Jetty
Since Camel 1.2
Only consumer is supported
The Jetty component provides HTTP-based endpoints for consuming and producing HTTP requests. That is, the Jetty component behaves as a simple Web server.
Stream
The assert
call appears in this example, because the code is part of
an unit test.Jetty is stream based, which means the input it receives is
submitted to Camel as a stream. That means you will only be able to read
the content of the stream once.
If you find a situation where the message body appears to be empty or
you need to access the Exchange.HTTP_RESPONSE_CODE data multiple times
(e.g.: doing multicasting, or redelivery error handling), you should use
Stream caching or convert the message body to
a String
which is safe to be re-read multiple times.
Maven users will need to add the following dependency to their pom.xml
for this component:
<dependency>
<groupId>org.apache.camel</groupId>
<artifactId>camel-jetty</artifactId>
<version>x.x.x</version>
<!-- use the same version as your Camel core version -->
</dependency>
Configuring Options
Camel components are configured on two separate levels:
-
component level
-
endpoint level
Configuring Component Options
The component level is the highest level which holds general and common configurations that are inherited by the endpoints. For example a component may have security settings, credentials for authentication, urls for network connection and so forth.
Some components only have a few options, and others may have many. Because components typically have pre configured defaults that are commonly used, then you may often only need to configure a few options on a component; or none at all.
Configuring components can be done with the Component DSL, in a configuration file (application.properties|yaml), or directly with Java code.
Configuring Endpoint Options
Where you find yourself configuring the most is on endpoints, as endpoints often have many options, which allows you to configure what you need the endpoint to do. The options are also categorized into whether the endpoint is used as consumer (from) or as a producer (to), or used for both.
Configuring endpoints is most often done directly in the endpoint URI as path and query parameters. You can also use the Endpoint DSL and DataFormat DSL as a type safe way of configuring endpoints and data formats in Java.
A good practice when configuring options is to use Property Placeholders, which allows to not hardcode urls, port numbers, sensitive information, and other settings. In other words placeholders allows to externalize the configuration from your code, and gives more flexibility and reuse.
The following two sections lists all the options, firstly for the component followed by the endpoint.
Component Options
The Jetty component supports 36 options, which are listed below.
Name | Description | Default | Type |
---|---|---|---|
Allows for bridging the consumer to the Camel routing Error Handler, which mean any exceptions (if possible) occurred while the Camel consumer is trying to pickup incoming messages, or the likes, will now be processed as a message and handled by the routing Error Handler. Important: This is only possible if the 3rd party component allows Camel to be alerted if an exception was thrown. Some components handle this internally only, and therefore bridgeErrorHandler is not possible. In other situations we may improve the Camel component to hook into the 3rd party component and make this possible for future releases. By default the consumer will use the org.apache.camel.spi.ExceptionHandler to deal with exceptions, that will be logged at WARN or ERROR level and ignored. |
false |
boolean |
|
Allows to set a timeout in millis when using Jetty as consumer (server). By default Jetty uses 30000. You can use a value of = 0 to never expire. If a timeout occurs then the request will be expired and Jetty will return back a http error 503 to the client. This option is only in use when using Jetty with the Asynchronous Routing Engine. |
30000 |
Long |
|
If this option is true, Jetty JMX support will be enabled for this endpoint. |
false |
boolean |
|
To set a value for maximum number of threads in server thread pool. Notice that both a min and max size must be configured. |
Integer |
||
To set a value for minimum number of threads in server thread pool. Notice that both a min and max size must be configured. |
Integer |
||
If enabled and an Exchange failed processing on the consumer side the response’s body won’t contain the exception’s stack trace. |
true |
boolean |
|
Allows to configure a custom value of the request buffer size on the Jetty connectors. |
Integer |
||
Allows to configure a custom value of the request header size on the Jetty connectors. |
Integer |
||
Allows to configure a custom value of the response buffer size on the Jetty connectors. |
Integer |
||
Allows to configure a custom value of the response header size on the Jetty connectors. |
Integer |
||
If the option is true, jetty will send the server header with the jetty version information to the client which sends the request. NOTE please make sure there is no any other camel-jetty endpoint is share the same port, otherwise this option may not work as expected. |
true |
boolean |
|
Whether or not to use Jetty continuations for the Jetty Server. |
true |
boolean |
|
To use the X-Forwarded-For header in HttpServletRequest.getRemoteAddr. |
false |
boolean |
|
The size threshold after which files will be written to disk for multipart/form-data requests. By default the files are not written to disk. |
0 |
int |
|
The directory location where files will be store for multipart/form-data requests. By default the files are written in the system temporary folder. |
String |
||
The maximum size allowed for uploaded files. -1 means no limit. |
-1 |
long |
|
The maximum size allowed for multipart/form-data requests. -1 means no limit. |
-1 |
long |
|
To use a custom thread pool for the server. This option should only be used in special circumstances. |
ThreadPool |
||
Whether to allow java serialization when a request uses context-type=application/x-java-serialized-object. This is by default turned off. If you enable this then be aware that Java will deserialize the incoming data from the request to Java and that can be a potential security risk. |
false |
boolean |
|
Whether autowiring is enabled. This is used for automatic autowiring options (the option must be marked as autowired) by looking up in the registry to find if there is a single instance of matching type, which then gets configured on the component. This can be used for automatic configuring JDBC data sources, JMS connection factories, AWS Clients, etc. |
true |
boolean |
|
This option is used to set the ErrorHandler that Jetty server uses. |
ErrorHandler |
||
Not to be used - use JettyHttpBinding instead. |
HttpBinding |
||
Jetty component does not use HttpConfiguration. |
HttpConfiguration |
||
To use a existing configured org.eclipse.jetty.jmx.MBeanContainer if JMX is enabled that Jetty uses for registering mbeans. |
MBeanContainer |
||
To use a custom org.apache.camel.spi.HeaderFilterStrategy to filter header to and from Camel message. |
HeaderFilterStrategy |
||
To use a http proxy to configure the hostname. |
String |
||
To use a http proxy to configure the port number. |
Integer |
||
Specifies the location of the Java keystore file, which contains the Jetty server’s own X.509 certificate in a key entry. |
String |
||
A map which contains general HTTP connector properties. Uses the same principle as sslSocketConnectorProperties. |
Map |
||
A map which contains per port number specific HTTP connectors. Uses the same principle as sslSocketConnectors. |
Map |
||
To configure security using SSLContextParameters. |
SSLContextParameters |
||
The key password, which is used to access the certificate’s key entry in the keystore (this is the same password that is supplied to the keystore command’s -keypass option). |
String |
||
The ssl password, which is required to access the keystore file (this is the same password that is supplied to the keystore command’s -storepass option). |
String |
||
A map which contains general SSL connector properties. |
Map |
||
A map which contains per port number specific SSL connectors. |
Map |
||
Enable usage of global SSL context parameters. |
false |
boolean |
Endpoint Options
The Jetty endpoint is configured using URI syntax:
jetty:httpUri
with the following path and query parameters:
Path Parameters (1 parameters)
Name | Description | Default | Type |
---|---|---|---|
Required The url of the HTTP endpoint to call. |
URI |
Query Parameters (38 parameters)
Name | Description | Default | Type |
---|---|---|---|
To use a custom HeaderFilterStrategy to filter header to and from Camel message. |
HeaderFilterStrategy |
||
To use a custom HttpBinding to control the mapping between Camel message and HttpClient. |
HttpBinding |
||
If this option is false the Servlet will disable the HTTP streaming and set the content-length header on the response. |
true |
boolean |
|
Determines whether or not the raw input stream from Servlet is cached or not (Camel will read the stream into a in memory/overflow to file, Stream caching) cache. By default Camel will cache the Servlet input stream to support reading it multiple times to ensure it Camel can retrieve all data from the stream. However you can set this option to true when you for example need to access the raw stream, such as streaming it directly to a file or other persistent store. DefaultHttpBinding will copy the request input stream into a stream cache and put it into message body if this option is false to support reading the stream multiple times. If you use Servlet to bridge/proxy an endpoint then consider enabling this option to improve performance, in case you do not need to read the message payload multiple times. The http producer will by default cache the response body stream. If setting this option to true, then the producers will not cache the response body stream but use the response stream as-is as the message body. |
false |
boolean |
|
If enabled and an Exchange failed processing on the consumer side, and if the caused Exception was send back serialized in the response as a application/x-java-serialized-object content type. On the producer side the exception will be deserialized and thrown as is, instead of the HttpOperationFailedException. The caused exception is required to be serialized. This is by default turned off. If you enable this then be aware that Java will deserialize the incoming data from the request to Java and that can be a potential security risk. |
false |
boolean |
|
Configure the consumer to work in async mode. |
false |
boolean |
|
Allows to set a timeout in millis when using Jetty as consumer (server). By default Jetty uses 30000. You can use a value of = 0 to never expire. If a timeout occurs then the request will be expired and Jetty will return back a http error 503 to the client. This option is only in use when using Jetty with the Asynchronous Routing Engine. |
30000 |
Long |
|
If the option is true, Jetty server will setup the CrossOriginFilter which supports the CORS out of box. |
false |
boolean |
|
If this option is true, Jetty JMX support will be enabled for this endpoint. See Jetty JMX support for more details. |
false |
boolean |
|
Whether org.apache.camel.component.jetty.MultiPartFilter is enabled or not. You should set this value to false when bridging endpoints, to ensure multipart requests is proxied/bridged as well. |
false |
boolean |
|
Used to only allow consuming if the HttpMethod matches, such as GET/POST/PUT etc. Multiple methods can be specified separated by comma. |
String |
||
If enabled and an Exchange failed processing on the consumer side the exception’s stack trace will be logged when the exception stack trace is not sent in the response’s body. |
false |
boolean |
|
Whether or not the consumer should try to find a target consumer by matching the URI prefix if no exact match is found. |
false |
boolean |
|
If enabled and an Exchange failed processing on the consumer side the response’s body won’t contain the exception’s stack trace. |
false |
boolean |
|
To use a custom buffer size on the jakarta.servlet.ServletResponse. |
Integer |
||
If the option is true, jetty server will send the date header to the client which sends the request. NOTE please make sure there is no any other camel-jetty endpoint is share the same port, otherwise this option may not work as expected. |
false |
boolean |
|
If the option is true, jetty will send the server header with the jetty version information to the client which sends the request. NOTE please make sure there is no any other camel-jetty endpoint is share the same port, otherwise this option may not work as expected. |
true |
boolean |
|
Specifies whether to enable the session manager on the server side of Jetty. |
false |
boolean |
|
Whether or not to use Jetty continuations for the Jetty Server. |
Boolean |
||
Allows for bridging the consumer to the Camel routing Error Handler, which mean any exceptions (if possible) occurred while the Camel consumer is trying to pickup incoming messages, or the likes, will now be processed as a message and handled by the routing Error Handler. Important: This is only possible if the 3rd party component allows Camel to be alerted if an exception was thrown. Some components handle this internally only, and therefore bridgeErrorHandler is not possible. In other situations we may improve the Camel component to hook into the 3rd party component and make this possible for future releases. By default the consumer will use the org.apache.camel.spi.ExceptionHandler to deal with exceptions, that will be logged at WARN or ERROR level and ignored. |
false |
boolean |
|
Whether to eager check whether the HTTP requests has content if the content-length header is 0 or not present. This can be turned on in case HTTP clients do not send streamed data. |
false |
boolean |
|
To let the consumer use a custom ExceptionHandler. Notice if the option bridgeErrorHandler is enabled then this option is not in use. By default the consumer will deal with exceptions, that will be logged at WARN or ERROR level and ignored. |
ExceptionHandler |
||
Sets the exchange pattern when the consumer creates an exchange. Enum values:
|
ExchangePattern |
||
The size threshold after which files will be written to disk for multipart/form-data requests. By default the files are not written to disk. |
Integer |
||
The directory location where files will be store for multipart/form-data requests. By default the files are written in the system temporary folder. |
String |
||
Configuration of the filter init parameters. These parameters will be applied to the filter list before starting the jetty server. |
Map |
||
Allows using a custom filters which is putted into a list and can be find in the Registry. Multiple values can be separated by comma. |
List |
||
Specifies a comma-delimited set of Handler instances to lookup in your Registry. These handlers are added to the Jetty servlet context (for example, to add security). Important: You can not use different handlers with different Jetty endpoints using the same port number. The handlers is associated to the port number. If you need different handlers, then use different port numbers. |
List |
||
The max idle time (in milli seconds) is applied to an HTTP request for IO operations and delayed dispatch. Idle time 0 implies an infinite timeout, -1 (default) implies no HTTP channel timeout and the connection timeout is used instead. |
-1 |
long |
|
If this option is true then IN exchange Body of the exchange will be mapped to HTTP body. Setting this to false will avoid the HTTP mapping. |
true |
boolean |
|
If this option is true then IN exchange Form Encoded body of the exchange will be mapped to HTTP. Setting this to false will avoid the HTTP Form Encoded body mapping. |
true |
boolean |
|
If this option is true then IN exchange Headers of the exchange will be mapped to HTTP headers. Setting this to false will avoid the HTTP Headers mapping. |
true |
boolean |
|
The maximum size allowed for uploaded files. -1 means no limit. |
Long |
||
The maximum size allowed for multipart/form-data requests. -1 means no limit. |
Long |
||
Allows using a custom multipart filter. Note: setting multipartFilterRef forces the value of enableMultipartFilter to true. |
Filter |
||
Specifies whether to enable HTTP OPTIONS for this Servlet consumer. By default OPTIONS is turned off. |
false |
boolean |
|
Specifies whether to enable HTTP TRACE for this Servlet consumer. By default TRACE is turned off. |
false |
boolean |
|
To configure security using SSLContextParameters. |
SSLContextParameters |
Message Headers
Camel uses the same message headers as the HTTP component. It also uses (Exchange.HTTP_CHUNKED,CamelHttpChunked) header to turn on or turn off the chunked encoding on the camel-jetty consumer.
Camel also populates all request.parameter and request.headers. For
example, given a client request with the URL,
http://myserver/myserver?orderid=123
, the exchange will contain a
header named orderid
with the value 123.
You can get the request.parameter from the message header not only from Get Method, but also other HTTP method.
Message Headers
The Jetty component supports 2 message header(s), which is/are listed below:
Name | Description | Default | Type |
---|---|---|---|
CamelServletContextPath (consumer) Constant: |
The servlet context path used. |
String |
|
Constant: |
Request URI’s path, the header will be used to build the request URI with the HTTP_URI. |
String |
Consumer Example
In this sample we define a route that exposes a HTTP service at
http://localhost:8080/myapp/myservice
:
Usage of localhost
When you specify localhost
in a URL, Camel exposes the endpoint only
on the local TCP/IP network interface, so it cannot be accessed from
outside the machine it operates on.
If you need to expose a Jetty endpoint on a specific network interface,
the numerical IP address of this interface should be used as the host.
If you need to expose a Jetty endpoint on all network interfaces, the
0.0.0.0
address should be used.
To listen across an entire URI prefix, see How do I let Jetty match wildcards.
If you actually want to expose routes by HTTP and already have a Servlet, you should instead refer to the Servlet Transport.
Our business logic is implemented in the MyBookService
class, which
accesses the HTTP request contents and then returns a response.
Note: The assert
call appears in this example, because the code is
part of an unit test.
The following sample shows a content-based route that routes all
requests containing the URI parameter, one
, to the endpoint,
mock:one
, and all others to mock:other
.
So if a client sends the HTTP request, http://serverUri?one=hello
, the
Jetty component will copy the HTTP request parameter, one
to the
exchange’s in.header
. We can then use the simple
language to route
exchanges that contain this header to a specific endpoint and all others
to another. If we used a language more powerful than
Simple (such as OGNL)
we could also test for the parameter value and do routing based on the
header value as well.
Session Support
The session support option, sessionSupport
, can be used to enable a
HttpSession
object and access the session object while processing the
exchange. For example, the following route enables sessions:
<route>
<from uri="jetty:http://0.0.0.0/myapp/myservice/?sessionSupport=true"/>
<process ref="myCode"/>
</route>
The myCode
Processor can be instantiated by a
Spring bean
element:
<bean id="myCode" class="com.mycompany.MyCodeProcessor"/>
Where the processor implementation can access the HttpSession
as
follows:
public void process(Exchange exchange) throws Exception {
HttpSession session = exchange.getIn(HttpMessage.class).getRequest().getSession();
...
}
SSL Support (HTTPS)
Using the JSSE Configuration Utility
The Jetty component supports SSL/TLS configuration through the Camel JSSE Configuration Utility. This utility greatly decreases the amount of component specific code you need to write and is configurable at the endpoint and component levels. The following examples demonstrate how to use the utility with the Jetty component.
Programmatic configuration of the component
KeyStoreParameters ksp = new KeyStoreParameters();
ksp.setResource("/users/home/server/keystore.jks");
ksp.setPassword("keystorePassword");
KeyManagersParameters kmp = new KeyManagersParameters();
kmp.setKeyStore(ksp);
kmp.setKeyPassword("keyPassword");
SSLContextParameters scp = new SSLContextParameters();
scp.setKeyManagers(kmp);
JettyComponent jettyComponent = getContext().getComponent("jetty", JettyComponent.class);
jettyComponent.setSslContextParameters(scp);
Spring DSL based configuration of endpoint
<camel:sslContextParameters
id="sslContextParameters">
<camel:keyManagers
keyPassword="keyPassword">
<camel:keyStore
resource="/users/home/server/keystore.jks"
password="keystorePassword"/>
</camel:keyManagers>
</camel:sslContextParameters>
<to uri="jetty:https://127.0.0.1/mail/?sslContextParameters=#sslContextParameters"/>
Blueprint based configuration of endpoint
Global configuration of sslContextParameters in a dedicated Blueprint XML file
<blueprint xmlns="http://www.osgi.org/xmlns/blueprint/v1.0.0"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://www.osgi.org/xmlns/blueprint/v1.0.0 https://www.osgi.org/xmlns/blueprint/v1.0.0/blueprint.xsd">
<sslContextParameters id="sslContextParameters" xmlns="http://camel.apache.org/schema/blueprint">
<keyManagers keyPassword="keyPassword">
<keyStore resource="etc/keystore.p12" password="keystorePassword"/>
</keyManagers>
</sslContextParameters>
<service ref="sslContextParameters" auto-export="all-classes"/>
</blueprint>
Use of the global configuration in other Blueprint XML files with route definitions
...
<reference id="sslContextParameters" interface="org.apache.camel.support.jsse.SSLContextParameters" ext:proxy-method="classes" />
<camelContext xmlns="http://camel.apache.org/schema/blueprint">
<route>
<from uri="jetty:https://0.0.0.0/path?sslContextParameters=#sslContextParameters"/>
...
Configuring Jetty Directly
Jetty provides SSL support out of the box. To enable Jetty to run in SSL
mode, simply format the URI with the \https://
prefix---for example:
<from uri="jetty:https://0.0.0.0/myapp/myservice/"/>
Jetty also needs to know where to load your keystore from and what passwords to use in order to load the correct SSL certificate. Set the following JVM System Properties:
-
org.eclipse.jetty.ssl.keystore
specifies the location of the Java keystore file, which contains the Jetty server’s own X.509 certificate in a key entry. A key entry stores the X.509 certificate (effectively, the public key) and also its associated private key. -
org.eclipse.jetty.ssl.password
the store password, which is required to access the keystore file (this is the same password that is supplied to thekeystore
command’s-storepass
option). -
org.eclipse.jetty.ssl.keypassword
the key password, which is used to access the certificate’s key entry in the keystore (this is the same password that is supplied to thekeystore
command’s-keypass
option).
For details of how to configure SSL on a Jetty endpoint, read the following documentation at the Jetty Site: http://docs.codehaus.org/display/JETTY/How+to+configure+SSL
Some SSL properties aren’t exposed directly by Camel, however Camel does expose the underlying SslSocketConnector, which will allow you to set properties like needClientAuth for mutual authentication requiring a client certificate or wantClientAuth for mutual authentication where a client doesn’t need a certificate but can have one.
<bean id="jetty" class="org.apache.camel.component.jetty.JettyHttpComponent">
<property name="sslSocketConnectors">
<map>
<entry key="8043">
<bean class="org.eclipse.jetty.server.ssl.SslSelectChannelConnector">
<property name="password" value="..."/>
<property name="keyPassword" value="..."/>
<property name="keystore" value="..."/>
<property name="needClientAuth" value="..."/>
<property name="truststore" value="..."/>
</bean>
</entry>
</map>
</property>
</bean>
The value you use as keys in the above map is the port you configure Jetty to listen on.
Configuring general SSL properties
Instead of a per port number specific SSL socket connector (as shown above) you can now configure general properties which applies for all SSL socket connectors (which is not explicit configured as above with the port number as entry).
<bean id="jetty" class="org.apache.camel.component.jetty.JettyHttpComponent">
<property name="sslSocketConnectorProperties">
<map>
<entry key="password" value="..."/>
<entry key="keyPassword" value="..."/>
<entry key="keystore" value="..."/>
<entry key="needClientAuth" value="..."/>
<entry key="truststore" value="..."/>
</map>
</property>
</bean>
How to obtain reference to the X509Certificate
Jetty stores a reference to the certificate in the HttpServletRequest which you can access from code as follows:
HttpServletRequest req = exchange.getIn().getBody(HttpServletRequest.class);
X509Certificate cert = (X509Certificate) req.getAttribute("javax.servlet.request.X509Certificate")
Configuring general HTTP properties
Instead of a per port number specific HTTP socket connector (as shown above) you can now configure general properties which applies for all HTTP socket connectors (which is not explicit configured as above with the port number as entry).
<bean id="jetty" class="org.apache.camel.component.jetty.JettyHttpComponent">
<property name="socketConnectorProperties">
<map>
<entry key="acceptors" value="4"/>
<entry key="maxIdleTime" value="300000"/>
</map>
</property>
</bean>
Obtaining X-Forwarded-For header with HttpServletRequest.getRemoteAddr()
If the HTTP requests are handled by an Apache server and forwarded to jetty with mod_proxy, the original client IP address is in the X-Forwarded-For header and the HttpServletRequest.getRemoteAddr() will return the address of the Apache proxy.
Jetty has a forwarded property which takes the value from X-Forwarded-For and places it in the HttpServletRequest remoteAddr property. This property is not available directly through the endpoint configuration but it can be easily added using the socketConnectors property:
<bean id="jetty" class="org.apache.camel.component.jetty.JettyHttpComponent">
<property name="socketConnectors">
<map>
<entry key="8080">
<bean class="org.eclipse.jetty.server.nio.SelectChannelConnector">
<property name="forwarded" value="true"/>
</bean>
</entry>
</map>
</property>
</bean>
This is particularly useful when an existing Apache server handles TLS connections for a domain and proxies them to application servers internally.
Default behavior for returning HTTP status codes
The default behavior of HTTP status codes is defined by the
org.apache.camel.component.http.DefaultHttpBinding
class, which
handles how a response is written and also sets the HTTP status code.
If the exchange was processed successfully, the 200 HTTP status code is
returned.
If the exchange failed with an exception, the 500 HTTP status code is
returned, and the stacktrace is returned in the body. If you want to
specify which HTTP status code to return, set the code in the
Exchange.HTTP_RESPONSE_CODE
header of the OUT message.
Customizing HttpBinding
By default, Camel uses the
org.apache.camel.component.http.DefaultHttpBinding
to handle how a
response is written. If you like, you can customize this behavior either
by implementing your own HttpBinding
class or by extending
DefaultHttpBinding
and overriding the appropriate methods.
The following example shows how to customize the DefaultHttpBinding
in
order to change how exceptions are returned:
We can then create an instance of our binding and register it in the Spring registry as follows:
<bean id="mybinding" class="com.mycompany.MyHttpBinding"/>
And then we can reference this binding when we define the route:
<route>
<from uri="jetty:http://0.0.0.0:8080/myapp/myservice?httpBindingRef=mybinding"/>
<to uri="bean:doSomething"/>
</route>
Jetty handlers and security configuration
You can configure a list of Jetty handlers on the endpoint, which can be useful for enabling advanced Jetty security features. These handlers are configured in Spring XML as follows:
<bean id="userRealm" class="org.mortbay.jetty.plus.jaas.JAASUserRealm">
<property name="name" value="tracker-users"/>
<property name="loginModuleName" value="ldaploginmodule"/>
</bean>
<bean id="constraint" class="org.mortbay.jetty.security.Constraint">
<property name="name" value="BASIC"/>
<property name="roles" value="tracker-users"/>
<property name="authenticate" value="true"/>
</bean>
<bean id="constraintMapping" class="org.mortbay.jetty.security.ConstraintMapping">
<property name="constraint" ref="constraint"/>
<property name="pathSpec" value="/*"/>
</bean>
<bean id="securityHandler" class="org.mortbay.jetty.security.SecurityHandler">
<property name="userRealm" ref="userRealm"/>
<property name="constraintMappings" ref="constraintMapping"/>
</bean>
You can configure a list of Jetty handlers as follows:
<bean id="constraint" class="org.eclipse.jetty.http.security.Constraint">
<property name="name" value="BASIC"/>
<property name="roles" value="tracker-users"/>
<property name="authenticate" value="true"/>
</bean>
<bean id="constraintMapping" class="org.eclipse.jetty.security.ConstraintMapping">
<property name="constraint" ref="constraint"/>
<property name="pathSpec" value="/*"/>
</bean>
<bean id="securityHandler" class="org.eclipse.jetty.security.ConstraintSecurityHandler">
<property name="authenticator">
<bean class="org.eclipse.jetty.security.authentication.BasicAuthenticator"/>
</property>
<property name="constraintMappings">
<list>
<ref bean="constraintMapping"/>
</list>
</property>
</bean>
You can then define the endpoint as:
from("jetty:http://0.0.0.0:9080/myservice?handlers=securityHandler")
If you need more handlers, set the handlers
option equal to a
comma-separated list of bean IDs.
Blueprint based definition of basic authentication (based on Jetty 12):
<blueprint xmlns="http://www.osgi.org/xmlns/blueprint/v1.0.0"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://www.osgi.org/xmlns/blueprint/v1.0.0 https://www.osgi.org/xmlns/blueprint/v1.0.0/blueprint.xsd"
xmlns:ext="http://aries.apache.org/blueprint/xmlns/blueprint-ext/v1.0.0">
<bean id="constraint" class="org.eclipse.jetty.util.security.Constraint">
<property name="name" value="BASIC"/>
<property name="authenticate" value="true"/>
<property name="roles">
<list>
<value>rolename1</value>
</list>
</property>
</bean>
<bean id="constraintMapping" class="org.eclipse.jetty.security.ConstraintMapping">
<property name="constraint" ref="constraint"/>
<property name="pathSpec" value="/path"/>
</bean>
<bean id="securityHandler" class="org.eclipse.jetty.security.ConstraintSecurityHandler">
<property name="loginService">
<bean class="org.eclipse.jetty.security.HashLoginService">
<property name="config" value="/opt/apache-karaf/etc/roles.properties"/>
<property name="hotReload" value="true"/>
</bean>
</property>
<property name="authenticator">
<bean class="org.eclipse.jetty.security.authentication.BasicAuthenticator"/>
</property>
<property name="constraintMappings">
<list>
<ref component-id="constraintMapping"/>
</list>
</property>
</bean>
<camelContext xmlns="http://camel.apache.org/schema/blueprint">
<route>
<from uri="jetty:http://0.0.0.0/path?handlers=securityHandler"/>
...
The roles.properties files contains
username1=password1,rolename1 username2=password2,rolename1
This file is located in the etc folder and will be reloaded when changed. The endpoint
http://0.0.0.0/path
is now secured with basic authentication, only username1 with password1 and username2 with password2 are able to access the endpoint.
How to return a custom HTTP 500 reply message
You may want to return a custom reply message when something goes wrong,
instead of the default reply message Camel Jetty
replies with.
You could use a custom HttpBinding
to be in control of the message
mapping, but often it may be easier to use Camel’s
Exception Clause to construct the custom
reply message. For example as show here, where we return
Dude something went wrong
with HTTP error code 500:
Multi-part Form support
The camel-jetty component supports multipart form post out of box. The submitted form-data are mapped into the message header. Camel-jetty creates an attachment for each uploaded file. The file name is mapped to the name of the attachment. The content type is set as the content type of the attachment file name. You can find the example here.
Jetty JMX support
The camel-jetty component supports the enabling of Jetty’s JMX capabilities at the component and endpoint level with the endpoint configuration taking priority. Note that JMX must be enabled within the Camel context in order to enable JMX support in this component as the component provides Jetty with a reference to the MBeanServer registered with the Camel context. Because the camel-jetty component caches and reuses Jetty resources for a given protocol/host/port pairing, this configuration option will only be evaluated during the creation of the first endpoint to use a protocol/host/port pairing. For example, given two routes created from the following XML fragments, JMX support would remain enabled for all endpoints listening on "https://0.0.0.0".
<from uri="jetty:https://0.0.0.0/myapp/myservice1/?enableJmx=true"/>
<from uri="jetty:https://0.0.0.0/myapp/myservice2/?enableJmx=false"/>
The camel-jetty component also provides for direct configuration of the Jetty MBeanContainer. Jetty creates MBean names dynamically. If you are running another instance of Jetty outside of the Camel context and sharing the same MBeanServer between the instances, you can provide both instances with a reference to the same MBeanContainer in order to avoid name collisions when registering Jetty MBeans.