/*
* JBoss, Home of Professional Open Source.
* Copyright 2015, Red Hat, Inc., and individual contributors
* as indicated by the @author tags. See the copyright.txt file in the
* distribution for a full listing of individual contributors.
*
* This is free software; you can redistribute it and/or modify it
* under the terms of the GNU Lesser General Public License as
* published by the Free Software Foundation; either version 2.1 of
* the License, or (at your option) any later version.
*
* This software is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this software; if not, write to the Free
* Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
* 02110-1301 USA, or see the FSF site: http://www.fsf.org.
*/
package org.jboss.as.remoting;
import org.jboss.dmr.ModelNode;
import org.jboss.staxmapper.XMLElementReader;
import org.jboss.staxmapper.XMLExtendedStreamReader;
import javax.xml.stream.XMLStreamConstants;
import javax.xml.stream.XMLStreamException;
import java.util.EnumSet;
import java.util.List;
import static org.jboss.as.controller.descriptions.ModelDescriptionConstants.ADD;
import static org.jboss.as.controller.descriptions.ModelDescriptionConstants.OP;
import static org.jboss.as.controller.descriptions.ModelDescriptionConstants.OP_ADDR;
import static org.jboss.as.controller.parsing.ParseUtils.missingRequired;
import static org.jboss.as.controller.parsing.ParseUtils.readStringAttributeElement;
import static org.jboss.as.controller.parsing.ParseUtils.requireNoNamespaceAttribute;
import static org.jboss.as.controller.parsing.ParseUtils.unexpectedAttribute;
import static org.jboss.as.controller.parsing.ParseUtils.unexpectedElement;
import static org.jboss.as.remoting.CommonAttributes.AUTHENTICATION_PROVIDER;
import static org.jboss.as.remoting.CommonAttributes.CONNECTOR;
import static org.jboss.as.remoting.CommonAttributes.SECURITY_REALM;
import static org.jboss.as.remoting.CommonAttributes.SASL_PROTOCOL;
import static org.jboss.as.remoting.CommonAttributes.SERVER_NAME;
import static org.jboss.as.remoting.CommonAttributes.SOCKET_BINDING;
/**
* Parser for remoting subsystem 1.2 version
*
* @author opalka.richard@gmail.com
*/
class RemotingSubsystem12Parser extends RemotingSubsystem11Parser implements XMLStreamConstants, XMLElementReader<List<ModelNode>> {
static final RemotingSubsystem12Parser INSTANCE = new RemotingSubsystem12Parser();
void parseConnector(final XMLExtendedStreamReader reader, final ModelNode address, final List<ModelNode> list) throws XMLStreamException {
String name = null;
String securityRealm = null;
String socketBinding = null;
String serverName = null;
String saslProtocol = null;
final EnumSet<Attribute> required = EnumSet.of(Attribute.NAME, Attribute.SOCKET_BINDING);
final int count = reader.getAttributeCount();
final ModelNode connector = new ModelNode();
for (int i = 0; i < count; i++) {
requireNoNamespaceAttribute(reader, i);
final String value = reader.getAttributeValue(i);
final Attribute attribute = Attribute.forName(reader.getAttributeLocalName(i));
required.remove(attribute);
switch (attribute) {
case NAME: {
name = value;
break;
}
case SECURITY_REALM: {
securityRealm = value;
break;
}
case SOCKET_BINDING: {
socketBinding = value;
break;
}
case SERVER_NAME: {
ConnectorCommon.SERVER_NAME.parseAndSetParameter(value, connector, reader);
break;
}
case SASL_PROTOCOL: {
ConnectorCommon.SASL_PROTOCOL.parseAndSetParameter(value, connector, reader);
break;
}
default:
throw unexpectedAttribute(reader, i);
}
}
if (!required.isEmpty()) {
throw missingRequired(reader, required);
}
assert name != null;
assert socketBinding != null;
connector.get(OP).set(ADD);
connector.get(OP_ADDR).set(address).add(CONNECTOR, name);
// requestProperties.get(NAME).set(name); // Name is part of the address
connector.get(SOCKET_BINDING).set(socketBinding);
if (securityRealm != null) {
connector.get(SECURITY_REALM).set(securityRealm);
}
if (serverName != null) {
connector.get(SERVER_NAME).set(serverName);
}
if (saslProtocol != null) {
connector.get(SASL_PROTOCOL).set(saslProtocol);
}
list.add(connector);
// Handle nested elements.
final EnumSet<Element> visited = EnumSet.noneOf(Element.class);
while (reader.hasNext() && reader.nextTag() != END_ELEMENT) {
final Element element = Element.forName(reader.getLocalName());
if (visited.contains(element)) {
throw unexpectedElement(reader);
}
visited.add(element);
switch (element) {
case SASL: {
parseSaslElement(reader, connector.get(OP_ADDR), list);
break;
}
case PROPERTIES: {
parseProperties(reader, connector.get(OP_ADDR), list);
break;
}
case AUTHENTICATION_PROVIDER: {
connector.get(AUTHENTICATION_PROVIDER).set(readStringAttributeElement(reader, "name"));
break;
}
default: {
throw unexpectedElement(reader);
}
}
}
}
}