OLD | NEW |
| (Empty) |
1 // Copyright 2016 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "services/catalog/reader.h" | |
6 | |
7 #include "base/base_paths.h" | |
8 #include "base/bind.h" | |
9 #include "base/files/file_enumerator.h" | |
10 #include "base/files/file_util.h" | |
11 #include "base/json/json_file_value_serializer.h" | |
12 #include "base/json/json_reader.h" | |
13 #include "base/memory/ptr_util.h" | |
14 #include "base/path_service.h" | |
15 #include "base/strings/string_util.h" | |
16 #include "base/strings/utf_string_conversions.h" | |
17 #include "base/task_runner_util.h" | |
18 #include "base/threading/thread_task_runner_handle.h" | |
19 #include "base/values.h" | |
20 #include "services/catalog/constants.h" | |
21 #include "services/catalog/entry.h" | |
22 #include "services/catalog/entry_cache.h" | |
23 #include "services/catalog/manifest_provider.h" | |
24 #include "services/catalog/public/interfaces/constants.mojom.h" | |
25 #include "services/service_manager/public/interfaces/constants.mojom.h" | |
26 | |
27 namespace catalog { | |
28 namespace { | |
29 | |
30 #if defined(OS_WIN) | |
31 const char kServiceExecutableExtension[] = ".service.exe"; | |
32 #else | |
33 const char kServiceExecutableExtension[] = ".service"; | |
34 #endif | |
35 | |
36 const char kCatalogServicesKey[] = "services"; | |
37 const char kCatalogServiceEmbeddedKey[] = "embedded"; | |
38 const char kCatalogServiceExecutableKey[] = "executable"; | |
39 const char kCatalogServiceManifestKey[] = "manifest"; | |
40 | |
41 base::FilePath GetManifestPath(const base::FilePath& package_dir, | |
42 const std::string& name, | |
43 const std::string& package_name_override) { | |
44 // TODO(beng): think more about how this should be done for exe targets. | |
45 std::string package_name = | |
46 package_name_override.empty() ? name : package_name_override; | |
47 return package_dir.AppendASCII(kPackagesDirName).AppendASCII( | |
48 package_name + "/manifest.json"); | |
49 } | |
50 | |
51 base::FilePath GetExecutablePath(const base::FilePath& package_dir, | |
52 const std::string& name) { | |
53 return package_dir.AppendASCII( | |
54 name + "/" + name + kServiceExecutableExtension); | |
55 } | |
56 | |
57 std::unique_ptr<Entry> ProcessManifest(const base::Value* manifest_root, | |
58 const base::FilePath& package_dir, | |
59 const base::FilePath& executable_path) { | |
60 | |
61 // Manifest was malformed or did not exist. | |
62 if (!manifest_root) | |
63 return nullptr; | |
64 | |
65 const base::DictionaryValue* dictionary = nullptr; | |
66 if (!manifest_root->GetAsDictionary(&dictionary)) | |
67 return nullptr; | |
68 | |
69 std::unique_ptr<Entry> entry = Entry::Deserialize(*dictionary); | |
70 if (!entry) | |
71 return nullptr; | |
72 if (!executable_path.empty()) | |
73 entry->set_path(executable_path); | |
74 else | |
75 entry->set_path(GetExecutablePath(package_dir, entry->name())); | |
76 return entry; | |
77 } | |
78 | |
79 std::unique_ptr<Entry> ProcessUniqueManifest( | |
80 std::unique_ptr<base::Value> manifest_root, | |
81 const base::FilePath& package_dir) { | |
82 return ProcessManifest(manifest_root.get(), package_dir, base::FilePath()); | |
83 } | |
84 | |
85 std::unique_ptr<Entry> CreateEntryForManifestAt( | |
86 const base::FilePath& manifest_path, | |
87 const base::FilePath& package_dir) { | |
88 JSONFileValueDeserializer deserializer(manifest_path); | |
89 int error = 0; | |
90 std::string message; | |
91 | |
92 // TODO(beng): probably want to do more detailed error checking. This should | |
93 // be done when figuring out if to unblock connection completion. | |
94 return ProcessUniqueManifest(deserializer.Deserialize(&error, &message), | |
95 package_dir); | |
96 } | |
97 | |
98 void ScanDir( | |
99 const base::FilePath& package_dir, | |
100 const Reader::ReadManifestCallback& read_manifest_callback, | |
101 scoped_refptr<base::SingleThreadTaskRunner> original_thread_task_runner, | |
102 const base::Closure& read_complete_closure) { | |
103 base::FileEnumerator enumerator(package_dir, false, | |
104 base::FileEnumerator::DIRECTORIES); | |
105 while (1) { | |
106 base::FilePath path = enumerator.Next(); | |
107 if (path.empty()) | |
108 break; | |
109 base::FilePath manifest_path = path.AppendASCII("manifest.json"); | |
110 std::unique_ptr<Entry> entry = | |
111 CreateEntryForManifestAt(manifest_path, package_dir); | |
112 if (!entry) | |
113 continue; | |
114 | |
115 // Skip over subdirs that contain only manifests, they're artifacts of the | |
116 // build (e.g. for applications that are packaged into others) and are not | |
117 // valid standalone packages. | |
118 base::FilePath package_path = GetExecutablePath(package_dir, entry->name()); | |
119 if (entry->name() != service_manager::mojom::kServiceName && | |
120 entry->name() != catalog::mojom::kServiceName && | |
121 !base::PathExists(package_path)) { | |
122 continue; | |
123 } | |
124 | |
125 original_thread_task_runner->PostTask( | |
126 FROM_HERE, | |
127 base::Bind(read_manifest_callback, base::Passed(&entry))); | |
128 } | |
129 | |
130 original_thread_task_runner->PostTask(FROM_HERE, read_complete_closure); | |
131 } | |
132 | |
133 std::unique_ptr<Entry> ReadManifest( | |
134 const base::FilePath& package_dir, | |
135 const std::string& mojo_name, | |
136 const std::string& package_name_override, | |
137 const base::FilePath& manifest_path_override) { | |
138 base::FilePath manifest_path; | |
139 if (manifest_path_override.empty()) { | |
140 manifest_path = | |
141 GetManifestPath(package_dir, mojo_name, package_name_override); | |
142 } else { | |
143 manifest_path = manifest_path_override; | |
144 } | |
145 | |
146 std::unique_ptr<Entry> entry = CreateEntryForManifestAt(manifest_path, | |
147 package_dir); | |
148 if (!entry) { | |
149 entry.reset(new Entry(mojo_name)); | |
150 entry->set_path(GetExecutablePath( | |
151 package_dir.AppendASCII(kPackagesDirName), mojo_name)); | |
152 } | |
153 return entry; | |
154 } | |
155 | |
156 void IgnoreResolveResult(service_manager::mojom::ResolveResultPtr, | |
157 service_manager::mojom::ResolveResultPtr) {} | |
158 | |
159 void LoadCatalogManifestIntoCache(const base::Value* root, | |
160 const base::FilePath& package_dir, | |
161 EntryCache* cache) { | |
162 DCHECK(root); | |
163 const base::DictionaryValue* catalog = nullptr; | |
164 if (!root->GetAsDictionary(&catalog)) { | |
165 LOG(ERROR) << "Catalog manifest is not a dictionary value."; | |
166 return; | |
167 } | |
168 DCHECK(catalog); | |
169 | |
170 const base::DictionaryValue* services = nullptr; | |
171 if (!catalog->GetDictionary(kCatalogServicesKey, &services)) { | |
172 LOG(ERROR) << "Catalog manifest \"services\" is not a dictionary value."; | |
173 return; | |
174 } | |
175 | |
176 for (base::DictionaryValue::Iterator it(*services); !it.IsAtEnd(); | |
177 it.Advance()) { | |
178 const base::DictionaryValue* service_entry = nullptr; | |
179 if (!it.value().GetAsDictionary(&service_entry)) { | |
180 LOG(ERROR) << "Catalog service entry for \"" << it.key() | |
181 << "\" is not a dictionary value."; | |
182 continue; | |
183 } | |
184 | |
185 bool is_embedded = false; | |
186 service_entry->GetBoolean(kCatalogServiceEmbeddedKey, &is_embedded); | |
187 | |
188 base::FilePath executable_path; | |
189 std::string executable_path_string; | |
190 if (service_entry->GetString(kCatalogServiceExecutableKey, | |
191 &executable_path_string)) { | |
192 base::FilePath exe_dir; | |
193 CHECK(base::PathService::Get(base::DIR_EXE, &exe_dir)); | |
194 #if defined(OS_WIN) | |
195 executable_path_string += ".exe"; | |
196 base::ReplaceFirstSubstringAfterOffset( | |
197 &executable_path_string, 0, "@EXE_DIR", | |
198 base::UTF16ToUTF8(exe_dir.value())); | |
199 executable_path = | |
200 base::FilePath(base::UTF8ToUTF16(executable_path_string)); | |
201 #else | |
202 base::ReplaceFirstSubstringAfterOffset( | |
203 &executable_path_string, 0, "@EXE_DIR", exe_dir.value()); | |
204 executable_path = base::FilePath(executable_path_string); | |
205 #endif | |
206 } | |
207 | |
208 const base::DictionaryValue* manifest = nullptr; | |
209 if (!service_entry->GetDictionary(kCatalogServiceManifestKey, &manifest)) { | |
210 LOG(ERROR) << "Catalog entry for \"" << it.key() << "\" has an invalid " | |
211 << "\"manifest\" value."; | |
212 continue; | |
213 } | |
214 | |
215 DCHECK(!(is_embedded && !executable_path.empty())); | |
216 | |
217 auto entry = ProcessManifest( | |
218 manifest, is_embedded ? base::FilePath() : package_dir, | |
219 executable_path); | |
220 if (entry) { | |
221 bool added = cache->AddRootEntry(std::move(entry)); | |
222 DCHECK(added); | |
223 } else { | |
224 LOG(ERROR) << "Failed to read manifest entry for \"" << it.key() << "\"."; | |
225 } | |
226 } | |
227 } | |
228 | |
229 } // namespace | |
230 | |
231 Reader::Reader(std::unique_ptr<base::Value> static_manifest, | |
232 EntryCache* cache) | |
233 : using_static_catalog_(true), | |
234 manifest_provider_(nullptr), | |
235 weak_factory_(this) { | |
236 PathService::Get(base::DIR_MODULE, &system_package_dir_); | |
237 LoadCatalogManifestIntoCache( | |
238 static_manifest.get(), system_package_dir_.AppendASCII(kPackagesDirName), | |
239 cache); | |
240 } | |
241 | |
242 // A sequenced task runner is used to guarantee requests are serviced in the | |
243 // order requested. To do otherwise means we may run callbacks in an | |
244 // unpredictable order, leading to flake. | |
245 Reader::Reader(base::SequencedWorkerPool* worker_pool, | |
246 ManifestProvider* manifest_provider) | |
247 : Reader(manifest_provider) { | |
248 file_task_runner_ = worker_pool->GetSequencedTaskRunnerWithShutdownBehavior( | |
249 base::SequencedWorkerPool::GetSequenceToken(), | |
250 base::SequencedWorkerPool::SKIP_ON_SHUTDOWN); | |
251 } | |
252 | |
253 Reader::Reader(base::SingleThreadTaskRunner* task_runner, | |
254 ManifestProvider* manifest_provider) | |
255 : Reader(manifest_provider) { | |
256 file_task_runner_ = task_runner; | |
257 } | |
258 | |
259 Reader::~Reader() {} | |
260 | |
261 void Reader::Read(const base::FilePath& package_dir, | |
262 EntryCache* cache, | |
263 const base::Closure& read_complete_closure) { | |
264 file_task_runner_->PostTask( | |
265 FROM_HERE, | |
266 base::Bind(&ScanDir, package_dir, | |
267 base::Bind(&Reader::OnReadManifest, weak_factory_.GetWeakPtr(), | |
268 cache, base::Bind(&IgnoreResolveResult)), | |
269 base::ThreadTaskRunnerHandle::Get(), | |
270 read_complete_closure)); | |
271 } | |
272 | |
273 void Reader::CreateEntryForName( | |
274 const std::string& name, | |
275 EntryCache* cache, | |
276 const CreateEntryForNameCallback& entry_created_callback) { | |
277 if (manifest_provider_) { | |
278 std::unique_ptr<base::Value> manifest_root = | |
279 manifest_provider_->GetManifest(name); | |
280 if (manifest_root) { | |
281 base::PostTaskAndReplyWithResult( | |
282 file_task_runner_.get(), FROM_HERE, | |
283 base::Bind(&ProcessUniqueManifest, base::Passed(&manifest_root), | |
284 system_package_dir_), | |
285 base::Bind(&Reader::OnReadManifest, weak_factory_.GetWeakPtr(), cache, | |
286 entry_created_callback)); | |
287 return; | |
288 } | |
289 } else if (using_static_catalog_) { | |
290 // A Reader using a static catalog manifest does not support dynamic | |
291 // discovery or introduction of new catalog entries. | |
292 entry_created_callback.Run(service_manager::mojom::ResolveResultPtr(), | |
293 service_manager::mojom::ResolveResultPtr()); | |
294 return; | |
295 } | |
296 | |
297 base::FilePath manifest_path_override; | |
298 { | |
299 auto override_iter = manifest_path_overrides_.find(name); | |
300 if (override_iter != manifest_path_overrides_.end()) | |
301 manifest_path_override = override_iter->second; | |
302 } | |
303 | |
304 std::string package_name_override; | |
305 { | |
306 auto override_iter = package_name_overrides_.find(name); | |
307 if (override_iter != package_name_overrides_.end()) | |
308 package_name_override = override_iter->second; | |
309 } | |
310 base::PostTaskAndReplyWithResult( | |
311 file_task_runner_.get(), FROM_HERE, | |
312 base::Bind(&ReadManifest, system_package_dir_, name, | |
313 package_name_override, manifest_path_override), | |
314 base::Bind(&Reader::OnReadManifest, weak_factory_.GetWeakPtr(), cache, | |
315 entry_created_callback)); | |
316 } | |
317 | |
318 void Reader::OverridePackageName(const std::string& service_name, | |
319 const std::string& package_name) { | |
320 package_name_overrides_.insert(std::make_pair(service_name, package_name)); | |
321 } | |
322 | |
323 void Reader::OverrideManifestPath(const std::string& service_name, | |
324 const base::FilePath& path) { | |
325 manifest_path_overrides_.insert(std::make_pair(service_name, path)); | |
326 } | |
327 | |
328 Reader::Reader(ManifestProvider* manifest_provider) | |
329 : using_static_catalog_(false), | |
330 manifest_provider_(manifest_provider), | |
331 weak_factory_(this) { | |
332 PathService::Get(base::DIR_MODULE, &system_package_dir_); | |
333 } | |
334 | |
335 void Reader::OnReadManifest( | |
336 EntryCache* cache, | |
337 const CreateEntryForNameCallback& entry_created_callback, | |
338 std::unique_ptr<Entry> entry) { | |
339 if (!entry) | |
340 return; | |
341 | |
342 std::string name = entry->name(); | |
343 cache->AddRootEntry(std::move(entry)); | |
344 | |
345 // NOTE: It's currently possible to end up with a duplicate entry, in which | |
346 // case the above call to AddRootEntry() may actually discard |entry|. We | |
347 // therefore look up the Entry by name here to get resolution metadata. | |
348 | |
349 const Entry* resolved_entry = cache->GetEntry(name); | |
350 DCHECK(resolved_entry); | |
351 entry_created_callback.Run( | |
352 service_manager::mojom::ResolveResult::From(resolved_entry), | |
353 service_manager::mojom::ResolveResult::From(resolved_entry->parent())); | |
354 } | |
355 | |
356 } // namespace catalog | |
OLD | NEW |