1/** 2 * $RCSfile$ 3 * $Revision$ 4 * $Date$ 5 * 6 * Copyright 2009 Jive Software. 7 * 8 * All rights reserved. Licensed under the Apache License, Version 2.0 (the "License"); 9 * you may not use this file except in compliance with the License. 10 * You may obtain a copy of the License at 11 * 12 * http://www.apache.org/licenses/LICENSE-2.0 13 * 14 * Unless required by applicable law or agreed to in writing, software 15 * distributed under the License is distributed on an "AS IS" BASIS, 16 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 17 * See the License for the specific language governing permissions and 18 * limitations under the License. 19 */ 20 21package org.jivesoftware.smack; 22 23import java.io.Reader; 24import java.io.Writer; 25import java.lang.reflect.Constructor; 26import java.util.ArrayList; 27import java.util.Collection; 28import java.util.Collections; 29import java.util.List; 30import java.util.Map; 31import java.util.Set; 32import java.util.concurrent.ConcurrentHashMap; 33import java.util.concurrent.ConcurrentLinkedQueue; 34import java.util.concurrent.CopyOnWriteArrayList; 35import java.util.concurrent.CopyOnWriteArraySet; 36import java.util.concurrent.atomic.AtomicInteger; 37 38import org.jivesoftware.smack.compression.JzlibInputOutputStream; 39import org.jivesoftware.smack.compression.XMPPInputOutputStream; 40import org.jivesoftware.smack.compression.Java7ZlibInputOutputStream; 41import org.jivesoftware.smack.debugger.SmackDebugger; 42import org.jivesoftware.smack.filter.PacketFilter; 43import org.jivesoftware.smack.packet.Packet; 44import org.jivesoftware.smack.packet.Presence; 45 46/** 47 * The abstract Connection class provides an interface for connections to a 48 * XMPP server and implements shared methods which are used by the 49 * different types of connections (e.g. XMPPConnection or BoshConnection). 50 * 51 * To create a connection to a XMPP server a simple usage of this API might 52 * look like the following: 53 * <pre> 54 * // Create a connection to the igniterealtime.org XMPP server. 55 * Connection con = new XMPPConnection("igniterealtime.org"); 56 * // Connect to the server 57 * con.connect(); 58 * // Most servers require you to login before performing other tasks. 59 * con.login("jsmith", "mypass"); 60 * // Start a new conversation with John Doe and send him a message. 61 * Chat chat = connection.getChatManager().createChat("jdoe@igniterealtime.org"</font>, new MessageListener() { 62 * <p/> 63 * public void processMessage(Chat chat, Message message) { 64 * // Print out any messages we get back to standard out. 65 * System.out.println(<font color="green">"Received message: "</font> + message); 66 * } 67 * }); 68 * chat.sendMessage(<font color="green">"Howdy!"</font>); 69 * // Disconnect from the server 70 * con.disconnect(); 71 * </pre> 72 * <p/> 73 * Connections can be reused between connections. This means that an Connection 74 * may be connected, disconnected and then connected again. Listeners of the Connection 75 * will be retained accross connections.<p> 76 * <p/> 77 * If a connected Connection gets disconnected abruptly then it will try to reconnect 78 * again. To stop the reconnection process, use {@link #disconnect()}. Once stopped 79 * you can use {@link #connect()} to manually connect to the server. 80 * 81 * @see XMPPConnection 82 * @author Matt Tucker 83 * @author Guenther Niess 84 */ 85public abstract class Connection { 86 87 /** 88 * Counter to uniquely identify connections that are created. 89 */ 90 private final static AtomicInteger connectionCounter = new AtomicInteger(0); 91 92 /** 93 * A set of listeners which will be invoked if a new connection is created. 94 */ 95 private final static Set<ConnectionCreationListener> connectionEstablishedListeners = 96 new CopyOnWriteArraySet<ConnectionCreationListener>(); 97 98 protected final static List<XMPPInputOutputStream> compressionHandlers = new ArrayList<XMPPInputOutputStream>(2); 99 100 /** 101 * Value that indicates whether debugging is enabled. When enabled, a debug 102 * window will apear for each new connection that will contain the following 103 * information:<ul> 104 * <li> Client Traffic -- raw XML traffic generated by Smack and sent to the server. 105 * <li> Server Traffic -- raw XML traffic sent by the server to the client. 106 * <li> Interpreted Packets -- shows XML packets from the server as parsed by Smack. 107 * </ul> 108 * <p/> 109 * Debugging can be enabled by setting this field to true, or by setting the Java system 110 * property <tt>smack.debugEnabled</tt> to true. The system property can be set on the 111 * command line such as "java SomeApp -Dsmack.debugEnabled=true". 112 */ 113 public static boolean DEBUG_ENABLED = false; 114 115 static { 116 // Use try block since we may not have permission to get a system 117 // property (for example, when an applet). 118 try { 119 DEBUG_ENABLED = Boolean.getBoolean("smack.debugEnabled"); 120 } 121 catch (Exception e) { 122 // Ignore. 123 } 124 // Ensure the SmackConfiguration class is loaded by calling a method in it. 125 SmackConfiguration.getVersion(); 126 // Add the Java7 compression handler first, since it's preferred 127 compressionHandlers.add(new Java7ZlibInputOutputStream()); 128 // If we don't have access to the Java7 API use the JZlib compression handler 129 compressionHandlers.add(new JzlibInputOutputStream()); 130 } 131 132 /** 133 * A collection of ConnectionListeners which listen for connection closing 134 * and reconnection events. 135 */ 136 protected final Collection<ConnectionListener> connectionListeners = 137 new CopyOnWriteArrayList<ConnectionListener>(); 138 139 /** 140 * A collection of PacketCollectors which collects packets for a specified filter 141 * and perform blocking and polling operations on the result queue. 142 */ 143 protected final Collection<PacketCollector> collectors = new ConcurrentLinkedQueue<PacketCollector>(); 144 145 /** 146 * List of PacketListeners that will be notified when a new packet was received. 147 */ 148 protected final Map<PacketListener, ListenerWrapper> recvListeners = 149 new ConcurrentHashMap<PacketListener, ListenerWrapper>(); 150 151 /** 152 * List of PacketListeners that will be notified when a new packet was sent. 153 */ 154 protected final Map<PacketListener, ListenerWrapper> sendListeners = 155 new ConcurrentHashMap<PacketListener, ListenerWrapper>(); 156 157 /** 158 * List of PacketInterceptors that will be notified when a new packet is about to be 159 * sent to the server. These interceptors may modify the packet before it is being 160 * actually sent to the server. 161 */ 162 protected final Map<PacketInterceptor, InterceptorWrapper> interceptors = 163 new ConcurrentHashMap<PacketInterceptor, InterceptorWrapper>(); 164 165 /** 166 * The AccountManager allows creation and management of accounts on an XMPP server. 167 */ 168 private AccountManager accountManager = null; 169 170 /** 171 * The ChatManager keeps track of references to all current chats. 172 */ 173 protected ChatManager chatManager = null; 174 175 /** 176 * The SmackDebugger allows to log and debug XML traffic. 177 */ 178 protected SmackDebugger debugger = null; 179 180 /** 181 * The Reader which is used for the {@see debugger}. 182 */ 183 protected Reader reader; 184 185 /** 186 * The Writer which is used for the {@see debugger}. 187 */ 188 protected Writer writer; 189 190 /** 191 * The permanent storage for the roster 192 */ 193 protected RosterStorage rosterStorage; 194 195 196 /** 197 * The SASLAuthentication manager that is responsible for authenticating with the server. 198 */ 199 protected SASLAuthentication saslAuthentication = new SASLAuthentication(this); 200 201 /** 202 * A number to uniquely identify connections that are created. This is distinct from the 203 * connection ID, which is a value sent by the server once a connection is made. 204 */ 205 protected final int connectionCounterValue = connectionCounter.getAndIncrement(); 206 207 /** 208 * Holds the initial configuration used while creating the connection. 209 */ 210 protected final ConnectionConfiguration config; 211 212 /** 213 * Holds the Caps Node information for the used XMPP service (i.e. the XMPP server) 214 */ 215 private String serviceCapsNode; 216 217 protected XMPPInputOutputStream compressionHandler; 218 219 /** 220 * Create a new Connection to a XMPP server. 221 * 222 * @param configuration The configuration which is used to establish the connection. 223 */ 224 protected Connection(ConnectionConfiguration configuration) { 225 config = configuration; 226 } 227 228 /** 229 * Returns the configuration used to connect to the server. 230 * 231 * @return the configuration used to connect to the server. 232 */ 233 protected ConnectionConfiguration getConfiguration() { 234 return config; 235 } 236 237 /** 238 * Returns the name of the service provided by the XMPP server for this connection. 239 * This is also called XMPP domain of the connected server. After 240 * authenticating with the server the returned value may be different. 241 * 242 * @return the name of the service provided by the XMPP server. 243 */ 244 public String getServiceName() { 245 return config.getServiceName(); 246 } 247 248 /** 249 * Returns the host name of the server where the XMPP server is running. This would be the 250 * IP address of the server or a name that may be resolved by a DNS server. 251 * 252 * @return the host name of the server where the XMPP server is running. 253 */ 254 public String getHost() { 255 return config.getHost(); 256 } 257 258 /** 259 * Returns the port number of the XMPP server for this connection. The default port 260 * for normal connections is 5222. The default port for SSL connections is 5223. 261 * 262 * @return the port number of the XMPP server. 263 */ 264 public int getPort() { 265 return config.getPort(); 266 } 267 268 /** 269 * Returns the full XMPP address of the user that is logged in to the connection or 270 * <tt>null</tt> if not logged in yet. An XMPP address is in the form 271 * username@server/resource. 272 * 273 * @return the full XMPP address of the user logged in. 274 */ 275 public abstract String getUser(); 276 277 /** 278 * Returns the connection ID for this connection, which is the value set by the server 279 * when opening a XMPP stream. If the server does not set a connection ID, this value 280 * will be null. This value will be <tt>null</tt> if not connected to the server. 281 * 282 * @return the ID of this connection returned from the XMPP server or <tt>null</tt> if 283 * not connected to the server. 284 */ 285 public abstract String getConnectionID(); 286 287 /** 288 * Returns true if currently connected to the XMPP server. 289 * 290 * @return true if connected. 291 */ 292 public abstract boolean isConnected(); 293 294 /** 295 * Returns true if currently authenticated by successfully calling the login method. 296 * 297 * @return true if authenticated. 298 */ 299 public abstract boolean isAuthenticated(); 300 301 /** 302 * Returns true if currently authenticated anonymously. 303 * 304 * @return true if authenticated anonymously. 305 */ 306 public abstract boolean isAnonymous(); 307 308 /** 309 * Returns true if the connection to the server has successfully negotiated encryption. 310 * 311 * @return true if a secure connection to the server. 312 */ 313 public abstract boolean isSecureConnection(); 314 315 /** 316 * Returns if the reconnection mechanism is allowed to be used. By default 317 * reconnection is allowed. 318 * 319 * @return true if the reconnection mechanism is allowed to be used. 320 */ 321 protected boolean isReconnectionAllowed() { 322 return config.isReconnectionAllowed(); 323 } 324 325 /** 326 * Returns true if network traffic is being compressed. When using stream compression network 327 * traffic can be reduced up to 90%. Therefore, stream compression is ideal when using a slow 328 * speed network connection. However, the server will need to use more CPU time in order to 329 * un/compress network data so under high load the server performance might be affected. 330 * 331 * @return true if network traffic is being compressed. 332 */ 333 public abstract boolean isUsingCompression(); 334 335 /** 336 * Establishes a connection to the XMPP server and performs an automatic login 337 * only if the previous connection state was logged (authenticated). It basically 338 * creates and maintains a connection to the server.<p> 339 * <p/> 340 * Listeners will be preserved from a previous connection if the reconnection 341 * occurs after an abrupt termination. 342 * 343 * @throws XMPPException if an error occurs while trying to establish the connection. 344 */ 345 public abstract void connect() throws XMPPException; 346 347 /** 348 * Logs in to the server using the strongest authentication mode supported by 349 * the server, then sets presence to available. If the server supports SASL authentication 350 * then the user will be authenticated using SASL if not Non-SASL authentication will 351 * be tried. If more than five seconds (default timeout) elapses in each step of the 352 * authentication process without a response from the server, or if an error occurs, a 353 * XMPPException will be thrown.<p> 354 * 355 * Before logging in (i.e. authenticate) to the server the connection must be connected. 356 * 357 * It is possible to log in without sending an initial available presence by using 358 * {@link ConnectionConfiguration#setSendPresence(boolean)}. If this connection is 359 * not interested in loading its roster upon login then use 360 * {@link ConnectionConfiguration#setRosterLoadedAtLogin(boolean)}. 361 * Finally, if you want to not pass a password and instead use a more advanced mechanism 362 * while using SASL then you may be interested in using 363 * {@link ConnectionConfiguration#setCallbackHandler(javax.security.auth.callback.CallbackHandler)}. 364 * For more advanced login settings see {@link ConnectionConfiguration}. 365 * 366 * @param username the username. 367 * @param password the password or <tt>null</tt> if using a CallbackHandler. 368 * @throws XMPPException if an error occurs. 369 */ 370 public void login(String username, String password) throws XMPPException { 371 login(username, password, "Smack"); 372 } 373 374 /** 375 * Logs in to the server using the strongest authentication mode supported by 376 * the server, then sets presence to available. If the server supports SASL authentication 377 * then the user will be authenticated using SASL if not Non-SASL authentication will 378 * be tried. If more than five seconds (default timeout) elapses in each step of the 379 * authentication process without a response from the server, or if an error occurs, a 380 * XMPPException will be thrown.<p> 381 * 382 * Before logging in (i.e. authenticate) to the server the connection must be connected. 383 * 384 * It is possible to log in without sending an initial available presence by using 385 * {@link ConnectionConfiguration#setSendPresence(boolean)}. If this connection is 386 * not interested in loading its roster upon login then use 387 * {@link ConnectionConfiguration#setRosterLoadedAtLogin(boolean)}. 388 * Finally, if you want to not pass a password and instead use a more advanced mechanism 389 * while using SASL then you may be interested in using 390 * {@link ConnectionConfiguration#setCallbackHandler(javax.security.auth.callback.CallbackHandler)}. 391 * For more advanced login settings see {@link ConnectionConfiguration}. 392 * 393 * @param username the username. 394 * @param password the password or <tt>null</tt> if using a CallbackHandler. 395 * @param resource the resource. 396 * @throws XMPPException if an error occurs. 397 * @throws IllegalStateException if not connected to the server, or already logged in 398 * to the serrver. 399 */ 400 public abstract void login(String username, String password, String resource) throws XMPPException; 401 402 /** 403 * Logs in to the server anonymously. Very few servers are configured to support anonymous 404 * authentication, so it's fairly likely logging in anonymously will fail. If anonymous login 405 * does succeed, your XMPP address will likely be in the form "123ABC@server/789XYZ" or 406 * "server/123ABC" (where "123ABC" and "789XYZ" is a random value generated by the server). 407 * 408 * @throws XMPPException if an error occurs or anonymous logins are not supported by the server. 409 * @throws IllegalStateException if not connected to the server, or already logged in 410 * to the serrver. 411 */ 412 public abstract void loginAnonymously() throws XMPPException; 413 414 /** 415 * Sends the specified packet to the server. 416 * 417 * @param packet the packet to send. 418 */ 419 public abstract void sendPacket(Packet packet); 420 421 /** 422 * Returns an account manager instance for this connection. 423 * 424 * @return an account manager for this connection. 425 */ 426 public AccountManager getAccountManager() { 427 if (accountManager == null) { 428 accountManager = new AccountManager(this); 429 } 430 return accountManager; 431 } 432 433 /** 434 * Returns a chat manager instance for this connection. The ChatManager manages all incoming and 435 * outgoing chats on the current connection. 436 * 437 * @return a chat manager instance for this connection. 438 */ 439 public synchronized ChatManager getChatManager() { 440 if (this.chatManager == null) { 441 this.chatManager = new ChatManager(this); 442 } 443 return this.chatManager; 444 } 445 446 /** 447 * Returns the roster for the user. 448 * <p> 449 * This method will never return <code>null</code>, instead if the user has not yet logged into 450 * the server or is logged in anonymously all modifying methods of the returned roster object 451 * like {@link Roster#createEntry(String, String, String[])}, 452 * {@link Roster#removeEntry(RosterEntry)} , etc. except adding or removing 453 * {@link RosterListener}s will throw an IllegalStateException. 454 * 455 * @return the user's roster. 456 */ 457 public abstract Roster getRoster(); 458 459 /** 460 * Set the store for the roster of this connection. If you set the roster storage 461 * of a connection you enable support for XEP-0237 (RosterVersioning) 462 * @param store the store used for roster versioning 463 * @throws IllegalStateException if you add a roster store when roster is initializied 464 */ 465 public abstract void setRosterStorage(RosterStorage storage) throws IllegalStateException; 466 467 /** 468 * Returns the SASLAuthentication manager that is responsible for authenticating with 469 * the server. 470 * 471 * @return the SASLAuthentication manager that is responsible for authenticating with 472 * the server. 473 */ 474 public SASLAuthentication getSASLAuthentication() { 475 return saslAuthentication; 476 } 477 478 /** 479 * Closes the connection by setting presence to unavailable then closing the connection to 480 * the XMPP server. The Connection can still be used for connecting to the server 481 * again.<p> 482 * <p/> 483 * This method cleans up all resources used by the connection. Therefore, the roster, 484 * listeners and other stateful objects cannot be re-used by simply calling connect() 485 * on this connection again. This is unlike the behavior during unexpected disconnects 486 * (and subsequent connections). In that case, all state is preserved to allow for 487 * more seamless error recovery. 488 */ 489 public void disconnect() { 490 disconnect(new Presence(Presence.Type.unavailable)); 491 } 492 493 /** 494 * Closes the connection. A custom unavailable presence is sent to the server, followed 495 * by closing the stream. The Connection can still be used for connecting to the server 496 * again. A custom unavilable presence is useful for communicating offline presence 497 * information such as "On vacation". Typically, just the status text of the presence 498 * packet is set with online information, but most XMPP servers will deliver the full 499 * presence packet with whatever data is set.<p> 500 * <p/> 501 * This method cleans up all resources used by the connection. Therefore, the roster, 502 * listeners and other stateful objects cannot be re-used by simply calling connect() 503 * on this connection again. This is unlike the behavior during unexpected disconnects 504 * (and subsequent connections). In that case, all state is preserved to allow for 505 * more seamless error recovery. 506 * 507 * @param unavailablePresence the presence packet to send during shutdown. 508 */ 509 public abstract void disconnect(Presence unavailablePresence); 510 511 /** 512 * Adds a new listener that will be notified when new Connections are created. Note 513 * that newly created connections will not be actually connected to the server. 514 * 515 * @param connectionCreationListener a listener interested on new connections. 516 */ 517 public static void addConnectionCreationListener( 518 ConnectionCreationListener connectionCreationListener) { 519 connectionEstablishedListeners.add(connectionCreationListener); 520 } 521 522 /** 523 * Removes a listener that was interested in connection creation events. 524 * 525 * @param connectionCreationListener a listener interested on new connections. 526 */ 527 public static void removeConnectionCreationListener( 528 ConnectionCreationListener connectionCreationListener) { 529 connectionEstablishedListeners.remove(connectionCreationListener); 530 } 531 532 /** 533 * Get the collection of listeners that are interested in connection creation events. 534 * 535 * @return a collection of listeners interested on new connections. 536 */ 537 protected static Collection<ConnectionCreationListener> getConnectionCreationListeners() { 538 return Collections.unmodifiableCollection(connectionEstablishedListeners); 539 } 540 541 /** 542 * Adds a connection listener to this connection that will be notified when 543 * the connection closes or fails. The connection needs to already be connected 544 * or otherwise an IllegalStateException will be thrown. 545 * 546 * @param connectionListener a connection listener. 547 */ 548 public void addConnectionListener(ConnectionListener connectionListener) { 549 if (!isConnected()) { 550 throw new IllegalStateException("Not connected to server."); 551 } 552 if (connectionListener == null) { 553 return; 554 } 555 if (!connectionListeners.contains(connectionListener)) { 556 connectionListeners.add(connectionListener); 557 } 558 } 559 560 /** 561 * Removes a connection listener from this connection. 562 * 563 * @param connectionListener a connection listener. 564 */ 565 public void removeConnectionListener(ConnectionListener connectionListener) { 566 connectionListeners.remove(connectionListener); 567 } 568 569 /** 570 * Get the collection of listeners that are interested in connection events. 571 * 572 * @return a collection of listeners interested on connection events. 573 */ 574 protected Collection<ConnectionListener> getConnectionListeners() { 575 return connectionListeners; 576 } 577 578 /** 579 * Creates a new packet collector for this connection. A packet filter determines 580 * which packets will be accumulated by the collector. A PacketCollector is 581 * more suitable to use than a {@link PacketListener} when you need to wait for 582 * a specific result. 583 * 584 * @param packetFilter the packet filter to use. 585 * @return a new packet collector. 586 */ 587 public PacketCollector createPacketCollector(PacketFilter packetFilter) { 588 PacketCollector collector = new PacketCollector(this, packetFilter); 589 // Add the collector to the list of active collectors. 590 collectors.add(collector); 591 return collector; 592 } 593 594 /** 595 * Remove a packet collector of this connection. 596 * 597 * @param collector a packet collectors which was created for this connection. 598 */ 599 protected void removePacketCollector(PacketCollector collector) { 600 collectors.remove(collector); 601 } 602 603 /** 604 * Get the collection of all packet collectors for this connection. 605 * 606 * @return a collection of packet collectors for this connection. 607 */ 608 protected Collection<PacketCollector> getPacketCollectors() { 609 return collectors; 610 } 611 612 /** 613 * Registers a packet listener with this connection. A packet filter determines 614 * which packets will be delivered to the listener. If the same packet listener 615 * is added again with a different filter, only the new filter will be used. 616 * 617 * @param packetListener the packet listener to notify of new received packets. 618 * @param packetFilter the packet filter to use. 619 */ 620 public void addPacketListener(PacketListener packetListener, PacketFilter packetFilter) { 621 if (packetListener == null) { 622 throw new NullPointerException("Packet listener is null."); 623 } 624 ListenerWrapper wrapper = new ListenerWrapper(packetListener, packetFilter); 625 recvListeners.put(packetListener, wrapper); 626 } 627 628 /** 629 * Removes a packet listener for received packets from this connection. 630 * 631 * @param packetListener the packet listener to remove. 632 */ 633 public void removePacketListener(PacketListener packetListener) { 634 recvListeners.remove(packetListener); 635 } 636 637 /** 638 * Get a map of all packet listeners for received packets of this connection. 639 * 640 * @return a map of all packet listeners for received packets. 641 */ 642 protected Map<PacketListener, ListenerWrapper> getPacketListeners() { 643 return recvListeners; 644 } 645 646 /** 647 * Registers a packet listener with this connection. The listener will be 648 * notified of every packet that this connection sends. A packet filter determines 649 * which packets will be delivered to the listener. Note that the thread 650 * that writes packets will be used to invoke the listeners. Therefore, each 651 * packet listener should complete all operations quickly or use a different 652 * thread for processing. 653 * 654 * @param packetListener the packet listener to notify of sent packets. 655 * @param packetFilter the packet filter to use. 656 */ 657 public void addPacketSendingListener(PacketListener packetListener, PacketFilter packetFilter) { 658 if (packetListener == null) { 659 throw new NullPointerException("Packet listener is null."); 660 } 661 ListenerWrapper wrapper = new ListenerWrapper(packetListener, packetFilter); 662 sendListeners.put(packetListener, wrapper); 663 } 664 665 /** 666 * Removes a packet listener for sending packets from this connection. 667 * 668 * @param packetListener the packet listener to remove. 669 */ 670 public void removePacketSendingListener(PacketListener packetListener) { 671 sendListeners.remove(packetListener); 672 } 673 674 /** 675 * Get a map of all packet listeners for sending packets of this connection. 676 * 677 * @return a map of all packet listeners for sent packets. 678 */ 679 protected Map<PacketListener, ListenerWrapper> getPacketSendingListeners() { 680 return sendListeners; 681 } 682 683 684 /** 685 * Process all packet listeners for sending packets. 686 * 687 * @param packet the packet to process. 688 */ 689 protected void firePacketSendingListeners(Packet packet) { 690 // Notify the listeners of the new sent packet 691 for (ListenerWrapper listenerWrapper : sendListeners.values()) { 692 listenerWrapper.notifyListener(packet); 693 } 694 } 695 696 /** 697 * Registers a packet interceptor with this connection. The interceptor will be 698 * invoked every time a packet is about to be sent by this connection. Interceptors 699 * may modify the packet to be sent. A packet filter determines which packets 700 * will be delivered to the interceptor. 701 * 702 * @param packetInterceptor the packet interceptor to notify of packets about to be sent. 703 * @param packetFilter the packet filter to use. 704 */ 705 public void addPacketInterceptor(PacketInterceptor packetInterceptor, 706 PacketFilter packetFilter) { 707 if (packetInterceptor == null) { 708 throw new NullPointerException("Packet interceptor is null."); 709 } 710 interceptors.put(packetInterceptor, new InterceptorWrapper(packetInterceptor, packetFilter)); 711 } 712 713 /** 714 * Removes a packet interceptor. 715 * 716 * @param packetInterceptor the packet interceptor to remove. 717 */ 718 public void removePacketInterceptor(PacketInterceptor packetInterceptor) { 719 interceptors.remove(packetInterceptor); 720 } 721 722 public boolean isSendPresence() { 723 return config.isSendPresence(); 724 } 725 726 /** 727 * Get a map of all packet interceptors for sending packets of this connection. 728 * 729 * @return a map of all packet interceptors for sending packets. 730 */ 731 protected Map<PacketInterceptor, InterceptorWrapper> getPacketInterceptors() { 732 return interceptors; 733 } 734 735 /** 736 * Process interceptors. Interceptors may modify the packet that is about to be sent. 737 * Since the thread that requested to send the packet will invoke all interceptors, it 738 * is important that interceptors perform their work as soon as possible so that the 739 * thread does not remain blocked for a long period. 740 * 741 * @param packet the packet that is going to be sent to the server 742 */ 743 protected void firePacketInterceptors(Packet packet) { 744 if (packet != null) { 745 for (InterceptorWrapper interceptorWrapper : interceptors.values()) { 746 interceptorWrapper.notifyListener(packet); 747 } 748 } 749 } 750 751 /** 752 * Initialize the {@link #debugger}. You can specify a customized {@link SmackDebugger} 753 * by setup the system property <code>smack.debuggerClass</code> to the implementation. 754 * 755 * @throws IllegalStateException if the reader or writer isn't yet initialized. 756 * @throws IllegalArgumentException if the SmackDebugger can't be loaded. 757 */ 758 protected void initDebugger() { 759 if (reader == null || writer == null) { 760 throw new NullPointerException("Reader or writer isn't initialized."); 761 } 762 // If debugging is enabled, we open a window and write out all network traffic. 763 if (config.isDebuggerEnabled()) { 764 if (debugger == null) { 765 // Detect the debugger class to use. 766 String className = null; 767 // Use try block since we may not have permission to get a system 768 // property (for example, when an applet). 769 try { 770 className = System.getProperty("smack.debuggerClass"); 771 } 772 catch (Throwable t) { 773 // Ignore. 774 } 775 Class<?> debuggerClass = null; 776 if (className != null) { 777 try { 778 debuggerClass = Class.forName(className); 779 } 780 catch (Exception e) { 781 e.printStackTrace(); 782 } 783 } 784 if (debuggerClass == null) { 785 try { 786 debuggerClass = 787 Class.forName("de.measite.smack.AndroidDebugger"); 788 } 789 catch (Exception ex) { 790 try { 791 debuggerClass = 792 Class.forName("org.jivesoftware.smack.debugger.ConsoleDebugger"); 793 } 794 catch (Exception ex2) { 795 ex2.printStackTrace(); 796 } 797 } 798 } 799 // Create a new debugger instance. If an exception occurs then disable the debugging 800 // option 801 try { 802 Constructor<?> constructor = debuggerClass 803 .getConstructor(Connection.class, Writer.class, Reader.class); 804 debugger = (SmackDebugger) constructor.newInstance(this, writer, reader); 805 reader = debugger.getReader(); 806 writer = debugger.getWriter(); 807 } 808 catch (Exception e) { 809 throw new IllegalArgumentException("Can't initialize the configured debugger!", e); 810 } 811 } 812 else { 813 // Obtain new reader and writer from the existing debugger 814 reader = debugger.newConnectionReader(reader); 815 writer = debugger.newConnectionWriter(writer); 816 } 817 } 818 819 } 820 821 /** 822 * Set the servers Entity Caps node 823 * 824 * Connection holds this information in order to avoid a dependency to 825 * smackx where EntityCapsManager lives from smack. 826 * 827 * @param node 828 */ 829 protected void setServiceCapsNode(String node) { 830 serviceCapsNode = node; 831 } 832 833 /** 834 * Retrieve the servers Entity Caps node 835 * 836 * Connection holds this information in order to avoid a dependency to 837 * smackx where EntityCapsManager lives from smack. 838 * 839 * @return 840 */ 841 public String getServiceCapsNode() { 842 return serviceCapsNode; 843 } 844 845 /** 846 * A wrapper class to associate a packet filter with a listener. 847 */ 848 protected static class ListenerWrapper { 849 850 private PacketListener packetListener; 851 private PacketFilter packetFilter; 852 853 /** 854 * Create a class which associates a packet filter with a listener. 855 * 856 * @param packetListener the packet listener. 857 * @param packetFilter the associated filter or null if it listen for all packets. 858 */ 859 public ListenerWrapper(PacketListener packetListener, PacketFilter packetFilter) { 860 this.packetListener = packetListener; 861 this.packetFilter = packetFilter; 862 } 863 864 /** 865 * Notify and process the packet listener if the filter matches the packet. 866 * 867 * @param packet the packet which was sent or received. 868 */ 869 public void notifyListener(Packet packet) { 870 if (packetFilter == null || packetFilter.accept(packet)) { 871 packetListener.processPacket(packet); 872 } 873 } 874 } 875 876 /** 877 * A wrapper class to associate a packet filter with an interceptor. 878 */ 879 protected static class InterceptorWrapper { 880 881 private PacketInterceptor packetInterceptor; 882 private PacketFilter packetFilter; 883 884 /** 885 * Create a class which associates a packet filter with an interceptor. 886 * 887 * @param packetInterceptor the interceptor. 888 * @param packetFilter the associated filter or null if it intercepts all packets. 889 */ 890 public InterceptorWrapper(PacketInterceptor packetInterceptor, PacketFilter packetFilter) { 891 this.packetInterceptor = packetInterceptor; 892 this.packetFilter = packetFilter; 893 } 894 895 public boolean equals(Object object) { 896 if (object == null) { 897 return false; 898 } 899 if (object instanceof InterceptorWrapper) { 900 return ((InterceptorWrapper) object).packetInterceptor 901 .equals(this.packetInterceptor); 902 } 903 else if (object instanceof PacketInterceptor) { 904 return object.equals(this.packetInterceptor); 905 } 906 return false; 907 } 908 909 /** 910 * Notify and process the packet interceptor if the filter matches the packet. 911 * 912 * @param packet the packet which will be sent. 913 */ 914 public void notifyListener(Packet packet) { 915 if (packetFilter == null || packetFilter.accept(packet)) { 916 packetInterceptor.interceptPacket(packet); 917 } 918 } 919 } 920} 921