/*
|
* CDDL HEADER START
|
*
|
* The contents of this file are subject to the terms of the
|
* Common Development and Distribution License, Version 1.0 only
|
* (the "License"). You may not use this file except in compliance
|
* with the License.
|
*
|
* You can obtain a copy of the license at
|
* trunk/opends/resource/legal-notices/OpenDS.LICENSE
|
* or https://OpenDS.dev.java.net/OpenDS.LICENSE.
|
* See the License for the specific language governing permissions
|
* and limitations under the License.
|
*
|
* When distributing Covered Code, include this CDDL HEADER in each
|
* file and include the License file at
|
* trunk/opends/resource/legal-notices/OpenDS.LICENSE. If applicable,
|
* add the following below this CDDL HEADER, with the fields enclosed
|
* by brackets "[]" replaced with your own identifying information:
|
* Portions Copyright [yyyy] [name of copyright owner]
|
*
|
* CDDL HEADER END
|
*
|
*
|
* Copyright 2009 Sun Microsystems, Inc.
|
*/
|
|
package com.sun.opends.sdk.ldap;
|
|
|
|
import java.io.IOException;
|
import java.net.InetSocketAddress;
|
import java.util.HashMap;
|
import java.util.Map;
|
import java.util.concurrent.ExecutionException;
|
import java.util.concurrent.ExecutorService;
|
|
import javax.net.ssl.SSLContext;
|
|
import org.opends.sdk.*;
|
import org.opends.sdk.controls.*;
|
import org.opends.sdk.extensions.StartTLSRequest;
|
import org.opends.sdk.ldap.LDAPConnectionOptions;
|
import org.opends.sdk.responses.Responses;
|
import org.opends.sdk.responses.Result;
|
|
import com.sun.grizzly.CompletionHandler;
|
import com.sun.grizzly.Connection;
|
import com.sun.grizzly.TransportFactory;
|
import com.sun.grizzly.attributes.Attribute;
|
import com.sun.grizzly.filterchain.PatternFilterChainFactory;
|
import com.sun.grizzly.nio.transport.TCPNIOTransport;
|
import com.sun.grizzly.ssl.BlockingSSLHandshaker;
|
import com.sun.grizzly.ssl.SSLEngineConfigurator;
|
import com.sun.grizzly.ssl.SSLFilter;
|
import com.sun.grizzly.ssl.SSLHandshaker;
|
import com.sun.grizzly.streams.StreamWriter;
|
import com.sun.opends.sdk.util.CompletedFutureResult;
|
import com.sun.opends.sdk.util.FutureResultTransformer;
|
import com.sun.opends.sdk.util.RecursiveFutureResult;
|
import com.sun.opends.sdk.util.Validator;
|
|
|
|
/**
|
* LDAP connection factory implementation.
|
*/
|
public final class LDAPConnectionFactoryImpl extends
|
AbstractConnectionFactory<AsynchronousConnection> implements
|
ConnectionFactory<AsynchronousConnection>
|
{
|
private final class LDAPTransport extends AbstractLDAPTransport
|
{
|
|
@Override
|
protected LDAPMessageHandler getMessageHandler(
|
Connection<?> connection)
|
{
|
return ldapConnectionAttr.get(connection).getLDAPMessageHandler();
|
}
|
|
|
|
@Override
|
protected void removeMessageHandler(Connection<?> connection)
|
{
|
ldapConnectionAttr.remove(connection);
|
}
|
|
}
|
|
|
|
private final class FutureResultImpl implements
|
CompletionHandler<Connection>
|
{
|
private final FutureResultTransformer<Result, AsynchronousConnection> futureStartTLSResult;
|
|
private final RecursiveFutureResult<LDAPConnection, Result> futureConnectionResult;
|
|
private LDAPConnection connection;
|
|
|
|
private FutureResultImpl(
|
ResultHandler<? super AsynchronousConnection> handler)
|
{
|
this.futureStartTLSResult = new FutureResultTransformer<Result, AsynchronousConnection>(
|
handler)
|
{
|
|
protected ErrorResultException transformErrorResult(
|
ErrorResultException errorResult)
|
{
|
// Ensure that the connection is closed.
|
try
|
{
|
connection.close();
|
}
|
catch (Exception e)
|
{
|
// Ignore.
|
}
|
return errorResult;
|
}
|
|
|
|
protected LDAPConnection transformResult(Result result)
|
throws ErrorResultException
|
{
|
return connection;
|
}
|
|
};
|
|
this.futureConnectionResult = new RecursiveFutureResult<LDAPConnection, Result>(
|
futureStartTLSResult)
|
{
|
|
protected FutureResult<? extends Result> chainResult(
|
LDAPConnection innerResult,
|
ResultHandler<? super Result> handler)
|
throws ErrorResultException
|
{
|
connection = innerResult;
|
|
if (options.getSSLContext() != null && options.useStartTLS())
|
{
|
StartTLSRequest startTLS = new StartTLSRequest(options
|
.getSSLContext());
|
return connection.extendedRequest(startTLS, handler);
|
}
|
|
if (options.getSSLContext() != null)
|
{
|
try
|
{
|
connection.installFilter(sslFilter);
|
connection.performSSLHandshake(sslHandshaker,
|
sslEngineConfigurator);
|
}
|
catch (ErrorResultException errorResult)
|
{
|
try
|
{
|
connection.close();
|
connection = null;
|
}
|
catch (Exception ignored)
|
{
|
}
|
throw errorResult;
|
}
|
}
|
|
handler.handleResult(null);
|
return new CompletedFutureResult<Result>((Result) null);
|
}
|
|
};
|
|
futureStartTLSResult.setFutureResult(futureConnectionResult);
|
}
|
|
|
|
/**
|
* {@inheritDoc}
|
*/
|
public void cancelled(Connection connection)
|
{
|
// Ignore this.
|
}
|
|
|
|
/**
|
* {@inheritDoc}
|
*/
|
public void completed(Connection connection, Connection result)
|
{
|
futureConnectionResult.handleResult(adaptConnection(connection));
|
}
|
|
|
|
/**
|
* {@inheritDoc}
|
*/
|
public void failed(Connection connection, Throwable throwable)
|
{
|
futureConnectionResult
|
.handleErrorResult(adaptConnectionException(throwable));
|
}
|
|
|
|
/**
|
* {@inheritDoc}
|
*/
|
public void updated(Connection connection, Connection result)
|
{
|
// Ignore this.
|
}
|
|
}
|
|
|
|
private static final String LDAP_CONNECTION_OBJECT_ATTR = "LDAPConnAtr";
|
|
private static TCPNIOTransport TCP_NIO_TRANSPORT = null;
|
|
|
|
// FIXME: Need to figure out how this can be configured without
|
// exposing internal implementation details to application.
|
private static synchronized TCPNIOTransport getTCPNIOTransport()
|
{
|
if (TCP_NIO_TRANSPORT == null)
|
{
|
// Create a default transport using the Grizzly framework.
|
TCP_NIO_TRANSPORT = TransportFactory.getInstance()
|
.createTCPTransport();
|
try
|
{
|
TCP_NIO_TRANSPORT.start();
|
}
|
catch (IOException e)
|
{
|
throw new RuntimeException(
|
"Unable to create default connection factory provider", e);
|
}
|
|
Runtime.getRuntime().addShutdownHook(new Thread()
|
{
|
|
@Override
|
public void run()
|
{
|
ShutdownTCPNIOTransport();
|
}
|
|
});
|
}
|
return TCP_NIO_TRANSPORT;
|
}
|
|
|
|
private synchronized static void ShutdownTCPNIOTransport()
|
{
|
if (TCP_NIO_TRANSPORT != null)
|
{
|
try
|
{
|
TCP_NIO_TRANSPORT.stop();
|
}
|
catch (Exception e)
|
{
|
// Ignore.
|
}
|
|
// try
|
// {
|
// TCP_NIO_TRANSPORT.getWorkerThreadPool().shutdown();
|
// }
|
// catch (Exception e)
|
// {
|
// // Ignore.
|
// }
|
|
TCP_NIO_TRANSPORT = null;
|
}
|
}
|
|
|
|
private final Attribute<LDAPConnection> ldapConnectionAttr;
|
|
private final InetSocketAddress socketAddress;
|
|
private final TCPNIOTransport transport;
|
|
private final SSLHandshaker sslHandshaker = new BlockingSSLHandshaker();
|
|
private final SSLEngineConfigurator sslEngineConfigurator;
|
|
private final SSLFilter sslFilter;
|
|
private final Map<String, ControlDecoder<?>> knownControls;
|
|
private final LDAPTransport ldapTransport = new LDAPTransport();
|
|
private final LDAPConnectionOptions options;
|
|
|
|
/**
|
* Creates a new LDAP connection factory implementation which can be
|
* used to create connections to the Directory Server at the provided
|
* host and port address using provided connection options.
|
*
|
* @param host
|
* The host name.
|
* @param port
|
* The port number.
|
* @param options
|
* The LDAP connection options to use when creating
|
* connections.
|
* @throws NullPointerException
|
* If {@code host} or {@code options} was {@code null}.
|
*/
|
public LDAPConnectionFactoryImpl(String host, int port,
|
LDAPConnectionOptions options) throws NullPointerException
|
{
|
this(host, port, options, getTCPNIOTransport());
|
}
|
|
|
|
private LDAPConnectionFactoryImpl(String host, int port,
|
LDAPConnectionOptions options, TCPNIOTransport transport)
|
{
|
Validator.ensureNotNull(host, transport, options);
|
|
this.transport = transport;
|
this.ldapConnectionAttr = transport.getAttributeBuilder()
|
.createAttribute(LDAP_CONNECTION_OBJECT_ATTR);
|
this.socketAddress = new InetSocketAddress(host, port);
|
this.options = LDAPConnectionOptions.copyOf(options);
|
if (this.options.getSSLContext() == null)
|
{
|
this.sslEngineConfigurator = null;
|
this.sslFilter = null;
|
}
|
else
|
{
|
this.sslEngineConfigurator = new SSLEngineConfigurator(
|
this.options.getSSLContext(), true, false, false);
|
this.sslFilter = new SSLFilter(sslEngineConfigurator,
|
sslHandshaker);
|
}
|
this.knownControls = new HashMap<String, ControlDecoder<?>>();
|
initControls();
|
}
|
|
|
|
/**
|
* {@inheritDoc}
|
*/
|
public FutureResult<AsynchronousConnection> getAsynchronousConnection(
|
ResultHandler<? super AsynchronousConnection> handler)
|
{
|
FutureResultImpl future = new FutureResultImpl(handler);
|
|
try
|
{
|
future.futureConnectionResult.setFutureResult(transport.connect(
|
socketAddress, future));
|
return future.futureStartTLSResult;
|
}
|
catch (IOException e)
|
{
|
ErrorResultException result = adaptConnectionException(e);
|
return new CompletedFutureResult<AsynchronousConnection>(result);
|
}
|
}
|
|
|
|
ExecutorService getHandlerInvokers()
|
{
|
// TODO: Threading strategies?
|
return null;
|
}
|
|
|
|
SSLHandshaker getSslHandshaker()
|
{
|
return sslHandshaker;
|
}
|
|
|
|
SSLFilter getSSlFilter()
|
{
|
return sslFilter;
|
}
|
|
|
|
SSLContext getSSLContext()
|
{
|
return options.getSSLContext();
|
}
|
|
|
|
SSLEngineConfigurator getSSlEngineConfigurator()
|
{
|
return sslEngineConfigurator;
|
}
|
|
|
|
ASN1StreamWriter getASN1Writer(StreamWriter streamWriter)
|
{
|
return ldapTransport.getASN1Writer(streamWriter);
|
}
|
|
|
|
void releaseASN1Writer(ASN1StreamWriter asn1Writer)
|
{
|
ldapTransport.releaseASN1Writer(asn1Writer);
|
}
|
|
|
|
PatternFilterChainFactory getDefaultFilterChainFactory()
|
{
|
return ldapTransport.getDefaultFilterChainFactory();
|
}
|
|
|
|
private LDAPConnection adaptConnection(Connection<?> connection)
|
{
|
// Test shows that its much faster with non block writes but risk
|
// running out of memory if the server is slow.
|
connection.configureBlocking(true);
|
connection.getStreamReader().setBlocking(true);
|
connection.getStreamWriter().setBlocking(true);
|
connection.setProcessor(ldapTransport
|
.getDefaultFilterChainFactory().getFilterChainPattern());
|
|
LDAPConnection ldapConnection = new LDAPConnection(connection,
|
socketAddress, options.getSchema(), this);
|
ldapConnectionAttr.set(connection, ldapConnection);
|
return ldapConnection;
|
}
|
|
|
|
private ErrorResultException adaptConnectionException(Throwable t)
|
{
|
if (t instanceof ExecutionException)
|
{
|
t = t.getCause();
|
}
|
|
Result result = Responses.newResult(
|
ResultCode.CLIENT_SIDE_CONNECT_ERROR).setCause(t)
|
.setDiagnosticMessage(t.getMessage());
|
return ErrorResultException.wrap(result);
|
}
|
|
|
|
ControlDecoder<?> getControlDecoder(String oid)
|
{
|
return knownControls.get(oid);
|
}
|
|
|
|
private void initControls()
|
{
|
knownControls.put(
|
AccountUsabilityControl.OID_ACCOUNT_USABLE_CONTROL,
|
AccountUsabilityControl.RESPONSE_DECODER);
|
knownControls.put(
|
AuthorizationIdentityControl.OID_AUTHZID_RESPONSE,
|
AuthorizationIdentityControl.RESPONSE_DECODER);
|
knownControls.put(
|
EntryChangeNotificationControl.OID_ENTRY_CHANGE_NOTIFICATION,
|
EntryChangeNotificationControl.DECODER);
|
knownControls.put(PagedResultsControl.OID_PAGED_RESULTS_CONTROL,
|
PagedResultsControl.DECODER);
|
knownControls.put(PasswordExpiredControl.OID_NS_PASSWORD_EXPIRED,
|
PasswordExpiredControl.DECODER);
|
knownControls.put(PasswordExpiringControl.OID_NS_PASSWORD_EXPIRING,
|
PasswordExpiringControl.DECODER);
|
knownControls.put(
|
PasswordPolicyControl.OID_PASSWORD_POLICY_CONTROL,
|
PasswordPolicyControl.RESPONSE_DECODER);
|
knownControls.put(PostReadControl.OID_LDAP_READENTRY_POSTREAD,
|
PostReadControl.RESPONSE_DECODER);
|
knownControls.put(PreReadControl.OID_LDAP_READENTRY_PREREAD,
|
PreReadControl.RESPONSE_DECODER);
|
knownControls.put(
|
ServerSideSortControl.OID_SERVER_SIDE_SORT_RESPONSE_CONTROL,
|
ServerSideSortControl.RESPONSE_DECODER);
|
knownControls.put(VLVControl.OID_VLV_RESPONSE_CONTROL,
|
VLVControl.RESPONSE_DECODER);
|
}
|
}
|