/*
|
* CDDL HEADER START
|
*
|
* The contents of this file are subject to the terms of the
|
* Common Development and Distribution License, Version 1.0 only
|
* (the "License"). You may not use this file except in compliance
|
* with the License.
|
*
|
* You can obtain a copy of the license at
|
* trunk/opends/resource/legal-notices/OpenDS.LICENSE
|
* or https://OpenDS.dev.java.net/OpenDS.LICENSE.
|
* See the License for the specific language governing permissions
|
* and limitations under the License.
|
*
|
* When distributing Covered Code, include this CDDL HEADER in each
|
* file and include the License file at
|
* trunk/opends/resource/legal-notices/OpenDS.LICENSE. If applicable,
|
* add the following below this CDDL HEADER, with the fields enclosed
|
* by brackets "[]" replaced with your own identifying * information:
|
* Portions Copyright [yyyy] [name of copyright owner]
|
*
|
* CDDL HEADER END
|
*
|
*
|
* Portions Copyright 2006 Sun Microsystems, Inc.
|
*/
|
package org.opends.server.core;
|
|
|
|
import java.util.ArrayList;
|
|
import org.opends.server.api.ConfigAddListener;
|
import org.opends.server.api.ConfigChangeListener;
|
import org.opends.server.api.ConfigDeleteListener;
|
import org.opends.server.api.TrustManagerProvider;
|
import org.opends.server.config.BooleanConfigAttribute;
|
import org.opends.server.config.ConfigEntry;
|
import org.opends.server.config.StringConfigAttribute;
|
import org.opends.server.extensions.NullTrustManagerProvider;
|
import org.opends.server.types.ConfigChangeResult;
|
import org.opends.server.types.DN;
|
import org.opends.server.types.ErrorLogCategory;
|
import org.opends.server.types.ErrorLogSeverity;
|
import org.opends.server.types.ResultCode;
|
|
import static org.opends.server.config.ConfigConstants.*;
|
import static org.opends.server.loggers.Debug.*;
|
import static org.opends.server.loggers.Error.*;
|
import static org.opends.server.messages.ConfigMessages.*;
|
import static org.opends.server.messages.MessageHandler.*;
|
import static org.opends.server.util.StaticUtils.*;
|
|
|
|
/**
|
* This class defines a utility that will be used to manage the configuration
|
* for the Directory Server trust manager provider. Only a single trust manager
|
* provider may be defined, but if it is absent or disabled, then a null
|
* provider will be used which will not allow any trust manager interaction.
|
*/
|
public class TrustManagerProviderConfigManager
|
implements ConfigChangeListener, ConfigAddListener, ConfigDeleteListener
|
{
|
/**
|
* The fully-qualified name of this class for debugging purposes.
|
*/
|
private static final String CLASS_NAME =
|
"org.opends.server.core.TrustManagerProviderConfigManager";
|
|
|
|
/**
|
* Creates a new instance of this trust manager provider config manager.
|
*/
|
public TrustManagerProviderConfigManager()
|
{
|
assert debugConstructor(CLASS_NAME);
|
|
// No implementation is required.
|
}
|
|
|
|
/**
|
* Initializes the configuration associated with the Directory Server trust
|
* manager provider. This should only be called at Directory Server startup.
|
* If an error occurs, then a message will be logged and the null trust
|
* manager provider will be installed.
|
*
|
* @throws InitializationException If a problem occurs while trying to
|
* install the null trust manager provider.
|
*/
|
public void initializeTrustManagerProvider()
|
throws InitializationException
|
{
|
assert debugEnter(CLASS_NAME, "initializeTrustManagerProvider");
|
|
|
// First, install a null trust manager provider so that there will be one
|
// even if we encounter a problem later.
|
try
|
{
|
NullTrustManagerProvider nullProvider = new NullTrustManagerProvider();
|
nullProvider.initializeTrustManagerProvider(null);
|
DirectoryServer.setTrustManagerProvider(nullProvider);
|
}
|
catch (Exception e)
|
{
|
assert debugException(CLASS_NAME, "initializeTrustManagerProvider", e);
|
|
int msgID = MSGID_CONFIG_TRUSTMANAGER_CANNOT_INSTALL_NULL_PROVIDER;
|
String message = getMessage(msgID, stackTraceToSingleLineString(e));
|
throw new InitializationException(msgID, message, e);
|
}
|
|
|
// Get the trust manager provider configuration entry. If it is not
|
// present, then register an add listener and just go with the null
|
// provider.
|
DN configEntryDN;
|
ConfigEntry configEntry;
|
try
|
{
|
configEntryDN = DN.decode(DN_TRUSTMANAGER_PROVIDER_CONFIG);
|
configEntry = DirectoryServer.getConfigEntry(configEntryDN);
|
}
|
catch (Exception e)
|
{
|
assert debugException(CLASS_NAME, "initializeTrustManagerProvider", e);
|
|
logError(ErrorLogCategory.CONFIGURATION, ErrorLogSeverity.SEVERE_ERROR,
|
MSGID_CONFIG_TRUSTMANAGER_CANNOT_GET_CONFIG_ENTRY,
|
stackTraceToSingleLineString(e));
|
return;
|
}
|
|
if (configEntry == null)
|
{
|
logError(ErrorLogCategory.CONFIGURATION, ErrorLogSeverity.SEVERE_WARNING,
|
MSGID_CONFIG_TRUSTMANAGER_NO_CONFIG_ENTRY);
|
|
try
|
{
|
ConfigEntry parentEntry =
|
DirectoryServer.getConfigEntry(configEntryDN.getParent());
|
if (parentEntry != null)
|
{
|
parentEntry.registerAddListener(this);
|
}
|
}
|
catch (Exception e)
|
{
|
assert debugException(CLASS_NAME, "initializeTrustManagerProvider", e);
|
|
logError(ErrorLogCategory.CONFIGURATION, ErrorLogSeverity.SEVERE_ERROR,
|
MSGID_CONFIG_TRUSTMANAGER_CANNOT_REGISTER_ADD_LISTENER,
|
stackTraceToSingleLineString(e));
|
}
|
|
return;
|
}
|
|
|
// At this point, we have a configuration entry. Register a change listener
|
// with it so we can be notified of changes to it over time. We will also
|
// want to register a delete listener with its parent to allow us to
|
// determine if the entry is deleted.
|
configEntry.registerChangeListener(this);
|
try
|
{
|
DN parentDN = configEntryDN.getParent();
|
ConfigEntry parentEntry = DirectoryServer.getConfigEntry(parentDN);
|
if (parentEntry != null)
|
{
|
parentEntry.registerDeleteListener(this);
|
}
|
}
|
catch (Exception e)
|
{
|
assert debugException(CLASS_NAME, "initializeTrustManagerProvider", e);
|
|
logError(ErrorLogCategory.CONFIGURATION, ErrorLogSeverity.SEVERE_WARNING,
|
MSGID_CONFIG_TRUSTMANAGER_CANNOT_REGISTER_DELETE_LISTENER,
|
stackTraceToSingleLineString(e));
|
}
|
|
|
// See if the entry indicates whether the trust manager provider should be
|
// enabled.
|
int msgID = MSGID_CONFIG_TRUSTMANAGER_DESCRIPTION_ENABLED;
|
BooleanConfigAttribute enabledStub =
|
new BooleanConfigAttribute(ATTR_TRUSTMANAGER_ENABLED,
|
getMessage(msgID), false);
|
try
|
{
|
BooleanConfigAttribute enabledAttr =
|
(BooleanConfigAttribute)
|
configEntry.getConfigAttribute(enabledStub);
|
if (enabledAttr == null)
|
{
|
// The attribute is not present, so the trust manager provider will be
|
// disabled. Log a warning message and return.
|
logError(ErrorLogCategory.CONFIGURATION,
|
ErrorLogSeverity.SEVERE_WARNING,
|
MSGID_CONFIG_TRUSTMANAGER_NO_ENABLED_ATTR);
|
return;
|
}
|
else if (! enabledAttr.activeValue())
|
{
|
// The trust manager provider is explicitly disabled. Log a mild
|
// warning and return.
|
logError(ErrorLogCategory.CONFIGURATION, ErrorLogSeverity.MILD_WARNING,
|
MSGID_CONFIG_TRUSTMANAGER_DISABLED);
|
return;
|
}
|
}
|
catch (Exception e)
|
{
|
assert debugException(CLASS_NAME, "initializeTrustManagerProvider", e);
|
|
logError(ErrorLogCategory.CONFIGURATION, ErrorLogSeverity.SEVERE_ERROR,
|
MSGID_CONFIG_TRUSTMANAGER_UNABLE_TO_DETERMINE_ENABLED_STATE,
|
stackTraceToSingleLineString(e));
|
return;
|
}
|
|
|
// See if it specifies the class name for the trust manager provider
|
// implementation.
|
String className;
|
msgID = MSGID_CONFIG_TRUSTMANAGER_DESCRIPTION_CLASS;
|
StringConfigAttribute classStub =
|
new StringConfigAttribute(ATTR_TRUSTMANAGER_CLASS, getMessage(msgID),
|
true, false, false);
|
try
|
{
|
StringConfigAttribute classAttr =
|
(StringConfigAttribute) configEntry.getConfigAttribute(classStub);
|
if (classAttr == null)
|
{
|
logError(ErrorLogCategory.CONFIGURATION, ErrorLogSeverity.SEVERE_ERROR,
|
MSGID_CONFIG_TRUSTMANAGER_NO_CLASS_ATTR);
|
return;
|
}
|
else
|
{
|
className = classAttr.activeValue();
|
}
|
}
|
catch (Exception e)
|
{
|
assert debugException(CLASS_NAME, "initializeTrustManagerProvider", e);
|
|
logError(ErrorLogCategory.CONFIGURATION, ErrorLogSeverity.SEVERE_ERROR,
|
MSGID_CONFIG_TRUSTMANAGER_CANNOT_DETERMINE_CLASS,
|
stackTraceToSingleLineString(e));
|
return;
|
}
|
|
|
// Try to load the class and instantiate it as a trust manager provider.
|
Class trustManagerProviderClass;
|
try
|
{
|
// FIXME -- Should we use a custom class loader for this?
|
trustManagerProviderClass = Class.forName(className);
|
}
|
catch (Exception e)
|
{
|
assert debugException(CLASS_NAME, "initializeTrustManagerProvider", e);
|
|
logError(ErrorLogCategory.CONFIGURATION, ErrorLogSeverity.SEVERE_ERROR,
|
MSGID_CONFIG_TRUSTMANAGER_CANNOT_LOAD_CLASS,
|
String.valueOf(className), stackTraceToSingleLineString(e));
|
return;
|
}
|
|
TrustManagerProvider trustManagerProvider;
|
try
|
{
|
trustManagerProvider =
|
(TrustManagerProvider) trustManagerProviderClass.newInstance();
|
}
|
catch (Exception e)
|
{
|
assert debugException(CLASS_NAME, "initializeTrustManagerProvider", e);
|
|
logError(ErrorLogCategory.CONFIGURATION, ErrorLogSeverity.SEVERE_ERROR,
|
MSGID_CONFIG_TRUSTMANAGER_CANNOT_INSTANTIATE_CLASS,
|
String.valueOf(className), stackTraceToSingleLineString(e));
|
return;
|
}
|
|
|
// Try to initialize the trust manager provider with the contents of the
|
// configuration entry.
|
try
|
{
|
trustManagerProvider.initializeTrustManagerProvider(configEntry);
|
}
|
catch (Exception e)
|
{
|
assert debugException(CLASS_NAME, "initializeTrustManagerProvider", e);
|
|
logError(ErrorLogCategory.CONFIGURATION, ErrorLogSeverity.SEVERE_ERROR,
|
MSGID_CONFIG_TRUSTMANAGER_CANNOT_INITIALIZE,
|
String.valueOf(className), stackTraceToSingleLineString(e));
|
return;
|
}
|
|
|
// Install the new trust manager provider in the server. We don't need to
|
// do anything to get rid of the previous null provider since it doesn't
|
// consume any resources.
|
DirectoryServer.setTrustManagerProvider(trustManagerProvider);
|
}
|
|
|
|
/**
|
* Indicates whether the configuration entry that will result from a proposed
|
* modification is acceptable to this change listener.
|
*
|
* @param configEntry The configuration entry that will result from
|
* the requested update.
|
* @param unacceptableReason A buffer to which this method can append a
|
* human-readable message explaining why the
|
* proposed change is not acceptable.
|
*
|
* @return <CODE>true</CODE> if the proposed entry contains an acceptable
|
* configuration, or <CODE>false</CODE> if it does not.
|
*/
|
public boolean configChangeIsAcceptable(ConfigEntry configEntry,
|
StringBuilder unacceptableReason)
|
{
|
assert debugEnter(CLASS_NAME, "configChangeIsAcceptable",
|
String.valueOf(configEntry), "java.lang.StringBuilder");
|
|
|
// See if the entry indicates whether the trust manager provider should be
|
// enabled.
|
int msgID = MSGID_CONFIG_TRUSTMANAGER_DESCRIPTION_ENABLED;
|
BooleanConfigAttribute enabledStub =
|
new BooleanConfigAttribute(ATTR_TRUSTMANAGER_ENABLED,
|
getMessage(msgID), false);
|
try
|
{
|
BooleanConfigAttribute enabledAttr =
|
(BooleanConfigAttribute)
|
configEntry.getConfigAttribute(enabledStub);
|
if (enabledAttr == null)
|
{
|
msgID = MSGID_CONFIG_TRUSTMANAGER_NO_ENABLED_ATTR;
|
unacceptableReason.append(getMessage(msgID));
|
return false;
|
}
|
}
|
catch (Exception e)
|
{
|
assert debugException(CLASS_NAME, "configChangeIsAcceptable", e);
|
|
msgID = MSGID_CONFIG_TRUSTMANAGER_UNABLE_TO_DETERMINE_ENABLED_STATE;
|
unacceptableReason.append(getMessage(msgID,
|
stackTraceToSingleLineString(e)));
|
return false;
|
}
|
|
|
// See if it specifies the class name for the trust manager provider
|
// implementation.
|
String className;
|
msgID = MSGID_CONFIG_TRUSTMANAGER_DESCRIPTION_CLASS;
|
StringConfigAttribute classStub =
|
new StringConfigAttribute(ATTR_TRUSTMANAGER_CLASS, getMessage(msgID),
|
true, false, false);
|
try
|
{
|
StringConfigAttribute classAttr =
|
(StringConfigAttribute) configEntry.getConfigAttribute(classStub);
|
if (classAttr == null)
|
{
|
msgID = MSGID_CONFIG_TRUSTMANAGER_NO_CLASS_ATTR;
|
unacceptableReason.append(getMessage(msgID));
|
return false;
|
}
|
else
|
{
|
className = classAttr.activeValue();
|
}
|
}
|
catch (Exception e)
|
{
|
assert debugException(CLASS_NAME, "configChangeIsAcceptable", e);
|
|
msgID = MSGID_CONFIG_TRUSTMANAGER_CANNOT_DETERMINE_CLASS;
|
unacceptableReason.append(getMessage(msgID,
|
stackTraceToSingleLineString(e)));
|
return false;
|
}
|
|
|
// Try to load the class and instantiate it as a trust manager provider.
|
Class trustManagerProviderClass;
|
try
|
{
|
// FIXME -- Should we use a custom class loader for this?
|
trustManagerProviderClass = Class.forName(className);
|
}
|
catch (Exception e)
|
{
|
assert debugException(CLASS_NAME, "configChangeIsAcceptable", e);
|
|
msgID = MSGID_CONFIG_TRUSTMANAGER_CANNOT_LOAD_CLASS;
|
unacceptableReason.append(getMessage(msgID, String.valueOf(className),
|
stackTraceToSingleLineString(e)));
|
return false;
|
}
|
|
try
|
{
|
TrustManagerProvider trustManagerProvider =
|
(TrustManagerProvider) trustManagerProviderClass.newInstance();
|
}
|
catch (Exception e)
|
{
|
assert debugException(CLASS_NAME, "configChangeIsAcceptable", e);
|
|
msgID = MSGID_CONFIG_TRUSTMANAGER_CANNOT_INSTANTIATE_CLASS;
|
unacceptableReason.append(getMessage(msgID, String.valueOf(className),
|
stackTraceToSingleLineString(e)));
|
return false;
|
}
|
|
|
|
// If we've gotten to this point, then it is acceptable as far as we are
|
// concerned. If it is unacceptable according to the configuration, then
|
// the trust manager provider itself will make that determination.
|
return true;
|
}
|
|
|
|
/**
|
* Attempts to apply a new configuration to this Directory Server component
|
* based on the provided changed entry.
|
*
|
* @param configEntry The configuration entry that containing the updated
|
* configuration for this component.
|
*
|
* @return Information about the result of processing the configuration
|
* change.
|
*/
|
public ConfigChangeResult applyConfigurationChange(ConfigEntry configEntry)
|
{
|
assert debugEnter(CLASS_NAME, "applyConfigurationChange",
|
String.valueOf(configEntry));
|
|
ResultCode resultCode = ResultCode.SUCCESS;
|
boolean adminActionRequired = false;
|
ArrayList<String> messages = new ArrayList<String>();
|
|
|
// See if the entry indicates whether the trust manager provider should be
|
// enabled. If not, then make sure that the trust manager is disabled and
|
// return since we don't need to do anything else.
|
boolean needsEnabled = false;
|
String existingProviderClass = null;
|
int msgID = MSGID_CONFIG_TRUSTMANAGER_DESCRIPTION_ENABLED;
|
BooleanConfigAttribute enabledStub =
|
new BooleanConfigAttribute(ATTR_TRUSTMANAGER_ENABLED,
|
getMessage(msgID), false);
|
try
|
{
|
BooleanConfigAttribute enabledAttr =
|
(BooleanConfigAttribute)
|
configEntry.getConfigAttribute(enabledStub);
|
if (enabledAttr == null)
|
{
|
msgID = MSGID_CONFIG_TRUSTMANAGER_NO_ENABLED_ATTR;
|
messages.add(getMessage(msgID));
|
resultCode = ResultCode.OBJECTCLASS_VIOLATION;
|
return new ConfigChangeResult(resultCode, adminActionRequired,
|
messages);
|
}
|
else if (! enabledAttr.pendingValue())
|
{
|
DirectoryServer.getTrustManagerProvider().
|
finalizeTrustManagerProvider();
|
|
// The provider should be disabled, so install the null trust manager
|
// and return.
|
try
|
{
|
NullTrustManagerProvider nullProvider =
|
new NullTrustManagerProvider();
|
nullProvider.initializeTrustManagerProvider(null);
|
DirectoryServer.setTrustManagerProvider(nullProvider);
|
return new ConfigChangeResult(resultCode, adminActionRequired,
|
messages);
|
}
|
catch (Exception e)
|
{
|
assert debugException(CLASS_NAME, "applyConfigurationChange", e);
|
|
msgID = MSGID_CONFIG_TRUSTMANAGER_CANNOT_INSTALL_NULL_PROVIDER;
|
messages.add(getMessage(msgID, stackTraceToSingleLineString(e)));
|
resultCode = DirectoryServer.getServerErrorResultCode();
|
return new ConfigChangeResult(resultCode, adminActionRequired,
|
messages);
|
}
|
}
|
else
|
{
|
// The provider should be enabled. If it isn't, then set a flag to
|
// indicate that we need to create it when we have more information.
|
if (DirectoryServer.getTrustManagerProvider() instanceof
|
NullTrustManagerProvider)
|
{
|
needsEnabled = true;
|
}
|
else
|
{
|
existingProviderClass =
|
DirectoryServer.getTrustManagerProvider().getClass().getName();
|
}
|
}
|
}
|
catch (Exception e)
|
{
|
assert debugException(CLASS_NAME, "applyConfigurationChange", e);
|
|
msgID = MSGID_CONFIG_TRUSTMANAGER_UNABLE_TO_DETERMINE_ENABLED_STATE;
|
messages.add(getMessage(msgID, stackTraceToSingleLineString(e)));
|
resultCode = DirectoryServer.getServerErrorResultCode();
|
return new ConfigChangeResult(resultCode, adminActionRequired, messages);
|
}
|
|
|
// Get the class name from the configuration entry.
|
String className;
|
msgID = MSGID_CONFIG_TRUSTMANAGER_DESCRIPTION_CLASS;
|
StringConfigAttribute classStub =
|
new StringConfigAttribute(ATTR_TRUSTMANAGER_CLASS, getMessage(msgID),
|
true, false, false);
|
try
|
{
|
StringConfigAttribute classAttr =
|
(StringConfigAttribute) configEntry.getConfigAttribute(classStub);
|
if (classAttr == null)
|
{
|
msgID = MSGID_CONFIG_TRUSTMANAGER_NO_CLASS_ATTR;
|
messages.add(getMessage(msgID));
|
resultCode = ResultCode.OBJECTCLASS_VIOLATION;
|
return new ConfigChangeResult(resultCode, adminActionRequired,
|
messages);
|
}
|
else
|
{
|
className = classAttr.activeValue();
|
}
|
}
|
catch (Exception e)
|
{
|
assert debugException(CLASS_NAME, "applyConfigurationChange", e);
|
|
msgID = MSGID_CONFIG_TRUSTMANAGER_CANNOT_DETERMINE_CLASS;
|
messages.add(getMessage(msgID, stackTraceToSingleLineString(e)));
|
resultCode = DirectoryServer.getServerErrorResultCode();
|
return new ConfigChangeResult(resultCode, adminActionRequired, messages);
|
}
|
|
|
// If the trust manager provider is already enabled and the specified class
|
// is different from the class that is currently in use, then we won't try
|
// to do anything. The trust manager provider must be disabled and
|
// re-enabled before the configuration change will be accepted.
|
if (! needsEnabled)
|
{
|
if (! className.equals(existingProviderClass))
|
{
|
msgID = MSGID_CONFIG_TRUSTMANAGER_NOT_SWITCHING_CLASSES;
|
messages.add(getMessage(msgID, String.valueOf(existingProviderClass),
|
String.valueOf(className)));
|
resultCode = ResultCode.UNWILLING_TO_PERFORM;
|
adminActionRequired = true;
|
return new ConfigChangeResult(resultCode, adminActionRequired,
|
messages);
|
}
|
else
|
{
|
// We don't need to do anything because it's already enabled and has the
|
// right class.
|
return new ConfigChangeResult(resultCode, adminActionRequired,
|
messages);
|
}
|
}
|
|
|
// Try to load the class and instantiate it as a trust manager provider.
|
Class trustManagerProviderClass;
|
try
|
{
|
// FIXME -- Should we use a custom class loader for this?
|
trustManagerProviderClass = Class.forName(className);
|
}
|
catch (Exception e)
|
{
|
assert debugException(CLASS_NAME, "applyConfigurationChange", e);
|
|
msgID = MSGID_CONFIG_TRUSTMANAGER_CANNOT_LOAD_CLASS;
|
messages.add(getMessage(msgID, String.valueOf(className),
|
stackTraceToSingleLineString(e)));
|
resultCode = DirectoryServer.getServerErrorResultCode();
|
return new ConfigChangeResult(resultCode, adminActionRequired, messages);
|
}
|
|
TrustManagerProvider trustManagerProvider;
|
try
|
{
|
trustManagerProvider =
|
(TrustManagerProvider) trustManagerProviderClass.newInstance();
|
}
|
catch (Exception e)
|
{
|
assert debugException(CLASS_NAME, "applyConfigurationChange", e);
|
|
msgID = MSGID_CONFIG_TRUSTMANAGER_CANNOT_INSTANTIATE_CLASS;
|
messages.add(getMessage(msgID, String.valueOf(className),
|
stackTraceToSingleLineString(e)));
|
resultCode = DirectoryServer.getServerErrorResultCode();
|
return new ConfigChangeResult(resultCode, adminActionRequired, messages);
|
}
|
|
|
// Try to initialize the trust manager provider with the contents of the
|
// configuration entry.
|
try
|
{
|
trustManagerProvider.initializeTrustManagerProvider(configEntry);
|
}
|
catch (Exception e)
|
{
|
assert debugException(CLASS_NAME, "applyConfigurationChange", e);
|
|
msgID = MSGID_CONFIG_TRUSTMANAGER_CANNOT_INITIALIZE;
|
messages.add(getMessage(msgID, String.valueOf(className),
|
stackTraceToSingleLineString(e)));
|
resultCode = DirectoryServer.getServerErrorResultCode();
|
return new ConfigChangeResult(resultCode, adminActionRequired, messages);
|
}
|
|
|
// Install the new trust manager provider in the server. We don't need to
|
// do anything to get rid of the previous null provider since it doesn't
|
// consume any resources.
|
DirectoryServer.setTrustManagerProvider(trustManagerProvider);
|
|
|
return new ConfigChangeResult(resultCode, adminActionRequired, messages);
|
}
|
|
|
|
/**
|
* Indicates whether the configuration entry that will result from a proposed
|
* add is acceptable to this add listener.
|
*
|
* @param configEntry The configuration entry that will result from
|
* the requested add.
|
* @param unacceptableReason A buffer to which this method can append a
|
* human-readable message explaining why the
|
* proposed entry is not acceptable.
|
*
|
* @return <CODE>true</CODE> if the proposed entry contains an acceptable
|
* configuration, or <CODE>false</CODE> if it does not.
|
*/
|
public boolean configAddIsAcceptable(ConfigEntry configEntry,
|
StringBuilder unacceptableReason)
|
{
|
assert debugEnter(CLASS_NAME, "configAddIsAcceptable",
|
String.valueOf(configEntry), "java.lang.StringBuilder");
|
|
|
// Get the DN of the provided entry and see if it is the DN that we expect
|
// for the trust manager configuration. If it is not, then it's not an
|
// entry that we care about so return true.
|
DN providedEntryDN = configEntry.getDN();
|
DN expectedEntryDN;
|
try
|
{
|
expectedEntryDN = DN.decode(DN_TRUSTMANAGER_PROVIDER_CONFIG);
|
}
|
catch (DirectoryException de)
|
{
|
assert debugException(CLASS_NAME, "configAddIsAcceptable", de);
|
|
unacceptableReason.append(de.getErrorMessage());
|
return false;
|
}
|
|
if (! providedEntryDN.equals(expectedEntryDN))
|
{
|
return true;
|
}
|
|
|
// See if the entry indicates whether the trust manager provider should be
|
// enabled.
|
int msgID = MSGID_CONFIG_TRUSTMANAGER_DESCRIPTION_ENABLED;
|
BooleanConfigAttribute enabledStub =
|
new BooleanConfigAttribute(ATTR_TRUSTMANAGER_ENABLED,
|
getMessage(msgID), false);
|
try
|
{
|
BooleanConfigAttribute enabledAttr =
|
(BooleanConfigAttribute)
|
configEntry.getConfigAttribute(enabledStub);
|
if (enabledAttr == null)
|
{
|
msgID = MSGID_CONFIG_TRUSTMANAGER_NO_ENABLED_ATTR;
|
unacceptableReason.append(getMessage(msgID));
|
return false;
|
}
|
}
|
catch (Exception e)
|
{
|
assert debugException(CLASS_NAME, "configAddIsAcceptable", e);
|
|
msgID = MSGID_CONFIG_TRUSTMANAGER_UNABLE_TO_DETERMINE_ENABLED_STATE;
|
unacceptableReason.append(getMessage(msgID,
|
stackTraceToSingleLineString(e)));
|
return false;
|
}
|
|
|
// See if it specifies the class name for the trust manager provider
|
// implementation.
|
String className;
|
msgID = MSGID_CONFIG_TRUSTMANAGER_DESCRIPTION_CLASS;
|
StringConfigAttribute classStub =
|
new StringConfigAttribute(ATTR_TRUSTMANAGER_CLASS, getMessage(msgID),
|
true, false, false);
|
try
|
{
|
StringConfigAttribute classAttr =
|
(StringConfigAttribute) configEntry.getConfigAttribute(classStub);
|
if (classAttr == null)
|
{
|
msgID = MSGID_CONFIG_TRUSTMANAGER_NO_CLASS_ATTR;
|
unacceptableReason.append(getMessage(msgID));
|
return false;
|
}
|
else
|
{
|
className = classAttr.activeValue();
|
}
|
}
|
catch (Exception e)
|
{
|
assert debugException(CLASS_NAME, "configAddIsAcceptable", e);
|
|
msgID = MSGID_CONFIG_TRUSTMANAGER_CANNOT_DETERMINE_CLASS;
|
unacceptableReason.append(getMessage(msgID,
|
stackTraceToSingleLineString(e)));
|
return false;
|
}
|
|
|
// Try to load the class and instantiate it as a trust manager provider.
|
Class trustManagerProviderClass;
|
try
|
{
|
// FIXME -- Should we use a custom class loader for this?
|
trustManagerProviderClass = Class.forName(className);
|
}
|
catch (Exception e)
|
{
|
assert debugException(CLASS_NAME, "configAddIsAcceptable", e);
|
|
msgID = MSGID_CONFIG_TRUSTMANAGER_CANNOT_LOAD_CLASS;
|
unacceptableReason.append(getMessage(msgID, String.valueOf(className),
|
stackTraceToSingleLineString(e)));
|
return false;
|
}
|
|
try
|
{
|
TrustManagerProvider trustManagerProvider =
|
(TrustManagerProvider) trustManagerProviderClass.newInstance();
|
}
|
catch (Exception e)
|
{
|
assert debugException(CLASS_NAME, "configAddIsAcceptable", e);
|
|
msgID = MSGID_CONFIG_TRUSTMANAGER_CANNOT_INSTANTIATE_CLASS;
|
unacceptableReason.append(getMessage(msgID, String.valueOf(className),
|
stackTraceToSingleLineString(e)));
|
return false;
|
}
|
|
|
// If we've gotten to this point, then it is acceptable as far as we are
|
// concerned. If it is unacceptable according to the configuration, then
|
// the trust manager provider itself will make that determination.
|
return true;
|
}
|
|
|
|
/**
|
* Attempts to apply a new configuration based on the provided added entry.
|
*
|
* @param configEntry The new configuration entry that contains the
|
* configuration to apply.
|
*
|
* @return Information about the result of processing the configuration
|
* change.
|
*/
|
public ConfigChangeResult applyConfigurationAdd(ConfigEntry configEntry)
|
{
|
assert debugEnter(CLASS_NAME, "applyConfigurationAdd",
|
String.valueOf(configEntry));
|
|
ResultCode resultCode = ResultCode.SUCCESS;
|
boolean adminActionRequired = false;
|
ArrayList<String> messages = new ArrayList<String>();
|
|
|
// Get the DN of the provided entry and see if it is the DN that we expect
|
// for the trust manager configuration. If it is not, then it's not an
|
// entry that we care about so return without doing anything.
|
DN providedEntryDN = configEntry.getDN();
|
DN expectedEntryDN;
|
try
|
{
|
expectedEntryDN = DN.decode(DN_TRUSTMANAGER_PROVIDER_CONFIG);
|
}
|
catch (DirectoryException de)
|
{
|
assert debugException(CLASS_NAME, "applyConfigurationAdd", de);
|
|
messages.add(de.getErrorMessage());
|
resultCode = de.getResultCode();
|
return new ConfigChangeResult(resultCode, adminActionRequired, messages);
|
}
|
|
if (! providedEntryDN.equals(expectedEntryDN))
|
{
|
return new ConfigChangeResult(resultCode, adminActionRequired, messages);
|
}
|
|
|
// Register as a change listener of the provided entry so that we will be
|
// notified of changes to it. We will also want to register a delete
|
// listener with its parent to allow us to determine if the entry is
|
// deleted.
|
configEntry.registerChangeListener(this);
|
try
|
{
|
DN parentDN = configEntry.getDN().getParent();
|
ConfigEntry parentEntry = DirectoryServer.getConfigEntry(parentDN);
|
if (parentEntry != null)
|
{
|
parentEntry.registerDeleteListener(this);
|
}
|
}
|
catch (Exception e)
|
{
|
assert debugException(CLASS_NAME, "applyConfigurationAdd", e);
|
|
logError(ErrorLogCategory.CONFIGURATION, ErrorLogSeverity.SEVERE_WARNING,
|
MSGID_CONFIG_TRUSTMANAGER_CANNOT_REGISTER_DELETE_LISTENER,
|
stackTraceToSingleLineString(e));
|
}
|
|
|
// See if the entry indicates whether the trust manager provider should be
|
// enabled.
|
int msgID = MSGID_CONFIG_TRUSTMANAGER_DESCRIPTION_ENABLED;
|
BooleanConfigAttribute enabledStub =
|
new BooleanConfigAttribute(ATTR_TRUSTMANAGER_ENABLED,
|
getMessage(msgID), false);
|
try
|
{
|
BooleanConfigAttribute enabledAttr =
|
(BooleanConfigAttribute)
|
configEntry.getConfigAttribute(enabledStub);
|
if (enabledAttr == null)
|
{
|
// The attribute is not present, so the trust manager provider will be
|
// disabled. Log a warning message and return.
|
messages.add(getMessage(MSGID_CONFIG_TRUSTMANAGER_NO_ENABLED_ATTR));
|
resultCode = ResultCode.OBJECTCLASS_VIOLATION;
|
return new ConfigChangeResult(resultCode, adminActionRequired,
|
messages);
|
}
|
else if (! enabledAttr.activeValue())
|
{
|
// The trust manager provider is explicitly disabled. Log a mild
|
// warning and return.
|
messages.add(getMessage(MSGID_CONFIG_TRUSTMANAGER_DISABLED));
|
return new ConfigChangeResult(resultCode, adminActionRequired,
|
messages);
|
}
|
}
|
catch (Exception e)
|
{
|
assert debugException(CLASS_NAME, "applyConfigurationAdd", e);
|
|
msgID = MSGID_CONFIG_TRUSTMANAGER_UNABLE_TO_DETERMINE_ENABLED_STATE;
|
messages.add(getMessage(msgID, stackTraceToSingleLineString(e)));
|
resultCode = DirectoryServer.getServerErrorResultCode();
|
return new ConfigChangeResult(resultCode, adminActionRequired, messages);
|
}
|
|
|
// See if it specifies the class name for the trust manager provider
|
// implementation.
|
String className;
|
msgID = MSGID_CONFIG_TRUSTMANAGER_DESCRIPTION_CLASS;
|
StringConfigAttribute classStub =
|
new StringConfigAttribute(ATTR_TRUSTMANAGER_CLASS, getMessage(msgID),
|
true, false, false);
|
try
|
{
|
StringConfigAttribute classAttr =
|
(StringConfigAttribute) configEntry.getConfigAttribute(classStub);
|
if (classAttr == null)
|
{
|
messages.add(getMessage(MSGID_CONFIG_TRUSTMANAGER_NO_CLASS_ATTR));
|
resultCode = ResultCode.OBJECTCLASS_VIOLATION;
|
return new ConfigChangeResult(resultCode, adminActionRequired,
|
messages);
|
}
|
else
|
{
|
className = classAttr.activeValue();
|
}
|
}
|
catch (Exception e)
|
{
|
assert debugException(CLASS_NAME, "applyConfigurationAdd", e);
|
|
msgID = MSGID_CONFIG_TRUSTMANAGER_CANNOT_DETERMINE_CLASS;
|
messages.add(getMessage(msgID, stackTraceToSingleLineString(e)));
|
resultCode = DirectoryServer.getServerErrorResultCode();
|
return new ConfigChangeResult(resultCode, adminActionRequired, messages);
|
}
|
|
|
// Try to load the class and instantiate it as a trust manager provider.
|
Class trustManagerProviderClass;
|
try
|
{
|
// FIXME -- Should we use a custom class loader for this?
|
trustManagerProviderClass = Class.forName(className);
|
}
|
catch (Exception e)
|
{
|
assert debugException(CLASS_NAME, "applyConfigurationAdd", e);
|
|
msgID = MSGID_CONFIG_TRUSTMANAGER_CANNOT_LOAD_CLASS;
|
messages.add(getMessage(msgID, String.valueOf(className),
|
stackTraceToSingleLineString(e)));
|
resultCode = DirectoryServer.getServerErrorResultCode();
|
return new ConfigChangeResult(resultCode, adminActionRequired, messages);
|
}
|
|
TrustManagerProvider trustManagerProvider;
|
try
|
{
|
trustManagerProvider =
|
(TrustManagerProvider) trustManagerProviderClass.newInstance();
|
}
|
catch (Exception e)
|
{
|
assert debugException(CLASS_NAME, "applyConfigurationAdd", e);
|
|
msgID = MSGID_CONFIG_TRUSTMANAGER_CANNOT_INSTANTIATE_CLASS;
|
messages.add(getMessage(msgID, String.valueOf(className),
|
stackTraceToSingleLineString(e)));
|
resultCode = DirectoryServer.getServerErrorResultCode();
|
return new ConfigChangeResult(resultCode, adminActionRequired, messages);
|
}
|
|
|
// Try to initialize the trust manager provider with the contents of the
|
// configuration entry.
|
try
|
{
|
trustManagerProvider.initializeTrustManagerProvider(configEntry);
|
}
|
catch (Exception e)
|
{
|
assert debugException(CLASS_NAME, "applyConfigurationAdd", e);
|
|
msgID = MSGID_CONFIG_TRUSTMANAGER_CANNOT_INITIALIZE;
|
messages.add(getMessage(msgID, String.valueOf(className),
|
stackTraceToSingleLineString(e)));
|
resultCode = DirectoryServer.getServerErrorResultCode();
|
return new ConfigChangeResult(resultCode, adminActionRequired, messages);
|
}
|
|
|
// Install the new trust manager provider in the server. We don't need to
|
// do anything to get rid of the previous null provider since it doesn't
|
// consume any resources.
|
DirectoryServer.setTrustManagerProvider(trustManagerProvider);
|
|
|
return new ConfigChangeResult(resultCode, adminActionRequired, messages);
|
}
|
|
|
|
/**
|
* Indicates whether it is acceptable to remove the provided configuration
|
* entry.
|
*
|
* @param configEntry The configuration entry that will be removed
|
* from the configuration.
|
* @param unacceptableReason A buffer to which this method can append a
|
* human-readable message explaining why the
|
* proposed delete is not acceptable.
|
*
|
* @return <CODE>true</CODE> if the proposed entry may be removed from the
|
* configuration, or <CODE>false</CODE> if not.
|
*/
|
public boolean configDeleteIsAcceptable(ConfigEntry configEntry,
|
StringBuilder unacceptableReason)
|
{
|
assert debugEnter(CLASS_NAME, "configDeleteIsAcceptable",
|
String.valueOf(configEntry), "java.lang.StringBuilder");
|
|
|
// Get the DN of the provided entry and see if it is the DN that we expect
|
// for the trust manager configuration. If it is not, then it's not an
|
// entry that we care about so return true.
|
DN providedEntryDN = configEntry.getDN();
|
DN expectedEntryDN;
|
try
|
{
|
expectedEntryDN = DN.decode(DN_TRUSTMANAGER_PROVIDER_CONFIG);
|
}
|
catch (DirectoryException de)
|
{
|
assert debugException(CLASS_NAME, "configAddIsAcceptable", de);
|
|
unacceptableReason.append(de.getErrorMessage());
|
return false;
|
}
|
|
if (! providedEntryDN.equals(expectedEntryDN))
|
{
|
return true;
|
}
|
|
|
// Determine whether there is a valid trust manager provider installed
|
// (i.e., not the null provider). If a valid provider is installed, then we
|
// will not allow the entry to be removed.
|
TrustManagerProvider installedProvider =
|
DirectoryServer.getTrustManagerProvider();
|
if (! (installedProvider instanceof NullTrustManagerProvider))
|
{
|
int msgID = MSGID_CONFIG_TRUSTMANAGER_CANNOT_REMOVE_ACTIVE_PROVIDER;
|
unacceptableReason.append(getMessage(msgID,
|
installedProvider.getClass().getName()));
|
return false;
|
}
|
|
|
// If we've gotten to this point, then it is acceptable as far as we are
|
// concerned. If it is unacceptable according to the configuration, then
|
// the trust manager provider itself will make that determination.
|
return true;
|
}
|
|
|
|
/**
|
* Attempts to apply a new configuration based on the provided deleted entry.
|
*
|
* @param configEntry The new configuration entry that has been deleted.
|
*
|
* @return Information about the result of processing the configuration
|
* change.
|
*/
|
public ConfigChangeResult applyConfigurationDelete(ConfigEntry configEntry)
|
{
|
assert debugEnter(CLASS_NAME, "applyConfigurationDelete",
|
String.valueOf(configEntry));
|
|
ResultCode resultCode = ResultCode.SUCCESS;
|
boolean adminActionRequired = false;
|
ArrayList<String> messages = new ArrayList<String>();
|
|
|
// Since we can never delete an active configuration, there is nothing that
|
// we need to do if a delete does go through.
|
return new ConfigChangeResult(resultCode, adminActionRequired, messages);
|
}
|
}
|