-/*******************************************************************************\r
- * ============LICENSE_START==================================================\r
- * * org.onap.dmaap\r
- * * ===========================================================================\r
- * * Copyright © 2017 AT&T Intellectual Property. All rights reserved.\r
- * * ===========================================================================\r
- * * Licensed under the Apache License, Version 2.0 (the "License");\r
- * * you may not use this file except in compliance with the License.\r
- * * You may obtain a copy of the License at\r
- * * \r
- * * http://www.apache.org/licenses/LICENSE-2.0\r
- * * \r
- * * Unless required by applicable law or agreed to in writing, software\r
- * * distributed under the License is distributed on an "AS IS" BASIS,\r
- * * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\r
- * * See the License for the specific language governing permissions and\r
- * * limitations under the License.\r
- * * ============LICENSE_END====================================================\r
- * *\r
- * * ECOMP is a trademark and service mark of AT&T Intellectual Property.\r
- * *\r
- ******************************************************************************/\r
-\r
-\r
-package org.onap.dmaap.datarouter.node;\r
-\r
-import java.net.*;\r
-import java.util.*;\r
-import java.io.*;\r
-import org.apache.log4j.Logger;\r
-import org.onap.dmaap.datarouter.node.eelf.EelfMsgs;\r
-\r
-import com.att.eelf.configuration.EELFLogger;\r
-import com.att.eelf.configuration.EELFManager;\r
-\r
-\r
-/**\r
- * Maintain the configuration of a Data Router node\r
- * <p>\r
- * The NodeConfigManager is the single point of contact for servlet, delivery, event logging, and log retention subsystems to access configuration information. (Log4J has its own configuration mechanism).\r
- * <p>\r
- * There are two basic sets of configuration data. The\r
- * static local configuration data, stored in a local configuration file (created\r
- * as part of installation by SWM), and the dynamic global\r
- * configuration data fetched from the data router provisioning server.\r
- */\r
-public class NodeConfigManager implements DeliveryQueueHelper {\r
- private static EELFLogger eelflogger = EELFManager.getInstance().getLogger("org.onap.dmaap.datarouter.node.NodeConfigManager");\r
- private static Logger logger = Logger.getLogger("org.onap.dmaap.datarouter.node.NodeConfigManager");\r
- private static NodeConfigManager base = new NodeConfigManager();\r
-\r
- private Timer timer = new Timer("Node Configuration Timer", true);\r
- private long maxfailuretimer;\r
- private long initfailuretimer;\r
- private long expirationtimer;\r
- private double failurebackoff;\r
- private long fairtimelimit;\r
- private int fairfilelimit;\r
- private double fdpstart;\r
- private double fdpstop;\r
- private int deliverythreads;\r
- private String provurl;\r
- private String provhost;\r
- private IsFrom provcheck;\r
- private int gfport;\r
- private int svcport;\r
- private int port;\r
- private String spooldir;\r
- private String logdir;\r
- private long logretention;\r
- private String redirfile;\r
- private String kstype;\r
- private String ksfile;\r
- private String kspass;\r
- private String kpass;\r
- private String tstype;\r
- private String tsfile;\r
- private String tspass;\r
- private String myname;\r
- private RedirManager rdmgr;\r
- private RateLimitedOperation pfetcher;\r
- private NodeConfig config;\r
- private File quiesce;\r
- private PublishId pid;\r
- private String nak;\r
- private TaskList configtasks = new TaskList();\r
- private String eventlogurl;\r
- private String eventlogprefix;\r
- private String eventlogsuffix;\r
- private String eventloginterval;\r
- private boolean followredirects;\r
-\r
- \r
- /**\r
- * Get the default node configuration manager\r
- */\r
- public static NodeConfigManager getInstance() {\r
- return(base);\r
- }\r
- /**\r
- * Initialize the configuration of a Data Router node\r
- */\r
- private NodeConfigManager() {\r
- Properties p = new Properties();\r
- try {\r
- p.load(new FileInputStream(System.getProperty("org.onap.dmaap.datarouter.node.ConfigFile", "/opt/app/datartr/etc/node.properties")));\r
- } catch (Exception e) {\r
- \r
- NodeUtils.setIpAndFqdnForEelf("NodeConfigManager");\r
- eelflogger.error(EelfMsgs.MESSAGE_PROPERTIES_LOAD_ERROR);\r
- logger.error("NODE0301 Unable to load local configuration file " + System.getProperty("org.onap.dmaap.datarouter.node.ConfigFile", "/opt/app/datartr/etc/node.properties"), e);\r
- }\r
- provurl = p.getProperty("ProvisioningURL", "https://feeds-drtr.web.att.com/internal/prov");\r
- try {\r
- provhost = (new URL(provurl)).getHost();\r
- } catch (Exception e) {\r
- NodeUtils.setIpAndFqdnForEelf("NodeConfigManager");\r
- eelflogger.error(EelfMsgs.MESSAGE_BAD_PROV_URL, provurl);\r
- logger.error("NODE0302 Bad provisioning server URL " + provurl);\r
- System.exit(1);\r
- }\r
- logger.info("NODE0303 Provisioning server is " + provhost);\r
- eventlogurl = p.getProperty("LogUploadURL", "https://feeds-drtr.web.att.com/internal/logs");\r
- provcheck = new IsFrom(provhost);\r
- gfport = Integer.parseInt(p.getProperty("IntHttpPort", "8080"));\r
- svcport = Integer.parseInt(p.getProperty("IntHttpsPort", "8443"));\r
- port = Integer.parseInt(p.getProperty("ExtHttpsPort", "443"));\r
- long minpfinterval = Long.parseLong(p.getProperty("MinProvFetchInterval", "10000"));\r
- long minrsinterval = Long.parseLong(p.getProperty("MinRedirSaveInterval", "10000"));\r
- spooldir = p.getProperty("SpoolDir", "spool");\r
- File fdir = new File(spooldir + "/f");\r
- fdir.mkdirs();\r
- for (File junk: fdir.listFiles()) {\r
- if (junk.isFile()) {\r
- junk.delete();\r
- }\r
- }\r
- logdir = p.getProperty("LogDir", "logs");\r
- (new File(logdir)).mkdirs();\r
- logretention = Long.parseLong(p.getProperty("LogRetention", "30")) * 86400000L;\r
- eventlogprefix = logdir + "/events";\r
- eventlogsuffix = ".log";\r
- String redirfile = p.getProperty("RedirectionFile", "etc/redirections.dat");\r
- kstype = p.getProperty("KeyStoreType", "jks");\r
- ksfile = p.getProperty("KeyStoreFile", "etc/keystore");\r
- kspass = p.getProperty("KeyStorePassword", "changeme");\r
- kpass = p.getProperty("KeyPassword", "changeme");\r
- tstype = p.getProperty("TrustStoreType", "jks");\r
- tsfile = p.getProperty("TrustStoreFile");\r
- tspass = p.getProperty("TrustStorePassword", "changeme");\r
- if (tsfile != null && tsfile.length() > 0) {\r
- System.setProperty("javax.net.ssl.trustStoreType", tstype);\r
- System.setProperty("javax.net.ssl.trustStore", tsfile);\r
- System.setProperty("javax.net.ssl.trustStorePassword", tspass);\r
- }\r
- nak = p.getProperty("NodeAuthKey", "Node123!");\r
- quiesce = new File(p.getProperty("QuiesceFile", "etc/SHUTDOWN"));\r
- myname = NodeUtils.getCanonicalName(kstype, ksfile, kspass);\r
- if (myname == null) {\r
- NodeUtils.setIpAndFqdnForEelf("NodeConfigManager");\r
- eelflogger.error(EelfMsgs.MESSAGE_KEYSTORE_FETCH_ERROR, ksfile);\r
- logger.error("NODE0309 Unable to fetch canonical name from keystore file " + ksfile);\r
- System.exit(1);\r
- }\r
- logger.info("NODE0304 My certificate says my name is " + myname);\r
- pid = new PublishId(myname);\r
- rdmgr = new RedirManager(redirfile, minrsinterval, timer);\r
- pfetcher = new RateLimitedOperation(minpfinterval, timer) {\r
- public void run() {\r
- fetchconfig();\r
- }\r
- };\r
- logger.info("NODE0305 Attempting to fetch configuration at " + provurl);\r
- pfetcher.request();\r
- }\r
- private void localconfig() {\r
- followredirects = Boolean.parseBoolean(getProvParam("FOLLOW_REDIRECTS", "false"));\r
- eventloginterval = getProvParam("LOGROLL_INTERVAL", "5m");\r
- initfailuretimer = 10000;\r
- maxfailuretimer = 3600000;\r
- expirationtimer = 86400000;\r
- failurebackoff = 2.0;\r
- deliverythreads = 40;\r
- fairfilelimit = 100;\r
- fairtimelimit = 60000;\r
- fdpstart = 0.05;\r
- fdpstop = 0.2;\r
- try { initfailuretimer = (long)(Double.parseDouble(getProvParam("DELIVERY_INIT_RETRY_INTERVAL")) * 1000); } catch (Exception e) {}\r
- try { maxfailuretimer = (long)(Double.parseDouble(getProvParam("DELIVERY_MAX_RETRY_INTERVAL")) * 1000); } catch (Exception e) {}\r
- try { expirationtimer = (long)(Double.parseDouble(getProvParam("DELIVERY_MAX_AGE")) * 1000); } catch (Exception e) {}\r
- try { failurebackoff = Double.parseDouble(getProvParam("DELIVERY_RETRY_RATIO")); } catch (Exception e) {}\r
- try { deliverythreads = Integer.parseInt(getProvParam("DELIVERY_THREADS")); } catch (Exception e) {}\r
- try { fairfilelimit = Integer.parseInt(getProvParam("FAIR_FILE_LIMIT")); } catch (Exception e) {}\r
- try { fairtimelimit = (long)(Double.parseDouble(getProvParam("FAIR_TIME_LIMIT")) * 1000); } catch (Exception e) {}\r
- try { fdpstart = Double.parseDouble(getProvParam("FREE_DISK_RED_PERCENT")) / 100.0; } catch (Exception e) {}\r
- try { fdpstop = Double.parseDouble(getProvParam("FREE_DISK_YELLOW_PERCENT")) / 100.0; } catch (Exception e) {}\r
- if (fdpstart < 0.01) {\r
- fdpstart = 0.01;\r
- }\r
- if (fdpstart > 0.5) {\r
- fdpstart = 0.5;\r
- }\r
- if (fdpstop < fdpstart) {\r
- fdpstop = fdpstart;\r
- }\r
- if (fdpstop > 0.5) {\r
- fdpstop = 0.5;\r
- }\r
- }\r
- private void fetchconfig() {\r
- try {\r
- System.out.println("provurl:: "+provurl);\r
- Reader r = new InputStreamReader((new URL(provurl)).openStream());\r
- config = new NodeConfig(new ProvData(r), myname, spooldir, port, nak);\r
- localconfig();\r
- configtasks.startRun();\r
- Runnable rr;\r
- while ((rr = configtasks.next()) != null) {\r
- try {\r
- rr.run();\r
- } catch (Exception e) {\r
- }\r
- }\r
- } catch (Exception e) {\r
- e.printStackTrace();\r
- NodeUtils.setIpAndFqdnForEelf("fetchconfigs");\r
- eelflogger.error(EelfMsgs.MESSAGE_CONF_FAILED, e.toString());\r
- logger.error("NODE0306 Configuration failed " + e.toString() + " - try again later", e);\r
- pfetcher.request();\r
- }\r
- }\r
- /**\r
- * Process a gofetch request from a particular IP address. If the\r
- * IP address is not an IP address we would go to to fetch the\r
- * provisioning data, ignore the request. If the data has been\r
- * fetched very recently (default 10 seconds), wait a while before fetching again.\r
- */\r
- public synchronized void gofetch(String remoteaddr) {\r
- if (provcheck.isFrom(remoteaddr)) {\r
- logger.info("NODE0307 Received configuration fetch request from provisioning server " + remoteaddr);\r
- pfetcher.request();\r
- } else {\r
- logger.info("NODE0308 Received configuration fetch request from unexpected server " + remoteaddr);\r
- }\r
- }\r
- /**\r
- * Am I configured?\r
- */\r
- public boolean isConfigured() {\r
- return(config != null);\r
- }\r
- /**\r
- * Am I shut down?\r
- */\r
- public boolean isShutdown() {\r
- return(quiesce.exists());\r
- }\r
- /**\r
- * Given a routing string, get the targets.\r
- * @param routing Target string\r
- * @return array of targets\r
- */\r
- public Target[] parseRouting(String routing) {\r
- return(config.parseRouting(routing));\r
- }\r
- /**\r
- * Given a set of credentials and an IP address, is this request from another node?\r
- * @param credentials Credentials offered by the supposed node\r
- * @param ip IP address the request came from\r
- * @return If the credentials and IP address are recognized, true, otherwise false.\r
- */\r
- public boolean isAnotherNode(String credentials, String ip) {\r
- return(config.isAnotherNode(credentials, ip));\r
- }\r
- /**\r
- * Check whether publication is allowed.\r
- * @param feedid The ID of the feed being requested\r
- * @param credentials The offered credentials\r
- * @param ip The requesting IP address\r
- * @return True if the IP and credentials are valid for the specified feed.\r
- */\r
- public String isPublishPermitted(String feedid, String credentials, String ip) {\r
- return(config.isPublishPermitted(feedid, credentials, ip));\r
- }\r
- /**\r
- * Check who the user is given the feed ID and the offered credentials.\r
- * @param feedid The ID of the feed specified\r
- * @param credentials The offered credentials\r
- * @return Null if the credentials are invalid or the user if they are valid.\r
- */\r
- public String getAuthUser(String feedid, String credentials) {\r
- return(config.getAuthUser(feedid, credentials));\r
- }\r
- /**\r
- * Check if the publish request should be sent to another node based on the feedid, user, and source IP address.\r
- * @param feedid The ID of the feed specified\r
- * @param user The publishing user\r
- * @param ip The IP address of the publish endpoint\r
- * @return Null if the request should be accepted or the correct hostname if it should be sent to another node.\r
- */\r
- public String getIngressNode(String feedid, String user, String ip) {\r
- return(config.getIngressNode(feedid, user, ip));\r
- }\r
- /**\r
- * Get a provisioned configuration parameter (from the provisioning server configuration)\r
- * @param name The name of the parameter\r
- * @return The value of the parameter or null if it is not defined.\r
- */\r
- public String getProvParam(String name) {\r
- return(config.getProvParam(name));\r
- }\r
- /**\r
- * Get a provisioned configuration parameter (from the provisioning server configuration)\r
- * @param name The name of the parameter\r
- * @param deflt The value to use if the parameter is not defined\r
- * @return The value of the parameter or deflt if it is not defined.\r
- */\r
- public String getProvParam(String name, String deflt) {\r
- name = config.getProvParam(name);\r
- if (name == null) {\r
- name = deflt;\r
- }\r
- return(name);\r
- }\r
- /**\r
- * Generate a publish ID\r
- */\r
- public String getPublishId() {\r
- return(pid.next());\r
- }\r
- /**\r
- * Get all the outbound spooling destinations.\r
- * This will include both subscriptions and nodes.\r
- */\r
- public DestInfo[] getAllDests() {\r
- return(config.getAllDests());\r
- }\r
- /**\r
- * Register a task to run whenever the configuration changes\r
- */\r
- public void registerConfigTask(Runnable task) {\r
- configtasks.addTask(task);\r
- }\r
- /**\r
- * Deregister a task to run whenever the configuration changes\r
- */\r
- public void deregisterConfigTask(Runnable task) {\r
- configtasks.removeTask(task);\r
- }\r
- /**\r
- * Get the URL to deliver a message to.\r
- * @param destinfo The destination information\r
- * @param fileid The file ID\r
- * @return The URL to deliver to\r
- */\r
- public String getDestURL(DestInfo destinfo, String fileid) {\r
- String subid = destinfo.getSubId();\r
- String purl = destinfo.getURL();\r
- if (followredirects && subid != null) {\r
- purl = rdmgr.lookup(subid, purl);\r
- }\r
- return(purl + "/" + fileid);\r
- }\r
- /**\r
- * Is a destination redirected?\r
- */\r
- public boolean isDestRedirected(DestInfo destinfo) {\r
- return(followredirects && rdmgr.isRedirected(destinfo.getSubId()));\r
- }\r
- /**\r
- * Set up redirection on receipt of a 3XX from a target URL\r
- */\r
- public boolean handleRedirection(DestInfo destinfo, String redirto, String fileid) {\r
- fileid = "/" + fileid;\r
- String subid = destinfo.getSubId();\r
- String purl = destinfo.getURL();\r
- if (followredirects && subid != null && redirto.endsWith(fileid)) {\r
- redirto = redirto.substring(0, redirto.length() - fileid.length());\r
- if (!redirto.equals(purl)) {\r
- rdmgr.redirect(subid, purl, redirto);\r
- return(true);\r
- }\r
- }\r
- return(false);\r
- }\r
- /**\r
- * Handle unreachable target URL\r
- */\r
- public void handleUnreachable(DestInfo destinfo) {\r
- String subid = destinfo.getSubId();\r
- if (followredirects && subid != null) {\r
- rdmgr.forget(subid);\r
- }\r
- }\r
- /**\r
- * Get the timeout before retrying after an initial delivery failure\r
- */\r
- public long getInitFailureTimer() {\r
- return(initfailuretimer);\r
- }\r
- /**\r
- * Get the maximum timeout between delivery attempts\r
- */\r
- public long getMaxFailureTimer() {\r
- return(maxfailuretimer);\r
- }\r
- /**\r
- * Get the ratio between consecutive delivery attempts\r
- */\r
- public double getFailureBackoff() {\r
- return(failurebackoff);\r
- }\r
- /**\r
- * Get the expiration timer for deliveries\r
- */\r
- public long getExpirationTimer() {\r
- return(expirationtimer);\r
- }\r
- /**\r
- * Get the maximum number of file delivery attempts before checking\r
- * if another queue has work to be performed.\r
- */\r
- public int getFairFileLimit() {\r
- return(fairfilelimit);\r
- }\r
- /**\r
- * Get the maximum amount of time spent delivering files before\r
- * checking if another queue has work to be performed.\r
- */\r
- public long getFairTimeLimit() {\r
- return(fairtimelimit);\r
- }\r
- /**\r
- * Get the targets for a feed\r
- * @param feedid The feed ID\r
- * @return The targets this feed should be delivered to\r
- */\r
- public Target[] getTargets(String feedid) {\r
- return(config.getTargets(feedid));\r
- }\r
- /**\r
- * Get the spool directory for temporary files\r
- */\r
- public String getSpoolDir() {\r
- return(spooldir + "/f");\r
- }\r
- /**\r
- * Get the base directory for spool directories\r
- */\r
- public String getSpoolBase() {\r
- return(spooldir);\r
- }\r
- /**\r
- * Get the key store type\r
- */\r
- public String getKSType() {\r
- return(kstype);\r
- }\r
- /**\r
- * Get the key store file\r
- */\r
- public String getKSFile() {\r
- return(ksfile);\r
- }\r
- /**\r
- * Get the key store password\r
- */\r
- public String getKSPass() {\r
- return(kspass);\r
- }\r
- /**\r
- * Get the key password\r
- */\r
- public String getKPass() {\r
- return(kpass);\r
- }\r
- /**\r
- * Get the http port\r
- */\r
- public int getHttpPort() {\r
- return(gfport);\r
- }\r
- /**\r
- * Get the https port\r
- */\r
- public int getHttpsPort() {\r
- return(svcport);\r
- }\r
- /**\r
- * Get the externally visible https port\r
- */\r
- public int getExtHttpsPort() {\r
- return(port);\r
- }\r
- /**\r
- * Get the external name of this machine\r
- */\r
- public String getMyName() {\r
- return(myname);\r
- }\r
- /**\r
- * Get the number of threads to use for delivery\r
- */\r
- public int getDeliveryThreads() {\r
- return(deliverythreads);\r
- }\r
- /**\r
- * Get the URL for uploading the event log data\r
- */\r
- public String getEventLogUrl() {\r
- return(eventlogurl);\r
- }\r
- /**\r
- * Get the prefix for the names of event log files\r
- */\r
- public String getEventLogPrefix() {\r
- return(eventlogprefix);\r
- }\r
- /**\r
- * Get the suffix for the names of the event log files\r
- */\r
- public String getEventLogSuffix() {\r
- return(eventlogsuffix);\r
- }\r
- /**\r
- * Get the interval between event log file rollovers\r
- */\r
- public String getEventLogInterval() {\r
- return(eventloginterval);\r
- }\r
- /**\r
- * Should I follow redirects from subscribers?\r
- */\r
- public boolean isFollowRedirects() {\r
- return(followredirects);\r
- }\r
- /**\r
- * Get the directory where the event and node log files live\r
- */\r
- public String getLogDir() {\r
- return(logdir);\r
- }\r
- /**\r
- * How long do I keep log files (in milliseconds)\r
- */\r
- public long getLogRetention() {\r
- return(logretention);\r
- }\r
- /**\r
- * Get the timer\r
- */\r
- public Timer getTimer() {\r
- return(timer);\r
- }\r
- /**\r
- * Get the feed ID for a subscription\r
- * @param subid The subscription ID\r
- * @return The feed ID\r
- */\r
- public String getFeedId(String subid) {\r
- return(config.getFeedId(subid));\r
- }\r
- /**\r
- * Get the authorization string this node uses\r
- * @return The Authorization string for this node\r
- */\r
- public String getMyAuth() {\r
- return(config.getMyAuth());\r
- }\r
- /**\r
- * Get the fraction of free spool disk space where we start throwing away undelivered files. This is FREE_DISK_RED_PERCENT / 100.0. Default is 0.05. Limited by 0.01 <= FreeDiskStart <= 0.5.\r
- */\r
- public double getFreeDiskStart() {\r
- return(fdpstart);\r
- }\r
- /**\r
- * Get the fraction of free spool disk space where we stop throwing away undelivered files. This is FREE_DISK_YELLOW_PERCENT / 100.0. Default is 0.2. Limited by FreeDiskStart <= FreeDiskStop <= 0.5.\r
- */\r
- public double getFreeDiskStop() {\r
- return(fdpstop);\r
- }\r
- /**\r
- * Get the spool directory for a subscription\r
- */\r
- public String getSpoolDir(String subid, String remoteaddr) {\r
- if (provcheck.isFrom(remoteaddr)) {\r
- String sdir = config.getSpoolDir(subid);\r
- if (sdir != null) {\r
- logger.info("NODE0310 Received subscription reset request for subscription " + subid + " from provisioning server " + remoteaddr);\r
- } else {\r
- logger.info("NODE0311 Received subscription reset request for unknown subscription " + subid + " from provisioning server " + remoteaddr);\r
- }\r
- return(sdir);\r
- } else {\r
- logger.info("NODE0312 Received subscription reset request from unexpected server " + remoteaddr);\r
- return(null);\r
- }\r
- }\r
-}\r
+/*******************************************************************************
+ * ============LICENSE_START==================================================
+ * * org.onap.dmaap
+ * * ===========================================================================
+ * * Copyright © 2017 AT&T Intellectual Property. All rights reserved.
+ * * ===========================================================================
+ * * Licensed under the Apache License, Version 2.0 (the "License");
+ * * you may not use this file except in compliance with the License.
+ * * You may obtain a copy of the License at
+ * *
+ * * http://www.apache.org/licenses/LICENSE-2.0
+ * *
+ * * Unless required by applicable law or agreed to in writing, software
+ * * distributed under the License is distributed on an "AS IS" BASIS,
+ * * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * * See the License for the specific language governing permissions and
+ * * limitations under the License.
+ * * ============LICENSE_END====================================================
+ * *
+ * * ECOMP is a trademark and service mark of AT&T Intellectual Property.
+ * *
+ ******************************************************************************/
+
+
+package org.onap.dmaap.datarouter.node;
+
+import static java.lang.System.exit;
+
+import com.att.eelf.configuration.EELFLogger;
+import com.att.eelf.configuration.EELFManager;
+import java.io.File;
+import java.io.FileInputStream;
+import java.io.IOException;
+import java.io.InputStreamReader;
+import java.io.Reader;
+import java.net.URL;
+import java.nio.file.Files;
+import java.util.Objects;
+import java.util.Properties;
+import java.util.Timer;
+import org.onap.dmaap.datarouter.node.eelf.EelfMsgs;
+
+
+/**
+ * Maintain the configuration of a Data Router node
+ *
+ * <p>The NodeConfigManager is the single point of contact for servlet, delivery, event logging, and log retention
+ * subsystems to access configuration information.
+ *
+ * <p>There are two basic sets of configuration data. The static local configuration data, stored in a local
+ * configuration file (created as part of installation by SWM), and the dynamic global configuration data fetched from
+ * the data router provisioning server.
+ */
+public class NodeConfigManager implements DeliveryQueueHelper {
+
+ private static final String CHANGE_ME = "changeme";
+ private static final String NODE_CONFIG_MANAGER = "NodeConfigManager";
+ private static EELFLogger eelfLogger = EELFManager.getInstance().getLogger(NodeConfigManager.class);
+ private static NodeConfigManager base = new NodeConfigManager();
+
+ private Timer timer = new Timer("Node Configuration Timer", true);
+ private long maxfailuretimer;
+ private long initfailuretimer;
+ private long waitForFileProcessFailureTimer;
+ private long expirationtimer;
+ private double failurebackoff;
+ private long fairtimelimit;
+ private int fairfilelimit;
+ private double fdpstart;
+ private double fdpstop;
+ private int deliverythreads;
+ private String provurl;
+ private String provhost;
+ private IsFrom provcheck;
+ private int gfport;
+ private int svcport;
+ private int port;
+ private String spooldir;
+ private String logdir;
+ private long logretention;
+ private String redirfile;
+ private String kstype;
+ private String ksfile;
+ private String kspass;
+ private String kpass;
+ private String tstype;
+ private String tsfile;
+ private String tspass;
+ private String myname;
+ private RedirManager rdmgr;
+ private RateLimitedOperation pfetcher;
+ private NodeConfig config;
+ private File quiesce;
+ private PublishId pid;
+ private String nak;
+ private TaskList configtasks = new TaskList();
+ private String eventlogurl;
+ private String eventlogprefix;
+ private String eventlogsuffix;
+ private String eventloginterval;
+ private boolean followredirects;
+ private String[] enabledprotocols;
+ private String aafType;
+ private String aafInstance;
+ private String aafAction;
+ private String aafURL;
+ private boolean cadiEnabled;
+
+
+ /**
+ * Initialize the configuration of a Data Router node.
+ */
+ private NodeConfigManager() {
+
+ Properties drNodeProperties = new Properties();
+ try {
+ eelfLogger.debug("NODE0301 Loading local config file node.properties");
+ drNodeProperties.load(new FileInputStream(System
+ .getProperty("org.onap.dmaap.datarouter.node.properties", "/opt/app/datartr/etc/node.properties")));
+ } catch (Exception e) {
+ NodeUtils.setIpAndFqdnForEelf(NODE_CONFIG_MANAGER);
+ eelfLogger.error(EelfMsgs.MESSAGE_PROPERTIES_LOAD_ERROR, e,
+ System.getProperty("org.onap.dmaap.datarouter.node.properties",
+ "/opt/app/datartr/etc/node.properties"));
+ }
+ provurl = drNodeProperties.getProperty("ProvisioningURL", "https://dmaap-dr-prov:8443/internal/prov");
+ /*
+ * START - AAF changes: TDP EPIC US# 307413
+ * Pull AAF settings from node.properties
+ */
+ aafType = drNodeProperties.getProperty("AAFType", "org.onap.dmaap-dr.feed");
+ aafInstance = drNodeProperties.getProperty("AAFInstance", "legacy");
+ aafAction = drNodeProperties.getProperty("AAFAction", "publish");
+ aafURL = drNodeProperties.getProperty("AafUrl", "https://aaf-onap-test.osaaf.org:8095");
+ cadiEnabled = Boolean.parseBoolean(drNodeProperties.getProperty("CadiEnabled", "false"));
+ /*
+ * END - AAF changes: TDP EPIC US# 307413
+ * Pull AAF settings from node.properties
+ */
+ //Disable and enable protocols*/
+ enabledprotocols = ((drNodeProperties.getProperty("NodeHttpsProtocols")).trim()).split("\\|");
+ try {
+ provhost = (new URL(provurl)).getHost();
+ } catch (Exception e) {
+ NodeUtils.setIpAndFqdnForEelf(NODE_CONFIG_MANAGER);
+ eelfLogger.error(EelfMsgs.MESSAGE_BAD_PROV_URL, e, provurl);
+ exit(1);
+ }
+ eelfLogger.debug("NODE0303 Provisioning server is " + provhost);
+ eventlogurl = drNodeProperties.getProperty("LogUploadURL", "https://feeds-drtr.web.att.com/internal/logs");
+ provcheck = new IsFrom(provhost);
+ gfport = Integer.parseInt(drNodeProperties.getProperty("IntHttpPort", "8080"));
+ svcport = Integer.parseInt(drNodeProperties.getProperty("IntHttpsPort", "8443"));
+ port = Integer.parseInt(drNodeProperties.getProperty("ExtHttpsPort", "443"));
+ spooldir = drNodeProperties.getProperty("SpoolDir", "spool");
+ File fdir = new File(spooldir + "/f");
+ fdir.mkdirs();
+ for (File junk : Objects.requireNonNull(fdir.listFiles())) {
+ try {
+ Files.deleteIfExists(junk.toPath());
+ } catch (IOException e) {
+ eelfLogger.error("NODE0313 Failed to clear junk files from " + fdir.getPath(), e);
+ }
+ }
+ logdir = drNodeProperties.getProperty("LogDir", "logs");
+ (new File(logdir)).mkdirs();
+ logretention = Long.parseLong(drNodeProperties.getProperty("LogRetention", "30")) * 86400000L;
+ eventlogprefix = logdir + "/events";
+ eventlogsuffix = ".log";
+ redirfile = drNodeProperties.getProperty("RedirectionFile", "etc/redirections.dat");
+ kstype = drNodeProperties.getProperty("KeyStoreType", "jks");
+ ksfile = drNodeProperties.getProperty("KeyStoreFile", "etc/keystore");
+ kspass = drNodeProperties.getProperty("KeyStorePassword", CHANGE_ME);
+ kpass = drNodeProperties.getProperty("KeyPassword", CHANGE_ME);
+ tstype = drNodeProperties.getProperty("TrustStoreType", "jks");
+ tsfile = drNodeProperties.getProperty("TrustStoreFile");
+ tspass = drNodeProperties.getProperty("TrustStorePassword", CHANGE_ME);
+ if (tsfile != null && tsfile.length() > 0) {
+ System.setProperty("javax.net.ssl.trustStoreType", tstype);
+ System.setProperty("javax.net.ssl.trustStore", tsfile);
+ System.setProperty("javax.net.ssl.trustStorePassword", tspass);
+ }
+ nak = drNodeProperties.getProperty("NodeAuthKey", "Node123!");
+ quiesce = new File(drNodeProperties.getProperty("QuiesceFile", "etc/SHUTDOWN"));
+ myname = NodeUtils.getCanonicalName(kstype, ksfile, kspass);
+ if (myname == null) {
+ NodeUtils.setIpAndFqdnForEelf(NODE_CONFIG_MANAGER);
+ eelfLogger.error(EelfMsgs.MESSAGE_KEYSTORE_FETCH_ERROR, ksfile);
+ eelfLogger.error("NODE0309 Unable to fetch canonical name from keystore file " + ksfile);
+ exit(1);
+ }
+ eelfLogger.debug("NODE0304 My certificate says my name is " + myname);
+ pid = new PublishId(myname);
+ long minrsinterval = Long.parseLong(drNodeProperties.getProperty("MinRedirSaveInterval", "10000"));
+ long minpfinterval = Long.parseLong(drNodeProperties.getProperty("MinProvFetchInterval", "10000"));
+ rdmgr = new RedirManager(redirfile, minrsinterval, timer);
+ pfetcher = new RateLimitedOperation(minpfinterval, timer) {
+ public void run() {
+ fetchconfig();
+ }
+ };
+ eelfLogger.debug("NODE0305 Attempting to fetch configuration at " + provurl);
+ pfetcher.request();
+ }
+
+ /**
+ * Get the default node configuration manager.
+ */
+ public static NodeConfigManager getInstance() {
+ return base;
+ }
+
+ private void localconfig() {
+ followredirects = Boolean.parseBoolean(getProvParam("FOLLOW_REDIRECTS", "false"));
+ eventloginterval = getProvParam("LOGROLL_INTERVAL", "30s");
+ initfailuretimer = 10000;
+ waitForFileProcessFailureTimer = 600000;
+ maxfailuretimer = 3600000;
+ expirationtimer = 86400000;
+ failurebackoff = 2.0;
+ deliverythreads = 40;
+ fairfilelimit = 100;
+ fairtimelimit = 60000;
+ fdpstart = 0.05;
+ fdpstop = 0.2;
+ try {
+ initfailuretimer = (long) (Double.parseDouble(getProvParam("DELIVERY_INIT_RETRY_INTERVAL")) * 1000);
+ } catch (Exception e) {
+ eelfLogger.trace("Error parsing DELIVERY_INIT_RETRY_INTERVAL", e);
+ }
+ try {
+ waitForFileProcessFailureTimer = (long) (Double.parseDouble(getProvParam("DELIVERY_FILE_PROCESS_INTERVAL"))
+ * 1000);
+ } catch (Exception e) {
+ eelfLogger.trace("Error parsing DELIVERY_FILE_PROCESS_INTERVAL", e);
+ }
+ try {
+ maxfailuretimer = (long) (Double.parseDouble(getProvParam("DELIVERY_MAX_RETRY_INTERVAL")) * 1000);
+ } catch (Exception e) {
+ eelfLogger.trace("Error parsing DELIVERY_MAX_RETRY_INTERVAL", e);
+ }
+ try {
+ expirationtimer = (long) (Double.parseDouble(getProvParam("DELIVERY_MAX_AGE")) * 1000);
+ } catch (Exception e) {
+ eelfLogger.trace("Error parsing DELIVERY_MAX_AGE", e);
+ }
+ try {
+ failurebackoff = Double.parseDouble(getProvParam("DELIVERY_RETRY_RATIO"));
+ } catch (Exception e) {
+ eelfLogger.trace("Error parsing DELIVERY_RETRY_RATIO", e);
+ }
+ try {
+ deliverythreads = Integer.parseInt(getProvParam("DELIVERY_THREADS"));
+ } catch (Exception e) {
+ eelfLogger.trace("Error parsing DELIVERY_THREADS", e);
+ }
+ try {
+ fairfilelimit = Integer.parseInt(getProvParam("FAIR_FILE_LIMIT"));
+ } catch (Exception e) {
+ eelfLogger.trace("Error parsing FAIR_FILE_LIMIT", e);
+ }
+ try {
+ fairtimelimit = (long) (Double.parseDouble(getProvParam("FAIR_TIME_LIMIT")) * 1000);
+ } catch (Exception e) {
+ eelfLogger.trace("Error parsing FAIR_TIME_LIMIT", e);
+ }
+ try {
+ fdpstart = Double.parseDouble(getProvParam("FREE_DISK_RED_PERCENT")) / 100.0;
+ } catch (Exception e) {
+ eelfLogger.trace("Error parsing FREE_DISK_RED_PERCENT", e);
+ }
+ try {
+ fdpstop = Double.parseDouble(getProvParam("FREE_DISK_YELLOW_PERCENT")) / 100.0;
+ } catch (Exception e) {
+ eelfLogger.trace("Error parsing FREE_DISK_YELLOW_PERCENT", e);
+ }
+ if (fdpstart < 0.01) {
+ fdpstart = 0.01;
+ }
+ if (fdpstart > 0.5) {
+ fdpstart = 0.5;
+ }
+ if (fdpstop < fdpstart) {
+ fdpstop = fdpstart;
+ }
+ if (fdpstop > 0.5) {
+ fdpstop = 0.5;
+ }
+ }
+
+ private void fetchconfig() {
+ try {
+ eelfLogger.debug("NodeConfigMan.fetchConfig: provurl:: " + provurl);
+ Reader reader = new InputStreamReader((new URL(provurl)).openStream());
+ config = new NodeConfig(new ProvData(reader), myname, spooldir, port, nak);
+ localconfig();
+ configtasks.startRun();
+ runTasks();
+ } catch (Exception e) {
+ NodeUtils.setIpAndFqdnForEelf("fetchconfigs");
+ eelfLogger.error(EelfMsgs.MESSAGE_CONF_FAILED, e.toString());
+ eelfLogger.error("NODE0306 Configuration failed " + e.toString() + " - try again later", e);
+ pfetcher.request();
+ }
+ }
+
+ private void runTasks() {
+ Runnable rr;
+ while ((rr = configtasks.next()) != null) {
+ try {
+ rr.run();
+ } catch (Exception e) {
+ eelfLogger.error("NODE0518 Exception fetchconfig: " + e);
+ }
+ }
+ }
+
+ /**
+ * Process a gofetch request from a particular IP address. If the IP address is not an IP address we would go to to
+ * fetch the provisioning data, ignore the request. If the data has been fetched very recently (default 10
+ * seconds), wait a while before fetching again.
+ */
+ public synchronized void gofetch(String remoteAddr) {
+ if (provcheck.isReachable(remoteAddr)) {
+ eelfLogger.debug("NODE0307 Received configuration fetch request from provisioning server " + remoteAddr);
+ pfetcher.request();
+ } else {
+ eelfLogger.debug("NODE0308 Received configuration fetch request from unexpected server " + remoteAddr);
+ }
+ }
+
+ /**
+ * Am I configured.
+ */
+ public boolean isConfigured() {
+ return (config != null);
+ }
+
+ /**
+ * Am I shut down.
+ */
+ public boolean isShutdown() {
+ return (quiesce.exists());
+ }
+
+ /**
+ * Given a routing string, get the targets.
+ *
+ * @param routing Target string
+ * @return array of targets
+ */
+ public Target[] parseRouting(String routing) {
+ return (config.parseRouting(routing));
+ }
+
+ /**
+ * Given a set of credentials and an IP address, is this request from another node.
+ *
+ * @param credentials Credentials offered by the supposed node
+ * @param ip IP address the request came from
+ * @return If the credentials and IP address are recognized, true, otherwise false.
+ */
+ public boolean isAnotherNode(String credentials, String ip) {
+ return (config.isAnotherNode(credentials, ip));
+ }
+
+ /**
+ * Check whether publication is allowed.
+ *
+ * @param feedid The ID of the feed being requested
+ * @param credentials The offered credentials
+ * @param ip The requesting IP address
+ * @return True if the IP and credentials are valid for the specified feed.
+ */
+ public String isPublishPermitted(String feedid, String credentials, String ip) {
+ return (config.isPublishPermitted(feedid, credentials, ip));
+ }
+
+ /**
+ * Check whether publication is allowed for AAF Feed.
+ *
+ * @param feedid The ID of the feed being requested
+ * @param ip The requesting IP address
+ * @return True if the IP and credentials are valid for the specified feed.
+ */
+ public String isPublishPermitted(String feedid, String ip) {
+ return (config.isPublishPermitted(feedid, ip));
+ }
+
+ /**
+ * Check whether delete file is allowed.
+ *
+ * @param subId The ID of the subscription being requested
+ * @return True if the delete file is permitted for the subscriber.
+ */
+ public boolean isDeletePermitted(String subId) {
+ return (config.isDeletePermitted(subId));
+ }
+
+ /**
+ * Check who the user is given the feed ID and the offered credentials.
+ *
+ * @param feedid The ID of the feed specified
+ * @param credentials The offered credentials
+ * @return Null if the credentials are invalid or the user if they are valid.
+ */
+ public String getAuthUser(String feedid, String credentials) {
+ return (config.getAuthUser(feedid, credentials));
+ }
+
+ /**
+ * AAF changes: TDP EPIC US# 307413 Check AAF_instance for feed ID in NodeConfig.
+ *
+ * @param feedid The ID of the feed specified
+ */
+ public String getAafInstance(String feedid) {
+ return (config.getAafInstance(feedid));
+ }
+
+ public String getAafInstance() {
+ return aafInstance;
+ }
+
+ /**
+ * Check if the publish request should be sent to another node based on the feedid, user, and source IP address.
+ *
+ * @param feedid The ID of the feed specified
+ * @param user The publishing user
+ * @param ip The IP address of the publish endpoint
+ * @return Null if the request should be accepted or the correct hostname if it should be sent to another node.
+ */
+ public String getIngressNode(String feedid, String user, String ip) {
+ return (config.getIngressNode(feedid, user, ip));
+ }
+
+ /**
+ * Get a provisioned configuration parameter (from the provisioning server configuration).
+ *
+ * @param name The name of the parameter
+ * @return The value of the parameter or null if it is not defined.
+ */
+ public String getProvParam(String name) {
+ return (config.getProvParam(name));
+ }
+
+ /**
+ * Get a provisioned configuration parameter (from the provisioning server configuration).
+ *
+ * @param name The name of the parameter
+ * @param defaultValue The value to use if the parameter is not defined
+ * @return The value of the parameter or deflt if it is not defined.
+ */
+ public String getProvParam(String name, String defaultValue) {
+ name = config.getProvParam(name);
+ if (name == null) {
+ name = defaultValue;
+ }
+ return (name);
+ }
+
+ /**
+ * Generate a publish ID.
+ */
+ public String getPublishId() {
+ return (pid.next());
+ }
+
+ /**
+ * Get all the outbound spooling destinations. This will include both subscriptions and nodes.
+ */
+ public DestInfo[] getAllDests() {
+ return (config.getAllDests());
+ }
+
+ /**
+ * Register a task to run whenever the configuration changes.
+ */
+ public void registerConfigTask(Runnable task) {
+ configtasks.addTask(task);
+ }
+
+ /**
+ * Deregister a task to run whenever the configuration changes.
+ */
+ public void deregisterConfigTask(Runnable task) {
+ configtasks.removeTask(task);
+ }
+
+ /**
+ * Get the URL to deliver a message to.
+ *
+ * @param destinationInfo The destination information
+ * @param fileid The file ID
+ * @return The URL to deliver to
+ */
+ public String getDestURL(DestInfo destinationInfo, String fileid) {
+ String subid = destinationInfo.getSubId();
+ String purl = destinationInfo.getURL();
+ if (followredirects && subid != null) {
+ purl = rdmgr.lookup(subid, purl);
+ }
+ return (purl + "/" + fileid);
+ }
+
+ /**
+ * Set up redirection on receipt of a 3XX from a target URL.
+ */
+ public boolean handleRedirection(DestInfo destinationInfo, String redirto, String fileid) {
+ fileid = "/" + fileid;
+ String subid = destinationInfo.getSubId();
+ String purl = destinationInfo.getURL();
+ if (followredirects && subid != null && redirto.endsWith(fileid)) {
+ redirto = redirto.substring(0, redirto.length() - fileid.length());
+ if (!redirto.equals(purl)) {
+ rdmgr.redirect(subid, purl, redirto);
+ return (true);
+ }
+ }
+ return (false);
+ }
+
+ /**
+ * Handle unreachable target URL.
+ */
+ public void handleUnreachable(DestInfo destinationInfo) {
+ String subid = destinationInfo.getSubId();
+ if (followredirects && subid != null) {
+ rdmgr.forget(subid);
+ }
+ }
+
+ /**
+ * Get the timeout before retrying after an initial delivery failure.
+ */
+ public long getInitFailureTimer() {
+ return (initfailuretimer);
+ }
+
+ /**
+ * Get the timeout before retrying after delivery and wait for file processing.
+ */
+ public long getWaitForFileProcessFailureTimer() {
+ return (waitForFileProcessFailureTimer);
+ }
+
+ /**
+ * Get the maximum timeout between delivery attempts.
+ */
+ public long getMaxFailureTimer() {
+ return (maxfailuretimer);
+ }
+
+ /**
+ * Get the ratio between consecutive delivery attempts.
+ */
+ public double getFailureBackoff() {
+ return (failurebackoff);
+ }
+
+ /**
+ * Get the expiration timer for deliveries.
+ */
+ public long getExpirationTimer() {
+ return (expirationtimer);
+ }
+
+ /**
+ * Get the maximum number of file delivery attempts before checking if another queue has work to be performed.
+ */
+ public int getFairFileLimit() {
+ return (fairfilelimit);
+ }
+
+ /**
+ * Get the maximum amount of time spent delivering files before checking if another queue has work to be performed.
+ */
+ public long getFairTimeLimit() {
+ return (fairtimelimit);
+ }
+
+ /**
+ * Get the targets for a feed.
+ *
+ * @param feedid The feed ID
+ * @return The targets this feed should be delivered to
+ */
+ public Target[] getTargets(String feedid) {
+ return (config.getTargets(feedid));
+ }
+
+ /**
+ * Get the spool directory for temporary files.
+ */
+ public String getSpoolDir() {
+ return (spooldir + "/f");
+ }
+
+ /**
+ * Get the spool directory for a subscription.
+ */
+ public String getSpoolDir(String subid, String remoteaddr) {
+ if (provcheck.isFrom(remoteaddr)) {
+ String sdir = config.getSpoolDir(subid);
+ if (sdir != null) {
+ eelfLogger.debug("NODE0310 Received subscription reset request for subscription " + subid
+ + " from provisioning server " + remoteaddr);
+ } else {
+ eelfLogger.debug("NODE0311 Received subscription reset request for unknown subscription " + subid
+ + " from provisioning server " + remoteaddr);
+ }
+ return (sdir);
+ } else {
+ eelfLogger.debug("NODE0312 Received subscription reset request from unexpected server " + remoteaddr);
+ return (null);
+ }
+ }
+
+ /**
+ * Get the base directory for spool directories.
+ */
+ public String getSpoolBase() {
+ return (spooldir);
+ }
+
+ /**
+ * Get the key store type.
+ */
+ public String getKSType() {
+ return (kstype);
+ }
+
+ /**
+ * Get the key store file.
+ */
+ public String getKSFile() {
+ return (ksfile);
+ }
+
+ /**
+ * Get the key store password.
+ */
+ public String getKSPass() {
+ return (kspass);
+ }
+
+ /**
+ * Get the key password.
+ */
+ public String getKPass() {
+ return (kpass);
+ }
+
+ /**
+ * Get the http port.
+ */
+ public int getHttpPort() {
+ return (gfport);
+ }
+
+ /**
+ * Get the https port.
+ */
+ public int getHttpsPort() {
+ return (svcport);
+ }
+
+ /**
+ * Get the externally visible https port.
+ */
+ public int getExtHttpsPort() {
+ return (port);
+ }
+
+ /**
+ * Get the external name of this machine.
+ */
+ public String getMyName() {
+ return (myname);
+ }
+
+ /**
+ * Get the number of threads to use for delivery.
+ */
+ public int getDeliveryThreads() {
+ return (deliverythreads);
+ }
+
+ /**
+ * Get the URL for uploading the event log data.
+ */
+ public String getEventLogUrl() {
+ return (eventlogurl);
+ }
+
+ /**
+ * Get the prefix for the names of event log files.
+ */
+ public String getEventLogPrefix() {
+ return (eventlogprefix);
+ }
+
+ /**
+ * Get the suffix for the names of the event log files.
+ */
+ public String getEventLogSuffix() {
+ return (eventlogsuffix);
+ }
+
+ /**
+ * Get the interval between event log file rollovers.
+ */
+ public String getEventLogInterval() {
+ return (eventloginterval);
+ }
+
+ /**
+ * Should I follow redirects from subscribers.
+ */
+ public boolean isFollowRedirects() {
+ return (followredirects);
+ }
+
+ /**
+ * Get the directory where the event and node log files live.
+ */
+ public String getLogDir() {
+ return (logdir);
+ }
+
+ /**
+ * How long do I keep log files (in milliseconds).
+ */
+ public long getLogRetention() {
+ return (logretention);
+ }
+
+ /**
+ * Get the timer.
+ */
+ public Timer getTimer() {
+ return (timer);
+ }
+
+ /**
+ * Get the feed ID for a subscription.
+ *
+ * @param subid The subscription ID
+ * @return The feed ID
+ */
+ public String getFeedId(String subid) {
+ return (config.getFeedId(subid));
+ }
+
+ /**
+ * Get the authorization string this node uses.
+ *
+ * @return The Authorization string for this node
+ */
+ public String getMyAuth() {
+ return (config.getMyAuth());
+ }
+
+ /**
+ * Get the fraction of free spool disk space where we start throwing away undelivered files. This is
+ * FREE_DISK_RED_PERCENT / 100.0. Default is 0.05. Limited by 0.01 <= FreeDiskStart <= 0.5.
+ */
+ public double getFreeDiskStart() {
+ return (fdpstart);
+ }
+
+ /**
+ * Get the fraction of free spool disk space where we stop throwing away undelivered files. This is
+ * FREE_DISK_YELLOW_PERCENT / 100.0. Default is 0.2. Limited by FreeDiskStart <= FreeDiskStop <= 0.5.
+ */
+ public double getFreeDiskStop() {
+ return (fdpstop);
+ }
+
+ /**
+ * Disable and enable protocols.
+ */
+ public String[] getEnabledprotocols() {
+ return enabledprotocols;
+ }
+
+ public String getAafType() {
+ return aafType;
+ }
+
+ public String getAafAction() {
+ return aafAction;
+ }
+
+ /*
+ * Get aafURL from SWM variable
+ * */
+ public String getAafURL() {
+ return aafURL;
+ }
+
+ public boolean getCadiEnabled() {
+ return cadiEnabled;
+ }
+
+ /**
+ * Builds the permissions string to be verified.
+ *
+ * @param aafInstance The aaf instance
+ * @return The permissions
+ */
+ protected String getPermission(String aafInstance) {
+ try {
+ String type = getAafType();
+ String action = getAafAction();
+ if ("".equals(aafInstance)) {
+ aafInstance = getAafInstance();
+ }
+ return type + "|" + aafInstance + "|" + action;
+ } catch (Exception e) {
+ eelfLogger.error("NODE0543 NodeConfigManager.getPermission: ", e);
+ }
+ return null;
+ }
+}