blob: 905c67044ddb2ebaa1895b98428603b6b5a569e4 [file] [log] [blame]
/**
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.kafka.common.protocol;
import java.util.ArrayList;
import java.util.Collections;
import java.util.EnumSet;
import java.util.HashMap;
import java.util.List;
import java.util.Map;
import java.util.Set;
public enum SecurityProtocol {
/** Un-authenticated, non-encrypted channel */
PLAINTEXT(0, "PLAINTEXT", false),
/** SSL channel */
SSL(1, "SSL", false),
/** SASL authenticated, non-encrypted channel */
SASL_PLAINTEXT(2, "SASL_PLAINTEXT", false),
/** SASL authenticated, SSL channel */
SASL_SSL(3, "SASL_SSL", false),
/** Currently identical to PLAINTEXT and used for testing only. We may implement extra instrumentation when testing channel code. */
TRACE(Short.MAX_VALUE, "TRACE", true);
private static final Map<Short, SecurityProtocol> CODE_TO_SECURITY_PROTOCOL;
private static final List<String> NAMES;
private static final Set<SecurityProtocol> NON_TESTING_VALUES;
static {
SecurityProtocol[] protocols = SecurityProtocol.values();
List<String> names = new ArrayList<>(protocols.length);
Map<Short, SecurityProtocol> codeToSecurityProtocol = new HashMap<>(protocols.length);
Set<SecurityProtocol> nonTestingValues = EnumSet.noneOf(SecurityProtocol.class);
for (SecurityProtocol proto : protocols) {
codeToSecurityProtocol.put(proto.id, proto);
names.add(proto.name);
if (!proto.isTesting)
nonTestingValues.add(proto);
}
CODE_TO_SECURITY_PROTOCOL = Collections.unmodifiableMap(codeToSecurityProtocol);
NAMES = Collections.unmodifiableList(names);
NON_TESTING_VALUES = Collections.unmodifiableSet(nonTestingValues);
}
/** The permanent and immutable id of a security protocol -- this can't change, and must match kafka.cluster.SecurityProtocol */
public final short id;
/** Name of the security protocol. This may be used by client configuration. */
public final String name;
/* Whether this security protocol is for testing/debugging */
private final boolean isTesting;
private SecurityProtocol(int id, String name, boolean isTesting) {
this.id = (short) id;
this.name = name;
this.isTesting = isTesting;
}
public static String getName(int id) {
return CODE_TO_SECURITY_PROTOCOL.get((short) id).name;
}
public static List<String> getNames() {
return NAMES;
}
public static SecurityProtocol forId(Short id) {
return CODE_TO_SECURITY_PROTOCOL.get(id);
}
/** Case insensitive lookup by protocol name */
public static SecurityProtocol forName(String name) {
return SecurityProtocol.valueOf(name.toUpperCase());
}
/**
* Returns the set of non-testing SecurityProtocol instances, that is, SecurityProtocol instances that are suitable
* for production usage.
*/
public static Set<SecurityProtocol> nonTestingValues() {
return NON_TESTING_VALUES;
}
}