Please wait. This can take some minutes ...
Many resources are needed to download a project. Please understand that we have to compensate our server costs. Thank you in advance.
Project price only 1 $
You can buy this project and download/modify it how often you want.
com.hazelcast.client.connection.nio.ClientConnectionManagerImpl Maven / Gradle / Ivy
/*
* Copyright (c) 2008-2020, Hazelcast, Inc. All Rights Reserved.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package com.hazelcast.client.connection.nio;
import com.hazelcast.client.AuthenticationException;
import com.hazelcast.client.ClientNotAllowedInClusterException;
import com.hazelcast.client.HazelcastClientNotActiveException;
import com.hazelcast.client.HazelcastClientOfflineException;
import com.hazelcast.client.config.ClientNetworkConfig;
import com.hazelcast.client.connection.AddressTranslator;
import com.hazelcast.client.connection.ClientConnectionManager;
import com.hazelcast.client.connection.ClientConnectionStrategy;
import com.hazelcast.client.impl.ClientTypes;
import com.hazelcast.client.impl.client.ClientPrincipal;
import com.hazelcast.client.impl.clientside.CandidateClusterContext;
import com.hazelcast.client.impl.clientside.HazelcastClientInstanceImpl;
import com.hazelcast.client.impl.protocol.AuthenticationStatus;
import com.hazelcast.client.impl.protocol.ClientMessage;
import com.hazelcast.client.impl.protocol.codec.ClientAuthenticationCodec;
import com.hazelcast.client.impl.protocol.codec.ClientAuthenticationCustomCodec;
import com.hazelcast.client.impl.protocol.codec.ClientIsFailoverSupportedCodec;
import com.hazelcast.client.spi.ClientExecutionService;
import com.hazelcast.client.spi.impl.ClientInvocation;
import com.hazelcast.client.spi.impl.ClientInvocationFuture;
import com.hazelcast.config.SSLConfig;
import com.hazelcast.core.ExecutionCallback;
import com.hazelcast.core.HazelcastException;
import com.hazelcast.instance.BuildInfo;
import com.hazelcast.instance.BuildInfoProvider;
import com.hazelcast.internal.networking.Channel;
import com.hazelcast.internal.networking.ChannelErrorHandler;
import com.hazelcast.internal.networking.ChannelInitializerProvider;
import com.hazelcast.internal.networking.nio.NioNetworking;
import com.hazelcast.internal.serialization.InternalSerializationService;
import com.hazelcast.logging.ILogger;
import com.hazelcast.nio.Address;
import com.hazelcast.nio.Connection;
import com.hazelcast.nio.ConnectionListener;
import com.hazelcast.nio.SocketInterceptor;
import com.hazelcast.nio.serialization.Data;
import com.hazelcast.security.Credentials;
import com.hazelcast.security.UsernamePasswordCredentials;
import com.hazelcast.spi.exception.TargetDisconnectedException;
import com.hazelcast.spi.properties.HazelcastProperties;
import com.hazelcast.util.AddressUtil;
import java.io.EOFException;
import java.io.IOException;
import java.net.InetSocketAddress;
import java.net.Socket;
import java.net.SocketAddress;
import java.net.UnknownHostException;
import java.nio.channels.SocketChannel;
import java.util.Collection;
import java.util.Collections;
import java.util.LinkedList;
import java.util.Set;
import java.util.concurrent.ConcurrentHashMap;
import java.util.concurrent.ConcurrentMap;
import java.util.concurrent.CopyOnWriteArrayList;
import java.util.concurrent.ScheduledFuture;
import java.util.concurrent.TimeoutException;
import java.util.concurrent.atomic.AtomicInteger;
import static com.hazelcast.client.spi.properties.ClientProperty.ALLOW_INVOCATIONS_WHEN_DISCONNECTED;
import static com.hazelcast.client.spi.properties.ClientProperty.IO_BALANCER_INTERVAL_SECONDS;
import static com.hazelcast.client.spi.properties.ClientProperty.IO_INPUT_THREAD_COUNT;
import static com.hazelcast.client.spi.properties.ClientProperty.IO_OUTPUT_THREAD_COUNT;
import static com.hazelcast.nio.IOUtil.closeResource;
import static com.hazelcast.util.ExceptionUtil.rethrow;
import static java.util.concurrent.TimeUnit.MILLISECONDS;
/**
* Implementation of {@link ClientConnectionManager}.
*/
@SuppressWarnings("checkstyle:classdataabstractioncoupling")
public class ClientConnectionManagerImpl implements ClientConnectionManager {
private static final int DEFAULT_SSL_THREAD_COUNT = 3;
protected final AtomicInteger connectionIdGen = new AtomicInteger();
protected volatile boolean alive;
private final ILogger logger;
private final int connectionTimeoutMillis;
private final HazelcastClientInstanceImpl client;
private final ClientExecutionService executionService;
private final InetSocketAddressCache inetSocketAddressCache = new InetSocketAddressCache();
private final ConcurrentMap activeConnections
= new ConcurrentHashMap();
private final ConcurrentMap connectionsInProgress =
new ConcurrentHashMap();
private final Collection connectionListeners = new CopyOnWriteArrayList();
private final boolean allowInvokeWhenDisconnected;
private final NioNetworking networking;
private final HeartbeatManager heartbeat;
private final long authenticationTimeout;
private final ClientConnectionStrategy connectionStrategy;
// accessed only in synchronized block
private final LinkedList outboundPorts = new LinkedList();
private final Set labels;
private final int outboundPortCount;
private final boolean failoverConfigProvided;
private volatile Credentials lastCredentials;
private volatile ClientPrincipal principal;
private volatile Integer clusterPartitionCount;
private volatile String clusterId;
private volatile Address ownerConnectionAddress;
private volatile CandidateClusterContext currentClusterContext;
public ClientConnectionManagerImpl(HazelcastClientInstanceImpl client) {
this.allowInvokeWhenDisconnected = client.getProperties().getBoolean(ALLOW_INVOCATIONS_WHEN_DISCONNECTED);
this.client = client;
this.labels = Collections.unmodifiableSet(client.getClientConfig().getLabels());
this.logger = client.getLoggingService().getLogger(ClientConnectionManager.class);
ClientNetworkConfig networkConfig = client.getClientConfig().getNetworkConfig();
final int connTimeout = networkConfig.getConnectionTimeout();
this.connectionTimeoutMillis = connTimeout == 0 ? Integer.MAX_VALUE : connTimeout;
this.executionService = client.getClientExecutionService();
this.networking = initNetworking(client);
this.connectionStrategy = client.getConnectionStrategy();
this.outboundPorts.addAll(getOutboundPorts(networkConfig));
this.outboundPortCount = outboundPorts.size();
this.heartbeat = new HeartbeatManager(this, client);
this.authenticationTimeout = heartbeat.getHeartbeatTimeout();
this.failoverConfigProvided = client.getFailoverConfig() != null;
}
private Collection getOutboundPorts(ClientNetworkConfig networkConfig) {
Collection outboundPorts = networkConfig.getOutboundPorts();
Collection outboundPortDefinitions = networkConfig.getOutboundPortDefinitions();
return AddressUtil.getOutboundPorts(outboundPorts, outboundPortDefinitions);
}
public NioNetworking getNetworking() {
return networking;
}
protected NioNetworking initNetworking(final HazelcastClientInstanceImpl client) {
HazelcastProperties properties = client.getProperties();
SSLConfig sslConfig = client.getClientConfig().getNetworkConfig().getSSLConfig();
boolean sslEnabled = sslConfig != null && sslConfig.isEnabled();
int configuredInputThreads = properties.getInteger(IO_INPUT_THREAD_COUNT);
int configuredOutputThreads = properties.getInteger(IO_OUTPUT_THREAD_COUNT);
int inputThreads;
if (configuredInputThreads == -1) {
inputThreads = sslEnabled ? DEFAULT_SSL_THREAD_COUNT : 1;
} else {
inputThreads = configuredInputThreads;
}
int outputThreads;
if (configuredOutputThreads == -1) {
outputThreads = sslEnabled ? DEFAULT_SSL_THREAD_COUNT : 1;
} else {
outputThreads = configuredOutputThreads;
}
return new NioNetworking(
new NioNetworking.Context()
.loggingService(client.getLoggingService())
.metricsRegistry(client.getMetricsRegistry())
.threadNamePrefix(client.getName())
.errorHandler(new ClientConnectionChannelErrorHandler())
.inputThreadCount(inputThreads)
.outputThreadCount(outputThreads)
.balancerIntervalSeconds(properties.getInteger(IO_BALANCER_INTERVAL_SECONDS)));
}
public ClientConnectionStrategy getConnectionStrategy() {
return connectionStrategy;
}
@Override
public Collection getActiveConnections() {
return activeConnections.values();
}
@Override
public boolean isAlive() {
return alive;
}
public synchronized void start() {
if (alive) {
return;
}
alive = true;
startNetworking();
heartbeat.start();
}
protected void startNetworking() {
networking.start();
}
public synchronized void shutdown() {
if (!alive) {
return;
}
alive = false;
for (Connection connection : activeConnections.values()) {
connection.close("Hazelcast client is shutting down", null);
}
stopNetworking();
connectionListeners.clear();
heartbeat.shutdown();
if (currentClusterContext != null) {
currentClusterContext.destroy();
}
}
@Override
public ClientPrincipal getPrincipal() {
return principal;
}
private void setPrincipal(ClientPrincipal principal) {
this.principal = principal;
}
protected void stopNetworking() {
networking.shutdown();
}
@Override
public Connection getActiveConnection(Address target) {
if (target == null) {
return null;
}
return activeConnections.get(inetSocketAddressCache.get(target));
}
@Override
public Connection getOrConnect(Address address) throws IOException {
return getOrConnect(address, false);
}
@Override
public Connection getOrTriggerConnect(Address target, boolean acquiresResources) throws IOException {
Connection connection = getConnection(target, false, acquiresResources);
if (connection != null) {
return connection;
}
triggerConnect(target, false);
return null;
}
private Connection getConnection(Address target, boolean asOwner, boolean acquiresResources) throws IOException {
checkAllowed(target, asOwner, acquiresResources);
if (target == null) {
throw new IllegalStateException("Address can not be null");
}
ClientConnection connection = activeConnections.get(inetSocketAddressCache.get(target));
if (connection != null) {
if (!asOwner) {
return connection;
}
if (connection.isAuthenticatedAsOwner()) {
return connection;
}
}
return null;
}
private void checkAllowed(Address target, boolean asOwner, boolean acquiresResources) throws IOException {
if (!alive) {
throw new HazelcastClientNotActiveException("ConnectionManager is not active!");
}
if (asOwner) {
connectionStrategy.beforeConnectToCluster(target);
//opening an owner connection is always allowed
return;
}
try {
connectionStrategy.beforeGetConnection(target);
} catch (HazelcastClientOfflineException e) {
if (allowInvokeWhenDisconnected && !acquiresResources) {
//invocations that does not acquire resources are allowed to invoke when disconnected
return;
}
throw e;
}
if (getOwnerConnection() == null) {
if (allowInvokeWhenDisconnected && !acquiresResources) {
//invocations that does not acquire resources are allowed to invoke when disconnected
return;
}
throw new IOException("Owner connection is not available!");
}
}
@Override
public Address getOwnerConnectionAddress() {
return ownerConnectionAddress;
}
public Connection getOrConnect(Address address, boolean asOwner) {
try {
while (true) {
ClientConnection connection = (ClientConnection) getConnection(address, asOwner, true);
if (connection != null) {
return connection;
}
AuthenticationFuture future = triggerConnect(address, asOwner);
connection = (ClientConnection) future.get();
if (!asOwner) {
return connection;
}
if (connection.isAuthenticatedAsOwner()) {
return connection;
}
}
} catch (Throwable e) {
throw rethrow(e);
}
}
private AuthenticationFuture triggerConnect(Address target, boolean asOwner) {
if (!asOwner) {
connectionStrategy.beforeOpenConnection(target);
}
AuthenticationFuture future = new AuthenticationFuture();
AuthenticationFuture oldFuture = connectionsInProgress.putIfAbsent(inetSocketAddressCache.get(target), future);
if (oldFuture == null) {
executionService.execute(new InitConnectionTask(target, asOwner, future));
return future;
}
return oldFuture;
}
@Override
public ClientConnection getOwnerConnection() {
if (ownerConnectionAddress == null) {
return null;
}
return (ClientConnection) getActiveConnection(ownerConnectionAddress);
}
private void fireConnectionAddedEvent(ClientConnection connection) {
for (ConnectionListener connectionListener : connectionListeners) {
connectionListener.connectionAdded(connection);
}
connectionStrategy.onConnect(connection);
}
private void fireConnectionRemovedEvent(ClientConnection connection) {
for (ConnectionListener listener : connectionListeners) {
listener.connectionRemoved(connection);
}
connectionStrategy.onDisconnect(connection);
}
private boolean useAnyOutboundPort() {
return outboundPortCount == 0;
}
private int acquireOutboundPort() {
if (outboundPortCount == 0) {
return 0;
}
synchronized (outboundPorts) {
final Integer port = outboundPorts.removeFirst();
outboundPorts.addLast(port);
return port;
}
}
private void bindSocketToPort(Socket socket) throws IOException {
if (useAnyOutboundPort()) {
SocketAddress socketAddress = new InetSocketAddress(0);
socket.bind(socketAddress);
} else {
int retryCount = outboundPortCount * 2;
IOException ex = null;
for (int i = 0; i < retryCount; i++) {
int port = acquireOutboundPort();
if (port == 0) {
// fast-path for ephemeral range - no need to bind
return;
}
SocketAddress socketAddress = new InetSocketAddress(port);
try {
socket.bind(socketAddress);
return;
} catch (IOException e) {
ex = e;
logger.finest("Could not bind port[ " + port + "]: " + e.getMessage());
}
}
throw ex;
}
}
protected ClientConnection createSocketConnection(final Address remoteAddress) throws IOException {
SocketChannel socketChannel = null;
try {
socketChannel = SocketChannel.open();
Socket socket = socketChannel.socket();
bindSocketToPort(socket);
ChannelInitializerProvider channelInitializer = currentClusterContext.getChannelInitializerProvider();
Channel channel = networking.register(null, channelInitializer, socketChannel, true);
channel.connect(inetSocketAddressCache.get(remoteAddress), connectionTimeoutMillis);
ClientConnection connection
= new ClientConnection(client, connectionIdGen.incrementAndGet(), channel);
socketChannel.configureBlocking(true);
SocketInterceptor socketInterceptor = currentClusterContext.getSocketInterceptor();
if (socketInterceptor != null) {
socketInterceptor.onConnect(socket);
}
channel.start();
return connection;
} catch (Exception e) {
closeResource(socketChannel);
throw rethrow(e, IOException.class);
}
}
void onClose(Connection connection) {
removeFromActiveConnections((ClientConnection) connection);
}
private void removeFromActiveConnections(ClientConnection connection) {
Address endpoint = connection.getEndPoint();
if (endpoint == null) {
if (logger.isFinestEnabled()) {
logger.finest("Destroying " + connection + ", but it has end-point set to null "
+ "-> not removing it from a connection map");
}
return;
}
if (activeConnections.remove(inetSocketAddressCache.get(endpoint), connection)) {
logger.info("Removed connection to endpoint: " + endpoint + ", connection: " + connection);
fireConnectionRemovedEvent(connection);
} else {
if (logger.isFinestEnabled()) {
logger.finest("Destroying a connection, but there is no mapping " + endpoint + " -> " + connection
+ " in the connection map.");
}
}
}
@Override
public void addConnectionListener(ConnectionListener connectionListener) {
connectionListeners.add(connectionListener);
}
public Credentials getLastCredentials() {
return lastCredentials;
}
@Override
public void setCandidateClusterContext(CandidateClusterContext context) {
if (currentClusterContext == null) {
context.start();
}
currentClusterContext = context;
}
public void beforeClusterSwitch(CandidateClusterContext context) {
for (ClientConnection activeConnection : activeConnections.values()) {
activeConnection.close(null, new TargetDisconnectedException("Closing since client is switching cluster"));
}
if (currentClusterContext != null) {
currentClusterContext.destroy();
}
clusterId = null;
inetSocketAddressCache.clear();
currentClusterContext = context;
currentClusterContext.start();
}
private class TimeoutAuthenticationTask implements Runnable {
private final ClientInvocationFuture future;
TimeoutAuthenticationTask(ClientInvocationFuture future) {
this.future = future;
}
@Override
public void run() {
if (future.isDone()) {
return;
}
future.complete(new TimeoutException("Authentication response did not come back in "
+ authenticationTimeout + " millis"));
}
}
private class ClientConnectionChannelErrorHandler implements ChannelErrorHandler {
@Override
public void onError(Channel channel, Throwable cause) {
if (channel == null) {
logger.severe(cause);
} else {
if (cause instanceof OutOfMemoryError) {
logger.severe(cause);
}
Connection connection = (Connection) channel.attributeMap().get(ClientConnection.class);
if (cause instanceof EOFException) {
connection.close("Connection closed by the other side", cause);
} else {
connection.close("Exception in " + connection + ", thread=" + Thread.currentThread().getName(), cause);
}
}
}
}
private class InitConnectionTask implements Runnable {
private final Address target;
private final boolean asOwner;
private final AuthenticationFuture future;
InitConnectionTask(Address target, boolean asOwner, AuthenticationFuture future) {
this.target = target;
this.asOwner = asOwner;
this.future = future;
}
@Override
public void run() {
ClientConnection connection;
try {
connection = getConnection();
} catch (Exception e) {
logger.finest(e);
future.onFailure(e);
connectionsInProgress.remove(inetSocketAddressCache.get(target));
return;
}
try {
authenticateAsync(connection);
} catch (Exception e) {
future.onFailure(e);
connection.close("Failed to authenticate connection", e);
connectionsInProgress.remove(inetSocketAddressCache.get(target));
}
}
private void authenticateAsync(ClientConnection connection) {
ClientMessage clientMessage = encodeAuthenticationRequest();
ClientInvocation clientInvocation = new ClientInvocation(client, clientMessage, null, connection);
ClientInvocationFuture invocationFuture = clientInvocation.invokeUrgent();
ClientInvocationFuture failoverFuture = null;
if (failoverConfigProvided && asOwner) {
ClientMessage isFailoverSupportedMessage = ClientIsFailoverSupportedCodec.encodeRequest();
failoverFuture = new ClientInvocation(client, isFailoverSupportedMessage, null, connection).invoke();
}
ScheduledFuture timeoutTaskFuture = executionService.schedule(
new TimeoutAuthenticationTask(invocationFuture), authenticationTimeout, MILLISECONDS);
AuthCallback callback = new AuthCallback(connection, asOwner, target, future, timeoutTaskFuture, failoverFuture);
invocationFuture.andThen(callback);
}
private ClientMessage encodeAuthenticationRequest() {
InternalSerializationService ss = client.getSerializationService();
byte serializationVersion = ss.getVersion();
String uuid = null;
String ownerUuid = null;
ClientPrincipal principal = getPrincipal();
if (principal != null) {
uuid = principal.getUuid();
ownerUuid = principal.getOwnerUuid();
}
Credentials credentials = currentClusterContext.getCredentialsFactory().newCredentials();
lastCredentials = credentials;
String resolvedClusterId = null;
if (failoverConfigProvided) {
resolvedClusterId = clusterId;
}
if (credentials.getClass().equals(UsernamePasswordCredentials.class)) {
UsernamePasswordCredentials cr = (UsernamePasswordCredentials) credentials;
return ClientAuthenticationCodec
.encodeRequest(cr.getUsername(), cr.getPassword(), uuid, ownerUuid,
asOwner, ClientTypes.JAVA,
serializationVersion, BuildInfoProvider.getBuildInfo().getVersion(), client.getName(),
labels, clusterPartitionCount, resolvedClusterId);
} else {
Data data = ss.toData(credentials);
return ClientAuthenticationCustomCodec.encodeRequest(data, uuid, ownerUuid,
asOwner, ClientTypes.JAVA, serializationVersion,
BuildInfoProvider.getBuildInfo().getVersion(), client.getName(),
labels, clusterPartitionCount, resolvedClusterId);
}
}
private ClientConnection getConnection() throws IOException {
ClientConnection connection = activeConnections.get(inetSocketAddressCache.get(target));
if (connection != null) {
return connection;
}
AddressTranslator addressTranslator = currentClusterContext.getAddressTranslator();
Address address = addressTranslator.translate(target);
if (address == null) {
throw new NullPointerException("Address Translator " + addressTranslator.getClass()
+ " could not translate address " + target);
}
return createSocketConnection(address);
}
}
private class AuthCallback implements ExecutionCallback {
private final ClientConnection connection;
private final boolean asOwner;
private final Address target;
private final AuthenticationFuture future;
private final ScheduledFuture timeoutTaskFuture;
private final ClientInvocationFuture isFailoverFuture;
AuthCallback(ClientConnection connection, boolean asOwner, Address target,
AuthenticationFuture future, ScheduledFuture timeoutTaskFuture, ClientInvocationFuture isFailoverFuture) {
this.connection = connection;
this.asOwner = asOwner;
this.target = target;
this.future = future;
this.timeoutTaskFuture = timeoutTaskFuture;
this.isFailoverFuture = isFailoverFuture;
}
@Override
public void onResponse(ClientMessage response) {
timeoutTaskFuture.cancel(true);
ClientAuthenticationCodec.ResponseParameters result;
try {
result = ClientAuthenticationCodec.decodeResponse(response);
} catch (HazelcastException e) {
onFailure(e);
return;
}
AuthenticationStatus authenticationStatus = AuthenticationStatus.getById(result.status);
switch (authenticationStatus) {
case AUTHENTICATED:
if (!checkFailoverSupportIfNeeded(result)) {
return;
}
handleSuccessResult(result);
onAuthenticated();
future.onSuccess(connection);
break;
case CREDENTIALS_FAILED:
AuthenticationException authException = new AuthenticationException("Authentication failed. The configured "
+ "name or password on the client (see ClientConfig.getGroupConfig()) does not match the one "
+ "configured in the cluster or the credentials set in the Client security config could not"
+ " be authenticated");
onFailure(authException);
break;
case NOT_ALLOWED_IN_CLUSTER:
onFailure(new ClientNotAllowedInClusterException("Client is not allowed in the cluster"));
break;
default:
onFailure(new AuthenticationException("Authentication status code not supported. status: "
+ authenticationStatus));
}
}
private void handleSuccessResult(ClientAuthenticationCodec.ResponseParameters result) {
if (result.partitionCountExist) {
clusterPartitionCount = result.partitionCount;
}
if (result.clusterIdExist) {
clusterId = result.clusterId;
}
if (result.serverHazelcastVersionExist) {
connection.setConnectedServerVersion(result.serverHazelcastVersion);
}
connection.setRemoteEndpoint(result.address);
if (asOwner) {
connection.setIsAuthenticatedAsOwner();
ClientPrincipal principal = new ClientPrincipal(result.uuid, result.ownerUuid);
setPrincipal(principal);
ownerConnectionAddress = connection.getEndPoint();
logger.info("Setting " + connection + " as owner with principal " + principal);
}
}
private boolean checkFailoverSupportIfNeeded(ClientAuthenticationCodec.ResponseParameters result) {
if (!asOwner) {
return true;
}
boolean isFailoverAskedToCluster = isFailoverFuture != null;
if (!isFailoverAskedToCluster) {
return true;
}
if (!result.serverHazelcastVersionExist
|| BuildInfo.calculateVersion(result.serverHazelcastVersion) < BuildInfo.calculateVersion("3.12")) {
//this means that server is too old and failover not supported
//IllegalStateException will cause client to give up trying on this cluster
onFailure(new ClientNotAllowedInClusterException("Cluster does not support failover. "
+ "This feature is available in Hazelcast Enterprise with version 3.12 and after"));
return false;
}
try {
boolean isAllowed = ClientIsFailoverSupportedCodec.decodeResponse(isFailoverFuture.get()).response;
if (!isAllowed) {
//in this path server is new but not enterprise.
//IllegalStateException will cause client to give up trying on this cluster
onFailure(new ClientNotAllowedInClusterException("Cluster does not support failover. "
+ "This feature is available in Hazelcast Enterprise"));
return false;
}
return true;
} catch (Exception e) {
//server version is 3.12 or newer, but an exception occured while getting the isFailover supported info
//Exception is delegated without wrapping `IllegalStateException` to so that we will continue
// trying same connection
onFailure(e);
return false;
}
}
private void onAuthenticated() {
Address memberAddress = connection.getEndPoint();
ClientConnection oldConnection = activeConnections.put(inetSocketAddressCache.get(memberAddress), connection);
if (oldConnection == null) {
if (logger.isFinestEnabled()) {
logger.finest("Authentication succeeded for " + connection
+ " and there was no old connection to this end-point");
}
fireConnectionAddedEvent(connection);
} else {
if (logger.isFinestEnabled()) {
logger.finest("Re-authentication succeeded for " + connection);
}
if (!connection.equals(oldConnection)) {
logger.severe("The address that client is connected from does not match with the member address. "
+ " This setup is illegal and will cause inconsistent behaviour "
+ "Address that client uses : " + target + ", member address : " + memberAddress);
}
}
connectionsInProgress.remove(inetSocketAddressCache.get(target));
logger.info("Authenticated with server " + memberAddress + ", server version:" + connection
.getConnectedServerVersionString() + " Local address: " + connection.getLocalSocketAddress());
// Check if connection is closed by remote before authentication complete, if that is the case
// we need to remove it back from active connections.
// Race description from https://github.com/hazelcast/hazelcast/pull/8832.(A little bit changed)
// - open a connection client -> member
// - send auth message
// - receive auth reply -> reply processing is offloaded to an executor. Did not start to run yet.
// - member closes the connection -> the connection is trying to removed from map
// but it was not there to begin with
// - the executor start processing the auth reply -> it put the connection to the connection map.
// - we end up with a closed connection in activeConnections map
if (!connection.isAlive()) {
removeFromActiveConnections(connection);
}
}
@Override
public void onFailure(Throwable cause) {
timeoutTaskFuture.cancel(true);
if (logger.isFinestEnabled()) {
logger.finest("Authentication of " + connection + " failed.", cause);
}
connection.close(null, cause);
connectionsInProgress.remove(inetSocketAddressCache.get(target));
future.onFailure(cause);
}
}
private static class InetSocketAddressCache {
private final ConcurrentMap cache = new ConcurrentHashMap();
private InetSocketAddress get(Address target) {
try {
InetSocketAddress resolvedAddress = cache.get(target);
if (resolvedAddress != null) {
return resolvedAddress;
}
InetSocketAddress newResolvedAddress = new InetSocketAddress(target.getInetAddress(), target.getPort());
InetSocketAddress prevAddress = cache.putIfAbsent(target, newResolvedAddress);
if (prevAddress != null) {
return prevAddress;
}
return newResolvedAddress;
} catch (UnknownHostException e) {
throw rethrow(e);
}
}
//only called when there is a cluster switch
public void clear() {
cache.clear();
}
}
}