| /* |
| * Licensed to the Apache Software Foundation (ASF) under one or more contributor license |
| * agreements. See the NOTICE file distributed with this work for additional information regarding |
| * copyright ownership. The ASF licenses this file to You under the Apache License, Version 2.0 (the |
| * "License"); you may not use this file except in compliance with the License. You may obtain a |
| * copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software distributed under the License |
| * is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express |
| * or implied. See the License for the specific language governing permissions and limitations under |
| * the License. |
| */ |
| package org.apache.geode.internal.cache.tier.sockets.command; |
| |
| import java.io.IOException; |
| import java.nio.ByteBuffer; |
| |
| import org.apache.geode.annotations.Immutable; |
| import org.apache.geode.cache.DynamicRegionFactory; |
| import org.apache.geode.cache.RegionDestroyedException; |
| import org.apache.geode.cache.ResourceException; |
| import org.apache.geode.cache.operations.PutOperationContext; |
| import org.apache.geode.distributed.internal.DistributionStats; |
| import org.apache.geode.internal.cache.EventID; |
| import org.apache.geode.internal.cache.EventIDHolder; |
| import org.apache.geode.internal.cache.LocalRegion; |
| import org.apache.geode.internal.cache.tier.CachedRegionHelper; |
| import org.apache.geode.internal.cache.tier.Command; |
| import org.apache.geode.internal.cache.tier.MessageType; |
| import org.apache.geode.internal.cache.tier.sockets.BaseCommand; |
| import org.apache.geode.internal.cache.tier.sockets.CacheServerStats; |
| import org.apache.geode.internal.cache.tier.sockets.Message; |
| import org.apache.geode.internal.cache.tier.sockets.Part; |
| import org.apache.geode.internal.cache.tier.sockets.ServerConnection; |
| import org.apache.geode.internal.security.AuthorizeRequest; |
| import org.apache.geode.internal.security.SecurityService; |
| import org.apache.geode.security.GemFireSecurityException; |
| import org.apache.geode.security.ResourcePermission.Operation; |
| import org.apache.geode.security.ResourcePermission.Resource; |
| |
| public class Put extends BaseCommand { |
| |
| @Immutable |
| private static final Put singleton = new Put(); |
| |
| public static Command getCommand() { |
| return singleton; |
| } |
| |
| @Override |
| public void cmdExecute(final Message clientMessage, final ServerConnection serverConnection, |
| final SecurityService securityService, long start) throws IOException, InterruptedException { |
| Part regionNamePart = null, keyPart = null, valuePart = null, callbackArgPart = null; |
| String regionName = null; |
| Object callbackArg = null, key = null; |
| Part eventPart = null; |
| String errMessage = ""; |
| CachedRegionHelper crHelper = serverConnection.getCachedRegionHelper(); |
| CacheServerStats stats = serverConnection.getCacheServerStats(); |
| |
| // requiresResponse = true; |
| serverConnection.setAsTrue(REQUIRES_RESPONSE); |
| { |
| long oldStart = start; |
| start = DistributionStats.getStatTime(); |
| stats.incReadPutRequestTime(start - oldStart); |
| } |
| // Retrieve the data from the message parts |
| regionNamePart = clientMessage.getPart(0); |
| keyPart = clientMessage.getPart(1); |
| valuePart = clientMessage.getPart(2); |
| eventPart = clientMessage.getPart(3); |
| // callbackArgPart = null; (redundant assignment) |
| if (clientMessage.getNumberOfParts() > 4) { |
| callbackArgPart = clientMessage.getPart(4); |
| try { |
| callbackArg = callbackArgPart.getObject(); |
| } catch (Exception e) { |
| writeException(clientMessage, e, false, serverConnection); |
| serverConnection.setAsTrue(RESPONDED); |
| return; |
| } |
| } |
| regionName = regionNamePart.getCachedString(); |
| |
| try { |
| key = keyPart.getStringOrObject(); |
| } catch (Exception e) { |
| writeException(clientMessage, e, false, serverConnection); |
| serverConnection.setAsTrue(RESPONDED); |
| return; |
| } |
| |
| if (logger.isTraceEnabled()) { |
| logger.trace("{}: Received put request ({} bytes) from {} for region {} key {} value {}", |
| serverConnection.getName(), clientMessage.getPayloadLength(), |
| serverConnection.getSocketString(), regionName, key, valuePart); |
| } |
| |
| // Process the put request |
| if (key == null || regionName == null) { |
| if (key == null) { |
| logger.warn("{} The input key for the put request is null", |
| serverConnection.getName()); |
| errMessage = |
| "The input key for the put request is null"; |
| } |
| if (regionName == null) { |
| logger.warn("{} The input region name for the put request is null", |
| serverConnection.getName()); |
| errMessage = "The input region name for the put request is null"; |
| } |
| writeErrorResponse(clientMessage, MessageType.PUT_DATA_ERROR, errMessage, serverConnection); |
| serverConnection.setAsTrue(RESPONDED); |
| return; |
| } |
| |
| LocalRegion region = (LocalRegion) serverConnection.getCache().getRegion(regionName); |
| if (region == null) { |
| String reason = |
| ": Region was not found during put request"; |
| writeRegionDestroyedEx(clientMessage, regionName, reason, serverConnection); |
| serverConnection.setAsTrue(RESPONDED); |
| return; |
| } |
| |
| if (valuePart.isNull() && region.containsKey(key)) { |
| // Invalid to 'put' a null value in an existing key |
| logger.info("{}: Attempted to put a null value for existing key {}", |
| serverConnection.getName(), key); |
| errMessage = |
| "Attempted to put a null value for existing key %s"; |
| writeErrorResponse(clientMessage, MessageType.PUT_DATA_ERROR, errMessage, serverConnection); |
| serverConnection.setAsTrue(RESPONDED); |
| return; |
| } |
| |
| ByteBuffer eventIdPartsBuffer = ByteBuffer.wrap(eventPart.getSerializedForm()); |
| long threadId = EventID.readEventIdPartsFromOptmizedByteArray(eventIdPartsBuffer); |
| long sequenceId = EventID.readEventIdPartsFromOptmizedByteArray(eventIdPartsBuffer); |
| EventID eventId = |
| new EventID(serverConnection.getEventMemberIDByteArray(), threadId, sequenceId); |
| |
| try { |
| byte[] value = valuePart.getSerializedForm(); |
| boolean isObject = valuePart.isObject(); |
| |
| securityService.authorize(Resource.DATA, Operation.WRITE, regionName, key); |
| |
| AuthorizeRequest authzRequest = serverConnection.getAuthzRequest(); |
| if (authzRequest != null) { |
| if (DynamicRegionFactory.regionIsDynamicRegionList(regionName)) { |
| authzRequest.createRegionAuthorize((String) key); |
| } |
| // Allow PUT operations on meta regions (bug #38961) |
| else if (!region.isUsedForMetaRegion()) { |
| PutOperationContext putContext = |
| authzRequest.putAuthorize(regionName, key, value, isObject, callbackArg); |
| value = putContext.getSerializedValue(); |
| isObject = putContext.isObject(); |
| callbackArg = putContext.getCallbackArg(); |
| } |
| } |
| // If the value is 1 byte and the byte represents null, |
| // attempt to create the entry. This test needs to be |
| // moved to DataSerializer or DataSerializer.NULL needs |
| // to be publicly accessible. |
| boolean result = false; |
| if (value == null) { |
| // Create the null entry. Since the value is null, the value of the |
| // isObject |
| // the true after null doesn't matter and is not used. |
| result = region.basicBridgeCreate(key, null, true, callbackArg, |
| serverConnection.getProxyID(), true, new EventIDHolder(eventId), false); |
| } else { |
| // Put the entry |
| result = region.basicBridgePut(key, value, null, isObject, callbackArg, |
| serverConnection.getProxyID(), true, new EventIDHolder(eventId)); |
| } |
| if (result) { |
| serverConnection.setModificationInfo(true, regionName, key); |
| } else { |
| String message = "%s: Failed to put entry for region %s key %s value %s"; |
| String s = String.format(message, serverConnection.getName(), regionName, key, valuePart); |
| logger.info(s); |
| throw new Exception(s); |
| } |
| } catch (RegionDestroyedException rde) { |
| writeException(clientMessage, rde, false, serverConnection); |
| serverConnection.setAsTrue(RESPONDED); |
| return; |
| } catch (ResourceException re) { |
| writeException(clientMessage, re, false, serverConnection); |
| serverConnection.setAsTrue(RESPONDED); |
| return; |
| } catch (Exception ce) { |
| // If an interrupted exception is thrown , rethrow it |
| checkForInterrupt(serverConnection, ce); |
| |
| // If an exception occurs during the put, preserve the connection |
| writeException(clientMessage, ce, false, serverConnection); |
| serverConnection.setAsTrue(RESPONDED); |
| if (ce instanceof GemFireSecurityException) { |
| // Fine logging for security exceptions since these are already |
| // logged by the security logger |
| if (logger.isDebugEnabled()) { |
| logger.debug("{}: Unexpected Security exception", serverConnection.getName(), ce); |
| } |
| } else { |
| logger.warn(String.format("%s: Unexpected Exception", |
| serverConnection.getName()), ce); |
| } |
| return; |
| } finally { |
| long oldStart = start; |
| start = DistributionStats.getStatTime(); |
| stats.incProcessPutTime(start - oldStart); |
| } |
| |
| // Increment statistics and write the reply |
| writeReply(clientMessage, serverConnection); |
| |
| serverConnection.setAsTrue(RESPONDED); |
| if (logger.isDebugEnabled()) { |
| logger.debug("{}: Sent put response back to {} for region {} key {} value {}", |
| serverConnection.getName(), serverConnection.getSocketString(), regionName, key, |
| valuePart); |
| } |
| stats.incWritePutResponseTime(DistributionStats.getStatTime() - start); |
| } |
| |
| } |