Home | History | Annotate | Download | only in smack
      1 /**
      2  * $RCSfile$
      3  * $Revision$
      4  * $Date$
      5  *
      6  * Copyright 2009 Jive Software.
      7  *
      8  * All rights reserved. Licensed under the Apache License, Version 2.0 (the "License");
      9  * you may not use this file except in compliance with the License.
     10  * You may obtain a copy of the License at
     11  *
     12  *     http://www.apache.org/licenses/LICENSE-2.0
     13  *
     14  * Unless required by applicable law or agreed to in writing, software
     15  * distributed under the License is distributed on an "AS IS" BASIS,
     16  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
     17  * See the License for the specific language governing permissions and
     18  * limitations under the License.
     19  */
     20 
     21 package org.jivesoftware.smack;
     22 
     23 import java.io.Reader;
     24 import java.io.Writer;
     25 import java.lang.reflect.Constructor;
     26 import java.util.ArrayList;
     27 import java.util.Collection;
     28 import java.util.Collections;
     29 import java.util.List;
     30 import java.util.Map;
     31 import java.util.Set;
     32 import java.util.concurrent.ConcurrentHashMap;
     33 import java.util.concurrent.ConcurrentLinkedQueue;
     34 import java.util.concurrent.CopyOnWriteArrayList;
     35 import java.util.concurrent.CopyOnWriteArraySet;
     36 import java.util.concurrent.atomic.AtomicInteger;
     37 
     38 import org.jivesoftware.smack.compression.JzlibInputOutputStream;
     39 import org.jivesoftware.smack.compression.XMPPInputOutputStream;
     40 import org.jivesoftware.smack.compression.Java7ZlibInputOutputStream;
     41 import org.jivesoftware.smack.debugger.SmackDebugger;
     42 import org.jivesoftware.smack.filter.PacketFilter;
     43 import org.jivesoftware.smack.packet.Packet;
     44 import org.jivesoftware.smack.packet.Presence;
     45 
     46 /**
     47  * The abstract Connection class provides an interface for connections to a
     48  * XMPP server and implements shared methods which are used by the
     49  * different types of connections (e.g. XMPPConnection or BoshConnection).
     50  *
     51  * To create a connection to a XMPP server a simple usage of this API might
     52  * look like the following:
     53  * <pre>
     54  * // Create a connection to the igniterealtime.org XMPP server.
     55  * Connection con = new XMPPConnection("igniterealtime.org");
     56  * // Connect to the server
     57  * con.connect();
     58  * // Most servers require you to login before performing other tasks.
     59  * con.login("jsmith", "mypass");
     60  * // Start a new conversation with John Doe and send him a message.
     61  * Chat chat = connection.getChatManager().createChat("jdoe (at) igniterealtime.org"</font>, new MessageListener() {
     62  * <p/>
     63  *     public void processMessage(Chat chat, Message message) {
     64  *         // Print out any messages we get back to standard out.
     65  *         System.out.println(<font color="green">"Received message: "</font> + message);
     66  *     }
     67  * });
     68  * chat.sendMessage(<font color="green">"Howdy!"</font>);
     69  * // Disconnect from the server
     70  * con.disconnect();
     71  * </pre>
     72  * <p/>
     73  * Connections can be reused between connections. This means that an Connection
     74  * may be connected, disconnected and then connected again. Listeners of the Connection
     75  * will be retained accross connections.<p>
     76  * <p/>
     77  * If a connected Connection gets disconnected abruptly then it will try to reconnect
     78  * again. To stop the reconnection process, use {@link #disconnect()}. Once stopped
     79  * you can use {@link #connect()} to manually connect to the server.
     80  *
     81  * @see XMPPConnection
     82  * @author Matt Tucker
     83  * @author Guenther Niess
     84  */
     85 public abstract class Connection {
     86 
     87     /**
     88      * Counter to uniquely identify connections that are created.
     89      */
     90     private final static AtomicInteger connectionCounter = new AtomicInteger(0);
     91 
     92     /**
     93      * A set of listeners which will be invoked if a new connection is created.
     94      */
     95     private final static Set<ConnectionCreationListener> connectionEstablishedListeners =
     96             new CopyOnWriteArraySet<ConnectionCreationListener>();
     97 
     98     protected final static List<XMPPInputOutputStream> compressionHandlers = new ArrayList<XMPPInputOutputStream>(2);
     99 
    100     /**
    101      * Value that indicates whether debugging is enabled. When enabled, a debug
    102      * window will apear for each new connection that will contain the following
    103      * information:<ul>
    104      * <li> Client Traffic -- raw XML traffic generated by Smack and sent to the server.
    105      * <li> Server Traffic -- raw XML traffic sent by the server to the client.
    106      * <li> Interpreted Packets -- shows XML packets from the server as parsed by Smack.
    107      * </ul>
    108      * <p/>
    109      * Debugging can be enabled by setting this field to true, or by setting the Java system
    110      * property <tt>smack.debugEnabled</tt> to true. The system property can be set on the
    111      * command line such as "java SomeApp -Dsmack.debugEnabled=true".
    112      */
    113     public static boolean DEBUG_ENABLED = false;
    114 
    115     static {
    116         // Use try block since we may not have permission to get a system
    117         // property (for example, when an applet).
    118         try {
    119             DEBUG_ENABLED = Boolean.getBoolean("smack.debugEnabled");
    120         }
    121         catch (Exception e) {
    122             // Ignore.
    123         }
    124         // Ensure the SmackConfiguration class is loaded by calling a method in it.
    125         SmackConfiguration.getVersion();
    126         // Add the Java7 compression handler first, since it's preferred
    127         compressionHandlers.add(new Java7ZlibInputOutputStream());
    128         // If we don't have access to the Java7 API use the JZlib compression handler
    129         compressionHandlers.add(new JzlibInputOutputStream());
    130     }
    131 
    132     /**
    133      * A collection of ConnectionListeners which listen for connection closing
    134      * and reconnection events.
    135      */
    136     protected final Collection<ConnectionListener> connectionListeners =
    137             new CopyOnWriteArrayList<ConnectionListener>();
    138 
    139     /**
    140      * A collection of PacketCollectors which collects packets for a specified filter
    141      * and perform blocking and polling operations on the result queue.
    142      */
    143     protected final Collection<PacketCollector> collectors = new ConcurrentLinkedQueue<PacketCollector>();
    144 
    145     /**
    146      * List of PacketListeners that will be notified when a new packet was received.
    147      */
    148     protected final Map<PacketListener, ListenerWrapper> recvListeners =
    149             new ConcurrentHashMap<PacketListener, ListenerWrapper>();
    150 
    151     /**
    152      * List of PacketListeners that will be notified when a new packet was sent.
    153      */
    154     protected final Map<PacketListener, ListenerWrapper> sendListeners =
    155             new ConcurrentHashMap<PacketListener, ListenerWrapper>();
    156 
    157     /**
    158      * List of PacketInterceptors that will be notified when a new packet is about to be
    159      * sent to the server. These interceptors may modify the packet before it is being
    160      * actually sent to the server.
    161      */
    162     protected final Map<PacketInterceptor, InterceptorWrapper> interceptors =
    163             new ConcurrentHashMap<PacketInterceptor, InterceptorWrapper>();
    164 
    165     /**
    166      * The AccountManager allows creation and management of accounts on an XMPP server.
    167      */
    168     private AccountManager accountManager = null;
    169 
    170     /**
    171      * The ChatManager keeps track of references to all current chats.
    172      */
    173     protected ChatManager chatManager = null;
    174 
    175     /**
    176      * The SmackDebugger allows to log and debug XML traffic.
    177      */
    178     protected SmackDebugger debugger = null;
    179 
    180     /**
    181      * The Reader which is used for the {@see debugger}.
    182      */
    183     protected Reader reader;
    184 
    185     /**
    186      * The Writer which is used for the {@see debugger}.
    187      */
    188     protected Writer writer;
    189 
    190     /**
    191      * The permanent storage for the roster
    192      */
    193     protected RosterStorage rosterStorage;
    194 
    195 
    196     /**
    197      * The SASLAuthentication manager that is responsible for authenticating with the server.
    198      */
    199     protected SASLAuthentication saslAuthentication = new SASLAuthentication(this);
    200 
    201     /**
    202      * A number to uniquely identify connections that are created. This is distinct from the
    203      * connection ID, which is a value sent by the server once a connection is made.
    204      */
    205     protected final int connectionCounterValue = connectionCounter.getAndIncrement();
    206 
    207     /**
    208      * Holds the initial configuration used while creating the connection.
    209      */
    210     protected final ConnectionConfiguration config;
    211 
    212     /**
    213      * Holds the Caps Node information for the used XMPP service (i.e. the XMPP server)
    214      */
    215     private String serviceCapsNode;
    216 
    217     protected XMPPInputOutputStream compressionHandler;
    218 
    219     /**
    220      * Create a new Connection to a XMPP server.
    221      *
    222      * @param configuration The configuration which is used to establish the connection.
    223      */
    224     protected Connection(ConnectionConfiguration configuration) {
    225         config = configuration;
    226     }
    227 
    228     /**
    229      * Returns the configuration used to connect to the server.
    230      *
    231      * @return the configuration used to connect to the server.
    232      */
    233     protected ConnectionConfiguration getConfiguration() {
    234         return config;
    235     }
    236 
    237     /**
    238      * Returns the name of the service provided by the XMPP server for this connection.
    239      * This is also called XMPP domain of the connected server. After
    240      * authenticating with the server the returned value may be different.
    241      *
    242      * @return the name of the service provided by the XMPP server.
    243      */
    244     public String getServiceName() {
    245         return config.getServiceName();
    246     }
    247 
    248     /**
    249      * Returns the host name of the server where the XMPP server is running. This would be the
    250      * IP address of the server or a name that may be resolved by a DNS server.
    251      *
    252      * @return the host name of the server where the XMPP server is running.
    253      */
    254     public String getHost() {
    255         return config.getHost();
    256     }
    257 
    258     /**
    259      * Returns the port number of the XMPP server for this connection. The default port
    260      * for normal connections is 5222. The default port for SSL connections is 5223.
    261      *
    262      * @return the port number of the XMPP server.
    263      */
    264     public int getPort() {
    265         return config.getPort();
    266     }
    267 
    268     /**
    269      * Returns the full XMPP address of the user that is logged in to the connection or
    270      * <tt>null</tt> if not logged in yet. An XMPP address is in the form
    271      * username@server/resource.
    272      *
    273      * @return the full XMPP address of the user logged in.
    274      */
    275     public abstract String getUser();
    276 
    277     /**
    278      * Returns the connection ID for this connection, which is the value set by the server
    279      * when opening a XMPP stream. If the server does not set a connection ID, this value
    280      * will be null. This value will be <tt>null</tt> if not connected to the server.
    281      *
    282      * @return the ID of this connection returned from the XMPP server or <tt>null</tt> if
    283      *      not connected to the server.
    284      */
    285     public abstract String getConnectionID();
    286 
    287     /**
    288      * Returns true if currently connected to the XMPP server.
    289      *
    290      * @return true if connected.
    291      */
    292     public abstract boolean isConnected();
    293 
    294     /**
    295      * Returns true if currently authenticated by successfully calling the login method.
    296      *
    297      * @return true if authenticated.
    298      */
    299     public abstract boolean isAuthenticated();
    300 
    301     /**
    302      * Returns true if currently authenticated anonymously.
    303      *
    304      * @return true if authenticated anonymously.
    305      */
    306     public abstract boolean isAnonymous();
    307 
    308     /**
    309      * Returns true if the connection to the server has successfully negotiated encryption.
    310      *
    311      * @return true if a secure connection to the server.
    312      */
    313     public abstract boolean isSecureConnection();
    314 
    315     /**
    316      * Returns if the reconnection mechanism is allowed to be used. By default
    317      * reconnection is allowed.
    318      *
    319      * @return true if the reconnection mechanism is allowed to be used.
    320      */
    321     protected boolean isReconnectionAllowed() {
    322         return config.isReconnectionAllowed();
    323     }
    324 
    325     /**
    326      * Returns true if network traffic is being compressed. When using stream compression network
    327      * traffic can be reduced up to 90%. Therefore, stream compression is ideal when using a slow
    328      * speed network connection. However, the server will need to use more CPU time in order to
    329      * un/compress network data so under high load the server performance might be affected.
    330      *
    331      * @return true if network traffic is being compressed.
    332      */
    333     public abstract boolean isUsingCompression();
    334 
    335     /**
    336      * Establishes a connection to the XMPP server and performs an automatic login
    337      * only if the previous connection state was logged (authenticated). It basically
    338      * creates and maintains a connection to the server.<p>
    339      * <p/>
    340      * Listeners will be preserved from a previous connection if the reconnection
    341      * occurs after an abrupt termination.
    342      *
    343      * @throws XMPPException if an error occurs while trying to establish the connection.
    344      */
    345     public abstract void connect() throws XMPPException;
    346 
    347     /**
    348      * Logs in to the server using the strongest authentication mode supported by
    349      * the server, then sets presence to available. If the server supports SASL authentication
    350      * then the user will be authenticated using SASL if not Non-SASL authentication will
    351      * be tried. If more than five seconds (default timeout) elapses in each step of the
    352      * authentication process without a response from the server, or if an error occurs, a
    353      * XMPPException will be thrown.<p>
    354      *
    355      * Before logging in (i.e. authenticate) to the server the connection must be connected.
    356      *
    357      * It is possible to log in without sending an initial available presence by using
    358      * {@link ConnectionConfiguration#setSendPresence(boolean)}. If this connection is
    359      * not interested in loading its roster upon login then use
    360      * {@link ConnectionConfiguration#setRosterLoadedAtLogin(boolean)}.
    361      * Finally, if you want to not pass a password and instead use a more advanced mechanism
    362      * while using SASL then you may be interested in using
    363      * {@link ConnectionConfiguration#setCallbackHandler(javax.security.auth.callback.CallbackHandler)}.
    364      * For more advanced login settings see {@link ConnectionConfiguration}.
    365      *
    366      * @param username the username.
    367      * @param password the password or <tt>null</tt> if using a CallbackHandler.
    368      * @throws XMPPException if an error occurs.
    369      */
    370     public void login(String username, String password) throws XMPPException {
    371         login(username, password, "Smack");
    372     }
    373 
    374     /**
    375      * Logs in to the server using the strongest authentication mode supported by
    376      * the server, then sets presence to available. If the server supports SASL authentication
    377      * then the user will be authenticated using SASL if not Non-SASL authentication will
    378      * be tried. If more than five seconds (default timeout) elapses in each step of the
    379      * authentication process without a response from the server, or if an error occurs, a
    380      * XMPPException will be thrown.<p>
    381      *
    382      * Before logging in (i.e. authenticate) to the server the connection must be connected.
    383      *
    384      * It is possible to log in without sending an initial available presence by using
    385      * {@link ConnectionConfiguration#setSendPresence(boolean)}. If this connection is
    386      * not interested in loading its roster upon login then use
    387      * {@link ConnectionConfiguration#setRosterLoadedAtLogin(boolean)}.
    388      * Finally, if you want to not pass a password and instead use a more advanced mechanism
    389      * while using SASL then you may be interested in using
    390      * {@link ConnectionConfiguration#setCallbackHandler(javax.security.auth.callback.CallbackHandler)}.
    391      * For more advanced login settings see {@link ConnectionConfiguration}.
    392      *
    393      * @param username the username.
    394      * @param password the password or <tt>null</tt> if using a CallbackHandler.
    395      * @param resource the resource.
    396      * @throws XMPPException if an error occurs.
    397      * @throws IllegalStateException if not connected to the server, or already logged in
    398      *      to the serrver.
    399      */
    400     public abstract void login(String username, String password, String resource) throws XMPPException;
    401 
    402     /**
    403      * Logs in to the server anonymously. Very few servers are configured to support anonymous
    404      * authentication, so it's fairly likely logging in anonymously will fail. If anonymous login
    405      * does succeed, your XMPP address will likely be in the form "123ABC@server/789XYZ" or
    406      * "server/123ABC" (where "123ABC" and "789XYZ" is a random value generated by the server).
    407      *
    408      * @throws XMPPException if an error occurs or anonymous logins are not supported by the server.
    409      * @throws IllegalStateException if not connected to the server, or already logged in
    410      *      to the serrver.
    411      */
    412     public abstract void loginAnonymously() throws XMPPException;
    413 
    414     /**
    415      * Sends the specified packet to the server.
    416      *
    417      * @param packet the packet to send.
    418      */
    419     public abstract void sendPacket(Packet packet);
    420 
    421     /**
    422      * Returns an account manager instance for this connection.
    423      *
    424      * @return an account manager for this connection.
    425      */
    426     public AccountManager getAccountManager() {
    427         if (accountManager == null) {
    428             accountManager = new AccountManager(this);
    429         }
    430         return accountManager;
    431     }
    432 
    433     /**
    434      * Returns a chat manager instance for this connection. The ChatManager manages all incoming and
    435      * outgoing chats on the current connection.
    436      *
    437      * @return a chat manager instance for this connection.
    438      */
    439     public synchronized ChatManager getChatManager() {
    440         if (this.chatManager == null) {
    441             this.chatManager = new ChatManager(this);
    442         }
    443         return this.chatManager;
    444     }
    445 
    446     /**
    447      * Returns the roster for the user.
    448      * <p>
    449      * This method will never return <code>null</code>, instead if the user has not yet logged into
    450      * the server or is logged in anonymously all modifying methods of the returned roster object
    451      * like {@link Roster#createEntry(String, String, String[])},
    452      * {@link Roster#removeEntry(RosterEntry)} , etc. except adding or removing
    453      * {@link RosterListener}s will throw an IllegalStateException.
    454      *
    455      * @return the user's roster.
    456      */
    457     public abstract Roster getRoster();
    458 
    459     /**
    460      * Set the store for the roster of this connection. If you set the roster storage
    461      * of a connection you enable support for XEP-0237 (RosterVersioning)
    462      * @param store the store used for roster versioning
    463      * @throws IllegalStateException if you add a roster store when roster is initializied
    464      */
    465     public abstract void setRosterStorage(RosterStorage storage) throws IllegalStateException;
    466 
    467     /**
    468      * Returns the SASLAuthentication manager that is responsible for authenticating with
    469      * the server.
    470      *
    471      * @return the SASLAuthentication manager that is responsible for authenticating with
    472      *         the server.
    473      */
    474     public SASLAuthentication getSASLAuthentication() {
    475         return saslAuthentication;
    476     }
    477 
    478     /**
    479      * Closes the connection by setting presence to unavailable then closing the connection to
    480      * the XMPP server. The Connection can still be used for connecting to the server
    481      * again.<p>
    482      * <p/>
    483      * This method cleans up all resources used by the connection. Therefore, the roster,
    484      * listeners and other stateful objects cannot be re-used by simply calling connect()
    485      * on this connection again. This is unlike the behavior during unexpected disconnects
    486      * (and subsequent connections). In that case, all state is preserved to allow for
    487      * more seamless error recovery.
    488      */
    489     public void disconnect() {
    490         disconnect(new Presence(Presence.Type.unavailable));
    491     }
    492 
    493     /**
    494      * Closes the connection. A custom unavailable presence is sent to the server, followed
    495      * by closing the stream. The Connection can still be used for connecting to the server
    496      * again. A custom unavilable presence is useful for communicating offline presence
    497      * information such as "On vacation". Typically, just the status text of the presence
    498      * packet is set with online information, but most XMPP servers will deliver the full
    499      * presence packet with whatever data is set.<p>
    500      * <p/>
    501      * This method cleans up all resources used by the connection. Therefore, the roster,
    502      * listeners and other stateful objects cannot be re-used by simply calling connect()
    503      * on this connection again. This is unlike the behavior during unexpected disconnects
    504      * (and subsequent connections). In that case, all state is preserved to allow for
    505      * more seamless error recovery.
    506      *
    507      * @param unavailablePresence the presence packet to send during shutdown.
    508      */
    509     public abstract void disconnect(Presence unavailablePresence);
    510 
    511     /**
    512      * Adds a new listener that will be notified when new Connections are created. Note
    513      * that newly created connections will not be actually connected to the server.
    514      *
    515      * @param connectionCreationListener a listener interested on new connections.
    516      */
    517     public static void addConnectionCreationListener(
    518             ConnectionCreationListener connectionCreationListener) {
    519         connectionEstablishedListeners.add(connectionCreationListener);
    520     }
    521 
    522     /**
    523      * Removes a listener that was interested in connection creation events.
    524      *
    525      * @param connectionCreationListener a listener interested on new connections.
    526      */
    527     public static void removeConnectionCreationListener(
    528             ConnectionCreationListener connectionCreationListener) {
    529         connectionEstablishedListeners.remove(connectionCreationListener);
    530     }
    531 
    532     /**
    533      * Get the collection of listeners that are interested in connection creation events.
    534      *
    535      * @return a collection of listeners interested on new connections.
    536      */
    537     protected static Collection<ConnectionCreationListener> getConnectionCreationListeners() {
    538         return Collections.unmodifiableCollection(connectionEstablishedListeners);
    539     }
    540 
    541     /**
    542      * Adds a connection listener to this connection that will be notified when
    543      * the connection closes or fails. The connection needs to already be connected
    544      * or otherwise an IllegalStateException will be thrown.
    545      *
    546      * @param connectionListener a connection listener.
    547      */
    548     public void addConnectionListener(ConnectionListener connectionListener) {
    549         if (!isConnected()) {
    550             throw new IllegalStateException("Not connected to server.");
    551         }
    552         if (connectionListener == null) {
    553             return;
    554         }
    555         if (!connectionListeners.contains(connectionListener)) {
    556             connectionListeners.add(connectionListener);
    557         }
    558     }
    559 
    560     /**
    561      * Removes a connection listener from this connection.
    562      *
    563      * @param connectionListener a connection listener.
    564      */
    565     public void removeConnectionListener(ConnectionListener connectionListener) {
    566         connectionListeners.remove(connectionListener);
    567     }
    568 
    569     /**
    570      * Get the collection of listeners that are interested in connection events.
    571      *
    572      * @return a collection of listeners interested on connection events.
    573      */
    574     protected Collection<ConnectionListener> getConnectionListeners() {
    575         return connectionListeners;
    576     }
    577 
    578     /**
    579      * Creates a new packet collector for this connection. A packet filter determines
    580      * which packets will be accumulated by the collector. A PacketCollector is
    581      * more suitable to use than a {@link PacketListener} when you need to wait for
    582      * a specific result.
    583      *
    584      * @param packetFilter the packet filter to use.
    585      * @return a new packet collector.
    586      */
    587     public PacketCollector createPacketCollector(PacketFilter packetFilter) {
    588         PacketCollector collector = new PacketCollector(this, packetFilter);
    589         // Add the collector to the list of active collectors.
    590         collectors.add(collector);
    591         return collector;
    592     }
    593 
    594     /**
    595      * Remove a packet collector of this connection.
    596      *
    597      * @param collector a packet collectors which was created for this connection.
    598      */
    599     protected void removePacketCollector(PacketCollector collector) {
    600         collectors.remove(collector);
    601     }
    602 
    603     /**
    604      * Get the collection of all packet collectors for this connection.
    605      *
    606      * @return a collection of packet collectors for this connection.
    607      */
    608     protected Collection<PacketCollector> getPacketCollectors() {
    609         return collectors;
    610     }
    611 
    612     /**
    613      * Registers a packet listener with this connection. A packet filter determines
    614      * which packets will be delivered to the listener. If the same packet listener
    615      * is added again with a different filter, only the new filter will be used.
    616      *
    617      * @param packetListener the packet listener to notify of new received packets.
    618      * @param packetFilter   the packet filter to use.
    619      */
    620     public void addPacketListener(PacketListener packetListener, PacketFilter packetFilter) {
    621         if (packetListener == null) {
    622             throw new NullPointerException("Packet listener is null.");
    623         }
    624         ListenerWrapper wrapper = new ListenerWrapper(packetListener, packetFilter);
    625         recvListeners.put(packetListener, wrapper);
    626     }
    627 
    628     /**
    629      * Removes a packet listener for received packets from this connection.
    630      *
    631      * @param packetListener the packet listener to remove.
    632      */
    633     public void removePacketListener(PacketListener packetListener) {
    634         recvListeners.remove(packetListener);
    635     }
    636 
    637     /**
    638      * Get a map of all packet listeners for received packets of this connection.
    639      *
    640      * @return a map of all packet listeners for received packets.
    641      */
    642     protected Map<PacketListener, ListenerWrapper> getPacketListeners() {
    643         return recvListeners;
    644     }
    645 
    646     /**
    647      * Registers a packet listener with this connection. The listener will be
    648      * notified of every packet that this connection sends. A packet filter determines
    649      * which packets will be delivered to the listener. Note that the thread
    650      * that writes packets will be used to invoke the listeners. Therefore, each
    651      * packet listener should complete all operations quickly or use a different
    652      * thread for processing.
    653      *
    654      * @param packetListener the packet listener to notify of sent packets.
    655      * @param packetFilter   the packet filter to use.
    656      */
    657     public void addPacketSendingListener(PacketListener packetListener, PacketFilter packetFilter) {
    658         if (packetListener == null) {
    659             throw new NullPointerException("Packet listener is null.");
    660         }
    661         ListenerWrapper wrapper = new ListenerWrapper(packetListener, packetFilter);
    662         sendListeners.put(packetListener, wrapper);
    663     }
    664 
    665     /**
    666      * Removes a packet listener for sending packets from this connection.
    667      *
    668      * @param packetListener the packet listener to remove.
    669      */
    670     public void removePacketSendingListener(PacketListener packetListener) {
    671         sendListeners.remove(packetListener);
    672     }
    673 
    674     /**
    675      * Get a map of all packet listeners for sending packets of this connection.
    676      *
    677      * @return a map of all packet listeners for sent packets.
    678      */
    679     protected Map<PacketListener, ListenerWrapper> getPacketSendingListeners() {
    680         return sendListeners;
    681     }
    682 
    683 
    684     /**
    685      * Process all packet listeners for sending packets.
    686      *
    687      * @param packet the packet to process.
    688      */
    689     protected void firePacketSendingListeners(Packet packet) {
    690         // Notify the listeners of the new sent packet
    691         for (ListenerWrapper listenerWrapper : sendListeners.values()) {
    692             listenerWrapper.notifyListener(packet);
    693         }
    694     }
    695 
    696     /**
    697      * Registers a packet interceptor with this connection. The interceptor will be
    698      * invoked every time a packet is about to be sent by this connection. Interceptors
    699      * may modify the packet to be sent. A packet filter determines which packets
    700      * will be delivered to the interceptor.
    701      *
    702      * @param packetInterceptor the packet interceptor to notify of packets about to be sent.
    703      * @param packetFilter      the packet filter to use.
    704      */
    705     public void addPacketInterceptor(PacketInterceptor packetInterceptor,
    706             PacketFilter packetFilter) {
    707         if (packetInterceptor == null) {
    708             throw new NullPointerException("Packet interceptor is null.");
    709         }
    710         interceptors.put(packetInterceptor, new InterceptorWrapper(packetInterceptor, packetFilter));
    711     }
    712 
    713     /**
    714      * Removes a packet interceptor.
    715      *
    716      * @param packetInterceptor the packet interceptor to remove.
    717      */
    718     public void removePacketInterceptor(PacketInterceptor packetInterceptor) {
    719         interceptors.remove(packetInterceptor);
    720     }
    721 
    722     public boolean isSendPresence() {
    723         return config.isSendPresence();
    724     }
    725 
    726     /**
    727      * Get a map of all packet interceptors for sending packets of this connection.
    728      *
    729      * @return a map of all packet interceptors for sending packets.
    730      */
    731     protected Map<PacketInterceptor, InterceptorWrapper> getPacketInterceptors() {
    732         return interceptors;
    733     }
    734 
    735     /**
    736      * Process interceptors. Interceptors may modify the packet that is about to be sent.
    737      * Since the thread that requested to send the packet will invoke all interceptors, it
    738      * is important that interceptors perform their work as soon as possible so that the
    739      * thread does not remain blocked for a long period.
    740      *
    741      * @param packet the packet that is going to be sent to the server
    742      */
    743     protected void firePacketInterceptors(Packet packet) {
    744         if (packet != null) {
    745             for (InterceptorWrapper interceptorWrapper : interceptors.values()) {
    746                 interceptorWrapper.notifyListener(packet);
    747             }
    748         }
    749     }
    750 
    751     /**
    752      * Initialize the {@link #debugger}. You can specify a customized {@link SmackDebugger}
    753      * by setup the system property <code>smack.debuggerClass</code> to the implementation.
    754      *
    755      * @throws IllegalStateException if the reader or writer isn't yet initialized.
    756      * @throws IllegalArgumentException if the SmackDebugger can't be loaded.
    757      */
    758     protected void initDebugger() {
    759         if (reader == null || writer == null) {
    760             throw new NullPointerException("Reader or writer isn't initialized.");
    761         }
    762         // If debugging is enabled, we open a window and write out all network traffic.
    763         if (config.isDebuggerEnabled()) {
    764             if (debugger == null) {
    765                 // Detect the debugger class to use.
    766                 String className = null;
    767                 // Use try block since we may not have permission to get a system
    768                 // property (for example, when an applet).
    769                 try {
    770                     className = System.getProperty("smack.debuggerClass");
    771                 }
    772                 catch (Throwable t) {
    773                     // Ignore.
    774                 }
    775                 Class<?> debuggerClass = null;
    776                 if (className != null) {
    777                     try {
    778                         debuggerClass = Class.forName(className);
    779                     }
    780                     catch (Exception e) {
    781                         e.printStackTrace();
    782                     }
    783                 }
    784                 if (debuggerClass == null) {
    785                     try {
    786                         debuggerClass =
    787                                 Class.forName("de.measite.smack.AndroidDebugger");
    788                     }
    789                     catch (Exception ex) {
    790                         try {
    791                             debuggerClass =
    792                                     Class.forName("org.jivesoftware.smack.debugger.ConsoleDebugger");
    793                         }
    794                         catch (Exception ex2) {
    795                             ex2.printStackTrace();
    796                         }
    797                     }
    798                 }
    799                 // Create a new debugger instance. If an exception occurs then disable the debugging
    800                 // option
    801                 try {
    802                     Constructor<?> constructor = debuggerClass
    803                             .getConstructor(Connection.class, Writer.class, Reader.class);
    804                     debugger = (SmackDebugger) constructor.newInstance(this, writer, reader);
    805                     reader = debugger.getReader();
    806                     writer = debugger.getWriter();
    807                 }
    808                 catch (Exception e) {
    809                     throw new IllegalArgumentException("Can't initialize the configured debugger!", e);
    810                 }
    811             }
    812             else {
    813                 // Obtain new reader and writer from the existing debugger
    814                 reader = debugger.newConnectionReader(reader);
    815                 writer = debugger.newConnectionWriter(writer);
    816             }
    817         }
    818 
    819     }
    820 
    821     /**
    822      * Set the servers Entity Caps node
    823      *
    824      * Connection holds this information in order to avoid a dependency to
    825      * smackx where EntityCapsManager lives from smack.
    826      *
    827      * @param node
    828      */
    829     protected void setServiceCapsNode(String node) {
    830         serviceCapsNode = node;
    831     }
    832 
    833     /**
    834      * Retrieve the servers Entity Caps node
    835      *
    836      * Connection holds this information in order to avoid a dependency to
    837      * smackx where EntityCapsManager lives from smack.
    838      *
    839      * @return
    840      */
    841     public String getServiceCapsNode() {
    842         return serviceCapsNode;
    843     }
    844 
    845     /**
    846      * A wrapper class to associate a packet filter with a listener.
    847      */
    848     protected static class ListenerWrapper {
    849 
    850         private PacketListener packetListener;
    851         private PacketFilter packetFilter;
    852 
    853         /**
    854          * Create a class which associates a packet filter with a listener.
    855          *
    856          * @param packetListener the packet listener.
    857          * @param packetFilter the associated filter or null if it listen for all packets.
    858          */
    859         public ListenerWrapper(PacketListener packetListener, PacketFilter packetFilter) {
    860             this.packetListener = packetListener;
    861             this.packetFilter = packetFilter;
    862         }
    863 
    864         /**
    865          * Notify and process the packet listener if the filter matches the packet.
    866          *
    867          * @param packet the packet which was sent or received.
    868          */
    869         public void notifyListener(Packet packet) {
    870             if (packetFilter == null || packetFilter.accept(packet)) {
    871                 packetListener.processPacket(packet);
    872             }
    873         }
    874     }
    875 
    876     /**
    877      * A wrapper class to associate a packet filter with an interceptor.
    878      */
    879     protected static class InterceptorWrapper {
    880 
    881         private PacketInterceptor packetInterceptor;
    882         private PacketFilter packetFilter;
    883 
    884         /**
    885          * Create a class which associates a packet filter with an interceptor.
    886          *
    887          * @param packetInterceptor the interceptor.
    888          * @param packetFilter the associated filter or null if it intercepts all packets.
    889          */
    890         public InterceptorWrapper(PacketInterceptor packetInterceptor, PacketFilter packetFilter) {
    891             this.packetInterceptor = packetInterceptor;
    892             this.packetFilter = packetFilter;
    893         }
    894 
    895         public boolean equals(Object object) {
    896             if (object == null) {
    897                 return false;
    898             }
    899             if (object instanceof InterceptorWrapper) {
    900                 return ((InterceptorWrapper) object).packetInterceptor
    901                         .equals(this.packetInterceptor);
    902             }
    903             else if (object instanceof PacketInterceptor) {
    904                 return object.equals(this.packetInterceptor);
    905             }
    906             return false;
    907         }
    908 
    909         /**
    910          * Notify and process the packet interceptor if the filter matches the packet.
    911          *
    912          * @param packet the packet which will be sent.
    913          */
    914         public void notifyListener(Packet packet) {
    915             if (packetFilter == null || packetFilter.accept(packet)) {
    916                 packetInterceptor.interceptPacket(packet);
    917             }
    918         }
    919     }
    920 }
    921