Debugging SOAP Traffic

Often, if you ask Tyler for assistance, they will want you to give them the exact SOAP request that you are sending.

There are a few ways of doing this: * add a call to the Ecf4Helper.objectToXmlFile method before you call the MDE to print out the entire XML object that you are sending. This is mostly useful for business logic bugs. * Add an interceptor to you CXF sender. This is useful for checking SOAP / WebService- Security settings. I haven't done this and don't have a recipe for doing so. * If many SOAP API calls aren't working (i.e. you aren't sure if Tyler's accepting any of the calls), you will need to look at the full SOAP envelope. To do so, download extract-tls-secrets-4.0.0.0.jar, and add the following diff to your repo:

diff --git a/docker-compose.yml b/docker-compose.yml
index 7692426c..776776b6 100644
--- a/docker-compose.yml
+++ b/docker-compose.yml
@@ -16,15 +16,15 @@ services:
       - type: bind
         source: ./src/main/config
         target: /tmp/tls_certs
+    # Uncomment this for debugging: you can get exact SOAP envelopes being
+    # sent by running wireshark locally
+      - type: bind
+        source: .
+        target: /tmp/secrets
-    # Uncomment this for debugging: you can get exact SOAP envelopes being
-    # sent by running wireshark locally
-    #  - type: bind
-    #    source: .
-    #    target: /tmp/secrets
     deploy:
       resources:
         limits:
           memory: 4G
   db:
     image: "postgres:14"
     shm_size: 256m
diff --git a/docker_run_script.sh b/docker_run_script.sh
index 3d903c53..57028ced 100755
--- a/docker_run_script.sh
+++ b/docker_run_script.sh
@@ -9,6 +9,7 @@ cd /app
 # if needed to debug http logs:
 # https://stackoverflow.com/questions/53215038/how-to-log-request-response-using-java-net-http-httpclient
 exec java \
+    -javaagent:extract-tls-secrets-4.0.0.jar=/tmp/secrets/secrets.log \
     -cp efspserver-with-deps.jar \
     -XX:+HeapDumpOnOutOfMemoryError \
     -XX:InitialRAMPercentage=20.0 \

Once you start the server, you can run wireshark with the following command:

sudo wireshark -o tls.keylog_file:$PWD/secrets.log

You can then look through your machine's network traffic, and find the Tyler IP, filter on that, and piece together the full SOAP envelope from the decoded packets [^1].

Some misc links that I used while researching: