ServerDescriptor.java revision d25372dc8e65a9ed019a88fdf659ca61313f1b31
/*
* CDDL HEADER START
*
* The contents of this file are subject to the terms of the
* Common Development and Distribution License, Version 1.0 only
* (the "License"). You may not use this file except in compliance
* with the License.
*
* You can obtain a copy of the license at
* trunk/opends/resource/legal-notices/OpenDS.LICENSE
* or https://OpenDS.dev.java.net/OpenDS.LICENSE.
* See the License for the specific language governing permissions
* and limitations under the License.
*
* When distributing Covered Code, include this CDDL HEADER in each
* file and include the License file at
* trunk/opends/resource/legal-notices/OpenDS.LICENSE. If applicable,
* add the following below this CDDL HEADER, with the fields enclosed
* by brackets "[]" replaced with your own identifying information:
* Portions Copyright [yyyy] [name of copyright owner]
*
* CDDL HEADER END
*
*
* Copyright 2007-2008 Sun Microsystems, Inc.
*/
package org.opends.admin.ads;
import java.util.ArrayList;
import java.util.HashMap;
import java.util.HashSet;
import java.util.LinkedHashSet;
import java.util.Map;
import java.util.Set;
import javax.naming.NameNotFoundException;
import javax.naming.NamingEnumeration;
import javax.naming.NamingException;
import javax.naming.NameAlreadyBoundException;
import javax.naming.directory.*;
import javax.naming.ldap.InitialLdapContext;
import javax.naming.ldap.LdapName;
import javax.naming.ldap.Rdn;
import org.opends.admin.ads.util.ConnectionUtils;
import org.opends.quicksetup.util.Utils;
/**
* The object of this class represent an OpenDS server.
*/
public class ServerDescriptor
{
private Map<ADSContext.ServerProperty, Object> adsProperties =
new HashMap<ADSContext.ServerProperty, Object>();
private Set<ReplicaDescriptor> replicas = new HashSet<ReplicaDescriptor>();
private Map<ServerProperty, Object> serverProperties =
new HashMap<ServerProperty, Object>();
private TopologyCacheException lastException;
/**
* Enumeration containing the different server properties that we can keep in
* the ServerProperty object.
*/
public enum ServerProperty
{
/**
* The associated value is a String.
*/
HOST_NAME,
/**
* The associated value is an ArrayList of Integer.
*/
LDAP_PORT,
/**
* The associated value is an ArrayList of Integer.
*/
LDAPS_PORT,
/**
* The associated value is an Integer.
*/
ADMIN_PORT,
/**
* The associated value is an ArrayList of Boolean.
*/
LDAP_ENABLED,
/**
* The associated value is an ArrayList of Boolean.
*/
LDAPS_ENABLED,
/**
* The associated value is an ArrayList of Boolean.
*/
ADMIN_ENABLED,
/**
* The associated value is an ArrayList of Boolean.
*/
STARTTLS_ENABLED,
/**
* The associated value is an ArrayList of Integer.
*/
JMX_PORT,
/**
* The associated value is an ArrayList of Integer.
*/
JMXS_PORT,
/**
* The associated value is an ArrayList of Boolean.
*/
JMX_ENABLED,
/**
* The associated value is an ArrayList of Boolean.
*/
JMXS_ENABLED,
/**
* The associated value is an Integer.
*/
REPLICATION_SERVER_PORT,
/**
* The associated value is a Boolean.
*/
IS_REPLICATION_SERVER,
/**
* The associated value is a Boolean.
*/
IS_REPLICATION_ENABLED,
/**
* The associated value is a Boolean.
*/
IS_REPLICATION_SECURE,
/**
* List of servers specified in the Replication Server configuration.
* This is a Set of String.
*/
EXTERNAL_REPLICATION_SERVERS,
/**
* The associated value is an Integer.
*/
REPLICATION_SERVER_ID,
/**
* The instance key-pair public-key certificate. The associated value is a
* byte[] (ds-cfg-public-key-certificate;binary).
*/
INSTANCE_PUBLIC_KEY_CERTIFICATE,
/**
* The schema generation ID.
*/
SCHEMA_GENERATION_ID
}
private ServerDescriptor()
{
}
/**
* Returns the replicas contained on the server.
* @return the replicas contained on the server.
*/
public Set<ReplicaDescriptor> getReplicas()
{
Set<ReplicaDescriptor> copy = new HashSet<ReplicaDescriptor>();
copy.addAll(replicas);
return copy;
}
/**
* Sets the replicas contained on the server.
* @param replicas the replicas contained on the server.
*/
public void setReplicas(Set<ReplicaDescriptor> replicas)
{
this.replicas.clear();
this.replicas.addAll(replicas);
}
/**
* Returns a Map containing the ADS properties of the server.
* @return a Map containing the ADS properties of the server.
*/
public Map<ADSContext.ServerProperty, Object> getAdsProperties()
{
return adsProperties;
}
/**
* Returns a Map containing the properties of the server.
* @return a Map containing the properties of the server.
*/
public Map<ServerProperty, Object> getServerProperties()
{
return serverProperties;
}
/**
* Tells whether this server is registered in the ADS or not.
* @return <CODE>true</CODE> if the server is registered in the ADS and
* <CODE>false</CODE> otherwise.
*/
public boolean isRegistered()
{
return !adsProperties.isEmpty();
}
/**
* Tells whether this server is a replication server or not.
* @return <CODE>true</CODE> if the server is a replication server and
* <CODE>false</CODE> otherwise.
*/
public boolean isReplicationServer()
{
return Boolean.TRUE.equals(
serverProperties.get(ServerProperty.IS_REPLICATION_SERVER));
}
/**
* Returns the String representation of this replication server based
* on the information we have ("hostname":"replication port") and
* <CODE>null</CODE> if this is not a replication server.
* @return the String representation of this replication server based
* on the information we have ("hostname":"replication port") and
* <CODE>null</CODE> if this is not a replication server.
*/
public String getReplicationServerHostPort()
{
String hostPort = null;
if (isReplicationServer())
{
hostPort = getHostName().toLowerCase()+ ":" + getReplicationServerPort();
}
return hostPort;
}
/**
* Returns the replication server ID of this server and -1 if this is not a
* replications server.
* @return the replication server ID of this server and -1 if this is not a
* replications server.
*/
public int getReplicationServerId()
{
int port = -1;
if (isReplicationServer())
{
port = (Integer)serverProperties.get(
ServerProperty.REPLICATION_SERVER_ID);
}
return port;
}
/**
* Returns the replication port of this server and -1 if this is not a
* replications server.
* @return the replication port of this server and -1 if this is not a
* replications server.
*/
public int getReplicationServerPort()
{
int port = -1;
if (isReplicationServer())
{
port = (Integer)serverProperties.get(
ServerProperty.REPLICATION_SERVER_PORT);
}
return port;
}
/**
* Returns whether the communication with the replication port on the server
* is encrypted or not.
* @return <CODE>true</CODE> if the communication with the replication port on
* the server is encrypted and <CODE>false</CODE> otherwise.
*/
public boolean isReplicationSecure()
{
boolean isReplicationSecure;
if (isReplicationServer())
{
isReplicationSecure = Boolean.TRUE.equals(serverProperties.get(
ServerProperty.IS_REPLICATION_SECURE));
}
else
{
isReplicationSecure = false;
}
return isReplicationSecure;
}
/**
* Sets the ADS properties of the server.
* @param adsProperties a Map containing the ADS properties of the server.
*/
public void setAdsProperties(
Map<ADSContext.ServerProperty, Object> adsProperties)
{
this.adsProperties = adsProperties;
}
/**
* Returns the host name of the server.
* @return the host name of the server.
*/
public String getHostName()
{
String host = (String)serverProperties.get(ServerProperty.HOST_NAME);
if (host == null)
{
host = (String)adsProperties.get(ADSContext.ServerProperty.HOST_NAME);
}
return host;
}
/**
* Returns the URL to access this server using LDAP. Returns
* <CODE>null</CODE> if the server is not configured to listen on an LDAP
* port.
* @return the URL to access this server using LDAP.
*/
public String getLDAPURL()
{
String ldapUrl = null;
String host = getHostName();
int port = -1;
if (!serverProperties.isEmpty())
{
ArrayList s = (ArrayList)serverProperties.get(
ServerProperty.LDAP_ENABLED);
ArrayList p = (ArrayList)serverProperties.get(
ServerProperty.LDAP_PORT);
if (s != null)
{
for (int i=0; i<s.size(); i++)
{
if (Boolean.TRUE.equals(s.get(i)))
{
port = (Integer)p.get(i);
break;
}
}
}
}
if (port != -1)
{
ldapUrl = ConnectionUtils.getLDAPUrl(host, port, false);
}
return ldapUrl;
}
/**
* Returns the URL to access this server using LDAPS. Returns
* <CODE>null</CODE> if the server is not configured to listen on an LDAPS
* port.
* @return the URL to access this server using LDAP.
*/
public String getLDAPsURL()
{
String ldapsUrl = null;
String host = getHostName();
int port = -1;
if (!serverProperties.isEmpty())
{
ArrayList s = (ArrayList)serverProperties.get(
ServerProperty.LDAPS_ENABLED);
ArrayList p = (ArrayList)serverProperties.get(
ServerProperty.LDAPS_PORT);
if (s != null)
{
for (int i=0; i<s.size(); i++)
{
if (Boolean.TRUE.equals(s.get(i)))
{
port = (Integer)p.get(i);
break;
}
}
}
}
if (port != -1)
{
ldapsUrl = ConnectionUtils.getLDAPUrl(host, port, true);
}
return ldapsUrl;
}
/**
* Returns the URL to access this server using the administration connector.
* Returns <CODE>null</CODE> if the server cannot get the administration
* connector.
* @return the URL to access this server using the administration connector.
*/
public String getAdminConnectorURL()
{
String adminConnectorUrl = null;
String host = getHostName();
int port = -1;
if (!serverProperties.isEmpty())
{
ArrayList s = (ArrayList)serverProperties.get(
ServerProperty.ADMIN_ENABLED);
ArrayList p = (ArrayList)serverProperties.get(
ServerProperty.ADMIN_PORT);
if (s != null)
{
for (int i=0; i<s.size(); i++)
{
if (Boolean.TRUE.equals(s.get(i)))
{
port = (Integer)p.get(i);
break;
}
}
}
}
if (port != -1)
{
adminConnectorUrl = ConnectionUtils.getLDAPUrl(host, port, true);
}
return adminConnectorUrl;
}
/**
* Returns a String of type host-name:port-number for the server. If
* the provided securePreferred is set to true the port that will be used
* will be the administration connector port.
* @param securePreferred whether to try to use the secure port as part
* of the returning String or not.
* @return a String of type host-name:port-number for the server.
*/
public String getHostPort(boolean securePreferred)
{
String host = getHostName();
int port = -1;
if (!serverProperties.isEmpty())
{
ArrayList s = (ArrayList)serverProperties.get(
ServerProperty.LDAP_ENABLED);
ArrayList p = (ArrayList)serverProperties.get(
ServerProperty.LDAP_PORT);
if (s != null)
{
for (int i=0; i<s.size(); i++)
{
if (Boolean.TRUE.equals(s.get(i)))
{
port = (Integer)p.get(i);
break;
}
}
}
if (securePreferred)
{
s = (ArrayList)serverProperties.get(
ServerProperty.ADMIN_ENABLED);
p = (ArrayList)serverProperties.get(ServerProperty.ADMIN_PORT);
if (s != null)
{
for (int i=0; i<s.size(); i++)
{
if (Boolean.TRUE.equals(s.get(i)))
{
port = (Integer)p.get(i);
break;
}
}
}
}
}
else
{
boolean secure;
Object v = adsProperties.get(ADSContext.ServerProperty.ADMIN_ENABLED);
secure = securePreferred && "true".equalsIgnoreCase(String.valueOf(v));
try
{
if (secure)
{
port = Integer.parseInt((String)adsProperties.get(
ADSContext.ServerProperty.ADMIN_PORT));
}
else
{
port = Integer.parseInt((String)adsProperties.get(
ADSContext.ServerProperty.LDAP_PORT));
}
}
catch (Throwable t)
{
/* ignore */
}
}
return host + ":" + port;
}
/**
* Returns an Id that is unique for this server.
* @return an Id that is unique for this server.
*/
public String getId()
{
StringBuilder buf = new StringBuilder();
if (serverProperties.size() > 0)
{
buf.append(serverProperties.get(ServerProperty.HOST_NAME));
ServerProperty [] props =
{
ServerProperty.LDAP_PORT, ServerProperty.LDAPS_PORT,
ServerProperty.ADMIN_PORT,
ServerProperty.LDAP_ENABLED, ServerProperty.LDAPS_ENABLED,
ServerProperty.ADMIN_ENABLED
};
for (ServerProperty prop : props) {
ArrayList s = (ArrayList) serverProperties.get(prop);
for (Object o : s) {
buf.append(":").append(o);
}
}
}
else
{
ADSContext.ServerProperty[] props =
{
ADSContext.ServerProperty.HOST_NAME,
ADSContext.ServerProperty.LDAP_PORT,
ADSContext.ServerProperty.LDAPS_PORT,
ADSContext.ServerProperty.ADMIN_PORT,
ADSContext.ServerProperty.LDAP_ENABLED,
ADSContext.ServerProperty.LDAPS_ENABLED,
ADSContext.ServerProperty.ADMIN_ENABLED
};
for (int i=0; i<props.length; i++)
{
if (i != 0)
{
buf.append(":");
}
buf.append(adsProperties.get(props[i]));
}
}
return buf.toString();
}
/**
* Returns the instance-key public-key certificate retrieved from the
* truststore backend of the instance referenced through this descriptor.
*
* @return The public-key certificate of the instance.
*/
public byte[] getInstancePublicKeyCertificate()
{
return((byte[])
serverProperties.get(ServerProperty.INSTANCE_PUBLIC_KEY_CERTIFICATE));
}
/**
* Returns the schema generation ID of the server.
* @return the schema generation ID of the server.
*/
public String getSchemaReplicationID()
{
return (String)serverProperties.get(ServerProperty.SCHEMA_GENERATION_ID);
}
/**
* Returns the last exception that was encountered reading the configuration
* of the server. Returns null if there was no problem loading the
* configuration of the server.
* @return the last exception that was encountered reading the configuration
* of the server. Returns null if there was no problem loading the
* configuration of the server.
*/
public TopologyCacheException getLastException()
{
return lastException;
}
/**
* Sets the last exception that occurred while reading the configuration of
* the server.
* @param lastException the last exception that occurred while reading the
* configuration of the server.
*/
public void setLastException(TopologyCacheException lastException)
{
this.lastException = lastException;
}
/**
* This methods updates the ADS properties (the ones that were read from
* the ADS) with the contents of the server properties (the ones that were
* read directly from the server).
*/
public void updateAdsPropertiesWithServerProperties()
{
adsProperties.put(ADSContext.ServerProperty.HOST_NAME, getHostName());
ServerProperty[][] sProps =
{
{ServerProperty.LDAP_ENABLED, ServerProperty.LDAP_PORT},
{ServerProperty.LDAPS_ENABLED, ServerProperty.LDAPS_PORT},
{ServerProperty.ADMIN_ENABLED, ServerProperty.ADMIN_PORT},
{ServerProperty.JMX_ENABLED, ServerProperty.JMX_PORT},
{ServerProperty.JMXS_ENABLED, ServerProperty.JMXS_PORT}
};
ADSContext.ServerProperty[][] adsProps =
{
{ADSContext.ServerProperty.LDAP_ENABLED,
ADSContext.ServerProperty.LDAP_PORT},
{ADSContext.ServerProperty.LDAPS_ENABLED,
ADSContext.ServerProperty.LDAPS_PORT},
{ADSContext.ServerProperty.ADMIN_ENABLED,
ADSContext.ServerProperty.ADMIN_PORT},
{ADSContext.ServerProperty.JMX_ENABLED,
ADSContext.ServerProperty.JMX_PORT},
{ADSContext.ServerProperty.JMXS_ENABLED,
ADSContext.ServerProperty.JMXS_PORT}
};
for (int i=0; i<sProps.length; i++)
{
ArrayList s = (ArrayList)serverProperties.get(sProps[i][0]);
ArrayList p = (ArrayList)serverProperties.get(sProps[i][1]);
if (s != null)
{
int port = -1;
for (int j=0; j<s.size(); j++)
{
if (Boolean.TRUE.equals(s.get(j)))
{
port = (Integer)p.get(j);
break;
}
}
if (port == -1)
{
adsProperties.put(adsProps[i][0], "false");
if (p.size() > 0)
{
port = (Integer)p.iterator().next();
}
}
else
{
adsProperties.put(adsProps[i][0], "true");
}
adsProperties.put(adsProps[i][1], String.valueOf(port));
}
}
ArrayList array = (ArrayList)serverProperties.get(
ServerProperty.STARTTLS_ENABLED);
boolean startTLSEnabled = false;
if ((array != null) && !array.isEmpty())
{
startTLSEnabled = Boolean.TRUE.equals(array.get(array.size() -1));
}
adsProperties.put(ADSContext.ServerProperty.STARTTLS_ENABLED,
startTLSEnabled ? "true" : "false");
adsProperties.put(ADSContext.ServerProperty.ID, getHostPort(true));
adsProperties.put(ADSContext.ServerProperty.INSTANCE_PUBLIC_KEY_CERTIFICATE,
getInstancePublicKeyCertificate());
}
/**
* Creates a ServerDescriptor object based on some ADS properties provided.
* @param adsProperties the ADS properties of the server.
* @return a ServerDescriptor object that corresponds to the provided ADS
* properties.
*/
public static ServerDescriptor createStandalone(
Map<ADSContext.ServerProperty, Object> adsProperties)
{
ServerDescriptor desc = new ServerDescriptor();
desc.setAdsProperties(adsProperties);
return desc;
}
/**
* Creates a ServerDescriptor object based on the configuration that we read
* using the provided InitialLdapContext.
* @param ctx the InitialLdapContext that will be used to read the
* configuration of the server.
* @param filter the topology cache filter describing the information that
* must be retrieved.
* @return a ServerDescriptor object that corresponds to the read
* configuration.
* @throws NamingException if a problem occurred reading the server
* configuration.
*/
public static ServerDescriptor createStandalone(InitialLdapContext ctx,
TopologyCacheFilter filter)
throws NamingException
{
ServerDescriptor desc = new ServerDescriptor();
updateLdapConfiguration(desc, ctx, filter);
updateAdminConnectorConfiguration(desc, ctx, filter);
updateJmxConfiguration(desc, ctx, filter);
updateReplicas(desc, ctx, filter);
updateReplication(desc, ctx, filter);
updatePublicKeyCertificate(desc, ctx, filter);
updateMiscellaneous(desc, ctx, filter);
desc.serverProperties.put(ServerProperty.HOST_NAME,
ConnectionUtils.getHostName(ctx));
return desc;
}
private static void updateLdapConfiguration(ServerDescriptor desc,
InitialLdapContext ctx, TopologyCacheFilter cacheFilter)
throws NamingException
{
SearchControls ctls = new SearchControls();
ctls.setSearchScope(SearchControls.SUBTREE_SCOPE);
ctls.setReturningAttributes(
new String[] {
"ds-cfg-enabled",
"ds-cfg-listen-address",
"ds-cfg-listen-port",
"ds-cfg-use-ssl",
"ds-cfg-allow-start-tls",
"objectclass"
});
String filter = "(objectclass=ds-cfg-ldap-connection-handler)";
LdapName jndiName = new LdapName("cn=config");
NamingEnumeration listeners = ctx.search(jndiName, filter, ctls);
ArrayList<Integer> ldapPorts = new ArrayList<Integer>();
ArrayList<Integer> ldapsPorts = new ArrayList<Integer>();
ArrayList<Boolean> ldapEnabled = new ArrayList<Boolean>();
ArrayList<Boolean> ldapsEnabled = new ArrayList<Boolean>();
ArrayList<Boolean> startTLSEnabled = new ArrayList<Boolean>();
desc.serverProperties.put(ServerProperty.LDAP_PORT, ldapPorts);
desc.serverProperties.put(ServerProperty.LDAPS_PORT, ldapsPorts);
desc.serverProperties.put(ServerProperty.LDAP_ENABLED, ldapEnabled);
desc.serverProperties.put(ServerProperty.LDAPS_ENABLED, ldapsEnabled);
desc.serverProperties.put(ServerProperty.STARTTLS_ENABLED, startTLSEnabled);
while(listeners.hasMore())
{
SearchResult sr = (SearchResult)listeners.next();
String port = getFirstValue(sr, "ds-cfg-listen-port");
boolean isSecure = "true".equalsIgnoreCase(
getFirstValue(sr, "ds-cfg-use-ssl"));
boolean enabled = "true".equalsIgnoreCase(
getFirstValue(sr, "ds-cfg-enabled"));
if (isSecure)
{
ldapsPorts.add(new Integer(port));
ldapsEnabled.add(enabled);
}
else
{
ldapPorts.add(new Integer(port));
ldapEnabled.add(enabled);
enabled = "true".equalsIgnoreCase(
getFirstValue(sr, "ds-cfg-allow-start-tls"));
startTLSEnabled.add(enabled);
}
}
}
private static void updateAdminConnectorConfiguration(ServerDescriptor desc,
InitialLdapContext ctx, TopologyCacheFilter cacheFilter)
throws NamingException
{
SearchControls ctls = new SearchControls();
ctls.setSearchScope(SearchControls.SUBTREE_SCOPE);
ctls.setReturningAttributes(
new String[] {
"ds-cfg-listen-port",
"objectclass"
});
String filter = "(objectclass=ds-cfg-administration-connector)";
LdapName jndiName = new LdapName("cn=config");
NamingEnumeration listeners = ctx.search(jndiName, filter, ctls);
Integer adminConnectorPort = null;
// we should have a single administration connector
if (listeners.hasMore()) {
SearchResult sr = (SearchResult) listeners.next();
String port = getFirstValue(sr, "ds-cfg-listen-port");
adminConnectorPort = new Integer(port);
}
// Even if we have a single port, use an array to be consistent with
// other protocols.
ArrayList<Integer> adminPorts = new ArrayList<Integer>();
ArrayList<Boolean> adminEnabled = new ArrayList<Boolean>();
if (adminConnectorPort != null)
{
adminPorts.add(adminConnectorPort);
adminEnabled.add(Boolean.TRUE);
}
desc.serverProperties.put(ServerProperty.ADMIN_PORT, adminPorts);
desc.serverProperties.put(ServerProperty.ADMIN_ENABLED, adminEnabled);
}
private static void updateJmxConfiguration(ServerDescriptor desc,
InitialLdapContext ctx, TopologyCacheFilter cacheFilter)
throws NamingException
{
SearchControls ctls = new SearchControls();
ctls.setSearchScope(SearchControls.SUBTREE_SCOPE);
ctls.setReturningAttributes(
new String[] {
"ds-cfg-enabled",
"ds-cfg-listen-address",
"ds-cfg-listen-port",
"ds-cfg-use-ssl",
"objectclass"
});
String filter = "(objectclass=ds-cfg-jmx-connection-handler)";
LdapName jndiName = new LdapName("cn=config");
NamingEnumeration listeners = ctx.search(jndiName, filter, ctls);
ArrayList<Integer> jmxPorts = new ArrayList<Integer>();
ArrayList<Integer> jmxsPorts = new ArrayList<Integer>();
ArrayList<Boolean> jmxEnabled = new ArrayList<Boolean>();
ArrayList<Boolean> jmxsEnabled = new ArrayList<Boolean>();
desc.serverProperties.put(ServerProperty.JMX_PORT, jmxPorts);
desc.serverProperties.put(ServerProperty.JMXS_PORT, jmxsPorts);
desc.serverProperties.put(ServerProperty.JMX_ENABLED, jmxEnabled);
desc.serverProperties.put(ServerProperty.JMXS_ENABLED, jmxsEnabled);
while(listeners.hasMore())
{
SearchResult sr = (SearchResult)listeners.next();
String port = getFirstValue(sr, "ds-cfg-listen-port");
boolean isSecure = "true".equalsIgnoreCase(
getFirstValue(sr, "ds-cfg-use-ssl"));
boolean enabled = "true".equalsIgnoreCase(
getFirstValue(sr, "ds-cfg-enabled"));
if (isSecure)
{
jmxsPorts.add(new Integer(port));
jmxsEnabled.add(enabled);
}
else
{
jmxPorts.add(new Integer(port));
jmxEnabled.add(enabled);
}
}
}
private static void updateReplicas(ServerDescriptor desc,
InitialLdapContext ctx, TopologyCacheFilter cacheFilter)
throws NamingException
{
if (!cacheFilter.searchBaseDNInformation())
{
return;
}
SearchControls ctls = new SearchControls();
ctls.setSearchScope(SearchControls.SUBTREE_SCOPE);
ctls.setReturningAttributes(
new String[] {
"ds-cfg-base-dn",
"ds-cfg-backend-id"
});
String filter = "(objectclass=ds-cfg-backend)";
LdapName jndiName = new LdapName("cn=config");
NamingEnumeration databases = ctx.search(jndiName, filter, ctls);
while(databases.hasMore())
{
SearchResult sr = (SearchResult)databases.next();
String id = getFirstValue(sr, "ds-cfg-backend-id");
if (!isConfigBackend(id) || isSchemaBackend(id))
{
Set<String> baseDns = getValues(sr, "ds-cfg-base-dn");
Set<String> entries;
if (cacheFilter.searchMonitoringInformation())
{
entries = getBaseDNEntryCount(ctx, id);
}
else
{
entries = new HashSet<String>();
}
Set<ReplicaDescriptor> replicas = desc.getReplicas();
for (String baseDn : baseDns)
{
boolean addReplica = cacheFilter.searchAllBaseDNs();
if (!addReplica)
{
for (String dn : cacheFilter.getBaseDNsToSearch())
{
addReplica = Utils.areDnsEqual(dn, baseDn);
if (addReplica)
{
break;
}
}
}
if(addReplica)
{
SuffixDescriptor suffix = new SuffixDescriptor();
suffix.setDN(baseDn);
ReplicaDescriptor replica = new ReplicaDescriptor();
replica.setServer(desc);
replicas.add(replica);
HashSet<ReplicaDescriptor> r = new HashSet<ReplicaDescriptor>();
r.add(replica);
suffix.setReplicas(r);
replica.setSuffix(suffix);
int nEntries = -1;
for (String s : entries)
{
int index = s.indexOf(" ");
if (index != -1)
{
String dn = s.substring(index + 1);
if (Utils.areDnsEqual(baseDn, dn))
{
try
{
nEntries = Integer.parseInt(s.substring(0, index));
}
catch (Throwable t)
{
/* Ignore */
}
break;
}
}
}
replica.setEntries(nEntries);
}
}
desc.setReplicas(replicas);
}
}
}
private static void updateReplication(ServerDescriptor desc,
InitialLdapContext ctx, TopologyCacheFilter cacheFilter)
throws NamingException
{
boolean replicationEnabled = false;
boolean oneDomainReplicated = false;
SearchControls ctls = new SearchControls();
ctls.setSearchScope(SearchControls.OBJECT_SCOPE);
ctls.setReturningAttributes(
new String[] {
"ds-cfg-enabled"
});
String filter = "(objectclass=ds-cfg-synchronization-provider)";
LdapName jndiName = new LdapName(
"cn=Multimaster Synchronization,cn=Synchronization Providers,cn=config");
try
{
NamingEnumeration syncProviders = ctx.search(jndiName, filter, ctls);
while(syncProviders.hasMore())
{
SearchResult sr = (SearchResult)syncProviders.next();
if ("true".equalsIgnoreCase(getFirstValue(sr,
"ds-cfg-enabled")))
{
replicationEnabled = true;
}
}
}
catch (NameNotFoundException nse)
{
/* ignore */
}
desc.serverProperties.put(ServerProperty.IS_REPLICATION_ENABLED,
replicationEnabled ? Boolean.TRUE : Boolean.FALSE);
if (cacheFilter.searchBaseDNInformation())
{
ctls = new SearchControls();
ctls.setSearchScope(SearchControls.SUBTREE_SCOPE);
ctls.setReturningAttributes(
new String[] {
"ds-cfg-base-dn",
"ds-cfg-replication-server",
"ds-cfg-server-id"
});
filter = "(objectclass=ds-cfg-replication-domain)";
jndiName = new LdapName(
"cn=Multimaster Synchronization,cn=Synchronization Providers,cn=config");
try
{
NamingEnumeration syncProviders = ctx.search(jndiName, filter, ctls);
while(syncProviders.hasMore())
{
SearchResult sr = (SearchResult)syncProviders.next();
int id = Integer.parseInt(
getFirstValue(sr, "ds-cfg-server-id"));
Set<String> replicationServers = getValues(sr,
"ds-cfg-replication-server");
Set<String> dns = getValues(sr, "ds-cfg-base-dn");
oneDomainReplicated = dns.size() > 0;
for (String dn : dns)
{
for (ReplicaDescriptor replica : desc.getReplicas())
{
if (areDnsEqual(replica.getSuffix().getDN(), dn))
{
replica.setReplicationId(id);
// Keep the values of the replication servers in lower case
// to make use of Sets as String simpler.
LinkedHashSet<String> repServers = new LinkedHashSet<String>();
for (String s: replicationServers)
{
repServers.add(s.toLowerCase());
}
replica.setReplicationServers(repServers);
}
}
}
}
}
catch (NameNotFoundException nse)
{
/* ignore */
}
}
ctls = new SearchControls();
ctls.setSearchScope(SearchControls.OBJECT_SCOPE);
ctls.setReturningAttributes(
new String[] {
"ds-cfg-replication-port", "ds-cfg-replication-server",
"ds-cfg-replication-server-id"
});
filter = "(objectclass=ds-cfg-replication-server)";
jndiName = new LdapName("cn=Replication Server,cn=Multimaster "+
"Synchronization,cn=Synchronization Providers,cn=config");
desc.serverProperties.put(ServerProperty.IS_REPLICATION_SERVER,
Boolean.FALSE);
try
{
NamingEnumeration entries = ctx.search(jndiName, filter, ctls);
while(entries.hasMore())
{
SearchResult sr = (SearchResult)entries.next();
desc.serverProperties.put(ServerProperty.IS_REPLICATION_SERVER,
Boolean.TRUE);
String v = getFirstValue(sr, "ds-cfg-replication-port");
desc.serverProperties.put(ServerProperty.REPLICATION_SERVER_PORT,
Integer.parseInt(v));
v = getFirstValue(sr, "ds-cfg-replication-server-id");
desc.serverProperties.put(ServerProperty.REPLICATION_SERVER_ID,
Integer.parseInt(v));
Set<String> values = getValues(sr, "ds-cfg-replication-server");
// Keep the values of the replication servers in lower case
// to make use of Sets as String simpler.
LinkedHashSet<String> repServers = new LinkedHashSet<String>();
for (String s: values)
{
repServers.add(s.toLowerCase());
}
desc.serverProperties.put(ServerProperty.EXTERNAL_REPLICATION_SERVERS,
repServers);
}
}
catch (NameNotFoundException nse)
{
/* ignore */
}
if (cacheFilter.searchMonitoringInformation())
{
ctls = new SearchControls();
ctls.setSearchScope(SearchControls.ONELEVEL_SCOPE);
ctls.setReturningAttributes(
new String[] {
"approx-older-change-not-synchronized-millis", "missing-changes",
"base-dn", "server-id"
});
filter = "(missing-changes=*)";
jndiName = new LdapName("cn=monitor");
if (oneDomainReplicated)
{
try
{
NamingEnumeration monitorEntries = ctx.search(jndiName, filter, ctls);
while(monitorEntries.hasMore())
{
SearchResult sr = (SearchResult)monitorEntries.next();
String dn = getFirstValue(sr, "base-dn");
int replicaId = -1;
try
{
replicaId = new Integer(getFirstValue(sr, "server-id"));
}
catch (Throwable t)
{
}
for (ReplicaDescriptor replica: desc.getReplicas())
{
if (Utils.areDnsEqual(dn, replica.getSuffix().getDN()) &&
replica.isReplicated() &&
(replica.getReplicationId() == replicaId))
{
try
{
replica.setAgeOfOldestMissingChange(
new Long(getFirstValue(sr,
"approx-older-change-not-synchronized-millis")));
}
catch (Throwable t)
{
}
try
{
replica.setMissingChanges(
new Integer(getFirstValue(sr, "missing-changes")));
}
catch (Throwable t)
{
}
}
}
}
}
catch (NameNotFoundException nse)
{
}
}
}
boolean replicationSecure = false;
if (replicationEnabled)
{
ctls = new SearchControls();
ctls.setSearchScope(SearchControls.OBJECT_SCOPE);
ctls.setReturningAttributes(
new String[] {"ds-cfg-ssl-encryption"});
filter = "(objectclass=ds-cfg-crypto-manager)";
jndiName = new LdapName("cn=Crypto Manager,cn=config");
NamingEnumeration entries = ctx.search(jndiName, filter, ctls);
while(entries.hasMore())
{
SearchResult sr = (SearchResult)entries.next();
String v = getFirstValue(sr, "ds-cfg-ssl-encryption");
replicationSecure = "true".equalsIgnoreCase(v);
}
}
desc.serverProperties.put(ServerProperty.IS_REPLICATION_SECURE,
replicationSecure ? Boolean.TRUE : Boolean.FALSE);
}
/**
Updates the instance key public-key certificate value of this context from
the local truststore of the instance bound by this context. Any current
value of the certificate is overwritten. The intent of this method is to
retrieve the instance-key public-key certificate when this context is bound
to an instance, and cache it for later use in registering the instance into
ADS.
@param desc The map to update with the instance key-pair public-key
certificate.
@param ctx The bound server instance.
@throws NamingException if unable to retrieve certificate from bound
instance.
*/
private static void updatePublicKeyCertificate(ServerDescriptor desc,
InitialLdapContext ctx, TopologyCacheFilter filter) throws NamingException
{
/* TODO: this DN is declared in some core constants file. Create a constants
file for the installer and import it into the core. */
final String dnStr = "ds-cfg-key-id=ads-certificate,cn=ads-truststore";
final LdapName dn = new LdapName(dnStr);
for (int i = 0; i < 2 ; ++i) {
/* If the entry does not exist in the instance's truststore backend, add
it (which induces the CryptoManager to create the public-key
certificate attribute), then repeat the search. */
try {
final SearchControls searchControls = new SearchControls();
searchControls.setSearchScope(SearchControls.OBJECT_SCOPE);
final String attrIDs[] = { "ds-cfg-public-key-certificate;binary" };
searchControls.setReturningAttributes(attrIDs);
final SearchResult certEntry = ctx.search(dn,
"(objectclass=ds-cfg-instance-key)", searchControls).next();
final Attribute certAttr = certEntry.getAttributes().get(attrIDs[0]);
if (null != certAttr) {
/* attribute ds-cfg-public-key-certificate is a MUST in the schema */
desc.serverProperties.put(
ServerProperty.INSTANCE_PUBLIC_KEY_CERTIFICATE,
certAttr.get());
}
break;
}
catch (NameNotFoundException x) {
if (0 == i) {
/* Poke CryptoManager to initialize truststore. Note the special
attribute in the request. */
final Attributes attrs = new BasicAttributes();
final Attribute oc = new BasicAttribute("objectclass");
oc.add("top");
oc.add("ds-cfg-self-signed-cert-request");
attrs.put(oc);
ctx.createSubcontext(dn, attrs).close();
}
else {
throw x;
}
}
}
}
private static void updateMiscellaneous(ServerDescriptor desc,
InitialLdapContext ctx, TopologyCacheFilter cacheFilter)
throws NamingException
{
SearchControls ctls = new SearchControls();
ctls.setSearchScope(SearchControls.OBJECT_SCOPE);
ctls.setReturningAttributes(
new String[] {
"ds-sync-generation-id"
});
String filter = "|(objectclass=*)(objectclass=ldapsubentry)";
LdapName jndiName = new LdapName("cn=schema");
NamingEnumeration listeners = ctx.search(jndiName, filter, ctls);
while(listeners.hasMore())
{
SearchResult sr = (SearchResult)listeners.next();
desc.serverProperties.put(ServerProperty.SCHEMA_GENERATION_ID,
getFirstValue(sr, "ds-sync-generation-id"));
}
}
/**
Seeds the bound instance's local ads-truststore with a set of instance
key-pair public key certificates. The result is the instance will trust any
instance posessing the private key corresponding to one of the public-key
certificates. This trust is necessary at least to initialize replication,
which uses the trusted certificate entries in the ads-truststore for server
authentication.
@param ctx The bound instance.
@param keyEntryMap The set of valid (i.e., not tagged as compromised)
instance key-pair public-key certificate entries in ADS represented as a map
from keyID to public-key certificate (binary).
@throws NamingException in case an error occurs while updating the instance's
ads-truststore via LDAP.
*/
public static void seedAdsTrustStore(
InitialLdapContext ctx,
Map<String, byte[]> keyEntryMap)
throws NamingException
{
/* TODO: this DN is declared in some core constants file. Create a
constants file for the installer and import it into the core. */
final String truststoreDnStr = "cn=ads-truststore";
final Attribute oc = new BasicAttribute("objectclass");
oc.add("top");
oc.add("ds-cfg-instance-key");
for (Map.Entry<String, byte[]> keyEntry : keyEntryMap.entrySet()){
final BasicAttributes keyAttrs = new BasicAttributes();
keyAttrs.put(oc);
final Attribute rdnAttr = new BasicAttribute(
ADSContext.ServerProperty.INSTANCE_KEY_ID.getAttributeName(),
keyEntry.getKey());
keyAttrs.put(rdnAttr);
keyAttrs.put(new BasicAttribute(
ADSContext.ServerProperty.INSTANCE_PUBLIC_KEY_CERTIFICATE.
getAttributeName() + ";binary", keyEntry.getValue()));
final LdapName keyDn = new LdapName((new StringBuilder(rdnAttr.getID()))
.append("=").append(Rdn.escapeValue(rdnAttr.get())).append(",")
.append(truststoreDnStr).toString());
try {
ctx.createSubcontext(keyDn, keyAttrs).close();
}
catch(NameAlreadyBoundException x){
ctx.destroySubcontext(keyDn);
ctx.createSubcontext(keyDn, keyAttrs).close();
}
}
}
/**
* Returns the values of the ds-base-dn-entry count attributes for the given
* backend monitor entry using the provided InitialLdapContext.
* @param ctx the InitialLdapContext to use to update the configuration.
* @param backendID the id of the backend.
* @return the values of the ds-base-dn-entry count attribute.
* @throws NamingException if there was an error.
*/
private static Set<String> getBaseDNEntryCount(InitialLdapContext ctx,
String backendID) throws NamingException
{
LinkedHashSet<String> v = new LinkedHashSet<String>();
SearchControls ctls = new SearchControls();
ctls.setSearchScope(SearchControls.ONELEVEL_SCOPE);
ctls.setReturningAttributes(
new String[] {
"ds-base-dn-entry-count"
});
String filter = "(ds-backend-id="+backendID+")";
LdapName jndiName = new LdapName("cn=monitor");
NamingEnumeration listeners = ctx.search(jndiName, filter, ctls);
while(listeners.hasMore())
{
SearchResult sr = (SearchResult)listeners.next();
v.addAll(getValues(sr, "ds-base-dn-entry-count"));
}
return v;
}
/*
* The following 2 methods are convenience methods to retrieve String values
* from an entry.
*/
private static String getFirstValue(SearchResult entry, String attrName)
throws NamingException
{
return ConnectionUtils.getFirstValue(entry, attrName);
}
private static Set<String> getValues(SearchResult entry, String attrName)
throws NamingException
{
return ConnectionUtils.getValues(entry, attrName);
}
/**
* An convenience method to know if the provided ID corresponds to a
* configuration backend or not.
* @param id the backend ID to analyze
* @return <CODE>true</CODE> if the the id corresponds to a configuration
* backend and <CODE>false</CODE> otherwise.
*/
private static boolean isConfigBackend(String id)
{
return "tasks".equalsIgnoreCase(id) ||
"schema".equalsIgnoreCase(id) ||
"config".equalsIgnoreCase(id) ||
"monitor".equalsIgnoreCase(id) ||
"backup".equalsIgnoreCase(id) ||
"ads-truststore".equalsIgnoreCase(id);
}
/**
* An convenience method to know if the provided ID corresponds to the schema
* backend or not.
* @param id the backend ID to analyze
* @return <CODE>true</CODE> if the the id corresponds to the schema backend
* and <CODE>false</CODE> otherwise.
*/
private static boolean isSchemaBackend(String id)
{
return "schema".equalsIgnoreCase(id);
}
/**
* Returns <CODE>true</CODE> if the the provided strings represent the same
* DN and <CODE>false</CODE> otherwise.
* @param dn1 the first dn to compare.
* @param dn2 the second dn to compare.
* @return <CODE>true</CODE> if the the provided strings represent the same
* DN and <CODE>false</CODE> otherwise.
*/
private static boolean areDnsEqual(String dn1, String dn2)
{
boolean areDnsEqual = false;
try
{
LdapName name1 = new LdapName(dn1);
LdapName name2 = new LdapName(dn2);
areDnsEqual = name1.equals(name2);
} catch (Exception ex)
{
/* ignore */
}
return areDnsEqual;
}
}