target
stringlengths
20
113k
src_fm
stringlengths
11
86.3k
src_fm_fc
stringlengths
21
86.4k
src_fm_fc_co
stringlengths
30
86.4k
src_fm_fc_ms
stringlengths
42
86.8k
src_fm_fc_ms_ff
stringlengths
43
86.8k
@Test public void testEquality() { LibraryVersion testee1 = new LibraryVersion("10.0.1-1234"); LibraryVersion testee2 = new LibraryVersion(10, 0, 1, 1234); assertTrue(testee1.equals(testee2)); assertEquals(testee1, testee2); assertFalse(new LibraryVersion("10.1.1-1234").equals(new LibraryVersion(10, 1, 1, 123))); assertFalse(new LibraryVersion("10.1.1-1234").equals(new LibraryVersion(10, 1, 1))); assertEquals(new LibraryVersion("10.0.1-1234"), "10.0.1-1234"); }
public boolean equals(LibraryVersion v) { return v.toString().equals(this.toString()); }
LibraryVersion { public boolean equals(LibraryVersion v) { return v.toString().equals(this.toString()); } }
LibraryVersion { public boolean equals(LibraryVersion v) { return v.toString().equals(this.toString()); } LibraryVersion(String version); LibraryVersion(int major, int minor, int sub, int build); LibraryVersion(int major, int minor, int sub); LibraryVersion(int major, int minor); LibraryVersion(int major); }
LibraryVersion { public boolean equals(LibraryVersion v) { return v.toString().equals(this.toString()); } LibraryVersion(String version); LibraryVersion(int major, int minor, int sub, int build); LibraryVersion(int major, int minor, int sub); LibraryVersion(int major, int minor); LibraryVersion(int major); boolean equals(LibraryVersion v); @Override boolean equals(Object o); @Override int hashCode(); int getMinor(); int getMajor(); int getSub(); int getBuild(); @Override String toString(); }
LibraryVersion { public boolean equals(LibraryVersion v) { return v.toString().equals(this.toString()); } LibraryVersion(String version); LibraryVersion(int major, int minor, int sub, int build); LibraryVersion(int major, int minor, int sub); LibraryVersion(int major, int minor); LibraryVersion(int major); boolean equals(LibraryVersion v); @Override boolean equals(Object o); @Override int hashCode(); int getMinor(); int getMajor(); int getSub(); int getBuild(); @Override String toString(); }
@Test public void testSwagger() throws JsonProcessingException { String response = testee.getSwagger(); assertTrue(response.contains("getHello")); }
public final String getSwagger() throws JsonProcessingException { Swagger swagger = new Reader(new Swagger()).read(this.application.getClasses()); return Json.mapper().writeValueAsString(swagger); }
RESTService extends Service { public final String getSwagger() throws JsonProcessingException { Swagger swagger = new Reader(new Swagger()).read(this.application.getClasses()); return Json.mapper().writeValueAsString(swagger); } }
RESTService extends Service { public final String getSwagger() throws JsonProcessingException { Swagger swagger = new Reader(new Swagger()).read(this.application.getClasses()); return Json.mapper().writeValueAsString(swagger); } RESTService(); }
RESTService extends Service { public final String getSwagger() throws JsonProcessingException { Swagger swagger = new Reader(new Swagger()).read(this.application.getClasses()); return Json.mapper().writeValueAsString(swagger); } RESTService(); final RESTResponse handle(URI baseUri, URI requestUri, String method, byte[] body, Map<String, List<String>> headers); final String getSwagger(); @Override final String getAlias(); }
RESTService extends Service { public final String getSwagger() throws JsonProcessingException { Swagger swagger = new Reader(new Swagger()).read(this.application.getClasses()); return Json.mapper().writeValueAsString(swagger); } RESTService(); final RESTResponse handle(URI baseUri, URI requestUri, String method, byte[] body, Map<String, List<String>> headers); final String getSwagger(); @Override final String getAlias(); }
@Test public void testStringRepresentation() { assertEquals("10.0.1-1234", new LibraryVersion(10, 0, 1, 1234).toString()); assertEquals("10.0-1234", new LibraryVersion("10.0-1234").toString()); assertEquals("10-1234", new LibraryVersion("10-1234").toString()); assertEquals("10.0.1", new LibraryVersion(10, 0, 1).toString()); assertEquals("10.1", new LibraryVersion(10, 1).toString()); assertEquals("10", new LibraryVersion(10).toString()); }
@Override public String toString() { String result = "" + major; if (minor != null) { result += "." + minor; if (sub != null) result += "." + sub; } if (build != null) result += "-" + build; return result; }
LibraryVersion { @Override public String toString() { String result = "" + major; if (minor != null) { result += "." + minor; if (sub != null) result += "." + sub; } if (build != null) result += "-" + build; return result; } }
LibraryVersion { @Override public String toString() { String result = "" + major; if (minor != null) { result += "." + minor; if (sub != null) result += "." + sub; } if (build != null) result += "-" + build; return result; } LibraryVersion(String version); LibraryVersion(int major, int minor, int sub, int build); LibraryVersion(int major, int minor, int sub); LibraryVersion(int major, int minor); LibraryVersion(int major); }
LibraryVersion { @Override public String toString() { String result = "" + major; if (minor != null) { result += "." + minor; if (sub != null) result += "." + sub; } if (build != null) result += "-" + build; return result; } LibraryVersion(String version); LibraryVersion(int major, int minor, int sub, int build); LibraryVersion(int major, int minor, int sub); LibraryVersion(int major, int minor); LibraryVersion(int major); boolean equals(LibraryVersion v); @Override boolean equals(Object o); @Override int hashCode(); int getMinor(); int getMajor(); int getSub(); int getBuild(); @Override String toString(); }
LibraryVersion { @Override public String toString() { String result = "" + major; if (minor != null) { result += "." + minor; if (sub != null) result += "." + sub; } if (build != null) result += "-" + build; return result; } LibraryVersion(String version); LibraryVersion(int major, int minor, int sub, int build); LibraryVersion(int major, int minor, int sub); LibraryVersion(int major, int minor); LibraryVersion(int major); boolean equals(LibraryVersion v); @Override boolean equals(Object o); @Override int hashCode(); int getMinor(); int getMajor(); int getSub(); int getBuild(); @Override String toString(); }
@Test public void testEquality() { assertEquals(new LibraryIdentifier("testname;version=\"1.0.1-22\""), "testname;version=\"1.0.1-22\""); assertFalse(new LibraryIdentifier("testname;version=\"1.0.1-22\"").equals("tstname;version=\"1.0.1-22\"")); }
public boolean equals(LibraryIdentifier i) { return this.toString().equals(i.toString()); }
LibraryIdentifier { public boolean equals(LibraryIdentifier i) { return this.toString().equals(i.toString()); } }
LibraryIdentifier { public boolean equals(LibraryIdentifier i) { return this.toString().equals(i.toString()); } LibraryIdentifier(String name); LibraryIdentifier(String name, String version); LibraryIdentifier(String name, LibraryVersion version); }
LibraryIdentifier { public boolean equals(LibraryIdentifier i) { return this.toString().equals(i.toString()); } LibraryIdentifier(String name); LibraryIdentifier(String name, String version); LibraryIdentifier(String name, LibraryVersion version); static LibraryIdentifier fromFilename(String filename); LibraryVersion getVersion(); String getName(); @Override String toString(); boolean equals(LibraryIdentifier i); @Override boolean equals(Object o); @Override int hashCode(); }
LibraryIdentifier { public boolean equals(LibraryIdentifier i) { return this.toString().equals(i.toString()); } LibraryIdentifier(String name); LibraryIdentifier(String name, String version); LibraryIdentifier(String name, LibraryVersion version); static LibraryIdentifier fromFilename(String filename); LibraryVersion getVersion(); String getName(); @Override String toString(); boolean equals(LibraryIdentifier i); @Override boolean equals(Object o); @Override int hashCode(); static final String MANIFEST_LIBRARY_NAME_ATTRIBUTE; static final String MANIFEST_LIBRARY_VERSION_ATTRIBUTE; }
@Test public void testFromFilename() { try { LibraryIdentifier testFull = LibraryIdentifier .fromFilename("service/i5.las2peer.services.testService-4.2.jar"); Assert.assertEquals("i5.las2peer.services.testService", testFull.getName()); Assert.assertEquals("4.2", testFull.getVersion().toString()); LibraryIdentifier testTripleVersion = LibraryIdentifier .fromFilename("i5.las2peer.services.testService-4.2.0.jar"); Assert.assertEquals("i5.las2peer.services.testService", testTripleVersion.getName()); Assert.assertEquals("4.2.0", testTripleVersion.getVersion().toString()); LibraryIdentifier testDoubleVersion = LibraryIdentifier .fromFilename("i5.las2peer.services.testService-4.2.jar"); Assert.assertEquals("i5.las2peer.services.testService", testDoubleVersion.getName()); Assert.assertEquals("4.2", testDoubleVersion.getVersion().toString()); LibraryIdentifier testSingleVersion = LibraryIdentifier .fromFilename("i5.las2peer.services.testService-4.jar"); Assert.assertEquals("i5.las2peer.services.testService", testSingleVersion.getName()); Assert.assertEquals("4", testSingleVersion.getVersion().toString()); LibraryIdentifier testNoVersion = LibraryIdentifier.fromFilename("i5.las2peer.services.testService.jar"); Assert.assertEquals("i5.las2peer.services.testService", testNoVersion.getName()); Assert.assertNull(testNoVersion.getVersion()); } catch (Exception e) { e.printStackTrace(); Assert.fail(e.toString()); } }
public static LibraryIdentifier fromFilename(String filename) { String fileNameWithOutExt = new File(filename).getName().replaceFirst("[.][^.]+$", ""); Pattern versionPattern = Pattern.compile("-[0-9]+(?:.[0-9]+(?:.[0-9]+)?)?(?:-[0-9]+)?$"); Matcher m = versionPattern.matcher(fileNameWithOutExt); String sName = null; String sVersion = null; if (m.find()) { sName = fileNameWithOutExt.substring(0, m.start()); sVersion = m.group().substring(1); return new LibraryIdentifier(sName, sVersion); } else { sName = fileNameWithOutExt; return new LibraryIdentifier(sName, (LibraryVersion) null); } }
LibraryIdentifier { public static LibraryIdentifier fromFilename(String filename) { String fileNameWithOutExt = new File(filename).getName().replaceFirst("[.][^.]+$", ""); Pattern versionPattern = Pattern.compile("-[0-9]+(?:.[0-9]+(?:.[0-9]+)?)?(?:-[0-9]+)?$"); Matcher m = versionPattern.matcher(fileNameWithOutExt); String sName = null; String sVersion = null; if (m.find()) { sName = fileNameWithOutExt.substring(0, m.start()); sVersion = m.group().substring(1); return new LibraryIdentifier(sName, sVersion); } else { sName = fileNameWithOutExt; return new LibraryIdentifier(sName, (LibraryVersion) null); } } }
LibraryIdentifier { public static LibraryIdentifier fromFilename(String filename) { String fileNameWithOutExt = new File(filename).getName().replaceFirst("[.][^.]+$", ""); Pattern versionPattern = Pattern.compile("-[0-9]+(?:.[0-9]+(?:.[0-9]+)?)?(?:-[0-9]+)?$"); Matcher m = versionPattern.matcher(fileNameWithOutExt); String sName = null; String sVersion = null; if (m.find()) { sName = fileNameWithOutExt.substring(0, m.start()); sVersion = m.group().substring(1); return new LibraryIdentifier(sName, sVersion); } else { sName = fileNameWithOutExt; return new LibraryIdentifier(sName, (LibraryVersion) null); } } LibraryIdentifier(String name); LibraryIdentifier(String name, String version); LibraryIdentifier(String name, LibraryVersion version); }
LibraryIdentifier { public static LibraryIdentifier fromFilename(String filename) { String fileNameWithOutExt = new File(filename).getName().replaceFirst("[.][^.]+$", ""); Pattern versionPattern = Pattern.compile("-[0-9]+(?:.[0-9]+(?:.[0-9]+)?)?(?:-[0-9]+)?$"); Matcher m = versionPattern.matcher(fileNameWithOutExt); String sName = null; String sVersion = null; if (m.find()) { sName = fileNameWithOutExt.substring(0, m.start()); sVersion = m.group().substring(1); return new LibraryIdentifier(sName, sVersion); } else { sName = fileNameWithOutExt; return new LibraryIdentifier(sName, (LibraryVersion) null); } } LibraryIdentifier(String name); LibraryIdentifier(String name, String version); LibraryIdentifier(String name, LibraryVersion version); static LibraryIdentifier fromFilename(String filename); LibraryVersion getVersion(); String getName(); @Override String toString(); boolean equals(LibraryIdentifier i); @Override boolean equals(Object o); @Override int hashCode(); }
LibraryIdentifier { public static LibraryIdentifier fromFilename(String filename) { String fileNameWithOutExt = new File(filename).getName().replaceFirst("[.][^.]+$", ""); Pattern versionPattern = Pattern.compile("-[0-9]+(?:.[0-9]+(?:.[0-9]+)?)?(?:-[0-9]+)?$"); Matcher m = versionPattern.matcher(fileNameWithOutExt); String sName = null; String sVersion = null; if (m.find()) { sName = fileNameWithOutExt.substring(0, m.start()); sVersion = m.group().substring(1); return new LibraryIdentifier(sName, sVersion); } else { sName = fileNameWithOutExt; return new LibraryIdentifier(sName, (LibraryVersion) null); } } LibraryIdentifier(String name); LibraryIdentifier(String name, String version); LibraryIdentifier(String name, LibraryVersion version); static LibraryIdentifier fromFilename(String filename); LibraryVersion getVersion(); String getName(); @Override String toString(); boolean equals(LibraryIdentifier i); @Override boolean equals(Object o); @Override int hashCode(); static final String MANIFEST_LIBRARY_NAME_ATTRIBUTE; static final String MANIFEST_LIBRARY_VERSION_ATTRIBUTE; }
@Test public void testStringGetter() throws IOException, LibraryNotFoundException, ResourceNotFoundException { LoadedJarLibrary testee = LoadedJarLibrary .createFromJar("export/jars/i5.las2peer.classLoaders.testPackage1-1.1.jar"); String test = testee.getResourceAsString("i5/las2peer/classLoaders/testPackage1/test.properties"); test = test.replace("\n", "").replace("\r", ""); assertEquals("attribute=otherValueinteger=987", test); }
public static LoadedJarLibrary createFromJar(String filename) throws IllegalArgumentException, IOException { JarFile jfFile = new JarFile(filename); String sName = jfFile.getManifest().getMainAttributes() .getValue(LibraryIdentifier.MANIFEST_LIBRARY_NAME_ATTRIBUTE); String sVersion = jfFile.getManifest().getMainAttributes() .getValue(LibraryIdentifier.MANIFEST_LIBRARY_VERSION_ATTRIBUTE); if (sName == null || sVersion == null) { LibraryIdentifier tmpId = LibraryIdentifier.fromFilename(filename); if (sName == null) { sName = tmpId.getName(); } if (sVersion == null) { sVersion = tmpId.getVersion().toString(); } } jfFile.close(); return new LoadedJarLibrary(filename, new LibraryIdentifier(sName, sVersion)); }
LoadedJarLibrary extends LoadedLibrary { public static LoadedJarLibrary createFromJar(String filename) throws IllegalArgumentException, IOException { JarFile jfFile = new JarFile(filename); String sName = jfFile.getManifest().getMainAttributes() .getValue(LibraryIdentifier.MANIFEST_LIBRARY_NAME_ATTRIBUTE); String sVersion = jfFile.getManifest().getMainAttributes() .getValue(LibraryIdentifier.MANIFEST_LIBRARY_VERSION_ATTRIBUTE); if (sName == null || sVersion == null) { LibraryIdentifier tmpId = LibraryIdentifier.fromFilename(filename); if (sName == null) { sName = tmpId.getName(); } if (sVersion == null) { sVersion = tmpId.getVersion().toString(); } } jfFile.close(); return new LoadedJarLibrary(filename, new LibraryIdentifier(sName, sVersion)); } }
LoadedJarLibrary extends LoadedLibrary { public static LoadedJarLibrary createFromJar(String filename) throws IllegalArgumentException, IOException { JarFile jfFile = new JarFile(filename); String sName = jfFile.getManifest().getMainAttributes() .getValue(LibraryIdentifier.MANIFEST_LIBRARY_NAME_ATTRIBUTE); String sVersion = jfFile.getManifest().getMainAttributes() .getValue(LibraryIdentifier.MANIFEST_LIBRARY_VERSION_ATTRIBUTE); if (sName == null || sVersion == null) { LibraryIdentifier tmpId = LibraryIdentifier.fromFilename(filename); if (sName == null) { sName = tmpId.getName(); } if (sVersion == null) { sVersion = tmpId.getVersion().toString(); } } jfFile.close(); return new LoadedJarLibrary(filename, new LibraryIdentifier(sName, sVersion)); } LoadedJarLibrary(String filename, LibraryIdentifier ident); }
LoadedJarLibrary extends LoadedLibrary { public static LoadedJarLibrary createFromJar(String filename) throws IllegalArgumentException, IOException { JarFile jfFile = new JarFile(filename); String sName = jfFile.getManifest().getMainAttributes() .getValue(LibraryIdentifier.MANIFEST_LIBRARY_NAME_ATTRIBUTE); String sVersion = jfFile.getManifest().getMainAttributes() .getValue(LibraryIdentifier.MANIFEST_LIBRARY_VERSION_ATTRIBUTE); if (sName == null || sVersion == null) { LibraryIdentifier tmpId = LibraryIdentifier.fromFilename(filename); if (sName == null) { sName = tmpId.getName(); } if (sVersion == null) { sVersion = tmpId.getVersion().toString(); } } jfFile.close(); return new LoadedJarLibrary(filename, new LibraryIdentifier(sName, sVersion)); } LoadedJarLibrary(String filename, LibraryIdentifier ident); @Override URL getResourceAsUrl(String name); String[] getContainedClasses(); String[] getContainedResources(); LinkedList<String> getContainedFiles(); String getJarFileName(); static LoadedJarLibrary createFromJar(String filename); }
LoadedJarLibrary extends LoadedLibrary { public static LoadedJarLibrary createFromJar(String filename) throws IllegalArgumentException, IOException { JarFile jfFile = new JarFile(filename); String sName = jfFile.getManifest().getMainAttributes() .getValue(LibraryIdentifier.MANIFEST_LIBRARY_NAME_ATTRIBUTE); String sVersion = jfFile.getManifest().getMainAttributes() .getValue(LibraryIdentifier.MANIFEST_LIBRARY_VERSION_ATTRIBUTE); if (sName == null || sVersion == null) { LibraryIdentifier tmpId = LibraryIdentifier.fromFilename(filename); if (sName == null) { sName = tmpId.getName(); } if (sVersion == null) { sVersion = tmpId.getVersion().toString(); } } jfFile.close(); return new LoadedJarLibrary(filename, new LibraryIdentifier(sName, sVersion)); } LoadedJarLibrary(String filename, LibraryIdentifier ident); @Override URL getResourceAsUrl(String name); String[] getContainedClasses(); String[] getContainedResources(); LinkedList<String> getContainedFiles(); String getJarFileName(); static LoadedJarLibrary createFromJar(String filename); }
@Test public void testBinaryContent() throws IOException, LibraryNotFoundException, ResourceNotFoundException { LoadedJarLibrary testee = LoadedJarLibrary .createFromJar("export/jars/i5.las2peer.classLoaders.testPackage1-1.1.jar"); byte[] result = testee.getResourceAsBinary("i5/las2peer/classLoaders/testPackage1/test.properties"); assertNotNull(result); assertTrue(result.length > 0); result = testee.getResourceAsBinary("i5/las2peer/classLoaders/testPackage1/CounterClass.class"); assertNotNull(result); assertTrue(result.length > 0); }
public static LoadedJarLibrary createFromJar(String filename) throws IllegalArgumentException, IOException { JarFile jfFile = new JarFile(filename); String sName = jfFile.getManifest().getMainAttributes() .getValue(LibraryIdentifier.MANIFEST_LIBRARY_NAME_ATTRIBUTE); String sVersion = jfFile.getManifest().getMainAttributes() .getValue(LibraryIdentifier.MANIFEST_LIBRARY_VERSION_ATTRIBUTE); if (sName == null || sVersion == null) { LibraryIdentifier tmpId = LibraryIdentifier.fromFilename(filename); if (sName == null) { sName = tmpId.getName(); } if (sVersion == null) { sVersion = tmpId.getVersion().toString(); } } jfFile.close(); return new LoadedJarLibrary(filename, new LibraryIdentifier(sName, sVersion)); }
LoadedJarLibrary extends LoadedLibrary { public static LoadedJarLibrary createFromJar(String filename) throws IllegalArgumentException, IOException { JarFile jfFile = new JarFile(filename); String sName = jfFile.getManifest().getMainAttributes() .getValue(LibraryIdentifier.MANIFEST_LIBRARY_NAME_ATTRIBUTE); String sVersion = jfFile.getManifest().getMainAttributes() .getValue(LibraryIdentifier.MANIFEST_LIBRARY_VERSION_ATTRIBUTE); if (sName == null || sVersion == null) { LibraryIdentifier tmpId = LibraryIdentifier.fromFilename(filename); if (sName == null) { sName = tmpId.getName(); } if (sVersion == null) { sVersion = tmpId.getVersion().toString(); } } jfFile.close(); return new LoadedJarLibrary(filename, new LibraryIdentifier(sName, sVersion)); } }
LoadedJarLibrary extends LoadedLibrary { public static LoadedJarLibrary createFromJar(String filename) throws IllegalArgumentException, IOException { JarFile jfFile = new JarFile(filename); String sName = jfFile.getManifest().getMainAttributes() .getValue(LibraryIdentifier.MANIFEST_LIBRARY_NAME_ATTRIBUTE); String sVersion = jfFile.getManifest().getMainAttributes() .getValue(LibraryIdentifier.MANIFEST_LIBRARY_VERSION_ATTRIBUTE); if (sName == null || sVersion == null) { LibraryIdentifier tmpId = LibraryIdentifier.fromFilename(filename); if (sName == null) { sName = tmpId.getName(); } if (sVersion == null) { sVersion = tmpId.getVersion().toString(); } } jfFile.close(); return new LoadedJarLibrary(filename, new LibraryIdentifier(sName, sVersion)); } LoadedJarLibrary(String filename, LibraryIdentifier ident); }
LoadedJarLibrary extends LoadedLibrary { public static LoadedJarLibrary createFromJar(String filename) throws IllegalArgumentException, IOException { JarFile jfFile = new JarFile(filename); String sName = jfFile.getManifest().getMainAttributes() .getValue(LibraryIdentifier.MANIFEST_LIBRARY_NAME_ATTRIBUTE); String sVersion = jfFile.getManifest().getMainAttributes() .getValue(LibraryIdentifier.MANIFEST_LIBRARY_VERSION_ATTRIBUTE); if (sName == null || sVersion == null) { LibraryIdentifier tmpId = LibraryIdentifier.fromFilename(filename); if (sName == null) { sName = tmpId.getName(); } if (sVersion == null) { sVersion = tmpId.getVersion().toString(); } } jfFile.close(); return new LoadedJarLibrary(filename, new LibraryIdentifier(sName, sVersion)); } LoadedJarLibrary(String filename, LibraryIdentifier ident); @Override URL getResourceAsUrl(String name); String[] getContainedClasses(); String[] getContainedResources(); LinkedList<String> getContainedFiles(); String getJarFileName(); static LoadedJarLibrary createFromJar(String filename); }
LoadedJarLibrary extends LoadedLibrary { public static LoadedJarLibrary createFromJar(String filename) throws IllegalArgumentException, IOException { JarFile jfFile = new JarFile(filename); String sName = jfFile.getManifest().getMainAttributes() .getValue(LibraryIdentifier.MANIFEST_LIBRARY_NAME_ATTRIBUTE); String sVersion = jfFile.getManifest().getMainAttributes() .getValue(LibraryIdentifier.MANIFEST_LIBRARY_VERSION_ATTRIBUTE); if (sName == null || sVersion == null) { LibraryIdentifier tmpId = LibraryIdentifier.fromFilename(filename); if (sName == null) { sName = tmpId.getName(); } if (sVersion == null) { sVersion = tmpId.getVersion().toString(); } } jfFile.close(); return new LoadedJarLibrary(filename, new LibraryIdentifier(sName, sVersion)); } LoadedJarLibrary(String filename, LibraryIdentifier ident); @Override URL getResourceAsUrl(String name); String[] getContainedClasses(); String[] getContainedResources(); LinkedList<String> getContainedFiles(); String getJarFileName(); static LoadedJarLibrary createFromJar(String filename); }
@Test public void testResourceToClassName() { assertEquals("test.bla.Class", LoadedLibrary.resourceToClassName("test/bla/Class.class")); try { LoadedLibrary.resourceToClassName("test.clas"); fail("IllegalArgumentException should have been thrown"); } catch (IllegalArgumentException e) { } }
public static String resourceToClassName(String entryName) { if (!entryName.endsWith(".class")) { throw new IllegalArgumentException("This is not a class file!"); } return entryName.replace('/', '.').substring(0, entryName.length() - 6); }
LoadedLibrary { public static String resourceToClassName(String entryName) { if (!entryName.endsWith(".class")) { throw new IllegalArgumentException("This is not a class file!"); } return entryName.replace('/', '.').substring(0, entryName.length() - 6); } }
LoadedLibrary { public static String resourceToClassName(String entryName) { if (!entryName.endsWith(".class")) { throw new IllegalArgumentException("This is not a class file!"); } return entryName.replace('/', '.').substring(0, entryName.length() - 6); } LoadedLibrary(String libraryIdentifier); LoadedLibrary(LibraryIdentifier lib); }
LoadedLibrary { public static String resourceToClassName(String entryName) { if (!entryName.endsWith(".class")) { throw new IllegalArgumentException("This is not a class file!"); } return entryName.replace('/', '.').substring(0, entryName.length() - 6); } LoadedLibrary(String libraryIdentifier); LoadedLibrary(LibraryIdentifier lib); LibraryIdentifier getLibraryIdentifier(); abstract URL getResourceAsUrl(String name); String getResourceAsString(String resourceName); byte[] getResourceAsBinary(String resourceName); LibraryIdentifier getIdentifier(); static String classToResourceName(String className); static String resourceToClassName(String entryName); }
LoadedLibrary { public static String resourceToClassName(String entryName) { if (!entryName.endsWith(".class")) { throw new IllegalArgumentException("This is not a class file!"); } return entryName.replace('/', '.').substring(0, entryName.length() - 6); } LoadedLibrary(String libraryIdentifier); LoadedLibrary(LibraryIdentifier lib); LibraryIdentifier getLibraryIdentifier(); abstract URL getResourceAsUrl(String name); String getResourceAsString(String resourceName); byte[] getResourceAsBinary(String resourceName); LibraryIdentifier getIdentifier(); static String classToResourceName(String className); static String resourceToClassName(String entryName); }
@Test public void testClassToResourceName() { assertEquals("test/bla/Class.class", LoadedLibrary.classToResourceName("test.bla.Class")); assertEquals("Class.class", LoadedLibrary.classToResourceName("Class")); }
public static String classToResourceName(String className) { return className.replace('.', '/') + ".class"; }
LoadedLibrary { public static String classToResourceName(String className) { return className.replace('.', '/') + ".class"; } }
LoadedLibrary { public static String classToResourceName(String className) { return className.replace('.', '/') + ".class"; } LoadedLibrary(String libraryIdentifier); LoadedLibrary(LibraryIdentifier lib); }
LoadedLibrary { public static String classToResourceName(String className) { return className.replace('.', '/') + ".class"; } LoadedLibrary(String libraryIdentifier); LoadedLibrary(LibraryIdentifier lib); LibraryIdentifier getLibraryIdentifier(); abstract URL getResourceAsUrl(String name); String getResourceAsString(String resourceName); byte[] getResourceAsBinary(String resourceName); LibraryIdentifier getIdentifier(); static String classToResourceName(String className); static String resourceToClassName(String entryName); }
LoadedLibrary { public static String classToResourceName(String className) { return className.replace('.', '/') + ".class"; } LoadedLibrary(String libraryIdentifier); LoadedLibrary(LibraryIdentifier lib); LibraryIdentifier getLibraryIdentifier(); abstract URL getResourceAsUrl(String name); String getResourceAsString(String resourceName); byte[] getResourceAsBinary(String resourceName); LibraryIdentifier getIdentifier(); static String classToResourceName(String className); static String resourceToClassName(String entryName); }
@Test public void testGetLastModified() throws InterruptedException { File f = new File("export" + File.separator + "jars" + File.separator); long date1 = FileSystemRepository.getLastModified(f, true); assertTrue(date1 > 0); Thread.sleep(2000); new File("export" + File.separator + "jars" + File.separator + "i5.las2peer.classLoaders.testPackage1-1.0.jar") .setLastModified(System.currentTimeMillis()); long date2 = FileSystemRepository.getLastModified(f, true); assertTrue(date1 < date2); long date3 = FileSystemRepository.getLastModified(f, true); assertTrue(date2 == date3); }
public static long getLastModified(File dir, boolean recursive) { File[] files = dir.listFiles(); if (files == null || files.length == 0) { return dir.lastModified(); } long lastModified = 0; for (File f : files) { if (f.isDirectory() && recursive) { long ll = getLastModified(f, recursive); if (lastModified < ll) { lastModified = ll; } } else { if (lastModified < f.lastModified()) { lastModified = f.lastModified(); } } } return lastModified; }
FileSystemRepository implements Repository { public static long getLastModified(File dir, boolean recursive) { File[] files = dir.listFiles(); if (files == null || files.length == 0) { return dir.lastModified(); } long lastModified = 0; for (File f : files) { if (f.isDirectory() && recursive) { long ll = getLastModified(f, recursive); if (lastModified < ll) { lastModified = ll; } } else { if (lastModified < f.lastModified()) { lastModified = f.lastModified(); } } } return lastModified; } }
FileSystemRepository implements Repository { public static long getLastModified(File dir, boolean recursive) { File[] files = dir.listFiles(); if (files == null || files.length == 0) { return dir.lastModified(); } long lastModified = 0; for (File f : files) { if (f.isDirectory() && recursive) { long ll = getLastModified(f, recursive); if (lastModified < ll) { lastModified = ll; } } else { if (lastModified < f.lastModified()) { lastModified = f.lastModified(); } } } return lastModified; } FileSystemRepository(String directory); FileSystemRepository(String directory, boolean recursive); FileSystemRepository(String[] directories); FileSystemRepository(String[] directories, boolean recursive); FileSystemRepository(Iterable<String> directories, boolean recursive); }
FileSystemRepository implements Repository { public static long getLastModified(File dir, boolean recursive) { File[] files = dir.listFiles(); if (files == null || files.length == 0) { return dir.lastModified(); } long lastModified = 0; for (File f : files) { if (f.isDirectory() && recursive) { long ll = getLastModified(f, recursive); if (lastModified < ll) { lastModified = ll; } } else { if (lastModified < f.lastModified()) { lastModified = f.lastModified(); } } } return lastModified; } FileSystemRepository(String directory); FileSystemRepository(String directory, boolean recursive); FileSystemRepository(String[] directories); FileSystemRepository(String[] directories, boolean recursive); FileSystemRepository(Iterable<String> directories, boolean recursive); @Override LoadedLibrary findLibrary(String name); @Override LoadedLibrary findLibrary(LibraryIdentifier lib); String[] getAvailableVersions(String libraryName); Collection<LibraryVersion> getAvailableVersionSet(String libraryName); String[] getAllLibraries(); Collection<String> getLibraryCollection(); static long getLastModified(File dir, boolean recursive); @Override String toString(); }
FileSystemRepository implements Repository { public static long getLastModified(File dir, boolean recursive) { File[] files = dir.listFiles(); if (files == null || files.length == 0) { return dir.lastModified(); } long lastModified = 0; for (File f : files) { if (f.isDirectory() && recursive) { long ll = getLastModified(f, recursive); if (lastModified < ll) { lastModified = ll; } } else { if (lastModified < f.lastModified()) { lastModified = f.lastModified(); } } } return lastModified; } FileSystemRepository(String directory); FileSystemRepository(String directory, boolean recursive); FileSystemRepository(String[] directories); FileSystemRepository(String[] directories, boolean recursive); FileSystemRepository(Iterable<String> directories, boolean recursive); @Override LoadedLibrary findLibrary(String name); @Override LoadedLibrary findLibrary(LibraryIdentifier lib); String[] getAvailableVersions(String libraryName); Collection<LibraryVersion> getAvailableVersionSet(String libraryName); String[] getAllLibraries(); Collection<String> getLibraryCollection(); static long getLastModified(File dir, boolean recursive); @Override String toString(); }
@Test public void testParent2() { L2pLogger logger = L2pLogger.getInstance(L2pLoggerTest.class.getName()); assertTrue(logger instanceof L2pLogger); Logger parent = logger.getParent(); assertNotNull(parent); assertTrue(parent instanceof L2pLogger); }
public static L2pLogger getInstance(Class<?> cls) throws ClassCastException { return getInstance(cls.getCanonicalName()); }
L2pLogger extends Logger implements NodeObserver { public static L2pLogger getInstance(Class<?> cls) throws ClassCastException { return getInstance(cls.getCanonicalName()); } }
L2pLogger extends Logger implements NodeObserver { public static L2pLogger getInstance(Class<?> cls) throws ClassCastException { return getInstance(cls.getCanonicalName()); } protected L2pLogger(String name, String resourceBundleName); }
L2pLogger extends Logger implements NodeObserver { public static L2pLogger getInstance(Class<?> cls) throws ClassCastException { return getInstance(cls.getCanonicalName()); } protected L2pLogger(String name, String resourceBundleName); synchronized void printStackTrace(Throwable e); static void setGlobalLogDirectory(String directory); synchronized void setLogDirectory(String directory); static void setGlobalLogfilePrefix(String prefix); synchronized void setLogfilePrefix(String prefix); static void setGlobalConsoleLevel(Level level); synchronized void setConsoleLevel(Level level); static void setGlobalLogfileLevel(Level level); synchronized void setLogfileLevel(Level level); @Override void log(LogRecord record); @Deprecated static void logEvent(MonitoringEvent event, String message); @Deprecated static void logEvent(MonitoringEvent event, Agent actingUser, String message); @Deprecated static void logEvent(Object from, MonitoringEvent event, String message); @Deprecated static void logEvent(Object from, MonitoringEvent event, String message, Agent serviceAgent, Agent actingUser); @Deprecated static void logEvent(Node node, Object from, MonitoringEvent event, String message, Agent serviceAgent, Agent actingUser); void log(MonitoringEvent event); void log(MonitoringEvent event, String remarks); void log(MonitoringEvent event, String sourceAgentId, String destinationAgentId, String remarks); @Deprecated @Override void log(Long timestamp, MonitoringEvent event, String sourceNode, String sourceAgentId, String destinationNode, String destinationAgentId, String remarks); static Formatter getGlobalConsoleFormatter(); static Formatter getGlobalLogfileFormatter(); static L2pLogger getInstance(Class<?> cls); static L2pLogger getInstance(String name); }
L2pLogger extends Logger implements NodeObserver { public static L2pLogger getInstance(Class<?> cls) throws ClassCastException { return getInstance(cls.getCanonicalName()); } protected L2pLogger(String name, String resourceBundleName); synchronized void printStackTrace(Throwable e); static void setGlobalLogDirectory(String directory); synchronized void setLogDirectory(String directory); static void setGlobalLogfilePrefix(String prefix); synchronized void setLogfilePrefix(String prefix); static void setGlobalConsoleLevel(Level level); synchronized void setConsoleLevel(Level level); static void setGlobalLogfileLevel(Level level); synchronized void setLogfileLevel(Level level); @Override void log(LogRecord record); @Deprecated static void logEvent(MonitoringEvent event, String message); @Deprecated static void logEvent(MonitoringEvent event, Agent actingUser, String message); @Deprecated static void logEvent(Object from, MonitoringEvent event, String message); @Deprecated static void logEvent(Object from, MonitoringEvent event, String message, Agent serviceAgent, Agent actingUser); @Deprecated static void logEvent(Node node, Object from, MonitoringEvent event, String message, Agent serviceAgent, Agent actingUser); void log(MonitoringEvent event); void log(MonitoringEvent event, String remarks); void log(MonitoringEvent event, String sourceAgentId, String destinationAgentId, String remarks); @Deprecated @Override void log(Long timestamp, MonitoringEvent event, String sourceNode, String sourceAgentId, String destinationNode, String destinationAgentId, String remarks); static Formatter getGlobalConsoleFormatter(); static Formatter getGlobalLogfileFormatter(); static L2pLogger getInstance(Class<?> cls); static L2pLogger getInstance(String name); static final String GLOBAL_NAME; static final int DEFAULT_LIMIT_BYTES; static final int DEFAULT_LIMIT_FILES; static final String DEFAULT_ENCODING; static final String DEFAULT_LOG_DIRECTORY; static final String DEFAULT_LOGFILE_PREFIX; static final Level DEFAULT_CONSOLE_LEVEL; static final Level DEFAULT_LOGFILE_LEVEL; static final Level DEFAULT_OBSERVER_LEVEL; static final SimpleDateFormat DEFAULT_DATE_FORMAT; }
@Test public void testLogin() { try { Node node = new LocalNodeManager().launchNode(); UserAgentManager l = node.getUserManager(); UserAgentImpl a = UserAgentImpl.createUserAgent("pass"); a.unlock("pass"); a.setLoginName("login"); node.storeAgent(a); assertEquals(a.getIdentifier(), l.getAgentIdByLogin("login")); UserAgentImpl b = UserAgentImpl.createUserAgent("pass"); b.unlock("pass"); b.setLoginName("login"); try { node.storeAgent(b); fail("LoginNameAlreadyTakenException expected"); } catch (LoginNameAlreadyTakenException e) { } b.setLoginName("login2"); node.storeAgent(b); assertEquals(b.getIdentifier(), l.getAgentIdByLogin("login2")); b.setLoginName("LOGIN"); try { node.storeAgent(b); fail("LoginNameAlreadyTakenException expected"); } catch (LoginNameAlreadyTakenException e) { } assertEquals(a.getIdentifier(), l.getAgentIdByLogin("LOGIN")); try { l.getAgentIdByLogin("fdewfue"); fail("AgentNotFoundException expected"); } catch (AgentNotFoundException e) { } } catch (Exception e) { e.printStackTrace(); } }
public String getAgentIdByLogin(String name) throws AgentNotFoundException, AgentOperationFailedException { if (name.equalsIgnoreCase(AnonymousAgent.LOGIN_NAME)) { return AnonymousAgentImpl.getInstance().getIdentifier(); } try { EnvelopeVersion env = node.fetchEnvelope(PREFIX_USER_NAME + name.toLowerCase()); return (String) env.getContent(); } catch (EnvelopeNotFoundException e) { throw new AgentNotFoundException("Username not found!", e); } catch (EnvelopeException | SerializationException | CryptoException e) { throw new AgentOperationFailedException("Could not read agent id from storage"); } }
UserAgentManager { public String getAgentIdByLogin(String name) throws AgentNotFoundException, AgentOperationFailedException { if (name.equalsIgnoreCase(AnonymousAgent.LOGIN_NAME)) { return AnonymousAgentImpl.getInstance().getIdentifier(); } try { EnvelopeVersion env = node.fetchEnvelope(PREFIX_USER_NAME + name.toLowerCase()); return (String) env.getContent(); } catch (EnvelopeNotFoundException e) { throw new AgentNotFoundException("Username not found!", e); } catch (EnvelopeException | SerializationException | CryptoException e) { throw new AgentOperationFailedException("Could not read agent id from storage"); } } }
UserAgentManager { public String getAgentIdByLogin(String name) throws AgentNotFoundException, AgentOperationFailedException { if (name.equalsIgnoreCase(AnonymousAgent.LOGIN_NAME)) { return AnonymousAgentImpl.getInstance().getIdentifier(); } try { EnvelopeVersion env = node.fetchEnvelope(PREFIX_USER_NAME + name.toLowerCase()); return (String) env.getContent(); } catch (EnvelopeNotFoundException e) { throw new AgentNotFoundException("Username not found!", e); } catch (EnvelopeException | SerializationException | CryptoException e) { throw new AgentOperationFailedException("Could not read agent id from storage"); } } UserAgentManager(Node node); }
UserAgentManager { public String getAgentIdByLogin(String name) throws AgentNotFoundException, AgentOperationFailedException { if (name.equalsIgnoreCase(AnonymousAgent.LOGIN_NAME)) { return AnonymousAgentImpl.getInstance().getIdentifier(); } try { EnvelopeVersion env = node.fetchEnvelope(PREFIX_USER_NAME + name.toLowerCase()); return (String) env.getContent(); } catch (EnvelopeNotFoundException e) { throw new AgentNotFoundException("Username not found!", e); } catch (EnvelopeException | SerializationException | CryptoException e) { throw new AgentOperationFailedException("Could not read agent id from storage"); } } UserAgentManager(Node node); void registerUserAgent(UserAgent agent); void registerOIDCSub(UserAgentImpl agent, String sub); String getAgentId(String prefixedIdentifier); String getAgentIdByLogin(String name); String getAgentIdByEmail(String email); String getAgentIdByOIDCSub(String sub); }
UserAgentManager { public String getAgentIdByLogin(String name) throws AgentNotFoundException, AgentOperationFailedException { if (name.equalsIgnoreCase(AnonymousAgent.LOGIN_NAME)) { return AnonymousAgentImpl.getInstance().getIdentifier(); } try { EnvelopeVersion env = node.fetchEnvelope(PREFIX_USER_NAME + name.toLowerCase()); return (String) env.getContent(); } catch (EnvelopeNotFoundException e) { throw new AgentNotFoundException("Username not found!", e); } catch (EnvelopeException | SerializationException | CryptoException e) { throw new AgentOperationFailedException("Could not read agent id from storage"); } } UserAgentManager(Node node); void registerUserAgent(UserAgent agent); void registerOIDCSub(UserAgentImpl agent, String sub); String getAgentId(String prefixedIdentifier); String getAgentIdByLogin(String name); String getAgentIdByEmail(String email); String getAgentIdByOIDCSub(String sub); }
@Test public void testMainUsage() { ServiceAgentGenerator.main(new String[0]); assertTrue(("" + standardError.toString()).contains("usage:")); assertEquals("", standardOut.toString()); }
public static void main(String argv[]) { if (argv.length != 2) { System.err.println( "usage: java i5.las2peer.tools.ServiceAgentGenerator [service class]@[service version] [passphrase]"); return; } else if (argv[0].length() < PW_MIN_LENGTH) { System.err.println("the password needs to be at least " + PW_MIN_LENGTH + " signs long, but only " + argv[0].length() + " given"); return; } try { ServiceAgentImpl agent = ServiceAgentImpl.createServiceAgent(ServiceNameVersion.fromString(argv[0]), argv[1]); System.out.print(agent.toXmlString()); } catch (Exception e) { System.err.println("unable to generate new agent: " + e); } }
ServiceAgentGenerator { public static void main(String argv[]) { if (argv.length != 2) { System.err.println( "usage: java i5.las2peer.tools.ServiceAgentGenerator [service class]@[service version] [passphrase]"); return; } else if (argv[0].length() < PW_MIN_LENGTH) { System.err.println("the password needs to be at least " + PW_MIN_LENGTH + " signs long, but only " + argv[0].length() + " given"); return; } try { ServiceAgentImpl agent = ServiceAgentImpl.createServiceAgent(ServiceNameVersion.fromString(argv[0]), argv[1]); System.out.print(agent.toXmlString()); } catch (Exception e) { System.err.println("unable to generate new agent: " + e); } } }
ServiceAgentGenerator { public static void main(String argv[]) { if (argv.length != 2) { System.err.println( "usage: java i5.las2peer.tools.ServiceAgentGenerator [service class]@[service version] [passphrase]"); return; } else if (argv[0].length() < PW_MIN_LENGTH) { System.err.println("the password needs to be at least " + PW_MIN_LENGTH + " signs long, but only " + argv[0].length() + " given"); return; } try { ServiceAgentImpl agent = ServiceAgentImpl.createServiceAgent(ServiceNameVersion.fromString(argv[0]), argv[1]); System.out.print(agent.toXmlString()); } catch (Exception e) { System.err.println("unable to generate new agent: " + e); } } }
ServiceAgentGenerator { public static void main(String argv[]) { if (argv.length != 2) { System.err.println( "usage: java i5.las2peer.tools.ServiceAgentGenerator [service class]@[service version] [passphrase]"); return; } else if (argv[0].length() < PW_MIN_LENGTH) { System.err.println("the password needs to be at least " + PW_MIN_LENGTH + " signs long, but only " + argv[0].length() + " given"); return; } try { ServiceAgentImpl agent = ServiceAgentImpl.createServiceAgent(ServiceNameVersion.fromString(argv[0]), argv[1]); System.out.print(agent.toXmlString()); } catch (Exception e) { System.err.println("unable to generate new agent: " + e); } } static void main(String argv[]); }
ServiceAgentGenerator { public static void main(String argv[]) { if (argv.length != 2) { System.err.println( "usage: java i5.las2peer.tools.ServiceAgentGenerator [service class]@[service version] [passphrase]"); return; } else if (argv[0].length() < PW_MIN_LENGTH) { System.err.println("the password needs to be at least " + PW_MIN_LENGTH + " signs long, but only " + argv[0].length() + " given"); return; } try { ServiceAgentImpl agent = ServiceAgentImpl.createServiceAgent(ServiceNameVersion.fromString(argv[0]), argv[1]); System.out.print(agent.toXmlString()); } catch (Exception e) { System.err.println("unable to generate new agent: " + e); } } static void main(String argv[]); }
@Test public void testEmail() { try { Node node = new LocalNodeManager().launchNode(); UserAgentManager l = node.getUserManager(); UserAgentImpl a = UserAgentImpl.createUserAgent("pass"); a.unlock("pass"); a.setEmail("[email protected]"); node.storeAgent(a); assertEquals(a.getIdentifier(), l.getAgentIdByEmail("[email protected]")); UserAgentImpl b = UserAgentImpl.createUserAgent("pass"); b.unlock("pass"); b.setEmail("[email protected]"); try { node.storeAgent(b); fail("EmailAlreadyTakenException expected"); } catch (EmailAlreadyTakenException e) { } b.setEmail("[email protected]"); try { node.storeAgent(b); fail("EmailAlreadyTakenException expected"); } catch (EmailAlreadyTakenException e) { } b.setEmail("[email protected]"); node.storeAgent(b); assertEquals(b.getIdentifier(), l.getAgentIdByEmail("[email protected]")); b.setEmail("[email protected]"); node.storeAgent(b); assertEquals(b.getIdentifier(), l.getAgentIdByEmail("[email protected]")); assertEquals(b.getIdentifier(), l.getAgentIdByEmail("[email protected]")); try { l.getAgentIdByEmail("fdewfue"); fail("AgentNotFoundException expected"); } catch (AgentNotFoundException e) { } } catch (Exception e) { e.printStackTrace(); } }
public String getAgentIdByEmail(String email) throws AgentNotFoundException, AgentOperationFailedException { try { EnvelopeVersion env = node.fetchEnvelope(PREFIX_USER_MAIL + email.toLowerCase()); return (String) env.getContent(); } catch (EnvelopeNotFoundException e) { throw new AgentNotFoundException("Email not found!", e); } catch (EnvelopeException | SerializationException | CryptoException e) { throw new AgentOperationFailedException("Could not read email from storage"); } }
UserAgentManager { public String getAgentIdByEmail(String email) throws AgentNotFoundException, AgentOperationFailedException { try { EnvelopeVersion env = node.fetchEnvelope(PREFIX_USER_MAIL + email.toLowerCase()); return (String) env.getContent(); } catch (EnvelopeNotFoundException e) { throw new AgentNotFoundException("Email not found!", e); } catch (EnvelopeException | SerializationException | CryptoException e) { throw new AgentOperationFailedException("Could not read email from storage"); } } }
UserAgentManager { public String getAgentIdByEmail(String email) throws AgentNotFoundException, AgentOperationFailedException { try { EnvelopeVersion env = node.fetchEnvelope(PREFIX_USER_MAIL + email.toLowerCase()); return (String) env.getContent(); } catch (EnvelopeNotFoundException e) { throw new AgentNotFoundException("Email not found!", e); } catch (EnvelopeException | SerializationException | CryptoException e) { throw new AgentOperationFailedException("Could not read email from storage"); } } UserAgentManager(Node node); }
UserAgentManager { public String getAgentIdByEmail(String email) throws AgentNotFoundException, AgentOperationFailedException { try { EnvelopeVersion env = node.fetchEnvelope(PREFIX_USER_MAIL + email.toLowerCase()); return (String) env.getContent(); } catch (EnvelopeNotFoundException e) { throw new AgentNotFoundException("Email not found!", e); } catch (EnvelopeException | SerializationException | CryptoException e) { throw new AgentOperationFailedException("Could not read email from storage"); } } UserAgentManager(Node node); void registerUserAgent(UserAgent agent); void registerOIDCSub(UserAgentImpl agent, String sub); String getAgentId(String prefixedIdentifier); String getAgentIdByLogin(String name); String getAgentIdByEmail(String email); String getAgentIdByOIDCSub(String sub); }
UserAgentManager { public String getAgentIdByEmail(String email) throws AgentNotFoundException, AgentOperationFailedException { try { EnvelopeVersion env = node.fetchEnvelope(PREFIX_USER_MAIL + email.toLowerCase()); return (String) env.getContent(); } catch (EnvelopeNotFoundException e) { throw new AgentNotFoundException("Email not found!", e); } catch (EnvelopeException | SerializationException | CryptoException e) { throw new AgentOperationFailedException("Could not read email from storage"); } } UserAgentManager(Node node); void registerUserAgent(UserAgent agent); void registerOIDCSub(UserAgentImpl agent, String sub); String getAgentId(String prefixedIdentifier); String getAgentIdByLogin(String name); String getAgentIdByEmail(String email); String getAgentIdByOIDCSub(String sub); }
@Test public void testUnlocking() throws NoSuchAlgorithmException, CryptoException, AgentAccessDeniedException, InternalSecurityException, AgentLockedException, AgentOperationFailedException { String passphrase = "A passphrase to unlock"; UserAgentImpl a = UserAgentImpl.createUserAgent(passphrase); try { a.decryptSymmetricKey(null); fail("AgentLockedException should have been thrown"); } catch (AgentLockedException e) { } catch (SerializationException e) { fail("SecurityException should have been thrown"); e.printStackTrace(); } try { a.unlock("bad passphrase"); fail("SecurityException should have been thrown"); } catch (AgentAccessDeniedException e) { } try { a.decryptSymmetricKey(null); fail("AgentLockedException should have been thrown"); } catch (AgentLockedException e) { } catch (SerializationException e) { fail("AgentLockedException should have been thrown"); e.printStackTrace(); } a.unlock(passphrase); try { a.decryptSymmetricKey(null); } catch (IllegalArgumentException e) { } catch (SerializationException e) { fail("Illegal argument exception should have been thrown"); e.printStackTrace(); } }
public static UserAgentImpl createUserAgent(String passphrase) throws CryptoException, AgentOperationFailedException { byte[] salt = CryptoTools.generateSalt(); return new UserAgentImpl(CryptoTools.generateKeyPair(), passphrase, salt); }
UserAgentImpl extends PassphraseAgentImpl implements UserAgent { public static UserAgentImpl createUserAgent(String passphrase) throws CryptoException, AgentOperationFailedException { byte[] salt = CryptoTools.generateSalt(); return new UserAgentImpl(CryptoTools.generateKeyPair(), passphrase, salt); } }
UserAgentImpl extends PassphraseAgentImpl implements UserAgent { public static UserAgentImpl createUserAgent(String passphrase) throws CryptoException, AgentOperationFailedException { byte[] salt = CryptoTools.generateSalt(); return new UserAgentImpl(CryptoTools.generateKeyPair(), passphrase, salt); } protected UserAgentImpl(KeyPair pair, String passphrase, byte[] salt); protected UserAgentImpl(PublicKey pubKey, byte[] encryptedPrivate, byte[] salt); }
UserAgentImpl extends PassphraseAgentImpl implements UserAgent { public static UserAgentImpl createUserAgent(String passphrase) throws CryptoException, AgentOperationFailedException { byte[] salt = CryptoTools.generateSalt(); return new UserAgentImpl(CryptoTools.generateKeyPair(), passphrase, salt); } protected UserAgentImpl(KeyPair pair, String passphrase, byte[] salt); protected UserAgentImpl(PublicKey pubKey, byte[] encryptedPrivate, byte[] salt); @Override String getLoginName(); @Override boolean hasLoginName(); @Override void setLoginName(String loginName); @Override void setEmail(String email); @Override String toXmlString(); static UserAgentImpl createFromXml(String xml); static UserAgentImpl createUserAgent(String passphrase); static UserAgentImpl createFromXml(Element root); @Override void receiveMessage(Message message, AgentContext context); @Override void notifyUnregister(); @Override String getEmail(); @Override boolean hasEmail(); }
UserAgentImpl extends PassphraseAgentImpl implements UserAgent { public static UserAgentImpl createUserAgent(String passphrase) throws CryptoException, AgentOperationFailedException { byte[] salt = CryptoTools.generateSalt(); return new UserAgentImpl(CryptoTools.generateKeyPair(), passphrase, salt); } protected UserAgentImpl(KeyPair pair, String passphrase, byte[] salt); protected UserAgentImpl(PublicKey pubKey, byte[] encryptedPrivate, byte[] salt); @Override String getLoginName(); @Override boolean hasLoginName(); @Override void setLoginName(String loginName); @Override void setEmail(String email); @Override String toXmlString(); static UserAgentImpl createFromXml(String xml); static UserAgentImpl createUserAgent(String passphrase); static UserAgentImpl createFromXml(Element root); @Override void receiveMessage(Message message, AgentContext context); @Override void notifyUnregister(); @Override String getEmail(); @Override boolean hasEmail(); }
@Test public void testPassphraseChange() throws NoSuchAlgorithmException, InternalSecurityException, CryptoException, AgentAccessDeniedException, AgentLockedException, AgentOperationFailedException { String passphrase = "a passphrase"; UserAgentImpl a = UserAgentImpl.createUserAgent(passphrase); String sndPass = "ein anderes Passphrase"; try { a.changePassphrase(sndPass); fail("AgentLockedException expected"); } catch (AgentLockedException e) { } a.unlock(passphrase); a.changePassphrase(sndPass); a.lockPrivateKey(); try { a.unlock(passphrase); fail("AgentAccessDeniedException expected"); } catch (AgentAccessDeniedException e) { } a.unlock(sndPass); }
public static UserAgentImpl createUserAgent(String passphrase) throws CryptoException, AgentOperationFailedException { byte[] salt = CryptoTools.generateSalt(); return new UserAgentImpl(CryptoTools.generateKeyPair(), passphrase, salt); }
UserAgentImpl extends PassphraseAgentImpl implements UserAgent { public static UserAgentImpl createUserAgent(String passphrase) throws CryptoException, AgentOperationFailedException { byte[] salt = CryptoTools.generateSalt(); return new UserAgentImpl(CryptoTools.generateKeyPair(), passphrase, salt); } }
UserAgentImpl extends PassphraseAgentImpl implements UserAgent { public static UserAgentImpl createUserAgent(String passphrase) throws CryptoException, AgentOperationFailedException { byte[] salt = CryptoTools.generateSalt(); return new UserAgentImpl(CryptoTools.generateKeyPair(), passphrase, salt); } protected UserAgentImpl(KeyPair pair, String passphrase, byte[] salt); protected UserAgentImpl(PublicKey pubKey, byte[] encryptedPrivate, byte[] salt); }
UserAgentImpl extends PassphraseAgentImpl implements UserAgent { public static UserAgentImpl createUserAgent(String passphrase) throws CryptoException, AgentOperationFailedException { byte[] salt = CryptoTools.generateSalt(); return new UserAgentImpl(CryptoTools.generateKeyPair(), passphrase, salt); } protected UserAgentImpl(KeyPair pair, String passphrase, byte[] salt); protected UserAgentImpl(PublicKey pubKey, byte[] encryptedPrivate, byte[] salt); @Override String getLoginName(); @Override boolean hasLoginName(); @Override void setLoginName(String loginName); @Override void setEmail(String email); @Override String toXmlString(); static UserAgentImpl createFromXml(String xml); static UserAgentImpl createUserAgent(String passphrase); static UserAgentImpl createFromXml(Element root); @Override void receiveMessage(Message message, AgentContext context); @Override void notifyUnregister(); @Override String getEmail(); @Override boolean hasEmail(); }
UserAgentImpl extends PassphraseAgentImpl implements UserAgent { public static UserAgentImpl createUserAgent(String passphrase) throws CryptoException, AgentOperationFailedException { byte[] salt = CryptoTools.generateSalt(); return new UserAgentImpl(CryptoTools.generateKeyPair(), passphrase, salt); } protected UserAgentImpl(KeyPair pair, String passphrase, byte[] salt); protected UserAgentImpl(PublicKey pubKey, byte[] encryptedPrivate, byte[] salt); @Override String getLoginName(); @Override boolean hasLoginName(); @Override void setLoginName(String loginName); @Override void setEmail(String email); @Override String toXmlString(); static UserAgentImpl createFromXml(String xml); static UserAgentImpl createUserAgent(String passphrase); static UserAgentImpl createFromXml(Element root); @Override void receiveMessage(Message message, AgentContext context); @Override void notifyUnregister(); @Override String getEmail(); @Override boolean hasEmail(); }
@Test public void testWrongRecipient() { try { UserAgentImpl eve = MockAgentFactory.getEve(); eve.unlock("evespass"); UserAgentImpl adam = MockAgentFactory.getAdam(); adam.unlock("adamspass"); Mediator testee = new Mediator(null, eve); Message m = new Message(eve, adam, "a message"); try { testee.receiveMessage(m, null); fail("MessageException expected!"); } catch (MessageException e) { assertTrue(e.getMessage().contains("not responsible")); } } catch (Exception e) { e.printStackTrace(); Assert.fail(e.toString()); } }
@Override public void receiveMessage(Message message, AgentContext c) throws MessageException { if (!message.getRecipientId().equalsIgnoreCase(myAgent.getIdentifier())) { throw new MessageException("I'm not responsible for the receiver (something went very wrong)!"); } try { message.open(myAgent, c); if (getMyNode() != null && !message.getContent().equals("thank you")) { try { Message response = new Message(message, "thank you"); response.setSendingNodeId(getMyNode().getNodeId()); getMyNode().sendMessage(response, null); } catch (EncodingFailedException e) { throw new MessageException("Unable to send response ", e); } catch (SerializationException e) { throw new MessageException("Unable to send response ", e); } } } catch (InternalSecurityException e) { throw new MessageException("Unable to open message because of security problems! ", e); } catch (AgentNotFoundException e) { throw new MessageException( "Sender unkown (since this is the receiver). Has the sending node gone offline? ", e); } catch (AgentException e) { throw new MessageException("Could not read the sender agent", e); } if (!workOnMessage(message, c)) { pending.add(message); } }
Mediator implements MessageReceiver { @Override public void receiveMessage(Message message, AgentContext c) throws MessageException { if (!message.getRecipientId().equalsIgnoreCase(myAgent.getIdentifier())) { throw new MessageException("I'm not responsible for the receiver (something went very wrong)!"); } try { message.open(myAgent, c); if (getMyNode() != null && !message.getContent().equals("thank you")) { try { Message response = new Message(message, "thank you"); response.setSendingNodeId(getMyNode().getNodeId()); getMyNode().sendMessage(response, null); } catch (EncodingFailedException e) { throw new MessageException("Unable to send response ", e); } catch (SerializationException e) { throw new MessageException("Unable to send response ", e); } } } catch (InternalSecurityException e) { throw new MessageException("Unable to open message because of security problems! ", e); } catch (AgentNotFoundException e) { throw new MessageException( "Sender unkown (since this is the receiver). Has the sending node gone offline? ", e); } catch (AgentException e) { throw new MessageException("Could not read the sender agent", e); } if (!workOnMessage(message, c)) { pending.add(message); } } }
Mediator implements MessageReceiver { @Override public void receiveMessage(Message message, AgentContext c) throws MessageException { if (!message.getRecipientId().equalsIgnoreCase(myAgent.getIdentifier())) { throw new MessageException("I'm not responsible for the receiver (something went very wrong)!"); } try { message.open(myAgent, c); if (getMyNode() != null && !message.getContent().equals("thank you")) { try { Message response = new Message(message, "thank you"); response.setSendingNodeId(getMyNode().getNodeId()); getMyNode().sendMessage(response, null); } catch (EncodingFailedException e) { throw new MessageException("Unable to send response ", e); } catch (SerializationException e) { throw new MessageException("Unable to send response ", e); } } } catch (InternalSecurityException e) { throw new MessageException("Unable to open message because of security problems! ", e); } catch (AgentNotFoundException e) { throw new MessageException( "Sender unkown (since this is the receiver). Has the sending node gone offline? ", e); } catch (AgentException e) { throw new MessageException("Could not read the sender agent", e); } if (!workOnMessage(message, c)) { pending.add(message); } } Mediator(Node n, AgentImpl a); }
Mediator implements MessageReceiver { @Override public void receiveMessage(Message message, AgentContext c) throws MessageException { if (!message.getRecipientId().equalsIgnoreCase(myAgent.getIdentifier())) { throw new MessageException("I'm not responsible for the receiver (something went very wrong)!"); } try { message.open(myAgent, c); if (getMyNode() != null && !message.getContent().equals("thank you")) { try { Message response = new Message(message, "thank you"); response.setSendingNodeId(getMyNode().getNodeId()); getMyNode().sendMessage(response, null); } catch (EncodingFailedException e) { throw new MessageException("Unable to send response ", e); } catch (SerializationException e) { throw new MessageException("Unable to send response ", e); } } } catch (InternalSecurityException e) { throw new MessageException("Unable to open message because of security problems! ", e); } catch (AgentNotFoundException e) { throw new MessageException( "Sender unkown (since this is the receiver). Has the sending node gone offline? ", e); } catch (AgentException e) { throw new MessageException("Could not read the sender agent", e); } if (!workOnMessage(message, c)) { pending.add(message); } } Mediator(Node n, AgentImpl a); Message getNextMessage(); boolean hasMessages(); @Override void receiveMessage(Message message, AgentContext c); boolean workOnMessage(Message message, AgentContext context); boolean isRegistered(); @Override String getResponsibleForAgentSafeId(); AgentImpl getAgent(); @Override void notifyRegistrationTo(Node node); @Override void notifyUnregister(); @Deprecated Serializable invoke(String service, String method, Serializable[] parameters, boolean localOnly); Serializable invoke(ServiceNameVersion serviceNameVersion, String method, Serializable[] parameters, boolean localOnly); int getNumberOfWaiting(); void registerMessageHandler(MessageHandler handler); void unregisterMessageHandler(MessageHandler handler); int unregisterMessageHandlerClass(Class<?> cls); int unregisterMessageHandlerClass(String classname); boolean hasMessageHandler(MessageHandler handler); boolean hasMessageHandlerClass(Class<?> cls); }
Mediator implements MessageReceiver { @Override public void receiveMessage(Message message, AgentContext c) throws MessageException { if (!message.getRecipientId().equalsIgnoreCase(myAgent.getIdentifier())) { throw new MessageException("I'm not responsible for the receiver (something went very wrong)!"); } try { message.open(myAgent, c); if (getMyNode() != null && !message.getContent().equals("thank you")) { try { Message response = new Message(message, "thank you"); response.setSendingNodeId(getMyNode().getNodeId()); getMyNode().sendMessage(response, null); } catch (EncodingFailedException e) { throw new MessageException("Unable to send response ", e); } catch (SerializationException e) { throw new MessageException("Unable to send response ", e); } } } catch (InternalSecurityException e) { throw new MessageException("Unable to open message because of security problems! ", e); } catch (AgentNotFoundException e) { throw new MessageException( "Sender unkown (since this is the receiver). Has the sending node gone offline? ", e); } catch (AgentException e) { throw new MessageException("Could not read the sender agent", e); } if (!workOnMessage(message, c)) { pending.add(message); } } Mediator(Node n, AgentImpl a); Message getNextMessage(); boolean hasMessages(); @Override void receiveMessage(Message message, AgentContext c); boolean workOnMessage(Message message, AgentContext context); boolean isRegistered(); @Override String getResponsibleForAgentSafeId(); AgentImpl getAgent(); @Override void notifyRegistrationTo(Node node); @Override void notifyUnregister(); @Deprecated Serializable invoke(String service, String method, Serializable[] parameters, boolean localOnly); Serializable invoke(ServiceNameVersion serviceNameVersion, String method, Serializable[] parameters, boolean localOnly); int getNumberOfWaiting(); void registerMessageHandler(MessageHandler handler); void unregisterMessageHandler(MessageHandler handler); int unregisterMessageHandlerClass(Class<?> cls); int unregisterMessageHandlerClass(String classname); boolean hasMessageHandler(MessageHandler handler); boolean hasMessageHandlerClass(Class<?> cls); }
@Test public void testServiceDiscovery() throws CryptoException, InternalSecurityException, AgentAlreadyRegisteredException, AgentException, MalformedXMLException, IOException, EncodingFailedException, SerializationException, InterruptedException, TimeoutException, AgentAccessDeniedException { LocalNode node = new LocalNodeManager().launchNode(); node.startService(ServiceNameVersion.fromString("[email protected]"), "a pass"); node.startService(ServiceNameVersion.fromString("[email protected]"), "a pass"); node.startService(ServiceNameVersion.fromString("[email protected]"), "a pass"); node.startService(ServiceNameVersion.fromString("[email protected]"), "a pass"); PassphraseAgentImpl userAgent = MockAgentFactory.getAdam(); userAgent.unlock("adamspass"); node.registerReceiver(userAgent); Message request = new Message(userAgent, ServiceAgentImpl.serviceNameToTopicId("i5.las2peer.api.TestService"), new ServiceDiscoveryContent(ServiceNameVersion.fromString("i5.las2peer.api.TestService@1"), false), 30000); Message[] answers = node.sendMessageAndCollectAnswers(request, 4); assertEquals(2, answers.length); boolean found10 = false, found11 = false; for (Message m : answers) { m.open(userAgent, node); ServiceDiscoveryContent c = (ServiceDiscoveryContent) m.getContent(); if (c.getService().getVersion().toString().equals("1.0")) { found10 = true; } else if (c.getService().getVersion().toString().equals("1.1")) { found11 = true; } } assertTrue(found10); assertTrue(found11); request = new Message(userAgent, ServiceAgentImpl.serviceNameToTopicId("i5.las2peer.api.TestService"), new ServiceDiscoveryContent(ServiceNameVersion.fromString("[email protected]"), true), 30000); answers = node.sendMessageAndCollectAnswers(request, 4); assertEquals(1, answers.length); answers[0].open(userAgent, node); ServiceDiscoveryContent c = (ServiceDiscoveryContent) answers[0].getContent(); assertTrue(c.getService().getVersion().toString().equals("1.1")); }
public static long serviceNameToTopicId(String service) { return SimpleTools.longHash(service); }
ServiceAgentImpl extends PassphraseAgentImpl implements ServiceAgent { public static long serviceNameToTopicId(String service) { return SimpleTools.longHash(service); } }
ServiceAgentImpl extends PassphraseAgentImpl implements ServiceAgent { public static long serviceNameToTopicId(String service) { return SimpleTools.longHash(service); } protected ServiceAgentImpl(ServiceNameVersion service, KeyPair pair, String passphrase, byte[] salt); protected ServiceAgentImpl(ServiceNameVersion service, PublicKey pubKey, byte[] encodedPrivate, byte[] salt); }
ServiceAgentImpl extends PassphraseAgentImpl implements ServiceAgent { public static long serviceNameToTopicId(String service) { return SimpleTools.longHash(service); } protected ServiceAgentImpl(ServiceNameVersion service, KeyPair pair, String passphrase, byte[] salt); protected ServiceAgentImpl(ServiceNameVersion service, PublicKey pubKey, byte[] encodedPrivate, byte[] salt); @Override ServiceNameVersion getServiceNameVersion(); @Override String toXmlString(); @Override void receiveMessage(Message m, AgentContext c); @Override void notifyUnregister(); @Deprecated static ServiceAgentImpl generateNewAgent(String forService, String passPhrase); static ServiceAgentImpl createServiceAgent(ServiceNameVersion service, String passphrase); @Deprecated static ServiceAgentImpl createServiceAgent(String serviceName, String passphrase); static ServiceAgentImpl createFromXml(String xml); static ServiceAgentImpl createFromXml(Element rootElement); @Override void notifyRegistrationTo(Node node); static long serviceNameToTopicId(String service); boolean isRunning(); Object invoke(String method, Object[] parameters); Serializable handle(RMITask task, AgentContext agentContext); Service getServiceInstance(); }
ServiceAgentImpl extends PassphraseAgentImpl implements ServiceAgent { public static long serviceNameToTopicId(String service) { return SimpleTools.longHash(service); } protected ServiceAgentImpl(ServiceNameVersion service, KeyPair pair, String passphrase, byte[] salt); protected ServiceAgentImpl(ServiceNameVersion service, PublicKey pubKey, byte[] encodedPrivate, byte[] salt); @Override ServiceNameVersion getServiceNameVersion(); @Override String toXmlString(); @Override void receiveMessage(Message m, AgentContext c); @Override void notifyUnregister(); @Deprecated static ServiceAgentImpl generateNewAgent(String forService, String passPhrase); static ServiceAgentImpl createServiceAgent(ServiceNameVersion service, String passphrase); @Deprecated static ServiceAgentImpl createServiceAgent(String serviceName, String passphrase); static ServiceAgentImpl createFromXml(String xml); static ServiceAgentImpl createFromXml(Element rootElement); @Override void notifyRegistrationTo(Node node); static long serviceNameToTopicId(String service); boolean isRunning(); Object invoke(String method, Object[] parameters); Serializable handle(RMITask task, AgentContext agentContext); Service getServiceInstance(); }
@Test public void testRequestAgent() throws MalformedXMLException, IOException, InternalSecurityException, CryptoException, SerializationException, AgentException, NodeException, AgentAccessDeniedException { LocalNode node = new LocalNodeManager().newNode(); UserAgentImpl adam = MockAgentFactory.getAdam(); adam.unlock("adamspass"); GroupAgentImpl group1 = MockAgentFactory.getGroup1(); group1.unlock(adam); GroupAgentImpl groupA = MockAgentFactory.getGroupA(); groupA.unlock(adam); GroupAgentImpl groupSuper = GroupAgentImpl.createGroupAgent(new AgentImpl[] { group1, groupA }); groupSuper.unlock(group1); try { node.storeAgent(group1); } catch (AgentAlreadyRegisteredException e) { } try { node.storeAgent(groupA); } catch (AgentAlreadyRegisteredException e) { } node.storeAgent(groupSuper); node.launch(); UserAgentImpl eve = MockAgentFactory.getEve(); eve.unlock("evespass"); AgentContext context = new AgentContext(node, eve); try { GroupAgentImpl a = (GroupAgentImpl) context.requestAgent(group1.getIdentifier()); assertEquals(a.getIdentifier(), group1.getIdentifier()); } catch (Exception e) { e.printStackTrace(); fail("exception thrown: " + e); } try { context.requestAgent(groupA.getIdentifier()); fail("exception expected"); } catch (Exception e) { } try { GroupAgentImpl a = (GroupAgentImpl) context.requestAgent(groupSuper.getIdentifier()); assertEquals(a.getIdentifier(), groupSuper.getIdentifier()); } catch (Exception e) { e.printStackTrace(); fail("exception thrown: " + e); } }
public Agent requestAgent(String agentId) throws AgentAccessDeniedException, AgentNotFoundException, AgentOperationFailedException { if (agentId.equalsIgnoreCase(getMainAgent().getIdentifier())) { return getMainAgent(); } else { try { return requestGroupAgent(agentId); } catch (AgentAccessDeniedException e) { throw new AgentAccessDeniedException("Access to agent denied!", e); } } }
AgentContext implements AgentStorage { public Agent requestAgent(String agentId) throws AgentAccessDeniedException, AgentNotFoundException, AgentOperationFailedException { if (agentId.equalsIgnoreCase(getMainAgent().getIdentifier())) { return getMainAgent(); } else { try { return requestGroupAgent(agentId); } catch (AgentAccessDeniedException e) { throw new AgentAccessDeniedException("Access to agent denied!", e); } } } }
AgentContext implements AgentStorage { public Agent requestAgent(String agentId) throws AgentAccessDeniedException, AgentNotFoundException, AgentOperationFailedException { if (agentId.equalsIgnoreCase(getMainAgent().getIdentifier())) { return getMainAgent(); } else { try { return requestGroupAgent(agentId); } catch (AgentAccessDeniedException e) { throw new AgentAccessDeniedException("Access to agent denied!", e); } } } AgentContext(Node localNode, AgentImpl mainAgent); }
AgentContext implements AgentStorage { public Agent requestAgent(String agentId) throws AgentAccessDeniedException, AgentNotFoundException, AgentOperationFailedException { if (agentId.equalsIgnoreCase(getMainAgent().getIdentifier())) { return getMainAgent(); } else { try { return requestGroupAgent(agentId); } catch (AgentAccessDeniedException e) { throw new AgentAccessDeniedException("Access to agent denied!", e); } } } AgentContext(Node localNode, AgentImpl mainAgent); void unlockMainAgent(String passphrase); AgentImpl getMainAgent(); GroupAgentImpl requestGroupAgent(String groupId); Agent requestAgent(String agentId); boolean hasAccess(String agentId); boolean isMemberRecursive(GroupAgentImpl groupAgent, String agentId); Node getLocalNode(); void touch(); long getLastUsageTimestamp(); @Override AgentImpl getAgent(String id); @Override boolean hasAgent(String id); static AgentContext getCurrent(); }
AgentContext implements AgentStorage { public Agent requestAgent(String agentId) throws AgentAccessDeniedException, AgentNotFoundException, AgentOperationFailedException { if (agentId.equalsIgnoreCase(getMainAgent().getIdentifier())) { return getMainAgent(); } else { try { return requestGroupAgent(agentId); } catch (AgentAccessDeniedException e) { throw new AgentAccessDeniedException("Access to agent denied!", e); } } } AgentContext(Node localNode, AgentImpl mainAgent); void unlockMainAgent(String passphrase); AgentImpl getMainAgent(); GroupAgentImpl requestGroupAgent(String groupId); Agent requestAgent(String agentId); boolean hasAccess(String agentId); boolean isMemberRecursive(GroupAgentImpl groupAgent, String agentId); Node getLocalNode(); void touch(); long getLastUsageTimestamp(); @Override AgentImpl getAgent(String id); @Override boolean hasAgent(String id); static AgentContext getCurrent(); }
@Test public void testHasAccess() throws MalformedXMLException, IOException, InternalSecurityException, CryptoException, SerializationException, AgentException, NodeException, AgentAccessDeniedException { LocalNode node = new LocalNodeManager().newNode(); UserAgentImpl adam = MockAgentFactory.getAdam(); adam.unlock("adamspass"); GroupAgentImpl group1 = MockAgentFactory.getGroup1(); group1.unlock(adam); GroupAgentImpl groupA = MockAgentFactory.getGroupA(); groupA.unlock(adam); GroupAgentImpl groupSuper = GroupAgentImpl.createGroupAgent(new AgentImpl[] { group1, groupA }); groupSuper.unlock(group1); try { node.storeAgent(group1); } catch (AgentAlreadyRegisteredException e) { } try { node.storeAgent(groupA); } catch (AgentAlreadyRegisteredException e) { } node.storeAgent(groupSuper); node.launch(); UserAgentImpl eve = MockAgentFactory.getEve(); eve.unlock("evespass"); AgentContext context = new AgentContext(node, eve); try { boolean result = context.hasAccess(group1.getIdentifier()); assertTrue(result); } catch (Exception e) { e.printStackTrace(); fail("exception thrown: " + e); } try { boolean result = context.hasAccess(groupA.getIdentifier()); assertFalse(result); } catch (Exception e) { e.printStackTrace(); fail("exception thrown: " + e); } try { boolean result = context.hasAccess(groupSuper.getIdentifier()); assertTrue(result); } catch (Exception e) { e.printStackTrace(); fail("exception thrown: " + e); } }
public boolean hasAccess(String agentId) throws AgentNotFoundException { if (agent.getIdentifier().equals(agentId)) { return true; } AgentImpl a; try { a = getAgent(agentId); } catch (AgentException e) { throw new AgentNotFoundException("Agent could not be found!", e); } if (a instanceof GroupAgentImpl) { return isMemberRecursive((GroupAgentImpl) a, agent.getIdentifier()); } return false; }
AgentContext implements AgentStorage { public boolean hasAccess(String agentId) throws AgentNotFoundException { if (agent.getIdentifier().equals(agentId)) { return true; } AgentImpl a; try { a = getAgent(agentId); } catch (AgentException e) { throw new AgentNotFoundException("Agent could not be found!", e); } if (a instanceof GroupAgentImpl) { return isMemberRecursive((GroupAgentImpl) a, agent.getIdentifier()); } return false; } }
AgentContext implements AgentStorage { public boolean hasAccess(String agentId) throws AgentNotFoundException { if (agent.getIdentifier().equals(agentId)) { return true; } AgentImpl a; try { a = getAgent(agentId); } catch (AgentException e) { throw new AgentNotFoundException("Agent could not be found!", e); } if (a instanceof GroupAgentImpl) { return isMemberRecursive((GroupAgentImpl) a, agent.getIdentifier()); } return false; } AgentContext(Node localNode, AgentImpl mainAgent); }
AgentContext implements AgentStorage { public boolean hasAccess(String agentId) throws AgentNotFoundException { if (agent.getIdentifier().equals(agentId)) { return true; } AgentImpl a; try { a = getAgent(agentId); } catch (AgentException e) { throw new AgentNotFoundException("Agent could not be found!", e); } if (a instanceof GroupAgentImpl) { return isMemberRecursive((GroupAgentImpl) a, agent.getIdentifier()); } return false; } AgentContext(Node localNode, AgentImpl mainAgent); void unlockMainAgent(String passphrase); AgentImpl getMainAgent(); GroupAgentImpl requestGroupAgent(String groupId); Agent requestAgent(String agentId); boolean hasAccess(String agentId); boolean isMemberRecursive(GroupAgentImpl groupAgent, String agentId); Node getLocalNode(); void touch(); long getLastUsageTimestamp(); @Override AgentImpl getAgent(String id); @Override boolean hasAgent(String id); static AgentContext getCurrent(); }
AgentContext implements AgentStorage { public boolean hasAccess(String agentId) throws AgentNotFoundException { if (agent.getIdentifier().equals(agentId)) { return true; } AgentImpl a; try { a = getAgent(agentId); } catch (AgentException e) { throw new AgentNotFoundException("Agent could not be found!", e); } if (a instanceof GroupAgentImpl) { return isMemberRecursive((GroupAgentImpl) a, agent.getIdentifier()); } return false; } AgentContext(Node localNode, AgentImpl mainAgent); void unlockMainAgent(String passphrase); AgentImpl getMainAgent(); GroupAgentImpl requestGroupAgent(String groupId); Agent requestAgent(String agentId); boolean hasAccess(String agentId); boolean isMemberRecursive(GroupAgentImpl groupAgent, String agentId); Node getLocalNode(); void touch(); long getLastUsageTimestamp(); @Override AgentImpl getAgent(String id); @Override boolean hasAgent(String id); static AgentContext getCurrent(); }
@Test public void testCreation() { assertFalse(anonymousAgent.isLocked()); }
@Override public boolean isLocked() { return false; }
AnonymousAgentImpl extends AgentImpl implements AnonymousAgent { @Override public boolean isLocked() { return false; } }
AnonymousAgentImpl extends AgentImpl implements AnonymousAgent { @Override public boolean isLocked() { return false; } private AnonymousAgentImpl(); }
AnonymousAgentImpl extends AgentImpl implements AnonymousAgent { @Override public boolean isLocked() { return false; } private AnonymousAgentImpl(); static AnonymousAgentImpl getInstance(); @Override String toXmlString(); @Override void receiveMessage(Message message, AgentContext c); @Override void unlockPrivateKey(SecretKey key); @Override void encryptPrivateKey(SecretKey key); @Override boolean isLocked(); @Override String getIdentifier(); @Override PublicKey getPublicKey(); @Override SecretKey decryptSymmetricKey(byte[] crypted); @Override Signature createSignature(); @Override byte[] signContent(byte[] plainData); @Override boolean equals(Object other); }
AnonymousAgentImpl extends AgentImpl implements AnonymousAgent { @Override public boolean isLocked() { return false; } private AnonymousAgentImpl(); static AnonymousAgentImpl getInstance(); @Override String toXmlString(); @Override void receiveMessage(Message message, AgentContext c); @Override void unlockPrivateKey(SecretKey key); @Override void encryptPrivateKey(SecretKey key); @Override boolean isLocked(); @Override String getIdentifier(); @Override PublicKey getPublicKey(); @Override SecretKey decryptSymmetricKey(byte[] crypted); @Override Signature createSignature(); @Override byte[] signContent(byte[] plainData); @Override boolean equals(Object other); }
@Test public void testOperations() throws AgentNotFoundException, AgentException, InternalSecurityException { AnonymousAgent a = (AnonymousAgent) node.getAgent(AnonymousAgent.IDENTIFIER); assertEquals(a.getIdentifier(), AnonymousAgent.IDENTIFIER); a = (AnonymousAgent) node.getAgent(AnonymousAgent.LOGIN_NAME); assertEquals(a.getIdentifier(), AnonymousAgent.IDENTIFIER); try { node.storeAgent(anonymousAgent); fail("Exception expected"); } catch (AgentException e) { } }
@Override public String getIdentifier() { return AnonymousAgent.IDENTIFIER; }
AnonymousAgentImpl extends AgentImpl implements AnonymousAgent { @Override public String getIdentifier() { return AnonymousAgent.IDENTIFIER; } }
AnonymousAgentImpl extends AgentImpl implements AnonymousAgent { @Override public String getIdentifier() { return AnonymousAgent.IDENTIFIER; } private AnonymousAgentImpl(); }
AnonymousAgentImpl extends AgentImpl implements AnonymousAgent { @Override public String getIdentifier() { return AnonymousAgent.IDENTIFIER; } private AnonymousAgentImpl(); static AnonymousAgentImpl getInstance(); @Override String toXmlString(); @Override void receiveMessage(Message message, AgentContext c); @Override void unlockPrivateKey(SecretKey key); @Override void encryptPrivateKey(SecretKey key); @Override boolean isLocked(); @Override String getIdentifier(); @Override PublicKey getPublicKey(); @Override SecretKey decryptSymmetricKey(byte[] crypted); @Override Signature createSignature(); @Override byte[] signContent(byte[] plainData); @Override boolean equals(Object other); }
AnonymousAgentImpl extends AgentImpl implements AnonymousAgent { @Override public String getIdentifier() { return AnonymousAgent.IDENTIFIER; } private AnonymousAgentImpl(); static AnonymousAgentImpl getInstance(); @Override String toXmlString(); @Override void receiveMessage(Message message, AgentContext c); @Override void unlockPrivateKey(SecretKey key); @Override void encryptPrivateKey(SecretKey key); @Override boolean isLocked(); @Override String getIdentifier(); @Override PublicKey getPublicKey(); @Override SecretKey decryptSymmetricKey(byte[] crypted); @Override Signature createSignature(); @Override byte[] signContent(byte[] plainData); @Override boolean equals(Object other); }
@Test public void testCollisionWithoutCollisionManager() { try { PastryNodeImpl node1 = nodes.get(0); UserAgentImpl smith = MockAgentFactory.getAdam(); smith.unlock("adamspass"); EnvelopeVersion envelope1 = node1.createUnencryptedEnvelope("test", smith.getPublicKey(), "Hello World 1!"); EnvelopeVersion envelope2 = node1.createUnencryptedEnvelope("test", smith.getPublicKey(), "Hello World 2!"); node1.storeEnvelopeAsync(envelope1, smith, new StorageStoreResultHandler() { @Override public void onResult(Serializable serializable, int successfulOperations) { System.out.println("Successfully stored artifact " + successfulOperations + " times"); node1.storeEnvelopeAsync(envelope2, smith, new StorageStoreResultHandler() { @Override public void onResult(Serializable serializable, int successfulOperations) { Assert.fail("Exception expected!"); } }, null, new StorageExceptionHandler() { private boolean testComplete = false; @Override public void onException(Exception e) { synchronized (this) { if (e instanceof EnvelopeAlreadyExistsException) { System.out.println("Expected exception '" + e.toString() + "' received."); testComplete = true; asyncTestState = true; } else if (!testComplete) { storageExceptionHandler.onException(e); } } } }); } }, null, storageExceptionHandler); System.out.println("Waiting ..."); for (int n = 1; n <= 100; n++) { if (asyncTestState) { return; } Thread.sleep(100); } Assert.fail("No collision occurred!"); } catch (Exception e) { e.printStackTrace(); Assert.fail(e.toString()); } }
@Override public String toString() { return identifier + "#" + version; }
EnvelopeVersion implements Serializable, XmlAble { @Override public String toString() { return identifier + "#" + version; } }
EnvelopeVersion implements Serializable, XmlAble { @Override public String toString() { return identifier + "#" + version; } private EnvelopeVersion(String identifier, long version, PublicKey authorPubKey, HashMap<PublicKey, byte[]> readerKeys, HashSet<String> readerGroupIds, byte[] rawContent); protected EnvelopeVersion(String identifier, PublicKey authorPubKey, Serializable content, Collection<?> readers); protected EnvelopeVersion(EnvelopeVersion previousVersion, Serializable content); protected EnvelopeVersion(EnvelopeVersion previousVersion, Serializable content, Collection<?> readers); protected EnvelopeVersion(String identifier, long version, PublicKey authorPubKey, Serializable content, Collection<?> readers, Set<String> readerGroups); }
EnvelopeVersion implements Serializable, XmlAble { @Override public String toString() { return identifier + "#" + version; } private EnvelopeVersion(String identifier, long version, PublicKey authorPubKey, HashMap<PublicKey, byte[]> readerKeys, HashSet<String> readerGroupIds, byte[] rawContent); protected EnvelopeVersion(String identifier, PublicKey authorPubKey, Serializable content, Collection<?> readers); protected EnvelopeVersion(EnvelopeVersion previousVersion, Serializable content); protected EnvelopeVersion(EnvelopeVersion previousVersion, Serializable content, Collection<?> readers); protected EnvelopeVersion(String identifier, long version, PublicKey authorPubKey, Serializable content, Collection<?> readers, Set<String> readerGroups); static String getAgentIdentifier(String agentId); String getIdentifier(); long getVersion(); PublicKey getAuthorPublicKey(); @Override String toString(); boolean isEncrypted(); HashMap<PublicKey, byte[]> getReaderKeys(); Set<String> getReaderGroupIds(); Serializable getContent(); Serializable getContent(AgentContext context); @Override String toXmlString(); static EnvelopeVersion createFromXml(Element rootElement); static EnvelopeVersion createFromXml(String xml); }
EnvelopeVersion implements Serializable, XmlAble { @Override public String toString() { return identifier + "#" + version; } private EnvelopeVersion(String identifier, long version, PublicKey authorPubKey, HashMap<PublicKey, byte[]> readerKeys, HashSet<String> readerGroupIds, byte[] rawContent); protected EnvelopeVersion(String identifier, PublicKey authorPubKey, Serializable content, Collection<?> readers); protected EnvelopeVersion(EnvelopeVersion previousVersion, Serializable content); protected EnvelopeVersion(EnvelopeVersion previousVersion, Serializable content, Collection<?> readers); protected EnvelopeVersion(String identifier, long version, PublicKey authorPubKey, Serializable content, Collection<?> readers, Set<String> readerGroups); static String getAgentIdentifier(String agentId); String getIdentifier(); long getVersion(); PublicKey getAuthorPublicKey(); @Override String toString(); boolean isEncrypted(); HashMap<PublicKey, byte[]> getReaderKeys(); Set<String> getReaderGroupIds(); Serializable getContent(); Serializable getContent(AgentContext context); @Override String toXmlString(); static EnvelopeVersion createFromXml(Element rootElement); static EnvelopeVersion createFromXml(String xml); static final long LATEST_VERSION; static final long NULL_VERSION; static final long START_VERSION; static final long MAX_UPDATE_CYCLES; }
@Test public void testMainNormal() { String className = "[email protected]"; ServiceAgentGenerator.main(new String[] { className, "mypass" }); assertEquals("", standardError.toString()); String output = standardOut.toString(); assertTrue(output.contains("serviceclass=\"" + className + "\"")); }
public static void main(String argv[]) { if (argv.length != 2) { System.err.println( "usage: java i5.las2peer.tools.ServiceAgentGenerator [service class]@[service version] [passphrase]"); return; } else if (argv[0].length() < PW_MIN_LENGTH) { System.err.println("the password needs to be at least " + PW_MIN_LENGTH + " signs long, but only " + argv[0].length() + " given"); return; } try { ServiceAgentImpl agent = ServiceAgentImpl.createServiceAgent(ServiceNameVersion.fromString(argv[0]), argv[1]); System.out.print(agent.toXmlString()); } catch (Exception e) { System.err.println("unable to generate new agent: " + e); } }
ServiceAgentGenerator { public static void main(String argv[]) { if (argv.length != 2) { System.err.println( "usage: java i5.las2peer.tools.ServiceAgentGenerator [service class]@[service version] [passphrase]"); return; } else if (argv[0].length() < PW_MIN_LENGTH) { System.err.println("the password needs to be at least " + PW_MIN_LENGTH + " signs long, but only " + argv[0].length() + " given"); return; } try { ServiceAgentImpl agent = ServiceAgentImpl.createServiceAgent(ServiceNameVersion.fromString(argv[0]), argv[1]); System.out.print(agent.toXmlString()); } catch (Exception e) { System.err.println("unable to generate new agent: " + e); } } }
ServiceAgentGenerator { public static void main(String argv[]) { if (argv.length != 2) { System.err.println( "usage: java i5.las2peer.tools.ServiceAgentGenerator [service class]@[service version] [passphrase]"); return; } else if (argv[0].length() < PW_MIN_LENGTH) { System.err.println("the password needs to be at least " + PW_MIN_LENGTH + " signs long, but only " + argv[0].length() + " given"); return; } try { ServiceAgentImpl agent = ServiceAgentImpl.createServiceAgent(ServiceNameVersion.fromString(argv[0]), argv[1]); System.out.print(agent.toXmlString()); } catch (Exception e) { System.err.println("unable to generate new agent: " + e); } } }
ServiceAgentGenerator { public static void main(String argv[]) { if (argv.length != 2) { System.err.println( "usage: java i5.las2peer.tools.ServiceAgentGenerator [service class]@[service version] [passphrase]"); return; } else if (argv[0].length() < PW_MIN_LENGTH) { System.err.println("the password needs to be at least " + PW_MIN_LENGTH + " signs long, but only " + argv[0].length() + " given"); return; } try { ServiceAgentImpl agent = ServiceAgentImpl.createServiceAgent(ServiceNameVersion.fromString(argv[0]), argv[1]); System.out.print(agent.toXmlString()); } catch (Exception e) { System.err.println("unable to generate new agent: " + e); } } static void main(String argv[]); }
ServiceAgentGenerator { public static void main(String argv[]) { if (argv.length != 2) { System.err.println( "usage: java i5.las2peer.tools.ServiceAgentGenerator [service class]@[service version] [passphrase]"); return; } else if (argv[0].length() < PW_MIN_LENGTH) { System.err.println("the password needs to be at least " + PW_MIN_LENGTH + " signs long, but only " + argv[0].length() + " given"); return; } try { ServiceAgentImpl agent = ServiceAgentImpl.createServiceAgent(ServiceNameVersion.fromString(argv[0]), argv[1]); System.out.print(agent.toXmlString()); } catch (Exception e) { System.err.println("unable to generate new agent: " + e); } } static void main(String argv[]); }
@Test public void testCollisionWithMergeCancelation() { try { PastryNodeImpl node1 = nodes.get(0); UserAgentImpl smith = MockAgentFactory.getAdam(); smith.unlock("adamspass"); EnvelopeVersion envelope1 = node1.createUnencryptedEnvelope("test", smith.getPublicKey(), "Hello World 1!"); EnvelopeVersion envelope2 = node1.createUnencryptedEnvelope("test", smith.getPublicKey(), "Hello World 2!"); node1.storeEnvelopeAsync(envelope1, smith, new StorageStoreResultHandler() { @Override public void onResult(Serializable serializable, int successfulOperations) { System.out.println("Successfully stored artifact " + successfulOperations + " times"); node1.storeEnvelopeAsync(envelope2, smith, new StorageStoreResultHandler() { @Override public void onResult(Serializable serializable, int successfulOperations) { Assert.fail("Exception expected!"); } }, new StorageCollisionHandler() { @Override public String onCollision(EnvelopeVersion toStore, EnvelopeVersion inNetwork, long numberOfCollisions) throws StopMergingException { throw new StopMergingException(); } @Override public Set<PublicKey> mergeReaders(Set<PublicKey> toStoreReaders, Set<PublicKey> inNetworkReaders) { return new HashSet<>(); } @Override public Set<String> mergeGroups(Set<String> toStoreGroups, Set<String> inNetworkGroups) { return new HashSet<>(); } }, new StorageExceptionHandler() { @Override public void onException(Exception e) { if (e instanceof StopMergingException) { System.out.println("Expected exception '" + e.toString() + "' received."); asyncTestState = true; } else { storageExceptionHandler.onException(e); } } }); } }, null, storageExceptionHandler); System.out.println("Waiting ..."); for (int n = 1; n <= 100; n++) { if (asyncTestState) { return; } Thread.sleep(100); } Assert.fail("No collision occurred!"); } catch (Exception e) { e.printStackTrace(); Assert.fail(e.toString()); } }
@Override public String toString() { return identifier + "#" + version; }
EnvelopeVersion implements Serializable, XmlAble { @Override public String toString() { return identifier + "#" + version; } }
EnvelopeVersion implements Serializable, XmlAble { @Override public String toString() { return identifier + "#" + version; } private EnvelopeVersion(String identifier, long version, PublicKey authorPubKey, HashMap<PublicKey, byte[]> readerKeys, HashSet<String> readerGroupIds, byte[] rawContent); protected EnvelopeVersion(String identifier, PublicKey authorPubKey, Serializable content, Collection<?> readers); protected EnvelopeVersion(EnvelopeVersion previousVersion, Serializable content); protected EnvelopeVersion(EnvelopeVersion previousVersion, Serializable content, Collection<?> readers); protected EnvelopeVersion(String identifier, long version, PublicKey authorPubKey, Serializable content, Collection<?> readers, Set<String> readerGroups); }
EnvelopeVersion implements Serializable, XmlAble { @Override public String toString() { return identifier + "#" + version; } private EnvelopeVersion(String identifier, long version, PublicKey authorPubKey, HashMap<PublicKey, byte[]> readerKeys, HashSet<String> readerGroupIds, byte[] rawContent); protected EnvelopeVersion(String identifier, PublicKey authorPubKey, Serializable content, Collection<?> readers); protected EnvelopeVersion(EnvelopeVersion previousVersion, Serializable content); protected EnvelopeVersion(EnvelopeVersion previousVersion, Serializable content, Collection<?> readers); protected EnvelopeVersion(String identifier, long version, PublicKey authorPubKey, Serializable content, Collection<?> readers, Set<String> readerGroups); static String getAgentIdentifier(String agentId); String getIdentifier(); long getVersion(); PublicKey getAuthorPublicKey(); @Override String toString(); boolean isEncrypted(); HashMap<PublicKey, byte[]> getReaderKeys(); Set<String> getReaderGroupIds(); Serializable getContent(); Serializable getContent(AgentContext context); @Override String toXmlString(); static EnvelopeVersion createFromXml(Element rootElement); static EnvelopeVersion createFromXml(String xml); }
EnvelopeVersion implements Serializable, XmlAble { @Override public String toString() { return identifier + "#" + version; } private EnvelopeVersion(String identifier, long version, PublicKey authorPubKey, HashMap<PublicKey, byte[]> readerKeys, HashSet<String> readerGroupIds, byte[] rawContent); protected EnvelopeVersion(String identifier, PublicKey authorPubKey, Serializable content, Collection<?> readers); protected EnvelopeVersion(EnvelopeVersion previousVersion, Serializable content); protected EnvelopeVersion(EnvelopeVersion previousVersion, Serializable content, Collection<?> readers); protected EnvelopeVersion(String identifier, long version, PublicKey authorPubKey, Serializable content, Collection<?> readers, Set<String> readerGroups); static String getAgentIdentifier(String agentId); String getIdentifier(); long getVersion(); PublicKey getAuthorPublicKey(); @Override String toString(); boolean isEncrypted(); HashMap<PublicKey, byte[]> getReaderKeys(); Set<String> getReaderGroupIds(); Serializable getContent(); Serializable getContent(AgentContext context); @Override String toXmlString(); static EnvelopeVersion createFromXml(Element rootElement); static EnvelopeVersion createFromXml(String xml); static final long LATEST_VERSION; static final long NULL_VERSION; static final long START_VERSION; static final long MAX_UPDATE_CYCLES; }
@Test public void testFetchNonExisting() { try { PastryNodeImpl node1 = nodes.get(0); System.out.println("Fetching artifact ..."); node1.fetchEnvelopeAsync("testtesttest", new StorageEnvelopeHandler() { @Override public void onEnvelopeReceived(EnvelopeVersion envelope) { Assert.fail("Unexpected result (" + envelope.toString() + ")!"); } }, new StorageExceptionHandler() { @Override public void onException(Exception e) { if (e instanceof EnvelopeNotFoundException) { System.out.println("Expected exception '" + e.toString() + "' received."); asyncTestState = true; } else { Assert.fail("Unexpected exception (" + e.toString() + ")!"); } } }); System.out.println("Waiting ..."); for (int n = 1; n <= 100; n++) { if (asyncTestState) { return; } Thread.sleep(100); } Assert.fail("Exception expected!"); } catch (Exception e) { e.printStackTrace(); Assert.fail(e.toString()); } }
@Override public String toString() { return identifier + "#" + version; }
EnvelopeVersion implements Serializable, XmlAble { @Override public String toString() { return identifier + "#" + version; } }
EnvelopeVersion implements Serializable, XmlAble { @Override public String toString() { return identifier + "#" + version; } private EnvelopeVersion(String identifier, long version, PublicKey authorPubKey, HashMap<PublicKey, byte[]> readerKeys, HashSet<String> readerGroupIds, byte[] rawContent); protected EnvelopeVersion(String identifier, PublicKey authorPubKey, Serializable content, Collection<?> readers); protected EnvelopeVersion(EnvelopeVersion previousVersion, Serializable content); protected EnvelopeVersion(EnvelopeVersion previousVersion, Serializable content, Collection<?> readers); protected EnvelopeVersion(String identifier, long version, PublicKey authorPubKey, Serializable content, Collection<?> readers, Set<String> readerGroups); }
EnvelopeVersion implements Serializable, XmlAble { @Override public String toString() { return identifier + "#" + version; } private EnvelopeVersion(String identifier, long version, PublicKey authorPubKey, HashMap<PublicKey, byte[]> readerKeys, HashSet<String> readerGroupIds, byte[] rawContent); protected EnvelopeVersion(String identifier, PublicKey authorPubKey, Serializable content, Collection<?> readers); protected EnvelopeVersion(EnvelopeVersion previousVersion, Serializable content); protected EnvelopeVersion(EnvelopeVersion previousVersion, Serializable content, Collection<?> readers); protected EnvelopeVersion(String identifier, long version, PublicKey authorPubKey, Serializable content, Collection<?> readers, Set<String> readerGroups); static String getAgentIdentifier(String agentId); String getIdentifier(); long getVersion(); PublicKey getAuthorPublicKey(); @Override String toString(); boolean isEncrypted(); HashMap<PublicKey, byte[]> getReaderKeys(); Set<String> getReaderGroupIds(); Serializable getContent(); Serializable getContent(AgentContext context); @Override String toXmlString(); static EnvelopeVersion createFromXml(Element rootElement); static EnvelopeVersion createFromXml(String xml); }
EnvelopeVersion implements Serializable, XmlAble { @Override public String toString() { return identifier + "#" + version; } private EnvelopeVersion(String identifier, long version, PublicKey authorPubKey, HashMap<PublicKey, byte[]> readerKeys, HashSet<String> readerGroupIds, byte[] rawContent); protected EnvelopeVersion(String identifier, PublicKey authorPubKey, Serializable content, Collection<?> readers); protected EnvelopeVersion(EnvelopeVersion previousVersion, Serializable content); protected EnvelopeVersion(EnvelopeVersion previousVersion, Serializable content, Collection<?> readers); protected EnvelopeVersion(String identifier, long version, PublicKey authorPubKey, Serializable content, Collection<?> readers, Set<String> readerGroups); static String getAgentIdentifier(String agentId); String getIdentifier(); long getVersion(); PublicKey getAuthorPublicKey(); @Override String toString(); boolean isEncrypted(); HashMap<PublicKey, byte[]> getReaderKeys(); Set<String> getReaderGroupIds(); Serializable getContent(); Serializable getContent(AgentContext context); @Override String toXmlString(); static EnvelopeVersion createFromXml(Element rootElement); static EnvelopeVersion createFromXml(String xml); static final long LATEST_VERSION; static final long NULL_VERSION; static final long START_VERSION; static final long MAX_UPDATE_CYCLES; }
@Test public void testChangeContentType() { try { PastryNodeImpl node1 = nodes.get(0); UserAgentImpl smith = MockAgentFactory.getAdam(); smith.unlock("adamspass"); EnvelopeVersion envelope1 = node1.createUnencryptedEnvelope("test", smith.getPublicKey(), "Hello World!"); node1.storeEnvelope(envelope1, smith); EnvelopeVersion envelope2 = node1.createUnencryptedEnvelope(envelope1, 123456789); node1.storeEnvelope(envelope2, smith); } catch (Exception e) { e.printStackTrace(); Assert.fail(e.toString()); } }
@Override public String toString() { return identifier + "#" + version; }
EnvelopeVersion implements Serializable, XmlAble { @Override public String toString() { return identifier + "#" + version; } }
EnvelopeVersion implements Serializable, XmlAble { @Override public String toString() { return identifier + "#" + version; } private EnvelopeVersion(String identifier, long version, PublicKey authorPubKey, HashMap<PublicKey, byte[]> readerKeys, HashSet<String> readerGroupIds, byte[] rawContent); protected EnvelopeVersion(String identifier, PublicKey authorPubKey, Serializable content, Collection<?> readers); protected EnvelopeVersion(EnvelopeVersion previousVersion, Serializable content); protected EnvelopeVersion(EnvelopeVersion previousVersion, Serializable content, Collection<?> readers); protected EnvelopeVersion(String identifier, long version, PublicKey authorPubKey, Serializable content, Collection<?> readers, Set<String> readerGroups); }
EnvelopeVersion implements Serializable, XmlAble { @Override public String toString() { return identifier + "#" + version; } private EnvelopeVersion(String identifier, long version, PublicKey authorPubKey, HashMap<PublicKey, byte[]> readerKeys, HashSet<String> readerGroupIds, byte[] rawContent); protected EnvelopeVersion(String identifier, PublicKey authorPubKey, Serializable content, Collection<?> readers); protected EnvelopeVersion(EnvelopeVersion previousVersion, Serializable content); protected EnvelopeVersion(EnvelopeVersion previousVersion, Serializable content, Collection<?> readers); protected EnvelopeVersion(String identifier, long version, PublicKey authorPubKey, Serializable content, Collection<?> readers, Set<String> readerGroups); static String getAgentIdentifier(String agentId); String getIdentifier(); long getVersion(); PublicKey getAuthorPublicKey(); @Override String toString(); boolean isEncrypted(); HashMap<PublicKey, byte[]> getReaderKeys(); Set<String> getReaderGroupIds(); Serializable getContent(); Serializable getContent(AgentContext context); @Override String toXmlString(); static EnvelopeVersion createFromXml(Element rootElement); static EnvelopeVersion createFromXml(String xml); }
EnvelopeVersion implements Serializable, XmlAble { @Override public String toString() { return identifier + "#" + version; } private EnvelopeVersion(String identifier, long version, PublicKey authorPubKey, HashMap<PublicKey, byte[]> readerKeys, HashSet<String> readerGroupIds, byte[] rawContent); protected EnvelopeVersion(String identifier, PublicKey authorPubKey, Serializable content, Collection<?> readers); protected EnvelopeVersion(EnvelopeVersion previousVersion, Serializable content); protected EnvelopeVersion(EnvelopeVersion previousVersion, Serializable content, Collection<?> readers); protected EnvelopeVersion(String identifier, long version, PublicKey authorPubKey, Serializable content, Collection<?> readers, Set<String> readerGroups); static String getAgentIdentifier(String agentId); String getIdentifier(); long getVersion(); PublicKey getAuthorPublicKey(); @Override String toString(); boolean isEncrypted(); HashMap<PublicKey, byte[]> getReaderKeys(); Set<String> getReaderGroupIds(); Serializable getContent(); Serializable getContent(AgentContext context); @Override String toXmlString(); static EnvelopeVersion createFromXml(Element rootElement); static EnvelopeVersion createFromXml(String xml); static final long LATEST_VERSION; static final long NULL_VERSION; static final long START_VERSION; static final long MAX_UPDATE_CYCLES; }
@Test public void testStoreAnonymous() { try { PastryNodeImpl node = nodes.get(0); AnonymousAgentImpl anonymous = AnonymousAgentImpl.getInstance(); node.storeAgent(anonymous); Assert.fail("Exception expected"); } catch (AgentException e) { } catch (Exception e) { e.printStackTrace(); Assert.fail(e.toString()); } }
@Override public String toString() { return identifier + "#" + version; }
EnvelopeVersion implements Serializable, XmlAble { @Override public String toString() { return identifier + "#" + version; } }
EnvelopeVersion implements Serializable, XmlAble { @Override public String toString() { return identifier + "#" + version; } private EnvelopeVersion(String identifier, long version, PublicKey authorPubKey, HashMap<PublicKey, byte[]> readerKeys, HashSet<String> readerGroupIds, byte[] rawContent); protected EnvelopeVersion(String identifier, PublicKey authorPubKey, Serializable content, Collection<?> readers); protected EnvelopeVersion(EnvelopeVersion previousVersion, Serializable content); protected EnvelopeVersion(EnvelopeVersion previousVersion, Serializable content, Collection<?> readers); protected EnvelopeVersion(String identifier, long version, PublicKey authorPubKey, Serializable content, Collection<?> readers, Set<String> readerGroups); }
EnvelopeVersion implements Serializable, XmlAble { @Override public String toString() { return identifier + "#" + version; } private EnvelopeVersion(String identifier, long version, PublicKey authorPubKey, HashMap<PublicKey, byte[]> readerKeys, HashSet<String> readerGroupIds, byte[] rawContent); protected EnvelopeVersion(String identifier, PublicKey authorPubKey, Serializable content, Collection<?> readers); protected EnvelopeVersion(EnvelopeVersion previousVersion, Serializable content); protected EnvelopeVersion(EnvelopeVersion previousVersion, Serializable content, Collection<?> readers); protected EnvelopeVersion(String identifier, long version, PublicKey authorPubKey, Serializable content, Collection<?> readers, Set<String> readerGroups); static String getAgentIdentifier(String agentId); String getIdentifier(); long getVersion(); PublicKey getAuthorPublicKey(); @Override String toString(); boolean isEncrypted(); HashMap<PublicKey, byte[]> getReaderKeys(); Set<String> getReaderGroupIds(); Serializable getContent(); Serializable getContent(AgentContext context); @Override String toXmlString(); static EnvelopeVersion createFromXml(Element rootElement); static EnvelopeVersion createFromXml(String xml); }
EnvelopeVersion implements Serializable, XmlAble { @Override public String toString() { return identifier + "#" + version; } private EnvelopeVersion(String identifier, long version, PublicKey authorPubKey, HashMap<PublicKey, byte[]> readerKeys, HashSet<String> readerGroupIds, byte[] rawContent); protected EnvelopeVersion(String identifier, PublicKey authorPubKey, Serializable content, Collection<?> readers); protected EnvelopeVersion(EnvelopeVersion previousVersion, Serializable content); protected EnvelopeVersion(EnvelopeVersion previousVersion, Serializable content, Collection<?> readers); protected EnvelopeVersion(String identifier, long version, PublicKey authorPubKey, Serializable content, Collection<?> readers, Set<String> readerGroups); static String getAgentIdentifier(String agentId); String getIdentifier(); long getVersion(); PublicKey getAuthorPublicKey(); @Override String toString(); boolean isEncrypted(); HashMap<PublicKey, byte[]> getReaderKeys(); Set<String> getReaderGroupIds(); Serializable getContent(); Serializable getContent(AgentContext context); @Override String toXmlString(); static EnvelopeVersion createFromXml(Element rootElement); static EnvelopeVersion createFromXml(String xml); static final long LATEST_VERSION; static final long NULL_VERSION; static final long START_VERSION; static final long MAX_UPDATE_CYCLES; }
@Test public void testOpen() { try { UserAgentImpl a = UserAgentImpl.createUserAgent("passa"); UserAgentImpl b = UserAgentImpl.createUserAgent("passb"); BasicAgentStorage storage = new BasicAgentStorage(); storage.registerAgents(a, b); a.unlock("passa"); Message testee = new Message(a, b, "some content"); assertNull(testee.getSender()); assertNull(testee.getRecipient()); assertTrue(b.getIdentifier().equalsIgnoreCase(testee.getRecipientId())); assertEquals(a.getIdentifier(), testee.getSenderId()); b.unlock("passb"); testee.open(b, storage); assertNotSame(a, testee.getSender()); assertEquals(b, testee.getRecipient()); assertEquals(a.getIdentifier(), testee.getSender().getIdentifier()); } catch (Exception e) { e.printStackTrace(); Assert.fail(e.toString()); } }
public void open(AgentStorage storage) throws InternalSecurityException, AgentException { open(null, storage); }
Message implements XmlAble, Cloneable { public void open(AgentStorage storage) throws InternalSecurityException, AgentException { open(null, storage); } }
Message implements XmlAble, Cloneable { public void open(AgentStorage storage) throws InternalSecurityException, AgentException { open(null, storage); } Message(); Message(AgentImpl from, AgentImpl to, Serializable data); Message(AgentImpl from, AgentImpl to, Serializable data, long timeOutMs); Message(AgentImpl from, AgentImpl to, XmlAble data); Message(AgentImpl from, AgentImpl to, XmlAble data, long timeoutMs); Message(AgentImpl from, long topic, Serializable data); Message(AgentImpl from, long topic, Serializable data, long timeoutMs); Message(Message responseTo, XmlAble data, long timeoutMs); Message(Message responseTo, XmlAble data); Message(Message responseTo, Serializable data, long timeoutMs); Message(Message responseTo, Serializable data); }
Message implements XmlAble, Cloneable { public void open(AgentStorage storage) throws InternalSecurityException, AgentException { open(null, storage); } Message(); Message(AgentImpl from, AgentImpl to, Serializable data); Message(AgentImpl from, AgentImpl to, Serializable data, long timeOutMs); Message(AgentImpl from, AgentImpl to, XmlAble data); Message(AgentImpl from, AgentImpl to, XmlAble data, long timeoutMs); Message(AgentImpl from, long topic, Serializable data); Message(AgentImpl from, long topic, Serializable data, long timeoutMs); Message(Message responseTo, XmlAble data, long timeoutMs); Message(Message responseTo, XmlAble data); Message(Message responseTo, Serializable data, long timeoutMs); Message(Message responseTo, Serializable data); AgentImpl getSender(); String getSenderId(); AgentImpl getRecipient(); String getRecipientId(); Long getTopicId(); boolean isTopic(); long getId(); Long getResponseToId(); boolean isResponse(); Object getContent(); void open(AgentStorage storage); void open(AgentImpl unlockedRecipient, AgentStorage storage); void open(AgentImpl unlockedRecipient, AgentStorage storage, ClassLoader contentClsLoader); void verifySignature(); void close(); boolean isOpen(); long getValidMs(); long getTimestamp(); Date getTimestampDate(); Date getTimeoutDate(); long getTimeoutTs(); boolean isExpired(); @Override String toXmlString(); void setStateFromXml(String xml); void setSendingNodeId(NodeHandle handle); void setSendingNodeId(Long id); void setRecipientId(String id); void setSendingNodeId(Object id); Serializable getSendingNodeId(); static Message createFromXml(String xml); @Override Message clone(); }
Message implements XmlAble, Cloneable { public void open(AgentStorage storage) throws InternalSecurityException, AgentException { open(null, storage); } Message(); Message(AgentImpl from, AgentImpl to, Serializable data); Message(AgentImpl from, AgentImpl to, Serializable data, long timeOutMs); Message(AgentImpl from, AgentImpl to, XmlAble data); Message(AgentImpl from, AgentImpl to, XmlAble data, long timeoutMs); Message(AgentImpl from, long topic, Serializable data); Message(AgentImpl from, long topic, Serializable data, long timeoutMs); Message(Message responseTo, XmlAble data, long timeoutMs); Message(Message responseTo, XmlAble data); Message(Message responseTo, Serializable data, long timeoutMs); Message(Message responseTo, Serializable data); AgentImpl getSender(); String getSenderId(); AgentImpl getRecipient(); String getRecipientId(); Long getTopicId(); boolean isTopic(); long getId(); Long getResponseToId(); boolean isResponse(); Object getContent(); void open(AgentStorage storage); void open(AgentImpl unlockedRecipient, AgentStorage storage); void open(AgentImpl unlockedRecipient, AgentStorage storage, ClassLoader contentClsLoader); void verifySignature(); void close(); boolean isOpen(); long getValidMs(); long getTimestamp(); Date getTimestampDate(); Date getTimeoutDate(); long getTimeoutTs(); boolean isExpired(); @Override String toXmlString(); void setStateFromXml(String xml); void setSendingNodeId(NodeHandle handle); void setSendingNodeId(Long id); void setRecipientId(String id); void setSendingNodeId(Object id); Serializable getSendingNodeId(); static Message createFromXml(String xml); @Override Message clone(); static final long DEFAULT_TIMEOUT; }
@Test public void testPrintMessage() { try { UserAgentImpl eve = MockAgentFactory.getEve(); UserAgentImpl adam = MockAgentFactory.getAdam(); eve.unlock("evespass"); Message m = new Message(eve, adam, "a simple content string"); String xml = m.toXmlString(); System.out.println("------ XML message output ------"); System.out.println(xml); System.out.println("------ / XML message output ------"); } catch (Exception e) { e.printStackTrace(); Assert.fail(e.toString()); } }
@Override public String toXmlString() { String response = ""; if (responseToId != null) { response = " responseTo=\"" + responseToId + "\""; } String sending = ""; if (sendingNodeId != null) { if (sendingNodeId instanceof Long || sendingNodeId instanceof NodeHandle) { try { sending = "\t<sendingNode encoding=\"base64\">" + SerializeTools.serializeToBase64(sendingNodeId) + "</sendingNode>\n"; } catch (SerializationException e) { } } } String base64ContentKey = ""; if (baContentKey != null) { base64ContentKey = Base64.getEncoder().encodeToString(baContentKey); } String receiver; String contentKey = ""; String encryption = ""; if (!isTopic()) { receiver = "to=\"" + recipientId + "\""; encryption = " encryption=\"" + CryptoTools.getSymmetricAlgorithm() + "\""; contentKey = "\t<contentKey encryption=\"" + CryptoTools.getAsymmetricAlgorithm() + "\" encoding=\"base64\">" + base64ContentKey + "</contentKey>\n"; } else { receiver = "topic=\"" + topicId + "\""; } String base64Signature = ""; if (baSignature != null) { base64Signature = Base64.getEncoder().encodeToString(baSignature); } return "<las2peer:message" + " id=\"" + id + "\"" + response + " from=\"" + senderId + "\" " + receiver + " generated=\"" + timestampMs + "\" timeout=\"" + validMs + "\">\n" + sending + "\t<content" + encryption + " encoding=\"base64\">" + Base64.getEncoder().encodeToString(baEncryptedContent) + "</content>\n" + contentKey + "\t<signature encoding=\"base64\" method=\"" + CryptoTools.getSignatureMethod() + "\">" + base64Signature + "</signature>\n" + "</las2peer:message>\n"; }
Message implements XmlAble, Cloneable { @Override public String toXmlString() { String response = ""; if (responseToId != null) { response = " responseTo=\"" + responseToId + "\""; } String sending = ""; if (sendingNodeId != null) { if (sendingNodeId instanceof Long || sendingNodeId instanceof NodeHandle) { try { sending = "\t<sendingNode encoding=\"base64\">" + SerializeTools.serializeToBase64(sendingNodeId) + "</sendingNode>\n"; } catch (SerializationException e) { } } } String base64ContentKey = ""; if (baContentKey != null) { base64ContentKey = Base64.getEncoder().encodeToString(baContentKey); } String receiver; String contentKey = ""; String encryption = ""; if (!isTopic()) { receiver = "to=\"" + recipientId + "\""; encryption = " encryption=\"" + CryptoTools.getSymmetricAlgorithm() + "\""; contentKey = "\t<contentKey encryption=\"" + CryptoTools.getAsymmetricAlgorithm() + "\" encoding=\"base64\">" + base64ContentKey + "</contentKey>\n"; } else { receiver = "topic=\"" + topicId + "\""; } String base64Signature = ""; if (baSignature != null) { base64Signature = Base64.getEncoder().encodeToString(baSignature); } return "<las2peer:message" + " id=\"" + id + "\"" + response + " from=\"" + senderId + "\" " + receiver + " generated=\"" + timestampMs + "\" timeout=\"" + validMs + "\">\n" + sending + "\t<content" + encryption + " encoding=\"base64\">" + Base64.getEncoder().encodeToString(baEncryptedContent) + "</content>\n" + contentKey + "\t<signature encoding=\"base64\" method=\"" + CryptoTools.getSignatureMethod() + "\">" + base64Signature + "</signature>\n" + "</las2peer:message>\n"; } }
Message implements XmlAble, Cloneable { @Override public String toXmlString() { String response = ""; if (responseToId != null) { response = " responseTo=\"" + responseToId + "\""; } String sending = ""; if (sendingNodeId != null) { if (sendingNodeId instanceof Long || sendingNodeId instanceof NodeHandle) { try { sending = "\t<sendingNode encoding=\"base64\">" + SerializeTools.serializeToBase64(sendingNodeId) + "</sendingNode>\n"; } catch (SerializationException e) { } } } String base64ContentKey = ""; if (baContentKey != null) { base64ContentKey = Base64.getEncoder().encodeToString(baContentKey); } String receiver; String contentKey = ""; String encryption = ""; if (!isTopic()) { receiver = "to=\"" + recipientId + "\""; encryption = " encryption=\"" + CryptoTools.getSymmetricAlgorithm() + "\""; contentKey = "\t<contentKey encryption=\"" + CryptoTools.getAsymmetricAlgorithm() + "\" encoding=\"base64\">" + base64ContentKey + "</contentKey>\n"; } else { receiver = "topic=\"" + topicId + "\""; } String base64Signature = ""; if (baSignature != null) { base64Signature = Base64.getEncoder().encodeToString(baSignature); } return "<las2peer:message" + " id=\"" + id + "\"" + response + " from=\"" + senderId + "\" " + receiver + " generated=\"" + timestampMs + "\" timeout=\"" + validMs + "\">\n" + sending + "\t<content" + encryption + " encoding=\"base64\">" + Base64.getEncoder().encodeToString(baEncryptedContent) + "</content>\n" + contentKey + "\t<signature encoding=\"base64\" method=\"" + CryptoTools.getSignatureMethod() + "\">" + base64Signature + "</signature>\n" + "</las2peer:message>\n"; } Message(); Message(AgentImpl from, AgentImpl to, Serializable data); Message(AgentImpl from, AgentImpl to, Serializable data, long timeOutMs); Message(AgentImpl from, AgentImpl to, XmlAble data); Message(AgentImpl from, AgentImpl to, XmlAble data, long timeoutMs); Message(AgentImpl from, long topic, Serializable data); Message(AgentImpl from, long topic, Serializable data, long timeoutMs); Message(Message responseTo, XmlAble data, long timeoutMs); Message(Message responseTo, XmlAble data); Message(Message responseTo, Serializable data, long timeoutMs); Message(Message responseTo, Serializable data); }
Message implements XmlAble, Cloneable { @Override public String toXmlString() { String response = ""; if (responseToId != null) { response = " responseTo=\"" + responseToId + "\""; } String sending = ""; if (sendingNodeId != null) { if (sendingNodeId instanceof Long || sendingNodeId instanceof NodeHandle) { try { sending = "\t<sendingNode encoding=\"base64\">" + SerializeTools.serializeToBase64(sendingNodeId) + "</sendingNode>\n"; } catch (SerializationException e) { } } } String base64ContentKey = ""; if (baContentKey != null) { base64ContentKey = Base64.getEncoder().encodeToString(baContentKey); } String receiver; String contentKey = ""; String encryption = ""; if (!isTopic()) { receiver = "to=\"" + recipientId + "\""; encryption = " encryption=\"" + CryptoTools.getSymmetricAlgorithm() + "\""; contentKey = "\t<contentKey encryption=\"" + CryptoTools.getAsymmetricAlgorithm() + "\" encoding=\"base64\">" + base64ContentKey + "</contentKey>\n"; } else { receiver = "topic=\"" + topicId + "\""; } String base64Signature = ""; if (baSignature != null) { base64Signature = Base64.getEncoder().encodeToString(baSignature); } return "<las2peer:message" + " id=\"" + id + "\"" + response + " from=\"" + senderId + "\" " + receiver + " generated=\"" + timestampMs + "\" timeout=\"" + validMs + "\">\n" + sending + "\t<content" + encryption + " encoding=\"base64\">" + Base64.getEncoder().encodeToString(baEncryptedContent) + "</content>\n" + contentKey + "\t<signature encoding=\"base64\" method=\"" + CryptoTools.getSignatureMethod() + "\">" + base64Signature + "</signature>\n" + "</las2peer:message>\n"; } Message(); Message(AgentImpl from, AgentImpl to, Serializable data); Message(AgentImpl from, AgentImpl to, Serializable data, long timeOutMs); Message(AgentImpl from, AgentImpl to, XmlAble data); Message(AgentImpl from, AgentImpl to, XmlAble data, long timeoutMs); Message(AgentImpl from, long topic, Serializable data); Message(AgentImpl from, long topic, Serializable data, long timeoutMs); Message(Message responseTo, XmlAble data, long timeoutMs); Message(Message responseTo, XmlAble data); Message(Message responseTo, Serializable data, long timeoutMs); Message(Message responseTo, Serializable data); AgentImpl getSender(); String getSenderId(); AgentImpl getRecipient(); String getRecipientId(); Long getTopicId(); boolean isTopic(); long getId(); Long getResponseToId(); boolean isResponse(); Object getContent(); void open(AgentStorage storage); void open(AgentImpl unlockedRecipient, AgentStorage storage); void open(AgentImpl unlockedRecipient, AgentStorage storage, ClassLoader contentClsLoader); void verifySignature(); void close(); boolean isOpen(); long getValidMs(); long getTimestamp(); Date getTimestampDate(); Date getTimeoutDate(); long getTimeoutTs(); boolean isExpired(); @Override String toXmlString(); void setStateFromXml(String xml); void setSendingNodeId(NodeHandle handle); void setSendingNodeId(Long id); void setRecipientId(String id); void setSendingNodeId(Object id); Serializable getSendingNodeId(); static Message createFromXml(String xml); @Override Message clone(); }
Message implements XmlAble, Cloneable { @Override public String toXmlString() { String response = ""; if (responseToId != null) { response = " responseTo=\"" + responseToId + "\""; } String sending = ""; if (sendingNodeId != null) { if (sendingNodeId instanceof Long || sendingNodeId instanceof NodeHandle) { try { sending = "\t<sendingNode encoding=\"base64\">" + SerializeTools.serializeToBase64(sendingNodeId) + "</sendingNode>\n"; } catch (SerializationException e) { } } } String base64ContentKey = ""; if (baContentKey != null) { base64ContentKey = Base64.getEncoder().encodeToString(baContentKey); } String receiver; String contentKey = ""; String encryption = ""; if (!isTopic()) { receiver = "to=\"" + recipientId + "\""; encryption = " encryption=\"" + CryptoTools.getSymmetricAlgorithm() + "\""; contentKey = "\t<contentKey encryption=\"" + CryptoTools.getAsymmetricAlgorithm() + "\" encoding=\"base64\">" + base64ContentKey + "</contentKey>\n"; } else { receiver = "topic=\"" + topicId + "\""; } String base64Signature = ""; if (baSignature != null) { base64Signature = Base64.getEncoder().encodeToString(baSignature); } return "<las2peer:message" + " id=\"" + id + "\"" + response + " from=\"" + senderId + "\" " + receiver + " generated=\"" + timestampMs + "\" timeout=\"" + validMs + "\">\n" + sending + "\t<content" + encryption + " encoding=\"base64\">" + Base64.getEncoder().encodeToString(baEncryptedContent) + "</content>\n" + contentKey + "\t<signature encoding=\"base64\" method=\"" + CryptoTools.getSignatureMethod() + "\">" + base64Signature + "</signature>\n" + "</las2peer:message>\n"; } Message(); Message(AgentImpl from, AgentImpl to, Serializable data); Message(AgentImpl from, AgentImpl to, Serializable data, long timeOutMs); Message(AgentImpl from, AgentImpl to, XmlAble data); Message(AgentImpl from, AgentImpl to, XmlAble data, long timeoutMs); Message(AgentImpl from, long topic, Serializable data); Message(AgentImpl from, long topic, Serializable data, long timeoutMs); Message(Message responseTo, XmlAble data, long timeoutMs); Message(Message responseTo, XmlAble data); Message(Message responseTo, Serializable data, long timeoutMs); Message(Message responseTo, Serializable data); AgentImpl getSender(); String getSenderId(); AgentImpl getRecipient(); String getRecipientId(); Long getTopicId(); boolean isTopic(); long getId(); Long getResponseToId(); boolean isResponse(); Object getContent(); void open(AgentStorage storage); void open(AgentImpl unlockedRecipient, AgentStorage storage); void open(AgentImpl unlockedRecipient, AgentStorage storage, ClassLoader contentClsLoader); void verifySignature(); void close(); boolean isOpen(); long getValidMs(); long getTimestamp(); Date getTimestampDate(); Date getTimeoutDate(); long getTimeoutTs(); boolean isExpired(); @Override String toXmlString(); void setStateFromXml(String xml); void setSendingNodeId(NodeHandle handle); void setSendingNodeId(Long id); void setRecipientId(String id); void setSendingNodeId(Object id); Serializable getSendingNodeId(); static Message createFromXml(String xml); @Override Message clone(); static final long DEFAULT_TIMEOUT; }
@Test public void testStoreAnonymous() { try { AnonymousAgentImpl anonymous = AnonymousAgentImpl.getInstance(); context.storeAgent(anonymous); Assert.fail("Exception expected"); } catch (AgentAccessDeniedException e) { } catch (Exception e) { e.printStackTrace(); Assert.fail(e.toString()); } }
@Override public void storeAgent(Agent agent) throws AgentAccessDeniedException, AgentAlreadyExistsException, AgentOperationFailedException, AgentLockedException { if (agent.isLocked()) { throw new AgentLockedException(); } else if (agent instanceof AnonymousAgent) { throw new AgentAccessDeniedException("Anonymous agent must not be stored"); } else if (agent instanceof GroupAgentImpl) { ((GroupAgentImpl) agent).apply(); } try { node.storeAgent((AgentImpl) agent); } catch (AgentAlreadyExistsException | AgentLockedException | AgentAccessDeniedException | AgentOperationFailedException e) { throw e; } catch (AgentException e) { throw new AgentOperationFailedException(e); } }
ExecutionContext implements Context { @Override public void storeAgent(Agent agent) throws AgentAccessDeniedException, AgentAlreadyExistsException, AgentOperationFailedException, AgentLockedException { if (agent.isLocked()) { throw new AgentLockedException(); } else if (agent instanceof AnonymousAgent) { throw new AgentAccessDeniedException("Anonymous agent must not be stored"); } else if (agent instanceof GroupAgentImpl) { ((GroupAgentImpl) agent).apply(); } try { node.storeAgent((AgentImpl) agent); } catch (AgentAlreadyExistsException | AgentLockedException | AgentAccessDeniedException | AgentOperationFailedException e) { throw e; } catch (AgentException e) { throw new AgentOperationFailedException(e); } } }
ExecutionContext implements Context { @Override public void storeAgent(Agent agent) throws AgentAccessDeniedException, AgentAlreadyExistsException, AgentOperationFailedException, AgentLockedException { if (agent.isLocked()) { throw new AgentLockedException(); } else if (agent instanceof AnonymousAgent) { throw new AgentAccessDeniedException("Anonymous agent must not be stored"); } else if (agent instanceof GroupAgentImpl) { ((GroupAgentImpl) agent).apply(); } try { node.storeAgent((AgentImpl) agent); } catch (AgentAlreadyExistsException | AgentLockedException | AgentAccessDeniedException | AgentOperationFailedException e) { throw e; } catch (AgentException e) { throw new AgentOperationFailedException(e); } } ExecutionContext(ServiceAgentImpl agent, AgentContext context, Node node); }
ExecutionContext implements Context { @Override public void storeAgent(Agent agent) throws AgentAccessDeniedException, AgentAlreadyExistsException, AgentOperationFailedException, AgentLockedException { if (agent.isLocked()) { throw new AgentLockedException(); } else if (agent instanceof AnonymousAgent) { throw new AgentAccessDeniedException("Anonymous agent must not be stored"); } else if (agent instanceof GroupAgentImpl) { ((GroupAgentImpl) agent).apply(); } try { node.storeAgent((AgentImpl) agent); } catch (AgentAlreadyExistsException | AgentLockedException | AgentAccessDeniedException | AgentOperationFailedException e) { throw e; } catch (AgentException e) { throw new AgentOperationFailedException(e); } } ExecutionContext(ServiceAgentImpl agent, AgentContext context, Node node); static ExecutionContext getCurrent(); AgentContext getCallerContext(); @Override ClassLoader getServiceClassLoader(); @Override ExecutorService getExecutor(); @Override Service getService(); @SuppressWarnings("unchecked") @Override T getService(Class<T> serviceType); @Override ServiceAgent getServiceAgent(); @Override Agent getMainAgent(); @Override Serializable invoke(String service, String method, Serializable... parameters); @Override Serializable invoke(ServiceNameVersion service, String method, Serializable... parameters); @Override Serializable invokeInternally(String service, String method, Serializable... parameters); @Override Serializable invokeInternally(ServiceNameVersion service, String method, Serializable... parameters); @Override void monitorEvent(String message); @Override void monitorEvent(MonitoringEvent event, String message); @Override void monitorEvent(Object from, MonitoringEvent event, String message); @Override void monitorEvent(Object from, MonitoringEvent event, String message, boolean includeActingUser); @Override UserAgent createUserAgent(String passphrase); @Override GroupAgent createGroupAgent(Agent[] members); @Override Agent fetchAgent(String agentId); @Override Agent requestAgent(String agentId, Agent using); @Override Agent requestAgent(String agentId); @Override void storeAgent(Agent agent); @Override boolean hasAccess(String agentId, Agent using); @Override boolean hasAccess(String agentId); @Override String getUserAgentIdentifierByLoginName(String loginName); @Override String getUserAgentIdentifierByEmail(String emailAddress); @Override void registerReceiver(MessageReceiver receiver); @Override Logger getLogger(Class<?> cls); @Override Envelope requestEnvelope(String identifier, Agent using); @Override Envelope requestEnvelope(String identifier); @Override void storeEnvelope(Envelope env, Agent using); @Override void storeEnvelope(Envelope env); @Override void storeEnvelope(Envelope env, EnvelopeCollisionHandler handler, Agent using); @Override void storeEnvelope(Envelope env, EnvelopeCollisionHandler handler); @Override void reclaimEnvelope(String identifier, Agent using); @Override void reclaimEnvelope(String identifier); @Override Envelope createEnvelope(String identifier, Agent using); @Override Envelope createEnvelope(String identifier); }
ExecutionContext implements Context { @Override public void storeAgent(Agent agent) throws AgentAccessDeniedException, AgentAlreadyExistsException, AgentOperationFailedException, AgentLockedException { if (agent.isLocked()) { throw new AgentLockedException(); } else if (agent instanceof AnonymousAgent) { throw new AgentAccessDeniedException("Anonymous agent must not be stored"); } else if (agent instanceof GroupAgentImpl) { ((GroupAgentImpl) agent).apply(); } try { node.storeAgent((AgentImpl) agent); } catch (AgentAlreadyExistsException | AgentLockedException | AgentAccessDeniedException | AgentOperationFailedException e) { throw e; } catch (AgentException e) { throw new AgentOperationFailedException(e); } } ExecutionContext(ServiceAgentImpl agent, AgentContext context, Node node); static ExecutionContext getCurrent(); AgentContext getCallerContext(); @Override ClassLoader getServiceClassLoader(); @Override ExecutorService getExecutor(); @Override Service getService(); @SuppressWarnings("unchecked") @Override T getService(Class<T> serviceType); @Override ServiceAgent getServiceAgent(); @Override Agent getMainAgent(); @Override Serializable invoke(String service, String method, Serializable... parameters); @Override Serializable invoke(ServiceNameVersion service, String method, Serializable... parameters); @Override Serializable invokeInternally(String service, String method, Serializable... parameters); @Override Serializable invokeInternally(ServiceNameVersion service, String method, Serializable... parameters); @Override void monitorEvent(String message); @Override void monitorEvent(MonitoringEvent event, String message); @Override void monitorEvent(Object from, MonitoringEvent event, String message); @Override void monitorEvent(Object from, MonitoringEvent event, String message, boolean includeActingUser); @Override UserAgent createUserAgent(String passphrase); @Override GroupAgent createGroupAgent(Agent[] members); @Override Agent fetchAgent(String agentId); @Override Agent requestAgent(String agentId, Agent using); @Override Agent requestAgent(String agentId); @Override void storeAgent(Agent agent); @Override boolean hasAccess(String agentId, Agent using); @Override boolean hasAccess(String agentId); @Override String getUserAgentIdentifierByLoginName(String loginName); @Override String getUserAgentIdentifierByEmail(String emailAddress); @Override void registerReceiver(MessageReceiver receiver); @Override Logger getLogger(Class<?> cls); @Override Envelope requestEnvelope(String identifier, Agent using); @Override Envelope requestEnvelope(String identifier); @Override void storeEnvelope(Envelope env, Agent using); @Override void storeEnvelope(Envelope env); @Override void storeEnvelope(Envelope env, EnvelopeCollisionHandler handler, Agent using); @Override void storeEnvelope(Envelope env, EnvelopeCollisionHandler handler); @Override void reclaimEnvelope(String identifier, Agent using); @Override void reclaimEnvelope(String identifier); @Override Envelope createEnvelope(String identifier, Agent using); @Override Envelope createEnvelope(String identifier); }
@Test public void testInvocation() throws SecurityException, IllegalArgumentException, ServiceMethodNotFoundException, IllegalAccessException, InvocationTargetException, InternalSecurityException { TestService testee = new TestService(); assertEquals(10, ServiceHelper.execute(testee, "getInt")); assertEquals(4, ServiceHelper.execute(testee, "inc", 2)); assertEquals(4, ServiceHelper.execute(testee, "inc", new Integer(2))); }
public static Object execute(Service service, String method) throws ServiceMethodNotFoundException, IllegalArgumentException, IllegalAccessException, InvocationTargetException { return execute(service, method, new Object[0]); }
ServiceHelper { public static Object execute(Service service, String method) throws ServiceMethodNotFoundException, IllegalArgumentException, IllegalAccessException, InvocationTargetException { return execute(service, method, new Object[0]); } }
ServiceHelper { public static Object execute(Service service, String method) throws ServiceMethodNotFoundException, IllegalArgumentException, IllegalAccessException, InvocationTargetException { return execute(service, method, new Object[0]); } }
ServiceHelper { public static Object execute(Service service, String method) throws ServiceMethodNotFoundException, IllegalArgumentException, IllegalAccessException, InvocationTargetException { return execute(service, method, new Object[0]); } static Class<?> getWrapperClass(Class<?> c); static boolean isWrapperClass(Class<?> c); static boolean isSubclass(Class<?> subClass, Class<?> superClass); static Class<?> getUnwrappedClass(Class<?> c); static Object execute(Service service, String method); static Object execute(Service service, String method, Object... parameters); static Method searchMethod(Class<? extends Service> serviceClass, String methodName, Object[] params); static String getParameterString(Object[] params); }
ServiceHelper { public static Object execute(Service service, String method) throws ServiceMethodNotFoundException, IllegalArgumentException, IllegalAccessException, InvocationTargetException { return execute(service, method, new Object[0]); } static Class<?> getWrapperClass(Class<?> c); static boolean isWrapperClass(Class<?> c); static boolean isSubclass(Class<?> subClass, Class<?> superClass); static Class<?> getUnwrappedClass(Class<?> c); static Object execute(Service service, String method); static Object execute(Service service, String method, Object... parameters); static Method searchMethod(Class<? extends Service> serviceClass, String methodName, Object[] params); static String getParameterString(Object[] params); }
@Test public void testSubclassParam() throws SecurityException, IllegalArgumentException, IllegalAccessException, InvocationTargetException, InternalSecurityException, ServiceMethodNotFoundException { TestService testee = new TestService(); assertEquals("testnachricht", ServiceHelper.execute(testee, "subclass", new SecurityException("testnachricht"))); }
public static Object execute(Service service, String method) throws ServiceMethodNotFoundException, IllegalArgumentException, IllegalAccessException, InvocationTargetException { return execute(service, method, new Object[0]); }
ServiceHelper { public static Object execute(Service service, String method) throws ServiceMethodNotFoundException, IllegalArgumentException, IllegalAccessException, InvocationTargetException { return execute(service, method, new Object[0]); } }
ServiceHelper { public static Object execute(Service service, String method) throws ServiceMethodNotFoundException, IllegalArgumentException, IllegalAccessException, InvocationTargetException { return execute(service, method, new Object[0]); } }
ServiceHelper { public static Object execute(Service service, String method) throws ServiceMethodNotFoundException, IllegalArgumentException, IllegalAccessException, InvocationTargetException { return execute(service, method, new Object[0]); } static Class<?> getWrapperClass(Class<?> c); static boolean isWrapperClass(Class<?> c); static boolean isSubclass(Class<?> subClass, Class<?> superClass); static Class<?> getUnwrappedClass(Class<?> c); static Object execute(Service service, String method); static Object execute(Service service, String method, Object... parameters); static Method searchMethod(Class<? extends Service> serviceClass, String methodName, Object[] params); static String getParameterString(Object[] params); }
ServiceHelper { public static Object execute(Service service, String method) throws ServiceMethodNotFoundException, IllegalArgumentException, IllegalAccessException, InvocationTargetException { return execute(service, method, new Object[0]); } static Class<?> getWrapperClass(Class<?> c); static boolean isWrapperClass(Class<?> c); static boolean isSubclass(Class<?> subClass, Class<?> superClass); static Class<?> getUnwrappedClass(Class<?> c); static Object execute(Service service, String method); static Object execute(Service service, String method, Object... parameters); static Method searchMethod(Class<? extends Service> serviceClass, String methodName, Object[] params); static String getParameterString(Object[] params); }
@Test public void testExceptions() throws SecurityException, IllegalArgumentException, IllegalAccessException, InvocationTargetException, InternalSecurityException { TestService testee = new TestService(); try { ServiceHelper.execute(testee, "privateMethod"); fail("ServiceMethodNotFoundException expected"); } catch (ServiceMethodNotFoundException e) { } try { ServiceHelper.execute(testee, "protectedMethod"); fail("ServiceMethodNotFoundException expected"); } catch (ServiceMethodNotFoundException e) { } try { ServiceHelper.execute(testee, "staticMethod"); fail("ServiceMethodNotFoundException expected"); } catch (ServiceMethodNotFoundException e) { } }
public static Object execute(Service service, String method) throws ServiceMethodNotFoundException, IllegalArgumentException, IllegalAccessException, InvocationTargetException { return execute(service, method, new Object[0]); }
ServiceHelper { public static Object execute(Service service, String method) throws ServiceMethodNotFoundException, IllegalArgumentException, IllegalAccessException, InvocationTargetException { return execute(service, method, new Object[0]); } }
ServiceHelper { public static Object execute(Service service, String method) throws ServiceMethodNotFoundException, IllegalArgumentException, IllegalAccessException, InvocationTargetException { return execute(service, method, new Object[0]); } }
ServiceHelper { public static Object execute(Service service, String method) throws ServiceMethodNotFoundException, IllegalArgumentException, IllegalAccessException, InvocationTargetException { return execute(service, method, new Object[0]); } static Class<?> getWrapperClass(Class<?> c); static boolean isWrapperClass(Class<?> c); static boolean isSubclass(Class<?> subClass, Class<?> superClass); static Class<?> getUnwrappedClass(Class<?> c); static Object execute(Service service, String method); static Object execute(Service service, String method, Object... parameters); static Method searchMethod(Class<? extends Service> serviceClass, String methodName, Object[] params); static String getParameterString(Object[] params); }
ServiceHelper { public static Object execute(Service service, String method) throws ServiceMethodNotFoundException, IllegalArgumentException, IllegalAccessException, InvocationTargetException { return execute(service, method, new Object[0]); } static Class<?> getWrapperClass(Class<?> c); static boolean isWrapperClass(Class<?> c); static boolean isSubclass(Class<?> subClass, Class<?> superClass); static Class<?> getUnwrappedClass(Class<?> c); static Object execute(Service service, String method); static Object execute(Service service, String method, Object... parameters); static Method searchMethod(Class<? extends Service> serviceClass, String methodName, Object[] params); static String getParameterString(Object[] params); }
@Test public void testJoin() { assertEquals("", SimpleTools.join((Object[]) null, "abc")); assertEquals("", SimpleTools.join(new Object[0], "dkefde")); assertEquals("a, b, c", SimpleTools.join(new Object[] { "a", 'b', "c" }, ", ")); assertEquals("10.20.30", SimpleTools.join(new Integer[] { 10, 20, 30 }, ".")); }
public static String join(Object[] objects, String glue) { if (objects == null) { return ""; } return SimpleTools.join(Arrays.asList(objects), glue); }
SimpleTools { public static String join(Object[] objects, String glue) { if (objects == null) { return ""; } return SimpleTools.join(Arrays.asList(objects), glue); } }
SimpleTools { public static String join(Object[] objects, String glue) { if (objects == null) { return ""; } return SimpleTools.join(Arrays.asList(objects), glue); } }
SimpleTools { public static String join(Object[] objects, String glue) { if (objects == null) { return ""; } return SimpleTools.join(Arrays.asList(objects), glue); } static long longHash(String s); static String createRandomString(int length); static String join(Object[] objects, String glue); static String join(Iterable<?> objects, String glue); static String repeat(String string, int count); static String repeat(Object o, int count); static byte[] toByteArray(InputStream is); static String byteToHexString(byte[] bytes); static int getSystemDefinedPort(); }
SimpleTools { public static String join(Object[] objects, String glue) { if (objects == null) { return ""; } return SimpleTools.join(Arrays.asList(objects), glue); } static long longHash(String s); static String createRandomString(int length); static String join(Object[] objects, String glue); static String join(Iterable<?> objects, String glue); static String repeat(String string, int count); static String repeat(Object o, int count); static byte[] toByteArray(InputStream is); static String byteToHexString(byte[] bytes); static int getSystemDefinedPort(); static final String sRandomStringCharSet; }
@Test public void testNotMethodService() { try { MiniClient c = new MiniClient(); c.setConnectorEndpoint(connector.getHttpEndpoint()); c.setLogin(testAgent.getIdentifier(), testPass); ClientResponse response = c.sendRequest("GET", "service1/asdag", ""); Assert.assertEquals(404, response.getHttpCode()); } catch (Exception e) { Assert.fail("Not existing service caused wrong exception"); } }
public String getHttpEndpoint() { return "http: }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); void setLogFile(String filename); void setHttpPort(Integer port); void setHttpsPort(Integer port); void enableHttpHttps(boolean http, boolean https); @Deprecated void setSocketTimeout(int timeoutInMs); void setLogStream(OutputStream stream); void setSslKeyPassword(String password); void setSslKeystore(String keystore); void setCrossOriginResourceDomain(String cord); String getCrossOriginResourceDomain(); void setCrossOriginResourceMaxAge(int maxAge); int getCrossOriginResourceMaxAge(); void setCrossOriginResourceSharing(boolean enable); boolean isCrossOriginResourceSharing(); void setPreferLocalServices(boolean enable); @Override void start(Node node); String getRootCAFilename(); String getMyHostname(); String getHttpsEndpoint(); String getHttpEndpoint(); @Override synchronized void stop(); Node getL2pNode(); void logMessage(String message); void logError(String message, Throwable throwable); void logError(String message); NameLock getLockOidc(); String getOidcClientId(); String getOidcClientSecret(); int getHttpPort(); int getHttpsPort(); X509Certificate getCACertificate(); AgentImpl authenticateAgent(MultivaluedMap<String, String> requestHeaders, String accessTokenQueryParam); AgentSession getOrCreateSession(PassphraseAgentImpl agent); AgentSession getSessionById(String sessionid); void destroySession(String sessionId); String generateToken(); }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); void setLogFile(String filename); void setHttpPort(Integer port); void setHttpsPort(Integer port); void enableHttpHttps(boolean http, boolean https); @Deprecated void setSocketTimeout(int timeoutInMs); void setLogStream(OutputStream stream); void setSslKeyPassword(String password); void setSslKeystore(String keystore); void setCrossOriginResourceDomain(String cord); String getCrossOriginResourceDomain(); void setCrossOriginResourceMaxAge(int maxAge); int getCrossOriginResourceMaxAge(); void setCrossOriginResourceSharing(boolean enable); boolean isCrossOriginResourceSharing(); void setPreferLocalServices(boolean enable); @Override void start(Node node); String getRootCAFilename(); String getMyHostname(); String getHttpsEndpoint(); String getHttpEndpoint(); @Override synchronized void stop(); Node getL2pNode(); void logMessage(String message); void logError(String message, Throwable throwable); void logError(String message); NameLock getLockOidc(); String getOidcClientId(); String getOidcClientSecret(); int getHttpPort(); int getHttpsPort(); X509Certificate getCACertificate(); AgentImpl authenticateAgent(MultivaluedMap<String, String> requestHeaders, String accessTokenQueryParam); AgentSession getOrCreateSession(PassphraseAgentImpl agent); AgentSession getSessionById(String sessionid); void destroySession(String sessionId); String generateToken(); static final int DEFAULT_HTTP_PORT; static final String WEB_CONNECTOR; static final int DEFAULT_HTTPS_PORT; static final boolean DEFAULT_START_HTTP; static final boolean DEFAULT_START_HTTPS; static final String DEFAULT_CROSS_ORIGIN_RESOURCE_DOMAIN; static final int DEFAULT_CROSS_ORIGIN_RESOURCE_MAX_AGE; static final boolean DEFAULT_ENABLE_CROSS_ORIGIN_RESOURCE_SHARING; static final boolean DEFAULT_ONLY_LOCAL_SERVICES; static final String SESSION_COOKIE; static final String DEFAULT_DEFAULT_OIDC_PROVIDER; public String defaultOIDCProvider; public ArrayList<String> oidcProviders; static final int DEFAULT_MAX_CONNECTIONS; static final String COOKIE_SESSIONID_KEY; static final int DEFAULT_SESSION_TIMEOUT; static final int DEFAULT_MAX_THREADS; static final int DEFAULT_MAX_REQUEST_BODY_SIZE; static final String SSL_INSTANCE_NAME; public Map<String, JSONObject> oidcProviderInfos; }
@Test public void testLogin() { MiniClient c = new MiniClient(); c.setConnectorEndpoint(connector.getHttpEndpoint()); try { c.setLogin(testAgent.getIdentifier(), testPass); ClientResponse result = c.sendRequest("get", "test/ok", ""); Assert.assertEquals("OK", result.getResponse().trim()); } catch (Exception e) { e.printStackTrace(); Assert.fail("Exception: " + e); } try { c.setLogin("adam", testPass); ClientResponse result = c.sendRequest("GET", "test/ok", ""); Assert.assertEquals("OK", result.getResponse().trim()); } catch (Exception e) { e.printStackTrace(); Assert.fail("Exception: " + e); } try { c.setLogin(testAgent.getIdentifier(), "aaaaaaaaaaaaa"); ClientResponse result = c.sendRequest("GET", "test/ok", ""); Assert.assertEquals(401, result.getHttpCode()); } catch (Exception e) { e.printStackTrace(); Assert.fail("Exception: " + e); } try { c.setLogin(Long.toString(65464), "aaaaaaaaaaaaa"); ClientResponse result = c.sendRequest("GET", "test/ok", ""); Assert.assertEquals(401, result.getHttpCode()); } catch (Exception e) { e.printStackTrace(); Assert.fail("Exception: " + e); } try { c = new MiniClient(); c.setConnectorEndpoint(connector.getHttpEndpoint()); c.setLogin(Long.toString(65464), "aaaaaaaaaaaaa"); ClientResponse result = c.sendRequest("GET", "test/ok", ""); Assert.assertEquals(401, result.getHttpCode()); } catch (Exception e) { e.printStackTrace(); Assert.fail("Exception: " + e); } }
public String getHttpEndpoint() { return "http: }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); void setLogFile(String filename); void setHttpPort(Integer port); void setHttpsPort(Integer port); void enableHttpHttps(boolean http, boolean https); @Deprecated void setSocketTimeout(int timeoutInMs); void setLogStream(OutputStream stream); void setSslKeyPassword(String password); void setSslKeystore(String keystore); void setCrossOriginResourceDomain(String cord); String getCrossOriginResourceDomain(); void setCrossOriginResourceMaxAge(int maxAge); int getCrossOriginResourceMaxAge(); void setCrossOriginResourceSharing(boolean enable); boolean isCrossOriginResourceSharing(); void setPreferLocalServices(boolean enable); @Override void start(Node node); String getRootCAFilename(); String getMyHostname(); String getHttpsEndpoint(); String getHttpEndpoint(); @Override synchronized void stop(); Node getL2pNode(); void logMessage(String message); void logError(String message, Throwable throwable); void logError(String message); NameLock getLockOidc(); String getOidcClientId(); String getOidcClientSecret(); int getHttpPort(); int getHttpsPort(); X509Certificate getCACertificate(); AgentImpl authenticateAgent(MultivaluedMap<String, String> requestHeaders, String accessTokenQueryParam); AgentSession getOrCreateSession(PassphraseAgentImpl agent); AgentSession getSessionById(String sessionid); void destroySession(String sessionId); String generateToken(); }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); void setLogFile(String filename); void setHttpPort(Integer port); void setHttpsPort(Integer port); void enableHttpHttps(boolean http, boolean https); @Deprecated void setSocketTimeout(int timeoutInMs); void setLogStream(OutputStream stream); void setSslKeyPassword(String password); void setSslKeystore(String keystore); void setCrossOriginResourceDomain(String cord); String getCrossOriginResourceDomain(); void setCrossOriginResourceMaxAge(int maxAge); int getCrossOriginResourceMaxAge(); void setCrossOriginResourceSharing(boolean enable); boolean isCrossOriginResourceSharing(); void setPreferLocalServices(boolean enable); @Override void start(Node node); String getRootCAFilename(); String getMyHostname(); String getHttpsEndpoint(); String getHttpEndpoint(); @Override synchronized void stop(); Node getL2pNode(); void logMessage(String message); void logError(String message, Throwable throwable); void logError(String message); NameLock getLockOidc(); String getOidcClientId(); String getOidcClientSecret(); int getHttpPort(); int getHttpsPort(); X509Certificate getCACertificate(); AgentImpl authenticateAgent(MultivaluedMap<String, String> requestHeaders, String accessTokenQueryParam); AgentSession getOrCreateSession(PassphraseAgentImpl agent); AgentSession getSessionById(String sessionid); void destroySession(String sessionId); String generateToken(); static final int DEFAULT_HTTP_PORT; static final String WEB_CONNECTOR; static final int DEFAULT_HTTPS_PORT; static final boolean DEFAULT_START_HTTP; static final boolean DEFAULT_START_HTTPS; static final String DEFAULT_CROSS_ORIGIN_RESOURCE_DOMAIN; static final int DEFAULT_CROSS_ORIGIN_RESOURCE_MAX_AGE; static final boolean DEFAULT_ENABLE_CROSS_ORIGIN_RESOURCE_SHARING; static final boolean DEFAULT_ONLY_LOCAL_SERVICES; static final String SESSION_COOKIE; static final String DEFAULT_DEFAULT_OIDC_PROVIDER; public String defaultOIDCProvider; public ArrayList<String> oidcProviders; static final int DEFAULT_MAX_CONNECTIONS; static final String COOKIE_SESSIONID_KEY; static final int DEFAULT_SESSION_TIMEOUT; static final int DEFAULT_MAX_THREADS; static final int DEFAULT_MAX_REQUEST_BODY_SIZE; static final String SSL_INSTANCE_NAME; public Map<String, JSONObject> oidcProviderInfos; }
@Test public void testExceptions() { try { MiniClient c = new MiniClient(); c.setConnectorEndpoint(connector.getHttpEndpoint()); c.setLogin(testAgent.getIdentifier(), testPass); ClientResponse result = c.sendRequest("GET", "doesNotExist", ""); Assert.assertEquals(404, result.getHttpCode()); result = c.sendRequest("GET", "test/exception", ""); Assert.assertEquals(500, result.getHttpCode()); } catch (Exception e) { e.printStackTrace(); Assert.fail("Exception: " + e); } }
public String getHttpEndpoint() { return "http: }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); void setLogFile(String filename); void setHttpPort(Integer port); void setHttpsPort(Integer port); void enableHttpHttps(boolean http, boolean https); @Deprecated void setSocketTimeout(int timeoutInMs); void setLogStream(OutputStream stream); void setSslKeyPassword(String password); void setSslKeystore(String keystore); void setCrossOriginResourceDomain(String cord); String getCrossOriginResourceDomain(); void setCrossOriginResourceMaxAge(int maxAge); int getCrossOriginResourceMaxAge(); void setCrossOriginResourceSharing(boolean enable); boolean isCrossOriginResourceSharing(); void setPreferLocalServices(boolean enable); @Override void start(Node node); String getRootCAFilename(); String getMyHostname(); String getHttpsEndpoint(); String getHttpEndpoint(); @Override synchronized void stop(); Node getL2pNode(); void logMessage(String message); void logError(String message, Throwable throwable); void logError(String message); NameLock getLockOidc(); String getOidcClientId(); String getOidcClientSecret(); int getHttpPort(); int getHttpsPort(); X509Certificate getCACertificate(); AgentImpl authenticateAgent(MultivaluedMap<String, String> requestHeaders, String accessTokenQueryParam); AgentSession getOrCreateSession(PassphraseAgentImpl agent); AgentSession getSessionById(String sessionid); void destroySession(String sessionId); String generateToken(); }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); void setLogFile(String filename); void setHttpPort(Integer port); void setHttpsPort(Integer port); void enableHttpHttps(boolean http, boolean https); @Deprecated void setSocketTimeout(int timeoutInMs); void setLogStream(OutputStream stream); void setSslKeyPassword(String password); void setSslKeystore(String keystore); void setCrossOriginResourceDomain(String cord); String getCrossOriginResourceDomain(); void setCrossOriginResourceMaxAge(int maxAge); int getCrossOriginResourceMaxAge(); void setCrossOriginResourceSharing(boolean enable); boolean isCrossOriginResourceSharing(); void setPreferLocalServices(boolean enable); @Override void start(Node node); String getRootCAFilename(); String getMyHostname(); String getHttpsEndpoint(); String getHttpEndpoint(); @Override synchronized void stop(); Node getL2pNode(); void logMessage(String message); void logError(String message, Throwable throwable); void logError(String message); NameLock getLockOidc(); String getOidcClientId(); String getOidcClientSecret(); int getHttpPort(); int getHttpsPort(); X509Certificate getCACertificate(); AgentImpl authenticateAgent(MultivaluedMap<String, String> requestHeaders, String accessTokenQueryParam); AgentSession getOrCreateSession(PassphraseAgentImpl agent); AgentSession getSessionById(String sessionid); void destroySession(String sessionId); String generateToken(); static final int DEFAULT_HTTP_PORT; static final String WEB_CONNECTOR; static final int DEFAULT_HTTPS_PORT; static final boolean DEFAULT_START_HTTP; static final boolean DEFAULT_START_HTTPS; static final String DEFAULT_CROSS_ORIGIN_RESOURCE_DOMAIN; static final int DEFAULT_CROSS_ORIGIN_RESOURCE_MAX_AGE; static final boolean DEFAULT_ENABLE_CROSS_ORIGIN_RESOURCE_SHARING; static final boolean DEFAULT_ONLY_LOCAL_SERVICES; static final String SESSION_COOKIE; static final String DEFAULT_DEFAULT_OIDC_PROVIDER; public String defaultOIDCProvider; public ArrayList<String> oidcProviders; static final int DEFAULT_MAX_CONNECTIONS; static final String COOKIE_SESSIONID_KEY; static final int DEFAULT_SESSION_TIMEOUT; static final int DEFAULT_MAX_THREADS; static final int DEFAULT_MAX_REQUEST_BODY_SIZE; static final String SSL_INSTANCE_NAME; public Map<String, JSONObject> oidcProviderInfos; }
@Test public void testCrossOriginHeader() { try { MiniClient c = new MiniClient(); c.setConnectorEndpoint(connector.getHttpEndpoint()); c.setLogin(testAgent.getIdentifier(), testPass); ClientResponse response = c.sendRequest("GET", "asdag", ""); Assert.assertEquals(connector.crossOriginResourceDomain, response.getHeader("Access-Control-Allow-Origin")); Assert.assertEquals(String.valueOf(connector.crossOriginResourceMaxAge), response.getHeader("Access-Control-Max-Age")); } catch (Exception e) { Assert.fail("Not existing service caused wrong exception"); } }
public String getHttpEndpoint() { return "http: }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); void setLogFile(String filename); void setHttpPort(Integer port); void setHttpsPort(Integer port); void enableHttpHttps(boolean http, boolean https); @Deprecated void setSocketTimeout(int timeoutInMs); void setLogStream(OutputStream stream); void setSslKeyPassword(String password); void setSslKeystore(String keystore); void setCrossOriginResourceDomain(String cord); String getCrossOriginResourceDomain(); void setCrossOriginResourceMaxAge(int maxAge); int getCrossOriginResourceMaxAge(); void setCrossOriginResourceSharing(boolean enable); boolean isCrossOriginResourceSharing(); void setPreferLocalServices(boolean enable); @Override void start(Node node); String getRootCAFilename(); String getMyHostname(); String getHttpsEndpoint(); String getHttpEndpoint(); @Override synchronized void stop(); Node getL2pNode(); void logMessage(String message); void logError(String message, Throwable throwable); void logError(String message); NameLock getLockOidc(); String getOidcClientId(); String getOidcClientSecret(); int getHttpPort(); int getHttpsPort(); X509Certificate getCACertificate(); AgentImpl authenticateAgent(MultivaluedMap<String, String> requestHeaders, String accessTokenQueryParam); AgentSession getOrCreateSession(PassphraseAgentImpl agent); AgentSession getSessionById(String sessionid); void destroySession(String sessionId); String generateToken(); }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); void setLogFile(String filename); void setHttpPort(Integer port); void setHttpsPort(Integer port); void enableHttpHttps(boolean http, boolean https); @Deprecated void setSocketTimeout(int timeoutInMs); void setLogStream(OutputStream stream); void setSslKeyPassword(String password); void setSslKeystore(String keystore); void setCrossOriginResourceDomain(String cord); String getCrossOriginResourceDomain(); void setCrossOriginResourceMaxAge(int maxAge); int getCrossOriginResourceMaxAge(); void setCrossOriginResourceSharing(boolean enable); boolean isCrossOriginResourceSharing(); void setPreferLocalServices(boolean enable); @Override void start(Node node); String getRootCAFilename(); String getMyHostname(); String getHttpsEndpoint(); String getHttpEndpoint(); @Override synchronized void stop(); Node getL2pNode(); void logMessage(String message); void logError(String message, Throwable throwable); void logError(String message); NameLock getLockOidc(); String getOidcClientId(); String getOidcClientSecret(); int getHttpPort(); int getHttpsPort(); X509Certificate getCACertificate(); AgentImpl authenticateAgent(MultivaluedMap<String, String> requestHeaders, String accessTokenQueryParam); AgentSession getOrCreateSession(PassphraseAgentImpl agent); AgentSession getSessionById(String sessionid); void destroySession(String sessionId); String generateToken(); static final int DEFAULT_HTTP_PORT; static final String WEB_CONNECTOR; static final int DEFAULT_HTTPS_PORT; static final boolean DEFAULT_START_HTTP; static final boolean DEFAULT_START_HTTPS; static final String DEFAULT_CROSS_ORIGIN_RESOURCE_DOMAIN; static final int DEFAULT_CROSS_ORIGIN_RESOURCE_MAX_AGE; static final boolean DEFAULT_ENABLE_CROSS_ORIGIN_RESOURCE_SHARING; static final boolean DEFAULT_ONLY_LOCAL_SERVICES; static final String SESSION_COOKIE; static final String DEFAULT_DEFAULT_OIDC_PROVIDER; public String defaultOIDCProvider; public ArrayList<String> oidcProviders; static final int DEFAULT_MAX_CONNECTIONS; static final String COOKIE_SESSIONID_KEY; static final int DEFAULT_SESSION_TIMEOUT; static final int DEFAULT_MAX_THREADS; static final int DEFAULT_MAX_REQUEST_BODY_SIZE; static final String SSL_INSTANCE_NAME; public Map<String, JSONObject> oidcProviderInfos; }
@Test public void testPath() { try { MiniClient c = new MiniClient(); c.setConnectorEndpoint(connector.getHttpEndpoint()); c.setLogin(testAgent.getIdentifier(), testPass); ClientResponse result = c.sendRequest("GET", "version/path", ""); Assert.assertEquals(Status.OK.getStatusCode(), result.getHttpCode()); Assert.assertTrue(result.getResponse().trim().endsWith("version/")); result = c.sendRequest("GET", "version/v1/path", ""); Assert.assertEquals(Status.OK.getStatusCode(), result.getHttpCode()); Assert.assertTrue(result.getResponse().trim().endsWith("version/v1/")); result = c.sendRequest("GET", "VERSION/path", ""); Assert.assertEquals(Status.OK.getStatusCode(), result.getHttpCode()); Assert.assertTrue(result.getResponse().trim().endsWith("VERSION/")); result = c.sendRequest("GET", "UPPERCASE/test", ""); Assert.assertEquals(Status.OK.getStatusCode(), result.getHttpCode()); Assert.assertEquals("success", result.getResponse().trim()); result = c.sendRequest("GET", "uppercase/test", ""); Assert.assertEquals(Status.OK.getStatusCode(), result.getHttpCode()); Assert.assertEquals("success", result.getResponse().trim()); } catch (Exception e) { e.printStackTrace(); Assert.fail("Exception: " + e); } }
public String getHttpEndpoint() { return "http: }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); void setLogFile(String filename); void setHttpPort(Integer port); void setHttpsPort(Integer port); void enableHttpHttps(boolean http, boolean https); @Deprecated void setSocketTimeout(int timeoutInMs); void setLogStream(OutputStream stream); void setSslKeyPassword(String password); void setSslKeystore(String keystore); void setCrossOriginResourceDomain(String cord); String getCrossOriginResourceDomain(); void setCrossOriginResourceMaxAge(int maxAge); int getCrossOriginResourceMaxAge(); void setCrossOriginResourceSharing(boolean enable); boolean isCrossOriginResourceSharing(); void setPreferLocalServices(boolean enable); @Override void start(Node node); String getRootCAFilename(); String getMyHostname(); String getHttpsEndpoint(); String getHttpEndpoint(); @Override synchronized void stop(); Node getL2pNode(); void logMessage(String message); void logError(String message, Throwable throwable); void logError(String message); NameLock getLockOidc(); String getOidcClientId(); String getOidcClientSecret(); int getHttpPort(); int getHttpsPort(); X509Certificate getCACertificate(); AgentImpl authenticateAgent(MultivaluedMap<String, String> requestHeaders, String accessTokenQueryParam); AgentSession getOrCreateSession(PassphraseAgentImpl agent); AgentSession getSessionById(String sessionid); void destroySession(String sessionId); String generateToken(); }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); void setLogFile(String filename); void setHttpPort(Integer port); void setHttpsPort(Integer port); void enableHttpHttps(boolean http, boolean https); @Deprecated void setSocketTimeout(int timeoutInMs); void setLogStream(OutputStream stream); void setSslKeyPassword(String password); void setSslKeystore(String keystore); void setCrossOriginResourceDomain(String cord); String getCrossOriginResourceDomain(); void setCrossOriginResourceMaxAge(int maxAge); int getCrossOriginResourceMaxAge(); void setCrossOriginResourceSharing(boolean enable); boolean isCrossOriginResourceSharing(); void setPreferLocalServices(boolean enable); @Override void start(Node node); String getRootCAFilename(); String getMyHostname(); String getHttpsEndpoint(); String getHttpEndpoint(); @Override synchronized void stop(); Node getL2pNode(); void logMessage(String message); void logError(String message, Throwable throwable); void logError(String message); NameLock getLockOidc(); String getOidcClientId(); String getOidcClientSecret(); int getHttpPort(); int getHttpsPort(); X509Certificate getCACertificate(); AgentImpl authenticateAgent(MultivaluedMap<String, String> requestHeaders, String accessTokenQueryParam); AgentSession getOrCreateSession(PassphraseAgentImpl agent); AgentSession getSessionById(String sessionid); void destroySession(String sessionId); String generateToken(); static final int DEFAULT_HTTP_PORT; static final String WEB_CONNECTOR; static final int DEFAULT_HTTPS_PORT; static final boolean DEFAULT_START_HTTP; static final boolean DEFAULT_START_HTTPS; static final String DEFAULT_CROSS_ORIGIN_RESOURCE_DOMAIN; static final int DEFAULT_CROSS_ORIGIN_RESOURCE_MAX_AGE; static final boolean DEFAULT_ENABLE_CROSS_ORIGIN_RESOURCE_SHARING; static final boolean DEFAULT_ONLY_LOCAL_SERVICES; static final String SESSION_COOKIE; static final String DEFAULT_DEFAULT_OIDC_PROVIDER; public String defaultOIDCProvider; public ArrayList<String> oidcProviders; static final int DEFAULT_MAX_CONNECTIONS; static final String COOKIE_SESSIONID_KEY; static final int DEFAULT_SESSION_TIMEOUT; static final int DEFAULT_MAX_THREADS; static final int DEFAULT_MAX_REQUEST_BODY_SIZE; static final String SSL_INSTANCE_NAME; public Map<String, JSONObject> oidcProviderInfos; }
@Test public void testSwagger() { MiniClient c = new MiniClient(); c.setConnectorEndpoint(connector.getHttpEndpoint()); try { c.setLogin(testAgent.getIdentifier(), testPass); ClientResponse result = c.sendRequest("GET", "swaggertest/swagger.json", ""); Assert.assertTrue(result.getResponse().trim().contains("createSomething")); Assert.assertTrue(result.getResponse().trim().contains("subresource/content")); } catch (Exception e) { e.printStackTrace(); Assert.fail("Exception: " + e); } }
public String getHttpEndpoint() { return "http: }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); void setLogFile(String filename); void setHttpPort(Integer port); void setHttpsPort(Integer port); void enableHttpHttps(boolean http, boolean https); @Deprecated void setSocketTimeout(int timeoutInMs); void setLogStream(OutputStream stream); void setSslKeyPassword(String password); void setSslKeystore(String keystore); void setCrossOriginResourceDomain(String cord); String getCrossOriginResourceDomain(); void setCrossOriginResourceMaxAge(int maxAge); int getCrossOriginResourceMaxAge(); void setCrossOriginResourceSharing(boolean enable); boolean isCrossOriginResourceSharing(); void setPreferLocalServices(boolean enable); @Override void start(Node node); String getRootCAFilename(); String getMyHostname(); String getHttpsEndpoint(); String getHttpEndpoint(); @Override synchronized void stop(); Node getL2pNode(); void logMessage(String message); void logError(String message, Throwable throwable); void logError(String message); NameLock getLockOidc(); String getOidcClientId(); String getOidcClientSecret(); int getHttpPort(); int getHttpsPort(); X509Certificate getCACertificate(); AgentImpl authenticateAgent(MultivaluedMap<String, String> requestHeaders, String accessTokenQueryParam); AgentSession getOrCreateSession(PassphraseAgentImpl agent); AgentSession getSessionById(String sessionid); void destroySession(String sessionId); String generateToken(); }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); void setLogFile(String filename); void setHttpPort(Integer port); void setHttpsPort(Integer port); void enableHttpHttps(boolean http, boolean https); @Deprecated void setSocketTimeout(int timeoutInMs); void setLogStream(OutputStream stream); void setSslKeyPassword(String password); void setSslKeystore(String keystore); void setCrossOriginResourceDomain(String cord); String getCrossOriginResourceDomain(); void setCrossOriginResourceMaxAge(int maxAge); int getCrossOriginResourceMaxAge(); void setCrossOriginResourceSharing(boolean enable); boolean isCrossOriginResourceSharing(); void setPreferLocalServices(boolean enable); @Override void start(Node node); String getRootCAFilename(); String getMyHostname(); String getHttpsEndpoint(); String getHttpEndpoint(); @Override synchronized void stop(); Node getL2pNode(); void logMessage(String message); void logError(String message, Throwable throwable); void logError(String message); NameLock getLockOidc(); String getOidcClientId(); String getOidcClientSecret(); int getHttpPort(); int getHttpsPort(); X509Certificate getCACertificate(); AgentImpl authenticateAgent(MultivaluedMap<String, String> requestHeaders, String accessTokenQueryParam); AgentSession getOrCreateSession(PassphraseAgentImpl agent); AgentSession getSessionById(String sessionid); void destroySession(String sessionId); String generateToken(); static final int DEFAULT_HTTP_PORT; static final String WEB_CONNECTOR; static final int DEFAULT_HTTPS_PORT; static final boolean DEFAULT_START_HTTP; static final boolean DEFAULT_START_HTTPS; static final String DEFAULT_CROSS_ORIGIN_RESOURCE_DOMAIN; static final int DEFAULT_CROSS_ORIGIN_RESOURCE_MAX_AGE; static final boolean DEFAULT_ENABLE_CROSS_ORIGIN_RESOURCE_SHARING; static final boolean DEFAULT_ONLY_LOCAL_SERVICES; static final String SESSION_COOKIE; static final String DEFAULT_DEFAULT_OIDC_PROVIDER; public String defaultOIDCProvider; public ArrayList<String> oidcProviders; static final int DEFAULT_MAX_CONNECTIONS; static final String COOKIE_SESSIONID_KEY; static final int DEFAULT_SESSION_TIMEOUT; static final int DEFAULT_MAX_THREADS; static final int DEFAULT_MAX_REQUEST_BODY_SIZE; static final String SSL_INSTANCE_NAME; public Map<String, JSONObject> oidcProviderInfos; }
@Test public void testResponseCode() { try { MiniClient c = new MiniClient(); c.setConnectorEndpoint(connector.getHttpEndpoint()); c.setLogin(testAgent.getIdentifier(), testPass); ClientResponse result = c.sendRequest("PUT", "swaggertest/create/notfound", ""); Assert.assertEquals(404, result.getHttpCode()); result = c.sendRequest("PUT", "swaggertest/create/asdf", ""); Assert.assertEquals(200, result.getHttpCode()); } catch (Exception e) { e.printStackTrace(); Assert.fail("Exception: " + e); } }
public String getHttpEndpoint() { return "http: }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); void setLogFile(String filename); void setHttpPort(Integer port); void setHttpsPort(Integer port); void enableHttpHttps(boolean http, boolean https); @Deprecated void setSocketTimeout(int timeoutInMs); void setLogStream(OutputStream stream); void setSslKeyPassword(String password); void setSslKeystore(String keystore); void setCrossOriginResourceDomain(String cord); String getCrossOriginResourceDomain(); void setCrossOriginResourceMaxAge(int maxAge); int getCrossOriginResourceMaxAge(); void setCrossOriginResourceSharing(boolean enable); boolean isCrossOriginResourceSharing(); void setPreferLocalServices(boolean enable); @Override void start(Node node); String getRootCAFilename(); String getMyHostname(); String getHttpsEndpoint(); String getHttpEndpoint(); @Override synchronized void stop(); Node getL2pNode(); void logMessage(String message); void logError(String message, Throwable throwable); void logError(String message); NameLock getLockOidc(); String getOidcClientId(); String getOidcClientSecret(); int getHttpPort(); int getHttpsPort(); X509Certificate getCACertificate(); AgentImpl authenticateAgent(MultivaluedMap<String, String> requestHeaders, String accessTokenQueryParam); AgentSession getOrCreateSession(PassphraseAgentImpl agent); AgentSession getSessionById(String sessionid); void destroySession(String sessionId); String generateToken(); }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); void setLogFile(String filename); void setHttpPort(Integer port); void setHttpsPort(Integer port); void enableHttpHttps(boolean http, boolean https); @Deprecated void setSocketTimeout(int timeoutInMs); void setLogStream(OutputStream stream); void setSslKeyPassword(String password); void setSslKeystore(String keystore); void setCrossOriginResourceDomain(String cord); String getCrossOriginResourceDomain(); void setCrossOriginResourceMaxAge(int maxAge); int getCrossOriginResourceMaxAge(); void setCrossOriginResourceSharing(boolean enable); boolean isCrossOriginResourceSharing(); void setPreferLocalServices(boolean enable); @Override void start(Node node); String getRootCAFilename(); String getMyHostname(); String getHttpsEndpoint(); String getHttpEndpoint(); @Override synchronized void stop(); Node getL2pNode(); void logMessage(String message); void logError(String message, Throwable throwable); void logError(String message); NameLock getLockOidc(); String getOidcClientId(); String getOidcClientSecret(); int getHttpPort(); int getHttpsPort(); X509Certificate getCACertificate(); AgentImpl authenticateAgent(MultivaluedMap<String, String> requestHeaders, String accessTokenQueryParam); AgentSession getOrCreateSession(PassphraseAgentImpl agent); AgentSession getSessionById(String sessionid); void destroySession(String sessionId); String generateToken(); static final int DEFAULT_HTTP_PORT; static final String WEB_CONNECTOR; static final int DEFAULT_HTTPS_PORT; static final boolean DEFAULT_START_HTTP; static final boolean DEFAULT_START_HTTPS; static final String DEFAULT_CROSS_ORIGIN_RESOURCE_DOMAIN; static final int DEFAULT_CROSS_ORIGIN_RESOURCE_MAX_AGE; static final boolean DEFAULT_ENABLE_CROSS_ORIGIN_RESOURCE_SHARING; static final boolean DEFAULT_ONLY_LOCAL_SERVICES; static final String SESSION_COOKIE; static final String DEFAULT_DEFAULT_OIDC_PROVIDER; public String defaultOIDCProvider; public ArrayList<String> oidcProviders; static final int DEFAULT_MAX_CONNECTIONS; static final String COOKIE_SESSIONID_KEY; static final int DEFAULT_SESSION_TIMEOUT; static final int DEFAULT_MAX_THREADS; static final int DEFAULT_MAX_REQUEST_BODY_SIZE; static final String SSL_INSTANCE_NAME; public Map<String, JSONObject> oidcProviderInfos; }
@Test public void testSubresource() { try { MiniClient c = new MiniClient(); c.setConnectorEndpoint(connector.getHttpEndpoint()); c.setLogin(testAgent.getIdentifier(), testPass); ClientResponse result = c.sendRequest("GET", "swaggertest/subresource/content", ""); Assert.assertEquals(200, result.getHttpCode()); Assert.assertEquals("test", result.getResponse().trim()); } catch (Exception e) { e.printStackTrace(); Assert.fail("Exception: " + e); } }
public String getHttpEndpoint() { return "http: }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); void setLogFile(String filename); void setHttpPort(Integer port); void setHttpsPort(Integer port); void enableHttpHttps(boolean http, boolean https); @Deprecated void setSocketTimeout(int timeoutInMs); void setLogStream(OutputStream stream); void setSslKeyPassword(String password); void setSslKeystore(String keystore); void setCrossOriginResourceDomain(String cord); String getCrossOriginResourceDomain(); void setCrossOriginResourceMaxAge(int maxAge); int getCrossOriginResourceMaxAge(); void setCrossOriginResourceSharing(boolean enable); boolean isCrossOriginResourceSharing(); void setPreferLocalServices(boolean enable); @Override void start(Node node); String getRootCAFilename(); String getMyHostname(); String getHttpsEndpoint(); String getHttpEndpoint(); @Override synchronized void stop(); Node getL2pNode(); void logMessage(String message); void logError(String message, Throwable throwable); void logError(String message); NameLock getLockOidc(); String getOidcClientId(); String getOidcClientSecret(); int getHttpPort(); int getHttpsPort(); X509Certificate getCACertificate(); AgentImpl authenticateAgent(MultivaluedMap<String, String> requestHeaders, String accessTokenQueryParam); AgentSession getOrCreateSession(PassphraseAgentImpl agent); AgentSession getSessionById(String sessionid); void destroySession(String sessionId); String generateToken(); }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); void setLogFile(String filename); void setHttpPort(Integer port); void setHttpsPort(Integer port); void enableHttpHttps(boolean http, boolean https); @Deprecated void setSocketTimeout(int timeoutInMs); void setLogStream(OutputStream stream); void setSslKeyPassword(String password); void setSslKeystore(String keystore); void setCrossOriginResourceDomain(String cord); String getCrossOriginResourceDomain(); void setCrossOriginResourceMaxAge(int maxAge); int getCrossOriginResourceMaxAge(); void setCrossOriginResourceSharing(boolean enable); boolean isCrossOriginResourceSharing(); void setPreferLocalServices(boolean enable); @Override void start(Node node); String getRootCAFilename(); String getMyHostname(); String getHttpsEndpoint(); String getHttpEndpoint(); @Override synchronized void stop(); Node getL2pNode(); void logMessage(String message); void logError(String message, Throwable throwable); void logError(String message); NameLock getLockOidc(); String getOidcClientId(); String getOidcClientSecret(); int getHttpPort(); int getHttpsPort(); X509Certificate getCACertificate(); AgentImpl authenticateAgent(MultivaluedMap<String, String> requestHeaders, String accessTokenQueryParam); AgentSession getOrCreateSession(PassphraseAgentImpl agent); AgentSession getSessionById(String sessionid); void destroySession(String sessionId); String generateToken(); static final int DEFAULT_HTTP_PORT; static final String WEB_CONNECTOR; static final int DEFAULT_HTTPS_PORT; static final boolean DEFAULT_START_HTTP; static final boolean DEFAULT_START_HTTPS; static final String DEFAULT_CROSS_ORIGIN_RESOURCE_DOMAIN; static final int DEFAULT_CROSS_ORIGIN_RESOURCE_MAX_AGE; static final boolean DEFAULT_ENABLE_CROSS_ORIGIN_RESOURCE_SHARING; static final boolean DEFAULT_ONLY_LOCAL_SERVICES; static final String SESSION_COOKIE; static final String DEFAULT_DEFAULT_OIDC_PROVIDER; public String defaultOIDCProvider; public ArrayList<String> oidcProviders; static final int DEFAULT_MAX_CONNECTIONS; static final String COOKIE_SESSIONID_KEY; static final int DEFAULT_SESSION_TIMEOUT; static final int DEFAULT_MAX_THREADS; static final int DEFAULT_MAX_REQUEST_BODY_SIZE; static final String SSL_INSTANCE_NAME; public Map<String, JSONObject> oidcProviderInfos; }
@Test public void testUploadLimit() { try { MiniClient c = new MiniClient(); c.setConnectorEndpoint(connector.getHttpEndpoint()); c.setLogin(testAgent.getIdentifier(), testPass); byte[] testContent = new byte[WebConnector.DEFAULT_MAX_REQUEST_BODY_SIZE]; new Random().nextBytes(testContent); String base64 = Base64.getEncoder().encodeToString(testContent); ClientResponse result = c.sendRequest("POST", "test", base64); Assert.assertEquals(HttpURLConnection.HTTP_ENTITY_TOO_LARGE, result.getHttpCode()); } catch (Exception e) { e.printStackTrace(); Assert.fail("Exception: " + e); } }
public String getHttpEndpoint() { return "http: }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); void setLogFile(String filename); void setHttpPort(Integer port); void setHttpsPort(Integer port); void enableHttpHttps(boolean http, boolean https); @Deprecated void setSocketTimeout(int timeoutInMs); void setLogStream(OutputStream stream); void setSslKeyPassword(String password); void setSslKeystore(String keystore); void setCrossOriginResourceDomain(String cord); String getCrossOriginResourceDomain(); void setCrossOriginResourceMaxAge(int maxAge); int getCrossOriginResourceMaxAge(); void setCrossOriginResourceSharing(boolean enable); boolean isCrossOriginResourceSharing(); void setPreferLocalServices(boolean enable); @Override void start(Node node); String getRootCAFilename(); String getMyHostname(); String getHttpsEndpoint(); String getHttpEndpoint(); @Override synchronized void stop(); Node getL2pNode(); void logMessage(String message); void logError(String message, Throwable throwable); void logError(String message); NameLock getLockOidc(); String getOidcClientId(); String getOidcClientSecret(); int getHttpPort(); int getHttpsPort(); X509Certificate getCACertificate(); AgentImpl authenticateAgent(MultivaluedMap<String, String> requestHeaders, String accessTokenQueryParam); AgentSession getOrCreateSession(PassphraseAgentImpl agent); AgentSession getSessionById(String sessionid); void destroySession(String sessionId); String generateToken(); }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); void setLogFile(String filename); void setHttpPort(Integer port); void setHttpsPort(Integer port); void enableHttpHttps(boolean http, boolean https); @Deprecated void setSocketTimeout(int timeoutInMs); void setLogStream(OutputStream stream); void setSslKeyPassword(String password); void setSslKeystore(String keystore); void setCrossOriginResourceDomain(String cord); String getCrossOriginResourceDomain(); void setCrossOriginResourceMaxAge(int maxAge); int getCrossOriginResourceMaxAge(); void setCrossOriginResourceSharing(boolean enable); boolean isCrossOriginResourceSharing(); void setPreferLocalServices(boolean enable); @Override void start(Node node); String getRootCAFilename(); String getMyHostname(); String getHttpsEndpoint(); String getHttpEndpoint(); @Override synchronized void stop(); Node getL2pNode(); void logMessage(String message); void logError(String message, Throwable throwable); void logError(String message); NameLock getLockOidc(); String getOidcClientId(); String getOidcClientSecret(); int getHttpPort(); int getHttpsPort(); X509Certificate getCACertificate(); AgentImpl authenticateAgent(MultivaluedMap<String, String> requestHeaders, String accessTokenQueryParam); AgentSession getOrCreateSession(PassphraseAgentImpl agent); AgentSession getSessionById(String sessionid); void destroySession(String sessionId); String generateToken(); static final int DEFAULT_HTTP_PORT; static final String WEB_CONNECTOR; static final int DEFAULT_HTTPS_PORT; static final boolean DEFAULT_START_HTTP; static final boolean DEFAULT_START_HTTPS; static final String DEFAULT_CROSS_ORIGIN_RESOURCE_DOMAIN; static final int DEFAULT_CROSS_ORIGIN_RESOURCE_MAX_AGE; static final boolean DEFAULT_ENABLE_CROSS_ORIGIN_RESOURCE_SHARING; static final boolean DEFAULT_ONLY_LOCAL_SERVICES; static final String SESSION_COOKIE; static final String DEFAULT_DEFAULT_OIDC_PROVIDER; public String defaultOIDCProvider; public ArrayList<String> oidcProviders; static final int DEFAULT_MAX_CONNECTIONS; static final String COOKIE_SESSIONID_KEY; static final int DEFAULT_SESSION_TIMEOUT; static final int DEFAULT_MAX_THREADS; static final int DEFAULT_MAX_REQUEST_BODY_SIZE; static final String SSL_INSTANCE_NAME; public Map<String, JSONObject> oidcProviderInfos; }
@Test public void testSecurityContextIntegration() { try { MiniClient c = new MiniClient(); c.setConnectorEndpoint(connector.getHttpEndpoint()); ClientResponse result = c.sendRequest("GET", "security/name", ""); System.out.println("RESPONSE: " + result.getResponse()); Assert.assertEquals("no principal", result.getResponse().trim()); Assert.assertEquals(403, result.getHttpCode()); result = c.sendRequest("GET", "security/authenticated", ""); Assert.assertEquals(403, result.getHttpCode()); result = c.sendRequest("GET", "security/anonymous", ""); Assert.assertEquals(200, result.getHttpCode()); c.setLogin(testAgent.getIdentifier(), testPass); result = c.sendRequest("GET", "security/name", ""); Assert.assertEquals(200, result.getHttpCode()); Assert.assertEquals("adam", result.getResponse().trim()); result = c.sendRequest("GET", "security/authenticated", ""); Assert.assertEquals(200, result.getHttpCode()); result = c.sendRequest("GET", "security/anonymous", ""); Assert.assertEquals(200, result.getHttpCode()); result = c.sendRequest("GET", "security/bot", ""); Assert.assertEquals(403, result.getHttpCode()); } catch (Exception e) { e.printStackTrace(); Assert.fail("Exception: " + e); } }
public String getHttpEndpoint() { return "http: }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); void setLogFile(String filename); void setHttpPort(Integer port); void setHttpsPort(Integer port); void enableHttpHttps(boolean http, boolean https); @Deprecated void setSocketTimeout(int timeoutInMs); void setLogStream(OutputStream stream); void setSslKeyPassword(String password); void setSslKeystore(String keystore); void setCrossOriginResourceDomain(String cord); String getCrossOriginResourceDomain(); void setCrossOriginResourceMaxAge(int maxAge); int getCrossOriginResourceMaxAge(); void setCrossOriginResourceSharing(boolean enable); boolean isCrossOriginResourceSharing(); void setPreferLocalServices(boolean enable); @Override void start(Node node); String getRootCAFilename(); String getMyHostname(); String getHttpsEndpoint(); String getHttpEndpoint(); @Override synchronized void stop(); Node getL2pNode(); void logMessage(String message); void logError(String message, Throwable throwable); void logError(String message); NameLock getLockOidc(); String getOidcClientId(); String getOidcClientSecret(); int getHttpPort(); int getHttpsPort(); X509Certificate getCACertificate(); AgentImpl authenticateAgent(MultivaluedMap<String, String> requestHeaders, String accessTokenQueryParam); AgentSession getOrCreateSession(PassphraseAgentImpl agent); AgentSession getSessionById(String sessionid); void destroySession(String sessionId); String generateToken(); }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); void setLogFile(String filename); void setHttpPort(Integer port); void setHttpsPort(Integer port); void enableHttpHttps(boolean http, boolean https); @Deprecated void setSocketTimeout(int timeoutInMs); void setLogStream(OutputStream stream); void setSslKeyPassword(String password); void setSslKeystore(String keystore); void setCrossOriginResourceDomain(String cord); String getCrossOriginResourceDomain(); void setCrossOriginResourceMaxAge(int maxAge); int getCrossOriginResourceMaxAge(); void setCrossOriginResourceSharing(boolean enable); boolean isCrossOriginResourceSharing(); void setPreferLocalServices(boolean enable); @Override void start(Node node); String getRootCAFilename(); String getMyHostname(); String getHttpsEndpoint(); String getHttpEndpoint(); @Override synchronized void stop(); Node getL2pNode(); void logMessage(String message); void logError(String message, Throwable throwable); void logError(String message); NameLock getLockOidc(); String getOidcClientId(); String getOidcClientSecret(); int getHttpPort(); int getHttpsPort(); X509Certificate getCACertificate(); AgentImpl authenticateAgent(MultivaluedMap<String, String> requestHeaders, String accessTokenQueryParam); AgentSession getOrCreateSession(PassphraseAgentImpl agent); AgentSession getSessionById(String sessionid); void destroySession(String sessionId); String generateToken(); static final int DEFAULT_HTTP_PORT; static final String WEB_CONNECTOR; static final int DEFAULT_HTTPS_PORT; static final boolean DEFAULT_START_HTTP; static final boolean DEFAULT_START_HTTPS; static final String DEFAULT_CROSS_ORIGIN_RESOURCE_DOMAIN; static final int DEFAULT_CROSS_ORIGIN_RESOURCE_MAX_AGE; static final boolean DEFAULT_ENABLE_CROSS_ORIGIN_RESOURCE_SHARING; static final boolean DEFAULT_ONLY_LOCAL_SERVICES; static final String SESSION_COOKIE; static final String DEFAULT_DEFAULT_OIDC_PROVIDER; public String defaultOIDCProvider; public ArrayList<String> oidcProviders; static final int DEFAULT_MAX_CONNECTIONS; static final String COOKIE_SESSIONID_KEY; static final int DEFAULT_SESSION_TIMEOUT; static final int DEFAULT_MAX_THREADS; static final int DEFAULT_MAX_REQUEST_BODY_SIZE; static final String SSL_INSTANCE_NAME; public Map<String, JSONObject> oidcProviderInfos; }
@Test public void testRepeat() { assertEquals("", SimpleTools.repeat("", 11)); assertEquals("", SimpleTools.repeat("adwdw", 0)); assertEquals("", SimpleTools.repeat("adwdw", -10)); assertNull(SimpleTools.repeat(null, 100)); assertEquals("xxxx", SimpleTools.repeat("x", 4)); assertEquals("101010", SimpleTools.repeat(10, 3)); }
public static String repeat(String string, int count) { if (string == null) { return null; } else if (string.isEmpty() || count <= 0) { return ""; } StringBuffer result = new StringBuffer(); for (int i = 0; i < count; i++) { result.append(string); } return result.toString(); }
SimpleTools { public static String repeat(String string, int count) { if (string == null) { return null; } else if (string.isEmpty() || count <= 0) { return ""; } StringBuffer result = new StringBuffer(); for (int i = 0; i < count; i++) { result.append(string); } return result.toString(); } }
SimpleTools { public static String repeat(String string, int count) { if (string == null) { return null; } else if (string.isEmpty() || count <= 0) { return ""; } StringBuffer result = new StringBuffer(); for (int i = 0; i < count; i++) { result.append(string); } return result.toString(); } }
SimpleTools { public static String repeat(String string, int count) { if (string == null) { return null; } else if (string.isEmpty() || count <= 0) { return ""; } StringBuffer result = new StringBuffer(); for (int i = 0; i < count; i++) { result.append(string); } return result.toString(); } static long longHash(String s); static String createRandomString(int length); static String join(Object[] objects, String glue); static String join(Iterable<?> objects, String glue); static String repeat(String string, int count); static String repeat(Object o, int count); static byte[] toByteArray(InputStream is); static String byteToHexString(byte[] bytes); static int getSystemDefinedPort(); }
SimpleTools { public static String repeat(String string, int count) { if (string == null) { return null; } else if (string.isEmpty() || count <= 0) { return ""; } StringBuffer result = new StringBuffer(); for (int i = 0; i < count; i++) { result.append(string); } return result.toString(); } static long longHash(String s); static String createRandomString(int length); static String join(Object[] objects, String glue); static String join(Iterable<?> objects, String glue); static String repeat(String string, int count); static String repeat(Object o, int count); static byte[] toByteArray(InputStream is); static String byteToHexString(byte[] bytes); static int getSystemDefinedPort(); static final String sRandomStringCharSet; }
@Test public void testClassLoading() { try { MiniClient c = new MiniClient(); c.setConnectorEndpoint(connector.getHttpEndpoint()); c.setLogin(testAgent.getIdentifier(), testPass); ClientResponse result = c.sendRequest("GET", "classloader/test", ""); Assert.assertEquals(200, result.getHttpCode()); Assert.assertEquals("OK", result.getResponse().trim()); } catch (Exception e) { e.printStackTrace(); Assert.fail("Exception: " + e); } }
public String getHttpEndpoint() { return "http: }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); void setLogFile(String filename); void setHttpPort(Integer port); void setHttpsPort(Integer port); void enableHttpHttps(boolean http, boolean https); @Deprecated void setSocketTimeout(int timeoutInMs); void setLogStream(OutputStream stream); void setSslKeyPassword(String password); void setSslKeystore(String keystore); void setCrossOriginResourceDomain(String cord); String getCrossOriginResourceDomain(); void setCrossOriginResourceMaxAge(int maxAge); int getCrossOriginResourceMaxAge(); void setCrossOriginResourceSharing(boolean enable); boolean isCrossOriginResourceSharing(); void setPreferLocalServices(boolean enable); @Override void start(Node node); String getRootCAFilename(); String getMyHostname(); String getHttpsEndpoint(); String getHttpEndpoint(); @Override synchronized void stop(); Node getL2pNode(); void logMessage(String message); void logError(String message, Throwable throwable); void logError(String message); NameLock getLockOidc(); String getOidcClientId(); String getOidcClientSecret(); int getHttpPort(); int getHttpsPort(); X509Certificate getCACertificate(); AgentImpl authenticateAgent(MultivaluedMap<String, String> requestHeaders, String accessTokenQueryParam); AgentSession getOrCreateSession(PassphraseAgentImpl agent); AgentSession getSessionById(String sessionid); void destroySession(String sessionId); String generateToken(); }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); void setLogFile(String filename); void setHttpPort(Integer port); void setHttpsPort(Integer port); void enableHttpHttps(boolean http, boolean https); @Deprecated void setSocketTimeout(int timeoutInMs); void setLogStream(OutputStream stream); void setSslKeyPassword(String password); void setSslKeystore(String keystore); void setCrossOriginResourceDomain(String cord); String getCrossOriginResourceDomain(); void setCrossOriginResourceMaxAge(int maxAge); int getCrossOriginResourceMaxAge(); void setCrossOriginResourceSharing(boolean enable); boolean isCrossOriginResourceSharing(); void setPreferLocalServices(boolean enable); @Override void start(Node node); String getRootCAFilename(); String getMyHostname(); String getHttpsEndpoint(); String getHttpEndpoint(); @Override synchronized void stop(); Node getL2pNode(); void logMessage(String message); void logError(String message, Throwable throwable); void logError(String message); NameLock getLockOidc(); String getOidcClientId(); String getOidcClientSecret(); int getHttpPort(); int getHttpsPort(); X509Certificate getCACertificate(); AgentImpl authenticateAgent(MultivaluedMap<String, String> requestHeaders, String accessTokenQueryParam); AgentSession getOrCreateSession(PassphraseAgentImpl agent); AgentSession getSessionById(String sessionid); void destroySession(String sessionId); String generateToken(); static final int DEFAULT_HTTP_PORT; static final String WEB_CONNECTOR; static final int DEFAULT_HTTPS_PORT; static final boolean DEFAULT_START_HTTP; static final boolean DEFAULT_START_HTTPS; static final String DEFAULT_CROSS_ORIGIN_RESOURCE_DOMAIN; static final int DEFAULT_CROSS_ORIGIN_RESOURCE_MAX_AGE; static final boolean DEFAULT_ENABLE_CROSS_ORIGIN_RESOURCE_SHARING; static final boolean DEFAULT_ONLY_LOCAL_SERVICES; static final String SESSION_COOKIE; static final String DEFAULT_DEFAULT_OIDC_PROVIDER; public String defaultOIDCProvider; public ArrayList<String> oidcProviders; static final int DEFAULT_MAX_CONNECTIONS; static final String COOKIE_SESSIONID_KEY; static final int DEFAULT_SESSION_TIMEOUT; static final int DEFAULT_MAX_THREADS; static final int DEFAULT_MAX_REQUEST_BODY_SIZE; static final String SSL_INSTANCE_NAME; public Map<String, JSONObject> oidcProviderInfos; }
@Test public void testEmptyResponse() { try { MiniClient c = new MiniClient(); c.setConnectorEndpoint(connector.getHttpEndpoint()); c.setLogin(testAgent.getIdentifier(), testPass); ClientResponse result = c.sendRequest("GET", "test/empty", ""); Assert.assertEquals(200, result.getHttpCode()); } catch (Exception e) { e.printStackTrace(); Assert.fail("Exception: " + e); } }
public String getHttpEndpoint() { return "http: }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); void setLogFile(String filename); void setHttpPort(Integer port); void setHttpsPort(Integer port); void enableHttpHttps(boolean http, boolean https); @Deprecated void setSocketTimeout(int timeoutInMs); void setLogStream(OutputStream stream); void setSslKeyPassword(String password); void setSslKeystore(String keystore); void setCrossOriginResourceDomain(String cord); String getCrossOriginResourceDomain(); void setCrossOriginResourceMaxAge(int maxAge); int getCrossOriginResourceMaxAge(); void setCrossOriginResourceSharing(boolean enable); boolean isCrossOriginResourceSharing(); void setPreferLocalServices(boolean enable); @Override void start(Node node); String getRootCAFilename(); String getMyHostname(); String getHttpsEndpoint(); String getHttpEndpoint(); @Override synchronized void stop(); Node getL2pNode(); void logMessage(String message); void logError(String message, Throwable throwable); void logError(String message); NameLock getLockOidc(); String getOidcClientId(); String getOidcClientSecret(); int getHttpPort(); int getHttpsPort(); X509Certificate getCACertificate(); AgentImpl authenticateAgent(MultivaluedMap<String, String> requestHeaders, String accessTokenQueryParam); AgentSession getOrCreateSession(PassphraseAgentImpl agent); AgentSession getSessionById(String sessionid); void destroySession(String sessionId); String generateToken(); }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); void setLogFile(String filename); void setHttpPort(Integer port); void setHttpsPort(Integer port); void enableHttpHttps(boolean http, boolean https); @Deprecated void setSocketTimeout(int timeoutInMs); void setLogStream(OutputStream stream); void setSslKeyPassword(String password); void setSslKeystore(String keystore); void setCrossOriginResourceDomain(String cord); String getCrossOriginResourceDomain(); void setCrossOriginResourceMaxAge(int maxAge); int getCrossOriginResourceMaxAge(); void setCrossOriginResourceSharing(boolean enable); boolean isCrossOriginResourceSharing(); void setPreferLocalServices(boolean enable); @Override void start(Node node); String getRootCAFilename(); String getMyHostname(); String getHttpsEndpoint(); String getHttpEndpoint(); @Override synchronized void stop(); Node getL2pNode(); void logMessage(String message); void logError(String message, Throwable throwable); void logError(String message); NameLock getLockOidc(); String getOidcClientId(); String getOidcClientSecret(); int getHttpPort(); int getHttpsPort(); X509Certificate getCACertificate(); AgentImpl authenticateAgent(MultivaluedMap<String, String> requestHeaders, String accessTokenQueryParam); AgentSession getOrCreateSession(PassphraseAgentImpl agent); AgentSession getSessionById(String sessionid); void destroySession(String sessionId); String generateToken(); static final int DEFAULT_HTTP_PORT; static final String WEB_CONNECTOR; static final int DEFAULT_HTTPS_PORT; static final boolean DEFAULT_START_HTTP; static final boolean DEFAULT_START_HTTPS; static final String DEFAULT_CROSS_ORIGIN_RESOURCE_DOMAIN; static final int DEFAULT_CROSS_ORIGIN_RESOURCE_MAX_AGE; static final boolean DEFAULT_ENABLE_CROSS_ORIGIN_RESOURCE_SHARING; static final boolean DEFAULT_ONLY_LOCAL_SERVICES; static final String SESSION_COOKIE; static final String DEFAULT_DEFAULT_OIDC_PROVIDER; public String defaultOIDCProvider; public ArrayList<String> oidcProviders; static final int DEFAULT_MAX_CONNECTIONS; static final String COOKIE_SESSIONID_KEY; static final int DEFAULT_SESSION_TIMEOUT; static final int DEFAULT_MAX_THREADS; static final int DEFAULT_MAX_REQUEST_BODY_SIZE; static final String SSL_INSTANCE_NAME; public Map<String, JSONObject> oidcProviderInfos; }
@Test public void testAuthParamSanitization() { try { MiniClient c = new MiniClient(); c.setConnectorEndpoint(connector.getHttpEndpoint()); c.setLogin(testAgent.getIdentifier(), testPass); ClientResponse result = c.sendRequest("GET", "test/requesturi?param1=sadf&access-token=secret", ""); Assert.assertEquals(200, result.getHttpCode()); Assert.assertTrue(result.getResponse().contains("param1")); Assert.assertFalse(result.getResponse().contains("secret")); Assert.assertFalse(result.getResponse().contains("access-token")); HashMap<String, String> headers = new HashMap<>(); headers.put("param1", "asdf"); result = c.sendRequest("GET", "test/headers", "", headers); Assert.assertEquals(200, result.getHttpCode()); Assert.assertTrue(result.getResponse().toLowerCase().contains("param1")); Assert.assertFalse(result.getResponse().toLowerCase().contains("authorization")); } catch (Exception e) { e.printStackTrace(); Assert.fail("Exception: " + e); } }
public String getHttpEndpoint() { return "http: }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); void setLogFile(String filename); void setHttpPort(Integer port); void setHttpsPort(Integer port); void enableHttpHttps(boolean http, boolean https); @Deprecated void setSocketTimeout(int timeoutInMs); void setLogStream(OutputStream stream); void setSslKeyPassword(String password); void setSslKeystore(String keystore); void setCrossOriginResourceDomain(String cord); String getCrossOriginResourceDomain(); void setCrossOriginResourceMaxAge(int maxAge); int getCrossOriginResourceMaxAge(); void setCrossOriginResourceSharing(boolean enable); boolean isCrossOriginResourceSharing(); void setPreferLocalServices(boolean enable); @Override void start(Node node); String getRootCAFilename(); String getMyHostname(); String getHttpsEndpoint(); String getHttpEndpoint(); @Override synchronized void stop(); Node getL2pNode(); void logMessage(String message); void logError(String message, Throwable throwable); void logError(String message); NameLock getLockOidc(); String getOidcClientId(); String getOidcClientSecret(); int getHttpPort(); int getHttpsPort(); X509Certificate getCACertificate(); AgentImpl authenticateAgent(MultivaluedMap<String, String> requestHeaders, String accessTokenQueryParam); AgentSession getOrCreateSession(PassphraseAgentImpl agent); AgentSession getSessionById(String sessionid); void destroySession(String sessionId); String generateToken(); }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); void setLogFile(String filename); void setHttpPort(Integer port); void setHttpsPort(Integer port); void enableHttpHttps(boolean http, boolean https); @Deprecated void setSocketTimeout(int timeoutInMs); void setLogStream(OutputStream stream); void setSslKeyPassword(String password); void setSslKeystore(String keystore); void setCrossOriginResourceDomain(String cord); String getCrossOriginResourceDomain(); void setCrossOriginResourceMaxAge(int maxAge); int getCrossOriginResourceMaxAge(); void setCrossOriginResourceSharing(boolean enable); boolean isCrossOriginResourceSharing(); void setPreferLocalServices(boolean enable); @Override void start(Node node); String getRootCAFilename(); String getMyHostname(); String getHttpsEndpoint(); String getHttpEndpoint(); @Override synchronized void stop(); Node getL2pNode(); void logMessage(String message); void logError(String message, Throwable throwable); void logError(String message); NameLock getLockOidc(); String getOidcClientId(); String getOidcClientSecret(); int getHttpPort(); int getHttpsPort(); X509Certificate getCACertificate(); AgentImpl authenticateAgent(MultivaluedMap<String, String> requestHeaders, String accessTokenQueryParam); AgentSession getOrCreateSession(PassphraseAgentImpl agent); AgentSession getSessionById(String sessionid); void destroySession(String sessionId); String generateToken(); static final int DEFAULT_HTTP_PORT; static final String WEB_CONNECTOR; static final int DEFAULT_HTTPS_PORT; static final boolean DEFAULT_START_HTTP; static final boolean DEFAULT_START_HTTPS; static final String DEFAULT_CROSS_ORIGIN_RESOURCE_DOMAIN; static final int DEFAULT_CROSS_ORIGIN_RESOURCE_MAX_AGE; static final boolean DEFAULT_ENABLE_CROSS_ORIGIN_RESOURCE_SHARING; static final boolean DEFAULT_ONLY_LOCAL_SERVICES; static final String SESSION_COOKIE; static final String DEFAULT_DEFAULT_OIDC_PROVIDER; public String defaultOIDCProvider; public ArrayList<String> oidcProviders; static final int DEFAULT_MAX_CONNECTIONS; static final String COOKIE_SESSIONID_KEY; static final int DEFAULT_SESSION_TIMEOUT; static final int DEFAULT_MAX_THREADS; static final int DEFAULT_MAX_REQUEST_BODY_SIZE; static final String SSL_INSTANCE_NAME; public Map<String, JSONObject> oidcProviderInfos; }
@Test public void testEncoding() { try { MiniClient c = new MiniClient(); c.setConnectorEndpoint(connector.getHttpEndpoint()); c.setLogin(testAgent.getIdentifier(), testPass); ClientResponse result = c.sendRequest("GET", "test/encoding", ""); Assert.assertEquals(200, result.getHttpCode()); final String header = result.getHeader(HttpHeaders.CONTENT_TYPE); System.out.println("header is: " + header); Assert.assertNotNull(header); Assert.assertTrue(header.toLowerCase().contains("charset=utf-8")); final String response = result.getResponse(); System.out.println("response is: " + response); Assert.assertNotNull(response); Assert.assertTrue(response.contains("☺")); } catch (Exception e) { e.printStackTrace(); Assert.fail("Exception: " + e); } }
public String getHttpEndpoint() { return "http: }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); void setLogFile(String filename); void setHttpPort(Integer port); void setHttpsPort(Integer port); void enableHttpHttps(boolean http, boolean https); @Deprecated void setSocketTimeout(int timeoutInMs); void setLogStream(OutputStream stream); void setSslKeyPassword(String password); void setSslKeystore(String keystore); void setCrossOriginResourceDomain(String cord); String getCrossOriginResourceDomain(); void setCrossOriginResourceMaxAge(int maxAge); int getCrossOriginResourceMaxAge(); void setCrossOriginResourceSharing(boolean enable); boolean isCrossOriginResourceSharing(); void setPreferLocalServices(boolean enable); @Override void start(Node node); String getRootCAFilename(); String getMyHostname(); String getHttpsEndpoint(); String getHttpEndpoint(); @Override synchronized void stop(); Node getL2pNode(); void logMessage(String message); void logError(String message, Throwable throwable); void logError(String message); NameLock getLockOidc(); String getOidcClientId(); String getOidcClientSecret(); int getHttpPort(); int getHttpsPort(); X509Certificate getCACertificate(); AgentImpl authenticateAgent(MultivaluedMap<String, String> requestHeaders, String accessTokenQueryParam); AgentSession getOrCreateSession(PassphraseAgentImpl agent); AgentSession getSessionById(String sessionid); void destroySession(String sessionId); String generateToken(); }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); void setLogFile(String filename); void setHttpPort(Integer port); void setHttpsPort(Integer port); void enableHttpHttps(boolean http, boolean https); @Deprecated void setSocketTimeout(int timeoutInMs); void setLogStream(OutputStream stream); void setSslKeyPassword(String password); void setSslKeystore(String keystore); void setCrossOriginResourceDomain(String cord); String getCrossOriginResourceDomain(); void setCrossOriginResourceMaxAge(int maxAge); int getCrossOriginResourceMaxAge(); void setCrossOriginResourceSharing(boolean enable); boolean isCrossOriginResourceSharing(); void setPreferLocalServices(boolean enable); @Override void start(Node node); String getRootCAFilename(); String getMyHostname(); String getHttpsEndpoint(); String getHttpEndpoint(); @Override synchronized void stop(); Node getL2pNode(); void logMessage(String message); void logError(String message, Throwable throwable); void logError(String message); NameLock getLockOidc(); String getOidcClientId(); String getOidcClientSecret(); int getHttpPort(); int getHttpsPort(); X509Certificate getCACertificate(); AgentImpl authenticateAgent(MultivaluedMap<String, String> requestHeaders, String accessTokenQueryParam); AgentSession getOrCreateSession(PassphraseAgentImpl agent); AgentSession getSessionById(String sessionid); void destroySession(String sessionId); String generateToken(); static final int DEFAULT_HTTP_PORT; static final String WEB_CONNECTOR; static final int DEFAULT_HTTPS_PORT; static final boolean DEFAULT_START_HTTP; static final boolean DEFAULT_START_HTTPS; static final String DEFAULT_CROSS_ORIGIN_RESOURCE_DOMAIN; static final int DEFAULT_CROSS_ORIGIN_RESOURCE_MAX_AGE; static final boolean DEFAULT_ENABLE_CROSS_ORIGIN_RESOURCE_SHARING; static final boolean DEFAULT_ONLY_LOCAL_SERVICES; static final String SESSION_COOKIE; static final String DEFAULT_DEFAULT_OIDC_PROVIDER; public String defaultOIDCProvider; public ArrayList<String> oidcProviders; static final int DEFAULT_MAX_CONNECTIONS; static final String COOKIE_SESSIONID_KEY; static final int DEFAULT_SESSION_TIMEOUT; static final int DEFAULT_MAX_THREADS; static final int DEFAULT_MAX_REQUEST_BODY_SIZE; static final String SSL_INSTANCE_NAME; public Map<String, JSONObject> oidcProviderInfos; }
@Test public void testBody() { try { MiniClient c = new MiniClient(); c.setConnectorEndpoint(connector.getHttpEndpoint()); c.setLogin(testAgent.getIdentifier(), testPass); String body = "This is a test."; ClientResponse result = c.sendRequest("POST", "test/body", body); Assert.assertEquals(200, result.getHttpCode()); Assert.assertTrue(result.getResponse().trim().equals(body)); } catch (Exception e) { e.printStackTrace(); Assert.fail("Exception: " + e); } }
public String getHttpEndpoint() { return "http: }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); void setLogFile(String filename); void setHttpPort(Integer port); void setHttpsPort(Integer port); void enableHttpHttps(boolean http, boolean https); @Deprecated void setSocketTimeout(int timeoutInMs); void setLogStream(OutputStream stream); void setSslKeyPassword(String password); void setSslKeystore(String keystore); void setCrossOriginResourceDomain(String cord); String getCrossOriginResourceDomain(); void setCrossOriginResourceMaxAge(int maxAge); int getCrossOriginResourceMaxAge(); void setCrossOriginResourceSharing(boolean enable); boolean isCrossOriginResourceSharing(); void setPreferLocalServices(boolean enable); @Override void start(Node node); String getRootCAFilename(); String getMyHostname(); String getHttpsEndpoint(); String getHttpEndpoint(); @Override synchronized void stop(); Node getL2pNode(); void logMessage(String message); void logError(String message, Throwable throwable); void logError(String message); NameLock getLockOidc(); String getOidcClientId(); String getOidcClientSecret(); int getHttpPort(); int getHttpsPort(); X509Certificate getCACertificate(); AgentImpl authenticateAgent(MultivaluedMap<String, String> requestHeaders, String accessTokenQueryParam); AgentSession getOrCreateSession(PassphraseAgentImpl agent); AgentSession getSessionById(String sessionid); void destroySession(String sessionId); String generateToken(); }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); void setLogFile(String filename); void setHttpPort(Integer port); void setHttpsPort(Integer port); void enableHttpHttps(boolean http, boolean https); @Deprecated void setSocketTimeout(int timeoutInMs); void setLogStream(OutputStream stream); void setSslKeyPassword(String password); void setSslKeystore(String keystore); void setCrossOriginResourceDomain(String cord); String getCrossOriginResourceDomain(); void setCrossOriginResourceMaxAge(int maxAge); int getCrossOriginResourceMaxAge(); void setCrossOriginResourceSharing(boolean enable); boolean isCrossOriginResourceSharing(); void setPreferLocalServices(boolean enable); @Override void start(Node node); String getRootCAFilename(); String getMyHostname(); String getHttpsEndpoint(); String getHttpEndpoint(); @Override synchronized void stop(); Node getL2pNode(); void logMessage(String message); void logError(String message, Throwable throwable); void logError(String message); NameLock getLockOidc(); String getOidcClientId(); String getOidcClientSecret(); int getHttpPort(); int getHttpsPort(); X509Certificate getCACertificate(); AgentImpl authenticateAgent(MultivaluedMap<String, String> requestHeaders, String accessTokenQueryParam); AgentSession getOrCreateSession(PassphraseAgentImpl agent); AgentSession getSessionById(String sessionid); void destroySession(String sessionId); String generateToken(); static final int DEFAULT_HTTP_PORT; static final String WEB_CONNECTOR; static final int DEFAULT_HTTPS_PORT; static final boolean DEFAULT_START_HTTP; static final boolean DEFAULT_START_HTTPS; static final String DEFAULT_CROSS_ORIGIN_RESOURCE_DOMAIN; static final int DEFAULT_CROSS_ORIGIN_RESOURCE_MAX_AGE; static final boolean DEFAULT_ENABLE_CROSS_ORIGIN_RESOURCE_SHARING; static final boolean DEFAULT_ONLY_LOCAL_SERVICES; static final String SESSION_COOKIE; static final String DEFAULT_DEFAULT_OIDC_PROVIDER; public String defaultOIDCProvider; public ArrayList<String> oidcProviders; static final int DEFAULT_MAX_CONNECTIONS; static final String COOKIE_SESSIONID_KEY; static final int DEFAULT_SESSION_TIMEOUT; static final int DEFAULT_MAX_THREADS; static final int DEFAULT_MAX_REQUEST_BODY_SIZE; static final String SSL_INSTANCE_NAME; public Map<String, JSONObject> oidcProviderInfos; }
@Test public void testPathResolve() { try { MiniClient c = new MiniClient(); c.setConnectorEndpoint(connector.getHttpEndpoint()); c.setLogin(testAgent.getIdentifier(), testPass); ClientResponse result = c.sendRequest("GET", "deep/path/test", ""); Assert.assertEquals(200, result.getHttpCode()); Assert.assertTrue(result.getResponse().trim().endsWith("deep/path/")); result = c.sendRequest("GET", "deep/path/v1/test", ""); Assert.assertEquals(200, result.getHttpCode()); Assert.assertTrue(result.getResponse().trim().endsWith("deep/path/v1/")); result = c.sendRequest("GET", "deep/path", ""); Assert.assertEquals(200, result.getHttpCode()); Assert.assertTrue(result.getResponse().trim().endsWith("deep/path/")); result = c.sendRequest("GET", "deep/path/v1", ""); Assert.assertEquals(200, result.getHttpCode()); Assert.assertTrue(result.getResponse().trim().endsWith("deep/path/v1/")); } catch (Exception e) { e.printStackTrace(); Assert.fail("Exception: " + e); } }
public String getHttpEndpoint() { return "http: }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); void setLogFile(String filename); void setHttpPort(Integer port); void setHttpsPort(Integer port); void enableHttpHttps(boolean http, boolean https); @Deprecated void setSocketTimeout(int timeoutInMs); void setLogStream(OutputStream stream); void setSslKeyPassword(String password); void setSslKeystore(String keystore); void setCrossOriginResourceDomain(String cord); String getCrossOriginResourceDomain(); void setCrossOriginResourceMaxAge(int maxAge); int getCrossOriginResourceMaxAge(); void setCrossOriginResourceSharing(boolean enable); boolean isCrossOriginResourceSharing(); void setPreferLocalServices(boolean enable); @Override void start(Node node); String getRootCAFilename(); String getMyHostname(); String getHttpsEndpoint(); String getHttpEndpoint(); @Override synchronized void stop(); Node getL2pNode(); void logMessage(String message); void logError(String message, Throwable throwable); void logError(String message); NameLock getLockOidc(); String getOidcClientId(); String getOidcClientSecret(); int getHttpPort(); int getHttpsPort(); X509Certificate getCACertificate(); AgentImpl authenticateAgent(MultivaluedMap<String, String> requestHeaders, String accessTokenQueryParam); AgentSession getOrCreateSession(PassphraseAgentImpl agent); AgentSession getSessionById(String sessionid); void destroySession(String sessionId); String generateToken(); }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); void setLogFile(String filename); void setHttpPort(Integer port); void setHttpsPort(Integer port); void enableHttpHttps(boolean http, boolean https); @Deprecated void setSocketTimeout(int timeoutInMs); void setLogStream(OutputStream stream); void setSslKeyPassword(String password); void setSslKeystore(String keystore); void setCrossOriginResourceDomain(String cord); String getCrossOriginResourceDomain(); void setCrossOriginResourceMaxAge(int maxAge); int getCrossOriginResourceMaxAge(); void setCrossOriginResourceSharing(boolean enable); boolean isCrossOriginResourceSharing(); void setPreferLocalServices(boolean enable); @Override void start(Node node); String getRootCAFilename(); String getMyHostname(); String getHttpsEndpoint(); String getHttpEndpoint(); @Override synchronized void stop(); Node getL2pNode(); void logMessage(String message); void logError(String message, Throwable throwable); void logError(String message); NameLock getLockOidc(); String getOidcClientId(); String getOidcClientSecret(); int getHttpPort(); int getHttpsPort(); X509Certificate getCACertificate(); AgentImpl authenticateAgent(MultivaluedMap<String, String> requestHeaders, String accessTokenQueryParam); AgentSession getOrCreateSession(PassphraseAgentImpl agent); AgentSession getSessionById(String sessionid); void destroySession(String sessionId); String generateToken(); static final int DEFAULT_HTTP_PORT; static final String WEB_CONNECTOR; static final int DEFAULT_HTTPS_PORT; static final boolean DEFAULT_START_HTTP; static final boolean DEFAULT_START_HTTPS; static final String DEFAULT_CROSS_ORIGIN_RESOURCE_DOMAIN; static final int DEFAULT_CROSS_ORIGIN_RESOURCE_MAX_AGE; static final boolean DEFAULT_ENABLE_CROSS_ORIGIN_RESOURCE_SHARING; static final boolean DEFAULT_ONLY_LOCAL_SERVICES; static final String SESSION_COOKIE; static final String DEFAULT_DEFAULT_OIDC_PROVIDER; public String defaultOIDCProvider; public ArrayList<String> oidcProviders; static final int DEFAULT_MAX_CONNECTIONS; static final String COOKIE_SESSIONID_KEY; static final int DEFAULT_SESSION_TIMEOUT; static final int DEFAULT_MAX_THREADS; static final int DEFAULT_MAX_REQUEST_BODY_SIZE; static final String SSL_INSTANCE_NAME; public Map<String, JSONObject> oidcProviderInfos; }
@Test public void testFavicon() { try { MiniClient c = new MiniClient(); c.setConnectorEndpoint(connector.getHttpEndpoint()); c.setLogin(testAgent.getIdentifier(), testPass); ClientResponse result = c.sendRequest("GET", "favicon.ico", ""); Assert.assertEquals(200, result.getHttpCode()); Assert.assertArrayEquals(SimpleTools.toByteArray(getClass().getResourceAsStream("/favicon.ico")), result.getRawResponse()); } catch (Exception e) { e.printStackTrace(); Assert.fail("Exception: " + e); } }
public String getHttpEndpoint() { return "http: }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); void setLogFile(String filename); void setHttpPort(Integer port); void setHttpsPort(Integer port); void enableHttpHttps(boolean http, boolean https); @Deprecated void setSocketTimeout(int timeoutInMs); void setLogStream(OutputStream stream); void setSslKeyPassword(String password); void setSslKeystore(String keystore); void setCrossOriginResourceDomain(String cord); String getCrossOriginResourceDomain(); void setCrossOriginResourceMaxAge(int maxAge); int getCrossOriginResourceMaxAge(); void setCrossOriginResourceSharing(boolean enable); boolean isCrossOriginResourceSharing(); void setPreferLocalServices(boolean enable); @Override void start(Node node); String getRootCAFilename(); String getMyHostname(); String getHttpsEndpoint(); String getHttpEndpoint(); @Override synchronized void stop(); Node getL2pNode(); void logMessage(String message); void logError(String message, Throwable throwable); void logError(String message); NameLock getLockOidc(); String getOidcClientId(); String getOidcClientSecret(); int getHttpPort(); int getHttpsPort(); X509Certificate getCACertificate(); AgentImpl authenticateAgent(MultivaluedMap<String, String> requestHeaders, String accessTokenQueryParam); AgentSession getOrCreateSession(PassphraseAgentImpl agent); AgentSession getSessionById(String sessionid); void destroySession(String sessionId); String generateToken(); }
WebConnector extends Connector { public String getHttpEndpoint() { return "http: } WebConnector(); WebConnector(boolean http, int httpPort, boolean https, int httpsPort); WebConnector(Integer httpPort); void setLogFile(String filename); void setHttpPort(Integer port); void setHttpsPort(Integer port); void enableHttpHttps(boolean http, boolean https); @Deprecated void setSocketTimeout(int timeoutInMs); void setLogStream(OutputStream stream); void setSslKeyPassword(String password); void setSslKeystore(String keystore); void setCrossOriginResourceDomain(String cord); String getCrossOriginResourceDomain(); void setCrossOriginResourceMaxAge(int maxAge); int getCrossOriginResourceMaxAge(); void setCrossOriginResourceSharing(boolean enable); boolean isCrossOriginResourceSharing(); void setPreferLocalServices(boolean enable); @Override void start(Node node); String getRootCAFilename(); String getMyHostname(); String getHttpsEndpoint(); String getHttpEndpoint(); @Override synchronized void stop(); Node getL2pNode(); void logMessage(String message); void logError(String message, Throwable throwable); void logError(String message); NameLock getLockOidc(); String getOidcClientId(); String getOidcClientSecret(); int getHttpPort(); int getHttpsPort(); X509Certificate getCACertificate(); AgentImpl authenticateAgent(MultivaluedMap<String, String> requestHeaders, String accessTokenQueryParam); AgentSession getOrCreateSession(PassphraseAgentImpl agent); AgentSession getSessionById(String sessionid); void destroySession(String sessionId); String generateToken(); static final int DEFAULT_HTTP_PORT; static final String WEB_CONNECTOR; static final int DEFAULT_HTTPS_PORT; static final boolean DEFAULT_START_HTTP; static final boolean DEFAULT_START_HTTPS; static final String DEFAULT_CROSS_ORIGIN_RESOURCE_DOMAIN; static final int DEFAULT_CROSS_ORIGIN_RESOURCE_MAX_AGE; static final boolean DEFAULT_ENABLE_CROSS_ORIGIN_RESOURCE_SHARING; static final boolean DEFAULT_ONLY_LOCAL_SERVICES; static final String SESSION_COOKIE; static final String DEFAULT_DEFAULT_OIDC_PROVIDER; public String defaultOIDCProvider; public ArrayList<String> oidcProviders; static final int DEFAULT_MAX_CONNECTIONS; static final String COOKIE_SESSIONID_KEY; static final int DEFAULT_SESSION_TIMEOUT; static final int DEFAULT_MAX_THREADS; static final int DEFAULT_MAX_REQUEST_BODY_SIZE; static final String SSL_INSTANCE_NAME; public Map<String, JSONObject> oidcProviderInfos; }
@Test public void testTwoNodes() { try { UserAgentImpl adam = MockAgentFactory.getAdam(); UserAgentImpl eve = MockAgentFactory.getEve(); adam.unlock("adamspass"); eve.unlock("evespass"); LocalNodeManager manager = new LocalNodeManager(); LocalNode testee1 = manager.launchAgent(adam); manager.launchAgent(eve); assertTrue(manager.findAllNodesWithAgent(adam.getIdentifier()).length > 0); assertTrue(manager.findAllNodesWithAgent(eve.getIdentifier()).length > 0); MessageResultListener l = new MessageResultListener(10000); Message m = new Message(adam, eve, new PingPongContent()); testee1.sendMessage(m, l); l.waitForAllAnswers(); assertEquals(1, l.getNumberOfExpectedResults()); assertTrue(l.isFinished()); assertTrue(l.isSuccess()); } catch (Exception e) { e.printStackTrace(); Assert.fail(e.toString()); } }
@Override public void sendMessage(Message message, MessageResultListener listener, SendMode mode) { message.setSendingNodeId(this.getNodeId()); registerAnswerListener(message.getId(), listener); try { switch (mode) { case ANYCAST: if (!message.isTopic()) { localNodeManager.localSendMessage(localNodeManager.findFirstNodeWithAgent(message.getRecipientId()), message); } else { Long[] ids = localNodeManager.findAllNodesWithTopic(message.getTopicId()); if (ids.length == 0) { listener.collectException( new MessageException("No agent listening to topic " + message.getTopicId())); } else { localNodeManager.localSendMessage(ids[0], message); } } break; case BROADCAST: if (!message.isTopic()) { Long[] ids = localNodeManager.findAllNodesWithAgent(message.getRecipientId()); if (ids.length == 0) { listener.collectException(new AgentNotRegisteredException(message.getRecipientId())); } else { listener.addRecipients(ids.length - 1); for (long id : ids) { localNodeManager.localSendMessage(id, message); } } } else { Long[] ids = localNodeManager.findAllNodesWithTopic(message.getTopicId()); if (ids.length == 0) { listener.collectException( new MessageException("No agent listening to topic " + message.getTopicId())); } else { listener.addRecipients(ids.length - 1); for (long id : ids) { localNodeManager.localSendMessage(id, message); } } } } } catch (AgentNotRegisteredException e) { localNodeManager.storeMessage(message, listener); } }
LocalNode extends Node { @Override public void sendMessage(Message message, MessageResultListener listener, SendMode mode) { message.setSendingNodeId(this.getNodeId()); registerAnswerListener(message.getId(), listener); try { switch (mode) { case ANYCAST: if (!message.isTopic()) { localNodeManager.localSendMessage(localNodeManager.findFirstNodeWithAgent(message.getRecipientId()), message); } else { Long[] ids = localNodeManager.findAllNodesWithTopic(message.getTopicId()); if (ids.length == 0) { listener.collectException( new MessageException("No agent listening to topic " + message.getTopicId())); } else { localNodeManager.localSendMessage(ids[0], message); } } break; case BROADCAST: if (!message.isTopic()) { Long[] ids = localNodeManager.findAllNodesWithAgent(message.getRecipientId()); if (ids.length == 0) { listener.collectException(new AgentNotRegisteredException(message.getRecipientId())); } else { listener.addRecipients(ids.length - 1); for (long id : ids) { localNodeManager.localSendMessage(id, message); } } } else { Long[] ids = localNodeManager.findAllNodesWithTopic(message.getTopicId()); if (ids.length == 0) { listener.collectException( new MessageException("No agent listening to topic " + message.getTopicId())); } else { listener.addRecipients(ids.length - 1); for (long id : ids) { localNodeManager.localSendMessage(id, message); } } } } } catch (AgentNotRegisteredException e) { localNodeManager.storeMessage(message, listener); } } }
LocalNode extends Node { @Override public void sendMessage(Message message, MessageResultListener listener, SendMode mode) { message.setSendingNodeId(this.getNodeId()); registerAnswerListener(message.getId(), listener); try { switch (mode) { case ANYCAST: if (!message.isTopic()) { localNodeManager.localSendMessage(localNodeManager.findFirstNodeWithAgent(message.getRecipientId()), message); } else { Long[] ids = localNodeManager.findAllNodesWithTopic(message.getTopicId()); if (ids.length == 0) { listener.collectException( new MessageException("No agent listening to topic " + message.getTopicId())); } else { localNodeManager.localSendMessage(ids[0], message); } } break; case BROADCAST: if (!message.isTopic()) { Long[] ids = localNodeManager.findAllNodesWithAgent(message.getRecipientId()); if (ids.length == 0) { listener.collectException(new AgentNotRegisteredException(message.getRecipientId())); } else { listener.addRecipients(ids.length - 1); for (long id : ids) { localNodeManager.localSendMessage(id, message); } } } else { Long[] ids = localNodeManager.findAllNodesWithTopic(message.getTopicId()); if (ids.length == 0) { listener.collectException( new MessageException("No agent listening to topic " + message.getTopicId())); } else { listener.addRecipients(ids.length - 1); for (long id : ids) { localNodeManager.localSendMessage(id, message); } } } } } catch (AgentNotRegisteredException e) { localNodeManager.storeMessage(message, listener); } } LocalNode(LocalNodeManager localNodeManager); LocalNode(LocalNodeManager localNodeManager, ClassManager classManager); }
LocalNode extends Node { @Override public void sendMessage(Message message, MessageResultListener listener, SendMode mode) { message.setSendingNodeId(this.getNodeId()); registerAnswerListener(message.getId(), listener); try { switch (mode) { case ANYCAST: if (!message.isTopic()) { localNodeManager.localSendMessage(localNodeManager.findFirstNodeWithAgent(message.getRecipientId()), message); } else { Long[] ids = localNodeManager.findAllNodesWithTopic(message.getTopicId()); if (ids.length == 0) { listener.collectException( new MessageException("No agent listening to topic " + message.getTopicId())); } else { localNodeManager.localSendMessage(ids[0], message); } } break; case BROADCAST: if (!message.isTopic()) { Long[] ids = localNodeManager.findAllNodesWithAgent(message.getRecipientId()); if (ids.length == 0) { listener.collectException(new AgentNotRegisteredException(message.getRecipientId())); } else { listener.addRecipients(ids.length - 1); for (long id : ids) { localNodeManager.localSendMessage(id, message); } } } else { Long[] ids = localNodeManager.findAllNodesWithTopic(message.getTopicId()); if (ids.length == 0) { listener.collectException( new MessageException("No agent listening to topic " + message.getTopicId())); } else { listener.addRecipients(ids.length - 1); for (long id : ids) { localNodeManager.localSendMessage(id, message); } } } } } catch (AgentNotRegisteredException e) { localNodeManager.storeMessage(message, listener); } } LocalNode(LocalNodeManager localNodeManager); LocalNode(LocalNodeManager localNodeManager, ClassManager classManager); @Override Long getNodeId(); @Override void shutDown(); @Override void registerReceiver(MessageReceiver receiver); @Override void sendMessage(Message message, MessageResultListener listener, SendMode mode); @Override void sendMessage(Message message, Object atNodeId, MessageResultListener listener); @Deprecated @Override EnvelopeVersion fetchArtifact(long id); @Deprecated @Override void storeArtifact(EnvelopeVersion envelope); @Deprecated @Override void removeArtifact(long id, byte[] signature); @Override Object[] findRegisteredAgent(String agentId, int hintOfExpectedCount); @Override AgentImpl getAgent(String id); void storeAgent(Agent agent); @Override void storeAgent(AgentImpl agent); @Deprecated @Override void updateAgent(AgentImpl agent); @Override Object[] getOtherKnownNodes(); @Override NodeInformation getNodeInformation(Object nodeId); @Override EnvelopeVersion createEnvelope(String identifier, PublicKey authorPubKey, Serializable content, AgentImpl... reader); @Override EnvelopeVersion createEnvelope(EnvelopeVersion previousVersion, Serializable content); @Override EnvelopeVersion createEnvelope(EnvelopeVersion previousVersion, Serializable content, AgentImpl... reader); @Override void storeEnvelope(EnvelopeVersion envelope, AgentImpl author); @Override EnvelopeVersion fetchEnvelope(String identifier); @Override EnvelopeVersion createEnvelope(String identifier, PublicKey authorPubKey, Serializable content, Collection<?> readers); @Override EnvelopeVersion createEnvelope(EnvelopeVersion previousVersion, Serializable content, Collection<?> readers); @Override EnvelopeVersion createUnencryptedEnvelope(String identifier, PublicKey authorPubKey, Serializable content); @Override EnvelopeVersion createUnencryptedEnvelope(EnvelopeVersion previousVersion, Serializable content); @Override void storeEnvelope(EnvelopeVersion envelope, AgentImpl author, long timeoutMs); @Override void storeEnvelopeAsync(EnvelopeVersion envelope, AgentImpl author, StorageStoreResultHandler resultHandler, StorageCollisionHandler collisionHandler, StorageExceptionHandler exceptionHandler); @Override EnvelopeVersion fetchEnvelope(String identifier, long timeoutMs); @Override void fetchEnvelopeAsync(String identifier, StorageEnvelopeHandler envelopeHandler, StorageExceptionHandler exceptionHandler); @Override void removeEnvelope(String identifier); @Override EnvelopeVersion fetchArtifact(String identifier); }
LocalNode extends Node { @Override public void sendMessage(Message message, MessageResultListener listener, SendMode mode) { message.setSendingNodeId(this.getNodeId()); registerAnswerListener(message.getId(), listener); try { switch (mode) { case ANYCAST: if (!message.isTopic()) { localNodeManager.localSendMessage(localNodeManager.findFirstNodeWithAgent(message.getRecipientId()), message); } else { Long[] ids = localNodeManager.findAllNodesWithTopic(message.getTopicId()); if (ids.length == 0) { listener.collectException( new MessageException("No agent listening to topic " + message.getTopicId())); } else { localNodeManager.localSendMessage(ids[0], message); } } break; case BROADCAST: if (!message.isTopic()) { Long[] ids = localNodeManager.findAllNodesWithAgent(message.getRecipientId()); if (ids.length == 0) { listener.collectException(new AgentNotRegisteredException(message.getRecipientId())); } else { listener.addRecipients(ids.length - 1); for (long id : ids) { localNodeManager.localSendMessage(id, message); } } } else { Long[] ids = localNodeManager.findAllNodesWithTopic(message.getTopicId()); if (ids.length == 0) { listener.collectException( new MessageException("No agent listening to topic " + message.getTopicId())); } else { listener.addRecipients(ids.length - 1); for (long id : ids) { localNodeManager.localSendMessage(id, message); } } } } } catch (AgentNotRegisteredException e) { localNodeManager.storeMessage(message, listener); } } LocalNode(LocalNodeManager localNodeManager); LocalNode(LocalNodeManager localNodeManager, ClassManager classManager); @Override Long getNodeId(); @Override void shutDown(); @Override void registerReceiver(MessageReceiver receiver); @Override void sendMessage(Message message, MessageResultListener listener, SendMode mode); @Override void sendMessage(Message message, Object atNodeId, MessageResultListener listener); @Deprecated @Override EnvelopeVersion fetchArtifact(long id); @Deprecated @Override void storeArtifact(EnvelopeVersion envelope); @Deprecated @Override void removeArtifact(long id, byte[] signature); @Override Object[] findRegisteredAgent(String agentId, int hintOfExpectedCount); @Override AgentImpl getAgent(String id); void storeAgent(Agent agent); @Override void storeAgent(AgentImpl agent); @Deprecated @Override void updateAgent(AgentImpl agent); @Override Object[] getOtherKnownNodes(); @Override NodeInformation getNodeInformation(Object nodeId); @Override EnvelopeVersion createEnvelope(String identifier, PublicKey authorPubKey, Serializable content, AgentImpl... reader); @Override EnvelopeVersion createEnvelope(EnvelopeVersion previousVersion, Serializable content); @Override EnvelopeVersion createEnvelope(EnvelopeVersion previousVersion, Serializable content, AgentImpl... reader); @Override void storeEnvelope(EnvelopeVersion envelope, AgentImpl author); @Override EnvelopeVersion fetchEnvelope(String identifier); @Override EnvelopeVersion createEnvelope(String identifier, PublicKey authorPubKey, Serializable content, Collection<?> readers); @Override EnvelopeVersion createEnvelope(EnvelopeVersion previousVersion, Serializable content, Collection<?> readers); @Override EnvelopeVersion createUnencryptedEnvelope(String identifier, PublicKey authorPubKey, Serializable content); @Override EnvelopeVersion createUnencryptedEnvelope(EnvelopeVersion previousVersion, Serializable content); @Override void storeEnvelope(EnvelopeVersion envelope, AgentImpl author, long timeoutMs); @Override void storeEnvelopeAsync(EnvelopeVersion envelope, AgentImpl author, StorageStoreResultHandler resultHandler, StorageCollisionHandler collisionHandler, StorageExceptionHandler exceptionHandler); @Override EnvelopeVersion fetchEnvelope(String identifier, long timeoutMs); @Override void fetchEnvelopeAsync(String identifier, StorageEnvelopeHandler envelopeHandler, StorageExceptionHandler exceptionHandler); @Override void removeEnvelope(String identifier); @Override EnvelopeVersion fetchArtifact(String identifier); }
@Test public void testTimeout() { try { UserAgentImpl adam = MockAgentFactory.getAdam(); adam.unlock("adamspass"); UserAgentImpl eve = MockAgentFactory.getEve(); LocalNodeManager manager = new LocalNodeManager(); LocalNode testee1 = manager.launchAgent(adam); MessageResultListener l = new MessageResultListener(2000) { @Override public void notifyTimeout() { LocalNodeTest.testTimeoutVariable = true; } }; Message m = new Message(adam, eve, new PingPongContent(), 1000); manager.setPendingTimeOut(1000); testee1.sendMessage(m, l); Thread.sleep(30000); assertFalse(l.isSuccess()); assertTrue(l.isTimedOut()); assertEquals(0, l.getResults().length); assertTrue(testTimeoutVariable); } catch (Exception e) { e.printStackTrace(); Assert.fail(e.toString()); } }
@Override public void sendMessage(Message message, MessageResultListener listener, SendMode mode) { message.setSendingNodeId(this.getNodeId()); registerAnswerListener(message.getId(), listener); try { switch (mode) { case ANYCAST: if (!message.isTopic()) { localNodeManager.localSendMessage(localNodeManager.findFirstNodeWithAgent(message.getRecipientId()), message); } else { Long[] ids = localNodeManager.findAllNodesWithTopic(message.getTopicId()); if (ids.length == 0) { listener.collectException( new MessageException("No agent listening to topic " + message.getTopicId())); } else { localNodeManager.localSendMessage(ids[0], message); } } break; case BROADCAST: if (!message.isTopic()) { Long[] ids = localNodeManager.findAllNodesWithAgent(message.getRecipientId()); if (ids.length == 0) { listener.collectException(new AgentNotRegisteredException(message.getRecipientId())); } else { listener.addRecipients(ids.length - 1); for (long id : ids) { localNodeManager.localSendMessage(id, message); } } } else { Long[] ids = localNodeManager.findAllNodesWithTopic(message.getTopicId()); if (ids.length == 0) { listener.collectException( new MessageException("No agent listening to topic " + message.getTopicId())); } else { listener.addRecipients(ids.length - 1); for (long id : ids) { localNodeManager.localSendMessage(id, message); } } } } } catch (AgentNotRegisteredException e) { localNodeManager.storeMessage(message, listener); } }
LocalNode extends Node { @Override public void sendMessage(Message message, MessageResultListener listener, SendMode mode) { message.setSendingNodeId(this.getNodeId()); registerAnswerListener(message.getId(), listener); try { switch (mode) { case ANYCAST: if (!message.isTopic()) { localNodeManager.localSendMessage(localNodeManager.findFirstNodeWithAgent(message.getRecipientId()), message); } else { Long[] ids = localNodeManager.findAllNodesWithTopic(message.getTopicId()); if (ids.length == 0) { listener.collectException( new MessageException("No agent listening to topic " + message.getTopicId())); } else { localNodeManager.localSendMessage(ids[0], message); } } break; case BROADCAST: if (!message.isTopic()) { Long[] ids = localNodeManager.findAllNodesWithAgent(message.getRecipientId()); if (ids.length == 0) { listener.collectException(new AgentNotRegisteredException(message.getRecipientId())); } else { listener.addRecipients(ids.length - 1); for (long id : ids) { localNodeManager.localSendMessage(id, message); } } } else { Long[] ids = localNodeManager.findAllNodesWithTopic(message.getTopicId()); if (ids.length == 0) { listener.collectException( new MessageException("No agent listening to topic " + message.getTopicId())); } else { listener.addRecipients(ids.length - 1); for (long id : ids) { localNodeManager.localSendMessage(id, message); } } } } } catch (AgentNotRegisteredException e) { localNodeManager.storeMessage(message, listener); } } }
LocalNode extends Node { @Override public void sendMessage(Message message, MessageResultListener listener, SendMode mode) { message.setSendingNodeId(this.getNodeId()); registerAnswerListener(message.getId(), listener); try { switch (mode) { case ANYCAST: if (!message.isTopic()) { localNodeManager.localSendMessage(localNodeManager.findFirstNodeWithAgent(message.getRecipientId()), message); } else { Long[] ids = localNodeManager.findAllNodesWithTopic(message.getTopicId()); if (ids.length == 0) { listener.collectException( new MessageException("No agent listening to topic " + message.getTopicId())); } else { localNodeManager.localSendMessage(ids[0], message); } } break; case BROADCAST: if (!message.isTopic()) { Long[] ids = localNodeManager.findAllNodesWithAgent(message.getRecipientId()); if (ids.length == 0) { listener.collectException(new AgentNotRegisteredException(message.getRecipientId())); } else { listener.addRecipients(ids.length - 1); for (long id : ids) { localNodeManager.localSendMessage(id, message); } } } else { Long[] ids = localNodeManager.findAllNodesWithTopic(message.getTopicId()); if (ids.length == 0) { listener.collectException( new MessageException("No agent listening to topic " + message.getTopicId())); } else { listener.addRecipients(ids.length - 1); for (long id : ids) { localNodeManager.localSendMessage(id, message); } } } } } catch (AgentNotRegisteredException e) { localNodeManager.storeMessage(message, listener); } } LocalNode(LocalNodeManager localNodeManager); LocalNode(LocalNodeManager localNodeManager, ClassManager classManager); }
LocalNode extends Node { @Override public void sendMessage(Message message, MessageResultListener listener, SendMode mode) { message.setSendingNodeId(this.getNodeId()); registerAnswerListener(message.getId(), listener); try { switch (mode) { case ANYCAST: if (!message.isTopic()) { localNodeManager.localSendMessage(localNodeManager.findFirstNodeWithAgent(message.getRecipientId()), message); } else { Long[] ids = localNodeManager.findAllNodesWithTopic(message.getTopicId()); if (ids.length == 0) { listener.collectException( new MessageException("No agent listening to topic " + message.getTopicId())); } else { localNodeManager.localSendMessage(ids[0], message); } } break; case BROADCAST: if (!message.isTopic()) { Long[] ids = localNodeManager.findAllNodesWithAgent(message.getRecipientId()); if (ids.length == 0) { listener.collectException(new AgentNotRegisteredException(message.getRecipientId())); } else { listener.addRecipients(ids.length - 1); for (long id : ids) { localNodeManager.localSendMessage(id, message); } } } else { Long[] ids = localNodeManager.findAllNodesWithTopic(message.getTopicId()); if (ids.length == 0) { listener.collectException( new MessageException("No agent listening to topic " + message.getTopicId())); } else { listener.addRecipients(ids.length - 1); for (long id : ids) { localNodeManager.localSendMessage(id, message); } } } } } catch (AgentNotRegisteredException e) { localNodeManager.storeMessage(message, listener); } } LocalNode(LocalNodeManager localNodeManager); LocalNode(LocalNodeManager localNodeManager, ClassManager classManager); @Override Long getNodeId(); @Override void shutDown(); @Override void registerReceiver(MessageReceiver receiver); @Override void sendMessage(Message message, MessageResultListener listener, SendMode mode); @Override void sendMessage(Message message, Object atNodeId, MessageResultListener listener); @Deprecated @Override EnvelopeVersion fetchArtifact(long id); @Deprecated @Override void storeArtifact(EnvelopeVersion envelope); @Deprecated @Override void removeArtifact(long id, byte[] signature); @Override Object[] findRegisteredAgent(String agentId, int hintOfExpectedCount); @Override AgentImpl getAgent(String id); void storeAgent(Agent agent); @Override void storeAgent(AgentImpl agent); @Deprecated @Override void updateAgent(AgentImpl agent); @Override Object[] getOtherKnownNodes(); @Override NodeInformation getNodeInformation(Object nodeId); @Override EnvelopeVersion createEnvelope(String identifier, PublicKey authorPubKey, Serializable content, AgentImpl... reader); @Override EnvelopeVersion createEnvelope(EnvelopeVersion previousVersion, Serializable content); @Override EnvelopeVersion createEnvelope(EnvelopeVersion previousVersion, Serializable content, AgentImpl... reader); @Override void storeEnvelope(EnvelopeVersion envelope, AgentImpl author); @Override EnvelopeVersion fetchEnvelope(String identifier); @Override EnvelopeVersion createEnvelope(String identifier, PublicKey authorPubKey, Serializable content, Collection<?> readers); @Override EnvelopeVersion createEnvelope(EnvelopeVersion previousVersion, Serializable content, Collection<?> readers); @Override EnvelopeVersion createUnencryptedEnvelope(String identifier, PublicKey authorPubKey, Serializable content); @Override EnvelopeVersion createUnencryptedEnvelope(EnvelopeVersion previousVersion, Serializable content); @Override void storeEnvelope(EnvelopeVersion envelope, AgentImpl author, long timeoutMs); @Override void storeEnvelopeAsync(EnvelopeVersion envelope, AgentImpl author, StorageStoreResultHandler resultHandler, StorageCollisionHandler collisionHandler, StorageExceptionHandler exceptionHandler); @Override EnvelopeVersion fetchEnvelope(String identifier, long timeoutMs); @Override void fetchEnvelopeAsync(String identifier, StorageEnvelopeHandler envelopeHandler, StorageExceptionHandler exceptionHandler); @Override void removeEnvelope(String identifier); @Override EnvelopeVersion fetchArtifact(String identifier); }
LocalNode extends Node { @Override public void sendMessage(Message message, MessageResultListener listener, SendMode mode) { message.setSendingNodeId(this.getNodeId()); registerAnswerListener(message.getId(), listener); try { switch (mode) { case ANYCAST: if (!message.isTopic()) { localNodeManager.localSendMessage(localNodeManager.findFirstNodeWithAgent(message.getRecipientId()), message); } else { Long[] ids = localNodeManager.findAllNodesWithTopic(message.getTopicId()); if (ids.length == 0) { listener.collectException( new MessageException("No agent listening to topic " + message.getTopicId())); } else { localNodeManager.localSendMessage(ids[0], message); } } break; case BROADCAST: if (!message.isTopic()) { Long[] ids = localNodeManager.findAllNodesWithAgent(message.getRecipientId()); if (ids.length == 0) { listener.collectException(new AgentNotRegisteredException(message.getRecipientId())); } else { listener.addRecipients(ids.length - 1); for (long id : ids) { localNodeManager.localSendMessage(id, message); } } } else { Long[] ids = localNodeManager.findAllNodesWithTopic(message.getTopicId()); if (ids.length == 0) { listener.collectException( new MessageException("No agent listening to topic " + message.getTopicId())); } else { listener.addRecipients(ids.length - 1); for (long id : ids) { localNodeManager.localSendMessage(id, message); } } } } } catch (AgentNotRegisteredException e) { localNodeManager.storeMessage(message, listener); } } LocalNode(LocalNodeManager localNodeManager); LocalNode(LocalNodeManager localNodeManager, ClassManager classManager); @Override Long getNodeId(); @Override void shutDown(); @Override void registerReceiver(MessageReceiver receiver); @Override void sendMessage(Message message, MessageResultListener listener, SendMode mode); @Override void sendMessage(Message message, Object atNodeId, MessageResultListener listener); @Deprecated @Override EnvelopeVersion fetchArtifact(long id); @Deprecated @Override void storeArtifact(EnvelopeVersion envelope); @Deprecated @Override void removeArtifact(long id, byte[] signature); @Override Object[] findRegisteredAgent(String agentId, int hintOfExpectedCount); @Override AgentImpl getAgent(String id); void storeAgent(Agent agent); @Override void storeAgent(AgentImpl agent); @Deprecated @Override void updateAgent(AgentImpl agent); @Override Object[] getOtherKnownNodes(); @Override NodeInformation getNodeInformation(Object nodeId); @Override EnvelopeVersion createEnvelope(String identifier, PublicKey authorPubKey, Serializable content, AgentImpl... reader); @Override EnvelopeVersion createEnvelope(EnvelopeVersion previousVersion, Serializable content); @Override EnvelopeVersion createEnvelope(EnvelopeVersion previousVersion, Serializable content, AgentImpl... reader); @Override void storeEnvelope(EnvelopeVersion envelope, AgentImpl author); @Override EnvelopeVersion fetchEnvelope(String identifier); @Override EnvelopeVersion createEnvelope(String identifier, PublicKey authorPubKey, Serializable content, Collection<?> readers); @Override EnvelopeVersion createEnvelope(EnvelopeVersion previousVersion, Serializable content, Collection<?> readers); @Override EnvelopeVersion createUnencryptedEnvelope(String identifier, PublicKey authorPubKey, Serializable content); @Override EnvelopeVersion createUnencryptedEnvelope(EnvelopeVersion previousVersion, Serializable content); @Override void storeEnvelope(EnvelopeVersion envelope, AgentImpl author, long timeoutMs); @Override void storeEnvelopeAsync(EnvelopeVersion envelope, AgentImpl author, StorageStoreResultHandler resultHandler, StorageCollisionHandler collisionHandler, StorageExceptionHandler exceptionHandler); @Override EnvelopeVersion fetchEnvelope(String identifier, long timeoutMs); @Override void fetchEnvelopeAsync(String identifier, StorageEnvelopeHandler envelopeHandler, StorageExceptionHandler exceptionHandler); @Override void removeEnvelope(String identifier); @Override EnvelopeVersion fetchArtifact(String identifier); }
@Test public void testPending() { try { UserAgentImpl adam = MockAgentFactory.getAdam(); adam.unlock("adamspass"); UserAgentImpl eve = MockAgentFactory.getEve(); eve.unlock("evespass"); LocalNodeManager manager = new LocalNodeManager(); LocalNode node1 = manager.launchAgent(adam); MessageResultListener resultListener = new MessageResultListener(8000) { @Override public void notifySuccess() { LocalNodeTest.testPendingVariable = true; } }; Message msg = new Message(adam, eve, new PingPongContent()); node1.sendMessage(msg, resultListener); Thread.sleep(5000); assertFalse(testPendingVariable); assertFalse(resultListener.isSuccess()); assertFalse(resultListener.isFinished()); manager.launchAgent(eve); Thread.sleep(manager.getMaxMessageWait() + 6000); assertTrue(resultListener.isSuccess()); assertTrue(resultListener.isFinished()); assertTrue(testPendingVariable); } catch (Exception e) { e.printStackTrace(); Assert.fail(e.toString()); } }
@Override public void sendMessage(Message message, MessageResultListener listener, SendMode mode) { message.setSendingNodeId(this.getNodeId()); registerAnswerListener(message.getId(), listener); try { switch (mode) { case ANYCAST: if (!message.isTopic()) { localNodeManager.localSendMessage(localNodeManager.findFirstNodeWithAgent(message.getRecipientId()), message); } else { Long[] ids = localNodeManager.findAllNodesWithTopic(message.getTopicId()); if (ids.length == 0) { listener.collectException( new MessageException("No agent listening to topic " + message.getTopicId())); } else { localNodeManager.localSendMessage(ids[0], message); } } break; case BROADCAST: if (!message.isTopic()) { Long[] ids = localNodeManager.findAllNodesWithAgent(message.getRecipientId()); if (ids.length == 0) { listener.collectException(new AgentNotRegisteredException(message.getRecipientId())); } else { listener.addRecipients(ids.length - 1); for (long id : ids) { localNodeManager.localSendMessage(id, message); } } } else { Long[] ids = localNodeManager.findAllNodesWithTopic(message.getTopicId()); if (ids.length == 0) { listener.collectException( new MessageException("No agent listening to topic " + message.getTopicId())); } else { listener.addRecipients(ids.length - 1); for (long id : ids) { localNodeManager.localSendMessage(id, message); } } } } } catch (AgentNotRegisteredException e) { localNodeManager.storeMessage(message, listener); } }
LocalNode extends Node { @Override public void sendMessage(Message message, MessageResultListener listener, SendMode mode) { message.setSendingNodeId(this.getNodeId()); registerAnswerListener(message.getId(), listener); try { switch (mode) { case ANYCAST: if (!message.isTopic()) { localNodeManager.localSendMessage(localNodeManager.findFirstNodeWithAgent(message.getRecipientId()), message); } else { Long[] ids = localNodeManager.findAllNodesWithTopic(message.getTopicId()); if (ids.length == 0) { listener.collectException( new MessageException("No agent listening to topic " + message.getTopicId())); } else { localNodeManager.localSendMessage(ids[0], message); } } break; case BROADCAST: if (!message.isTopic()) { Long[] ids = localNodeManager.findAllNodesWithAgent(message.getRecipientId()); if (ids.length == 0) { listener.collectException(new AgentNotRegisteredException(message.getRecipientId())); } else { listener.addRecipients(ids.length - 1); for (long id : ids) { localNodeManager.localSendMessage(id, message); } } } else { Long[] ids = localNodeManager.findAllNodesWithTopic(message.getTopicId()); if (ids.length == 0) { listener.collectException( new MessageException("No agent listening to topic " + message.getTopicId())); } else { listener.addRecipients(ids.length - 1); for (long id : ids) { localNodeManager.localSendMessage(id, message); } } } } } catch (AgentNotRegisteredException e) { localNodeManager.storeMessage(message, listener); } } }
LocalNode extends Node { @Override public void sendMessage(Message message, MessageResultListener listener, SendMode mode) { message.setSendingNodeId(this.getNodeId()); registerAnswerListener(message.getId(), listener); try { switch (mode) { case ANYCAST: if (!message.isTopic()) { localNodeManager.localSendMessage(localNodeManager.findFirstNodeWithAgent(message.getRecipientId()), message); } else { Long[] ids = localNodeManager.findAllNodesWithTopic(message.getTopicId()); if (ids.length == 0) { listener.collectException( new MessageException("No agent listening to topic " + message.getTopicId())); } else { localNodeManager.localSendMessage(ids[0], message); } } break; case BROADCAST: if (!message.isTopic()) { Long[] ids = localNodeManager.findAllNodesWithAgent(message.getRecipientId()); if (ids.length == 0) { listener.collectException(new AgentNotRegisteredException(message.getRecipientId())); } else { listener.addRecipients(ids.length - 1); for (long id : ids) { localNodeManager.localSendMessage(id, message); } } } else { Long[] ids = localNodeManager.findAllNodesWithTopic(message.getTopicId()); if (ids.length == 0) { listener.collectException( new MessageException("No agent listening to topic " + message.getTopicId())); } else { listener.addRecipients(ids.length - 1); for (long id : ids) { localNodeManager.localSendMessage(id, message); } } } } } catch (AgentNotRegisteredException e) { localNodeManager.storeMessage(message, listener); } } LocalNode(LocalNodeManager localNodeManager); LocalNode(LocalNodeManager localNodeManager, ClassManager classManager); }
LocalNode extends Node { @Override public void sendMessage(Message message, MessageResultListener listener, SendMode mode) { message.setSendingNodeId(this.getNodeId()); registerAnswerListener(message.getId(), listener); try { switch (mode) { case ANYCAST: if (!message.isTopic()) { localNodeManager.localSendMessage(localNodeManager.findFirstNodeWithAgent(message.getRecipientId()), message); } else { Long[] ids = localNodeManager.findAllNodesWithTopic(message.getTopicId()); if (ids.length == 0) { listener.collectException( new MessageException("No agent listening to topic " + message.getTopicId())); } else { localNodeManager.localSendMessage(ids[0], message); } } break; case BROADCAST: if (!message.isTopic()) { Long[] ids = localNodeManager.findAllNodesWithAgent(message.getRecipientId()); if (ids.length == 0) { listener.collectException(new AgentNotRegisteredException(message.getRecipientId())); } else { listener.addRecipients(ids.length - 1); for (long id : ids) { localNodeManager.localSendMessage(id, message); } } } else { Long[] ids = localNodeManager.findAllNodesWithTopic(message.getTopicId()); if (ids.length == 0) { listener.collectException( new MessageException("No agent listening to topic " + message.getTopicId())); } else { listener.addRecipients(ids.length - 1); for (long id : ids) { localNodeManager.localSendMessage(id, message); } } } } } catch (AgentNotRegisteredException e) { localNodeManager.storeMessage(message, listener); } } LocalNode(LocalNodeManager localNodeManager); LocalNode(LocalNodeManager localNodeManager, ClassManager classManager); @Override Long getNodeId(); @Override void shutDown(); @Override void registerReceiver(MessageReceiver receiver); @Override void sendMessage(Message message, MessageResultListener listener, SendMode mode); @Override void sendMessage(Message message, Object atNodeId, MessageResultListener listener); @Deprecated @Override EnvelopeVersion fetchArtifact(long id); @Deprecated @Override void storeArtifact(EnvelopeVersion envelope); @Deprecated @Override void removeArtifact(long id, byte[] signature); @Override Object[] findRegisteredAgent(String agentId, int hintOfExpectedCount); @Override AgentImpl getAgent(String id); void storeAgent(Agent agent); @Override void storeAgent(AgentImpl agent); @Deprecated @Override void updateAgent(AgentImpl agent); @Override Object[] getOtherKnownNodes(); @Override NodeInformation getNodeInformation(Object nodeId); @Override EnvelopeVersion createEnvelope(String identifier, PublicKey authorPubKey, Serializable content, AgentImpl... reader); @Override EnvelopeVersion createEnvelope(EnvelopeVersion previousVersion, Serializable content); @Override EnvelopeVersion createEnvelope(EnvelopeVersion previousVersion, Serializable content, AgentImpl... reader); @Override void storeEnvelope(EnvelopeVersion envelope, AgentImpl author); @Override EnvelopeVersion fetchEnvelope(String identifier); @Override EnvelopeVersion createEnvelope(String identifier, PublicKey authorPubKey, Serializable content, Collection<?> readers); @Override EnvelopeVersion createEnvelope(EnvelopeVersion previousVersion, Serializable content, Collection<?> readers); @Override EnvelopeVersion createUnencryptedEnvelope(String identifier, PublicKey authorPubKey, Serializable content); @Override EnvelopeVersion createUnencryptedEnvelope(EnvelopeVersion previousVersion, Serializable content); @Override void storeEnvelope(EnvelopeVersion envelope, AgentImpl author, long timeoutMs); @Override void storeEnvelopeAsync(EnvelopeVersion envelope, AgentImpl author, StorageStoreResultHandler resultHandler, StorageCollisionHandler collisionHandler, StorageExceptionHandler exceptionHandler); @Override EnvelopeVersion fetchEnvelope(String identifier, long timeoutMs); @Override void fetchEnvelopeAsync(String identifier, StorageEnvelopeHandler envelopeHandler, StorageExceptionHandler exceptionHandler); @Override void removeEnvelope(String identifier); @Override EnvelopeVersion fetchArtifact(String identifier); }
LocalNode extends Node { @Override public void sendMessage(Message message, MessageResultListener listener, SendMode mode) { message.setSendingNodeId(this.getNodeId()); registerAnswerListener(message.getId(), listener); try { switch (mode) { case ANYCAST: if (!message.isTopic()) { localNodeManager.localSendMessage(localNodeManager.findFirstNodeWithAgent(message.getRecipientId()), message); } else { Long[] ids = localNodeManager.findAllNodesWithTopic(message.getTopicId()); if (ids.length == 0) { listener.collectException( new MessageException("No agent listening to topic " + message.getTopicId())); } else { localNodeManager.localSendMessage(ids[0], message); } } break; case BROADCAST: if (!message.isTopic()) { Long[] ids = localNodeManager.findAllNodesWithAgent(message.getRecipientId()); if (ids.length == 0) { listener.collectException(new AgentNotRegisteredException(message.getRecipientId())); } else { listener.addRecipients(ids.length - 1); for (long id : ids) { localNodeManager.localSendMessage(id, message); } } } else { Long[] ids = localNodeManager.findAllNodesWithTopic(message.getTopicId()); if (ids.length == 0) { listener.collectException( new MessageException("No agent listening to topic " + message.getTopicId())); } else { listener.addRecipients(ids.length - 1); for (long id : ids) { localNodeManager.localSendMessage(id, message); } } } } } catch (AgentNotRegisteredException e) { localNodeManager.storeMessage(message, listener); } } LocalNode(LocalNodeManager localNodeManager); LocalNode(LocalNodeManager localNodeManager, ClassManager classManager); @Override Long getNodeId(); @Override void shutDown(); @Override void registerReceiver(MessageReceiver receiver); @Override void sendMessage(Message message, MessageResultListener listener, SendMode mode); @Override void sendMessage(Message message, Object atNodeId, MessageResultListener listener); @Deprecated @Override EnvelopeVersion fetchArtifact(long id); @Deprecated @Override void storeArtifact(EnvelopeVersion envelope); @Deprecated @Override void removeArtifact(long id, byte[] signature); @Override Object[] findRegisteredAgent(String agentId, int hintOfExpectedCount); @Override AgentImpl getAgent(String id); void storeAgent(Agent agent); @Override void storeAgent(AgentImpl agent); @Deprecated @Override void updateAgent(AgentImpl agent); @Override Object[] getOtherKnownNodes(); @Override NodeInformation getNodeInformation(Object nodeId); @Override EnvelopeVersion createEnvelope(String identifier, PublicKey authorPubKey, Serializable content, AgentImpl... reader); @Override EnvelopeVersion createEnvelope(EnvelopeVersion previousVersion, Serializable content); @Override EnvelopeVersion createEnvelope(EnvelopeVersion previousVersion, Serializable content, AgentImpl... reader); @Override void storeEnvelope(EnvelopeVersion envelope, AgentImpl author); @Override EnvelopeVersion fetchEnvelope(String identifier); @Override EnvelopeVersion createEnvelope(String identifier, PublicKey authorPubKey, Serializable content, Collection<?> readers); @Override EnvelopeVersion createEnvelope(EnvelopeVersion previousVersion, Serializable content, Collection<?> readers); @Override EnvelopeVersion createUnencryptedEnvelope(String identifier, PublicKey authorPubKey, Serializable content); @Override EnvelopeVersion createUnencryptedEnvelope(EnvelopeVersion previousVersion, Serializable content); @Override void storeEnvelope(EnvelopeVersion envelope, AgentImpl author, long timeoutMs); @Override void storeEnvelopeAsync(EnvelopeVersion envelope, AgentImpl author, StorageStoreResultHandler resultHandler, StorageCollisionHandler collisionHandler, StorageExceptionHandler exceptionHandler); @Override EnvelopeVersion fetchEnvelope(String identifier, long timeoutMs); @Override void fetchEnvelopeAsync(String identifier, StorageEnvelopeHandler envelopeHandler, StorageExceptionHandler exceptionHandler); @Override void removeEnvelope(String identifier); @Override EnvelopeVersion fetchArtifact(String identifier); }
@Test public void print() { }
public static void print(String title, String message, int type) { switch (type) { case Log.DEBUG: Log.d("EntireNews (" + title + ")", message); break; case Log.ERROR: Log.e("EntireNews (" + title + ")", message); break; case Log.INFO: Log.i("EntireNews (" + title + ")", message); break; case Log.VERBOSE: Log.v("EntireNews (" + title + ")", message); break; case Log.WARN: Log.w("EntireNews (" + title + ")", message); break; default: Log.d("EntireNews (" + title + ")", message); } }
Utils { public static void print(String title, String message, int type) { switch (type) { case Log.DEBUG: Log.d("EntireNews (" + title + ")", message); break; case Log.ERROR: Log.e("EntireNews (" + title + ")", message); break; case Log.INFO: Log.i("EntireNews (" + title + ")", message); break; case Log.VERBOSE: Log.v("EntireNews (" + title + ")", message); break; case Log.WARN: Log.w("EntireNews (" + title + ")", message); break; default: Log.d("EntireNews (" + title + ")", message); } } }
Utils { public static void print(String title, String message, int type) { switch (type) { case Log.DEBUG: Log.d("EntireNews (" + title + ")", message); break; case Log.ERROR: Log.e("EntireNews (" + title + ")", message); break; case Log.INFO: Log.i("EntireNews (" + title + ")", message); break; case Log.VERBOSE: Log.v("EntireNews (" + title + ")", message); break; case Log.WARN: Log.w("EntireNews (" + title + ")", message); break; default: Log.d("EntireNews (" + title + ")", message); } } }
Utils { public static void print(String title, String message, int type) { switch (type) { case Log.DEBUG: Log.d("EntireNews (" + title + ")", message); break; case Log.ERROR: Log.e("EntireNews (" + title + ")", message); break; case Log.INFO: Log.i("EntireNews (" + title + ")", message); break; case Log.VERBOSE: Log.v("EntireNews (" + title + ")", message); break; case Log.WARN: Log.w("EntireNews (" + title + ")", message); break; default: Log.d("EntireNews (" + title + ")", message); } } static void print(String title, String message, int type); static void print(final String title, final int message); static void print(final String title, final String message); static void showSnackbar(final CoordinatorLayout layout, final Context context, final String message); static void showSnackbar(final CoordinatorLayout layout, final Context context, final String message, final boolean isError); static void showSnackbar(final CoordinatorLayout layout, final Context context, final int message); static void showSnackbar(final CoordinatorLayout layout, final Context context, final int message, final boolean isError); static void showSnackbar(final CoordinatorLayout layout, final Context context, final String message, final int action); static void showSnackbar(final CoordinatorLayout layout, final Context context, final int message, final int action); static String createSlug(final String slug); static boolean isNavBarOnBottom(@NonNull Context context); static @CheckResult @ColorInt int modifyAlpha(@ColorInt int color, @IntRange(from = 0, to = 255) int alpha); static @CheckResult @ColorInt int modifyAlpha(@ColorInt int color, @FloatRange(from = 0f, to = 1f) float alpha); static String getDateAgo(final Context context, final String isoDate); static boolean isInternetConnected(final Context context); @SuppressLint("PrivateApi") static Boolean hasNavigationBar(final String TAG, final Resources resources); static void share(final String TAG, final Context context, final String name, final String title, final String url); }
Utils { public static void print(String title, String message, int type) { switch (type) { case Log.DEBUG: Log.d("EntireNews (" + title + ")", message); break; case Log.ERROR: Log.e("EntireNews (" + title + ")", message); break; case Log.INFO: Log.i("EntireNews (" + title + ")", message); break; case Log.VERBOSE: Log.v("EntireNews (" + title + ")", message); break; case Log.WARN: Log.w("EntireNews (" + title + ")", message); break; default: Log.d("EntireNews (" + title + ")", message); } } static void print(String title, String message, int type); static void print(final String title, final int message); static void print(final String title, final String message); static void showSnackbar(final CoordinatorLayout layout, final Context context, final String message); static void showSnackbar(final CoordinatorLayout layout, final Context context, final String message, final boolean isError); static void showSnackbar(final CoordinatorLayout layout, final Context context, final int message); static void showSnackbar(final CoordinatorLayout layout, final Context context, final int message, final boolean isError); static void showSnackbar(final CoordinatorLayout layout, final Context context, final String message, final int action); static void showSnackbar(final CoordinatorLayout layout, final Context context, final int message, final int action); static String createSlug(final String slug); static boolean isNavBarOnBottom(@NonNull Context context); static @CheckResult @ColorInt int modifyAlpha(@ColorInt int color, @IntRange(from = 0, to = 255) int alpha); static @CheckResult @ColorInt int modifyAlpha(@ColorInt int color, @FloatRange(from = 0f, to = 1f) float alpha); static String getDateAgo(final Context context, final String isoDate); static boolean isInternetConnected(final Context context); @SuppressLint("PrivateApi") static Boolean hasNavigationBar(final String TAG, final Resources resources); static void share(final String TAG, final Context context, final String name, final String title, final String url); }
@Test public void createSlug() { String input = "This is a title"; String expected = "this-is-a-title"; String output = Utils.createSlug(input); assertEquals(expected,output); }
public static String createSlug(final String slug) { return slug.replaceAll("[^\\w\\s]", "").trim().toLowerCase().replaceAll("\\W+", "-"); }
Utils { public static String createSlug(final String slug) { return slug.replaceAll("[^\\w\\s]", "").trim().toLowerCase().replaceAll("\\W+", "-"); } }
Utils { public static String createSlug(final String slug) { return slug.replaceAll("[^\\w\\s]", "").trim().toLowerCase().replaceAll("\\W+", "-"); } }
Utils { public static String createSlug(final String slug) { return slug.replaceAll("[^\\w\\s]", "").trim().toLowerCase().replaceAll("\\W+", "-"); } static void print(String title, String message, int type); static void print(final String title, final int message); static void print(final String title, final String message); static void showSnackbar(final CoordinatorLayout layout, final Context context, final String message); static void showSnackbar(final CoordinatorLayout layout, final Context context, final String message, final boolean isError); static void showSnackbar(final CoordinatorLayout layout, final Context context, final int message); static void showSnackbar(final CoordinatorLayout layout, final Context context, final int message, final boolean isError); static void showSnackbar(final CoordinatorLayout layout, final Context context, final String message, final int action); static void showSnackbar(final CoordinatorLayout layout, final Context context, final int message, final int action); static String createSlug(final String slug); static boolean isNavBarOnBottom(@NonNull Context context); static @CheckResult @ColorInt int modifyAlpha(@ColorInt int color, @IntRange(from = 0, to = 255) int alpha); static @CheckResult @ColorInt int modifyAlpha(@ColorInt int color, @FloatRange(from = 0f, to = 1f) float alpha); static String getDateAgo(final Context context, final String isoDate); static boolean isInternetConnected(final Context context); @SuppressLint("PrivateApi") static Boolean hasNavigationBar(final String TAG, final Resources resources); static void share(final String TAG, final Context context, final String name, final String title, final String url); }
Utils { public static String createSlug(final String slug) { return slug.replaceAll("[^\\w\\s]", "").trim().toLowerCase().replaceAll("\\W+", "-"); } static void print(String title, String message, int type); static void print(final String title, final int message); static void print(final String title, final String message); static void showSnackbar(final CoordinatorLayout layout, final Context context, final String message); static void showSnackbar(final CoordinatorLayout layout, final Context context, final String message, final boolean isError); static void showSnackbar(final CoordinatorLayout layout, final Context context, final int message); static void showSnackbar(final CoordinatorLayout layout, final Context context, final int message, final boolean isError); static void showSnackbar(final CoordinatorLayout layout, final Context context, final String message, final int action); static void showSnackbar(final CoordinatorLayout layout, final Context context, final int message, final int action); static String createSlug(final String slug); static boolean isNavBarOnBottom(@NonNull Context context); static @CheckResult @ColorInt int modifyAlpha(@ColorInt int color, @IntRange(from = 0, to = 255) int alpha); static @CheckResult @ColorInt int modifyAlpha(@ColorInt int color, @FloatRange(from = 0f, to = 1f) float alpha); static String getDateAgo(final Context context, final String isoDate); static boolean isInternetConnected(final Context context); @SuppressLint("PrivateApi") static Boolean hasNavigationBar(final String TAG, final Resources resources); static void share(final String TAG, final Context context, final String name, final String title, final String url); }
@Test public void main() throws Exception { PlaygroundApplication playgroundApplication = new PlaygroundApplication(); playgroundApplication.main(new String[]{}); }
public static void main(String[] args) { SpringApplication.run(PlaygroundApplication.class, args); }
PlaygroundApplication { public static void main(String[] args) { SpringApplication.run(PlaygroundApplication.class, args); } }
PlaygroundApplication { public static void main(String[] args) { SpringApplication.run(PlaygroundApplication.class, args); } }
PlaygroundApplication { public static void main(String[] args) { SpringApplication.run(PlaygroundApplication.class, args); } static void main(String[] args); }
PlaygroundApplication { public static void main(String[] args) { SpringApplication.run(PlaygroundApplication.class, args); } static void main(String[] args); }
@Test public void getProductInfo() throws Exception { Long productId = 99999830L; given(tdBProductRepository.findOne(productId)).willReturn(mockDiscnt(productId)); TdBProduct productInfo = productService.getProductInfo(99999830L); assertThat(productInfo.getProductId()).isEqualTo(productId); }
public TdBProduct getProductInfo(Long productId) { TdBProduct tdBProduct = tdBProductRepository.findOne(productId); if (tdBProduct == null) { throw new ResourceNotFoundException(String.format("不存在 productId=%s", productId)); } return tdBProduct; }
ProductService { public TdBProduct getProductInfo(Long productId) { TdBProduct tdBProduct = tdBProductRepository.findOne(productId); if (tdBProduct == null) { throw new ResourceNotFoundException(String.format("不存在 productId=%s", productId)); } return tdBProduct; } }
ProductService { public TdBProduct getProductInfo(Long productId) { TdBProduct tdBProduct = tdBProductRepository.findOne(productId); if (tdBProduct == null) { throw new ResourceNotFoundException(String.format("不存在 productId=%s", productId)); } return tdBProduct; } }
ProductService { public TdBProduct getProductInfo(Long productId) { TdBProduct tdBProduct = tdBProductRepository.findOne(productId); if (tdBProduct == null) { throw new ResourceNotFoundException(String.format("不存在 productId=%s", productId)); } return tdBProduct; } TdBProduct getProductInfo(Long productId); }
ProductService { public TdBProduct getProductInfo(Long productId) { TdBProduct tdBProduct = tdBProductRepository.findOne(productId); if (tdBProduct == null) { throw new ResourceNotFoundException(String.format("不存在 productId=%s", productId)); } return tdBProduct; } TdBProduct getProductInfo(Long productId); }
@Test(expected = ResourceNotFoundException.class) public void getProductInfoResourceNotFoundException() throws Exception { Long productId = 1L; productService.getProductInfo(99999830L); }
public TdBProduct getProductInfo(Long productId) { TdBProduct tdBProduct = tdBProductRepository.findOne(productId); if (tdBProduct == null) { throw new ResourceNotFoundException(String.format("不存在 productId=%s", productId)); } return tdBProduct; }
ProductService { public TdBProduct getProductInfo(Long productId) { TdBProduct tdBProduct = tdBProductRepository.findOne(productId); if (tdBProduct == null) { throw new ResourceNotFoundException(String.format("不存在 productId=%s", productId)); } return tdBProduct; } }
ProductService { public TdBProduct getProductInfo(Long productId) { TdBProduct tdBProduct = tdBProductRepository.findOne(productId); if (tdBProduct == null) { throw new ResourceNotFoundException(String.format("不存在 productId=%s", productId)); } return tdBProduct; } }
ProductService { public TdBProduct getProductInfo(Long productId) { TdBProduct tdBProduct = tdBProductRepository.findOne(productId); if (tdBProduct == null) { throw new ResourceNotFoundException(String.format("不存在 productId=%s", productId)); } return tdBProduct; } TdBProduct getProductInfo(Long productId); }
ProductService { public TdBProduct getProductInfo(Long productId) { TdBProduct tdBProduct = tdBProductRepository.findOne(productId); if (tdBProduct == null) { throw new ResourceNotFoundException(String.format("不存在 productId=%s", productId)); } return tdBProduct; } TdBProduct getProductInfo(Long productId); }
@Test public void rootRedirect() throws Exception { ResponseEntity<String> result = restTemplate.exchange("/", HttpMethod.GET, new HttpEntity(null), String.class); logger.info(result.toString()); assertThat(result.getStatusCode()).isEqualTo(HttpStatus.OK); }
@RequestMapping(value = {"/"}, method = RequestMethod.GET) public String rootRedirect() { return "index"; }
RootController { @RequestMapping(value = {"/"}, method = RequestMethod.GET) public String rootRedirect() { return "index"; } }
RootController { @RequestMapping(value = {"/"}, method = RequestMethod.GET) public String rootRedirect() { return "index"; } }
RootController { @RequestMapping(value = {"/"}, method = RequestMethod.GET) public String rootRedirect() { return "index"; } @RequestMapping(value = {"/"}, method = RequestMethod.GET) String rootRedirect(); }
RootController { @RequestMapping(value = {"/"}, method = RequestMethod.GET) public String rootRedirect() { return "index"; } @RequestMapping(value = {"/"}, method = RequestMethod.GET) String rootRedirect(); }
@Test public void getProductInfo() throws Exception { ResponseEntity<ProductDTO> result = restTemplate.getForEntity(baseurl + "/products/99999830", ProductDTO.class); logger.info(result.toString()); assertThat(result.getStatusCode()).isEqualTo(HttpStatus.OK); assertThat(result.getBody().getProductId()).isEqualTo(99999830L); }
@Cacheable("getProductInfo") @HystrixCommand( fallbackMethod = "", ignoreExceptions = {Exception.class} ) @ApiOperation(value = "查询产品配置") @RequestMapping(value = "/{productId}", method = RequestMethod.GET, produces = MediaType.APPLICATION_JSON_UTF8_VALUE) public ProductDTO getProductInfo(@ApiParam(value = "产品编码", defaultValue = "99999830", required = true) @PathVariable Long productId) { TdBProduct productInfo = productService.getProductInfo(productId); return staticModelMapperComponent.productEntityToDTO(productInfo); }
ProductController { @Cacheable("getProductInfo") @HystrixCommand( fallbackMethod = "", ignoreExceptions = {Exception.class} ) @ApiOperation(value = "查询产品配置") @RequestMapping(value = "/{productId}", method = RequestMethod.GET, produces = MediaType.APPLICATION_JSON_UTF8_VALUE) public ProductDTO getProductInfo(@ApiParam(value = "产品编码", defaultValue = "99999830", required = true) @PathVariable Long productId) { TdBProduct productInfo = productService.getProductInfo(productId); return staticModelMapperComponent.productEntityToDTO(productInfo); } }
ProductController { @Cacheable("getProductInfo") @HystrixCommand( fallbackMethod = "", ignoreExceptions = {Exception.class} ) @ApiOperation(value = "查询产品配置") @RequestMapping(value = "/{productId}", method = RequestMethod.GET, produces = MediaType.APPLICATION_JSON_UTF8_VALUE) public ProductDTO getProductInfo(@ApiParam(value = "产品编码", defaultValue = "99999830", required = true) @PathVariable Long productId) { TdBProduct productInfo = productService.getProductInfo(productId); return staticModelMapperComponent.productEntityToDTO(productInfo); } }
ProductController { @Cacheable("getProductInfo") @HystrixCommand( fallbackMethod = "", ignoreExceptions = {Exception.class} ) @ApiOperation(value = "查询产品配置") @RequestMapping(value = "/{productId}", method = RequestMethod.GET, produces = MediaType.APPLICATION_JSON_UTF8_VALUE) public ProductDTO getProductInfo(@ApiParam(value = "产品编码", defaultValue = "99999830", required = true) @PathVariable Long productId) { TdBProduct productInfo = productService.getProductInfo(productId); return staticModelMapperComponent.productEntityToDTO(productInfo); } @Cacheable("getProductInfo") @HystrixCommand( fallbackMethod = "", // Use Exception Handler ignoreExceptions = {Exception.class} ) @ApiOperation(value = "查询产品配置") @RequestMapping(value = "/{productId}", method = RequestMethod.GET, produces = MediaType.APPLICATION_JSON_UTF8_VALUE) ProductDTO getProductInfo(@ApiParam(value = "产品编码", defaultValue = "99999830", required = true) @PathVariable Long productId); }
ProductController { @Cacheable("getProductInfo") @HystrixCommand( fallbackMethod = "", ignoreExceptions = {Exception.class} ) @ApiOperation(value = "查询产品配置") @RequestMapping(value = "/{productId}", method = RequestMethod.GET, produces = MediaType.APPLICATION_JSON_UTF8_VALUE) public ProductDTO getProductInfo(@ApiParam(value = "产品编码", defaultValue = "99999830", required = true) @PathVariable Long productId) { TdBProduct productInfo = productService.getProductInfo(productId); return staticModelMapperComponent.productEntityToDTO(productInfo); } @Cacheable("getProductInfo") @HystrixCommand( fallbackMethod = "", // Use Exception Handler ignoreExceptions = {Exception.class} ) @ApiOperation(value = "查询产品配置") @RequestMapping(value = "/{productId}", method = RequestMethod.GET, produces = MediaType.APPLICATION_JSON_UTF8_VALUE) ProductDTO getProductInfo(@ApiParam(value = "产品编码", defaultValue = "99999830", required = true) @PathVariable Long productId); }
@Test public void testParsePlain() throws ParseException { SemanticVersion v = new SemanticVersion("1.2.3"); assertEquals(1, v.major); assertEquals(2, v.minor); assertEquals(3, v.patch); assertEquals("1.2.3", v.toString()); v = new SemanticVersion("11.22.33"); assertEquals(11, v.major); assertEquals(22, v.minor); assertEquals(33, v.patch); assertEquals("11.22.33", v.toString()); v = new SemanticVersion("11.22.33-SNAPSHOT"); assertEquals(11, v.major); assertEquals(22, v.minor); assertEquals(33, v.patch); assertEquals("SNAPSHOT", v.qualifier); assertEquals("11.22.33-SNAPSHOT", v.toString()); }
@Override public String toString() { StringBuilder ret = new StringBuilder(); ret.append(major); ret.append('.'); ret.append(minor); ret.append('.'); ret.append(patch); if (qualifier != null) { ret.append('-'); ret.append(qualifier); } return ret.toString(); }
SemanticVersion implements Comparable<SemanticVersion>, Serializable { @Override public String toString() { StringBuilder ret = new StringBuilder(); ret.append(major); ret.append('.'); ret.append(minor); ret.append('.'); ret.append(patch); if (qualifier != null) { ret.append('-'); ret.append(qualifier); } return ret.toString(); } }
SemanticVersion implements Comparable<SemanticVersion>, Serializable { @Override public String toString() { StringBuilder ret = new StringBuilder(); ret.append(major); ret.append('.'); ret.append(minor); ret.append('.'); ret.append(patch); if (qualifier != null) { ret.append('-'); ret.append(qualifier); } return ret.toString(); } SemanticVersion(); SemanticVersion(int major, int minor, int patch); SemanticVersion(int major, int minor, int patch, String qualifier); SemanticVersion(String version); }
SemanticVersion implements Comparable<SemanticVersion>, Serializable { @Override public String toString() { StringBuilder ret = new StringBuilder(); ret.append(major); ret.append('.'); ret.append(minor); ret.append('.'); ret.append(patch); if (qualifier != null) { ret.append('-'); ret.append(qualifier); } return ret.toString(); } SemanticVersion(); SemanticVersion(int major, int minor, int patch); SemanticVersion(int major, int minor, int patch, String qualifier); SemanticVersion(String version); boolean isUpdateFor(SemanticVersion v); boolean isSameOrNewer(SemanticVersion v); boolean isSame(SemanticVersion v); boolean isCompatibleUpdateFor(SemanticVersion v); @Override String toString(); @Override int hashCode(); @Override boolean equals(Object other); @Override int compareTo(SemanticVersion v); String getAsString(); void setAsString(String version); }
SemanticVersion implements Comparable<SemanticVersion>, Serializable { @Override public String toString() { StringBuilder ret = new StringBuilder(); ret.append(major); ret.append('.'); ret.append(minor); ret.append('.'); ret.append(patch); if (qualifier != null) { ret.append('-'); ret.append(qualifier); } return ret.toString(); } SemanticVersion(); SemanticVersion(int major, int minor, int patch); SemanticVersion(int major, int minor, int patch, String qualifier); SemanticVersion(String version); boolean isUpdateFor(SemanticVersion v); boolean isSameOrNewer(SemanticVersion v); boolean isSame(SemanticVersion v); boolean isCompatibleUpdateFor(SemanticVersion v); @Override String toString(); @Override int hashCode(); @Override boolean equals(Object other); @Override int compareTo(SemanticVersion v); String getAsString(); void setAsString(String version); public int major; public int minor; public int patch; public String qualifier; }
@Test public void shouldGetDetailsLinkFromCommentsIfNotSetFromRssGuid() throws Exception { NewznabXmlItem rssItem = buildBasicRssItem(); rssItem.setRssGuid(new NewznabXmlGuid("someguid", false)); rssItem.setComments("http: SearchResultItem item = testee.createSearchResultItem(rssItem); assertThat(item.getDetails(), is("http: }
protected SearchResultItem createSearchResultItem(NewznabXmlItem item) throws NzbHydraException { SearchResultItem searchResultItem = new SearchResultItem(); String link = getEnclosureUrl(item); searchResultItem.setLink(link); if (item.getRssGuid().isPermaLink()) { searchResultItem.setDetails(item.getRssGuid().getGuid()); Matcher matcher = GUID_PATTERN.matcher(item.getRssGuid().getGuid()); if (matcher.matches()) { searchResultItem.setIndexerGuid(matcher.group(2)); } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } if (!Strings.isNullOrEmpty(item.getComments()) && Strings.isNullOrEmpty(searchResultItem.getDetails())) { searchResultItem.setDetails(item.getComments().replace("#comments", "")); } searchResultItem.setFirstFound(Instant.now()); searchResultItem.setIndexer(this); searchResultItem.setTitle(cleanUpTitle(item.getTitle())); searchResultItem.setSize(item.getEnclosure().getLength()); searchResultItem.setPubDate(item.getPubDate()); searchResultItem.setIndexerScore(config.getScore()); searchResultItem.setGuid(SearchResultIdCalculator.calculateSearchResultId(searchResultItem)); searchResultItem.setAgePrecise(true); searchResultItem.setDescription(item.getDescription()); searchResultItem.setDownloadType(DownloadType.NZB); searchResultItem.setCommentsLink(item.getComments()); searchResultItem.setOriginalCategory(item.getCategory()); parseAttributes(item, searchResultItem); return searchResultItem; }
Newznab extends Indexer<Xml> { protected SearchResultItem createSearchResultItem(NewznabXmlItem item) throws NzbHydraException { SearchResultItem searchResultItem = new SearchResultItem(); String link = getEnclosureUrl(item); searchResultItem.setLink(link); if (item.getRssGuid().isPermaLink()) { searchResultItem.setDetails(item.getRssGuid().getGuid()); Matcher matcher = GUID_PATTERN.matcher(item.getRssGuid().getGuid()); if (matcher.matches()) { searchResultItem.setIndexerGuid(matcher.group(2)); } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } if (!Strings.isNullOrEmpty(item.getComments()) && Strings.isNullOrEmpty(searchResultItem.getDetails())) { searchResultItem.setDetails(item.getComments().replace("#comments", "")); } searchResultItem.setFirstFound(Instant.now()); searchResultItem.setIndexer(this); searchResultItem.setTitle(cleanUpTitle(item.getTitle())); searchResultItem.setSize(item.getEnclosure().getLength()); searchResultItem.setPubDate(item.getPubDate()); searchResultItem.setIndexerScore(config.getScore()); searchResultItem.setGuid(SearchResultIdCalculator.calculateSearchResultId(searchResultItem)); searchResultItem.setAgePrecise(true); searchResultItem.setDescription(item.getDescription()); searchResultItem.setDownloadType(DownloadType.NZB); searchResultItem.setCommentsLink(item.getComments()); searchResultItem.setOriginalCategory(item.getCategory()); parseAttributes(item, searchResultItem); return searchResultItem; } }
Newznab extends Indexer<Xml> { protected SearchResultItem createSearchResultItem(NewznabXmlItem item) throws NzbHydraException { SearchResultItem searchResultItem = new SearchResultItem(); String link = getEnclosureUrl(item); searchResultItem.setLink(link); if (item.getRssGuid().isPermaLink()) { searchResultItem.setDetails(item.getRssGuid().getGuid()); Matcher matcher = GUID_PATTERN.matcher(item.getRssGuid().getGuid()); if (matcher.matches()) { searchResultItem.setIndexerGuid(matcher.group(2)); } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } if (!Strings.isNullOrEmpty(item.getComments()) && Strings.isNullOrEmpty(searchResultItem.getDetails())) { searchResultItem.setDetails(item.getComments().replace("#comments", "")); } searchResultItem.setFirstFound(Instant.now()); searchResultItem.setIndexer(this); searchResultItem.setTitle(cleanUpTitle(item.getTitle())); searchResultItem.setSize(item.getEnclosure().getLength()); searchResultItem.setPubDate(item.getPubDate()); searchResultItem.setIndexerScore(config.getScore()); searchResultItem.setGuid(SearchResultIdCalculator.calculateSearchResultId(searchResultItem)); searchResultItem.setAgePrecise(true); searchResultItem.setDescription(item.getDescription()); searchResultItem.setDownloadType(DownloadType.NZB); searchResultItem.setCommentsLink(item.getComments()); searchResultItem.setOriginalCategory(item.getCategory()); parseAttributes(item, searchResultItem); return searchResultItem; } }
Newznab extends Indexer<Xml> { protected SearchResultItem createSearchResultItem(NewznabXmlItem item) throws NzbHydraException { SearchResultItem searchResultItem = new SearchResultItem(); String link = getEnclosureUrl(item); searchResultItem.setLink(link); if (item.getRssGuid().isPermaLink()) { searchResultItem.setDetails(item.getRssGuid().getGuid()); Matcher matcher = GUID_PATTERN.matcher(item.getRssGuid().getGuid()); if (matcher.matches()) { searchResultItem.setIndexerGuid(matcher.group(2)); } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } if (!Strings.isNullOrEmpty(item.getComments()) && Strings.isNullOrEmpty(searchResultItem.getDetails())) { searchResultItem.setDetails(item.getComments().replace("#comments", "")); } searchResultItem.setFirstFound(Instant.now()); searchResultItem.setIndexer(this); searchResultItem.setTitle(cleanUpTitle(item.getTitle())); searchResultItem.setSize(item.getEnclosure().getLength()); searchResultItem.setPubDate(item.getPubDate()); searchResultItem.setIndexerScore(config.getScore()); searchResultItem.setGuid(SearchResultIdCalculator.calculateSearchResultId(searchResultItem)); searchResultItem.setAgePrecise(true); searchResultItem.setDescription(item.getDescription()); searchResultItem.setDownloadType(DownloadType.NZB); searchResultItem.setCommentsLink(item.getComments()); searchResultItem.setOriginalCategory(item.getCategory()); parseAttributes(item, searchResultItem); return searchResultItem; } @Override NfoResult getNfo(String guid); }
Newznab extends Indexer<Xml> { protected SearchResultItem createSearchResultItem(NewznabXmlItem item) throws NzbHydraException { SearchResultItem searchResultItem = new SearchResultItem(); String link = getEnclosureUrl(item); searchResultItem.setLink(link); if (item.getRssGuid().isPermaLink()) { searchResultItem.setDetails(item.getRssGuid().getGuid()); Matcher matcher = GUID_PATTERN.matcher(item.getRssGuid().getGuid()); if (matcher.matches()) { searchResultItem.setIndexerGuid(matcher.group(2)); } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } if (!Strings.isNullOrEmpty(item.getComments()) && Strings.isNullOrEmpty(searchResultItem.getDetails())) { searchResultItem.setDetails(item.getComments().replace("#comments", "")); } searchResultItem.setFirstFound(Instant.now()); searchResultItem.setIndexer(this); searchResultItem.setTitle(cleanUpTitle(item.getTitle())); searchResultItem.setSize(item.getEnclosure().getLength()); searchResultItem.setPubDate(item.getPubDate()); searchResultItem.setIndexerScore(config.getScore()); searchResultItem.setGuid(SearchResultIdCalculator.calculateSearchResultId(searchResultItem)); searchResultItem.setAgePrecise(true); searchResultItem.setDescription(item.getDescription()); searchResultItem.setDownloadType(DownloadType.NZB); searchResultItem.setCommentsLink(item.getComments()); searchResultItem.setOriginalCategory(item.getCategory()); parseAttributes(item, searchResultItem); return searchResultItem; } @Override NfoResult getNfo(String guid); }
@Test public void shouldNotSetGroupOrPosterIfNotAvailable() throws Exception { NewznabXmlItem rssItem = buildBasicRssItem(); rssItem.getNewznabAttributes().clear(); rssItem.getNewznabAttributes().add(new NewznabAttribute("group", "not available")); rssItem.getNewznabAttributes().add(new NewznabAttribute("poster", "not available")); SearchResultItem item = testee.createSearchResultItem(rssItem); assertThat(item.getGroup().isPresent(), is(false)); assertThat(item.getPoster().isPresent(), is(false)); }
protected SearchResultItem createSearchResultItem(NewznabXmlItem item) throws NzbHydraException { SearchResultItem searchResultItem = new SearchResultItem(); String link = getEnclosureUrl(item); searchResultItem.setLink(link); if (item.getRssGuid().isPermaLink()) { searchResultItem.setDetails(item.getRssGuid().getGuid()); Matcher matcher = GUID_PATTERN.matcher(item.getRssGuid().getGuid()); if (matcher.matches()) { searchResultItem.setIndexerGuid(matcher.group(2)); } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } if (!Strings.isNullOrEmpty(item.getComments()) && Strings.isNullOrEmpty(searchResultItem.getDetails())) { searchResultItem.setDetails(item.getComments().replace("#comments", "")); } searchResultItem.setFirstFound(Instant.now()); searchResultItem.setIndexer(this); searchResultItem.setTitle(cleanUpTitle(item.getTitle())); searchResultItem.setSize(item.getEnclosure().getLength()); searchResultItem.setPubDate(item.getPubDate()); searchResultItem.setIndexerScore(config.getScore()); searchResultItem.setGuid(SearchResultIdCalculator.calculateSearchResultId(searchResultItem)); searchResultItem.setAgePrecise(true); searchResultItem.setDescription(item.getDescription()); searchResultItem.setDownloadType(DownloadType.NZB); searchResultItem.setCommentsLink(item.getComments()); searchResultItem.setOriginalCategory(item.getCategory()); parseAttributes(item, searchResultItem); return searchResultItem; }
Newznab extends Indexer<Xml> { protected SearchResultItem createSearchResultItem(NewznabXmlItem item) throws NzbHydraException { SearchResultItem searchResultItem = new SearchResultItem(); String link = getEnclosureUrl(item); searchResultItem.setLink(link); if (item.getRssGuid().isPermaLink()) { searchResultItem.setDetails(item.getRssGuid().getGuid()); Matcher matcher = GUID_PATTERN.matcher(item.getRssGuid().getGuid()); if (matcher.matches()) { searchResultItem.setIndexerGuid(matcher.group(2)); } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } if (!Strings.isNullOrEmpty(item.getComments()) && Strings.isNullOrEmpty(searchResultItem.getDetails())) { searchResultItem.setDetails(item.getComments().replace("#comments", "")); } searchResultItem.setFirstFound(Instant.now()); searchResultItem.setIndexer(this); searchResultItem.setTitle(cleanUpTitle(item.getTitle())); searchResultItem.setSize(item.getEnclosure().getLength()); searchResultItem.setPubDate(item.getPubDate()); searchResultItem.setIndexerScore(config.getScore()); searchResultItem.setGuid(SearchResultIdCalculator.calculateSearchResultId(searchResultItem)); searchResultItem.setAgePrecise(true); searchResultItem.setDescription(item.getDescription()); searchResultItem.setDownloadType(DownloadType.NZB); searchResultItem.setCommentsLink(item.getComments()); searchResultItem.setOriginalCategory(item.getCategory()); parseAttributes(item, searchResultItem); return searchResultItem; } }
Newznab extends Indexer<Xml> { protected SearchResultItem createSearchResultItem(NewznabXmlItem item) throws NzbHydraException { SearchResultItem searchResultItem = new SearchResultItem(); String link = getEnclosureUrl(item); searchResultItem.setLink(link); if (item.getRssGuid().isPermaLink()) { searchResultItem.setDetails(item.getRssGuid().getGuid()); Matcher matcher = GUID_PATTERN.matcher(item.getRssGuid().getGuid()); if (matcher.matches()) { searchResultItem.setIndexerGuid(matcher.group(2)); } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } if (!Strings.isNullOrEmpty(item.getComments()) && Strings.isNullOrEmpty(searchResultItem.getDetails())) { searchResultItem.setDetails(item.getComments().replace("#comments", "")); } searchResultItem.setFirstFound(Instant.now()); searchResultItem.setIndexer(this); searchResultItem.setTitle(cleanUpTitle(item.getTitle())); searchResultItem.setSize(item.getEnclosure().getLength()); searchResultItem.setPubDate(item.getPubDate()); searchResultItem.setIndexerScore(config.getScore()); searchResultItem.setGuid(SearchResultIdCalculator.calculateSearchResultId(searchResultItem)); searchResultItem.setAgePrecise(true); searchResultItem.setDescription(item.getDescription()); searchResultItem.setDownloadType(DownloadType.NZB); searchResultItem.setCommentsLink(item.getComments()); searchResultItem.setOriginalCategory(item.getCategory()); parseAttributes(item, searchResultItem); return searchResultItem; } }
Newznab extends Indexer<Xml> { protected SearchResultItem createSearchResultItem(NewznabXmlItem item) throws NzbHydraException { SearchResultItem searchResultItem = new SearchResultItem(); String link = getEnclosureUrl(item); searchResultItem.setLink(link); if (item.getRssGuid().isPermaLink()) { searchResultItem.setDetails(item.getRssGuid().getGuid()); Matcher matcher = GUID_PATTERN.matcher(item.getRssGuid().getGuid()); if (matcher.matches()) { searchResultItem.setIndexerGuid(matcher.group(2)); } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } if (!Strings.isNullOrEmpty(item.getComments()) && Strings.isNullOrEmpty(searchResultItem.getDetails())) { searchResultItem.setDetails(item.getComments().replace("#comments", "")); } searchResultItem.setFirstFound(Instant.now()); searchResultItem.setIndexer(this); searchResultItem.setTitle(cleanUpTitle(item.getTitle())); searchResultItem.setSize(item.getEnclosure().getLength()); searchResultItem.setPubDate(item.getPubDate()); searchResultItem.setIndexerScore(config.getScore()); searchResultItem.setGuid(SearchResultIdCalculator.calculateSearchResultId(searchResultItem)); searchResultItem.setAgePrecise(true); searchResultItem.setDescription(item.getDescription()); searchResultItem.setDownloadType(DownloadType.NZB); searchResultItem.setCommentsLink(item.getComments()); searchResultItem.setOriginalCategory(item.getCategory()); parseAttributes(item, searchResultItem); return searchResultItem; } @Override NfoResult getNfo(String guid); }
Newznab extends Indexer<Xml> { protected SearchResultItem createSearchResultItem(NewznabXmlItem item) throws NzbHydraException { SearchResultItem searchResultItem = new SearchResultItem(); String link = getEnclosureUrl(item); searchResultItem.setLink(link); if (item.getRssGuid().isPermaLink()) { searchResultItem.setDetails(item.getRssGuid().getGuid()); Matcher matcher = GUID_PATTERN.matcher(item.getRssGuid().getGuid()); if (matcher.matches()) { searchResultItem.setIndexerGuid(matcher.group(2)); } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } if (!Strings.isNullOrEmpty(item.getComments()) && Strings.isNullOrEmpty(searchResultItem.getDetails())) { searchResultItem.setDetails(item.getComments().replace("#comments", "")); } searchResultItem.setFirstFound(Instant.now()); searchResultItem.setIndexer(this); searchResultItem.setTitle(cleanUpTitle(item.getTitle())); searchResultItem.setSize(item.getEnclosure().getLength()); searchResultItem.setPubDate(item.getPubDate()); searchResultItem.setIndexerScore(config.getScore()); searchResultItem.setGuid(SearchResultIdCalculator.calculateSearchResultId(searchResultItem)); searchResultItem.setAgePrecise(true); searchResultItem.setDescription(item.getDescription()); searchResultItem.setDownloadType(DownloadType.NZB); searchResultItem.setCommentsLink(item.getComments()); searchResultItem.setOriginalCategory(item.getCategory()); parseAttributes(item, searchResultItem); return searchResultItem; } @Override NfoResult getNfo(String guid); }
@Test public void shouldReadGroupFromDescription() throws Exception { NewznabXmlItem rssItem = buildBasicRssItem(); rssItem.setDescription("<b>Group:</b> alt.binaries.tun<br />"); assertThat(testee.createSearchResultItem(rssItem).getGroup().get(), is("alt.binaries.tun")); }
protected SearchResultItem createSearchResultItem(NewznabXmlItem item) throws NzbHydraException { SearchResultItem searchResultItem = new SearchResultItem(); String link = getEnclosureUrl(item); searchResultItem.setLink(link); if (item.getRssGuid().isPermaLink()) { searchResultItem.setDetails(item.getRssGuid().getGuid()); Matcher matcher = GUID_PATTERN.matcher(item.getRssGuid().getGuid()); if (matcher.matches()) { searchResultItem.setIndexerGuid(matcher.group(2)); } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } if (!Strings.isNullOrEmpty(item.getComments()) && Strings.isNullOrEmpty(searchResultItem.getDetails())) { searchResultItem.setDetails(item.getComments().replace("#comments", "")); } searchResultItem.setFirstFound(Instant.now()); searchResultItem.setIndexer(this); searchResultItem.setTitle(cleanUpTitle(item.getTitle())); searchResultItem.setSize(item.getEnclosure().getLength()); searchResultItem.setPubDate(item.getPubDate()); searchResultItem.setIndexerScore(config.getScore()); searchResultItem.setGuid(SearchResultIdCalculator.calculateSearchResultId(searchResultItem)); searchResultItem.setAgePrecise(true); searchResultItem.setDescription(item.getDescription()); searchResultItem.setDownloadType(DownloadType.NZB); searchResultItem.setCommentsLink(item.getComments()); searchResultItem.setOriginalCategory(item.getCategory()); parseAttributes(item, searchResultItem); return searchResultItem; }
Newznab extends Indexer<Xml> { protected SearchResultItem createSearchResultItem(NewznabXmlItem item) throws NzbHydraException { SearchResultItem searchResultItem = new SearchResultItem(); String link = getEnclosureUrl(item); searchResultItem.setLink(link); if (item.getRssGuid().isPermaLink()) { searchResultItem.setDetails(item.getRssGuid().getGuid()); Matcher matcher = GUID_PATTERN.matcher(item.getRssGuid().getGuid()); if (matcher.matches()) { searchResultItem.setIndexerGuid(matcher.group(2)); } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } if (!Strings.isNullOrEmpty(item.getComments()) && Strings.isNullOrEmpty(searchResultItem.getDetails())) { searchResultItem.setDetails(item.getComments().replace("#comments", "")); } searchResultItem.setFirstFound(Instant.now()); searchResultItem.setIndexer(this); searchResultItem.setTitle(cleanUpTitle(item.getTitle())); searchResultItem.setSize(item.getEnclosure().getLength()); searchResultItem.setPubDate(item.getPubDate()); searchResultItem.setIndexerScore(config.getScore()); searchResultItem.setGuid(SearchResultIdCalculator.calculateSearchResultId(searchResultItem)); searchResultItem.setAgePrecise(true); searchResultItem.setDescription(item.getDescription()); searchResultItem.setDownloadType(DownloadType.NZB); searchResultItem.setCommentsLink(item.getComments()); searchResultItem.setOriginalCategory(item.getCategory()); parseAttributes(item, searchResultItem); return searchResultItem; } }
Newznab extends Indexer<Xml> { protected SearchResultItem createSearchResultItem(NewznabXmlItem item) throws NzbHydraException { SearchResultItem searchResultItem = new SearchResultItem(); String link = getEnclosureUrl(item); searchResultItem.setLink(link); if (item.getRssGuid().isPermaLink()) { searchResultItem.setDetails(item.getRssGuid().getGuid()); Matcher matcher = GUID_PATTERN.matcher(item.getRssGuid().getGuid()); if (matcher.matches()) { searchResultItem.setIndexerGuid(matcher.group(2)); } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } if (!Strings.isNullOrEmpty(item.getComments()) && Strings.isNullOrEmpty(searchResultItem.getDetails())) { searchResultItem.setDetails(item.getComments().replace("#comments", "")); } searchResultItem.setFirstFound(Instant.now()); searchResultItem.setIndexer(this); searchResultItem.setTitle(cleanUpTitle(item.getTitle())); searchResultItem.setSize(item.getEnclosure().getLength()); searchResultItem.setPubDate(item.getPubDate()); searchResultItem.setIndexerScore(config.getScore()); searchResultItem.setGuid(SearchResultIdCalculator.calculateSearchResultId(searchResultItem)); searchResultItem.setAgePrecise(true); searchResultItem.setDescription(item.getDescription()); searchResultItem.setDownloadType(DownloadType.NZB); searchResultItem.setCommentsLink(item.getComments()); searchResultItem.setOriginalCategory(item.getCategory()); parseAttributes(item, searchResultItem); return searchResultItem; } }
Newznab extends Indexer<Xml> { protected SearchResultItem createSearchResultItem(NewznabXmlItem item) throws NzbHydraException { SearchResultItem searchResultItem = new SearchResultItem(); String link = getEnclosureUrl(item); searchResultItem.setLink(link); if (item.getRssGuid().isPermaLink()) { searchResultItem.setDetails(item.getRssGuid().getGuid()); Matcher matcher = GUID_PATTERN.matcher(item.getRssGuid().getGuid()); if (matcher.matches()) { searchResultItem.setIndexerGuid(matcher.group(2)); } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } if (!Strings.isNullOrEmpty(item.getComments()) && Strings.isNullOrEmpty(searchResultItem.getDetails())) { searchResultItem.setDetails(item.getComments().replace("#comments", "")); } searchResultItem.setFirstFound(Instant.now()); searchResultItem.setIndexer(this); searchResultItem.setTitle(cleanUpTitle(item.getTitle())); searchResultItem.setSize(item.getEnclosure().getLength()); searchResultItem.setPubDate(item.getPubDate()); searchResultItem.setIndexerScore(config.getScore()); searchResultItem.setGuid(SearchResultIdCalculator.calculateSearchResultId(searchResultItem)); searchResultItem.setAgePrecise(true); searchResultItem.setDescription(item.getDescription()); searchResultItem.setDownloadType(DownloadType.NZB); searchResultItem.setCommentsLink(item.getComments()); searchResultItem.setOriginalCategory(item.getCategory()); parseAttributes(item, searchResultItem); return searchResultItem; } @Override NfoResult getNfo(String guid); }
Newznab extends Indexer<Xml> { protected SearchResultItem createSearchResultItem(NewznabXmlItem item) throws NzbHydraException { SearchResultItem searchResultItem = new SearchResultItem(); String link = getEnclosureUrl(item); searchResultItem.setLink(link); if (item.getRssGuid().isPermaLink()) { searchResultItem.setDetails(item.getRssGuid().getGuid()); Matcher matcher = GUID_PATTERN.matcher(item.getRssGuid().getGuid()); if (matcher.matches()) { searchResultItem.setIndexerGuid(matcher.group(2)); } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } if (!Strings.isNullOrEmpty(item.getComments()) && Strings.isNullOrEmpty(searchResultItem.getDetails())) { searchResultItem.setDetails(item.getComments().replace("#comments", "")); } searchResultItem.setFirstFound(Instant.now()); searchResultItem.setIndexer(this); searchResultItem.setTitle(cleanUpTitle(item.getTitle())); searchResultItem.setSize(item.getEnclosure().getLength()); searchResultItem.setPubDate(item.getPubDate()); searchResultItem.setIndexerScore(config.getScore()); searchResultItem.setGuid(SearchResultIdCalculator.calculateSearchResultId(searchResultItem)); searchResultItem.setAgePrecise(true); searchResultItem.setDescription(item.getDescription()); searchResultItem.setDownloadType(DownloadType.NZB); searchResultItem.setCommentsLink(item.getComments()); searchResultItem.setOriginalCategory(item.getCategory()); parseAttributes(item, searchResultItem); return searchResultItem; } @Override NfoResult getNfo(String guid); }
@Test public void shouldRemoveTrailingWords() throws Exception { baseConfig.getSearching().setRemoveTrailing(Arrays.asList("English", "-Obfuscated", " spanish")); NewznabXmlItem rssItem = buildBasicRssItem(); rssItem.setTitle("Some title English"); assertThat(testee.createSearchResultItem(rssItem).getTitle(), is("Some title")); rssItem.setTitle("Some title-Obfuscated"); assertThat(testee.createSearchResultItem(rssItem).getTitle(), is("Some title")); rssItem.setTitle("Some title Spanish"); assertThat(testee.createSearchResultItem(rssItem).getTitle(), is("Some title")); }
protected SearchResultItem createSearchResultItem(NewznabXmlItem item) throws NzbHydraException { SearchResultItem searchResultItem = new SearchResultItem(); String link = getEnclosureUrl(item); searchResultItem.setLink(link); if (item.getRssGuid().isPermaLink()) { searchResultItem.setDetails(item.getRssGuid().getGuid()); Matcher matcher = GUID_PATTERN.matcher(item.getRssGuid().getGuid()); if (matcher.matches()) { searchResultItem.setIndexerGuid(matcher.group(2)); } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } if (!Strings.isNullOrEmpty(item.getComments()) && Strings.isNullOrEmpty(searchResultItem.getDetails())) { searchResultItem.setDetails(item.getComments().replace("#comments", "")); } searchResultItem.setFirstFound(Instant.now()); searchResultItem.setIndexer(this); searchResultItem.setTitle(cleanUpTitle(item.getTitle())); searchResultItem.setSize(item.getEnclosure().getLength()); searchResultItem.setPubDate(item.getPubDate()); searchResultItem.setIndexerScore(config.getScore()); searchResultItem.setGuid(SearchResultIdCalculator.calculateSearchResultId(searchResultItem)); searchResultItem.setAgePrecise(true); searchResultItem.setDescription(item.getDescription()); searchResultItem.setDownloadType(DownloadType.NZB); searchResultItem.setCommentsLink(item.getComments()); searchResultItem.setOriginalCategory(item.getCategory()); parseAttributes(item, searchResultItem); return searchResultItem; }
Newznab extends Indexer<Xml> { protected SearchResultItem createSearchResultItem(NewznabXmlItem item) throws NzbHydraException { SearchResultItem searchResultItem = new SearchResultItem(); String link = getEnclosureUrl(item); searchResultItem.setLink(link); if (item.getRssGuid().isPermaLink()) { searchResultItem.setDetails(item.getRssGuid().getGuid()); Matcher matcher = GUID_PATTERN.matcher(item.getRssGuid().getGuid()); if (matcher.matches()) { searchResultItem.setIndexerGuid(matcher.group(2)); } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } if (!Strings.isNullOrEmpty(item.getComments()) && Strings.isNullOrEmpty(searchResultItem.getDetails())) { searchResultItem.setDetails(item.getComments().replace("#comments", "")); } searchResultItem.setFirstFound(Instant.now()); searchResultItem.setIndexer(this); searchResultItem.setTitle(cleanUpTitle(item.getTitle())); searchResultItem.setSize(item.getEnclosure().getLength()); searchResultItem.setPubDate(item.getPubDate()); searchResultItem.setIndexerScore(config.getScore()); searchResultItem.setGuid(SearchResultIdCalculator.calculateSearchResultId(searchResultItem)); searchResultItem.setAgePrecise(true); searchResultItem.setDescription(item.getDescription()); searchResultItem.setDownloadType(DownloadType.NZB); searchResultItem.setCommentsLink(item.getComments()); searchResultItem.setOriginalCategory(item.getCategory()); parseAttributes(item, searchResultItem); return searchResultItem; } }
Newznab extends Indexer<Xml> { protected SearchResultItem createSearchResultItem(NewznabXmlItem item) throws NzbHydraException { SearchResultItem searchResultItem = new SearchResultItem(); String link = getEnclosureUrl(item); searchResultItem.setLink(link); if (item.getRssGuid().isPermaLink()) { searchResultItem.setDetails(item.getRssGuid().getGuid()); Matcher matcher = GUID_PATTERN.matcher(item.getRssGuid().getGuid()); if (matcher.matches()) { searchResultItem.setIndexerGuid(matcher.group(2)); } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } if (!Strings.isNullOrEmpty(item.getComments()) && Strings.isNullOrEmpty(searchResultItem.getDetails())) { searchResultItem.setDetails(item.getComments().replace("#comments", "")); } searchResultItem.setFirstFound(Instant.now()); searchResultItem.setIndexer(this); searchResultItem.setTitle(cleanUpTitle(item.getTitle())); searchResultItem.setSize(item.getEnclosure().getLength()); searchResultItem.setPubDate(item.getPubDate()); searchResultItem.setIndexerScore(config.getScore()); searchResultItem.setGuid(SearchResultIdCalculator.calculateSearchResultId(searchResultItem)); searchResultItem.setAgePrecise(true); searchResultItem.setDescription(item.getDescription()); searchResultItem.setDownloadType(DownloadType.NZB); searchResultItem.setCommentsLink(item.getComments()); searchResultItem.setOriginalCategory(item.getCategory()); parseAttributes(item, searchResultItem); return searchResultItem; } }
Newznab extends Indexer<Xml> { protected SearchResultItem createSearchResultItem(NewznabXmlItem item) throws NzbHydraException { SearchResultItem searchResultItem = new SearchResultItem(); String link = getEnclosureUrl(item); searchResultItem.setLink(link); if (item.getRssGuid().isPermaLink()) { searchResultItem.setDetails(item.getRssGuid().getGuid()); Matcher matcher = GUID_PATTERN.matcher(item.getRssGuid().getGuid()); if (matcher.matches()) { searchResultItem.setIndexerGuid(matcher.group(2)); } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } if (!Strings.isNullOrEmpty(item.getComments()) && Strings.isNullOrEmpty(searchResultItem.getDetails())) { searchResultItem.setDetails(item.getComments().replace("#comments", "")); } searchResultItem.setFirstFound(Instant.now()); searchResultItem.setIndexer(this); searchResultItem.setTitle(cleanUpTitle(item.getTitle())); searchResultItem.setSize(item.getEnclosure().getLength()); searchResultItem.setPubDate(item.getPubDate()); searchResultItem.setIndexerScore(config.getScore()); searchResultItem.setGuid(SearchResultIdCalculator.calculateSearchResultId(searchResultItem)); searchResultItem.setAgePrecise(true); searchResultItem.setDescription(item.getDescription()); searchResultItem.setDownloadType(DownloadType.NZB); searchResultItem.setCommentsLink(item.getComments()); searchResultItem.setOriginalCategory(item.getCategory()); parseAttributes(item, searchResultItem); return searchResultItem; } @Override NfoResult getNfo(String guid); }
Newznab extends Indexer<Xml> { protected SearchResultItem createSearchResultItem(NewznabXmlItem item) throws NzbHydraException { SearchResultItem searchResultItem = new SearchResultItem(); String link = getEnclosureUrl(item); searchResultItem.setLink(link); if (item.getRssGuid().isPermaLink()) { searchResultItem.setDetails(item.getRssGuid().getGuid()); Matcher matcher = GUID_PATTERN.matcher(item.getRssGuid().getGuid()); if (matcher.matches()) { searchResultItem.setIndexerGuid(matcher.group(2)); } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } } else { searchResultItem.setIndexerGuid(item.getRssGuid().getGuid()); } if (!Strings.isNullOrEmpty(item.getComments()) && Strings.isNullOrEmpty(searchResultItem.getDetails())) { searchResultItem.setDetails(item.getComments().replace("#comments", "")); } searchResultItem.setFirstFound(Instant.now()); searchResultItem.setIndexer(this); searchResultItem.setTitle(cleanUpTitle(item.getTitle())); searchResultItem.setSize(item.getEnclosure().getLength()); searchResultItem.setPubDate(item.getPubDate()); searchResultItem.setIndexerScore(config.getScore()); searchResultItem.setGuid(SearchResultIdCalculator.calculateSearchResultId(searchResultItem)); searchResultItem.setAgePrecise(true); searchResultItem.setDescription(item.getDescription()); searchResultItem.setDownloadType(DownloadType.NZB); searchResultItem.setCommentsLink(item.getComments()); searchResultItem.setOriginalCategory(item.getCategory()); parseAttributes(item, searchResultItem); return searchResultItem; } @Override NfoResult getNfo(String guid); }
@Test public void shouldComputeCategory() throws Exception { when(categoryProviderMock.fromResultNewznabCategories(any())).thenReturn(otherCategory); testee.config.getCategoryMapping().setAnime(1010); SearchResultItem item = new SearchResultItem(); testee.computeCategory(item, Arrays.asList(1000, 1010)); assertThat(item.getCategory(), is(animeCategory)); testee.computeCategory(item, Arrays.asList(3030)); assertThat(item.getCategory(), is(otherCategory)); }
protected void computeCategory(SearchResultItem searchResultItem, List<Integer> newznabCategories) { if (!newznabCategories.isEmpty()) { Integer mostSpecific = newznabCategories.stream().max(Integer::compareTo).get(); IndexerCategoryConfig mapping = config.getCategoryMapping(); Category category; if (mapping == null) { category = categoryProvider.fromSearchNewznabCategories(newznabCategories, categoryProvider.getNotAvailable()); searchResultItem.setOriginalCategory(categoryProvider.getNotAvailable().getName()); } else { category = idToCategory.computeIfAbsent(mostSpecific, x -> { Optional<Category> categoryOptional = Optional.empty(); if (mapping.getAnime().isPresent() && Objects.equals(mapping.getAnime().get(), mostSpecific)) { categoryOptional = categoryProvider.fromSubtype(Subtype.ANIME); } else if (mapping.getAudiobook().isPresent() && Objects.equals(mapping.getAudiobook().get(), mostSpecific)) { categoryOptional = categoryProvider.fromSubtype(Subtype.AUDIOBOOK); } else if (mapping.getEbook().isPresent() && Objects.equals(mapping.getEbook().get(), mostSpecific)) { categoryOptional = categoryProvider.fromSubtype(Subtype.EBOOK); } else if (mapping.getComic().isPresent() && Objects.equals(mapping.getComic().get(), mostSpecific)) { categoryOptional = categoryProvider.fromSubtype(Subtype.COMIC); } else if (mapping.getMagazine().isPresent() && Objects.equals(mapping.getMagazine().get(), mostSpecific)) { categoryOptional = categoryProvider.fromSubtype(Subtype.MAGAZINE); } return categoryOptional.orElse(categoryProvider.fromResultNewznabCategories(newznabCategories)); }); searchResultItem.setOriginalCategory(mapping.getNameFromId(mostSpecific)); } if (category == null) { searchResultItem.setCategory(categoryProvider.getNotAvailable()); } else { searchResultItem.setCategory(category); } } else { searchResultItem.setCategory(categoryProvider.getNotAvailable()); } }
Newznab extends Indexer<Xml> { protected void computeCategory(SearchResultItem searchResultItem, List<Integer> newznabCategories) { if (!newznabCategories.isEmpty()) { Integer mostSpecific = newznabCategories.stream().max(Integer::compareTo).get(); IndexerCategoryConfig mapping = config.getCategoryMapping(); Category category; if (mapping == null) { category = categoryProvider.fromSearchNewznabCategories(newznabCategories, categoryProvider.getNotAvailable()); searchResultItem.setOriginalCategory(categoryProvider.getNotAvailable().getName()); } else { category = idToCategory.computeIfAbsent(mostSpecific, x -> { Optional<Category> categoryOptional = Optional.empty(); if (mapping.getAnime().isPresent() && Objects.equals(mapping.getAnime().get(), mostSpecific)) { categoryOptional = categoryProvider.fromSubtype(Subtype.ANIME); } else if (mapping.getAudiobook().isPresent() && Objects.equals(mapping.getAudiobook().get(), mostSpecific)) { categoryOptional = categoryProvider.fromSubtype(Subtype.AUDIOBOOK); } else if (mapping.getEbook().isPresent() && Objects.equals(mapping.getEbook().get(), mostSpecific)) { categoryOptional = categoryProvider.fromSubtype(Subtype.EBOOK); } else if (mapping.getComic().isPresent() && Objects.equals(mapping.getComic().get(), mostSpecific)) { categoryOptional = categoryProvider.fromSubtype(Subtype.COMIC); } else if (mapping.getMagazine().isPresent() && Objects.equals(mapping.getMagazine().get(), mostSpecific)) { categoryOptional = categoryProvider.fromSubtype(Subtype.MAGAZINE); } return categoryOptional.orElse(categoryProvider.fromResultNewznabCategories(newznabCategories)); }); searchResultItem.setOriginalCategory(mapping.getNameFromId(mostSpecific)); } if (category == null) { searchResultItem.setCategory(categoryProvider.getNotAvailable()); } else { searchResultItem.setCategory(category); } } else { searchResultItem.setCategory(categoryProvider.getNotAvailable()); } } }
Newznab extends Indexer<Xml> { protected void computeCategory(SearchResultItem searchResultItem, List<Integer> newznabCategories) { if (!newznabCategories.isEmpty()) { Integer mostSpecific = newznabCategories.stream().max(Integer::compareTo).get(); IndexerCategoryConfig mapping = config.getCategoryMapping(); Category category; if (mapping == null) { category = categoryProvider.fromSearchNewznabCategories(newznabCategories, categoryProvider.getNotAvailable()); searchResultItem.setOriginalCategory(categoryProvider.getNotAvailable().getName()); } else { category = idToCategory.computeIfAbsent(mostSpecific, x -> { Optional<Category> categoryOptional = Optional.empty(); if (mapping.getAnime().isPresent() && Objects.equals(mapping.getAnime().get(), mostSpecific)) { categoryOptional = categoryProvider.fromSubtype(Subtype.ANIME); } else if (mapping.getAudiobook().isPresent() && Objects.equals(mapping.getAudiobook().get(), mostSpecific)) { categoryOptional = categoryProvider.fromSubtype(Subtype.AUDIOBOOK); } else if (mapping.getEbook().isPresent() && Objects.equals(mapping.getEbook().get(), mostSpecific)) { categoryOptional = categoryProvider.fromSubtype(Subtype.EBOOK); } else if (mapping.getComic().isPresent() && Objects.equals(mapping.getComic().get(), mostSpecific)) { categoryOptional = categoryProvider.fromSubtype(Subtype.COMIC); } else if (mapping.getMagazine().isPresent() && Objects.equals(mapping.getMagazine().get(), mostSpecific)) { categoryOptional = categoryProvider.fromSubtype(Subtype.MAGAZINE); } return categoryOptional.orElse(categoryProvider.fromResultNewznabCategories(newznabCategories)); }); searchResultItem.setOriginalCategory(mapping.getNameFromId(mostSpecific)); } if (category == null) { searchResultItem.setCategory(categoryProvider.getNotAvailable()); } else { searchResultItem.setCategory(category); } } else { searchResultItem.setCategory(categoryProvider.getNotAvailable()); } } }
Newznab extends Indexer<Xml> { protected void computeCategory(SearchResultItem searchResultItem, List<Integer> newznabCategories) { if (!newznabCategories.isEmpty()) { Integer mostSpecific = newznabCategories.stream().max(Integer::compareTo).get(); IndexerCategoryConfig mapping = config.getCategoryMapping(); Category category; if (mapping == null) { category = categoryProvider.fromSearchNewznabCategories(newznabCategories, categoryProvider.getNotAvailable()); searchResultItem.setOriginalCategory(categoryProvider.getNotAvailable().getName()); } else { category = idToCategory.computeIfAbsent(mostSpecific, x -> { Optional<Category> categoryOptional = Optional.empty(); if (mapping.getAnime().isPresent() && Objects.equals(mapping.getAnime().get(), mostSpecific)) { categoryOptional = categoryProvider.fromSubtype(Subtype.ANIME); } else if (mapping.getAudiobook().isPresent() && Objects.equals(mapping.getAudiobook().get(), mostSpecific)) { categoryOptional = categoryProvider.fromSubtype(Subtype.AUDIOBOOK); } else if (mapping.getEbook().isPresent() && Objects.equals(mapping.getEbook().get(), mostSpecific)) { categoryOptional = categoryProvider.fromSubtype(Subtype.EBOOK); } else if (mapping.getComic().isPresent() && Objects.equals(mapping.getComic().get(), mostSpecific)) { categoryOptional = categoryProvider.fromSubtype(Subtype.COMIC); } else if (mapping.getMagazine().isPresent() && Objects.equals(mapping.getMagazine().get(), mostSpecific)) { categoryOptional = categoryProvider.fromSubtype(Subtype.MAGAZINE); } return categoryOptional.orElse(categoryProvider.fromResultNewznabCategories(newznabCategories)); }); searchResultItem.setOriginalCategory(mapping.getNameFromId(mostSpecific)); } if (category == null) { searchResultItem.setCategory(categoryProvider.getNotAvailable()); } else { searchResultItem.setCategory(category); } } else { searchResultItem.setCategory(categoryProvider.getNotAvailable()); } } @Override NfoResult getNfo(String guid); }
Newznab extends Indexer<Xml> { protected void computeCategory(SearchResultItem searchResultItem, List<Integer> newznabCategories) { if (!newznabCategories.isEmpty()) { Integer mostSpecific = newznabCategories.stream().max(Integer::compareTo).get(); IndexerCategoryConfig mapping = config.getCategoryMapping(); Category category; if (mapping == null) { category = categoryProvider.fromSearchNewznabCategories(newznabCategories, categoryProvider.getNotAvailable()); searchResultItem.setOriginalCategory(categoryProvider.getNotAvailable().getName()); } else { category = idToCategory.computeIfAbsent(mostSpecific, x -> { Optional<Category> categoryOptional = Optional.empty(); if (mapping.getAnime().isPresent() && Objects.equals(mapping.getAnime().get(), mostSpecific)) { categoryOptional = categoryProvider.fromSubtype(Subtype.ANIME); } else if (mapping.getAudiobook().isPresent() && Objects.equals(mapping.getAudiobook().get(), mostSpecific)) { categoryOptional = categoryProvider.fromSubtype(Subtype.AUDIOBOOK); } else if (mapping.getEbook().isPresent() && Objects.equals(mapping.getEbook().get(), mostSpecific)) { categoryOptional = categoryProvider.fromSubtype(Subtype.EBOOK); } else if (mapping.getComic().isPresent() && Objects.equals(mapping.getComic().get(), mostSpecific)) { categoryOptional = categoryProvider.fromSubtype(Subtype.COMIC); } else if (mapping.getMagazine().isPresent() && Objects.equals(mapping.getMagazine().get(), mostSpecific)) { categoryOptional = categoryProvider.fromSubtype(Subtype.MAGAZINE); } return categoryOptional.orElse(categoryProvider.fromResultNewznabCategories(newznabCategories)); }); searchResultItem.setOriginalCategory(mapping.getNameFromId(mostSpecific)); } if (category == null) { searchResultItem.setCategory(categoryProvider.getNotAvailable()); } else { searchResultItem.setCategory(category); } } else { searchResultItem.setCategory(categoryProvider.getNotAvailable()); } } @Override NfoResult getNfo(String guid); }
@Test public void shouldNotUseMoreThan6WordsForNzbGeek() throws Exception { String query = "1 2 3 4 5 6 7 8 9"; assertThat(testee.cleanupQuery(query), is("1 2 3 4 5 6")); }
@Override protected String cleanupQuery(String query) { String[] split = query.split(" "); if (query.split(" ").length > 6) { query = Joiner.on(" ").join(Arrays.copyOfRange(split, 0, 6)); } return query.replace("\"", ""); }
NzbGeek extends Newznab { @Override protected String cleanupQuery(String query) { String[] split = query.split(" "); if (query.split(" ").length > 6) { query = Joiner.on(" ").join(Arrays.copyOfRange(split, 0, 6)); } return query.replace("\"", ""); } }
NzbGeek extends Newznab { @Override protected String cleanupQuery(String query) { String[] split = query.split(" "); if (query.split(" ").length > 6) { query = Joiner.on(" ").join(Arrays.copyOfRange(split, 0, 6)); } return query.replace("\"", ""); } }
NzbGeek extends Newznab { @Override protected String cleanupQuery(String query) { String[] split = query.split(" "); if (query.split(" ").length > 6) { query = Joiner.on(" ").join(Arrays.copyOfRange(split, 0, 6)); } return query.replace("\"", ""); } }
NzbGeek extends Newznab { @Override protected String cleanupQuery(String query) { String[] split = query.split(" "); if (query.split(" ").length > 6) { query = Joiner.on(" ").join(Arrays.copyOfRange(split, 0, 6)); } return query.replace("\"", ""); } }
@Test public void shouldCleanup() { testee.cleanup(); assertThat(indexerConfigDisabledTempOutsideTimeWindow.getState()).isEqualTo(IndexerConfig.State.ENABLED); assertThat(indexerConfigDisabledTempOutsideTimeWindow.getDisabledUntil()).isNull(); assertThat(indexerConfigDisabledTempOutsideTimeWindow.getLastError()).isNull(); assertThat(indexerConfigDisabledTempOutsideTimeWindow.getDisabledLevel()).isEqualTo(1); assertThat(indexerConfigDisabledTempInTimeWindow.getState()).isEqualTo(IndexerConfig.State.DISABLED_SYSTEM_TEMPORARY); assertThat(indexerConfigDisabledTempInTimeWindow.getDisabledUntil()).isNotNull(); assertThat(indexerConfigDisabledTempInTimeWindow.getLastError()).isEqualTo("someerror"); assertThat(indexerConfigDisabledTempInTimeWindow.getDisabledLevel()).isEqualTo(1); assertThat(indexerConfigEnabled.getState()).isEqualTo(IndexerConfig.State.ENABLED); assertThat(indexerConfigUserDisabled.getState()).isEqualTo(IndexerConfig.State.DISABLED_USER); assertThat(indexerConfigDisabledSystem.getState()).isEqualTo(IndexerConfig.State.DISABLED_SYSTEM); }
@HydraTask(configId = "cleanUpIndexerStatuses", name = "Clean up indexer statuses", interval = MINUTE) public void cleanup() { boolean anyChanges = false; for (IndexerConfig config : configProvider.getBaseConfig().getIndexers()) { if (config.getState() == IndexerConfig.State.DISABLED_SYSTEM_TEMPORARY && config.getDisabledUntil() != null && Instant.ofEpochMilli(config.getDisabledUntil()).isBefore(Instant.now())) { logger.debug("Setting indexer {} back to enabled after having been temporarily disabled until {}", config.getName(), Instant.ofEpochMilli(config.getDisabledUntil())); config.setState(IndexerConfig.State.ENABLED); config.setDisabledUntil(null); config.setLastError(null); anyChanges = true; } } if (anyChanges) { configProvider.getBaseConfig().save(false); } }
IndexerStatusesCleanupTask { @HydraTask(configId = "cleanUpIndexerStatuses", name = "Clean up indexer statuses", interval = MINUTE) public void cleanup() { boolean anyChanges = false; for (IndexerConfig config : configProvider.getBaseConfig().getIndexers()) { if (config.getState() == IndexerConfig.State.DISABLED_SYSTEM_TEMPORARY && config.getDisabledUntil() != null && Instant.ofEpochMilli(config.getDisabledUntil()).isBefore(Instant.now())) { logger.debug("Setting indexer {} back to enabled after having been temporarily disabled until {}", config.getName(), Instant.ofEpochMilli(config.getDisabledUntil())); config.setState(IndexerConfig.State.ENABLED); config.setDisabledUntil(null); config.setLastError(null); anyChanges = true; } } if (anyChanges) { configProvider.getBaseConfig().save(false); } } }
IndexerStatusesCleanupTask { @HydraTask(configId = "cleanUpIndexerStatuses", name = "Clean up indexer statuses", interval = MINUTE) public void cleanup() { boolean anyChanges = false; for (IndexerConfig config : configProvider.getBaseConfig().getIndexers()) { if (config.getState() == IndexerConfig.State.DISABLED_SYSTEM_TEMPORARY && config.getDisabledUntil() != null && Instant.ofEpochMilli(config.getDisabledUntil()).isBefore(Instant.now())) { logger.debug("Setting indexer {} back to enabled after having been temporarily disabled until {}", config.getName(), Instant.ofEpochMilli(config.getDisabledUntil())); config.setState(IndexerConfig.State.ENABLED); config.setDisabledUntil(null); config.setLastError(null); anyChanges = true; } } if (anyChanges) { configProvider.getBaseConfig().save(false); } } @Autowired IndexerStatusesCleanupTask(ConfigProvider configProvider); }
IndexerStatusesCleanupTask { @HydraTask(configId = "cleanUpIndexerStatuses", name = "Clean up indexer statuses", interval = MINUTE) public void cleanup() { boolean anyChanges = false; for (IndexerConfig config : configProvider.getBaseConfig().getIndexers()) { if (config.getState() == IndexerConfig.State.DISABLED_SYSTEM_TEMPORARY && config.getDisabledUntil() != null && Instant.ofEpochMilli(config.getDisabledUntil()).isBefore(Instant.now())) { logger.debug("Setting indexer {} back to enabled after having been temporarily disabled until {}", config.getName(), Instant.ofEpochMilli(config.getDisabledUntil())); config.setState(IndexerConfig.State.ENABLED); config.setDisabledUntil(null); config.setLastError(null); anyChanges = true; } } if (anyChanges) { configProvider.getBaseConfig().save(false); } } @Autowired IndexerStatusesCleanupTask(ConfigProvider configProvider); @HydraTask(configId = "cleanUpIndexerStatuses", name = "Clean up indexer statuses", interval = MINUTE) void cleanup(); }
IndexerStatusesCleanupTask { @HydraTask(configId = "cleanUpIndexerStatuses", name = "Clean up indexer statuses", interval = MINUTE) public void cleanup() { boolean anyChanges = false; for (IndexerConfig config : configProvider.getBaseConfig().getIndexers()) { if (config.getState() == IndexerConfig.State.DISABLED_SYSTEM_TEMPORARY && config.getDisabledUntil() != null && Instant.ofEpochMilli(config.getDisabledUntil()).isBefore(Instant.now())) { logger.debug("Setting indexer {} back to enabled after having been temporarily disabled until {}", config.getName(), Instant.ofEpochMilli(config.getDisabledUntil())); config.setState(IndexerConfig.State.ENABLED); config.setDisabledUntil(null); config.setLastError(null); anyChanges = true; } } if (anyChanges) { configProvider.getBaseConfig().save(false); } } @Autowired IndexerStatusesCleanupTask(ConfigProvider configProvider); @HydraTask(configId = "cleanUpIndexerStatuses", name = "Clean up indexer statuses", interval = MINUTE) void cleanup(); }
@Test public void shouldUseIndexerUserAgent() throws Exception{ testee.get(new URI("http: Map<String, String> headers = headersCaptor.getValue(); assertThat(headers).contains(entry("User-Agent", "indexerUa")); }
@SuppressWarnings("unchecked") public <T> T get(URI uri, IndexerConfig indexerConfig) throws IndexerAccessException { return get(uri, indexerConfig, null); }
IndexerWebAccess { @SuppressWarnings("unchecked") public <T> T get(URI uri, IndexerConfig indexerConfig) throws IndexerAccessException { return get(uri, indexerConfig, null); } }
IndexerWebAccess { @SuppressWarnings("unchecked") public <T> T get(URI uri, IndexerConfig indexerConfig) throws IndexerAccessException { return get(uri, indexerConfig, null); } }
IndexerWebAccess { @SuppressWarnings("unchecked") public <T> T get(URI uri, IndexerConfig indexerConfig) throws IndexerAccessException { return get(uri, indexerConfig, null); } @SuppressWarnings("unchecked") T get(URI uri, IndexerConfig indexerConfig); @SuppressWarnings("unchecked") T get(URI uri, IndexerConfig indexerConfig, Class responseType); }
IndexerWebAccess { @SuppressWarnings("unchecked") public <T> T get(URI uri, IndexerConfig indexerConfig) throws IndexerAccessException { return get(uri, indexerConfig, null); } @SuppressWarnings("unchecked") T get(URI uri, IndexerConfig indexerConfig); @SuppressWarnings("unchecked") T get(URI uri, IndexerConfig indexerConfig, Class responseType); }
@Test public void shouldUseGlobalUserAgentIfNoIndexerUaIsSet() throws Exception{ indexerConfig.setUserAgent(null); testee.get(new URI("http: Map<String, String> headers = headersCaptor.getValue(); assertThat(headers).contains(entry("User-Agent", "globalUa")); }
@SuppressWarnings("unchecked") public <T> T get(URI uri, IndexerConfig indexerConfig) throws IndexerAccessException { return get(uri, indexerConfig, null); }
IndexerWebAccess { @SuppressWarnings("unchecked") public <T> T get(URI uri, IndexerConfig indexerConfig) throws IndexerAccessException { return get(uri, indexerConfig, null); } }
IndexerWebAccess { @SuppressWarnings("unchecked") public <T> T get(URI uri, IndexerConfig indexerConfig) throws IndexerAccessException { return get(uri, indexerConfig, null); } }
IndexerWebAccess { @SuppressWarnings("unchecked") public <T> T get(URI uri, IndexerConfig indexerConfig) throws IndexerAccessException { return get(uri, indexerConfig, null); } @SuppressWarnings("unchecked") T get(URI uri, IndexerConfig indexerConfig); @SuppressWarnings("unchecked") T get(URI uri, IndexerConfig indexerConfig, Class responseType); }
IndexerWebAccess { @SuppressWarnings("unchecked") public <T> T get(URI uri, IndexerConfig indexerConfig) throws IndexerAccessException { return get(uri, indexerConfig, null); } @SuppressWarnings("unchecked") T get(URI uri, IndexerConfig indexerConfig); @SuppressWarnings("unchecked") T get(URI uri, IndexerConfig indexerConfig, Class responseType); }
@Test public void shouldUseIndexerTimeout() throws Exception{ testee.get(new URI("http: assertThat(timeoutCaptor.getValue()).isEqualTo(10); }
@SuppressWarnings("unchecked") public <T> T get(URI uri, IndexerConfig indexerConfig) throws IndexerAccessException { return get(uri, indexerConfig, null); }
IndexerWebAccess { @SuppressWarnings("unchecked") public <T> T get(URI uri, IndexerConfig indexerConfig) throws IndexerAccessException { return get(uri, indexerConfig, null); } }
IndexerWebAccess { @SuppressWarnings("unchecked") public <T> T get(URI uri, IndexerConfig indexerConfig) throws IndexerAccessException { return get(uri, indexerConfig, null); } }
IndexerWebAccess { @SuppressWarnings("unchecked") public <T> T get(URI uri, IndexerConfig indexerConfig) throws IndexerAccessException { return get(uri, indexerConfig, null); } @SuppressWarnings("unchecked") T get(URI uri, IndexerConfig indexerConfig); @SuppressWarnings("unchecked") T get(URI uri, IndexerConfig indexerConfig, Class responseType); }
IndexerWebAccess { @SuppressWarnings("unchecked") public <T> T get(URI uri, IndexerConfig indexerConfig) throws IndexerAccessException { return get(uri, indexerConfig, null); } @SuppressWarnings("unchecked") T get(URI uri, IndexerConfig indexerConfig); @SuppressWarnings("unchecked") T get(URI uri, IndexerConfig indexerConfig, Class responseType); }
@Test public void shouldIgnoreHitLimitIfNotYetReached() { indexerConfigMock.setHitLimit(10); when(queryMock.getResultList()).thenReturn(Collections.emptyList()); boolean result = testee.checkIndexerHitLimit(indexer); assertTrue(result); verify(entityManagerMock).createNativeQuery(anyString()); }
protected boolean checkIndexerHitLimit(Indexer indexer) { Stopwatch stopwatch = Stopwatch.createStarted(); IndexerConfig indexerConfig = indexer.getConfig(); if (!indexerConfig.getHitLimit().isPresent() && !indexerConfig.getDownloadLimit().isPresent()) { return true; } LocalDateTime comparisonTime; LocalDateTime now = LocalDateTime.now(clock); if (indexerConfig.getHitLimitResetTime().isPresent()) { comparisonTime = now.with(ChronoField.HOUR_OF_DAY, indexerConfig.getHitLimitResetTime().get()); if (comparisonTime.isAfter(now)) { comparisonTime = comparisonTime.minus(1, ChronoUnit.DAYS); } } else { comparisonTime = now.minus(1, ChronoUnit.DAYS); } if (indexerConfig.getHitLimit().isPresent()) { boolean limitExceeded = checkIfHitLimitIsExceeded(indexer, indexerConfig, comparisonTime, IndexerApiAccessType.SEARCH, indexerConfig.getHitLimit().get(), "API hit"); if (limitExceeded) { return false; } } if (indexerConfig.getDownloadLimit().isPresent()) { boolean limitExceeded = checkIfHitLimitIsExceeded(indexer, indexerConfig, comparisonTime, IndexerApiAccessType.NZB, indexerConfig.getDownloadLimit().get(), "download"); if (limitExceeded) { return false; } } logger.debug(LoggingMarkers.PERFORMANCE, "Detection that hit limits were not reached for indexer {} took {}ms", indexer.getName(), stopwatch.elapsed(TimeUnit.MILLISECONDS)); return true; }
IndexerForSearchSelector { protected boolean checkIndexerHitLimit(Indexer indexer) { Stopwatch stopwatch = Stopwatch.createStarted(); IndexerConfig indexerConfig = indexer.getConfig(); if (!indexerConfig.getHitLimit().isPresent() && !indexerConfig.getDownloadLimit().isPresent()) { return true; } LocalDateTime comparisonTime; LocalDateTime now = LocalDateTime.now(clock); if (indexerConfig.getHitLimitResetTime().isPresent()) { comparisonTime = now.with(ChronoField.HOUR_OF_DAY, indexerConfig.getHitLimitResetTime().get()); if (comparisonTime.isAfter(now)) { comparisonTime = comparisonTime.minus(1, ChronoUnit.DAYS); } } else { comparisonTime = now.minus(1, ChronoUnit.DAYS); } if (indexerConfig.getHitLimit().isPresent()) { boolean limitExceeded = checkIfHitLimitIsExceeded(indexer, indexerConfig, comparisonTime, IndexerApiAccessType.SEARCH, indexerConfig.getHitLimit().get(), "API hit"); if (limitExceeded) { return false; } } if (indexerConfig.getDownloadLimit().isPresent()) { boolean limitExceeded = checkIfHitLimitIsExceeded(indexer, indexerConfig, comparisonTime, IndexerApiAccessType.NZB, indexerConfig.getDownloadLimit().get(), "download"); if (limitExceeded) { return false; } } logger.debug(LoggingMarkers.PERFORMANCE, "Detection that hit limits were not reached for indexer {} took {}ms", indexer.getName(), stopwatch.elapsed(TimeUnit.MILLISECONDS)); return true; } }
IndexerForSearchSelector { protected boolean checkIndexerHitLimit(Indexer indexer) { Stopwatch stopwatch = Stopwatch.createStarted(); IndexerConfig indexerConfig = indexer.getConfig(); if (!indexerConfig.getHitLimit().isPresent() && !indexerConfig.getDownloadLimit().isPresent()) { return true; } LocalDateTime comparisonTime; LocalDateTime now = LocalDateTime.now(clock); if (indexerConfig.getHitLimitResetTime().isPresent()) { comparisonTime = now.with(ChronoField.HOUR_OF_DAY, indexerConfig.getHitLimitResetTime().get()); if (comparisonTime.isAfter(now)) { comparisonTime = comparisonTime.minus(1, ChronoUnit.DAYS); } } else { comparisonTime = now.minus(1, ChronoUnit.DAYS); } if (indexerConfig.getHitLimit().isPresent()) { boolean limitExceeded = checkIfHitLimitIsExceeded(indexer, indexerConfig, comparisonTime, IndexerApiAccessType.SEARCH, indexerConfig.getHitLimit().get(), "API hit"); if (limitExceeded) { return false; } } if (indexerConfig.getDownloadLimit().isPresent()) { boolean limitExceeded = checkIfHitLimitIsExceeded(indexer, indexerConfig, comparisonTime, IndexerApiAccessType.NZB, indexerConfig.getDownloadLimit().get(), "download"); if (limitExceeded) { return false; } } logger.debug(LoggingMarkers.PERFORMANCE, "Detection that hit limits were not reached for indexer {} took {}ms", indexer.getName(), stopwatch.elapsed(TimeUnit.MILLISECONDS)); return true; } }
IndexerForSearchSelector { protected boolean checkIndexerHitLimit(Indexer indexer) { Stopwatch stopwatch = Stopwatch.createStarted(); IndexerConfig indexerConfig = indexer.getConfig(); if (!indexerConfig.getHitLimit().isPresent() && !indexerConfig.getDownloadLimit().isPresent()) { return true; } LocalDateTime comparisonTime; LocalDateTime now = LocalDateTime.now(clock); if (indexerConfig.getHitLimitResetTime().isPresent()) { comparisonTime = now.with(ChronoField.HOUR_OF_DAY, indexerConfig.getHitLimitResetTime().get()); if (comparisonTime.isAfter(now)) { comparisonTime = comparisonTime.minus(1, ChronoUnit.DAYS); } } else { comparisonTime = now.minus(1, ChronoUnit.DAYS); } if (indexerConfig.getHitLimit().isPresent()) { boolean limitExceeded = checkIfHitLimitIsExceeded(indexer, indexerConfig, comparisonTime, IndexerApiAccessType.SEARCH, indexerConfig.getHitLimit().get(), "API hit"); if (limitExceeded) { return false; } } if (indexerConfig.getDownloadLimit().isPresent()) { boolean limitExceeded = checkIfHitLimitIsExceeded(indexer, indexerConfig, comparisonTime, IndexerApiAccessType.NZB, indexerConfig.getDownloadLimit().get(), "download"); if (limitExceeded) { return false; } } logger.debug(LoggingMarkers.PERFORMANCE, "Detection that hit limits were not reached for indexer {} took {}ms", indexer.getName(), stopwatch.elapsed(TimeUnit.MILLISECONDS)); return true; } IndexerForSearchSelection pickIndexers(SearchRequest searchRequest); }
IndexerForSearchSelector { protected boolean checkIndexerHitLimit(Indexer indexer) { Stopwatch stopwatch = Stopwatch.createStarted(); IndexerConfig indexerConfig = indexer.getConfig(); if (!indexerConfig.getHitLimit().isPresent() && !indexerConfig.getDownloadLimit().isPresent()) { return true; } LocalDateTime comparisonTime; LocalDateTime now = LocalDateTime.now(clock); if (indexerConfig.getHitLimitResetTime().isPresent()) { comparisonTime = now.with(ChronoField.HOUR_OF_DAY, indexerConfig.getHitLimitResetTime().get()); if (comparisonTime.isAfter(now)) { comparisonTime = comparisonTime.minus(1, ChronoUnit.DAYS); } } else { comparisonTime = now.minus(1, ChronoUnit.DAYS); } if (indexerConfig.getHitLimit().isPresent()) { boolean limitExceeded = checkIfHitLimitIsExceeded(indexer, indexerConfig, comparisonTime, IndexerApiAccessType.SEARCH, indexerConfig.getHitLimit().get(), "API hit"); if (limitExceeded) { return false; } } if (indexerConfig.getDownloadLimit().isPresent()) { boolean limitExceeded = checkIfHitLimitIsExceeded(indexer, indexerConfig, comparisonTime, IndexerApiAccessType.NZB, indexerConfig.getDownloadLimit().get(), "download"); if (limitExceeded) { return false; } } logger.debug(LoggingMarkers.PERFORMANCE, "Detection that hit limits were not reached for indexer {} took {}ms", indexer.getName(), stopwatch.elapsed(TimeUnit.MILLISECONDS)); return true; } IndexerForSearchSelection pickIndexers(SearchRequest searchRequest); static final Pattern SCHEDULER_PATTERN; }
@Test public void shouldUseGlobalTimeoutNoIndexerTimeoutIsSet() throws Exception{ indexerConfig.setTimeout(null); testee.get(new URI("http: assertThat(timeoutCaptor.getValue()).isEqualTo(100); }
@SuppressWarnings("unchecked") public <T> T get(URI uri, IndexerConfig indexerConfig) throws IndexerAccessException { return get(uri, indexerConfig, null); }
IndexerWebAccess { @SuppressWarnings("unchecked") public <T> T get(URI uri, IndexerConfig indexerConfig) throws IndexerAccessException { return get(uri, indexerConfig, null); } }
IndexerWebAccess { @SuppressWarnings("unchecked") public <T> T get(URI uri, IndexerConfig indexerConfig) throws IndexerAccessException { return get(uri, indexerConfig, null); } }
IndexerWebAccess { @SuppressWarnings("unchecked") public <T> T get(URI uri, IndexerConfig indexerConfig) throws IndexerAccessException { return get(uri, indexerConfig, null); } @SuppressWarnings("unchecked") T get(URI uri, IndexerConfig indexerConfig); @SuppressWarnings("unchecked") T get(URI uri, IndexerConfig indexerConfig, Class responseType); }
IndexerWebAccess { @SuppressWarnings("unchecked") public <T> T get(URI uri, IndexerConfig indexerConfig) throws IndexerAccessException { return get(uri, indexerConfig, null); } @SuppressWarnings("unchecked") T get(URI uri, IndexerConfig indexerConfig); @SuppressWarnings("unchecked") T get(URI uri, IndexerConfig indexerConfig, Class responseType); }
@Test public void shouldBuildCorrectlyForLocalAccessWithHttp() { prepareConfig(false, false, "/"); prepareHeaders("127.0.0.1:5076", null, null, null); prepareServlet("http: UriComponentsBuilder builder = testee.buildLocalBaseUriBuilder(requestMock); assertThat(builder.build().getScheme()).isEqualTo("http"); assertThat(builder.build().getHost()).isEqualTo("127.0.0.1"); assertThat(builder.build().getPort()).isEqualTo(5076); assertThat(builder.build().getPath()).isEqualTo("/"); }
protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } UriComponentsBuilder getRequestBasedUriBuilder(); @JsonIgnore UriComponentsBuilder getLocalBaseUriBuilder(); }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } UriComponentsBuilder getRequestBasedUriBuilder(); @JsonIgnore UriComponentsBuilder getLocalBaseUriBuilder(); }
@Test public void shouldBuildCorrectlyForLocalAccessWithContextPath() { prepareConfig(false, false, "/nzbhydra2"); prepareHeaders("127.0.0.1:5076", null, null, null); prepareServlet("http: UriComponentsBuilder builder = testee.buildLocalBaseUriBuilder(requestMock); assertThat(builder.build().getScheme()).isEqualTo("http"); assertThat(builder.build().getHost()).isEqualTo("127.0.0.1"); assertThat(builder.build().getPort()).isEqualTo(5076); assertThat(builder.build().getPath()).isEqualTo("/nzbhydra2"); }
protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } UriComponentsBuilder getRequestBasedUriBuilder(); @JsonIgnore UriComponentsBuilder getLocalBaseUriBuilder(); }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } UriComponentsBuilder getRequestBasedUriBuilder(); @JsonIgnore UriComponentsBuilder getLocalBaseUriBuilder(); }
@Test public void shouldBuildCorrectlyForLocalAccessWithBindAllAccessedViaLocalhost() { prepareConfig(false, true, "/"); prepareHeaders("127.0.0.1:5076", null, null, null); prepareServlet("http: UriComponentsBuilder builder = testee.buildLocalBaseUriBuilder(requestMock); assertThat(builder.build().getScheme()).isEqualTo("http"); assertThat(builder.build().getHost()).isEqualTo("127.0.0.1"); assertThat(builder.build().getPort()).isEqualTo(5076); assertThat(builder.build().getPath()).isEqualTo("/"); }
protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } UriComponentsBuilder getRequestBasedUriBuilder(); @JsonIgnore UriComponentsBuilder getLocalBaseUriBuilder(); }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } UriComponentsBuilder getRequestBasedUriBuilder(); @JsonIgnore UriComponentsBuilder getLocalBaseUriBuilder(); }
@Test public void shouldBuildCorrectlyForLocalAccessWithBindAllAccessedViaNetworkAddress() { prepareConfig(false, true, "/"); prepareHeaders("192.168.1.111:5076", null, null, null); prepareServlet("http: UriComponentsBuilder builder = testee.buildLocalBaseUriBuilder(requestMock); assertThat(builder.build().getScheme()).isEqualTo("http"); assertThat(builder.build().getHost()).isEqualTo("192.168.1.111"); assertThat(builder.build().getPort()).isEqualTo(5076); assertThat(builder.build().getPath()).isEqualTo("/"); }
protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } UriComponentsBuilder getRequestBasedUriBuilder(); @JsonIgnore UriComponentsBuilder getLocalBaseUriBuilder(); }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } UriComponentsBuilder getRequestBasedUriBuilder(); @JsonIgnore UriComponentsBuilder getLocalBaseUriBuilder(); }
@Test public void shouldBuildCorrectlyForReverseProxyWithHttpAccessedViaLocalhost() { prepareConfig(false, false, "/nzbhydra2"); prepareHeaders("127.0.0.1", "127.0.0.1:4001", null, null); prepareServlet("http: UriComponentsBuilder builder = testee.buildLocalBaseUriBuilder(requestMock); assertThat(builder.build().getScheme()).isEqualTo("http"); assertThat(builder.build().getHost()).isEqualTo("127.0.0.1"); assertThat(builder.build().getPort()).isEqualTo(4001); assertThat(builder.build().getPath()).isEqualTo("/nzbhydra2"); }
protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } UriComponentsBuilder getRequestBasedUriBuilder(); @JsonIgnore UriComponentsBuilder getLocalBaseUriBuilder(); }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } UriComponentsBuilder getRequestBasedUriBuilder(); @JsonIgnore UriComponentsBuilder getLocalBaseUriBuilder(); }
@Test public void shouldBuildCorrectlyForReverseProxyWithHttpAccessedViaNetworkAddress() { prepareConfig(false, false, "/nzbhydra2"); prepareHeaders("192.168.1.111", "192.168.1.111:4001", null, null); prepareServlet("192.168.1.111:4001", "192.168.1.111", 80, "http", "/nzbhydra2"); UriComponentsBuilder builder = testee.buildLocalBaseUriBuilder(requestMock); assertThat(builder.build().getScheme()).isEqualTo("http"); assertThat(builder.build().getHost()).isEqualTo("192.168.1.111"); assertThat(builder.build().getPort()).isEqualTo(4001); assertThat(builder.build().getPath()).isEqualTo("/nzbhydra2"); }
protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } UriComponentsBuilder getRequestBasedUriBuilder(); @JsonIgnore UriComponentsBuilder getLocalBaseUriBuilder(); }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } UriComponentsBuilder getRequestBasedUriBuilder(); @JsonIgnore UriComponentsBuilder getLocalBaseUriBuilder(); }
@Test public void shouldBuildCorrectlyForReverseProxySendingForwardedPort() { prepareConfig(false, false, "/nzbhydra2"); prepareHeaders("192.168.1.111", "192.168.1.111", null, "4001"); prepareServlet("192.168.1.111:4001", "192.168.1.111", 80, "http", "/nzbhydra2"); UriComponentsBuilder builder = testee.buildLocalBaseUriBuilder(requestMock); assertThat(builder.build().getScheme()).isEqualTo("http"); assertThat(builder.build().getHost()).isEqualTo("192.168.1.111"); assertThat(builder.build().getPort()).isEqualTo(4001); assertThat(builder.build().getPath()).isEqualTo("/nzbhydra2"); }
protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } UriComponentsBuilder getRequestBasedUriBuilder(); @JsonIgnore UriComponentsBuilder getLocalBaseUriBuilder(); }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } UriComponentsBuilder getRequestBasedUriBuilder(); @JsonIgnore UriComponentsBuilder getLocalBaseUriBuilder(); }
@Test public void shouldBuildCorrectlyForReverseProxyWithHttpsAccessedViaLocalhost() { prepareConfig(false, false, "/nzbhydra2"); prepareHeaders("127.0.0.1:4001", "127.0.0.1:4001", "https", null); prepareServlet("http: UriComponentsBuilder builder = testee.buildLocalBaseUriBuilder(requestMock); assertThat(builder.build().getScheme()).isEqualTo("https"); assertThat(builder.build().getHost()).isEqualTo("127.0.0.1"); assertThat(builder.build().getPort()).isEqualTo(4001); assertThat(builder.build().getPath()).isEqualTo("/nzbhydra2"); }
protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } UriComponentsBuilder getRequestBasedUriBuilder(); @JsonIgnore UriComponentsBuilder getLocalBaseUriBuilder(); }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } UriComponentsBuilder getRequestBasedUriBuilder(); @JsonIgnore UriComponentsBuilder getLocalBaseUriBuilder(); }
@Test public void shouldBuildCorrectlyForReverseProxyWithHttpsAccessedViaNetworkAddress() { prepareConfig(false, false, "/nzbhydra2"); prepareHeaders("192.168.1.111:4001", "192.168.1.111:4001", "https", null); prepareServlet("192.168.1.111:4001", "192.168.1.111", 80, "http", "/nzbhydra2"); UriComponentsBuilder builder = testee.buildLocalBaseUriBuilder(requestMock); assertThat(builder.build().getScheme()).isEqualTo("https"); assertThat(builder.build().getHost()).isEqualTo("192.168.1.111"); assertThat(builder.build().getPort()).isEqualTo(4001); assertThat(builder.build().getPath()).isEqualTo("/nzbhydra2"); }
protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } UriComponentsBuilder getRequestBasedUriBuilder(); @JsonIgnore UriComponentsBuilder getLocalBaseUriBuilder(); }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } UriComponentsBuilder getRequestBasedUriBuilder(); @JsonIgnore UriComponentsBuilder getLocalBaseUriBuilder(); }
@Test public void shouldFollowApiHitLimit() { indexerConfigMock.setHitLimit(1); when(queryMock.getResultList()).thenReturn(Arrays.asList(Timestamp.from(Instant.now().minus(10, ChronoUnit.MILLIS)))); boolean result = testee.checkIndexerHitLimit(indexer); assertFalse(result); verify(entityManagerMock).createNativeQuery(anyString()); }
protected boolean checkIndexerHitLimit(Indexer indexer) { Stopwatch stopwatch = Stopwatch.createStarted(); IndexerConfig indexerConfig = indexer.getConfig(); if (!indexerConfig.getHitLimit().isPresent() && !indexerConfig.getDownloadLimit().isPresent()) { return true; } LocalDateTime comparisonTime; LocalDateTime now = LocalDateTime.now(clock); if (indexerConfig.getHitLimitResetTime().isPresent()) { comparisonTime = now.with(ChronoField.HOUR_OF_DAY, indexerConfig.getHitLimitResetTime().get()); if (comparisonTime.isAfter(now)) { comparisonTime = comparisonTime.minus(1, ChronoUnit.DAYS); } } else { comparisonTime = now.minus(1, ChronoUnit.DAYS); } if (indexerConfig.getHitLimit().isPresent()) { boolean limitExceeded = checkIfHitLimitIsExceeded(indexer, indexerConfig, comparisonTime, IndexerApiAccessType.SEARCH, indexerConfig.getHitLimit().get(), "API hit"); if (limitExceeded) { return false; } } if (indexerConfig.getDownloadLimit().isPresent()) { boolean limitExceeded = checkIfHitLimitIsExceeded(indexer, indexerConfig, comparisonTime, IndexerApiAccessType.NZB, indexerConfig.getDownloadLimit().get(), "download"); if (limitExceeded) { return false; } } logger.debug(LoggingMarkers.PERFORMANCE, "Detection that hit limits were not reached for indexer {} took {}ms", indexer.getName(), stopwatch.elapsed(TimeUnit.MILLISECONDS)); return true; }
IndexerForSearchSelector { protected boolean checkIndexerHitLimit(Indexer indexer) { Stopwatch stopwatch = Stopwatch.createStarted(); IndexerConfig indexerConfig = indexer.getConfig(); if (!indexerConfig.getHitLimit().isPresent() && !indexerConfig.getDownloadLimit().isPresent()) { return true; } LocalDateTime comparisonTime; LocalDateTime now = LocalDateTime.now(clock); if (indexerConfig.getHitLimitResetTime().isPresent()) { comparisonTime = now.with(ChronoField.HOUR_OF_DAY, indexerConfig.getHitLimitResetTime().get()); if (comparisonTime.isAfter(now)) { comparisonTime = comparisonTime.minus(1, ChronoUnit.DAYS); } } else { comparisonTime = now.minus(1, ChronoUnit.DAYS); } if (indexerConfig.getHitLimit().isPresent()) { boolean limitExceeded = checkIfHitLimitIsExceeded(indexer, indexerConfig, comparisonTime, IndexerApiAccessType.SEARCH, indexerConfig.getHitLimit().get(), "API hit"); if (limitExceeded) { return false; } } if (indexerConfig.getDownloadLimit().isPresent()) { boolean limitExceeded = checkIfHitLimitIsExceeded(indexer, indexerConfig, comparisonTime, IndexerApiAccessType.NZB, indexerConfig.getDownloadLimit().get(), "download"); if (limitExceeded) { return false; } } logger.debug(LoggingMarkers.PERFORMANCE, "Detection that hit limits were not reached for indexer {} took {}ms", indexer.getName(), stopwatch.elapsed(TimeUnit.MILLISECONDS)); return true; } }
IndexerForSearchSelector { protected boolean checkIndexerHitLimit(Indexer indexer) { Stopwatch stopwatch = Stopwatch.createStarted(); IndexerConfig indexerConfig = indexer.getConfig(); if (!indexerConfig.getHitLimit().isPresent() && !indexerConfig.getDownloadLimit().isPresent()) { return true; } LocalDateTime comparisonTime; LocalDateTime now = LocalDateTime.now(clock); if (indexerConfig.getHitLimitResetTime().isPresent()) { comparisonTime = now.with(ChronoField.HOUR_OF_DAY, indexerConfig.getHitLimitResetTime().get()); if (comparisonTime.isAfter(now)) { comparisonTime = comparisonTime.minus(1, ChronoUnit.DAYS); } } else { comparisonTime = now.minus(1, ChronoUnit.DAYS); } if (indexerConfig.getHitLimit().isPresent()) { boolean limitExceeded = checkIfHitLimitIsExceeded(indexer, indexerConfig, comparisonTime, IndexerApiAccessType.SEARCH, indexerConfig.getHitLimit().get(), "API hit"); if (limitExceeded) { return false; } } if (indexerConfig.getDownloadLimit().isPresent()) { boolean limitExceeded = checkIfHitLimitIsExceeded(indexer, indexerConfig, comparisonTime, IndexerApiAccessType.NZB, indexerConfig.getDownloadLimit().get(), "download"); if (limitExceeded) { return false; } } logger.debug(LoggingMarkers.PERFORMANCE, "Detection that hit limits were not reached for indexer {} took {}ms", indexer.getName(), stopwatch.elapsed(TimeUnit.MILLISECONDS)); return true; } }
IndexerForSearchSelector { protected boolean checkIndexerHitLimit(Indexer indexer) { Stopwatch stopwatch = Stopwatch.createStarted(); IndexerConfig indexerConfig = indexer.getConfig(); if (!indexerConfig.getHitLimit().isPresent() && !indexerConfig.getDownloadLimit().isPresent()) { return true; } LocalDateTime comparisonTime; LocalDateTime now = LocalDateTime.now(clock); if (indexerConfig.getHitLimitResetTime().isPresent()) { comparisonTime = now.with(ChronoField.HOUR_OF_DAY, indexerConfig.getHitLimitResetTime().get()); if (comparisonTime.isAfter(now)) { comparisonTime = comparisonTime.minus(1, ChronoUnit.DAYS); } } else { comparisonTime = now.minus(1, ChronoUnit.DAYS); } if (indexerConfig.getHitLimit().isPresent()) { boolean limitExceeded = checkIfHitLimitIsExceeded(indexer, indexerConfig, comparisonTime, IndexerApiAccessType.SEARCH, indexerConfig.getHitLimit().get(), "API hit"); if (limitExceeded) { return false; } } if (indexerConfig.getDownloadLimit().isPresent()) { boolean limitExceeded = checkIfHitLimitIsExceeded(indexer, indexerConfig, comparisonTime, IndexerApiAccessType.NZB, indexerConfig.getDownloadLimit().get(), "download"); if (limitExceeded) { return false; } } logger.debug(LoggingMarkers.PERFORMANCE, "Detection that hit limits were not reached for indexer {} took {}ms", indexer.getName(), stopwatch.elapsed(TimeUnit.MILLISECONDS)); return true; } IndexerForSearchSelection pickIndexers(SearchRequest searchRequest); }
IndexerForSearchSelector { protected boolean checkIndexerHitLimit(Indexer indexer) { Stopwatch stopwatch = Stopwatch.createStarted(); IndexerConfig indexerConfig = indexer.getConfig(); if (!indexerConfig.getHitLimit().isPresent() && !indexerConfig.getDownloadLimit().isPresent()) { return true; } LocalDateTime comparisonTime; LocalDateTime now = LocalDateTime.now(clock); if (indexerConfig.getHitLimitResetTime().isPresent()) { comparisonTime = now.with(ChronoField.HOUR_OF_DAY, indexerConfig.getHitLimitResetTime().get()); if (comparisonTime.isAfter(now)) { comparisonTime = comparisonTime.minus(1, ChronoUnit.DAYS); } } else { comparisonTime = now.minus(1, ChronoUnit.DAYS); } if (indexerConfig.getHitLimit().isPresent()) { boolean limitExceeded = checkIfHitLimitIsExceeded(indexer, indexerConfig, comparisonTime, IndexerApiAccessType.SEARCH, indexerConfig.getHitLimit().get(), "API hit"); if (limitExceeded) { return false; } } if (indexerConfig.getDownloadLimit().isPresent()) { boolean limitExceeded = checkIfHitLimitIsExceeded(indexer, indexerConfig, comparisonTime, IndexerApiAccessType.NZB, indexerConfig.getDownloadLimit().get(), "download"); if (limitExceeded) { return false; } } logger.debug(LoggingMarkers.PERFORMANCE, "Detection that hit limits were not reached for indexer {} took {}ms", indexer.getName(), stopwatch.elapsed(TimeUnit.MILLISECONDS)); return true; } IndexerForSearchSelection pickIndexers(SearchRequest searchRequest); static final Pattern SCHEDULER_PATTERN; }
@Test public void shouldBuildCorrectlyForReverseProxyWithHttpsOnPort443() { prepareConfig(false, false, "/nzbhydra2"); prepareHeaders("localhost", "localhost", "https", null); prepareServlet("localhost", "localhost", 443, "http", "/nzbhydra2"); UriComponentsBuilder builder = testee.buildLocalBaseUriBuilder(requestMock); assertThat(builder.build().getScheme()).isEqualTo("https"); assertThat(builder.build().getHost()).isEqualTo("localhost"); assertThat(builder.build().getPort()).isEqualTo(-1); assertThat(builder.build().getPath()).isEqualTo("/nzbhydra2"); }
protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } UriComponentsBuilder getRequestBasedUriBuilder(); @JsonIgnore UriComponentsBuilder getLocalBaseUriBuilder(); }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } UriComponentsBuilder getRequestBasedUriBuilder(); @JsonIgnore UriComponentsBuilder getLocalBaseUriBuilder(); }
@Test public void shouldBuildCorrectlyForReverseProxyWithHttpOnPort80AndNoPath() { prepareConfig(false, false, "/"); prepareHeaders("localhost", "localhost", "http", null); prepareServlet("localhost", "localhost", 80, "http", "/"); UriComponentsBuilder builder = testee.buildLocalBaseUriBuilder(requestMock); assertThat(builder.build().getScheme()).isEqualTo("http"); assertThat(builder.build().getHost()).isEqualTo("localhost"); assertThat(builder.build().getPort()).isEqualTo(-1); assertThat(builder.build().getPath()).isEqualTo("/"); }
protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } UriComponentsBuilder getRequestBasedUriBuilder(); @JsonIgnore UriComponentsBuilder getLocalBaseUriBuilder(); }
UrlCalculator { protected UriComponentsBuilder buildLocalBaseUriBuilder(HttpServletRequest request) { String scheme; String host; int port = -1; String path; if (request.isSecure()) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because request is deemed secure"); scheme = "https"; } else if (Boolean.parseBoolean(environment.getProperty("server.ssl.enabled"))) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTPS because header x-forwarded-proto is not set and built-in SSL is enabled"); scheme = "https"; } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using scheme HTTP because header x-forwarded-proto is not set and built-in SSL is disabled"); scheme = "http"; } String hostHeader = request.getHeader("host"); if (hostHeader == null) { host = request.getServerName(); logger.warn("Header host not set. Using {}. Please change your reverse proxy configuration. See https: } else { String[] split = hostHeader.split(":"); host = split[0]; if (split.length > 1) { port = Integer.parseInt(split[1]); logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} and port {} from host header {}", host, port, hostHeader); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Using host {} from host header", hostHeader); } } if (port == -1) { port = request.getServerPort(); logger.debug(LoggingMarkers.URL_CALCULATION, "Using port {} ", port); } path = request.getContextPath(); if (!Strings.isNullOrEmpty(path)) { logger.debug(LoggingMarkers.URL_CALCULATION, "Using context path {} as path", path); } else { logger.debug(LoggingMarkers.URL_CALCULATION, "Not using any context path"); } return UriComponentsBuilder.newInstance() .scheme(scheme) .host(host) .port(port) .path(path); } UriComponentsBuilder getRequestBasedUriBuilder(); @JsonIgnore UriComponentsBuilder getLocalBaseUriBuilder(); }
@Test public void canConvert() throws Exception { for (MediaIdType type : Arrays.asList(MediaIdType.IMDB, MediaIdType.TMDB, MediaIdType.MOVIETITLE)) { for (MediaIdType type2 : Arrays.asList(MediaIdType.IMDB, MediaIdType.TMDB, MediaIdType.MOVIETITLE)) { assertTrue(testee.canConvert(type, type2)); } } for (MediaIdType type : Arrays.asList(MediaIdType.TVMAZE, MediaIdType.TVDB, MediaIdType.TVRAGE, MediaIdType.TVTITLE, MediaIdType.TVIMDB)) { for (MediaIdType type2 : Arrays.asList(MediaIdType.TVMAZE, MediaIdType.TVDB, MediaIdType.TVRAGE, MediaIdType.TVTITLE, MediaIdType.TVIMDB)) { assertTrue("Should be able to convert " + type + " to " + type2, testee.canConvert(type, type2)); } } }
public boolean canConvert(MediaIdType from, MediaIdType to) { return canConvertMap.get(from).contains(to); }
InfoProvider { public boolean canConvert(MediaIdType from, MediaIdType to) { return canConvertMap.get(from).contains(to); } }
InfoProvider { public boolean canConvert(MediaIdType from, MediaIdType to) { return canConvertMap.get(from).contains(to); } }
InfoProvider { public boolean canConvert(MediaIdType from, MediaIdType to) { return canConvertMap.get(from).contains(to); } boolean canConvert(MediaIdType from, MediaIdType to); static Set<MediaIdType> getConvertibleFrom(MediaIdType from); boolean canConvertAny(Set<MediaIdType> from, Set<MediaIdType> to); MediaInfo convert(Map<MediaIdType, String> identifiers); @Cacheable(cacheNames = "infos", sync = true) //sync=true is currently apparently not supported by Caffeine. synchronizing by method is good enough because we'll likely rarely hit this method concurrently with different parameters synchronized MediaInfo convert(String value, MediaIdType fromType); TvInfo findTvInfoInDatabase(Map<MediaIdType, String> ids); MovieInfo findMovieInfoInDatabase(Map<MediaIdType, String> ids); @Cacheable(cacheNames = "titles", sync = true) List<MediaInfo> search(String title, MediaIdType titleType); }
InfoProvider { public boolean canConvert(MediaIdType from, MediaIdType to) { return canConvertMap.get(from).contains(to); } boolean canConvert(MediaIdType from, MediaIdType to); static Set<MediaIdType> getConvertibleFrom(MediaIdType from); boolean canConvertAny(Set<MediaIdType> from, Set<MediaIdType> to); MediaInfo convert(Map<MediaIdType, String> identifiers); @Cacheable(cacheNames = "infos", sync = true) //sync=true is currently apparently not supported by Caffeine. synchronizing by method is good enough because we'll likely rarely hit this method concurrently with different parameters synchronized MediaInfo convert(String value, MediaIdType fromType); TvInfo findTvInfoInDatabase(Map<MediaIdType, String> ids); MovieInfo findMovieInfoInDatabase(Map<MediaIdType, String> ids); @Cacheable(cacheNames = "titles", sync = true) List<MediaInfo> search(String title, MediaIdType titleType); static Set<MediaIdType> TV_ID_TYPES; static Set<MediaIdType> MOVIE_ID_TYPES; static Set<MediaIdType> REAL_ID_TYPES; }
@Test public void canConvertAny() throws Exception { assertTrue(testee.canConvertAny(Sets.newSet(MediaIdType.TVMAZE, MediaIdType.TVDB), Sets.newSet(MediaIdType.TVRAGE))); assertTrue(testee.canConvertAny(Sets.newSet(MediaIdType.TVMAZE, MediaIdType.TVDB), Sets.newSet(MediaIdType.TVMAZE))); assertTrue(testee.canConvertAny(Sets.newSet(MediaIdType.TVMAZE), Sets.newSet(MediaIdType.TVMAZE, MediaIdType.TVDB))); assertFalse(testee.canConvertAny(Sets.newSet(), Sets.newSet(MediaIdType.TVMAZE, MediaIdType.TVDB))); assertFalse(testee.canConvertAny(Sets.newSet(MediaIdType.TVMAZE, MediaIdType.TVDB), Sets.newSet())); assertFalse(testee.canConvertAny(Sets.newSet(MediaIdType.TVMAZE, MediaIdType.TVDB), Sets.newSet(MediaIdType.TMDB))); }
public boolean canConvertAny(Set<MediaIdType> from, Set<MediaIdType> to) { return from.stream().anyMatch(x -> canConvertMap.containsKey(x) && canConvertMap.get(x).stream().anyMatch(to::contains)); }
InfoProvider { public boolean canConvertAny(Set<MediaIdType> from, Set<MediaIdType> to) { return from.stream().anyMatch(x -> canConvertMap.containsKey(x) && canConvertMap.get(x).stream().anyMatch(to::contains)); } }
InfoProvider { public boolean canConvertAny(Set<MediaIdType> from, Set<MediaIdType> to) { return from.stream().anyMatch(x -> canConvertMap.containsKey(x) && canConvertMap.get(x).stream().anyMatch(to::contains)); } }
InfoProvider { public boolean canConvertAny(Set<MediaIdType> from, Set<MediaIdType> to) { return from.stream().anyMatch(x -> canConvertMap.containsKey(x) && canConvertMap.get(x).stream().anyMatch(to::contains)); } boolean canConvert(MediaIdType from, MediaIdType to); static Set<MediaIdType> getConvertibleFrom(MediaIdType from); boolean canConvertAny(Set<MediaIdType> from, Set<MediaIdType> to); MediaInfo convert(Map<MediaIdType, String> identifiers); @Cacheable(cacheNames = "infos", sync = true) //sync=true is currently apparently not supported by Caffeine. synchronizing by method is good enough because we'll likely rarely hit this method concurrently with different parameters synchronized MediaInfo convert(String value, MediaIdType fromType); TvInfo findTvInfoInDatabase(Map<MediaIdType, String> ids); MovieInfo findMovieInfoInDatabase(Map<MediaIdType, String> ids); @Cacheable(cacheNames = "titles", sync = true) List<MediaInfo> search(String title, MediaIdType titleType); }
InfoProvider { public boolean canConvertAny(Set<MediaIdType> from, Set<MediaIdType> to) { return from.stream().anyMatch(x -> canConvertMap.containsKey(x) && canConvertMap.get(x).stream().anyMatch(to::contains)); } boolean canConvert(MediaIdType from, MediaIdType to); static Set<MediaIdType> getConvertibleFrom(MediaIdType from); boolean canConvertAny(Set<MediaIdType> from, Set<MediaIdType> to); MediaInfo convert(Map<MediaIdType, String> identifiers); @Cacheable(cacheNames = "infos", sync = true) //sync=true is currently apparently not supported by Caffeine. synchronizing by method is good enough because we'll likely rarely hit this method concurrently with different parameters synchronized MediaInfo convert(String value, MediaIdType fromType); TvInfo findTvInfoInDatabase(Map<MediaIdType, String> ids); MovieInfo findMovieInfoInDatabase(Map<MediaIdType, String> ids); @Cacheable(cacheNames = "titles", sync = true) List<MediaInfo> search(String title, MediaIdType titleType); static Set<MediaIdType> TV_ID_TYPES; static Set<MediaIdType> MOVIE_ID_TYPES; static Set<MediaIdType> REAL_ID_TYPES; }
@Test public void shouldCatchUnexpectedError() throws Exception { when(tvMazeHandlerMock.getInfos(anyString(), eq(MediaIdType.TVDB))).thenThrow(IllegalArgumentException.class); try { testee.convert("", MediaIdType.TVDB); fail("Should've failed"); } catch (Exception e) { assertEquals(InfoProviderException.class, e.getClass()); } }
public MediaInfo convert(Map<MediaIdType, String> identifiers) throws InfoProviderException { for (MediaIdType idType : REAL_ID_TYPES) { if (identifiers.containsKey(idType) && identifiers.get(idType) != null) { return convert(identifiers.get(idType), idType); } } throw new InfoProviderException("Unable to find any convertable IDs"); }
InfoProvider { public MediaInfo convert(Map<MediaIdType, String> identifiers) throws InfoProviderException { for (MediaIdType idType : REAL_ID_TYPES) { if (identifiers.containsKey(idType) && identifiers.get(idType) != null) { return convert(identifiers.get(idType), idType); } } throw new InfoProviderException("Unable to find any convertable IDs"); } }
InfoProvider { public MediaInfo convert(Map<MediaIdType, String> identifiers) throws InfoProviderException { for (MediaIdType idType : REAL_ID_TYPES) { if (identifiers.containsKey(idType) && identifiers.get(idType) != null) { return convert(identifiers.get(idType), idType); } } throw new InfoProviderException("Unable to find any convertable IDs"); } }
InfoProvider { public MediaInfo convert(Map<MediaIdType, String> identifiers) throws InfoProviderException { for (MediaIdType idType : REAL_ID_TYPES) { if (identifiers.containsKey(idType) && identifiers.get(idType) != null) { return convert(identifiers.get(idType), idType); } } throw new InfoProviderException("Unable to find any convertable IDs"); } boolean canConvert(MediaIdType from, MediaIdType to); static Set<MediaIdType> getConvertibleFrom(MediaIdType from); boolean canConvertAny(Set<MediaIdType> from, Set<MediaIdType> to); MediaInfo convert(Map<MediaIdType, String> identifiers); @Cacheable(cacheNames = "infos", sync = true) //sync=true is currently apparently not supported by Caffeine. synchronizing by method is good enough because we'll likely rarely hit this method concurrently with different parameters synchronized MediaInfo convert(String value, MediaIdType fromType); TvInfo findTvInfoInDatabase(Map<MediaIdType, String> ids); MovieInfo findMovieInfoInDatabase(Map<MediaIdType, String> ids); @Cacheable(cacheNames = "titles", sync = true) List<MediaInfo> search(String title, MediaIdType titleType); }
InfoProvider { public MediaInfo convert(Map<MediaIdType, String> identifiers) throws InfoProviderException { for (MediaIdType idType : REAL_ID_TYPES) { if (identifiers.containsKey(idType) && identifiers.get(idType) != null) { return convert(identifiers.get(idType), idType); } } throw new InfoProviderException("Unable to find any convertable IDs"); } boolean canConvert(MediaIdType from, MediaIdType to); static Set<MediaIdType> getConvertibleFrom(MediaIdType from); boolean canConvertAny(Set<MediaIdType> from, Set<MediaIdType> to); MediaInfo convert(Map<MediaIdType, String> identifiers); @Cacheable(cacheNames = "infos", sync = true) //sync=true is currently apparently not supported by Caffeine. synchronizing by method is good enough because we'll likely rarely hit this method concurrently with different parameters synchronized MediaInfo convert(String value, MediaIdType fromType); TvInfo findTvInfoInDatabase(Map<MediaIdType, String> ids); MovieInfo findMovieInfoInDatabase(Map<MediaIdType, String> ids); @Cacheable(cacheNames = "titles", sync = true) List<MediaInfo> search(String title, MediaIdType titleType); static Set<MediaIdType> TV_ID_TYPES; static Set<MediaIdType> MOVIE_ID_TYPES; static Set<MediaIdType> REAL_ID_TYPES; }
@Test public void shouldCallTvMaze() throws Exception { ArgumentCaptor<TvInfo> tvInfoArgumentCaptor = ArgumentCaptor.forClass(TvInfo.class); for (MediaIdType type : Arrays.asList(MediaIdType.TVMAZE, MediaIdType.TVDB, MediaIdType.TVRAGE, MediaIdType.TVTITLE, MediaIdType.TVIMDB)) { reset(tvMazeHandlerMock); when(tvMazeHandlerMock.getInfos(anyString(), any(MediaIdType.class))).thenReturn(new TvMazeSearchResult("tvmazeId", "tvrageId", "tvdbId", "imdbId", "title", 0, "posterUrl")); testee.convert("value", type); verify(tvMazeHandlerMock).getInfos("value", type); } verify(tvInfoRepositoryMock).findByTvdbId("value"); verify(tvInfoRepositoryMock).findByTvrageId("value"); verify(tvInfoRepositoryMock).findByTvmazeId("value"); verify(tvInfoRepositoryMock).findByImdbId("ttvalue"); verify(tvInfoRepositoryMock, times(5)).save(tvInfoArgumentCaptor.capture()); assertEquals(5, tvInfoArgumentCaptor.getAllValues().size()); assertEquals("title", tvInfoArgumentCaptor.getValue().getTitle()); assertEquals("tvdbId", tvInfoArgumentCaptor.getValue().getTvdbId().get()); assertEquals("tvmazeId", tvInfoArgumentCaptor.getValue().getTvmazeId().get()); assertEquals("tvrageId", tvInfoArgumentCaptor.getValue().getTvrageId().get()); assertEquals("ttimdbId", tvInfoArgumentCaptor.getValue().getImdbId().get()); assertEquals(Integer.valueOf(0), tvInfoArgumentCaptor.getValue().getYear()); }
public MediaInfo convert(Map<MediaIdType, String> identifiers) throws InfoProviderException { for (MediaIdType idType : REAL_ID_TYPES) { if (identifiers.containsKey(idType) && identifiers.get(idType) != null) { return convert(identifiers.get(idType), idType); } } throw new InfoProviderException("Unable to find any convertable IDs"); }
InfoProvider { public MediaInfo convert(Map<MediaIdType, String> identifiers) throws InfoProviderException { for (MediaIdType idType : REAL_ID_TYPES) { if (identifiers.containsKey(idType) && identifiers.get(idType) != null) { return convert(identifiers.get(idType), idType); } } throw new InfoProviderException("Unable to find any convertable IDs"); } }
InfoProvider { public MediaInfo convert(Map<MediaIdType, String> identifiers) throws InfoProviderException { for (MediaIdType idType : REAL_ID_TYPES) { if (identifiers.containsKey(idType) && identifiers.get(idType) != null) { return convert(identifiers.get(idType), idType); } } throw new InfoProviderException("Unable to find any convertable IDs"); } }
InfoProvider { public MediaInfo convert(Map<MediaIdType, String> identifiers) throws InfoProviderException { for (MediaIdType idType : REAL_ID_TYPES) { if (identifiers.containsKey(idType) && identifiers.get(idType) != null) { return convert(identifiers.get(idType), idType); } } throw new InfoProviderException("Unable to find any convertable IDs"); } boolean canConvert(MediaIdType from, MediaIdType to); static Set<MediaIdType> getConvertibleFrom(MediaIdType from); boolean canConvertAny(Set<MediaIdType> from, Set<MediaIdType> to); MediaInfo convert(Map<MediaIdType, String> identifiers); @Cacheable(cacheNames = "infos", sync = true) //sync=true is currently apparently not supported by Caffeine. synchronizing by method is good enough because we'll likely rarely hit this method concurrently with different parameters synchronized MediaInfo convert(String value, MediaIdType fromType); TvInfo findTvInfoInDatabase(Map<MediaIdType, String> ids); MovieInfo findMovieInfoInDatabase(Map<MediaIdType, String> ids); @Cacheable(cacheNames = "titles", sync = true) List<MediaInfo> search(String title, MediaIdType titleType); }
InfoProvider { public MediaInfo convert(Map<MediaIdType, String> identifiers) throws InfoProviderException { for (MediaIdType idType : REAL_ID_TYPES) { if (identifiers.containsKey(idType) && identifiers.get(idType) != null) { return convert(identifiers.get(idType), idType); } } throw new InfoProviderException("Unable to find any convertable IDs"); } boolean canConvert(MediaIdType from, MediaIdType to); static Set<MediaIdType> getConvertibleFrom(MediaIdType from); boolean canConvertAny(Set<MediaIdType> from, Set<MediaIdType> to); MediaInfo convert(Map<MediaIdType, String> identifiers); @Cacheable(cacheNames = "infos", sync = true) //sync=true is currently apparently not supported by Caffeine. synchronizing by method is good enough because we'll likely rarely hit this method concurrently with different parameters synchronized MediaInfo convert(String value, MediaIdType fromType); TvInfo findTvInfoInDatabase(Map<MediaIdType, String> ids); MovieInfo findMovieInfoInDatabase(Map<MediaIdType, String> ids); @Cacheable(cacheNames = "titles", sync = true) List<MediaInfo> search(String title, MediaIdType titleType); static Set<MediaIdType> TV_ID_TYPES; static Set<MediaIdType> MOVIE_ID_TYPES; static Set<MediaIdType> REAL_ID_TYPES; }
@Test public void shouldSearch() throws Exception { testee.search("title", MediaIdType.TVTITLE); verify(tvMazeHandlerMock).search("title"); testee.search("title", MediaIdType.MOVIETITLE); verify(tmdbHandlerMock).search("title", null); }
@Cacheable(cacheNames = "titles", sync = true) public List<MediaInfo> search(String title, MediaIdType titleType) throws InfoProviderException { try { List<MediaInfo> infos; switch (titleType) { case TVTITLE: { List<TvMazeSearchResult> results = tvMazeHandler.search(title); infos = results.stream().map(MediaInfo::new).collect(Collectors.toList()); for (MediaInfo mediaInfo : infos) { TvInfo tvInfo = new TvInfo(mediaInfo); if (tvInfoRepository.findByTvrageIdOrTvmazeIdOrTvdbIdOrImdbId(tvInfo.getTvrageId().orElse("-1"), tvInfo.getTvmazeId().orElse("-1"), tvInfo.getTvdbId().orElse("-1"), tvInfo.getImdbId().orElse("-1")) == null) { tvInfoRepository.save(tvInfo); } } break; } case MOVIETITLE: { List<TmdbSearchResult> results = tmdbHandler.search(title, null); infos = results.stream().map(MediaInfo::new).collect(Collectors.toList()); break; } default: throw new IllegalArgumentException("Wrong IdType"); } return infos; } catch (Exception e) { logger.error("Error while searching for " + titleType + " " + title, e); Throwables.throwIfInstanceOf(e, InfoProviderException.class); throw new InfoProviderException("Unexpected error while converting infos", e); } }
InfoProvider { @Cacheable(cacheNames = "titles", sync = true) public List<MediaInfo> search(String title, MediaIdType titleType) throws InfoProviderException { try { List<MediaInfo> infos; switch (titleType) { case TVTITLE: { List<TvMazeSearchResult> results = tvMazeHandler.search(title); infos = results.stream().map(MediaInfo::new).collect(Collectors.toList()); for (MediaInfo mediaInfo : infos) { TvInfo tvInfo = new TvInfo(mediaInfo); if (tvInfoRepository.findByTvrageIdOrTvmazeIdOrTvdbIdOrImdbId(tvInfo.getTvrageId().orElse("-1"), tvInfo.getTvmazeId().orElse("-1"), tvInfo.getTvdbId().orElse("-1"), tvInfo.getImdbId().orElse("-1")) == null) { tvInfoRepository.save(tvInfo); } } break; } case MOVIETITLE: { List<TmdbSearchResult> results = tmdbHandler.search(title, null); infos = results.stream().map(MediaInfo::new).collect(Collectors.toList()); break; } default: throw new IllegalArgumentException("Wrong IdType"); } return infos; } catch (Exception e) { logger.error("Error while searching for " + titleType + " " + title, e); Throwables.throwIfInstanceOf(e, InfoProviderException.class); throw new InfoProviderException("Unexpected error while converting infos", e); } } }
InfoProvider { @Cacheable(cacheNames = "titles", sync = true) public List<MediaInfo> search(String title, MediaIdType titleType) throws InfoProviderException { try { List<MediaInfo> infos; switch (titleType) { case TVTITLE: { List<TvMazeSearchResult> results = tvMazeHandler.search(title); infos = results.stream().map(MediaInfo::new).collect(Collectors.toList()); for (MediaInfo mediaInfo : infos) { TvInfo tvInfo = new TvInfo(mediaInfo); if (tvInfoRepository.findByTvrageIdOrTvmazeIdOrTvdbIdOrImdbId(tvInfo.getTvrageId().orElse("-1"), tvInfo.getTvmazeId().orElse("-1"), tvInfo.getTvdbId().orElse("-1"), tvInfo.getImdbId().orElse("-1")) == null) { tvInfoRepository.save(tvInfo); } } break; } case MOVIETITLE: { List<TmdbSearchResult> results = tmdbHandler.search(title, null); infos = results.stream().map(MediaInfo::new).collect(Collectors.toList()); break; } default: throw new IllegalArgumentException("Wrong IdType"); } return infos; } catch (Exception e) { logger.error("Error while searching for " + titleType + " " + title, e); Throwables.throwIfInstanceOf(e, InfoProviderException.class); throw new InfoProviderException("Unexpected error while converting infos", e); } } }
InfoProvider { @Cacheable(cacheNames = "titles", sync = true) public List<MediaInfo> search(String title, MediaIdType titleType) throws InfoProviderException { try { List<MediaInfo> infos; switch (titleType) { case TVTITLE: { List<TvMazeSearchResult> results = tvMazeHandler.search(title); infos = results.stream().map(MediaInfo::new).collect(Collectors.toList()); for (MediaInfo mediaInfo : infos) { TvInfo tvInfo = new TvInfo(mediaInfo); if (tvInfoRepository.findByTvrageIdOrTvmazeIdOrTvdbIdOrImdbId(tvInfo.getTvrageId().orElse("-1"), tvInfo.getTvmazeId().orElse("-1"), tvInfo.getTvdbId().orElse("-1"), tvInfo.getImdbId().orElse("-1")) == null) { tvInfoRepository.save(tvInfo); } } break; } case MOVIETITLE: { List<TmdbSearchResult> results = tmdbHandler.search(title, null); infos = results.stream().map(MediaInfo::new).collect(Collectors.toList()); break; } default: throw new IllegalArgumentException("Wrong IdType"); } return infos; } catch (Exception e) { logger.error("Error while searching for " + titleType + " " + title, e); Throwables.throwIfInstanceOf(e, InfoProviderException.class); throw new InfoProviderException("Unexpected error while converting infos", e); } } boolean canConvert(MediaIdType from, MediaIdType to); static Set<MediaIdType> getConvertibleFrom(MediaIdType from); boolean canConvertAny(Set<MediaIdType> from, Set<MediaIdType> to); MediaInfo convert(Map<MediaIdType, String> identifiers); @Cacheable(cacheNames = "infos", sync = true) //sync=true is currently apparently not supported by Caffeine. synchronizing by method is good enough because we'll likely rarely hit this method concurrently with different parameters synchronized MediaInfo convert(String value, MediaIdType fromType); TvInfo findTvInfoInDatabase(Map<MediaIdType, String> ids); MovieInfo findMovieInfoInDatabase(Map<MediaIdType, String> ids); @Cacheable(cacheNames = "titles", sync = true) List<MediaInfo> search(String title, MediaIdType titleType); }
InfoProvider { @Cacheable(cacheNames = "titles", sync = true) public List<MediaInfo> search(String title, MediaIdType titleType) throws InfoProviderException { try { List<MediaInfo> infos; switch (titleType) { case TVTITLE: { List<TvMazeSearchResult> results = tvMazeHandler.search(title); infos = results.stream().map(MediaInfo::new).collect(Collectors.toList()); for (MediaInfo mediaInfo : infos) { TvInfo tvInfo = new TvInfo(mediaInfo); if (tvInfoRepository.findByTvrageIdOrTvmazeIdOrTvdbIdOrImdbId(tvInfo.getTvrageId().orElse("-1"), tvInfo.getTvmazeId().orElse("-1"), tvInfo.getTvdbId().orElse("-1"), tvInfo.getImdbId().orElse("-1")) == null) { tvInfoRepository.save(tvInfo); } } break; } case MOVIETITLE: { List<TmdbSearchResult> results = tmdbHandler.search(title, null); infos = results.stream().map(MediaInfo::new).collect(Collectors.toList()); break; } default: throw new IllegalArgumentException("Wrong IdType"); } return infos; } catch (Exception e) { logger.error("Error while searching for " + titleType + " " + title, e); Throwables.throwIfInstanceOf(e, InfoProviderException.class); throw new InfoProviderException("Unexpected error while converting infos", e); } } boolean canConvert(MediaIdType from, MediaIdType to); static Set<MediaIdType> getConvertibleFrom(MediaIdType from); boolean canConvertAny(Set<MediaIdType> from, Set<MediaIdType> to); MediaInfo convert(Map<MediaIdType, String> identifiers); @Cacheable(cacheNames = "infos", sync = true) //sync=true is currently apparently not supported by Caffeine. synchronizing by method is good enough because we'll likely rarely hit this method concurrently with different parameters synchronized MediaInfo convert(String value, MediaIdType fromType); TvInfo findTvInfoInDatabase(Map<MediaIdType, String> ids); MovieInfo findMovieInfoInDatabase(Map<MediaIdType, String> ids); @Cacheable(cacheNames = "titles", sync = true) List<MediaInfo> search(String title, MediaIdType titleType); static Set<MediaIdType> TV_ID_TYPES; static Set<MediaIdType> MOVIE_ID_TYPES; static Set<MediaIdType> REAL_ID_TYPES; }
@Test public void shouldGetInfoWithMostIds() { TvInfo mostInfo = new TvInfo("abc", "abc", "abc", null, null, null, null); when(tvInfoRepositoryMock.findByTvrageIdOrTvmazeIdOrTvdbIdOrImdbId(anyString(), anyString(), anyString(), anyString())).thenReturn(Arrays.asList( mostInfo, new TvInfo("abc", "abc", null, null, null, null, null), new TvInfo("abc", null, null, null, null, null, null) )); TvInfo info = testee.findTvInfoInDatabase(new HashMap<>()); assertEquals(mostInfo, info); }
public TvInfo findTvInfoInDatabase(Map<MediaIdType, String> ids) { Collection<TvInfo> matchingInfos = tvInfoRepository.findByTvrageIdOrTvmazeIdOrTvdbIdOrImdbId(ids.getOrDefault(TVRAGE, "-1"), ids.getOrDefault(TVMAZE, "-1"), ids.getOrDefault(TVDB, "-1"), ids.getOrDefault(IMDB, "-1")); return matchingInfos.stream().max(TvInfo::compareTo).orElse(null); }
InfoProvider { public TvInfo findTvInfoInDatabase(Map<MediaIdType, String> ids) { Collection<TvInfo> matchingInfos = tvInfoRepository.findByTvrageIdOrTvmazeIdOrTvdbIdOrImdbId(ids.getOrDefault(TVRAGE, "-1"), ids.getOrDefault(TVMAZE, "-1"), ids.getOrDefault(TVDB, "-1"), ids.getOrDefault(IMDB, "-1")); return matchingInfos.stream().max(TvInfo::compareTo).orElse(null); } }
InfoProvider { public TvInfo findTvInfoInDatabase(Map<MediaIdType, String> ids) { Collection<TvInfo> matchingInfos = tvInfoRepository.findByTvrageIdOrTvmazeIdOrTvdbIdOrImdbId(ids.getOrDefault(TVRAGE, "-1"), ids.getOrDefault(TVMAZE, "-1"), ids.getOrDefault(TVDB, "-1"), ids.getOrDefault(IMDB, "-1")); return matchingInfos.stream().max(TvInfo::compareTo).orElse(null); } }
InfoProvider { public TvInfo findTvInfoInDatabase(Map<MediaIdType, String> ids) { Collection<TvInfo> matchingInfos = tvInfoRepository.findByTvrageIdOrTvmazeIdOrTvdbIdOrImdbId(ids.getOrDefault(TVRAGE, "-1"), ids.getOrDefault(TVMAZE, "-1"), ids.getOrDefault(TVDB, "-1"), ids.getOrDefault(IMDB, "-1")); return matchingInfos.stream().max(TvInfo::compareTo).orElse(null); } boolean canConvert(MediaIdType from, MediaIdType to); static Set<MediaIdType> getConvertibleFrom(MediaIdType from); boolean canConvertAny(Set<MediaIdType> from, Set<MediaIdType> to); MediaInfo convert(Map<MediaIdType, String> identifiers); @Cacheable(cacheNames = "infos", sync = true) //sync=true is currently apparently not supported by Caffeine. synchronizing by method is good enough because we'll likely rarely hit this method concurrently with different parameters synchronized MediaInfo convert(String value, MediaIdType fromType); TvInfo findTvInfoInDatabase(Map<MediaIdType, String> ids); MovieInfo findMovieInfoInDatabase(Map<MediaIdType, String> ids); @Cacheable(cacheNames = "titles", sync = true) List<MediaInfo> search(String title, MediaIdType titleType); }
InfoProvider { public TvInfo findTvInfoInDatabase(Map<MediaIdType, String> ids) { Collection<TvInfo> matchingInfos = tvInfoRepository.findByTvrageIdOrTvmazeIdOrTvdbIdOrImdbId(ids.getOrDefault(TVRAGE, "-1"), ids.getOrDefault(TVMAZE, "-1"), ids.getOrDefault(TVDB, "-1"), ids.getOrDefault(IMDB, "-1")); return matchingInfos.stream().max(TvInfo::compareTo).orElse(null); } boolean canConvert(MediaIdType from, MediaIdType to); static Set<MediaIdType> getConvertibleFrom(MediaIdType from); boolean canConvertAny(Set<MediaIdType> from, Set<MediaIdType> to); MediaInfo convert(Map<MediaIdType, String> identifiers); @Cacheable(cacheNames = "infos", sync = true) //sync=true is currently apparently not supported by Caffeine. synchronizing by method is good enough because we'll likely rarely hit this method concurrently with different parameters synchronized MediaInfo convert(String value, MediaIdType fromType); TvInfo findTvInfoInDatabase(Map<MediaIdType, String> ids); MovieInfo findMovieInfoInDatabase(Map<MediaIdType, String> ids); @Cacheable(cacheNames = "titles", sync = true) List<MediaInfo> search(String title, MediaIdType titleType); static Set<MediaIdType> TV_ID_TYPES; static Set<MediaIdType> MOVIE_ID_TYPES; static Set<MediaIdType> REAL_ID_TYPES; }
@Test public void imdbToTmdb() throws Exception { TmdbSearchResult result = testee.getInfos("tt5895028", MediaIdType.IMDB); assertThat(result.getTmdbId(), is("407806")); assertThat(result.getTitle(), is("13th")); }
public TmdbSearchResult getInfos(String value, MediaIdType idType) throws InfoProviderException { if (idType == MediaIdType.MOVIETITLE) { return fromTitle(value, null); } if (idType == MediaIdType.IMDB) { return fromImdb(value); } if (idType == MediaIdType.TMDB) { return fromTmdb(value); } throw new IllegalArgumentException("Unable to get infos from " + idType); }
TmdbHandler { public TmdbSearchResult getInfos(String value, MediaIdType idType) throws InfoProviderException { if (idType == MediaIdType.MOVIETITLE) { return fromTitle(value, null); } if (idType == MediaIdType.IMDB) { return fromImdb(value); } if (idType == MediaIdType.TMDB) { return fromTmdb(value); } throw new IllegalArgumentException("Unable to get infos from " + idType); } }
TmdbHandler { public TmdbSearchResult getInfos(String value, MediaIdType idType) throws InfoProviderException { if (idType == MediaIdType.MOVIETITLE) { return fromTitle(value, null); } if (idType == MediaIdType.IMDB) { return fromImdb(value); } if (idType == MediaIdType.TMDB) { return fromTmdb(value); } throw new IllegalArgumentException("Unable to get infos from " + idType); } }
TmdbHandler { public TmdbSearchResult getInfos(String value, MediaIdType idType) throws InfoProviderException { if (idType == MediaIdType.MOVIETITLE) { return fromTitle(value, null); } if (idType == MediaIdType.IMDB) { return fromImdb(value); } if (idType == MediaIdType.TMDB) { return fromTmdb(value); } throw new IllegalArgumentException("Unable to get infos from " + idType); } TmdbSearchResult getInfos(String value, MediaIdType idType); List<TmdbSearchResult> search(String title, Integer year); }
TmdbHandler { public TmdbSearchResult getInfos(String value, MediaIdType idType) throws InfoProviderException { if (idType == MediaIdType.MOVIETITLE) { return fromTitle(value, null); } if (idType == MediaIdType.IMDB) { return fromImdb(value); } if (idType == MediaIdType.TMDB) { return fromTmdb(value); } throw new IllegalArgumentException("Unable to get infos from " + idType); } TmdbSearchResult getInfos(String value, MediaIdType idType); List<TmdbSearchResult> search(String title, Integer year); }
@Test public void tmdbToImdb() throws Exception { TmdbSearchResult result = testee.getInfos("407806", MediaIdType.TMDB); assertThat(result.getImdbId(), is("tt5895028")); assertThat(result.getTitle(), is("13th")); }
public TmdbSearchResult getInfos(String value, MediaIdType idType) throws InfoProviderException { if (idType == MediaIdType.MOVIETITLE) { return fromTitle(value, null); } if (idType == MediaIdType.IMDB) { return fromImdb(value); } if (idType == MediaIdType.TMDB) { return fromTmdb(value); } throw new IllegalArgumentException("Unable to get infos from " + idType); }
TmdbHandler { public TmdbSearchResult getInfos(String value, MediaIdType idType) throws InfoProviderException { if (idType == MediaIdType.MOVIETITLE) { return fromTitle(value, null); } if (idType == MediaIdType.IMDB) { return fromImdb(value); } if (idType == MediaIdType.TMDB) { return fromTmdb(value); } throw new IllegalArgumentException("Unable to get infos from " + idType); } }
TmdbHandler { public TmdbSearchResult getInfos(String value, MediaIdType idType) throws InfoProviderException { if (idType == MediaIdType.MOVIETITLE) { return fromTitle(value, null); } if (idType == MediaIdType.IMDB) { return fromImdb(value); } if (idType == MediaIdType.TMDB) { return fromTmdb(value); } throw new IllegalArgumentException("Unable to get infos from " + idType); } }
TmdbHandler { public TmdbSearchResult getInfos(String value, MediaIdType idType) throws InfoProviderException { if (idType == MediaIdType.MOVIETITLE) { return fromTitle(value, null); } if (idType == MediaIdType.IMDB) { return fromImdb(value); } if (idType == MediaIdType.TMDB) { return fromTmdb(value); } throw new IllegalArgumentException("Unable to get infos from " + idType); } TmdbSearchResult getInfos(String value, MediaIdType idType); List<TmdbSearchResult> search(String title, Integer year); }
TmdbHandler { public TmdbSearchResult getInfos(String value, MediaIdType idType) throws InfoProviderException { if (idType == MediaIdType.MOVIETITLE) { return fromTitle(value, null); } if (idType == MediaIdType.IMDB) { return fromImdb(value); } if (idType == MediaIdType.TMDB) { return fromTmdb(value); } throw new IllegalArgumentException("Unable to get infos from " + idType); } TmdbSearchResult getInfos(String value, MediaIdType idType); List<TmdbSearchResult> search(String title, Integer year); }
@Test public void shouldIgnoreDownloadLimitIfNotYetReached() { indexerConfigMock.setDownloadLimit(10); when(queryMock.getResultList()).thenReturn(Arrays.asList(Timestamp.from(Instant.now().minus(10, ChronoUnit.MILLIS)))); boolean result = testee.checkIndexerHitLimit(indexer); assertTrue(result); }
protected boolean checkIndexerHitLimit(Indexer indexer) { Stopwatch stopwatch = Stopwatch.createStarted(); IndexerConfig indexerConfig = indexer.getConfig(); if (!indexerConfig.getHitLimit().isPresent() && !indexerConfig.getDownloadLimit().isPresent()) { return true; } LocalDateTime comparisonTime; LocalDateTime now = LocalDateTime.now(clock); if (indexerConfig.getHitLimitResetTime().isPresent()) { comparisonTime = now.with(ChronoField.HOUR_OF_DAY, indexerConfig.getHitLimitResetTime().get()); if (comparisonTime.isAfter(now)) { comparisonTime = comparisonTime.minus(1, ChronoUnit.DAYS); } } else { comparisonTime = now.minus(1, ChronoUnit.DAYS); } if (indexerConfig.getHitLimit().isPresent()) { boolean limitExceeded = checkIfHitLimitIsExceeded(indexer, indexerConfig, comparisonTime, IndexerApiAccessType.SEARCH, indexerConfig.getHitLimit().get(), "API hit"); if (limitExceeded) { return false; } } if (indexerConfig.getDownloadLimit().isPresent()) { boolean limitExceeded = checkIfHitLimitIsExceeded(indexer, indexerConfig, comparisonTime, IndexerApiAccessType.NZB, indexerConfig.getDownloadLimit().get(), "download"); if (limitExceeded) { return false; } } logger.debug(LoggingMarkers.PERFORMANCE, "Detection that hit limits were not reached for indexer {} took {}ms", indexer.getName(), stopwatch.elapsed(TimeUnit.MILLISECONDS)); return true; }
IndexerForSearchSelector { protected boolean checkIndexerHitLimit(Indexer indexer) { Stopwatch stopwatch = Stopwatch.createStarted(); IndexerConfig indexerConfig = indexer.getConfig(); if (!indexerConfig.getHitLimit().isPresent() && !indexerConfig.getDownloadLimit().isPresent()) { return true; } LocalDateTime comparisonTime; LocalDateTime now = LocalDateTime.now(clock); if (indexerConfig.getHitLimitResetTime().isPresent()) { comparisonTime = now.with(ChronoField.HOUR_OF_DAY, indexerConfig.getHitLimitResetTime().get()); if (comparisonTime.isAfter(now)) { comparisonTime = comparisonTime.minus(1, ChronoUnit.DAYS); } } else { comparisonTime = now.minus(1, ChronoUnit.DAYS); } if (indexerConfig.getHitLimit().isPresent()) { boolean limitExceeded = checkIfHitLimitIsExceeded(indexer, indexerConfig, comparisonTime, IndexerApiAccessType.SEARCH, indexerConfig.getHitLimit().get(), "API hit"); if (limitExceeded) { return false; } } if (indexerConfig.getDownloadLimit().isPresent()) { boolean limitExceeded = checkIfHitLimitIsExceeded(indexer, indexerConfig, comparisonTime, IndexerApiAccessType.NZB, indexerConfig.getDownloadLimit().get(), "download"); if (limitExceeded) { return false; } } logger.debug(LoggingMarkers.PERFORMANCE, "Detection that hit limits were not reached for indexer {} took {}ms", indexer.getName(), stopwatch.elapsed(TimeUnit.MILLISECONDS)); return true; } }
IndexerForSearchSelector { protected boolean checkIndexerHitLimit(Indexer indexer) { Stopwatch stopwatch = Stopwatch.createStarted(); IndexerConfig indexerConfig = indexer.getConfig(); if (!indexerConfig.getHitLimit().isPresent() && !indexerConfig.getDownloadLimit().isPresent()) { return true; } LocalDateTime comparisonTime; LocalDateTime now = LocalDateTime.now(clock); if (indexerConfig.getHitLimitResetTime().isPresent()) { comparisonTime = now.with(ChronoField.HOUR_OF_DAY, indexerConfig.getHitLimitResetTime().get()); if (comparisonTime.isAfter(now)) { comparisonTime = comparisonTime.minus(1, ChronoUnit.DAYS); } } else { comparisonTime = now.minus(1, ChronoUnit.DAYS); } if (indexerConfig.getHitLimit().isPresent()) { boolean limitExceeded = checkIfHitLimitIsExceeded(indexer, indexerConfig, comparisonTime, IndexerApiAccessType.SEARCH, indexerConfig.getHitLimit().get(), "API hit"); if (limitExceeded) { return false; } } if (indexerConfig.getDownloadLimit().isPresent()) { boolean limitExceeded = checkIfHitLimitIsExceeded(indexer, indexerConfig, comparisonTime, IndexerApiAccessType.NZB, indexerConfig.getDownloadLimit().get(), "download"); if (limitExceeded) { return false; } } logger.debug(LoggingMarkers.PERFORMANCE, "Detection that hit limits were not reached for indexer {} took {}ms", indexer.getName(), stopwatch.elapsed(TimeUnit.MILLISECONDS)); return true; } }
IndexerForSearchSelector { protected boolean checkIndexerHitLimit(Indexer indexer) { Stopwatch stopwatch = Stopwatch.createStarted(); IndexerConfig indexerConfig = indexer.getConfig(); if (!indexerConfig.getHitLimit().isPresent() && !indexerConfig.getDownloadLimit().isPresent()) { return true; } LocalDateTime comparisonTime; LocalDateTime now = LocalDateTime.now(clock); if (indexerConfig.getHitLimitResetTime().isPresent()) { comparisonTime = now.with(ChronoField.HOUR_OF_DAY, indexerConfig.getHitLimitResetTime().get()); if (comparisonTime.isAfter(now)) { comparisonTime = comparisonTime.minus(1, ChronoUnit.DAYS); } } else { comparisonTime = now.minus(1, ChronoUnit.DAYS); } if (indexerConfig.getHitLimit().isPresent()) { boolean limitExceeded = checkIfHitLimitIsExceeded(indexer, indexerConfig, comparisonTime, IndexerApiAccessType.SEARCH, indexerConfig.getHitLimit().get(), "API hit"); if (limitExceeded) { return false; } } if (indexerConfig.getDownloadLimit().isPresent()) { boolean limitExceeded = checkIfHitLimitIsExceeded(indexer, indexerConfig, comparisonTime, IndexerApiAccessType.NZB, indexerConfig.getDownloadLimit().get(), "download"); if (limitExceeded) { return false; } } logger.debug(LoggingMarkers.PERFORMANCE, "Detection that hit limits were not reached for indexer {} took {}ms", indexer.getName(), stopwatch.elapsed(TimeUnit.MILLISECONDS)); return true; } IndexerForSearchSelection pickIndexers(SearchRequest searchRequest); }
IndexerForSearchSelector { protected boolean checkIndexerHitLimit(Indexer indexer) { Stopwatch stopwatch = Stopwatch.createStarted(); IndexerConfig indexerConfig = indexer.getConfig(); if (!indexerConfig.getHitLimit().isPresent() && !indexerConfig.getDownloadLimit().isPresent()) { return true; } LocalDateTime comparisonTime; LocalDateTime now = LocalDateTime.now(clock); if (indexerConfig.getHitLimitResetTime().isPresent()) { comparisonTime = now.with(ChronoField.HOUR_OF_DAY, indexerConfig.getHitLimitResetTime().get()); if (comparisonTime.isAfter(now)) { comparisonTime = comparisonTime.minus(1, ChronoUnit.DAYS); } } else { comparisonTime = now.minus(1, ChronoUnit.DAYS); } if (indexerConfig.getHitLimit().isPresent()) { boolean limitExceeded = checkIfHitLimitIsExceeded(indexer, indexerConfig, comparisonTime, IndexerApiAccessType.SEARCH, indexerConfig.getHitLimit().get(), "API hit"); if (limitExceeded) { return false; } } if (indexerConfig.getDownloadLimit().isPresent()) { boolean limitExceeded = checkIfHitLimitIsExceeded(indexer, indexerConfig, comparisonTime, IndexerApiAccessType.NZB, indexerConfig.getDownloadLimit().get(), "download"); if (limitExceeded) { return false; } } logger.debug(LoggingMarkers.PERFORMANCE, "Detection that hit limits were not reached for indexer {} took {}ms", indexer.getName(), stopwatch.elapsed(TimeUnit.MILLISECONDS)); return true; } IndexerForSearchSelection pickIndexers(SearchRequest searchRequest); static final Pattern SCHEDULER_PATTERN; }
@Test public void fromTitle() throws Exception { TmdbSearchResult result = testee.getInfos("gladiator", MediaIdType.MOVIETITLE); assertThat(result.getImdbId(), is("tt0172495")); result = testee.fromTitle("gladiator", 1992); assertThat(result.getImdbId(), is("tt0104346")); }
TmdbSearchResult fromTitle(String title, Integer year) throws InfoProviderException { Movie movie = getMovieByTitle(title, year); TmdbSearchResult result = getSearchResultFromMovie(movie); return result; }
TmdbHandler { TmdbSearchResult fromTitle(String title, Integer year) throws InfoProviderException { Movie movie = getMovieByTitle(title, year); TmdbSearchResult result = getSearchResultFromMovie(movie); return result; } }
TmdbHandler { TmdbSearchResult fromTitle(String title, Integer year) throws InfoProviderException { Movie movie = getMovieByTitle(title, year); TmdbSearchResult result = getSearchResultFromMovie(movie); return result; } }
TmdbHandler { TmdbSearchResult fromTitle(String title, Integer year) throws InfoProviderException { Movie movie = getMovieByTitle(title, year); TmdbSearchResult result = getSearchResultFromMovie(movie); return result; } TmdbSearchResult getInfos(String value, MediaIdType idType); List<TmdbSearchResult> search(String title, Integer year); }
TmdbHandler { TmdbSearchResult fromTitle(String title, Integer year) throws InfoProviderException { Movie movie = getMovieByTitle(title, year); TmdbSearchResult result = getSearchResultFromMovie(movie); return result; } TmdbSearchResult getInfos(String value, MediaIdType idType); List<TmdbSearchResult> search(String title, Integer year); }
@Test public void shouldRecognizeLocalIps() { assertThat(testee.isUriToBeIgnoredByProxy("localhost"), is(true)); assertThat(testee.isUriToBeIgnoredByProxy("127.0.0.1"), is(true)); assertThat(testee.isUriToBeIgnoredByProxy("192.168.1.1"), is(true)); assertThat(testee.isUriToBeIgnoredByProxy("192.168.240.3"), is(true)); assertThat(testee.isUriToBeIgnoredByProxy("10.0.240.3"), is(true)); assertThat(testee.isUriToBeIgnoredByProxy("8.8.8.8"), is(false)); }
protected boolean isUriToBeIgnoredByProxy(String host) { MainConfig mainConfig = configProvider.getBaseConfig().getMain(); if (mainConfig.isProxyIgnoreLocal()) { Boolean ipToLong = isHostInLocalNetwork(host); if (ipToLong != null) { return ipToLong; } } if (mainConfig.getProxyIgnoreDomains() == null || mainConfig.getProxyIgnoreDomains().isEmpty()) { return false; } return mainConfig.getProxyIgnoreDomains().stream().anyMatch(x -> isSameHost(x, host)); }
HydraOkHttp3ClientHttpRequestFactory implements ClientHttpRequestFactory, AsyncClientHttpRequestFactory { protected boolean isUriToBeIgnoredByProxy(String host) { MainConfig mainConfig = configProvider.getBaseConfig().getMain(); if (mainConfig.isProxyIgnoreLocal()) { Boolean ipToLong = isHostInLocalNetwork(host); if (ipToLong != null) { return ipToLong; } } if (mainConfig.getProxyIgnoreDomains() == null || mainConfig.getProxyIgnoreDomains().isEmpty()) { return false; } return mainConfig.getProxyIgnoreDomains().stream().anyMatch(x -> isSameHost(x, host)); } }
HydraOkHttp3ClientHttpRequestFactory implements ClientHttpRequestFactory, AsyncClientHttpRequestFactory { protected boolean isUriToBeIgnoredByProxy(String host) { MainConfig mainConfig = configProvider.getBaseConfig().getMain(); if (mainConfig.isProxyIgnoreLocal()) { Boolean ipToLong = isHostInLocalNetwork(host); if (ipToLong != null) { return ipToLong; } } if (mainConfig.getProxyIgnoreDomains() == null || mainConfig.getProxyIgnoreDomains().isEmpty()) { return false; } return mainConfig.getProxyIgnoreDomains().stream().anyMatch(x -> isSameHost(x, host)); } }
HydraOkHttp3ClientHttpRequestFactory implements ClientHttpRequestFactory, AsyncClientHttpRequestFactory { protected boolean isUriToBeIgnoredByProxy(String host) { MainConfig mainConfig = configProvider.getBaseConfig().getMain(); if (mainConfig.isProxyIgnoreLocal()) { Boolean ipToLong = isHostInLocalNetwork(host); if (ipToLong != null) { return ipToLong; } } if (mainConfig.getProxyIgnoreDomains() == null || mainConfig.getProxyIgnoreDomains().isEmpty()) { return false; } return mainConfig.getProxyIgnoreDomains().stream().anyMatch(x -> isSameHost(x, host)); } @PostConstruct void init(); @EventListener void handleConfigChangedEvent(ConfigChangedEvent event); @Override ClientHttpRequest createRequest(URI uri, HttpMethod httpMethod); @Override AsyncClientHttpRequest createAsyncRequest(URI uri, HttpMethod httpMethod); Builder getOkHttpClientBuilder(URI requestUri); static long ipToLong(InetAddress ip); }
HydraOkHttp3ClientHttpRequestFactory implements ClientHttpRequestFactory, AsyncClientHttpRequestFactory { protected boolean isUriToBeIgnoredByProxy(String host) { MainConfig mainConfig = configProvider.getBaseConfig().getMain(); if (mainConfig.isProxyIgnoreLocal()) { Boolean ipToLong = isHostInLocalNetwork(host); if (ipToLong != null) { return ipToLong; } } if (mainConfig.getProxyIgnoreDomains() == null || mainConfig.getProxyIgnoreDomains().isEmpty()) { return false; } return mainConfig.getProxyIgnoreDomains().stream().anyMatch(x -> isSameHost(x, host)); } @PostConstruct void init(); @EventListener void handleConfigChangedEvent(ConfigChangedEvent event); @Override ClientHttpRequest createRequest(URI uri, HttpMethod httpMethod); @Override AsyncClientHttpRequest createAsyncRequest(URI uri, HttpMethod httpMethod); Builder getOkHttpClientBuilder(URI requestUri); static long ipToLong(InetAddress ip); }
@Test public void shouldRecognizeIgnoredDomains() { assertThat(testee.isUriToBeIgnoredByProxy("mydomain.com"), is(true)); assertThat(testee.isUriToBeIgnoredByProxy("github.com"), is(true)); assertThat(testee.isUriToBeIgnoredByProxy("subdomain.otherdomain.net"), is(true)); assertThat(testee.isUriToBeIgnoredByProxy("subdomain.otherDOmain.NET"), is(true)); assertThat(testee.isUriToBeIgnoredByProxy("subdomain.otherdomain.ORG"), is(false)); assertThat(testee.isUriToBeIgnoredByProxy("somedomain.com"), is(false)); }
protected boolean isUriToBeIgnoredByProxy(String host) { MainConfig mainConfig = configProvider.getBaseConfig().getMain(); if (mainConfig.isProxyIgnoreLocal()) { Boolean ipToLong = isHostInLocalNetwork(host); if (ipToLong != null) { return ipToLong; } } if (mainConfig.getProxyIgnoreDomains() == null || mainConfig.getProxyIgnoreDomains().isEmpty()) { return false; } return mainConfig.getProxyIgnoreDomains().stream().anyMatch(x -> isSameHost(x, host)); }
HydraOkHttp3ClientHttpRequestFactory implements ClientHttpRequestFactory, AsyncClientHttpRequestFactory { protected boolean isUriToBeIgnoredByProxy(String host) { MainConfig mainConfig = configProvider.getBaseConfig().getMain(); if (mainConfig.isProxyIgnoreLocal()) { Boolean ipToLong = isHostInLocalNetwork(host); if (ipToLong != null) { return ipToLong; } } if (mainConfig.getProxyIgnoreDomains() == null || mainConfig.getProxyIgnoreDomains().isEmpty()) { return false; } return mainConfig.getProxyIgnoreDomains().stream().anyMatch(x -> isSameHost(x, host)); } }
HydraOkHttp3ClientHttpRequestFactory implements ClientHttpRequestFactory, AsyncClientHttpRequestFactory { protected boolean isUriToBeIgnoredByProxy(String host) { MainConfig mainConfig = configProvider.getBaseConfig().getMain(); if (mainConfig.isProxyIgnoreLocal()) { Boolean ipToLong = isHostInLocalNetwork(host); if (ipToLong != null) { return ipToLong; } } if (mainConfig.getProxyIgnoreDomains() == null || mainConfig.getProxyIgnoreDomains().isEmpty()) { return false; } return mainConfig.getProxyIgnoreDomains().stream().anyMatch(x -> isSameHost(x, host)); } }
HydraOkHttp3ClientHttpRequestFactory implements ClientHttpRequestFactory, AsyncClientHttpRequestFactory { protected boolean isUriToBeIgnoredByProxy(String host) { MainConfig mainConfig = configProvider.getBaseConfig().getMain(); if (mainConfig.isProxyIgnoreLocal()) { Boolean ipToLong = isHostInLocalNetwork(host); if (ipToLong != null) { return ipToLong; } } if (mainConfig.getProxyIgnoreDomains() == null || mainConfig.getProxyIgnoreDomains().isEmpty()) { return false; } return mainConfig.getProxyIgnoreDomains().stream().anyMatch(x -> isSameHost(x, host)); } @PostConstruct void init(); @EventListener void handleConfigChangedEvent(ConfigChangedEvent event); @Override ClientHttpRequest createRequest(URI uri, HttpMethod httpMethod); @Override AsyncClientHttpRequest createAsyncRequest(URI uri, HttpMethod httpMethod); Builder getOkHttpClientBuilder(URI requestUri); static long ipToLong(InetAddress ip); }
HydraOkHttp3ClientHttpRequestFactory implements ClientHttpRequestFactory, AsyncClientHttpRequestFactory { protected boolean isUriToBeIgnoredByProxy(String host) { MainConfig mainConfig = configProvider.getBaseConfig().getMain(); if (mainConfig.isProxyIgnoreLocal()) { Boolean ipToLong = isHostInLocalNetwork(host); if (ipToLong != null) { return ipToLong; } } if (mainConfig.getProxyIgnoreDomains() == null || mainConfig.getProxyIgnoreDomains().isEmpty()) { return false; } return mainConfig.getProxyIgnoreDomains().stream().anyMatch(x -> isSameHost(x, host)); } @PostConstruct void init(); @EventListener void handleConfigChangedEvent(ConfigChangedEvent event); @Override ClientHttpRequest createRequest(URI uri, HttpMethod httpMethod); @Override AsyncClientHttpRequest createAsyncRequest(URI uri, HttpMethod httpMethod); Builder getOkHttpClientBuilder(URI requestUri); static long ipToLong(InetAddress ip); }