| /* |
| * Licensed to the Apache Software Foundation (ASF) under one |
| * or more contributor license agreements. See the NOTICE file |
| * distributed with this work for additional information |
| * regarding copyright ownership. The ASF licenses this file |
| * to you under the Apache License, Version 2.0 (the |
| * "License"); you may not use this file except in compliance |
| * with the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| package org.apache.drill.exec.rpc; |
| |
| import io.netty.channel.Channel; |
| import io.netty.channel.ChannelHandlerContext; |
| import io.netty.channel.ChannelInboundHandlerAdapter; |
| import io.netty.channel.ChannelPipeline; |
| import io.netty.channel.socket.SocketChannel; |
| import io.netty.handler.codec.LengthFieldBasedFrameDecoder; |
| |
| import java.net.SocketAddress; |
| import java.nio.ByteOrder; |
| import java.util.concurrent.ExecutionException; |
| |
| import org.apache.drill.exec.proto.UserBitShared.DrillPBError; |
| |
| public abstract class AbstractRemoteConnection implements RemoteConnection, EncryptionContext { |
| private static final org.slf4j.Logger logger = org.slf4j.LoggerFactory.getLogger(AbstractRemoteConnection.class); |
| |
| private final Channel channel; |
| private final WriteManager writeManager; |
| private final RequestIdMap requestIdMap = new RequestIdMap(); |
| private final String clientName; |
| private String name; |
| |
| // Encryption related parameters |
| private final EncryptionContext encryptionContext; |
| // SaslCodec to hold instance of SaslClient/SaslServer |
| protected SaslCodec saslCodec; |
| |
| public AbstractRemoteConnection(SocketChannel channel, String name, EncryptionContext encryptionContext) { |
| this.channel = channel; |
| this.clientName = name; |
| this.writeManager = new WriteManager(); |
| this.encryptionContext = new EncryptionContextImpl(encryptionContext); |
| channel.pipeline().addLast(new BackPressureHandler()); |
| } |
| |
| @Override |
| public boolean inEventLoop() { |
| return channel.eventLoop().inEventLoop(); |
| } |
| |
| @Override |
| public String getName() { |
| if (name == null) { |
| name = String.format("%s <--> %s (%s)", channel.localAddress(), channel.remoteAddress(), clientName); |
| } |
| return name; |
| } |
| |
| @Override |
| public final Channel getChannel() { |
| return channel; |
| } |
| |
| @Override |
| public boolean blockOnNotWritable(RpcOutcomeListener<?> listener) { |
| try { |
| writeManager.waitForWritable(); |
| return true; |
| } catch (final InterruptedException e) { |
| listener.interrupted(e); |
| |
| // Preserve evidence that the interruption occurred so that code higher up |
| // on the call stack can learn of the |
| // interruption and respond to it if it wants to. |
| Thread.currentThread().interrupt(); |
| |
| return false; |
| } |
| } |
| |
| @Override |
| public void setAutoRead(boolean enableAutoRead) { |
| channel.config().setAutoRead(enableAutoRead); |
| } |
| |
| @Override |
| public boolean isActive() { |
| return (channel != null) && channel.isActive(); |
| } |
| |
| /** |
| * The write manager is responsible for controlling whether or not a write can |
| * be sent. It controls whether or not to block a sender if we have tcp |
| * backpressure on the receive side. |
| */ |
| private static class WriteManager { |
| private final ResettableBarrier barrier = new ResettableBarrier(); |
| private volatile boolean disabled = false; |
| |
| public WriteManager() { |
| barrier.openBarrier(); |
| } |
| |
| public void waitForWritable() throws InterruptedException { |
| barrier.await(); |
| } |
| |
| public void setWritable(boolean isWritable) { |
| if (isWritable) { |
| barrier.openBarrier(); |
| } else if (!disabled) { |
| barrier.closeBarrier(); |
| } |
| |
| } |
| |
| public void disable() { |
| disabled = true; |
| } |
| } |
| |
| private class BackPressureHandler extends ChannelInboundHandlerAdapter { |
| |
| @Override |
| public void channelWritabilityChanged(ChannelHandlerContext ctx) throws Exception { |
| writeManager.setWritable(ctx.channel().isWritable()); |
| ctx.fireChannelWritabilityChanged(); |
| } |
| |
| } |
| |
| /** |
| * For incoming messages, remove the outcome listener and return it. Can only be done once per coordinationId |
| * creation. CoordinationId's are recycled so they will show up once we run through all 4B of them. |
| * @param rpcType The rpc type associated with the coordination. |
| * @param coordinationId The coordination id that was returned with the listener was created. |
| * @param clazz The class that is expected in response. |
| * @return An RpcOutcome associated with the provided coordinationId. |
| */ |
| @Override |
| public <V> RpcOutcome<V> getAndRemoveRpcOutcome(int rpcType, int coordinationId, Class<V> clazz) { |
| return requestIdMap.getAndRemoveRpcOutcome(rpcType, coordinationId, clazz); |
| } |
| |
| /** |
| * Create a new rpc listener that will be notified when the response is returned. |
| * @param handler The outcome handler to be notified when the response arrives. |
| * @param clazz The Class associated with the response object. |
| * @return The new listener. Also carries the coordination id for use in the rpc message. |
| */ |
| @Override |
| public <V> ChannelListenerWithCoordinationId createNewRpcListener(RpcOutcomeListener<V> handler, Class<V> clazz) { |
| return requestIdMap.createNewRpcListener(handler, clazz, this); |
| } |
| |
| /** |
| * Inform the local outcome listener that the remote operation could not be handled. |
| * @param coordinationId The id that failed. |
| * @param failure The failure that occurred. |
| */ |
| @Override |
| public void recordRemoteFailure(int coordinationId, DrillPBError failure) { |
| requestIdMap.recordRemoteFailure(coordinationId, failure); |
| } |
| |
| /** |
| * Called from the RpcBus's channel close handler to close all remaining |
| * resources associated with this connection. Ensures that any pending |
| * back-pressure items are also unblocked so they can be thrown away. |
| * |
| * @param ex |
| * The exception that caused the channel to close. |
| */ |
| @Override |
| public void channelClosed(RpcException ex) { |
| // this could possibly overrelease but it doesn't matter since we're only |
| // going to do this to ensure that we |
| // fail out any pending messages |
| writeManager.disable(); |
| writeManager.setWritable(true); |
| |
| // ensure outstanding requests are cleaned up. |
| requestIdMap.channelClosed(ex); |
| } |
| |
| @Override |
| public SocketAddress getRemoteAddress() { |
| return getChannel().remoteAddress(); |
| } |
| |
| /** |
| * Connection consumer wants to close connection. Initiate connection close |
| * and complete. This is a blocking call that ensures that the connection is |
| * closed before returning. As part of this call, the channel close handler |
| * will be triggered which will call channelClosed() above. The latter will |
| * happen in a separate thread while this method is blocking. |
| * |
| * <p> |
| * The check for isActive is not required here since channel can be in OPEN state without being active. We want |
| * to close in both the scenarios. A channel is in OPEN state when a socket is created for it before binding to an |
| * address. |
| * <li> |
| * For connection oriented transport protocol channel moves to ACTIVE state when a connection is established |
| * using this channel. We need to have channel in ACTIVE state NOT OPEN before we can send any message to |
| * remote endpoint. |
| * </li> |
| * <li> |
| * For connectionless transport protocol a sender can send data as soon as channel moves to OPEN state. |
| * </li> |
| * </p> |
| */ |
| @Override |
| public void close() { |
| try { |
| channel.close().get(); |
| } catch (final InterruptedException | ExecutionException e) { |
| logger.warn("Caught exception while closing channel.", e); |
| |
| // Preserve evidence that the interruption occurred so that code higher up |
| // on the call stack can learn of the |
| // interruption and respond to it if it wants to. |
| Thread.currentThread().interrupt(); |
| } |
| } |
| |
| /** |
| * Helps to add all the required security handler's after negotiation for encryption is completed. |
| * <p>Handler's before encryption is negotiated are:</p> |
| * <ul> |
| * <li> PROTOCOL_DECODER {@link ProtobufLengthDecoder} </li> |
| * <li> MESSAGE_DECODER {@link RpcDecoder} </li> |
| * <li> PROTOCOL_ENCODER {@link RpcEncoder} </li> |
| * <li> HANDSHAKE_HANDLER {@link org.apache.drill.exec.rpc.BasicClient.ClientHandshakeHandler} OR |
| * {@link org.apache.drill.exec.rpc.BasicServer.ServerHandshakeHandler} </li> |
| * <li> optional - IDLE_STATE_HANDLER {@link org.apache.drill.exec.rpc.BasicClient.IdlePingHandler} OR |
| * - TIMEOUT_HANDLER {@link org.apache.drill.exec.rpc.BasicServer.LoggingReadTimeoutHandler} </li> |
| * <li> MESSAGE_HANDLER {@link org.apache.drill.exec.rpc.RpcBus.InboundHandler} </li> |
| * <li> EXCEPTION_HANDLER {@link RpcExceptionHandler} </li> |
| * </ul> |
| * <p>Handler's after encryption is negotiated are:</p> |
| * <ul> |
| * <li> LENGTH_DECODER_HANDLER {@link LengthFieldBasedFrameDecoder} |
| * <li> SASL_DECRYPTION_HANDLER {@link SaslDecryptionHandler} |
| * <li> PROTOCOL_DECODER {@link ProtobufLengthDecoder} |
| * <li> MESSAGE_DECODER {@link RpcDecoder} |
| * <li> SASL_ENCRYPTION_HANDLER {@link SaslEncryptionHandler} |
| * <li> CHUNK_CREATION_HANDLER {@link ChunkCreationHandler} |
| * <li> PROTOCOL_ENCODER {@link RpcEncoder} |
| * <li> HANDSHAKE_HANDLER {@link org.apache.drill.exec.rpc.BasicClient.ClientHandshakeHandler} OR |
| * {@link org.apache.drill.exec.rpc.BasicServer.ServerHandshakeHandler} |
| * <li> optional - IDLE_STATE_HANDLER {@link org.apache.drill.exec.rpc.BasicClient.IdlePingHandler} OR |
| * - TIMEOUT_HANDLER {@link org.apache.drill.exec.rpc.BasicServer.LoggingReadTimeoutHandler} |
| * <li> MESSAGE_HANDLER {@link org.apache.drill.exec.rpc.RpcBus.InboundHandler} |
| * <li> EXCEPTION_HANDLER {@link RpcExceptionHandler} |
| * </ul> |
| * <p> |
| * If encryption is enabled ChunkCreationHandler is always added to divide the Rpc message into chunks of |
| * negotiated {@link EncryptionContextImpl#wrapSizeLimit} bytes. This helps to make a generic encryption handler. |
| * </p> |
| */ |
| @Override |
| public void addSecurityHandlers() { |
| |
| final ChannelPipeline channelPipeline = getChannel().pipeline(); |
| if (channelPipeline.names().contains(RpcConstants.SSL_HANDLER)) { |
| channelPipeline.addAfter(RpcConstants.SSL_HANDLER, RpcConstants.SASL_DECRYPTION_HANDLER, |
| new SaslDecryptionHandler(saslCodec, getMaxWrappedSize(), OutOfMemoryHandler.DEFAULT_INSTANCE)); |
| |
| channelPipeline.addAfter(RpcConstants.SSL_HANDLER, RpcConstants.LENGTH_DECODER_HANDLER, |
| new LengthFieldBasedFrameDecoder(ByteOrder.BIG_ENDIAN, Integer.MAX_VALUE, |
| RpcConstants.LENGTH_FIELD_OFFSET, RpcConstants.LENGTH_FIELD_LENGTH, |
| RpcConstants.LENGTH_ADJUSTMENT, RpcConstants.INITIAL_BYTES_TO_STRIP, true)); |
| } else { |
| channelPipeline.addFirst(RpcConstants.SASL_DECRYPTION_HANDLER, |
| new SaslDecryptionHandler(saslCodec, getMaxWrappedSize(), OutOfMemoryHandler.DEFAULT_INSTANCE)); |
| |
| channelPipeline.addFirst(RpcConstants.LENGTH_DECODER_HANDLER, |
| new LengthFieldBasedFrameDecoder(ByteOrder.BIG_ENDIAN, Integer.MAX_VALUE, |
| RpcConstants.LENGTH_FIELD_OFFSET, RpcConstants.LENGTH_FIELD_LENGTH, |
| RpcConstants.LENGTH_ADJUSTMENT, RpcConstants.INITIAL_BYTES_TO_STRIP, true)); |
| |
| } |
| channelPipeline.addAfter(RpcConstants.MESSAGE_DECODER, RpcConstants.SASL_ENCRYPTION_HANDLER, |
| new SaslEncryptionHandler(saslCodec, getWrapSizeLimit(), OutOfMemoryHandler.DEFAULT_INSTANCE)); |
| |
| channelPipeline.addAfter(RpcConstants.SASL_ENCRYPTION_HANDLER, RpcConstants.CHUNK_CREATION_HANDLER, |
| new ChunkCreationHandler(getWrapSizeLimit())); |
| } |
| |
| public abstract void incConnectionCounter(); |
| |
| public abstract void decConnectionCounter(); |
| |
| @Override |
| public void setEncryption(boolean encrypted) { |
| encryptionContext.setEncryption(encrypted); |
| } |
| |
| @Override |
| public boolean isEncryptionEnabled() { |
| return encryptionContext.isEncryptionEnabled(); |
| } |
| |
| @Override |
| public String getEncryptionCtxtString() { |
| return encryptionContext.toString(); |
| } |
| |
| @Override |
| public void setMaxWrappedSize(int maxWrappedChunkSize) { |
| encryptionContext.setMaxWrappedSize(maxWrappedChunkSize); |
| } |
| |
| @Override |
| public int getMaxWrappedSize() { |
| return encryptionContext.getMaxWrappedSize(); |
| } |
| |
| @Override |
| public void setWrapSizeLimit(int wrapSizeLimit) { |
| encryptionContext.setWrapSizeLimit(wrapSizeLimit); |
| } |
| |
| @Override |
| public int getWrapSizeLimit() { |
| return encryptionContext.getWrapSizeLimit(); |
| } |
| |
| } |