javax.xml.ws.http


1. Adding HTTP Request Headers

import javax.xml.ws.http.HTTPBinding;

public class AddHttpHeaders {

    public static void main(String[] args) {
        HTTPBinding binding = (HTTPBinding) port.getBinding();
        binding.setHTTPRequestHeaders("Authorization: Bearer <token>");
        binding.setHTTPRequestHeaders("X-My-Custom-Header: Value");
    }
}

2. Retrieving HTTP Headers from Response

import javax.xml.ws.http.HTTPBinding;

public class GetHttpHeaders {

    public static void main(String[] args) {
        HTTPBinding binding = (HTTPBinding) port.getBinding();
        Map<String, List<String>> headers = binding.getHTTPResponseHeaders();
        for (Entry<String, List<String>> entry : headers.entrySet()) {
            System.out.println(entry.getKey() + ": " + entry.getValue());
        }
    }
}

3. Specifying HTTP Method

4. Using HTTP Annotations

5. Handling HTTP Redirects

6. Using HTTP Caching

7. Customizing HTTP Response Status Codes

8. Setting HTTP Timeouts

9. Using HTTP Cookies

10. Customizing HTTP Request Properties

11. Specifying HTTP Basic Authentication

12. Handling HTTP Errors

13. Specifying HTTP Content Type

14. Setting HTTP Date Headers

15. Using HTTP Proxies

16. Customizing HTTP Bindings

17. Using HTTP Parameters

18. Customizing HTTP Request Content

19. Using HTTP Client Credentials

20. Customizing HTTP Response Content

21. Using HTTP Cookies in Binding

22. Customizing HTTP Context

23. Using HTTP Authentication

24. Customizing HTTP Endpoint

25. Using HTTP Protocol Handlers

26. Using HTTP Java Annotations

27. Using HTTP Form Parameters

28. Using HTTP URL Parameters

29. Using HTTP Message Security

30. Using HTTP Request Filters

31. Using HTTP Response Filters

32. Using HTTP Asynchronous Processing

33. Using HTTP Message Logging

34. Using HTTP Security Interceptors

35. Using HTTP Content Encodings

36. Using HTTP Header Initialization

37. Using HTTP Proxy Authentication

38. Using HTTP Streaming

39. Using HTTP Tracing

40. Using HTTP Custom Response

41. Using HTTP Authentication Credentials

42. Using HTTP Rewriters

43. Using HTTP Payloads

44. Using HTTP Attachments

45. Using HTTP Resources

46. Using HTTP WebSocket

47. Using HTTP Server Sent Events (SSE)

48. Using HTTP Server Push (HTTP/2)

49. Using HTTP Byte Streams

50. Using HTTP Chunk Sizes