/*
* CDDL HEADER START
*
* The contents of this file are subject to the terms of the
* Common Development and Distribution License, Version 1.0 only
* (the "License"). You may not use this file except in compliance
* with the License.
*
* You can obtain a copy of the license at
* trunk/opends/resource/legal-notices/OpenDS.LICENSE
* or https://OpenDS.dev.java.net/OpenDS.LICENSE.
* See the License for the specific language governing permissions
* and limitations under the License.
*
* When distributing Covered Code, include this CDDL HEADER in each
* file and include the License file at
* trunk/opends/resource/legal-notices/OpenDS.LICENSE. If applicable,
* add the following below this CDDL HEADER, with the fields enclosed
* by brackets "[]" replaced with your own identifying information:
* Portions Copyright [yyyy] [name of copyright owner]
*
* CDDL HEADER END
*
*
* Copyright 2006-2008 Sun Microsystems, Inc.
*/
package org.opends.server.core;
import org.opends.messages.Message;
import java.lang.reflect.Method;
import java.util.ArrayList;
import java.util.Iterator;
import java.util.List;
import java.util.concurrent.ConcurrentHashMap;
import org.opends.server.admin.ClassPropertyDefinition;
import org.opends.server.admin.server.ConfigurationAddListener;
import org.opends.server.admin.server.ConfigurationChangeListener;
import org.opends.server.admin.server.ConfigurationDeleteListener;
import org.opends.server.admin.std.meta.TrustManagerProviderCfgDefn;
import org.opends.server.admin.std.server.TrustManagerProviderCfg;
import org.opends.server.admin.std.server.RootCfg;
import org.opends.server.admin.server.ServerManagementContext;
import org.opends.server.api.TrustManagerProvider;
import org.opends.server.config.ConfigException;
import org.opends.server.types.ConfigChangeResult;
import org.opends.server.types.DN;
import org.opends.server.types.InitializationException;
import org.opends.server.types.ResultCode;
import static org.opends.messages.ConfigMessages.*;
import static org.opends.server.util.StaticUtils.*;
import org.opends.server.loggers.ErrorLogger;
/**
* This class defines a utility that will be used to manage the set of trust
* manager providers defined in the Directory Server. It will initialize the
* trust manager providers when the server starts, and then will manage any
* additions, removals, or modifications to any trust manager providers while
* the server is running.
*/
public class TrustManagerProviderConfigManager
implements ConfigurationChangeListener<TrustManagerProviderCfg>,
ConfigurationAddListener<TrustManagerProviderCfg>,
ConfigurationDeleteListener<TrustManagerProviderCfg>
{
// A mapping between the DNs of the config entries and the associated trust
// manager providers.
private ConcurrentHashMap<DN,TrustManagerProvider> providers;
/**
* Creates a new instance of this trust manager provider config manager.
*/
public TrustManagerProviderConfigManager()
{
providers = new ConcurrentHashMap<DN,TrustManagerProvider>();
}
/**
* Initializes all trust manager providers currently defined in the Directory
* Server configuration. This should only be called at Directory Server
* startup.
*
* @throws ConfigException If a configuration problem causes the trust
* manager provider initialization process to fail.
*
* @throws InitializationException If a problem occurs while initializing
* the trust manager providers that is not
* related to the server configuration.
*/
public void initializeTrustManagerProviders()
throws ConfigException, InitializationException
{
// Get the root configuration object.
ServerManagementContext managementContext =
ServerManagementContext.getInstance();
RootCfg rootConfiguration =
managementContext.getRootConfiguration();
// Register as an add and delete listener with the root configuration so we
// can be notified if any trust manager provider entries are added or
// removed.
rootConfiguration.addTrustManagerProviderAddListener(this);
rootConfiguration.addTrustManagerProviderDeleteListener(this);
//Initialize the existing trust manager providers.
for (String name : rootConfiguration.listTrustManagerProviders())
{
TrustManagerProviderCfg providerConfig =
rootConfiguration.getTrustManagerProvider(name);
providerConfig.addChangeListener(this);
if (providerConfig.isEnabled())
{
String className = providerConfig.getJavaClass();
try
{
TrustManagerProvider provider =
loadProvider(className, providerConfig, true);
providers.put(providerConfig.dn(), provider);
DirectoryServer.registerTrustManagerProvider(providerConfig.dn(),
provider);
}
catch (InitializationException ie)
{
ErrorLogger.logError(ie.getMessageObject());
continue;
}
}
}
}
/**
* {@inheritDoc}
*/
public boolean isConfigurationAddAcceptable(
TrustManagerProviderCfg configuration,
List<Message> unacceptableReasons)
{
if (configuration.isEnabled())
{
// Get the name of the class and make sure we can instantiate it as a
// trust manager provider.
String className = configuration.getJavaClass();
try
{
loadProvider(className, configuration, false);
}
catch (InitializationException ie)
{
unacceptableReasons.add(ie.getMessageObject());
return false;
}
}
// If we've gotten here, then it's fine.
return true;
}
/**
* {@inheritDoc}
*/
public ConfigChangeResult applyConfigurationAdd(
TrustManagerProviderCfg configuration)
{
ResultCode resultCode = ResultCode.SUCCESS;
boolean adminActionRequired = false;
ArrayList<Message> messages = new ArrayList<Message>();
configuration.addChangeListener(this);
if (! configuration.isEnabled())
{
return new ConfigChangeResult(resultCode, adminActionRequired, messages);
}
TrustManagerProvider provider = null;
// Get the name of the class and make sure we can instantiate it as a trust
// manager provider.
String className = configuration.getJavaClass();
try
{
provider = loadProvider(className, configuration, true);
}
catch (InitializationException ie)
{
if (resultCode == ResultCode.SUCCESS)
{
resultCode = DirectoryServer.getServerErrorResultCode();
}
messages.add(ie.getMessageObject());
}
if (resultCode == ResultCode.SUCCESS)
{
providers.put(configuration.dn(), provider);
DirectoryServer.registerTrustManagerProvider(configuration.dn(),
provider);
}
return new ConfigChangeResult(resultCode, adminActionRequired, messages);
}
/**
* {@inheritDoc}
*/
public boolean isConfigurationDeleteAcceptable(
TrustManagerProviderCfg configuration,
List<Message> unacceptableReasons)
{
// FIXME -- We should try to perform some check to determine whether the
// provider is in use.
return true;
}
/**
* {@inheritDoc}
*/
public ConfigChangeResult applyConfigurationDelete(
TrustManagerProviderCfg configuration)
{
ResultCode resultCode = ResultCode.SUCCESS;
boolean adminActionRequired = false;
ArrayList<Message> messages = new ArrayList<Message>();
DirectoryServer.deregisterTrustManagerProvider(configuration.dn());
TrustManagerProvider provider = providers.remove(configuration.dn());
if (provider != null)
{
provider.finalizeTrustManagerProvider();
}
return new ConfigChangeResult(resultCode, adminActionRequired, messages);
}
/**
* {@inheritDoc}
*/
public boolean isConfigurationChangeAcceptable(
TrustManagerProviderCfg configuration,
List<Message> unacceptableReasons)
{
if (configuration.isEnabled())
{
// Get the name of the class and make sure we can instantiate it as a
// trust manager provider.
String className = configuration.getJavaClass();
try
{
loadProvider(className, configuration, false);
}
catch (InitializationException ie)
{
unacceptableReasons.add(ie.getMessageObject());
return false;
}
}
// If we've gotten here, then it's fine.
return true;
}
/**
* {@inheritDoc}
*/
public ConfigChangeResult applyConfigurationChange(
TrustManagerProviderCfg configuration)
{
ResultCode resultCode = ResultCode.SUCCESS;
boolean adminActionRequired = false;
ArrayList<Message> messages = new ArrayList<Message>();
// Get the existing provider if it's already enabled.
TrustManagerProvider existingProvider = providers.get(configuration.dn());
// If the new configuration has the provider disabled, then disable it if it
// is enabled, or do nothing if it's already disabled.
if (! configuration.isEnabled())
{
if (existingProvider != null)
{
DirectoryServer.deregisterTrustManagerProvider(configuration.dn());
TrustManagerProvider provider = providers.remove(configuration.dn());
if (provider != null)
{
provider.finalizeTrustManagerProvider();
}
}
return new ConfigChangeResult(resultCode, adminActionRequired, messages);
}
// Get the class for the trust manager provider. If the provider is already
// enabled, then we shouldn't do anything with it although if the class has
// changed then we'll at least need to indicate that administrative action
// is required. If the provider is disabled, then instantiate the class and
// initialize and register it as a trust manager provider.
String className = configuration.getJavaClass();
if (existingProvider != null)
{
if (! className.equals(existingProvider.getClass().getName()))
{
adminActionRequired = true;
}
return new ConfigChangeResult(resultCode, adminActionRequired, messages);
}
TrustManagerProvider provider = null;
try
{
provider = loadProvider(className, configuration, true);
}
catch (InitializationException ie)
{
if (resultCode == ResultCode.SUCCESS)
{
resultCode = DirectoryServer.getServerErrorResultCode();
}
messages.add(ie.getMessageObject());
}
if (resultCode == ResultCode.SUCCESS)
{
providers.put(configuration.dn(), provider);
DirectoryServer.registerTrustManagerProvider(configuration.dn(),
provider);
}
return new ConfigChangeResult(resultCode, adminActionRequired, messages);
}
/**
* Loads the specified class, instantiates it as a trust manager provider, and
* optionally initializes that instance.
*
* @param className The fully-qualified name of the trust manager
* provider class to load, instantiate, and initialize.
* @param configuration The configuration to use to initialize the trust
* manager provider. It must not be {@code null}.
* @param initialize Indicates whether the trust manager provider
* instance should be initialized.
*
* @return The possibly initialized trust manager provider.
*
* @throws InitializationException If a problem occurred while attempting to
* initialize the trust manager provider.
*/
private TrustManagerProvider loadProvider(
String className,
TrustManagerProviderCfg configuration,
boolean initialize)
throws InitializationException
{
try
{
TrustManagerProviderCfgDefn definition =
TrustManagerProviderCfgDefn.getInstance();
ClassPropertyDefinition propertyDefinition =
definition.getJavaClassPropertyDefinition();
Class<? extends TrustManagerProvider> providerClass =
propertyDefinition.loadClass(className, TrustManagerProvider.class);
TrustManagerProvider provider = providerClass.newInstance();
if (initialize)
{
Method method = provider.getClass().getMethod(
"initializeTrustManagerProvider",
configuration.configurationClass());
method.invoke(provider, configuration);
}
else
{
Method method =
provider.getClass().getMethod("isConfigurationAcceptable",
TrustManagerProviderCfg.class,
List.class);
List<Message> unacceptableReasons = new ArrayList<Message>();
Boolean acceptable = (Boolean) method.invoke(provider, configuration,
unacceptableReasons);
if (! acceptable)
{
StringBuilder buffer = new StringBuilder();
if (! unacceptableReasons.isEmpty())
{
Iterator<Message> iterator = unacceptableReasons.iterator();
buffer.append(iterator.next());
while (iterator.hasNext())
{
buffer.append(". ");
buffer.append(iterator.next());
}
}
Message message = ERR_CONFIG_TRUSTMANAGER_CONFIG_NOT_ACCEPTABLE.get(
String.valueOf(configuration.dn()), buffer.toString());
throw new InitializationException(message);
}
}
return provider;
}
catch (Exception e)
{
Message message = ERR_CONFIG_TRUSTMANAGER_INITIALIZATION_FAILED.
get(className, String.valueOf(configuration.dn()),
stackTraceToSingleLineString(e));
throw new InitializationException(message, e);
}
}
}