/* * Copyright (c) 2006-2015 DMDirc Developers * * Permission is hereby granted, free of charge, to any person obtaining a copy * of this software and associated documentation files (the "Software"), to deal * in the Software without restriction, including without limitation the rights * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell * copies of the Software, and to permit persons to whom the Software is * furnished to do so, subject to the following conditions: * * The above copyright notice and this permission notice shall be included in * all copies or substantial portions of the Software. * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE * SOFTWARE. */ package com.dmdirc.config; import com.dmdirc.interfaces.config.ConfigChangeListener; import com.dmdirc.interfaces.config.ConfigProvider; import com.dmdirc.util.io.ConfigFile; import com.dmdirc.util.io.InvalidConfigFileException; import com.dmdirc.util.validators.Validator; import java.io.IOException; import java.io.InputStream; import java.lang.ref.WeakReference; import java.nio.file.Path; import java.util.Collection; import java.util.HashMap; import java.util.HashSet; import java.util.LinkedList; import java.util.List; import java.util.Map; import java.util.Objects; import java.util.Set; import java.util.concurrent.CopyOnWriteArrayList; import javax.annotation.Nullable; import org.slf4j.Logger; import org.slf4j.LoggerFactory; import static com.dmdirc.util.LogUtils.USER_ERROR; /** * Provides configuration settings from a {@link ConfigFile}. */ public class ConfigFileBackedConfigProvider implements ConfigProvider { private static final Logger LOG = LoggerFactory.getLogger(ConfigFileBackedConfigProvider.class); /** The domain used for identity settings. */ private static final String DOMAIN = "identity"; /** The domain used for profile settings. */ private static final String PROFILE_DOMAIN = "profile"; /** The target for this identity. */ protected final ConfigTarget myTarget; /** The identity manager to use for writable configs. */ @Nullable private final IdentityManager identityManager; /** The configuration details for this identity. */ protected final ConfigFile file; /** The global config manager. */ protected ConfigManager globalConfig; /** The config change listeners for this source. */ protected final List> listeners = new CopyOnWriteArrayList<>(); /** Whether this identity needs to be saved. */ protected boolean needSave; /** * Creates a new instance of Identity. * * @param identityManager The manager to use for hackily reading global state. * @param file The file to load this identity from * @param forceDefault Whether to force this identity to be loaded as default identity or not * * @throws InvalidIdentityFileException Missing required properties * @throws IOException Input/output exception */ public ConfigFileBackedConfigProvider( @Nullable final IdentityManager identityManager, final Path file, final boolean forceDefault) throws IOException, InvalidIdentityFileException { this.identityManager = identityManager; this.file = new ConfigFile(file); this.file.setAutomake(true); initFile(forceDefault); myTarget = getTarget(forceDefault); } /** * Creates a new read-only identity. * * @param stream The input stream to read the identity from * @param forceDefault Whether to force this identity to be loaded as default identity or not * * @throws InvalidIdentityFileException Missing required properties * @throws IOException Input/output exception */ public ConfigFileBackedConfigProvider(final InputStream stream, final boolean forceDefault) throws IOException, InvalidIdentityFileException { this.identityManager = null; this.file = new ConfigFile(stream); file.setAutomake(true); initFile(forceDefault); myTarget = getTarget(forceDefault); } /** * Creates a new identity from the specified config file. * * @param identityManager The manager to use for hackily reading global state. * @param configFile The config file to use * @param target The target of this identity */ public ConfigFileBackedConfigProvider(@Nullable final IdentityManager identityManager, final ConfigFile configFile, final ConfigTarget target) { this.identityManager = identityManager; this.file = configFile; file.setAutomake(true); this.myTarget = target; } /** * Determines and returns the target for this identity from its contents. * * @param forceDefault Whether to force this to be a default identity * * @return A ConfigTarget for this identity * * @throws InvalidIdentityFileException If the identity isn't valid */ private ConfigTarget getTarget(final boolean forceDefault) throws InvalidIdentityFileException { final ConfigTarget target = new ConfigTarget(); if (hasOptionString(DOMAIN, "ircd")) { target.setIrcd(getOption(DOMAIN, "ircd")); } else if (hasOptionString(DOMAIN, "protocol")) { target.setProtocol(getOption(DOMAIN, "protocol")); } else if (hasOptionString(DOMAIN, "network")) { target.setNetwork(getOption(DOMAIN, "network")); } else if (hasOptionString(DOMAIN, "server")) { target.setServer(getOption(DOMAIN, "server")); } else if (hasOptionString(DOMAIN, "channel")) { target.setChannel(getOption(DOMAIN, "channel")); } else if (hasOptionString(DOMAIN, "globaldefault")) { target.setGlobalDefault(); } else if (hasOptionString(DOMAIN, "global") || forceDefault && !isProfile()) { target.setGlobal(); } else if (isProfile()) { target.setCustom(PROFILE_DOMAIN); } else if (hasOptionString(DOMAIN, "type")) { target.setCustom(getOption(DOMAIN, "type")); } else { throw new InvalidIdentityFileException("No target and no profile"); } if (hasOptionString(DOMAIN, "order")) { target.setOrder(getOptionInt(DOMAIN, "order")); } return target; } /** * Initialises this identity from a file. * * @since 0.6.3 * @param forceDefault Whether to force this to be a default identity * * @throws InvalidIdentityFileException if the identity file is invalid * @throws IOException On I/O exception when reading the identity */ private void initFile(final boolean forceDefault) throws InvalidIdentityFileException, IOException { try { file.read(); } catch (InvalidConfigFileException ex) { throw new InvalidIdentityFileException(ex); } if (!hasOptionString(DOMAIN, "name") && !forceDefault) { throw new InvalidIdentityFileException("No name specified"); } } @Override public void reload() throws IOException, InvalidConfigFileException { if (needSave) { return; } final Collection changes = new LinkedList<>(); synchronized (this) { final Map> oldProps = new HashMap<>(file.getKeyDomains()); file.read(); for (Map.Entry> entry : file.getKeyDomains().entrySet()) { final String domain = entry.getKey(); for (Map.Entry subentry : entry.getValue().entrySet()) { final String key = subentry.getKey(); final String value = subentry.getValue(); if (!oldProps.containsKey(domain) || !oldProps.get(domain).containsKey(key)) { // Newly added (didn't exist in the old file) changes.add(new String[]{domain, key}); } else if (!oldProps.get(domain).get(key).equals(value)) { // Modified in some way changes.add(new String[]{domain, key}); oldProps.get(domain).remove(key); } else { // Not modified oldProps.get(domain).remove(key); } } // Anything left in the domain must have been moved if (oldProps.containsKey(domain)) { for (String key : oldProps.get(domain).keySet()) { changes.add(new String[]{domain, key}); } } oldProps.remove(domain); } // Any domains left must have been removed for (Map.Entry> entry : oldProps.entrySet()) { for (String key : entry.getValue().keySet()) { changes.add(new String[]{entry.getKey(), key}); } } } for (String[] change : changes) { fireSettingChange(change[0], change[1]); } } /** * Fires the config changed listener for the specified option after this identity is reloaded. * * @param domain The domain of the option that's changed * @param key The key of the option that's changed * * @since 0.6.3m1 */ private void fireSettingChange(final String domain, final String key) { listeners.stream() .map(WeakReference::get) .filter(Objects::nonNull) .forEach(l -> l.configChanged(domain, key)); } @Override public String getName() { if (hasOptionString(DOMAIN, "name")) { return getOption(DOMAIN, "name"); } else { return "Unnamed"; } } @Override public boolean isProfile() { return (hasOptionString(PROFILE_DOMAIN, "nicknames") || hasOptionString(PROFILE_DOMAIN, "nickname")) && hasOptionString(PROFILE_DOMAIN, "realname"); } @Override public boolean hasOption(final String domain, final String option, final Validator validator) { return file.isKeyDomain(domain) && file.getKeyDomain(domain).containsKey(option) && !validator.validate(file.getKeyDomain(domain).get(option)).isFailure(); } @Override public synchronized String getOption(final String domain, final String option, final Validator validator) { final String value = file.getKeyDomain(domain).get(option); if (validator.validate(value).isFailure()) { return null; } return value; } @Override public void setOption(final String domain, final String option, final String value) { final String oldValue; boolean unset = false; synchronized (this) { oldValue = getOption(domain, option); LOG.trace("{}: setting {}.{} to {} (was: {})", getName(), domain, option, value, oldValue); if (myTarget.getType() == ConfigTarget.TYPE.GLOBAL) { // If we're the global config, don't set useless settings that are // covered by global defaults. if (globalConfig == null) { // TODO: This is horrible. Filtering of saves should be abstracted. globalConfig = (ConfigManager) identityManager .createAggregateConfig("", "", "", ""); } globalConfig.removeIdentity(this); if (globalConfig.hasOptionString(domain, option) && globalConfig.getOption(domain, option).equals(value)) { // The new value is covered by a default setting if (oldValue == null) { // There was no old value, so we don't need to do anything return; } else { // There was an old value, so we need to unset it so // that the default shows through. file.getKeyDomain(domain).remove(option); needSave = true; unset = true; } } } if (!unset && (oldValue == null && value != null || oldValue != null && !oldValue.equals(value))) { file.getKeyDomain(domain).put(option, value); needSave = true; } } // Fire any setting change listeners now we're no longer holding // a lock on this identity. if (unset || !Objects.equals(oldValue, value)) { fireSettingChange(domain, option); } } @Override public void setOption(final String domain, final String option, final int value) { setOption(domain, option, String.valueOf(value)); } @Override public void setOption(final String domain, final String option, final boolean value) { setOption(domain, option, String.valueOf(value)); } @Override public void setOption(final String domain, final String option, final List value) { final StringBuilder temp = new StringBuilder(); for (String part : value) { temp.append('\n'); temp.append(part); } setOption(domain, option, temp.length() > 0 ? temp.substring(1) : temp.toString()); } @Override public void unsetOption(final String domain, final String option) { if (!file.isKeyDomain(domain) || !file.getKeyDomain(domain).containsKey(option)) { return; } synchronized (this) { file.getKeyDomain(domain).remove(option); needSave = true; } fireSettingChange(domain, option); } @Override public Set getDomains() { return new HashSet<>(file.getKeyDomains().keySet()); } @Override public synchronized Map getOptions(final String domain) { return new HashMap<>(file.getKeyDomain(domain)); } @Override public synchronized void save() { LOG.info("{}: saving. Needsave = {}", new Object[]{getName(), needSave}); if (needSave && file.isWritable()) { if (myTarget != null && myTarget.getType() == ConfigTarget.TYPE.GLOBAL) { LOG.debug("{}: I'm a global config", getName()); // This branch is executed if this identity is global. In this // case, we build a global config (removing ourself and the // versions identity) and compare our values to the values // contained in that. Any values that are the same can be unset // from this identity (as they will default to their current // value). // // Note that the updater channel is included in the version // identity, and this is excluded from the global config. This // means that once you manually set the channel it will stay // like that until you manually change it again, as opposed // to being removed as soon as you use a build from that // channel. // TODO: This behaviour should be managed by something else. if (globalConfig == null) { globalConfig = (ConfigManager) identityManager .createAggregateConfig("", "", "", ""); } globalConfig.removeIdentity(this); globalConfig.removeIdentity(identityManager.getVersionSettings()); if (LOG.isTraceEnabled()) { for (ConfigProvider source : globalConfig.getSources()) { LOG.trace("{}: source: {}", new Object[]{getName(), source.getName()}); } } for (Map.Entry> entry : file.getKeyDomains().entrySet()) { final String domain = entry.getKey(); for (Map.Entry subentry : new HashSet<>(entry.getValue(). entrySet())) { final String key = subentry.getKey(); final String value = subentry.getValue(); if (globalConfig.hasOptionString(domain, key) && globalConfig.getOption(domain, key).equals(value)) { LOG.debug("{}: found superfluous setting: {}.{} (= {})", getName(), domain, key, value); file.getKeyDomain(domain).remove(key); } } } } if (file.isKeyDomain("temp")) { file.getKeyDomain("temp").clear(); } try { file.write(); needSave = false; } catch (IOException ex) { LOG.warn(USER_ERROR, "Unable to save identity file", ex); } } } @Override public synchronized void delete() throws IOException { file.delete(); identityManager.removeConfigProvider(this); } @Override public ConfigTarget getTarget() { return myTarget; } @Override public void addListener(final ConfigChangeListener listener) { listeners.add(new WeakReference<>(listener)); } @Override public void removeListener(final ConfigChangeListener listener) { listeners.stream().filter(w -> { final ConfigChangeListener target = w.get(); return target == null || target.equals(listener); }).forEach(listeners::remove); } /** * Returns a string representation of this object (its name). * * @return A string representation of this object */ @Override public String toString() { return getName(); } @Override public int hashCode() { return getName().hashCode() + getTarget().hashCode(); } @Override public boolean equals(final Object obj) { return obj instanceof ConfigFileBackedConfigProvider && getName().equals(((ConfigProvider) obj).getName()) && getTarget() == ((ConfigProvider) obj).getTarget(); } }