From 6eb644e87eb6e993e03b9254d5948f3004756afa Mon Sep 17 00:00:00 2001 From: Andriy Redko Date: Wed, 27 Mar 2024 09:06:04 -0400 Subject: [PATCH] Address code review comments Signed-off-by: Andriy Redko --- .../ssl/SecureNetty4HttpServerTransport.java | 46 ++++++++++++------- 1 file changed, 30 insertions(+), 16 deletions(-) diff --git a/modules/transport-netty4/src/main/java/org/opensearch/http/netty4/ssl/SecureNetty4HttpServerTransport.java b/modules/transport-netty4/src/main/java/org/opensearch/http/netty4/ssl/SecureNetty4HttpServerTransport.java index 3636161258b9c..d5925fc94f0d1 100644 --- a/modules/transport-netty4/src/main/java/org/opensearch/http/netty4/ssl/SecureNetty4HttpServerTransport.java +++ b/modules/transport-netty4/src/main/java/org/opensearch/http/netty4/ssl/SecureNetty4HttpServerTransport.java @@ -50,7 +50,9 @@ import javax.net.ssl.SSLEngine; +import java.util.List; import java.util.Optional; +import java.util.stream.Collectors; import io.netty.channel.Channel; import io.netty.channel.ChannelHandler; @@ -102,28 +104,40 @@ public SecureNetty4HttpServerTransport( this.exceptionHandler = secureHttpTransportSettingsProvider.buildHttpServerExceptionHandler(settings, this) .orElse(TransportExceptionHandler.NOOP); - this.headerVerifier = secureHttpTransportSettingsProvider.getHttpTransportAdapterProviders(settings) + final List headerVerifiers = secureHttpTransportSettingsProvider.getHttpTransportAdapterProviders( + settings + ) .stream() .filter(p -> HEADER_VERIFIER.equalsIgnoreCase(p.name())) - .findFirst() - .flatMap(p -> p.create(settings, this, ChannelInboundHandlerAdapter.class)) - .orElse(null); + .map(p -> p.create(settings, this, ChannelInboundHandlerAdapter.class)) + .filter(Optional::isPresent) + .map(Optional::get) + .collect(Collectors.toList()); - this.decompressorProvider = secureHttpTransportSettingsProvider.getHttpTransportAdapterProviders(settings) + if (headerVerifiers.size() > 1) { + throw new IllegalArgumentException("Cannot have more than one header verifier configured, supplied " + headerVerifiers.size()); + } + + final Optional> decompressorProviderOpt = secureHttpTransportSettingsProvider + .getHttpTransportAdapterProviders(settings) .stream() .filter(p -> REQUEST_DECOMPRESSOR.equalsIgnoreCase(p.name())) - .findFirst() - .orElseGet(() -> new TransportAdapterProvider() { - @Override - public String name() { - return REQUEST_DECOMPRESSOR; - } + .findFirst(); + // There could be multiple request decompressor providers configured, using the first one + decompressorProviderOpt.ifPresent(p -> logger.debug("Using request decompressor provider: {}", p)); - @Override - public Optional create(Settings settings, HttpServerTransport transport, Class adapterClass) { - return Optional.empty(); - } - }); + this.headerVerifier = headerVerifiers.isEmpty() ? null : headerVerifiers.get(0); + this.decompressorProvider = decompressorProviderOpt.orElseGet(() -> new TransportAdapterProvider() { + @Override + public String name() { + return REQUEST_DECOMPRESSOR; + } + + @Override + public Optional create(Settings settings, HttpServerTransport transport, Class adapterClass) { + return Optional.empty(); + } + }); } @Override