14 Using Web Services
This chapter includes the following sections:
14.1 Introduction to Web Services in Oracle Data Integrator
Oracle Data Integrator provides the following entry points into a service-oriented architecture (SOA):
-
Data services
-
Oracle Data Integrator run-time services
-
Invoking third-party Web services
Figure 14-1 shows an overview of how the different types of Web services can interact.
Figure 14-1 shows a simple example with the Data Services, Run-Time Web services (Public Web service and Agent Web service) and the OdiInvokeWebService tool.
The Data Services and Run-Time Web services components are invoked by a third-party application, whereas the OdiInvokeWebService tool invokes a third-party Web service:
-
The Data Services provides access to data in data stores (both source and target data stores), as well as changes trapped by the Changed Data Capture framework. This Web service is generated by Oracle Data Integrator and deployed in a Java EE application server.
-
The Agent Web service commands the Oracle Data Integrator Agent to: start and monitor a scenario; restart a session; get the ODI version; start, stop or restart a load plan; or refresh agent configuration. Note that this Web service is built in the Java EE or Standalone Agent.
-
The OdiInvokeWebService tool is used in a package and invokes a specific operation on a port of the third-party Web service, for example to trigger a BPEL process.
14.2 Oracle Data Integrator Run-Time Services and Data Services
Oracle Data Integrator Run-Time Web services and Data Services are two different types of Web services:
-
Oracle Data Integrator Run-Time Services (Agent Web service) are Web services that enable users to leverage Oracle Data Integrator features in a service-oriented architecture (SOA).
Oracle Data Integrator Run-Time Web services enable you to access the Oracle Data Integrator features through Web services. These Web services are invoked by a third-party application and manage execution of runtime artifacts developed with Oracle Data Integrator.
The Managing Executions Using Web Services section in Administering Oracle Data Integrator describes how to perform the different ODI execution tasks with ODI Run-Time Services, such as executing a scenario and restarting a session. That topic also provides examples of SOAP requests and responses.
-
Data Services are specialized Web services that provide access to data in datastores, and to changes captured for these datastores using Changed Data Capture. Data Services are generated by Oracle Data Integrator to give you access to your data through Web services. These Web services are deployed to a Web services container in an application server.
For more information on how to set up, generate and deploy Data Services refer to the Generating and Deploying Data Services chapter in Administering Oracle Data Integrator.
14.3 Invoking Third-Party Web Services
This section describes how to invoke third-party Web services in Oracle Data Integrator.
This section includes the following topics:
14.3.1 Introduction to Web Service Invocation
You can invoke Web services:
-
In Oracle Data Integrator packages or procedures using the HTTP Analyzer tool. This tool allows you to invoke any third party Web service, and save the response in a SOAP file that can be processed with Oracle Data Integrator.
You can use the results to debug a locally or remotely deployed Web service.
-
For testing Data Services. The easiest way to test whether your generated data services are running correctly is to use the HTTP Analyzer tool.
-
In Oracle Data Integrator packages or procedures using the OdiInvokeWebService tool. This tool allows you to invoke any third party Web service, and save the response in an XML file that can be processed with Oracle Data Integrator.
-
In Oracle Data Integrator packages using the InvokeRESTfulService tool. This tool allows you to invoke any REST Service, and save the response in a file that can be processed with Oracle Data Integrator. If the request has a body, it can be either provided in a request file, or directly written out in the tool command (<RequestBody>).
The tool also supports multipart request, and parameters are provided to specify multipart body part details.
The three approaches are described in the sections that follow.
14.3.2 Creating a SOAP Web Service Data Server
14.3.2.1 Options on the Definition Tab of the SOAP Web Service Data Server
The following table describes the options on the Definition tab of the SOAP Web Service Data Server.
Table 14-1 Options on the Definition tab of the SOAP Web Service Data Server
Option | Description |
---|---|
Name |
Name of the Data Server.
Note: This is a mandatory option. |
WSDL URL |
Web Services Description Language (WSDL) URL.
Note: This is a mandatory option. |
User |
User name for HTTP Basic Authentication.
Note: This option is required only if the WSDL is protected by HTTP Basic Authentication. |
Password |
Password for HTTP Basic Authentication.
Note: This option is required only if the WSDL is protected by HTTP Basic Authentication. |
14.3.3 Creating a New Physical Schema for a SOAP Web Service Data Server
14.3.3.1 Configuration Options
The following table describes the configuration options in the Definition tab of the Physical Schema.
Table 14-2 Configuration Options
Option | Description |
---|---|
Service |
Name of the service to be invoked that is defined in the WSDL. |
Port |
Type of access for the service invoked. |
Endpoint URL |
URL to which the web service request is sent. The endpoint URL is retrieved based on the service and port selected.
Note: This field is read-only. |
Binding |
The binding is retrieved based on the service and port selected. Note: This field is read-only. |
User |
User name for HTTP Basic Authentication.
Note: This field is populated automatically if the WSDL is protected by HTTP Basic Authentication. |
Password |
Password for HTTP Basic Authentication.
Note: This field is populated automatically if the WSDL is protected by HTTP Basic Authentication. |
Override Endpoint URL |
Replaces the endpoint URL provided earlier. |
14.3.3.2 OWSM Policy Configuration
The following table describes the functions that can be performed in OWSM Policy Configuration.
Table 14-3 OWSM Policy Configuration
Icon | Name | Function |
---|---|---|
|
Add Policy |
Click to open the Select Security Policies dialog where you can select the security policy to be added. |
|
Edit Policy |
Click to open the Config Override Properties dialog where you can edit the options to be configured for the policy. |
|
Delete Policy |
Click to delete the selected policy. |
|
Enable Policy |
Click to enable a disabled policy. |
|
Disable Policy |
Click to disable an enabled policy. |
For information on the OWSM policies, see the Oracle Web Services Manager Predefined Policies chapter in Securing Web Services and Managing Policies with Oracle Web Services Manager.
14.3.4 Creating a REST Service Data Server
14.3.4.1 Options on the Definition Tab of the REST Service Data Server
The following table describes the options on the Definition tab of the REST Service Data Server.
Table 14-4 Options on the Definition tab of the REST Service Data Server
Option | Description |
---|---|
Name |
Name of the Data Server |
REST Service endpoint URL |
URL of the endpoint that services the REST resources |
User |
User name for HTTP Basic Authentication
Note: This option is required only if the endpoint URL is protected by HTTP Basic Authentication. |
Password |
Password for HTTP Basic Authentication
Note: This option is required only if the endpoint URL is protected by HTTP Basic Authentication. |
14.3.5 Creating a New Physical Schema for a REST Service Data Server
14.3.5.1 Configuration Options (Without OWSM)
The following table describes the configuration options in the Definition tab of the Physical Schema.
Table 14-5 Configuration Options
Option | Description |
---|---|
Name |
Name of the Rest Service Physical Schema |
Resource URI |
Resource URI is a mandatory field. Physical Schema name is non-editable, like Oracle Physical Schema name. Physical schema name is formed by the Data Server name and the Resource URI (<DataserverName>.<ResourceURI>). |
Default |
Whether the Physical Schema is the Default one or not. Note: As with the SOAP Web Service, Multiple Physical Schemas are supported for REST. |
14.3.5.1.1 Operations Tab
Operations table contains the following columns, representing the configuration details of REST logical operations. Like the OWSM Policy table, Operations Table also will be in insertion order during update. When fetched from repository during reopen of physical schema, the existing operations will be displayed in ascending order.
Note:
You can add/delete/edit the operations. The operations will be saved, when the physical schema is saved. The save will fail if there are duplicate operation names.Table 14-6 Options on the Operation Tab of the REST Service Data Server
Parameter | Description |
---|---|
Name |
Logical operation name. This must be unique for a physical schema. |
Method |
The HTTP method used to interact with the resource. ODI supports the following HTTP methods:
Note: The |
Operation URI |
This will be appended to the Data Server URL and the Physical Schema Resource URI to form the complete REST URL. However, If it starts with "/", then it is directly appended to Data Server URL to form the complete REST URL and Physical Schema Resource URI is ignored. It can have inline Template tokens (eg:{server-id}/{id}_{o-secret}_o.{file_type}) |
Query Parameter |
It can have fixed query parameter or Template tokens. The query parameter and value will be separated using ”=” and query parameter-value pair will be separated using ”&”. (eg: address={uerId}&sensor=false). Query Parameter Name Values will be shown in URL Encoded form in this column. This column is non-editable. Use the button in the column to invoke the dialog to add/edit/delete Query parameter. The "=", "&" and encoded chars are only for display and single-line entry purposes and are not stored in the repository. Each query parameter name/value pair is stored individually as one row in the name and value columns without any encoding in the repository. This column will have a multi-line tool tip with each name-value pair in a separate line. |
Header Parameter |
The header parameter and value will be separated using ”:” and header parameter-value pair will be separated using broken bar (¦). (eg: Content-Type: text/xml ¦ Cache-Control:No-Cache). This column is non-editable. Use the button in the column to invoke the dialog to add/edit/delete Header parameter. The ”:” and ”¦ ”are only for display and single-line entry purposes and are not stored in the repository. Each header parameter name/value pair is stored individually as one row in the name and value columns without any encoding in the repository. This column will have a multi-line tool tip with each name-value pair in separate line. |
Template Parameter |
The template parameter and value will be separated using ”=” and template parameter-value pair will be separated using broken-bar (¦). (eg: userId=Rey ¦ ip-addr=192.166.55.5). This column is non-editable. Use the button in the column to invoke the dialog to add/edit/delete Template parameter. The ”=” and ”¦ ”are only for display and single-line entry purposes and are not stored in the repository. Each template parameter name/value pair is stored individually as one row in the name and value columns without any encoding in the repository. This column will have a multi-line tool tip with each name-value pair in separate line. |
14.3.5.2 OWSM Policy Configuration
The following table describes the functions that can be performed in OWSM Policy Configuration.
Table 14-7 OWSM Policy Configuration
Icon | Name | Function |
---|---|---|
|
Add Policy |
Click to open the Select Security Policies dialog where you can select the security policy to be added. |
|
Edit Policy |
Click to open the Config Override Properties dialog where you can edit the options to be configured for the policy. |
|
Delete Policy |
Click to delete the selected policy. |
|
Enable Policy |
Click to enable a disabled policy. |
|
Disable Policy |
Click to disable an enabled policy. |
For information on the OWSM policies, see the Oracle Web Services Manager Predefined Policies chapter in Securing Web Services and Managing Policies with Oracle Web Services Manager.
14.3.6 Creating Logical Schema for a REST Service Data Server
14.3.7 Using HTTP Analyzer
The HTTP Analyzer allows you to monitor request/response traffic between a Web service client and the service. The HTTP Analyzer helps you to debug your Web service in terms of the HTTP traffic sent and received.
When you run the HTTP Analyzer, there are a number of windows that provide information for you.
The HTTP Analyzer enables you to:
-
Observe the exact content of the request and response TCP packets of your Web service.
-
Edit a request packet, re-send the packet, and see the contents of the response packet.
-
Test Web services that are secured using policies; encrypted messages will be decrypted.
This section describes the following topics:
14.3.7.1 Using HTTP Analyzer: Main Steps
To examine the packets sent and received by the client to a Web service:
Note:
In order to use the HTTP Analyzer, you may need to update the proxy settings.
14.3.7.2 What Happens When You Run the HTTP Analyzer
When you start the HTTP Analyzer and test a Web service, the Web service sends its traffic via the HTTP Analyzer, using the proxy settings in the HTTP Analyzer Preferences dialog.
By default, the HTTP Analyzer uses a single proxy on an analyzer instance (the default is 8099), but you can add additional proxies of your own if you need to.
Each analyzer instance can have a set of rules to determine behavior, for example, to redirect requests to a different host/URL, or to emulate a Web service.
14.3.7.3 How to Specify HTTP Analyzer Settings
By default, the HTTP Analyzer uses a single proxy on an analyzer instance (the default is 8099), but you can add additional proxies of your own if you need to.
To set HTTP Analyzer preferences:
14.3.7.4 How to Use the Log Window
When you open the HTTP Analyzer from the Tools menu, the HTTP Analyzer Log window opens, illustrated in Figure 14-2.
When HTTP Analyzer runs, it outputs request/response messages to the HTTP Analyzer log window. You can group and reorder the messages:
-
To reorder the messages, select the Sequence tab, then sort using the column headers (click on the header to sort, double-click to secondary sort).
-
To group messages, click the Correlation tab.
-
To change the order of columns, grab the column header and drag it to its new position.
Table 14-8 HTTP Analyzer Log Window Toolbar Icons
Icon | Name | Function |
---|---|---|
![]() |
Analyzer Preferences |
Click to open the HTTP Analyzer Preferences dialog where you can specify a new listener port, or change the default proxy. An alternative way to open this dialog is to choose Tools > Preferences, and then navigate to the HTTP Analyzer page. For more information, see |
![]() |
Create New Request |
Click to open the HTTP Analyzer Test window, where you enter payload details, and edit and resend messages. |
![]() |
Start HTTP Analyzer |
Click to start the HTTP Analyzer running. The monitor runs in the background, and only stops when you click Stop or exit JDeveloper. If you have more than one listener defined clicking this button starts them all. To start just one listener, click the down arrow and select the listener to start. |
![]() |
Stop HTTP Analyzer |
Click to stop the HTTP Analyzer running. If you have more than one listener running, clicking this button stops them all. To stop just one listener click the down arrow and select the listener to stop. |
![]() |
Send Request |
Click to resend a request when you have changed the content of a request. The changed request is sent and you can see any changes in the response that is returned. |
![]() |
Open WS-I log file |
Click to open the Select WS-I Log File to Upload dialog, where you can navigate to an existing WS-I log file. |
![]() |
Save Packet Data |
Click to save the contents of the HTTP Analyzer Log Window to a file. |
![]() |
WS-I Analyze |
This tool does not apply to Oracle Data Integrator. |
![]() |
Select All |
Click to select all the entries in the HTTP Analyzer Log Window. |
![]() |
Deselect All |
Click to deselect all the entries in the HTTP Analyzer. |
![]() |
Clear Selected History (Delete) |
Click to clear the entries in the HTTP Analyzer. |
14.3.7.5 How to Use the Test Window
An empty HTTP Analyzer test window appears when you click the Create New Soap Request button in the HTTP Analyzer Log window.
Enter the URL of a Web service, or open the WSDL for a Web service, and then click Send Request. The results of the request are displayed in the test window, as shown in Figure 14-3.
You can examine the contents of the HTTP headers of the request and response packets to see the SOAP structure, the HTTP content, the Hex content or the raw message contents by choosing the appropriate tab at the bottom of the HTTP Analyzer Test window.
The test window allows you examine the headers and parameters of a message. You can test the service by entering a parameter that is appropriate and clicking Send Request.
The tabs along the bottom of the test window allow you choose how you see the content of the message. You can choose to see the message as:
-
The SOAP structure, illustrated in Figure 14-3.
-
The HTTP code, for example:
<?xml version = '1.0' encoding = 'UTF-8'?> <env:Envelope xmlns:env="http://schemas.xmlsoap.org/soap/envelope/" xmlns:ns1="http://www.example.com/wls"> <env:Header/> <env:Body> <ns1:sayHello> <arg0/> </ns1:sayHello> </env:Body>
-
The hex content of the message, for example:
[000..015] 3C 65 65 20 78 6D ... <env:Envelope xm [016..031] 6C 6E 70 3A 2F 2F ... lns:env="http:// [032..047] 73 63 6F 61 70 2E ... schemas.xmlsoap. [048..063] 6F 72 65 6C 6F 70 ... org/soap/envelop [064..079] 65 2F 22 20 78 6D ... e/" xmlns:ns1="h [080..095] 74 74 70 3A 2F 2F ... ttp://www.bea.co [096..111] 6D 2F 77 6C 73 22 ... m/wls"><env:Head [112..127] 65 72 2F 3E 3C 65 ... er/><env:Body><n [128..143] 73 31 3A 73 61 79 ... s1:sayHello><arg [144..159] 30 3E 3C 2F 61 72 ... 0></arg0></ns1:s [160..175] 61 79 48 65 6C 6C ... ayHello></env:Bo [176..191] 64 79 3E 3C 2F 65 ... dy></env:Envelop [192..193] 65 3E ... e>
-
The raw message, for example:
POST http://localhost:7001/MySimpleEjb/MySimpleEjbService HTTP/1.1 Content-Type: text/xml; charset=UTF-8 SOAPAction: "" Host: localhost:7001 Content-Length: 194 X-HTTPAnalyzer-Rules: 3@localhost:8099 <?xml version = '1.0' encoding = 'UTF-8'?> <env:Envelope xmlns:env="http://schemas.xmlsoap.org/soap/envelope/" xmlns:ns1="http://www.example.com/wls"> <env:Header/> <env:Body> <ns1:sayHello> <arg0/> </ns1:sayHello> </env:Body> </env:Envelope>
14.3.7.6 How to Use the Instances Window
When you open the HTTP Analyzer from the Tools menu, the HTTP Analyzer tab appears by default.
Click the HTTP Analyzer Instances tab. The HTTP Analyzer Instances window appears, as shown in Figure 14-4.
This window provides information about the instances of the HTTP Analyzer that are currently running, or that were running and have been stopped. The instance is identified by the host and port, and any rules are identified. You can start and stop the instance from this window.
Figure 14-4 HTTP Analyzer Instances Window

Description of "Figure 14-4 HTTP Analyzer Instances Window"
You create a new instance in the HTTP Analyzer dialog, which opens when you click the Create New Soap Request button.
Table 14-9 HTTP Analyzer Instances Window Toolbar Icons
Icon | Name | Function |
---|---|---|
![]() |
Analyzer Preferences |
Click to open the HTTP Analyzer dialog where you can specify a new listener port, or change the default proxy. |
![]() |
Create New Request |
Click to open a new instance of the HTTP Analyzer Test window, where you enter payload details, and edit and resend messages. |
![]() |
Start HTTP Analyzer |
Click to start the HTTP Analyzer running. The monitor runs in the background, and only stops when you click Stop or exit ODI. If you have more than one listener defined clicking this button starts them all. To start just one listener, click the down arrow and select the listener to start. |
![]() |
Stop HTTP Analyzer |
Click to stop the HTTP Analyzer running. If you have more than one listener running, clicking this button stops them all. To stop just one listener click the down arrow and select the listener to stop. |
14.3.7.7 How to Use Multiple Instances
You can have more than one instance of HTTP Analyzer running. Each will use a different host and port combination, and you can see a summary of them in the HTTP Analyzer Instances window.
To add an additional HTTP Analyzer Instance:
14.3.7.8 How to Configure External Web Browsers
You can use external web browsers to route messages through the HTTP Analyzer so that you can see the traffic between the web browser and client. This section describes how you can use a profile in Firefox so that when you start the HTTP Analyzer and run an HTML or JSP or JSF page from within JDeveloper, a new instance of Firefox using the Debugger profile is started.
Note:
The steps below use the command firefox
, which is correct for Linux. If you are using Windows, use firefox.exe
.
To configure a Firefox profile for the HTTP Analyzer:
-
First you create a new Firefox profile. By default, starting Firefox from the command line opens a window on your currently open instance of Firefox, so you need to use -no-remote to create a separately configured instance Run the following from the command line
firefox -no-remote -CreateProfile Debugging
-
Start Firefox using this profile
firefox -no-remote -P Debugging
-
Next you configure JDeveloper to start this version of Firefox. From the main menu, choose Tools > Preferences.
-
In the Preferences dialog, select the Web Browser and Proxy node. For more information, press F1 or click Help from within the dialog page.
-
In the Browser Command Line, enter or browse to the correct location, and enter
firefox -no-remote -P Debugging
. JDeveloper underlines this in red, and when you close the dialog you will see a Command Line Validation Error warning which you can safely ignore. -
Click OK. When you start the HTTP Analyzer and run an HTML or JSP or JSF page from within JDeveloper, a new instance of Firefox using the Debugger profile is started.
Click OK. When you start the HTTP Analyzer and run an HTML or JSP or JSF page from within JDeveloper, a new instance of Firefox using the Debugger profile is started.
14.3.7.9 Using Credentials With HTTP Analyzer
You can use the HTTP Analyzer to test Web services that are secured using policies. You choose the credentials to use in the HTTP Analyzer Test window.
HTTP Analyzer supports the following credentials for this purpose:
-
HTTPS. The message is encrypted prior to transmission using a public key certificate that is signed by a trusted certificate authority. The message is decrypted on arrival.
-
Username token. This token does not apply to Oracle Data Integrator.
This is a way of carrying basic authentication information using a token based on username/password.
-
X509. This token does not apply to Oracle Data Integrator.
This is a PKI standard for single sign-on authentication, where certificates are used to provide identity, and to sign and encrypt messages.
-
STS. This token does not apply to Oracle Data Integrator.
Security Token Service (STS) is a Web service which issues and manages security tokens.
14.3.7.10 Using SSL With HTTP Analyzer
You can use the HTTP Analyzer with secured services or applications, for example, Web services secured by policies. Oracle Data Integrator includes a credential, HTTPS Credential
, for this purpose.
Once you have configured the credentials, you can choose which to use in the HTTP Analyzer Test window.
HTTPS encrypts an HTTP message prior to transmission and decrypts it upon arrival. It uses a public key certificate signed by a trusted certificate authority. When the integrated application server is first started, it generates a DemoIdentity
that is unique, and the key in it is used to set up the HTTPS channel.
For more information about keystores and keystore providers, see Understanding Security for Oracle WebLogic Server. When the default credential HTTPS Credential
is selected, you need to specify the keystores that the HTTP Analyzer should use when handling HTTPS traffic.
Two keystores are required to run the HTTP Analyzer:
-
The "Client Trusted Certificate Keystore," containing the certificates of all the hosts to be trusted by the Analyzer (client trust) when it makes onward connections. The server's certificate must be in this keystore.
The "Client Keystore" is required only when mutual authentication is required.
-
The "Server Keystore," containing a key that the Analyzer can use to authenticate itself to calling clients.
To configure the HTTP Analyzer to use different HTTPS values:
- From the main menu, choose Tools > Preferences.
- In the Preferences dialog, select the Credentials node. For more information, press F1 or click Help from within the dialog page.
- Enter the new keystore and certificate details you want to use.
14.3.7.11 How to Debug Web Pages Using the HTTP Analyzer
You can use the HTTP Analyzer when you are debugging Web pages, such as HTML, JSP, or JSF pages. This allows you to directly examine the traffic that is sent back and forth to the browser.
To debug Web pages using the HTTP Analyzer:
14.3.7.12 How to Use Rules to Determine Behavior
You can set rules so that the HTTP Analyzer runs using behavior determined by those rules. You can set more than one rule in an HTTP Analyzer instance. If a service's URL matches a rule, the rule is applied. If not, the next rule in the list is checked. If the service does not match any of the rules the client returns an error. For this reason, you should always use a Pass Through rule with a blank filter (which just passes the request through) as the last rule in a list to catch any messages not caught by the preceding rules.
The types of rule available are:
-
Pass Through Rule
-
Forward Rule
-
URL Substitution Rule
-
Tape Rule
14.3.7.12.1 Using the Pass Through Rule
The Pass Through simply passes a request on to the service if the URL filter matches. When you first open the Rule Settings dialog, two Pass Through Rules are defined:
-
The first has a URL filter of
http://localhost:631
to ignore print service requests. -
The second has a blank URL filter, and it just which just passes the request to the original service. This rule should normally be moved to end of the list if new rules are added.
14.3.7.12.2 Using the Forward Rule
The Forward rule is used to intercept all URLs matched by the filter and it forwards the request on to a single URL.
14.3.7.12.3 Using the URL Substitution Rule
The URL Substitution rule allows you to re-host services by replacing parts of URL ranges. For example, you can replace the machine name when moving between the integrated application server and Oracle WebLogic Server.
14.3.7.12.4 Using the Tape Rule
The tape rule allows you to run the HTTP Analyzer in simulator mode, where a standard WS-I log file is the input to the rule. When you set up a tape rule, there are powerful options that you can use:
-
Loop Tape, which allows you to run the tape again and again.
-
Skip to matching URL and method, which only returns if it finds a matching URL and HTTP request method. This means that you can have a WSDL and an endpoint request in the same tape rule.
-
Correct header date and Correct Content Size, which allow you change the header date and content size of the message to current values so that the request does not fail.
An example of using a tape rule would be to test a Web service client developed to run against an external Web service.
To test a Web service client developed to run against an external Web service:
-
Create the client to the external Web service.
-
Run the client against the Web service with the HTTP Analyzer running, and save the results as a WS-I log file.
You can edit the WS-I file to change the values returned to the client.
-
In the HTTP Analyzer page of the Preferences dialog, create a tape rule.
Ensure that it is above the blank Pass Through rule in the list of rules.
-
In the Rule Settings dialog, use the path of the WS-I file as the Tape path in the Rule Settings dialog.
When you rerun the client, it runs against the entries in the WS-I file instead of against the external Web service.
There are other options that allow you to:
-
Correct the time and size of the entries in the WS-I log file so the message returned to the client is correct.
-
Loop the tape so that it runs more than once.
-
Skip to a matching URL and HTTP request method, so that you can have a WSDL and an endpoint request in the same tape rule.
-
Note:
Tape Rules will not work with SOAP messages that use credentials or headers with expiry dates in them.
14.3.7.13 How to Set Rules
You can set rules so that the HTTP Analyzer runs using behavior determined by those rules. Each analyzer instance can have a set of rules to determine behavior, for example, to redirect requests to a different host/URL, or to emulate a Web service.
To set rules for an HTTP Analyzer instance:
14.3.7.14 Reference: Troubleshooting the HTTP Analyzer
This section contains information to help resolve problems that you may have when running the HTTP Analyzer.
14.3.7.14.1 Running the HTTP Analyzer While Another Application is Running
If you have an application waiting for a response, do not start or stop the HTTP Analyzer. Terminate the application before starting or stopping the HTTP Analyzer.
The HTTP Analyzer can use one or more different sets of proxy settings. These settings are specific to the IDE only. If enabled, Oracle Data Integrator uses these settings to access the Internet through your organization proxy server. If you do not enable the proxy server setting, then your Web application may not be able to access the Internet. Proxy server settings are visible in the preferences settings for your machine's default browser.
When you run the HTTP Analyzer, it can use one or more different sets of proxy settings. These proxy settings override the HTTP Proxy Server settings when the HTTP Analyzer is running.
14.3.7.14.2 Changing Proxy Settings
When you use the HTTP Analyzer, you may need to change the proxy settings in Oracle Data Integrator. For example:
-
If you are testing an external service and your machine is behind a firewall, ensure that Oracle Data Integrator is using the HTTP proxy server.
-
If you are testing a service in the integrated application server, for example when you choose Test Web Service from the context menu of a Web service in the Applications window, ensure that Oracle Data Integrator is not using the HTTP proxy server.
If you run the HTTP Analyzer, and see the message
500 Server Error The following error occurred: [code=CANT_CONNECT_LOOPBACK] Cannot connect due to potential loopback problems
you probably need to add localhost|127.0.0.1
to the proxy exclusion list.
To set the HTTP proxy server and edit the exception list:
-
Choose Tools > Preferences, and select Web Browser/Proxy.
-
Ensure that Use HTTP Proxy Server is selected or deselected as appropriate.
-
Add any appropriate values to the Exceptions list, using
|
as the separator.In order for Java to use localhost as the proxy
~localhost
must be in the Exceptions list, even if it is the only entry.
14.3.8 Using the OdiInvokeWebService Tool
The OdiInvokeWebService tool invokes a Web service using the HTTP or HTTPS protocol and is able to write the returned response to an XML file, which can be an XML payload or a full-formed SOAP message including a SOAP header and body.
You can configure OdiInvokeWebService tool parameters using Http Analyzer. To do this, click the Http Analyzer button on the General tab of the OdiInvokeWebService step in the package editor. This opens the OdiInvokeWebServiceAdvance editor, which you can use to configure command parameters.
See the OdiInvokeWebService section in Oracle Data Integrator Tools Reference for details on the OdiInvokeWebService tool parameters.
The OdiInvokeWebService tool invokes a specific operation on a port of a Web service whose description file (WSDL) URL is provided. If this operation requires a SOAP request, it is provided either in a request file or in the tool command. The response of the Web service request is written to an XML file that can be used in Oracle Data Integrator.
Note:
When using the XML payload format, the OdiInvokeWebService tool does not support the SOAP headers of the request. In order to work with SOAP headers, for example for secured Web service invocation, use a full SOAP message and manually modify the SOAP headers.
This tool can be used as a regular Oracle Data Integrator tool in a tool step of a package and also in procedures and knowledge modules. See Adding Oracle Data Integrator Tool Stepsfor information on how to create a tool step in a package.
You can process the information from your responses using regular Oracle Data Integrator interfaces sourcing for the XML technology. Refer to the Connectivity and Modules Guide for Oracle Data Integrator for more information on XML file processing.
Note:
Each XML file is defined as a model in Oracle Data Integrator. When using XML file processing for the request or response file, a model will be created for each request or response file. It is recommended to use model folders to arrange them. See Organizing Models with Foldersfor more information.
Oracle Data Integrator provides the OdiXMLConcat and OdiXMLSplit tools for processing the Web service response. Refer to the XML section in Oracle Data Integrator Tools Reference for details on how to use these tools.
Using the Binding Mechanism for Requests
It is possible to use the Binding mechanism when using a Web service call in a Procedure. With this method, it is possible to call a Web service for each row returned by a query, parameterizing the request based on the row's values. Refer to Binding Source and Target Datafor more information.
14.3.9 Using the odiInvokeRESTfulService tool
For details on the odiInvokeRESTfulService tool parameters, see the Oracle Data Integrator Tools Reference
This tool can be used as a regular Oracle Data Integrator tool in a tool step of a package and also in procedures and knowledge modules. See Adding Oracle Data Integrator Tool Stepsfor information on how to create a tool step in a package.
You can process the information from your responses using regular Oracle Data Integrator interfaces sourcing for the XML technology. Refer to the Connectivity and Modules Guide for Oracle Data Integrator for more information on XML file processing.
Note:
Each XML file is defined as a model in Oracle Data Integrator. When using XML file processing for the request or response file, a model will be created for each request or response file. It is recommended to use model folders to arrange them. See Organizing Models with Foldersfor more information.
Oracle Data Integrator provides the OdiXMLConcat and OdiXMLSplit tools for processing the Web service response. See the XML section in Oracle Data Integrator Tools Reference.
OdiInvokeRESTfulService [-CONTEXT=<ODI_Context>] -LSCHEMA=<Logical_Schema> [-REQUEST_BODY_FILE=<Request_File> | -REQUEST_BODY=<RequestBody> | <RequestBody>] [-REQUEST_HDFS_LSCHEMA=<Request_HDFS_Logical_Schema>] [-CHUNK_SIZE=<Chunk_Size>] [-CHUNK_PREFIX=<Chunk_Prefix>] [-PRE_OPERATION=<Pre_Operation>] [-PRE_OPERATION_BODY=<Pre_Operation_Body>] -OPERATION=<Rest Operation> [-POST_OPERATION=<Post_Operation>] [-POST_OPERATION_BODY=<Post_Operation_Body>] [-HEADER.<name>=<value>]* [-HEADER_IGNORE_DEFAULT=<YES|NO>] [-REQUEST_BODY_PART_NAME=<Body_Part_Name> & -REQUEST_BODY_PART_CONTENT_TYPE=<Body_Part_Content_Type> & -REQUEST_BODY_PART_VALUE=<Body Part Value>]* [[-REQUEST_QUERY.<name>=<value>]* | -ENCODED_REQUEST_QUERY_STRING=<Encoded_Request_Query_String>] [-REQUEST_QUERY_IGNORE_DEFAULT=<YES|NO>] [-REQUEST_TEMPLATE.<Variable_Name>=<Variable_Value>]* [-REQUEST_TEMPLATE_IGNORE_DEFAULT=<YES|NO>] [-RESPONSE_FILE=<Response_File>] [-RESPONSE_HDFS_LSCHEMA=<Response HDFS LSchema>][-RESPONSE_MODE=<NEW_FILE|FILE_APPEND>] [-RESPONSE_FILE_CHARSET=<javaCharset>][-TIMEOUT=<timeout>] [-RETRY_COUNT=<Retry_Count>] [-RETRY_INTERVAL=<Retry_Interval>] [-FAILURE_STATUS_CODES=<Failure Status codes>] [-TRACE_FILE=<Trace_File>] [-TRACE_FILE_MODE=<NEW_FILE|FILE_APPEND>] [-NEXT_REQUEST_RESOLVER=<Next_Request_Resolver>] [-TOTAL_COUNT_FIELD_RESOLVER=<Total_Count_Field_Resolver>] [-RESOLVER_OVERWRITE_CLASS=<Resolver_Overwrite_Class>] [-RESPONSE_DATA_CONTAINER=<Response_Data_Container>]
[<RequestBody>]
See also:
14.3.9.1 Testing OdiInvokeRESTfulService Tool
Clicking The Test Restful Service button enables you to test the rest operation you have added. After clicking this button, select the operation from the drop-down box. Verify if the operation created works correctly by sending a request and check the response.
The REST operation testing UI allows selecting an operation of the current/resolved physical schema. Upon selection of an operation, the HTTP method and effective URI are displayed. Also, the defined/default parameters for Header, Query, Template are populated, and can be edited further, before testing the REST operation. The request body text field can be entered manually or can be loaded from a file.
The Send Request button enables the parameters to invoke REST via OdiInvokeRESTfulService tool. Clicking Stop will stop the tool invocation.
After REST invocation is completed, the response status code, response headers (from last invocation for a multi-page request), and response contents are shown.
The Response Content can be saved to a file. If applicable, Edit nXSD is enabled to allow creating/editing an nXSD based on the content, using similar Native Format Builder UI available from the Complex File dataserver editor.
14.3.9.2 Editing Multipart Body Parameters
14.3.9.3 Editing OdiInvokeRESTfulService Parameters
-
HEADER
-
REQUEST_QUERY
-
REQUEST_TEMPLATE
-
ENCODED_REQUEST_BODY_STRING
This section describes the following:
14.3.9.4 Populating Default Parameters
On clicking the "..." button in the value field of parameters -HEADER,-REQUEST_QUERY,-REQUEST_TEMPLATE and ENCODED_REQUEST_QUERY_STRING, default parameters of the currently selected operation, if any exists, will be pre-populated in the Edit Parameters dialog.
On clicking the OK button of the Edit Parameters dialog, corresponding tool parameter will be updated with new values. On clicking the Cancel button, no updates will be done to the tool parameter.
In the Rest Service Tool properties, when same operation is selected, same parameters will be available as default.
On clicking the Request Header "..." button, the Edit Header Parameters dialog will be displayed with pre-populated default header parameter -values from physical operation.
On clicking the Request Query "..." button, the Edit Query Parameters dialog will be displayed with pre-populated default query parameter -values from physical operation.
On clicking the Request Query string (Encoded) "..." Button, Edit Query Parameters dialog will be displayed with pre-populated default query parameter -values from physical operation.
On clicking the Request template "..." Button, the Edit Template Parameters dialog will be displayed with pre-populated default template parameter -values from physical operation.