Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(59)

Side by Side Diff: services/catalog/reader.cc

Issue 2645973006: [Service Manager] Get rid of dynamic service discovery (Closed)
Patch Set: . Created 3 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « services/catalog/reader.h ('k') | services/device/BUILD.gn » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
(Empty)
1 // Copyright 2016 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "services/catalog/reader.h"
6
7 #include "base/base_paths.h"
8 #include "base/bind.h"
9 #include "base/files/file_enumerator.h"
10 #include "base/files/file_util.h"
11 #include "base/json/json_file_value_serializer.h"
12 #include "base/json/json_reader.h"
13 #include "base/memory/ptr_util.h"
14 #include "base/path_service.h"
15 #include "base/strings/string_util.h"
16 #include "base/strings/utf_string_conversions.h"
17 #include "base/task_runner_util.h"
18 #include "base/threading/thread_task_runner_handle.h"
19 #include "base/values.h"
20 #include "services/catalog/constants.h"
21 #include "services/catalog/entry.h"
22 #include "services/catalog/entry_cache.h"
23 #include "services/catalog/manifest_provider.h"
24 #include "services/catalog/public/interfaces/constants.mojom.h"
25 #include "services/service_manager/public/interfaces/constants.mojom.h"
26
27 namespace catalog {
28 namespace {
29
30 #if defined(OS_WIN)
31 const char kServiceExecutableExtension[] = ".service.exe";
32 #else
33 const char kServiceExecutableExtension[] = ".service";
34 #endif
35
36 const char kCatalogServicesKey[] = "services";
37 const char kCatalogServiceEmbeddedKey[] = "embedded";
38 const char kCatalogServiceExecutableKey[] = "executable";
39 const char kCatalogServiceManifestKey[] = "manifest";
40
41 base::FilePath GetManifestPath(const base::FilePath& package_dir,
42 const std::string& name,
43 const std::string& package_name_override) {
44 // TODO(beng): think more about how this should be done for exe targets.
45 std::string package_name =
46 package_name_override.empty() ? name : package_name_override;
47 return package_dir.AppendASCII(kPackagesDirName).AppendASCII(
48 package_name + "/manifest.json");
49 }
50
51 base::FilePath GetExecutablePath(const base::FilePath& package_dir,
52 const std::string& name) {
53 return package_dir.AppendASCII(
54 name + "/" + name + kServiceExecutableExtension);
55 }
56
57 std::unique_ptr<Entry> ProcessManifest(const base::Value* manifest_root,
58 const base::FilePath& package_dir,
59 const base::FilePath& executable_path) {
60
61 // Manifest was malformed or did not exist.
62 if (!manifest_root)
63 return nullptr;
64
65 const base::DictionaryValue* dictionary = nullptr;
66 if (!manifest_root->GetAsDictionary(&dictionary))
67 return nullptr;
68
69 std::unique_ptr<Entry> entry = Entry::Deserialize(*dictionary);
70 if (!entry)
71 return nullptr;
72 if (!executable_path.empty())
73 entry->set_path(executable_path);
74 else
75 entry->set_path(GetExecutablePath(package_dir, entry->name()));
76 return entry;
77 }
78
79 std::unique_ptr<Entry> ProcessUniqueManifest(
80 std::unique_ptr<base::Value> manifest_root,
81 const base::FilePath& package_dir) {
82 return ProcessManifest(manifest_root.get(), package_dir, base::FilePath());
83 }
84
85 std::unique_ptr<Entry> CreateEntryForManifestAt(
86 const base::FilePath& manifest_path,
87 const base::FilePath& package_dir) {
88 JSONFileValueDeserializer deserializer(manifest_path);
89 int error = 0;
90 std::string message;
91
92 // TODO(beng): probably want to do more detailed error checking. This should
93 // be done when figuring out if to unblock connection completion.
94 return ProcessUniqueManifest(deserializer.Deserialize(&error, &message),
95 package_dir);
96 }
97
98 void ScanDir(
99 const base::FilePath& package_dir,
100 const Reader::ReadManifestCallback& read_manifest_callback,
101 scoped_refptr<base::SingleThreadTaskRunner> original_thread_task_runner,
102 const base::Closure& read_complete_closure) {
103 base::FileEnumerator enumerator(package_dir, false,
104 base::FileEnumerator::DIRECTORIES);
105 while (1) {
106 base::FilePath path = enumerator.Next();
107 if (path.empty())
108 break;
109 base::FilePath manifest_path = path.AppendASCII("manifest.json");
110 std::unique_ptr<Entry> entry =
111 CreateEntryForManifestAt(manifest_path, package_dir);
112 if (!entry)
113 continue;
114
115 // Skip over subdirs that contain only manifests, they're artifacts of the
116 // build (e.g. for applications that are packaged into others) and are not
117 // valid standalone packages.
118 base::FilePath package_path = GetExecutablePath(package_dir, entry->name());
119 if (entry->name() != service_manager::mojom::kServiceName &&
120 entry->name() != catalog::mojom::kServiceName &&
121 !base::PathExists(package_path)) {
122 continue;
123 }
124
125 original_thread_task_runner->PostTask(
126 FROM_HERE,
127 base::Bind(read_manifest_callback, base::Passed(&entry)));
128 }
129
130 original_thread_task_runner->PostTask(FROM_HERE, read_complete_closure);
131 }
132
133 std::unique_ptr<Entry> ReadManifest(
134 const base::FilePath& package_dir,
135 const std::string& mojo_name,
136 const std::string& package_name_override,
137 const base::FilePath& manifest_path_override) {
138 base::FilePath manifest_path;
139 if (manifest_path_override.empty()) {
140 manifest_path =
141 GetManifestPath(package_dir, mojo_name, package_name_override);
142 } else {
143 manifest_path = manifest_path_override;
144 }
145
146 std::unique_ptr<Entry> entry = CreateEntryForManifestAt(manifest_path,
147 package_dir);
148 if (!entry) {
149 entry.reset(new Entry(mojo_name));
150 entry->set_path(GetExecutablePath(
151 package_dir.AppendASCII(kPackagesDirName), mojo_name));
152 }
153 return entry;
154 }
155
156 void IgnoreResolveResult(service_manager::mojom::ResolveResultPtr,
157 service_manager::mojom::ResolveResultPtr) {}
158
159 void LoadCatalogManifestIntoCache(const base::Value* root,
160 const base::FilePath& package_dir,
161 EntryCache* cache) {
162 DCHECK(root);
163 const base::DictionaryValue* catalog = nullptr;
164 if (!root->GetAsDictionary(&catalog)) {
165 LOG(ERROR) << "Catalog manifest is not a dictionary value.";
166 return;
167 }
168 DCHECK(catalog);
169
170 const base::DictionaryValue* services = nullptr;
171 if (!catalog->GetDictionary(kCatalogServicesKey, &services)) {
172 LOG(ERROR) << "Catalog manifest \"services\" is not a dictionary value.";
173 return;
174 }
175
176 for (base::DictionaryValue::Iterator it(*services); !it.IsAtEnd();
177 it.Advance()) {
178 const base::DictionaryValue* service_entry = nullptr;
179 if (!it.value().GetAsDictionary(&service_entry)) {
180 LOG(ERROR) << "Catalog service entry for \"" << it.key()
181 << "\" is not a dictionary value.";
182 continue;
183 }
184
185 bool is_embedded = false;
186 service_entry->GetBoolean(kCatalogServiceEmbeddedKey, &is_embedded);
187
188 base::FilePath executable_path;
189 std::string executable_path_string;
190 if (service_entry->GetString(kCatalogServiceExecutableKey,
191 &executable_path_string)) {
192 base::FilePath exe_dir;
193 CHECK(base::PathService::Get(base::DIR_EXE, &exe_dir));
194 #if defined(OS_WIN)
195 executable_path_string += ".exe";
196 base::ReplaceFirstSubstringAfterOffset(
197 &executable_path_string, 0, "@EXE_DIR",
198 base::UTF16ToUTF8(exe_dir.value()));
199 executable_path =
200 base::FilePath(base::UTF8ToUTF16(executable_path_string));
201 #else
202 base::ReplaceFirstSubstringAfterOffset(
203 &executable_path_string, 0, "@EXE_DIR", exe_dir.value());
204 executable_path = base::FilePath(executable_path_string);
205 #endif
206 }
207
208 const base::DictionaryValue* manifest = nullptr;
209 if (!service_entry->GetDictionary(kCatalogServiceManifestKey, &manifest)) {
210 LOG(ERROR) << "Catalog entry for \"" << it.key() << "\" has an invalid "
211 << "\"manifest\" value.";
212 continue;
213 }
214
215 DCHECK(!(is_embedded && !executable_path.empty()));
216
217 auto entry = ProcessManifest(
218 manifest, is_embedded ? base::FilePath() : package_dir,
219 executable_path);
220 if (entry) {
221 bool added = cache->AddRootEntry(std::move(entry));
222 DCHECK(added);
223 } else {
224 LOG(ERROR) << "Failed to read manifest entry for \"" << it.key() << "\".";
225 }
226 }
227 }
228
229 } // namespace
230
231 Reader::Reader(std::unique_ptr<base::Value> static_manifest,
232 EntryCache* cache)
233 : using_static_catalog_(true),
234 manifest_provider_(nullptr),
235 weak_factory_(this) {
236 PathService::Get(base::DIR_MODULE, &system_package_dir_);
237 LoadCatalogManifestIntoCache(
238 static_manifest.get(), system_package_dir_.AppendASCII(kPackagesDirName),
239 cache);
240 }
241
242 // A sequenced task runner is used to guarantee requests are serviced in the
243 // order requested. To do otherwise means we may run callbacks in an
244 // unpredictable order, leading to flake.
245 Reader::Reader(base::SequencedWorkerPool* worker_pool,
246 ManifestProvider* manifest_provider)
247 : Reader(manifest_provider) {
248 file_task_runner_ = worker_pool->GetSequencedTaskRunnerWithShutdownBehavior(
249 base::SequencedWorkerPool::GetSequenceToken(),
250 base::SequencedWorkerPool::SKIP_ON_SHUTDOWN);
251 }
252
253 Reader::Reader(base::SingleThreadTaskRunner* task_runner,
254 ManifestProvider* manifest_provider)
255 : Reader(manifest_provider) {
256 file_task_runner_ = task_runner;
257 }
258
259 Reader::~Reader() {}
260
261 void Reader::Read(const base::FilePath& package_dir,
262 EntryCache* cache,
263 const base::Closure& read_complete_closure) {
264 file_task_runner_->PostTask(
265 FROM_HERE,
266 base::Bind(&ScanDir, package_dir,
267 base::Bind(&Reader::OnReadManifest, weak_factory_.GetWeakPtr(),
268 cache, base::Bind(&IgnoreResolveResult)),
269 base::ThreadTaskRunnerHandle::Get(),
270 read_complete_closure));
271 }
272
273 void Reader::CreateEntryForName(
274 const std::string& name,
275 EntryCache* cache,
276 const CreateEntryForNameCallback& entry_created_callback) {
277 if (manifest_provider_) {
278 std::unique_ptr<base::Value> manifest_root =
279 manifest_provider_->GetManifest(name);
280 if (manifest_root) {
281 base::PostTaskAndReplyWithResult(
282 file_task_runner_.get(), FROM_HERE,
283 base::Bind(&ProcessUniqueManifest, base::Passed(&manifest_root),
284 system_package_dir_),
285 base::Bind(&Reader::OnReadManifest, weak_factory_.GetWeakPtr(), cache,
286 entry_created_callback));
287 return;
288 }
289 } else if (using_static_catalog_) {
290 // A Reader using a static catalog manifest does not support dynamic
291 // discovery or introduction of new catalog entries.
292 entry_created_callback.Run(service_manager::mojom::ResolveResultPtr(),
293 service_manager::mojom::ResolveResultPtr());
294 return;
295 }
296
297 base::FilePath manifest_path_override;
298 {
299 auto override_iter = manifest_path_overrides_.find(name);
300 if (override_iter != manifest_path_overrides_.end())
301 manifest_path_override = override_iter->second;
302 }
303
304 std::string package_name_override;
305 {
306 auto override_iter = package_name_overrides_.find(name);
307 if (override_iter != package_name_overrides_.end())
308 package_name_override = override_iter->second;
309 }
310 base::PostTaskAndReplyWithResult(
311 file_task_runner_.get(), FROM_HERE,
312 base::Bind(&ReadManifest, system_package_dir_, name,
313 package_name_override, manifest_path_override),
314 base::Bind(&Reader::OnReadManifest, weak_factory_.GetWeakPtr(), cache,
315 entry_created_callback));
316 }
317
318 void Reader::OverridePackageName(const std::string& service_name,
319 const std::string& package_name) {
320 package_name_overrides_.insert(std::make_pair(service_name, package_name));
321 }
322
323 void Reader::OverrideManifestPath(const std::string& service_name,
324 const base::FilePath& path) {
325 manifest_path_overrides_.insert(std::make_pair(service_name, path));
326 }
327
328 Reader::Reader(ManifestProvider* manifest_provider)
329 : using_static_catalog_(false),
330 manifest_provider_(manifest_provider),
331 weak_factory_(this) {
332 PathService::Get(base::DIR_MODULE, &system_package_dir_);
333 }
334
335 void Reader::OnReadManifest(
336 EntryCache* cache,
337 const CreateEntryForNameCallback& entry_created_callback,
338 std::unique_ptr<Entry> entry) {
339 if (!entry)
340 return;
341
342 std::string name = entry->name();
343 cache->AddRootEntry(std::move(entry));
344
345 // NOTE: It's currently possible to end up with a duplicate entry, in which
346 // case the above call to AddRootEntry() may actually discard |entry|. We
347 // therefore look up the Entry by name here to get resolution metadata.
348
349 const Entry* resolved_entry = cache->GetEntry(name);
350 DCHECK(resolved_entry);
351 entry_created_callback.Run(
352 service_manager::mojom::ResolveResult::From(resolved_entry),
353 service_manager::mojom::ResolveResult::From(resolved_entry->parent()));
354 }
355
356 } // namespace catalog
OLDNEW
« no previous file with comments | « services/catalog/reader.h ('k') | services/device/BUILD.gn » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698