nikolas.laskaris 2016-09-21 15:31:25 +00:00
parent 1c9c4041c7
commit 15d687462e
5 changed files with 961 additions and 870 deletions

View File

@ -74,8 +74,8 @@
<dependency>
<groupId>org.gcube.resources</groupId>
<artifactId>registry-publisher</artifactId>
<version>[2.0.0-SNAPSHOT, 3.0.0-SNAPSHOT)</version>
<!-- <version>[1.2.4-SNAPSHOT, 2.0.0-SNAPSHOT)</version> -->
<!-- <version>[2.0.0-SNAPSHOT, 3.0.0-SNAPSHOT)</version> -->
<version>[1.2.4-SNAPSHOT, 2.0.0-SNAPSHOT)</version>
<!-- changed from version 1.1.0-SNAPSHOT. If this change introduces problems, please revert -->
</dependency>

View File

@ -66,6 +66,24 @@ public class ASLSession{
// ACCESS LOGGER
AccessLogger accessLogger = AccessLogger.getAccessLogger();
/**
* A constructor based on the user and a HttpSession
* @param session the HttpSession
* @param user the username
*/
ASLSession(String externalSessionId, String user)
{
//OLD, for backwards compatibility
innerSession = new HashMap<String, Object>();
notifiers = new HashMap<String, Notifier>();
lastUsedTime = System.currentTimeMillis();
username = user;
this.externalSessionID = externalSessionId;
groupModel = new ASLGroupModel();
}
/**
* A constructor based on the user and a HttpSession
* @param session the HttpSession
@ -73,23 +91,18 @@ public class ASLSession{
*/
ASLSession(HttpSession session, String user)
{
this(session.getId(), user);
//NEW
this.session = session;
session.setAttribute("notifiers", new HashMap<String, Notifier>());
session.setAttribute("lastUsedTime", System.currentTimeMillis());
session.setAttribute("username", user);
session.setAttribute("groupModel", new ASLGroupModel());
//OLD, for backwards compatibility
innerSession = new HashMap<String, Object>();
notifiers = new HashMap<String, Notifier>();
lastUsedTime = System.currentTimeMillis();
username = user;
externalSessionID = session.getId();
groupModel = new ASLGroupModel();
this.session = session;
}
private void initializeAttributes() {
if(session != null) {
//NEW WAY
Enumeration <String> sessAttrNames = session.getAttributeNames();
while(sessAttrNames.hasMoreElements()){
String key = sessAttrNames.nextElement();
@ -98,6 +111,8 @@ public class ASLSession{
break;
}
}
}
else {
//for backwards compatibility
for (String key:innerSession.keySet()) {
if (key.equals("collectionsPresentableFields") || key.equals(SessionConstants.collectionsHierarchy)) {
@ -106,6 +121,7 @@ public class ASLSession{
}
}
}
}
/**
* It looks into tomcat's web.xml file for session-timeout value.
@ -118,11 +134,10 @@ public class ASLSession{
public long getSessionTimeoutMillis() throws IOException, ParserConfigurationException {
//NEW WAY, BASED ON HTTPSESSION
if(session != null)
return session.getMaxInactiveInterval() * 1000;
else{
//OLD WAY TO CHECK THE SESSION TIMEOUT (WILL BECOME DEPRECATED).
/*
if(sessionTimeout > 0) //means that is already set to a value !
return sessionTimeout;
int timeoutMins;
@ -173,7 +188,7 @@ public class ASLSession{
sessionTimeout = timeoutMins * 60000; //in milliseconds
logger.info("Session Timeout is: " + sessionTimeout);
return sessionTimeout;
*/
}
}
/**
@ -183,16 +198,20 @@ public class ASLSession{
* @return the new timeout in milliseconds
*/
public long increaseSessionTimeout(long milliseconds, boolean resetCounting){
if(session != null){
//NEW WAY
int secs = (int)milliseconds/1000;
session.setMaxInactiveInterval(session.getMaxInactiveInterval() + secs);
return session.getMaxInactiveInterval()*1000;
}
else{
//OLD WAY, for backwards compatibility
// if(resetCounting)
// lastUsedTime = System.currentTimeMillis();
// sessionTimeout += milliseconds;
// return sessionTimeout;
if(resetCounting)
lastUsedTime = System.currentTimeMillis();
sessionTimeout += milliseconds;
return sessionTimeout;
}
}
@ -201,7 +220,7 @@ public class ASLSession{
*/
public boolean isValid()
{
if(session != null){
//NEW WAY
try {
session.getCreationTime();
@ -209,9 +228,9 @@ public class ASLSession{
return false;
}
return true;
}
else{
//OLD WAY
/*
long maxTime = -1; //it will never be -1
try {
maxTime = getSessionTimeoutMillis();
@ -220,7 +239,7 @@ public class ASLSession{
if((System.currentTimeMillis() - lastUsedTime) > maxTime)
return false;
return true;
*/
}
}
/**
@ -231,11 +250,15 @@ public class ASLSession{
@Deprecated
public boolean isEmpty()
{
if(session != null){
//NEW WAY
return getAttributeNames().isEmpty();
//OLD WAY, for backwards compatibility
// lastUsedTime = System.currentTimeMillis();
// return innerSession.isEmpty();
}
else{
//OLD WAY
lastUsedTime = System.currentTimeMillis();
return innerSession.isEmpty();
}
}
/**
@ -244,6 +267,7 @@ public class ASLSession{
*/
public boolean hasAttribute(String name)
{
if(session != null) {
//HYBRID, TEMPORARY SOLUTION FOR FEATURE #5033
lastUsedTime = System.currentTimeMillis();
if(innerSession.containsKey(name))
@ -254,13 +278,13 @@ public class ASLSession{
innerSession.put(name, session.getAttribute(name));
return true;
}
//NEW WAY
// return (session.getAttribute(name)==null) ? false : true;
return false;
}
else {
//OLD WAY, for backwards compatibility
// lastUsedTime = System.currentTimeMillis();
// return innerSession.containsKey(name);
lastUsedTime = System.currentTimeMillis();
return innerSession.containsKey(name);
}
}
/**
@ -268,6 +292,7 @@ public class ASLSession{
*/
public Set<String> getAttributeNames()
{
if(session != null) {
//HYBRID, TEMPORARY SOLUTION FOR FEATURE #5033
Enumeration<String> names = session.getAttributeNames();
Set<String> output = new HashSet<String>();
@ -275,7 +300,12 @@ public class ASLSession{
output.add(names.nextElement());
output.addAll(innerSession.keySet());
return output;
}
else{
//OLD WAY, for backwards compatibility
lastUsedTime = System.currentTimeMillis();
return innerSession.keySet();
}
//NEW WAY
// Enumeration<String> names = session.getAttributeNames();
@ -284,9 +314,6 @@ public class ASLSession{
// output.add(names.nextElement());
// return output;
//OLD WAY, for backwards compatibility
// lastUsedTime = System.currentTimeMillis();
// return innerSession.keySet();
}
/**
@ -298,6 +325,7 @@ public class ASLSession{
@Deprecated
public Object getAttribute(String name)
{
if(session != null) {
//HYBRID, TEMPORARY SOLUTION FOR FEATURE #5033
lastUsedTime = System.currentTimeMillis();
Object innerObj = innerSession.get(name);
@ -309,13 +337,14 @@ public class ASLSession{
return httpObj;
}
return null;
}
else {
//OLD WAY, for backwards compatibility
lastUsedTime = System.currentTimeMillis();
return innerSession.get(name);
}
//NEW WAY
// return session.getAttribute(name);
//OLD WAY, for backwards compatibility
// lastUsedTime = System.currentTimeMillis();
// return innerSession.get(name);
}
/**
@ -327,15 +356,20 @@ public class ASLSession{
@Deprecated
public void setAttribute(String name, Object value)
{
if(session != null) {
//NEW WAY
session.setAttribute(name, value);
}
// else{
//OLD WAY, for backwards compatibility
lastUsedTime = System.currentTimeMillis();
innerSession.put(name, value);
// }
}
public String getOriginalScopeName() {
if(session != null) {
//HYBRID, TEMPORARY SOLUTION FOR FEATURE #5033
String httpSessionScope = (String) session.getAttribute("scopeName");
if(scopeName != null)
@ -345,11 +379,13 @@ public class ASLSession{
return httpSessionScope;
}
return null;
}
else {
//OLD WAY, for backwards compatibility
return scopeName;
}
//NEW WAY
//return (String) session.getAttribute("scopeName");
//OLD WAY, for backwards compatibility
// return scopeName;
}
/**
@ -363,20 +399,23 @@ public class ASLSession{
@Deprecated
public Object removeAttribute(String name)
{
if(session != null) {
//HYBRID, TEMPORARY SOLUTION FOR FEATURE #5033
lastUsedTime = System.currentTimeMillis();
Object httpAttrib = session.getAttribute(name);
session.removeAttribute(name);
Object innerAttrib = innerSession.remove(name);
return (httpAttrib == null) ? innerAttrib : httpAttrib;
}
else {
//OLD WAY, for backwards compatibility
lastUsedTime = System.currentTimeMillis();
return innerSession.remove(name);
}
//NEW WAY
// Object attr = session.getAttribute(name);
// session.removeAttribute(name);
// return attr;
//OLD WAY, for backwards compatibility
// lastUsedTime = System.currentTimeMillis();
// return innerSession.remove(name);
}
/**
@ -387,12 +426,17 @@ public class ASLSession{
@Deprecated
public void removeAll()
{
if(session != null) {
//NEW WAY
for(String name : getAttributeNames())
session.removeAttribute(name);
}
// else{
//OLD WAY, for backwards compatibility
lastUsedTime = System.currentTimeMillis();
innerSession.clear();
// }
}
public String getParentScope(){
@ -405,8 +449,11 @@ public class ASLSession{
*/
public void invalidate()
{
if(session != null) {
//NEW WAY
session.setMaxInactiveInterval(0);
}
// else {
//OLD WAY, for backwards compatibility
long maxTime = -1; //it will never be -1
try {
@ -414,6 +461,7 @@ public class ASLSession{
} catch (Exception e) { e.printStackTrace();}
lastUsedTime = System.currentTimeMillis() - maxTime - 120000; // 2 minutes excessive
// }
}
@ -421,10 +469,14 @@ public class ASLSession{
* @return the session id
*/
public String getExternalSessionID() {
if(session != null) {
//NEW WAY
return session.getId();
}
else{
//OLD WAY
// return externalSessionID;
return externalSessionID;
}
}
/**
@ -432,6 +484,7 @@ public class ASLSession{
*/
public String getUsername() {
if(session != null) {
//HYBRID, TEMPORARY SOLUTION FOR FEATURE #5033
String httpUN = (String)session.getAttribute("username");
if(username != null)
@ -441,17 +494,20 @@ public class ASLSession{
return httpUN;
}
return null;
}
else{
//OLD WAY, for backwards compatibility
return username;
}
//NEW WAY
// return (String)session.getAttribute("username");
//OLD WAY, for backwards compatibility
// return username;
}
/**
* @return the scope
*/
public String getScope() {
if(session != null) {
//HYBRID, TEMPORARY SOLUTION FOR FEATURE #5033
String httpScope = (String)session.getAttribute("scope");
if(scope!=null)
@ -461,17 +517,18 @@ public class ASLSession{
return httpScope;
}
return null;
}
else {
//OLD WAY, for backwards compatibility
if(scope==null)
logger.debug("Scope is null, returning null");
return scope;
}
//NEW WAY
// String scp = (String)session.getAttribute("scope");
// if(scp==null)
// logger.debug("Scope is null, returning null");
// return scp;
//OLD WAY, for backwards compatibility
// if(scope==null)
// logger.debug("Scope is null, returning null");
// return scope;
}
/**
@ -479,6 +536,7 @@ public class ASLSession{
*/
public String getScopeName(){
if(session != null) {
//HYBRID, TEMPORARY SOLUTION FOR FEATURE #5033
String httpScope = (String)session.getAttribute("scope");
if(scope!=null)
@ -488,16 +546,18 @@ public class ASLSession{
return httpScope;
}
return null;
}
else {
//OLD WAY, for backwards compatibility
if(scope==null)
logger.debug("Scope is null, returning null");
return scope;
}
//NEW WAY
// String scp = (String)session.getAttribute("scope");
// if(scp==null)
// logger.debug("Scope is null, returning null");
// return scp;
//OLD WAY, for backwards compatibility
// if(scope==null)
// logger.debug("Scope is null, returning null");
// return scope;
}
/**
@ -505,14 +565,15 @@ public class ASLSession{
*/
public void setScope(String scope) {
String previousScopeName = null;
if(session != null) {
//NEW WAY
logger.info("The scope about to set is: " + scope);
previousScopeName = (String)session.getAttribute("scope");
session.setAttribute("scope", scope);
session.setAttribute("scopeName", scope);
ScopeProvider.instance.set(scope);
}
// else {
//OLD WAY, for backwards compatibility
logger.info("The scope about to set is: " + scope);
lastUsedTime = System.currentTimeMillis();
@ -522,6 +583,7 @@ public class ASLSession{
this.scope = scope;
this.scopeName = scope;
ScopeProvider.instance.set(scope);
// }
//THE BELOW PART REMAINS THE SAME FOR BOTH NEW AND OLD
// get the attribute that indicates of log in has been done from the login portlet - or if the user logs in from a bookmark
@ -533,13 +595,13 @@ public class ASLSession{
logger.debug("Passing the logging because the variable was set");
return;
}
if ((previousScopeName != null && !previousScopeName.equals((String)session.getAttribute("scope"))) || previousScopeName == null) {
if ((previousScopeName != null && !previousScopeName.equals(getScope())) || previousScopeName == null) {
logger.info("Logging the entrance");
//TODO: Should do something with the below line
// innerSession.clear();
// ACCESS LOGGER
LoginToVreAccessLogEntry loginEntry = new LoginToVreAccessLogEntry();
accessLogger.logEntry((String)session.getAttribute("username"), scope, loginEntry);
accessLogger.logEntry(getUsername(), scope, loginEntry);
} else
logger.debug("Passing the logging because the scope was the same");
initializeAttributes();
@ -549,21 +611,33 @@ public class ASLSession{
@SuppressWarnings("unchecked")
private void addNotifier(String key, Notifier value){
if(session != null)
((HashMap<String, Notifier>)session.getAttribute("notifiers")).put(key, value);
else
logger.error("Could not set notifier for "+key);
}
@SuppressWarnings("unchecked")
private Notifier getNotifier(String key){
if(session != null)
return ((HashMap<String, Notifier>)session.getAttribute("notifiers")).get(key);
else{
logger.error("Could not get notifier for " + key +" because HTTPSession was null. WILL RETURN NULL NOTIFIER");
return null;
}
}
public void setSecurityToken(String token){
if(session != null) {
//NEW WAY
SecurityTokenProvider.instance.set(token);
session.setAttribute("securityToken", token);
}
// else{
//OLD WAY, for backwards compatibility
this.securityToken = token;
// }
}
public void logUserLogin(String scope) {
@ -571,7 +645,7 @@ public class ASLSession{
loggedIn = true;
// ACCESS LOGGER
LoginToVreAccessLogEntry loginEntry = new LoginToVreAccessLogEntry();
accessLogger.logEntry((String)session.getAttribute("username"), scope, loginEntry);
accessLogger.logEntry(getUsername(), scope, loginEntry);
}
/**
@ -609,18 +683,23 @@ public class ASLSession{
}
public void setGroupModelInfos(String groupName, long groupId) {
if(session != null) {
//NEW WAY
ASLGroupModel aslGM = ((ASLGroupModel)session.getAttribute("groupModel"));
aslGM.setGroupName(groupName);
aslGM.setGroupId(groupId);
session.setAttribute("groupModel", aslGM);
}
else{
//OLD WAY, for backwards compatibility
groupModel.setGroupName(groupName);
groupModel.setGroupId(groupId);
}
}
public long getGroupId() {
if(session != null) {
//HYBRID, TEMPORARY SOLUTION FOR FEATURE #5033
ASLGroupModel agmHttp = (ASLGroupModel) session.getAttribute("groupModel");
if(groupModel != null)
@ -630,15 +709,17 @@ public class ASLSession{
return agmHttp.getGroupId();
}
return Long.MIN_VALUE; //should throw an exception instead... but long's primitive and we need not to change the api
}
else {
//OLD WAY, for backwards compatibility
return groupModel.getGroupId();
}
//NEW WAY
// return ((ASLGroupModel)session.getAttribute("groupModel")).getGroupId();
//OLD WAY, for backwards compatibility
// return groupModel.getGroupId();
}
public String getGroupName() {
if(session != null) {
//HYBRID, TEMPORARY SOLUTION FOR FEATURE #5033
ASLGroupModel agmHttp = (ASLGroupModel) session.getAttribute("groupModel");
if(groupModel != null)
@ -648,15 +729,20 @@ public class ASLSession{
return agmHttp.getGroupName();
}
return null;
}
else {
//OLD WAY, for backwards compatibility
return groupModel.getGroupName();
}
//NEW WAY
// return ((ASLGroupModel)session.getAttribute("groupModel")).getGroupName();
//OLD WAY, for backwards compatibility
// return groupModel.getGroupName();
}
public void setUserEmailAddress(String email) {
//LET"S SET IT ON BOTH...
//NEW WAY
if(session != null)
session.setAttribute("userEmailAddress", email);
//OLD WAY, for backwards compatibility
this.userEmailAddress = email;
@ -664,6 +750,7 @@ public class ASLSession{
public String getUserEmailAddress() {
if(session != null) {
//HYBRID, TEMPORARY SOLUTION FOR FEATURE #5033
String httpUEA = (String)session.getAttribute("userEmailAddress");
if(userEmailAddress!=null)
@ -673,16 +760,20 @@ public class ASLSession{
return httpUEA;
}
return null;
}
else {
//OLD WAY, for backwards compatibility
return this.userEmailAddress;
}
//NEW WAY
// return (String)session.getAttribute("userEmailAddress");
//OLD WAY, for backwards compatibility
// return this.userEmailAddress;
}
public void setUserFullName(String fullName) {
//Let's set it on both
//NEW WAY
if(session != null)
session.setAttribute("fullName", fullName);
//OLD WAY, for backwards compatibility
this.fullName = fullName;
@ -690,6 +781,7 @@ public class ASLSession{
public String getUserFullName() {
if(session != null) {
//HYBRID, TEMPORARY SOLUTION FOR FEATURE #5033
String httpFN = (String)session.getAttribute("fullName");
if(fullName != null)
@ -699,23 +791,26 @@ public class ASLSession{
return httpFN;
}
return null;
}
else
//OLD WAY, for backwards compatibility
return this.fullName;
//NEW WAY
// return (String)session.getAttribute("fullName");
//OLD WAY, for backwards compatibility
// return this.fullName;
}
public void setUserAvatarId(String avatarId) {
//Let's set it on both
//NEW WAY
if(session != null)
session.setAttribute("avatarId", avatarId);
//OLD WAY, for backwards compatibility
this.avatarId = avatarId;
}
public String getUserAvatarId() {
if(session != null) {
//HYBRID, TEMPORARY SOLUTION FOR FEATURE #5033
String httpUAid = (String)session.getAttribute("avatarId");
if(this.avatarId != null)
@ -725,15 +820,18 @@ public class ASLSession{
return httpUAid;
}
return null;
}
else
//OLD WAY, for backwards compatibility
return this.avatarId;
//NEW WAY
// return (String)session.getAttribute("avatarId");
//OLD WAY, for backwards compatibility
// return this.avatarId;
}
public void setUserGender(GenderType gender) {
//Let's set it on both
//NEW WAY
if(session != null)
session.setAttribute("gender", gender);
//OLD WAY, for backwards compatibility
this.gender = gender;
@ -741,7 +839,7 @@ public class ASLSession{
public GenderType getUserGender() {
if(session != null) {
//HYBRID, TEMPORARY SOLUTION FOR FEATURE #5033
Object httpGObj = session.getAttribute("gender");
if(this.gender != null)
@ -751,15 +849,16 @@ public class ASLSession{
return (GenderType) httpGObj;
}
return null;
}
else
//OLD WAY, for backwards compatibility
return this.gender;
//NEW WAY
// return (GenderType)session.getAttribute("gender");
//OLD WAY, for backwards compatibility
// return this.gender;
}
public String getSecurityToken() {
if(session != null) {
//HYBRID, TEMPORARY SOLUTION FOR FEATURE #5033
String httpSecurityToken = (String)session.getAttribute("securityToken");
if(this.securityToken != null){
@ -772,13 +871,15 @@ public class ASLSession{
return httpSecurityToken;
}
return null; //if reached this point, means that all security tokens are null
}
else {
//OLD WAY, for backwards compatibility
logger.debug("Getting security token: " + securityToken+" in thread "+Thread.currentThread().getId());
return securityToken;
}
//NEW WAY
// String securityToken = (String)session.getAttribute("securityToken");
// logger.debug("Getting security token: " + securityToken+" in thread "+Thread.currentThread().getId());
// return securityToken;
//OLD WAY, for backwards compatibility
// logger.debug("Getting security token: " + securityToken+" in thread "+Thread.currentThread().getId());
// return securityToken;
}

View File

@ -5,8 +5,6 @@ import java.util.HashMap;
import java.util.Iterator;
import java.util.Set;
import javax.servlet.http.HttpSession;
import org.gcube.common.authorization.library.provider.SecurityTokenProvider;
import org.gcube.common.scope.api.ScopeProvider;
import org.slf4j.Logger;
@ -17,81 +15,75 @@ public class SessionManager {
/** The logger. */
private static final Logger logger = LoggerFactory.getLogger(SessionManager.class);
// protected static Thread thread = new CleanSessionThread();
protected static Thread thread = new CleanSessionThread();
protected static SessionManager sessionManager = new SessionManager();
protected HashMap<String, ASLSession> sessions;
protected SessionManager() {
sessions = new HashMap<String, ASLSession>();
// thread.setDaemon(true);
// thread.start();
thread.setDaemon(true);
thread.start();
}
public static SessionManager getInstance() {
return sessionManager;
}
public void setASLSession(HttpSession userSession, String username){
ASLSession aslSession = new ASLSession(userSession, username);
sessions.put(userSession.getId() + "_" + username, aslSession);
}
public ASLSession getASLSession(String externalSessionID, String username)
{
ASLSession session = sessions.get(externalSessionID + "_" + username);
// if(session == null || !session.isValid() || !session.getUsername().equals(username))
// {
// session = new ASLSession(externalSessionID, username);
// sessions.put(externalSessionID + "_" + username, session);
// }
// if (session.getScope()!=null) //covers first helper's invocation
// ScopeProvider.instance.set(session.getScopeName());
//
// if (session.getSecurityToken()!=null){
// logger.debug("Setting SecurityTokenProvider to: "+session.getSecurityToken()+" in thread "+Thread.currentThread().getId());
// SecurityTokenProvider.instance.set(session.getSecurityToken());
// }
if(session == null || !session.isValid() || !session.getUsername().equals(username))
{
session = new ASLSession(externalSessionID, username);
sessions.put(externalSessionID + "_" + username, session);
}
if (session.getScope()!=null) //covers first helper's invocation
ScopeProvider.instance.set(session.getScopeName());
if (session.getSecurityToken()!=null){
logger.debug("Setting SecurityTokenProvider to: "+session.getSecurityToken()+" in thread "+Thread.currentThread().getId());
SecurityTokenProvider.instance.set(session.getSecurityToken());
}
return session;
}
// @Override
// protected void finalize() throws Throwable {
// thread.interrupt();
// logger.debug(new Date(System.currentTimeMillis()) + " clean thread was interrupted");
// thread.join();
// logger.debug(new Date(System.currentTimeMillis()) + " clean thread was joint");
// super.finalize();
// }
// protected static class CleanSessionThread extends Thread
// {
// public void run()
// {
// while(true)
// {
// try {
// Thread.sleep(300000);
// } catch (InterruptedException e) {
// logger.error("Exception:", e);
// logger.debug(new Date(System.currentTimeMillis()) + " clean thread was interrupted (in clean thread)");
// break;
// }
// //TODO: cleanup invalid sessions: add locks...
// Set<String> keys = sessionManager.sessions.keySet();
// Iterator<String> iter = keys.iterator();
// while(iter.hasNext())
// {
// String extSessionID = iter.next();
// if(!sessionManager.sessions.get(extSessionID).isValid())
// {
// sessionManager.sessions.remove(extSessionID);
// }
// }
// }
// logger.debug(new Date(System.currentTimeMillis()) + " clean thread was terminated");
// }
//
// }
@Override
protected void finalize() throws Throwable {
thread.interrupt();
logger.debug(new Date(System.currentTimeMillis()) + " clean thread was interrupted");
thread.join();
logger.debug(new Date(System.currentTimeMillis()) + " clean thread was joint");
super.finalize();
}
protected static class CleanSessionThread extends Thread
{
public void run()
{
while(true)
{
try {
Thread.sleep(300000);
} catch (InterruptedException e) {
logger.error("Exception:", e);
logger.debug(new Date(System.currentTimeMillis()) + " clean thread was interrupted (in clean thread)");
break;
}
//TODO: cleanup invalid sessions: add locks...
Set<String> keys = sessionManager.sessions.keySet();
Iterator<String> iter = keys.iterator();
while(iter.hasNext())
{
String extSessionID = iter.next();
if(!sessionManager.sessions.get(extSessionID).isValid())
{
sessionManager.sessions.remove(extSessionID);
}
}
}
logger.debug(new Date(System.currentTimeMillis()) + " clean thread was terminated");
}
}
}

View File

@ -26,12 +26,12 @@ import org.gcube.application.framework.core.session.SessionManager;
import org.gcube.application.framework.core.util.CacheEntryConstants;
import org.gcube.application.framework.core.util.QueryString;
import org.gcube.application.framework.core.util.SessionConstants;
//import org.gcube.common.resources.gcore.Resources;
import org.gcube.common.resources.gcore.Resources;
import org.gcube.common.scope.api.ScopeProvider;
import org.gcube.informationsystem.publisher.RegistryPublisher;
import org.gcube.informationsystem.publisher.RegistryPublisherFactory;
//import org.gcube.informationsystem.publisher.ScopedPublisher;
//import org.gcube.informationsystem.publisher.stubs.registry.faults.PublisherException;
import org.gcube.informationsystem.publisher.ScopedPublisher;
import org.gcube.informationsystem.publisher.stubs.registry.faults.PublisherException;
import org.gcube.resources.discovery.client.api.DiscoveryClient;
import org.gcube.resources.discovery.client.queries.api.SimpleQuery;
import org.w3c.dom.Document;
@ -62,7 +62,7 @@ public class GenericResource implements GenericResourceInfoI {
// protected static ISPublisher publisher = null;
// protected static ISClient client = null;
// protected static ScopedPublisher scopedPublisher = null;
protected static ScopedPublisher scopedPublisher = null;
protected static RegistryPublisher publisher = null;
protected static DiscoveryClient<org.gcube.common.resources.gcore.GenericResource> client = null;
@ -82,7 +82,7 @@ public class GenericResource implements GenericResourceInfoI {
session = SessionManager.getInstance().getASLSession(extrenalSessionID, username);
try {
ScopeProvider.instance.set(session.getScope());
// scopedPublisher = RegistryPublisherFactory.scopedPublisher();
scopedPublisher = RegistryPublisherFactory.scopedPublisher();
publisher = RegistryPublisherFactory.create();
} catch (Exception e) {
logger.error("Exception:", e);
@ -109,7 +109,7 @@ public class GenericResource implements GenericResourceInfoI {
this.session = session;
try {
ScopeProvider.instance.set(session.getScope());
// scopedPublisher = RegistryPublisherFactory.scopedPublisher();
scopedPublisher = RegistryPublisherFactory.scopedPublisher();
publisher = RegistryPublisherFactory.create();
} catch (Exception e) {
logger.error("Exception:", e);
@ -316,8 +316,7 @@ public class GenericResource implements GenericResourceInfoI {
//maybe should change the visibility (into public) of addScope() within the Resource class of common-gcore-resources package in order to use it here.
List<String> scopes=new ArrayList<String>();
scopes.add(session.getScope());
org.gcube.common.resources.gcore.GenericResource res = publisher.create(gCubeRes, scopes);
org.gcube.common.resources.gcore.GenericResource res = scopedPublisher.create(gCubeRes, scopes);
logger.info("Created Generic Resource with id: "+res.id()+" on scope: "+scopes.toString());
// 1-oct-2013 -- adding generic resource to cache
@ -576,7 +575,7 @@ public class GenericResource implements GenericResourceInfoI {
// //TODO
// CachesManager.getInstance().getGenericResourceCache().get(queryString).setTimeToLive(0);
// }
} catch (Exception e) {
} catch (PublisherException e) {
logger.error("Exception:", e);
throw new RemoteException();
}

View File

@ -20,7 +20,7 @@ import org.gcube.common.resources.gcore.ServiceEndpoint;
import org.gcube.common.scope.api.ScopeProvider;
import org.gcube.informationsystem.publisher.RegistryPublisher;
import org.gcube.informationsystem.publisher.RegistryPublisherFactory;
//import org.gcube.informationsystem.publisher.ScopedPublisher;
import org.gcube.informationsystem.publisher.ScopedPublisher;
import org.gcube.informationsystem.publisher.exception.RegistryNotFoundException;
import org.gcube.resources.discovery.client.api.DiscoveryClient;
import org.slf4j.Logger;
@ -32,8 +32,8 @@ public class RuntimeResource {
private static final Logger logger = LoggerFactory.getLogger(RuntimeResource.class);
// protected static ScopedPublisher scopedPublisher = null;
protected static RegistryPublisher registryPublisher = null;
protected static ScopedPublisher scopedPublisher = null;
// protected static RegistryPublisher registryPublisher = null;
protected static DiscoveryClient<ServiceEndpoint> client = null;
/**
@ -47,9 +47,8 @@ public class RuntimeResource {
session = SessionManager.getInstance().getASLSession(extrenalSessionID, username);
try {
ScopeProvider.instance.set(session.getScope());
// scopedPublisher = RegistryPublisherFactory.scopedPublisher();
registryPublisher = RegistryPublisherFactory.create();
scopedPublisher = RegistryPublisherFactory.scopedPublisher();
// registryPublisher = RegistryPublisherFactory.create();
} catch (Exception e) {
logger.error("Exception:", e);
}
@ -71,8 +70,8 @@ public class RuntimeResource {
this.session = session;
try {
ScopeProvider.instance.set(session.getScope());
// scopedPublisher = RegistryPublisherFactory.scopedPublisher();
registryPublisher = RegistryPublisherFactory.create();
scopedPublisher = RegistryPublisherFactory.scopedPublisher();
// registryPublisher = RegistryPublisherFactory.create();
} catch (Exception e) {
logger.error("Exception:", e);
}
@ -96,8 +95,8 @@ public class RuntimeResource {
public String createRuntimeResource(ServiceEndpoint runtimeResource) throws RegistryNotFoundException {
List<String> scopes = new ArrayList<String>();
scopes.add(session.getScope());
// ServiceEndpoint se = scopedPublisher.create(runtimeResource, scopes);
ServiceEndpoint se = registryPublisher.create(runtimeResource);
ServiceEndpoint se = scopedPublisher.create(runtimeResource, scopes);
// ServiceEndpoint se = registryPublisher.create(runtimeResource);
logger.debug("Created Runtime Resource with id: "+se.id()+" on scope: "+scopes.toString());
return se.id();
}
@ -110,8 +109,8 @@ public class RuntimeResource {
*/
public String updateRuntimeResource(ServiceEndpoint runtimeResource) throws RemoteException {
try {
// ServiceEndpoint se = scopedPublisher.update(runtimeResource);
ServiceEndpoint se = registryPublisher.update(runtimeResource);
ServiceEndpoint se = scopedPublisher.update(runtimeResource);
// ServiceEndpoint se = registryPublisher.update(runtimeResource);
logger.debug("Updated Runtime Resource with id: "+runtimeResource.id()+"\tNew id : "+se.id());
return se.id();
} catch (Exception e) {
@ -130,8 +129,8 @@ public class RuntimeResource {
try {
List<String> scopes=new ArrayList<String>();
scopes.add(session.getScope());
// ServiceEndpoint se = scopedPublisher.remove(runtimeResource,scopes);
ServiceEndpoint se = registryPublisher.remove(runtimeResource);
ServiceEndpoint se = scopedPublisher.remove(runtimeResource,scopes);
// ServiceEndpoint se = registryPublisher.remove(runtimeResource);
logger.debug("Deleted Runtime Resource with id: "+runtimeResource.id());
return se.id();
} catch (Exception e) {