Table of Contents
List of Tables
List of Examples
javax.websocket.server.ServerApplicationConfigjavax.websocket.server.ServerEndpointThis is user guide for Tyrus 1.6. We are trying to keep it up to date as we add new features. Please use also our API documentation linked from the Tyrus and Java API for WebSocket home pages as an additional source of information about Tyrus features and API. If you would like to contribute to the guide or have questions on things not covered in our docs, please contact us at users@tyrus.java.net.
Table of Contents
This chapter provides a quick introduction on how to get started building WebSocket services using Java API for WebSocket and Tyrus. The example described here presents how to implement simple websocket service as JavaEE web application that can be deployed on any servlet container supporting Servlet 3.1 and higher. It also discusses starting Tyrus in standalone mode.
First, to use the Java API for WebSocket in your project you need to depend on the following artifact:
<dependency>
<groupId>javax.websocket</groupId>
<artifactId>javax.websocket-api</artifactId>
<version>1.0</version>
</dependency>
In this section we will create a simple server side websocket endpoint which will echo the received message back to the sender. We will deploy this endpoint on the container.
In Java API for WebSocket and Tyrus, there are two basic approaches how to create an endpoint - either annotated endpoint,
or programmatic endpoint.
By annotated endpoint we mean endpoint constructed by using annotations (javax.websocket.server.ServerEndpoint
for server endpoint and javax.websocket.ClientEndpoint for client endpoint), like in
"Annotated Echo Endpoint".
Example 1.1. Annotated Echo Endpoint
@ServerEndpoint(value = "/echo")
public class EchoEndpointAnnotated {
@OnMessage
public String onMessage(String message, Session session) {
return message;
}
}
The functionality of the EchoEndpointAnnotated is fairly simple - to send the received message
back to the sender. To turn a POJO (Plain Old Java Object) to WebSocket server endpoint, the annotation
@ServerEndpoint(value = "/echo") needs to be put on the POJO - see line 1. The URI path of the endpoint
is "/echo". The annotation @OnMessage - line 3 on the method public String
onMessage(String message, Session session) indicates that this method
will be called whenever text message is received. On line 5 in this method the message is sent back to
the user by returning it from the message.
The application containing only the EchoEndpointAnnotated class can be deployed to the container.
Let's create the client part of the application. The client part may be written in JavaScript or any
other technology supporting WebSockets. We will use Java API for WebSocket and Tyrus to demonstrate how to develop
programmatic client endpoint.
The following code is used as a client part to communicate with the EchoEndpoint deployed on server
using Tyrus and Java API for WebSocket.
The example "Client Endpoint" utilizes the concept
of the programmatic endpoint. By programmatic endpoint we mean endpoint which is created by extending
class javax.websocket.Endpoint.
The example is standalone java application which needs to depend on some Tyrus artifacts to work
correctly, see "Tyrus Standalone Mode".
In the example first the CountDownLatch is initialized. It is needed as a bocking data
structure - on line 31 it either waits for 100 seconds, or until it gets counted down (line 22).
On line 9 the javax.websocket.ClientEndpointConfig is created - we will need it later
to connect the endpoint to the server. On line 11 the org.glassfish.tyrus.client.ClientManager
is created. it implements the javax.websocket.WebSocketContainer and is used to connect
to server. This happens on next line. The client endpoint functionality is contained in the
javax.websocket.Endpoint lazy instantiation. In the onOpen method new MessageHandler
is registered (the received message is just printed on the console and the latch is counted down). After
the registration the message is sent to tje servere (line 25).
Example 1.2. Client Endpoint
public class DocClient {
private static CountDownLatch messageLatch;
private static final String SENT_MESSAGE = "Hello World";
public static void main(String [] args){
try {
messageLatch = new CountDownLatch(1);
final ClientEndpointConfig cec = ClientEndpointConfig.Builder.create().build();
ClientManager client = ClientManager.createClient();
client.connectToServer(new Endpoint() {
@Override
public void onOpen(Session session, EndpointConfig config) {
try {
session.addMessageHandler(new MessageHandler.Whole<String>() {
@Override
public void onMessage(String message) {
System.out.println("Received message: "+message);
messageLatch.countDown();
}
});
session.getBasicRemote().sendText(SENT_MESSAGE);
} catch (IOException e) {
e.printStackTrace();
}
}
}, cec, new URI("ws://localhost:8025/websockets/echo"));
messageLatch.await(100, TimeUnit.SECONDS);
} catch (Exception e) {
e.printStackTrace();
}
}
}
Similarly to "Client Endpoint" the server registered endpoint may also be the programmatic one:
Example 1.3. Programmatic Echo Endpoint
public class EchoEndpointProgrammatic extends Endpoint {
@Override
public void onOpen(final Session session, EndpointConfig config) {
session.addMessageHandler(new MessageHandler.Whole<String>() {
@Override
public void onMessage(String message) {
try {
session.getBasicRemote().sendText(message);
} catch (IOException e) {
e.printStackTrace();
}
}
});
}
}
The functionality of the EchoEndpointProgrammatic is fairly simple - to send the received message back to the sender.
The programmatic server endpoint needs to extend javax.websocket.Endpoint - line 1.
Mehod public void onOpen(final Session session, EndpointConfig config) gets called once new
connection to this endpoin0t is opened. In this method the MessageHandler is registered to the
javax.websocket.Session instance, which opened the connection. Method public void
onMessage(String message) gets called once the message is received. On line 8 the message
is sent back to the sender.
To see how both annotated and programmatic endpoints may be deployed please check the section Deployment. In short: you need to put the server endpoint classes into WAR, deploy on server and the endpoints will be scanned by server and deployed.
To use Tyrus in standalone mode it is necessary to depend on correct Tyrus artifacts. The following artifacts need to be added to your pom to use Tyrus:
<dependency>
<groupId>org.glassfish.tyrus</groupId>
<artifactId>tyrus-server</artifactId>
<version>1.6</version>
</dependency>
<dependency>
<groupId>org.glassfish.tyrus</groupId>
<artifactId>tyrus-container-grizzly-server</artifactId>
<version>1.6</version>
</dependency>
Let's use the very same example like for Java API for WebSocket and deploy the EchoEndpointAnnotated on the
standalone Tyrus server on the hostname "localhost", port 8025 and path "/websocket", so the endpoint
will be available at address "ws://localhost:8025/websockets/echo".
public void runServer() {
Server server = new Server("localhost", 8025, "/websocket", null, EchoEndpoint.class);
try {
server.start();
BufferedReader reader = new BufferedReader(new InputStreamReader(System.in));
System.out.print("Please press a key to stop the server.");
reader.readLine();
} catch (Exception e) {
e.printStackTrace();
} finally {
server.stop();
}
}
Tyrus is built, assembled and installed using Maven. Tyrus is deployed to maven.org maven repository at the following location:http://search.maven.org/. Jars, jar sources, jar javadoc and samples are all available on the java.net maven repository.
All Tyrus components are built using Java SE 7 compiler. It means, you will also need at least Java SE 7 to be able to compile and run your application. Developers using maven are likely to find it easier to include and manage dependencies of their applications than developers using ant or other build technologies. The following table provides an overview of all Tyrus modules and their dependencies with links to the respective binaries.
Table 2.1. Tyrus core modules
| Module | Dependencies | Description |
|---|---|---|
| tyrus-server | tyrus-core, tyrus-spi, tyrus-websocket-core | Basic server functionality |
| tyrus-core | tyrus-spi, tyrus-websocket-core | Core Tyrus functionality |
| tyrus-client | tyrus-core, tyrus-spi, tyrus-websocket-core | Basic client functionality |
| tyrus-documentation | [nothing] | Project documentation |
| tyrus-websocket-core | [nothing] | The WebSocket protocol |
| tyrus-samples | tyrus-server, tyrus-client, tyrus-container-grizzly, tyrus-core, tyrus-spi, tyrus-websocket-core | Samples of using Java API for WebSocket and Tyrus |
| tyrus-spi | [nothing] | SPI |
Table 2.2. Tyrus containers
| Module | Dependencies | Description |
|---|---|---|
| tyrus-container-glassfish-cdi | tyrus-spi | CDI support |
| tyrus-container-glassfish-ejb | tyrus-spi | EJB support |
| tyrus-container-grizzly | tyrus-core, tyrus-spi, tyrus-websocket-core | Grizzly integration for Tyrus client and standalone server usage |
| tyrus-container-servlet | tyrus-server, tyrus-core, tyrus-spi, tyrus-websocket-core | Servlet support for integration into web containers |
Table of Contents
Deploying WebSocket endpoints can be done in two ways. Either deploying via putting the endpoint in the WAR file, or using the ServerContainer methods to deploy the programmatic endpoint in the deployment phase.
The classes that are scanned for in WAR are the following ones:
Classes that implement the javax.websocket.ServerApplicationConfig.
Classes annotated with javax.websocket.server.ServerEndpoint.
Classes that extend javax.websocket.Endpoint.
javax.websocket.server.ServerEndpoint or extending javax.websocket.Endpoint).
Let's have the following classes in the WAR:
Example 3.1. Deployment of WAR containing several classes extending javax.websocket.server.ServerApplicationConfig
public class MyApplicationConfigOne implements ServerApplicationConfig {
public Set<ServerEndpointConfig> getEndpointConfigs(Set<Class<? extends Endpoint>> endpointClasses);
Set<Class<? extends Endpoint>> s = new HashSet<Class<? extends Endpoint>>;
s.add(ProgrammaticEndpointOne.class);
return s;
}
public Set<Class> getAnnotatedEndpointClasses(Set<Class<?>> scanned);
Set<Class<?>> s = new HashSet<Class<?>>;
s.add(AnnotatedEndpointOne.class);
return s;
}
}
public class MyApplicationConfigTwo implements ServerApplicationConfig {
public Set<ServerEndpointConfig> getEndpointConfigs(Set<Class<? extends Endpoint>> endpointClasses);
Set<Class<? extends Endpoint>> s = new HashSet<Class<? extends Endpoint>>;
s.add(ProgrammaticEndpointTwo.class);
return s;
}
public Set<Class> getAnnotatedEndpointClasses(Set<Class<?>> scanned);
Set<Class<?>> s = new HashSet<Class<?>>;
s.add(AnnotatedEndpointTwo.class);
return s;
}
}
@ServerEndpoint(value = "/annotatedone")
public class AnnotatedEndpointOne {
...
}
@ServerEndpoint(value = "/annotatedtwo")
public class AnnotatedEndpointTwo {
...
}
@ServerEndpoint(value = "/annotatedthree")
public class AnnotatedEndpointThree {
...
}
public class ProgrammaticEndpointOne extends Endpoint {
...
}
public class ProgrammaticEndpointTwo extends Endpoint {
...
}
public class ProgrammaticEndpointThree extends Endpoint {
...
}
According to the deployment algorithm classes AnnotatedEndpointOne, AnnotatedEndpointTwo,
ProgrammaticEndpointOne and ProgrammaticEndpointTwo will be deployed.
AnnotatedEndpointThree and ProgrammaticEndpointThree will not be
deployed, as these are not returned by the respective
methods of MyApplicationConfigOne nor MyApplicationConfigTwo.
Endpoints may be deployed using javax.websocket.server.ServerContainer during the application initialization phase.
For websocket enabled web containers, developers may obtain a reference to the ServerContainer instance by
retrieving it as an attribute named javax.websocket.server.ServerContainer on the ServletContext, see
the following example for annotated endpoint:
Example 3.2. Deployment of Annotated Endpoint Using ServerContainer
@WebListener
@ServerEndpoint("/annotated")
public class MyServletContextListenerAnnotated implements ServletContextListener {
@Override
public void contextInitialized(ServletContextEvent servletContextEvent) {
final ServerContainer serverContainer = (ServerContainer) servletContextEvent.getServletContext()
.getAttribute("javax.websocket.server.ServerContainer");
try {
serverContainer.addEndpoint(MyServletContextListenerAnnotated.class);
} catch (DeploymentException e) {
e.printStackTrace();
}
}
@OnMessage
public String onMessage(String message) {
return message;
}
@Override
public void contextDestroyed(ServletContextEvent servletContextEvent) {
}
}
Table of Contents
This chapter presents an overview of the core WebSocket API concepts - endpoints, configurations and message handlers.
The JAVA API for WebSocket specification draft can be found online here.
Server endpoint classes
are POJOs (Plain Old Java Objects) that are annotated with javax.websocket.server.ServerEndpoint.
Similarly, client endpoint classes are POJOs annotated with javax.websocket.ClientEndpoint.
This section shows how to use Tyrus to annotate Java objects to create WebSocket web services.
The following code example is a simple example of a WebSocket endpoint using annotations. The example code shown here is from echo sample which ships with Tyrus.
Example 4.1. Echo sample server endpoint.
@ServerEndpoint("/echo")
public class EchoEndpoint {
@OnOpen
public void onOpen(Session session) throws IOException {
session.getBasicRemote().sendText("onOpen");
}
@OnMessage
public String echo(String message) {
return message + " (from your server)";
}
@OnError
public void onError(Throwable t) {
t.printStackTrace();
}
@OnClose
public void onClose(Session session) {
}
}
Let's explain the JAVA API for WebSocket annotations.
javax.websocket.server.ServerEndpoint has got one mandatory field - value and four optional fields. See the example below.
Example 4.2. javax.websocket.server.ServerEndpoint with all fields specified
@ServerEndpoint(
value = "/sample",
decoders = ChatDecoder.class,
encoders = DisconnectResponseEncoder.class,
subprotocols = {"subprtotocol1", "subprotocol2"},
configurator = Configurator.class
)
public class SampleEndpoint {
@OnMessage
public SampleResponse receiveMessage(SampleType message, Session session) {
return new SampleResponse(message);
}
}
Denotes a relative URI path at which the server endpoint will be deployed. In the example
"javax.websocket.server.ServerEndpoint with all fields specified", the
Java class will be hosted at the URI path
/sample. The field value must begin with a '/' and may or may
not end in a '/', it makes no difference. Thus request URLs that end or do not end in a '/' will both
be matched. WebSocket API for JAVA supports level 1 URI templates.
URI path templates are URIs with variables embedded within the URI syntax. These variables are substituted at runtime in order for a resource to respond to a request based on the substituted URI. Variables are denoted by curly braces. For example, look at the following @ServerEndpoint annotation:
@ServerEndpoint("/users/{username}")
In this type of example, a user will be prompted to enter their name, and then a Tyrus web
service configured
to respond to requests to this URI path template will respond. For example, if the user entered their
username as "Galileo", the web service will respond to the following URL:
http://example.com/users/Galileo
To obtain the value of the username variable the javax.websocket.server.PathParam may be used on method parameter
of methods annotated with one of @OnOpen, @OnMessage, @OnError, @OnClose.
Example 4.3. Specifying URI path parameter
@ServerEndpoint("/users/{username}")
public class UserEndpoint {
@OnMessage
public String getUser(String message, @PathParam("username") String userName) {
...
}
}
Contains list of classes that will be used to decode incoming messages for the endpoint. By decoding we mean transforming from text / binary websocket message to some user defined type. Each decoder needs to implement the Decoder interface.
SampleDecoder in the following example decodes String message and produces
SampleType message - see decode method on line 4.
Example 4.4. SampleDecoder
public class SampleDecoder implements Decoder.Text<SampleType> {
@Override
public SampleType decode(String s) {
return new SampleType(s);
}
@Override
public boolean willDecode(String s) {
return s.startsWith(SampleType.PREFIX);
}
@Override
public void init(EndpointConfig config) {
// do nothing.
}
@Override
public void destroy() {
// do nothing.
}
}
Contains list of classes that will be used to encode outgoing messages. By encoding we mean transforming message from user defined type to text or binary type. Each encoder needs to implement the Encoder interface.
SampleEncoder in the following example decodes String message and produces
SampleType message - see decode method on line 4.
Example 4.5. SampleEncoder
public class SampleEncoder implements Encoder.Text<SampleType> {
@Override
public String encode(SampleType message) {
return data.toString();
}
@Override
public void init(EndpointConfig config) {
// do nothing.
}
@Override
public void destroy() {
// do nothing.
}
}
List of names (Strings) of supported sub-protocols. The first protocol in this list that matches with sub-protocols provided by the client side is used.
Users may provide their own implementation of ServerEndpointConfiguration.Configurator. It allows them to control some algorithms used by Tyrus in the connection initialization phase:
public String getNegotiatedSubprotocol(List<String> supported, List<String> requested)
allows the user to provide their own algorithm for selection of used subprotocol.
public List<Extension> getNegotiatedExtensions(List<Extension> installed, List<Extension> requested)
allows the user to provide their own algorithm for selection of used Extensions.
public boolean checkOrigin(String originHeaderValue).
allows the user to specify the origin checking algorithm.
public void modifyHandshake(ServerEndpointConfig sec, HandshakeRequest request, HandshakeResponse response) .
allows the user to modify the handshake response that will be sent back to the client.
public <T> T getEndpointInstance(Class<T> endpointClass) throws InstantiationException .
allows the user to provide the way how the instance of an Endpoint is created
public class ConfiguratorTest extends ServerEndpointConfig.Configurator{
public String getNegotiatedSubprotocol(List<String> supported, List<String> requested) {
// Plug your own algorithm here
}
public List<Extension> getNegotiatedExtensions(List<Extension> installed, List<Extension> requested) {
// Plug your own algorithm here
}
public boolean checkOrigin(String originHeaderValue) {
// Plug your own algorithm here
}
public void modifyHandshake(ServerEndpointConfig sec, HandshakeRequest request, HandshakeResponse response) {
// Plug your own algorithm here
}
public <T> T getEndpointInstance(Class<T> endpointClass) throws InstantiationException {
// Plug your own algorithm here
}
}
The @ClientEndpoint class-level annotation is used to turn a POJO into WebSocket client endpoint. In the following sample the client sends text message "Hello!" and prints out each received message.
Example 4.6. SampleClientEndpoint
@ClientEndpoint(
decoders = SampleDecoder.class,
encoders = SampleEncoder.class,
subprotocols = {"subprtotocol1", "subprotocol2"},
configurator = ClientConfigurator.class)
public class SampleClientEndpoint {
@OnOpen
public void onOpen(Session p) {
try {
p.getBasicRemote().sendText("Hello!");
} catch (IOException e) {
e.printStackTrace();
}
}
@OnMessage
public void onMessage(String message) {
System.out.println(String.format("%s %s", "Received message: ", message));
}
}
Contains list of classes that will be used decode incoming messages for the endpoint. By decoding we mean transforming from text / binary websocket message to some user defined type. Each decoder needs to implement the Decoder interface.
Contains list of classes that will be used to encode outgoing messages. By encoding we mean transforming message from user defined type to text or binary type. Each encoder needs to implement the Encoder interface.
Users may provide their own implementation of ClientEndpointConfiguration.Configurator. It allows them to control some algorithms used by Tyrus in the connection initialization phase. Method beforeRequest allows the user to change the request headers constructed by Tyrus. Method afterResponse allows the user to process the handshake response.
public class Configurator {
public void beforeRequest(Map<String, List<String>> headers) {
//affect the headers before request is sent
}
public void afterResponse(HandshakeResponse hr) {
//process the handshake response
}
}
This annotation may be used on certain methods of @ServerEndpoint or @ClientEndpoint, but only once per endpoint. It is used to decorate a method which is called once new connection is established. The connection is represented by the optional Session parameter. The other optional parameter is EndpointConfig, which represents the passed configuration object. Note that the EndpointConfig allows the user to access the user properties.
Example 4.7. @OnOpen with Session and EndpointConfig parameters.
@ServerEndpoint("/sample")
public class EchoEndpoint {
private Map<String, Object> properties;
@OnOpen
public void onOpen(Session session, EndpointConfig config) throws IOException {
session.getBasicRemote().sendText("onOpen");
properties = config.getUserProperties();
}
}
This annotation may be used on any method of @ServerEndpoint or @ClientEndpoint, but only once per endpoint. It is used to decorate a method which is called once the connection is being closed. The method may have one Session parameter, one CloseReason parameter and parameters annotated with @PathParam.
Example 4.8. @OnClose with Session and CloseReason parameters.
@ServerEndpoint("/sample")
public class EchoEndpoint {
@OnClose
public void onClose(Session session, CloseReason reason) throws IOException {
//prepare the endpoint for closing.
}
}
This annotation may be used on any method of @ServerEndpoint or @ClientEndpoint, but only once per endpoint. It is used to decorate a method which is called once Exception is being thrown by any method annotated with @OnOpen, @OnMessage and @OnClose. The method may have optional Session parameter and Throwable parameters.
Example 4.9. @OnError with Session and Throwable parameters.
@ServerEndpoint("/sample")
public class EchoEndpoint {
@OnError
public void onError(Session session, Throwable t) {
t.printStackTrace();
}
}
This annotation may be used on certain methods of @ServerEndpoint or @ClientEndpoint, but only once per endpoint. It is used to decorate a method which is called once new message is received.
Example 4.10. @OnError with Session and Throwable parameters.
@ServerEndpoint("/sample")
public class EchoEndpoint {
@OnMessage
public void onMessage(Session session, String message) {
System.out.println("Received message: " + message);
}
}
Implementing the javax.websocket.MessageHandler interface is one of the ways how to receive messages
on endpoints (both server and client). It is aimed primarily on programmatic endpoints, as the annotated ones
use the method level annotation javax.websocket.OnMessage to denote the method which
receives messages.
The MessageHandlers get registered on the Session instance:
Example 4.11. MessageHandler basic example
public class MyEndpoint extends Endpoint {
@Override
public void onOpen(Session session, EndpointConfig EndpointConfig) {
session.addMessageHandler(new MessageHandler.Whole<String>() {
@Override
public void onMessage(String message) {
System.out.println("Received message: "+message);
}
});
}
}
There are two orthogonal criterions which classify MessageHandlers.
According the WebSocket Protocol (RFC 6455) the message may be sent either complete, or in chunks. In Java API for WebSocket this fact is reflected
by the interface which the handler implements. Whole messages are processed by handler which implements
javax.websocket.MessageHandler.Whole interface. Partial
messages are processed by handlers that implement javax.websocket.MessageHandler.Partial
interface. However, if user registers just the whole message handler, it doesn't mean that the handler will
process solely whole messages. If partial message is received, the parts are cached by Tyrus until the final
part is received. Then the whole message is passed to the handler. Similarly, if the user registers just the
partial message handler and whole message is received, it is passed directly to the handler.
The second criterion is the data type of the message. WebSocket Protocol (RFC 6455) defines four message data type - text message, According to Java API for WebSocket the text messages will be processed by MessageHandlers with the following types:
java.lang.String
java.io.Reader
any developer object for which there is a corresponding javax.websocket.Decoder.Text or javax.websocket.Decoder.TextStream.
The binary messages will be processed by MessageHandlers with the following types:
java.nio.ByteBuffer
java.io.InputStream
any developer object for which there is a corresponding javax.websocket.Decoder.Binary or javax.websocket.Decoder.BinaryStream.
The Java API for WebSocket limits the registration of MessageHandlers per Session to be one MessageHandler per native websocket message type. In other words, the developer can only register at most one MessageHandler for incoming text messages, one MessageHandler for incoming binary messages, and one MessageHandler for incoming pong messages. This rule holds for both whole and partial message handlers, i.e there may be one text MessageHandler - either whole, or partial, not both.
Table of Contents
javax.websocket.server.ServerEndpointConfig and javax.websocket.ClientEndpointConfig objects
are used to provide the user the ability to configure websocket endpoints. Both server and client endpoints have some
part of configuration in common, namely encoders, decoders, and user properties. The user properties may developers
use to store the application specific data. For the developer's convenience the builders are provided for both
ServerEndpointConfig and ClientEndpointConfig.
The javax.websocket.server.ServerEndpointConfig is used when deploying the endpoint either via
implementing the javax.websocket.server.ServerApplicationConfig, or via registering the programmatic endpoint
at the javax.websocket.server.ServerContainer instance. It allows the user to create the configuration
programmatically.
The following example is used to deploy the EchoEndpoint programmatically. In the method
getEndpointClass() the user has to specify the class of the deployed endpoint. In
the example Tyrus will create an instance of EchoEndpoint and deploy it.
This is the way how to tie together endpoint and it's configuration. In the method
getPath() the user specifies that that the endpoint instance will be deployed at the
path "/echo". In the method public List<String> getSubprotocols() the user
specifies that the supported subprotocols are "echo1" and "echo2". The method getExtensions()
defines the extensions the endpoint supports. Similarly the example configuration does not use any configurator.
Method public List<Class<? extends Encoder>> getEncoders() defines the encoders
used by the endpoint. The decoders and user properties map are defined in similar fashion.
If the endpoint class which is about to be deployed is an annotated endpoint, note that the endpoint configuration will be taken from configuration object, not from the annotation on the endpoint class.
Example 5.1. Configuration for EchoEndpoint Deployment
public class EchoEndpointConfig implements ServerEndpointConfig{
private final Map<String, Object> userProperties = new HashMap<String, Object>();
@Override
public Class<?> getEndpointClass() {
return EchoEndpoint.class;
}
@Override
public String getPath() {
return "/echo";
}
@Override
public List<String> getSubprotocols() {
return Arrays.asList("echo1","echo2");
}
@Override
public List<Extension> getExtensions() {
return null;
}
@Override
public Configurator getConfigurator() {
return null;
}
@Override
public List<Class<? extends Encoder>> getEncoders() {
return Arrays.asList(SampleEncoder.class);
}
@Override
public List<Class<? extends Decoder>> getDecoders() {
return Arrays.asList(SampleDecoder.class);
}
@Override
public Map<String, Object> getUserProperties() {
return userProperties;
}
}To make the development easy the javax.websocket.server.ServerEndpointConfig provides a builder to construct the configuration object:
Example 5.2. ServerEndpointConfigu built using Builder
ServerEndpointConfig config = ServerEndpointConfig.Builder.create(EchoEndpoint.class,"/echo").
decoders(Arrays.<Class<? extends Decoder>>asList(JsonDecoder.class)).
encoders(Arrays.<Class< extends Encoder>>asList(JsonEncoder.class)).build();
The javax.websocket.ClientEndpointConfig is used when deploying the programmatic client endpoint
via registering the programmatic endpoint at the WebSocketContainer instance. Some of
the configuration methods come from the EndpointConfigclass, which is extended by both
javax.websocket.server.ServerEndpointConfig and javax.websocket.ClientEndpointConfig. Then there are methods
for configuring the preferred subprotocols the client endpoint wants to use and supported extensions. It is
also possible to use the ClientEndpointConfig.Configurator in order to be able to affect the endpoint behaviour
before and after request.
Similarly to the ServerEndpointConfig, there is a Builder provided to construct the configuration easily:
Example 5.3. ClientEndpointConfig built using Builder
ClientEndpointConfig.Builder.create().
decoders(Arrays.<Class<? extends Decoder>>asList(JsonDecoder.class)).
encoders(Arrays.<Class<? extends Encoder>>asList(JsonEncoder.class)).
preferredSubprotocols(Arrays.asList("echo1", "echo2")).build();Table of Contents
As mentioned before, the endpoint in Java API for WebSocket is represented either by instance of javax.websocket.Endpoint,
or by class annotated with either javax.websocket.server.ServerEndpoint or
javax.websocket.ClientEndpoint. Unless otherwise defined by developer provided configurator
(defined in instance of javax.websocket.server.ServerEndpointConfig or
javax.websocket.ClientEndpointConfig, Tyrus uses one endpoint instance per VM per connected
peer. Therefore one endpoint instance typically handles connections from one peer.
The sequence of interactions between an endpoint instance and remote peer is in Java API for WebSocket modelled by
javax.websocket.Session instance. This interaction starts by mandatory open notification,
continues by 0 - n websocket messages and is finished by mandatory closing notification.
The javax.websocket.Session instance is passed by Tyrus to the user in the following methods
for programmatic endpoints:
public void onOpen(Session session, EndpointConfig config)
public void onClose(Session session, CloseReason closeReason)
public void onError(Session session, Throwable thr)
The javax.websocket.Session instance is passed by Tyrus to the user in the methods
annotated by following annotations for annotated endpoints:
method annotated with javax.websocket.OnOpen
method annotated with javax.websocket.OnMessage
method annotated with javax.websocket.OnClose
method annotated with javax.websocket.OnError
In each of the methods annotated with the preceeding annotations the user may use parameter of type
javax.websocket.Session. In the following example the developer wants to send a message in
the method annotated with javax.websocket.OnOpen. As we will demonstrate later, the developer
needs the session instance to do so. According to Java API for WebSocket Session is one of the allowed parameters in
methods annotated with javax.websocket.OnOpen. Once the annotated method gets called,
Tyrus passes in the correct instance of javax.websocket.Session.
Example 6.1. Lifecycle echo sample
@ServerEndpoint("/echo")
public class EchoEndpoint {
@OnOpen
public void onOpen(Session session) throws IOException {
session.getBasicRemote().sendText("onOpen");
}
@OnMessage
public String echo(String message) {
return message;
}
@OnError
public void onError(Throwable t) {
t.printStackTrace();
}
}
Generally there are two ways how to send message to the peer endpoint. First one is usable for annotated
endpoints only. The user may send the message by returning the message content from the method annotated
with javax.websocket.OnMessage. In the following example the message m is sent back to the
remote endpoint.
The other option how to send a message is to obtain the javax.websocket.RemoteEndpoint instance
via the javax.websocket.Session instance. See the following example:
Example 6.3. Sending message via RemoteEndpoint.Basic instance
@OnMessage
public void echo(String message, Session session) {
session.getBasicRemote().sendText(message);
}
The interface javax.websocket.RemoteEndpoint, part of Java API for WebSocket, is designed to represent the
other end of the communication (related to the endpoint), so the developer uses it to send the message.
There are two basic interfaces the user may use - javax.websocket.RemoteEndpoint$Basic and
javax.websocket.RemoteEndpoint$Async.
is used to send synchronous messages The point of completion of the send is defined when all the supplied
data has been written to the underlying connection. The methods for sending messages on the
javax.websocket.RemoteEndpoint$Basic block until this point of completion is reached, except for
javax.websocket.RemoteEndpoint$Basic#getSendStream() and
javax.websocket.RemoteEndpoint$Basic#getSendWriter() which present traditional blocking I/O streams
to write messages. See the example
"Sending message via RemoteEndpoint.Basic instance"
to see how the whole text message is send. The following example demonstrates a method which sends the
partial text method to the peer:
Example 6.4. Method for sending partial text message
public void sendPartialTextMessage(String message, Boolean isLast, Session session){
try {
session.getBasicRemote().sendText(message, isLast);
} catch (IOException e) {
e.printStackTrace();
}
}
This representation of the peer of a web socket conversation has the ability to send messages asynchronously. The point of completion of the send is defined when all the supplied data has been written to the underlying connection. The completion handlers for the asynchronous methods are always called with a different thread from that which initiated the send.
Example 6.5. Sending mesage the async way using Future
public void sendWholeAsyncMessage(String message, Session session){
Future<Void> future = session.getAsyncRemote().sendText(message);
}
Table of Contents
As required in Java API for WebSocket, Tyrus supports full field, method and constructor injection using javax.inject.Inject
into all websocket endpoint classes as well as the use of the interceptors on these classes.
Except this, Tyrus also supports some of the EJB annotations. Currently javax.ejb.Stateful,
javax.ejb.Singleton and javax.ejb.Stateless annotations are supported.
The following example presents how to inject a bean to the javax.websocket.server.ServerEndpoint
annotated class using javax.inject.Inject. Class InjectedSimpleBean gets injected
into class SimpleEndpoint on line 15.
Example 7.1. Injecting bean into javax.websocket.server.ServerEndpoint
public class InjectedSimpleBean {
private static final String TEXT = " (from your server)";
public String getText() {
return TEXT;
}
}
@ServerEndpoint(value = "/simple")
public class SimpleEndpoint {
private boolean postConstructCalled = false;
@Inject
InjectedSimpleBean bean;
@OnMessage
public String echo(String message) {
return String.format("%s%s", message, bean.getText());
}
}
The following sample presents how to turn javax.websocket.server.ServerEndpoint annotated class
into javax.ejb.Singleton and use interceptor on it.
Example 7.2. Echo sample server endpoint.
@ServerEndpoint(value = "/singleton")
@Singleton
@Interceptors(LoggingInterceptor.class)
public class SingletonEndpoint {
int counter = 0;
public static boolean interceptorCalled = false;
@OnMessage
public String echo(String message) {
return interceptorCalled ? String.format("%s%s", message, counter++) : "LoggingInterceptor not called.";
}
}
public class LoggingInterceptor {
@AroundInvoke
public Object manageTransaction(InvocationContext ctx) throws Exception {
SingletonEndpoint.interceptorCalled = true;
Logger.getLogger(getClass().getName()).info("LOGGING.");
return ctx.proceed();
}
}
Table of Contents
Following settings do have influence on Tyrus behaviour and are NOT part of WebSocket specification. If you are using following configurable options, your application might not be easily transferable to other WebSocket API implementation.
When accessing "wss" URLs, Tyrus client will pick up whatever keystore and truststore is actually set for current JVM instance, but that might not be always convenient. WebSocket API does not have this feature (yet, see WEBSOCKET_SPEC-210), so Tyrus exposed SSLEngineConfigurator class from Grizzly which can be used for specifying all SSL parameters to be used with current client instance. Additionally, WebSocket API does not have anything like a client, only WebSocketContainer and it does not have any properties, so you need to use Tyrus specific class - ClientManager.
final ClientManager client = ClientManager.createClient();
System.getProperties().put("javax.net.debug", "all");
System.getProperties().put(SSLContextConfigurator.KEY_STORE_FILE, "...");
System.getProperties().put(SSLContextConfigurator.TRUST_STORE_FILE, "...");
System.getProperties().put(SSLContextConfigurator.KEY_STORE_PASSWORD, "...");
System.getProperties().put(SSLContextConfigurator.TRUST_STORE_PASSWORD, "...");
final SSLContextConfigurator defaultConfig = new SSLContextConfigurator();
defaultConfig.retrieve(System.getProperties());
// or setup SSLContextConfigurator using its API.
SSLEngineConfigurator sslEngineConfigurator =
new SSLEngineConfigurator(defaultConfig, true, false, false);
client.getProperties().put(GrizzlyEngine.SSL_ENGINE_CONFIGURATOR,
sslEngineConfigurator);
client.connectToServer(... , ClientEndpointConfig.Builder.create().build(),
new URI("wss://localhost:8181/sample-echo/echo"));
}WebSocketContainer.connectToServer(...) methods are by definition blocking - declared exceptions needs to be thrown after connection attempt is made and it returns Session instance, which needs to be ready for sending messages and invoking other methods, which require already estabilished connection.
Existing connectToServer methods are fine for lots of uses, but it might cause issue when you are designing application with highly responsible user interface. Tyrus introduces asynchronous variants to each connectToServer method (prefixed with "async"), which returns Future<Session>. These methods do only simple check for provided URL and the rest is executed in separate thread. All exceptions thrown during this phase are reported as cause of ExecutionException thrown when calling Future<Session>.get().
Asynchronous connect methods are declared on Tyrus implementation of WebSocketContainer called ClientManager.
ClientManager client = ClientManager.createClient();
final Future<Session> future = client.asyncConnectToServer(ClientEndpoint.class, URI.create("..."));
try {
future.get();
} catch (...) {
}ClientManager contains async alternative to each connectToServer method.
One of the typical usecases we've seen so far for WebSocket server-side endpoints is broadcasting messages to all connected clients, something like:
@OnMessage
public void onMessage(Session session, String message) throws IOException {
for (Session s : session.getOpenSessions()) {
s.getBasicRemote().sendText(message);
}
}Executing this code might cause serious load increase on your application server. Tyrus provides optimized broadcast implementation, which takes advantage of the fact, that we are sending exactly same message to all clients, so dataframe can be created and serialized only once. Furthermore, Tyrus can iterate over set of opened connections faster than Session.getOpenSession().
@OnMessage
public void onMessage(Session session, String message) {
((TyrusSession) session).broadcast(message);
}Unfortunately, WebSocket API forbids anything else than Session in @OnMessage annotated method parameter, so you cannot use TyrusSession there directly and you might need to perform instanceof check.
Sevlet container buffers incoming WebSocket frames and there must be a size limit to precede OutOfMemory Exception and potentially DDoS attacks.
Configuration property is named "org.glassfish.tyrus.servlet.incoming-buffer-size" and you can
set it in web.xml (this particular snipped sets the buffer size to 17000000 bytes (~16M payload):
<web-app version="2.5" xmlns="http://java.sun.com/xml/ns/javaee" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://java.sun.com/xml/ns/javaee http://java.sun.com/xml/ns/javaee/web-app_2_5.xsd">
<context-param>
<param-name>org.glassfish.tyrus.servlet.incoming-buffer-size</param-name>
<param-value>17000000</param-value>
</context-param>
</web-app>Default value is 4194315, which correspond to 4M plus few bytes to frame headers, so you should be able to receive up to 4M long message without the need to care about this property.
Same issue is present on client side. There you can set this property via ClientManager:
ClientManager client = ClientManager.createClient();
client.getProperties().put("org.glassfish.tyrus.incomingBufferSize", 6000000); // sets the incoming buffer size to 6000000 bytes.
client.connectToServer( ... )By default, WebSocket client implementation in Tyrus re-creates client runtime whenever WebSocketContainer#connectToServer is invoked. This approach gives us some perks like out-of-the-box isolation and relatively low thread count (currently we have 1 selector thread and 2 worker threads). Also it gives you the ability to stop the client runtime – one Session instance is tied to exactly one client runtime, so we can stop it when Session is closed. This seems as a good solution for most of WebSocket client use cases – you usually use java client from application which uses it for communicating with server side and you typically don’t need more than 10 instances (my personal estimate is that more than 90% applications won’t use more than 1 connection). There are several reasons for it – of it is just a client, it needs to preserve server resources – one WebSocket connection means one TCP connection and we don’t really want clients to consume more than needed. Previous statement may be invalidated by WebSocket multiplexing extension, but for now, it is still valid.
On the other hand, WebSocket client implementations in some other containers took another (also correct) approach – they share client runtime for creating all client connections. That means they might not have this strict one session one runtime policy, they cannot really give user way how he to control system resources, but surely it has another advantage – it can handle much more opened connections. Thread pools are share among client sessions which may or may not have some unforeseen consequences, but if its implemented correctly, it should outperform Tyrus solution mentioned in previous paragraph in some use cases, like the one mentioned in TYRUS-275 - performance tests. Reporter created simple program which used WebSocket API to create clients and connect to remote endpoint and he measured how many clients can he create (or in other words: how many parallel client connections can be created; I guess that original test case is to measure possible number of concurrent clients on server side, but that does not really matter for this post). Tyrus implementation loose compared to some other and it was exactly because it did not have shared client runtime capability.
How can you use this feature?
ClientManager client = ClientManager.createClient(); client.getProperties().put(GrizzlyClientContainer.SHARED_CONTAINER, true);
You might also want to specify container idle timeout:
client.getProperties().put(GrizzlyClientContainer.SHARED_CONTAINER_IDLE_TIMEOUT, 5);
Last but not least, you might want to specify thread pool sizes used by shared container (please use this feature only when you do know what are you doing. Grizzly by default does not limit max number of used threads, so if you do that, please make sure thread pool size fits your purpose):
client.getProperties().put(GrizzlyClientSocket.SELECTOR_THREAD_POOL_CONFIG, ThreadPoolConfig.defaultConfig().setMaxPoolSize(3)); client.getProperties().put(GrizzlyClientSocket.WORKER_THREAD_POOL_CONFIG, ThreadPoolConfig.defaultConfig().setMaxPoolSize(10));
Please note that Extensions support is considered to be experimental and any API can be changed anytime. Also, you should ask yourself at least twice whether you don't want to achieve your goal by other means - WebSocket Extension is very powerful and can easily break your application when not used with care or enough expertise.
WebSocket frame used in ExtendedExtension:
public class Frame {
public boolean isFin() { .. }
public boolean isRsv1() { .. }
public boolean isRsv2() { .. }
public boolean isRsv3() { .. }
public boolean isMask() { .. }
public byte getOpcode() { .. }
public long getPayloadLength() { .. }
public int getMaskingKey() { .. }
public byte[] getPayloadData() { .. }
public boolean isControlFrame() { .. }
public static Builder builder() { .. }
public static Builder builder(Frame frame) { .. }
public final static class Builder {
public Builder() { .. }
public Builder(Frame frame) { .. }
public Frame build() { .. }
public Builder fin(boolean fin) { .. }
public Builder rsv1(boolean rsv1) { .. }
public Builder rsv2(boolean rsv2) { .. }
public Builder rsv3(boolean rsv3) { .. }
public Builder mask(boolean mask) { .. }
public Builder opcode(byte opcode) { .. }
public Builder payloadLength(long payloadLength) { .. }
public Builder maskingKey(int maskingKey) { .. }
public Builder payloadData(byte[] payloadData) { .. }
}Frame is immutable, so if you want to create new one, you need to create new builder, modify what you want and build it:
Frame newFrame = Frame.builder(originalFrame).rsv1(true).build();
Note that there is only one convenience method: isControlFrame. Other information about frame type etc needs to be evaluated directly from opcode, simply because there might not be enough information to get the correct outcome or the information itself would not be very useful. For example: opcode 0×00 means continuation frame, but you don’t have any chance to get the information about actual type (text or binary) without intercepting data from previous frames. Consider Frame class as raw representation as possible. isControlFrame() can be also gathered from opcode, but it is at least always deterministic and it will be used by most of extension implementations. It is not usual to modify control frames as it might end with half closed connections or unanswered ping messages.
ExtendedExtension representation needs to be able to handle extension parameter negotiation and actual processing of incoming and outgoing frames. It also should be compatible with existing javax.websocket.Extension class, since we want to re-use existing registration API and be able to return new extension instance included in response from List<Extension> Session.getNegotiatedExtensions() call. Consider following:
public interface ExtendedExtension extends Extension {
Frame processIncoming(ExtensionContext context, Frame frame);
Frame processOutgoing(ExtensionContext context, Frame frame);
List onExtensionNegotiation(ExtensionContext context, List requestedParameters);
void onHandshakeResponse(ExtensionContext context, List responseParameters);
void destroy(ExtensionContext context);
interface ExtensionContext {
Map<String, Object> getProperties();
}
}ExtendedExtension is capable of processing frames and influence parameter values during the handshake. Extension is used on both client and server side and since the negotiation is only place where this fact applies, we needed to somehow differentiate these sides. On server side, only onExtensionNegotiation(..) method is invoked and on client side onHandshakeResponse(..). Server side method is a must, client side could be somehow solved by implementing ClientEndpointConfig.Configurator#afterResponse(..) or calling Session.getNegotiatedExtenions(), but it won’t be as easy to get this information back to extension instance and even if it was, it won’t be very elegant. Also, you might suggest replacing processIncoming and processOutgoing methods by just oneprocess(Frame) method. That is also possible, but then you might have to assume current direction from frame instance or somehow from ExtensionContext, which is generally not a bad idea, but it resulted it slightly less readable code.
ExtensionContext and related lifecycle method is there because original javax.websocket.Extension is singleton and ExtendedExtension must obey this fact. But it does not meet some requirements we stated previously, like per connection parameter negotiation and of course processing itself will most likely have some connection state. Lifecycle of ExtensionContext is defined as follows: ExtensionContext instance is created right before onExtensionNegotiation (server side) or onHandshakeResponse (client side) and destroyed after destroy method invocation. Obviously, processIncoming or processOutgoing cannot be called before ExtensionContext is created or after is destroyed. You can think of handshake related methods as @OnOpenand destroy as @OnClose.
For those more familiar with WebSocket protocol: process*(ExtensionContext, Frame) is always invoked with unmasked frame, you don’t need to care about it. On the other side, payload is as it was received from the wire, before any validation (UTF-8 check for text messages). This fact is particularly important when you are modifying text message content, you need to make sure it is properly encoded in relation to other messages, because encoding/decoding process is stateful – remainder after UTF-8 coding is used as input to coding process for next message. If you want just test this feature and save yourself some headaches, don’t modify text message content or try binary messages instead.
Let’s say we want to create extension which will encrypt and decrypt first byte of every binary message. Assume we have a key (one byte) and our symmetrical cipher will be XOR. (Just for simplicity (a XOR key XOR key) = a, so encrypt() and decrypt() functions are the same).
public class CryptoExtension implements ExtendedExtension {
@Override
public Frame processIncoming(ExtensionContext context, Frame frame) {
return lameCrypt(context, frame);
}
@Override
public Frame processOutgoing(ExtensionContext context, Frame frame) {
return lameCrypt(context, frame);
}
private Frame lameCrypt(ExtensionContext context, Frame frame) {
if(!frame.isControlFrame() && (frame.getOpcode() == 0x02)) {
final byte[] payloadData = frame.getPayloadData();
payloadData[0] ^= (Byte)(context.getProperties().get("key"));
return Frame.builder(frame).payloadData(payloadData).build();
} else {
return frame;
}
}
@Override
public List onExtensionNegotiation(ExtensionContext context,
List requestedParameters) {
init(context);
// no params.
return null;
}
@Override
public void onHandshakeResponse(ExtensionContext context,
List responseParameters) {
init(context);
}
private void init(ExtensionContext context) {
context.getProperties().put("key", (byte)0x55);
}
@Override
public void destroy(ExtensionContext context) {
context.getProperties().clear();
}
@Override
public String getName() {
return "lame-crypto-extension";
}
@Override
public List getParameters() {
// no params.
return null;
}
}You can see that ExtendedExtension is slightly more complicated that original Extension so the implementation has to be also not as straightforward.. on the other hand, it does something. Sample code above shows possible simplification mentioned earlier (one process method will be enough), but please take this as just sample implementation. Real world case is usually more complicated.
Now when we have our CryptoExtension implemented, we want to use it. There is nothing new compared to standard WebSocket Java API, feel free to skip this part if you are already familiar with it. Only programmatic version will be demonstrated. It is possible to do it for annotated version as well, but it is little bit more complicated on the server side and I want to keep the code as compact as possible.
Client registration
ArrayList extensions = new ArrayList();
extensions.add(new CryptoExtension());
final ClientEndpointConfig clientConfiguration =
ClientEndpointConfig.Builder.create()
.extensions(extensions).build();
WebSocketContainer client = ContainerProvider.getWebSocketContainer();
final Session session = client.connectToServer(new Endpoint() {
@Override
public void onOpen(Session session, EndpointConfig config) {
// ...
}
}, clientConfiguration, URI.create(/* ... */));Server registration:
public class CryptoExtensionApplicationConfig implements ServerApplicationConfig {
@Override
public Set getEndpointConfigs(Set<Class<? extends Endpoint>> endpointClasses) {
Set endpointConfigs = new HashSet();
endpointConfigs.add(
ServerEndpointConfig.Builder.create(EchoEndpoint.class, "/echo")
.extensions(Arrays.asList(new CryptoExtension())).build()
);
return endpointConfigs;
}
@Override
public Set<Class<?>> getAnnotatedEndpointClasses(Set<Class<?>> scanned) {
// all scanned endpoints will be used.
return scanned;
}
}
public class EchoEndpoint extends Endpoint {
@Override
public void onOpen(Session session, EndpointConfig config) {
// ...
}
}CryptoExtensionApplicationConfig will be found by servlets scanning mechanism and automatically used for application configuration, no need to add anything (or even have) web.xml.
The original goal of whole extension support was to implement Permessage extension as defined in draft-ietf-hybi-permessage-compression-15 and we were able to achieve that goal. Well, not completely, current implementation ignores parameters. But it seems like it does not matter much, it was tested with Chrome and it works fine. Also it passes newest version of Autobahn test suite, which includes tests for this extension.
see PerMessageDeflateExtension.java (compatible with draft-ietf-hybi-permessage-compression-15, autobahn test suite) and XWebKitDeflateExtension.java (compatible with Chrome and Firefox – same as previous, just different extension name)
If you need semi-persistent client connection, you can always implement some reconnect logic by yourself, but Tyrus Client offers useful feature which should be much easier to use. See short sample code:
ClientManager client = ClientManager.createClient();
ClientManager.ReconnectHandler reconnectHandler = new ClientManager.ReconnectHandler() {
private int counter = 0;
@Override
public boolean onDisconnect(CloseReason closeReason) {
counter++;
if (counter <= 3) {
System.out.println("### Reconnecting... (reconnect count: " + counter + ")");
return true;
} else {
return false;
}
}
@Override
public boolean onConnectFailure(Exception exception) {
counter++;
if (counter <= 3) {
System.out.println("### Reconnecting... (reconnect count: " + counter + ") " + exception.getMessage());
// Thread.sleep(...) or something other "sleep-like" expression can be put here - you might want
// to do it here to avoid potential DDoS when you don't limit number of reconnects.
return true;
} else {
return false;
}
}
};
client.getProperties().put(ClientManager.RECONNECT_HANDLER, reconnectHandler);
client.connectToServer(...)As you can see, ReconnectHandler contains two methods, onDisconnect and onConnectFailure. First will be executed whenever @OnClose annotated method (or Endpoint.onClose(..)) is executed on client side - this should happen when established connection is lost for any reason. You can find the reason in methods parameter. Other one, called onConnectFailure is invoked when client fails to connect to remote endpoint, for example due to temporary network issue or current high server load.
Tyrus client supports traversing proxies, but it is Tyrus specific feature and its configuration is shown in the following code sample:
ClientManager client = ClientManager.createClient();
client.getProperties().put(ClientManager.PROXY_URI, "http://my.proxy.com:80");
Value is expected to be proxy URI. Protocol part is currently ignored, but must be present.
As has been said in previous chapters both Tyrus client and server were implemented on top of Grizzly NIO framework. This still remains true, but an alternative Tyrus Websocket client implementation based on Java 7 Asynchronous Channel API has been available since version 1.6. There are two options how to switch between client implementations. If you do not mind using Tyrus specific API, the most straightforward way is to use:
final ClientManager client = ClientManager.createClient(JdkClientContainer.class.getName());
You just have to make sure that the dependency on JDK client is included in your project:
<dependency>
<groupId>org.glassfish.tyrus</groupId>
<artifactId>tyrus-container-jdk-client</artifactId>
<version>1.6</version>
</dependency>
Grizzly client is the default option, so creating a client without any parameters will result in Grizzly client being used.
There is also an option how to use JDK client with the standard Websocket API.
final WebSocketContainer client = ContainerProvider.getWebSocketContainer();
The code listed above will scan class path for Websocket client implementations. A slight problem with this approach is that if there is more than one client on the classpath, the first one discovered will be used. Therefore if you intend to use JDK client with the standard API, you have to make sure that there is not a Grizzly client on the classpath as it might be used instead.
The main reason why JDK client has been implemented is that it does not have any extra dependencies except JDK 7 and of course some other Tyrus modules, which makes it considerable more lightweight compared to Tyrus Grizzly client, which requires 1.4 MB of dependencies.
It is also important to note that the JDK client has been implemented in a way similar to Grizzly client shared container option, which means that there is one thread pool shared among all clients.
Proxy configuration for JDK client is the same as for Grizzly client shown above.
Alike in case of Grizzly client, accessing "wss" URLs will cause Tyrus client to pick up whatever keystore and truststore is actually set for the current JVM instance. However, specifying SSL parameters to be used with JDK client instance is little different from Grizzly client, because Grizzly client uses SSLEngineConfigurator end SSLContextConfigurator from Grizzly project. The main configuration principle stays the same for the JDK client, but classes SslEngineConfigurator and SslContextConfigurator from Tyrus project must be used instead. The following code sample shows an example of some SSL parameters configuration for the JDK client:
SslContextConfigurator sslContextConfigurator = new SslContextConfigurator();
sslContextConfigurator.setTrustStoreFile("...");
sslContextConfigurator.setTrustStorePassword("...");
sslContextConfigurator.setTrustStoreType("...");
sslContextConfigurator.setKeyStoreFile("...");
sslContextConfigurator.setKeyStorePassword("...");
sslContextConfigurator.setKeyStoreType("...");
SslEngineConfigurator sslEngineConfigurator = new SslEngineConfigurator(sslContextConfigurator, true, false, false);
client.getProperties().put(ClientManager.SSL_ENGINE_CONFIGURATOR, sslEngineConfigurator);
Tyrus allows monitoring and accessing some runtime properties and metrics at the server side using JMX (Java management extension technology). The monitoring API has been available since version 1.6 and the following properties are available at runtime through MXBeans. Number of open sessions, maximal number of open session since the start of monitoring and list of deployed endpoint class names and paths are available for each application. Endpoint class name and path the endpoint is registered on, number of open session and maximal number of open sessions are available for each endpoint. Apart from that message statistics are collected both per application and per individual endpoint.
The following message statistics are monitored for both sent and received messages:
Moreover all of them are collected separately for text, binary and control messages and apart from the statistics being available for the three separate categories, total numbers summing up statistics from the three types of messages are also available.
The collected metrics as well as the endpoint properties mentioned above are accessible at runtime through Tyrus MXBeans. As has been already mention the information is available on both application and endpoint level with each application or endpoint being represented with four MXBeans. One of those MXBeans contains total message statistics for both sent and received messages as well as any properties specific for applications or endpoints such as endpoint path in the case of an endpoint. The other three MXBeans contain information about sent and received text, binary and control messages.
When a user connects to a tyrus application MBean server using an JMX client such as JConsole, they will see the following structure:
In fact the monitoring structure described above was a little bit simplistic, because there is an additional monitoring level available, which causes message metrics being also available per session. The monitoring structure is very similar to the one described above, with a small difference that there are four MXBeans registered for each session, which contain text, binary, control and total message statistics. In order to distinguish the two monitoring levels, they will be referred to as endpoint-level monitoring and session-level monitoring.
As has been already mentioned, monitoring is supported only on the server side and is disabled by default. The following code sample shows, how endpoint-level monitoring can be enabled on Grizzly server:
serverProperties.put(ApplicationEventListener.APPLICATION_EVENT_LISTENER, new SessionlessApplicationMonitor());
Similarly endpoint-level monitoring can be enabled on Grizzly server in the following way:
serverProperties.put(ApplicationEventListener.APPLICATION_EVENT_LISTENER, new SessionAwareApplicationMonitor());
Monitoring can be configured on Glassfish in web.xml and the following code sample shows endpoint-level configuration:
<web-app version="2.5" xmlns="http://java.sun.com/xml/ns/javaee" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://java.sun.com/xml/ns/javaee http://java.sun.com/xml/ns/javaee/web-app_2_5.xsd">
<context-param>
<param-name>org.glassfish.tyrus.core.monitoring.ApplicationEventListener</param-name>
<param-value>org.glassfish.tyrus.ext.monitoring.jmx.SessionlessApplicationMonitor</param-value>
</context-param>
</web-app>
Similarly session-level monitoring can be configured on Glassfish in web.xml in the following way:
<web-app version="2.5" xmlns="http://java.sun.com/xml/ns/javaee" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://java.sun.com/xml/ns/javaee http://java.sun.com/xml/ns/javaee/web-app_2_5.xsd">
<context-param>
<param-name>org.glassfish.tyrus.core.monitoring.ApplicationEventListener</param-name>
<param-value>org.glassfish.tyrus.ext.monitoring.jmx.SessionAwareApplicationMonitor</param-value>
</context-param>
</web-app>