import io.netty.channel.EventLoopGroup;
import io.netty.util.Timer;
import io.netty.util.concurrent.Future;
-import java.io.Closeable;
+import java.util.LinkedHashSet;
+import java.util.List;
+import java.util.Set;
import org.opendaylight.netconf.client.conf.NetconfClientConfiguration;
import org.opendaylight.netconf.client.conf.NetconfReconnectingClientConfiguration;
import org.opendaylight.protocol.framework.AbstractDispatcher;
+import org.opendaylight.yang.gen.v1.urn.ietf.params.xml.ns.yang.ietf.inet.types.rev130715.Uri;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
public class NetconfClientDispatcherImpl extends AbstractDispatcher<NetconfClientSession, NetconfClientSessionListener>
- implements NetconfClientDispatcher, Closeable {
+ implements NetconfClientDispatcher {
private static final Logger LOG = LoggerFactory.getLogger(NetconfClientDispatcherImpl.class);
return createTcpClient(clientConfiguration);
case SSH:
return createSshClient(clientConfiguration);
+ case TLS:
+ return createTlsClient(clientConfiguration);
default:
throw new IllegalArgumentException("Unknown client protocol " + clientConfiguration.getProtocol());
}
return createReconnectingTcpClient(clientConfiguration);
case SSH:
return createReconnectingSshClient(clientConfiguration);
+ case TLS:
+ return createReconnectingTlsClient(clientConfiguration);
default:
throw new IllegalArgumentException("Unknown client protocol " + clientConfiguration.getProtocol());
}
init::initialize);
}
+ private Future<NetconfClientSession> createTlsClient(final NetconfClientConfiguration currentConfiguration) {
+ LOG.debug("Creating TLS client with configuration: {}", currentConfiguration);
+ return super.createClient(currentConfiguration.getAddress(), currentConfiguration.getReconnectStrategy(),
+ (ch, sessionPromise) -> new TlsClientChannelInitializer(currentConfiguration.getSslHandlerFactory(),
+ getNegotiatorFactory(currentConfiguration), currentConfiguration.getSessionListener())
+ .initialize(ch, sessionPromise));
+ }
+
+ private Future<Void> createReconnectingTlsClient(
+ final NetconfReconnectingClientConfiguration currentConfiguration) {
+ LOG.debug("Creating reconnecting TLS client with configuration: {}", currentConfiguration);
+ final TlsClientChannelInitializer init = new TlsClientChannelInitializer(
+ currentConfiguration.getSslHandlerFactory(), getNegotiatorFactory(currentConfiguration),
+ currentConfiguration.getSessionListener());
+
+ return super.createReconnectingClient(currentConfiguration.getAddress(), currentConfiguration
+ .getConnectStrategyFactory(), currentConfiguration.getReconnectStrategy(),
+ init::initialize);
+ }
+
protected NetconfClientSessionNegotiatorFactory getNegotiatorFactory(final NetconfClientConfiguration cfg) {
- return new NetconfClientSessionNegotiatorFactory(timer, cfg.getAdditionalHeader(),
- cfg.getConnectionTimeoutMillis());
+ final List<Uri> odlHelloCapabilities = cfg.getOdlHelloCapabilities();
+ if (odlHelloCapabilities == null || odlHelloCapabilities.isEmpty()) {
+ return new NetconfClientSessionNegotiatorFactory(timer, cfg.getAdditionalHeader(),
+ cfg.getConnectionTimeoutMillis());
+ } else {
+ // LinkedHashSet since perhaps the device cares about order of hello message capabilities.
+ // This allows user control of the order while complying with the existing interface.
+ final Set<String> stringCapabilities = new LinkedHashSet<>();
+ for (final Uri uri : odlHelloCapabilities) {
+ stringCapabilities.add(uri.getValue());
+ }
+ return new NetconfClientSessionNegotiatorFactory(timer, cfg.getAdditionalHeader(),
+ cfg.getConnectionTimeoutMillis(), stringCapabilities);
+ }
}
}