Project

General

Profile

1
/**
2
 *  '$RCSfile$'
3
 *  Copyright: 2000-2011 Regents of the University of California and the
4
 *              National Center for Ecological Analysis and Synthesis
5
 *
6
 *   '$Author:  $'
7
 *     '$Date:  $'
8
 *
9
 * This program is free software; you can redistribute it and/or modify
10
 * it under the terms of the GNU General Public License as published by
11
 * the Free Software Foundation; either version 2 of the License, or
12
 * (at your option) any later version.
13
 *
14
 * This program is distributed in the hope that it will be useful,
15
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
17
 * GNU General Public License for more details.
18
 *
19
 * You should have received a copy of the GNU General Public License
20
 * along with this program; if not, write to the Free Software
21
 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
22
 */
23

    
24
package edu.ucsb.nceas.metacat.dataone;
25

    
26
import java.io.IOException;
27
import java.io.InputStream;
28
import java.math.BigInteger;
29
import java.security.NoSuchAlgorithmException;
30
import java.sql.SQLException;
31
import java.util.Calendar;
32
import java.util.Date;
33
import java.util.List;
34
import java.util.Timer;
35

    
36
import javax.servlet.http.HttpServletRequest;
37

    
38
import org.apache.commons.io.IOUtils;
39
import org.apache.log4j.Logger;
40
import org.dataone.client.CNode;
41
import org.dataone.client.D1Client;
42
import org.dataone.client.MNode;
43
import org.dataone.client.auth.CertificateManager;
44
import org.dataone.configuration.Settings;
45
import org.dataone.service.exceptions.BaseException;
46
import org.dataone.service.exceptions.IdentifierNotUnique;
47
import org.dataone.service.exceptions.InsufficientResources;
48
import org.dataone.service.exceptions.InvalidRequest;
49
import org.dataone.service.exceptions.InvalidSystemMetadata;
50
import org.dataone.service.exceptions.InvalidToken;
51
import org.dataone.service.exceptions.NotAuthorized;
52
import org.dataone.service.exceptions.NotFound;
53
import org.dataone.service.exceptions.NotImplemented;
54
import org.dataone.service.exceptions.ServiceFailure;
55
import org.dataone.service.exceptions.SynchronizationFailed;
56
import org.dataone.service.exceptions.UnsupportedType;
57
import org.dataone.service.mn.tier1.v1.MNCore;
58
import org.dataone.service.mn.tier1.v1.MNRead;
59
import org.dataone.service.mn.tier2.v1.MNAuthorization;
60
import org.dataone.service.mn.tier3.v1.MNStorage;
61
import org.dataone.service.mn.tier4.v1.MNReplication;
62
import org.dataone.service.types.v1.Checksum;
63
import org.dataone.service.types.v1.Event;
64
import org.dataone.service.types.v1.Group;
65
import org.dataone.service.types.v1.Identifier;
66
import org.dataone.service.types.v1.Log;
67
import org.dataone.service.types.v1.LogEntry;
68
import org.dataone.service.types.v1.MonitorInfo;
69
import org.dataone.service.types.v1.MonitorList;
70
import org.dataone.service.types.v1.Node;
71
import org.dataone.service.types.v1.NodeList;
72
import org.dataone.service.types.v1.NodeReference;
73
import org.dataone.service.types.v1.NodeState;
74
import org.dataone.service.types.v1.NodeType;
75
import org.dataone.service.types.v1.ObjectFormatIdentifier;
76
import org.dataone.service.types.v1.ObjectList;
77
import org.dataone.service.types.v1.Permission;
78
import org.dataone.service.types.v1.Ping;
79
import org.dataone.service.types.v1.ReplicationStatus;
80
import org.dataone.service.types.v1.Schedule;
81
import org.dataone.service.types.v1.Service;
82
import org.dataone.service.types.v1.Services;
83
import org.dataone.service.types.v1.Session;
84
import org.dataone.service.types.v1.Subject;
85
import org.dataone.service.types.v1.Synchronization;
86
import org.dataone.service.types.v1.SystemMetadata;
87
import org.dataone.service.types.v1.util.ChecksumUtil;
88
import org.dataone.service.util.Constants;
89

    
90
import edu.ucsb.nceas.metacat.DocumentImpl;
91
import edu.ucsb.nceas.metacat.EventLog;
92
import edu.ucsb.nceas.metacat.IdentifierManager;
93
import edu.ucsb.nceas.metacat.McdbDocNotFoundException;
94
import edu.ucsb.nceas.metacat.MetacatHandler;
95
import edu.ucsb.nceas.metacat.client.InsufficientKarmaException;
96
import edu.ucsb.nceas.metacat.dataone.hazelcast.HazelcastService;
97
import edu.ucsb.nceas.metacat.properties.PropertyService;
98
import edu.ucsb.nceas.metacat.util.SystemUtil;
99
import edu.ucsb.nceas.utilities.PropertyNotFoundException;
100

    
101
/**
102
 * Represents Metacat's implementation of the DataONE Member Node 
103
 * service API. Methods implement the various MN* interfaces, and methods common
104
 * to both Member Node and Coordinating Node interfaces are found in the
105
 * D1NodeService base class.
106
 * 
107
 * Implements:
108
 * MNCore.ping()
109
 * MNCore.getLogRecords()
110
 * MNCore.getObjectStatistics()
111
 * MNCore.getOperationStatistics()
112
 * MNCore.getStatus()
113
 * MNCore.getCapabilities()
114
 * MNRead.get()
115
 * MNRead.getSystemMetadata()
116
 * MNRead.describe()
117
 * MNRead.getChecksum()
118
 * MNRead.listObjects()
119
 * MNRead.synchronizationFailed()
120
 * MNAuthorization.isAuthorized()
121
 * MNAuthorization.setAccessPolicy()
122
 * MNStorage.create()
123
 * MNStorage.update()
124
 * MNStorage.delete()
125
 * MNReplication.replicate()
126
 * 
127
 */
128
public class MNodeService extends D1NodeService 
129
    implements MNAuthorization, MNCore, MNRead, MNReplication, MNStorage {
130

    
131
    /* the logger instance */
132
    private Logger logMetacat = null;
133
    
134
    /* A reference to a remote Memeber Node */
135
    private MNode mn;
136
    
137
    /* A reference to a Coordinating Node */
138
    private CNode cn;
139

    
140

    
141
    /**
142
     * Singleton accessor to get an instance of MNodeService.
143
     * 
144
     * @return instance - the instance of MNodeService
145
     */
146
    public static MNodeService getInstance(HttpServletRequest request) {
147
        return new MNodeService(request);
148
    }
149

    
150
    /**
151
     * Constructor, private for singleton access
152
     */
153
    private MNodeService(HttpServletRequest request) {
154
        super(request);
155
        logMetacat = Logger.getLogger(MNodeService.class);
156
        
157
        // set the Member Node certificate file location
158
        CertificateManager.getInstance().setCertificateLocation(Settings.getConfiguration().getString("D1Client.certificate.file"));
159
    }
160

    
161
    /**
162
     * Deletes an object from the Member Node, where the object is either a 
163
     * data object or a science metadata object.
164
     * 
165
     * @param session - the Session object containing the credentials for the Subject
166
     * @param pid - The object identifier to be deleted
167
     * 
168
     * @return pid - the identifier of the object used for the deletion
169
     * 
170
     * @throws InvalidToken
171
     * @throws ServiceFailure
172
     * @throws NotAuthorized
173
     * @throws NotFound
174
     * @throws NotImplemented
175
     * @throws InvalidRequest
176
     */
177
    @Override
178
    public Identifier delete(Session session, Identifier pid) 
179
        throws InvalidToken, ServiceFailure, NotAuthorized, NotFound, NotImplemented {
180

    
181
    	// defer to superclass implementation
182
        return super.delete(session, pid);
183
    }
184

    
185
    /**
186
     * Updates an existing object by creating a new object identified by 
187
     * newPid on the Member Node which explicitly obsoletes the object 
188
     * identified by pid through appropriate changes to the SystemMetadata 
189
     * of pid and newPid
190
     * 
191
     * @param session - the Session object containing the credentials for the Subject
192
     * @param pid - The identifier of the object to be updated
193
     * @param object - the new object bytes
194
     * @param sysmeta - the new system metadata describing the object
195
     * 
196
     * @return newPid - the identifier of the new object
197
     * 
198
     * @throws InvalidToken
199
     * @throws ServiceFailure
200
     * @throws NotAuthorized
201
     * @throws NotFound
202
     * @throws NotImplemented
203
     * @throws IdentifierNotUnique
204
     * @throws UnsupportedType
205
     * @throws InsufficientResources
206
     * @throws InvalidSystemMetadata
207
     * @throws InvalidRequest
208
     */
209
    @Override
210
    public Identifier update(Session session, Identifier pid, InputStream object, 
211
        Identifier newPid, SystemMetadata sysmeta) 
212
        throws InvalidToken, ServiceFailure, NotAuthorized, IdentifierNotUnique, 
213
        UnsupportedType, InsufficientResources, NotFound, 
214
        InvalidSystemMetadata, NotImplemented, InvalidRequest {
215

    
216
        String localId = null;
217
        boolean allowed = false;
218
        boolean isScienceMetadata = false;
219
        
220
        if (session == null) {
221
        	throw new InvalidToken("1210", "No session has been provided");
222
        }
223
        Subject subject = session.getSubject();
224

    
225
        // do we have a valid pid?
226
        if (pid == null || pid.getValue().trim().equals("")) {
227
            throw new InvalidRequest("1202", "The provided identifier was invalid.");
228
            
229
        }
230

    
231
        // check for the existing identifier
232
        try {
233
            localId = IdentifierManager.getInstance().getLocalId(pid.getValue());
234
            
235
        } catch (McdbDocNotFoundException e) {
236
            throw new InvalidRequest("1202", "The object with the provided " + 
237
                "identifier was not found.");
238
            
239
        }
240
        
241
        // set the originating node
242
        NodeReference originMemberNode = this.getCapabilities().getIdentifier();
243
        sysmeta.setOriginMemberNode(originMemberNode);
244
        
245
        // set the submitter to match the certificate
246
        sysmeta.setSubmitter(subject);
247
        // set the dates
248
        Date now = Calendar.getInstance().getTime();
249
        sysmeta.setDateSysMetadataModified(now);
250
        sysmeta.setDateUploaded(now);
251

    
252
        // does the subject have WRITE ( == update) priveleges on the pid?
253
        allowed = isAuthorized(session, pid, Permission.WRITE);
254

    
255
        if (allowed) {
256
        	
257
        	// check quality of SM
258
        	if (sysmeta.getObsoletedBy() != null) {
259
        		throw new InvalidSystemMetadata("1300", "Cannot include obsoletedBy when updating object");
260
        	}
261
        	if (sysmeta.getObsoletes() != null && !sysmeta.getObsoletes().getValue().equals(pid.getValue())) {
262
        		throw new InvalidSystemMetadata("1300", "The identifier provided in obsoletes does not match old Identifier");
263
        	}
264

    
265
            // get the existing system metadata for the object
266
            SystemMetadata existingSysMeta = getSystemMetadata(session, pid);
267

    
268
            // add the newPid to the obsoletedBy list for the existing sysmeta
269
            existingSysMeta.setObsoletedBy(newPid);
270

    
271
            // then update the existing system metadata
272
            updateSystemMetadata(existingSysMeta);
273

    
274
            // prep the new system metadata, add pid to the affected lists
275
            sysmeta.setObsoletes(pid);
276
            //sysmeta.addDerivedFrom(pid);
277

    
278
            isScienceMetadata = isScienceMetadata(sysmeta);
279

    
280
            // do we have XML metadata or a data object?
281
            if (isScienceMetadata) {
282

    
283
                // update the science metadata XML document
284
                // TODO: handle non-XML metadata/data documents (like netCDF)
285
                // TODO: don't put objects into memory using stream to string
286
                String objectAsXML = "";
287
                try {
288
                    objectAsXML = IOUtils.toString(object, "UTF-8");
289
                    localId = insertOrUpdateDocument(objectAsXML, newPid, session, "update");
290
                    // register the newPid and the generated localId
291
                    if (newPid != null) {
292
                        IdentifierManager.getInstance().createMapping(newPid.getValue(), localId);
293

    
294
                    }
295

    
296
                } catch (IOException e) {
297
                    String msg = "The Node is unable to create the object. " + "There was a problem converting the object to XML";
298
                    logMetacat.info(msg);
299
                    throw new ServiceFailure("1310", msg + ": " + e.getMessage());
300

    
301
                }
302

    
303
            } else {
304

    
305
                // update the data object
306
                localId = insertDataObject(object, newPid, session);
307

    
308
            }
309

    
310
            // and insert the new system metadata
311
            insertSystemMetadata(sysmeta);
312

    
313
            // log the update event
314
            EventLog.getInstance().log(request.getRemoteAddr(), request.getHeader("User-Agent"), subject.getValue(), localId, Event.UPDATE.toString());
315

    
316
        } else {
317
            throw new NotAuthorized("1200", "The provided identity does not have " + "permission to UPDATE the object identified by " + pid.getValue()
318
                    + " on the Member Node.");
319
        }
320

    
321
        return newPid;
322
    }
323

    
324
    public Identifier create(Session session, Identifier pid, InputStream object, SystemMetadata sysmeta) throws InvalidToken, ServiceFailure, NotAuthorized,
325
            IdentifierNotUnique, UnsupportedType, InsufficientResources, InvalidSystemMetadata, NotImplemented, InvalidRequest {
326

    
327
        // check for null session
328
        if (session == null) {
329
          throw new InvalidToken("1110", "Session is required to WRITE to the Node.");
330
        }
331
        // set the submitter to match the certificate
332
        sysmeta.setSubmitter(session.getSubject());
333
        // set the originating node
334
        NodeReference originMemberNode = this.getCapabilities().getIdentifier();
335
        sysmeta.setOriginMemberNode(originMemberNode);
336
        sysmeta.setArchived(false);
337

    
338
        // set the dates
339
        Date now = Calendar.getInstance().getTime();
340
        sysmeta.setDateSysMetadataModified(now);
341
        sysmeta.setDateUploaded(now);
342
        
343
        // set the serial version
344
        sysmeta.setSerialVersion(BigInteger.ZERO);
345

    
346
        // check that we are not attempting to subvert versioning
347
        if (sysmeta.getObsoletes() != null && sysmeta.getObsoletes().getValue() != null) {
348
            throw new InvalidSystemMetadata("1180", 
349
              "The supplied system metadata is invalid. " +
350
              "The obsoletes field cannot have a value when creating entries.");
351
        }
352
        
353
        if (sysmeta.getObsoletedBy() != null && sysmeta.getObsoletedBy().getValue() != null) {
354
            throw new InvalidSystemMetadata("1180", 
355
              "The supplied system metadata is invalid. " +
356
              "The obsoletedBy field cannot have a value when creating entries.");
357
        }
358
        
359

    
360
        // call the shared impl
361
        return super.create(session, pid, object, sysmeta);
362
    }
363

    
364
    /**
365
     * Called by a Coordinating Node to request that the Member Node create a 
366
     * copy of the specified object by retrieving it from another Member 
367
     * Node and storing it locally so that it can be made accessible to 
368
     * the DataONE system.
369
     * 
370
     * @param session - the Session object containing the credentials for the Subject
371
     * @param sysmeta - Copy of the CN held system metadata for the object
372
     * @param sourceNode - A reference to node from which the content should be 
373
     *                     retrieved. The reference should be resolved by 
374
     *                     checking the CN node registry.
375
     * 
376
     * @return true if the replication succeeds
377
     * 
378
     * @throws ServiceFailure
379
     * @throws NotAuthorized
380
     * @throws NotImplemented
381
     * @throws UnsupportedType
382
     * @throws InsufficientResources
383
     * @throws InvalidRequest
384
     */
385
    @Override
386
    public boolean replicate(Session session, SystemMetadata sysmeta,
387
            NodeReference sourceNode) throws NotImplemented, ServiceFailure,
388
            NotAuthorized, InvalidRequest, InsufficientResources,
389
            UnsupportedType {
390

    
391
        if (session != null && sysmeta != null && sourceNode != null) {
392
            logMetacat.info("MNodeService.replicate() called with parameters: \n" +
393
                            "\tSession.Subject      = "                           +
394
                            session.getSubject().getValue() + "\n"                +
395
                            "\tidentifier           = "                           + 
396
                            sysmeta.getIdentifier().getValue()                    +
397
                            "\n" + "\tSource NodeReference ="                     +
398
                            sourceNode.getValue());
399
        }
400
        boolean result = false;
401
        String nodeIdStr = null;
402
        NodeReference nodeId = null;
403

    
404
        // get the referenced object
405
        Identifier pid = sysmeta.getIdentifier();
406

    
407
        // get from the membernode
408
        // TODO: switch credentials for the server retrieval?
409
        this.mn = D1Client.getMN(sourceNode);
410
        this.cn = D1Client.getCN();
411
        InputStream object = null;
412
        Session thisNodeSession = null;
413
        SystemMetadata localSystemMetadata = null;
414
        BaseException failure = null;
415
        String localId = null;
416
        
417
        // TODO: check credentials
418
        // cannot be called by public
419
        if (session == null || session.getSubject() == null) {
420
            String msg = "No session was provided to replicate identifier " +
421
            sysmeta.getIdentifier().getValue();
422
            failure = new NotAuthorized("2152", msg);
423
            setReplicationStatus(thisNodeSession, pid, nodeId, ReplicationStatus.FAILED, failure);
424
            logMetacat.info(msg);
425
            return true;
426
        }
427

    
428

    
429
        // get the local node id
430
        try {
431
            nodeIdStr = PropertyService.getProperty("dataone.nodeId");
432
            nodeId = new NodeReference();
433
            nodeId.setValue(nodeIdStr);
434

    
435
        } catch (PropertyNotFoundException e1) {
436
            String msg = "Couldn't get dataone.nodeId property: " + e1.getMessage();
437
            failure = new ServiceFailure("2151", msg);
438
            setReplicationStatus(thisNodeSession, pid, nodeId, ReplicationStatus.FAILED, failure);
439
            logMetacat.error(msg);
440
            return true;
441

    
442
        }
443
        
444

    
445
        try {
446
            // do we already have a replica?
447
            try {
448
                localId = IdentifierManager.getInstance().getLocalId(pid.getValue());
449

    
450
                String msg = "Can't read the object bytes properly, replica is invalid.";
451
                ServiceFailure serviceFailure = new ServiceFailure("2151", msg);
452
                
453
                // if we have a local id, get the local object
454
                try {
455
                    object = MetacatHandler.read(localId);
456
                    
457
                } catch (Exception e) {
458
                    // let the CN know that the replication failed
459
                    setReplicationStatus(thisNodeSession, pid, nodeId, ReplicationStatus.FAILED, serviceFailure);
460
                    logMetacat.warn(msg);
461
                    throw serviceFailure;
462
                    
463
                }
464

    
465
            } catch (McdbDocNotFoundException e) {
466
                logMetacat.info("No replica found. Continuing.");
467
                
468
            }
469
            
470
            // no local replica, get a replica
471
            if ( object == null ) {
472
                // session should be null to use the default certificate
473
                // location set in the Certificate manager
474
                object = mn.getReplica(thisNodeSession, pid);
475
                logMetacat.info("MNodeService.getReplica() called for identifier "
476
                                + pid.getValue());
477

    
478
            }
479

    
480
        } catch (InvalidToken e) {            
481
            String msg = "Could not retrieve object to replicate (InvalidToken): "+ e.getMessage();
482
            failure = new ServiceFailure("2151", msg);
483
            setReplicationStatus(thisNodeSession, pid, nodeId, ReplicationStatus.FAILED, failure);
484
            logMetacat.error(msg);
485
            throw new ServiceFailure("2151", msg);
486

    
487
        } catch (NotFound e) {
488
            String msg = "Could not retrieve object to replicate (NotFound): "+ e.getMessage();
489
            failure = new ServiceFailure("2151", msg);
490
            setReplicationStatus(thisNodeSession, pid, nodeId, ReplicationStatus.FAILED, failure);
491
            logMetacat.error(msg);
492
            throw new ServiceFailure("2151", msg);
493

    
494
        }
495

    
496
        // verify checksum on the object, if supported
497
        if (object.markSupported()) {
498
            Checksum givenChecksum = sysmeta.getChecksum();
499
            Checksum computedChecksum = null;
500
            try {
501
                computedChecksum = ChecksumUtil.checksum(object,
502
                        givenChecksum.getAlgorithm());
503
                object.reset();
504

    
505
            } catch (Exception e) {
506
                String msg = "Error computing checksum on replica: "
507
                        + e.getMessage();
508
                logMetacat.error(msg);
509
                ServiceFailure sf = new ServiceFailure("2151", msg);
510
                sf.initCause(e);
511
                throw sf;
512
            }
513
            if (!givenChecksum.getValue().equals(computedChecksum.getValue())) {
514
                logMetacat.error("Given    checksum for " + pid.getValue() + 
515
                    "is " + givenChecksum.getValue());
516
                logMetacat.error("Computed checksum for " + pid.getValue() + 
517
                    "is " + computedChecksum.getValue());
518
                throw new ServiceFailure("2151",
519
                        "Computed checksum does not match declared checksum");
520
            }
521
        }
522

    
523
        // add it to local store
524
        Identifier retPid;
525
        try {
526
            // skip the MN.create -- this mutates the system metadata and we
527
            // dont want it to
528
            if ( localId == null ) {
529
                
530
                retPid = super.create(session, pid, object, sysmeta);
531
                result = (retPid.getValue().equals(pid.getValue()));
532
            }
533
            
534
        } catch (InvalidToken e) {
535
            String msg = "Could not save object to local store (InvalidToken): " + e.getMessage();
536
            failure = new ServiceFailure("2151", msg);
537
            setReplicationStatus(thisNodeSession, pid, nodeId, ReplicationStatus.FAILED, failure);
538
            logMetacat.error(msg);
539
            throw new ServiceFailure("2151", msg);
540
        
541
        } catch (IdentifierNotUnique e) {
542
            String msg = "Could not save object to local store (IdentifierNotUnique): " + e.getMessage();
543
            failure = new ServiceFailure("2151", msg);
544
            setReplicationStatus(thisNodeSession, pid, nodeId, ReplicationStatus.FAILED, failure);
545
            logMetacat.error(msg);
546
            throw new ServiceFailure("2151", msg);
547
        
548
        } catch (InvalidSystemMetadata e) {
549
            String msg = "Could not save object to local store (InvalidSystemMetadata): " + e.getMessage();
550
            failure = new ServiceFailure("2151", msg);
551
            setReplicationStatus(thisNodeSession, pid, nodeId, ReplicationStatus.FAILED, failure);
552
            logMetacat.error(msg);
553
            throw new ServiceFailure("2151", msg);
554
            
555
        }
556

    
557
        // finish by setting the replication status
558
        setReplicationStatus(thisNodeSession, pid, nodeId, ReplicationStatus.COMPLETED, null);
559
        return result;
560

    
561
    }
562

    
563
    /**
564
     * Return the object identified by the given object identifier
565
     * 
566
     * @param session - the Session object containing the credentials for the Subject
567
     * @param pid - the object identifier for the given object
568
     * 
569
     * @return inputStream - the input stream of the given object
570
     * 
571
     * @throws InvalidToken
572
     * @throws ServiceFailure
573
     * @throws NotAuthorized
574
     * @throws InvalidRequest
575
     * @throws NotImplemented
576
     */
577
    @Override
578
    public InputStream get(Session session, Identifier pid) 
579
    throws InvalidToken, ServiceFailure, NotAuthorized, NotFound, NotImplemented {
580

    
581
        return super.get(session, pid);
582

    
583
    }
584

    
585
    /**
586
     * Returns a Checksum for the specified object using an accepted hashing algorithm
587
     * 
588
     * @param session - the Session object containing the credentials for the Subject
589
     * @param pid - the object identifier for the given object
590
     * @param algorithm -  the name of an algorithm that will be used to compute 
591
     *                     a checksum of the bytes of the object
592
     * 
593
     * @return checksum - the checksum of the given object
594
     * 
595
     * @throws InvalidToken
596
     * @throws ServiceFailure
597
     * @throws NotAuthorized
598
     * @throws NotFound
599
     * @throws InvalidRequest
600
     * @throws NotImplemented
601
     */
602
    @Override
603
    public Checksum getChecksum(Session session, Identifier pid, String algorithm) 
604
        throws InvalidToken, ServiceFailure, NotAuthorized, NotFound,
605
        InvalidRequest, NotImplemented {
606

    
607
        Checksum checksum = null;
608

    
609
        InputStream inputStream = get(session, pid);
610

    
611
        try {
612
            checksum = ChecksumUtil.checksum(inputStream, algorithm);
613

    
614
        } catch (NoSuchAlgorithmException e) {
615
            throw new ServiceFailure("1410", "The checksum for the object specified by " + pid.getValue() + "could not be returned due to an internal error: "
616
                    + e.getMessage());
617
        } catch (IOException e) {
618
            throw new ServiceFailure("1410", "The checksum for the object specified by " + pid.getValue() + "could not be returned due to an internal error: "
619
                    + e.getMessage());
620
        }
621

    
622
        if (checksum == null) {
623
            throw new ServiceFailure("1410", "The checksum for the object specified by " + pid.getValue() + "could not be returned.");
624
        }
625

    
626
        return checksum;
627
    }
628

    
629
    /**
630
     * Return the system metadata for a given object
631
     * 
632
     * @param session - the Session object containing the credentials for the Subject
633
     * @param pid - the object identifier for the given object
634
     * 
635
     * @return inputStream - the input stream of the given system metadata object
636
     * 
637
     * @throws InvalidToken
638
     * @throws ServiceFailure
639
     * @throws NotAuthorized
640
     * @throws NotFound
641
     * @throws InvalidRequest
642
     * @throws NotImplemented
643
     */
644
    @Override
645
    public SystemMetadata getSystemMetadata(Session session, Identifier pid) 
646
        throws InvalidToken, ServiceFailure, NotAuthorized, NotFound,
647
        NotImplemented {
648

    
649
        return super.getSystemMetadata(session, pid);
650
    }
651

    
652
    /**
653
     * Retrieve the list of objects present on the MN that match the calling parameters
654
     * 
655
     * @param session - the Session object containing the credentials for the Subject
656
     * @param startTime - Specifies the beginning of the time range from which 
657
     *                    to return object (>=)
658
     * @param endTime - Specifies the beginning of the time range from which 
659
     *                  to return object (>=)
660
     * @param objectFormat - Restrict results to the specified object format
661
     * @param replicaStatus - Indicates if replicated objects should be returned in the list
662
     * @param start - The zero-based index of the first value, relative to the 
663
     *                first record of the resultset that matches the parameters.
664
     * @param count - The maximum number of entries that should be returned in 
665
     *                the response. The Member Node may return less entries 
666
     *                than specified in this value.
667
     * 
668
     * @return objectList - the list of objects matching the criteria
669
     * 
670
     * @throws InvalidToken
671
     * @throws ServiceFailure
672
     * @throws NotAuthorized
673
     * @throws InvalidRequest
674
     * @throws NotImplemented
675
     */
676
    @Override
677
    public ObjectList listObjects(Session session, Date startTime, Date endTime, ObjectFormatIdentifier objectFormatId, Boolean replicaStatus, Integer start,
678
            Integer count) throws NotAuthorized, InvalidRequest, NotImplemented, ServiceFailure, InvalidToken {
679

    
680
        ObjectList objectList = null;
681

    
682
        try {
683
            objectList = IdentifierManager.getInstance().querySystemMetadata(startTime, endTime, objectFormatId, replicaStatus, start, count);
684
        } catch (Exception e) {
685
            throw new ServiceFailure("1580", "Error querying system metadata: " + e.getMessage());
686
        }
687

    
688
        return objectList;
689
    }
690

    
691
    /**
692
     * Return a description of the node's capabilities and services.
693
     * 
694
     * @return node - the technical capabilities of the Member Node
695
     * 
696
     * @throws ServiceFailure
697
     * @throws NotAuthorized
698
     * @throws InvalidRequest
699
     * @throws NotImplemented
700
     */
701
    @Override
702
    public Node getCapabilities() 
703
        throws NotImplemented, ServiceFailure {
704

    
705
        String nodeName = null;
706
        String nodeId = null;
707
        String subject = null;
708
        String contactSubject = null;
709
        String nodeDesc = null;
710
        String nodeTypeString = null;
711
        NodeType nodeType = null;
712
        String mnCoreServiceVersion = null;
713
        String mnReadServiceVersion = null;
714
        String mnAuthorizationServiceVersion = null;
715
        String mnStorageServiceVersion = null;
716
        String mnReplicationServiceVersion = null;
717

    
718
        boolean nodeSynchronize = false;
719
        boolean nodeReplicate = false;
720
        boolean mnCoreServiceAvailable = false;
721
        boolean mnReadServiceAvailable = false;
722
        boolean mnAuthorizationServiceAvailable = false;
723
        boolean mnStorageServiceAvailable = false;
724
        boolean mnReplicationServiceAvailable = false;
725

    
726
        try {
727
            // get the properties of the node based on configuration information
728
            nodeName = PropertyService.getProperty("dataone.nodeName");
729
            nodeId = PropertyService.getProperty("dataone.nodeId");
730
            subject = PropertyService.getProperty("dataone.subject");
731
            contactSubject = PropertyService.getProperty("dataone.contactSubject");
732
            nodeDesc = PropertyService.getProperty("dataone.nodeDescription");
733
            nodeTypeString = PropertyService.getProperty("dataone.nodeType");
734
            nodeType = NodeType.convert(nodeTypeString);
735
            nodeSynchronize = new Boolean(PropertyService.getProperty("dataone.nodeSynchronize")).booleanValue();
736
            nodeReplicate = new Boolean(PropertyService.getProperty("dataone.nodeReplicate")).booleanValue();
737

    
738
            mnCoreServiceVersion = PropertyService.getProperty("dataone.mnCore.serviceVersion");
739
            mnReadServiceVersion = PropertyService.getProperty("dataone.mnRead.serviceVersion");
740
            mnAuthorizationServiceVersion = PropertyService.getProperty("dataone.mnAuthorization.serviceVersion");
741
            mnStorageServiceVersion = PropertyService.getProperty("dataone.mnStorage.serviceVersion");
742
            mnReplicationServiceVersion = PropertyService.getProperty("dataone.mnReplication.serviceVersion");
743

    
744
            mnCoreServiceAvailable = new Boolean(PropertyService.getProperty("dataone.mnCore.serviceAvailable")).booleanValue();
745
            mnReadServiceAvailable = new Boolean(PropertyService.getProperty("dataone.mnRead.serviceAvailable")).booleanValue();
746
            mnAuthorizationServiceAvailable = new Boolean(PropertyService.getProperty("dataone.mnAuthorization.serviceAvailable")).booleanValue();
747
            mnStorageServiceAvailable = new Boolean(PropertyService.getProperty("dataone.mnStorage.serviceAvailable")).booleanValue();
748
            mnReplicationServiceAvailable = new Boolean(PropertyService.getProperty("dataone.mnReplication.serviceAvailable")).booleanValue();
749

    
750
            // Set the properties of the node based on configuration information and
751
            // calls to current status methods
752
            String serviceName = SystemUtil.getContextURL() + "/" + PropertyService.getProperty("dataone.serviceName");
753
            Node node = new Node();
754
            node.setBaseURL(serviceName + "/" + nodeTypeString);
755
            node.setDescription(nodeDesc);
756

    
757
            // set the node's health information
758
            node.setState(NodeState.UP);
759
            
760
            // set the ping response to the current value
761
            Ping canPing = new Ping();
762
            canPing.setSuccess(false);
763
            try {
764
            	Date pingDate = ping();
765
                canPing.setSuccess(pingDate != null);
766
            } catch (BaseException e) {
767
                e.printStackTrace();
768
                // guess it can't be pinged
769
            }
770
            
771
            node.setPing(canPing);
772

    
773
            NodeReference identifier = new NodeReference();
774
            identifier.setValue(nodeId);
775
            node.setIdentifier(identifier);
776
            Subject s = new Subject();
777
            s.setValue(subject);
778
            node.addSubject(s);
779
            Subject contact = new Subject();
780
            contact.setValue(contactSubject);
781
            node.addContactSubject(contact);
782
            node.setName(nodeName);
783
            node.setReplicate(nodeReplicate);
784
            node.setSynchronize(nodeSynchronize);
785

    
786
            // services: MNAuthorization, MNCore, MNRead, MNReplication, MNStorage
787
            Services services = new Services();
788

    
789
            Service sMNCore = new Service();
790
            sMNCore.setName("MNCore");
791
            sMNCore.setVersion(mnCoreServiceVersion);
792
            sMNCore.setAvailable(mnCoreServiceAvailable);
793

    
794
            Service sMNRead = new Service();
795
            sMNRead.setName("MNRead");
796
            sMNRead.setVersion(mnReadServiceVersion);
797
            sMNRead.setAvailable(mnReadServiceAvailable);
798

    
799
            Service sMNAuthorization = new Service();
800
            sMNAuthorization.setName("MNAuthorization");
801
            sMNAuthorization.setVersion(mnAuthorizationServiceVersion);
802
            sMNAuthorization.setAvailable(mnAuthorizationServiceAvailable);
803

    
804
            Service sMNStorage = new Service();
805
            sMNStorage.setName("MNStorage");
806
            sMNStorage.setVersion(mnStorageServiceVersion);
807
            sMNStorage.setAvailable(mnStorageServiceAvailable);
808

    
809
            Service sMNReplication = new Service();
810
            sMNReplication.setName("MNReplication");
811
            sMNReplication.setVersion(mnReplicationServiceVersion);
812
            sMNReplication.setAvailable(mnReplicationServiceAvailable);
813

    
814
            services.addService(sMNRead);
815
            services.addService(sMNCore);
816
            services.addService(sMNAuthorization);
817
            services.addService(sMNStorage);
818
            services.addService(sMNReplication);
819
            node.setServices(services);
820

    
821
            // Set the schedule for synchronization
822
            Synchronization synchronization = new Synchronization();
823
            Schedule schedule = new Schedule();
824
            Date now = new Date();
825
            schedule.setYear(PropertyService.getProperty("dataone.nodeSynchronization.schedule.year"));
826
            schedule.setMon(PropertyService.getProperty("dataone.nodeSynchronization.schedule.mon"));
827
            schedule.setMday(PropertyService.getProperty("dataone.nodeSynchronization.schedule.mday"));
828
            schedule.setWday(PropertyService.getProperty("dataone.nodeSynchronization.schedule.wday"));
829
            schedule.setHour(PropertyService.getProperty("dataone.nodeSynchronization.schedule.hour"));
830
            schedule.setMin(PropertyService.getProperty("dataone.nodeSynchronization.schedule.min"));
831
            schedule.setSec(PropertyService.getProperty("dataone.nodeSynchronization.schedule.sec"));
832
            synchronization.setSchedule(schedule);
833
            synchronization.setLastHarvested(now);
834
            synchronization.setLastCompleteHarvest(now);
835
            node.setSynchronization(synchronization);
836

    
837
            node.setType(nodeType);
838
            return node;
839

    
840
        } catch (PropertyNotFoundException pnfe) {
841
            String msg = "MNodeService.getCapabilities(): " + "property not found: " + pnfe.getMessage();
842
            logMetacat.error(msg);
843
            throw new ServiceFailure("2162", msg);
844
        }
845
    }
846

    
847
    /**
848
     * Returns the number of operations that have been serviced by the node 
849
     * over time periods of one and 24 hours.
850
     * 
851
     * @param session - the Session object containing the credentials for the Subject
852
     * @param period - An ISO8601 compatible DateTime range specifying the time 
853
     *                 range for which to return operation statistics.
854
     * @param requestor - Limit to operations performed by given requestor identity.
855
     * @param event -  Enumerated value indicating the type of event being examined
856
     * @param format - Limit to events involving objects of the specified format
857
     * 
858
     * @return the desired log records
859
     * 
860
     * @throws InvalidToken
861
     * @throws ServiceFailure
862
     * @throws NotAuthorized
863
     * @throws InvalidRequest
864
     * @throws NotImplemented
865
     */
866
    public MonitorList getOperationStatistics(Session session, Date startTime, 
867
        Date endTime, Subject requestor, Event event, ObjectFormatIdentifier formatId)
868
        throws NotImplemented, ServiceFailure, NotAuthorized, InsufficientResources, UnsupportedType {
869

    
870
        MonitorList monitorList = new MonitorList();
871

    
872
        try {
873

    
874
            // get log records first
875
            Log logs = getLogRecords(session, startTime, endTime, event, null, 0, null);
876

    
877
            // TODO: aggregate by day or hour -- needs clarification
878
            int count = 1;
879
            for (LogEntry logEntry : logs.getLogEntryList()) {
880
                Identifier pid = logEntry.getIdentifier();
881
                Date logDate = logEntry.getDateLogged();
882
                // if we are filtering by format
883
                if (formatId != null) {
884
                    SystemMetadata sysmeta = HazelcastService.getInstance().getSystemMetadataMap().get(pid);
885
                    if (!sysmeta.getFormatId().getValue().equals(formatId.getValue())) {
886
                        // does not match
887
                        continue;
888
                    }
889
                }
890
                MonitorInfo item = new MonitorInfo();
891
                item.setCount(count);
892
                item.setDate(new java.sql.Date(logDate.getTime()));
893
                monitorList.addMonitorInfo(item);
894

    
895
            }
896
        } catch (Exception e) {
897
            e.printStackTrace();
898
            throw new ServiceFailure("2081", "Could not retrieve statistics: " + e.getMessage());
899
        }
900

    
901
        return monitorList;
902

    
903
    }
904

    
905
    /**
906
     * A callback method used by a CN to indicate to a MN that it cannot 
907
     * complete synchronization of the science metadata identified by pid.  Log
908
     * the event in the metacat event log.
909
     * 
910
     * @param session
911
     * @param syncFailed
912
     * 
913
     * @throws ServiceFailure
914
     * @throws NotAuthorized
915
     * @throws NotImplemented
916
     */
917
    @Override
918
    public boolean synchronizationFailed(Session session, SynchronizationFailed syncFailed) 
919
        throws NotImplemented, ServiceFailure, NotAuthorized {
920

    
921
        String localId;
922
        Identifier pid;
923
        if ( syncFailed.getPid() != null ) {
924
            pid = new Identifier();
925
            pid.setValue(syncFailed.getPid());
926
            boolean allowed;
927
            
928
            //are we allowed? only CNs
929
            try {
930
                allowed = isAdminAuthorized(session, pid, Permission.READ);
931
                if ( !allowed ){
932
                    throw new NotAuthorized("2162", 
933
                            "Not allowed to call synchronizationFailed() on this node.");
934
                }
935
            } catch (InvalidToken e) {
936
                throw new NotAuthorized("2162", 
937
                        "Not allowed to call synchronizationFailed() on this node.");
938

    
939
            }
940
            
941
        } else {
942
            throw new ServiceFailure("2161", "The identifier cannot be null.");
943

    
944
        }
945
        
946
        try {
947
            localId = IdentifierManager.getInstance().getLocalId(pid.getValue());
948
        } catch (McdbDocNotFoundException e) {
949
            throw new ServiceFailure("2161", "The identifier specified by " + 
950
                    syncFailed.getPid() + " was not found on this node.");
951

    
952
        }
953
        // TODO: update the CN URL below when the CNRead.SynchronizationFailed
954
        // method is changed to include the URL as a parameter
955
        logMetacat.debug("Synchronization for the object identified by " + 
956
                pid.getValue() + " failed from " + syncFailed.getNodeId() + 
957
                " Logging the event to the Metacat EventLog as a 'syncFailed' event.");
958
        // TODO: use the event type enum when the SYNCHRONIZATION_FAILED event is added
959
        String principal = Constants.SUBJECT_PUBLIC;
960
        if (session != null && session.getSubject() != null) {
961
          principal = session.getSubject().getValue();
962
        }
963
        try {
964
          EventLog.getInstance().log(request.getRemoteAddr(), request.getHeader("User-Agent"), principal, localId, "synchronization_failed");
965
        } catch (Exception e) {
966
            throw new ServiceFailure("2161", "Could not log the error for: " + pid.getValue());
967
        }
968
        //EventLog.getInstance().log("CN URL WILL GO HERE", 
969
        //  session.getSubject().getValue(), localId, Event.SYNCHRONIZATION_FAILED);
970
        return true;
971

    
972
    }
973

    
974
    /**
975
     * Essentially a get() but with different logging behavior
976
     */
977
    @Override
978
    public InputStream getReplica(Session session, Identifier pid) 
979
        throws NotAuthorized, NotImplemented, ServiceFailure, InvalidToken {
980

    
981
        logMetacat.info("MNodeService.getReplica() called.");
982

    
983
        // cannot be called by public
984
        if (session == null) {
985
        	throw new InvalidToken("2183", "No session was provided.");
986
        }
987
        
988
        logMetacat.info("MNodeService.getReplica() called with parameters: \n" +
989
             "\tSession.Subject      = " + session.getSubject().getValue() + "\n" +
990
             "\tIdentifier           = " + pid.getValue());
991

    
992
        InputStream inputStream = null; // bytes to be returned
993
        handler = new MetacatHandler(new Timer());
994
        boolean allowed = false;
995
        String localId; // the metacat docid for the pid
996

    
997
        // get the local docid from Metacat
998
        try {
999
            localId = IdentifierManager.getInstance().getLocalId(pid.getValue());
1000
        } catch (McdbDocNotFoundException e) {
1001
            throw new ServiceFailure("2181", "The object specified by " + 
1002
                    pid.getValue() + " does not exist at this node.");
1003
            
1004
        }
1005

    
1006
        Subject targetNodeSubject = session.getSubject();
1007

    
1008
        // check for authorization to replicate, null session to act as this source MN
1009
        try {
1010
            allowed = D1Client.getCN().isNodeAuthorized(null, targetNodeSubject, pid);
1011
        } catch (InvalidToken e1) {
1012
            throw new ServiceFailure("2181", "Could not determine if node is authorized: " 
1013
                + e1.getMessage());
1014
            
1015
        } catch (NotFound e1) {
1016
            throw new ServiceFailure("2181", "Could not determine if node is authorized: " 
1017
                    + e1.getMessage());
1018

    
1019
        } catch (InvalidRequest e1) {
1020
            throw new ServiceFailure("2181", "Could not determine if node is authorized: " 
1021
                    + e1.getMessage());
1022

    
1023
        }
1024

    
1025
        logMetacat.info("Called D1Client.isNodeAuthorized(). Allowed = " + allowed +
1026
            " for identifier " + pid.getValue());
1027

    
1028
        // if the person is authorized, perform the read
1029
        if (allowed) {
1030
            try {
1031
                inputStream = MetacatHandler.read(localId);
1032
            } catch (Exception e) {
1033
                throw new ServiceFailure("1020", "The object specified by " + 
1034
                    pid.getValue() + "could not be returned due to error: " + e.getMessage());
1035
            }
1036
        }
1037

    
1038
        // if we fail to set the input stream
1039
        if (inputStream == null) {
1040
            throw new ServiceFailure("2181", "The object specified by " + 
1041
                pid.getValue() + "does not exist at this node.");
1042
        }
1043

    
1044
        // log the replica event
1045
        String principal = null;
1046
        if (session.getSubject() != null) {
1047
            principal = session.getSubject().getValue();
1048
        }
1049
        EventLog.getInstance().log(request.getRemoteAddr(), 
1050
            request.getHeader("User-Agent"), principal, localId, "replicate");
1051

    
1052
        return inputStream;
1053
    }
1054

    
1055
    /**
1056
     * A method to notify the Member Node that the authoritative copy of 
1057
     * system metadata on the Coordinating Nodes has changed.
1058
     * 
1059
     * @param session   Session information that contains the identity of the 
1060
     *                  calling user as retrieved from the X.509 certificate 
1061
     *                  which must be traceable to the CILogon service.
1062
     * @param serialVersion   The serialVersion of the system metadata
1063
     * @param dateSysMetaLastModified  The time stamp for when the system metadata was changed
1064
     * @throws NotImplemented
1065
     * @throws ServiceFailure
1066
     * @throws NotAuthorized
1067
     * @throws InvalidRequest
1068
     * @throws InvalidToken
1069
     */
1070
    public boolean systemMetadataChanged(Session session, Identifier pid,
1071
        long serialVersion, Date dateSysMetaLastModified) 
1072
        throws NotImplemented, ServiceFailure, NotAuthorized, InvalidRequest,
1073
        InvalidToken {
1074
        
1075
        SystemMetadata currentLocalSysMeta = null;
1076
        SystemMetadata newSysMeta = null;
1077
        CNode cn = D1Client.getCN();
1078
        NodeList nodeList = null;
1079
        Subject callingSubject = null;
1080
        boolean allowed = false;
1081
        
1082
        // are we allowed to call this?
1083
        callingSubject = session.getSubject();
1084
        nodeList = cn.listNodes();
1085
        
1086
        for(Node node : nodeList.getNodeList()) {
1087
            // must be a CN
1088
            if ( node.getType().equals(NodeType.CN)) {
1089
               List<Subject> subjectList = node.getSubjectList();
1090
               // the calling subject must be in the subject list
1091
               if ( subjectList.contains(callingSubject)) {
1092
                   allowed = true;
1093
                   
1094
               }
1095
               
1096
            }
1097
        }
1098
        
1099
        if (!allowed ) {
1100
            String msg = "The subject identified by " + callingSubject.getValue() +
1101
              " is not authorized to call this service.";
1102
            throw new NotAuthorized("1331", msg);
1103
            
1104
        }
1105
        
1106
        // compare what we have locally to what is sent in the change notification
1107
        try {
1108
            currentLocalSysMeta = HazelcastService.getInstance().getSystemMetadataMap().get(pid);
1109
             
1110
        } catch (RuntimeException e) {
1111
            String msg = "SystemMetadata for pid " + pid.getValue() +
1112
              " couldn't be updated because it couldn't be found locally: " +
1113
              e.getMessage();
1114
            logMetacat.error(msg);
1115
            ServiceFailure sf = new ServiceFailure("1333", msg);
1116
            sf.initCause(e);
1117
            throw sf; 
1118
        }
1119
        
1120
        if (currentLocalSysMeta.getSerialVersion().longValue() < serialVersion ) {
1121
            try {
1122
                newSysMeta = cn.getSystemMetadata(null, pid);
1123
            } catch (NotFound e) {
1124
                // huh? you just said you had it
1125
            	String msg = "On updating the local copy of system metadata " + 
1126
                "for pid " + pid.getValue() +", the CN reports it is not found." +
1127
                " The error message was: " + e.getMessage();
1128
                logMetacat.error(msg);
1129
                ServiceFailure sf = new ServiceFailure("1333", msg);
1130
                sf.initCause(e);
1131
                throw sf;
1132
            }
1133
            
1134
            // update the local copy of system metadata for the pid
1135
            try {
1136
                HazelcastService.getInstance().getSystemMetadataMap().put(newSysMeta.getIdentifier(), newSysMeta);
1137
                logMetacat.info("Updated local copy of system metadata for pid " +
1138
                    pid.getValue() + " after change notification from the CN.");
1139
                
1140
            } catch (RuntimeException e) {
1141
                String msg = "SystemMetadata for pid " + pid.getValue() +
1142
                  " couldn't be updated: " +
1143
                  e.getMessage();
1144
                logMetacat.error(msg);
1145
                ServiceFailure sf = new ServiceFailure("1333", msg);
1146
                sf.initCause(e);
1147
                throw sf;
1148
            }
1149
        }
1150
        
1151
        return true;
1152
        
1153
    }
1154
    
1155
    /*
1156
     * Set the replication status for the object on the Coordinating Node
1157
     * 
1158
     * @param session - the session for the this target node
1159
     * @param pid - the identifier of the object being updated
1160
     * @param nodeId - the identifier of this target node
1161
     * @param status - the replication status to set
1162
     * @param failure - the exception to include, if any
1163
     */
1164
    private void setReplicationStatus(Session session, Identifier pid, 
1165
        NodeReference nodeId, ReplicationStatus status, BaseException failure) 
1166
        throws ServiceFailure, NotImplemented, NotAuthorized, 
1167
        InvalidRequest {
1168
        
1169
        // call the CN as the MN to set the replication status
1170
        try {
1171
            this.cn = D1Client.getCN();
1172
            this.cn.setReplicationStatus(session, pid, nodeId,
1173
                    status, failure);
1174
            
1175
        } catch (InvalidToken e) {
1176
        	String msg = "Could not set the replication status for " + pid.getValue() + " on the CN (InvalidToken): " + e.getMessage();
1177
            logMetacat.error(msg);
1178
        	throw new ServiceFailure("2151",
1179
                    msg);
1180
            
1181
        } catch (NotFound e) {
1182
        	String msg = "Could not set the replication status for " + pid.getValue() + " on the CN (NotFound): " + e.getMessage();
1183
            logMetacat.error(msg);
1184
        	throw new ServiceFailure("2151",
1185
                    msg);
1186
            
1187
        }
1188

    
1189

    
1190
    }
1191

    
1192
	@Override
1193
	public Identifier generateIdentifier(Session arg0, String arg1, String arg2)
1194
			throws InvalidToken, ServiceFailure, NotAuthorized, NotImplemented,
1195
			InvalidRequest {
1196
		throw new NotImplemented("2194", "Member Node does not implement generateIdentifier method");
1197
	}
1198
    
1199
}
(3-3/5)