Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
O
Openfire
Project
Project
Details
Activity
Releases
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Administrator
Openfire
Commits
4c2ba34e
Commit
4c2ba34e
authored
Nov 21, 2015
by
Christian Schudt
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Delete unused ServerStanzaHandler.java
parent
7cd56256
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
0 additions
and
166 deletions
+0
-166
ServerStanzaHandler.java
...va/org/jivesoftware/openfire/net/ServerStanzaHandler.java
+0
-166
No files found.
src/java/org/jivesoftware/openfire/net/ServerStanzaHandler.java
deleted
100644 → 0
View file @
7cd56256
/**
* $Revision: $
* $Date: $
*
* Copyright (C) 2005-2008 Jive Software. All rights reserved.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package
org
.
jivesoftware
.
openfire
.
net
;
import
org.dom4j.Element
;
import
org.jivesoftware.openfire.Connection
;
import
org.jivesoftware.openfire.PacketRouter
;
import
org.jivesoftware.openfire.auth.UnauthorizedException
;
import
org.jivesoftware.openfire.session.ConnectionSettings
;
import
org.jivesoftware.openfire.session.LocalIncomingServerSession
;
import
org.jivesoftware.util.JiveGlobals
;
import
org.slf4j.Logger
;
import
org.slf4j.LoggerFactory
;
import
org.xmlpull.v1.XmlPullParser
;
import
org.xmlpull.v1.XmlPullParserException
;
import
org.xmpp.packet.IQ
;
import
org.xmpp.packet.Message
;
import
org.xmpp.packet.Packet
;
import
org.xmpp.packet.Presence
;
import
org.xmpp.packet.StreamError
;
/**
* Handler of XML stanzas sent by remote servers. Remote servers that send stanzas
* with no TO or FROM will get their connections closed. Moreover, remote servers
* that try to send stanzas from a not validated domain will also get their connections
* closed.<p>
*
* Server-to-server communication requires two TCP connections between the servers where
* one is used for sending packets whilst the other connection is used for receiving packets.
* The connection used for receiving packets will use a ServerStanzaHandler since the other
* connection will not receive packets.<p>
*
* TODO Finish migration of s2s to use NIO instead of blocking threads. Migrate from ServerSocketReader.
*
* @author Gaston Dombiak
*/
public
class
ServerStanzaHandler
extends
StanzaHandler
{
private
static
final
Logger
Log
=
LoggerFactory
.
getLogger
(
ServerStanzaHandler
.
class
);
public
ServerStanzaHandler
(
PacketRouter
router
,
String
serverName
,
Connection
connection
)
{
super
(
router
,
serverName
,
connection
);
}
@Override
boolean
processUnknowPacket
(
Element
doc
)
throws
UnauthorizedException
{
// Handle subsequent db:result packets
if
(
"db"
.
equals
(
doc
.
getNamespacePrefix
())
&&
"result"
.
equals
(
doc
.
getName
()))
{
if
(!((
LocalIncomingServerSession
)
session
).
validateSubsequentDomain
(
doc
))
{
throw
new
UnauthorizedException
(
"Failed to validate domain when using piggyback."
);
}
return
true
;
}
else
if
(
"db"
.
equals
(
doc
.
getNamespacePrefix
())
&&
"verify"
.
equals
(
doc
.
getName
()))
{
// The Receiving Server is reusing an existing connection for sending the
// Authoritative Server a request for verification of a key
((
LocalIncomingServerSession
)
session
).
verifyReceivedKey
(
doc
);
return
true
;
}
return
false
;
}
@Override
String
getNamespace
()
{
return
"jabber:server"
;
}
@Override
boolean
validateHost
()
{
return
true
;
}
@Override
boolean
validateJIDs
()
{
// TODO Should we trust other servers???
return
false
;
}
@Override
boolean
createSession
(
String
namespace
,
String
serverName
,
XmlPullParser
xpp
,
Connection
connection
)
throws
XmlPullParserException
{
// TODO Finish implementation
/*if ("jabber:server".equals(namespace)) {
// The connected client is a server so create an IncomingServerSession
session = LocalIncomingServerSession.createSession(serverName, reader, connection);
return true;
}*/
return
false
;
}
@Override
void
startTLS
()
throws
Exception
{
// TODO Finish implementation. We need to get the name of the remote server if we want to validate certificates of the remote server that requested TLS
boolean
needed
=
JiveGlobals
.
getBooleanProperty
(
ConnectionSettings
.
Server
.
TLS_CERTIFICATE_VERIFY
,
true
)
&&
JiveGlobals
.
getBooleanProperty
(
ConnectionSettings
.
Server
.
TLS_CERTIFICATE_CHAIN_VERIFY
,
true
)
&&
!
JiveGlobals
.
getBooleanProperty
(
ConnectionSettings
.
Server
.
TLS_ACCEPT_SELFSIGNED_CERTS
,
false
);
connection
.
startTLS
(
false
,
"IMPLEMENT_ME"
,
needed
?
Connection
.
ClientAuth
.
needed
:
Connection
.
ClientAuth
.
wanted
);
}
@Override
protected
void
processIQ
(
IQ
packet
)
throws
UnauthorizedException
{
packetReceived
(
packet
);
// Actually process the packet
super
.
processIQ
(
packet
);
}
@Override
protected
void
processPresence
(
Presence
packet
)
throws
UnauthorizedException
{
packetReceived
(
packet
);
// Actually process the packet
super
.
processPresence
(
packet
);
}
@Override
protected
void
processMessage
(
Message
packet
)
throws
UnauthorizedException
{
packetReceived
(
packet
);
// Actually process the packet
super
.
processMessage
(
packet
);
}
/**
* Make sure that the received packet has a TO and FROM values defined and that it was sent
* from a previously validated domain. If the packet does not matches any of the above
* conditions then a PacketRejectedException will be thrown.
*
* @param packet the received packet.
* @throws UnauthorizedException if the packet does not include a TO or FROM or if the packet
* was sent from a domain that was not previously validated.
*/
private
void
packetReceived
(
Packet
packet
)
throws
UnauthorizedException
{
if
(
packet
.
getTo
()
==
null
||
packet
.
getFrom
()
==
null
)
{
Log
.
debug
(
"ServerStanzaHandler: Closing IncomingServerSession due to packet with no TO or FROM: "
+
packet
.
toXML
());
// Send a stream error saying that the packet includes no TO or FROM
StreamError
error
=
new
StreamError
(
StreamError
.
Condition
.
improper_addressing
);
connection
.
deliverRawText
(
error
.
toXML
());
throw
new
UnauthorizedException
(
"Packet with no TO or FROM attributes"
);
}
else
if
(!((
LocalIncomingServerSession
)
session
).
isValidDomain
(
packet
.
getFrom
().
getDomain
()))
{
Log
.
debug
(
"ServerStanzaHandler: Closing IncomingServerSession due to packet with invalid domain: "
+
packet
.
toXML
());
// Send a stream error saying that the packet includes an invalid FROM
StreamError
error
=
new
StreamError
(
StreamError
.
Condition
.
invalid_from
);
connection
.
deliverRawText
(
error
.
toXML
());
throw
new
UnauthorizedException
(
"Packet with no TO or FROM attributes"
);
}
}
}
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment