Mercurial > hg > orthanc
view OrthancFramework/Sources/DicomNetworking/DicomAssociationParameters.h @ 5143:95d8e0540219
avoid double '/' in HttpClient uri
author | Alain Mazy <am@osimis.io> |
---|---|
date | Wed, 25 Jan 2023 17:56:09 +0100 |
parents | 43e613a7756b |
children | 0ea402b4d901 |
line wrap: on
line source
/** * Orthanc - A Lightweight, RESTful DICOM Store * Copyright (C) 2012-2016 Sebastien Jodogne, Medical Physics * Department, University Hospital of Liege, Belgium * Copyright (C) 2017-2022 Osimis S.A., Belgium * Copyright (C) 2021-2022 Sebastien Jodogne, ICTEAM UCLouvain, Belgium * * This program is free software: you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public License * as published by the Free Software Foundation, either version 3 of * the License, or (at your option) any later version. * * This program is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this program. If not, see * <http://www.gnu.org/licenses/>. **/ #pragma once #include "RemoteModalityParameters.h" #include <json/value.h> class OFCondition; // From DCMTK namespace Orthanc { class ORTHANC_PUBLIC DicomAssociationParameters { private: std::string localAet_; RemoteModalityParameters remote_; uint32_t timeout_; std::string ownPrivateKeyPath_; std::string ownCertificatePath_; std::string trustedCertificatesPath_; unsigned int maximumPduLength_; bool remoteCertificateRequired_; // New in 1.9.3, for DICOM TLS static void CheckHost(const std::string& host); void SetDefaultParameters(); void CheckDicomTlsConfiguration() const; public: DicomAssociationParameters(); DicomAssociationParameters(const std::string& localAet, const RemoteModalityParameters& remote); const std::string& GetLocalApplicationEntityTitle() const; void SetLocalApplicationEntityTitle(const std::string& aet); const RemoteModalityParameters& GetRemoteModality() const; void SetRemoteModality(const RemoteModalityParameters& parameters); void SetRemoteApplicationEntityTitle(const std::string& aet); void SetRemoteHost(const std::string& host); void SetRemotePort(uint16_t port); void SetRemoteManufacturer(ModalityManufacturer manufacturer); bool IsEqual(const DicomAssociationParameters& other) const; // Setting it to "0" disables the timeout (infinite wait) void SetTimeout(uint32_t seconds); uint32_t GetTimeout() const; bool HasTimeout() const; // This corresponds to the "--enable-tls" or "+tls" argument of // the command-line tools of DCMTK. Both files must be in the PEM format. // The private key file must not be password-protected. void SetOwnCertificatePath(const std::string& privateKeyPath, const std::string& certificatePath); // This corresponds to the "--add-cert-file" or "+cf" argument of // the command-line tools of DCMTK. The file must contain a list // of PEM certificates. void SetTrustedCertificatesPath(const std::string& path); const std::string& GetOwnPrivateKeyPath() const; const std::string& GetOwnCertificatePath() const; const std::string& GetTrustedCertificatesPath() const; unsigned int GetMaximumPduLength() const; void SetMaximumPduLength(unsigned int pdu); void SetRemoteCertificateRequired(bool required); bool IsRemoteCertificateRequired() const; void SerializeJob(Json::Value& target) const; static DicomAssociationParameters UnserializeJob(const Json::Value& serialized); static void SetDefaultTimeout(uint32_t seconds); static uint32_t GetDefaultTimeout(); static void SetDefaultOwnCertificatePath(const std::string& privateKeyPath, const std::string& certificatePath); static void SetDefaultTrustedCertificatesPath(const std::string& path); static void CheckMaximumPduLength(unsigned int pdu); static void SetDefaultMaximumPduLength(unsigned int pdu); static unsigned int GetDefaultMaximumPduLength(); static void SetDefaultRemoteCertificateRequired(bool required); static bool GetDefaultRemoteCertificateRequired(); }; }