@Override public ChannelInitializer createChannelInitializer(IOService ioService) { SSLConfig sslConfig = ioService.getSSLConfig(); if (sslConfig != null && sslConfig.isEnabled()) { if (!BuildInfoProvider.getBuildInfo().isEnterprise()) { throw new IllegalStateException("SSL/TLS requires Hazelcast Enterprise Edition"); } } return new PlainChannelInitializer(ioService); }
@Override public ChannelInitializer createChannelInitializer(IOService ioService) { SSLConfig sslConfig = ioService.getSSLConfig(); if (sslConfig != null && sslConfig.isEnabled()) { if (!BuildInfoProvider.getBuildInfo().isEnterprise()) { throw new IllegalStateException("SSL/TLS requires Hazelcast Enterprise Edition"); } } return new PlainChannelInitializer(ioService); }
private void sslConfigXmlGenerator(XmlGenerator gen, NetworkConfig netCfg) { SSLConfig ssl = netCfg.getSSLConfig(); gen.open("ssl", "enabled", ssl != null && ssl.isEnabled()); if (ssl != null) { Properties props = new Properties(); props.putAll(ssl.getProperties()); if (maskSensitiveFields && props.containsKey("trustStorePassword")) { props.setProperty("trustStorePassword", MASK_FOR_SENSITIVE_DATA); } if (maskSensitiveFields && props.containsKey("keyStorePassword")) { props.setProperty("keyStorePassword", MASK_FOR_SENSITIVE_DATA); } gen.node("factory-class-name", classNameOrImplClass(ssl.getFactoryClassName(), ssl.getFactoryImplementation())) .appendProperties(props); } gen.close(); }
private void sslConfigXmlGenerator(XmlGenerator gen, NetworkConfig netCfg) { SSLConfig ssl = netCfg.getSSLConfig(); gen.open("ssl", "enabled", ssl != null && ssl.isEnabled()); if (ssl != null) { Properties props = new Properties(); props.putAll(ssl.getProperties()); if (maskSensitiveFields && props.containsKey("trustStorePassword")) { props.setProperty("trustStorePassword", MASK_FOR_SENSITIVE_DATA); } if (maskSensitiveFields && props.containsKey("keyStorePassword")) { props.setProperty("keyStorePassword", MASK_FOR_SENSITIVE_DATA); } gen.node("factory-class-name", classNameOrImplClass(ssl.getFactoryClassName(), ssl.getFactoryImplementation())) .appendProperties(props); } gen.close(); }
@Override public ChannelInitializer createChannelInitializer() { ClientNetworkConfig networkConfig = client.getClientConfig().getNetworkConfig(); SSLConfig sslConfig = networkConfig.getSSLConfig(); if (sslConfig != null && sslConfig.isEnabled()) { if (!BuildInfoProvider.getBuildInfo().isEnterprise()) { throw new IllegalStateException("SSL/TLS requires Hazelcast Enterprise Edition"); } } SocketOptions socketOptions = networkConfig.getSocketOptions(); HazelcastProperties properties = client.getProperties(); boolean directBuffer = properties.getBoolean(SOCKET_CLIENT_BUFFER_DIRECT); return new ClientPlainChannelInitializer(socketOptions, directBuffer); }
@Override public ChannelInitializer createChannelInitializer() { ClientNetworkConfig networkConfig = client.getClientConfig().getNetworkConfig(); SSLConfig sslConfig = networkConfig.getSSLConfig(); if (sslConfig != null && sslConfig.isEnabled()) { if (!BuildInfoProvider.getBuildInfo().isEnterprise()) { throw new IllegalStateException("SSL/TLS requires Hazelcast Enterprise Edition"); } } SocketOptions socketOptions = networkConfig.getSocketOptions(); HazelcastProperties properties = client.getProperties(); boolean directBuffer = properties.getBoolean(SOCKET_CLIENT_BUFFER_DIRECT); return new ClientPlainChannelInitializer(socketOptions, directBuffer); }
public TextDecoder(TcpIpConnection connection, TextEncoder encoder) { IOService ioService = connection.getConnectionManager().getIoService(); this.sslEnabled = ioService.getSSLConfig() == null ? false : ioService.getSSLConfig().isEnabled(); this.textCommandService = ioService.getTextCommandService(); this.encoder = encoder; this.connection = connection; HazelcastProperties props = ioService.properties(); this.memcacheEnabled = props.getBoolean(MEMCACHE_ENABLED); this.restEnabled = props.getBoolean(REST_ENABLED); this.healthcheckEnabled = props.getBoolean(HTTP_HEALTHCHECK_ENABLED); this.logger = ioService.getLoggingService().getLogger(getClass()); }
private static void ssl(XmlGenerator gen, SSLConfig ssl) { if (ssl == null) { return; } gen.open("ssl", "enabled", ssl.isEnabled()) .node("factory-class-name", classNameOrImplClass(ssl.getFactoryClassName(), ssl.getFactoryImplementation())) .appendProperties(ssl.getProperties()) .close(); }
private static void ssl(XmlGenerator gen, SSLConfig ssl) { if (ssl == null) { return; } gen.open("ssl", "enabled", ssl.isEnabled()) .node("factory-class-name", classNameOrImplClass(ssl.getFactoryClassName(), ssl.getFactoryImplementation())) .appendProperties(ssl.getProperties()) .close(); }
public TimedMemberState createTimedMemberState() { MemberStateImpl memberState = new MemberStateImpl(); Collection<StatisticsAwareService> services = instance.node.nodeEngine.getServices(StatisticsAwareService.class); TimedMemberState timedMemberState = new TimedMemberState(); createMemberState(memberState, services); timedMemberState.setMaster(instance.node.isMaster()); timedMemberState.setMemberList(new ArrayList<String>()); if (timedMemberState.isMaster()) { Set<Member> memberSet = instance.getCluster().getMembers(); for (Member member : memberSet) { MemberImpl memberImpl = (MemberImpl) member; Address address = memberImpl.getAddress(); timedMemberState.getMemberList().add(address.getHost() + ":" + address.getPort()); } } timedMemberState.setMemberState(memberState); GroupConfig groupConfig = instance.getConfig().getGroupConfig(); timedMemberState.setClusterName(groupConfig.getName()); SSLConfig sslConfig = instance.getConfig().getNetworkConfig().getSSLConfig(); timedMemberState.setSslEnabled(sslConfig != null && sslConfig.isEnabled()); timedMemberState.setLite(instance.node.isLiteMember()); SocketInterceptorConfig interceptorConfig = instance.getConfig().getNetworkConfig().getSocketInterceptorConfig(); timedMemberState.setSocketInterceptorEnabled(interceptorConfig != null && interceptorConfig.isEnabled()); boolean scriptingEnabled = instance.node.getProperties().getBoolean(GroupProperty.SCRIPTING_ENABLED); timedMemberState.setScriptingEnabled(scriptingEnabled); return timedMemberState; }
public TimedMemberState createTimedMemberState() { MemberStateImpl memberState = new MemberStateImpl(); Collection<StatisticsAwareService> services = instance.node.nodeEngine.getServices(StatisticsAwareService.class); TimedMemberState timedMemberState = new TimedMemberState(); createMemberState(memberState, services); timedMemberState.setMaster(instance.node.isMaster()); timedMemberState.setMemberList(new ArrayList<String>()); if (timedMemberState.isMaster()) { Set<Member> memberSet = instance.getCluster().getMembers(); for (Member member : memberSet) { MemberImpl memberImpl = (MemberImpl) member; Address address = memberImpl.getAddress(); timedMemberState.getMemberList().add(address.getHost() + ":" + address.getPort()); } } timedMemberState.setMemberState(memberState); GroupConfig groupConfig = instance.getConfig().getGroupConfig(); timedMemberState.setClusterName(groupConfig.getName()); SSLConfig sslConfig = instance.getConfig().getNetworkConfig().getSSLConfig(); timedMemberState.setSslEnabled(sslConfig != null && sslConfig.isEnabled()); timedMemberState.setLite(instance.node.isLiteMember()); SocketInterceptorConfig interceptorConfig = instance.getConfig().getNetworkConfig().getSocketInterceptorConfig(); timedMemberState.setSocketInterceptorEnabled(interceptorConfig != null && interceptorConfig.isEnabled()); ManagementCenterConfig managementCenterConfig = instance.node.getConfig().getManagementCenterConfig(); timedMemberState.setScriptingEnabled(managementCenterConfig.isScriptingEnabled()); return timedMemberState; }
protected NioNetworking initNetworking(HazelcastClientInstanceImpl client) { HazelcastProperties properties = client.getProperties(); SSLConfig sslConfig = client.getClientConfig().getNetworkConfig().getSSLConfig(); boolean sslEnabled = sslConfig != null && sslConfig.isEnabled(); int configuredInputThreads = properties.getInteger(IO_INPUT_THREAD_COUNT); int configuredOutputThreads = properties.getInteger(IO_OUTPUT_THREAD_COUNT); int inputThreads; if (configuredInputThreads == -1) { inputThreads = sslEnabled ? DEFAULT_SSL_THREAD_COUNT : 1; } else { inputThreads = configuredInputThreads; } int outputThreads; if (configuredOutputThreads == -1) { outputThreads = sslEnabled ? DEFAULT_SSL_THREAD_COUNT : 1; } else { outputThreads = configuredOutputThreads; } return new NioNetworking( new NioNetworking.Context() .loggingService(client.getLoggingService()) .metricsRegistry(client.getMetricsRegistry()) .threadNamePrefix(client.getName()) .errorHandler(new ClientConnectionChannelErrorHandler()) .inputThreadCount(inputThreads) .outputThreadCount(outputThreads) .balancerIntervalSeconds(properties.getInteger(IO_BALANCER_INTERVAL_SECONDS)) .channelInitializer(client.getClientExtension().createChannelInitializer())); }
protected NioNetworking initNetworking(HazelcastClientInstanceImpl client) { HazelcastProperties properties = client.getProperties(); SSLConfig sslConfig = client.getClientConfig().getNetworkConfig().getSSLConfig(); boolean sslEnabled = sslConfig != null && sslConfig.isEnabled(); int configuredInputThreads = properties.getInteger(IO_INPUT_THREAD_COUNT); int configuredOutputThreads = properties.getInteger(IO_OUTPUT_THREAD_COUNT); int inputThreads; if (configuredInputThreads == -1) { inputThreads = sslEnabled ? DEFAULT_SSL_THREAD_COUNT : 1; } else { inputThreads = configuredInputThreads; } int outputThreads; if (configuredOutputThreads == -1) { outputThreads = sslEnabled ? DEFAULT_SSL_THREAD_COUNT : 1; } else { outputThreads = configuredOutputThreads; } return new NioNetworking( new NioNetworking.Context() .loggingService(client.getLoggingService()) .metricsRegistry(client.getMetricsRegistry()) .threadNamePrefix(client.getName()) .errorHandler(new ClientConnectionChannelErrorHandler()) .inputThreadCount(inputThreads) .outputThreadCount(outputThreads) .balancerIntervalSeconds(properties.getInteger(IO_BALANCER_INTERVAL_SECONDS)) .channelInitializer(client.getClientExtension().createChannelInitializer())); }