for the WS-Addressing in a standardized API. Using this
function, you can create, transmit, and use endpoint references to target a web service
endpoint. You can use this API to specify the action uniform resource identifiers (URIs) that
are associated with the WSDL operations of your Web service.
JAX-WS 2.1 introduces the concept of features as a way to programmatically control specific
functions and behaviors. Three standard features are available: the AddressingFeature for
WS-Addressing, the MTOMFeature when optimizing the transmission of binary attachments,
and the RespectBindingFeature for wsdl:binding extensions. JAX-WS 2.1 requires Java
Architecture for XML Binding (JAXB) Version 2.1 for data binding.
For more information about the features of JAX-WS 2.1, refer to the WebSphere Application
Server 7.0 Information Center:
http://publib.boulder.ibm.com/infocenter/wasinfo/v7r0/index.jsp?topic=/com.ibm.web
sphere.base.doc/info/aes/ae/cwbs_jaxws.html
WebSphere Application Server Version 8.0 supports the JSR 109: JAX-WS Version 2.2 and
Web Services for Java EE Version 1.3 specifications.
The JAX-WS 2.2 specification supersedes and includes functions within the JAX-WS 2.1
specification. JAX-WS 2.2 adds client-side support for using WebServiceFeature-related
annotations, such as @MTOM, @Addressing, and the @RespectBinding annotations. JAX-WS 2.1
had previously added support for these annotations on the server.
For more information about the features of JAX-WS 2.2, refer to this website:
http://publib.boulder.ibm.com/infocenter/radhelp/v8/index.jsp?topic=/com.ibm.webse
rvice.doc/topics/core/cjaxws.html
In Rational Application Developer, you can choose which version of JAX-WS code to produce
when generating web services top-down (from an existing WSDL file) and when generating
web services clients. You can find the corresponding options by selecting Windows
Preferences Web Services WebSphere JAX-WS Code Generation:
Top Down Version of JAX-WS code to be generated
Client Version of JAX-WS code to be generated
Developing Web Services Applications
These default options can be further overridden in the Web Services code generation wizard.
WebSphere Application Server V8 introduces support for Web Services for Java EE (JSR
109) Version 1.3 specification. The Web Services for Java EE 1.3 specification introduces
support for WebServiceFeature-related annotations, as well as support for using deployment
descriptor elements to configure these features on both the client and server.
Annotations
JAX-WS introduces support for annotating Java classes with metadata to indicate that the
Java class is a web service. JAX-WS supports the use of annotations based on the JSR 175:
Metadata Facility for the Java Programming Language specification, the JSR 181: Web
Services Metadata for the Java Platform specification, and annotations that are defined by
the JAX-WS 2.0/2.1/2.2 specification. Using annotations in the Java source and Java class
simplifies the development of web services by defining part of the additional information that
is typically obtained from deployment descriptor files, WSDL files, or mapping metadata from
XML and WSDL files into the source artifacts.
For example, you can embed a simple @WebService annotation in the Java source to expose
the bean as a web service (Example 1).
Example 1 JAX-WS annotation
@WebService
public class BankBean {
public String getCustomerFullName(String ssn) { ... }
}
The @WebService annotation tells the server runtime environment to expose all public
methods on that bean as a web service. Additional levels of granularity can be controlled by
adding additional annotations on individual methods or parameters. The use of annotations
makes it much easier to expose Java artifacts as web services. In addition, as artifacts are
created from using part of the top-down mapping tools starting from a WSDL file, annotations
are included within the source and Java classes as a way of capturing the metadata along
with the source files.
@WebService
public interface CreditRatingService {
// sync operation
Score getCreditScore(Customer customer);
// async operation with polling
Response<Score> getCreditScoreAsync(Customer customer);
// async operation with callback
Future<?> getCreditScoreAsync(Customer customer,
8
AsyncHandler<Score> handler);
}
The asynchronous invocation that uses the callback mechanism requires an additional input
by the client programmer. The callback handler is an object that contains the application code
that is executed when an asynchronous response is received. Example 3 shows an
asynchronous callback handler.
Example 3 Asynchronous callback handler
The static client programming model for JAX-WS is called the proxy client. The proxy client
invokes a web service based on an SEI that is generated or provided.
The top-down approach provides more control over the web service interface and the XML
types used. Use this approach for developing new web services.
In the bottom-up approach, a web service is created based on the existing business logic
in JavaBeans or EJB. A WSDL file is generated to describe the resulting web service
interface.
The bottom-up pattern is often used for exposing existing function as a web service. It
might be faster, and no XSD or WSDL design skills are needed. However, if complex
objects (for example, Java collection types) are used, the resulting WSDL might be difficult
to understand and less interoperable.
10
Client development
To assist in the development of web service clients, Rational Application Developer provides
the following features:
Java client proxy from WSDL: The Web Service client wizard assists you in generating a
proxy JavaBean. This proxy can be used within a client application to greatly simplify the
client programming required to access a web service.
Sample web application from WSDL: Rational Application Developer can generate a
sample web application, which includes the proxy classes described before, and sample
JavaServer Pages (JSP) that use the proxy classes.
Web Service Discovery Dialog: On this window, you can discover a web service that exists
online or in your workspace, create a proxy for the web service, and then place the
methods of the proxy into a Faces JSP file.
11
services. This feature provides a range of web services run times, including an
implementation of the J2EE specification standards.
Generic service client: The generic service client can invoke calls to any service that uses
an HTTP, a Java Message Service (JMS), or WebSphere MQ transport and can view the
message returned by the service.
Sample JSP application: The web application mentioned before can be used to test web
services and the generated proxy it uses.
Web Services Explorer: This simple test environment can be used to test any web service,
based only on the WSDL file for the service. The service can be running on a local test
server or anywhere else in the network. The Web Services Explorer is a JSP web
application that is hosted on the Apache Tomcat servlet engine in Eclipse. The Web
Services Explorer uses the WSDL to render a SOAP request. It does not involve data
marshalling and unmarshalling. The return parameter is stripped out, and the values are
displayed in a predefined format.
Universal Test Client: The Universal Test Client (UTC) is a powerful and flexible test
application that is normally used for testing EJB. Its flexibility makes it possible to test
ordinary Java classes, so it can be used to test the generated proxy classes created to
simplify client development.
TCP/IP Monitor: The TCP/IP Monitor works similarly to a proxy server, passing TCP/IP
requests to another server and directing the returned responses back to the originating
client. The TCP/IP messages that are exchanged are displayed in a special view within
Rational Application Developer.
12
Sample projects
The sample application that we use for creating the web service consists of the following
projects:
RAD8WebServiceUtility project: This project is a simple banking model with BankMemory,
Customer, and Account beans.
RAD8WebServiceWeb project: This project contains the SimpleBankBean, a JavaBean with a
few methods that retrieve data from the MemoryBank, a search HTML page, and a resulting
JSP. We use annotations to generate web services for this project.
RAD8WebServiceWeb2 project: This project contains the same code as the
RAD75WebServiceWeb project. We use the Web Service wizard to generate web services for
this project.
RAD8WebServiceEJB project: This project contains the SimpleBankFacade session EJB with
a few methods that retrieve data from the MemoryBank.
RAD8WebServiceEAR project: This project is the enterprise application that contains the
other four projects.
We now have resources in preparation for the web services sample, including a JavaBean in
the RAD8WebServiceWeb project and a session EJB in the RAD8WebServiceEJB project. We use
these resources as a base for developing and testing the web services examples.
13
the Web Service wizard to generate the web service or use the annotations directly. The Web
Service wizard does not inject annotations to the delegate class derived from the JavaBean.
Therefore, these two approaches are essentially the same.
Using annotations from the JSR 181 standard, we can annotate a service implementation
class or a service interface. Then we can generate a web service with a wizard or by
publishing the application to a server. Using annotations within both Java source code and
Java classes simplifies web service development. Using annotations in this way defines
additional information that is typically obtained from deployment descriptor files, WSDL files,
or mapping metadata from XML and WSDL into source artifacts.
In this section, we create a bottom-up web service from a JavaBean by using annotations.
The web services are generated by publishing the application to a server. No wizard is
required in this example.
Annotating a JavaBean
We can annotate types, methods, fields, and parameters in the JavaBean to specify a web
service. To annotate the JavaBean, follow these steps:
1. In the RAD75WebServiceWeb project, open the SimpleBankBean (in
itso.rad8.bank.model.simple).
2. Before the class declaration, type @W and press Ctrl+Spacebar for content assist. Scroll
down to the bottom and select WebService(Web Service Template) - javax.jws
(Figure 2).
14
@WebService(name="SimpleBankBean",
targetNamespace="http://simple.model.bank.rad8.itso/",
serviceName="SimpleBankBeanService", portName="SimpleBankBeanPort")
@WebService(name="Bank",
targetNamespace="http://simple.model.bank.rad8.itso/",
serviceName="BankService", portName="BankPort")
4. Before the getCustomerFullName method, type @W and press Ctrl+Spacebar for content
assist. Scroll down to the bottom and select WebMethod(Web Service Template) javax.jws (Figure 3).
@WebMethod(operationName="getCustomerFullName", action="")
The @WebMethod annotation identifies the individual methods of the Java class that are
exposed externally as web service operations. In this example, we expose the
getCustomerFullName method as a web service operation. The operationName is the name
of the wsdl:operation matching this method. The action determines the value of the soap
action for this operation.
15
@WebMethod(operationName="RetrieveCustomerName",
action="urn:getCustomerFullName")
@WebMethod(operationName="RetrieveCustomerName",
action="urn:getCustomerFullName")
@WebResult(name="CustomerFullName")
public String getCustomerFullName(@WebParam(name="ssn")String ssn)
throws CustomerDoesNotExistException
The @WebParam and @WebResult annotations customize the mapping of the method
parameters and results to message parts and XML elements.
7. Select Source Organize Imports (or press Ctrl+Shift+O) to resolve the imports.
JAX-WS 2.1.6, 3.3: The following methods will be implicitly exposed as web
methods: [BigDecimal getAccountBalance(String accountId), String
getAccountId(String customerId, int account), int getNumAccounts(String
customerId)]
If you click the light bulb icon corresponding to this QuickFix, you see two proposed solutions,
as shown in Figure 4:
Hide all implicitly exposed methods
Rename in file
Select the first proposal: All mentioned methods are annotated with
@WebMethod(exclude=true).
16
By using the annotation processor to detect problems at build time, you can prevent these
problems from occurring at run time. For example, if you make the changes in Example 11,
you receive validation errors, such as the errors that are shown in Example 12.
Example 11 Validating web service annotations
@WebService(name="!Bank", targetNamespace="simple.model.bank.rad8.itso/",
serviceName="BankService", portName="BankPort")
public class SimpleBankBean implements Serializable {
private static final long serialVersionUID = -637536840546155853L;
public SimpleBankBean() {
}
@WebMethod(operationName="!RetrieveCustomerName",
action="urn:getCustomerFullName")
@WebResult(name="CustomerFullName")
@Oneway
public String getCustomerFullName(@WebParam(name="ssn")String ssn)
throws CustomerDoesNotExistException {
Example 12 JAX-WS annotation processor validation results
17
18
19
View WSDL
6. Click the Source pane to view the SOAP messages as raw XML, as shown in
Example 13.
Example 13 SOAP message
To view the dynamically generated WSDL, enter the following URL in the browser (908x is the
port number, most probably 9080 or 9081):
http://localhost:908x/RAD8WebServiceWeb/BankService?wsdl
Tip: You can also see the WSDL from the Generic Service Client, as shown in Figure 7.
20
The dynamically generated WSDL file is displayed. We also notice that the URL for the WSDL
is changed:
http://localhost:908x/RAD75WebServiceWeb/BankService/BankService.wsdl
Examine the generated WSDL. We can see that the generated WSDL matches the web
services annotations that we added. Example 14 shows an extract of the generated WSDL
snippet.
Example 14 Dynamically generated WSDL snippet
To see the dynamically generated XML schema, enter the following URL:
http://localhost:908x/RAD8WebServiceWeb/BankService/BankService_schema1.xsd
21
For a simple test to verify that the web service is running in the server, enter the following
URL:
http://localhost:908x/RAD8WebServiceWeb/BankService
22
Develop
Assemble
Ensures that the project that hosts the web service or client is
associated with an EAR when required by the target application server.
Deploy
Install
Installs and configures the web module and EAR files on the target
server. If any changes to the endpoints of the WSDL file are required,
they are made in this stage.
Start
Starts the web service after the service is installed on the server.
Test
Provides various options for testing the service, such as using the Web
Services Explorer or sample JSP.
c. Ensure that the following server-side configurations are selected, as shown in Figure 8:
d. Under Configuration, if you click the Server: WebSphere Application Server v8.0
Beta link, the Service Deployment Configuration window (Figure 9 on page 24) opens.
In this window, you can select the server and run time. We use the default settings of
this window. Click Cancel to close the window and return to the Web Services window.
23
e. Clear the Publish the Web service check box (because we do not publish to a
Universal Description, Discovery, and Integration (UDDI) registry).
f. Clear the Monitor the Web service check box (because we select to monitor the web
service later).
g. Click Next.
3. In the WebSphere JAX-WS Bottom Up Web Service Configuration window (Figure 10 on
page 25):
a. For Delegate class name, accept the default (SimpleBankBeanDelegate).
The delegate class is a wrapper that contains all the methods from the JavaBean and
the JAX-WS annotation that the run time recognizes as a web service.
b. For Java to WSDL mapping style, accept the default.
The style defines the encoding style for messages that are sent to and from the web
service. The recommended WSDL style is Document Wrapped.
c. Select Generate WSDL file into the project.
Because the annotations in the delegate class are used to indicate to the run time that
the bean is a web service, a static WSDL file is no longer generated to your project
automatically. The run time can dynamically generate a WSDL file from the information
in the bean. Select this option to generate a static WSDL file for the web service. There
are several reasons to select this option:
24
Performance improvements. For a large bean with lots of methods and complex
data types, this option prevents the penalty of the initial generation by the run time
when the service is accessed.
4. In the WebSphere JAX-WS WSDL Configuration window (Figure 11 on page 26), perform
these tasks:
a. Select WSDL Target Namespace, and for the WSDL Target Namespace, enter
http://bank.rad8.itso/.
b. Select Configure WSDL Service Name, and for the WSDL Service Name, enter
BankService.
c. Select Configure WSDL Port Name, and for the WSDL Port Name, enter BankPort.
d. Click Next.
25
26
6. The Generic Service Client opens in an external web browser (see Figure 13). Complete
these tasks:
a. Select the getNumAccounts operation and click Add.
b. Enter a value for the customer ID, such as 111-11-1111, and click Go.
The result 2 is displayed in the status pane. Optional: Try other operations.
7. Close the Web Services Explorer. Click Finish to exit the Web Service wizard.
The web services are available at two endpoints: the HTTP endpoint and the HTTPS
endpoint. If your server is not secured, the endpoint is:
http://localhost:908x/RAD8WebServiceWeb2/BankService
If your server is secured, the web service listed in the Generic Server Client has the following
endpoint:
https://localhost:944x/RAD8WebServiceWeb2/BeanService
27
You can see the current endpoint by selecting the Add EndPoint Request icon, as shown in
Figure 14.
Select Add EndPoint
To test the HTTPS protected web service with the Generic Service Client, you can configure a
new protocol configuration. The signer certificate from the WebSphere Application Server
must be imported into the Eclipse truststore. For more information about creating a new
Secure Sockets Layer (SSL) configuration, see this website:
http://publib.boulder.ibm.com/infocenter/radhelp/v8/index.jsp?topic=/com.ibm.ratio
nal.ttt.common.doc/topics/tgsccreatesssl.html
wsdlLocation="WEB-INF/wsdl/BankService.wsdl")
A webservices.xml file in the WebContent/WEB-INF folder. This file is the optional web
services deployment descriptor. A deployment descriptor can be used to override or
enhance the information provided in the service. For example, if the <wsdl-service>
element is provided in the deployment descriptor, the namespace used in this element
overrides the targetNamespace member attribute in the annotation.
A WSDL file (BankService.wsdl) and an XSD file (BankService_schema1.xsd) in the
WEB-INF/wsdl folder. If you plan to create the client at a later time or publish the WSDL for
other users, you can use this WSDL file.
You can locate the projects developed up to this point in the 4884codesolution\webservices
folder in the RAD8WebServiceImplemented.zip file.
2. In the Web Services Client window (Figure 16 on page 30), perform these steps:
a. Move the slider up to the Test position. This position provides options for testing the
service using a JSP-based sample application.
b. Select Monitor the Web service.
c. Place the web service and web service client in separate web and EAR projects. Click
Client project.
29
3. In the Specify Client Project Settings window, complete the following actions and then click
Next:
a. Change the client project name to RAD8WebServiceClient.
b. For Project type, accept Dynamic Web project.
c. For Client EAR project name, accept RAD8WebServiceClientEAR.
d. Click OK. The wizard creates the Web and EAR projects.
4. Perform these steps in the WebSphere JAX-WS Web Service Client Configuration window
(Figure 17 on page 31):
a. Accept the default name and location of the Deployment Descriptor.
b. Accept Generate Portable Client.
c. Clear Enable MTOM.
d. The version of JAX-WS to be generated is 2.2, by default.
e. Click Next.
The client code is generated into the new client project.
30
5. In the Web Service Client Test window (Figure 18 on page 32), use these settings:
a. Select Test the generated proxy.
b. For Test facility, select JAX-WS JSPs (default).
c. For Folder, select sampleBankPortProxy (default). You can specify a separate folder
for the generated application if you want.
d. Under Methods, leave all methods selected.
e. Select the Run test on server check box.
f. Click Finish.
The sample application is published to the server, and the sample JSP is displayed in a
Web browser.
31
6. In the Web Services Test Client window (Figure 19 on page 33), perform these steps:
a. Select the retrieveCustomerName method.
b. Enter a valid value in the customer ID field, such as 111-11-1111.
c. Click Invoke.
The results are displayed in the Result pane.
Notice the endpoint in the Quality of Service pane:
http://hostname:12036/RAD8WebServiceWeb/BankService
You might see another port number. It depends on the port number that the wizard
generated for the TCP/IP Monitor.
32
The TCP/IP Monitor is also started. With the TCP/IP Monitor, you can intercept and
examine the SOAP traffic that comes in and out of a web service call.
7. If you select Window Preferences and then select Run/Debug TCP/IP Monitor,
you can see that a new monitor has been added. It is configured to listen to the same local
port number (12036).
The TCP/IP Monitor is started and ready to listen to the SOAP request and direct it to the
web service provider (possibly on a separate host and at port 908x).
Monitor the Web service: When you select the Monitor the Web service option in the
Web Service window, the Web Service Client wizard dynamically creates the TCP/IP
Monitor. It uses an algorithm to locate an available listening port for the monitor. The
sample JSP client window uses the URL to dynamically set the web service endpoint to
match the monitor port. Using the wizard to create the TCP/IP Monitor is convenient,
because you do not have to spend time determining how to redirect the SOAP request
to the TCP/IP Monitor, especially when monitoring remote web services.
All requests and responses are routed through the TCP/IP Monitor and are displayed in the
TCP/IP Monitor view. The TCP/IP Monitor view might be displayed in the same pane as the
Servers view.
33
The TCP/IP Monitor view shows all the intercepted requests in the top pane, and when a
request is selected, the messages passed in each direction are shown in the bottom
panes (the request in the left pane, and the response in the right pane). The TCP/IP
Monitor can be a useful tool in debugging web services and clients.
8. Select the XML view to see the SOAP request and response in XML format, as shown in
Figure 20.
9. Optional: To ensure that the web service SOAP traffic is WS-I compliant, you can generate
a log file by clicking the
icon in the upper-right corner. In the window that opens, select
a name for the log file and specify where you want to store it (for example, in the client
project).
The log file is validated for WS-I compliance. You see a confirmation message, The WS-I
Message Log file is valid. You can open the log file in an XML editor to examine its
contents.
To stop the TCP/IP Monitor, perform these steps:
1. Select Window Preferences.
2. Select Run/Debug TCP/IP Monitor.
3. Select the TCP/IP Monitor from the list and select Stop.
Manually starting the TCP/IP Monitor: To start the TCP/IP Monitor manually, remember
that the Local Monitoring port is a randomly chosen free port on localhost, while the host
and port refer to the actual parameters of the server where your service is running. To test
the service through the monitor, you have to manually change the host and port in the
endpoint of the service you are testing, so that your request is sent to the monitor instead
of the actual server.
34
35
Annotated interface
IBM proprietary web service proxy
Factory class
Sample JSP
36
37
8. In the Palette, select the Data and Services category. Select Web Service and click the
JSF page, as shown in Figure 23.
38
9. In the Add Web Service window, as shown in Figure 24, click Add. In the Web Services
Discovery window, select Web services from your workspace.
39
10.In the Web Services from your workspace window, which is shown in Figure 25, click
BankService with the URL of the RAD8WebServiceWeb project (not the
RAD8WebServiceWeb2 project).
Figure 25 Web Service Discovery Dialog: Web Services from your workspace
40
Figure 26 Web Services Discovery Dialog: Clicking the Add to Project button
The web service that you selected is now listed in the list of web services.
41
12.In the Web Service window (Figure 27), perform these steps:
a.
b.
c.
d.
42
13.In the Input Form window (Figure 28), perform these steps:
a. Change the label to Enter Social Security Number:.
b. Click Options and change the label from Submit to Get Full Name.
c. Click OK and click Next.
14.In the Results form window (Figure 29), change the Label to Customer's full name is:.
15.Click Finish to generate the input and output parts into the JSF page (Figure 29). Save
the file.
16.Right-click WSJSFClient.jsp and select Run As Run on Server. The client application
is deployed to the server for testing. Perform this test:
a. In the Enter Social Security Number field, type 111-11-1111.
b. Click Get Full Name.
The result is displayed (Figure 30).
43
The projects that have been developed up to this point are available in this folder:
4884codesolution\webservices\RAD8WebServiceJSFClient.zip
Creating the thin client project and generating the client code
To create the web service thin client, follow these steps:
1. Create a Java project by selecting File New Project Java Project.
2. For the Project name, enter RAD8WebServiceThinClient and click Finish.
3. In the Java EE perspective: Services view, expand JAX-WS, right-click
RAD8WebServiceWeb: {http://.../}BankService, and select Generate Client.
4. Complete the following actions:
a. Keep the slider at the Deploy client level. Click the hyperlink Client project.
b. In the Specify Client Project Settings window (Figure 31), for the Client project, select
RAD8WebServiceThinClient and click OK.
44
c. Click Finish to generate the helper classes and WSDL file into the client project.
5. After the code generation, switch to the Enterprise Explorer view. Right-click
RAD8WebServiceThinClient and select Properties. Select Java Build Path. Click the
Libraries tab (Figure 32).
Notice that the thin client only requires the Java Runtime Environment (JRE) and a thin
client JAR file. The wizard adds a class path variable
WAS_V8JAXWS_WEBSERVICES_THINCLIENT, which points to the
com.ibm.jaxws.thinclient_8.0.0.jar file.
package itso.rad8.bank.test;
import itso.rad8.bank.model.simple.BankPortProxy;
Developing Web Services Applications
45
import itso.rad8.bank.model.simple
.CustomerDoesNotExistException_Exception;
import java.util.Scanner;
public class WSThinClientTest {
public static void main(String[] args) {
try {
Scanner scanner = new Scanner(System.in);
BankPortProxy proxy = new BankPortProxy();
System.out.println
("Please enter customer's social security number: ");
String ssn = scanner.next();
System.out.println("Customer's name is " +
proxy.retrieveCustomerName(ssn));
} catch (CustomerDoesNotExistException_Exception e) {
System.out.println("The customer does not exist!");
}
}
}
Notice how easy it is to invoke the web service. You instantiate the proxy class
(BankPortProxy) and call the method (retrieveCustomerName) in the proxy.
4. Right-click WSThinClientTest.java and select Run As Java Application.
5. When prompted in the console, for the customers Social Security number, type
111-11-1111, and the customers name is displayed:
Retrieving document at
'file:/C:/workspaces/WebServices/RAD8WebServiceThinClient/bin/META-INF/wsdl/'.
Retrieving schema at 'BankService_schema1.xsd', relative to
'file:/C:/workspaces/WebServices/RAD8WebServiceThinClient/bin/META-INF/wsdl/'.
Please enter customer's social security number:
111-11-1111
Customer's name is Mr. Henry Cui
Both the polling and callback models enable the client to focus on continuing to process work
without waiting for a response to return, while providing for a more dynamic and efficient
model to invoke web services.
46
Polling client
Using the polling model, a client can issue a request and receive a response object that can
subsequently be polled to determine if the server has responded. When the server responds,
the actual response can then be retrieved. The response object returns the response content
when the get method is called. The client receives an object of type javax.xml.ws.Response
from the invokeAsync method. That Response object is used to monitor the status of the
request to the server, determine when the operation has completed, and to retrieve the
response results.
To create an asynchronous web service client using the polling model, follow these steps:
1. In the Java EE perspective: Services view, expand JAX-WS, right-click
RAD8WebServiceWeb: {http://.../}BankService, and select Generate Client.
2. Keep the slider at the Deploy client level. Click the hyperlink Client project. In the
Specify Client Project Settings window, select RAD8WebServiceThinClient and click OK.
Click Next.
3. In the WebSphere JAX-WS Web Service Client Configuration window (Figure 33), select
Enable asynchronous invocation for generated client and click Finish.
4. After the code generation, open BankPortProxy.java (Example 16). For each method in
the web service, two additional methods are created, the polling and callback methods,
which allow the client to function asynchronously. The retrieveCustomerNameAsync
method that returns a Response is used for polling. The method that returns Future is used
for callback.
47
public Response<RetrieveCustomerNameResponse>
retrieveCustomerNameAsync(String ssn) {
return _getDescriptor().getProxy().retrieveCustomerNameAsync(ssn);
}
public Future<?> retrieveCustomerNameAsync(String ssn,
AsyncHandler<RetrieveCustomerNameResponse> asyncHandler) {
return _getDescriptor().getProxy().retrieveCustomerNameAsync
(ssn,asyncHandler);
}
package itso.rad8.bank.test;
import
import
import
import
itso.rad8.bank.model.simple.BankPortProxy;
itso.rad8.bank.model.simple.RetrieveCustomerNameResponse;
java.util.concurrent.ExecutionException;
javax.xml.ws.Response;
48
From the results, you can see that the asynchronous call allows you to perform other work
while waiting for the response from the server. Eventually, you can obtain the results of the
invocation.
Callback client
To implement an asynchronous invocation that uses the callback model, the client provides
an AsynchHandler callback handler to accept and process the inbound response object. The
client callback handler implements the javax.xml.ws.AsynchHandler interface, which
contains the application code that is run when an asynchronous response is received from
the server.
The AsynchHandler interface contains the handleResponse(Response) method that is called
after the run time has received and processed the asynchronous response from the server.
The response is delivered to the callback handler in the form of a javax.xml.ws.Response
object. The response object returns the response content when the get method is called.
Additionally, if an error was received, an exception is returned to the client during that call.
The response method is then invoked according to the threading model used by the executor
method, java.util.concurrent.Executor, on the clients java.xml.ws.Service instance that
was used to create the dynamic proxy or dispatch client instance. The executor is used to
invoke any asynchronous callbacks registered by the application. Use the setExecutor and
getExecutor methods to modify and retrieve the executor configured for the service.
To create an asynchronous web service client using the callback model, follow these steps:
1. Create the callback handler class RetrieveCustomerCallbackHandler in the
itso.rad8.bank.test package. Copy and paste the code from
4884code\webservices\thinclient (Example 18).
Example 18 RetrieveCustomerCallbackHandler
package itso.rad8.bank.test;
import
import
import
import
itso.rad8.bank.model.simple.RetrieveCustomerNameResponse;
java.util.concurrent.ExecutionException;
javax.xml.ws.AsyncHandler;
javax.xml.ws.Response;
49
package itso.rad8.bank.test;
import itso.rad8.bank.model.simple.BankPortProxy;
import java.util.concurrent.Future;
public class BankCallbackClient {
public static void main(String[] args) throws Exception {
BankPortProxy proxy = new BankPortProxy();
// Set up the callback handler.
RetrieveCustomerCallbackHandler callbackHandler =
new RetrieveCustomerCallbackHandler();
// Make the Web service call.
Future<?> response = proxy.retrieveCustomerNameAsync
("111-11-1111", callbackHandler);
System.out.println("Wait 5 seconds.");
// Give the callback handler a chance to be called.
Thread.sleep(5000);
System.out.println("Customer's full name is "
+ callbackHandler.getResponse() + ".");
System.out.println("RetrieveCustomerName async end.");
}
}
50
package itso.rad8.bank.test;
import itso.rad8.bank.model.simple.BankPortProxy;
import java.util.concurrent.Future;
import javax.xml.ws.BindingProvider;
public class BankCallbackMEPClient {
public static void main(String[] args) throws Exception {
BankPortProxy proxy = new BankPortProxy();
//proxy._getDescriptor().setEndpoint
("http://localhost:11487/RAD75WebServiceWeb/BankService");
// setup the property for asynchronous message exchange
BindingProvider bp = (BindingProvider)
proxy._getDescriptor().getProxy();
bp.getRequestContext().put
("com.ibm.websphere.webservices.use.async.mep", Boolean.TRUE);
// Set up the callback handler.
RetrieveCustomerCallbackHandler callbackHandler =
new RetrieveCustomerCallbackHandler();
// Make the Web service call.
Future<?> response = proxy.retrieveCustomerNameAsync
("111-11-1111", callbackHandler);
System.out.println("Wait 5 seconds.");
// Give the callback handler a chance to be called.
Thread.sleep(5000);
System.out.println("Customer's full name is "
+ callbackHandler.getResponse() + ".");
System.out.println("RetrieveCustomerName async end.");
}
}
51
3. Optional: If you want to see the SOAP request message, activate the comment line:
proxy._getDescriptor().setEndpoint
("http://wxpsp408:12036/RAD75WebServiceWeb/BankService");
You must supply your host name instead of wxpsp408 and the port 12036 must match the
port of the TCP/IP Monitor.
4. Run the application again. Example 21 shows the SOAP request.
Example 21 SOAP request for asynchronous message exchange
--MIMEBoundary_3028c58b531c6cb4c683e77e89daa042d5c97cdfa680727e
Content-Type: application/xop+xml; charset=UTF-8; type="text/xml"
Content-Transfer-Encoding: binary
Content-ID: <[email protected]>
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/">
<soapenv:Header xmlns:wsa="http://www.w3.org/2005/08/addressing">
<wsa:To>http://wxpsp408:12036/RAD8WebServiceWeb/BankService</wsa:To><wsa:ReplyT
o>
<wsa:Address>http://wxpsp408.rcsnl.ams.nl.ibm.com:4991/axis2/services/BankServi
ce.BankPort</wsa:Address>
</wsa:ReplyTo>
<wsa:MessageID>urn:uuid:d0da36f9-9623-4d6e-8249-d57a118c43e2</wsa:MessageID>
<wsa:Action>urn:getCustomerFullName</wsa:Action>
</soapenv:Header>
<soapenv:Body>
<a:RetrieveCustomerName xmlns:a="http://simple.model.bank.rad8.itso/">
<ssn>111-11-1111</ssn>
</a:RetrieveCustomerName>
</soapenv:Body>
</soapenv:Envelope>
--MIMEBoundary_3028c58b531c6cb4c683e77e89daa042d5c97cdfa680727e--
Because the client listens on a separate HTTP channel to receive the response messages
from a service-initiated HTTP channel, the TCP/IP Monitor is unable to capture the SOAP
response.
The completed Thin Client project is available in this file:
4884codesolution\webservices\RAD8WebServiceThinClient.zip
52
@WebService
@Stateless
public class SimpleBankFacadeBean implements SimpleBankFacadeBeanLocal {
......
3. Wait for the RAD8WebServiceEAR application to publish on the server (or force a manual
publish). Notice that a new web service named RAD8WebServiceEJB is added in the
Services view under JAX-WS.
An HTTP router module is required to allow the transport of SOAP messages over the
HTTP protocol.
4. In the Services view (Figure 34), right-click the new RAD8WebServiceEJB and select
Create Router Modules (EndpointEnabler).
53
5. In the Create Router Project window, accept HTTP as the default EJB web service binding
(Figure 35). Although two EJB bindings are listed, HTTP and JMS, for this example, we
use SOAP over HTTP. Click Finish.
All of the projects that we have completed so far are available in this file:
4884codesolution\webservices\RAD8WebServiceEJBService.zip
54
55
3. When the WSDL editor opens with the new WSDL file, select the Design tab:
a. In the WSDL editor, for View (in the upper-right corner), select Advanced.
b. Select the Properties view. Now you are ready to edit the WSDL file (Figure 37).
Part
Service
Port
Binding
Operation
Port type
View
56
a. Select the in element, and in the Properties view, change the name to accountId
(leave the type as xsd:string).
b. Click the Show schema index view icon (
) in the upper-left corner to see all the
directives, elements, types, attributes, and groups in the WSDL (Figure 39).
57
c. In the Types category, right-click and select Add Complex Type. Change the name to
Account. Follow these steps:
i. Right-click Account and select Add Sequence.
ii. You are taken out of the Index view and back into the Online Schema.
iii. Right-click Account and select Add Element
iv. Change the Element name to id.
v. Right-click the content model object (
58
5. In the WSDL editor, click the arrow to the right of the getAccountResponse element to
drill down to the schema:
a. Right-click the out element and select Set Type
b. Click Browse and select Account (Figure 43).
6. In the WSDL editor, click the arrow to the right of the getCustomer element to drill down
to the schema. Change the element name from in to customerId.
7. In the WSDL editor, click the arrow to the right of the getCustomerResponse element to
drill down to the schema:
a. Right-click the out element and select Set Type.
b. Click Browse and select Customer.
8. In the WSDL editor, right-click the binding icon (see Figure 37 on page 56). Select
Generate Binding Content.
59
9. In the Binding wizard (Figure 44), select Overwrite existing binding information and
click Finish.
Figure 45 BankWS.wsdl
11.In the Enterprise Explorer, right-click BankWS.wsdl and select Validate. In the window
that opens showing a message that confirms that there are no errors or warnings, click
OK.
If you have a problem when creating the WSDL file, you can import the BankWS.wsdl file from
the 4884code\webservices\topdown directory.
60
The RAD8TopDownBankEAR is deployed to the server, and the web service is displayed in the
Services view.
package org.example.bankws;
import java.math.BigDecimal;
@javax.jws.WebService (endpointInterface="org.example.bankws.BankWS",
targetNamespace="http://www.example.org/BankWS/", serviceName="BankWS",
portName="BankWSSOAP")
public class BankWSSOAPImpl{
public Account getAccount(String accountId) {
Account account = new Account();
account.setId(accountId);
account.setBalance(new BigDecimal(1000.00));
return account;
}
public Customer getCustomer(String customerId) {
Customer customer = new Customer();
customer.setSsn(customerId);
customer.setFirstName("Henry");
customer.setLastName("Cui");
customer.setTitle("Mr.");
return customer;
}
}
After you save the .java file, wait for the Server to republish or publish manually.
61
Creation procedure
In this section, we use Ant tasks to automate the top-down code generation process that we
did in the last section:
1. Remove RAD8WebServiceEAR from the server while we make modifications.
2. Create a dynamic web project to host the web service generated by Ant tasks:
RAD8WebServiceAnt in RAD8WebServiceEAR.
3. Copy the BankWS.wsdl file from the RAD8TopDownBankWS/WebContent folder to the
RAD8WebServiceAnt folder (not under WebContent).
62
63
After the web service receives the binary data from the client, it stores the received document
on the local hard disk and then passes the same document back to the client. In an actual
scenario, the provider or the consumer can send an acknowledgement message, after it
receives the binary data from the other side. For our example, we want to show how to enable
the MTOM on both the client and the server side in a compact example.
64
<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema"
xmlns:xmime="http://www.w3.org/2005/05/xmlmime"
xmlns:tns="http://mtom.rad8.ibm.com/"
targetNamespace="http://mtom.rad8.ibm.com/" version="1.0">
<xs:complexType name="sendPDFFile">
<xs:sequence>
<xs:element minOccurs="0" name="arg0" type="xs:base64Binary"
xmime:expectedContentTypes="*/*"/>
</xs:sequence>
</xs:complexType>
<xs:complexType name="sendWordFile">
<xs:sequence>
<xs:element minOccurs="0" name="arg0" type="xs:base64Binary"/>
</xs:sequence>
</xs:complexType>
<xs:complexType name="sendImage">
<xs:sequence>
<xs:element minOccurs="0" name="arg0" type="xs:base64Binary"
xmime:expectedContentTypes="image/jpeg"/>
</xs:sequence>
</xs:complexType>
Default mapping
The default mapping for xs:base64Binary is byte[] in Java. If you want to use another
mapping, you can add the xmime:expectedContentTypes attribute to the element containing
the binary data. This attribute is defined in the http://www.w3.org/2005/05/xmlmime
namespace and specifies the MIME types that the element is expected to contain. The setting
of this attribute changes how the code generators create the JAXB class for the data.
Depending on the expectedContentTypes value in the WSDL file, the JAXB artifacts
generated are in the Java type, as described in Table 2.
Table 2 Mapping between MIME type and Java type
MIME type
Java type
image/gif
java.awt.Image
image/jpeg
java.awt.Image
65
MIME type
Java type
text/plain
java.lang.String
text/xml
javax.xml.transform.Source
application/xml
javax.xml.transform.Source
*/*
javax.activation.DataHandler
Because the web service client project is not yet in the workspace when you run the
Web Service wizard, the wizard creates the project for you.
c. Select Monitor the Web service and then click Next.
3. In the WebSphere JAX-WS Top Down Web Service Configuration window (Figure 47 on
page 67), perform these steps:
a. Select Enable MTOM Support.
b. Click Next.
66
4. In the Warning message window (Figure 48) that opens, click Details to view the complete
message. Click Ignore to continue the code generation.
5. In the Test Web Service window, select Next (we will not test this way, because it is difficult
to supply the required input types, such as an array of bytes).
6. In the WebSphere JAX-WS Web Service Client Configuration window, accept the defaults
(Enable MTOM is selected) and click Next.
7. In the Web Service Client Test window, for the Test Facility, select JAX-WS JSPs and click
Finish. The generated JavaBean skeleton and the sample JSP client open.
Developing Web Services Applications
67
package com.ibm.rad8.mtom;
import
import
import
import
import
import
import
import
java.awt.Graphics2D;
java.awt.Image;
java.awt.image.BufferedImage;
java.io.BufferedInputStream;
java.io.File;
java.io.FileOutputStream;
javax.activation.DataHandler;
javax.imageio.ImageIO;
@javax.jws.WebService
(endpointInterface="com.ibm.rad8.mtom.ProcessDocumentDelegate",
targetNamespace="http://mtom.rad8.ibm.com/",
serviceName="ProcessDocumentService", portName="ProcessDocumentPort")
@javax.xml.ws.BindingType
(value=javax.xml.ws.soap.SOAPBinding.SOAP11HTTP_MTOM_BINDING)
public class ProcessDocumentPortBindingImpl{
public byte[] sendWordFile(byte[] arg0) {
68
try {
FileOutputStream fileOut = new FileOutputStream
(new File("C:/4884code/webservices/mtomresult/RAD-intro.doc"));
fileOut.write(arg0);
} catch (Exception e) {
e.printStackTrace();
}
return arg0;
}
public Image sendImage(Image arg0) {
try {
File file = new File
("C:/4884code/webservices/mntomresult/BlueHills.jpg");
BufferedImage bi = new BufferedImage(arg0.getWidth(null),
arg0.getHeight(null), BufferedImage.TYPE_INT_RGB);
Graphics2D g2d = bi.createGraphics();
g2d.drawImage(arg0, 0, 0, null);
ImageIO.write(bi, "jpeg", file);
} catch (Exception e) {
e.printStackTrace();
}
return arg0;
}
public DataHandler sendPDFFile(DataHandler arg0) {
try {
FileOutputStream fileOut = new FileOutputStream(new File(
"C:/4884code/webservices/mtoresult/JAX-WS.pdf"));
BufferedInputStream fileIn = new BufferedInputStream
(arg0.getInputStream());
while (fileIn.available() != 0) {
fileOut.write(fileIn.read());
}
} catch (Exception e) {
e.printStackTrace();
}
return arg0;
}
}
Examine the code in Example 25, and notice the following points:
The sendWordFile method takes byte[] as input and stores the binary data as
4884code/webservices/mtomresult/RAD-intro.doc.
The sendImage method takes an image as input and stores the binary data as
4884code/WebServices/mtomresult/BlueHills.jpg.
The sendPDFFile method takes a DataHandler as input and stores the data in
4884code/WebServices/mtomresult/JAX-WS.pdf.
All the three methods return the received data to the client after storing it on the local
drive.
69
70
3. Select the TCP/IP Monitor tab to view the SOAP traffic. Click the
icon and then select
Show Header. Figure 50 shows the HTTP header and the SOAP traffic.
Figure 50 SOAP traffic when MTOM is enabled for the web service and client
Example 26 shows the SOAP response and its HTTP header (manually formatted).
Example 26 HTTP header SOAP response message with MTOM enabled
HTTP/1.1 200 OK
X-Powered-By: Servlet/3.0
Content-Type: multipart/related;
boundary="MIMEBoundary_111b9ef756340c437561169bec2d4285933d44b19cd7a882";
type="application/xop+xml";
start="<[email protected]>";
start-info="text/xml"
Content-Language: en-US
Content-Length: 29681
Date: Mon, 25 Oct 2010 21:08:31 GMT
Server: WebSphere Application Server/8.0
==========================================================================
--MIMEBoundary_111b9ef756340c437561169bec2d4285933d44b19cd7a882
Content-Type: application/xop+xml; charset=UTF-8; type="text/xml"
Content-Transfer-Encoding: binary
Content-ID: <[email protected]>
71
The type and content-type attributes have the value application/xop+xml, which indicates
that the message was successfully optimized using XOP when MTOM was enabled.
To see the difference when MTOM is not enabled, let us test the new @MTOM annotation on the
server.
Open the file ProcessDocumentPortBindingImpl.java and replace the following line:
@javax.xml.ws.BindingType
(value=javax.xml.ws.soap.SOAPBinding.SOAP11HTTP_MTOM_BINDING)
Then use CTRL+SHIFT+O to arrange the import statements. This new line means that if the
attachment is smaller in size than the threshold (in bytes), the service needs to send binary
data as base64 encoded data within the XML document, instead of optimizing it using XOP.
After you save the file and republish the server, perform the same test as before and look at
the TCP/IP monitor. Figure 51 shows that, in this case, the image is embedded as base64
encoded data in the response.
72
Figure 51 Using @MTOM with a threshold higher than the attachment size
Example 27 shows the HTTP Header and response body in this case, with the binary data
omitted.
Example 27 HTTP Header and response when using @MTOM with a high threshold
HTTP/1.1 200 OK
X-Powered-By: Servlet/3.0
Content-Type: multipart/related;
boundary="MIMEBoundary_811b9ef756340c438cf7b59bec2d4285833d44b19cd7a882";
type="application/xop+xml";
start="<[email protected]>";
start-info="text/xml"
Content-Language: en-US
Transfer-Encoding: chunked
Date: Mon, 25 Oct 2010 21:23:19 GMT
Server: WebSphere Application Server/8.0
======================================================================
--MIMEBoundary_811b9ef756340c438cf7b59bec2d4285833d44b19cd7a882
Content-Type: application/xop+xml; charset=UTF-8; type="text/xml"
Content-Transfer-Encoding: binary
Content-ID: <[email protected]>
<?xml version="1.0" encoding="UTF-8"?><soapenv:Envelope
xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"><soapenv:Body><a:sendIma
geResponse xmlns:a="http://mtom.rad8.ibm.com/"><return>
...omitted encoded binary data....
</return></a:sendImageResponse></soapenv:Body></soapenv:Envelope>
--MIMEBoundary_811b9ef756340c438cf7b59bec2d4285833d44b19cd7a882--
73
There are now other ways of enabling MTOM on the client. For example, as of JAX-WS 2.2,
you can use @MTOM. As of JAX-WS 2.1, you can use MTOMFeature.
The completed MTOM example is available in the file:
4884codesolution\webservices\RAD8WSMTOM.zip
Resources
Resources are the key concept in REST. Resources must be addressable, for example, using
Uniform Resource Identifiers (URIs).
74
Resource representations
Resources can have multiple representations that are suitable for being served to various
types of clients. Examples of representations are HTML (to be consumed by web browsers),
XML (to be consumed by Java clients), and JavaScript Object Notation (JSON) (to be
consumed by JavaScript clients). These representations offered to clients are independent of
the way that the actual data referenced by the resources is stored on the server, which can be
in a relational database.
Uniform interface
Contrary to SOAP-based web services, where each service defines its own interface,
introducing the need for WSDLs to expose the specific interface to clients, in RESTful
architectures the set of methods that can be invoked on the resources is limited and
well-known. In particular, JAX-RS is based on the HTTP protocol and restricts the possible
methods to the HTTP methods, as described in the Hypertext Transfer Protocol -- HTTP/1.1
Request for Comments (RFC):
http://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html
GET
GET is used to read the resource. It does not change the resource (it is safe). Therefore, it
can be called multiple times, and it continues to produce the same side effects (it is
idempotent).
PUT
PUT is used to either insert or update a resource. The client provides the identity (URI) of the
resource to update or create. Because the identity of the resource is already known, this
method is idempotent, although obviously, it is not safe.
DELETE
Delete is used to delete the resource. It is idempotent.
POST
POST is used to create a new resource on the server. The important difference compared to
PUT is that the client of a POST request sends the URI of the resource that includes the new
resource to be created, while the client of PUT provides the URI of the resources to be
created. POST is not idempotent, and it is not safe.
HEAD
HEAD returns the same information as GET, apart from the actual response body. The client
receives a status code and headers, if any.
OPTIONS
OPTIONS is used to retrieve the communication options associated with a resource, or the
capabilities of a server, without actually retrieving the resource.
Statelessness
The requirement for statelessness communication is present to allow applications to scale,
and it is based on the success of the HTTP protocol.
75
Notes
1.0
1.1
76
3. Following these steps, add the JAX-RS facet. If the target server is V7.0, these steps add
the Ajax Proxy and server-side technology facets. The JAX-RS facet adds the library,
servlet information, and support for JAX-RS annotations processing and JAX-RS quick
fixes.
4. Select Finish.
Follow these steps to configure an existing project:
1. Right-click the project and select Properties.
2. Select Project Facets.
3. In the Configuration field, select IBM JAX-RS Configuration.
4. Select Further configuration required.
5. In the JAX-RS Implementation Library field, select IBM WebSphere JAX-RS Library for
WAS v8.0 (Beta).
6. Select Update Deployment Descriptor and select OK.
Example 29 shows the servlet and servlet mapping that are added to the Deployment
Descriptor (web.xml).
Example 29 JAX-RS servlet and servlet mapping in web.xml
<servlet>
<description>
JAX-RS Tools Generated - Do not modify</description>
<servlet-name>JAX-RS Servlet</servlet-name>
<servlet-class>com.ibm.websphere.jaxrs.server.IBMRestServlet
77
</servlet-class>
<load-on-startup>1</load-on-startup>
<enabled>true</enabled>
<async-supported>false</async-supported>
</servlet>
<servlet-mapping>
<servlet-name>JAX-RS Servlet</servlet-name>
<url-pattern>
/jaxrs/*</url-pattern>
</servlet-mapping>
For more information about the configuration of the IBM JAX-RS servlet
com.ibm.websphere.jaxrs.server.IBMRestServlet, see these websites:
http://www14.software.ibm.com/webapp/wsbroker/redirect?version=matt&product=was-ba
se-dist&topic=twbs_jaxrs_configwebxml
http://www14.software.ibm.com/webapp/wsbroker/redirect?version=v700web&product=was
-base-dist&topic=twbs_jaxrs_configwebxml
For both a new and an existing project, we must add a class that extends
javax.ws.rs.core.Application. This class indicates which classes with the @Path and
@Provider annotations need to be deployed by the JAX-RS run time.
Rational Application Developer provides a quick fix to help you create this class:
1. Open the Deployment Descriptor (web.xml).
2. In the Design tab, select Servlet (JAX-RS Servlet).
3. Click Add.
4. Select Initialization Parameter.
5. Save the web.xml file.
6. In the Problems view, the following warning appears:
JSR-311, 2.3.2: The param-name should be javax.ws.rs.Application.
7. Right-click the warning and select Quick Fix.
8. In the Quick Fix window, select Create a new JAX-RS Application sub-class and set
the param-value in the web.xml, as shown in Figure 53.
9. In the Class creation wizard, perform these tasks:
a.
b.
c.
d.
10.In the Java editor, right-click and select Source Override/Implement Methods.
11.Select the getClasses() method from the Application class.
12.Modify the method body of getClasses(), as shown in Example 30 on page 79.
78
package itso.bank.jaxrs;
import java.util.HashSet;
import java.util.Set;
import javax.ws.rs.core.Application;
public class BankJAXRSApplication extends Application {
@Override
public Set<Class<?>> getClasses() {
Set<Class<?>> classes = new HashSet<Class<?>>();
return classes;
}
}
We will add classes that represent resources (annotated with @Path) to the collection returned
by getClasses(). Instances of these classes will be created by the run time with a per-request
lifecycle.
You can get the project, which we have developed so far, in this file:
4884code\webservices\RAD8JAX-RSStart.zip
79
Now we configure the project for deploying the JPA entities on the server.
Before you continue: To configure this project, you need a connection called
ITSOBANKDerby. If you do not have this connection, refer to Chapter 9 in Rational
Application Developer for WebSphere Software V8 Programming Guide, SG24-7835, for
detailed information about creating this connection. This book is available at this website:
http://www.redbooks.ibm.com/abstracts/sg247835.html?Open
80
We are now ready to start exposing the JPA entities as JAX-RS resources:
1. In project RAD8JAX-RSWeb, create a Java package called itso.bank.resources.
2. Add to this package three Java classes:
AccountResource
CustomerResource
TransactionResource
3. In the class BankJAXRSApplication, add these three classes to the HashSet that is
returned by the method getClasses, as shown inExample 31.
Example 31 Completed BankJAXRSApplication class
package itso.bank.jaxrs;
import itso.bank.resources.AccountResource;
import itso.bank.resources.CustomerResource;
import itso.bank.resources.TransactionResource;
import java.util.HashSet;
import java.util.Set;
import javax.ws.rs.core.Application;
public class BankJAXRSApplication extends Application {
@Override
public Set<Class<?>> getClasses() {
Set<Class<?>> classes = new HashSet<Class<?>>();
classes.add(CustomerResource.class);
classes.add(AccountResource.class);
classes.add(TransactionResource.class);
return classes;
}
}
In order to define the URIs for the Resources, we use the @Path annotation.
@Path(@javax.ws.rs.Path)
@Path can be applied to Java classes and methods. It is used to define the URI (relative to the
web project context-root) for an incoming HTTP request that must be answered by that
class/method.
Table 4 shows how the values of the @Path annotation map to URIs, based on the previously
chosen project name (RAD8JAX-RSWeb) and on the JAX-RS servlet mapping already declared
in web.xml.
Table 4 Mapping of @Path annotations to URIs
Annotation
URL
@Path(/customers)
http://hostname:portname/RAD8JAX-RSWeb/jaxrs/customers
@Path(/accounts)
http://hostname:portname/RAD8JAX-RSWeb/jaxrs/accounts
@Path(/transaction)
http://hostname:portname/RAD8JAX-RSWeb/jaxrs/transaction
81
package itso.bank.resources;
import itso.bank.entities.Customer;
import itso.bank.entities.controller.CustomerManager;
import java.io.IOException;
import java.util.List;
import
import
import
import
import
javax.persistence.EntityManagerFactory;
javax.persistence.Persistence;
javax.ws.rs.GET;
javax.ws.rs.Path;
javax.ws.rs.Produces;
import com.ibm.json.java.JSONArray;
import com.ibm.json.java.JSONObject;
@Path("/customers")
public class CustomerResource {
private CustomerManager manager;
private EntityManagerFactory emf;
public CustomerResource() {
super();
emf = Persistence.createEntityManagerFactory("RAD8JPA");
manager = new CustomerManager(emf);
}
@GET
@Produces("application/json")
public JSONArray getAllCustomers() throws IOException {
final List<Customer> allCustomers = manager.getCustomers();
JSONArray jsonArray = jsonCustomerArray(allCustomers);
return jsonArray;
}
private static JSONArray jsonCustomerArray(final List<Customer> allCustomers) {
JSONArray jsonArray = new JSONArray(allCustomers.size());
for (Customer customer : allCustomers) {
jsonArray.add(jsonCustomer(customer));
}
return jsonArray;
}
private static JSONObject jsonCustomer(Customer customer) {
JSONObject obj = new JSONObject();
obj.put("title", customer.getTitle());
obj.put("firstName", customer.getFirstName());
82
obj.put("lastName", customer.getLastName());
obj.put("ssn", customer.getSsn());
return obj;
}
}
@Get(@javax.ws.rs.Get)
This annotation is used to denote a method that performs the safe, idempotent HTTP GET
operation.
@Produces(@javax.ws.rs.Produces)
This annotation indicates which media type is returned by a method annotated with @Get.
Typically, web browsers do not know how to handle the type application/json, which is meant
to be consumed by JavaScript, and you are likely prompted to save the file or open it with an
application of your choosing. After you open the file in any text editor, you see the contents, as
shown in Example 33.
Example 33 JSONArray produced by the method getAllCustomers
[{"lastName":"Cui","title":"Mr","firstName":"Henry","ssn":"111-11-1111"},{"lastNam
e":"Fleming","title":"Ms","firstName":"Craig","ssn":"222-22-2222"},{"lastName":"Co
utinho","title":"Mr","firstName":"Rafael","ssn":"333-33-3333"},{"lastName":"Sollam
i","title":"Mr","firstName":"Salvatore","ssn":"444-44-4444"},{"lastName":"Hainey",
"title":"Mr","firstName":"Brian","ssn":"555-55-5555"},{"lastName":"Baber","title":
"Mr","firstName":"Steve","ssn":"666-66-6666"},{"lastName":"Venkatraman","title":"M
r","firstName":"Sundaragopal","ssn":"777-77-7777"},{"lastName":"Ziosi","title":"Mr
","firstName":"Lara","ssn":"888-88-8888"},{"lastName":"Lippmann","title":"Mr","fir
stName":"Sylvi","ssn":"999-99-9999"},{"lastName":"Kumari","title":"Mr","firstName"
:"Venkata","ssn":"000-00-0000"},{"lastName":"Keen","title":"Mr","firstName":"Marti
n","ssn":"000-00-1111"}]
83
4. Add a new class in the itso.bank.jaxrs.client package with the code that is shown in
Example 34.
Example 34 GetAllCustomersClient stand-alone JAX-RS Client
package itso.bank.jaxrs.client;
import java.io.IOException;
import org.apache.wink.client.ClientResponse;
import com.ibm.json.java.JSONArray;
public class GetAllCustomersClient {
private org.apache.wink.client.ClientConfig clientConfig = new
org.apache.wink.client.ClientConfig();
private org.apache.wink.client.RestClient client = new
org.apache.wink.client.RestClient(clientConfig);
private final String base = "http://localhost:9080/RAD8JAX-RSWeb/jaxrs";
public static void main(String args[]) throws IOException {
GetAllCustomersClient getAllCustomersClient = new GetAllCustomersClient();
getAllCustomersClient.getResource(getAllCustomersClient.base + "/customers");
}
public JSONArray getResource(String URI) {
org.apache.wink.client.Resource resource = client.resource(URI);
ClientResponse response = resource.get();
System.out.println("Getting: " + URI);
System.out.println("Received Message:\n" + response.getMessage());
System.out
.println("Received Entity:\n" + response.getEntity(JSONArray.class));
return response.getEntity(JSONArray.class);
}
}
Getting: http://localhost:9080/RAD8JAX-RSWeb/jaxrs/customers
Received Message:
OK
Received Entity:
[{"lastName":"Cui","title":"Mr","firstName":"Henry","ssn":"111-11-1111"},......
.
84
@Path("pname/{pname}")
@GET
@Produces("application/json")
public JSONArray getCustomersByPartialName(@PathParam(value = "pname") String
pname) {
final List<Customer> allCustomers = manager.getCustomersByPartialName(pname);
JSONArray jsonArray = jsonCustomerArray(allCustomers);
return jsonArray;
}
@PathParam(@javax.ws.rs.PathParam)
@PathParam is placed in front of an operation parameter. It takes the value attribute, which is
also referenced in the @Path annotation and is enclosed in braces ({}), which allows the
JAX-RS run time to inject the (converted) segment of the URL into the Java method
parameter.
85
We have chosen to represent Debit and Credit entities with only one type of resource called
TransactionResource, which is mapped to a JSONObject that has a transaction type
(transType).
We can now define the additional method of class CustomerResource.
Example 39 getAccountsForSSN in CustomerResource
@Path("accounts/{ssn}")
@GET
@Produces("application/json")
public JSONArray getAccountsForSsn(@PathParam(value = "ssn") String ssn)
final List<Account> allAccounts = manager.getAccountsForSSN(ssn);
JSONArray jsonArray = AccountResource.jsonAccountArray(allAccounts);
return jsonArray;
}
This step returns a JSONArray with the accounts corresponding to the ssn:
[{"id":"001-111001","balance":12645.67},{"id":"001-111002","balance":6843.21},{"id
":"001-111003","balance":398.76}]
86
Posting data
TransactionResource is more interesting, because you see how to create new transactions
(Example 40).
Example 40 Implementation of createTransaction in TransactionResource
@POST
@Consumes("application/json")
@Produces("application/json")
public JSONObject createTransaction(JSONObject inputObj)
throws WebApplicationException {
String transType = (String) inputObj.get("transType");
Transaction transaction = null;
EntityManagerFactory emf = Persistence
.createEntityManagerFactory("RAD8JPA");
AccountManager accountManager = new AccountManager(emf);
Account account = accountManager.findAccountById((String) inputObj
.get("accountId"));
if(account ==null)
throw new WebApplicationException(jSONObjectResponse(Status.BAD_REQUEST,"No
Account Found"));
Transaction persistedTransaction = null;
if (transType.equals("Credit")) {
transaction = new Credit(BigDecimal.valueOf(Double
.parseDouble(inputObj.get("amount").toString())));
try {
transaction.setAccount(account);
creditManager.createCredit((Credit) transaction);
persistedTransaction = creditManager
.findCreditById(transaction.getId());
} catch (Exception e) {
throw new
WebApplicationException(jSONObjectResponse(Status.INTERNAL_SERVER_ERROR,e.getMessa
ge()));
}
} else if (transType.equals("Debit")) {
transaction = new Debit(BigDecimal.valueOf(Double
.parseDouble(inputObj.get("amount").toString())));
try {
transaction.setAccount(account);
debitManager.createDebit((Debit)transaction);
persistedTransaction = debitManager
.findDebitById(transaction.getId());
} catch (Exception e) {
throw new
WebApplicationException(jSONObjectResponse(Status.INTERNAL_SERVER_ERROR,e.getMessa
ge()));
}
} else {
throw new
WebApplicationException(jSONObjectResponse(Status.BAD_REQUEST,transType+ " should
be Debit or Credit"));
}
return jsonTransaction(persistedTransaction);
}
87
This method takes as input a JSONObject representing a Transaction. It tries first to find the
Account corresponding to the accountId field of the input JSONObject. Then it tries to
determine whether the input corresponds to a Credit or Debit transaction, based on the
value of the transType field of the input JSONObject. If both pieces of information can be
retrieved successfully, it tries to create a new Credit or Debit object, and finally it tries to
persist it.
We have introduced two new annotations.
@Post(@javax.ws.rs.Post)
The JAX-RS run time directs the HTTP POST requests that match the URL of the enclosing
@PATH annotation to the method annotated with @Post. The method annotated with @Post is
typically used to create new elements that will have the URL of the enclosing @PATH
annotation.
@Consumes(@javax.ws.rs.Consumes)
The @Consumes annotation defines what media type the method expects to receive as input
from the HTTP request.
package itso.bank.resources;
import javax.ws.rs.core.Response;
import javax.ws.rs.core.Response.Status;
import com.ibm.json.java.JSONArray;
import com.ibm.json.java.JSONObject;
public class ErrorUtil {
public static JSONObject errorObject(String msg){
JSONObject object = new JSONObject();
object.put("error", msg);
return object;
}
public static JSONArray errorArray(String msg){
JSONObject object = errorObject(msg);
JSONArray array = new JSONArray();
array.add(object);
return array;
}
public static Response jSONObjectResponse(Status status, String msg){
return
Response.status(Status.BAD_REQUEST).type("application/json").entity(errorObject(ms
g)).build();
88
}
public static Response jSONArrayResponse(Status status, String msg){
return
Response.status(Status.BAD_REQUEST).type("application/json").entity(errorArray(msg
)).build();
}
}
package itso.bank.jaxrs.client;
import
import
import
import
import
import
java.io.IOException;
java.math.BigDecimal;
org.apache.wink.client.ClientResponse;
org.apache.wink.client.Resource;
com.ibm.json.java.JSONArray;
com.ibm.json.java.JSONObject;
89
90
String pretty="";
String spaces="
";
for(int i=0;i<objects.length;i++){
pretty=pretty+objects[i]+"\n"+spaces;
}
return pretty;
}
}
91
WS-Security addresses three major issues involved in securing SOAP message exchanges:
authentication, message integrity, and message confidentiality.
Authentication
Authentication is used to ensure that parties within a business transaction are really who they
claim to be; thus, proof of identity is required. This proof can be claimed in the following ways:
Presenting a user identifier and password (referred to as a username token in the
WS-Security domain)
Using an X.509 certificate issued by a trusted certificate authority
The certificate contains identity credentials and has a pair of private and public keys
associated with it. The proof of identity presented by a party includes the certificate itself and
a separate piece of information that is digitally signed using the certificates private key. By
validating the signed information using the public key associated with the partys certificate,
the receiver can authenticate the sender as being the owner of the certificate, thereby
validating the senders identity.
Two WS-Security specifications, the Username Token Profile 1.0/1.1 and the X.509
Certificate Token Profile 1.0/1.1, explain how to use these authentication mechanisms with
WS-Security.
Message integrity
To validate that a message has not been tampered with or corrupted during its transmission
over the Internet, the message can be digitally signed by using security keys. The sender
uses the private key of its X.509 certificate to digitally sign the SOAP request. The receiver
uses the senders public key to check the signature and identity of the signer. The receiver
signs the response with its private key. The sender can validate that the response has not
been tampered with or corrupted by using the receivers public key to check the signature and
identity of the responder.
Message confidentiality
To keep the message safe from eavesdropping, encryption technology is used to scramble
the information in web services requests and responses. The encryption ensures that no one
accesses the data in transit, in memory, or after it has been persisted, unless that person has
the private key of the recipient. The WS-Security: SOAP Message Security 1.0/1.1
specification describes enhancements to SOAP messaging to provide message
confidentiality.
Two options are available to configure WS-Security for JAX-WS web services:
Policy sets
Programming API for securing SOAP message with the WS-Security API and Service
Programming Interfaces (SPI) for a service provider
Policy set
You can use policy sets to simplify configuring the qualities of service for web services and
clients. Policy sets are assertions about how web services are defined. By using policy sets,
92
you can combine configurations for separate policies. You can use policy sets with JAX-WS
applications, but not with JAX-RPC applications.
A policy set is identified by a unique name. An instance of a policy set consists of a collection
of policy types. An empty policy set has no policy instance defined.
Policies are defined on the basis of a quality of service (QoS). Policy definitions are typically
based on the WS-Policy standards language. For example, the WS-Security policy is based
on the current WS-SecurityPolicy language from the OASIS standards.
Policy sets omit application or user-specific information, such as keys for signing, keystore
information, or persistent store information. Instead, application and user-specific information
is defined in the bindings. Typically, bindings are specific to the application or the user, and
bindings are not normally shared. On the server side, if you do not specify a binding for a
policy set, a default binding is used for that policy set. On the client side, you must specify a
binding for each policy set.
A policy set attachment defines which policy set is attached to service resources, and which
bindings are used for the attachment. The bindings define how the policy set is attached to
the resources. An attachment is defined outside of the policy set, as metadata associated
with the application. To enable a policy set to work with an application, a binding is required.
93
valid user name and password in your environment using the WebSphere administrative
console:
1. In the Servers view, right-click WebSphere Application Server v8.0 Beta and select
Administration Run administrative console.
2. Log in with the user ID and password (admin). We assume that your WebSphere Profile is
secured and that the administrator user is called admin.
3. Select Services Policy sets General client policy set bindings (Figure 55).
94
2. In the Add Policy Set Attachment to Service window (Figure 58 on page 96), click Add.
3. In the End Point Definition Dialog window (Figure 59 on page 96), for Policy Set, select
Username WSSecurity default, and for Binding, ensure that Provider Sample is
selected. This binding is a service-side general binding packaged with WebSphere
Application Server. Click OK.
95
You can apply a policy set at the service, port, or operation level. Separate policy sets can
be applied to various endpoints and operations within a single web service. However, the
service and client must have the same policy set settings. For this example, we apply the
policy set to the entire service, so the Endpoint and Operation Name fields are left blank.
4. When the warning message is displayed, click Ignore. WS-Security was included in the
WS-I Basic Security Profile. The WS-I Basic Security Profile Version 1.0 was in Final
Material status.
5. Back in the Add Policy Set Attachment to Service window, click Finish. Notice that the
service application is republished to the server.
96
3. In the Add Policy Set Attachment to Client window, click Add (Figure 61 on page 98) to
attach a policy set to the endpoint and to specify the bindings. The dialog window initially
has no entries, and Figure 61 on page 98 shows the result after the addition is complete.
97
4. In the End Point Definition Dialog: Configure Policy Set and Binding window (Figure 62),
accept the settings for Service Name (BankService), Endpoint (all), Policy Set
(Username WSSecurity default), and Binding (Client sample). This binding is a
client-side general binding packaged with WebSphere Application Server.
5. Click OK.
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/">
<soapenv:Header>
<wsse:Security soapenv:mustUnderstand="1"
xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-sec
ext-1.0.xsd">
<wsu:Timestamp Id="wssecurity_signature_id_21"
xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-util
ity-1.0.xsd">
<wsu:Created>2010-10-26T00:25:16.453Z</wsu:Created>
</wsu:Timestamp>
99
<wsse:BinarySecurityToken
EncodingType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message
-security-1.0#Base64Binary"
ValueType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-prof
ile-1.0#X509v3" Id="x509bst_23"
xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-util
ity-1.0.xsd">MIICQzCCAaygAwIBA.....
</wsse:BinarySecurityToken>
.....
You can obtain the complete request and response at these locations:
4884codesolution\webservices\UserNameTokenRequest.txt
4884codesolution\webservices\UserNameTokenResponse.txt
You can obtain the secured projects archive (where the irrelevant projects have been
removed from the two EAR files) in this folder:
4884codesolution\webservices\RAD8WSUsernameToken.zip
The configuration steps to apply the WS-I RSP policy set are similar to the steps for the
Username WS-Security policy set. Select WS-I RSP for Policy Set when adding a policy set
attachment to the service. We leave it as an exercise for you to explore this functionality.
WS-Policy
The Web Services Policy Framework (WS-Policy) specification is an interoperability standard
that is used to describe and communicate the policies of a web service so that service
providers can export policy requirements in a standard format. Clients can combine the
service provider requirements with their own capabilities to establish the policies that are
required for a specific interaction.
100
WebSphere Application Server conforms to the Web Services Policy Framework (WS-Policy)
specification. You can use the WS-Policy protocol to exchange policies in a standard format.
A policy represents the capabilities and requirements of a web service, for example, whether
a message is secure and how to secure it, and whether a message is delivered reliably and
how to deliver a message reliably. You can communicate the policy configuration to any other
client, service registry, or service that supports the WS-Policy specification, including
non-WebSphere Application Server products in a heterogeneous environment.
For a service provider, the policy configuration can be shared in a published WSDL that is
obtained by a client using an HTTP get request or by using the Web Services Metadata
Exchange (WS-MetadataExchange) protocol. The WSDL is in the standard
WS-PolicyAttachments format.
For a client, the client can obtain the policy of the service provider in the standard
WS-PolicyAttachments format and use this information to establish a configuration that is
acceptable to both the client and the service provider. That is, the client can be configured
dynamically, based on the policies supported by its service provider. The provider policy can
be attached at the application or service level.
Relationship to policy set: Policy sets are not inherently concerned with the WS-Policy
specification, but work with the configuration of web services and need to be considered as
a front end to WS-Policy. Policy sets provide a mechanism to specify a policy within a
WebSphere environment. They do not provide a mechanism to communicate this policy to
non-WebSphere partners in a heterogeneous environment. In addition, policy set
functionality does not provide a mechanism for the client to calculate effective policy (that
is, a policy that is acceptable to both client and provider) based the intersection of a list of
client and provider policies.
101
3. In the Configure Policy Sharing window (left window in Figure 64), select the service and
click Configure. In the Configure Policy Sharing for Web Service window (right window in
Figure 64), select Share Policy Information via WSDL and click OK.
The WS-Policy information is embedded in the WSDL document (Example 44). You can see
that the policy configured for the input message includes UsernameToken.
Example 44 WS-Policy in WSDL
......
<binding name="BankPortBinding" type="tns:Bank">
<soap:binding style="document"
transport="http://schemas.xmlsoap.org/soap/http"/>
<wsp:PolicyReference URI="#b2670004-122a-4028-ab78-bf5d286647d6"/>
<operation name="RetrieveCustomerName">
<soap:operation soapAction="urn:getCustomerFullName"/>
<input>
<soap:body use="literal"/>
<wsp:PolicyReference URI="#402c7f57-35bb-435d-98bb-f9e3575f4d3e"/>
</input>
<output>
<soap:body use="literal"/>
<wsp:PolicyReference URI="#b7dd0e57-5b38-4ecd-9f67-10d6c32da5b5"/>
</output>
<fault name="CustomerDoesNotExistException">
<soap:fault name="CustomerDoesNotExistException" use="literal"/>
</fault>
</operation>
102
</binding>
....
<wsp:Policy wsu:Id="402c7f57-35bb-435d-98bb-f9e3575f4d3e">
<ns2:SignedParts
xmlns:ns2="http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702">
<ns2:Body />
<ns2:Header Namespace="http://schemas.xmlsoap.org/ws/2004/08/addressing" />
<ns2:Header Namespace="http://www.w3.org/2005/08/addressing" />
</ns2:SignedParts>
<ns2:EncryptedParts
xmlns:ns2="http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702">
<ns2:Body />
</ns2:EncryptedParts>
<ns2:SignedEncryptedSupportingTokens
xmlns:ns2="http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702">
<wsp:Policy>
<ns2:UsernameToken
ns2:IncludeToken="http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702/Includ
eToken/AlwaysToRecipient">
<wsp:Policy>
<ns2:WssUsernameToken10 />
</wsp:Policy>
</ns2:UsernameToken>
</wsp:Policy>
</ns2:SignedEncryptedSupportingTokens>
</wsp:Policy>
....
</definitions>
103
4. In the Configure Policy acquisition for Web Service Client window (Figure 66 on
page 104), select HTTP Get request targeted at <default WSDL URL> and click OK.
The Policy Acquisition field for the service changes to Acquire Provider Policy in
Figure 65.
5. In the warning message window that opens, click Ignore and then click Finish.
6. Test the web service again. In the TCP/IP Monitor, you can see that the client first acquires
the WSDL through the HTTP GET (Figure 67 on page 105). The client policy calculations
for a service are performed at the first invocation on that service. Calculated policies are
cached in the client for performance.
104
WS-MetadataExchange (WS-MEX)
In WebSphere Application Server V7.0, with JAX-WS, you can enable the Web Services
Metadata Exchange (WS-MetadataExchange) protocol so that the policy configuration of the
service provider is included in the WSDL and is available to a WS-MetadataExchange
GetMetadata request. A service provider can use a WS-MetadataExchange request to share
its policies. A service client can use a WS-MetadataExchange request to apply the policies of
a provider.
One advantage of using the WS-MetadataExchange protocol is that you can apply
transport-level or message-level security to WS-MetadataExchange GetMetadata requests by
using a suitable system policy set. Another advantage is that the client does not have to
match the provider configuration, or have a policy set attached. The client only needs the
binding information. Then the client can operate based on the provider policy, or based on the
intersection of the client and provider policies.
To configure a service provider to share its policy configuration using WS-MEX, follow these
steps:
1. In the Services view, right-click RAD8WebServiceWeb:{...}BankService and select
Manage Policy Set Attachment.
2. Verify that the username WSSecurity default is listed as the attached policy set from the
previous section. Click Next.
3. In the Configure Policy Sharing window, select the service and click Configure.
4. In the Configure Policy Sharing for Web Service window (Figure 68), select Share Policy
Information using WS-MetadataExchange and click OK.
105
5. In the warning message window that opens, click Ignore and click Finish.
To configure the client policy configuration using WS-MEX, follow these steps:
1. Right-click RAD8WebServiceClient: service/BankService, select Manage Policy Set
Attachment and click Use Provider Policy.
2. In the Configure Policy acquisition for Web Service Client window, select
WS-MetadataExchange and click OK.
3. In the warning message window that opens, click Ignore and click Finish.
4. Test the web service again. In the TCP/IP Monitor, you can see that the client first issues a
WS-MEX GetMetadata request to the actual web service endpoint and that the dialect of
the request is WSDL (Example 45).
Example 45 WS-MEX request
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/">
<soapenv:Header xmlns:wsa="http://www.w3.org/2005/08/addressing">
<wsa:To>http://wxpsp408:12000/RAD8WebServiceWeb/BankService</wsa:To>
<wsa:MessageID>urn:uuid:227725c2-1602-400d-9449-50a0e966058b</wsa:MessageID>
<wsa:Action>http://schemas.xmlsoap.org/ws/2004/09/mex/GetMetadata/Request</w
sa:Action>
</soapenv:Header>
<soapenv:Body>
<mex:GetMetadata xmlns:mex="http://schemas.xmlsoap.org/ws/2004/09/mex">
<mex:Dialect>http://schemas.xmlsoap.org/wsdl/</mex:Dialect>
</mex:GetMetadata>
</soapenv:Body>
</soapenv:Envelope>
The GetMetadata response returns the WSDL with the policy information (Figure 69 on
page 107). Then you see a second request in the TCP/IP Monitor with the actual request and
response.
106
107
The standard describes the use of SAML assertions as security tokens in the
<wsse:Security> header, as defined by the WSS: SOAP Message Security specification. An
XML signature can be used to bind the subjects and statements in the SAML assertion to the
SOAP message.
Bearer
When using the bearer subject confirmation method, proof of the relationship between the
subject and claims is implicit. No specific steps are taken to establish the relationship.
Because no key material is associated with a bearer token, protection of the SOAP message,
if required, must be performed by using a transport-level mechanism or another security
token, such as an X.509 or Kerberos token, for message-level protection.
Holder-of-key
When using the holder-of-key subject confirmation method, proof of the relationship between
the subject and claims is established by signing part of the SOAP message with the key
specified in the SAML assertion. Because there is key material associated with a
holder-of-key token, this token can be used to provide message-level protection (signing and
encryption) of the SOAP message.
Sender-vouches
The sender-vouches confirmation method is used when a server needs to propagate the
client identity with SOAP messages on behalf of the client. This method is similar to identity
assertion, but it has the added flexibility of using SAML assertions to propagate not only the
client identity, but also propagate client attributes. The attesting entity must protect the
vouched for SAML assertions and SOAP message content so that the receiver can verify that
it has not been altered by another party.
SAML APIs
The SAMLTokenFactory API is the major SAML token programming interface. Using this API,
you can create SAML tokens, insert SAML attributes, parse and validate SAML assertions as
XML representations for the SAML tokens, and create Java Authentication and Authorization
Service (JAAS) subjects that represent user identity and attributes as defined in SAML
tokens. For more information, refer to the WebSphere Application Server Information Center
and look for these classes:
com.ibm.websphere.wssecurity.wssapi.token.SAMLTokenFactory
com.ibm.websphere.wssecurity.wssapi.token.SAMLToken
http://www14.software.ibm.com/webapp/wsbroker/redirect?version=compass&product=was
-base-dist&topic=cwbs_overviewsamlapis
Transport security
Message authentication
The client is configured to generate a SAML Bearer Token, and the service is configured to
consume it. The client makes use of the SAML APIs to create the SAML Token
programmatically.
The following steps are required if you use WebSphere Application Server V8:
1. Launch the administrative console.
2. Select Services Policy Sets Application Policy Sets.
3. Select SAML11 Bearer WSHTTPS default.
4. Select Import From Default Repository and select OK.
5. Select Save.
6. Optional: Explore the other relevant features that are predefined:
Verify that in Services General Client Policy Set Bindings, you have these
bindings:
Saml Bearer Client sample
Saml HoK Symmetric Client sample
Additionally, you must export the same policy set from WebSphere Application Server and
import it into your Rational Application Developer workspace with the following steps:
1. Launch the administrative console.
2. Select Services Policy Sets Application Policy Sets.
3. Select SAML11 Bearer WSHTTPS default.
4. Select Export.
5. A new page opens with a hyperlink to the file SAML11 Bearer WSHTTPS default.zip.
6. Right-click the hyperlink and use your browser menu to save the target locally (typically,
Save target as). Make note of where you save the file.
7. In Rational Application Developer, select File Import.
Developing Web Services Applications
109
You must repeat the import operation in each workspace where you want to be able to
associate this policy set to a service or client.
We leave it for you to test this sample. In the remainder of this section, we show how to
reuse the bindings for the RAD8TopDownBankEAR application, which we developed in ,
Creating a top-down web service from a WSDL on page 55.
2. If you no longer have it in your workspace, import the archive:
4884codesolution\webservices\RAD8TopDownWebService.zip
110
Value
Bearer
confirmationMethod
keyType
http://docs.oasis-open.org/ws-sx/ws
-trust/200512/Bearer
trustAnySigner
true
111
<callbackHandler
classname="com.ibm.websphere.wssecurity.callbackhandler.SAMLConsumerCallbackHan
dler">
<properties value="Bearer" name="confirmationMethod"/>
<properties
value="http://docs.oasis-open.org/ws-sx/ws-trust/200512/Bearer"
name="keyType"/>
<properties name="trustAnySigner" value="true" />
</callbackHandler>
<jAASConfig configName="system.wss.consume.saml"/>
<securityTokenReference reference="request:SAMLToken11Bearer"/>
</tokenConsumer>
</securityInboundBindingConfig>
</securityBinding>
</securityBindings>
112
Name
Value
Bearer
confirmationMethod
keyType
http://docs.oasis-open.org/ws-sx/ws
-trust/200512/Bearer
We have seen how the service provider was configured to consume a SAML V1.1 Bearer
Token and how the service client was configured to generate a SAML V1.1 Bearer Token.
We now associate these bindings to the corresponding policy set on the service:
1. In the Service view, right-click RAD8TopDownBankWS. Complete these steps:
a. Select Manage Policy Set Attachments Server Side.
b. Select Add.
2. You see the dialog window that is shown in Figure 72. Complete these steps:
a. For Policy set, select SAML Bearer WSHTTPS default.
b. For Binding, select SAMLBearerProviderBinding.
113
4. Select Next.
5. Select Configure.
6. Select Share Policy Information via WSDL.
7. Select OK, click Ignore, and click Finish.
114
3. Select OK.
4. The Add Policy Set Attachment to Web Service Client window opens, as shown in
Figure 75 on page 116. Select Finish.
115
We have completed the configuration of the policy sets and bindings on the client.
package org.example.bankws.saml;
import
import
import
import
import
com.ibm.websphere.wssecurity.wssapi.token.SAMLToken;
com.ibm.websphere.wssecurity.wssapi.token.SAMLTokenFactory;
com.ibm.wsspi.wssecurity.saml.config.CredentialConfig;
com.ibm.wsspi.wssecurity.saml.config.ProviderConfig;
com.ibm.wsspi.wssecurity.saml.config.RequesterConfig;
117
In the console, you see output indicating that the client generated the SAML Bearer Token
(Example 50).
Example 50 Console showing the creation of the SAML Token
00000023 servlet
I com.ibm.ws.webcontainer.servlet.ServletWrapper init
SRVE0242I: [RAD8TopDownBankWSClientEAR] [/RAD8TopDownBankWSClient]
[/sampleBankWSSOAPProxy/Input.jsp]: Initialization successful.
00000024 SystemOut
O Retrieving document at
'file:/C:/workspaces/WebServices/RAD8TopDownBankWSClient/WebContent/WEB-INF/wsdl/'
.
00000024 SystemOut
O Retrieving schema at 'BankWS_schema1.xsd', relative to
'file:/C:/workspaces/WebServices/RAD8TopDownBankWSClient/WebContent/WEB-INF/wsdl/'
.
00000024 SystemOut
O $$ Generated a SAML Token $$
00000024 SystemOut
O SAML Token id is : _ECAE899D4F56A343AC1288118909489
00000024 SystemOut
O Attached to the Request Context as property
com.ibm.wsspi.wssecurity.saml.put.SamlToken
If you want to see the actual SOAP message, you cannot use the TCP/IP Monitor, because
the message is transmitted using HTTPS. The Generic Service Client supports HTTPS, but it
does not use the modified proxy client code to generate the SAML Bearer Token. You can,
however, configure tracing in WebSphere Application Server that allows you to see how the
server interprets the message:
1. Right-click the server in the Server view.
2. Select Administration Run Administrative Console.
118
10.Select Save.
11.Log out of the administrative console.
12.Restart WebSphere Application Server for the changes to take effect.
13.Perform the same test as described previously.
14.Open the trace file, which, by default, is located in
<WAS_HOME>\profiles\<profile_name>\logs\server1\trace.log.
15.You see entries, as shown in Example 51. These entries were manually formatted.
Example 51 Trace including com.ibm.ws.wssecurity.saml.*=all
00000017 EnvelopedSign 3
ResourceShower logs
verify-#_DD551E9C7189EE6A931288120072735:
00000017 EnvelopedSign 3
<saml:Assertion xmlns:saml="urn:oasis:names:tc:SAML:1.0:assertion"
AssertionID="_DD551E9C7189EE6A931288120072735"
IssueInstant="2010-10-26T19:07:52.734Z"
Issuer="WebSphere" MajorVersion="1" MinorVersion="1">
<saml:Conditions NotBefore="2010-10-26T19:07:52.750Z"
NotOnOrAfter="2010-10-26T20:07:52.750Z">
</saml:Conditions>
<saml:AttributeStatement>
<saml:Subject>
<saml:NameIdentifier>
</saml:NameIdentifier>
<saml:SubjectConfirmation>
<saml:ConfirmationMethod>urn:oasis:names:tc:SAML:1.0:cm:bearer
</saml:ConfirmationMethod>
</saml:SubjectConfirmation>
</saml:Subject>
</saml:AttributeStatement>
</saml:Assertion>
00000017 EnvelopedSign 3
ResourceShower logs verify-SignedInfo:
00000017 EnvelopedSign 3
<ds:SignedInfo xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
<ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-excc14n#">
</ds:CanonicalizationMethod>
<ds:SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1">
</ds:SignatureMethod>
<ds:Reference URI="#_DD551E9C7189EE6A931288120072735">
<ds:Transforms>
<ds:Transform
Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature">
</ds:Transform>
Developing Web Services Applications
119
<ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#">
</ds:Transform>
</ds:Transforms>
<ds:DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1">
</ds:DigestMethod>
<ds:DigestValue>crkHuGw2LI4ZXeniAdyh9ggJ5sA=</ds:DigestValue>
</ds:Reference>
</ds:SignedInfo>
More information
For more information about web services, see the following resources:
For information about JAX-WS, Reliable Messaging, Secure Conversation, policy sets,
and RSP profiles, see these publications:
Web Services Feature Pack for WebSphere Application Server V6.1, SG24-7618
IBM WebSphere Application Server V7.0 Web Services Guide, SG24-7758
For JAX-RPC web services tools that ship with Rational Application Developer V7.0, see
the Rational Application Developer V7 Programming Guide, SG24-7501.
IBM developerWorks section about SOA and web services
http://www.ibm.com/developerworks/webservices
List of current and emerging web services standards on developerWorks (under SOA and
Web services Standards)
http://www.ibm.com/developerworks/webservices/standards/
The JAX-WS specification
http://jcp.org/aboutJava/communityprocess/pfd/jsr224/index.html
The JAXB specification
http://jcp.org/en/jsr/detail?id=222
The MTOM specification
http://www.w3.org/TR/soap12-mtom/
JAX-WS annotations:
https://jax-ws.dev.java.net/jax-ws-ea3/docs/annotations.html
http://publib.boulder.ibm.com/infocenter/wasinfo/v6r1/index.jsp?topic=/com.ib
m.websphere.wsfep.multiplatform.doc/info/ae/ae/rwbs_jaxwsannotations.html
The WS-Policy specification
http://www.w3.org/Submission/WS-Policy/
The WS-MetadataExchange specification
http://www.ibm.com/developerworks/webservices/library/specification/ws-mex/
120
http://www.ibm.com/developerworks/web/library/wa-apachewink1/
http://www.ibm.com/developerworks/webservices/library/ws-restful/
http://www.ibm.com/developerworks/web/library/wa-datawebapp/
SAML resources and examples:
http://www.ibm.com/developerworks/websphere/techjournal/1004_chao/1004_chao.h
tml
https://www.ibm.com/developerworks/wikis/download/attachments/116424904/Intro
duction+to+SAML+and+support+in+7.0.0.7.pdf
http://publib.boulder.ibm.com/infocenter/wasinfo/v7r0/index.jsp?topic=/com.ib
m.websphere.base.doc/info/aes/ae/cwbs_samloverview.html
The additional web material that accompanies this paper includes the following files:
File name
4884code.zip
4884codesolution.zip
Description
Compressed file that contains sample code
Compressed file that contains solution interchange files
20 GB minimum
Microsoft Windows or Linux
2 GHz
2 GB
121
Rafael is a computer engineer graduate from the State University of Campinas (Unicamp),
Brazil, and has a degree in Information Technologies from the Centrale Lyon (ECL), France.
Sylvi Lippmann is a Software IT Specialist in the GBS Financial Solutions team in Germany.
She has over seven years of experience as a Software Engineer, Technical Team Leader,
Architect, and Customer Support representative. She is experienced in the draft, design, and
realization of object-oriented software systems, in particular, the development of Java
EE-based web applications, with a priority in the surrounding field of the WebSphere product
family. She holds a degree in Business Informatic Engineering.
Salvatore Sollami is a Software IT Specialist in the Rational brand team in Italy. He has been
working at IBM with particular interest in the change and configuration area and web
application security. He also has experience in the Agile Development Process and Software
Engineering. Before joining IBM, Salvatore worked as a researcher for Process Optimization
Algorithmic, Mobile Agent Communication, and IT Economics impact. He developed the
return on investment (ROI) SOA investment calculation tool. He holds the Laurea (M.S.)
degree in Computer Engineering from the University of Palermo. In cooperation with IBM, he
received an M.B.A. from the MIP - School of Management - polytechnic of Milan.
Sundaragopal Venkatraman is a Technical Consultant at the IBM India Software Lab. He
has over 11 years of experience as an Architect and Lead working on web technologies,
client server, distributed applications, and IBM System z. He works on the WebSphere stack
on process integration, messaging, and the SOA space. In addition to handling training on
WebSphere, he also gives back to the technical community by lecturing at WebSphere
technical conferences and other technical forums.
Steve Baber has been working in the Computer Industry since the late 1980s. He has over
15 years of experience within IBM, first as a consultant to IBM and then as an employee.
Steve has supported several industries during his time at IBM, including health care,
telephony, and banking and currently supports the IBM Global Finance account as a Team
Lead for the Global Contract Management project.
Henry Cui works as an independent consultant through his own company, Kaka Software
Solution. He provides consulting services to large financial institutions in Canada. Before this
work, Henry worked with the IBM Rational services and support team for eight years, where
he helped many clients resolve design, development, and migration issues with Java EE
122
development. His areas of expertise include developing Java EE applications with Rational
Application Developer tools and administering WebSphere Application Server servers,
security, SOA, and web services. Henry is a frequent contributor of IBM developerWorks
articles. He also co-authored five IBM Redbooks publications. Henry holds a degree in
Computer Science from York University.
Craig Fleming is a Solution Architect who works for IBM Global Business Services in
Auckland, New Zealand. He has worked for the last 15 years leading and delivering software
projects for large enterprises as a solution developer and architect. His area of expertise is in
designing and developing middleware solutions, mainly with WebSphere technologies. He
has worked in several industries, including Airlines, Insurance, Retail, and Local Government.
Craig holds a Bachelor of Science (Honors) in Computer Science from Otago University in
New Zealand.
123
124
Notices
This information was developed for products and services offered in the U.S.A.
IBM may not offer the products, services, or features discussed in this document in other countries. Consult
your local IBM representative for information on the products and services currently available in your area. Any
reference to an IBM product, program, or service is not intended to state or imply that only that IBM product,
program, or service may be used. Any functionally equivalent product, program, or service that does not
infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to
evaluate and verify the operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter described in this document. The
furnishing of this document does not grant you any license to these patents. You can send license inquiries, in
writing, to:
IBM Director of Licensing, IBM Corporation, North Castle Drive, Armonk, NY 10504-1785 U.S.A.
The following paragraph does not apply to the United Kingdom or any other country where such
provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION
PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR
IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT,
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of
express or implied warranties in certain transactions, therefore, this statement may not apply to you.
This information could include technical inaccuracies or typographical errors. Changes are periodically made
to the information herein; these changes will be incorporated in new editions of the publication. IBM may make
improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time
without notice.
Any references in this information to non-IBM websites are provided for convenience only and do not in any
manner serve as an endorsement of those websites. The materials at those websites are not part of the
materials for this IBM product and use of those websites is at your own risk.
IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring
any obligation to you.
Any performance data contained herein was determined in a controlled environment. Therefore, the results
obtained in other operating environments may vary significantly. Some measurements may have been made
on development-level systems and there is no guarantee that these measurements will be the same on
generally available systems. Furthermore, some measurements may have been estimated through
extrapolation. Actual results may vary. Users of this document should verify the applicable data for their
specific environment.
Information concerning non-IBM products was obtained from the suppliers of those products, their published
announcements or other publicly available sources. IBM has not tested those products and cannot confirm the
accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the
capabilities of non-IBM products should be addressed to the suppliers of those products.
This information contains examples of data and reports used in daily business operations. To illustrate them
as completely as possible, the examples include the names of individuals, companies, brands, and products.
All of these names are fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrate programming
techniques on various operating platforms. You may copy, modify, and distribute these sample programs in
any form without payment to IBM, for the purposes of developing, using, marketing or distributing application
programs conforming to the application programming interface for the operating platform for which the sample
programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore,
cannot guarantee or imply reliability, serviceability, or function of these programs.
Copyright International Business Machines Corporation 2012. All rights reserved.
Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by
GSA ADP Schedule Contract with IBM Corp.
125
Redpaper
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines
Corporation in the United States, other countries, or both. These and other IBM trademarked terms are
marked on their first occurrence in this information with the appropriate symbol ( or ), indicating US
registered or common law trademarks owned by IBM at the time this information was published. Such
trademarks may also be registered or common law trademarks in other countries. A current list of IBM
trademarks is available on the Web at http://www.ibm.com/legal/copytrade.shtml
The following terms are trademarks of the International Business Machines Corporation in the United States,
other countries, or both:
developerWorks
Global Business Services
IBM
Maximo
Rational
Redbooks
Redpaper
Redbooks (logo)
System z
WebSphere
126