Data Transformation Engine HTTP Adapter Reference Guide

HTTP Adapter Reference Guide
3
Contents
About This Document
Related References........................................................................................... 5
Chapter 1 - HTTP Adapter
Overview ....................................................................................................... 6
Known Limitations............................................................................................ 6
System Requirements........................................................................................ 6
Automatic HTTP Event Management ...................................................................... 7
Chapter 2 - Command Alias
Chapter 3 - HTTP Commands
List of Commands............................................................................................. 9
Certificate Authority (-CA)............................................................................11
Client Certificate (-CERT).............................................................................11
Client Certificate Password (-CPASS) ...............................................................11
From (-FROM)............................................................................................12
Header (-HDR)...........................................................................................12
HTTP(S) URL (-URL) ....................................................................................13
Ignore (-IGNORE)........................................................................................14
Inline Output (-INLINE) ................................................................................15
Listen (-LSN).............................................................................................15
Method (-M or -METHOD)..............................................................................15
Modified Since (-MOD or -MODIFIED) ................................................................16
Private Key (-PKEY) ....................................................................................17
Private Key Password (-KPASS).......................................................................17
Proxy URL (-PROXY)....................................................................................18
Redirections Allowed (-REDIR or -REDIRECT) ......................................................18
Session (-SESSION)......................................................................................19
SOCKS URL (-SOCKS)....................................................................................20
SSL Encryption Strength (-STR).......................................................................20
SSL Protocol (-SPROTO)................................................................................21
Timeout (-TIMEOUT) ...................................................................................21
Trace (-T or -TRACE)...................................................................................22
Type (-TY or -TYPE)....................................................................................22
Chapter 4 - Syntax Summary
Data Sources..................................................................................................23
Data Targets..................................................................................................24
Using HTTP Adapter Commands...........................................................................24
Example Files.................................................................................................25
HTTP Header Adapter Command (–HDR) Example ................................................26
Create a Type Tree.....................................................................................27
Configure the Map Input and Output Cards ........................................................27
Enter the Map Rules....................................................................................28