FETPAPI 0.3.0.0
This project provides C++ classes which facilitate the developement of ETP1.2 clients and servers.
All Classes Namespaces Functions Variables Pages
ClientSession.h
1/*-----------------------------------------------------------------------
2Licensed to the Apache Software Foundation (ASF) under one
3or more contributor license agreements. See the NOTICE file
4distributed with this work for additional information
5regarding copyright ownership. The ASF licenses this file
6to you under the Apache License, Version 2.0 (the
7"License"; you may not use this file except in compliance
8with the License. You may obtain a copy of the License at
9
10 http://www.apache.org/licenses/LICENSE-2.0
11
12Unless required by applicable law or agreed to in writing,
13software distributed under the License is distributed on an
14"AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
15KIND, either express or implied. See the License for the
16specific language governing permissions and limitations
17under the License.
18-----------------------------------------------------------------------*/
19#pragma once
20
21#include "AbstractSession.h"
22
23#include "InitializationParameters.h"
24
25namespace ETP_NS
26{
28 {
29 public:
30
31 virtual ~ClientSession() = default;
32
33 boost::asio::io_context& getIoContext() {
34 return ioc;
35 }
36
37 const std::string& getEtpServerHost() const { return etpServerHost; }
38 const std::string& getEtpServerPort() const { return etpServerPort; }
39 const std::string& getEtpServerTarget() const { return etpServerTarget; }
40 const std::string& getEtpServerAuthorization() const { return etpServerAuthorization; }
41 const std::string& getProxyHost() const { return proxyHost; }
42 const std::string& getProxyPort() const { return proxyPort; }
43 const std::string& getProxyAuthorization() const { return proxyAuthorization; }
44
51 bool run() {
52 successfulConnection = false;
53
54 // Look up the domain name before to run the session
55 // It is important to do this before to run the io context. Otherwise running the io context would return immediately if nothing has to be done.
56 resolver.async_resolve(
57 proxyHost.empty() ? etpServerHost : proxyHost,
58 proxyHost.empty() ? etpServerPort : proxyPort,
59 std::bind(
60 &ClientSession::on_resolve,
61 std::static_pointer_cast<ClientSession>(shared_from_this()),
62 std::placeholders::_1,
63 std::placeholders::_2));
64
65 // Run the io_context to perform the resolver and all other binding functions
66 // Run will return only when there will no more be any uncomplete operations (such as a reading operation for example)
67 getIoContext().run();
68
69 return successfulConnection;
70 }
71
72 virtual void on_resolve(boost::system::error_code ec, tcp::resolver::results_type results) = 0;
73 virtual bool isTls() const = 0;
74
75 void on_handshake(boost::system::error_code ec)
76 {
77 if (ec) {
78 std::cerr << "on_handshake : " << ec.message() << std::endl;
79 std::cerr << "Sometimes some ETP server require a trailing slash at the end of their URL. Did you also check your optional \"data-partition-id\" additional Header Field?" << std::endl;
80 return;
81 }
82
83 if (!responseType.count(boost::beast::http::field::sec_websocket_protocol) ||
84 responseType[boost::beast::http::field::sec_websocket_protocol] != "etp12.energistics.org")
85 std::cerr << "The client MUST specify the Sec-Websocket-Protocol header value of etp12.energistics.org, and the server MUST reply with the same" << std::endl;
86
87 successfulConnection = true;
88 webSocketSessionClosed = false;
89
90 send(requestSession, 0, 0x02);
91 do_read();
92 }
93
94 protected:
95 boost::asio::io_context ioc;
96 tcp::resolver resolver;
97 std::string etpServerHost;
98 std::string etpServerPort;
99 std::string etpServerTarget;
100 std::string etpServerAuthorization;
101 std::string proxyHost;
102 std::string proxyPort;
103 std::string proxyAuthorization;
104 std::map<std::string, std::string> additionalHandshakeHeaderFields_;
105 websocket::response_type responseType; // In order to check handshake sec_websocket_protocol
107 bool successfulConnection = false;
108
115 ClientSession(
116 InitializationParameters const* initializationParams, const std::string& target, const std::string& etpServerAuth, const std::string& proxyAuth = "") :
117 ioc(4),
118 resolver(ioc),
119 etpServerHost(initializationParams->getEtpServerHost()),
120 etpServerPort(std::to_string(initializationParams->getEtpServerPort())),
121 etpServerTarget(target),
122 etpServerAuthorization(etpServerAuth),
123 proxyHost(initializationParams->getProxyHost()),
124 proxyPort(std::to_string(initializationParams->getProxyPort())),
125 proxyAuthorization(proxyAuth)
126 {
127 messageId = 2; // The client side of the connection MUST use ONLY non-zero even-numbered messageIds.
128
129 initializationParams->postSessionCreationOperation(this);
130
131 // Build the request session
132 requestSession.applicationName = initializationParams->getApplicationName();
133 requestSession.applicationVersion = initializationParams->getApplicationVersion();
134
135 std::copy(initializationParams->getInstanceId().begin(), initializationParams->getInstanceId().end(), requestSession.clientInstanceId.array.begin());
136
137 requestSession.requestedProtocols = initializationParams->makeSupportedProtocols();
138 requestSession.supportedDataObjects = initializationParams->makeSupportedDataObjects();
139 requestSession.supportedFormats.push_back("xml");
140 requestSession.currentDateTime = std::chrono::duration_cast<std::chrono::microseconds>(std::chrono::system_clock::now().time_since_epoch()).count();
141
142 auto caps = initializationParams->makeEndpointCapabilities();
143 if (!caps.empty()) {
144 requestSession.endpointCapabilities = caps;
145 }
146
147 maxWebSocketMessagePayloadSize = initializationParams->getMaxWebSocketMessagePayloadSize();
148 }
149 };
150}
Definition AbstractSession.h:51
Definition ClientSession.h:28
bool run()
Definition ClientSession.h:51