@Override protected void addAdditionalContextValues(final String action, final TransportRequest request, final X509Certificate[] localCerts, final X509Certificate[] peerCerts, final String principal) throws Exception { boolean isInterClusterRequest = requestEvalProvider.isInterClusterRequest(request, localCerts, peerCerts, principal); if (isInterClusterRequest) { boolean fromTn = Boolean.parseBoolean(getThreadContext().getHeader("_sg_header_tn")); if(fromTn || cs.getClusterName().value().equals(getThreadContext().getHeader("_sg_remotecn"))) { if (log.isTraceEnabled() && !action.startsWith("internal:")) { log.trace("Is inter cluster request ({}/{}/{})", action, request.getClass(), request.remoteAddress()); } getThreadContext().putTransient(ConfigConstants.SG_SSL_TRANSPORT_INTERCLUSTER_REQUEST, Boolean.TRUE); } else { getThreadContext().putTransient(ConfigConstants.SG_SSL_TRANSPORT_TRUSTED_CLUSTER_REQUEST, Boolean.TRUE); } } else { if (log.isTraceEnabled()) { log.trace("Is not an inter cluster request"); } } super.addAdditionalContextValues(action, request, localCerts, peerCerts, principal); } }
public User authenticate(final TransportRequest request, final String sslPrincipal, final Task task, final String action) { if(log.isDebugEnabled() && request.remoteAddress() != null) { log.debug("Transport authentication request from {}", request.remoteAddress()); log.warn("Transport authentication finally failed for {} from {}", creds == null ? impersonatedTransportUser==null?origPKIUser.getName():impersonatedTransportUser.getName():creds.getUsername(), request.remoteAddress());
getThreadContext().putTransient(ConfigConstants.SG_REMOTE_ADDRESS, new TransportAddress((InetSocketAddress) Base64Helper.deserializeObject(originalRemoteAddress))); } else { getThreadContext().putTransient(ConfigConstants.SG_REMOTE_ADDRESS, request.remoteAddress()); TransportAddress originalRemoteAddress = request.remoteAddress();
messageLengthBytes, TransportStatus.isCompress(status)); final TransportRequest request = reg.newRequest(stream); request.remoteAddress(new TransportAddress(remoteAddress));
private AuditMessage(final String username, final String message, final TransportRequest request) { auditInfo.put("audit_user", username); auditInfo.put("audit_message", message); auditInfo.put("audit_date", new Date().toString()); auditInfo.put("audit_details_context", String.valueOf(request.getContext())); auditInfo.put("audit_details_headers", String.valueOf(request.getHeaders())); auditInfo.put("audit_details_class", request.getClass().toString()); auditInfo.put("audit_ip", String.valueOf(request.remoteAddress())); }
public static RequestIdentifier from(TransportRequest request) { if (request.remoteAddress() == null || request.remoteAddress().address().getHostName() == null) { return new RequestIdentifier(ANONYMOUS_ID, true); } return new RequestIdentifier(request.remoteAddress().address().getHostName().toLowerCase(), false); }
@Override protected void addAdditionalContextValues(final String action, final TransportRequest request, final X509Certificate[] localCerts, final X509Certificate[] peerCerts, final String principal) throws Exception { boolean isInterClusterRequest = requestEvalProvider.isInterClusterRequest(request, localCerts, peerCerts, principal); if (isInterClusterRequest) { boolean fromTn = Boolean.parseBoolean(getThreadContext().getHeader("_sg_header_tn")); if(fromTn || cs.getClusterName().value().equals(getThreadContext().getHeader("_sg_remotecn"))) { if (log.isTraceEnabled() && !action.startsWith("internal:")) { log.trace("Is inter cluster request ({}/{}/{})", action, request.getClass(), request.remoteAddress()); } getThreadContext().putTransient(ConfigConstants.SG_SSL_TRANSPORT_INTERCLUSTER_REQUEST, Boolean.TRUE); } else { getThreadContext().putTransient(ConfigConstants.SG_SSL_TRANSPORT_TRUSTED_CLUSTER_REQUEST, Boolean.TRUE); } } else { if (log.isTraceEnabled()) { log.trace("Is not an inter cluster request"); } } super.addAdditionalContextValues(action, request, localCerts, peerCerts, principal); } }
public User authenticate(final TransportRequest request, final String sslPrincipal, final Task task, final String action) { if(log.isDebugEnabled() && request.remoteAddress() != null) { log.debug("Transport authentication request from {}", request.remoteAddress()); log.warn("Transport authentication finally failed for {} from {}", creds == null ? impersonatedTransportUser==null?origPKIUser.getName():impersonatedTransportUser.getName():creds.getUsername(), request.remoteAddress());
getThreadContext().putTransient(ConfigConstants.SG_REMOTE_ADDRESS, new TransportAddress((InetSocketAddress) Base64Helper.deserializeObject(originalRemoteAddress))); } else { getThreadContext().putTransient(ConfigConstants.SG_REMOTE_ADDRESS, request.remoteAddress()); TransportAddress originalRemoteAddress = request.remoteAddress();
messageLengthBytes); final TransportRequest request = reg.newRequest(stream); request.remoteAddress(new TransportAddress(remoteAddress));
request.remoteAddress(sourceTransport.boundAddress.publishAddress()); request.readFrom(stream); if (ThreadPool.Names.SAME.equals(reg.getExecutor())) {
request.remoteAddress(sourceTransport.boundAddress.publishAddress()); request.readFrom(stream); if (ThreadPool.Names.SAME.equals(reg.getExecutor())) {
requestId, version, profileName, messageLengthBytes); final TransportRequest request = reg.newRequest(); request.remoteAddress(new InetSocketTransportAddress((InetSocketAddress) channel.getRemoteAddress())); request.readFrom(buffer);
messageLengthBytes); final TransportRequest request = reg.newRequest(); request.remoteAddress(new InetSocketTransportAddress(remoteAddress)); request.readFrom(stream);