/**
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.camel.component.netty.http;
import javax.net.ssl.SSLContext;
import javax.net.ssl.SSLEngine;
import org.apache.camel.component.netty.NettyConsumer;
import org.apache.camel.component.netty.ServerPipelineFactory;
import org.apache.camel.component.netty.ssl.SSLEngineFactory;
import org.apache.camel.impl.DefaultClassResolver;
import org.apache.camel.spi.ClassResolver;
import org.apache.camel.util.ObjectHelper;
import org.jboss.netty.channel.ChannelPipeline;
import org.jboss.netty.channel.Channels;
import org.jboss.netty.handler.codec.http.HttpChunkAggregator;
import org.jboss.netty.handler.codec.http.HttpContentCompressor;
import org.jboss.netty.handler.codec.http.HttpRequestDecoder;
import org.jboss.netty.handler.codec.http.HttpResponseEncoder;
import org.jboss.netty.handler.ssl.SslHandler;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
/**
* A shared {@link org.apache.camel.component.netty.ServerPipelineFactory} for a shared Netty HTTP server.
*
* @see NettySharedHttpServer
*/
public class HttpServerSharedPipelineFactory extends HttpServerPipelineFactory {
private static final Logger LOG = LoggerFactory.getLogger(HttpServerSharedPipelineFactory.class);
private final NettySharedHttpServerBootstrapConfiguration configuration;
private final HttpServerConsumerChannelFactory channelFactory;
private final ClassResolver classResolver;
private SSLContext sslContext;
public HttpServerSharedPipelineFactory(NettySharedHttpServerBootstrapConfiguration configuration, HttpServerConsumerChannelFactory channelFactory,
ClassResolver classResolver) {
this.configuration = configuration;
this.channelFactory = channelFactory;
// fallback and use default resolver
this.classResolver = classResolver != null ? classResolver : new DefaultClassResolver();
try {
this.sslContext = createSSLContext();
} catch (Exception e) {
throw ObjectHelper.wrapRuntimeCamelException(e);
}
if (sslContext != null) {
LOG.info("Created SslContext {}", sslContext);
}
}
@Override
public ServerPipelineFactory createPipelineFactory(NettyConsumer nettyConsumer) {
throw new UnsupportedOperationException("Should not call this operation");
}
@Override
public ChannelPipeline getPipeline() throws Exception {
// Create a default pipeline implementation.
ChannelPipeline pipeline = Channels.pipeline();
SslHandler sslHandler = configureServerSSLOnDemand();
if (sslHandler != null) {
LOG.debug("Server SSL handler configured and added as an interceptor against the ChannelPipeline: {}", sslHandler);
pipeline.addLast("ssl", sslHandler);
}
pipeline.addLast("decoder", new HttpRequestDecoder());
if (configuration.isChunked()) {
pipeline.addLast("aggregator", new HttpChunkAggregator(configuration.getChunkedMaxContentLength()));
}
pipeline.addLast("encoder", new HttpResponseEncoder());
if (configuration.isCompression()) {
pipeline.addLast("deflater", new HttpContentCompressor());
}
pipeline.addLast("handler", channelFactory.getChannelHandler());
return pipeline;
}
private SSLContext createSSLContext() throws Exception {
if (!configuration.isSsl()) {
return null;
}
SSLContext answer;
// create ssl context once
if (configuration.getSslContextParameters() != null) {
answer = configuration.getSslContextParameters().createSSLContext();
} else {
if (configuration.getKeyStoreFile() == null && configuration.getKeyStoreResource() == null) {
LOG.debug("keystorefile is null");
}
if (configuration.getTrustStoreFile() == null && configuration.getTrustStoreResource() == null) {
LOG.debug("truststorefile is null");
}
if (configuration.getPassphrase().toCharArray() == null) {
LOG.debug("passphrase is null");
}
SSLEngineFactory sslEngineFactory;
if (configuration.getKeyStoreFile() != null || configuration.getTrustStoreFile() != null) {
sslEngineFactory = new SSLEngineFactory();
answer = sslEngineFactory.createSSLContext(classResolver,
configuration.getKeyStoreFormat(),
configuration.getSecurityProvider(),
"file:" + configuration.getKeyStoreFile().getPath(),
"file:" + configuration.getTrustStoreFile().getPath(),
configuration.getPassphrase().toCharArray());
} else {
sslEngineFactory = new SSLEngineFactory();
answer = sslEngineFactory.createSSLContext(classResolver,
configuration.getKeyStoreFormat(),
configuration.getSecurityProvider(),
configuration.getKeyStoreResource(),
configuration.getTrustStoreResource(),
configuration.getPassphrase().toCharArray());
}
}
return answer;
}
private SslHandler configureServerSSLOnDemand() throws Exception {
if (!configuration.isSsl()) {
return null;
}
if (configuration.getSslHandler() != null) {
return configuration.getSslHandler();
} else if (sslContext != null) {
SSLEngine engine = sslContext.createSSLEngine();
engine.setUseClientMode(false);
engine.setNeedClientAuth(configuration.isNeedClientAuth());
if (configuration.getSslContextParameters() == null) {
// just set the enabledProtocols if the SslContextParameter doesn't set
engine.setEnabledProtocols(configuration.getEnabledProtocols().split(","));
}
return new SslHandler(engine);
}
return null;
}
}