use of org.apache.directory.ldap.client.api.future.HandshakeFuture in project directory-ldap-api by apache.
the class LdapNetworkConnection method messageReceived.
/**
* Handle the incoming LDAP messages. This is where we feed the cursor for search
* requests, or call the listener.
*
* @param session The session that received a message
* @param message The received message
* @throws Exception If there is some error while processing the message
*/
@Override
public void messageReceived(IoSession session, Object message) throws Exception {
// Feed the response and store it into the session
if (message instanceof SslFilter.SslFilterMessage) {
// This is a SSL message telling if the session has been secured or not
HandshakeFuture handshakeFuture = (HandshakeFuture) ldapSession.getAttribute("HANDSHAKE_FUTURE");
if (message == SslFilter.SESSION_SECURED) {
// SECURED
handshakeFuture.secured();
} else {
// UNSECURED
handshakeFuture.cancel();
}
ldapSession.removeAttribute("HANDSHAKE_FUTURE");
return;
}
Message response = (Message) message;
if (LOG.isDebugEnabled()) {
LOG.debug(I18n.msg(I18n.MSG_03243_MESSAGE_RECEIVED, response));
}
int messageId = response.getMessageId();
// this check is necessary to prevent adding an abandoned operation's
// result(s) to corresponding queue
ResponseFuture<? extends Response> responseFuture = peekFromFutureMap(messageId);
boolean isNoD = isNoticeOfDisconnect(response);
if ((responseFuture == null) && !isNoD) {
LOG.info("There is no future associated with the messageId {}, ignoring the message", messageId);
return;
}
if (isNoD) {
// close the session
session.closeNow();
return;
}
switch(response.getType()) {
case ADD_RESPONSE:
// Transform the response
AddResponse addResponse = (AddResponse) response;
AddFuture addFuture = (AddFuture) responseFuture;
// remove the listener from the listener map
if (LOG.isDebugEnabled()) {
if (addResponse.getLdapResult().getResultCode() == ResultCodeEnum.SUCCESS) {
// Everything is fine, return the response
LOG.debug(I18n.msg(I18n.MSG_03209_ADD_SUCCESSFUL, addResponse));
} else {
// We have had an error
LOG.debug(I18n.msg(I18n.MSG_03208_ADD_FAILED, addResponse));
}
}
// Store the response into the future
addFuture.set(addResponse);
// Remove the future from the map
removeFromFutureMaps(messageId);
break;
case BIND_RESPONSE:
// Transform the response
BindResponse bindResponse = (BindResponse) response;
BindFuture bindFuture = (BindFuture) responseFuture;
// remove the listener from the listener map
if (bindResponse.getLdapResult().getResultCode() == ResultCodeEnum.SUCCESS) {
authenticated.set(true);
// Everything is fine, return the response
if (LOG.isDebugEnabled()) {
LOG.debug(I18n.msg(I18n.MSG_03202_BIND_SUCCESSFUL, bindResponse));
}
} else {
// We have had an error
if (LOG.isDebugEnabled()) {
LOG.debug(I18n.msg(I18n.MSG_03201_BIND_FAIL, bindResponse));
}
}
// Store the response into the future
bindFuture.set(bindResponse);
// Remove the future from the map
removeFromFutureMaps(messageId);
break;
case COMPARE_RESPONSE:
// Transform the response
CompareResponse compareResponse = (CompareResponse) response;
CompareFuture compareFuture = (CompareFuture) responseFuture;
// remove the listener from the listener map
if (LOG.isDebugEnabled()) {
if (compareResponse.getLdapResult().getResultCode() == ResultCodeEnum.SUCCESS) {
// Everything is fine, return the response
LOG.debug(I18n.msg(I18n.MSG_03215_COMPARE_SUCCESSFUL, compareResponse));
} else {
// We have had an error
LOG.debug(I18n.msg(I18n.MSG_03214_COMPARE_FAILED, compareResponse));
}
}
// Store the response into the future
compareFuture.set(compareResponse);
// Remove the future from the map
removeFromFutureMaps(messageId);
break;
case DEL_RESPONSE:
// Transform the response
DeleteResponse deleteResponse = (DeleteResponse) response;
DeleteFuture deleteFuture = (DeleteFuture) responseFuture;
if (LOG.isDebugEnabled()) {
if (deleteResponse.getLdapResult().getResultCode() == ResultCodeEnum.SUCCESS) {
// Everything is fine, return the response
LOG.debug(I18n.msg(I18n.MSG_03217_DELETE_SUCCESSFUL, deleteResponse));
} else {
// We have had an error
LOG.debug(I18n.msg(I18n.MSG_03216_DELETE_FAILED, deleteResponse));
}
}
// Store the response into the future
deleteFuture.set(deleteResponse);
// Remove the future from the map
removeFromFutureMaps(messageId);
break;
case EXTENDED_RESPONSE:
// Transform the response
ExtendedResponse extendedResponse = (ExtendedResponse) response;
ExtendedFuture extendedFuture = (ExtendedFuture) responseFuture;
// remove the listener from the listener map
if (LOG.isDebugEnabled()) {
if (extendedResponse.getLdapResult().getResultCode() == ResultCodeEnum.SUCCESS) {
// Everything is fine, return the response
LOG.debug(I18n.msg(I18n.MSG_03219_EXTENDED_SUCCESSFUL, extendedResponse));
} else {
// We have had an error
LOG.debug(I18n.msg(I18n.MSG_03218_EXTENDED_FAILED, extendedResponse));
}
}
// Store the response into the future
extendedFuture.set(extendedResponse);
// Remove the future from the map
removeFromFutureMaps(messageId);
break;
case INTERMEDIATE_RESPONSE:
IntermediateResponse intermediateResponse;
if (responseFuture instanceof SearchFuture) {
intermediateResponse = new IntermediateResponseImpl(messageId);
addControls(intermediateResponse, response);
((SearchFuture) responseFuture).set(intermediateResponse);
} else if (responseFuture instanceof ExtendedFuture) {
intermediateResponse = new IntermediateResponseImpl(messageId);
addControls(intermediateResponse, response);
((ExtendedFuture) responseFuture).set(intermediateResponse);
} else {
// currently we only support IR for search and extended operations
throw new UnsupportedOperationException("Unknown ResponseFuture type " + responseFuture.getClass().getName());
}
intermediateResponse.setResponseName(((IntermediateResponse) response).getResponseName());
intermediateResponse.setResponseValue(((IntermediateResponse) response).getResponseValue());
break;
case MODIFY_RESPONSE:
// Transform the response
ModifyResponse modifyResponse = (ModifyResponse) response;
ModifyFuture modifyFuture = (ModifyFuture) responseFuture;
if (LOG.isDebugEnabled()) {
if (modifyResponse.getLdapResult().getResultCode() == ResultCodeEnum.SUCCESS) {
// Everything is fine, return the response
if (LOG.isDebugEnabled()) {
LOG.debug(I18n.msg(I18n.MSG_03224_MODIFY_SUCCESSFUL, modifyResponse));
}
} else {
// We have had an error
if (LOG.isDebugEnabled()) {
LOG.debug(I18n.msg(I18n.MSG_03223_MODIFY_FAILED, modifyResponse));
}
}
}
// Store the response into the future
modifyFuture.set(modifyResponse);
// Remove the future from the map
removeFromFutureMaps(messageId);
break;
case MODIFYDN_RESPONSE:
// Transform the response
ModifyDnResponse modifyDnResponse = (ModifyDnResponse) response;
ModifyDnFuture modifyDnFuture = (ModifyDnFuture) responseFuture;
if (LOG.isDebugEnabled()) {
if (modifyDnResponse.getLdapResult().getResultCode() == ResultCodeEnum.SUCCESS) {
// Everything is fine, return the response
LOG.debug(I18n.msg(I18n.MSG_03226_MODIFYDN_SUCCESSFUL, modifyDnResponse));
} else {
// We have had an error
LOG.debug(I18n.msg(I18n.MSG_03225_MODIFYDN_FAILED, modifyDnResponse));
}
}
// Store the response into the future
modifyDnFuture.set(modifyDnResponse);
// Remove the future from the map
removeFromFutureMaps(messageId);
break;
case SEARCH_RESULT_DONE:
// Store the response into the responseQueue
SearchResultDone searchResultDone = (SearchResultDone) response;
SearchFuture searchFuture = (SearchFuture) responseFuture;
if (LOG.isDebugEnabled()) {
if (searchResultDone.getLdapResult().getResultCode() == ResultCodeEnum.SUCCESS) {
// Everything is fine, return the response
LOG.debug(I18n.msg(I18n.MSG_03232_SEARCH_SUCCESSFUL, searchResultDone));
} else {
// We have had an error
LOG.debug(I18n.msg(I18n.MSG_03230_SEARCH_FAILED, searchResultDone));
}
}
// Store the response into the future
searchFuture.set(searchResultDone);
// Remove the future from the map
removeFromFutureMaps(messageId);
break;
case SEARCH_RESULT_ENTRY:
// Store the response into the responseQueue
SearchResultEntry searchResultEntry = (SearchResultEntry) response;
if (schemaManager != null) {
searchResultEntry.setEntry(new DefaultEntry(schemaManager, searchResultEntry.getEntry()));
}
searchFuture = (SearchFuture) responseFuture;
if (LOG.isDebugEnabled()) {
LOG.debug(I18n.msg(I18n.MSG_03229_SEARCH_ENTRY_FOUND, searchResultEntry));
}
// Store the response into the future
searchFuture.set(searchResultEntry);
break;
case SEARCH_RESULT_REFERENCE:
// Store the response into the responseQueue
SearchResultReference searchResultReference = (SearchResultReference) response;
searchFuture = (SearchFuture) responseFuture;
if (LOG.isDebugEnabled()) {
LOG.debug(I18n.msg(I18n.MSG_03231_SEARCH_REFERENCE_FOUND, searchResultReference));
}
// Store the response into the future
searchFuture.set(searchResultReference);
break;
default:
throw new IllegalStateException("Unexpected response type " + response.getType());
}
}
use of org.apache.directory.ldap.client.api.future.HandshakeFuture in project directory-ldap-api by apache.
the class LdapNetworkConnection method addSslFilter.
/**
* adds {@link SslFilter} to the IOConnector or IOSession's filter chain
*/
private void addSslFilter() throws LdapException {
try {
SSLContext sslContext = SSLContext.getInstance(config.getSslProtocol());
TrustManager[] trustManagers = config.getTrustManagers();
if ((trustManagers == null) || (trustManagers.length == 0)) {
trustManagers = new TrustManager[] { new NoVerificationTrustManager() };
}
sslContext.init(config.getKeyManagers(), trustManagers, config.getSecureRandom());
SslFilter sslFilter = new SslFilter(sslContext);
sslFilter.setUseClientMode(true);
// Configure the enabled cipher lists
String[] enabledCipherSuite = config.getEnabledCipherSuites();
if ((enabledCipherSuite != null) && (enabledCipherSuite.length != 0)) {
sslFilter.setEnabledCipherSuites(enabledCipherSuite);
}
// Be sure we disable SSLV3
String[] enabledProtocols = config.getEnabledProtocols();
if ((enabledProtocols != null) && (enabledProtocols.length != 0)) {
sslFilter.setEnabledProtocols(enabledProtocols);
} else {
// Default to TLS
sslFilter.setEnabledProtocols(new String[] { "TLSv1", "TLSv1.1", "TLSv1.2" });
}
// for LDAPS
if (ldapSession == null) {
connector.getFilterChain().addFirst(SSL_FILTER_KEY, sslFilter);
} else // for StartTLS
{
HandshakeFuture handshakeFuture = new HandshakeFuture();
ldapSession.setAttribute(SslFilter.USE_NOTIFICATION, Boolean.TRUE);
ldapSession.setAttribute("HANDSHAKE_FUTURE", handshakeFuture);
ldapSession.getFilterChain().addFirst(SSL_FILTER_KEY, sslFilter);
boolean isSecured = handshakeFuture.get(timeout, TimeUnit.MILLISECONDS);
if (!isSecured) {
throw new LdapOperationException(ResultCodeEnum.OTHER, I18n.err(I18n.ERR_4100_TLS_HANDSHAKE_ERROR));
}
}
} catch (Exception e) {
String msg = "Failed to initialize the SSL context";
LOG.error(msg, e);
throw new LdapException(msg, e);
}
}
Aggregations