001 /** 002 * Licensed to the Apache Software Foundation (ASF) under one or more 003 * contributor license agreements. See the NOTICE file distributed with 004 * this work for additional information regarding copyright ownership. 005 * The ASF licenses this file to You under the Apache License, Version 2.0 006 * (the "License"); you may not use this file except in compliance with 007 * the License. You may obtain a copy of the License at 008 * 009 * http://www.apache.org/licenses/LICENSE-2.0 010 * 011 * Unless required by applicable law or agreed to in writing, software 012 * distributed under the License is distributed on an "AS IS" BASIS, 013 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 014 * See the License for the specific language governing permissions and 015 * limitations under the License. 016 */ 017 package org.apache.camel.component.netty; 018 019 import java.util.List; 020 import java.util.concurrent.TimeUnit; 021 import javax.net.ssl.SSLEngine; 022 023 import org.apache.camel.AsyncCallback; 024 import org.apache.camel.Exchange; 025 import org.apache.camel.component.netty.handlers.ClientChannelHandler; 026 import org.apache.camel.component.netty.ssl.SSLEngineFactory; 027 import org.apache.commons.logging.Log; 028 import org.apache.commons.logging.LogFactory; 029 import org.jboss.netty.channel.ChannelDownstreamHandler; 030 import org.jboss.netty.channel.ChannelPipeline; 031 import org.jboss.netty.channel.ChannelPipelineFactory; 032 import org.jboss.netty.channel.ChannelUpstreamHandler; 033 import org.jboss.netty.channel.Channels; 034 import org.jboss.netty.handler.ssl.SslHandler; 035 import org.jboss.netty.handler.timeout.ReadTimeoutHandler; 036 import org.jboss.netty.util.HashedWheelTimer; 037 import org.jboss.netty.util.Timer; 038 039 public class ClientPipelineFactory implements ChannelPipelineFactory { 040 private static final transient Log LOG = LogFactory.getLog(ClientPipelineFactory.class); 041 private final NettyProducer producer; 042 private final Exchange exchange; 043 private final AsyncCallback callback; 044 045 public ClientPipelineFactory(NettyProducer producer, Exchange exchange, AsyncCallback callback) { 046 this.producer = producer; 047 this.exchange = exchange; 048 this.callback = callback; 049 } 050 051 public ChannelPipeline getPipeline() throws Exception { 052 // create a new pipeline 053 ChannelPipeline channelPipeline = Channels.pipeline(); 054 055 SslHandler sslHandler = configureClientSSLOnDemand(); 056 if (sslHandler != null) { 057 if (LOG.isDebugEnabled()) { 058 LOG.debug("Client SSL handler configured and added to the ChannelPipeline"); 059 } 060 channelPipeline.addLast("ssl", sslHandler); 061 } 062 063 // use read timeout handler to handle timeout while waiting for a remote reply (while reading from the remote host) 064 if (producer.getConfiguration().getTimeout() > 0) { 065 Timer timer = new HashedWheelTimer(); 066 channelPipeline.addLast("timeout", new ReadTimeoutHandler(timer, producer.getConfiguration().getTimeout(), TimeUnit.MILLISECONDS)); 067 } 068 069 List<ChannelUpstreamHandler> decoders = producer.getConfiguration().getDecoders(); 070 for (int x = 0; x < decoders.size(); x++) { 071 channelPipeline.addLast("decoder-" + x, decoders.get(x)); 072 } 073 074 List<ChannelDownstreamHandler> encoders = producer.getConfiguration().getEncoders(); 075 for (int x = 0; x < encoders.size(); x++) { 076 channelPipeline.addLast("encoder-" + x, encoders.get(x)); 077 } 078 079 // our handler must be added last 080 channelPipeline.addLast("handler", new ClientChannelHandler(producer, exchange, callback)); 081 082 return channelPipeline; 083 } 084 085 private SslHandler configureClientSSLOnDemand() throws Exception { 086 if (!producer.getConfiguration().isSsl()) { 087 return null; 088 } 089 090 if (producer.getConfiguration().getSslHandler() != null) { 091 return producer.getConfiguration().getSslHandler(); 092 } else { 093 if (producer.getConfiguration().getKeyStoreFile() == null) { 094 LOG.debug("keystorefile is null"); 095 } 096 if (producer.getConfiguration().getTrustStoreFile() == null) { 097 LOG.debug("truststorefile is null"); 098 } 099 if (producer.getConfiguration().getPassphrase().toCharArray() == null) { 100 LOG.debug("passphrase is null"); 101 } 102 SSLEngineFactory sslEngineFactory = new SSLEngineFactory( 103 producer.getConfiguration().getKeyStoreFormat(), 104 producer.getConfiguration().getSecurityProvider(), 105 producer.getConfiguration().getKeyStoreFile(), 106 producer.getConfiguration().getTrustStoreFile(), 107 producer.getConfiguration().getPassphrase().toCharArray()); 108 SSLEngine sslEngine = sslEngineFactory.createClientSSLEngine(); 109 return new SslHandler(sslEngine); 110 } 111 } 112 113 }