/*
* CDDL HEADER START
*
* The contents of this file are subject to the terms of the
* Common Development and Distribution License, Version 1.0 only
* (the "License"). You may not use this file except in compliance
* with the License.
*
* You can obtain a copy of the license at
* trunk/opends/resource/legal-notices/OpenDS.LICENSE
* or https://OpenDS.dev.java.net/OpenDS.LICENSE.
* See the License for the specific language governing permissions
* and limitations under the License.
*
* When distributing Covered Code, include this CDDL HEADER in each
* file and include the License file at
* trunk/opends/resource/legal-notices/OpenDS.LICENSE. If applicable,
* add the following below this CDDL HEADER, with the fields enclosed
* by brackets "[]" replaced with your own identifying information:
* Portions Copyright [yyyy] [name of copyright owner]
*
* CDDL HEADER END
*
*
* Copyright 2008-2010 Sun Microsystems, Inc.
* Portions copyright 2011-2013 ForgeRock AS.
*/
package org.opends.server.tools;
import static org.opends.messages.ToolMessages.*;
import static org.opends.server.tools.ToolConstants.*;
import java.util.Collection;
import java.util.HashSet;
import java.util.LinkedHashSet;
import java.util.Set;
import java.util.logging.Level;
import java.util.logging.Logger;
import org.opends.admin.ads.util.ConnectionUtils;
import org.opends.messages.Message;
import org.opends.quicksetup.Constants;
import org.opends.quicksetup.Installation;
import org.opends.quicksetup.UserData;
import org.opends.quicksetup.util.Utils;
import org.opends.server.admin.AdministrationConnector;
import org.opends.server.util.SetupUtils;
import org.opends.server.util.args.Argument;
import org.opends.server.util.args.ArgumentException;
import org.opends.server.util.args.ArgumentParser;
import org.opends.server.util.args.BooleanArgument;
import org.opends.server.util.args.FileBasedArgument;
import org.opends.server.util.args.IntegerArgument;
import org.opends.server.util.args.StringArgument;
/**
* Class used to parse the arguments of the setup command-line and to check
* that there are not conflicting arguments (nor missing arguments in no prompt
* mode).
* Note that this class does not perform checks involving network (like if
* a given port is free) nor the validity of the certificate information
* provided.
*/
public class InstallDSArgumentParser extends ArgumentParser
{
BooleanArgument testOnlyArg;
BooleanArgument cliArg;
BooleanArgument addBaseEntryArg;
BooleanArgument showUsageArg;
BooleanArgument quietArg;
BooleanArgument noPromptArg;
BooleanArgument verboseArg;
StringArgument propertiesFileArgument;
BooleanArgument noPropertiesFileArgument;
BooleanArgument skipPortCheckArg;
BooleanArgument enableWindowsServiceArg;
BooleanArgument doNotStartArg;
BooleanArgument enableStartTLSArg;
BooleanArgument generateSelfSignedCertificateArg;
StringArgument hostNameArg;
BooleanArgument usePkcs11Arg;
FileBasedArgument directoryManagerPwdFileArg;
FileBasedArgument keyStorePasswordFileArg;
IntegerArgument ldapPortArg;
IntegerArgument adminConnectorPortArg;
IntegerArgument ldapsPortArg;
IntegerArgument jmxPortArg;
IntegerArgument sampleDataArg;
StringArgument baseDNArg;
StringArgument importLDIFArg;
StringArgument rejectedImportFileArg;
StringArgument skippedImportFileArg;
StringArgument directoryManagerDNArg;
StringArgument directoryManagerPwdStringArg;
StringArgument useJavaKeyStoreArg;
StringArgument useJCEKSArg;
StringArgument usePkcs12Arg;
StringArgument keyStorePasswordArg;
StringArgument certNicknameArg;
StringArgument progNameArg;
IntegerArgument connectTimeoutArg = null;
BooleanArgument acceptLicense;
private static final Logger LOG = Logger.getLogger(
InstallDSArgumentParser.class.getName());
/**
* The default constructor for this class.
* @param mainClassName the class name of the main class for the command-line
* that is being used.
*/
public InstallDSArgumentParser(String mainClassName)
{
super(mainClassName, INFO_INSTALLDS_TOOL_DESCRIPTION.get(), false);
}
/**
* Initializes the arguments without parsing them.
* @throws ArgumentException if there was an error creating or adding the
* arguments. If this occurs is likely to be a bug.
*/
public void initializeArguments() throws ArgumentException
{
testOnlyArg = new BooleanArgument(
"testOnly".toLowerCase(), 't', "testOnly",
INFO_INSTALLDS_DESCRIPTION_TESTONLY.get());
testOnlyArg.setHidden(true);
testOnlyArg.setPropertyName("testOnly");
addArgument(testOnlyArg);
cliArg = new BooleanArgument(
OPTION_LONG_CLI.toLowerCase(),
OPTION_SHORT_CLI,
OPTION_LONG_CLI,
INFO_INSTALLDS_DESCRIPTION_CLI.get());
cliArg.setPropertyName(OPTION_LONG_CLI);
addArgument(cliArg);
String defaultProgName;
if (SetupUtils.isWindows())
{
defaultProgName = Installation.WINDOWS_SETUP_FILE_NAME;
}
else
{
defaultProgName = Installation.UNIX_SETUP_FILE_NAME;
}
progNameArg = new StringArgument(
"programName".toLowerCase(), 'P', "programName", false,
false, true, INFO_PROGRAM_NAME_PLACEHOLDER.get(), defaultProgName,
"programName", INFO_INSTALLDS_DESCRIPTION_PROGNAME.get());
progNameArg.setHidden(true);
addArgument(progNameArg);
noPromptArg = new BooleanArgument(
OPTION_LONG_NO_PROMPT.toLowerCase(),
OPTION_SHORT_NO_PROMPT,
OPTION_LONG_NO_PROMPT,
INFO_INSTALLDS_DESCRIPTION_NO_PROMPT.get());
noPromptArg.setPropertyName(OPTION_LONG_NO_PROMPT);
addArgument(noPromptArg);
quietArg = new BooleanArgument(
OPTION_LONG_QUIET.toLowerCase(), OPTION_SHORT_QUIET,
OPTION_LONG_QUIET,
INFO_INSTALLDS_DESCRIPTION_SILENT.get());
quietArg.setPropertyName(OPTION_LONG_QUIET);
addArgument(quietArg);
verboseArg = new BooleanArgument(OPTION_LONG_VERBOSE.toLowerCase(),
OPTION_SHORT_VERBOSE,
OPTION_LONG_VERBOSE, INFO_DESCRIPTION_VERBOSE.get());
addArgument(verboseArg);
propertiesFileArgument = new StringArgument(
OPTION_LONG_PROP_FILE_PATH.toLowerCase(), null,
OPTION_LONG_PROP_FILE_PATH, false,
false, true, INFO_PROP_FILE_PATH_PLACEHOLDER.get(), null, null,
INFO_DESCRIPTION_PROP_FILE_PATH.get());
addArgument(propertiesFileArgument);
setFilePropertiesArgument(propertiesFileArgument);
noPropertiesFileArgument = new BooleanArgument(
OPTION_LONG_NO_PROP_FILE.toLowerCase(), null, OPTION_LONG_NO_PROP_FILE,
INFO_DESCRIPTION_NO_PROP_FILE.get());
addArgument(noPropertiesFileArgument);
setNoPropertiesFileArgument(noPropertiesFileArgument);
baseDNArg = new StringArgument(
OPTION_LONG_BASEDN.toLowerCase(), OPTION_SHORT_BASEDN,
OPTION_LONG_BASEDN, false, true, true,
INFO_BASEDN_PLACEHOLDER.get(),
null, OPTION_LONG_BASEDN,
INFO_INSTALLDS_DESCRIPTION_BASEDN.get());
addArgument(baseDNArg);
addBaseEntryArg = new BooleanArgument(
"addBaseEntry".toLowerCase(), 'a', "addBaseEntry",
INFO_INSTALLDS_DESCRIPTION_ADDBASE.get());
addBaseEntryArg.setPropertyName("addBaseEntry");
addArgument(addBaseEntryArg);
importLDIFArg = new StringArgument(
OPTION_LONG_LDIF_FILE.toLowerCase(), OPTION_SHORT_LDIF_FILE,
OPTION_LONG_LDIF_FILE, false,
true, true, INFO_LDIFFILE_PLACEHOLDER.get(),
null, OPTION_LONG_LDIF_FILE,
INFO_INSTALLDS_DESCRIPTION_IMPORTLDIF.get());
addArgument(importLDIFArg);
rejectedImportFileArg = new StringArgument(
"rejectFile".toLowerCase(), 'R', "rejectFile", false, false,
true, INFO_REJECT_FILE_PLACEHOLDER.get(), null, "rejectFile",
INFO_INSTALLDS_DESCRIPTION_REJECTED_FILE.get());
addArgument(rejectedImportFileArg);
skippedImportFileArg = new StringArgument(
"skipFile".toLowerCase(), null, "skipFile", false, false,
true, INFO_SKIP_FILE_PLACEHOLDER.get(), null, "skipFile",
INFO_INSTALLDS_DESCRIPTION_SKIPPED_FILE.get());
addArgument(skippedImportFileArg);
sampleDataArg = new IntegerArgument(
"sampleData".toLowerCase(), 'd', "sampleData", false,
false, true, INFO_NUM_ENTRIES_PLACEHOLDER.get(), 0, "sampleData",
true, 0, false, 0,
INFO_INSTALLDS_DESCRIPTION_SAMPLE_DATA.get());
addArgument(sampleDataArg);
int defaultLdapPort = UserData.getDefaultPort();
if (defaultLdapPort == -1)
{
defaultLdapPort = 389;
}
ldapPortArg = new IntegerArgument(
"ldapPort".toLowerCase(), OPTION_SHORT_PORT,
"ldapPort", false, false,
true, INFO_PORT_PLACEHOLDER.get(), defaultLdapPort,
"ldapPort", true, 1, true, 65535,
INFO_INSTALLDS_DESCRIPTION_LDAPPORT.get());
addArgument(ldapPortArg);
int defaultAdminPort = UserData.getDefaultAdminConnectorPort();
if (defaultAdminPort == -1)
{
defaultAdminPort =
AdministrationConnector.DEFAULT_ADMINISTRATION_CONNECTOR_PORT;
}
adminConnectorPortArg = new IntegerArgument(
"adminConnectorPort".toLowerCase(), null,
"adminConnectorPort", false, false,
true, INFO_PORT_PLACEHOLDER.get(), defaultAdminPort,
"adminConnectorPort", true, 1, true, 65535,
INFO_INSTALLDS_DESCRIPTION_ADMINCONNECTORPORT.get());
addArgument(adminConnectorPortArg);
jmxPortArg = new IntegerArgument(
"jmxPort".toLowerCase(), 'x', "jmxPort", false, false,
true, INFO_JMXPORT_PLACEHOLDER.get(),
SetupUtils.getDefaultJMXPort(), "jmxPort", true,
1, true, 65535,
INFO_INSTALLDS_DESCRIPTION_JMXPORT.get());
addArgument(jmxPortArg);
skipPortCheckArg = new BooleanArgument(
"skipPortCheck".toLowerCase(), 'S', "skipPortCheck",
INFO_INSTALLDS_DESCRIPTION_SKIPPORT.get());
skipPortCheckArg.setPropertyName("skipPortCheck");
addArgument(skipPortCheckArg);
directoryManagerDNArg = new StringArgument(
OPTION_LONG_ROOT_USER_DN.toLowerCase(), OPTION_SHORT_ROOT_USER_DN,
OPTION_LONG_ROOT_USER_DN, false, false,
true, INFO_ROOT_USER_DN_PLACEHOLDER.get(),
"cn=Directory Manager",
OPTION_LONG_ROOT_USER_DN, INFO_INSTALLDS_DESCRIPTION_ROOTDN.get());
addArgument(directoryManagerDNArg);
directoryManagerPwdStringArg = new StringArgument(
"rootUserPassword".toLowerCase(), OPTION_SHORT_BINDPWD,
"rootUserPassword",
false, false, true,
INFO_ROOT_USER_PWD_PLACEHOLDER.get(), null,
"rootUserPassword",
INFO_INSTALLDS_DESCRIPTION_ROOTPW.get());
addArgument(directoryManagerPwdStringArg);
directoryManagerPwdFileArg = new FileBasedArgument(
"rootUserPasswordFile".toLowerCase(),
OPTION_SHORT_BINDPWD_FILE,
"rootUserPasswordFile", false, false,
INFO_ROOT_USER_PWD_FILE_PLACEHOLDER.get(),
null, "rootUserPasswordFile",
INFO_INSTALLDS_DESCRIPTION_ROOTPWFILE.get());
addArgument(directoryManagerPwdFileArg);
enableWindowsServiceArg = new BooleanArgument(
"enableWindowsService".toLowerCase(), 'e',
"enableWindowsService",
INFO_INSTALLDS_DESCRIPTION_ENABLE_WINDOWS_SERVICE.get());
enableWindowsServiceArg.setPropertyName("enableWindowsService");
if (SetupUtils.isWindows())
{
addArgument(enableWindowsServiceArg);
}
doNotStartArg = new BooleanArgument(
"doNotStart".toLowerCase(), 'O', "doNotStart",
INFO_INSTALLDS_DESCRIPTION_DO_NOT_START.get());
doNotStartArg.setPropertyName("doNotStart");
addArgument(doNotStartArg);
enableStartTLSArg = new BooleanArgument(
"enableStartTLS".toLowerCase(), OPTION_SHORT_START_TLS,
"enableStartTLS",
INFO_INSTALLDS_DESCRIPTION_ENABLE_STARTTLS.get());
enableStartTLSArg.setPropertyName("enableStartTLS");
addArgument(enableStartTLSArg);
int defaultSecurePort = UserData.getDefaultSslPort(defaultLdapPort);
if (defaultSecurePort == -1)
{
defaultSecurePort = 636;
}
ldapsPortArg = new IntegerArgument(
"ldapsPort".toLowerCase(), OPTION_SHORT_USE_SSL,
"ldapsPort", false, false,
true, INFO_PORT_PLACEHOLDER.get(), defaultSecurePort,
"ldapsPort", true, 1, true, 65535,
INFO_INSTALLDS_DESCRIPTION_LDAPSPORT.get());
addArgument(ldapsPortArg);
generateSelfSignedCertificateArg = new BooleanArgument(
"generateSelfSignedCertificate".toLowerCase(),
null, "generateSelfSignedCertificate",
INFO_INSTALLDS_DESCRIPTION_USE_SELF_SIGNED.get());
generateSelfSignedCertificateArg.setPropertyName(
"generateSelfSignedCertificate");
addArgument(generateSelfSignedCertificateArg);
hostNameArg = new StringArgument(OPTION_LONG_HOST.toLowerCase(),
OPTION_SHORT_HOST,
OPTION_LONG_HOST, false, false, true, INFO_HOST_PLACEHOLDER.get(),
UserData.getDefaultHostName(),
null, INFO_INSTALLDS_DESCRIPTION_HOST_NAME.get());
hostNameArg.setPropertyName(OPTION_LONG_HOST);
addDefaultArgument(hostNameArg);
usePkcs11Arg = new BooleanArgument("usePkcs11Keystore".toLowerCase(),
null, "usePkcs11Keystore",
INFO_INSTALLDS_DESCRIPTION_USE_PKCS11.get());
usePkcs11Arg.setPropertyName("usePkcs11Keystore");
addArgument(usePkcs11Arg);
useJavaKeyStoreArg = new StringArgument("useJavaKeystore".toLowerCase(),
null, "useJavaKeystore", false, false,
true, INFO_KEYSTOREPATH_PLACEHOLDER.get(), null, "useJavaKeystore",
INFO_INSTALLDS_DESCRIPTION_USE_JAVAKEYSTORE.get());
addArgument(useJavaKeyStoreArg);
useJCEKSArg = new StringArgument("useJCEKS".toLowerCase(),
null, "useJCEKS", false, false,
true, INFO_KEYSTOREPATH_PLACEHOLDER.get(), null, "useJCEKS",
INFO_INSTALLDS_DESCRIPTION_USE_JCEKS.get());
addArgument(useJCEKSArg);
usePkcs12Arg = new StringArgument("usePkcs12keyStore".toLowerCase(),
null, "usePkcs12keyStore", false, false,
true, INFO_KEYSTOREPATH_PLACEHOLDER.get(), null, "usePkcs12keyStore",
INFO_INSTALLDS_DESCRIPTION_USE_PKCS12.get());
addArgument(usePkcs12Arg);
keyStorePasswordArg = new StringArgument(
OPTION_LONG_KEYSTORE_PWD.toLowerCase(),
OPTION_SHORT_KEYSTORE_PWD,
OPTION_LONG_KEYSTORE_PWD, false, false, true,
INFO_KEYSTORE_PWD_PLACEHOLDER.get(), null, OPTION_LONG_KEYSTORE_PWD,
INFO_INSTALLDS_DESCRIPTION_KEYSTOREPASSWORD.get());
addDefaultArgument(keyStorePasswordArg);
keyStorePasswordFileArg = new FileBasedArgument(
OPTION_LONG_KEYSTORE_PWD_FILE.toLowerCase(),
OPTION_SHORT_KEYSTORE_PWD_FILE, OPTION_LONG_KEYSTORE_PWD_FILE, false,
false, INFO_KEYSTORE_PWD_FILE_PLACEHOLDER.get(), null,
OPTION_LONG_KEYSTORE_PWD_FILE,
INFO_INSTALLDS_DESCRIPTION_KEYSTOREPASSWORD_FILE.get());
addDefaultArgument(keyStorePasswordFileArg);
certNicknameArg = new StringArgument(
OPTION_LONG_CERT_NICKNAME.toLowerCase(),
OPTION_SHORT_CERT_NICKNAME, OPTION_LONG_CERT_NICKNAME,
false, false, true, INFO_NICKNAME_PLACEHOLDER.get(), null,
OPTION_LONG_CERT_NICKNAME,
INFO_INSTALLDS_DESCRIPTION_CERT_NICKNAME.get());
addDefaultArgument(certNicknameArg);
int defaultTimeout = ConnectionUtils.getDefaultLDAPTimeout();
connectTimeoutArg = new IntegerArgument(OPTION_LONG_CONNECT_TIMEOUT,
null, OPTION_LONG_CONNECT_TIMEOUT,
false, false, true, INFO_TIMEOUT_PLACEHOLDER.get(),
defaultTimeout, null,
true, 1, true, 65535,
INFO_DESCRIPTION_CONNECTION_TIMEOUT.get());
connectTimeoutArg.setPropertyName(OPTION_LONG_CONNECT_TIMEOUT);
connectTimeoutArg.setHidden(true);
addArgument(connectTimeoutArg);
acceptLicense = new BooleanArgument(OPTION_LONG_ACCEPT_LICENSE, null,
OPTION_LONG_ACCEPT_LICENSE, INFO_OPTION_ACCEPT_LICENSE.get());
addArgument(acceptLicense);
showUsageArg = new BooleanArgument(
OPTION_LONG_HELP.toLowerCase(), OPTION_SHORT_HELP,
OPTION_LONG_HELP,
INFO_INSTALLDS_DESCRIPTION_HELP.get());
addArgument(showUsageArg);
setUsageArgument(showUsageArg);
}
/**
* Returns whether the command was launched in CLI mode or not.
* @return <CODE>true</CODE> if the command was launched to use CLI mode and
* <CODE>false</CODE> otherwise.
*/
public boolean isCli()
{
return cliArg.isPresent();
}
/**
* {@inheritDoc}
*/
@Override()
public void parseArguments(String[] args) throws ArgumentException
{
LinkedHashSet<Message> errorMessages = new LinkedHashSet<Message>();
try
{
super.parseArguments(args);
}
catch (ArgumentException ae)
{
LOG.log(Level.SEVERE, "Error parsing arguments: "+ae, ae);
errorMessages.add(ae.getMessageObject());
}
if (!isUsageArgumentPresent() && !isVersionArgumentPresent())
{
checkServerPassword(errorMessages);
checkProvidedPorts(errorMessages);
checkImportDataArguments(errorMessages);
checkSecurityArguments(errorMessages);
if (errorMessages.size() > 0)
{
Message message = ERR_CANNOT_INITIALIZE_ARGS.get(
Utils.getMessageFromCollection(errorMessages,
Constants.LINE_SEPARATOR));
throw new ArgumentException(message);
}
}
}
/**
* Returns the directory manager password provided by the user. This method
* should be called after a call to parseArguments.
* @return the directory manager password provided by the user.
*/
public String getDirectoryManagerPassword()
{
String pwd = null;
if (directoryManagerPwdStringArg.isPresent())
{
pwd = directoryManagerPwdStringArg.getValue();
}
else if (directoryManagerPwdFileArg.isPresent())
{
pwd = directoryManagerPwdFileArg.getValue();
}
return pwd;
}
/**
* Returns the key store password provided by the user. This method should be
* called after a call to parseArguments.
* @return the key store password provided by the user.
*/
public String getKeyStorePassword()
{
String pwd = null;
if (keyStorePasswordArg.isPresent())
{
pwd = keyStorePasswordArg.getValue();
}
else if (keyStorePasswordFileArg.isPresent())
{
pwd = keyStorePasswordFileArg.getValue();
}
return pwd;
}
/**
* Checks that there are no conflicts with the directory manager passwords.
* If we are in no prompt mode, check that the password was provided.
* @param errorMessages the list of messages to which we add the error
* messages describing the problems encountered during the execution of the
* checking.
*/
private void checkServerPassword(Collection<Message> errorMessages)
{
if (directoryManagerPwdStringArg.isPresent() &&
directoryManagerPwdFileArg.isPresent())
{
Message message = ERR_INSTALLDS_TWO_CONFLICTING_ARGUMENTS.get(
directoryManagerPwdStringArg.getLongIdentifier(),
directoryManagerPwdFileArg.getLongIdentifier());
errorMessages.add(message);
}
if (noPromptArg.isPresent() && !directoryManagerPwdStringArg.isPresent() &&
!directoryManagerPwdFileArg.isPresent())
{
Message message = ERR_INSTALLDS_NO_ROOT_PASSWORD.get(
directoryManagerPwdStringArg.getLongIdentifier(),
directoryManagerPwdFileArg.getLongIdentifier());
errorMessages.add(message);
}
}
/**
* Checks that there are no conflicts with the provided ports (like if the
* user provided the same port for different protocols).
* @param errorMessages the list of messages to which we add the error
* messages describing the problems encountered during the execution of the
* checking.
*/
private void checkProvidedPorts(Collection<Message> errorMessages)
{
/**
* Check that the provided ports do not match.
*/
try
{
Set<Integer> ports = new HashSet<Integer>();
ports.add(ldapPortArg.getIntValue());
if (ports.contains(adminConnectorPortArg.getIntValue()))
{
Message message = ERR_CONFIGDS_PORT_ALREADY_SPECIFIED.get(
String.valueOf(adminConnectorPortArg.getIntValue()));
errorMessages.add(message);
}
else
{
ports.add(adminConnectorPortArg.getIntValue());
}
if (jmxPortArg.isPresent())
{
if (ports.contains(jmxPortArg.getIntValue()))
{
Message message = ERR_CONFIGDS_PORT_ALREADY_SPECIFIED.get(
String.valueOf(jmxPortArg.getIntValue()));
errorMessages.add(message);
}
else
{
ports.add(jmxPortArg.getIntValue());
}
}
if (ldapsPortArg.isPresent())
{
if (ports.contains(ldapsPortArg.getIntValue()))
{
Message message = ERR_CONFIGDS_PORT_ALREADY_SPECIFIED.get(
String.valueOf(ldapsPortArg.getIntValue()));
errorMessages.add(message);
}
else
{
ports.add(ldapsPortArg.getIntValue());
}
}
}
catch (ArgumentException ae)
{
LOG.log(Level.SEVERE, "Unexpected error. "+
"Assuming that it is caused by a previous parsing issue: "+ae, ae);
}
}
/**
* Checks that there are no conflicts with the import data arguments.
* @param errorMessages the list of messages to which we add the error
* messages describing the problems encountered during the execution of the
* checking.
*/
private void checkImportDataArguments(Collection<Message> errorMessages)
{
// Make sure that the user didn't provide conflicting arguments.
if (addBaseEntryArg.isPresent())
{
if (importLDIFArg.isPresent())
{
Message message = ERR_TOOL_CONFLICTING_ARGS.get(
addBaseEntryArg.getLongIdentifier(),
importLDIFArg.getLongIdentifier());
errorMessages.add(message);
}
else if (sampleDataArg.isPresent())
{
Message message = ERR_TOOL_CONFLICTING_ARGS.get(
addBaseEntryArg.getLongIdentifier(),
sampleDataArg.getLongIdentifier());
errorMessages.add(message);
}
}
else if (importLDIFArg.isPresent() && sampleDataArg.isPresent())
{
Message message = ERR_TOOL_CONFLICTING_ARGS.get(
importLDIFArg.getLongIdentifier(),
sampleDataArg.getLongIdentifier());
errorMessages.add(message);
}
if (rejectedImportFileArg.isPresent() && addBaseEntryArg.isPresent())
{
Message message = ERR_TOOL_CONFLICTING_ARGS.get(
addBaseEntryArg.getLongIdentifier(),
rejectedImportFileArg.getLongIdentifier());
errorMessages.add(message);
}
else if (rejectedImportFileArg.isPresent() && sampleDataArg.isPresent())
{
Message message = ERR_TOOL_CONFLICTING_ARGS.get(
rejectedImportFileArg.getLongIdentifier(),
sampleDataArg.getLongIdentifier());
errorMessages.add(message);
}
if (skippedImportFileArg.isPresent() && addBaseEntryArg.isPresent())
{
Message message = ERR_TOOL_CONFLICTING_ARGS.get(
addBaseEntryArg.getLongIdentifier(),
skippedImportFileArg.getLongIdentifier());
errorMessages.add(message);
}
else if (skippedImportFileArg.isPresent() && sampleDataArg.isPresent())
{
Message message = ERR_TOOL_CONFLICTING_ARGS.get(
skippedImportFileArg.getLongIdentifier(),
sampleDataArg.getLongIdentifier());
errorMessages.add(message);
}
if (noPromptArg.isPresent() && !baseDNArg.isPresent() &&
baseDNArg.getDefaultValue() == null)
{
Argument[] args = {importLDIFArg, addBaseEntryArg, sampleDataArg};
for (Argument arg : args)
{
if (arg.isPresent())
{
errorMessages.add(ERR_INSTALLDS_NO_BASE_DN_AND_CONFLICTING_ARG.get(
"--"+arg.getLongIdentifier()));
}
}
}
}
/**
* Checks that there are no conflicts with the security arguments.
* If we are in no prompt mode, check that all the information required has
* been provided (but not if this information is valid: we do not try to
* open the keystores or to check that the LDAPS port is in use).
* @param errorMessages the list of messages to which we add the error
* messages describing the problems encountered during the execution of the
* checking.
*/
private void checkSecurityArguments(Collection<Message> errorMessages)
{
boolean certificateRequired = ldapsPortArg.isPresent() ||
enableStartTLSArg.isPresent();
int certificateType = 0;
if (generateSelfSignedCertificateArg.isPresent())
{
certificateType++;
}
if (useJavaKeyStoreArg.isPresent())
{
certificateType++;
}
if (useJCEKSArg.isPresent())
{
certificateType++;
}
if (usePkcs11Arg.isPresent())
{
certificateType++;
}
if (usePkcs12Arg.isPresent())
{
certificateType++;
}
if (certificateType > 1)
{
errorMessages.add(ERR_INSTALLDS_SEVERAL_CERTIFICATE_TYPE_SPECIFIED.get());
}
if (certificateRequired && noPromptArg.isPresent() &&
(certificateType == 0))
{
errorMessages.add(
ERR_INSTALLDS_CERTIFICATE_REQUIRED_FOR_SSL_OR_STARTTLS.get());
}
if (certificateType == 1)
{
if (!generateSelfSignedCertificateArg.isPresent())
{
// Check that we have only a password.
if (keyStorePasswordArg.isPresent() &&
keyStorePasswordFileArg.isPresent())
{
Message message = ERR_INSTALLDS_TWO_CONFLICTING_ARGUMENTS.get(
keyStorePasswordArg.getLongIdentifier(),
keyStorePasswordFileArg.getLongIdentifier());
errorMessages.add(message);
}
// Check that we have one password in no prompt mode.
if (noPromptArg.isPresent() && !keyStorePasswordArg.isPresent() &&
!keyStorePasswordFileArg.isPresent())
{
Message message = ERR_INSTALLDS_NO_KEYSTORE_PASSWORD.get(
keyStorePasswordArg.getLongIdentifier(),
keyStorePasswordFileArg.getLongIdentifier());
errorMessages.add(message);
}
}
if (noPromptArg.isPresent() && !ldapsPortArg.isPresent() &&
!enableStartTLSArg.isPresent())
{
Message message = ERR_INSTALLDS_SSL_OR_STARTTLS_REQUIRED.get(
ldapsPortArg.getLongIdentifier(),
enableStartTLSArg.getLongIdentifier());
errorMessages.add(message);
}
}
}
/**
* Returns the timeout to be used to connect in milliseconds. The method
* must be called after parsing the arguments.
* @return the timeout to be used to connect in milliseconds. Returns
* {@code 0} if there is no timeout.
* @throws IllegalStateException if the method is called before
* parsing the arguments.
*/
public int getConnectTimeout() throws IllegalStateException
{
try
{
return connectTimeoutArg.getIntValue();
}
catch (ArgumentException ae)
{
throw new IllegalStateException("Argument parser is not parsed: "+ae, ae);
}
}
}